<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"
        xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://radar.offseq.com/</loc>
    <changefreq>hourly</changefreq>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats</loc>
    <changefreq>hourly</changefreq>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/map</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/feeds</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=vulnerability</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?severity=critical</loc>
    <changefreq>daily</changefreq>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threats?type=malware</loc>
    <changefreq>daily</changefreq>
    <priority>0.7</priority>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5454-use-of-hard-coded-cryptographic-key--c7599b26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5454%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20GRID%20Organiser%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d76734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5463-cwe-77-improper-neutralization-of-sp-6f7ed040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5463%3A%20CWE-77%20Improper%20neutralization%20of%20special%20elements%20leading%20to%20command%20injection%20in%20Dan%20McInerney%20pymetasploit3&amp;severity=critical&amp;id=69cf4ec6e6bfc5ba1d767352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5453-use-of-hard-coded-cryptographic-key--eebd2c8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5453%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Rico%20s%C3%B3%20vantagem%20pra%20investir%20App&amp;severity=medium&amp;id=69cf4ec6e6bfc5ba1d767346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35537-cwe-502-deserialization-of-untruste-e3e5ffd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35537%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Roundcube%20Webmail&amp;severity=low&amp;id=69cf362ae6bfc5ba1d4c9706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5452-use-of-hard-coded-cryptographic-key--d5424d8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5452%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20UCC%20CampusConnect%20App&amp;severity=medium&amp;id=69cf362ae6bfc5ba1d4c970f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35536-cwe-159-improper-handling-of-invali-02ebbe3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35536%3A%20CWE-159%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20tornadoweb%20Tornado&amp;severity=high&amp;id=69cf362ae6bfc5ba1d4c9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35508-cwe-79-improper-neutralization-of-i-2b165f2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d18739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35507-cwe-348-use-of-less-trusted-source--3dfca42c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35507%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20milesmcc%20Shynet&amp;severity=medium&amp;id=69cf1a09e6bfc5ba1d187399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-04-03-d6f01094</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-04-03&amp;severity=low&amp;id=69cf1d84e6bfc5ba1d1ded65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32211-cwe-306-missing-authentication-for--955487bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32211%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20Web%20Apps&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32173-cwe-287-improper-authentication-in--faaed594</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32173%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20SRE%20Agent%20Gateway%20-%20SignalR%20Hub&amp;severity=high&amp;id=69cefde9e6bfc5ba1d075509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33105-cwe-285-improper-authorization-in-m-73a608f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33105%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26135-cwe-918-server-side-request-forgery-b7428a35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26135%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Custom%20Locations%20Resource%20Provider&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33107-cwe-918-server-side-request-forgery-97f03653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33107%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Databricks&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d075515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32213-cwe-285-improper-authorization-in-m-b7cd2d00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32213%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Foundry&amp;severity=critical&amp;id=69cefde9e6bfc5ba1d07550f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14033-cwe-122-heap-based-buffer-overflow--5ba0f01c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14033%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Belden%20Hirschmann%20EagleSDV&amp;severity=high&amp;id=69ceed4ae6bfc5ba1d039aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-emerging-when-developing-or-using-open-sourc-65bd61cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%2C%20emerging%20when%20developing%20or%20using%20open-source%20software&amp;severity=medium&amp;id=69cef91ee6bfc5ba1d055051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15620-cwe-306-missing-authentication-for--3a8bc232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15620%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Belden%20Hirschmann%20HiOS%20Switch%20Platform&amp;severity=critical&amp;id=69cef2c1e6bfc5ba1d03d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35467-cwe-522-insufficiently-protected-cr-7c0849fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35467%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CERT%2FCC%20cveClient%2Fencrypt-storage.js&amp;severity=high&amp;id=69cef558e6bfc5ba1d04a7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35466-cwe-79-improper-neutralization-of-i-561895ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CERT%2FCC%20cveClient%2FcveInterface.js&amp;severity=high&amp;id=69cef472e6bfc5ba1d047ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14034-improper-authentication-cwe-287-in--177567d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14034%3A%20Improper%20Authentication%20(CWE-287)%20in%20Belden%20Hirschmann%20HiEOS%20LRS11&amp;severity=critical&amp;id=69cef608e6bfc5ba1d04c2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34838-cwe-502-deserialization-of-untruste-f6c31d56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34838%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69cec5aae6bfc5ba1dfbd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34834-cwe-287-improper-authentication-in--289edfd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34834%3A%20CWE-287%3A%20Improper%20Authentication%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34833-cwe-312-cleartext-storage-of-sensit-b51ce693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34833%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20bulwarkmail%20webmail&amp;severity=high&amp;id=69cec5aae6bfc5ba1dfbd823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34832-cwe-639-authorization-bypass-throug-53bea463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Erudika%20scoold&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35383-cwe-540-inclusion-of-sensitive-info-d7621abd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35383%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Bentley%20Systems%20iTwin%20Platform&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34762-cwe-20-improper-input-validation-in-7e4100c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ellanetworks%20core&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34761-cwe-476-null-pointer-dereference-in-5e11ac55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34761%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5420-use-of-hard-coded-cryptographic-key--225a1021</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5420%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Shinrays%20Games%20Goods%20Triple%20App&amp;severity=low&amp;id=69cec5aae6bfc5ba1dfbd837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34760-cwe-20-improper-input-validation-in-9529c1a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34760%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=69cec5aae6bfc5ba1dfbd810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34745-cwe-22-improper-limitation-of-a-pat-3a68f043</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5429-cwe-79-improper-neutralization-of-in-0dc227b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5429%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34743-cwe-122-heap-based-buffer-overflow--7a101be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34743%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20tukaani-project%20xz&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34742-cwe-1188-insecure-default-initializ-4e5c2196</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34742%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69cec35ae6bfc5ba1dfb4cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5418-server-side-request-forgery-in-appsm-c094f40b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5418%3A%20Server-Side%20Request%20Forgery%20in%20appsmithorg%20appsmith&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34736-cwe-287-improper-authentication-in--80eaaffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34736%3A%20CWE-287%3A%20Improper%20Authentication%20in%20openedx%20openedx-platform&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43236-an-attacker-may-be-able-to-cause-un-e92b7e14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43236%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb81ae6bfc5ba1df6de14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43257-an-app-may-be-able-to-break-out-of--e2aaec50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43257%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34735-cwe-434-unrestricted-upload-of-file-f5d45c4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34735%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HytaleModding%20wiki&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40849-an-app-may-be-able-to-break-out-of--c169fbdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40849%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44303-a-malicious-application-may-be-able-5e1d5890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44303%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43210-processing-a-maliciously-crafted-me-956bf5fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43210%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81ae6bfc5ba1df6de07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44250-an-app-may-be-able-to-execute-arbit-072a711f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44250%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40858-an-app-may-be-able-to-access-contac-99748021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40858%3A%20An%20app%20may%20be%20able%20to%20access%20Contacts%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5417-server-side-request-forgery-in-datae-d5f83fe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5417%3A%20Server-Side%20Request%20Forgery%20in%20Dataease%20SQLbot&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6dea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43264-processing-a-maliciously-crafted-im-3fa309fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43264%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44286-an-attacker-with-physical-access-ca-66c9dde5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44286%3A%20An%20attacker%20with%20physical%20access%20can%20input%20keyboard%20events%20to%20apps%20running%20on%20a%20locked%20device%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44219-a-malicious-application-with-root-p-e93f0a1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44219%3A%20A%20malicious%20application%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6ddf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43202-processing-a-file-may-lead-to-memor-9e453001</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43202%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=69ceb81ae6bfc5ba1df6de03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43238-an-app-may-be-able-to-cause-unexpec-cb9a7852</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43238%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34730-cwe-22-improper-limitation-of-a-pat-0c6f1997</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34730%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34726-cwe-22-improper-limitation-of-a-pat-facde2ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34726%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=69ceb81be6bfc5ba1df6de90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43219-processing-a-maliciously-crafted-im-6b401487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43219%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81ae6bfc5ba1df6de11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34581-cwe-288-authentication-bypass-using-897021e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34581%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20patrickhener%20goshs&amp;severity=high&amp;id=69ceb81be6bfc5ba1df6de8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-claude-code-emerges-days-2c1b21d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20Claude%20Code%20Emerges%20Days%20After%20Source%20Leak&amp;severity=critical&amp;id=69ceb091e6bfc5ba1df36caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5414-improper-control-of-resource-identif-fcd854c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5414%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34717-cwe-89-improper-neutralization-of-s-63776762</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34717%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69ceb0a7e6bfc5ba1df381ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34715-cwe-113-improper-neutralization-of--5927154c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34715%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34610-cwe-681-incorrect-conversion-betwee-3f84b0e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34610%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20smuellerDD%20leancrypto&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34606-cwe-79-improper-neutralization-of-i-a9d7fe2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34606%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5413-information-disclosure-in-newgen-omn-d0dfc533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5413%3A%20Information%20Disclosure%20in%20Newgen%20OmniDocs&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34593-cwe-400-uncontrolled-resource-consu-4a24c715</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34593%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ash-project%20ash&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34591-cwe-22-improper-limitation-of-a-pat-b3677cbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34591%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20python-poetry%20poetry&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34828-cwe-613-insufficient-session-expira-ea1d03d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34828%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20knadh%20listmonk&amp;severity=high&amp;id=69cead0fe6bfc5ba1df180b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34584-cwe-639-authorization-bypass-throug-6b5821ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34584%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df1809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5370-cross-site-scripting-in-krayin-larav-5380aa7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5370%3A%20Cross%20Site%20Scripting%20in%20krayin%20laravel-crm&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34590-cwe-918-server-side-request-forgery-eeb7f30d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34590%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=medium&amp;id=69cead0fe6bfc5ba1df180a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34577-cwe-918-server-side-request-forgery-909b76e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34577%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98de6bfc5ba1defd63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurred-lines-adtech-abuse-delivers-browser-hijack-17589a6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurred%20Lines%3A%20AdTech%20Abuse%20Delivers%20Browser%20Hijackers%20Through%20the%20Microsoft%20Store&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34576-cwe-918-server-side-request-forgery-b2391ee3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34576%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34124-cwe-120-buffer-copy-without-checkin-3bdb564c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34124%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34122-cwe-121-stack-based-buffer-overflow-417d8ccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34122%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34121-cwe-287-improper-authentication-in--70bb008f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34121%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34120-cwe-122-heap-based-buffer-overflow--ac6e1997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34120%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34119-cwe-122-heap-based-buffer-overflow--623c460c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34119%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34118-cwe-122-heap-based-buffer-overflow--89dd0897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34118%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C520WS%20v2.6&amp;severity=high&amp;id=69cea98ae6bfc5ba1defd459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5368-sql-injection-in-projectworlds-car-r-e18e0ca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5368%3A%20SQL%20Injection%20in%20projectworlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35414-cwe-670-always-incorrect-control-fl-e4d4c1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35414%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=medium&amp;id=69cea98de6bfc5ba1defd642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33271-cwe-732-in-acronis-acronis-true-ima-83d3446e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33271%3A%20CWE-732%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27774-cwe-427-in-acronis-acronis-true-ima-f5d81d91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27774%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28728-cwe-427-in-acronis-acronis-true-ima-d8de14ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28728%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=medium&amp;id=69cea98ae6bfc5ba1defd453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5360-type-confusion-in-free5gc-b6640c32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5360%3A%20Type%20Confusion%20in%20Free5GC&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35388-cwe-420-unprotected-alternate-chann-db477462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35388%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35387-cwe-670-always-incorrect-control-fl-852141e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35387%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5355-os-command-injection-in-trendnet-tew-5919378b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5355%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cea282e6bfc5ba1ded3a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35386-cwe-696-incorrect-behavior-order-in-646d5041</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35386%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=69cea282e6bfc5ba1ded3a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35385-cwe-281-improper-preservation-of-pe-48960da7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35385%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenBSD%20OpenSSH&amp;severity=high&amp;id=69cea98de6bfc5ba1defd64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5354-os-command-injection-in-trendnet-tew-c979efcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5354%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69cec35ae6bfc5ba1dfb4cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35038-cwe-20-improper-input-validation-in-8b5fa3f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35038%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20SignalK%20signalk-server&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-rolls-out-darksword-exploit-protection-to-mo-bc92c3b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Rolls%20Out%20DarkSword%20Exploit%20Protection%20to%20More%20Devices&amp;severity=medium&amp;id=69ce97f5e6bfc5ba1dea5515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5353-os-command-injection-in-trendnet-tew-9f4b903f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5353%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34083-cwe-346-origin-validation-error-in--ca18c573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34083%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33951-cwe-284-improper-access-control-in--c9ec4f21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33951%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33950-cwe-285-improper-authorization-in-s-42d339ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33950%3A%20CWE-285%3A%20Improper%20Authorization%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5352-os-command-injection-in-trendnet-tew-dda530c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5352%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9803e6bfc5ba1dea5ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65114-cwe-444-inconsistent-interpretation-24bc4154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65114%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58136-cwe-670-always-incorrect-control-fl-428e4957</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58136%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69ce9803e6bfc5ba1dea5abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5351-os-command-injection-in-trendnet-tew-74359ae2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5351%3A%20OS%20Command%20Injection%20in%20Trendnet%20TEW-657BRM&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de9346c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5350-stack-based-buffer-overflow-in-trend-f5ac4019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5350%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-talos-qilin-edr-killer-infection-chain-0d9ac91a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Talos%3A%20Qilin%20EDR%20killer%20infection%20chain&amp;severity=medium&amp;id=69cea988e6bfc5ba1defd24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5349-stack-based-buffer-overflow-in-trend-1ea24dda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5349%3A%20Stack-based%20Buffer%20Overflow%20in%20Trendnet%20TEW-657BRM&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33746-cwe-287-improper-authentication-in--78811956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33746%3A%20CWE-287%3A%20Improper%20Authentication%20in%20ConvoyPanel%20panel&amp;severity=critical&amp;id=69ce8d6ee6bfc5ba1de64e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33544-cwe-362-concurrent-execution-using--60e2872c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33544%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5346-server-side-request-forgery-in-huime-f002dac4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5346%3A%20Server-Side%20Request%20Forgery%20in%20huimeicloud%20hm_editor&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33641-cwe-78-improper-neutralization-of-s-214e76d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33641%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33533-cwe-942-permissive-cross-domain-pol-c2e5f1b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33533%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32871-cwe-918-server-side-request-forgery-0687fde2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32871%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PrefectHQ%20fastmcp&amp;severity=critical&amp;id=69ce866ce6bfc5ba1de335fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-exploit-exposed-vite-installs-cve-2025-827c1913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Exploit%20Exposed%20%22Vite%22%20Installs%20(CVE-2025-30208)%2C%20(Thu%2C%20Apr%202nd)&amp;severity=medium&amp;id=69ce82dde6bfc5ba1de1d284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34974-cwe-79-improper-neutralization-of-i-8de569da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34973-cwe-943-improper-neutralization-of--0361ce91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34973%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34729-cwe-79-improper-neutralization-of-i-ff1a0323</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34729%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de33616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34823-cwe-79-improper-neutralization-of-i-852fe0d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de33843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34822-cwe-79-improper-neutralization-of-i-a1876c88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34821-cwe-79-improper-neutralization-of-i-29b5152c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34820-cwe-79-improper-neutralization-of-i-bd60eac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34819-cwe-79-improper-neutralization-of-i-8942aadd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34818-cwe-79-improper-neutralization-of-i-61c0ae4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34817-cwe-79-improper-neutralization-of-i-1a0bd2b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34816-cwe-79-improper-neutralization-of-i-bf596a93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34815-cwe-79-improper-neutralization-of-i-02ff92e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34814-cwe-79-improper-neutralization-of-i-8d8fa93e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34813-cwe-79-improper-neutralization-of-i-a451dc1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8673e6bfc5ba1de337d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34812-cwe-79-improper-neutralization-of-i-921e323c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34811-cwe-79-improper-neutralization-of-i-22dddd64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34810-cwe-79-improper-neutralization-of-i-3fae305a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34809-cwe-79-improper-neutralization-of-i-c8f386bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3377b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34808-cwe-79-improper-neutralization-of-i-5f915904</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34807-cwe-79-improper-neutralization-of-i-424a2944</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34806-cwe-79-improper-neutralization-of-i-da867409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34805-cwe-79-improper-neutralization-of-i-d35ef2fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de3376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34804-cwe-79-improper-neutralization-of-i-4100c6c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34803-cwe-79-improper-neutralization-of-i-c5a9c48d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce8671e6bfc5ba1de33763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34802-cwe-79-improper-neutralization-of-i-9839a241</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34801-cwe-79-improper-neutralization-of-i-ef5dac74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34800-cwe-79-improper-neutralization-of-i-483fe746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34799-cwe-79-improper-neutralization-of-i-efa3f37c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34798-cwe-79-improper-neutralization-of-i-cc36ce0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=medium&amp;id=69ce866ee6bfc5ba1de336bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34797-improper-neutralization-of-special--ffdcbce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34797%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34796-improper-neutralization-of-special--79152788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34796%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34795-improper-neutralization-of-special--f96f1d2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34795%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34794-improper-neutralization-of-special--d12f875a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34794%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34793-improper-neutralization-of-special--725bdc11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34793%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ee6bfc5ba1de336a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34792-improper-neutralization-of-special--ef0a7278</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34792%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34791-improper-neutralization-of-special--46bc51d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34791%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34790-cwe-22-improper-limitation-of-a-pat-061f357f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34790%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Endian%20Endian%20Firewall&amp;severity=high&amp;id=69ce866ce6bfc5ba1de3361a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5344-path-traversal-in-textpattern-f83f8ea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5344%3A%20Path%20Traversal%20in%20Textpattern&amp;severity=medium&amp;id=69ce8676e6bfc5ba1de3384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34728-cwe-22-improper-limitation-of-a-pat-020b73b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34728%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69ce866ce6bfc5ba1de33612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32629-cwe-20-improper-input-validation-in-98592881</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32629%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=69ce866ce6bfc5ba1de335f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31937-cwe-407-inefficient-algorithmic-com-baa4c414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31937%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31935-cwe-400-uncontrolled-resource-consu-a13b1298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31935%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5342-out-of-bounds-read-in-libraw-6fbc52cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5342%3A%20Out-of-Bounds%20Read%20in%20LibRaw&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31934-cwe-407-inefficient-algorithmic-com-b2d2eef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31934%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5339-command-injection-in-tenda-g103-5eb39526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5339%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31933-cwe-407-inefficient-algorithmic-com-ddce571b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31933%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31932-cwe-407-inefficient-algorithmic-com-f6b065e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31932%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26928-cwe-354-improper-validation-of-inte-78673667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26928%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Krajowa%20Izba%20Rozliczeniowa%20SzafirHost&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26927-cwe-348-use-of-less-trusted-source--37ed82cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26927%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Krajowa%20Izba%20Rozliczeniowa%20Szafir%20SDK%20Web&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31931-cwe-476-null-pointer-dereference-in-9e69cdc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31931%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5338-command-injection-in-tenda-g103-b6ed48f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5338%3A%20Command%20Injection%20in%20Tenda%20G103&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30867-cwe-617-reachable-assertion-in-emqx-785033b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30867%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20emqx%20CocoaMQTT&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35168-cwe-89-improper-neutralization-of-s-d5a2d66d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35168%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5334-sql-injection-in-itsourcecode-online-d20cf182</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5334%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69ce7bd9e6bfc5ba1ddfe6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28805-cwe-89-improper-neutralization-of-s-ce15ee60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28805%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29782-cwe-502-deserialization-of-untruste-274e1222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29782%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69ce7bd9e6bfc5ba1ddfe6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5333-command-injection-in-defaultfuction--b5a483d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5333%3A%20Command%20Injection%20in%20DefaultFuction%20Content-Management-System&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2737-cwe-79-improper-neutralization-of-in-4a30897e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3692-cwe-78-improper-neutralization-of-sp-3f6ac794</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3692%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5332-cross-site-scripting-in-xiaopi-panel-53e8a11b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5332%3A%20Cross%20Site%20Scripting%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2701-cwe-434-unrestricted-upload-of-file--41b41e42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2701%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2699-cwe-698-execution-after-redirect-ear-4b64a3dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2699%3A%20CWE-698%3A%20Execution%20After%20Redirect%20(EAR)%20in%20Progress%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=69ce74d2e6bfc5ba1ddd16b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5331-path-traversal-in-opencart-5c3ce989</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5331%3A%20Path%20Traversal%20in%20OpenCart&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34890-cwe-79-improper-neutralization-of-i-c66c3461</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20O%E2%80%99Donnell%20MSTW%20League%20Manager&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5330-improper-access-controls-in-sourceco-8bbff6ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5330%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Best%20Courier%20Management%20System&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4636-incorrect-behavior-order-authorizati-0cc8b635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4636%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4634-excessive-platform-resource-consumpt-e63a2b27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4634%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4325-improper-isolation-or-compartmentali-bba41b6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4325%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=69ce6a44e6bfc5ba1dd993ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4282-improper-isolation-or-compartmentali-80ba9520</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4282%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3872-url-redirection-to-untrusted-site-op-f57a586d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3872%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69ce6a44e6bfc5ba1dd993a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-and-high-severity-vulnerabi-87970731</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20and%20High-Severity%20Vulnerabilities&amp;severity=critical&amp;id=69ce6339e6bfc5ba1dd727e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5328-sql-injection-in-shsuishang-modulith-d2e7674c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5328%3A%20SQL%20Injection%20in%20shsuishang%20modulithshop&amp;severity=medium&amp;id=69ce634be6bfc5ba1dd72c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/250000-affected-by-data-breach-at-nacogdoches-memo-e5c6e74a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=250%2C000%20Affected%20by%20Data%20Breach%20at%20Nacogdoches%20Memorial%20Hospital&amp;severity=medium&amp;id=69ce5c31e6bfc5ba1dd4377d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5327-command-injection-in-efforthye-fast--2095b670</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5327%3A%20Command%20Injection%20in%20efforthye%20fast-filesystem-mcp&amp;severity=medium&amp;id=69ce5c3fe6bfc5ba1dd43aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5326-authorization-bypass-in-sourcecodest-1e83e563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5326%3A%20Authorization%20Bypass%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69ce4e22e6bfc5ba1dced15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercor-hit-by-litellm-supply-chain-attack-7b85edb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercor%20Hit%20by%20LiteLLM%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ce4a9ee6bfc5ba1dcd4fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32145-cwe-770-allocation-of-resources-wit-10bb908a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32145%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69ce471be6bfc5ba1dcbccc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-crystalx-rat-emerges-1eb51c44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20CrystalX%20RAT%20Emerges&amp;severity=medium&amp;id=69ce3c8de6bfc5ba1dc7d5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5246-authorization-bypass-in-cesanta-mong-ae6eeaf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5246%3A%20Authorization%20Bypass%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce3c9ae6bfc5ba1dc7d953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5245-stack-based-buffer-overflow-in-cesan-37061058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5245%3A%20Stack-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce82f2e6bfc5ba1de1d976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33617-cwe-497-exposure-of-sensitive-syste-9798356f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33617%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33616-cwe-89-improper-neutralization-of-s-b558174c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33616%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33615-cwe-89-improper-neutralization-of-s-cc89f560</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33615%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69ce82f2e6bfc5ba1de1d972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33614-cwe-89-improper-neutralization-of-s-efad6d82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33614%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33613-cwe-78-improper-neutralization-of-s-0a03d240</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33613%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69ce7bdce6bfc5ba1ddfe79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29136-cwe-79-improper-neutralization-of-i-7ca90c9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-Site%20Scripting&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29139-cwe-288-authentication-bypass-using-94a56236</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29139%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29144-cwe-20-improper-input-validation-in-ad573e10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29144%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29143-cwe-20-improper-input-validation-in-1fea5cad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0634-cwe-88-improper-neutralization-of-ar-70949bd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0634%3A%20CWE-88%20Improper%20neutralization%20of%20argument%20delimiters%20in%20a%20command%20(&apos;argument%20injection&apos;)%20in%20TECNO%20Mobile%20TECNO%20Pova7%20Pro%205G&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc4189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29138-cwe-90-improper-neutralization-of-s-69352f09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29138%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29131-cwe-90-improper-neutralization-of-s-69785704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29131%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29142-cwe-325-missing-cryptographic-step--10414bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29142%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29137-cwe-20-improper-input-validation-in-7d8ef09b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29137%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce3203e6bfc5ba1dc418a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29141-cwe-20-improper-input-validation-in-35e12996</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29141%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce3203e6bfc5ba1dc418b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29135-cwe-20-improper-input-validation-in-531384d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29135%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29134-cwe-807-reliance-on-untrusted-input-0711a551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29134%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29140-cwe-295-improper-certificate-valida-1bda9135</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29140%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69ce2afae6bfc5ba1dc065e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29133-cwe-20-improper-input-validation-in-6d190327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29133%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29132-cwe-306-missing-authentication-for--afdaff4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29132%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69ce2afae6bfc5ba1dc065dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5244-heap-based-buffer-overflow-in-cesant-a31023f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5244%3A%20Heap-based%20Buffer%20Overflow%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=69ce74d2e6bfc5ba1ddd16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5032-cwe-200-exposure-of-sensitive-inform-e8a1194d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5032%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0686-cwe-918-server-side-request-forgery--ae91b1ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0686%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=high&amp;id=69ce206de6bfc5ba1dba1543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0688-cwe-918-server-side-request-forgery--d72e0c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0688%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pfefferle%20Webmention&amp;severity=medium&amp;id=69ce206de6bfc5ba1dba154a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5325-cross-site-scripting-in-sourcecodest-0e3910bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5325%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69ce1964e6bfc5ba1db608a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5323-server-side-request-forgery-in-priya-eb225e7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5323%3A%20Server-Side%20Request%20Forgery%20in%20priyankark%20a11y-mcp&amp;severity=medium&amp;id=69ce125de6bfc5ba1db26106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1540-cwe-94-improper-control-of-generatio-c59967f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1540%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=high&amp;id=69ce74d2e6bfc5ba1ddd16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5322-sql-injection-in-alejandroarciniegas-379e6975</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5322%3A%20SQL%20Injection%20in%20AlejandroArciniegas%20mcp-data-vis&amp;severity=medium&amp;id=69ce044ee6bfc5ba1dac2508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4347-cwe-22-improper-limitation-of-a-path-17e5576b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4347%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20MW%20WP%20Form&amp;severity=high&amp;id=69ce044ee6bfc5ba1dac2503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5321-permissive-cross-domain-policy-with--484deffd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5321%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdf9c0e6bfc5ba1d93594a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5320-missing-authentication-in-vanna-ai-v-27b068c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5320%3A%20Missing%20Authentication%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69cdef39e6bfc5ba1d8a4eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5319-cross-site-scripting-in-itsourcecode-b7657577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5319%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cde4a8e6bfc5ba1d70ae32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5318-out-of-bounds-write-in-libraw-d90882c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5318%3A%20Out-of-bounds%20Write%20in%20LibRaw&amp;severity=medium&amp;id=69cdd316e6bfc5ba1d496d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5317-out-of-bounds-write-in-nothings-stb-3bd2dfb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5317%3A%20Out-of-bounds%20Write%20in%20Nothings%20stb&amp;severity=medium&amp;id=69ce74d5e6bfc5ba1ddd1777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1243-vulnerability-in-ibm-content-navigat-a8af920e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1243%3A%20Vulnerability%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=69ce7bdce6bfc5ba1ddfe79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5316-allocation-of-resources-in-nothings--e599e034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5316%3A%20Allocation%20of%20Resources%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f636a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-02-f161eb17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-02&amp;severity=medium&amp;id=69cf04e8e6bfc5ba1d090aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30252-na-03589a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30252%3A%20n%2Fa&amp;severity=high&amp;id=69cef3d9e6bfc5ba1d047235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30251-na-e36bdc8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30251%3A%20n%2Fa&amp;severity=medium&amp;id=69cef356e6bfc5ba1d045060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26895-na-47bf4a92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26895%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30603-na-ae538424</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30603%3A%20n%2Fa&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df381ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34877-na-4fa5c075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34877%3A%20n%2Fa&amp;severity=critical&amp;id=69cea282e6bfc5ba1ded3a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25212-na-87cac814</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25212%3A%20n%2Fa&amp;severity=critical&amp;id=69ce9803e6bfc5ba1dea5ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30332-na-a0fa4c0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30332%3A%20n%2Fa&amp;severity=high&amp;id=69ce9471e6bfc5ba1de93467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34876-na-d655599d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34876%3A%20n%2Fa&amp;severity=high&amp;id=69ce8d6ee6bfc5ba1de64e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21767-cwe-306-missing-authentication-for--f30553f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21767%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=medium&amp;id=69cdb370e6bfc5ba1d0f6370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21765-cwe-732-incorrect-permission-assign-d20224ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21765%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20HCLSoftware%20BigFix%20Platform&amp;severity=high&amp;id=69cdafeee6bfc5ba1d0e2130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5315-out-of-bounds-read-in-nothings-stb-e375c1ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5315%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cdac8de6bfc5ba1d0c8246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66487-cwe-770-allocation-of-resources-wit-66913c96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66487%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Shares&amp;severity=low&amp;id=69cda8e6e6bfc5ba1d0b5794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66486-cwe-80-improper-neutralization-of-s-dec075eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66486%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66485-cwe-644-improper-neutralization-of--f6e8158d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66485%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32929-out-of-bounds-read-in-fuji-electric-599bf79b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32929%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32928-stack-based-buffer-overflow-in-fuji-f84a5b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32928%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b57a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66484-vulnerability-in-ibm-aspera-shares-ad9e1822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66484%3A%20Vulnerability%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b578b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32927-out-of-bounds-read-in-fuji-electric-a25c3241</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32927%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32926-out-of-bounds-read-in-fuji-electric-9a1a91dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32926%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b579b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32925-stack-based-buffer-overflow-in-fuji-6dac82d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32925%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=69cda8e6e6bfc5ba1d0b5797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66483-cwe-613-insufficient-session-expira-ee16a507</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66483%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cda8e6e6bfc5ba1d0b5788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36375-cwe-352-cross-site-request-forgery--28f4e6e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5314-out-of-bounds-read-in-nothings-stb-bdde5681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5314%3A%20Out-of-Bounds%20Read%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd9ad5e6bfc5ba1d063678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34572-cwe-284-improper-access-control-in--63f77787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34572%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3987-cwe-22-improper-limitation-of-a-path-318a1a63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3987%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69cd93efe6bfc5ba1d0036f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34571-cwe-79-improper-neutralization-of-i-055c896a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93efe6bfc5ba1d0036ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34570-cwe-284-improper-access-control-in--917f2c32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5313-denial-of-service-in-nothings-stb-3f5b6ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5313%3A%20Denial%20of%20Service%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cd93efe6bfc5ba1d0036f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34569-cwe-79-improper-neutralization-of-i-ebe55431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34569%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34568-cwe-79-improper-neutralization-of-i-ae5d4369</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34567-cwe-79-improper-neutralization-of-i-5c12fe3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34567%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34566-cwe-79-improper-neutralization-of-i-937ed996</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34566%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00362a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34565-cwe-79-improper-neutralization-of-i-f662be7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34565%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34564-cwe-79-improper-neutralization-of-i-8f6e6ad8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34564%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d003621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34563-cwe-79-improper-neutralization-of-i-e0cd90ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cd93ece6bfc5ba1d00361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34562-cwe-79-improper-neutralization-of-i-b2a73cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34561-cwe-79-improper-neutralization-of-i-b2df19ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cd93ece6bfc5ba1d003615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34560-cwe-79-improper-neutralization-of-i-f9f46ebc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34560%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69ce7bdce6bfc5ba1ddfe7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34559-cwe-79-improper-neutralization-of-i-7054532f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34559%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cec35ae6bfc5ba1dfb4d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2475-cwe-601-url-redirection-to-untrusted-81d4cc07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2475%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=low&amp;id=69cd8944e6bfc5ba1dfc32df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34543-cwe-908-use-of-uninitialized-resour-86e5cef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34543%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34544-cwe-190-integer-overflow-or-wraparo-efaa8782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34544%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4820-cwe-614-sensitive-cookie-in-https-se-fb43e146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4820%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34545-cwe-122-heap-based-buffer-overflow--18796f81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34545%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69cd8944e6bfc5ba1dfc32f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36373-cwe-497-exposure-of-sensitive-syste-8d6a2629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36373%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataPower%20Gateway%2010.6CD&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13916-cwe-327-use-of-a-broken-or-risky-cr-094ead12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13916%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20Shares&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1491-cwe-444-inconsistent-interpretation--f859d77e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1491%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34531-cwe-287-improper-authentication-in--374da8b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34531%3A%20CWE-287%3A%20Improper%20Authentication%20in%20miguelgrinberg%20Flask-HTTPAuth&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2862-cwe-444-inconsistent-interpretation--f24cc938</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2862%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd8944e6bfc5ba1dfc32e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1345-cwe-78-improper-neutralization-of-sp-ed530469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1345%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4101-cwe-287-improper-authentication-in-i-7c1be3e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4101%3A%20CWE-287%20Improper%20Authentication%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=high&amp;id=69cd85bee6bfc5ba1df9d44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4364-cwe-79-improper-neutralization-of-in-1bd7f249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Verify%20Identity%20Access%20Container&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5312-improper-access-controls-in-d-link-d-cb27ea75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5312%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34525-cwe-20-improper-input-validation-in-e9b20bba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34525%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cd85bee6bfc5ba1df9d445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34520-cwe-113-improper-neutralization-of--111721c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34520%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34519-cwe-113-improper-neutralization-of--70b3077a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34519%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cd85bee6bfc5ba1df9d43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34518-cwe-200-exposure-of-sensitive-infor-10190518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34518%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34517-cwe-770-allocation-of-resources-wit-505e0ade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34517%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34516-cwe-770-allocation-of-resources-wit-8668224c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34516%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34515-cwe-36-absolute-path-traversal-in-a-c7316820</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34515%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69ce9471e6bfc5ba1de93472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34514-cwe-113-improper-neutralization-of--4f1fe682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34514%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69ce7bdce6bfc5ba1ddfe7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-that-gets-rid-of-ads-wed-apr-1st-503f23d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20That%20Gets%20Rid%20of%20ADS%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69ccf91de6bfc5ba1dc22852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22815-cwe-400-uncontrolled-resource-consu-c8acea99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22815%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69cec35ce6bfc5ba1dfb4d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34513-cwe-770-allocation-of-resources-wit-a8a2860e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34513%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69cec35ae6bfc5ba1dfb4d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34456-cwe-284-improper-access-control-in--99ed6793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34456%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20reviactyl%20panel&amp;severity=critical&amp;id=69cd7b33e6bfc5ba1df4980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34455-cwe-89-improper-neutralization-of-s-b655e030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34455%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HiEventsDev%20Hi.Events&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34750-cwe-22-improper-limitation-of-a-pat-b466bdec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34749-cwe-352-cross-site-request-forgery--8eac2e30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34749%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df4981f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34748-cwe-79-improper-neutralization-of-i-edb944a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34748%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df4981c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34747-cwe-89-improper-neutralization-of-s-6146081e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34747%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5311-improper-access-controls-in-d-link-d-528d6a16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5311%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cd7b33e6bfc5ba1df49826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34746-cwe-918-server-side-request-forgery-27aa2220</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34746%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=high&amp;id=69cd7b33e6bfc5ba1df49814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stranger-strings-yurei-ransomware-operator-toolkit-b88717bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stranger%20Strings%3A%20Yurei%20Ransomware%20Operator%20Toolkit%20Exposed&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35000-cwe-184-incomplete-list-of-disallow-5d5e7007</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35000%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20dgtlmoon%20ChangeDetection.io&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5199-cwe-639-authorization-bypass-through-f024480b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5199%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Temporal%20Technologies%2C%20Inc.%20temporal&amp;severity=low&amp;id=69cd5f13e6bfc5ba1de6e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34751-cwe-472-external-control-of-assumed-7a45aec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34751%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34397-cwe-269-improper-privilege-manageme-ac0f8ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34397%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34376-cwe-863-incorrect-authorization-in--58a5425c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34376%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34236-cwe-331-insufficient-entropy-in-aut-5b5ef4db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34236%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20auth0%20auth0-PHP&amp;severity=high&amp;id=69cd5809e6bfc5ba1de493cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34159-cwe-119-improper-restriction-of-ope-71d608e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34159%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34076-cwe-918-server-side-request-forgery-66475961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34076%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20clerk%20javascript&amp;severity=high&amp;id=69cd6623e6bfc5ba1de9cbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34072-cwe-287-improper-authentication-in--c977ac52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34072%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fccview%20cronmaster&amp;severity=high&amp;id=69cd5f16e6bfc5ba1de6e60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20090-improper-neutralization-of-input-du-c35f3078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20089-improper-neutralization-of-input-du-ca0d51f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20087-improper-neutralization-of-input-du-35f27bdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20088-improper-neutralization-of-input-du-02bcc2a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5310-use-of-hard-coded-cryptographic-key--f3646b0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5310%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69cd5f16e6bfc5ba1de6e60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20160-exposure-of-resource-to-wrong-spher-3290e5d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20160%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20174-improper-limitation-of-a-pathname-t-f29065ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20174%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20151-insertion-of-sensitive-information--d4761117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20151%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cisco%20Cisco%20Smart%20Software%20Manager%20On-Prem&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20155-missing-authorization-in-cisco-cisc-f689f549</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20155%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20096-improper-neutralization-of-special--255348b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20096%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20097-out-of-bounds-write-in-cisco-cisco--549f74cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20097%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=medium&amp;id=69cd6621e6bfc5ba1de9cb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20094-improper-neutralization-of-special--15156e9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20094%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Standalone)&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20095-improper-neutralization-of-special--1a61b766</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20093-improper-input-validation-in-cisco--4922ce7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20093%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=critical&amp;id=69cd661ee6bfc5ba1de9cafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20085-improper-neutralization-of-input-du-1da11352</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20NFV%20Infrastructure%20Software&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9cafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20041-server-side-request-forgery-ssrf-in-eabba642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20041%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20042-improper-certificate-validation-in--1a05cd72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20042%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=69cd661ee6bfc5ba1de9caf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33990-cwe-918-server-side-request-forgery-02c9c2d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33990%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20docker%20model-runner&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33978-cwe-79-improper-neutralization-of-i-39c40437</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33978%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69cd7224e6bfc5ba1dee83ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35099-cwe-362-concurrent-execution-using--a2f5c300</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35099%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Lakeside%20Software%20SysTrack%20Agent&amp;severity=high&amp;id=69cd69c0e6bfc5ba1deb926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toy-giant-hasbro-hit-by-cyberattack-6970d5a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toy%20Giant%20Hasbro%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=69cd3be9e6bfc5ba1ddce51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4989-cwe-918-server-side-request-forgery--2822c454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4989%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crystalx-rat-a-trojan-for-pranks-remote-access-and-e7339edb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrystalX%20RAT%3A%20a%20Trojan%20for%20pranks%2C%20remote%20access%2C%20and%20cryptocurrency%20theft%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cd34fae6bfc5ba1dda8bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-deepload-malware-dropped-in-clickfix-attacks-bb581dea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DeepLoad%20Malware%20Dropped%20in%20ClickFix%20Attacks&amp;severity=medium&amp;id=69cd34e1e6bfc5ba1dda7e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5175-cwe-862-in-devolutions-server-45e43dc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5175%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4925-cwe-862-in-devolutions-server-8fd83451</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4925%3A%20CWE-862%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4927-cwe-201-insertion-of-sensitive-infor-7cf72305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4927%3A%20CWE-201%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4924-cwe-1390-in-devolutions-server-d7d2eda8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4924%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4828-cwe-1390-in-devolutions-server-596962b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4828%3A%20CWE-1390%20in%20Devolutions%20Server&amp;severity=high&amp;id=69cd3867e6bfc5ba1ddc2e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4829-cwe-287-in-devolutions-server-b2e61b41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4829%3A%20CWE-287%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13535-cwe-79-improper-neutralization-of-i-e707a4a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-zero-day-among-21-vulnerabilities-patche-54fdc91f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20Zero-Day%20Among%2021%20Vulnerabilities%20Patched%20in%20Chrome&amp;severity=medium&amp;id=69cd2dd9e6bfc5ba1dd7270c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-data-security-risks-from-china-made-m-6fc1b458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Data%20Security%20Risks%20From%20China-Made%20Mobile%20Apps&amp;severity=medium&amp;id=69cd26d2e6bfc5ba1dd450e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35094-expired-pointer-dereference-in-red--f22d2f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35094%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69cd26f5e6bfc5ba1dd45f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35093-improper-control-of-generation-of-c-7b21388e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35093%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5271-vulnerability-in-python-software-fou-bed2426b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5271%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20pymanager&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34430-cwe-184-incomplete-list-of-disallow-3e65c84f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34430%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34999-cwe-306-missing-authentication-for--59ead885</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34999%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-uranium-crypto-exchange-hacker-59d7b087</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Uranium%20Crypto%20Exchange%20Hacker&amp;severity=medium&amp;id=69cd1fc9e6bfc5ba1dd1955e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-nexus-threat-actor-compromises-widely--67b5ee00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Nexus%20Threat%20Actor%20Compromises%20Widely%20Used%20Axios%20NPM%20Package%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpacking-augmented-marauders-multi-pronged-casban-0e495343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpacking%20Augmented%20Marauder%E2%80%99s%20Multi-Pronged%20Casbaneiro%20Campaigns&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-axios-supply-chain-compromise-one-rat-t-38259c89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Axios%20supply%20chain%20compromise%20-%20one%20RAT%20to%20rule%20them%20all&amp;severity=medium&amp;id=69cd70a4e6bfc5ba1ded84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35092-integer-overflow-or-wraparound-in-r-1580859a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35092%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-35091-incorrect-check-of-function-return--9c3dab2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-35091%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latest-xloader-obfuscation-methods-and-network-pro-08dbc5b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Latest%20Xloader%20Obfuscation%20Methods%20and%20Network%20Protocol&amp;severity=medium&amp;id=69cd7428e6bfc5ba1def5b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-inbox-to-intrusion-multistage-remcos-rat-and--59cdc1b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Inbox%20to%20Intrusion%3A%20Multi%E2%80%91Stage%20Remcos%20RAT%20and%20C2%E2%80%91Delivered%20Payloads%20in%20Network&amp;severity=medium&amp;id=69cd3864e6bfc5ba1ddc2ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-front-end-library-npm-supply-chain-poisoning-9eef9940</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20Front-End%20Library%20npm%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69cd34f2e6bfc5ba1dda89f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3877-cwe-79-improper-neutralization-of-in-2906697a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0522-cwe-610-externally-controlled-refere-a44134fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0522%3A%20CWE-610%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20VertiGIS%20VertiGIS%20FM&amp;severity=high&amp;id=69cd1fdee6bfc5ba1dd19c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-005-first-con-187893ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20005%20-%20First%20Confirmed%20Victim%20Disclosure%2C%20Post-Compromise%20Cloud%20Enumeration%20Documented%2C%20and%20Axios%20Attribution%20Narrows%2C%20(Wed%2C%20Apr%201st)&amp;severity=medium&amp;id=69cd1c4fe6bfc5ba1dcfe81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22768-cwe-732-incorrect-permission-assign-6516d813</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22768%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22767-cwe-61-unix-symbolic-link-symlink-f-7f0a5250</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22767%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20AppSync&amp;severity=high&amp;id=69cd11c0e6bfc5ba1dcba0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25601-cwe-798-use-of-hard-coded-credentia-f6a1fb4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25601%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Metronik%20d.o.o.%20MEPIS%20RM&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24096-cwe-280-improper-handling-of-insuff-7723b1ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24096%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0932-cwe-918-server-side-request-forgery--a1ba07b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0932%3A%20CWE-918%20Server-Side%20request%20forgery%20(SSRF)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=69ccf599e6bfc5ba1dc10440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1879-unrestricted-upload-in-harvard-unive-0364b373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1879%3A%20Unrestricted%20Upload%20in%20Harvard%20University%20IQSS%20Dataverse&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53828-cwe-228-in-ericsson-packet-core-con-8d45fc72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53828%3A%20CWE-228%20in%20Ericsson%20Packet%20Core%20Controller%20(PCC)&amp;severity=medium&amp;id=69ccee90e6bfc5ba1dbeb77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21630-cwe-89-improper-neutralization-of-s-f9ffd8d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21630%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23898-cwe-73-destructive-file-deletion-an-4b16a48a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23898%3A%20CWE-73%20Destructive%20File%20Deletion%20and%20Potential%20System%20Compromise%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc671d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21629-cwe-284-improper-access-control-in--ffadd50c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21629%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23899-cwe-284-improper-access-control-in--4257ef69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23899%3A%20CWE-284%20Improper%20Access%20Control%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=high&amp;id=69cce78be6bfc5ba1dbc6720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21631-cwe-79-improper-neutralization-of-i-92d153db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc6717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21632-cwe-79-improper-neutralization-of-i-cb31d573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=69cce78be6bfc5ba1dbc671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34889-cwe-79-improper-neutralization-of-i-fc72ebe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69cce0a2e6bfc5ba1db4f246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-package-breached-in-north-korean-supply--46479264</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Package%20Breached%20in%20North%20Korean%20Supply%20Chain%20Attack&amp;severity=low&amp;id=69ccdcfde6bfc5ba1daf8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5261-unrestricted-upload-in-shandong-hote-e305c3a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5261%3A%20Unrestricted%20Upload%20in%20Shandong%20Hoteam%20InforCenter%20PLM&amp;severity=medium&amp;id=69ccd979e6bfc5ba1dae0250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4370-cwe-295-improper-certificate-validat-9bb2b3b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4370%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Canonical%20Juju&amp;severity=critical&amp;id=69ccd979e6bfc5ba1dae024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-addresses-vertex-security-issues-after-rese-8ede5828</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Addresses%20Vertex%20Security%20Issues%20After%20Researchers%20Weaponize%20AI%20Agents&amp;severity=medium&amp;id=69ccceede6bfc5ba1da7e8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28265-cwe-35-path-traversal-in-dell-power-95e5b4b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28265%3A%20CWE-35%3A%20Path%20Traversal%20in%20Dell%20PowerStore&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5259-server-side-request-forgery-in-autoh-263f25bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5259%3A%20Server-Side%20Request%20Forgery%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27101-cwe-22-improper-limitation-of-a-pat-91a08efa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27101%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway&amp;severity=medium&amp;id=69ccd270e6bfc5ba1daa6534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5258-path-traversal-in-sanster-iopaint-674463db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5258%3A%20Path%20Traversal%20in%20Sanster%20IOPaint&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-laughing-rat-crystalx-combines-spyware-stealer-a-5579cd12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20laughing%20RAT%3A%20CrystalX%20combines%20spyware%3B%20stealer%3B%20and%20prankware%20features&amp;severity=medium&amp;id=69ccf214e6bfc5ba1dbff3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5257-sql-injection-in-code-projects-simpl-d962b8c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5257%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5256-sql-injection-in-code-projects-simpl-cd4b413e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5256%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2696-cwe-200-information-exposure-in-expo-c6c7420f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2696%3A%20CWE-200%20Information%20Exposure%20in%20Export%20All%20URLs&amp;severity=medium&amp;id=69ccb9d5e6bfc5ba1da0d487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15484-cwe-287-improper-authentication-in--ce94ec07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15484%3A%20CWE-287%20Improper%20Authentication%20in%20Order%20Notification%20for%20WooCommerce&amp;severity=critical&amp;id=69ccb9d5e6bfc5ba1da0d484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5255-cross-site-scripting-in-code-project-b81dbea2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5255%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69ccaf49e6bfc5ba1d9c9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5292-out-of-bounds-read-in-google-chrome-b15ff9cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5292%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c4e6bfc5ba1d993171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5291-inappropriate-implementation-in-goog-a4be30b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5291%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c4e6bfc5ba1d99316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5290-use-after-free-in-google-chrome-83e792f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5290%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5289-use-after-free-in-google-chrome-b3278917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5289%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5288-use-after-free-in-google-chrome-8b1fddc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5288%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=69cca4c2e6bfc5ba1d9930f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5287-use-after-free-in-google-chrome-0142d8c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5287%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5273-use-after-free-in-google-chrome-9e1d72d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5273%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5286-use-after-free-in-google-chrome-34aabe80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5286%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5285-use-after-free-in-google-chrome-1cf97b5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5285%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5284-use-after-free-in-google-chrome-08b3d1bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5284%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5283-inappropriate-implementation-in-goog-8cbcc8fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5283%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c2e6bfc5ba1d9930e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5272-heap-buffer-overflow-in-google-chrom-fc402e90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5272%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5282-out-of-bounds-read-in-google-chrome-c48d1b96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5282%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5281-use-after-free-in-google-chrome-a3c95c50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5281%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c2e6bfc5ba1d9930d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5280-use-after-free-in-google-chrome-f1defb35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5280%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5279-object-corruption-in-google-chrome-1e2351f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5279%3A%20Object%20corruption%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5278-use-after-free-in-google-chrome-795bf565</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5278%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99305d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5277-integer-overflow-in-google-chrome-895e8161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5277%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5276-insufficient-policy-enforcement-in-g-312e0a64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5276%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d993055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5275-heap-buffer-overflow-in-google-chrom-6d922d63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5275%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d993051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5274-integer-overflow-in-google-chrome-7a8b6e09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5274%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69cca4c0e6bfc5ba1d99304d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5254-cross-site-scripting-in-welovemedia--c4c3c5aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5254%3A%20Cross%20Site%20Scripting%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69cca4c0e6bfc5ba1d99303e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5253-cross-site-scripting-in-bufanyun-hot-0cbc0137</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5253%3A%20Cross%20Site%20Scripting%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5252-cross-site-scripting-in-z-9527-admin-c0179b5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5252%3A%20Cross%20Site%20Scripting%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc96ade6bfc5ba1d9413a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5251-dynamically-determined-object-attrib-a89ddae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5251%3A%20Dynamically-Determined%20Object%20Attributes%20in%20z-9527%20admin&amp;severity=medium&amp;id=69cc889de6bfc5ba1d8929e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3774-cwe-200-exposure-of-sensitive-inform-09cde688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3774%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3775-cwe-427-dll-hijacking-in-foxit-softw-ab6d3970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3775%3A%20CWE-427%3A%20DLL%20Hijacking%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3776-cwe-476-null-pointer-dereference-in--9dd0d0dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3776%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3780-cwe-426-untrusted-search-path-in-fox-e264b801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3780%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3778-cwe-674-uncontrolled-recursion-in-fo-3d872c30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3778%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3779-cwe-416-use-after-free-in-foxit-soft-0f3310c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3779%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d854120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3777-cwe-416-use-after-free-in-foxit-soft-29267dd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3777%3A%20CWE-416%20Use%20after%20free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d85411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4947-cwe-284-improper-access-control-in-f-dce1d63f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4947%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5249-cross-site-scripting-in-gougucms-9a138dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5249%3A%20Cross%20Site%20Scripting%20in%20gougucms&amp;severity=medium&amp;id=69cc7a90e6bfc5ba1d854169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3831-cwe-862-missing-authorization-in-crm-eaf2a059</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3831%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=69cc7a8ee6bfc5ba1d854126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4374-cwe-611-improper-restriction-of-xml--8bd180bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4374%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=69cc7a8ee6bfc5ba1d85412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2394-cwe-126-buffer-over-read-in-rti-conn-3e28938c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2394%3A%20CWE-126%20Buffer%20Over-read%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5248-dynamically-determined-object-attrib-f8b4af24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5248%3A%20Dynamically-Determined%20Object%20Attributes%20in%20gougucms&amp;severity=medium&amp;id=69cc7001e6bfc5ba1d749758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13855-cwe-89-improper-neutralization-of-s-df457862</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13855%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Storage%20Protect%20Server&amp;severity=high&amp;id=69cc7001e6bfc5ba1d749752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34873-na-4c47360d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34873%3A%20n%2Fa&amp;severity=critical&amp;id=69cec35ce6bfc5ba1dfb4d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-04-01-7d540e8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-04-01&amp;severity=medium&amp;id=69cdb368e6bfc5ba1d0f530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66442-na-f8572be5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66442%3A%20n%2Fa&amp;severity=medium&amp;id=69cd77b1e6bfc5ba1df19f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30291-na-ebb091ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30291%3A%20n%2Fa&amp;severity=high&amp;id=69cd74cfe6bfc5ba1df01063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29598-na-2d280f25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29598%3A%20n%2Fa&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0105e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34872-na-52cdc6bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34872%3A%20n%2Fa&amp;severity=critical&amp;id=69cd74cfe6bfc5ba1df0104d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67807-na-3cdb3a2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67807%3A%20n%2Fa&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43028-na-a438d685</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43028%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40489-na-a97611df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40489%3A%20n%2Fa&amp;severity=critical&amp;id=69cd7224e6bfc5ba1dee83f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34871-na-0e98fe73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34871%3A%20n%2Fa&amp;severity=medium&amp;id=69cd69c0e6bfc5ba1deb9268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31027-na-43cb3480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31027%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30643-na-324a0dae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30643%3A%20n%2Fa&amp;severity=critical&amp;id=69cd6621e6bfc5ba1de9cb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30292-na-9c827e2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30292%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30273-na-53a2c388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30273%3A%20n%2Fa&amp;severity=high&amp;id=69cd6621e6bfc5ba1de9cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34874-na-20e195fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34874%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9caeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25835-na-c7115649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25835%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25833-na-39fc498d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25833%3A%20n%2Fa&amp;severity=high&amp;id=69cd661ee6bfc5ba1de9cae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30573-na-074185c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30573%3A%20n%2Fa&amp;severity=high&amp;id=69cd5f13e6bfc5ba1de6e558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30523-na-e91f0ac3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30523%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34875-na-87e74112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34875%3A%20n%2Fa&amp;severity=critical&amp;id=69cd5f13e6bfc5ba1de6e541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25834-na-b6e432ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25834%3A%20n%2Fa&amp;severity=medium&amp;id=69cd5f13e6bfc5ba1de6e539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30526-na-bfd1e890</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30526%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67806-na-fbbc0c48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67806%3A%20n%2Fa&amp;severity=low&amp;id=69cd3867e6bfc5ba1ddc2e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67805-na-26c76182</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67805%3A%20n%2Fa&amp;severity=medium&amp;id=69cd3867e6bfc5ba1ddc2e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30522-na-da16853b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30522%3A%20n%2Fa&amp;severity=medium&amp;id=69cd26f5e6bfc5ba1dd45f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30289-na-3270a501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30289%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30287-na-8263b233</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30287%3A%20n%2Fa&amp;severity=high&amp;id=69cd26f5e6bfc5ba1dd45f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5240-cross-site-scripting-in-code-project-c4b471da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5240%3A%20Cross%20Site%20Scripting%20in%20code-projects%20BloodBank%20Managing%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5238-sql-injection-in-itsourcecode-payrol-9ef6c417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5238%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cc5e6ee6bfc5ba1d4effaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4668-cwe-89-improper-neutralization-of-sp-1cc6ecba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4668%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=69cc5aeae6bfc5ba1d4dd37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5237-sql-injection-in-itsourcecode-payrol-8d912d8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5237%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5236-heap-based-buffer-overflow-in-axioma-029b3e7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5236%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2480-cwe-79-improper-neutralization-of-in-6b3f465a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2480%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34556-cwe-125-out-of-bounds-read-in-inter-6e7c0da0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34556%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34555-cwe-121-stack-based-buffer-overflow-c10bc34d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34555%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34554-cwe-125-out-of-bounds-read-in-inter-aafb7891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34554%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7413e6bfc5ba1def511a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34553-cwe-562-return-of-stack-variable-ad-2c16da57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34553%3A%20CWE-562%3A%20Return%20of%20Stack%20Variable%20Address%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34552-cwe-476-null-pointer-dereference-in-4bc7aebe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34552%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df0106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5235-heap-based-buffer-overflow-in-axioma-070dd75a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5235%3A%20Heap-based%20Buffer%20Overflow%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=69cd11c0e6bfc5ba1dcba0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34551-cwe-476-null-pointer-dereference-in-6e2f2b29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34551%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd1fdee6bfc5ba1dd19c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34550-cwe-681-incorrect-conversion-betwee-7e7c75d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34550%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def5052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34549-cwe-758-reliance-on-undefined-unspe-a6e68408</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34549%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34548-cwe-681-incorrect-conversion-betwee-65343c71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34548%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd74cfe6bfc5ba1df01069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34547-cwe-758-reliance-on-undefined-unspe-51bc6a5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34547%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd26f8e6bfc5ba1dd46493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34546-cwe-369-divide-by-zero-in-internati-ab0b32a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34546%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cd7410e6bfc5ba1def504d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34542-cwe-121-stack-based-buffer-overflow-3dc3f0d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34541-cwe-476-null-pointer-dereference-in-97376314</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34541%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34540-cwe-122-heap-based-buffer-overflow--6ae50b02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34540%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34539-cwe-122-heap-based-buffer-overflow--a5ea5a6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34539%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34537-cwe-758-reliance-on-undefined-unspe-8300a004</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34537%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34536-cwe-674-uncontrolled-recursion-in-i-aa01237b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34536%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34535-cwe-122-heap-based-buffer-overflow--68816653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34535%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34534-cwe-122-heap-based-buffer-overflow--984e044e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34534%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34533-cwe-758-reliance-on-undefined-unspe-384b4f8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34533%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69cc45d1e6bfc5ba1d47e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34605-cwe-79-improper-neutralization-of-i-fae01986</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34605%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34585-cwe-79-improper-neutralization-of-i-e55ddbb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34585%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34449-cwe-942-permissive-cross-domain-pol-0cb7b35e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34449%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34448-cwe-79-improper-neutralization-of-i-36bc82a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34448%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69cc424fe6bfc5ba1d44f4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34453-cwe-863-incorrect-authorization-in--a00bf5be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34453%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69cc424fe6bfc5ba1d44f4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34451-cwe-22-improper-limitation-of-a-pat-34e7a1b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34451%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20anthropic-sdk-typescript&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34450-cwe-276-incorrect-default-permissio-e2dd2ab0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34450%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34452-cwe-59-improper-link-resolution-bef-645fcbd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34452%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20anthropics%20anthropic-sdk-python&amp;severity=medium&amp;id=69cc424fe6bfc5ba1d44f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34442-cwe-20-improper-input-validation-in-98638d4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34442%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34443-cwe-918-server-side-request-forgery-82314a2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34443%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34441-cwe-444-inconsistent-interpretation-822278a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34441%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34405-cwe-79-improper-neutralization-of-i-b15ea7cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34404-cwe-400-uncontrolled-resource-consu-46d515e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34404%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nuxt-modules%20og-image&amp;severity=medium&amp;id=69cc3ec9e6bfc5ba1d43daa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5215-improper-access-controls-in-d-link-d-79f88c69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5215%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5214-stack-based-buffer-overflow-in-d-lin-fc01fc98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc3b45e6bfc5ba1d430ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34401-cwe-611-improper-restriction-of-xml-a60b8584</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34401%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20microsoft%20XmlNotepad&amp;severity=medium&amp;id=69cc3b45e6bfc5ba1d430c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34740-cwe-918-server-side-request-forgery-237de682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34740%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c3e6bfc5ba1d418a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34739-cwe-79-improper-neutralization-of-i-3c670ea4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34739%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34738-cwe-285-improper-authorization-in-w-0862147d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34738%3A%20CWE-285%3A%20Improper%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34737-cwe-862-missing-authorization-in-ww-4c620e5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34737%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34733-cwe-284-improper-access-control-in--135c5460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34733%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34732-cwe-306-missing-authentication-for--f0ad5c69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34732%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d418a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34731-cwe-306-missing-authentication-for--e79ff8e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34731%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc37c1e6bfc5ba1d418a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34716-cwe-79-improper-neutralization-of-i-9ebc5823</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34613-cwe-352-cross-site-request-forgery--11c5e554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34613%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34611-cwe-352-cross-site-request-forgery--4e180877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34611%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34396-cwe-79-improper-neutralization-of-i-d8a298c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34396%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc37c1e6bfc5ba1d4189f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34394-cwe-352-cross-site-request-forgery--35460bbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34394%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69cc343ee6bfc5ba1d4033d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34395-cwe-862-missing-authorization-in-ww-1d4fc49d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34395%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34586-cwe-863-incorrect-authorization-in--54e3e32d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34586%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mrmn2%20PdfDing&amp;severity=medium&amp;id=69cc343ee6bfc5ba1d4033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1579-cwe-306-in-px4-autopilot-77f763f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1579%3A%20CWE-306%20in%20PX4%20Autopilot&amp;severity=critical&amp;id=69cc2d39e6bfc5ba1d3ba360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3470-cwe-20-improper-input-validation-in--65b0c784</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3470%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3469-cwe-20-improper-input-validation-in--eaa3f9df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3469%3A%20CWE-20%20Improper%20input%20validation%20in%20SonicWall%20Email%20Security&amp;severity=low&amp;id=69cc2d39e6bfc5ba1d3ba369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3468-cwe-79-improper-neutralization-of-in-b52440e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=69cc2d39e6bfc5ba1d3ba366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5213-stack-based-buffer-overflow-in-d-lin-5302c1ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5212-stack-based-buffer-overflow-in-d-lin-c2d1e0da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2d39e6bfc5ba1d3ba36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34784-cwe-285-improper-authorization-in-p-66d533fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34784%3A%20CWE-285%3A%20Improper%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34215-cwe-200-exposure-of-sensitive-infor-5ac81827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34215%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36672c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34206-cwe-79-improper-neutralization-of-i-ce9b1789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34206%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20libops%20captcha-protect&amp;severity=medium&amp;id=69cc2635e6bfc5ba1d366727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5211-stack-based-buffer-overflow-in-d-lin-71b7c6f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69cc2635e6bfc5ba1d36673a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3356-cwe-306-missing-authentication-for-c-80869dad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3356%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Anritsu%20Remote%20Spectrum%20Monitor%20MS27100A&amp;severity=critical&amp;id=69cc1babe6bfc5ba1d32cc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5210-file-inclusion-in-sourcecodester-lea-7ae37a06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5210%3A%20File%20Inclusion%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5209-cross-site-scripting-in-sourcecodest-a847cd41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5209%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Leave%20Application%20System&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62184-cwe-79-improper-neutralization-of-i-9654bd5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62184%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69cc1babe6bfc5ba1d32cc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5206-sql-injection-in-code-projects-simpl-4acdb68f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5206%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69cc0a0fe6bfc5ba1d2cf77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2123-cwe-280-improper-handling-of-insuffi-ea54619e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2123%3A%20CWE-280%20Improper%20handling%20of%20insufficient%20permissions%20or%20privileges%20in%20OpenText%20Operations%20Agent&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5190-cwe-787-out-of-bounds-write-in-aws-a-7d1c9bb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5190%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AWS%20aws-c-event-stream&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32725-cwe-23-relative-path-traversal-in-s-31b04076</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32725%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32726-cwe-863-incorrect-authorization-in--de3b423f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32726%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20scitokens%20scitokens-cpp&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34361-cwe-552-files-or-directories-access-66cb8838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34361%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=critical&amp;id=69cbff80e6bfc5ba1d29f7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34360-cwe-918-server-side-request-forgery-5862110a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34360%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=medium&amp;id=69cbff80e6bfc5ba1d29f7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34359-cwe-346-origin-validation-error-in--7ddd6ff0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34359%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69cbff80e6bfc5ba1d29f7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-campaign-delivers-vbscript-and-ms-ae2a5fd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20malware%20campaign%20delivers%20VBScript%20and%20MSI%20backdoors&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-of-axios-npm-package-c65fd242</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply-Chain%20Compromise%20of%20axios%20npm%20Package&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5205-server-side-request-forgery-in-chatw-40f6084d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5205%3A%20Server-Side%20Request%20Forgery%20in%20chatwoot&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d2801af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24165-cwe-502-deserialization-of-untruste-abf108db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24165%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24164-cwe-502-deserialization-of-untruste-8f050d1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24164%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20BioNeMo%20Framework&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24154-cwe-78-improper-neutralization-of-s-e4e69e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24154%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=high&amp;id=69cbf879e6bfc5ba1d2801a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24153-cwe-501-trust-boundary-violation-in-e7a82e21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24153%3A%20CWE-501%20Trust%20Boundary%20Violation%20in%20NVIDIA%20Jetson%20Xavier%20Series%2C%20Jetson%20Orin%20Series%20and%20Jetson%20Thor&amp;severity=medium&amp;id=69cbf879e6bfc5ba1d28019b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24148-cwe-1188-initialization-of-a-resour-b1f9912a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24148%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20NVIDIA%20Jetson%20Xavier%20Series%20and%20Jetson%20Orin%20Series&amp;severity=high&amp;id=69cbf879e6bfc5ba1d280196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-widespread-eviltokens-kit-device-code-phishing-38053c6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20widespread%20EvilTokens%20kit%3A%20device%20code%20phishing%20as-a-service&amp;severity=medium&amp;id=69cc1498e6bfc5ba1d3022bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-footprints-tracking-ghostsocks-malware-88b2ff6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Footprints%3A%20Tracking%20GhostSocks%20Malware&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crysome-rat-an-advanced-persistent-net-remote-acce-50137084</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrySome%20RAT%20%3A%20An%20Advanced%20Persistent%20.NET%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-click-away-inside-a-linkedin-phishing-attack-fb385e9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20Click%20Away%3A%20Inside%20a%20LinkedIn%20Phishing%20Attack&amp;severity=medium&amp;id=69cc181be6bfc5ba1d31dd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5087-cwe-338-use-of-cryptographically-wea-f1ae242d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5087%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20JJNAPIORK%20PAGI%3A%3AMiddleware%3A%3ASession%3A%3AStore%3A%3ACookie&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34243-cwe-77-improper-neutralization-of-s-be7fa18e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34243%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20njzjz%20wenxian&amp;severity=critical&amp;id=69cbf4f5e6bfc5ba1d2745cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34219-cwe-190-integer-overflow-or-wraparo-4cd76bc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34219%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5204-stack-based-buffer-overflow-in-tenda-1d07a571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5204%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5203-path-traversal-in-cms-made-simple-8956ef9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5203%3A%20Path%20Traversal%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d24810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34240-cwe-347-improper-verification-of-cr-4aef725b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34240%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20appsup-dart%20jose&amp;severity=high&amp;id=69cbedf2e6bfc5ba1d248106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34237-cwe-942-permissive-cross-domain-pol-df6035ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34237%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20modelcontextprotocol%20java-sdk&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d248101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34235-cwe-125-out-of-bounds-read-in-pjsip-64e6e86d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-next-cybersecurity-crisis-isnt-breachesits-dat-617ce088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Next%20Cybersecurity%20Crisis%20Isn%E2%80%99t%20Breaches%E2%80%94It%E2%80%99s%20Data%20You%20Can%E2%80%99t%20Trust&amp;severity=medium&amp;id=69cbea6ae6bfc5ba1d226c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34231-cwe-79-improper-neutralization-of-i-a3811ee5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34231%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mixxorz%20slippers&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22561-vulnerability-in-anthropic-claude-d-f8757e77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22561%3A%20Vulnerability%20in%20Anthropic%20Claude%20Desktop%20-%20Windows&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34227-cwe-306-missing-authentication-for--8ac78b6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34227%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69cbedf2e6bfc5ba1d2480f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34218-cwe-269-improper-privilege-manageme-5469040d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34218%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20craigjbass%20clearancekit&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34595-cwe-843-access-of-resource-using-in-a99e068c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34595%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34574-cwe-697-incorrect-comparison-in-par-52fbaa27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34574%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34573-cwe-407-inefficient-algorithmic-com-0c0c9664</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34573%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbe700e6bfc5ba1d219519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-logins-are-fueling-everything-from-ransomwa-1ac187c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20Logins%20Are%20Fueling%20Everything%20From%20Ransomware%20to%20Nation-State%20Cyberattacks&amp;severity=medium&amp;id=69cbe361e6bfc5ba1d2085e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4819-cwe-532-in-floragunn-search-guard-fl-c836b24f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4819%3A%20CWE-532%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22569-cwe-1289-improper-validation-of-uns-79b5145f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22569%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d219511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4818-cwe-285-in-floragunn-search-guard-fl-352b80c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4818%3A%20CWE-285%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbe700e6bfc5ba1d21952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venom-stealer-raises-stakes-with-continuous-creden-8197636e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venom%20Stealer%20Raises%20Stakes%20With%20Continuous%20Credential%20Harvesting&amp;severity=medium&amp;id=69cbdfdde6bfc5ba1d1e5b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34532-cwe-863-incorrect-authorization-in--d438f9ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34532%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4799-cwe-601-url-redirection-to-untrusted-e7eb6ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4799%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34373-cwe-346-origin-validation-error-in--b9034bc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34373%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69cbdff9e6bfc5ba1d1e69c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34363-cwe-362-concurrent-execution-using--0173ea9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34363%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0596-cwe-78-improper-neutralization-of-sp-7a9aeb7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0596%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34224-cwe-367-time-of-check-time-of-use-t-04fec12b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34224%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69cbdff9e6bfc5ba1d1e69bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34214-cwe-212-improper-removal-of-sensiti-fe343f70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34214%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20trinodb%20trino&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34209-cwe-294-authentication-bypass-by-ca-ae7e0cd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34209%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20wevm%20mppx&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34210-cwe-697-incorrect-comparison-in-wev-005026cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34210%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20wevm%20mppx&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34377-cwe-347-improper-verification-of-cr-961af0bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34377%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ZcashFoundation%20zebra&amp;severity=high&amp;id=69cbd8dce6bfc5ba1d1c31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34202-cwe-1336-improper-neutralization-of-80a87c57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34202%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20ZcashFoundation%20zebra&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-moves-from-oss-to-aws-environments-ec10ca3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Moves%20From%20OSS%20to%20AWS%20Environments&amp;severity=medium&amp;id=69cbd551e6bfc5ba1d1b0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20915-cwe-79-improper-neutralization-of-i-9c8aeba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20915%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c30fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34172-cwe-1336-improper-neutralization-of-1aeae384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34172%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Giskard-AI%20giskard-oss&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33276-cwe-79-improper-neutralization-of-i-3ffa7566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33276%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c310c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34162-cwe-306-missing-authentication-for--6cb44fc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34162%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c310f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34163-cwe-918-server-side-request-forgery-df36ec79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34163%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crewai-vulnerabilities-expose-devices-to-hacking-845e6a48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrewAI%20Vulnerabilities%20Expose%20Devices%20to%20Hacking&amp;severity=medium&amp;id=69cbce49e6bfc5ba1d18329f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-ransomware-is-now-after-your-data-and-how-to-p-6fc7d779</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20ransomware%20is%20now%20after%20your%20data%20%E2%80%94%20and%20how%20to%20protect%20your%20home%20storage%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69cbce5ee6bfc5ba1d1838db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-truechaos-0-day-exploitation-against-sou-08e18aae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20TrueChaos%3A%200-Day%20Exploitation%20Against%20Southeast%20Asian%20Government%20Targets&amp;severity=medium&amp;id=69cc30c3e6bfc5ba1d3e44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3308-cwe-190-integer-overflow-or-wraparou-b1a7029f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20MuPDF&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27854-use-after-free-in-powerdns-dnsdist-e6e09fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27854%3A%20Use%20After%20Free%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27853-out-of-bounds-write-in-powerdns-dns-ccd834c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27853%3A%20Out-of-bounds%20Write%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24030-uncontrolled-memory-allocation-in-p-60254c6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24030%3A%20Uncontrolled%20Memory%20Allocation%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24029-incorrect-authorization-in-powerdns-a9ec0de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24029%3A%20Incorrect%20Authorization%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24028-buffer-over-read-in-powerdns-dnsdis-62e4a5a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24028%3A%20Buffer%20Over-read%20in%20PowerDNS%20DNSdist&amp;severity=medium&amp;id=69cbbcb5e6bfc5ba1d1244ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/axios-npm-distribution-compromised-in-supply-chain-c5ee45b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Axios%20NPM%20Distribution%20Compromised%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69cd1c4ee6bfc5ba1dcfe7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0397-overly-permissive-cross-domain-white-800b174d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0397%3A%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-slashes-quantum-resource-requirements-for-b-41cc00eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Slashes%20Quantum%20Resource%20Requirements%20for%20Breaking%20Cryptocurrency%20Encryption&amp;severity=medium&amp;id=69cbb5afe6bfc5ba1d0f3172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0396-improper-neutralization-of-script-re-f60b6be7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0396%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=69cbb931e6bfc5ba1d10da44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-fortinet-forticlient-ems--a7f71706</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Fortinet%20FortiClient%20EMS%20Flaw%20Begins&amp;severity=critical&amp;id=69cbb5afe6bfc5ba1d0f3176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14213-cwe-78-improper-neutralization-of-s-115c4b1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14213%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cato%20Networks%20Socket&amp;severity=high&amp;id=69cbb930e6bfc5ba1d10da40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14031-cwe-1395-dependency-on-vulnerable-t-b96af189</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14031%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3AEncoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14030-cwe-1395-dependency-on-vulnerable-t-a55e9ce0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14030%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20YVES%20Sereal%3A%3ADecoder&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4267-cwe-79-improper-neutralization-of-in-3a3951a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnbillion%20Query%20Monitor%20%E2%80%93%20The%20developer%20tools%20panel%20for%20WordPress&amp;severity=high&amp;id=69cbb22ae6bfc5ba1d0de963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3191-cwe-352-cross-site-request-forgery-c-188285cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3191%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teckel%20Minify%20HTML&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3139-cwe-639-authorization-bypass-through-8b75f73d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3139%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=69cbb22ae6bfc5ba1d0de95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34509-88c32a04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34509&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34508-6ec16998</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34508&amp;severity=null&amp;id=69cd26f5e6bfc5ba1dd45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5198-sql-injection-in-code-projects-stude-8e459cec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5198%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cbaea5e6bfc5ba1d0cfdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strongswan-flaw-allows-unauthenticated-attackers-t-6c936cd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StrongSwan%20Flaw%20Allows%20Unauthenticated%20Attackers%20to%20Crash%20VPNs&amp;severity=low&amp;id=69cba095e6bfc5ba1d069829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34887-cwe-79-improper-neutralization-of-i-959708a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=69cba419e6bfc5ba1d08ffa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4400-cwe-639-authorization-bypass-through-c221da90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4400%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4399-cwe-1427-improper-neutralization-of--6d726c1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4399%3A%20CWE-1427%20Improper%20neutralization%20of%20input%20used%20for%20LLM%20prompting%20in%201millionbot%20Millie%20chat&amp;severity=high&amp;id=69cba419e6bfc5ba1d08ffa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lloyds-data-security-incident-impacts-450000-indiv-bf5b7289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lloyds%20Data%20Security%20Incident%20Impacts%20450%2C000%20Individuals&amp;severity=medium&amp;id=69cb9d11e6bfc5ba1d05291b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15618-cwe-338-use-of-cryptographically-we-19be4bf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15618%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20MOCK%20Business%3A%3AOnlinePayment%3A%3AStoredTransaction&amp;severity=critical&amp;id=69cba419e6bfc5ba1d08ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5197-sql-injection-in-code-projects-stude-35da754e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5197%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb9d1de6bfc5ba1d052b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4317-cwe-89-improper-neutralization-of-sp-e769b7b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4317%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Umami%20Software%20application%20Umami%20Software&amp;severity=critical&amp;id=69cb9d1de6bfc5ba1d052b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5196-sql-injection-in-code-projects-stude-b73c09b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5196%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10559-cwe-22-improper-limitation-of-a-pat-a46b0034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10559%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10553-cwe-79-improper-neutralization-of-i-0ca743a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10553%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Factory%20Resource%20Manager&amp;severity=high&amp;id=69cbd1cfe6bfc5ba1d19baf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10551-cwe-79-improper-neutralization-of-i-5b79fb83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5201-heap-based-buffer-overflow-in-red-ha-598a08d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5201%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69cb8b7de6bfc5ba1df48225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5195-sql-injection-in-code-projects-stude-bc053e71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5195%3A%20SQL%20Injection%20in%20code-projects%20Student%20Membership%20System&amp;severity=medium&amp;id=69cb8475e6bfc5ba1df0b3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-control-bypass-for-data-exfiltration-t-88c48161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Control%20Bypass%20for%20Data%20Exfiltration%2C%20(Tue%2C%20Mar%2031st)&amp;severity=medium&amp;id=69cb79e9e6bfc5ba1deaad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5186-double-free-in-nothings-stb-9e4c2f49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5186%3A%20Double%20Free%20in%20Nothings%20stb&amp;severity=medium&amp;id=69cbedf4e6bfc5ba1d248139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dualscript-multi-stage-powershell-malwar-63268769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DualScript%3A%20Multi-Stage%20PowerShell%20Malware%20Targets%20Crypto&amp;severity=medium&amp;id=69cc1b98e6bfc5ba1d32c553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5185-heap-based-buffer-overflow-in-nothin-14d54f9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5185%3A%20Heap-based%20Buffer%20Overflow%20in%20Nothings%20stb_image&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5184-command-injection-in-trendnet-tew-71-9fc19bda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5184%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb6f5ce6bfc5ba1de4b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-openai-codex-allowed-git-19b187ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20OpenAI%20Codex%20Allowed%20GitHub%20Token%20Compromise&amp;severity=critical&amp;id=69cb6bd9e6bfc5ba1de2b835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3881-cwe-918-server-side-request-forgery--b7cb0fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Performance%20Monitor&amp;severity=medium&amp;id=69cb6857e6bfc5ba1de0b6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5183-command-injection-in-trendnet-tew-71-6f0fe0f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5183%3A%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5182-sql-injection-in-sourcecodester-teac-5602a1a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5182%3A%20SQL%20Injection%20in%20SourceCodester%20Teacher%20Record%20System&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34881-cwe-918-server-side-request-forgery-4eec20a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34881%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenStack%20Glance&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1877-cwe-79-improper-neutralization-of-in-a66dc075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnh10%20Auto%20Post%20Scheduler&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1834-cwe-80-improper-neutralization-of-sc-8611fff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1834%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=69cb614de6bfc5ba1ddc7ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5181-unrestricted-upload-in-sourcecodeste-d1cc0456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5181%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9ced5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4146-cwe-79-improper-neutralization-of-in-f54775f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timwhitlock%20Loco%20Translate&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1710-cwe-285-improper-authorization-in-wo-825159fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1710%3A%20CWE-285%20Improper%20Authorization%20in%20woocommerce%20WooPayments%3A%20Integrated%20WooCommerce%20Payments&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1797-cwe-862-missing-authorization-in-the-54e9e4f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1797%3A%20CWE-862%20Missing%20Authorization%20in%20themetechmount%20Truebooker%20%E2%80%93%20Appointment%20Booking%20and%20Scheduler%20System&amp;severity=medium&amp;id=69cb5a45e6bfc5ba1dd9cecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5180-sql-injection-in-sourcecodester-simp-c8e12654</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5180%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5179-sql-injection-in-sourcecodester-simp-4bb61a7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5179%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=69cb4fb9e6bfc5ba1dc69fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5178-command-injection-in-totolink-a3300r-d158d31b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5178%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb41a9e6bfc5ba1dadee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34073-cwe-295-improper-certificate-valida-10885c91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34073%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20pyca%20cryptography&amp;severity=low&amp;id=69cbd8dce6bfc5ba1d1c31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34070-cwe-22-improper-limitation-of-a-pat-ac8541ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34070%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5177-command-injection-in-totolink-a3300r-dabb0ca9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5177%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cbd1cfe6bfc5ba1d19baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34060-cwe-94-improper-control-of-generati-bee34109</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34060%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shopify%20ruby-lsp&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34054-cwe-427-uncontrolled-search-path-el-04e663ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34054%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20microsoft%20vcpkg&amp;severity=high&amp;id=69cbedf4e6bfc5ba1d248134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34043-cwe-400-uncontrolled-resource-consu-3f949807</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34043%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yahoo%20serialize-javascript&amp;severity=medium&amp;id=69cbd8dce6bfc5ba1d1c31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34042-cwe-862-missing-authorization-in-ne-c419b6c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20nektos%20act&amp;severity=high&amp;id=69cc1babe6bfc5ba1d32cc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34041-cwe-74-improper-neutralization-of-s-7d4e514b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34041%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nektos%20act&amp;severity=high&amp;id=69cc1e09e6bfc5ba1d33b7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3300-cwe-94-improper-control-of-generatio-6c6e7217</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3300%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=critical&amp;id=69cb25a7e6bfc5ba1d9a95b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4020-cwe-200-exposure-of-sensitive-inform-b98091d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4020%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20RocketGenius%20Gravity%20SMTP&amp;severity=high&amp;id=69cb25a7e6bfc5ba1d9a95b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5176-command-injection-in-totolink-a3300r-0198ea25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5176%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69cb25a7e6bfc5ba1d9a95c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5115-cwe-319-cleartext-transmission-of-se-7a72caea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5115%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20PaperCut%20Papercut%20NG%2FMF&amp;severity=low&amp;id=69cb1e83e6bfc5ba1d972340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-004-databrick-d60c6a86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20004%20-%20Databricks%20Investigating%20Alleged%20Compromise%2C%20TeamPCP%20Runs%20Dual%20Ransomware%20Operations%2C%20and%20AstraZeneca%20Data%20Released%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69ca91e1e6bfc5ba1d4195f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32734-cwe-79-improper-neutralization-of-i-5b4bf0b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30879-cwe-79-improper-neutralization-of-i-315a156d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30879%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30940-cwe-22-improper-limitation-of-a-pat-4cf3d0c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30940%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30878-cwe-285-improper-authorization-in-b-0d863f22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30878%3A%20CWE-285%3A%20Improper%20Authorization%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30877-cwe-78-improper-neutralization-of-s-36a348b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30877%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30880-cwe-78-improper-neutralization-of-s-5ac38c48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30880%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27697-cwe-89-improper-neutralization-of-s-4a7e4478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27697%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=69cb1e82e6bfc5ba1d9722ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21861-cwe-78-improper-neutralization-of-s-7b86deef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20baserproject%20basercms&amp;severity=critical&amp;id=69cb1e82e6bfc5ba1d9722a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32957-cwe-434-unrestricted-upload-of-file-07ed5ff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32957%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20baserproject%20basercms&amp;severity=high&amp;id=69cb1e82e6bfc5ba1d9722a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4794-cwe-79-improper-neutralization-of-in-b1682948</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4794%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=low&amp;id=69cb1e82e6bfc5ba1d9722d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-31-b94f0480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-31&amp;severity=medium&amp;id=69cc61e8e6bfc5ba1d50ebb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30290-na-d795f9fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30290%3A%20n%2Fa&amp;severity=high&amp;id=69cc2635e6bfc5ba1d366722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30285-na-6a2d5cfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30285%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1f3ce6bfc5ba1d342c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30280-na-e7f28f90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30280%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1f3ce6bfc5ba1d342c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30520-na-d7a777db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30520%3A%20n%2Fa&amp;severity=medium&amp;id=69cc1e09e6bfc5ba1d33b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30286-na-fbc0b73a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30286%3A%20n%2Fa&amp;severity=critical&amp;id=69cc1e09e6bfc5ba1d33b7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30521-na-03f608fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30521%3A%20n%2Fa&amp;severity=medium&amp;id=69cc149be6bfc5ba1d3026cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30283-na-ed1a86e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30283%3A%20n%2Fa&amp;severity=critical&amp;id=69cc0a0fe6bfc5ba1d2cf778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30279-na-8a3ec826</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30279%3A%20n%2Fa&amp;severity=high&amp;id=69cc0a0fe6bfc5ba1d2cf772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30282-na-2cce3cba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30282%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30278-na-bacab0cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30278%3A%20n%2Fa&amp;severity=critical&amp;id=69cc068ae6bfc5ba1d2beeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30277-na-d58dc8e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30277%3A%20n%2Fa&amp;severity=high&amp;id=69cc068ae6bfc5ba1d2beed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30284-na-5be1bb53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30284%3A%20n%2Fa&amp;severity=high&amp;id=69cbf4f5e6bfc5ba1d2745c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30281-na-48ac7389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30281%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30276-na-932d5438</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30276%3A%20n%2Fa&amp;severity=critical&amp;id=69cbedf2e6bfc5ba1d2480ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30314-na-bc561faf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30314%3A%20n%2Fa&amp;severity=critical&amp;id=69cbdff9e6bfc5ba1d1e69b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29870-na-e9224b82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29870%3A%20n%2Fa&amp;severity=high&amp;id=69cbdff9e6bfc5ba1d1e69b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30312-na-6798d69d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30312%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30311-na-afb7abcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30311%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd8dae6bfc5ba1d1c3104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30309-na-5d9d5ab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30309%3A%20n%2Fa&amp;severity=high&amp;id=69cbd8dae6bfc5ba1d1c3100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30310-na-ded13cc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30310%3A%20n%2Fa&amp;severity=critical&amp;id=69cbd1cfe6bfc5ba1d19bae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-31-e1bb4eef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-31&amp;severity=low&amp;id=69cb3714e6bfc5ba1da38cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5157-cross-site-scripting-in-code-project-fa8372fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5157%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69cb096be6bfc5ba1d7e1fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5156-stack-based-buffer-overflow-in-tenda-95d1a648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5156%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cb096be6bfc5ba1d7e1fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5155-stack-based-buffer-overflow-in-tenda-42fe2620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5155%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5154-stack-based-buffer-overflow-in-tenda-0a4a9773</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5154%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cafedde6bfc5ba1d798139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5130-cwe-565-reliance-on-cookies-without--7fe086b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5130%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jhimross%20Debugger%20%26%20Troubleshooter&amp;severity=high&amp;id=69cafb5ae6bfc5ba1d780867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32794-cwe-295-improper-certificate-valida-33e2597e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Provider%20for%20Databricks&amp;severity=medium&amp;id=69caf451e6bfc5ba1d7409b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5153-command-injection-in-tenda-ch22-ee0fb20b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5153%3A%20Command%20Injection%20in%20Tenda%20CH22&amp;severity=medium&amp;id=69caf0cde6bfc5ba1d729540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4257-cwe-94-improper-control-of-generatio-c9e2f160</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4257%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20supsysticcom%20Contact%20Form%20by%20Supsystic&amp;severity=critical&amp;id=69caf0cde6bfc5ba1d72953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32877-cwe-125-out-of-bounds-read-in-rando-f9a11963</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32877%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20randombit%20botan&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32883-cwe-347-improper-verification-of-cr-1af6174a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32883%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32884-cwe-295-improper-certificate-valida-f12891c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32884%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20randombit%20botan&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5152-stack-based-buffer-overflow-in-tenda-50cbb48f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5152%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=69cae2bce6bfc5ba1d6c3e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34558-cwe-79-improper-neutralization-of-i-198231a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34557-cwe-79-improper-neutralization-of-i-f3fef655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34557%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27599-cwe-79-improper-neutralization-of-i-cb40a560</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27599%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=69cae2bce6bfc5ba1d6c3e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5150-sql-injection-in-code-projects-accou-ec58ae08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5150%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5148-sql-injection-in-yunaiv-yudao-cloud-5dc94026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5148%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69cad830e6bfc5ba1d66dc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33026-cwe-312-cleartext-storage-of-sensit-de36c61f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33026%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d65117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21710-vulnerability-in-nodejs-node-028748b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21710%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=69cacda7e6bfc5ba1d6188a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21716-vulnerability-in-nodejs-node-e1c41615</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21716%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21711-vulnerability-in-nodejs-node-ddaccfa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21711%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21715-vulnerability-in-nodejs-node-14042404</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21715%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=69cacda7e6bfc5ba1d6188ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21717-vulnerability-in-nodejs-node-70bc0aac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21717%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21713-vulnerability-in-nodejs-node-4458c2af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21713%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21714-vulnerability-in-nodejs-node-a0eb338f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21714%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69cacda7e6bfc5ba1d6188ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dshield-cowrie-honeypot-stats-and-when-sessions-di-88050524</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DShield%20(Cowrie)%20Honeypot%20Stats%20and%20When%20Sessions%20Disconnect%2C%20(Mon%2C%20Mar%2030th)&amp;severity=medium&amp;id=69c9bef1e6bfc5ba1d521ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5147-sql-injection-in-yunaiv-yudao-cloud-16d2d339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5147%3A%20SQL%20Injection%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=69caca21e6bfc5ba1d5f423b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3991-cwe-829-inclusion-of-functionality-f-131dca0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3991%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20Broadcom%20Data%20Loss%20Prevention&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcps-telnyx-attack-marks-a-shift-in-tactics-be-49f2484d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%E2%80%99s%20Telnyx%20Attack%20Marks%20a%20Shift%20in%20Tactics%20Beyond%20LiteLLM&amp;severity=medium&amp;id=69caed48e6bfc5ba1d70eba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3502-cwe-494-download-of-code-without-int-45ea491d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3502%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check.%20in%20TrueConf%20TrueConf%20Client&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5126-server-side-request-forgery-in-sourc-39062150</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5126%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20RSS%20Feed%20Parser&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33027-cwe-22-improper-limitation-of-a-pat-c07fecd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33027%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33028-cwe-362-concurrent-execution-using--15669eaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33028%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33029-cwe-20-improper-input-validation-in-e829da5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33029%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%200xJacky%20nginx-ui&amp;severity=medium&amp;id=69cabc11e6bfc5ba1d596dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33030-cwe-78-improper-neutralization-of-s-ce389835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33030%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200xJacky%20nginx-ui&amp;severity=high&amp;id=69cabc11e6bfc5ba1d596dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33032-cwe-306-missing-authentication-for--2512a116</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33032%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69cabc11e6bfc5ba1d596e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4046-cwe-617-reachable-assertion-in-the-g-18e966bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4046%3A%20CWE-617%20Reachable%20assertion%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5125-os-command-injection-in-raine-consul-50411acc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5125%3A%20OS%20Command%20Injection%20in%20raine%20consult-llm-mcp&amp;severity=medium&amp;id=69cacae6e6bfc5ba1d5fd380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27508-cwe-79-improper-neutralization-of-i-f32f18c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27508%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26352-cwe-79-improper-neutralization-of-i-77ac9a7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26352%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Smoothwall%20Express&amp;severity=medium&amp;id=69caae00e6bfc5ba1d516fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5124-improper-access-controls-in-osrg-gob-b46befd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5124%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5170-cwe-617-reachable-assertion-in-mongo-3f604185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5170%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20MongoDB%20Server&amp;severity=medium&amp;id=69ca9c71e6bfc5ba1d472626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5123-off-by-one-in-osrg-gobgp-3ed023a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5123%3A%20Off-by-One%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21712-vulnerability-in-nodejs-node-52636af1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21712%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5165-expired-pointer-dereference-in-red-h-b327eb88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5165%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5164-buffer-copy-without-checking-size-of-dd5cb921</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5164%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-it-platform-carecloud-probing-potential-568e92da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20IT%20Platform%20CareCloud%20Probing%20Potential%20Data%20Breach&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5122-improper-access-controls-in-osrg-gob-ec99131e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5122%3A%20Improper%20Access%20Controls%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=69ca8e5fe6bfc5ba1d3ebe50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-drift-how-llms-are-quietly-breaking-organiz-e69f5f70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Drift%3A%20How%20LLMs%20Are%20Quietly%20Breaking%20Organizational%20Access%20Control&amp;severity=medium&amp;id=69ca8756e6bfc5ba1d3aa7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28528-cwe-125-out-of-bounds-read-in-bluek-e98e0a75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28528%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28527-cwe-125-out-of-bounds-read-in-bluek-bcfc2127</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28527%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28526-cwe-125-out-of-bounds-read-in-bluek-5b117bbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28526%3A%20CWE-125%20Out-of-bounds%20Read%20in%20BlueKitchen%20GmbH%20BTstack&amp;severity=low&amp;id=69ca8777e6bfc5ba1d3aaeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-iron-curtain-for-ai-how-to-improve-autonomous-a-a6c72dc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20iron%20curtain%20for%20AI%3A%20how%20to%20improve%20autonomous%20AI%20agent%20security%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ca8053e6bfc5ba1d368b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3321-cwe-639-authorization-bypass-through-c880c1c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3321%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20ON24%20ON24%20Q%26A%20chat&amp;severity=high&amp;id=69ca7cd8e6bfc5ba1d314847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-data-leakage-via-a-hidden-outbound-channel-77d73958</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Data%20Leakage%20via%20a%20Hidden%20Outbound%20Channel%20in%20the%20Code%20Execution%20Runtime&amp;severity=medium&amp;id=69ca7944e6bfc5ba1d2fc939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30th-march-threat-intelligence-report-e05488d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69cae257e6bfc5ba1d6c0684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4315-cwe-352-cross-site-request-forgery-c-3da322ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4266-cwe-502-deserialization-of-untrusted-985082ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4266%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69ca75c0e6bfc5ba1d2d9beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-star-blizzard-adopts-darksword-ios-exp-08457acb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Star%20Blizzard%20Adopts%20DarkSword%20iOS%20Exploit%20Kit&amp;severity=high&amp;id=69ca67b1e6bfc5ba1d24dab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-reports-cyber-intrusion-and-da-712b39a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Reports%20Cyber%20Intrusion%20and%20Data%20Theft&amp;severity=medium&amp;id=69ca60a9e6bfc5ba1d1f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-hospitals-hidden-spyware-iran-conflict-show-960e3022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20Hospitals%2C%20Hidden%20Spyware%3A%20Iran%20Conflict%20Shows%20How%20Digital%20Fight%20Is%20Ingrained%20in%20Warfare&amp;severity=high&amp;id=69ca5d25e6bfc5ba1d1d6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-targeted-in-growing-teampcp-supply-chain-at-3b995e80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Targeted%20in%20Growing%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69ca59a1e6bfc5ba1d18f925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1612-cwe-798-use-of-hard-coded-credential-4f82f25a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1612%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20AL-KO%20Robolinho%20Update%20Software&amp;severity=medium&amp;id=69ca4f15e6bfc5ba1d110ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-fresh-citrix-netscaler-vulnerabili-cb88742d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Fresh%20Citrix%20NetScaler%20Vulnerability%20Begins&amp;severity=critical&amp;id=69ca4489e6bfc5ba1d06497d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5128-cwe-200-exposure-of-sensitive-inform-adf68c3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5128&amp;severity=null&amp;id=69ca480ee6bfc5ba1d09ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-brief-tax-scams-aim-to-steal-funds-from-t-4f3af72b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20brief%3A%20tax%20scams%20aim%20to%20steal%20funds%20from%20taxpayers&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-confirms-kash-patel-email-hack-as-us-offers-10-48617ffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Confirms%20Kash%20Patel%20Email%20Hack%20as%20US%20Offers%20%2410M%20Reward%20for%20Hackers&amp;severity=medium&amp;id=69ca2f74e6bfc5ba1dec291a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4416-cwe-502-deserialization-of-untrusted-7c234af9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4416%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20GIGABYTE%20Performance%20Library&amp;severity=high&amp;id=69ca2f86e6bfc5ba1dec601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5121-vulnerability-in-red-hat-red-hat-ent-8ecef880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5121%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69ca2f86e6bfc5ba1dec601f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25704-cwe-271-privilege-dropping-lowering-9551ffdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25704%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20pop-os%20cosmic-greeter&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4415-cwe-23-relative-path-traversal-in-gi-d148431b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4415%3A%20CWE-23%20Relative%20path%20traversal%20in%20GIGABYTE%20Gigabyte%20Control%20Center&amp;severity=critical&amp;id=69ca2f86e6bfc5ba1dec6017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3716-cwe-204-observable-response-discrepa-19d0288d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3716%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Protect%20(on-prem)&amp;severity=medium&amp;id=69ca2f86e6bfc5ba1dec6011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15379-cwe-77-improper-neutralization-of-s-6f707b63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15379%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69ca2868e6bfc5ba1de5eb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-dos-flaw-upgraded-to-critical-rce-now-ex-7117a302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20DoS%20Flaw%20Upgraded%20to%20Critical%20RCE%2C%20Now%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69ca2161e6bfc5ba1de1970a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2328-cwe-790-improper-filtering-of-specia-345e5887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2328%3A%20CWE-790%20Improper%20Filtering%20of%20Special%20Elements%20in%20WAGO%20Device%20Sphere&amp;severity=high&amp;id=69ca2868e6bfc5ba1de5eb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5119-cleartext-transmission-of-sensitive--a5271c6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5119%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69ca16d5e6bfc5ba1dd8ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5107-improper-access-controls-in-frroutin-1c6243fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5107%3A%20Improper%20Access%20Controls%20in%20FRRouting%20FRR&amp;severity=low&amp;id=69ca0c48e6bfc5ba1dd16be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5106-cross-site-scripting-in-code-project-9b1a6ed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5106%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5105-command-injection-in-totolink-a3300r-3ffece95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5105%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9f3ace6bfc5ba1da3b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5104-command-injection-in-totolink-a3300r-967faa0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5104%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9e219e6bfc5ba1d89ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3124-cwe-639-authorization-bypass-through-6397300c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpchill%20Download%20Monitor&amp;severity=high&amp;id=69c9d408e6bfc5ba1d7f34a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15036-cwe-29-path-traversal-filename-in-m-bf2c3022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15036%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=69c9d408e6bfc5ba1d7f349e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5103-command-injection-in-totolink-a3300r-8a4403a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5103%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9d408e6bfc5ba1d7f34a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7741-cwe-259-use-of-hard-coded-password-i-5fed7c83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7741%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Yokogawa%20Electric%20Corporation%20CENTUM%20VP&amp;severity=low&amp;id=69c9befee6bfc5ba1d524370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5102-command-injection-in-totolink-a3300r-fdb9f73a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5102%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69c9befee6bfc5ba1d524373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-30-728f86ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-30&amp;severity=medium&amp;id=69cb1068e6bfc5ba1d83cbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30306-na-f64a590d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30306%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30313-na-8166a460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30313%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30308-na-5353a88a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30308%3A%20n%2Fa&amp;severity=critical&amp;id=69cae2bce6bfc5ba1d6c3e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30305-na-259404ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30305%3A%20n%2Fa&amp;severity=critical&amp;id=69cad4ace6bfc5ba1d651178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30307-na-4ce41ceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30307%3A%20n%2Fa&amp;severity=critical&amp;id=69cacda7e6bfc5ba1d6188b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29872-na-eca84de0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29872%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29925-na-684bc216</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29925%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29924-na-58efd28c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29924%3A%20n%2Fa&amp;severity=high&amp;id=69cac31de6bfc5ba1d5bec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30077-na-c0138794</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30077%3A%20n%2Fa&amp;severity=high&amp;id=69cab88de6bfc5ba1d56ff26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29954-na-ffb2524c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29954%3A%20n%2Fa&amp;severity=high&amp;id=69caa6f9e6bfc5ba1d4dfd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29909-na-552e3807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29909%3A%20n%2Fa&amp;severity=medium&amp;id=69caa6f9e6bfc5ba1d4dfd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-30-67c01efa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-30&amp;severity=low&amp;id=69caa6f0e6bfc5ba1d4dfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33643-na-14732c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33643%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30556-na-352c7804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30556%3A%20n%2Fa&amp;severity=medium&amp;id=69caa378e6bfc5ba1d4bb8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29953-na-34aa1f9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29953%3A%20n%2Fa&amp;severity=high&amp;id=69caa378e6bfc5ba1d4bb8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34472-na-951eb9f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34472%3A%20n%2Fa&amp;severity=high&amp;id=69ca9c6fe6bfc5ba1d4725b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30562-na-d8e97f9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30562%3A%20n%2Fa&amp;severity=critical&amp;id=69ca9c6fe6bfc5ba1d4725ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30561-na-7eb11893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30561%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30560-na-da409bb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30560%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30559-na-24a2fd68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30559%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30558-na-d1116e3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30558%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d4725a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30557-na-4d52faa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30557%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d47259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29597-na-2ce820bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29597%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9c6fe6bfc5ba1d472599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33373-na-22e2186d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33373%3A%20n%2Fa&amp;severity=high&amp;id=69ca9568e6bfc5ba1d43cfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30566-na-30d77aa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30566%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30565-na-d2474f6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30565%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30564-na-dd3b9500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30564%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30563-na-22b162a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30563%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30082-na-75c73eab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30082%3A%20n%2Fa&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5101-command-injection-in-totolink-a3300r-08bf6741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5101%3A%20Command%20Injection%20in%20Totolink%20A3300R&amp;severity=medium&amp;id=69ca9568e6bfc5ba1d43cfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4176-cwe-1395-dependency-on-vulnerable-th-556b643e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4176%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20SHAY%20perl&amp;severity=critical&amp;id=69c994c1e6bfc5ba1d0997a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4946-cwe-78-improper-neutralization-of-sp-c53cae64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4946%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20NSA%20Ghidra&amp;severity=high&amp;id=69c9832de6bfc5ba1dd34820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0558-cwe-287-improper-authentication-in-p-51fddf90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0558%3A%20CWE-287%20Improper%20Authentication%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc8618d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0560-cwe-918-server-side-request-forgery--5103940b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0562-cwe-863-incorrect-authorization-in-p-77e45474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0562%3A%20CWE-863%20Incorrect%20Authorization%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=69c97a88e6bfc5ba1dc86195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34005-cwe-78-improper-neutralization-of-s-b117df4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Xiongmai%20DVR%2FNVR%20devices&amp;severity=high&amp;id=69c95e2e919ccadcdf40cfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5046-stack-based-buffer-overflow-in-tenda-7d25f76d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c93781919ccadcdf2a290a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5045-stack-based-buffer-overflow-in-tenda-2a8bfe4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=69c92cf6919ccadcdf22c137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5044-stack-based-buffer-overflow-in-belki-0a467880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5044%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c91b64919ccadcdf191739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5043-stack-based-buffer-overflow-in-belki-d08945f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5043%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c90d85919ccadcdf10f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5042-stack-based-buffer-overflow-in-belki-bbfacd19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5042%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c902c8919ccadcdf09eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-threat-landscape-digest-january-february-2026-5b11ad26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Threat%20Landscape%20Digest%20January-February%202026&amp;severity=medium&amp;id=69c9885ae6bfc5ba1ddc37cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5041-command-injection-in-code-projects-c-82c5a99c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5041%3A%20Command%20Injection%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69c8f839919ccadcdf040e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5037-stack-based-buffer-overflow-in-mxml-e2721322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5037%3A%20Stack-based%20Buffer%20Overflow%20in%20mxml&amp;severity=medium&amp;id=69c8ea29919ccadcdffae6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5036-stack-based-buffer-overflow-in-tenda-210df5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5036%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%204G06&amp;severity=high&amp;id=69c8dc1a919ccadcdfea42e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5035-sql-injection-in-code-projects-accou-b844fbad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5035%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8d18d919ccadcdfe4513a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5034-sql-injection-in-code-projects-accou-4be3d339</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5034%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8c37e919ccadcdfda1ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5033-sql-injection-in-code-projects-accou-9e1a8bbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5033%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c8bc76919ccadcdfd4fa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5031-improper-control-of-resource-identif-e4390a28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5031%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20BichitroGan%20ISP%20Billing%20Software&amp;severity=medium&amp;id=69c8b56e919ccadcdfd0c4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5030-command-injection-in-totolink-nr1800-e137d8f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5030%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69c8aaee919ccadcdfb97398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5024-stack-based-buffer-overflow-in-d-lin-e70f155a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5024%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c89cd1919ccadcdfa20329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5023-os-command-injection-in-dedeveloper2-cc03c992</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5023%3A%20OS%20Command%20Injection%20in%20DeDeveloper23%20codebase-mcp&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2602-cwe-79-improper-neutralization-of-in-4cab52e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2602%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twentig%20Twentig%20Supercharged%20Block%20Editor%20%E2%80%93%20Blocks%2C%20Patterns%2C%20Starter%20Sites%2C%20Portfolio&amp;severity=medium&amp;id=69c88b3d919ccadcdf8ee47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5021-stack-based-buffer-overflow-in-tenda-f1fb8811</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5021%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c880b1919ccadcdf7c0d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5020-command-injection-in-totolink-a3600r-b468734a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5020%3A%20Command%20Injection%20in%20Totolink%20A3600R&amp;severity=medium&amp;id=69c879aa919ccadcdf6dd167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4851-cwe-502-deserialization-of-untrusted-4ee6eb90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4851%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CASIANO%20GRID%3A%3AMachine&amp;severity=critical&amp;id=69c879aa919ccadcdf6dd163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-29-3c380d68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-29&amp;severity=medium&amp;id=69c9bee8e6bfc5ba1d520a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-29-d62cc526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-29&amp;severity=medium&amp;id=69c98a2ce6bfc5ba1dddddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-29-d4ae1112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-29&amp;severity=low&amp;id=69c8fbb6919ccadcdf066a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5019-sql-injection-in-code-projects-simpl-bb8230db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5019%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c86817919ccadcdf560eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5018-sql-injection-in-code-projects-simpl-fa1c2f64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5018%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5017-sql-injection-in-code-projects-simpl-b274ffdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5017%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69c85a06919ccadcdf4a2811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5016-server-side-request-forgery-in-elecv-d734b993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5016%3A%20Server-Side%20Request%20Forgery%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c84f7c919ccadcdf355adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5015-cross-site-scripting-in-elecv2-elecv-a07712f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5015%3A%20Cross%20Site%20Scripting%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5014-path-traversal-in-elecv2-elecv2p-4b247b7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5014%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c844ee919ccadcdf10d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5013-path-traversal-in-elecv2-elecv2p-4c235acc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5013%3A%20Path%20Traversal%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5012-os-command-injection-in-elecv2-elecv-a675e27e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5012%3A%20OS%20Command%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c82a1b2b68dbd88eb19d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3256-cwe-340-generation-of-predictable-nu-ad49460d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3256%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KTAT%20HTTP%3A%3ASession&amp;severity=critical&amp;id=69c826972b68dbd88eafb4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15604-cwe-340-generation-of-predictable-n-ca970ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15604%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20Amon2&amp;severity=critical&amp;id=69c823142b68dbd88eadbff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5011-code-injection-in-elecv2-elecv2p-e0ba6ef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5011%3A%20Code%20Injection%20in%20elecV2%20elecV2P&amp;severity=medium&amp;id=69c823142b68dbd88eadc006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5007-os-command-injection-in-kazuph-mcp-d-8c5548a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5007%3A%20OS%20Command%20Injection%20in%20kazuph%20mcp-docs-rag&amp;severity=medium&amp;id=69c823142b68dbd88eadbffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5004-stack-based-buffer-overflow-in-wavli-7ae39014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5004%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69c811842b68dbd88ea326b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5003-information-disclosure-in-promtengin-b6513727</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5003%3A%20Information%20Disclosure%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c811842b68dbd88ea326aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5002-injection-in-promtengineer-localgpt-1aabfd3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5002%3A%20Injection%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c80a782b68dbd88e9f987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cunning-predator-how-silver-fox-preys-on-japanes-697603f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20cunning%20predator%3A%20How%20Silver%20Fox%20preys%20on%20Japanese%20firms%20this%20tax%20season&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5001-unrestricted-upload-in-promtengineer-271f0511</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5001%3A%20Unrestricted%20Upload%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ffec2b68dbd88e794fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-003-operation-0ad14f82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20003%20-%20Operational%20Tempo%20Shift%20as%20Campaign%20Enters%20Monetization%20Phase%20With%20No%20New%20Compromises%20in%2048%20Hours%2C%20(Sat%2C%20Mar%2028th)&amp;severity=medium&amp;id=69c7f1db2b68dbd88e3e35d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5000-missing-authentication-in-promtengin-3eea2599</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5000%3A%20Missing%20Authentication%20in%20PromtEngineer%20localGPT&amp;severity=medium&amp;id=69c7ee562b68dbd88e316160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4999-path-traversal-in-z-9527-admin-04e5407b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4999%3A%20Path%20Traversal%20in%20z-9527%20admin&amp;severity=medium&amp;id=69c7ee562b68dbd88e31615a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4998-code-injection-in-sinaptik-ai-pandas-fd0c98b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4998%3A%20Code%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7d9402b68dbd88efcd7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4997-path-traversal-in-sinaptik-ai-pandas-33b63c5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4997%3A%20Path%20Traversal%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7ceb42b68dbd88ef8dca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4996-sql-injection-in-sinaptik-ai-pandasa-a62f3dcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4996%3A%20SQL%20Injection%20in%20Sinaptik%20AI%20PandasAI&amp;severity=medium&amp;id=69c7c0a42b68dbd88ef18cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2595-cwe-79-improper-neutralization-of-in-ec76e7d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpquads%20Quads%20Ads%20Manager%20for%20Google%20AdSense&amp;severity=medium&amp;id=69c7bd322b68dbd88eeee801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9497-cwe-798-use-of-hard-coded-credential-05235081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9497%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=69c7b6162b68dbd88eeae170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4995-cross-site-scripting-in-wandb-openui-72ab2620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4995%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c7b2942b68dbd88ee17702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-themed-clickfix-attack-drops-infiniti-s-89c85cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare-Themed%20ClickFix%20Attack%20Drops%20Infiniti%20Stealer%20on%20Macs&amp;severity=medium&amp;id=69c7af0f2b68dbd88edf21e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2442-cwe-93-improper-neutralization-of-cr-39aa3590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2442%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=69c7a4822b68dbd88ed883f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4994-information-exposure-through-error-m-a1e2e3d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4994%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4993-hard-coded-credentials-in-wandb-open-34206a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4993%3A%20Hard-coded%20Credentials%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c83c4f919ccadcdf051ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telnyx-python-sdk-compromised-to-deliver-credentia-c990c297</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telnyx%20Python%20SDK%20Compromised%20to%20Deliver%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-data-leaks-technical-analysis-and-tim-0df146b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Data%20Leaks%3A%20Technical%20Analysis%20and%20Timeline%20Attribution%20(2022%E2%80%932026)&amp;severity=medium&amp;id=69ca4b8fe6bfc5ba1d0d7d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1307-cwe-200-exposure-of-sensitive-inform-15467f36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1307%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=69c77dd62b68dbd88eb19528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15445-cwe-862-missing-authorization-in-re-ebaf3148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15445%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Cafeteria&amp;severity=medium&amp;id=69c7734a2b68dbd88eabfb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12886-cwe-918-server-side-request-forgery-f4b6fece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12886%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen%20-%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=69c74c9e2b68dbd88e79ce13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4987-cwe-20-improper-input-validation-in--6438ea07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=69c7307f2b68dbd88e6742d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-28-cf9131f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-28&amp;severity=medium&amp;id=69c86f15919ccadcdf5b95ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-28-e71c94e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-28&amp;severity=medium&amp;id=69c7e03f2b68dbd88effa8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-28-c40eedd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-28&amp;severity=low&amp;id=69c7501a2b68dbd88e7d74a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1679-buffer-copy-without-checking-size-of-5ca8f17f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1679%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69c7145f2b68dbd88e5638f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4248-cwe-285-improper-authorization-in-ul-0446e863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4248%3A%20CWE-285%20Improper%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=69c706502b68dbd88e324709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33996-cwe-476-null-pointer-dereference-in-d8cb8d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33996%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20benmcollins%20libjwt&amp;severity=medium&amp;id=69c706502b68dbd88e324705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33994-cwe-1321-improperly-controlled-modi-7ca08c52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33994%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33993-cwe-1321-improperly-controlled-modi-474a6f4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33993%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33991-cwe-89-improper-neutralization-of-s-585124c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33991%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69c702cd2b68dbd88e2edf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33936-cwe-20-improper-input-validation-in-2b6599fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33936%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tlsfuzzer%20python-ecdsa&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4992-cross-site-scripting-in-wandb-openui-e8f6e690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4992%3A%20Cross%20Site%20Scripting%20in%20wandb%20OpenUI&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4991-cross-site-scripting-in-qdocs-smart--297c25d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4991%3A%20Cross%20Site%20Scripting%20in%20QDOCS%20Smart%20School%20Management%20System&amp;severity=medium&amp;id=69c702cd2b68dbd88e2edf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33989-cwe-22-improper-limitation-of-a-pat-761e1467</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33989%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mobile-next%20mobile-mcp&amp;severity=high&amp;id=69c6ff482b68dbd88e2a92a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33981-cwe-200-exposure-of-sensitive-infor-608754f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33981%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69c6ff482b68dbd88e2a929d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33980-cwe-943-improper-neutralization-of--dc16a759</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33980%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20pab1it0%20adx-mcp-server&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33979-cwe-183-permissive-list-of-allowed--75ae3464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33979%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20AhmedAdelFahim%20express-xss-sanitizer&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33955-cwe-79-improper-neutralization-of-i-04111b1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33955%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=high&amp;id=69c6fa4f3c064ed76ffa5f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4990-improper-authorization-in-chatwoot-9cefc3d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4990%3A%20Improper%20Authorization%20in%20chatwoot&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4988-denial-of-service-in-open5gs-42cbf14d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4988%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4985-integer-overflow-in-dloebl-cgif-5e373785</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4985%3A%20Integer%20Overflow%20in%20dloebl%20CGIF&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33976-cwe-79-improper-neutralization-of-i-cedece5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33976%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20Notesnook%20Web%2FDesktop&amp;severity=critical&amp;id=69c6fa4f3c064ed76ffa5f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33954-cwe-285-improper-authorization-in-k-60cf3f7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33954%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69c6fa4f3c064ed76ffa5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33953-cwe-918-server-side-request-forgery-aa47dbeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27309-use-after-free-cwe-416-in-adobe-sub-e8186d78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27309%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33946-cwe-384-session-fixation-in-modelco-507e7510</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33946%3A%20CWE-384%3A%20Session%20Fixation%20in%20modelcontextprotocol%20ruby-sdk&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34226-cwe-201-insertion-of-sensitive-info-59be2af2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34226%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33943-cwe-94-improper-control-of-generati-83e18bd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33943%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33941-cwe-79-improper-neutralization-of-i-0c3a00bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33940-cwe-94-improper-control-of-generati-e76af596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33940%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33939-cwe-754-improper-check-for-unusual--3cf356be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33939%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f6ca3c064ed76ff81b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33938-cwe-94-improper-control-of-generati-a3f5c858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33938%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=high&amp;id=69c6f3473c064ed76ff618a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33937-cwe-843-access-of-resource-using-in-5708b559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33937%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=critical&amp;id=69c6f3473c064ed76ff618a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33916-cwe-79-improper-neutralization-of-i-5e8c53a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33916%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20handlebars-lang%20handlebars.js&amp;severity=medium&amp;id=69c6f3473c064ed76ff6189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33907-cwe-476-null-pointer-dereference-in-c5f76ee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33907%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff61897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33906-cwe-269-improper-privilege-manageme-512598f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33906%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c6f3473c064ed76ff61892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33904-cwe-833-deadlock-in-ellanetworks-co-00359507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33904%3A%20CWE-833%3A%20Deadlock%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6f3473c064ed76ff6188d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33903-cwe-476-null-pointer-dereference-in-3ccc04e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33903%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c6efd03c064ed76ff473fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33896-cwe-295-improper-certificate-valida-cdbadd36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33896%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efd03c064ed76ff473f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33895-cwe-347-improper-verification-of-cr-95f9ae6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33895%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33894-cwe-347-improper-verification-of-cr-a7043394</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33894%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33891-cwe-835-loop-with-unreachable-exit--0b104492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33891%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=69c6efce3c064ed76ff462e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32187-defense-in-depth-in-microsoft-micro-ee466c6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32187%3A%20Defense%20in%20Depth%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69c6efce3c064ed76ff462cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33887-cwe-862-missing-authorization-in-st-d67a668d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33887%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33886-cwe-200-exposure-of-sensitive-infor-6b040762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33886%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33885-cwe-601-url-redirection-to-untruste-93d7d876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33885%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33884-cwe-863-incorrect-authorization-in--b5e8a17b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33884%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33883-cwe-79-improper-neutralization-of-i-0694226b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33883%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33882-cwe-20-improper-input-validation-in-7a276760</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33882%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20statamic%20cms&amp;severity=medium&amp;id=69c6efce3c064ed76ff462cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33881-cwe-94-improper-control-of-generati-d4c95438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33881%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20windmill-labs%20windmill&amp;severity=high&amp;id=69c6ec5f3c064ed76ff25048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33879-cwe-307-improper-restriction-of-exc-fb0fa8de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33879%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20londonaicentre%20FLIP&amp;severity=low&amp;id=69c6ec5f3c064ed76ff25045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4976-buffer-overflow-in-totolink-lr350-f0bc237b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4976%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2504b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33875-cwe-940-improper-verification-of-so-189b5f61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33875%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20gematik%20app-Authenticator&amp;severity=critical&amp;id=69c6ec5f3c064ed76ff25042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33874-cwe-78-improper-neutralization-of-s-4c942ed9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33874%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gematik%20app-Authenticator&amp;severity=high&amp;id=69c6ec5f3c064ed76ff2503c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34046-cwe-639-authorization-bypass-throug-a0ee16dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34046%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c6e8bb3c064ed76ff077d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33873-cwe-94-improper-control-of-generati-cafbe4ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33873%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c6e8bb3c064ed76ff077be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33872-cwe-362-concurrent-execution-using--727f216c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33872%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20revelrylabs%20elixir-nodejs&amp;severity=high&amp;id=69c6e53a3c064ed76fede072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4975-stack-based-buffer-overflow-in-tenda-817f95ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69c6e53a3c064ed76fede086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4974-stack-based-buffer-overflow-in-tenda-15d8d9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=69c6e53a3c064ed76fede07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4973-cross-site-scripting-in-sourcecodest-f50d41d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4973%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Quiz%20System&amp;severity=medium&amp;id=69c6e53a3c064ed76fede078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33765-cwe-78-improper-neutralization-of-s-3a7427e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33765%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=69c6e1b93c064ed76febd417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33654-cwe-94-improper-control-of-generati-c2cfed7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33654%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20HKUDS%20nanobot&amp;severity=high&amp;id=69c6e1b93c064ed76febd414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34205-cwe-923-improper-restriction-of-com-dfad0bbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34205%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20home-assistant%20Home%20Assistant%20Operating%20System&amp;severity=critical&amp;id=69c6e1b93c064ed76febd41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34475-cwe-180-incorrect-behavior-order-va-77fc7370</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34475%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=69c6e1b93c064ed76febd41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33045-cwe-79-improper-neutralization-of-i-245e58ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33045%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33044-cwe-79-improper-neutralization-of-i-8931a13c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33044%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20home-assistant%20core&amp;severity=high&amp;id=69c6e1b93c064ed76febd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32241-cwe-77-improper-neutralization-of-s-5b167894</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32241%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20flannel-io%20flannel&amp;severity=high&amp;id=69c6de373c064ed76fea1d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31951-cwe-200-exposure-of-sensitive-infor-2658a252</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31950-cwe-284-improper-access-control-in--9692bdfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31950%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69c6de373c064ed76fea1d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31945-cwe-918-server-side-request-forgery-6d761e69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31945%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31943-cwe-918-server-side-request-forgery-37c34fc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31943%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69c6de373c064ed76fea1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34391-cwe-488-exposure-of-data-element-to-d0ca6277</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34391%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34389-cwe-287-improper-authentication-in--a644a652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34389%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6de373c064ed76fea1d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4972-cross-site-scripting-in-code-project-71861764</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4972%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4971-cross-site-request-forgery-in-source-69d6fee6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4971%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Note%20Taking%20App&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34388-cwe-703-improper-check-or-handling--939ff080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34388%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6daaa3c064ed76fe814b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-infrastructure-supply-chain-poisoning-alert-0bea3b94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Infrastructure%20Supply%20Chain%20Poisoning%20Alert&amp;severity=medium&amp;id=69c6de343c064ed76fea1bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aitm-phishing-targets-tiktok-business-accounts-usi-bb5b2f91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AitM%20Phishing%20Targets%20TikTok%20Business%20Accounts%20Using%20Cloudflare%20Turnstile%20Evasion&amp;severity=medium&amp;id=69c6de343c064ed76fea1be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34387-cwe-78-improper-neutralization-of-s-b0d45cde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34387%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34386-cwe-89-improper-neutralization-of-s-4c1e8f40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34386%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34385-cwe-89-improper-neutralization-of-s-b5e82d09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34385%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29180-cwe-862-missing-authorization-in-fl-da4570c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29180%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4970-sql-injection-in-code-projects-socia-1b1f86da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4970%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4969-cross-site-scripting-in-code-project-e2e4a1f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4969%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=69c6d0203c064ed76fe28e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26061-cwe-770-allocation-of-resources-wit-73916d43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26061%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20fleetdm%20fleet&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26060-cwe-613-insufficient-session-expira-e9113065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26060%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34375-cwe-79-improper-neutralization-of-i-f0b41eba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34375%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6d01e3c064ed76fe28e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34374-cwe-89-improper-neutralization-of-s-171f2208</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34374%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6d01e3c064ed76fe28e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15612-cwe-295-improper-certificate-valida-2a970739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15612%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Wazuh%20Wazuh%20Provisioning%20Scripts%20(Agent%20Build%20Environment)&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34369-cwe-862-missing-authorization-in-ww-b48b43d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34369%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6d01e3c064ed76fe28e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34368-cwe-362-concurrent-execution-using--5d1f951f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34368%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf38a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34364-cwe-863-incorrect-authorization-in--077b2b46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34364%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15617-cwe-522-insufficiently-protected-cr-9454fac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15617%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Wazuh%20Wazuh%20(GitHub%20Actions)&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4968-cross-site-request-forgery-in-source-af9ec2e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4968%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Diary%20App&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4966-sql-injection-in-itsourcecode-free-h-6dc1800b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4966%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c6c5913c064ed76fdb177b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4965-improper-neutralization-of-directive-9aea4106</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4965%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4964-server-side-request-forgery-in-letta-1bb98fde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4964%3A%20Server-Side%20Request%20Forgery%20in%20letta-ai%20letta&amp;severity=medium&amp;id=69c6c6913c064ed76fdc2946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4963-code-injection-in-huggingface-smolag-98db0746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4963%3A%20Code%20Injection%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=69c6c6913c064ed76fdc293d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4962-uncontrolled-search-path-in-ultravnc-34124aea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4962%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69c6c5913c064ed76fdb178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34362-cwe-613-insufficient-session-expira-8dde0450</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34362%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-hacking-group-claims-credit-for-hack-o-60a43961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Hacking%20Group%20Claims%20Credit%20for%20Hack%20of%20FBI%20Director%20Kash%20Patel%E2%80%99s%20Personal%20Account&amp;severity=medium&amp;id=69c6b3fd3c064ed76fc55bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34247-cwe-862-missing-authorization-in-ww-01b2864d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34247%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15616-cwe-94-improper-control-of-generati-f69b8211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15616%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Wazuh%20wazuh-agent&amp;severity=high&amp;id=69c6b7823c064ed76fc77d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34245-cwe-862-missing-authorization-in-ww-218357cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34245%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c6b7823c064ed76fc77dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33867-cwe-312-cleartext-storage-of-sensit-e9914632</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33867%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c6b7823c064ed76fc77daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15615-cwe-276-incorrect-default-permissio-6c55aec2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15615%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6c5913c064ed76fdb1789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15381-cwe-200-exposure-of-sensitive-infor-58cdecb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15381%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69c6c6913c064ed76fdc294c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33770-cwe-89-improper-neutralization-of-s-48be2040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33770%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c6913c064ed76fdc2961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28369-inconsistent-interpretation-of-http-710a6b03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28369%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28367-inconsistent-interpretation-of-http-86cc39b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28367%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28368-inconsistent-interpretation-of-http-8e8a214c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28368%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=high&amp;id=69c6c6913c064ed76fdc2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33767-cwe-89-improper-neutralization-of-s-be3257f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4961-stack-based-buffer-overflow-in-tenda-7613bc02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4961%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c20e3c064ed76fce99b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4960-stack-based-buffer-overflow-in-tenda-f1d5709e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4960%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=69c6c6913c064ed76fdc2965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32983-cwe-276-incorrect-default-permissio-2038176e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32983%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Wazuh%20wazuh-manager&amp;severity=medium&amp;id=69c6a9723c064ed76fbf9381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4959-missing-authentication-in-openbmb-xa-57f06968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4959%3A%20Missing%20Authentication%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c6a9723c064ed76fbf938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4958-authorization-bypass-in-openbmb-xage-e355a4dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4958%3A%20Authorization%20Bypass%20in%20OpenBMB%20XAgent&amp;severity=low&amp;id=69c6a9723c064ed76fbf9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/most-notable-supply-chain-attacks-of-2025-kaspersk-65bf714a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Most%20notable%20supply-chain%20attacks%20of%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c69b673c064ed76fb8319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5027-cwe-22-improper-limitation-of-a-path-965c6426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5027%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4957-sensitive-information-in-log-files-i-50f0bde8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4957%3A%20Sensitive%20Information%20in%20Log%20Files%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69c69ee73c064ed76fb956aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4956-sql-injection-in-shenzhen-ruiming-te-2de04042</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4956%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb956a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4955-sql-injection-in-shenzhen-ruiming-te-8eb7713e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4955%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c69ee73c064ed76fb9569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5026-cwe-79-improper-neutralization-of-in-c75988b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5026%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c69ee73c064ed76fb956b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5025-cwe-862-missing-authorization-in-lan-fcc5962e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5025%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c69ee73c064ed76fb956b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5010-cwe-79-improper-neutralization-of-in-055aca8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5010%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=69c697e13c064ed76fb722b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-002-telnyx-py-dd315e4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20002%20-%20Telnyx%20PyPI%20Compromise%2C%20Vect%20Ransomware%20Mass%20Affiliate%20Program%2C%20and%20First%20Named%20Victim%20Claim%2C%20(Fri%2C%20Mar%2027th)&amp;severity=medium&amp;id=69c694683c064ed76fb59f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-5022-cwe-862-missing-authorization-in-lan-00d95863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-5022%3A%20CWE-862%20Missing%20Authorization%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69c697e33c064ed76fb722dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33766-cwe-918-server-side-request-forgery-f241f712</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33766%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33764-cwe-639-authorization-bypass-throug-9632a444</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33764%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-palo-alto-recruiter-scam-anti-deepfa-9f373486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Palo%20Alto%20Recruiter%20Scam%2C%20Anti-Deepfake%20Chip%2C%20Google%20Sets%202029%20Quantum%20Deadline&amp;severity=medium&amp;id=69c6945a3c064ed76fb59acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33763-cwe-307-improper-restriction-of-exc-a4e305cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33763%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27876-vulnerability-in-grafana-grafana-en-b51cbbf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27876%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=69c697e13c064ed76fb72296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33761-cwe-862-missing-authorization-in-ww-8ddf3006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33761%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb722a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33759-cwe-862-missing-authorization-in-ww-e274f6e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33759%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c697e13c064ed76fb7229c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1496-cwe-639-authorization-bypass-through-d8c09de9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1496%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Black%20Duck%20Coverity&amp;severity=critical&amp;id=69c694993c064ed76fb5b666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4954-sql-injection-in-mingsoft-mcms-4f540294</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4954%3A%20SQL%20Injection%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4953-server-side-request-forgery-in-mings-e5843174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4953%3A%20Server-Side%20Request%20Forgery%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11604-cwe-532-insertion-of-sensitive-info-df89216d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11604%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20OpenText%20IDM%20Driver%20and%20Extensions&amp;severity=high&amp;id=69c694993c064ed76fb5b65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33755-cwe-89-improper-neutralization-of-s-75a40d5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69c6949b3c064ed76fb5b753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33750-cwe-400-uncontrolled-resource-consu-59607088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33750%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20juliangruber%20brace-expansion&amp;severity=medium&amp;id=69c6949b3c064ed76fb5b747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33748-cwe-22-improper-limitation-of-a-pat-59db9529</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33748%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c6949b3c064ed76fb5b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33284-cwe-20-improper-input-validation-in-ead42146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33284%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20globaleaks%20globaleaks-whistleblowing-software&amp;severity=low&amp;id=69c694993c064ed76fb5b681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33206-cwe-23-relative-path-traversal-in-k-107aaef1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33206%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69c694993c064ed76fb5b67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33205-cwe-918-server-side-request-forgery-a841d997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33205%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69c694993c064ed76fb5b67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13478-cwe-522-insufficiently-protected-cr-a00443b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13478%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20OpenText%20Identity%20Manager&amp;severity=high&amp;id=69c68d533c064ed76fb2aba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32859-cwe-79-improper-neutralization-of-i-bce14615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32859%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Bytedance%20Inc.%20DeerFlow&amp;severity=medium&amp;id=69c68d533c064ed76fb2aba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4982-cwe-20-improper-input-validation-in--05602973</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4982%3A%20CWE-20%20Improper%20input%20validation%20in%20pretix%20Venueless&amp;severity=high&amp;id=69c67f433c064ed76facb4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4620-cwe-78-improper-neutralization-of-sp-aca82dd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4620%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX1500HP&amp;severity=high&amp;id=69c674b53c064ed76fa619de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4622-cwe-78-improper-neutralization-of-sp-3939268a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4622%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WG2600HS&amp;severity=high&amp;id=69c674b53c064ed76fa619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4621-cwe-912-hidden-functionality-in-nec--04a5c93b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4621%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c674b53c064ed76fa619e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4619-cwe-22-improper-limitation-of-a-path-83322c52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4619%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20WX3600HP&amp;severity=medium&amp;id=69c671313c064ed76fa3fd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4309-cwe-862-missing-authorization-in-nec-06bc0ccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20NEC%20Platforms%2C%20Ltd.%20Aterm%20W1200EX(-MS)&amp;severity=medium&amp;id=69c671313c064ed76fa3fd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-high-severity-router-vulnerabiliti-8c193f30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20High-Severity%20Router%20Vulnerabilities&amp;severity=high&amp;id=69c66dad3c064ed76fa11cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coruna-ios-exploit-kit-likely-an-update-to-operati-9113ab40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coruna%20iOS%20Exploit%20Kit%20Likely%20an%20Update%20to%20Operation%20Triangulation&amp;severity=medium&amp;id=69c65f9d3c064ed76f950c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-ptc-vulnerability-that-had-ger-e5854258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20PTC%20Vulnerability%20That%20Had%20German%20Police%20Mobilized&amp;severity=critical&amp;id=69c64e093c064ed76f7d2b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3457-cwe-79-improper-neutralization-of-in-6c12ff4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Thales%20Sentinel%20LDK%20Runtime&amp;severity=high&amp;id=69c64a8f3c064ed76f7aa1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-keitaro-abuse-part-2-one-platform-many-thre-3d831901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Keitaro%20Abuse%20Part%202%3A%20One%20Platform%2C%20Many%20Threats&amp;severity=medium&amp;id=69c6518c3c064ed76f7f61aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brushworm-and-brushlogger-uncovered-415a1fb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRUSHWORM%20and%20BRUSHLOGGER%20uncovered&amp;severity=medium&amp;id=69c6518c3c064ed76f7f6213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27860-improper-neutralization-of-special--6360e1c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27860%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=low&amp;id=69c63ffd3c064ed76f701ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27859-uncontrolled-resource-consumption-i-fe0e60ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27859%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27858-uncontrolled-resource-consumption-i-4ea18f33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27858%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27857-uncontrolled-resource-consumption-i-0011fc23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27857%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27856-improper-authentication-in-open-xch-d601837d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27856%3A%20Improper%20Authentication%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27855-authentication-bypass-by-capture-re-77b5e888</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27855%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24031-improper-neutralization-of-special--f2f4e9b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24031%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0394-improper-limitation-of-a-pathname-to-145c4555</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0394%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59032-improper-input-validation-in-open-x-bd435fc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59032%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69c63ffa3c064ed76f701a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59031-exposure-of-sensitive-information-t-20c26aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59031%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59028-improper-input-validation-in-open-x-87a912ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59028%3A%20Improper%20Input%20Validation%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=69c63ffa3c064ed76f701a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14028-cwe-416-use-after-free-in-softing-s-b6d4a86a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14028%3A%20CWE-416%20Use%20after%20free%20in%20Softing%20smartLink%20HW-DP&amp;severity=medium&amp;id=69c61cf33c064ed76f58580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22744-vulnerability-in-spring-spring-ai-8d7a4912</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22744%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22743-vulnerability-in-spring-spring-ai-78da137c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22743%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4948-incorrect-execution-assigned-permiss-0bd6a078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4948%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c61cf33c064ed76f58582d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22742-vulnerability-in-spring-spring-ai-76d7852f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22742%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=high&amp;id=69c61cf33c064ed76f585810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33366-missing-authentication-for-critical-004c493d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33366%3A%20Missing%20authentication%20for%20critical%20function%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=medium&amp;id=69c61cf33c064ed76f585829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33280-hidden-functionality-in-buffalo-inc-cfe45036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33280%3A%20Hidden%20functionality%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32678-authentication-bypass-using-an-alte-3ed7b3d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32678%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32669-code-injection-in-buffalo-inc-buffa-9c341c29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32669%3A%20Code%20injection%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f58581d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27650-improper-neutralization-of-special--be872db1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27650%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BUFFALO%20INC.%20BUFFALO%20Wi-Fi%20router%20products&amp;severity=high&amp;id=69c61cf33c064ed76f585819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22738-vulnerability-in-spring-spring-ai-473dec2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22738%3A%20Vulnerability%20in%20Spring%20Spring%20AI&amp;severity=critical&amp;id=69c615c93c064ed76f536685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33559-cross-site-scripting-xss-in-mika-op-88322545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33559%3A%20Cross-site%20scripting%20(XSS)%20in%20MiKa%20OpenStreetMap&amp;severity=medium&amp;id=69c615c93c064ed76f536688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3098-cwe-862-missing-authorization-in-nex-82bd35df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3098%3A%20CWE-862%20Missing%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4910-sql-injection-in-shenzhen-ruiming-te-af03ad8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=69c66dbb3c064ed76fa122ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4909-cross-site-scripting-in-code-project-c59d5b0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4909%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4908-sql-injection-in-code-projects-simpl-05928344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4908%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c5ef1e3c064ed76f1376e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4907-server-side-request-forgery-in-page--8799229c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4907%3A%20Server-Side%20Request%20Forgery%20in%20Page-Replica%20Page%20Replica&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4906-stack-based-buffer-overflow-in-tenda-f24bafca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5da053c064ed76f01c452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33747-cwe-22-improper-limitation-of-a-pat-6a030cf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=69c5da053c064ed76f01c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33745-cwe-200-exposure-of-sensitive-infor-23c6c791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33745%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69c5da053c064ed76f01c43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33935-cwe-307-improper-restriction-of-exc-874ceb6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33935%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33890-cwe-284-improper-access-control-in--d138f9e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33890%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33735-cwe-285-improper-authorization-in-f-ea8d45fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33735%3A%20CWE-285%3A%20Improper%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69c5da053c064ed76f01c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33728-cwe-502-deserialization-of-untruste-d41c376a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33728%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20DataDog%20dd-trace-java&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff4048b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33693-cwe-918-server-side-request-forgery-0d7a70f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33693%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff4047c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33701-cwe-502-deserialization-of-untruste-08578920</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33701%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20open-telemetry%20opentelemetry-java-instrumentation&amp;severity=critical&amp;id=69c5d2fe3c064ed76ff40486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30568-na-c7d5136b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30568%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30567-na-34ea507a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30567%3A%20n%2Fa&amp;severity=medium&amp;id=69c6c9173c064ed76fdf3897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30576-na-4a704b17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30576%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30574-na-1948478e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30574%3A%20n%2Fa&amp;severity=high&amp;id=69c6c6913c064ed76fdc295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-27-783cd3d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-27&amp;severity=medium&amp;id=69c6c2053c064ed76fce23f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30575-na-ce7a4259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30575%3A%20n%2Fa&amp;severity=high&amp;id=69c6b7823c064ed76fc77da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30571-na-aad3cfe6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30571%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30570-na-90f13cf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30570%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30569-na-778534d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30569%3A%20n%2Fa&amp;severity=medium&amp;id=69c6b7823c064ed76fc77d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30530-na-d795d87c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30530%3A%20n%2Fa&amp;severity=critical&amp;id=69c6acf53c064ed76fc0f14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30529-na-6d76fbec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30529%3A%20n%2Fa&amp;severity=high&amp;id=69c6acf53c064ed76fc0f14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30527-na-0e4ae47d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30527%3A%20n%2Fa&amp;severity=medium&amp;id=69c6acf53c064ed76fc0f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30531-na-688119ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30531%3A%20n%2Fa&amp;severity=high&amp;id=69c6a9723c064ed76fbf937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30302-na-b059f73c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30302%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a9723c064ed76fbf937b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30534-na-ad84f286</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30534%3A%20n%2Fa&amp;severity=high&amp;id=69c6a26b3c064ed76fbc6561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30533-na-901e8879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30533%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30532-na-be24c2b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30532%3A%20n%2Fa&amp;severity=critical&amp;id=69c6a26b3c064ed76fbc655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29871-na-8b7078d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29871%3A%20n%2Fa&amp;severity=high&amp;id=69c69ee73c064ed76fb9569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30637-na-e7b36711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30637%3A%20n%2Fa&amp;severity=high&amp;id=69c697e13c064ed76fb72299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69988-na-4a2623b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69988%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb72293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61190-na-08db7991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61190%3A%20n%2Fa&amp;severity=medium&amp;id=69c697e13c064ed76fb7228e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30689-na-60d2c934</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30689%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30304-na-c6885618</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30304%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30303-na-37247ce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30303%3A%20n%2Fa&amp;severity=critical&amp;id=69c694993c064ed76fb5b66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69986-na-107043d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69986%3A%20n%2Fa&amp;severity=high&amp;id=69c694993c064ed76fb5b663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-27-89ac2f2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-27&amp;severity=low&amp;id=69c635653c064ed76f6845e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33699-cwe-835-loop-with-unreachable-exit--d1313b63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33699%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69c5d2fe3c064ed76ff40481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27893-cwe-693-protection-mechanism-failur-a0dfde92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27893%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69c5c8713c064ed76fe63c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33697-cwe-322-key-exchange-without-entity-b574293b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33697%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20ultravioletrs%20cocos&amp;severity=high&amp;id=69c5c8713c064ed76fe63c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33945-cwe-22-improper-limitation-of-a-pat-4b327a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33945%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5c16a3c064ed76fe46d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33898-cwe-287-improper-authentication-in--26104083</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33898%3A%20CWE-287%3A%20Improper%20Authentication%20in%20lxc%20incus&amp;severity=high&amp;id=69c5c16a3c064ed76fe46d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4905-stack-based-buffer-overflow-in-tenda-a658b06f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c66dbb3c064ed76fa122e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4904-stack-based-buffer-overflow-in-tenda-f869e792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4904%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c6c6933c064ed76fdc298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33897-cwe-1336-improper-neutralization-of-fafd9faa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33897%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20lxc%20incus&amp;severity=critical&amp;id=69c5ba613c064ed76fe1f5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33743-cwe-770-allocation-of-resources-wit-4c38ea14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33743%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33711-cwe-61-unix-symbolic-link-symlink-f-631adb75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33711%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33542-cwe-295-improper-certificate-valida-feeb9042</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33542%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20lxc%20incus&amp;severity=medium&amp;id=69c5ba613c064ed76fe1f5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4903-stack-based-buffer-overflow-in-tenda-b9940a9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4903%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4902-stack-based-buffer-overflow-in-tenda-94214df0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4902%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=69c5ba613c064ed76fe1f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4900-files-or-directories-accessible-in-c-df08f42b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4900%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4899-cross-site-scripting-in-code-project-58c2a264</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4899%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33686-cwe-22-improper-limitation-of-a-pat-5344035e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12805-improper-isolation-or-compartmental-96bbe2f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12805%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.25&amp;severity=high&amp;id=69c5ac523c064ed76fd41c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33687-cwe-434-unrestricted-upload-of-file-ceb5ec07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33687%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20code16%20sharp&amp;severity=high&amp;id=69c5ac523c064ed76fd41c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28377-vulnerability-in-grafana-tempo-a7a1aaaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28377%3A%20Vulnerability%20in%20Grafana%20Tempo&amp;severity=high&amp;id=69c5ac523c064ed76fd41c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33672-cwe-1321-improperly-controlled-modi-73dc059c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33672%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20micromatch%20picomatch&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33671-cwe-1333-inefficient-regular-expres-753ec15d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33671%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20micromatch%20picomatch&amp;severity=high&amp;id=69c5a8ce3c064ed76fd1dae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0748-cwe-284-improper-access-control-in-d-2bf828b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0748%3A%20CWE-284%20Improper%20Access%20Control%20in%20Drupal%20Internationalization%20(i18n)%20-%20i18n_node%20submodule&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4346-cwe-312-cleartext-storage-of-sensiti-056ca912</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4346%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20TP-Link%20Systems%20Inc.%20TL-WR850N%20v3&amp;severity=medium&amp;id=69c5a8ce3c064ed76fd1dae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33670-cwe-22-improper-limitation-of-a-pat-0880f67a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33670%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33669-cwe-125-out-of-bounds-read-in-siyua-064aace2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33669%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69c5a54b3c064ed76fcfc830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1556-cwe-200-exposure-of-sensitive-inform-0daf77f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1556%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Drupal%20Drupal%20File%20(Field)%20Paths&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33664-cwe-79-improper-neutralization-of-i-c3eb5eac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33664%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3650-cwe-401-in-grassroots-grassroots-dic-a3ef7ceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3650%3A%20CWE-401%20in%20Grassroots%20Grassroots%20DICOM%20(GDCM)&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/etherrat-sysinfo-module-c2-on-ethereum-etherhiding-38f718e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EtherRAT%20%26%20SYS_INFO%20Module%3A%20C2%20on%20Ethereum%20(EtherHiding)%2C%20Target%20Selection%2C%20CDN-Like%20Beacons&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4898-cross-site-scripting-in-code-project-dc1fb1e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4898%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33661-cwe-290-authentication-bypass-by-sp-0af23ed1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33661%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yansongda%20pay&amp;severity=high&amp;id=69c5a54b3c064ed76fcfc828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33658-cwe-770-allocation-of-resources-wit-31281ecb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33658%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rails%20activestorage&amp;severity=low&amp;id=69c5a54b3c064ed76fcfc821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33653-cwe-79-improper-neutralization-of-i-1514e992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33653%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farisc0de%20Uploady&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33645-cwe-22-improper-limitation-of-a-pat-2ac3bb97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=high&amp;id=69c5a1c53c064ed76fce0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33638-cwe-862-missing-authorization-in-li-48adeeb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20lin-snow%20Ech0&amp;severity=medium&amp;id=69c5a1c53c064ed76fce0c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-attack-installs-fake-browser-extension-f-658dbe72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20attack%20installs%20fake%20browser%20extension%20for%20surveillance&amp;severity=medium&amp;id=69c5a8cd3c064ed76fd1d9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3622-cwe-125-out-of-bounds-read-in-tp-lin-e6d670e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3622%3A%20CWE-125%20Out-of-bounds%20read%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=high&amp;id=69c59e483c064ed76fcd549a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33545-cwe-89-improper-neutralization-of-s-5827a82d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33545%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=69c59e483c064ed76fcd5495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33541-cwe-400-uncontrolled-resource-consu-40a6ca87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33541%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20miraheze%20TSPortal&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33738-cwe-79-improper-neutralization-of-i-ce3958ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33738%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c5973e3c064ed76fca3c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4393-cwe-352-cross-site-request-forgery-c-f8a6aee5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Automated%20Logout&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4933-cwe-863-incorrect-authorization-in-d-e659c429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4933%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Unpublished%20Node%20Permissions&amp;severity=high&amp;id=69c6c6943c064ed76fdc2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3573-cwe-863-incorrect-authorization-in-d-6fdb0f15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3573%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=69c6c6943c064ed76fdc29fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0965-external-control-of-file-name-or-pat-52e92e8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0965%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c6c6933c064ed76fdc2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0967-inefficient-regular-expression-compl-86bb3a06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0967%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0968-null-pointer-dereference-in-red-hat--d915bdc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0968%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0964-improper-limitation-of-a-pathname-to-2ae13e3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0964%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c59e483c064ed76fcd549f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0966-buffer-underwrite-buffer-underflow-i-79e9d10d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0966%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c5a54b3c064ed76fcfc842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21724-vulnerability-in-grafana-grafana-os-3abea496</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21724%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33375-vulnerability-in-grafana-grafana-os-67e46cbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33375%3A%20Vulnerability%20in%20Grafana%20Grafana%20OSS&amp;severity=medium&amp;id=69c5ac523c064ed76fd41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33644-cwe-918-server-side-request-forgery-18b4775d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33644%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=69c6c6933c064ed76fdc299b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3532-cwe-178-improper-handling-of-case-se-f8b1305e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3532%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6949d3c064ed76fb5b810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3531-cwe-288-authentication-bypass-using--7f0de8f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3531%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3530-cwe-918-server-side-request-forgery--497953a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3530%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20OpenID%20Connect%20%2F%20OAuth%20client&amp;severity=medium&amp;id=69c6c6943c064ed76fdc29f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3529-cwe-79-improper-neutralization-of-in-db408486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Google%20Analytics%20GA4&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3528-cwe-79-improper-neutralization-of-in-0832454b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Calculation%20Fields&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3527-cwe-306-missing-authentication-for-c-8c4d2498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3527%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Drupal%20AJAX%20Dashboard&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3526-cwe-863-incorrect-authorization-in-d-45205db2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3526%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc29a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3525-cwe-863-incorrect-authorization-in-d-79c13952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3525%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20File%20Access%20Fix%20(deprecated)&amp;severity=medium&amp;id=69c6c6933c064ed76fdc299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2100-access-of-uninitialized-pointer-in-r-70c93daf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2100%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c59e483c064ed76fcd54a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33537-cwe-918-server-side-request-forgery-7e8f2ade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33537%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=medium&amp;id=69c6c6933c064ed76fdc2997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2239-improper-null-termination-in-red-hat-7affad82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2239%3A%20Improper%20Null%20Termination%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2272-integer-overflow-or-wraparound-in-re-e752abf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2272%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c5a54c3c064ed76fcfc87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2271-integer-overflow-or-wraparound-in-re-3121f72b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2271%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=low&amp;id=69c5a54c3c064ed76fcfc875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33532-cwe-674-uncontrolled-recursion-in-e-41e4ce98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33532%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20eemeli%20yaml&amp;severity=medium&amp;id=69c590393c064ed76fc7fe87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33632-cwe-862-missing-authorization-in-cr-df2ceb79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33632%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc67000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2436-expired-pointer-dereference-in-red-h-af2e8042</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2436%3A%20Expired%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c58caf3c064ed76fc66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33631-cwe-862-missing-authorization-in-cr-914bd25a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33631%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craigjbass%20clearancekit&amp;severity=high&amp;id=69c58caf3c064ed76fc66ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33529-cwe-22-improper-limitation-of-a-pat-7d574b44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33529%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tobychui%20zoraxy&amp;severity=low&amp;id=69c58caf3c064ed76fc66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33528-cwe-22-improper-limitation-of-a-pat-44f0b1de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33528%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yusing%20godoxy&amp;severity=medium&amp;id=69c58caf3c064ed76fc66ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3121-incorrect-privilege-assignment-in-re-84c0c7ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3121%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3190-improper-handling-of-insufficient-pe-09076be7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3190%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69c589333c064ed76fb16807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33152-cwe-307-improper-restriction-of-exc-e7cae15a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33152%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20TandoorRecipes%20recipes&amp;severity=critical&amp;id=69c589313c064ed76fb167cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33153-cwe-89-improper-neutralization-of-s-5b9303b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33153%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33148-cwe-74-improper-neutralization-of-s-a7637ce2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29055-cwe-1230-exposure-of-sensitive-info-58c6e1d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29055%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26213-cwe-78-improper-neutralization-of-s-27248bb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26213%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20themactep%20thingino-firmware&amp;severity=high&amp;id=69c589313c064ed76fb167b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28503-cwe-639-authorization-bypass-throug-c45a9219</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28503%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=69c589313c064ed76fb167b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33149-cwe-644-improper-neutralization-of--6d2eec85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33149%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=69c589313c064ed76fb167ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33506-cwe-87-improper-neutralization-of-a-799c9e0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33506%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ory%20polis&amp;severity=high&amp;id=69c589313c064ed76fb167d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33491-cwe-121-stack-based-buffer-overflow-786fa8ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33491%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20zenc-lang%20zenc&amp;severity=high&amp;id=69c582253c064ed76fa7cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33505-cwe-89-improper-neutralization-of-s-7dc3388c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33505%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20keto&amp;severity=high&amp;id=69c582253c064ed76fa7cc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-supply-chain-campaign-update-001-x3f-check-550ef483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Supply%20Chain%20Campaign%3A%20Update%20001%20-%20Checkmarx%20Scope%20Wider%20Than%20Reported%2C%20CISA%20KEV%20Entry%2C%20and%20Detection%20Tools%20Available%2C%20(Thu%2C%20Mar%2026th)&amp;severity=medium&amp;id=69c56d4ef4197a8e3bec2651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33504-cwe-89-improper-neutralization-of-s-f2d530e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33504%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20hydra&amp;severity=high&amp;id=69c574363c064ed76f96818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33503-cwe-89-improper-neutralization-of-s-32e281db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33503%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ory%20kratos&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33496-cwe-1289-improper-validation-of-uns-bd9362c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33496%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20ory%20oathkeeper&amp;severity=high&amp;id=69c570d8f4197a8e3bef1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33495-cwe-862-missing-authorization-in-or-b18fe7c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33495%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ory%20oathkeeper&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33494-cwe-23-relative-path-traversal-in-o-d845cb54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33494%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20ory%20oathkeeper&amp;severity=critical&amp;id=69c570d8f4197a8e3bef1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33732-cwe-706-use-of-incorrectly-resolved-ec758fd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33732%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20srvx&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33490-cwe-706-use-of-incorrectly-resolved-76c4af93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33490%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20h3js%20h3&amp;severity=low&amp;id=69c570d8f4197a8e3bef1eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33487-cwe-347-improper-verification-of-cr-33820af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33487%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20russellhaering%20goxmldsig&amp;severity=high&amp;id=69c570d8f4197a8e3bef1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33486-cwe-918-server-side-request-forgery-62a4e798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33486%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roadiz%20core-bundle-dev-app&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33481-cwe-460-improper-cleanup-on-thrown--43cd4c99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33481%3A%20CWE-460%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20anchore%20syft&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33477-cwe-863-incorrect-authorization-in--b8176694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33477%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=medium&amp;id=69c570d8f4197a8e3bef1eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33470-cwe-862-missing-authorization-in-bl-cf242ca5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33470%3A%20CWE-862%3A%20Missing%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33469-cwe-863-incorrect-authorization-in--e8c6070a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33469%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33468-cwe-89-improper-neutralization-of-s-c6315e5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33468%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33442-cwe-89-improper-neutralization-of-s-f971cd6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33442%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69c569d6f4197a8e3be94d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34071-cwe-79-improper-neutralization-of-i-7eb8f515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d8f4197a8e3be94dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33438-cwe-770-allocation-of-resources-wit-1428d408</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33438%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33430-cwe-732-incorrect-permission-assign-a2e24fdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33430%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20beeware%20briefcase&amp;severity=high&amp;id=69c569d6f4197a8e3be94d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33636-cwe-125-out-of-bounds-read-in-pnggr-69be97d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33636%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33416-cwe-416-use-after-free-in-pnggroup--f5d1ae3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33416%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pnggroup%20libpng&amp;severity=high&amp;id=69c569d6f4197a8e3be94d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33402-cwe-79-improper-neutralization-of-i-2723f0f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33402%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sakaiproject%20sakai&amp;severity=low&amp;id=69c569d6f4197a8e3be94d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33015-cwe-863-incorrect-authorization-in--329a7ec4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33015%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c569d6f4197a8e3be94d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33014-cwe-863-incorrect-authorization-in--8d9fffcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33014%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cff4197a8e3be49ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33009-cwe-362-concurrent-execution-using--5f9e12f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33009%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29044-cwe-863-incorrect-authorization-in--4438817d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29044%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27828-cwe-416-use-after-free-in-everest-e-adf48606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27828%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27816-cwe-787-out-of-bounds-write-in-ever-984d5d0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27816%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27815-cwe-787-out-of-bounds-write-in-ever-bbd7f92c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27815%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27814-cwe-362-concurrent-execution-using--ab09716a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27813-cwe-416-use-after-free-in-everest-e-c8c578fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27813%3A%20CWE-416%3A%20Use%20After%20Free%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26074-cwe-362-concurrent-execution-using--22a9ae97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26074%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c562cdf4197a8e3be49a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26073-cwe-122-heap-based-buffer-overflow--2f7a5923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26073%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4897-allocation-of-resources-without-limi-69f0a690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4897%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26072-cwe-362-concurrent-execution-using--e4f31acc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26072%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26071-cwe-362-concurrent-execution-using--b57a7aa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26071%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26070-cwe-362-concurrent-execution-using--18848e3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26070%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26008-cwe-125-out-of-bounds-read-in-evere-7e88bae7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26008%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23995-cwe-121-stack-based-buffer-overflow-522c3df9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23995%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7d3c064ed76f9f9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22790-cwe-121-stack-based-buffer-overflow-96e39999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22790%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c5583ef4197a8e3bdf81d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28298-cwe-79-improper-neutralization-of-i-936109e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hightower-holding-data-breach-impacts-130000-86a37b28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hightower%20Holding%20Data%20Breach%20Impacts%20130%2C000&amp;severity=high&amp;id=69c53f99f4197a8e3bceb0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27664-cwe-787-out-of-bounds-write-in-siem-ebaa8618</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27664%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27663-cwe-770-allocation-of-resources-wit-e3eb94b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27663%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28297-cwe-79-improper-neutralization-of-i-d551e15a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28297%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22593-cwe-193-off-by-one-error-in-everest-38a504ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22593%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33397-cwe-601-url-redirection-to-untruste-c4b42fd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33397%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33413-cwe-862-missing-authorization-in-et-61b60199</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33413%3A%20CWE-862%3A%20Missing%20Authorization%20in%20etcd-io%20etcd&amp;severity=high&amp;id=69c53915f4197a8e3bcae392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-patch-high-severity-vulnerabilities-34793081</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c5389ef4197a8e3bcaa6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2389-cwe-79-improper-neutralization-of-in-e95028db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=69c53915f4197a8e3bcae383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1032-cwe-352-cross-site-request-forgery-c-1b8f5a85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1032%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themifyme%20Conditional%20Menus&amp;severity=medium&amp;id=69c53915f4197a8e3bcae374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2231-cwe-79-improper-neutralization-of-in-d90c4f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=high&amp;id=69c53915f4197a8e3bcae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2511-cwe-89-improper-neutralization-of-sp-f3faec51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2511%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20AI-Powered%20Support%20%26%20Ticketing%20System&amp;severity=high&amp;id=69c53915f4197a8e3bcae389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55261-cwe-284-improper-access-control-in--baab77f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55261%3A%20CWE-284%3A%20Improper%20Access%20Control.%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55262-cwe-798-use-of-hardcoded-credential-37d59e42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55262%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4877-cross-site-scripting-in-itsourcecode-604d0d38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4877%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4876-sql-injection-in-itsourcecode-free-h-ad659424</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4876%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55263-cwe-798-use-of-hardcoded-credential-b91db2da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55263%3A%20CWE-798%3A%20Use%20of%20Hardcoded%20Credentials%20in%20HCL%20Aftermarket%20DPC&amp;severity=high&amp;id=69c53915f4197a8e3bcae36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55264-cwe-613-insufficient-session-expira-997c0a5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55264%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c53915f4197a8e3bcae371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55265-cwe-200-exposure-of-sensitive-infor-68372ff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55266-cwe-384-session-fixation-in-hcl-aft-d67e947d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55266%3A%20CWE-384%3A%20Session%20Fixation%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55267-cwe-434-unrestricted-upload-of-file-effaa833</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55267%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55268-cwe-799-improper-control-of-interac-a9785c6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55268%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55269-cwe-521-weak-password-requirements--4fb9c015</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55269%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-caught-deep-within-telecom-backbon-b3568828</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Caught%20Deep%20Within%20Telecom%20Backbone%20Infrastructure&amp;severity=high&amp;id=69c52e06f4197a8e3bc6dce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55270-cwe-20-improper-input-validation-in-faaf28cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55270%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55271-cwe-113-improper-control-of-http-me-7d4c8383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55271%3A%20CWE-113%3A%20Improper%20Control%20of%20HTTP%20Messages%20and%20Headers%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55272-cwe-200-exposure-of-sensitive-infor-a28716b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55272%3A%20CWE-200-Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1961-vulnerability-in-red-hat-red-hat-sat-9642e238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1961%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69c531a1f4197a8e3bc7dda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55273-cwe-829-inclusion-of-functionality--e07fdb4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55273%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20Aftermarket%20DPC&amp;severity=medium&amp;id=69c5319ff4197a8e3bc7dd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55274-cwe-942-permissive-cross-domain-sec-e7c033c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55274%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c5319ff4197a8e3bc7dd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55275-cwe-557-concurrency-issues-is-a-cat-9231170e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55275%3A%20CWE-557%3A%20Concurrency%20Issues%20is%20a%20Category%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55276-cwe-200-exposure-of-sensitive-infor-18030854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55277-cwe-1104-use-of-unmaintained-third--aa83e0be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55277%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20HCL%20Aftermarket%20DPC&amp;severity=low&amp;id=69c531a1f4197a8e3bc7dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-multiple-vulnerabilities-in-ios-soft-c1715c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Multiple%20Vulnerabilities%20in%20IOS%20Software&amp;severity=high&amp;id=69c52a81f4197a8e3bc08f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4875-unrestricted-upload-in-itsourcecode--64bdb215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4875%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c52aaff4197a8e3bc10e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41359-cwe-428-unquoted-search-path-or-ele-581de0c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41359%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c52aaff4197a8e3bc10dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4887-off-by-one-error-in-red-hat-red-hat--b0d53159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4887%3A%20Off-by-one%20Error%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=69c531a1f4197a8e3bc7ddac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illuminating-voidlink-technical-analysis-of-the-vo-858d2e9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illuminating%20VoidLink%3A%20Technical%20analysis%20of%20the%20VoidLink%20rootkit%20framework&amp;severity=medium&amp;id=69c575383c064ed76f98c818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41368-cwe-428-unquoted-search-path-or-ele-6e2efc0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41368%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smallsrv%20Small%20HTTP&amp;severity=high&amp;id=69c51ff3f4197a8e3baa8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4809-cwe-434-unrestricted-upload-of-file--9d4d9e8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4809%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plank%20laravel-mediable&amp;severity=critical&amp;id=69c57a7f3c064ed76f9f9d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24068-cwe-306-missing-authentication-for--4e55fde7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24068%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Vienna%20Symphonic%20Library%20GmbH%20Vienna%20Assistant&amp;severity=high&amp;id=69c57a7f3c064ed76f9f9d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-redline-malware-administrator-extradited-t-54054e19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20RedLine%20Malware%20Administrator%20Extradited%20to%20US&amp;severity=medium&amp;id=69c50757f4197a8e3b57d4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-legitimate-surveys-to-link-to-mal-1b778cc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20legitimate%20surveys%20to%20link%20to%20malicious%20sites%20%7C%20Kaspersky%20official%20blog&amp;severity=high&amp;id=69c503f9f4197a8e3b5009f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4263-cwe-863-in-hijiffy-hijiffy-chatbot-8b422826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4263%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4262-cwe-863-in-hijiffy-hijiffy-chatbot-f2ca6e4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4262%3A%20CWE-863%20in%20HiJiffy%20HiJiffy%20Chatbot&amp;severity=medium&amp;id=69c5004ef4197a8e3b4e0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4862-buffer-overflow-in-utt-hiper-1250gw-40a2fb82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4862%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69c57a813c064ed76f9f9d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4861-stack-based-buffer-overflow-in-wavli-146cf306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4861%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69c57a813c064ed76f9f9d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4860-deserialization-in-648540858-wvp-gb2-3497b1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4860%3A%20Deserialization%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4850-sql-injection-in-code-projects-simpl-7c6222f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4850%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4849-cross-site-scripting-in-code-project-04fed99d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4849%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c4eb47f4197a8e3b1b37b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4874-server-side-request-forgery-ssrf-in--bac01e84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4874%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c4e45ef4197a8e3b077baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4848-cross-site-scripting-in-dameng100-mu-d6b7d599</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4848%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4dd2ff4197a8e3b036cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32680-incorrect-default-permissions-in-ra-38982bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32680%3A%20Incorrect%20default%20permissions%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28760-uncontrolled-search-path-element-in-f4dfdefd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28760%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=high&amp;id=69c4dd2ff4197a8e3b036ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4847-cross-site-scripting-in-dameng100-mu-5ccb2c60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4847%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1890-cwe-862-missing-authorization-in-lea-c5d9e609</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1890%3A%20CWE-862%20Missing%20Authorization%20in%20LeadConnector&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1430-cwe-79-cross-site-scripting-xss-in-w-525b9be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1430%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Lightbox%202&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15488-cwe-863-incorrect-authorization-in--8e7b0524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15488%3A%20CWE-863%20Incorrect%20Authorization%20in%20Responsive%20Plus&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15433-cwe-22-improper-limitation-of-a-pat-8ca8af04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15433%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shared%20Files&amp;severity=medium&amp;id=69c53917f4197a8e3bcae3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4846-cross-site-scripting-in-dameng100-mu-b3f0d512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4846%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4845-cross-site-scripting-in-dameng100-mu-4a854e54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4845%3A%20Cross%20Site%20Scripting%20in%20dameng100%20muucmf&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1206-cwe-639-authorization-bypass-through-4a5589d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1206%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=69c4cbeaf4197a8e3be7e17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4844-sql-injection-in-code-projects-onlin-007ab24e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4844%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4842-sql-injection-in-itsourcecode-online-aa2c2ede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4842%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4389-cwe-79-improper-neutralization-of-in-91fdf8a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4389%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20DSGVO%20snippet%20for%20Leaflet%20Map%20and%20its%20Extensions&amp;severity=medium&amp;id=69c4c10df4197a8e3be33f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33201-active-debug-code-in-green-house-co-51d82983</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33201%3A%20Active%20debug%20code%20in%20GREEN%20HOUSE%20CO.%2C%20LTD.%20Digital%20Photo%20Frame%20GH-WDF10A&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4841-sql-injection-in-code-projects-onlin-8238b60a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4841%3A%20SQL%20Injection%20in%20code-projects%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4840-os-command-injection-in-netcore-powe-abf3a5bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4840%3A%20OS%20Command%20Injection%20in%20Netcore%20Power%2015AX&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4278-cwe-79-improper-neutralization-of-in-e053026e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4329-cwe-79-improper-neutralization-of-in-7fadd817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Blackhole%20for%20Bad%20Bots&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4281-cwe-862-missing-authorization-in-tra-3757da8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4281%3A%20CWE-862%20Missing%20Authorization%20in%20trainingbusinesspros%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2931-cwe-269-improper-privilege-managemen-010fd6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2931%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=69c4b67cf4197a8e3bc62abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4331-cwe-862-missing-authorization-in-pr--0dab2dca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4331%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=69c4b67cf4197a8e3bc62aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4839-sql-injection-in-sourcecodester-food-e8aa90c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4839%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4838-sql-injection-in-sourcecodester-mala-615eeafb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4838%3A%20SQL%20Injection%20in%20SourceCodester%20Malawi%20Online%20Market&amp;severity=medium&amp;id=69c57a813c064ed76f9f9d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4075-cwe-79-improper-neutralization-of-in-12e2e055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Advanced%20FAQ%20Manager%20Lite&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1986-cwe-79-improper-neutralization-of-in-080d1d18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bakkbone%20FloristPress%20for%20Woo%20%E2%80%93%20Customize%20your%20eCommerce%20store%20for%20your%20Florist&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4335-cwe-79-improper-neutralization-of-in-06c1049a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69c574363c064ed76f968193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3328-cwe-502-deserialization-of-untrusted-c6e58efd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3328%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=69c574363c064ed76f96818d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15101-cwe-352-cross-site-request-forgery--69e6a66a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15101%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ASUS%20Router&amp;severity=high&amp;id=69c49a9bf4197a8e3ba4b858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4836-sql-injection-in-code-projects-accou-316a9d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4836%3A%20SQL%20Injection%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4835-cross-site-scripting-in-code-project-fa7a83cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4835%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Accounting%20System&amp;severity=medium&amp;id=69c49a9bf4197a8e3ba4b85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4484-cwe-862-missing-authorization-in-mas-b0ab7a1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4484%3A%20CWE-862%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20Online%20Course%20Builder%20for%20eLearning%2C%20LMS%20%26%20Education&amp;severity=critical&amp;id=69c574363c064ed76f96819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4833-uncontrolled-recursion-in-orc-discou-358572e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4833%3A%20Uncontrolled%20Recursion%20in%20Orc%20discount&amp;severity=medium&amp;id=69c57a813c064ed76f9f9da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4831-improper-authentication-in-kalcaddle-40f256df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4831%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33285-cwe-20-improper-input-validation-in-e876aad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33285%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33287-cwe-20-improper-input-validation-in-8d1f4372</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33287%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33942-cwe-502-deserialization-of-untruste-6acf0f28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33942%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33183-cwe-22-improper-limitation-of-a-pat-6fc6a028</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33183%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20saloonphp%20saloon&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33182-cwe-918-server-side-request-forgery-18e7372d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33182%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20saloonphp%20saloon&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4830-unrestricted-upload-in-kalcaddle-kod-a213e944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4830%3A%20Unrestricted%20Upload%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33526-cwe-416-use-after-free-in-squid-cac-5f2ea159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33526%3A%20CWE-416%3A%20Use%20After%20Free%20in%20squid-cache%20squid&amp;severity=critical&amp;id=69c4854ef4197a8e3b9c70cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33515-cwe-125-out-of-bounds-read-in-squid-bad315ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33515%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20squid-cache%20squid&amp;severity=medium&amp;id=69c4854ef4197a8e3b9c70c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32748-cwe-413-improper-resource-locking-i-9668aaa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32748%3A%20CWE-413%3A%20Improper%20Resource%20Locking%20in%20squid-cache%20squid&amp;severity=high&amp;id=69c4854ef4197a8e3b9c70ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-26-90d7bb1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-26&amp;severity=medium&amp;id=69c5cbec3c064ed76fe7358e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30463-na-586b440c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30463%3A%20n%2Fa&amp;severity=high&amp;id=69c589313c064ed76fb167c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29969-na-1728d200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29969%3A%20n%2Fa&amp;severity=medium&amp;id=69c589313c064ed76fb167bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30458-na-4904e2a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30458%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30457-na-d7294d25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30457%3A%20n%2Fa&amp;severity=critical&amp;id=69c582253c064ed76fa7cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30162-na-48435b40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30162%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7f3c064ed76f9f9d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29934-na-6cb2fe65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29934%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29933-na-76fc1d31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29933%3A%20n%2Fa&amp;severity=medium&amp;id=69c57a7d3c064ed76f9f9cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29905-na-f2c91621</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29905%3A%20n%2Fa&amp;severity=medium&amp;id=69c562cdf4197a8e3be49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29976-na-cc0463b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29976%3A%20n%2Fa&amp;severity=medium&amp;id=69c5583ef4197a8e3bdf81dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-26-e34c1331</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-26&amp;severity=medium&amp;id=69c5155ff4197a8e3b699407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-26-6fa2acb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-26&amp;severity=low&amp;id=69c5155ff4197a8e3b6993ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4826-sql-injection-in-sourcecodester-sale-014c0565</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4826%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c473c4f4197a8e3b95d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4758-cwe-22-improper-limitation-of-a-path-df4e4af3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c473c4f4197a8e3b95d0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4825-sql-injection-in-sourcecodester-sale-57e01f2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4825%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c465a0f4197a8e3b8c5c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaigns-targeting-windows-and-macos-c26c50a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaigns%20Targeting%20Windows%20and%20macOS&amp;severity=medium&amp;id=69c45b4af4197a8e3b8530f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4824-improper-privilege-management-in-ent-256ebce0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4824%3A%20Improper%20Privilege%20Management%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c45b4bf4197a8e3b853230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4823-information-disclosure-in-enter-soft-fe52e1e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4823%3A%20Information%20Disclosure%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=low&amp;id=69c45b4bf4197a8e3b853229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-almost-everything-again-march-2026-e-8a57b153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20(almost)%20everything%20again.%20March%202026%20edition.%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c4540cf4197a8e3b8345f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36187-cwe-532-insertion-of-sensitive-info-21a2100b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36187%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Knowledge%20Catalog%20Standard%20Cartridge&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14684-cwe-117-improper-output-neutralizat-675e266b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14684%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Maximo%20Application%20Suite%20-%20Monitor%20Component&amp;severity=medium&amp;id=69c45423f4197a8e3b8350cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14807-cwe-644-improper-neutralization-of--e705d38e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14807%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1015-cwe-918-server-side-request-forgery--fe2a9abf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1015%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44d04f4197a8e3b816de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1014-cwe-319-cleartext-transmission-of-se-5bb59961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1014%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2483-cwe-79-improper-neutralization-of-in-01b82064</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2483%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64648-cwe-319-cleartext-transmission-of-s-948f3d08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64648%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64647-cwe-1240-use-of-a-cryptographic-pri-9d2f9c2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64647%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b80833b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2484-cwe-79-improper-neutralization-of-in-8686e32a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2484%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b808347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64646-cwe-14-compiler-removal-of-code-to--9d00dd55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64646%3A%20CWE-14%20Compiler%20Removal%20of%20Code%20to%20Clear%20Buffers%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36440-cwe-522-insufficiently-protected-cr-ac354b6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36440%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4822-creation-of-temporary-file-with-inse-2bbaf2cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4822%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Enter%20Software%20Iperius%20Backup&amp;severity=high&amp;id=69c44986f4197a8e3b808396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36438-cwe-923-improper-restriction-of-com-1070ef1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36438%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c44983f4197a8e3b808332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36422-cwe-352-cross-site-request-forgery--9037caee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36422%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44983f4197a8e3b80832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36258-cwe-256-plaintext-storage-of-a-pass-144ff010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36258%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69c44983f4197a8e3b80832c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2485-cwe-79-improper-neutralization-of-in-d0e0e6f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2485%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33249-cwe-863-incorrect-authorization-in--7f6c995e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33249%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7fad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14974-cwe-639-authorization-bypass-throug-7e5352bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14974%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33223-cwe-290-authentication-bypass-by-sp-e3ccf04a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33223%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1262-cwe-209-generation-of-error-message--4ed78fae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1262%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33248-cwe-287-improper-authentication-in--a81f505e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33248%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c4460af4197a8e3b7facff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14917-cwe-1393-use-of-default-password-in-ab8c3ff9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14917%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14912-cwe-918-server-side-request-forgery-cb0e7d2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14915-cwe-200-exposure-of-sensitive-infor-533c205b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7facc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14810-cwe-613-insufficient-session-expira-0d27dc5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14810%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33222-cwe-285-improper-authorization-in-n-d2948671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33222%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c44608f4197a8e3b7facd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1561-cwe-918-server-side-request-forgery--adcc7a2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1561%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=69c44608f4197a8e3b7faccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14808-cwe-598-use-of-get-request-method-w-b05e7948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14808%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=low&amp;id=69c44608f4197a8e3b7facb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14790-cwe-522-insufficiently-protected-cr-373250bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14790%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12708-cwe-798-use-of-hard-coded-credentia-e429c055</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12708%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e9790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33247-cwe-215-insertion-of-sensitive-info-38b359f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33247%3A%20CWE-215%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c4427ef4197a8e3b7e9796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33219-cwe-770-allocation-of-resources-wit-c95e60aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33219%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33218-cwe-20-improper-input-validation-in-fea485f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33218%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33246-cwe-287-improper-authentication-in--c898d481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c43f15f4197a8e3b7dafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33217-cwe-863-incorrect-authorization-in--c7070ad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33217%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33216-cwe-256-plaintext-storage-of-a-pass-27b1c15c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33216%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29785-cwe-476-null-pointer-dereference-in-7dd3aed5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29785%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43f15f4197a8e3b7dafd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27889-cwe-190-integer-overflow-or-wraparo-32673245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20nats-io%20nats-server&amp;severity=high&amp;id=69c43b99f4197a8e3b7c5650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33751-cwe-90-improper-neutralization-of-s-b0a156ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33751%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33749-cwe-79-improper-neutralization-of-i-904c9e5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33749%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c430e5f4197a8e3b78e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33724-cwe-639-authorization-bypass-throug-8d5f5a1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33724%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33809-cwe-400-uncontrolled-resource-consu-beac3202</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33809%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fimage%20golang.org%2Fx%2Fimage%2Ftiff&amp;severity=medium&amp;id=69c42db5f4197a8e3b77dc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33722-cwe-863-incorrect-authorization-in--3e68670b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33722%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c477fbf4197a8e3b97b114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33720-cwe-863-incorrect-authorization-in--1556d918</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33720%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69c4427ef4197a8e3b7e979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33713-cwe-89-improper-neutralization-of-s-44a2cba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33713%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-pushes-remcos-rat-netsupport-r-ee8c4812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20pushes%20Remcos%20RAT%2C%20NetSupport%20RAT%2C%20StealC%2C%20and%20Sectop%20RAT%20(ArechClient2)%2C%20(Wed%2C%20Mar%2025th)&amp;severity=medium&amp;id=69c33747f4197a8e3bad16e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33696-cwe-1321-improperly-controlled-modi-9ddf2aba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33696%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c422f4f4197a8e3b7492f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33665-cwe-287-improper-authentication-in--29d56016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33665%3A%20CWE-287%3A%20Improper%20Authentication%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c422f4f4197a8e3b7492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33663-cwe-639-authorization-bypass-throug-7119d589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33663%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33660-cwe-94-improper-control-of-generati-e1c73d20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33660%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69c41f52f4197a8e3b733a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27496-cwe-908-use-of-uninitialized-resour-028f34c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27496%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69c41f52f4197a8e3b733a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2414-cwe-639-authorization-bypass-through-311195cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2414%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25645-cwe-377-insecure-temporary-file-in--0a7a2193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25645%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20psf%20requests&amp;severity=medium&amp;id=69c41848f4197a8e3b706bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29092-cwe-613-insufficient-session-expira-030605f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29092%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20Kiteworks%20Email%20Protection%20Gateway&amp;severity=medium&amp;id=69c41848f4197a8e3b706bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23636-cwe-434-unrestricted-upload-of-file-e86233b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23635-cwe-523-unprotected-transport-of-cr-3edcc72b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23635%3A%20CWE-523%3A%20Unprotected%20Transport%20of%20Credentials%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1712-cwe-266-incorrect-privilege-assignme-5bbca1c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1712%3A%20CWE-266%20Incorrect%20privilege%20assignment%20in%20HYPR%20Server&amp;severity=medium&amp;id=69c41848f4197a8e3b706bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-34085-cwe-193-off-by-one-error-in-fontcon-a1337185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-34085%3A%20CWE-193%20Off-by-one%20Error%20in%20fontconfig%20project%20fontconfig&amp;severity=medium&amp;id=69ceb0a7e6bfc5ba1df38204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanization-of-trivy-checkmarx-and-litellm-solut-76ab2283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanization%20of%20Trivy%2C%20Checkmarx%2C%20and%20LiteLLM%20solutions%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c40dfef4197a8e3b6b43ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32573-improper-control-of-generation-of-c-2c0edccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32573%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=69c41186f4197a8e3b6d7015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32567-improper-limitation-of-a-pathname-t-3382e216</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32567%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icopydoc%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=69c41186f4197a8e3b6d7012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32562-missing-authorization-in-wp-folio-t-f0e51ed8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32562%3A%20Missing%20Authorization%20in%20WP%20Folio%20Team%20PPWP&amp;severity=medium&amp;id=69c41186f4197a8e3b6d700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32546-missing-authorization-in-stellarwp--93cf40ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32546%3A%20Missing%20Authorization%20in%20StellarWP%20Restrict%20Content&amp;severity=high&amp;id=69c41186f4197a8e3b6d700c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32545-improper-neutralization-of-input-du-8a5633fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Taboola%20Taboola%20Pixel&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32544-improper-neutralization-of-input-du-b8adb14f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OOPSpam%20Team%20OOPSpam%20Anti-Spam&amp;severity=high&amp;id=69c41184f4197a8e3b6d6feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32542-improper-neutralization-of-input-du-830f7ea0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32541-missing-authorization-in-premmerce--c97b7d13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32541%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Redirect%20Manager&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32539-improper-neutralization-of-special--8d618b97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32538-insertion-of-sensitive-information--6016ed45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32538%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Noor%20Alam%20SMTP%20Mailer&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32537-improper-control-of-filename-for-in-c5fa8348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nK%20Visual%20Portfolio%2C%20Photo%20Gallery%20%26%20Post%20Grid&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32536-unrestricted-upload-of-file-with-da-30e15f7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32536%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20halfdata%20Green%20Downloads&amp;severity=critical&amp;id=69c41184f4197a8e3b6d6fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32535-authorization-bypass-through-user-c-fbf0d9b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32535%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=medium&amp;id=69c41184f4197a8e3b6d6fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32534-improper-neutralization-of-special--17829d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32534%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=69c41184f4197a8e3b6d6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32532-improper-neutralization-of-input-du-ac5edecc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32531-improper-control-of-filename-for-in-3d6efdb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kunco&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32530-incorrect-privilege-assignment-in-w-8827c7ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32530%3A%20Incorrect%20Privilege%20Assignment%20in%20WPFunnels%20Creator%20LMS&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32529-improper-neutralization-of-input-du-a9882ad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32528-improper-neutralization-of-input-du-976fcd8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32527-missing-authorization-in-crm-perks--eda475e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32527%3A%20Missing%20Authorization%20in%20CRM%20Perks%20WP%20Insightly%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=medium&amp;id=69c41182f4197a8e3b6d6f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32526-improper-neutralization-of-input-du-eb7cf27d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Abandoned%20Cart%20Recovery%20for%20WooCommerce&amp;severity=high&amp;id=69c41182f4197a8e3b6d6f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32525-improper-control-of-generation-of-c-10cda367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32525%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20JetFormBuilder&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32524-unrestricted-upload-of-file-with-da-ddbe7892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32524%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20Photo%20Engine&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32523-unrestricted-upload-of-file-with-da-30c41908</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32523%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20denishua%20WPJAM%20Basic&amp;severity=critical&amp;id=69c41182f4197a8e3b6d6f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32522-improper-limitation-of-a-pathname-t-fa6877c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32522%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=high&amp;id=69c41180f4197a8e3b6d6f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32521-improper-neutralization-of-input-du-4a72f545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32520-incorrect-privilege-assignment-in-a-5d9f8707</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32520%3A%20Incorrect%20Privilege%20Assignment%20in%20Andrew%20Munro%20%2F%20AffiliateWP%20RewardsWP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32519-incorrect-privilege-assignment-in-b-8aea8889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32519%3A%20Incorrect%20Privilege%20Assignment%20in%20Bit%20Apps%20Bit%20SMTP&amp;severity=critical&amp;id=69c41180f4197a8e3b6d6efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32518-improper-neutralization-of-input-du-9053212d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Gaea&amp;severity=high&amp;id=69c41180f4197a8e3b6d6efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32517-improper-neutralization-of-input-du-a0590be1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32516-improper-neutralization-of-special--35bb8d98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32515-missing-authorization-in-kamleshyad-ed9cf013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32515%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=69c41180f4197a8e3b6d6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32514-missing-authorization-in-anton-voyt-091d3c0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32514%3A%20Missing%20Authorization%20in%20Anton%20Voytenko%20Petitioner&amp;severity=medium&amp;id=69c41180f4197a8e3b6d6eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32513-deserialization-of-untrusted-data-i-d00dee70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32513%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Miguel%20Useche%20JS%20Archive%20List&amp;severity=high&amp;id=69c41180f4197a8e3b6d6eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32512-deserialization-of-untrusted-data-i-b9608d49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32512%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Pelicula&amp;severity=critical&amp;id=69c4117ef4197a8e3b6d6a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32511-deserialization-of-untrusted-data-i-e2a4eb69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32511%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20St%C3%A5l&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32510-deserialization-of-untrusted-data-i-81fc87c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Kamperen&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32509-deserialization-of-untrusted-data-i-91be25ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32509%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Gracey&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32508-deserialization-of-untrusted-data-i-aaac9dad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32508%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mikado-Themes%20Halstein&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32507-deserialization-of-untrusted-data-i-86a48eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Elated-Themes%20Leroux&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32506-deserialization-of-untrusted-data-i-11a3f625</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32506%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Edge-Themes%20Archicon&amp;severity=medium&amp;id=69c4117ef4197a8e3b6d6a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32505-improper-control-of-filename-for-in-756108d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32505%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Kiddy&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32504-improper-control-of-filename-for-in-eb99558c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20VintWood&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32503-improper-control-of-filename-for-in-db36e62f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20Trendustry&amp;severity=high&amp;id=69c4117ef4197a8e3b6d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32502-deserialization-of-untrusted-data-i-259fb77d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Select-Themes%20Borgholm&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d698e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32501-missing-authorization-in-wp-configu-85e5ff6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32501%3A%20Missing%20Authorization%20in%20wp-configurator%20WP%20Configurator%20Pro&amp;severity=high&amp;id=69c4117bf4197a8e3b6d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32500-improper-control-of-filename-for-in-f87d3394</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32500%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CreativeWS%20MetaMax&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32499-improper-neutralization-of-special--f2e4594a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32499%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20QuantumCloud%20ChatBot&amp;severity=critical&amp;id=69c4117bf4197a8e3b6d6985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32498-missing-authorization-in-metagauss--fd323904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32498%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32497-weak-authentication-in-pickplugins--65a7d26f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32497%3A%20Weak%20Authentication%20in%20PickPlugins%20User%20Verification&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32496-improper-limitation-of-a-pathname-t-f9367de2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32496%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NYSL%20Spam%20Protect%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69c4117bf4197a8e3b6d697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32495-missing-authorization-in-link-softw-0177db45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32495%3A%20Missing%20Authorization%20in%20Link%20Software%20LLC%20WP%20Terms%20Popup&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32494-improper-neutralization-of-input-du-0a3167aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32494%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=high&amp;id=69c4117bf4197a8e3b6d6976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32493-improper-neutralization-of-input-du-7e045118</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=69c4117bf4197a8e3b6d6973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32492-authentication-bypass-by-spoofing-i-48fca6f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32492%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32491-improper-neutralization-of-input-du-4b1d4953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32490-improper-neutralization-of-input-du-a19709b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20TripAdvisor%20Review%20Slider&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32489-missing-authorization-in-bplugins-b-e50c755d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32489%3A%20Missing%20Authorization%20in%20bPlugins%20B%20Blocks&amp;severity=medium&amp;id=69c41179f4197a8e3b6d693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32488-incorrect-privilege-assignment-in-w-e8ce43f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32488%3A%20Incorrect%20Privilege%20Assignment%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=69c41179f4197a8e3b6d693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32485-missing-authorization-in-wedevs-wp--d23f13b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32485%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=high&amp;id=69c41179f4197a8e3b6d6939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32484-deserialization-of-untrusted-data-i-c5fa625c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32484%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20weForms&amp;severity=high&amp;id=69c41179f4197a8e3b6d6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32483-missing-authorization-in-codepeople-f65c56f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32483%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=69c41179f4197a8e3b6d6933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32482-unrestricted-upload-of-file-with-da-5ecc0844</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32482%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20deothemes%20Ona&amp;severity=critical&amp;id=69c41179f4197a8e3b6d6930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32441-missing-authorization-in-webtoffee--d04ac58b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32441%3A%20Missing%20Authorization%20in%20WebToffee%20Comments%20Import%20%26%20Export&amp;severity=high&amp;id=69c41179f4197a8e3b6d692d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31921-missing-authorization-in-devteam-ha-ce279ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31921%3A%20Missing%20Authorization%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=high&amp;id=69c41177f4197a8e3b6d6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31920-improper-neutralization-of-special--f0f4e53d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31920%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devteam%20HaywoodTech%20Product%20Rearrange%20for%20WooCommerce&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31914-improper-neutralization-of-input-du-4e199ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hookandhook%20WP%20Courses%20LMS&amp;severity=medium&amp;id=69c41177f4197a8e3b6d6912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31913-improper-limitation-of-a-pathname-t-190f10fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31913%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Whitebox-Studio%20Scape&amp;severity=high&amp;id=69c41177f4197a8e3b6d690f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27095-deserialization-of-untrusted-data-i-3a0c4341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27095%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=critical&amp;id=69c41177f4197a8e3b6d690c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27088-improper-neutralization-of-input-du-10a8339d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Darna%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27087-improper-neutralization-of-input-du-c3c61ba6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Wolverine%20Framework&amp;severity=high&amp;id=69c41177f4197a8e3b6d6906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27084-deserialization-of-untrusted-data-i-e6ad1406</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Buisson&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27083-deserialization-of-untrusted-data-i-fb46cf45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Work%20%26%20Travel%20Company&amp;severity=critical&amp;id=69c41177f4197a8e3b6d6900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27082-deserialization-of-untrusted-data-i-3c16b289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Love%20Story&amp;severity=critical&amp;id=69c41177f4197a8e3b6d68fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27081-improper-control-of-filename-for-in-b9e8b6ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Rosebud&amp;severity=high&amp;id=69c41174f4197a8e3b6d686b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27080-improper-control-of-filename-for-in-dd489a67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Deston&amp;severity=high&amp;id=69c41174f4197a8e3b6d6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27079-improper-control-of-filename-for-in-5336a0a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Amfissa&amp;severity=high&amp;id=69c41174f4197a8e3b6d6865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27078-improper-control-of-filename-for-in-72ce9988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Emaurri&amp;severity=high&amp;id=69c41174f4197a8e3b6d6862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27077-improper-control-of-filename-for-in-40b7dc68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20MultiOffice&amp;severity=high&amp;id=69c41174f4197a8e3b6d685f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27076-improper-control-of-filename-for-in-b31dff94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20LuxeDrive&amp;severity=high&amp;id=69c41174f4197a8e3b6d685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27075-improper-control-of-filename-for-in-9116c16b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Belfort&amp;severity=high&amp;id=69c41174f4197a8e3b6d6859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27073-use-of-hard-coded-credentials-in-ad-760a6dc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27073%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Addi%20Addi%20%26%238211%3B%20Cuotas%20que%20se%20adaptan%20a%20ti&amp;severity=high&amp;id=69c41174f4197a8e3b6d6856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27071-missing-authorization-in-arraytics--f16ab7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27071%3A%20Missing%20Authorization%20in%20Arraytics%20WPCafe&amp;severity=critical&amp;id=69c41174f4197a8e3b6d6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27054-improper-neutralization-of-input-du-761ca3e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Soledad%20Data%20Migrator&amp;severity=high&amp;id=69c41174f4197a8e3b6d6850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27051-incorrect-privilege-assignment-in-u-035d2e67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27051%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Golo&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27049-authentication-bypass-using-an-alte-24d72b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27049%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20NooTheme%20Jobica%20Core&amp;severity=critical&amp;id=69c41172f4197a8e3b6d683c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27048-improper-control-of-filename-for-in-8b7ba223</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27047-improper-control-of-filename-for-in-845e4f48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly%20Core&amp;severity=high&amp;id=69c41172f4197a8e3b6d6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27046-missing-authorization-in-kaira-stor-444e1023</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27046%3A%20Missing%20Authorization%20in%20Kaira%20StoreCustomizer&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27045-deserialization-of-untrusted-data-i-a6914a73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27045%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbthemes%20WooCommerce%20Infinite%20Scroll&amp;severity=high&amp;id=69c41172f4197a8e3b6d6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27044-improper-control-of-generation-of-c-c10f38bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27044%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TotalSuite%20Total%20Poll%20Lite&amp;severity=critical&amp;id=69c41172f4197a8e3b6d682d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27040-improper-limitation-of-a-pathname-t-dc8cd6ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27040%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d682a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27039-improper-neutralization-of-special--9707ccfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27039%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20WZone&amp;severity=high&amp;id=69c41172f4197a8e3b6d6827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25469-missing-authorization-in-viabill-fo-0b2405f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25469%3A%20Missing%20Authorization%20in%20ViaBill%20for%20WooCommerce%20ViaBill%20%26%238211%3B%20WooCommerce&amp;severity=medium&amp;id=69c41172f4197a8e3b6d6824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25465-improper-neutralization-of-input-du-b9f38aef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Multi%20View%20Event%20Calendar&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25464-improper-control-of-filename-for-in-9d7d7430</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25461-improper-neutralization-of-input-du-d64bbe4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25460-missing-authorization-in-liquidthem-dc3e13e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25460%3A%20Missing%20Authorization%20in%20LiquidThemes%20Ave%20Core&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25458-improper-control-of-filename-for-in-993290d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25458%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Moments&amp;severity=high&amp;id=69c41170f4197a8e3b6d67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25457-improper-control-of-filename-for-in-027ff191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Mixtape&amp;severity=high&amp;id=69c41170f4197a8e3b6d67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25456-missing-authorization-in-aarsiv-gro-66b0cf89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25456%3A%20Missing%20Authorization%20in%20Aarsiv%20Groups%20Automated%20FedEx%20live%2Fmanual%20rates%20with%20shipping%20labels&amp;severity=high&amp;id=69c41170f4197a8e3b6d67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25455-missing-authorization-in-pickplugin-51114f3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25455%3A%20Missing%20Authorization%20in%20PickPlugins%20Product%20Slider%20for%20WooCommerce&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25454-missing-authorization-in-mvpthemes--168504b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25454%3A%20Missing%20Authorization%20in%20MVPThemes%20The%20League&amp;severity=medium&amp;id=69c41170f4197a8e3b6d67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25452-improper-neutralization-of-input-du-98103dff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDO%20Remoji&amp;severity=high&amp;id=69c41170f4197a8e3b6d67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25447-improper-control-of-generation-of-c-a962fb02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25447%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jonathan%20Daggerhart%20Widget%20Wrangler&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d676b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25437-missing-authorization-in-gzseo-37f57a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25437%3A%20Missing%20Authorization%20in%20GZSEO&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25435-improper-neutralization-of-input-du-6e8a091b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25435%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25430-missing-authorization-in-crm-perks--2f7a8884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25430%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Mailchimp%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d6762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25429-deserialization-of-untrusted-data-i-c090ef86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25429%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdive%20Nexa%20Blocks&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d675f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25417-improper-neutralization-of-input-du-db9ee3e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25417%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=medium&amp;id=69c4116ef4197a8e3b6d675c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25414-incorrect-privilege-assignment-in-i-ae58ac67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25414%3A%20Incorrect%20Privilege%20Assignment%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25413-unrestricted-upload-of-file-with-da-6b6e6389</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25413%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=critical&amp;id=69c4116ef4197a8e3b6d6756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25406-authentication-bypass-using-an-alte-113a07b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25406%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themeum%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25401-missing-authorization-in-arni-cinco-2a8cc6d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25401%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=high&amp;id=69c4116ef4197a8e3b6d6750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25400-deserialization-of-untrusted-data-i-e01202e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25400%3A%20Deserialization%20of%20Untrusted%20Data%20in%20thememount%20Apicona&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25398-missing-authorization-in-webilia-in-56d79e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25398%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Vertex%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d6694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25397-path-traversal-in-snowray-software--101897ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25397%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Snowray%20Software%20File%20Uploader%20for%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25396-missing-authorization-in-coderpress-f1f55866</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25396%3A%20Missing%20Authorization%20in%20CoderPress%20Commerce%20Coinbase%20For%20WooCommerce&amp;severity=high&amp;id=69c4116bf4197a8e3b6d668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25390-missing-authorization-in-saad-iqbal-30d5d6a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25390%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=medium&amp;id=69c4116bf4197a8e3b6d668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25383-improper-neutralization-of-input-du-ad52f22e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25382-improper-control-of-filename-for-in-b1a3f429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25382%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20IdealAuto&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25381-improper-control-of-filename-for-in-bf3ae8f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20LoveDate&amp;severity=high&amp;id=69c4116bf4197a8e3b6d6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25380-improper-control-of-filename-for-in-4e514365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Feedy&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25379-improper-control-of-filename-for-in-41f5b03d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20StreamVid&amp;severity=high&amp;id=69c4116bf4197a8e3b6d667c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25377-improper-neutralization-of-special--774b684d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25377%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=critical&amp;id=69c41169f4197a8e3b6d6605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25376-improper-neutralization-of-input-du-2017ea9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20Addon%20Jobsearch%20Chat&amp;severity=high&amp;id=69c41169f4197a8e3b6d6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25373-improper-neutralization-of-input-du-50c7553d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25373%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProgressionStudios%20Vayvo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25371-improper-neutralization-of-special--46b7e8b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20King-Theme%20Lumise%20Product%20Designer&amp;severity=null&amp;id=69c41169f4197a8e3b6d65fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25366-improper-control-of-generation-of-c-95f22122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25366%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Themeisle%20Woody%20ad%20snippets&amp;severity=critical&amp;id=69c41169f4197a8e3b6d65f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25365-missing-authorization-in-zgr-karala-13cb1701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25365%3A%20Missing%20Authorization%20in%20%C3%96zg%C3%BCr%20KARALAR%20Kargo%20Takip&amp;severity=medium&amp;id=69c41169f4197a8e3b6d65f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25361-improper-neutralization-of-input-du-4f4fc631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25360-deserialization-of-untrusted-data-i-d79678be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25360%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Vex&amp;severity=high&amp;id=69c41169f4197a8e3b6d65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25359-deserialization-of-untrusted-data-i-e2af6acf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25359%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Pendulum&amp;severity=high&amp;id=69c41169f4197a8e3b6d65ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25358-deserialization-of-untrusted-data-i-869f82c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25358%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Meloo&amp;severity=high&amp;id=69c41169f4197a8e3b6d65e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25357-authentication-bypass-using-an-alte-e7be9ed2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25357%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=high&amp;id=69c41167f4197a8e3b6d65d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25356-improper-neutralization-of-input-du-aedbab8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Yobazar&amp;severity=high&amp;id=69c41167f4197a8e3b6d65cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25355-improper-neutralization-of-input-du-75f9668b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Sanzo&amp;severity=medium&amp;id=69c41167f4197a8e3b6d65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25354-improper-neutralization-of-input-du-58fc7554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Reebox&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25353-improper-neutralization-of-input-du-b074cc58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Nooni&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25352-improper-neutralization-of-input-du-3bf1831f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyDecor&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25351-improper-neutralization-of-input-du-ab648dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20MyMedi&amp;severity=high&amp;id=69c41167f4197a8e3b6d65c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25350-improper-neutralization-of-input-du-cf606794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Miti&amp;severity=high&amp;id=69c41167f4197a8e3b6d65bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25349-improper-neutralization-of-input-du-ed2d256e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Loobek&amp;severity=high&amp;id=69c41167f4197a8e3b6d65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25347-improper-neutralization-of-input-du-88ea1079</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Acato%20WP%20REST%20Cache&amp;severity=high&amp;id=69c41167f4197a8e3b6d65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25346-improper-neutralization-of-input-du-d7dfaca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20FAQ%20Builder%20AYS&amp;severity=high&amp;id=69c41165f4197a8e3b6d653d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25345-improper-validation-of-specified-qu-69a2904c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25345%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25344-exposure-of-sensitive-system-inform-64e99ef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25344%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20Review%20Schema&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25342-improper-neutralization-of-input-du-75a343ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kutethemes%20Boutique&amp;severity=high&amp;id=69c41165f4197a8e3b6d6533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25341-improper-neutralization-of-input-du-de6a8483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RSJoomla!%20RSFirewall!&amp;severity=high&amp;id=69c41165f4197a8e3b6d6530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25340-improper-neutralization-of-special--f22658f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25340%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=critical&amp;id=69c41165f4197a8e3b6d6527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25339-insertion-of-sensitive-information--fdbd3e98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25339%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69c41165f4197a8e3b6d6523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25334-incorrect-privilege-assignment-in-w-09e2a0d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25334%3A%20Incorrect%20Privilege%20Assignment%20in%20wordpresschef%20Salon%20Booking%20System%20Pro&amp;severity=high&amp;id=69c41165f4197a8e3b6d6520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25328-improper-limitation-of-a-pathname-t-501c9a47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25328%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20add-ons.org%20Product%20File%20Upload%20for%20WooCommerce&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25327-missing-authorization-in-rustaurius-33400d06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25327%3A%20Missing%20Authorization%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=69c41165f4197a8e3b6d651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25317-missing-authorization-in-tychesoftw-01e3cefb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25317%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=high&amp;id=69c41163f4197a8e3b6d6267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25309-missing-authorization-in-publishpre-c18d5b56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25309%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=high&amp;id=69c41163f4197a8e3b6d6264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25306-improper-neutralization-of-input-du-407c5d8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=69c41163f4197a8e3b6d6261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25304-improper-neutralization-of-input-du-3a5b82f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Jaroti&amp;severity=high&amp;id=69c41163f4197a8e3b6d625e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25035-authentication-bypass-using-an-alte-6dd433fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25035%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=critical&amp;id=69c41163f4197a8e3b6d625b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25034-missing-authorization-in-iqonic-des-53bb8eb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25034%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20KiviCare&amp;severity=medium&amp;id=69c41163f4197a8e3b6d6258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25033-improper-neutralization-of-input-du-fc49554a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uixthemes%20Motta%20Addons&amp;severity=high&amp;id=69c41163f4197a8e3b6d6255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25032-deserialization-of-untrusted-data-i-9bca17dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25032%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Ricky&amp;severity=critical&amp;id=69c41163f4197a8e3b6d6252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25031-deserialization-of-untrusted-data-i-4588f14a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25031%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Tasty%20Daily&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25030-deserialization-of-untrusted-data-i-0109f9ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25030%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20Goldish&amp;severity=critical&amp;id=69c41163f4197a8e3b6d624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25029-deserialization-of-untrusted-data-i-e68eb6ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25029%3A%20Deserialization%20of%20Untrusted%20Data%20in%20park_of_ideas%20KIDZ&amp;severity=critical&amp;id=69c41161f4197a8e3b6d6200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25026-missing-authorization-in-radiusthem-020ee7c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25026%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25025-improper-neutralization-of-input-du-08bd84c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=high&amp;id=69c41161f4197a8e3b6d61fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25018-improper-neutralization-of-input-du-acecd365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25017-improper-control-of-filename-for-in-23c8041c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stmcan%20NaturaLife%20Extensions&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25013-improper-neutralization-of-input-du-5848b46d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WHMCSdes%20Phox%20Hosting&amp;severity=high&amp;id=69c41161f4197a8e3b6d61f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25009-missing-authorization-in-raratheme--b64d4e55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25009%3A%20Missing%20Authorization%20in%20raratheme%20Education%20Zone&amp;severity=medium&amp;id=69c41161f4197a8e3b6d61ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25007-improper-neutralization-of-special--a4ed9879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25007%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=high&amp;id=69c41161f4197a8e3b6d61eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25002-authentication-bypass-using-an-alte-c78d2045</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25002%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ThimPress%20LearnPress%20%26%238211%3B%20Sepay%20Payment&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25001-improper-control-of-generation-of-c-ae6f032c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=high&amp;id=69c41161f4197a8e3b6d61e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24993-improper-neutralization-of-special--b883dbcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24989-deserialization-of-untrusted-data-i-0edb2e84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24989%3A%20Deserialization%20of%20Untrusted%20Data%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=critical&amp;id=69c4115ef4197a8e3b6d6120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24987-missing-authorization-in-activity-l-48712d63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24987%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20System%20Log&amp;severity=medium&amp;id=69c4115ef4197a8e3b6d611d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24983-improper-neutralization-of-input-du-8a35f7d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UpSolution%20UpSolution%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d611a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24981-deserialization-of-untrusted-data-i-1a27f81f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24981%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24980-improper-neutralization-of-input-du-1df2a693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Visionary%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24979-improper-neutralization-of-input-du-023f42da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24978-deserialization-of-untrusted-data-i-03d2a2f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24978%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Jobica%20Core&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24977-improper-neutralization-of-special--9ccd0146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24977%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d610b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24976-deserialization-of-untrusted-data-i-46cea663</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24976%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115ef4197a8e3b6d6108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24975-improper-neutralization-of-input-du-0f06049c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Organici%20Library&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24974-deserialization-of-untrusted-data-i-4f8b54a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24974%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24973-improper-neutralization-of-input-du-1a6da9e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20CitiLights&amp;severity=high&amp;id=69c4115bf4197a8e3b6d602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24972-missing-authorization-in-elated-the-25a8605d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24972%3A%20Missing%20Authorization%20in%20Elated-Themes%20Elated%20Listing&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24971-incorrect-privilege-assignment-in-e-e65fc594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24971%3A%20Incorrect%20Privilege%20Assignment%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=69c4115bf4197a8e3b6d6027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24970-improper-limitation-of-a-pathname-t-d928e49c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24970%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Energox&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24969-improper-limitation-of-a-pathname-t-073273ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24969%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designingmedia%20Instant%20VA&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24964-server-side-request-forgery-ssrf-in-d35e9aca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24964%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69c4115bf4197a8e3b6d601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24391-improper-neutralization-of-input-du-8ccacf79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20Car%20Dealer&amp;severity=high&amp;id=69c4115bf4197a8e3b6d601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24382-missing-authorization-in-wproyal-ne-1ebfd1e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24382%3A%20Missing%20Authorization%20in%20wproyal%20News%20Magazine%20X&amp;severity=high&amp;id=69c4115bf4197a8e3b6d6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24378-deserialization-of-untrusted-data-i-c4842179</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24378%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Metagauss%20EventPrime&amp;severity=critical&amp;id=69c41159f4197a8e3b6d5335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24376-missing-authorization-in-javier-cas-3689cba3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24376%3A%20Missing%20Authorization%20in%20Javier%20Casares%20WPVulnerability&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24373-incorrect-privilege-assignment-in-m-6a717786</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24373%3A%20Incorrect%20Privilege%20Assignment%20in%20Metagauss%20RegistrationMagic&amp;severity=high&amp;id=69c41159f4197a8e3b6d532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24372-authentication-bypass-by-spoofing-i-e801fb02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24372%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20WP%20Swings%20Subscriptions%20for%20WooCommerce&amp;severity=high&amp;id=69c41159f4197a8e3b6d5329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24370-improper-neutralization-of-input-du-a2a0caf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24370%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theme-one%20The%20Grid&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24369-missing-authorization-in-theme-one--f3e247a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24369%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=high&amp;id=69c41159f4197a8e3b6d5322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24364-missing-authorization-in-wedevs-wp--d6b24059</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24364%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=medium&amp;id=69c41159f4197a8e3b6d531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24363-missing-authorization-in-loopus-wp--d34c4544</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24363%3A%20Missing%20Authorization%20in%20loopus%20WP%20Cost%20Estimation%20%26%20Payment%20Forms%20Builder&amp;severity=high&amp;id=69c41159f4197a8e3b6d531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24362-missing-authorization-in-bdthemes-u-661e960a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24362%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Post%20Kit&amp;severity=medium&amp;id=69c41159f4197a8e3b6d5319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24359-authentication-bypass-using-an-alte-949b7d59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24359%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=69c41159f4197a8e3b6d5316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23979-improper-neutralization-of-input-du-b95473dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23977-missing-authorization-in-wpfactory--09d6c217</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23977%3A%20Missing%20Authorization%20in%20WPFactory%20Helpdesk%20Support%20Ticket%20System%20for%20WooCommerce&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23973-improper-neutralization-of-input-du-e36b0bae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Golo&amp;severity=high&amp;id=69c41156f4197a8e3b6d52a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23972-missing-authorization-in-magepeople-6a39edcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23972%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=medium&amp;id=69c41156f4197a8e3b6d529f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23971-deserialization-of-untrusted-data-i-107d0db3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23971%3A%20Deserialization%20of%20Untrusted%20Data%20in%20xtemos%20WoodMart&amp;severity=null&amp;id=69c41156f4197a8e3b6d529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23807-improper-neutralization-of-input-du-e08c0582</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=high&amp;id=69c41156f4197a8e3b6d5299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23806-missing-authorization-in-blueglass--7be7b6a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23806%3A%20Missing%20Authorization%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=high&amp;id=69c41156f4197a8e3b6d5296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22524-improper-neutralization-of-input-du-722e83cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Legacy%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22523-improper-neutralization-of-input-du-2f292154</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Ultra%20WordPress%20Admin&amp;severity=high&amp;id=69c41156f4197a8e3b6d5290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22520-improper-neutralization-of-input-du-bf44ecfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=high&amp;id=69c41156f4197a8e3b6d528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22516-improper-control-of-filename-for-in-411fc406</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22516%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wizor&apos;s&amp;severity=high&amp;id=69c41154f4197a8e3b6d521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22515-improper-control-of-filename-for-in-92e1df77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20VegaDays&amp;severity=high&amp;id=69c41154f4197a8e3b6d521a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22514-improper-control-of-filename-for-in-20e19566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22514%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Unica&amp;severity=high&amp;id=69c41154f4197a8e3b6d5217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22513-improper-control-of-filename-for-in-1c531a8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22513%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Triompher&amp;severity=high&amp;id=69c41154f4197a8e3b6d5214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22512-improper-control-of-filename-for-in-602d5c6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22512%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Roisin&amp;severity=high&amp;id=69c41154f4197a8e3b6d5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22511-improper-control-of-filename-for-in-deff7abf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22511%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20NeoBeat&amp;severity=high&amp;id=69c41154f4197a8e3b6d520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22510-deserialization-of-untrusted-data-i-194f8c21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Melody&amp;severity=high&amp;id=69c41154f4197a8e3b6d520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22509-improper-control-of-filename-for-in-b5770cc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gioia&amp;severity=high&amp;id=69c41154f4197a8e3b6d5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22508-improper-control-of-filename-for-in-57f9b376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Dentalux&amp;severity=high&amp;id=69c41154f4197a8e3b6d5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22507-deserialization-of-untrusted-data-i-af73ebf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Beelove&amp;severity=critical&amp;id=69c41154f4197a8e3b6d5202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22506-improper-control-of-filename-for-in-9c54f3e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Amoli&amp;severity=high&amp;id=69c41151f4197a8e3b6d5199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22505-deserialization-of-untrusted-data-i-3904281b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22505%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Morning%20Records&amp;severity=high&amp;id=69c41151f4197a8e3b6d5196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22504-improper-control-of-filename-for-in-e912a8a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22504%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ProLingua&amp;severity=high&amp;id=69c41151f4197a8e3b6d5193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22503-improper-control-of-filename-for-in-7fb487ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22503%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nelson&amp;severity=high&amp;id=69c41151f4197a8e3b6d5190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22502-improper-control-of-filename-for-in-b429c1bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22502%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mr.%20Cobbler&amp;severity=high&amp;id=69c41151f4197a8e3b6d518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22500-deserialization-of-untrusted-data-i-6b3e8a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22500%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20m2%20%7C%20Construction%20and%20Tools%20Store&amp;severity=critical&amp;id=69c41151f4197a8e3b6d518a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22499-improper-control-of-filename-for-in-e88a1c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Lella&amp;severity=high&amp;id=69c41151f4197a8e3b6d5187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22498-improper-control-of-filename-for-in-8cb213f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22498%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69c41151f4197a8e3b6d5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22496-improper-control-of-filename-for-in-3fd5999d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hypnotherapy&amp;severity=high&amp;id=69c41151f4197a8e3b6d5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22495-improper-control-of-filename-for-in-e572e336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22495%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Greenville&amp;severity=high&amp;id=69c41151f4197a8e3b6d517e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22494-improper-control-of-filename-for-in-108280d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Good%20Homes&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22493-improper-control-of-filename-for-in-85abbaf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22493%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Gaspard&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22491-improper-neutralization-of-input-du-c9c8f055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22485-missing-authorization-in-ruhul-amin-fe036a67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22485%3A%20Missing%20Authorization%20in%20Ruhul%20Amin%20My%20Album%20Gallery&amp;severity=medium&amp;id=69c4114ff4197a8e3b6d50b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22484-improper-neutralization-of-special--ea184701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22484%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pebas%20Lisfinity%20Core&amp;severity=critical&amp;id=69c4114ff4197a8e3b6d50b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22480-deserialization-of-untrusted-data-i-beede38d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22480%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22448-improper-limitation-of-a-pathname-t-60ea4cb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22448%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flexcubed%20PitchPrint&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69358-missing-authorization-in-metagauss--bf9d4e77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69358%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69347-authorization-bypass-through-user-c-13002512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69347%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Convers%20Lab%20WPSubscription&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69096-improper-neutralization-of-input-du-080c5391</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Zorka&amp;severity=high&amp;id=69c4114ff4197a8e3b6d50a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20108-improper-neutralization-of-input-du-72c89549</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20112-improper-neutralization-of-input-du-a16672bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20113-improper-neutralization-of-crlf-seq-c2135bf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20114-improper-validation-of-syntactic-co-57e09085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20114%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20115-cleartext-transmission-of-sensitive-2338cc47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20115%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a67f4197a8e3b699a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20083-improper-handling-of-extra-paramete-30a02b67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20083%3A%20Improper%20Handling%20of%20Extra%20Parameters%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20110-incorrect-privilege-assignment-in-c-02a77f10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20110%3A%20Incorrect%20Privilege%20Assignment%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b699902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20104-buffer-underwrite-buffer-underflow--3de1764a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20104%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=69c40a64f4197a8e3b6998fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20004-missing-reference-to-active-allocat-e6f24850</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20004%3A%20Missing%20Reference%20to%20Active%20Allocated%20Resource%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58341-cwe-89-improper-neutralization-of-s-4c430d30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Opencart%20OpenCart%20Core&amp;severity=high&amp;id=69c40a64f4197a8e3b6998e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20125-improper-handling-of-syntactically--365ab152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20125%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a67f4197a8e3b699a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20012-missing-release-of-memory-after-eff-62169714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20012%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20086-improper-handling-of-missing-values-f636f063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20086%3A%20Improper%20Handling%20of%20Missing%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20084-uncontrolled-resource-consumption-i-1bc72f79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20084%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=69c40a64f4197a8e3b6998f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3218-cwe-79-improper-neutralization-of-in-846bf146</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3218%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Responsive%20Favicons&amp;severity=medium&amp;id=69c40334f4197a8e3b666f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3217-cwe-79-improper-neutralization-of-in-91bf5ea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20SAML%20SSO%20-%20Service%20Provider&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3216-cwe-918-server-side-request-forgery--13e3758e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3216%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=69c40334f4197a8e3b666f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3215-cwe-79-improper-neutralization-of-in-677d9a3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Islandora&amp;severity=medium&amp;id=69c40331f4197a8e3b666ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3214-cwe-288-authentication-bypass-using--0a2b53c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3214%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CAPTCHA&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3213-cwe-79-improper-neutralization-of-in-bf87487f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3213%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Anti-Spam%20by%20CleanTalk&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24750-cwe-79-improper-neutralization-of-i-ce0f5c25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24750%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20Secure%20Data%20Forms&amp;severity=high&amp;id=69c40331f4197a8e3b666eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3212-cwe-79-improper-neutralization-of-in-591aa3ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3211-cwe-352-cross-site-request-forgery-c-81964679</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3211%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Theme%20Negotiation%20by%20Rules&amp;severity=medium&amp;id=69c40331f4197a8e3b666ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3210-cwe-863-incorrect-authorization-in-d-21752fb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3210%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Material%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2349-cwe-79-improper-neutralization-of-in-08f298cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20UI%20Icons&amp;severity=medium&amp;id=69c40331f4197a8e3b666eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2348-cwe-79-improper-neutralization-of-in-8bb7024f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Quick%20Edit&amp;severity=medium&amp;id=69c40331f4197a8e3b666eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1917-cwe-288-authentication-bypass-using--e6ab6029</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1917%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Login%20Disable&amp;severity=medium&amp;id=69c40331f4197a8e3b666eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-cybercriminal-gets-2-year-prison-sentence--eacebc06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Cybercriminal%20Gets%202-Year%20Prison%20Sentence%20in%20US&amp;severity=medium&amp;id=69c3f19cf4197a8e3b553b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33268-cwe-400-uncontrolled-resource-consu-67964107</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33268%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Nanoleaf%20Lines&amp;severity=medium&amp;id=69c3f1b2f4197a8e3b5542d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23514-cwe-282-improper-ownership-manageme-7a0173a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23514%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20kiteworks%20core&amp;severity=high&amp;id=69c3f1b2f4197a8e3b5542d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-speeds-attacks-but-identity-remains-cybersecuri-34bed359</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Speeds%20Attacks%2C%20But%20Identity%20Remains%20Cybersecurity%E2%80%99s%20Weakest%20Link&amp;severity=medium&amp;id=69c3ee18f4197a8e3b53b59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3591-cwe-562-return-of-stack-variable-add-0a50bc6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3591%3A%20CWE-562%20Return%20of%20Stack%20Variable%20Address%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3119-cwe-617-reachable-assertion-in-isc-b-7dde1da1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3119%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4815-cwe-89-improper-neutralization-of-sp-86ce3b3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4815%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4816-cwe-79-improper-neutralization-of-in-bb35cca3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4816%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=medium&amp;id=69c3eaa6f4197a8e3b5259fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3104-cwe-772-missing-release-of-resource--9a88f86a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3104%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ios-macos-264-roll-out-with-fresh-security-patches-b250a770</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iOS%2C%20macOS%2026.4%20Roll%20Out%20With%20Fresh%20Security%20Patches&amp;severity=medium&amp;id=69c3e38cf4197a8e3b4fd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1519-cwe-606-unchecked-input-for-loop-con-5c130d5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1519%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ISC%20BIND%209&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40842-cwe-79-improper-neutralization-of-i-f4ccbe80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40842%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40841-cwe-352-cross-site-request-forgery--52cb0b35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40841%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=medium&amp;id=69c3e3c7f4197a8e3b4fe9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27260-cwe-790-in-ericsson-indoor-connect--70b4897e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27260%3A%20CWE-790%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4761-cwe-732-incorrect-permission-assignm-1eae1c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4761%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CODRA%20Panorama%20Suite&amp;severity=low&amp;id=69c3dca4f4197a8e3b4d5c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-new-routers-made-outside-the-us-over-nati-0079eee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20New%20Routers%20Made%20Outside%20the%20US%20Over%20National%20Security%20Risks&amp;severity=medium&amp;id=69c3d900f4197a8e3b4c48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4760-cwe-552-files-or-directories-accessi-bd7c05a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4760%3A%20CWE-552%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20CODRA%20Panorama%20Suite&amp;severity=high&amp;id=69c3e3c7f4197a8e3b4fe9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-trivy-to-broad-oss-compromise-teampcp-hits-do-703cdc7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Trivy%20to%20Broad%20OSS%20Compromise%3A%20TeamPCP%20Hits%20Docker%20Hub%2C%20VS%20Code%2C%20PyPI&amp;severity=medium&amp;id=69c3ce74f4197a8e3b4950bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-malicious-pypi-packages-091bfe2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%3A%20Malicious%20PyPI%20Packages&amp;severity=medium&amp;id=69c3f1aef4197a8e3b553f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-litellm-supply-chain-compro-c04058b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20-%20LiteLLM%20Supply%20Chain%20Compromise&amp;severity=medium&amp;id=69c3ee28f4197a8e3b53b8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prisons-russian-access-broker-for-aiding-ransom-df65fd02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Prisons%20Russian%20Access%20Broker%20for%20Aiding%20Ransomware%20Attacks&amp;severity=medium&amp;id=69c3ab4cf4197a8e3b3a1b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3608-cwe-617-reachable-assertion-in-isc-k-fed4f439</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3608%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20Kea&amp;severity=high&amp;id=69c3a455f4197a8e3b370141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackerone-employee-data-exposed-in-massive-navia-b-c6b11c77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HackerOne%20Employee%20Data%20Exposed%20in%20Massive%20Navia%20Breach&amp;severity=medium&amp;id=69c3963cf4197a8e3b2f4bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32326-missing-authentication-for-critical-9a481b76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32326%3A%20Missing%20authentication%20for%20critical%20function%20in%20Sharp%20Corporation%20home%205G%20HR01&amp;severity=medium&amp;id=69c39653f4197a8e3b2f5482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2343-cwe-200-information-exposure-in-pepr-b24bfe87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2343%3A%20CWE-200%20Information%20Exposure%20in%20PeproDev%20Ultimate%20Invoice&amp;severity=medium&amp;id=69c37d98f4197a8e3b0cd267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26306-uncontrolled-search-path-element-in-ee774158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26306%3A%20Uncontrolled%20Search%20Path%20Element%20in%20OM%20Digital%20Solutions%20Corporation%20OM%20Workspace%20(Windows%20Edition)&amp;severity=high&amp;id=69c37d98f4197a8e3b0cd263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33253-unquoted-search-path-or-element-in--97bdffae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33253%3A%20Unquoted%20search%20path%20or%20element%20in%20SANYO%20DENKI%20CO.%2C%20LTD.%20SANUPS%20SOFTWARE%20STANDALONE&amp;severity=medium&amp;id=69c37690f4197a8e3bfb90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guidance-for-detecting-investigating-and-defending-f813b422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guidance%20for%20detecting%2C%20investigating%2C%20and%20defending%20against%20the%20Trivy%20supply%20chain%20compromise&amp;severity=medium&amp;id=69c3b5e5f4197a8e3b411ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2072-cwe-79-improper-neutralization-of-in-c6f3add7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2072%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=69c34c81f4197a8e3bc565a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1166-cwe-601-url-redirection-to-untrusted-7de2151a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1166%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Hitachi%20Hitachi%20Ops%20Center%20Administrator&amp;severity=medium&amp;id=69c34c7ef4197a8e3bc56508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4766-cwe-79-improper-neutralization-of-in-c6d9900c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devrix%20Easy%20Image%20Gallery&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4784-sql-injection-in-code-projects-simpl-1ba821cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4784%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c33e4ff4197a8e3bb9c1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28864-a-local-attacker-may-gain-access-to-881070fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28864%3A%20A%20local%20attacker%20may%20gain%20access%20to%20user&apos;s%20Keychain%20items%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69c333e1f4197a8e3baaec88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20691-a-maliciously-crafted-webpage-may-b-25f0d1f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20691%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28833-an-app-may-be-able-to-enumerate-a-u-fa046f85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28833%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28825-an-app-may-be-able-to-modify-protec-1aa50dd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28825%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20668-an-app-may-be-able-to-access-sensit-fb27d790</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20668%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20687-an-app-may-be-able-to-cause-unexpec-a39ac789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20687%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333d8f4197a8e3baae878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20701-an-app-may-be-able-to-connect-to-a--7a65470e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20701%3A%20An%20app%20may%20be%20able%20to%20connect%20to%20a%20network%20share%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43534-a-user-with-physical-access-to-an-i-a6c8aefa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43534%3A%20A%20user%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20bypass%20Activation%20Lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28868-an-app-may-be-able-to-disclose-kern-ac04a2d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28868%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20633-an-app-may-be-able-to-access-user-s-84a84ff2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20633%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28829-an-app-may-be-able-to-modify-protec-e359e57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28829%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20664-processing-maliciously-crafted-web--5c90b907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20664%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28891-an-app-may-be-able-to-break-out-of--ee90eae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28891%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28852-an-app-may-be-able-to-cause-a-denia-6621e6ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28852%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28844-an-attacker-may-gain-access-to-prot-bb0e69d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28844%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28845-an-app-may-be-able-to-access-protec-f04601d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28845%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28890-an-app-may-be-able-to-cause-unexpec-f5b333b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28890%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20665-processing-maliciously-crafted-web--1173ad63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20665%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333d8f4197a8e3baae85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28828-an-app-may-be-able-to-access-sensit-9a0b8461</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28828%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20632-an-app-may-be-able-to-access-sensit-13673933</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20632%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28886-a-user-in-a-privileged-network-posi-e3bd49f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28886%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20686-an-app-may-be-able-to-access-sensit-9f6a0432</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20686%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28824-an-app-may-be-able-to-access-sensit-b959c5c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28824%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28832-an-app-may-be-able-to-disclose-kern-40d9ae89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28832%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20690-processing-an-audio-stream-in-a-mal-83d58a53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20690%3A%20Processing%20an%20audio%20stream%20in%20a%20maliciously%20crafted%20media%20file%20may%20terminate%20the%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28865-an-attacker-in-a-privileged-network-fc3fc9e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28865%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaec91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28881-an-app-may-be-able-to-access-sensit-0e9705ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28881%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28839-an-app-may-be-able-to-access-sensit-0f2f7834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28839%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28878-an-app-may-be-able-to-enumerate-a-u-d79e680b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28878%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28842-a-buffer-overflow-may-result-in-mem-7b712ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28842%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28862-an-app-may-be-able-to-access-user-s-3d9dc891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28862%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4783-sql-injection-in-itsourcecode-colleg-35d140b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4783%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20697-an-app-may-be-able-to-access-sensit-9485ad53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20697%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28835-mounting-a-maliciously-crafted-smb--0003d53f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28835%3A%20Mounting%20a%20maliciously%20crafted%20SMB%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28823-an-app-with-root-privileges-may-be--b80563d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28823%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20639-processing-a-maliciously-crafted-st-e26a8a3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20639%3A%20Processing%20a%20maliciously%20crafted%20string%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28874-a-remote-attacker-may-cause-an-unex-410e92ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28874%3A%20A%20remote%20attacker%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e1f4197a8e3baaecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28858-a-remote-user-may-be-able-to-cause--a262d8bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28858%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333dff4197a8e3baaeb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28818-an-app-may-be-able-to-access-sensit-ad0b9870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28818%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28859-a-malicious-website-may-be-able-to--67e98019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28859%3A%20A%20malicious%20website%20may%20be%20able%20to%20process%20restricted%20web%20content%20outside%20the%20sandbox%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28875-a-remote-attacker-may-be-able-to-ca-8e041a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28875%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28822-an-attacker-may-be-able-to-cause-un-ca536b77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28822%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28834-an-app-may-be-able-to-cause-unexpec-2543d750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28834%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28863-an-app-may-be-able-to-fingerprint-t-22945cdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28863%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28855-an-app-may-be-able-to-access-protec-629e8fff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28855%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333dff4197a8e3baaeb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28879-processing-maliciously-crafted-web--a5982e22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28879%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28838-an-app-may-be-able-to-break-out-of--321bc65e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28838%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20622-an-app-may-be-able-to-capture-a-use-271f13f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20622%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20user&apos;s%20screen%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28880-an-app-may-be-able-to-enumerate-a-u-f03c14ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28880%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28817-a-sandboxed-process-may-be-able-to--7f2dd0fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28817%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d9f4197a8e3baae9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28856-an-attacker-with-physical-access-to-d9983940</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28856%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28895-an-attacker-with-physical-access-to-e2dd54e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28895%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20with%20Stolen%20Device%20Protection%20enabled%20may%20be%20able%20to%20access%20biometrics-gated%20Protected%20Apps%20with%20the%20passcode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20637-an-app-may-be-able-to-cause-unexpec-2b4e9d40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20637%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20699-an-app-may-be-able-to-access-user-s-e0ba9421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20699%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28876-an-app-may-be-able-to-access-sensit-f8905d44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28876%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e3f4197a8e3baaed11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28821-an-app-may-be-able-to-gain-elevated-3346a830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28821%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333dcf4197a8e3baaea68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28837-an-app-may-be-able-to-access-sensit-51de8014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28837%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333ddf4197a8e3baaeb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20695-an-app-may-be-able-to-determine-ker-86e9b47e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20695%3A%20An%20app%20may%20be%20able%20to%20determine%20kernel%20memory%20layout%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28861-a-malicious-website-may-be-able-to--0a3ac84d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28861%3A%20A%20malicious%20website%20may%20be%20able%20to%20access%20script%20message%20handlers%20intended%20for%20other%20origins%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20694-an-app-may-be-able-to-access-user-s-27d0a0a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20694%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28820-an-app-may-be-able-to-access-sensit-892a3022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28820%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28877-an-app-may-be-able-to-access-sensit-cde6f9f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28877%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20657-parsing-a-maliciously-crafted-file--fe48ac48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20657%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20698-an-app-may-be-able-to-cause-unexpec-ee089061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20698%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28882-an-app-may-be-able-to-enumerate-a-u-1f178a94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28882%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28894-a-remote-attacker-may-be-able-to-ca-94559fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28894%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69c333e4f4197a8e3baaedb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28857-processing-maliciously-crafted-web--033a4e0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28857%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333dff4197a8e3baaeb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28841-a-buffer-overflow-may-result-in-mem-7edff32a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28841%3A%20A%20buffer%20overflow%20may%20result%20in%20memory%20corruption%20and%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28816-an-app-may-be-able-to-delete-files--0d563ae5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28816%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20607-an-app-may-be-able-to-access-protec-e1636f7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20607%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28870-an-app-may-be-able-to-access-sensit-61a14a2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28870%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28827-an-app-may-be-able-to-break-out-of--866bf185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28827%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=69c333dcf4197a8e3baaea86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28831-an-app-may-be-able-to-access-sensit-0a0d5960</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28831%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333ddf4197a8e3baaeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20693-an-attacker-with-root-privileges-ma-fd1df3d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20693%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28866-an-app-may-be-able-to-access-sensit-e391ed81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28866%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28889-an-app-may-be-able-to-read-arbitrar-fc523636</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28889%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20as%20root%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69c333e4f4197a8e3baaeda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28893-a-document-may-be-written-to-a-temp-bf2cd019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28893%3A%20A%20document%20may%20be%20written%20to%20a%20temporary%20file%20when%20using%20print%20preview%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333e4f4197a8e3baaedb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20631-a-user-may-be-able-to-elevate-privi-d06eaa8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20631%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69c333d6f4197a8e3baae812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20670-an-app-may-be-able-to-access-sensit-ebf18b3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20670%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d8f4197a8e3baae86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20688-an-app-may-be-able-to-break-out-of--e375fe5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20688%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69c333d8f4197a8e3baae880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28892-an-app-may-be-able-to-modify-protec-85f340ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28892%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e4f4197a8e3baaedab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28867-an-app-may-be-able-to-leak-sensitiv-4e056b54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28867%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333e1f4197a8e3baaeca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28888-an-app-may-be-able-to-gain-root-pri-ce802b59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28888%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333e3f4197a8e3baaed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20692-hide-ip-address-and-block-all-remot-38515bb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20692%3A%20%22Hide%20IP%20Address%22%20and%20%22Block%20All%20Remote%20Content%22%20may%20not%20apply%20to%20all%20mail%20content%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69c333d9f4197a8e3baae971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28826-a-malicious-app-may-be-able-to-brea-b4ee0304</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28826%3A%20A%20malicious%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333dcf4197a8e3baaea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28871-visiting-a-maliciously-crafted-webs-0bb72ba0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28871%3A%20Visiting%20a%20maliciously%20crafted%20website%20may%20lead%20to%20a%20cross-site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=69c333e1f4197a8e3baaecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20684-an-app-may-bypass-gatekeeper-checks-adf5ef9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20684%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=low&amp;id=69c333d8f4197a8e3baae872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20651-an-app-may-be-able-to-access-sensit-2ad8b257</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20651%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69c333d6f4197a8e3baae82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70888-na-374234a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70888%3A%20n%2Fa&amp;severity=critical&amp;id=69c437ecf4197a8e3b7b145b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70887-na-c70e4b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70887%3A%20n%2Fa&amp;severity=high&amp;id=69c430e5f4197a8e3b78e0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70952-na-2156d229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70952%3A%20n%2Fa&amp;severity=high&amp;id=69c42db5f4197a8e3b77dc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67030-na-afb99fd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67030%3A%20n%2Fa&amp;severity=high&amp;id=69c422f4f4197a8e3b7492ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30587-na-f23f021a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30587%3A%20n%2Fa&amp;severity=medium&amp;id=69c41f52f4197a8e3b733a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26833-na-3aff288d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26833%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26832-na-97f776ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26832%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26831-na-efc1cb46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26831%3A%20n%2Fa&amp;severity=critical&amp;id=69c40a67f4197a8e3b699a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26830-na-8e48233f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26830%3A%20n%2Fa&amp;severity=critical&amp;id=69c3fc2ef4197a8e3b6310ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59707-na-0e36166b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59707%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59706-na-7647217d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59706%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32991-na-ad6453b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32991%3A%20n%2Fa&amp;severity=critical&amp;id=69c3f8fbf4197a8e3b5a568e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-25-a4c3da16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-25&amp;severity=medium&amp;id=69c3f89bf4197a8e3b58cf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51348-na-49839eae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51348%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51347-na-d4cb4e6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51347%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51346-na-9901719e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51346%3A%20n%2Fa&amp;severity=high&amp;id=69c3eaa6f4197a8e3b5259d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-25-79be0e8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-25&amp;severity=low&amp;id=69c36877f4197a8e3bf0fc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4781-sql-injection-in-sourcecodester-sale-8fea11d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4781%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b930252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4780-sql-injection-in-sourcecodester-sale-0aabb496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4780%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31eacf4197a8e3b93024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4779-sql-injection-in-sourcecodester-sale-34a97998</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4779%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4778-sql-injection-in-sourcecodester-sale-e2f8a6fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4778%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c31444f4197a8e3b89c89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4777-sql-injection-in-sourcecodester-sale-7679cc78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4777%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c30994f4197a8e3b843569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33215-cwe-287-improper-authentication-in--f98c82ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33215%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=69c2ff45f4197a8e3b7e83b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3912-vulnerability-in-tibco-activematrix--51059409</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3912%3A%20Vulnerability%20in%20Tibco%20ActiveMatrix%20BusinessWorks&amp;severity=high&amp;id=69c2fb83f4197a8e3b7c5800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24159-cwe-502-deserialization-of-untruste-4cf367d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24159%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4371-vulnerability-in-mozilla-thunderbird-58e87494</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4371%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=69c2f483f4197a8e3b75625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24157-cwe-502-deserialization-of-untruste-51ca158e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69c2f483f4197a8e3b756246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3889-vulnerability-in-mozilla-thunderbird-acd3fb47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3889%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=69c2f483f4197a8e3b756255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24141-cwe-502-deserialization-of-untruste-4a313153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24141%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVIDIA%20Model%20Optimizer&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24158-cwe-789-memory-allocation-with-exce-76762b56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24158%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f483f4197a8e3b75624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4433-cwe-16-configuration-in-tenable-inc--77e088cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4433%3A%20CWE-16%3A%20Configuration%20in%20Tenable%2C%20Inc.%20Tenable%20Operation%20Technology&amp;severity=low&amp;id=69c2f483f4197a8e3b75625f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33254-cwe-362-concurrent-execution-using--358dfacc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33254%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33238-cwe-362-concurrent-execution-using--5023a4c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33238%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=69c2f481f4197a8e3b7561d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33244-cwe-502-deserialization-of-untruste-bbcc3bf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33244%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Apex&amp;severity=critical&amp;id=69c2f481f4197a8e3b7561db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24152-cwe-502-deserialization-of-untruste-f1609282</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24152%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b756240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24151-cwe-502-deserialization-of-untruste-edcc003d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24151%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f483f4197a8e3b75623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24150-cwe-502-deserialization-of-untruste-7d7967df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24150%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33248-cwe-502-deserialization-of-untruste-b308316e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33248%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33247-cwe-502-deserialization-of-untruste-7c655a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33247%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=69c2f481f4197a8e3b7561e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33242-cwe-1234-hardware-internal-or-debug-7f05d71a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33242%3A%20CWE-1234%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20NVIDIA%20HGX%20and%20DGX%20B300&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33216-cwe-131-incorrect-calculation-of-bu-e9c18c9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33216%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33215-cwe-823-use-of-out-of-range-pointer-770a2bb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33215%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20NVIDIA%20SNAP-4%20Container&amp;severity=medium&amp;id=69c2f481f4197a8e3b7561c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21790-cwe-346-origin-validation-error-in--93f27af8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21790%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2f483f4197a8e3b756262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21783-cwe-209-generation-of-error-message-d80a7b98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21783%3A%20CWE-209%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20HCLSoftware%20Traveler&amp;severity=medium&amp;id=69c2edf6f4197a8e3b721c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doe-publishes-5-year-energy-security-plan-6d04c94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoE%20Publishes%205-Year%20Energy%20Security%20Plan&amp;severity=critical&amp;id=69c2e9f1f4197a8e3b6b4be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33353-cwe-200-exposure-of-sensitive-infor-83abbf70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33353%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=69c2edf6f4197a8e3b721c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33349-cwe-1284-improper-validation-of-spe-5951d6d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33349%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33345-cwe-639-authorization-bypass-throug-35b2980a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33345%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20solidtime-io%20solidtime&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b6437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33347-cwe-79-improper-neutralization-of-i-6f555a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33347%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33344-cwe-22-improper-limitation-of-a-pat-0882b1ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33344%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33332-cwe-20-improper-input-validation-in-2d869574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33332%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69c2ea08f4197a8e3b6b642e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33331-cwe-79-improper-neutralization-of-i-b93f3ccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33331%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20middleapi%20orpc&amp;severity=high&amp;id=69c2ea08f4197a8e3b6b6429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33330-cwe-863-incorrect-authorization-in--38a1725c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33330%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33329-cwe-22-improper-limitation-of-a-pat-32ac2e5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33329%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33326-cwe-863-incorrect-authorization-in--8907ce9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33326%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20keystonejs%20keystone&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22559-vulnerability-in-ubiquiti-inc-unifi-0f8f5993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22559%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Server&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33769-cwe-20-improper-input-validation-in-371658e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33769%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20withastro%20astro&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33768-cwe-441-unintended-proxy-or-interme-3218654b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33768%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29772-cwe-770-allocation-of-resources-wit-9b870df0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29772%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=69c2dfdbf4197a8e3b622b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33627-cwe-200-exposure-of-sensitive-infor-57b44982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33627%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33624-cwe-367-time-of-check-time-of-use-t-3f3de1c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33624%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69c2dfdbf4197a8e3b622b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-agentic-ai-systems-need-better-governance-less-960019ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Agentic%20AI%20Systems%20Need%20Better%20Governance%20%E2%80%93%20Lessons%20from%20OpenClaw&amp;severity=medium&amp;id=69c2d85cf4197a8e3b5f901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33539-cwe-89-improper-neutralization-of-s-dc735645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33539%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33538-cwe-400-uncontrolled-resource-consu-c4ec715d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33538%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33527-cwe-863-incorrect-authorization-in--61241643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33527%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33508-cwe-674-uncontrolled-recursion-in-p-88d9bc87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33508%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33498-cwe-674-uncontrolled-recursion-in-p-f531b788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33498%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33429-cwe-203-observable-discrepancy-in-p-94a62658</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33429%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33421-cwe-863-incorrect-authorization-in--e6ca8acf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33409-cwe-287-improper-authentication-in--997c90ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33409%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69c2d884f4197a8e3b5f9647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2417-cwe-306-missing-authentication-for-c-51d6a910</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2417%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Pharos%20Controls%20Mosaic%20Show%20Controller&amp;severity=critical&amp;id=69c2d884f4197a8e3b5f963d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33323-cwe-204-observable-response-discrep-6bee72c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33323%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33417-cwe-613-insufficient-session-expira-936c37e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33417%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2d884f4197a8e3b5f964e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1995-cwe-269-improper-privilege-managemen-7a93156b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1995%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IDrive%20IDrive%20Cloud%20Backup%20Client%20for%20Windows&amp;severity=high&amp;id=69c2d884f4197a8e3b5f963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33401-cwe-918-server-side-request-forgery-4e8fa50b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33401%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2d885f4197a8e3b5f9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-faced-a-surge-in-cyberattacks-in-2025-inclu-3b57db40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20Faced%20a%20Surge%20in%20Cyberattacks%20in%202025%2C%20Including%20a%20Major%20Assault%20on%20the%20Energy%20Sector&amp;severity=medium&amp;id=69c2d155f4197a8e3b5d60aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33400-cwe-79-improper-neutralization-of-i-493e3777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69c2f483f4197a8e3b756265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33399-cwe-918-server-side-request-forgery-cf84da1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33399%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c2dfdbf4197a8e3b622b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33407-cwe-918-server-side-request-forgery-a7731ef1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33407%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69c32654f4197a8e3b9def6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33162-cwe-285-improper-authorization-in-c-da1da056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33162%3A%20CWE-285%3A%20Improper%20Authorization%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32854-cwe-476-null-pointer-dereference-in-d1594274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32854%3A%20CWE-476%20NULL%20pointer%20dereference%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33161-cwe-200-exposure-of-sensitive-infor-cd01c76d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33161%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32853-cwe-125-out-of-bounds-read-in-libvn-e16c0516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32853%3A%20CWE-125%20Out-of-bounds%20read%20in%20LibVNC%20LibVNCServer&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33160-cwe-639-authorization-bypass-throug-464a6dc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33160%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=low&amp;id=69c2cdd9f4197a8e3b58a8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33159-cwe-306-missing-authentication-for--f5031588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33159%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33158-cwe-639-authorization-bypass-throug-363e3163</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33158%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33157-cwe-470-use-of-externally-controlle-3699fcc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33157%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69c2cdd9f4197a8e3b58a8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11571-cwe-78-improper-neutralization-of-s-3fc53108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11571%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20silabs.com%20Simplicity%20Studio%20v5&amp;severity=low&amp;id=69c2c348f4197a8e3b526730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33340-cwe-306-missing-authentication-for--5fb325d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33340%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ParisNeo%20lollms-webui&amp;severity=critical&amp;id=69c2bc3ff4197a8e3b4e78c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33700-cwe-639-authorization-bypass-throug-054a316e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33700%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a082a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33680-cwe-285-improper-authorization-in-g-fb472728</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33680%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a0825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33679-cwe-918-server-side-request-forgery-eaf389a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33679%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33678-cwe-639-authorization-bypass-throug-7a8fbc15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33678%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a081c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33677-cwe-200-exposure-of-sensitive-infor-7005c106</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33677%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33676-cwe-863-incorrect-authorization-in--430de562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33676%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a0812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33675-cwe-918-server-side-request-forgery-a4a2e4ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33675%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33668-cwe-285-improper-authorization-in-g-db7e34de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33668%3A%20CWE-285%3A%20Improper%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33474-cwe-400-uncontrolled-resource-consu-cbc62c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33474%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71275-improper-neutralization-of-special--43d87f37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71275&amp;severity=critical&amp;id=69c2b1b2f4197a8e3b48d19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33473-cwe-287-improper-authentication-in--a2cf1947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33473%3A%20CWE-287%3A%20Improper%20Authentication%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33336-cwe-94-improper-control-of-generati-f13f91f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33336%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33335-cwe-939-improper-authorization-in-h-13d64f3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33335%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33334-cwe-94-improper-control-of-generati-8c4529ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33334%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33316-cwe-284-improper-access-control-in--e7133b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33316%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=69c2b1b2f4197a8e3b48d1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33315-cwe-288-authentication-bypass-using-33a19297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33315%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2b1b2f4197a8e3b48d1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33313-cwe-639-authorization-bypass-throug-3819a7c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33313%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69c2cdd9f4197a8e3b58a8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4775-integer-overflow-or-wraparound-in-re-40cceae4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4775%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69c2b1b4f4197a8e3b48d204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27651-cwe-476-null-pointer-dereference-in-912c3cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27651%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27654-cwe-122-heap-based-buffer-overflow--2af0e08b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27654%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28755-cwe-863-incorrect-authorization-in--f467972a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28755%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28753-cwe-93-improper-neutralization-of-c-1339d031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28753%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20F5%20NGINX%20Open%20Source&amp;severity=low&amp;id=69c2a3a3f4197a8e3b3ed941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32647-cwe-125-out-of-bounds-read-in-f5-ng-a7252f06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32647%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27784-cwe-190-integer-overflow-or-wraparo-253e3178</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27784%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20F5%20NGINX%20Open%20Source&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-ip-kvms-tue-mar-24th-4cc76409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20IP%20KVMs%2C%20(Tue%2C%20Mar%2024th)&amp;severity=medium&amp;id=69c29929f4197a8e3b3ab299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-claims-it-hacked-astrazeneca-c789ce2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Claims%20It%20Hacked%20AstraZeneca&amp;severity=medium&amp;id=69c29914f4197a8e3b3aa81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-high-severity-vulnerabil-2b284599</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69c29590f4197a8e3b399a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33497-cwe-22-improper-limitation-of-a-pat-87983cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33497%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c32654f4197a8e3b9def72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33484-cwe-284-improper-access-control-in--12cb985b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33484%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33475-cwe-74-improper-neutralization-of-s-73b70903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33475%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33309-cwe-22-improper-limitation-of-a-pat-84fddebc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33309%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69c28b09f4197a8e3b35a4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4721-vulnerability-in-mozilla-firefox-6dd025a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b320700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4729-vulnerability-in-mozilla-firefox-f354bef4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4729%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4720-vulnerability-in-mozilla-firefox-5d43aced</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4719-vulnerability-in-mozilla-firefox-960c9a13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4718-vulnerability-in-mozilla-firefox-fa7e8262</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b3206f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4728-vulnerability-in-mozilla-firefox-5ddb899b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4728%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69c2878af4197a8e3b320771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4727-vulnerability-in-mozilla-firefox-919ac0a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4727%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b32076d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4726-vulnerability-in-mozilla-firefox-f6103856</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4726%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c2878af4197a8e3b320769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4717-vulnerability-in-mozilla-firefox-922cb8a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4716-vulnerability-in-mozilla-firefox-a027e1cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4715-vulnerability-in-mozilla-firefox-b5163d43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b3206e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4714-vulnerability-in-mozilla-firefox-e1e63892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4713-vulnerability-in-mozilla-firefox-8fab9dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4712-vulnerability-in-mozilla-firefox-09347642</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4725-vulnerability-in-mozilla-firefox-59f68556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4725%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c2878af4197a8e3b320765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4711-vulnerability-in-mozilla-firefox-ac9b31bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4710-vulnerability-in-mozilla-firefox-a367fc3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b32064c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4709-vulnerability-in-mozilla-firefox-72f81ae4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4708-vulnerability-in-mozilla-firefox-666a9c38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4707-vulnerability-in-mozilla-firefox-b30575b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4707%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b32063b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4706-vulnerability-in-mozilla-firefox-41dc456f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4706%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28786f4197a8e3b320635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4705-vulnerability-in-mozilla-firefox-aebd74cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4705%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28786f4197a8e3b320630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4704-vulnerability-in-mozilla-firefox-48a24581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4704%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4724-vulnerability-in-mozilla-firefox-7e256640</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4724%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4723-vulnerability-in-mozilla-firefox-de4dae1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4723%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28788f4197a8e3b32070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4702-vulnerability-in-mozilla-firefox-7faf28c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4702%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4722-vulnerability-in-mozilla-firefox-76ac478f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4722%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28788f4197a8e3b320706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4701-vulnerability-in-mozilla-firefox-0c790ff2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4701%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4700-vulnerability-in-mozilla-firefox-3c91843a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4700%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4699-vulnerability-in-mozilla-firefox-c673b182</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4699%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4698-vulnerability-in-mozilla-firefox-d3d4ca52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4698%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4697-vulnerability-in-mozilla-firefox-d3acfb7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4697%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4696-vulnerability-in-mozilla-firefox-8a27d3d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4696%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28784f4197a8e3b3205ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4695-vulnerability-in-mozilla-firefox-3f6b7028</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4695%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4694-vulnerability-in-mozilla-firefox-bf4db9f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4694%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28784f4197a8e3b3205a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4693-vulnerability-in-mozilla-firefox-eacfa2e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4693%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32057c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4692-vulnerability-in-mozilla-firefox-5fc771f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4692%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4691-vulnerability-in-mozilla-firefox-9174de8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4691%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4690-vulnerability-in-mozilla-firefox-ee977b2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4690%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32056a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4689-vulnerability-in-mozilla-firefox-b716733f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4689%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4688-vulnerability-in-mozilla-firefox-dfce27ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4688%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b32055f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4687-vulnerability-in-mozilla-firefox-56480adc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4687%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69c28782f4197a8e3b320559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4686-vulnerability-in-mozilla-firefox-acd27d6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4686%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4685-vulnerability-in-mozilla-firefox-5488cd5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4685%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b32054d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4684-vulnerability-in-mozilla-firefox-c7909fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4684%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69c28782f4197a8e3b320547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/31-million-impacted-by-qualderm-data-breach-357a3657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.1%20Million%20Impacted%20by%20QualDerm%20Data%20Breach&amp;severity=medium&amp;id=69c283fef4197a8e3b30f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-built-a-vast-camera-network-to-control-dissen-3256d1f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Built%20a%20Vast%20Camera%20Network%20to%20Control%20Dissent.%20Israel%20Turned%20It%20Into%20a%20Targeting%20Tool&amp;severity=medium&amp;id=69c28077f4197a8e3b2f50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bubbles-role-in-phishing-scams-kaspersky-official--90945582</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bubble%E2%80%99s%20role%20in%20phishing%20scams%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69c28095f4197a8e3b2f5da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64998-cwe-522-insufficiently-protected-cr-c68fc6ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64998%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69c2796ff4197a8e3b2bf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-citrix-netscaler-vulnerability-poised-for-a0221796</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Citrix%20NetScaler%20Vulnerability%20Poised%20for%20Exploitation%2C%20Security%20Firms%20Warn&amp;severity=critical&amp;id=69c275ecf4197a8e3b2a01dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canisterworm-gets-teeth-teampcps-kubernetes-wiper--dacfd3cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CanisterWorm%20Gets%20Teeth%3A%20TeamPCP&apos;s%20Kubernetes%20Wiper%20Targets%20Iran&amp;severity=medium&amp;id=69c27268f4197a8e3b26b87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-employee-partner-information-stolen-in--76691a7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20Employee%2C%20Partner%20Information%20Stolen%20in%20Cyberattack&amp;severity=medium&amp;id=69c26b5ff4197a8e3b1ca237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stryker-says-malicious-file-found-during-probe-int-19d82340</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stryker%20Says%20Malicious%20File%20Found%20During%20Probe%20Into%20Iran-Linked%20Attack&amp;severity=medium&amp;id=69c259ccf4197a8e3b0ee67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-compromise-spreads-from-trivy-to-chec-c6a7f036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20compromise%20spreads%20from%20Trivy%20to%20Checkmarx%20GitHub%20Actions&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kics-github-action-compromised-teampcp-supply-chai-d4e55ee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KICS%20GitHub%20Action%20Compromised%3A%20TeamPCP%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c27268f4197a8e3b26b875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracing-a-multi-vector-malware-campaign-from-vbs-t-a4e44d8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracing%20a%20Multi-Vector%20Malware%20Campaign%3A%20From%20VBS%20to%20Open%20Infrastructure&amp;severity=medium&amp;id=69c27606f4197a8e3b2a0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4649-cwe-306-missing-authentication-for-c-54868a12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4649%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69c24bbbf4197a8e3b0767dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32642-cwe-863-incorrect-authorization-in--6d40c7c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32642%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=low&amp;id=69c24838f4197a8e3b038194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3509-cwe-134-use-of-externally-controlled-c3c53097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3509%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41660-cwe-669-incorrect-resource-transfer-2b926cb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41660%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=69c244c0f4197a8e3b01d2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4756-cwe-787-out-of-bounds-write-in-molot-3c347234</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4756%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9e000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4755-cwe-20-cwe-20-in-molotovcherry-andro-fb2c95b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4755%3A%20CWE-20%20CWE-20%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=critical&amp;id=69c2331ef4197a8e3bf9dffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4754-cwe-79-cwe-79-in-molotovcherry-andro-178e7ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4754%3A%20CWE-79%20CWE-79%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2331ef4197a8e3bf9dffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33852-cwe-401-missing-release-of-memory-a-fe4efbca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33852%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2331ef4197a8e3bf9dff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33856-cwe-401-missing-release-of-memory-a-56d151b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33856%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c32654f4197a8e3b9def75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33855-cwe-190-integer-overflow-or-wraparo-ba6009c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33855%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33854-cwe-787-out-of-bounds-write-in-molo-4afe3ba1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33854%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=high&amp;id=69c2d885f4197a8e3b5f973d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33853-cwe-476-null-pointer-dereference-in-978106cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33853%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MolotovCherry%20Android-ImageMagick7&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33847-cwe-119-improper-restriction-of-ope-65d3a8ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33847%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33849-cwe-119-improper-restriction-of-ope-4e22bddd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33849%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33848-cwe-119-improper-restriction-of-ope-37a09f65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33848%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20linkingvision%20rapidvms&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33851-cwe-119-improper-restriction-of-ope-a4819350</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33851%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20joncampbell123%20doslib&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33850-cwe-787-out-of-bounds-write-in-wuje-e46fe604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33850%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WujekFoliarz%20DualSenseY-v2&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4753-cwe-125-out-of-bounds-read-in-slajer-90f09ae8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4753%3A%20CWE-125%20Out-of-bounds%20Read%20in%20slajerek%20RetroDebugger&amp;severity=critical&amp;id=69c2a3a7f4197a8e3b3eda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4752-cwe-416-use-after-free-in-no-chicken-d883c0b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4752%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4751-cwe-476-null-pointer-dereference-in--212babee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4751%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20tmate-io%20tmate&amp;severity=medium&amp;id=69c2a3a5f4197a8e3b3eda1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4750-cwe-125-out-of-bounds-read-in-fabian-95af46f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4750%3A%20CWE-125%20Out-of-bounds%20Read%20in%20fabiangreffrath%20woof&amp;severity=critical&amp;id=69c2a3a5f4197a8e3b3eda1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4749-nvd-cwe-noinfo-nvd-cwe-noinfo-in-alb-4161dd2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4749%3A%20NVD-CWE-noinfo%20NVD-CWE-noinfo%20in%20albfan%20miraclecast&amp;severity=medium&amp;id=69c2250ef4197a8e3bf52229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4662-cwe-89-improper-neutralization-of-sp-f493c1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4662%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69c29cc3f4197a8e3b3c19ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4283-cwe-862-missing-authorization-in-leg-b0b3a8d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4283%3A%20CWE-862%20Missing%20Authorization%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=critical&amp;id=69c32654f4197a8e3b9def78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3138-cwe-862-missing-authorization-in-woo-b7898757</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3138%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20for%20WooCommerce%20by%20WBW&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4640-cwe-306-missing-authentication-for-c-99bcad95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4640%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4639-cwe-863-incorrect-authorization-in-g-0d3ccdb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4639%3A%20CWE-863%20Incorrect%20Authorization%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=69c2a3a5f4197a8e3b3eda13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3260-allocation-of-resources-without-limi-9c8abed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3260%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%20for%20Spring%20Boot%204&amp;severity=medium&amp;id=69c2137bf4197a8e3be1035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4632-sql-injection-in-itsourcecode-online-6fae771c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4632%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69c2137bf4197a8e3be10369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4627-os-command-injection-in-d-link-dir-8-f88408e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4627%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=69c2137bf4197a8e3be10362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4746-cwe-787-out-of-bounds-write-in-timep-fbe0e14b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4746%3A%20CWE-787%20Out-of-bounds%20Write%20in%20timeplus-io%20proton&amp;severity=critical&amp;id=69c2137bf4197a8e3be10373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4745-cwe-94-improper-control-of-generatio-1708b5aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dendibakh%20perf-ninja&amp;severity=critical&amp;id=69c2137bf4197a8e3be10370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4744-cwe-125-out-of-bounds-read-in-rizone-16fef5f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4744%3A%20CWE-125%20Out-of-bounds%20Read%20in%20rizonesoft%20Notepad3&amp;severity=critical&amp;id=69c2056ef4197a8e3bc8620e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4743-cwe-476-null-pointer-dereference-in--e4f3d4f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4743%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20taurusxin%20ncmdump&amp;severity=medium&amp;id=69c2056ef4197a8e3bc8620b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4742-cwe-444-inconsistent-interpretation--085908b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4742%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20visualfc%20liteide&amp;severity=low&amp;id=69c2056ef4197a8e3bc86208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4741-cwe-22-improper-limitation-of-a-path-4f50da47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TeamJCD%20JoyConDroid&amp;severity=high&amp;id=69c2056ef4197a8e3bc86205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4739-cwe-190-integer-overflow-or-wraparou-4dc9a6b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4739%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20InsightSoftwareConsortium%20ITK&amp;severity=critical&amp;id=69c2056ef4197a8e3bc86201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4738-cwe-119-improper-restriction-of-oper-a4946c18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4738%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OSGeo%20gdal&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4737-cwe-416-use-after-free-in-no-chicken-d056668f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4737%3A%20CWE-416%20Use%20After%20Free%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4736-cwe-229-improper-handling-of-values--bea050a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4736%3A%20CWE-229%20Improper%20Handling%20of%20Values%20in%20No-Chicken%20Echo-Mate&amp;severity=high&amp;id=69c2056cf4197a8e3bc861ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4735-cwe-502-deserialization-of-untrusted-f029cb07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4735%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DTStack%20chunjun&amp;severity=high&amp;id=69c2056cf4197a8e3bc861c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4734-cwe-119-improper-restriction-of-oper-382b79d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4734%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20yoyofr%20modizer&amp;severity=critical&amp;id=69c2056cf4197a8e3bc861c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4733-cwe-200-exposure-of-sensitive-inform-1fe2438a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4733%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4732-cwe-125-out-of-bounds-read-in-tildea-3c7e0e4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4732%3A%20CWE-125%20Out-of-bounds%20Read%20in%20tildearrow%20furnace&amp;severity=high&amp;id=69c2056cf4197a8e3bc861be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4626-cross-site-scripting-in-projectworld-7ed09412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4626%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4625-sql-injection-in-sourcecodester-onli-4ad2c890</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4625%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Admission%20System&amp;severity=medium&amp;id=69c2056cf4197a8e3bc861ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4731-cwe-190-integer-overflow-or-wraparou-38be7792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4731%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20artraweditor%20ART&amp;severity=high&amp;id=69c2056cf4197a8e3bc861bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4624-sql-injection-in-sourcecodester-onli-ea1a8c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4624%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=69c2d885f4197a8e3b5f9743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4623-server-side-request-forgery-in-defau-82e4f91b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4623%3A%20Server-Side%20Request%20Forgery%20in%20DefaultFuction%20Jeson-Customer-Relationship-Management-System&amp;severity=medium&amp;id=69c2b1b4f4197a8e3b48d1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33308-cwe-295-improper-certificate-valida-88c7e708</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33308%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20airtower-luna%20mod_gnutls&amp;severity=medium&amp;id=69c29cc3f4197a8e3b3c19e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33307-cwe-121-stack-based-buffer-overflow-3ecaed11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33307%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20airtower-luna%20mod_gnutls&amp;severity=high&amp;id=69c1ecd0f4197a8e3bb7abb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3079-cwe-89-improper-neutralization-of-sp-7040e58f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3079%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20StellarWP%20LearnDash%20LMS&amp;severity=medium&amp;id=69c1ecd0f4197a8e3bb7abb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4617-improper-authorization-in-sourcecode-a241b185</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4617%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69c1e243f4197a8e3baf9862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4680-use-after-free-in-google-chrome-7b4e006d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4680%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4679-integer-overflow-in-google-chrome-d856ab98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4679%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1dec2f4197a8e3babfa48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4678-use-after-free-in-google-chrome-a69cdcbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4678%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4677-out-of-bounds-read-in-google-chrome-6eb5e212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4677%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4676-use-after-free-in-google-chrome-4a02e249</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4676%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4675-heap-buffer-overflow-in-google-chrom-92539054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4675%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4674-out-of-bounds-read-in-google-chrome-ba772d3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4674%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4673-heap-buffer-overflow-in-google-chrom-5351942f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4673%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69c1debff4197a8e3babf87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22739-vulnerability-in-spring-spring-clou-8aa646e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22739%3A%20Vulnerability%20in%20Spring%20Spring%20Cloud&amp;severity=high&amp;id=69c1debff4197a8e3babf86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4616-cross-site-scripting-in-bolo-blog-12348d86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4616%3A%20Cross%20Site%20Scripting%20in%20bolo-blog&amp;severity=medium&amp;id=69c1debff4197a8e3babf875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33320-cwe-674-uncontrolled-recursion-in-t-76bc80ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33320%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20TomWright%20dasel&amp;severity=medium&amp;id=69c1debff4197a8e3babf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33298-cwe-122-heap-based-buffer-overflow--058a7b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33298%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69c1debff4197a8e3babf86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30655-na-d0820e15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30655%3A%20n%2Fa&amp;severity=medium&amp;id=69c2e66df4197a8e3b68b9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30653-na-24c18f7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30653%3A%20n%2Fa&amp;severity=high&amp;id=69c2e66df4197a8e3b68b9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29840-na-be31308d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29840%3A%20n%2Fa&amp;severity=medium&amp;id=69c2b56bf4197a8e3b4a080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29839-na-b148bc9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29839%3A%20n%2Fa&amp;severity=high&amp;id=69c2b56bf4197a8e3b4a080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33554-na-db22b7fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33554%3A%20n%2Fa&amp;severity=high&amp;id=69c2a3a3f4197a8e3b3ed950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30662-na-02471498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30662%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30661-na-8fea80e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30661%3A%20n%2Fa&amp;severity=medium&amp;id=69c2a3a3f4197a8e3b3ed947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-24-23e60c42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-24&amp;severity=medium&amp;id=69c2482ff4197a8e3b034543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-24-d05ef2d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-24&amp;severity=low&amp;id=69c2482ff4197a8e3b03453a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33211-cwe-22-improper-limitation-of-a-pat-2bb49643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tektoncd%20pipeline&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33286-cwe-913-improper-control-of-dynamic-fd76d864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33286%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20graphiti-api%20graphiti&amp;severity=critical&amp;id=69c1e5e3f4197a8e3bb3f18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33283-cwe-476-null-pointer-dereference-in-5c3025db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33283%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1e5e3f4197a8e3bb3f188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33282-cwe-476-null-pointer-dereference-in-f5a6c99c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33282%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ellanetworks%20core&amp;severity=high&amp;id=69c1e5e3f4197a8e3bb3f185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33281-cwe-129-improper-validation-of-arra-f6f420a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33281%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33252-cwe-352-cross-site-request-forgery--1c298ddb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33252%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=69c1d434f4197a8e3ba042af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33241-cwe-770-allocation-of-resources-wit-6c94bc33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33241%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33242-cwe-22-improper-limitation-of-a-pat-bedfd725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33242%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4615-sql-injection-in-sourcecodester-onli-a3a45347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4615%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Catering%20Reservation&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4614-sql-injection-in-itsourcecode-saniti-769926fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4614%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69c1d434f4197a8e3ba042b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33250-cwe-20-improper-input-validation-in-82eeaf69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20longturn%20freeciv21&amp;severity=high&amp;id=69c1d434f4197a8e3ba042a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33202-cwe-74-improper-neutralization-of-s-ce0b2cbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33202%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d434f4197a8e3ba04297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33195-cwe-22-improper-limitation-of-a-pat-44000d41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33195%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rails%20activestorage&amp;severity=high&amp;id=69c1d434f4197a8e3ba0428e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33176-cwe-400-uncontrolled-resource-consu-8c24e02c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33176%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4021-cwe-287-improper-authentication-in-c-9308bb23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4021%3A%20CWE-287%20Improper%20Authentication%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4056-cwe-862-missing-authorization-in-wpe-75122f33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4056%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3533-cwe-434-unrestricted-upload-of-file--68a0c277</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3533%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=69c1d4a7f4197a8e3ba0b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4001-cwe-95-improper-neutralization-of-di-ac901da0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4001%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20acowebs%20Woocommerce%20Custom%20Product%20Addons%20Pro&amp;severity=critical&amp;id=69c1d4a7f4197a8e3ba0b3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33174-cwe-789-memory-allocation-with-exce-2062726e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33174%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33173-cwe-925-improper-verification-of-in-43111a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33173%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20rails%20activestorage&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33170-cwe-79-improper-neutralization-of-i-711e8380</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33170%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33169-cwe-400-uncontrolled-resource-consu-0628f812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33169%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rails%20activesupport&amp;severity=medium&amp;id=69c1d4a7f4197a8e3ba0b411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4613-sql-injection-in-sourcecodester-e-co-ecbd9642</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4613%3A%20SQL%20Injection%20in%20SourceCodester%20E-Commerce%20Site&amp;severity=medium&amp;id=69c1cd2bf4197a8e3b9b9472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33168-cwe-79-improper-neutralization-of-i-bc39b860</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33168%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionview&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33167-cwe-79-improper-neutralization-of-i-c52f453b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rails%20actionpack&amp;severity=low&amp;id=69c1d4a7f4197a8e3ba0b403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3225-cwe-862-missing-authorization-in-thi-90e5b57c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3225%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4306-cwe-89-improper-neutralization-of-sp-8504a3a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4306%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=69c1d4a9f4197a8e3ba0b48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2412-cwe-89-improper-neutralization-of-sp-8fc37751</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2412%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4066-cwe-862-missing-authorization-in-inc-871b678f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4066%3A%20CWE-862%20Missing%20Authorization%20in%20inc2734%20Smart%20Custom%20Fields&amp;severity=medium&amp;id=69c1d4a9f4197a8e3ba0b486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4612-sql-injection-in-itsourcecode-free-h-7cf79c04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4612%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4681-cwe-94-improper-control-of-generatio-dce2340b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4681%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PTC%20Windchill%20PDMLink&amp;severity=critical&amp;id=69c1d4adf4197a8e3ba0b545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33634-cwe-506-embedded-malicious-code-in--163a34d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33634%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20setup-trivy&amp;severity=critical&amp;id=69c1b815f4197a8e3b932274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32300-cwe-285-improper-authorization-in-o-34aa4212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32300%3A%20CWE-285%3A%20Improper%20Authorization%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b93226e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32299-cwe-284-improper-access-control-in--8058e34f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32299%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1b815f4197a8e3b932269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32279-cwe-918-server-side-request-forgery-d5a848f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32279%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opensource-workshop%20connect-cms&amp;severity=medium&amp;id=69c1b815f4197a8e3b932262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32912-6010818f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32912&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32911-8533cf6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32911&amp;severity=null&amp;id=69c1d4adf4197a8e3ba0b53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32910-685ea9ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32910&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32909-70fb35ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32909&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32908-d294f3c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32908&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32907-d72860c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32907&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32904-a79971b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32904&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32903-16e6c7e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32903&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32902-5d202bfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32902&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32901-ed154d9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32901&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32900-a199f6df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32900&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32066-f88860ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32066&amp;severity=null&amp;id=69c1d4abf4197a8e3ba0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32047-ddf09970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32047&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32012-74b36520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32012&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28483-12f1f14c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28483&amp;severity=null&amp;id=69c32654f4197a8e3b9def81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28455-d8f9feaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28455&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22173-9c19c107</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22173&amp;severity=null&amp;id=69c1d4a9f4197a8e3ba0b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32278-cwe-434-unrestricted-upload-of-file-f13f731d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32278%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1940-vulnerability-in-red-hat-red-hat-ent-05376571</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1940%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c1d4adf4197a8e3ba0b548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32277-cwe-79-improper-neutralization-of-i-86b1f15c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32277%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4611-os-command-injection-in-totolink-x60-3ae7b1a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4611%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32276-cwe-94-improper-control-of-generati-a03d82ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32276%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20opensource-workshop%20connect-cms&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60949-cwe-200-exposure-of-sensitive-infor-63fae85a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60949%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Census%20CSWeb&amp;severity=critical&amp;id=69c1d4aef4197a8e3ba0b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60948-cwe-79-improper-neutralization-of-i-341329c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60948%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Census%20CSWeb&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60947-cwe-434-unrestricted-upload-of-file-12a4f8c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60947%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60946-cwe-22-improper-limitation-of-a-pat-1902b4db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60946%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Census%20CSWeb&amp;severity=high&amp;id=69c1d4adf4197a8e3ba0b561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23882-cwe-78-improper-neutralization-of-s-d5b9e9d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23882%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1aa03f4197a8e3b8c35ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23485-cwe-22-improper-limitation-of-a-pat-f4e3f9d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23488-cwe-639-authorization-bypass-throug-9ede2719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23488%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23487-cwe-639-authorization-bypass-throug-99878f35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23487%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23486-cwe-200-exposure-of-sensitive-infor-22b9b024</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23486%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1aa03f4197a8e3b8c35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23480-cwe-288-authentication-bypass-using-857ce055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23480%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tool-updates-lots-of-security-and-logic-fixes-mon--38257034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tool%20updates%3A%20lots%20of%20security%20and%20logic%20fixes%2C%20(Mon%2C%20Mar%2023rd)&amp;severity=low&amp;id=69c1a67ff4197a8e3b8b7498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23481-cwe-22-improper-limitation-of-a-pat-6ab7581d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23481%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23484-cwe-22-improper-limitation-of-a-pat-c0f6a5a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23484%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23483-cwe-22-improper-limitation-of-a-pat-f1003822</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23483%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=medium&amp;id=69c1a68ff4197a8e3b8b7ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23482-cwe-22-improper-limitation-of-a-pat-7f430ae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23482%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blinkospace%20blinko&amp;severity=high&amp;id=69c1a68ff4197a8e3b8b7ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3055-cwe-125-out-of-bounds-read-in-netsca-4eb4a414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3055%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=69c1a302f4197a8e3b8aa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4597-sql-injection-in-648540858-wvp-gb281-46ef2a06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4597%3A%20SQL%20Injection%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69c1a302f4197a8e3b8aa1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4368-vulnerability-in-netscaler-adc-9513ba21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4368%3A%20Vulnerability%20in%20NetScaler%20ADC&amp;severity=high&amp;id=69c1a302f4197a8e3b8aa1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2298-cwe-88-improper-neutralization-of-ar-dcfd6ea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2298%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=69c19bf3f4197a8e3b887547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32879-cwe-287-improper-authentication-in--ddbd79c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32879%3A%20CWE-287%3A%20Improper%20Authentication%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4596-cross-site-scripting-in-projectworld-56938e19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4596%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Lawyer%20Management%20System&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30886-cwe-639-authorization-bypass-throug-27f24178</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30886%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QuantumNous%20new-api&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27131-cwe-200-exposure-of-sensitive-infor-620cdf71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27131%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20putyourlightson%20craft-sprig&amp;severity=medium&amp;id=69c194ecf4197a8e3b85fa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26209-cwe-674-uncontrolled-recursion-in-a-d5213351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26209%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20agronholm%20cbor2&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33723-cwe-89-improper-neutralization-of-s-64220460</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33719-cwe-306-missing-authentication-for--f550060a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33719%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33717-cwe-434-unrestricted-upload-of-file-69bcb40c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33717%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de8f4197a8e3b82ea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33716-cwe-287-improper-authentication-in--a45ab5c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33716%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33690-cwe-348-use-of-less-trusted-source--d465d980</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33690%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33688-cwe-204-observable-response-discrep-2ae31524</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33688%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33685-cwe-862-missing-authorization-in-ww-72c96804</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33685%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0898-cwe-284-improper-access-control-in-p-030c9101</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0898%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Pegasystems%20Pega%20Robot%20Studio&amp;severity=critical&amp;id=69c18de6f4197a8e3b82dd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33683-cwe-79-improper-neutralization-of-i-42f6a9a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c18de6f4197a8e3b82dd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33681-cwe-22-improper-limitation-of-a-pat-f4244785</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33681%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33651-cwe-89-improper-neutralization-of-s-783a9dad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33651%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4595-cross-site-scripting-in-code-project-11b45a6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4595%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c18de8f4197a8e3b82ea8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-iranian-nasir-security-is-targeting-the-energy-3994b510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Iranian%20Nasir%20Security%20is%20Targeting%20The%20Energy%20Sector%20in%20the%20Middle%20East&amp;severity=medium&amp;id=69c1ad86f4197a8e3b8da034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15606-cwe-20-improper-input-validation-in-ebf95e38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15606%3A%20CWE-20%20Improper%20input%20validation%20in%20TP-Link%20Systems%20Inc.%20TD-W8961N%20v4.0&amp;severity=high&amp;id=69c18de6f4197a8e3b82dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33650-cwe-863-incorrect-authorization-in--5fb7dae5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33650%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33649-cwe-352-cross-site-request-forgery--1be8ecb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33649%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33648-cwe-78-improper-neutralization-of-s-83c7ae01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33648%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33647-cwe-434-unrestricted-upload-of-file-b82e976f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33647%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33513-cwe-22-improper-limitation-of-a-pat-063f790f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33513%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33512-cwe-287-improper-authentication-in--09a67f4f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33512%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c18a60f4197a8e3b8159e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15605-cwe-321-use-of-hard-coded-cryptogra-411a871b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15605%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15519-cwe-78-improper-neutralization-of-s-1eec4ee0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15519%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15518-cwe-78-improper-neutralization-of-s-c83afbf0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15518%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15517-cwe-306-missing-authentication-for--d24caf26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15517%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Archer%20NX600%20v3.0&amp;severity=high&amp;id=69c1835bf4197a8e3b7ecb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4594-sql-injection-hibernate-in-erupts-er-82ccc1b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4594%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4593-sql-injection-hibernate-in-erupts-er-2d6076e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4593%3A%20SQL%20Injection%20Hibernate%20in%20erupts%20erupt&amp;severity=medium&amp;id=69c1754df4197a8e3b789141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33507-cwe-352-cross-site-request-forgery--676b8efb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33507%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33502-cwe-918-server-side-request-forgery-8b7e8739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33502%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c171cff4197a8e3b777511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33501-cwe-862-missing-authorization-in-ww-15f1a843</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33501%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33500-cwe-79-improper-neutralization-of-i-9b7b8f21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33500%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33499-cwe-79-improper-neutralization-of-i-04b61f15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c16abef4197a8e3b7505aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4592-improper-authentication-in-kalcaddle-0e340947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4592%3A%20Improper%20Authentication%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c17fd9f4197a8e3b7d5dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33493-cwe-22-improper-limitation-of-a-pat-e1c4f89a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33493%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c171cff4197a8e3b777519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32845-cwe-190-integer-overflow-or-wraparo-0511ec41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32845%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20jkuhlmann%20cgltf&amp;severity=medium&amp;id=69c17c7cf4197a8e3b7b5a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33492-cwe-384-session-fixation-in-wwbn-av-973399eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33492%3A%20CWE-384%3A%20Session%20Fixation%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33488-cwe-326-inadequate-encryption-stren-6b555353</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33488%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c16032f4197a8e3b6f2c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4591-os-command-injection-in-kalcaddle-ko-e34b5b79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4591%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m-trends-2026-initial-access-handoff-shrinks-from--7bb1d2f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M-Trends%202026%3A%20Initial%20Access%20Handoff%20Shrinks%20From%20Hours%20to%2022%20Seconds&amp;severity=medium&amp;id=69c155a4f4197a8e3b687c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-services-firm-trio-tech-says-subsidiary-hit-b-aa4297ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Services%20Firm%20Trio-Tech%20Says%20Subsidiary%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69c15220f4197a8e3b66a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4590-cross-site-request-forgery-in-kalcad-72a943be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4590%3A%20Cross-Site%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=low&amp;id=69c1522ef4197a8e3b66a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33485-cwe-89-improper-neutralization-of-s-c274543e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33485%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33483-cwe-770-allocation-of-resources-wit-75dd964b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33483%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33482-cwe-78-improper-neutralization-of-s-3886e14c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33482%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33480-cwe-918-server-side-request-forgery-e7b70dcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33480%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33479-cwe-94-improper-control-of-generati-39924b37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33479%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33478-cwe-78-improper-neutralization-of-s-b6c81f37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33478%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14e9ef4197a8e3b641c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33354-cwe-73-external-control-of-file-nam-49e4b6db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33354%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c14e9ef4197a8e3b641c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33352-cwe-89-improper-neutralization-of-s-bb241f0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33352%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33351-cwe-918-server-side-request-forgery-ae5efa9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33351%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69c14797f4197a8e3b602aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33297-cwe-639-authorization-bypass-throug-8f970b76</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33297%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c14797f4197a8e3b602aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aquas-trivy-vulnerability-scanner-hit-by-supply-ch-7c6dcbc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aqua%E2%80%99s%20Trivy%20Vulnerability%20Scanner%20Hit%20by%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69c14410f4197a8e3b5e2f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-march-threat-intelligence-report-ceabc982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69c14441f4197a8e3b5e3e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4647-out-of-bounds-read-in-red-hat-red-ha-36231e4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4647%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69c14797f4197a8e3b602ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4645-loop-with-unreachable-exit-condition-6cd7e4c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4645&amp;severity=null&amp;id=69c14797f4197a8e3b602abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4589-server-side-request-forgery-in-kalca-2067b409</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4589%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c14797f4197a8e3b602ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4588-use-of-hard-coded-cryptographic-key--6d0f896a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4588%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4587-improper-certificate-validation-in-h-097d952b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4587%3A%20Improper%20Certificate%20Validation%20in%20HybridAuth&amp;severity=medium&amp;id=69c1398bf4197a8e3b580fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1958-cwe-798-use-of-hard-coded-credential-fc23d20f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1958%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BRI%20KlinikaXP%20Insertino&amp;severity=high&amp;id=69c1398bf4197a8e3b580fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31851-cwe-307-improper-restriction-of-exc-a96497fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31851%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31850-cwe-256-plaintext-storage-of-a-pass-36d1e4ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31850%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31849-cwe-352-cross-site-request-forgery--9fe3828a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31849%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31848-cwe-312-cleartext-storage-of-sensit-384352d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31848%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4586-unrestricted-upload-in-codephiliax-c-82ce6b58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4586%3A%20Unrestricted%20Upload%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69c16abef4197a8e3b7505be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31847-cwe-912-hidden-functionality-in-nex-b07dd3af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31847%3A%20CWE-912%20Hidden%20Functionality%20in%20Nexxt%20Solutions%20Nebula%20300%2B&amp;severity=high&amp;id=69c1d4aef4197a8e3ba0b58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31846-cwe-306-missing-authentication-for--a9c2d2c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Nexxt%20Solutions%20Nebula%20300%2B%20%2F%20Tenda%20F3%20V2.0%20Firmware&amp;severity=high&amp;id=69c12ef9f4197a8e3b4f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32969-cwe-89-improper-neutralization-of-s-9351491e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=69c127f2f4197a8e3b4567ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32968-cwe-78-improper-neutralization-of-s-6f1949ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32968%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20MB%20connect%20line%20mbCONNECT24&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4585-os-command-injection-in-tiandy-easy7-54d78cb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4585%3A%20OS%20Command%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=critical&amp;id=69c127f2f4197a8e3b4567f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4584-cleartext-transmission-of-sensitive--afe1d79d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4584%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c127f2f4197a8e3b4567f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-four-vulnerabilities-exploited-at-pwn-c42a1500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Four%20Vulnerabilities%20Exploited%20at%20Pwn2Own&amp;severity=low&amp;id=69c120e8f4197a8e3b40ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4633-generation-of-error-message-containi-d7a7c0fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4633%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69c11d65f4197a8e3b3f53d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4583-authentication-bypass-by-capture-rep-6441f94b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4583%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c119e0f4197a8e3b3cb44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-fully-operational-despite-law-enforceme-6358f581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Fully%20Operational%20Despite%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69c1165cf4197a8e3b3b0692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28809-cwe-611-improper-restriction-of-xml-6e572eae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28809%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20dropbox%20esaml&amp;severity=medium&amp;id=69c119e0f4197a8e3b3cb44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4582-missing-authentication-in-shenzhen-h-bdf6f3ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4582%3A%20Missing%20Authentication%20in%20Shenzhen%20HCC%20Technology%20MPOS%20M6%20PLUS&amp;severity=low&amp;id=69c10bd0f4197a8e3b33b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4581-sql-injection-in-code-projects-simpl-f864cf7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4581%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10bd0f4197a8e3b33b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostclaw-expands-beyond-npm-github-repositories-a-368823f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostClaw%20expands%20beyond%20npm%3A%20GitHub%20repositories%20and%20AI%20workflows%20deliver%20macOS%20infostealer&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4580-sql-injection-in-code-projects-simpl-e7825aa4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4580%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c10142f4197a8e3b28a6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4628-improper-access-control-in-red-hat-r-36ac1ffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4628%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69c0fdbff4197a8e3b25d07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3587-cwe-912-hidden-functionality-in-wago-a4c55a72</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3587%3A%20CWE-912%20Hidden%20Functionality%20in%20WAGO%20Lean%20Managed%20Switch%20852-1812&amp;severity=critical&amp;id=69c0f6b6f4197a8e3b21d85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4579-sql-injection-in-code-projects-simpl-5f3bc715</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4579%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Laundry%20System&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4578-cross-site-scripting-in-code-project-c0d98763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4578%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0efaff4197a8e3b1e6aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13997-cwe-200-exposure-of-sensitive-infor-d51b2161</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%2080%2B%20Elementor%20Widgets%2C%204%20000%2B%20Elementor%20Templates%2C%20WooCommerce%2C%20Mega%20Menu%2C%20Popup%20Builder&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6229-cwe-79-improper-neutralization-of-in-231a13b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4577-cross-site-scripting-in-code-project-23780ee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4577%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0e19ff4197a8e3b18a2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1969-cwe-434-unrestricted-upload-of-file--c0354933</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1969%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20trx_addons&amp;severity=medium&amp;id=69c0daaaf4197a8e3b15ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4576-cross-site-scripting-in-code-project-134b1b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4576%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4575-cross-site-scripting-in-code-project-40472f6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4575%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-critical-ident-3d33a815</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20Emergency%20Patch%20for%20Critical%20Identity%20Manager%20Vulnerability&amp;severity=critical&amp;id=69c0d38ff4197a8e3b12d6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10734-cwe-922-insecure-storage-of-sensiti-bad439f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10734%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10679-cwe-94-improper-control-of-generati-1b2de9ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10679%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=high&amp;id=69c0d39df4197a8e3b12da10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10731-cwe-285-improper-authorization-in-r-54a86519</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10731%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4574-sql-injection-in-sourcecodester-simp-590bdc3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4574%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4573-sql-injection-in-sourcecodester-simp-6f478352</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4573%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-learning%20System&amp;severity=medium&amp;id=69c0d39df4197a8e3b12da21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4603-division-by-zero-in-jsrsasign-d0b63e96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4603%3A%20Division%20by%20zero%20in%20jsrsasign&amp;severity=medium&amp;id=69c0d39ff4197a8e3b12db18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4601-missing-cryptographic-step-in-jsrsas-1b19c447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4601%3A%20Missing%20Cryptographic%20Step%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39ff4197a8e3b12db0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4599-incomplete-comparison-with-missing-f-9aee8aa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4599%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4598-infinite-loop-in-jsrsasign-37374acf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4598%3A%20Infinite%20loop%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39df4197a8e3b12da3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4602-incorrect-conversion-between-numeric-8eab0826</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4602%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20jsrsasign&amp;severity=high&amp;id=69c0d39ff4197a8e3b12db12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4600-improper-verification-of-cryptograph-546ca5ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4600%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20jsrsasign&amp;severity=critical&amp;id=69c0d39df4197a8e3b12da49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10736-cwe-285-improper-authorization-in-r-8dcd9600</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10736%3A%20CWE-285%20Improper%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-Criteria%20Reviews%20for%20WooCommerce%20with%20Google%20Reviews%20%26%20Schema&amp;severity=medium&amp;id=69c1d4aef4197a8e3ba0b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4572-sql-injection-in-sourcecodester-sale-bb457c93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4572%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c12b75f4197a8e3b4d2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4571-sql-injection-in-sourcecodester-sale-b8e8c39e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4571%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c16abef4197a8e3b7505b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4570-sql-injection-in-sourcecodester-sale-4006fb57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4570%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c171cff4197a8e3b77751d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4569-sql-injection-in-sourcecodester-sale-ef4f7718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4569%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0b3fdf4197a8e3be64bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4568-sql-injection-in-sourcecodester-sale-d163008f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4568%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69c0a5dbf4197a8e3bdb4a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4567-stack-based-buffer-overflow-in-tenda-27ff1845</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4567%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=critical&amp;id=69c0a5dbf4197a8e3bdb4a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4566-stack-based-buffer-overflow-in-belki-8cb934b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4566%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69c0a5dbf4197a8e3bdb4a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4606-cwe-250-execution-with-unnecessary-p-39d565c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4606%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20GeoVision%20GV-Edge%20Recording%20Manager&amp;severity=critical&amp;id=69c097cbf4197a8e3bd66623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4565-buffer-overflow-in-tenda-ac21-5d23ce15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4565%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=69c090cbf4197a8e3bd36054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52204-na-030c791a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52204%3A%20n%2Fa&amp;severity=medium&amp;id=69c19bf3f4197a8e3b887542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46879-na-e2beb03b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46879%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46878-na-66a3746b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46878%3A%20n%2Fa&amp;severity=medium&amp;id=69c1986ff4197a8e3b86e7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30007-na-1658d953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30007%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b77750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30006-na-b7b35e80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30006%3A%20n%2Fa&amp;severity=medium&amp;id=69c171cff4197a8e3b777509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26829-na-1d4912f4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26829%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26828-na-a163fedf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26828%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b7505a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24516-na-ecd959ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24516%3A%20n%2Fa&amp;severity=high&amp;id=69c16abef4197a8e3b75059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51226-na-d76be320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51226%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51225-na-6216ff27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51225%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51224-na-96495e20</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51224%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51223-na-3bf6f4be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51223%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51222-na-79d2d66d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51222%3A%20n%2Fa&amp;severity=medium&amp;id=69c16032f4197a8e3b6f2bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-23-fcf08916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-23&amp;severity=medium&amp;id=69c127e7f4197a8e3b450253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-23-8c3342de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-23&amp;severity=low&amp;id=69c097c3f4197a8e3bd6641a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4564-code-injection-in-yangzongzhuan-ruoy-64a205a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4564%3A%20Code%20Injection%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4563-authorization-bypass-in-maccms-eaf25abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4563%3A%20Authorization%20Bypass%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2580-cwe-89-improper-neutralization-of-sp-b93f1b1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2580%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69c07babf4197a8e3bc82349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4562-missing-authentication-in-maccms-3327321e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4562%3A%20Missing%20Authentication%20in%20MacCMS&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4558-os-command-injection-in-linksys-mr96-e5c4353d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4558%3A%20OS%20Command%20Injection%20in%20Linksys%20MR9600&amp;severity=high&amp;id=69c02acff4197a8e3ba6a972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4557-cross-site-scripting-in-code-project-2053ca14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4557%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=69c02acff4197a8e3ba6a96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33296-cwe-601-url-redirection-to-untruste-785f37e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33296%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WWBN%20AVideo&amp;severity=low&amp;id=69c023c9f4197a8e3ba36535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33295-cwe-79-improper-neutralization-of-i-4fafbbb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33295%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c023c9f4197a8e3ba36531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33294-cwe-918-server-side-request-forgery-a13589f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33294%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4555-stack-based-buffer-overflow-in-d-lin-d3320ca7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4555%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4554-command-injection-in-tenda-f453-fa4e7404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4554%3A%20Command%20Injection%20in%20Tenda%20F453&amp;severity=medium&amp;id=69c02043f4197a8e3ba1f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33293-cwe-22-improper-limitation-of-a-pat-ff5dbc0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33293%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c02043f4197a8e3ba1f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33319-cwe-78-improper-neutralization-of-s-96a640bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33319%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33292-cwe-22-improper-limitation-of-a-pat-24031473</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4553-stack-based-buffer-overflow-in-tenda-df9d32ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4553%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c00eaff4197a8e3b87db39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4552-stack-based-buffer-overflow-in-tenda-2d4d3dfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4552%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4551-stack-based-buffer-overflow-in-tenda-a56904d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4551%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69c0009ff4197a8e3b7d8e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4550-sql-injection-in-code-projects-simpl-5472b525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4550%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Gym%20Management%20System&amp;severity=medium&amp;id=69bff615f4197a8e3b77b0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4549-authorization-bypass-in-mickasmt-nex-2c60ce48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4549%3A%20Authorization%20Bypass%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=low&amp;id=69bff615f4197a8e3b77b0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4548-improper-authorization-in-mickasmt-n-c85f7652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4548%3A%20Improper%20Authorization%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4547-business-logic-errors-in-mickasmt-ne-eba15f55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4547%3A%20Business%20Logic%20Errors%20in%20mickasmt%20next-saas-stripe-starter&amp;severity=medium&amp;id=69bfef0bf4197a8e3b75ae7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4546-uncontrolled-search-path-in-flos-fre-73cfae25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4546%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfef0bf4197a8e3b75ae78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4115-improper-verification-of-cryptograph-b4a4f2b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4115%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20PuTTY&amp;severity=medium&amp;id=69bfe0fbf4197a8e3b712c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4545-uncontrolled-search-path-in-flos-fre-4b0b234b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4545%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=69bfd2ebf4197a8e3b6b775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4544-cross-site-scripting-in-wavlink-wl-w-1122168c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4544%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4543-command-injection-in-wavlink-wl-wn57-50f96d33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4543%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=69bfba4ff4197a8e3b61fc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4542-path-traversal-in-sscms-2ffdaf39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4542%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69bfafc3f4197a8e3b5ee767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4541-improper-verification-of-cryptograph-bb085ec7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4541%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20janmojzis%20tinyssh&amp;severity=low&amp;id=69bfafc3f4197a8e3b5ee75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4540-sql-injection-in-projectworlds-onlin-4351ab2e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4540%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Notes%20Sharing%20System&amp;severity=medium&amp;id=69bfa1b3f4197a8e3b5a1521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4539-inefficient-regular-expression-compl-cb34245c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4539%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20pygments&amp;severity=medium&amp;id=69bf85b4f4197a8e3b50f1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4538-deserialization-in-pytorch-3d5ae3d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4538%3A%20Deserialization%20in%20PyTorch&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4537-command-injection-in-cudy-tr1200-eb876869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4537%3A%20Command%20Injection%20in%20Cudy%20TR1200&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4536-unrestricted-upload-in-acrel-environ-2a8656cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4536%3A%20Unrestricted%20Upload%20in%20Acrel%20Environmental%20Monitoring%20Cloud%20Platform&amp;severity=medium&amp;id=69bf707bf4197a8e3b474c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4535-stack-based-buffer-overflow-in-tenda-8f2fc263</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4535%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4534-stack-based-buffer-overflow-in-tenda-65a33e73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4534%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69bf707bf4197a8e3b474c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3427-cwe-79-improper-neutralization-of-in-f396b435</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=69c0833cf4197a8e3bcdaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4314-cwe-269-improper-privilege-managemen-df6f51b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=69c0833cf4197a8e3bcdaa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33550-cwe-308-use-of-single-factor-authen-6be57b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33550%3A%20CWE-308%20Use%20of%20Single-factor%20Authentication%20in%20Alinto%20SOGo&amp;severity=low&amp;id=69bf545af4197a8e3b1d674e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71276-cwe-79-improper-neutralization-of-i-4b87c96d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=69bf545af4197a8e3b1d674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4533-sql-injection-in-code-projects-simpl-c9dcca98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4533%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf545af4197a8e3b1d6752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4532-files-or-directories-accessible-in-c-73433b3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4532%3A%20Files%20or%20Directories%20Accessible%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4531-denial-of-service-in-free5gc-a793a8cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4531%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69bf49cef4197a8e3b18ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-22-08f7f078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-22&amp;severity=medium&amp;id=69c00b23f4197a8e3b82758b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-22-2b31dbc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-22&amp;severity=low&amp;id=69bf7afff4197a8e3b4d698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4530-sql-injection-in-apconw-aix-db-2ac345d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4530%3A%20SQL%20Injection%20in%20apconw%20Aix-DB&amp;severity=medium&amp;id=69bf2daff4197a8e3b0c09df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4529-stack-based-buffer-overflow-in-d-lin-7f100378</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4529%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DHP-1320&amp;severity=high&amp;id=69bf26a7f4197a8e3b098306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3629-cwe-269-improper-privilege-managemen-61196a39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3629%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=69bf1f9ff4197a8e3b06ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4528-server-side-request-forgery-in-truel-6267e37d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4528%3A%20Server-Side%20Request%20Forgery%20in%20trueleaf%20ApiFlow&amp;severity=medium&amp;id=69bf1898f4197a8e3b034520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2756-missing-authentication-in-omnipemf-n-3c473c97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2756%3A%20Missing%20Authentication%20in%20OmniPEMF%20NeoRhythm&amp;severity=low&amp;id=69bed94ff4197a8e3be73e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4516-injection-in-foundation-agents-metag-cb474584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4516%3A%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69beb627f4197a8e3bd740a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4515-code-injection-in-foundation-agents--00ba46ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4515%3A%20Code%20Injection%20in%20Foundation%20Agents%20MetaGPT&amp;severity=medium&amp;id=69be84f0f4197a8e3bc20cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-quest-kace-vulnerability-potentially-expl-c5cd699f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Quest%20KACE%20Vulnerability%20Potentially%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69be7a63f4197a8e3bbd68e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4514-improper-access-controls-in-pbootcms-bb082049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4514%3A%20Improper%20Access%20Controls%20in%20PbootCMS&amp;severity=medium&amp;id=69be7a70f4197a8e3bbd6d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4513-sql-injection-in-vanna-ai-vanna-6c0caded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4513%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be6fd7f4197a8e3bb95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4511-injection-in-vanna-ai-vanna-87d5cbfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4511%3A%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69be5ac1f4197a8e3bb09e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4510-cross-site-scripting-in-pbootcms-efcb0958</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4510%3A%20Cross%20Site%20Scripting%20in%20PbootCMS&amp;severity=medium&amp;id=69be45a8f4197a8e3ba73aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4373-cwe-36-absolute-path-traversal-in-je-12b1586f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4373%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=high&amp;id=69be45a8f4197a8e3ba73aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4509-incomplete-blacklist-in-pbootcms-c754c3d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4509%3A%20Incomplete%20Blacklist%20in%20PbootCMS&amp;severity=medium&amp;id=69be3796f4197a8e3ba0643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4022-cwe-79-improper-neutralization-of-in-7a0fd10b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4022%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativedev4%20Show%20Posts%20list%20%E2%80%93%20Easy%20designs%2C%20filters%20and%20more&amp;severity=medium&amp;id=69be1811f4197a8e3b784400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3478-cwe-918-server-side-request-forgery--aeeaf0a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3478%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20benmoody%20Content%20Syndication%20Toolkit&amp;severity=high&amp;id=69be180ef4197a8e3b78435f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1914-cwe-79-improper-neutralization-of-in-2b6d007f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=69be1809f4197a8e3b783d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2501-cwe-79-improper-neutralization-of-in-788a7318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Social%20Share&amp;severity=medium&amp;id=69be180df4197a8e3b7842cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4004-cwe-94-improper-control-of-generatio-7256d48a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4004%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be1811f4197a8e3b7843f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1278-cwe-79-improper-neutralization-of-in-a7319460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ketanmujumdar%20Mandatory%20Field&amp;severity=medium&amp;id=69be1806f4197a8e3b783bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2121-cwe-79-improper-neutralization-of-in-4523a2ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Show%20Posts&amp;severity=medium&amp;id=69be180bf4197a8e3b784269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2837-cwe-79-improper-neutralization-of-in-aca66766</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20systemsrtk%20Ricerca%20%E2%80%93%20advanced%20search&amp;severity=medium&amp;id=69be180df4197a8e3b7842e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1397-cwe-79-improper-neutralization-of-in-fe7f07ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peacefulqode%20PQ%20Addons%20%E2%80%93%20Creative%20Elementor%20Widgets&amp;severity=medium&amp;id=69be1807f4197a8e3b783c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2723-cwe-352-cross-site-request-forgery-c-29fc5831</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2723%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phy9pas%20Post%20Snippits&amp;severity=medium&amp;id=69be180df4197a8e3b7842e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3997-cwe-79-improper-neutralization-of-in-6af7d70c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoosierdragon%20Text%20Toggle&amp;severity=medium&amp;id=69be1811f4197a8e3b7843ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3354-cwe-79-improper-neutralization-of-in-c48c2947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooeypoo%20Wikilookup&amp;severity=medium&amp;id=69be180ef4197a8e3b784351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4143-cwe-352-cross-site-request-forgery-c-a75b1d3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20neo2oo5%20Neos%20Connector%20for%20Fakturama&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4261-cwe-862-missing-authorization-in-hus-fa4ebb4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4261%3A%20CWE-862%20Missing%20Authorization%20in%20husobj%20Expire%20Users&amp;severity=high&amp;id=69be1813f4197a8e3b784ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4161-cwe-79-improper-neutralization-of-in-d6365643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revukangaroo%20Review%20Map%20by%20RevuKangaroo&amp;severity=medium&amp;id=69be1813f4197a8e3b784eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2720-cwe-862-missing-authorization-in-cod-9f638a74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2720%3A%20CWE-862%20Missing%20Authorization%20in%20codeclove%20Hr%20Press%20Lite&amp;severity=medium&amp;id=69be180df4197a8e3b7842d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3554-cwe-79-improper-neutralization-of-in-b5e9e6fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sherkspear%20Sherk%20Custom%20Post%20Type%20Displays&amp;severity=medium&amp;id=69be1810f4197a8e3b784383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2503-cwe-89-improper-neutralization-of-sp-845cf738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69be180df4197a8e3b7842d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3353-cwe-79-improper-neutralization-of-in-0976e5f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intermod%20Comment%20SPAM%20Wiper&amp;severity=medium&amp;id=69be180ef4197a8e3b78434c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2351-cwe-73-external-control-of-file-name-465411d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2351%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20eoxia%20Task%20Manager&amp;severity=medium&amp;id=69be180bf4197a8e3b784289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1911-cwe-79-improper-neutralization-of-in-cc3c042e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viaviwebtech%20Twitter%20Feeds&amp;severity=medium&amp;id=69be1809f4197a8e3b783d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1648-cwe-918-server-side-request-forgery--062101f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1648%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20qrolic%20Performance%20Monitor&amp;severity=high&amp;id=69be1807f4197a8e3b783c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0609-cwe-79-improper-neutralization-of-in-c969af4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Logo%20Slider%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Showcase%20%26%20Client%20Logo%20Slider%20Plugin&amp;severity=medium&amp;id=69be1806f4197a8e3b783b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1575-cwe-79-improper-neutralization-of-in-408cd466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeric_izon%20Schema%20Shortcode&amp;severity=medium&amp;id=69be1807f4197a8e3b783c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3645-cwe-862-missing-authorization-in-pun-2d45e1ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3645%3A%20CWE-862%20Missing%20Authorization%20in%20punnel%20Punnel%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69be1810f4197a8e3b7843aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1275-cwe-79-improper-neutralization-of-in-dba442e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Multi%20Post%20Carousel%20by%20Category&amp;severity=medium&amp;id=69be1806f4197a8e3b783bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1908-cwe-79-improper-neutralization-of-in-b506e305</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minnur%20Integration%20with%20Hubspot%20Forms&amp;severity=medium&amp;id=69be1809f4197a8e3b783d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3617-cwe-79-improper-neutralization-of-in-1a4b1961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swergroup%20Paypal%20Shortcodes&amp;severity=medium&amp;id=69be1810f4197a8e3b78438f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1647-cwe-79-improper-neutralization-of-in-c9b2ffb5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basiliskan%20Comment%20Genius&amp;severity=medium&amp;id=69be1807f4197a8e3b783c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3347-cwe-79-improper-neutralization-of-in-b23caa6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arevico%20Multi%20Functional%20Flexi%20Lightbox&amp;severity=medium&amp;id=69be180ef4197a8e3b784345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2427-cwe-79-improper-neutralization-of-in-80f98a8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kazunii%20itsukaita&amp;severity=medium&amp;id=69be180bf4197a8e3b78429b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4072-cwe-79-improper-neutralization-of-in-f39edd0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tstachl%20WordPress%20PayPal%20Donation&amp;severity=medium&amp;id=69be1811f4197a8e3b78441d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3546-cwe-202-exposure-of-sensitive-inform-17645cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3546%3A%20CWE-202%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20forfront%20e-shot&amp;severity=medium&amp;id=69be1810f4197a8e3b78437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3333-cwe-79-improper-neutralization-of-in-6ad0c532</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minhnhut%20MinhNhut%20Link%20Gateway&amp;severity=medium&amp;id=69be180ef4197a8e3b784332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14037-cwe-352-cross-site-request-forgery--03a05b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14037%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20invelity%20Invelity%20Product%20Feeds&amp;severity=high&amp;id=69be1806f4197a8e3b783b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4087-cwe-89-improper-neutralization-of-sp-e5eec0f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4087%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20samperrow%20Pre*%20Party%20Resource%20Hints&amp;severity=medium&amp;id=69be1811f4197a8e3b784443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1503-cwe-352-cross-site-request-forgery-c-9ddba76f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1503%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frankkoenen%20Plugin%20Name%3A%20login_register&amp;severity=medium&amp;id=69be1807f4197a8e3b783c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13785-cwe-94-improper-control-of-generati-ab6a1f39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13785%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reputeinfosystems%20Contact%20Form%2C%20Survey%2C%20Quiz%20%26%20Popup%20Form%20Builder%20%E2%80%93%20ARForms&amp;severity=medium&amp;id=69be1806f4197a8e3b783b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3619-cwe-79-improper-neutralization-of-in-464c4dc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonyh-1%20Sheets2Table&amp;severity=medium&amp;id=69be1810f4197a8e3b784398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3331-cwe-352-cross-site-request-forgery-c-9da5a7b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3331%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chuckmo%20Lobot%20Slider%20Administrator&amp;severity=medium&amp;id=69be180ef4197a8e3b784328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1313-cwe-918-server-side-request-forgery--530406e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1313%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20eagerterrier%20MimeTypes%20Link%20Icons&amp;severity=high&amp;id=69be1806f4197a8e3b783bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3003-cwe-79-improper-neutralization-of-in-1c64fa1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vagaro%20Vagaro%20Booking%20Widget&amp;severity=high&amp;id=69be180df4197a8e3b7842f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1392-cwe-352-cross-site-request-forgery-c-4eab07f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1392%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20superrishi%20SR%20WP%20Minify%20HTML&amp;severity=medium&amp;id=69be1807f4197a8e3b783c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3460-cwe-20-improper-input-validation-in--49405daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=medium&amp;id=69be180ef4197a8e3b784356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3641-cwe-20-improper-input-validation-in--e26ee0b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3641%3A%20CWE-20%20Improper%20Input%20Validation%20in%20appmaxplataforma%20Appmax&amp;severity=medium&amp;id=69be1810f4197a8e3b78439f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3996-cwe-79-improper-neutralization-of-in-68478d14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sammyb%20WP%20Games%20Embed&amp;severity=medium&amp;id=69be1810f4197a8e3b7843c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3332-cwe-352-cross-site-request-forgery-c-c2f5142d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3332%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xhanch_studio%20Xhanch%20%E2%80%93%20My%20Advanced%20Settings&amp;severity=medium&amp;id=69be180ef4197a8e3b78432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2468-cwe-89-improper-neutralization-of-sp-1117943b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2468%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quentn%20Quentn%20WP&amp;severity=high&amp;id=69be180df4197a8e3b7842c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2294-cwe-285-improper-authorization-in-ad-117c9b16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2294%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69be180bf4197a8e3b784285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1253-cwe-862-missing-authorization-in-ato-80830b1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1253%3A%20CWE-862%20Missing%20Authorization%20in%20atomchat%20Group%20Chat%20%26%20Video%20Chat%20by%20AtomChat&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1899-cwe-79-improper-neutralization-of-in-8084abd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itpathsolutions%20Any%20Post%20Slider&amp;severity=medium&amp;id=69be1809f4197a8e3b783d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3651-cwe-862-missing-authorization-in-hak-486b71e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3651%3A%20CWE-862%20Missing%20Authorization%20in%20hakeemnala%20Build%20App%20Online&amp;severity=medium&amp;id=69be1810f4197a8e3b7843b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1806-cwe-79-improper-neutralization-of-in-f97469bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tourcms%20Tour%20%26%20Activity%20Operator%20Plugin%20for%20TourCMS&amp;severity=medium&amp;id=69be1809f4197a8e3b783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1247-cwe-79-improper-neutralization-of-in-c6f3c974</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1247%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seosbg%20Survey&amp;severity=medium&amp;id=69be1806f4197a8e3b783ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1935-cwe-862-missing-authorization-in-bra-987f9535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1935%3A%20CWE-862%20Missing%20Authorization%20in%20brainstation23%20Company%20Posts%20for%20LinkedIn&amp;severity=medium&amp;id=69be180bf4197a8e3b784264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1886-cwe-79-improper-neutralization-of-in-ac2ded26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hrs2015%20Go%20Night%20Pro%20%7C%20WordPress%20Dark%20Mode%20Plugin&amp;severity=medium&amp;id=69be1809f4197a8e3b783d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1891-cwe-79-improper-neutralization-of-in-fbd941f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dogrow%20Simple%20Football%20Scoreboard&amp;severity=medium&amp;id=69be1809f4197a8e3b783d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13910-cwe-79-improper-neutralization-of-i-f70b79dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20axton%20WP-WebAuthn&amp;severity=medium&amp;id=69be1806f4197a8e3b783b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4069-cwe-79-improper-neutralization-of-in-e056d151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pftool%20Alfie%20%E2%80%93%20Feed%20Plugin&amp;severity=medium&amp;id=69be1811f4197a8e3b784412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2496-cwe-79-improper-neutralization-of-in-d1387e77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20waianaeboy702%20Ed&apos;s%20Font%20Awesome&amp;severity=medium&amp;id=69be180df4197a8e3b7842c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2424-cwe-79-improper-neutralization-of-in-9fbdb9b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2424%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20applixir%20Reward%20Video%20Ad%20for%20WordPress&amp;severity=medium&amp;id=69be180bf4197a8e3b784294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4084-cwe-79-improper-neutralization-of-in-2ab00629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbednarek%20fyyd%20podcast%20shortcodes&amp;severity=medium&amp;id=69be1811f4197a8e3b78442d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4127-cwe-862-missing-authorization-in-cha-4f808c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4127%3A%20CWE-862%20Missing%20Authorization%20in%20charlycharm%20Speedup%20Optimization&amp;severity=medium&amp;id=69be1813f4197a8e3b784ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1093-cwe-79-improper-neutralization-of-in-2d469579</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1093%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativewerkdesigns%20WPFAQBlock%E2%80%93%20FAQ%20%26%20Accordion%20Plugin%20For%20Gutenberg&amp;severity=medium&amp;id=69be1806f4197a8e3b783b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2290-cwe-918-server-side-request-forgery--493a61c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2290%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jurajsim%20Post%20Affiliate%20Pro&amp;severity=medium&amp;id=69be180bf4197a8e3b784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3506-cwe-862-missing-authorization-in-lar-e3524987</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3506%3A%20CWE-862%20Missing%20Authorization%20in%20larrykim%20WP-Chatbot%20for%20Messenger&amp;severity=medium&amp;id=69be1810f4197a8e3b784372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4067-cwe-79-improper-neutralization-of-in-bc0cb2da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nocaredev%20Ad%20Short&amp;severity=medium&amp;id=69be1811f4197a8e3b78440b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2277-cwe-79-improper-neutralization-of-in-34e2f15d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20larsdrasmussen%20rexCrawler&amp;severity=medium&amp;id=69be180bf4197a8e3b784272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1851-cwe-79-improper-neutralization-of-in-f86fc823</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deckercz%20iVysilani%20Shortcode&amp;severity=medium&amp;id=69be1809f4197a8e3b783d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4077-cwe-79-improper-neutralization-of-in-a742ebf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miguelmartinezlopez%20Ecover%20Builder%20For%20Dummies&amp;severity=medium&amp;id=69be1811f4197a8e3b784424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1390-cwe-352-cross-site-request-forgery-c-5d433691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1390%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20haghs%20Redirect%20countdown&amp;severity=medium&amp;id=69be1807f4197a8e3b783c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1378-cwe-352-cross-site-request-forgery-c-1972715a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1378%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20suifengtec%20WP%20Posts%20Re-order&amp;severity=medium&amp;id=69be1807f4197a8e3b783c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1393-cwe-352-cross-site-request-forgery-c-60eef6f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20omarnas%20Add%20Google%20Social%20Profiles%20to%20Knowledge%20Graph%20Box&amp;severity=medium&amp;id=69be1807f4197a8e3b783c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1854-cwe-79-improper-neutralization-of-in-ba6d190e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nosoycesaros%20Post%20Flagger&amp;severity=medium&amp;id=69be1809f4197a8e3b783d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1822-cwe-79-improper-neutralization-of-in-be7013d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tonysamperi%20WP%20NG%20Weather&amp;severity=medium&amp;id=69be1809f4197a8e3b783d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2941-cwe-862-missing-authorization-in-plu-785289cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2941%3A%20CWE-862%20Missing%20Authorization%20in%20plugli%20Linksy%20Search%20and%20Replace&amp;severity=high&amp;id=69be180df4197a8e3b7842ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4086-cwe-79-improper-neutralization-of-in-d801ad0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4086%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20newbiesup%20WP%20Random%20Button&amp;severity=medium&amp;id=69be1811f4197a8e3b78443c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2375-cwe-269-improper-privilege-managemen-b429e3ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2375%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=69be180bf4197a8e3b78428f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1800-cwe-89-improper-neutralization-of-sp-6508487b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1800%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wisdomlogix%20Fonts%20Manager%20%7C%20Custom%20Fonts&amp;severity=high&amp;id=69be1807f4197a8e3b783c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2440-cwe-79-improper-neutralization-of-in-5cce452d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=69be180df4197a8e3b7842bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3335-cwe-862-missing-authorization-in-fli-d6558976</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3335%3A%20CWE-862%20Missing%20Authorization%20in%20flightbycanto%20Canto&amp;severity=medium&amp;id=69be180ef4197a8e3b78433c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3570-cwe-862-missing-authorization-in-acu-58dc6d36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3570%3A%20CWE-862%20Missing%20Authorization%20in%20acumenconsulting%20Smarter%20Analytics&amp;severity=medium&amp;id=69be1810f4197a8e3b78438a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3334-cwe-89-improper-neutralization-of-sp-c25ae167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3334%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thoefter%20CMS%20Commander%20%E2%80%93%20Manage%20Multiple%20Sites&amp;severity=high&amp;id=69be180ef4197a8e3b784337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2279-cwe-89-improper-neutralization-of-sp-9177e77e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2279%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silvercover%20myLinksDump&amp;severity=high&amp;id=69be180bf4197a8e3b784279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4302-cwe-918-server-side-request-forgery--5793ece4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4302%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69bdff57f4197a8e3b623666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-21-7d29c70a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-21&amp;severity=medium&amp;id=69be5ab7f4197a8e3bb06acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-21-efa95b81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-21&amp;severity=low&amp;id=69be5ab7f4197a8e3bb06ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33238-cwe-22-improper-limitation-of-a-pat-e1bc9bf4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33238%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33237-cwe-918-server-side-request-forgery-84e662a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33237%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bdda56b462d409683a8bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2430-cwe-79-improper-neutralization-of-in-b2e5892d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3474-cwe-22-improper-limitation-of-a-path-67cc90df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3474%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=69bdda56b462d409683a8c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3350-cwe-79-improper-neutralization-of-in-800f77b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsaad%20Image%20Alt%20Text%20Manager%20%E2%80%93%20Bulk%20%26%20Dynamic%20Alt%20Tags%20For%20image%20SEO%20Optimization%20%2B%20AI&amp;severity=medium&amp;id=69bdda56b462d409683a8bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3567-cwe-862-missing-authorization-in-swe-2ac2bc12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3567%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69bdda57b462d409683a8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3516-cwe-79-improper-neutralization-of-in-7a01a687</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Contact%20List%20%E2%80%93%20Online%20Staff%20Directory%20%26%20Address%20Book&amp;severity=medium&amp;id=69bdda56b462d409683a8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2352-cwe-79-improper-neutralization-of-in-eae8d2fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=69bdda56b462d409683a8bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4083-cwe-79-improper-neutralization-of-in-fe5ebc60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20demonisblack%20Scoreboard%20for%20HTML5%20Games%20Lite&amp;severity=medium&amp;id=69bdda57b462d409683a8c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3577-cwe-79-improper-neutralization-of-in-5f82dc59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=medium&amp;id=69bdda57b462d409683a8c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3368-cwe-79-improper-neutralization-of-in-e08e88c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Injection%20Guard&amp;severity=high&amp;id=69bdda56b462d409683a8bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3339-cwe-22-improper-limitation-of-a-path-290fd5b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fahadmahmood%20Keep%20Backup%20Daily&amp;severity=low&amp;id=69bdda56b462d409683a8be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24060-cwe-319-in-automated-logic-webctrl--ad487a9d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24060%3A%20CWE-319%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=critical&amp;id=69bdda56b462d409683a8bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32666-cwe-290-in-automated-logic-webctrl--daa6d934</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32666%3A%20CWE-290%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25086-cwe-605-in-automated-logic-webctrl--78c13bd9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25086%3A%20CWE-605%20in%20Automated%20Logic%20WebCTRL%20Premium%20Server&amp;severity=high&amp;id=69bdd7ec1188d0bb0cbf88c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33228-cwe-1321-improperly-controlled-modi-dfc6af7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33228%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31926-cwe-522-in-igl-technologies-eparkin-4991a4ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31926%3A%20CWE-522%20in%20IGL-Technologies%20eParking.fi&amp;severity=medium&amp;id=69bdd4681188d0bb0cbbf668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32663-cwe-613-in-igl-technologies-eparkin-e29ec125</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32663%3A%20CWE-613%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33210-cwe-134-use-of-externally-controlle-d675dffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33210%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20ruby%20json&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31903-cwe-307-in-igl-technologies-eparkin-667c311e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31903%3A%20CWE-307%20in%20IGL-Technologies%20eParking.fi&amp;severity=high&amp;id=69bdd4681188d0bb0cbbf67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29796-cwe-306-in-igl-technologies-eparkin-fcf429f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29796%3A%20CWE-306%20in%20IGL-Technologies%20eParking.fi&amp;severity=critical&amp;id=69bdd4681188d0bb0cbbf678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22163-cwe-820-missing-synchronization-419-71f757dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22163%3A%20CWE-820%3A%20Missing%20Synchronization%20(4.19)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69bdda57b462d409683a8c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21732-cwe-823-use-of-out-of-range-pointer-4944e32e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21732%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.16)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69bdda57b462d409683a8c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28204-cwe-522-in-ctek-chargeportal-ff0258cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28204%3A%20CWE-522%20in%20CTEK%20Chargeportal&amp;severity=medium&amp;id=69bdda57b462d409683a8c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27649-cwe-613-in-ctek-chargeportal-b04619a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27649%3A%20CWE-613%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31904-cwe-307-in-ctek-chargeportal-4055e4ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31904%3A%20CWE-307%20in%20CTEK%20Chargeportal&amp;severity=high&amp;id=69bdda57b462d409683a8c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25192-cwe-306-in-ctek-chargeportal-a1a8a9ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25192%3A%20CWE-306%20in%20CTEK%20Chargeportal&amp;severity=critical&amp;id=69bdda57b462d409683a8c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32810-cwe-732-incorrect-permission-assign-df095845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32810%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20squidowl%20halloy&amp;severity=medium&amp;id=69bdda59b462d409683a8cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33209-cwe-79-improper-neutralization-of-i-3b6d619b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33209%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20avo-hq%20avo&amp;severity=medium&amp;id=69bdda59b462d409683a8cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32733-cwe-22-improper-limitation-of-a-pat-279ffebb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32733%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20squidowl%20halloy&amp;severity=high&amp;id=69bdda57b462d409683a8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33204-cwe-400-uncontrolled-resource-consu-bbf89418</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kelvinmo%20simplejwt&amp;severity=high&amp;id=69bdda59b462d409683a8ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33476-cwe-22-improper-limitation-of-a-pat-3381414c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33203-cwe-248-uncaught-exception-in-siyua-8441b75e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33203%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bdda59b462d409683a8cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4508-sql-injection-in-pbootcms-c1d7dbaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4508%3A%20SQL%20Injection%20in%20PbootCMS&amp;severity=medium&amp;id=69bdda59b462d409683a8cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33194-cwe-22-improper-limitation-of-a-pat-8d28cd73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33194%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdda59b462d409683a8cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33186-cwe-285-improper-authorization-in-g-3cfe069c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33186%3A%20CWE-285%3A%20Improper%20Authorization%20in%20grpc%20grpc-go&amp;severity=critical&amp;id=69bdcad201d25e334c8cba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3864-cwe-22-path-traversal-in-kubernetes--25c8737b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3864%3A%20CWE-22%20Path%20Traversal%20in%20Kubernetes%20CSI%20Driver%20for%20NFS&amp;severity=medium&amp;id=69bdcad201d25e334c8cba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33180-cwe-200-exposure-of-sensitive-infor-6b7e33ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33180%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20hapifhir%20org.hl7.fhir.core&amp;severity=high&amp;id=69bdcad201d25e334c8cba8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4507-sql-injection-in-mindinventory-minds-12bc1db4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4507%3A%20SQL%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4506-code-injection-in-mindinventory-mind-8a38174d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4506%3A%20Code%20Injection%20in%20Mindinventory%20MindSQL&amp;severity=medium&amp;id=69bdc5f74a1db2150bb853dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23536-improper-limitation-of-a-pathname-t-62b17572</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23536%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%20(RHOAI)&amp;severity=high&amp;id=69bdc5f74a1db2150bb853d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33177-cwe-862-missing-authorization-in-st-f4221dee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33177%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33172-cwe-79-improper-neutralization-of-i-2a2580b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69bdc1299e4ece4ed25050a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33171-cwe-22-improper-limitation-of-a-pat-305244fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33171%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69bdc1299e4ece4ed25050a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33166-cwe-22-improper-limitation-of-a-pat-5defed82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33166%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20allure-framework%20allure2&amp;severity=high&amp;id=69bdc1299e4ece4ed250509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32887-cwe-362-concurrent-execution-using--4cdd057f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32887%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Effect-TS%20effect&amp;severity=high&amp;id=69bdc1299e4ece4ed250509c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3584-cwe-94-improper-control-of-generatio-1e9c9524</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=critical&amp;id=69bdbd91e2bf98efc48d0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2378-cwe-1021-improper-restriction-of-ren-2eceb389</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2378%3A%20CWE-1021%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20The%20BrowserCompany%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69bdbd91e2bf98efc48d0974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/libyan-oil-refinery-among-targets-in-long-running--c19cb829</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Libyan%20Oil%20Refinery%20Among%20Targets%20in%20Long-running%20Likely%20Espionage%20Campaign&amp;severity=medium&amp;id=69c10bcff4197a8e3b33b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33164-cwe-122-heap-based-buffer-overflow--c1a273ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33164%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20strukturag%20libde265&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33165-cwe-787-out-of-bounds-write-in-stru-44da5709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33165%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20strukturag%20libde265&amp;severity=medium&amp;id=69bdb3ffe32a4fbe5fced8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33156-cwe-426-untrusted-search-path-in-ni-e5b4bfb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33156%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20NickeManarin%20ScreenToGif&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33155-cwe-400-uncontrolled-resource-consu-c4229f4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33155%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20seperman%20deepdiff&amp;severity=high&amp;id=69bdb079e32a4fbe5fcd3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33151-cwe-20-improper-input-validation-in-b9f920ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33151%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20socketio%20socket.io&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33147-cwe-121-stack-based-buffer-overflow-67cddc2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33147%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20GenericMappingTools%20gmt&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4505-unrestricted-upload-in-eosphoros-ai--e3670476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4505%3A%20Unrestricted%20Upload%20in%20eosphoros-ai%20DB-GPT&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4504-sql-injection-in-eosphoros-ai-db-gpt-5d8e60df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4504%3A%20SQL%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33140-cwe-79-improper-neutralization-of-i-dec26bff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33140%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ParzivalHack%20PySpector&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33139-cwe-184-incomplete-list-of-disallow-d2e1b823</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33139%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ParzivalHack%20PySpector&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4438-cwe-20-improper-input-validation-in--8e885aca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4438%3A%20CWE-20%20Improper%20input%20validation%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4437-cwe-125-out-of-bounds-read-in-the-gn-cd83f98f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4437%3A%20CWE-125%20Out-of-bounds%20read%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33126-cwe-918-server-side-request-forgery-49fe946d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33126%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blakeblackshear%20frigate&amp;severity=medium&amp;id=69bda974e32a4fbe5fca0bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4500-injection-in-bagofwords1-bagofwords-0dcba076</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4500%3A%20Injection%20in%20bagofwords1%20bagofwords&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4499-os-command-injection-in-d-link-dir-8-5874f0f3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4499%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-820LW&amp;severity=medium&amp;id=69bda5ede32a4fbe5fc68a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4497-os-command-injection-in-totolink-wa3-7ad2d73a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4497%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=69bd9b64e32a4fbe5fc09f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33010-cwe-942-permissive-cross-domain-pol-e7fe03ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33010%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20doobidoo%20mcp-memory-service&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4496-os-command-injection-in-sigmade-git--6d5ca08b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4496%3A%20OS%20Command%20Injection%20in%20sigmade%20Git-MCP-Server&amp;severity=medium&amp;id=69bd97dde32a4fbe5fbf1b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32710-cwe-122-heap-based-buffer-overflow--ac2e8bf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32710%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MariaDB%20server&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32317-cwe-346-origin-validation-error-in--0e3db814</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32317%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20android&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32318-cwe-346-origin-validation-error-in--2dbac183</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32318%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20cryptomator%20ios&amp;severity=high&amp;id=69bd97dde32a4fbe5fbf1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4495-cross-site-scripting-in-atjiu-pybbs-524d3045</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4495%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bd8d53e32a4fbe5fb6509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31836-cwe-285-improper-authorization-in-b-a370377c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31836%3A%20CWE-285%3A%20Improper%20Authorization%20in%20bluewave-labs%20Checkmate&amp;severity=high&amp;id=69bdbd91e2bf98efc48d097c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4494-cross-site-scripting-in-atjiu-pybbs-81e77a33</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4494%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4493-stack-based-buffer-overflow-in-tenda-568400c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4493%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bda974e32a4fbe5fca0bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32844-cwe-79-improper-neutralization-of-i-55ddce3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32844%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20XinLiangCoder%20php_api_doc&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d097f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4492-stack-based-buffer-overflow-in-tenda-86e6b8d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4492%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd82c5e32a4fbe5fb2018f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4491-stack-based-buffer-overflow-in-tenda-48c720e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4491%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4490-stack-based-buffer-overflow-in-tenda-d44337bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4490%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15608-cwe-121-stack-based-buffer-overflow-5c3b0431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15608%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15607-cwe-77-improper-neutralization-of-s-5bce1db6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15607%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX53%20v1&amp;severity=high&amp;id=69bd7bc3e32a4fbe5faf4b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59383-cwe-121-in-qnap-systems-inc-media-s-96baa7ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59383%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20Add-on&amp;severity=low&amp;id=69bdbd91e2bf98efc48d0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62843-cwe-923-in-qnap-systems-inc-quroute-20f6e0c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62843%3A%20CWE-923%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62844-cwe-1390-in-qnap-systems-inc-qurout-24231f48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62844%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62845-cwe-150-in-qnap-systems-inc-quroute-cc06e106</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62845%3A%20CWE-150%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62846-cwe-89-in-qnap-systems-inc-qurouter-0aebad47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62846%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22895-cwe-79-in-qnap-systems-inc-quftp-se-12f14fbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22895%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuFTP%20Service&amp;severity=low&amp;id=69bdbd93e2bf98efc48d0f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22897-cwe-78-in-qnap-systems-inc-qunetswi-663db162</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22897%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22898-cwe-306-in-qnap-systems-inc-qvr-pro-d9605d37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22898%3A%20CWE-306%20in%20QNAP%20Systems%20Inc.%20QVR%20Pro&amp;severity=critical&amp;id=69bdbd93e2bf98efc48d0f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22900-cwe-798-in-qnap-systems-inc-qunetsw-1c94d659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22900%3A%20CWE-798%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22901-cwe-78-in-qnap-systems-inc-qunetswi-b98245bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22901%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bdbd93e2bf98efc48d0f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22902-cwe-78-in-qnap-systems-inc-qunetswi-91e83569</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22902%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuNetSwitch&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4489-stack-based-buffer-overflow-in-tenda-7a1a4d9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4489%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18%20Pro&amp;severity=high&amp;id=69bd713de32a4fbe5faaf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-new-android-safeguards-operation-ali-1e852a2f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20New%20Android%20Safeguards%2C%20Operation%20Alice%2C%20UK%20Toughens%20Cyber%20Reporting&amp;severity=medium&amp;id=69bd70fee32a4fbe5faae813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32989-cross-site-request-forgery-csrf-in--4fdf15cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32989%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Precurio%20Precurio%20Intranet%20Portal&amp;severity=high&amp;id=69bd713de32a4fbe5faaf817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32986-cwe-79-improper-neutralization-of-i-53f46ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Textpattern%20Textpattern%20CMS&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4488-buffer-overflow-in-utt-hiper-1250gw-bdf7a1ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4488%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201250GW&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4519-vulnerability-in-python-software-fou-ec881397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4519%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69bd66a5e32a4fbe5fa5cd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-men-charged-with-conspiring-to-smuggle-us-artifi-a64fb585</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Men%20Charged%20With%20Conspiring%20to%20Smuggle%20US%20Artificial%20Intelligence%20to%20China&amp;severity=high&amp;id=69bd5f6ae32a4fbe5fa2bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33312-cwe-863-incorrect-authorization-in--770ceda6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33312%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29794-cwe-807-reliance-on-untrusted-input-e5332580</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29794%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=69bd5fb1e32a4fbe5fa2ca49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4487-buffer-overflow-in-utt-hiper-1200gw-2ecb1ddb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4487%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%201200GW&amp;severity=high&amp;id=69bd5fb1e32a4fbe5fa2ca51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4486-stack-based-buffer-overflow-in-d-lin-7fbf1468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4486%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d858c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4485-sql-injection-in-itsourcecode-colleg-6fa0fd0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4485%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69bd5190e32a4fbe5f999477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31382-cwe-79-improper-neutralization-of-i-63cadc09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31382%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31381-cwe-598-use-of-get-request-method-w-f5d519cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31381%3A%20CWE-598%20Use%20of%20GET%20request%20method%20with%20sensitive%20query%20strings%20in%20Gainsight%20Gainsight%20Assist&amp;severity=medium&amp;id=69bd4e0ce32a4fbe5f8d64d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4434-cwe-295-improper-certificate-validat-669c3b4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4434%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Server&amp;severity=high&amp;id=69bd4702e32a4fbe5f755168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-confirms-handala-link-to-iran-government-amid-t-ad25ca57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Confirms%20Handala%20Link%20to%20Iran%20Government%20Amid%20Takedown%20of%20Hackers%E2%80%99%20Sites&amp;severity=medium&amp;id=69bd3fc6e32a4fbe5f622e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-disables-ios-camera-and-microphon-79d2b253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20disables%20iOS%20camera%20and%20microphone%20indicators%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69bdea2bf4197a8e3b3b6143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/navia-data-breach-impacts-27-million-45a1c180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Navia%20Data%20Breach%20Impacts%202.7%20Million&amp;severity=medium&amp;id=69bd2aade32a4fbe5f53bb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33136-cwe-79-improper-neutralization-of-i-5f385205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33135-cwe-79-improper-neutralization-of-i-cdd783b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33135%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-magento-sites-hit-in-ongoing-defaceme-12b3db1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Magento%20Sites%20Hit%20in%20Ongoing%20Defacement%20Campaign&amp;severity=medium&amp;id=69bd23a5e32a4fbe5f51f85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33134-cwe-89-improper-neutralization-of-s-a410423a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33134%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69bd275fe32a4fbe5f531f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33133-cwe-89-improper-neutralization-of-s-e49a9cd5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33133%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69bd275fe32a4fbe5f531f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33131-cwe-290-authentication-bypass-by-sp-9e875424</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33131%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20h3js%20h3&amp;severity=high&amp;id=69bd23e7e32a4fbe5f52014e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-github-actions-tag-compromise-exposes-c-7ab138eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20GitHub%20Actions%20Tag%20Compromise%20Exposes%20CI%2FCD%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidstealer-debugging-chrome-to-steal-its-secrets-eb82d6ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidStealer%3A%20Debugging%20Chrome%20to%20Steal%20Its%20Secrets&amp;severity=medium&amp;id=69bdb74ce32a4fbe5fd0512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33130-cwe-98-improper-control-of-filename-66c6c7a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33130%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fde03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33129-cwe-208-observable-timing-discrepan-1f7546b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33129%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20h3js%20h3&amp;severity=medium&amp;id=69bd1cd0e32a4fbe5f4fddfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33128-cwe-93-improper-neutralization-of-c-fff9b3de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33128%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22324-cwe-98-improper-control-of-filename-ec806458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22324%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Melania&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0677-cwe-502-deserialization-of-untrusted-eca92283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0677%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TotalSuite%20TotalContest%20Lite&amp;severity=critical&amp;id=69bd194ce32a4fbe5f4ea6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33125-cwe-285-improper-authorization-in-b-c66f9dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33125%3A%20CWE-285%3A%20Improper%20Authorization%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd194ce32a4fbe5f4ea6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33124-cwe-287-improper-authentication-in--31f1f111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33124%3A%20CWE-287%3A%20Improper%20Authentication%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=69bd5190e32a4fbe5f999481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32537-cwe-352-cross-site-request-forgery--fee9ab07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32537%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20joshuae1974%20Flash%20Video%20Player&amp;severity=high&amp;id=69bd5895e32a4fbe5f9d8595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33123-cwe-400-uncontrolled-resource-consu-be1333fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33123%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31119-cwe-79-improper-neutralization-of-i-e477788d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31119%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Vasilis%20Triantafyllou%20Special%20Box%20for%20Content&amp;severity=medium&amp;id=69bd38f3e32a4fbe5f57f055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33080-cwe-79-improper-neutralization-of-i-6232979d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filamentphp%20filament&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32701-cwe-843-access-of-resource-using-in-4cc8eb58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32701%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20QwikDev%20qwik&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27625-cwe-22-improper-limitation-of-a-pat-64c622ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27625%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=69bd0ec2e32a4fbe5f4a70d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gsocket-backdoor-delivered-through-bash-script-fri-cf8c30b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GSocket%20Backdoor%20Delivered%20Through%20Bash%20Script%2C%20(Fri%2C%20Mar%2020th)&amp;severity=medium&amp;id=69bd0b08e32a4fbe5f491c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langflow-vulnerability-exploited-hours-af-bdeb0c89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Langflow%20Vulnerability%20Exploited%20Hours%20After%20Public%20Disclosure&amp;severity=critical&amp;id=69bd0b09e32a4fbe5f491c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33075-cwe-494-download-of-code-without-in-52a1ff21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33075%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20labring%20FastGPT&amp;severity=critical&amp;id=69bd0b4ce32a4fbe5f4933bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33072-cwe-798-use-of-hard-coded-credentia-9bae99e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33072%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20error311%20FileRise&amp;severity=high&amp;id=69bd0b4ce32a4fbe5f4933b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33071-cwe-434-unrestricted-upload-of-file-61b95bec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33071%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20error311%20FileRise&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2432-cwe-79-improper-neutralization-of-in-f8cd0cf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3550-cwe-862-missing-authorization-in-fir-75c59a70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3550%3A%20CWE-862%20Missing%20Authorization%20in%20firetree%20RockPress&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2421-cwe-22-improper-limitation-of-a-path-f2c4c46a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2421%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ghera74%20ilGhera%20Carta%20Docente%20for%20WooCommerce&amp;severity=medium&amp;id=69bd0b4ce32a4fbe5f4933a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33070-cwe-306-missing-authentication-for--851eeec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33070%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20error311%20FileRise&amp;severity=low&amp;id=69bd0b4ce32a4fbe5f4933b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33069-cwe-125-out-of-bounds-read-in-pjsip-9b1ff4fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=69bd6dade32a4fbe5fa8ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33068-cwe-807-reliance-on-untrusted-input-81883495</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33068%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69bd5190e32a4fbe5f99947e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33067-cwe-79-improper-neutralization-of-i-1a61bc50</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33067%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bd945ce32a4fbe5fbc7f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyright-lures-mask-a-multi-stage-purelog-stealer-54532eb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copyright%20Lures%20Mask%20a%20Multi-Stage%20PureLog%20Stealer%20Attack%20on%20Key%20Industries&amp;severity=medium&amp;id=69bd0401e32a4fbe5f43542f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beast-ransomware-toolkit-a-proactive-threat-intell-3c323286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beast%20Ransomware%20Toolkit%3A%20A%20Proactive%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69bd0401e32a4fbe5f435424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33066-cwe-79-improper-neutralization-of-i-f75d32b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33066%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33022-cwe-129-improper-validation-of-arra-b543ace7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33022%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20tektoncd%20pipeline&amp;severity=medium&amp;id=69bcfd2fe32a4fbe5f3cd696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-and-kimwolf-ddos-botnets-disrupted-in-inter-329eec84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20and%20Kimwolf%20DDoS%20Botnets%20Disrupted%20in%20International%20Operation&amp;severity=medium&amp;id=69bcf975e32a4fbe5f3bc392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33060-cwe-918-server-side-request-forgery-1b50a38a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33060%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ondata%20ckan-mcp-server&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33057-cwe-94-improper-control-of-generati-7b233148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33057%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf9b8e32a4fbe5f3bdae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33056-cwe-61-unix-symbolic-link-symlink-f-a61b77da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33056%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf9b8e32a4fbe5f3bdae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33055-cwe-843-access-of-resource-using-in-0fc0ef28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33055%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20alexcrichton%20tar-rs&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a710c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4478-improper-verification-of-cryptograph-dd0fa87f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4478%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4477-use-of-hard-coded-cryptographic-key--fb0d66fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4477%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=low&amp;id=69bcf624e32a4fbe5f3a7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33054-cwe-22-improper-limitation-of-a-pat-0da03659</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33054%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mesop-dev%20mesop&amp;severity=critical&amp;id=69bcf624e32a4fbe5f3a7107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33053-cwe-639-authorization-bypass-throug-1e144efc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33053%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20langflow-ai%20langflow&amp;severity=medium&amp;id=69bcf624e32a4fbe5f3a7104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4476-missing-authentication-in-yi-technol-4206d120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4476%3A%20Missing%20Authentication%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=medium&amp;id=69bcef1ee32a4fbe5f36fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4475-hard-coded-credentials-in-yi-technol-fc23c5af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4475%3A%20Hard-coded%20Credentials%20in%20Yi%20Technology%20YI%20Home%20Camera&amp;severity=high&amp;id=69bceb98e32a4fbe5f35b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4474-cross-site-scripting-in-itsourcecode-f76aefd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4474%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69bceb98e32a4fbe5f35b7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33051-cwe-79-improper-neutralization-of-i-bc102802</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33043-cwe-942-permissive-cross-domain-pol-745876a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33043%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f3388a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33041-cwe-200-exposure-of-sensitive-infor-3ba0bea1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33041%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bce490e32a4fbe5f3388a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33040-cwe-190-integer-overflow-or-wraparo-df6446c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33040%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-libp2p&amp;severity=high&amp;id=69bce490e32a4fbe5f33889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33039-cwe-918-server-side-request-forgery-15e3e0b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33039%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bce490e32a4fbe5f33889a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33038-cwe-306-missing-authentication-for--912771fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33038%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bd945ce32a4fbe5fbc7f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4473-sql-injection-in-itsourcecode-online-f08070d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4473%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69bd713ee32a4fbe5faaf827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32768-cwe-284-improper-access-control-in--07d9feb3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32768%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=69bd713de32a4fbe5faaf822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33037-cwe-1188-insecure-default-initializ-824a27f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33037%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69bdbd96e2bf98efc48d1059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33036-cwe-776-improper-restriction-of-rec-ba51d0ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33036%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69bdbd93e2bf98efc48d0f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33035-cwe-79-improper-neutralization-of-i-f45160e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69bcda04e32a4fbe5f30468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4472-sql-injection-in-itsourcecode-online-b296bbe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4472%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4471-sql-injection-in-itsourcecode-online-86d996d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4471%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcda04e32a4fbe5f304692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33025-cwe-89-improper-neutralization-of-s-1f4cc4d0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33025%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=high&amp;id=69bcda04e32a4fbe5f30468a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33024-cwe-918-server-side-request-forgery-82e88a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33024%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33017-cwe-94-improper-control-of-generati-d875cfa4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33017%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=69bcda04e32a4fbe5f304681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33013-cwe-835-loop-with-unreachable-exit--ffe4a179</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33013%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f30467a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33012-cwe-770-allocation-of-resources-wit-0ddd6ec8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33012%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20micronaut-projects%20micronaut-core&amp;severity=high&amp;id=69bcda04e32a4fbe5f304675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33011-cwe-670-always-incorrect-control-fl-dbb9303d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33011%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20nestjs%20nest&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4470-sql-injection-in-itsourcecode-online-eb805163</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4470%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32954-cwe-89-improper-neutralization-of-s-2ba0bacc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32954%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20erpnext&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32953-cwe-303-incorrect-implementation-of-27501f28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32953%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20tillitis%20tkeyclient&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32950-cwe-89-improper-neutralization-of-s-bc0e21ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32949-cwe-918-server-side-request-forgery-12b78e1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32949%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bcd2fce32a4fbe5f2df41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32947-cwe-693-protection-mechanism-failur-f8ad5311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32947%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4469-sql-injection-in-itsourcecode-online-bfdb9d05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4469%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=69bcd2fce32a4fbe5f2df434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32946-cwe-693-protection-mechanism-failur-35e9b997</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32946%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32945-cwe-122-heap-based-buffer-overflow--9ea99f4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32945%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32942-cwe-416-use-after-free-in-pjsip-pjp-5ca2cca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32942%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69bcc873e32a4fbe5f2a790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32941-cwe-770-allocation-of-resources-wit-1e571571</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32941%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4136-cwe-640-weak-password-recovery-mecha-33439421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4136%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4038-cwe-862-missing-authorization-in-cod-c5151216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4038%3A%20CWE-862%20Missing%20Authorization%20in%20CodeRevolution%20Aimogen%20Pro%20-%20All-in-One%20AI%20Content%20Writer%2C%20Editor%2C%20ChatBot%20%26%20Automation%20Toolkit&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32940-cwe-79-improper-neutralization-of-i-a0d7ab4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32940%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a7901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4468-command-injection-in-comfast-cf-ac10-b912fa2b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4468%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcc873e32a4fbe5f2a7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32938-cwe-22-improper-limitation-of-a-pat-6777c83d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32938%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bcc873e32a4fbe5f2a78fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33063-cwe-476-null-pointer-dereference-in-e3e3c4cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33063%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20ausf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33062-cwe-284-improper-access-control-in--3530c734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33062%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20free5gc%20nrf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32937-cwe-129-improper-validation-of-arra-5fe376e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32937%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20chf&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32891-cwe-80-improper-neutralization-of-s-b6e950f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32891%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32933-cwe-674-uncontrolled-recursion-in-l-7067c409</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32933%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20LuckyPennySoftware%20AutoMapper&amp;severity=high&amp;id=69bcbde5e32a4fbe5f2545b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32890-cwe-79-improper-neutralization-of-i-5121d7eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32890%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openVESSL%20Anchorr&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4467-command-injection-in-comfast-cf-ac10-d886df59</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4467%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcbde5e32a4fbe5f2545ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21992-easily-exploitable-vulnerability-al-8b5ed83f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21992%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Identity%20Manager%20and%20Oracle%20Web%20Services%20Manager.%20in%20Oracle%20Corporation%20Oracle%20Identity%20Manager&amp;severity=critical&amp;id=69bcbde5e32a4fbe5f2545a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4466-command-injection-in-comfast-cf-ac10-988ceedb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4466%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4465-os-command-injection-in-d-link-dir-5-60ae23ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4465%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-513&amp;severity=medium&amp;id=69bcafd9e32a4fbe5f174cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32811-cwe-116-improper-encoding-or-escapi-b3515139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32811%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20dadrus%20heimdall&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4464-integer-overflow-in-google-chrome-fa62e2e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4464%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4463-heap-buffer-overflow-in-google-chrom-dcdbc2fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4463%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4462-out-of-bounds-read-in-google-chrome-90b629db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4462%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4461-inappropriate-implementation-in-goog-911b60aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4461%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4460-out-of-bounds-read-in-google-chrome-1b58436f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4460%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4459-out-of-bounds-read-and-write-in-goog-a1209755</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4459%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4458-use-after-free-in-google-chrome-badd5fd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4458%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd9e32a4fbe5f174ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4457-type-confusion-in-google-chrome-f25568f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4457%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4456-use-after-free-in-google-chrome-262b8b39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4456%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4455-heap-buffer-overflow-in-google-chrom-1912bf38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4455%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4454-use-after-free-in-google-chrome-fca0b857</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4454%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4453-integer-overflow-in-google-chrome-558bb25a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4453%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=medium&amp;id=69bcafd7e32a4fbe5f174c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4452-integer-overflow-in-google-chrome-6c804567</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4452%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4451-insufficient-validation-of-untrusted-327de6f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4451%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4450-out-of-bounds-write-in-google-chrome-3ac733c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4450%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4449-use-after-free-in-google-chrome-ed5f7a7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4449%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4448-heap-buffer-overflow-in-google-chrom-b57aa6f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4448%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd7e32a4fbe5f174c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4447-inappropriate-implementation-in-goog-a053af5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4447%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4446-use-after-free-in-google-chrome-e7753fdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4446%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4445-use-after-free-in-google-chrome-7854d5d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4445%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4444-stack-buffer-overflow-in-google-chro-e900039f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4444%3A%20Stack%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4443-heap-buffer-overflow-in-google-chrom-546130a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4443%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4442-heap-buffer-overflow-in-google-chrom-6134e6a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4442%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4441-use-after-free-in-google-chrome-1460e210</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4440-out-of-bounds-read-and-write-in-goog-915aee25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4440%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4439-out-of-bounds-memory-access-in-googl-367adac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4439%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69bcafd6e32a4fbe5f174c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32881-cwe-183-permissive-list-of-allowed--e7cfd7f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32881%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20vshakitskiy%20ewe&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32873-cwe-825-expired-pointer-dereference-5f2b4614</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32873%3A%20CWE-825%3A%20Expired%20Pointer%20Dereference%20in%20vshakitskiy%20ewe&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32880-cwe-79-improper-neutralization-of-i-0f4748dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32880%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32829-cwe-201-insertion-of-sensitive-info-e3d06045</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32829%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PSeitz%20lz4_flex&amp;severity=high&amp;id=69bc9abfe32a4fbe5f103102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32828-cwe-918-server-side-request-forgery-fd4580ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32828%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20akuity%20kargo&amp;severity=medium&amp;id=69bc9abfe32a4fbe5f1030fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32771-cwe-22-improper-limitation-of-a-pat-ee98cf31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32771%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32769-cwe-284-improper-access-control-in--1b163257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32769%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20fullchain&amp;severity=high&amp;id=69bc9abfe32a4fbe5f1030f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32767-cwe-89-improper-neutralization-of-s-8a5766fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32767%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69bc9abfe32a4fbe5f1030ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32766-cwe-436-interpretation-conflict-in--17af23a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32766%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20astral-sh%20tokio-tar&amp;severity=low&amp;id=69bc9033e32a4fbe5f0c4187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32985-cwe-306-missing-authentication-for--04629a96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32985%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Xerte%20Xerte%20Online%20Toolkits&amp;severity=critical&amp;id=69bc9033e32a4fbe5f0c418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30580-na-acb3a12b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30580%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63260-na-ee22ee42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63260%3A%20n%2Fa&amp;severity=medium&amp;id=69bdbd91e2bf98efc48d0987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55988-na-a8eae2c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55988%3A%20n%2Fa&amp;severity=high&amp;id=69bdb3ffe32a4fbe5fced8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63261-na-1b8a124a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63261%3A%20n%2Fa&amp;severity=high&amp;id=69bdacf5e32a4fbe5fcbbe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30579-na-7fa2a6e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30579%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb2018b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30578-na-78c92819</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30578%3A%20n%2Fa&amp;severity=medium&amp;id=69bd82c5e32a4fbe5fb20187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29828-na-1e771d97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29828%3A%20n%2Fa&amp;severity=medium&amp;id=69bd7bc3e32a4fbe5faf4b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67260-na-ea50c466</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67260%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46597-na-da22297e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46597%3A%20n%2Fa&amp;severity=high&amp;id=69bd6dade32a4fbe5fa8ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46598-na-c6f81fe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46598%3A%20n%2Fa&amp;severity=medium&amp;id=69bd66a5e32a4fbe5fa5cd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33372-na-01a2c6aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33372%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33371-na-d0924778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33371%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33370-na-e6316dfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33370%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33369-na-78a1b374</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33369%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33368-na-9732165f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33368%3A%20n%2Fa&amp;severity=medium&amp;id=69bd5895e32a4fbe5f9d856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44722-na-6ff47388</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44722%3A%20n%2Fa&amp;severity=critical&amp;id=69bd5190e32a4fbe5f999473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-20-e4da03c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-20&amp;severity=medium&amp;id=69bd3c3fe32a4fbe5f59b660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-20-85216207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-20&amp;severity=low&amp;id=69bd3c3ee32a4fbe5f59b636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-tax-search-leads-to-kernel-mode-avedr-kill-d1d929de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20Tax%20Search%20Leads%20to%20Kernel-Mode%20AV%2FEDR%20Kill&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22737-vulnerability-in-spring-spring-fram-c8bf04a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22737%3A%20Vulnerability%20in%20Spring%20Spring%20Framework&amp;severity=medium&amp;id=69bc9033e32a4fbe5f0c418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22735-vulnerability-in-spring-spring-foun-8a91afe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22735%3A%20Vulnerability%20in%20Spring%20Spring%20Foundation&amp;severity=low&amp;id=69bc8cafe32a4fbe5f0a920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22733-cwe-288-authentication-bypass-using-e6f80fbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22733%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=69bc8929e32a4fbe5f08fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32763-cwe-89-improper-neutralization-of-s-62f7ca75</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32763%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kysely-org%20kysely&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32697-cwe-639-authorization-bypass-throug-143009ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29109-cwe-502-deserialization-of-untruste-fbc0e466</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29109%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=69bc85a4e32a4fbe5f07b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29108-cwe-200-exposure-of-sensitive-infor-95944982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29108%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=69bc85a4e32a4fbe5f07b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22732-vulnerability-in-spring-spring-secu-2c8fbdd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22732%3A%20Vulnerability%20in%20VMware%20Spring%20Security&amp;severity=critical&amp;id=69bc8223e32a4fbe5f062176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32721-cwe-79-improper-neutralization-of-i-8871f1a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32721%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openwrt%20luci&amp;severity=high&amp;id=69bc8223e32a4fbe5f062179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22731-cwe-288-authentication-bypass-using-09055fef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22731%3A%20CWE-288%20Authentication%20bypass%20using%20an%20alternate%20path%20or%20channel%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=69bc7e9ce32a4fbe5f04d5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4342-cwe-20-improper-input-validation-in--e41533f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4342%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32815-cwe-287-improper-authentication-in--a6c343f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32815%3A%20CWE-287%3A%20Improper%20Authentication%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc708fe32a4fbe5ffd51b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32754-cwe-79-improper-neutralization-of-i-21923976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32754%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69bc708fe32a4fbe5ffd51ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32753-cwe-80-improper-neutralization-of-s-a6d22d39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32753%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=69bc708fe32a4fbe5ffd51a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32194-cwe-77-improper-neutralization-of-s-b13d0979</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32194%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f143342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32750-cwe-22-improper-limitation-of-a-pat-1494f6ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32750%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32751-cwe-79-improper-neutralization-of-i-e319aed5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32751%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32749-cwe-73-external-control-of-file-nam-faba7104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32749%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69bc698ee32a4fbe5ffae0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3229-cwe-122-heap-based-buffer-overflow-i-110c9450</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3229%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=69bc698ee32a4fbe5ffae0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26137-cwe-918-server-side-request-forgery-45e722c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26137%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Exchange%20Online&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26136-cwe-77-improper-neutralization-of-s-5da576f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26136%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24299-cwe-77-improper-neutralization-of-s-66ef9f33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24299%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23659-cwe-200-exposure-of-sensitive-infor-8cb9cf5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23659%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Factory&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26120-cwe-918-server-side-request-forgery-1d36a6ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26120%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Bing&amp;severity=medium&amp;id=69bc698ce32a4fbe5ffae007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23658-cwe-522-insufficiently-protected-cr-3581b2ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23658%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20DevOps%3A%20msazure&amp;severity=high&amp;id=69bc698ce32a4fbe5ffadffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32191-cwe-78-improper-neutralization-of-s-97a170f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32191%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Bing%20Images&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26138-cwe-918-server-side-request-forgery-ebca77b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26138%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26139-cwe-918-server-side-request-forgery-d1f7bdbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26139%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69bc698ce32a4fbe5ffae013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32169-cwe-918-server-side-request-forgery-b6b36f7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32169%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cloud%20Shell&amp;severity=critical&amp;id=69bc698ce32a4fbe5ffae016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32747-cwe-22-improper-limitation-of-a-pat-54548a0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32747%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69bc698ee32a4fbe5ffae09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32622-cwe-862-missing-authorization-in-da-a6bc8eb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32622%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dataease%20SQLBot&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30924-cwe-942-permissive-cross-domain-pol-3c08973c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30924%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20autobrr%20qui&amp;severity=critical&amp;id=69bc6600e32a4fbe5ff9842f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4428-cwe-299-improper-check-for-certifica-6e7e17f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4428%3A%20CWE-299%20Improper%20check%20for%20certificate%20revocation%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69bc6600e32a4fbe5ff98437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30836-cwe-287-improper-authentication-in--146fb37a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30836%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20certificates&amp;severity=critical&amp;id=69bca5a4e32a4fbe5f14337a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3849-cwe-787-out-of-bounds-write-in-wolfs-5398bc77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3849%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20wolfSSL%20Inc.%20wolfSSL&amp;severity=medium&amp;id=69bca5a4e32a4fbe5f143384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27953-cwe-915-improperly-controlled-modif-7873cd73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27953%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20ormar-orm%20ormar&amp;severity=high&amp;id=69bca5a4e32a4fbe5f143360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3549-cwe-122-heap-based-buffer-overflow-i-c0d00cf3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3549%3A%20CWE-122%20Heap-based%20buffer%20overflow%20in%20wofSSL%20wolfSSL&amp;severity=high&amp;id=69bc5b75e32a4fbe5ff4fefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3503-cwe-335-incorrect-usage-of-seeds-in--21219b3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3503%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20wolfSSL%20Inc.%20wolfSSL%20(wolfCrypt)&amp;severity=medium&amp;id=69bc42d8e32a4fbe5fe8af3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-screenconnect-vulnerability-exposes-machi-7e07b842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ScreenConnect%20Vulnerability%20Exposes%20Machine%20Keys&amp;severity=critical&amp;id=69bc381ae32a4fbe5fe48fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26940-cwe-1284-improper-validation-of-spe-3f14668f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26940%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26939-cwe-862-missing-authorization-in-el-103dd2d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26939%3A%20CWE-862%20Missing%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26933-cwe-129-improper-validation-of-arra-1b9518eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26933%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26931-cwe-789-memory-allocation-with-exce-91f97db1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26931%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=69bc2dc4e32a4fbe5fdefa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3029-cwe-22-improper-limitation-of-a-path-729e317c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3029%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Artifex%20Software%20Inc.%20*PyMuPDF*%20PyMuPDF&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd8213b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32869-cwe-79-improper-neutralization-of-i-9b4095a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32868-cwe-79-improper-neutralization-of-i-19f98a35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd82133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32867-cwe-639-authorization-bypass-throug-7f856db1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32867%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32866-cwe-79-improper-neutralization-of-i-54776fae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE&amp;severity=medium&amp;id=69bc1fb1e32a4fbe5fd8212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32865-cwe-200-exposure-of-sensitive-infor-6b65c58b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32865%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OPEXUS%20eComplaint&amp;severity=critical&amp;id=69bc1fb1e32a4fbe5fd82127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-readied-cyberattack-capabilities-for-response-f9c5f962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Readied%20Cyberattack%20Capabilities%20for%20Response%20Prior%20to%20Epic%20Fury&amp;severity=medium&amp;id=69bc1876e32a4fbe5fd0e091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-killers-explained-beyond-the-drivers-086c7370</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR%20killers%20explained%3A%20Beyond%20the%20drivers&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-tax-season-becomes-cyberattack-season-phishin-ea935d25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20tax%20season%20becomes%20cyberattack%20season%3A%20Phishing%20and%20malware%20campaigns%20using%20tax-related%20lures&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-affects-672000-individuals-63033f85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Affects%20672%2C000%20Individuals&amp;severity=medium&amp;id=69bc116ee32a4fbe5fcdf9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27043-cwe-434-unrestricted-upload-of-file-cba2eddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27043%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeGoods%20Photography&amp;severity=critical&amp;id=69bc11b6e32a4fbe5fce058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32843-cwe-79-improper-neutralization-of-i-a49337fc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32843%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20LinkItONEDevGroup%20Location%20Aware%20Sensor%20System%20(LASS)&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce058e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22557-vulnerability-in-ubiquiti-inc-unifi-b488b1a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22557%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=critical&amp;id=69bc0a99e32a4fbe5fcbe3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22558-vulnerability-in-ubiquiti-inc-unifi-ab721e24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22558%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4427-improper-validation-of-array-index-i-ded74843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4427&amp;severity=null&amp;id=69bc0a99e32a4fbe5fcbe40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-shinyhunters-fast-tracks-saas-acc-d16b4341</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20ShinyHunters%20Fast-Tracks%20SaaS%20Access%20with%20Subdomain%20Impersonation&amp;severity=medium&amp;id=69bd007ce32a4fbe5f3ee2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2369-integer-underflow-wrap-or-wraparound-1a25d932</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2369%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0a99e32a4fbe5fcbe405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-aura-discloses-data-breach-impacting-e11ac2db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Aura%20Discloses%20Data%20Breach%20Impacting%20900%2C000%20Records&amp;severity=medium&amp;id=69bc06e1e32a4fbe5fca1251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4426-incorrect-bitwise-shift-of-integer-i-9edcaece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4426%3A%20Incorrect%20Bitwise%20Shift%20of%20Integer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca202e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4424-out-of-bounds-read-in-red-hat-red-ha-49c7e3de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4424%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71260-cwe-502-deserialization-of-untruste-21e3c5f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71260%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71259-cwe-918-server-side-request-forgery-2c78bf47</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71259%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71258-cwe-918-server-side-request-forgery-6d09c567</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71258%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71257-cwe-306-missing-authentication-for--cfdd0e6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71257%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Software%2C%20Inc.%20FootPrints&amp;severity=medium&amp;id=69bc0011e32a4fbe5fc6a5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-exploits-zimbra-vulnerability-against--747fd31c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Exploits%20Zimbra%20Vulnerability%20Against%20Ukraine&amp;severity=medium&amp;id=69bbfc57e32a4fbe5fc44ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3511-cwe-611-improper-restriction-of-xml--d3394379</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3511%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Slovensko.Digital%20Autogram&amp;severity=high&amp;id=69bc0011e32a4fbe5fc6a5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3658-cwe-89-improper-neutralization-of-sp-4ce634e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69bbdce4e32a4fbe5fb75e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-invitation-to-infection-how-silentconnect-del-4ebdc8bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Invitation%20to%20Infection%3A%20How%20SILENTCONNECT%20Delivers%20ScreenConnect&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-targets-users-of-cobra-docguard-softwa-1c4323bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Targets%20Users%20of%20Cobra%20DocGuard%20Software&amp;severity=medium&amp;id=69bbfc73e32a4fbe5fc45100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dto-malware-that-takes-notes-d4134ff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DTO%20malware%20that%20takes%20notes&amp;severity=medium&amp;id=69bbffd8e32a4fbe5fc68b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14716-cwe-287-improper-authentication-in--a0439e26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14716%3A%20CWE-287%20Improper%20Authentication%20in%20Secomea%20GateManager&amp;severity=medium&amp;id=69bbd963e32a4fbe5fb5a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-attacks-exploiting-recent-sharepoint-171abc90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Attacks%20Exploiting%20Recent%20SharePoint%20Vulnerability&amp;severity=critical&amp;id=69bbc79ae32a4fbe5faeae91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-firewall-vulnerability-exploited-as-zero-day-1e82d87b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Firewall%20Vulnerability%20Exploited%20as%20Zero-Day%20in%20Interlock%20Ransomware%20Attacks&amp;severity=medium&amp;id=69bbbd0de32a4fbe5fa90d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21788-cwe-79-improper-neutralization-of-i-8231cd45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21788%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Connections&amp;severity=medium&amp;id=69bbbd50e32a4fbe5fa91b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27070-cwe-79-improper-neutralization-of-i-037c654a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27070%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27068-cwe-79-improper-neutralization-of-i-6464da4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27068%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Howard%20Website%20LLMs.txt&amp;severity=high&amp;id=69bbbd50e32a4fbe5fa91b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27067-cwe-434-unrestricted-upload-of-file-001b9b9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27067%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Syarif%20Mobile%20App%20Editor&amp;severity=critical&amp;id=69bbb9bce32a4fbe5fa803c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27065-cwe-98-improper-control-of-filename-c54e685b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20BuilderPress&amp;severity=critical&amp;id=69bbb9bce32a4fbe5fa803c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25445-cwe-502-deserialization-of-untruste-38c3b1fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25445%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Membership%20Software%20WishList%20Member%20X&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25443-cwe-862-missing-authorization-in-do-b2a17dc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25443%3A%20Missing%20Authorization%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25442-cwe-79-improper-neutralization-of-i-53e83f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20Kentha&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25438-cwe-79-improper-neutralization-of-i-5ae4c863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Gutenberg%20Blocks&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68836-cwe-79-improper-neutralization-of-i-442407f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Markbeljaars%20Table%20of%20Contents%20Creator&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67618-cwe-79-improper-neutralization-of-i-392796e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ArtstudioWorks%20Brookside&amp;severity=high&amp;id=69bbb9bce32a4fbe5fa803ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62043-cwe-79-improper-neutralization-of-i-1f545989</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62043%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WPSight%20WPCasa&amp;severity=medium&amp;id=69bbb9bce32a4fbe5fa803ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60237-cwe-502-deserialization-of-untruste-02398e83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60237%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Finag&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60233-cwe-502-deserialization-of-untruste-e4dbbeab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60233%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themeton%20Zuut&amp;severity=critical&amp;id=69bbb638e32a4fbe5fa6afeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53222-cwe-79-improper-neutralization-of-i-30abad9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53222%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Opt-In%20Builder&amp;severity=null&amp;id=69bbb638e32a4fbe5fa6afe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50001-cwe-79-improper-neutralization-of-i-e0727e1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=null&amp;id=69bbb638e32a4fbe5fa6afe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32223-cwe-639-authorization-bypass-throug-f19f8659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32223%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=null&amp;id=69bbb638e32a4fbe5fa6afe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3475-cwe-862-missing-authorization-in-ins-dcfee312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3475%3A%20CWE-862%20Missing%20Authorization%20in%20instantpopupbuilder%20Instant%20Popup%20Builder%20%E2%80%93%20Powerful%20Popup%20Maker%20for%20Opt-ins%2C%20Email%20Newsletters%20%26%20Lead%20Generation&amp;severity=medium&amp;id=69bbabafe32a4fbe5fa0f1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42210-cwe-79-improper-neutralization-of-i-959be701</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42210%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCLSoftware%20Unica%20Marketing%20Operations%20(Plan)&amp;severity=high&amp;id=69bbabafe32a4fbe5fa0f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25312-missing-authorization-in-metagauss--6088bf26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25312%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25471-cwe-288-authentication-bypass-using-fb51444f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25471%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Themepaste%20Admin%20Safety%20Guard&amp;severity=critical&amp;id=69bba828e32a4fbe5f9f514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27091-cwe-862-missing-authorization-in-ui-51d16ecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27091%3A%20Missing%20Authorization%20in%20UiPress%20UiPress%20lite&amp;severity=high&amp;id=69bba122e32a4fbe5f9bab6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2571-cwe-200-exposure-of-sensitive-inform-4433356b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2571%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4006-cwe-79-improper-neutralization-of-in-57adcf74</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4120-cwe-79-improper-neutralization-of-in-ace8a1f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Info%20Cards%20%E2%80%93%20Add%20Text%20and%20Media%20in%20Card%20Layouts&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4068-cwe-352-cross-site-request-forgery-c-e2deb8f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4068%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pattihis%20Add%20Custom%20Fields%20to%20Media&amp;severity=medium&amp;id=69bba122e32a4fbe5f9bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27093-cwe-98-improper-control-of-filename-113afdb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Tripgo&amp;severity=high&amp;id=69bba122e32a4fbe5f9bab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indonesianfoods-spam-campaign-89-000-junk-packages-02add850</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IndonesianFoods%20Spam%20Campaign%3A%2089%20000%20junk%20packages%20in%20npm&amp;severity=medium&amp;id=69bb8fc7e32a4fbe5f94a83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27096-cwe-502-deserialization-of-untruste-c54c368b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27096%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BuddhaThemes%20ColorFolio%20-%20Freelance%20Designer%20WordPress%20Theme&amp;severity=high&amp;id=69bb8f8fe32a4fbe5f949e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27397-cwe-639-authorization-bypass-throug-fd1f474c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27397%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Really%20Simple%20Plugins%20B.V.%20Really%20Simple%20Security%20Pro&amp;severity=medium&amp;id=69bb8f8fe32a4fbe5f949e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27413-cwe-89-improper-neutralization-of-s-2b17e884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozmoslabs%20Profile%20Builder%20Pro&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27540-cwe-434-unrestricted-upload-of-file-64999286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27540%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27542-cwe-266-incorrect-privilege-assignm-fdf0645e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27542%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Rymera%20Web%20Co%20Pty%20Ltd.%20Woocommerce%20Wholesale%20Lead%20Capture&amp;severity=critical&amp;id=69bb8f8fe32a4fbe5f949e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28044-cwe-79-improper-neutralization-of-i-4c6375df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Media%20WP%20Rocket&amp;severity=medium&amp;id=69bc0726e32a4fbe5fca2033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28070-cwe-862-missing-authorization-in-ti-af8d6a7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28070%3A%20CWE-862%20Missing%20Authorization%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=medium&amp;id=69bc11b6e32a4fbe5fce0592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28073-cwe-79-improper-neutralization-of-i-1bc1903b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tips%20and%20Tricks%20HQ%20WP%20eMember&amp;severity=high&amp;id=69bc0726e32a4fbe5fca2036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1238-cwe-79-improper-neutralization-of-in-a993bd3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=69bb817ee32a4fbe5f8e86eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36051-cwe-538-insertion-of-sensitive-info-ab618e1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36051%3A%20CWE-538%20Insertion%20of%20sensitive%20information%20into%20Externally-Accessible%20file%20or%20directory%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13995-cwe-1286-improper-validation-of-syn-68a57170</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13995%3A%20CWE-1286%20Improper%20validation%20of%20syntactic%20correctness%20of%20input%20in%20IBM%20QRadar&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15051-cwe-79-improper-neutralization-of-i-ad185818</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15051%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1276-cwe-79-improper-neutralization-of-in-5c8d8570</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1276%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=69bb5e54e32a4fbe5f57d503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interesting-message-stored-in-cowrie-logs-wed-mar--eed73e9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interesting%20Message%20Stored%20in%20Cowrie%20Logs%2C%20(Wed%2C%20Mar%2018th)&amp;severity=low&amp;id=69bb4676771bdb1749e386d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-19-f789201b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-19&amp;severity=medium&amp;id=69bc8ffae32a4fbe5f0bc8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25667-na-4878ddad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25667%3A%20n%2Fa&amp;severity=high&amp;id=69bc42d8e32a4fbe5fe8af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30694-na-109950b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30694%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67115-na-fd8f50f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67115%3A%20n%2Fa&amp;severity=medium&amp;id=69bc34d3e32a4fbe5fe2fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67114-na-cfe87a40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67114%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67113-na-f177756a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67113%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67112-na-167598ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67112%3A%20n%2Fa&amp;severity=critical&amp;id=69bc34d3e32a4fbe5fe2fca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30403-na-47aad45b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30403%3A%20n%2Fa&amp;severity=high&amp;id=69bc2336e32a4fbe5fd9a333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30404-na-dc0e3c16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30404%3A%20n%2Fa&amp;severity=high&amp;id=69bc1fb1e32a4fbe5fd82123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-19-a4f74c0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-19&amp;severity=medium&amp;id=69bc1bf7e32a4fbe5fd2fcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30402-na-cbd8e1be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30402%3A%20n%2Fa&amp;severity=critical&amp;id=69bc1527e32a4fbe5fcfae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69720-na-186d574f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69720%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20GNU%20ncurses&amp;severity=high&amp;id=69bc11b6e32a4fbe5fce0585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30711-na-52d1a31a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30711%3A%20n%2Fa&amp;severity=high&amp;id=69bc0a99e32a4fbe5fcbe40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-19-1560c5bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-19&amp;severity=low&amp;id=69bb8f56e32a4fbe5f948e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32743-cwe-121-stack-based-buffer-overflow-abcf5c62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32743%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69bb389a771bdb1749cfdbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32255-cwe-918-server-side-request-forgery-b38e16f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32255%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kanbn%20kan&amp;severity=high&amp;id=69bb3516771bdb1749cf1e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32805-cwe-22-improper-limitation-of-a-pat-c9094e96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32737-cwe-284-improper-access-control-in--390bca84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32737%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20romeo&amp;severity=high&amp;id=69bb2a8a771bdb1749cbc621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32735-cwe-20-improper-input-validation-in-02f3ed92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32735%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Chrimle%20openapi-to-java-records-mustache-templates-parent&amp;severity=low&amp;id=69bb2706771bdb1749cae220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15031-cwe-22-improper-limitation-of-a-pat-b338a25f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15031%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69bb2706771bdb1749cae217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32736-cwe-862-missing-authorization-in-hy-bd2f85e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32736%3A%20CWE-862%3A%20Missing%20Authorization%20in%20HytaleModding%20wiki&amp;severity=medium&amp;id=69bb2706771bdb1749cae226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32731-cwe-22-improper-limitation-of-a-pat-efa014e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32731%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20apostrophecms%20import-export&amp;severity=critical&amp;id=69bb2706771bdb1749cae21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32730-cwe-287-improper-authentication-in--15c69b59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32730%3A%20CWE-287%3A%20Improper%20Authentication%20in%20apostrophecms%20apostrophe&amp;severity=high&amp;id=69bb2706771bdb1749cae21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33163-cwe-200-exposure-of-sensitive-infor-bf0b3710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33163%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c98987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33042-cwe-287-improper-authentication-in--316c227c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33042%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2382771bdb1749c98982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32944-cwe-674-uncontrolled-recursion-in-p-89a0ff68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32944%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2382771bdb1749c9897d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32943-cwe-367-time-of-check-time-of-use-t-09ac7473</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32943%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20parse-community%20parse-server&amp;severity=low&amp;id=69bb2001771bdb1749c89335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32886-cwe-1321-improperly-controlled-modi-1739e4ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32886%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c89330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32878-cwe-1321-improperly-controlled-modi-f8c4ad57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32878%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c8932b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32770-cwe-248-uncaught-exception-in-parse-654e3258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32770%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32742-cwe-915-improperly-controlled-modif-464116df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32742%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69bb2001771bdb1749c89321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32728-cwe-79-improper-neutralization-of-i-9f80ada8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32728%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69bb2001771bdb1749c8931a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32723-cwe-362-concurrent-execution-using--576a2875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20nyariv%20SandboxJS&amp;severity=medium&amp;id=69bb1c7a771bdb1749c7cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32722-cwe-79-improper-neutralization-of-i-088ed356</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bloomberg%20memray&amp;severity=low&amp;id=69bb1c7a771bdb1749c7cd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32703-cwe-79-improper-neutralization-of-i-f2afc489</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32703%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32698-cwe-89-improper-neutralization-of-s-a9afd70e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32698%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=69bb18f8771bdb1749c6e12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32700-cwe-362-concurrent-execution-using--b102bd89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32700%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20heartcombo%20devise&amp;severity=medium&amp;id=69bb5534e32a4fbe5f378d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25873-cwe-502-deserialization-of-untruste-9e0b0036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25873%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beijing%20Academy%20of%20Artificial%20Intelligence%20(BAAI)%20OmniGen2-RL&amp;severity=critical&amp;id=69bb11f2771bdb1749c4fa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32638-cwe-639-authorization-bypass-throug-a9775966</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32638%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=low&amp;id=69bb11f2771bdb1749c4fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32321-cwe-89-improper-neutralization-of-s-5fdfa0b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32321%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=69bb11f2771bdb1749c4fa39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31971-cwe-121-stack-based-buffer-overflow-442a3df6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31971%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31970-cwe-122-heap-based-buffer-overflow--d4a345e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31970%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31969-cwe-122-heap-based-buffer-overflow--a2fbcdcb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31969%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb03e2771bdb1749c142f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4396-cwe-295-improper-certificate-validat-50860779</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4396%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Devolutions%20Hub%20Reporting%20Service&amp;severity=high&amp;id=69bb03e2771bdb1749c142fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31968-cwe-121-stack-based-buffer-overflow-dd9916c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31968%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69bb0078771bdb1749c07554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-collapse-of-predictive-security-in-the-age-of--11cf38f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Collapse%20of%20Predictive%20Security%20in%20the%20Age%20of%20Machine-Speed%20Attacks&amp;severity=medium&amp;id=69bb0027771bdb1749c06483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31967-cwe-125-out-of-bounds-read-in-samto-87c20809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31967%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0079771bdb1749c0755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31966-cwe-125-out-of-bounds-read-in-samto-83340784</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31966%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69bb0078771bdb1749c07558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31965-cwe-125-out-of-bounds-read-in-samto-74a2b192</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31965%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf5d2771bdb1749bce2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31964-cwe-476-null-pointer-dereference-in-af5a51cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31964%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20samtools%20htslib&amp;severity=medium&amp;id=69baf24a771bdb1749bb3c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31963-cwe-122-heap-based-buffer-overflow--76b649a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31963%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf24a771bdb1749bb3c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3479-vulnerability-in-python-software-fou-7c646350</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3479%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69baf24a771bdb1749bb3c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31962-cwe-122-heap-based-buffer-overflow--f8425e97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31962%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20samtools%20htslib&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32634-cwe-346-origin-validation-error-in--30d65730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32634%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baf5d2771bdb1749bce2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32633-cwe-200-exposure-of-sensitive-infor-1b1c198b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32633%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=critical&amp;id=69baf5d2771bdb1749bce2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32632-cwe-346-origin-validation-error-in--5bc32449</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32632%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20nicolargo%20glances&amp;severity=medium&amp;id=69bae7bf771bdb1749b795a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26948-cwe-1258-exposure-of-sensitive-syst-080f0205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26948%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b7959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26945-cwe-114-process-control-in-dell-int-7305f643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26945%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller&amp;severity=medium&amp;id=69bae7bf771bdb1749b79599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32611-cwe-89-improper-neutralization-of-s-86e6c23f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32611%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bae0bb771bdb1749b563de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32610-cwe-942-permissive-cross-domain-pol-3fbd2cf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32610%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bad9b2771bdb1749b240a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1463-cwe-98-improper-control-of-filename--497abb3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1463%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=69bad9b2771bdb1749b2409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-network-of-20000-fake-shops-9f73b038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20network%20of%2020%2C000%2B%20fake%20shops&amp;severity=medium&amp;id=69bad271771bdb1749aed170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24063-cwe-276-incorrect-default-permissio-bcb180bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24063%3A%20CWE-276%20Incorrect%20default%20permissions%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darksword-ios-exploit-kit-used-by-state-sponsored--9559b6ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DarkSword%E2%80%99%20iOS%20Exploit%20Kit%20Used%20by%20State-Sponsored%20Hackers%2C%20Spyware%20Vendors&amp;severity=medium&amp;id=69bac7e7771bdb1749aaf3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-snappyclient-9437d7d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20SnappyClient&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2992-cwe-862-missing-authorization-in-iqo-61572437</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2992%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=69bac82e771bdb1749ab014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2991-cwe-287-improper-authentication-in-i-f76202b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2991%3A%20CWE-287%20Improper%20Authentication%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=critical&amp;id=69bac82e771bdb1749ab0146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3090-cwe-79-improper-neutralization-of-in-ac88dbf3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=high&amp;id=69bac830771bdb1749ab0209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2512-cwe-79-improper-neutralization-of-in-bd7804ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Code%20Embed&amp;severity=medium&amp;id=69bac82e771bdb1749ab0139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2559-cwe-862-missing-authorization-in-saa-20f1bf38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2559%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20Email%20Deliverability%20and%20SMTP%20Solution%20with%20Email%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69bac82e771bdb1749ab0140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24062-cwe-306-missing-authentication-for--28feee6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24062%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Arturia%20Software%20Center&amp;severity=high&amp;id=69bac82e771bdb1749ab0133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33004-vulnerability-in-jenkins-project-je-d55a21b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33004%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33003-vulnerability-in-jenkins-project-je-bd0a6730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33003%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20LoadNinja%20Plugin&amp;severity=medium&amp;id=69bac82e771bdb1749ab0158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33002-vulnerability-in-jenkins-project-je-feb222ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33002%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33001-vulnerability-in-jenkins-project-je-34f276c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33001%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=69bac82e771bdb1749ab0152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-sanctions-chinese-iranian-firms-supporting-hack-8cec962a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Sanctions%20Chinese%2C%20Iranian%20Firms%20Supporting%20Hacking%20Operations&amp;severity=medium&amp;id=69babd5c771bdb1749a7527b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32609-cwe-200-exposure-of-sensitive-infor-2b5dd630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32609%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69baba10771bdb1749a5df7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadow-ai-risk-how-saas-apps-are-quietly-enabling--358e50ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shadow%20AI%20Risk%3A%20How%20SaaS%20Apps%20Are%20Quietly%20Enabling%20Massive%20Breaches&amp;severity=medium&amp;id=69bab2d0771bdb1749a27281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3278-cwe-79-improper-neutralization-of-in-b96fd83c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3278%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20ZENworks%20Service%20Desk&amp;severity=high&amp;id=69bab319771bdb1749a293df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-adminer-wed-mar-18th-1dc2dc26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20%22adminer%22%2C%20(Wed%2C%20Mar%2018th)&amp;severity=medium&amp;id=69baa842771bdb17499e7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25449-cwe-502-deserialization-of-untruste-72874dad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25449%3A%20Deserialization%20of%20Untrusted%20Data%20in%20shinetheme%20Traveler&amp;severity=critical&amp;id=69baabfa771bdb1749a00bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32694-cwe-343-predictable-value-range-fro-eff99390</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32694%3A%20CWE-343%20Predictable%20value%20range%20from%20previous%20values%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69baabfa771bdb1749a00bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32693-cwe-863-incorrect-authorization-in--0e03cd1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32693%3A%20CWE-863%20Incorrect%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-likely-used-malware-stolen-credent-ec3ce55e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Likely%20Used%20Malware-Stolen%20Credentials%20in%20Stryker%20Breach&amp;severity=medium&amp;id=69baa13b771bdb17499a51a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-debuts-background-security-improvements-with-43f317f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Debuts%20Background%20Security%20Improvements%20With%20Fresh%20WebKit%20Patches&amp;severity=medium&amp;id=69ba9db7771bdb17499562f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32692-cwe-285-improper-authorization-in-c-8bb2a045</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32692%3A%20CWE-285%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=69baa17f771bdb17499a872a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32691-cwe-708-incorrect-ownership-assignm-4976f2b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32691%3A%20CWE-708%20Incorrect%20ownership%20assignment%20in%20Canonical%20Juju&amp;severity=medium&amp;id=69ba9df8771bdb1749975689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-uncover-a-horabot-campaign-and-detect-this--b14c9474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20uncover%20a%20Horabot%20campaign%20and%20detect%20this%20malware&amp;severity=medium&amp;id=69bad5f5771bdb1749b06b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41258-cwe-284-improper-access-control-in--8af3e8ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41258%3A%20CWE-284%20Improper%20Access%20Control%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69baba10771bdb1749a5df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12518-cwe-79-improper-neutralization-of-i-9e0f1fb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bee%20Content%20Design%20Befree%20SDK&amp;severity=medium&amp;id=69ba88d6771bdb17497e74c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-wider-net-scaling-threat-c5bddf9f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Wider%20Net%3A%20Scaling%20Threat&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-roundish-uncovering-an-apt28-roundcube-e-a41e6b6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Roundish%3A%20Uncovering%20an%20APT28%20Roundcube%20Exploitation%20Toolkit%20Targeting%20Ukraine&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-trader-campaign-coordinated-weaponisati-15cb4f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Trader%20campaign%20-%20Coordinated%20weaponisation%20of%20cryptocurrency%20trading%20bots%20by%20suspected%20DPRK%20malware%20operators&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-spear-phishing-and-kakaotalk-linke-3131ee7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Spear-Phishing%20and%20KakaoTalk-Linked%20Threat%20Campaign&amp;severity=medium&amp;id=69ba88a2771bdb17497e4f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-discovers-4th-whatsapp-view-once-bypass-c88d9741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Discovers%204th%20WhatsApp%20View%20Once%20Bypass%3B%20Meta%20Won%E2%80%99t%20Patch&amp;severity=medium&amp;id=69ba851a771bdb17497b443d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/minecraft-dark-tale-of-scams-malware-extortion-8865f2fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Minecraft%3A%20Dark%20Tale%20of%20Scams%2C%20Malware%20%26%20Extortion&amp;severity=medium&amp;id=69ba8c21771bdb174982ab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-pudgy-world-site-steals-crypto-passwords-2eef4b1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Pudgy%20World%20site%20steals%20crypto%20passwords&amp;severity=medium&amp;id=69ba8195771bdb174978bc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32565-cwe-862-missing-authorization-in-we-3beba4f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32565%3A%20Missing%20Authorization%20in%20Ajay%20Contextual%20Related%20Posts&amp;severity=medium&amp;id=69ba73bc771bdb174968082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1217-cwe-862-missing-authorization-in-yoa-3986046b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1217%3A%20CWE-862%20Missing%20Authorization%20in%20yoast%20Yoast%20Duplicate%20Post&amp;severity=medium&amp;id=69ba73bc771bdb174968081d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22729-vulnerability-in-vmware-spring-ai-96356f4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22729%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22730-vulnerability-in-vmware-spring-ai-ddcf48d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22730%3A%20Vulnerability%20in%20VMware%20Spring%20AI&amp;severity=high&amp;id=69ba5b20771bdb174957e25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22323-cwe-352-cross-site-request-forgery--ebdd149c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22323%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22322-cwe-79-improper-neutralization-of-i-b70e5235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22321-cwe-121-stack-based-buffer-overflow-a8c2437b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22321%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22320-cwe-121-stack-based-buffer-overflow-da50b6da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22320%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22319-cwe-121-stack-based-buffer-overflow-5a355e4d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22319%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22318-cwe-121-stack-based-buffer-overflow-6c12e31f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22318%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22317-cwe-77-improper-neutralization-of-s-2550f32c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22317%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=69ba579c771bdb17495548ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22316-cwe-121-stack-based-buffer-overflow-8a351159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22316%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=69ba579c771bdb17495548ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31703-cwe-305-authentication-bypass-by-pr-50832b2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31703%3A%20CWE-305%20Authentication%20bypass%20by%20primary%20weakness%20in%20dahua%20NVR2-4KS3&amp;severity=low&amp;id=69ba579c771bdb17495548e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3512-cwe-79-improper-neutralization-of-in-0c263e50</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alhadeff%20Writeprint%20Stylometry&amp;severity=medium&amp;id=69ba5091771bdb1749512c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32608-cwe-78-improper-neutralization-of-s-c704207d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32608%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69ba4605771bdb17494b9a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15363-cwe-79-cross-site-scripting-xss-in--97d02cde</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15363%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Get%20Use%20APIs&amp;severity=medium&amp;id=69ba4605771bdb17494b99fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32596-cwe-200-exposure-of-sensitive-infor-34b688da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32596%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69bacf27771bdb1749ad833a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32606-cwe-522-insufficiently-protected-cr-e3768d6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32606%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20lxc%20incus-os&amp;severity=high&amp;id=69bacf27771bdb1749ad833f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32268-cwe-862-missing-authorization-in-cr-ce09a57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32268%3A%20CWE-862%3A%20Missing%20Authorization%20in%20craftcms%20azure-blob&amp;severity=high&amp;id=69bae0bb771bdb1749b563e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4366-server-side-request-forgery-ssrf-in--602d24ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4366%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32266-cwe-200-exposure-of-sensitive-infor-d1e81751</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32266%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20google-cloud&amp;severity=low&amp;id=69baebb5771bdb1749b8edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1926-cwe-862-missing-authorization-in-wps-f2df5907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1926%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Subscriptions%20for%20WooCommerce&amp;severity=medium&amp;id=69baba10771bdb1749a5df96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1780-cwe-79-improper-neutralization-of-in-1f16c6d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silentwind%20%5BCR%5DPaid%20Link%20Manager&amp;severity=medium&amp;id=69baba10771bdb1749a5df91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32265-cwe-200-exposure-of-sensitive-infor-a82c09db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32265%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20aws-s3&amp;severity=medium&amp;id=69baabfa771bdb1749a00be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32256-cwe-835-loop-with-unreachable-exit--10f47bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32256%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Borewit%20music-metadata&amp;severity=high&amp;id=69bab319771bdb1749a293e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2575-improper-handling-of-highly-compress-5b72b4d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2575%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69bab319771bdb1749a293e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32254-cwe-284-improper-access-control-in--d7b8155f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32254%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20cloudnativelabs%20kube-router&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31938-cwe-79-improper-neutralization-of-i-32085433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31898-cwe-116-improper-encoding-or-escapi-53f2e4d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31898%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31891-cwe-89-improper-neutralization-of-s-bc4a2f9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31891%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cockpit-HQ%20Cockpit&amp;severity=high&amp;id=69ba1bd6771bdb17491a1d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31865-cwe-1321-improperly-controlled-modi-a5a2e633</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31865%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=medium&amp;id=69ba1bd6771bdb17491a1d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30884-cwe-639-authorization-bypass-throug-1e3f429f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30884%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mdjnelson%20moodle-mod_customcert&amp;severity=critical&amp;id=69ba1bd6771bdb17491a1d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4268-cwe-79-improper-neutralization-of-in-8e1b8afd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=69baba10771bdb1749a5dfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28499-cwe-79-improper-neutralization-of-i-dfb77ddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=69b9ffb5771bdb17490566fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2603-missing-authentication-for-critical--81951507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2603%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb174905670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2092-improper-validation-of-specified-typ-9fe41714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2092%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69b9ffb5771bdb1749056703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4356-cross-site-scripting-in-itsourcecode-e19faf6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4356%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b9ffb5771bdb1749056714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28674-cwe-434-unrestricted-upload-of-file-bf2dede6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28674%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28673-cwe-78-improper-neutralization-of-s-cbfc2cfc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28673%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20danvei233%20xiaoheiFS&amp;severity=high&amp;id=69b9f8b0771bdb174900ac96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29057-cwe-444-inconsistent-interpretation-3abf3602</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29057%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27980-cwe-400-uncontrolled-resource-consu-0da2877b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27980%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27979-cwe-770-allocation-of-resources-wit-c71ea8d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27979%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9f8b0771bdb174900ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-18-7a4bc157</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-18&amp;severity=medium&amp;id=69bb3f6b771bdb1749d20ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26740-na-479e1e73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26740%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58112-na-453304de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58112%3A%20n%2Fa&amp;severity=high&amp;id=69baf5d2771bdb1749bce2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29859-na-26756cb3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29859%3A%20n%2Fa&amp;severity=critical&amp;id=69bae7bf771bdb1749b7959f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30704-na-88a06cf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30704%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30703-na-b3658dbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30703%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30702-na-67ba7464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30702%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30701-na-29b2ed2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30701%3A%20n%2Fa&amp;severity=critical&amp;id=69bae0bb771bdb1749b563ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30048-na-a1cd5795</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30048%3A%20n%2Fa&amp;severity=medium&amp;id=69bae0bb771bdb1749b563c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29858-na-6892327b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29858%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29856-na-335a9813</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29856%3A%20n%2Fa&amp;severity=high&amp;id=69bae0bb771bdb1749b563c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30695-na-bc21bf4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30695%3A%20n%2Fa&amp;severity=medium&amp;id=69badd33771bdb1749b3b1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30345-na-468e728e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30345%3A%20n%2Fa&amp;severity=high&amp;id=69badd33771bdb1749b3b1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67830-na-7a5c8d00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67830%3A%20n%2Fa&amp;severity=critical&amp;id=69bad9b2771bdb1749b2409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67829-na-b7fdee79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67829%3A%20n%2Fa&amp;severity=critical&amp;id=69bacf27771bdb1749ad8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55046-na-0b9434d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55046%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55045-na-8ce233db</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55045%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad832e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55044-na-2ac840c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55044%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55043-na-d4d61f97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55043%3A%20n%2Fa&amp;severity=medium&amp;id=69bacf27771bdb1749ad8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55041-na-16a37252</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55041%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad8321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55040-na-ade2e734</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55040%3A%20n%2Fa&amp;severity=high&amp;id=69bacf27771bdb1749ad831d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-18-7ef0fac3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-18&amp;severity=medium&amp;id=69ba6fff771bdb174964e9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-18-d1a9599d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-18&amp;severity=low&amp;id=69ba6fff771bdb174964e9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27978-cwe-352-cross-site-request-forgery--f467b97f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27978%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vercel%20next.js&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27977-cwe-1385-missing-origin-validation--d3f0918a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27977%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20vercel%20next.js&amp;severity=low&amp;id=69b9ee21771bdb1749ef1e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27895-cwe-185-incorrect-regular-expressio-4f0c19f3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27895%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=69b9ee21771bdb1749ef1e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27894-cwe-98-improper-control-of-filename-350674cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27894%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=high&amp;id=69b9ea9e771bdb1749ed199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27459-cwe-120-buffer-copy-without-checkin-dc2b5449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27459%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pyca%20pyopenssl&amp;severity=high&amp;id=69b9e71a771bdb1749eb4c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4355-cross-site-scripting-in-portabilis-i-bdf7c588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4355%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4354-cross-site-scripting-in-trendnet-tew-1222775d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4354%3A%20Cross%20Site%20Scripting%20in%20TRENDnet%20TEW-824DRU&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27448-cwe-636-not-failing-securely-failin-92685d63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27448%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20pyca%20pyopenssl&amp;severity=low&amp;id=69b9e71a771bdb1749eb4c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26004-cwe-639-authorization-bypass-throug-a14a243d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26004%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getsentry%20sentry&amp;severity=medium&amp;id=69b9e71a771bdb1749eb4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26001-cwe-89-improper-neutralization-of-s-74e88095</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26001%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=69b9e397771bdb1749e6bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25937-cwe-287-improper-authentication-in--e6802984</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25937%3A%20CWE-287%3A%20Improper%20Authentication%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9e397771bdb1749e6bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22727-cwe-306-in-cloudfoundry-cloud-found-0a9b4ea6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22727%3A%20CWE-306%20in%20Cloudfoundry%20Cloud%20Foundry&amp;severity=high&amp;id=69baebb5771bdb1749b8ee31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21994-easily-exploitable-vulnerability-al-d3394a07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21994%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit.%20in%20Oracle%20Corporation%20Oracle%20Edge%20Cloud%20Infrastructure%20Designer%20and%20Visualisation%20Toolkit&amp;severity=critical&amp;id=69baba10771bdb1749a5df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1264-cwe-306-missing-authentication-for-c-f24c86cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1264%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14031-cwe-77-improper-neutralization-of-s-5ae99fea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14031%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=high&amp;id=69baebb5771bdb1749b8ee17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20643-processing-maliciously-crafted-web--a352aaea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20643%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20bypass%20Same%20Origin%20Policy%20in%20Apple%20Safari&amp;severity=medium&amp;id=69b9d90c771bdb1749de4be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3856-cwe-353-missing-support-for-integrit-0459f212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3856%3A%20CWE-353%20Missing%20support%20for%20integrity%20check%20in%20IBM%20Db2%20Recovery%20Expert&amp;severity=medium&amp;id=69baebb5771bdb1749b8ee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1376-cwe-770-allocation-of-resources-with-360a5243</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1376%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=69b9d201771bdb1749dc5690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1267-cwe-200-exposure-of-sensitive-inform-952ffa1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1267%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14806-cwe-524-use-of-cache-containing-sen-0e309db2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14806%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69b9d201771bdb1749dc568a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32838-cwe-319-cleartext-transmission-of-s-bf676878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32838%3A%20CWE-319%20Cleartext%20transmission%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32839-cwe-352-cross-site-request-forgery--bbbd3906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32839%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db6345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32840-cwe-79-improper-neutralization-of-i-ec50d642</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32840%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=medium&amp;id=69b9ce80771bdb1749db634a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32842-cwe-312-cleartext-storage-of-sensit-517159b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32842%3A%20CWE-312%20Cleartext%20storage%20of%20sensitive%20information%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=high&amp;id=69b9ce80771bdb1749db6354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32841-cwe-1108-excessive-reliance-on-glob-a4b3dee3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32841%3A%20CWE-1108%20Excessive%20reliance%20on%20global%20variables%20in%20EDIMAX%20Technology%20Co.%2C%20Ltd.%20Edimax%20GS-5008PL&amp;severity=critical&amp;id=69b9ce80771bdb1749db634f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4349-improper-authentication-in-duende-id-d9d51608</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4349%3A%20Improper%20Authentication%20in%20Duende%20IdentityServer4&amp;severity=medium&amp;id=69b9ce80771bdb1749db6359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2809-cwe-190-integer-overflow-or-wraparou-22bef509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2809%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9bceb771bdb1749d5ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4359-cwe-158-improper-neutralization-of-n-2d40f3cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4359%3A%20CWE-158%20Improper%20neutralization%20of%20null%20byte%20or%20NUL%20character%20in%20MongoDB%20Inc%20MongoDB%20C%20Driver&amp;severity=low&amp;id=69b9b25d771bdb1749d3370d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25936-cwe-89-improper-neutralization-of-s-c21df4bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25936%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69b9b25d771bdb1749d33705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32981-cwe-22-improper-limitation-of-a-pat-0fe01765</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32981%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ray-project%20Ray&amp;severity=high&amp;id=69b9b25d771bdb1749d33708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3563-cwe-1289-improper-validation-of-unsa-d870739f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3563%3A%20CWE-1289%20Improper%20validation%20of%20unsafe%20equivalence%20in%20input%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69b9aedc771bdb1749d151fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4064-cwe-862-in-devolutions-powershell-un-f966a742</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4064%3A%20CWE-862%20in%20Devolutions%20PowerShell%20Universal&amp;severity=high&amp;id=69b9aedc771bdb1749d15200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4295-cwe-829-inclusion-of-functionality-f-7d79dd05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4295%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=69b9aedc771bdb1749d15203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32836-cwe-789-memory-allocation-with-exce-2ce301df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32836%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20mackron%20dr_libs%20dr_flac.h&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32837-cwe-170-improper-null-termination-i-5eedb995</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32837%3A%20CWE-170%20Improper%20null%20termination%20in%20mackron%20miniaudio&amp;severity=medium&amp;id=69b9aedc771bdb1749d151f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4358-cwe-415-double-free-in-mongodb-inc-m-68de9898</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4358%3A%20CWE-415%20Double%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=69b9aedc771bdb1749d15207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15584-cwe-190-integer-overflow-or-wraparo-8dfc12a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15584%3A%20CWE-190%20Integer%20overflow%20or%20wraparound%20in%20Netskope%20Endpoint%20DLP%20Module%20for%20Netskope%20Client&amp;severity=medium&amp;id=69b9aedc771bdb1749d151ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66342-cwe-843-access-of-resource-using-in-3d123839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66342%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aee0771bdb1749d152d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62500-cwe-125-out-of-bounds-read-in-canva-15a9bf0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62500%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61979-cwe-125-out-of-bounds-read-in-canva-485677cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61979%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aedc771bdb1749d1520a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64733-cwe-125-out-of-bounds-read-in-canva-1672385e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64733%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66000-cwe-125-out-of-bounds-read-in-canva-8e074563</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66000%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64301-cwe-787-out-of-bounds-write-in-canv-6642b6f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64301%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canva%20Affinity&amp;severity=high&amp;id=69b9aede771bdb1749d1527a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64776-cwe-125-out-of-bounds-read-in-canva-f769b895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64776%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64735-cwe-125-out-of-bounds-read-in-canva-856c0bfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64735%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66633-cwe-125-out-of-bounds-read-in-canva-a1da5d6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66633%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58427-cwe-125-out-of-bounds-read-in-canva-9906ffa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58427%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66617-cwe-125-out-of-bounds-read-in-canva-fd95fd2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66617%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47873-cwe-125-out-of-bounds-read-in-canva-f292661c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47873%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d1526a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61952-cwe-125-out-of-bounds-read-in-canva-67336838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61952%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66503-cwe-125-out-of-bounds-read-in-canva-0c616519</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66503%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66042-cwe-125-out-of-bounds-read-in-canva-69b1913a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66042%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65119-cwe-125-out-of-bounds-read-in-canva-509aa906</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65119%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aee0771bdb1749d152c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62403-cwe-125-out-of-bounds-read-in-canva-ce41bab2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62403%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20726-cwe-125-out-of-bounds-read-in-canva-d616f23f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22882-cwe-125-out-of-bounds-read-in-canva-faf26082</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22882%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canva%20Affinity&amp;severity=medium&amp;id=69b9aede771bdb1749d15266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3207-cwe-306-missing-authentication-for-c-2e3ff132</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3207%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20TIBCO%20TIBCO%20BPM%20Enterprise&amp;severity=high&amp;id=69b9a0ca771bdb1749cca9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21570-rce-remote-code-execution-in-atlass-f80a393b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21570%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Bamboo%20Data%20Center&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25534-cwe-918-server-side-request-forgery-618622b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25534%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20io.spinnaker.clouddriver%20clouddriver-artifacts&amp;severity=critical&amp;id=69b992ba771bdb1749c53e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32298-cwe-78-improper-neutralization-of-s-126d8a3d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32298%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ANGEET%20ES3%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32297-cwe-306-missing-authentication-for--72cb42a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32297%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ANGEET%20ES3%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32296-cwe-306-missing-authentication-for--85524cc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32296%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sipeed%20NanoKVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32293-cwe-295-improper-certificate-valida-f28092a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20GL-iNet%20Comet%20KVM&amp;severity=low&amp;id=69b992ba771bdb1749c53e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32292-cwe-307-improper-restriction-of-exc-7d4b6f55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32292%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20GL-iNet%20Comet%20KVM&amp;severity=critical&amp;id=69b992ba771bdb1749c53e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32291-cwe-306-missing-authentication-for--185e1423</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32291%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32290-cwe-345-insufficient-verification-o-e7ed7343</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32290%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20GL-iNet%20Comet%20KVM&amp;severity=high&amp;id=69b992ba771bdb1749c53e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4319-sql-injection-in-code-projects-simpl-7d8938bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4319%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Order%20System&amp;severity=medium&amp;id=69b98f36771bdb1749c45e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4148-cwe-416-use-after-free-in-mongodb-in-c2315488</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4148%3A%20CWE-416%20Use%20after%20free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4147-cwe-457-use-of-uninitialized-variabl-286bf321</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4147%3A%20CWE-457%20Use%20of%20uninitialized%20variable%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-companies-house-exposed-details-of-millions-of--23f1964d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Companies%20House%20Exposed%20Details%20of%20Millions%20of%20Firms&amp;severity=medium&amp;id=69b97666771bdb1749bd173a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21886-cwe-285-improper-authorization-in-o-93d93ba5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21886%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23759-cwe-78-improper-neutralization-of-s-623ecb96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23759%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Perle%20Systems%20IOLAN%20STS&amp;severity=high&amp;id=69b99a3b771bdb1749cb0c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-botnet-exposed-via-open-directory-15-node--998fdeec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Botnet%20Exposed%20via%20Open%20Directory%3A%2015-Node%20Relay%20Network%20and%20Active%20C2&amp;severity=medium&amp;id=69b9ab21771bdb1749cfc092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4318-buffer-overflow-in-utt-hiper-810g-ec790824</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4318%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69b96f91771bdb1749ba8fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3564-cwe-347-improper-verification-of-cry-bef713bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3564%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=69b96f91771bdb1749ba8fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13406-cwe-476-null-pointer-dereference-in-1d82e42d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13406%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b9688b771bdb1749b843f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3888-cwe-268-privilege-chaining-eecd8b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3888%3A%20CWE-268%20Privilege%20chaining&amp;severity=high&amp;id=69b96182771bdb1749b5a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4324-improper-neutralization-of-special-e-98fe071b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4324%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.17%20for%20RHEL%209&amp;severity=medium&amp;id=69b96182771bdb1749b5a60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robotic-surgery-giant-intuitive-discloses-cyberatt-4fdbff55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robotic%20Surgery%20Giant%20Intuitive%20Discloses%20Cyberattack&amp;severity=medium&amp;id=69b95a46771bdb1749b2c340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/174-vulnerabilities-targeted-by-rondodox-botnet-bc9d0c8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=174%20Vulnerabilities%20Targeted%20by%20RondoDox%20Botnet&amp;severity=medium&amp;id=69b94c36771bdb1749acf1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62320-cwe-79-improper-neutralization-of-i-2b1a260a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62320%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20HCL%20Sametime&amp;severity=medium&amp;id=69b948e6771bdb1749ab9e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipv4-mapped-ipv6-addresses-tue-mar-17th-d7adc16f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPv4%20Mapped%20IPv6%20Addresses%2C%20(Tue%2C%20Mar%2017th)&amp;severity=medium&amp;id=69b93e26771bdb1749a50eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31966-cwe-20-improper-input-validation-in-92f29c54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31966%3A%20CWE-20%20Improper%20input%20validation%20in%20HCL%20Sametime&amp;severity=low&amp;id=69b93e6f771bdb1749a53234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4271-use-after-free-in-red-hat-red-hat-en-295694a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4271%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b93ad5771bdb1749a35140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hydra-saiga-covert-espionage-and-infiltration-of-c-bebbdde9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hydra%20Saiga%3A%20Covert%20Espionage%20and%20Infiltration%20of%20Critical%20Utilities&amp;severity=medium&amp;id=69b9371d771bdb17499ff040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-backdoor-targeting-ukrainian-entities-with-pos-73165a5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20backdoor%20targeting%20Ukrainian%20entities%20with%20possible%20links%20to%20Laundry%20Bear&amp;severity=medium&amp;id=69b93aa1771bdb1749a33193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-slopoly-start-to-ai-enhanced-ransomware-attacks-1c535291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Slopoly%20start%20to%20AI-enhanced%20ransomware%20attacks&amp;severity=medium&amp;id=69b93aa1771bdb1749a3316b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-year-old-wing-ftp-vulnerability-as-expl-5d2349a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Year-Old%20Wing%20FTP%20Vulnerability%20as%20Exploited&amp;severity=medium&amp;id=69b9339a771bdb17499dd609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/endgame-harvesting-inside-acrstealers-modern-infra-956f280d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Endgame%20Harvesting%3A%20Inside%20ACRStealer&apos;s%20Modern%20Infrastructure&amp;severity=medium&amp;id=69b93aa1771bdb1749a33163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28563-cwe-732-incorrect-permission-assign-799b8643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28563%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a0201b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26929-cwe-732-incorrect-permission-assign-fb1d7d04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26929%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69b93751771bdb1749a02016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30911-cwe-862-missing-authorization-in-ap-4e7a9ef7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30911%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b93751771bdb1749a0201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-apis-and-ddos-collide-in-new-era-of-coordinated-b3ee374b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%2C%20APIs%20and%20DDoS%20Collide%20in%20New%20Era%20of%20Coordinated%20Cyberattacks&amp;severity=medium&amp;id=69b93017771bdb17499c4735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28779-cwe-668-exposure-of-resource-to-wro-1025f596</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28779%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=69b92cc9771bdb17499ac8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3633-improper-neutralization-of-crlf-sequ-26894e87</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3633%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3632-improper-validation-of-syntactic-cor-2a317359</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3632%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b95372771bdb1749b00bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3634-improper-neutralization-of-crlf-sequ-4222e252</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3634%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=69b99a3b771bdb1749cb0cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-sites-deliver-vidar-infostealer-to-windows--2b7c4a7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20sites%20deliver%20Vidar%20infostealer%20to%20Windows%20users&amp;severity=medium&amp;id=69b91afd771bdb17498f40cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4208-cwe-639-in-typo3-extension-e-mail-mf-74236ea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4208%3A%20CWE-639%20in%20TYPO3%20Extension%20%22E-Mail%20MFA%20Provider%22&amp;severity=high&amp;id=69b917ad771bdb17498cd9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4202-cwe-862-in-typo3-extension-redirect--04ee806f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4202%3A%20CWE-862%20in%20TYPO3%20Extension%20%22Redirect%20Tabs%22&amp;severity=low&amp;id=69b917ad771bdb17498cd9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1323-cwe-502-deserialization-of-untrusted-3f51a0d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1323%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=69b917ad771bdb17498cd9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32586-cwe-862-missing-authorization-in-pl-b291f66c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32586%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=69b9142a771bdb17498971f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4312-cwe-306-missing-authentication-for-c-6cd3271e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4312%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20DrangSoft%20GCB%2FFCB%20Audit%20Software&amp;severity=critical&amp;id=69b90619771bdb17497bdc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3237-low-privilege-user-can-modify-global-3a86964d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3237%3A%20Low-Privilege%20User%20Can%20Modify%20Global%20Signing%20Key%20Settings%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69b8ff11771bdb174976d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4258-improper-verification-of-cryptograph-603f7543</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4258%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sjcl&amp;severity=high&amp;id=69b8e675771bdb17495b6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4308-server-side-request-forgery-in-frdel-ed62dd56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4308%3A%20Server-Side%20Request%20Forgery%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2373-cwe-862-missing-authorization-in-wpr-b6b21bec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2373%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69b8d4e1771bdb17492801b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4307-path-traversal-in-frdel-agent-zero-cefe85ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4307%3A%20Path%20Traversal%20in%20frdel%20agent-zero&amp;severity=medium&amp;id=69b8d4e1771bdb17492801bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2579-cwe-89-improper-neutralization-of-sp-b6d47505</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2579%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpxpo%20WowStore%20%E2%80%93%20Store%20Builder%20%26%20Product%20Blocks%20for%20WooCommerce&amp;severity=high&amp;id=69b99a3b771bdb1749cb0ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4289-sql-injection-in-tiandy-easy7-integr-ae21908d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4289%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4288-sql-injection-in-tiandy-easy7-integr-06ab2258</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4288%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-17-e13fec01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-17&amp;severity=medium&amp;id=69b9edea771bdb1749ee41fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-17-2ec304ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-17&amp;severity=medium&amp;id=69b9dfdb771bdb1749e025a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30707-na-821062bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30707%3A%20n%2Fa&amp;severity=high&amp;id=69b9aedc771bdb1749d151f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-17-ef279015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-17&amp;severity=low&amp;id=69b94fb7771bdb1749ae96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4287-sql-injection-in-tiandy-easy7-integr-93aff348</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4287%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b8991d771bdb17496c94d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4285-path-traversal-in-taoofagi-easegen-a-f6a4578b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4285%3A%20Path%20Traversal%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b895a6771bdb17496b6f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-indicators-of-compromise-for-the-coruna-ios-i-77074cb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoCs%20(Indicators%20of%20Compromise)%20for%20the%20Coruna%20iOS%20iPhone%20Web%20Malware%20Client%20Side%20Exploits%20Serving%20Web%20Malware%20Exploitation%20Kit&amp;severity=medium&amp;id=69b8a719771bdb1749884ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4284-server-side-request-forgery-in-taoof-abfaecba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4284%3A%20Server-Side%20Request%20Forgery%20in%20taoofagi%20easegen-admin&amp;severity=medium&amp;id=69b88e92771bdb17496901d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4177-cwe-122-heap-based-buffer-overflow-i-afb533fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4177%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=critical&amp;id=69b96182771bdb1749b5a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21991-a-dtrace-component-dtprobed-allows--d5010724</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21991%3A%20A%20DTrace%20component%2C%20dtprobed%2C%20allows%20arbitrary%20file%20creation%20through%20crafted%20USDT%20provider%20names.%20in%20Oracle%20Corporation%20Oracle%20Linux&amp;severity=medium&amp;id=69b99a3b771bdb1749cb0c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29522-cwe-22-improper-limitation-of-a-pat-de2651fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29522%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ZwickRoell%20GmbH%20%26%20Co.%20KG%20Test%20Data%20Management&amp;severity=high&amp;id=69b86eef771bdb1749567832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30882-cwe-79-improper-neutralization-of-i-1bcc0b7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30882%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b860dd771bdb17494840b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30881-cwe-89-improper-neutralization-of-s-35a3f971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30881%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30876-cwe-204-observable-response-discrep-5062e6d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30876%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69b859da771bdb17492b2d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30875-cwe-94-improper-control-of-generati-e8036721</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30875%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69b859da771bdb17492b2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28430-cwe-89-improper-neutralization-of-s-36133b16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28430%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69b859da771bdb17492b2d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29516-cwe-732-incorrect-permission-assign-d2fa831b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29516%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Buffalo%20TeraStation%20NAS%20TS5400R&amp;severity=medium&amp;id=69b859da771bdb17492b2d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32267-cwe-863-incorrect-authorization-in--65bf3522</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32267%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32264-cwe-470-use-of-externally-controlle-86230fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32264%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32263-cwe-470-use-of-externally-controlle-1ff05d12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32263%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b859da771bdb17492b2da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32262-cwe-22-improper-limitation-of-a-pat-86adf377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32262%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b859da771bdb17492b2da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32261-cwe-1336-improper-neutralization-of-a2ec3f2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32261%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20webhooks&amp;severity=high&amp;id=69b852cf771bdb174922885d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69196-cwe-863-incorrect-authorization-in--28778044</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20jlowin%20fastmcp&amp;severity=high&amp;id=69b84f4b771bdb17491f5f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4269-cwe-340-generation-of-predictable-nu-fb138d24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4269%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20AWS%20Bedrock%20AgentCore%20Starter%20Toolkit&amp;severity=high&amp;id=69b84a02771bdb1749186945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4224-vulnerability-in-python-software-fou-801a81ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4224%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918693d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3644-vulnerability-in-python-software-fou-f654c911</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3644%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69b84a02771bdb174918694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4254-stack-based-buffer-overflow-in-tenda-501e8b3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4254%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b84a02771bdb174918695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23862-cwe-77-improper-neutralization-of-s-596c049d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23862%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=69b84a02771bdb1749186949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23489-cwe-20-improper-input-validation-in-9483a14f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pluginsGLPI%20fields&amp;severity=critical&amp;id=69b83bfc9d4df4518377219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4253-os-command-injection-in-tenda-ac8-dda13ebe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4253%3A%20OS%20Command%20Injection%20in%20Tenda%20AC8&amp;severity=medium&amp;id=69b83bfc9d4df451837721b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29510-cwe-79-improper-neutralization-of-i-09a1b43e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29510%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29513-cwe-79-improper-neutralization-of-i-f7867d3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29513%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29520-cwe-79-improper-neutralization-of-i-b64081a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29520%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29521-cwe-352-cross-site-request-forgery--51f9174d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29521%3A%20CWE-352%20Cross-Site%20request%20forgery%20(CSRF)%20in%20Shenzhen%20Hereta%20Technology%20Co.%2C%20Ltd.%20Hereta%20ETH-IMC408M&amp;severity=medium&amp;id=69b83bfc9d4df451837721ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4252-reliance-on-ip-address-for-authentic-a9de4650</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4252%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Tenda%20AC8&amp;severity=critical&amp;id=69b834f39d4df4518372fd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4270-cwe-424-improper-protection-of-alter-47f937dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4270%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20AWS%20AWS%20API%20MCP%20Server&amp;severity=medium&amp;id=69b8316f9d4df4518370fea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4251-unprotected-storage-of-credentials-i-283d0ba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4251%3A%20Unprotected%20Storage%20of%20Credentials%20in%20CityData%20CityChat&amp;severity=low&amp;id=69b8316f9d4df4518370fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-hack-only-4-corporate-giants-still-sile-f1281a4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Hack%3A%20Only%204%20Corporate%20Giants%20Still%20Silent%20on%20Potential%20Impact&amp;severity=medium&amp;id=69b826b09d4df451836ba889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4250-unprotected-storage-of-credentials-i-16e58c2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4250%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Albert%20Sa%C4%9Fl%C4%B1k%20Hizmetleri%20ve%20Ticaret%20Albert%20Health&amp;severity=low&amp;id=69b84a02771bdb1749186969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4276-cwe-20-improper-input-validation-in--25cdf739</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4276%3A%20CWE-20%20Improper%20Input%20Validation%20in%20LibreChat%20RAG%20API&amp;severity=high&amp;id=69b8316f9d4df4518370feb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62319-cwe-89-improper-neutralization-of-s-e743fbfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62319%3A%20CWE-89%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20injection&apos;)%20in%20HCL%20Unica&amp;severity=critical&amp;id=69b84a02771bdb1749186966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32587-cwe-862-missing-authorization-in-sa-b875c90e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32587%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20WP%20EasyPay&amp;severity=high&amp;id=69b82a679d4df451836d9f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-rat-phishing-campaign-78be4171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COVERT%20RAT%3A%20Phishing%20Campaign&amp;severity=medium&amp;id=69b84937771bdb1749174e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gopix-banking-trojan-targeting-brazilian-financial-e4520c26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoPix%20banking%20Trojan%20targeting%20Brazilian%20financial%20institutions&amp;severity=medium&amp;id=69b84bd2771bdb17491b7596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-hallucinations-turn-fatal-how-to-stay-grou-32659fc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20hallucinations%20turn%20fatal%3A%20how%20to%20stay%20grounded%20in%20reality%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b820159d4df4518368ef91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32583-cwe-862-missing-authorization-in-we-e193183a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32583%3A%20CWE-862%20Missing%20Authorization%20in%20Webnus%20Inc.%20Modern%20Events%20Calendar&amp;severity=medium&amp;id=69b84a02771bdb174918694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-march-threat-intelligence-report-4bbef5d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69b8200e9d4df4518368ee85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4243-unprotected-storage-of-credentials-i-1cba1252</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4243%3A%20Unprotected%20Storage%20of%20Credentials%20in%20La%20Nacion%20App&amp;severity=low&amp;id=69b84a03771bdb1749186ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2274-cwe-79-improper-neutralization-of-in-84affa94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Forcepoint%20Web%20Security%20(On-Prem)&amp;severity=medium&amp;id=69b84a03771bdb1749186ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52642-vulnerability-in-hcl-aion-2fa9faee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52642%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52646-vulnerability-in-hcl-aion-de4338ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52646%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-executive-targeted-in-sophisticated--5b7b2a9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Executive%20Targeted%20in%20Sophisticated%20Phishing%20Attack&amp;severity=medium&amp;id=69b8189f9d4df451836392af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52645-vulnerability-in-hcl-aion-65575b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52645%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b84a03771bdb1749186ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52649-vulnerability-in-hcl-aion-0c892b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52649%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4242-unprotected-storage-of-credentials-i-626d3672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4242%3A%20Unprotected%20Storage%20of%20Credentials%20in%20BabyChakra%20Pregnancy%20%26%20Parenting%20App&amp;severity=low&amp;id=69b818e49d4df4518363a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52644-vulnerability-in-hcl-aion-d7b212a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52644%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52643-vulnerability-in-hcl-aion-ed82191c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52643%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b818e49d4df4518363a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52636-vulnerability-in-hcl-aion-eb617ebe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52636%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=low&amp;id=69b818e49d4df4518363a2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25369-cwe-79-improper-neutralization-of-i-14cd5f30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=high&amp;id=69b818e49d4df4518363a2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4241-sql-injection-in-itsourcecode-colleg-d3050c33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4241%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b818e49d4df4518363a30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxy-url-scans-with-ip-addresses-mon-mar-16th-c643cc2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2Fproxy%2F%20URL%20scans%20with%20IP%20addresses%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b80a8f9d4df451835f7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4240-denial-of-service-in-open5gs-6a8519b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4240%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69b818e49d4df4518363a301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10461-cwe-20-improper-input-validation-in-97b28249</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10461%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Softing%20smartLink%20SW-HT&amp;severity=medium&amp;id=69b8073f9d4df451835e8b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10685-cwe-122-heap-based-buffer-overflow--75669fe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10685%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Softing%20smartLink%20SW-PN&amp;severity=high&amp;id=69b8073f9d4df451835e8b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4239-improperly-controlled-modification-o-027708a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4239%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20Lagom%20WHMCS%20Template&amp;severity=medium&amp;id=69b8073f9d4df451835e8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52648-vulnerability-in-hcl-aion-ac473d72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52648%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-hit-asian-militaries-in-patie-149f8505</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Hit%20Asian%20Militaries%20in%20Patient%20Espionage%20Operation&amp;severity=medium&amp;id=69b800039d4df451835c3061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52638-vulnerability-in-hcl-aion-8685d6f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52638%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b800489d4df451835c3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4238-sql-injection-in-itsourcecode-colleg-f8d11167</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4238%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69b7f94a9d4df45183593df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-targeting-vpn-users-in-new-credential-3b4bb8bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Targeting%20VPN%20Users%20in%20New%20Credential%20Theft%20Campaign&amp;severity=medium&amp;id=69b7f8fb9d4df45183592dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52637-vulnerability-in-hcl-aion-8b430d7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52637%3A%20Vulnerability%20in%20HCL%20AION&amp;severity=medium&amp;id=69b7f94a9d4df45183593df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4237-sql-injection-in-itsourcecode-free-h-77ceda32</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4237%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69b7f5ac9d4df45183583c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forcememo-python-repositories-compromised-in-glass-95b214ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForceMemo%3A%20Python%20Repositories%20Compromised%20in%20GlassWorm%20Aftermath&amp;severity=medium&amp;id=69b7f1f59d4df45183566d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3476-cwe-94-improper-control-of-generatio-12313441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3476%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20Desktop&amp;severity=high&amp;id=69b7f2399d4df4518356864e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4236-sql-injection-in-itsourcecode-online-f9dbc71d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4236%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b84a03771bdb1749186ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4235-sql-injection-in-itsourcecode-online-b710fa80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4235%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Enrollment%20System&amp;severity=medium&amp;id=69b7e79a9d4df45183527dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-shells-tunnels-and-ransomware-dissecting-a-war-60be0a41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web%20Shells%2C%20Tunnels%2C%20and%20Ransomware%3A%20Dissecting%20a%20Warlock%20Attack&amp;severity=medium&amp;id=69b8529a771bdb1749224218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-vipkeylogger-campaign-62b90e30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAAS%20VIP_Keylogger%20Campaign&amp;severity=medium&amp;id=69b7e3e19d4df45183505ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15554-cwe-525-use-of-web-browser-cache-co-e8f7211f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15554%3A%20CWE-525%20Use%20of%20web%20browser%20cache%20containing%20sensitive%20information%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15553-cwe-613-insufficient-session-expira-9c9413c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15553%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15552-cwe-613-insufficient-session-expira-6d752576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15552%3A%20CWE-613%20Insufficient%20session%20expiration%20in%20Truesec%20LAPSWebUI&amp;severity=medium&amp;id=69b7e4169d4df451835079c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4234-sql-injection-in-sscms-de760972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4234%3A%20SQL%20Injection%20in%20SSCMS&amp;severity=medium&amp;id=69b7e4169d4df451835079cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-a-new-click-fix-variant-2fbb75b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20a%20new%20Click-fix%20variant&amp;severity=medium&amp;id=69b7e3e19d4df45183505ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-camelclone-multi-region-espionage-campai-046fce4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20CamelClone%3A%20Multi-Region%20Espionage%20Campaign%20Targets%20Government%20and%20Defense%20Entities%20Amidst%20Regional%20Tensions&amp;severity=medium&amp;id=69b7e05e9d4df451834e770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-threat-actor-targets-persian-gulf-regi-90bc51f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20Threat%20Actor%20Targets%20Persian%20Gulf%20Region%20With%20PlugX&amp;severity=medium&amp;id=69b7e05e9d4df451834e7746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2561-uses-seo-poisoning-to-distribute-fake-v-c8e82c49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2561%20uses%20SEO%20poisoning%20to%20distribute%20fake%20VPN%20clients%20for%20credential%20theft&amp;severity=medium&amp;id=69b7e05e9d4df451834e7765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-18c33a2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Handala%20Hack%22%20-%20Unveiling%20Group&apos;s%20Modus%20Operandi&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-hide-scam-links-with-ipv6-trick-in-free-t-c357d956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20hide%20scam%20links%20with%20IPv6%20trick%20in%20&apos;free%20toothbrush&apos;%20emails&amp;severity=medium&amp;id=69b7dcda9d4df451834d1c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3024-cwe-79-improper-neutralization-of-in-84fc643b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3024%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3023-cwe-943-improper-neutralization-of-s-0133fd93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3023%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=medium&amp;id=69b8073f9d4df451835e8b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3022-cwe-943-improper-neutralization-of-s-a0c7d77b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3022%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3021-cwe-943-improper-neutralization-of-s-fb751ce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3021%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3020-cwe-639-authorization-bypass-through-ef6ac061</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3020%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Wakyma%20Wakyma%20application%20web&amp;severity=high&amp;id=69b84a03771bdb1749186acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4233-path-traversal-in-thingsgateway-9caba6cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4233%3A%20Path%20Traversal%20in%20ThingsGateway&amp;severity=medium&amp;id=69b8316f9d4df4518370feac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3111-cwe-284-improper-access-control-in-e-4e65eb21</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3111%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=medium&amp;id=69b84a05771bdb1749186bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3110-cwe-284-improper-access-control-in-e-26eaccd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3110%3A%20CWE-284%20Improper%20Access%20Control%20in%20Educativa%20Campus&amp;severity=high&amp;id=69b84a03771bdb1749186af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4232-sql-injection-in-tiandy-integrated-m-54116443</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4232%3A%20SQL%20Injection%20in%20Tiandy%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7d6069d4df45183495a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11500-cwe-261-weak-encoding-for-password--70649efc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11500%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15587-cwe-425-direct-request-forced-brows-8a07be74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15587%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20tinycontrol%20Lan%20Kontroler%20v3.5&amp;severity=high&amp;id=69b7d6069d4df45183495a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4231-server-side-request-forgery-in-vanna-0c884c83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4231%3A%20Server-Side%20Request%20Forgery%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7d6069d4df45183495a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-attempt-reported-at-polands-nuclear-resear-c106b6db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Attempt%20Reported%20at%20Poland%E2%80%99s%20Nuclear%20Research%20Center&amp;severity=medium&amp;id=69b7c7c39d4df451833df70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4230-sql-injection-in-vanna-ai-vanna-d326f237</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4230%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4229-sql-injection-in-vanna-ai-vanna-f50509b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4229%3A%20SQL%20Injection%20in%20vanna-ai%20vanna&amp;severity=medium&amp;id=69b7c4789d4df451833a5b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4228-command-injection-in-lb-link-bl-wr90-96738fe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4228%3A%20Command%20Injection%20in%20LB-LINK%20BL-WR9000&amp;severity=medium&amp;id=69b7bd6a9d4df45183343b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4227-buffer-overflow-in-lb-link-bl-wr9000-4695df8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4227%3A%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7bd6a9d4df45183343b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4226-stack-based-buffer-overflow-in-lb-li-1aa90b19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4226%3A%20Stack-based%20Buffer%20Overflow%20in%20LB-LINK%20BL-WR9000&amp;severity=high&amp;id=69b7c1479d4df451833752d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4225-cross-site-scripting-in-cms-made-sim-fb8a5324</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4225%3A%20Cross%20Site%20Scripting%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=69b7c1479d4df451833752cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4255-cwe-829-inclusion-of-functionality-f-64ab002d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4255%3A%20CWE-829%20Inclusion%20of%20functionality%20from%20untrusted%20control%20sphere%20in%20thermalright%20TR-VISION%20HOME&amp;severity=high&amp;id=69b7af5b9d4df4518329b048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32778-cwe-476-null-pointer-dereference-in-bd1cfa53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32778%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69b7af5b9d4df4518329b03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4223-sql-injection-in-itsourcecode-payrol-f7fd3546</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4223%3A%20SQL%20Injection%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b7af5b9d4df4518329b041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32777-cwe-835-loop-with-unreachable-exit--d8732131</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32777%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32776-cwe-476-null-pointer-dereference-in-7a031374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32776%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=69b7af5b9d4df4518329b033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25083-missing-authorization-in-growi-inc--8bfd0964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25083%3A%20Missing%20authorization%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=high&amp;id=69b7af5b9d4df4518329b02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4222-path-traversal-in-sscms-6eb6cec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4222%3A%20Path%20Traversal%20in%20SSCMS&amp;severity=medium&amp;id=69b7a8549d4df4518325f337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4221-unrestricted-upload-in-tiandy-easy7--730344dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4221%3A%20Unrestricted%20Upload%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4220-unrestricted-upload-in-technologies--184c105f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4220%3A%20Unrestricted%20Upload%20in%20Technologies%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7a8549d4df4518325f32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4219-hard-coded-credentials-in-index-conf-0c602181</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4219%3A%20Hard-coded%20Credentials%20in%20INDEX%20Conferences%20%26%20Exhibitions%20Organization%20YWF%20BPOF%20APGCS%20App&amp;severity=medium&amp;id=69b7a8549d4df4518325f325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4218-information-disclosure-in-myaedes-ap-e4a157bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4218%3A%20Information%20Disclosure%20in%20myAEDES%20App&amp;severity=low&amp;id=69b79ecc9d4df451831f7147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31386-improper-neutralization-of-special--9aa4ef0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31386%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed&amp;severity=high&amp;id=69b796c19d4df451831b8462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4217-key-management-error-in-xreal-nebula-2089e6f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4217%3A%20Unprotected%20Storage%20of%20Credentials%20in%20XREAL%20Nebula%20App&amp;severity=low&amp;id=69b796c19d4df451831b846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4216-hard-coded-credentials-in-i-sens-sma-30d479c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4216%3A%20Hard-coded%20Credentials%20in%20i-SENS%20SmartLog%20App&amp;severity=medium&amp;id=69b796c19d4df451831b8467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21005-cwe-22-improper-limitation-of-a-pat-3e867367</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21005%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21004-cwe-287-improper-authentication-in--b29f3ccc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21004%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c359d4df4518315ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4215-server-side-request-forgery-in-flowc-146eba46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4215%3A%20Server-Side%20Request%20Forgery%20in%20FlowCI%20flow-core-x&amp;severity=medium&amp;id=69b78c359d4df4518315eeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21002-cwe-347-improper-verification-of-cr-3a79b2e5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21002%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4214-stack-based-buffer-overflow-in-d-lin-5afe7392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4214%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eeaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21001-cwe-35-path-traversal-in-samsung-mo-756e512d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21001%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69b78c359d4df4518315ee95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21000-cwe-284-improper-access-control-in--8c6fbad1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21000%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=high&amp;id=69b78c359d4df4518315ee92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20999-cwe-294-authentication-bypass-by-re-a52b7f65</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20999%3A%20CWE-294%20-%20Authentication%20Bypass%20by%20Replay%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20998-cwe-287-improper-authentication-in--725ff812</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20998%3A%20CWE-287%20-%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c359d4df4518315ee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20997-cwe-347-improper-verification-of-cr-1bb3868e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20997%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20996-cwe-327-use-of-a-broken-or-risky-cr-af2f35f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20996%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=69b78c339d4df4518315ee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20995-cwe-200-exposure-of-sensitive-infor-f4b85c12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20995%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=69b78c339d4df4518315ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20994-cwe-601-url-redirection-to-untruste-392c7409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20994%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(%26%2339%3BOpen%20Redirect%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=high&amp;id=69b78c339d4df4518315ee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20993-cwe-926-improper-export-of-android--cdf26a4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20993%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Assistant&amp;severity=medium&amp;id=69b78c339d4df4518315ee06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20992-cwe-285-improper-authorization-in-s-28f63449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20992%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20991-cwe-269-improper-privilege-manageme-789aa04d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20991%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315ee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20990-cwe-926-improper-export-of-android--139f9df1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20990%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69b78c339d4df4518315edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20989-cwe-347-improper-verification-of-cr-0138dde6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20989%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20988-cwe-925-improper-verification-of-in-ab79f070</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20988%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69b78c339d4df4518315edf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4213-stack-based-buffer-overflow-in-d-lin-87c01e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4213%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b78c359d4df4518315eea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4212-stack-based-buffer-overflow-in-d-lin-423aef88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4212%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4211-stack-based-buffer-overflow-in-d-lin-0a1f49a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4211%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DNS-120&amp;severity=high&amp;id=69b77e229d4df45183f020cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4210-command-injection-in-d-link-dns-120-af98b267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4210%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4209-command-injection-in-d-link-dns-120-7d0fc20f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4209%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4207-command-injection-in-d-link-dns-120-f37b1a52</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4207%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b77e229d4df45183f020a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4206-command-injection-in-d-link-dns-120-65477eea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4206%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b76c8f9d4df45183da5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-march-16th-2026-httpsiscs-72e69648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20March%2016th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9850%2C%20(Mon%2C%20Mar%2016th)&amp;severity=medium&amp;id=69b765529d4df45183d1e2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4205-command-injection-in-d-link-dns-120-1782b85d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4205%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4204-command-injection-in-d-link-dns-120-ebd2c6f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4204%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4203-command-injection-in-d-link-dns-120-d99c6b55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4203%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b762029d4df45183c8a8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4201-unrestricted-upload-in-glowxq-glowxq-224c8b75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4201%3A%20Unrestricted%20Upload%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b757769d4df45183ae649a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4200-server-side-request-forgery-in-glowx-4505f74b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4200%3A%20Server-Side%20Request%20Forgery%20in%20glowxq%20glowxq-oj&amp;severity=medium&amp;id=69b7c1479d4df451833752e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4199-command-injection-in-bazinga012-mcpc-577e7fdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4199%3A%20Command%20Injection%20in%20bazinga012%20mcp_code_executor&amp;severity=medium&amp;id=69b7c1479d4df451833752d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-16-2b9e1ab1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-16&amp;severity=medium&amp;id=69b89c6a771bdb17496e1b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69902-na-285ff70a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69902%3A%20n%2Fa&amp;severity=critical&amp;id=69b86eef771bdb174956782c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50881-na-5ae0b55c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50881%3A%20n%2Fa&amp;severity=high&amp;id=69b867e7771bdb17494e9bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68971-na-bb07e2a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68971%3A%20n%2Fa&amp;severity=medium&amp;id=69b8648d771bdb17494b0d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69693-na-1c752da6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69693%3A%20n%2Fa&amp;severity=medium&amp;id=69b859da771bdb17492b2d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69809-na-431ba23d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69809%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69808-na-ee6b7db8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69808%3A%20n%2Fa&amp;severity=critical&amp;id=69b852cf771bdb1749228855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69727-na-a25b3bc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69727%3A%20n%2Fa&amp;severity=medium&amp;id=69b84f4b771bdb17491f5f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57543-na-c23cf64e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57543%3A%20n%2Fa&amp;severity=medium&amp;id=69b84a02771bdb1749186963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69768-na-d4afeab5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69768%3A%20n%2Fa&amp;severity=high&amp;id=69b84a02771bdb1749186957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66687-na-bffe2a7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66687%3A%20n%2Fa&amp;severity=high&amp;id=69b83bfc9d4df4518377219a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65734-na-11ff5127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65734%3A%20n%2Fa&amp;severity=medium&amp;id=69b834f39d4df4518372fd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30405-na-47c1317e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30405%3A%20n%2Fa&amp;severity=high&amp;id=69b8316f9d4df4518370fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-16-a2ad58b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-16&amp;severity=medium&amp;id=69b831389d4df451837030f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69784-na-7ea76be7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69784%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69783-na-b19d29eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69783%3A%20n%2Fa&amp;severity=high&amp;id=69b82a679d4df451836d9f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-16-ee2f10f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-16&amp;severity=low&amp;id=69b7a1159d4df4518320e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4198-command-injection-in-hypermodel-labs-54b14dd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4198%3A%20Command%20Injection%20in%20hypermodel-labs%20mcp-server-auto-commit&amp;severity=medium&amp;id=69b745e29d4df451838ed4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4197-command-injection-in-d-link-dns-120-3ef2e999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4197%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4196-command-injection-in-d-link-dns-120-f9eb82fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4196%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b745e29d4df451838ed4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4195-command-injection-in-d-link-dns-120-0f05e6b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4195%3A%20Command%20Injection%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4194-improper-access-controls-in-d-link-d-75e423f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4194%3A%20Improper%20Access%20Controls%20in%20D-Link%20DNS-120&amp;severity=medium&amp;id=69b73b569d4df45183888202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4193-improper-access-controls-in-d-link-d-86e0555a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4193%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-823G&amp;severity=medium&amp;id=69b73b569d4df451838881f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4192-command-injection-in-avinashbole-qui-2518a2fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4192%3A%20Command%20Injection%20in%20AvinashBole%20quip-mcp-server&amp;severity=medium&amp;id=69b71bb39d4df451836c6ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4191-unrestricted-upload-in-jawherkl-node-89ece630</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4191%3A%20Unrestricted%20Upload%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b7c1479d4df451833752e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4190-sql-injection-in-jawherkl-node-api-p-a54029ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4190%3A%20SQL%20Injection%20in%20JawherKl%20node-api-postgres&amp;severity=medium&amp;id=69b70a219d4df451835b4b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4189-sql-injection-in-phpipam-ff9d192d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4189%3A%20SQL%20Injection%20in%20phpipam&amp;severity=medium&amp;id=69b70a219d4df451835b4b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4188-stack-based-buffer-overflow-in-d-lin-4643e6f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=69b70a219d4df451835b4b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4187-missing-authentication-in-tiandy-eas-d0083b25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4187%3A%20Missing%20Authentication%20in%20Tiandy%20Easy7%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=69b7069a9d4df451835804bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4186-cross-site-scripting-in-ueditor-9903830f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4186%3A%20Cross%20Site%20Scripting%20in%20UEditor&amp;severity=medium&amp;id=69b7069a9d4df451835804b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4185-stack-based-buffer-overflow-in-gpac-3793df76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4185%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b7c1479d4df451833752ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4184-stack-based-buffer-overflow-in-d-lin-8b4d54d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4184%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b6f1829d4df45183499980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4183-stack-based-buffer-overflow-in-d-lin-2982ced2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4183%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4182-stack-based-buffer-overflow-in-d-lin-4b5e9537</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4182%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df45183375304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4181-stack-based-buffer-overflow-in-d-lin-ddee0ed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4181%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=69b7c1479d4df451833752fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28522-null-pointer-dereference-in-tuya-ar-2a93d27c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28522%3A%20NULL%20Pointer%20Dereference%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28519-heap-based-buffer-overflow-in-tuya--81bb398e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28519%3A%20Heap-based%20Buffer%20Overflow%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1479d4df4518337530b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28521-out-of-bounds-read-in-tuya-arduino--e207a043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28521%3A%20Out-of-bounds%20Read%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df4518337532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28520-off-by-one-error-in-tuya-arduino-tu-f1d3cb47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28520%3A%20Off-by-one%20Error%20in%20Tuya%20arduino-TuyaOpen&amp;severity=high&amp;id=69b7c1499d4df45183375329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4180-improper-access-controls-in-d-link-d-2aa3ab3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4180%3A%20Improper%20Access%20Controls%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=69b7c1499d4df45183375338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4175-cross-site-scripting-in-aureus-erp-ce517057</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4175%3A%20Cross%20Site%20Scripting%20in%20Aureus%20ERP&amp;severity=medium&amp;id=69b68f139d4df451830604a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4174-resource-consumption-in-radare2-2650e8ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4174%3A%20Resource%20Consumption%20in%20Radare2&amp;severity=medium&amp;id=69b68f139d4df4518306049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/loblaw-data-breach-impacts-customer-information-81750628</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Loblaw%20Data%20Breach%20Impacts%20Customer%20Information&amp;severity=medium&amp;id=69b684539d4df45183fde128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14287-cwe-94-improper-control-of-generati-d9c339c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14287%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=69b7c1499d4df4518337533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4173-sql-injection-in-codephiliax-chat2db-3df7a560</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4173%3A%20SQL%20Injection%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=69b67d7e9d4df45183f8681b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4172-stack-based-buffer-overflow-in-trend-df028a4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4172%3A%20Stack-based%20Buffer%20Overflow%20in%20TRENDnet%20TEW-632BRP&amp;severity=high&amp;id=69b676769d4df45183f31fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4171-authorization-bypass-in-codegenieapp-cf6d9b09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4171%3A%20Authorization%20Bypass%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b66e0a9b0f87e881d5b32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4170-os-command-injection-in-topsec-topac-9e1efe11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4170%3A%20OS%20Command%20Injection%20in%20Topsec%20TopACM&amp;severity=critical&amp;id=69b670ed9d4df45183e9aed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4169-cross-site-scripting-in-tecnick-tcex-fd1ffac8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4169%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4168-cross-site-scripting-in-tecnick-tcex-9346d093</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4168%3A%20Cross%20Site%20Scripting%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=69b64e669b0f87e881babeba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4167-stack-based-buffer-overflow-in-belki-ac4818a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4167%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=69b64ae29b0f87e881b8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4166-cross-site-scripting-in-wavlink-wl-n-93ca904f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4166%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69b64ae29b0f87e881b8f1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4165-cross-site-scripting-in-worksuite-hr-a0a0992f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4165%3A%20Cross%20Site%20Scripting%20in%20Worksuite%20HR%2C%20CRM%20and%20Project%20Management&amp;severity=medium&amp;id=69b670ed9d4df45183e9aedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4164-command-injection-in-wavlink-wl-wn57-c028dcbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4164%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=critical&amp;id=69b62b3e9b0f87e881a99067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2233-cwe-862-missing-authorization-in-wed-191cba37</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2233%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=69b619aa9b0f87e8819c13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1947-cwe-639-authorization-bypass-through-412339ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1947%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=high&amp;id=69b60f1e9b0f87e88192b131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1883-cwe-639-authorization-bypass-through-0e12c6db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wickedplugins%20Wicked%20Folders%20%E2%80%93%20Folder%20Organizer%20for%20Pages%2C%20Posts%2C%20and%20Custom%20Post%20Types&amp;severity=medium&amp;id=69b60f1e9b0f87e88192b12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3441-out-of-bounds-read-in-red-hat-red-ha-c29ec58c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3441%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3442-out-of-bounds-read-in-red-hat-red-ha-01e6e081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3442%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b604929b0f87e88177d6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-15-32473807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-15&amp;severity=medium&amp;id=69b7492f9d4df45183906444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-15-4b6db233</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-15&amp;severity=medium&amp;id=69b680cc9d4df45183fb5170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-15-fc6b6048</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-15&amp;severity=low&amp;id=69b680cc9d4df45183fb5150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4163-command-injection-in-wavlink-wl-wn57-5fa0760b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4163%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=critical&amp;id=69b5e4e22f860ef94356585f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4179-loop-with-unreachable-exit-condition-9616b361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4179%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69b5ff079b0f87e881671219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0849-buffer-copy-without-checking-size-of-03e4aa02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0849%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=low&amp;id=69b5cfcb2f860ef94341a096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1870-cwe-862-missing-authorization-in-thi-2dfc483a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1870%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20Thim%20Kit%20for%20Elementor%20%E2%80%93%20Pre-built%20Templates%20%26%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69b562ce2f860ef943ef5275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-aos-cx-vulnerability-allows-admin-pas-c92fd2bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20AOS-CX%20Vulnerability%20Allows%20Admin%20Password%20Resets&amp;severity=critical&amp;id=69b53f722f860ef943baf10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54920-cwe-502-deserialization-of-untruste-513e22e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54920%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=high&amp;id=69b527072f860ef943974709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1948-cwe-862-missing-authorization-in-web-88b87899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1948%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69b4dd372f860ef94382b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-rem-aa9c64ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20Remcos%20RAT%2C%20(Sat%2C%20Mar%2014th)&amp;severity=medium&amp;id=69b4b9d92f860ef94307e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-14-20b6e0de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-14&amp;severity=medium&amp;id=69b5f9c02f860ef9436a67d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-14-ad0bb0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-14&amp;severity=low&amp;id=69b4d2712f860ef9434a4b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-14-1eabe221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-14&amp;severity=medium&amp;id=69b4d2712f860ef9434a1b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0385-spoofing-in-microsoft-microsoft-edge-1b431653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0385%3A%20Spoofing%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69b48c5d2f860ef943c0bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32724-cwe-416-use-after-free-in-px4-px4-a-01ac43e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b488d62f860ef943ba416b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3227-cwe-78-improper-neutralization-of-sp-ac440341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-WR802N%20v4&amp;severity=high&amp;id=69b488d62f860ef943ba4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32720-cwe-284-improper-access-control-in--c14eb5d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32720%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ctfer-io%20monitoring&amp;severity=high&amp;id=69b485502f860ef943b83400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32719-cwe-22-improper-limitation-of-a-pat-c20be6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32719%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69b485502f860ef943b833fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32717-cwe-863-incorrect-authorization-in--a6c8c004</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32717%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32715-cwe-863-incorrect-authorization-in--02a0b72c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32715%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mintplex-Labs%20anything-llm&amp;severity=low&amp;id=69b485502f860ef943b833f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32713-cwe-670-always-incorrect-control-fl-e4fe0408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32713%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32709-cwe-22-improper-limitation-of-a-pat-51bc0c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32709%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b485502f860ef943b833ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32708-cwe-121-stack-based-buffer-overflow-a8d143e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32708%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b485502f860ef943b833e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32707-cwe-121-stack-based-buffer-overflow-87d08068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32707%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32706-cwe-120-buffer-copy-without-checkin-09d5c9f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32706%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20PX4%20PX4-Autopilot&amp;severity=high&amp;id=69b481d42f860ef943b5ebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32705-cwe-121-stack-based-buffer-overflow-487fae4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32705%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32616-cwe-74-improper-neutralization-of-s-ab6dc709</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32616%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20kasuganosoras%20Pigeon&amp;severity=high&amp;id=69b481d42f860ef943b5ebb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32704-cwe-285-improper-authorization-in-s-8e36d108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32704%3A%20CWE-285%3A%20Improper%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b481d42f860ef943b5ebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26133-information-disclosure-in-microsoft-fe3e9176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26133%3A%20Information%20Disclosure%20in%20Microsoft%20Microsoft%20365%20Copilot%20for%20Android&amp;severity=high&amp;id=69b481d42f860ef943b5ebb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32640-cwe-915-improperly-controlled-modif-c6dbc3dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32640%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20danthedeckie%20simpleeval&amp;severity=high&amp;id=69b481d42f860ef943b5ebbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32772-cwe-669-incorrect-resource-transfer-fd58534d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32772%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20GNU%20inetutils&amp;severity=low&amp;id=69b47e482f860ef943b3ab7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32635-cwe-79-improper-neutralization-of-i-dc8aa9bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32635%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%40angular%20compiler&amp;severity=high&amp;id=69b47e482f860ef943b3ab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32630-cwe-409-improper-handling-of-highly-276ae7f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32630%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b47e482f860ef943b3ab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32628-cwe-89-improper-neutralization-of-s-a6db85bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32628%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b47e482f860ef943b3ab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32627-cwe-295-improper-certificate-valida-93534cac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32627%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b47ac82f860ef943b21729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2491-cwe-306-missing-authentication-for-c-5feeb71e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2491%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20A-40&amp;severity=medium&amp;id=69b47ac82f860ef943b21725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3562-cwe-347-improper-verification-of-cry-0705c7b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3562%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Philips%20Hue%20Bridge&amp;severity=medium&amp;id=69b47ac82f860ef943b21741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3561-cwe-122-heap-based-buffer-overflow-i-375556a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3561%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3560-cwe-122-heap-based-buffer-overflow-i-45c1d76e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3560%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3559-cwe-323-reusing-a-nonce-key-pair-in--315b5e3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3559%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3558-cwe-306-missing-authentication-for-c-e7247790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3558%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3557-cwe-122-heap-based-buffer-overflow-i-348800c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3557%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b21732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3556-cwe-122-heap-based-buffer-overflow-i-ceca564d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3556%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3555-cwe-122-heap-based-buffer-overflow-i-9ade4958</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3555%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Philips%20Hue%20Bridge&amp;severity=high&amp;id=69b47ac82f860ef943b2172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32621-cwe-1321-improperly-controlled-modi-1de28d7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32621%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20%40apollo%20federation-internals&amp;severity=critical&amp;id=69b477402f860ef943af037e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32626-cwe-79-improper-neutralization-of-i-a50f3d86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32626%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=critical&amp;id=69b473bd2f860ef943aa93f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32614-cwe-347-improper-verification-of-cr-469bafa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32614%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20emmansun%20gmsm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0977-cwe-284-in-ibm-cics-transaction-gate-0f24da33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0977%3A%20CWE-284%20in%20IBM%20CICS%20Transaction%20Gateway%20for%20Multiplatforms&amp;severity=medium&amp;id=69b473bd2f860ef943aa93ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32617-cwe-942-permissive-cross-domain-pol-afe0fc22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32617%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69b473bd2f860ef943aa93f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32600-cwe-354-improper-validation-of-inte-e8cd52c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32600%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20simplesamlphp%20xml-security&amp;severity=high&amp;id=69b473bf2f860ef943aa9457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32594-cwe-306-missing-authentication-for--2bea7820</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32594%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b473bd2f860ef943aa940d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13212-cwe-799-improper-control-of-interac-fc1bf1b0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13212%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13459-cwe-841-improper-enforcement-of-beh-49253c6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13459%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20IBM%20Aspera%20Console&amp;severity=low&amp;id=69b473bd2f860ef943aa93ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13460-cwe-204-observable-response-discrep-b46d5ee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13460%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=69b473bd2f860ef943aa9402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32314-cwe-248-uncaught-exception-in-libp2-e25d0c75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32314%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b473bd2f860ef943aa940a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32313-cwe-354-improper-validation-of-inte-f09d9228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32313%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20robrichards%20xmlseclibs&amp;severity=high&amp;id=69b473bd2f860ef943aa9405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31949-cwe-248-uncaught-exception-in-danny-d7418f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31949%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=69b4732e2f860ef943a92620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31944-cwe-306-missing-authentication-for--349af3c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=69b4732e2f860ef943a9261d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31899-cwe-674-uncontrolled-recursion-in-k-d8a020a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31899%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Kozea%20CairoSVG&amp;severity=high&amp;id=69b4732e2f860ef943a92619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36368-cwe-89-improper-neutralization-of-s-eb4d8f1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36368%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4732e2f860ef943a92616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31886-cwe-22-improper-limitation-of-a-pat-116cb11a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31886%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=critical&amp;id=69b469392f860ef943905692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31882-cwe-306-missing-authentication-for--5fd57a74</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dagu-org%20dagu&amp;severity=high&amp;id=69b469392f860ef94390568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31814-cwe-190-integer-overflow-or-wraparo-40e288f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31814%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20libp2p%20rust-yamux&amp;severity=high&amp;id=69b465b22f860ef9438da28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14483-cwe-201-insertion-of-sensitive-info-0baf0879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14483%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30961-cwe-770-allocation-of-resources-wit-d12c59e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14504-cwe-79-improper-neutralization-of-i-1f69d1bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b465b22f860ef9438da278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30955-cwe-400-uncontrolled-resource-consu-c9a9ab34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30955%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30943-cwe-863-incorrect-authorization-in--0656b1a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30943%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69b465b22f860ef9438da281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30915-cwe-22-improper-limitation-of-a-pat-da7d087b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30915%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30914-cwe-22-improper-limitation-of-a-pat-bd6cd91e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30914%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=69b465b22f860ef9438da27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30853-cwe-22-improper-limitation-of-a-pat-6923c988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30853%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0835-cwe-79-improper-neutralization-of-in-35334f5f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0835%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=69b4622a2f860ef9438be2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71263-cwe-120-buffer-copy-without-checkin-49ff0d18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71263%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AT%26T%20Bell%20Labs%20UNIX&amp;severity=high&amp;id=69b45b242f860ef94386c25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13702-vulnerability-in-ibm-sterling-partn-f430fe6b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13702%3A%20Vulnerability%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13718-cwe-319-cleartext-transmission-of-s-470e2432</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b45b242f860ef94386c254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13723-cwe-324-use-of-a-key-past-its-expir-824e411a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13723%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12453-cwe-79-improper-neutralization-of-i-d48ad297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12453%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12454-cwe-79-improper-neutralization-of-i-b626b0fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12454%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12455-cwe-204-observable-response-discrep-bfc71dd8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12455%3A%20CWE-204%20Observable%20response%20discrepancy%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=69b45b242f860ef94386c24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13726-cwe-209-generation-of-error-message-c3b107e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13726%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=69b45b242f860ef94386c25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-scale-opportunistic-sms-pumping-attacks-targe-0c35fd17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide-scale%2C%20opportunistic%20SMS%20pumping%20attacks%20target%20customer%20sign-up%20pages&amp;severity=medium&amp;id=69b7d9569d4df451834af53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14811-cwe-598-use-of-get-request-method-w-bc6a9c1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14811%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=low&amp;id=69b457cc2f860ef943762155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32746-cwe-120-buffer-copy-without-checkin-0ceead78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32746%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GNU%20inetutils&amp;severity=critical&amp;id=69b4498e2f860ef94328433b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1668-cwe-20-improper-input-validation-in--944966a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1668%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20SG2008P%203.2x&amp;severity=high&amp;id=69b4440c2f860ef9430eaa02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26954-cwe-94-improper-control-of-generati-35790079</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26954%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69b45b752f860ef943872ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32745-cwe-614-in-jetbrains-datalore-e0b6f632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32745%3A%20CWE-614%20in%20JetBrains%20Datalore&amp;severity=medium&amp;id=69b45b752f860ef943872ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4092-cwe-22-improper-limitation-of-a-path-4edecfa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4092%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Clasp&amp;severity=high&amp;id=69b45b752f860ef943872ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60012-cwe-20-improper-input-validation-in-45b604ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60012%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66249-cwe-22-improper-limitation-of-a-pat-cb731667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66249%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Livy&amp;severity=medium&amp;id=69b42da82f860ef943f7d5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/starbucks-data-breach-impacts-employees-cd090120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Starbucks%20Data%20Breach%20Impacts%20Employees&amp;severity=medium&amp;id=69b42d392f860ef943f7a2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0956-cwe-125-out-of-bounds-read-in-digile-9c731add</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0956%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0955-cwe-125-out-of-bounds-read-in-digile-1617a903</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0955%3A%20CWE-125%20Out-of-bounds%20read%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b42da82f860ef943f7d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0957-cwe-787-out-of-bounds-write-in-digil-a0dbc562</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0957%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0954-cwe-787-out-of-bounds-write-in-digil-5904e41d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0954%3A%20CWE-787%20Out-of-bounds%20write%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=69b422e32f860ef943ee8226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-n8n-flaw-exploited-slopoly-malware-i-1257d1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20N8n%20Flaw%20Exploited%2C%20Slopoly%20Malware%2C%20Interpol%20Cybercrime%20Crackdown&amp;severity=low&amp;id=69b41f282f860ef943ebe1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13779-cwe-306-missing-authentication-for--4936bb9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13779%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b414d22f860ef943e394b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13778-cwe-306-missing-authentication-for--89a37f0e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13778%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=medium&amp;id=69b40df72f860ef943ddd9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13777-cwe-294-authentication-bypass-by-ca-4adcb152</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13777%3A%20CWE-294%20Authentication%20bypass%20by%20capture-replay%20in%20ABB%20AWIN%20GW100%20rev.2&amp;severity=high&amp;id=69b40df72f860ef943ddd9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-take-aim-at-us-and-other-targe-9bcfe572</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Take%20Aim%20at%20US%20and%20Other%20Targets%2C%20Raising%20Risk%20of%20Cyberattacks%20During%20War&amp;severity=medium&amp;id=69b4068c2f860ef943d8f890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4111-loop-with-unreachable-exit-condition-fe816334</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4111%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=69b3fc832f860ef943d17f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32543-missing-authorization-in-cyberchimp-8017ca52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32543%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=medium&amp;id=69b3fc832f860ef943d17f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32487-missing-authorization-in-raratheme--191fac15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32487%3A%20Missing%20Authorization%20in%20raratheme%20Lawyer%20Landing%20Page&amp;severity=medium&amp;id=69b3fc832f860ef943d17f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32486-missing-authorization-in-wptravelen-38838032</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32486%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Booking&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32462-improper-neutralization-of-input-du-9c426d46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc832f860ef943d17f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32461-missing-authorization-in-really-sim-fffa3e1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32461%3A%20Missing%20Authorization%20in%20Really%20Simple%20Plugins%20Really%20Simple%20SSL&amp;severity=medium&amp;id=69b3fc832f860ef943d17f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32460-improper-neutralization-of-input-du-d89a53a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69b3fc832f860ef943d17f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32459-improper-neutralization-of-special--db7bd114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32459%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flycart%20UpsellWP&amp;severity=high&amp;id=69b3fc832f860ef943d17f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32458-improper-neutralization-of-special--eb6e8174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32458%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20WOLF&amp;severity=high&amp;id=69b3fc832f860ef943d17f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32457-missing-authorization-in-wombat-plu-4784041d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32457%3A%20Missing%20Authorization%20in%20Wombat%20Plugins%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc832f860ef943d17f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32456-cross-site-request-forgery-csrf-in--9291cbc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Janis%20Elsts%20Admin%20Menu%20Editor&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32455-improper-neutralization-of-input-du-7de85790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=69b3fc812f860ef943d17f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32454-improper-neutralization-of-input-du-53b4d6ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32453-missing-authorization-in-themefusio-6f99cd0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32453%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada%20Core&amp;severity=medium&amp;id=69b3fc812f860ef943d17f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32452-missing-authorization-in-themefusio-896f48b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32452%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32451-missing-authorization-in-themefusio-dde6c7ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32451%3A%20Missing%20Authorization%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32450-improper-neutralization-of-input-du-a3960304</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20Active%20Products%20Tables%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc812f860ef943d17f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32449-improper-neutralization-of-input-du-d3119f43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=medium&amp;id=69b3fc812f860ef943d17f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32448-improper-neutralization-of-input-du-a2e879f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=69b3fc812f860ef943d17f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32447-missing-authorization-in-vito-peleg-dc3d9cb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32447%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=69b3fc812f860ef943d17f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32446-missing-authorization-in-syed-balkh-9e5eebf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32446%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32445-missing-authorization-in-elementor--89cd866e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32445%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=low&amp;id=69b3fc7f2f860ef943d17e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32443-cross-site-request-forgery-csrf-in--31384905</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Josh%20Kohlbach%20Product%20Feed%20PRO%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32440-missing-authorization-in-ex-themes--35f616df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32440%3A%20Missing%20Authorization%20in%20Ex-Themes%20WP%20Food&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32439-missing-authorization-in-webgeniusl-d0e96da4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32439%3A%20Missing%20Authorization%20in%20WebGeniusLab%20BigHearts&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32438-missing-authorization-in-vowelweb-v-d91f803d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32438%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20School%20Education&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32437-missing-authorization-in-vowelweb-v-ff2fb1ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32437%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Portfolio&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32436-missing-authorization-in-vowelweb-v-330cef25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32436%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Photography&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32435-missing-authorization-in-vowelweb-v-16582c1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32435%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Pet%20Shop&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32434-missing-authorization-in-vowelweb-v-a3a8714f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32434%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Fitness&amp;severity=medium&amp;id=69b3fc7f2f860ef943d17e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32433-improper-neutralization-of-special--6e960526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32433%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20CP%20Contact%20Form%20with%20Paypal&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32432-missing-authorization-in-codepeople-bf935de5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32432%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32431-improper-neutralization-of-input-du-fd10a23c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Bulk%20Edit&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32430-improper-neutralization-of-input-du-ca001993</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32430%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IdeaBox%20Creations%20PowerPack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32429-improper-neutralization-of-input-du-360d0c55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Addons%20For%20Elementor&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32428-missing-authorization-in-ays-pro-po-c5de410e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32428%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Popup%20Like%20box&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32427-missing-authorization-in-vowelweb-v-9d4a6be6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32427%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Education%20Lite&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32426-improper-control-of-filename-for-in-05e0db0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32426%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themelexus%20Medilazar%20Core&amp;severity=high&amp;id=69b3fc7d2f860ef943d17e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32425-missing-authorization-in-linknacion-39cfb0ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32425%3A%20Missing%20Authorization%20in%20linknacional%20Payment%20Gateway%20Pix%20For%20GiveWP&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32424-improper-neutralization-of-input-du-cd3cbd9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=medium&amp;id=69b3fc7d2f860ef943d17dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32423-missing-authorization-in-bowo-admin-6ca8630e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32423%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32422-improper-neutralization-of-special--ceec3e00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32422%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32421-missing-authorization-in-agile-logi-ac7a0873</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32421%3A%20Missing%20Authorization%20in%20Agile%20Logix%20Post%20Timeline&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32420-cross-site-request-forgery-csrf-in--f8e9d754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32419-improper-neutralization-of-input-du-d6192675</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32419%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fernando%20Briano%20List%20category%20posts&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32418-improper-neutralization-of-special--406aedf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jordy%20Meow%20Meow%20Gallery&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32417-missing-authorization-in-wppochipp--0e63fb08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32417%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32416-missing-authorization-in-bplugins-p-b8ccda05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32416%3A%20Missing%20Authorization%20in%20bPlugins%20PDF%20Poster&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32415-path-traversal-in-bogdan-bendziukov-7cff31d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32415%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=medium&amp;id=69b3fc7b2f860ef943d17d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32414-improper-control-of-generation-of-c-c501db48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32414%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=high&amp;id=69b3fc7b2f860ef943d17d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32413-missing-authorization-in-maciej-bis-326cf9ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32413%3A%20Missing%20Authorization%20in%20Maciej%20Bis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=69b3fc792f860ef943d17d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32412-server-side-request-forgery-ssrf-in-be99818f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32412%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gift%20Up!%20Gift%20Up%20Gift%20Cards%20for%20WordPress%20and%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32411-improper-neutralization-of-input-du-20534a8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32411%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simpma%20Embed%20Calendly&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32410-missing-authorization-in-wbw-plugin-7a2cec48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32410%3A%20Missing%20Authorization%20in%20WBW%20Plugins%20WBW%20Currency%20Switcher%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32409-missing-authorization-in-wpmu-dev-y-fb9f790f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32409%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Forminator&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32408-missing-authorization-in-themefusec-54b63062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32408%3A%20Missing%20Authorization%20in%20themefusecom%20Brizy&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32407-missing-authorization-in-wpclever-w-5b109433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32407%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32406-missing-authorization-in-wpclever-w-4a6bc9a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32406%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Product%20Bundles%20for%20WooCommerce&amp;severity=medium&amp;id=69b3fc792f860ef943d17cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32405-exposure-of-sensitive-system-inform-c9b093e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32405%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=69b3fc792f860ef943d17ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32404-missing-authorization-in-studio99-s-0ba83ffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32404%3A%20Missing%20Authorization%20in%20Studio99%20Studio99%20WP%20Monitor&amp;severity=medium&amp;id=69b3fc792f860ef943d17ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32403-improper-neutralization-of-input-du-fbc598bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32403%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toocheke%20Toocheke%20Companion&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32402-missing-authorization-in-ays-pro-im-e86a5a00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32402%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Image%20Slider%20by%20Ays&amp;severity=medium&amp;id=69b3fc762f860ef943d17bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32401-improper-control-of-filename-for-in-714f1e8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=high&amp;id=69b3fc762f860ef943d17bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32400-improper-control-of-filename-for-in-672cf594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemetechMount%20Boldman&amp;severity=high&amp;id=69b3fc762f860ef943d17bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32399-improper-neutralization-of-special--f3f5d513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32399%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=high&amp;id=69b3fc762f860ef943d17bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32398-concurrent-execution-using-shared-r-1c37c90c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32398%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Subrata%20Mal%20TeraWallet%20%E2%80%93%20For%20WooCommerce&amp;severity=medium&amp;id=69b3fc762f860ef943d17bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32397-missing-authorization-in-ymc-filter-9676781d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32397%3A%20Missing%20Authorization%20in%20YMC%20Filter%20%26%20Grids&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32396-missing-authorization-in-radiusthem-60534463</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32396%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32395-missing-authorization-in-xpro-xpro--39384c2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32395%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Addons%20For%20Beaver%20Builder%20%26%238211%3B%20Lite&amp;severity=medium&amp;id=69b3fc762f860ef943d17bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32394-missing-authorization-in-publishpre-dfc7113c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32394%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Capabilities&amp;severity=medium&amp;id=69b3fc762f860ef943d17bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32393-improper-control-of-filename-for-in-45e6ac39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32393%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly%20Theme%20Addons&amp;severity=high&amp;id=69b3fc742f860ef943d17af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32392-improper-control-of-filename-for-in-9f269b2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Greenly&amp;severity=high&amp;id=69b3fc742f860ef943d17af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32391-missing-authorization-in-linethemes-325eafba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32391%3A%20Missing%20Authorization%20in%20linethemes%20SmartFix&amp;severity=medium&amp;id=69b3fc742f860ef943d17af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32390-missing-authorization-in-linethemes-05abb297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32390%3A%20Missing%20Authorization%20in%20linethemes%20Nanosoft&amp;severity=medium&amp;id=69b3fc742f860ef943d17aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32388-missing-authorization-in-linethemes-09a893de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32388%3A%20Missing%20Authorization%20in%20linethemes%20GLB&amp;severity=medium&amp;id=69b3fc742f860ef943d17aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32387-missing-authorization-in-noor-alam--347bfb66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32387%3A%20Missing%20Authorization%20in%20Noor%20Alam%20Checkout%20for%20PayPal&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32386-missing-authorization-in-envothemes-724fa76f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32386%3A%20Missing%20Authorization%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32385-missing-authorization-in-metagauss--5a9cbabb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32385%3A%20Missing%20Authorization%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=69b3fc742f860ef943d17ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32384-improper-control-of-filename-for-in-18a09511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32384%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20WpBookingly&amp;severity=high&amp;id=69b3fc742f860ef943d17ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32383-missing-authorization-in-raratheme--7af966ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32383%3A%20Missing%20Authorization%20in%20raratheme%20Ridhi&amp;severity=medium&amp;id=69b3fc742f860ef943d17add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32382-missing-authorization-in-raratheme--593105cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32382%3A%20Missing%20Authorization%20in%20raratheme%20Digital%20Download&amp;severity=medium&amp;id=69b3fc712f860ef943d17a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32381-missing-authorization-in-raratheme--287ddad3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32381%3A%20Missing%20Authorization%20in%20raratheme%20App%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32380-missing-authorization-in-raratheme--18a1b659</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32380%3A%20Missing%20Authorization%20in%20raratheme%20Numinous&amp;severity=medium&amp;id=69b3fc712f860ef943d17a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32379-missing-authorization-in-raratheme--2fab580c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32379%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Academic&amp;severity=medium&amp;id=69b3fc712f860ef943d17a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32378-missing-authorization-in-raratheme--03ba613b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32378%3A%20Missing%20Authorization%20in%20raratheme%20Book%20Landing%20Page&amp;severity=medium&amp;id=69b3fc712f860ef943d17a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32377-missing-authorization-in-raratheme--14318444</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32377%3A%20Missing%20Authorization%20in%20raratheme%20Pranayama%20Yoga&amp;severity=medium&amp;id=69b3fc712f860ef943d17a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32376-missing-authorization-in-raratheme--817ef71a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32376%3A%20Missing%20Authorization%20in%20raratheme%20Kalon&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32375-missing-authorization-in-raratheme--153d1a60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32375%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Diaries&amp;severity=medium&amp;id=69b3fc712f860ef943d17a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32374-missing-authorization-in-raratheme--311e6467</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32374%3A%20Missing%20Authorization%20in%20raratheme%20The%20Minimal&amp;severity=medium&amp;id=69b3fc712f860ef943d17a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32373-missing-authorization-in-cozy-visio-850a1769</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32373%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69b3fc712f860ef943d17a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32372-exposure-of-sensitive-system-inform-cda0de09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32372%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RadiusTheme%20ShopBuilder%20%E2%80%93%20Elementor%20WooCommerce%20Builder%20Addons&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32371-missing-authorization-in-raratheme--52c9dac8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32371%3A%20Missing%20Authorization%20in%20raratheme%20Elegant%20Pink&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32370-missing-authorization-in-raratheme--6b90ae32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32370%3A%20Missing%20Authorization%20in%20raratheme%20Influencer&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32369-improper-control-of-filename-for-in-0988553a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Medilink-Core&amp;severity=high&amp;id=69b3fc6f2f860ef943d179cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32368-improper-neutralization-of-special--5cc971cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32368%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20delphiknight%20Geo%20to%20Lat&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32367-improper-control-of-generation-of-c-4c66769d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32367%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Yannick%20Lefebvre%20Modal%20Dialog&amp;severity=critical&amp;id=69b3fc6f2f860ef943d179c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32366-improper-neutralization-of-special--0d1f7e9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Categories&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32365-improper-neutralization-of-special--243cc45a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Archives&amp;severity=high&amp;id=69b3fc6f2f860ef943d179c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32364-improper-control-of-filename-for-in-be7da41c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20redqteam%20Turbo%20Manager&amp;severity=high&amp;id=69b3fc6f2f860ef943d179bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32363-missing-authorization-in-funlus-oy--5c71d6b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32363%3A%20Missing%20Authorization%20in%20Funlus%20Oy%20WPLifeCycle&amp;severity=medium&amp;id=69b3fc6f2f860ef943d179ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32362-missing-authorization-in-activity-l-d17a4d68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32362%3A%20Missing%20Authorization%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32361-improper-neutralization-of-input-du-dc91a949</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32360-improper-neutralization-of-input-du-0129744c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richplugins%20Rich%20Showcase%20for%20Google%20Reviews&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32359-improper-neutralization-of-input-du-055fab5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Icon%20List%20Block&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32358-improper-neutralization-of-special--b6dd4fca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32358%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69b3fc6e2f860ef943d1797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32357-server-side-request-forgery-ssrf-in-f4e13b72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32357%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Katsushi%20Kawamori%20Simple%20Blog%20Card&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32356-improper-neutralization-of-input-du-d61982ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32355-deserialization-of-untrusted-data-i-9218efa4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32355%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69b3fc6e2f860ef943d17974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32354-insertion-of-sensitive-information--9e564a09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32354%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69b3fc6e2f860ef943d17971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32353-server-side-request-forgery-ssrf-in-fe177f7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32353%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MailerPress%20Team%20MailerPress&amp;severity=medium&amp;id=69b3fc6e2f860ef943d1796e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32352-improper-neutralization-of-input-du-df53e92f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32351-improper-neutralization-of-input-du-5bf039b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32350-missing-authorization-in-wpradiant--fae14b80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32350%3A%20Missing%20Authorization%20in%20wpradiant%20Chocolate%20House&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32349-server-side-request-forgery-ssrf-in-d09f4573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32349%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Andy%20Fragen%20Embed%20PDF%20Viewer&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32348-missing-authorization-in-madrasthem-79cb9bfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32348%3A%20Missing%20Authorization%20in%20MadrasThemes%20MAS%20Videos&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1793b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32347-missing-authorization-in-raratheme--ddfc26ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32347%3A%20Missing%20Authorization%20in%20raratheme%20Restaurant%20and%20Cafe&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32346-missing-authorization-in-raratheme--be3c9748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32346%3A%20Missing%20Authorization%20in%20raratheme%20Travel%20Agency&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32345-missing-authorization-in-raratheme--e7f0c170</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32345%3A%20Missing%20Authorization%20in%20raratheme%20Perfect%20Portfolio&amp;severity=medium&amp;id=69b3fc6c2f860ef943d17932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32344-cross-site-request-forgery-csrf-in--f00dd3fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20desertthemes%20Corpiva&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32343-cross-site-request-forgery-csrf-in--ad2a2626</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=69b3fc6c2f860ef943d1792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32342-cross-site-request-forgery-csrf-in--4b314ef2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32341-missing-authorization-in-raratheme--98f6a5d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32341%3A%20Missing%20Authorization%20in%20raratheme%20Benevolent&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32340-missing-authorization-in-raratheme--fcdc0dc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32340%3A%20Missing%20Authorization%20in%20raratheme%20Business%20One%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32339-missing-authorization-in-raratheme--0b1eb6aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32339%3A%20Missing%20Authorization%20in%20raratheme%20Bakes%20And%20Cakes&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32338-missing-authorization-in-raratheme--78ae7b59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32338%3A%20Missing%20Authorization%20in%20raratheme%20Construction%20Landing%20Page&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32337-missing-authorization-in-raratheme--ac285de1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32337%3A%20Missing%20Authorization%20in%20raratheme%20Preschool%20and%20Kindergarten&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32336-missing-authorization-in-raratheme--c98d665b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32336%3A%20Missing%20Authorization%20in%20raratheme%20Rara%20Business&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32335-missing-authorization-in-raratheme--287fa8de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32335%3A%20Missing%20Authorization%20in%20raratheme%20The%20Conference&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32334-missing-authorization-in-raratheme--70528cc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32334%3A%20Missing%20Authorization%20in%20raratheme%20JobScout&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32332-missing-authorization-in-ays-pro-ea-decd35d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32332%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=medium&amp;id=69b3fc6a2f860ef943d178b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32331-missing-authorization-in-israpil-te-d9b6551a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32331%3A%20Missing%20Authorization%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69b3fc682f860ef943d17888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32330-cross-site-request-forgery-csrf-in--46f95374</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32330%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=69b3fc682f860ef943d17885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32329-missing-authorization-in-ays-pro-ad-8db73316</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32329%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Advanced%20Related%20Posts&amp;severity=medium&amp;id=69b3fc682f860ef943d17882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32328-cross-site-request-forgery-csrf-in--8416fb00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shufflehound%20Lemmony&amp;severity=medium&amp;id=69b3fc682f860ef943d1787f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31922-improper-neutralization-of-special--603cf965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31922%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Fox%20LMS&amp;severity=high&amp;id=69b3fc682f860ef943d1787c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31919-missing-authorization-in-josh-kohlb-f077f2be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31919%3A%20Missing%20Authorization%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=medium&amp;id=69b3fc682f860ef943d17879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31918-improper-neutralization-of-input-du-978416ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20immonex%20immonex%20Kickstart&amp;severity=medium&amp;id=69b3fc682f860ef943d17876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31917-improper-neutralization-of-special--06e00a70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20weDevs%20WP%20ERP&amp;severity=high&amp;id=69b3fc682f860ef943d17873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31916-missing-authorization-in-iulia-caza-a7c0b15c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31916%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69b3fc682f860ef943d17870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31915-missing-authorization-in-ux-themes--986caac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31915%3A%20Missing%20Authorization%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69b3fc682f860ef943d1786d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exfiltration-and-threat-actor-infrastructure--59260c61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exfiltration%20and%20Threat%20Actor%20Infrastructure%20Exposed&amp;severity=medium&amp;id=69b7d5d29d4df4518349438b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-17-million-in-bug-bounty-rewards-i-2fdb9a10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%2417%20Million%20in%20Bug%20Bounty%20Rewards%20in%202025&amp;severity=medium&amp;id=69b3f1742f860ef943caf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hacker-attack-on-stryker-disrupted-man-a7e24b42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hacker%20Attack%20on%20Stryker%20Disrupted%20Manufacturing%20and%20Shipping&amp;severity=medium&amp;id=69b3ea6c2f860ef943c741ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2859-cwe-204-observable-response-discrepa-8005d70e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2859%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24097-cwe-204-observable-response-discrep-09daffb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24097%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69b3e0242f860ef943bfc08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4063-cwe-862-missing-authorization-in-wpz-a1746f82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4063%3A%20CWE-862%20Missing%20Authorization%20in%20wpzoom%20Social%20Icons%20Widget%20%26%20Block%20%E2%80%93%20Social%20Media%20Icons%20%26%20Share%20Buttons&amp;severity=medium&amp;id=69b3dc922f860ef943bc93c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23941-cwe-444-inconsistent-interpretation-11894fdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23941%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Erlang%20OTP&amp;severity=high&amp;id=69b3d90e2f860ef943bac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23943-cwe-409-improper-handling-of-highly-e97946a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23943%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23942-cwe-22-improper-limitation-of-a-pat-08d85e22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23942%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=69b3d90e2f860ef943bac728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4105-improper-access-control-in-red-hat-r-78746624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4105%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b41bd82f860ef943e9123e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3999-cwe-639-authorization-bypass-through-ed4f0cd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3999%3A%20CWE-639%20Authorization%20bypass%20through%20User-Controlled%20key%20in%20Pointsharp%20ID%20Server&amp;severity=high&amp;id=69b3ceae2f860ef943b31146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authorities-disrupt-socksescort-proxy-service-powe-66d041d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authorities%20Disrupt%20SocksEscort%20Proxy%20Service%20Powered%20by%20AVrecon%20Botnet&amp;severity=medium&amp;id=69b3cacb2f860ef943b0650c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3986-cwe-79-improper-neutralization-of-in-06be8be9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=69b3ceae2f860ef943b3113f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2888-cwe-639-authorization-bypass-through-be10e6a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2888%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69b3ceae2f860ef943b31138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2879-cwe-639-authorization-bypass-through-33cd0f40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2879%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b31132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2257-cwe-639-authorization-bypass-through-450feceb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2257%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=69b3ceae2f860ef943b3112c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3873-cwe-798-use-of-hard-coded-credential-c885523b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3873%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20syslink%20software%20AG%20Avantra&amp;severity=high&amp;id=69b3cb0f2f860ef943b07f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-146-update-patches-two-exploited-zero-days-c3299c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20146%20Update%20Patches%20Two%20Exploited%20Zero-Days&amp;severity=medium&amp;id=69b3c3c22f860ef943ab4d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2890-cwe-862-missing-authorization-in-str-3cbd25f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2890%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=69b3c0802f860ef943a8ad97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1704-cwe-639-authorization-bypass-through-bf6c8b22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1704%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=69b3c0802f860ef943a8ad8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3045-cwe-862-missing-authorization-in-cro-a77c0fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3045%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b3c0802f860ef943a8ad9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3891-cwe-434-unrestricted-upload-of-file--f5fb3cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3891%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20linknacional%20Pix%20for%20WooCommerce&amp;severity=critical&amp;id=69b3c0802f860ef943a8ada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-react-based-phishing-page-with-credential-exfilt-61aaf490</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20React-based%20phishing%20page%20with%20credential%20exfiltration%20via%20EmailJS%2C%20(Fri%2C%20Mar%2013th)&amp;severity=low&amp;id=69b3bcba2f860ef943a6b841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15515-cwe-306-missing-authentication-for--11564705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15515%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20vivo%20Easyshare&amp;severity=medium&amp;id=69b3b5e82f860ef943a0e01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57849-incorrect-default-permissions-in-re-f1df4890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57849%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Fuse%207&amp;severity=medium&amp;id=69b41f832f860ef943ec0b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8766-incorrect-default-permissions-in-red-f543bdcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8766%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Openshift%20Data%20Foundation%204&amp;severity=medium&amp;id=69b37da62f860ef94357f3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22216-improper-control-of-interaction-fre-b8164faf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22216%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22215-cross-site-request-forgery-csrf-in--343e3edd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22215%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22210-improper-neutralization-of-input-du-1e5ecaf0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=low&amp;id=69b36fc22f860ef9434ef2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22209-improper-neutralization-of-input-du-b3cac329</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc22f860ef9434ef2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22204-improper-input-validation-in-gvecto-cc7b6f3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22204%3A%20Improper%20Input%20Validation%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22203-exposure-of-sensitive-information-t-7dc2dafb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22203%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22202-cross-site-request-forgery-csrf-in--0ad91517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22202%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22201-use-of-less-trusted-source-in-gvect-1dd97214</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22201%3A%20Use%20of%20Less%20Trusted%20Source%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22199-authentication-bypass-by-spoofing-i-6e3b7ac2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22199%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22193-improper-neutralization-of-special--3f166beb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=critical&amp;id=69b36fc02f860ef9434ef29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22192-improper-neutralization-of-input-du-14954f30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22192%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22191-improper-control-of-generation-of-c-4cebc079</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22191%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22183-improper-neutralization-of-input-du-c2f286a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpDiscuz&amp;severity=medium&amp;id=69b36fc02f860ef9434ef28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22182-missing-authorization-in-gvectors-w-7c03bc66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22182%3A%20Missing%20Authorization%20in%20gVectors%20wpDiscuz&amp;severity=high&amp;id=69b36fc02f860ef9434ef286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-13-7098392e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-13&amp;severity=medium&amp;id=69b4a8402f860ef943cf25a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-13-00a4f50f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-13&amp;severity=medium&amp;id=69b4424d2f860ef94305fd27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-botnet-ioc-mainly-asus-router-eedbb221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20botnet%20IOC%20(mainly%20Asus%20router)&amp;severity=low&amp;id=69b4424d2f860ef94305fced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-13-28ac8131</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-13&amp;severity=low&amp;id=69b3b22a2f860ef9439d7e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32612-cwe-79-improper-neutralization-of-i-f3855dcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=medium&amp;id=69b3375b2f860ef943024599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32597-cwe-345-insufficient-verification-o-0a93b017</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32597%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20jpadilla%20pyjwt&amp;severity=high&amp;id=69b3375b2f860ef943024596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32322-cwe-697-incorrect-comparison-in-ste-733aea35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32322%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=69b3375b2f860ef943024593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32320-cwe-125-out-of-bounds-read-in-ellan-b44add55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32320%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=medium&amp;id=69b3375b2f860ef94302458b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32319-cwe-125-out-of-bounds-read-in-ellan-85cb4aa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32319%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20ellanetworks%20core&amp;severity=high&amp;id=69b3375b2f860ef943024587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3910-inappropriate-implementation-in-goog-ead606c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3909-out-of-bounds-write-in-google-chrome-b07a2ef8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3909%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=69b333cf2f860ef943fdd751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32304-cwe-94-improper-control-of-generati-7207fd62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32304%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32301-cwe-918-server-side-request-forgery-6022b45c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32301%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20centrifugal%20centrifugo&amp;severity=critical&amp;id=69b333cf2f860ef943fdd74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25076-sql-injection-in-anchore-anchore-en-d94b4892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25076%3A%20SQL%20Injection%20in%20Anchore%20Anchore%20Enterprise&amp;severity=high&amp;id=69b3304b2f860ef943fa4693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3611-cwe-306-missing-authentication-for-c-2be1059b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3611%3A%20CWE-306%20Missing%20authentication%20for%20critical%20function%20in%20Honeywell%20IQ4E&amp;severity=critical&amp;id=69b3223b2f860ef943f219ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32274-cwe-22-improper-limitation-of-a-pat-ca949827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32274%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20psf%20black&amp;severity=high&amp;id=69b31b3a2f860ef943e8fcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32269-cwe-683-function-call-with-incorrec-d0471610</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32269%3A%20CWE-683%3A%20Function%20Call%20With%20Incorrect%20Order%20of%20Arguments%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b31b3a2f860ef943e8fcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32260-cwe-78-improper-neutralization-of-s-9c1d5a82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32260%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=69b31b3a2f860ef943e8fca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32251-cwe-611-improper-restriction-of-xml-6ee364da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32251%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20tolgee%20tolgee-platform&amp;severity=critical&amp;id=69b317b02f860ef943e64732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32248-cwe-943-improper-neutralization-of--cc26229b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32248%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b317b02f860ef943e6472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32247-cwe-943-improper-neutralization-of--936b3588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32247%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20getzep%20graphiti&amp;severity=high&amp;id=69b3294c2f860ef943f62e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2376-url-redirection-to-untrusted-site-op-8ae8f8b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2376%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=69b3223b2f860ef943f219b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32246-cwe-287-improper-authentication-in--788ee6c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32246%3A%20CWE-287%3A%20Improper%20Authentication%20in%20steveiliop56%20tinyauth&amp;severity=high&amp;id=69b3294c2f860ef943f62df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32245-cwe-863-incorrect-authorization-in--778356e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32245%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20steveiliop56%20tinyauth&amp;severity=medium&amp;id=69b3294c2f860ef943f62df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32242-cwe-362-concurrent-execution-using--7a67bf5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32242%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b30d502f860ef943de4428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32237-cwe-200-exposure-of-sensitive-infor-f529e41f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32237%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20%40backstage%20plugin-scaffolder-backend&amp;severity=medium&amp;id=69b30d502f860ef943de4424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32235-cwe-601-url-redirection-to-untruste-8786b7b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32235%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20%40backstage%20plugin-auth-backend&amp;severity=medium&amp;id=69b30d502f860ef943de441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32138-cwe-284-improper-access-control-in--1d029b4f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32138%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Stalin-143%20website&amp;severity=high&amp;id=69b30d502f860ef943de441a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3497-cwe-908-use-of-uninitialized-resourc-cddab41e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3497%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Ubuntu%20openssh&amp;severity=low&amp;id=69b30a4d2f860ef943dbc47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32232-cwe-22-improper-limitation-of-a-pat-5c2df155</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32232%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32231-cwe-306-missing-authentication-for--ae638150</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32231%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20qhkm%20zeptoclaw&amp;severity=high&amp;id=69b30a4d2f860ef943dbc474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32142-cwe-200-exposure-of-sensitive-infor-6fbc29e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32142%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shopware%20commercial&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13913-cwe-502-in-inductive-automation-ign-01f96f6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13913%3A%20CWE-502%20in%20Inductive%20Automation%20Ignition%20Software&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32230-cwe-862-missing-authorization-in-lo-356bd849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32230%3A%20CWE-862%3A%20Missing%20Authorization%20in%20louislam%20uptime-kuma&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32100-cwe-200-exposure-of-sensitive-infor-978514b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32100%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20swag%20platform-security&amp;severity=medium&amp;id=69b302c82f860ef943d65df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32141-cwe-674-uncontrolled-recursion-in-w-e8a42dbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32141%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20WebReflection%20flatted&amp;severity=high&amp;id=69b302c82f860ef943d65df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13462-vulnerability-in-python-software-fo-9c4c971e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13462%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=69b302c82f860ef943d65de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32129-cwe-328-use-of-weak-hash-in-stellar-9ed57848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32129%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20stellar%20rs-soroban-poseidon&amp;severity=high&amp;id=69b2ff142f860ef943d3c349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28256-cwe-547-use-of-hard-coded-security--5f1a8c05</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28256%3A%20CWE-547%20Use%20of%20hard-coded%2C%20security-relevant%20constants%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2ff142f860ef943d3c346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28255-cwe-798-use-of-hard-coded-credentia-0910cf57</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28255%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2ff142f860ef943d3c343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28254-cwe-862-missing-authorization-in-tr-73884a61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28254%3A%20CWE-862%20Missing%20Authorization%20in%20Trane%20Tracer%20SC&amp;severity=medium&amp;id=69b2fb902f860ef943d10b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28253-cwe-789-memory-allocation-with-exce-81851637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28253%3A%20CWE-789%20Memory%20allocation%20with%20excessive%20size%20value%20in%20Trane%20Tracer%20SC&amp;severity=high&amp;id=69b2fb902f860ef943d10b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3841-cwe-78-improper-neutralization-of-sp-c6a0b1e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3841%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-MR6400%20v5.3&amp;severity=high&amp;id=69b2fb902f860ef943d10b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28252-cwe-327-use-of-a-broken-or-risky-cr-93113256</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28252%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Trane%20Tracer%20SC&amp;severity=critical&amp;id=69b2fb902f860ef943d10b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/handala-hack-unveiling-groups-modus-operandi-5e58407e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CHandala%20Hack%E2%80%9D%20%E2%80%93%20Unveiling%20Group%E2%80%99s%20Modus%20Operandi&amp;severity=medium&amp;id=69b2f83f2f860ef943cde4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31860-cwe-79-improper-neutralization-of-i-7fa3718b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31860%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unjs%20unhead&amp;severity=medium&amp;id=69b2fb902f860ef943d10b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21887-cwe-918-server-side-request-forgery-bfed939e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21887%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=69b2ff142f860ef943d3c351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29066-cwe-552-files-or-directories-access-7742946f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29066%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20%40tinacms%20cli&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28793-cwe-22-improper-limitation-of-a-pat-139c4d03</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28793%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=high&amp;id=69b30a4f2f860ef943dbd353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28792-cwe-22-improper-limitation-of-a-pat-b7476262</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28792%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20cli&amp;severity=critical&amp;id=69b30a4d2f860ef943dbc486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28356-cwe-1333-inefficient-regular-expres-ea759df3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28356%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20defnull%20multipart&amp;severity=high&amp;id=69b30a4d2f860ef943dbc483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27940-cwe-122-heap-based-buffer-overflow--417912cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27940%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=69b30a4f2f860ef943dbd359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25529-cwe-79-improper-neutralization-of-i-c5291a63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20postalserver%20postal&amp;severity=high&amp;id=69b302c82f860ef943d65e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24125-cwe-22-improper-limitation-of-a-pat-167a257b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24125%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40tinacms%20graphql&amp;severity=medium&amp;id=69b302c82f860ef943d65dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21708-vulnerability-in-veeam-backup-and-r-a01c130d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21708%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=69b2fb902f860ef943d10b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21672-vulnerability-in-veeam-backup-and-r-a938f0b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21672%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=high&amp;id=69b2fb902f860ef943d10b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4045-observable-response-discrepancy-in-p-923f1212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4045%3A%20Observable%20Response%20Discrepancy%20in%20projectsend&amp;severity=medium&amp;id=69b2e9fd2f860ef943be3537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-and-amatera-disguised-as-ai-agents-kaspersky--0fed8e97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20and%20Amatera%20disguised%20as%20AI%20agents%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b329192f860ef943f5f8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4044-path-traversal-in-projectsend-d26863f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4044%3A%20Path%20Traversal%20in%20projectsend&amp;severity=medium&amp;id=69b2df702f860ef943b15ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4043-stack-based-buffer-overflow-in-tenda-40bf116e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4043%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df702f860ef943b15cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21668-vulnerability-in-veeam-backup-and-r-5ceecedd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21668%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21669-vulnerability-in-veeam-backup-and-r-0923d707</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21669%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21671-vulnerability-in-veeam-software-app-8e791f48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21671%3A%20Vulnerability%20in%20Veeam%20Software%20Appliance&amp;severity=critical&amp;id=69b2df702f860ef943b15ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21670-vulnerability-in-veeam-backup-and-r-75713f74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21670%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=69b2df702f860ef943b15ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21666-vulnerability-in-veeam-backup-and-r-d782aaf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21666%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21667-vulnerability-in-veeam-backup-and-r-7dd414e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21667%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=69b2df702f860ef943b15cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4042-stack-based-buffer-overflow-in-tenda-a49a83d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4042%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4041-stack-based-buffer-overflow-in-tenda-433ad76d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4041%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i12&amp;severity=high&amp;id=69b2df722f860ef943b15d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28384-cwe-78-improper-neutralization-of-s-d5f2b981</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28384%3A%20CWE-78%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20command%20injection&apos;)%20in%20Canonical%20lxd&amp;severity=critical&amp;id=69b30a4f2f860ef943dbd36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-updates-legacy-ios-versions-to-patch-coruna--74b61107</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Updates%20Legacy%20iOS%20Versions%20to%20Patch%20Coruna%20Exploits&amp;severity=medium&amp;id=69b2d12d2f860ef943a1d41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3099-reusing-a-nonce-key-pair-in-encrypti-33353641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3099%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2ca582f860ef943997cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-launches-new-protection-tools-as-it-helps-dis-4884c999</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Launches%20New%20Protection%20Tools%20as%20It%20Helps%20Disrupt%20Scam%20Centers&amp;severity=medium&amp;id=69b2bf982f860ef9438df518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0809-cwe-261-weak-encoding-for-password-i-5ddf5427</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0809%3A%20CWE-261%20Weak%20Encoding%20for%20Password%20in%20Streamsoft%20Streamsoft%20Presti%C5%BC&amp;severity=medium&amp;id=69b2ca582f860ef943997cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2514-cwe-79-improper-neutralization-of-in-5051e4f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2513-cwe-79-improper-neutralization-of-in-6c15055f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=69b2cde02f860ef9439e3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ally-wordpress-plugin-flaw-exposes-over-200000-web-d4e539a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ally%20WordPress%20Plugin%20Flaw%20Exposes%20Over%20200%2C000%20Websites%20to%20Attacks&amp;severity=low&amp;id=69b2b50f2f860ef94380e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-human-ioc-why-security-professionals-struggle--46b836af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Human%20IOC%3A%20Why%20Security%20Professionals%20Struggle%20with%20Social%20Vetting&amp;severity=medium&amp;id=69b2b50f2f860ef94380e7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2987-cwe-79-improper-neutralization-of-in-5a2918fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Ajax%20Chat%20%E2%80%93%20Add%20a%20Fast%2C%20Secure%20Chat%20Box&amp;severity=medium&amp;id=69b30a4f2f860ef943dbd377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/splunk-zoom-patch-severe-vulnerabilities-8e95386b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Splunk%2C%20Zoom%20Patch%20Severe%20Vulnerabilities&amp;severity=critical&amp;id=69b2ae042f860ef943779eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4040-information-exposure-through-discrep-0aaa5cb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4040%3A%20Information%20Exposure%20Through%20Discrepancy%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef94378366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4039-code-injection-in-openclaw-5c8684db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4039%3A%20Code%20Injection%20in%20OpenClaw&amp;severity=medium&amp;id=69b2ae4a2f860ef943783665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2366-authorization-bypass-through-user-co-8b18f55c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2366%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b2c3542f860ef94391643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3234-improper-neutralization-of-crlf-sequ-0b41120c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3234%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69b2c3542f860ef943916446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-high-severity-ios-xr-vulnerabilities-0b099562</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20High-Severity%20IOS%20XR%20Vulnerabilities&amp;severity=high&amp;id=69b295692f860ef943608336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerabilities-allowed-server-takeov-0dad78f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Vulnerabilities%20Allowed%20Server%20Takeover&amp;severity=critical&amp;id=69b28e602f860ef9435aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polyfill-supply-chain-attack-impacting-100k-sites--0b7e80a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polyfill%20Supply%20Chain%20Attack%20Impacting%20100k%20Sites%20Linked%20to%20North%20Korea&amp;severity=medium&amp;id=69b28adc2f860ef9435891b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4016-out-of-bounds-write-in-gpac-eec5a290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4016%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f496c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4015-stack-based-buffer-overflow-in-gpac-e8ec27fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4015%3A%20Stack-based%20Buffer%20Overflow%20in%20GPAC&amp;severity=medium&amp;id=69b27d022f860ef9434f4962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4014-sql-injection-in-itsourcecode-cafe-r-fce405d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4014%3A%20SQL%20Injection%20in%20itsourcecode%20Cafe%20Reservation%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4013-improper-authorization-in-sourcecode-f6c9bfe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4013%3A%20Improper%20Authorization%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69b275fa2f860ef94349bd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4012-out-of-bounds-read-in-rxi-fe-16bd524c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4012%3A%20Out-of-Bounds%20Read%20in%20rxi%20fe&amp;severity=medium&amp;id=69b26ef22f860ef94343bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4010-memory-corruption-in-thakeenathees-p-393ae7ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4010%3A%20Memory%20Corruption%20in%20ThakeeNathees%20pocketlang&amp;severity=medium&amp;id=69b26ef22f860ef94343bee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4009-out-of-bounds-read-in-jarikomppa-sol-d4f76128</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4009%3A%20Out-of-Bounds%20Read%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69b26b6b2f860ef943412a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4008-stack-based-buffer-overflow-in-tenda-40f87be9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c6315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4007-stack-based-buffer-overflow-in-tenda-fcb0a190</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b264662f860ef9433c630e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3994-heap-based-buffer-overflow-in-rui314-8b4917fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3994%3A%20Heap-based%20Buffer%20Overflow%20in%20rui314%20mold&amp;severity=medium&amp;id=69b2cde02f860ef9439e364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3993-cross-site-scripting-in-itsourcecode-24b9c531</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3993%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2687-cwe-79-cross-site-scripting-xss-in-r-e7e711dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Reading%20progressbar&amp;severity=medium&amp;id=69b2c3542f860ef943916443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15473-cwe-862-missing-authorization-in-ti-8824c4ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15473%3A%20CWE-862%20Missing%20Authorization%20in%20Timetics&amp;severity=medium&amp;id=69b2ca582f860ef943997cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3992-injection-in-codegenieapp-serverless-4bc669e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3992%3A%20Injection%20in%20CodeGenieApp%20serverless-express&amp;severity=medium&amp;id=69b256532f860ef94332313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3990-cross-site-scripting-in-cesiumgs-ces-3cc6e9c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3990%3A%20Cross%20Site%20Scripting%20in%20CesiumGS%20CesiumJS&amp;severity=medium&amp;id=69b256532f860ef943323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3984-cross-site-scripting-in-campcodes-di-3bd8c22a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3984%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3983-cross-site-scripting-in-campcodes-di-d143b87a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3983%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Division%20Regional%20Athletic%20Meet%20Game%20Result%20Matrix%20System&amp;severity=medium&amp;id=69b252cf2f860ef9432f8fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3982-cross-site-scripting-in-itsourcecode-6ecf9062</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3982%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3981-sql-injection-in-itsourcecode-online-3fe06655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3981%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b24bc72f860ef94329d59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3980-sql-injection-in-itsourcecode-online-6b588852</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3980%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69b241412f860ef94318ef80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3979-use-after-free-in-quickjs-ng-quickjs-4da86ea7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3979%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69b236b22f860ef943fc88b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3978-stack-based-buffer-overflow-in-d-lin-18e3807e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3978%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=69b236b22f860ef943fc88aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3977-missing-authorization-in-projectsend-aca59aed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3977%3A%20Missing%20Authorization%20in%20projectsend&amp;severity=medium&amp;id=69b236b22f860ef943fc88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3976-stack-based-buffer-overflow-in-tenda-d46c36c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3976%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3975-stack-based-buffer-overflow-in-tenda-d05d15a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3975%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3226-cwe-862-missing-authorization-in-thi-acd09a45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3226%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=69b22c262f860ef943edb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3657-cwe-89-improper-neutralization-of-sp-9aa62a75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3657%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premio%20My%20Sticky%20Bar%20%E2%80%93%20Floating%20Notification%20Bar%20%26%20Sticky%20Header%20(formerly%20myStickymenu)&amp;severity=high&amp;id=69b22c262f860ef943edb6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15038-cwe-125-out-of-bounds-read-in-asus--cbe1b081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15038%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1878-cwe-494-download-of-code-without-int-6c0c8aa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1878%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ASUS%20Driver(%20Keyboard%20%26%20Mouse%20)&amp;severity=medium&amp;id=69b22c262f860ef943edb6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3974-stack-based-buffer-overflow-in-tenda-3ff86e73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3974%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b22c262f860ef943edb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15037-cwe-732-incorrect-permission-assign-ede452fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15037%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20ASUS%20Business%20System%20Control%20Interface&amp;severity=medium&amp;id=69b22c262f860ef943edb6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59388-cwe-259-in-qnap-systems-inc-hyper-d-f9d41b22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59388%3A%20CWE-259%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=medium&amp;id=69b21e172f860ef943e393ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3973-stack-based-buffer-overflow-in-tenda-36404d80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3973%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3972-stack-based-buffer-overflow-in-tenda-c4bbbc78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3972%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W3&amp;severity=high&amp;id=69b21e172f860ef943e393b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iot-device-logs-in-as-admin-itx3fs-too-l-1ee7e685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IoT%20Device%20Logs%20in%20as%20Admin%2C%20It%26%23x3f%3Bs%20too%20Late%26%23x21%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b216d82f860ef943ce83a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3971-stack-based-buffer-overflow-in-tenda-6d3a9072</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3971%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3970-stack-based-buffer-overflow-in-tenda-efc7e7df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3970%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69b30a4f2f860ef943dbd35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3969-sql-injection-in-feminer-wms-e9e28958</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3969%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=69b2e9fd2f860ef943be353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3968-code-injection-in-autohomecorp-frost-dc906d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3968%3A%20Code%20Injection%20in%20AutohomeCorp%20frostmourne&amp;severity=medium&amp;id=69b2c3542f860ef943916465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3967-deserialization-in-alfresco-activiti-ec4438da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3967%3A%20Deserialization%20in%20Alfresco%20Activiti&amp;severity=medium&amp;id=69b205772f860ef9439c94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3966-server-side-request-forgery-in-64854-7a9f914b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3966%3A%20Server-Side%20Request%20Forgery%20in%20648540858%20wvp-GB28181-pro&amp;severity=medium&amp;id=69b205772f860ef9439c949e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-12-12a19288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-12&amp;severity=medium&amp;id=69b46b7a2f860ef94391c798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-12-d2659d35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-12&amp;severity=medium&amp;id=69b356c02f860ef9431a7669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25823-na-7fa89b66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25823%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25819-na-a8d102e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25819%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25818-na-3a1c622a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25818%3A%20n%2Fa&amp;severity=critical&amp;id=69b333cf2f860ef943fdd73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25817-na-cdf8c0ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25817%3A%20n%2Fa&amp;severity=high&amp;id=69b333cf2f860ef943fdd73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70245-na-3e3c2378</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70245%3A%20n%2Fa&amp;severity=high&amp;id=69b3294c2f860ef943f62dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61154-na-7755ec0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61154%3A%20n%2Fa&amp;severity=medium&amp;id=69b3294c2f860ef943f62dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26793-na-885a662b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26793%3A%20n%2Fa&amp;severity=critical&amp;id=69b30d502f860ef943de4417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70873-na-d464299c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70873%3A%20n%2Fa&amp;severity=high&amp;id=69b30d502f860ef943de4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66955-na-224e8433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66955%3A%20n%2Fa&amp;severity=medium&amp;id=69b30a4d2f860ef943dbc465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26795-na-e936710e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26795%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26794-na-db8d7433</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26794%3A%20n%2Fa&amp;severity=high&amp;id=69b302c82f860ef943d65ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26792-na-4b0f503b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26792%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26791-na-72598ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26791%3A%20n%2Fa&amp;severity=critical&amp;id=69b302c82f860ef943d65de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-12-2a7a0014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-12&amp;severity=low&amp;id=69b295652f860ef943607383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3965-protection-mechanism-failure-in-whyo-903268fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3965%3A%20Protection%20Mechanism%20Failure%20in%20whyour%20qinglong&amp;severity=medium&amp;id=69b2c3542f860ef94391645a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2808-cwe-59-improper-link-resolution-befo-54e69108</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2808%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(Link%20Following)%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=69b1faec2f860ef94395a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3964-os-command-injection-in-openakita-4eebd5f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3964%3A%20OS%20Command%20Injection%20in%20OpenAkita&amp;severity=medium&amp;id=69b1f7682f860ef94392e99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3963-use-of-hard-coded-cryptographic-key--825e5a85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3963%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20perfree%20go-fastdfs-web&amp;severity=medium&amp;id=69b1f7682f860ef94392e996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31988-off-by-one-error-in-thejoshwolfe-ya-91b12b49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31988%3A%20Off-by-one%20Error%20in%20thejoshwolfe%20yauzl&amp;severity=medium&amp;id=69b1f7682f860ef94392e990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3962-cross-site-scripting-in-jcharis-mach-bab8dcf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3962%3A%20Cross%20Site%20Scripting%20in%20Jcharis%20Machine-Learning-Web-Apps&amp;severity=medium&amp;id=69b1f0632f860ef9438d4fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3942-incorrect-security-ui-in-google-chro-809449ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3942%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3941-insufficient-policy-enforcement-in-g-31991683</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3941%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3940-insufficient-policy-enforcement-in-g-7e111baa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3940%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3939-insufficient-policy-enforcement-in-g-db3a4229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3939%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3938-insufficient-policy-enforcement-in-g-a4258331</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3938%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3937-incorrect-security-ui-in-google-chro-63199e35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3937%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3936-use-after-free-in-google-chrome-687e409a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3936%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3935-incorrect-security-ui-in-google-chro-752742df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3935%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3934-insufficient-policy-enforcement-in-g-2c861307</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3934%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3932-insufficient-policy-enforcement-in-g-0a35e8cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3932%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a522f860ef943dbd48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3931-heap-buffer-overflow-in-google-chrom-ef223c08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3931%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2df702f860ef943b15ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3930-unsafe-navigation-in-google-chrome-e5c1e63d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3930%3A%20Unsafe%20navigation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62328-cwe-1021-improper-restriction-of-re-45a03379</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62328%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCLSoftware%20Nomad%20server%20on%20Domino&amp;severity=low&amp;id=69b2ff142f860ef943d3c34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3929-side-channel-information-leakage-in--267deba1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3929%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=low&amp;id=69b30a4f2f860ef943dbd373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3928-insufficient-policy-enforcement-in-g-8ec6a14c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3928%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3927-incorrect-security-ui-in-google-chro-791f6273</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3927%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b30a512f860ef943dbd438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3926-out-of-bounds-read-in-google-chrome-e2d2ad3f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3926%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3925-incorrect-security-ui-in-google-chro-6b9c2f67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3925%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=69b2d4ee2f860ef943a58d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3924-use-after-free-in-google-chrome-aed7be91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3924%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3923-use-after-free-in-google-chrome-50402a92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3923%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef943916452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3922-use-after-free-in-google-chrome-b0d39043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3922%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3921-use-after-free-in-google-chrome-62791b9d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3921%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b2c3542f860ef94391644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3920-out-of-bounds-memory-access-in-googl-31d6b34c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3920%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3919-use-after-free-in-google-chrome-9af16b10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3919%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3918-use-after-free-in-google-chrome-9ef1326e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3918%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3917-use-after-free-in-google-chrome-71a58bd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3917%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3916-out-of-bounds-read-in-google-chrome-0673a67d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3916%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=critical&amp;id=69b30a512f860ef943dbd42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3915-heap-buffer-overflow-in-google-chrom-e216428c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3915%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a512f860ef943dbd428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3914-integer-overflow-in-google-chrome-950479b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3914%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3913-heap-buffer-overflow-in-google-chrom-8cf7ead7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3913%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69b30a4f2f860ef943dbd37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3961-server-side-request-forgery-in-zyddn-d3b2c62a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3961%3A%20Server-Side%20Request%20Forgery%20in%20zyddnys%20manga-image-translator&amp;severity=medium&amp;id=69b30a522f860ef943dbd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32133-cwe-918-server-side-request-forgery-6d76d5cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32133%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Bubka%202FAuth&amp;severity=high&amp;id=69b1e5dd2f860ef94384a33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32136-cwe-287-improper-authentication-in--91bc9287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32136%3A%20CWE-287%3A%20Improper%20Authentication%20in%20AdguardTeam%20AdGuardHome&amp;severity=critical&amp;id=69b1e5dd2f860ef94384a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3959-os-command-injection-in-0xkoda-wirem-1d3e6508</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3959%3A%20OS%20Command%20Injection%20in%200xKoda%20WireMCP&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3958-server-side-request-forgery-in-woaha-1c324814</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3958%3A%20Server-Side%20Request%20Forgery%20in%20Woahai321%20ListSync&amp;severity=medium&amp;id=69b1e5dd2f860ef94384a341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32128-cwe-184-incomplete-list-of-disallow-46446d35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32128%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20labring%20FastGPT&amp;severity=medium&amp;id=69b1e24f2f860ef943814c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32117-cwe-79-improper-neutralization-of-i-425bdca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32117%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ekacnet%20grafanacubism-panel&amp;severity=high&amp;id=69b1e24f2f860ef943814c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27591-cwe-284-improper-access-control-in--eac8002f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27591%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wintercms%20winter&amp;severity=critical&amp;id=69b1e24f2f860ef943814c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3957-sql-injection-in-xierongwkhd-weimai--648696b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3957%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1db482f860ef9437ae350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32112-cwe-79-improper-neutralization-of-i-e6caf05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32111-cwe-918-server-side-request-forgery-65cc1f87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32111%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homeassistant-ai%20ha-mcp&amp;severity=medium&amp;id=69b1d7c72f860ef94378fdcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32110-cwe-918-server-side-request-forgery-60e05017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32110%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69b1d7c72f860ef94378fdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3956-sql-injection-in-xierongwkhd-weimai--fcc59d65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3956%3A%20SQL%20Injection%20in%20xierongwkhd%20weimai-wetapp&amp;severity=medium&amp;id=69b1d4422f860ef9437718ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3955-code-injection-in-elecv2p-8cd8ad16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3955%3A%20Code%20Injection%20in%20elecV2P&amp;severity=medium&amp;id=69b1d4422f860ef9437718a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2640-cwe-269-improper-privilege-managemen-e95ab468</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2640%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Lenovo%20PC%20Manager&amp;severity=medium&amp;id=69b1d4422f860ef9437718a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1717-cwe-88-improper-neutralization-of-ar-cb1d4268</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1717%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef94377184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1716-cwe-88-improper-neutralization-of-ar-14e492a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1716%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1715-cwe-88-improper-neutralization-of-ar-b8774eec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1715%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=69b1d4402f860ef943771843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1653-cwe-369-divide-by-zero-in-lenovo-sma-2246780a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1653%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef943771840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1652-cwe-122-heap-based-buffer-overflow-i-f6353da2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1652%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Lenovo%20Smart%20Connect&amp;severity=medium&amp;id=69b1d4402f860ef94377183d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0940-cwe-665-improper-initialization-in-l-1e8a6587</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0940%3A%20CWE-665%3A%20Improper%20Initialization%20in%20Lenovo%20ThinkPad%20T14%20Gen%205%20BIOS&amp;severity=high&amp;id=69b1d4402f860ef943771837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2368-cwe-295-improper-certificate-validat-34870dff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2368%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=high&amp;id=69b1d4402f860ef94377184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1068-cwe-295-improper-certificate-validat-9db0aa86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1068%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20FileZ&amp;severity=medium&amp;id=69b1d4402f860ef94377183a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0520-cwe-532-insertion-of-sensitive-infor-ef53dc0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0520%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Lenovo%20FileZ&amp;severity=low&amp;id=69b1d4402f860ef943771834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32109-cwe-79-improper-neutralization-of-i-b3c947c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32109%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef94375752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32108-cwe-863-incorrect-authorization-in--b3b79436</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32108%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%209001%20copyparty&amp;severity=low&amp;id=69b1d0c22f860ef943757528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32104-cwe-639-authorization-bypass-throug-275920a2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32104%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32106-cwe-269-improper-privilege-manageme-b98c7a31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32106%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef943757525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32103-cwe-639-authorization-bypass-throug-677e6d72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32103%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69b1d0c22f860ef94375751f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32101-cwe-863-incorrect-authorization-in--952207f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32101%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20%40studiocms%20s3-storage&amp;severity=high&amp;id=69b1d0c22f860ef94375751c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3954-path-traversal-in-openbmb-xagent-fb861de9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3954%3A%20Path%20Traversal%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=69b1cd382f860ef943720755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32234-cwe-89-improper-neutralization-of-s-dd3557bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef943720750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32098-cwe-200-exposure-of-sensitive-infor-ba6a965b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32098%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1cd382f860ef94372074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32097-cwe-639-authorization-bypass-throug-8831b524</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32097%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20comppolicylab%20pingpong&amp;severity=high&amp;id=69b1cd382f860ef943720748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32096-cwe-918-server-side-request-forgery-4e688d7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32096%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20useplunk%20plunk&amp;severity=critical&amp;id=69b1cd382f860ef943720744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32095-cwe-79-improper-neutralization-of-i-683938fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useplunk%20plunk&amp;severity=medium&amp;id=69b1cd382f860ef943720741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32094-cwe-200-exposure-of-sensitive-infor-d09e40d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32094%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=69b1cd382f860ef94372073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31979-cwe-59-improper-link-resolution-bef-4ecb1ff2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31979%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20himmelblau-idm%20himmelblau&amp;severity=high&amp;id=69b1c9b82f860ef9436f46ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31976-cwe-506-embedded-malicious-code-in--7bdbb65f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31976%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20xygeni%20xygeni-action&amp;severity=critical&amp;id=69b1c9b82f860ef9436f46e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31974-cwe-918-server-side-request-forgery-e24e73ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31974%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opf%20openproject&amp;severity=low&amp;id=69b1c9b82f860ef9436f46e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27703-cwe-787-out-of-bounds-write-in-riot-9f9f0e2f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27703%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=69b1c9b82f860ef9436f46e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31961-cwe-770-allocation-of-resources-wit-7b2d6a47</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31961%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3951-cross-site-scripting-in-lockerprojec-e61e3138</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3951%3A%20Cross%20Site%20Scripting%20in%20LockerProject%20Locker&amp;severity=medium&amp;id=69b1c6312f860ef9436c35fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31960-cwe-770-allocation-of-resources-wit-3b284858</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31960%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31959-cwe-918-server-side-request-forgery-ed587800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31959%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20anchore%20quill&amp;severity=medium&amp;id=69b1c6312f860ef9436c35f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31958-cwe-400-uncontrolled-resource-consu-93042686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31958%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=69b1c6312f860ef9436c35eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31957-cwe-1188-insecure-default-initializ-e7809765</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31957%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20himmelblau-idm%20himmelblau&amp;severity=critical&amp;id=69b1c6312f860ef9436c35e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31901-cwe-204-observable-response-discrep-218df620</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31901%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1c6312f860ef9436c35e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31900-cwe-20-improper-input-validation-in-edbd8e2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31900%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20psf%20black&amp;severity=high&amp;id=69b1c6312f860ef9436c35dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31896-cwe-89-improper-neutralization-of-s-90bf525e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31896%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69b1c2ac2f860ef943697e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31895-cwe-89-improper-neutralization-of-s-8ec6b871</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31895%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=69b1c2ac2f860ef943697e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31894-cwe-59-improper-link-resolution-bef-273e74f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31894%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3950-out-of-bounds-read-in-strukturag-lib-c710b92d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3950%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24510-cwe-269-improper-privilege-manageme-c60c1a34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24510%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69b1c2ac2f860ef943697e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31889-cwe-290-authentication-bypass-by-sp-9a902af4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31889%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20shopware%20core&amp;severity=high&amp;id=69b1c2ac2f860ef943697e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24508-cwe-295-improper-certificate-valida-35144bc2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24508%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1c2ac2f860ef943697e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31888-cwe-204-observable-response-discrep-3a60d5fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31888%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20shopware%20core&amp;severity=medium&amp;id=69b1bba82f860ef94362bfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24509-cwe-284-improper-access-control-in--f38b1b80</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24509%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=low&amp;id=69b1bba82f860ef94362bfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31887-cwe-863-incorrect-authorization-in--092202e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31887%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20shopware%20core&amp;severity=high&amp;id=69b1bba82f860ef94362bfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3949-out-of-bounds-read-in-strukturag-lib-5bf25418</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3949%3A%20Out-of-Bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=69b1b88a2f860ef943602144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31876-cwe-79-improper-neutralization-of-i-82d78847</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streetwriters%20notesnook&amp;severity=medium&amp;id=69b1b88a2f860ef943602140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31875-cwe-672-operation-on-a-resource-aft-92224a64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31875%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0231-cwe-497-exposure-of-sensitive-system-2d07855f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0231%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=69b1b88a2f860ef943602151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31872-cwe-284-improper-access-control-in--6ddaf3fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31872%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b1b88a2f860ef943602161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0230-cwe-754-improper-check-for-unusual-o-1c766041</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0230%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=69b1b88a2f860ef94360214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31871-cwe-89-improper-neutralization-of-s-b26a259b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31871%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88a2f860ef94360215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31870-cwe-248-uncaught-exception-in-yhiro-528175cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31870%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69b1b88a2f860ef943602159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31868-cwe-79-improper-neutralization-of-i-07f6fa3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31868%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b1b88a2f860ef943602154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31867-cwe-639-authorization-bypass-throug-c2789827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31867%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b1b88b2f860ef9436021cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31866-cwe-770-allocation-of-resources-wit-c8bbc737</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31866%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-feature%20flagd&amp;severity=high&amp;id=69b1b88b2f860ef9436021cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30226-cwe-1321-improperly-controlled-modi-8604fba8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30226%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sveltejs%20devalue&amp;severity=medium&amp;id=69b1b88a2f860ef94360216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31863-cwe-307-improper-restriction-of-exc-8cc9caca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31863%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20anyproto%20anytype-heart&amp;severity=low&amp;id=69b1b88b2f860ef9436021c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31859-cwe-79-improper-neutralization-of-i-e1757a3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31859%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=69b1b88b2f860ef9436021c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31858-cwe-89-improper-neutralization-of-s-88a77bb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31858%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1b88b2f860ef9436021c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31857-cwe-94-improper-control-of-generati-b827dfaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31857%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=69b1aa112f860ef943525d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31975-cwe-78-improper-neutralization-of-s-a38c6f04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31975%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31861-cwe-94-improper-control-of-generati-57615f72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31861%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=high&amp;id=69b1aa112f860ef943525d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31862-cwe-78-improper-neutralization-of-s-27a2b874</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31862%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20siteboon%20claudecodeui&amp;severity=critical&amp;id=69b1aa112f860ef943525d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31856-cwe-89-improper-neutralization-of-s-9159e344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1aa112f860ef943525d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31852-cwe-269-improper-privilege-manageme-1e9d6b5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31852%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20jellyfin%20code-quality.yml&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31840-cwe-89-improper-neutralization-of-s-ae48a02e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31840%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b1b88b2f860ef9436021d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31839-cwe-354-improper-validation-of-inte-928c10e1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31839%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20striae-org%20striae&amp;severity=high&amp;id=69b19f882f860ef9434a76cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31813-cwe-290-authentication-bypass-by-sp-c3c5f69f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31813%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20supabase%20auth&amp;severity=medium&amp;id=69b19f882f860ef9434a76cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30868-cwe-352-cross-site-request-forgery--7f200187</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30868%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opnsense%20core&amp;severity=medium&amp;id=69b19f882f860ef9434a76c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20118-improper-cleanup-on-thrown-exceptio-decbeee1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20118%3A%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69b19f882f860ef9434a76c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20117-improper-neutralization-of-input-du-1b81cde1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20116-improper-neutralization-of-input-du-5d1d53fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20116%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=69b19f882f860ef9434a76c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20046-permissions-privileges-and-access-c-8ac8ec84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20046%3A%20Permissions%2C%20Privileges%2C%20and%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20074-improper-validation-of-specified-ty-cb4cdc42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20074%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20040-improper-neutralization-of-special--28cef64a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20040%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69b19f882f860ef9434a76b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1471-cwe-863-incorrect-authorization-in-n-5b0adb08</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1471%3A%20CWE-863%20Incorrect%20Authorization%20in%20Neo4j%20Enterprise%20edition&amp;severity=low&amp;id=69b19f882f860ef9434a76b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30239-cwe-863-incorrect-authorization-in--ed065581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30239%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30236-cwe-863-incorrect-authorization-in--4fd2e91c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30236%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medtech-giant-stryker-crippled-by-iran-linked-hack-953234d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MedTech%20Giant%20Stryker%20Crippled%20by%20Iran-Linked%20Hacker%20Attack&amp;severity=medium&amp;id=69b198492f860ef9433c9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20163-the-software-constructs-all-or-part-9c53cba7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20163%3A%20The%20software%20constructs%20all%20or%20part%20of%20a%20command%20using%20externally-influenced%20input%20from%20an%20upstream%20component%2C%20but%20it%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20special%20elements%20that%20could%20modify%20the%20intended%20command%20when%20it%20is%20sent%20to%20a%20downstream%20component.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69b198902f860ef9433d35e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20162-the-software-does-not-neutralize-or-5dd46d0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20162%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20166-the-product-exposes-sensitive-infor-a841b7c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20166%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20164-the-product-exposes-sensitive-infor-98853a72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20164%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20165-information-written-to-log-files-ca-f88941b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20165%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69b198902f860ef9433d35ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3429-improper-access-control-in-red-hat-r-689d9289</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3429%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69b198902f860ef9433d35fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1524-cwe-863-incorrect-authorization-in-n-a1518306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1524%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b1988f2f860ef9433d150f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30235-cwe-79-improper-neutralization-of-i-dd14d40c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30235%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b198902f860ef9433d35f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30234-cwe-22-improper-limitation-of-a-pat-90813fd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30234%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20opf%20openproject&amp;severity=medium&amp;id=69b194fa2f860ef943342469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28803-cwe-284-improper-access-control-in--4f7bbe07</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28803%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=69b194fa2f860ef943342466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1497-cwe-863-incorrect-authorization-in-n-7ddf9448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1497%3A%20CWE-863%20Incorrect%20Authorization%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69b194fa2f860ef943342463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31892-cwe-863-incorrect-authorization-in--a88b5d70</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69b1917d2f860ef9432c8e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28229-cwe-863-incorrect-authorization-in--f1c60bd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20argoproj%20argo-workflows&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12690-cwe-250-execution-with-unnecessary--e81ca7a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12690%3A%20CWE-250%20Execution%20with%20unnecessary%20privileges%20in%20Forcepoint%20NGFW%20Engine&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27897-cwe-22-improper-limitation-of-a-pat-e3daa46c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WanderingAstronomer%20Vociferous&amp;severity=critical&amp;id=69b1917d2f860ef9432c8e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22248-cwe-502-deserialization-of-untruste-1db54bf0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22248%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20glpi-project%20glpi&amp;severity=high&amp;id=69b1917d2f860ef9432c8e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-conflict-drives-heightened-espionage-activity-8e0cdf7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20conflict%20drives%20heightened%20espionage%20activity%20against%20Middle%20East%20targets&amp;severity=medium&amp;id=69b7d24e9d4df45183475a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32229-cwe-290-in-jetbrains-hub-d8b40e32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32229%3A%20CWE-290%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=69b186eb2f860ef9431291d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3946-cross-site-scripting-in-phpems-703668cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3946%3A%20Cross%20Site%20Scripting%20in%20PHPEMS&amp;severity=medium&amp;id=69b186eb2f860ef9431291d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30903-cwe-73-external-control-of-file-nam-9bcbc0fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30903%3A%20CWE-73%20External%20control%20of%20file%20name%20or%20path%20in%20Zoom%20Communications%20Zoom%20Workplace&amp;severity=critical&amp;id=69b186eb2f860ef9431291cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30902-cwe-269-improper-privilege-manageme-b4150bc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30902%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b186eb2f860ef9431291ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30901-cwe-20-improper-input-validation-in-d71d0f92</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30901%3A%20CWE-20%20Improper%20input%20validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=69b186eb2f860ef9431291c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30900-cwe-754-improper-check-for-unusual--7c59c0ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30900%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=69b183692f860ef9430a87e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/238000-impacted-by-bell-ambulance-data-breach-8a14bb51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=238%2C000%20Impacted%20by%20Bell%20Ambulance%20Data%20Breach&amp;severity=medium&amp;id=69b1719c2f860ef943cd4ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3496-cwe-89-improper-neutralization-of-sp-f54d6727</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetBooking&amp;severity=high&amp;id=69b171e72f860ef943cd659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3904-cwe-366-race-condition-within-a-thre-3c00b05d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3904%3A%20CWE-366%20Race%20condition%20within%20a%20thread%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=69b171e72f860ef943cd65a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3944-sql-injection-in-itsourcecode-univer-51d5eea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3944%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69b163bf2f860ef943c23223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3943-command-injection-in-h3c-acg1000-ak2-385a93b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3943%3A%20Command%20Injection%20in%20H3C%20ACG1000-AK230&amp;severity=medium&amp;id=69b163bf2f860ef943c2321d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-intel-patch-high-severity-vulnerab-6eed7f7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20Intel%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=69b15c862f860ef943bdbb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-10x-your-vulnerability-management-program-i-9e653e42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%2010x%20Your%20Vulnerability%20Management%20Program%20in%20the%20Agentic%20Era&amp;severity=medium&amp;id=69b15c862f860ef943bdbb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/michelin-confirms-data-breach-linked-to-oracle-ebs-6db6f397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Michelin%20Confirms%20Data%20Breach%20Linked%20to%20Oracle%20EBS%20Attack&amp;severity=medium&amp;id=69b151f92f860ef943b5520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-and-btmob-trojans-infection-techniques--c2f45e9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%20and%20BTMOB%20trojans%3A%20infection%20techniques%20and%20how%20to%20stay%20safe%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b1d0172f860ef94375071d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-crisis-exploited-by-fraudsters-governm-f86a46d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Crisis%20Exploited%20by%20Fraudsters%3A%20Government%20Impersonation%20and%20Evacuation%20Scam%20Infrastructure%20Identified&amp;severity=medium&amp;id=69b933a8771bdb17499de646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castlerat-attack-first-to-abuse-deno-javascript-ru-260b4856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleRAT%20attack%20first%20to%20abuse%20Deno%20JavaScript%20runtime%20to%20evade%20enterprise%20security&amp;severity=medium&amp;id=69b7c7d69d4df451833e08e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3178-cwe-79-improper-neutralization-of-in-e5f2762b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69b1523c2f860ef943b572b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kadnap-malware-turning-asus-routers-into-botnets-71871166</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KadNap%20Malware%20Turning%20Asus%20Routers%20Into%20Botnets&amp;severity=medium&amp;id=69b140632f860ef9439004e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-zombie-zip-files-cve-2026-0866-wed-mar-1-4a802635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20%22Zombie%20Zip%22%20Files%20(CVE-2026-0866)%2C%20(Wed%2C%20Mar%2011th)&amp;severity=medium&amp;id=69b1d0472f860ef943751945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blacksanta-malware-activates-edr-and-av-killer-bef-26cabb98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98BlackSanta%E2%80%99%20Malware%20Activates%20EDR%20and%20AV%20Killer%20Before%20Detonating%20Payload&amp;severity=medium&amp;id=69b1395c2f860ef94389f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3231-cwe-79-improper-neutralization-of-in-46fc345a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Checkout%20Field%20Editor%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=high&amp;id=69b139a22f860ef9438a0d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3906-cwe-862-missing-authorization-in-wor-9947b784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3906%3A%20CWE-862%20Missing%20Authorization%20in%20WordPress%20Foundation%20WordPress&amp;severity=medium&amp;id=69b139a22f860ef9438a0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1992-cwe-639-authorization-bypass-through-abde304f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1992%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1993-cwe-269-improper-privilege-managemen-24b1c442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1993%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20smub%20ExactMetrics%20%E2%80%93%20Google%20Analytics%20Dashboard%20for%20WordPress%20(Website%20Stats%20Plugin)&amp;severity=high&amp;id=69b139a22f860ef9438a0d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1454-cwe-79-improper-neutralization-of-in-c99aaf23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1454%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Lead%20Form%20Builder%20%26%20Contact%20Form&amp;severity=high&amp;id=69b12b822f860ef94376110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14026-cwe-78-in-qnap-systems-inc-qts-04698809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14026%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=69b124772f860ef943643f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14025-cwe-89-in-qnap-systems-inc-video-st-dfdabf28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14025%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14024-cwe-295-in-qnap-systems-inc-video-s-51816644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14024%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=low&amp;id=69b124772f860ef943643f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-b89a8949</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Moxa%2C%20Mitsubishi%20Electric&amp;severity=medium&amp;id=69b120c12f860ef9435b03c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2917-cwe-639-authorization-bypass-through-c3ec0b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2917%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3903-cwe-352-cross-site-request-forgery-c-73f3bf67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20modulards%20Modular%20DS%3A%20Monitor%2C%20update%2C%20and%20backup%20multiple%20websites&amp;severity=medium&amp;id=69b121032f860ef9435ba556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1708-cwe-89-improper-neutralization-of-sp-91722cf8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69b121032f860ef9435ba53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2918-cwe-639-authorization-bypass-through-17a3f525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2918%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69b121032f860ef9435ba54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3534-cwe-79-improper-neutralization-of-in-83a4f3a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Astra&amp;severity=medium&amp;id=69b112e52f860ef943422837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3826-cwe-98-improper-control-of-filename--e68c5a28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3826%3A%20CWE-98%20Improper%20control%20of%20filename%20for%20Include%2FRequire%20statement%20in%20PHP%20program%20(&apos;PHP%20remote%20file%20inclusion&apos;)%20in%20WellChoose%20IFTOP&amp;severity=critical&amp;id=69b112e62f860ef943422847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3825-cwe-79-improper-neutralization-of-in-641f3f35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3825%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef943422843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31844-cwe-89-improper-neutralization-of-s-fae24db9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31844%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Koha%20Community%20Koha&amp;severity=high&amp;id=69b112e52f860ef943422834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3824-cwe-601-url-redirection-to-untrusted-e8697e70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3824%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20WellChoose%20IFTOP&amp;severity=medium&amp;id=69b112e62f860ef94342283f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-oauth-device-code-phishing-5c00f553</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OAuth%20Device%20Code%20Phishing&amp;severity=medium&amp;id=69b143e72f860ef94397fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2631-cwe-269-improper-privilege-managemen-beccaec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2631%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Datalogics%20Ecommerce%20Delivery&amp;severity=critical&amp;id=69b108572f860ef94335d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2626-cwe-502-deserialization-of-untrusted-6caf0aad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2626%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20divi-booster&amp;severity=high&amp;id=69b108572f860ef94335d43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2466-cwe-79-cross-site-scripting-xss-in-d-1e292536</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2466%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20DukaPress&amp;severity=high&amp;id=69b108572f860ef94335d43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1867-cwe-200-information-exposure-in-gues-73b4347e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1867%3A%20CWE-200%20Information%20Exposure%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=69b108572f860ef94335d437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1753-cwe-639-authorization-bypass-through-f27a895c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1753%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Gutena%20Forms&amp;severity=medium&amp;id=69b108572f860ef94335d434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3911-exposure-of-private-personal-informa-7285863b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3911%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69b104d42f860ef943326c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2707-cwe-79-improper-neutralization-of-in-1a1d8fa1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20weForms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20For%20WordPress&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3222-cwe-89-improper-neutralization-of-sp-3eef23b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3222%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2358-cwe-79-improper-neutralization-of-in-aadc0e97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2358%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Like%20%26%20Dislike%20Buttons%20for%20Engagement%20and%20Feedback&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27842-authentication-bypass-using-an-alte-4a1f7ba8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27842%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24448-use-of-hard-coded-credentials-in-mi-455b658d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24448%3A%20Use%20of%20hard-coded%20credentials%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=critical&amp;id=69b0fdcf2f860ef9432e28d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20892-code-injection-in-micro-research-lt-9d6b477d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20892%3A%20Code%20injection%20in%20Micro%20Research%20Ltd.%20MR-GM5L-S1&amp;severity=high&amp;id=69b0fdcf2f860ef9432e28d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3884-cross-site-scripting-xss-in-spinjs-fd57032d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3884%3A%20Cross-site%20Scripting%20(XSS)%20in%20spin.js&amp;severity=medium&amp;id=69b0fdcf2f860ef9432e28fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13067-cwe-434-unrestricted-upload-of-file-9f3e7849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=high&amp;id=69b0efc52f860ef943185a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2413-cwe-89-improper-neutralization-of-sp-3cc7e9f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2413%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=high&amp;id=69b0efc52f860ef943185a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29515-cwe-303-incorrect-implementation-of-ff84fc0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29515%3A%20CWE-303%20Incorrect%20implementation%20of%20authentication%20algorithm%20in%20MiCode%20FileExplorer&amp;severity=critical&amp;id=69b0e8b62f860ef943102174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23817-vulnerability-in-hewlett-packard-en-5631bf85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23817%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=medium&amp;id=69b0e8b62f860ef943102171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23816-vulnerability-in-hewlett-packard-en-f75f54e7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23816%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23815-vulnerability-in-hewlett-packard-en-630530fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23815%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef94310216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23814-vulnerability-in-hewlett-packard-en-e0f88dd5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23814%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=high&amp;id=69b0e8b62f860ef943102168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23813-vulnerability-in-hewlett-packard-en-bce16d68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23813%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-CX&amp;severity=critical&amp;id=69b0e8b62f860ef943102165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3453-cwe-639-authorization-bypass-through-41f4f93e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3453%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=high&amp;id=69b0de292f860ef9430a0afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21291-cross-site-scripting-stored-xss-cwe-3d41cde9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21291%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21293-server-side-request-forgery-ssrf-cw-90c28adc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21293%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21282-improper-input-validation-cwe-20-in-a8641567</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21282%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21286-incorrect-authorization-cwe-863-in--83d31496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21286%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21294-server-side-request-forgery-ssrf-cw-2145ce76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21294%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21284-cross-site-scripting-stored-xss-cwe-91191b9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21284%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21297-incorrect-authorization-cwe-863-in--5c202651</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21297%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21359-incorrect-authorization-cwe-863-in--f32386b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21359%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21309-incorrect-authorization-cwe-863-in--80c62d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21309%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21292-cross-site-scripting-stored-xss-cwe-734da7f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21292%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21310-improper-input-validation-cwe-20-in-7fe81d1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21310%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21285-incorrect-authorization-cwe-863-in--6bb8f61d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21285%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de272f860ef9430a0abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21290-cross-site-scripting-stored-xss-cwe-2715abb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21290%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21289-incorrect-authorization-cwe-863-in--83fd635f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21289%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de272f860ef9430a0ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21361-cross-site-scripting-stored-xss-cwe-be6d2519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21361%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21360-improper-limitation-of-a-pathname-t-0f35b82f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21360%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21296-incorrect-authorization-cwe-863-in--71f95566</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21296%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=69b0de292f860ef9430a0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21311-cross-site-scripting-stored-xss-cwe-8238eb6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21311%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69b0de292f860ef9430a0af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21295-url-redirection-to-untrusted-site-o-16a56e2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21295%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Commerce&amp;severity=low&amp;id=69b0de292f860ef9430a0ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12473-cwe-79-improper-neutralization-of-i-2a6f769c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2324-cwe-352-cross-site-request-forgery-c-13e6dde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2324%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1781-cwe-862-missing-authorization-in-dva-c640e5a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1781%3A%20CWE-862%20Missing%20Authorization%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20for%20WordPress&amp;severity=medium&amp;id=69b0cc972f860ef943fb1c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27241-cross-site-scripting-stored-xss-cwe-e3d79025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27241%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27255-cross-site-scripting-stored-xss-cwe-c7b3c2ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27255%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27244-cross-site-scripting-stored-xss-cwe-e47a6dc5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27244%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27251-cross-site-scripting-stored-xss-cwe-73b1726e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27251%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27223-cross-site-scripting-stored-xss-cwe-bec05048</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27223%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27263-cross-site-scripting-stored-xss-cwe-10cfe83f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27263&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27262-cross-site-scripting-stored-xss-cwe-020c85ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27262%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27261-cross-site-scripting-stored-xss-cwe-57935d09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27261&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27232-cross-site-scripting-stored-xss-cwe-dbe9271e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27232%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27249-cross-site-scripting-stored-xss-cwe-3a157720</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27249%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27247-cross-site-scripting-dom-based-xss--dfb069c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27247%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27242-cross-site-scripting-stored-xss-cwe-eb28f710</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27242%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27252-cross-site-scripting-stored-xss-cwe-27028954</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27252%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27235-cross-site-scripting-stored-xss-cwe-78c18807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27235%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27225-cross-site-scripting-stored-xss-cwe-4fb82607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27225%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27256-cross-site-scripting-stored-xss-cwe-c97af280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27256%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27260-cross-site-scripting-stored-xss-cwe-ca7563dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27260&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27237-cross-site-scripting-stored-xss-cwe-26b46177</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27237%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27265-cross-site-scripting-stored-xss-cwe-17d23e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27265%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27233-cross-site-scripting-stored-xss-cwe-de63556d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27233%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27236-cross-site-scripting-stored-xss-cwe-48c489ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27236%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27240-cross-site-scripting-stored-xss-cwe-51fff64f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27240%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27239-cross-site-scripting-stored-xss-cwe-eaeb950d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27239%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27234-cross-site-scripting-stored-xss-cwe-d54737c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27234%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be892f860ef943f0dcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27259-cross-site-scripting-stored-xss-cwe-272afcac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27259&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27231-cross-site-scripting-stored-xss-cwe-840d33f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27231%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27264-cross-site-scripting-stored-xss-cwe-4cf95917</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27264&amp;severity=null&amp;id=69b0be8c2f860ef943f0dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27230-cross-site-scripting-stored-xss-cwe-2da5dfa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27230%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27229-cross-site-scripting-stored-xss-cwe-6e8f5926</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27229%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27266-cross-site-scripting-stored-xss-cwe-1b2aa55d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8c2f860ef943f0dd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27254-cross-site-scripting-stored-xss-cwe-ddda00f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27254%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27228-cross-site-scripting-stored-xss-cwe-a86793cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27228%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27248-cross-site-scripting-stored-xss-cwe-1aa0d2cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27248%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27257-cross-site-scripting-stored-xss-cwe-1a20c357</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27257%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27226-cross-site-scripting-stored-xss-cwe-20b5adcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27226%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27253-cross-site-scripting-stored-xss-cwe-bf27f658</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27253%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27224-cross-site-scripting-stored-xss-cwe-369e2d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27224%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be882f860ef943f0dcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27250-cross-site-scripting-stored-xss-cwe-47871a60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27250%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=69b0be8b2f860ef943f0dd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-11-38f0e8ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-11&amp;severity=medium&amp;id=69b205402f860ef9439bca45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70041-na-ac29e404</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d7c72f860ef94378fdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70024-na-0548f027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70024%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d4402f860ef94377182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66956-na-361ffc2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66956%3A%20n%2Fa&amp;severity=critical&amp;id=69b1d0c22f860ef943757517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70082-na-40a1d15e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70082%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d150a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68623-na-988346cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68623%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d1505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67041-na-6e95bb25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67041%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d1500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67039-na-7e165db4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67039%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67038-na-642f82a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67038%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67037-na-ccafdfee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67037%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67036-na-a8c80856</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67036%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67035-na-376cd6ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67035%3A%20n%2Fa&amp;severity=critical&amp;id=69b1988f2f860ef9433d14e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67034-na-e3e1ba63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67034%3A%20n%2Fa&amp;severity=high&amp;id=69b1988f2f860ef9433d14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30741-na-35d95b25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30741%3A%20n%2Fa&amp;severity=critical&amp;id=69b194fa2f860ef94334246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67298-na-23778477</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67298%3A%20n%2Fa&amp;severity=high&amp;id=69b186eb2f860ef9431291c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70330-na-4afa6ce5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70330%3A%20n%2Fa&amp;severity=low&amp;id=69b183692f860ef9430a87de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70027-na-b6816533</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70027%3A%20n%2Fa&amp;severity=high&amp;id=69b17c642f860ef943f8b119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-11-3af3869f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-11&amp;severity=medium&amp;id=69b1751d2f860ef943cfc2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-11-66c38b04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-11&amp;severity=low&amp;id=69b0e4f92f860ef9430e38ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2569-cwe-79-improper-neutralization-of-in-d80ea1e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=69b0acf02f860ef943e36226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27270-out-of-bounds-read-cwe-125-in-adobe-f1de6725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27270%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27271-heap-based-buffer-overflow-cwe-122--6508905d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27271%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21333-untrusted-search-path-cwe-426-in-ad-6ec6c0d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21333%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27268-out-of-bounds-read-cwe-125-in-adobe-2889ba56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27268%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69b0a5e82f860ef943dd6b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21362-out-of-bounds-write-cwe-787-in-adob-d9ffb819</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21362%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27272-out-of-bounds-write-cwe-787-in-adob-b2062b24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27272%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27267-stack-based-buffer-overflow-cwe-121-b7b786ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27267%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69b0a5e82f860ef943dd6b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22850-information-disclosure-in-intelr-re-bf19ed93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22850%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daaa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22444-information-disclosure-in-intelr-re-1a61e87f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22444%3A%20Information%20Disclosure%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20information%20disclosure.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20exposure.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(none)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20105-escalation-of-privilege-in-intelr-r-d3541982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20105%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20low%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20073-information-disclosure-in-intelr-re-8e917e6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20073%3A%20Information%20Disclosure%20in%20Intel(R)%20Reference%20Platforms&amp;severity=low&amp;id=69b0a2672f860ef943daa9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20068-escalation-of-privilege-in-intelr-r-a31dde9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20068%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20064-escalation-of-privilege-in-intelr-r-b72354ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20064%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20local%20code%20execution.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20028-escalation-of-privilege-in-intelr-r-8b5df3e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20028%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20027-escalation-of-privilege-in-intelr-r-ac01f83a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20027%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=high&amp;id=69b0a2672f860ef943daa9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20005-escalation-of-privilege-in-intelr-r-17136448</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20005%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20reference%20platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(low)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=69b0a2672f860ef943daa9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20096-escalation-of-privilege-in-intel-re-4e321b78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20096%3A%20Escalation%20of%20Privilege%20in%20Intel%20Reference%20Platforms%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20data%20manipulation.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20without%20special%20internal%20knowledge%20and%20requires%20active%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(high)%20and%20availability%20(high)%20impacts.&amp;severity=medium&amp;id=69b09ee22f860ef943d62fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31834-cwe-269-improper-privilege-manageme-405c91d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31834%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20umbraco%20Umbraco-CMS&amp;severity=high&amp;id=69b094562f860ef943cc190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31833-cwe-79-improper-neutralization-of-i-bd0cf56c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc190a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31832-cwe-639-authorization-bypass-throug-58061dc2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31832%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69b094562f860ef943cc1907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31830-cwe-252-unchecked-return-value-in-s-e783b2ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31830%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20sigstore%20sigstore-ruby&amp;severity=high&amp;id=69b094562f860ef943cc1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31829-cwe-918-server-side-request-forgery-c90afb2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69b18a712f860ef9431b626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31828-cwe-90-improper-neutralization-of-s-a8a27177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31828%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b194fa2f860ef943342479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27221-improper-certificate-validation-cwe-74d41f50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27221%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69b0efc52f860ef943185a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27278-use-after-free-cwe-416-in-adobe-acr-65cc0110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27278%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b178e02f860ef943e659be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27220-use-after-free-cwe-416-in-adobe-acr-1606279c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27220%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69b0efc52f860ef943185a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31827-cwe-362-concurrent-execution-using--6da2171b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31827%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Blue-B%20Alienbin&amp;severity=high&amp;id=69b194fa2f860ef943342476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31826-cwe-770-allocation-of-resources-wit-6bab0c22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31826%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69b194fa2f860ef943342471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28807-cwe-22-improper-limitation-of-a-pat-467caf6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28807%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gleam-wisp%20wisp&amp;severity=high&amp;id=69b17c642f860ef943f8b121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28806-cwe-285-improper-authorization-in-n-d2ddfb8c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28806%3A%20CWE-285%20Improper%20Authorization%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69b090d12f860ef943c885b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-45c626a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b140632f860ef9439004ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31815-cwe-284-improper-access-control-in--f8afe07c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31815%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20django-commons%20django-unicorn&amp;severity=medium&amp;id=69b08d502f860ef943c51495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31812-cwe-248-uncaught-exception-in-quinn-8aa79227</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31812%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20quinn-rs%20quinn&amp;severity=high&amp;id=69b08d502f860ef943c51492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31808-cwe-835-loop-with-unreachable-exit--1b765dff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31808%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20sindresorhus%20file-type&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31809-cwe-79-improper-neutralization-of-i-e8f87427</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31809%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31807-cwe-79-improper-neutralization-of-i-70d89aab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31807%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69b089ca2f860ef943c11e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31801-cwe-863-incorrect-authorization-in--2ed9c2cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31801%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20project-zot%20zot&amp;severity=high&amp;id=69b089ca2f860ef943c11e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31800-cwe-862-missing-authorization-in-pa-7b9d0f4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31800%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30972-cwe-799-improper-control-of-interac-e73c2d7d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30972%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b0864c2f860ef943bbb070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0124-elevation-of-privilege-in-google-and-bf0f89c1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0124%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0123-elevation-of-privilege-in-google-and-3241f5ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0123%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0122-remote-code-execution-in-google-andr-6ef00366</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0122%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb9906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0121-information-disclosure-in-google-and-2990bd54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0121%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b0864a2f860ef943bb9903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0120-remote-code-execution-in-google-andr-8a23e39a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0120%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb9900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0119-elevation-of-privilege-in-google-and-8be81354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0119%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69b0864a2f860ef943bb98fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0118-elevation-of-privilege-in-google-and-7abd765c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0118%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0117-elevation-of-privilege-in-google-and-157fc49a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0117%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b0864a2f860ef943bb98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0116-remote-code-execution-in-google-andr-57041293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0116%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b0864a2f860ef943bb98f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0115-information-disclosure-in-google-and-f8bd7d43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0115%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=69b086492f860ef943bb98da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0114-remote-code-execution-in-google-andr-19803325</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0114%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0113-elevation-of-privilege-in-google-and-81569a06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0113%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0112-elevation-of-privilege-in-google-and-c9519c28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0112%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0111-elevation-of-privilege-in-google-and-aad93a86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0111%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30967-cwe-287-improper-authentication-in--fd3a9bf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30967%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0110-elevation-of-privilege-in-google-and-40cc8cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0110%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69b086492f860ef943bb98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0109-denial-of-service-in-google-android-797e2891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0109%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0108-information-disclosure-in-google-and-3a45f672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0108%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69b086492f860ef943bb98c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0107-elevation-of-privilege-in-google-and-3e492b37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0107%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36920-elevation-of-privilege-in-google-an-ca1cd87c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36920%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69b086492f860ef943bb98bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30966-cwe-284-improper-access-control-in--321de92a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30966%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30965-cwe-863-incorrect-authorization-in--02172b99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30965%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69b0864c2f860ef943bbb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30962-cwe-284-improper-access-control-in--f0f6f512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30962%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b0864c2f860ef943bbb05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30954-cwe-639-authorization-bypass-throug-dbe3b488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30954%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Kovah%20LinkAce&amp;severity=medium&amp;id=69b0864a2f860ef943bb990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30953-cwe-918-server-side-request-forgery-8de6dba7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30953%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69b082c52f860ef943b7fd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66413-cwe-200-exposure-of-sensitive-infor-7dcd20ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66413%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20git-for-windows%20git&amp;severity=high&amp;id=69b082c52f860ef943b7fd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30952-cwe-22-improper-limitation-of-a-pat-4b891716</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20harttle%20liquidjs&amp;severity=high&amp;id=69b082c52f860ef943b7fd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30949-cwe-287-improper-authentication-in--b219bd57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30949%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30948-cwe-79-improper-neutralization-of-i-9cf54941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30947-cwe-863-incorrect-authorization-in--2701ab0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30947%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13213-cwe-644-improper-neutralization-of--ac5f008e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13213%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b07f3e2f860ef943b515a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30946-cwe-770-allocation-of-resources-wit-e2f098e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30946%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b07f3e2f860ef943b515ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30837-cwe-1333-inefficient-regular-expres-f4457447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30837%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69b07f3e2f860ef943b515a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29793-cwe-943-improper-neutralization-of--35303311</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29793%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20%40feathersjs%20mongodb&amp;severity=critical&amp;id=69b17c642f860ef943f8b128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13219-cwe-598-use-of-get-request-method-w-dda311a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13219%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=69b17c642f860ef943f8b11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29792-cwe-287-improper-authentication-in--5aa27c8c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29792%3A%20CWE-287%3A%20Improper%20Authentication%20in%20feathersjs%20feathers&amp;severity=critical&amp;id=69b17c642f860ef943f8b125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29177-cwe-79-improper-neutralization-of-i-6718bb6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29176-cwe-79-improper-neutralization-of-i-11bbfb8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29176%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69b07bba2f860ef943b24cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36226-cwe-79-improper-neutralization-of-i-05c56705</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29175-cwe-79-improper-neutralization-of-i-64f01270</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29175%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36227-cwe-644-improper-neutralization-of--a6241ec7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36227%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=69b07bba2f860ef943b24cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29174-cwe-89-improper-neutralization-of-s-a2c8e194</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29174%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29173-cwe-79-improper-neutralization-of-i-4996e4fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29173%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=low&amp;id=69b07bba2f860ef943b24cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2713-cwe-427-uncontrolled-search-path-ele-2f1ac992</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2713%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20IBM%20Trusteer%20Rapport%20installer&amp;severity=high&amp;id=69b07bba2f860ef943b24cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29172-cwe-89-improper-neutralization-of-s-7609f4db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29172%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20commerce&amp;severity=high&amp;id=69b07bba2f860ef943b24cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29113-cwe-352-cross-site-request-forgery--e48c5eb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29113%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20craftcms%20cms&amp;severity=low&amp;id=69b078412f860ef943afd33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48611-vulnerability-in-google-pixel-609c67e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48611%3A%20Vulnerability%20in%20Google%20Android&amp;severity=critical&amp;id=69b078412f860ef943afd332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26330-cwe-416-use-after-free-in-envoyprox-ddebfef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26330%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26311-cwe-416-use-after-free-in-envoyprox-c65b8305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26311%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-83-vulnerabilities-3d1aa61f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2083%20Vulnerabilities&amp;severity=critical&amp;id=69b06d742f860ef9439f662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26310-cwe-20-improper-input-validation-in-c47a1f4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26310%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26309-cwe-193-off-by-one-error-in-envoypr-008d28a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26309%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=69b071392f860ef943a5fd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26123-cwe-939-improper-authorization-in-h-19c71b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26123%3A%20CWE-939%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20Microsoft%20Microsoft%20Authenticator%20for%20Android&amp;severity=medium&amp;id=69b071392f860ef943a5fd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26308-cwe-863-incorrect-authorization-in--f13a384a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26308%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=69b071392f860ef943a5fd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3582-cwe-862-missing-authorization-in-git-07d9b944</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3582%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b0713c2f860ef943a5fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2266-cwe-79-improper-neutralization-of-in-30e812ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2266%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b0713c2f860ef943a5fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27825-cwe-22-improper-limitation-of-a-pat-2e969811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27825%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sooperset%20mcp-atlassian&amp;severity=critical&amp;id=69b0713c2f860ef943a5fde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27218-null-pointer-dereference-cwe-476-in-19a98ba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27218%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27219-out-of-bounds-read-cwe-125-in-adobe-f5642f0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27219%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2b2f860ef943991ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27214-null-pointer-dereference-cwe-476-in-86773ec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27214%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21364-null-pointer-dereference-cwe-476-in-bf0c7224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21364%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21365-out-of-bounds-read-cwe-125-in-adobe-ece1c6c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21365%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27217-null-pointer-dereference-cwe-476-in-425fdf98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27217%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27216-out-of-bounds-read-cwe-125-in-adobe-bab54d2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27216%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21363-null-pointer-dereference-cwe-476-in-925a5a83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21363%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27215-null-pointer-dereference-cwe-476-in-a150e4da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27215%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=69b06a2a2f860ef943991eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27826-cwe-918-server-side-request-forgery-590e7915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27826%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sooperset%20mcp-atlassian&amp;severity=high&amp;id=69b06a2b2f860ef943991eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27274-out-of-bounds-write-cwe-787-in-adob-71522e22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27274%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27277-use-after-free-cwe-416-in-adobe-sub-c30c0c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27277%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27273-out-of-bounds-write-cwe-787-in-adob-702a87fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27275-out-of-bounds-write-cwe-787-in-adob-a30a4fc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27276-use-after-free-cwe-416-in-adobe-sub-a6f54503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27276%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27279-out-of-bounds-write-cwe-787-in-adob-7f3c880f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27279%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=69b06a2b2f860ef943991efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28292-cwe-78-improper-neutralization-of-s-9307703c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28292%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20steveukx%20simple-git&amp;severity=critical&amp;id=69b06a2b2f860ef943991f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27269-out-of-bounds-read-cwe-125-in-adobe-ca3c9c57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=69b06a2b2f860ef943991ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27281-integer-overflow-or-wraparound-cwe--5911f44a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27281%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=69b063a09972381a98a3a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27280-out-of-bounds-write-cwe-787-in-adob-f9f72bc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=69b063a09972381a98a3a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-80-vulnerabilities-across-eight-prod-e4e45626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2080%20Vulnerabilities%20Across%20Eight%20Products&amp;severity=medium&amp;id=69b063599972381a98a2f608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30980-cwe-121-stack-based-buffer-overflow-016aa9e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30980%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31797-cwe-125-out-of-bounds-read-in-inter-11ca7acb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31797%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31796-cwe-122-heap-based-buffer-overflow--7bfcec69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31796%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31795-cwe-120-buffer-copy-without-checkin-cd8b5822</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31795%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31794-cwe-125-out-of-bounds-read-in-inter-b68a5903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31794%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31793-cwe-125-out-of-bounds-read-in-inter-aee63f1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31793%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31792-cwe-476-null-pointer-dereference-in-ebb64067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31792%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30987-cwe-120-buffer-copy-without-checkin-e205f696</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30987%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060189972381a9898f28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30986-cwe-125-out-of-bounds-read-in-inter-f7bff699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30986%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060189972381a9898f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30985-cwe-120-buffer-copy-without-checkin-8671bbf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30985%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30984-cwe-125-out-of-bounds-read-in-inter-a3bc80de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30984%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30983-cwe-120-buffer-copy-without-checkin-f33c4cb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30983%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30982-cwe-122-heap-based-buffer-overflow--69aca4d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30982%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30981-cwe-120-buffer-copy-without-checkin-2e72aca3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30981%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69b060169972381a9898e696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30979-cwe-120-buffer-copy-without-checkin-ecd82a3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30979%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3306-cwe-639-authorization-bypass-through-20e33556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3306%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69b060189972381a9898f2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30978-cwe-416-use-after-free-in-internati-63697589</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30978%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69b060169972381a9898e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30977-cwe-79-improper-neutralization-of-i-ba88b63e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30977%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lihaohong6%20RenderBlocking&amp;severity=low&amp;id=69b059afea502d3aa8817508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3854-cwe-77-improper-neutralization-of-sp-75942f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3854%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69b059afea502d3aa881750d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30974-cwe-79-improper-neutralization-of-i-793c1d5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=69b059afea502d3aa8817503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-march-2026-tue-mar-10th-b60d64cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20March%202026%2C%20(Tue%2C%20Mar%2010th)&amp;severity=critical&amp;id=69b05966ea502d3aa880ea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30973-cwe-22-improper-limitation-of-a-pat-71bf7da0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30973%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20%40appium%20support&amp;severity=medium&amp;id=69b059afea502d3aa88174ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30970-cwe-862-missing-authorization-in-co-8a757049</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30970%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30969-cwe-639-authorization-bypass-throug-371410d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30969%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b059afea502d3aa88174f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30968-cwe-862-missing-authorization-in-co-37b3de3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30968%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Coral-Protocol%20coral-server&amp;severity=high&amp;id=69b05633ea502d3aa87d6b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2273-cwe-94-improper-control-of-generatio-f2295eba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2273%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Automation%20Expert&amp;severity=high&amp;id=69b05632ea502d3aa87d6b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30964-cwe-346-origin-validation-error-in--c1f14445</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30964%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20web-auth%20webauthn-framework&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30960-cwe-94-improper-control-of-generati-c9d430fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30960%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apich-Organization%20rssn&amp;severity=critical&amp;id=69b05633ea502d3aa87d6b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1286-cwe-502-deserialization-of-untrusted-87e64bf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1286%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Foxboro%20DCS&amp;severity=high&amp;id=69b05626ea502d3aa87d6873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13902-cwe-79-improper-neutralization-of-i-03f84a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13902%3A%20CWE-79%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=69b05626ea502d3aa87d6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26144-cwe-79-improper-neutralization-of-i-0ee52b3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26144%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05632ea502d3aa87d6b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26141-cwe-287-improper-authentication-in--f569f664</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26141%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20Automation%20Hybrid%20Worker%20Windows%20Extension&amp;severity=high&amp;id=69b05632ea502d3aa87d6b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26130-cwe-770-allocation-of-resources-wit-049f3df0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26130%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20ASP.NET%20Core%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26118-cwe-918-server-side-request-forgery-18ee2132</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26118%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20MCP%20Server%20Tools%201.0.0%20(npm)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26117-cwe-288-authentication-bypass-using-54d513ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26117%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69b05631ea502d3aa87d6b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26110-cwe-843-access-of-resource-using-in-9fa096e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26110%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26109-cwe-125-out-of-bounds-read-in-micro-6ab80f9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26109%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26108-cwe-122-heap-based-buffer-overflow--4da7b8eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26108%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26107-cwe-416-use-after-free-in-microsoft-914827d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26107%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b0562fea502d3aa87d6af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26106-cwe-20-improper-input-validation-in-a3d910ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26106%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23665-cwe-122-heap-based-buffer-overflow--3678cfb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23665%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Linux%20Virtual%20Machines%20with%20Azure%20Diagnostics%20extension&amp;severity=high&amp;id=69b05628ea502d3aa87d68b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23662-cwe-306-missing-authentication-for--5df599e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23662%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23661-cwe-319-cleartext-transmission-of-s-c4879b4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23661%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d6885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23654-cwe-1395-dependency-on-vulnerable-t-07048b44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23654%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Microsoft%20GitHub%20Repo%3A%20Zero%20Shot%20scFoundation&amp;severity=high&amp;id=69b05626ea502d3aa87d687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26148-cwe-454-external-initialization-of--fe77d030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26148%3A%20CWE-454%3A%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20Microsoft%20Microsoft%20Azure%20AD%20SSH%20Login%20extension%20for%20Linux&amp;severity=high&amp;id=69b05632ea502d3aa87d6b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23674-cwe-41-improper-resolution-of-path--d3a08b4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23674%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26127-cwe-125-out-of-bounds-read-in-micro-f1ea3b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26127%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26134-cwe-190-integer-overflow-or-wraparo-c5e3cb95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26134%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26132-cwe-416-use-after-free-in-microsoft-27e62c6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26132%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b05632ea502d3aa87d6b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26131-cwe-276-incorrect-default-permissio-0d188990</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26131%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=69b05632ea502d3aa87d6b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26128-cwe-287-improper-authentication-in--762dc85c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26128%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05632ea502d3aa87d6b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26116-cwe-89-improper-neutralization-of-s-9cbccc2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26116%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202025%20(CU%202)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26115-cwe-1287-improper-validation-of-spe-925c4ffb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26115%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05631ea502d3aa87d6b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26121-cwe-918-server-side-request-forgery-e1a50dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26121%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05631ea502d3aa87d6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20967-cwe-20-improper-input-validation-in-1667a03a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20967%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20System%20Center%20Operations%20Manager%202019&amp;severity=high&amp;id=69b05626ea502d3aa87d6876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23656-cwe-345-insufficient-verification-o-ccd8afa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23656%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%20App%20Client%20for%20Windows%20Desktop&amp;severity=medium&amp;id=69b05626ea502d3aa87d687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26114-cwe-502-deserialization-of-untruste-89a579ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26114%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b05631ea502d3aa87d6b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26113-cwe-822-untrusted-pointer-dereferen-7108a4bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26113%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26112-cwe-822-untrusted-pointer-dereferen-dbf4ec68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26112%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26111-cwe-190-integer-overflow-or-wraparo-fdf81b93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26111%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05631ea502d3aa87d6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26105-cwe-79-improper-neutralization-of-i-067b842a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26105%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25190-cwe-426-untrusted-search-path-in-mi-0a2f7d7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25190%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25189-cwe-416-use-after-free-in-microsoft-ee491495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562fea502d3aa87d6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25188-cwe-122-heap-based-buffer-overflow--1a76e429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25188%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25187-cwe-59-improper-link-resolution-bef-a2a668e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25187%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562fea502d3aa87d6ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25186-cwe-200-exposure-of-sensitive-infor-b990dd8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562fea502d3aa87d6ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25185-cwe-200-exposure-of-sensitive-infor-5e59b27f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25185%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25181-cwe-125-out-of-bounds-read-in-micro-2f71462d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25181%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25180-cwe-125-out-of-bounds-read-in-micro-aef172d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25180%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=medium&amp;id=69b0562dea502d3aa87d6a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25179-cwe-1287-improper-validation-of-spe-dcee60e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25179%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25178-cwe-416-use-after-free-in-microsoft-06ec56b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25178%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25177-cwe-641-improper-restriction-of-nam-3db83fdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25177%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25176-cwe-284-improper-access-control-in--b0ef8b07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25176%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25175-cwe-125-out-of-bounds-read-in-micro-754cc756</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25175%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25174-cwe-125-out-of-bounds-read-in-micro-381de664</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25173-cwe-190-integer-overflow-or-wraparo-6750b40e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25173%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562dea502d3aa87d6a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25172-cwe-190-integer-overflow-or-wraparo-564389dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25172%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25171-cwe-416-use-after-free-in-microsoft-1aa3dedd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25171%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25170-cwe-416-use-after-free-in-microsoft-0b7d7ce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25170%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69b0562cea502d3aa87d69ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25169-cwe-369-divide-by-zero-in-microsoft-97602fdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25169%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25168-cwe-476-null-pointer-dereference-in-b2e00811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25168%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25167-cwe-416-use-after-free-in-microsoft-032a21da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25167%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b0562cea502d3aa87d69e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25166-cwe-502-deserialization-of-untruste-fce8ed91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25166%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20ADK%20for%20Windows%2010%2C%20version%202004&amp;severity=high&amp;id=69b0562cea502d3aa87d69dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25165-cwe-476-null-pointer-dereference-in-94d9aeef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25165%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24297-cwe-362-concurrent-execution-using--1709c15b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24297%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b0562cea502d3aa87d69d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24296-cwe-362-concurrent-execution-using--501626ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24296%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562cea502d3aa87d69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24295-cwe-362-concurrent-execution-using--d90aca44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24295%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24294-cwe-287-improper-authentication-in--8b581eb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24294%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24293-cwe-476-null-pointer-dereference-in-cfb69648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24293%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69b0562aea502d3aa87d6987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24292-cwe-416-use-after-free-in-microsoft-f8ee5a46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24292%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24291-cwe-732-incorrect-permission-assign-e1d71316</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24291%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d6981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24290-cwe-284-improper-access-control-in--3d676351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24290%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d697e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24289-cwe-416-use-after-free-in-microsoft-e4cd306d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24289%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b0562aea502d3aa87d697b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24288-cwe-122-heap-based-buffer-overflow--dad21d67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24288%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=69b0562aea502d3aa87d6978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24287-cwe-73-external-control-of-file-nam-ade8f025</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24287%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b0562aea502d3aa87d6975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24285-cwe-416-use-after-free-in-microsoft-1dca559e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24285%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=69b0562aea502d3aa87d6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24283-cwe-122-heap-based-buffer-overflow--da8e4901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24283%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69b05628ea502d3aa87d68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24282-cwe-125-out-of-bounds-read-in-micro-4c1a43ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24282%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69b05628ea502d3aa87d68ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23673-cwe-125-out-of-bounds-read-in-micro-a63954b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23673%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23672-cwe-125-out-of-bounds-read-in-micro-9d4bbc2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23672%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23671-cwe-362-concurrent-execution-using--6af84697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23671%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23669-cwe-416-use-after-free-in-microsoft-cee8b9e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23669%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23668-cwe-362-concurrent-execution-using--564d19e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23668%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69b05628ea502d3aa87d68b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23667-cwe-416-use-after-free-in-microsoft-2b98106e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23667%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69b05628ea502d3aa87d68b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23664-cwe-923-improper-restriction-of-com-8cd21252</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23664%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=high&amp;id=69b05626ea502d3aa87d688b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23660-cwe-284-improper-access-control-in--b81a763b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69b05626ea502d3aa87d6882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21262-cwe-284-improper-access-control-in--4d900db9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21262%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69b05626ea502d3aa87d6879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13901-cwe-404-improper-resource-shutdown--412f4c56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13901%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Schneider%20Electric%20Modicon%20M241%2FM251&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-mois-actors-the-cyber-crime-connection-6b277061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20MOIS%20Actors%20%26%20the%20Cyber%20Crime%20Connection&amp;severity=medium&amp;id=69b04f42ea502d3aa876704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30945-cwe-639-authorization-bypass-throug-d61b6bdb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30945%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30944-cwe-639-authorization-bypass-throug-139adf1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30944%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=high&amp;id=69b05635ea502d3aa87d7bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66178-execute-unauthorized-code-or-comman-3339db4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66178%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24641-denial-of-service-in-fortinet-forti-2e845127</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24641%3A%20Denial%20of%20service%20in%20Fortinet%20FortiWeb&amp;severity=low&amp;id=69b05635ea502d3aa87d7be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24640-execute-unauthorized-code-or-comman-efcffcfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24640%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54659-information-disclosure-in-fortinet--39aea68d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54659%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20Agent%20Communication%20Bridge&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24017-improper-access-control-in-fortinet-216acf1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24017%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25972-execute-unauthorized-code-or-comman-719551c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25972%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22629-improper-access-control-in-fortinet-65b40607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22629%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=low&amp;id=69b05634ea502d3aa87d6bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68482-information-disclosure-in-fortinet--37d779b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68482%3A%20Information%20disclosure%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48418-escalation-of-privilege-in-fortinet-a483513e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48418%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49784-execute-unauthorized-code-or-comman-5f6c4f4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49784%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAnalyzer-BigData&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22572-improper-access-control-in-fortinet-73115578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22572%3A%20Improper%20access%20control%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68648-escalation-of-privilege-in-fortinet-d0f91097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68648%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25689-execute-unauthorized-code-or-comman-1fe24b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25689%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDeceptor&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53608-execute-unauthorized-code-or-comman-8ca13482</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53608%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24018-escalation-of-privilege-in-fortinet-b9a9329c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24018%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientLinux&amp;severity=high&amp;id=69b05634ea502d3aa87d6bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48840-improper-access-control-in-fortinet-0c23b9b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48840%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05633ea502d3aa87d6b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22627-execute-unauthorized-code-or-comman-691b1205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22627%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=high&amp;id=69b05634ea502d3aa87d6bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54820-execute-unauthorized-code-or-comman-3da6e695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54820%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=69b05633ea502d3aa87d6ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30942-cwe-22-improper-limitation-of-a-pat-efb3b11a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30942%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69b05635ea502d3aa87d7bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55717-information-disclosure-in-fortinet--a4b92c31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55717%3A%20Information%20disclosure%20in%20Fortinet%20FortiVoice&amp;severity=low&amp;id=69b05634ea502d3aa87d6bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25836-execute-unauthorized-code-or-comman-0549df17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25836%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox%20Cloud&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30897-execute-unauthorized-code-or-comman-50b13368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30897%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69b05635ea502d3aa87d7bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22628-execute-unauthorized-code-or-comman-3b1e4185</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22628%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchAXFixed&amp;severity=medium&amp;id=69b05634ea502d3aa87d6bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30941-cwe-943-improper-neutralization-of--450ddd4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30941%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30939-cwe-1321-improperly-controlled-modi-cc76a7f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30939%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69b04b8cea502d3aa873ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30938-cwe-693-protection-mechanism-failur-9d8e25cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30938%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69b04b8cea502d3aa873ba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30930-cwe-89-improper-neutralization-of-s-7240df0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30930%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30928-cwe-200-exposure-of-sensitive-infor-341c875e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30928%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nicolargo%20glances&amp;severity=high&amp;id=69b04b8dea502d3aa873bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30934-cwe-79-improper-neutralization-of-i-24a65d33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30934%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30933-cwe-200-exposure-of-sensitive-infor-d9a74993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30933%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=69b04b8dea502d3aa873bacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27661-cwe-1230-exposure-of-sensitive-info-ff4cf300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27661%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=69b04b8dea502d3aa873babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25605-cwe-73-external-control-of-file-nam-5ee32c1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25605%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8dea502d3aa873babc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25573-cwe-73-external-control-of-file-nam-dafe948f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25573%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25572-cwe-130-improper-handling-of-length-0eb7b1d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25572%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25571-cwe-130-improper-handling-of-length-dc53ba63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25571%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=medium&amp;id=69b04b8cea502d3aa873baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25570-cwe-121-stack-based-buffer-overflow-98c21ede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25570%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25569-cwe-787-out-of-bounds-write-in-siem-c2c91e7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25569%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20SICAM%20SIAPP%20SDK&amp;severity=high&amp;id=69b04b8cea502d3aa873baa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40943-cwe-79-improper-neutralization-of-i-9fc302a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40943%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=critical&amp;id=69b04b8cea502d3aa873baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27769-cwe-923-improper-restriction-of-com-a4450901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27769%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Siemens%20Heliox%20Flex%20180%20kW%20EV%20Charging%20Station&amp;severity=low&amp;id=69b04b8cea502d3aa873ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mental-health-apps-are-leaking-your-private-though-f3284dc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mental%20health%20apps%20are%20leaking%20your%20private%20thoughts.%20How%20do%20you%20protect%20yourself%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69b05631ea502d3aa87d6b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-securing-fragile-ot-in-an-exposed-wo-3be6e649</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Securing%20Fragile%20OT%20in%20an%20Exposed%20World&amp;severity=medium&amp;id=69b03641ea502d3aa8673936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3847-vulnerability-in-mozilla-firefox-93e6bf98</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3847%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3846-vulnerability-in-mozilla-firefox-104c9947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3846%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69b03689ea502d3aa867a10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3845-vulnerability-in-mozilla-firefox-81266191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3845%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69b03689ea502d3aa867a10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3862-vulnerability-in-broadcom-siteminder-6245c414</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3862%3A%20Vulnerability%20in%20Broadcom%20SiteMinder&amp;severity=medium&amp;id=69b03689ea502d3aa867a116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-fs-quo-netweaver-vulnerabilit-a4a029a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20FS-QUO%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=69b02bb5ea502d3aa85f6592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-affected-by-ericsson-data-breach-183bdf0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20Affected%20by%20Ericsson%20Data%20Breach&amp;severity=medium&amp;id=69b02bb5ea502d3aa85f6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3483-cwe-749-exposed-dangerous-method-or--62639a97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3483%3A%20CWE-749%20Exposed%20dangerous%20method%20or%20function%20in%20Ivanti%20Desktop%20and%20Server%20Management&amp;severity=high&amp;id=69b02c18ea502d3aa85f8868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-rolls-out-codex-security-vulnerability-scan-222e753a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Rolls%20Out%20Codex%20Security%20Vulnerability%20Scanner&amp;severity=critical&amp;id=69b01da5ea502d3aa8574d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kevin-mandias-armadin-launches-with-190-million-in-5f25333b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kevin%20Mandia%E2%80%99s%20Armadin%20Launches%20With%20%24190%20Million%20in%20Funding&amp;severity=medium&amp;id=69b01da5ea502d3aa8574d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quiz-sites-trick-users-into-enabling-unwanted-brow-23554c48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quiz%20sites%20trick%20users%20into%20enabling%20unwanted%20browser%20notifications&amp;severity=medium&amp;id=69b01a1eea502d3aa8553b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2339-cwe-306-missing-authentication-for-c-bfc86a8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2339%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=high&amp;id=69b0215bea502d3aa859162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-salesforce-customers-allegedly-targete-d347d683</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Salesforce%20Customers%20Allegedly%20Targeted%20in%20New%20Data%20Theft%20Campaign&amp;severity=medium&amp;id=69b01318ea502d3aa850c00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beatbanker-both-banker-and-miner-for-android-65d627b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeatBanker%3A%20both%20banker%20and%20miner%20for%20Android&amp;severity=medium&amp;id=69b0169cea502d3aa852b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11739-cwe-502-deserialization-of-untruste-7716261a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11739%3A%20CWE-502%20Deserialization%20of%20untrusted%20data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=69b01357ea502d3aa8512703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13957-cwe-798-use-of-hard-coded-credentia-50d57493</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13957%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert%20(Formerly%20known%20as%20StruxureWare%20Data%20Center%20Expert)&amp;severity=high&amp;id=69b00fcaea502d3aa84f717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2741-cwe-22-improper-limitation-of-a-path-48a18612</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vaadin%20flow&amp;severity=low&amp;id=69b00fcaea502d3aa84f7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-ivanti-endpoint-manager-flaw-exploited-in-a-da7247af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Ivanti%20Endpoint%20Manager%20Flaw%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69b0088eea502d3aa84bf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3843-cwe-89-improper-neutralization-of-sp-db749180</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3843%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nefteprodukttekhnika%20LLC%20BUK%20TS-G%20Gas%20Station%20Automation%20System&amp;severity=critical&amp;id=69b0215bea502d3aa859162d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-swaps-expose-a-critical-flaw-in-identity-secur-b61e9db7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Swaps%20Expose%20a%20Critical%20Flaw%20in%20Identity%20Security&amp;severity=critical&amp;id=69affa7bea502d3aa840daea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22614-cwe-257-storing-passwords-in-a-reco-75e6ae65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22614%3A%20CWE-257%20Storing%20passwords%20in%20a%20recoverable%20format%20in%20Eaton%20EasySoft&amp;severity=medium&amp;id=69aff72aea502d3aa83f35d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21791-cwe-532-insertion-of-sensitive-info-c766ae5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21791%3A%20CWE-532%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20HCL%20Sametime&amp;severity=low&amp;id=69aff3a6ea502d3aa83c665c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3228-cwe-79-improper-neutralization-of-in-07e7a8d3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=medium&amp;id=69b044ddea502d3aa870234e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2724-cwe-79-improper-neutralization-of-in-6aed2920</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=high&amp;id=69b044ddea502d3aa8702346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23907-cwe-22-improper-limitation-of-a-pat-f06ac661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23907%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20PDFBox%20Examples&amp;severity=medium&amp;id=69b0215bea502d3aa8591625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3315-cwe-276-incorrect-default-permission-cadef1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3315%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ASSA%20ABLOY%20Visionline&amp;severity=medium&amp;id=69afe91aea502d3aa834a958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1261-cwe-79-improper-neutralization-of-in-3b7ad624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wpmet%20MetForm%20Pro&amp;severity=high&amp;id=69afe91aea502d3aa834a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41712-cwe-732-incorrect-permission-assign-d864906a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41712%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41711-cwe-327-use-of-a-broken-or-risky-cr-3f06a07f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41711%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41710-cwe-798-use-of-hard-coded-credentia-86ec016a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41710%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=medium&amp;id=69afd786ea502d3aa827b171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41709-cwe-78-improper-neutralization-of-s-7863621d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41709%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Janitza%20UMG%2096RM-E%2024V(5222063)&amp;severity=critical&amp;id=69afd786ea502d3aa827b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2364-cwe-367-time-of-check-time-of-use-to-5eb858d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2364%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20CODESYS%20CODESYS%20Installer&amp;severity=high&amp;id=69afc976ea502d3aa81f019e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1508-cwe-352-cross-site-request-forgery-c-cd03c8c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1508%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Court%20Reservation&amp;severity=medium&amp;id=69afbb66ea502d3aa81236ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0953-cwe-287-improper-authentication-in-t-965fa126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0953%3A%20CWE-287%20Improper%20Authentication%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=critical&amp;id=69afb0daea502d3aa80ce240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2399-cwe-1285-improper-validation-of-spec-1fc878cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2399%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20Mitsubishi%20Electric%20CNC%20M800V%20Series%20M800VW&amp;severity=medium&amp;id=69afa64eea502d3aa8064f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3585-cwe-22-improper-limitation-of-a-path-57fec669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=69af94baea502d3aa8fe3e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1919-cwe-306-missing-authentication-for-c-b7d963b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1919%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1920-cwe-306-missing-authentication-for-c-3db6a0a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1920%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20arraytics%20Booktics%20%E2%80%93%20Booking%20Calendar%20for%20Appointments%20and%20Service%20Businesses&amp;severity=medium&amp;id=69af86aaea502d3aa8f4fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36173-cwe-79-improper-neutralization-of-i-f97282af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36173%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20InfoSphere%20Data%20Architect&amp;severity=medium&amp;id=69af789aea502d3aa8ed4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36105-cwe-526-cleartext-storage-of-sensit-e80db9d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36105%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20Planning%20Analytics%20Advanced%20Certified%20Containers&amp;severity=medium&amp;id=69af7192ea502d3aa8ea5c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27689-cwe-606-unchecked-input-for-loop-co-d8b8d892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=69af6a8cea502d3aa8e719dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27688-cwe-862-missing-authorization-in-sa-62bd5477</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27687-cwe-862-missing-authorization-in-sa-bb7713f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27687%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20HCM%20Portugal%20and%20SAP%20ERP%20HCM%20Portugal&amp;severity=medium&amp;id=69af6a8cea502d3aa8e719d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27686-cwe-862-missing-authorization-in-sa-83adb224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27686%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20(Service%20API)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27685-cwe-502-deserialization-of-untruste-36704129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Administration&amp;severity=critical&amp;id=69af6a8bea502d3aa8e719b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27684-cwe-89-improper-neutralization-of-s-c68052d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27684%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20NetWeaver%20(Feedback%20Notification)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24317-cwe-427-uncontrolled-search-path-el-9d366f48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24317%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20SAP_SE%20SAP%20GUI%20for%20Windows%20with%20active%20GuiXT&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24316-cwe-918-server-side-request-forgery-f88090d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24316%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24313-cwe-862-missing-authorization-in-sa-66d5a26c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24313%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24311-cwe-312-cleartext-storage-of-sensit-e84d825d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24311%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20Customer%20Checkout%202.0&amp;severity=medium&amp;id=69af6a8bea502d3aa8e719a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24310-cwe-862-missing-authorization-in-sa-7999f018</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24310%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=low&amp;id=69af6a8bea502d3aa8e719a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24309-cwe-862-missing-authorization-in-sa-f005d646</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24309%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=69af6a8bea502d3aa8e7199c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0489-cwe-79-improper-neutralization-of-in-cbf68665</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20One%20(Job%20Service)&amp;severity=medium&amp;id=69af6a8bea502d3aa8e71998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70242-na-c6411a74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70242%3A%20n%2Fa&amp;severity=high&amp;id=69b0864c2f860ef943bbb07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70802-na-3e020311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70802%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70798-na-508a12b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70798%3A%20n%2Fa&amp;severity=high&amp;id=69b082c52f860ef943b7fd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70244-na-e28317c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70244%3A%20n%2Fa&amp;severity=high&amp;id=69b07f3e2f860ef943b515a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70227-na-cbb81ab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70227%3A%20n%2Fa&amp;severity=high&amp;id=69b07bba2f860ef943b24cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70251-na-669447d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70251%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70247-na-d44926cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70247%3A%20n%2Fa&amp;severity=high&amp;id=69b078412f860ef943afd335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70249-na-f5902c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70249%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70246-na-89dc65ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70246%3A%20n%2Fa&amp;severity=high&amp;id=69b071392f860ef943a5fd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70129-na-ab3fe0cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70129%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70128-na-5b2105a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70128%3A%20n%2Fa&amp;severity=medium&amp;id=69b071392f860ef943a5fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26742-na-e679e983</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26742%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26741-na-af97790d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26741%3A%20n%2Fa&amp;severity=high&amp;id=69b06a2a2f860ef943991eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26801-na-507b5071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26801%3A%20n%2Fa&amp;severity=high&amp;id=69b063a09972381a98a3a04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56422-na-e0fce763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56422%3A%20n%2Fa&amp;severity=critical&amp;id=69b060169972381a9898e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56421-na-d4e6f7b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56421%3A%20n%2Fa&amp;severity=high&amp;id=69b060159972381a9898e67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69615-na-b9f6729e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69615%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69614-na-f8e99074</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69614%3A%20n%2Fa&amp;severity=critical&amp;id=69b059afea502d3aa88174ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-10-d294a46c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-10&amp;severity=medium&amp;id=69b05598ea502d3aa87bd071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26738-na-e655b58c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26738%3A%20n%2Fa&amp;severity=high&amp;id=69b040ffea502d3aa86ddc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70025-na-0b47dd0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70025%3A%20n%2Fa&amp;severity=medium&amp;id=69b040ffea502d3aa86ddc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-10-26d06c7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-10&amp;severity=low&amp;id=69afc5bcea502d3aa81b3a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30925-cwe-1333-inefficient-regular-expres-7c8115f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30925%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69af5576ea502d3aa8d50d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30917-cwe-79-improper-neutralization-of-i-374fc6af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30917%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weirdgloop%20mediawiki-extensions-Bucket&amp;severity=high&amp;id=69af51f2ea502d3aa8d1f2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30916-cwe-200-exposure-of-sensitive-infor-ceee8999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30916&amp;severity=null&amp;id=69af51f2ea502d3aa8d1f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30913-cwe-79-improper-neutralization-of-i-61bde380</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30913%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flarum%20nicknames&amp;severity=medium&amp;id=69af51f2ea502d3aa8d1f2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30885-cwe-306-missing-authentication-for--c52692c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30870-cwe-285-improper-authorization-in-p-1df0986b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30870%3A%20CWE-285%3A%20Improper%20Authorization%20in%20powersync-ja%20powersync-service&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28267-incorrect-default-permissions-in-di-18abd493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28267%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20i-%E3%83%95%E3%82%A3%E3%83%AB%E3%82%BF%E3%83%BC%2010%20(Windows%20version%20only)&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30869-cwe-22-improper-limitation-of-a-pat-98459c9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30869%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30862-cwe-79-improper-neutralization-of-i-d918c60a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30862%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=69af4e6aea502d3aa8cf7cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29773-cwe-863-incorrect-authorization-in--70ff5380</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29773%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20kubewarden%20kubewarden-controller&amp;severity=medium&amp;id=69af4e6aea502d3aa8cf7cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28281-cwe-352-cross-site-request-forgery--582e209f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28281%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instantsoft%20icms2&amp;severity=high&amp;id=69af4ae9ea502d3aa8cd9889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11158-cwe-862-missing-authorization-in-hi-7c52de59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11158%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=critical&amp;id=69af4ae9ea502d3aa8cd9886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28433-cwe-639-authorization-bypass-throug-5743eba7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28433%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20misskey-dev%20misskey&amp;severity=low&amp;id=69af3cdaea502d3aa8c6d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28432-cwe-347-improper-verification-of-cr-d72cfb17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28432%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=69af3cdaea502d3aa8c6d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28431-cwe-285-improper-authorization-in-m-e4688f7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28431%3A%20CWE-285%3A%20Improper%20Authorization%20in%20misskey-dev%20misskey&amp;severity=critical&amp;id=69af3cdaea502d3aa8c6d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26982-cwe-78-improper-neutralization-of-s-dd6a54d3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26982%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ghostty-org%20ghostty&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-31802-cwe-22-improper-limitation-of-a-pat-247231a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-31802%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69af3955ea502d3aa8c59c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1776-cwe-22-improper-limitation-of-a-path-96ab7479</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1776%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20owen2345%20Camaleon%20CMS&amp;severity=medium&amp;id=69af3955ea502d3aa8c59c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30926-cwe-284-improper-access-control-in--1175aec5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30926%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=69af3955ea502d3aa8c59c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25960-cwe-918-server-side-request-forgery-c3fc1a91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25960%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=69b03689ea502d3aa867a119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3288-cwe-20-improper-input-validation-in--b7359678</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3288%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69af3955ea502d3aa8c59c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15603-insufficiently-random-values-in-ope-2f25b3d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15603%3A%20Insufficiently%20Random%20Values%20in%20open-webui&amp;severity=medium&amp;id=69b044ddea502d3aa8702354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0846-cwe-36-absolute-path-traversal-in-nl-799595df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3638-cwe-862-missing-authorization-in-dev-87162fbb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69af19aeea502d3aa8b3c468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29023-cwe-798-use-of-hard-coded-credentia-e510eadc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29023%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KeygraphHQ%20Shannon&amp;severity=medium&amp;id=69af0b9eea502d3aa8af25bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-march-threat-intelligence-report-3ef7c2ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69aefa3eea502d3aa88a9e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15568-cwe-78-improper-neutralization-of-s-b5d6b74a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15568%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6%2Fv1.0&amp;severity=high&amp;id=69aef68aea502d3aa8861a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3588-cwe-918-server-side-request-forgery--d3eb8845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3588%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ikea%20dirigera&amp;severity=high&amp;id=69aef0552904315ca31e4b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25866-cwe-428-unquoted-search-path-or-ele-0dfb2877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25866%3A%20CWE-428%20Unquoted%20search%20path%20or%20element%20in%20Mobatek%20MobaXterm&amp;severity=high&amp;id=69aeeccc2904315ca31bf399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/encrypted-client-hello-ready-for-prime-timex3f-mon-75a90978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Encrypted%20Client%20Hello%3A%20Ready%20for%20Prime%20Time%26%23x3f%3B%2C%20(Mon%2C%20Mar%209th)&amp;severity=medium&amp;id=69aede872904315ca3143bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3089-cwe-22-improper-limitation-of-a-path-c51e0410</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Actual%20Actual%20Sync%20Server&amp;severity=medium&amp;id=69aed7b62904315ca3115bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2919-vulnerability-in-mozilla-focus-for-i-08c2d971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2919%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=69aed0ab2904315ca30d0a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attack-uses-windows-terminal-to-evade-det-2d22d0e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attack%20Uses%20Windows%20Terminal%20to%20Evade%20Detection&amp;severity=medium&amp;id=69aec2682904315ca3069adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3819-cross-site-scripting-in-sourcecodest-aaa44b39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3819%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aec2a82904315ca306c3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21736-cwe-280-improper-handling-of-insuff-b649a84a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21736%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=69aebf172904315ca3052918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/internet-infrastructure-tld-arpa-abused-in-phishin-e2d522ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Internet%20Infrastructure%20TLD%20.arpa%20Abused%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=69aeb7db2904315ca3023076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3818-sql-injection-in-tiandy-easy7-cms-wi-a4db1eb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3818%3A%20SQL%20Injection%20in%20Tiandy%20Easy7%20CMS%20Windows&amp;severity=medium&amp;id=69aeb8222904315ca3023bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloned-ai-tool-sites-distribute-malware-in-install-a9978540</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloned%20AI%20Tool%20Sites%20Distribute%20Malware%20in%20%E2%80%98InstallFix%E2%80%99%20Campaign&amp;severity=medium&amp;id=69aeb4572904315ca30031af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3817-improper-authorization-in-sourcecode-267ac504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3817%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69aeb4982904315ca3004502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3816-denial-of-service-in-owasp-defectdoj-a15580d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3816%3A%20Denial%20of%20Service%20in%20OWASP%20DefectDojo&amp;severity=medium&amp;id=69aef497ea502d3aa883cff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25604-cwe-346-origin-validation-error-in--5a7b7808</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25604%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Amazon&amp;severity=medium&amp;id=69aea67e2904315ca3fb12d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3815-buffer-overflow-in-utt-hiper-810g-4cb171a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3815%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aea67e2904315ca3fb12dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69219-cwe-913-improper-control-of-dynamic-c55c74a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69219%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Http&amp;severity=high&amp;id=69aea2f72904315ca3f9c786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-cleanmymac-site-installs-shub-stealer-and-bac-cb0be810</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20CleanMyMac%20site%20installs%20SHub%20Stealer%20and%20backdoors%20crypto%20wallets&amp;severity=medium&amp;id=69aea2c22904315ca3f9aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3814-buffer-overflow-in-utt-hiper-810g-7866271a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3814%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69ae9f732904315ca3f8057d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/installfix-how-attackers-are-weaponizing-malvertiz-3ceb237b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=InstallFix%3A%20How%20attackers%20are%20weaponizing%20malvertized%20install%20guides&amp;severity=medium&amp;id=69ae9bba2904315ca3f470fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3813-injection-in-opencc-jflow-c61de85b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3813%3A%20Injection%20in%20opencc%20JFlow&amp;severity=medium&amp;id=69ae986d2904315ca3f1764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69279-cwe-20-improper-input-validation-in-fe83ee3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69279%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69278-cwe-20-improper-input-validation-in-b08709bc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69278%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61616-cwe-20-improper-input-validation-in-6d0031ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61616%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61615-cwe-20-improper-input-validation-in-e5a517e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61615%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61614-cwe-20-improper-input-validation-in-0a7e31c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61614%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61613-cwe-20-improper-input-validation-in-a7f83b60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61613%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61612-cwe-20-improper-input-validation-in-4f34411f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61612%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T7300%2FT8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=69ae8de22904315ca3e9cffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61611-cwe-20-improper-input-validation-in-32e99f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61611%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20UDX710&amp;severity=high&amp;id=69ae8de22904315ca3e9cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3812-cross-site-scripting-in-itsourcecode-7ee28ec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3812%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Payroll%20Management%20System&amp;severity=medium&amp;id=69ae8de42904315ca3e9d026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24713-cwe-20-improper-input-validation-in-78e1759b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24713%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24015-cwe-1327-binding-to-an-unrestricted-99fd9b26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24015%3A%20CWE-1327%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=69ae8de22904315ca3e9d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3811-stack-based-buffer-overflow-in-tenda-076e8a7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3811%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae8a5a2904315ca3e7e074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41772-cwe-598-use-of-get-request-method-w-ba0a22f3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41772%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41767-cwe-347-improper-verification-of-cr-d117e184</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41767%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41766-cwe-787-out-of-bounds-write-in-mbs--5533adda</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41766%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d82904315ca3e5dc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41765-cwe-862-missing-authorization-in-mb-57e75f2c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41765%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41764-cwe-862-missing-authorization-in-mb-a3e3d2de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41764%3A%20CWE-862%20Missing%20Authorization%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=critical&amp;id=69ae86d82904315ca3e5dc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41763-cwe-497-exposure-of-sensitive-syste-5ae93f0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41763%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41762-cwe-328-use-of-weak-hash-in-mbs-ubr-f7ff21d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41762%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41761-cwe-88-improper-neutralization-of-a-c2ea65ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41761%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41760-cwe-636-not-failing-securely-failin-96960f60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41760%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41759-cwe-636-not-failing-securely-failin-b5660774</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41759%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41758-cwe-22-improper-limitation-of-a-pat-2e4cf25e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41758%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41757-cwe-22-improper-limitation-of-a-pat-d23dc345</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41757%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41756-cwe-1242-inclusion-of-undocumented--2432140c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41756%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=high&amp;id=69ae86d72904315ca3e5dbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41755-cwe-22-improper-limitation-of-a-pat-cd09f553</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41754-cwe-1242-inclusion-of-undocumented--5310c8c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41754%3A%20CWE-1242%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20MBS%20UBR-01%20Mk%20II&amp;severity=medium&amp;id=69ae86d72904315ca3e5dbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3810-stack-based-buffer-overflow-in-tenda-96d51f9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7fd12904315ca3e0a268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3809-stack-based-buffer-overflow-in-tenda-cd7509e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3809%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae7c4e2904315ca3de0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3808-stack-based-buffer-overflow-in-tenda-47c2dc78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3808%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae78c72904315ca3dac14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3807-stack-based-buffer-overflow-in-tenda-57a28f57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3807%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=69ae6ab82904315ca3cb955f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3823-cwe-121-stack-based-buffer-overflow--68d582bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3823%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20Atop%20Technologies%20EHG2408&amp;severity=critical&amp;id=69ae6ab82904315ca3cb9567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3806-sql-injection-in-sourcecodester-reso-2611b6c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3806%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69aef497ea502d3aa883d003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3804-stack-based-buffer-overflow-in-tenda-c824133f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3804%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae602a2904315ca3bfed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3803-stack-based-buffer-overflow-in-tenda-d8d8363c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3803%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae59252904315ca3ba53b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30896-uncontrolled-search-path-element-in-2c04514c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30896%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Qsee%20Qsee%20Client&amp;severity=high&amp;id=69ae59252904315ca3ba53ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3802-stack-based-buffer-overflow-in-tenda-e2e310a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3802%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae521a2904315ca3b4fb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3801-stack-based-buffer-overflow-in-tenda-c8df084e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3801%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3822-cwe-295-improper-certificate-validat-93f8590c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3822%3A%20CWE-295%20Improper%20certificate%20validation%20in%20Taipower%20Taipower%20APP&amp;severity=high&amp;id=69ae47912904315ca3972df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3800-unrestricted-upload-in-sourcecodeste-535e7ac6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3800%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae47912904315ca3972de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3799-stack-based-buffer-overflow-in-tenda-8e3e46d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3799%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i3&amp;severity=high&amp;id=69ae47912904315ca3972dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3798-command-injection-in-comfast-cf-ac10-eb1c1917</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3798%3A%20Command%20Injection%20in%20Comfast%20CF-AC100&amp;severity=medium&amp;id=69ae3d052904315ca386c4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3631-cwe-125-out-of-bounds-read-in-deltaw-56dcbeb6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3631%3A%20CWE-125%20Out-of-bounds%20Read%20in%20DeltaWW%20COMMGR2&amp;severity=high&amp;id=69ae3d052904315ca386c491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3630-cwe-121-stack-based-buffer-overflow--c00e7f15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3630%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20DeltaWW%20COMMGR2&amp;severity=critical&amp;id=69ae3d052904315ca386c48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3797-unrestricted-upload-in-tiandy-video--748bd466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3797%3A%20Unrestricted%20Upload%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=69ae3d052904315ca386c49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3796-improper-access-controls-in-qi-anxin-5a415393</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3796%3A%20Improper%20Access%20Controls%20in%20Qi-ANXIN%20QAX%20Virus%20Removal&amp;severity=medium&amp;id=69ae3d052904315ca386c494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3795-path-traversal-in-doramart-doracms-2b1ce532</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3795%3A%20Path%20Traversal%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3794-improper-authentication-in-doramart--485a5a33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3794%3A%20Improper%20Authentication%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=69ae2ef52904315ca3454d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3793-sql-injection-in-sourcecodester-sale-e809dfe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3793%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae2ef52904315ca3454d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3792-sql-injection-in-sourcecodester-sale-24b11dc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3792%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae24662904315ca31e22a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3791-sql-injection-in-sourcecodester-sale-ce9829f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3791%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae1d5f2904315ca314c85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3790-sql-injection-in-sourcecodester-sale-5f985483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3790%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69ae12d72904315ca30ac9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70030-na-d0975b30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70030%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa8702362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70973-na-54f51c5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70973%3A%20n%2Fa&amp;severity=medium&amp;id=69b044ddea502d3aa870235f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70028-na-3a07e508</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70028%3A%20n%2Fa&amp;severity=high&amp;id=69b044ddea502d3aa870235a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-09-57701da0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-09&amp;severity=medium&amp;id=69af634bea502d3aa8dad08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-09-79bfea9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-09&amp;severity=medium&amp;id=69af3598ea502d3aa8c0dbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70031-na-8a203d21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70031%3A%20n%2Fa&amp;severity=high&amp;id=69af20b9ea502d3aa8b98ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70032-na-37d1a9c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70032%3A%20n%2Fa&amp;severity=medium&amp;id=69af1d36ea502d3aa8b51a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30140-na-bdcbb2e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30140%3A%20n%2Fa&amp;severity=high&amp;id=69af12acea502d3aa8b1aeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70033-na-99291bb2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70033%3A%20n%2Fa&amp;severity=medium&amp;id=69af081bea502d3aa8ad8b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70039-na-d5e0ae2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70039%3A%20n%2Fa&amp;severity=critical&amp;id=69af0116ea502d3aa8929a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70038-na-403c97f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70038%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70034-na-f2a4579f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70034%3A%20n%2Fa&amp;severity=high&amp;id=69af0116ea502d3aa8929a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70037-na-d58dc3af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70037%3A%20n%2Fa&amp;severity=medium&amp;id=69aefd8fea502d3aa88d43ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70060-na-ff9fb2d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70060%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70040-na-5b2fc2fc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70040%3A%20n%2Fa&amp;severity=medium&amp;id=69aef0552904315ca31e4b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70050-na-e5092a6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70050%3A%20n%2Fa&amp;severity=medium&amp;id=69aeeccc2904315ca31bf394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70046-na-320037a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70046%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70042-na-712777a3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70042%3A%20n%2Fa&amp;severity=critical&amp;id=69aeeccc2904315ca31bf38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70048-na-ea9aa573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70048%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70047-na-78041731</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70047%3A%20n%2Fa&amp;severity=high&amp;id=69aee5c82904315ca318c666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70238-na-86922b37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70238%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70059-na-d54d5feb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70059%3A%20n%2Fa&amp;severity=high&amp;id=69aee2432904315ca316f533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70250-na-e9579a40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70250%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70243-na-87101f93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70243%3A%20n%2Fa&amp;severity=high&amp;id=69aedb362904315ca312a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69648-na-ca1b875d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69648%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69647-na-99770e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69647%3A%20n%2Fa&amp;severity=medium&amp;id=69aedb362904315ca312a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-09-dff51750</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-09&amp;severity=low&amp;id=69aea6442904315ca3faf7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3789-server-side-request-forgery-in-byted-4bd85a81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3789%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3788-server-side-request-forgery-in-byted-a581b462</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3788%3A%20Server-Side%20Request%20Forgery%20in%20Bytedesk&amp;severity=medium&amp;id=69ae0bcb2904315ca302ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3787-uncontrolled-search-path-in-ultravnc-8f16fda8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3787%3A%20Uncontrolled%20Search%20Path%20in%20UltraVNC&amp;severity=high&amp;id=69ae01432904315ca3febb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3786-sql-injection-in-easycms-316a8934</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3786%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3785-sql-injection-in-easycms-2d45fde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3785%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=69ae16ab2904315ca310d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3771-sql-injection-in-sourcecodester-reso-7816bc70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3771%3A%20SQL%20Injection%20in%20SourceCodester%20Resort%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3770-cross-site-request-forgery-in-source-6bf6f3bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3770%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Computer%20Laboratory%20Management%20System&amp;severity=medium&amp;id=69ade5242904315ca3f04df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3769-stack-based-buffer-overflow-in-tenda-7dc11ff5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3769%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ade5242904315ca3f04de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3768-stack-based-buffer-overflow-in-tenda-9b634f69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3768%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3767-sql-injection-in-itsourcecode-saniti-52abf55a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3767%3A%20SQL%20Injection%20in%20itsourcecode%20sanitize%20or%20validate%20this%20input&amp;severity=medium&amp;id=69ae16ab2904315ca310d42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3766-cross-site-scripting-in-sourcecodest-10437615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3766%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3765-sql-injection-in-itsourcecode-univer-6d84a21e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3765%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adda962904315ca3ea0ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3764-improper-authorization-in-sourcecode-be8ab318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3764%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3763-cross-site-scripting-in-code-project-57718c26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3763%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69adcc862904315ca3df3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3762-improper-authorization-in-sourcecode-8f58b49a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3762%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3761-improper-authorization-in-sourcecode-685647db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3761%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3760-sql-injection-in-itsourcecode-univer-96d4785b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3760%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69adc57d2904315ca3dae042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3759-sql-injection-in-projectworlds-onlin-d5105e31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3759%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3758-sql-injection-in-projectworlds-onlin-0a0c709d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3758%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3757-sql-injection-in-projectworlds-onlin-02ba6ae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3757%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69adbe762904315ca3d63be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3756-sql-injection-in-sourcecodester-sale-64acb6bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3756%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3755-sql-injection-in-sourcecodester-sale-f37a46a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3755%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3754-sql-injection-in-sourcecodester-sale-ac14f663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3754%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb3e72904315ca3cfbc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3753-sql-injection-in-sourcecodester-sale-71e9fdb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3753%3A%20SQL%20Injection%20in%20SourceCodester%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3752-sql-injection-in-sourcecodester-empl-d7f036bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3752%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69adb0662904315ca3cdf00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3751-sql-injection-in-sourcecodester-empl-1af4f1f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3751%3A%20SQL%20Injection%20in%20SourceCodester%20Employee%20Task%20Management%20System&amp;severity=medium&amp;id=69ada5d72904315ca3c7b46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3750-server-side-request-forgery-in-conti-21a73a4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3750%3A%20Server-Side%20Request%20Forgery%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=69ada5d72904315ca3c7b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3749-unrestricted-upload-in-bytedesk-bcf82151</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3749%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3748-unrestricted-upload-in-bytedesk-51fa3d63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3748%3A%20Unrestricted%20Upload%20in%20Bytedesk&amp;severity=medium&amp;id=69ada2562904315ca3c51407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3747-sql-injection-in-itsourcecode-univer-fc6e6a87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3747%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ada2562904315ca3c51400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3746-sql-injection-in-sourcecodester-simp-eee390ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3746%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3745-sql-injection-in-code-projects-stude-dcc91ae0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3745%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad9b4b2904315ca3c0f6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3744-sql-injection-in-code-projects-stude-a7dcbf08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3744%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3743-cross-site-scripting-in-yifang-cms-e1484fe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3743%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3742-cross-site-scripting-in-yifang-cms-a944e116</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3742%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad90c22904315ca3ba6b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3741-cross-site-scripting-in-yifang-cms-b83d28be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3741%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3740-sql-injection-in-itsourcecode-univer-6e5ebad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3740%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69ad8d3b2904315ca3b727a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3739-improper-authentication-in-suitenume-86af1c13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3739%3A%20Improper%20Authentication%20in%20suitenumerique%20messages&amp;severity=medium&amp;id=69ad86362904315ca3b03eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3738-improper-authorization-in-sourcecode-56a01e02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3738%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3737-improper-authorization-in-sourcecode-73c2f948</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3737%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=69ad7f2d2904315ca3ab3a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3736-sql-injection-in-code-projects-simpl-6228c35e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3736%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3735-sql-injection-in-code-projects-simpl-8c229f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3735%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3734-improper-authorization-in-sourcecode-cc058dff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3734%3A%20Improper%20Authorization%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69ad78262904315ca3a7dde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-cisco-catalyst-sd-wan-vulnerability-now-wid-d8c5b10c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20Cisco%20Catalyst%20SD-WAN%20Vulnerability%20Now%20Widely%20Exploited&amp;severity=medium&amp;id=69ad69e02904315ca39f0717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3733-server-side-request-forgery-in-xuxue-10d35591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3733%3A%20Server-Side%20Request%20Forgery%20in%20xuxueli%20xxl-job&amp;severity=medium&amp;id=69ad58832904315ca3977d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3732-stack-based-buffer-overflow-in-tenda-41443da2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3732%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad58832904315ca3977d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3731-out-of-bounds-read-in-libssh-21070aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3731%3A%20Out-of-Bounds%20Read%20in%20libssh&amp;severity=medium&amp;id=69ae16ab2904315ca310d453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3730-sql-injection-in-itsourcecode-free-h-8dceb15e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3730%3A%20SQL%20Injection%20in%20itsourcecode%20Free%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69ae16ab2904315ca310d44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3729-stack-based-buffer-overflow-in-tenda-c32f2d10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3729%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ae16ab2904315ca310d443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3728-stack-based-buffer-overflow-in-tenda-9cd01aff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3728%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca3903934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3727-stack-based-buffer-overflow-in-tenda-b75939cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3727%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad4df52904315ca390392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3726-stack-based-buffer-overflow-in-tenda-6f0be4bc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3726%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69ad3fe72904315ca3895d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3725-improper-neutralization-of-special-e-4c8ec9b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3725%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad3fe72904315ca3895d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3724-improper-authorization-in-sourcecode-be7325e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3724%3A%20Improper%20Authorization%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3723-sql-injection-in-code-projects-simpl-ef519ae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3723%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad38dd2904315ca3862bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3721-cross-site-scripting-in-1024-lab-sma-8d474ce7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3721%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad27472904315ca37a8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3720-cross-site-scripting-in-1024-lab-sma-42f1e756</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3720%3A%20Cross%20Site%20Scripting%20in%201024-lab%20SmartAdmin&amp;severity=medium&amp;id=69ad23c92904315ca3793831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3719-path-traversal-in-tsinghua-unigroup--0b08a3de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3719%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=69ad23c92904315ca379382b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3716-cross-site-scripting-in-wavlink-wl-w-15d23a27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3716%3A%20Cross%20Site%20Scripting%20in%20Wavlink%20WL-WN579X3-C&amp;severity=medium&amp;id=69ad23c92904315ca3793824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3715-stack-based-buffer-overflow-in-wavli-504a0f36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3715%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-WN579X3-C&amp;severity=high&amp;id=69ad1cbb2904315ca37532d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3714-improper-neutralization-of-special-e-239b3f2e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3714%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20OpenCart&amp;severity=medium&amp;id=69ad1cbb2904315ca37532ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3713-heap-based-buffer-overflow-in-pnggro-c90393c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3713%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69ad12452904315ca36fe687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3711-sql-injection-in-code-projects-simpl-69490cf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3711%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad12452904315ca36fe67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3710-sql-injection-in-code-projects-simpl-0646e9b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3710%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3709-sql-injection-in-code-projects-simpl-f8a1e203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3709%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad0ead2904315ca36e8d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3708-sql-injection-in-code-projects-simpl-120c2473</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3708%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad04212904315ca3691e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3707-integer-overflow-in-mrnanko-webp4j-0a183bd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3707%3A%20Integer%20Overflow%20in%20MrNanko%20webp4j&amp;severity=medium&amp;id=69ad04212904315ca3691e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3706-improper-verification-of-cryptograph-71eb7d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3706%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20mkj%20Dropbear&amp;severity=medium&amp;id=69ad04212904315ca3691e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3705-sql-injection-in-code-projects-simpl-e3e4254b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3705%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Flight%20Ticket%20Booking%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3703-out-of-bounds-write-in-wavlink-nu516-a93ca55c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3703%3A%20Out-of-bounds%20Write%20in%20Wavlink%20NU516U1&amp;severity=critical&amp;id=69ad009b2904315ca367a3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3702-cross-site-scripting-in-sourcecodest-360d788f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3702%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Loan%20Management%20System&amp;severity=medium&amp;id=69ad009b2904315ca367a3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3701-buffer-overflow-in-h3c-magic-b1-5792aaae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3701%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69ad009b2904315ca367a3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3704-command-injection-in-wavlink-nu516u1-3d720bfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3704%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=69acf60f2904315ca36302db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3700-buffer-overflow-in-utt-hiper-810g-be0d9392</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3700%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3699-buffer-overflow-in-utt-hiper-810g-3f47767c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3699%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69aceb852904315ca3579212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3698-buffer-overflow-in-utt-hiper-810g-dd29f05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3698%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=69acdd752904315ca34c9894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3697-stack-based-buffer-overflow-in-plane-de3b04dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3697%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20ICG-2510&amp;severity=medium&amp;id=69acdd752904315ca34c988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30910-cwe-190-integer-overflow-or-wraparo-164ed431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30910%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=high&amp;id=69acd2e62904315ca32e173c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30909-cwe-190-integer-overflow-or-wraparo-d5f24069</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30909%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=69acc85d2904315ca3180bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3696-os-command-injection-in-totolink-n30-86f6a631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3696%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=medium&amp;id=69acc85d2904315ca3180bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3695-path-traversal-in-sourcecodester-mod-24d0e278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3695%3A%20Path%20Traversal%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=69acc85d2904315ca3180bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3693-improper-control-of-resource-identif-100ce1bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3693%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Shy2593666979%20AgentChat&amp;severity=medium&amp;id=69acc85d2904315ca3180bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-08-0080f7fb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-08&amp;severity=medium&amp;id=69ae0f182904315ca3048175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-08-d9635b91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-08&amp;severity=medium&amp;id=69ad89812904315ca3b2115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-08-224dde41</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-08&amp;severity=low&amp;id=69acf95d2904315ca364a157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3683-server-side-request-forgery-in-bufan-eb980839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3683%3A%20Server-Side%20Request%20Forgery%20in%20bufanyun%20HotGo&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd173d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3682-argument-injection-in-welovemedia-ff-2290a593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3682%3A%20Argument%20Injection%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb8bfc48b3f10ffdd1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3681-server-side-request-forgery-in-welov-532d42e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3681%3A%20Server-Side%20Request%20Forgery%20in%20welovemedia%20FFmate&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3680-command-injection-in-ryuzakishinji-b-5a8fcafe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3680%3A%20Command%20Injection%20in%20RyuzakiShinji%20biome-mcp-server&amp;severity=medium&amp;id=69acb1b4c48b3f10ffd9cf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3679-stack-based-buffer-overflow-in-tenda-c7db2235</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3679%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3678-stack-based-buffer-overflow-in-tenda-bf7fd6b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3678%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69acaaaec48b3f10ffd665e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3677-stack-based-buffer-overflow-in-tenda-8899ba38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3677%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=69aca3a8c48b3f10ffd2f1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3675-improper-authorization-in-freedom-fa-54da6cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3675%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69aca3a8c48b3f10ffd2f1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3674-improper-authorization-in-freedom-fa-1ab10793</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3674%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3672-sql-injection-in-jeecgboot-020abedc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3672%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3671-improper-authorization-in-freedom-fa-0abbfa01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3671%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac9ca0c48b3f10ffcff620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3670-improper-authorization-in-freedom-fa-eb9496f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3670%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3669-improper-authorization-in-freedom-fa-a267bda9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3669%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac726ec48b3f10ffbca730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2671-cleartext-transmission-of-sensitive--c642213e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2671%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mendi%20Neurofeedback%20Headset&amp;severity=low&amp;id=69ac6b6ac48b3f10ffb9ec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30861-cwe-78-improper-neutralization-of-s-94bf2228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30861%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30860-cwe-89-improper-neutralization-of-s-90c4d0a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30860%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=69ac564fc48b3f10ffb12c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30859-cwe-284-improper-access-control-in--fdab631b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30859%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30858-cwe-918-server-side-request-forgery-e3e1ce15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30858%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30857-cwe-639-authorization-bypass-throug-61a41dfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30857%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30856-cwe-706-use-of-incorrectly-resolved-a9bc30d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30856%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30855-cwe-284-improper-access-control-in--d6ea3179</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30855%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tencent%20WeKnora&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30851-cwe-287-improper-authentication-in--2fdd0c26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30851%3A%20CWE-287%3A%20Improper%20Authentication%20in%20caddyserver%20caddy&amp;severity=high&amp;id=69ac564fc48b3f10ffb12c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30852-cwe-200-exposure-of-sensitive-infor-f99038f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30852%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=69ac564fc48b3f10ffb12c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30854-cwe-863-incorrect-authorization-in--2544594e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30854%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30850-cwe-862-missing-authorization-in-pa-5dc8b12f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30850%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30848-cwe-22-improper-limitation-of-a-pat-2ee1ac73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30848%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30863-cwe-287-improper-authentication-in--0b463399</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30863%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=69ac52cfc48b3f10ffafee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29196-cwe-863-incorrect-authorization-in--29d97e27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29196%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac52cfc48b3f10ffafee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29195-cwe-863-incorrect-authorization-in--310d1238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29195%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=medium&amp;id=69ac52cfc48b3f10ffafee88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29194-cwe-863-incorrect-authorization-in--74a77e13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29194%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29076-cwe-674-uncontrolled-recursion-in-y-995a29f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29076%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28678-cwe-311-missing-encryption-of-sensi-3ca6a072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28678%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20toxicbishop%20DSA-with-tsx&amp;severity=high&amp;id=69ac4f4bc48b3f10ffae7ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3668-improper-access-controls-in-freedom--df3a8b4f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3668%3A%20Improper%20Access%20Controls%20in%20Freedom%20Factory%20dGEN1&amp;severity=low&amp;id=69ac4f4bc48b3f10ffae7ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30838-cwe-79-improper-neutralization-of-i-a2d9b480</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=69ac4f4bc48b3f10ffae7ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30832-cwe-918-server-side-request-forgery-01aea4d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30832%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=69ac4f4bc48b3f10ffae7ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29787-cwe-200-exposure-of-sensitive-infor-ef5ed21c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29787%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20doobidoo%20mcp-memory-service&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29786-cwe-22-improper-limitation-of-a-pat-81e9e2a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29786%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3667-improper-authorization-in-freedom-fa-7c9f8837</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3667%3A%20Improper%20Authorization%20in%20Freedom%20Factory%20dGEN1&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3665-null-pointer-dereference-in-xlnt-com-e02eb063</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3665%3A%20NULL%20Pointer%20Dereference%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac4840c48b3f10ffa9dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29784-cwe-352-cross-site-request-forgery--d730ba6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29784%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69ac4840c48b3f10ffa9ddd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29781-cwe-476-null-pointer-dereference-in-1c68375a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29781%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20BishopFox%20sliver&amp;severity=low&amp;id=69ac44bec48b3f10ffa88859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29780-cwe-22-improper-limitation-of-a-pat-329b8ba7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29780%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GOVCERT-LU%20eml_parser&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29779-cwe-200-exposure-of-sensitive-infor-4843f8bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29779%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lyc8503%20UptimeFlare&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29190-cwe-22-improper-limitation-of-a-pat-2d7fa3a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29190%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Aiven-Open%20karapace&amp;severity=medium&amp;id=69ac44bec48b3f10ffa88848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29771-cwe-404-improper-resource-shutdown--049544f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29771%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20gravitl%20netmaker&amp;severity=high&amp;id=69ac44bec48b3f10ffa8884c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3664-out-of-bounds-read-in-xlnt-community-ddf35f6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3664%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2ea03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3663-out-of-bounds-read-in-xlnt-community-f71a6234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3663%3A%20Out-of-Bounds%20Read%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69ac3a2fc48b3f10ffa2e9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3662-command-injection-in-wavlink-wl-nu51-4098a232</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3662%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3661-command-injection-in-wavlink-wl-nu51-5db35d81</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3661%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=69ac2c1ec48b3f10ff9be988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-github-repositories-distributing-boryptgr-3297ebaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20GitHub%20Repositories%20Distributing%20BoryptGrab%20Stealer&amp;severity=medium&amp;id=69ac1dd9c48b3f10ff94aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentagons-chief-tech-officer-says-he-clashed-with--14b6744b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentagon%E2%80%99s%20Chief%20Tech%20Officer%20Says%20He%20Clashed%20With%20AI%20Company%20Anthropic%20Over%20Autonomous%20Warfare&amp;severity=medium&amp;id=69ac1353c48b3f10ff8eac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-a0backdoor-linked-to-teams-impersonation-and-q-a3cec5d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20A0Backdoor%20Linked%20to%20Teams%20Impersonation%20and%20Quick%20Assist%20Social%20Engineering&amp;severity=medium&amp;id=69aea6472904315ca3faf832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-an-attack-chain-of-muddywater-37bdf022</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20an%20Attack%20Chain%20of%20MuddyWater&amp;severity=medium&amp;id=69aea6472904315ca3faf837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24308-cwe-532-insertion-of-sensitive-info-090ca1fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24308%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24281-cwe-350-reliance-on-reverse-dns-res-ea5e3a9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24281%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=69abe957c48b3f10ff7477f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2219-vulnerability-in-debian-dpkg-8c8e482a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2219%3A%20Vulnerability%20in%20Debian%20dpkg&amp;severity=high&amp;id=69abdec8c48b3f10ff6e4439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1087-cwe-352-cross-site-request-forgery-c-e80bb5b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openplatform%20The%20Guardian%20News%20Feed&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1086-cwe-352-cross-site-request-forgery-c-73cb4e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1086%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpsolutions%20Font%20Pairing%20Preview%20For%20Landing%20Pages&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1085-cwe-352-cross-site-request-forgery-c-9eb582a4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1085%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20optimizza%20True%20Ranker&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1825-cwe-79-improper-neutralization-of-in-2d3f4daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minor%20Show%20YouTube%20video&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1824-cwe-79-improper-neutralization-of-in-99ce8457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leopoldinfomaniak%20Infomaniak%20Connect%20for%20OpenID&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1823-cwe-79-improper-neutralization-of-in-a33c42c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20consensusintegrations%20Consensus%20Embed&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1074-cwe-79-improper-neutralization-of-in-ed135d09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryscript%20WP%20App%20Bar&amp;severity=high&amp;id=69abd7bec48b3f10ff68539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1073-cwe-352-cross-site-request-forgery-c-6dff961d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1073%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themepul%20Purchase%20Button%20For%20Affiliate%20Link&amp;severity=medium&amp;id=69abd7bec48b3f10ff68539a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1820-cwe-79-improper-neutralization-of-in-c6432016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Media%20Library%20Alt%20Text%20Editor&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1574-cwe-79-improper-neutralization-of-in-b377fdbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgamoni%20MyQtip%20%E2%80%93%20easy%20qTip2&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1805-cwe-79-improper-neutralization-of-in-290380ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damedialimited%20DA%20Media%20GigList&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1569-cwe-79-improper-neutralization-of-in-4cac7f8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nabeghe%20Wueen&amp;severity=medium&amp;id=69abd7bec48b3f10ff6853b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2433-cwe-79-improper-neutralization-of-in-09b1d445</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1071-cwe-79-improper-neutralization-of-in-fd15de10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartaonline%20Carta%20Online&amp;severity=medium&amp;id=69abd7bec48b3f10ff685395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2420-cwe-79-improper-neutralization-of-in-850f4448</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lotekmedia%20LotekMedia%20Popup%20Form&amp;severity=medium&amp;id=69abd7c1c48b3f10ff6855f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14675-cwe-22-improper-limitation-of-a-pat-b9e91655</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14675%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20metabox%20Meta%20Box&amp;severity=high&amp;id=69abd7bec48b3f10ff68538e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27796-cwe-200-exposure-of-sensitive-infor-d2299f63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27796%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27797-cwe-918-server-side-request-forgery-33b30167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27797%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30830-cwe-79-improper-neutralization-of-i-f74109a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30830%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kepano%20defuddle&amp;severity=low&amp;id=69abbf1fc48b3f10ff5c73b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8899-cwe-269-improper-privilege-managemen-76efe6d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8899%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site%20%E2%80%93%20HTML5%20PPV%20Live%20Webcams&amp;severity=high&amp;id=69abbf1fc48b3f10ff5c73a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30829-cwe-200-exposure-of-sensitive-infor-2b9f639a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30829%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bluewave-labs%20Checkmate&amp;severity=medium&amp;id=69abbf1fc48b3f10ff5c73b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30842-cwe-862-missing-authorization-in-el-a8b951aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30842%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30841-cwe-79-improper-neutralization-of-i-2b6679ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30841%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30840-cwe-918-server-side-request-forgery-b545860c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30840%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30839-cwe-918-server-side-request-forgery-3e3c4cf6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30839%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=medium&amp;id=69abbb9ec48b3f10ff5a0866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30828-cwe-29-path-traversal-filename-in-e-986f32fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30828%3A%20CWE-29%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20ellite%20Wallos&amp;severity=high&amp;id=69abbb9ec48b3f10ff5a0861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30824-cwe-306-missing-authentication-for--a4a97f75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30824%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30823-cwe-639-authorization-bypass-throug-0f7787b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30823%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb819c48b3f10ff5861df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30822-cwe-915-improperly-controlled-modif-4eb54742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30822%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30821-cwe-434-unrestricted-upload-of-file-598fed66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30821%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30820-cwe-863-incorrect-authorization-in--33ff046d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30820%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=69abb493c48b3f10ff564c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30247-cwe-918-server-side-request-forgery-7ae2f848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=69aba2fec48b3f10ff3494bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3352-cwe-94-improper-control-of-generatio-066362fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3352%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20shahadul878%20Easy%20PHP%20Settings&amp;severity=high&amp;id=69ac8b62c48b3f10ffc6f6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2431-cwe-79-improper-neutralization-of-in-d9bab0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Custom%20Reports%20%E2%80%93%20Flexible%20reporting%20to%20track%20what%20matters%20most&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2722-cwe-79-improper-neutralization-of-in-4431a517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Stock%20Ticker&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2721-cwe-79-improper-neutralization-of-in-e9cc98a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1650-cwe-862-missing-authorization-in-mdj-399bf7dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1650%3A%20CWE-862%20Missing%20Authorization%20in%20mdjm%20MDJM%20Event%20Management&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2429-cwe-89-improper-neutralization-of-sp-70e4bad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2429%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2020-cwe-502-deserialization-of-untrusted-67fe1cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2020%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20skatox%20JS%20Archive%20List&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14353-cwe-89-improper-neutralization-of-s-6ded6a41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14353%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20presstigers%20ZIP%20Code%20Based%20Content%20Protection&amp;severity=high&amp;id=69ac8b60c48b3f10ffc6f661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2494-cwe-352-cross-site-request-forgery-c-58a3a384</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2494%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2488-cwe-862-missing-authorization-in-met-30ced25f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2488%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1902-cwe-79-improper-neutralization-of-in-ac9ae56e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20innovaatik%20Hammas%20Calendar&amp;severity=medium&amp;id=69ac8b60c48b3f10ffc6f66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-investigating-suspicious-cyber-activity-on-sys-78683f1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Investigating%20%E2%80%98Suspicious%E2%80%99%20Cyber%20Activity%20on%20System%20Holding%20Sensitive%20Surveillance%20Information&amp;severity=medium&amp;id=69ab7c1fc48b3f10ff111f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25073-cwe-79-improper-neutralization-of-i-e9f11af1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=medium&amp;id=69ab78cec48b3f10ff0845b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25072-cwe-330-use-of-insufficiently-rando-9bc8c17a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25072%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25071-cwe-306-missing-authentication-for--d084643f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25071%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=high&amp;id=69ab78cec48b3f10ff0845b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25070-cwe-78-improper-neutralization-of-s-f0039eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25070%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Anhui%20Seeker%20Electronic%20Technology%20Co.%2C%20LTD.%20XikeStor%20SKS8310-8X&amp;severity=critical&amp;id=69ab78cec48b3f10ff0845ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-07-fcc8041b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-07&amp;severity=medium&amp;id=69ae222d2904315ca3174075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-07-fc5fac0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-07&amp;severity=medium&amp;id=69acbf8cc48b3f10ffe29281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-07-ceef406f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-07&amp;severity=low&amp;id=69abdb09c48b3f10ff6b424e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1981-cwe-862-missing-authorization-in-win-2496c681</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1981%3A%20CWE-862%20Missing%20Authorization%20in%20winstonai%20HUMN-1%20AI%20Website%20Scanner%20%26%20Human%20Certification%20by%20Winston%20AI&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1644-cwe-352-cross-site-request-forgery-c-36f8a669</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1644%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20glowlogix%20WP%20Frontend%20Profile&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2371-cwe-862-missing-authorization-in-wps-7a4b5cc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2371%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69ab63bbc48b3f10ffeac195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27142-cwe-79-improper-neutralization-of-i-c8bbfb70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27142%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Go%20standard%20library%20html%2Ftemplate&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27139-cwe-363-race-condition-enabling-lin-098c68bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27139%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=69ab4b1fc48b3f10ffddeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25679-cwe-1286-improper-validation-of-syn-ebb73155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25679%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27138-cwe-1285-improper-validation-of-spe-62986369</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27138%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=69ab4b1fc48b3f10ffddeb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27137-cwe-295-improper-certificate-valida-8118560e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27137%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69ab4b1fc48b3f10ffddeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30242-cwe-918-server-side-request-forgery-c687a2bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30242%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30244-cwe-284-improper-access-control-in--1105edaa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30244%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=high&amp;id=69ab479ac48b3f10ffdbff93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30241-cwe-863-incorrect-authorization-in--54440e88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30241%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20mercurius-js%20mercurius&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30238-cwe-79-improper-neutralization-of-i-f7d87f56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30238%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=69ab479ac48b3f10ffdbff88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30237-cwe-79-improper-neutralization-of-i-80bb9838</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30237%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=low&amp;id=69ab479ac48b3f10ffdbff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30231-cwe-639-authorization-bypass-throug-a04ad200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30231%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30230-cwe-639-authorization-bypass-throug-5dd7aff8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30230%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FlintSH%20Flare&amp;severity=high&amp;id=69ab4414c48b3f10ffd8fc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30227-cwe-93-improper-neutralization-of-c-730af536</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30227%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20jstedfast%20MimeKit&amp;severity=medium&amp;id=69ab4414c48b3f10ffd8fc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29795-cwe-770-allocation-of-resources-wit-b46dbb2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29795%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stellar%20rs-stellar-xdr&amp;severity=medium&amp;id=69ab4093c48b3f10ffd6ce0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29790-cwe-22-improper-limitation-of-a-pat-495da025</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29790%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dbt-labs%20dbt-common&amp;severity=low&amp;id=69ab4093c48b3f10ffd6ce06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29789-cwe-862-missing-authorization-in-vi-a7e2f21c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29789%3A%20CWE-862%3A%20Missing%20Authorization%20in%20vitodeploy%20vito&amp;severity=critical&amp;id=69ab4093c48b3f10ffd6ce00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29788-cwe-283-unverified-ownership-in-mir-00a7d89c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29788%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20miraheze%20TSPortal&amp;severity=high&amp;id=69ab4093c48b3f10ffd6cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30835-cwe-209-generation-of-error-message-2f619d80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30835%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30229-cwe-863-incorrect-authorization-in--3025edc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30229%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30228-cwe-863-incorrect-authorization-in--6cc83cac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69ab3d0ec48b3f10ffd4f2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29182-cwe-863-incorrect-authorization-in--5263b108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29182%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20parse-community%20parse-server&amp;severity=high&amp;id=69ab3d0ec48b3f10ffd4f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/middle-east-conflict-fuels-opportunistic-cyber-att-352466d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Middle%20East%20Conflict%20Fuels%20Opportunistic%20Cyber%20Attacks&amp;severity=medium&amp;id=69aea2c22904315ca3f9aaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29178-cwe-918-server-side-request-forgery-7d393c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LemmyNet%20lemmy&amp;severity=high&amp;id=69ab19e8c48b3f10ffbbf2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29091-cwe-95-improper-neutralization-of-d-c92d8a83</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29091%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20locutusjs%20locutus&amp;severity=high&amp;id=69ab1661c48b3f10ffba181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30833-cwe-943-improper-neutralization-of--2e34817a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30833%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20RocketChat%20Rocket.Chat&amp;severity=medium&amp;id=69ab1661c48b3f10ffba1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30831-cwe-287-improper-authentication-in--d6e13010</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30831%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=69ab1661c48b3f10ffba1822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28514-cwe-287-improper-authentication-in--bf7998c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28514%3A%20CWE-287%3A%20Improper%20Authentication%20in%20RocketChat%20Rocket.Chat&amp;severity=critical&amp;id=69ab1661c48b3f10ffba1819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-on-schools-and-colleges-kaspers-ad8615d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20on%20schools%20and%20colleges%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69ac9a40c48b3f10ffceb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29089-cwe-426-untrusted-search-path-in-ti-e44a8f1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29089%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20timescale%20timescaledb&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29087-cwe-863-incorrect-authorization-in--d805d9f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29087%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20honojs%20node-server&amp;severity=high&amp;id=69ab0f59c48b3f10ffb6232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29783-cwe-78-improper-neutralization-of-s-97c9fcf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20github%20copilot-cli&amp;severity=high&amp;id=69ab0852c48b3f10ffb0e5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29082-cwe-79-improper-neutralization-of-i-06108f67</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29082%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=high&amp;id=69ab04d0c48b3f10ffaee2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15602-cwe-915-improperly-controlled-modif-0fbe3594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15602%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Grokability%2C%20Inc.%20Snipe-IT&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29064-cwe-22-improper-limitation-of-a-pat-4981ec09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zarf-dev%20zarf&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fbi-hacked-us-security-pro-killed-in-337e5e98</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FBI%20Hacked%2C%20US%20Security%20Pro%20Killed%20in%20Iran%20War%2C%20Hijacked%20Cameras%20Used%20in%20Khamenei%20Strike&amp;severity=medium&amp;id=69aaf688c48b3f10ffa45df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-delivered-through-fake-zoom-and-goog-47bded52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Access%20Delivered%20Through%20Fake%20Zoom%20and%20Google%20Meet%20Calls&amp;severity=medium&amp;id=69ae9bba2904315ca3f470df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-spyware-campaign-impersonates-israels-red-a-e5ebab35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20spyware%20campaign%20impersonates%20Israel&apos;s%20Red%20Alert%20rocket%20warning%20system&amp;severity=medium&amp;id=69ae9f3e2904315ca3f7e27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27027-cwe-522-in-everon-apieveronio-2ab7f513</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27027%3A%20CWE-522%20in%20Everon%20api.everon.io&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20748-cwe-613-in-everon-apieveronio-677f7800</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20748%3A%20CWE-613%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24696-cwe-307-in-everon-apieveronio-7062e309</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24696%3A%20CWE-307%20in%20Everon%20api.everon.io&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26288-cwe-306-in-everon-apieveronio-4db274ef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26288%3A%20CWE-306%20in%20Everon%20api.everon.io&amp;severity=critical&amp;id=69aaf339c48b3f10ffa20e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27777-cwe-522-in-mobiliti-e-mobihu-e1f11063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27777%3A%20CWE-522%20in%20Mobiliti%20e-mobi.hu&amp;severity=medium&amp;id=69aaf339c48b3f10ffa20e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27764-cwe-613-in-mobiliti-e-mobihu-3d2562c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27764%3A%20CWE-613%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20882-cwe-307-in-mobiliti-e-mobihu-3abeebf9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20882%3A%20CWE-307%20in%20Mobiliti%20e-mobi.hu&amp;severity=high&amp;id=69aaf339c48b3f10ffa20e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2754-cwe-306-missing-authentication-for-c-7691b6a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2754%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2753-cwe-36-absolute-path-traversal-in-na-977a9330</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2753%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Navtor%20NavBox&amp;severity=high&amp;id=69aaefb7c48b3f10ff9de72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2752-cwe-209-generation-of-error-message--8ebaaf0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2752%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Navtor%20NavBox&amp;severity=medium&amp;id=69aaefb7c48b3f10ff9de72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26051-cwe-306-in-mobiliti-e-mobihu-70ec4ea6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26051%3A%20CWE-306%20in%20Mobiliti%20e-mobi.hu&amp;severity=critical&amp;id=69aaefb7c48b3f10ff9de726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-ios-flaws-from-coruna-exploit-kit-to-kev-c376b915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20iOS%20Flaws%20From%20Coruna%20Exploit%20Kit%20to%20KEV%20List&amp;severity=medium&amp;id=69aad6e5c48b3f10ff88b243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rockwell-vulnerability-allowing-remote-ics-hacking-56518a14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rockwell%20Vulnerability%20Allowing%20Remote%20ICS%20Hacking%20Exploited%20in%20Attacks&amp;severity=low&amp;id=69aacc59c48b3f10ff7e39bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28080-cwe-862-missing-authorization-in-ra-08d670cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28080%3A%20CWE-862%20Missing%20Authorization%20in%20Rank%20Math%20Rank%20Math%20SEO%20PRO&amp;severity=medium&amp;id=69aac58dc48b3f10ff75bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28106-cwe-601-url-redirection-to-untruste-6f7aab75</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28106%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kings%20Plugins%20B2BKing%20Premium&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35644-cwe-79-improper-neutralization-of-i-384a621c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Birchler%20Preferred%20Languages&amp;severity=medium&amp;id=69aac20ac48b3f10ff714a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-hacked-us-airport-bank-software-compan-620d8441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Hacked%20US%20Airport%2C%20Bank%2C%20Software%20Company&amp;severity=medium&amp;id=69aabe4dc48b3f10ff637826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1468-cwe-352-cross-site-request-forgery-c-3fa2a3bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69aab775c48b3f10ff51325c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3589-cwe-352-cross-site-request-forgery-c-929d5a57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20WooCommerce&amp;severity=high&amp;id=69aa9ed9c48b3f10ff40a463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2331-cwe-552-files-or-directories-accessi-5e67b9ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2331%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2330-cwe-552-files-or-directories-accessi-493bd9c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2330%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SICK%20AG%20SICK%20Lector85x&amp;severity=critical&amp;id=69aa89c1c48b3f10ff2e8a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29074-cwe-776-improper-restriction-of-rec-bc543408</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29074%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20svg%20svgo&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2830-cwe-94-improper-control-of-generatio-0bb50253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2830%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20WP%20All%20Import%20%E2%80%93%20Drag%20%26%20Drop%20Import%20for%20CSV%2C%20XML%2C%20Excel%20%26%20Google%20Sheets&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29183-cwe-79-improper-neutralization-of-i-768fb7e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=69aa82b7c48b3f10ff296e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29073-cwe-862-missing-authorization-in-si-b68dce41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29073%3A%20CWE-862%3A%20Missing%20Authorization%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29062-cwe-770-allocation-of-resources-wit-840ac63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29062%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20FasterXML%20jackson-core&amp;severity=high&amp;id=69aa82b7c48b3f10ff296e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29059-cwe-22-improper-limitation-of-a-pat-9b177476</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20windmill-labs%20windmill&amp;severity=medium&amp;id=69aa82b7c48b3f10ff296e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29058-cwe-78-improper-neutralization-of-s-6e5bf915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29058%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WWBN%20AVideo-Encoder&amp;severity=critical&amp;id=69aa7f36c48b3f10ff26b932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29049-cwe-400-uncontrolled-resource-consu-caf9817c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29049%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29065-cwe-22-improper-limitation-of-a-pat-9b12e55d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29039-cwe-94-improper-control-of-generati-a252bc8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29039%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=69aa7f36c48b3f10ff26b92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29038-cwe-79-improper-neutralization-of-i-56be0ce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29038%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=69aa7f36c48b3f10ff26b925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28804-cwe-407-inefficient-algorithmic-com-33d7baa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28804%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28801-cwe-94-improper-control-of-generati-c0fc0149</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28801%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28800-cwe-22-improper-limitation-of-a-pat-dfca6612</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NatroTeam%20NatroMacro&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff24586b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28438-cwe-89-improper-neutralization-of-s-5b163019</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28438%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cocoindex-io%20cocoindex&amp;severity=medium&amp;id=69aa7bb0c48b3f10ff245863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28799-cwe-416-use-after-free-in-pjsip-pjp-3427c3c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28799%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29068-cwe-121-stack-based-buffer-overflow-0e1924ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29068%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=69aa7bb0c48b3f10ff245877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28795-cwe-22-improper-limitation-of-a-pat-b24598ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28795%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhongyu09%20openchatbi&amp;severity=high&amp;id=69aa74abc48b3f10ff21035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2446-cwe-862-missing-authorization-in-pow-801544ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2446%3A%20CWE-862%20Missing%20Authorization%20in%20PowerPack%20for%20LearnDash&amp;severity=critical&amp;id=69aa7125c48b3f10ff1eaaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1128-cwe-352-cross-site-request-forgery-c-9d4324d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20eCommerce&amp;severity=medium&amp;id=69aa7125c48b3f10ff1eaaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28794-cwe-1321-improperly-controlled-modi-427da505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28794%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20middleapi%20orpc&amp;severity=critical&amp;id=69aa6319c48b3f10ff135409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29084-cwe-352-cross-site-request-forgery--2e66f130</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29084%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29061-cwe-284-improper-access-control-in--f342cb98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29061%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29060-cwe-284-improper-access-control-in--8b2784da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29060%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff13540d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28683-cwe-79-improper-neutralization-of-i-3dead106</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28683%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=high&amp;id=69aa6319c48b3f10ff135405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28682-cwe-284-improper-access-control-in--00bddf4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28682%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=69aa6319c48b3f10ff135401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28681-cwe-601-url-redirection-to-untruste-b554b77b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28681%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20irrdnet%20irrd&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28679-cwe-22-improper-limitation-of-a-pat-2d04a517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28679%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xemle%20home-gallery&amp;severity=high&amp;id=69aa5c10c48b3f10ff0d74be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28509-cwe-79-improper-neutralization-of-i-e0679ca6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28509%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langbot-app%20LangBot&amp;severity=medium&amp;id=69aa5c10c48b3f10ff0d74b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29041-cwe-434-unrestricted-upload-of-file-e999d757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29041%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59544-cwe-862-missing-authorization-in-ch-f37bb7fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59544%3A%20CWE-862%3A%20Missing%20Authorization%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59543-cwe-79-improper-neutralization-of-i-0eef53dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59543%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59542-cwe-79-improper-neutralization-of-i-47c12102</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59542%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69aa5508c48b3f10fff1d3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59541-cwe-352-cross-site-request-forgery--e2b1d14f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59541%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59540-cwe-80-improper-neutralization-of-s-9a418eac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59540%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69aa5508c48b3f10fff1d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55289-cwe-79-improper-neutralization-of-i-190f2e91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55289%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69aa5508c48b3f10fff1d3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28501-cwe-89-improper-neutralization-of-s-36e0dbd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28502-cwe-434-unrestricted-upload-of-file-779981cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28502%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29093-cwe-287-improper-authentication-in--b06804e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29093%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WWBN%20AVideo&amp;severity=high&amp;id=69aa4a7bc48b3f10ffe32f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29046-cwe-114-process-control-in-maximmas-416b5cf1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29046%3A%20CWE-114%3A%20Process%20Control%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28497-cwe-190-integer-overflow-or-wraparo-aa98a920</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28497%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69aa4a7bc48b3f10ffe32f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25962-cwe-409-improper-handling-of-highly-de5d7f5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25962%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27807-cwe-776-improper-restriction-of-rec-2352478b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27807%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=69aa4a7bc48b3f10ffe32f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3616-sql-injection-in-defaultfuction-jeso-12cc9586</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3616%3A%20SQL%20Injection%20in%20DefaultFuction%20Jeson%20Customer%20Relationship%20Management%20System&amp;severity=medium&amp;id=69aa3c78c48b3f10ffcfb821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3613-stack-based-buffer-overflow-in-wavli-e7d59b95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3613%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa2e5ac48b3f10ffc36e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3612-command-injection-in-wavlink-wl-nu51-a43ad7d5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3612%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=69aa274ec48b3f10ffabbad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3610-cross-site-scripting-in-hsc-cybersec-5db7259d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3610%3A%20Cross%20Site%20Scripting%20in%20HSC%20Cybersecurity%20Mailinspector&amp;severity=medium&amp;id=69aa274ec48b3f10ffabbacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-06-866cbd09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-06&amp;severity=medium&amp;id=69ab6e0cc48b3f10fff05506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69654-na-44cf2543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69654%3A%20n%2Fa&amp;severity=high&amp;id=69ab3283c48b3f10ffcc6477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69653-na-661f7105</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69653%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69652-na-89a022c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69652%3A%20n%2Fa&amp;severity=medium&amp;id=69ab20f4c48b3f10ffc04694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69650-na-8107a9f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69650%3A%20n%2Fa&amp;severity=high&amp;id=69ab1d6dc48b3f10ffbeb7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69649-na-a1749c93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69649%3A%20n%2Fa&amp;severity=medium&amp;id=69ab1d6dc48b3f10ffbeb7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69651-na-6ed8e52a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69651%3A%20n%2Fa&amp;severity=medium&amp;id=69ab19e8c48b3f10ffbbf2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69646-na-8ed65ffb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69646%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69645-na-356b454c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69645%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb62323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69644-na-e8df8165</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69644%3A%20n%2Fa&amp;severity=medium&amp;id=69ab0f59c48b3f10ffb6231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70363-na-917512e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70363%3A%20n%2Fa&amp;severity=high&amp;id=69ab014fc48b3f10ffac9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-06-394941b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-06&amp;severity=medium&amp;id=69aabac0c48b3f10ff54eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-06-b3d61573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-06&amp;severity=low&amp;id=69aabac0c48b3f10ff54eade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28726-cwe-863-in-acronis-acronis-cyber-pr-ae9468f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28726%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28725-cwe-732-in-acronis-acronis-cyber-pr-5efe8500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28725%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1cc6c48b3f10ff8f9558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30413-cwe-732-in-acronis-acronis-cyber-pr-ecf57f6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30413%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28724-cwe-863-in-acronis-acronis-cyber-pr-c4198fcb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28724%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28723-cwe-863-in-acronis-acronis-cyber-pr-5f3e63ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28723%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1965c48b3f10ff8d2b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28722-cwe-610-in-acronis-acronis-cyber-pr-2402ead0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28722%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28721-cwe-610-in-acronis-acronis-cyber-pr-8b4a5c71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28721%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28720-cwe-863-in-acronis-acronis-cyber-pr-41955de7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28720%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28719-cwe-863-in-acronis-acronis-cyber-pr-6d5e2241</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28719%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28718-cwe-779-in-acronis-acronis-cyber-pr-a9dbceaf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28718%3A%20CWE-779%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28717-cwe-276-in-acronis-acronis-cyber-pr-83a858f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28717%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28716-cwe-863-in-acronis-acronis-cyber-pr-1699ecb1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28716%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28715-cwe-863-in-acronis-acronis-cyber-pr-cb280302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28715%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28714-cwe-522-in-acronis-acronis-cyber-pr-b7b480ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28714%3A%20CWE-522%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1963c48b3f10ff8d2b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28713-cwe-1392-in-acronis-acronis-cyber-p-ae137381</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28713%3A%20CWE-1392%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1963c48b3f10ff8d2b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28712-cwe-427-in-acronis-acronis-cyber-pr-05ca5ab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28712%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28711-cwe-427-in-acronis-acronis-cyber-pr-9c33e230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28711%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28710-cwe-1390-in-acronis-acronis-cyber-p-29d27d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28710%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28709-cwe-863-in-acronis-acronis-cyber-pr-9d9af414</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28709%3A%20CWE-863%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11790-cwe-732-in-acronis-acronis-cyber-pr-d26c0fd9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11790%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11791-cwe-862-in-acronis-acronis-cyber-pr-95aaee43</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11791%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11792-cwe-427-in-acronis-acronis-cyber-pr-d49c2cc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11792%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28727-cwe-276-in-acronis-acronis-cyber-pr-1f5f5b7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28727%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%2017&amp;severity=high&amp;id=69aa1965c48b3f10ff8d2b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27770-cwe-522-in-epower-epowerie-76cf915c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27770%3A%20CWE-522%20in%20ePower%20epower.ie&amp;severity=medium&amp;id=69aa1962c48b3f10ff8d2b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24912-cwe-613-in-epower-epowerie-3fcc469f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24912%3A%20CWE-613%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa1962c48b3f10ff8d2b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27778-cwe-307-in-epower-epowerie-3015e8f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27778%3A%20CWE-307%20in%20ePower%20epower.ie&amp;severity=high&amp;id=69aa15bec48b3f10ff8a0fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2589-cwe-200-exposure-of-sensitive-inform-2dc93144</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2589%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69aa15bec48b3f10ff8a0fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22552-cwe-306-in-epower-epowerie-1e2e527e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22552%3A%20CWE-306%20in%20ePower%20epower.ie&amp;severity=critical&amp;id=69aa15bec48b3f10ff8a0fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26122-information-disclosure-in-microsoft-09c389e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26122%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26125-cwe-306-missing-authentication-for--ae4455f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26125%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Payment%20Orchestrator%20Service&amp;severity=high&amp;id=69aa042dc48b3f10ff7dd2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26124-cwe-35-path-traversal-in-microsoft--129daa24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26124%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21536-cwe-434-unrestricted-upload-of-file-3dbf1775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21536%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Microsoft%20Microsoft%20Devices%20Pricing%20Program&amp;severity=critical&amp;id=69aa042dc48b3f10ff7dd29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23651-cwe-625-permissive-regular-expressi-1f6596b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23651%3A%20CWE-625%3A%20Permissive%20Regular%20Expression%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=69aa042dc48b3f10ff7dd2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3606-out-of-bounds-read-in-ettercap-c4751691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3606%3A%20Out-of-Bounds%20Read%20in%20Ettercap&amp;severity=medium&amp;id=69aa00a5c48b3f10ff7ae786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28484-fde8f0db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28484&amp;severity=null&amp;id=69ab0852c48b3f10ffb0e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28474-incorrect-authorization-in-openclaw-da9baab9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28474%3A%20Incorrect%20Authorization%20in%20OpenClaw%20nextcloud-talk&amp;severity=critical&amp;id=69aa00a5c48b3f10ff7ae781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28465-insufficient-verification-of-data-a-efea20a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28465%3A%20CWE-290%20Authentication%20bypass%20by%20spoofing%20in%20OpenClaw%20voice-call&amp;severity=high&amp;id=69aa00a5c48b3f10ff7ae77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2593-cwe-79-improper-neutralization-of-in-8c16f488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2593%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69a9f99ec48b3f10ff5cf16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55208-cwe-79-improper-neutralization-of-i-f54629d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0848-cwe-20-improper-input-validation-in--af71c4ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0848%3A%20CWE-20%20Improper%20Input%20Validation%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69a9ef11c48b3f10ff4d0658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22723-vulnerability-in-cloudfoundry-found-a9411f93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22723%3A%20Vulnerability%20in%20Cloudfoundry%20Foundation%20UAA&amp;severity=medium&amp;id=69a9ef11c48b3f10ff4d065b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28442-cwe-73-external-control-of-file-nam-66c91287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28442%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a9ef11c48b3f10ff4d065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28413-cwe-601-url-redirection-to-untruste-64093f53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28413%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20plone%20Products.isurlinportal&amp;severity=medium&amp;id=69a9e67761e8e69ef5f7009c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-assistant-extensions-harvest-llm-chat-644bc76e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI%20Assistant%20Extensions%20Harvest%20LLM%20Chat%20Histories&amp;severity=medium&amp;id=69aabacfc48b3f10ff5537f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-american-telecommunication-providers-targete-e1d2d261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20American%20telecommunication%20providers%20targeted%20with%20three%20new%20malware%20implants&amp;severity=medium&amp;id=69aabacfc48b3f10ff55379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28410-cwe-284-improper-access-control-in--77618731</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28410%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20graphprotocol%20contracts&amp;severity=medium&amp;id=69a9e67761e8e69ef5f70098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28405-cwe-79-improper-neutralization-of-i-f136d9aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarkUsProject%20Markus&amp;severity=high&amp;id=69a9e67761e8e69ef5f70093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28353-cwe-506-embedded-malicious-code-in--facddd89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28353%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20aquasecurity%20trivy-vscode-extension&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28350-cwe-116-improper-encoding-or-escapi-f2a1a98e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28350%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e92412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28348-cwe-116-improper-encoding-or-escapi-f0e49774</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28348%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20fedora-python%20lxml_html_clean&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9240e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28343-cwe-79-improper-neutralization-of-i-9756676b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28343%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=medium&amp;id=69a9df7061e8e69ef5e51b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28277-cwe-502-deserialization-of-untruste-405e3490</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28277%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=medium&amp;id=69a9e2f561e8e69ef5e9241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13350-cwe-416-use-after-free-in-canonical-d0ad2719</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13350%3A%20CWE-416%20Use%20After%20Free%20in%20Canonical%20Ubuntu%20Linux&amp;severity=high&amp;id=69a9e2f561e8e69ef5e92419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3047-authentication-bypass-by-primary-wea-c4898340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3047%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3009-improper-authorization-in-red-hat-re-a8b6d3ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3009%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28287-cwe-78-improper-neutralization-of-s-f3029c62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28287%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3459-cwe-434-unrestricted-upload-of-file--0bb23ab9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3459%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=69a9d16b61e8e69ef5d1249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28284-cwe-89-improper-neutralization-of-s-1d52e754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28284%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28210-cwe-89-improper-neutralization-of-s-40dd310e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28210%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28209-cwe-78-improper-neutralization-of-s-a0f9d9d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20security-reporting&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7375-cwe-20-improper-input-validation-in--8934f0d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7375%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20EAP610%20v3&amp;severity=medium&amp;id=69a9c994460e1c85df139338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13476-cwe-327-use-of-a-broken-or-risky-cr-5cab70df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13476%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Rakuten%20Viber%20Rakuten%20Viber%20Cloak%20-%20Android&amp;severity=critical&amp;id=69a9c994460e1c85df139316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27944-cwe-311-missing-encryption-of-sensi-409464ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27944%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%200xJacky%20nginx-ui&amp;severity=critical&amp;id=69a9c996460e1c85df139361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24457-cwe-22-improper-limitation-of-a-pat-5ef15632</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24457%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a9c994460e1c85df13933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27723-cwe-284-improper-access-control-in--932e3277</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27723%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=69a9c996460e1c85df13935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27023-cwe-918-server-side-request-forgery-94391960</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27023%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20twentyhq%20twenty&amp;severity=medium&amp;id=69a9c996460e1c85df139358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30785-cwe-257-in-rustdesk-client-rustdesk-476aaa7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30785%3A%20CWE-257%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30784-cwe-862-missing-authorization-in-ru-97b16d4b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30784%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-server%20RustDesk%20Server&amp;severity=high&amp;id=69a9ad6c460e1c85dfe74260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30783-cwe-602-in-rustdesk-client-rustdesk-6f13408a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30783%3A%20CWE-602%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9ad6c460e1c85dfe7425d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30790-cwe-307-improper-restriction-of-exc-765a4f40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30790%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30789-cwe-294-authentication-bypass-by-ca-ea65bd02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30789%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30798-cwe-345-insufficient-verification-o-6936b5e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30798%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30797-cwe-862-missing-authorization-in-ru-9b5e712b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30797%3A%20CWE-862%20Missing%20Authorization%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9c05f460e1c85df0c5c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25048-cwe-674-uncontrolled-recursion-in-m-d4dc88f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25048%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20mlc-ai%20xgrammar&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64166-cwe-352-cross-site-request-forgery--1601b4e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64166%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mercurius-js%20mercurius&amp;severity=medium&amp;id=69a9c05f460e1c85df0c5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30796-cwe-319-cleartext-transmission-of-s-4a9cfc73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30796%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a9c05f460e1c85df0c5c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30795-cwe-319-cleartext-transmission-of-s-73da2f1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30795%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a9a2e4460e1c85dfd8771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30794-cwe-295-improper-certificate-valida-d480f40a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30794%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd8771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30793-cwe-285-in-rustdesk-client-rustdesk-991b7094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30793%3A%20CWE-285%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30792-cwe-657-in-rustdesk-client-rustdesk-c970abe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30792%3A%20CWE-657%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=critical&amp;id=69a9a2e4460e1c85dfd87713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-half-of-2025s-90-exploited-zero-days-aimed--f4c73b61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%3A%20Half%20of%202025%E2%80%99s%2090%20Exploited%20Zero-Days%20Aimed%20at%20Enterprises&amp;severity=medium&amp;id=69a99b5f224272a26dae95de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30791-cwe-327-use-of-a-broken-or-risky-cr-357ade28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30791%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-client%20RustDesk%20Client&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27748-cwe-59-improper-link-resolution-bef-b9c573ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27748%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a9529b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27749-cwe-502-deserialization-of-untruste-356af843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27749%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27750-cwe-367-time-of-check-time-of-use-t-22539585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27750%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Gen%20Digital%20Inc.%20Avira%20Internet%20Security&amp;severity=high&amp;id=69a993803bbe47dd19a952a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3598-cwe-327-use-of-a-broken-or-risky-cry-b5be621d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20rustdesk-server-pro%20RustDesk%20Server%20Pro&amp;severity=high&amp;id=69a993803bbe47dd19a952ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1720-cwe-862-missing-authorization-in-wpx-95778eab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1720%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowOptin%3A%20Next-Gen%20Popup%20Maker%20%E2%80%93%20Create%20Stunning%20Popups%20and%20Optins%20for%20Lead%20Generation&amp;severity=high&amp;id=69a988fd3bbe47dd199708fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-operator-pleads-guilty-in-us-e493b9c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Operator%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=69a97ca30e5bba37cadb2726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tech-support-delivers-havoc-command-control-59a90ba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Tech%20Support%20Delivers%20Havoc%20Command%20%26%20Control&amp;severity=medium&amp;id=69a99d4dd9f976b5b5c444b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2599-cwe-502-deserialization-of-untrusted-8a4a84f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2599%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=critical&amp;id=69a97ce30e5bba37cadb5ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-disable-unwanted-ai-assistants-and-features-54c29a8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20disable%20unwanted%20AI%20assistants%20and%20features%20on%20your%20PC%20and%20smartphone%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a9798c0e5bba37cad8d7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-more-catalyst-sd-wan-flaws-exploite-f4918229</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20More%20Catalyst%20SD-WAN%20Flaws%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=69a9759b0e5bba37cad5da4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakbase-cybercrime-forum-shut-down-suspects-arres-184a6f89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakBase%20Cybercrime%20Forum%20Shut%20Down%2C%20Suspects%20Arrested&amp;severity=medium&amp;id=69a960820e5bba37cabba3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3236-cwe-863-incorrect-authorization-in-o-bc126ace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3236%3A%20CWE-863%20Incorrect%20Authorization%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=low&amp;id=69a96ed40e5bba37cacf0189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1605-cwe-400-uncontrolled-resource-consum-0a9505ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1605%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=69a9562d0e5bba37ca990db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11143-cwe-20-improper-input-validation-in-5b9ca7d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11143%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=low&amp;id=69a952a60e5bba37ca8f75ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21628-cwe-434-unrestricted-upload-of-file-fb005d26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21628%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20astroidframe.work%20Astroid%20Template%20Framework&amp;severity=critical&amp;id=69a952a60e5bba37ca8f75b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-enterpri-60dcf18f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Enterprise%20Networking%20Products&amp;severity=critical&amp;id=69a944620e5bba37ca7a0a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28542-cwe-755-improper-handling-of-except-aeb52e45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28542%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28548-cwe-269-improper-privilege-manageme-c0b6d666</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69a9437a0e5bba37ca78f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28551-cwe-362-concurrent-execution-using--6580cf78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28551%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a9437a0e5bba37ca78f120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28549-cwe-362-concurrent-execution-using--acd96308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28549%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28547-cwe-824-access-of-uninitialized-poi-08c4edcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28547%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28546-cwe-122-heap-based-buffer-overflow--31312413</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28546%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93fcdd1a09e29cbfadbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28543-cwe-362-concurrent-execution-using--6fe78fe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28543%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28541-cwe-264-permissions-privileges-and--8d92a643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28541%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28540-cwe-158-improper-neutralization-of--82bd380c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28540%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28539-cwe-19-data-processing-errors-in-hu-36035c5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28539%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28538-cwe-24-path-traversal-filedir-in-hu-aedb987e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28538%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a93c49d1a09e29cbf84a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66319-cwe-264-permissions-privileges-and--48be1dfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66319%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69a938c5d1a09e29cbf5d4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28552-cwe-19-data-processing-errors-in-hu-1393e410</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28552%3A%20CWE-19%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28550-cwe-840-business-logic-errors-in-hu-428a1b72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28550%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28545-cwe-362-concurrent-execution-using--c73349bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28545%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28544-cwe-362-concurrent-execution-using--e438641a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28544%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a938c5d1a09e29cbf5d4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1321-cwe-862-missing-authorization-in-ste-01ad73de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1321%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=69a931c0d1a09e29cbf198c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2893-cwe-89-improper-neutralization-of-sp-0b8faf55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20carlosfazenda%20Page%20and%20Post%20Clone&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21786-cwe-532-insertion-of-sensitive-info-45210306</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21786%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HCLSoftware%20Sametime%20for%20iOS&amp;severity=low&amp;id=69a931c0d1a09e29cbf198ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28537-cwe-415-double-free-in-huawei-harmo-e37f161c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28537%3A%20CWE-415%20Double%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69a931c0d1a09e29cbf198cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28536-cwe-305-authentication-bypass-by-pr-3e5ae728</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28536%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=69a92e3cd1a09e29cbef609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25702-cwe-284-improper-access-control-in--2f29ac3b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25702%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Server&amp;severity=high&amp;id=69a92e3cd1a09e29cbef609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1678-out-of-bounds-write-in-zephyrproject-aa51fbaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1678%3A%20Out-of-bounds%20Write%20in%20zephyrproject-rtos%20Zephyr&amp;severity=critical&amp;id=69a92731d1a09e29cbeaae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2418-cwe-287-improper-authentication-in-l-1b2dce9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2418%3A%20CWE-287%20Improper%20Authentication%20in%20Login%20with%20Salesforce&amp;severity=critical&amp;id=69a9206cd1a09e29cbe6d01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28137-improper-neutralization-of-input-du-c941043d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28135-inclusion-of-functionality-from-unt-81d65bc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28135%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28134-improper-control-of-generation-of-c-67944697</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28134%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28133-unrestricted-upload-of-file-with-da-4d93fbb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28133%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28130-improper-neutralization-of-input-du-e3bed1ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28130%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28129-improper-control-of-filename-for-in-ee00e000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28129%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Little%20Birdies&amp;severity=high&amp;id=69a9206cd1a09e29cbe6d00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28128-improper-control-of-filename-for-in-1923616c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28128%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Verse&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28127-improper-neutralization-of-input-du-b3564c0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28127%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28126-improper-neutralization-of-input-du-65d31539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28126%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20RH%20Frontend%20Publishing%20Pro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28125-improper-control-of-filename-for-in-e2c0f645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28125%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Midi&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28124-improper-control-of-filename-for-in-00784f3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28124%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Notarius&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28123-improper-control-of-filename-for-in-8adfb831</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28123%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Veil&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28122-improper-neutralization-of-input-du-6f368f41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28122%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28121-improper-control-of-filename-for-in-d1180c26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28121%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Anderson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28120-improper-control-of-filename-for-in-fc28c46c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28120%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dr.Patterson&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28119-improper-control-of-filename-for-in-aabd1146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28119%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Nirvana&amp;severity=high&amp;id=69a9206ad1a09e29cbe6cf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28118-improper-control-of-filename-for-in-4860a768</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28118%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Welldone&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28117-improper-control-of-filename-for-in-9a4c50a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28117%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28115-improper-neutralization-of-special--1eebab36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28115%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28114-unrestricted-upload-of-file-with-da-5f3102b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28114%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20firassaidi%20WooCommerce%20License%20Manager&amp;severity=critical&amp;id=69a92069d1a09e29cbe6cf61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28113-improper-neutralization-of-input-du-21672d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28112-improper-neutralization-of-input-du-ded4c6e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20AllInOne%20-%20Banner%20Rotator&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28110-improper-neutralization-of-input-du-d21f4df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28110%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Playlist&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28109-improper-neutralization-of-input-du-c0f8a99d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Content%20Slider&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28108-improper-neutralization-of-input-du-82eab159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Thumbnails&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28107-improper-control-of-filename-for-in-510fedd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28107%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Muzicon&amp;severity=high&amp;id=69a92069d1a09e29cbe6cf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28105-deserialization-of-untrusted-data-i-4b189c04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28105%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Good%20Energy&amp;severity=critical&amp;id=69a92067d1a09e29cbe6cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28104-missing-authorization-in-aryan-shir-cfa838ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28104%3A%20Missing%20Authorization%20in%20Aryan%20Shirani%20Bid%20Abadi%20Site%20Suggest&amp;severity=medium&amp;id=69a92067d1a09e29cbe6cf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28103-improper-neutralization-of-input-du-af39aa6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28102-improper-neutralization-of-input-du-97c5699a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Classic&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28101-improper-neutralization-of-input-du-0b6e4bbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28101%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20MouseInteraction&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28100-improper-neutralization-of-input-du-34e884d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28100%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20PerpetuumMobile&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28099-improper-neutralization-of-input-du-19629351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20UberSlider%20Ultra&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28098-improper-control-of-filename-for-in-0ec6c859</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28098%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Save%20Life&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28097-improper-control-of-filename-for-in-8bdc49fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Artrium&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28096-improper-control-of-filename-for-in-c8db7c35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28096%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20WealthCo&amp;severity=high&amp;id=69a92067d1a09e29cbe6cf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28095-improper-control-of-filename-for-in-b03c4d5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28095%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Marcell&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28094-improper-control-of-filename-for-in-955abaa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28094%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20RexCoin&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28093-improper-control-of-filename-for-in-999684bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28093%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Ozisti&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28092-improper-control-of-filename-for-in-bbc94959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28092%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Sounder&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28091-improper-control-of-filename-for-in-f64daafe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28091%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coleo&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28090-improper-control-of-filename-for-in-53cfd3ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gamezone&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28089-improper-control-of-filename-for-in-6b4eda05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28089%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Daiquiri&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28088-improper-control-of-filename-for-in-ec3099b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28088%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aqualots&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28087-improper-control-of-filename-for-in-87269b7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Filmax&amp;severity=high&amp;id=69a92066d1a09e29cbe6cf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28086-improper-control-of-filename-for-in-f835154b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Run%20Gran&amp;severity=high&amp;id=69a92066d1a09e29cbe6ceff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28085-improper-control-of-filename-for-in-765ce10f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28085%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mahogany&amp;severity=high&amp;id=69a92064d1a09e29cbe6cebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28084-improper-control-of-filename-for-in-75aa4cf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28084%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bazinga&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28081-improper-control-of-filename-for-in-6619b6bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Windsor&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28079-improper-control-of-filename-for-in-e5dd1b45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28079%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Conquerors&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28078-improper-limitation-of-a-pathname-t-8d7dc3a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28078%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Stylemix%20uListing&amp;severity=medium&amp;id=69a92064d1a09e29cbe6ceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28077-improper-control-of-filename-for-in-7af042b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vapester&amp;severity=high&amp;id=69a92064d1a09e29cbe6cead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28076-missing-authorization-in-frenify-gu-8487132d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28076%3A%20Missing%20Authorization%20in%20Frenify%20Guff&amp;severity=high&amp;id=69a92064d1a09e29cbe6ceaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28075-improper-neutralization-of-input-du-ca12a7f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28074-deserialization-of-untrusted-data-i-0ac23ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28074%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pizza%20House&amp;severity=critical&amp;id=69a92064d1a09e29cbe6cea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28072-improper-neutralization-of-input-du-e920df06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixFort%20pixfort%20Core&amp;severity=high&amp;id=69a92064d1a09e29cbe6cea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28071-missing-authorization-in-pixfort-pi-5081bcec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28071%3A%20Missing%20Authorization%20in%20PixFort%20pixfort%20Core&amp;severity=medium&amp;id=69a92061d1a09e29cbe6ce57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28069-improper-control-of-filename-for-in-60094f69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Le%20Truffe&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28068-improper-control-of-filename-for-in-b4e10189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Rhythmo&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28067-improper-control-of-filename-for-in-26745f1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bassein&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28066-improper-control-of-filename-for-in-bdb29538</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legrand&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28065-improper-control-of-filename-for-in-2ad80c72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Eject&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28064-improper-control-of-filename-for-in-b97d1b8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edge%20Decor&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28063-improper-control-of-filename-for-in-f8decddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Asia%20Garden&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28062-improper-control-of-filename-for-in-ff932e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Happy%20Baby&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28061-improper-control-of-filename-for-in-26df6673</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tiger%20Claw&amp;severity=high&amp;id=69a92061d1a09e29cbe6ce3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28060-improper-control-of-filename-for-in-0c15d442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20S.King&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28059-improper-control-of-filename-for-in-236499f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dermatology%20Clinic&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28058-improper-control-of-filename-for-in-cf407b28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Dixon&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28057-improper-control-of-filename-for-in-ec1b273e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Mandala&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28056-improper-control-of-filename-for-in-373db8c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MCKinney&apos;s%20Politics&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28055-improper-control-of-filename-for-in-024d6f86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20M.Williamson&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28054-improper-control-of-filename-for-in-ade08240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Legal%20Stone&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28053-improper-control-of-filename-for-in-ba94b1aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Miller&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28052-improper-control-of-filename-for-in-5210e6d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Peter%20Mason&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28051-improper-control-of-filename-for-in-26a00534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yacht%20Rental&amp;severity=high&amp;id=69a9205fd1a09e29cbe6cd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28050-improper-control-of-filename-for-in-11ea84ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Beacon&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28049-improper-control-of-filename-for-in-8faec466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Police%20Department&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28048-improper-control-of-filename-for-in-ef6a6283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20FlashMart&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28047-improper-control-of-filename-for-in-826236d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Victo&amp;severity=high&amp;id=69a9205dd1a09e29cbe69baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28046-improper-control-of-filename-for-in-51cbc58c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Law%20Office&amp;severity=high&amp;id=69a9205dd1a09e29cbe69bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28045-improper-control-of-filename-for-in-2fdee9df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20N7%20%7C%20Golf%20Club%20Sports%20%26%20Events&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28043-improper-control-of-filename-for-in-d9ece99f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Healer%20-%20Doctor%2C%20Clinic%20%26%20Medical%20WordPress%20Theme&amp;severity=critical&amp;id=69a9205dd1a09e29cbe69ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28042-improper-neutralization-of-input-du-ff3eb323</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Listify&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28041-improper-control-of-filename-for-in-b50b73c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Grit&amp;severity=high&amp;id=69a9205dd1a09e29cbe69ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28038-missing-authorization-in-brainstorm-d0becb86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28038%3A%20Missing%20Authorization%20in%20Brainstorm_Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69a9205dd1a09e29cbe69b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28037-improper-neutralization-of-input-du-e9083dcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28036-server-side-request-forgery-ssrf-in-3609b380</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28036%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SkatDesign%20Ratatouille&amp;severity=medium&amp;id=69a9205bd1a09e29cbe69b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28035-improper-control-of-filename-for-in-0b6138fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28035%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Printy&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28034-improper-control-of-filename-for-in-1efa764b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Progress&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28033-improper-control-of-filename-for-in-6042504f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28033%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Edifice&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28032-improper-control-of-filename-for-in-00e05904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28032%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tuning&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28031-improper-control-of-filename-for-in-2dd9c45a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28031%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Invetex&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28030-improper-control-of-filename-for-in-2aab436d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28030%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Bonbon&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28029-improper-control-of-filename-for-in-59d71a4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20EmojiNation&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28028-improper-control-of-filename-for-in-685d0513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28028%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20MoneyFlow&amp;severity=high&amp;id=69a9205bd1a09e29cbe69b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28027-improper-control-of-filename-for-in-7d3878a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kayon&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28026-improper-control-of-filename-for-in-0e5767c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28026%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Motorix&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28025-improper-control-of-filename-for-in-038c8f04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28025%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Stargaze&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28024-improper-control-of-filename-for-in-35450740</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28024%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Helion&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28023-improper-control-of-filename-for-in-80e0d822</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28023%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Nuts&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28022-improper-control-of-filename-for-in-b838d177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28022%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Foodie&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28021-improper-control-of-filename-for-in-27adebf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28021%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Craftis&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28020-improper-control-of-filename-for-in-6406328a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28020%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Chroma&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28019-improper-control-of-filename-for-in-e5d0049e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28019%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Manoir&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28018-improper-control-of-filename-for-in-ccd68ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28018%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Global%20Logistics&amp;severity=high&amp;id=69a9205ad1a09e29cbe69b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28017-improper-control-of-filename-for-in-2390eba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Green%20Thumb&amp;severity=high&amp;id=69a92058d1a09e29cbe69b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28016-improper-control-of-filename-for-in-7a1e7f00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28016%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Luxury%20Wine&amp;severity=high&amp;id=69a92058d1a09e29cbe69b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28015-improper-control-of-filename-for-in-5b68c2a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ShiftCV&amp;severity=high&amp;id=69a92058d1a09e29cbe69b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28014-improper-control-of-filename-for-in-757c6072</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Translogic&amp;severity=high&amp;id=69a92058d1a09e29cbe69b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28013-improper-control-of-filename-for-in-a1601827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28013%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Kratz&amp;severity=high&amp;id=69a92058d1a09e29cbe69aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28012-improper-control-of-filename-for-in-aafc03f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28012%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gridiron&amp;severity=high&amp;id=69a92058d1a09e29cbe69afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28011-improper-control-of-filename-for-in-a5fc4a54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28011%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yottis&amp;severity=high&amp;id=69a92058d1a09e29cbe69af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28010-improper-control-of-filename-for-in-a162a3c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Scientia&amp;severity=high&amp;id=69a92058d1a09e29cbe69af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28009-improper-control-of-filename-for-in-dc66f9f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28009%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20DroneX&amp;severity=high&amp;id=69a92058d1a09e29cbe69af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28007-improper-control-of-filename-for-in-99021ba4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28007%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Coinpress&amp;severity=high&amp;id=69a92058d1a09e29cbe69af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28006-improper-control-of-filename-for-in-a4ecdcbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28006%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yungen&amp;severity=high&amp;id=69a92057d1a09e29cbe69ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27998-improper-control-of-filename-for-in-12ca101c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27998%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Vixus&amp;severity=high&amp;id=69a92057d1a09e29cbe69aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27997-improper-control-of-filename-for-in-77e50207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27997%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Maxify&amp;severity=high&amp;id=69a92057d1a09e29cbe69aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27996-improper-control-of-filename-for-in-62aafe73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Lingvico&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27995-improper-control-of-filename-for-in-aa24d396</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Justitia&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27994-improper-control-of-filename-for-in-a1fd84c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tediss&amp;severity=high&amp;id=69a92057d1a09e29cbe69aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27993-improper-control-of-filename-for-in-041f00ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27993%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Aldo&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27992-improper-control-of-filename-for-in-da0000f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Meals%20%26%20Wheels&amp;severity=high&amp;id=69a92057d1a09e29cbe69a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27991-improper-control-of-filename-for-in-e256ab83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27991%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Avventure&amp;severity=high&amp;id=69a92057d1a09e29cbe69a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27990-improper-control-of-filename-for-in-a9f96a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27990%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20ConFix&amp;severity=high&amp;id=69a92057d1a09e29cbe69a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27989-improper-control-of-filename-for-in-f028553d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27989%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Quanzo&amp;severity=high&amp;id=69a92055d1a09e29cbe69a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27988-improper-control-of-filename-for-in-7f90503a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Equadio&amp;severity=high&amp;id=69a92055d1a09e29cbe69a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27987-improper-control-of-filename-for-in-0025b225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20The%20Qlean&amp;severity=high&amp;id=69a92055d1a09e29cbe69a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27986-improper-control-of-filename-for-in-f2123586</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27986%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20OsTende&amp;severity=high&amp;id=69a92055d1a09e29cbe69a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27985-improper-control-of-filename-for-in-d33935f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Humanum&amp;severity=high&amp;id=69a92055d1a09e29cbe69a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27984-improper-control-of-generation-of-c-d48e285a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27984%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27983-incorrect-privilege-assignment-in-d-cf32648b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27983%3A%20Incorrect%20Privilege%20Assignment%20in%20designthemes%20LMS%20Elementor%20Pro&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27541-incorrect-privilege-assignment-in-j-9a7e8fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27541%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=69a92055d1a09e29cbe69a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27439-deserialization-of-untrusted-data-i-63eba95d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27439%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Dentario&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27438-deserialization-of-untrusted-data-i-b424714d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27438%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Kingler&amp;severity=critical&amp;id=69a92055d1a09e29cbe69a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27437-deserialization-of-untrusted-data-i-403814d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27437%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Tennis%20Club&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27428-improper-neutralization-of-special--bfd793a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27428%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=69a92053d1a09e29cbe69a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27417-deserialization-of-untrusted-data-i-f4ac8888</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SeventhQueen%20Sweet%20Date&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27411-guessable-captcha-in-jp-secure-site-7081f6e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27411%3A%20Guessable%20CAPTCHA%20in%20jp-secure%20SiteGuard%20WP%20Plugin&amp;severity=medium&amp;id=69a92053d1a09e29cbe69a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27406-insertion-of-sensitive-information--c759245d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27406%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=high&amp;id=69a92053d1a09e29cbe69a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27396-missing-authorization-in-e-plugins--7a7a7e71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27396%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=69a92053d1a09e29cbe69a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27390-authentication-bypass-using-an-alte-41148b94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27390%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27389-authentication-bypass-using-an-alte-aec8b6d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27389%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20designthemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=critical&amp;id=69a92053d1a09e29cbe69a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27388-missing-authorization-in-designthem-4eb7163c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27388%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Booking%20Manager&amp;severity=high&amp;id=69a92053d1a09e29cbe69a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27386-missing-authorization-in-designthem-e450ed01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27386%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20Directory%20Addon&amp;severity=high&amp;id=69a92053d1a09e29cbe69a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27385-improper-neutralization-of-input-du-d65b28b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27385%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio&amp;severity=high&amp;id=69a92052d1a09e29cbe69995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27384-improper-validation-of-specified-qu-541ac9e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27384%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20BoldGrid%20W3%20Total%20Cache&amp;severity=critical&amp;id=69a92052d1a09e29cbe69992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27383-improper-control-of-filename-for-in-a0717a1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27382-improper-neutralization-of-input-du-af6905cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Metro&amp;severity=high&amp;id=69a92052d1a09e29cbe6998c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27381-improper-control-of-filename-for-in-d7e4f02a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=high&amp;id=69a92052d1a09e29cbe69989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27376-improper-neutralization-of-input-du-d7b9308c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Claue%20-%20Clean%2C%20Minimal%20Elementor%20WooCommerce%20Theme&amp;severity=high&amp;id=69a92052d1a09e29cbe69986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27375-improper-neutralization-of-input-du-0a641b64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27375%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JanStudio%20Gecko&amp;severity=high&amp;id=69a92052d1a09e29cbe69983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27374-missing-authorization-in-vanquish-w-68390e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27374%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Order%20Details&amp;severity=high&amp;id=69a92051d1a09e29cbe69980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27373-improper-neutralization-of-special--971d812f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27373%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=69a92051d1a09e29cbe6997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27370-insertion-of-sensitive-information--279a6a34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27370%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Premio%20Chaty&amp;severity=high&amp;id=69a92051d1a09e29cbe6997a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27369-deserialization-of-untrusted-data-i-760b76dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27369%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Celeste&amp;severity=high&amp;id=69a92050d1a09e29cbe6996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27367-improper-neutralization-of-input-du-061da31a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Musico&amp;severity=high&amp;id=69a92050d1a09e29cbe6996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27363-improper-neutralization-of-input-du-2181ae7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27363%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=high&amp;id=69a92050d1a09e29cbe69967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27362-missing-authorization-in-kamleshyad-456b5eb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27362%3A%20Missing%20Authorization%20in%20kamleshyadav%20WP%20Bakery%20Autoresponder%20Addon&amp;severity=medium&amp;id=69a92050d1a09e29cbe69964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27361-missing-authorization-in-webcodingp-a42d6412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27361%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=69a92050d1a09e29cbe69961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27359-improper-neutralization-of-input-du-dd7a632d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Awa%20Plugins&amp;severity=high&amp;id=69a92050d1a09e29cbe6995e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27358-improper-neutralization-of-input-du-9ef29754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Architecturer&amp;severity=high&amp;id=69a92050d1a09e29cbe6995b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27354-improper-neutralization-of-input-du-9dc82acf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=medium&amp;id=69a92050d1a09e29cbe69958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27353-improper-neutralization-of-input-du-6033291d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20News&amp;severity=high&amp;id=69a92050d1a09e29cbe69955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27352-improper-neutralization-of-input-du-48680ff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Starto&amp;severity=high&amp;id=69a92050d1a09e29cbe69952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27348-improper-neutralization-of-input-du-916d628b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=69a9204fd1a09e29cbe6993a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27344-missing-authorization-in-inseriswis-acb5351c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27344%3A%20Missing%20Authorization%20in%20inseriswiss%20inseri%20core&amp;severity=medium&amp;id=69a9204fd1a09e29cbe69937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27342-improper-control-of-filename-for-in-b223740e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopFit%20-%20Fitness%20and%20Gym%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27341-improper-control-of-filename-for-in-07040eac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27341%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20TopScorer%20-%20Sports%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27340-improper-control-of-filename-for-in-649037d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27340%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Apollo%20%7C%20Night%20Club%2C%20DJ%20Event%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27339-improper-control-of-filename-for-in-0d751dca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Buzz%20Stone%20%7C%20Magazine%20%26%20Viral%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6992b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27338-deserialization-of-untrusted-data-i-c9ca4dcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27338%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Car%20Zone&amp;severity=high&amp;id=69a9204fd1a09e29cbe69928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27337-improper-control-of-filename-for-in-c7e0865a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27337%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chronicle%20-%20Lifestyle%20Magazine%20%26%20Blog%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27336-improper-control-of-filename-for-in-14ec8c54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27336%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Consultor%20%7C%20Consulting%2C%20Accounting%20%26%20Legal%20Counsel%20WordPress%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe69922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27335-improper-control-of-filename-for-in-81980ea3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ekoterra%20-%20NonProfit%2C%20Green%20Energy%20%26%20Ecology%20Theme&amp;severity=high&amp;id=69a9204fd1a09e29cbe6991f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27334-improper-control-of-filename-for-in-b3419336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27334%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dan_fisher%20Alchemists&amp;severity=high&amp;id=69a9204dd1a09e29cbe69912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27332-improper-neutralization-of-input-du-e06e212b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Agrofood&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27326-improper-control-of-filename-for-in-5f8d2dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20AC%20Services%20%7C%20HVAC%2C%20Air%20Conditioning%20%26%20Heating%20Company%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe6990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27098-deserialization-of-untrusted-data-i-11591bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27098%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Au%20Pair%20Agency%20-%20Babysitting%20%26%20Nanny%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27097-improper-control-of-filename-for-in-03e1caa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CasaMia%20%7C%20Property%20Rental%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=69a9204dd1a09e29cbe69906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24963-incorrect-privilege-assignment-in-a-797c6fe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24963%3A%20Incorrect%20Privilege%20Assignment%20in%20ameliabooking%20Amelia&amp;severity=high&amp;id=69a9204dd1a09e29cbe69903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24960-unrestricted-upload-of-file-with-da-2d924f8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24960%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Charety&amp;severity=critical&amp;id=69a9204dd1a09e29cbe69900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24385-deserialization-of-untrusted-data-i-63919416</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24385%3A%20Deserialization%20of%20Untrusted%20Data%20in%20gerritvanaaken%20Podlove%20Web%20Player&amp;severity=high&amp;id=69a9204dd1a09e29cbe698fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23802-unrestricted-upload-of-file-with-da-19d38ea8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23802%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Jordy%20Meow%20AI%20Engine&amp;severity=critical&amp;id=69a9204dd1a09e29cbe698fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23801-improper-control-of-filename-for-in-4391710d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23801%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20The%20Issue&amp;severity=high&amp;id=69a9204dd1a09e29cbe698f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23799-missing-authorization-in-themeum-tu-99e647be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23799%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23798-deserialization-of-untrusted-data-i-1df0e723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23798%3A%20Deserialization%20of%20Untrusted%20Data%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=high&amp;id=69a9204cd1a09e29cbe698d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23546-insertion-of-sensitive-information--e32c6a86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23546%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20RadiusTheme%20Classified%20Listing&amp;severity=medium&amp;id=69a9204cd1a09e29cbe698d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22501-deserialization-of-untrusted-data-i-99d52e1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22501%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Mounthood&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22497-deserialization-of-untrusted-data-i-30f5a2c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22497%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Jardi&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22479-missing-authorization-in-themeruby--966dbed0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22479%3A%20Missing%20Authorization%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=high&amp;id=69a9204cd1a09e29cbe698cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22478-improper-control-of-filename-for-in-85bc5149</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22478%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20FindAll&amp;severity=high&amp;id=69a9204cd1a09e29cbe698ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22477-improper-control-of-filename-for-in-e68163d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22477%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Felizia&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22476-improper-control-of-filename-for-in-8b3dac27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22476%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Etchy&amp;severity=high&amp;id=69a9204cd1a09e29cbe698c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22475-deserialization-of-untrusted-data-i-fdb7016e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22475%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Estate&amp;severity=critical&amp;id=69a9204cd1a09e29cbe698c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22474-deserialization-of-untrusted-data-i-3cd33ca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22474%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Equestrian%20Centre&amp;severity=critical&amp;id=69a9204ad1a09e29cbe698a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22473-deserialization-of-untrusted-data-i-73086e9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22473%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Dental%20Clinic&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22471-deserialization-of-untrusted-data-i-5a025546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22471%3A%20Deserialization%20of%20Untrusted%20Data%20in%20maximsecudeal%20Secudeal%20Payments%20for%20Ecommerce&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22467-improper-neutralization-of-input-du-f26411c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mwtemplates%20DeepDigital&amp;severity=high&amp;id=69a9204ad1a09e29cbe698a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22465-improper-neutralization-of-input-du-bdb628c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20BuddyApp&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22460-improper-limitation-of-a-pathname-t-fd2b1f28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22460%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpWax%20FormGent&amp;severity=high&amp;id=69a9204ad1a09e29cbe6989a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22459-missing-authorization-in-blend-medi-92549eee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22459%3A%20Missing%20Authorization%20in%20Blend%20Media%20WordPress%20CTA&amp;severity=medium&amp;id=69a9204ad1a09e29cbe69897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22457-improper-control-of-filename-for-in-868a0150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wanderland&amp;severity=high&amp;id=69a9204ad1a09e29cbe69894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22456-improper-control-of-filename-for-in-ae786313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22456%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Askka&amp;severity=high&amp;id=69a9204ad1a09e29cbe69891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22455-improper-neutralization-of-input-du-4ccc05ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thebe&amp;severity=high&amp;id=69a9204ad1a09e29cbe6988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22454-deserialization-of-untrusted-data-i-877aac02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22454%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Solaris&amp;severity=critical&amp;id=69a92049d1a09e29cbe69841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22453-deserialization-of-untrusted-data-i-d455e2c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22453%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Pets%20Club&amp;severity=critical&amp;id=69a92049d1a09e29cbe6983e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22452-improper-control-of-filename-for-in-300b3ba9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22452%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hoverex&amp;severity=high&amp;id=69a92049d1a09e29cbe6983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22451-deserialization-of-untrusted-data-i-bc4a2c4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22451%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Handyman&amp;severity=critical&amp;id=69a92049d1a09e29cbe69838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22449-improper-control-of-filename-for-in-92a5942f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Don%20Peppe&amp;severity=high&amp;id=69a92049d1a09e29cbe69835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22446-improper-control-of-filename-for-in-d1d7804b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=high&amp;id=69a92049d1a09e29cbe69832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22443-improper-control-of-filename-for-in-37f6a4c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Alliance&amp;severity=high&amp;id=69a92049d1a09e29cbe6982f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22442-improper-control-of-filename-for-in-2b886240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LaunchandSell%20Tribe&amp;severity=high&amp;id=69a92049d1a09e29cbe6982c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22441-improper-control-of-filename-for-in-8462f283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Zentrum&amp;severity=high&amp;id=69a92049d1a09e29cbe69829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22440-improper-neutralization-of-input-du-6a9ec730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20Thecs&amp;severity=high&amp;id=69a92049d1a09e29cbe69826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22439-improper-control-of-filename-for-in-92017b3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Green%20Planet&amp;severity=high&amp;id=69a92047d1a09e29cbe69805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22438-improper-neutralization-of-input-du-cd3f5d58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheBi&amp;severity=high&amp;id=69a92047d1a09e29cbe69802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22437-improper-control-of-filename-for-in-c8697122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playa&amp;severity=high&amp;id=69a92047d1a09e29cbe697ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22436-improper-control-of-filename-for-in-d8253faf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Helvig&amp;severity=high&amp;id=69a92047d1a09e29cbe697fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22435-improper-control-of-filename-for-in-b7bce220</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ElectroServ&amp;severity=high&amp;id=69a92047d1a09e29cbe697f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22434-improper-control-of-filename-for-in-d5cb92d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Crown%20Art&amp;severity=high&amp;id=69a92047d1a09e29cbe697f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22433-improper-control-of-filename-for-in-fb1443bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CloudMe&amp;severity=high&amp;id=69a92047d1a09e29cbe697f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22432-improper-control-of-filename-for-in-13d73b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Woopy&amp;severity=high&amp;id=69a92047d1a09e29cbe697f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22431-improper-control-of-filename-for-in-bfe90a6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wabi-Sabi&amp;severity=high&amp;id=69a92047d1a09e29cbe697ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22429-improper-control-of-filename-for-in-08e3884d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Verdure&amp;severity=high&amp;id=69a92047d1a09e29cbe697ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22428-improper-control-of-filename-for-in-543d64d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22428%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tooth%20Fairy&amp;severity=high&amp;id=69a92045d1a09e29cbe697a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22427-improper-control-of-filename-for-in-14d5f2b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22427%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20GoTravel&amp;severity=high&amp;id=69a92045d1a09e29cbe697a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22425-improper-control-of-filename-for-in-f35c03aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22425%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=high&amp;id=69a92045d1a09e29cbe697a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22424-improper-control-of-filename-for-in-ca180096</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22424%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Shaha&amp;severity=high&amp;id=69a92045d1a09e29cbe6979d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22423-improper-control-of-filename-for-in-ef3a1c6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22423%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20SetSail&amp;severity=high&amp;id=69a92045d1a09e29cbe6979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22421-improper-control-of-filename-for-in-bb63cc46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22421%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Quantum&amp;severity=high&amp;id=69a92045d1a09e29cbe69797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22420-improper-control-of-filename-for-in-503c4017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22420%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Horizon&amp;severity=high&amp;id=69a92045d1a09e29cbe69794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22419-improper-control-of-filename-for-in-61a3c05c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22419%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Honor&amp;severity=high&amp;id=69a92045d1a09e29cbe69791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22418-improper-control-of-filename-for-in-6486ba9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22418%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Great%20Lotus&amp;severity=high&amp;id=69a92045d1a09e29cbe6978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22417-deserialization-of-untrusted-data-i-623bd60f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Wedding&amp;severity=high&amp;id=69a92045d1a09e29cbe6978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22416-improper-control-of-filename-for-in-a2d7893e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22416%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20FixTeam&amp;severity=high&amp;id=69a92043d1a09e29cbe6976b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22415-improper-control-of-filename-for-in-5cb350fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22415%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Mounty&amp;severity=high&amp;id=69a92043d1a09e29cbe69768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22414-improper-control-of-filename-for-in-aa35a28f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22414%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Marra&amp;severity=high&amp;id=69a92043d1a09e29cbe69765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22413-improper-control-of-filename-for-in-ac890de3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22413%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Malgr%C3%A9&amp;severity=high&amp;id=69a92043d1a09e29cbe69762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22412-improper-control-of-filename-for-in-d10b6e07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22412%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Eona&amp;severity=high&amp;id=69a92043d1a09e29cbe6975f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22410-improper-control-of-filename-for-in-0e344228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Dolcino&amp;severity=high&amp;id=69a92043d1a09e29cbe6975c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22408-improper-control-of-filename-for-in-2599dfe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Justicia&amp;severity=high&amp;id=69a92043d1a09e29cbe69759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22405-improper-control-of-filename-for-in-309c37ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22405%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Overton&amp;severity=high&amp;id=69a92043d1a09e29cbe69756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22403-improper-control-of-filename-for-in-37688ae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22403%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Innovio&amp;severity=high&amp;id=69a92043d1a09e29cbe69753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22399-improper-control-of-filename-for-in-9c204200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Holmes&amp;severity=high&amp;id=69a92043d1a09e29cbe69750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22397-improper-control-of-filename-for-in-a2cedb55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fleur&amp;severity=high&amp;id=69a92041d1a09e29cbe696f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22395-improper-control-of-filename-for-in-2eececbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Fiorello&amp;severity=high&amp;id=69a92041d1a09e29cbe696f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22394-improper-control-of-filename-for-in-35a399ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22394%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Evently&amp;severity=high&amp;id=69a92041d1a09e29cbe696ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22392-improper-control-of-filename-for-in-563f1427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22392%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cortex&amp;severity=high&amp;id=69a92041d1a09e29cbe696eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22390-improper-control-of-generation-of-c-c30abc34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22390%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=critical&amp;id=69a92041d1a09e29cbe696e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22389-improper-control-of-filename-for-in-8194ceac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22389%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Cocco&amp;severity=high&amp;id=69a92041d1a09e29cbe696e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22387-improper-control-of-filename-for-in-142b7be4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Aviana&amp;severity=high&amp;id=69a92041d1a09e29cbe696e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22385-improper-control-of-filename-for-in-02aa55fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22385%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Wolmart&amp;severity=high&amp;id=69a92041d1a09e29cbe696df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69411-improper-limitation-of-a-pathname-t-2cfd9ad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69411%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robert%20Seyfriedsberger%20ionCube%20tester%20plus&amp;severity=high&amp;id=69a92041d1a09e29cbe696dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69343-improper-neutralization-of-input-du-0837cb58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=69a92041d1a09e29cbe696d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69340-missing-authorization-in-buddhathem-02241919</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69340%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=high&amp;id=69a9203fd1a09e29cbe696bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69339-improper-control-of-filename-for-in-5f15ca00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Molla&amp;severity=high&amp;id=69a9203fd1a09e29cbe696ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69338-improper-neutralization-of-special--1af8d4c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69338%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Riode%20Core&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69090-improper-control-of-filename-for-in-f710c44c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69090%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Remons&amp;severity=high&amp;id=69a9203fd1a09e29cbe696b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68555-unrestricted-upload-of-file-with-da-5ac31c3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68555%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Nutrie&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68554-unrestricted-upload-of-file-with-da-a493cdbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68554%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Keenarch&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68553-unrestricted-upload-of-file-with-da-cd37dfb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68553%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Lendiz&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68515-insertion-of-sensitive-information--62331a0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68515%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Roland%20Murg%20WP%20Booking%20System&amp;severity=medium&amp;id=69a9203fd1a09e29cbe696a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54001-deserialization-of-untrusted-data-i-e9d6138e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54001%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Classter&amp;severity=critical&amp;id=69a9203fd1a09e29cbe696a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53335-improper-control-of-filename-for-in-9d2967e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53335%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Berger&amp;severity=high&amp;id=69a9203fd1a09e29cbe696a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29053-cwe-74-improper-neutralization-of-s-51d11c69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29053%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=69a91cb5d1a09e29cbe4c25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29052-cwe-79-improper-neutralization-of-i-43c74935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29052%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humhub%20calendar&amp;severity=medium&amp;id=69a91cb5d1a09e29cbe4c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23767-missing-authentication-for-critical-37ea4536</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23767%3A%20Missing%20authentication%20for%20critical%20function%20in%20Seiko%20Epson%20Corporation%20ESC%2FPOS&amp;severity=critical&amp;id=69a91cb5d1a09e29cbe4c252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30777-authentication-bypass-using-an-alte-e04cf396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30777%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20EC-CUBE%20CO.%2CLTD.%20EC-CUBE%204.1%20series&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27982-url-redirection-to-untrusted-site-o-049b9d08</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27982%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20allauth%20django-allauth&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3072-cwe-862-missing-authorization-in-dgl-1e291b23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3072%3A%20CWE-862%20Missing%20Authorization%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=69a915a0d1a09e29cbe15ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29128-cwe-522-insufficiently-protected-cr-67a32621</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29128%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a915a0d1a09e29cbe15aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3523-cwe-89-improper-neutralization-of-sp-c5526c0e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3523%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20blobfolio%20Apocalypse%20Meow&amp;severity=medium&amp;id=69a90b11d1a09e29cbdaab81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-ios-exploit-kit-coruna-found-powering-b64cff88</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20iOS%20Exploit%20Kit%20%E2%80%98Coruna%E2%80%99%20Found%20Powering%20Global%20Attacks&amp;severity=medium&amp;id=69a903d6d1a09e29cbbe0e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2899-cwe-862-missing-authorization-in-tec-1e943f40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2899%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3034-cwe-79-improper-neutralization-of-in-49065add</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sagarpatel124%20OoohBoi%20Steroids%20for%20Elementor&amp;severity=medium&amp;id=69a90085d1a09e29cbba97b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2365-cwe-79-improper-neutralization-of-in-e1b09f37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a90085d1a09e29cbba97ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29127-cwe-269-improper-privilege-manageme-e5c7745e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29127%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26034-incorrect-default-permissions-in-de-ce6196d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26034%3A%20Incorrect%20default%20permissions%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=high&amp;id=69a8f5fbd1a09e29cbacc592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26033-unquoted-search-path-or-element-in--dd92d150</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26033%3A%20Unquoted%20search%20path%20or%20element%20in%20Dell%20Inc.%20UPS%20Multi-UPS%20Management%20Console%20(MUMC)&amp;severity=medium&amp;id=69a8f5fbd1a09e29cbacc58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/differentiating-between-a-targeted-intrusion-and-a-40c30509</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Differentiating%20Between%20a%20Targeted%20Intrusion%20and%20an%20Automated%20Opportunistic%20Scanning%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a8eb3ad1a09e29cba41920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57854-cwe-338-use-of-cryptographically-we-ad4e767f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57854%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DOUGDUDE%20Net%3A%3ANSCA%3A%3AClient&amp;severity=critical&amp;id=69a8f5fbd1a09e29cbacc58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29126-cwe-732-incorrect-permission-assign-601890c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29126%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40931-cwe-340-generation-of-predictable-n-2e8b6bd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40931%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20CHORNY%20Apache%3A%3ASession%3A%3AGenerate%3A%3AMD5&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29125-cwe-732-incorrect-permission-assign-edae591f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29125%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3257-cwe-1395-dependency-on-vulnerable-th-51180545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3257%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20TOKUHIROM%20UnQLite&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3381-cwe-1395-dependency-on-vulnerable-th-477a2de6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3381%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20PMQS%20Compress%3A%3ARaw%3A%3AZlib&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40926-cwe-340-generation-of-predictable-n-bc6c4282</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40926%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KAZEBURO%20Plack%3A%3AMiddleware%3A%3ASession%3A%3ASimple&amp;severity=critical&amp;id=69a8e7f5d1a09e29cba26c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29124-cwe-269-improper-privilege-manageme-bd7d8889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29124%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8e7f5d1a09e29cba26c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29123-cwe-269-improper-privilege-manageme-a521f86f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29123%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29122-cwe-269-improper-privilege-manageme-f4a310aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29122%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8dd5dd1a09e29cb9d46ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29121-cwe-269-improper-privilege-manageme-59cf4f7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29121%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20International%20Datacasting%20Corporation%20SFX2100%20Satellite%20Receiver&amp;severity=high&amp;id=69a8d655d1a09e29cb94528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-05-ac68c866</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-05&amp;severity=medium&amp;id=69aa1c8cc48b3f10ff8ed5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70995-na-8ec01cad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70995%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70949-na-4f28d6ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70949%3A%20n%2Fa&amp;severity=high&amp;id=69a9f294c48b3f10ff5116c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70948-na-00703f46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70948%3A%20n%2Fa&amp;severity=critical&amp;id=69a9f294c48b3f10ff5116c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70614-na-ea052519</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70614%3A%20n%2Fa&amp;severity=high&amp;id=69a9e67761e8e69ef5f70090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29165-na-53b6caed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29165%3A%20n%2Fa&amp;severity=critical&amp;id=69a9e2f561e8e69ef5e92409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70616-na-996c656a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70616%3A%20n%2Fa&amp;severity=high&amp;id=69a9d16b61e8e69ef5d12480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26418-na-62db3068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26418%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df139353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26417-na-8d4849de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26417%3A%20n%2Fa&amp;severity=high&amp;id=69a9c996460e1c85df13934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26416-na-edaf16a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26416%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70233-na-c8f3916e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70233%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70232-na-2519a946</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70232%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13932e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70231-na-dfe379a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70231%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70230-na-1652c7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70230%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df139324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70229-na-248a175b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70229%3A%20n%2Fa&amp;severity=critical&amp;id=69a9c994460e1c85df13931f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45691-na-928afead</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45691%3A%20n%2Fa&amp;severity=high&amp;id=69a9c994460e1c85df139319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26377-na-1652a603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26377%3A%20n%2Fa&amp;severity=medium&amp;id=69a9a2e4460e1c85dfd8770e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69534-na-6020ab11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69534%3A%20n%2Fa&amp;severity=high&amp;id=69a99d83d9f976b5b5c65c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-05-130e5843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-05&amp;severity=medium&amp;id=69a99b5b224272a26dae5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-05-3423470b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-05&amp;severity=low&amp;id=69a99b5b224272a26dae5f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2836-vulnerability-in-cloudflare-httpsgit-c71c61fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2836%3A%20Vulnerability%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=high&amp;id=69a8c847d1a09e29cb860502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2835-cwe-444-inconsistent-interpretation--a3f6db67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2835%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c4c1d1a09e29cb83c419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22052-209-in-netapp-ontap-9-6c596002</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22052%3A%20209%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=69a8c142d1a09e29cb82aab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2833-cwe-444-inconsistent-interpretation--c3ebdcf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2833%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cloudflare%20https%3A%2F%2Fgithub.com%2Fcloudflare%2Fpingora&amp;severity=critical&amp;id=69a8c142d1a09e29cb82aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41257-cwe-20-improper-input-validation-in-7d1c9b29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41257%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Suprema%20BioStar%202&amp;severity=medium&amp;id=69a8cbd6d1a09e29cb893ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2297-vulnerability-in-python-software-fou-a603ade6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2297%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29085-cwe-74-improper-neutralization-of-s-f874f2fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29085%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29045-cwe-177-improper-handling-of-url-en-89e68b18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29045%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20honojs%20hono&amp;severity=high&amp;id=69a8afacd1a09e29cb7ac71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29086-cwe-1113-inappropriate-comment-styl-b5935525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29086%3A%20CWE-1113%3A%20Inappropriate%20Comment%20Style%20in%20honojs%20hono&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26002-cwe-74-improper-neutralization-of-s-04c291ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OSC%20ondemand&amp;severity=medium&amp;id=69a8afacd1a09e29cb7ac718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25750-cwe-74-improper-neutralization-of-s-2b0c1429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25750%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20helm&amp;severity=high&amp;id=69a8cbd6d1a09e29cb893bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29000-cwe-347-improper-verification-of-cr-c33a53b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29000%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20pac4j%20pac4j-jwt&amp;severity=critical&amp;id=69a8ac26d1a09e29cb796104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66024-cwe-79-improper-neutralization-of-i-78d8568e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66024%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20application-blog-ui&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27898-cwe-639-authorization-bypass-throug-bcfc5722</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27898%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8ac26d1a09e29cb796101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27803-cwe-269-improper-privilege-manageme-445e7709</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27803%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27802-cwe-269-improper-privilege-manageme-b8681d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27802%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dani-garcia%20vaultwarden&amp;severity=high&amp;id=69a8ac26d1a09e29cb7960fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27801-cwe-307-improper-restriction-of-exc-ca82586a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27801%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=69a8a8a2d1a09e29cb7830cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-tycoon2fa-how-a-leading-aitm-phishing-kit-o-304fb781</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Tycoon2FA%3A%20How%20a%20leading%20AiTM%20phishing%20kit%20operated%20at%20scale&amp;severity=medium&amp;id=69a94eed0e5bba37ca88cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-infrastructure-in-focus-mapping-state--e1c5a95a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20Infrastructure%20in%20Focus%3A%20Mapping%20State-Aligned%20Clusters%20During%20Geopolitical%20Escalation&amp;severity=medium&amp;id=69a94eed0e5bba37ca88ce8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ssl-certificates-and-graph-theory-to-uncover-fac7451c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20SSL%20Certificates%20and%20Graph%20Theory%20to%20Uncover%20Threat%20Actors&amp;severity=medium&amp;id=69a952710e5bba37ca8f2edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28435-cwe-400-uncontrolled-resource-consu-a7a1b56e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69a88c81d1a09e29cb6b4cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28434-cwe-200-exposure-of-sensitive-infor-53bb8ea6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28434%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28427-cwe-22-improper-limitation-of-a-pat-1d9c15cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28427%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nekename%20OpenDeck&amp;severity=medium&amp;id=69a88c81d1a09e29cb6b4cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3545-insufficient-data-validation-in-goog-72f3544b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3545%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=critical&amp;id=69a88902d1a09e29cb6a246a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3544-heap-buffer-overflow-in-google-chrom-fc3d6571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3544%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3543-inappropriate-implementation-in-goog-9824fbf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3543%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3542-inappropriate-implementation-in-goog-a5d2125e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3542%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3541-inappropriate-implementation-in-goog-eb2f2edf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3541%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a245a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3540-inappropriate-implementation-in-goog-75231b89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3540%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3539-object-lifecycle-issue-in-google-chr-f63ab81a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3539%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3538-integer-overflow-in-google-chrome-0397ca92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3538%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3537-object-lifecycle-issue-in-google-chr-f7411df0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3537%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a244a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3536-integer-overflow-in-google-chrome-bf0554c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3536%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=69a88902d1a09e29cb6a2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tycoon-2fa-phishing-platform-dismantled-in-global--237fbcd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tycoon%202FA%20Phishing%20Platform%20Dismantled%20in%20Global%20Takedown&amp;severity=medium&amp;id=69a87e3ed1a09e29cb5e7591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20064-null-pointer-dereference-in-cisco-c-b5c944c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20064%3A%20NULL%20Pointer%20Dereference%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20025-integer-overflow-or-wraparound-in-c-fc9799cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20025%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67597c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20024-improper-restriction-of-operations--d2ad4715</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20024%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20023-out-of-bounds-write-in-cisco-cisco--9399b4a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20023%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20022-use-of-out-of-range-pointer-offset--13763524</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20022%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20021-missing-release-of-memory-after-eff-9fbf8fbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20021%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb675970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20020-improper-input-validation-in-cisco--701d124c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20020%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20016-improper-neutralization-of-argument-f7993022</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20016%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a881f6d1a09e29cb67596a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0847-cwe-22-improper-limitation-of-a-path-c024e0ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0847%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nltk%20nltk%2Fnltk&amp;severity=high&amp;id=69a87af1d1a09e29cb563d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3125-cwe-918-server-side-request-forgery--e34410dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3125%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opennextjs%20%40opennextjs%2Fcloudflare&amp;severity=high&amp;id=69a87af1d1a09e29cb563d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20073-improper-access-control-in-cisco-ci-042a5698</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20073%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20102-improper-neutralization-of-input-du-903da884</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20070-improper-neutralization-of-script-r-ad534a20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20070%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20069-inconsistent-interpretation-of-http-b9c2ece6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20069%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20068-uncaught-exception-in-cisco-cisco-c-e719f1cd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20068%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20067-out-of-bounds-write-in-cisco-cisco--054c9a9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20067%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20066-uncontrolled-resource-consumption-i-8c53c7b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20066%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20065-improper-locking-in-cisco-cisco-sec-f70efa5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20065%3A%20Improper%20Locking%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8777ad1a09e29cb54d37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20063-improper-neutralization-of-argument-93cf348b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20063%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20058-access-of-memory-location-before-st-b82bac04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20058%3A%20Access%20of%20Memory%20Location%20Before%20Start%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20057-divide-by-zero-in-cisco-cisco-cyber-ef2d4a2e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20057%3A%20Divide%20By%20Zero%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20054-loop-with-unreachable-exit-conditio-15e8c0bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20054%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20053-heap-based-buffer-overflow-in-cisco-9c77fb8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20053%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=69a87779d1a09e29cb54d326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20052-access-of-memory-location-after-end-f524f4da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20052%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20050-improper-resource-shutdown-or-relea-7f79f018</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20050%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lexisnexis-data-breach-confirmed-after-hackers-8edd7e0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LexisNexis%20Data%20Breach%20Confirmed%20After%20Hackers%20Leak%20Files&amp;severity=medium&amp;id=69a8702ed1a09e29cb5049be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20017-execution-with-unnecessary-privileg-f18e1fea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20017%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20018-path-traversal-dirfilename-in-cisco-e91f7016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20018%3A%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a87779d1a09e29cb54d2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20007-improper-access-control-in-cisco-ci-6e2cb5b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20007%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20006-error-handling-in-cisco-cisco-secur-055f6d78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20006%3A%20Error%20Handling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a87078d1a09e29cb506b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20149-improper-neutralization-of-input-du-f3875916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=69a87078d1a09e29cb506b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20082-missing-release-of-resource-after-e-84837444</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20082%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a87078d1a09e29cb506b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20062-incorrect-execution-assigned-permis-46e51a53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20062%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20049-incorrect-calculation-of-buffer-siz-37ef86ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20049%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20015-missing-release-of-memory-after-eff-d89d440f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20015%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20014-missing-release-of-memory-after-eff-1c5c9b32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20014%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f151d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20013-missing-release-of-memory-after-eff-d21a0470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20013%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f151a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20106-missing-release-of-memory-after-eff-bbf2d623</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20106%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20105-missing-release-of-memory-after-eff-0d6ecaf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20105%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20103-allocation-of-resources-without-lim-32655776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20103%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f1562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20101-use-of-insufficiently-random-values-b5449b43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20101%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20100-buffer-copy-without-checking-size-o-1555caf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20100%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86ce0d1a09e29cb4f155c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20003-improper-neutralization-of-special--469e2eb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20003%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20002-improper-neutralization-of-special--ff656b71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20002%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=high&amp;id=69a86cded1a09e29cb4f150e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20131-deserialization-of-untrusted-data-i-460d28f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20131%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f156b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20039-improper-clearing-of-heap-memory-be-eea5d267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20039%3A%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=69a86cded1a09e29cb4f1526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20044-improper-privilege-management-in-ci-07510da0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20044%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86ce0d1a09e29cb4f1550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20079-authentication-bypass-using-an-alte-6aa92e25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20079%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=critical&amp;id=69a86ce0d1a09e29cb4f1559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20031-uncaught-exception-in-cisco-cisco-s-63948540</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20031%3A%20Uncaught%20Exception%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20008-improper-neutralization-of-special--36bd7983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20008%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20009-improper-neutralization-of-special--6d7f9f80</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20009%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a86cded1a09e29cb4f1517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26949-cwe-863-incorrect-authorization-in--6d18db81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26949%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a86ce2d1a09e29cb4f15a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20001-improper-neutralization-of-special--26b5bf7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20001%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a86cded1a09e29cb4f150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20005-missing-report-of-error-condition-i-a73a7227</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20005%3A%20Missing%20Report%20of%20Error%20Condition%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22760-cwe-754-improper-check-for-unusual--d65624cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22760%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=low&amp;id=69a8695ad1a09e29cb4e1dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29069-cwe-639-authorization-bypass-throug-7de34f87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29069%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28784-cwe-1336-improper-neutralization-of-6d4747ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28784%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a8695ad1a09e29cb4e1dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28783-cwe-94-improper-control-of-generati-7ec769f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28783%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28782-cwe-639-authorization-bypass-throug-1f0840cb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28782%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=medium&amp;id=69a86252d1a09e29cb4c0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28781-cwe-639-authorization-bypass-throug-af2be907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28781%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a86252d1a09e29cb4c0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28697-cwe-1336-improper-neutralization-of-86895bc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28697%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=critical&amp;id=69a86252d1a09e29cb4c063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28696-cwe-639-authorization-bypass-throug-f6975608</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28696%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3520-cwe-674-uncontrolled-recursion-in-ex-e7bd9e89</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3520%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20expressjs%20multer&amp;severity=high&amp;id=69a85ed2d1a09e29cb4aee03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28695-cwe-1336-improper-neutralization-of-2d24d5c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28695%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=69a85ed1d1a09e29cb4aedf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15558-cwe-427-uncontrolled-search-path-el-4142348f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15558%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20CLI&amp;severity=high&amp;id=69a85ed0d1a09e29cb4aedd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23812-vulnerability-in-hewlett-packard-en-fc1f0311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23812%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23811-vulnerability-in-hewlett-packard-en-53c9b810</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23811%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23810-vulnerability-in-hewlett-packard-en-adecc1e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23810%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20Systems%20(AOS-8%20%26%20AOS-10)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23809-vulnerability-in-hewlett-packard-en-471585d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23809%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23808-vulnerability-in-hewlett-packard-en-d30f105d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23808%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed1d1a09e29cb4aede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23601-vulnerability-in-hewlett-packard-en-1539a793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23601%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Wireless%20Operating%20System%20(AOS-10%20%26%20AOS-8)&amp;severity=medium&amp;id=69a85ed0d1a09e29cb4aeddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22285-cwe-256-plaintext-storage-of-a-pass-5adf26e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22285%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20Device%20Management%20Agent%20(DDMA)&amp;severity=medium&amp;id=69a85b4ad1a09e29cb49b9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59787-cwe-703-improper-check-or-handling--6afd3d95</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59787%3A%20CWE-703%20%E2%80%93%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a857c5d1a09e29cb48ad3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59786-cwe-613-insufficient-session-expira-e20f0d55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59786%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59785-cwe-1286-improper-validation-of-syn-fc0665bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59785%3A%20CWE-1286%20%E2%80%93%20Improper%20Validation%20of%20Syntactic%20Correctness%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59784-cwe-117-improper-output-neutralizat-b29a7020</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59784%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12801-incorrect-execution-assigned-permis-f3da6224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12801%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a850c1d1a09e29cb458b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59783-cwe-78-improper-neutralization-of-s-43df8c67</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59783%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%202N%20Telekomunikace%20a.s.%202N%20Access%20Commander&amp;severity=high&amp;id=69a850c1d1a09e29cb458b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62879-cwe-532-insertion-of-sensitive-info-83298e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62879%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20Rancher&amp;severity=medium&amp;id=69a84d3dd1a09e29cb445d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-a-browser-in-the-browser-attack-is-and-how-to-37ccdfd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20a%20browser-in-the-browser%20attack%20is%2C%20and%20how%20to%20spot%20a%20fake%20login%20window%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a83f64d1a09e29cb4001d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40896-cwe-295-improper-certificate-valida-e039e616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40896%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Nozomi%20Networks%20Arc&amp;severity=medium&amp;id=69a83ba8d1a09e29cb3ef915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40895-cwe-79-improper-neutralization-of-i-9666fc7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20CMC&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40894-cwe-79-improper-neutralization-of-i-3bb0f271</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=69a83ba8d1a09e29cb3ef90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3103-cwe-863-incorrect-authorization-in-c-37ac62bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3103%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=69a83824d1a09e29cb3d0c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25907-cwe-645-overly-restrictive-account--85d43e55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25907%3A%20CWE-645%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21422-cwe-15-external-control-of-system-o-d4521675</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21422%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=69a8311cd1a09e29cb391c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21424-cwe-250-execution-with-unnecessary--85c5dbe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21424%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-pirated-software-turns-helpful-employees-into--e143ab30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Pirated%20Software%20Turns%20Helpful%20Employees%20Into%20Malware%20Delivery%20Agents&amp;severity=medium&amp;id=69a82d61d1a09e29cb385855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21421-cwe-250-execution-with-unnecessary--dc94552d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21421%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8311cd1a09e29cb391bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21426-cwe-250-execution-with-unnecessary--f2a3a244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21426%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb37418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21423-cwe-276-incorrect-default-permissio-16f56bc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21423%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a82a17d1a09e29cb374188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22270-cwe-427-uncontrolled-search-path-el-faa8a16a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22270%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20PowerScale%20OneFS%2C&amp;severity=medium&amp;id=69a8268fd1a09e29cb360760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21425-cwe-266-incorrect-privilege-assignm-7c2392aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21425%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69a8268fd1a09e29cb36075d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24732-cwe-552-files-or-directories-access-875d70e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24732%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=69a8268fd1a09e29cb360763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-new-phishing-campaign-68f9fe7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20New%20Phishing%20Campaign&amp;severity=medium&amp;id=69a822ddd1a09e29cb33b6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-plans-two-week-release-schedule-for-chrome-e83c4767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Plans%20Two-Week%20Release%20Schedule%20for%20Chrome&amp;severity=medium&amp;id=69a81f54d1a09e29cb327b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3058-cwe-200-exposure-of-sensitive-inform-df9403c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3058%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f531b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3056-cwe-862-missing-authorization-in-ser-1a9ff84b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3056%3A%20CWE-862%20Missing%20Authorization%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1674-cwe-862-missing-authorization-in-saa-d553536a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1674%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Gutena%20Forms%20%E2%80%93%20Contact%20Form%2C%20Survey%20Form%2C%20Feedback%20Form%2C%20Booking%20Form%2C%20and%20Custom%20Form%20Builder&amp;severity=medium&amp;id=69a81880d1a09e29cb2f5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2355-cwe-79-improper-neutralization-of-in-a026c4a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20My%20Calendar%20%E2%80%93%20Accessible%20Event%20Manager&amp;severity=medium&amp;id=69a81880d1a09e29cb2f530d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-coalition-publishes-6g-security-and-resilie-388a8ce5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Coalition%20Publishes%206G%20Security%20and%20Resilience%20Principles&amp;severity=medium&amp;id=69a81142d1a09e29cb2bb85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-packagist-packages-disguised-as-laravel--5cae3aaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Packagist%20Packages%20Disguised%20as%20Laravel%20Utilities%20Deploy%20Encrypted%20RAT&amp;severity=medium&amp;id=69a81150d1a09e29cb2bba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/want-more-xwormx3f-wed-mar-4th-7c048a3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Want%20More%20XWorm%26%23x3f%3B%2C%20(Wed%2C%20Mar%204th)&amp;severity=medium&amp;id=69a80331d1a09e29cb253e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1706-cwe-79-improper-neutralization-of-in-b105f9ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=69a7ffe4d1a09e29cb23bf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3439-cwe-121-stack-based-buffer-overflow--c2c70c41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3439%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=69a7fc60d1a09e29cb22b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-freescout-vulnerability-leads-to-full-ser-b01b887c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20FreeScout%20Vulnerability%20Leads%20to%20Full%20Server%20Compromise&amp;severity=critical&amp;id=69a7f8a6d1a09e29cb211a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27441-cwe-78-improper-neutralization-of-s-6ebb3f5d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27441%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2748-cwe-295-improper-certificate-validat-38d0817d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2748%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27446-cwe-306-missing-authentication-for--ed42be89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27446%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Apache%20Software%20Foundation%20Apache%20Artemis&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27442-cwe-22-improper-limitation-of-a-pat-0a99510b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27442%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=critical&amp;id=69a7f558d1a09e29cb1e3724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27445-cwe-347-improper-verification-of-cr-b3b62ae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27445%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27444-cwe-436-interpretation-conflict-in--c2527164</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27444%3A%20CWE-436%20Interpretation%20Conflict%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2747-cwe-200-exposure-of-sensitive-inform-4ebc278d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27443-cwe-20-improper-input-validation-in-69377cc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27443%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=high&amp;id=69a7f558d1a09e29cb1e3727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66168-cwe-190-integer-overflow-or-wraparo-89bd59bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66168%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e371e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2746-cwe-347-improper-verification-of-cry-abd6ee7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2746%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SEPPmail%20Secure%20Email%20Gateway&amp;severity=medium&amp;id=69a7f558d1a09e29cb1e3733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3094-cwe-787-out-of-bounds-write-in-delta-cd2be670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3094%3A%20CWE-787%20Out-of-bounds%20Write%20in%20deltaww%20CNCSoft-G2&amp;severity=high&amp;id=69a7f1d4d1a09e29cb1c93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1236-cwe-79-improper-neutralization-of-in-f48799b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Envira%20Gallery%20%E2%80%93%20Image%20Photo%20Gallery%2C%20Albums%2C%20Video%20Gallery%2C%20Slideshows%20%26%20More&amp;severity=medium&amp;id=69a7ee50d1a09e29cb1a949b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29120-cwe-798-use-of-hard-coded-credentia-587f7886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29120%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7eacbd1a09e29cb189c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29119-cwe-798-use-of-hard-coded-credentia-f3e1ee95</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29119%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=high&amp;id=69a7eacbd1a09e29cb189c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28778-cwe-798-use-of-hard-coded-credentia-1fca65f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7e744d1a09e29cb1613f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28777-cwe-798-use-of-hard-coded-credentia-95918f9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28777%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Satellite%20Receiver&amp;severity=critical&amp;id=69a7ee50d1a09e29cb1a94a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28776-cwe-798-use-of-hard-coded-credentia-194a6e0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28776%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20International%20Datacasting%20Corporation%20(IDC)%20IDC%20SFX2100%20SuperFlex%20Satellite%20Receiver&amp;severity=high&amp;id=69a7ee50d1a09e29cb1a94a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28775-cwe-1188-insecure-default-initializ-ec9ac65b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28775%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX2100%20Series%20SuperFlex%20SatelliteReceiver&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-exploited-in--b3fcfdae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=69a7e009d1a09e29cb127e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28774-cwe-78-improper-neutralization-of-s-9d1f2b51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28774%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28773-cwe-78-improper-neutralization-of-s-2d1431d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28773%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=critical&amp;id=69a7e053d1a09e29cb12bc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28772-cwe-79-improper-neutralization-of-i-28c11935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20SatelliteReceiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28771-cwe-79-improper-neutralization-of-i-de558893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20Management%20Interface&amp;severity=medium&amp;id=69a7e053d1a09e29cb12bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28770-cwe-91-xml-injection-aka-blind-xpat-60625725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28770%3A%20CWE-91%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28769-cwe-22-improper-limitation-of-a-pat-0b859350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28769%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20International%20Datacasting%20Corporation%20(IDC)%20SFX%20Series%20SuperFlex%20Satellite%20Receiver%20Web%20management%20interface&amp;severity=medium&amp;id=69a7dcb8d1a09e29cb1037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2732-cwe-862-missing-authorization-in-sho-b873a3d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2732%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2363-cwe-89-improper-neutralization-of-sp-58ca4161</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2363%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69a7d22fd1a09e29cb0618c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2025-cwe-200-information-exposure-in-mail-212f0a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2025%3A%20CWE-200%20Information%20Exposure%20in%20Mail%20Mint&amp;severity=high&amp;id=69a7ceacd1a09e29cb03bd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interplay-between-iranian-targeting-of-ip-cameras--12391dc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interplay%20between%20Iranian%20Targeting%20of%20IP%20Cameras%20and%20Physical%20Warfare%20in%20the%20Middle%20East&amp;severity=high&amp;id=69a8ca74d1a09e29cb878a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1651-cwe-89-improper-neutralization-of-sp-a775ea66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1651%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Email%20Marketing%2C%20Post%20Notifications%20%26%20Newsletter%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69a79342d1a09e29cbc204c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2292-cwe-79-improper-neutralization-of-in-f50ba6f3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bandido%20Morkva%20UA%20Shipping&amp;severity=medium&amp;id=69a79342d1a09e29cbc204e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1273-cwe-918-server-side-request-forgery--e1f87754</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1273%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69a79342d1a09e29cbc204c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1980-cwe-200-exposure-of-sensitive-inform-b43a0148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20iqonicdesign%20WPBookit&amp;severity=medium&amp;id=69a79342d1a09e29cbc204d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2289-cwe-79-improper-neutralization-of-in-b360cfc0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20Project%20Management%20%26%20Task%20Management%20Tool%20With%20Kanban%20Board&amp;severity=medium&amp;id=69a79342d1a09e29cbc204dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1945-cwe-79-improper-neutralization-of-in-6840e229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1945%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69a79342d1a09e29cbc204d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/signed-malware-impersonating-workplace-apps-deploy-d90a7c2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Signed%20malware%20impersonating%20workplace%20apps%20deploys%20RMM%20backdoors&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-04-f30e740f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-04&amp;severity=medium&amp;id=69a8ca08d1a09e29cb86d4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70222-na-75b37c96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70222%3A%20n%2Fa&amp;severity=critical&amp;id=69a8a51ed1a09e29cb769eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70225-na-bb06acd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70225%3A%20n%2Fa&amp;severity=critical&amp;id=69a89a91d1a09e29cb719abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70221-na-01c26696</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70221%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6fec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46108-na-f9f47e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46108%3A%20n%2Fa&amp;severity=critical&amp;id=69a89710d1a09e29cb6febfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70219-na-7e103d52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70219%3A%20n%2Fa&amp;severity=critical&amp;id=69a89005d1a09e29cb6c63ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70226-na-82054904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70226%3A%20n%2Fa&amp;severity=critical&amp;id=69a8857dd1a09e29cb68bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70223-na-9cba1f25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70223%3A%20n%2Fa&amp;severity=critical&amp;id=69a881f6d1a09e29cb675965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-04-89d845b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-04&amp;severity=medium&amp;id=69a87ab7d1a09e29cb55b54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70220-na-363a1ddd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70220%3A%20n%2Fa&amp;severity=critical&amp;id=69a87779d1a09e29cb54d2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70218-na-dce67160</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70218%3A%20n%2Fa&amp;severity=critical&amp;id=69a87078d1a09e29cb506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66944-na-8319490b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66944%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66678-na-dc18e3f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66678%3A%20n%2Fa&amp;severity=critical&amp;id=69a8695ad1a09e29cb4e1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69969-na-e74f3aeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69969%3A%20n%2Fa&amp;severity=critical&amp;id=69a85ed0d1a09e29cb4aeddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26478-na-4a7e88a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26478%3A%20n%2Fa&amp;severity=critical&amp;id=69a85b4ad1a09e29cb49b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26673-na-e8c6ae05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26673%3A%20n%2Fa&amp;severity=high&amp;id=69a857c5d1a09e29cb48ad42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26514-na-4630cd19</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26514%3A%20n%2Fa&amp;severity=high&amp;id=69a84d3dd1a09e29cb445d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70342-na-9e196b94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70342%3A%20n%2Fa&amp;severity=medium&amp;id=69a849bdd1a09e29cb42f6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70341-na-aebf9e80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70341%3A%20n%2Fa&amp;severity=high&amp;id=69a849bdd1a09e29cb42f6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-04-2321d5d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-04&amp;severity=low&amp;id=69a7ee16d1a09e29cb1a6587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28289-cwe-434-unrestricted-upload-of-file-e2a6fd58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28289%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=69a79342d1a09e29cbc204ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27971-cwe-502-deserialization-of-untruste-b59de789</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27971%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=69a79342d1a09e29cbc204eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27932-cwe-770-allocation-of-resources-wit-c0c8d6c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27932%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=high&amp;id=69a768b5d1a09e29cb82cc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27622-cwe-787-out-of-bounds-write-in-acad-a42f61d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27622%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27601-cwe-770-allocation-of-resources-wit-ae5cd70d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27601%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20jashkenas%20underscore&amp;severity=high&amp;id=69a76534d1a09e29cb81f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3266-cwe-862-missing-authorization-in-ope-7599e051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3266%3A%20CWE-862%20Missing%20Authorization%20in%20OpenText%E2%84%A2%20Filr&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27981-cwe-307-improper-restriction-of-exc-f8c6fc4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27981%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20sysadminsmedia%20homebox&amp;severity=high&amp;id=69a76534d1a09e29cb81f9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27600-cwe-918-server-side-request-forgery-b5ba57bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27600%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26272-cwe-79-improper-neutralization-of-i-52fa5733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25590-cwe-79-improper-neutralization-of-i-13ff0ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25590%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=medium&amp;id=69a761b1d1a09e29cb80d3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27012-cwe-306-missing-authentication-for--435d22b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27012%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69a79342d1a09e29cbc204f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24415-cwe-79-improper-neutralization-of-i-caa3b439</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24415%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devcode-it%20openstamanager&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e0992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21866-cwe-79-improper-neutralization-of-i-2499aded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21866%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a75aa5d1a09e29cb7e098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3487-sql-injection-in-itsourcecode-colleg-91aac2aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3487%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a75724d1a09e29cb7c9d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3130-cwe-841-improper-enforcement-of-beha-bdd93806</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3130%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3204-cwe-20-improper-input-validation-in--25dfb824</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3204%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2590-vulnerability-in-devolutions-remote--692ec7bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2590%3A%20Vulnerability%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3224-cwe-287-improper-authentication-cwe--6697497e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3224%3A%20CWE-287%20Improper%20Authentication%2C%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Devolutions%20Server&amp;severity=critical&amp;id=69a75724d1a09e29cb7c9d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1775-cwe-306-missing-authentication-for-c-0d6416a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1775%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Labkotec%20LID-3300IP&amp;severity=high&amp;id=69a75724d1a09e29cb7c9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3486-sql-injection-in-itsourcecode-colleg-d8a60b02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3486%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=69a7501dd1a09e29cb7a3ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3485-os-command-injection-in-d-link-dir-8-905d15ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3485%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-868L&amp;severity=critical&amp;id=69a7501dd1a09e29cb7a3feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25906-cwe-59-improper-link-resolution-bef-44e1a0d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25906%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Optimizer&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13686-cwe-78-improper-neutralization-of-s-0ca7a52d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13686%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13687-cwe-78-improper-neutralization-of-s-48c22113</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13687%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13688-cwe-78-improper-neutralization-of-s-1fd1738a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13688%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24502-cwe-427-uncontrolled-search-path-el-f6578229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24502%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Dell%20Command%20%7C%20Intel%20vPro%20Out%20of%20Band&amp;severity=high&amp;id=69a74c95d1a09e29cb79af24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14456-cwe-327-use-of-a-broken-or-risky-cr-a1a22bf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14456%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20MQ%20Appliance&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14480-cwe-327-use-of-a-broken-or-risky-cr-3f20f205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14480%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Aspera%20faspio%20Gateway&amp;severity=medium&amp;id=69a74c95d1a09e29cb79af21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1567-cwe-611-improper-restriction-of-xml--a1c9e77f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1567%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69a74916d1a09e29cb78e8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1713-cwe-305-authentication-bypass-by-pri-f8f08c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1713%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20MQ&amp;severity=medium&amp;id=69a74916d1a09e29cb78e8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-3eb9b653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a814c4d1a09e29cb2cff01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0869-cwe-305-authentication-bypass-by-pri-f26fec73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0869%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20ASCG&amp;severity=high&amp;id=69a7420dd1a09e29cb75a987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13490-vulnerability-in-ibm-app-connect-op-a38ba731</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13490%3A%20Vulnerability%20in%20IBM%20App%20Connect%20Operator&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-strikes-on-amazon-data-centers-highlight-i-daf77fd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Strikes%20on%20Amazon%20Data%20Centers%20Highlight%20Industry%E2%80%99s%20Vulnerability%20to%20Physical%20Disasters&amp;severity=high&amp;id=69a73e52d1a09e29cb7481dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13616-cwe-497-exposure-of-sensitive-syste-f677746c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13734-cwe-862-missing-authorization-in-ib-55112373</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13734%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20Engineering%20Requirements%20Management%20DOORS%20Next&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-29022-cwe-122-heap-based-buffer-overflow--f0fcfc02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-29022%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20mackron%20dr_libs%20dr_wav.h&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14604-cwe-732-incorrect-permission-assign-6b2bd9ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14604%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Storage%20Scale&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14923-cwe-321-use-of-hard-coded-cryptogra-94170a5c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14923%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20IBM%20WebSphere%20Application%20Server%20-%20Liberty&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36363-cwe-307-improper-restriction-of-exc-6d356cfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36363%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36364-cwe-525-use-of-web-browser-cache-co-182fb3f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36364%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20IBM%20DevOps%20Plan&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1265-cwe-532-insertion-of-sensitive-infor-f251bfd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1265%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2606-cwe-22-improper-limitation-of-a-path-d0fb6498</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2606%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20webMethods%20API%20Gateway%20(on-prem)&amp;severity=medium&amp;id=69a73e9ad1a09e29cb7489d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3484-command-injection-in-phialsbasement--113d49cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3484%3A%20Command%20Injection%20in%20PhialsBasement%20nmap-mcp-server&amp;severity=medium&amp;id=69a73e9cd1a09e29cb748a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2915-hp-system-event-utility-denial-of-se-f0d4d0bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2915%3A%20HP%20System%20Event%20Utility%20%E2%80%93%20Denial%20of%20Service%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69a73782d1a09e29cb722154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3494-cwe-778-insufficient-logging-in-mari-263ef839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3494%3A%20CWE-778%20(Insufficient%20Logging)%20in%20MariaDB%20Foundation%20MariaDB%20Server&amp;severity=medium&amp;id=69a72971d1a09e29cb6b58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3437-cwe-119-improper-restriction-of-oper-291f400a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3437%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Portwell%20Portwell%20Engineering%20Toolkits&amp;severity=critical&amp;id=69a71f08d1a09e29cb64f6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0540-improper-neutralization-of-input-dur-fcf39a86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb636912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15599-improper-neutralization-of-input-du-fc0586ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=medium&amp;id=69a71bdad1a09e29cb63690d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3136-cwe-863-incorrect-authorization-perm-64a726f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3136%3A%20CWE-863%20Incorrect%20Authorization%20(Permission%20Bypass)%20in%20Google%20Cloud%20Cloud%20Build&amp;severity=high&amp;id=69a70d52d1a09e29cb5a67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assistant-in-kaspersky-container-security-ab3f1b7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20assistant%20in%20Kaspersky%20Container%20Security&amp;severity=medium&amp;id=69a70a03d1a09e29cb58b507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-dragon-targets-organizations-in-southeast-a-f6a8d11c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Dragon%20Targets%20Organizations%20in%20Southeast%20Asia%20and%20Europe&amp;severity=medium&amp;id=69a7067dd1a09e29cb571fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-ai-powered-bot-actively-exploiting-github-actio-7268fc31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20AI-Powered%20Bot%20Actively%20Exploiting%20GitHub%20Actions%20-%20Microsoft%2C%20DataDog%2C%20and%20CNCF%20Projects%20Hit%20So%20Far&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-based-indirect-prompt-injection-observed-in-th-e7ae89ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web-Based%20Indirect%20Prompt%20Injection%20Observed%20in%20the%20Wild%3A%20Fooling%20AI%20Agents&amp;severity=medium&amp;id=69a7109dd1a09e29cb5bd468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redalert-trojan-campaign-fake-emergency-alert-app--4ce3c6ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedAlert%20Trojan%20Campaign%3A%20Fake%20Emergency%20Alert%20App%20Spread%20via%20SMS%20Spoofing%20Israeli%20Home%20Front%20Command&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeywell-researcher-clash-over-impact-of-building-ce2dff31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeywell%2C%20Researcher%20Clash%20Over%20Impact%20of%20Building%20Controller%20Vulnerability&amp;severity=medium&amp;id=69a6ff0ad1a09e29cb536182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3465-denial-of-service-in-tuya-app-58df3c71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3465%3A%20Denial%20of%20Service%20in%20Tuya%20App&amp;severity=low&amp;id=69a6fbbdd1a09e29cb5117be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bruteforce-scans-for-crushftp-tue-mar-3rd-cfb37f98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bruteforce%20Scans%20for%20CrushFTP%20%2C%20(Tue%2C%20Mar%203rd)&amp;severity=medium&amp;id=69a79367d1a09e29cbc29e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28518-cwe-22-improper-limitation-of-a-pat-ac4b7555</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Volcengine%20OpenViking&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64736-cwe-125-out-of-bounds-read-in-the-b-2ca06079</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64736%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=medium&amp;id=69a6f4b6d1a09e29cb4db068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22891-cwe-122-heap-based-buffer-overflow--50121360</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22891%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20777-cwe-122-heap-based-buffer-overflow--3231c396</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20777%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25674-cwe-362-concurrent-execution-using--1957efe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25674%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20djangoproject%20Django&amp;severity=low&amp;id=69a6f4b6d1a09e29cb4db07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25673-cwe-400-uncontrolled-resource-consu-2c418a56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25673%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20djangoproject%20Django&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2637-cwe-732-incorrect-permission-assignm-a25e0e26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2637%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iBoysoft%20iBoysoft%20NTFS&amp;severity=high&amp;id=69a6f130d1a09e29cb4be7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-decryption-of-rsa-is-much-closer-than-expe-e9305bca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Decryption%20of%20RSA%20is%20Much%20Closer%20than%20Expected&amp;severity=medium&amp;id=69a79331d1a09e29cbc1fa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-airsnitch-attack-shows-wi-fi-client-isolation--2c13ae0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98AirSnitch%E2%80%99%20Attack%20Shows%20Wi-Fi%20Client%20Isolation%20Could%20Be%20a%20False%20Sense%20of%20Security&amp;severity=low&amp;id=69a6e9f3d1a09e29cb4846fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12-million-affected-by-university-of-hawaii-cancer-29e7f1e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1.2%20Million%20Affected%20by%20University%20of%20Hawaii%20Cancer%20Center%20Data%20Breach&amp;severity=medium&amp;id=69a6e66ed1a09e29cb45c03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3344-cwe-440-expected-behavior-violation--1a487772</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3344%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3343-cwe-79-improper-neutralization-of-in-593abd20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=69a6e6b4d1a09e29cb46e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3342-cwe-787-out-of-bounds-write-in-watch-9d2fb839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3342%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=69a6e6b4d1a09e29cb46e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3351-cwe-862-missing-authorization-in-can-6fb176f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3351%3A%20CWE-862%20Missing%20Authorization%20in%20Canonical%20lxd&amp;severity=low&amp;id=69a9c996460e1c85df139364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-exploited-qualcomm-zero-day-0500373e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Exploited%20Qualcomm%20Zero-Day&amp;severity=low&amp;id=69a6d85ed1a09e29cb229150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-cyber-front-hacktivist-activity-rises-but-sta-4523c09d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Cyber%20Front%3A%20Hacktivist%20Activity%20Rises%2C%20but%20State-Sponsored%20Attacks%20Stay%20Low&amp;severity=low&amp;id=69a6d4dad1a09e29cb19b432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3463-heap-based-buffer-overflow-in-xlnt-c-54baebc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3463%3A%20Heap-based%20Buffer%20Overflow%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69a6d18cd1a09e29cb1024e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sloppylemming-deploys-burrowshell-and-rust-based-r-fe380f33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SloppyLemming%20Deploys%20BurrowShell%20and%20Rust-Based%20RAT%20to%20Target%20Pakistan%20and%20Bangladesh&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59060-cwe-297-improper-validation-of-cert-9be8c153</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59060%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=medium&amp;id=69a6bff6d1a09e29cbfe3b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59059-cwe-94-improper-control-of-generati-43809e3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59059%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=critical&amp;id=69a6bff6d1a09e29cbfe3b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-ms-agent-ai-framework-can-allow-f-d035faeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20MS-Agent%20AI%20Framework%20Can%20Allow%20Full%20System%20Compromise&amp;severity=low&amp;id=69a6bc3dd1a09e29cbfca855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-method-to-track-cars-via-tire--dd7b05ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Method%20to%20Track%20Cars%20via%20Tire%20Sensors&amp;severity=low&amp;id=69a6ae2dd1a09e29cbf5c440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15598-improper-verification-of-cryptograp-d643f0bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15598%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a6ae74d1a09e29cbf6065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2568-cwe-79-improper-neutralization-of-in-6840f089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crmperks%20WP%20Zendesk%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=high&amp;id=69a6ae74d1a09e29cbf60663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22886-cwe-1392-use-of-default-credentials-68ab8e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22886%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Eclipse%20Foundation%20Eclipse%20OpenMQ&amp;severity=critical&amp;id=69a6aadfd1a09e29cbf4c05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1876-cwe-404-improper-resource-shutdown-o-b1e51223</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1876%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a6fbbdd1a09e29cb5117c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1875-cwe-404-improper-resource-shutdown-o-290a0193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1875%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-EIP%20EtherNet%2FIP%20Module%20FX5-EIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe1300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1874-cwe-670-always-incorrect-control-flo-ab07aefb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1874%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET%2FIP%20Ethernet%20Module%20FX5-ENET%2FIP&amp;severity=high&amp;id=69a687b5d1a09e29cbe13006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-march-2026-escalation-of-cyber-risk-r-965c4d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20March%202026%20Escalation%20of%20Cyber%20Risk%20Related%20to%20Iran&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12345-buffer-overflow-in-llm-claw-ea370fec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12345%3A%20Buffer%20Overflow%20in%20LLM-Claw&amp;severity=high&amp;id=69a68433d1a09e29cbdf37a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15595-cwe-1390-weak-authentication-in-mls-f8e093b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15595%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20mlsoft%20Inno%20Setup&amp;severity=medium&amp;id=69a67d2dd1a09e29cbdc2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3455-cross-site-scripting-xss-in-mailpars-8034f691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3455%3A%20Cross-site%20Scripting%20(XSS)%20in%20mailparser&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3449-incorrect-control-flow-scoping-in-to-763d30d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3449%3A%20Incorrect%20Control%20Flow%20Scoping%20in%20%40tootallnate%2Fonce&amp;severity=medium&amp;id=69a66f1fd1a09e29cbd3d467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1492-cwe-269-improper-privilege-managemen-edd7f3b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1492%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=critical&amp;id=69a66813d1a09e29cbd10aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20801-cwe-319-cleartext-transmission-of-s-9442dc8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20801%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gallagher%20NxWitness%20VMS%20and%20Hanwha%20VMS%20Integrations&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20757-cwe-667-improper-locking-in-gallagh-92af19ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20757%3A%20CWE-667%20Improper%20Locking%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=low&amp;id=69a652fcd1a09e29cba9d619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47147-cwe-312-cleartext-storage-of-sensit-da3da127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47147%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Mobile%20Client&amp;severity=medium&amp;id=69a652fcd1a09e29cba9d616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1487-cwe-89-improper-neutralization-of-sp-8e8ecf27</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1487%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69a644edd1a09e29cb9ed2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2448-cwe-22-improper-limitation-of-a-path-365740f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2269-cwe-434-unrestricted-upload-of-file--aa73faba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2269%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=high&amp;id=69a644edd1a09e29cb9ed2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2628-cwe-288-authentication-bypass-using--3ce6682b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2628%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cyberlord92%20All-in-One%20Microsoft%20365%20%26%20Entra%20ID%20%2F%20Azure%20AD%20SSO%20Login&amp;severity=critical&amp;id=69a644edd1a09e29cb9ed2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0754-cwe-321-in-hp-inc-vvx-cff5c471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0754%3A%20CWE-321%20in%20HP%20Inc%20VVX&amp;severity=high&amp;id=69a63a5fd1a09e29cb891967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boss-mini-v140-local-file-inclusion-lfi-5031ed92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boss%20Mini%20v1.4.0%20-%20Local%20File%20Inclusion%20(LFI)&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wegia-350-sql-injection-e53976a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WeGIA%203.5.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/easy-file-sharing-web-server-v72-buffer-overflow-0b6ea038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Easy%20File%20Sharing%20Web%20Server%20v7.2%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mailcow-2025-01a-host-header-password-reset-poison-0f65742b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=mailcow%202025-01a%20-%20Host%20Header%20Password%20Reset%20Poisoning&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-backup-migration-137-remote-command-exec-1e4d134b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Backup%20Migration%201.3.7%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=69a792c9d1a09e29cbc1c305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-03-c1c93c7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-03&amp;severity=medium&amp;id=69a77a12d1a09e29cb894e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70239-na-bcdf699f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70239%3A%20n%2Fa&amp;severity=high&amp;id=69a7501dd1a09e29cb7a3fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70234-na-e1524ae3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70234%3A%20n%2Fa&amp;severity=high&amp;id=69a74916d1a09e29cb78e8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70240-na-50a4c245</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70240%3A%20n%2Fa&amp;severity=high&amp;id=69a74590d1a09e29cb76d1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70241-na-6c90335a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70241%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70237-na-d3da279e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70237%3A%20n%2Fa&amp;severity=high&amp;id=69a7420dd1a09e29cb75a97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70236-na-3a6cfb2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70236%3A%20n%2Fa&amp;severity=medium&amp;id=69a733fdd1a09e29cb7091b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55027-na-950573eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55027%3A%20n%2Fa&amp;severity=high&amp;id=69a733fdd1a09e29cb7091b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55026-na-960f708a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55026%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55025-na-3e6b6400</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55025%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55024-na-e8f2b8bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55024%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e26a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55023-na-424244fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55023%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e26a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55022-na-988739b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55022%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55021-na-4783609f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55021%3A%20n%2Fa&amp;severity=high&amp;id=69a72cf6d1a09e29cb6e2699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55020-na-475e8194</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55020%3A%20n%2Fa&amp;severity=critical&amp;id=69a72cf6d1a09e29cb6e2695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55019-na-0e0331e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55019%3A%20n%2Fa&amp;severity=medium&amp;id=69a72cf6d1a09e29cb6e2691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67840-na-9c79dfe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67840%3A%20n%2Fa&amp;severity=high&amp;id=69a72973d1a09e29cb6b58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63912-na-c669e470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63912%3A%20n%2Fa&amp;severity=null&amp;id=69a72973d1a09e29cb6b58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63911-na-5ae6ed65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63911%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63910-na-af3aa22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63910%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63909-na-432945e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63909%3A%20n%2Fa&amp;severity=high&amp;id=69a72971d1a09e29cb6b58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26892-na-d839fbc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26892%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26891-na-06626ce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26891%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26889-na-5be92f85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26889%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26888-na-39cc2ebd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26888%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26887-na-40a87163</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26887%3A%20n%2Fa&amp;severity=low&amp;id=69a72971d1a09e29cb6b58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66945-na-f1fe5e8f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66945%3A%20n%2Fa&amp;severity=critical&amp;id=69a72971d1a09e29cb6b58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26890-na-be65dbb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26890%3A%20n%2Fa&amp;severity=low&amp;id=69a71f08d1a09e29cb64f6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69765-na-f2b1b26e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69765%3A%20n%2Fa&amp;severity=high&amp;id=69a71f08d1a09e29cb64f6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62817-na-f6cd3503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62817%3A%20n%2Fa&amp;severity=high&amp;id=69a717ddd1a09e29cb604239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62816-na-a64776a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62816%3A%20n%2Fa&amp;severity=medium&amp;id=69a717ddd1a09e29cb604235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26886-na-455c504f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26886%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26885-na-cd64dccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26885%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26884-na-b2057dd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26884%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26883-na-2f92fcad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26883%3A%20n%2Fa&amp;severity=low&amp;id=69a70d52d1a09e29cb5a67d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66363-na-17acbebe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66363%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62815-na-479affcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62815%3A%20n%2Fa&amp;severity=medium&amp;id=69a709cdd1a09e29cb586e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62814-na-f81aae41</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62814%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66680-na-5c7c12b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66680%3A%20n%2Fa&amp;severity=high&amp;id=69a702c6d1a09e29cb555065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24103-na-193bbf7b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24103%3A%20n%2Fa&amp;severity=critical&amp;id=69a6fbbdd1a09e29cb5117ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70821-na-2b04e81e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70821%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57622-na-a66bcb69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57622%3A%20n%2Fa&amp;severity=critical&amp;id=69a6f4b6d1a09e29cb4db064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52365-na-4d2fce57</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52365%3A%20n%2Fa&amp;severity=high&amp;id=69a6f4b6d1a09e29cb4db05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-03-5919e9d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-03&amp;severity=medium&amp;id=69a6cdd0d1a09e29cb03ee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-03-e9f917ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-03&amp;severity=low&amp;id=69a6cdcfd1a09e29cb03edd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1566-cwe-269-improper-privilege-managemen-02d5d7d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1566%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69a61e3fd1a09e29cb5e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1336-cwe-862-missing-authorization-in-ays-22761aa4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1336%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=69a61e3fd1a09e29cb5e40e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2583-cwe-79-improper-neutralization-of-in-8a361860</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=69a61033d1a09e29cb5548b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-redirection-abuse-enables-phishing-and-malwa-79407cf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20redirection%20abuse%20enables%20phishing%20and%20malware%20delivery&amp;severity=medium&amp;id=69a71422d1a09e29cb5de9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3338-cwe-347-improper-verification-of-cry-5dba1e3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3338%3A%20CWE-347%20(Improper%20Verification%20of%20Cryptographic%20Signature)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a605a4d1a09e29cb50c698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3337-cwe-208-observable-timing-discrepanc-002f7127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3337%3A%20CWE-208%20(Observable%20Timing%20Discrepancy)%20in%20AWS%20AWS-LC&amp;severity=medium&amp;id=69a605a4d1a09e29cb50c694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3336-cwe-295-improper-certificate-validat-82b96840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3336%3A%20CWE-295%20(Improper%20Certificate%20Validation)%20in%20AWS%20AWS-LC&amp;severity=high&amp;id=69a60221d1a09e29cb4eac7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2256-cwe-94-improper-control-of-generatio-97245d82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2256%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ModelScope%20ms-agent&amp;severity=medium&amp;id=69a5f410d1a09e29cb4859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21882-cwe-273-improper-check-for-dropped--74c9d20e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21882%3A%20CWE-273%3A%20Improper%20Check%20for%20Dropped%20Privileges%20in%20AsfhtgkDavid%20theshit&amp;severity=high&amp;id=69a5e601d1a09e29cb3f7137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25477-cwe-601-url-redirection-to-untruste-6451e338</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25477%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=69a5e601d1a09e29cb3f713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48636-elevation-of-privilege-in-google-an-b192bfbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48636%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31328-elevation-of-privilege-in-google-an-fe323a94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21853-cwe-94-improper-control-of-generati-d73fe22a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21853%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20toeverything%20AFFiNE&amp;severity=high&amp;id=69a5e27dd1a09e29cb26d651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0047-elevation-of-privilege-in-google-and-04b2cabf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0047%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0038-elevation-of-privilege-in-google-and-14616300</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0038%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0037-elevation-of-privilege-in-google-and-0e2ff1a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0037%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0035-elevation-of-privilege-in-google-and-f24ee122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0035%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0034-elevation-of-privilege-in-google-and-69a10312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0034%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db84d1a09e29cb1cf10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0032-elevation-of-privilege-in-google-and-c7533730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0032%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0031-elevation-of-privilege-in-google-and-4ddd3481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0031%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0030-elevation-of-privilege-in-google-and-a9413c8f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0030%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0029-elevation-of-privilege-in-google-and-6f20c44d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0029%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0028-elevation-of-privilege-in-google-and-b3d2b6b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0028%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0027-elevation-of-privilege-in-google-and-740034f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0027%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0026-elevation-of-privilege-in-google-and-79b503be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0026%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0025-information-disclosure-in-google-and-3961b952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0025%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0024-information-disclosure-in-google-and-775cabbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0024%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db82d1a09e29cb1cf018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0023-elevation-of-privilege-in-google-and-d9d12d55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0023%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db82d1a09e29cb1cf015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0021-elevation-of-privilege-in-google-and-9579343b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0021%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0020-elevation-of-privilege-in-google-and-05bc707d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0020%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0017-elevation-of-privilege-in-google-and-18b4b83e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0017%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0015-denial-of-service-in-google-android-16844ccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0015%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0014-denial-of-service-in-google-android-501e5c3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0014%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0013-elevation-of-privilege-in-google-and-3a77d566</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0013%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0012-information-disclosure-in-google-and-a8d58aff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0012%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db80d1a09e29cb1cb9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0011-elevation-of-privilege-in-google-and-410c9f78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0011%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0010-elevation-of-privilege-in-google-and-7fdb3b3e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0010%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0008-elevation-of-privilege-in-google-and-1785e1d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0008%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db80d1a09e29cb1cb9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0007-elevation-of-privilege-in-google-and-58f6e174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0007%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0006-remote-code-execution-in-google-andr-79236030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0006%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0005-information-disclosure-in-google-and-ed74d6c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0005%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48654-elevation-of-privilege-in-google-an-568e7f98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48654%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48653-elevation-of-privilege-in-google-an-f693d7f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48653%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48650-elevation-of-privilege-in-google-an-25ed2fac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48650%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48646-elevation-of-privilege-in-google-an-ab9c8f05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48646%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7ed1a09e29cb1cb970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48645-elevation-of-privilege-in-google-an-505c2e59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48645%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7ed1a09e29cb1cb96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48644-denial-of-service-in-google-android-1bb8488f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48644%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48642-information-disclosure-in-google-an-da2f0b4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48642%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7ed1a09e29cb1cb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48641-elevation-of-privilege-in-google-an-24d420bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48641%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48635-elevation-of-privilege-in-google-an-9a208ff4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48635%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48634-elevation-of-privilege-in-google-an-0d0d6816</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48634%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48630-information-disclosure-in-google-an-fa70f5ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48630%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48619-elevation-of-privilege-in-google-an-ef2f931c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48619%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1caddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48613-unknown-in-google-android-902667f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48613%3A%20Unknown%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48609-denial-of-service-in-google-android-ba7218a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48609%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=critical&amp;id=69a5db7cd1a09e29cb1cadd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48605-elevation-of-privilege-in-google-an-583c11dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48605%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48602-elevation-of-privilege-in-google-an-8d7bfe7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48602%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db7cd1a09e29cb1cadd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48587-denial-of-service-in-google-android-0feec96e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48587%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db7cd1a09e29cb1cadc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48585-denial-of-service-in-google-android-73d035df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48585%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48582-elevation-of-privilege-in-google-an-2b3a2c37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48582%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48579-elevation-of-privilege-in-google-an-9e39edc4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48579%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48578-elevation-of-privilege-in-google-an-1a2b535e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48578%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48577-elevation-of-privilege-in-google-an-f2946dae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48577%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48574-elevation-of-privilege-in-google-an-6f67eeda</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48574%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48568-elevation-of-privilege-in-google-an-701b0b4a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48568%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48567-elevation-of-privilege-in-google-an-ccaedf6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48567%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32313-elevation-of-privilege-in-google-an-c7ea5cd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32313%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a5db79d1a09e29cb1c9ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43766-information-disclosure-in-google-an-4a2fe7e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43766%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a5db79d1a09e29cb1c9acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dust-specter-apt-targets-government-officials-in-i-87553f50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dust%20Specter%20APT%20Targets%20Government%20Officials%20in%20Iraq&amp;severity=medium&amp;id=69a717a5d1a09e29cb601ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0654-cwe-78-improper-neutralization-of-sp-6feb9749</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=high&amp;id=69a5d050b6c0d8506fbcb7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/funnull-resurfaces-exposing-ringh23-arsenal-and-ma-172367c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Funnull%20Resurfaces%3A%20Exposing%20RingH23%20Arsenal%20and%20MacCMS%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=69a717a5d1a09e29cb601e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0655-cwe-22-improper-limitation-of-a-path-0f110460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0655%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Deco%20BE25%20v1.0&amp;severity=medium&amp;id=69a5d050b6c0d8506fbcb7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3180-cwe-89-improper-neutralization-of-sp-98c584af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3180%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%20%26%20Vote%20Photos%2C%20Media%2C%20Sell%20with%20PayPal%20%26%20Stripe&amp;severity=high&amp;id=69a5ccceb6c0d8506fb7921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3132-cwe-94-improper-control-of-generatio-60f29397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3132%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor%20Premium&amp;severity=high&amp;id=69a5ccceb6c0d8506fb79216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novel-dprk-stager-using-pastebin-and-text-steganog-700c0da3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Novel%20DPRK%20stager%20using%20Pastebin%20and%20text%20steganography&amp;severity=medium&amp;id=69a6056dd1a09e29cb500441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21385-cwe-190-integer-overflow-or-wraparo-b6c506df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21385%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59603-cwe-787-out-of-bounds-write-in-qual-4c38cf97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59603%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa297b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59600-cwe-126-buffer-over-read-in-qualcom-c7eb4244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59600%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47386-cwe-416-use-after-free-in-qualcomm--ce0f17d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47386%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47385-cwe-1262-improper-access-control-fo-d2e4d6d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47385%3A%20CWE-1262%3A%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47384-cwe-617-reachable-assertion-in-qual-817ade50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47384%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5cab6c0d8506faa2cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47383-cwe-325-missing-cryptographic-step--582b986b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47383%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47381-cwe-416-use-after-free-in-qualcomm--a1d53b23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47381%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5cab6c0d8506faa2aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47379-cwe-416-use-after-free-in-qualcomm--34172ec0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47379%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47378-cwe-497-exposure-of-sensitive-syste-00d19e62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47378%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47377-cwe-416-use-after-free-in-qualcomm--ea0d7bb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47377%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47376-cwe-416-use-after-free-in-qualcomm--24bbb384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47376%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa298a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47375-cwe-416-use-after-free-in-qualcomm--f83573a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47375%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47373-cwe-787-out-of-bounds-write-in-qual-dafd73bc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47373%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a5c5c8b6c0d8506faa2984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47371-cwe-617-reachable-assertion-in-qual-add108d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47371%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a5c5c8b6c0d8506faa2981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-march-threat-intelligence-report-b9e4863c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20March%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69a5bddb32ffcdb8a2768b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64427-cwe-918-server-side-request-forgery-938d592d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28286-cwe-73-external-control-of-file-nam-7cb314e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28286%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IceWhaleTech%20ZimaOS&amp;severity=high&amp;id=69a5bdaa32ffcdb8a2762eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52564-cwe-80-improper-neutralization-of-s-45e6f918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52564%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52998-cwe-502-deserialization-of-untruste-bdb241bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52998%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50199-cwe-918-server-side-request-forgery-087d001b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50199%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52563-cwe-79-improper-neutralization-of-i-5645040f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52475-cwe-79-improper-neutralization-of-i-8242ec9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52475%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52476-cwe-79-improper-neutralization-of-i-065db084</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a252065f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52470-cwe-79-improper-neutralization-of-i-07562d58</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5b69f32ffcdb8a2520655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52469-cwe-841-improper-enforcement-of-beh-d8af2236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52469%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52468-cwe-79-improper-neutralization-of-i-af315191</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a252064b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28412-cwe-400-uncontrolled-resource-consu-ee59b501</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28412%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20textream&amp;severity=medium&amp;id=69a5b6a132ffcdb8a25206aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50198-cwe-502-deserialization-of-untruste-f2b04235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50198%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5b69f32ffcdb8a2520640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28403-cwe-346-origin-validation-error-in--510c10f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28403%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20textream&amp;severity=high&amp;id=69a5b6a132ffcdb8a25206a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-hijacking-chromes-gemini-liv-b93c9281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Hijacking%20Chrome%E2%80%99s%20Gemini%20Live%20AI%20Assistant&amp;severity=low&amp;id=69a5af6132ffcdb8a2437a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50197-cwe-78-improper-neutralization-of-s-930b378b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50197%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50196-cwe-78-improper-neutralization-of-s-c384cdc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50196%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-macos-exiftool-image-processing-vuln-b769fd1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20macOS%20ExifTool%20image-processing%20vulnerability%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a63f7bd1a09e29cb92fd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50195-cwe-78-improper-neutralization-of-s-04fa43e9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50195%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0689-cwe-522-insufficiently-protected-cre-f23e5b11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0689%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Extreme%20Networks%20ExtremeCloud%20IQ%20-%20Site%20Engine&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50194-cwe-78-improper-neutralization-of-s-98ee3848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50194%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50193-cwe-78-improper-neutralization-of-s-b5f5a81f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50193%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50192-cwe-89-improper-neutralization-of-s-c4433473</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50192%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50191-cwe-89-improper-neutralization-of-s-962362cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50191%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50190-cwe-89-improper-neutralization-of-s-ba698467</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50190%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0995-cwe-362-concurrent-execution-using-s-15e51ab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0995%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Arm%20C1%20Pro&amp;severity=low&amp;id=69a5a89032ffcdb8a23d2f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50189-cwe-89-improper-neutralization-of-s-ddcfb698</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50189%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50188-cwe-89-improper-neutralization-of-s-36e03404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50188%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a89032ffcdb8a23d2f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52482-cwe-79-improper-neutralization-of-i-52a860bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50187-cwe-95-improper-neutralization-of-d-2855170f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50187%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50186-cwe-79-improper-neutralization-of-i-6bc2aea3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50186%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50337-cwe-918-server-side-request-forgery-13c8b2e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50337%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20chamilo%20chamilo-lms&amp;severity=medium&amp;id=69a5a50b32ffcdb8a23b6e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-vulnerability-allowed-websites-to-hijack--4d33e471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Vulnerability%20Allowed%20Websites%20to%20Hijack%20AI%20Agents&amp;severity=low&amp;id=69a5a15132ffcdb8a2372e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47886-cwe-502-deserialization-of-untruste-fc9008b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47886%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20chamilo%20chamilo-lms&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23600-vulnerability-in-hewlett-packard-en-a5e8a398</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23600%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20AutoPass%20License%20Server%20(APLS)&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/madison-square-garden-data-breach-confirmed-months-e72fb31f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Madison%20Square%20Garden%20Data%20Breach%20Confirmed%20Months%20After%20Hacker%20Attack&amp;severity=medium&amp;id=69a596c532ffcdb8a22d0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3432-cwe-862-missing-authorization-in-sim-04668d1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3432%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3431-cwe-862-missing-authorization-in-sim-98ba3f10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3431%3A%20CWE-862%20Missing%20Authorization%20in%20SimStudioAI%20sim&amp;severity=critical&amp;id=69a5937832ffcdb8a228be33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14532-cwe-434-unrestricted-upload-of-file-a08baa22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14532%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12462-cwe-89-improper-neutralization-of-s-e4bc6af2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12462%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=69a5937832ffcdb8a228be2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-apt-targets-air-gapped-systems-in-rec-01a77ed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20APT%20Targets%20Air-Gapped%20Systems%20in%20Recent%20Campaign&amp;severity=medium&amp;id=69a57aa532ffcdb8a20f84b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-working-towards-quantum-safe-chrome-https-c-51a02371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Working%20Towards%20Quantum-Safe%20Chrome%20HTTPS%20Certificates&amp;severity=medium&amp;id=69a5772032ffcdb8a208e196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58406-cwe-693-protection-mechanism-failur-90e01dfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58406%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58405-cwe-1021-improper-restriction-of-re-3693e469</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58405%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58402-cwe-639-authorization-bypass-throug-e811e431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58402%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=69a573fd32ffcdb8a20705ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30062-cwe-89-improper-neutralization-of-s-406cf469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30062%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=69a573fd32ffcdb8a20705e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30044-cwe-78-improper-neutralization-of-s-2f406f65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30044%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20CommandInjection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30042-cwe-603-use-of-client-side-authenti-9e79f8b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30042%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30035-cwe-306-missing-authentication-for--80df036f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30035%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=69a573fd32ffcdb8a20705da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-zip-files-inside-rtf-mon-mar-2nd-0c33c52b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20ZIP%20Files%20Inside%20RTF%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-464-released-mon-mar-2nd-1c22c94e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.4%20Released%2C%20(Mon%2C%20Mar%202nd)&amp;severity=medium&amp;id=69a5739d32ffcdb8a206dff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10350-cwe-89-improper-neutralization-of-s-d1330e4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10350%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20NETRAAD&amp;severity=high&amp;id=69a573fd32ffcdb8a20705d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-israel-and-iran-trade-cyberattacks-pro-west-hac-ac7cd7b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US-Israel%20and%20Iran%20Trade%20Cyberattacks%3A%20Pro-West%20Hacks%20Cause%20Disruption%20as%20Tehran%20Retaliates&amp;severity=critical&amp;id=69a5701932ffcdb8a20320c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2584-cwe-89-improper-neutralization-of-sp-3951e11b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2584%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ciser%20System%20SL%20CSIP%20firmware&amp;severity=critical&amp;id=69a5542f32ffcdb8a2ddad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20416-cwe-787-out-of-bounds-write-in-medi-250df18d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20416%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20445-cwe-367-time-of-check-time-of-use-t-1aacf4d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20445%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550b032ffcdb8a2d8ad3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20429-cwe-125-out-of-bounds-read-in-media-47f3aa2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20429%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20424-cwe-125-out-of-bounds-read-in-media-a029e3f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20424%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20444-cwe-787-out-of-bounds-write-in-medi-7a1940a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20444%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8aceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20443-cwe-416-use-after-free-in-mediatek--5d941cf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20443%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20442-cwe-416-use-after-free-in-mediatek--fadd9fca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20442%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20441-cwe-787-out-of-bounds-write-in-medi-009447e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20441%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8ace2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20440-cwe-1285-specified-index-position-o-c6257827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20440%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20439-cwe-416-use-after-free-in-mediatek--27fbcc84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20439%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20438-cwe-367-time-of-check-time-of-use-t-14669464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20438%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20437-cwe-416-use-after-free-in-mediatek--12a7a5b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20437%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20436-cwe-120-classic-buffer-overflow-in--1dd491fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20436%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20435-cwe-522-insufficiently-protected-cr-c10cbe25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20435%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ae32ffcdb8a2d8acd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20434-cwe-787-out-of-bounds-write-in-medi-48a3728c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20434%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20430-cwe-787-out-of-bounds-write-in-medi-388e7108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20430%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20428-cwe-787-out-of-bounds-write-in-medi-870c8926</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20428%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20427-cwe-787-out-of-bounds-write-in-medi-d3e944a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20427%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20426-cwe-787-out-of-bounds-write-in-medi-97a580b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20426%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20425-cwe-787-out-of-bounds-write-in-medi-4edb3ff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20425%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69a550ac32ffcdb8a2d8ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20423-cwe-749-exposed-dangerous-method-or-377e62dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20423%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69a550ac32ffcdb8a2d8ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3422-cwe-502-deserialization-of-untrusted-c53bebca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3422%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20e-Excellence%20U-Office%20Force&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6ad05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15597-improper-access-controls-in-dataeas-ce1dc337</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15597%3A%20Improper%20Access%20Controls%20in%20Dataease%20SQLBot&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6ace1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3000-cwe-494-download-of-code-without-int-6f96a540</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3000%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3413-sql-injection-in-itsourcecode-univer-983c6ee5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3413%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a52d8232ffcdb8a2a6acfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2999-cwe-494-download-of-code-without-int-5d28b8bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2999%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Changing%20IDExpert%20Windows%20Logon%20Agent&amp;severity=critical&amp;id=69a52d8232ffcdb8a2a6acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3412-cross-site-scripting-in-itsourcecode-e5baf82a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3412%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a522f732ffcdb8a29725e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3411-sql-injection-in-itsourcecode-univer-e960a20a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3411%3A%20SQL%20Injection%20in%20itsourcecode%20University%20Management%20System&amp;severity=medium&amp;id=69a51bef32ffcdb8a28abb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3410-sql-injection-in-itsourcecode-societ-8229ef18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3410%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3409-code-injection-in-eosphoros-ai-db-gp-fe6781c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3409%3A%20Code%20Injection%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=69a5186a32ffcdb8a2864dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3408-null-pointer-dereference-in-open-bab-da0da361</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3408%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=69a50ddf32ffcdb8a25b4131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3407-heap-based-buffer-overflow-in-yosysh-dca42c3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3407%3A%20Heap-based%20Buffer%20Overflow%20in%20YosysHQ%20yosys&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3406-sql-injection-in-projectworlds-onlin-9eac0e99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3406%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Art%20Gallery%20Shop&amp;severity=medium&amp;id=69a5348c32ffcdb8a2af2b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3405-path-traversal-in-thinkgem-jeesite-5196bf01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3405%3A%20Path%20Traversal%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3404-xml-external-entity-reference-in-thi-51b249e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3404%3A%20XML%20External%20Entity%20Reference%20in%20thinkgem%20JeeSite&amp;severity=low&amp;id=69a4f1c732ffcdb8a223af35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3403-cross-site-scripting-in-phpgurukul-s-17adf644</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3403%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e73232ffcdb8a20beade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3402-cross-site-scripting-in-phpgurukul-s-3b0afb5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3402%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Student%20Record%20Management%20System&amp;severity=medium&amp;id=69a4e02a32ffcdb8a2fae9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3401-session-expiration-in-sourcecodester-da3b4f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3401%3A%20Session%20Expiration%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=low&amp;id=69a4e02a32ffcdb8a2fae9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-02-63e7627a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-02&amp;severity=medium&amp;id=69a62892d1a09e29cb62b7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26713-na-7bedeb27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26713%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26712-na-24d0bc2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26712%3A%20n%2Fa&amp;severity=critical&amp;id=69a5e601d1a09e29cb3f713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26711-na-6f7b1ca4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26711%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26710-na-b38411d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26710%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26709-na-883f5184</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26709%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d7f0d1a09e29cb15f95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26706-na-5cbb336a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26706%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26705-na-a9848195</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26705%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26704-na-28680e8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26704%3A%20n%2Fa&amp;severity=critical&amp;id=69a5d050b6c0d8506fbcb7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26707-na-6e668b1d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26707%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ccceb6c0d8506fb79213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26708-na-9d3ae846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26708%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26700-na-7f4834e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26700%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24105-na-2160bf38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24105%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c5cab6c0d8506faa2d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24115-na-134d08de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24115%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24108-na-e5dd6352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24108%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24107-na-70a14196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24107%3A%20n%2Fa&amp;severity=critical&amp;id=69a5c4fdb6c0d8506fa86d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65465-na-fdf17c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65465%3A%20n%2Fa&amp;severity=medium&amp;id=69a5c4fdb6c0d8506fa86d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58107-na-d7a73217</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58107%3A%20n%2Fa&amp;severity=high&amp;id=69a5c4fdb6c0d8506fa86d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70252-na-41578cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70252%3A%20n%2Fa&amp;severity=high&amp;id=69a5ba2232ffcdb8a272b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26699-na-e2fc148c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26699%3A%20n%2Fa&amp;severity=high&amp;id=69a5b31c32ffcdb8a247ea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24110-na-365c0423</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24110%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24101-na-d4673fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24101%3A%20n%2Fa&amp;severity=critical&amp;id=69a5b31c32ffcdb8a247ea1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-02-9a2afa6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-02&amp;severity=medium&amp;id=69a5af5e32ffcdb8a243307b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26720-na-2ff82cfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26720%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26701-na-f7f6a089</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26701%3A%20n%2Fa&amp;severity=critical&amp;id=69a5ac1332ffcdb8a23ff412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24112-na-7748f962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24112%3A%20n%2Fa&amp;severity=high&amp;id=69a5ac1332ffcdb8a23ff40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66880-na-5a19d613</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66880%3A%20n%2Fa&amp;severity=medium&amp;id=69a5ac1332ffcdb8a23ff407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26703-na-12ee013e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26703%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26702-na-04c047b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26702%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89232ffcdb8a23d2f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26696-na-579f0a76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26696%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26695-na-2c54b368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26695%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26694-na-9ad189bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26694%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24111-na-6172e3d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24111%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a89032ffcdb8a23d2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24114-na-ff78d00a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24114%3A%20n%2Fa&amp;severity=high&amp;id=69a5a50b32ffcdb8a23b6e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24113-na-9be2e8f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24113%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24109-na-d78e78dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24109%3A%20n%2Fa&amp;severity=critical&amp;id=69a5a50b32ffcdb8a23b6e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26698-na-2e1f1f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26698%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26697-na-0f327e0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26697%3A%20n%2Fa&amp;severity=medium&amp;id=69a59a7f32ffcdb8a231556c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-02-646a39fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-02&amp;severity=low&amp;id=69a51f3932ffcdb8a2918c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3400-stack-based-buffer-overflow-in-tenda-c665b93a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3400%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=69a4ce9732ffcdb8a239391b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3399-buffer-overflow-in-tenda-f453-2372f90c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3399%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4c78f32ffcdb8a20b0e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3398-buffer-overflow-in-tenda-f453-735bc013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3398%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a4b98032ffcdb8a289904f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3395-code-injection-in-maxsite-cms-3bfdaf81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3395%3A%20Code%20Injection%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=69a44c8232ffcdb8a22bcf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3394-memory-corruption-in-jarikomppa-solo-211ba7f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3394%3A%20Memory%20Corruption%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4343532ffcdb8a2227d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-claude-code-in-mexican-governmen-ba878574</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Claude%20Code%20in%20Mexican%20Government%20Cyberattack&amp;severity=medium&amp;id=69a433f132ffcdb8a2227866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3393-heap-based-buffer-overflow-in-jariko-5c5d7c47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3393%3A%20Heap-based%20Buffer%20Overflow%20in%20jarikomppa%20soloud&amp;severity=medium&amp;id=69a4306332ffcdb8a22142d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3392-null-pointer-dereference-in-fascinat-e8321564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3392%3A%20NULL%20Pointer%20Dereference%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d5292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3391-out-of-bounds-read-in-fascinatedbox--9a203fbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3391%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a425d832ffcdb8a21d528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3390-out-of-bounds-read-in-fascinatedbox--3e1232d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3390%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=69a410be32ffcdb8a216f793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3389-null-pointer-dereference-in-squirrel-0cdfbe54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3389%3A%20NULL%20Pointer%20Dereference%20in%20Squirrel&amp;severity=medium&amp;id=69a410be32ffcdb8a216f78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3388-uncontrolled-recursion-in-squirrel-9607a98f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3388%3A%20Uncontrolled%20Recursion%20in%20Squirrel&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3387-null-pointer-dereference-in-wren-lan-d9c45b90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3387%3A%20NULL%20Pointer%20Dereference%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a40d3b32ffcdb8a215b13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3386-out-of-bounds-read-in-wren-lang-wren-34b2743d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3386%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3385-uncontrolled-recursion-in-wren-lang--328bcef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3385%3A%20Uncontrolled%20Recursion%20in%20wren-lang%20wren&amp;severity=medium&amp;id=69a3ff2a32ffcdb8a20f9a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3384-uncontrolled-recursion-in-chaiscript-987eeee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3384%3A%20Uncontrolled%20Recursion%20in%20ChaiScript&amp;severity=medium&amp;id=69a3f82232ffcdb8a20b78ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3383-divide-by-zero-in-chaiscript-a72de4d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3383%3A%20Divide%20By%20Zero%20in%20ChaiScript&amp;severity=medium&amp;id=69a3e31832ffcdb8a2033ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3382-memory-corruption-in-chaiscript-4e28e43c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3382%3A%20Memory%20Corruption%20in%20ChaiScript&amp;severity=medium&amp;id=69a3d17732ffcdb8a2ed6d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-unautho-4e0297d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20unauthorized%20version%20of%20monitoring%20tool%20abused%20by%20cybercriminals%20to%20spy%20on%20victims&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f8734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plugx-meeting-invitation-via-msbuild-and-gdata-6eb1b765</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlugX%20Meeting%20Invitation%20via%20MSBuild%20and%20GDATA&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f871d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-windows-file-explorer-and-webdav-for-malwa-66456dc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Windows%20File%20Explorer%20and%20WebDAV%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69a57ab332ffcdb8a20f870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3380-buffer-overflow-in-tenda-f453-54481f34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3380%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3b55632ffcdb8a2b4b44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3379-buffer-overflow-in-tenda-f453-63a79945</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3379%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3378-buffer-overflow-in-tenda-f453-0b5023a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3378%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3a74732ffcdb8a2a0f4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-03-01-27955616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-03-01&amp;severity=medium&amp;id=69a4d56532ffcdb8a278469f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-03-01-5c769887</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-03-01&amp;severity=medium&amp;id=69a48f1632ffcdb8a2432fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-03-01-665b3e85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-03-01&amp;severity=low&amp;id=69a3fef132ffcdb8a20f79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3377-buffer-overflow-in-tenda-f453-c140c206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3377%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a37d1832ffcdb8a2775af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3376-buffer-overflow-in-tenda-f453-d5150655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3376%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a3760f32ffcdb8a2754357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28562-improper-neutralization-of-special--22c35314</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28561-improper-neutralization-of-input-du-2ab57de1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28560-improper-neutralization-of-input-du-8faa806d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28559-exposure-of-sensitive-information-t-63f9c324</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28559%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28558-improper-neutralization-of-input-du-ef0d4882</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28557-missing-authorization-in-gvectors-t-52ac189f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28557%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=high&amp;id=69a3647b32ffcdb8a26ae361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28556-missing-authorization-in-gvectors-t-7c48eb32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28556%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28555-missing-authorization-in-gvectors-t-0d98cbfc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28555%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28554-missing-authorization-in-gvectors-t-03297c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28554%3A%20Missing%20Authorization%20in%20gVectors%20Team%20wpForo%20Forum&amp;severity=medium&amp;id=69a3647b32ffcdb8a26ae352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadian-tire-data-breach-impacts-38-million-accou-c239d541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canadian%20Tire%20Data%20Breach%20Impacts%2038%20Million%20Accounts&amp;severity=medium&amp;id=69a2d7a532ffcdb8a23552b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3010-cwe-79-improper-neutralization-of-in-f593f595</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2844-cwe-306-missing-authentication-for-c-aa868998</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2844%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microchip%20TimePictra&amp;severity=critical&amp;id=69a2d7ea32ffcdb8a2355e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13673-cwe-89-improper-neutralization-of-s-d43b2ec0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13673%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=69a29c1732ffcdb8a21a67e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2471-cwe-502-deserialization-of-untrusted-d6318999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2471%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smub%20WP%20Mail%20Logging&amp;severity=high&amp;id=69a2918b32ffcdb8a20eaa4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1542-cwe-502-deserialization-of-untrusted-59f81670</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1542%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Super%20Stage%20WP&amp;severity=medium&amp;id=69a2bbbc32ffcdb8a227e261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-28-bf794239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-28&amp;severity=medium&amp;id=69a383e532ffcdb8a279ce9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-28-cdec1619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-28&amp;severity=low&amp;id=69a2520932ffcdb8a2a9c846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-28-c6fb4a83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-28&amp;severity=medium&amp;id=69a2520932ffcdb8a2a9c83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28426-cwe-79-improper-neutralization-of-i-60e5cc52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28426%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a2210832ffcdb8a2802147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28425-cwe-94-improper-control-of-generati-a87384ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28425%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69a21f2232ffcdb8a27f4a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27759-cwe-918-server-side-request-forgery-7b0812f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27759%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Dhrumil%20Kumbhani%20Featured%20Image%20from%20Content&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28424-cwe-862-missing-authorization-in-st-0c75739a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28424%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28423-cwe-918-server-side-request-forgery-eabbe53b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28423%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20statamic%20cms&amp;severity=medium&amp;id=69a21f2232ffcdb8a27f4a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28411-cwe-288-authentication-bypass-using-7167a2c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28411%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28409-cwe-78-improper-neutralization-of-s-258821fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28409%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a277775c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28408-cwe-862-missing-authorization-in-la-ddacfcff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28408%3A%20CWE-862%3A%20Missing%20Authorization%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=69a212fb32ffcdb8a2777758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28416-cwe-918-server-side-request-forgery-7592cbef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28416%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a2777772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28415-cwe-200-exposure-of-sensitive-infor-dbcfee5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28415%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=69a212fb32ffcdb8a277776d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28414-cwe-36-absolute-path-traversal-in-g-feb1c031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28414%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20gradio-app%20gradio&amp;severity=high&amp;id=69a212fb32ffcdb8a277777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27939-cwe-287-improper-authentication-in--447d0594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27939%3A%20CWE-287%3A%20Improper%20Authentication%20in%20statamic%20cms&amp;severity=high&amp;id=69a212fb32ffcdb8a2777778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trump-orders-all-federal-agencies-to-phase-out-use-baea88a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trump%20Orders%20All%20Federal%20Agencies%20to%20Phase%20Out%20Use%20of%20Anthropic%20Technology&amp;severity=medium&amp;id=69a20f4132ffcdb8a275b2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28407-cwe-703-improper-check-or-handling--2f677404</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28407%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=69a20f8732ffcdb8a275da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28406-cwe-22-improper-limitation-of-a-pat-c28b7a73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28406%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-forks%20kaniko&amp;severity=high&amp;id=69a20f8732ffcdb8a275da1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28402-cwe-354-improper-validation-of-inte-be34d944</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28402%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=69a20bf332ffcdb8a2748336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28400-cwe-749-exposed-dangerous-method-or-da335de5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28400%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20model-runner&amp;severity=high&amp;id=69a20bf332ffcdb8a2748332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28355-cwe-79-improper-neutralization-of-i-7d738047</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28355%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkst%20canarytokens&amp;severity=low&amp;id=69a2087132ffcdb8a2724a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28351-cwe-400-uncontrolled-resource-consu-1ca949cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69a2087132ffcdb8a2724a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28288-cwe-204-observable-response-discrep-609a4992</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28288%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20langgenius%20dify&amp;severity=medium&amp;id=69a2016632ffcdb8a26f324d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28272-cwe-79-improper-neutralization-of-i-47808143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28272%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=69a2016632ffcdb8a26f324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28271-cwe-350-reliance-on-reverse-dns-res-d5eb1b08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28271%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28270-cwe-434-unrestricted-upload-of-file-06e3aca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28270%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a2016632ffcdb8a26f3244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28268-cwe-459-incomplete-cleanup-in-go-vi-0517b158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28268%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=69a2016632ffcdb8a26f323f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28231-cwe-125-out-of-bounds-read-in-bigca-c6bc910b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28231%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bigcat88%20pillow_heif&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e412b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3255-cwe-340-generation-of-predictable-nu-990287a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3255%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20TOKUHIROM%20HTTP%3A%3ASession2&amp;severity=medium&amp;id=69a1fde732ffcdb8a26e4130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27836-cwe-862-missing-authorization-in-th-18400afc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27836%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=69a1fa6032ffcdb8a26d1c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27947-cwe-88-improper-neutralization-of-a-24402a59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27947%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69a1fa6032ffcdb8a26d1c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27832-cwe-89-improper-neutralization-of-s-6c490a3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27832%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27824-cwe-307-improper-restriction-of-exc-39b00782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27824%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27810-cwe-113-improper-neutralization-of--a1ce14fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27810%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20kovidgoyal%20calibre&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27734-cwe-22-improper-limitation-of-a-pat-4f122212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27734%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20henrygd%20beszel&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27793-cwe-639-authorization-bypass-throug-84a88cae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27793%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f6db32ffcdb8a26bc2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27792-cwe-862-missing-authorization-in-se-260eb1fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27792%3A%20CWE-862%3A%20Missing%20Authorization%20in%20seerr-team%20seerr&amp;severity=medium&amp;id=69a1f35732ffcdb8a26a7753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27707-cwe-288-authentication-bypass-using-d68532fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27707%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20seerr-team%20seerr&amp;severity=high&amp;id=69a1f35732ffcdb8a26a774e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28354-cwe-639-authorization-bypass-throug-2e337172</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28354%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=69a1efd532ffcdb8a269c95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26997-cwe-79-improper-neutralization-of-i-1ccfba73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22717-cwe-125-out-of-bounds-read-in-vmwar-9dea0b38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22717%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VMware%20Workstation&amp;severity=low&amp;id=69a1efd332ffcdb8a269c8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22716-cwe-125-out-of-bounds-read-in-vmwar-8d78d628</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27758-cwe-352-cross-site-request-forgery--f8983b9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27757-cwe-620-unverified-password-change--836b6108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27757%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1e1c432ffcdb8a263477f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27756-cwe-79-improper-neutralization-of-i-56dffe32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a263477b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27755-cwe-330-use-of-insufficiently-rando-27c7bdab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27755%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1e1c432ffcdb8a2634777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27754-cwe-328-use-of-weak-hash-in-shenzhe-a0a4ca86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27754%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1e1c432ffcdb8a2634773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27753-cwe-307-improper-restriction-of-exc-f450d076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27753%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=medium&amp;id=69a1de4132ffcdb8a26144d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27752-cwe-319-cleartext-transmission-of-s-f729bb7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27752%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=high&amp;id=69a1de4132ffcdb8a26144d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27751-cwe-1392-use-of-default-credentials-706a3fb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27751%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Shenzhen%20Hongyavision%20Technology%20Co.%2C%20Ltd.%20(Sodola%20Networks)%20SODOLA%20SL902-SWTGW124AS&amp;severity=critical&amp;id=69a1de4132ffcdb8a26144d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21619-cwe-400-uncontrolled-resource-consu-f28b2248</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21619%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20hexpm%20hex_core&amp;severity=low&amp;id=69a1de4132ffcdb8a26144c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/local-ktae-and-the-ida-pro-plugin-kaspersky-offici-3a13a807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Local%20KTAE%20and%20the%20IDA%20Pro%20plugin%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69a1ccf432ffcdb8a24a1deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3304-cwe-459-in-expressjs-multer-22a5e3c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3304%3A%20CWE-459%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e705d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2359-cwe-772-in-expressjs-multer-b3f304cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2359%3A%20CWE-772%20in%20expressjs%20multer&amp;severity=high&amp;id=69a1be9b32ffcdb8a23e7057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-attck-advisory-council-russian-cyber-536a6441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATT%26CK%20Advisory%20Council%2C%20Russian%20Cyberattacks%20Aid%20Missile%20Strikes%2C%20Predator%20Bypasses%20iOS%20Indicators&amp;severity=medium&amp;id=69a1b75d32ffcdb8a23cc5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3277-cwe-312-cleartext-storage-of-sensiti-cd3f3fd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=69a1b7a632ffcdb8a23ccfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2749-e23f9297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2749&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2750-cwe-20-improper-input-validation-in--d73d2c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2750%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Centreon%20Centreon%20Open%20Tickets%20on%20Central%20Server&amp;severity=critical&amp;id=69a1b7a632ffcdb8a23ccfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3327-cwe-79-improper-neutralization-of-in-970903af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DatoCMS%20Web%20Previews&amp;severity=medium&amp;id=69a1a98332ffcdb8a2378ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15498-cwe-89-improper-neutralization-of-s-0a597b74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15498%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Pro3W%20Pro3W%20CMS&amp;severity=critical&amp;id=69a1a5fe32ffcdb8a235f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/38-million-allegedly-impacted-by-manomano-data-bre-81de6c83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=38%20Million%20Allegedly%20Impacted%20by%20ManoMano%20Data%20Breach&amp;severity=medium&amp;id=69a1a24532ffcdb8a2343cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2751-blind-sql-injection-via-unsanitized--3cc96648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2751%3A%20Blind%20SQL%20Injection%20via%20unsanitized%20array%20keys%20in%20Service%20Dependencies%20deletion.%20in%20Centreon%20Centreon%20Web%20on%20Central%20Server&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10990-inefficient-regular-expression-comp-66f11e14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10990%3A%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/900-sangoma-freepbx-instances-infected-with-web-sh-4c7fa87f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=900%20Sangoma%20FreePBX%20Instances%20Infected%20With%20Web%20Shells&amp;severity=medium&amp;id=69a19b3e32ffcdb8a231cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3223-cwe-22-improper-limitation-of-a-path-65bbd039</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3223%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Web%20Designer&amp;severity=high&amp;id=69a19ef732ffcdb8a232d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11950-cwe-79-improper-neutralization-of-i-394c2718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11950%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20KNOWHY%20Advanced%20Technology%20Trading%20Ltd.%20Co.%20EduAsist&amp;severity=medium&amp;id=69a197f132ffcdb8a2305706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chilean-carding-shop-operator-extradited-to-us-ff61a7f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chilean%20Carding%20Shop%20Operator%20Extradited%20to%20US&amp;severity=medium&amp;id=69a190b232ffcdb8a22da550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-refuses-to-bend-to-pentagon-on-ai-safegu-724d3d36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Refuses%20to%20Bend%20to%20Pentagon%20on%20AI%20Safeguards%20as%20Dispute%20Nears%20Deadline&amp;severity=medium&amp;id=69a190b232ffcdb8a22da553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11252-cwe-89-improper-neutralization-of-s-229dc350</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11252%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Signum%20Technology%20Promotion%20and%20Training%20Inc.%20windesk.fm&amp;severity=critical&amp;id=69a21f2232ffcdb8a27f4aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-fedex-email-delivers-donutsx21-fri-feb-27th-a42d059d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Fedex%20Email%20Delivers%20Donuts%26%23x21%3B%2C%20(Fri%2C%20Feb%2027th)&amp;severity=medium&amp;id=69a18d2c32ffcdb8a22c9d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aeternum-botnet-loader-employs-polygon-blockchain--89cf856e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aeternum%20Botnet%20Loader%20Employs%20Polygon%20Blockchain%20C%26C%20to%20Boost%20Resilience&amp;severity=medium&amp;id=69a189a832ffcdb8a22adfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11251-cwe-89-improper-neutralization-of-s-0669f2cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11251%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dayneks%20Software%20Industry%20and%20Trade%20Inc.%20E-Commerce%20Platform&amp;severity=critical&amp;id=69a189f332ffcdb8a22b00e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24352-cwe-384-session-fixation-in-pluxml--87293653</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24352%3A%20CWE-384%20Session%20Fixation%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24351-cwe-79-improper-neutralization-of-i-5535a71d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24351%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a2282723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24350-cwe-79-improper-neutralization-of-i-ca539a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PluXml%20PluXml%20CMS&amp;severity=medium&amp;id=69a182d732ffcdb8a228271f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2831-cwe-89-improper-neutralization-of-sp-79154bf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2831%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pierrelannoy%20MailArchiver&amp;severity=medium&amp;id=69a182d732ffcdb8a228272b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-ptx-routers-affected-by-critical--b59873d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20PTX%20Routers%20Affected%20by%20Critical%20Vulnerability&amp;severity=critical&amp;id=69a1749132ffcdb8a21d7bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1434-cwe-79-improper-neutralization-of-in-4ad955e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Politechnika%20Warszawska%20Omega-PSIR&amp;severity=medium&amp;id=69a1784b32ffcdb8a21fae63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dohdoor-malware-campaign-targets-education-and-d356513f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dohdoor%20malware%20campaign%20targets%20education%20and%20health%20care&amp;severity=medium&amp;id=69a16d8732ffcdb8a2195d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-evolution-of-vs-code-and-curs-6afe0a1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%3A%20Evolution%20of%20VS%20Code%20and%20Cursor%20Tasks%20Infection%20Chains%20-%20Part%201&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnet-trojan-delivered-through-clickfix-and-ether-d3b38f2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnet%20Trojan%20delivered%20through%20ClickFix%20and%20EtherHiding&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-arpa-the-tld-that-isnt-supposed-to-host-an-36609fd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20.arpa%3A%20The%20TLD%20That%20Isn&apos;t%20Supposed%20to%20Host%20Anything&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1305-cwe-287-improper-authentication-in-s-96cc64c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1305%3A%20CWE-287%20Improper%20Authentication%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69a166b732ffcdb8a2157df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14142-cwe-79-improper-neutralization-of-i-049f904d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electriccode%20Electric%20Enquiries&amp;severity=medium&amp;id=69a166b732ffcdb8a2157deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10938-cwe-506-embedded-malicious-code-in--4a12daaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10938%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20moneytigo%20OVRI%20Payment&amp;severity=medium&amp;id=69a166b732ffcdb8a2157de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21660-cwe-256-plaintext-storage-of-a-pass-aad934b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21660%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=medium&amp;id=69a1633532ffcdb8a2131e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malicious-npm-package-ambar-src-targets-develo-1c59a0c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20malicious%20npm%20package%20&apos;ambar-src&apos;%20targets%20developers%20with%20open%20source%20malware&amp;severity=medium&amp;id=69a16a0332ffcdb8a2171d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21659-cwe-22-improper-limitation-of-a-pat-3400c9c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21659%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a1633532ffcdb8a2131e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21658-cwe-94-improper-control-of-generati-f2d5d005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21657-cwe-94-improper-control-of-generati-ac9104a8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21657%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a2106783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21656-cwe-94-improper-control-of-generati-591cf794</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21656%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a15faf32ffcdb8a210677f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1627-cwe-327-use-of-a-broken-or-risky-cry-3510b538</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1627%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a2106777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1626-cwe-327-use-of-a-broken-or-risky-cry-6e2a50f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1626%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20LMS1000&amp;severity=medium&amp;id=69a15faf32ffcdb8a210676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21654-cwe-78-improper-neutralization-of-s-fee4b2ef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21654%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20Frick%20Controls%20Quantum%20HD&amp;severity=high&amp;id=69a158a732ffcdb8a20b09cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2362-cwe-79-improper-neutralization-of-in-7f8990ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joedolson%20WP%20Accessibility&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2383-cwe-79-improper-neutralization-of-in-34b3f279</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=medium&amp;id=69a158a732ffcdb8a20b09d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2252-cwe-611-improper-restriction-of-xml--6b6b1047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2252%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Xerox%20FreeFlow%20Core&amp;severity=high&amp;id=69a1552332ffcdb8a208e3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2251-cwe-22-improper-limitation-of-a-path-309f50e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2251%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=69a1552332ffcdb8a208e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27776-deserialization-of-untrusted-data-i-dbd89a5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27776%3A%20Deserialization%20of%20untrusted%20data%20in%20NTT%20DATA%20INTRAMART%20Corporation%20intra-mart%20Accel%20Platform&amp;severity=high&amp;id=69a1519e32ffcdb8a205ced7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-exposed-gardyn-smart-gardens-to-rem-6afe633e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Exposed%20Gardyn%20Smart%20Gardens%20to%20Remote%20Hacking&amp;severity=critical&amp;id=69a14a6132ffcdb8a2012a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0980-improper-neutralization-of-special-e-8f324e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0980%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69a14e1a32ffcdb8a203afe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0871-incorrect-privilege-assignment-in-re-d9362869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0871%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13327-improper-validation-of-syntactic-co-5f074485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13327%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20astral-sh%20uv&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9909-use-of-non-canonical-url-paths-for-a-ff141764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9909%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9908-exposure-of-sensitive-information-to-01a50cc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9908%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9907-exposure-of-sensitive-information-to-cc86b7aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9907%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9572-exposure-of-sensitive-information-to-9f64e32c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9572%3A%20Incorrect%20Authorization%20in%20The%20Foreman%20Foreman&amp;severity=medium&amp;id=69a14e1a32ffcdb8a203afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15567-cwe-306-missing-authentication-for--6aaaa9dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15567%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20Health&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15509-cwe-306-missing-authentication-for--e81e4acc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20SmartRemote&amp;severity=high&amp;id=69a1438e32ffcdb8a2fbeb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12981-cwe-269-improper-privilege-manageme-e6893456</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12981%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Listee&amp;severity=critical&amp;id=69a1438e32ffcdb8a2fbeaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14149-cwe-79-improper-neutralization-of-i-23af593b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20Xpro%20Addons%20%E2%80%94%20140%2B%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14040-cwe-79-improper-neutralization-of-i-7f5c8007</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesuite%20Automotive%20Car%20Dealership%20Business%20WordPress%20Theme&amp;severity=medium&amp;id=69a1438e32ffcdb8a2fbeafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3302-cross-site-scripting-in-sourcecodest-7e2a663c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3302%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Doctor%20Appointment%20System&amp;severity=medium&amp;id=69a1390232ffcdb8a2f493bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27653-incorrect-default-permissions-in-so-72204038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27653%3A%20Incorrect%20default%20permissions%20in%20Soliton%20Systems%20K.K.%20Soliton%20SecureBrowser%20for%20OneGate&amp;severity=medium&amp;id=69a1357f32ffcdb8a2f19b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3301-os-command-injection-in-totolink-n30-8ab5e0b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3301%3A%20OS%20Command%20Injection%20in%20Totolink%20N300RH&amp;severity=critical&amp;id=69a12e7632ffcdb8a2ebeaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3293-inefficient-regular-expression-compl-fdcbf38b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3293%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20snowflakedb%20snowflake-jdbc&amp;severity=medium&amp;id=69a12e7632ffcdb8a2ebeaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28372-cwe-829-inclusion-of-functionality--04030f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28372%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20GNU%20inetutils&amp;severity=high&amp;id=69a12e7632ffcdb8a2ebeaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-go-crypto-module-steals-passwords-and-de-5a9ea1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Go%20&apos;crypto&apos;%20Module%20Steals%20Passwords%20and%20Deploys%20Rekoobe%20Backdoor&amp;severity=medium&amp;id=69a15f7732ffcdb8a2102f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3292-sql-injection-in-jizhicms-d8105f3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3292%3A%20SQL%20Injection%20in%20jizhiCMS&amp;severity=medium&amp;id=69a1276f32ffcdb8a2e563fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28370-cwe-95-improper-neutralization-of-d-e403f347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28370%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenStack%20Vitrage&amp;severity=critical&amp;id=69a1276f32ffcdb8a2e563fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1558-cwe-639-authorization-bypass-through-08601960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1558%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69a1be9b32ffcdb8a23e7063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3289-path-traversal-in-sanluan-publiccms-7a278269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3289%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1442-cwe-321-use-of-hard-coded-cryptograp-3990dc00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1442%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Unitree%20UPK&amp;severity=high&amp;id=69a1c21f32ffcdb8a23fb748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3287-sql-injection-in-youlaitech-youlai-m-f54637dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3287%3A%20SQL%20Injection%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69a1ec5132ffcdb8a267e1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3286-server-side-request-forgery-in-itwan-92eaf84b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3286%3A%20Server-Side%20Request%20Forgery%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=69a1195f32ffcdb8a2c64269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2428-cwe-345-insufficient-verification-of-33fd59e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2428%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=high&amp;id=69a1195f32ffcdb8a2c64265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3285-out-of-bounds-read-in-berry-lang-ber-d0a248e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3285%3A%20Out-of-Bounds%20Read%20in%20berry-lang%20berry&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3284-integer-overflow-in-libvips-1f40665b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3284%3A%20Integer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3283-out-of-bounds-read-in-libvips-2cba54fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3283%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3282-out-of-bounds-read-in-libvips-63ed8a34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3282%3A%20Out-of-Bounds%20Read%20in%20libvips&amp;severity=medium&amp;id=69a10ed332ffcdb8a2b614b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3281-heap-based-buffer-overflow-in-libvip-f2781821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3281%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24498-cwe-200-exposure-of-sensitive-infor-4726610a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24498%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20EFM-Networks%2C%20Inc.%20ipTIME%20T5008&amp;severity=medium&amp;id=69a100c232ffcdb8a2a64f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24497-cwe-121-stack-based-buffer-overflow-0433973b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24497%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SimTech%20Systems%2C%20Inc.%20ThinkWise&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3275-buffer-overflow-in-tenda-f453-d6d6eb24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3275%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a100c232ffcdb8a2a64f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3037-cwe-78-in-copeland-copeland-xweb-300-4ecbd821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20797-we-121-in-copeland-copeland-xweb-30-b49b097a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20797%3A%20WE-121%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=medium&amp;id=69a0f2b332ffcdb8a2981608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3274-buffer-overflow-in-tenda-f453-d6a76b12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3274%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0f2b532ffcdb8a2981649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22877-cwe-22-in-copeland-copeland-xweb-30-79b6e451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22877%3A%20CWE-22%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=low&amp;id=69a0f2b332ffcdb8a298160d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25037-cwe-78-in-copeland-copeland-xweb-30-b7a79975</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25037%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25196-cwe-78-in-copeland-copeland-xweb-30-2b443476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25196%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20764-cwe-78-in-copeland-copeland-xweb-30-48ae0445</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20764%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25721-cwe-78-in-copeland-copeland-xweb-30-ba83d670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25721%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a298162b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23702-cwe-78-in-copeland-copeland-xweb-30-ce9fc762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23702%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24452-cwe-78-in-copeland-copeland-xweb-30-a7dbfe59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24452%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25105-cwe-78-in-copeland-copeland-xweb-30-8d544ce0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25105%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0f2b332ffcdb8a2981621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24695-cwe-78-in-copeland-copeland-xweb-30-3fd00bbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24695%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20902-cwe-78-in-copeland-copeland-xweb-30-17710e48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20902%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25109-cwe-78-in-copeland-copeland-xweb-30-a3a48ca5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25109%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24689-cwe-78-in-copeland-copeland-xweb-30-b9bf45c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24689%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20910-cwe-78-in-copeland-copeland-xweb-30-0f4f16cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20910%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25195-cwe-78-in-copeland-copeland-xweb-30-5749903d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25195%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24517-cwe-78-in-copeland-copeland-xweb-30-4bcf5b64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24517%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20742-cwe-78-in-copeland-copeland-xweb-30-03607d5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20742%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25111-cwe-78-in-copeland-copeland-xweb-30-30ddd8b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25111%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21389-cwe-78-in-copeland-copeland-xweb-30-ce8a90ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21389%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24663-cwe-78-in-copeland-copeland-xweb-30-1c773deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24663%3A%20CWE-78%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21718-cwe-327-in-copeland-copeland-xweb-3-124474ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21718%3A%20CWE-327%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=critical&amp;id=69a0ebad32ffcdb8a293f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25085-cwe-394-in-copeland-copeland-xweb-3-48dec72e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25085%3A%20CWE-394%20in%20Copeland%20Copeland%20XWEB%20300D%20PRO&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3273-buffer-overflow-in-tenda-f453-f5bf905b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3273%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0ebb032ffcdb8a293f38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22878-cwe-522-in-mobility46-mobility46se-77fe6773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22878%3A%20CWE-522%20in%20Mobility46%20mobility46.se&amp;severity=medium&amp;id=69a0ebad32ffcdb8a293f2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27647-cwe-613-in-mobility46-mobility46se-cccd2724</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27647%3A%20CWE-613%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26305-cwe-307-in-mobility46-mobility46se-6a9fcc57</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26305%3A%20CWE-307%20in%20Mobility46%20mobility46.se&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27028-cwe-306-in-mobility46-mobility46se-f694ef80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27028%3A%20CWE-306%20in%20Mobility46%20mobility46.se&amp;severity=critical&amp;id=69a0ebae32ffcdb8a293f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25774-cwe-522-in-ev-energy-evenergy-ed954fdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25774%3A%20CWE-522%20in%20EV%20Energy%20ev.energy&amp;severity=medium&amp;id=69a0ebae32ffcdb8a293f322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26290-cwe-613-in-ev-energy-evenergy-314e9523</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26290%3A%20CWE-613%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebae32ffcdb8a293f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24445-cwe-307-in-ev-energy-evenergy-00628f02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24445%3A%20CWE-307%20in%20EV%20Energy%20ev.energy&amp;severity=high&amp;id=69a0ebad32ffcdb8a293f2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27772-cwe-306-in-ev-energy-evenergy-c0de6f7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27772%3A%20CWE-306%20in%20EV%20Energy%20ev.energy&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27773-cwe-522-in-switch-ev-swtchenergycom-bfd87103</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27773%3A%20CWE-522%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c26ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25778-cwe-613-insufficient-session-expira-d088f686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25778%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3272-buffer-overflow-in-tenda-f453-6c03efcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3272%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3271-buffer-overflow-in-tenda-f453-18d7b3b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3271%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-27-1b73d646</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-27&amp;severity=medium&amp;id=69a2326532ffcdb8a287db63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69437-na-b96d7eab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69437%3A%20n%2Fa&amp;severity=high&amp;id=69a1f6db32ffcdb8a26bc2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26862-na-a9be2f89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26862%3A%20n%2Fa&amp;severity=high&amp;id=69a1de4132ffcdb8a26144cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26861-na-9b5ca2ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26861%3A%20n%2Fa&amp;severity=high&amp;id=69a1d3b432ffcdb8a252c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-27-571218db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-27&amp;severity=medium&amp;id=69a1c1e632ffcdb8a23f4ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-27-8182491f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-27&amp;severity=low&amp;id=69a131c132ffcdb8a2ee864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25113-cwe-307-improper-restriction-of-exc-c7aaebdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c26d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27767-cwe-306-missing-authentication-for--085d946c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27767%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SWITCH%20EV%20swtchenergy.com&amp;severity=critical&amp;id=69a0e11f32ffcdb8a28c26e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22890-cwe-522-in-ev2go-ev2goio-f788729f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22890%3A%20CWE-522%20in%20EV2GO%20ev2go.io&amp;severity=medium&amp;id=69a0e11f32ffcdb8a28c2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20895-cwe-613-in-ev2go-ev2goio-b11f74c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20895%3A%20CWE-613%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c2700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25945-cwe-307-improper-restriction-of-exc-27342830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25945%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20EV2GO%20ev2go.io&amp;severity=high&amp;id=69a0e11f32ffcdb8a28c270a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24731-cwe-306-in-ev2go-ev2goio-e42cb5b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24731%3A%20CWE-306%20in%20EV2GO%20ev2go.io&amp;severity=critical&amp;id=69a0dd9b32ffcdb8a288c769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1585-cwe-428-unquoted-search-path-or-elem-2e6b8a09</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1585%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Canon%20Inc.%20IJ%20Scan%20Utility&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20733-cwe-522-insufficiently-protected-cr-046de446</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20733%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20CloudCharge%20cloudcharge.se&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27652-cwe-613-in-cloudcharge-cloudcharges-a9fdd39d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27652%3A%20CWE-613%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40932-cwe-340-generation-of-predictable-n-34a891cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40932%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20GRICHTER%20Apache%3A%3ASessionX&amp;severity=high&amp;id=69a0dd9b32ffcdb8a288c75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3270-server-side-request-forgery-in-psi-p-4de13069</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3270%3A%20Server-Side%20Request%20Forgery%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3269-denial-of-service-in-psi-probe-psi-p-a71eeb31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3269%3A%20Denial%20of%20Service%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0dd9b32ffcdb8a288c773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2597-cwe-122-heap-based-buffer-overflow-i-3a4a94eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2597%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20LEONT%20Crypt%3A%3ASysRandom%3A%3AXS&amp;severity=high&amp;id=69a0da1732ffcdb8a272349d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25114-cwe-307-in-cloudcharge-cloudcharges-c78f10eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25114%3A%20CWE-307%20in%20CloudCharge%20cloudcharge.se&amp;severity=high&amp;id=69a0da1732ffcdb8a2723497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20781-cwe-306-missing-authentication-for--5f002d44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20781%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CloudCharge%20cloudcharge.se&amp;severity=critical&amp;id=69a0da1732ffcdb8a2723492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20791-cwe-522-insufficiently-protected-cr-a6313152</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20791%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Chargemap%20chargemap.com&amp;severity=medium&amp;id=69a0d69332ffcdb8a26c7035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25711-cwe-613-in-chargemap-chargemapcom-86410309</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25711%3A%20CWE-613%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20792-cwe-307-in-chargemap-chargemapcom-e8eb6a77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20792%3A%20CWE-307%20in%20Chargemap%20chargemap.com&amp;severity=high&amp;id=69a0d69332ffcdb8a26c703a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25851-cwe-306-in-chargemap-chargemapcom-07488433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25851%3A%20CWE-306%20in%20Chargemap%20chargemap.com&amp;severity=critical&amp;id=69a0d69332ffcdb8a26c7044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3268-improper-access-controls-in-psi-prob-37c8b51d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3268%3A%20Improper%20Access%20Controls%20in%20psi-probe%20PSI%20Probe&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28280-cwe-79-improper-neutralization-of-i-a42fca44</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28280%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmpsec%20osctrl&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28279-cwe-78-improper-neutralization-of-s-292cda7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28279%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jmpsec%20osctrl&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28276-cwe-200-exposure-of-sensitive-infor-80ecf535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28276%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28275-cwe-613-insufficient-session-expira-233ae79c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28275%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28274-cwe-79-improper-neutralization-of-i-f245f683</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28274%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Morelitea%20initiative&amp;severity=high&amp;id=69a0d31032ffcdb8a2667df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28269-cwe-78-improper-neutralization-of-s-9e79a839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28269%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28230-cwe-284-improper-access-control-in--646c9b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20steve-community%20steve&amp;severity=medium&amp;id=69a0d31032ffcdb8a2667dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28225-cwe-639-authorization-bypass-throug-5e6738cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28225%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3265-improper-authorization-in-go2ismail--e27a9de6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3265%3A%20Improper%20Authorization%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28213-cwe-200-exposure-of-sensitive-infor-f157ccc0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28213%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=69a0cf8b32ffcdb8a25ff5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28211-cwe-943-improper-neutralization-of--f8f2771b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28211%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20CyrilleB79%20NVDA-Dev-Test-Toolbox&amp;severity=high&amp;id=69a0cf8b32ffcdb8a25ff60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28207-cwe-78-improper-neutralization-of-s-41bc76f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28207%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20z-libs%20Zen-C&amp;severity=medium&amp;id=69a0cf8b32ffcdb8a25ff60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27638-cwe-862-missing-authorization-in-ac-cb832dee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27638%3A%20CWE-862%3A%20Missing%20Authorization%20in%20actualbudget%20actual&amp;severity=medium&amp;id=69a0c89232ffcdb8a25244f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27839-cwe-639-authorization-bypass-throug-b27f012f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27839%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27838-cwe-639-authorization-bypass-throug-bca4d59d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27838%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=low&amp;id=69a0c89232ffcdb8a2524530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3264-execution-after-redirect-in-go2ismai-6072652e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3264%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Free-CRM&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27835-cwe-639-authorization-bypass-throug-ba34a038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27835%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wger-project%20wger&amp;severity=medium&amp;id=69a0c5b685912abc710cd5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27457-cwe-862-missing-authorization-in-we-94c4aebe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27457%3A%20CWE-862%3A%20Missing%20Authorization%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69a0c5b685912abc710cd5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27449-cwe-284-improper-access-control-in--fadf6848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27449%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20umbraco%20Umbraco.Engage.Forms&amp;severity=high&amp;id=69a0c5b685912abc710cd5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3263-improper-authorization-in-go2ismail--ff0dc732</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3263%3A%20Improper%20Authorization%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0beae85912abc7105bcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3262-execution-after-redirect-in-go2ismai-85012419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3262%3A%20Execution%20After%20Redirect%20in%20go2ismail%20Asp.Net-Core-Inventory-Order-Management-System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3261-sql-injection-in-itsourcecode-school-f3a6a27d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3261%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69a0cebb32ffcdb8a25eeaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22207-cwe-306-missing-authentication-for--eb53d5ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22207%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Volcengine%20OpenViking&amp;severity=critical&amp;id=69a0cebb32ffcdb8a25eeabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1565-cwe-434-unrestricted-upload-of-file--1dad0f30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1565%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wedevs%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=high&amp;id=69a0a61285912abc71d87503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1241-cwe-288-authentication-bypass-using--e922bfa1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1241%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Pelco%2C%20Inc.%20Sarix%20Professional%20IMP%203%20Series&amp;severity=high&amp;id=69a0a61285912abc71d87500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27510-cwe-345-insufficient-verification-o-de32c7cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27510%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=medium&amp;id=69a0a43885912abc71d61abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27509-cwe-306-missing-authentication-for--3f85db2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27509%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20UnitreeRobotics%20Unitree%20Go2&amp;severity=high&amp;id=69a0a43885912abc71d61ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27141-cwe-476-null-pointer-dereference-in-ff058581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhttp2&amp;severity=high&amp;id=69a0a43885912abc71d61ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22722-cwe-476-null-pointer-dereference-in-830c2dae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22722%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22715-vulnerability-in-vmware-workstation-760959ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22715%3A%20Vulnerability%20in%20VMware%20Workstation&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-iphone-and-ipad-cleared-for-classified-nato--f1bb26b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20iPhone%20and%20iPad%20Cleared%20for%20Classified%20NATO%20Use&amp;severity=medium&amp;id=69a08c9eb7ef31ef0b9c5689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26938-cwe-1336-improper-neutralization-of-1437c993</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26938%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26937-cwe-400-uncontrolled-resource-consu-7b66a2f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26937%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26227-cwe-307-improper-restriction-of-exc-57ef4910</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26227%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23750-cwe-122-heap-based-buffer-overflow--7501864a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23750%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Golioth%20Pouch&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23749-cwe-170-improper-null-termination-i-19f097f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23749%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Golioth%20Firmware%20SDK&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23748-cwe-191-integer-underflow-wrap-or-w-ee9ee329</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23748%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23747-cwe-121-stack-based-buffer-overflow-cac35f20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23747%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Golioth%20Firmware%20SDK&amp;severity=medium&amp;id=69a0a1c885912abc71d0baa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-risks-boards-cannot-treat-as-background-noise-939afcf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Risks%20Boards%20Cannot%20Treat%20as%20Background%20Noise&amp;severity=medium&amp;id=69a0861fb7ef31ef0b964ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26936-cwe-1333-inefficient-regular-expres-bf9eee54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26936%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26935-cwe-20-improper-input-validation-in-2ab6f3da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26935%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26934-cwe-1284-improper-validation-of-spe-425cff70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26934%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26932-cwe-129-improper-validation-of-arra-b827d994</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26932%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-adds-new-capabilities-for-air-gapped-network-5692440f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20Adds%20New%20Capabilities%20for%20Air-Gapped%20Networks&amp;severity=medium&amp;id=69a0ace185912abc71e473ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28295-server-side-request-forgery-ssrf-in-187eca66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28295%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26228-cwe-22-improper-limitation-of-a-pat-e609e7ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26228%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VideoLAN%20VLC%20for%20Android&amp;severity=low&amp;id=69a0a1ca85912abc71d0bb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28296-improper-neutralization-of-crlf-seq-7df1d4b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28296%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69a06645b7ef31ef0b73ce1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2244-cwe-200-exposure-of-sensitive-inform-77100ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2244%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Vertex%20AI%20Workbench&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-code-flaws-exposed-developer-devices-to-sil-c98dfc93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Code%20Flaws%20Exposed%20Developer%20Devices%20to%20Silent%20Hacking&amp;severity=medium&amp;id=69a04d56b7ef31ef0b544dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-signal-in-the-noise-lessons-learned-runnin-c4433059</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Signal%20in%20the%20Noise%3A%20Lessons%20Learned%20Running%20a%20Honeypot%20with%20AI%20Assistance%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699faf21b7ef31ef0b7fed42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clair-model-a-synthesized-conceptual-framework-298e7e4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CLAIR%20Model%3A%20A%20Synthesized%20Conceptual%20Framework%20for%20Mapping%20Critical%20Infrastructure%20Interdependencies%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2025th)&amp;severity=critical&amp;id=699f6598b7ef31ef0b50ca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zyxel-patches-critical-vulnerability-in-many-devic-523ddaa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zyxel%20Patches%20Critical%20Vulnerability%20in%20Many%20Device%20Models&amp;severity=critical&amp;id=69a0383eb7ef31ef0b397aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14343-cwe-79-improper-neutralization-of-i-eef0abf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dokuzsoft%20Technology%20Ltd.%20E-Commerce%20Product&amp;severity=high&amp;id=69a03f7bb7ef31ef0b3f555c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1198-cwe-89-improper-neutralization-of-sp-3b46b959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1198%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20Simple.ERP&amp;severity=high&amp;id=69a0316db7ef31ef0b2da192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disrupting-the-gridtide-global-cyber-espionage-cam-ef6113c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disrupting%20the%20GRIDTIDE%20Global%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=69a042c8b7ef31ef0b424ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-russian-exploit-broker-operation-zero-75531468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20Russian%20Exploit%20Broker%20Operation%20Zero&amp;severity=medium&amp;id=69a02326b7ef31ef0b082dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64999-cwe-79-improper-neutralization-of-i-ecc6390b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64999%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=69a02368b7ef31ef0b08990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-apex-one-vulnerabilit-6afeacc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Apex%20One%20Vulnerabilities&amp;severity=critical&amp;id=69a01c1eb7ef31ef0bfb5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-catalyst-sd-wan-zero-day-exploited-b-c55ec69f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Catalyst%20SD-WAN%20Zero-Day%20Exploited%20by%20Highly%20Sophisticated%20Hackers&amp;severity=high&amp;id=69a01191b7ef31ef0be29255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28138-deserialization-of-untrusted-data-i-23ed4314</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28138%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stylemix%20uListing&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28136-improper-neutralization-of-special--ad5c4742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28136%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=high&amp;id=69a00ac0b7ef31ef0bdd3043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28132-improper-neutralization-of-script-r-c4977c49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28132%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20villatheme%20WooCommerce%20Photo%20Reviews&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd3040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28131-insertion-of-sensitive-information--c8914030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28131%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28083-improper-neutralization-of-input-du-dac8d5cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=69a00ac0b7ef31ef0bdd303a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1698-cwe-644-improper-neutralization-of-h-04573e8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1698%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1697-cwe-614-sensitive-cookie-in-https-se-000f8650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1697%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4069b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1696-cwe-79-improper-neutralization-of-in-5fb33f1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1695-cwe-79-improper-neutralization-of-in-7eca6c71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd40695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1694-cwe-201-insertion-of-sensitive-infor-0503a7bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1694%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20into%20Sent%20Data%20in%20arcinfo%20PcVue&amp;severity=low&amp;id=69a00034b7ef31ef0bd40692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1693-cwe-1390-weak-authentication-in-arci-7231b5ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1693%3A%20CWE-1390%20Weak%20Authentication%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1692-cwe-1385-missing-origin-validation-i-4c16ce65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1692%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=69a00034b7ef31ef0bd4068c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25191-uncontrolled-search-path-element-in-34c03d5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25191%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23703-incorrect-default-permissions-in-di-0baa4b8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23703%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20FinalCode%20Ver.5%20series&amp;severity=high&amp;id=699fe090b7ef31ef0bbb51b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1311-cwe-22-improper-limitation-of-a-path-245cd234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1311%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bearsthemes%20Worry%20Proof%20Backup&amp;severity=high&amp;id=699fd280b7ef31ef0bb488bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27465-cwe-201-insertion-of-sensitive-info-d63e9e3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27465%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25963-cwe-863-incorrect-authorization-in--2d2f916a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25963%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23999-cwe-330-use-of-insufficiently-rando-2363c4fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23999%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a06645b7ef31ef0b73ce20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24004-cwe-862-missing-authorization-in-fl-988a60f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24004%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=low&amp;id=69a05b9eb7ef31ef0b68a5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1779-cwe-288-authentication-bypass-using--c715b4b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1779%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=high&amp;id=69a05b9eb7ef31ef0b68a5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2356-cwe-284-improper-access-control-in-w-3646e401</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2356%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Free%20%26%20Paid%20Memberships%2C%20Subscriptions%2C%20Content%20Restriction%2C%20User%20Profile%2C%20Custom%20User%20Registration%20%26%20Login%20Builder&amp;severity=medium&amp;id=69a062b5b7ef31ef0b701612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27974-cwe-79-improper-neutralization-of-i-489e365f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27974%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf-app&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27963-cwe-79-improper-neutralization-of-i-13a3dc2b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27963%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=69a062b5b7ef31ef0b70160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27973-cwe-79-improper-neutralization-of-i-d42c2cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27973%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27966-cwe-94-improper-control-of-generati-8ac7c0b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27966%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27969-cwe-22-improper-limitation-of-a-pat-4b60f36b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27969%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitessio%20vitess&amp;severity=critical&amp;id=699fabd8b7ef31ef0b7dea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27965-cwe-78-improper-neutralization-of-s-92b79488</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27965%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vitessio%20vitess&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27959-cwe-20-improper-input-validation-in-ce484d7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27959%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20koajs%20koa&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27961-cwe-1336-improper-neutralization-of-89dbc720</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27961%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Agenta-AI%20agenta&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27952-cwe-94-improper-control-of-generati-de9bd46d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Agenta-AI%20agenta-api&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27948-cwe-79-improper-neutralization-of-i-af27e043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=699fabd8b7ef31ef0b7dea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2499-cwe-79-improper-neutralization-of-in-c0dc3012</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tgrk%20Custom%20Logo&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2029-cwe-79-improper-neutralization-of-in-066236f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2489-cwe-79-improper-neutralization-of-in-8979fb6c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20readymadeweb%20TP2WP%20Importer&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2498-cwe-79-improper-neutralization-of-in-c6873f44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bulktheme%20WP%20Social%20Meta&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1557-cwe-22-improper-limitation-of-a-path-8855fcee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1557%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stuartbates%20WP%20Responsive%20Images&amp;severity=high&amp;id=699fabd8b7ef31ef0b7dea00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2506-cwe-79-improper-neutralization-of-in-742fe189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motahar1%20EM%20Cost%20Calculator&amp;severity=medium&amp;id=699fabd9b7ef31ef0b7dea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27942-cwe-120-buffer-copy-without-checkin-fb63e4d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27942%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=low&amp;id=699fabd8b7ef31ef0b7dea09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27904-cwe-1333-inefficient-regular-expres-decea18d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27904%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27903-cwe-407-inefficient-algorithmic-com-f3f31176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27903%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=699fa148b7ef31ef0b7796b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27902-cwe-79-improper-neutralization-of-i-31462c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27902%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27901-cwe-79-improper-neutralization-of-i-27a56aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27901%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27887-cwe-770-allocation-of-resources-wit-73cfbd0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27887%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20spinframework%20spin&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27900-cwe-532-insertion-of-sensitive-info-4a37c898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27900%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20linode%20terraform-provider-linode&amp;severity=medium&amp;id=699fa148b7ef31ef0b7796a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22728-cwe-284-in-bitnami-sealed-secrets-5b4a5a73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22728%3A%20CWE-284%20in%20Bitnami%20sealed-secrets&amp;severity=medium&amp;id=699fa148b7ef31ef0b77969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27899-cwe-269-improper-privilege-manageme-f3381704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27899%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20h44z%20wg-portal&amp;severity=high&amp;id=699fa148b7ef31ef0b7796a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27896-cwe-178-improper-handling-of-case-s-047c4414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27896%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20modelcontextprotocol%20go-sdk&amp;severity=high&amp;id=699f9a40b7ef31ef0b726109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27830-cwe-502-deserialization-of-untruste-8c764401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27830%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20swaldman%20c3p0&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27888-cwe-400-uncontrolled-resource-consu-fcc40868</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27888%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=699f9a40b7ef31ef0b726103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27884-cwe-22-improper-limitation-of-a-pat-6a3213c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27884%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Pennyw0rth%20NetExec&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27829-cwe-918-server-side-request-forgery-8b06cfbd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27829%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27837-cwe-1321-improperly-controlled-modi-ec3116e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27837%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20mickhansen%20dottie.js&amp;severity=medium&amp;id=699f9a40b7ef31ef0b7260f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27831-cwe-125-out-of-bounds-read-in-blued-851df2f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27831%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bluedragonsecurity%20rldns&amp;severity=high&amp;id=699f9a40b7ef31ef0b7260f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26186-cwe-89-improper-neutralization-of-s-d124966d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26186%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27818-cwe-20-improper-input-validation-in-ff48f4c1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27818%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20TerriaJS%20terriajs-server&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27812-cwe-116-improper-encoding-or-escapi-0ec87a03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27812%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Wei-Shaw%20sub2api&amp;severity=high&amp;id=699f8fb4b7ef31ef0b6dc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-26-f35e5c14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-26&amp;severity=medium&amp;id=69a0e0e532ffcdb8a28b810e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50857-na-cde40b1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50857%3A%20n%2Fa&amp;severity=critical&amp;id=69a0a1cf85912abc71d0bf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56605-na-c59c1be3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56605%3A%20n%2Fa&amp;severity=medium&amp;id=69a0826ab7ef31ef0b92a683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26682-na-caa850a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26682%3A%20n%2Fa&amp;severity=high&amp;id=69a0826ab7ef31ef0b92a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71057-na-f9840d49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71057%3A%20n%2Fa&amp;severity=high&amp;id=69a06645b7ef31ef0b73ce17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-26-57a0eba7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-26&amp;severity=medium&amp;id=69a01513b7ef31ef0be66b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-26-0c6bbf64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-26&amp;severity=low&amp;id=69a01513b7ef31ef0be66b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27808-cwe-918-server-side-request-forgery-0907ab33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27808%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27804-cwe-327-use-of-a-broken-or-risky-cr-9a87af7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27804%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20parse-community%20parse-server&amp;severity=critical&amp;id=699f8fb4b7ef31ef0b6dc8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27735-cwe-22-improper-limitation-of-a-pat-cbe310bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27735%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=699f8fb4b7ef31ef0b6dc8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27711-cwe-125-out-of-bounds-read-in-m2tea-1a6755bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27711%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27710-cwe-191-integer-underflow-wrap-or-w-6d6f93e8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27710%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27709-cwe-125-out-of-bounds-read-in-m2tea-36da9c67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699f8c2fb7ef31ef0b6c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27976-cwe-61-unix-symbolic-link-symlink-f-275886dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27976%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27967-cwe-59-improper-link-resolution-bef-66fdc1ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27967%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f8c2fb7ef31ef0b6c21ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27800-cwe-22-improper-limitation-of-a-pat-e91aae3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=699f88afb7ef31ef0b6add23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27933-cwe-613-insufficient-session-expira-39a8e3c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27933%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20manyfold3d%20manyfold&amp;severity=medium&amp;id=699f8527b7ef31ef0b6936d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27635-cwe-78-improper-neutralization-of-s-ea449436</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27635%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20manyfold3d%20manyfold&amp;severity=high&amp;id=699f8527b7ef31ef0b6936d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27633-cwe-400-uncontrolled-resource-consu-d8ccb557</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27633%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27630-cwe-400-uncontrolled-resource-consu-a65a120f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27630%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20maximmasiutin%20TinyWeb&amp;severity=high&amp;id=699f8527b7ef31ef0b6936c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3209-improper-access-controls-in-fosrl-pa-9b724eee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3209%3A%20Improper%20Access%20Controls%20in%20fosrl%20Pangolin&amp;severity=medium&amp;id=699f81a4b7ef31ef0b675cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27613-cwe-78-improper-neutralization-of-s-552b887a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=699f81a4b7ef31ef0b675cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27498-cwe-94-improper-control-of-generati-673d3ea0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7e1fb7ef31ef0b65d59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27578-cwe-80-improper-neutralization-of-s-45b6ec8e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27578%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7e1fb7ef31ef0b65d5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27577-cwe-94-improper-control-of-generati-fe1b37b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27577%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27497-cwe-94-improper-control-of-generati-7583bd72</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27497%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7a9cb7ef31ef0b62e4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27495-cwe-94-improper-control-of-generati-32b06175</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27495%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27494-cwe-497-exposure-of-sensitive-syste-451de5e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=699f7718b7ef31ef0b6119e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27493-cwe-94-improper-control-of-generati-920a070d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27493%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=699f7718b7ef31ef0b6119dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27148-cwe-74-improper-neutralization-of-s-5a9d6dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27148%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20storybookjs%20storybook&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27819-cwe-22-improper-limitation-of-a-pat-a38aca2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27819%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27616-cwe-79-improper-neutralization-of-i-6e63a630</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27616%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27575-cwe-521-weak-password-requirements--02691e1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27575%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20go-vikunja%20vikunja&amp;severity=critical&amp;id=699f7012b7ef31ef0b5b7bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27116-cwe-79-improper-neutralization-of-i-8c728693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20go-vikunja%20vikunja&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26985-cwe-22-improper-limitation-of-a-pat-134e54a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26985%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f7012b7ef31ef0b5b7bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2694-cwe-285-improper-authorization-in-st-aacdc266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2694%3A%20CWE-285%20Improper%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f7012b7ef31ef0b5b7bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26984-cwe-22-improper-limitation-of-a-pat-189f270a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26984%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aces%20Loris&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3172-integer-underflow-or-wraparound-in-p-4fc97e5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3172%3A%20Integer%20Underflow%20or%20Wraparound%20in%20pgvector&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0542-cwe-653-improper-isolation-or-compar-5d8d7dac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0542%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=critical&amp;id=699f6203b7ef31ef0b506075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3200-sql-injection-in-z-9527-admin-11a7aee8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3200%3A%20SQL%20Injection%20in%20z-9527%20admin&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-agent-tesla-a-deep-dive-into-a-multi-sta-ba77bd32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20Agent%20Tesla%3A%20A%20Deep%20Dive%20into%20a%20Multi-Stage%20Campaign&amp;severity=medium&amp;id=699f5e46b7ef31ef0b4e8a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22721-cwe-269-improper-privilege-manageme-49e5e7d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22721%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22720-cwe-79-improper-neutralization-of-i-fdb8baf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22719-vulnerability-in-vmware-aria-operat-d1a0f7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22719%3A%20Vulnerability%20in%20VMware%20Aria%20Operations&amp;severity=high&amp;id=699f6b2db7ef31ef0b54f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2636-cwe-159-improper-handling-of-invalid-c9000dfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2636%3A%20CWE-159%20%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20Microsoft%20Windows%20OS&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3221-cwe-312-cleartext-storage-of-sensiti-b543f909</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3221%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27795-cwe-918-server-side-request-forgery-f4816062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27795%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3194-missing-authentication-in-chia-block-e4dfa1da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3194%3A%20Missing%20Authentication%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6c30b7ef31ef0b560f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21902-cwe-732-incorrect-permission-assign-a3c54a93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21902%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27850-cwe-940-improper-verification-of-so-51bb8bbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27850%3A%20cwe-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Linksys%20MR9600&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27794-cwe-502-deserialization-of-untruste-3cd0df7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27794%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph-checkpoint&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27739-cwe-918-server-side-request-forgery-9cfbc4e8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27739%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27738-cwe-601-url-redirection-to-untruste-c2409b1d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27738%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20angular%20angular-cli&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3193-cross-site-request-forgery-in-chia-b-660586ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3193%3A%20Cross-Site%20Request%20Forgery%20in%20Chia%20Blockchain&amp;severity=low&amp;id=699f6e70b7ef31ef0b5a0a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20033-buffer-access-with-incorrect-length-01834230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20033%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20048-uncontrolled-memory-allocation-in-c-9630ca06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20048%3A%20Uncontrolled%20Memory%20Allocation%20in%20Cisco%20Cisco%20NX-OS%20System%20Software%20in%20ACI%20Mode&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20099-improper-neutralization-of-special--2103b41c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20099%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20091-improper-neutralization-of-input-du-03ee8a0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Firepower%20Extensible%20Operating%20System%20(FXOS)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b555698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20037-execution-with-unnecessary-privileg-92e47074</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20037%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b555637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27849-cwe-78-improper-neutralization-of-s-ae598b62</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27849%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20010-buffer-access-with-incorrect-length-e06a1787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20010%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-blast-radius-problem-stolen-credentials-are-we-1d748531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Blast%20Radius%20Problem%3A%20Stolen%20Credentials%20are%20Weaponizing%20Agentic%20AI&amp;severity=medium&amp;id=699f2282b7ef31ef0b357ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20036-improper-neutralization-of-special--5fab8f84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20036%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20107-insufficient-granularity-of-access--f4ddc726</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20107%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Application%20Policy%20Infrastructure%20Controller%20(APIC)&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b55569e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20051-use-of-uninitialized-variable-in-ci-5f25aa8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20051%3A%20Use%20of%20Uninitialized%20Variable%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=699f6b6eb7ef31ef0b55563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20122-incorrect-use-of-privileged-apis-in-90ab3c7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20122%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20127-improper-authentication-in-cisco-ci-2ddcf584</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20127%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6dd9b7ef31ef0b58f88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20128-storing-passwords-in-a-recoverable--b14fe640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20128%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20129-improper-authentication-in-cisco-ci-ca713753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20129%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=critical&amp;id=699f6b6fb7ef31ef0b5556a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20126-incorrect-use-of-privileged-apis-in-0b35fe35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20126%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=699f6b6fb7ef31ef0b5556a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20133-exposure-of-sensitive-information-t-5512c3fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20133%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=699f6b6fb7ef31ef0b5556aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3192-improper-authentication-in-chia-bloc-1561c236</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3192%3A%20Improper%20Authentication%20in%20Chia%20Blockchain&amp;severity=medium&amp;id=699f5e7eb7ef31ef0b4e9b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3189-server-side-request-forgery-in-feiyu-14bb2646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3189%3A%20Server-Side%20Request%20Forgery%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=low&amp;id=699f5e7eb7ef31ef0b4e9b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-chinese-cyberespionage-campaign-ta-1b7a1764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20Chinese%20Cyberespionage%20Campaign%20Targeting%20Telecoms%2C%20Governments&amp;severity=medium&amp;id=699f1efeb7ef31ef0b33341e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27727-cwe-74-improper-neutralization-of-s-8287b1ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27727%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20swaldman%20mchange-commons-java&amp;severity=high&amp;id=699f5e7eb7ef31ef0b4e9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27706-cwe-918-server-side-request-forgery-f42319c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27706%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20makeplane%20plane&amp;severity=high&amp;id=699f5b59b7ef31ef0b4d0f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27705-cwe-639-authorization-bypass-throug-ded9079b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27705%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20makeplane%20plane&amp;severity=medium&amp;id=699f5b59b7ef31ef0b4d0f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22866-cwe-347-improper-verification-of-cr-1cf14df0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22866%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ensdomains%20ens-contracts&amp;severity=low&amp;id=699f6203b7ef31ef0b506078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27730-cwe-918-server-side-request-forgery-b582d8e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27730%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6203b7ef31ef0b50607d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50180-cwe-918-server-side-request-forgery-1e770482</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50180%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=699f6e70b7ef31ef0b5a0a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3188-path-traversal-in-feiyuchuixue-sz-bo-801a6dfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3188%3A%20Path%20Traversal%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-four-critical-serv-u-vulnerabil-ecdae751</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Four%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=699f17f7b7ef31ef0b2ea26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1242-cwe-798-use-of-hard-coded-credential-3c49accf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1242%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Gardyn%20Home%20Kit&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27704-cwe-22-improper-limitation-of-a-pat-7ee8fa72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27704%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dart-lang%20sdk&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27848-cwe-78-improper-neutralization-of-s-d78302ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27848%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/variations-of-the-clickfix-kaspersky-official-blog-8cce2ef7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Variations%20of%20the%20ClickFix%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=699f14e0b7ef31ef0b2d24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3206-cwe-404-improper-resource-shutdown-o-0fa6e2e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3206%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20KrakenD%20KrakenD-CE&amp;severity=low&amp;id=699f183fb7ef31ef0b2eb1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27847-cwe-89-improper-neutralization-of-s-a7b0346f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27847%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Linksys%20MR9600&amp;severity=critical&amp;id=699f183fb7ef31ef0b2eb1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27701-cwe-94-improper-control-of-generati-c2099fec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27701%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20live-codes%20livecodes&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27846-cwe-306-missing-authentication-for--6692e99e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699f183fb7ef31ef0b2eb1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27700-cwe-345-insufficient-verification-o-a50ef423</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27700%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20honojs%20hono&amp;severity=high&amp;id=699f183fb7ef31ef0b2eb1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27699-cwe-22-improper-limitation-of-a-pat-a776ea60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27699%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20patrickjuchli%20basic-ftp&amp;severity=critical&amp;id=699f1123b7ef31ef0b2a7c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27695-cwe-770-allocation-of-resources-wit-bff82a68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27695%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20zeroae%20zae-limiter&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2878-cwe-331-insufficient-entropy-in-prog-d8a9f60b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2878%3A%20CWE-331%20Insufficient%20Entropy%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=medium&amp;id=699f1123b7ef31ef0b2a7c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27692-cwe-125-out-of-bounds-read-in-inter-7b596b3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27692%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=699f1123b7ef31ef0b2a7c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27691-cwe-190-integer-overflow-or-wraparo-efb0b7d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27691%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3203-cwe-126-buffer-over-read-in-wireshar-77866e88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3203%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3202-cwe-476-null-pointer-dereference-in--91e773e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3202%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3201-cwe-1325-improperly-controlled-seque-eee636bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3201%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3187-unrestricted-upload-in-feiyuchuixue--6e14b61f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3187%3A%20Unrestricted%20Upload%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699f0a1db7ef31ef0b25eb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-hook-rce-and-api-token-exfiltration--467253d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20Hook%3A%20RCE%20and%20API%20Token%20Exfiltration%20Through%20Claude%20Code%20Project%20Files%20%7C%20CVE-2025-59536%20%7C%20CVE-2026-21852&amp;severity=critical&amp;id=699f0345b7ef31ef0b20b850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medical-device-maker-ufp-technologies-hit-by-cyber-b573b4f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medical%20Device%20Maker%20UFP%20Technologies%20Hit%20by%20Cyberattack&amp;severity=medium&amp;id=699eff5ab7ef31ef0b1d212e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3186-use-of-default-password-in-feiyuchui-c666b76c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3186%3A%20Use%20of%20Default%20Password%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3185-authorization-bypass-in-feiyuchuixue-2638462c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3185%3A%20Authorization%20Bypass%20in%20feiyuchuixue%20sz-boot-parent&amp;severity=medium&amp;id=699effa2b7ef31ef0b1d5e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-us-defense-contractor-executive-jailed-for-sell-1eace578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-US%20Defense%20Contractor%20Executive%20Jailed%20for%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=699ef4ceb7ef31ef0b09b97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28196-cwe-459-in-jetbrains-teamcity-d58b6a40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28196%3A%20CWE-459%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=699ef887b7ef31ef0b0c395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28195-cwe-862-in-jetbrains-teamcity-83b0a743</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28195%3A%20CWE-862%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28194-cwe-601-in-jetbrains-teamcity-eefbaf9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28194%3A%20CWE-601%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=699ef887b7ef31ef0b0c3957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-28193-cwe-862-in-jetbrains-youtrack-02c83ca9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-28193%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=699ef887b7ef31ef0b0c3954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2624-cwe-306-missing-authentication-for-c-f523ffcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2624%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ePati%20Cyber%20%E2%80%8B%E2%80%8BSecurity%20Technologies%20Inc.%20Antikor%20Next%20Generation%20Firewall%20(NGFW)&amp;severity=critical&amp;id=699ef17fb7ef31ef0b08499b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-12-million-users-impacted-by-cargurus-data-br-be873cf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2012%20Million%20Users%20Impacted%20by%20CarGurus%20Data%20Breach&amp;severity=medium&amp;id=699eedc5b7ef31ef0b06ebdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0704-file-modificationdeletion-path-trave-a67d541f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0704%3A%20File%20Modification%2FDeletion%20Path%20Traversal%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=699eee0bb7ef31ef0b07114d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-latest-plugx-variant-executed-by-staticplugin-5267edd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Latest%20PlugX%20Variant%20Executed%20by%20STATICPLUGIN&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wynn-resorts-confirms-data-breach-after-hackers-re-66a2b7ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wynn%20Resorts%20Confirms%20Data%20Breach%20After%20Hackers%20Remove%20It%20From%20Leak%20Site&amp;severity=high&amp;id=699edfb6b7ef31ef0b00cd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mercenary-akula-hits-ukraine-supporting-financial-3cdfd2cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mercenary%20Akula%20Hits%20Ukraine-Supporting%20Financial...&amp;severity=medium&amp;id=699ee338b7ef31ef0b0201d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3118-improper-neutralization-of-special-e-de20a68b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Developer%20Hub&amp;severity=medium&amp;id=699edffab7ef31ef0b00d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25701-cwe-377-insecure-temporary-file-in--ca7227b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25701%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20openSUSE%20sdbootutil&amp;severity=high&amp;id=699edc67b7ef31ef0bffee91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26104-missing-authorization-in-red-hat-re-e49792af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26104%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=699ed8e3b7ef31ef0bfe5906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62878-cwe-23-relative-path-traversal-in-s-e8aa8cda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62878%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20SUSE%20Rancher&amp;severity=critical&amp;id=699ed8e3b7ef31ef0bfe58fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67601-cwe-295-improper-certificate-valida-cd78fd99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67601%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20rancher&amp;severity=high&amp;id=699ed8e3b7ef31ef0bfe5902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67860-cwe-522-insufficiently-protected-cr-b1edb39d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67860%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SUSE%20harvester&amp;severity=low&amp;id=699ed1dfb7ef31ef0bfbbf25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26103-missing-authorization-in-red-hat-re-f6e8c238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26103%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=699ed1dfb7ef31ef0bfbbf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reddit-hit-with-20-million-uk-data-privacy-fine-ov-a3954f96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reddit%20Hit%20With%20%2420%20Million%20UK%20Data%20Privacy%20Fine%20Over%20Child%20Safety%20Failings&amp;severity=medium&amp;id=699eca9db7ef31ef0bf8a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claudes-new-ai-vulnerability-scanner-sends-cyberse-3472c897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%E2%80%99s%20New%20AI%20Vulnerability%20Scanner%20Sends%20Cybersecurity%20Shares%20Plunging&amp;severity=medium&amp;id=699ec71ab7ef31ef0bf720a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2367-cwe-79-improper-neutralization-of-in-8070a879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2301-cwe-862-missing-authorization-in-met-411cd241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2301%3A%20CWE-862%20Missing%20Authorization%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2410-cwe-352-cross-site-request-forgery-c-d12db616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Disable%20Admin%20Notices%20%E2%80%93%20Hide%20Dashboard%20Notifications&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14742-cwe-639-authorization-bypass-throug-cb27f6e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699ec3cbb7ef31ef0bf52b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3171-cross-site-scripting-in-sourcecodest-da1bd858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3171%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eb93fb7ef31ef0bf05d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1929-cwe-94-improper-control-of-generatio-d104e328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1929%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mihail-barinov%20Advanced%20Woo%20Labels%20%E2%80%93%20Product%20Labels%20%26%20Badges%20for%20WooCommerce&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2416-cwe-89-improper-neutralization-of-sp-2ddd610e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1916-cwe-862-missing-authorization-in-jav-8b4073b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1916%3A%20CWE-862%20Missing%20Authorization%20in%20javmah%20WPGSI%3A%20Spreadsheet%20Integration&amp;severity=high&amp;id=699eb5bab7ef31ef0bee1257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2479-cwe-918-server-side-request-forgery--d3147280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2479%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=699eb5bab7ef31ef0bee126e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-tech-company-optimizely-targeted-in-cyberattack-701553b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20Tech%20Company%20Optimizely%20Targeted%20in%20Cyberattack&amp;severity=medium&amp;id=699eb201b7ef31ef0beb30e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3170-cross-site-scripting-in-sourcecodest-7369a4ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3170%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=699eaeb3b7ef31ef0be98664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3169-buffer-overflow-in-tenda-f453-69816231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3169%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699eab2eb7ef31ef0be89303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3168-buffer-overflow-in-tenda-f453-508dab5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3168%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3167-buffer-overflow-in-tenda-f453-afffcc0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3167%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699ea0a3b7ef31ef0be4a2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1614-cwe-79-improper-neutralization-of-in-97325495</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eaglethemes%20Rise%20Blocks%20%E2%80%93%20A%20Complete%20Gutenberg%20Page%20Builder&amp;severity=medium&amp;id=699ea0a3b7ef31ef0be4a2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3166-buffer-overflow-in-tenda-f453-624b36c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3166%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699e999bb7ef31ef0be2319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3165-buffer-overflow-in-tenda-f453-c9971778</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3165%3A%20Buffer%20Overflow%20in%20Tenda%20F453&amp;severity=high&amp;id=699f6d86b7ef31ef0b587d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3164-sql-injection-in-itsourcecode-news-p-dfd28c6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3164%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699f6d86b7ef31ef0b587d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25785-improper-limitation-of-a-pathname-t-f44e9ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25785%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20Sub-Manager%20Server&amp;severity=critical&amp;id=699f6d86b7ef31ef0b587d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3179-cwe-22-improper-limitation-of-a-path-180a5bd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3179%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=699e999bb7ef31ef0be231a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3100-cwe-295-improper-certificate-validat-103fbf82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3100%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=699e999bb7ef31ef0be231a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3163-server-side-request-forgery-in-sourc-a598193f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3163%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20Website%20Link%20Extractor&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc6155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3153-sql-injection-in-itsourcecode-docume-715dc6d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3153%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e8f0fb7ef31ef0bdc614e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3152-sql-injection-in-itsourcecode-colleg-aad2116a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3152%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3151-sql-injection-in-itsourcecode-colleg-2aed5ab2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3151%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e8808b7ef31ef0bd9ce4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3150-sql-injection-in-itsourcecode-colleg-d243c4d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3150%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6daa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0976-cwe-532-insertion-of-sensitive-infor-fc9d9bab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0976%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27696-cwe-918-server-side-request-forgery-86f48884</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=699e80ffb7ef31ef0bd6da90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27645-cwe-79-improper-neutralization-of-i-cd313692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3149-sql-injection-in-itsourcecode-colleg-99c7b07a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3149%3A%20SQL%20Injection%20in%20itsourcecode%20College%20Management%20System&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3148-sql-injection-in-sourcecodester-simp-ec2a2164</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3148%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20and%20Nice%20Shopping%20Cart%20Script&amp;severity=medium&amp;id=699e80ffb7ef31ef0bd6da98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27597-cwe-94-improper-control-of-generati-c298fcde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27597%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20agentfront%20enclave&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27641-cwe-1336-improper-neutralization-of-693604e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27641%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20jugmac00%20flask-reuploaded&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27640-cwe-212-improper-removal-of-sensiti-42d4b470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27640%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20oocx%20tfplan2md&amp;severity=high&amp;id=699e7673b7ef31ef0bd379bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27627-cwe-79-improper-neutralization-of-i-373ae35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27627%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karakeep-app%20karakeep&amp;severity=high&amp;id=699e7673b7ef31ef0bd379a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27639-cwe-79-improper-neutralization-of-i-5d8db224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27639%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dbarzin%20mercator&amp;severity=high&amp;id=699e7673b7ef31ef0bd379b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27636-cwe-434-unrestricted-upload-of-file-b2fdd401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27636%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=699e7673b7ef31ef0bd379ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27637-cwe-330-use-of-insufficiently-rando-8f97b2e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27637%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20freescout-help-desk%20freescout&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3147-heap-based-buffer-overflow-in-libvip-1354e241</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3147%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27743-cwe-89-improper-neutralization-of-s-0723b396</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20referer_spam&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27744-cwe-94-improper-control-of-generati-6654b571</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27744%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20tickets&amp;severity=critical&amp;id=699e7673b7ef31ef0bd379ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27745-cwe-94-improper-control-of-generati-57f4fcf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27745%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7673b7ef31ef0bd379cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27746-cwe-79-improper-neutralization-of-i-90ae5a56</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPIP%20jeux&amp;severity=medium&amp;id=699e7674b7ef31ef0bd379de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27747-cwe-89-improper-neutralization-of-s-2659fae3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27747%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SPIP%20interface_traduction_objets&amp;severity=high&amp;id=699e7674b7ef31ef0bd379e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3146-null-pointer-dereference-in-libvips-513efbb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3146%3A%20NULL%20Pointer%20Dereference%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5781-cwe-532-insertion-of-sensitive-infor-aae3b878</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5781%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20API%20Configuration%20Manager&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27628-cwe-835-loop-with-unreachable-exit--62eb22d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27628%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=699e6864b7ef31ef0bae9d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27612-cwe-79-improper-neutralization-of-i-96b43164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20denpiligrim%20repostat&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27621-cwe-79-improper-neutralization-of-i-b8844ad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27621%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TypiCMS%20Core&amp;severity=medium&amp;id=699e6864b7ef31ef0bae9d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27615-cwe-40-path-traversal-uncsharename--b9cde004</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27615%3A%20CWE-40%3A%20Path%20Traversal%3A%20&apos;UNCsharename&apos;%20(Windows%20UNC%20Share)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27611-cwe-200-exposure-of-sensitive-infor-a3c67993</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27611%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gtsteffaniak%20filebrowser&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27595-cwe-306-missing-authentication-for--2da76779</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27595%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27610-cwe-1289-improper-validation-of-uns-48254a1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27610%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27609-cwe-352-cross-site-request-forgery--dfc8a5e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27609%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20parse-community%20parse-dashboard&amp;severity=high&amp;id=699e6864b7ef31ef0bae9d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27608-cwe-862-missing-authorization-in-pa-52557f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27608%3A%20CWE-862%3A%20Missing%20Authorization%20in%20parse-community%20parse-dashboard&amp;severity=critical&amp;id=699e6864b7ef31ef0bae9d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3145-memory-corruption-in-libvips-2bae8caa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3145%3A%20Memory%20Corruption%20in%20libvips&amp;severity=medium&amp;id=699e6866b7ef31ef0bae9de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2914-insecure-permissions-in-cyberark-sof-877fa41a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2914%3A%20Insecure%20Permissions%20in%20CyberArk%20Software%2C%20a%20Palo%20Alto%20Networks%20Company%20Endpoint%20Privilege%20Manager%20Agent&amp;severity=high&amp;id=699e5a58b7ef31ef0b9afd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3137-stack-based-buffer-overflow-in-codea-4a89e8a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3137%3A%20Stack-based%20Buffer%20Overflow%20in%20CodeAstro%20Food%20Ordering%20System&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27598-cwe-22-improper-limitation-of-a-pat-337a2a17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dagu-org%20dagu&amp;severity=high&amp;id=699e48bfb7ef31ef0b85c3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3135-sql-injection-in-itsourcecode-news-p-0a7c6d73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3135%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e48bfb7ef31ef0b85c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-25-e6cbb2ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-25&amp;severity=medium&amp;id=699f8f7ab7ef31ef0b6d58b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69771-na-113581c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69771%3A%20n%2Fa&amp;severity=critical&amp;id=699f6e70b7ef31ef0b5a0a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26717-na-808c7875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6e70b7ef31ef0b5a0a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-25-9eec935b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-25&amp;severity=medium&amp;id=699ef84fb7ef31ef0b0b64a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-25-b8278a68</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-25&amp;severity=low&amp;id=699e682bb7ef31ef0bae3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3134-sql-injection-in-itsourcecode-news-p-8a5e3d8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3134%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=699e3aafb7ef31ef0b769651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3133-sql-injection-in-itsourcecode-docume-93ea08f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3133%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699e3aafb7ef31ef0b76964a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27117-cwe-22-improper-limitation-of-a-pat-c5a5b2bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27117%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rikyoz%20bit7z&amp;severity=medium&amp;id=699e1e91b7ef31ef0b4dd8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27593-cwe-640-weak-password-recovery-mech-d0c0ac0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27593%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20statamic%20cms&amp;severity=critical&amp;id=699e1e91b7ef31ef0b4dd8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27572-cwe-770-allocation-of-resources-wit-1e2e3060</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27572%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/developer-targeting-campaign-using-malicious-nextj-0d448287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Developer-targeting%20campaign%20using%20malicious%20Next.js%20repositories&amp;severity=medium&amp;id=699e1e59b7ef31ef0b4da0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27204-cwe-400-uncontrolled-resource-consu-e113940a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27204%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e1b0db7ef31ef0b464b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27195-cwe-755-improper-handling-of-except-2af78dcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27195%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=699e178ab7ef31ef0b4219f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25899-cwe-789-memory-allocation-with-exce-25b0b15f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25899%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25891-cwe-22-improper-limitation-of-a-pat-54f51692</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25891%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gofiber%20fiber&amp;severity=high&amp;id=699e178ab7ef31ef0b4219ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25882-cwe-129-improper-validation-of-arra-fc87a38b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25882%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20gofiber%20fiber&amp;severity=medium&amp;id=699e140db7ef31ef0b397342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22553-cwe-78-in-insat-masterscada-buk-ts-da2080e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22553%3A%20CWE-78%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21410-cwe-89-in-insat-masterscada-buk-ts-10cd43d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21410%3A%20CWE-89%20in%20InSAT%20MasterSCADA%20BUK-TS&amp;severity=critical&amp;id=699e140db7ef31ef0b39733a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-zoom-meeting-update-silently-installs-surveil-2fbb42c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Zoom%20meeting%20&apos;update&apos;%20silently%20installs%20surveillance%20software&amp;severity=medium&amp;id=699e0e19be58cf853b27f354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46320-a-cross-site-scripting-xss-vulnerab-84cf6eee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46320%3A%20A%20cross-site%20scripting%20(XSS)%20vulnerability%20in%20a%20FileMaker%20WebDirect%20custom%20homepage%20could%20lead%20to%20unauthorized%20access%20and%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=699e0e51be58cf853b283374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24443-cwe-620-unverified-password-change--b7991ec8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24443%3A%20CWE-620%20Unverified%20Password%20Change%20in%20NETIKUS.NET%20ltd%20EventSentry&amp;severity=high&amp;id=699e0acebe58cf853b264b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23859-cwe-602-client-side-enforcement-of--f49cfd91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23859%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=low&amp;id=699e0f3bbe58cf853b2906c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23858-cwe-79-improper-neutralization-of-i-0c121421</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23858%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22766-cwe-434-unrestricted-upload-of-file-cb813835</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22766%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22765-cwe-862-missing-authorization-in-de-bdb3a520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22765%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=699e0f3bbe58cf853b2906c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3131-cwe-200-exposure-of-sensitive-inform-b9371043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3131%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=699df940be58cf853b1d7ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1768-cwe-863-incorrect-authorization-in-d-757628e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1768%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Devolutions%20Server&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1789-incorrect-default-permissions-in-gen-4aea821b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1789%3A%20Incorrect%20Default%20Permissions%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1787-cwe-346-origin-validation-error-in-g-a3f949ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1787%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Genetec%20Inc.%20Genetec%20Update%20Service&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24241-cwe-287-improper-authentication-in--f6ee97c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24241%3A%20CWE-287%20Improper%20Authentication%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=medium&amp;id=699df93ebe58cf853b1d7e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33181-cwe-77-improper-neutralization-of-s-a9d11bfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33181%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33180-cwe-77-improper-neutralization-of-s-84bb56a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33180%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33179-cwe-266-incorrect-privilege-assignm-36a7a0f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33179%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NVIDIA%20Cumulus%20Linux%20GA&amp;severity=high&amp;id=699df93ebe58cf853b1d7e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26342-cwe-613-insufficient-session-expira-5e45b75e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26342%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26341-cwe-1392-use-of-default-credentials-b1797eea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26341%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=critical&amp;id=699df93ebe58cf853b1d7e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26340-cwe-306-missing-authentication-for--b67ea307</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26340%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tattile%20s.r.l.%20Smart%2B&amp;severity=high&amp;id=699df93ebe58cf853b1d7e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-redirects-a-forgotten-vulnerabilityx3f-tue-fe-264b2774</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20Redirects%3A%20A%20Forgotten%20Vulnerability%26%23x3f%3B%2C%20(Tue%2C%20Feb%2024th)&amp;severity=medium&amp;id=699de770be58cf853b0d95d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26222-cwe-502-deserialization-of-untruste-e414adc9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26222%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beyond%20Limits%20Inc.%20Altec%20DocLink&amp;severity=critical&amp;id=699e0f3bbe58cf853b2906cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25603-cwe-22-improper-limitation-of-a-pat-a874863b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25603%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Linksys%20MR9600&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14963-cwe-20-improper-input-validation-in-f0e2d925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14963%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Trellix%20Endpoint%20HX%20Agent%20(xAgent)&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27156-cwe-79-improper-neutralization-of-i-4af1ee20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=699e0f3bbe58cf853b2906d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moonrise-rat-a-new-low-detection-threat-with-high--f024cb0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Moonrise%20RAT%3A%20A%20New%20Low-Detection%20Threat%20with%20High-Cost%20Consequences&amp;severity=medium&amp;id=699e0e19be58cf853b27f359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27590-cwe-20-improper-input-validation-in-7b21592c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27590%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27589-cwe-352-cross-site-request-forgery--489061df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27589%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27588-cwe-178-improper-handling-of-case-s-9da8a007</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27588%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27587-cwe-178-improper-handling-of-case-s-d8aff9af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27587%3A%20CWE-178%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3bbe58cf853b2906da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27586-cwe-755-improper-handling-of-except-26e6760a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27586%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20caddyserver%20caddy&amp;severity=high&amp;id=699e0f3cbe58cf853b290cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27585-cwe-20-improper-input-validation-in-aa8fd750</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27585%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20caddyserver%20caddy&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27571-cwe-409-improper-handling-of-highly-87bdeb7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27571%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20nats-io%20nats-server&amp;severity=medium&amp;id=699e0f3cbe58cf853b290ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13776-cwe-798-use-of-hard-coded-credentia-9501fe87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13776%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TIK-SOFT%20Finka-FK&amp;severity=high&amp;id=699e0f3cbe58cf853b290ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47904-cwe-494-download-of-code-without-in-e960b4d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47904%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Microchip%20Time%20Provider%204100&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-malware-disappears-shortly-after-d-1a307deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Arkanix%20Stealer%E2%80%99%20Malware%20Disappears%20Shortly%20After%20Debut&amp;severity=medium&amp;id=699dc448be58cf853bf0ea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27521-cwe-307-improper-restriction-of-exc-c078447a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27521%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27520-cwe-312-cleartext-storage-of-sensit-09493c83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27520%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3fbe58cf853b290d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27519-cwe-321-use-of-hard-coded-cryptogra-94d78496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27519%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27518-cwe-352-cross-site-request-forgery--ddf83b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27517-cwe-79-improper-neutralization-of-i-baeb6519</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27516-cwe-201-insertion-of-sensitive-info-c7219ab3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27516%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27515-cwe-330-use-of-insufficiently-rando-99761ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27507-cwe-798-use-of-hard-coded-credentia-55a024a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27507%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23678-cwe-78-improper-neutralization-of-s-d736646c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23678%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Binardat%20Ltd.%2010G08-0800GSM%20Network%20Switch&amp;severity=high&amp;id=699e0f3ebe58cf853b290d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27584-cwe-306-missing-authentication-for--1cea9ea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27584%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20actualbudget%20actual&amp;severity=critical&amp;id=699e0f3fbe58cf853b290da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0402-cwe-125-out-of-bounds-read-in-sonicw-650941e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0402%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3ebe58cf853b290d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27732-cwe-918-server-side-request-forgery-664ae78b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27732%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=699e0f3fbe58cf853b290da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0401-cwe-476-null-pointer-dereference-in--37b8ba10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0401%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0400-cwe-134-use-of-externally-controlled-8c81d50f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0400%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27568-cwe-79-improper-neutralization-of-i-3872684f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27568%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0399-cwe-121-stack-based-buffer-overflow--a0c7be97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0399%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=medium&amp;id=699e0f3cbe58cf853b290cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3102-os-command-injection-in-exiftool-3a183022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3102%3A%20OS%20Command%20Injection%20in%20exiftool&amp;severity=medium&amp;id=699db9f0be58cf853be5ecac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3101-os-command-injection-in-intelbras-ti-e14b0379</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3101%3A%20OS%20Command%20Injection%20in%20Intelbras%20TIP%20635G&amp;severity=medium&amp;id=699db9f0be58cf853be5eca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-aria-operations-vulnerability-could-allow-r-1fe31f0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20Aria%20Operations%20Vulnerability%20Could%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=699db638be58cf853be39fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27567-cwe-918-server-side-request-forgery-6aff0dba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27567%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20payloadcms%20payload&amp;severity=medium&amp;id=699db9f0be58cf853be5eca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10010-cwe-353-missing-support-for-integri-1ee3965a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10010%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20CPSD%20IT%20SERVICES%20GMBH%20CryptoPro%20Secure%20Disk%20for%20BitLocker&amp;severity=medium&amp;id=699e0f3fbe58cf853b290da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27208-cwe-78-improper-neutralization-of-s-983562b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20bleon-ethical%20api-gateway-deploy&amp;severity=critical&amp;id=699e0f3fbe58cf853b290dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sandwormmode-supply-chain-attack-hits-npm-0a6fbb0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Sandworm_Mode%E2%80%99%20Supply%20Chain%20Attack%20Hits%20NPM&amp;severity=medium&amp;id=699dabadbe58cf853bd9ca32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2807-vulnerability-in-mozilla-firefox-7b7fdcd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2807%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2806-vulnerability-in-mozilla-firefox-4330b422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2806%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2805-vulnerability-in-mozilla-firefox-ad33e68e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2805%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf72be58cf853bdde2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2804-vulnerability-in-mozilla-firefox-12858c36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2804%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf72be58cf853bdde2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2803-vulnerability-in-mozilla-firefox-34cfc56c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2803%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf72be58cf853bdde2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2802-vulnerability-in-mozilla-firefox-c2727259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2802%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2801-vulnerability-in-mozilla-firefox-c6bc2714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2801%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2800-vulnerability-in-mozilla-firefox-f1e052df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2800%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2799-vulnerability-in-mozilla-firefox-e1242b75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2799%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2798-vulnerability-in-mozilla-firefox-fc6b6733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2798%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2797-vulnerability-in-mozilla-firefox-21b1b9fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2797%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2796-vulnerability-in-mozilla-firefox-e6fcc340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2796%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2795-vulnerability-in-mozilla-firefox-2510859e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2795%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf71be58cf853bdde25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2794-vulnerability-in-mozilla-firefox-dec444fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2794%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf71be58cf853bdde258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2634-vulnerability-in-mozilla-firefox-for-558bf208</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2634%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2793-vulnerability-in-mozilla-firefox-9218e885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2793%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf71be58cf853bdde252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2792-vulnerability-in-mozilla-firefox-88665c56</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2792%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2791-vulnerability-in-mozilla-firefox-129224c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2791%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2790-vulnerability-in-mozilla-firefox-a2cce219</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2790%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2789-vulnerability-in-mozilla-firefox-cd6165cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2789%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2788-vulnerability-in-mozilla-firefox-51148c31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2788%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2787-vulnerability-in-mozilla-firefox-99349e0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2787%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2786-vulnerability-in-mozilla-firefox-fb95e8e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2786%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2785-vulnerability-in-mozilla-firefox-6fc98356</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2785%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf70be58cf853bdde20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2784-vulnerability-in-mozilla-firefox-b8ed28c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2784%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf70be58cf853bdde209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2783-vulnerability-in-mozilla-firefox-9e492a9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2783%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=699daf70be58cf853bdde204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2782-vulnerability-in-mozilla-firefox-961efa1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2782%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2781-vulnerability-in-mozilla-firefox-e3d3b895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2781%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2780-vulnerability-in-mozilla-firefox-67fb735b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2780%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2779-vulnerability-in-mozilla-firefox-637601e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2779%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2778-vulnerability-in-mozilla-firefox-a2efee7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2778%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2777-vulnerability-in-mozilla-firefox-23a61c9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2777%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2776-vulnerability-in-mozilla-firefox-aecaf008</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2776%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2775-vulnerability-in-mozilla-firefox-705fae87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2775%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2774-vulnerability-in-mozilla-firefox-7a87e224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2774%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6fbe58cf853bdde1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2773-vulnerability-in-mozilla-firefox-168ce6bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2773%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6fbe58cf853bdde1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2772-vulnerability-in-mozilla-firefox-2427429c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2772%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2771-vulnerability-in-mozilla-firefox-b1c396b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2771%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2770-vulnerability-in-mozilla-firefox-cdc3b286</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2770%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2769-vulnerability-in-mozilla-firefox-d07a057c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2769%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2768-vulnerability-in-mozilla-firefox-22e282bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2768%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2767-vulnerability-in-mozilla-firefox-8ddcd7e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2767%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=699daf6dbe58cf853bdde178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2766-vulnerability-in-mozilla-firefox-cf3992e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2766%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2765-vulnerability-in-mozilla-firefox-21f8ff58</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2765%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2764-vulnerability-in-mozilla-firefox-f42df24a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2764%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2763-vulnerability-in-mozilla-firefox-f8a7d148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2763%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6dbe58cf853bdde162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2762-vulnerability-in-mozilla-firefox-9f81a8d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2762%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2761-vulnerability-in-mozilla-firefox-31b382de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2761%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2760-vulnerability-in-mozilla-firefox-ed19354d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2760%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2759-vulnerability-in-mozilla-firefox-44d5c550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2759%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2758-vulnerability-in-mozilla-firefox-254a6777</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2758%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2757-vulnerability-in-mozilla-firefox-5913ed24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2757%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2460-cwe-267-privilege-defined-with-unsaf-5f6cf7ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2460%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2459-cwe-267-privilege-defined-with-unsaf-7562341c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2459%3A%20CWE-267%20Privilege%20Defined%20with%20Unsafe%20Actions%20in%20Hitachi%20Energy%20Relion%20REB500&amp;severity=high&amp;id=699daf6bbe58cf853bdddd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14577-cwe-306-missing-authentication-for--6857041d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Slican%20NCP&amp;severity=critical&amp;id=699daf6bbe58cf853bdddd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1773-cwe-20-improper-input-validation-in--220535b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1773%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=high&amp;id=699da85ebe58cf853bd63632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1772-cwe-287-improper-authentication-in-h-849f1103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1772%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=medium&amp;id=699da85ebe58cf853bd6362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23969-cwe-89-improper-neutralization-of-s-52e98444</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23980-cwe-89-improper-neutralization-of-s-641d36bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=699da85ebe58cf853bd63638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23982-cwe-863-incorrect-authorization-in--16335c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23982%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd6363b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23983-cwe-200-exposure-of-sensitive-infor-28a635f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=low&amp;id=699da85ebe58cf853bd6363e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23984-cwe-863-incorrect-authorization-in--27e36bda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23984%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=699da85ebe58cf853bd63641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-lazarus-group-now-working-with-medusa-e96d15e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Lazarus%20Group%20Now%20Working%20With%20Medusa%20Ransomware&amp;severity=medium&amp;id=699e0e19be58cf853b27f362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-issues-abused-in-copilot-attack-leading-to--1f686409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Issues%20Abused%20in%20Copilot%20Attack%20Leading%20to%20Repository%20Takeover&amp;severity=medium&amp;id=699d9a19be58cf853bcbde28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taiwan-security-firm-confirms-flaw-flagged-by-cisa-09d184a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taiwan%20Security%20Firm%20Confirms%20Flaw%20Flagged%20by%20CISA%20Likely%20Exploited%20by%20Chinese%20APTs&amp;severity=medium&amp;id=699d9310be58cf853bc6f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27555-cwe-201-insertion-of-sensitive-info-4a1ea050</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27555%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699d7ab4be58cf853bad4712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2664-cwe-125-out-of-bounds-read-in-docker-0cedbcfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2664%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=699d7ab4be58cf853bad4716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56373-cwe-94-improper-control-of-generati-6e419591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56373%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=699d7ab4be58cf853bad470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymous-fnix-members-arrested-in-spain-e869e34a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymous%20F%C3%A9nix%20Members%20Arrested%20in%20Spain&amp;severity=medium&amp;id=699d7a75be58cf853bace567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1524-cwe-290-authentication-bypass-by-spo-45d10e8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1524%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=699d6c99be58cf853b9c9dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-malicious-nuget-packages-target-aspnet-develo-3558d828</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Malicious%20NuGet%20Packages%20Target%20ASP.NET%20Developers%20With%20JIT%20Hooking%20and%20Credential%20Exfiltration&amp;severity=medium&amp;id=699d68e0be58cf853b9798dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1229-cwe-682-incorrect-calculation-in-clo-52f8a557</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1229%3A%20CWE-682%20Incorrect%20Calculation%20in%20Cloudflare%20CIRCL&amp;severity=low&amp;id=699e0f3fbe58cf853b290d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40541-cwe-704-incorrect-type-conversion-o-153e8f0e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40541%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699e0f3fbe58cf853b290d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40540-cwe-704-incorrect-type-conversion-o-393839b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40540%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40539-cwe-704-incorrect-type-conversion-o-7631618c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40539%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40538-cwe-269-improper-privilege-manageme-e66e0c99</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=699d5781be58cf853b851cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15386-cwe-79-cross-site-scripting-xss-in--43bb529b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15386%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=high&amp;id=699d4271be58cf853b689cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15589-path-traversal-in-muyucms-df4dace0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15589%3A%20Path%20Traversal%20in%20MuYuCMS&amp;severity=medium&amp;id=699d4271be58cf853b689cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24314-cwe-497-exposure-of-sensitive-syste-37035500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24314%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20S%2F4HANA%20(Manage%20Payment%20Media)&amp;severity=medium&amp;id=699d3b61be58cf853b5fc3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3070-cross-site-scripting-in-sourcecodest-3e0ce52e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3070%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Modern%20Image%20Gallery%20App&amp;severity=medium&amp;id=699d347abe58cf853b589ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3069-sql-injection-in-itsourcecode-docume-630afbd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3069%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d29efbe58cf853b4f36be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3068-sql-injection-in-itsourcecode-docume-9b86d381</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3068%3A%20SQL%20Injection%20in%20itsourcecode%20Document%20Management%20System&amp;severity=medium&amp;id=699d1f63be58cf853b2dec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3067-path-traversal-in-hummerrisk-3ded3089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3067%3A%20Path%20Traversal%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3066-command-injection-in-hummerrisk-8f2007d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3066%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d1f63be58cf853b2dec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1459-cwe-78-improper-neutralization-of-sp-f412c512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1459%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27129-cwe-918-server-side-request-forgery-bfb112ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27129%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d8be58cf853b182c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27128-cwe-367-time-of-check-time-of-use-t-c9b0d5dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27128%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27127-cwe-367-time-of-check-time-of-use-t-5842a733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27127%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20craftcms%20cms&amp;severity=high&amp;id=699d14d6be58cf853b182c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13943-cwe-78-improper-neutralization-of-s-420a90c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13943%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3301-T0%20firmware&amp;severity=high&amp;id=699d14d6be58cf853b182c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13942-cwe-78-improper-neutralization-of-s-dbc807d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13942%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX3510-B0%20firmware&amp;severity=critical&amp;id=699d14d6be58cf853b182c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3065-command-injection-in-hummerrisk-ca310b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3065%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3064-command-injection-in-hummerrisk-b16e562e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3064%3A%20Command%20Injection%20in%20HummerRisk&amp;severity=medium&amp;id=699d14d8be58cf853b182c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3091-uncontrolled-search-path-element-in--0806b6af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3091%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Synology%20Synology%20Presto%20Client&amp;severity=medium&amp;id=699d14d8be58cf853b182c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27126-cwe-79-improper-neutralization-of-i-eb6f17da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27126%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=699d14d6be58cf853b182c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26981-cwe-195-signed-to-unsigned-conversi-204c3c44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26981%3A%20CWE-195%3A%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=699d14d6be58cf853b182c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11848-cwe-476-null-pointer-dereference-in-105c946a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11848%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11847-cwe-476-null-pointer-dereference-in-ff3f069c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11847%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d14d6be58cf853b182c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26198-cwe-89-improper-neutralization-of-s-7460e41f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26198%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20collerek%20ormar&amp;severity=critical&amp;id=699d14d6be58cf853b182c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3057-sql-injection-in-a54552239-pearproje-adecca21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3057%3A%20SQL%20Injection%20in%20a54552239%20pearProjectApi&amp;severity=medium&amp;id=699d14d8be58cf853b182c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3054-cross-site-scripting-in-alinto-sogo-403be324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3054%3A%20Cross%20Site%20Scripting%20in%20Alinto%20SOGo&amp;severity=medium&amp;id=699d14d8be58cf853b182c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11846-cwe-476-null-pointer-dereference-in-3381f5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11846%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3053-missing-authentication-in-datalinkdc-e60a8a1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3053%3A%20Missing%20Authentication%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3052-server-side-request-forgery-in-datal-340d6c23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3052%3A%20Server-Side%20Request%20Forgery%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699d06cabe58cf853b07ca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11845-cwe-476-null-pointer-dereference-in-bbab33dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11845%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zyxel%20VMG3625-T50B%20firmware&amp;severity=medium&amp;id=699d06cabe58cf853b07ca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3051-path-traversal-in-datalinkdc-dinky-173f35b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3051%3A%20Path%20Traversal%20in%20DataLinkDC%20dinky&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3050-cross-site-scripting-in-horilla-open-fd660903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3050%3A%20Cross%20Site%20Scripting%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27729-cwe-770-allocation-of-resources-wit-e5a15975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27729%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20withastro%20astro&amp;severity=medium&amp;id=699cfc3cbe58cf853bfd2f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25802-cwe-79-improper-neutralization-of-i-48d25c61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25802%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25591-cwe-943-improper-neutralization-of--2ce4358a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25591%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=699cfc3cbe58cf853bfd2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25545-cwe-918-server-side-request-forgery-da1603da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25545%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=699cf533be58cf853bf604dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3049-open-redirect-in-horilla-opensource--27a936b1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3049%3A%20Open%20Redirect%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=699cf534be58cf853bf60511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3046-sql-injection-in-itsourcecode-e-logb-a4efe6dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3046%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=699cf533be58cf853bf604f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21864-cwe-20-improper-input-validation-in-7c8ea75e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21864%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey-bloom&amp;severity=medium&amp;id=699cf533be58cf853bf604d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27643-cwe-209-generation-of-error-message-2622d2b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27643%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27642-cwe-20-improper-input-validation-in-be522119</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27642%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cf533be58cf853bf604e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26025-cwe-476-null-pointer-dereference-in-3b4027a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26025%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26024-cwe-476-null-pointer-dereference-in-e26d8b24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26024%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25501-cwe-476-null-pointer-dereference-in-1f72e97a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20smf&amp;severity=medium&amp;id=699cf533be58cf853bf604d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9120-cwe-94-improper-control-of-generatio-9ed3eff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenText%E2%84%A2%20Carbonite%20Safe%20Server%20Backup&amp;severity=high&amp;id=699cf533be58cf853bf604d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69253-cwe-209-generation-of-error-message-d29135ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69253%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=medium&amp;id=699cf533be58cf853bf604cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-24-e8f8d164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-24&amp;severity=medium&amp;id=699e3dfab7ef31ef0b77ae66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67445-na-faa393bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67445%3A%20n%2Fa&amp;severity=medium&amp;id=699e0f3fbe58cf853b290d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69985-na-4f2ec836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69985%3A%20n%2Fa&amp;severity=critical&amp;id=699e0f3ebe58cf853b290d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63409-na-7f1dcd5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63409%3A%20n%2Fa&amp;severity=high&amp;id=699e0f3ebe58cf853b290d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-24-3a80d607</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-24&amp;severity=medium&amp;id=699dd95dbe58cf853b0239a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-24-21d76c33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-24&amp;severity=low&amp;id=699d4cbebe58cf853b76a245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69252-cwe-476-null-pointer-dereference-in-80fd7d12</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69252%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58041-cwe-338-use-of-cryptographically-we-a78c8e9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58041%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WONKO%20Smolder&amp;severity=critical&amp;id=699cee30be58cf853bef4e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69251-cwe-20-improper-input-validation-in-196cf2df</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69251%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20udm&amp;severity=medium&amp;id=699cee30be58cf853bef4e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69250-cwe-754-improper-check-for-unusual--3c39503e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69250%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20free5gc%20udm&amp;severity=medium&amp;id=699ceab4be58cf853bdfbf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3044-stack-based-buffer-overflow-in-tenda-c3428cc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=699ce723be58cf853bdd38db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3043-cross-site-scripting-in-itsourcecode-9b765d7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3043%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3042-sql-injection-in-itsourcecode-event--cdf5b04f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3042%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699ce39fbe58cf853bdb3eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-openclaw-skills-used-to-distribute-atomi-1ab81aed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20OpenClaw%20Skills%20Used%20to%20Distribute%20Atomic%20MacOS%20Stealer&amp;severity=medium&amp;id=699d68e0be58cf853b9798e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21665-vulnerability-in-fiserv-originate-l-7a298a26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21665%3A%20Vulnerability%20in%20Fiserv%20Originate%20Loans%20Peripherals%20(formerly%20Velocity%20Services)%20--%20Print%20Service%20component&amp;severity=high&amp;id=699cd8f4be58cf853bd429b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3063-inappropriate-implementation-in-goog-4f7bfd85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3063%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3062-out-of-bounds-read-and-write-in-goog-9826ac8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3062%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3061-out-of-bounds-read-in-google-chrome-0054353c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3061%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=699cd56ebe58cf853bd2d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3041-cross-site-scripting-in-xingfuggz-ba-5f6e055c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3041%3A%20Cross%20Site%20Scripting%20in%20xingfuggz%20BaykeShop&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3040-os-command-injection-in-draytek-vigo-57c5d6ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3040%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor%20300B&amp;severity=medium&amp;id=699cd1ebbe58cf853bd0c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69248-cwe-129-improper-validation-of-arra-5330a8bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69248%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20free5gc%20amf&amp;severity=medium&amp;id=699ccae3be58cf853bccd9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69247-cwe-122-heap-based-buffer-overflow--08fe6e18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69247%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3028-cross-site-scripting-in-erzhongxmu-j-8e46de0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3028%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699ccae3be58cf853bccda00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69232-cwe-20-improper-input-validation-in-8b0905ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69232%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20free5gc%20go-upf&amp;severity=low&amp;id=699ccae3be58cf853bccd9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69208-cwe-209-generation-of-error-message-4967da13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69208%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20free5gc%20udr&amp;severity=low&amp;id=699cc75ebe58cf853bcb5ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3027-cross-site-scripting-in-erzhongxmu-j-0bf04477</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3027%3A%20Cross%20Site%20Scripting%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3075-exposure-of-sensitive-system-informa-6b46d1ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3075%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Jeff%20Starr%20Simple%20Ajax%20Chat&amp;severity=medium&amp;id=699cc3dbbe58cf853bc8ee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23693-cwe-306-missing-authentication-for--873ad830</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23693%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Roxnor%20ElementsKit%20Elementor%20Addons%20%E2%80%93%20Advanced%20Widgets%20%26%20Templates%20Addons%20for%20Elementor&amp;severity=critical&amp;id=699cee30be58cf853bef4e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23694-cwe-352-cross-site-request-forgery--43b258cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23694%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aruba.it%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=699cee30be58cf853bef4e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3026-server-side-request-forgery-in-erzho-9622fd01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3026%3A%20Server-Side%20Request%20Forgery%20in%20erzhongxmu%20JEEWMS&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3025-unrestricted-upload-in-shuoren-smart-03a84ad2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3025%3A%20Unrestricted%20Upload%20in%20ShuoRen%20Smart%20Heating%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27623-cwe-20-improper-input-validation-in-08357453</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27623%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21863-cwe-125-out-of-bounds-read-in-valke-7a33c1e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21863%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67733-cwe-74-improper-neutralization-of-s-dcc8bdf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67733%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20valkey-io%20valkey&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2698-cwe-639-authorization-bypass-through-2795e5b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2698%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699c852abe58cf853ba9853b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27514-cwe-201-insertion-of-sensitive-info-a2b48227</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27514%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=high&amp;id=699c852abe58cf853ba98537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27513-cwe-352-cross-site-request-forgery--75243c1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27513%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba98533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27512-cwe-79-improper-neutralization-of-i-a19304cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27511-cwe-1021-improper-restriction-of-re-64ef0ade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27511%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20F3&amp;severity=medium&amp;id=699c852abe58cf853ba9852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22567-cwe-20-improper-input-validation-in-63d0c936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22567%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22568-cwe-20-improper-input-validation-in-14777d68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22568%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zscaler%20ZIA%20Admin%20UI&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14905-heap-based-buffer-overflow-in-red-h-35910148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14905%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Directory%20Server%2011.5%20E4S%20for%20RHEL%208&amp;severity=high&amp;id=699c7b9bbe58cf853ba52827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-healthcare-diagnostic-firm-says-140000-affected-8cf2ff6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Healthcare%20Diagnostic%20Firm%20Says%20140%2C000%20Affected%20by%20Data%20Breach&amp;severity=medium&amp;id=699c7451be58cf853ba092b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-the-untold-stories-of-check-point-research-ca2e7873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%3A%20The%20Untold%20Stories%20of%20Check%20Point%20Research&amp;severity=high&amp;id=699c74cbbe58cf853ba0e606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2697-cwe-639-authorization-bypass-through-2cdeceab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2697%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3016-buffer-overflow-in-utt-hiper-810g-d2bb40c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3016%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c7b9bbe58cf853ba52830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-huorong-security-site-infects-users-with-vall-431a5b9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Huorong%20security%20site%20infects%20users%20with%20ValleyRAT&amp;severity=medium&amp;id=699cdc61be58cf853bd5eac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3015-buffer-overflow-in-utt-hiper-810g-03f10e33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3015%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-day-another-malicious-jpeg-mon-feb-23rd-e56dc9d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20day%2C%20another%20malicious%20JPEG%2C%20(Mon%2C%20Feb%2023rd)&amp;severity=medium&amp;id=699c5811be58cf853b908718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21420-cwe-427-uncontrolled-search-path-el-d39a8b17</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21420%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20Repository%20Manager&amp;severity=high&amp;id=699c625dbe58cf853b95454c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-gets-5-years-in-us-prison-for-aiding-nor-3773a458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Gets%205%20Years%20in%20US%20Prison%20for%20Aiding%20North%20Korean%20IT%20Fraud&amp;severity=low&amp;id=699c5babbe58cf853b9201f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-ai-agents-provide-new-class-of-supply-c-5fa92ec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AI%20Agents%20Provide%20New%20Class%20of%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=699c48adbe58cf853b83ceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-hacker-pleads-guilty-to-selling-access-to-a925b71f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20Hacker%20Pleads%20Guilty%20to%20Selling%20Access%20to%20US%20State%20Network&amp;severity=medium&amp;id=699c41d8be58cf853b80437c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-fortigate-firewalls-hacked-in-ai-power-9152681d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20FortiGate%20Firewalls%20Hacked%20in%20AI-Powered%20Attacks%3A%20AWS&amp;severity=medium&amp;id=699c3f2ebe58cf853b7ecfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59873-vulnerability-in-hcl-software-zie-f-4e64c827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59873%3A%20Vulnerability%20in%20HCL%20Software%20ZIE%20for%20Web&amp;severity=medium&amp;id=699c33c0be58cf853b7818c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-roundcube-webmail-vulnerability-exploited-i-f1f3083a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20RoundCube%20Webmail%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=699c3380be58cf853b77f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2985-server-side-request-forgery-in-tiand-d99c179a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2985%3A%20Server-Side%20Request%20Forgery%20in%20Tiandy%20Video%20Surveillance%20System%20%E8%A7%86%E9%A2%91%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=699c3035be58cf853b75f0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mississippi-hospital-system-closes-all-clinics-aft-12980cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mississippi%20Hospital%20System%20Closes%20All%20Clinics%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=699c2c78be58cf853b742b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40701-cwe-79-improper-neutralization-of-i-a0c042b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SOTE%20SOTESHOP&amp;severity=medium&amp;id=699c3035be58cf853b75f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-olalampo-inside-muddywaters-latest-campa-56d8b12a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Olalampo%3A%20Inside%20MuddyWater&apos;s%20Latest%20Campaign&amp;severity=medium&amp;id=699c28f3be58cf853b724307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandwormmode-shai-hulud-style-npm-worm-hijacks-ci--970e0fb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SANDWORM_MODE%3A%20Shai-Hulud-Style%20npm%20Worm%20Hijacks%20CI%20Workflows%20and%20Poisons%20AI%20Toolchains&amp;severity=medium&amp;id=699c28f3be58cf853b72434e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2984-denial-of-service-in-sourcecodester--85191ae6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2984%3A%20Denial%20of%20Service%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c2930be58cf853b7275d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chronology-of-muddywater-apt-attacks-targeting-the-33954b79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chronology%20of%20MuddyWater%20APT%20Attacks%20Targeting%20the%20Middle%20East&amp;severity=medium&amp;id=699c256fbe58cf853b6f4a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2983-improper-access-controls-in-sourceco-8f46df55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2983%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699c25a9be58cf853b6f8c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41002-cwe-89-improper-neutralization-of-s-7d1e6964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41002%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MANANTIAL%20DE%20IDEAS%20Infoticketing&amp;severity=critical&amp;id=699c25a9be58cf853b6f8c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/paypal-data-breach-led-to-fraudulent-transactions-0fd4c8b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PayPal%20Data%20Breach%20Led%20to%20Fraudulent%20Transactions&amp;severity=medium&amp;id=699c1ae4be58cf853b65d710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2981-buffer-overflow-in-utt-hiper-810g-ebbad869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2981%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1b36be58cf853b6616ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/23rd-february-threat-intelligence-report-fb0a35b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=23rd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=699cec45be58cf853be40e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25747-cwe-502-deserialization-of-untruste-ad77e0d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25747%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=high&amp;id=699c1b36be58cf853b6616a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23552-cwe-346-origin-validation-error-in--099c72c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23552%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=critical&amp;id=699c1b36be58cf853b6616a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2980-buffer-overflow-in-utt-hiper-810g-30621ae4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2980%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699c1416be58cf853b60d4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2979-unrestricted-upload-in-fastapiadmin-06d9cf68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2979%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c1094be58cf853b5f1afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2978-unrestricted-upload-in-fastapiadmin-ddf67fcc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2978%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c0601be58cf853b557229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2977-unrestricted-upload-in-fastapiadmin-d14e9069</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2977%3A%20Unrestricted%20Upload%20in%20FastApiAdmin&amp;severity=medium&amp;id=699c027dbe58cf853b5217e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1367-cwe-89-improper-neutralization-of-sp-dbb8032b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1367%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=high&amp;id=699c027dbe58cf853b5217e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2976-information-disclosure-in-fastapiadm-86338872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2976%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bfb74be58cf853b4ca3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2975-information-disclosure-in-fastapiadm-e687242b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2975%3A%20Information%20Disclosure%20in%20FastApiAdmin&amp;severity=medium&amp;id=699bf46dbe58cf853b4576f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2974-exposure-of-backup-file-to-an-unauth-cd87fe58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2974%3A%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20AliasVault%20App&amp;severity=low&amp;id=699bed72be58cf853b3d54c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2972-cross-site-scripting-in-a466350665-s-53a6567b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2972%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699c5bedbe58cf853b920fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2971-cross-site-scripting-in-a466350665-s-22186f60</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2971%3A%20Cross%20Site%20Scripting%20in%20a466350665%20Smart-SSO&amp;severity=medium&amp;id=699bdf53be58cf853b335276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2970-deserialization-in-datapizza-labs-da-52f20926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2970%3A%20Deserialization%20in%20datapizza-labs%20datapizza-ai&amp;severity=low&amp;id=699bd4c9be58cf853b2b9049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2969-improper-neutralization-of-special-e-6d54c976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20datapizza-labs%20datapizza-ai&amp;severity=medium&amp;id=699bd4c9be58cf853b2b9042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2968-improper-verification-of-cryptograph-cb146a79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2968%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2998-cwe-426-untrusted-search-path-in-eai-2fea061f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2998%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20eAI%20Technologies%20ERP%20F2&amp;severity=high&amp;id=699bca3ebe58cf853b0516e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2967-improper-verification-of-source-of-a-57b8c69e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2967%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bca3ebe58cf853b0516d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2966-insufficiently-random-values-in-cesa-e29cea84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2966%3A%20Insufficiently%20Random%20Values%20in%20Cesanta%20Mongoose&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2997-cwe-639-authorization-bypass-through-f3504232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WisdomGarden%20Tronclass&amp;severity=medium&amp;id=699bbc2cbe58cf853bf3201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2965-cross-site-scripting-in-07flycms-9d8672b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2965%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=699bbc2cbe58cf853bf32012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24494-cwe-89-improper-neutralization-of-s-fae4075c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24494%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Order%20Up%20Online%20Ordering%20System&amp;severity=critical&amp;id=699bae1dbe58cf853be51a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2964-improperly-controlled-modification-o-1db41d02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2964%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20higuma%20web-audio-recorder-js&amp;severity=low&amp;id=699bae1dbe58cf853be51a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2963-sql-injection-in-jinher-oa-c6-9c9c2ebe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2963%3A%20SQL%20Injection%20in%20Jinher%20OA%20C6&amp;severity=medium&amp;id=699ba713be58cf853bda304f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2962-stack-based-buffer-overflow-in-d-lin-37c3a76b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2962%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba713be58cf853bda3048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2961-stack-based-buffer-overflow-in-d-lin-722e4783</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2961%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2960-stack-based-buffer-overflow-in-d-lin-29b3b35d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2960%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699ba00cbe58cf853bd054ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71056-na-32de5bd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71056%3A%20n%2Fa&amp;severity=high&amp;id=699cee30be58cf853bef4e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-23-1e99d923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-23&amp;severity=medium&amp;id=699cebebbe58cf853be165c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70045-na-e43003f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70045%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8ebe58cf853bc4b508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70044-na-ecdebec6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70044%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8ebe58cf853bc4b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70043-na-753ec698</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70043%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61146-na-c537bae5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61146%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61145-na-b8ca930f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61145%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61144-na-a864084d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61144%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61143-na-6d6fd10d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61143%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26464-na-9c4ae060</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26464%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61147-na-7a270c4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61147%3A%20n%2Fa&amp;severity=medium&amp;id=699cbd8cbe58cf853bc4b45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63946-na-a5435ae2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63946%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63945-na-2233fd7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63945%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70329-na-e700a716</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70329%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70328-na-5c36c839</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70328%3A%20n%2Fa&amp;severity=high&amp;id=699cbd8cbe58cf853bc4b3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70327-na-d22f971f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70327%3A%20n%2Fa&amp;severity=critical&amp;id=699cbd8cbe58cf853bc4b3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-23-50f3ad29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-23&amp;severity=medium&amp;id=699cbc9bbe58cf853bc24344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70058-na-32d6ca8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70058%3A%20n%2Fa&amp;severity=high&amp;id=699c7b9bbe58cf853ba5282b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69700-na-5de56747</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69700%3A%20n%2Fa&amp;severity=high&amp;id=699c625dbe58cf853b954549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-23-f5ab6aae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-23&amp;severity=low&amp;id=699c2ff9be58cf853b75cfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26365-cwe-444-inconsistent-interpretation-96fb7f75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26365%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20Ghost&amp;severity=medium&amp;id=699c1094be58cf853b5f1af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2959-stack-based-buffer-overflow-in-d-lin-54cc012d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2959%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2958-stack-based-buffer-overflow-in-d-lin-bf6778d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2958%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699b9581be58cf853bc3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2588-cwe-190-integer-overflow-or-wraparou-4f2a3d33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2588%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20TIMLEGGE%20Crypt%3A%3ANaCl%3A%3ASodium&amp;severity=critical&amp;id=699b9581be58cf853bc3df9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2957-denial-of-service-in-qinming99-dst-a-0aef73fb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2957%3A%20Denial%20of%20Service%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8e79be58cf853bbd6216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2956-command-injection-in-qinming99-dst-a-1c74e846</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2956%3A%20Command%20Injection%20in%20qinming99%20dst-admin&amp;severity=medium&amp;id=699b8069be58cf853bb3c827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2954-injection-in-dromara-ujcms-b332a795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2954%3A%20Injection%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b1df9be58cf853b5c408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2953-path-traversal-in-dromara-ujcms-ab2c642f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2953%3A%20Path%20Traversal%20in%20Dromara%20UJCMS&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2952-os-command-injection-in-vaelsys-49bece5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2952%3A%20OS%20Command%20Injection%20in%20Vaelsys&amp;severity=medium&amp;id=699b0fe9be58cf853b4f96d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2947-cross-site-scripting-in-rymcu-forest-64f20955</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2947%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b0c63be58cf853b4cb9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2946-cross-site-scripting-in-rymcu-forest-abcecd89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2946%3A%20Cross%20Site%20Scripting%20in%20rymcu%20forest&amp;severity=medium&amp;id=699b01d9be58cf853b401db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2945-server-side-request-forgery-in-jeecg-da011b53</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2945%3A%20Server-Side%20Request%20Forgery%20in%20JeecgBoot&amp;severity=medium&amp;id=699b01d9be58cf853b401dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2944-os-command-injection-in-tosei-online-56edbc08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2944%3A%20OS%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=699ae5b9be58cf853b26a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2943-cross-site-scripting-in-sapneshnaik--0f3a9e14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2943%3A%20Cross%20Site%20Scripting%20in%20SapneshNaik%20Student%20Management%20System&amp;severity=medium&amp;id=699adeb1be58cf853b22022d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2940-out-of-bounds-write-in-zaher1307-tin-2936ffcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2940%3A%20Out-of-bounds%20Write%20in%20Zaher1307%20tiny_web_server&amp;severity=medium&amp;id=699ad7a9be58cf853b1cfbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2939-cross-site-scripting-in-itsourcecode-0e030c3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2939%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=699ad0a1be58cf853b190e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2938-improper-access-controls-in-sourceco-92db5ba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2938%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=699ac613be58cf853b1434d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2385-cwe-345-insufficient-verification-of-07926427</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699abf0dbe58cf853b0fc39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2935-buffer-overflow-in-utt-hiper-810g-939f645f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2935%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2934-cross-site-scripting-in-yifang-cms-9b3c2ff3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2934%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2933-cross-site-scripting-in-yifang-cms-f18756f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2933%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2932-cross-site-scripting-in-yifang-cms-5172b3a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2932%3A%20Cross%20Site%20Scripting%20in%20YiFang%20CMS&amp;severity=medium&amp;id=699ab481be58cf853b04fa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2930-stack-based-buffer-overflow-in-tenda-1060ec7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2930%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=medium&amp;id=699aa2ecbe58cf853bf5261c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1369-cwe-601-url-redirection-to-untrusted-8bf9bb9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1369%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Conditional%20CAPTCHA&amp;severity=medium&amp;id=699b6bbfbe58cf853b9fec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2929-stack-based-buffer-overflow-in-d-lin-63e7a69b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2929%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9861be58cf853bec2c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2928-stack-based-buffer-overflow-in-d-lin-ba314a06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2928%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a9159be58cf853be4af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2927-stack-based-buffer-overflow-in-d-lin-aa7f83a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2927%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd6463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2926-stack-based-buffer-overflow-in-d-lin-b63cbef8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2926%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8a51be58cf853bdd645c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2925-stack-based-buffer-overflow-in-d-lin-790f34e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2925%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a8349be58cf853bd68ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2913-heap-based-buffer-overflow-in-libvip-d7babcf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2913%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips&amp;severity=low&amp;id=699a8349be58cf853bd68abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2912-sql-injection-in-code-projects-onlin-bf9f085a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2912%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=699a8349be58cf853bd68ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2911-buffer-overflow-in-tenda-fh451-0afdc9cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2911%3A%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-winos-40-campaigns-target-taiwan-61006908</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Winos%204.0%20Campaigns%20Target%20Taiwan&amp;severity=medium&amp;id=699c21ebbe58cf853b6b6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2910-stack-based-buffer-overflow-in-tenda-db290378</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2910%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699b6bbfbe58cf853b9fec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2909-stack-based-buffer-overflow-in-tenda-c1902d12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2909%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2908-stack-based-buffer-overflow-in-tenda-8458ae06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2908%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2907-stack-based-buffer-overflow-in-tenda-e9f3e7c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2907%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2906-stack-based-buffer-overflow-in-tenda-4d6e371a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2906%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a6729be58cf853b9881a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2905-stack-based-buffer-overflow-in-tenda-1e2cb94f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2905%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20HG9&amp;severity=high&amp;id=699a5c9dbe58cf853b91714c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2904-buffer-overflow-in-utt-hiper-810g-b0bb6f4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2904%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=699a5593be58cf853b7fcbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2903-null-pointer-dereference-in-skvadrik-a9b7e0e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2903%3A%20NULL%20Pointer%20Dereference%20in%20skvadrik%20re2c&amp;severity=medium&amp;id=699a5593be58cf853b7fcba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2898-deserialization-in-funadmin-1655bf68</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2898%3A%20Deserialization%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2897-cross-site-scripting-in-funadmin-361272fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2897%3A%20Cross%20Site%20Scripting%20in%20funadmin&amp;severity=medium&amp;id=699a5593be58cf853b7fcb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-22-ba8f968c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-22&amp;severity=medium&amp;id=699cebc3be58cf853be054cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-22-4d8876f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-22&amp;severity=medium&amp;id=699b9c51be58cf853bc9aa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-22-c03fd373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-22&amp;severity=low&amp;id=699a8312be58cf853bd645fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2896-improper-authorization-in-funadmin-8b9a76de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2896%3A%20Improper%20Authorization%20in%20funadmin&amp;severity=medium&amp;id=699a4401be58cf853b61d862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2895-weak-password-recovery-in-funadmin-197487f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2895%3A%20Weak%20Password%20Recovery%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2894-information-disclosure-in-funadmin-e975faf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2894%3A%20Information%20Disclosure%20in%20funadmin&amp;severity=medium&amp;id=699a3cfabe58cf853b5c2203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2889-use-after-free-in-ccextractor-8a5137dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2889%3A%20Use%20After%20Free%20in%20CCExtractor&amp;severity=medium&amp;id=699a2ee9be58cf853b52baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2887-uncontrolled-recursion-in-aardappel--a74e0dc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2887%3A%20Uncontrolled%20Recursion%20in%20aardappel%20lobster&amp;severity=medium&amp;id=699a20dabe58cf853b48d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2886-stack-based-buffer-overflow-in-tenda-a6c0a7e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2886%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=699a20dabe58cf853b48d55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2885-stack-based-buffer-overflow-in-d-lin-17be11df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2885%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2884-stack-based-buffer-overflow-in-d-lin-b154b949</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2884%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2883-stack-based-buffer-overflow-in-d-lin-5a90424a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2883%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2882-stack-based-buffer-overflow-in-d-lin-e735582c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2882%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a12cabe58cf853b2525c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2881-stack-based-buffer-overflow-in-d-lin-f2038f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2881%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=699a0bc7be58cf853b06b4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2877-stack-based-buffer-overflow-in-tenda-d45c8c4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2877%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=699a0133be58cf853bda57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2876-stack-based-buffer-overflow-in-tenda-20fd82b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2876%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A18&amp;severity=high&amp;id=6999efa1be58cf853bad3f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2874-stack-based-buffer-overflow-in-tenda-d1cd837e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2874%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999efa1be58cf853bad3f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2873-stack-based-buffer-overflow-in-tenda-9e1c5986</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2873%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999e192be58cf853ba5a4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2872-stack-based-buffer-overflow-in-tenda-c3d8c5e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2872%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999da89be58cf853ba20638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2871-stack-based-buffer-overflow-in-tenda-bd337d40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2871%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999d381be58cf853b9e8de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2870-stack-based-buffer-overflow-in-tenda-01319858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2870%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A21&amp;severity=high&amp;id=6999c571be58cf853b997438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2869-out-of-bounds-read-in-janet-lang-jan-d96dcc6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2869%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=6999c571be58cf853b99742e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2867-sql-injection-in-itsourcecode-vehicl-078e6aa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2867%3A%20SQL%20Injection%20in%20itsourcecode%20Vehicle%20Management%20System&amp;severity=medium&amp;id=6999bae3be58cf853b900a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grandstream-phone-vulnerability-exposes-c-7d749d0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grandstream%20Phone%20Vulnerability%20Exposes%20Calls%20to%20Interception&amp;severity=critical&amp;id=69999e90be58cf853b84f9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1787-cwe-862-missing-authorization-in-thi-cbb97bf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1787%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20Backup%20%26%20Migration%20Tool&amp;severity=medium&amp;id=69998d30be58cf853b7cb605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27579-cwe-346-origin-validation-error-in--edc4b98e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27579%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20karnop%20realtime-collaboration-platform&amp;severity=high&amp;id=699989acbe58cf853b7b329e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27492-cwe-488-exposure-of-data-element-to-626119f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27492%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20lettermint%20lettermint-node&amp;severity=medium&amp;id=699989acbe58cf853b7b3299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14339-cwe-862-missing-authorization-in-we-9669a54d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14339%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weMail%3A%20Email%20Marketing%2C%20Email%20Automation%2C%20Newsletters%2C%20Subscribers%20%26%20eCommerce%20Email%20Optins&amp;severity=medium&amp;id=69997b9dbe58cf853b7530da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27482-cwe-396-declaration-of-catch-for-ge-d7eb6f83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27482%3A%20CWE-396%3A%20Declaration%20of%20Catch%20for%20Generic%20Exception%20in%20ray-project%20ray&amp;severity=medium&amp;id=69997b9dbe58cf853b7530e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27479-cwe-918-server-side-request-forgery-8b1d9bca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27479%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ellite%20Wallos&amp;severity=high&amp;id=69996d8dbe58cf853b6e3314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2865-sql-injection-in-itsourcecode-agri-t-9413028e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2865%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=69996301be58cf853b611671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2864-path-traversal-in-fenghaha-ssm-erp-918de2b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2864%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69996301be58cf853b61166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27469-cwe-79-improper-neutralization-of-i-6807b486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20isso-comments%20isso&amp;severity=medium&amp;id=69996301be58cf853b611665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27206-cwe-502-deserialization-of-untruste-e15a97f3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27206%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20zumba%20json-serializer&amp;severity=high&amp;id=69995bf9be58cf853b593127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27458-cwe-80-improper-neutralization-of-s-f57f6777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27458%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=69995bf9be58cf853b59312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27452-cwe-200-exposure-of-sensitive-infor-d39700d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27452%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20JonathanWilbur%20asn1-ts&amp;severity=critical&amp;id=69995bf9be58cf853b59312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27471-cwe-862-missing-authorization-in-fr-0d95cb60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27471%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20erpnext&amp;severity=critical&amp;id=699954f1be58cf853b55f45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-language-phishing-emails-sat-feb-21st-02b8ce8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese-Language%20Phishing%20Emails%2C%20(Sat%2C%20Feb%2021st)&amp;severity=medium&amp;id=69994db5be58cf853b530115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2863-path-traversal-in-fenghaha-ssm-erp-086ce83e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2863%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69994df7be58cf853b531474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2861-information-disclosure-in-foswiki-785784dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2861%3A%20Information%20Disclosure%20in%20Foswiki&amp;severity=medium&amp;id=69994df7be58cf853b53146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27212-cwe-1321-improperly-controlled-modi-35374c82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27212%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nolimits4web%20swiper&amp;severity=critical&amp;id=69994a6fbe58cf853b51dfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26047-uncontrolled-resource-consumption-2faa897d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26047%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=69994a6fbe58cf853b51dfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26046-improper-neutralization-of-special--aded30ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26046%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26045-improper-control-of-generation-of-c-ac6ce0f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=69994a6fbe58cf853b51dfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27210-cwe-79-improper-neutralization-of-i-304bf2ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpetroff%20pannellum&amp;severity=medium&amp;id=699946e0be58cf853b4e0107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27205-cwe-524-use-of-cache-containing-sen-0adafbc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27205%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20pallets%20flask&amp;severity=low&amp;id=699946e0be58cf853b4e0102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27199-cwe-67-improper-handling-of-windows-2d486c7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27199%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=699a1a4cbe58cf853b44ca10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27198-cwe-269-improper-privilege-manageme-f67eef78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27198%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20getformwork%20formwork&amp;severity=high&amp;id=699a1a4cbe58cf853b44c9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27197-cwe-287-improper-authentication-in--f7f67e7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20getsentry%20sentry&amp;severity=critical&amp;id=69993c53be58cf853b46cc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2860-improper-authorization-in-fenghaha-s-7b872e85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2860%3A%20Improper%20Authorization%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=69993c53be58cf853b46cc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27196-cwe-79-improper-neutralization-of-i-471a7dc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27196%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=69993c53be58cf853b46cc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27194-cwe-74-improper-neutralization-of-s-60332a35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27194%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20man-group%20dtale&amp;severity=high&amp;id=6999354dbe58cf853b449470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27193-cwe-200-exposure-of-sensitive-infor-8c54f238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27193%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20feathersjs%20feathers&amp;severity=high&amp;id=6999354dbe58cf853b44946b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27192-cwe-346-origin-validation-error-in--17700ad4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27192%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27191-cwe-601-url-redirection-to-untruste-5f61f9b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27191%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20feathersjs%20feathers&amp;severity=high&amp;id=69992e44be58cf853b3dcccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65995-cwe-209-generation-of-error-message-fae63ced</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65995%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=699923b9be58cf853b17289f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-21-47397153</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-21&amp;severity=medium&amp;id=699a4ad1be58cf853b672ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-21-314b93fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-21&amp;severity=medium&amp;id=6999f672be58cf853bb0d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-21-d084b561</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-21&amp;severity=low&amp;id=6999664dbe58cf853b67e1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27168-cwe-122-heap-based-buffer-overflow--338e400d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27168%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HappySeaFox%20sail&amp;severity=high&amp;id=6998f281be58cf853bdfabe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27203-cwe-15-external-control-of-system-o-d4123025</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27203%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20YosefHayim%20ebay-mcp&amp;severity=high&amp;id=6998f281be58cf853bdfabe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27134-cwe-287-improper-authentication-in--be5a44cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27134%3A%20CWE-287%3A%20Improper%20Authentication%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=6998eb7cbe58cf853bdd2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27133-cwe-295-improper-certificate-valida-e5103e94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27133%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20strimzi%20strimzi-kafka-operator&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27125-cwe-915-improperly-controlled-modif-2f99b788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27125%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27122-cwe-79-improper-neutralization-of-i-d6a4de72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27122%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27121-cwe-79-improper-neutralization-of-i-f01a2543</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27121%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27119-cwe-79-improper-neutralization-of-i-0a61a055</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27119%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sveltejs%20svelte&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2490-cwe-59-improper-link-resolution-befo-d299ff2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2490%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20RustDesk%20Client%20for%20Windows&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2041-cwe-78-improper-neutralization-of-sp-9112e8cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2041%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2043-cwe-78-improper-neutralization-of-sp-f93a8c83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2043%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd8654a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2042-cwe-78-improper-neutralization-of-sp-c3d99d64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2042%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Host&amp;severity=high&amp;id=6998e0efbe58cf853bd86546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2040-cwe-427-uncontrolled-search-path-ele-0eaf6799</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2040%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=6998e0efbe58cf853bd8653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2039-cwe-862-missing-authorization-in-gfi-14597c17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2039%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd8653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2036-cwe-502-deserialization-of-untrusted-d76c5725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2036%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2038-cwe-862-missing-authorization-in-gfi-f5fda3da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2038%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2037-cwe-502-deserialization-of-untrusted-7d9015ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2037%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=6998e0efbe58cf853bd86536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2035-cwe-78-improper-neutralization-of-sp-ffc2acfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2035%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=6998e0efbe58cf853bd8652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2034-cwe-120-buffer-copy-without-checking-ee11093c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2034%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=6998e0efbe58cf853bd8652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2858-out-of-bounds-read-in-wren-lang-wren-beaad496</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2858%3A%20Out-of-Bounds%20Read%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6998d662be58cf853bc3fe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27120-cwe-75-failure-to-sanitize-special--5394c06d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27120%3A%20CWE-75%3A%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20vapor%20leaf-kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27118-cwe-346-origin-validation-error-in--a2829ba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27118%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20sveltejs%20kit&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27112-cwe-863-incorrect-authorization-in--0476694e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27112%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=critical&amp;id=6998d2dfbe58cf853bb9b974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27111-cwe-862-missing-authorization-in-ak-4eba098a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27111%3A%20CWE-862%3A%20Missing%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=6998d2dfbe58cf853bb9b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27026-cwe-770-allocation-of-resources-wit-2c968574</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27026%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27025-cwe-834-excessive-iteration-in-py-p-037c1442</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27025%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27024-cwe-835-loop-with-unreachable-exit--6dceccea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27024%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27022-cwe-74-improper-neutralization-of-s-4e85c924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27022%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20langchain-ai%20langgraphjs&amp;severity=medium&amp;id=6998e47bbe58cf853bd9f75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27020-cwe-79-improper-neutralization-of-i-87028508</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27020%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lukas12000%20photobooth&amp;severity=medium&amp;id=6998cf5abe58cf853bb24fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2857-stack-based-buffer-overflow-in-d-lin-756386cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2857%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998cf5abe58cf853bb24faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25896-cwe-185-incorrect-regular-expressio-a786da3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25896%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=critical&amp;id=6998cf5abe58cf853bb24fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27190-cwe-78-improper-neutralization-of-s-61ca1d2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27190%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=6998e47cbe58cf853bd9f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2856-stack-based-buffer-overflow-in-d-lin-e5278306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2856%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e1be58cf853bab6aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2855-stack-based-buffer-overflow-in-d-lin-4a6d59bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2855%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62326-cwe-79-improper-neutralization-of-i-0249db27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCLSoftware%20Digital%20Experience&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2473-cwe-340-generation-of-predictable-nu-62055df8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2473%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20Google%20Cloud%20Vertex%20AI%20Experiments&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2472-cwe-79-improper-neutralization-of-in-08ce0843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2472%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Vertex%20AI%20SDK%20for%20Python&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2854-stack-based-buffer-overflow-in-d-lin-0ac6d2fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2854%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2853-stack-based-buffer-overflow-in-d-lin-37fdae85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2853%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M960&amp;severity=high&amp;id=6998c9e2be58cf853bab6afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2852-improper-access-controls-in-yeqifu-w-d3d7f563</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2852%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e4be58cf853bab7605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2832-cwe-200-in-hp-inc-samsung-multixpres-5f46e4eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2832%3A%20CWE-200%20in%20HP%20Inc%20Samsung%20MultiXpress%20SL-X7600LXR%2C%20SL-X7500LXR%2C%20SL-X7400LXR&amp;severity=medium&amp;id=69989d822c4d84f260b8d827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27115-cwe-22-improper-limitation-of-a-pat-30707c13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27115%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=699899fe2c4d84f260b6810c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2851-improper-access-controls-in-yeqifu-w-ad7331dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2851%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2850-improper-access-controls-in-yeqifu-w-53b18e86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2850%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=699899fe2c4d84f260b68111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26102-cwe-732-incorrect-permission-assign-3e8ec137</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26102%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26101-cwe-732-incorrect-permission-assign-507e105d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26101%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26100-cwe-732-incorrect-permission-assign-13572654</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26100%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=medium&amp;id=6998c9e6be58cf853bab77cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27506-cwe-79-improper-neutralization-of-i-f9e184f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26099-cwe-427-uncontrolled-search-path-el-e9a235da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26099%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26098-cwe-427-uncontrolled-search-path-el-122bfb41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26098%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e6be58cf853bab77c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26097-cwe-427-uncontrolled-search-path-el-a14c6dd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26097%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26096-cwe-732-incorrect-permission-assign-d2bc77a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26096%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26095-cwe-732-incorrect-permission-assign-d597aa2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26095%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26093-cwe-77-improper-neutralization-of-s-05064f5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26093%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=high&amp;id=6998c9e4be58cf853bab7619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27505-cwe-79-improper-neutralization-of-i-d9eb7933</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27504-cwe-79-improper-neutralization-of-i-79d41f19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27503-cwe-79-improper-neutralization-of-i-299cc120</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27503%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2333-cwe-77-improper-neutralization-of-sp-a6e584ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2333%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Owl%20opds&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27502-cwe-79-improper-neutralization-of-i-497f1478</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20sa2blv%20SVXportal&amp;severity=medium&amp;id=6998c42f2c4d84f260d040a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15583-cross-site-scripting-in-detronetdip-f3411607</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15583%3A%20Cross%20Site%20Scripting%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15582-authorization-bypass-in-detronetdip-decee4fc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15582%3A%20Authorization%20Bypass%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6998c9e6be58cf853bab77db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1842-cwe-613-insufficient-session-expirat-81f62f0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1842%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20SoftIron%20HyperCloud&amp;severity=medium&amp;id=6998c9e2be58cf853bab6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24790-cwe-306-in-welker-odoreyes-ecosyste-ec3e6d58</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24790%3A%20CWE-306%20in%20Welker%20OdorEyes%20EcoSystem%20Pulse%20Bypass%20System%20with%20XL4%20Controller&amp;severity=high&amp;id=69988bee2c4d84f260ae23d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26048-cwe-306-in-jinan-usr-iot-technology-9c6d3db0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26048%3A%20CWE-306%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c9e1be58cf853bab6ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26049-cwe-522-in-jinan-usr-iot-technology-c466334b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26049%3A%20CWE-522%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=medium&amp;id=6998c0ac2c4d84f260ce40b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2818-cwe-23-relative-path-traversal-in-vm-a93f5c94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2818%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20VMware%20Spring%20Data%20Geode&amp;severity=high&amp;id=6998c42f2c4d84f260d040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2849-improper-access-controls-in-yeqifu-w-a0183a9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2849%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6998c9e7be58cf853bab82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2848-sql-injection-in-sourcecodester-simp-900bfef3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2848%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6998c9e7be58cf853bab82a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24455-cwe-319-in-jinan-usr-iot-technology-1aff07c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24455%3A%20CWE-319%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=high&amp;id=6998c0ac2c4d84f260ce40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25715-cwe-521-in-jinan-usr-iot-technology-b37d98fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25715%3A%20CWE-521%20in%20Jinan%20USR%20IOT%20Technology%20Limited%20(PUSR)%20USR-W610&amp;severity=critical&amp;id=6998c0ac2c4d84f260ce40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nists-quantum-breakthrough-single-photons-produced-1c6551af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NIST%E2%80%99s%20Quantum%20Breakthrough%3A%20Single%20Photons%20Produced%20on%20a%20Chip&amp;severity=medium&amp;id=699884b12c4d84f260a9a399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27072-improper-neutralization-of-input-du-639631d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixelYourSite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=6998ca03be58cf853bab938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24959-improper-neutralization-of-special--8ecab645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24959%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=high&amp;id=6998c9e4be58cf853bab7616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24956-improper-neutralization-of-special--3235d069</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24956%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20Download%20Manager%20Addons%20for%20Elementor&amp;severity=critical&amp;id=6998ca03be58cf853bab9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24955-improper-neutralization-of-input-du-9138314c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Whizz%20Plugins&amp;severity=high&amp;id=6998c9e4be58cf853bab7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24953-improper-limitation-of-a-pathname-t-a40d9485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24953%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=medium&amp;id=6998ca03be58cf853bab9385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24950-authorization-bypass-through-user-c-c56e4f1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24950%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeplugs%20Authorsy&amp;severity=high&amp;id=6998c9e4be58cf853bab7610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24949-improper-neutralization-of-input-du-5bc860f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20PhotoMe&amp;severity=high&amp;id=6998ca03be58cf853bab9382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24948-improper-neutralization-of-input-du-f23c3cea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Reflector&amp;severity=high&amp;id=6998c9e4be58cf853bab760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24946-missing-authorization-in-tychesoftw-9a5efc38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24946%3A%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=6998ca02be58cf853bab9356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24944-missing-authorization-in-wedevs-sub-bab27ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24944%3A%20Missing%20Authorization%20in%20weDevs%20Subscribe2&amp;severity=medium&amp;id=6998c9e4be58cf853bab7602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24943-improper-neutralization-of-input-du-6c89e4dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference&amp;severity=high&amp;id=6998ca02be58cf853bab9353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24941-missing-authorization-in-wpjobporta-9352ccfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24941%3A%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=high&amp;id=6998c9e2be58cf853bab6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22384-deserialization-of-untrusted-data-i-c8cd76a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22384%3A%20Deserialization%20of%20Untrusted%20Data%20in%20leafcolor%20Applay%20-%20Shortcodes&amp;severity=high&amp;id=6998ca02be58cf853bab9350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22383-authorization-bypass-through-user-c-2a198f42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22383%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=medium&amp;id=6998c9e2be58cf853bab6b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22381-improper-control-of-filename-for-in-8b33630f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=high&amp;id=6998ca02be58cf853bab934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22380-improper-control-of-filename-for-in-7673de4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22380%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UnlimHost&amp;severity=high&amp;id=6998c9e2be58cf853bab6afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22379-improper-control-of-filename-for-in-fd0926aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22379%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Netmix&amp;severity=high&amp;id=6998ca02be58cf853bab934a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22378-improper-control-of-filename-for-in-532e1939</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22378%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Blabber&amp;severity=high&amp;id=6998c9e2be58cf853bab6af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22377-improper-control-of-filename-for-in-54cf682d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Saveo&amp;severity=high&amp;id=6998ca02be58cf853bab9347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22376-improper-control-of-filename-for-in-47860a6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22376%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Parkivia&amp;severity=high&amp;id=6998c9e2be58cf853bab6af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22375-improper-control-of-filename-for-in-9e4ca84a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Impacto%20Patronus&amp;severity=high&amp;id=6998ca02be58cf853bab9344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22374-improper-control-of-filename-for-in-ff6f952c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Zio%20Alberto&amp;severity=high&amp;id=6998c9e2be58cf853bab6af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22373-improper-control-of-filename-for-in-91fdd6af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fooddy&amp;severity=high&amp;id=6998ca02be58cf853bab9341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22372-improper-control-of-filename-for-in-99586c4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22372%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Isida&amp;severity=high&amp;id=6998c9e2be58cf853bab6aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22371-improper-control-of-filename-for-in-8243fd9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gustavo&amp;severity=high&amp;id=6998ca02be58cf853bab933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22370-improper-control-of-filename-for-in-bbcd8a85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Marveland&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22369-improper-control-of-filename-for-in-b974319a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ironfit&amp;severity=high&amp;id=6998ca02be58cf853bab933b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22368-improper-control-of-filename-for-in-52f1856f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Redy&amp;severity=high&amp;id=6998c9e1be58cf853bab6ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22367-improper-control-of-filename-for-in-4478fc38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Coworking&amp;severity=high&amp;id=6998ca00be58cf853bab9221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22366-improper-control-of-filename-for-in-3cf8c652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Jude&amp;severity=high&amp;id=6998c9e1be58cf853bab6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22365-improper-control-of-filename-for-in-d19f4323</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleng&amp;severity=critical&amp;id=6998ca00be58cf853bab921e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22364-improper-control-of-filename-for-in-70fc26a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20SevenTrees&amp;severity=high&amp;id=6998c9e1be58cf853bab6aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22363-improper-control-of-filename-for-in-2eb32049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rhodos&amp;severity=high&amp;id=6998ca00be58cf853bab921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22362-improper-control-of-filename-for-in-9a7bc312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Photolia&amp;severity=high&amp;id=6998c9e1be58cf853bab6aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22361-improper-control-of-filename-for-in-5e350512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20A-Mart&amp;severity=high&amp;id=6998ca00be58cf853bab9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22357-improper-neutralization-of-input-du-32b18cf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=high&amp;id=6998ca00be58cf853bab9215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22356-improper-control-of-filename-for-in-7d50b9f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Automattic%20Jetpack%20CRM&amp;severity=high&amp;id=6998ca00be58cf853bab9212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22354-deserialization-of-untrusted-data-i-a275f0c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Dotstore%20Woocommerce%20Category%20Banner%20Management&amp;severity=high&amp;id=6998ca00be58cf853bab920f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22352-improper-neutralization-of-input-du-82c9c764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=high&amp;id=6998ca00be58cf853bab920c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22351-missing-authorization-in-marcus-aka-382d6452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22351%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=medium&amp;id=6998ca00be58cf853bab9209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22350-missing-authorization-in-add-onsorg-90039836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22350%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=medium&amp;id=6998ca00be58cf853bab9206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22346-deserialization-of-untrusted-data-i-85dcd642</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22346%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Slider%20Responsive%20Slideshow%20%E2%80%93%20Image%20slider%2C%20Gallery%20slideshow&amp;severity=high&amp;id=6998c9ffbe58cf853bab91df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22345-deserialization-of-untrusted-data-i-f1793858</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22345%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Image%20Gallery%20%E2%80%93%20Lightbox%20Gallery%2C%20Responsive%20Photo%20Gallery%2C%20Masonry%20Gallery&amp;severity=high&amp;id=6998c9ffbe58cf853bab91dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22344-improper-control-of-filename-for-in-72fff014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22344%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20FiveStar&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22341-authentication-bypass-using-an-alte-258b6c54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22341%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Case-Themes%20Booked&amp;severity=medium&amp;id=6998c9ffbe58cf853bab91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69410-improper-control-of-filename-for-in-4818f79c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Belletrist&amp;severity=high&amp;id=6998c9ffbe58cf853bab91d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69409-improper-control-of-filename-for-in-8f64e0af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69409%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20PJ%20%7C%20Life%20%26%20Business%20Coaching&amp;severity=high&amp;id=6998c9ffbe58cf853bab91cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69408-improper-control-of-filename-for-in-5ca7bc52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69408%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20HealthFirst&amp;severity=high&amp;id=6998c9ffbe58cf853bab91ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69407-improper-control-of-filename-for-in-b72f7028</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69407%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Struktur&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69406-improper-control-of-filename-for-in-8c56f980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69406%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20FreightCo&amp;severity=high&amp;id=6998c9ffbe58cf853bab91c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69405-deserialization-of-untrusted-data-i-7fb533d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69405%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Lorem%20Ipsum%20%7C%20Books%20%26%20Media%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69404-deserialization-of-untrusted-data-i-6248805e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69404%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Extreme%20Store&amp;severity=critical&amp;id=6998c9fdbe58cf853bab917c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69403-unrestricted-upload-of-file-with-da-1742b5b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69403%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bravis-Themes%20Bravis%20Addons&amp;severity=critical&amp;id=6998c9fdbe58cf853bab9179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69402-improper-control-of-filename-for-in-c155e509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20R%26F&amp;severity=high&amp;id=6998c9fdbe58cf853bab9176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69401-authentication-bypass-by-spoofing-i-603d5f42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69401%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20mdalabar%20WooODT%20Lite&amp;severity=high&amp;id=6998c9fdbe58cf853bab9173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69400-improper-control-of-filename-for-in-aa67087f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69400%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Yokoo&amp;severity=high&amp;id=6998c9fdbe58cf853bab9170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69399-improper-control-of-filename-for-in-d84915fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Cobble&amp;severity=high&amp;id=6998c9fdbe58cf853bab916d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69398-improper-control-of-filename-for-in-76bcabef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69398%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Plank&amp;severity=high&amp;id=6998c9fdbe58cf853bab9169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69397-improper-control-of-filename-for-in-2d7f5a1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69397%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Tint&amp;severity=high&amp;id=6998c9fdbe58cf853bab9166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69396-improper-control-of-filename-for-in-cd4d231d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69396%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Splendour&amp;severity=high&amp;id=6998c9fdbe58cf853bab915e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69395-improper-control-of-filename-for-in-3d4a5ce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69395%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Gable&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69393-missing-authorization-in-jthemes-ex-5b6e7a1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69393%3A%20Missing%20Authorization%20in%20Jthemes%20Exzo&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69392-improper-neutralization-of-input-du-90e30f56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iMoney&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69391-improper-neutralization-of-input-du-33c897e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Diamond&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69390-improper-neutralization-of-input-du-59d41ec8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Business%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69389-improper-neutralization-of-input-du-b9f61373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hugh%20Mungus%20Visitor%20Maps%20Extended%20Referer%20Field&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69388-missing-authorization-in-cliengo-cl-828a358a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69388%3A%20Missing%20Authorization%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69387-improper-control-of-filename-for-in-bd9b7785</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whatwouldjessedo%20Simple%20Retail%20Menus&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69386-improper-neutralization-of-input-du-559119a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69386%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realvirtualmx%20RVCFDI%20para%20Woocommerce&amp;severity=high&amp;id=6998c9fbbe58cf853bab8d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69385-missing-authorization-in-agnihd-car-5e178203</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69385%3A%20Missing%20Authorization%20in%20AgniHD%20Cartify%20-%20WooCommerce%20Gutenberg%20WordPress%20Theme&amp;severity=medium&amp;id=6998c9fbbe58cf853bab8d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69384-improper-neutralization-of-input-du-dcf39699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69384%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=high&amp;id=6998c9fabe58cf853bab8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69383-improper-control-of-filename-for-in-bdded47d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20-%20Montpellier%20WP%20shop&amp;severity=high&amp;id=6998c9fabe58cf853bab8d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69382-deserialization-of-untrusted-data-i-d1f8436f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69382%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20Themesflat%20Elementor&amp;severity=critical&amp;id=6998c9fabe58cf853bab8d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69381-missing-authorization-in-vanquish-w-22979e9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69381%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Bulk%20Product%20Editor&amp;severity=high&amp;id=6998c9fabe58cf853bab8d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69380-improper-limitation-of-a-pathname-t-0705c153</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69380%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69379-improper-limitation-of-a-pathname-t-7d9b991f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69379%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20Upload%20Files%20Anywhere&amp;severity=high&amp;id=6998c9fabe58cf853bab8cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69378-incorrect-privilege-assignment-in-x-adbe137f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69378%3A%20Incorrect%20Privilege%20Assignment%20in%20XforWooCommerce%20Product%20Filter%20for%20WooCommerce&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69377-improper-limitation-of-a-pathname-t-444ddb21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69377%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69376-improper-limitation-of-a-pathname-t-8d35ed40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69376%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69375-improper-control-of-filename-for-in-aceae499</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69375%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Portfolio%20Builder&amp;severity=high&amp;id=6998c9fabe58cf853bab8cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69374-improper-control-of-filename-for-in-c98b4c6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69374%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SolverWp%20Eleblog%20%E2%80%93%20Elementor%20Blog%20And%20Magazine%20Addons&amp;severity=high&amp;id=6998c9f8be58cf853bab8ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69373-improper-control-of-filename-for-in-8a23076b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20VidoRev&amp;severity=high&amp;id=6998c9f8be58cf853bab8c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69372-deserialization-of-untrusted-data-i-478c0a38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69372%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20SevenHills&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69371-deserialization-of-untrusted-data-i-9dcd4607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69371%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20KindlyCare&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69370-deserialization-of-untrusted-data-i-c59240a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69370%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Capella&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69368-improper-neutralization-of-input-du-b3fb562b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69368%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20SOHO%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69367-improper-neutralization-of-input-du-9e3ce157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20Oyster%20-%20Photography%20WordPress%20Theme&amp;severity=high&amp;id=6998c9f8be58cf853bab8c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69366-improper-neutralization-of-special--9fb40b7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Emerce%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69365-improper-neutralization-of-special--9f132755</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69365%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Uroan%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69337-improper-neutralization-of-special--a25bade3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69337%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20don-themes%20Wolmart%20Core&amp;severity=critical&amp;id=6998c9f8be58cf853bab8c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69330-improper-neutralization-of-input-du-0fc4e224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20Prestige&amp;severity=high&amp;id=6998c9f7be58cf853bab8c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69329-deserialization-of-untrusted-data-i-5554d9e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69329%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Jthemes%20Prestige&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69328-deserialization-of-untrusted-data-i-1008c2af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69328%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69326-improper-neutralization-of-input-du-066280cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69325-path-traversal-in-primersoftware-pr-d91b8f83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69325%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=medium&amp;id=6998c9f7be58cf853bab8c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69324-improper-neutralization-of-input-du-c43fe3a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=high&amp;id=6998c9f7be58cf853bab8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69323-improper-neutralization-of-input-du-3d87008f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20Slimstat%20Analytics&amp;severity=high&amp;id=6998c9f7be58cf853bab8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69322-improper-control-of-filename-for-in-30c6fada</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69322%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f7be58cf853bab8c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69310-improper-neutralization-of-special--63c262ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69310%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Woodly%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69309-improper-neutralization-of-special--f916c2e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69309%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Saasplate%20Core&amp;severity=critical&amp;id=6998c9f7be58cf853bab8c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69308-improper-neutralization-of-special--b67a36af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69308%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Nestbyte%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69307-improper-neutralization-of-special--ec1cc96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69307%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Medinik%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69306-improper-neutralization-of-special--b1330bd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Electio%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69305-improper-neutralization-of-special--6c729442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69305%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Crete%20Core&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69304-improper-neutralization-of-special--0851bfff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69304%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Allmart&amp;severity=critical&amp;id=6998c9f5be58cf853bab87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69303-missing-authorization-in-modeltheme-fd7a5bf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69303%3A%20Missing%20Authorization%20in%20modeltheme%20ModelTheme%20Framework&amp;severity=high&amp;id=6998c9f5be58cf853bab87a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69302-improper-neutralization-of-input-du-9e32252c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=high&amp;id=6998c9f5be58cf853bab879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69301-deserialization-of-untrusted-data-i-01b61f2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69301%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20PhotoMe&amp;severity=critical&amp;id=6998c9f5be58cf853bab879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69299-server-side-request-forgery-ssrf-in-e830acbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69299%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Laborator%20Oxygen&amp;severity=high&amp;id=6998c9f5be58cf853bab8797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69298-missing-authorization-in-ghostpool--dab750db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69298%3A%20Missing%20Authorization%20in%20GhostPool%20Gauge&amp;severity=high&amp;id=6998c9f5be58cf853bab8794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69297-missing-authorization-in-ghostpool--4d32211b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69297%3A%20Missing%20Authorization%20in%20GhostPool%20Aardvark%20Plugin&amp;severity=high&amp;id=6998c9f3be58cf853bab8754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69296-improper-neutralization-of-input-du-3cf6c340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhostPool%20Aardvark&amp;severity=high&amp;id=6998c9f3be58cf853bab8751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69295-improper-neutralization-of-special--97e31acb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69295%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TeconceTheme%20Coven%20Core&amp;severity=critical&amp;id=6998c9f3be58cf853bab874e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69294-deserialization-of-untrusted-data-i-973f59a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69294%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20PeakShops&amp;severity=high&amp;id=6998c9f3be58cf853bab874b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69063-missing-authorization-in-saad-iqbal-38006240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69063%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=6998c9f3be58cf853bab8748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69011-improper-neutralization-of-input-du-827a8668</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPKube%20Cool%20Tag%20Cloud&amp;severity=medium&amp;id=6998c9f3be58cf853bab8745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68895-authentication-bypass-using-an-alte-e179568e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68895%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ahachat%20AhaChat%20Messenger%20Marketing&amp;severity=medium&amp;id=6998c9f3be58cf853bab8742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68880-improper-neutralization-of-input-du-45b81ed2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=high&amp;id=6998c9f3be58cf853bab873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68863-improper-neutralization-of-input-du-4674b2bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20iContact%20for%20Gravity%20Forms&amp;severity=high&amp;id=6998c9f3be58cf853bab873c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68862-improper-limitation-of-a-pathname-t-47bc47d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68862%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Murtaza%20Bhurgri%20Woo%20File%20Dropzone&amp;severity=high&amp;id=6998c9f3be58cf853bab8739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68856-improper-neutralization-of-input-du-05949549</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keeswolters%20Mopinion%20Feedback%20Form&amp;severity=high&amp;id=6998c9f2be58cf853bab86e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68855-insertion-of-sensitive-information--0c4f6164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68855%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=medium&amp;id=6998c9f2be58cf853bab86e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68854-improper-neutralization-of-input-du-72219380</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harman79%20ID%20Arrays&amp;severity=high&amp;id=6998c9f2be58cf853bab86e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68853-deserialization-of-untrusted-data-i-506d20b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68853%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Kleor%20Contact%20Manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68852-improper-neutralization-of-input-du-2bac6d5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmuehle%20Court%20Reservation&amp;severity=high&amp;id=6998c9f2be58cf853bab86dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68848-improper-neutralization-of-input-du-64555e11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anmari%20amr%20cron%20manager&amp;severity=high&amp;id=6998c9f2be58cf853bab86d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68847-improper-neutralization-of-input-du-0893a46a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itex%20iSape&amp;severity=high&amp;id=6998c9f2be58cf853bab86d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68846-improper-neutralization-of-input-du-59a39808</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paris%20Holley%20Asynchronous%20Javascript&amp;severity=high&amp;id=6998c9f2be58cf853bab86d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68845-improper-neutralization-of-input-du-c1a8b4ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68845%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=high&amp;id=6998c9f2be58cf853bab86d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68844-improper-neutralization-of-input-du-cb75cd2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DaleAB%20Membee%20Login&amp;severity=high&amp;id=6998c9f2be58cf853bab86cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68843-improper-neutralization-of-input-du-8f6fcf3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68843%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bas%20Schuiling%20FeedWordPress%20Advanced%20Filters&amp;severity=high&amp;id=6998c9f0be58cf853bab85d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68842-improper-neutralization-of-input-du-7eab223a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalbounty%20Widget%20Logic%20Visual&amp;severity=high&amp;id=6998c9f0be58cf853bab85cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68841-improper-control-of-filename-for-in-dc039b31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68841%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Themepul%20TopperPack%20%E2%80%93%20Complete%20Elementor%20Addons%2C%20Theme%20%26amp%3B%20CPT%20Builder&amp;severity=high&amp;id=6998c9f0be58cf853bab85cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68837-missing-authorization-in-elextensio-def71628</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68837%3A%20Missing%20Authorization%20in%20ELEXtensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=6998c9f0be58cf853bab85c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68834-missing-authorization-in-saiful-isl-51f7d3ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68834%3A%20Missing%20Authorization%20in%20Saiful%20Islam%20Sync%20Master%20Sheet%20%26%238211%3B%20Product%20Sync%20with%20Google%20Sheet%20for%20WooCommerce&amp;severity=null&amp;id=6998c9f0be58cf853bab85c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68552-improper-control-of-filename-for-in-47d1e875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68552%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20WooCommerce%20Coming%20Soon%20Product%20with%20Countdown&amp;severity=medium&amp;id=6998c9f0be58cf853bab85c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68549-unrestricted-upload-of-file-with-da-f300012a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68549%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Wiguard&amp;severity=critical&amp;id=6998c9f0be58cf853bab85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68545-improper-control-of-filename-for-in-e55abf46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68545%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=critical&amp;id=6998c9f0be58cf853bab85bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68543-improper-control-of-filename-for-in-ec7a0378</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68543%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=high&amp;id=6998c9f0be58cf853bab85ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68542-missing-authorization-in-vgdevsolut-4bad2e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68542%3A%20Missing%20Authorization%20in%20vgdevsolutions%20Checkout%20Gateway%20for%20IRIS&amp;severity=medium&amp;id=6998c9f0be58cf853bab85b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68541-deserialization-of-untrusted-data-i-129a58cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68541%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Ippsum&amp;severity=critical&amp;id=6998c9efbe58cf853bab857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68539-improper-control-of-filename-for-in-ce4a1980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68539%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=high&amp;id=6998c9efbe58cf853bab857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68536-improper-control-of-filename-for-in-c935bbb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68536%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=high&amp;id=6998c9efbe58cf853bab8577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68534-missing-authorization-in-add-onsorg-81e370f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68534%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=medium&amp;id=6998c9efbe58cf853bab8574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68531-deserialization-of-untrusted-data-i-863bd6f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68531%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=high&amp;id=6998c9efbe58cf853bab8571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68526-deserialization-of-untrusted-data-i-cbe087a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68526%3A%20Deserialization%20of%20Untrusted%20Data%20in%20A%20WP%20Life%20Modal%20Popup%20Box&amp;severity=high&amp;id=6998c9efbe58cf853bab856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68514-authorization-bypass-through-user-c-16b1a07c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68514%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=medium&amp;id=6998c9efbe58cf853bab856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68501-improper-neutralization-of-input-du-bb80394a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mollie%20Mollie%20Payments%20for%20WooCommerce&amp;severity=high&amp;id=6998c9efbe58cf853bab8568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68495-improper-neutralization-of-input-du-a12344e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=6998c9efbe58cf853bab8565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68069-missing-authorization-in-wpwax-dire-46097e51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68069%3A%20Missing%20Authorization%20in%20wpWax%20Directorist&amp;severity=high&amp;id=6998c9efbe58cf853bab8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68048-missing-authorization-in-xlplugins--6cbcdeeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68048%3A%20Missing%20Authorization%20in%20XLPlugins%20NextMove%20Lite&amp;severity=high&amp;id=6998c9edbe58cf853bab853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68037-improper-neutralization-of-input-du-72ad97fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atlas%20Gondal%20Export%20Media%20URLs&amp;severity=high&amp;id=6998c9edbe58cf853bab8537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68032-missing-authorization-in-passionate-ce65cf7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68032%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Advanced%20WC%20Analytics&amp;severity=medium&amp;id=6998c9edbe58cf853bab8534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68031-improper-neutralization-of-input-du-36f5d8bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6998c9edbe58cf853bab8531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68028-missing-authorization-in-passionate-0531b7c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68028%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=medium&amp;id=6998c9edbe58cf853bab852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68026-missing-authorization-in-niaj-morsh-decb3063</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68026%3A%20Missing%20Authorization%20in%20Niaj%20Morshed%20LC%20Wizard&amp;severity=medium&amp;id=6998c9edbe58cf853bab852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68025-missing-authorization-in-addonify-a-80dba42c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68025%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20Floating%20Cart%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68024-missing-authorization-in-addonify-a-946402e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68024%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%E2%80%93%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=6998c9edbe58cf853bab8525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68023-missing-authorization-in-addonify-a-eac8ceeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68023%3A%20Missing%20Authorization%20in%20Addonify%20Addonify%20%26%238211%3B%20Compare%20Products%20For%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab8522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68022-missing-authorization-in-soporteblu-ee8ea804</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68022%3A%20Missing%20Authorization%20in%20soporteblue%20Plugin%20BlueX%20for%20WooCommerce&amp;severity=medium&amp;id=6998c9edbe58cf853bab851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68005-missing-authorization-in-themewant--1a4a0af9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68005%3A%20Missing%20Authorization%20in%20themewant%20Easy%20Hotel%20Booking&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68002-improper-limitation-of-a-pathname-t-04dee762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68002%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20100plugins%20Open%20User%20Map&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68000-missing-authorization-in-pickplugin-6f6543a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68000%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67998-authentication-bypass-using-an-alte-c4558126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67998%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20kamleshyadav%20Miraculous%20Elementor&amp;severity=high&amp;id=6998c9ecbe58cf853bab84d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67997-deserialization-of-untrusted-data-i-ea8428bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67997%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Travelicious&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67996-deserialization-of-untrusted-data-i-0cb61011</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67996%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Nestin&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67995-deserialization-of-untrusted-data-i-acd7a12c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67995%3A%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20PatioTime&amp;severity=critical&amp;id=6998c9ecbe58cf853bab84cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67994-missing-authorization-in-yaycommerc-c7ea2cf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67994%3A%20Missing%20Authorization%20in%20YayCommerce%20YayCurrency&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67993-missing-authorization-in-vito-peleg-3197c6fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67993%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6998c9ecbe58cf853bab84c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67992-improper-control-of-filename-for-in-679a1900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20PatioTime&amp;severity=high&amp;id=6998c9ecbe58cf853bab84c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67991-improper-neutralization-of-input-du-776021b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanquish%20User%20Extra%20Fields&amp;severity=high&amp;id=6998c9eabe58cf853bab835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67990-improper-neutralization-of-input-du-3006f4c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20GMap%20Targeting&amp;severity=high&amp;id=6998c9eabe58cf853bab8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67988-improper-control-of-filename-for-in-236db501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67988%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20CozyStay&amp;severity=high&amp;id=6998c9eabe58cf853bab8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67987-improper-neutralization-of-special--112bf3eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=high&amp;id=6998c9eabe58cf853bab8353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67984-improper-neutralization-of-input-du-e2f8e180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calliko%20NPS%20computy&amp;severity=high&amp;id=6998c9eabe58cf853bab8350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67982-improper-control-of-filename-for-in-712cbfe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67982%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=high&amp;id=6998c9eabe58cf853bab834d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67981-improper-control-of-filename-for-in-f1219db4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67981%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=high&amp;id=6998c9eabe58cf853bab834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67980-improper-control-of-filename-for-in-9a55cb06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67980%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=high&amp;id=6998c9eabe58cf853bab8347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67979-improper-control-of-generation-of-c-bb0bfd2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67979%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=critical&amp;id=6998c9eabe58cf853bab8344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67978-improper-neutralization-of-input-du-9190c74a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FixBD%20Educare&amp;severity=high&amp;id=6998c9eabe58cf853bab8341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67977-missing-authorization-in-villatheme-4000ddd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67977%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=high&amp;id=6998c9e9be58cf853bab830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67974-missing-authorization-in-wp-legal-p-e9f4f790</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67974%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WPLegalPages&amp;severity=high&amp;id=6998c9e9be58cf853bab830b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67973-missing-authorization-in-sunshineph-1ae5502d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67973%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=6998c9e9be58cf853bab8308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67972-improper-neutralization-of-input-du-b07efd45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67972%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fox-themes%20Prague&amp;severity=high&amp;id=6998c9e9be58cf853bab8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67971-improper-neutralization-of-input-du-41121860</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPManageNinja%20FluentCart&amp;severity=high&amp;id=6998c9e9be58cf853bab8302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67970-missing-authorization-in-vertim-sch-71e7bfbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67970%3A%20Missing%20Authorization%20in%20vertim%20Schedula&amp;severity=medium&amp;id=6998c9e9be58cf853bab82ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67969-missing-authorization-in-knitpay-up-14cf04d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67969%3A%20Missing%20Authorization%20in%20knitpay%20UPI%20QR%20Code%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6998c9e9be58cf853bab82fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67624-missing-authorization-in-arya-dhira-fa3ec6c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67624%3A%20Missing%20Authorization%20in%20Arya%20Dhiratara%20Optimize%20More!%20%26%238211%3B%20Images&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67547-missing-authorization-in-uixthemes--a2440eab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67547%3A%20Missing%20Authorization%20in%20uixthemes%20Konte&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60183-improper-neutralization-of-input-du-63f9a290</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=medium&amp;id=6998c9e9be58cf853bab82f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60087-improper-control-of-filename-for-in-3f1b81bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nenad%20Obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53237-improper-neutralization-of-input-du-1c83c219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20Wizard%20Cloak&amp;severity=high&amp;id=6998c9e8be58cf853bab82e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53233-improper-neutralization-of-input-du-2e3f291a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RylanH%20Storyform&amp;severity=high&amp;id=6998c9e8be58cf853bab82e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53231-improper-neutralization-of-input-du-8073dcd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevstudio%20Easy%20Taxonomy%20Images&amp;severity=high&amp;id=6998c9e8be58cf853bab82dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53228-improper-neutralization-of-input-du-f0496251</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jezza101%20bbpress%20Simple%20Advert%20Units&amp;severity=high&amp;id=6998c9e8be58cf853bab82da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53217-missing-authorization-in-staviravn--0ff7bc23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53217%3A%20Missing%20Authorization%20in%20staviravn%20AIO%20WP%20Builder&amp;severity=high&amp;id=6998c9e8be58cf853bab82d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52744-improper-control-of-generation-of-c-a7a31bdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52744%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Inpersttion%20For%20Theme&amp;severity=high&amp;id=6998c9e8be58cf853bab82d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56208-improper-neutralization-of-input-du-1b25fa8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20desertthemes%20NewsMash&amp;severity=medium&amp;id=6998c9e8be58cf853bab82d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54222-missing-authorization-in-seraphinit-70be42d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54222%3A%20Missing%20Authorization%20in%20Seraphinite%20Solutions%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=6998c9e8be58cf853bab82ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52387-improper-neutralization-of-input-du-a433f62f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6998c9e8be58cf853bab82cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51915-improper-neutralization-of-input-du-bfa7ecbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51915%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6998c9e7be58cf853bab82be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50555-improper-neutralization-of-input-du-894cf101</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=6998c9e7be58cf853bab82bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50452-improper-neutralization-of-input-du-ad138d1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43228-missing-authorization-in-secupress--cc2fda00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43228%3A%20Missing%20Authorization%20in%20SecuPress%20SecuPress%20Free&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34438-missing-authorization-in-anssi-lait-aeee1e22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34438%3A%20Missing%20Authorization%20in%20Anssi%20Laitila%20Shared%20Files&amp;severity=medium&amp;id=6998c9e7be58cf853bab82b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22885-cwe-125-in-enocean-edge-inc-smartse-f22a8efc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22885%3A%20CWE-125%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=low&amp;id=6998c0ac2c4d84f260ce40ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20761-cwe-77-in-enocean-edge-inc-smartser-9757ab30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20761%3A%20CWE-77%20in%20EnOcean%20Edge%20Inc%20SmartServer%20IoT&amp;severity=high&amp;id=6998c42f2c4d84f260d0409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2847-os-command-injection-in-utt-hiper-52-018dc81b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2847%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab939f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2846-os-command-injection-in-utt-hiper-52-0e4310ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2846%3A%20OS%20Command%20Injection%20in%20UTT%20HiPER%20520&amp;severity=high&amp;id=6998ca03be58cf853bab9399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ransomware-shuts-us-clinics-ics-vuln-e4a097e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Ransomware%20Shuts%20US%20Clinics%2C%20ICS%20Vulnerability%20Surge%2C%20European%20Parliament%20Bans%20AI&amp;severity=medium&amp;id=6998812d2c4d84f260a7f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52603-cwe-213-exposure-of-sensitive-infor-70398438</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52603%3A%20CWE-213%20%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Schemas%20in%20HCLSoftware%20Connections&amp;severity=low&amp;id=6998c9e1be58cf853bab6aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mimicrat-clickfix-campaign-delivers-custom-rat-via-6562c0b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MIMICRAT%3A%20ClickFix%20Campaign%20Delivers%20Custom%20RAT%20via%20Compromised%20Legitimate%20Websites&amp;severity=medium&amp;id=6998d62bbe58cf853bbef474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14055-cwe-191-integer-underflow-wrap-or-w-90759bce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14055%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=69987a5a2c4d84f260a3d5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21627-cwe-284-improper-access-control-in--2cdc7bab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21627%3A%20CWE-284%20Improper%20Access%20Control%20in%20tassos.gr%20Novarain%2FTassos%20Framework%20(plg_system_nrframework)&amp;severity=critical&amp;id=69986fcd2c4d84f2609bdee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14547-cwe-191-integer-underflow-wrap-or-w-929387be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14547%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=69986fcd2c4d84f2609bdedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-exploited-in-ransomware--5bc2f812</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=699856fd2c4d84f26027f687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10970-cwe-89-improper-neutralization-of-s-93695009</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10970%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kolay%20Software%20Inc.%20Talentics&amp;severity=critical&amp;id=699849242c4d84f260e0c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2486-cwe-79-improper-neutralization-of-in-1483f93c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20For%20Elementor%20%E2%80%93%20White%20Label%2C%20Free%20Widgets%2C%20Hover%20Effects%2C%20Conditions%2C%20%26%20Animations&amp;severity=medium&amp;id=699849242c4d84f260e0c476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-20-million-losses-caused-by-700-atm-jackpottin-96c1ed05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20%2420%20Million%20Losses%20Caused%20by%20700%20ATM%20Jackpotting%20Attacks%20in%202025&amp;severity=medium&amp;id=699841e52c4d84f260dc08ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21620-cwe-23-relative-path-traversal-in-e-c649a935</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21620%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Erlang%20OTP&amp;severity=low&amp;id=699842282c4d84f260dc3158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chip-testing-giant-advantest-hit-by-ransomware-94fb5275</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chip%20Testing%20Giant%20Advantest%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=69982ccd2c4d84f260d68ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26050-uncontrolled-search-path-element-in-8a10be9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26050%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Ricoh%20Company%2C%20Ltd.%20%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%2F%E5%88%86%E6%9E%90%E3%82%BD%E3%83%95%E3%83%88%E3%82%A6%E3%82%A7%E3%82%A2%20RICOH%E3%82%B8%E3%83%A7%E3%83%96%E3%83%AD%E3%82%B0%E9%9B%86%E8%A8%88%E3%83%84%E3%83%BC%E3%83%AB&amp;severity=high&amp;id=69981b6d2c4d84f260ba1514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59819-vulnerability-in-zenitel-alphacomxe-52bf65ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59819%3A%20Vulnerability%20in%20zenitel%20alphacom_xe_audio_server&amp;severity=medium&amp;id=699817e92c4d84f260b3b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26370-cross-site-scripting-xss-in-ays-pro-56c43348</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26370%3A%20Cross-site%20scripting%20(XSS)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=699814672c4d84f260b0ab28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/promptspy-android-malware-abuses-gemini-ai-at-runt-c11b47db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PromptSpy%20Android%20Malware%20Abuses%20Gemini%20AI%20at%20Runtime%20for%20Persistence&amp;severity=medium&amp;id=69980a3dd7880ec89b828a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2825-cross-site-scripting-in-rachelos-wer-0b8688e2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2825%3A%20Cross%20Site%20Scripting%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=6997ffe5d7880ec89b7f6308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2824-command-injection-in-comfast-cf-e7-9473cc19</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2824%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997f559d7880ec89b7a587f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2823-command-injection-in-comfast-cf-e7-d06bcd96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2823%3A%20Command%20Injection%20in%20Comfast%20CF-E7&amp;severity=medium&amp;id=6997ee52d7880ec89b7878ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2739-infinite-loop-in-bnjs-275193c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2739%3A%20Infinite%20loop%20in%20bn.js&amp;severity=medium&amp;id=6997ee52d7880ec89b7878a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2822-sql-injection-in-jeecgboot-80678eca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2822%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=6997e749d7880ec89b76b0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26996-cwe-1333-inefficient-regular-expres-e16ebdd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26996%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20minimatch&amp;severity=high&amp;id=6997d231d7880ec89b52f4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26994-cwe-693-protection-mechanism-failur-b9c23838</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26994%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20refraction-networking%20utls&amp;severity=medium&amp;id=6997d231d7880ec89b52f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27017-cwe-1240-use-of-a-cryptographic-pri-4912fee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27017%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20refraction-networking%20utls&amp;severity=low&amp;id=6997d231d7880ec89b52f4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26993-cwe-79-improper-neutralization-of-i-e0932b1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26993%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FlintSH%20Flare&amp;severity=medium&amp;id=6997d231d7880ec89b52f4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2821-sql-injection-in-fujian-smart-integr-beb955f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2821%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2384-cwe-79-improper-neutralization-of-in-9ab065e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=6997d231d7880ec89b52f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2820-sql-injection-in-fujian-smart-integr-6e17dc32</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2820%3A%20SQL%20Injection%20in%20Fujian%20Smart%20Integrated%20Management%20Platform%20System&amp;severity=medium&amp;id=6997c421d7880ec89b4b332d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26065-cwe-22-improper-limitation-of-a-pat-53326093</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26065%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26064-cwe-22-improper-limitation-of-a-pat-71d04e0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26064%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=6997c421d7880ec89b4b3320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2819-missing-authorization-in-dromara-ruo-8f2bcf3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2819%3A%20Missing%20Authorization%20in%20Dromara%20RuoYi-Vue-Plus&amp;severity=medium&amp;id=6997c421d7880ec89b4b3328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26960-cwe-22-improper-limitation-of-a-pat-f4c7978c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26960%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=6997b995d7880ec89b49375c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26980-cwe-89-improper-neutralization-of-s-8eb7ae8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26980%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=critical&amp;id=6997b995d7880ec89b493764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26977-cwe-862-missing-authorization-in-fr-ffbb104f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26977%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frappe%20lms&amp;severity=medium&amp;id=6997b995d7880ec89b493761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26975-cwe-73-external-control-of-file-nam-f0001b29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26975%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20music-assistant%20server&amp;severity=high&amp;id=6997b28bd7880ec89b4763b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26974-cwe-829-inclusion-of-functionality--308fd3d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26974%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Tygo-van-den-Hurk%20Slyde&amp;severity=high&amp;id=6997b28bd7880ec89b4763ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30416-cwe-862-in-acronis-acronis-cyber-pr-18eb4836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30416%3A%20CWE-862%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30410-cwe-306-in-acronis-acronis-cyber-pr-860d526f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30410%3A%20CWE-306%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=critical&amp;id=6997b28bd7880ec89b47639b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30412-cwe-1390-in-acronis-acronis-cyber-p-987c0858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30412%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b4763a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30411-cwe-1390-in-acronis-acronis-cyber-p-fb33b5b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30411%3A%20CWE-1390%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=critical&amp;id=6997b28bd7880ec89b47639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26967-cwe-122-heap-based-buffer-overflow--08daf09a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26967%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6997b28bd7880ec89b4763a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-20-83513d60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-20&amp;severity=medium&amp;id=6998f951be58cf853be4de6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67438-na-a723b11f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67438%3A%20n%2Fa&amp;severity=medium&amp;id=6998ca03be58cf853bab9395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70831-na-fa79fcf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70831%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9ffbe58cf853bab91d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26722-na-4b78286c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26722%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab82a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26721-na-eb123149</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26721%3A%20n%2Fa&amp;severity=high&amp;id=6998c9e7be58cf853bab829d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70833-na-f5cb3103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70833%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e7be58cf853bab829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26745-na-81cf31d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26745%3A%20n%2Fa&amp;severity=medium&amp;id=6998c9e6be58cf853bab77eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26747-na-b48669ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26747%3A%20n%2Fa&amp;severity=critical&amp;id=6998c9e6be58cf853bab77d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26746-na-0aa41fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26746%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26725-na-693f5a50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26725%3A%20n%2Fa&amp;severity=critical&amp;id=69988bee2c4d84f260ae23db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26724-na-c05ea1f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26724%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26723-na-edc024f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26723%3A%20n%2Fa&amp;severity=high&amp;id=69988bee2c4d84f260ae23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-20-dbe5a726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-20&amp;severity=medium&amp;id=699848ea2c4d84f260df6052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-20-483261dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-20&amp;severity=low&amp;id=6997bce2d7880ec89b49f57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26964-cwe-200-exposure-of-sensitive-infor-8aa0004f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26964%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20windmill-labs%20windmill&amp;severity=low&amp;id=6997a804d7880ec89b3e50e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26957-cwe-209-generation-of-error-message-7d2335a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26957%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20abhinavxd%20github.com%2Fabhinavxd%2Flibredesk&amp;severity=medium&amp;id=6997a0f9d7880ec89b3c537a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26959-cwe-829-inclusion-of-functionality--f5a9dc71</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26959%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=69979d74d7880ec89b3b86a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2350-insertion-of-sensitive-information-i-31b4d7ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2350%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Interact&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1292-insertion-of-sensitive-information-i-909b0d7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1292%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Trends&amp;severity=medium&amp;id=699799f2d7880ec89b3a60be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2605-insertion-of-sensitive-information-i-48b70d08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2605%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=699799f2d7880ec89b3a60ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2408-use-after-free-in-tanium-cloud-workl-a7d99991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2408%3A%20Use%20After%20Free%20in%20Tanium%20Cloud%20Workloads&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2435-improper-neutralization-of-special-e-0dedcf2a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2435%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=699799f2d7880ec89b3a60c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26958-cwe-665-improper-initialization-in--5a8d8b28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26958%3A%20CWE-665%3A%20Improper%20Initialization%20in%20FiloSottile%20filippo.io%2Fedwards25519&amp;severity=low&amp;id=699799f2d7880ec89b3a60d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26953-cwe-20-improper-input-validation-in-8d5e6ff8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26953%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=699799f2d7880ec89b3a60cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26952-cwe-20-improper-input-validation-in-df9bf6c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26952%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pi-hole%20web&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1658-cwe-451-user-interface-ui-misreprese-a1f01e7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1658%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=medium&amp;id=6997966bd7880ec89b39b1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9208-cwe-79-improper-neutralization-of-in-929ee02c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13671-cwe-352-cross-site-request-forgery--32f486e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13671%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=medium&amp;id=6997966bd7880ec89b39b1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13672-cwe-79-improper-neutralization-of-i-90740624</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20Web%20Site%20Management%20Server&amp;severity=high&amp;id=6997966bd7880ec89b39b1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24122-cwe-295-improper-certificate-valida-6ee03aa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24122%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20cosign&amp;severity=low&amp;id=69978f65d7880ec89b384555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8054-cwe-22-improper-limitation-of-a-path-4a1532b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8054%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=high&amp;id=69978f65d7880ec89b38454f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8055-cwe-918-server-side-request-forgery--f0ad7d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8055%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20OpenText%E2%84%A2%20XM%20Fax&amp;severity=medium&amp;id=69978f65d7880ec89b384552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21535-cwe-284-improper-access-control-in--009ed0d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21535%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Teams&amp;severity=high&amp;id=699812ae2c4d84f260aeb027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26275-cwe-354-improper-validation-of-inte-950dde7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26275%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20junkurihara%20httpsig-rs&amp;severity=high&amp;id=699784dbd7880ec89b358466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26315-cwe-203-observable-discrepancy-in-e-62cd0e05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26315%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69978157d7880ec89b34978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26314-cwe-20-improper-input-validation-in-4cb96009</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26314%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=69978157d7880ec89b349786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26313-cwe-770-allocation-of-resources-wit-4e11e521</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26313%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26312-cwe-770-allocation-of-resources-wit-7acc7255</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26312%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stalwartlabs%20stalwart&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27114-cwe-835-loop-with-unreachable-exit--1b68482c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27114%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=69977dd1d7880ec89b33bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27014-cwe-674-uncontrolled-recursion-in-m-f769ac9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27014%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27476-improper-neutralization-of-special--c7ddf948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27476%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bixat%20RustFly&amp;severity=critical&amp;id=699812af2c4d84f260aeb05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26282-cwe-126-buffer-over-read-in-m2team--9d414d04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26282%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20M2Team%20NanaZip&amp;severity=medium&amp;id=699812af2c4d84f260aeb044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27440-improper-neutralization-of-input-du-8b27954b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=699812af2c4d84f260aeb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27387-missing-authorization-in-designinve-9c9522c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27387%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=699812af2c4d84f260aeb057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27368-missing-authorization-in-seedprod-c-d0069c9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27368%3A%20Missing%20Authorization%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=medium&amp;id=699812af2c4d84f260aeb054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27360-improper-neutralization-of-input-du-2e9761ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=699812af2c4d84f260aeb051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27343-improper-control-of-filename-for-in-8ee1e181</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27343%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Airtifact&amp;severity=high&amp;id=699812af2c4d84f260aeb04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27328-missing-authorization-in-devsblink--83eee8d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27328%3A%20Missing%20Authorization%20in%20DevsBlink%20EduBlink&amp;severity=medium&amp;id=699784dbd7880ec89b35847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27327-missing-authorization-in-yaycommerc-2d0152ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27327%3A%20Missing%20Authorization%20in%20YayCommerce%20YayMail&amp;severity=medium&amp;id=699812af2c4d84f260aeb04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-threats-using-genai-usher-in-a-new-era-6e840891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20threats%20using%20GenAI%20usher%20in%20a%20new%20era&amp;severity=medium&amp;id=69985e042c4d84f2604e723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2738-cwe-131-incorrect-calculation-of-buf-20bc2c53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2738%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20OpenVPN%20ovpn-dco-win&amp;severity=medium&amp;id=699812b02c4d84f260aeb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26318-cwe-78-improper-neutralization-of-s-7d41b3c1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26318%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-the-hood-of-dynowiper-thu-feb-19th-48c2f7c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20the%20Hood%20of%20DynoWiper%2C%20(Thu%2C%20Feb%2019th)&amp;severity=medium&amp;id=69976885d7880ec89b2d6bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26280-cwe-78-improper-neutralization-of-s-31a2a73c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26280%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=69978157d7880ec89b3497ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26278-cwe-776-improper-restriction-of-rec-355d55b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26278%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=69978157d7880ec89b3497a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27013-cwe-79-improper-neutralization-of-i-2ccb5e6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27013%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fabricjs%20fabric.js&amp;severity=high&amp;id=69978157d7880ec89b3497cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26267-cwe-670-always-incorrect-control-fl-d3fc9f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26267%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20stellar%20rs-soroban-sdk&amp;severity=high&amp;id=69978157d7880ec89b3497a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26205-cwe-863-incorrect-authorization-in--708376a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26205%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20open-policy-agent%20opa-envoy-plugin&amp;severity=high&amp;id=69978157d7880ec89b34979b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26203-cwe-416-use-after-free-in-pjsip-pjm-a4f01553</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjmedia-video&amp;severity=medium&amp;id=69978157d7880ec89b349797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26201-cwe-362-concurrent-execution-using--74d92c70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26201%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=high&amp;id=69978157d7880ec89b349792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26200-cwe-122-heap-based-buffer-overflow--cf8f880a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20HDFGroup%20hdf5&amp;severity=high&amp;id=699784dbd7880ec89b35847c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26189-cwe-78-improper-neutralization-of-s-0d1acbd7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26189%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aquasecurity%20trivy-action&amp;severity=medium&amp;id=699784dbd7880ec89b358477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26063-cwe-20-improper-input-validation-in-f84fe624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26063%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xpertforextradeinc%20CediPay&amp;severity=high&amp;id=699784dbd7880ec89b358474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26059-cwe-79-improper-neutralization-of-i-dec12dc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26059%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=699784dbd7880ec89b358471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26057-cwe-668-exposure-of-resource-to-wro-3cb17f96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26057%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20cisco-ai-defense%20skill-scanner&amp;severity=medium&amp;id=699784dbd7880ec89b35846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23621-cwe-203-observable-discrepancy-in-g-89bef3ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23621%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23620-cwe-203-observable-discrepancy-in-g-00e9e3a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23620%3A%20CWE-203%20Observable%20Discrepancy%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23619-cwe-79-improper-neutralization-of-i-0ba70a1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23618-cwe-79-improper-neutralization-of-i-0f203b95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23617-cwe-79-improper-neutralization-of-i-1f682953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23616-cwe-79-improper-neutralization-of-i-c76edad5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23615-cwe-79-improper-neutralization-of-i-836d7073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23614-cwe-79-improper-neutralization-of-i-3647667c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23613-cwe-79-improper-neutralization-of-i-4d93243b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23612-cwe-79-improper-neutralization-of-i-6a6d684d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23611-cwe-79-improper-neutralization-of-i-7afa1f4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23610-cwe-79-improper-neutralization-of-i-baa9798b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23609-cwe-79-improper-neutralization-of-i-1ae29dc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23608-cwe-79-improper-neutralization-of-i-4186b949</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23607-cwe-79-improper-neutralization-of-i-d3ef599a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23606-cwe-79-improper-neutralization-of-i-ab3a8c9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23606%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2409-cwe-89-improper-neutralization-of-sp-62e3fd17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Cloud%20Suite&amp;severity=critical&amp;id=69975aafd7880ec89b287cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23605-cwe-79-improper-neutralization-of-i-7eeab11c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23604-cwe-79-improper-neutralization-of-i-883f38b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GFI%20Software%20MailEssentials%20AI&amp;severity=medium&amp;id=69975aafd7880ec89b287c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2243-out-of-bounds-read-in-red-hat-red-ha-6a33bed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2243%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=69975aafd7880ec89b287cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2817-cwe-538-insertion-of-sensitive-infor-f124ebf9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2817%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20VMware%20Spring%20Data%20Geode&amp;severity=medium&amp;id=69975ab1d7880ec89b287d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26339-cwe-918-server-side-request-forgery-f1de4ab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26339%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=critical&amp;id=699747f4532dc41ff8925d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26338-cwe-918-server-side-request-forgery-b8fbc0b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26338%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=medium&amp;id=699747f4532dc41ff8925d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26337-cwe-36-absolute-path-traversal-in-h-328c4a75</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26337%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Hyland%20Alfresco%20Transformation%20Service%20(Enterprise)&amp;severity=high&amp;id=699747f4532dc41ff8925d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2232-cwe-89-improper-neutralization-of-sp-42d3fb6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2232%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wcproducttable%20Product%20Table%20and%20List%20Builder%20for%20WooCommerce%20Lite&amp;severity=high&amp;id=699740bf3af16a0ef60c5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1581-cwe-89-improper-neutralization-of-sp-1b58bb62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1581%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=699740bf3af16a0ef60c544c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26030-cwe-94-improper-control-of-generati-8c490551</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26030%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69973b6be884a8a4cb409743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26336-cwe-863-incorrect-authorization-in--91415450</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26336%3A%20CWE-863%20Incorrect%20Authorization%20in%20Hyland%20Alfresco%20Enterprise&amp;severity=high&amp;id=69973b6be884a8a4cb409748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26016-cwe-639-authorization-bypass-throug-e8901bb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26016%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pterodactyl%20panel&amp;severity=critical&amp;id=69973b6be884a8a4cb40973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25998-cwe-323-reusing-a-nonce-key-pair-in-650a41e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25998%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20strongswan%20strongMan&amp;severity=high&amp;id=69973b6be884a8a4cb40973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25766-cwe-22-improper-limitation-of-a-pat-bf9abee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25766%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labstack%20echo&amp;severity=medium&amp;id=69973b6be884a8a4cb40974c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25940-cwe-116-improper-encoding-or-escapi-3b5e393d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25940%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69973033732724e9dc4fe1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banners-bots-and-butchers-the-ai-driven-long-con-i-201d23f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banners%2C%20Bots%20and%20Butchers%3A%20The%20AI-Driven%20Long%20Con%20in%20Asia&amp;severity=medium&amp;id=69974c64d7880ec89b0185a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-used-to-hide-fake-investment-platform-schemes-6f0a62ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Used%20to%20Hide%20Fake%20Investment%20Platform%20Schemes&amp;severity=medium&amp;id=69974fe8d7880ec89b065c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-cryptocurrency-scam-domains-a-3f601d65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20Cryptocurrency%20Scam%20Domains%20and%20Hacked%20YouTube%20Channels&amp;severity=medium&amp;id=69974fe8d7880ec89b065c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-in-action-how-fake-captcha-can-encrypt-an-cb7d2d98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20in%20action%3A%20how%20fake%20captcha%20can%20encrypt%20an%20entire%20company&amp;severity=medium&amp;id=69974fe8d7880ec89b065be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-homebrew-pages-deliver-cuckoo-stealer-via-cli-06fd4ca1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Homebrew%20Pages%20Deliver%20Cuckoo%20Stealer%20via%20ClickFix%20%7C%20macOS%20Threat%20Hunting%20Analysis&amp;severity=medium&amp;id=69974fe8d7880ec89b065bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-curious-case-of-the-triton-malware-fork-7ad7ab52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Curious%20Case%20of%20the%20Triton%20Malware%20Fork&amp;severity=medium&amp;id=69974fe8d7880ec89b065bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invitation-to-trouble-the-rise-of-calendar-phishin-a8d550c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invitation%20to%20Trouble%3A%20The%20Rise%20of%20Calendar%20Phishing%20Attacks&amp;severity=medium&amp;id=69974fe8d7880ec89b065bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2274-cwe-918-server-side-request-forgery--9b739968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2274%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20AppSheet%20AppSheet%20Web%20(Main%20Server)&amp;severity=high&amp;id=69973033732724e9dc4fe1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-government-says-12-million-bank-accounts-ex-c8159355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Government%20Says%201.2%20Million%20Bank%20Accounts%20Exposed%20in%20Breach&amp;severity=medium&amp;id=699727c07e7f1adb9b09d85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71250-37952455</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71250&amp;severity=null&amp;id=699812b02c4d84f260aeb08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71249-9c5c2bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71249&amp;severity=null&amp;id=699812b02c4d84f260aeb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71248-06ef444d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71248&amp;severity=null&amp;id=699812b02c4d84f260aeb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71247-6402c740</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71247&amp;severity=null&amp;id=699812b02c4d84f260aeb088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71246-69173469</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71246&amp;severity=null&amp;id=69973033732724e9dc4fe1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71245-8ab54884</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71245&amp;severity=null&amp;id=69973033732724e9dc4fe1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71243-improper-control-of-generation-of-c-2638c8dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71243%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SPIP%20Saisies%20pour%20formulaire&amp;severity=critical&amp;id=69972933732724e9dc4156ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25755-cwe-94-improper-control-of-generati-50f78405</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25755%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f5215391843713250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25535-cwe-400-uncontrolled-resource-consu-f7e35d0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25535%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20parallax%20jsPDF&amp;severity=high&amp;id=6997264f521539184371324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25527-cwe-22-improper-limitation-of-a-pat-fbd70c8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25527%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=medium&amp;id=6997227c0018ac3e97d29273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2744-a-blind-time-based-sql-injection-exi-c9474617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2744&amp;severity=null&amp;id=699718e0b557332a80facb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-1-million-user-records-compromised-in-figur-3dddb4f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%201%20Million%20User%20Records%20Compromised%20in%20Figure%20Data%20Breach&amp;severity=medium&amp;id=69970e21b557332a80f47921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-exploitation-surges-as-zero-day-attacks-tra-6b929eb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Exploitation%20Surges%20as%20Zero-Day%20Attacks%20Traced%20Back%20to%20July%202025&amp;severity=medium&amp;id=6996fcc88fb9188dea8dc9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9953-cwe-566-authorization-bypass-through-d2732060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9953%3A%20CWE-566%20Authorization%20Bypass%20Through%20User-Controlled%20SQL%20Primary%20Key%20in%20DATABASE%20Software%20Training%20Consulting%20Ltd.%20Databank%20Accreditation%20Software&amp;severity=critical&amp;id=6996fd118fb9188dea8e12c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-exposure-to-exploitation-how-ai-collapses-you-4f26d7b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Exposure%20to%20Exploitation%3A%20How%20AI%20Collapses%20Your%20Response%20Window&amp;severity=low&amp;id=6996fcb68fb9188dea8dba1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8350-cwe-698-execution-after-redirect-ear-309eb7b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8350%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Inrove%20Software%20and%20Internet%20Services%20BiEticaret%20CMS&amp;severity=critical&amp;id=6996f9728fb9188dea8891b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-targets-a-variety-of-data-offers-a-3dad42b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%20targets%20a%20variety%20of%20data%2C%20offers%20a%20MaaS%20referral%20program&amp;severity=medium&amp;id=69970717b557332a80d468e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dont-trustconnect-its-a-rat-in-an-rmm-hat-b510e7bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(Don&apos;t)%20TrustConnect%3A%20It&apos;s%20a%20RAT%20in%20an%20RMM%20hat&amp;severity=medium&amp;id=69970717b557332a80d468cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-malicious-oauth-campaigns-in-entra-id-98390171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Malicious%20OAuth%20Campaigns%20in%20Entra%20ID&amp;severity=medium&amp;id=69970717b557332a80d4689b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-iptv-app-terminates-your-savings-9a8666f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20your%20IPTV%20app%20terminates%20your%20savings&amp;severity=medium&amp;id=69970717b557332a80d468c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15563-cwe-862-missing-authorization-in-ne-95441c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15563%3A%20CWE-862%20Missing%20Authorization%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-security-issues-continue-as-secureclaw-op-ca5db0ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Security%20Issues%20Continue%20as%20SecureClaw%20Open%20Source%20Tool%20Debuts&amp;severity=medium&amp;id=6996ef9e6aea4a407a546318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9062-cwe-639-authorization-bypass-through-3859c6ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9062%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MeCODE%20Informatics%20and%20Engineering%20Services%20Ltd.%20Envanty&amp;severity=high&amp;id=6996efe46aea4a407a546d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15562-cwe-79-improper-neutralization-of-i-8a71ee5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=medium&amp;id=6996efe46aea4a407a546d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15561-cwe-269-improper-privilege-manageme-7dcf7ca4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15561%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15560-cwe-89-improper-neutralization-of-s-f69ba2aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15560%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=high&amp;id=6996efe46aea4a407a546d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15559-cwe-78-improper-neutralization-of-s-b731eacc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15559%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NesterSoft%20Inc.%20WorkTime%20(on-prem%2Fcloud)&amp;severity=critical&amp;id=6996efe46aea4a407a546d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13590-vulnerability-in-wso2-wso2-api-mana-b8162e66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13590%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=6996e1c36aea4a407a50ab8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12107-cwe-1336-improper-neutralization-of-29bfd138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12107%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=high&amp;id=6996e1c36aea4a407a50ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1219-cwe-639-authorization-bypass-through-443dcd1e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1219%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2718-cwe-79-improper-neutralization-of-in-6113053f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2718%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2716-cwe-79-improper-neutralization-of-in-872e7bb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1461-cwe-230-improper-handling-of-missing-fe7cd9e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1461%3A%20CWE-230%20Improper%20Handling%20of%20Missing%20Values%20in%20wpinsider-1%20Simple%20Membership&amp;severity=medium&amp;id=6996de3e6aea4a407a4fb0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22267-cwe-266-incorrect-privilege-assignm-254d0ded</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22267%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=6996fb458fb9188dea8c0109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-rail-giant-deutsche-bahn-hit-by-large-scale-ea70538e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Rail%20Giant%20Deutsche%20Bahn%20Hit%20by%20Large-Scale%20DDoS%20Attack&amp;severity=medium&amp;id=6996d7026aea4a407a4de64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22268-cwe-266-incorrect-privilege-assignm-7bfe1e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22268%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c010c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22266-cwe-146-improper-neutralization-of--6efabe7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22266%3A%20CWE-146%3A%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996fb458fb9188dea8c0105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22269-cwe-940-improper-verification-of-so-b7ee7e18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22269%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41023-cwe-287-improper-authentication-in--2613c504</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41023%3A%20CWE-287%20Improper%20Authentication%20in%20Thesamur%20AutoGPT&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26358-cwe-862-missing-authorization-in-de-3cb4a373</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26358%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d42f6aea4a407a4d2c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40697-cwe-79-improper-neutralization-of-i-be69e57f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lewe%20WebMeasure&amp;severity=medium&amp;id=6996d42f6aea4a407a4d2c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26360-cwe-73-external-control-of-file-nam-58de98ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26360%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2736-cwe-79-improper-neutralization-of-in-36538f08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-via-google-tasks-kaspersky-official-blog-67986fba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20via%20Google%20Tasks%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6996cce46aea4a407a4aeea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2735-cwe-79-improper-neutralization-of-in-2caebd8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Alkacon%20OpenCms&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26359-cwe-73-external-control-of-file-nam-3c2b5529</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26359%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996d0406aea4a407a4bdbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27094-improper-neutralization-of-input-du-3a6ce8ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoDaddy%20CoBlocks&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27092-missing-authorization-in-greg-winia-42c235cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27092%3A%20Missing%20Authorization%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27090-cross-site-request-forgery-csrf-in--21629815</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27090%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Moose%20Kenta%20Companion&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27074-improper-neutralization-of-input-du-ec830fd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vaakash%20Shortcoder&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27069-improper-neutralization-of-input-du-d5ac6a7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Soledad&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27066-missing-authorization-in-pi-web-sol-a04d8bc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27066%3A%20Missing%20Authorization%20in%20PI%20Web%20Solution%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27059-improper-neutralization-of-input-du-800fcc52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Recipe&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27058-improper-neutralization-of-input-du-3546c209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Podcast&amp;severity=medium&amp;id=6996d0416aea4a407a4bdc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27057-improper-neutralization-of-input-du-558cfaf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Filter%20Everything&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27055-missing-authorization-in-pencidesig-c4c69316</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27055%3A%20Missing%20Authorization%20in%20PenciDesign%20Penci%20AI%20SmartContent%20Creator&amp;severity=medium&amp;id=6996d0406aea4a407a4bdc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27052-improper-control-of-filename-for-in-edeeece4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20villatheme%20Sales%20Countdown%20Timer%20for%20WooCommerce%20and%20WordPress&amp;severity=high&amp;id=6996d0406aea4a407a4bdc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27050-cross-site-request-forgery-csrf-in--8fabd6ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27050%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20RealPress&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27042-missing-authorization-in-wpdevelope-0b951907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27042%3A%20Missing%20Authorization%20in%20WPDeveloper%20NotificationX&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25473-missing-authorization-in-aa-team-wz-2422b9e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25473%3A%20Missing%20Authorization%20in%20AA-Team%20WZone&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25472-improper-neutralization-of-input-du-bcf2c1a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25463-improper-neutralization-of-input-du-be7e3ad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WpEstate%20Wpresidence%20Core&amp;severity=medium&amp;id=6996d0406aea4a407a4bdbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25459-missing-authorization-in-uixthemes--73feec42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25459%3A%20Missing%20Authorization%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25453-improper-neutralization-of-input-du-b9e30016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25451-improper-neutralization-of-input-du-15b76c39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25432-improper-neutralization-of-input-du-72dd3094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25428-server-side-request-forgery-ssrf-in-7cc51cd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25428%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20totalsoft%20TS%20Poll&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25423-missing-authorization-in-creativein-e1c95667</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25423%3A%20Missing%20Authorization%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=low&amp;id=6996d03e6aea4a407a4bdbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25422-cross-site-request-forgery-csrf-in--259d5f65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25422%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themes4WP%20Popularis%20Extra&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25419-missing-authorization-in-flycart-up-adad61a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25419%3A%20Missing%20Authorization%20in%20flycart%20UpsellWP&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25418-improper-neutralization-of-special--7990e464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25418%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=high&amp;id=6996d03e6aea4a407a4bdbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25416-missing-authorization-in-blazetheme-79a5f340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25416%3A%20Missing%20Authorization%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=6996d03e6aea4a407a4bdba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25415-missing-authorization-in-iqonicdesi-646705f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25415%3A%20Missing%20Authorization%20in%20iqonicdesign%20WPBookit%20Pro&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25412-missing-authorization-in-mdempfle-a-ec684b57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25412&amp;severity=null&amp;id=6996d03d6aea4a407a4bdb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25411-cross-site-request-forgery-csrf-in--180d3fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25411%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themastercut%20Revision%20Manager%20TMC&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25410-missing-authorization-in-tstephenso-4b7b85ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25410%3A%20Missing%20Authorization%20in%20tstephenson%20WP-CORS&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25409-missing-authorization-in-crgeary-ja-dfc92e7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25409%3A%20Missing%20Authorization%20in%20crgeary%20JAMstack%20Deployments&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25408-missing-authorization-in-pluginrx-b-dba145e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25408%3A%20Missing%20Authorization%20in%20PluginRx%20Broken%20Link%20Notifier&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25404-missing-authorization-in-automattic-4e8ade6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25404%3A%20Missing%20Authorization%20in%20Automattic%20WP%20Job%20Manager&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25402-missing-authorization-in-echoplugin-d048715d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25402%3A%20Missing%20Authorization%20in%20echoplugins%20Knowledge%20Base%20for%20Documentation%2C%20FAQs%20with%20AI%20Assistance&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25399-missing-authorization-in-cryoutcrea-06781103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25399%3A%20Missing%20Authorization%20in%20CryoutCreations%20Serious%20Slider&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25395-missing-authorization-in-ikreatethe-1b5ad1e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25395%3A%20Missing%20Authorization%20in%20ikreatethemes%20Business%20Roy&amp;severity=medium&amp;id=6996d03d6aea4a407a4bdb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25394-missing-authorization-in-sparklewpt-6fa71379</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25394%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Fitness%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25393-missing-authorization-in-sparklewpt-e54b2b2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25393%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Hello%20FSE&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25392-url-redirection-to-untrusted-site-o-073f2a0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25392%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20KaizenCoders%20Update%20URLs%20%26%238211%3B%20Quick%20and%20Easy%20way%20to%20search%20old%20links%20and%20replace%20them%20with%20new%20links%20in%20WordPress&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25391-missing-authorization-in-wp-grids-w-7ee36a35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25391%3A%20Missing%20Authorization%20in%20WP%20Grids%20WP%20Wand&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25389-exposure-of-sensitive-system-inform-28856952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25389%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25388-missing-authorization-in-scripteo-a-1c6db8df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25388%3A%20Missing%20Authorization%20in%20scripteo%20Ads%20Pro&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25387-missing-authorization-in-elementor--19a8b174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25387%3A%20Missing%20Authorization%20in%20Elementor%20Image%20Optimizer%20by%20Elementor&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25386-missing-authorization-in-elementor--08435fd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25386%3A%20Missing%20Authorization%20in%20Elementor%20Ally&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25385-server-side-request-forgery-ssrf-in-61b3efa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25385%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KaizenCoders%20URL%20Shortify&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25384-missing-authorization-in-wp-lab-wp--d641c9ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25384%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=6996d03c6aea4a407a4bdb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25378-improper-neutralization-of-special--1061033a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=high&amp;id=6996d03b6aea4a407a4bdb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25375-missing-authorization-in-wp-chill-i-b047d8e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25375%3A%20Missing%20Authorization%20in%20WP%20Chill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25374-missing-authorization-in-raratheme--ff689366</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25374%3A%20Missing%20Authorization%20in%20raratheme%20Spa%20and%20Salon&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25372-missing-authorization-in-kodezen-ll-d79d483e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25372%3A%20Missing%20Authorization%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25370-missing-authorization-in-aresit-wp--e21e150e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25370%3A%20Missing%20Authorization%20in%20AresIT%20WP%20Compress&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25368-missing-authorization-in-codepeople-22306e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25368%3A%20Missing%20Authorization%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25367-missing-authorization-in-nootheme-c-d914e208</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25367%3A%20Missing%20Authorization%20in%20NooTheme%20CitiLights&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25364-missing-authorization-in-boldgrid-c-f7a39e1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25364%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25363-missing-authorization-in-fooplugins-d6a0900a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25363%3A%20Missing%20Authorization%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25362-improper-neutralization-of-input-du-64f8da8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FooPlugins%20FooGallery&amp;severity=medium&amp;id=6996d03b6aea4a407a4bdb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25348-missing-authorization-in-alttextai--401d8de9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25348%3A%20Missing%20Authorization%20in%20alttextai%20Download%20Alt%20Text%20AI&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25343-improper-neutralization-of-input-du-ac41061b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25338-missing-authorization-in-ays-pro-ai-66c38245</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25338%3A%20Missing%20Authorization%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25337-cross-site-request-forgery-csrf-in--8313170b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25337%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25336-missing-authorization-in-wpcoachify-998f5918</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25336%3A%20Missing%20Authorization%20in%20wpcoachify%20Coachify&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25335-missing-authorization-in-ays-pro-se-2ea44f1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25335%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25333-missing-authorization-in-peregrinet-3c853645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25333%3A%20Missing%20Authorization%20in%20peregrinethemes%20Shopwell&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25332-missing-authorization-in-fahad-mahm-6ec6ce9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25332%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Endless%20Posts%20Navigation&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25331-improper-neutralization-of-input-du-aa7a8b7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Melapress%20WP%20Activity%20Log&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25330-missing-authorization-in-publishpre-b3ec89fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25330%3A%20Missing%20Authorization%20in%20PublishPress%20PublishPress%20Authors&amp;severity=medium&amp;id=6996d03a6aea4a407a4bdacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25329-missing-authorization-in-expresstec-12fd90b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25329%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25326-improper-control-of-filename-for-in-65619dcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0396aea4a407a4bdabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25325-exposure-of-sensitive-system-inform-6f27c875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25325%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20rtCamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25324-authorization-bypass-through-user-c-e4d41ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25324%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25323-missing-authorization-in-mika-osm-a88b9dab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25323%3A%20Missing%20Authorization%20in%20MiKa%20OSM&amp;severity=medium&amp;id=6996d0396aea4a407a4bdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25322-cross-site-request-forgery-csrf-in--04f4991e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25322%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PublishPress%20PublishPress%20Revisions&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25321-missing-authorization-in-psm-plugin-d65c99a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25321%3A%20Missing%20Authorization%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25320-missing-authorization-in-cool-plugi-2a32e607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25320%3A%20Missing%20Authorization%20in%20Cool%20Plugins%20Elementor%20Contact%20Form%20DB&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25319-cross-site-request-forgery-csrf-in--3b15fc23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25319%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzita%20Zita%20Elementor%20Site%20Library&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25318-missing-authorization-in-wisernotif-3f7bb303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25318%3A%20Missing%20Authorization%20in%20Wisernotify%20team%20WiserReview%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=6996d0396aea4a407a4bdaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25316-deserialization-of-untrusted-data-i-59087cd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25316%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Brainstorm%20Force%20CartFlows&amp;severity=high&amp;id=6996d0386aea4a407a4bda8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25315-missing-authorization-in-hcaptcha-h-07a34daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25315%3A%20Missing%20Authorization%20in%20hcaptcha%20hCaptcha%20for%20WP&amp;severity=medium&amp;id=6996d0386aea4a407a4bda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25314-missing-authorization-in-wp-messiah-0418239d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25314%3A%20Missing%20Authorization%20in%20WP%20Messiah%20TOP%20Table%20Of%20Contents&amp;severity=medium&amp;id=6996d0386aea4a407a4bda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25313-missing-authorization-in-shahjahan--0f6ad9ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25313%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6996d0386aea4a407a4bda86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25311-missing-authorization-in-10up-autos-33062f6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25311%3A%20Missing%20Authorization%20in%2010up%20Autoshare%20for%20Twitter&amp;severity=medium&amp;id=6996d0386aea4a407a4bda83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25310-server-side-request-forgery-ssrf-in-6d72ac77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25310%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Alobaidi%20Extend%20Link&amp;severity=medium&amp;id=6996d0386aea4a407a4bda80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25308-missing-authorization-in-wpinsider--0b8f7c9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25308%3A%20Missing%20Authorization%20in%20wp.insider%20Simple%20Membership&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25307-improper-neutralization-of-input-du-6dbcd956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=medium&amp;id=6996d0386aea4a407a4bda7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25305-improper-neutralization-of-input-du-f5beaf43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0386aea4a407a4bda77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25008-insertion-of-sensitive-information--0dd2307c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25008%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=medium&amp;id=6996d0386aea4a407a4bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25006-improper-neutralization-of-script-r-5b622005</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25006%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%208theme%20XStore&amp;severity=medium&amp;id=6996d0376aea4a407a4bda51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25005-authorization-bypass-through-user-c-6404975d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25005%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25004-improper-neutralization-of-input-du-60d5840d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Business%20Directory&amp;severity=medium&amp;id=6996d0376aea4a407a4bda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25003-missing-authorization-in-madalinung-0b9b2d3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25003%3A%20Missing%20Authorization%20in%20madalin.ungureanu%20Client%20Portal&amp;severity=medium&amp;id=6996d0376aea4a407a4bda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25000-missing-authorization-in-kraft-plug-cd5f9376</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25000%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Wheel%20of%20Life&amp;severity=medium&amp;id=6996d0376aea4a407a4bda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24392-improper-neutralization-of-input-du-94e77840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nabil%20Lemsieh%20HurryTimer&amp;severity=medium&amp;id=6996d0376aea4a407a4bda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24375-missing-authorization-in-wp-swings--9db90c65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24375%3A%20Missing%20Authorization%20in%20WP%20Swings%20Ultimate%20Gift%20Cards%20For%20WooCommerce&amp;severity=medium&amp;id=6996d0376aea4a407a4bda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23805-improper-neutralization-of-special--a345d836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23805%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yoren%20Chang%20Media%20Search%20Enhanced&amp;severity=high&amp;id=6996d0376aea4a407a4bda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23804-missing-authorization-in-bbr-plugin-8011aa53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23804%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=6996d0376aea4a407a4bda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23803-server-side-request-forgery-ssrf-in-8ac5dfee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23803%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Burhan%20Nasir%20Smart%20Auto%20Upload%20Images&amp;severity=medium&amp;id=6996d0376aea4a407a4bda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23549-deserialization-of-untrusted-data-i-f6de6946</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23549%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23548-missing-authorization-in-designinve-984efe83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23548%3A%20Missing%20Authorization%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23547-missing-authorization-in-cmsmasters-b7a3c615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23547%3A%20Missing%20Authorization%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23545-missing-authorization-in-arubait-de-8215f625</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23545%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23544-deserialization-of-untrusted-data-i-d501051b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23544%3A%20Deserialization%20of%20Untrusted%20Data%20in%20codetipi%20Valenti&amp;severity=high&amp;id=6996d0366aea4a407a4bd9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23543-missing-authorization-in-wpdevelope-5a26a14b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23543%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23542-deserialization-of-untrusted-data-i-3e8b78cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23542%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=critical&amp;id=6996d0366aea4a407a4bd9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23541-missing-authorization-in-wpfunnels--ff68d94b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23541%3A%20Missing%20Authorization%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=6996d0366aea4a407a4bd9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22422-improper-neutralization-of-script-r-4517dc58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22422%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpeverest%20Everest%20Forms&amp;severity=medium&amp;id=6996d0366aea4a407a4bd9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22333-deserialization-of-untrusted-data-i-bb2e8d62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22333%3A%20Deserialization%20of%20Untrusted%20Data%20in%20YITHEMES%20YITH%20WooCommerce%20Compare&amp;severity=high&amp;id=6996d0366aea4a407a4bd9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26362-cwe-23-relative-path-traversal-in-d-60ca4fba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26362%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=6996c9266aea4a407a4971ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27056-missing-authorization-in-stellarwp--ebd4b79e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27056%3A%20Missing%20Authorization%20in%20StellarWP%20iThemes%20Sync&amp;severity=medium&amp;id=6996c9266aea4a407a4971f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26361-cwe-73-external-control-of-file-nam-1088a3e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26361%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=medium&amp;id=6996c9266aea4a407a4971eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2733-improper-authorization-in-red-hat-re-a42563f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2733%3A%20Improper%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6996c21f6aea4a407a46d597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2711-server-side-request-forgery-in-zhuto-56075871</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2711%3A%20Server-Side%20Request%20Forgery%20in%20zhutoutoutousan%20worldquant-miner&amp;severity=medium&amp;id=6996be9a6aea4a407a45caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2681-out-of-bounds-write-2d36b40a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2681%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6996b7926aea4a407a43b2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1994-cwe-269-improper-privilege-managemen-8fe39267</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1994%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=critical&amp;id=6996b7926aea4a407a43b2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2731-cwe-22-improper-limitation-of-a-path-c618341d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2731%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DynamicWeb%20DynamicWeb%209&amp;severity=critical&amp;id=6996b7926aea4a407a43b2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2709-open-redirect-in-busy-b1beee0a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2709%3A%20Open%20Redirect%20in%20busy&amp;severity=medium&amp;id=6996b08a6aea4a407a42042b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2706-sql-injection-in-code-projects-patie-e3cc38fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2706%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6996fb458fb9188dea8c0110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2705-out-of-bounds-read-in-open-babel-27ebd2a8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2705%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0722-cwe-89-improper-neutralization-of-sp-6a47f717</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0722%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13851-cwe-269-improper-privilege-manageme-f596f457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13851%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20scriptsbundle%20Buyent&amp;severity=critical&amp;id=699697f36aea4a407a3be048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1373-cwe-79-improper-neutralization-of-in-539fb955</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1373%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lawsonry%20Easy%20Author%20Image&amp;severity=medium&amp;id=699697f56aea4a407a3be103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2284-cwe-862-missing-authorization-in-web-0ddb2ff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2284%3A%20CWE-862%20Missing%20Authorization%20in%20webangon%20News%20Element%20Elementor%20Blog%20Magazine&amp;severity=medium&amp;id=699697f66aea4a407a3be124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1455-cwe-352-cross-site-request-forgery-c-03feb7a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1455%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20whatsiplus%20Whatsiplus%20Scheduled%20Notification%20for%20Woocommerce&amp;severity=medium&amp;id=699697f66aea4a407a3be115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14445-cwe-79-improper-neutralization-of-i-3ef243b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20levantoan%20Image%20Hotspot%20by%20DevVN&amp;severity=medium&amp;id=699697f46aea4a407a3be08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0926-cwe-98-improper-control-of-filename--2995b72c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0926%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=critical&amp;id=699697f56aea4a407a3be0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14357-cwe-862-missing-authorization-in-mi-278742bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14357%3A%20CWE-862%20Missing%20Authorization%20in%20misbahwp%20Mega%20Store%20Woocommerce&amp;severity=medium&amp;id=699697f46aea4a407a3be082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0561-cwe-79-improper-neutralization-of-in-0930a715</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f56aea4a407a3be0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2504-cwe-862-missing-authorization-in-dea-a89224cb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2504%3A%20CWE-862%20Missing%20Authorization%20in%20dealia%20Dealia%20%E2%80%93%20Request%20a%20quote&amp;severity=medium&amp;id=699697f66aea4a407a3be130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14452-cwe-79-improper-neutralization-of-i-7f77f351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bompus%20WP%20Customer%20Reviews&amp;severity=high&amp;id=699697f46aea4a407a3be090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14983-cwe-79-improper-neutralization-of-i-a51c85ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattkeys%20Advanced%20Custom%20Fields%3A%20Font%20Awesome%20Field&amp;severity=medium&amp;id=699697f46aea4a407a3be0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14167-cwe-352-cross-site-request-forgery--c7484d26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14167%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akshayshah5189%20Remove%20Post%20Type%20Slug&amp;severity=medium&amp;id=699697f36aea4a407a3be05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0974-cwe-862-missing-authorization-in-ord-71118a8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0974%3A%20CWE-862%20Missing%20Authorization%20in%20orderable%20Orderable%20%E2%80%93%20WordPress%20Restaurant%20Online%20Ordering%20System%20and%20Food%20Ordering%20Plugin&amp;severity=high&amp;id=699697f56aea4a407a3be0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14270-cwe-862-missing-authorization-in-wa-38c78435</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14270%3A%20CWE-862%20Missing%20Authorization%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=low&amp;id=699697f36aea4a407a3be063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13563-cwe-269-improper-privilege-manageme-f316666c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13563%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20BuddhaThemes%20Lizza%20LMS%20Pro&amp;severity=critical&amp;id=699697f26aea4a407a3bdfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14851-cwe-79-improper-neutralization-of-i-e9a8e67b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yhunter%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=699697f46aea4a407a3be099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1044-cwe-79-improper-neutralization-of-in-690d4bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20renoiriii%20Tennis%20Court%20Bookings&amp;severity=medium&amp;id=699697f56aea4a407a3be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14427-cwe-862-missing-authorization-in-pa-7cdb0948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14427%3A%20CWE-862%20Missing%20Authorization%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=699697f46aea4a407a3be087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14864-cwe-862-missing-authorization-in-vi-94f7408f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14864%3A%20CWE-862%20Missing%20Authorization%20in%20virusdie%20Virusdie%20%E2%80%93%20One-click%20website%20security&amp;severity=medium&amp;id=699697f46aea4a407a3be09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13091-cwe-15-external-control-of-system-o-14fb2f77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13091%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20wpfable%20Shopire&amp;severity=medium&amp;id=699697f26aea4a407a3bdfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13603-cwe-862-missing-authorization-in-hu-8ad3cb73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13603%3A%20CWE-862%20Missing%20Authorization%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=699697f26aea4a407a3bdfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1043-cwe-79-improper-neutralization-of-in-b68931d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gagan0123%20PostmarkApp%20Email%20Integrator&amp;severity=medium&amp;id=699697f56aea4a407a3be0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14076-cwe-79-improper-neutralization-of-i-805923c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icount%20iXML%20%E2%80%93%20Google%20XML%20sitemap%20generator&amp;severity=medium&amp;id=699697f36aea4a407a3be059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14342-cwe-862-missing-authorization-in-ci-3aae7fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14342%3A%20CWE-862%20Missing%20Authorization%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699697f36aea4a407a3be073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0549-cwe-79-improper-neutralization-of-in-d3b6a94d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itthinx%20Groups&amp;severity=medium&amp;id=699697f46aea4a407a3be0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13738-cwe-79-improper-neutralization-of-i-3e3a57ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Easy%20Table%20of%20Contents&amp;severity=medium&amp;id=699697f36aea4a407a3be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13438-cwe-352-cross-site-request-forgery--f9da7b26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13438%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dienodigital%20Page%20Title%2C%20Description%20%26%20Open%20Graph%20Updater&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0556-cwe-79-improper-neutralization-of-in-77332a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ishitaka%20XO%20Event%20Calendar&amp;severity=medium&amp;id=699697f56aea4a407a3be0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1047-cwe-79-improper-neutralization-of-in-0644c054</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goback2%20salavat%20counter%20Plugin&amp;severity=medium&amp;id=699697f56aea4a407a3be0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13842-cwe-639-authorization-bypass-throug-14905ddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13842%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mtekk%20Breadcrumb%20NavXT&amp;severity=medium&amp;id=699697f36aea4a407a3be043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13864-cwe-862-missing-authorization-in-cl-6b00292c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13864%3A%20CWE-862%20Missing%20Authorization%20in%20cloudways%20Breeze%20Cache&amp;severity=medium&amp;id=699697f36aea4a407a3be04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13617-cwe-79-improper-neutralization-of-i-ef5a0727</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Apollo13%20Framework%20Extensions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4521-cwe-285-improper-authorization-in-th-365d2771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4521%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=699697f46aea4a407a3be0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2282-cwe-79-improper-neutralization-of-in-6abaa2ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hollandben%20Slidorion&amp;severity=medium&amp;id=699697f66aea4a407a3be11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12975-cwe-862-missing-authorization-in-wa-022d7735</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12975%3A%20CWE-862%20Missing%20Authorization%20in%20wahid0003%20Product%20Feed%20Manager%20for%20WooCommerce%20%E2%80%93%20CTX%20Feed%20%E2%80%93%20Support%20220%2B%20Shopping%20%26%20Social%20Channels&amp;severity=high&amp;id=699697f26aea4a407a3bdfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0912-cwe-269-improper-privilege-managemen-d24351a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0912%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20toret%20Toret%20Manager&amp;severity=high&amp;id=699697f56aea4a407a3be0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13612-cwe-79-improper-neutralization-of-i-dce9e05b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20essentialplugin%20Album%20and%20Image%20Gallery%20Plus%20Lightbox&amp;severity=medium&amp;id=699697f26aea4a407a3bdfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1405-cwe-434-unrestricted-upload-of-file--bdda35a2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1405%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20franchidesign%20Slider%20Future&amp;severity=critical&amp;id=699697f66aea4a407a3be111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13930-cwe-862-missing-authorization-in-qu-74a5a47a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13930%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1646-cwe-79-improper-neutralization-of-in-e044dc38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamjaydip%20Advance%20Block%20Extend&amp;severity=medium&amp;id=699697f66aea4a407a3be11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15041-cwe-862-missing-authorization-in-wp-57795334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15041%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=high&amp;id=699697f46aea4a407a3be0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14294-cwe-306-missing-authentication-for--b729fef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14294%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20razorpay%20Razorpay%20for%20WooCommerce&amp;severity=medium&amp;id=699697f36aea4a407a3be06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13413-cwe-352-cross-site-request-forgery--08917483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20soyrodriguez%20Country%20Blocker%20for%20AdSense&amp;severity=medium&amp;id=699697f26aea4a407a3bdfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13732-cwe-79-improper-neutralization-of-i-9d94ce94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699697f26aea4a407a3bdfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13587-cwe-20-improper-input-validation-in-299586cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13587%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ss88_uk%20Two%20Factor%20(2FA)%20Authentication%20via%20Email&amp;severity=medium&amp;id=699697f26aea4a407a3bdfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2502-cwe-79-improper-neutralization-of-in-b4ccae91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yehudah%20xmlrpc%20attacks%20blocker&amp;severity=medium&amp;id=699697f66aea4a407a3be129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2704-out-of-bounds-read-in-open-babel-8733ccdd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2704%3A%20Out-of-Bounds%20Read%20in%20Open%20Babel&amp;severity=medium&amp;id=699697f66aea4a407a3be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2703-off-by-one-in-xlnt-community-xlnt-0e483827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2703%3A%20Off-by-One%20in%20xlnt-community%20xlnt&amp;severity=medium&amp;id=69968d666aea4a407a390167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15586-cwe-287-improper-authentication-in--000235d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15586%3A%20CWE-287%20Improper%20Authentication%20in%20OpenGamePanel%20OGP-Website&amp;severity=critical&amp;id=69968d666aea4a407a39015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2702-hard-coded-credentials-in-beetel-777-0a5e4ed2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2702%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=low&amp;id=69968d666aea4a407a390160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12500-cwe-434-unrestricted-upload-of-file-09de847c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12500%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20quadlayers%20Checkout%20Field%20Manager%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=69968d656aea4a407a39011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12081-cwe-862-missing-authorization-in-na-99e39864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12081%3A%20CWE-862%20Missing%20Authorization%20in%20navzme%20ACF%20Photo%20Gallery%20Field&amp;severity=medium&amp;id=69968d636aea4a407a3900c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13048-cwe-79-improper-neutralization-of-i-80bcab79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statcounter%20StatCounter%20%E2%80%93%20Free%20Real%20Time%20Visitor%20Stats&amp;severity=medium&amp;id=69968d656aea4a407a390139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12117-cwe-79-improper-neutralization-of-i-37d0aa8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Renden&amp;severity=medium&amp;id=69968d636aea4a407a3900d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13113-cwe-200-exposure-of-sensitive-infor-ef9e08ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13113%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=69968d656aea4a407a390144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12845-cwe-862-missing-authorization-in-es-fca10b3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12845%3A%20CWE-862%20Missing%20Authorization%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=high&amp;id=69968d656aea4a407a39012c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12884-cwe-284-improper-access-control-in--528c8d73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12884%3A%20CWE-284%20Improper%20Access%20Control%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=69968d656aea4a407a390134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12821-cwe-352-cross-site-request-forgery--919c4720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12821%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=69968d656aea4a407a390128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12116-cwe-79-improper-neutralization-of-i-7a6487d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Drift&amp;severity=medium&amp;id=69968d636aea4a407a3900cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12882-cwe-269-improper-privilege-manageme-16cf93ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12882%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SmartDataSoft%20Clasifico%20Listing&amp;severity=critical&amp;id=69968d656aea4a407a390130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12707-cwe-89-improper-neutralization-of-s-d2c19dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12707%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System&amp;severity=high&amp;id=69968d656aea4a407a390123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13079-cwe-1241-use-of-predictable-algorit-50fba982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13079%3A%20CWE-1241%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=69968d656aea4a407a39013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12375-cwe-918-server-side-request-forgery-409790b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12375%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20printful%20Printful%20Integration%20for%20WooCommerce&amp;severity=medium&amp;id=69968d636aea4a407a3900d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12451-cwe-79-improper-neutralization-of-i-7d20ae4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benjamin_zekavica%20Easy%20SVG%20Support&amp;severity=medium&amp;id=69968d656aea4a407a390117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11754-cwe-862-missing-authorization-in-wp-e1b287bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11754%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%20for%20GDPR%20%2F%20CCPA%20%E2%80%93%20WPLP%20Cookie%20Consent&amp;severity=high&amp;id=69968d636aea4a407a3900bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12172-cwe-352-cross-site-request-forgery--33daff6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12172%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mailchimp%20Mailchimp%20List%20Subscribe%20Form&amp;severity=medium&amp;id=69968d636aea4a407a3900d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11706-cwe-79-improper-neutralization-of-i-332bc478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12448-cwe-79-improper-neutralization-of-i-82d22b78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartsupp%20Smartsupp%20%E2%80%93%20live%20chat%2C%20AI%20shopping%20assistant%20and%20chatbots&amp;severity=medium&amp;id=69968d636aea4a407a3900e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11725-cwe-862-missing-authorization-in-ar-5f34b89c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11725%3A%20CWE-862%20Missing%20Authorization%20in%20arubadev%20Aruba%20HiSpeed%20Cache&amp;severity=medium&amp;id=69968d636aea4a407a3900b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12027-cwe-862-missing-authorization-in-ho-2323287a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12027%3A%20CWE-862%20Missing%20Authorization%20in%20horearadu%20Mesmerize%20Companion&amp;severity=medium&amp;id=69968d636aea4a407a3900c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2693-improper-authorization-in-cocoteanet-cec810f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2693%3A%20Improper%20Authorization%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699682d66aea4a407a1958b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2692-path-traversal-in-cocoteanet-cyrenea-1b8f731f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2692%3A%20Path%20Traversal%20in%20CoCoTeaNet%20CyreneAdmin&amp;severity=medium&amp;id=699674c56aea4a407a102a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4960-cwe-863-incorrect-authorization-in-e-60a4c497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4960%3A%20CWE-863%20Incorrect%20Authorization%20in%20EPSON%20EPSON%20Printer%20Controller%20Installer&amp;severity=high&amp;id=699674c56aea4a407a1029fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2691-sql-injection-in-itsourcecode-event--a1045ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2691%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699674c56aea4a407a102a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2690-sql-injection-in-itsourcecode-event--a819ead6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2690%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=699666b66aea4a407a031a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2689-sql-injection-in-itsourcecode-event--cc09d79e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2689%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=69965fae6aea4a407afcc69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2686-os-command-injection-in-seccn-dingch-6d02b310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2686%3A%20OS%20Command%20Injection%20in%20SECCN%20Dingcheng%20G10&amp;severity=critical&amp;id=699655226aea4a407af3e26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67304-na-25725329</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67304%3A%20n%2Fa&amp;severity=critical&amp;id=699812b02c4d84f260aeb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67305-na-1d23333f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67305%3A%20n%2Fa&amp;severity=critical&amp;id=699812af2c4d84f260aeb061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-19-7204c9d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-19&amp;severity=medium&amp;id=6997a7c9d7880ec89b3e18d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26744-na-888b51ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26744%3A%20n%2Fa&amp;severity=medium&amp;id=69978157d7880ec89b34978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69725-na-1bd8ed05</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69725%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69674-na-89b2ee83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69674%3A%20n%2Fa&amp;severity=medium&amp;id=69973b6be884a8a4cb409734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-19-04c57537</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-19&amp;severity=medium&amp;id=69972c74732724e9dc48b620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55853-na-10f5b826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55853%3A%20n%2Fa&amp;severity=critical&amp;id=6997227c0018ac3e97d2926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-19-9b55a4bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-19&amp;severity=low&amp;id=69969ebf6aea4a407a3d8b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2684-unrestricted-upload-in-tsinghua-unig-ecd78fea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2684%3A%20Unrestricted%20Upload%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996519e6aea4a407af2b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24126-cwe-88-improper-neutralization-of-a-85b85bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24126%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69964a966aea4a407af16032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2683-path-traversal-in-tsinghua-unigroup--fa982e7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2683%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=699647126aea4a407af0a2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15581-cwe-287-improper-authentication-in--eb504042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15581%3A%20CWE-287%20Improper%20Authentication%20in%20orthanc-server%20orthanc&amp;severity=medium&amp;id=699647126aea4a407af0a2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2682-sql-injection-in-tsinghua-unigroup-e-980aa67f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2682%3A%20SQL%20Injection%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996438e6aea4a407aefe487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12812-cwe-89-improper-neutralization-of-s-40d68e92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12812%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12811-cwe-444-inconsistent-interpretation-52fa5661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12811%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Delinea%20Inc.%20Cloud%20Suite%20and%20Privileged%20Access%20Service&amp;severity=medium&amp;id=69963c866aea4a407aee80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2676-improper-authorization-in-googtech-s-cf4660a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2676%3A%20Improper%20Authorization%20in%20GoogTech%20sms-ssm&amp;severity=medium&amp;id=69963c866aea4a407aee80e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2650-heap-buffer-overflow-in-google-chrom-0bc72c99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2650%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2649-integer-overflow-in-google-chrome-1776d2df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2649%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2648-heap-buffer-overflow-in-google-chrom-8ba8b4eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2648%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6996357e6aea4a407aec4449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2672-path-traversal-in-tsinghua-unigroup--f5bf5b6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2672%3A%20Path%20Traversal%20in%20Tsinghua%20Unigroup%20Electronic%20Archives%20System&amp;severity=medium&amp;id=6996357e6aea4a407aec4455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27181-missing-authorization-in-sergejey-m-847720a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27181%3A%20Missing%20Authorization%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae9220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27180-download-of-code-without-integrity--99709b79</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27180%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae92208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27179-improper-neutralization-of-special--08ebabbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27179%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=high&amp;id=69962e786aea4a407ae92203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27178-improper-neutralization-of-input-du-92230b61</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27178%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27177-improper-neutralization-of-input-du-8fe6a9fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27176-improper-neutralization-of-input-du-e69a01b9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=medium&amp;id=69962e786aea4a407ae921f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27175-improper-neutralization-of-special--9a0f14bf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27175%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27174-improper-control-of-generation-of-c-e7d5bad6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27174%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sergejey%20MajorDoMo&amp;severity=critical&amp;id=69962e786aea4a407ae921ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2670-os-command-injection-in-advantech-wi-d366eba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2670%3A%20OS%20Command%20Injection%20in%20Advantech%20WISE-6610&amp;severity=high&amp;id=69962e796aea4a407ae92231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2669-improper-access-controls-in-rongzhit-fabb5c97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2669%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=69962e786aea4a407ae92217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27182-missing-authentication-for-critical-1fc2462d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27182%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20saturnremote%20Saturn%20Remote%20Mouse%20Server&amp;severity=high&amp;id=69962e786aea4a407ae92212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0665-out-of-bounds-write-2671d8e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0665%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=69962af36aea4a407ae847e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8860-improper-removal-of-sensitive-inform-32c0e355</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8860%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer&amp;severity=low&amp;id=69962af36aea4a407ae847df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14876-allocation-of-resources-without-lim-2e422163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14876%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=69962af36aea4a407ae847db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1999-cwe-863-incorrect-authorization-in-g-962c7a88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1999%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69962af36aea4a407ae847ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1355-cwe-862-missing-authorization-in-git-91bfc7af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1355%3A%20CWE-862%20Missing%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=69962af36aea4a407ae847e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0573-cwe-601-url-redirection-to-untrusted-fb40cff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0573%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=699631fa6aea4a407aeb5692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2668-improper-access-controls-in-rongzhit-55d063a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2668%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=699631fa6aea4a407aeb569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2667-improper-access-controls-in-rongzhit-48cfbb24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2667%3A%20Improper%20Access%20Controls%20in%20Rongzhitong%20Visual%20Integrated%20Command%20and%20Dispatch%20Platform&amp;severity=medium&amp;id=6996fb458fb9188dea8c0126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1272-vulnerability-in-fedora-project-fedo-30f9c46b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1272%3A%20Vulnerability%20in%20Fedora%20Project%20Fedora%20Linux&amp;severity=high&amp;id=69962af36aea4a407ae847fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12343-double-free-dde3ee36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12343%3A%20Double%20Free&amp;severity=low&amp;id=6996fb458fb9188dea8c0122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10256-null-pointer-dereference-58bc4ddc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10256%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=6996fb458fb9188dea8c011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0577-insufficient-entropy-df53ccfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0577%3A%20Insufficient%20Entropy&amp;severity=medium&amp;id=6996fb458fb9188dea8c0118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1200-access-of-uninitialized-pointer-in-h-16b69636</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1200%3A%20Access%20of%20Uninitialized%20Pointer%20in%20https%3A%2F%2Fgithub.com%2Frgaufman%2Flive555%20rgaufman%2Flive555&amp;severity=medium&amp;id=699620676aea4a407add8670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2666-unrestricted-upload-in-mingsoft-mcms-c239d51e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2666%3A%20Unrestricted%20Upload%20in%20mingSoft%20MCMS&amp;severity=medium&amp;id=6996fb458fb9188dea8c013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2665-unrestricted-upload-in-huanzi-qch-ba-223f0da8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2665%3A%20Unrestricted%20Upload%20in%20huanzi-qch%20base-admin&amp;severity=medium&amp;id=6996fb458fb9188dea8c0132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0875-cwe-787-out-of-bounds-write-in-autod-a34a9a01</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0875%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0874-cwe-787-out-of-bounds-write-in-autod-190be7a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0874%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=699620676aea4a407add8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2663-sql-injection-in-alixhan-xh-admin-ba-882bff48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2663%3A%20SQL%20Injection%20in%20Alixhan%20xh-admin-backend&amp;severity=medium&amp;id=6996fb478fb9188dea8c030c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2662-out-of-bounds-read-in-fascinatedbox--0b95d4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2662%3A%20Out-of-Bounds%20Read%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb478fb9188dea8c0304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2661-heap-based-buffer-overflow-in-squirr-3af36c3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2661%3A%20Heap-based%20Buffer%20Overflow%20in%20Squirrel&amp;severity=medium&amp;id=6996fb478fb9188dea8c0319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69287-cwe-573-improper-following-of-speci-c693b5d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69287%3A%20CWE-573%3A%20Improper%20Following%20of%20Specification%20by%20Caller%20in%20bsv-blockchain%20ts-sdk&amp;severity=medium&amp;id=6996fb478fb9188dea8c0320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2660-use-after-free-in-fascinatedbox-lily-056100ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2660%3A%20Use%20After%20Free%20in%20FascinatedBox%20lily&amp;severity=medium&amp;id=6996fb498fb9188dea8c09a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14009-cwe-94-improper-control-of-generati-6b025b75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14009%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20nltk%20nltk%2Fnltk&amp;severity=critical&amp;id=69969ef76aea4a407a3d9a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2659-out-of-bounds-read-in-squirrel-abffbf8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2659%3A%20Out-of-Bounds%20Read%20in%20Squirrel&amp;severity=medium&amp;id=6996fb498fb9188dea8c09d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2658-cross-site-request-forgery-in-newbee-e3d0b3db</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2658%3A%20Cross-Site%20Request%20Forgery%20in%20newbee-ltd%20newbee-mall&amp;severity=medium&amp;id=6996fb498fb9188dea8c09c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-revisited-inside-the-rats-evolving-command--00631ee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20Revisited%3A%20Inside%20the%20RAT&apos;s%20Evolving%20Command-and-Control%20Techniques&amp;severity=medium&amp;id=699612556aea4a407acc7412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20142-information-written-to-log-files-ca-f0d31475</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20142%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20138-information-written-to-log-files-ca-f3c5c5c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20138%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20139-the-software-does-not-properly-cont-7f5310ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20139%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20144-information-written-to-log-files-ca-00300c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20144%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69969ef76aea4a407a3d9a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20141-the-product-exposes-sensitive-infor-3b6f8480</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20141%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20137-the-product-exposes-sensitive-infor-4bd9248d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20137%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6996fb498fb9188dea8c09b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2657-stack-based-buffer-overflow-in-wren--da471de2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2657%3A%20Stack-based%20Buffer%20Overflow%20in%20wren-lang%20wren&amp;severity=medium&amp;id=6996fb498fb9188dea8c09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2230-cwe-639-authorization-bypass-through-2fdc86b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2230%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6996fb478fb9188dea8c0328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/law-firm-sites-hijacked-in-suspected-supply-chain--44484675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Law%20Firm%20Sites%20Hijacked%20in%20Suspected%20Supply-Chain%20Attack&amp;severity=medium&amp;id=699612556aea4a407acc7417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2507-cwe-476-null-pointer-dereference-in--04591590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2507%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-keenadu-android-malware-found-on-thousands-of--aeb3c090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Keenadu%20Android%20Malware%20Found%20on%20Thousands%20of%20Devices&amp;severity=medium&amp;id=6995e0ea6aea4a407ac10f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15579-cwe-502-deserialization-of-untruste-8ab4ff09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15579%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20OpenText%E2%84%A2%20Directory%20Services&amp;severity=critical&amp;id=6995da1e6aea4a407abec468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61982-cwe-94-improper-control-of-generati-7ed7f412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61982%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCFD%20OpenFOAM&amp;severity=high&amp;id=6995d3146aea4a407abc1a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2656-use-after-free-in-chaiscript-f70f7207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2656%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995d3146aea4a407abc1a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1404-cwe-79-improper-neutralization-of-in-d8b84df7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6995cf916aea4a407abb58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1426-cwe-502-deserialization-of-untrusted-d5d3ff22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1426%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20berocket%20Advanced%20AJAX%20Product%20Filters&amp;severity=high&amp;id=6995cf916aea4a407abb58c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71228-5c740b16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71228&amp;severity=null&amp;id=69a0d69332ffcdb8a26c704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71226-e967f3fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71226&amp;severity=null&amp;id=69a0d69332ffcdb8a26c7049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27100-vulnerability-in-jenkins-project-je-a7ca03e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27100%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6995cf916aea4a407abb58cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27099-vulnerability-in-jenkins-project-je-f2bd90c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27099%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6995cf916aea4a407abb58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2329-cwe-121-stack-based-buffer-overflow--e34cb0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2329%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Grandstream%20GXP1610&amp;severity=critical&amp;id=6995cf916aea4a407abb58d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60038-cwe-502-deserialization-of-untruste-df25c0a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60038%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60037-cwe-502-deserialization-of-untruste-3b11b4fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60037%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60036-cwe-502-deserialization-of-untruste-01ac078c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60036%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2655-use-after-free-in-chaiscript-4469a246</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2655%3A%20Use%20After%20Free%20in%20ChaiScript&amp;severity=low&amp;id=6995c8856aea4a407a9d0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60035-cwe-502-deserialization-of-untruste-4ac47a15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60035%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Bosch%20Rexroth%20IndraWorks&amp;severity=high&amp;id=6995c8856aea4a407a9d0cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33240-cwe-94-improper-control-of-generati-7295b46a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33240%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33239-cwe-94-improper-control-of-generati-ce2d736d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33239%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-Bridge&amp;severity=high&amp;id=6995c8836aea4a407a9d0caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33253-cwe-502-deserialization-of-untruste-87fed69d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33253%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33252-cwe-502-deserialization-of-untruste-05b53bca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33252%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8856aea4a407a9d0cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33251-cwe-94-improper-control-of-generati-cf832903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33251%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33250-cwe-94-improper-control-of-generati-c81e2e61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33250%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33249-cwe-77-improper-neutralization-of-s-fbdebcf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33249%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8846aea4a407a9d0cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33246-cwe-77-improper-neutralization-of-s-665c462e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33246%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33245-cwe-502-deserialization-of-untruste-52801645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33245%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33243-cwe-502-deserialization-of-untruste-6f19f5cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33243%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33241-cwe-502-deserialization-of-untruste-f2752c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33241%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33236-cwe-94-improper-control-of-generati-bab7e094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33236%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6995c8836aea4a407a9d0ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2464-cwe-22-improper-limitation-of-a-path-49dc2395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2464%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AMR%20AMR%20Printer%20Management%20Beta%20web%20service&amp;severity=high&amp;id=6995c8856aea4a407a9d0d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59920-cwe-89-improper-neutralization-of-s-2feb09f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59920%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20systems%20at%20work%20time%20at%20work&amp;severity=high&amp;id=6995c8856aea4a407a9d0d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8308-cwe-79-improper-neutralization-of-in-80089374</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Key%20Software%20Solutions%20Inc.%20INFOREX-%20General%20Information%20Management%20System&amp;severity=medium&amp;id=6995cf916aea4a407abb58db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14340-cwe-79-improper-neutralization-of-i-71ccb838</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Payara%20Platform%20Payara%20Server&amp;severity=high&amp;id=6995cf916aea4a407abb58d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2654-server-side-request-forgery-in-huggi-4f6f3e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2654%3A%20Server-Side%20Request%20Forgery%20in%20huggingface%20smolagents&amp;severity=medium&amp;id=6995cf936aea4a407abb58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-in-popular-pdf-platforms-allowed-a-944486e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20in%20Popular%20PDF%20Platforms%20Allowed%20Account%20Takeover%2C%20Data%20Exfiltration&amp;severity=low&amp;id=6995bed580d747be206eb309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-found-in-four-vs-code-extensions-wi-563d9726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20Found%20in%20Four%20VS%20Code%20Extensions%20with%20Over%20125%20Million%20Installs&amp;severity=critical&amp;id=6995bec280d747be206eaf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1441-cwe-79-improper-neutralization-of-in-a4fd3745</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1440-cwe-79-improper-neutralization-of-in-659e2c74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1439-cwe-79-improper-neutralization-of-in-d1082814</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf936aea4a407abb58f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1438-cwe-79-improper-neutralization-of-in-7aa14847</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1437-cwe-79-improper-neutralization-of-in-cb0fed4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=medium&amp;id=6995cf916aea4a407abb58e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1436-cwe-639-authorization-bypass-through-46e35fb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=high&amp;id=6995cf916aea4a407abb58de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1435-cwe-613-insufficient-session-expirat-34761982</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1435%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Graylog%20Graylog%20Web%20Interface&amp;severity=critical&amp;id=6995da1e6aea4a407abec46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1317-cwe-89-improper-neutralization-of-sp-6541c750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=medium&amp;id=6995b46b80d747be206b6168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1582-cwe-200-exposure-of-sensitive-inform-e684b84f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1582%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20soflyy%20WP%20All%20Export%20%E2%80%93%20Drag%20%26%20Drop%20Export%20to%20Any%20Custom%20CSV%2C%20XML%20%26%20Excel&amp;severity=low&amp;id=6995b46b80d747be206b616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2386-cwe-863-incorrect-authorization-in-p-ce591677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2386%3A%20CWE-863%20Incorrect%20Authorization%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20for%20Elementor%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=6995b46b80d747be206b6173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8781-cwe-89-improper-neutralization-of-sp-54f84aa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bookster%20Bookster%20%E2%80%93%20WordPress%20Appointment%20Booking%20Plugin&amp;severity=medium&amp;id=6995b46b80d747be206b6163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-campaign-abuses-atlassian-jira-targets-govern-d550c7cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20Campaign%20Abuses%20Atlassian%20Jira%2C%20Targets%20Government%20and%20Corporate%20Entities&amp;severity=medium&amp;id=6995e8256aea4a407ac323e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7630-cwe-307-improper-restriction-of-exce-e9a6662f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7630%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Doruk%20Communication%20and%20Automation%20Industry%20and%20Trade%20Inc.%20Wispotter&amp;severity=medium&amp;id=6995b0e780d747be206a5422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-tech-predictions-for-2026-operating--d75f27b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Tech%20Predictions%20for%202026%3A%20Operating%20in%20a%20World%20of%20Permanent%20Instability&amp;severity=medium&amp;id=6995da846aea4a407abee716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14799-cwe-843-access-of-resource-using-in-c4359a93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14799%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20neeraj_slit%20Brevo%20%E2%80%93%20Email%2C%20SMS%2C%20Web%20Push%2C%20Chat%2C%20and%20more.&amp;severity=medium&amp;id=6995a2d880d747be206547e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2653-heap-based-buffer-overflow-in-admesh-c73931a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2653%3A%20Heap-based%20Buffer%20Overflow%20in%20admesh&amp;severity=medium&amp;id=69959f5480d747be2063f039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-for-vms-zero-day-cve-2026-22769--1a732439</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20for%20VMs%20Zero-Day%20CVE-2026-22769%20Exploited%20Since%20Mid-2024&amp;severity=medium&amp;id=6995da846aea4a407abee719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-hackers-exploiting-vulnerability-in-product-o-a099b96b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Hackers%20Exploiting%20Vulnerability%20in%20Product%20of%20Taiwan%20Security%20Firm%20TeamT5&amp;severity=medium&amp;id=6995949480d747be205f87ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2426-cwe-22-improper-limitation-of-a-path-3d51e834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2426%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=medium&amp;id=699594d680d747be205fb508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1942-cwe-862-missing-authorization-in-pr--c306e9aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1942%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=699594d680d747be205fb502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14444-cwe-345-insufficient-verification-o-ccfaa86b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14444%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=699594d680d747be205fb4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11185-cwe-79-improper-neutralization-of-i-3a4690bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20complianz%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=699586ba80d747be2059d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13727-cwe-79-improper-neutralization-of-i-a926559b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699586ba80d747be2059d03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2126-cwe-863-incorrect-authorization-in-s-2ba6c938</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2126%3A%20CWE-863%20Incorrect%20Authorization%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=699586ba80d747be2059d043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1656-cwe-862-missing-authorization-in-str-a682e6d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1656%3A%20CWE-862%20Missing%20Authorization%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=medium&amp;id=699578ab80d747be205539d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1649-cwe-79-improper-neutralization-of-in-45919fab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=699578ab80d747be205539cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2127-cwe-862-missing-authorization-in-gpr-82301c35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2127%3A%20CWE-862%20Missing%20Authorization%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699578ab80d747be205539e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2495-cwe-89-improper-neutralization-of-sp-08e20fbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=699578ab80d747be205539ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1941-cwe-79-improper-neutralization-of-in-e87c4116</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20WP%20Event%20Aggregator%3A%20Import%20Eventbrite%20events%2C%20Meetup%20events%2C%20social%20events%20and%20any%20iCal%20Events%20into%20Event%20Calendar&amp;severity=medium&amp;id=699578ab80d747be205539da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-campaigns-with-reused-material-we-f81192c1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20Campaigns%20With%20Reused%20Material%2C%20(Wed%2C%20Feb%2018th)&amp;severity=medium&amp;id=6995787680d747be205506ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-hijacked-update-mechanism-used-to-de-7dc05b1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Fixes%20Hijacked%20Update%20Mechanism%20Used%20to%20Deliver%20Targeted%20Malware&amp;severity=medium&amp;id=6995909980d747be205dea22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25421-1dcf4a9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25421&amp;severity=null&amp;id=6995719e80d747be205195d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2112-cwe-352-cross-site-request-forgery-c-a2c12543</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Dam%20Spam&amp;severity=medium&amp;id=69956e1c80d747be20503e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1831-cwe-862-missing-authorization-in-yay-f8b220fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1831%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=low&amp;id=69956e1c80d747be20503e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1860-cwe-862-missing-authorization-in-wpc-d30e477c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1860%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Kali%20Forms%20%E2%80%94%20Contact%20Form%20%26%20Drag-and-Drop%20Builder&amp;severity=medium&amp;id=69956e1c80d747be20503e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1943-cwe-79-improper-neutralization-of-in-45cd9e0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1938-cwe-862-missing-authorization-in-yay-7ae76c05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1938%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=69956e1c80d747be20503e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1655-cwe-862-missing-authorization-in-met-24a3e3cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1655%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69956e1c80d747be20503e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2419-cwe-22-improper-limitation-of-a-path-275cb74b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2419%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gamerz%20WP-DownloadManager&amp;severity=low&amp;id=69956e1c80d747be20503e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-recoverpoint-zero-day-exploited-by-chinese-cy-148649a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20RecoverPoint%20Zero-Day%20Exploited%20by%20Chinese%20Cyberespionage%20Group&amp;severity=medium&amp;id=699566e580d747be204cca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2644-out-of-bounds-read-in-niklasso-minis-3863f627</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2644%3A%20Out-of-Bounds%20Read%20in%20niklasso%20minisat&amp;severity=medium&amp;id=6995672780d747be204d295f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-four-security-flaws-under-active-exploi-14954e9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Four%20Security%20Flaws%20Under%20Active%20Exploitation%20in%20Latest%20KEV%20Update&amp;severity=low&amp;id=6995909980d747be205dea25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2296-cwe-94-improper-control-of-generatio-5b1b1df0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2296%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Product%20Addons%20for%20Woocommerce%20%E2%80%93%20Product%20Options%20with%20Custom%20Fields&amp;severity=high&amp;id=6995672780d747be204d2951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2633-cwe-862-missing-authorization-in-ste-269f9374</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2281-cwe-79-improper-neutralization-of-in-518f2262</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edersonpeka%20Private%20Comment&amp;severity=medium&amp;id=6995672780d747be204d294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1640-cwe-862-missing-authorization-in-tas-e9acd827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1640%3A%20CWE-862%20Missing%20Authorization%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20WordPress%20Project%20Management%20%26%20Task%20Management%2Ckanban%20view&amp;severity=medium&amp;id=6995672780d747be204d2927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1807-cwe-79-improper-neutralization-of-in-229ebdad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20interactivecalculator%20InteractiveCalculator%20for%20WordPress&amp;severity=medium&amp;id=6995672780d747be204d2933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1937-cwe-862-missing-authorization-in-yay-12c0a139</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1937%3A%20CWE-862%20Missing%20Authorization%20in%20yaycommerce%20YayMail%20%E2%80%93%20WooCommerce%20Email%20Customizer&amp;severity=critical&amp;id=6995672780d747be204d293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1666-cwe-79-improper-neutralization-of-in-3f7d4556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6995672780d747be204d292c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1857-cwe-918-server-side-request-forgery--805c3795</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1857%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6995672780d747be204d2939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2019-cwe-74-improper-neutralization-of-sp-628198fb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2019%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20villatheme%20Cart%20All%20In%20One%20For%20WooCommerce&amp;severity=high&amp;id=6995672780d747be204d2945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2642-null-pointer-dereference-in-ggreer-t-3ad53a2e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2642%3A%20NULL%20Pointer%20Dereference%20in%20ggreer%20the_silver_searcher&amp;severity=medium&amp;id=6995600b80d747be204893b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1368-cwe-287-improper-authentication-in-v-252c05b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1368%3A%20CWE-287%20Improper%20Authentication%20in%20Video%20Conferencing%20with%20Zoom&amp;severity=high&amp;id=6995590380d747be20465104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2641-uncontrolled-recursion-in-universal--0b937f98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2641%3A%20Uncontrolled%20Recursion%20in%20universal-ctags%20ctags&amp;severity=medium&amp;id=6995557f80d747be2043e625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12356-cwe-862-missing-authorization-in-ti-2b7bb65c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12356%3A%20CWE-862%20Missing%20Authorization%20in%20tickera%20Tickera%20%E2%80%93%20Sell%20Tickets%20%26%20Manage%20Events&amp;severity=medium&amp;id=6995557f80d747be2043e5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1304-cwe-79-improper-neutralization-of-in-84444595</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=6995557f80d747be2043e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12122-cwe-78-improper-neutralization-of-s-95a10c0f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12122%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20wpcalc%20Popup%20Box%20%E2%80%93%20Easily%20Create%20WordPress%20Popups&amp;severity=medium&amp;id=6995557f80d747be2043e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1072-cwe-352-cross-site-request-forgery-c-9c430d35</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jamesits%20Keybase.io%20Verification&amp;severity=medium&amp;id=6995557f80d747be2043e5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1906-cwe-862-missing-authorization-in-wpo-2766b763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1906%3A%20CWE-862%20Missing%20Authorization%20in%20wpovernight%20PDF%20Invoices%20%26%20Packing%20Slips%20for%20WooCommerce&amp;severity=medium&amp;id=6995557f80d747be2043e618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1639-cwe-89-improper-neutralization-of-sp-f7f4ef30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1639%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20WordPress%20Project%20Management%20%26%20Task%20Management%2Ckanban%20view&amp;severity=medium&amp;id=6995557f80d747be2043e612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11737-cwe-79-improper-neutralization-of-i-22f7971a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=6995557f80d747be2043e5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2023-cwe-352-cross-site-request-forgery-c-ec86f230</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2023%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brikou%20WP%20Plugin%20Info%20Card&amp;severity=medium&amp;id=6995557f80d747be2043e61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1925-cwe-862-missing-authorization-in-rox-64475f95</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1925%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=6995477080d747be203eb807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2576-cwe-89-improper-neutralization-of-sp-ac9124c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2576%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=high&amp;id=6995477180d747be203eb81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1714-cwe-93-improper-neutralization-of-cr-f05f49aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1714%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20All-in-One%20WooCommerce%20Growth%20%26%20Store%20Enhancement%20Plugin&amp;severity=high&amp;id=6995477080d747be203eb7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1277-cwe-601-url-redirection-to-untrusted-f948f014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1277%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kaizencoders%20URL%20Shortify%20%E2%80%93%20Simple%20and%20Easy%20URL%20Shortener&amp;severity=medium&amp;id=6995477080d747be203eb7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12037-cwe-79-improper-neutralization-of-i-6a60de39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hwk-fr%20WP%20404%20Auto%20Redirect%20to%20Similar%20Post&amp;severity=medium&amp;id=6995477080d747be203eb7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6460-cwe-79-improper-neutralization-of-in-28148615</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gserafini%20Display%20During%20Conditional%20Shortcode&amp;severity=medium&amp;id=6995477080d747be203eb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1296-cwe-601-url-redirection-to-untrusted-0f085222</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1296%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=6995477080d747be203eb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12075-cwe-862-missing-authorization-in-fa-23ec4d5e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12075%3A%20CWE-862%20Missing%20Authorization%20in%20fahadmahmood%20Order%20Splitter%20for%20WooCommerce&amp;severity=medium&amp;id=6995477080d747be203eb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1931-cwe-79-improper-neutralization-of-in-fa3944d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonschr%20Rent%20Fetch&amp;severity=high&amp;id=6995477180d747be203eb817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12071-cwe-639-authorization-bypass-throug-052ab4dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12071%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20absikandar%20Frontend%20User%20Notes&amp;severity=medium&amp;id=6995477080d747be203eb7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13959-cwe-79-improper-neutralization-of-i-1d68a836</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanaver%20Filestack&amp;severity=medium&amp;id=6995477080d747be203eb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12074-cwe-200-exposure-of-sensitive-infor-e6ca8f6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12074%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20postmagthemes%20Context%20Blog&amp;severity=medium&amp;id=6995477080d747be203eb7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maltrail-ioc-for-2026-02-18-116ea64e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maltrail%20IOC%20for%202026-02-18&amp;severity=medium&amp;id=69971b5eb557332a80fbff32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65791-na-c5be6e2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65791%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65519-na-864da093</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65519%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb4b8fb9188dea8c0df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24708-cwe-669-incorrect-resource-transfer-b65710b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24708%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20OpenStack%20Nova&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70148-na-8c970d6c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70148%3A%20n%2Fa&amp;severity=high&amp;id=6996fb4b8fb9188dea8c0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70150-na-831b2e9a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70150%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb4b8fb9188dea8c0ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70152-na-7fcec29d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70152%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70151-na-132a0884</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70151%3A%20n%2Fa&amp;severity=high&amp;id=6996fb498fb9188dea8c09b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70149-na-25fc9c21</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70149%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70141-na-7495087b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70141%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb498fb9188dea8c09a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70147-na-713f71ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70147%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70146-na-f560c7ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70146%3A%20n%2Fa&amp;severity=critical&amp;id=6996fb478fb9188dea8c032d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70064-na-0097a5a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70064%3A%20n%2Fa&amp;severity=high&amp;id=6996fb478fb9188dea8c0324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70063-na-e6c89975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70063%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70062-na-a4275ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70062%3A%20n%2Fa&amp;severity=medium&amp;id=6996fb478fb9188dea8c0311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-18-d351e167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-18&amp;severity=medium&amp;id=699654eb6aea4a407af39030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70998-na-77dc81ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70998%3A%20n%2Fa&amp;severity=critical&amp;id=6995da1e6aea4a407abec46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-18-9670f798</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-18&amp;severity=low&amp;id=699582fd80d747be20583fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1344-incorrect-permission-assignment-for--4cd8ccfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1344%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tanium%20Enforce%20Recovery%20Key%20Portal&amp;severity=medium&amp;id=6995011f80d747be20e100cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23599-vulnerability-in-hewlett-packard-en-fdc96349</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23599%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=6994f69980d747be20df435a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22048-918-in-netapp-storagegrid-formerly--5c913f90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22048%3A%20918%20in%20NETAPP%20StorageGRID%20(formerly%20StorageGRID%20Webscale)&amp;severity=high&amp;id=6994f69980d747be20df4357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26119-cwe-287-improper-authentication-in--f09bdabb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26119%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=6994f69980d747be20df4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1670-cwe-306-missing-authentication-for-c-7263f78b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1670%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Honeywell%20I-HIB2PI-UL%202MP%20IP&amp;severity=critical&amp;id=6994f69980d747be20df4360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62183-cwe-79-improper-neutralization-of-i-fb957050</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6994f69980d747be20df435d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13333-cwe-358-improperly-implemented-secu-e16039f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13333%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=6994f31080d747be20de97a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13689-cwe-434-unrestricted-upload-of-file-eecd60ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13689%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20DataStage%20on%20Cloud%20Pak&amp;severity=high&amp;id=699575b980d747be2053752c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2629-os-command-injection-in-jishi-node-s-35f7c933</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2629%3A%20OS%20Command%20Injection%20in%20jishi%20node-sonos-http-api&amp;severity=medium&amp;id=6994e88380d747be20dc67c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33135-cwe-79-improper-neutralization-of-i-f6fbdd1f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Financial%20Transaction%20Manager%20for%20ACH%20Services%20and%20Check%20Services%20for%20Multi-Platform&amp;severity=medium&amp;id=6994e1f780d747be20dad4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33088-cwe-732-incorrect-permission-assign-9dbe55da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33088%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Concert&amp;severity=high&amp;id=6994e1f780d747be20dad49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36183-cwe-434-unrestricted-upload-of-file-4e55895a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36183%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20watsonx.data&amp;severity=low&amp;id=6994e1f780d747be20dad4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2627-link-following-in-softland-fbackup-21db41d8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2627%3A%20Link%20Following%20in%20Softland%20FBackup&amp;severity=high&amp;id=6994e1f780d747be20dad4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36348-cwe-209-generation-of-error-message-2e5a614e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36348%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6994e1f780d747be20dad4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2623-path-traversal-in-blossom-e8f3b710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2623%3A%20Path%20Traversal%20in%20Blossom&amp;severity=medium&amp;id=6994e1f780d747be20dad4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23598-vulnerability-in-hewlett-packard-en-c78a381d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23598%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=6994e1f780d747be20dad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23597-vulnerability-in-hewlett-packard-en-97c8adfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23597%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be2053755e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23596-vulnerability-in-hewlett-packard-en-5a0b28fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23596%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=medium&amp;id=699575b980d747be20537554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23595-vulnerability-in-hewlett-packard-en-aaebd4dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23595%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=high&amp;id=699575b980d747be2053754a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36376-cwe-613-insufficient-session-expira-27f04f89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36376%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2622-cross-site-scripting-in-blossom-a97e2f4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2622%3A%20Cross%20Site%20Scripting%20in%20Blossom&amp;severity=medium&amp;id=699575b980d747be20537628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36377-cwe-613-insufficient-session-expira-47b9f738</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36377%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be20537572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36379-cwe-326-inadequate-encryption-stren-e8c56bdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36379%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=699575b980d747be2053757a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13691-cwe-497-exposure-of-sensitive-syste-e4d4e018</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13691%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20DataStage%20on%20Cloud%20Pak%20for%20Data&amp;severity=high&amp;id=699575b980d747be20537634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14289-cwe-80-improper-neutralization-of-s-15994d02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14289%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=medium&amp;id=699575b980d747be20537533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2621-sql-injection-in-sciyon-koyuan-therm-c2c7056e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2621%3A%20SQL%20Injection%20in%20Sciyon%20Koyuan%20Thermoelectricity%20Heat%20Network%20Management%20System&amp;severity=medium&amp;id=699575b980d747be2053753f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22762-cwe-22-improper-limitation-of-a-pat-fb7162fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22762%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be205376a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27898-cwe-613-insufficient-session-expira-1fb50650</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27898%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27899-cwe-526-cleartext-storage-of-sensit-79a8cd73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27899%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27900-cwe-601-url-redirection-to-untruste-44a62879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27900%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22284-cwe-77-improper-neutralization-of-s-5569d01c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22284%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69954e7880d747be2041357b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26357-cwe-79-improper-neutralization-of-i-851a7e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26357%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%209.2.4.18&amp;severity=medium&amp;id=699575bb80d747be205376a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27901-cwe-644-improper-neutralization-of--a8ea6de3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27901%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053763a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27903-cwe-319-cleartext-transmission-of-s-e4976127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27903%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be2053762e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27904-cwe-352-cross-site-request-forgery--7dfc647d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20DB2%20Recovery%20Expert%20for%20LUW&amp;severity=medium&amp;id=699575b980d747be20537631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36598-cwe-22-improper-limitation-of-a-pat-c71d019c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36598%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Virtual%20Edition&amp;severity=medium&amp;id=699575b980d747be20537539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22769-cwe-798-use-of-hard-coded-credentia-cad7841a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22769%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Dell%20RecoverPoint%20for%20Virtual%20Machines&amp;severity=critical&amp;id=69954e7880d747be2041357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33130-cwe-120-buffer-copy-without-checkin-6003e44e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33130%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0102-cwe-359-exposure-of-private-personal-0ea43207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0102%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=low&amp;id=6994f69980d747be20df436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33124-cwe-131-incorrect-calculation-of-bu-b76dcfb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33124%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13108-vulnerability-in-ibm-db2-merge-back-fc73d8f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13108%3A%20Vulnerability%20in%20IBM%20DB2%20Merge%20Backup%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-modern-soc-teams-use-ai-and-context-to-72344316</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Modern%20SOC%20Teams%20Use%20AI%20and%20Context%20to%20Investigate%20Cloud%20Breaches%20Faster&amp;severity=medium&amp;id=6995909980d747be205dea28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36597-cwe-22-improper-limitation-of-a-pat-5ff59b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36597%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Avamar%20Server&amp;severity=medium&amp;id=699575bb80d747be2053771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33101-cwe-244-improper-clearing-of-heap-m-bfe34f61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33101%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2620-sql-injection-in-huace-monitoring-an-0c8cd687</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2620%3A%20SQL%20Injection%20in%20Huace%20Monitoring%20and%20Early%20Warning%20System&amp;severity=medium&amp;id=699575bb80d747be20537720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33089-cwe-798-use-of-hard-coded-credentia-ebf5d876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33089%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be20537714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36243-cwe-918-server-side-request-forgery-a8c35159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36243%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43178-cwe-327-use-of-a-broken-or-risky-cr-5e3b81b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43178%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575bb80d747be2053772a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36018-cwe-352-cross-site-request-forgery--b52c9328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36018%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6994e50080d747be20db79f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24734-cwe-20-improper-input-validation-in-7e1027c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24734%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat%20Native&amp;severity=high&amp;id=699575bd80d747be205377f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36019-cwe-79-improper-neutralization-of-i-2052d908</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=699575b980d747be2053763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24733-cwe-20-improper-input-validation-in-12b56c6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24733%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=699575bd80d747be205377ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12755-cwe-117-improper-output-neutralizat-4a26a9ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12755%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=699575b980d747be20537637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66614-cwe-20-improper-input-validation-in-bcf18b8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66614%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=699575bd80d747be205377ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2630-cwe-78-improper-neutralization-of-sp-3ee12498</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tenable%20Security%20Center&amp;severity=high&amp;id=6994b74c80d747be20cdd662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-show-copilot-and-grok-can-be-abused-as-64561493</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Show%20Copilot%20and%20Grok%20Can%20Be%20Abused%20as%20Malware%20C2%20Proxies&amp;severity=low&amp;id=6995909980d747be205dea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badiis-to-the-bone-new-insights-to-a-global-seo-po-f94b5abc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BADIIS%20to%20the%20Bone%3A%20New%20Insights%20to%20a%20Global%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=6994b74a80d747be20cdd527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-clickfix-opens-the-door-to-stealthy-stealc-inf-765d6586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20ClickFix%20Opens%20the%20Door%20to%20Stealthy%20StealC%20Information%20Stealer&amp;severity=medium&amp;id=6994b74a80d747be20cdd577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36247-cwe-611-improper-restriction-of-xml-6af3c952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36247%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=699575bb80d747be20537709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36425-cwe-256-in-ibm-db2-for-linux-unix-a-ed5229e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36425%3A%20CWE-256%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be2053770c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13867-cwe-1284-improper-validation-of-spe-49ea700b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13867%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bb80d747be205376c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14689-cwe-1284-improper-validation-of-spe-6a88675e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14689%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=699575bd80d747be20537800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keenadu-firmware-backdoor-infects-android-tablets--f07d8f19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keenadu%20Firmware%20Backdoor%20Infects%20Android%20Tablets%20via%20Signed%20OTA%20Updates&amp;severity=medium&amp;id=6995909980d747be205dea2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2618-risky-cryptographic-algorithm-in-bee-16b2753e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2618%3A%20Risky%20Cryptographic%20Algorithm%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=699575bd80d747be20537849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23648-cwe-732-incorrect-permission-assign-3c011f22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23648%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=high&amp;id=699575bb80d747be205376b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23647-cwe-798-use-of-hard-coded-credentia-6b5abde7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23647%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Glory%20Global%20Solutions%20RBG-100&amp;severity=critical&amp;id=699575bb80d747be205376b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2617-insecure-default-initialization-of-r-3378e449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2617%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=69948d1c80d747be20bdf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-offer-to-sell-millions-of-eurail-user-reco-ee3e48d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Offer%20to%20Sell%20Millions%20of%20Eurail%20User%20Records&amp;severity=medium&amp;id=6994896480d747be20bc82aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31118-cwe-862-missing-authorization-in-sm-0efd5cdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31118%3A%20CWE-862%20Missing%20Authorization%20in%20Smartypants%20SP%20Project%20%26%20Document%20Manager&amp;severity=medium&amp;id=6994861680d747be20bbcc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2616-hard-coded-credentials-in-beetel-777-5f01c821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2616%3A%20Hard-coded%20Credentials%20in%20Beetel%20777VR1&amp;severity=high&amp;id=6994861680d747be20bbcc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22208-cwe-749-exposed-dangerous-method-or-4594ea65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22208%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20OpenS100%20Project%20OpenS100&amp;severity=critical&amp;id=69947f0d80d747be20b9dc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-in-the-middle-turning-web-based-ai-services-int-ec8326ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20in%20the%20Middle%3A%20Turning%20Web-Based%20AI%20Services%20into%20C2%20Proxies%20%26%20The%20Future%20Of%20AI%20Driven%20Attacks&amp;severity=low&amp;id=6995917280d747be205e4203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-the-ongoing-fight-to-secure-in-7c6a9e61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20The%20Ongoing%20Fight%20to%20Secure%20Industrial%20Control%20Systems&amp;severity=critical&amp;id=699477d280d747be20b76d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/api-threats-grow-in-scale-as-ai-expands-the-blast--2e69a229</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=API%20Threats%20Grow%20in%20Scale%20as%20AI%20Expands%20the%20Blast%20Radius&amp;severity=medium&amp;id=699477d280d747be20b76d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23861-cwe-79-improper-neutralization-of-i-0569a841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%20vApp%2C&amp;severity=medium&amp;id=6994782680d747be20b7ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7706-cwe-306-missing-authentication-for-c-b448fb38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7706%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TUBITAK%20BILGEM%20Software%20Technologies%20Research%20Institute%20Liderahenk&amp;severity=medium&amp;id=699470fb80d747be20b50362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25087-cwe-416-use-after-free-in-apache-so-03b761d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25087%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Arrow&amp;severity=high&amp;id=699470fb80d747be20b50365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2615-command-injection-in-wavlink-wl-nu51-f6063523</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2615%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699469f380d747be20b30312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-linked-to-phobos-ransomware-arrested-in-poland-3b18f07a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20Linked%20to%20Phobos%20Ransomware%20Arrested%20in%20Poland&amp;severity=medium&amp;id=6994663c80d747be20b1b382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartloader-attack-uses-trojanized-oura-mcp-server-98cb6579</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartLoader%20Attack%20Uses%20Trojanized%20Oura%20MCP%20Server%20to%20Deploy%20StealC%20Infostealer&amp;severity=medium&amp;id=6995909980d747be205dea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tablet-conqueror-and-the-links-between-major-a-456f5297</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20tablet%20conqueror%20and%20the%20links%20between%20major%20Android%20botnets&amp;severity=medium&amp;id=6994909f80d747be20bf9d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8303-cwe-79-improper-neutralization-of-in-44be8a63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20EKA%20Software%20Computer%20Information%20Advertising%20Services%20Ltd.%20Real%20Estate%20Script%20V5%20(With%20Doping%20Module%20%E2%80%93%20Store%20Module%20%E2%80%93%20New%20Language%20System)&amp;severity=medium&amp;id=69945be380d747be20af629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7631-cwe-89-improper-neutralization-of-sp-5ca07faf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7631%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tumeva%20Internet%20Technologies%20Software%20Information%20Advertising%20and%20Consulting%20Services%20Trade%20Ltd.%20Co.%20Tumeva%20Prime%20News%20Software&amp;severity=high&amp;id=6994585e80d747be20ae418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2247-cwe-89-improper-neutralization-of-sp-b8f5f03e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Clickedu%20SaaS%20platform&amp;severity=high&amp;id=6994585e80d747be20ae4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2608-cwe-862-missing-authorization-in-ste-f8e195f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2608%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Kadence%20Blocks%20%E2%80%94%20Page%20Builder%20Toolkit%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=6994515780d747be20ac24ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3-threat-groups-started-targeting-icsot-in-2025-dr-67494e06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%20Threat%20Groups%20Started%20Targeting%20ICS%2FOT%20in%202025%3A%20Dragos&amp;severity=medium&amp;id=69944da080d747be20aa71bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25903-cwe-862-missing-authorization-in-ap-96d68c81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25903%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69943fc480d747be20a60510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-finds-summarize-with-ai-prompts-manipula-f515017d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Finds%20%E2%80%9CSummarize%20with%20AI%E2%80%9D%20Prompts%20Manipulating%20Chatbot%20Recommendations&amp;severity=medium&amp;id=69943af180d747be20a42712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-managers-vulnerable-to-vault-compromise-u-4a6c986f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Managers%20Vulnerable%20to%20Vault%20Compromise%20Under%20Malicious%20Server&amp;severity=medium&amp;id=6994388980d747be20a2d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1216-cwe-79-improper-neutralization-of-in-1a4c00e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=high&amp;id=699438cd80d747be20a32bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-incident-report-used-in-phishing-campaign-tue-566cec83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Incident%20Report%20Used%20in%20Phishing%20Campaign%2C%20(Tue%2C%20Feb%2017th)&amp;severity=medium&amp;id=69943c3e80d747be20a4e763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-tests-end-to-end-encrypted-rcs-messaging-in--81f691ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Tests%20End-to-End%20Encrypted%20RCS%20Messaging%20in%20iOS%2026.4%20Developer%20Beta&amp;severity=medium&amp;id=69943af180d747be20a42715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0829-cwe-862-missing-authorization-in-fro-323c4855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0829%3A%20CWE-862%20Missing%20Authorization%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69940acad1735ca73126f76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1657-cwe-862-missing-authorization-in-met-a2523868</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1657%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=6994003ed1735ca7311ee332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2592-cwe-284-improper-access-control-in-z-22959dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2592%3A%20CWE-284%20Improper%20Access%20Control%20in%20zarinpal%20Zarinpal%20Gateway&amp;severity=high&amp;id=6993f937d1735ca7311a09bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2002-cwe-79-improper-neutralization-of-in-2ec61ced</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6993f937d1735ca7311a09bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26220-cwe-502-deserialization-of-untruste-3d57a118</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26220%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ModelTC%20LightLLM&amp;severity=critical&amp;id=6994257080d747be207b7270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70397-na-47a1cc8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70397%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be20537850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55270-na-03bef1f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55270%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26736-na-558b5db5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26736%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26732-na-96df64c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26732%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26731-na-626ee67c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26731%3A%20n%2Fa&amp;severity=high&amp;id=699575bd80d747be205377f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59793-na-8a24ed08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59793%3A%20n%2Fa&amp;severity=critical&amp;id=699575bd80d747be205377e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67905-na-fa4970fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67905%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be20537726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32355-na-085b6720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32355%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053770f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70846-na-5e0ec656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70846%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be205376c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67102-na-4a2a6626</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67102%3A%20n%2Fa&amp;severity=high&amp;id=699575bb80d747be2053769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-17-43270302</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-17&amp;severity=medium&amp;id=6995046d80d747be20e1792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65753-na-a83a2ef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65753%3A%20n%2Fa&amp;severity=high&amp;id=6994a23480d747be20c6db0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55271-na-4ed4070f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55271%3A%20n%2Fa&amp;severity=low&amp;id=6994a23480d747be20c6db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70830-na-05399173</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70830%3A%20n%2Fa&amp;severity=critical&amp;id=69948d1c80d747be20bdf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70828-na-795b8689</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70828%3A%20n%2Fa&amp;severity=high&amp;id=69948d1c80d747be20bdf6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70829-na-8558d9cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70829%3A%20n%2Fa&amp;severity=medium&amp;id=6994861680d747be20bbcc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-17-96a06716</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-17&amp;severity=low&amp;id=6993d5d8d1735ca731db4256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12062-cwe-22-improper-limitation-of-a-pat-191a7218</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12062%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Store%20Locator%2CGoogle%20Maps%2COpenStreetMap%2CMapbox%2CListing%2CDirectory%20%26%20Filters&amp;severity=high&amp;id=6993abded1735ca731bdefea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2439-cwe-340-generation-of-predictable-nu-8847b5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2439%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BVA%20Concierge%3A%3ASessions&amp;severity=critical&amp;id=69938fbfd1735ca731b5ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15578-cwe-338-use-of-cryptographically-we-572f6a23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15578%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20TEEJAY%20Maypole&amp;severity=critical&amp;id=69938c3ad1735ca731b45482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2474-cwe-122-heap-based-buffer-overflow-i-3d94ea2a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2474%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20DDICK%20Crypt%3A%3AURandom&amp;severity=high&amp;id=6994257080d747be207b7278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2001-cwe-862-missing-authorization-in-wpx-dd0b0e65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2001%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20WowRevenue%20%E2%80%93%20Product%20Bundles%20%26%20Bulk%20Discounts&amp;severity=high&amp;id=6993739ed1735ca731a8ba4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-steals-openclaw-ai-agent-configuration-8bbd2b7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Steals%20OpenClaw%20AI%20Agent%20Configuration%20Files%20and%20Gateway%20Tokens&amp;severity=medium&amp;id=69943af180d747be20a42718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/study-uncovers-25-password-recovery-attacks-in-maj-6f2cde85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Study%20Uncovers%2025%20Password%20Recovery%20Attacks%20in%20Major%20Cloud%20Password%20Managers&amp;severity=medium&amp;id=69943af180d747be20a4271b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16th-february-threat-intelligence-report-aa8bfcdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=low&amp;id=69943ba880d747be20a474a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2567-stack-based-buffer-overflow-in-wavli-0c1e9353</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2567%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6993577fd1735ca7319ea144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2566-stack-based-buffer-overflow-in-wavli-f35978e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2566%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=699353fad1735ca7319d6c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2565-stack-based-buffer-overflow-in-wavli-6deb4b90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2565%3A%20Stack-based%20Buffer%20Overflow%20in%20Wavlink%20WL-NU516U1&amp;severity=high&amp;id=6994257080d747be207b7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26930-cwe-79-improper-neutralization-of-i-8e58780b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SmarterTools%20SmarterMail&amp;severity=high&amp;id=6994257080d747be207b727c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2101-cwe-79-improper-neutralization-of-in-15efa45d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIAvpm%20Web%20Access&amp;severity=high&amp;id=6994257080d747be207b7286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2564-weak-password-recovery-in-intelbras--15b4ad92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2564%3A%20Weak%20Password%20Recovery%20in%20Intelbras%20VIP%203260%20Z%20IA&amp;severity=critical&amp;id=6994257080d747be207b7289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2563-privilege-escalation-in-jingdong-jd--d2760a62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2563%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=6994257080d747be207b728e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dior-louis-vuitton-tiffany-fined-25-million-in-sou-2f72e32c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dior%2C%20Louis%20Vuitton%2C%20Tiffany%20Fined%20%2425%20Million%20in%20South%20Korea%20After%20Data%20Breaches&amp;severity=medium&amp;id=69933423d1735ca731935dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2562-privilege-escalation-in-jingdong-jd--f3eb266d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2562%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=69933465d1735ca73193848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2561-privilege-escalation-in-jingdong-jd--0fdfd21b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2561%3A%20Improper%20Privilege%20Management%20in%20JingDong%20JD%20Cloud%20Box%20AX6600&amp;severity=medium&amp;id=699330d2d1735ca731922b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ai-assistant-extensions-targeting-260000-chro-971e4e95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AI%20Assistant%20Extensions%20Targeting%20260%2C000%20Chrome%20Users%20via%20injected%20iframes&amp;severity=medium&amp;id=6994942680d747be20c100a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-macromaze-new-apt28-campaign-using-basic-8c994355</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MacroMaze%3A%20New%20APT28%20Campaign%20Using%20Basic%20Tooling%20and%20Legitimate%20Infrastructure&amp;severity=medium&amp;id=6994942680d747be20c10099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2032-vulnerability-in-mozilla-firefox-for-3fb5eb69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2032%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=6994257180d747be207b740f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2447-vulnerability-in-mozilla-firefox-ef99469f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2447%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6994257180d747be207b740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2560-os-command-injection-in-kalcaddle-ko-1fd95a3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2560%3A%20OS%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=69932648d1735ca7318be8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-17-beta-strengthens-secure-by-default-desi-e8c0e0a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%2017%20Beta%20Strengthens%20Secure-by-Default%20Design%20for%20Privacy%20and%20App%20Security&amp;severity=medium&amp;id=69932290d1735ca731892ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-navigates-dhs-shutdown-with-reduced-staff-3f2ba258</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Navigates%20DHS%20Shutdown%20With%20Reduced%20Staff&amp;severity=medium&amp;id=69932290d1735ca731892ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1335-cwe-787-out-of-bounds-write-in-dassa-22d5a00c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1335%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1334-cwe-125-out-of-bounds-read-in-dassau-5f48827a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1334%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1333-cwe-457-use-of-uninitialized-variabl-1f2a1adb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1333%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=699322e0d1735ca7318966e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2558-server-side-request-forgery-in-geeka-7a60bbf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2558%3A%20Server-Side%20Request%20Forgery%20in%20GeekAI&amp;severity=medium&amp;id=699322e0d1735ca7318966eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-openclaw-risks-clawdbot-moltbot-kaspersky-offi-a732c8e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20OpenClaw%20risks%2C%20Clawdbot%2C%20Moltbot%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69931bf6d1735ca731864664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2557-cross-site-scripting-in-cskefu-a32390c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2557%3A%20Cross%20Site%20Scripting%20in%20cskefu&amp;severity=medium&amp;id=69931bbad1735ca731861d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-outlook-add-ins-hijack-0-day-patches--0d4cc800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weekly%20Recap%3A%20Outlook%20Add-Ins%20Hijack%2C%200-Day%20Patches%2C%20Wormable%20Botnet%20%26%20AI%20Malware&amp;severity=low&amp;id=69943af180d747be20a4271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2556-server-side-request-forgery-in-cskef-9b320b42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2556%3A%20Server-Side%20Request%20Forgery%20in%20cskefu&amp;severity=medium&amp;id=699314b2d1735ca73181d582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2555-deserialization-in-jeecgboot-47ee4cd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2555%3A%20Deserialization%20in%20JeecgBoot&amp;severity=low&amp;id=69931f3ed1735ca73187d04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-clickfix-attack-abusing-dns-loo-0fffbe0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20ClickFix%20Attack%20Abusing%20DNS%20Lookups&amp;severity=medium&amp;id=69930679d1735ca7315980e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safe-and-inclusive-esociety-how-lithuania-is-braci-dbbd7465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safe%20and%20Inclusive%20E%E2%80%91Society%3A%20How%20Lithuania%20Is%20Bracing%20for%20AI%E2%80%91Driven%20Cyber%20Fraud&amp;severity=medium&amp;id=69931da4d1735ca731873d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2418-cwe-601-url-redirection-to-untrusted-fc5517c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2418%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20TR7%20Cyber%20%E2%80%8B%E2%80%8BDefense%20Inc.%20Web%20Application%20Firewall&amp;severity=medium&amp;id=699306bfd1735ca7315a65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2553-sql-injection-in-tushar-2223-hotel-m-f8823bdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2553%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=699306bfd1735ca7315a65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2552-path-traversal-in-zentao-5658ef66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2552%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992fd2fbda29fb02f6aa184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-and-ninja-browser-malware-campaign-a-3606198a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20and%20Ninja%20Browser%20malware%20campaign%20abusing%20Google%20Groups&amp;severity=medium&amp;id=6992f9abbda29fb02f68dd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2551-path-traversal-in-zentao-868a3066</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2551%3A%20Path%20Traversal%20in%20ZenTao&amp;severity=medium&amp;id=6992f627bda29fb02f6786e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-zerodayrat-mobile-spyware-enables-real-time-su-d5c92f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ZeroDayRAT%20Mobile%20Spyware%20Enables%20Real-Time%20Surveillance%20and%20Data%20Theft&amp;severity=medium&amp;id=69931da4d1735ca731873d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2452-cwe-627-dynamic-variable-evaluation--1e0b8836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2452%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-newsletter&amp;severity=high&amp;id=6992f627bda29fb02f6786dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2451-cwe-627-dynamic-variable-evaluation--3e2879f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2451%3A%20CWE-627%20Dynamic%20Variable%20Evaluation%20in%20pretix%20pretix-doistep&amp;severity=high&amp;id=6992f627bda29fb02f6786da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2550-unrestricted-upload-in-efm-iptime-a6-a8baac0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2550%3A%20Unrestricted%20Upload%20in%20EFM%20iptime%20A6004MX&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2577-cwe-306-missing-authentication-for-c-d0d526e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2577%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HKUDS%20nanobot&amp;severity=critical&amp;id=6992ef1fbda29fb02f643b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2549-improper-access-controls-in-zhanghua-d9a74f1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2549%3A%20Improper%20Access%20Controls%20in%20zhanghuanhao%20LibrarySystem%20%E5%9B%BE%E4%B9%A6%E9%A6%86%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=6992eb9bbda29fb02f62aae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2548-command-injection-in-wayos-fbm-220g-21493729</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2548%3A%20Command%20Injection%20in%20WAYOS%20FBM-220G&amp;severity=medium&amp;id=69930886d1735ca7315e7f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2547-cross-site-scripting-in-ligerosmart-10ccf03b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2547%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992da08bda29fb02f5c0246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2546-cross-site-scripting-in-ligerosmart-e8ff2733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2546%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992d684bda29fb02f5a9bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-first-actively-exploited-chrome-zer-9fc21206</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20First%20Actively%20Exploited%20Chrome%20Zero-Day%20of%202026&amp;severity=medium&amp;id=6992cf48bda29fb02f56ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2026-64-bits-malware-trend-mon-feb-16th-76ab2197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2026%2064-Bits%20Malware%20Trend%2C%20(Mon%2C%20Feb%2016th)&amp;severity=low&amp;id=69931e47d1735ca7318782d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2545-cross-site-scripting-in-ligerosmart-43aa65d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2545%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2544-os-command-injection-in-yued-fe-lulu-aec8889b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2544%3A%20OS%20Command%20Injection%20in%20yued-fe%20LuLu%20UI&amp;severity=medium&amp;id=6992cbf7bda29fb02f561cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2543-unverified-password-change-in-vichan-bedef274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2543%3A%20Unverified%20Password%20Change%20in%20vichan-devel%20vichan&amp;severity=medium&amp;id=6992c4f0bda29fb02f53b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chrome-zero-day-cve-2026-2441-under-active-att-ba9a1f06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chrome%20Zero-Day%20(CVE-2026-2441)%20Under%20Active%20Attack%20%E2%80%94%20Patch%20Released&amp;severity=high&amp;id=69931da4d1735ca731873d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2542-unquoted-search-path-in-total-vpn-86fa0d9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2542%3A%20Unquoted%20Search%20Path%20in%20Total%20VPN&amp;severity=high&amp;id=6992bde8bda29fb02f5127ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2538-uncontrolled-search-path-in-flos-fre-d9540b5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2538%3A%20Uncontrolled%20Search%20Path%20in%20Flos%20Freeware%20Notepad2&amp;severity=high&amp;id=6992b6dfbda29fb02f4dd9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0929-cwe-862-missing-authorization-in-reg-a36cfddd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0929%3A%20CWE-862%20Missing%20Authorization%20in%20RegistrationMagic&amp;severity=medium&amp;id=69930886d1735ca7315e7f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2537-command-injection-in-comfast-cf-e4-d2596177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2537%3A%20Command%20Injection%20in%20Comfast%20CF-E4&amp;severity=medium&amp;id=6992b36bbda29fb02f4bb440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2536-xml-external-entity-reference-in-ope-cff9a8a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2536%3A%20XML%20External%20Entity%20Reference%20in%20opencc%20JFlow&amp;severity=medium&amp;id=6992ac53bda29fb02f486070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2535-command-injection-in-comfast-cf-n1-v-8437b00c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2535%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=6992a54bbda29fb02f457206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2534-command-injection-in-comfast-cf-n1-v-8ba549f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2534%3A%20Command%20Injection%20in%20Comfast%20CF-N1%20V2&amp;severity=medium&amp;id=69929abfbda29fb02f425d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2533-command-injection-in-tosei-self-serv-3617be85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2533%3A%20Command%20Injection%20in%20Tosei%20Self-service%20Washing%20Machine&amp;severity=medium&amp;id=69929abfbda29fb02f425d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2532-server-side-request-forgery-in-lints-c44236a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2532%3A%20Server-Side%20Request%20Forgery%20in%20lintsinghua%20DeepAudit&amp;severity=medium&amp;id=69928cafbda29fb02f1ec50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2531-server-side-request-forgery-in-minds-fd7157b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2531%3A%20Server-Side%20Request%20Forgery%20in%20MindsDB&amp;severity=medium&amp;id=69928cafbda29fb02f1ec505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2530-command-injection-in-wavlink-wl-wn57-daec65f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2530%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69928cafbda29fb02f1ec4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2529-command-injection-in-wavlink-wl-wn57-744d9dbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2529%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2528-command-injection-in-wavlink-wl-wn57-1a573700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2528%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f126094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2527-command-injection-in-wavlink-wl-wn57-afb46441</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2527%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927ea0bda29fb02f12608e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2526-command-injection-in-wavlink-wl-wn57-d05d2dfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2526%3A%20Command%20Injection%20in%20Wavlink%20WL-WN579A3&amp;severity=medium&amp;id=69927413bda29fb02f0e1194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2525-denial-of-service-in-free5gc-897c96c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2525%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69927413bda29fb02f0e118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2524-denial-of-service-in-open5gs-6effde78</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2524%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2523-reachable-assertion-in-open5gs-c69cfefb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2523%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69926d0abda29fb02f03f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65717-na-1fa0a602</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65717%3A%20n%2Fa&amp;severity=medium&amp;id=6994257180d747be207b7406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65716-na-7ce38e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65716%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b729c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65715-na-fdb8ef7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65715%3A%20n%2Fa&amp;severity=high&amp;id=6994257080d747be207b7298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-16-388c1363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-16&amp;severity=medium&amp;id=6993b2afd1735ca731bf33b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-16-309da41c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-16&amp;severity=low&amp;id=6992ba2ebda29fb02f4f9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2522-memory-corruption-in-open5gs-7f05b583</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2522%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=69925b77bda29fb02fd9898a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2521-memory-corruption-in-open5gs-c3391632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2521%3A%20Memory%20Corruption%20in%20Open5GS&amp;severity=medium&amp;id=699253b94b0e3abdf99ab24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26369-improper-privilege-management-in-ju-f86570ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26369%3A%20Improper%20Privilege%20Management%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26368-missing-authorization-in-jung-enet--3a6df6c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26368%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26367-missing-authorization-in-jung-enet--173718f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26367%3A%20Missing%20Authorization%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=high&amp;id=6991ea414b0e3abdf972b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26366-use-of-default-credentials-in-jung--23983d02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26366%3A%20Use%20of%20Default%20Credentials%20in%20JUNG%20eNet%20SMART%20HOME%20server&amp;severity=critical&amp;id=6991ea414b0e3abdf972b00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-discloses-dns-based-clickfix-attack-usin-fbef1593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Discloses%20DNS-Based%20ClickFix%20Attack%20Using%20Nslookup%20for%20Malware%20Staging&amp;severity=medium&amp;id=6992699ebda29fb02fff2c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2517-denial-of-service-in-open5gs-08313086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2517%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6991c0114b0e3abdf95dbbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2516-uncontrolled-search-path-in-unidocs--c9898b25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2516%3A%20Uncontrolled%20Search%20Path%20in%20Unidocs%20ezPDF%20DRM%20Reader&amp;severity=high&amp;id=6991bc8d4b0e3abdf95c3022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2541-cwe-331-insufficient-entropy-in-micc-57e2a0ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2541%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=6991aaf94b0e3abdf953ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2540-cwe-288-authentication-bypass-using--06adb1fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2540%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=high&amp;id=6991aaf94b0e3abdf953ce6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2539-cwe-319-cleartext-transmission-of-se-fff717fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2539%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Micca%20Auto%20Electronics%20Co.%2C%20Ltd.%20Car%20Alarm%20System%20KE700&amp;severity=medium&amp;id=69925668bda29fb02fd3ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32063-cwe-306-missing-authentication-for--681dee89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32063%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32062-cwe-121-stack-based-buffer-overflow-2fc9767c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32062%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32061-cwe-121-stack-based-buffer-overflow-92f71bd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32061%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32060-cwe-347-improper-verification-of-cr-41ae0f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32060%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=6991a7744b0e3abdf9520b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32059-cwe-121-stack-based-buffer-overflow-162b7b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32059%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=high&amp;id=6991a7744b0e3abdf9520b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32058-cwe-121-stack-based-buffer-overflow-68f844de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32058%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=critical&amp;id=6991a7744b0e3abdf9520b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1793-cwe-22-improper-limitation-of-a-path-4752164f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1793%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699151874b0e3abdf9d7dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1750-cwe-269-improper-privilege-managemen-02c6a8ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1750%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ecwid%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart&amp;severity=high&amp;id=699151874b0e3abdf9d7dedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1490-cwe-350-reliance-on-reverse-dns-reso-0fc3066a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1490%3A%20CWE-350%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20cleantalk%20Spam%20protection%2C%20Honeypot%2C%20Anti-Spam%20by%20CleanTalk&amp;severity=critical&amp;id=69913eb4c9e1ff5ad8fbefbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-15-2c822212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-15&amp;severity=medium&amp;id=69926249bda29fb02ff8a81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-15-3a1244b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-15&amp;severity=low&amp;id=69919cb34b0e3abdf946b1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300-malicious-chrome-extensions-caught-leakin-5e10fd10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%20Malicious%20Chrome%20Extensions%20Caught%20Leaking%20or%20Stealing%20User%20Data&amp;severity=medium&amp;id=69906489c9e1ff5ad887c2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2312-cwe-862-missing-authorization-in-max-a02e1ede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2312%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=69906138c9e1ff5ad886470f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1512-cwe-79-improper-neutralization-of-in-96d8989a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6990489cc9e1ff5ad87d7ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1258-cwe-89-improper-neutralization-of-sp-f39be00a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1258%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Newsletters%2C%20Email%20Marketing%2C%20Automation%2C%20WooCommerce%20Emails%2C%20Post%20Notification%2C%20and%20more&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0550-cwe-79-improper-neutralization-of-in-c7aab6e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20myCred%20%E2%80%93%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Program.&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8572-cwe-269-improper-privilege-managemen-357fd27c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8572%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=69903384c9e1ff5ad8746a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1843-cwe-79-improper-neutralization-of-in-da8cc8a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Super%20Page%20Cache&amp;severity=high&amp;id=69903384c9e1ff5ad8746a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1254-cwe-862-missing-authorization-in-wpc-c0fbfd3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1254%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Modula%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1249-cwe-918-server-side-request-forgery--1a4e68ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1249%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=69903384c9e1ff5ad8746a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1988-cwe-98-improper-control-of-filename--9af2696b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1988%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpdecent%20Flexi%20Product%20Slider%20and%20Grid%20for%20WooCommerce&amp;severity=high&amp;id=69901aeec9e1ff5ad868940c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1987-cwe-639-authorization-bypass-through-b74bd663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20morelmathieuj%20Scheduler%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0736-cwe-79-improper-neutralization-of-in-b1ef6454</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collectchat%20Chatbot%20for%20WordPress%20by%20Collect.chat%20%E2%9A%A1%EF%B8%8F&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1187-cwe-79-improper-neutralization-of-in-7770e71d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terrazoom%20ZoomifyWP%20Free&amp;severity=medium&amp;id=69901aecc9e1ff5ad868938e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1915-cwe-79-improper-neutralization-of-in-a7b5b569</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestony%20Simple%20Plyr&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1985-cwe-79-improper-neutralization-of-in-aac7a77d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arieslab%20Press3D&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0753-cwe-79-improper-neutralization-of-in-6158470c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitacre%20Super%20Simple%20Contact%20Form&amp;severity=high&amp;id=69901aecc9e1ff5ad8689381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1306-cwe-434-unrestricted-upload-of-file--95798a0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1306%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20adminkov%20midi-Synth&amp;severity=critical&amp;id=69901aecc9e1ff5ad8689399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0735-cwe-79-improper-neutralization-of-in-90791c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webilop%20User%20Language%20Switch&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15483-cwe-79-improper-neutralization-of-i-7adcdaf1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15483%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajferg%20Link%20Hopper&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1303-cwe-862-missing-authorization-in-mat-619170e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1303%3A%20CWE-862%20Missing%20Authorization%20in%20matthieuscarset%20MailChimp%20Campaigns&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1910-cwe-79-improper-neutralization-of-in-eb230e1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upmenu%20UpMenu%20%E2%80%93%20Online%20ordering%20for%20restaurants&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0693-cwe-79-improper-neutralization-of-in-24714602</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnoesterhuizen%20Allow%20HTML%20in%20Category%20Descriptions&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1096-cwe-79-improper-neutralization-of-in-1ba42204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raju_ahmed%20Best-wp-google-map&amp;severity=medium&amp;id=69901aecc9e1ff5ad8689388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0559-cwe-79-improper-neutralization-of-in-3ffb3a17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1394-cwe-352-cross-site-request-forgery-c-bd95f994</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dmitritechs%20WP%20Quick%20Contact%20Us&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1905-cwe-79-improper-neutralization-of-in-0538bb4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devmw%20Sphere%20Manager&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14852-cwe-352-cross-site-request-forgery--9b67a2c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20antevenio%20MDirector%20Newsletter&amp;severity=medium&amp;id=69901aebc9e1ff5ad86892ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1944-cwe-862-missing-authorization-in-kre-7484832f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1944%3A%20CWE-862%20Missing%20Authorization%20in%20krellbat%20CallbackKiller%20service%20widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0557-cwe-79-improper-neutralization-of-in-477d19e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peterschulznl%20WP%20Data%20Access%20%E2%80%93%20No-Code%20App%20Builder%20with%20Tables%2C%20Forms%2C%20Charts%20%26%20Maps&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2024-cwe-89-improper-neutralization-of-sp-e9679b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2024%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20savitasoni%20PhotoStack%20Gallery&amp;severity=high&amp;id=69901aeec9e1ff5ad8689418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1939-cwe-79-improper-neutralization-of-in-2797da7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cutesalah%20Percent%20to%20Infograph&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1795-cwe-79-improper-neutralization-of-in-f021e9a5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1795%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sivenso%20Address%20Bar%20Ads&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1903-cwe-79-improper-neutralization-of-in-ad4b822d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shellbot%20Ravelry%20Designs%20Widget&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1792-cwe-79-improper-neutralization-of-in-5d191d6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20owencutajar%20Geo%20Widget&amp;severity=medium&amp;id=69901aecc9e1ff5ad86893a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0745-cwe-918-server-side-request-forgery--d2649c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0745%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webilop%20User%20Language%20Switch&amp;severity=high&amp;id=69901aecc9e1ff5ad8689375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2022-cwe-862-missing-authorization-in-edg-f55545e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2022%3A%20CWE-862%20Missing%20Authorization%20in%20edgarrojas%20Smart%20Forms%20%E2%80%93%20when%20you%20need%20more%20than%20just%20a%20contact%20form&amp;severity=medium&amp;id=69901aeec9e1ff5ad8689413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1901-cwe-79-improper-neutralization-of-in-1eecf619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20questionpro%20QuestionPro%20Surveys&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14873-cwe-352-cross-site-request-forgery--070bf878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14873%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=69901aebc9e1ff5ad8689304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0727-cwe-862-missing-authorization-in-ess-2f6c0588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0727%3A%20CWE-862%20Missing%20Authorization%20in%20essentialplugin%20Accordion%20and%20Accordion%20Slider&amp;severity=medium&amp;id=69901aebc9e1ff5ad868931d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0751-cwe-79-improper-neutralization-of-in-c61be848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandonfire%20Payment%20Page%20%7C%20Payment%20Form%20for%20Stripe&amp;severity=medium&amp;id=69901aecc9e1ff5ad868937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6792-cwe-306-missing-authentication-for-c-1e53c2e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6792%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20amentotechpvtltd%20One%20to%20one%20user%20Chat%20by%20WPGuppy&amp;severity=medium&amp;id=69901aebc9e1ff5ad868930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1796-cwe-79-improper-neutralization-of-in-c8d86ecc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20indextwo%20StyleBidet&amp;severity=medium&amp;id=69901aedc9e1ff5ad86893bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1932-cwe-862-missing-authorization-in-bss-73d0e9c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1932%3A%20CWE-862%20Missing%20Authorization%20in%20bssoftware%20Appointment%20Booking%20Calendar%20Plugin%20%E2%80%93%20Bookr&amp;severity=medium&amp;id=699010d0c9e1ff5ad864b5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2469-improper-neutralization-of-special-e-90b4e04e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2469%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20directorytree%2Fimapengine&amp;severity=high&amp;id=69901846c9e1ff5ad867f1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0692-cwe-862-missing-authorization-in-blu-69b2b913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0692%3A%20CWE-862%20Missing%20Authorization%20in%20bluesnap%20BlueSnap%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c71ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1912-cwe-79-improper-neutralization-of-in-35e454d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1912%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ulaulaman%20Citations%20tools&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1983-cwe-352-cross-site-request-forgery-c-ced2e775</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1983%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sourcez%20SEATT%3A%20Simple%20Event%20Attendance&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c7206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1164-cwe-79-improper-neutralization-of-in-d439c77f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1164%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phoenixstudiodz%20Easy%20Voice%20Mail&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1904-cwe-79-improper-neutralization-of-in-f585d933</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Simple%20Wp%20colorfull%20Accordion&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1754-cwe-79-improper-neutralization-of-in-d238dc53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexeyknyazev%20personal-authors-category&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c71f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2144-cwe-269-improper-privilege-managemen-86e5e526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2144%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20katsushi-kawamori%20Magic%20Login%20Mail%20or%20QR%20Code&amp;severity=high&amp;id=698ffec8c9e1ff5ad85c7211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2027-cwe-79-improper-neutralization-of-in-ab34f6ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ampenhancer%20AMP%20Enhancer%20%E2%80%93%20Compatibility%20Layer%20for%20Official%20AMP%20Plugin&amp;severity=medium&amp;id=698ffec8c9e1ff5ad85c720b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-on-the-edge-of-the-web-and-mobile-using-q-9c0e2dc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20on%20the%20Edge%20of%20the%20Web%20and%20Mobile%20Using%20QR%20Codes&amp;severity=medium&amp;id=6992f627bda29fb02f678619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14608-cwe-862-missing-authorization-in-in-75b65e8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14608%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14067-cwe-862-missing-authorization-in-ha-9b0973c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14067%3A%20CWE-862%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder%20by%20WhiteStudio%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13973-cwe-200-exposure-of-sensitive-infor-87f72582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13973%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kasuga16%20StickEasy%20Protected%20Contact%20Form&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13681-cwe-22-improper-limitation-of-a-pat-bc28d7b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13681%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thebaldfatguy%20BFG%20Tools%20%E2%80%93%20Extension%20Zipper&amp;severity=medium&amp;id=69901846c9e1ff5ad867f1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-14-c654b42a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-14&amp;severity=medium&amp;id=699110cac9e1ff5ad8c8365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-14-389c6444</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-14&amp;severity=low&amp;id=698ff083c9e1ff5ad817a9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26273-cwe-200-exposure-of-sensitive-infor-d59f1dbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20idno%20known&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1841-cwe-79-improper-neutralization-of-in-da2dead1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1844-cwe-79-improper-neutralization-of-in-13a5fcdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1844%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15157-cwe-862-missing-authorization-in-st-7fd1e561</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15157%3A%20CWE-862%20Missing%20Authorization%20in%20starfishwp%20Starfish%20Review%20Generation%20%26%20Marketing%20for%20WordPress&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26334-cwe-798-use-of-hard-coded-credentia-74ab6645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26334%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Calero%20VeraSMART&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26333-cwe-306-missing-authentication-for--bbf1e7d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26333%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26335-cwe-321-use-of-hard-coded-cryptogra-07023d75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26335%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Calero%20VeraSMART&amp;severity=critical&amp;id=698f9c59c9e1ff5ad86a8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26208-cwe-502-deserialization-of-untruste-4dc06e3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26208%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Alex4SSB%20ADB-Explorer&amp;severity=high&amp;id=698f793ac9e1ff5ad85a8a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26190-cwe-306-missing-authentication-for--6b5551d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26190%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=698f793ac9e1ff5ad85a8a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26187-cwe-22-improper-limitation-of-a-pat-b61d1b8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26187%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20treeverse%20lakeFS&amp;severity=high&amp;id=698f723cc9e1ff5ad857abde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25991-cwe-918-server-side-request-forgery-fb24aa80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25991%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TandoorRecipes%20recipes&amp;severity=high&amp;id=698f723cc9e1ff5ad857abd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2441-use-after-free-in-google-chrome-1b1b8c59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2441%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698f723cc9e1ff5ad857abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25964-cwe-22-improper-limitation-of-a-pat-9ddfb3f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25964%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TandoorRecipes%20recipes&amp;severity=medium&amp;id=698f723cc9e1ff5ad857abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ties-suspected-russian-actor-to-canfail-mal-4b808088</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Ties%20Suspected%20Russian%20Actor%20to%20CANFAIL%20Malware%20Attacks%20on%20Ukrainian%20Orgs&amp;severity=medium&amp;id=698f605fc9e1ff5ad84f914a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1790-execution-with-unnecessary-privilege-abe9bcfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1790%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Genetec%20Inc.%20Genetec%20Sipelia&amp;severity=medium&amp;id=698f5d11c9e1ff5ad84e392b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26226-cwe-79-improper-neutralization-of-i-47603533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lukilabs%20beautiful-mermaid&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-china-iran-russia-north-korea-to-coor-be696efd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Links%20China%2C%20Iran%2C%20Russia%2C%20North%20Korea%20to%20Coordinated%20Defense%20Sector%20Cyber%20Operations&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2026-cwe-276-incorrect-default-permission-871e516d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2026%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Agent&amp;severity=medium&amp;id=698f5286c9e1ff5ad84a5d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9921-deploys-voidlink-malware-to-target-techno-ff44eb2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9921%20Deploys%20VoidLink%20Malware%20to%20Target%20Technology%20and%20Financial%20Sectors&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26221-cwe-502-deserialization-of-untruste-9949df79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26221%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hyland%20OnBase%20Workflow%20Timer%20Service&amp;severity=critical&amp;id=698f4474c9e1ff5ad8426b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-google-looks-at-ai-abuse-trump-pause-beabdaf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Google%20Looks%20at%20AI%20Abuse%2C%20Trump%20Pauses%20China%20Bans%2C%20Disney%E2%80%99s%20%242.7M%20Fine&amp;severity=medium&amp;id=698f3d39c9e1ff5ad83e90c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1578-cwe-79-in-hp-inc-hp-app-fbc79362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1578%3A%20CWE-79%20in%20HP%20Inc%20HP%20App&amp;severity=medium&amp;id=698f40f0c9e1ff5ad8409b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1619-cwe-639-authorization-bypass-through-f50fd75b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1619%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1618-cwe-288-authentication-bypass-using--4e2f8f4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1618%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14349-cwe-267-privilege-defined-with-unsa-4d64021b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14349%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Universal%20Software%20Inc.%20FlexCity%2FKiosk&amp;severity=high&amp;id=698f2856c9e1ff5ad831b991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-carrier-odido-discloses-data-breach-impactin-e3d3a0d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Carrier%20Odido%20Discloses%20Data%20Breach%20Impacting%206%20Million&amp;severity=medium&amp;id=698f1309c9e1ff5ad826ee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2443-out-of-bounds-read-in-red-hat-red-ha-7926b12b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2443%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=698f214cc9e1ff5ad82dd77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33042-cwe-94-improper-control-of-generati-afe678c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33042%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Avro%20Java%20SDK&amp;severity=high&amp;id=698f16c1c9e1ff5ad828f5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extensions-caught-stealing-busine-8d267a5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extensions%20Caught%20Stealing%20Business%20Data%2C%20Emails%2C%20and%20Browsing%20History&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-vulnerability-targeted-by-hackers-with-450e3726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Vulnerability%20Targeted%20by%20Hackers%20Within%2024%20Hours%20of%20PoC%20Release&amp;severity=critical&amp;id=698f04f9c9e1ff5ad81fd15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npms-update-to-harden-their-supply-chain-and-point-a4628ed5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%E2%80%99s%20Update%20to%20Harden%20Their%20Supply%20Chain%2C%20and%20Points%20to%20Consider&amp;severity=medium&amp;id=699067a1c9e1ff5ad8890c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-solarwinds-notepad-microso-e99c0319</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20SolarWinds%2C%20Notepad%2B%2B%2C%20Microsoft%20Vulnerabilities&amp;severity=medium&amp;id=698f0175c9e1ff5ad81defee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-weaponize-rmm-tools-via-zoom-meet-teams--bedec14e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Weaponize%20RMM%20Tools%20via%20Zoom%2C%20Meet%2C%20%26%20Teams%20Lures&amp;severity=medium&amp;id=698f1dccc9e1ff5ad82c8dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0872-cwe-295-improper-certificate-validat-05369c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0872%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Thales%20SafeNet%20Agent%20for%20Windows%20Logon&amp;severity=low&amp;id=698f214cc9e1ff5ad82dd777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-observe-in-the-wild-exploitation-of-be-7ab8e8f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Observe%20In-the-Wild%20Exploitation%20of%20BeyondTrust%20CVSS%209.9%20Vulnerability&amp;severity=critical&amp;id=699067a1c9e1ff5ad8890c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-145-patches-11-vulnerabilities-910eb94d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20145%20Patches%2011%20Vulnerabilities&amp;severity=high&amp;id=698ee1d1c9e1ff5ad80c75e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-revives-tianfu-cup-hacking-contest-under-inc-4cdc4a0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Revives%20Tianfu%20Cup%20Hacking%20Contest%20Under%20Increased%20Secrecy&amp;severity=medium&amp;id=698eccb9c9e1ff5ad8fd6962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15520-cwe-200-information-exposure-in-reg-6e404135</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15520%3A%20CWE-200%20Information%20Exposure%20in%20RegistrationMagic&amp;severity=medium&amp;id=698ec262c9e1ff5ad8f5317e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48023-cwe-617-reachable-assertion-in-yoko-bac58b67</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48023%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48022-cwe-130-in-yokogawa-electric-corpor-44c6e289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48022%3A%20CWE-130%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48021-cwe-191-integer-underflow-wrap-or-w-f12d0e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48021%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb7d6c9e1ff5ad8edd0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48020-cwe-617-reachable-assertion-in-yoko-6e599e6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48020%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48019-cwe-617-reachable-assertion-in-yoko-0e0071b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48019%3A%20CWE-617%20Reachable%20Assertion%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1924-cwe-191-integer-underflow-wrap-or-wr-fdbea02f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1924%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Yokogawa%20Electric%20Corporation%20Vnet%2FIP%20Interface%20Package&amp;severity=medium&amp;id=698eb0ccc9e1ff5ad8e97a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25108-improper-neutralization-of-special--8909b9f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25108%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Soliton%20Systems%20K.K.%20FileZen&amp;severity=high&amp;id=698ea641c9e1ff5ad8e3f0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1721-feae9b4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1721&amp;severity=medium&amp;id=698e8a20c9e1ff5ad87f7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9293-cwe-295-improper-certificate-validat-d1d8ef32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9293%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20App&amp;severity=high&amp;id=698e788cc9e1ff5ad8549279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9292-cwe-942-permissive-cross-domain-secu-dbb25b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9292%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20TP-Link%20Systems%20Inc.%20Omada%20Cloud%20Controller&amp;severity=low&amp;id=698e788cc9e1ff5ad8549276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-13-672978b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-13&amp;severity=medium&amp;id=698fbf4ac9e1ff5ad878e2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70957-na-7bf46715</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70957%3A%20n%2Fa&amp;severity=high&amp;id=698f9fdcc9e1ff5ad86c396a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69633-na-14384712</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69633%3A%20n%2Fa&amp;severity=critical&amp;id=698f9fdcc9e1ff5ad86c3966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70955-na-2052c071</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70955%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70954-na-50a83a06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70954%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70866-na-5a7b6f22</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70866%3A%20n%2Fa&amp;severity=high&amp;id=698f9c59c9e1ff5ad86a8ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70093-na-f5f88d30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70093%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70956-na-f3a79383</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70956%3A%20n%2Fa&amp;severity=high&amp;id=698f98d5c9e1ff5ad868bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69770-na-4c2996be</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69770%3A%20n%2Fa&amp;severity=critical&amp;id=698f6419c9e1ff5ad8512193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66676-na-9476df4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66676%3A%20n%2Fa&amp;severity=medium&amp;id=698f60acc9e1ff5ad84fbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70095-na-a36d5605</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70095%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70091-na-1767a000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70091%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70123-na-82db7ba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70123%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70122-na-2037c377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70122%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70121-na-deced414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70121%3A%20n%2Fa&amp;severity=high&amp;id=698f5286c9e1ff5ad84a5d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70094-na-132ab04f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70094%3A%20n%2Fa&amp;severity=medium&amp;id=698f4474c9e1ff5ad8426b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-13-fc9bcc6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-13&amp;severity=low&amp;id=698ed3bfc9e1ff5ad804300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21961-cwe-119-improper-restriction-of-ope-a0bfc363</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21961%3A%20CWE-119%20%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=medium&amp;id=698e6a7bc9e1ff5ad82ff4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40905-cwe-338-use-of-cryptographically-we-1325ff2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40905%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DBOOK%20WWW%3A%3AOAuth&amp;severity=high&amp;id=698e66f8c9e1ff5ad82e611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26188-cwe-79-improper-neutralization-of-i-73929d2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26188%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solspace%20craft-freeform&amp;severity=medium&amp;id=698ec65ac9e1ff5ad8f7fbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26068-cwe-77-improper-neutralization-of-s-58777eec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26068%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20jm33-m0%20emp3r0r&amp;severity=critical&amp;id=698ec65ac9e1ff5ad8f7fbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26224-cwe-367-time-of-check-time-of-use-t-b30068a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26224%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Intego%20Log%20Reporter&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26225-cwe-59-improper-link-resolution-bef-505203a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26225%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Intego%20Personal%20Backup&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26076-cwe-770-allocation-of-resources-wit-ed01ebe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26076%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pendulum-project%20ntpd-rs&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26075-cwe-352-cross-site-request-forgery--6c6a6891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26075%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14282-incorrect-privilege-assignment-in-h-693927bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14282%3A%20Incorrect%20Privilege%20Assignment%20in%20https%3A%2F%2Fgithub.com%2Fmkj%2Fdropbear%2F%20dropbear&amp;severity=medium&amp;id=69962af36aea4a407ae847f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26069-cwe-200-exposure-of-sensitive-infor-4d72e5e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26069%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thecfu%20scraparr&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1358-cwe-434-in-airleader-gmbh-airleader--2b35e562</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1358%3A%20CWE-434%20in%20Airleader%20GmbH%20Airleader%20Master&amp;severity=critical&amp;id=698e4ad9c9e1ff5ad81db306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26056-cwe-94-improper-control-of-generati-da134cd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26056%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4ad9c9e1ff5ad81db314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26055-cwe-306-missing-authentication-for--d8f9a9d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26055%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20yokecd%20yoke&amp;severity=high&amp;id=698e4e5cc9e1ff5ad8206a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26020-cwe-285-improper-authorization-in-s-31ca744c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26011-cwe-787-out-of-bounds-write-in-ros--a5e729c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26011%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ros-navigation%20navigation2&amp;severity=critical&amp;id=698e404cc9e1ff5ad81500de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26005-cwe-918-server-side-request-forgery-c84eb98a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26005%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26000-cwe-1021-improper-restriction-of-re-a50b6a03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26000%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=698e3cc8c9e1ff5ad81239f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0619-cwe-190-integer-overflow-or-wraparou-ada214b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0619%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20silabs.com%20Silicon%20Labs%20Matter&amp;severity=medium&amp;id=698e3944c9e1ff5ad80febe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25933-cwe-78-improper-neutralization-of-s-9b77262f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25933%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20arduino%20arduino-app-lab&amp;severity=medium&amp;id=698e35c0c9e1ff5ad80da744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25768-cwe-862-missing-authorization-in-cl-4dd72b51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25768%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25767-cwe-863-incorrect-authorization-in--8f387b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25767%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20cloudamqp%20lavinmq&amp;severity=high&amp;id=698e323cc9e1ff5ad80b5817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25922-cwe-287-improper-authentication-in--b40b4560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25748-cwe-287-improper-authentication-in--711f143d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25748%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25227-cwe-94-improper-control-of-generati-cc39f642</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25227%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20goauthentik%20authentik&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24895-cwe-180-incorrect-behavior-order-va-e6909ced</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24895%3A%20CWE-180%3A%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24894-cwe-269-improper-privilege-manageme-ae84e94f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24894%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20php%20frankenphp&amp;severity=high&amp;id=698e2b39c9e1ff5ad806e17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24044-cwe-336-same-seed-in-pseudo-random--1eb14671</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24044%3A%20CWE-336%3A%20Same%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20element-hq%20ess-helm&amp;severity=critical&amp;id=698e2b39c9e1ff5ad806e176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22821-cwe-89-improper-neutralization-of-s-db2cc7da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22821%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pluginsGLPI%20mreporting&amp;severity=medium&amp;id=698e242ec9e1ff5ad802d084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26219-cwe-327-use-of-a-broken-or-risky-cr-46123275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26219%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26218-cwe-798-use-of-hard-coded-credentia-92b3e8bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26218%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20newbee-ltd%20newbee-mall&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21438-cwe-401-missing-release-of-memory-a-d1018b14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21438%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21435-cwe-400-uncontrolled-resource-consu-839c7a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21435%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21434-cwe-770-allocation-of-resources-wit-bab64128</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21434%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quic-go%20webtransport-go&amp;severity=medium&amp;id=698e1d24c9e1ff5ad8febc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-reports-state-backed-hackers-using-gemini-a-87649c99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Reports%20State-Backed%20Hackers%20Using%20Gemini%20AI%20for%20Recon%20and%20Attack%20Support&amp;severity=medium&amp;id=698e15e7c9e1ff5ad8fa95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54519-cwe-427-uncontrolled-search-path-el-82dd3c9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54519%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Documentation%20Navigator%20Installation%20(Windows)&amp;severity=high&amp;id=698e19a6c9e1ff5ad8fc8114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36319-cwe-1191-on-chip-debug-and-test-int-3f5c29d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36319%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%208040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698e1298c9e1ff5ad8f85870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52533-cwe-1191-on-chip-debug-and-test-int-189588d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52533%3A%20CWE-1191%20%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-campaign-plants-malicious-packages-in-npm--94a891a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Campaign%20Plants%20Malicious%20Packages%20in%20npm%20and%20PyPI%20Ecosystems&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54756-cwe-1392-in-brightsign-brightsign-o-789cc207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54756%3A%20CWE-1392%20in%20BrightSign%20BrightSign%20OS%20series%204%20players&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55210-cwe-270-privilege-context-switching-ded8b804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55210%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20FreePBX%20api&amp;severity=low&amp;id=698e0109c9e1ff5ad8eda2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-eliminate-the-technical-debt-of-insecure-ai-9fa385dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Eliminate%20the%20Technical%20Debt%20of%20Insecure%20AI-Assisted%20Software%20Development&amp;severity=medium&amp;id=698dfd4dc9e1ff5ad8ebf73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26217-cwe-22-improper-limitation-of-a-pat-0f89b04d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26217%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e8871a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26216-cwe-94-improper-control-of-generati-09f71e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26216%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20unclecode%20Crawl4AI&amp;severity=critical&amp;id=698df67cc9e1ff5ad8e88716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-bought-i-saw-i-attended-a-quick-guide-to-staying-415d6e4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20bought%2C%20I%20saw%2C%20I%20attended%3A%20a%20quick%20guide%20to%20staying%20scam-free%20at%20the%20Olympics%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698df332c9e1ff5ad8e63992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-strikes-with-new-50-version-targeting-wind-9390e947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20strikes%20with%20new%205.0%20version%2C%20targeting%20Windows%2C%20Linux%20and%20ESXI%20systems&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26214-cwe-297-improper-validation-of-cert-d70804ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26214%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Xiaomi%20Technology%20Co.%2C%20Ltd.%20Galaxy%20FDS%20Android%20SDK&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1104-cwe-862-missing-authorization-in-nin-28323d66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1104%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=high&amp;id=698de86ac9e1ff5ad8e08f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14014-cwe-434-unrestricted-upload-of-file-0c2cae09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14014%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NTN%20Information%20Processing%20Services%20Computer%20Software%20Hardware%20Industry%20and%20Trade%20Ltd.%20Co.%20Smart%20Panel&amp;severity=critical&amp;id=698de160c9e1ff5ad8dd2345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1320-cwe-79-improper-neutralization-of-in-70548f61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=high&amp;id=698de160c9e1ff5ad8dd2348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13004-cwe-639-authorization-bypass-throug-c7870814</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13004%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2007-heap-based-buffer-overflow-in-postgr-364c6713</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2007%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2006-improper-validation-of-array-index-i-3ae45a05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2006%3A%20Improper%20Validation%20of%20Array%20Index%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2005-heap-based-buffer-overflow-in-postgr-f6887628</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2005%3A%20Heap-based%20Buffer%20Overflow%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2004-improper-validation-of-specified-typ-7cc20198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2004%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5deef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2003-improper-validation-of-specified-typ-fa5f154d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2003%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20PostgreSQL&amp;severity=medium&amp;id=698dd351c9e1ff5ad8d5deec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13002-cwe-79-improper-neutralization-of-i-98ae0343</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=high&amp;id=698dd351c9e1ff5ad8d5dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10969-cwe-89-improper-neutralization-of-s-5a43f9f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10969%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Farktor%20Software%20E-Commerce%20Services%20Inc.%20E-Commerce%20Package&amp;severity=critical&amp;id=698dd351c9e1ff5ad8d5dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1316-cwe-79-improper-neutralization-of-in-d9728873</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=698ec65ac9e1ff5ad8f7fc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1671-cwe-862-missing-authorization-in-swi-985d22a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1671%3A%20CWE-862%20Missing%20Authorization%20in%20switcorp%20Activity%20Log%20for%20WordPress&amp;severity=medium&amp;id=698de86ac9e1ff5ad8e08f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apollomd-data-breach-impacts-626000-individuals-828dc9bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ApolloMD%20Data%20Breach%20Impacts%20626%2C000%20Individuals&amp;severity=medium&amp;id=698dc891c9e1ff5ad8cfc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-prompt-rce-claude-0-click-r-6b5df16d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Prompt%20RCE%2C%20Claude%200-Click%2C%20RenEngine%20Loader%2C%20Auto%200-Days%20%26%2025%2B%20Stories&amp;severity=low&amp;id=698ed2ddc9e1ff5ad8037a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-enable-windows-baseline-security-with-ead898ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Enable%20%E2%80%98Windows%20Baseline%20Security%E2%80%99%20With%20New%20Runtime%20Integrity%20Safeguards&amp;severity=medium&amp;id=698dba81c9e1ff5ad8c59be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-state-actors-cybercriminals-target-glo-7203090f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%2C%20State%20Actors%2C%20Cybercriminals%20Target%20Global%20Defense%20Industry%2C%20Google%20Warns&amp;severity=medium&amp;id=698db6fdc9e1ff5ad8c36760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15574-cwe-330-use-of-insufficiently-rando-a169357c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15574%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15575-cwe-494-download-of-code-without-in-51eadc64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15575%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=medium&amp;id=698db73dc9e1ff5ad8c38fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15573-cwe-295-improper-certificate-valida-cc47b78d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15573%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20SolaX%20Power%20Pocket%20WiFi%203.0&amp;severity=critical&amp;id=698db3acc9e1ff5ad8c09726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/screenconnect-attack-smartscreen-bypass-and-rmm-ab-e1ad15db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScreenConnect%20Attack%3A%20SmartScreen%20Bypass%20and%20RMM%20Abuse&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad82069ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/employee-monitoring-and-simplehelp-software-abused-52f33a69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Employee%20Monitoring%20and%20SimpleHelp%20Software%20Abused%20in%20Ransomware%20Operations&amp;severity=medium&amp;id=698e4ad8c9e1ff5ad81db232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ctem-divide-why-84-of-security-programs-are-fa-5f888951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CTEM%20Divide%3A%20Why%2084%25%20of%20Security%20Programs%20Are%20Falling%20Behind&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2276-cwe-79-improper-neutralization-of-in-f88855d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wix%20web%20application&amp;severity=medium&amp;id=698daca4c9e1ff5ad8b9e267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-7-zip-downloads-are-turning-home-pcs-into-pro-81a7a0ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%207-Zip%20downloads%20are%20turning%20home%20PCs%20into%20proxy%20nodes&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b3631e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1356-cwe-918-server-side-request-forgery--e75ae6a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1356%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mateuszgbiorczyk%20Converter%20for%20Media%20%E2%80%93%20Optimize%20images%20%7C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b36380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41117-vulnerability-in-grafana-grafanagra-1c68adff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41117%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=medium&amp;id=698d9b14c9e1ff5ad8b1f9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21722-vulnerability-in-grafana-grafanagra-88a5f29c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21722%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=medium&amp;id=698d9b14c9e1ff5ad8b1f9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-ios-zero-day-exploited-in-extremely--ce2c8fe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20iOS%20Zero-Day%20Exploited%20in%20%E2%80%98Extremely%20Sophisticated%20Attack%E2%80%99&amp;severity=medium&amp;id=698d8949c9e1ff5ad8a72548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/83-of-ivanti-epmm-exploits-linked-to-single-ip-on--5545c443</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=83%25%20of%20Ivanti%20EPMM%20Exploits%20Linked%20to%20Single%20IP%20on%20Bulletproof%20Hosting%20Infrastructure&amp;severity=medium&amp;id=698ed2ddc9e1ff5ad8037a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15577-cwe-22-improper-limitation-of-a-pat-e8c264c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15577%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Valmet%20Valmet%20DNA%20Web%20Tools&amp;severity=high&amp;id=698d860cc9e1ff5ad8a5a414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14892-cwe-269-improper-privilege-manageme-ca17fc3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14892%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Prime%20Listing%20Manager&amp;severity=critical&amp;id=698d70304b57a58fa1de47f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-fixes-exploited-zero-day-affecting-ios-macos-b32e0167</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Fixes%20Exploited%20Zero-Day%20Affecting%20iOS%2C%20macOS%2C%20and%20Other%20Devices&amp;severity=low&amp;id=698d852bc9e1ff5ad8a52186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2327-regular-expression-denial-of-service-61f28507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2327%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20markdown-it&amp;severity=medium&amp;id=698d69274b57a58fa1db4942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2391-cwe-20-improper-input-validation-d67d2f2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2391%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=medium&amp;id=698d7606c9e1ff5ad87e3c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25676-uncontrolled-search-path-element-in-108bd32e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25676%3A%20Uncontrolled%20Search%20Path%20Element%20in%20M-Audio%20M-Track%20Duo%20HD&amp;severity=high&amp;id=698d7606c9e1ff5ad87e3c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26235-missing-authentication-for-critical-64624540</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26235%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Visu%20Server&amp;severity=high&amp;id=698d49854b57a58fa1aa88fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26234-improper-neutralization-of-http-hea-13dc0f5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26234%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Visu%20Server&amp;severity=high&amp;id=698d49854b57a58fa1aa88fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1537-cwe-862-missing-authorization-in-lat-a278a9f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1537%3A%20CWE-862%20Missing%20Authorization%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=698d49854b57a58fa1aa88f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23857-cwe-280-improper-handling-of-insuff-a6a15377</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23857%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Dell%20Update%20Package&amp;severity=high&amp;id=698d3b734b57a58fa19a91ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-seconds-to-botnet-analyzing-a-self-propagatin-71b48b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Seconds%20to%20Botnet%20-%20Analyzing%20a%20Self%20Propagating%20SSH%20Worm%20with%20Cryptographically%20Signed%20C2%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Feb%2011th)&amp;severity=medium&amp;id=698d343e4b57a58fa1678c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23856-cwe-284-improper-access-control-in--82f0d51e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23856%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20iDRAC%20Service%20Module&amp;severity=high&amp;id=698d3b734b57a58fa19a91eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0969-cwe-94-improper-control-of-generatio-4c82d751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0969%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(Code%20Injection)%20in%20HashiCorp%20Shared%20library&amp;severity=high&amp;id=698d3b734b57a58fa19a91e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1729-cwe-306-missing-authentication-for-c-1533b53f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1729%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=698d2d644b57a58fa132a7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-actors-exploit-notepad-supply-chain-9ebed71a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Actors%20Exploit%20Notepad%2B%2B%20Supply%20Chain&amp;severity=medium&amp;id=698d9e94c9e1ff5ad8b362f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-12-acafb6eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-12&amp;severity=medium&amp;id=698e6dcac9e1ff5ad833f58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70092-na-509b535f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70092%3A%20n%2Fa&amp;severity=medium&amp;id=698e5564c9e1ff5ad8242570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70845-na-dec3a6fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70845%3A%20n%2Fa&amp;severity=medium&amp;id=698e4e5cc9e1ff5ad8206a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25828-na-1d8b46e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25828%3A%20n%2Fa&amp;severity=medium&amp;id=698e4ad9c9e1ff5ad81db30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70314-na-2e4868d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70314%3A%20n%2Fa&amp;severity=critical&amp;id=698e2eb9c9e1ff5ad808ac25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67433-na-c2b1a37a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67433%3A%20n%2Fa&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67432-na-a7592b45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67432%3A%20n%2Fa&amp;severity=high&amp;id=698e2eb9c9e1ff5ad808ac1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70981-na-0c201623</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70981%3A%20n%2Fa&amp;severity=critical&amp;id=698e0b91c9e1ff5ad8f3a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69807-na-1ef94850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69807%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69806-na-b84e89b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69806%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63421-na-d51ca972</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63421%3A%20n%2Fa&amp;severity=high&amp;id=698e0b91c9e1ff5ad8f3a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61879-na-4f30b3e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61879%3A%20n%2Fa&amp;severity=high&amp;id=698e080ec9e1ff5ad8f198c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61880-na-79c5be27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61880%3A%20n%2Fa&amp;severity=high&amp;id=698e0109c9e1ff5ad8eda2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69752-na-7a1a3dbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69752%3A%20n%2Fa&amp;severity=medium&amp;id=698dfd94c9e1ff5ad8ec1801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56647-na-27437016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56647%3A%20n%2Fa&amp;severity=medium&amp;id=698dfd94c9e1ff5ad8ec17fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70886-na-ad94ba80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70886%3A%20n%2Fa&amp;severity=high&amp;id=698df67cc9e1ff5ad8e88711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69634-na-e6863074</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69634%3A%20n%2Fa&amp;severity=critical&amp;id=698df2f6c9e1ff5ad8e60c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-12-d64c971f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-12&amp;severity=low&amp;id=698d29aa4b57a58fa1059bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20629-an-app-may-be-able-to-access-user-s-faffa851</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20629%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20644-processing-maliciously-crafted-web--df631de1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20644%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20652-a-remote-attacker-may-be-able-to-ca-62ddf32d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20652%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20605-an-app-may-be-able-to-crash-a-syste-09879c7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20605%3A%20An%20app%20may%20be%20able%20to%20crash%20a%20system%20process%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20625-an-app-may-be-able-to-access-sensit-15e4e561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20625%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20648-a-malicious-app-may-be-able-to-acce-aff95690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20648%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20notifications%20from%20other%20iCloud%20devices%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d9607e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20609-processing-a-maliciously-crafted-fi-fbf812b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20609%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20608-processing-maliciously-crafted-web--dcc1a5d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20608%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dc64b57a58fa1d9512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20649-a-user-may-be-able-to-view-sensitiv-7238f714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20649%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20624-an-app-may-be-able-to-access-sensit-298c8882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20624%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20673-turning-off-load-remote-content-in--ce3e0a93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20673%3A%20Turning%20off%20%22Load%20remote%20content%20in%20messages%E2%80%9D%20may%20not%20apply%20to%20all%20mail%20previews%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46310-an-attacker-with-root-privileges-ma-bd0f5f9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46310%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20653-an-app-may-be-able-to-access-sensit-4a2d56b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20653%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20700-an-attacker-with-memory-write-capab-30065920</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20700%3A%20An%20attacker%20with%20memory%20write%20capability%20may%20be%20able%20to%20execute%20arbitrary%20code.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2026.%20CVE-2025-14174%20and%20CVE-2025-43529%20were%20also%20issued%20in%20response%20to%20this%20report.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcf4b57a58fa1d961e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20645-an-attacker-with-physical-access-to-7f4554ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20645%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20612-an-app-may-be-able-to-access-sensit-9f0328e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20612%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20669-an-app-may-be-able-to-access-sensit-66a11fec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20669%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20628-an-app-may-be-able-to-break-out-of--e55ceda5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20628%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dca4b57a58fa1d95b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20674-an-attacker-with-physical-access-to-5d574b03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20674%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d96104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20623-an-app-may-be-able-to-access-protec-45ebaffc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20623%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20635-processing-maliciously-crafted-web--7aa6b401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20635%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20662-an-attacker-with-physical-access-to-846a9d15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20662%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46301-a-malicious-hid-device-may-cause-an-1d9df697</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46301%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20619-an-app-may-be-able-to-access-sensit-e1b682f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20619%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20658-an-app-may-be-able-to-gain-root-pri-6893f21b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20658%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20678-an-app-may-be-able-to-access-sensit-dce1ffb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20678%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20681-an-app-may-be-able-to-access-inform-89c87213</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20681%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dcf4b57a58fa1d961db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20615-an-app-may-be-able-to-gain-root-pri-22cab454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20615%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20642-a-person-with-physical-access-to-an-cb48007d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20642%3A%20A%20person%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20access%20photos%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcb4b57a58fa1d96065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20654-an-app-may-be-able-to-cause-unexpec-7bab56e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20654%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20603-an-app-with-root-privileges-may-be--adf00fa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20603%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d9511e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20602-an-app-may-be-able-to-cause-a-denia-c8cb0c3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20602%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc64b57a58fa1d95119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20655-an-attacker-with-physical-access-to-18420a98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20655%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20614-an-app-may-be-able-to-gain-root-pri-30d49a81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20614%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20680-a-sandboxed-app-may-be-able-to-acce-4caa5527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20680%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20638-a-user-with-live-caller-id-app-exte-fbe0ce7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20638%3A%20A%20user%20with%20Live%20Caller%20ID%20app%20extensions%20turned%20off%20could%20have%20identifying%20information%20leaked%20to%20the%20extensions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46290-a-remote-attacker-may-be-able-to-ca-a846a6ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46290%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc44b57a58fa1d9508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20618-an-app-may-be-able-to-access-user-s-e48313d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20618%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20663-an-app-may-be-able-to-enumerate-a-u-2cb1651a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20663%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcd4b57a58fa1d960e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43417-an-app-may-be-able-to-access-user-s-f3a9d708</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43417%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46300-a-malicious-hid-device-may-cause-an-ae7632c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46300%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20634-processing-a-maliciously-crafted-im-f96ee51f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20634%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20675-processing-a-maliciously-crafted-im-be9478fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20675%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcd4b57a58fa1d96107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46303-a-malicious-hid-device-may-cause-an-862ea382</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46303%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20660-a-remote-user-may-be-able-to-write--547636dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20660%3A%20A%20remote%20user%20may%20be%20able%20to%20write%20arbitrary%20files%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20621-an-app-may-be-able-to-cause-unexpec-5108d033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20621%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc84b57a58fa1d95b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20676-a-website-may-be-able-to-track-user-791b9425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20676%3A%20A%20website%20may%20be%20able%20to%20track%20users%20through%20Safari%20web%20extensions%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d96111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20601-an-app-may-be-able-to-monitor-keyst-f7acbbd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20601%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dc64b57a58fa1d95116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20656-an-app-may-be-able-to-access-a-user-7c5d3cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20656%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Safari%20history%20in%20Apple%20Safari&amp;severity=low&amp;id=698d0dcc4b57a58fa1d960c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20640-an-attacker-with-physical-access-to-513c36d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20640%3A%20An%20attacker%20with%20physical%20access%20to%20iPhone%20may%20be%20able%20to%20take%20and%20view%20screenshots%20of%20sensitive%20data%20from%20the%20iPhone%20during%20iPhone%20Mirroring%20with%20Mac%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d96056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20617-an-app-may-be-able-to-gain-root-pri-42394d40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20617%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20682-an-attacker-may-be-able-to-discover-9f496858</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20682%3A%20An%20attacker%20may%20be%20able%20to%20discover%20a%20user%E2%80%99s%20deleted%20notes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcf4b57a58fa1d961de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20616-processing-a-maliciously-crafted-us-07f8ea38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20616%3A%20Processing%20a%20maliciously%20crafted%20USD%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20641-an-app-may-be-able-to-identify-what-c3836ff2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20641%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcb4b57a58fa1d9605a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20677-a-shortcut-may-be-able-to-bypass-sa-87455190</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20677%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sandbox%20restrictions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=698d0dcd4b57a58fa1d96117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43403-an-app-may-be-able-to-access-sensit-b57a9fe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43403%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d95085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20620-an-attacker-may-be-able-to-cause-un-9406e86e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20620%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc84b57a58fa1d95b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20636-processing-maliciously-crafted-web--87198eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20636%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46302-a-malicious-hid-device-may-cause-an-f3110bb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46302%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d9509d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20661-an-attacker-with-physical-access-to-0330a824</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20661%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dcc4b57a58fa1d960d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20650-an-attacker-in-a-privileged-network-e8fc6a4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20650%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20perform%20denial-of-service%20attack%20using%20crafted%20Bluetooth%20packets%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcc4b57a58fa1d960a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20646-a-malicious-app-may-be-able-to-read-75642868</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20646%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=low&amp;id=698d0dcb4b57a58fa1d96076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20611-processing-a-maliciously-crafted-me-b7037f10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20611%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d95142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46305-a-malicious-hid-device-may-cause-an-f84aceb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46305%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20666-an-app-may-be-able-to-access-sensit-c43263b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20666%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcd4b57a58fa1d960e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20627-an-app-may-be-able-to-access-sensit-26aa6429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20627%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20671-an-attacker-in-a-privileged-network-c882a997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20671%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dcd4b57a58fa1d960f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20626-a-malicious-app-may-be-able-to-gain-f84e5a47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20626%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dca4b57a58fa1d95b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20630-an-app-may-be-able-to-access-protec-c2e3d770</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20630%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dca4b57a58fa1d95b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46304-a-malicious-hid-device-may-cause-an-bb9d8bd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46304%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=698d0dc44b57a58fa1d950a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20667-an-app-may-be-able-to-break-out-of--b974edf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20667%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dcd4b57a58fa1d960ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20610-an-app-may-be-able-to-gain-root-pri-8d29f0c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20610%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d9513f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20647-an-app-may-be-able-to-access-sensit-a7a341d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20647%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=698d0dcb4b57a58fa1d9607a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20606-an-app-may-be-able-to-bypass-certai-23444a98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20606%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=698d0dc64b57a58fa1d95127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43537-restoring-a-maliciously-crafted-bac-28d5660f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43537%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=698d0dc44b57a58fa1d9508c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26215-cwe-502-deserialization-of-untruste-e3572f04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26215%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20zyddnys%20manga-image-translator&amp;severity=critical&amp;id=698d06be4b57a58fa1d7cd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1669-cwe-73-external-control-of-file-name-d4d0c160</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1669%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Google%20Keras&amp;severity=high&amp;id=698d03334b57a58fa1d6e844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26031-cwe-863-incorrect-authorization-in--87201beb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26031%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=698cf8a94b57a58fa1cef24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-digest-of-kasperskys-report-spam-and-phishin-dea83211</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20digest%20of%20Kaspersky%E2%80%99s%20report%20%E2%80%9CSpam%20and%20Phishing%20in%202025%E2%80%9D%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6990684ec9e1ff5ad8894f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26029-cwe-78-improper-neutralization-of-s-8fbb95dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26029%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20akutishevsky%20sf-mcp-server&amp;severity=high&amp;id=698cf8a94b57a58fa1cef249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26023-cwe-79-improper-neutralization-of-i-7a463a46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26023%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=698cf5244b57a58fa1cd8256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26021-cwe-1321-improperly-controlled-modi-92e0938f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26021%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20ahdinosaur%20set-in&amp;severity=critical&amp;id=698cf5244b57a58fa1cd8252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26012-cwe-863-incorrect-authorization-in--026fa0b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26012%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dani-garcia%20vaultwarden&amp;severity=medium&amp;id=698cf5244b57a58fa1cd8248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26019-cwe-918-server-side-request-forgery-c99b8be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26019%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchainjs&amp;severity=medium&amp;id=698cf5244b57a58fa1cd824c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26014-cwe-200-exposure-of-sensitive-infor-48b49b39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26014%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pion%20dtls&amp;severity=medium&amp;id=698cf19f4b57a58fa1cc1ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26010-cwe-269-improper-privilege-manageme-5200ec47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26010%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20open-metadata%20OpenMetadata&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25999-cwe-285-improper-authorization-in-a-91362206</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25999%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Aiven-Open%20klaw&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25994-cwe-120-buffer-copy-without-checkin-aa3b3738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25994%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=high&amp;id=698cf19f4b57a58fa1cc1c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25990-cwe-787-out-of-bounds-write-in-pyth-f41c8f1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25990%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=698cee1b4b57a58fa1cb0648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25935-cwe-80-improper-neutralization-of-s-4d6fb46e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25935%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20go-vikunja%20vikunja&amp;severity=high&amp;id=698cee1b4b57a58fa1cb0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25759-cwe-79-improper-neutralization-of-i-4af33bb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25759%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=698cee1b4b57a58fa1cb063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25633-cwe-862-missing-authorization-in-st-84d4a800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25633%3A%20CWE-862%3A%20Missing%20Authorization%20in%20statamic%20cms&amp;severity=medium&amp;id=698cea984b57a58fa1c97f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26158-external-control-of-file-name-or-pa-26ab3275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26158%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=698cea984b57a58fa1c97f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26157-external-control-of-file-name-or-pa-b3a1be35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26157%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=698cea984b57a58fa1c97f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-unveils-new-statewide-data-classification-p-46a4dc4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20Unveils%20New%20Statewide%20Data%20Classification%20Policy%20Months%20After%20Cyberattack&amp;severity=medium&amp;id=698cdfd94b57a58fa1c07796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-everything-february-2026-wed-feb-11t-f0160db9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Everything%3A%20February%202026%2C%20(Wed%2C%20Feb%2011th)&amp;severity=medium&amp;id=698cdc554b57a58fa1bcb07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2323-inappropriate-implementation-in-goog-01052476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2323%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2322-inappropriate-implementation-in-goog-620d75ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2322%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2321-use-after-free-in-google-chrome-12d5ff1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2321%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce7b4b57a58fa1b3e334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2320-inappropriate-implementation-in-goog-376ab5ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2320%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce7b4b57a58fa1b3e330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2319-race-in-google-chrome-6dd4299b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2319%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce7b4b57a58fa1b3e32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2318-inappropriate-implementation-in-goog-fcfe2ea8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2318%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2317-inappropriate-implementation-in-goog-fa12e170</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2317%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2316-insufficient-policy-enforcement-in-g-04cf54f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2316%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=698cce794b57a58fa1b3e2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2315-inappropriate-implementation-in-goog-670294ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2315%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2314-heap-buffer-overflow-in-google-chrom-a0a9ef60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2314%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2313-use-after-free-in-google-chrome-38c51714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2313%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=698cce794b57a58fa1b3e2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0229-cwe-754-improper-check-for-unusual-o-3f546358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0229%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=698cc7724b57a58fa1b0b31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0228-cwe-295-improper-certificate-validat-6fdf6a10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0228%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=low&amp;id=698cc7724b57a58fa1b0b31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2361-uncontrolled-search-path-element-in--017f4448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2361%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=high&amp;id=698cc7724b57a58fa1b0b326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2360-uncontrolled-search-path-element-in--62a2cecb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2360%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=high&amp;id=698cc7724b57a58fa1b0b321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-malicious-outlook-add-in-found-stealing-4000-1d56e446</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20Malicious%20Outlook%20Add-In%20Found%20Stealing%204%2C000%2B%20Microsoft%20Credentials&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a52189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-game-is-over-when-free-comes-at-too-high-a-pri-58c2adc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20game%20is%20over%3A%20when%20%E2%80%9Cfree%E2%80%9D%20comes%20at%20too%20high%20a%20price.%20What%20we%20know%20about%20RenEngine&amp;severity=medium&amp;id=698cfc2b4b57a58fa1d1eaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13391-cwe-862-missing-authorization-in-mo-f77adfb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13391%3A%20CWE-862%20Missing%20Authorization%20in%20MooMoo%20Product%20Options%20and%20Price%20Calculation%20Formulas%20for%20WooCommerce%20%E2%80%93%20Uni%20CPO%20(Premium)&amp;severity=medium&amp;id=698cb25d4b57a58fa1a74845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24789-cwe-306-in-zlan-information-technol-50342d88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24789%3A%20CWE-306%20in%20ZLAN%20Information%20Technology%20Co.%20ZLAN5143D&amp;severity=critical&amp;id=698cb25d4b57a58fa1a74849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25084-cwe-306-missing-authentication-for--35519066</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25084%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZLAN%20Information%20Technology%20Co.%20ZLAN5143D&amp;severity=critical&amp;id=698cb25d4b57a58fa1a7484e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25869-cwe-22-improper-limitation-of-a-pat-0151200d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25869%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MiniGal%20MiniGal%20Nano&amp;severity=medium&amp;id=698cab544b57a58fa1a4b9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25868-cwe-79-improper-neutralization-of-i-541ac945</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MiniGal%20MiniGal%20Nano&amp;severity=medium&amp;id=698ca44a4b57a58fa1a27f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12474-cwe-908-use-of-uninitialized-resour-44b2e038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12474%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Google%20libjxl&amp;severity=low&amp;id=698ca44a4b57a58fa1a27f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1837-cwe-805-in-google-libjxl-b9d74d66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1837%3A%20CWE-805%20in%20Google%20libjxl&amp;severity=high&amp;id=698ca44a4b57a58fa1a27f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2344-cwe-79-xss-in-plunet-plunet-business-9974f8f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2344%3A%20CWE-79%20-%20XSS%20in%20Plunet%20Plunet%20BusinessManager&amp;severity=high&amp;id=698c9d454b57a58fa19f3844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-and-sidecopy-launch-cross-platform-rat-campa-8c4fd7c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20and%20SideCopy%20Launch%20Cross-Platform%20RAT%20Campaigns%20Against%20Indian%20Entities&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a5218c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2345-cwe-346-origin-validation-error-in-p-d45d2f19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2345%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Proctorio%20Secure%20Exam%20Proctor%20Extension&amp;severity=low&amp;id=698c9d454b57a58fa19f3847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61969-cwe-732-incorrect-permission-assign-acd56dd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61969%3A%20CWE-732%20%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20AMD%20AMD%20%C2%B5Prof&amp;severity=high&amp;id=698c99bc4b57a58fa19e33d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52541-cwe-427-uncontrolled-search-path-el-5c9796c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52541%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20Vivado%E2%84%A2%20Installation%20(Windows)&amp;severity=high&amp;id=698c99bc4b57a58fa19e33d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48518-cwe-787-out-of-bounds-write-in-amd--257c4ddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48518%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36320-cwe-190-integer-overflow-or-wraparo-82cb0530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36320%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698c99bc4b57a58fa19e33c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36324-cwe-787-out-of-bounds-write-in-amd--f1c2dd95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36324%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698c99bc4b57a58fa19e33c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48508-cwe-1245-improper-finite-state-mach-120dee71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48508%3A%20CWE-1245%20%20Improper%20Finite%20State%20Machines%20(FSMs)%20in%20Hardware%20Logic%20in%20AMD%20AMD%20Radeon%E2%84%A2%20PRO%20V710&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36316-cwe-190-integer-overflow-or-wraparo-bb68436c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36316%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%206000%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics%3B%0D%0AAMD%20Ryzen%E2%84%A2%207035%20Series%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698c99bc4b57a58fa19e33c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48503-cwe-427-uncontrolled-search-path-el-5ef6871a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48503%3A%20CWE-427%20%20Uncontrolled%20Search%20Path%20Element%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics%20(formerly%20codenamed%20%22Renoir%22)&amp;severity=high&amp;id=698c92b44b57a58fa19c0281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2249-cwe-306-missing-authentication-for-c-fba1c920</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2249%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20DFS&amp;severity=critical&amp;id=698c92b44b57a58fa19c0287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2248-cwe-306-missing-authentication-for-c-139cd139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2248%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20WIC&amp;severity=critical&amp;id=698c92b44b57a58fa19c0284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2250-cwe-284-improper-access-control-in-m-a5b4fa4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2250%3A%20CWE-284%20Improper%20Access%20Control%20in%20METIS%20Cyberspace%20Technology%20SA%20METIS%20WIC&amp;severity=high&amp;id=698c92b44b57a58fa19c028a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12059-cwe-538-insertion-of-sensitive-info-9d772f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12059%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Logo%20Software%20Industry%20and%20Trade%20Inc.%20Logo%20j-Platform&amp;severity=critical&amp;id=698c92b44b57a58fa19c027e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1226-cwe-94-improper-control-of-generatio-d91ba611</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1226%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%20Building%20Operation%20Workstation&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1227-cwe-611-improper-restriction-of-xml--9a12b573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1227%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Schneider%20Electric%20EcoStruxure%20Building%20Operation%20Workstation&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conduent-breach-hits-volvo-group-nearly-17000-empl-df4b5269</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conduent%20Breach%20Hits%20Volvo%20Group%3A%20Nearly%2017%2C000%20Employees%E2%80%99%20Data%20Exposed&amp;severity=medium&amp;id=698c87f54b57a58fa1997c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8668-cwe-79-improper-neutralization-of-in-f0c655b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20E-Kalite%20Software%20Hardware%20Engineering%20Design%20and%20Internet%20Services%20Industry%20and%20Trade%20Ltd.%20Co.%20Turboard&amp;severity=critical&amp;id=698c8bab4b57a58fa19a50ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2337-cwe-79-xss-in-plunet-plunet-business-3f4da7c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2337%3A%20CWE-79%20-%20XSS%20in%20Plunet%20Plunet%20BusinessManager&amp;severity=high&amp;id=698c8bab4b57a58fa19a50d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wsl-in-the-malware-ecosystem-wed-feb-11th-dd92db7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WSL%20in%20the%20Malware%20Ecosystem%2C%20(Wed%2C%20Feb%2011th)&amp;severity=low&amp;id=698c84844b57a58fa1983b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-60-software-vendors-issue-security-fixes-acro-8605239b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2060%20Software%20Vendors%20Issue%20Security%20Fixes%20Across%20OS%2C%20Cloud%2C%20and%20Network%20Platforms&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a5218f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0910-cwe-502-deserialization-of-untrusted-2b761df5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0910%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=698c84b74b57a58fa19857dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-in-the-dark-recognizing-the-signs-of-hidd-cafb76a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20in%20the%20Dark%3A%20Recognizing%20the%20Signs%20of%20Hidden%20Information&amp;severity=medium&amp;id=698c84724b57a58fa1983683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-refresh-windows-secure-boot-certifica-969efd65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Refresh%20Windows%20Secure%20Boot%20Certificates%20in%20June%202026&amp;severity=medium&amp;id=698c7d694b57a58fa196879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56807-cwe-125-in-qnap-systems-inc-media-s-de26f974</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56807%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20add-on&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56808-cwe-78-in-qnap-systems-inc-media-st-5e40d552</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56808%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20Media%20Streaming%20add-on&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30266-cwe-476-in-qnap-systems-inc-qsync-c-75986e82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30266%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30269-cwe-134-in-qnap-systems-inc-qsync-c-e7427f4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30269%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30276-cwe-787-in-qnap-systems-inc-qsync-c-ba937a78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30276%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1a4b57a58fa195cfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47205-cwe-476-in-qnap-systems-inc-qts-202fb48d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47205%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=698c7a1a4b57a58fa195cfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47209-cwe-476-in-qnap-systems-inc-qsync-c-9a669f31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47209%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48722-cwe-476-in-qnap-systems-inc-qsync-c-4ea7ca57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48722%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48723-cwe-120-in-qnap-systems-inc-qsync-c-0480ddf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48723%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48724-cwe-120-in-qnap-systems-inc-qsync-c-c98f3fb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48724%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1a4b57a58fa195cfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48725-cwe-120-in-qnap-systems-inc-quts-he-ea84bc1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48725%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52868-cwe-120-in-qnap-systems-inc-qsync-c-21cf9b81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52868%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8025-cwe-306-missing-authentication-for-c-7202156f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8025%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dinosoft%20Business%20Solutions%20Dinosoft%20ERP&amp;severity=critical&amp;id=698c7a214b57a58fa195d100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52869-cwe-120-in-qnap-systems-inc-qsync-c-78993c96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52869%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52870-cwe-120-in-qnap-systems-inc-qsync-c-640834e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52870%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53598-cwe-476-in-qnap-systems-inc-qsync-c-7d5b3147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53598%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54146-cwe-476-in-qnap-systems-inc-qsync-c-b16383be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54146%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54147-cwe-476-in-qnap-systems-inc-qsync-c-4086e77f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54147%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54148-cwe-476-in-qnap-systems-inc-qsync-c-3a896cd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54148%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1c4b57a58fa195cff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54149-cwe-400-in-qnap-systems-inc-qsync-c-36893fe5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54149%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1c4b57a58fa195cff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54150-cwe-400-in-qnap-systems-inc-qsync-c-eb90d82f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54150%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1c4b57a58fa195cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54151-cwe-400-in-qnap-systems-inc-qsync-c-6f24fbac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54151%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54152-cwe-823-in-qnap-systems-inc-qsync-c-504be840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54152%3A%20CWE-823%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1d4b57a58fa195d024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54155-cwe-770-in-qnap-systems-inc-file-st-99e78981</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54155%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54161-cwe-770-in-qnap-systems-inc-file-st-8216060f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54161%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54162-cwe-22-in-qnap-systems-inc-file-sta-9c2d275e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54162%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54163-cwe-476-in-qnap-systems-inc-file-st-6f8bbc87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54163%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54169-cwe-125-in-qnap-systems-inc-file-st-5ff14bce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54169%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54170-cwe-125-in-qnap-systems-inc-qsync-c-9697d6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54170%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=698c7a1d4b57a58fa195d036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57707-cwe-96-in-qnap-systems-inc-file-sta-d4576711</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57707%3A%20CWE-96%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1d4b57a58fa195d039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57708-cwe-770-in-qnap-systems-inc-qsync-c-7d3223a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57708%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1d4b57a58fa195d03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57709-cwe-122-in-qnap-systems-inc-qsync-c-7e9c4812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57709%3A%20CWE-122%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57710-cwe-770-in-qnap-systems-inc-qsync-c-28aac456</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57710%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57711-cwe-770-in-qnap-systems-inc-qsync-c-01c433be</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57711%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57713-cwe-1390-in-qnap-systems-inc-file-s-374227ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57713%3A%20CWE-1390%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a1f4b57a58fa195d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58466-cwe-457-in-qnap-systems-inc-qts-aeeead1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58466%3A%20CWE-457%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=698c7a1f4b57a58fa195d09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58467-cwe-23-in-qnap-systems-inc-qsync-ce-5da4e57c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58467%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58470-cwe-22-in-qnap-systems-inc-qsync-ce-0012caf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58470%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58471-cwe-770-in-qnap-systems-inc-qsync-c-4edc7487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58471%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58472-cwe-476-in-qnap-systems-inc-qsync-c-78b4c11b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58472%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59386-cwe-476-in-qnap-systems-inc-quts-he-7b41d4c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59386%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a1f4b57a58fa195d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62853-cwe-22-in-qnap-systems-inc-file-sta-91623754</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62853%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=698c7a214b57a58fa195d0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62854-cwe-400-in-qnap-systems-inc-file-st-4173441a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62854%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62855-cwe-22-in-qnap-systems-inc-file-sta-06721278</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62855%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62856-cwe-22-in-qnap-systems-inc-file-sta-2f07461b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62856%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66274-cwe-476-in-qnap-systems-inc-quts-he-f5b39bcf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66274%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=698c7a214b57a58fa195d0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66277-cwe-59-in-qnap-systems-inc-qts-27355280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66277%3A%20CWE-59%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=critical&amp;id=698c7a214b57a58fa195d0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66278-cwe-22-in-qnap-systems-inc-file-sta-aebdcfcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66278%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68406-cwe-22-in-qnap-systems-inc-qsync-ce-27ea0a37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68406%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=698c7a214b57a58fa195d0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22894-cwe-22-in-qnap-systems-inc-file-sta-aaf2e280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22894%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=698c7a214b57a58fa195d103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-patches-endpoint-manager-vulnerabilities-di-d644884a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Patches%20Endpoint%20Manager%20Vulnerabilities%20Disclosed%20in%20October%202025&amp;severity=high&amp;id=698c733e4b57a58fa19402e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10174-cwe-319-cleartext-transmission-of-s-ec217346</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10174%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Pan%20Software%20%26%20Information%20Technologies%20Ltd.%20PanCafe%20Pro&amp;severity=high&amp;id=698c6f8b4b57a58fa1932160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-training-open-the-door-for-crypto-mining-i-d1e06ea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20Training%20Open%20the%20Door%20for%20Crypto-Mining%20in%20Fortune%20500%20Cloud%20Environments&amp;severity=medium&amp;id=698d852bc9e1ff5ad8a52192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chipmaker-patch-tuesday-over-80-vulnerabilities-ad-681c0f45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chipmaker%20Patch%20Tuesday%3A%20Over%2080%20Vulnerabilities%20Addressed%20by%20Intel%20and%20AMD&amp;severity=medium&amp;id=698c61484b57a58fa18f2846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-59-vulnerabilities-including-six-b4833f04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2059%20Vulnerabilities%20Including%20Six%20Actively%20Exploited%20Zero-Days&amp;severity=critical&amp;id=698c726b4b57a58fa193ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sshstalker-botnet-uses-irc-c2-to-control-linux-sys-0e698cd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSHStalker%20Botnet%20Uses%20IRC%20C2%20to%20Control%20Linux%20Systems%20via%20Legacy%20Kernel%20Exploits&amp;severity=medium&amp;id=698c726b4b57a58fa193ba9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15096-cwe-639-authorization-bypass-throug-7d3939ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15096%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kamleshyadav%20Videospirecore%20Theme%20Plugin&amp;severity=high&amp;id=698c536b4b57a58fa18a16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-high-severity-vulnerabilities-07bf4c77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=698c4fb44b57a58fa188c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2295-cwe-200-exposure-of-sensitive-inform-32b439e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2295%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpzoom%20WPZOOM%20Addons%20for%20Elementor%20%E2%80%93%20Starter%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=698c4ff54b57a58fa188e032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13651-cwe-497-exposure-of-sensitive-syste-b0f956be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13651%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13650-cwe-79-improper-neutralization-of-i-26065390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13649-cwe-79-improper-neutralization-of-i-59c7ab0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13648-cwe-79-improper-neutralization-of-i-e506375a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microcom%20ZeusWeb&amp;severity=medium&amp;id=698c48e04b57a58fa1864cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-intel-security-audit-reveals-severe-tdx-vul-687e4135</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google-Intel%20Security%20Audit%20Reveals%20Severe%20TDX%20Vulnerability%20Allowing%20Full%20Compromise&amp;severity=low&amp;id=698c41a44b57a58fa1847dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9986-cwe-497-exposure-of-sensitive-system-8e89085f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9986%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vadi%20Corporate%20Information%20Systems%20Ltd.%20Co.%20DIGIKENT&amp;severity=high&amp;id=698c455b4b57a58fa185634b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1827-cwe-79-improper-neutralization-of-in-212859a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luke-alford%20IDE%20Micro%20code-editor&amp;severity=medium&amp;id=698c3e564b57a58fa1832d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0815-cwe-79-improper-neutralization-of-in-fbd40c5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pankajanupam%20Category%20Image&amp;severity=medium&amp;id=698c3e544b57a58fa1832d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1833-cwe-862-missing-authorization-in-smr-093d51f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1833%3A%20CWE-862%20Missing%20Authorization%20in%20sm_rasmy%20WaMate%20Confirm%20%E2%80%93%20Order%20Confirmation&amp;severity=medium&amp;id=698c3e564b57a58fa1832d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1826-cwe-79-improper-neutralization-of-in-ebbfc998</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openpos%20OpenPOS%20Lite%20%E2%80%93%20Point%20of%20Sale%20for%20WooCommerce&amp;severity=medium&amp;id=698c3e544b57a58fa1832d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1560-cwe-94-improper-control-of-generatio-655d2091</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1560%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nko%20Custom%20Block%20Builder%20%E2%80%93%20Lazy%20Blocks&amp;severity=high&amp;id=698c3e544b57a58fa1832d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1786-cwe-862-missing-authorization-in-bad-0ad4d948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1786%3A%20CWE-862%20Missing%20Authorization%20in%20badbreze%20Twitter%20posts%20to%20Blog&amp;severity=medium&amp;id=698c3e544b57a58fa1832d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1809-cwe-79-improper-neutralization-of-in-a8498af0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhoylman%20HTML%20Shortcodes&amp;severity=medium&amp;id=698c3e544b57a58fa1832d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0724-cwe-79-improper-neutralization-of-in-44d5af48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wecodify%20WPlyr%20Media%20Block&amp;severity=medium&amp;id=698c3e544b57a58fa1832d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1748-cwe-862-missing-authorization-in-kir-06306df0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1748%3A%20CWE-862%20Missing%20Authorization%20in%20kirilkirkov%20Invoct%20%E2%80%93%20PDF%20Invoices%20%26%20Billing%20for%20WooCommerce&amp;severity=medium&amp;id=698c3e544b57a58fa1832d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1215-cwe-352-cross-site-request-forgery-c-e191d329</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1215%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20messagemetric%20MMA%20Call%20Tracking&amp;severity=medium&amp;id=698c3e544b57a58fa1832d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1853-cwe-79-improper-neutralization-of-in-dae2cdfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digiblogger%20BuddyHolis%20ListSearch&amp;severity=medium&amp;id=698c3e564b57a58fa1832d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1804-cwe-79-improper-neutralization-of-in-9a2b3c75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20master-buldog%20WDES%20Responsive%20Popup&amp;severity=medium&amp;id=698c3e544b57a58fa1832d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1885-cwe-79-improper-neutralization-of-in-da70e811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Slideshow%20Wp&amp;severity=medium&amp;id=698c3e564b57a58fa1832da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15440-cwe-79-improper-neutralization-of-i-0e59bc16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ione360%20iONE360%20%20configurator&amp;severity=high&amp;id=698c3e544b57a58fa1832d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10913-cwe-79-improper-neutralization-of-i-fb5e53f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saastech%20Cleaning%20and%20Internet%20Services%20Inc.%20TemizlikYolda&amp;severity=high&amp;id=698c3acf4b57a58fa181a0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10912-cwe-639-authorization-bypass-throug-3834804e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10912%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Saastech%20Cleaning%20and%20Internet%20Services%20Inc.%20TemizlikYolda&amp;severity=medium&amp;id=698c374b4b57a58fa17fe935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-addressed-by-sie-e2bcd2c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Addressed%20by%20Siemens%2C%20Schneider%2C%20Aveva%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=698c33944b57a58fa17edb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-unc1069-uses-ai-lures-to-attack-babdf923</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20UNC1069%20Uses%20AI%20Lures%20to%20Attack%20Cryptocurrency%20Organizations&amp;severity=medium&amp;id=698c726b4b57a58fa193ba9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1235-cwe-502-deserialization-of-untrusted-67de3834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1235%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WP%20eCommerce&amp;severity=medium&amp;id=698c1eb04b57a58fa179b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15400-cwe-862-missing-authorization-in-pi-db24c504</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15400%3A%20CWE-862%20Missing%20Authorization%20in%20OpenPix%20for%20WooCommerce&amp;severity=medium&amp;id=698c1eb04b57a58fa179b72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1357-cwe-434-unrestricted-upload-of-file--8f35918d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1357%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid%20Backup%20%26%20Migration&amp;severity=critical&amp;id=698c17a84b57a58fa177280b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1893-cwe-79-improper-neutralization-of-in-b4bf78e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lordspace%20Orbisius%20Random%20Name%20Generator&amp;severity=medium&amp;id=698c10a64b57a58fa174e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26079-cwe-829-inclusion-of-functionality--f5812b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26079%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=698c10a64b57a58fa174e10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-peek-into-muddled-libras-operational-playbook-f9bc0191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Peek%20Into%20Muddled%20Libra&apos;s%20Operational%20Playbook&amp;severity=medium&amp;id=698c618d4b57a58fa18f34d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14541-cwe-94-improper-control-of-generati-b4b6841f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14541%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Lucky%20Wheel%20Giveaway&amp;severity=high&amp;id=698bdf6c4b57a58fa14457fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13431-cwe-89-improper-neutralization-of-s-c5a38105</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13431%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=medium&amp;id=698bdf6c4b57a58fa14457f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1231-cwe-79-improper-neutralization-of-in-952da465</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=698bdf6c4b57a58fa1445802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15524-cwe-862-missing-authorization-in-fo-2667d56f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15524%3A%20CWE-862%20Missing%20Authorization%20in%20fooplugins%20Gallery%20by%20FooGallery&amp;severity=medium&amp;id=698bdf6c4b57a58fa14457fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1571-cwe-79-improper-neutralization-of-in-6884d102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1571%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20C60%20v3&amp;severity=medium&amp;id=698bd4e04b57a58fa13e5766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26480-na-ffe73103</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26480%3A%20n%2Fa&amp;severity=high&amp;id=698d7607c9e1ff5ad87e3ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26479-na-aa875916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26479%3A%20n%2Fa&amp;severity=medium&amp;id=698d7607c9e1ff5ad87e3ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26478-na-e8485225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26478%3A%20n%2Fa&amp;severity=medium&amp;id=698d7607c9e1ff5ad87e3c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26477-na-21213ca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26477%3A%20n%2Fa&amp;severity=high&amp;id=698d7607c9e1ff5ad87e3c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-11-92ce0ce0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-11&amp;severity=medium&amp;id=698d1b994b57a58fa1df33b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67135-na-57ed4fd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67135%3A%20n%2Fa&amp;severity=critical&amp;id=698d0a3b4b57a58fa1d8b228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64074-na-cc84b61f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64074%3A%20n%2Fa&amp;severity=medium&amp;id=698d0a3b4b57a58fa1d8b224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50619-na-36cc4424</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50619%3A%20n%2Fa&amp;severity=high&amp;id=698cfc2b4b57a58fa1d1eb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50617-na-d20ee4c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50617%3A%20n%2Fa&amp;severity=high&amp;id=698cf8a94b57a58fa1cef246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50620-na-a1921cab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50620%3A%20n%2Fa&amp;severity=high&amp;id=698ce7144b57a58fa1c6a88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50618-na-5f1d54a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50618%3A%20n%2Fa&amp;severity=medium&amp;id=698cd9034b57a58fa1b9879a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70297-na-67da88aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70297%3A%20n%2Fa&amp;severity=medium&amp;id=698cd1fb4b57a58fa1b55bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70296-na-8c0a8a2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70296%3A%20n%2Fa&amp;severity=medium&amp;id=698cce794b57a58fa1b3e29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69873-na-bb81f42f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69873%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20ajv.js%20ajv&amp;severity=low&amp;id=698cce794b57a58fa1b3e299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69872-na-f86d03c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69872%3A%20n%2Fa&amp;severity=critical&amp;id=698cce794b57a58fa1b3e295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69871-na-9d3ef4e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69871%3A%20n%2Fa&amp;severity=high&amp;id=698cce794b57a58fa1b3e290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70085-na-ff8a629e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70085%3A%20n%2Fa&amp;severity=critical&amp;id=698cc7724b57a58fa1b0b315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70084-na-756b4b9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70084%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70083-na-661c019f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70083%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70029-na-7c64998b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70029%3A%20n%2Fa&amp;severity=high&amp;id=698cc7724b57a58fa1b0b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69874-na-4588cf43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69874%3A%20n%2Fa&amp;severity=critical&amp;id=698cc7724b57a58fa1b0b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65480-na-25d9ca59</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65480%3A%20n%2Fa&amp;severity=high&amp;id=698cc0684b57a58fa1ac24b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65128-na-b4c76562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65128%3A%20n%2Fa&amp;severity=high&amp;id=698cbce54b57a58fa1aace42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65127-na-de5a23b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65127%3A%20n%2Fa&amp;severity=medium&amp;id=698cb5dc4b57a58fa1a8441e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64075-na-3573219f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64075%3A%20n%2Fa&amp;severity=critical&amp;id=698cab544b57a58fa1a4b9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glibc-238-buffer-overflow-d3afe87a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=glibc%202.38%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=698c72394b57a58fa193b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-100177637009-spoofing-vulnerability-6d81f54a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2010.0.17763.7009%20-%20spoofing%20vulnerability&amp;severity=medium&amp;id=698c72394b57a58fa193b5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/motioneye-0431b4-rce-f554aa8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=motionEye%200.43.1b4%20-%20RCE&amp;severity=critical&amp;id=698c72394b57a58fa193b5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-11-8b4066d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-11&amp;severity=low&amp;id=698c0ce64b57a58fa173106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25872-cwe-22-improper-limitation-of-a-pat-9ffd5c98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25872%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ALBRECHT%20JUNG%20GMBH%20%26%20CO.%20KG%20JUNG%20Smart%20Panel%205.1%20KNX&amp;severity=medium&amp;id=698bb5374b57a58fa12f9f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25870-cwe-918-server-side-request-forgery-fe29ed6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25870%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20doramart%20DoraCMS&amp;severity=medium&amp;id=698bb1b44b57a58fa12ed728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26013-cwe-918-server-side-request-forgery-e899b39d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26013%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain&amp;severity=low&amp;id=698bae314b57a58fa12e3ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26007-cwe-345-insufficient-verification-o-aa58d03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26007%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20pyca%20cryptography&amp;severity=high&amp;id=698ba7284b57a58fa12c897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26006-cwe-1333-inefficient-regular-expres-7697f33c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26006%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Significant-Gravitas%20AutoGPT&amp;severity=medium&amp;id=698ba3a54b57a58fa12bb851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12699-cwe-538-insertion-of-sensitive-info-a289ec92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12699%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20ZOLL%20ZOLL%20ePCR%20IOS%20Mobile%20Application&amp;severity=medium&amp;id=698b9ca04b57a58fa12a793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1507-cwe-248-uncaught-exception-in-aveva--0f034206</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1507%3A%20CWE-248%20Uncaught%20Exception%20in%20AVEVA%20PI%20Data%20Archive%20PI%20Server&amp;severity=high&amp;id=698b95984b57a58fa128a7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1495-cwe-532-insertion-of-sensitive-infor-fb016140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1495%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20AVEVA%20PI%20to%20CONNECT%20Agent&amp;severity=medium&amp;id=698b95984b57a58fa128a7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1763-vulnerability-in-ge-vernova-enervist-a5f799b8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1763%3A%20Vulnerability%20in%20GE%20Vernova%20Enervista&amp;severity=medium&amp;id=698b92154b57a58fa127f942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1762-cwe-23-in-ge-vernova-enervista-94d6f3cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1762%3A%20CWE-23%20in%20GE%20Vernova%20Enervista&amp;severity=low&amp;id=698b92154b57a58fa127f93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29951-cwe-121-stack-based-buffer-overflow-0c50bbc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29951%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20AMD%20AMD%20Athlon%E2%84%A2%203000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=698b8e904b57a58fa1272708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36311-cwe-367-time-of-check-time-of-use-t-fe1ed3d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36311%3A%20CWE-367%20%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207045%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa1272702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48515-cwe-190-integer-overflow-or-wraparo-b6cea696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48515%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa127270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29949-cwe-787-out-of-bounds-write-in-amd--9eb7bd3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29949%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=698b8e904b57a58fa1272705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21349-out-of-bounds-write-cwe-787-in-adob-416fb734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21349%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Lightroom%20Desktop&amp;severity=high&amp;id=698b8e904b57a58fa1272711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21348-out-of-bounds-read-cwe-125-in-adobe-fc7b7935</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21348%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=698b8e904b57a58fa127270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6-actively-exploited-zero-days-patched-by-microsof-0f09ad88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6%20Actively%20Exploited%20Zero-Days%20Patched%20by%20Microsoft%20With%20February%202026%20Updates&amp;severity=medium&amp;id=698b87504b57a58fa125b7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36355-cwe-787-out-of-bounds-write-in-amd--2429e3e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36355%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=698b8b0b4b57a58fa1266760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36310-cwe-124-buffer-underwrite-buffer-un-6a0e7ccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36310%3A%20CWE-124%20%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126675b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29946-cwe-1301-insufficient-or-incomplete-3dcdfadc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29946%3A%20CWE-1301%20%20Insufficient%20or%20Incomplete%20Data%20Removal%20within%20Hardware%20Component%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0029-cwe-390-detection-of-error-condition-67b69e6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0029%3A%20CWE-390%20%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=low&amp;id=698b8b0b4b57a58fa1266769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0031-cwe-416-use-after-free-in-amd-amd-ep-c4a4ee9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0031%3A%20CWE-416%20%20Use%20After%20Free%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48514-cwe-1220-insufficient-granularity-o-126f67a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48514%3A%20CWE-1220%20%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54514-cwe-1189-improper-isolation-of-shar-a13ef11f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54514%3A%20CWE-1189%20%20Improper%20Isolation%20of%20Shared%20Resources%20on%20System-on-a-Chip%20(SoC)%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48509-cwe-665-improper-initialization-in--13cdb17f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48509%3A%20CWE-665%20%20Improper%20Initialization%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=low&amp;id=698b8b0c4b57a58fa12667bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52534-cwe-1284-improper-validation-of-spe-57274411</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52534%3A%20CWE-1284%20%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0012-cwe-1260-improper-handling-of-overla-f76c15f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0012%3A%20CWE-1260%20%20Improper%20Handling%20of%20Overlap%20Between%20Protected%20Memory%20Ranges%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29939-cwe-284-improper-access-control-in--59c3c267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29939%3A%20CWE-284%20%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa126676f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21953-cwe-1284-improper-validation-of-spe-eca65f76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21953%3A%20CWE-1284%20%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29950-cwe-1274-improper-access-control-fo-25abe6c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29950%3A%20CWE-1274%20%20Improper%20Access%20Control%20for%20Volatile%20Memory%20Containing%20Boot%20Code%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=high&amp;id=698b8b0b4b57a58fa1266778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29952-cwe-457-use-of-uninitialized-variab-fe3609da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29952%3A%20CWE-457%20%20Use%20of%20Uninitialized%20Variable%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52536-cwe-1231-improper-prevention-of-loc-358a355e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52536%3A%20CWE-1231%20%20Improper%20Prevention%20of%20Lock%20Bit%20Modification%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48517-cwe-1220-insufficient-granularity-o-7bb161fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48517%3A%20CWE-1220%20%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29948-cwe-1260-improper-handling-of-overl-2b0a3d52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29948%3A%20CWE-1260%20%20Improper%20Handling%20of%20Overlap%20Between%20Protected%20Memory%20Ranges%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=medium&amp;id=698b8b0b4b57a58fa1266775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-january-2026-tue-feb-10th-86635a1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20-%20February%202026%2C%20(Tue%2C%20Feb%2010th)&amp;severity=critical&amp;id=698b79404b57a58fa1219c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2303-cwe-183-permissive-list-of-allowed-i-e24fff4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2303%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Inputs%20in%20MongoDB%20Inc%20MongoDB%20Go%20Driver&amp;severity=medium&amp;id=698b8b0c4b57a58fa12667cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2302-183-in-mongodb-inc-mongodb-ruby-driv-24518ade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2302%3A%20183%20in%20MongoDB%20Inc%20MongoDB%20Ruby%20Driver&amp;severity=medium&amp;id=698b8b0e4b57a58fa1266823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26009-cwe-78-improper-neutralization-of-s-ff7845bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26009%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20karutoil%20catalyst&amp;severity=critical&amp;id=698b8b0e4b57a58fa126681f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25506-cwe-787-out-of-bounds-write-in-dun--f36c0150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25506%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20dun%20munge&amp;severity=high&amp;id=698b8b0e4b57a58fa1266817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25613-cwe-704-incorrect-type-conversion-o-ed12d22d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25613%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0e4b57a58fa126681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1849-cwe-674-uncontrolled-recursion-in-mo-6564e772</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1849%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0c4b57a58fa12667d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1850-cwe-770-allocation-of-resources-with-3294391e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1850%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b8b0c4b57a58fa12667d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25609-cwe-862-missing-authorization-in-mo-e71d857e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25609%3A%20CWE-862%20Missing%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=698b8e904b57a58fa1272714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21352-out-of-bounds-write-cwe-787-in-adob-09e05894</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21352%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=698b7cf94b57a58fa12364ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21354-integer-overflow-or-wraparound-cwe--2ca7577c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21354%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=698b7cfb4b57a58fa1236d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21353-integer-overflow-or-wraparound-cwe--b32757ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21353%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=698b7cfb4b57a58fa1236d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21355-out-of-bounds-read-cwe-125-in-adobe-f5bdc89e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21355%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=698b7cfb4b57a58fa1236d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25610-cwe-617-reachable-assertion-in-mong-a911ba01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25610%3A%20CWE-617%20Reachable%20Assertion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cfb4b57a58fa1236d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21346-out-of-bounds-write-cwe-787-in-adob-00924c74</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21346%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=698b7cf94b57a58fa12364e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21347-integer-overflow-or-wraparound-cwe--213c12c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21347%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=698b7cf94b57a58fa12364e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1848-cwe-770-allocation-of-resources-with-1398a448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1848%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cf94b57a58fa12364c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21344-out-of-bounds-read-cwe-125-in-adobe-ead62b7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21344%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21343-out-of-bounds-read-cwe-125-in-adobe-1882fd40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21343%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21341-out-of-bounds-write-cwe-787-in-adob-54edf7b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21341%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21345-out-of-bounds-read-cwe-125-in-adobe-7448682f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21345%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21342-out-of-bounds-write-cwe-787-in-adob-4304a6e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21342%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=698b7cf94b57a58fa12364d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1847-cwe-770-allocation-of-resources-with-0e0a3fb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1847%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b7cf94b57a58fa12364c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21337-out-of-bounds-read-cwe-125-in-adobe-3fd61a7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21337%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76034b57a58fa120a0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21335-out-of-bounds-write-cwe-787-in-adob-729b2edf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21335%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=698b76034b57a58fa120a0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21339-out-of-bounds-read-cwe-125-in-adobe-94a153b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21339%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21334-out-of-bounds-write-cwe-787-in-adob-ea179140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21334%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=698b76034b57a58fa120a0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21338-null-pointer-dereference-cwe-476-in-aecc2842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21338%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21340-out-of-bounds-read-cwe-125-in-adobe-27a8904a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21340%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76054b57a58fa120a664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21336-null-pointer-dereference-cwe-476-in-838ebf90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21336%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=698b76034b57a58fa120a0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25612-cwe-412-unrestricted-externally-acc-d88a4026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25612%3A%20CWE-412%20Unrestricted%20Externally%20Accessible%20Lock%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b76074b57a58fa120a6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21358-heap-based-buffer-overflow-cwe-122--7c3039ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21358%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=698b76054b57a58fa120a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21332-out-of-bounds-read-cwe-125-in-adobe-8fbe4a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21332%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=698b76034b57a58fa120a0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21357-heap-based-buffer-overflow-cwe-122--77a0fac6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21357%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=698b76054b57a58fa120a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1997-cwe-346-in-hp-inc-hp-officejet-pro-8-83ab6145</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1997%3A%20CWE-346%20in%20HP%20Inc%20HP%20OfficeJet%20Pro%208730%20All-in-One%20Printer&amp;severity=medium&amp;id=698b75fd4b57a58fa1209f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21329-use-after-free-cwe-416-in-adobe-aft-b64310f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21329%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21323-use-after-free-cwe-416-in-adobe-aft-6fbcc82d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21323%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21324-out-of-bounds-read-cwe-125-in-adobe-bd7a5d57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21324%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21326-use-after-free-cwe-416-in-adobe-aft-7c4379da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21326%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21322-out-of-bounds-read-cwe-125-in-adobe-4ca2f89a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21322%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21318-out-of-bounds-write-cwe-787-in-adob-67f952e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21318%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21328-out-of-bounds-write-cwe-787-in-adob-97a21ada</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21328%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21319-out-of-bounds-read-cwe-125-in-adobe-2d8062bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21319%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=698b76024b57a58fa120a07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21350-null-pointer-dereference-cwe-476-in-ee534c5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21350%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=698b76054b57a58fa120a667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21330-access-of-resource-using-incompatib-c0b7956b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21330%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21325-out-of-bounds-read-cwe-125-in-adobe-c9fd0607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21325%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21327-out-of-bounds-write-cwe-787-in-adob-2556375a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21327%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76034b57a58fa120a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21320-use-after-free-cwe-416-in-adobe-aft-64c2ca36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21320%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21321-integer-overflow-or-wraparound-cwe--8f1e2ba8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21321%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76024b57a58fa120a084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21351-use-after-free-cwe-416-in-adobe-aft-57a85fff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21351%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=698b76054b57a58fa120a66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25611-cwe-405-asymmetric-resource-consump-a2fae2d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25611%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=698b76074b57a58fa120a6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26003-cwe-601-url-redirection-to-untruste-b1b1f630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26003%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=698b76084b57a58fa120a6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20841-cwe-77-improper-neutralization-of-s-ec3b97e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20841%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%20Notepad&amp;severity=high&amp;id=698b75fd4b57a58fa1209f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20846-cwe-126-buffer-over-read-in-microso-f2951141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20846%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=698b75fd4b57a58fa1209f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21222-cwe-532-insertion-of-sensitive-info-d463c6dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21222%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=698b75fd4b57a58fa1209fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21228-cwe-295-improper-certificate-valida-42307d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21228%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Microsoft%20Azure%20Local&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21231-cwe-362-concurrent-execution-using--b653a6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21231%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75fd4b57a58fa1209fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21232-cwe-822-untrusted-pointer-dereferen-29f52b17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21232%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=698b75fd4b57a58fa1209faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21237-cwe-362-concurrent-execution-using--c67d91bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21237%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21238-cwe-284-improper-access-control-in--9d2f4553</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21238%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21239-cwe-122-heap-based-buffer-overflow--2b1ff487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21239%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21241-cwe-416-use-after-free-in-microsoft-31a63962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21241%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=698b75ff4b57a58fa1209fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21240-cwe-367-time-of-check-time-of-use-t-912190b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21240%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=698b75ff4b57a58fa1209fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21243-cwe-476-null-pointer-dereference-in-95b1bfcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21243%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=698b75ff4b57a58fa1209ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21244-cwe-122-heap-based-buffer-overflow--12cc8274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21244%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21245-cwe-122-heap-based-buffer-overflow--be095a8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21245%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=698b76004b57a58fa120a015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21249-cwe-73-external-control-of-file-nam-495288bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21249%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=low&amp;id=698b76004b57a58fa120a029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21250-cwe-822-untrusted-pointer-dereferen-d6029a12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21250%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=698b76004b57a58fa120a02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21251-cwe-416-use-after-free-in-microsoft-2a8f2aee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21251%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=698b76004b57a58fa120a031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21253-cwe-416-use-after-free-in-microsoft-9583f378</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21253%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21255-cwe-284-improper-access-control-in--4a3cbcd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21255%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21256-cwe-77-improper-neutralization-of-s-bd386709</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21256%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=698b76014b57a58fa120a04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21257-cwe-77-improper-neutralization-of-s-eef2bf37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21257%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=698b76014b57a58fa120a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21261-cwe-125-out-of-bounds-read-in-micro-d42832b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21261%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=698b76014b57a58fa120a05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21508-cwe-287-improper-authentication-in--39516ca7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21508%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76054b57a58fa120a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21511-cwe-502-deserialization-of-untruste-c7e00f0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21511%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76054b57a58fa120a679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21516-cwe-77-improper-neutralization-of-s-7c142c32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21516%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20GitHub%20Copilot%20Plugin%20for%20JetBrains%20IDEs&amp;severity=high&amp;id=698b76064b57a58fa120a68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21525-cwe-476-null-pointer-dereference-in-924c36f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21525%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=698b76064b57a58fa120a6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21514-cwe-807-reliance-on-untrusted-input-48133edc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21514%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76064b57a58fa120a68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21529-cwe-79-improper-neutralization-of-i-86f49936</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21529%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20HDInsight&amp;severity=medium&amp;id=698b76074b57a58fa120a6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21537-cwe-94-improper-control-of-generati-a6d4f39d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21537%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=698b76074b57a58fa120a6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21510-cwe-693-protection-mechanism-failur-d50ef400</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21510%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76054b57a58fa120a676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21531-cwe-502-deserialization-of-untruste-4a5578f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21531%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20AI%20Language%20Authoring&amp;severity=critical&amp;id=698b76074b57a58fa120a6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21528-cwe-1327-binding-to-an-unrestricted-33112f9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21528%3A%20CWE-1327%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Microsoft%20Azure%20IoT%20Explorer&amp;severity=medium&amp;id=698b76074b57a58fa120a6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21527-cwe-451-user-interface-ui-misrepres-8ff3c3ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21527%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=698b76074b57a58fa120a6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21522-cwe-77-improper-neutralization-of-s-ccf54b9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21522%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=698b76064b57a58fa120a69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21513-cwe-693-protection-mechanism-failur-25c7912e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21513%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76064b57a58fa120a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21533-cwe-269-improper-privilege-manageme-65b76e18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21533%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76074b57a58fa120a6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21229-cwe-20-improper-input-validation-in-3f06c1ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21229%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Power%20BI%20Report%20Server&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21523-cwe-367-time-of-check-time-of-use-t-5b40cf76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21523%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=698b76064b57a58fa120a69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23655-cwe-312-cleartext-storage-of-sensit-97250209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23655%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20ACI%20Confidential%20Containers&amp;severity=medium&amp;id=698b76074b57a58fa120a6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21218-cwe-166-improper-handling-of-missin-03931b56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21218%3A%20CWE-166%3A%20Improper%20Handling%20of%20Missing%20Special%20Element%20in%20Microsoft%20.NET%2010.0&amp;severity=high&amp;id=698b75fd4b57a58fa1209fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21236-cwe-122-heap-based-buffer-overflow--a186cc7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21236%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21234-cwe-362-concurrent-execution-using--8598588f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21234%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=698b75ff4b57a58fa1209fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21235-cwe-416-use-after-free-in-microsoft-104050b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21235%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b75ff4b57a58fa1209fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21242-cwe-416-use-after-free-in-microsoft-64c0667f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21242%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=698b75ff4b57a58fa1209ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21246-cwe-122-heap-based-buffer-overflow--31ad794b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21246%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21247-cwe-20-improper-input-validation-in-f96e7b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21247%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21248-cwe-122-heap-based-buffer-overflow--3bd56463</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21248%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76004b57a58fa120a022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21260-cwe-200-exposure-of-sensitive-infor-f7507e93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21260%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76014b57a58fa120a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21258-cwe-20-improper-input-validation-in-46ce14ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21258%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=698b76014b57a58fa120a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21259-cwe-122-heap-based-buffer-overflow--95804ee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21259%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=698b76014b57a58fa120a056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21512-cwe-918-server-side-request-forgery-cc85b290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21512%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20DevOps%20Server%202022&amp;severity=medium&amp;id=698b76064b57a58fa120a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21517-cwe-59-improper-link-resolution-bef-9e8195aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21517%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20App%20for%20Mac&amp;severity=medium&amp;id=698b76064b57a58fa120a692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21518-cwe-77-improper-neutralization-of-s-865ead57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21518%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=698b76064b57a58fa120a695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21519-cwe-843-access-of-resource-using-in-3238adbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21519%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=698b76064b57a58fa120a698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25992-cwe-22-improper-limitation-of-a-pat-3ff8a161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25992%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=698b76074b57a58fa120a6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-dissecting-an-ai-generated-c2-implant-d0d44f0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%3A%20Dissecting%20an%20AI-Generated%20C2%20Implant&amp;severity=medium&amp;id=698c4ff54b57a58fa188e028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21316-access-of-memory-location-after-end-2a08e8da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21316%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76024b57a58fa120a075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21312-out-of-bounds-write-cwe-787-in-adob-415a7d98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21312%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Audition&amp;severity=high&amp;id=698b76014b57a58fa120a05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21315-out-of-bounds-read-cwe-125-in-adobe-8b73d190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21315%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21313-out-of-bounds-read-cwe-125-in-adobe-4d37b63b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21313%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21317-out-of-bounds-read-cwe-125-in-adobe-94a6cd01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21317%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76024b57a58fa120a078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21314-out-of-bounds-read-cwe-125-in-adobe-3f3f4719</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21314%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=698b76014b57a58fa120a065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-operatives-impersonate-professionals-on-linke-66307456</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Operatives%20Impersonate%20Professionals%20on%20LinkedIn%20to%20Infiltrate%20Companies&amp;severity=medium&amp;id=698c726b4b57a58fa193baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25993-cwe-89-improper-neutralization-of-s-6994a1ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25993%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20evershopcommerce%20evershop&amp;severity=critical&amp;id=698b76084b57a58fa120a6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-tuesday-adobe-fixes-44-vulnerabilities-in-cr-7d6cb550</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Tuesday%3A%20Adobe%20Fixes%2044%20Vulnerabilities%20in%20Creative%20Apps&amp;severity=critical&amp;id=698b6eb44b57a58fa11cf919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1996-cwe-703-in-hp-inc-hp-officejet-pro-8-f3d8e306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1996%3A%20CWE-703%20in%20HP%20Inc%20HP%20OfficeJet%20Pro%208710%20All-in-One%20Printer%20series&amp;severity=medium&amp;id=698b6f014b57a58fa11d3750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0651-cwe-22-improper-limitation-of-a-path-aef40ad6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0651%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=medium&amp;id=698b6f014b57a58fa11d3741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25805-cwe-356-product-ui-does-not-warn-us-a2e7b65f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25805%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20zed-industries%20zed&amp;severity=medium&amp;id=698b6f014b57a58fa11d3753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0652-cwe-78-improper-neutralization-of-sp-b7dc0c67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0652%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=high&amp;id=698b6f014b57a58fa11d3746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0653-cwe-284-improper-access-control-in-t-92cb4120</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0653%3A%20CWE-284%20Improper%20Access%20Control%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C260%20v1&amp;severity=high&amp;id=698b6f014b57a58fa11d374b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25728-cwe-367-time-of-check-time-of-use-t-e51843d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25728%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MacWarrior%20clipbucket-v5&amp;severity=critical&amp;id=698b6b654b57a58fa11c68af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25646-cwe-122-heap-based-buffer-overflow--d5d2a3eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25646%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pnggroup%20libpng&amp;severity=high&amp;id=698b6b654b57a58fa11c68ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25577-cwe-248-uncaught-exception-in-emmet-9048927c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25577%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20emmett-framework%20core&amp;severity=high&amp;id=698b6b654b57a58fa11c68a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36522-escalation-of-privilege-in-intelr-c-b7487ad3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36522%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Chipset%20Software&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36511-escalation-of-privilege-in-intelr-m-948f9e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36511%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Memory%20and%20Storage%20Tool&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35999-escalation-of-privilege-in-system-f-008bd0c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35999%3A%20Escalation%20of%20Privilege%20in%20System%20Firmware%20Update%20Utility%20(SysFwUpdt)%20for%20Intel(R)%20Server%20Boards%20and%20Intel(R)%20Server%20Systems%20Based&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35998-escalation-of-privilege-in-intelr-p-9148e8d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35998%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Platforms&amp;severity=high&amp;id=698b5d5f4b57a58fa119cfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35992-denial-of-service-in-intelr-npu-dri-d8073a39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35992%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33030-escalation-of-privilege-in-intelr-n-d5223770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33030%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20NPU%20Drivers&amp;severity=low&amp;id=698b5d5e4b57a58fa119cf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32739-denial-of-service-in-intelr-graphic-82e325da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32739%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers%20and%20Intel%20LTS%20kernels&amp;severity=low&amp;id=698b5d5e4b57a58fa119cf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32735-denial-of-service-in-intelr-npu-dri-424292a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32735%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32467-information-disclosure-in-tdx-modul-7524f617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32467%3A%20Information%20Disclosure%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32453-escalation-of-privilege-in-intelr-g-e147acbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32453%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32452-escalation-of-privilege-in-ai-playg-3ebcad13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32452%3A%20Escalation%20of%20Privilege%20in%20AI%20Playground&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32092-escalation-of-privilege-in-intelr-g-c299a9c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32092%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Software&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32008-denial-of-service-in-intelr-amt-and-de4fe5f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32008%3A%20Denial%20of%20Service%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=high&amp;id=698b5d5e4b57a58fa119cf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32007-information-disclosure-in-tdx-deca45cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32007%3A%20Information%20Disclosure%20in%20TDX&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32003-denial-of-service-in-100gbe-intelr--16d7908c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32003%3A%20Denial%20of%20Service%20in%20100GbE%20Intel(R)%20Ethernet%20Network%20Adapter%20E810&amp;severity=medium&amp;id=698b5d5e4b57a58fa119cf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31944-denial-of-service-in-tdx-module-5e872e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31944%3A%20Denial%20of%20Service%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31655-escalation-of-privilege-in-intelr-b-d7fa739c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31655%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Battery%20Life%20Diagnostic%20Tool&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31648-escalation-of-privilege-in-intelr-p-857c9fde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31648%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Family%20may%20allow%20an%20escalation%20of%20privilege.%20Startup%20code%20and%20smm%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20present%20with%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(low)%2C%20integrity%20(low)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(low)%2C%20integrity%20(low)%20and%20availability%20(none)%20impacts.&amp;severity=low&amp;id=698b5d5d4b57a58fa119cf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30513-escalation-of-privilege-in-tdx-modu-eda181f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30513%3A%20Escalation%20of%20Privilege%20in%20TDX%20Module&amp;severity=high&amp;id=698b5d5d4b57a58fa119cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30508-denial-of-service-in-intelr-platfor-18adcc71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30508%3A%20Denial%20of%20Service%20in%20Intel(R)%20Platforms&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27940-information-disclosure-in-tdx-modul-cf81ef2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27940%3A%20Information%20Disclosure%20in%20TDX%20Module&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27708-information-disclosure-in-intelr-co-cdfb820d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27708%3A%20Information%20Disclosure%20in%20Intel(R)%20Converged%20Security%20and%20Management%20Engine%20(CSME)%20Firmware%20(FW)&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27572-information-disclosure-in-tdx-ae07f705</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27572%3A%20Information%20Disclosure%20in%20TDX&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27560-denial-of-service-in-intelr-platfor-6d7aa8bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27560%3A%20Denial%20of%20Service%20in%20Intel(R)%20Platform&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27535-denial-of-service-in-intelr-etherne-06c3edd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27535%3A%20Denial%20of%20Service%20in%20Intel(R)%20Ethernet%20Connection%20E825-C.&amp;severity=medium&amp;id=698b5d5d4b57a58fa119cf38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27243-denial-of-service-in-intelr-etherne-f8203407</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27243%3A%20Denial%20of%20Service%20in%20Intel(R)%20Ethernet%20Controller%20E810&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25210-escalation-of-privilege-in-server-f-5e1830d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25210%3A%20Escalation%20of%20Privilege%20in%20Server%20Firmware%20Update%20Utility(SysFwUpdt)&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25058-information-disclosure-in-intelr-et-b57b7854</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25058%3A%20Information%20Disclosure%20in%20Intel(R)%20Ethernet%20800-Series&amp;severity=low&amp;id=698b5d5c4b57a58fa119cf13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24851-denial-of-service-in-100gbe-intelr--830c5430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24851%3A%20Denial%20of%20Service%20in%20100GbE%20Intel(R)%20Ethernet%20Controller%20E810&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22885-escalation-of-privilege-in-tdx-modu-198b7450</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22885%3A%20Escalation%20of%20Privilege%20in%20TDX%20Module%20may%20allow%20an%20escalation%20of%20privilege.%20System%20software%20adversary%20with%20a%20privileged%20user%20combined%20with%20a%20high%20complexity%20attack%20may%20enable%20escalation%20of%20privilege.%20This%20result%20may%20potentially%20occur%20via%20local%20access%20when%20attack%20requirements%20are%20not%20present%20without%20special%20internal%20knowledge%20and%20requires%20no%20user%20interaction.%20The%20potential%20vulnerability%20may%20impact%20the%20confidentiality%20(high)%2C%20integrity%20(low)%20and%20availability%20(none)%20of%20the%20vulnerable%20system%2C%20resulting%20in%20subsequent%20system%20confidentiality%20(none)%2C%20integrity%20(none)%20and%20availability%20(none)%20impacts.&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22849-escalation-of-privilege-in-intelr-o-2e9bef72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22849%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20management%20software&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22453-escalation-of-privilege-in-server-f-e97973f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22453%3A%20Escalation%20of%20Privilege%20in%20Server%20Firmware%20Update%20Utility(SysFwUpdt)&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20106-escalation-of-privilege-in-vtunetm--e2f201ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20106%3A%20Escalation%20of%20Privilege%20in%20VTune(TM)%20Profiler%20software%20and%20Intel(R)%20oneAPI%20Base%20Toolkits&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cf04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20080-denial-of-service-in-intelr-amt-and-20221750</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20080%3A%20Denial%20of%20Service%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=high&amp;id=698b5d5c4b57a58fa119cf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20070-escalation-of-privilege-in-intelr-o-69ec1adf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20070%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20management%20software&amp;severity=medium&amp;id=698b5d5c4b57a58fa119cefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62439-improper-access-control-in-fortinet-420d0f3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62439%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=698c57814b57a58fa18c033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62676-escalation-of-privilege-in-fortinet-abf0bc48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62676%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=698b645c4b57a58fa11b308f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68686-information-disclosure-in-fortinet--c42d11a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68686%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698c57814b57a58fa18c0343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64157-execute-unauthorized-code-or-comman-7e15788e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64157%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55018-execute-unauthorized-code-or-comman-c15fa17d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55018%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=698c57814b57a58fa18c0335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22153-improper-access-control-in-fortinet-f6881411</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22153%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=698c10a64b57a58fa174e118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21743-improper-access-control-in-fortinet-d471391c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21743%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAuthenticator&amp;severity=medium&amp;id=698b5d5f4b57a58fa119cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52436-execute-unauthorized-code-or-comman-a9cbd23a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52436%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=698c10a64b57a58fa174e115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15572-memory-leak-in-wasm3-4095fc40</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15572%3A%20Memory%20Leak%20in%20wasm3&amp;severity=medium&amp;id=698b52ca4b57a58fa117f4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11004-cwe-79-improper-neutralization-of-i-6648915e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11004%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20silabs.com%20Simplicity%20Device%20Manager&amp;severity=high&amp;id=698b52ca4b57a58fa117f4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1603-cwe-288-authentication-bypass-using--5ffa4ac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1603%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=698b52ca4b57a58fa117f4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1602-cwe-89-improper-neutralization-of-sp-5dd70a84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1602%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=698b52ca4b57a58fa117f4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-crm-s4hana-netweaver-vulnerab-a693d3a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20CRM%2C%20S%2F4HANA%2C%20NetWeaver%20Vulnerabilities&amp;severity=critical&amp;id=698b48094b57a58fa115bebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-openclaw-ai-agent-found-unsafe-for-use-kaspers-49b2d742</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20OpenClaw%20AI%20agent%20found%20unsafe%20for%20use%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=698b48884b57a58fa115db38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reynolds-ransomware-embeds-byovd-driver-to-disable-556e596f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reynolds%20Ransomware%20Embeds%20BYOVD%20Driver%20to%20Disable%20EDR%20Security%20Tools&amp;severity=medium&amp;id=698c726b4b57a58fa193baa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15571-null-pointer-dereference-in-ckoliva-45a327b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15571%3A%20NULL%20Pointer%20Dereference%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=698b44b84b57a58fa114e1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7636-cwe-89-improper-neutralization-of-sp-1c4a1248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7636%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ergosis%20Security%20Systems%20Computer%20Industry%20and%20Trade%20Inc.%20ZEUS%20PDKS&amp;severity=high&amp;id=698b44b84b57a58fa114e1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7347-cwe-639-authorization-bypass-through-1a11bc39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7347%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dinibh%20Puzzle%20Software%20Solutions%20Dinibh%20Patrol%20Tracking%20System&amp;severity=high&amp;id=698b44b84b57a58fa114e1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-ransomware-to-residency-inside-the-rise-of-th-d5ff902f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Ransomware%20to%20Residency%3A%20Inside%20the%20Rise%20of%20the%20Digital%20Parasite&amp;severity=medium&amp;id=698c726b4b57a58fa193baa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6967-cwe-698-execution-after-redirect-ear-b7408bcf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6967%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Sarman%20Soft%20Software%20and%20Technology%20Services%20Industry%20and%20Trade%20Ltd.%20Co.%20CMS&amp;severity=high&amp;id=698b3db44b57a58fa112edc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-sqli-flaw-enabling-unaut-7ad21464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20SQLi%20Flaw%20Enabling%20Unauthenticated%20Code%20Execution&amp;severity=critical&amp;id=698b13994b57a58fa1ff12fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15570-use-after-free-in-ckolivas-lrzip-acde4ab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15570%3A%20Use%20After%20Free%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=698b36a84b57a58fa10fe57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sshstalker-linux-botnet-uses-old-techniques-de133a8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98SSHStalker%E2%80%99%20Linux%20Botnet%20Uses%20Old%20Techniques&amp;severity=medium&amp;id=698b2be94b57a58fa1054174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zastai-raises-6m-pre-a-to-scale-zero-false-positiv-8cb789bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZAST.AI%20Raises%20%246M%20Pre-A%20to%20Scale%20%22Zero%20False%20Positive%22%20AI-Powered%20Code%20Security&amp;severity=high&amp;id=698c726b4b57a58fa193baaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-patches-critical-rce-vulnerability-ce25850e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Patches%20Critical%20RCE%20Vulnerability&amp;severity=critical&amp;id=698b16d34b57a58fa1ffe8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11537-improper-output-neutralization-for--d502f72e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11537%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=medium&amp;id=698b13804b57a58fa1ff0ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warlock-ransomware-breaches-smartertools-through-u-d0491041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warlock%20Ransomware%20Breaches%20SmarterTools%20Through%20Unpatched%20SmarterMail%20Server&amp;severity=medium&amp;id=698c726b4b57a58fa193baad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/singapore-rootkits-zero-day-used-in-chinese-attack-bf1bac90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Singapore%3A%20Rootkits%2C%20Zero-Day%20Used%20in%20Chinese%20Attack%20on%20Major%20Telecom%20Firms&amp;severity=medium&amp;id=698b053d4b57a58fa1fad507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15569-uncontrolled-search-path-in-artifex-c7cba49b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15569%3A%20Uncontrolled%20Search%20Path%20in%20Artifex%20MuPDF&amp;severity=high&amp;id=698b08f34b57a58fa1fbed10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25656-cwe-427-uncontrolled-search-path-el-5f7fcb0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25656%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=698b05e84b57a58fa1fb4535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25655-cwe-427-uncontrolled-search-path-el-d8eecefc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25655%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=698b05e84b57a58fa1fb450d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23720-cwe-125-out-of-bounds-read-in-sieme-110c9539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb4507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23719-cwe-122-heap-based-buffer-overflow--8707b5c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23719%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb4501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23718-cwe-125-out-of-bounds-read-in-sieme-03ca3b75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23718%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23717-cwe-125-out-of-bounds-read-in-sieme-e4ef4a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23717%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23716-cwe-125-out-of-bounds-read-in-sieme-0be2115c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23715-cwe-787-out-of-bounds-write-in-siem-bde2d93a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23715%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=698b05e84b57a58fa1fb44e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22923-cwe-121-stack-based-buffer-overflow-02a96a6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22923%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20NX&amp;severity=high&amp;id=698b05e84b57a58fa1fb44e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40587-cwe-79-improper-neutralization-of-i-64fada5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40587%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Polarion%20V2404&amp;severity=high&amp;id=698b05e84b57a58fa1fb44dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52334-cwe-261-weak-encoding-for-password--c5d97ffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52334%3A%20CWE-261%3A%20Weak%20Encoding%20for%20Password%20in%20Siemens%20syngo.plaza%20VB30E&amp;severity=medium&amp;id=698b05e84b57a58fa1fb44d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24343-cwe-643-improper-neutralization-of--6c783d29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24343%3A%20CWE-643%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20(&apos;XPath%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat&amp;severity=high&amp;id=698afe6e4b57a58fa1f90111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23906-cwe-287-improper-authentication-in--42f1177b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23906%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Druid&amp;severity=critical&amp;id=698afe6e4b57a58fa1f9010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14895-cwe-862-missing-authorization-in-ro-64edcef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14895%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=medium&amp;id=698afe6e4b57a58fa1f900f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1922-cwe-79-improper-neutralization-of-in-90ceb130</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brianhogg%20The%20Events%20Calendar%20Shortcode%20%26%20Block&amp;severity=medium&amp;id=698afe6e4b57a58fa1f90105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1866-cwe-79-improper-neutralization-of-in-d7a88772</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=698afe6e4b57a58fa1f900fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2268-cwe-200-exposure-of-sensitive-inform-aa32ef04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2268%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=698afe6e4b57a58fa1f90114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23901-cwe-208-observable-timing-discrepan-19a39b16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23901%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=low&amp;id=698afe6e4b57a58fa1f9010b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-push-traffic-origin-data-combined-with-resi-28c53a89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Push%20Traffic%20Origin%20Data%20Combined%20with%20Residential%20Proxy%20Data%20Uncovers%20Suspicious%20Chinese%20VPN&amp;severity=medium&amp;id=698b053e4b57a58fa1fad57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11242-cwe-918-server-side-request-forgery-31b927d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11242%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Teknolist%20Computer%20Systems%20Software%20Publishing%20Industry%20and%20Trade%20Inc.%20Okulistik&amp;severity=critical&amp;id=698af7604b57a58fa1f6ec18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-authorities-confirm-ivanti-zero-day-exploit--8334b47d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Authorities%20Confirm%20Ivanti%20Zero-Day%20Exploit%20Exposed%20Employee%20Contact%20Data&amp;severity=medium&amp;id=698b13994b57a58fa1ff12f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rsac-releases-quantickle-open-source-threat-intell-30291b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RSAC%20Releases%20Quantickle%20Open%20Source%20Threat%20Intelligence%20Visualization%20Tool&amp;severity=medium&amp;id=698ade914b57a58fa1edc53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1722-cwe-862-missing-authorization-in-wcl-7f2fe052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1722%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20Marketplace%20%E2%80%93%20Multivendor%20Marketplace%20for%20WooCommerce&amp;severity=medium&amp;id=698ae2484b57a58fa1eeadc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2099-cwe-79-improper-neutralization-of-in-96253298</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flowring%20AgentFlow&amp;severity=medium&amp;id=698adb404b57a58fa1eccffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2098-cwe-79-improper-neutralization-of-in-6f123170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flowring%20AgentFlow&amp;severity=medium&amp;id=698adb404b57a58fa1eccff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2097-cwe-434-unrestricted-upload-of-file--ba0b3f5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2097%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Flowring%20Agentflow&amp;severity=high&amp;id=698adb404b57a58fa1eccff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2096-cwe-288-authentication-bypass-using--10f90ea1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2096%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Flowring%20Agentflow&amp;severity=critical&amp;id=698adb404b57a58fa1eccfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2095-cwe-288-authentication-bypass-using--1f37d3de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2095%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Flowring%20Agentflow&amp;severity=critical&amp;id=698adb404b57a58fa1eccfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2094-cwe-89-improper-neutralization-of-sp-15f4d34d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2094%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Flowring%20Docpedia&amp;severity=high&amp;id=698adb404b57a58fa1eccfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2093-cwe-89-improper-neutralization-of-sp-a4a4780d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2093%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Flowring%20Docpedia&amp;severity=high&amp;id=698adb404b57a58fa1eccfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12063-cwe-639-authorization-bypass-throug-604c5572</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12063%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ad0b34b57a58fa1e8b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12757-cwe-22-improper-limitation-of-a-pat-14965a52</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12757%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13064-cwe-248-uncaught-exception-in-axis--32530aec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13064%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11547-cwe-532-insertion-of-sensitive-info-252f9fc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11547%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=high&amp;id=698ac9b04b57a58fa1e63de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11142-cwe-78-improper-neutralization-of-s-8652aae4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11142%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=high&amp;id=698ac9b04b57a58fa1e63de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0996-cwe-79-improper-neutralization-of-in-2dac7514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=698ac9b04b57a58fa1e63df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24328-cwe-601-url-redirection-to-untruste-5304d931</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24328%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20Business%20Server%20Pages%20Application%20(TAF_APPLAUNCHER)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24327-cwe-862-missing-authorization-in-sa-e7483346</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24327%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Strategic%20Enterprise%20Management%20(Balanced%20Scorecard%20in%20BSP%20Application)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24326-cwe-862-missing-authorization-in-sa-5ec24ceb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24326%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20Defense%20%26%20Security%20(Disconnected%20Operations)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24325-cwe-79-improper-neutralization-of-i-4ade4e67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Enterprise%20(Central%20Management%20Console)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24324-cwe-405-asymmetric-resource-consump-ac448fa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24324%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(AdminTools)&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24323-cwe-601-url-redirection-to-untruste-bc9f77e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24323%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Document%20Management%20System&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24322-cwe-862-missing-authorization-in-sa-73737ee7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24322%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Solution%20Tools%20Plug-In%20(ST-PI)&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24321-cwe-359-exposure-of-private-persona-4c72729a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24321%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24320-cwe-113-improper-neutralization-of--cd28a221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24320%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform%20(Application%20Server%20ABAP)&amp;severity=low&amp;id=698aaa0b4b57a58fa1c64d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24319-cwe-316-cleartext-storage-of-sensit-d9d71bc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24319%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20SAP_SE%20SAP%20Business%20One%20(B1%20Client%20Memory%20Dump%20Files)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24312-cwe-862-missing-authorization-in-sa-d8c48f91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24312%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Workflow&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23689-cwe-606-unchecked-input-for-loop-co-fcc10474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23689%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Supply%20Chain%20Management&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23688-cwe-862-missing-authorization-in-sa-008ebf09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23688%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Manage%20Service%20Entry%20Sheets%20-%20Lean%20Services)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23687-cwe-347-improper-verification-of-cr-3a7c3b5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23687%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=698aaa0b4b57a58fa1c64d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23686-cwe-113-improper-neutralization-of--8850b399</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23686%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=low&amp;id=698aaa0b4b57a58fa1c64d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23685-cwe-502-deserialization-of-untruste-7cb9f0ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23685%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(JMS%20service)&amp;severity=medium&amp;id=698aaa0b4b57a58fa1c64d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23684-cwe-366-race-condition-within-a-thr-7e7b6ae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23684%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=698aaa094b57a58fa1c64cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2260-os-command-injection-in-d-link-dcs-9-9a67af74</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2260%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-931L&amp;severity=high&amp;id=698aaa0c4b57a58fa1c64d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23681-cwe-862-missing-authorization-in-sa-3f5d65c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23681%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Support%20Tools%20Plug-In&amp;severity=medium&amp;id=698aaa094b57a58fa1c64cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0509-cwe-862-missing-authorization-in-sap-3bdb181d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0509%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=critical&amp;id=698aaa094b57a58fa1c64cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0508-cwe-601-url-redirection-to-untrusted-0338bc06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0508%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0505-cwe-79-improper-neutralization-of-in-540ed851</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0505%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Document%20Management%20System&amp;severity=medium&amp;id=698aaa094b57a58fa1c64ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0490-cwe-862-missing-authorization-in-sap-459ce6f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0490%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0488-cwe-862-missing-authorization-in-sap-cae5a650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0488%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20CRM%20and%20SAP%20S%2F4HANA%20(Scripting%20Editor)&amp;severity=critical&amp;id=698aaa094b57a58fa1c64ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0486-cwe-862-missing-authorization-in-sap-2d43e29e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0486%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20ABAP%20based%20SAP%20systems&amp;severity=medium&amp;id=698aaa094b57a58fa1c64c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0485-cwe-405-asymmetric-resource-consumpt-1576c846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0485%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform&amp;severity=high&amp;id=698aaa094b57a58fa1c64c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0484-cwe-601-url-redirection-to-untrusted-44a6b1e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0484%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20SAP%20S%2F4HANA&amp;severity=medium&amp;id=698aaa094b57a58fa1c64c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2259-memory-corruption-in-aardappel-lobst-79ad5913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2259%3A%20Memory%20Corruption%20in%20aardappel%20lobster&amp;severity=medium&amp;id=698aaa0c4b57a58fa1c64d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2258-memory-corruption-in-aardappel-lobst-b00f3d42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2258%3A%20Memory%20Corruption%20in%20aardappel%20lobster&amp;severity=medium&amp;id=698a78d04b57a58fa17ae5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-10-1709a628</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-10&amp;severity=medium&amp;id=698bca194b57a58fa1348b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70347-na-77c1cb2b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70347%3A%20n%2Fa&amp;severity=medium&amp;id=698b92154b57a58fa127f949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54192-na-3759a40f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54192%3A%20n%2Fa&amp;severity=medium&amp;id=698b92154b57a58fa127f945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-10-261f06d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-10&amp;severity=low&amp;id=698af0234b57a58fa1f32c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15147-cwe-639-authorization-bypass-throug-fff7384a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15147%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20Membership%20%E2%80%93%20WooCommerce%20Memberships%20for%20Multivendor%20Marketplace&amp;severity=medium&amp;id=698a6e434b57a58fa1785551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0845-cwe-862-missing-authorization-in-wcl-018676c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0845%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce%20along%20with%20Bookings%20Subscription%20Listings%20Compatible&amp;severity=high&amp;id=698a6e434b57a58fa1785556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15314-improper-link-resolution-before-fil-c0454d22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15314%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20end-user-cx&amp;severity=medium&amp;id=698a6abf4b57a58fa177cfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15313-improper-link-resolution-before-fil-d5322d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15313%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Tanium%20EUSS&amp;severity=medium&amp;id=698a6abf4b57a58fa177cfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15310-improper-link-resolution-before-fil-253a4c0f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15310%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Patch%20Endpoint%20Tools&amp;severity=high&amp;id=698a6abf4b57a58fa177cfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15318-improper-link-resolution-before-fil-3173e891</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15318%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20End-User%20Notifications%20Endpoint%20Tools&amp;severity=medium&amp;id=698a673b4b57a58fa1774ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15319-improper-link-resolution-before-fil-6d3cb710</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15319%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Patch%20Endpoint%20Tools&amp;severity=high&amp;id=698a673b4b57a58fa1774cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25958-cwe-807-reliance-on-untrusted-input-6bd12c4d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25958%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20cube-js%20cube&amp;severity=high&amp;id=698a673b4b57a58fa1774cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25957-cwe-755-improper-handling-of-except-a42524a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25957%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20cube-js%20cube&amp;severity=medium&amp;id=698a673b4b57a58fa1774cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25895-cwe-22-improper-limitation-of-a-pat-61293111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25895%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25894-cwe-321-use-of-hard-coded-cryptogra-a10e5fe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25894%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25893-cwe-285-improper-authorization-in-f-a5914f35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25893%3A%20CWE-285%3A%20Improper%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a63b84b57a58fa17688d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25951-cwe-22-improper-limitation-of-a-pat-343cbba3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25951%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frangoteam%20FUXA&amp;severity=high&amp;id=698a63b84b57a58fa17688df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25939-cwe-862-missing-authorization-in-fr-75e34d8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25939%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a60344b57a58fa175ce08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25938-cwe-290-authentication-bypass-by-sp-543651d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25938%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=698a60344b57a58fa175ce03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25931-cwe-276-incorrect-default-permissio-91eb9b5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25931%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20streetsidesoftware%20vscode-spell-checker&amp;severity=high&amp;id=698a60344b57a58fa175cdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25925-cwe-502-deserialization-of-untruste-9527a485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25925%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20modery%20PowerDocu&amp;severity=high&amp;id=698a5caf4b57a58fa174d53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25923-cwe-434-unrestricted-upload-of-file-c3e3a82e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25923%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20My-Little-Forum%20mylittleforum&amp;severity=high&amp;id=698a5caf4b57a58fa174d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25808-cwe-862-missing-authorization-in-fe-66888cd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25808%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fedify-dev%20hollo&amp;severity=high&amp;id=698a592c4b57a58fa173fd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15315-improper-neutralization-of-argument-c4bc1745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15315%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tanium%20Tanium%20Module%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15316-improper-neutralization-of-argument-76cc03f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15316%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25807-cwe-94-improper-control-of-generati-87c44d84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25807%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20TaklaXBR%20zai-shell&amp;severity=high&amp;id=698a592c4b57a58fa173fd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15317-allocation-of-resources-without-lim-a7a03743</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15317%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=698a592c4b57a58fa173fd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25961-cwe-295-improper-certificate-valida-57d25293</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25961%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=698a55a74b57a58fa1734045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25920-cwe-125-out-of-bounds-read-in-sumat-3b2bbce2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25920%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=medium&amp;id=698a55a74b57a58fa1734040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25918-cwe-532-insertion-of-sensitive-info-39d8e9fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25918%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20RageAgainstThePixel%20unity-cli&amp;severity=medium&amp;id=698a55a74b57a58fa173403a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25892-cwe-20-improper-input-validation-in-580634c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25892%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vrana%20adminer&amp;severity=high&amp;id=698a55a74b57a58fa1734034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25885-cwe-285-improper-authorization-in-p-5fce425d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25885%3A%20CWE-285%3A%20Improper%20Authorization%20in%20polarnl%20PolarLearn&amp;severity=critical&amp;id=698a52254b57a58fa1728466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25881-cwe-1321-improperly-controlled-modi-02093bcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25881%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=698a52254b57a58fa1728462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25880-cwe-426-untrusted-search-path-in-su-ccd09e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25880%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=698a52254b57a58fa172845f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25875-cwe-863-incorrect-authorization-in--a76e9c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25875%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa172845c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25814-cwe-74-improper-neutralization-of-s-12194afe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25814%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa1728459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25813-cwe-532-insertion-of-sensitive-info-26701139</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25813%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Praskla-Technology%20assessment-placipy&amp;severity=high&amp;id=698a52254b57a58fa1728456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25812-cwe-352-cross-site-request-forgery--3e79817d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25812%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=698a52254b57a58fa1728453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25811-cwe-863-incorrect-authorization-in--82293d19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25811%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698a52254b57a58fa1728450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25809-cwe-285-improper-authorization-in-p-3c443f62</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25809%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb453b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25878-cwe-306-missing-authentication-for--8494af2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25878%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FriendsOfShopware%20FroshPlatformAdminer&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25806-cwe-862-missing-authorization-in-pr-dd558da3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25806%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25810-cwe-862-missing-authorization-in-pr-4371736f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25810%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb453e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25876-cwe-862-missing-authorization-in-pr-92ab8419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25876%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Praskla-Technology%20assessment-placipy&amp;severity=medium&amp;id=698b05e84b57a58fa1fb4541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25791-cwe-306-missing-authentication-for--d6be490b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25791%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BishopFox%20sliver&amp;severity=high&amp;id=698a47984b57a58fa1702e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25765-cwe-918-server-side-request-forgery-aa34ec38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25765%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lostisland%20faraday&amp;severity=medium&amp;id=698a47984b57a58fa1702e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25740-cwe-250-execution-with-unnecessary--c037db11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25740%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20NixOS%20nixpkgs&amp;severity=medium&amp;id=698a44144b57a58fa16f3275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25528-cwe-918-server-side-request-forgery-df952e2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25528%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langsmith-sdk&amp;severity=medium&amp;id=698a44144b57a58fa16f3272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25498-cwe-470-use-of-externally-controlle-bb4bbc61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25498%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=698a408f4b57a58fa16e1631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25497-cwe-639-authorization-bypass-throug-027976b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25497%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20craftcms%20cms&amp;severity=high&amp;id=698a3d0c4b57a58fa16d39e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25496-cwe-79-improper-neutralization-of-i-395ed0bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25496%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25495-cwe-89-improper-neutralization-of-s-654416fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25495%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=698a3d0c4b57a58fa16d39dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25494-cwe-918-server-side-request-forgery-0ab124c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25494%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25493-cwe-918-server-side-request-forgery-a0e46f28</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25493%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25492-cwe-918-server-side-request-forgery-4dbb90e8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25492%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2246-memory-corruption-in-aprilrobotics-a-970766f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2246%3A%20Memory%20Corruption%20in%20AprilRobotics%20apriltag&amp;severity=medium&amp;id=698a3d0c4b57a58fa16d39eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptocurrency-sector-targeted-with-new-tooling-an-c14e047c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1069%20Targets%20Cryptocurrency%20Sector%20with%20New%20Tooling%20and%20AI-Enabled%20Social%20Engineering&amp;severity=medium&amp;id=698a44134b57a58fa16f31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25491-cwe-79-improper-neutralization-of-i-3459c577</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25491%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20cms&amp;severity=low&amp;id=698a36084b57a58fa16ab205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25057-cwe-23-relative-path-traversal-in-m-5548e007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25057%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20MarkUsProject%20Markus&amp;severity=critical&amp;id=698a36074b57a58fa16ab1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-guloader-obfuscation-techniq-53e14a11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20GuLoader%20Obfuscation%20Techniques&amp;severity=medium&amp;id=698a44134b57a58fa16f31df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2245-out-of-bounds-read-in-ccextractor-33eb7398</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2245%3A%20Out-of-Bounds%20Read%20in%20CCExtractor&amp;severity=medium&amp;id=698a36084b57a58fa16ab20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25598-cwe-778-insufficient-logging-in-ste-2804f268</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25598%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=698a36084b57a58fa16ab20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14778-incorrect-privilege-assignment-in-r-19fc6c86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14778%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=698a36074b57a58fa16ab1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25480-cwe-176-improper-handling-of-unicod-2f593a42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25480%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20litestar-org%20litestar&amp;severity=medium&amp;id=698a36074b57a58fa16ab1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25479-cwe-185-incorrect-regular-expressio-bc68cd37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25479%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20litestar-org%20litestar&amp;severity=medium&amp;id=698a36074b57a58fa16ab1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25478-cwe-942-permissive-cross-domain-pol-f5faed08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25478%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20litestar-org%20litestar&amp;severity=high&amp;id=698a36074b57a58fa16ab1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24900-cwe-639-authorization-bypass-throug-2ecae0e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24900%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MarkUsProject%20Markus&amp;severity=medium&amp;id=698a36074b57a58fa16ab1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1529-improper-verification-of-cryptograph-4c2c244f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1529%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=high&amp;id=698a36074b57a58fa16ab1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1486-improperly-implemented-security-chec-7c4b399b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1486%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=high&amp;id=698a36074b57a58fa16ab1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25231-cwe-284-improper-access-control-in--66a1eb8c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25231%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20error311%20FileRise&amp;severity=high&amp;id=698a36074b57a58fa16ab1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25230-cwe-79-improper-neutralization-of-i-0eaa64a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25230%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=medium&amp;id=698a36074b57a58fa16ab1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24777-cwe-862-missing-authorization-in-op-6009884e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24777%3A%20CWE-862%3A%20Missing%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=698a2b784b57a58fa167fcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66630-cwe-338-use-of-cryptographically-we-73e9741e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66630%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20gofiber%20fiber&amp;severity=critical&amp;id=698a24714b57a58fa1662675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2242-out-of-bounds-read-in-janet-lang-jan-d199ab8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2242%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a19e84b57a58fa162a84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21419-cwe-59-improper-link-resolution-bef-74c953b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21419%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Display%20and%20Peripheral%20Manager%20(Windows)&amp;severity=medium&amp;id=698a19e84b57a58fa162a84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-unc3886-targets-singapore-telecom-sec-897fc327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UNC3886%20Targets%20Singapore%20Telecom%20Sector%20in%20Cyber%20Espionage%20Campaign&amp;severity=medium&amp;id=698b13994b57a58fa1ff12fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7432-cwe-331-insufficient-entropy-in-sila-747141dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7432%3A%20CWE-331%20Insufficient%20Entropy%20in%20silabs.com%20Simplicity%20SDK&amp;severity=low&amp;id=698a0bd54b57a58fa15e776c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2241-out-of-bounds-read-in-janet-lang-jan-d51ea6cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2241%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a0bd54b57a58fa15e776f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2240-out-of-bounds-read-in-janet-lang-jan-2be03f13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2240%3A%20Out-of-Bounds%20Read%20in%20janet-lang%20janet&amp;severity=medium&amp;id=698a04d04b57a58fa15c44d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24095-cwe-862-missing-authorization-in-ch-88cb5ac1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24095%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=698a04d04b57a58fa15c44e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-on-the-emeditor-supply-chain-cyberat-ab1804a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20on%20the%20EmEditor%20Supply%20Chain%20Cyberattack&amp;severity=medium&amp;id=698a44134b57a58fa16f31e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14831-inefficient-algorithmic-complexity--ca1ed9c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14831%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6989fa464b57a58fa15923dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59024-insufficient-verification-of-data-a-91d349d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59024%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989fa464b57a58fa15923e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59023-insufficient-verification-of-data-a-e1c2d96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59023%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=6989fa464b57a58fa15923e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-web-help-desk-exploited-for-rce-in-mult-e75d2ab7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Web%20Help%20Desk%20Exploited%20for%20RCE%20in%20Multi-Stage%20Attacks%20on%20Exposed%20Servers&amp;severity=high&amp;id=698b13994b57a58fa1ff1300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-groups-may-pivot-back-to-encryption-as--63c17323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Groups%20May%20Pivot%20Back%20to%20Encryption%20as%20Data%20Theft%20Tactics%20Falter&amp;severity=medium&amp;id=6989f3054b57a58fa1569104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24027-insufficient-control-of-network-mes-77e6ac15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24027%3A%20Insufficient%20Control%20of%20Network%20Message%20Volume%20(Network%20Amplification)%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989f3484b57a58fa156b619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0398-allocation-of-resources-without-limi-3e960007</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0398%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6989efb44b57a58fa1554a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-ai-skill-malware-31tbps-ddos-notepad--9762e0ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20AI%20Skill%20Malware%2C%2031Tbps%20DDoS%2C%20Notepad%2B%2B%20Hack%2C%20LLM%20Backdoors%20and%20More&amp;severity=low&amp;id=698b13994b57a58fa1ff1303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10465-cwe-434-unrestricted-upload-of-file-94c4de0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10465%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Sensaway&amp;severity=high&amp;id=6989e1a74b57a58fa150c5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/9th-february-threat-intelligence-report-caf6f41f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=9th%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6989da9c4b57a58fa14eff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10464-cwe-922-insecure-storage-of-sensiti-beb9bf87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10464%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Senseway&amp;severity=medium&amp;id=6989da9b4b57a58fa14eff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-solarwinds-flaws-potentially-exploited-as-z-fc2f5064</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20SolarWinds%20Flaws%20Potentially%20Exploited%20as%20Zero-Days&amp;severity=medium&amp;id=6989d6e54b57a58fa14dea2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10463-cwe-287-improper-authentication-in--ca3897ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10463%3A%20CWE-287%20Improper%20Authentication%20in%20Birtech%20Information%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20Senseway&amp;severity=high&amp;id=6989d0204b57a58fa14b2a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartertools-hit-by-ransomware-via-vulnerability-i-0f5ab2d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterTools%20Hit%20by%20Ransomware%20via%20Vulnerability%20in%20Its%20Own%20Product&amp;severity=medium&amp;id=6989cfdd4b57a58fa14b21ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7708-cwe-201-insertion-of-sensitive-infor-65d7317b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7708%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Atlas%20Educational%20Software%20Industry%20Ltd.%20Co.%20k12net&amp;severity=medium&amp;id=6989cc8b4b57a58fa14a189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-howto-extract-urls-from-rtf-files-mon-feb-9t-6cacc95b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20Howto%3A%20Extract%20URLs%20from%20RTF%20files%2C%20(Mon%2C%20Feb%209th)&amp;severity=medium&amp;id=6989c8d84b57a58fa148ec42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0632-cwe-918-server-side-request-forgery--732105b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0632%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20techjewel%20Fluent%20Forms%20Pro%20Add%20On%20Pack&amp;severity=medium&amp;id=6989c9094b57a58fa148f1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6830-cwe-89-improper-neutralization-of-sp-5ed972bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6830%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Xpoda%20T%C3%BCrkiye%20Information%20Technology%20Inc.%20Password%20Module&amp;severity=critical&amp;id=6989c9094b57a58fa148f1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-targets-uzbekistan-russia-using-netsup-3ff6525c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Targets%20Uzbekistan%2C%20Russia%20Using%20NetSupport%20RAT%20in%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=6989bfb04b57a58fa1460075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25848-cwe-306-in-jetbrains-hub-516ea109</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25848%3A%20CWE-306%20in%20JetBrains%20Hub&amp;severity=critical&amp;id=6989be7b4b57a58fa145bd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25847-cwe-79-in-jetbrains-pycharm-78c95cdc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25847%3A%20CWE-79%20in%20JetBrains%20PyCharm&amp;severity=high&amp;id=6989be7b4b57a58fa145bd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25846-cwe-532-in-jetbrains-youtrack-3ac80398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25846%3A%20CWE-532%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22922-cwe-648-incorrect-use-of-privileged-9ee633eb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22922%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24098-cwe-200-exposure-of-sensitive-infor-186a34d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=6989be7b4b57a58fa145bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-security-alert-regarding-apt-c-28-scarcruft-usin-773bbda4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20security%20alert%20regarding%20APT-C-28%20(ScarCruft)%20using%20MiradorShell%20to%20launch%20a%20cyberattack.&amp;severity=medium&amp;id=6989baf74b57a58fa144434a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2227-command-injection-in-d-link-dcs-931l-c3756b7f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2227%3A%20Command%20Injection%20in%20D-Link%20DCS-931L&amp;severity=medium&amp;id=6989b3ef4b57a58fa1421850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2226-unrestricted-upload-in-douphp-463363d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2226%3A%20Unrestricted%20Upload%20in%20DouPHP&amp;severity=medium&amp;id=6989ace74b57a58fa13edb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23903-cwe-289-authentication-bypass-by-al-8c206734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23903%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=medium&amp;id=6989ace74b57a58fa13edb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-paper-and-tool-help-security-teams-move-beyond-efca9381</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Paper%20and%20Tool%20Help%20Security%20Teams%20Move%20Beyond%20Blind%20Reliance%20on%20CISA%E2%80%99s%20KEV%20Catalog&amp;severity=medium&amp;id=6989a5ac4b57a58fa13b9702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2225-sql-injection-in-itsourcecode-news-p-9e323cdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2225%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=6989a5ef4b57a58fa13baa26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25905-cwe-653-improper-isolation-or-compa-51b8b4d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25905%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization&amp;severity=medium&amp;id=6989a5ef4b57a58fa13baa23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25904-cwe-918-server-side-request-forgery-fbd95310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25904%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=6989a2774b57a58fa13a5753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teampcp-worm-exploits-cloud-infrastructure-to-buil-27364f5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeamPCP%20Worm%20Exploits%20Cloud%20Infrastructure%20to%20Build%20Criminal%20Infrastructure&amp;severity=low&amp;id=6989bfb04b57a58fa1460078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2224-cross-site-scripting-in-code-project-0ed5a829</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2224%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=6989a2774b57a58fa13a5756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25916-cwe-420-unprotected-alternate-chann-1d2e3763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25916%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Roundcube%20Webmail&amp;severity=medium&amp;id=69899b534b57a58fa1382738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7799-cwe-79-improper-neutralization-of-in-0c259e86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zirve%20Information%20Technologies%20Inc.%20e-Taxpayer%20Accounting%20Website&amp;severity=high&amp;id=69899b534b57a58fa1382735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-commission-investigating-cyberattack-69fc77ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Commission%20Investigating%20Cyberattack&amp;severity=medium&amp;id=6989979c4b57a58fa1362e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyondtrust-fixes-critical-pre-auth-rce-vulnerabil-0ae0cb0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BeyondTrust%20Fixes%20Critical%20Pre-Auth%20RCE%20Vulnerability%20in%20Remote%20Support%20and%20PRA&amp;severity=critical&amp;id=6989bfb04b57a58fa146007b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2223-sql-injection-in-code-projects-onlin-37e26188</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2223%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698997e24b57a58fa1363d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22906-cwe-321-use-of-hard-coded-cryptogra-e9045210</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22906%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22905-cwe-22-improper-limitation-of-a-pat-e3a62789</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22905%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WAGO%200852-1322&amp;severity=high&amp;id=6989944b4b57a58fa134d4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22904-cwe-121-stack-based-buffer-overflow-f7b2d93e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22904%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22903-cwe-121-stack-based-buffer-overflow-53b0bab5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22903%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%200852-1322&amp;severity=critical&amp;id=6989944b4b57a58fa134d4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2222-cross-site-scripting-in-code-project-1faba2de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2222%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698990c74b57a58fa133ba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2236-cwe-89-improper-neutralization-of-sp-cff86a22</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2236%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HGiga%20C%26Cm%40il%20package%20olln-base&amp;severity=high&amp;id=698990c74b57a58fa133baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2235-cwe-89-improper-neutralization-of-sp-1bfc1044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2235%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HGiga%20C%26Cm%40il%20package%20olln-base&amp;severity=high&amp;id=698990c74b57a58fa133ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2234-cwe-306-missing-authentication-for-c-d21fa761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2234%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HGiga%20C%26Cm%40il%20%20package%20olln-base&amp;severity=critical&amp;id=698990c74b57a58fa133ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2221-sql-injection-in-code-projects-onlin-a04655ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2221%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698989bf4b57a58fa13168bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24466-unquoted-search-path-or-element-in--cbb2d1f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24466%3A%20Unquoted%20search%20path%20or%20element%20in%20Oki%20Electric%20Industry%20Co.%2C%20Ltd.%20See%20%22References%22%20section&amp;severity=medium&amp;id=698989bf4b57a58fa13168b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1868-cwe-1336-improper-neutralization-of--f5bf4abe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1868%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20GitLab%20GitLab%20AI%20Gateway&amp;severity=critical&amp;id=698982b74b57a58fa12ef2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2220-sql-injection-in-code-projects-onlin-98adb77f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2220%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698982b74b57a58fa12ef2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0870-cwe-250-execution-with-unnecessary-p-ded42670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0870%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20GIGABYTE%20MacroHub&amp;severity=high&amp;id=698982b74b57a58fa12ef2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2218-command-injection-in-d-link-dcs-933l-acb9f68a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2218%3A%20Command%20Injection%20in%20D-Link%20DCS-933L&amp;severity=medium&amp;id=69897baf4b57a58fa12c1f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22613-cwe-295-improper-certificate-valida-325d563b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22613%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Eaton%20Network%20M3&amp;severity=medium&amp;id=69897baf4b57a58fa12c1f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2217-sql-injection-in-itsourcecode-event--c38204db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2217%3A%20SQL%20Injection%20in%20itsourcecode%20Event%20Management%20System&amp;severity=medium&amp;id=698974a74b57a58fa1284a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2216-path-traversal-in-rachelos-werss-we--a945c412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2216%3A%20Path%20Traversal%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=698974a74b57a58fa1284a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1615-arbitrary-code-injection-in-jsonpath-a64ac077</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1615%3A%20Arbitrary%20Code%20Injection%20in%20jsonpath&amp;severity=critical&amp;id=69896dc24b57a58fa125bde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2215-use-of-default-cryptographic-key-in--c7f269e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2215%3A%20Use%20of%20Default%20Cryptographic%20Key%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=69896dc24b57a58fa125bde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2214-cross-site-scripting-in-code-project-a5d3b284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2214%3A%20Cross%20Site%20Scripting%20in%20code-projects%20for%20Plugin&amp;severity=medium&amp;id=698963134b57a58fa121384c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66594-cwe-209-generation-of-error-message-31950b35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66594%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa1213836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66595-cwe-352-cross-site-request-forgery--ae40aa6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66595%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa1213839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66596-cwe-601-url-redirection-to-untruste-2d3d37c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66596%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698963134b57a58fa121383c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2213-unrestricted-upload-in-code-projects-33365f29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2213%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698963134b57a58fa1213845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66597-cwe-327-use-of-a-broken-or-risky-cr-01f86823</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66597%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698963134b57a58fa121383f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66598-cwe-327-use-of-a-broken-or-risky-cr-396922de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66598%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698963134b57a58fa1213842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66599-cwe-497-in-yokogawa-electric-corpor-67812000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66599%3A%20CWE-497%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66600-cwe-358-in-yokogawa-electric-corpor-22d483ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66600%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698955034b57a58fa1ffc956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66601-cwe-358-in-yokogawa-electric-corpor-af4e632e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66601%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66602-cwe-291-in-yokogawa-electric-corpor-5ed93e73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66602%3A%20CWE-291%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66603-cwe-358-in-yokogawa-electric-corpor-1fdc73b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66603%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66604-cwe-319-cleartext-transmission-of-s-faac7ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66604%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66605-cwe-359-in-yokogawa-electric-corpor-1d5f1c27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66605%3A%20CWE-359%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66608-cwe-29-in-yokogawa-electric-corpora-c44d1dab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66608%3A%20CWE-29%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=high&amp;id=698955034b57a58fa1ffc96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66607-cwe-358-in-yokogawa-electric-corpor-8ee1b437</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66607%3A%20CWE-358%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=medium&amp;id=698955034b57a58fa1ffc96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66606-cwe-86-in-yokogawa-electric-corpora-c5b47c11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66606%3A%20CWE-86%20in%20Yokogawa%20Electric%20Corporation%20FAST%2FTOOLS&amp;severity=low&amp;id=698955034b57a58fa1ffc968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2212-sql-injection-in-code-projects-onlin-7f86cd97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2212%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698955054b57a58fa1ffc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2211-sql-injection-in-code-projects-onlin-ce4e0f75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2211%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=698955054b57a58fa1ffc985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2210-os-command-injection-in-d-link-dir-8-a510703e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2210%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=698946f34b57a58fa1f4d9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2203-buffer-overflow-in-tenda-ac8-23b5fa92</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2203%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=698946f34b57a58fa1f4d9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2202-buffer-overflow-in-tenda-ac8-e8c278de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2202%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=698946f34b57a58fa1f4d9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2201-cross-site-scripting-in-zerowdd-stud-9895ddc5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2201%3A%20Cross%20Site%20Scripting%20in%20ZeroWdd%20studentmanager&amp;severity=medium&amp;id=69893c684b57a58fa1f0defe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2200-cross-site-scripting-in-heyewei-jfin-25699fc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2200%3A%20Cross%20Site%20Scripting%20in%20heyewei%20JFinalCMS&amp;severity=medium&amp;id=69893c684b57a58fa1f0def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2199-sql-injection-in-code-projects-onlin-221a3256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2199%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698931db4b57a58fa1e6f5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2198-sql-injection-in-code-projects-onlin-84785075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2198%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698931db4b57a58fa1e6f5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2197-sql-injection-in-code-projects-onlin-5a7ff2a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2197%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69892ad34b57a58fa1e0cc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2196-sql-injection-in-code-projects-onlin-521b2058</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2196%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=69892ad34b57a58fa1e0cc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-09-7838bdc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-09&amp;severity=medium&amp;id=698a78994b57a58fa17a85c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63354-na-1368ce6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63354%3A%20n%2Fa&amp;severity=medium&amp;id=6989fa464b57a58fa15923e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-09-5af1a3c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-09&amp;severity=low&amp;id=6989d35e4b57a58fa14c3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2195-sql-injection-in-code-projects-onlin-a1957e30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2195%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=698923cd4b57a58fa1dc4da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2194-command-injection-in-d-link-di-7100g-aad9a2bd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2194%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=698923cd4b57a58fa1dc4da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2193-command-injection-in-d-link-di-7100g-d80401b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2193%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=6989193f4b57a58fa1d8c2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2192-stack-based-buffer-overflow-in-tenda-017bd58d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2192%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=6989193f4b57a58fa1d8c2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2191-stack-based-buffer-overflow-in-tenda-65760e1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2191%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=698912394b57a58fa1d5d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2190-sql-injection-in-itsourcecode-school-e4e0476a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2190%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=698912394b57a58fa1d5d424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2189-sql-injection-in-itsourcecode-school-16a78f0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2189%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69890b2f4b57a58fa1d35e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2188-os-command-injection-in-utt-521g-2dda2a09</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2188%3A%20OS%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20521G&amp;severity=high&amp;id=698904274b57a58fa1d0a686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2187-stack-based-buffer-overflow-in-tenda-a2f52fd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2187%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988fd204b57a58fa1ce2187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2186-stack-based-buffer-overflow-in-tenda-02d1b976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2186%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988fd204b57a58fa1ce2180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2185-stack-based-buffer-overflow-in-tenda-5922d2b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2185%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988f6174b57a58fa1cbbd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2184-os-command-injection-in-great-develo-c68f08e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2184%3A%20OS%20Command%20Injection%20in%20Great%20Developers%20Certificate%20Generation%20System&amp;severity=medium&amp;id=6988f6174b57a58fa1cbbd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2183-unrestricted-upload-in-great-develop-b27ad893</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2183%3A%20Unrestricted%20Upload%20in%20Great%20Developers%20Certificate%20Generation%20System&amp;severity=medium&amp;id=6988ef104b57a58fa1c9fb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2182-command-injection-in-utt-521g-ccd9a731</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2182%3A%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20521G&amp;severity=high&amp;id=6988ef104b57a58fa1c9fb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2181-stack-based-buffer-overflow-in-tenda-ba1c013f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2181%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988e8074b57a58fa1c5ca8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2180-stack-based-buffer-overflow-in-tenda-26cba744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2180%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=6988e8074b57a58fa1c5ca88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2179-sql-injection-in-phpgurukul-hospital-63fc3206</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2179%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=6988e8074b57a58fa1c5ca80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2178-command-injection-in-r-huijts-xcode--e3b31376</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2178%3A%20Command%20Injection%20in%20r-huijts%20xcode-mcp-server&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2177-session-fixiation-in-sourcecodester--c798eb6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2177%3A%20Session%20Fixiation%20in%20SourceCodester%20Prison%20Management%20System&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2176-sql-injection-in-code-projects-conta-96625a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2176%3A%20SQL%20Injection%20in%20code-projects%20Contact%20Management%20System&amp;severity=medium&amp;id=6988e0ff4b57a58fa1c2c0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2175-os-command-injection-in-d-link-dir-8-2593454d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2175%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6988dd7b4b57a58fa1c1b04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2174-improper-authentication-in-code-proj-2e24bba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2174%3A%20Improper%20Authentication%20in%20code-projects%20Contact%20Management%20System&amp;severity=medium&amp;id=6988dd7b4b57a58fa1c1b046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2173-sql-injection-in-code-projects-onlin-4c8a3584</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2173%3A%20SQL%20Injection%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=6988dd7b4b57a58fa1c1b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2172-sql-injection-in-code-projects-onlin-2fae6bd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2172%3A%20SQL%20Injection%20in%20code-projects%20Online%20Application%20System%20for%20Admission&amp;severity=medium&amp;id=6988d6734b57a58fa1bfa5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2171-sql-injection-in-code-projects-onlin-8ac324e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2171%3A%20SQL%20Injection%20in%20code-projects%20Online%20Student%20Management%20System&amp;severity=medium&amp;id=6988d6734b57a58fa1bfa5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2169-command-injection-in-d-link-dwr-m921-36bfe2c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2169%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=medium&amp;id=6988cbe84b57a58fa1bb3c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2168-command-injection-in-d-link-dwr-m921-f87dbd6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2168%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=medium&amp;id=6988cbe84b57a58fa1bb3c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2167-os-command-injection-in-totolink-wa3-c6030528</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2167%3A%20OS%20Command%20Injection%20in%20Totolink%20WA300&amp;severity=medium&amp;id=6988c4df4b57a58fa1b81884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2166-sql-injection-in-code-projects-onlin-1bb815b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2166%3A%20SQL%20Injection%20in%20code-projects%20Online%20Reviewer%20System&amp;severity=medium&amp;id=6988c4df4b57a58fa1b8187c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2165-missing-authentication-in-detronetdi-8229ecf4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2165%3A%20Missing%20Authentication%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2164-unrestricted-upload-in-detronetdip-e-eac221b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2164%3A%20Unrestricted%20Upload%20in%20detronetdip%20E-commerce&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2163-command-injection-in-d-link-dir-600-3f3c8faa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2163%3A%20Command%20Injection%20in%20D-Link%20DIR-600&amp;severity=medium&amp;id=6988c15b4b57a58fa1b5b391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2162-sql-injection-in-itsourcecode-news-p-33809204</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2162%3A%20SQL%20Injection%20in%20itsourcecode%20News%20Portal%20Project&amp;severity=medium&amp;id=6988b6cf4b57a58fa1b0bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2161-sql-injection-in-itsourcecode-direct-dd379f76</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2161%3A%20SQL%20Injection%20in%20itsourcecode%20Directory%20Management%20System&amp;severity=medium&amp;id=6988b6cf4b57a58fa1b0bc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2160-cross-site-scripting-in-sourcecodest-8c400c19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2160%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6988afc74b57a58fa1ab2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2159-cross-site-scripting-in-sourcecodest-4c3ce75a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2159%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20Responsive%20Tourism%20Website&amp;severity=medium&amp;id=6988afc74b57a58fa1ab2010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2158-sql-injection-in-code-projects-stude-90e5a284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2158%3A%20SQL%20Injection%20in%20code-projects%20Student%20Web%20Portal&amp;severity=medium&amp;id=6988a8bf4b57a58fa1a60a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2157-os-command-injection-in-d-link-dir-8-f7732c6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2157%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6988a8bf4b57a58fa1a60a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2156-cross-site-scripting-in-code-project-13afde6b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2156%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Student%20Management%20System&amp;severity=medium&amp;id=6988a53b4b57a58fa1a3d491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2155-os-command-injection-in-d-link-dir-8-3a93a385</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2155%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69889aaf4b57a58fa19cfd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2154-cross-site-scripting-in-sourcecodest-62e64ca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2154%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6988972b4b57a58fa19a8271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2153-open-redirect-in-mwielgoszewski-door-11ffaf40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2153%3A%20Open%20Redirect%20in%20mwielgoszewski%20doorman&amp;severity=medium&amp;id=69888c9f4b57a58fa1909435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2152-os-command-injection-in-d-link-dir-6-1ad93e00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2152%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=698885974b57a58fa18a8291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2151-os-command-injection-in-d-link-dir-6-3276f328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2151%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69887e8f4b57a58fa183ef77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2150-cross-site-scripting-in-sourcecodest-37415e92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2150%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=698877874b57a58fa17decd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2149-cross-site-scripting-in-sourcecodest-5edcbd7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2149%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6988707f4b57a58fa1799fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2148-information-disclosure-in-tenda-ac21-24a72697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2148%3A%20Information%20Disclosure%20in%20Tenda%20AC21&amp;severity=medium&amp;id=69886cfc4b57a58fa161c44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2147-information-disclosure-in-tenda-ac21-fe01c565</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2147%3A%20Information%20Disclosure%20in%20Tenda%20AC21&amp;severity=medium&amp;id=698862794b57a58fa14f79d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2146-unrestricted-upload-in-guchengwuyue--a465a2fa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2146%3A%20Unrestricted%20Upload%20in%20guchengwuyue%20yshopmall&amp;severity=medium&amp;id=69885b28f9fa50a62fa1ee37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2145-cross-site-scripting-in-cym1102-ngin-3fa41c03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2145%3A%20Cross%20Site%20Scripting%20in%20cym1102%20nginxWebUI&amp;severity=medium&amp;id=69885421f9fa50a62f9cba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2143-os-command-injection-in-d-link-dir-8-43a9e1df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2143%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69884d18f9fa50a62f96e2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2142-os-command-injection-in-d-link-dir-8-a1ababaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2142%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=69884610f9fa50a62f93b8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2141-improper-authorization-in-wukongopen-2bac3656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2141%3A%20Improper%20Authorization%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=69884451f9fa50a62f927d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-integrates-virustotal-scanning-to-detect--2871641f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Integrates%20VirusTotal%20Scanning%20to%20Detect%20Malicious%20ClawHub%20Skills&amp;severity=medium&amp;id=69884ba0f9fa50a62f95d60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2140-buffer-overflow-in-tenda-tx9-09ab607e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2140%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=69883800f9fa50a62f7bac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2139-buffer-overflow-in-tenda-tx9-9b5ff729</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2139%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=6988347bf9fa50a62f780bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2138-buffer-overflow-in-tenda-tx9-32011e56</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2138%3A%20Buffer%20Overflow%20in%20Tenda%20TX9&amp;severity=high&amp;id=698829f0f9fa50a62f667bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2137-buffer-overflow-in-tenda-tx3-7163aefa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2137%3A%20Buffer%20Overflow%20in%20Tenda%20TX3&amp;severity=high&amp;id=6988266bf9fa50a62f64201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2136-sql-injection-in-projectworlds-onlin-1e2048a5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2136%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=69881f64f9fa50a62f5cc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2135-command-injection-in-utt-hiper-810-605fbaac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2135%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=medium&amp;id=698814dbf9fa50a62f3465a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2134-sql-injection-in-phpgurukul-hospital-5501caae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2134%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=698814dbf9fa50a62f34659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2133-unrestricted-upload-in-code-projects-09f955a5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2133%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69880a4bf9fa50a62f2aa4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2132-sql-injection-in-code-projects-onlin-1e8dc808</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2132%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69880a4bf9fa50a62f2aa4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2131-os-command-injection-in-xixianliang--0930d004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2131%3A%20OS%20Command%20Injection%20in%20XixianLiang%20HarmonyOS-mcp-server&amp;severity=medium&amp;id=6987fc3cf9fa50a62f1fd1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2130-command-injection-in-burtthecoder-mc-b01622ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2130%3A%20Command%20Injection%20in%20BurtTheCoder%20mcp-maigret&amp;severity=medium&amp;id=6987fc3cf9fa50a62f1fd1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2129-os-command-injection-in-d-link-dir-8-54513fc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2129%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6987ee2cf9fa50a62f16ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15100-cwe-269-improper-privilege-manageme-b92c305c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15100%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=high&amp;id=6987ee2cf9fa50a62f16ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15027-cwe-269-improper-privilege-manageme-d7a40bd9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15027%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=critical&amp;id=6987ee2cf9fa50a62f16ff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2209-improper-authorization-in-wekan-2009476e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2209%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2208-missing-authorization-in-wekan-9d5fea75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2208%3A%20Missing%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2207-information-disclosure-in-wekan-88993d85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2207%3A%20Information%20Disclosure%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2206-improper-access-controls-in-wekan-b5810efa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2206%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2205-information-disclosure-in-wekan-4a689cb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2205%3A%20Information%20Disclosure%20in%20WeKan&amp;severity=medium&amp;id=6987ee2cf9fa50a62f16ffa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2122-sql-injection-in-xiaopi-panel-d0d38438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2122%3A%20SQL%20Injection%20in%20Xiaopi%20Panel&amp;severity=medium&amp;id=6987e3a0f9fa50a62f01e2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2120-os-command-injection-in-d-link-dir-8-eb87b902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2120%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=6987e3a0f9fa50a62f01e2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2118-command-injection-in-utt-hiper-810-667d5923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2118%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=high&amp;id=69884451f9fa50a62f927d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-08-c1b2c1f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-08&amp;severity=medium&amp;id=698927194b57a58fa1dddc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-08-dd47ba85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-08&amp;severity=low&amp;id=69882636f9fa50a62f63e239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2117-sql-injection-in-itsourcecode-societ-33057233</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2117%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69884451f9fa50a62f927dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2116-sql-injection-in-itsourcecode-societ-06a6e772</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2116%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=69884451f9fa50a62f927dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2115-sql-injection-in-itsourcecode-societ-16a1058e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2115%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=6987c078f9fa50a62fe1e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2114-sql-injection-in-itsourcecode-societ-eb8b7956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2114%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=6987b98bf9fa50a62fdbd7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25858-cwe-640-weak-password-recovery-mech-3ff06a38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25858%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20macrozheng%20mall&amp;severity=critical&amp;id=6987b5ecf9fa50a62fd2db09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25857-cwe-78-improper-neutralization-of-s-97d5f696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25857%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Tenda%20G300-F&amp;severity=high&amp;id=6987b5ecf9fa50a62fd2db04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15564-divide-by-zero-in-mapnik-aacffcb6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15564%3A%20Divide%20By%20Zero%20in%20Mapnik&amp;severity=medium&amp;id=6987b268f9fa50a62fcfb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2113-deserialization-in-yuan1994-tpadmin-4e1abf95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2113%3A%20Deserialization%20in%20yuan1994%20tpadmin&amp;severity=medium&amp;id=6987ab60f9fa50a62fbec76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2111-path-traversal-in-jeecgboot-bc98413a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2111%3A%20Path%20Traversal%20in%20JeecgBoot&amp;severity=medium&amp;id=6987a478f9fa50a62fad9688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2110-improper-restriction-of-excessive-au-b5bc8c2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2110%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Tasin1025%20SwiftBuy&amp;severity=medium&amp;id=69879d53f9fa50a62f9cb19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2109-improper-authorization-in-jsbroks-co-99c0d3fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2109%3A%20Improper%20Authorization%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69879649f9fa50a62f8fd9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2108-denial-of-service-in-jsbroks-coco-an-a3e76d97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2108%3A%20Denial%20of%20Service%20in%20jsbroks%20COCO%20Annotator&amp;severity=medium&amp;id=69878f40f9fa50a62f7c5181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2107-improper-authorization-in-yeqifu-war-66dc9ff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2107%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=69878bc3f9fa50a62f720652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2106-improper-authorization-in-yeqifu-war-de67b0b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2106%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=69877a28f9fa50a62f44035c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2105-improper-authorization-in-yeqifu-war-65dc7481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2105%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6987732cf9fa50a62f350edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2090-sql-injection-in-sourcecodester-onli-b2f3d215</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2090%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=69875e09f9fa50a62f002962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2089-sql-injection-in-sourcecodester-onli-b9831b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2089%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=69875704f9fa50a62fe92680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2088-sql-injection-in-phpgurukul-beauty-p-a061ef90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2088%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=69874ff5f9fa50a62fd81230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2087-sql-injection-in-sourcecodester-onli-c23f40fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2087%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Class%20Record%20System&amp;severity=medium&amp;id=698748edf9fa50a62fcc96f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2086-buffer-overflow-in-utt-hiper-810g-43cb38da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2086%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810G&amp;severity=high&amp;id=6987456bf9fa50a62fc698ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-urged-to-replace-discontinued-edge-d-94e482f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Urged%20to%20Replace%20Discontinued%20Edge%20Devices&amp;severity=medium&amp;id=69873aaaf9fa50a62fa478cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2085-command-injection-in-d-link-dwr-m921-034526b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2085%3A%20Command%20Injection%20in%20D-Link%20DWR-M921&amp;severity=high&amp;id=69872ccdf9fa50a62f8287cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2084-os-command-injection-in-d-link-dir-8-560ed943</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2084%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=high&amp;id=698725c5f9fa50a62f79ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/german-agencies-warn-of-signal-phishing-targeting--ecb729e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=German%20Agencies%20Warn%20of%20Signal%20Phishing%20Targeting%20Politicians%2C%20Military%2C%20Journalists&amp;severity=high&amp;id=69884ba0f9fa50a62f95d611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2083-sql-injection-in-code-projects-socia-c32b6297</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2083%3A%20SQL%20Injection%20in%20code-projects%20Social%20Networking%20Site&amp;severity=medium&amp;id=698717b8f9fa50a62f57d826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2082-os-command-injection-in-d-link-dir-8-f5d76b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2082%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=698710adf9fa50a62f4418a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2081-os-command-injection-in-d-link-dir-8-8c7532c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2081%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69884451f9fa50a62f927de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2080-command-injection-in-utt-hiper-810-4880f054</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2080%3A%20Command%20Injection%20in%20UTT%20HiPER%20810&amp;severity=high&amp;id=6987029df9fa50a62f2ac5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2079-improper-authorization-in-yeqifu-war-a0d27384</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2079%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986fba7f9fa50a62f1d38e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15476-cwe-862-missing-authorization-in-si-3325d96d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15476%3A%20CWE-862%20Missing%20Authorization%20in%20simonfairbairn%20The%20Bucketlister&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15477-cwe-89-improper-neutralization-of-s-504a0a25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20simonfairbairn%20The%20Bucketlister&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1573-cwe-79-improper-neutralization-of-in-e20b42a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omi-mexico%20OMIGO&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1613-cwe-79-improper-neutralization-of-in-ed9446e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrlister1%20Wonka%20Slide&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1611-cwe-79-improper-neutralization-of-in-e9163cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmrukkers%20Wikiloops%20Track%20Player&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1082-cwe-352-cross-site-request-forgery-c-1f5478bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1082%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arkapravamajumder%20TITLE%20ANIMATOR&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1608-cwe-79-improper-neutralization-of-in-0c54e4f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigor4eg%20Video%20Onclick&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1634-cwe-79-improper-neutralization-of-in-6148d308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexdtn%20Subitem%20AL%20Slider&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1675-cwe-1188-initialization-of-a-resourc-7aea86a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1675%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20brstefanovic%20Advanced%20Country%20Blocker&amp;severity=medium&amp;id=6986fba7f9fa50a62f1d38df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1643-cwe-79-improper-neutralization-of-in-0989d4a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ariagle%20MP-Ukagaka&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1570-cwe-79-improper-neutralization-of-in-7a811be0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dannycarlton%20Simple%20Bible%20Verse%20via%20Shortcode&amp;severity=medium&amp;id=6986fb97f9fa50a62f1cf0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2078-improper-authorization-in-yeqifu-war-e88310cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2078%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986f48df9fa50a62f1325cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2077-improper-authorization-in-yeqifu-war-bf20ebb4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2077%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986ed85f9fa50a62f0d9a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2076-improper-authorization-in-yeqifu-war-586b676f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2076%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986df75f9fa50a62ff9d900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15491-cwe-22-improper-limitation-of-a-pat-12c4fc96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15491%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Post%20Slides&amp;severity=medium&amp;id=6986d86df9fa50a62ff27dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12159-cwe-79-improper-neutralization-of-i-4a178663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13463-cwe-79-improper-neutralization-of-i-19c83847</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12803-cwe-80-improper-neutralization-of-s-f0081867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12803%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15267-cwe-79-improper-neutralization-of-i-cbea20b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=6986d4e8f9fa50a62fed3fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2075-improper-access-controls-in-yeqifu-w-62e8168e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2075%3A%20Improper%20Access%20Controls%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6986cde0f9fa50a62fe7f048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2074-xml-external-entity-reference-in-o2o-1cb33d44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2074%3A%20XML%20External%20Entity%20Reference%20in%20O2OA&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2073-sql-injection-in-itsourcecode-school-69180f85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2073%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=6986b8cbf9fa50a62fc21ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31990-cwe-770-allocation-of-resources-wit-e646bfe0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31990%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HCLSoftware%20HCL%20DevOps%20Velocity&amp;severity=medium&amp;id=6986b8c9f9fa50a62fc1f7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2071-buffer-overflow-in-utt-520w-3febf7b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2071%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69868e99f9fa50a62f47a432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-07-4537ec57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-07&amp;severity=medium&amp;id=6987d55af9fa50a62fea2824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-07-c4fc9685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-07&amp;severity=low&amp;id=69870cf3f9fa50a62f3b7843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25804-cwe-287-improper-authentication-in--ae440bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25804%3A%20CWE-287%3A%20Improper%20Authentication%20in%20antrea-io%20antrea&amp;severity=high&amp;id=69867278f9fa50a62f39d4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25793-cwe-347-improper-verification-of-cr-74cda0bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25793%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20slackhq%20nebula&amp;severity=high&amp;id=69867278f9fa50a62f39d4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25803-cwe-798-use-of-hard-coded-credentia-52e7d009</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25803%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20denpiligrim%203dp-manager&amp;severity=critical&amp;id=69867278f9fa50a62f39d4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25762-cwe-400-uncontrolled-resource-consu-3125f3ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25762%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20adonisjs%20core&amp;severity=high&amp;id=69867278f9fa50a62f39d4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25754-cwe-1321-improperly-controlled-modi-c71bc36b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25754%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20adonisjs%20core&amp;severity=high&amp;id=69867278f9fa50a62f39d4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25644-cwe-295-improper-certificate-valida-a24dce7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25644%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20datahub-project%20datahub&amp;severity=high&amp;id=69867278f9fa50a62f39d4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2070-buffer-overflow-in-utt-520w-294d40cd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2070%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69866ef5f9fa50a62f393798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25763-cwe-78-improper-neutralization-of-s-f2d1f8d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25763%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=698667edf9fa50a62f37ce33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25764-cwe-80-improper-neutralization-of-s-485b1a84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25764%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20opf%20openproject&amp;severity=low&amp;id=698667edf9fa50a62f37ce38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2069-stack-based-buffer-overflow-in-ggml--8180fc5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2069%3A%20Stack-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=medium&amp;id=698667edf9fa50a62f37ce3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1731-cwe-78-improper-neutralization-of-sp-066ed5de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1731%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support(RS)%20%26%20Privileged%20Remote%20Access(PRA)&amp;severity=critical&amp;id=69866468f9fa50a62f36cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1727-cwe-200-exposure-of-sensitive-inform-c82534e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1727%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Cloud%20Gemini%20Enterprise%20(formerly%20Agentspace)&amp;severity=critical&amp;id=69866468f9fa50a62f36cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25760-cwe-22-improper-limitation-of-a-pat-683be2f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25760%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69866468f9fa50a62f36cd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2068-buffer-overflow-in-utt-520w-b92250f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2068%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69866468f9fa50a62f36cd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68621-cwe-208-observable-timing-discrepan-4a8d1703</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68621%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20TriliumNext%20Trilium&amp;severity=high&amp;id=6986f13ef9fa50a62f11d4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25123-cwe-918-server-side-request-forgery-de1289dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25123%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20homarr-labs%20homarr&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25533-cwe-835-loop-with-unreachable-exit--a378a04d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25533%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20agentfront%20enclave&amp;severity=medium&amp;id=6986f13ef9fa50a62f11d4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25516-cwe-79-improper-neutralization-of-i-42af5635</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25516%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69865d61f9fa50a62f35a6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25732-cwe-22-improper-limitation-of-a-pat-324d0834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25732%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=69865d61f9fa50a62f35a6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25544-cwe-89-improper-neutralization-of-s-972c134b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25544%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payloadcms%20payload&amp;severity=critical&amp;id=69865d61f9fa50a62f35a6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25574-cwe-639-authorization-bypass-throug-7a20b4b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25574%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20payloadcms%20payload&amp;severity=medium&amp;id=69865d61f9fa50a62f35a6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2067-buffer-overflow-in-utt-520w-0003a5fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2067%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=698659ddf9fa50a62f342a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25580-cwe-918-server-side-request-forgery-f5772752</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25580%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pydantic%20pydantic-ai&amp;severity=high&amp;id=698659ddf9fa50a62f342a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25581-cwe-79-improper-neutralization-of-i-0ce012fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25581%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samclarke%20SCEditor&amp;severity=medium&amp;id=698659ddf9fa50a62f342a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25592-cwe-22-improper-limitation-of-a-pat-e2f967bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25592%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20microsoft%20semantic-kernel&amp;severity=critical&amp;id=69865658f9fa50a62f32f7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25631-cwe-20-improper-input-validation-in-6b3e6e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25631%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69865658f9fa50a62f32f7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2066-buffer-overflow-in-utt-520w-62586b70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2066%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=698652d6f9fa50a62f31f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25729-cwe-863-incorrect-authorization-in--cfcb0bb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25729%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20lintsinghua%20DeepAudit&amp;severity=low&amp;id=698652d6f9fa50a62f31f19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25632-cwe-502-deserialization-of-untruste-d8f5be65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25632%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WaterFutures%20EPyT-Flow&amp;severity=critical&amp;id=698652d6f9fa50a62f31f193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25634-cwe-119-improper-restriction-of-ope-9d9256c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25634%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698652d6f9fa50a62f31f198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25731-cwe-1336-improper-neutralization-of-7ae283af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25731%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25635-cwe-22-improper-limitation-of-a-pat-59dcea01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25635%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25636-cwe-22-improper-limitation-of-a-pat-e3fddcc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25636%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kovidgoyal%20calibre&amp;severity=high&amp;id=69864f52f9fa50a62f30f2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2065-missing-authentication-in-flycatcher-167e45e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2065%3A%20Missing%20Authentication%20in%20Flycatcher%20Toys%20smART%20Pixelator&amp;severity=medium&amp;id=69864bcdf9fa50a62f2f48aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25640-cwe-22-improper-limitation-of-a-pat-d35b43b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25640%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pydantic%20pydantic-ai&amp;severity=high&amp;id=69864bcdf9fa50a62f2f48a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25586-cwe-74-improper-neutralization-of-s-3231fe20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25586%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e0357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25520-cwe-74-improper-neutralization-of-s-02efb643</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25520%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e0353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25587-cwe-94-improper-control-of-generati-62d69156</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25587%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25641-cwe-367-time-of-check-time-of-use-t-bbaa079a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25641%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69864849f9fa50a62f2e035f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2064-cross-site-scripting-in-portabilis-i-c65cf604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2064%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=698644c6f9fa50a62f2bebfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25727-cwe-121-stack-based-buffer-overflow-3730143c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25727%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20time-rs%20time&amp;severity=medium&amp;id=69864142f9fa50a62f2a749a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15320-multiple-binds-to-the-same-port-in--556db5fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15320%3A%20Multiple%20Binds%20to%20the%20Same%20Port%20in%20Tanium%20Tanium%20Client&amp;severity=low&amp;id=69864142f9fa50a62f2a748b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25643-cwe-78-improper-neutralization-of-s-d503d67d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25643%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20blakeblackshear%20frigate&amp;severity=critical&amp;id=69864142f9fa50a62f2a7496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1709-key-exchange-without-entity-authenti-a891ad25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1709%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=69864142f9fa50a62f2a748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25751-cwe-306-missing-authentication-for--0cffd6e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25751%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=69863dc0f9fa50a62f29294f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25752-cwe-862-missing-authorization-in-fr-8a87669a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25752%3A%20CWE-862%3A%20Missing%20Authorization%20in%20frangoteam%20FUXA&amp;severity=critical&amp;id=69863dc0f9fa50a62f292953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25647-cwe-79-improper-neutralization-of-i-e4e851f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25647%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=69863dc0f9fa50a62f292942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2063-os-command-injection-in-d-link-dir-8-a774c187</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2063%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69863dc0f9fa50a62f29295a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25753-cwe-259-use-of-hard-coded-password--a874149c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25753%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Praskla-Technology%20assessment-placipy&amp;severity=critical&amp;id=69863dc0f9fa50a62f292957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25650-cwe-200-exposure-of-sensitive-infor-ff59f3f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25650%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smn2gnt%20MCP-Salesforce&amp;severity=medium&amp;id=69863dc0f9fa50a62f292946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25651-cwe-601-url-redirection-to-untruste-9fd151ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25651%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20tgies%20client-certificate-auth&amp;severity=medium&amp;id=69863dc0f9fa50a62f29294b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2062-null-pointer-dereference-in-open5gs-d8fae311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2062%3A%20NULL%20Pointer%20Dereference%20in%20Open5GS&amp;severity=medium&amp;id=69863a39f9fa50a62f278f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23989-cwe-863-incorrect-authorization-in--a5bf8855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23989%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opencloud-eu%20reva&amp;severity=high&amp;id=69863a39f9fa50a62f278f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69212-cwe-78-improper-neutralization-of-s-157548d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69212%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=critical&amp;id=69863332f9fa50a62f26379e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69214-cwe-89-improper-neutralization-of-s-8f7e3535</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69214%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69216-cwe-89-improper-neutralization-of-s-8ea4f4d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69216%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24416-cwe-89-improper-neutralization-of-s-67aa0e3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24416%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24417-cwe-89-improper-neutralization-of-s-241acae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24417%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24418-cwe-89-improper-neutralization-of-s-c07ba405</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24418%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69863332f9fa50a62f2637ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24419-cwe-89-improper-neutralization-of-s-7399c992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24419%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=69862fadf9fa50a62f2569ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2061-os-command-injection-in-d-link-dir-8-6024a112</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2061%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=69862fadf9fa50a62f2569be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24776-cwe-639-authorization-bypass-throug-2b34271e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24776%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20opf%20openproject&amp;severity=medium&amp;id=69862fadf9fa50a62f2569ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25725-cwe-501-trust-boundary-violation-in-2fdc4d3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25725%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25724-cwe-61-unix-symbolic-link-symlink-f-23f60526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25724%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20anthropics%20claude-code&amp;severity=low&amp;id=69862fadf9fa50a62f2569b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25723-cwe-20-improper-input-validation-in-9f234855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25723%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25722-cwe-20-improper-input-validation-in-cc4c5e6c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25722%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20anthropics%20claude-code&amp;severity=high&amp;id=69862fadf9fa50a62f2569b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24903-cwe-79-improper-neutralization-of-i-4bd86924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24903%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlgoNetLab%20OrcaStatLLM-Researcher&amp;severity=medium&amp;id=69862c29f9fa50a62f24b16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2060-sql-injection-in-code-projects-simpl-e2b121ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2060%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=69862c29f9fa50a62f24b172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1769-cwe-79-improper-neutralization-of-in-28d7e798</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xerox%20CentreWare&amp;severity=medium&amp;id=698628a5f9fa50a62f2311af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2059-sql-injection-in-sourcecodester-medi-b6c6ea64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2059%3A%20SQL%20Injection%20in%20SourceCodester%20Medical%20Center%20Portal%20Management%20System&amp;severity=medium&amp;id=6986219df9fa50a62f204ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2058-sql-injection-in-mathurvishal-cloudc-cd0c1b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2058%3A%20SQL%20Injection%20in%20mathurvishal%20CloudClassroom-PHP-Project&amp;severity=medium&amp;id=69861a9bf9fa50a62f1c9098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2103-cwe-321-in-infor-syteline-erp-b46bd226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2103%3A%20CWE-321%20in%20Infor%20SyteLine%20ERP&amp;severity=high&amp;id=69861a9bf9fa50a62f1c909f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25556-cwe-415-double-free-in-artifex-soft-dcf4f997</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25556%3A%20CWE-415%20Double%20Free%20in%20Artifex%20Software%20MuPDF&amp;severity=medium&amp;id=69861711f9fa50a62f1b4d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13523-cwe-79-improper-neutralization-of-i-f8a6390e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13523%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=69861a9bf9fa50a62f1c90a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2057-sql-injection-in-sourcecodester-medi-4c938f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2057%3A%20SQL%20Injection%20in%20SourceCodester%20Medical%20Center%20Portal%20Management%20System&amp;severity=medium&amp;id=69860c85f9fa50a62f179c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-dknife-aitm-framework-targets-routers-d9cd4734</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20DKnife%20AitM%20Framework%20Targets%20Routers%20for%20Traffic%20Hijacking%2C%20Malware%20Delivery&amp;severity=medium&amp;id=6986fa66f9fa50a62f1ad180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2056-information-disclosure-in-d-link-dir-00e936e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2056%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985f76df9fa50a62f0e885b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-removal-of-unsupported-edge-devices-to-2a1f9a00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Orders%20Removal%20of%20Unsupported%20Edge%20Devices%20to%20Reduce%20Federal%20Network%20Risk&amp;severity=medium&amp;id=6986fa66f9fa50a62f1ad183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13818-cwe-367-time-of-check-time-of-use-t-6c7110b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13818%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ESET%20spol%20s.r.o.%20ESET%20Management%20Agent&amp;severity=high&amp;id=6985f065f9fa50a62f0bfdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1337-cwe-117-improper-output-neutralizati-6f7d504c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1337%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=6985f065f9fa50a62f0bfdca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2055-information-disclosure-in-d-link-dir-28ce1991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2055%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985e95cf9fa50a62f09632e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2054-information-disclosure-in-d-link-dir-88a5a513</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2054%3A%20Information%20Disclosure%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=6985e254f9fa50a62f069c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asian-state-backed-group-tgr-sta-1030-breaches-70--3a49f48b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asian%20State-Backed%20Group%20TGR-STA-1030%20Breaches%2070%20Government%2C%20Infrastructure%20Entities&amp;severity=critical&amp;id=6986fa66f9fa50a62f1ad186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2018-sql-injection-in-itsourcecode-school-8f784e6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2018%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=6985ded1f9fa50a62f04f209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flickr-security-incident-tied-to-third-party-email-c41dc4c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flickr%20Security%20Incident%20Tied%20to%20Third-Party%20Email%20System&amp;severity=medium&amp;id=6985db1df9fa50a62f039236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/living-off-the-ai-the-next-evolution-of-attacker-t-8c48b37d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Living%20off%20the%20AI%3A%20The%20Next%20Evolution%20of%20Attacker%20Tradecraft&amp;severity=medium&amp;id=6985db1df9fa50a62f039239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-record-ddos-epsteins-hacker-eset-pro-e53f8d51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Record%20DDoS%2C%20Epstein%E2%80%99s%20Hacker%2C%20ESET%20Product%20Vulnerabilities&amp;severity=medium&amp;id=6985c986f9fa50a62ffbec3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-deepfake-scammers-and-0d63323e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20deepfake%20scammers%20and%20save%20your%20money%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6985d481f9fa50a62f005b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2017-stack-based-buffer-overflow-in-ip-co-6f3eb53a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2017%3A%20Stack-based%20Buffer%20Overflow%20in%20IP-COM%20W30AP&amp;severity=critical&amp;id=6985d445f9fa50a62f00465c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1293-cwe-79-improper-neutralization-of-in-ca10b6b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO%20%E2%80%93%20Advanced%20SEO%20with%20real-time%20guidance%20and%20built-in%20AI&amp;severity=medium&amp;id=6985d445f9fa50a62f004656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2016-stack-based-buffer-overflow-in-happy-f72e311c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2016%3A%20Stack-based%20Buffer%20Overflow%20in%20happyfish100%20libfastcommon&amp;severity=medium&amp;id=6985d0c1f9fa50a62ffef782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2015-improper-authorization-in-portabilis-61cc936b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2015%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6985c646f9fa50a62ffa8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-samsung-knox-helps-stop-your-network-security--916665d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Samsung%20Knox%20Helps%20Stop%20Your%20Network%20Security%20Breach&amp;severity=medium&amp;id=6985c600f9fa50a62ffa4773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2014-sql-injection-in-itsourcecode-studen-b8b04a23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2014%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985bf2df9fa50a62ff79b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2013-sql-injection-in-itsourcecode-studen-96f5b5b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2013%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985b828f9fa50a62ff43b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24928-cwe-680-integer-overflow-to-buffer--cedc569c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24928%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24927-cwe-416-use-after-free-in-huawei-ha-d41614a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24927%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24924-cwe-264-permissions-privileges-and--d7ebb004</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24924%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24920-cwe-264-permissions-privileges-and--95c935c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24920%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b4a0f9fa50a62ff2b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2012-sql-injection-in-itsourcecode-studen-85504d22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2012%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24919-cwe-787-out-of-bounds-write-in-huaw-c1f5ecf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24919%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24917-cwe-416-use-after-free-in-huawei-ha-c6b3a27c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24917%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dknife-implant-used-by-chinese-threat-actor-for-ad-85eb9b68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98DKnife%E2%80%99%20Implant%20Used%20by%20Chinese%20Threat%20Actor%20for%20Adversary-in-the-Middle%20Attacks&amp;severity=medium&amp;id=6985ac17f9fa50a62feef9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24916-cwe-200-exposure-of-sensitive-infor-5d1aff9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24916%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24931-cwe-264-permissions-privileges-and--51f9960f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24931%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985b11cf9fa50a62ff139cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24930-cwe-362-concurrent-execution-using--1df2f85f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24930%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985aa18f9fa50a62fee14da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24929-cwe-476-null-pointer-dereference-in-b2f28f2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24929%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee14a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-dydx-npm-and-pypi-packages-deliver-wal-b48b6b06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20dYdX%20npm%20and%20PyPI%20Packages%20Deliver%20Wallet%20Stealers%20and%20RAT%20Malware&amp;severity=critical&amp;id=6986fa66f9fa50a62f1ad189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24923-cwe-264-permissions-privileges-and--bd9abb0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24923%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee14a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24922-cwe-122-heap-based-buffer-overflow--81258aa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24922%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee149e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2011-sql-injection-in-itsourcecode-studen-12ce78e4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2011%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6985aa18f9fa50a62fee14de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24921-cwe-125-out-of-bounds-read-in-huawe-35a79110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24921%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24918-cwe-476-null-pointer-dereference-in-e8be9952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24918%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24915-cwe-125-out-of-bounds-read-in-huawe-944f6a8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24915%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24914-cwe-416-use-after-free-in-huawei-ha-f2761965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24914%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1252-cwe-79-improper-neutralization-of-in-58f0ff5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Events%20Listing%20Widget&amp;severity=medium&amp;id=6985aa16f9fa50a62fee146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1785-cwe-352-cross-site-request-forgery-c-8f414448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1785%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codesnippetspro%20Code%20Snippets&amp;severity=medium&amp;id=6985aa16f9fa50a62fee1480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1499-cwe-862-missing-authorization-in-rev-14b5cd1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1499%3A%20CWE-862%20Missing%20Authorization%20in%20revmakx%20WP%20Duplicate%20%E2%80%93%20WordPress%20Migration%20Plugin&amp;severity=critical&amp;id=6985aa16f9fa50a62fee1475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21643-execute-unauthorized-code-or-comman-8dd9adbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21643%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=6985a694f9fa50a62fec94b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24926-cwe-787-out-of-bounds-write-in-huaw-9b1e0a43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24926%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985a694f9fa50a62fec94b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24925-cwe-122-heap-based-buffer-overflow--c04eedde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24925%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6985a694f9fa50a62fec94b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2010-improper-authorization-in-sanluan-pu-cb9ffd81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2010%3A%20Improper%20Authorization%20in%20Sanluan%20PublicCMS&amp;severity=low&amp;id=6985a30df9fa50a62feb0263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-smartermail-vulnerability-exploited-in-ra-79702390</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20SmarterMail%20Vulnerability%20Exploited%20in%20Ransomware%20Attacks&amp;severity=critical&amp;id=69859f56f9fa50a62fe96c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21626-cwe-200-exposure-of-sensitive-infor-9420fb85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21626%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=69859f99f9fa50a62fe9b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2009-improper-access-controls-in-sourceco-e91a29fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2009%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Gas%20Agency%20Management%20System&amp;severity=medium&amp;id=69859c04f9fa50a62fe7fff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1279-cwe-79-improper-neutralization-of-in-63248df4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20Employee%20Directory%20%E2%80%93%20Staff%20Directory%20and%20Listing&amp;severity=medium&amp;id=69859c04f9fa50a62fe7fff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2008-code-injection-in-abhiphile-fermat-m-bc737cbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2008%3A%20Code%20Injection%20in%20abhiphile%20fermat-mcp&amp;severity=medium&amp;id=698594fdf9fa50a62fe4ff60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1401-cwe-79-improper-neutralization-of-in-0602bdf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Tune%20Library&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1909-cwe-79-improper-neutralization-of-in-60807293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1909%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20x-raym%20WaveSurfer-WP&amp;severity=medium&amp;id=69859179f9fa50a62fe3aca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10753-cwe-862-missing-authorization-in-cy-1fb1bc43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10753%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1808-cwe-79-improper-neutralization-of-in-4758efaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ravanh%20Orange%20Comfort%2B%20accessibility%20toolbar%20for%20WordPress&amp;severity=medium&amp;id=69859179f9fa50a62fe3ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1888-cwe-79-improper-neutralization-of-in-c37efb99</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20Docus%20%E2%80%93%20YouTube%20Video%20Playlist&amp;severity=medium&amp;id=69859179f9fa50a62fe3aca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2000-command-injection-in-dcn-dcme-320-dd565023</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2000%3A%20Command%20Injection%20in%20DCN%20DCME-320&amp;severity=medium&amp;id=69859179f9fa50a62fe3acae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0521-cwe-79-improper-neutralization-of-in-78e4886a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYDAC%20AG%20MAP%2B&amp;severity=medium&amp;id=69858a71f9fa50a62fe12635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1998-memory-corruption-in-micropython-de7944de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1998%3A%20Memory%20Corruption%20in%20micropython&amp;severity=medium&amp;id=69858a71f9fa50a62fe12639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-opus-46-finds-500-high-severity-flaws-acros-a52ee154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20Opus%204.6%20Finds%20500%2B%20High-Severity%20Flaws%20Across%20Major%20Open-Source%20Libraries&amp;severity=high&amp;id=6985ab7ef9fa50a62feebb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0598-unverified-ownership-in-red-hat-red--f43d1151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0598%3A%20Unverified%20Ownership%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=medium&amp;id=698586ecf9fa50a62fdfc3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1991-null-pointer-dereference-in-libuvc-69eef9e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1991%3A%20NULL%20Pointer%20Dereference%20in%20libuvc&amp;severity=medium&amp;id=69857fe4f9fa50a62fdb49fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/questions-raised-over-cisas-silent-ransomware-upda-58d91f96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Concerns%20Raised%20Over%20CISA%E2%80%99s%20Silent%20Ransomware%20Updates%20in%20KEV%20Catalog&amp;severity=medium&amp;id=69857c2ef9fa50a62fd7fa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1990-null-pointer-dereference-in-oatpp-d9a99a9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1990%3A%20NULL%20Pointer%20Dereference%20in%20oatpp&amp;severity=medium&amp;id=698578ddf9fa50a62fd6124f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1979-use-after-free-in-mruby-8dcbc7ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1979%3A%20Use%20After%20Free%20in%20mruby&amp;severity=medium&amp;id=698571d4f9fa50a62fd2f1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1978-direct-request-in-kalyan02-nanocms-1f2f6f1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1978%3A%20Direct%20Request%20in%20kalyan02%20NanoCMS&amp;severity=medium&amp;id=698571d4f9fa50a62fd2f1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1977-code-injection-in-isaacwasserman-mcp-e165d2f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1977%3A%20Code%20Injection%20in%20isaacwasserman%20mcp-vegalite-server&amp;severity=medium&amp;id=69856acdf9fa50a62fd0a378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15566-cwe-20-improper-input-validation-in-13d5f4d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69856acdf9fa50a62fd0a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1976-null-pointer-dereference-in-free5gc-f38e3daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1976%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1975-null-pointer-dereference-in-free5gc-55cfdd29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1975%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1228-cwe-639-authorization-bypass-through-8f359c4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1228%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Timeline%20Block%20%E2%80%93%20Beautiful%20Timeline%20Builder%20for%20WordPress%20(Vertical%20%26%20Horizontal%20Timelines)&amp;severity=medium&amp;id=69855cbcf9fa50a62fab62af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1974-denial-of-service-in-free5gc-b15fdc8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1974%3A%20Denial%20of%20Service%20in%20Free5GC&amp;severity=medium&amp;id=69854eadf9fa50a62f861452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1973-null-pointer-dereference-in-free5gc-f3729069</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1973%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC&amp;severity=medium&amp;id=69854eadf9fa50a62f861449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1972-use-of-default-credentials-in-edimax-9d49fcd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1972%3A%20Use%20of%20Default%20Credentials%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=69854420f9fa50a62f6d5e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1971-cross-site-scripting-in-edimax-br-62-8f3ccaeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1971%3A%20Cross%20Site%20Scripting%20in%20Edimax%20BR-6288ACL&amp;severity=medium&amp;id=69853611f9fa50a62f554b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-06-662f18a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-06&amp;severity=medium&amp;id=698683d6f9fa50a62f3de56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70963-na-736a7259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70963%3A%20n%2Fa&amp;severity=high&amp;id=69862c29f9fa50a62f24b16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-06-c30c479b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-06&amp;severity=low&amp;id=6985f02ff9fa50a62f0bc28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23623-cwe-285-improper-authorization-in-c-6b31744d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23623%3A%20CWE-285%3A%20Improper%20Authorization%20in%20CollaboraOnline%20online&amp;severity=medium&amp;id=69852b85f9fa50a62f4b244c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32393-cwe-770-allocation-of-resources-wit-1d72a91f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32393%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=6985247ef9fa50a62f494945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0391-cwe-451-user-interface-ui-misreprese-94d23b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0391%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=698519f1f9fa50a62f46352c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24300-cwe-284-improper-access-control-in--cef48617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24300%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Front%20Door&amp;severity=critical&amp;id=698519f1f9fa50a62f463532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21532-cwe-200-exposure-of-sensitive-infor-3d224926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21532%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Functions&amp;severity=high&amp;id=698519f1f9fa50a62f46352f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24302-cwe-284-improper-access-control-in--330d1a07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24302%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20ARC&amp;severity=high&amp;id=698519f1f9fa50a62f463535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1970-open-redirect-in-edimax-br-6258n-0817e1aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1970%3A%20Open%20Redirect%20in%20Edimax%20BR-6258n&amp;severity=medium&amp;id=6985166df9fa50a62f44dae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1964-improper-access-controls-in-wekan-2d192d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1964%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=69850f65f9fa50a62f416c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25815-cwe-1394-use-of-default-cryptograph-6fea7ca2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25815%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=69850be1f9fa50a62f3fbedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1963-improper-access-controls-in-wekan-fe2f298c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1963%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6985085df9fa50a62f3df52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1962-improper-access-controls-in-wekan-c2fef78b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1962%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=69850155f9fa50a62f38ceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0106-elevation-of-privilege-in-google-and-6d6e3412</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0106%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=6984fdd1f9fa50a62f37f349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/knife-cutting-the-edge-disclosing-a-china-nexus-ga-66cd80c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Knife%20Cutting%20the%20Edge%3A%20Disclosing%20a%20China-nexus%20gateway-monitoring%20AitM%20framework&amp;severity=medium&amp;id=69850155f9fa50a62f38cca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-marco-stealer-93f02107</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Marco%20Stealer&amp;severity=medium&amp;id=698504d9f9fa50a62f3b1692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12131-cwe-20-improper-input-validation-in-0987bcd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12131%3A%20CWE-20%20Improper%20Input%20Validation%20in%20silabs.com%20Simplicity%20SDK&amp;severity=medium&amp;id=6984fa4df9fa50a62f36955a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clickfix-variant-crashfix-deploying-python-rem-f058ad59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Clickfix%20variant%20&apos;CrashFix&apos;%20deploying%20Python%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=698504d9f9fa50a62f3b1681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1301-cwe-787-out-of-bounds-write-in-o6-au-879560eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1301%3A%20CWE-787%20Out-of-bounds%20Write%20in%20o6%20Automation%20GmbH%20Open62541&amp;severity=medium&amp;id=6984ec3ef9fa50a62f33cd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15311-improper-neutralization-of-escape-m-edc8b66a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15311%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Tanium%20Tanium%20Appliance&amp;severity=high&amp;id=69859ff5f9fa50a62fe9e7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15312-improper-encoding-or-escaping-of-ou-51c043ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15312%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Tanium%20Tanium%20Appliance&amp;severity=medium&amp;id=69859ff5f9fa50a62fe9e7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15324-improper-link-resolution-before-fil-8f546f57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15324%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Engage&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15325-improper-neutralization-of-special--d3b59607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15325%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Discover&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15326-missing-authorization-in-tanium-pat-414d9d45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15326%3A%20Missing%20Authorization%20in%20Tanium%20Patch&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15327-missing-authorization-in-tanium-dep-e25b6408</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15327%3A%20Missing%20Authorization%20in%20Tanium%20Deploy&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15328-improper-link-resolution-before-fil-fed71ada</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15328%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Tanium%20Enforce&amp;severity=medium&amp;id=69859ff6f9fa50a62fe9e7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15330-missing-authorization-in-tanium-dep-f1311ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15330%3A%20Missing%20Authorization%20in%20Tanium%20Deploy&amp;severity=high&amp;id=69859ff7f9fa50a62fe9e81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15331-incomplete-cleanup-in-tanium-connec-a0456176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15331%3A%20Incomplete%20Cleanup%20in%20Tanium%20Connect&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15329-insertion-of-sensitive-information--a9ee4527</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15329%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15332-insertion-of-sensitive-information--9ebb3c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15332%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15321-untrusted-search-path-in-tanium-tan-778dfdad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15321%3A%20Untrusted%20Search%20Path%20in%20Tanium%20Tanium%20Appliance&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15333-incorrect-default-permissions-in-ta-8213b994</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15333%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15334-incorrect-default-permissions-in-ta-8e0ea7cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15334%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15335-incorrect-default-permissions-in-ta-55fe72a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15335%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Threat%20Response&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15341-incorrect-default-permissions-in-ta-c307931a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15341%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Benchmark&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15339-incorrect-default-permissions-in-ta-ed061b0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15339%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Discover&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15340-incorrect-default-permissions-in-ta-53caca46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15340%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Comply&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15338-incorrect-default-permissions-in-ta-35644461</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15338%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Partner%20Integration&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15336-incorrect-default-permissions-in-ta-f7cef522</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15336%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Performance&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15337-incorrect-default-permissions-in-ta-7727e3bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15337%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Patch&amp;severity=medium&amp;id=69859ff7f9fa50a62fe9e834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15342-incorrect-authorization-in-tanium-r-0a706410</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15342%3A%20Incorrect%20Authorization%20in%20Tanium%20Reputation&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15323-improper-certificate-validation-in--7af141c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15323%3A%20Improper%20Certificate%20Validation%20in%20Tanium%20Tanium%20Appliance&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15343-incorrect-default-permissions-in-ta-7bf47121</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15343%3A%20Incorrect%20Default%20Permissions%20in%20Tanium%20Enforce&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15289-missing-authorization-in-tanium-int-9de1c362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15289%3A%20Missing%20Authorization%20in%20Tanium%20Interact&amp;severity=low&amp;id=69859ff5f9fa50a62fe9e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58190-cwe-835-loop-with-unreachable-exit--10f3d197</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58190%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=6984daa9f9fa50a62f30a64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47911-cwe-400-uncontrolled-resource-consu-5f96479a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47911%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=6984daa9f9fa50a62f30a649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68121-cwe-295-improper-certificate-valida-798631b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68121%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=high&amp;id=6984daa9f9fa50a62f30a655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15557-cwe-295-improper-certificate-valida-281f9df0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15557%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20H100%20v1&amp;severity=high&amp;id=6984daa9f9fa50a62f30a642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1707-vulnerability-in-pgadminorg-pgadmin--2ba0871a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1707%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6984daa9f9fa50a62f30a65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisurukimwolf-botnet-launches-record-setting-314-t-1f31ee95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AISURU%2FKimwolf%20Botnet%20Launches%20Record-Setting%2031.4%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=6985ab7ef9fa50a62feebb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15551-cwe-95-improper-neutralization-of-d-7e26fcea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15551%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20MR200%20v5.2&amp;severity=medium&amp;id=69850155f9fa50a62f38cef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0715-cwe-522-insufficiently-protected-cre-a4864c39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0715%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Moxa%20UC-1200A%20Series&amp;severity=high&amp;id=6984d01df9fa50a62f2f1648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0714-cwe-319-cleartext-transmission-of-se-2a690fab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0714%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Moxa%20UC-1200A%20Series&amp;severity=high&amp;id=6984d01df9fa50a62f2f1645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siem-rules-for-detecting-exploitation-of-vulnerabi-6ead71e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIEM%20Rules%20for%20detecting%20exploitation%20of%20vulnerabilities%20in%20FortiCloud%20SSO&amp;severity=medium&amp;id=6984bec7f9fa50a62f2b18a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/substack-discloses-security-incident-after-hacker--8fa2c08d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Substack%20Discloses%20Security%20Incident%20After%20Hacker%20Leaks%20Data&amp;severity=medium&amp;id=6984b3caf9fa50a62f28d1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14150-cwe-497-exposure-of-sensitive-syste-e1ebc8d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14150%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20webMethods%20Integration%20(on%20prem)%20-%20Integration%20Server&amp;severity=medium&amp;id=6984a5fef9fa50a62f25cb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-network-of-150-cloned-law-firm--46ad764a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20Network%20of%20150%20Cloned%20Law%20Firm%20Websites%20in%20AI-Powered%20Scam%20Campaign&amp;severity=medium&amp;id=6984a5baf9fa50a62f25b16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13491-cwe-426-untrusted-search-path-in-ib-3dfcb3be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13491%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=6984a5fef9fa50a62f25cb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-configs-expose-github-codespaces-to-attack-1a4b3777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20Configs%20Expose%20GitHub%20Codespaces%20to%20Attacks&amp;severity=medium&amp;id=69849eb2f9fa50a62f23904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13379-cwe-89-improper-neutralization-of-s-12712165</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13379%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Aspera%20Console&amp;severity=high&amp;id=69849ef7f9fa50a62f23a791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1927-cwe-862-missing-authorization-in-wps-78170b4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1927%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=69849ef7f9fa50a62f23a797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1523-cwe-22-improper-limitation-of-a-path-7d7ad643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1523%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PRIMION%20DIGITEK%20Digitek%20ADT1100&amp;severity=high&amp;id=69849ef7f9fa50a62f23a794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-codespaces-rce-asyncrat-c2-byo-685fa61c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Codespaces%20RCE%2C%20AsyncRAT%20C2%2C%20BYOVD%20Abuse%2C%20AI%20Cloud%20Intrusions%20%26%2015%2B%20Stories&amp;severity=low&amp;id=6985ab7ef9fa50a62feebb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-averted-russian-linked-cyberattacks-targetin-10aca99a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Averted%20Russian-Linked%20Cyberattacks%20Targeting%20Winter%20Olympics%20Websites%2C%20Foreign%20Minister%20Says&amp;severity=medium&amp;id=698490a2f9fa50a62f2021f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-infects-10000-devices-after-defying-law-e-c29c0853</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20Infects%2010%2C000%20Devices%20After%20Defying%20Law%20Enforcement%20Takedown&amp;severity=medium&amp;id=69848d1ef9fa50a62f1f7106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1517-sql-injection-in-iomad-e7db11b0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1517%3A%20SQL%20Injection%20in%20iomad&amp;severity=medium&amp;id=698489cef9fa50a62f1eaebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23572-cwe-863-incorrect-authorization-in--f5067c5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23572%3A%20CWE-863%20Incorrect%20Authorization%20in%20TeamViewer%20Remote&amp;severity=high&amp;id=69848649f9fa50a62f1d4e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1966-cwe-522-insufficiently-protected-cre-7d986d08</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1966%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=low&amp;id=69848649f9fa50a62f1d4e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-buyers-guide-to-ai-usage-control-76920303</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Buyer%E2%80%99s%20Guide%20to%20AI%20Usage%20Control&amp;severity=low&amp;id=6984828ff9fa50a62f1c6281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-sandbox-escape-could-lead-to-server-c-739fc28e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20N8n%20Sandbox%20Escape%20Could%20Lead%20to%20Server%20Compromise&amp;severity=critical&amp;id=69847f0ef9fa50a62f1b982d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23796-cwe-384-session-fixation-in-opensol-5a040fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23796%3A%20CWE-384%20Session%20Fixation%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69847f53f9fa50a62f1bc7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23797-cwe-256-plaintext-storage-of-a-pass-797f620f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23797%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69847f53f9fa50a62f1bc7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberspy-group-hacked-governments-and-critical-inf-ddda7236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberspy%20Group%20Hacked%20Governments%20and%20Critical%20Infrastructure%20in%2037%20Countries&amp;severity=critical&amp;id=69847b8af9fa50a62f1a5253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infy-hackers-resume-operations-with-new-c2-servers-f9e8ec27</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infy%20Hackers%20Resume%20Operations%20with%20New%20C2%20Servers%20After%20Iran%20Internet%20Blackout%20Ends&amp;severity=medium&amp;id=6985ab7ef9fa50a62feebb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-f5-patch-high-severity-vulnerabilities-fcc1c1e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%2C%20F5%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=698469f7f9fa50a62f161065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1654-cwe-79-improper-neutralization-of-in-8981f875</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1654%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pkthree%20Peter%E2%80%99s%20Date%20Countdown&amp;severity=medium&amp;id=69846323f9fa50a62f145d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1294-cwe-918-server-side-request-forgery--60483ee7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1294%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20All%20In%20One%20Image%20Viewer%20Block%20%E2%80%93%20Gutenberg%20block%20to%20create%20image%20viewer%20with%20hyperlink&amp;severity=high&amp;id=69846323f9fa50a62f145d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1271-cwe-639-authorization-bypass-through-4771f187</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1271%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69846323f9fa50a62f145d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14079-cwe-862-missing-authorization-in-el-9c52dc68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14079%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69846323f9fa50a62f145d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broken-phishing-urls-thu-feb-5th-91a9e90a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broken%20Phishing%20URLs%2C%20(Thu%2C%20Feb%205th)&amp;severity=medium&amp;id=69845f80f9fa50a62f1386ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13416-cwe-862-missing-authorization-in-me-210f4d44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13416%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=69845894f9fa50a62f0ebbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1319-cwe-79-improper-neutralization-of-in-fa48ce32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Robin%20Image%20Optimizer%20%E2%80%93%20Unlimited%20Image%20Optimization%20%26%20WebP%20Converter&amp;severity=medium&amp;id=69845894f9fa50a62f0ebbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-script-delivering-more-maliciousness-wed-c446b82d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Script%20Delivering%20More%20Maliciousness%2C%20(Wed%2C%20Feb%204th)&amp;severity=medium&amp;id=69831349f9fa50a62f7d42ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10258-vulnerability-in-nokia-infinera-dna-360ae349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10258%3A%20Vulnerability%20in%20Nokia%20Infinera%20DNA&amp;severity=medium&amp;id=69844701f9fa50a62f0a303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1268-cwe-79-improper-neutralization-of-in-5304465d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20Dynamic%20Widget%20Content&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0867-cwe-79-improper-neutralization-of-in-840f2989</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchthemes%20Essential%20Widgets&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1246-cwe-22-improper-limitation-of-a-path-526d43a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1246%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=69843ff8f9fa50a62f08b1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cve-2026-25049-enables-system-co-cf711cd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20CVE-2026-25049%20Enables%20System%20Command%20Execution%20via%20Malicious%20Workflows&amp;severity=critical&amp;id=698438bcf9fa50a62f070048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15080-cwe-1284-improper-validation-of-spe-9add849f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15080%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-R%20Series%20R08PCPU&amp;severity=high&amp;id=69842e66f9fa50a62f04ce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nginx-configurations-enable-large-scale--da34b7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NGINX%20Configurations%20Enable%20Large-Scale%20Web%20Traffic%20Hijacking%20Campaign&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61732-cwe-94-improper-control-of-generati-4ad2de62</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61732%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fcgo&amp;severity=high&amp;id=6984194cf9fa50a62fffe422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10314-cwe-276-incorrect-default-permissio-cfc47e0c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10314%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Mitsubishi%20Electric%20Corporation%20FREQSHIP-mini%20for%20Windows&amp;severity=high&amp;id=69840b3cf9fa50a62fd8cac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11730-cwe-78-improper-neutralization-of-s-b9faa684</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11730%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=6983fd2df9fa50a62fcc4d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1898-improper-access-controls-in-wekan-b728455b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1898%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983eb98f9fa50a62fbfb9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1897-missing-authorization-in-wekan-ec8a41f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1897%3A%20Missing%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6983eb98f9fa50a62fbfb9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69619-na-78246a2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69619%3A%20n%2Fa&amp;severity=medium&amp;id=69859ff8f9fa50a62fe9e881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70073-na-3ff827a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70073%3A%20n%2Fa&amp;severity=high&amp;id=69859ff8f9fa50a62fe9e87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-05-a9f0df41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-05&amp;severity=medium&amp;id=69853256f9fa50a62f4cfaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70792-na-c3cfa596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70792%3A%20n%2Fa&amp;severity=medium&amp;id=6984d01df9fa50a62f2f1641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70791-na-0ebc3c51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70791%3A%20n%2Fa&amp;severity=medium&amp;id=6984d01df9fa50a62f2f163d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69906-na-a2be4139</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69906%3A%20n%2Fa&amp;severity=high&amp;id=6984c591f9fa50a62f2cfd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68723-na-6404ef74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68723%3A%20n%2Fa&amp;severity=critical&amp;id=6984c591f9fa50a62f2cfd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68643-na-8681c687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68643%3A%20n%2Fa&amp;severity=medium&amp;id=6984c591f9fa50a62f2cfd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68722-na-8485241c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68722%3A%20n%2Fa&amp;severity=high&amp;id=6984c20ef9fa50a62f2c40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68721-na-c787cafc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68721%3A%20n%2Fa&amp;severity=high&amp;id=6984c20ef9fa50a62f2c40b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-05-941c64b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-05&amp;severity=low&amp;id=69844347f9fa50a62f09474c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1896-improper-access-controls-in-wekan-f79ae18a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1896%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983da05f9fa50a62fb4deb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13192-cwe-89-improper-neutralization-of-s-c321160a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13192%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=6983d681f9fa50a62fb4242b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22873-cwe-23-relative-path-traversal-in-g-9adb9cb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22873%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Go%20standard%20library%20os&amp;severity=low&amp;id=6983d2fdf9fa50a62fb3480c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1895-improper-access-controls-in-wekan-cd94eaae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1895%3A%20Improper%20Access%20Controls%20in%20WeKan&amp;severity=medium&amp;id=6983d2fdf9fa50a62fb34813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1894-improper-authorization-in-wekan-9480052e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1894%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=medium&amp;id=6983cbf5f9fa50a62fb21043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62616-cwe-918-server-side-request-forgery-1eb6646c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62616%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=6983cbf5f9fa50a62fb21040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62615-cwe-918-server-side-request-forgery-8957beac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62615%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Significant-Gravitas%20AutoGPT&amp;severity=critical&amp;id=6983cbf5f9fa50a62fb2103d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22038-cwe-532-insertion-of-sensitive-info-0f9ba13b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22038%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=6983cbf5f9fa50a62fb2104b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25585-cwe-119-improper-restriction-of-ope-44587225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25585%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c871f9fa50a62fb141d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25584-cwe-119-improper-restriction-of-ope-1b3a9c09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25584%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25583-cwe-119-improper-restriction-of-ope-469bbf3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25583%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25582-cwe-122-heap-based-buffer-overflow--03f3cc92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25582%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6983c4edf9fa50a62fb05c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25541-cwe-680-integer-overflow-to-buffer--6663e742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25541%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20tokio-rs%20bytes&amp;severity=medium&amp;id=6983c4edf9fa50a62fb05c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1892-improper-authorization-in-wekan-3f983994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1892%3A%20Improper%20Authorization%20in%20WeKan&amp;severity=low&amp;id=6983c4edf9fa50a62fb05c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25575-cwe-23-relative-path-traversal-in-t-324d75da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25575%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20TUM-Dev%20NavigaTUM&amp;severity=high&amp;id=69844e6bf9fa50a62f0c7c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25547-cwe-1333-inefficient-regular-expres-7c6a0894</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25547%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20isaacs%20brace-expansion&amp;severity=critical&amp;id=6983c169f9fa50a62faf7b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25546-cwe-78-improper-neutralization-of-s-053c9612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25546%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Coding-Solo%20godot-mcp&amp;severity=high&amp;id=6983c169f9fa50a62faf7b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25543-cwe-116-improper-encoding-or-escapi-f7cedb9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25543%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20mganss%20HtmlSanitizer&amp;severity=medium&amp;id=6983c169f9fa50a62faf7afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25539-cwe-22-improper-limitation-of-a-pat-e66d7a68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25539%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=critical&amp;id=6983c169f9fa50a62faf7af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25538-cwe-862-missing-authorization-in-de-5e832b37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25538%3A%20CWE-862%3A%20Missing%20Authorization%20in%20devtron-labs%20devtron&amp;severity=high&amp;id=6983bde5f9fa50a62fae8c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1884-server-side-request-forgery-in-zenta-c814586e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1884%3A%20Server-Side%20Request%20Forgery%20in%20ZenTao&amp;severity=medium&amp;id=6983bde5f9fa50a62fae8c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25537-cwe-843-access-of-resource-using-in-8491fb8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25537%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Keats%20jsonwebtoken&amp;severity=medium&amp;id=6983bde5f9fa50a62fae8c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25536-cwe-362-concurrent-execution-using--bd6c4c0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25536%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20modelcontextprotocol%20typescript-sdk&amp;severity=high&amp;id=6983bde5f9fa50a62fae8c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25526-cwe-1336-improper-neutralization-of-c4a73d18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25526%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20HubSpot%20jinjava&amp;severity=critical&amp;id=6983bde5f9fa50a62fae8c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25523-cwe-200-exposure-of-sensitive-infor-e8d82368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25523%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51451-cwe-644-improper-neutralization-of--1ba86212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51451%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Concert&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25521-cwe-1321-improperly-controlled-modi-dba4704a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25521%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20locutusjs%20locutus&amp;severity=critical&amp;id=6983ba62f9fa50a62fae1db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43181-cwe-613-insufficient-session-expira-5718473a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43181%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Concert&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40685-cwe-352-cross-site-request-forgery--0f2bbc2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Operations%20Analytics%20-%20Log%20Analysis&amp;severity=medium&amp;id=6983ba62f9fa50a62fae1dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2134-cwe-410-in-ibm-jazz-reporting-servic-2546c7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2134%3A%20CWE-410%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad2903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27550-cwe-497-in-ibm-jazz-reporting-servi-3ce4912c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27550%3A%20CWE-497%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad2900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1823-cwe-770-allocation-of-resources-with-2af56f7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1823%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=low&amp;id=6983b6ddf9fa50a62fad28fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39724-cwe-770-allocation-of-resources-wit-145a8136</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39724%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20Big%20SQL%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=6983b359f9fa50a62fac7189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25511-cwe-918-server-side-request-forgery-0d29fa11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25511%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Intermesh%20groupoffice&amp;severity=high&amp;id=6983afd6f9fa50a62fabdb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25512-cwe-78-improper-neutralization-of-s-02b8f466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25512%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=6983afd7f9fa50a62fabdb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15555-stack-based-buffer-overflow-in-open-9dbf52dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15555%3A%20Stack-based%20Buffer%20Overflow%20in%20Open5GS&amp;severity=medium&amp;id=6983afd5f9fa50a62fabdb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25499-cwe-1188-insecure-default-initializ-781502b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25499%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20bpg%20terraform-provider-proxmox&amp;severity=high&amp;id=6983afd6f9fa50a62fabdb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13375-cwe-250-in-ibm-common-cryptographic-53b57f31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13375%3A%20CWE-250%20in%20IBM%20Common%20Cryptographic%20Architecture&amp;severity=critical&amp;id=6983afd5f9fa50a62fabdb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1554-cwe-91-xml-injection-aka-blind-xpath-e4a16966</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1554%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Drupal%20Central%20Authentication%20System%20(CAS)%20Server&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1553-cwe-863-incorrect-authorization-in-d-5b55da28</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1553%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Drupal%20Canvas&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0948-cwe-288-authentication-bypass-using--9cc423e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0948%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Microsoft%20Entra%20ID%20SSO%20Login&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0947-cwe-79-improper-neutralization-of-in-c4082b1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AT%20Internet%20Piano%20Analytics&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0946-cwe-79-improper-neutralization-of-in-fc20a16b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AT%20Internet%20SmartTag&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0945-cwe-267-privilege-defined-with-unsaf-13a0d9ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0945%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Role%20Delegation&amp;severity=medium&amp;id=6983afd6f9fa50a62fabdb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0944-cwe-754-improper-check-for-unusual-o-604f67c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0944%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20Group%20invite&amp;severity=medium&amp;id=6983ac51f9fa50a62faacb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/they-got-in-through-sonicwall-then-they-tried-to-k-d2ba1a4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=They%20Got%20In%20Through%20SonicWall.%20Then%20They%20Tried%20to%20Kill%20Every%20Security%20Tool&amp;severity=medium&amp;id=69847bd0f9fa50a62f1a71f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25505-cwe-306-missing-authentication-for--d2caa7ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25505%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20maziggy%20bambuddy&amp;severity=critical&amp;id=6983a8cef9fa50a62fa9fe88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25513-cwe-89-improper-neutralization-of-s-b2b7666b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25513%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25514-cwe-20-improper-input-validation-in-d581a1b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25514%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25161-cwe-22-improper-limitation-of-a-pat-7235ac0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25161%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AlistGo%20alist&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25160-cwe-295-improper-certificate-valida-d1ead323</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25160%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20AlistGo%20alist&amp;severity=critical&amp;id=6983a549f9fa50a62fa8d0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24884-cwe-59-improper-link-resolution-bef-fb097a83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24884%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20node-modules%20compressing&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25145-cwe-22-improper-limitation-of-a-pat-2199e198</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25145%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=6983a549f9fa50a62fa8d0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25143-cwe-78-improper-neutralization-of-s-4f8716d3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25143%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24844-cwe-78-improper-neutralization-of-s-1f9ed088</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24844%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24843-cwe-22-improper-limitation-of-a-pat-9bfd519a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24843%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20melange&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23897-cwe-1333-inefficient-regular-expres-a642da5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23897%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20apollographql%20apollo-server&amp;severity=high&amp;id=69839e42f9fa50a62fa72d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25140-cwe-400-uncontrolled-resource-consu-960ed904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25140%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=69839abdf9fa50a62fa5f777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25121-cwe-23-relative-path-traversal-in-c-c53a6503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25121%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=69839abdf9fa50a62fa5f76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25122-cwe-400-uncontrolled-resource-consu-2aca803e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25122%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20chainguard-dev%20apko&amp;severity=medium&amp;id=69839abdf9fa50a62fa5f773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0536-cwe-787-out-of-bounds-write-in-autod-89def5dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0536%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69839031f9fa50a62fa26932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25508-cwe-125-out-of-bounds-read-in-espre-1863452a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25508%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa09397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25507-cwe-416-use-after-free-in-espressif-c761e816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25507%3A%20CWE-416%3A%20Use%20After%20Free%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa0938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25532-cwe-191-integer-underflow-wrap-or-w-0c7438cb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25532%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=69838cacf9fa50a62fa093a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-develops-scanner-to-detect-backdoors-in--63166ba0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Develops%20Scanner%20to%20Detect%20Backdoors%20in%20Open-Weight%20Large%20Language%20Models&amp;severity=low&amp;id=69845e9ff9fa50a62f0ff3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25139-cwe-125-out-of-bounds-read-in-riot--c8e77efd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25139%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20RIOT-OS%20RIOT&amp;severity=high&amp;id=6983892af9fa50a62fa00a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69215-cwe-89-improper-neutralization-of-s-8b59e75a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69215%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=6983892af9fa50a62fa00a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69213-cwe-89-improper-neutralization-of-s-274b91ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69213%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=6983892af9fa50a62fa00a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21893-cwe-78-improper-neutralization-of-s-384e4de1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21893%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=6983892af9fa50a62fa00a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64712-cwe-22-improper-limitation-of-a-pat-2ced3a68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64712%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unstructured-IO%20unstructured&amp;severity=critical&amp;id=6983892af9fa50a62fa00a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deadvax-malware-campaign-deploys-asyncrat-via-ipfs-11135850</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DEAD%23VAX%20Malware%20Campaign%20Deploys%20AsyncRAT%20via%20IPFS-Hosted%20VHD%20Phishing%20Files&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22044-cwe-89-improper-neutralization-of-s-10a87eb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22044%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23624-cwe-384-session-fixation-in-glpi-pr-c85ebecb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23624%3A%20CWE-384%3A%20Session%20Fixation%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22247-cwe-918-server-side-request-forgery-ef065731</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22247%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69838221f9fa50a62f9dc5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25115-cwe-693-protection-mechanism-failur-a8a0d342</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25115%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25056-cwe-434-unrestricted-upload-of-file-ac0e62a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25056%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25055-cwe-22-improper-limitation-of-a-pat-ef87be5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25055%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d191e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25054-cwe-80-improper-neutralization-of-s-f40600b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25054%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25053-cwe-78-improper-neutralization-of-s-73c200fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25053%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25052-cwe-367-time-of-check-time-of-use-t-93438876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25052%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25051-cwe-79-improper-neutralization-of-i-cbd425cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25051%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d190d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61917-cwe-668-exposure-of-resource-to-wro-3f5a5af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61917%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69837ea2f9fa50a62f9d1904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25049-cwe-913-improper-control-of-dynamic-698b739a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25049%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=69837ea2f9fa50a62f9d1908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0662-cwe-426-untrusted-search-path-in-aut-fb3049c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0662%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0660-cwe-121-stack-based-buffer-overflow--8b0875ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0660%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0661-cwe-787-out-of-bounds-write-in-autod-f988f150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0661%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0537-cwe-787-out-of-bounds-write-in-autod-4f4f57fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0537%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837796f9fa50a62f9b5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0538-cwe-787-out-of-bounds-write-in-autod-b77e745b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0538%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=69837419f9fa50a62f9ac078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20119-improper-validation-of-specified-ty-ebb4ee15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20119%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20RoomOS%20Software&amp;severity=high&amp;id=69837419f9fa50a62f9ac08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20111-use-of-hard-coded-credentials-in-ci-bf72ccb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20111%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20Prime%20Infrastructure&amp;severity=medium&amp;id=69837419f9fa50a62f9ac087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20123-url-redirection-to-untrusted-site-o-8629cd8c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20123%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=69837419f9fa50a62f9ac08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20098-unrestricted-upload-of-file-with-da-eec3aa8d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20098%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Meeting%20Management&amp;severity=high&amp;id=69837419f9fa50a62f9ac084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20056-download-of-code-without-integrity--69833cde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20056%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Cisco%20Cisco%20Secure%20Web%20Appliance&amp;severity=medium&amp;id=69837419f9fa50a62f9ac081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0659-cwe-787-out-of-bounds-write-in-autod-f330298c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0659%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20USD%20for%20Arnold&amp;severity=high&amp;id=69837419f9fa50a62f9ac07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-assisted-cloud-intrusion-achieves-admin-access--7ee8ed65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-assisted%20cloud%20intrusion%20achieves%20admin%20access%20in%208%20minutes&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-year-new-sector-targeting-indias-startup-ecosy-7d880cb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20year%2C%20new%20sector%3A%20Targeting%20India&apos;s%20startup%20ecosystem&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-routers-dns-and-a-tds-hidden-in-aeza-n-5ef12f72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20Routers%2C%20DNS%2C%20and%20a%20TDS%20Hidden%20in%20Aeza%20Networks&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/punishing-owl-attacks-russia-a-new-owl-in-the-hack-307ce4bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Punishing%20Owl%20Attacks%20Russia%3A%20A%20New%20Owl%20in%20the%20Hacktivists&apos;%20Forest&amp;severity=medium&amp;id=6983b358f9fa50a62fac6fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-a-russian-crypto-drainer-operation-4ca9a827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20a%20Russian%20Crypto%20Drainer%20Operation&amp;severity=medium&amp;id=6983b6ddf9fa50a62fad288d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22549-cwe-250-execution-with-unnecessary--e87d8941</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22549%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20F5%20BIG-IP%20Container%20Ingress%20Services&amp;severity=medium&amp;id=69836601f9fa50a62f96098c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1642-cwe-349-acceptance-of-extraneous-unt-1423ae64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1642%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22548-cwe-362-concurrent-execution-using--12bbf082</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22548%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20732-cwe-451-user-interface-ui-misrepres-a9763fbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20732%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20F5%20BIG-IP&amp;severity=low&amp;id=6983627ef9fa50a62f94fb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20730-cwe-200-exposure-of-sensitive-infor-1e73f43f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20730%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20F5%20BIG-IP%20Edge%20Client&amp;severity=low&amp;id=6983627ef9fa50a62f94fb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-amaranth-dragon-exploits-winrar-flaw--bb02afa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Amaranth-Dragon%20Exploits%20WinRAR%20Flaw%20in%20Espionage%20Campaigns&amp;severity=medium&amp;id=69845e9ff9fa50a62f0ff3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amaranth-dragon-weaponizing-cve-2025-8088-for-targ-7dfc4b87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amaranth-Dragon%3A%20Weaponizing%20CVE-2025-8088%20for%20Targeted%20Espionage%20in%20the%20Southeast%20Asia&amp;severity=medium&amp;id=698350eef9fa50a62f8f0b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14740-cwe-732-incorrect-permission-assign-d39e0e46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14740%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Docker%20Inc.%20Docker%20Desktop&amp;severity=medium&amp;id=6983546df9fa50a62f8ff386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-allowed-full-compromise-of-google--9a65807f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Allowed%20Full%20Compromise%20of%20Google%20Looker%20Instances&amp;severity=critical&amp;id=69834d32f9fa50a62f8e1d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5329-cwe-89-improper-neutralization-of-sp-4df4d90a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5329%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Martcode%20Software%20Inc.%20Delta%20Course%20Automation&amp;severity=critical&amp;id=69834d77f9fa50a62f8e393b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15368-cwe-98-improper-control-of-filename-65383c43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15368%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeboy%20SportsPress%20%E2%80%93%20Sports%20Club%20%26%20League%20Manager&amp;severity=high&amp;id=69834d77f9fa50a62f8e3935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-cyberwar-and-rising-nation-sta-896fac48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Cyberwar%20and%20Rising%20Nation%20State%20Threats&amp;severity=medium&amp;id=6983462af9fa50a62f8bffb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/341-malicious-clawed-skills-found-by-the-bot-they--cac03cca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=341%20Malicious%20Clawed%20Skills%20Found%20by%20the%20Bot%20They%20Were%20Targeting&amp;severity=medium&amp;id=6983546df9fa50a62f8fec2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dockerdash-flaw-in-docker-ai-assistant-leads-to-rc-8c2ee893</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DockerDash%20Flaw%20in%20Docker%20AI%20Assistant%20Leads%20to%20RCE%2C%20Data%20Theft&amp;severity=critical&amp;id=69833112f9fa50a62f86384c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-godfather-of-ransomware-inside-cartel-ambition-6c4d8a5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Godfather%20of%20Ransomware%3F%20Inside%20Cartel%20Ambitions&amp;severity=medium&amp;id=6983b6ddf9fa50a62fad2884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hundreds-of-malicious-crypto-trading-add-ons-found-7f6e64cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hundreds%20of%20Malicious%20Crypto%20Trading%20Add-Ons%20Found%20in%20Moltbot%2FOpenClaw&amp;severity=medium&amp;id=69847bd0f9fa50a62f1a71f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0873-cwe-79-improper-neutralization-of-in-3db399cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ercom%20Cryptobox&amp;severity=medium&amp;id=6983627ef9fa50a62f94fb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24735-cwe-359-exposure-of-private-persona-76777b11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24735%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Answer&amp;severity=high&amp;id=6983708ef9fa50a62f98de78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59818-vulnerability-in-zenitel-tcis-3-e1f94afc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59818%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=critical&amp;id=69832335f9fa50a62f825756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptominers-reverse-shells-dropped-in-recent-reac-4b650cda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptominers%2C%20Reverse%20Shells%20Dropped%20in%20Recent%20React2Shell%20Attacks&amp;severity=medium&amp;id=69831bfaf9fa50a62f7ff2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-90-seconds-how-early-decisions-shape-inc-cdb9dba8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%2090%20Seconds%3A%20How%20Early%20Decisions%20Shape%20Incident%20Response%20Investigations&amp;severity=high&amp;id=69845e9ff9fa50a62f0ff3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41085-cwe-79-improper-neutralization-of-i-f5d26662</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Apidog%20Apidog%20Web%20Platform&amp;severity=medium&amp;id=69831c3bf9fa50a62f80155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-solarwinds-vulnerability-exploited-in-attack-bf32f06e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20SolarWinds%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=69831876f9fa50a62f7f28f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1622-cwe-532-insertion-of-sensitive-infor-88036ec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1622%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20neo4j%20Enterprise%20Edition&amp;severity=medium&amp;id=698311a1f9fa50a62f7d02dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-of-moltbook-agent-network-bot-to-75107f17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%20of%20Moltbook%20Agent%20Network%3A%20Bot-to-Bot%20Prompt%20Injection%20and%20Data%20Leaks&amp;severity=medium&amp;id=698306e2f9fa50a62f79d87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0816-cwe-89-improper-neutralization-of-sp-9a170231</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0816%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=medium&amp;id=6983072af9fa50a62f79eb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15487-cwe-22-improper-limitation-of-a-pat-0dded556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15487%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20qriouslad%20Code%20Explorer&amp;severity=medium&amp;id=69830729f9fa50a62f79eb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1370-cwe-89-improper-neutralization-of-sp-44db5f3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20comprassibs%20SIBS%20woocommerce%20payment%20gateway&amp;severity=medium&amp;id=6983072af9fa50a62f79eba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0743-cwe-79-improper-neutralization-of-in-d908999a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20orenhav%20WP%20Content%20Permission&amp;severity=medium&amp;id=6983072af9fa50a62f79eb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0742-cwe-79-improper-neutralization-of-in-49053c10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zealopensource%20Smart%20Appointment%20%26%20Booking&amp;severity=medium&amp;id=6983072af9fa50a62f79eb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0679-cwe-862-missing-authorization-in-for-4ef3a96e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0679%3A%20CWE-862%20Missing%20Authorization%20in%20fortispay%20Fortis%20%20for%20WooCommerce&amp;severity=medium&amp;id=69830729f9fa50a62f79eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15508-cwe-200-exposure-of-sensitive-infor-6177add6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15508%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20magicimport%20Magic%20Import%20Document%20Extractor&amp;severity=medium&amp;id=69830729f9fa50a62f79eb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0572-cwe-862-missing-authorization-in-web-e7277085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0572%3A%20CWE-862%20Missing%20Authorization%20in%20webpurify%20WebPurify%20Profanity%20Filter&amp;severity=medium&amp;id=69830729f9fa50a62f79eb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15507-cwe-862-missing-authorization-in-ma-a6cf4e03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15507%3A%20CWE-862%20Missing%20Authorization%20in%20magicimport%20Magic%20Import%20Document%20Extractor&amp;severity=medium&amp;id=69830729f9fa50a62f79eb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15268-cwe-89-improper-neutralization-of-s-e8f793d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15268%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20infility%20Infility%20Global&amp;severity=high&amp;id=69830729f9fa50a62f79eb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0681-cwe-79-improper-neutralization-of-in-42e82463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtddev%20Extended%20Random%20Number%20Generator&amp;severity=medium&amp;id=6983072af9fa50a62f79eb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15285-cwe-862-missing-authorization-in-lu-cfc3b5c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15285%3A%20CWE-862%20Missing%20Authorization%20in%20lupsonline%20SEO%20Flow%20by%20LupsOnline&amp;severity=high&amp;id=69830729f9fa50a62f79eb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14461-cwe-862-missing-authorization-in-tp-560241f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14461%3A%20CWE-862%20Missing%20Authorization%20in%20tpixendit%20Xendit%20Payment&amp;severity=medium&amp;id=69830729f9fa50a62f79eb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15260-cwe-862-missing-authorization-in-lw-fba313d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15260%3A%20CWE-862%20Missing%20Authorization%20in%20lwsdevelopers%20MyRewards%20%E2%80%93%20Loyalty%20Points%20and%20Rewards%20for%20WooCommerce%20%E2%80%93%20Reward%20orders%2C%20referrals%2C%20product%20reviews%20and%20more&amp;severity=medium&amp;id=69830729f9fa50a62f79eb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15482-cwe-200-exposure-of-sensitive-infor-e0e06d24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15482%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20chapaet%20Chapa%20Payment%20Gateway%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=69830729f9fa50a62f79eb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1819-cwe-79-improper-neutralization-of-in-91abdc20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Karel%20Electronics%20Industry%20and%20Trade%20Inc.%20ViPort&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-python-infostealers-target-macos-v-f89b34d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20Python%20Infostealers%20Target%20macOS%20via%20Fake%20Ads%20and%20Installers&amp;severity=medium&amp;id=6983125df9fa50a62f7d2a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24447-improper-neutralization-of-formula--ff6f4904</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24447%3A%20Improper%20neutralization%20of%20formula%20elements%20in%20a%20CSV%20file%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f736054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23704-unrestricted-upload-of-file-with-da-857cff0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23704%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f73604f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22875-cross-site-scripting-xss-in-six-apa-08808dab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22875%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f73604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21393-cross-site-scripting-xss-in-six-apa-d034a7f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21393%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=6982f1fdf9fa50a62f736045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1756-cwe-434-unrestricted-upload-of-file--7ad77ef4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1756%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20seezee%20WP%20FOFT%20Loader&amp;severity=high&amp;id=6982ee78f9fa50a62f7260f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-mandates-pre-publish-security-c-e7238876</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Mandates%20Pre-Publish%20Security%20Checks%20for%20Open%20VSX%20Extensions&amp;severity=medium&amp;id=6983125df9fa50a62f7d2a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20987-cwe-284-improper-access-control-in--4dcabacd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20987%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20GalaxyDiagnostics&amp;severity=high&amp;id=6982fcd1f9fa50a62f765da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20986-cwe-22-improper-limitation-of-a-pat-6f48f0c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20986%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Chinese%20Samsung%20Members&amp;severity=medium&amp;id=6982fcd1f9fa50a62f765da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20985-cwe-20-improper-input-validation-in-8a62bf1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20985%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20984-cwe-280-improper-handling-of-insuff-1c49c69a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20984%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20983-cwe-926-improper-export-of-android--06309a5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20983%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20982-cwe-35-path-traversal-in-samsung-mo-6ab58797</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20982%3A%20CWE-35%3A%20Path%20Traversal%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20981-cwe-20-improper-input-validation-in-8c5e889c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20981%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20980-cwe-20-improper-input-validation-in-3e641da2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20980%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20979-cwe-269-impoper-privilege-managemen-106bd045</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20979%3A%20CWE-269%20Impoper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=6982fcd0f9fa50a62f765d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20978-cwe-269-impoper-privilege-managemen-b57983f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20978%3A%20CWE-269%20Impoper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20977-cwe-284-improper-access-control-in--df7d1cd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20977%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6982fcd0f9fa50a62f765d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-solarwinds-web-help-d-5202fe85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20SolarWinds%20Web%20Help%20Desk%20RCE%20to%20KEV%20Catalog&amp;severity=critical&amp;id=6983125df9fa50a62f7d2a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29867-cwe-843-access-of-resource-using-in-e17a9b74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29867%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Hancom%20Inc.%20Hancom%20Office%202018&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1791-cwe-434-unrestricted-upload-of-file--fb6094c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1791%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Hillstone%20Networks%20Operation%20and%20Maintenance%20Security%20Gateway&amp;severity=low&amp;id=6982c448f9fa50a62f51f8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1835-cross-site-request-forgery-in-lcg012-ae5e0431</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1835%3A%20Cross-Site%20Request%20Forgery%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=69829a18f9fa50a62ff8dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-desktop-4443-unauthenticated-api-exposure-f37ba59f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Desktop%204.44.3%20-%20Unauthenticated%20%20API%20Exposure&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortiweb-fabric-connector-76x-sql-injection-to-rem-db046e74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiWeb%20Fabric%20Connector%207.6.x%20-%20SQL%20Injection%20to%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aiohttp-391-directory-traversal-poc-06c6f577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=aiohttp%203.9.1%20-%20directory%20traversal%20PoC&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingress-nginx-admission-controller-v1111-fd-inject-5be78404</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingress-NGINX%20Admission%20Controller%20v1.11.1%20-%20FD%20Injection%20to%20RCE&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/octoprint-1112-file-upload-63465292</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OctoPrint%201.11.2%20-%20File%20Upload&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redis-802-rce-58f92bee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Redis%208.0.2%20-%20RCE&amp;severity=critical&amp;id=69845ddcf9fa50a62f0fd497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-1011-ntlm-hash-disclosure-spoofing-9b39ea95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=windows%2010%2F11%20-%20NTLM%20Hash%20Disclosure%20Spoofing&amp;severity=medium&amp;id=69845ddcf9fa50a62f0fd492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-04-ab1fd846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-04&amp;severity=medium&amp;id=6983e0d6f9fa50a62fb69fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71031-na-1ecbeaac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71031%3A%20n%2Fa&amp;severity=high&amp;id=6983a8cef9fa50a62fa9fe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70545-na-20c02591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70545%3A%20n%2Fa&amp;severity=medium&amp;id=69836601f9fa50a62f960988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70997-na-24272539</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70997%3A%20n%2Fa&amp;severity=high&amp;id=6983627ef9fa50a62f94fb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69618-na-7e17525d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69618%3A%20n%2Fa&amp;severity=high&amp;id=69835b75f9fa50a62f92b4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-04-7395cf17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-04&amp;severity=low&amp;id=69832683f9fa50a62f838bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69621-na-6c7cbd12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69621%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd1f9fa50a62f765daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69620-na-4c7a89dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69620%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd1f9fa50a62f765da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1813-unrestricted-upload-in-bolo-blog-bol-b4844d55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1813%3A%20Unrestricted%20Upload%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69828885f9fa50a62fe9cc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1633-cwe-306-missing-authentication-for-c-358e9305</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1633%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synectix%20LAN%20232%20TRIO&amp;severity=critical&amp;id=6982fcd1f9fa50a62f765db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1632-cwe-306-missing-authentication-for-c-69ba200a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1632%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20RISS%20SRL%20MOMA%20Seismic%20Station&amp;severity=critical&amp;id=6982817df9fa50a62fe78b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1812-path-traversal-in-bolo-blog-bolo-sol-741f75b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1812%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69827df8f9fa50a62fe64081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1755-cwe-79-improper-neutralization-of-in-6a922468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Menu%20Icons%20by%20ThemeIsle&amp;severity=medium&amp;id=69827a75f9fa50a62fe57fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24514-cwe-770-allocation-of-resources-wit-fe0a4b00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24514%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Kubernetes%20ingress-nginx&amp;severity=medium&amp;id=69827a75f9fa50a62fe57fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24513-cwe-754-improper-check-for-unusual--15bf96ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24513%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Kubernetes%20ingress-nginx&amp;severity=low&amp;id=69827a75f9fa50a62fe57fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24512-cwe-20-improper-input-validation-in-994b9fe2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24512%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69827a75f9fa50a62fe57fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1580-cwe-20-improper-input-validation-in--c604c8c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1580%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kubernetes%20ingress-nginx&amp;severity=high&amp;id=69827a75f9fa50a62fe57fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33081-cwe-312-cleartext-storage-of-sensit-14cffe63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33081%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20IBM%20Concert&amp;severity=low&amp;id=698276f1f9fa50a62fe4b3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36033-cwe-79-improper-neutralization-of-i-3c6e0ea9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36033%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Engineering%20Lifecycle%20Management%20-%20Global%20Configuration%20Management&amp;severity=medium&amp;id=698276f1f9fa50a62fe4b3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36094-cwe-1284-improper-validation-of-spe-64bc533b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36094%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=698276f1f9fa50a62fe4b3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1811-path-traversal-in-bolo-blog-bolo-sol-24469a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1811%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69826c65f9fa50a62fe2a068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1341-cwe-306-missing-authentication-for-c-a1d18d0c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1341%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Avation%20Avation%20Light%20Engine%20Pro&amp;severity=critical&amp;id=69826c65f9fa50a62fe2a065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25510-cwe-434-unrestricted-upload-of-file-4e04b8c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25510%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ci4-cms-erp%20ci4ms&amp;severity=critical&amp;id=698268e3f9fa50a62fe1ecce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25509-cwe-204-observable-response-discrep-a743822b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25509%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20ci4-cms-erp%20ci4ms&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25150-cwe-1321-improperly-controlled-modi-c356c655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25150%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=698268e3f9fa50a62fe1ecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25148-cwe-79-improper-neutralization-of-i-b527805d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25148%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25151-cwe-352-cross-site-request-forgery--54a7f0af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25151%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25155-cwe-352-cross-site-request-forgery--fc29b370</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25155%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QwikDev%20qwik&amp;severity=medium&amp;id=698268e3f9fa50a62fe1ecc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25149-cwe-601-url-redirection-to-untruste-221b295d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25149%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20QwikDev%20qwik&amp;severity=low&amp;id=698268e3f9fa50a62fe1ecba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1862-type-confusion-in-google-chrome-74752399</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1862%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6982655ef9fa50a62fe085f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1861-heap-buffer-overflow-in-google-chrom-00b60d91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1861%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6982655ef9fa50a62fe085f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65078-cwe-426-untrusted-search-path-in-le-d88b2302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65078%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=critical&amp;id=698261daf9fa50a62fdf39d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24887-cwe-78-improper-neutralization-of-s-2e48c07a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24887%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24053-cwe-22-improper-limitation-of-a-pat-19af0cd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24053%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24052-cwe-601-url-redirection-to-untruste-7dabc228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24052%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=698261daf9fa50a62fdf39df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65077-cwe-22-improper-limitation-of-a-pat-1ed37367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65077%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=high&amp;id=698261daf9fa50a62fdf39d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65081-cwe-125-out-of-bounds-read-in-lexma-2674a469</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65081%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=698261daf9fa50a62fdf39dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65080-cwe-843-access-of-resource-using-in-7bdf51d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65080%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=698261daf9fa50a62fdf39d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1810-path-traversal-in-bolo-blog-bolo-sol-f4bf9946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1810%3A%20Path%20Traversal%20in%20bolo-blog%20bolo-solo&amp;severity=medium&amp;id=69825e55f9fa50a62fde8b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65079-cwe-122-heap-based-buffer-overflow--7090318c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65079%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Lexmark%20MXTCT%2C%20MSNGM%2C%20MSTGM%2C%20MXNGM%2C%20MXTGM%2C%20CSNGV%2C%20CSTGV%2C%20CXTGV%2C%20MSNGW%2C%20MSTGW%2C%20MXTGW%2C%20CSTLS%2C%20CXTLS%2C%20MXTLS%2C%20CSTMM%2C%20CXTMM%2C%20CSTPC%2C%20CXTPC%2C%20MXTPM%2C%20MSNSN%2C%20MSTSN%2C%20MXTSN%2C%20CSNZJ%2C%20CSTZJ%2C%20CXNZJ%2C%20CXTZJ&amp;severity=medium&amp;id=69825e55f9fa50a62fde8b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1801-inconsistent-interpretation-of-http--410806b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1801%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69825ad5f9fa50a62fdde084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1803-use-of-default-credentials-in-ziroom-eff2e206</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1803%3A%20Use%20of%20Default%20Credentials%20in%20Ziroom%20ZHOME%20A0101&amp;severity=critical&amp;id=6982574ef9fa50a62fdd1d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24149-cwe-94-improper-control-of-generati-2d4eb83d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24149%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=6982574ef9fa50a62fdd1d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64438-cwe-835-loop-with-unreachable-exit--0a2c29a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64438%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc199e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64098-cwe-125-out-of-bounds-read-in-epros-1889535f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62799-cwe-122-heap-based-buffer-overflow--ed63869c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62799%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=high&amp;id=69825048f9fa50a62fdc1992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62603-cwe-125-out-of-bounds-read-in-epros-328d3edd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62603%3A%20CWE-125%20Out-of-bounds%20Read%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc198c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62602-cwe-122-heap-based-buffer-overflow--b712494b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62602%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62601-cwe-122-heap-based-buffer-overflow--ae3ec93e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62601%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=69825048f9fa50a62fdc1980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24441-cwe-319-cleartext-transmission-of-s-f6d6bcba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24441%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=high&amp;id=69825048f9fa50a62fdc19aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24434-cwe-352-cross-site-request-forgery--eb99fff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24434%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=69825048f9fa50a62fdc19a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24427-cwe-201-insertion-of-sensitive-info-2518bc19</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24427%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62600-cwe-190-integer-overflow-or-wraparo-ebce4785</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62600%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=6982493ef9fa50a62fdabaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24426-cwe-79-improper-neutralization-of-i-6027d436</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20Tenda%20AC7&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1802-command-injection-in-ziroom-zhome-a0-4f2a0123</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1802%3A%20Command%20Injection%20in%20Ziroom%20ZHOME%20A0101&amp;severity=medium&amp;id=6982493ef9fa50a62fdabb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62673-cwe-122-heap-based-buffer-overflow--c706b0f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62673%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62501-cwe-322-key-exchange-without-entity-5ed7f272</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62501%3A%20CWE-322%20Key%20Exchange%20without%20Entity%20Authentication%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62405-cwe-122-heap-based-buffer-overflow--88225e85</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62405%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62404-cwe-122-heap-based-buffer-overflow--003e1e3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62404%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61983-cwe-122-heap-based-buffer-overflow--e46fba2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61983%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61944-cwe-122-heap-based-buffer-overflow--815cf30e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61944%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=6982493ef9fa50a62fdabae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59487-cwe-122-heap-based-buffer-overflow--c6ddbb8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59487%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59482-cwe-122-heap-based-buffer-overflow--45d8dec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59482%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58455-cwe-122-heap-based-buffer-overflow--e71fcffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58455%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58077-cwe-122-heap-based-buffer-overflow--bdbbf656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58077%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=698245baf9fa50a62fda11bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25502-cwe-121-stack-based-buffer-overflow-80bd3249</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25502%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698245bcf9fa50a62fda1234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25503-cwe-704-incorrect-type-conversion-o-4799c60b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25503%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=698245bcf9fa50a62fda123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25241-cwe-89-improper-neutralization-of-s-0b72583b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25241%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245bcf9fa50a62fda1231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25240-cwe-89-improper-neutralization-of-s-1ab86a4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25240%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245bcf9fa50a62fda122e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25239-cwe-89-improper-neutralization-of-s-b8b1fc95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25239%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=high&amp;id=698245bcf9fa50a62fda122b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25238-cwe-89-improper-neutralization-of-s-256012a5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25238%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245baf9fa50a62fda11ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25237-cwe-624-executable-regular-expressi-3bed76f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25237%3A%20CWE-624%3A%20Executable%20Regular%20Expression%20Error%20in%20pear%20pearweb&amp;severity=critical&amp;id=698245baf9fa50a62fda11e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25236-cwe-89-improper-neutralization-of-s-16a75fbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25236%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245baf9fa50a62fda11e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25235-cwe-337-predictable-seed-in-pseudo--62642ee1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25235%3A%20CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20pear%20pearweb&amp;severity=high&amp;id=698245baf9fa50a62fda11e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25234-cwe-89-improper-neutralization-of-s-2aba1fe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25234%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pear%20pearweb&amp;severity=medium&amp;id=698245baf9fa50a62fda11de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25233-cwe-783-operator-precedence-logic-e-98d15dee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25233%3A%20CWE-783%3A%20Operator%20Precedence%20Logic%20Error%20in%20pear%20pearweb&amp;severity=high&amp;id=698245baf9fa50a62fda11db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52631-cwe-200-in-hcl-aion-19e7abe9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52631%3A%20CWE-200%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52623-cwe-522-in-hcl-aion-e4370358</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52623%3A%20CWE-522%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25522-cwe-79-improper-neutralization-of-i-5f82c5bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25522%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25490-cwe-79-improper-neutralization-of-i-fa34bd3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25490%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8ceb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25489-cwe-79-improper-neutralization-of-i-6e83cee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8ceaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25488-cwe-79-improper-neutralization-of-i-5d98ec6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25488%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25487-cwe-79-improper-neutralization-of-i-4b55417c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb4f9fa50a62fd8cea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25486-cwe-79-improper-neutralization-of-i-240f94bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25485-cwe-79-improper-neutralization-of-i-8105c312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52628-cwe-1275-in-hcl-aion-df4675a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52628%3A%20CWE-1275%20in%20HCL%20AION&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25484-cwe-79-improper-neutralization-of-i-b210ab58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25484%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25483-cwe-79-improper-neutralization-of-i-81489a10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0620-cwe-693-protection-mechanism-failure-c1563062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0620%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20TP-Link%20Systems%20Inc.%20AXE75&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25482-cwe-79-improper-neutralization-of-i-73649cae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25482%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craftcms%20commerce&amp;severity=medium&amp;id=69823eb3f9fa50a62fd8ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52633-cwe-539-in-hcl-aion-af9f9cab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52633%3A%20CWE-539%20in%20HCL%20AION&amp;severity=low&amp;id=69823eb3f9fa50a62fd8ce66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62599-cwe-190-integer-overflow-or-wraparo-1c1e982d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62599%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20eProsima%20Fast-DDS&amp;severity=low&amp;id=6982fcd3f9fa50a62f7662ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52629-cwe-1032-in-hcl-aion-994fd821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52629%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=low&amp;id=6982493ff9fa50a62fdabb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52626-cwe-78-in-hcl-aion-f4156f00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52626%3A%20CWE-78%20in%20HCL%20AION&amp;severity=medium&amp;id=698253c8f9fa50a62fdcb702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52627-cwe-732-in-hcl-aion-98a54cce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52627%3A%20CWE-732%20in%20HCL%20AION&amp;severity=medium&amp;id=6982493ff9fa50a62fdabb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22228-cwe-400-uncontrolled-resource-consu-b8859d18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22228%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=medium&amp;id=69823426f9fa50a62fd6b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22220-cwe-20-improper-input-validation-in-3259f418</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22220%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=medium&amp;id=69823426f9fa50a62fd6b728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24669-cwe-613-insufficient-session-expira-f8c1b8f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24669%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f766497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24668-cwe-284-improper-access-control-in--80d3ed64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24668%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f766493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24667-cwe-613-insufficient-session-expira-683c6237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24667%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76648f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24666-cwe-352-cross-site-request-forgery--5852c27a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24666%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76648b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24665-cwe-79-improper-neutralization-of-i-c873464b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24665%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f766488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24774-cwe-841-improper-enforcement-of-beh-1a435a61</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24774%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd9f9fa50a62f767686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24773-cwe-639-authorization-bypass-throug-c3909f60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24773%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd9f9fa50a62f767679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24674-cwe-79-improper-neutralization-of-i-d9b0eb15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24674%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24673-cwe-434-unrestricted-upload-of-file-59e52bf4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24673%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24672-cwe-79-improper-neutralization-of-i-c7b1d13a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24672%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=high&amp;id=6982fcd8f9fa50a62f7664a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24671-cwe-79-improper-neutralization-of-i-c3d6a6da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24671%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f7664a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24670-cwe-284-improper-access-control-in--40136907</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24670%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd8f9fa50a62f76649d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24664-cwe-204-observable-response-discrep-832f3070</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24664%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20gunet%20openeclass&amp;severity=medium&amp;id=6982fcd6f9fa50a62f76638d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1568-cwe-347-improper-verification-of-cry-723aa830</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1568%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Rapid7%20Vulnerability%20Management&amp;severity=critical&amp;id=69822999f9fa50a62fd3ce12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-fixes-critical-ask-gordon-ai-flaw-allowing--a13814cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Fixes%20Critical%20Ask%20Gordon%20AI%20Flaw%20Allowing%20Code%20Execution%20via%20Image%20Metadata&amp;severity=critical&amp;id=6983125df9fa50a62f7d2aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23794-cwe-79-improper-neutralization-of-i-0843fb34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=medium&amp;id=69821482f9fa50a62fceb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23795-cwe-611-improper-restriction-of-xml-0af39dea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23795%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=medium&amp;id=69821482f9fa50a62fceb33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1814-cwe-331-insufficient-entropy-in-rapi-2e82bb61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1814%3A%20CWE-331%20Insufficient%20Entropy%20in%20Rapid7%20InsightVM%2FNexpose&amp;severity=medium&amp;id=698210fef9fa50a62fce298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14550-cwe-407-inefficient-algorithmic-com-c6ea672a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14550%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=69820d79f9fa50a62fcd6037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1312-cwe-89-improper-neutralization-of-sp-c1fc6281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1312%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd604f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1287-cwe-89-improper-neutralization-of-sp-15ffb705</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1287%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1285-cwe-407-inefficient-algorithmic-comp-78e15559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1285%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=69820d79f9fa50a62fcd6045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1207-cwe-89-improper-neutralization-of-sp-15490eb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1207%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd6040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13473-cwe-208-observable-timing-discrepan-e5c863de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13473%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20djangoproject%20Django&amp;severity=medium&amp;id=69820d79f9fa50a62fcd6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5319-cwe-89-improper-neutralization-of-sp-0c35b7ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5319%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Emit%20Informatics%20and%20Communication%20Technologies%20Industry%20and%20Trade%20Ltd.%20Co.%20DIGITA%20Efficiency%20Management%20System&amp;severity=critical&amp;id=69820d79f9fa50a62fcd603d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25036-missing-authorization-in-wp-chill-p-512b99ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25036%3A%20Missing%20Authorization%20in%20WP%20Chill%20Passster&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25028-missing-authorization-in-element-in-fd98d27d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25028%3A%20Missing%20Authorization%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25027-improper-control-of-filename-for-in-a2342b8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25027%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Unicamp&amp;severity=high&amp;id=6982067bf9fa50a62fcb3e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25024-cross-site-request-forgery-csrf-in--662ab1b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25024%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blair%20Williams%20ThirstyAffiliates&amp;severity=medium&amp;id=6982067bf9fa50a62fcb3e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25023-exposure-of-sensitive-system-inform-b59e83cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25023%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20mdedev%20Run%20Contests%2C%20Raffles%2C%20and%20Giveaways%20with%20ContestsWP&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25022-improper-neutralization-of-special--995c316d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25022%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=high&amp;id=6982067af9fa50a62fcb3e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25021-missing-authorization-in-mizan-them-c1fd0679</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25021%3A%20Missing%20Authorization%20in%20Mizan%20Themes%20Mizan%20Demo%20Importer&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25020-missing-authorization-in-wp-connect-c410c418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25020%3A%20Missing%20Authorization%20in%20WP%20connect%20WP%20Sync%20for%20Notion&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25019-missing-authorization-in-vito-peleg-ce990a25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25019%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25016-missing-authorization-in-nelio-soft-0ffdca0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25016%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20Popups&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25015-cross-site-request-forgery-csrf-in--3d88aeb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25015%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25014-cross-site-request-forgery-csrf-in--f77d18d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelooks%20Enter%20Addons&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25012-missing-authorization-in-gfazioli-w-0f8cb5ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25012%3A%20Missing%20Authorization%20in%20gfazioli%20WP%20Bannerize%20Pro&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25011-missing-authorization-in-northern-b-1511f03a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25011%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=medium&amp;id=6982067af9fa50a62fcb3e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25010-missing-authorization-in-illid-shar-d200709f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25010%3A%20Missing%20Authorization%20in%20ILLID%20Share%20This%20Image&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24998-exposure-of-sensitive-system-inform-46d6c32d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24998%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Hustle&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24997-missing-authorization-in-wired-impa-3e744f48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24997%3A%20Missing%20Authorization%20in%20Wired%20Impact%20Wired%20Impact%20Volunteer%20Management&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24996-missing-authorization-in-wpelemento-f93a2d5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24996%3A%20Missing%20Authorization%20in%20wpelemento%20WPElemento%20Importer&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24995-missing-authorization-in-iulia-caza-92683b75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24995%3A%20Missing%20Authorization%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24994-missing-authorization-in-sunshineph-e2ea7299</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24994%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24992-insertion-of-sensitive-information--d82a0356</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24992%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24991-authorization-bypass-through-user-c-9d633bbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24991%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20HT%20Plugins%20Extensions%20For%20CF7&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24990-missing-authorization-in-fahad-mahm-8cfb29bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24990%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24988-improper-neutralization-of-input-du-e8fa762f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Hogg%20The%20Events%20Calendar%20Shortcode%20%26amp%3B%20Block&amp;severity=medium&amp;id=69820678f9fa50a62fcb3e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24986-cross-site-request-forgery-csrf-in--84152fb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp.insider%20Simple%20Membership%20WP%20user%20Import&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24985-missing-authorization-in-approveme--8aba0016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24985%3A%20Missing%20Authorization%20in%20approveme%20WP%20Forms%20Signature%20Contract%20Add-On&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24984-missing-authorization-in-brecht-vis-382f1ebe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24984%3A%20Missing%20Authorization%20in%20Brecht%20Visual%20Link%20Preview&amp;severity=medium&amp;id=69820676f9fa50a62fcb3da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24982-missing-authorization-in-brainstorm-42864172</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24982%3A%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24967-missing-authorization-in-ameliabook-5a1ef234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24967%3A%20Missing%20Authorization%20in%20ameliabooking%20Amelia&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24966-cross-site-request-forgery-csrf-in--39ade7d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Copyscape%20Copyscape%20Premium&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24965-missing-authorization-in-wasiliy-st-6a139262</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24965%3A%20Missing%20Authorization%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24962-cross-site-request-forgery-csrf-in--9d30c429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24962%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brainstorm%20Force%20Sigmize&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24961-server-side-request-forgery-ssrf-in-ae5b2f1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24961%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20Grand%20Blog&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24958-improper-neutralization-of-input-du-1ac57776</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24958%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=69820676f9fa50a62fcb3d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24957-missing-authorization-in-wp-chill-s-42a6953e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24957%3A%20Missing%20Authorization%20in%20WP%20Chill%20Strong%20Testimonials&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24954-deserialization-of-untrusted-data-i-95f5726a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24954%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=high&amp;id=69820673f9fa50a62fcb3ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24952-improper-neutralization-of-input-du-06452c9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24951-missing-authorization-in-saad-iqbal-fabde56a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24951%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=medium&amp;id=69820673f9fa50a62fcb3ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24947-missing-authorization-in-la-studio--1a892bc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24947%3A%20Missing%20Authorization%20in%20LA-Studio%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24945-missing-authorization-in-themefic-u-6adb953d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24945%3A%20Missing%20Authorization%20in%20Themefic%20Ultimate%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24942-cross-site-request-forgery-csrf-in--cb2e92f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24942%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24940-missing-authorization-in-themefic-t-67568d6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24940%3A%20Missing%20Authorization%20in%20Themefic%20Travelfic%20Toolkit&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24939-missing-authorization-in-wp-chill-m-2d51a39c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24939%3A%20Missing%20Authorization%20in%20WP%20Chill%20Modula%20Image%20Gallery&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24938-improper-neutralization-of-input-du-b2113b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Better%20Search&amp;severity=medium&amp;id=69820673f9fa50a62fcb3cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-metro4shell-rce-flaw-in-react-nati-583d977e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Metro4Shell%20RCE%20Flaw%20in%20React%20Native%20CLI%20npm%20Package&amp;severity=critical&amp;id=6983125df9fa50a62f7d2aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-vulnerability-exploited-in-t-c5f4341d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=698202baf9fa50a62fca56c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allows-hackers-to-hijack-openclaw-ai-20ce9799</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allows%20Hackers%20to%20Hijack%20OpenClaw%20AI%20Assistant&amp;severity=critical&amp;id=6981ff36f9fa50a62fc98e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-and-monitoring-openclaw-clawdbot-moltbot-0a61ac8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20and%20Monitoring%20OpenClaw%20(clawdbot%2C%20moltbot)%2C%20(Tue%2C%20Feb%203rd)&amp;severity=medium&amp;id=69831349f9fa50a62f7d42bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7760-cwe-79-improper-neutralization-of-in-a9105f8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ofisimo%20Web-Based%20Software%20Technologies%20Association%20Web%20Package%20Flora&amp;severity=high&amp;id=6981edd5f9fa50a62fc5ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-51-million-panera-bread-records-da8bcba7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%205.1%20Million%20Panera%20Bread%20Records&amp;severity=medium&amp;id=6981ea1ef9fa50a62fc4166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6397-cwe-79-improper-neutralization-of-in-2087d065</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ankara%20Hosting%20Website%20Design%20Website%20Software&amp;severity=high&amp;id=6981ea60f9fa50a62fc43b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-supply-chain-attack-breakdown-c81f1b9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20supply%20chain%20attack%20breakdown&amp;severity=medium&amp;id=69821f0cf9fa50a62fd06c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1664-cwe-639-authorization-bypass-through-8a0cc424</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1664%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=6981e349f9fa50a62fc25650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11598-cwe-359-exposure-of-private-persona-dfd2833c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11598%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Centralny%20O%C5%9Brodek%20Informatyki%20mObywatel&amp;severity=low&amp;id=6981dfc7f9fa50a62fc15520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-apt28-rapidly-weaponizes-newly-patched-off-9d7af1f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20APT28%20Rapidly%20Weaponizes%20Newly%20Patched%20Office%20Vulnerability&amp;severity=medium&amp;id=6981dc0ef9fa50a62fc009a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1432-cwe-89-improper-neutralization-of-sp-cf0635ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1432%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20T-Systems%20Buroweb&amp;severity=critical&amp;id=6981dc51f9fa50a62fc0247c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-cloud-outages-ripple-across-the-internet-e209c4c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Cloud%20Outages%20Ripple%20Across%20the%20Internet&amp;severity=high&amp;id=6983125df9fa50a62f7d2aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67857-insertion-of-sensitive-information--6a15e9ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67857%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67856-179fb517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67856&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67855-improper-neutralization-of-input-du-e3a836cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=69821b8cf9fa50a62fcf9c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67853-improper-restriction-of-excessive-a-53304999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67853%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=69821b8cf9fa50a62fcf9c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67852-url-redirection-to-untrusted-site-o-bace6e1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67852%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=low&amp;id=69821b8cf9fa50a62fcf9c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67851-improper-neutralization-of-formula--d13a40ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67851%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File&amp;severity=medium&amp;id=6982fcd9f9fa50a62f767693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67850-improper-neutralization-of-input-du-8bb2e59b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67849-improper-neutralization-of-input-du-f0e4d716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67848-improper-handling-of-insufficient-p-11d090d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67848%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&amp;severity=high&amp;id=6982d5def9fa50a62f6a7ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59902-cwe-79-improper-neutralization-of-i-cb794028</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NICE%20NICE%20Chat&amp;severity=high&amp;id=69823426f9fa50a62fd6b737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41065-cwe-79-improper-neutralization-of-i-1f0804d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Luna%20Imaging%20LUNA&amp;severity=medium&amp;id=69823426f9fa50a62fd6b734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-uses-microsoft-office-cve-2026-21509-in-espi-a350f095</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Uses%20Microsoft%20Office%20CVE-2026-21509%20in%20Espionage-Focused%20Malware%20Attacks&amp;severity=medium&amp;id=6983125df9fa50a62f7d2aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8461-cwe-79-improper-neutralization-of-in-91f90918</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Seres%20Software%20syWEB&amp;severity=high&amp;id=6981b919f9fa50a62fb2b79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8456-cwe-79-improper-neutralization-of-in-882d06a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kod8%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Kod8%20Individual%20and%20SME%20Website&amp;severity=high&amp;id=6981b595f9fa50a62fb1f690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-chrysalis-backdoor-a-deep-dive-into-lotus-blos-7bbdc6d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Chrysalis%20Backdoor%3A%20A%20Deep%20Dive%20into%20Lotus%20Blossom&apos;s%20toolkit&amp;severity=medium&amp;id=6981b210f9fa50a62fafd65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1592-cwe-79-improper-neutralization-of-in-a6128ea3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1592%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1591-cwe-79-improper-neutralization-of-in-b893cd0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1730-cwe-434-unrestricted-upload-of-file--cbb4a663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1730%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20skirridsystems%20OS%20DataHub%20Maps&amp;severity=high&amp;id=6981ab4df9fa50a62fae40d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1371-cwe-200-exposure-of-sensitive-inform-a38ab61b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1371%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1375-cwe-639-authorization-bypass-through-29a9cae7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1375%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=6981ab4df9fa50a62fae40ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8590-cwe-200-exposure-of-sensitive-inform-5729c7a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8590%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6981a400f9fa50a62facb80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8589-cwe-79-improper-neutralization-of-in-2493d852</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6981a400f9fa50a62facb80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24465-stack-based-buffer-overflow-in-elec-35d69429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24465%3A%20Stack-based%20buffer%20overflow%20in%20ELECOM%20CO.%2CLTD.%20WAB-S733IW2-PD&amp;severity=critical&amp;id=6981a07df9fa50a62fabfc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24449-use-of-weak-credentials-in-elecom-c-6195e038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24449%3A%20Use%20of%20weak%20credentials%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=medium&amp;id=6981a07df9fa50a62fabfc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22550-improper-neutralization-of-special--77e831ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22550%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=high&amp;id=6981a07df9fa50a62fabfc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20704-cross-site-request-forgery-csrf-in--688ce2f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20704%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X1500GS-B&amp;severity=medium&amp;id=6981a07df9fa50a62fabfc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1447-cwe-352-cross-site-request-forgery-c-d6ed4597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1447%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Newsletters%2C%20Email%20Marketing%2C%20Automation%2C%20WooCommerce%20Emails%2C%20Post%20Notification%2C%20and%20more&amp;severity=medium&amp;id=69819975f9fa50a62faa53cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1058-cwe-79-improper-neutralization-of-in-f5ac77e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69819975f9fa50a62faa53b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1210-cwe-79-improper-neutralization-of-in-9ebaaad9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1210%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69819975f9fa50a62faa53c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1065-cwe-434-unrestricted-upload-of-file--c9fe553b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=69819975f9fa50a62faa53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0617-cwe-79-improper-neutralization-of-in-d5e79671</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=69819975f9fa50a62faa53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58381-cwe-35-path-traversal-in-brocade-fa-ff5304b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58381%3A%20CWE-35%3A%20Path%20Traversal%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69818ee8f9fa50a62fa7da8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mozilla-adds-one-click-option-to-disable-generativ-e233d72a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mozilla%20Adds%20One-Click%20Option%20to%20Disable%20Generative%20AI%20Features%20in%20Firefox&amp;severity=low&amp;id=6981b662f9fa50a62fb2320f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0950-cwe-200-exposure-of-sensitive-inform-f3102e6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0950%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=69818b64f9fa50a62fa73b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14274-cwe-79-improper-neutralization-of-i-cddbffa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=69818b64f9fa50a62fa73b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24694-uncontrolled-search-path-element-in-bab4bf19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24694%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Roland%20Corporation%20Roland%20Cloud%20Manager&amp;severity=high&amp;id=69818b64f9fa50a62fa73b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9711-cwe-272-least-privilege-violation-in-26a33153</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9711%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69818b64f9fa50a62fa73b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58380-cwe-35-path-traversal-in-brocade-fa-1d7784fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58380%3A%20CWE-35%3A%20Path%20Traversal%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69818461f9fa50a62fa607ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-hosting-breach-attributed-to-china-linked--30b9c561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Hosting%20Breach%20Attributed%20to%20China-Linked%20Lotus%20Blossom%20Hacking%20Group&amp;severity=medium&amp;id=698180a3f9fa50a62fa53d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0383-cwe-78-improper-neutralization-of-sp-58f3f0d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0383%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=6981764df9fa50a62fa17c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24936-cwe-20-improper-input-validation-in-17d71855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24936%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ASUSTOR%20ADM&amp;severity=critical&amp;id=6981764df9fa50a62fa17c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0909-cwe-639-authorization-bypass-through-55ffa7bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0909%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20alimir%20WP%20ULike%20%E2%80%93%20Engagement%20Analytics%20%26%20Interactive%20Buttons%20to%20Understand%20Your%20Audience&amp;severity=medium&amp;id=6981764df9fa50a62fa17c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1788-cwe-787-out-of-bounds-write-in-xquic-eb13681d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1788%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Xquic%20Project%20Xquic%20Server&amp;severity=medium&amp;id=6981764df9fa50a62fa17c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24935-cwe-295-improper-certificate-valida-8db5c61e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24935%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24934-cwe-295-improper-certificate-valida-c90c42dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24934%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6981ab4df9fa50a62fae40e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24933-cwe-295-improper-certificate-valida-0f223701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24933%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=6981ab4df9fa50a62fae40df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24932-cwe-295-improper-certificate-valida-51c30f9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24932%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=6981ab4df9fa50a62fae40dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58379-cwe-250-execution-with-unnecessary--4d6c9aa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58379%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=69815a2df9fa50a62f75462f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58383-cwe-250-execution-with-unnecessary--28045ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58383%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69815a2df9fa50a62f754635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58382-cwe-305-authentication-bypass-by-pr-2712b1cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58382%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=69815a2df9fa50a62f754632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67482-vulnerability-in-wikimedia-foundati-3ab1abb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67482%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20Scribunto&amp;severity=low&amp;id=69815a2df9fa50a62f75463a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12774-cwe-312-cleartext-storage-of-sensit-dc98f0cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12774%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=medium&amp;id=69815a2df9fa50a62f75462c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67476-vulnerability-in-wikimedia-foundati-af667c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67476%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69814fa1f9fa50a62f7207f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61658-vulnerability-in-wikimedia-foundati-893022c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61658%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814fa1f9fa50a62f7207ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61653-vulnerability-in-wikimedia-foundati-bd66ea7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61653%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20TextExtracts&amp;severity=low&amp;id=69814fa1f9fa50a62f7207e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61652-vulnerability-in-wikimedia-foundati-c77e99b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61652%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20DiscussionTools&amp;severity=low&amp;id=69814fa1f9fa50a62f7207e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12773-cwe-209-generation-of-error-message-9a8c085f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12773%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69814899f9fa50a62f6fcd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61649-vulnerability-in-wikimedia-foundati-6556cb0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61649%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814899f9fa50a62f6fcda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61650-cwe-79-improper-neutralization-of-i-c1f4561b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69814899f9fa50a62f6fcda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61646-vulnerability-in-wikimedia-foundati-d6a53ef1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61646%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69814899f9fa50a62f6fcd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61647-vulnerability-in-wikimedia-foundati-1352debf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61647%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20CheckUser&amp;severity=low&amp;id=69813e0cf9fa50a62f67cdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71179-na-4f02fb85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71179%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70849-na-14adde7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70849%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70841-na-87527d63</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70841%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd6f9fa50a62f766381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70758-na-edce0892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70758%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76637d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70560-na-a1557cbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70560%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f766379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70559-na-fa1d2f69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70559%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70311-na-719ec484</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70311%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd6f9fa50a62f766372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69983-na-b240ae98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69983%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76636f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69981-na-ed422e9a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69981%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd6f9fa50a62f76636c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69971-na-d9d772c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69971%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69970-na-40e3c75d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69970%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f76633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69875-na-cdb5ae5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69875%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd4f9fa50a62f766339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69848-na-f57d1d43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69848%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69431-na-b784a65c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69431%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69430-na-bb7b39df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69430%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f76632f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69429-na-f07f1dd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69429%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f76632c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67189-na-07340f67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67189%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd4f9fa50a62f766329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67188-na-9a3a25b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67188%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67187-na-ebbbc6cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67187%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd4f9fa50a62f766323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67186-na-edcd0909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67186%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f766303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65924-na-299b6040</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65924%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f766300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65923-na-b3f5ff7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65923%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f7662fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65875-na-e9002ae9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65875%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63624-na-b2497d1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63624%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f7662f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63372-na-a133bbc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63372%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd3f9fa50a62f7662f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61506-na-3f2c3321</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61506%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd3f9fa50a62f7662e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60865-na-98359347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60865%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59439-na-7a5713e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59439%3A%20n%2Fa&amp;severity=high&amp;id=6982fcd3f9fa50a62f7662e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58348-na-cbaee5db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58348%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58347-na-41b153f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58347%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58346-na-72d688ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58346%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58345-na-9fef52b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58345%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58344-na-4d2bb961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58344%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f7662a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58343-na-5ad7c576</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58343%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f76629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58342-na-807e1435</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58342%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f76629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58341-na-a2a814f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58341%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f766296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58340-na-889d6323</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58340%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd2f9fa50a62f766292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57529-na-01c7915e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57529%3A%20n%2Fa&amp;severity=critical&amp;id=6982fcd2f9fa50a62f76628e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46651-na-f768328f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46651%3A%20n%2Fa&amp;severity=medium&amp;id=6982fcd1f9fa50a62f76625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-03-a3d53514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-03&amp;severity=medium&amp;id=69828f56f9fa50a62fec0b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10878-cwe-89-improper-neutralization-of-s-0326dd4a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10878%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Insaat%20Fikir%20Odalari%20AdminPando&amp;severity=critical&amp;id=698253c8f9fa50a62fdcb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66374-na-bedcdb2a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66374%3A%20n%2Fa&amp;severity=high&amp;id=69823426f9fa50a62fd6b723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-03-8e5385fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-03&amp;severity=low&amp;id=69817d1ff9fa50a62fa3e532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61639-cwe-200-exposure-of-sensitive-infor-31a81168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61639%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813a88f9fa50a62f66a5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61641-vulnerability-in-wikimedia-foundati-cf54e7c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61641%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813705f9fa50a62f65ad9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61643-vulnerability-in-wikimedia-foundati-b0afc499</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61643%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813705f9fa50a62f65ada3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6589-vulnerability-in-wikimedia-foundatio-28598a3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6589%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6590-cwe-200-exposure-of-sensitive-inform-0472138d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6590%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=medium&amp;id=69813004f9fa50a62f63a36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25228-cwe-22-improper-limitation-of-a-pat-4868ed53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25228%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=69813006f9fa50a62f63a41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6592-vulnerability-in-wikimedia-foundatio-2087539a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6592%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20AbuseFilter&amp;severity=low&amp;id=69813004f9fa50a62f63a373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6593-vulnerability-in-wikimedia-foundatio-552c2908</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6593%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25222-cwe-200-exposure-of-sensitive-infor-acec093e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25222%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20polarnl%20PolarLearn&amp;severity=medium&amp;id=69813006f9fa50a62f63a418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25221-cwe-352-cross-site-request-forgery--8ef58480</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25221%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20polarnl%20PolarLearn&amp;severity=low&amp;id=69813006f9fa50a62f63a414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6927-vulnerability-in-wikimedia-foundatio-b66a1f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6927%3A%20Vulnerability%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=69813004f9fa50a62f63a381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25142-cwe-94-improper-control-of-generati-8791321b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25142%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=69813006f9fa50a62f63a40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25137-cwe-552-files-or-directories-access-cb236fdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25137%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20NixOS%20nixpkgs&amp;severity=critical&amp;id=69813006f9fa50a62f63a40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealers-without-borders-macos-python-stealers-07ae7015</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealers%20without%20borders%3A%20macOS%2C%20Python%20stealers%2C%20and%20platform%20abuse&amp;severity=medium&amp;id=6981d1b4f9fa50a62fb9d98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12772-cwe-312-cleartext-storage-of-sensit-a95ac02c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12772%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69813002f9fa50a62f63a03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25134-cwe-88-improper-neutralization-of-a-90955f28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25134%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Intermesh%20groupoffice&amp;severity=critical&amp;id=69813005f9fa50a62f63a3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25060-cwe-599-missing-validation-of-opens-937f34e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25060%3A%20CWE-599%3A%20Missing%20Validation%20of%20OpenSSL%20Certificate%20in%20OpenListTeam%20OpenList&amp;severity=high&amp;id=69813005f9fa50a62f63a3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25059-cwe-22-improper-limitation-of-a-pat-745d502d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25059%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenListTeam%20OpenList&amp;severity=high&amp;id=69813005f9fa50a62f63a3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36194-cwe-1262-improper-access-control-fo-96d3a201</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36194%3A%20CWE-1262%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=low&amp;id=69813002f9fa50a62f63a042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36238-cwe-497-exposure-of-sensitive-syste-79eaf296</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36238%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=69813002f9fa50a62f63a045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36253-cwe-759-use-of-a-one-way-hash-witho-8e816f27</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36253%3A%20CWE-759%20Use%20of%20a%20One-Way%20Hash%20without%20a%20Salt%20in%20IBM%20Concert&amp;severity=medium&amp;id=69813002f9fa50a62f63a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36436-cwe-79-improper-neutralization-of-i-fb05570e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=69813002f9fa50a62f63a04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12679-cwe-312-cleartext-storage-of-sensit-b2708941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12679%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Brocade%20SANnav&amp;severity=high&amp;id=69813002f9fa50a62f63a035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66480-cwe-22-improper-limitation-of-a-pat-f9b78ea6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66480%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wildfirechat%20im-server&amp;severity=critical&amp;id=69813002f9fa50a62f63a04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69207-cwe-639-authorization-bypass-throug-43fcd7bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69207%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20khoj-ai%20khoj&amp;severity=medium&amp;id=69813002f9fa50a62f63a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22778-cwe-532-insertion-of-sensitive-info-0fbec5f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22778%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=69813004f9fa50a62f63a39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13096-cwe-918-server-side-request-forgery-8fe02f54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13096%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=high&amp;id=69813002f9fa50a62f63a03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22780-cwe-770-allocation-of-resources-wit-d9804ba4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22780%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=69813004f9fa50a62f63a3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12680-cwe-256-plaintext-storage-of-a-pass-b8f3474b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12680%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Brocade%20SANnav&amp;severity=medium&amp;id=69813002f9fa50a62f63a039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23476-cwe-79-improper-neutralization-of-i-7acc7f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=medium&amp;id=69813004f9fa50a62f63a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23515-cwe-78-improper-neutralization-of-s-832cd743</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23515%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=69813004f9fa50a62f63a3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24040-cwe-362-concurrent-execution-using--4721980a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24040%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20parallax%20jsPDF&amp;severity=medium&amp;id=69813005f9fa50a62f63a3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24043-cwe-74-improper-neutralization-of-s-86f1965d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24043%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20parallax%20jsPDF&amp;severity=medium&amp;id=69813005f9fa50a62f63a3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24133-cwe-770-allocation-of-resources-wit-9a7fcc49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24133%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69813005f9fa50a62f63a3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24737-cwe-116-improper-encoding-or-escapi-a9824d9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24737%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20parallax%20jsPDF&amp;severity=high&amp;id=69813005f9fa50a62f63a3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23997-cwe-79-improper-neutralization-of-i-c1ff4e64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23997%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=high&amp;id=69813005f9fa50a62f63a3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0924-cwe-362-concurrent-execution-using-s-a2653c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0924%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Dr.Buho%20BuhoCleaner&amp;severity=high&amp;id=69813004f9fa50a62f63a392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1778-cwe-295-improper-certificate-validat-8c1863c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1778%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20AWS%20SageMaker%20Python%20SDK&amp;severity=medium&amp;id=69813004f9fa50a62f63a39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1777-cwe-319-cleartext-transmission-of-se-6c7a47ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1777%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20AWS%20SageMaker%20Python%20SDK&amp;severity=high&amp;id=69813004f9fa50a62f63a397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24007-cwe-352-cross-site-request-forgery--e9478fd3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24007%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69813005f9fa50a62f63a3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24051-cwe-426-untrusted-search-path-in-op-0b813398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24051%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20open-telemetry%20opentelemetry-go&amp;severity=high&amp;id=69813005f9fa50a62f63a3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-dropbox-phishing-campaign-via-pdf-and-cloud-s-ae7e8863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Dropbox%20Phishing%20Campaign%20via%20PDF%20and%20Cloud%20Storage&amp;severity=medium&amp;id=698105ccf9fa50a62f55d511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22229-cwe-78-improper-neutralization-of-s-4fa10250</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22229%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22227-cwe-78-improper-neutralization-of-s-69860cb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22226-cwe-78-improper-neutralization-of-s-104e12d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22226%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22225-cwe-78-improper-neutralization-of-s-29b4cdf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22224-cwe-78-improper-neutralization-of-s-bac7f152</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22224%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e9aef9fa50a62f4f49dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22223-cwe-78-improper-neutralization-of-s-dc5d7404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22223%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20System%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22222-cwe-78-improper-neutralization-of-s-176a439f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22222%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-341-malicious-clawhub-skills-stea-1b7d1ac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20341%20Malicious%20ClawHub%20Skills%20Stealing%20Data%20from%20OpenClaw%20Users&amp;severity=medium&amp;id=6981b662f9fa50a62fb23212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0631-cwe-78-improper-neutralization-of-sp-495e182f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0631%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0630-cwe-78-improper-neutralization-of-sp-9fdbb9a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0630%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22221-cwe-78-improper-neutralization-of-s-d9128518</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22221%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE230%20v1.2&amp;severity=high&amp;id=6980e629f9fa50a62f4dd607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-does-cyberthreat-attribution-help-in-practice-108625a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20does%20cyberthreat%20attribution%20help%20in%20practice%3F&amp;severity=medium&amp;id=6980e37ff9fa50a62f4d7d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openclaw-bug-enables-one-click-remote-code-executi-f29b9ca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenClaw%20Bug%20Enables%20One-Click%20Remote%20Code%20Execution%20via%20Malicious%20Link&amp;severity=critical&amp;id=6981b662f9fa50a62fb23215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1232-cwe-693-in-beyondtrust-privilege-man-412ace57</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1232%3A%20CWE-693%20in%20BeyondTrust%20Privilege%20management%20for%20Windows&amp;severity=medium&amp;id=6980d112f9fa50a62f4a9b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-begins-ntlm-phase-out-with-three-stage-p-db4e373f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Begins%20NTLM%20Phase-Out%20With%20Three-Stage%20Plan%20to%20Move%20Windows%20to%20Kerberos&amp;severity=low&amp;id=6981b662f9fa50a62fb23218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-branded-extortion-activity-expands-es-ad2675a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters-Branded%20Extortion%20Activity%20Expands%2C%20Escalates&amp;severity=medium&amp;id=6980c2cef9fa50a62f489931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47402-cwe-126-buffer-over-read-in-qualcom-3ec9d46f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47402%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c31af9fa50a62f48b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47399-cwe-120-buffer-copy-without-checkin-eb928ffb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47399%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47398-cwe-416-use-after-free-in-qualcomm--b317978c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47398%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47397-cwe-401-improper-release-of-memory--6e3d77ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47397%3A%20CWE-401%20Improper%20Release%20of%20Memory%20Before%20Removing%20Last%20Reference%20(&apos;Memory%20Leak&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47366-cwe-749-exposed-dangerous-method-or-e6e6d67e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47366%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47364-cwe-190-integer-overflow-or-wraparo-00adc77f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47364%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47363-cwe-190-integer-overflow-or-wraparo-d90611a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47363%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47359-cwe-416-use-after-free-in-qualcomm--247902eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47359%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47358-cwe-416-use-after-free-in-qualcomm--1f021da9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47358%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6980c319f9fa50a62f48b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14914-cwe-22-in-ibm-websphere-application-8b17a92a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14914%3A%20CWE-22%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=high&amp;id=6980c319f9fa50a62f48b5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-exposed-anthropic-models-mon-feb-2nd-311eb122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20exposed%20Anthropic%20Models%2C%20(Mon%2C%20Feb%202nd)&amp;severity=medium&amp;id=6980c2e6f9fa50a62f48a1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15395-cwe-863-incorrect-authorization-in--00702f39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15395%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=6980c319f9fa50a62f48b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1703-cwe-22-improper-limitation-of-a-path-cec10edf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1703%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Packaging%20Authority%20pip&amp;severity=low&amp;id=6980bf7df9fa50a62f481764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-publisher-account-hijacked-in-fresh-glass-4095a4bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Publisher%20Account%20Hijacked%20in%20Fresh%20GlassWorm%20Attack&amp;severity=medium&amp;id=6980b13af9fa50a62f450ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1760-inconsistent-interpretation-of-http--e8c3b5d3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1760%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6980b180f9fa50a62f4545f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1761-stack-based-buffer-overflow-in-red-h-5ed2e51a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1761%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=6980b180f9fa50a62f4545f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1186-cwe-22-improper-limitation-of-a-path-f73661f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1186%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABC%20PRO%20SP.%20Z%20O.O.%20EAP%20Legislator&amp;severity=high&amp;id=6980b180f9fa50a62f4545f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/default-ics-credentials-exploited-in-destructive-a-7fb05b57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Default%20ICS%20Credentials%20Exploited%20in%20Destructive%20Attack%20on%20Polish%20Energy%20Facilities&amp;severity=medium&amp;id=6980adb6f9fa50a62f443467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2nd-february-threat-intelligence-report-bd9882a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2nd%20February%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6980aa66f9fa50a62f4395c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24071-cwe-367-time-of-check-time-of-use-t-0e091344</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24071%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Native%20Instruments%20Native%20Access&amp;severity=high&amp;id=6980aa65f9fa50a62f439594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24070-cwe-426-untrusted-search-path-in-na-d3bf89df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24070%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Native%20Instruments%20Native%20Access&amp;severity=high&amp;id=6980aa65f9fa50a62f439591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8587-cwe-89-improper-neutralization-of-sp-f35da5ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8587%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AKCE%20Software%20Technology%20R%26D%20Industry%20and%20Trade%20Inc.%20SKSPro&amp;severity=high&amp;id=6980a35df9fa50a62f42094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1757-missing-release-of-memory-after-effe-a0b6fc76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1757%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=69809c55f9fa50a62f409541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-malware-and-cyberattacks-in-th-6a9c8fc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Malware%20and%20Cyberattacks%20in%20the%20Age%20of%20AI&amp;severity=medium&amp;id=6980951af9fa50a62f3e2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-proxy-botnet-office-zero-day-mongodb--1079d903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Proxy%20Botnet%2C%20Office%20Zero-Day%2C%20MongoDB%20Ransoms%2C%20AI%20Hijacks%20%26%20New%20Threats&amp;severity=medium&amp;id=6981b662f9fa50a62fb2321b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-1400-mongodb-databases-ransacked-by-threat-ac-fefda5fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%201%2C400%20MongoDB%20Databases%20Ransacked%20by%20Threat%20Actor&amp;severity=medium&amp;id=69809196f9fa50a62f3c3e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-moves-closer-to-disabling-ntlm-52adee71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Moves%20Closer%20to%20Disabling%20NTLM&amp;severity=medium&amp;id=69808e12f9fa50a62f3b0342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-you-need-assistance-8f4fd974</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%2C%20You%20Need%20Assistance!&amp;severity=medium&amp;id=698083b8f9fa50a62f37054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0599-cwe-400-uncontrolled-resource-consum-d7b2482e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0599%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20huggingface%20huggingface%2Ftext-generation-inference&amp;severity=high&amp;id=698083b8f9fa50a62f37059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5986-cwe-73-external-control-of-file-name-d80fe82d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5986%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=698083b8f9fa50a62f37058f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7105-cwe-400-uncontrolled-resource-consum-c2e5f2b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7105%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=698083b8f9fa50a62f37059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2356-cwe-29-path-traversal-filename-in-pa-ce230c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2356%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=critical&amp;id=698083b8f9fa50a62f370582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5386-cwe-1125-excessive-attack-surface-in-58c2e960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5386%3A%20CWE-1125%20Excessive%20Attack%20Surface%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=698083b8f9fa50a62f37058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6208-cwe-400-uncontrolled-resource-consum-4339b4ed</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6208%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=698083b8f9fa50a62f370596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10279-cwe-379-creation-of-temporary-file--5f6c9a35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10279%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=698083b8f9fa50a62f370592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4147-cwe-1220-insufficient-granularity-of-fcdfdfa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4147%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=698083b8f9fa50a62f370586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1117-cwe-284-improper-access-control-in-p-16cd6feb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1117%3A%20CWE-284%20Improper%20Access%20Control%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=6980792cf9fa50a62f31f217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-supply-chain-hack-conducted-by-china-via-h-df9cd168</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Supply%20Chain%20Hack%20Conducted%20by%20China%20via%20Hosting%20Provider&amp;severity=medium&amp;id=69806e6ef9fa50a62f2d9060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54263-cwe-98-improper-control-of-filename-73d2c584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54263%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Talemy%20Spirit%20Framework&amp;severity=high&amp;id=69806eb0f9fa50a62f2dba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9974-vulnerability-in-nokia-nokia-ont-c7bc3643</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9974%3A%20Vulnerability%20in%20Nokia%20Nokia%20ONT&amp;severity=high&amp;id=69806b1df9fa50a62f2c3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-official-update-mechanism-hijacked-to-deli-9a7db83a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Official%20Update%20Mechanism%20Hijacked%20to%20Deliver%20Malware%20to%20Select%20Users&amp;severity=low&amp;id=6981b662f9fa50a62fb23221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20419-cwe-754-improper-check-for-unusual--c4e4a49c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20419%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20418-cwe-787-out-of-bounds-write-in-medi-dcb95681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20418%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=critical&amp;id=69806094f9fa50a62f0b3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20417-cwe-787-out-of-bounds-write-in-medi-0b0410a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20417%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20415-cwe-415-double-free-in-mediatek-inc-f332af50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20415%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20414-cwe-416-use-after-free-in-mediatek--55737f91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20414%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20413-cwe-1285-specified-index-position-o-cfb947da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20413%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20412-cwe-787-out-of-bounds-write-in-medi-45313a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20412%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806094f9fa50a62f0b3fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20411-cwe-416-use-after-free-in-mediatek--fb6d4f1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20411%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806094f9fa50a62f0b3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20410-cwe-787-out-of-bounds-write-in-medi-260a2dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20410%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20409-cwe-787-out-of-bounds-write-in-medi-59af0c46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20409%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806092f9fa50a62f0b3f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20408-cwe-122-heap-overflow-in-mediatek-i-46f3fc29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20408%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=69806092f9fa50a62f0b3f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20407-cwe-787-out-of-bounds-write-in-medi-9d5cd63b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20407%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=critical&amp;id=69806092f9fa50a62f0b3f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20406-cwe-770-allocation-of-resources-wit-23191c9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20406%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20405-cwe-617-reachable-assertion-in-medi-3e6421fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20405%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20404-cwe-787-out-of-bounds-write-in-medi-3283e24e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20404%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20403-cwe-787-out-of-bounds-write-in-medi-44e96189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20403%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20422-cwe-617-reachable-assertion-in-medi-aed96d0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20422%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806096f9fa50a62f0b42d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20421-cwe-125-out-of-bounds-read-in-media-218fedd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20421%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20402-cwe-787-out-of-bounds-write-in-medi-94eb6596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20402%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20401-cwe-617-reachable-assertion-in-medi-04e3483c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20401%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806092f9fa50a62f0b3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20420-cwe-125-out-of-bounds-read-in-media-9dd5d463</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20420%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=69806094f9fa50a62f0b3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1518-server-side-request-forgery-ssrf-in--5120fbd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1518%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=69805578ac06320222d0c0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22888-improper-handling-of-extra-values-i-9941aaa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22888%3A%20Improper%20handling%20of%20extra%20values%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22881-cross-site-scripting-xss-in-cybozu--95b0b9a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22881%3A%20Cross-site%20scripting%20(XSS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20711-cross-site-scripting-xss-in-cybozu--34a74228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20711%3A%20Cross-site%20scripting%20(XSS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20Garoon&amp;severity=medium&amp;id=69804768ac06320222c3bb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0658-cwe-352-cross-site-request-forgery-c-29eae45b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0658%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=698043e3ac06320222c1dd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15396-cwe-79-cross-site-scripting-xss-in--e274366b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15396%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Library%20Viewer&amp;severity=high&amp;id=698043e3ac06320222c1dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15030-cwe-269-improper-privilege-manageme-7c2c4cdd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15030%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20User%20Profile%20Builder&amp;severity=critical&amp;id=698043e3ac06320222c1dd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1530-improper-certificate-validation-in-r-a5c41860</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1530%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69803cdcac06320222bdf0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1531-improper-certificate-validation-in-r-c5c10b19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1531%3A%20Improper%20Certificate%20Validation%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.16%20for%20RHEL%208&amp;severity=high&amp;id=69803cdcac06320222bdf0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-antivirus-update-servers-compromised-to-deli-01e8d7c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20Antivirus%20Update%20Servers%20Compromised%20to%20Deliver%20Multi-Stage%20Malware&amp;severity=medium&amp;id=69806471f9fa50a62f14456f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13881-incorrect-privilege-assignment-in-r-46708347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13881%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69803cdcac06320222bdf09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1746-sql-injection-in-jeecgboot-a5a79fe7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1746%3A%20SQL%20Injection%20in%20JeecgBoot&amp;severity=medium&amp;id=69803cdcac06320222bdf0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-supply-chain-attack-used-compromised-dev--b944767e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Supply%20Chain%20Attack%20Used%20Compromised%20Dev%20Account%20to%20Spread%20GlassWorm&amp;severity=medium&amp;id=6980321bac06320222b73f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1745-cross-site-request-forgery-in-source-6d717d8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1745%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Medical%20Certificate%20Generator%20App&amp;severity=medium&amp;id=698035d4ac06320222b923c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25202-cwe-798-use-of-hard-coded-credentia-9417c5c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25202%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=69802ecbac06320222b5653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25201-cwe-434-unrestricted-upload-of-file-57fca6fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25201%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=69802ecbac06320222b56539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25200-cwe-434-unrestricted-upload-of-file-fb70b7e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25200%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=69802ecbac06320222b56536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24788-improper-neutralization-of-special--fdeb122d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24788%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RaspAP%20raspap-webgui&amp;severity=high&amp;id=69802ecbac06320222b56532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1744-cross-site-scripting-in-d-link-dsl-6-42a46ae0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1744%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-6641K&amp;severity=medium&amp;id=69802ecbac06320222b5652b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1743-authentication-bypass-by-capture-rep-a2f8a11f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1743%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20DJI%20Mavic%20Mini&amp;severity=low&amp;id=69802440ac06320222ae2d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1742-unrestricted-upload-in-efm-iptime-a8-6d1c4e7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1742%3A%20Unrestricted%20Upload%20in%20EFM%20ipTIME%20A8004T&amp;severity=medium&amp;id=69802440ac06320222ae2d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1741-backdoor-in-efm-iptime-a8004t-a6ce7be2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1741%3A%20Backdoor%20in%20EFM%20ipTIME%20A8004T&amp;severity=high&amp;id=698019b4ac063202228a700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1740-improper-authentication-in-efm-iptim-0c8f5671</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1740%3A%20Improper%20Authentication%20in%20EFM%20ipTIME%20A8004T&amp;severity=medium&amp;id=698019b4ac063202228a7009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1739-null-pointer-dereference-in-free5gc--ad89dabf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1739%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC%20pcf&amp;severity=medium&amp;id=69800820ac063202227a882f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13348-cwe-862-missing-authorization-in-as-a40e758c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13348%3A%20CWE-862%20Missing%20Authorization%20in%20ASUS%20ASUS%20Business%20Manager&amp;severity=high&amp;id=69800820ac063202227a8823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1738-reachable-assertion-in-open5gs-86c2590e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1738%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=69800820ac063202227a8826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1737-reachable-assertion-in-open5gs-19af8589</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1737%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=697ffd93ac0632022270663c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1736-reachable-assertion-in-open5gs-341c287c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1736%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=697ff68cac06320222673ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1735-command-injection-in-yealink-meeting-8f7075f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1735%3A%20Command%20Injection%20in%20Yealink%20MeetingBar%20A30&amp;severity=low&amp;id=697ff68cac06320222673aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-dir-825-revb-210-stack-buffer-overflow-dos-247968d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20DIR-825%20Rev.B%202.10%20-%20Stack%20Buffer%20Overflow%20(DoS)&amp;severity=medium&amp;id=6981b62cf9fa50a62fb22405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rpi-jukebox-rfid-280-stored-cross-site-scripting-x-778770e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RPi-Jukebox-RFID%202.8.0%20-%20Stored%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6981b62cf9fa50a62fb22400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piranha-cms-120-stored-xss-in-text-block-88916144</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piranha%20CMS%2012.0%20-%20Stored%20XSS%20in%20Text%20Block&amp;severity=medium&amp;id=6981b62cf9fa50a62fb223fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-02-6afab789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-02&amp;severity=medium&amp;id=69813dd7f9fa50a62f677cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70960-na-2fa73ca9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70960%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70959-na-28dbfa81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70959%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70958-na-79956a6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70958%3A%20n%2Fa&amp;severity=medium&amp;id=69813004f9fa50a62f63a389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-02-3a16fae5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-02&amp;severity=low&amp;id=6980605bf9fa50a62f0ad30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1734-missing-authorization-in-zhong-bang--4a1d3155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1734%3A%20Missing%20Authorization%20in%20Zhong%20Bang%20CRMEB&amp;severity=medium&amp;id=697fe4f8ac0632022254f721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1733-improper-authorization-in-zhong-bang-685c81aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1733%3A%20Improper%20Authorization%20in%20Zhong%20Bang%20CRMEB&amp;severity=medium&amp;id=697fddf0ac06320222500779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-02-01-f1820db8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-02-01&amp;severity=medium&amp;id=697febc9ac063202225bd9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-02-01-8f5478b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-02-01&amp;severity=low&amp;id=697f430aac06320222f64068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25069-cwe-22-improper-limitation-of-a-pat-afb23a8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25069%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SunFounder%20Pironman%20Dashboard%20(pm_dashboard)&amp;severity=critical&amp;id=697e96fbac063202225694f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-antivirus-delivers-malware-in-supply-chain-a-6bb6e275</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20Antivirus%20Delivers%20Malware%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=697e1bbdac063202223b0095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1165-cwe-352-cross-site-request-forgery-c-ca610645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1165%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Popup%20Box%20%E2%80%93%20Create%20Countdown%2C%20Coupon%2C%20Video%2C%20Contact%20Form%20Popups&amp;severity=medium&amp;id=697e1164ac0632022238f8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14554-cwe-79-improper-neutralization-of-i-b079b282</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hayyatapps%20Sell%20BTC%20%E2%80%93%20Cryptocurrency%20Selling%20%20Calculator&amp;severity=high&amp;id=697e06d8ac0632022235a598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-redkitten-cyber-campaign-targets-human-f0c3bff7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20RedKitten%20Cyber%20Campaign%20Targets%20Human%20Rights%20NGOs%20and%20Activists&amp;severity=medium&amp;id=697f10f7ac06320222d31afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-siem-42-update-whats-new-kaspersky-offic-0f27f3c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20SIEM%204.2%20update%20%E2%80%94%20what%E2%80%99s%20new%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697dd95fac06320222238741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-the-expansion-of-shinyhunters-branded-saa-7c8fee00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20the%20Expansion%20of%20ShinyHunters-Branded%20SaaS%20Data%20Theft&amp;severity=medium&amp;id=6980803af9fa50a62f356ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mandiant-finds-shinyhunters-style-vishing-attacks--65a0fc7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mandiant%20Finds%20ShinyHunters-Style%20Vishing%20Attacks%20Stealing%20MFA%20to%20Breach%20SaaS%20Platforms&amp;severity=medium&amp;id=697dc6a3ac063202221e55f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-polska-details-coordinated-cyber-attacks-on-3-c244f712</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT%20Polska%20Details%20Coordinated%20Cyber%20Attacks%20on%2030%2B%20Wind%20and%20Solar%20Farms&amp;severity=medium&amp;id=697dc6a3ac063202221e55f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1251-cwe-639-authorization-bypass-through-0dcb57e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1251%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=697da7ecac06320222134c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0683-cwe-89-improper-neutralization-of-sp-4338147b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0683%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=697d9d60ac06320222110317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15525-cwe-863-incorrect-authorization-in--2dc020d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15525%3A%20CWE-863%20Incorrect%20Authorization%20in%20dcooney%20Ajax%20Load%20More%20%E2%80%93%20Infinite%20Scroll%2C%20Load%20More%2C%20%26%20Lazy%20Load&amp;severity=medium&amp;id=697d8bcbac06320222f8a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1431-cwe-862-missing-authorization-in-wpd-11205345</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1431%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=697d8bcbac06320222f8a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15510-cwe-862-missing-authorization-in-we-8fab338d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15510%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=697d6520ac06320222aa2326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-31-45ad8107</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-31&amp;severity=medium&amp;id=697e9a49ac0632022257398d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-31-20d0a565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-31&amp;severity=low&amp;id=697d9622ac0632022204bcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25156-cwe-79-improper-neutralization-of-i-a714bd99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kohler%20hotcrp&amp;severity=high&amp;id=697d3064ac06320222828d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1705-cross-site-scripting-in-d-link-dsl-6-4909cbf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1705%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DSL-6641K&amp;severity=medium&amp;id=697d25daac063202227d3694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2668-cwe-789-in-ibm-db2-for-linux-unix-an-c8921221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2668%3A%20CWE-789%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36001-cwe-674-uncontrolled-recursion-in-i-7ddb6515</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36001%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d363d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36009-cwe-1108-in-ibm-db2-for-linux-unix--d1a2d36c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36009%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36070-cwe-770-allocation-of-resources-wit-d3601657</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36070%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36098-cwe-770-allocation-of-resources-wit-275ba750</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36098%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36123-cwe-770-allocation-of-resources-wit-ebc3dce8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36123%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36184-cwe-250-in-ibm-db2-for-linux-unix-a-befe28b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36184%3A%20CWE-250%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=697d25d9ac063202227d364c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36353-cwe-943-in-ibm-db2-for-linux-unix-a-f0aa8dc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36353%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d364f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36365-cwe-639-authorization-bypass-throug-2d42b29c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36365%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36366-cwe-943-in-ibm-db2-for-linux-unix-a-dbc5a3b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36366%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25d9ac063202227d3655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36384-cwe-428-unquoted-search-path-or-ele-6af37e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36384%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=697d25daac063202227d367f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36387-cwe-770-allocation-of-resources-wit-3f17f5c6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36387%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36407-cwe-1284-improper-validation-of-spe-f7c89e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36407%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36423-cwe-1284-improper-validation-of-spe-e52ba2f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36423%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36424-cwe-1284-improper-validation-of-spe-1333e0ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36424%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d368b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36427-cwe-1284-improper-validation-of-spe-0f0a6c97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36427%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36428-cwe-1284-improper-validation-of-spe-45e0fe3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36428%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d25daac063202227d3691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36442-cwe-943-in-ibm-db2-for-linux-unix-a-965a2472</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36442%3A%20CWE-943%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=697d2254ac063202227c9fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1723-cwe-78-improper-neutralization-of-sp-9c7384c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1723%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=697d1ed0ac063202227bbb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25141-cwe-94-improper-control-of-generati-0a817c27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25141%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=697d1444ac0632022278962a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25130-cwe-78-improper-neutralization-of-s-ca371bc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25130%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20aliasrobotics%20cai&amp;severity=critical&amp;id=697d1444ac06320222789625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25129-cwe-427-uncontrolled-search-path-el-fcd943ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25129%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20bobthecow%20psysh&amp;severity=medium&amp;id=697d1444ac06320222789620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24293-vulnerability-in-rails-activestorag-36ee0cdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24293%3A%20Vulnerability%20in%20Rails%20activestorage&amp;severity=critical&amp;id=697d1444ac0632022278961a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23835-cwe-73-external-control-of-file-nam-e94ac8c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23835%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=697d10c0ac0632022277c27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11175-cwe-917-improper-neutralization-of--002c9475</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11175%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20DiscussionTools%20Extension&amp;severity=high&amp;id=697d0634ac06320222741993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62349-cwe-287-improper-authentication-in--d6768a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62349%3A%20CWE-287%20Improper%20Authentication%20in%20Salt%20Project%20Salt&amp;severity=medium&amp;id=697d02b1ac06320222725d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62348-cwe-94-improper-control-of-generati-51d30aa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62348%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Salt%20Project%20Salt&amp;severity=high&amp;id=697d02b1ac06320222725d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dynowiper-update-technical-analysis-2476835f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DynoWiper%20update%3A%20Technical%20analysis&amp;severity=medium&amp;id=698083b8f9fa50a62f370564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9432-cwe-312-cleartext-storage-of-sensiti-9e16fdbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9432%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20OpenText%E2%84%A2%20Vertica&amp;severity=medium&amp;id=697cfba8ac063202226ddd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-presentations-abused-for-phishing-fri-jan-3-7cfca707</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Presentations%20Abused%20for%20Phishing%2C%20(Fri%2C%20Jan%2030th)&amp;severity=medium&amp;id=697cf0f5ac063202226b8f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-paid-for-being-jailed-googles-68m-se-d0cc372a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Paid%20for%20Being%20Jailed%2C%20Google%E2%80%99s%20%2468M%20Settlement%2C%20CISA%20Chief%E2%80%99s%20ChatGPT%20Leak&amp;severity=medium&amp;id=697cf0e9ac063202226b8b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1702-improper-authorization-in-sourcecode-116a5d0d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1702%3A%20Improper%20Authorization%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=697d09b8ac06320222751064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1701-sql-injection-in-itsourcecode-studen-121bdbc4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1701%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697d09b8ac0632022275105d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1700-cross-site-scripting-in-projectworld-0be90a39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1700%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=697ce690ac0632022267af13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1691-deserialization-in-bolo-solo-6c2c9678</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1691%3A%20Deserialization%20in%20bolo-solo&amp;severity=medium&amp;id=697ce690ac0632022267af0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1690-command-injection-in-tenda-hg10-5ca5522d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1690%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cdf88ac063202226562a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1689-command-injection-in-tenda-hg10-04c9932c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1689%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cdf88ac0632022265629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1688-sql-injection-in-itsourcecode-direct-dfed63ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1688%3A%20SQL%20Injection%20in%20itsourcecode%20Directory%20Management%20System&amp;severity=medium&amp;id=697cd880ac06320222633559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1687-command-injection-in-tenda-hg10-3cd4f732</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1687%3A%20Command%20Injection%20in%20Tenda%20HG10&amp;severity=medium&amp;id=697cd880ac06320222633551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4686-cwe-89-improper-neutralization-of-sp-05c599ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4686%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kodmatic%20Computer%20Software%20Tourism%20Construction%20Industry%20and%20Trade%20Ltd.%20Co.%20Online%20Exam%20and%20Assessment&amp;severity=high&amp;id=697cd880ac0632022263354e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25128-cwe-20-improper-input-validation-in-13ab9ba7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25128%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20NaturalIntelligence%20fast-xml-parser&amp;severity=high&amp;id=697ccdf4ac06320222611087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25050-cwe-202-exposure-of-sensitive-infor-c0c2d2a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25050%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20vendurehq%20vendure&amp;severity=low&amp;id=697ccdf4ac06320222611083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24855-cwe-79-improper-neutralization-of-i-0f522e38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=697ccdf4ac0632022261107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24854-cwe-89-improper-neutralization-of-s-82a5753b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24854%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=697ccdf4ac0632022261107a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7964-cwe-229-improper-handling-of-values--2d7ee87b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7964%3A%20CWE-229%3A%20Improper%20Handling%20of%20Values%20in%20silabs.com%20Silicon%20Labs%20Zigbee%20Stack&amp;severity=critical&amp;id=697ccdf4ac0632022261106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1686-buffer-overflow-in-totolink-a3600r-6b75badd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1686%3A%20Buffer%20Overflow%20in%20Totolink%20A3600R&amp;severity=high&amp;id=697ccdf4ac06320222611072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/175000-exposed-ollama-hosts-could-enable-llm-abuse-aa9f77fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=175%2C000%20Exposed%20Ollama%20Hosts%20Could%20Enable%20LLM%20Abuse&amp;severity=medium&amp;id=697cc335ac063202225d72b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1685-improper-restriction-of-excessive-au-2801b5e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1685%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=697cc6ebac063202225ecfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1684-denial-of-service-in-free5gc-smf-07a599ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1684%3A%20Denial%20of%20Service%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cc6ebac063202225ecfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4027-improper-input-validation-in-red-hat-9404e900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4027%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20OpenShift%20Serverless&amp;severity=high&amp;id=697cbfe4ac063202225ceb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6723-cwe-269-improper-privilege-managemen-d45e9479</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6723%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Progress%20Software%20Chef%20Inspec&amp;severity=medium&amp;id=697cca73ac0632022260359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1683-denial-of-service-in-free5gc-smf-82eef032</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1683%3A%20Denial%20of%20Service%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cca73ac063202226035a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1682-null-pointer-dereference-in-free5gc--80a0232e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1682%3A%20NULL%20Pointer%20Dereference%20in%20Free5GC%20SMF&amp;severity=medium&amp;id=697cca73ac0632022260359f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9226-cwe-79-improper-neutralization-of-in-fa582aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20OpManager&amp;severity=medium&amp;id=697db656ac06320222187bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-chrome-extensions-abusing-affi-4215055b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Chrome%20Extensions%20Abusing%20Affiliate%20Links%20and%20Stealing%20ChatGPT%20Access&amp;severity=medium&amp;id=697dc6a3ac063202221e55f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1498-cwe-90-improper-neutralization-of-sp-8f4f0959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1498%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=697cae50ac0632022258677c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-house-scraps-burdensome-software-security-ru-0e500003</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20House%20Scraps%20%E2%80%98Burdensome%E2%80%99%20Software%20Security%20Rules&amp;severity=medium&amp;id=697ca715ac063202225692a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13176-cwe-269-improper-privilege-manageme-c0837eb2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13176%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20Inspect%20Connector&amp;severity=high&amp;id=697ca3c3ac0632022255cb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-uat-8099-targets-iis-servers-in-asia--ef044fe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UAT-8099%20Targets%20IIS%20Servers%20in%20Asia%20with%20BadIIS%20SEO%20Malware&amp;severity=medium&amp;id=697dc6a3ac063202221e55fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badges-bytes-and-blackmail-23acc84e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Badges%2C%20Bytes%20and%20Blackmail&amp;severity=medium&amp;id=697dc6a3ac063202221e55fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26385-cwe-77-improper-neutralization-of-s-9f4d77f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26385%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Johnson%20Controls%20Metasys&amp;severity=critical&amp;id=697c9243ac063202224f3c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22626-vulnerability-in-hiksemi-hs-afs-s1h-47590381</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22626%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22625-vulnerability-in-hiksemi-hs-afs-s1h-e12a6df2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22625%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22624-vulnerability-in-hiksemi-hs-afs-s1h-5699d8a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22624%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=medium&amp;id=697c9243ac063202224f3c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22623-vulnerability-in-hiksemi-hs-afs-s1h-b5fb56f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22623%3A%20Vulnerability%20in%20HIKSEMI%20HS-AFS-S1H1&amp;severity=high&amp;id=697c9243ac063202224f3c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0709-vulnerability-in-hikvision-ds-3wap52-877503e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0709%3A%20Vulnerability%20in%20Hikvision%20DS-3WAP521-SI&amp;severity=high&amp;id=697c9243ac063202224f3c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hugging-face-abused-to-deploy-android-rat-76fcf33e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hugging%20Face%20Abused%20to%20Deploy%20Android%20RAT&amp;severity=medium&amp;id=697c91fdac063202224f2357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1699-cwe-829-inclusion-of-functionality-f-246dea02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1699%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Eclipse%20Foundation%20Eclipse%20Theia%20-%20Website&amp;severity=critical&amp;id=697c8420ac0632022249df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-malware-talks-back-3dc8f95d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Malware%20Talks%20Back&amp;severity=medium&amp;id=697ced97ac063202226a8793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-devices-bricked-following-russia-linked-intrus-0fae875c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Devices%20Bricked%20Following%20Russia-Linked%20Intrusion%20Into%20Polish%20Power%20Grid&amp;severity=low&amp;id=697c7ce5ac0632022246955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/labyrinth-chollima-evolves-into-three-adversaries-2399fbec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LABYRINTH%20CHOLLIMA%20Evolves%20into%20Three%20Adversaries&amp;severity=medium&amp;id=697c728bac06320222401ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-intelligence-dossier-toxicsnake-53941704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Intelligence%20Dossier%3A%20TOXICSNAKE&amp;severity=medium&amp;id=697c728bac06320222401f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21418-cwe-78-improper-neutralization-of-s-2211bd2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21418%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=697c728bac06320222401f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-patches-exploited-epmm-zero-days-efe15326</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Patches%20Exploited%20EPMM%20Zero-Days&amp;severity=critical&amp;id=697c6ed5ac063202223d125e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1395-cwe-209-generation-of-error-message--468f2ac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1395%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Codriapp%20Innovation%20and%20Software%20Technologies%20Inc.%20HeyGarson&amp;severity=high&amp;id=697c728bac06320222401f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22277-cwe-78-improper-neutralization-of-s-ff14e5a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22277%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20UnityVSA&amp;severity=high&amp;id=697c6f18ac063202223d45cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-iclickfix-a-widespread-framework-using-the-cl-e275cbd9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20IClickFix%3A%20a%20widespread%20framework%20using%20the%20ClickFix%20tactic&amp;severity=medium&amp;id=697c6f1cac063202223d4635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attack-on-stan-your-malware-my-c2-77f84c64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attack%20on%20*stan%3A%20Your%20malware%2C%20my%20C2&amp;severity=medium&amp;id=697c6f1cac063202223d45fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nfcshare-android-trojan-nfc-card-data-theft-via-ma-6441cd2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NFCShare%20Android%20Trojan%3A%20NFC%20card%20data%20theft%20via%20malicious%20APK&amp;severity=medium&amp;id=697c6f1cac063202223d45f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-google-engineer-convicted-for-stealing-2000-ai--970db7ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Google%20Engineer%20Convicted%20for%20Stealing%20AI%20Secrets%20for%20China%20Startup&amp;severity=medium&amp;id=697c85b0ac063202224aa3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25211-cwe-532-insertion-of-sensitive-info-150c55db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25211%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20llamastack%20Llama%20Stack&amp;severity=low&amp;id=697c5d74ac0632022237b59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartermail-fixes-critical-unauthenticated-rce-fla-63bd7cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterMail%20Fixes%20Critical%20Unauthenticated%20RCE%20Flaw%20with%20CVSS%209.3%20Score&amp;severity=critical&amp;id=697c85b0ac063202224aa3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25210-cwe-190-integer-overflow-or-wraparo-f81ed376</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25210%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20libexpat%20project%20libexpat&amp;severity=medium&amp;id=697c59efac0632022236acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0805-cwe-22-improper-limitation-of-a-path-6789e9fc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=697c4f63ac06320222326298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0963-cwe-22-improper-limitation-of-a-path-9ed6ccb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0963%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=697c4f63ac0632022232629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1680-cwe-250-execution-with-unnecessary-p-e9896a9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1680%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Edgemo%20(Danoffice%20IT)%20Local%20Admin%20Service&amp;severity=high&amp;id=697c4f63ac0632022232629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12899-access-of-resource-using-incompatib-1d2d3635</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12899%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=697c44d7ac063202222d2c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-ivanti-epmm-zero-day-rce-flaws-actively-exploi-16adf6db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Ivanti%20EPMM%20Zero-Day%20RCE%20Flaws%20Actively%20Exploited%2C%20Security%20Updates%20Released&amp;severity=critical&amp;id=697c3a16ac0632022228de5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24714-inclusion-of-undocumented-features--b6d65bd8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24714%3A%20Inclusion%20of%20undocumented%20features%20or%20chicken%20bits%20in%20NETGEAR%20NETGEAR%20products&amp;severity=high&amp;id=697c334dac0632022226c7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24729-cwe-434-unrestricted-upload-of-file-b0f77a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24729%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Internet%20Information%20Co.%2C%20Ltd%20DreamMaker&amp;severity=critical&amp;id=697c334dac0632022226c800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24728-cwe-306-missing-authentication-for--1a7f3b9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24728%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Internet%20Information%20Co.%2C%20Ltd%20DreamMaker&amp;severity=critical&amp;id=697c334dac0632022226c7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15322-incorrect-authorization-in-tanium-t-019634aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15322%3A%20Incorrect%20Authorization%20in%20Tanium%20Tanium%20Server&amp;severity=medium&amp;id=697bfe87ac06320222d12b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-30-11257a61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-30&amp;severity=medium&amp;id=697d48c9ac0632022288f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69662-na-8d33d632</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69662%3A%20n%2Fa&amp;severity=high&amp;id=697d02b1ac06320222725d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51958-na-dd246dd3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51958%3A%20n%2Fa&amp;severity=critical&amp;id=697cfba8ac063202226ddd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-30-15a00164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-30&amp;severity=low&amp;id=697c795eac06320222451188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1638-command-injection-in-tenda-ac21-9f7b3e79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1638%3A%20Command%20Injection%20in%20Tenda%20AC21&amp;severity=medium&amp;id=697bf078ac06320222c697bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1665-cwe-78-improper-neutralization-of-sp-c9578cde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1665%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nvm-sh%20nvm&amp;severity=medium&amp;id=697becf3ac06320222c55bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1637-stack-based-buffer-overflow-in-tenda-507f0cdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1637%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=697be268ac06320222c19d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25126-cwe-20-improper-input-validation-in-ba555a42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25126%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20polarnl%20PolarLearn&amp;severity=high&amp;id=697bdb5fac06320222be5e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1625-command-injection-in-d-link-dwr-m961-b510ef37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1625%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697bdb5fac06320222be5e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1624-command-injection-in-d-link-dwr-m961-80502f4b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1624%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697bdb5fac06320222be5e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25117-cwe-20-improper-input-validation-in-4c2f2c60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25117%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pwncollege%20dojo&amp;severity=high&amp;id=697bdb5fac06320222be5e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25063-cwe-78-improper-neutralization-of-s-1ebe5dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25063%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20gradle%20gradle-completion&amp;severity=high&amp;id=697bd7ddac06320222bd31b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-accelerated-campaign-targeting-iranian-protests-90b6a87f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-accelerated%20campaign%20targeting%20Iranian%20protests&amp;severity=medium&amp;id=697c67ffac063202223ad898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25061-cwe-787-out-of-bounds-write-in-sims-fbc0942c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25061%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20simsong%20tcpflow&amp;severity=medium&amp;id=697bd7ddac06320222bd31b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25047-cwe-1321-improperly-controlled-modi-c68dda6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25047%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sharpred%20deepHas&amp;severity=critical&amp;id=697bd7ddac06320222bd31af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25046-cwe-77-improper-neutralization-of-s-e10f5e1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25046%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20MoonshotAI%20kimi-agent-sdk&amp;severity=low&amp;id=697bd7ddac06320222bd31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1340-cwe-94-improper-control-of-generatio-d6bbfd70</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1340%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=697bd7ddac06320222bd31a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1281-cwe-94-improper-control-of-generatio-91dc6445</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1281%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=697bd7ddac06320222bd31a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24846-cwe-22-improper-limitation-of-a-pat-ea3770a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24846%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=697bd0d5ac06320222ba1d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24845-cwe-522-insufficiently-protected-cr-f3ac7216</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24845%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20chainguard-dev%20malcontent&amp;severity=medium&amp;id=697bd0d5ac06320222ba1d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/escan-confirms-update-server-breached-to-push-mali-385c9705</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=eScan%20confirms%20update%20server%20breached%20to%20push%20malicious%20update&amp;severity=medium&amp;id=697bcd4fac06320222b8f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1623-command-injection-in-totolink-a7000r-6c60c5f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1623%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697bc648ac06320222b6137b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15288-incorrect-authorization-in-tanium-i-9103c701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15288%3A%20Incorrect%20Authorization%20in%20Tanium%20Interact&amp;severity=low&amp;id=697bc2c4ac06320222b51cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24687-cwe-22-improper-limitation-of-a-pat-59fe3665</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24687%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20umbraco%20Umbraco.Forms.Issues&amp;severity=medium&amp;id=697bbf42ac06320222b3ea9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22806-cwe-863-incorrect-authorization-in--c3cae920</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22806%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20loft-sh%20loft&amp;severity=critical&amp;id=697bbf40ac06320222b3ea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15550-cross-site-request-forgery-csrf-in--c6e29524</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20birkir%20prime&amp;severity=medium&amp;id=697bbbbbac06320222b23d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25068-cwe-129-improper-validation-of-arra-73514c18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25068%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20ALSA%20Project%20alsa-lib&amp;severity=medium&amp;id=697bb4b4ac06320222af609b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1453-cwe-306-missing-authentication-for-c-752dbedd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1453%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20KiloView%20Encoder%20Series%20E1%20hardware%20Version%201.4&amp;severity=critical&amp;id=697bb130ac06320222ae6e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1610-hard-coded-credentials-in-tenda-ax12-87309e3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1610%3A%20Hard-coded%20Credentials%20in%20Tenda%20AX12%20Pro%20V2&amp;severity=critical&amp;id=697bb130ac06320222ae6e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1457-cwe-121-stack-based-buffer-overflow--4f098f83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Systems%20Inc.%20VIGI%20C485%20V1&amp;severity=high&amp;id=697bb130ac06320222ae6e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-175000-publicly-exposed-ollama-ai-b3130f16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20175%2C000%20Publicly%20Exposed%20Ollama%20AI%20Servers%20Across%20130%20Countries&amp;severity=medium&amp;id=697c85b0ac063202224aa3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1601-command-injection-in-totolink-a7000r-c97d1fb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1601%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697baa29ac06320222ac22ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15548-cwe-311-missing-encryption-of-sensi-a1c071fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15548%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15543-cwe-59-improper-link-resolution-bef-151b5ed0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15543%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aaceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15542-cwe-754-improper-check-for-unusual--328c43d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15542%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15541-cwe-59-improper-link-resolution-bef-b7ae23c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15541%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=medium&amp;id=697ba6a4ac06320222aacee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13399-cwe-331-insufficient-entropy-in-tp--7865447e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13399%3A%20CWE-331%20Insufficient%20Entropy%20in%20TP-Link%20Systems%20Inc.%20VX800v%20v1.0&amp;severity=high&amp;id=697ba6a4ac06320222aacee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1600-business-logic-errors-in-bdtask-bhoj-35f197f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1600%3A%20Business%20Logic%20Errors%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697ba321ac06320222a9c4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24780-cwe-863-incorrect-authorization-in--67a6b7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24780%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=697b9f9cac06320222a8a3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24414-cwe-276-incorrect-default-permissio-1f7f6c0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24414%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Icinga%20icinga-powershell-framework&amp;severity=medium&amp;id=697b9f9cac06320222a8a3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1599-business-logic-errors-in-bdtask-bhoj-ea10cc82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1599%3A%20Business%20Logic%20Errors%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697b9f9cac06320222a8a3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15545-cwe-20-improper-input-validation-in-4307789c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15545%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20RE605X&amp;severity=high&amp;id=697b9c18ac06320222a73330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24413-cwe-276-incorrect-default-permissio-dc8e15f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24413%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Icinga%20icinga2&amp;severity=medium&amp;id=697b9c18ac06320222a73335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-what-you-should-know-56f9e2c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20attack%3A%20what%20you%20should%20know&amp;severity=medium&amp;id=697c67ffac063202223ad88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23896-cwe-269-improper-privilege-manageme-897a8f60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23896%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20immich-app%20immich&amp;severity=high&amp;id=697b9895ac06320222a54d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1598-cross-site-scripting-in-bdtask-bhojo-286e36a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1598%3A%20Cross%20Site%20Scripting%20in%20Bdtask%20Bhojon%20All-In-One%20Restaurant%20Management%20System&amp;severity=medium&amp;id=697b9895ac06320222a54d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1597-improper-authorization-in-bdtask-sal-052f19c2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1597%3A%20Improper%20Authorization%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=697b8e08ac063202229e04a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62514-cwe-327-use-of-a-broken-or-risky-cr-5cae969a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62514%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Scille%20parsec-cloud&amp;severity=high&amp;id=697b837eac063202229a57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1596-command-injection-in-d-link-dwr-m961-f7f775e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1596%3A%20Command%20Injection%20in%20D-Link%20DWR-M961&amp;severity=medium&amp;id=697b837eac063202229a580f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1595-sql-injection-in-itsourcecode-societ-61a27535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1595%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b837eac063202229a57f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0936-cwe-532-insertion-of-sensitive-infor-1738d88d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0936%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20in%20B%26R%20Industrial%20Automation%20GmbH%20Process%20Visualization%20Interface%20(PVI)&amp;severity=medium&amp;id=697b837eac063202229a57f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13905-cwe-276-incorrect-default-permissio-708b23d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13905%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Process%20Expert&amp;severity=high&amp;id=697b7ff8ac06320222994737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llms-hijacked-monetized-in-operation-bizarre-bazaa-c5956bca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLMs%20Hijacked%2C%20Monetized%20in%20%E2%80%98Operation%20Bizarre%20Bazaar%E2%80%99&amp;severity=medium&amp;id=697b78bdac06320222955e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-vulnerabilities-could-lead-to-remote-code-exec-586624fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N8n%20Vulnerabilities%20Could%20Lead%20to%20Remote%20Code%20Execution&amp;severity=critical&amp;id=697b7539ac063202229444f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-ai-toys-can-actually-discuss-with-your-child--819790a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20AI%20toys%20can%20actually%20discuss%20with%20your%20child%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697b75b8ac063202229475d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7714-cwe-89-improper-neutralization-of-sp-b785585b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Global%20Interactive%20Design%20Media%20Software%20Inc.%20Content%20Management%20System%20(CMS)&amp;severity=high&amp;id=697b7905ac06320222957a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7713-cwe-79-improper-neutralization-of-in-72be5bbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Global%20Interactive%20Design%20Media%20Software%20Inc.%20Content%20Management%20System%20(CMS)&amp;severity=high&amp;id=697b71e7ac06320222933482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1594-sql-injection-in-itsourcecode-societ-c3b483c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1594%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b71e7ac0632022293348c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1593-sql-injection-in-itsourcecode-societ-7eadb9ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1593%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=697b71e7ac06320222933485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1590-sql-injection-in-itsourcecode-school-cb5d8e52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1590%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697b6e64ac06320222920567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1589-sql-injection-in-itsourcecode-school-50b312a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1589%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697b6e64ac06320222920560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7014-cwe-384-session-fixation-in-qr-menu--340f58dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7014%3A%20CWE-384%20Session%20Fixation%20in%20QR%20Menu%20Pro%20Smart%20Menu%20Systems%20Menu%20Panel&amp;severity=medium&amp;id=697b6ae0ac0632022290510d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7013-cwe-639-authorization-bypass-through-8eaa239c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7013%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20QR%20Menu%20Pro%20Smart%20Menu%20Systems%20Menu%20Panel&amp;severity=medium&amp;id=697b6ae0ac0632022290510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1616-cwe-22-improper-limitation-of-a-path-dae9ff9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1616%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20osim&amp;severity=high&amp;id=697b6ae0ac06320222905110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1588-path-traversal-in-jishenghua-jsherp-cfb05d2f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1588%3A%20Path%20Traversal%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697b63d8ac063202228d5104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-critical-web-help-desk-vulnerab-0e70963f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Critical%20Web%20Help%20Desk%20Vulnerabilities&amp;severity=critical&amp;id=697b6021ac063202228c37e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-new-rces-darknet-busts-kernel--b4c9bec2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20New%20RCEs%2C%20Darknet%20Busts%2C%20Kernel%20Bugs%20%26%2025%2B%20More%20Stories&amp;severity=medium&amp;id=697c85b0ac063202224aa3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-byob-c2-infrastructure-reveals-a-multi-sta-063c0ec2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20BYOB%20C2%20Infrastructure%20Reveals%20a%20Multi-Stage%20Malware%20Deployment&amp;severity=medium&amp;id=697b8a84ac063202229c76ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-uat-8099-new-persistence-mechanisms-and-9cd0fce3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20UAT-8099%3A%20New%20persistence%20mechanisms%20and%20regional%20focus&amp;severity=medium&amp;id=697b8a84ac063202229c76fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1587-denial-of-service-in-open5gs-0ae120df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1587%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697b7905ac06320222957a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1586-denial-of-service-in-open5gs-1697a513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1586%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697b7c74ac0632022298179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/survey-of-100-energy-systems-reveals-critical-ot-c-508ad055</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Survey%20of%20100%2B%20Energy%20Systems%20Reveals%20Critical%20OT%20Cybersecurity%20Gaps&amp;severity=critical&amp;id=697c85b0ac063202224aa3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7016-cwe-284-improper-access-control-in-a-fd171379</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7016%3A%20CWE-284%20Improper%20Access%20Control%20in%20Ak%C4%B1n%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Ltd.%20QR%20Menu&amp;severity=high&amp;id=697b4b3bac06320222857268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7015-cwe-384-session-fixation-in-akn-soft-9200086c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7015%3A%20CWE-384%20Session%20Fixation%20in%20Ak%C4%B1n%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Ltd.%20QR%20Menu&amp;severity=medium&amp;id=697b4b3bac0632022285726b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1469-cwe-79-improper-neutralization-of-in-3c9882ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20RLE%20NOVA%20PlanManager&amp;severity=medium&amp;id=697b4b3bac0632022285726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-ipidea-proxy-network-7bf945c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20IPIDEA%20Proxy%20Network&amp;severity=medium&amp;id=697b4401ac06320222821fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22764-cwe-287-improper-authentication-in--5bb23bd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22764%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20OpenManage%20Network%20Integration&amp;severity=medium&amp;id=697b40b1ac06320222813294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-fixes-four-critical-web-help-desk-flaws-f265e12e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Fixes%20Four%20Critical%20Web%20Help%20Desk%20Flaws%20With%20Unauthenticated%20RCE%20and%20Auth%20Bypass&amp;severity=critical&amp;id=697c85b0ac063202224aa3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23570-cwe-20-improper-input-validation-in-693c1180</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23570%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23569-cwe-125-out-of-bounds-read-in-teamv-be6eba33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23569%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b78b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23568-cwe-125-out-of-bounds-read-in-teamv-ed71544d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23568%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23567-cwe-122-heap-based-buffer-overflow--0d9eadca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23567%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23566-cwe-20-improper-input-validation-in-bb138666</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23565-cwe-476-null-pointer-dereference-in-10bd67de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23565%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23564-cwe-319-cleartext-transmission-of-s-cf89a13b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23564%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23571-cwe-20-improper-input-validation-in-357bc4a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23571%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23563-cwe-59-improper-link-resolution-bef-2c959c66</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23563%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=697b248fac0632022277b779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1188-cwe-131-incorrect-calculation-of-buf-a32db7fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1188%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Eclipse%20Foundation%20Eclipse%20OMR&amp;severity=medium&amp;id=697b1d87ac063202225ccb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/approaching-cyclone-vortex-werewolf-attacks-russia-5a696a5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Approaching%20Cyclone%3A%20Vortex%20Werewolf%20Attacks%20Russia&amp;severity=medium&amp;id=697b11634623b1157c786762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disrupts-ipidea-one-of-the-worlds-largest-r-d7810cdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Disrupts%20IPIDEA%20%E2%80%94%20One%20of%20the%20World%E2%80%99s%20Largest%20Residential%20Proxy%20Networks&amp;severity=medium&amp;id=697b2159ac063202227641f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14975-cwe-269-improper-privilege-manageme-8ffdf05d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14975%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Custom%20Login%20Page%20Customizer&amp;severity=high&amp;id=697afc494623b1157c712eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25067-cwe-706-use-of-incorrectly-resolved-28664543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25067%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20SmarterTools%20SmarterMail&amp;severity=medium&amp;id=697ae0284623b1157c685561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55704-hidden-functionality-in-brother-ind-c9945be2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55704%3A%20Hidden%20functionality%20in%20Brother%20Industries%2C%20Ltd.%20Multiple%20MFPs&amp;severity=medium&amp;id=697ad59c4623b1157c4a2d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53869-improper-certificate-validation-in--e8696625</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53869%3A%20Improper%20certificate%20validation%20in%20Brother%20Industries%2C%20Ltd.%20Multiple%20MFPs&amp;severity=low&amp;id=697ad59c4623b1157c4a2d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1552-sql-injection-in-semcms-a2e1db25</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1552%3A%20SQL%20Injection%20in%20SEMCMS&amp;severity=medium&amp;id=697aab6e4623b1157c0ab0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-29-d5d28356</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-29&amp;severity=medium&amp;id=697bf749ac06320222ca82b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63658-na-b482fdc9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63658%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63657-na-ed92a875</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63657%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63656-na-6a64da22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63656%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63655-na-acc11400</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63655%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63653-na-48a644e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63653%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63652-na-0702c782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63652%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63651-na-8211c044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63651%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63650-na-df986b68</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63650%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69604-na-1b7bb371</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69604%3A%20n%2Fa&amp;severity=high&amp;id=697bbf40ac06320222b3ea3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69929-na-96016b4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69929%3A%20n%2Fa&amp;severity=critical&amp;id=697bbbbbac06320222b23da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69516-na-f009c423</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69516%3A%20n%2Fa&amp;severity=high&amp;id=697bbbbbac06320222b23da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63649-na-ab41c60c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63649%3A%20n%2Fa&amp;severity=high&amp;id=697bbbbbac06320222b23d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69749-na-be0d3637</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69749%3A%20n%2Fa&amp;severity=medium&amp;id=697ba6a4ac06320222aacef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45160-na-fa9630c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45160%3A%20n%2Fa&amp;severity=medium&amp;id=697b9895ac06320222a54d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71011-na-ad816e7e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71011%3A%20n%2Fa&amp;severity=medium&amp;id=697b7c74ac0632022298179a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71009-na-80adfc9e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71009%3A%20n%2Fa&amp;severity=medium&amp;id=697b7905ac06320222957a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71008-na-f0d09f23</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71008%3A%20n%2Fa&amp;severity=medium&amp;id=697b7905ac06320222957a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-29-8945747f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-29&amp;severity=low&amp;id=697ace5f4623b1157c3a4d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15344-improper-neutralization-of-special--1f69625b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15344%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tanium%20Asset&amp;severity=medium&amp;id=697aa4644623b1157cff7f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1551-sql-injection-in-itsourcecode-school-9de4a5e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1551%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697aa0e04623b1157cfcbe4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1550-improper-authorization-in-phpgurukul-f47217ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1550%3A%20Improper%20Authorization%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=697a96554623b1157cf77812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1549-path-traversal-in-jishenghua-jsherp-ae219776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1549%3A%20Path%20Traversal%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697a96554623b1157cf7780a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1548-command-injection-in-totolink-a7000r-1e6db936</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1548%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697a92d04623b1157cf6c70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24897-cwe-22-improper-limitation-of-a-pat-fd98c0bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ErugoOSS%20Erugo&amp;severity=critical&amp;id=697a8f4c4623b1157cf569af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1547-command-injection-in-totolink-a7000r-d8463cd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1547%3A%20Command%20Injection%20in%20Totolink%20A7000R&amp;severity=medium&amp;id=697a889e4623b1157cf358f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1546-sql-injection-in-jishenghua-jsherp-1d61f7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1546%3A%20SQL%20Injection%20in%20jishenghua%20jshERP&amp;severity=medium&amp;id=697a889e4623b1157cf358ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24889-cwe-190-integer-overflow-or-wraparo-d5fa101f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24889%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20stellar%20rs-soroban-sdk&amp;severity=medium&amp;id=697a889e4623b1157cf358fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24888-cwe-1321-improperly-controlled-modi-dfb0b84f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24888%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20microsoft%20maker.js&amp;severity=medium&amp;id=697a84c24623b1157cf1f0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1545-sql-injection-in-itsourcecode-school-68c5fba1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1545%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=697a84c24623b1157cf1f0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1544-os-command-injection-in-d-link-dir-8-323bb0b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1544%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=697a84c24623b1157cf1f0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24857-cwe-122-heap-based-buffer-overflow--c87d825c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24857%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20simsong%20bulk_extractor&amp;severity=medium&amp;id=697a84c24623b1157cf1f0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24856-cwe-20-improper-input-validation-in-5ecbf86c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24856%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697a7db94623b1157cef795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1535-sql-injection-in-code-projects-onlin-e78824be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1535%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a7db94623b1157cef7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1534-sql-injection-in-code-projects-onlin-32e9c123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1534%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a7db94623b1157cef794d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1533-sql-injection-in-code-projects-onlin-3bb6d75d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1533%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=697a76b14623b1157cee2be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1532-path-traversal-in-d-link-dcs-700l-0d55b15e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1532%3A%20Path%20Traversal%20in%20D-Link%20DCS-700L&amp;severity=medium&amp;id=697a76b14623b1157cee2bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14840-cwe-754-improper-check-for-unusual--8644af37</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14840%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20HTTP%20Client%20Manager&amp;severity=high&amp;id=697a6c254623b1157cec1717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14472-cwe-352-cross-site-request-forgery--4da66927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14472%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Acquia%20Content%20Hub&amp;severity=high&amp;id=697a6c254623b1157cec1714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13986-cwe-288-authentication-bypass-using-7492dbc9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13986%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Disable%20Login%20Page&amp;severity=medium&amp;id=697a6c254623b1157cec1711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13985-cwe-863-incorrect-authorization-in--7b644f2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13985%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Entity%20Share&amp;severity=medium&amp;id=697a6c254623b1157cec170e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13984-cwe-942-permissive-cross-domain-sec-a4e51af9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13984%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Drupal%20Next.js&amp;severity=medium&amp;id=697a6c254623b1157cec170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13983-cwe-79-improper-neutralization-of-i-385bb760</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Tagify&amp;severity=medium&amp;id=697a6c254623b1157cec1708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13982-cwe-352-cross-site-request-forgery--b4e38f1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13982%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Login%20Time%20Restriction&amp;severity=high&amp;id=697a6c254623b1157cec1705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13981-cwe-79-improper-neutralization-of-i-bbccedf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=medium&amp;id=697a6c254623b1157cec1702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13980-cwe-288-authentication-bypass-using-fe270382</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13980%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20CKEditor%205%20Premium%20Features&amp;severity=medium&amp;id=697a6c254623b1157cec16ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13979-cwe-267-privilege-defined-with-unsa-58cfa0ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13979%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Mini%20site&amp;severity=medium&amp;id=697a6c254623b1157cec16fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46691-cwe-284-improper-access-control-in--ab84e367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46691%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20PremierColor&amp;severity=high&amp;id=697a68a44623b1157ceb14dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61728-cwe-407-inefficient-algorithmic-com-4fc7cb51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61728%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20archive%2Fzip&amp;severity=medium&amp;id=697a653b4623b1157cea4eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61726-cwe-400-uncontrolled-resource-consu-8c02c13f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61726%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Furl&amp;severity=high&amp;id=697a653b4623b1157cea4ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61730-cwe-940-improper-verification-of-so-76478fe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61730%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=medium&amp;id=697a653b4623b1157cea4ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61731-cwe-78-improper-neutralization-of-s-ea428bb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61731%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=697a653b4623b1157cea4ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68119-cwe-78-improper-neutralization-of-s-28a28e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68119%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=697a653b4623b1157cea4eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0750-cwe-347-improper-verification-of-cry-79d8acb9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0750%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Drupal%20Drupal%20Commerce%20Paybox&amp;severity=high&amp;id=697a5e9e4623b1157ce6c328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cant-stop-wont-stop-ta584-innovates-initial-access-ec2c0e48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can&apos;t%20stop%2C%20won&apos;t%20stop%3A%20TA584%20innovates%20initial%20access&amp;severity=medium&amp;id=697a7db84623b1157cef78f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24775-cwe-345-insufficient-verification-o-f4613c19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24775%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20opf%20openproject&amp;severity=medium&amp;id=697a538a4623b1157ce16565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24772-cwe-345-insufficient-verification-o-71f8ba4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24772%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20opf%20openproject&amp;severity=high&amp;id=697a538a4623b1157ce16562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33237-cwe-476-null-pointer-dereference-in-81893456</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33237%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=697a50074623b1157cdfcf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33220-cwe-416-use-after-free-in-nvidia-ge-0f018ead</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33220%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33219-cwe-190-integer-overflow-or-wraparo-527d0560</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33219%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57796-cwe-257storing-passwords-in-a-recov-d01accbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57796%3A%20CWE-257%3AStoring%20Passwords%20in%20a%20Recoverable%20Format%20in%20Explorance%20Blue&amp;severity=medium&amp;id=697a50074623b1157cdfcf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33218-cwe-190-integer-overflow-or-wraparo-0c7d2b02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33218%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33217-cwe-416-use-after-free-in-nvidia-ge-2236de6e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33217%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=697a50074623b1157cdfcf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-moltbot-ai-coding-assistant-on-vs-code-market-900aeb84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Moltbot%20AI%20Coding%20Assistant%20on%20VS%20Code%20Marketplace%20Drops%20Malware&amp;severity=medium&amp;id=697a711c4623b1157ced2a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57795-cwe-434-unrestricted-upload-of-file-e007868c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57795%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a50074623b1157cdfcf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57794-cwe-434-unrestricted-upload-of-file-b5057a24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57794%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a4c814623b1157cded9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57792-cwe-89-improper-neutralization-of-s-4004c8b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57792%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Explorance%20Blue&amp;severity=critical&amp;id=697a4c814623b1157cded9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46306-processing-a-maliciously-crafted-ke-9fb00563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46306%3A%20Processing%20a%20maliciously%20crafted%20Keynote%20file%20may%20disclose%20memory%20contents%20in%20Apple%20Keynote&amp;severity=medium&amp;id=697a4c814623b1157cded9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46316-processing-a-maliciously-crafted-pa-75d1e1d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46316%3A%20Processing%20a%20maliciously%20crafted%20Pages%20document%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20Pages&amp;severity=medium&amp;id=697a4c814623b1157cded9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/purerat-attacker-now-using-ai-to-build-toolset-2af757b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PureRAT%3A%20Attacker%20Now%20Using%20AI%20to%20Build%20Toolset&amp;severity=medium&amp;id=697a5a904623b1157ce3616d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57793-cwe-89-improper-neutralization-of-s-29361549</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Explorance%20Blue&amp;severity=high&amp;id=697a48fd4623b1157cdca040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-attacks-target-indian-government-using-sheetcr-100bc94d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Attacks%20Target%20Indian%20Government%20Using%20SHEETCREEP%2C%20FIREPOWER%2C%20and%20MAILCREEP&amp;severity=medium&amp;id=697a5de14623b1157ce5e519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24685-cwe-77-improper-neutralization-of-s-6f10201c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24685%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=critical&amp;id=697a41f64623b1157cda80d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13919-cwe-427-uncontrolled-search-path-el-c00ea7e0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13919%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Broadcom%20Symantec%20Endpoint%20Protection%20Windows%20Client&amp;severity=medium&amp;id=697a41f64623b1157cda80d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13918-cwe-269-improper-privilege-manageme-a03a536b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13918%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Broadcom%20Symantec%20Endpoint%20Protection%20Windows%20Client&amp;severity=medium&amp;id=697a41f64623b1157cda80d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1522-denial-of-service-in-open5gs-30d7b5a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1522%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697a3aee4623b1157cd881cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13917-cwe-269-improper-privilege-manageme-a27c792c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13917%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Broadcom%20Symantec%20Web%20Security%20Services%20Agent&amp;severity=high&amp;id=697a3aee4623b1157cd881be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-electrum-tied-to-december-2025-cyber-attac-0499845a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Aligned%20ELECTRUM%20Tied%20to%20December%202025%20Cyber%20Attack%20on%20Polish%20Power%20Grid&amp;severity=medium&amp;id=697a711c4623b1157ced2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odd-weblogic-request-possible-cve-2026-21962-explo-a209ffae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%26%23x3f%3B%2C%20(Wed%2C%20Jan%2028th)&amp;severity=low&amp;id=697a33b14623b1157cd612e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1539-insertion-of-sensitive-information-i-46f2f66f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1539%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=697a295b4623b1157cd23357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1536-improper-neutralization-of-crlf-sequ-c6e4953a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1536%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=697a295b4623b1157cd23353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1237-cwe-672-operation-on-a-resource-afte-35d95eae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1237%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Canonical%20juju&amp;severity=low&amp;id=697a25d84623b1157ccf7646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1521-denial-of-service-in-open5gs-17317464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1521%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=697a37694623b1157cd7577e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1520-cross-site-scripting-in-rethinkdb-925878bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1520%3A%20Cross%20Site%20Scripting%20in%20rethinkdb&amp;severity=medium&amp;id=697a3aee4623b1157cd881d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1060-cwe-200-exposure-of-sensitive-inform-d6fb7916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1060%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20litonice13%20WP%20Adminify%20%E2%80%93%20White%20Label%20WordPress%2C%20Admin%20Menu%20Editor%2C%20Login%20Customizer&amp;severity=medium&amp;id=697a1ed44623b1157cc754bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-we-cant-let-ai-take-the-wheel-of-cyber-defense-18cbaba2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20We%20Can%E2%80%99t%20Let%20AI%20Take%20the%20Wheel%20of%20Cyber%20Defense&amp;severity=medium&amp;id=697a17914623b1157cc3cd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14795-cwe-352-cross-site-request-forgery--dc5464ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14795%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webguyio%20Stop%20Spammers%20Classic&amp;severity=medium&amp;id=697a10bc4623b1157cc06b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-high-severity-n8n-flaws-allow-authenticated-re-04eb96b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20High-Severity%20n8n%20Flaws%20Allow%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=697a711c4623b1157ced2a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14865-cwe-79-improper-neutralization-of-i-d417b336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=697a06304623b1157cbbccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1056-cwe-22-improper-limitation-of-a-path-76433a03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1056%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20inc2734%20Snow%20Monkey%20Forms&amp;severity=critical&amp;id=697a06304623b1157cbbcce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59901-cwe-352-cross-site-request-forgery--5415921e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59901%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59900-cwe-79-improper-neutralization-of-i-f2c65362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59899-cwe-79-improper-neutralization-of-i-0aeadfaf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59898-cwe-79-improper-neutralization-of-i-c76427bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59897-cwe-79-improper-neutralization-of-i-6d38f5f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59896-cwe-79-improper-neutralization-of-i-fb73c322</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=medium&amp;id=6979fba54623b1157cb5f7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59895-cwe-20-improper-input-validation-in-472be37e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59895%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59894-cwe-352-cross-site-request-forgery--55c4fc53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59894%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba64623b1157cb5f7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59893-cwe-352-cross-site-request-forgery--6491e6fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59893%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59892-cwe-352-cross-site-request-forgery--d423eee7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59892%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59891-cwe-352-cross-site-request-forgery--6aa76c29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59891%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flexense%20Sync%20Breeze%20Enterprise%20Server&amp;severity=high&amp;id=6979fba54623b1157cb5f7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vm2-nodejs-flaw-allows-sandbox-escape-and-3cc420a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20vm2%20Node.js%20Flaw%20Allows%20Sandbox%20Escape%20and%20Arbitrary%20Code%20Execution&amp;severity=critical&amp;id=697a711c4623b1157ced2a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-deploys-updated-coolclient-backdoor--192b2556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Deploys%20Updated%20COOLCLIENT%20Backdoor%20in%20Government%20Cyber%20Attacks&amp;severity=medium&amp;id=697a711c4623b1157ced2a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26386-cwe-121-stack-based-buffer-overflow-8524005e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26386%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=high&amp;id=6979f49d4623b1157cb36511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1398-cwe-352-cross-site-request-forgery-c-b8b22e77</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1398%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chrisnowak%20Change%20WP%20URL&amp;severity=medium&amp;id=6979f49e4623b1157cb36555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1399-cwe-79-improper-neutralization-of-in-81723c42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miles99%20WP%20Google%20Ad%20Manager%20Plugin&amp;severity=medium&amp;id=6979f49e4623b1157cb3655c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14616-cwe-352-cross-site-request-forgery--1bc6a122</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20recooty%20Recooty%20%E2%80%93%20Job%20Widget%20(Old%20Dashboard)&amp;severity=medium&amp;id=6979f49d4623b1157cb3650a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1280-cwe-862-missing-authorization-in-nme-b59b0a88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1280%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%20Frontend%20File%20Manager%20Plugin&amp;severity=high&amp;id=6979f49d4623b1157cb3651a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14283-cwe-79-improper-neutralization-of-i-856e0c19</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=6979f49d4623b1157cb36500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14063-cwe-79-improper-neutralization-of-i-7e17c6bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seomantis%20SEO%20Links%20Interlinking&amp;severity=medium&amp;id=6979f49d4623b1157cb364f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0844-cwe-284-improper-access-control-in-n-aa2a6daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0844%3A%20CWE-284%20Improper%20Access%20Control%20in%20nmedia%20Simple%20User%20Registration&amp;severity=high&amp;id=6979f49d4623b1157cb36515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14386-cwe-862-missing-authorization-in-sh-3192e753</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14386%3A%20CWE-862%20Missing%20Authorization%20in%20shahrukhlinkgraph%20Search%20Atlas%20SEO%20%E2%80%93%20Premier%20SEO%20Plugin%20for%20One-Click%20WP%20Publishing%20%26%20Integrated%20AI%20Optimization&amp;severity=high&amp;id=6979f49d4623b1157cb36504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1380-cwe-352-cross-site-request-forgery-c-14e7b5f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1380%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lxicon%20Bitcoin%20Donate%20Button&amp;severity=medium&amp;id=6979f49d4623b1157cb36524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1391-cwe-79-improper-neutralization-of-in-51b44b00</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mamunreza%20Vzaar%20Media%20Management&amp;severity=medium&amp;id=6979f49d4623b1157cb36529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1377-cwe-352-cross-site-request-forgery-c-bce7e9f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hu_chao%20imwptip&amp;severity=medium&amp;id=6979f49d4623b1157cb3651f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41351-cwe-649-reliance-on-obfuscation-or--1369b5e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41351%3A%20CWE-649%3A%20Reliance%20on%20Obfuscation%20or%20Encryption%20of%20Security-Relevant%20Inputs%20without%20Integrity%20Checking%20in%20Funambol%20Cloud%20Server&amp;severity=medium&amp;id=6979ea104623b1157caf530c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-reuse-in-disguise-an-often-missed-risky-w-ed799261</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password%20Reuse%20in%20Disguise%3A%20An%20Often-Missed%20Risky%20Workaround&amp;severity=medium&amp;id=697a711c4623b1157ced2a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-boosts-account-security-for-at-risk-indiv-6d563928</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Boosts%20Account%20Security%20for%20At-Risk%20Individuals&amp;severity=low&amp;id=6979e2d64623b1157cad53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-of-active-exploitation-of-winrar-vuln-f6581a5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%20of%20Active%20Exploitation%20of%20WinRAR%20Vulnerability%20CVE-2025-8088&amp;severity=critical&amp;id=697a711c4623b1157ced2a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-python-spellchecker-packages-on-pypi-delivere-538aff52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Python%20Spellchecker%20Packages%20on%20PyPI%20Delivered%20Hidden%20Remote%20Access%20Trojan&amp;severity=medium&amp;id=697a711c4623b1157ced2a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-31-more-defendants-in-massive-atm-hacki-44b4b376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%2031%20More%20Defendants%20in%20Massive%20ATM%20Hacking%20Probe&amp;severity=medium&amp;id=6979d8494623b1157ca8ecb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apts-cybercriminals-widely-exploiting-winrar-vulne-20a116ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APTs%2C%20Cybercriminals%20Widely%20Exploiting%20WinRAR%20Vulnerability&amp;severity=medium&amp;id=6979d4c64623b1157ca7b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7740-cwe-1392-use-of-default-credentials--fa8357e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7740%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Energy%20SuprOS&amp;severity=high&amp;id=697a3aee4623b1157cd881d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1400-cwe-434-unrestricted-upload-of-file--efe63ebf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1400%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%20and%20AI%20Framework%20for%20WordPress&amp;severity=high&amp;id=6979cdf04623b1157ca477fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1053-cwe-79-improper-neutralization-of-in-55a02526</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vinod-dalvi%20Ivory%20Search%20%E2%80%93%20WordPress%20Search%20Plugin&amp;severity=medium&amp;id=6979cdf04623b1157ca477ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0702-cwe-89-improper-neutralization-of-sp-1e75cd74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0702%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpcreatix%20VidShop%20%E2%80%93%20Shoppable%20Videos%20for%20WooCommerce&amp;severity=high&amp;id=6979cdf04623b1157ca477e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1381-cwe-79-improper-neutralization-of-in-710963ee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1381%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20Order%20Minimum%2FMaximum%20Amount%20Limits%20for%20WooCommerce&amp;severity=medium&amp;id=6979cdf04623b1157ca477f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-exploited-forticloud-sso-authenti-2f826feb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Exploited%20FortiCloud%20SSO%20Authentication%20Bypass&amp;severity=low&amp;id=6979c6b54623b1157ca2192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0818-vulnerability-in-mozilla-thunderbird-c0309850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0818%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=6979bfee4623b1157c9f66d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40554-cwe-1390-weak-authentication-in-sol-4a053463</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40554%3A%20CWE-1390%20Weak%20Authentication%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-remote-code-execution-vulnerability--76b8cc58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Remote%20Code%20Execution%20Vulnerability%20Patched%20in%20OpenSSL&amp;severity=critical&amp;id=6979bfad4623b1157c9f4f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40553-cwe-502-deserialization-of-untruste-e3390f42</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40553%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40552-cwe-1390-weak-authentication-in-sol-becd1309</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40552%3A%20CWE-1390%20Weak%20Authentication%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40551-cwe-502-deserialization-of-untruste-fe5db3df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40551%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=6979bfee4623b1157c9f66c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40537-cwe-798-use-of-hard-coded-credentia-df12b498</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40537%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=high&amp;id=6979bfee4623b1157c9f66bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40536-cwe-693-protection-mechanism-failur-5fa97301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40536%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=high&amp;id=6979bc5c4623b1157c9e0bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1054-cwe-862-missing-authorization-in-met-83252a16</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1054%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=6979bc5c4623b1157c9e0bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1389-cwe-639-authorization-bypass-through-ef6bd941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1389%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Document%20Embedder%20%E2%80%93%20Embed%20PDFs%2C%20Word%2C%20Excel%2C%20and%20Other%20Files&amp;severity=medium&amp;id=6979bc5c4623b1157c9e0bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0832-cwe-862-missing-authorization-in-saa-54c8d588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0832%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20New%20User%20Approve&amp;severity=high&amp;id=6979b5554623b1157c9a94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1310-cwe-862-missing-authorization-in-mig-e736befa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1310%3A%20CWE-862%20Missing%20Authorization%20in%20migaweb%20Simple%20calendar%20for%20Elementor&amp;severity=medium&amp;id=6979b5554623b1157c9a94e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14039-cwe-79-improper-neutralization-of-i-41238a84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20presstigers%20Simple%20Folio&amp;severity=medium&amp;id=6979b5554623b1157c9a94b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12709-cwe-79-improper-neutralization-of-i-2f408848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Interactions%20%E2%80%93%20Create%20Interactive%20Experiences%20in%20the%20Block%20Editor&amp;severity=medium&amp;id=6979b5554623b1157c9a94b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9082-cwe-79-improper-neutralization-of-in-555402c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=6979b5554623b1157c9a94bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1295-cwe-79-improper-neutralization-of-in-34f959f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supercleanse%20Stripe%20Payments%20by%20Buy%20Now%20Plus%20%E2%80%93%20Best%20WordPress%20Stripe%20Credit%20Card%20Payments%20Plugin&amp;severity=medium&amp;id=6979b5554623b1157c9a94dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0825-cwe-862-missing-authorization-in-crm-0634d7b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0825%3A%20CWE-862%20Missing%20Authorization%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=6979b5554623b1157c9a94c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1244-cwe-79-improper-neutralization-of-in-e57bf048</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1244%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeccoop%20Forms%20Bridge%20%E2%80%93%20Infinite%20integrations&amp;severity=medium&amp;id=6979b5554623b1157c9a94d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1466-cwe-79-improper-neutralization-of-in-c2af209e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jirafeau%20project%20Jirafeau&amp;severity=medium&amp;id=6979b1d04623b1157c989124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13471-cwe-639-authorization-bypass-throug-65cffba6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13471%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Activity%20Log&amp;severity=medium&amp;id=6979aac84623b1157c94fc41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14610-cwe-918-server-side-request-forgery-6be5fa9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14610%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bloompixel%20TableMaster%20for%20Elementor%20%E2%80%93%20Advanced%20Responsive%20Tables%20for%20Elementor&amp;severity=high&amp;id=6979a3c14623b1157c91fb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1083-cwe-79-improper-neutralization-of-in-7d10b706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Appointment%20Hour%20Booking%20%E2%80%93%20Booking%20Calendar&amp;severity=medium&amp;id=6979a3c14623b1157c91fb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1298-cwe-862-missing-authorization-in-iul-8dd77780</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1298%3A%20CWE-862%20Missing%20Authorization%20in%20iulia-cazan%20Easy%20Replace%20Image&amp;severity=medium&amp;id=6979a3c14623b1157c91fb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8072-cwe-79-improper-neutralization-of-in-582d698e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebojsadabic%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=6979a3c14623b1157c91fb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-cve-2026-24858-after-active-forti-a16b9dd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20CVE-2026-24858%20After%20Active%20FortiOS%20SSO%20Exploitation%20Detected&amp;severity=critical&amp;id=697a711c4623b1157ced2a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1514-cwe-863-incorrect-authorization-in-2-7ba44a60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1514%3A%20CWE-863%20Incorrect%20Authorization%20in%202100%20Technology%20Official%20Document%20Management%20System&amp;severity=high&amp;id=69798b254623b1157c8997f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1506-os-command-injection-in-d-link-dir-6-55cc86e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1506%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=697979914623b1157c5f512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1505-os-command-injection-in-d-link-dir-6-bca8f308</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1505%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69796f044623b1157c5b85f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1513-cwe-79-improper-neutralization-of-in-fccdf7dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20billboard.js&amp;severity=medium&amp;id=69796f044623b1157c5b85f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21569-xxe-xml-external-entity-injection-i-8f906fa2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21569%3A%20XXE%20(XML%20External%20Entity%20Injection)%20in%20Atlassian%20Crowd%20Data%20Center&amp;severity=high&amp;id=69795d714623b1157c56bc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24852-cwe-122-heap-based-buffer-overflow--1bf8b510</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24852%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=69795d714623b1157c56bc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24850-cwe-347-improper-verification-of-cr-76dbd910</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24850%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20RustCrypto%20signatures&amp;severity=medium&amp;id=69795d714623b1157c56bc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24842-cwe-22-improper-limitation-of-a-pat-1ca97d57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24842%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=697959ec4623b1157c540f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-28-9c334e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-28&amp;severity=medium&amp;id=697aa42e4623b1157cfee9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71007-na-17a1c6b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71007%3A%20n%2Fa&amp;severity=high&amp;id=697a7db94623b1157cef7949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71006-na-260bba14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71006%3A%20n%2Fa&amp;severity=medium&amp;id=697a76b14623b1157cee2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71005-na-015f040b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71005%3A%20n%2Fa&amp;severity=medium&amp;id=697a73324623b1157ceda5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71003-na-906f7142</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71003%3A%20n%2Fa&amp;severity=high&amp;id=697a73324623b1157ceda5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71004-na-f5f5621c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71004%3A%20n%2Fa&amp;severity=medium&amp;id=697a6fa94623b1157cecc63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71002-na-71abaf31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71002%3A%20n%2Fa&amp;severity=medium&amp;id=697a653b4623b1157cea4ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69602-na-a9e747b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69602%3A%20n%2Fa&amp;severity=critical&amp;id=697a5e9e4623b1157ce6c337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69601-na-70c7cb89</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69601%3A%20n%2Fa&amp;severity=medium&amp;id=697a5e9e4623b1157ce6c331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71001-na-3b9ae8e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71001%3A%20n%2Fa&amp;severity=medium&amp;id=697a538a4623b1157ce1655d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71000-na-1ed2b827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71000%3A%20n%2Fa&amp;severity=high&amp;id=697a50074623b1157cdfcf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70999-na-afcc4a15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70999%3A%20n%2Fa&amp;severity=high&amp;id=697a48fd4623b1157cdca04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65891-na-69b501d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65891%3A%20n%2Fa&amp;severity=high&amp;id=697a48fd4623b1157cdca046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65890-na-0c7b96ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65890%3A%20n%2Fa&amp;severity=high&amp;id=697a457a4623b1157cdb1920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65889-na-33df1a10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65889%3A%20n%2Fa&amp;severity=high&amp;id=697a457a4623b1157cdb191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65888-na-1b6aece5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65888%3A%20n%2Fa&amp;severity=high&amp;id=697a3aee4623b1157cd881c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65887-na-fb692bab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65887%3A%20n%2Fa&amp;severity=medium&amp;id=697a3aee4623b1157cd881c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65886-na-75479913</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65886%3A%20n%2Fa&amp;severity=high&amp;id=697a37694623b1157cd75778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61140-na-f61e153f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61140%3A%20n%2Fa&amp;severity=critical&amp;id=697a33e64623b1157cd61d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69517-na-778e3abf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69517%3A%20n%2Fa&amp;severity=high&amp;id=697a30624623b1157cd4fb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57283-na-a6ffd88e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57283%3A%20n%2Fa&amp;severity=high&amp;id=697a30624623b1157cd4fb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70336-na-a812106d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70336%3A%20n%2Fa&amp;severity=medium&amp;id=697a2cdd4623b1157cd3c0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-28-b0a89e81</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-28&amp;severity=low&amp;id=6979b19b4623b1157c988123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24838-cwe-79-improper-neutralization-of-i-86dbcfdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=697959ec4623b1157c540f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24837-cwe-79-improper-neutralization-of-i-4c2712b9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24837%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24836-cwe-79-improper-neutralization-of-i-a758299f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24836%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24833-cwe-79-improper-neutralization-of-i-e692c3ad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=697952e34623b1157c50b1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24784-cwe-79-improper-neutralization-of-i-18400fd3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24784%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=697952e34623b1157c50b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24785-cwe-327-use-of-a-broken-or-risky-cr-c461cae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24785%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20jmlepisto%20clatter&amp;severity=high&amp;id=69794f604623b1157c50222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24134-cwe-639-authorization-bypass-throug-69f23a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24134%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20withstudiocms%20studiocms&amp;severity=medium&amp;id=69794f604623b1157c502228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23830-cwe-94-improper-control-of-generati-c9f465fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23830%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nyariv%20SandboxJS&amp;severity=critical&amp;id=697a295b4623b1157cd2335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55292-cwe-348-use-of-less-trusted-source--9d293b2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55292%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20meshtastic%20firmware&amp;severity=high&amp;id=697a295b4623b1157cd2335a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24783-cwe-682-incorrect-calculation-in-sc-0f5aaacd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24783%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20script3%20soroban-fixed-point-math&amp;severity=high&amp;id=69793a494623b1157c4b1c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24779-cwe-918-server-side-request-forgery-384b4cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24779%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=697936c84623b1157c4a64f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24778-cwe-79-improper-neutralization-of-i-5100454f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24778%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=697936c84623b1157c4a64ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24770-cwe-22-improper-limitation-of-a-pat-70884c4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24770%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20infiniflow%20ragflow&amp;severity=critical&amp;id=697936c84623b1157c4a64fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24765-cwe-502-deserialization-of-untruste-079f9476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24765%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sebastianbergmann%20phpunit&amp;severity=high&amp;id=697933434623b1157c49959a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24748-cwe-863-incorrect-authorization-in--433c70ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24748%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20akuity%20kargo&amp;severity=medium&amp;id=69792fbd4623b1157c48ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24741-cwe-22-improper-limitation-of-a-pat-7fd7b575</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24741%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20C4illin%20ConvertX&amp;severity=high&amp;id=69792fbd4623b1157c48ea56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24740-cwe-284-improper-access-control-in--b480a569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24740%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20amir20%20dozzle&amp;severity=high&amp;id=697928b74623b1157c47a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1504-inappropriate-implementation-in-goog-452349d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1504%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=697928b74623b1157c47a0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21589-cwe-288-authentication-bypass-using-54eb0b0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21589%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Juniper%20Networks%20Session%20Smart%20Router&amp;severity=critical&amp;id=697925324623b1157c47013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14988-cwe-732-incorrect-permission-assign-b0ebb5d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14988%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iba%20Systems%20ibaPDA&amp;severity=critical&amp;id=69791e294623b1157c4599a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12810-cwe-287-improper-authentication-in--2d0dafcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12810%3A%20CWE-287%20Improper%20Authentication%20in%20Delinea%20Inc.%20Secret%20Server%20On-Prem&amp;severity=medium&amp;id=69791aa44623b1157c447322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24688-cwe-835-loop-with-unreachable-exit--a6e7123b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24688%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=697917214623b1157c43bf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24771-cwe-79-improper-neutralization-of-i-7f5c5c69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24771%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24473-cwe-200-exposure-of-sensitive-infor-79ff5adf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24473%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bf95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24472-cwe-524-use-of-cache-containing-sen-4196de9b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24472%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20honojs%20hono&amp;severity=medium&amp;id=697917214623b1157c43bf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24858-improper-access-control-in-fortinet-214153b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24858%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=critical&amp;id=6979139d4623b1157c42d523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24398-cwe-185-incorrect-regular-expressio-638cd874</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24398%3A%20CWE-185%3A%20Incorrect%20Regular%20Expression%20in%20honojs%20hono&amp;severity=medium&amp;id=697910194623b1157c40e7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24116-cwe-125-out-of-bounds-read-in-bytec-a6b8f243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24116%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=697910194623b1157c40e7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22264-cwe-416-use-after-free-in-oisf-suri-3e92570b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22264%3A%20CWE-416%3A%20Use%20After%20Free%20in%20OISF%20suricata&amp;severity=high&amp;id=6979058d4623b1157c3e0403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0746-cwe-918-server-side-request-forgery--1bdef5bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0746%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tigroumeow%20AI%20Engine%20%E2%80%93%20The%20Chatbot%20and%20AI%20Framework%20for%20WordPress&amp;severity=medium&amp;id=6979058d4623b1157c3e03ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22263-cwe-1050-excessive-platform-resourc-b06997bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22263%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20OISF%20suricata&amp;severity=medium&amp;id=6979058d4623b1157c3e03fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22262-cwe-121-stack-based-buffer-overflow-06f08f07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22262%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=medium&amp;id=6979058d4623b1157c3e03f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22261-cwe-1050-excessive-platform-resourc-743223e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22261%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20OISF%20suricata&amp;severity=low&amp;id=697902094623b1157c3d233f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23593-vulnerability-in-hewlett-packard-en-7dcdb00b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23593%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Fabric%20Composer&amp;severity=high&amp;id=6978fe854623b1157c3c22de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33234-cwe-78-improper-neutralization-of-s-6a9f47b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33234%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20runx&amp;severity=high&amp;id=6978fe854623b1157c3c22d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23592-vulnerability-in-hewlett-packard-en-7e9f731c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23592%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Fabric%20Composer&amp;severity=high&amp;id=6978fe854623b1157c3c22db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1315-cwe-20-improper-input-validation-in--42ad57fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1315%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0919-cwe-20-improper-input-validation-in--0ede4dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0919%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0918-cwe-476-null-pointer-dereference-in--27d378ff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0918%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C220%20v1&amp;severity=high&amp;id=6978fe854623b1157c3c22e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22260-cwe-674-uncontrolled-recursion-in-o-05cf0dac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22260%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20OISF%20suricata&amp;severity=high&amp;id=6978fb014623b1157c3a8c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14911-vulnerability-in-mongodb-mongo-c-dr-d085cc8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14911%3A%20Vulnerability%20in%20MongoDB%20Mongo-c-driver&amp;severity=high&amp;id=6978fb014623b1157c3a8c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22259-cwe-400-uncontrolled-resource-consu-86b4ae49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22259%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=6978f3f94623b1157c39790c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-rolls-out-lockdown-style-security-mode-to-9fdae6f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Rolls%20Out%20Lockdown-Style%20Security%20Mode%20to%20Protect%20Targeted%20Users%20From%20Spyware&amp;severity=medium&amp;id=69791f8b4623b1157c45d419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-detect-pakistan-linked-cyber-campaigns-aim-69233911</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Detect%20Pakistan-Linked%20Cyber%20Campaigns%20Aimed%20at%20Indian%20Government%20Entities&amp;severity=medium&amp;id=69791f8b4623b1157c45d41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0705-cwe-276-in-acronis-acronis-cloud-man-7dec6718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0705%3A%20CWE-276%20in%20Acronis%20Acronis%20Cloud%20Manager&amp;severity=medium&amp;id=6978ecf04623b1157c3739d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-apps-nfc-skimming-attacks-and-other-android-i-964f4e8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20apps%2C%20NFC%20skimming%20attacks%2C%20and%20other%20Android%20issues%20in%202026%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=697920694623b1157c45f3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1483-cwe-89-improper-neutralization-of-sp-a2843041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1482-cwe-89-improper-neutralization-of-sp-613e5093</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1482%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1481-cwe-89-improper-neutralization-of-sp-cb323b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1481%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1480-cwe-89-improper-neutralization-of-sp-7ed5fc20</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1480%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1479-cwe-89-improper-neutralization-of-sp-020896bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1478-cwe-89-improper-neutralization-of-sp-11571c96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1477-cwe-89-improper-neutralization-of-sp-90f0182a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978ecf04623b1157c3739db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1476-cwe-89-improper-neutralization-of-sp-2a7a74b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1476%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c36696c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1475-cwe-89-improper-neutralization-of-sp-76ede8e7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1475%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1474-cwe-89-improper-neutralization-of-sp-9edb4b40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1473-cwe-89-improper-neutralization-of-sp-8752fa95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1472-cwe-89-improper-neutralization-of-sp-408b0a59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1472%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quatuor%20Evaluaci%C3%B3n%20de%20Desempe%C3%B1o%20(EDD)&amp;severity=critical&amp;id=6978e96c4623b1157c366960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22258-cwe-400-uncontrolled-resource-consu-6660cb73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22258%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=6978e96c4623b1157c36696f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24869-vulnerability-in-mozilla-firefox-b0872c4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24869%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6978e2684623b1157c350b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24868-vulnerability-in-mozilla-firefox-3ae61c11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24868%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6978e2684623b1157c350b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24875-cwe-190-integer-overflow-or-wraparo-66631d11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24875%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20yoyofr%20modizer&amp;severity=high&amp;id=6978e26a4623b1157c350bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24874-cwe-843-access-of-resource-using-in-cb8a3098</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24874%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20themrdemonized%20xray-monolith&amp;severity=critical&amp;id=6978e2684623b1157c350b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24873-cwe-125-out-of-bounds-read-in-rinne-942a2b67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24873%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Rinnegatamante%20lpp-vita&amp;severity=high&amp;id=6978e2684623b1157c350b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68670-cwe-121-stack-based-buffer-overflow-a6365ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68670%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20neutrinolabs%20xrdp&amp;severity=critical&amp;id=6978e2684623b1157c350b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24872-vulnerability-in-projectskyfire-sky-f5dffb02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24872%3A%20Vulnerability%20in%20ProjectSkyfire%20SkyFire_548&amp;severity=critical&amp;id=6978e2684623b1157c350b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24871-cwe-94-improper-control-of-generati-6e3cc839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24871%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pilgrimage233%20Minecraft-Rcon-Manage&amp;severity=critical&amp;id=6978e2684623b1157c350b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24870-cwe-200-exposure-of-sensitive-infor-203d0690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24870%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=low&amp;id=6978e2684623b1157c350b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24832-cwe-787-out-of-bounds-write-in-ixra-dedc5197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24832%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=critical&amp;id=6978dee54623b1157c340bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24831-cwe-835-loop-with-unreachable-exit--0a4371f2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24831%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20ixray-team%20ixray-1.6-stcop&amp;severity=high&amp;id=6978dee54623b1157c340bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0648-cwe-253-incorrect-check-of-function--bffea3a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0648%3A%20CWE-253%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX&amp;severity=high&amp;id=6978dee54623b1157c340bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55095-cwe-121-stack-based-buffer-overflow-c455961a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55095%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX%20-%20USBX&amp;severity=medium&amp;id=6978dee54623b1157c340bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55102-cwe-400-uncontrolled-resource-consu-b1a75b72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55102%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Eclipse%20ThreadX%20-%20NetX%20Duo&amp;severity=high&amp;id=6978db5e4623b1157c33187c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-organizations-targeted-in-shinyhunters-ph-f0a71441</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20Organizations%20Targeted%20in%20ShinyHunters%20Phishing%20Campaign&amp;severity=medium&amp;id=6978d4214623b1157c312357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-expand-using-fake-captchas-micros-a74c1b32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Expand%20Using%20Fake%20CAPTCHAs%2C%20Microsoft%20Scripts%2C%20and%20Trusted%20Web%20Services&amp;severity=medium&amp;id=69791f8b4623b1157c45d41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1489-out-of-bounds-write-in-red-hat-red-h-0b1d383e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1489%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978d0d04623b1157c302b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1470-cwe-95-improper-neutralization-of-di-90ad0231</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1470%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)&amp;severity=critical&amp;id=6978cd4c4623b1157c2e02f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packagegate-flaws-open-javascript-ecosystem-to-sup-63993445</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PackageGate%E2%80%99%20Flaws%20Open%20JavaScript%20Ecosystem%20to%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=6978c28d4623b1157c2b24f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1485-out-of-bounds-read-in-red-hat-red-ha-1021c9d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1485%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6978c6444623b1157c2c3089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1484-out-of-bounds-write-in-red-hat-red-h-1a38e534</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1484%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978c6444623b1157c2c3085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivoting-from-paytool-tracking-various-frauds-and--4fbe3952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivoting%20From%20PayTool%3A%20Tracking%20Various%20Frauds%20and%20E-Crime%20Targeting%20Canada&amp;severity=medium&amp;id=6978f3f84623b1157c39786c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-quantum-computing-and-the-pote-f67c4472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Quantum%20Computing%20and%20the%20Potential%20Synergy%20With%20Advanced%20AI&amp;severity=medium&amp;id=6978b0fd4623b1157c258c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-edge-extensions-caught-stealing-chatgpt-ses-2228617f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%2C%20Edge%20Extensions%20Caught%20Stealing%20ChatGPT%20Sessions&amp;severity=low&amp;id=6978b0fd4623b1157c258c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12387-cwe-754-improper-check-for-unusual--cf7e98e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12387%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Pix-Link%20LV-WR21Q&amp;severity=medium&amp;id=6978aa244623b1157c209818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12386-cwe-306-missing-authentication-for--e386709e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12386%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pix-Link%20LV-WR21Q&amp;severity=medium&amp;id=6978aa244623b1157c209813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctem-in-practice-prioritization-validation-and-out-000549fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTEM%20in%20Practice%3A%20Prioritization%2C%20Validation%2C%20and%20Outcomes%20That%20Matter&amp;severity=medium&amp;id=69791f8b4623b1157c45d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coolclient-backdoor-updated-new-data-stealing-tool-402aab41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoolClient%20backdoor%20updated%2C%20new%20data%20stealing%20tools%20used&amp;severity=medium&amp;id=6978e5e84623b1157c359a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41728-cwe-125-out-of-bounds-read-in-beckh-8fd0b144</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41728%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=medium&amp;id=6978a6a04623b1157c1f3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41727-cwe-420-unprotected-alternate-chann-c5405b93</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41727%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=high&amp;id=6978a6a04623b1157c1f3439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41726-cwe-190-integer-overflow-or-wraparo-b2917777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41726%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Beckhoff%20Automation%20Beckhoff.Device.Manager.XAR&amp;severity=high&amp;id=6978a6a04623b1157c1f3436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-linux-vulnerabil-427b51e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Linux%20Vulnerabilities&amp;severity=low&amp;id=6978985d4623b1157c1a3531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-zero-day-cve-2026-21509-emergency-44da08bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20Zero-Day%20(CVE-2026-21509)%20-%20Emergency%20Patch%20Issued%20for%20Active%20Exploitation&amp;severity=high&amp;id=69791f8b4623b1157c45d425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-grist-core-vulnerability-allows-rce-attac-ecac8c52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Grist-Core%20Vulnerability%20Allows%20RCE%20Attacks%20via%20Spreadsheet%20Formulas&amp;severity=critical&amp;id=69791f8b4623b1157c45d428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24348-cwe-20-improper-input-validation-in-fd43884c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24348%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=69788a804623b1157c156bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24830-cwe-190-integer-overflow-or-wraparo-6873dccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24830%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Ralim%20IronOS&amp;severity=critical&amp;id=69788a804623b1157c156bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21417-cwe-256-plaintext-storage-of-a-pass-d642e959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21417%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20CloudBoost%20Virtual%20Appliance&amp;severity=high&amp;id=69788a804623b1157c156bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24347-cwe-20-improper-input-validation-in-89d3b05d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24347%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=medium&amp;id=69788a804623b1157c156bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24346-cwe-798-use-of-hard-coded-credentia-5ce39fc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24346%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=6978db5e4623b1157c331882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1467-improper-neutralization-of-crlf-sequ-c16f3390</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1467%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6978f0754623b1157c38c52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24829-cwe-787-out-of-bounds-write-in-is-d-caaaa648</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24829%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Is-Daouda%20is-Engine&amp;severity=medium&amp;id=6978f0754623b1157c38c536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24828-cwe-401-missing-release-of-memory-a-670bf0ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24828%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Is-Daouda%20is-Engine&amp;severity=high&amp;id=6978f0754623b1157c38c533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24345-cwe-20-improper-input-validation-in-dc94d8d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24345%3A%20CWE-20%20Improper%20Input%20Validation%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=medium&amp;id=6978db5e4623b1157c33187f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24827-cwe-787-out-of-bounds-write-in-gers-1945ebca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24827%3A%20CWE-787%20Out-of-bounds%20Write%20in%20gerstrong%20Commander-Genius&amp;severity=high&amp;id=6978d7da4623b1157c322a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24826-cwe-787-out-of-bounds-write-in-cada-bb3cea2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24826%3A%20CWE-787%20Out-of-bounds%20Write%20in%20cadaver%20turso3d&amp;severity=critical&amp;id=69790cec4623b1157c400490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21721-vulnerability-in-grafana-grafanagra-3613c954</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21721%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana&amp;severity=high&amp;id=697883784623b1157c131411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21720-vulnerability-in-grafana-grafanagra-3c0383a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21720%3A%20Vulnerability%20in%20Grafana%20grafana%2Fgrafana-enterprise&amp;severity=high&amp;id=697883784623b1157c13140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24344-cwe-120-buffer-copy-without-checkin-554e2e6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24344%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=high&amp;id=697883784623b1157c131414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24825-cwe-401-missing-release-of-memory-a-eec619d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24825%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20ydb-platform%20ydb&amp;severity=medium&amp;id=697883784623b1157c131423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24824-cwe-79-improper-neutralization-of-i-90b11954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20yacy%20yacy_search_server&amp;severity=medium&amp;id=697883784623b1157c131420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-have-used-the-peckbirdy-javas-984bb4b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Have%20Used%20the%20PeckBirdy%20JavaScript%20C2%20Framework%20Since%202023&amp;severity=medium&amp;id=69791f8b4623b1157c45d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24823-cwe-787-out-of-bounds-write-in-fast-b0665349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24823%3A%20CWE-787%20Out-of-bounds%20Write%20in%20FASTSHIFT%20X-TRACK&amp;severity=critical&amp;id=697883784623b1157c13141d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24822-cwe-787-out-of-bounds-write-in-tttt-aac842f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24822%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ttttupup%20wxhelper&amp;severity=critical&amp;id=697883784623b1157c13141a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24821-cwe-125-out-of-bounds-read-in-turan-b1b6443e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24821%3A%20CWE-125%20Out-of-bounds%20Read%20in%20turanszkij%20WickedEngine&amp;severity=critical&amp;id=697883784623b1157c131417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24820-cwe-125-out-of-bounds-read-in-turan-77d68267</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24820%3A%20CWE-125%20Out-of-bounds%20Read%20in%20turanszkij%20WickedEngine&amp;severity=medium&amp;id=69787ff64623b1157c11b8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24819-cwe-1325-improperly-controlled-sequ-5ae68213</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24819%3A%20CWE-1325%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20foxinmy%20weixin4j&amp;severity=medium&amp;id=69787ff64623b1157c11b8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24818-cwe-125-out-of-bounds-read-in-prayd-493f9901</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24818%3A%20CWE-125%20Out-of-bounds%20Read%20in%20praydog%20UEVR&amp;severity=medium&amp;id=69787ff54623b1157c11b68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24817-cwe-787-out-of-bounds-write-in-pray-18d5f82d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24817%3A%20CWE-787%20Out-of-bounds%20Write%20in%20praydog%20UEVR&amp;severity=high&amp;id=69787ff54623b1157c11b689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24816-cwe-835-loop-with-unreachable-exit--15b8d095</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24816%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20datavane%20tis&amp;severity=critical&amp;id=69787ff54623b1157c11b686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24815-cwe-434-unrestricted-upload-of-file-d3686da3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24815%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20datavane%20tis&amp;severity=critical&amp;id=69787ff54623b1157c11b683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24814-cwe-190-integer-overflow-or-wraparo-c2e362a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24814%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20swoole%20swoole-src&amp;severity=critical&amp;id=69787ff54623b1157c11b680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24813-cwe-476-null-pointer-dereference-in-2da74693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24813%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20abcz316%20SKRoot-linuxKernelRoot&amp;severity=high&amp;id=69787ff54623b1157c11b67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24812-vulnerability-in-root-project-root-64665872</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24812%3A%20Vulnerability%20in%20root-project%20root&amp;severity=critical&amp;id=69787ff54623b1157c11b67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24811-vulnerability-in-root-project-root-7b965294</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24811%3A%20Vulnerability%20in%20root-project%20root&amp;severity=critical&amp;id=69787ff54623b1157c11b677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24809-cwe-787-out-of-bounds-write-in-pray-826db66e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24809%3A%20CWE-787%20Out-of-bounds%20Write%20in%20praydog%20REFramework&amp;severity=medium&amp;id=69787ff54623b1157c11b674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24807-cwe-347-improper-verification-of-cr-3eccaada</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24807%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20liuyueyi%20quick-media&amp;severity=medium&amp;id=69787ff54623b1157c11b671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24806-cwe-94-improper-control-of-generati-b6861ea8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24806%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20liuyueyi%20quick-media&amp;severity=medium&amp;id=69787c804623b1157c108be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24805-cwe-476-null-pointer-dereference-in-3b3d3d04</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24805%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20visualfc%20liteide&amp;severity=medium&amp;id=69787c804623b1157c108bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-office-zero-day-likely-exploited-a885b7b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Office%20Zero-Day%20Likely%20Exploited%20in%20Targeted%20Attacks&amp;severity=medium&amp;id=69787c3d4623b1157c10804e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24804-cwe-835-loop-with-unreachable-exit--0ebdcdb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24804%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20coolsnowwolf%20lede&amp;severity=critical&amp;id=69787c804623b1157c108bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24803-cwe-835-loop-with-unreachable-exit--ce2b24a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24803%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20coolsnowwolf%20lede&amp;severity=critical&amp;id=69787c804623b1157c108bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24802-cwe-835-loop-with-unreachable-exit--36694367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24802%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20briandilley%20jsonrpc4j&amp;severity=medium&amp;id=69787c804623b1157c108bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24801-vulnerability-in-ralim-ironos-e3c2d198</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24801%3A%20Vulnerability%20in%20Ralim%20IronOS&amp;severity=medium&amp;id=69787c804623b1157c108bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24800-cwe-787-out-of-bounds-write-in-tild-2d89ca37</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20tildearrow%20furnace&amp;severity=critical&amp;id=69787c804623b1157c108bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24799-cwe-787-out-of-bounds-write-in-davi-86c6f764</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24799%3A%20CWE-787%20Out-of-bounds%20Write%20in%20davisking%20dlib&amp;severity=medium&amp;id=69787c804623b1157c108bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24798-cwe-119-improper-restriction-of-ope-1fb91011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24798%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20GaijinEntertainment%20DagorEngine&amp;severity=critical&amp;id=69787c804623b1157c108bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24797-cwe-787-out-of-bounds-write-in-neka-dabe41fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24797%3A%20CWE-787%20Out-of-bounds%20Write%20in%20neka-nat%20cupoch&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24795-cwe-787-out-of-bounds-write-in-clov-be5d62bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20CloverHackyColor%20CloverBootloader&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24796-cwe-125-out-of-bounds-read-in-clove-89b633ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24796%3A%20CWE-125%20Out-of-bounds%20Read%20in%20CloverHackyColor%20CloverBootloader&amp;severity=medium&amp;id=697878ed4623b1157c0fa6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24794-cwe-119-improper-restriction-of-ope-ee39e994</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24794%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20CardboardPowered%20cardboard&amp;severity=critical&amp;id=697878ed4623b1157c0fa69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24793-cwe-787-out-of-bounds-write-in-azer-1ec9b576</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24793%3A%20CWE-787%20Out-of-bounds%20Write%20in%20azerothcore%20azerothcore-wotlk&amp;severity=critical&amp;id=697878ed4623b1157c0fa69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1464-cwe-190-integer-overflow-or-wraparou-e3c1db4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1464%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MuntashirAkon%20AppManager&amp;severity=medium&amp;id=697878ed4623b1157c0fa694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1465-cwe-119-improper-restriction-of-oper-dd88a3aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1465%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20anyrtcIO-Community%20anyRTC-RTMP-OpenSource&amp;severity=high&amp;id=697878ed4623b1157c0fa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14971-cwe-862-missing-authorization-in-li-47d68db7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14971%3A%20CWE-862%20Missing%20Authorization%20in%20linknacional%20Link%20Invoice%20Payment%20for%20WooCommerce&amp;severity=medium&amp;id=697863d44623b1157c081536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21408-uncontrolled-search-path-element-in-1a82a11f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21408%3A%20Uncontrolled%20Search%20Path%20Element%20in%20FUJIFILM%20Business%20Innovation%20Corp.%20beat-access%20for%20Windows&amp;severity=high&amp;id=69784b384623b1157cfa2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1361-cwe-121-stack-based-buffer-overflow--2a765591</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1361%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=6978329c4623b1157cd9c78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/initial-stages-of-romance-scams-x5bguest-diaryx5d--30aa95fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Initial%20Stages%20of%20Romance%20Scams%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Tue%2C%20Jan%2027th)&amp;severity=medium&amp;id=697820db4623b1157ccbe03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24686-cwe-22-improper-limitation-of-a-pat-a82658c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=69780bf04623b1157cc7aad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24479-cwe-22-improper-limitation-of-a-pat-37e6225f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24479%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zhblue%20hustoj&amp;severity=critical&amp;id=69780bf04623b1157cc7aabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24490-cwe-79-improper-neutralization-of-i-8427805e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24490%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=high&amp;id=69780bf04623b1157cc7aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24489-cwe-93-improper-neutralization-of-c-684b5c93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24489%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20HappyHackingSpace%20gakido&amp;severity=medium&amp;id=69780bf04623b1157cc7aac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24486-cwe-22-improper-limitation-of-a-pat-b129ef62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24486%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Kludex%20python-multipart&amp;severity=high&amp;id=69780bf04623b1157cc7aac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23683-cwe-862-missing-authorization-in-sa-0f5da0d1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23683%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6978086c4623b1157cc5f11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-27-2880f4ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-27&amp;severity=medium&amp;id=697956324623b1157c51968a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65264-na-1aa1d5f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65264%3A%20n%2Fa&amp;severity=medium&amp;id=6978f0754623b1157c38c52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69564-na-1d8455d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69564%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c36695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69562-na-db202841</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69562%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c366958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69559-na-01951af2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69559%3A%20n%2Fa&amp;severity=critical&amp;id=6978e96c4623b1157c366954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69563-na-87b4b46f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69563%3A%20n%2Fa&amp;severity=critical&amp;id=6978e5e94623b1157c359a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28162-na-c7e6a9dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28162%3A%20n%2Fa&amp;severity=medium&amp;id=6978e2684623b1157c350b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69565-na-8780e99d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69565%3A%20n%2Fa&amp;severity=critical&amp;id=6978e2684623b1157c350b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28164-na-aff48337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28164%3A%20n%2Fa&amp;severity=medium&amp;id=6978db5e4623b1157c331878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-27-46946cc2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-27&amp;severity=low&amp;id=697894d64623b1157c193d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1449-sql-injection-in-hisense-transtech-s-4d92f699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1449%3A%20SQL%20Injection%20in%20Hisense%20TransTech%20Smart%20Bus%20Management%20System&amp;severity=medium&amp;id=69790cec4623b1157c40049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1448-os-command-injection-in-d-link-dir-6-1061472a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1448%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-615&amp;severity=high&amp;id=69790cec4623b1157c400493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24478-cwe-22-improper-limitation-of-a-pat-7cc58696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24478%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=69790cec4623b1157c4004a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24477-cwe-201-insertion-of-sensitive-info-0135526e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24477%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Mintplex-Labs%20anything-llm&amp;severity=high&amp;id=6977fa5c4623b1157cc21c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30248-cwe-427-in-western-digital-wd-disco-dfdda4a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30248%3A%20CWE-427%20in%20Western%20Digital%20WD%20Discovery&amp;severity=high&amp;id=6977f35d4623b1157cc0c83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24470-cwe-441-unintended-proxy-or-interme-b639318b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24470%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20zalando%20skipper&amp;severity=high&amp;id=6977efd04623b1157cc026ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24003-cwe-287-improper-authentication-in--eeb0d1a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24003%3A%20CWE-287%3A%20Improper%20Authentication%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=6977e8c84623b1157cbefcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1445-unrestricted-upload-in-ijason-liu-bo-1de5fa1b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1445%3A%20Unrestricted%20Upload%20in%20iJason-Liu%20Books_Manager&amp;severity=medium&amp;id=6977e8c84623b1157cbefcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59472-vulnerability-in-vercel-next-83d3bf12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59472%3A%20Vulnerability%20in%20vercel%20next&amp;severity=medium&amp;id=6977e1c04623b1157cbdb6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59471-vulnerability-in-vercel-next-17d14f61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59471%3A%20Vulnerability%20in%20vercel%20next&amp;severity=medium&amp;id=6977e1c04623b1157cbdb69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1444-cross-site-scripting-in-ijason-liu-b-f13b545f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1444%3A%20Cross%20Site%20Scripting%20in%20iJason-Liu%20Books_Manager&amp;severity=medium&amp;id=69790cec4623b1157c4004a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22709-cwe-94-improper-control-of-generati-1636b6af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22709%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69790cec4623b1157c4004b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22696-cwe-347-improper-verification-of-cr-b87887a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22696%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Phala-Network%20dcap-qvl&amp;severity=critical&amp;id=69790cec4623b1157c4004ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-attacks-target-indian-government-using-gogitte-beb16e30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Attacks%20Target%20Indian%20Government%20Using%20GOGITTER%2C%20GITSHELLPAD%2C%20and%20GOSHELL%20%7C%20Part%201&amp;severity=medium&amp;id=69786adc4623b1157c0a63cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1443-sql-injection-in-code-projects-onlin-0655515f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1443%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=6977ccaa4623b1157cb9dc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9820-stack-based-buffer-overflow-in-red-h-f66f7bc7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9820%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6977c9254623b1157cb7b5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9615-improper-preservation-of-permissions-3fd3b178</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9615%3A%20Improper%20Preservation%20of%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6977c9254623b1157cb7b5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1190-missing-xml-validation-in-red-hat-re-cee86e03</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1190%3A%20Missing%20XML%20Validation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6977c5a14623b1157cb6ffab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0810-incorrect-calculation-of-multi-byte--af498b2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0810%3A%20Incorrect%20Calculation%20of%20Multi-Byte%20String%20Length%20in%20GitoxideLabs%20gitoxide&amp;severity=high&amp;id=6977c5a14623b1157cb6ffa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14525-allocation-of-resources-without-lim-f4a700f4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14525%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14969-missing-release-of-resource-after-e-6be880ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14969%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Quarkus%203.27.2&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14459-authorization-bypass-through-user-c-38c24cd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14459%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20RHEL-9-CNV-4.19&amp;severity=high&amp;id=6977c5a14623b1157cb6ff8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11687-improper-neutralization-of-input-du-8a400365</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11065-generation-of-error-message-contain-49b83784</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11065%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=6977c5a14623b1157cb6ff7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9522-cwe-918-server-side-request-forgery--fc627c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9522%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=medium&amp;id=6977c5a14623b1157cb6ffa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9521-cwe-522-insufficiently-protected-cre-7f02f470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9521%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=low&amp;id=6977c5a14623b1157cb6ff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9520-cwe-639-authorization-bypass-through-e6d09812</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9520%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TP-Link%20Systems%20Inc.%20Omada%20Controller&amp;severity=high&amp;id=6977c5a14623b1157cb6ff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23864-cwe-502-deserialization-of-untruste-c66bc996</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23864%3A%20(CWE-502)%3A%20Deserialization%20of%20Untrusted%20Data.%20(CWE-400)%3A%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-webpack&amp;severity=high&amp;id=6977c21c4623b1157cb61420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14756-cwe-77-improper-neutralization-of-s-4556bd0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14756%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20MR600%20v5.0&amp;severity=high&amp;id=6977b0924623b1157cb2aa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71178-cwe-427-uncontrolled-search-path-el-577cf8f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71178%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Micron%20Technology%2C%20Inc.%20Crucial%20Storage%20Executive&amp;severity=high&amp;id=6977ad0e4623b1157cb13175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0925-improper-validation-of-specified-qua-53d9897a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0925%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Tanium%20Discover&amp;severity=low&amp;id=6977ad0e4623b1157cb13179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24435-cwe-942-permissive-cross-domain-sec-71857ed3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24435%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977ad0e4623b1157cb13180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24439-cwe-116-improper-encoding-or-escapi-bdf35b88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24439%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=low&amp;id=6977ad0e4623b1157cb13184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57784-cwe-208-observable-timing-discrepan-e92bf02d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57784%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977ad0e4623b1157cb1316f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24432-cwe-352-cross-site-request-forgery--f00e195e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24432%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977ad0e4623b1157cb1317c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57785-cwe-415-double-free-in-hiawatha-hia-29a8d525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57785%3A%20CWE-415%20Double%20Free%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977ad0e4623b1157cb13172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57783-cwe-444-inconsistent-interpretation-e25faf48</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57783%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Hiawatha%20Hiawatha%20Web%20server&amp;severity=medium&amp;id=6977a98b4623b1157caf781f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24433-cwe-79-improper-neutralization-of-i-45669f67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977a98b4623b1157caf7835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24431-cwe-317-cleartext-storage-of-sensit-ab9006d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24431%3A%20CWE-317%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GUI%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24437-cwe-525-use-of-web-browser-cache-co-72fdfb6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24437%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=medium&amp;id=6977a98b4623b1157caf783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24436-cwe-307-improper-restriction-of-exc-6aed44b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24436%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=critical&amp;id=6977a98b4623b1157caf7839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24428-cwe-863-incorrect-authorization-in--44cb5ee5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24428%3A%20CWE-863%20Incorrect%20Authorization%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24430-cwe-201-insertion-of-sensitive-info-04c7a288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24430%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf782d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24429-cwe-1393-use-of-default-password-in-8ff3cec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24429%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=critical&amp;id=6977a98b4623b1157caf7829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24440-cwe-620-unverified-password-change--1c4abfce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24440%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Shenzhen%20Tenda%20Technology%20Co.%2C%20Ltd.%20W30E%20V2&amp;severity=high&amp;id=6977a98b4623b1157caf7841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1224-allocation-of-resources-without-limi-d7ece23d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1224%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Tanium%20Discover&amp;severity=medium&amp;id=6977a98b4623b1157caf7822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1446-cwe-79-improper-neutralization-of-in-73578bdc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Pro&amp;severity=medium&amp;id=6977a6094623b1157cae90c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21509-cwe-807-reliance-on-untrusted-input-a681ae8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21509%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=6977a2884623b1157cab31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-users-targeted-in-tax-phishing-campaign-del-8506907c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Users%20Targeted%20in%20Tax%20Phishing%20Campaign%20Delivering%20Blackmoon%20Malware&amp;severity=medium&amp;id=6977d37c4623b1157cbb6736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/access-system-flaws-enabled-hackers-to-unlock-door-15d14345</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Access%20System%20Flaws%20Enabled%20Hackers%20to%20Unlock%20Doors%20at%20Major%20European%20Firms&amp;severity=medium&amp;id=697794364623b1157ca384e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vs-code-ai-extensions-with-15-million-in-61603c0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VS%20Code%20AI%20Extensions%20with%201.5%20Million%20Installs%20Steal%20Developer%20Source%20Code&amp;severity=medium&amp;id=6977d37c4623b1157cbb6739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gentic-ai-security-measures-based-on-the-owasp-asi-366d5139</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%D0%90gentic%20AI%20security%20measures%20based%20on%20the%20OWASP%20ASI%20Top%2010&amp;severity=medium&amp;id=69778a194623b1157c9f3ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-moonpeak-executed-via-lnk-files-8203f9e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20MoonPeak%20Executed%20via%20LNK%20Files&amp;severity=medium&amp;id=6977a9814623b1157caf7565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/26th-january-threat-intelligence-report-5ae286fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=26th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69776dbd4623b1157c9313f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1284-cwe-787-out-of-bounds-write-in-dassa-a10795f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1284%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=697771404623b1157c944d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1283-cwe-122-heap-based-buffer-overflow-i-189e83d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1283%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=697771404623b1157c944d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crunchbase-confirms-data-breach-after-hacking-clai-2677bfd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crunchbase%20Confirms%20Data%20Breach%20After%20Hacking%20Claims&amp;severity=medium&amp;id=69775f794623b1157c8e6c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-firewall-flaws-ai-built-malware-brows-83313ca1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Firewall%20Flaws%2C%20AI-Built%20Malware%2C%20Browser%20Traps%2C%20Critical%20CVEs%20%26%20More&amp;severity=critical&amp;id=6977d37c4623b1157cbb673c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stanley-malware-toolkit-enables-phishing-via-websi-7c6649d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Stanley%E2%80%99%20Malware%20Toolkit%20Enables%20Phishing%20via%20Website%20Spoofing&amp;severity=medium&amp;id=697754ed4623b1157c89cf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winning-against-ai-based-attacks-requires-a-combin-b2304b8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Winning%20Against%20AI-Based%20Attacks%20Requires%20a%20Combined%20Defensive%20Approach&amp;severity=medium&amp;id=6977d37c4623b1157cbb673f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59109-cwe-1295-debug-messages-revealing-u-4fa85a06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59109%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20dormakaba%20dormakaba%20registration%20unit%209002&amp;severity=medium&amp;id=6977400b4623b1157c815ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59108-cwe-1392-use-of-default-credentials-70a71ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59108%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400b4623b1157c815ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59107-cwe-798-use-of-hard-coded-credentia-b94476b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59107%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59106-cwe-272-least-privilege-violation-i-b1342125</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59106%3A%20CWE-272%3A%20Least%20Privilege%20Violation%20in%20dormakaba%20Access%20Manager%2092xx-k7&amp;severity=high&amp;id=6977400b4623b1157c815ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59105-cwe-312-cleartext-storage-of-sensit-0c88dcf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59105%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59104-cwe-1234-hardware-internal-or-debug-f630324d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59104%3A%20CWE-1234%3A%20Hardware%20Internal%20or%20Debug%20Modes%20Allow%20Override%20of%20Locks%20in%20dormakaba%20Access%20Manager%2092xx-k7&amp;severity=high&amp;id=6977400b4623b1157c815ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59103-cwe-1391-use-of-weak-credentials-in-431460c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59103%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400b4623b1157c815ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59102-cwe-312-cleartext-storage-of-sensit-aa17446d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59102%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=medium&amp;id=6977400b4623b1157c815ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59101-cwe-291-reliance-on-ip-address-for--51142fc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59101%3A%20CWE-291%3A%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400b4623b1157c815ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59100-cwe-285-improper-authorization-in-d-0466289c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59100%3A%20CWE-285%3A%20Improper%20Authorization%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=medium&amp;id=6977400b4623b1157c815eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59099-cwe-35-path-traversal-in-dormakaba--dac7a66d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59099%3A%20CWE-35%3A%20Path%20Traversal%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400a4623b1157c815ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59098-cwe-497-exposure-of-sensitive-syste-bc41aa77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59098%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=high&amp;id=6977400a4623b1157c815e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59097-cwe-306-missing-authentication-for--acb2ae90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59097%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dormakaba%20Access%20Manager%2092xx-k5&amp;severity=critical&amp;id=6977400a4623b1157c815e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59096-cwe-798-use-of-hard-coded-credentia-4dde671c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59096%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=medium&amp;id=6977400a4623b1157c815e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59095-cwe-798-use-of-hard-coded-credentia-71cd56bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59095%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=medium&amp;id=6977400a4623b1157c815e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59094-cwe-269-improper-privilege-manageme-77fa67b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59094%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59093-cwe-656-reliance-on-security-throug-d255abf4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59093%3A%20CWE-656%3A%20Reliance%20on%20Security%20Through%20Obscurity%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59092-cwe-798-use-of-hard-coded-credentia-2cb59293</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59092%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=high&amp;id=6977400a4623b1157c815e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59091-cwe-798-use-of-hard-coded-credentia-84df14c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59091%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=critical&amp;id=6977400a4623b1157c815e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59090-cwe-306-missing-authentication-for--88a4dc03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59090%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dormakaba%20Kaba%20exos%209300&amp;severity=critical&amp;id=6977400a4623b1157c815e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27821-cwe-787-out-of-bounds-write-in-apac-2665aad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27821%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20HDFS%20native%20client&amp;severity=high&amp;id=697739004623b1157c7df51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41083-cwe-74-improper-neutralization-of-s-95e69c45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41083%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Altitude%20Altitude%20Communication%20Server&amp;severity=medium&amp;id=697739004623b1157c7df521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24656-cwe-502-deserialization-of-untruste-dadf3c2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24656%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Karaf&amp;severity=low&amp;id=697739004623b1157c7df524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41082-cwe-444-inconsistent-interpretation-08d9a62c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41082%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Altitude%20Altitude%20Communication%20Server&amp;severity=medium&amp;id=6977357c4623b1157c7c290d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-sandworm-hackers-blamed-for-cyberattack-on-96300613</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Sandworm%20Hackers%20Blamed%20for%20Cyberattack%20on%20Polish%20Power%20Grid&amp;severity=medium&amp;id=69772e414623b1157c783c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-stealer-returns-seo-poisoning-and-fake-git-6295929d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20Stealer%20Returns%3A%20SEO%20Poisoning%20and%20Fake%20GitHub%20Repositories%20Target%20macOS%20Users&amp;severity=medium&amp;id=697731f84623b1157c79b499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-hackers-deploy-ai-generated-powershell-backd-f6a39cdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konni%20Hackers%20Deploy%20AI-Generated%20PowerShell%20Backdoor%20Against%20Blockchain%20Developers&amp;severity=high&amp;id=6977d37c4623b1157cbb6742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1429-cwe-79-improper-neutralization-of-in-3558d8ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=medium&amp;id=6977276d4623b1157c74e4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-depth-analysis-of-vietnamese-stealer-python-bas-eb75b788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-Depth%20Analysis%20of%20Vietnamese%20Stealer%3A%20Python-Based%20Info%20Stealer%20Using%20Telegram%20C2%20and%20DLL%20Sideloading&amp;severity=high&amp;id=6977235f4623b1157c732d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1428-cwe-78-improper-neutralization-of-sp-3e22c0ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1428%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=high&amp;id=6977276d4623b1157c74e4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1427-cwe-78-improper-neutralization-of-sp-65c40dce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1427%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WellChoose%20Single%20Sign-On%20Portal%20System&amp;severity=high&amp;id=697724144623b1157c737332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1425-stack-based-buffer-overflow-in-pymum-f80d7835</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1425%3A%20Stack-based%20Buffer%20Overflow%20in%20pymumu%20SmartDNS&amp;severity=medium&amp;id=69771ce04623b1157c70533a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1424-unrestricted-upload-in-phpgurukul-ne-5bc5b437</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1424%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=697712544623b1157c6c4eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1423-unrestricted-upload-in-code-projects-cc67b584</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1423%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=69777bcc4623b1157c990fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1422-sql-injection-in-code-projects-onlin-28382f5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1422%3A%20SQL%20Injection%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=697707c94623b1157c67230d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14973-cwe-89-sql-injection-in-recipe-card-f2600f17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14973%3A%20CWE-89%20SQL%20Injection%20in%20Recipe%20Card%20Blocks%20Lite&amp;severity=medium&amp;id=697707c94623b1157c67230a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14316-cwe-79-cross-site-scripting-xss-in--dffe6429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14316%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AhaChat%20Messenger%20Marketing&amp;severity=high&amp;id=697707c94623b1157c672307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1421-cross-site-scripting-in-code-project-046be19b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1421%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Examination%20System&amp;severity=medium&amp;id=6976fd4a4623b1157c61191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2024-vmware-flaw-now-in-attackers-crosshairs-b1464dff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2024%20VMware%20Flaw%20Now%20in%20Attackers%E2%80%99%20Crosshairs&amp;severity=critical&amp;id=6976fd0a4623b1157c6110a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1420-buffer-overflow-in-tenda-ac23-efd98bbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1420%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=6977a2884623b1157cab31e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1419-command-injection-in-d-link-dcs700l-47f8b11c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1419%3A%20Command%20Injection%20in%20D-Link%20DCS700l&amp;severity=medium&amp;id=6976f2b04623b1157c5da02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1418-out-of-bounds-write-in-gpac-90738829</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1418%3A%20Out-of-bounds%20Write%20in%20GPAC&amp;severity=medium&amp;id=6976eba84623b1157c5a7de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1417-null-pointer-dereference-in-gpac-b6af9ad7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1417%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976e11c4623b1157c3c0df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1416-null-pointer-dereference-in-gpac-c0697bcc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1416%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976e11c4623b1157c3c0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1415-null-pointer-dereference-in-gpac-dbe50936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1415%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=6976d6914623b1157c2ea348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1414-command-injection-in-sangfor-operati-0c2293e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1414%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976d6914623b1157c2ea342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1413-command-injection-in-sangfor-operati-7e9a2394</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1413%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976cc044623b1157c29d717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1412-command-injection-in-sangfor-operati-db60d9a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1412%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=6976c1784623b1157c18b140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-webserver-with-x24pwd-as-a-starting-path--e2d59043</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Webserver%20with%20%2F%26%23x24%3B(pwd)%2F%20as%20a%20Starting%20Path%2C%20(Sun%2C%20Jan%2025th)&amp;severity=medium&amp;id=6976bdc14623b1157c134d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1411-improper-access-controls-in-beetel-7-dbb2cd28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1411%3A%20Improper%20Access%20Controls%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=6976ba704623b1157c0e5ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1410-missing-authentication-in-beetel-777-3433ed1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1410%3A%20Missing%20Authentication%20in%20Beetel%20777VR1&amp;severity=medium&amp;id=6976ba704623b1157c0e5adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-net-ids-alerts-for-2026-01-26-52609b0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ-NET%20IDS%20alerts%20for%202026-01-26&amp;severity=low&amp;id=69791f4c4623b1157c45b7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-26-7634b3de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-26&amp;severity=medium&amp;id=697804b24623b1157cc3b376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70368-na-fc9fb059</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70368%3A%20n%2Fa&amp;severity=medium&amp;id=6977bbea4623b1157cb50af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67274-na-675b0cd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67274%3A%20n%2Fa&amp;severity=high&amp;id=69779ef44623b1157ca6f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70982-na-6d9036c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70982%3A%20n%2Fa&amp;severity=critical&amp;id=69779ef44623b1157ca6f106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50537-na-4d81dee7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50537%3A%20n%2Fa&amp;severity=medium&amp;id=69778d624623b1157ca089f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-26-e00f0889</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-26&amp;severity=low&amp;id=6976eb734623b1157c5a4481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1409-improper-restriction-of-excessive-au-ce85d87d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1409%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Beetel%20777VR1&amp;severity=low&amp;id=6976a8dc4623b1157cff7319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1408-weak-password-requirements-in-beetel-b1b1330b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1408%3A%20Weak%20Password%20Requirements%20in%20Beetel%20777VR1&amp;severity=low&amp;id=6976a5594623b1157cfebce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1407-information-disclosure-in-beetel-777-1bc56a3b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1407%3A%20Information%20Disclosure%20in%20Beetel%20777VR1&amp;severity=low&amp;id=697697484623b1157cf22641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1406-open-redirect-in-lcg0124-bootdo-8924e3de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1406%3A%20Open%20Redirect%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=697607244623b1157c802958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6461-cwe-200-exposure-of-sensitive-inform-6c1da386</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6461%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=697588954623b1157c01bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-25-fdf20aef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-25&amp;severity=medium&amp;id=6976b3324623b1157c047f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-25-fa2973a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-25&amp;severity=low&amp;id=6975ceb04623b1157c599c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0593-cwe-862-missing-authorization-in-wpg-6cec36e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0593%3A%20CWE-862%20Missing%20Authorization%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=6974f8714623b1157cc25a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0862-cwe-79-improper-neutralization-of-in-0c02f79a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pdfcrowd%20Save%20as%20PDF%20Plugin%20by%20PDFCrowd&amp;severity=medium&amp;id=6974ea624623b1157cbe8a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13920-cwe-200-exposure-of-sensitive-infor-7da736bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13920%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdirectorykit%20WP%20Directory%20Kit&amp;severity=medium&amp;id=6974c0304623b1157cb57048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0911-cwe-434-unrestricted-upload-of-file--7bd667a8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0911%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=high&amp;id=6974c0304623b1157cb5704c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-phishing-campaign-targets-russia-with--0cd263eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multi-Stage%20Phishing%20Campaign%20Targets%20Russia%20with%20Amnesia%20RAT%20and%20Ransomware&amp;severity=medium&amp;id=69752d084623b1157ccddeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13205-cwe-352-cross-site-request-forgery--5759c8f9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13205%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1127-cwe-79-improper-neutralization-of-in-71eb27eb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=medium&amp;id=69748ef84623b1157cac2e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13194-cwe-352-cross-site-request-forgery--70ed80ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13194%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1191-cwe-79-improper-neutralization-of-in-45545a99</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freemp%20JavaScript%20Notifier&amp;severity=medium&amp;id=69748ef84623b1157cac2e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1208-cwe-352-cross-site-request-forgery-c-8ce06f0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1208%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mainichiweb%20Friendly%20Functions%20for%20Welcart&amp;severity=medium&amp;id=69748ef84623b1157cac2e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1189-cwe-79-improper-neutralization-of-in-f6a677db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leadbi%20LeadBI%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69748ef84623b1157cac2e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1300-cwe-79-improper-neutralization-of-in-02ef204c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mehtevas%20Responsive%20Header%20Plugin&amp;severity=medium&amp;id=69748ef84623b1157cac2e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13139-cwe-352-cross-site-request-forgery--9b96c820</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13139%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=69748ef84623b1157cac2e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nike-probing-potential-security-incident-as-hacker-78d65ffd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nike%20Probing%20Potential%20Security%20Incident%20as%20Hackers%20Threaten%20to%20Leak%20Data&amp;severity=medium&amp;id=697487bd4623b1157caa41c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1098-cwe-79-improper-neutralization-of-in-a7605f1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codemacher%20CM%20CSS%20Columns&amp;severity=medium&amp;id=6974846c4623b1157ca99ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0633-cwe-287-improper-authentication-in-r-90d7cd89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0633%3A%20CWE-287%20Improper%20Authentication%20in%20roxnor%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=low&amp;id=6974846c4623b1157ca99ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1302-cwe-79-improper-neutralization-of-in-e2def23c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shahinurislam%20Meta-box%20GalleryMeta&amp;severity=medium&amp;id=6974846c4623b1157ca99ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14630-cwe-352-cross-site-request-forgery--fd43bd15</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14630%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rtowebsites%20AdminQuickbar&amp;severity=medium&amp;id=6974846c4623b1157ca99ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0687-cwe-862-missing-authorization-in-sha-2768dd95</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0687%3A%20CWE-862%20Missing%20Authorization%20in%20shahinurislam%20Meta-box%20GalleryMeta&amp;severity=medium&amp;id=6974846c4623b1157ca99ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1266-cwe-79-improper-neutralization-of-in-b43efe42</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neop%20Postalicious&amp;severity=medium&amp;id=6974846c4623b1157ca99ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14907-cwe-352-cross-site-request-forgery--6add1cc8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14907%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hallsofmontezuma%20Moderate%20Selected%20Posts&amp;severity=medium&amp;id=6974846c4623b1157ca99ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15516-cwe-862-missing-authorization-in-pl-5fb8bc44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15516%3A%20CWE-862%20Missing%20Authorization%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=6974846c4623b1157ca99ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0800-cwe-79-improper-neutralization-of-in-d9bf7dc1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=high&amp;id=6974846c4623b1157ca99ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dynowiper-malware-used-in-attempted-sandworm-a-301f8258</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DynoWiper%20Malware%20Used%20in%20Attempted%20Sandworm%20Attack%20on%20Polish%20Power%20Sector&amp;severity=medium&amp;id=69752d084623b1157ccddeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/who-approved-this-agent-rethinking-access-accounta-641b74f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Who%20Approved%20This%20Agent%3F%20Rethinking%20Access%2C%20Accountability%2C%20and%20Risk%20in%20the%20Age%20of%20AI%20Agents&amp;severity=low&amp;id=69752d084623b1157ccddeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-vmware-vcenter-flaw-c-6b83f1fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20VMware%20vCenter%20Flaw%20CVE-2024-37079%20to%20KEV%20Catalog&amp;severity=critical&amp;id=69752d084623b1157ccddeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1088-cwe-352-cross-site-request-forgery-c-1f994a39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1088%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zero1zerouk%20Login%20Page%20Editor&amp;severity=medium&amp;id=6974765f4623b1157ca739c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13676-cwe-79-improper-neutralization-of-i-ffb5d910</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13676%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ostin654%20JustClick%20registration%20plugin&amp;severity=medium&amp;id=6974765d4623b1157ca738d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1099-cwe-79-improper-neutralization-of-in-faff8b5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shazdeh%20Administrative%20Shortcodes&amp;severity=medium&amp;id=697476614623b1157ca73a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14609-cwe-862-missing-authorization-in-ma-8f6614c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14609%3A%20CWE-862%20Missing%20Authorization%20in%20marcinlawrowski%20Wise%20Analytics&amp;severity=medium&amp;id=6974765d4623b1157ca738de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1097-cwe-79-improper-neutralization-of-in-da69674f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1097%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeruby%20ThemeRuby%20Multi%20Authors%20%E2%80%93%20Assign%20Multiple%20Writers%20to%20Posts&amp;severity=medium&amp;id=697476614623b1157ca73a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14941-cwe-79-improper-neutralization-of-i-bbccb57c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aminhashemy%20GZSEO&amp;severity=medium&amp;id=6974765d4623b1157ca738fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1084-cwe-79-improper-neutralization-of-in-00bf3db8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lovor%20Cookie%20consent%20for%20developers&amp;severity=medium&amp;id=6974765f4623b1157ca739bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14843-cwe-862-missing-authorization-in-wi-73b7f14d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14843%3A%20CWE-862%20Missing%20Authorization%20in%20wizit%20Wizit%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=6974765d4623b1157ca738f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1075-cwe-352-cross-site-request-forgery-c-1425f457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1075%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teamzt%20ZT%20Captcha&amp;severity=medium&amp;id=6974765f4623b1157ca739ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1081-cwe-352-cross-site-request-forgery-c-3041ea61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1081%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sauravrox%20Set%20Bulk%20Post%20Categories&amp;severity=medium&amp;id=6974765f4623b1157ca739b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14629-cwe-862-missing-authorization-in-ta-62cef717</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14629%3A%20CWE-862%20Missing%20Authorization%20in%20tandubhai%20Alchemist%20Ajax%20Upload&amp;severity=medium&amp;id=6974765d4623b1157ca738e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14985-cwe-79-improper-neutralization-of-i-361cb023</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robiulawal40%20Alpha%20Blocks&amp;severity=medium&amp;id=6974765f4623b1157ca73998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14797-cwe-79-improper-neutralization-of-i-b3b472b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14797%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kometschuh%20Same%20Category%20Posts&amp;severity=medium&amp;id=6974765d4623b1157ca738e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1095-cwe-79-improper-neutralization-of-in-72d847a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1095%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cantothemes%20Canto%20Testimonials&amp;severity=medium&amp;id=6974765f4623b1157ca739c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0806-cwe-89-improper-neutralization-of-sp-eccc3b64</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0806%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20andddd%20WP-ClanWars&amp;severity=medium&amp;id=6974765f4623b1157ca7399c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13374-cwe-434-unrestricted-upload-of-file-1e1b18e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13374%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20irisideatechsolutions%20Kalrav%20AI%20Agent&amp;severity=critical&amp;id=6974765d4623b1157ca738d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1076-cwe-352-cross-site-request-forgery-c-fde3f105</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1076%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bramdnl%20Star%20Review%20Manager&amp;severity=medium&amp;id=6974765f4623b1157ca739b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14906-cwe-352-cross-site-request-forgery--ea6107fb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14906%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20waqasvickey0071%20WP%20Youtube%20Video%20Gallery&amp;severity=medium&amp;id=6974765d4623b1157ca738f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12836-cwe-79-improper-neutralization-of-i-f9fdd795</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vektor-inc%20VK%20Google%20Job%20Posting%20Manager&amp;severity=medium&amp;id=6974765d4623b1157ca738cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0807-cwe-918-server-side-request-forgery--5f2404fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0807%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpmessiah%20Frontis%20Blocks%20%E2%80%94%20Block%20Library%20for%20the%20Block%20Editor&amp;severity=high&amp;id=6974765f4623b1157ca739a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1070-cwe-352-cross-site-request-forgery-c-b502509d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1070%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20adzbierajewski%20Alex%20User%20Counter&amp;severity=medium&amp;id=6974765f4623b1157ca739a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14903-cwe-352-cross-site-request-forgery--bc4661f2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14903%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stefanristic%20Simple%20Crypto%20Shortcodes&amp;severity=medium&amp;id=6974765d4623b1157ca738f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1257-cwe-98-improper-control-of-filename--dc21fe66</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1257%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20shazdeh%20Administrative%20Shortcodes&amp;severity=high&amp;id=697476614623b1157ca73aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13952-cwe-cwe-416-use-after-free-418-in-i-b52c6841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13952%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=6974300c4623b1157c7863fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24422-cwe-200-exposure-of-sensitive-infor-acf3cbca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24422%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=6974300c4623b1157c786400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24420-cwe-284-improper-access-control-in--b0a1dc5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24420%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=6974300c4623b1157c7863fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24469-cwe-22-improper-limitation-of-a-pat-e3953dca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24469%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20frustratedProton%20http-server&amp;severity=high&amp;id=6974300c4623b1157c786403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24421-cwe-862-missing-authorization-in-th-5b1dfbc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24421%3A%20CWE-862%3A%20Missing%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=697425804623b1157c76ac63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24412-cwe-20-improper-input-validation-in-51455e14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24412%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24411-cwe-20-improper-input-validation-in-4aee028d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24411%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24410-cwe-20-improper-input-validation-in-98f9ec0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24410%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24409-cwe-20-improper-input-validation-in-01d23c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24409%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=697425804623b1157c76ac4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24407-cwe-20-improper-input-validation-in-281869ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24407%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75171f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24406-cwe-20-improper-input-validation-in-71863bb7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24406%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75171a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24405-cwe-20-improper-input-validation-in-848b1bd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24405%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c751715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24404-cwe-20-improper-input-validation-in-acba84f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24404%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c751710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24403-cwe-20-improper-input-validation-in-db406130</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24403%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=69741e784623b1157c75170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22583-cwe-88-improper-neutralization-of-a-0166cd7b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22583%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22582-cwe-88-improper-neutralization-of-a-66ae174e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22582%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c72158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22586-cwe-321-hard-coded-cryptographic-ke-c2d9c280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22586%3A%20CWE-321%20Hard-coded%20Cryptographic%20Key%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22585-cwe-327-use-of-a-broken-or-risky-cr-13b354f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22585%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Salesforce%20Marketing%20Cloud%20Engagement&amp;severity=critical&amp;id=697417714623b1157c721595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24399-cwe-79-improper-neutralization-of-i-62f1bff2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chattermate%20chattermate.chat&amp;severity=critical&amp;id=697417714623b1157c72159b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-24-5f146b44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-24&amp;severity=medium&amp;id=697561b24623b1157cd82845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-24-6f7f1d5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-24&amp;severity=low&amp;id=69753e8a4623b1157cd1b5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24140-cwe-915-improperly-controlled-modif-32322b1d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24140%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20franklioxygen%20MyTube&amp;severity=low&amp;id=69740ce44623b1157c6b18a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24139-cwe-862-missing-authorization-in-fr-71264e43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24139%3A%20CWE-862%3A%20Missing%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=high&amp;id=69740ce44623b1157c6b18a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24474-cwe-95-improper-neutralization-of-d-3b3999e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24474%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20DioxusLabs%20components&amp;severity=medium&amp;id=69740ce44623b1157c6b18ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24128-cwe-79-improper-neutralization-of-i-7a9e0f4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=697405dd4623b1157c69e7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandworm-behind-cyberattack-on-polands-power-grid--cc7bd571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandworm%20behind%20cyberattack%20on%20Poland&apos;s%20power%20grid%20in%20late%202025&amp;severity=medium&amp;id=6973fed44623b1157c688627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1386-cwe-61-unix-symbolic-link-symlink-fo-74d39d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1386%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20Firecracker&amp;severity=medium&amp;id=6973dbae4623b1157c62ac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14947-cwe-862-missing-authorization-in-pl-4ef1f336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14947%3A%20CWE-862%20Missing%20Authorization%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=6973b17e4623b1157c537c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24423-cwe-306-missing-authentication-for--ca9947c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24423%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=6973aa764623b1157c50089a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71177-cwe-79-improper-neutralization-of-i-bb86400d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20LavaLite%20LavaLite%20CMS&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1299-cwe-93-in-python-software-foundation-d09db2f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1299%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-updates-kev-catalog-with-four-actively-exploi-76ea0673</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Updates%20KEV%20Catalog%20with%20Four%20Actively%20Exploited%20Software%20Vulnerabilities&amp;severity=low&amp;id=697395284623b1157c4bbbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0994-cwe-674-uncontrolled-recursion-in-py-57587e7e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0994%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Python%20Protobuf&amp;severity=high&amp;id=69738e544623b1157c4a43aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24636-missing-authorization-in-syed-balkh-90312e20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24636%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Sugar%20Calendar%20(Lite)&amp;severity=medium&amp;id=69738ae44623b1157c48be2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24635-improper-control-of-filename-for-in-95559a7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24635%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DevsBlink%20EduBlink%20Core&amp;severity=high&amp;id=69738ae44623b1157c48be28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24634-authorization-bypass-through-user-c-56f3c604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24634%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rustaurius%20Ultimate%20Reviews&amp;severity=medium&amp;id=69738ae44623b1157c48be25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24633-missing-authorization-in-passionate-c0f5644c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24633%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20Add%20Expires%20Headers%20%26%20Optimized%20Minify&amp;severity=medium&amp;id=69738ae24623b1157c48bd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24632-improper-neutralization-of-input-du-04975acf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jagdish1o1%20Delay%20Redirects&amp;severity=medium&amp;id=69738ae24623b1157c48bd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24631-authorization-bypass-through-user-c-27c93a86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24631%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Rosebud&amp;severity=medium&amp;id=69738ae24623b1157c48bd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24630-improper-neutralization-of-input-du-79a10227</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Design%20Stylish%20Cost%20Calculator&amp;severity=medium&amp;id=69738ae24623b1157c48bd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24629-improper-neutralization-of-input-du-a6e92fc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ability%2C%20Inc%20Web%20Accessibility%20with%20Max%20Access&amp;severity=medium&amp;id=69738ae24623b1157c48bd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24627-missing-authorization-in-trusona-tr-f54d15b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24627%3A%20Missing%20Authorization%20in%20Trusona%20Trusona%20for%20WordPress&amp;severity=medium&amp;id=69738ae24623b1157c48bd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24626-improper-neutralization-of-input-du-b42c4923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LogicHunt%20Logo%20Slider&amp;severity=medium&amp;id=69738ae24623b1157c48bd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24625-missing-authorization-in-imaginate--4adbbf43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24625%3A%20Missing%20Authorization%20in%20Imaginate%20Solutions%20File%20Uploads%20Addon%20for%20WooCommerce&amp;severity=medium&amp;id=69738ae24623b1157c48bd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24624-improper-neutralization-of-special--8fb4c855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24624%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20saeros1984%20Neoforum&amp;severity=high&amp;id=69738ae24623b1157c48bd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24623-improper-neutralization-of-input-du-80e9f0cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saeros1984%20Neoforum&amp;severity=medium&amp;id=69738ae24623b1157c48bcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24622-missing-authorization-in-sergiy-dzy-ff94e238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24622%3A%20Missing%20Authorization%20in%20Sergiy%20Dzysyak%20Suggestion%20Toolkit&amp;severity=medium&amp;id=69738ae14623b1157c48bcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24621-improper-neutralization-of-input-du-0a7ca6a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=medium&amp;id=69738ae14623b1157c48bcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24620-improper-neutralization-of-input-du-8bf5f163</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginOps%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69738ae14623b1157c48bcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24619-missing-authorization-in-popcash-po-ef6eb75f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24619%3A%20Missing%20Authorization%20in%20PopCash%20PopCash.Net%20Code%20Integration%20Tool&amp;severity=medium&amp;id=69738ae14623b1157c48bcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24617-improper-neutralization-of-input-du-54c61973</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Easy%20Modal&amp;severity=medium&amp;id=69738ae14623b1157c48bcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24616-missing-authorization-in-damian-wp--d1eb6ccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24616%3A%20Missing%20Authorization%20in%20Damian%20WP%20Popups&amp;severity=medium&amp;id=69738ae14623b1157c48bccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24615-missing-authorization-in-themebeez--266457b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24615%3A%20Missing%20Authorization%20in%20themebeez%20Cream%20Magazine&amp;severity=medium&amp;id=69738ae14623b1157c48bcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24614-improper-neutralization-of-input-du-6a32600a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Devsbrain%20Flex%20QR%20Code%20Generator&amp;severity=medium&amp;id=69738ae14623b1157c48bcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24613-missing-authorization-in-ecwid-by-l-950e77ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24613%3A%20Missing%20Authorization%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=medium&amp;id=69738ae14623b1157c48bcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24612-missing-authorization-in-themebeez--a5e5a476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24612%3A%20Missing%20Authorization%20in%20themebeez%20Orchid%20Store&amp;severity=medium&amp;id=69738ae14623b1157c48bcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24609-improper-control-of-filename-for-in-58da0be6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24609%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent&amp;severity=high&amp;id=69738adf4623b1157c48bc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24608-improper-control-of-filename-for-in-6091aaec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24608%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Laurent%20Core&amp;severity=high&amp;id=69738adf4623b1157c48bc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24607-missing-authorization-in-wptravelen-9729b4f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24607%3A%20Missing%20Authorization%20in%20wptravelengine%20Travel%20Monster&amp;severity=medium&amp;id=69738adf4623b1157c48bc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24606-missing-authorization-in-web-impian-ae007fd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24606%3A%20Missing%20Authorization%20in%20Web%20Impian%20Bayarcash%20WooCommerce&amp;severity=medium&amp;id=69738adf4623b1157c48bc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24605-missing-authorization-in-pencilwp-x-c38467c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24605%3A%20Missing%20Authorization%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69738adf4623b1157c48bc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24604-missing-authorization-in-themebeez--30922a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24604%3A%20Missing%20Authorization%20in%20themebeez%20Simple%20GDPR%20Cookie%20Compliance&amp;severity=medium&amp;id=69738adf4623b1157c48bc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24603-missing-authorization-in-themebeez--ba8bb196</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24603%3A%20Missing%20Authorization%20in%20themebeez%20Universal%20Google%20Adsense%20and%20Ads%20manager&amp;severity=medium&amp;id=69738adf4623b1157c48bc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24602-missing-authorization-in-raptive-ra-9e27e86e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24602&amp;severity=null&amp;id=69738adf4623b1157c48bc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24601-improper-neutralization-of-input-du-710442a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Pay%20Writer&amp;severity=medium&amp;id=69738adf4623b1157c48bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24600-improper-neutralization-of-input-du-6de255a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Review&amp;severity=medium&amp;id=69738adf4623b1157c48bc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24599-authorization-bypass-through-user-c-66b06521</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24599%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=69738ade4623b1157c48bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24598-missing-authorization-in-bestwebsof-aa9dc619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24598%3A%20Missing%20Authorization%20in%20bestwebsoft%20Multilanguage%20by%20BestWebSoft&amp;severity=medium&amp;id=69738ade4623b1157c48bbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24596-cross-site-request-forgery-csrf-in--ff3b2e0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marynixie%20Related%20Posts%20Thumbnails%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69738ade4623b1157c48bbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24595-missing-authorization-in-zohocrm-zo-194af72e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24595%3A%20Missing%20Authorization%20in%20zohocrm%20Zoho%20CRM%20Lead%20Magnet&amp;severity=medium&amp;id=69738ade4623b1157c48bbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24594-improper-neutralization-of-input-du-c8532c8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=69738ade4623b1157c48bbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24593-exposure-of-sensitive-system-inform-37772e7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24593%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Strategy11%20Team%20AWP%20Classifieds&amp;severity=medium&amp;id=69738ade4623b1157c48bbed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24591-improper-neutralization-of-input-du-af2203d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yasir129%20Turn%20Yoast%20SEO%20FAQ%20Block%20to%20Accordion&amp;severity=medium&amp;id=69738ade4623b1157c48bbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24589-insertion-of-sensitive-information--a73bfe64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24589%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Cargus%20eCommerce%20Cargus&amp;severity=medium&amp;id=69738ade4623b1157c48bbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24588-missing-authorization-in-topdevs-sm-9615a9b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24588%3A%20Missing%20Authorization%20in%20topdevs%20Smart%20Product%20Viewer&amp;severity=medium&amp;id=69738ade4623b1157c48bbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24587-missing-authorization-in-kutsy-ajax-73179f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24587%3A%20Missing%20Authorization%20in%20kutsy%20AJAX%20Hits%20Counter%20%2B%20Popular%20Posts%20Widget&amp;severity=medium&amp;id=69738ade4623b1157c48bbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24585-missing-authorization-in-hyyan-abo--78acc02e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24585%3A%20Missing%20Authorization%20in%20Hyyan%20Abo%20Fakher%20Hyyan%20WooCommerce%20Polylang%20Integration&amp;severity=medium&amp;id=69738adc4623b1157c48bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24584-improper-neutralization-of-input-du-ec5f6ef0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Tutor%20LMS%20BunnyNet%20Integration&amp;severity=medium&amp;id=69738adc4623b1157c48bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24583-missing-authorization-in-sumup-sumu-0943be14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24583%3A%20Missing%20Authorization%20in%20sumup%20SumUp%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=69738adc4623b1157c48bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24581-missing-authorization-in-wp-swings--9bef3430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24581%3A%20Missing%20Authorization%20in%20WP%20Swings%20Points%20and%20Rewards%20for%20WooCommerce&amp;severity=medium&amp;id=69738adc4623b1157c48bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24580-missing-authorization-in-ecwid-by-l-603dfe49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24580%3A%20Missing%20Authorization%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=medium&amp;id=69738adc4623b1157c48bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24579-missing-authorization-in-wp-messiah-122fb5ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24579%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=medium&amp;id=69738adc4623b1157c48bb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24578-missing-authorization-in-jahid-hasa-b4a7ce44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24578%3A%20Missing%20Authorization%20in%20Jahid%20Hasan%20Admin%20login%20URL%20Change&amp;severity=medium&amp;id=69738adc4623b1157c48bb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24577-missing-authorization-in-genetech-p-e7993b4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24577%3A%20Missing%20Authorization%20in%20Genetech%20Products%20Pie%20Register&amp;severity=medium&amp;id=69738adc4623b1157c48bb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24576-improper-neutralization-of-input-du-9d9d3333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20COP%20UX%20Flat&amp;severity=medium&amp;id=69738adc4623b1157c48bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24572-improper-neutralization-of-special--65c0f257</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24572%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=high&amp;id=69738adc4623b1157c48bb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24571-missing-authorization-in-boxnow-box-d4a2aee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24571%3A%20Missing%20Authorization%20in%20boxnow%20BOX%20NOW%20Delivery&amp;severity=medium&amp;id=69738adb4623b1157c48baab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24570-missing-authorization-in-wisdmlabs--eaf7e375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24570%3A%20Missing%20Authorization%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=medium&amp;id=69738adb4623b1157c48baa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24569-missing-authorization-in-sully-medi-7d996894</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24569%3A%20Missing%20Authorization%20in%20Sully%20Media%20Library%20File%20Size&amp;severity=medium&amp;id=69738adb4623b1157c48baa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24567-missing-authorization-in-briarinc-a-340f843a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24567%3A%20Missing%20Authorization%20in%20briarinc%20Anything%20Order%20by%20Terms&amp;severity=medium&amp;id=69738adb4623b1157c48baa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24566-missing-authorization-in-inet-inet--5af1f865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24566%3A%20Missing%20Authorization%20in%20iNET%20iNET%20Webkit&amp;severity=medium&amp;id=69738adb4623b1157c48ba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24565-insertion-of-sensitive-information--5598e7cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24565%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20bPlugins%20B%20Accordion&amp;severity=medium&amp;id=69738adb4623b1157c48ba9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24564-improper-neutralization-of-script-r-765f2f6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24564%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Israpil%20Textmetrics&amp;severity=medium&amp;id=69738adb4623b1157c48ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24563-missing-authorization-in-ashan-pere-431f5cbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24563%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20LifePress&amp;severity=medium&amp;id=69738adb4623b1157c48ba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24562-missing-authorization-in-ryviu-ryvi-3dfaa5e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24562%3A%20Missing%20Authorization%20in%20Ryviu%20Ryviu%20%26%238211%3B%20Product%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=69738adb4623b1157c48ba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24561-missing-authorization-in-mahmudul-h-fb60dcf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24561%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=medium&amp;id=69738adb4623b1157c48ba90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24559-insertion-of-sensitive-information--8ec50cc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24559%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20HubSpot&amp;severity=medium&amp;id=69738ada4623b1157c48ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24558-improper-neutralization-of-input-du-5028d6bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antoniobg%20ABG%20Rich%20Pins&amp;severity=medium&amp;id=69738ada4623b1157c48ba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24557-insertion-of-sensitive-information--af8c4bd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24557%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WEN%20Solutions%20Contact%20Form%207%20GetResponse%20Extension&amp;severity=medium&amp;id=69738ada4623b1157c48ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24556-missing-authorization-in-wpdive-ele-cf372713</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24556%3A%20Missing%20Authorization%20in%20wpdive%20ElementCamp&amp;severity=medium&amp;id=69738ada4623b1157c48ba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24555-improper-neutralization-of-input-du-0565a140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artplacer%20ArtPlacer%20Widget&amp;severity=medium&amp;id=69738ada4623b1157c48ba73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24553-exposure-of-sensitive-system-inform-69daedde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24553%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Dotstore%20Fraud%20Prevention%20For%20Woocommerce&amp;severity=medium&amp;id=69738ada4623b1157c48ba70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24551-missing-authorization-in-monetagwp--76cd26cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24551%3A%20Missing%20Authorization%20in%20monetagwp%20Monetag%20Official%20Plugin&amp;severity=medium&amp;id=69738ada4623b1157c48ba6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24550-improper-neutralization-of-input-du-a7368c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kaira%20Blockons&amp;severity=medium&amp;id=69738ada4623b1157c48ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24549-cross-site-request-forgery-csrf-in--7e41016f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Paolo%20GeoDirectory&amp;severity=medium&amp;id=69738ada4623b1157c48ba67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24548-server-side-request-forgery-ssrf-in-20243811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24548%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20princeahmed%20Radio%20Player&amp;severity=medium&amp;id=69738ada4623b1157c48ba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24544-missing-authorization-in-harmonic-d-75ce92fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24544%3A%20Missing%20Authorization%20in%20Harmonic%20Design%20HD%20Quiz&amp;severity=medium&amp;id=69738ad94623b1157c48ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24543-missing-authorization-in-horea-radu-32690cb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24543%3A%20Missing%20Authorization%20in%20Horea%20Radu%20Materialis%20Companion&amp;severity=medium&amp;id=69738ad94623b1157c48ba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24542-cross-site-request-forgery-csrf-in--dc2d7fc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20James%20Jacoby%20WP%20Term%20Order&amp;severity=medium&amp;id=69738ad94623b1157c48ba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24541-missing-authorization-in-mkscripts--d796b840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24541%3A%20Missing%20Authorization%20in%20mkscripts%20Download%20After%20Email&amp;severity=medium&amp;id=69738ad94623b1157c48ba38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24540-missing-authorization-in-prince-int-eb42e5d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24540%3A%20Missing%20Authorization%20in%20princeahmed%20Integrate%20Google%20Drive&amp;severity=medium&amp;id=69738ad94623b1157c48ba35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24539-missing-authorization-in-abcdatos-p-1558be26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24539%3A%20Missing%20Authorization%20in%20ABCdatos%20Protecci%C3%B3n%20de%20datos%20%26%238211%3B%20RGPD&amp;severity=medium&amp;id=69738ad94623b1157c48ba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24538-improper-control-of-filename-for-in-b3ce93bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24538%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=high&amp;id=69738ad94623b1157c48ba2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24535-missing-authorization-in-webdevstud-08f028cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24535%3A%20Missing%20Authorization%20in%20webdevstudios%20Automatic%20Featured%20Images%20from%20Videos&amp;severity=medium&amp;id=69738ad94623b1157c48ba2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24534-missing-authorization-in-upress-boo-8d170298</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24534%3A%20Missing%20Authorization%20in%20uPress%20Booter&amp;severity=high&amp;id=69738ad94623b1157c48ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24532-missing-authorization-in-sitelock-s-e609cf5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24532%3A%20Missing%20Authorization%20in%20SiteLock%20SiteLock%20Security%20%E2%80%93%20WP%20Hardening%2C%20Login%20Security%20%26%20Malware%20Scans&amp;severity=high&amp;id=69738ad94623b1157c48ba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24531-improper-control-of-filename-for-in-a81762ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Prowess&amp;severity=critical&amp;id=69738ad74623b1157c48b9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24530-missing-authorization-in-sheepfish--1f28bc89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24530%3A%20Missing%20Authorization%20in%20sheepfish%20WebP%20Conversion&amp;severity=medium&amp;id=69738ad74623b1157c48b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24529-missing-authorization-in-alejandro--a569df45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24529%3A%20Missing%20Authorization%20in%20Alejandro%20Quick%20Restaurant%20Reservations&amp;severity=medium&amp;id=69738ad74623b1157c48b9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24528-improper-neutralization-of-input-du-3f977a7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Nova%20Blocks&amp;severity=medium&amp;id=69738ad74623b1157c48b9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24526-improper-neutralization-of-input-du-ddb20594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Truman%20Email%20Inquiry%20%26amp%3B%20Cart%20Options%20for%20WooCommerce&amp;severity=medium&amp;id=69738ad74623b1157c48b9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24525-missing-authorization-in-cloudpanel-f4eecdbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24525%3A%20Missing%20Authorization%20in%20CloudPanel%20CLP%20Varnish%20Cache&amp;severity=medium&amp;id=69738ad74623b1157c48b9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24524-missing-authorization-in-essekia-ta-9dc80486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24524%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=69738ad74623b1157c48b9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24523-exposure-of-sensitive-system-inform-ffc70139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24523%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=high&amp;id=69738ad74623b1157c48b9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24522-missing-authorization-in-mythemesho-f09c71cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24522%3A%20Missing%20Authorization%20in%20MyThemeShop%20WP%20Subscribe&amp;severity=medium&amp;id=69738ad74623b1157c48b9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24521-cross-site-request-forgery-csrf-in--91d2ebfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24521%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Timur%20Kamaev%20Kama%20Thumbnail&amp;severity=medium&amp;id=69738ad74623b1157c48b9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-forticloud-sso-exploitation-agai-9c3231c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20FortiCloud%20SSO%20Exploitation%20Against%20Patched%20Devices&amp;severity=medium&amp;id=697380134623b1157c454d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-12b-gdpr-fines-net-ntlmv1-rainbow-ta-caf92026</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20%E2%82%AC1.2B%20GDPR%20Fines%2C%20Net-NTLMv1%20Rainbow%20Tables%2C%20Rockwell%20Security%20Notice&amp;severity=medium&amp;id=697380134623b1157c454d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13921-cwe-862-missing-authorization-in-we-a2c34bf9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13921%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=69737cc14623b1157c442f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishers-abuse-sharepoint-in-new-campaign-targetin-2e360e7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishers%20Abuse%20SharePoint%20in%20New%20Campaign%20Targeting%20Energy%20Sector&amp;severity=medium&amp;id=697375894623b1157c425251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-active-forticloud-sso-bypass-on--b01c7571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20Active%20FortiCloud%20SSO%20Bypass%20on%20Fully%20Patched%20FortiGate%20Firewalls&amp;severity=low&amp;id=6973dcc84623b1157c62f844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0914-cwe-79-improper-neutralization-of-in-f2472eb5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=medium&amp;id=69736eb04623b1157c3e7c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14866-cwe-863-incorrect-authorization-in--c314b303</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14866%3A%20CWE-863%20Incorrect%20Authorization%20in%20melapress%20Melapress%20Role%20Editor&amp;severity=high&amp;id=69736eb04623b1157c3e7c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4320-cwe-305-authentication-bypass-by-pri-e6a7f97a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4320%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Birebirsoft%20Software%20and%20Technology%20Solutions%20Sufirmam&amp;severity=critical&amp;id=69736eb04623b1157c3e7c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4319-cwe-307-improper-restriction-of-exce-193cd2e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4319%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Birebirsoft%20Software%20and%20Technology%20Solutions%20Sufirmam&amp;severity=critical&amp;id=69736eb04623b1157c3e7c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-armour-looking-into-data-breach-affecting-cu-296429ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20Armour%20Looking%20Into%20Data%20Breach%20Affecting%20Customers%E2%80%99%20Email%20Addresses&amp;severity=medium&amp;id=697363f14623b1157c3ba487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-jailbreaking-via-poetry-bypassing-chatbot-defen-1b200656</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20jailbreaking%20via%20poetry%3A%20bypassing%20chatbot%20defenses%20with%20rhyme%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6973646d4623b1157c3bc72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2204-cwe-79-improper-neutralization-of-in-874e6d94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tapandsign%20Technologies%20Software%20Inc.%20Tap%26Sign&amp;severity=medium&amp;id=697364324623b1157c3bbd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watering-hole-attack-targets-emeditor-users-with-i-395c198c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Watering%20Hole%20Attack%20Targets%20EmEditor%20Users%20With%20Information-Stealing%20Malware&amp;severity=medium&amp;id=6973fed44623b1157c68862a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-zimbra-collabora-9417db17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Zimbra%20Collaboration%20Vulnerability&amp;severity=medium&amp;id=6973606d4623b1157c3a53b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infotainment-ev-charger-exploits-earn-hackers-1m-a-a8400194</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infotainment%2C%20EV%20Charger%20Exploits%20Earn%20Hackers%20%241M%20at%20Pwn2Own%20Automotive%202026&amp;severity=medium&amp;id=69735ce94623b1157c392ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-forms-us-joint-venture-to-continue-operatio-76f3330a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Forms%20U.S.%20Joint%20Venture%20to%20Continue%20Operations%20Under%202025%20Executive%20Order&amp;severity=low&amp;id=6973dcc84623b1157c62f847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-uses-stolen-credentials-to-install-e6fb05ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%20Uses%20Stolen%20Credentials%20to%20Install%20LogMeIn%20RMM%20for%20Persistent%20Access&amp;severity=medium&amp;id=6973dcc84623b1157c62f84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-smartermail-flaw-exploited-for-admin-access-74135f93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20SmarterMail%20Flaw%20Exploited%20for%20Admin%20Access&amp;severity=medium&amp;id=69734ed94623b1157c2ee660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-the-vs-code-tasks-infection-vector-8b864c0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20the%20VS%20Code%20Tasks%20Infection%20Vector&amp;severity=medium&amp;id=697352904623b1157c3211dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/restless-spirit-new-attacks-on-russian-companies-8c7dee55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Restless%20Spirit%3A%20New%20Attacks%20on%20Russian%20Companies&amp;severity=medium&amp;id=697352904623b1157c321206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osiris-new-ransomware-experienced-attackers-1074fa06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Osiris%3A%20New%20Ransomware%2C%20Experienced%20Attackers%3F&amp;severity=medium&amp;id=69734b8c4623b1157c2daa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46699-cwe-1336-improper-neutralization-of-b242477c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46699%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Dell%20Data%20Protection%20Advisor&amp;severity=medium&amp;id=697348084623b1157c2c602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22276-cwe-312-cleartext-storage-of-sensit-fd4bfe9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22276%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697344814623b1157c299738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22275-cwe-540-inclusion-of-sensitive-info-c9207016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22275%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697395744623b1157c4bc736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22274-cwe-319-cleartext-transmission-of-s-eea32901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22274%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=medium&amp;id=697395744623b1157c4bc733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22273-cwe-1392-use-of-default-credentials-92dba187</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22273%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Dell%20ObjectScale&amp;severity=high&amp;id=69733d904623b1157c262fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2-venezuelans-convicted-in-us-for-using-malware-to-6fc657df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2%20Venezuelans%20Convicted%20in%20US%20for%20Using%20Malware%20to%20Hack%20ATMs&amp;severity=medium&amp;id=69733d4a4623b1157c260fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22271-cwe-319-cleartext-transmission-of-s-58afcc64</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22271%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dell%20ObjectScale&amp;severity=high&amp;id=697339f44623b1157c229e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1364-cwe-306-missing-authentication-for-c-1e047c96</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1364%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20JNC%20IAQS&amp;severity=critical&amp;id=697336714623b1157c2123f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1363-cwe-603-use-of-client-side-authentic-0ca429aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1363%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20JNC%20IAQS&amp;severity=critical&amp;id=697336714623b1157c2123f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-flags-multi-stage-aitm-phishing-and-bec--98e1168a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Flags%20Multi-Stage%20AitM%20Phishing%20and%20BEC%20Attacks%20Targeting%20Energy%20Firms&amp;severity=medium&amp;id=697332b74623b1157c1fcdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24515-cwe-476-null-pointer-dereference-in-b8ec9798</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24515%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=697328604623b1157c1b2149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0603-improper-neutralization-of-special-e-a3609d42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0603%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=high&amp;id=69731dd54623b1157c143c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14745-cwe-79-improper-neutralization-of-i-bf3204bd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14745%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=697308bc4623b1157c072633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14069-cwe-79-improper-neutralization-of-i-74650657</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=697308bc4623b1157c07262c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0927-cwe-862-missing-authorization-in-iqo-d88ff5fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0927%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=697308bc4623b1157c072638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67847-improper-control-of-generation-of-c-cb248159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67847%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=697301b44623b1157c02f7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15522-cwe-79-improper-neutralization-of-i-0d0a9356</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=697301b44623b1157c02f7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3839-product-ui-does-not-warn-user-of-uns-6fd6c1dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3839%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions&amp;severity=high&amp;id=6972f7294623b1157c000a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0710-null-pointer-dereference-e6c9efc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0710%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=6972f3a54623b1157cfeb6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15351-cwe-502-deserialization-of-untruste-4064d94f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15351%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20VectorStar&amp;severity=high&amp;id=6972f3a54623b1157cfeb6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15350-cwe-502-deserialization-of-untruste-789dbba9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15350%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20VectorStar&amp;severity=high&amp;id=6972f3a54623b1157cfeb6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15349-cwe-362-concurrent-execution-using--33e0b786</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15349%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15348-cwe-502-deserialization-of-untruste-09b2c70a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15348%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0778-cwe-306-missing-authentication-for-c-5789b63e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0778%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Enel%20X%20JuiceBox%2040&amp;severity=high&amp;id=6972f3a64623b1157cfeb73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0776-cwe-427-uncontrolled-search-path-ele-2b7de517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0776%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Discord%20Client&amp;severity=high&amp;id=6972f3a64623b1157cfeb73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0775-cwe-732-incorrect-permission-assignm-8c16c2d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0775%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20npm%20cli&amp;severity=high&amp;id=6972f3a64623b1157cfeb738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0761-cwe-94-improper-control-of-generatio-b5c5cee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0761%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Foundation%20Agents%20MetaGPT&amp;severity=critical&amp;id=6972f3a64623b1157cfeb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0760-cwe-502-deserialization-of-untrusted-515e434f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0760%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Foundation%20Agents%20MetaGPT&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0759-cwe-78-improper-neutralization-of-sp-b8238697</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0759%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Katana%20Network%20Development%20Starter%20Kit&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0755-cwe-78-improper-neutralization-of-sp-26f401d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0755%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Gemini%20MCP%20Tool%20gemini-mcp-tool&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15061-cwe-78-improper-neutralization-of-s-db540980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15061%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Framelink%20Figma%20MCP%20Server&amp;severity=critical&amp;id=6972f3a54623b1157cfeb6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15062-cwe-416-use-after-free-in-trimble-s-29f16b40</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15062%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp&amp;severity=high&amp;id=6972f3a54623b1157cfeb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0795-cwe-78-improper-neutralization-of-sp-b053339a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0795%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde335c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0794-cwe-416-use-after-free-in-algo-8180--3809cb62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0794%3A%20CWE-416%3A%20Use%20After%20Free%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0793-cwe-122-heap-based-buffer-overflow-i-9cc4df30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0793%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0792-cwe-121-stack-based-buffer-overflow--dbb59b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0792%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0791-cwe-121-stack-based-buffer-overflow--a601b9d4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0791%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde3350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0790-cwe-425-direct-request-forced-browsi-5a753de2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0790%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91b4623b1157cde334d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0789-cwe-200-exposure-of-sensitive-inform-027b9713</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0789%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91b4623b1157cde334a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0788-cwe-79-improper-neutralization-of-in-9ba223db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0788%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=medium&amp;id=6972e91a4623b1157cde2eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0787-cwe-78-improper-neutralization-of-sp-23f6af26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0787%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0786-cwe-78-improper-neutralization-of-sp-e4b3d7db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0786%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0785-cwe-78-improper-neutralization-of-sp-b9cd0258</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0785%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0784-cwe-78-improper-neutralization-of-sp-55e85409</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0784%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0783-cwe-78-improper-neutralization-of-sp-18839d80</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0783%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0782-cwe-78-improper-neutralization-of-sp-24290a57</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0782%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0781-cwe-78-improper-neutralization-of-sp-805caa8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0781%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0780-cwe-78-improper-neutralization-of-sp-8ac60f0c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0780%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0779-cwe-78-improper-neutralization-of-sp-3ed1666d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0779%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91a4623b1157cde2e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0796-cwe-78-improper-neutralization-of-sp-136f06d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0796%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ALGO%208180%20IP%20Audio%20Alerter&amp;severity=high&amp;id=6972e91b4623b1157cde335f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24304-cwe-284-improper-access-control-in--14ecfe54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24304%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Resource%20Manager&amp;severity=critical&amp;id=6972d78d4623b1157cbba819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-scan-you-scan-we-all-scan-for-knowledge-2e7a450b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20scan%2C%20you%20scan%2C%20we%20all%20scan%20for...%20%20knowledge%3F&amp;severity=medium&amp;id=697344804623b1157c2996f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-23-3b49b2d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-23&amp;severity=medium&amp;id=697410324623b1157c6bb3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70458-na-661089ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70458%3A%20n%2Fa&amp;severity=medium&amp;id=6973ed494623b1157c65c467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70457-na-91bb990f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70457%3A%20n%2Fa&amp;severity=critical&amp;id=6973e9bc4623b1157c653479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52026-na-3b0b91c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52026%3A%20n%2Fa&amp;severity=high&amp;id=6973df424623b1157c63574b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52025-na-f20ec138</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52025%3A%20n%2Fa&amp;severity=critical&amp;id=6973df424623b1157c635745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52024-na-2947f353</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52024%3A%20n%2Fa&amp;severity=critical&amp;id=6973df424623b1157c635724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52023-na-c942b319</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52023%3A%20n%2Fa&amp;severity=medium&amp;id=6973df424623b1157c63571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52022-na-edb52e96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52022%3A%20n%2Fa&amp;severity=medium&amp;id=6973df424623b1157c635719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67264-na-19e062e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67264%3A%20n%2Fa&amp;severity=high&amp;id=6973d8294623b1157c61e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70986-na-d27ddcd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70986%3A%20n%2Fa&amp;severity=high&amp;id=6973c7784623b1157c5d5f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70985-na-8685ccb7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70985%3A%20n%2Fa&amp;severity=critical&amp;id=6973c7784623b1157c5d5f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70983-na-4c0f9baf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70983%3A%20n%2Fa&amp;severity=critical&amp;id=6973c7784623b1157c5d5f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67231-na-c282a4c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67231%3A%20n%2Fa&amp;severity=medium&amp;id=6973a6f24623b1157c4f2e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67230-na-fe053529</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67230%3A%20n%2Fa&amp;severity=high&amp;id=6973a36c4623b1157c4e4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67229-na-c3418b4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67229%3A%20n%2Fa&amp;severity=critical&amp;id=6973a36c4623b1157c4e4f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67125-na-a855620d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67125%3A%20n%2Fa&amp;severity=medium&amp;id=697398e14623b1157c4c5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67124-na-ca750136</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67124%3A%20n%2Fa&amp;severity=medium&amp;id=697398e14623b1157c4c5d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66720-na-139a4d58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66720%3A%20n%2Fa&amp;severity=high&amp;id=697398e14623b1157c4c5d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66719-na-b82acee0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66719%3A%20n%2Fa&amp;severity=critical&amp;id=697398e14623b1157c4c5d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69908-na-60ef07ce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69908%3A%20n%2Fa&amp;severity=high&amp;id=697395744623b1157c4bc719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69907-na-6f934627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69907%3A%20n%2Fa&amp;severity=high&amp;id=69738e544623b1157c4a43a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-23-af1d534a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-23&amp;severity=low&amp;id=697305034623b1157c062155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20613-the-archivereaderextractcontents-fu-01297bbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20613%3A%20The%20ArchiveReader.extractContents()%20function%20used%20by%20cctl%20image%20load%20and%20container%20image%20load%20performs%20no%20pathname%20validation%20before%20extracting%20an%20archive%20member.%20This%20means%20that%20a%20carelessly%20or%20maliciously%20constructed%20archive%20can%20extract%20a%20file%20into%20any%20user-writable%20location%20on%20the%20system%20using%20relative%20pathnames.%20in%20Apple%20Container&amp;severity=high&amp;id=6972bee84623b1157c9abe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24132-cwe-77-improper-neutralization-of-s-bbb57000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24132%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=high&amp;id=6973c7784623b1157c5d5f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9290-cwe-760-use-of-a-one-way-hash-with-a-d3a39afd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9290%3A%20CWE-760%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20TP-Link%20Systems%20Inc.%20Omada%20Software%20Controller&amp;severity=medium&amp;id=6972b45c4623b1157c9773aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24130-cwe-90-improper-neutralization-of-s-c452a8c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24130%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Arksine%20moonraker&amp;severity=low&amp;id=6972ad5b4623b1157c962ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21264-cwe-79-improper-neutralization-of-i-3a8a0d1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21264%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Account&amp;severity=critical&amp;id=6972ad5b4623b1157c962b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21521-cwe-150-improper-neutralization-of--d51ff96e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21521%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Microsoft%20Microsoft%20365%20Word%20Copilot&amp;severity=high&amp;id=6972ad5b4623b1157c962ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21227-cwe-22-improper-limitation-of-a-pat-77139522</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21227%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Azure%20Logic%20Apps&amp;severity=high&amp;id=6972ad5b4623b1157c962b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24307-cwe-1287-improper-validation-of-spe-2aa8248d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24307%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=6972ad5b4623b1157c962bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24305-cwe-285-improper-authorization-in-m-d2b88af4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24305%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=6972ad5b4623b1157c962bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21524-cwe-200-exposure-of-sensitive-infor-60a2a02c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Explorer&amp;severity=high&amp;id=6972ad5b4623b1157c962ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24306-cwe-284-improper-access-control-in--9fb678ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24306%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Front%20Door&amp;severity=critical&amp;id=6972ad5b4623b1157c962bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21520-cwe-77-improper-neutralization-of-s-77ca71f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21520%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Copilot%20Studio&amp;severity=high&amp;id=6972ad5b4623b1157c962ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25051-cwe-256-in-automationdirect-click-p-0829e4f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25051%3A%20CWE-256%20in%20AutomationDirect%20CLICK%20Programmable%20Logic%20Controller&amp;severity=medium&amp;id=6972a64c4623b1157c93e393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24124-cwe-306-missing-authentication-for--40ffe6ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24124%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=6972a64c4623b1157c93e39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67652-cwe-261-in-automationdirect-click-p-7f6bbb91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67652%3A%20CWE-261%20in%20AutomationDirect%20CLICK%20Programmable%20Logic%20Controller&amp;severity=medium&amp;id=6972a64c4623b1157c93e397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24117-cwe-918-server-side-request-forgery-6b2fc737</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24117%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sigstore%20rekor&amp;severity=medium&amp;id=6972a2ca4623b1157c932a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20912-cwe-284-improper-access-control-in--c7861e51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20912%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20904-cwe-284-improper-access-control-in--2e778f4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20904%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c93283b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20897-cwe-284-improper-access-control-in--95afbe78</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20897%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20888-cwe-284-improper-access-control-in--da14ea46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20888%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c93282d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20883-cwe-284-improper-access-control-in--07110b27</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20883%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c932826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20800-cwe-200-exposure-of-sensitive-infor-66459a78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20800%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=medium&amp;id=6972a2c84623b1157c932820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20750-cwe-284-improper-access-control-in--d3838295</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20750%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=critical&amp;id=6972a2c84623b1157c932819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20736-cwe-284-improper-access-control-in--dbe267b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20736%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=high&amp;id=6972a2c84623b1157c932813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0798-cwe-284-improper-access-control-in-g-9f7e4564</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0798%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Gitea%20Gitea%20Open%20Source%20Git%20Server&amp;severity=low&amp;id=6972a2c84623b1157c93280d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24058-cwe-289-authentication-bypass-by-al-1716d926</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24058%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=6972a2c84623b1157c932849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23988-cwe-367-time-of-check-time-of-use-t-d8faaf97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23988%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20pbatard%20rufus&amp;severity=high&amp;id=69729f444623b1157c9270dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1201-cwe-639-authorization-bypass-through-834fd42e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1201%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Hubitat%20Elevation%20C3&amp;severity=critical&amp;id=69729f444623b1157c9270d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9289-cwe-79-improper-neutralization-of-in-19cd4d9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20Software%20Controller&amp;severity=medium&amp;id=69729f444623b1157c9270ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23954-cwe-22-improper-limitation-of-a-pat-19fa0791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23954%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lxc%20incus&amp;severity=high&amp;id=69729f444623b1157c9270d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14751-cwe-620-unverified-password-change--937f26e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14751%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Weintek%20cMT3072XH&amp;severity=high&amp;id=69729bc34623b1157c91e03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14750-cwe-472-external-control-of-assumed-8529627d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14750%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Weintek%20cMT3072XH&amp;severity=high&amp;id=69729bc34623b1157c91e037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23953-cwe-93-improper-neutralization-of-c-c46ca4a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23953%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20lxc%20incus&amp;severity=high&amp;id=69729bc34623b1157c91e03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23831-cwe-476-null-pointer-dereference-in-5f5dc905</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23831%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20sigstore%20rekor&amp;severity=medium&amp;id=6972983c4623b1157c90d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22234-cwe-208-timing-descrepency-in-sprin-90328a7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22234%3A%20CWE-208%20Timing%20Descrepency%20in%20Spring%20Spring%20Security&amp;severity=medium&amp;id=697294b84623b1157c8fbb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22281-cwe-367-time-of-check-time-of-use-t-e329b852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22281%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Dell%20PowerScale%20OneFS&amp;severity=low&amp;id=697278984623b1157c86bd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68609-the-authentication-algorithm-is-sou-1ae1ca03</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68609%3A%20The%20authentication%20algorithm%20is%20sound%2C%20but%20the%20implemented%20mechanism%20can%20be%20bypassed%20as%20the%20result%20of%20a%20separate%20weakness%20that%20is%20primary%20to%20the%20authentication%20error.%20in%20Palantir%20com.palantir.aries%3Aaries&amp;severity=medium&amp;id=697278984623b1157c86bd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22280-cwe-732-incorrect-permission-assign-6cecdb7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22280%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=697278984623b1157c86bd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22279-cwe-778-insufficient-logging-in-del-798655e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22279%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=697275ff4623b1157c865178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-adopts-ai-to-generate-powershell-backdoors-8ad75d8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KONNI%20Adopts%20AI%20to%20Generate%20PowerShell%20Backdoors&amp;severity=medium&amp;id=69728a2c4623b1157c8ba841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-osiris-ransomware-emerges-as-new-strain-using--a1641a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Osiris%20Ransomware%20Emerges%20as%20New%20Strain%20Using%20POORTRY%20Driver%20in%20BYOVD%20Attack&amp;severity=medium&amp;id=69729a4b4623b1157c918192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1260-cwe-119-improper-restriction-of-oper-100766b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1260%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Google%20Sentencepiece&amp;severity=high&amp;id=69725c7b4623b1157c8074a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0535-cwe-79-cross-site-scripting-xss-stor-762a37b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0535%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c8074a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0534-cwe-79-cross-site-scripting-xss-stor-196fd083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0534%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c80749f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0533-cwe-79-cross-site-scripting-xss-stor-3467f94f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0533%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=69725c7b4623b1157c80749a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22359-cross-site-request-forgery-csrf-in--07b46d41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AA-Team%20Wordpress%20Movies%20Bulk%20Importer&amp;severity=medium&amp;id=69725c7b4623b1157c8074ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24390-improper-control-of-filename-for-in-7f62e2f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24390%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QantumThemes%20Kentha%20Elementor%20Widgets&amp;severity=high&amp;id=697259354623b1157c7fb5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24389-improper-neutralization-of-input-du-09de9a97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Gallery%20PhotoBlocks&amp;severity=medium&amp;id=697259354623b1157c7fb5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24388-missing-authorization-in-ludwig-you-23aa5517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24388%3A%20Missing%20Authorization%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=medium&amp;id=697259344623b1157c7fb5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24387-missing-authorization-in-arul-prasa-257560ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24387%3A%20Missing%20Authorization%20in%20Arul%20Prasad%20J%20WP%20Quick%20Post%20Duplicator&amp;severity=medium&amp;id=697259344623b1157c7fb5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24386-missing-authorization-in-element-in-1f4e2eee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24386%3A%20Missing%20Authorization%20in%20Element%20Invader%20Element%20Invader%20%26%238211%3B%20Template%20Kits%20for%20Elementor&amp;severity=medium&amp;id=697259344623b1157c7fb5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24384-cross-site-request-forgery-csrf-in--f8a68dc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24384%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20launchinteractive%20Merge%20%2B%20Minify%20%2B%20Refresh&amp;severity=medium&amp;id=697259344623b1157c7fb5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24383-improper-neutralization-of-input-du-1eee0743</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Slider&amp;severity=medium&amp;id=697259344623b1157c7fb59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24381-server-side-request-forgery-ssrf-in-89ad9d0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24381%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20PhotoMe&amp;severity=medium&amp;id=697259344623b1157c7fb59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24380-missing-authorization-in-metagauss--46332224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24380%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=high&amp;id=697259344623b1157c7fb599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24379-authorization-bypass-through-user-c-4cd78a6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24379%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=critical&amp;id=697259344623b1157c7fb596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24377-exposure-of-sensitive-system-inform-f70ffb79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24377%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=high&amp;id=697259344623b1157c7fb593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24374-cross-site-request-forgery-csrf-in--45f51f13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24374%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metagauss%20RegistrationMagic&amp;severity=medium&amp;id=697259344623b1157c7fb590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24371-missing-authorization-in-bookingalg-a800e289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24371%3A%20Missing%20Authorization%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=critical&amp;id=697259324623b1157c7fb4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24368-missing-authorization-in-theme-one--d7fe8ecb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24368%3A%20Missing%20Authorization%20in%20Theme-one%20The%20Grid&amp;severity=high&amp;id=697259324623b1157c7fb4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24367-improper-neutralization-of-special--e34d4d03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24367%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=697259324623b1157c7fb4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24366-missing-authorization-in-yithemes-y-53476d99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24366%3A%20Missing%20Authorization%20in%20YITHEMES%20YITH%20WooCommerce%20Request%20A%20Quote&amp;severity=medium&amp;id=697259324623b1157c7fb4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24365-cross-site-request-forgery-csrf-in--3677c20e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24365%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20storeapps%20Stock%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=697259324623b1157c7fb4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24361-improper-neutralization-of-input-du-e5f68885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress%20%26%238211%3B%20Course%20Review&amp;severity=medium&amp;id=697259324623b1157c7fb4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24360-server-side-request-forgery-ssrf-in-0816eff8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24360%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=697259324623b1157c7fb4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24358-missing-authorization-in-expresstec-3b896dce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24358%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=high&amp;id=697259324623b1157c7fb4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24357-missing-authorization-in-brecht-wp--bf8e0b30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24357%3A%20Missing%20Authorization%20in%20Brecht%20WP%20Recipe%20Maker&amp;severity=high&amp;id=697259324623b1157c7fb4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24356-missing-authorization-in-roxnor-get-aceab1a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24356%3A%20Missing%20Authorization%20in%20Roxnor%20GetGenie&amp;severity=high&amp;id=697259324623b1157c7fb4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24355-improper-neutralization-of-input-du-11f35b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=medium&amp;id=697259304623b1157c7fb4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24354-improper-neutralization-of-input-du-161355a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Shortcodes%20%26%20Performance&amp;severity=medium&amp;id=697259304623b1157c7fb49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24353-missing-authorization-in-wpeverest--ac78bf46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24353%3A%20Missing%20Authorization%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=697259304623b1157c7fb49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23978-improper-control-of-filename-for-in-8d851faa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23978%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Softwebmedia%20Gyan%20Elements&amp;severity=critical&amp;id=697259304623b1157c7fb498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23976-improper-neutralization-of-input-du-6ac41a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Modula%20Image%20Gallery&amp;severity=high&amp;id=697259304623b1157c7fb495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23975-improper-control-of-filename-for-in-ee2a36af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23975%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Golo&amp;severity=critical&amp;id=697259304623b1157c7fb492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23974-missing-authorization-in-uxper-golo-7810e477</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23974%3A%20Missing%20Authorization%20in%20uxper%20Golo&amp;severity=high&amp;id=697259304623b1157c7fb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22483-cross-site-request-forgery-csrf-in--8ffc1a42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22483%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=697259304623b1157c7fb48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22482-server-side-request-forgery-ssrf-in-33290a0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22482%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wbolt.com%20IMGspider&amp;severity=critical&amp;id=697259304623b1157c7fb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22481-missing-authorization-in-rasedul-ha-8fa04e3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22481%3A%20Missing%20Authorization%20in%20Rasedul%20Haque%20Rumi%20BD%20Courier%20Order%20Ratio%20Checker&amp;severity=high&amp;id=697259304623b1157c7fb486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22472-missing-authorization-in-hassantafr-071552a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22472%3A%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=high&amp;id=6972592f4623b1157c7fb45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22470-improper-neutralization-of-special--54dc9382</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22470%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FireStorm%20Plugins%20FireStorm%20Professional%20Real%20Estate&amp;severity=high&amp;id=6972592f4623b1157c7fb45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22469-improper-neutralization-of-script-r-c45c909d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22469%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mwtemplates%20DeepDigital&amp;severity=medium&amp;id=6972592f4623b1157c7fb459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22468-missing-authorization-in-absolutepl-a3ce3083</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22468%3A%20Missing%20Authorization%20in%20AbsolutePlugins%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=6972592f4623b1157c7fb456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22466-missing-authorization-in-chandni-pa-218f879e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22466%3A%20Missing%20Authorization%20in%20Chandni%20Patel%20WP%20MapIt&amp;severity=medium&amp;id=6972592f4623b1157c7fb453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22464-improper-control-of-filename-for-in-8346f902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22464%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=6972592f4623b1157c7fb450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22463-improper-neutralization-of-input-du-2a8c2d80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Micro.company%20Form%20to%20Chat%20App&amp;severity=medium&amp;id=6972592f4623b1157c7fb44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22462-cross-site-request-forgery-csrf-in--8cb8bf5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richardevcom%20Add%20Polylang%20support%20for%20Customizer&amp;severity=medium&amp;id=6972592f4623b1157c7fb44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22461-missing-authorization-in-webappick--853908b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22461%3A%20Missing%20Authorization%20in%20WebAppick%20CTX%20Feed&amp;severity=medium&amp;id=6972592f4623b1157c7fb447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22458-missing-authorization-in-mikado-the-c57e9d29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22458%3A%20Missing%20Authorization%20in%20Mikado-Themes%20Wanderland&amp;severity=medium&amp;id=6972592f4623b1157c7fb444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22450-missing-authorization-in-select-the-933c36f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22450%3A%20Missing%20Authorization%20in%20Select-Themes%20Don%20Peppe&amp;severity=medium&amp;id=6972592e4623b1157c7fb41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22447-missing-authorization-in-select-the-9024751c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22447%3A%20Missing%20Authorization%20in%20Select-Themes%20Prowess&amp;severity=medium&amp;id=6972592e4623b1157c7fb418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22445-missing-authorization-in-proptech-p-2bdbf7a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22445%3A%20Missing%20Authorization%20in%20Proptech%20Plugin%20Apimo%20Connector&amp;severity=medium&amp;id=6972592e4623b1157c7fb415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22430-authorization-bypass-through-user-c-e00bb923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22430%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Verdure&amp;severity=medium&amp;id=6972592e4623b1157c7fb412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22426-authorization-bypass-through-user-c-729af269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22426%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Elated-Themes%20Sweet%20Jane&amp;severity=medium&amp;id=6972592e4623b1157c7fb40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22411-authorization-bypass-through-user-c-644870b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22411%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Dolcino&amp;severity=medium&amp;id=6972592e4623b1157c7fb40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22409-authorization-bypass-through-user-c-f17156d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22409%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Justicia&amp;severity=medium&amp;id=6972592e4623b1157c7fb409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22407-authorization-bypass-through-user-c-4f83e280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22407%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Roam&amp;severity=medium&amp;id=6972592e4623b1157c7fb406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22406-authorization-bypass-through-user-c-ca0974fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22406%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Overton&amp;severity=medium&amp;id=6972592e4623b1157c7fb403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22404-authorization-bypass-through-user-c-a75619ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22404%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Innovio&amp;severity=medium&amp;id=6972592e4623b1157c7fb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22402-improper-control-of-filename-for-in-754c2471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22402%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Triply&amp;severity=high&amp;id=6972592d4623b1157c7fb3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22401-improper-control-of-filename-for-in-76a3f9b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22401%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Freshio&amp;severity=high&amp;id=6972592c4623b1157c7fb3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22400-authorization-bypass-through-user-c-c9bc89e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22400%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Holmes&amp;severity=medium&amp;id=6972592c4623b1157c7fb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22398-authorization-bypass-through-user-c-c481578b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22398%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Fleur&amp;severity=medium&amp;id=6972592c4623b1157c7fb3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22396-authorization-bypass-through-user-c-691048d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22396%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Fiorello&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22393-authorization-bypass-through-user-c-04b4faa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22393%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Curly&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22391-authorization-bypass-through-user-c-fc417f40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22391%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Cocco&amp;severity=medium&amp;id=6972592c4623b1157c7fb3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22388-improper-neutralization-of-input-du-a9b4737b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22388%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20Owl%20Carousel%20WP&amp;severity=medium&amp;id=6972592c4623b1157c7fb3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22382-cross-site-request-forgery-csrf-in--13191fb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mikado-Themes%20PawFriends%20-%20Pet%20Shop%20and%20Veterinary%20WordPress%20Theme&amp;severity=medium&amp;id=6972592c4623b1157c7fb3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22360-cross-site-request-forgery-csrf-in--6ae3ccf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22360%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AA-Team%20SearchAzon&amp;severity=medium&amp;id=6972592c4623b1157c7fb3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22358-server-side-request-forgery-ssrf-in-1b0045c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22358%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Electrician%20-%20Electrical%20Service%20WordPress&amp;severity=medium&amp;id=6972592b4623b1157c7fb3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22355-cross-site-request-forgery-csrf-in--826c9a2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gregmolnar%20Simple%20XML%20Sitemap&amp;severity=high&amp;id=6972592b4623b1157c7fb3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22353-improper-neutralization-of-input-du-93d3dab9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=6972592b4623b1157c7fb3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22349-improper-neutralization-of-input-du-235d7551</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linux4me2%20Menu%20In%20Post&amp;severity=medium&amp;id=6972592b4623b1157c7fb3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22348-missing-authorization-in-tasos-fel--4a634023</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22348%3A%20Missing%20Authorization%20in%20Tasos%20Fel%20Civic%20Cookie%20Control&amp;severity=medium&amp;id=6972592b4623b1157c7fb3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22347-improper-neutralization-of-input-du-3a8aafff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20subhansanjaya%20Carousel%20Horizontal%20Posts%20Content%20Slider&amp;severity=medium&amp;id=6972592b4623b1157c7fb3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69321-improper-neutralization-of-input-du-f9444f41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Spa&amp;severity=high&amp;id=6972592b4623b1157c7fb3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69320-improper-neutralization-of-input-du-73ba0b60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Magazine&amp;severity=high&amp;id=6972592b4623b1157c7fb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69318-improper-neutralization-of-input-du-a9785071</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69318%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=high&amp;id=6972592b4623b1157c7fb3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69317-improper-neutralization-of-input-du-04556d88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20CarSpot&amp;severity=medium&amp;id=6972592b4623b1157c7fb3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69316-improper-neutralization-of-input-du-99167229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20TableOn&amp;severity=medium&amp;id=697259294623b1157c7fb2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69315-missing-authorization-in-nsquared-s-d79b69dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69315%3A%20Missing%20Authorization%20in%20NSquared%20Simply%20Schedule%20Appointments&amp;severity=medium&amp;id=697259294623b1157c7fb2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69314-improper-control-of-filename-for-in-dc5aee48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69314%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20Werkstatt&amp;severity=high&amp;id=697259294623b1157c7fb2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69313-missing-authorization-in-wpxpo-post-39d23d47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69313%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=high&amp;id=697259294623b1157c7fb2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69312-unrestricted-upload-of-file-with-da-1962b44b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69312%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=critical&amp;id=697259294623b1157c7fb2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69311-missing-authorization-in-broadstree-ad485980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69311%3A%20Missing%20Authorization%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=high&amp;id=697259294623b1157c7fb2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69300-missing-authorization-in-leap13-pre-c6282d69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69300%3A%20Missing%20Authorization%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=697259294623b1157c7fb2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69293-incorrect-privilege-assignment-in-e-a75b5c5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69293%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Final%20User&amp;severity=high&amp;id=697259294623b1157c7fb2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69292-incorrect-privilege-assignment-in-e-dee04ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69292%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20WP%20Membership&amp;severity=high&amp;id=697259294623b1157c7fb2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69193-missing-authorization-in-e-plugins--cc2fa49c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69193%3A%20Missing%20Authorization%20in%20e-plugins%20WP%20Membership&amp;severity=high&amp;id=697259294623b1157c7fb2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69192-missing-authorization-in-e-plugins--0ec334fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69192%3A%20Missing%20Authorization%20in%20e-plugins%20Real%20Estate%20Pro&amp;severity=high&amp;id=697259284623b1157c7fb29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69191-missing-authorization-in-e-plugins--df02ee49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69191%3A%20Missing%20Authorization%20in%20e-plugins%20ListingHub&amp;severity=high&amp;id=697259284623b1157c7fb299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69190-missing-authorization-in-e-plugins--20c44783</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69190%3A%20Missing%20Authorization%20in%20e-plugins%20Listihub&amp;severity=high&amp;id=697259284623b1157c7fb296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69188-missing-authorization-in-e-plugins--953bca88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69188%3A%20Missing%20Authorization%20in%20e-plugins%20fitness-trainer&amp;severity=high&amp;id=697259284623b1157c7fb293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69187-missing-authorization-in-e-plugins--38901f51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69187%3A%20Missing%20Authorization%20in%20e-plugins%20Final%20User&amp;severity=high&amp;id=697259284623b1157c7fb290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69186-missing-authorization-in-e-plugins--373ceb9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69186%3A%20Missing%20Authorization%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69185-missing-authorization-in-e-plugins--a22c5886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69185%3A%20Missing%20Authorization%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=697259284623b1157c7fb28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69184-missing-authorization-in-e-plugins--1c735838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69184%3A%20Missing%20Authorization%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69183-incorrect-privilege-assignment-in-e-d09b5863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69183%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69182-incorrect-privilege-assignment-in-e-52836f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69182%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=697259284623b1157c7fb281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69181-missing-authorization-in-e-plugins--20b23f39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69181%3A%20Missing%20Authorization%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259274623b1157c7fb240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69180-improper-neutralization-of-special--c6ea928d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69180%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themepassion%20Ultra%20Portfolio&amp;severity=high&amp;id=697259274623b1157c7fb23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69102-improper-neutralization-of-input-du-a3768e18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boopathi%20Rajan%20WP%20Test%20Email&amp;severity=high&amp;id=697259274623b1157c7fb23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69101-authentication-bypass-using-an-alte-2d65891d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69101%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap%20Core&amp;severity=critical&amp;id=697259274623b1157c7fb237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69100-improper-control-of-filename-for-in-10caffa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69100%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20North&amp;severity=high&amp;id=697259274623b1157c7fb234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69099-deserialization-of-untrusted-data-i-1885d6ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69099%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fuelthemes%20North&amp;severity=high&amp;id=697259274623b1157c7fb231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69098-improper-neutralization-of-input-du-0d6ef6ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWave%20Hide%20My%20WP&amp;severity=medium&amp;id=697259274623b1157c7fb22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69097-improper-limitation-of-a-pathname-t-bec48a3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69097%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=697259274623b1157c7fb22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69095-missing-authorization-in-designthem-5a534652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69095%3A%20Missing%20Authorization%20in%20designthemes%20Reservation%20Plugin&amp;severity=medium&amp;id=697259274623b1157c7fb228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69079-deserialization-of-untrusted-data-i-e3d04117</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69079%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Sound%20%7C%20Musical%20Instruments%20Online%20Store&amp;severity=critical&amp;id=697259274623b1157c7fb225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69078-improper-control-of-filename-for-in-1e28ec28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Malta&amp;severity=high&amp;id=697259264623b1157c7fb213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69077-improper-control-of-filename-for-in-6e04414f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69077%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hobo&amp;severity=high&amp;id=697259254623b1157c7fb210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69076-improper-control-of-filename-for-in-44999491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Modern%20Housewife&amp;severity=high&amp;id=697259254623b1157c7fb20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69075-improper-control-of-filename-for-in-6e77f5a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Yolox&amp;severity=high&amp;id=697259254623b1157c7fb20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69074-improper-control-of-filename-for-in-15f6344d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pearson%20Specter&amp;severity=high&amp;id=697259254623b1157c7fb207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69073-improper-control-of-filename-for-in-de805f38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69073%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Piqes&amp;severity=high&amp;id=697259254623b1157c7fb204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69072-improper-control-of-filename-for-in-accd6e7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69072%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Prider&amp;severity=high&amp;id=697259254623b1157c7fb201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69071-improper-control-of-filename-for-in-c5cbc3dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69071%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20TanTum&amp;severity=high&amp;id=697259254623b1157c7fb1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69070-improper-control-of-filename-for-in-c7e05fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69070%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tornados&amp;severity=high&amp;id=697259254623b1157c7fb1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69068-improper-control-of-filename-for-in-5bc3d201</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Muji&amp;severity=high&amp;id=697259254623b1157c7fb1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69067-improper-control-of-filename-for-in-1c5e241d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tails&amp;severity=high&amp;id=697259244623b1157c7fb199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69066-improper-control-of-filename-for-in-fbf1c2fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Indoor%20Plants&amp;severity=high&amp;id=697259244623b1157c7fb196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69065-improper-control-of-filename-for-in-0125eca1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Snow%20Mountain&amp;severity=high&amp;id=697259244623b1157c7fb193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69064-improper-control-of-filename-for-in-e5e3b94f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pets%20Land&amp;severity=high&amp;id=697259244623b1157c7fb190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69062-improper-control-of-filename-for-in-026b611d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Weedles&amp;severity=high&amp;id=697259244623b1157c7fb18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69061-improper-control-of-filename-for-in-af46349f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20MoveMe&amp;severity=high&amp;id=697259244623b1157c7fb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69060-improper-control-of-filename-for-in-ece79b00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20uReach&amp;severity=high&amp;id=697259244623b1157c7fb187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69059-improper-control-of-filename-for-in-e7e2fae9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DiveIt&amp;severity=high&amp;id=697259244623b1157c7fb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69058-improper-control-of-filename-for-in-0af349c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20PartyMaker&amp;severity=high&amp;id=697259244623b1157c7fb181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69057-improper-control-of-filename-for-in-e7112801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Eldon&amp;severity=high&amp;id=697259244623b1157c7fb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69056-improper-neutralization-of-input-du-2753daef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=697259234623b1157c7fb15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69055-improper-limitation-of-a-pathname-t-4dc23822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69055%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=medium&amp;id=697259234623b1157c7fb15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69054-improper-neutralization-of-input-du-2d9b6017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Logos%20Showcase&amp;severity=high&amp;id=697259234623b1157c7fb158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69053-improper-neutralization-of-input-du-fc3939a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=high&amp;id=697259234623b1157c7fb155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69052-missing-authorization-in-fmeaddons--529d7963</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69052%3A%20Missing%20Authorization%20in%20FmeAddons%20Registration%20%26%20Login%20with%20Mobile%20Phone%20Number%20for%20WooCommerce&amp;severity=critical&amp;id=697259234623b1157c7fb152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69051-improper-neutralization-of-input-du-1d159fb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro%20Reviews&amp;severity=high&amp;id=697259234623b1157c7fb14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69050-improper-control-of-filename-for-in-e568c597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Overworld&amp;severity=high&amp;id=697259234623b1157c7fb14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69049-improper-control-of-filename-for-in-3447a9f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20T%C3%B6bel&amp;severity=high&amp;id=697259234623b1157c7fb149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69048-improper-neutralization-of-input-du-70ab11b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=high&amp;id=697259234623b1157c7fb146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69047-improper-control-of-filename-for-in-a48d622c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20MaxShop&amp;severity=high&amp;id=697259234623b1157c7fb143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69046-improper-control-of-filename-for-in-c2cfd85b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebGeniusLab%20iRecco%20Core&amp;severity=high&amp;id=697259214623b1157c7fb0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69045-improper-neutralization-of-special--a883d199</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69045%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FooEvents%20FooEvents%20for%20WooCommerce&amp;severity=high&amp;id=697259214623b1157c7fb0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69044-improper-control-of-filename-for-in-c0000d97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69044%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Vango&amp;severity=high&amp;id=697259214623b1157c7fb0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69043-improper-control-of-filename-for-in-2586d312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Rashy&amp;severity=high&amp;id=697259214623b1157c7fb0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69042-improper-control-of-filename-for-in-720e31ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69042%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Lindo&amp;severity=high&amp;id=697259214623b1157c7fb0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69041-improper-control-of-filename-for-in-4af62cdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69041%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Dekoro&amp;severity=high&amp;id=697259214623b1157c7fb0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69040-improper-control-of-filename-for-in-240c0198</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69040%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Bfres&amp;severity=high&amp;id=697259214623b1157c7fb0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69039-improper-control-of-filename-for-in-048f92a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69039%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Bailly&amp;severity=high&amp;id=697259214623b1157c7fb0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69038-improper-control-of-filename-for-in-c598b21c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69038%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Hyori&amp;severity=high&amp;id=697259214623b1157c7fb0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69037-improper-control-of-filename-for-in-880c502b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69037%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Pippo&amp;severity=high&amp;id=697259214623b1157c7fb0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69036-deserialization-of-untrusted-data-i-9f2a316e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69036%3A%20Deserialization%20of%20Untrusted%20Data%20in%20strongholdthemes%20Tech%20Life%20CPT&amp;severity=high&amp;id=6972591f4623b1157c7fb093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69035-deserialization-of-untrusted-data-i-765fa325</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69035%3A%20Deserialization%20of%20Untrusted%20Data%20in%20strongholdthemes%20Dental%20Care%20CPT&amp;severity=high&amp;id=6972591f4623b1157c7fb090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69005-improper-control-of-filename-for-in-602266e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69005%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=high&amp;id=6972591f4623b1157c7fb08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69004-improper-control-of-filename-for-in-e44db283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69004%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20XpeedStudio%20Bajaar%20-%20Highly%20Customizable%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=6972591f4623b1157c7fb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69003-improper-neutralization-of-input-du-2ee1bb27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69003%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QantumThemes%20KenthaRadio&amp;severity=high&amp;id=6972591f4623b1157c7fb087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69002-deserialization-of-untrusted-data-i-f2e22d09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69002%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20OneLife&amp;severity=high&amp;id=6972591f4623b1157c7fb084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69001-improper-control-of-generation-of-c-3f9d1472</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69001%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Shahjahan%20Jewel%20FluentForm&amp;severity=medium&amp;id=6972591f4623b1157c7fb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68999-improper-neutralization-of-special--aebf6951</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68999%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=high&amp;id=6972591f4623b1157c7fb07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68986-unrestricted-upload-of-file-with-da-9a2c70a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68986%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Miion&amp;severity=critical&amp;id=6972591f4623b1157c7fb07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68913-improper-control-of-filename-for-in-4c8969fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Miion&amp;severity=high&amp;id=6972591f4623b1157c7fb078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68912-improper-limitation-of-a-pathname-t-88457da1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68912%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Harmonic%20Design%20HDForms&amp;severity=high&amp;id=6972591e4623b1157c7fb037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68911-missing-authorization-in-solacewp-s-3da9a145</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68911%3A%20Missing%20Authorization%20in%20solacewp%20Solace&amp;severity=medium&amp;id=6972591e4623b1157c7fb034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68910-unrestricted-upload-of-file-with-da-26187745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68910%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogzee&amp;severity=critical&amp;id=6972591e4623b1157c7fb031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68909-unrestricted-upload-of-file-with-da-cc6e01ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68909%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogistic&amp;severity=critical&amp;id=6972591e4623b1157c7fb02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68908-improper-control-of-filename-for-in-a6cabbd7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68908%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20temash%20Barberry&amp;severity=high&amp;id=6972591e4623b1157c7fb02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68907-improper-limitation-of-a-pathname-t-eb2a8a96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68907%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Hostme%20v2&amp;severity=high&amp;id=6972591e4623b1157c7fb028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68906-improper-neutralization-of-input-du-1c57cff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20-%20Video&amp;severity=high&amp;id=6972591e4623b1157c7fb025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68905-improper-control-of-filename-for-in-ff1e9f14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68905%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jegtheme%20JNews%20-%20Pay%20Writer&amp;severity=high&amp;id=6972591e4623b1157c7fb022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68904-improper-neutralization-of-input-du-ced207c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20-%20Frontend%20Submit&amp;severity=high&amp;id=6972591e4623b1157c7fb01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68903-deserialization-of-untrusted-data-i-5b3f44b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68903%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591e4623b1157c7fb01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68902-improper-limitation-of-a-pathname-t-c538a106</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68902%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591d4623b1157c7fb006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68901-improper-limitation-of-a-pathname-t-db9c136c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68901%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AivahThemes%20Anona&amp;severity=high&amp;id=6972591d4623b1157c7fb003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68900-improper-neutralization-of-input-du-bdddb953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold&amp;severity=medium&amp;id=6972591d4623b1157c7fb000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68899-deserialization-of-untrusted-data-i-96b08e62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68899%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Vivagh&amp;severity=high&amp;id=6972591d4623b1157c7faffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68898-improper-neutralization-of-input-du-e8867837</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cjjparadoxmax%20Synergy%20Project%20Manager&amp;severity=medium&amp;id=6972591d4623b1157c7faffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68896-missing-authorization-in-vrpr-wdv-o-6ae5876d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68896%3A%20Missing%20Authorization%20in%20vrpr%20WDV%20One%20Page%20Docs&amp;severity=medium&amp;id=6972591d4623b1157c7faff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68894-improper-neutralization-of-input-du-ce857be1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shoutoutglobal%20ShoutOut&amp;severity=high&amp;id=6972591d4623b1157c7faff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68884-improper-neutralization-of-input-du-6fffc42e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arevico%20WP%20Simple%20Redirect&amp;severity=high&amp;id=6972591d4623b1157c7faff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68883-improper-neutralization-of-input-du-e02bcec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extremeidea%20bidorbuy%20Store%20Integrator&amp;severity=high&amp;id=6972591d4623b1157c7fafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68881-improper-neutralization-of-special--14a35230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68881%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20AppExperts&amp;severity=high&amp;id=6972591d4623b1157c7fafeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68871-improper-neutralization-of-input-du-729a4405</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20noCreativity%20Dooodl&amp;severity=high&amp;id=6972591b4623b1157c7fafb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68869-incorrect-privilege-assignment-in-l-4eda534f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68869%3A%20Incorrect%20Privilege%20Assignment%20in%20LazyCoders%20LLC%20LazyTasks&amp;severity=critical&amp;id=6972591b4623b1157c7fafae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68866-improper-neutralization-of-input-du-2b2c9d00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woofer696%20Dinatur&amp;severity=high&amp;id=6972591b4623b1157c7fafab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68864-improper-neutralization-of-input-du-75a71c1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=high&amp;id=6972591b4623b1157c7fafa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68859-improper-neutralization-of-input-du-fc6a1396</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agmorpheus%20Syntax%20Highlighter%20Compress&amp;severity=high&amp;id=6972591b4623b1157c7fafa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68858-improper-neutralization-of-input-du-a4ecdeab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Casey%20Bisson%20wpCAS&amp;severity=high&amp;id=6972591b4623b1157c7fafa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68857-improper-neutralization-of-special--6c1018a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68857%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ichurakov%20Paid%20Downloads&amp;severity=critical&amp;id=6972591b4623b1157c7faf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68849-improper-neutralization-of-input-du-34789717</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frank%20Corso%20Quote%20Master&amp;severity=high&amp;id=6972591b4623b1157c7faf9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68839-improper-neutralization-of-input-du-9948d05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Remi%20Corson%20Easy%20Theme%20Options&amp;severity=high&amp;id=6972591b4623b1157c7faf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68838-improper-neutralization-of-input-du-8d7400fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20expresstechsoftware%20MemberPress%20Discord%20Addon&amp;severity=high&amp;id=6972591b4623b1157c7faf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68835-improper-neutralization-of-input-du-c756e8de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matiskiba%20Ravpage&amp;severity=high&amp;id=6972591a4623b1157c7faf89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68558-missing-authorization-in-averta-dep-828d605f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68558%3A%20Missing%20Authorization%20in%20averta%20Depicter%20Slider&amp;severity=medium&amp;id=6972591a4623b1157c7faf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68538-improper-neutralization-of-input-du-c4004e1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Craft&amp;severity=high&amp;id=6972591a4623b1157c7faf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68520-improper-neutralization-of-input-du-2e74c0b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20DotLife&amp;severity=high&amp;id=6972591a4623b1157c7faf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68518-improper-neutralization-of-input-du-a8703c1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Hoteller&amp;severity=high&amp;id=6972591a4623b1157c7faf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68510-improper-control-of-filename-for-in-5dd548ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68510%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6972591a4623b1157c7faf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68073-missing-authorization-in-ninja-team-07902cf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68073%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=medium&amp;id=6972591a4623b1157c7faf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68072-missing-authorization-in-merv-barre-cc985565</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68072%3A%20Missing%20Authorization%20in%20Merv%20Barrett%20Easy%20Property%20Listings&amp;severity=medium&amp;id=6972591a4623b1157c7faf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68059-missing-authorization-in-e-plugins--77d62311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68059%3A%20Missing%20Authorization%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=6972591a4623b1157c7faf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68058-missing-authorization-in-e-plugins--ab67652f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68058%3A%20Missing%20Authorization%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=6972591a4623b1157c7faf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68057-missing-authorization-in-e-plugins--2d9c4b66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68057%3A%20Missing%20Authorization%20in%20e-plugins%20Hospital%20Doctor%20Directory&amp;severity=high&amp;id=697259194623b1157c7faf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68047-deserialization-of-untrusted-data-i-c49bf780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68047%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Arraytics%20Eventin&amp;severity=high&amp;id=697259194623b1157c7faf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68046-exposure-of-sensitive-system-inform-ba4c0977</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68046%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeHunk%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=medium&amp;id=697259194623b1157c7faf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68041-improper-neutralization-of-input-du-0df36845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codisto%20Omnichannel%20for%20WooCommerce&amp;severity=high&amp;id=697259194623b1157c7faf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68039-missing-authorization-in-chris-simm-a82594ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68039%3A%20Missing%20Authorization%20in%20Chris%20Simmons%20WP%20BackItUp&amp;severity=medium&amp;id=697259194623b1157c7faf4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68035-insertion-of-sensitive-information--fbcffc5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68035%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20tabbyai%20Tabby%20Checkout&amp;severity=high&amp;id=697259194623b1157c7faf49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68034-improper-neutralization-of-special--55f4b309</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68034%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CleverReach%C2%AE%20CleverReach%C2%AE%20WP&amp;severity=critical&amp;id=697259194623b1157c7faf46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68030-server-side-request-forgery-ssrf-in-a21d7013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68030%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Messiah%20Frontis%20Blocks&amp;severity=high&amp;id=697259194623b1157c7faf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68027-incorrect-privilege-assignment-in-t-a14f0fe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68027%3A%20Incorrect%20Privilege%20Assignment%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=697259194623b1157c7faf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68020-missing-authorization-in-wanotifier-407a07fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68020%3A%20Missing%20Authorization%20in%20WANotifier%20Notifier&amp;severity=medium&amp;id=69cd7651e6bfc5ba1df0b2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68019-missing-authorization-in-cleverplug-dd70e525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68019%3A%20Missing%20Authorization%20in%20cleverplugins%20SEO%20Booster&amp;severity=medium&amp;id=697259194623b1157c7faf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68018-missing-authorization-in-ilmosys-or-c5c178d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68018%3A%20Missing%20Authorization%20in%20StackWC%20Order%20Listener%20for%20WooCommerce&amp;severity=critical&amp;id=697259184623b1157c7faf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68017-improper-neutralization-of-special--6206eb7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68017%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Antideo%20Antideo%20Email%20Validator&amp;severity=high&amp;id=697259184623b1157c7faf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68016-missing-authorization-in-onepay-sri-a47aed27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68016%3A%20Missing%20Authorization%20in%20Onepay%20Sri%20Lanka%20onepay%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=697259184623b1157c7faf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68015-improper-control-of-generation-of-c-7c3f3dc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68015%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Vollstart%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=critical&amp;id=697259184623b1157c7faf0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68013-missing-authorization-in-cardpaysol-a6e7175f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68013%3A%20Missing%20Authorization%20in%20cardpaysolutions%20Payment%20Gateway%20Authorize.Net%20CIM%20for%20WooCommerce&amp;severity=medium&amp;id=697259184623b1157c7faf0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68012-improper-neutralization-of-input-du-3220ddc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dmytro%20Shteflyuk%20CodeColorer&amp;severity=high&amp;id=697259184623b1157c7faf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68011-improper-neutralization-of-input-du-cf88fe4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GLS%20GLS%20Shipping%20for%20WooCommerce&amp;severity=high&amp;id=697259184623b1157c7faf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68009-missing-authorization-in-codeless-s-5fcdc7a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68009%3A%20Missing%20Authorization%20in%20Codeless%20Slider%20Templates&amp;severity=medium&amp;id=697259184623b1157c7faf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68008-improper-neutralization-of-input-du-69815023</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20WP%20Mail&amp;severity=high&amp;id=697259184623b1157c7faf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68007-missing-authorization-in-event-espr-82b8dec6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68007%3A%20Missing%20Authorization%20in%20Event%20Espresso%20Event%20Espresso%204%20Decaf&amp;severity=medium&amp;id=697259184623b1157c7faefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68006-insertion-of-sensitive-information--ed1feff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68006%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=medium&amp;id=697259174623b1157c7faedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68004-improper-neutralization-of-input-du-206a2d26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kapil%20Chugh%20My%20Post%20Order&amp;severity=high&amp;id=697259174623b1157c7faed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68003-missing-authorization-in-renatoatsh-fd0be448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68003%3A%20Missing%20Authorization%20in%20renatoatshown%20Shown%20Connector&amp;severity=medium&amp;id=697259174623b1157c7faed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68001-unrestricted-upload-of-file-with-da-16d7d75d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68001%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20garidium%20g-FFL%20Checkout&amp;severity=critical&amp;id=697259174623b1157c7faed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67968-unrestricted-upload-of-file-with-da-18899948</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67968%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20InspiryThemes%20Real%20Homes%20CRM&amp;severity=critical&amp;id=697259174623b1157c7faed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67967-missing-authorization-in-e-plugins--149fa327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67967%3A%20Missing%20Authorization%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259174623b1157c7faecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67966-incorrect-privilege-assignment-in-e-8c144b61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67966%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Lawyer%20Directory&amp;severity=high&amp;id=697259174623b1157c7faeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67964-improper-neutralization-of-input-du-82f02692</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Homey%20Core&amp;severity=high&amp;id=697259174623b1157c7faec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67963-improper-limitation-of-a-pathname-t-9f6b932a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67963%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ovatheme%20Movie%20Booking&amp;severity=high&amp;id=697259174623b1157c7faec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67961-server-side-request-forgery-ssrf-in-9205865a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67961%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Marco%20van%20Wieren%20WPO365&amp;severity=medium&amp;id=697259174623b1157c7faec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67960-improper-neutralization-of-input-du-05758a63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout-Core&amp;severity=high&amp;id=697259154623b1157c7fae98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67959-improper-neutralization-of-input-du-8f93f3d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout&amp;severity=high&amp;id=697259154623b1157c7fae95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67958-missing-authorization-in-taxcloud-t-cbf96692</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67958%3A%20Missing%20Authorization%20in%20Taxcloud%20TaxCloud%20for%20WooCommerce&amp;severity=medium&amp;id=697259154623b1157c7fae92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67957-improper-control-of-filename-for-in-4f9141ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67957%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TangibleWP%20Listivo%20Core&amp;severity=high&amp;id=697259154623b1157c7fae8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67956-missing-authorization-in-wpeverest--696615a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67956%3A%20Missing%20Authorization%20in%20wpeverest%20User%20Registration&amp;severity=high&amp;id=697259154623b1157c7fae8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67955-improper-control-of-filename-for-in-35869ba7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67955%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TangibleWP%20MyHome%20Core&amp;severity=high&amp;id=697259154623b1157c7fae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67954-exposure-of-sensitive-system-inform-9becc56d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67954%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=medium&amp;id=697259154623b1157c7fae86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67953-incorrect-privilege-assignment-in-b-40b90b35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67953%3A%20Incorrect%20Privilege%20Assignment%20in%20Booking%20Activities%20Team%20Booking%20Activities&amp;severity=high&amp;id=697259154623b1157c7fae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67952-improper-neutralization-of-input-du-f1c53f92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Tour&amp;severity=high&amp;id=697259154623b1157c7fae80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67949-improper-neutralization-of-input-du-f6293952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designingmedia%20Hostiko&amp;severity=high&amp;id=697259154623b1157c7fae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67947-improper-neutralization-of-input-du-b6ce2862</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20AdForest%20Elementor&amp;severity=high&amp;id=697259144623b1157c7fae70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67946-improper-control-of-filename-for-in-1f2c95b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scriptsbundle%20AdForest&amp;severity=high&amp;id=697259144623b1157c7fae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67945-improper-neutralization-of-special--449b0da3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67945%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MailerLite%20MailerLite%20%E2%80%93%20WooCommerce%20integration&amp;severity=critical&amp;id=697259144623b1157c7fae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67944-improper-control-of-generation-of-c-ce4f4ae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67944%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nelio%20Software%20Nelio%20AB%20Testing&amp;severity=critical&amp;id=697259144623b1157c7fae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67943-improper-neutralization-of-input-du-17b92856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=697259144623b1157c7fae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67942-missing-authorization-in-peachpayme-4aeb6f3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67942%3A%20Missing%20Authorization%20in%20peachpayments%20Peach%20Payments%20Gateway&amp;severity=medium&amp;id=697259144623b1157c7fae61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67941-improper-control-of-filename-for-in-f9123d65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20The%20Aisle&amp;severity=high&amp;id=697259144623b1157c7fae5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67940-improper-control-of-filename-for-in-f98f49f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67940%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Powerlift&amp;severity=high&amp;id=697259144623b1157c7fae5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67938-improper-control-of-filename-for-in-26398e46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67938%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Biagiotti&amp;severity=high&amp;id=697259144623b1157c7fae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67923-improper-neutralization-of-input-du-d9f31cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=697259144623b1157c7fae55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67626-cross-site-request-forgery-csrf-in--99cfe8ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67626%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Angel%20Costa%20WP%20SEO%20Search&amp;severity=medium&amp;id=697259134623b1157c7fae30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67620-improper-neutralization-of-input-du-9343df07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CleverSoft%20Anon&amp;severity=high&amp;id=697259134623b1157c7fae2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67619-deserialization-of-untrusted-data-i-b01a6210</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67619%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Kids%20Heaven&amp;severity=high&amp;id=697259134623b1157c7fae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67617-deserialization-of-untrusted-data-i-ec276769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67617%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Consult%20Aid&amp;severity=critical&amp;id=697259134623b1157c7fae27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67616-improper-control-of-filename-for-in-b42999dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67616%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Mella&amp;severity=high&amp;id=697259134623b1157c7fae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67615-improper-control-of-filename-for-in-1d5be9e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67615%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bslthemes%20Myour&amp;severity=high&amp;id=697259134623b1157c7fae21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67614-improper-neutralization-of-input-du-d31edf7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foreverpinetree%20TheNa&amp;severity=high&amp;id=697259134623b1157c7fae1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66143-missing-authorization-in-merkulove--b040ea63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66143%3A%20Missing%20Authorization%20in%20merkulove%20Crumber&amp;severity=medium&amp;id=697259134623b1157c7fae1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66142-missing-authorization-in-merkulove--1b81cea7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66142%3A%20Missing%20Authorization%20in%20merkulove%20Comparimager%20for%20Elementor&amp;severity=medium&amp;id=697259134623b1157c7fae18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66141-missing-authorization-in-merkulove--dda7b57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66141%3A%20Missing%20Authorization%20in%20merkulove%20Scroller&amp;severity=medium&amp;id=697259134623b1157c7fae15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66140-missing-authorization-in-merkulove--36c3a702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66140%3A%20Missing%20Authorization%20in%20merkulove%20Uper%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66139-missing-authorization-in-merkulove--9b6a4521</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66139%3A%20Missing%20Authorization%20in%20merkulove%20Audier%20For%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66138-missing-authorization-in-merkulove--5a8fd2dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66138%3A%20Missing%20Authorization%20in%20merkulove%20Motionger%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66137-missing-authorization-in-merkulove--ea8c0169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66137%3A%20Missing%20Authorization%20in%20merkulove%20Searcher%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66136-missing-authorization-in-merkulove--c05e35f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66136%3A%20Missing%20Authorization%20in%20merkulove%20Carter%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66135-missing-authorization-in-merkulove--9fdd0379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66135%3A%20Missing%20Authorization%20in%20merkulove%20Imager%20for%20Elementor&amp;severity=high&amp;id=697259114623b1157c7fab52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64252-server-side-request-forgery-ssrf-in-640fda99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64252%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Marco%20Milesi%20ANAC%20XML%20Viewer&amp;severity=medium&amp;id=697259114623b1157c7fab4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63051-exposure-of-sensitive-system-inform-806a3162</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63051%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20sizam%20REHub%20Framework&amp;severity=medium&amp;id=697259114623b1157c7fab4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63026-improper-neutralization-of-input-du-6171ca83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Restaurant%20Theme%20Elements%20for%20Elementor&amp;severity=medium&amp;id=697259114623b1157c7fab49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63019-insertion-of-sensitive-information--b974c03d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63019%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Johan%20Jonk%20Stenstr%C3%B6m%20Cookies%20and%20Content%20Security%20Policy&amp;severity=high&amp;id=697259114623b1157c7fab46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63018-missing-authorization-in-wproyal-ba-287c1c57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63018%3A%20Missing%20Authorization%20in%20wproyal%20Bard&amp;severity=high&amp;id=697259104623b1157c7fab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63017-improper-control-of-filename-for-in-95b29fce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20WerkStatt%20Plugin&amp;severity=high&amp;id=697259104623b1157c7fab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62754-missing-authorization-in-kapil-paul-700b8d31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62754%3A%20Missing%20Authorization%20in%20Kapil%20Paul%20Payment%20Gateway%20bKash%20for%20WC&amp;severity=critical&amp;id=697259104623b1157c7fab33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62741-server-side-request-forgery-ssrf-in-ff1e7115</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62741%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Pool%20Services&amp;severity=critical&amp;id=697259104623b1157c7fab30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62106-missing-authorization-in-mario-pesh-02fbceda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62106%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=high&amp;id=697259104623b1157c7fab2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62077-improper-neutralization-of-input-du-be80ae75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SEOSEON%20EUROPE%20S.L%20Affiliate%20Link%20Tracker&amp;severity=medium&amp;id=697259104623b1157c7fab2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62056-unrestricted-upload-of-file-with-da-e7a7dcf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62056%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20News%20Event&amp;severity=critical&amp;id=697259104623b1157c7fab27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62050-unrestricted-upload-of-file-with-da-a37648b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62050%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Blogmatic&amp;severity=critical&amp;id=697259104623b1157c7fab24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5805-missing-authorization-in-ninetheme-e-58fb9aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5805%3A%20Missing%20Authorization%20in%20Ninetheme%20Electron&amp;severity=high&amp;id=697259104623b1157c7fab21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54003-improper-control-of-filename-for-in-943115b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Depot&amp;severity=critical&amp;id=697259104623b1157c7fab1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54002-missing-authorization-in-jthemes-xs-85c2024b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54002%3A%20Missing%20Authorization%20in%20Jthemes%20xSmart&amp;severity=high&amp;id=6972590f4623b1157c7faae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53240-improper-neutralization-of-input-du-83e43970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamlabs%20WordPress%20Photo%20Gallery&amp;severity=medium&amp;id=6972590f4623b1157c7faadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52762-improper-neutralization-of-input-du-438a830f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20flexo-posts-manager&amp;severity=medium&amp;id=6972590f4623b1157c7faada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52746-improper-neutralization-of-input-du-1924e741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayecode%20Restaurante&amp;severity=medium&amp;id=6972590f4623b1157c7faad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50007-incorrect-privilege-assignment-in-j-0580525c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50007%3A%20Incorrect%20Privilege%20Assignment%20in%20Jthemes%20xSmart&amp;severity=high&amp;id=6972590f4623b1157c7faad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50006-improper-neutralization-of-input-du-6fadda2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jthemes%20xSmart&amp;severity=medium&amp;id=6972590f4623b1157c7faad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50005-improper-neutralization-of-input-du-987382b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=6972590f4623b1157c7faace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50004-deserialization-of-untrusted-data-i-eeb6d952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50004%3A%20Deserialization%20of%20Untrusted%20Data%20in%20artbees%20JupiterX%20Core&amp;severity=high&amp;id=6972590f4623b1157c7faacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50003-improper-control-of-filename-for-in-781a9983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Amuli&amp;severity=critical&amp;id=6972590f4623b1157c7faac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50002-unrestricted-upload-of-file-with-da-de6744ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50002%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Farost%20Energia&amp;severity=critical&amp;id=6972590f4623b1157c7faac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49994-improper-control-of-filename-for-in-2047345c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Athens&amp;severity=critical&amp;id=6972590d4623b1157c7faa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49375-missing-authorization-in-cozythemes-9aa14118</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49375%3A%20Missing%20Authorization%20in%20cozythemes%20HomeLancer&amp;severity=high&amp;id=6972590d4623b1157c7faa9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49336-improper-neutralization-of-input-du-29b8cad1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49336%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pondol%20Pondol%20BBS&amp;severity=medium&amp;id=6972590d4623b1157c7faa99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49249-improper-neutralization-of-input-du-8e63c1f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49249%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ApusTheme%20Drone&amp;severity=medium&amp;id=6972590d4623b1157c7faa96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49066-improper-neutralization-of-input-du-85247c1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Accordion%20Slider%20PRO&amp;severity=medium&amp;id=6972590d4623b1157c7faa93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49055-improper-neutralization-of-special--bf4f12a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49055%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=critical&amp;id=6972590d4623b1157c7faa90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49050-improper-neutralization-of-special--ceb451f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49050%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=high&amp;id=6972590d4623b1157c7faa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49049-improper-neutralization-of-special--32136600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49049%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZoomIt%20DZS%20Video%20Gallery&amp;severity=high&amp;id=6972590d4623b1157c7faa8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49046-improper-neutralization-of-input-du-a523b06f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20xPromoter&amp;severity=medium&amp;id=6972590d4623b1157c7faa87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49045-improper-neutralization-of-input-du-d56a5c70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Interactive%20Maps&amp;severity=medium&amp;id=6972590d4623b1157c7faa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49043-improper-neutralization-of-input-du-7ad9532b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Magic%20Responsive%20Slider%20and%20Carousel%20WordPress&amp;severity=medium&amp;id=6972590c4623b1157c7faa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48094-improper-neutralization-of-input-du-1f367045</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Magic%20Slider&amp;severity=medium&amp;id=6972590c4623b1157c7faa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47666-improper-neutralization-of-input-du-3e28c688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Image%26Video%20FullScreen%20Background&amp;severity=medium&amp;id=6972590c4623b1157c7faa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47600-improper-neutralization-of-script-r-dc90d48a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47600%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=6972590c4623b1157c7faa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47555-authorization-bypass-through-user-c-538ad53a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47555%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Themeum%20Tutor%20LMS&amp;severity=high&amp;id=6972590c4623b1157c7faa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47500-improper-neutralization-of-input-du-85e0ae4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Intal%20Stackable&amp;severity=medium&amp;id=6972590c4623b1157c7faa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47474-improper-control-of-filename-for-in-f88fd651</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47474%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ninetheme%20Anarkali&amp;severity=critical&amp;id=6972590c4623b1157c7faa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32123-improper-neutralization-of-input-du-7d36493b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32123%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Video%20Player%20with%20Playlist%20%26%20Multiple%20Skins&amp;severity=medium&amp;id=6972590c4623b1157c7faa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31413-cross-site-request-forgery-csrf-in--4a4d1467</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=high&amp;id=6972590c4623b1157c7faa5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27005-improper-neutralization-of-input-du-a9f96efe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Video%20Player&amp;severity=medium&amp;id=6972590c4623b1157c7faa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-gnu-inetutils-telnetd-flaw-lets-attackers-0f5bd676</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20GNU%20InetUtils%20telnetd%20Flaw%20Lets%20Attackers%20Bypass%20Login%20and%20Gain%20Root%20Access&amp;severity=critical&amp;id=69729a4b4623b1157c918195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23761-cwe-824-access-of-uninitialized-poi-e22cfc65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23761%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23762-cwe-755-improper-handling-of-except-58a810d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23762%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23763-cwe-668-exposure-of-resource-to-wro-c5e3de8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23763%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20VB-Audio%20Software%20Matrix&amp;severity=high&amp;id=697251f54623b1157c7bcf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23764-cwe-823-use-of-out-of-range-pointer-0ecbb011</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23764%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20VB-Audio%20Software%20Voicemeeter%20(Standard)&amp;severity=medium&amp;id=697251f54623b1157c7bcf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22278-cwe-307-improper-restriction-of-exc-63d6d9d8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22278%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=697251f54623b1157c7bcf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36588-cwe-89-improper-neutralization-of-s-26748496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36588%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=69724ae54623b1157c7a6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32057-cwe-295-improper-certificate-valida-577d1175</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32057%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=697243dd4623b1157c78dedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32056-cwe-1241-use-of-predictable-algorit-21f21815</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32056%3A%20CWE-1241%3A%20Use%20of%20Predictable%20Algorithm%20in%20Random%20Number%20Generator%20in%20Bosch%20Infotainment%20system%20ECU&amp;severity=medium&amp;id=697243dd4623b1157c78ded8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/old-attack-new-speed-researchers-optimize-page-cac-2f714afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Old%20Attack%2C%20New%20Speed%3A%20Researchers%20Optimize%20Page%20Cache%20Exploits&amp;severity=medium&amp;id=697240254623b1157c78210a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24009-cwe-502-deserialization-of-untruste-fbb20fca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24009%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20docling-project%20docling-core&amp;severity=high&amp;id=6972406b4623b1157c78272c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65098-cwe-79-improper-neutralization-of-i-f71e6496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65098%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baptisteArno%20typebot.io&amp;severity=high&amp;id=69723cd54623b1157c77843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64097-cwe-330-use-of-insufficiently-rando-532e6a2c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64097%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20nerves-hub%20nerves_hub_web&amp;severity=critical&amp;id=69723cd54623b1157c778439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23760-cwe-288-authentication-bypass-using-307c60bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23760%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=69723cd54623b1157c778445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1329-stack-based-buffer-overflow-in-tenda-8a33d034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1329%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6972406b4623b1157c782733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1328-buffer-overflow-in-totolink-nr1800x-a1d00173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1328%3A%20Buffer%20Overflow%20in%20Totolink%20NR1800X&amp;severity=high&amp;id=697251f54623b1157c7bcfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-pixel-zero-click-redis-rce-chi-6c8f578f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Pixel%20Zero-Click%2C%20Redis%20RCE%2C%20China%20C2s%2C%20RAT%20Ads%2C%20Crypto%20Scams%20%26%2015%2B%20Stories&amp;severity=low&amp;id=69729a4b4623b1157c918198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1327-command-injection-in-totolink-nr1800-636c9eb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1327%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=697232484623b1157c748474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-adopts-ai-to-generate-powershell-backdoors-9b308855</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KONNI%20Adopts%20AI%20to%20Generate%20PowerShell%20Backdoors&amp;severity=medium&amp;id=69722ec54623b1157c73cce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1326-command-injection-in-totolink-nr1800-ea6910ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1326%3A%20Command%20Injection%20in%20Totolink%20NR1800X&amp;severity=medium&amp;id=69722b404623b1157c72bdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12738-cwe-200-exposure-of-sensitive-infor-837a963d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12738%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20neo4j%20Enterprise%20Edition&amp;severity=low&amp;id=69722b404623b1157c72bdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/december-2025-security-issues-in-korean-global-fin-604f9181</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=December%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=69728a2c4623b1157c8ba833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1325-weak-password-recovery-in-sangfor-op-224f4d41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1325%3A%20Weak%20Password%20Recovery%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=697224384623b1157c711e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1324-os-command-injection-in-sangfor-oper-bcaf02a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1324%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=high&amp;id=697224384623b1157c711e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14295-cwe-257-storing-passwords-in-a-reco-b2860b25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14295%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Automated%20Logic%20WebCTRL&amp;severity=high&amp;id=697220b84623b1157c6ff4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10856-cwe-434-unrestricted-upload-of-file-f1f9d43b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10856%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Solvera%20Software%20Services%20Trade%20Inc.%20Teknoera&amp;severity=high&amp;id=697219ac4623b1157c6e8dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10855-cwe-639-authorization-bypass-throug-a1a1bb5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Solvera%20Software%20Services%20Trade%20Inc.%20Teknoera&amp;severity=high&amp;id=6972163c4623b1157c6df3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-attacks-targeting-fortigate-firewalls-6d647d9d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wave%20of%20Attacks%20Targeting%20FortiGate%20Firewalls&amp;severity=medium&amp;id=697215f54623b1157c6de53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67684-cwe-22-improper-limitation-of-a-pat-bc0a1d9a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67684%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenSolution%20Quick.Cart&amp;severity=critical&amp;id=697212a84623b1157c6d1f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67683-cwe-79-improper-neutralization-of-i-ae4cfec0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67683%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=697212a84623b1157c6d1f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10024-cwe-639-authorization-bypass-throug-7ff78f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10024%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20EXERT%20Computer%20Technologies%20Software%20Ltd.%20Co.%20Education%20Management%20System&amp;severity=high&amp;id=69720f224623b1157c6c54e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filling-the-most-common-gaps-in-google-workspace-s-f386f7af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Filling%20the%20Most%20Common%20Gaps%20in%20Google%20Workspace%20Security&amp;severity=low&amp;id=69729a4b4623b1157c91819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-impersonates-sympy-deploys--b22eefbf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20Impersonates%20SymPy%2C%20Deploys%20XMRig%20Miner%20on%20Linux%20Hosts&amp;severity=medium&amp;id=69729a4b4623b1157c91819e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartermail-auth-bypass-exploited-in-the-wild-two--107b4488</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmarterMail%20Auth%20Bypass%20Exploited%20in%20the%20Wild%20Two%20Days%20After%20Patch%20Release&amp;severity=low&amp;id=69729a4b4623b1157c9181a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlassian-gitlab-zoom-release-security-patches-baa70442</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlassian%2C%20GitLab%2C%20Zoom%20Release%20Security%20Patches&amp;severity=critical&amp;id=6971f2cd4623b1157c649e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1225-cwe-20-improper-input-validation-in--931c988d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1225%3A%20CWE-20%20Improper%20Input%20Validation%20in%20QOS.CH%20Sarl%20Logback-core&amp;severity=low&amp;id=6972163c4623b1157c6df3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1332-cwe-306-missing-authentication-for-c-b236b23b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1332%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HAMASTAR%20Technology%20MeetingHub&amp;severity=medium&amp;id=697275ff4623b1157c8651ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4764-cwe-89-improper-neutralization-of-sp-7304c9c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4764%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aida%20Computer%20Information%20Technology%20Inc.%20Hotel%20Guest%20Hotspot&amp;severity=high&amp;id=697212a84623b1157c6d1f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4763-cwe-79-improper-neutralization-of-in-9e52a134</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Aida%20Computer%20Information%20Technology%20Inc.%20Hotel%20Guest%20Hotspot&amp;severity=medium&amp;id=697212a84623b1157c6d1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1331-cwe-434-unrestricted-upload-of-file--764369fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1331%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AMASTAR%20Technology%20MeetingHub&amp;severity=critical&amp;id=69723cd54623b1157c778441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-targeting-cisco-unified-cm-zero-day-72adec99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Targeting%20Cisco%20Unified%20CM%20Zero-Day&amp;severity=critical&amp;id=6971e8414623b1157c610b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-ai-generated-code-securex3f-thu-jan-22nd-9c248672</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20AI-Generated%20Code%20Secure%26%23x3f%3B%2C%20(Thu%2C%20Jan%2022nd)&amp;severity=medium&amp;id=6971e13c4623b1157c546e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1330-cwe-36-absolute-path-traversal-in-ha-8ec72c7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1330%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20HAMASTAR%20Technology%20MeetingHub&amp;severity=high&amp;id=6971e4f04623b1157c560bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24332-cwe-204-observable-response-discrep-8f1ed967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24332%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Discord%20WebSocket%20API%20service&amp;severity=medium&amp;id=6971dde84623b1157c521593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0920-cwe-269-improper-privilege-managemen-5d2a4b0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0920%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=critical&amp;id=6971cc544623b1157c4acff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automated-fortigate-attacks-exploit-forticloud-sso-01b5fbea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automated%20FortiGate%20Attacks%20Exploit%20FortiCloud%20SSO%20to%20Alter%20Firewall%20Configurations&amp;severity=medium&amp;id=69729a4b4623b1157c9181a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixes-actively-exploited-zero-day-cve-2026-2-4c50f3ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Fixes%20Actively%20Exploited%20Zero-Day%20CVE-2026-20045%20in%20Unified%20CM%20and%20Webex&amp;severity=critical&amp;id=69729a4b4623b1157c9181a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24049-cwe-22-improper-limitation-of-a-pat-2e330dd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24049%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pypa%20wheel&amp;severity=high&amp;id=6971a92c4623b1157c3a86c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24042-cwe-862-missing-authorization-in-ap-acba14bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24042%3A%20CWE-862%3A%20Missing%20Authorization%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=6971a2234623b1157c33647c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24039-cwe-284-improper-access-control-in--7aa7861a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24039%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c336478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24038-cwe-287-improper-authentication-in--71130ede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24038%3A%20CWE-287%3A%20Improper%20Authentication%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=6971a2234623b1157c336474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24037-cwe-79-improper-neutralization-of-i-f5563376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24037%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c336470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24036-cwe-284-improper-access-control-in--93914593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24036%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=6971a2234623b1157c33646b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24035-cwe-284-improper-access-control-in--9329fb36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24035%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=697197984623b1157c136a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24034-cwe-434-unrestricted-upload-of-file-d7b7a95a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24034%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=697197984623b1157c136a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24010-cwe-74-improper-neutralization-of-s-8f68027a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24010%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=697190914623b1157c0cb806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24006-cwe-770-allocation-of-resources-wit-1150131c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24006%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697190914623b1157c0cb802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24002-cwe-74-improper-neutralization-of-s-5cd70cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24002%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20gristlabs%20grist-core&amp;severity=critical&amp;id=697190914623b1157c0cb7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24001-cwe-400-uncontrolled-resource-consu-10138374</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24001%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kpdecker%20jsdiff&amp;severity=low&amp;id=697190914623b1157c0cb7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23992-cwe-347-improper-verification-of-cr-356035ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23992%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=697190914623b1157c0cb7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23991-cwe-617-reachable-assertion-in-theu-bcca6105</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23991%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=697190914623b1157c0cb7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23966-cwe-345-insufficient-verification-o-3fba88f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23966%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20JuneAndGreen%20sm-crypto&amp;severity=critical&amp;id=697190914623b1157c0cb7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23965-cwe-347-improper-verification-of-cr-30d24726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23965%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20JuneAndGreen%20sm-crypto&amp;severity=high&amp;id=697190914623b1157c0cb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23967-cwe-347-improper-verification-of-cr-632a7977</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23967%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20JuneAndGreen%20sm-crypto&amp;severity=high&amp;id=697190914623b1157c0cb7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23699-improper-neutralization-of-special--88b06796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23699%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20AP180(JA)%20V1.xx&amp;severity=high&amp;id=697186044623b1157c0a2c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27380-cwe-79-improper-neutralization-of-i-c245392d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27380%3A%20CWE-79%20%E2%80%93%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-Site%20Scripting)%20in%20Altium%20AES&amp;severity=high&amp;id=697186044623b1157c0a2c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23957-cwe-770-allocation-of-resources-wit-088bb44b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23957%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697186044623b1157c0a2c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23956-cwe-1333-inefficient-regular-expres-81048165</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23956%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=697186044623b1157c0a2c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27379-cwe-79-cross-site-scripting-xss-in--ce8bb266</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27379%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Altium%20AES&amp;severity=medium&amp;id=697186044623b1157c0a2c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27378-cwe-89-sql-injection-in-altium-aes-497db969</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27378%3A%20CWE-89%20SQL%20Injection%20in%20Altium%20AES&amp;severity=high&amp;id=69717b774623b1157c01dc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-heurremoteadmingotoresolvegen-df139cc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20HEURRemoteAdmin.GoToResolve.gen&amp;severity=medium&amp;id=6972081c4623b1157c6a98e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23951-cwe-125-out-of-bounds-read-in-sumat-f9c52a12</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23951%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=medium&amp;id=697174714623b1157cfcd293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27377-cwe-295-improper-certificate-valida-9684e506</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27377%3A%20CWE-295%20%E2%80%93%20Improper%20Certificate%20Validation%20in%20Altium%20Altium%20Designer&amp;severity=medium&amp;id=697174714623b1157cfcd28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-22-a28ebfbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-22&amp;severity=medium&amp;id=6972beb24623b1157c9a7c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66428-na-e49c75a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66428%3A%20n%2Fa&amp;severity=high&amp;id=697271914623b1157c8544ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70899-na-47c41fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70899%3A%20n%2Fa&amp;severity=medium&amp;id=69725c7b4623b1157c807496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56589-na-6f58c484</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56589%3A%20n%2Fa&amp;severity=high&amp;id=69725c7b4623b1157c807492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56590-na-a788daad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56590%3A%20n%2Fa&amp;severity=critical&amp;id=69725c7b4623b1157c80748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69828-na-58cb5585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69828%3A%20n%2Fa&amp;severity=critical&amp;id=697255704623b1157c7cc364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67221-na-b55c10a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67221%3A%20n%2Fa&amp;severity=high&amp;id=697255704623b1157c7cc360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69820-na-74a7fc7d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69820%3A%20n%2Fa&amp;severity=medium&amp;id=69724ae54623b1157c7a6896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69612-na-9524f76d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69612%3A%20n%2Fa&amp;severity=medium&amp;id=697247604623b1157c79904a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69821-na-2e81d34c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69821%3A%20n%2Fa&amp;severity=high&amp;id=697243dd4623b1157c78dee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69822-na-d100a79b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69822%3A%20n%2Fa&amp;severity=high&amp;id=6972406b4623b1157c782728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69764-na-4b4e344f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69764%3A%20n%2Fa&amp;severity=critical&amp;id=6972406b4623b1157c782724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-22-ce618865</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-22&amp;severity=low&amp;id=6971e83e4623b1157c610aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23887-cwe-79-improper-neutralization-of-i-c1cb9e0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23887%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=697166604623b1157cf4ef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23873-cwe-1236-improper-neutralization-of-bfdca59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23873%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20zhblue%20hustoj&amp;severity=medium&amp;id=697162dc4623b1157cf42cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1036-cwe-862-missing-authorization-in-10w-194bf8a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1036%3A%20CWE-862%20Missing%20Authorization%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=697162dc4623b1157cf42cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23737-cwe-502-deserialization-of-untruste-824b5dc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23737%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=69715f584623b1157cf35e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23736-cwe-1321-improperly-controlled-modi-57a8acae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23736%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20lxsmnsyc%20seroval&amp;severity=high&amp;id=69715f584623b1157cf35e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23996-cwe-208-observable-timing-discrepan-ff484f4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23996%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Athroniaeth%20fastapi-api-key&amp;severity=low&amp;id=697158504623b1157cf11dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/purplebravos-targeting-of-the-it-software-supply-c-29f1b8e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PurpleBravo%E2%80%99s%20Targeting%20of%20the%20IT%20Software%20Supply%20Chain&amp;severity=medium&amp;id=69715bd34623b1157cf1b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23990-cwe-269-improper-privilege-manageme-fc32d928</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23990%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20controlplaneio-fluxcd%20flux-operator&amp;severity=medium&amp;id=697158504623b1157cf11db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23986-cwe-61-unix-symbolic-link-symlink-f-633913a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23986%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20copier-org%20copier&amp;severity=medium&amp;id=697154cc4623b1157cf0b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23968-cwe-61-unix-symbolic-link-symlink-f-fc072e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23968%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20copier-org%20copier&amp;severity=medium&amp;id=697154cc4623b1157cf0b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23524-cwe-502-deserialization-of-untruste-6ac31d76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23524%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20laravel%20reverb&amp;severity=critical&amp;id=697151484623b1157cf00eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23960-cwe-79-improper-neutralization-of-i-3e3c263a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23960%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=697151484623b1157cf00ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23518-cwe-347-improper-verification-of-cr-2b7da1d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23518%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20fleetdm%20fleet&amp;severity=critical&amp;id=69714dc34623b1157cef80f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23517-cwe-862-missing-authorization-in-fl-5296eba5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23517%3A%20CWE-862%3A%20Missing%20Authorization%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=69714dc34623b1157cef80ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23526-cwe-267-privilege-defined-with-unsa-757d7df5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23526%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20cvat-ai%20cvat&amp;severity=high&amp;id=69714dc34623b1157cef80f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23516-cwe-83-improper-neutralization-of-s-e9036b5a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23516%3A%20CWE-83%3A%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20cvat-ai%20cvat&amp;severity=high&amp;id=69714a404623b1157ceef883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22808-cwe-79-improper-neutralization-of-i-4d4028d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22808%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=697146bc4623b1157ced22dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22807-cwe-94-improper-control-of-generati-9811f67e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22807%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=697146bc4623b1157ced22d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22793-cwe-94-improper-control-of-generati-a207a9e8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22793%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=697143384623b1157ceca8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22792-cwe-116-improper-encoding-or-escapi-6dc25d7c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22792%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=69713fb64623b1157cec0b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21852-cwe-522-insufficiently-protected-cr-d3f2b60d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21852%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20anthropics%20claude-code&amp;severity=medium&amp;id=69713c964623b1157cebad0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69285-cwe-306-missing-authentication-for--f21c7742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69285%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dataease%20SQLBot&amp;severity=high&amp;id=697135284623b1157cea327d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69209-cwe-120-buffer-copy-without-checkin-6a26ff4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69209%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20arduino%20ArduinoCore-avr&amp;severity=medium&amp;id=697131a44623b1157ce981d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68141-cwe-476-null-pointer-dereference-in-69aad5d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20EVerest%20everest-core&amp;severity=high&amp;id=697131a44623b1157ce981d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68140-cwe-863-incorrect-authorization-in--45ad28eb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68140%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=697131a44623b1157ce981e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68139-cwe-384-session-fixation-in-everest-f93d3f38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68139%3A%20CWE-384%3A%20Session%20Fixation%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712e204623b1157ce8e0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12781-vulnerability-in-python-software-fo-5238a0da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12781%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69712e204623b1157ce8e0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68138-cwe-770-allocation-of-resources-wit-9cb3e41c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68138%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712e204623b1157ce8e0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23955-cwe-1046-creation-of-immutable-text-edb954b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23955%3A%20CWE-1046%3A%20Creation%20of%20Immutable%20Text%20Using%20String%20Concatenation%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=69712a9c4623b1157ce7dac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68137-cwe-120-buffer-copy-without-checkin-e8ca4119</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68137%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69712a9c4623b1157ce7dac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68136-cwe-770-allocation-of-resources-wit-39822731</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68136%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69712a9c4623b1157ce7dac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68135-cwe-703-improper-check-or-handling--4e9fc309</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68135%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20EVerest%20everest-core&amp;severity=medium&amp;id=697124574623b1157ce6527d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-macsyncs-script-driven-stealer-and-hardware-7ca77c35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20MacSync&apos;s%20Script-Driven%20Stealer%20and%20Hardware%20Wallet%20App%20Trojanization&amp;severity=medium&amp;id=69715bd34623b1157cf1b923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68134-cwe-20-improper-input-validation-in-f353a3e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68134%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20EVerest%20everest-core&amp;severity=high&amp;id=697120104623b1157ce4b45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68132-cwe-125-out-of-bounds-read-in-evere-082a9036</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68132%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20EVerest%20everest-core&amp;severity=low&amp;id=697120104623b1157ce4b457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23754-cwe-639-authorization-bypass-throug-5138dd2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23754%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20D-Link%20D-View%208&amp;severity=high&amp;id=697119084623b1157ce32428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23755-cwe-427-uncontrolled-search-path-el-93bd221c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23755%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20D-Link%20D-View%208&amp;severity=high&amp;id=697119084623b1157ce3242c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-purplebravo-campaign-targeted-3136-ip-74f44dc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20PurpleBravo%20Campaign%20Targeted%203%2C136%20IP%20Addresses%20via%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=69713bc44623b1157ceb898e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0834-cwe-290-authentication-bypass-by-spo-8e62023d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0834%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20TP-Link%20Systems%20Inc.%20Archer%20C20%20v6.0%2C%20Archer%20AX53%20v1.0&amp;severity=high&amp;id=697119084623b1157ce32430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20045-improper-control-of-generation-of-c-188d667d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20045%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=high&amp;id=6971006e4623b1157cd9ee59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20109-improper-neutralization-of-input-du-a6b3791b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20109%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=6971006e4623b1157cd9ee65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20080-uncontrolled-resource-consumption-i-d423f81b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20080%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Ultra-Reliable%20Wireless%20Backhaul&amp;severity=medium&amp;id=6971006e4623b1157cd9ee5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20055-improper-neutralization-of-input-du-b3818533</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=6971006e4623b1157cd9ee5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20092-incorrect-permission-assignment-for-1af3c810</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20092%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Cisco%20Cisco%20Intersight%20Virtual%20Appliance&amp;severity=medium&amp;id=6971006e4623b1157cd9ee62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-and-gitlab-release-security-updates-fixing-rc-e398edac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20and%20GitLab%20Release%20Security%20Updates%20Fixing%20RCE%2C%20DoS%2C%20and%202FA%20Bypass%20Flaws&amp;severity=critical&amp;id=69713bc44623b1157ceb8991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1290-cwe-305-authentication-bypass-by-pri-89863ae5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1290%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Jamf%20Jamf%20Pro&amp;severity=medium&amp;id=6970f25d4623b1157cd5d8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13878-cwe-617-reachable-assertion-in-isc--1c216a54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13878%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6970eb554623b1157cd44ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-users-targeted-with-backup-themed-phishin-67db1cb2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Users%20Targeted%20With%20Backup-Themed%20Phishing%20Emails&amp;severity=medium&amp;id=6970d98e4623b1157cd042b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22022-cwe-285-improper-authorization-in-a-60a1e182</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22022%3A%20CWE-285%20Improper%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=6970dd444623b1157cd11f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22444-cwe-20-improper-input-validation-in-bf4c21cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22444%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=6970dd444623b1157cd11f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-target-macos-developers-via-m-77d77ca3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Target%20macOS%20Developers%20via%20Malicious%20VS%20Code%20Projects&amp;severity=medium&amp;id=6970d6094623b1157cce8f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-expand-abuse-of-microsoft-visual-stu-0a2ba8d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Expand%20Abuse%20of%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=69715f574623b1157cf35e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-identity-security-must-move-beyond-mfa-0e4b66e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Identity%20Security%20Must%20Move%20Beyond%20MFA&amp;severity=medium&amp;id=6970c7f94623b1157ccac874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14083-improper-access-control-in-red-hat--394da9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14083%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=6970c4ab4623b1157cca1f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-api-security-harder-to-secure--41f747f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20API%20Security%20%E2%80%93%20Harder%20to%20Secure%2C%20Impossible%20to%20Ignore&amp;severity=medium&amp;id=6970c0f14623b1157cc96abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-mcp-server-flaws-lead-to-code-execution--584d6180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20MCP%20Server%20Flaws%20Lead%20to%20Code%20Execution%2C%20Data%20Exposure&amp;severity=medium&amp;id=6970bd6d4623b1157cc85ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-bluetooth-headset-tra-de46510a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20Bluetooth-headset%20tracking%20and%20the%20WhisperPair%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6970bdf44623b1157cc8e22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0988-integer-overflow-or-wraparound-in-re-0a00057a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0988%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6970bdb04623b1157cc86604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracles-first-2026-cpu-delivers-337-new-security-p-354152cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%E2%80%99s%20First%202026%20CPU%20Delivers%20337%20New%20Security%20Patches&amp;severity=medium&amp;id=6970af5d4623b1157cc435b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposure-assessment-platforms-signal-a-shift-in-fo-d5dc7dfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposure%20Assessment%20Platforms%20Signal%20a%20Shift%20in%20Focus&amp;severity=medium&amp;id=69713bc44623b1157ceb8997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0663-cwe-1286-improper-validation-of-synt-12c4aa85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0663%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6970ac0c4623b1157cc37dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-analysis-of-lockbit-50-6cffb81d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20Analysis%20of%20LockBit%205.0&amp;severity=medium&amp;id=69715bd34623b1157cf1b95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automatic-script-execution-in-visual-studio-code-w-21b59ec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automatic%20Script%20Execution%20In%20Visual%20Studio%20Code%2C%20(Wed%2C%20Jan%2021st)&amp;severity=medium&amp;id=6970a4d14623b1157cc128af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-6-billion-passwords-shows-stagnant-use-f7446f58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%206%20Billion%20Passwords%20Shows%20Stagnant%20User%20Behavior&amp;severity=medium&amp;id=69709a454623b1157cbe4d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlit-ai-framework-flaws-enable-data-theft-via--d29fe6c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chainlit%20AI%20Framework%20Flaws%20Enable%20Data%20Theft%20via%20File%20Read%20and%20SSRF%20Bugs&amp;severity=high&amp;id=69713bc44623b1157ceb899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-linux-malware-framework-built-with-ai-ass-35e6d54a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20Linux%20Malware%20Framework%20Built%20with%20AI%20Assistance%20Reaches%2088%2C000%20Lines%20of%20Code&amp;severity=medium&amp;id=69713bc44623b1157ceb899d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24016-uncontrolled-search-path-element-in-22cbc1e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24016%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Fsas%20Technologies%20Inc.%20ServerView%20Agents%20for%20Windows&amp;severity=high&amp;id=697081db4623b1157cb612d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24061-cwe-88-improper-neutralization-of-a-b71077e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24061%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20GNU%20Inetutils&amp;severity=critical&amp;id=69707ad34623b1157cb426fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-fake-maintenance-messages-target-094a80b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20Fake%20Maintenance%20Messages%20Targeting%20Users%E2%80%99%20Master%20Passwords&amp;severity=medium&amp;id=69713bc44623b1157ceb89a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14559-cwe-840-in-red-hat-red-hat-build-of-f99bd5f6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14559%3A%20CWE-840%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=697070494623b1157cabd775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/certcc-warns-binary-parser-bug-allows-nodejs-privi-75fd5a70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT%2FCC%20Warns%20binary-parser%20Bug%20Allows%20Node.js%20Privilege-Level%20Code%20Execution&amp;severity=low&amp;id=69713bc44623b1157ceb89a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1035-time-of-check-time-of-use-toctou-rac-efd74a5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1035%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69706cf44623b1157caadc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68133-cwe-770-allocation-of-resources-wit-438f1390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68133%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20EVerest%20everest-core&amp;severity=high&amp;id=69703f0f4623b1157c7a66a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15521-cwe-639-authorization-bypass-throug-3e14deb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15521%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kodezen%20Academy%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Complete%20eLearning%20Solution&amp;severity=critical&amp;id=697034844623b1157c6ef998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-21-b5fc2622</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-21&amp;severity=medium&amp;id=69716d324623b1157cf762b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66960-na-3112dbf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66960%3A%20n%2Fa&amp;severity=high&amp;id=697124574623b1157ce65285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69766-na-9df1087a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69766%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69763-na-85537788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69763%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69762-na-c4c5b90b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69762%3A%20n%2Fa&amp;severity=critical&amp;id=697112004623b1157ce0cb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66959-na-a4479d1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66959%3A%20n%2Fa&amp;severity=high&amp;id=697112004623b1157ce0cb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70648-na-335c59fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70648%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70646-na-41918022</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70646%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70644-na-799a175d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70644%3A%20n%2Fa&amp;severity=high&amp;id=6971006e4623b1157cd9ee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57681-na-c648da61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57681%3A%20n%2Fa&amp;severity=medium&amp;id=6970fced4623b1157cd8d88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70645-na-300b9da7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70645%3A%20n%2Fa&amp;severity=high&amp;id=6970f5e14623b1157cd6df2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70651-na-b5bef8ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70651%3A%20n%2Fa&amp;severity=high&amp;id=6970eedc4623b1157cd51a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70650-na-e01576e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70650%3A%20n%2Fa&amp;severity=high&amp;id=6970eedc4623b1157cd51a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-21-30f656d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-21&amp;severity=low&amp;id=6970cb7a4623b1157ccb77d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0933-cwe-20-improper-input-validation-in--e11883af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0933%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Cloudflare%20Wrangler&amp;severity=high&amp;id=69700a534623b1157c5370e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21990-easily-exploitable-vulnerability-al-286a413f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21990%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21989-easily-exploitable-vulnerability-al-cfc663e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21989%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21988-easily-exploitable-vulnerability-al-ec6ca141</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21988%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21987-easily-exploitable-vulnerability-al-eb2c9c41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21987%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21986-easily-exploitable-vulnerability-al-3bd5b1d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21986%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4f4623b1157c51a0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21985-easily-exploitable-vulnerability-al-5ef01372</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21985%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4f4623b1157c51a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21984-difficult-to-exploit-vulnerability--fe7a613a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21984%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21983-difficult-to-exploit-vulnerability--b085c980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21983%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21982-difficult-to-exploit-vulnerability--90063dc0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21982%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20access%20to%20the%20physical%20communication%20segment%20attached%20to%20the%20hardware%20where%20the%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4d4623b1157c51a07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21981-easily-exploitable-vulnerability-al-20a5cc5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21981%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4d4623b1157c51a07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21980-easily-exploitable-vulnerability-al-cc1de427</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21980%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Coding.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20Central%20Coding%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Coding%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Coding&amp;severity=medium&amp;id=696ffc4d4623b1157c51a079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21979-easily-exploitable-vulnerability-al-f3da128b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21979%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20executes%20to%20compromise%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service&amp;severity=medium&amp;id=696ffc4d4623b1157c51a076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21978-easily-exploitable-vulnerability-al-7b80eadc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21978%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20FLEXCUBE%20Universal%20Banking.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20FLEXCUBE%20Universal%20Banking%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20FLEXCUBE%20Universal%20Banking&amp;severity=medium&amp;id=696ffc4d4623b1157c51a073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21977-difficult-to-exploit-vulnerability--22d07212</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21977%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Zero%20Data%20Loss%20Recovery%20Appliance%20Software&amp;severity=low&amp;id=696ffc4d4623b1157c51a070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21976-easily-exploitable-vulnerability-al-8b9d1d4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21976%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=high&amp;id=696ffc4d4623b1157c51a06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21975-easily-exploitable-vulnerability-al-ed4d81df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21975%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Authenticated%20User%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Java%20VM.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=696ffc4d4623b1157c51a06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21974-easily-exploitable-vulnerability-al-3981a982</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21974%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc4c4623b1157c519ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21973-easily-exploitable-vulnerability-al-c1c5c53b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21973%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20FLEXCUBE%20Investor%20Servicing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20FLEXCUBE%20Investor%20Servicing%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20FLEXCUBE%20Investor%20Servicing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20FLEXCUBE%20Investor%20Servicing&amp;severity=high&amp;id=696ffc4c4623b1157c519ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21972-easily-exploitable-vulnerability-al-cae52fe2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21972%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=medium&amp;id=696ffc4c4623b1157c519fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21971-easily-exploitable-vulnerability-al-b2d0c287</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21971%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20SCM%20Purchasing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20SCM%20Purchasing%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20SCM%20Purchasing&amp;severity=medium&amp;id=696ffc4c4623b1157c519feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21970-easily-exploitable-vulnerability-al-786618a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21970%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc4c4623b1157c519fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21969-easily-exploitable-vulnerability-al-f836f94b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21969%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=critical&amp;id=696ffc4c4623b1157c519fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21968-easily-exploitable-vulnerability-al-34ab7cdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21968%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4c4623b1157c519fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21967-easily-exploitable-vulnerability-al-d0405106</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21967%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20OPERA%205.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Hospitality%20OPERA%205%20accessible%20data%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hospitality%20OPERA%205%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Hospitality%20OPERA%205.%20in%20Oracle%20Corporation%20Oracle%20Hospitality%20OPERA%205&amp;severity=high&amp;id=696ffc4c4623b1157c519fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21966-easily-exploitable-vulnerability-al-3baff4ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21966%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hospitality%20OPERA%205%20Property%20Services.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hospitality%20OPERA%205%20Property%20Services%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hospitality%20OPERA%205%20Property%20Services&amp;severity=medium&amp;id=696ffc4c4623b1157c519fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21965-easily-exploitable-vulnerability-al-5dc370b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21965%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=696ffc4c4623b1157c519fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21964-easily-exploitable-vulnerability-al-ab1f98c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21964%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4b4623b1157c519fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21963-easily-exploitable-vulnerability-al-23f0f479</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21963%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21962-easily-exploitable-vulnerability-al-87e0e7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21962%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20HTTP%20Server%2C%20Oracle%20Weblogic%20Server%20Proxy%20Plug-in&amp;severity=critical&amp;id=696ffc4b4623b1157c519fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21961-easily-exploitable-vulnerability-al-c4d94fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21961%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Human%20Resources&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21960-easily-exploitable-vulnerability-al-8e5d871b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21960%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20DBA.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Applications%20DBA%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Applications%20DBA%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20DBA&amp;severity=medium&amp;id=696ffc4b4623b1157c519fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21959-easily-exploitable-vulnerability-al-c3eda9fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21959%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Workflow%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=696ffc4b4623b1157c519fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21957-difficult-to-exploit-vulnerability--b0ec6a45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21957%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21956-easily-exploitable-vulnerability-al-d46e3980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21956%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21955-easily-exploitable-vulnerability-al-6d6f1151</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21955%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=696ffc4b4623b1157c519fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21952-easily-exploitable-vulnerability-al-b8d00778</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21952%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4b4623b1157c519fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21951-easily-exploitable-vulnerability-al-9c73b57a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21951%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc4a4623b1157c519f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21950-easily-exploitable-vulnerability-al-998ddc55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21950%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21949-easily-exploitable-vulnerability-al-b4e8290c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21949%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21948-easily-exploitable-vulnerability-al-17cd5ac9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21948%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc4a4623b1157c519f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21947-difficult-to-exploit-vulnerability--51063da3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21947%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=696ffc4a4623b1157c519f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21946-easily-exploitable-vulnerability-al-f91d44d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21946%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=696ffc4a4623b1157c519f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21945-easily-exploitable-vulnerability-al-3aefbf11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21945%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=696ffc4a4623b1157c519f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21944-easily-exploitable-vulnerability-al-427f26da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21944%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20Product%20Lifecycle%20Management%20for%20Process&amp;severity=medium&amp;id=696ffc4a4623b1157c519f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21943-easily-exploitable-vulnerability-al-e2645c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21943%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Scripting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Scripting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Scripting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=medium&amp;id=696ffc4a4623b1157c519f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21942-easily-exploitable-vulnerability-al-522a29a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21942%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc4a4623b1157c519f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21941-easily-exploitable-vulnerability-al-3c3d825b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21941%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc494623b1157c519f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21940-easily-exploitable-vulnerability-al-7135a85d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21940%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20PLM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20PLM&amp;severity=high&amp;id=696ffc494623b1157c519f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21939-difficult-to-exploit-vulnerability--10be1e95</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21939%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20SQLcl%20executes%20to%20compromise%20SQLcl.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20SQLcl.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=696ffc494623b1157c519f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21938-easily-exploitable-vulnerability-al-d62e44cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21938%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc494623b1157c519f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21937-easily-exploitable-vulnerability-al-4ea13844</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21937%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc494623b1157c519f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21936-easily-exploitable-vulnerability-al-db4bee02</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21936%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=696ffc494623b1157c519f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21935-easily-exploitable-vulnerability-al-b9eae403</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21935%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Solaris%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc494623b1157c519f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21934-easily-exploitable-vulnerability-al-c9ca5c3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21934%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=696ffc494623b1157c519f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21933-easily-exploitable-vulnerability-al-09eb3f5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21933%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=696ffc494623b1157c519f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21932-easily-exploitable-vulnerability-al-84389f17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21932%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=696ffc494623b1157c519f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21931-easily-exploitable-vulnerability-al-5ed98fbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21931%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20APEX%20Sample%20Applications.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20APEX%20Sample%20Applications%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20APEX%20Sample%20Applications%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20APEX%20Sample%20Applications%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20APEX%20Sample%20Applications&amp;severity=medium&amp;id=696ffc484623b1157c519f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21930-easily-exploitable-vulnerability-al-5f87bd1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21930%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20executes%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=696ffc484623b1157c519f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21929-difficult-to-exploit-vulnerability--e538a1ad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21929%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=696ffc484623b1157c519f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21928-easily-exploitable-vulnerability-al-e5fdbde0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21928%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TCP%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc484623b1157c519f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21927-easily-exploitable-vulnerability-al-186325f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21927%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Solaris%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Solaris%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=696ffc484623b1157c519f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21926-easily-exploitable-vulnerability-al-99676c7d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21926%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TLS%20to%20compromise%20Siebel%20CRM%20Deployment.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Siebel%20CRM%20Deployment.%20in%20Oracle%20Corporation%20Siebel%20CRM%20Deployment&amp;severity=high&amp;id=696ffc484623b1157c519f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21925-difficult-to-exploit-vulnerability--7c5f6502</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21925%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=696ffc484623b1157c519f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21924-easily-exploitable-vulnerability-al-085bfeae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21924%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Utilities%20Application%20Framework.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Utilities%20Application%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Utilities%20Application%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Utilities%20Application%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Utilities%20Application%20Framework&amp;severity=medium&amp;id=696ffc484623b1157c519f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21923-easily-exploitable-vulnerability-al-7a0c01f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21923%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20Central%20Designer.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20Central%20Designer%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20Central%20Designer&amp;severity=medium&amp;id=696ffc484623b1157c519f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21922-easily-exploitable-vulnerability-al-778abe53</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21922%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20executes%20to%20compromise%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Planning%20and%20Budgeting%20Cloud%20Service&amp;severity=medium&amp;id=696ffc484623b1157c519f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0672-cwe-93-in-python-software-foundation-cb778f2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0672%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ffc4f4623b1157c51a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15367-cwe-77-improper-neutralization-of-s-e14cec26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15367%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15366-cwe-77-improper-neutralization-of-s-c3bc02df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15366%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58744-cwe-1392-use-of-default-credentials-e4ae3bf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58744%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=medium&amp;id=696ff8c24623b1157c513d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58743-cwe-327-use-of-a-broken-or-risky-cr-287c36b1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58743%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58742-cwe-522-insufficiently-protected-cr-a9461b24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58742%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58741-cwe-522-insufficiently-protected-cr-90b50c7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58741%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58740-cwe-321-use-of-hard-coded-cryptogra-5bd55c1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58740%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Milner%20ImageDirector%20Capture&amp;severity=high&amp;id=696ff8c24623b1157c513d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15282-cwe-93-in-python-software-foundatio-2d93208e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15282%3A%20CWE-93%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff8c24623b1157c513cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0865-cwe-74-improper-neutralization-of-sp-9ee85127</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0865%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff53d4623b1157c50c98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11468-vulnerability-in-python-software-fo-fdd11c16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11468%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=696ff1b84623b1157c50674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21642-vulnerability-in-revive-revive-adse-240357fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21642%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21664-vulnerability-in-revive-revive-adse-087d7668</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21664%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21663-vulnerability-in-revive-revive-adse-33a353f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21663%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=696fee344623b1157c4ffe9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21640-vulnerability-in-revive-revive-adse-c0751329</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21640%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=696fee344623b1157c4ffe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21641-vulnerability-in-revive-revive-adse-21c80503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21641%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=696fee344623b1157c4ffe96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21636-vulnerability-in-nodejs-node-744e621d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21636%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59466-vulnerability-in-nodejs-node-871b635d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59466%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55132-vulnerability-in-nodejs-node-10f44743</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55132%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=696feab04623b1157c4e3b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59464-vulnerability-in-nodejs-node-b2db4c87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59464%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55131-vulnerability-in-nodejs-node-816d9968</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55131%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55130-vulnerability-in-nodejs-node-92974a3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55130%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21637-vulnerability-in-nodejs-node-015df57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21637%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=696feab04623b1157c4e3b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59465-vulnerability-in-nodejs-node-7a6d1e9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59465%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=696feab04623b1157c4e3b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0622-cwe-798-use-of-hard-coded-credential-98c12f6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0622%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NewPlane%20open5GS&amp;severity=medium&amp;id=696fe03c4623b1157c4c7680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-plans-phase-out-of-high-risk-telecom-suppliers--7a3bbb82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20Plans%20Phase%20Out%20of%20High%20Risk%20Telecom%20Suppliers%2C%20in%20Proposals%20Seen%20as%20Targeting%20China&amp;severity=high&amp;id=696fdff14623b1157c4c655a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-hackers-target-developers-via-m-823eb1ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20Hackers%20Target%20Developers%20via%20Malicious%20VS%20Code%20Projects&amp;severity=medium&amp;id=697042a44623b1157c81b943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33231-cwe-427-uncontrolled-search-path-el-831f1a30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33231%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=696fc4054623b1157c437288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33230-cwe-78-improper-neutralization-of-s-4a0c844f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33230%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc4054623b1157c437283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-multi-stage-windows-malware-campaign-f45533e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Multi-Stage%20Windows%20Malware%20Campaign&amp;severity=medium&amp;id=696fc78c4623b1157c44328d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33229-cwe-427-uncontrolled-search-path-el-abeb2425</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33229%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc0884623b1157c42b9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33228-cwe-78-improper-neutralization-of-s-bca140b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33228%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20CUDA%20Toolkit&amp;severity=high&amp;id=696fc0884623b1157c42b9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33233-cwe-94-improper-control-of-generati-8007c869</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33233%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=696fc0884623b1157c42b9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36419-cwe-550-server-generated-error-mess-68da459e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36419%3A%20CWE-550%20Server-generated%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa7e44623b1157c3d36b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36418-cwe-347-improper-verification-of-cr-4bfcf813</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36418%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20IBM%20ApplinX&amp;severity=high&amp;id=696fa7e44623b1157c3d36b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36411-cwe-352-cross-site-request-forgery--09ab87fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36411%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20ApplinX&amp;severity=low&amp;id=696fa4614623b1157c3ca9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36410-cwe-602-client-side-enforcement-of--3daf47d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36410%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20ApplinX&amp;severity=low&amp;id=696fa4614623b1157c3ca99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36409-cwe-79-improper-neutralization-of-i-1104e2ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa4614623b1157c3ca99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36408-cwe-79-improper-neutralization-of-i-47614318</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20ApplinX&amp;severity=medium&amp;id=696fa4614623b1157c3ca998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36397-cwe-80-improper-neutralization-of-s-1ea05f87</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36397%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36396-cwe-79-improper-neutralization-of-i-a1375ab9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36115-cwe-384-session-fixation-in-ibm-ste-6e3effef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36115%3A%20CWE-384%20Session%20Fixation%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36113-cwe-79-improper-neutralization-of-i-b37e645e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b500c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36066-cwe-79-improper-neutralization-of-i-61acc7dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36065-cwe-613-insufficient-session-expira-84eab96e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36065%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36063-cwe-613-insufficient-session-expira-8b06691f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36063%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Sterling%20Connect%3AExpress%20Adapter%20for%20Sterling%20B2B%20Integrator%205.2.0&amp;severity=medium&amp;id=696f9d594623b1157c3b5000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36058-cwe-538-insertion-of-sensitive-info-621430b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36058%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=696f9d594623b1157c3b4ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36059-cwe-250-execution-with-unnecessary--cb28676c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36059%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=696f9d594623b1157c3b4ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33015-cwe-434-unrestricted-upload-of-file-ab0f1575</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33015%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Concert&amp;severity=high&amp;id=696f9d594623b1157c3b4ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1722-cwe-244-improper-clearing-of-heap-me-64a1026e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1722%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=696fab6a4623b1157c3dc078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1719-cwe-244-improper-clearing-of-heap-me-59acc0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1719%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=696fab6a4623b1157c3dc075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14115-cwe-798-use-of-hard-coded-credentia-54544291</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14115%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Sterling%20Connect%3ADirect%20for%20UNIX%20Container&amp;severity=high&amp;id=696fa7e44623b1157c3d36ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13925-cwe-532-insertion-of-sensitive-info-671f1d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13925%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Aspera%20Console&amp;severity=medium&amp;id=696fa4614623b1157c3ca9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12985-cwe-732-incorrect-permission-assign-33cf65e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12985%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20IBM%20Licensing%20Operator&amp;severity=high&amp;id=696f99d64623b1157c3aa443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54817-cwe-79-improper-neutralization-of-i-ad569384</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54817%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53516-cwe-79-improper-neutralization-of-i-c83bec1e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53516%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54495-cwe-79-improper-neutralization-of-i-f08a9420</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54495%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54157-cwe-79-improper-neutralization-of-i-a10ac56a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54157%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54778-cwe-79-improper-neutralization-of-i-9b9b1f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54778%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46270-cwe-79-improper-neutralization-of-i-5dc7a4f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46270%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55071-cwe-79-improper-neutralization-of-i-3b53f97d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55071%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54852-cwe-79-improper-neutralization-of-i-efc4e67a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54852%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54814-cwe-79-improper-neutralization-of-i-15e94dee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54814%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54861-cwe-79-improper-neutralization-of-i-c9e24a0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57881-cwe-79-improper-neutralization-of-i-ce23c5b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57881%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58080-cwe-79-improper-neutralization-of-i-85f3cea8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53854-cwe-79-improper-neutralization-of-i-857489eb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53854%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57787-cwe-79-improper-neutralization-of-i-43b16ee1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57787%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53707-cwe-79-improper-neutralization-of-i-e5a2da59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53707%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54853-cwe-79-improper-neutralization-of-i-38cf8451</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54853%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57786-cwe-79-improper-neutralization-of-i-d2916df0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57786%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d74623b1157c3aa49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44000-cwe-79-improper-neutralization-of-i-15b3c7f7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44000%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58095-cwe-79-improper-neutralization-of-i-515298bf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58095%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58094-cwe-79-improper-neutralization-of-i-57115763</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58093-cwe-79-improper-neutralization-of-i-b90c1369</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58093%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58092-cwe-79-improper-neutralization-of-i-36aa0151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58092%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58091-cwe-79-improper-neutralization-of-i-bf91f2ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58091%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58090-cwe-79-improper-neutralization-of-i-c335cb63</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58090%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58089-cwe-79-improper-neutralization-of-i-a2507d1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58089%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58088-cwe-79-improper-neutralization-of-i-ea4cde92</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58088%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58087-cwe-79-improper-neutralization-of-i-3912417d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58087%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d94623b1157c3aa4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36556-cwe-79-improper-neutralization-of-i-b810fcbe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36556%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=696f99d64623b1157c3aa446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53912-cwe-73-external-control-of-file-nam-360f8c62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53912%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=696f99d64623b1157c3aa458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0554-cwe-862-missing-authorization-in-wpd-e2a85e55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0554%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=medium&amp;id=696f99da4623b1157c3aa4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15380-cwe-79-improper-neutralization-of-i-eece158f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20NotificationX%20%E2%80%93%20FOMO%2C%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20GDPR%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Bar&amp;severity=high&amp;id=696f99da4623b1157c3aa4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0608-cwe-79-improper-neutralization-of-in-caf468e9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Head%20Meta%20Data&amp;severity=medium&amp;id=696f99da4623b1157c3aa4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15347-cwe-862-missing-authorization-in-ge-101457d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15347%3A%20CWE-862%20Missing%20Authorization%20in%20getwpfunnels%20Creator%20LMS%20%E2%80%93%20The%20LMS%20for%20Creators%2C%20Coaches%2C%20and%20Trainers&amp;severity=high&amp;id=696f99da4623b1157c3aa4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15043-cwe-862-missing-authorization-in-st-39a4c2fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15043%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=696f99da4623b1157c3aa4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0690-cwe-79-improper-neutralization-of-in-87ab9f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flatboy%20FlatPM%20%E2%80%93%20Ad%20Manager%2C%20AdSense%20and%20Custom%20Code&amp;severity=medium&amp;id=696fd2e84623b1157c48f85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0548-cwe-862-missing-authorization-in-the-f215f582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0548%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=696fd2e84623b1157c48f856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0726-cwe-502-deserialization-of-untrusted-1ef0db0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0726%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20posimyththemes%20Nexter%20Extension%20%E2%80%93%20Site%20Enhancements%20Toolkit&amp;severity=high&amp;id=696fd2e84623b1157c48f867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlit-vulnerabilities-may-leak-sensitive-inform-766fd2bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chainlit%20Vulnerabilities%20May%20Leak%20Sensitive%20Information&amp;severity=medium&amp;id=696f8f154623b1157c388ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9283-cwe-400-uncontrolled-resource-consum-6bc05e45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9283%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38995d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9282-cwe-400-uncontrolled-resource-consum-84b369f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9282%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38995a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9281-cwe-400-uncontrolled-resource-consum-227ba6ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9281%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22844-cwe-78-improper-neutralization-of-s-f111d1cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22844%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Node&amp;severity=critical&amp;id=696f8f574623b1157c389960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9280-cwe-400-uncontrolled-resource-consum-d9de11aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9280%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14027-cwe-401-missing-release-of-memory-a-248db821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14027%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Rockwell%20Automation%20ControlLogix%C2%AE%20Redundancy%20Enhanced%20Module&amp;severity=high&amp;id=696f8f574623b1157c38994b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9279-cwe-400-uncontrolled-resource-consum-f70cf7ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9279%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c389951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9278-cwe-400-uncontrolled-resource-consum-796b063b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9278%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8f574623b1157c38994e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-flaws-in-anthropic-mcp-git-server-enable-fil-7e6f95b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Flaws%20in%20Anthropic%20MCP%20Git%20Server%20Enable%20File%20Access%20and%20Code%20Execution&amp;severity=medium&amp;id=697042a44623b1157c81b946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9466-cwe-400-uncontrolled-resource-consum-6df0d75b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9466%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c380871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11743-cwe-1284-improper-validation-of-spe-9dedfa1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11743%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Rockwell%20Automation%20CompactLogix%C2%AE%205370&amp;severity=high&amp;id=696f8bc44623b1157c380868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9465-cwe-400-uncontrolled-resource-consum-44efe858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9465%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c38086e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9464-cwe-400-uncontrolled-resource-consum-0917fda7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9464%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Rockwell%20Automation%20ArmorStart%C2%AE%20LT&amp;severity=high&amp;id=696f8bc44623b1157c38086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-linkedin-messages-to-spread-rat-malwar-306504ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20LinkedIn%20Messages%20to%20Spread%20RAT%20Malware%20Through%20DLL%20Sideloading&amp;severity=medium&amp;id=697042a44623b1157c81b949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15281-cwe-908-use-of-uninitialized-resour-e8ed20c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15281%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696f88404623b1157c375430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14377-cwe-312-cleartext-storage-of-sensit-e65ecda4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14377%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=696f88404623b1157c37542d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14376-cwe-922-insecure-storage-of-sensiti-d3acf0e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14376%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=696f88404623b1157c37542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1180-server-side-request-forgery-ssrf-in--ef903439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1180%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=696f7db44623b1157c343c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41081-79-in-zuinq-studio-ismygym-b2bdda51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41081%3A%2079%20in%20Zuinq%20Studio%20IsMyGym&amp;severity=medium&amp;id=696f733b4623b1157c323b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-grade-pdfsider-malware-used-by-ransomware-grou-0bab322b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT-Grade%20PDFSider%20Malware%20Used%20by%20Ransomware%20Groups&amp;severity=critical&amp;id=696f72f54623b1157c323102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1183-cwe-79-improper-neutralization-of-in-40b6fe9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Botble%20TransP&amp;severity=medium&amp;id=696f733b4623b1157c323b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-risk-of-orphan-accounts-ee7b1657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Risk%20of%20Orphan%20Accounts&amp;severity=medium&amp;id=697042a44623b1157c81b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40679-cwe-79-improper-neutralization-of-i-07d15956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bdtask%20Isshue&amp;severity=medium&amp;id=696f6fa34623b1157c31ae77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14369-cwe-190-integer-overflow-or-wraparo-204ea851</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14369%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20mackron%20dr_flac&amp;severity=medium&amp;id=696f6fa34623b1157c31ae7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evelyn-stealer-malware-abuses-vs-code-extensions-t-ff049e88</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evelyn%20Stealer%20Malware%20Abuses%20VS%20Code%20Extensions%20to%20Steal%20Developer%20Credentials%20and%20Crypto&amp;severity=medium&amp;id=697042a44623b1157c81b94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40644-cwe-79-improper-neutralization-of-i-75d28e09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Riftzilla%20QRGen&amp;severity=medium&amp;id=696f6c204623b1157c2f9b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-fixes-acme-validation-bug-allowing-waf--2d0bd150</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Fixes%20ACME%20Validation%20Bug%20Allowing%20WAF%20Bypass%20to%20Origin%20Servers&amp;severity=low&amp;id=697042a44623b1157c81b952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-invite-enabled-calendar-data-theft-via--7f6db054</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Invite%20Enabled%20Calendar%20Data%20Theft%20via%20Google%20Gemini&amp;severity=low&amp;id=696f61614623b1157c2d8570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-secrets-in-javascript-bundles-are-still-being--933f5cc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Secrets%20in%20JavaScript%20Bundles%20are%20Still%20Being%20Missed&amp;severity=low&amp;id=697042a44623b1157c81b955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/add-punycode-to-your-threat-hunting-routine-tue-ja-4049a96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Add%20Punycode%20to%20your%20Threat%20Hunting%20Routine%2C%20(Tue%2C%20Jan%2020th)&amp;severity=medium&amp;id=696f53534623b1157c2a1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-evidence-that-the-era-of-advanced-ai-gene-2663b4cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%3A%20Evidence%20That%20the%20Era%20of%20Advanced%20AI-Generated%20Malware%20Has%20Begun&amp;severity=high&amp;id=696f4c7d4623b1157c2840d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14533-cwe-269-improper-privilege-manageme-27146680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14533%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20hwk-fr%20Advanced%20Custom%20Fields%3A%20Extended&amp;severity=critical&amp;id=696f4c7c4623b1157c28405e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41084-cwe-79-improper-neutralization-of-i-78137fbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SESAME%20LABS%20S.L%20Sesame&amp;severity=medium&amp;id=696f48f94623b1157c2703fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-nomad-leopard-targeted-spear-phishing-ca-67a5880d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Nomad%20Leopard%3A%20Targeted%20Spear-Phishing%20Campaign%20Against%20Government%20Entities%20in%20Afghanistan&amp;severity=medium&amp;id=696f45734623b1157c251817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-covert-access-weaponized-lnk-based-spear-9fbfc26b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Covert%20Access%3A%20Weaponized%20LNK-Based%20Spear-Phishing%20Targeting%20Argentina&apos;s%20Judicial%20Sector%20to%20Deploy%20a%20Covert%20RAT&amp;severity=medium&amp;id=696f41ef4623b1157c23df6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-extension-to-infection-an-in-depth-analysis-o-9add08a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Extension%20to%20Infection%3A%20An%20In-Depth%20Analysis%20of%20the%20Evelyn%20Stealer%20Campaign%20Targeting%20Software%20Developers&amp;severity=medium&amp;id=696f41ef4623b1157c23df7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41768-cwe-79-improper-neutralization-of-i-bde1a0cd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beckhoff%20Automation%20TwinCAT.HMI.Server&amp;severity=medium&amp;id=696f3ae84623b1157c221ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tudou-guarantee-marketplace-halts-telegram-transac-88a0abce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tudou%20Guarantee%20Marketplace%20Halts%20Telegram%20Transactions%20After%20Processing%20Over%20%2412%20Billion&amp;severity=low&amp;id=697042a44623b1157c81b958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0895-cwe-502-deserialization-of-untrusted-eeaff6f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0895%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20Extension%20%22Mailqueue%22&amp;severity=medium&amp;id=696f305c4623b1157c1fe251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66523-cwe-79-improper-neutralization-of-i-8abb25b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66523%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20na1.foxitesign.foxit.com&amp;severity=medium&amp;id=696f29544623b1157c1d8b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1223-cwe-522-insufficiently-protected-cre-7fa74124</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1223%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=medium&amp;id=696f25d04623b1157c1cfd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1222-cwe-434-unrestricted-upload-of-file--6c68ee5e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1222%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=high&amp;id=696f25d04623b1157c1cfd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1221-cwe-798-use-of-hard-coded-credential-3c079632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1221%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20BROWAN%20COMMUNICATIONS%20PrismX%20MX100%20AP%20controller&amp;severity=critical&amp;id=696f25d04623b1157c1cfd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12573-cwe-862-missing-authorization-in-bo-7eb7f990</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12573%3A%20CWE-862%20Missing%20Authorization%20in%20Bookingor&amp;severity=medium&amp;id=696f1ec84623b1157c1b768d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1218-xml-external-entity-reference-in-bjs-fce5ca1c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1218%3A%20XML%20External%20Entity%20Reference%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=696f143c4623b1157c18a4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1042-cwe-79-improper-neutralization-of-in-e82bc02a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norcross%20WP%20Hello%20Bar&amp;severity=medium&amp;id=696f143c4623b1157c18a4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1045-cwe-79-improper-neutralization-of-in-dbd41b33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nhomcaodem%20Viet%20contact&amp;severity=medium&amp;id=696f143c4623b1157c18a4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14348-cwe-285-improper-authorization-in-w-bd6da9de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14348%3A%20CWE-285%20Improper%20Authorization%20in%20wedevs%20weMail%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optin%20Forms%2C%20Email%20Newsletters%2C%20A%2FB%20Testing%2C%20and%20Automation&amp;severity=medium&amp;id=696f09b14623b1157c16d2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14977-cwe-284-improper-access-control-in--1cc76d8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14977%3A%20CWE-284%20Improper%20Access%20Control%20in%20dokaninc%20Dokan%3A%20AI%20Powered%20WooCommerce%20Multivendor%20Marketplace%20Solution%20%E2%80%93%20Build%20Your%20Own%20Amazon%2C%20eBay%2C%20Etsy&amp;severity=high&amp;id=696f09b14623b1157c16d2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0908-use-after-free-in-google-chrome-efb532a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0908%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0907-incorrect-security-ui-in-google-chro-bf30fd0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0907%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0906-incorrect-security-ui-in-google-chro-8a76b9b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0906%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0905-insufficient-policy-enforcement-in-g-39f68743</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0905%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=critical&amp;id=696f02a94623b1157c1371d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0904-incorrect-security-ui-in-google-chro-69280570</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0904%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0903-insufficient-validation-of-untrusted-54774e87</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0903%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0902-inappropriate-implementation-in-goog-859e95f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0902%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0901-inappropriate-implementation-in-goog-61e02cfc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0901%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=696f02a94623b1157c1371c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0900-inappropriate-implementation-in-goog-861f579a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0900%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0899-out-of-bounds-memory-access-in-googl-da67c015</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0899%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=696f02a94623b1157c1371bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14798-cwe-862-missing-authorization-in-th-8a10d4f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14798%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Create%20and%20Sell%20Online%20Courses&amp;severity=medium&amp;id=696eff234623b1157c12c80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14351-cwe-862-missing-authorization-in-br-323247da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14351%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20Custom%20Fonts%20%E2%80%93%20Host%20Your%20Fonts%20Locally&amp;severity=medium&amp;id=696eff234623b1157c12c80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1051-cwe-352-cross-site-request-forgery-c-df41460c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1051%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20satollo%20Newsletter%20%E2%80%93%20Send%20awesome%20emails%20from%20WordPress&amp;severity=medium&amp;id=696edf804623b1157ce5dbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14978-cwe-862-missing-authorization-in-pe-a5b54227</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14978%3A%20CWE-862%20Missing%20Authorization%20in%20peachpay%20PeachPay%20%E2%80%94%20Payments%20%26%20Express%20Checkout%20for%20WooCommerce%20(supports%20Stripe%2C%20PayPal%2C%20Square%2C%20Authorize.net)&amp;severity=medium&amp;id=696edf804623b1157ce5dbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1203-improper-authentication-in-crmeb-720d3e24</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1203%3A%20Improper%20Authentication%20in%20CRMEB&amp;severity=medium&amp;id=696ed8794623b1157ce40baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1202-improper-authentication-in-crmeb-3ada72fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1202%3A%20Improper%20Authentication%20in%20CRMEB&amp;severity=medium&amp;id=696ed8794623b1157ce40ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23950-cwe-176-improper-handling-of-unicod-6c92c833</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23950%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20isaacs%20node-tar&amp;severity=high&amp;id=696ed8794623b1157ce40bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23949-cwe-22-improper-limitation-of-a-pat-bf009faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23949%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jaraco%20jaraco.context&amp;severity=high&amp;id=696ed1704623b1157cdcb267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1197-information-disclosure-in-mineadmin-1dfdacd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1197%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1196-information-disclosure-in-mineadmin-ab931eb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1196%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23947-cwe-77-improper-neutralization-of-s-06e21c4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23947%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=696ed1704623b1157cdcb263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1195-insufficient-verification-of-data-au-9dcf731e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1195%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20MineAdmin&amp;severity=low&amp;id=696ed1704623b1157cdcb251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-20-53ae9522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-20&amp;severity=medium&amp;id=69701bb24623b1157c582d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63648-na-1a1c0bc4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63648%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c50675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63647-na-96cf075e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63647%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c506758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57156-na-abe6d93a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57156%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c506753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57155-na-40748d36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57155%3A%20n%2Fa&amp;severity=high&amp;id=696ff1b84623b1157c50674f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66902-na-63e61a49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66902%3A%20n%2Fa&amp;severity=high&amp;id=696fe72e4623b1157c4db15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66692-na-84b035d8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66692%3A%20n%2Fa&amp;severity=high&amp;id=696fe72e4623b1157c4db157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66803-na-c06459c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66803%3A%20n%2Fa&amp;severity=medium&amp;id=696fce914623b1157c4804ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56005-na-86fb57c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56005%3A%20n%2Fa&amp;severity=critical&amp;id=696fcb0c4623b1157c474bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67263-na-6f842cbf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67263%3A%20n%2Fa&amp;severity=medium&amp;id=696fc4054623b1157c43728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67261-na-4adc5829</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67261%3A%20n%2Fa&amp;severity=medium&amp;id=696fc0884623b1157c42b9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55423-na-531d2084</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55423%3A%20n%2Fa&amp;severity=critical&amp;id=696fc0884623b1157c42b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56353-na-32df9eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56353%3A%20n%2Fa&amp;severity=high&amp;id=696fa4614623b1157c3ca9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67824-na-9538daad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67824%3A%20n%2Fa&amp;severity=medium&amp;id=696fa0dc4623b1157c3be2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65482-na-7f36f5b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65482%3A%20n%2Fa&amp;severity=critical&amp;id=696fa0dc4623b1157c3be2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64087-na-310a1f67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64087%3A%20n%2Fa&amp;severity=critical&amp;id=696f9d594623b1157c3b500f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-20-ef3981cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-20&amp;severity=low&amp;id=696f22164623b1157c1c2079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1194-information-disclosure-in-mineadmin-3c889f08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1194%3A%20Information%20Disclosure%20in%20MineAdmin&amp;severity=medium&amp;id=696ebfdb4623b1157cd409c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15466-cwe-862-missing-authorization-in-wp-8b192c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15466%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=696ebfdb4623b1157cd409c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1193-improper-authorization-in-mineadmin-60bd2aaa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1193%3A%20Improper%20Authorization%20in%20MineAdmin&amp;severity=medium&amp;id=696ebc584623b1157cd378e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1192-command-injection-in-tosei-online-st-b3422b82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1192%3A%20Command%20Injection%20in%20Tosei%20Online%20Store%20Management%20System%20%E3%83%8D%E3%83%83%E3%83%88%E5%BA%97%E8%88%97%E7%AE%A1%E7%90%86%E3%82%B7%E3%82%B9%E3%83%86%E3%83%A0&amp;severity=medium&amp;id=696ebc584623b1157cd378dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1179-sql-injection-in-yonyou-ksoa-d554ad49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1179%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696eb5504623b1157cd294c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1178-sql-injection-in-yonyou-ksoa-39f660ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1178%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696fd2e84623b1157c48f86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1177-sql-injection-in-yonyou-ksoa-a7307cbc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1177%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696ea73f4623b1157cd0166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23944-cwe-306-missing-authentication-for--73956320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23944%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20getarcaneapp%20arcane&amp;severity=high&amp;id=696ea3bc4623b1157ccf9456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23885-cwe-95-improper-neutralization-of-d-81bfe90b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23885%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20AlchemyCMS%20alchemy_cms&amp;severity=medium&amp;id=696ea0384623b1157ccf2ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1176-sql-injection-in-itsourcecode-school-20708627</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1176%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=696fd2e84623b1157c48f87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23886-cwe-20-improper-input-validation-in-52adf544</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23886%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20swift-otel%20swift-w3c-trace-context&amp;severity=medium&amp;id=696fd2e84623b1157c48f889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23880-cwe-20-improper-input-validation-in-adf94f5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23880%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20HackUCF%20OnboardLite&amp;severity=high&amp;id=696e9cb34623b1157cce9c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23877-cwe-25-path-traversal-filedir-in-sw-f0672a80</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23877%3A%20CWE-25%3A%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20swingmx%20swingmusic&amp;severity=medium&amp;id=696e9cb34623b1157cce9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23848-cwe-807-reliance-on-untrusted-input-454b8437</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23848%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20franklioxygen%20MyTube&amp;severity=medium&amp;id=696e99304623b1157cce4b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1175-information-exposure-through-error-m-6bd679ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1175%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20birkir%20prime&amp;severity=medium&amp;id=696e99304623b1157cce4b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23837-cwe-863-incorrect-authorization-in--0478ceb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23837%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20franklioxygen%20MyTube&amp;severity=critical&amp;id=696e92284623b1157ccc1f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1174-resource-consumption-in-birkir-prime-e9d8867d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1174%3A%20Resource%20Consumption%20in%20birkir%20prime&amp;severity=medium&amp;id=696e92284623b1157ccc1f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23852-cwe-94-improper-control-of-generati-314581fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23852%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=696e92284623b1157ccc1f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23851-cwe-22-improper-limitation-of-a-pat-1945b84c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23851%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=696e8ea44623b1157ccb6c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23850-cwe-22-improper-limitation-of-a-pat-2366c511</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23850%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=696e8ea44623b1157ccb6c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23847-cwe-79-improper-neutralization-of-i-f1f72ba5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23847%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=low&amp;id=696e8b204623b1157cb6228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23846-cwe-598-use-of-get-request-method-w-99a5a2f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23846%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Quenary%20tugtainer&amp;severity=high&amp;id=696e8b204623b1157cb62286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1173-denial-of-service-in-birkir-prime-e9ed6038</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1173%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e8b204623b1157cb6228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21696-cwe-400-uncontrolled-resource-consu-24dfb9fb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21696%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20wings&amp;severity=high&amp;id=696e879b4623b1157cadb4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69199-cwe-400-uncontrolled-resource-consu-e5728fc0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69199%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20panel&amp;severity=high&amp;id=696e879b4623b1157cadb4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69198-cwe-400-uncontrolled-resource-consu-8f4121c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69198%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pterodactyl%20panel&amp;severity=medium&amp;id=696e84184623b1157caa879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1172-denial-of-service-in-birkir-prime-2ae77b03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1172%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e84184623b1157caa87a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23845-cwe-918-server-side-request-forgery-78006982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23845%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=696e84184623b1157caa87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23843-cwe-639-authorization-bypass-throug-c677224f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23843%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sibercii6-crypto%20teklifolustur_app&amp;severity=high&amp;id=696e7e76a027839b3dbe5ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23842-cwe-400-uncontrolled-resource-consu-ecacd388</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23842%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20gunthercox%20ChatterBot&amp;severity=high&amp;id=696e7e76a027839b3dbe5eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23841-cwe-20-improper-input-validation-in-0318b06b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23841%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7e76a027839b3dbe5eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23840-cwe-20-improper-input-validation-in-ef9517e2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23840%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7e76a027839b3dbe5eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1171-denial-of-service-in-birkir-prime-8b4c44b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1171%3A%20Denial%20of%20Service%20in%20birkir%20prime&amp;severity=medium&amp;id=696e7ae9d302b072d9d1c2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23839-cwe-20-improper-input-validation-in-bf755fab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23839%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20leepeuker%20movary&amp;severity=critical&amp;id=696e7ae9d302b072d9d1c2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23838-cwe-538-insertion-of-sensitive-info-2b71c14a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23838%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20NixOS%20nixpkgs&amp;severity=high&amp;id=696e7765d302b072d9d13d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55252-cwe-521-weak-password-requirements--28509510</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55252%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e7765d302b072d9d13d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55250-cwe-209-generation-of-error-message-008cc225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55250%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e7765d302b072d9d13d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23878-cwe-201-insertion-of-sensitive-info-339bab7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23878%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20kohler%20hotcrp&amp;severity=medium&amp;id=696e7765d302b072d9d13d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23836-cwe-20-improper-input-validation-in-bf76f28c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23836%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kohler%20hotcrp&amp;severity=critical&amp;id=696e73e1d302b072d9cff0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52661-cwe-613-insufficient-session-expira-8433459b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52661%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1170-information-disclosure-in-birkir-pri-7f5edbe1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1170%3A%20Information%20Disclosure%20in%20birkir%20prime&amp;severity=medium&amp;id=696e73e1d302b072d9cff09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55249-cwe-693-protection-mechanism-failur-94b327ac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55249%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52659-cwe-525-use-of-web-browser-cache-co-07d973a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52659%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e73e1d302b072d9cff0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23721-cwe-862-missing-authorization-in-op-00770019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23721%3A%20CWE-862%3A%20Missing%20Authorization%20in%20opf%20openproject&amp;severity=medium&amp;id=696e73e1d302b072d9cff0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52660-cwe-644-improper-neutralization-of--de9cf97d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52660%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e705dd302b072d9cf653c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23646-cwe-488-exposure-of-data-element-to-666177d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23646%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20opf%20openproject&amp;severity=medium&amp;id=696e705dd302b072d9cf6544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23625-cwe-79-improper-neutralization-of-i-34bbb971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23625%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opf%20openproject&amp;severity=high&amp;id=696e705dd302b072d9cf653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55251-cwe-434-unrestricted-upload-of-file-80885ae2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55251%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20AION&amp;severity=low&amp;id=696e6cd9d302b072d9ceaf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1169-cross-site-request-forgery-in-birkir-9f1103c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1169%3A%20Cross-Site%20Request%20Forgery%20in%20birkir%20prime&amp;severity=medium&amp;id=696e6cd9d302b072d9ceaf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-year-2038-problem-and-how-can-business-b520128c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20%E2%80%9Cyear%202038%20problem%E2%80%9D%2C%20and%20how%20can%20businesses%20fix%20it%3F&amp;severity=low&amp;id=696e6990d302b072d9ce40a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-gemini-prompt-injection-flaw-exposed-privat-b5ca02b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Gemini%20Prompt%20Injection%20Flaw%20Exposed%20Private%20Calendar%20Data%20via%20Malicious%20Invites&amp;severity=medium&amp;id=696e89194623b1157cb26455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23522-cwe-284-improper-access-control-in--dd10c165</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23522%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20lobehub%20lobe-chat&amp;severity=low&amp;id=696e7feca027839b3dc01196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22850-cwe-89-improper-neutralization-of-s-c794663e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22850%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ibericode%20koko-analytics&amp;severity=high&amp;id=696e7feca027839b3dc01191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22037-cwe-177-improper-handling-of-url-en-91a97286</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22037%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20fastify%20fastify-express&amp;severity=high&amp;id=696e7feca027839b3dc0118d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1162-buffer-overflow-in-utt-hiper-810-de9f9da2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1162%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20810&amp;severity=critical&amp;id=696e624dd302b072d9cd3359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1161-cross-site-scripting-in-pbrong-hrms-d5aefaa8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1161%3A%20Cross%20Site%20Scripting%20in%20pbrong%20hrms&amp;severity=medium&amp;id=696e5b45d302b072d9cc4a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11044-cwe-770-allocation-of-resources-wit-eae70be5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11044%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=high&amp;id=696e57c1d302b072d9cbb9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11043-cwe-295-improper-certificate-valida-72f34ad2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11043%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20B%26R%20Industrial%20Automation%20GmbH%20B%26R%20Automation%20Studio&amp;severity=critical&amp;id=696e543dd302b072d9cb38b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1160-sql-injection-in-phpgurukul-director-144b8000</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1160%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=696e543dd302b072d9cb38bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22031-cwe-177-improper-handling-of-url-en-7d9b0cd7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22031%3A%20CWE-177%3A%20Improper%20Handling%20of%20URL%20Encoding%20(Hex%20Encoding)%20in%20fastify%20middie&amp;severity=high&amp;id=696e50b9d302b072d9ca67b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68616-cwe-601-url-redirection-to-untruste-f9f184dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68616%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Kozea%20WeasyPrint&amp;severity=high&amp;id=696e50b9d302b072d9ca67ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61684-cwe-20-improper-input-validation-in-2519e307</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20h2o%20quicly&amp;severity=high&amp;id=696e50b9d302b072d9ca67a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1159-sql-injection-in-itsourcecode-online-d55f312a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1159%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=696e49b1d302b072d9c92239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-vulnerability-exposing-vigi-camera-4ceba506</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Vulnerability%20Exposing%20VIGI%20Cameras%20to%20Remote%20Hacking&amp;severity=medium&amp;id=696e4276d302b072d9c77a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1158-buffer-overflow-in-totolink-lr350-26d2f0de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1158%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e462dd302b072d9c86a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1007-cwe-863-incorrect-authorization-in-d-a5f97450</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1007%3A%20CWE-863%20Incorrect%20Authorization%20in%20Devolutions%20Server&amp;severity=high&amp;id=696e462dd302b072d9c86a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0610-cwe-89-improper-neutralization-of-sp-c6273948</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devolutions%20Server&amp;severity=critical&amp;id=696e462dd302b072d9c86a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1157-buffer-overflow-in-totolink-lr350-cfd05245</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1157%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e3ba2d302b072d9c4ca7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jordanian-admits-in-us-court-to-selling-access-to--c9452baa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jordanian%20Admits%20in%20US%20Court%20to%20Selling%20Access%20to%2050%20Enterprise%20Networks&amp;severity=medium&amp;id=696e37ead302b072d9c38b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solyximmortal-information-stealer-emerges-1b3c5829</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98SolyxImmortal%E2%80%99%20Information%20Stealer%20Emerges&amp;severity=medium&amp;id=696e3468d302b072d9c21d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1156-buffer-overflow-in-totolink-lr350-496be870</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1156%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e34b4d302b072d9c24fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploits-redline-clipjack-nt-69321376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploits%2C%20RedLine%20Clipjack%2C%20NTLM%20Crack%2C%20Copilot%20Attack%20%26%20More&amp;severity=medium&amp;id=696e89194623b1157cb26458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1155-buffer-overflow-in-totolink-lr350-67260ea7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1155%3A%20Buffer%20Overflow%20in%20Totolink%20LR350&amp;severity=high&amp;id=696e3115d302b072d9c0bd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1154-basic-cross-site-scripting-in-source-2677ba61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1154%3A%20Basic%20Cross%20Site%20Scripting%20in%20SourceCodester%20E-Learning%20System&amp;severity=medium&amp;id=696e2a0dd302b072d9befabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-reports-reinforce-cyberattacks-role-in-maduro--ed4d0592</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Reports%20Reinforce%20Cyberattack%E2%80%99s%20Role%20in%20Maduro%20Capture%20Blackout&amp;severity=medium&amp;id=696e2656d302b072d9bd897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1153-cross-site-request-forgery-in-techni-00d4cb6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1153%3A%20Cross-Site%20Request%20Forgery%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e2305d302b072d9bca30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1181-cwe-79-improper-neutralization-of-in-8bf35ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1181%3A%20CWE-942%20%E2%80%93%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Altium%20Altium%20365&amp;severity=critical&amp;id=696e2305d302b072d9bca312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/devops-saas-downtime-the-high-and-hidden-costs-for-52a7b973</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DevOps%20%26%20SaaS%20Downtime%3A%20The%20High%20(and%20Hidden)%20Costs%20for%20Cloud-First%20Businesses&amp;severity=high&amp;id=696e89194623b1157cb2645b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1152-unrestricted-upload-in-technical-lao-aef95de8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1152%3A%20Unrestricted%20Upload%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e1879d302b072d9b45f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stackwarp-hardware-flaw-breaks-amd-sev-snp-pro-651a803c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20StackWarp%20Hardware%20Flaw%20Breaks%20AMD%20SEV-SNP%20Protections%20on%20Zen%201%E2%80%935%20CPUs&amp;severity=low&amp;id=696e89194623b1157cb2645e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extension-crashes-browser-in-clic-293e1cf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extension%20Crashes%20Browser%20in%20ClickFix%20Variant%20%E2%80%98CrashFix%E2%80%99&amp;severity=medium&amp;id=696e113ed302b072d9b2509a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1151-cross-site-scripting-in-technical-la-e85a5d23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1151%3A%20Cross%20Site%20Scripting%20in%20technical-laohu%20mpay&amp;severity=medium&amp;id=696e1183d302b072d9b263f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/42000-impacted-by-ingram-micro-ransomware-attack-930a7a38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=42%2C000%20Impacted%20by%20Ingram%20Micro%20Ransomware%20Attack&amp;severity=medium&amp;id=696e0dbad302b072d9b1633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1150-command-injection-in-totolink-lr350-efe38033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1150%3A%20Command%20Injection%20in%20Totolink%20LR350&amp;severity=medium&amp;id=696e0e02d302b072d9b17754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1149-command-injection-in-totolink-lr350-50896775</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1149%3A%20Command%20Injection%20in%20Totolink%20LR350&amp;severity=medium&amp;id=696e06e5d302b072d9adddaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-threat-analysis-c2-compiled-kernel-rootki-0e6f44ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20threat%20analysis%3A%20C2-compiled%20kernel%20rootkits%20discovered&amp;severity=medium&amp;id=696dffddd302b072d99f3a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1148-cross-site-request-forgery-in-source-4840f573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1148%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696dfc59d302b072d996adb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crashfix-chrome-extension-delivers-modelorat-using-79f33478</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrashFix%20Chrome%20Extension%20Delivers%20ModeloRAT%20Using%20ClickFix-Style%20Browser%20Crash%20Lures&amp;severity=medium&amp;id=696e89194623b1157cb26461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1147-cross-site-scripting-in-sourcecodest-29609f78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1147%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696df8d5d302b072d99485f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/19th-january-threat-intelligence-report-0634a84e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=19th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=696df1cfd302b072d99017d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59355-cwe-532-insertion-of-sensitive-info-7e49b741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59355%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=medium&amp;id=696df1ced302b072d99017b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29847-cwe-20-improper-input-validation-in-395bb59d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29847%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=high&amp;id=696df1ced302b072d99017b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1146-cross-site-scripting-in-sourcecodest-44567d54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1146%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=696df1ced302b072d99017b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1145-heap-based-buffer-overflow-in-quickj-98b95235</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1145%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=696deac5d302b072d98c4bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1144-use-after-free-in-quickjs-ng-quickjs-0cd87907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1144%3A%20Use%20After%20Free%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=696de039d302b072d97ad5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1143-buffer-overflow-in-totolink-a3700r-95001bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1143%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3700R&amp;severity=high&amp;id=696dd96ad302b072d9756c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-bug-in-stealc-malware-panel-let-researche-d2bf6694</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Bug%20in%20StealC%20Malware%20Panel%20Let%20Researchers%20Spy%20on%20Threat%20Actor%20Operations&amp;severity=low&amp;id=696de206d302b072d97cda09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1142-cross-site-request-forgery-in-phpgur-29272b30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1142%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=696dd229d302b072d97088d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1141-improper-authorization-in-phpgurukul-1cf5a46a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1141%3A%20Improper%20Authorization%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=696dcea5d302b072d96ebb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1140-buffer-overflow-in-utt-520w-858eb2b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1140%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696dc419d302b072d967f4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1139-buffer-overflow-in-utt-520w-5b385d26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1139%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696dbd11d302b072d963bfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1138-buffer-overflow-in-utt-520w-a01790f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1138%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696db98dd302b072d96213ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1137-buffer-overflow-in-utt-520w-8eaa2ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1137%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696db609d302b072d96094e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1136-cross-site-scripting-in-lcg0124-boot-35d880f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1136%3A%20Cross%20Site%20Scripting%20in%20lcg0124%20BootDo&amp;severity=medium&amp;id=696daf01d302b072d95cfc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1135-cross-site-scripting-in-itsourcecode-a07b806f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1135%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696da475d302b072d93ab117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0943-cwe-1395-dependency-on-vulnerable-th-92420570</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0943%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20JV%20HarfBuzz%3A%3AShaper&amp;severity=high&amp;id=696da475d302b072d93ab10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1134-cross-site-scripting-in-itsourcecode-ae87bb25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1134%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696da475d302b072d93ab110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1133-sql-injection-in-yonyou-ksoa-321aaef2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1133%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d99ead302b072d92fe5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1132-sql-injection-in-yonyou-ksoa-2d2461f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1132%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d8bd9d302b072d91e235b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1131-sql-injection-in-yonyou-ksoa-a9365c0f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1131%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d8bd9d302b072d91e2355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1130-sql-injection-in-yonyou-ksoa-f8606018</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1130%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d7dc9d302b072d910517a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1129-sql-injection-in-yonyou-ksoa-ee78d5c5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1129%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696d7dc9d302b072d9105174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-19-55db824f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-19&amp;severity=medium&amp;id=696eca324623b1157cd58ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-19-64771da3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-19&amp;severity=low&amp;id=696e91f24623b1157ccc069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22797-cwe-290-authentication-bypass-by-sp-f03c6f4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22797%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20OpenStack%20keystonemiddleware&amp;severity=critical&amp;id=696e6cd9d302b072d9ceaf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15539-denial-of-service-in-open5gs-5c4023b8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15539%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696d6fb9d302b072d906e96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23829-cwe-93-improper-neutralization-of-c-0f5c2e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23829%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=696d6fb9d302b072d906e976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15538-use-after-free-in-open-asset-import-af2c01e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15538%3A%20Use%20After%20Free%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=696d68b1d302b072d904d55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23733-cwe-94-improper-control-of-generati-47bf2030</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23733%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=696d68b1d302b072d904d564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23644-cwe-22-improper-limitation-of-a-pat-5343f367</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23644%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=696d652dd302b072d904091e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23525-cwe-79-improper-neutralization-of-i-1a269f0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201Panel-dev%201Panel&amp;severity=medium&amp;id=696d5e25d302b072d901c778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pdfsider-malware-exploitation-of-dll-side-loading--dbdaaaca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PDFSIDER%20Malware%20-%20Exploitation%20of%20DLL%20Side-Loading%20for%20AV%20and%20EDR%20Evasion&amp;severity=medium&amp;id=696df8d5d302b072d994859a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-poseidon-spear-phishing-attacks-abusing--19c91f8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Poseidon%3A%20Spear-Phishing%20Attacks%20Abusing%20Google%20Ads%20Redirection%20Mechanisms&amp;severity=medium&amp;id=696df8d5d302b072d99485ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1126-unrestricted-upload-in-lwj-flow-b2609e5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1126%3A%20Unrestricted%20Upload%20in%20lwj%20flow&amp;severity=medium&amp;id=696d0d49d302b072d9e29e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1125-command-injection-in-d-link-dir-823x-ee237734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1125%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=696d0641d302b072d9df180c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0863-cwe-95-improper-neutralization-of-di-cc02e93e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0863%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)&amp;severity=high&amp;id=696cff39d302b072d9dc4a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1124-sql-injection-in-yonyou-ksoa-b958e1da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1124%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cff39d302b072d9dc4a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1123-sql-injection-in-yonyou-ksoa-a99d2889</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1123%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cf831d302b072d9d9a04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1122-sql-injection-in-yonyou-ksoa-495f0987</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1122%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cea21d302b072d9d213f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1121-sql-injection-in-yonyou-ksoa-525a4367</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1121%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696ce69dd302b072d9cf67dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1120-sql-injection-in-yonyou-ksoa-84b74f7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1120%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=696cdf95d302b072d9cc70e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1119-sql-injection-in-itsourcecode-societ-b0dcd35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1119%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696cc6f9d302b072d9c20926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1118-sql-injection-in-itsourcecode-societ-073109c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1118%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=696cb8e9d302b072d9bcd5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15537-heap-based-buffer-overflow-in-mapni-c667c348</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15537%3A%20Heap-based%20Buffer%20Overflow%20in%20Mapnik&amp;severity=medium&amp;id=696cb1e1d302b072d9ba4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15536-heap-based-buffer-overflow-in-byvoi-9e5bdd2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15536%3A%20Heap-based%20Buffer%20Overflow%20in%20BYVoid%20OpenCC&amp;severity=medium&amp;id=696ca3d1d302b072d9b4cb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-many-states-are-there-in-the-united-statesx3f--164ad160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22How%20many%20states%20are%20there%20in%20the%20United%20States%26%23x3f%3B%22%2C%20(Sun%2C%20Jan%2018th)&amp;severity=medium&amp;id=696c90d0d302b072d9add233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15535-null-pointer-dereference-in-nicbark-decd3d67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15535%3A%20NULL%20Pointer%20Dereference%20in%20nicbarker%20clay&amp;severity=medium&amp;id=696c8eb9d302b072d9ab8a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15534-integer-overflow-in-raysan5-raylib-7e50daf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15534%3A%20Integer%20Overflow%20in%20raysan5%20raylib&amp;severity=medium&amp;id=696c842dd302b072d9a6f20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1112-improper-authorization-in-sanluan-pu-c8c1dd44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1112%3A%20Improper%20Authorization%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=696c7d25d302b072d9a388f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1111-path-traversal-in-sanluan-publiccms-16fc67d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1111%3A%20Path%20Traversal%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=696c7299d302b072d99c1488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15533-heap-based-buffer-overflow-in-raysa-1fbd1e6c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15533%3A%20Heap-based%20Buffer%20Overflow%20in%20raysan5%20raylib&amp;severity=medium&amp;id=696c6b91d302b072d998d84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1110-buffer-overflow-in-cijliu-librtsp-1f126549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1110%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c6489d302b072d993616c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1109-buffer-overflow-in-cijliu-librtsp-3f693a13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1109%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c52f7d302b072d965579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1108-buffer-overflow-in-cijliu-librtsp-9b066441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1108%3A%20Buffer%20Overflow%20in%20cijliu%20librtsp&amp;severity=medium&amp;id=696c87f2d302b072d9a7fc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1107-unrestricted-upload-in-eyoucms-557dee46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1107%3A%20Unrestricted%20Upload%20in%20EyouCMS&amp;severity=medium&amp;id=696c2fcdd302b072d943efc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1106-improper-authorization-in-chamilo-lm-35c659ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1106%3A%20Improper%20Authorization%20in%20Chamilo%20LMS&amp;severity=medium&amp;id=696c2fcdd302b072d943efbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-18-0b9a0e70</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-18&amp;severity=low&amp;id=696de197d302b072d97b9b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-18-09ef788a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-18&amp;severity=medium&amp;id=696d768bd302b072d90acd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1105-sql-injection-in-easycms-bc0bb837</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1105%3A%20SQL%20Injection%20in%20EasyCMS&amp;severity=medium&amp;id=696c1e39d302b072d936e490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1066-command-injection-in-kalcaddle-kodbo-02d02574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1066%3A%20Command%20Injection%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=696bfb11d302b072d92a0937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1064-command-injection-in-bastillion-io-b-aecfd7ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1064%3A%20Command%20Injection%20in%20bastillion-io%20Bastillion&amp;severity=medium&amp;id=696bf409d302b072d9283c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1063-command-injection-in-bastillion-io-b-c2e322de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1063%3A%20Command%20Injection%20in%20bastillion-io%20Bastillion&amp;severity=medium&amp;id=696bed01d302b072d925799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1062-server-side-request-forgery-in-xiwei-2bc1384d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1062%3A%20Server-Side%20Request%20Forgery%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=696be5f9d302b072d920ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1061-unrestricted-upload-in-xiweicheng-tm-7e56bc3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1061%3A%20Unrestricted%20Upload%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=696bdef1d302b072d91db3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1059-sql-injection-in-feminer-wms-3269ddf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1059%3A%20SQL%20Injection%20in%20FeMiner%20wms&amp;severity=medium&amp;id=696c87f2d302b072d9a7fc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1050-sql-injection-in-risesoft-y9-digital-670158f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1050%3A%20SQL%20Injection%20in%20risesoft-y9%20Digital-Infrastructure&amp;severity=medium&amp;id=696bd466d302b072d9195c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1049-cross-site-scripting-in-ligerosmart-8956a4c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1049%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=696bc9d9d302b072d913c1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1048-cross-site-scripting-in-ligerosmart-a407efdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1048%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=696bc2d1d302b072d90f8557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15532-resource-consumption-in-open5gs-8f2df7c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15532%3A%20Resource%20Consumption%20in%20Open5GS&amp;severity=medium&amp;id=696bbf4dd302b072d90ebe7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15531-reachable-assertion-in-open5gs-d158390f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15531%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=696bb4c1d302b072d90bbe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-crashfix-a-new-toy-b036240c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20CrashFix%3A%20KongTuke&apos;s%20New%20Toy&amp;severity=medium&amp;id=696df8d5d302b072d9948582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15530-reachable-assertion-in-open5gs-ec8c11fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15530%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=696b6e71d302b072d9eca41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tennessee-man-pleads-guilty-to-repeatedly-hacking--a1a98251</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tennessee%20Man%20Pleads%20Guilty%20to%20Repeatedly%20Hacking%20Supreme%20Court%E2%80%99s%20Filing%20System&amp;severity=medium&amp;id=696c909dd302b072d9ada35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-463-released-sat-jan-17th-f896022a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.3%20Released%2C%20(Sat%2C%20Jan%2017th)&amp;severity=medium&amp;id=696c90d0d302b072d9add236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8615-cwe-79-improper-neutralization-of-in-f1c8b8d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=696b47c6d302b072d9dc16f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14078-cwe-862-missing-authorization-in-sh-b41caf50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14078%3A%20CWE-862%20Missing%20Authorization%20in%20shoheitanaka%20PAYGENT%20for%20WooCommerce&amp;severity=medium&amp;id=696b47c6d302b072d9dc16e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0725-cwe-79-improper-neutralization-of-in-9f16db15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20Integrate%20Dynamics%20365%20CRM&amp;severity=medium&amp;id=696b47c6d302b072d9dc16f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10484-cwe-288-authentication-bypass-using-34c05e32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10484%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20FmeAddons%20Registration%20%26%20Login%20with%20Mobile%20Phone%20Number%20for%20WooCommerce&amp;severity=critical&amp;id=696b47c6d302b072d9dc16e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14478-cwe-611-improper-restriction-of-xml-012de3a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14478%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=696b3d39d302b072d9bbd705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12129-cwe-200-exposure-of-sensitive-infor-882077dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12129%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubewp1211%20CubeWP%20Framework&amp;severity=medium&amp;id=696b3d39d302b072d9bbd701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0808-cwe-602-client-side-enforcement-of-s-c67a8d95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0808%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20bdthemes%20Spin%20Wheel%20%E2%80%93%20Interactive%20spinning%20wheel%20that%20offers%20coupons&amp;severity=medium&amp;id=696b3178b22c7ad86896536b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0691-cwe-79-improper-neutralization-of-in-63f3efac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20E-Mail%20Blacklist%20%E2%80%93%20Simple%20email%20filtering%20for%20safer%20registration&amp;severity=medium&amp;id=696b3178b22c7ad868965365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12984-cwe-89-improper-neutralization-of-s-f06a6d8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12984%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=696b3178b22c7ad868965360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0833-cwe-79-improper-neutralization-of-in-ca53308c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0833%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Team%20Section%20Block%20%E2%80%93%20Showcase%20Team%20Members%20with%20Layout%20Options&amp;severity=medium&amp;id=696b3178b22c7ad868965371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12825-cwe-862-missing-authorization-in-ze-47e9feff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12825%3A%20CWE-862%20Missing%20Authorization%20in%20zealopensource%20User%20Registration%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=696b1558b22c7ad86881e276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12168-cwe-862-missing-authorization-in-me-2e0a6334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12168%3A%20CWE-862%20Missing%20Authorization%20in%20memsource%20Phrase%20TMS%20Integration%20for%20WordPress&amp;severity=medium&amp;id=696b1558b22c7ad86881e272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14029-cwe-862-missing-authorization-in-ja-1e342df2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14029%3A%20CWE-862%20Missing%20Authorization%20in%20jackdewey%20Community%20Events&amp;severity=medium&amp;id=696b1558b22c7ad86881e27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14463-cwe-862-missing-authorization-in-na-fd9f46bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14463%3A%20CWE-862%20Missing%20Authorization%20in%20naa986%20Payment%20Button%20for%20PayPal&amp;severity=medium&amp;id=696b0749b22c7ad868788fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13725-cwe-22-improper-limitation-of-a-pat-2d78fca4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13725%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20thimpress%20Thim%20Blocks&amp;severity=medium&amp;id=696b0749b22c7ad868788fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0682-cwe-918-server-side-request-forgery--930ba4bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0682%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=low&amp;id=696b0749b22c7ad868788fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0820-cwe-862-missing-authorization-in-swe-31cb7adc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0820%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20RepairBuddy%20%E2%80%93%20Repair%20Shop%20CRM%20%26%20Booking%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=696b0749b22c7ad868788fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12002-cwe-22-improper-limitation-of-a-pat-bb6f54dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12002%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Awesome%20Motive%20YouTube%20Feed%20Pro&amp;severity=medium&amp;id=696af5b4b22c7ad86850279d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12718-cwe-20-improper-input-validation-in-38ef34ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12718%3A%20CWE-20%20Improper%20Input%20Validation%20in%20saadiqbal%20Quick%20Contact%20Form&amp;severity=medium&amp;id=696af5b4b22c7ad8685027a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14632-cwe-434-unrestricted-upload-of-file-0ff81a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14632%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Filr%20%E2%80%93%20Secure%20document%20library&amp;severity=medium&amp;id=696af5b4b22c7ad8685027b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15403-cwe-269-improper-privilege-manageme-87b5283a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15403%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=critical&amp;id=696af5b4b22c7ad8685027bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14450-cwe-862-missing-authorization-in-wp-851d4a21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14450%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Wallet%20System%20for%20WooCommerce%20%E2%80%93%20Digital%20Wallet%2C%20Buy%20Now%20Pay%20Later%20(BNPL)%2C%20Instant%20Cashback%2C%20Referral%20program%2C%20Partial%20%26%20Subscription%20Payments&amp;severity=medium&amp;id=696af5b4b22c7ad8685027b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14075-cwe-200-exposure-of-sensitive-infor-befc1c4b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14075%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=696af5b4b22c7ad8685027aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0519-vulnerability-in-absolute-security-s-9306082e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0519%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696aeb28b22c7ad8683b8232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0518-vulnerability-in-absolute-security-s-df7d9f27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0518%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696aeb28b22c7ad8683b822f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0517-vulnerability-in-absolute-security-s-2c33b004</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0517%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=696b37a7d302b072d9b4c42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siklu-etherhaul-series-eh-8010-remote-command-exec-48e9e28c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Siklu%20EtherHaul%20Series%20EH-8010%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=696c9008d302b072d9ad2abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/siklu-etherhaul-series-eh-8010-arbitrary-file-uplo-ee37f024</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Siklu%20EtherHaul%20Series%20EH-8010%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=696c9008d302b072d9ad2ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rpi-jukebox-rfid-280-remote-command-execution-438f2ff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RPi-Jukebox-RFID%202.8.0%20-%20Remote%20Command%20Execution&amp;severity=medium&amp;id=696c9008d302b072d9ad2ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-17-8f6db1a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-17&amp;severity=medium&amp;id=696c250bd302b072d93b5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15529-denial-of-service-in-open5gs-223f10b1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15529%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696ab9f0b22c7ad868fb1a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15528-denial-of-service-in-open5gs-c9708e24</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15528%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=696ab9f0b22c7ad868fb1a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23745-cwe-22-improper-limitation-of-a-pat-efba1e80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23745%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20isaacs%20node-tar&amp;severity=high&amp;id=696ab9f0b22c7ad868fb1aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21223-cwe-269-improper-privilege-manageme-812815e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21223%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=696ab2f1b22c7ad868f75ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20960-cwe-285-improper-authorization-in-m-29f6cc2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20960%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Power%20Apps%20Desktop%20Client&amp;severity=high&amp;id=696ab2f1b22c7ad868f75dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23800-cwe-266-incorrect-privilege-assignm-c0405f66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23800%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Modular%20DS&amp;severity=critical&amp;id=696aa4d9b22c7ad868ee9e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/december-2025-infostealer-trend-report-f997717b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=December%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=696df8d5d302b072d99485c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23744-cwe-306-missing-authentication-for--e4efbddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23744%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MCPJam%20inspector&amp;severity=critical&amp;id=696a9dd0b22c7ad868e95256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23742-cwe-94-improper-control-of-generati-f487f23e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23742%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20zalando%20skipper&amp;severity=high&amp;id=696a9dd0b22c7ad868e95251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23735-cwe-362-concurrent-execution-using--6cc6fd42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23735%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20graphql-hive%20graphql-modules&amp;severity=high&amp;id=696a9dd0b22c7ad868e9524b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23731-cwe-1021-improper-restriction-of-re-11bda56f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23731%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a9a4cb22c7ad868e6ff27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23730-cwe-601-url-redirection-to-untruste-aba9d8b1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23730%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23729-cwe-601-url-redirection-to-untruste-f73d8863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23729%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23728-cwe-601-url-redirection-to-untruste-e0169b5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23728%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23727-cwe-601-url-redirection-to-untruste-2ca4d83b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23727%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23726-cwe-601-url-redirection-to-untruste-32fb4400</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23726%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23725-cwe-79-improper-neutralization-of-i-8225a3ad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23725%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23724-cwe-79-improper-neutralization-of-i-ab9e5f84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23724%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=696a96c8b22c7ad868e58b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23722-cwe-79-improper-neutralization-of-i-e6cd8bcb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=696a9344b22c7ad868dc8352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23723-cwe-89-improper-neutralization-of-s-0b58a728</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23723%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=696a9344b22c7ad868dc8355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23645-cwe-79-improper-neutralization-of-i-05b2cd3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23645%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=696a8fc2b22c7ad868d78294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23535-cwe-22-improper-limitation-of-a-pat-55cce8b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23535%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20wlc&amp;severity=high&amp;id=696a8fc2b22c7ad868d78299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48647-vulnerability-in-google-google-devi-e266be15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48647%3A%20Vulnerability%20in%20Google%20Google%20Devices&amp;severity=high&amp;id=696a8534b22c7ad868cd4e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15032-cwe-1021-improper-restriction-of-re-9e94c4fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15032%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20Dia&amp;severity=high&amp;id=696a81b1b22c7ad868cae2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-malware-uses-5001000-concatenated-zip-a-680f3c5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GootLoader%20Malware%20Uses%20500%E2%80%931%2C000%20Concatenated%20ZIP%20Archives%20to%20Evade%20Detection&amp;severity=medium&amp;id=696b427ed302b072d9d1fe25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0629-cwe-287-improper-authentication-in-t-6479c158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0629%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20VIGI%20InSight%20Sx45%20Series%20(S245%2FS345%2FS445)&amp;severity=high&amp;id=696a7724b22c7ad868c4289e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31186-an-app-may-be-able-to-bypass-privac-bc9d706d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31186%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20Xcode&amp;severity=low&amp;id=696a73a1b22c7ad868c2e46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24090-an-app-may-be-able-to-enumerate-a-u-dc1877c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24090%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43508-an-app-may-be-able-to-access-sensit-2875b2fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43508%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=696a73a1b22c7ad868c2e472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44210-an-app-may-be-able-to-access-user-s-72932ec2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44210%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24089-an-app-may-be-able-to-enumerate-a-u-dfb76829</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24089%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=696a73a1b22c7ad868c2e469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54556-a-user-may-be-able-to-view-restrict-166ac3b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54556%3A%20A%20user%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=696a73a1b22c7ad868c2e466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44238-an-app-may-be-able-to-corrupt-copro-1c471c8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44238%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=696a73a1b22c7ad868c2e463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23529-cwe-73-external-control-of-file-nam-ad7e4019</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23529%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Aiven-Open%20bigquery-connector-for-apache-kafka&amp;severity=high&amp;id=696a701db22c7ad868c0d111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/key-attack-scenarios-involving-brand-impersonation-96cc02f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Key%20attack%20scenarios%20involving%20brand%20impersonation&amp;severity=medium&amp;id=696a6cd4b22c7ad868bf68c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23528-cwe-80-improper-neutralization-of-s-0c949789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23528%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20dask%20distributed&amp;severity=medium&amp;id=696a701db22c7ad868c0d10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23523-cwe-94-improper-control-of-generati-76d45acb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23523%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=critical&amp;id=696a6c98b22c7ad868bf5936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0949-improper-neutralization-of-input-dur-bd621056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnterpriseDB%20Postgres%20Enterprise%20Manager%20(PEM)&amp;severity=medium&amp;id=696a6c98b22c7ad868bf5933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-fortisiem-flaw-exploited-sean-planke-6edc2350</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20FortiSIEM%20Flaw%20Exploited%2C%20Sean%20Plankey%20Renominated%2C%20Russia%E2%80%99s%20Polish%20Grid%20Attack&amp;severity=medium&amp;id=696a655db22c7ad868bc2bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29943-cwe-123-write-what-where-condition--de625fa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29943%3A%20CWE-123%20%20Write-what-where%20Condition%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=696a5e8ab22c7ad868b8032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21625-cwe-434-unrestricted-upload-of-file-d3e5782e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21625%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=medium&amp;id=696a5780b22c7ad868b44185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21624-cwe-79-improper-neutralization-of-i-bc4c653a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=696a5780b22c7ad868b44182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21623-cwe-79-improper-neutralization-of-i-e6f5f1d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stackideas.com%20EasyDiscuss%20extension%20for%20Joomla&amp;severity=critical&amp;id=696a5780b22c7ad868b4417f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-malicious-chrome-extensions-impersonate-workd-28054f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Malicious%20Chrome%20Extensions%20Impersonate%20Workday%20and%20NetSuite%20to%20Hijack%20Accounts&amp;severity=medium&amp;id=696b427ed302b072d9d1fe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0696-cwe-1004-sensitive-cookie-without-ht-db579a0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0696%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20ConnectWise%20PSA&amp;severity=medium&amp;id=696a4268b22c7ad868a8d100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0695-cwe-79-improper-neutralization-of-in-3b545ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ConnectWise%20PSA&amp;severity=high&amp;id=696a4268b22c7ad868a8d0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14510-cwe-303-incorrect-implementation-of-047752f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14510%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20ABB%20ABB%20Ability%20OPTIMAX&amp;severity=high&amp;id=696a3b60b22c7ad868a461fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0615-cwe-497-exposure-of-sensitive-system-271e46e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0615%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0616-cwe-497-exposure-of-sensitive-system-d0f5d01f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0616%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0613-cwe-497-exposure-of-sensitive-system-046ddc2a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0613%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0612-cwe-497-exposure-of-sensitive-system-6bc20f0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0612%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TheLibrarian%20TheLibrarian.io&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14894-cwe-434-unrestricted-upload-of-file-67dc654f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14894%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bee%20interactive%20Livewire%20Filemanager&amp;severity=high&amp;id=696a37dcb22c7ad868a1fe8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/750000-impacted-by-data-breach-at-canadian-investm-119347f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=750%2C000%20Impacted%20by%20Data%20Breach%20at%20Canadian%20Investment%20Watchdog&amp;severity=medium&amp;id=696a30a3b22c7ad8689f3fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-social-engineering-aaa35ce5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20Social%20Engineering&amp;severity=high&amp;id=696a30a3b22c7ad8689f3fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whisperpair-attack-leaves-millions-of-bluetooth-ac-3959fbce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhisperPair%20Attack%20Leaves%20Millions%20of%20Audio%20Accessories%20Open%20to%20Hijacking&amp;severity=critical&amp;id=696a2615b22c7ad86898d8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-firms-react-to-chinas-reported-softw-89e2ae3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Firms%20React%20to%20China%E2%80%99s%20Reported%20Software%20Ban&amp;severity=medium&amp;id=696a2291b22c7ad868981805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-digital-footprint-can-lead-right-to-your-fron-df1404ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Digital%20Footprint%20Can%20Lead%20Right%20to%20Your%20Front%20Door&amp;severity=medium&amp;id=696a1803b22c7ad8688eb76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lotuslite-backdoor-targets-us-policy-entities-usin-13384cc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LOTUSLITE%20Backdoor%20Targets%20U.S.%20Policy%20Entities%20Using%20Venezuela-Themed%20Spear%20Phishing&amp;severity=medium&amp;id=696b427ed302b072d9d1fe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68675-cwe-532-insertion-of-sensitive-info-09ada261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68675%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=696a14b5b22c7ad8688c7da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59870-vulnerability-in-hcl-software-myxal-d9275429</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59870%3A%20Vulnerability%20in%20HCL%20Software%20MyXalytics&amp;severity=high&amp;id=696a1130b22c7ad8688a3518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68438-cwe-200-exposure-of-sensitive-infor-7325dea7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68438%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=696a1130b22c7ad8688a351b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-vulnerability-exploited-by-chinese-h-93286da1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Vulnerability%20Exploited%20by%20Chinese%20Hackers&amp;severity=medium&amp;id=696a09f6b22c7ad86863a064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14844-cwe-639-authorization-bypass-throug-db5a2ea6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14844%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=high&amp;id=696a06a5b22c7ad8685c6d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12007-cwe-347-improper-verification-of-cr-07b92303</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12007%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X13SEM-F&amp;severity=high&amp;id=6969fa2a7c726673b6148cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60021-cwe-77-improper-neutralization-of-s-829a2013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60021%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=critical&amp;id=6969fa2a7c726673b6148cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14757-cwe-862-missing-authorization-in-st-6258ed63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14757%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=6969fa2a7c726673b6148ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12006-cwe-347-improper-verification-of-cr-cadba4f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12006%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X12STW-F&amp;severity=high&amp;id=6969fa2a7c726673b6148cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0913-cwe-79-improper-neutralization-of-in-38a53d62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=6969f6a67c726673b6129c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1004-cwe-862-missing-authorization-in-wpd-b081ce7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1004%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=6969f6a67c726673b6129c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22876-improper-limitation-of-a-pathname-t-1389f4a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22876%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=medium&amp;id=6969f6a67c726673b6129c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20894-cross-site-scripting-xss-in-toa-cor-69babe07</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20894%3A%20Cross-site%20scripting%20(XSS)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=medium&amp;id=6969f6a67c726673b6129c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20759-improper-neutralization-of-special--69ac3303</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20759%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOA%20Corporation%20Multiple%20Network%20Cameras%20TRIFORA%203%20series&amp;severity=high&amp;id=6969f6a67c726673b6129c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14375-cwe-79-improper-neutralization-of-i-e277c6ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14375%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebelcode%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=6969e8957c726673b6094b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1003-cwe-862-missing-authorization-in-rox-cf1776ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1003%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20GetGenie%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%20%26%20SEO%20Tracking%20Tools&amp;severity=medium&amp;id=6969e8957c726673b6094b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-exploits-sitecore-zero-day-in-att-cf9a6aa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT%20Exploited%20Sitecore%20Zero-Day%20in%20Critical%20Infrastructure%20Intrusion&amp;severity=critical&amp;id=696a0eecb22c7ad8687e4515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14793-cwe-918-server-side-request-forgery-fad94df4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14793%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20torstenbulk%20DK%20PDF%20%E2%80%93%20WordPress%20PDF%20Generator&amp;severity=medium&amp;id=6969e18d7c726673b6064126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14853-cwe-352-cross-site-request-forgery--2fc831cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14853%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smings%20LEAV%20Last%20Email%20Address%20Validator&amp;severity=medium&amp;id=6969e18d7c726673b606412d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0939-cwe-345-insufficient-verification-of-516891f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0939%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20linknacional%20Rede%20Ita%C3%BA%20for%20WooCommerce%20%E2%80%94%20Payment%20PIX%2C%20Credit%20Card%20and%20Debit&amp;severity=medium&amp;id=6969e18d7c726673b6064137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0942-cwe-306-missing-authentication-for-c-a7be5941</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0942%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20linknacional%20Rede%20Ita%C3%BA%20for%20WooCommerce%20%E2%80%94%20Payment%20PIX%2C%20Credit%20Card%20and%20Debit&amp;severity=medium&amp;id=6969e18d7c726673b606413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0916-cwe-79-improper-neutralization-of-in-f08982e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keesiemeijer%20Related%20Posts%20by%20Taxonomy&amp;severity=medium&amp;id=6969e18d7c726673b6064133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0975-cwe-77-improper-neutralization-of-sp-238d7ef3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0975%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Delta%20Electronics%20DIAView&amp;severity=high&amp;id=6969d7017c726673b6feabd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-zero-day-rce-exploited-by-china-link-9a3a7456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Zero-Day%20RCE%20Exploited%20by%20China-Linked%20APT%20in%20Secure%20Email%20Gateways&amp;severity=medium&amp;id=696a0eecb22c7ad8687e4518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23769-cwe-79-improper-neutralization-of-i-0e86a5ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20lucy-xss-filter&amp;severity=medium&amp;id=6969cc767c726673b6f69cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23768-cwe-918-server-side-request-forgery-c92d77e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23768%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NAVER%20lucy-xss-filter&amp;severity=medium&amp;id=6969cc767c726673b6f69cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0858-stored-xss-in-netsourceforgeplantuml-fd195677</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0858%3A%20Stored%20XSS%20in%20net.sourceforge.plantuml%3Aplantuml&amp;severity=medium&amp;id=6969c8f27c726673b6f36687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14384-cwe-862-missing-authorization-in-sm-d7b57653</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14384%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1000-cwe-862-missing-authorization-in-mai-8c02be30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1000%3A%20CWE-862%20Missing%20Authorization%20in%20mailerlite%20MailerLite%20%E2%80%93%20WooCommerce%20integration&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15370-cwe-639-authorization-bypass-throug-ef7ad2b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15370%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paultgoodchild%20Shield%3A%20Blocks%20Bots%2C%20Protects%20Users%2C%20and%20Prevents%20Security%20Breaches&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12957-cwe-434-unrestricted-upload-of-file-a1ed58c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12957%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=6969c56d7c726673b6f0ba61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12641-cwe-862-missing-authorization-in-aw-c733352b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12641%3A%20CWE-862%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15526-cwe-209-generation-of-error-message-4394609b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15526%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15527-cwe-200-exposure-of-sensitive-infor-bbaff840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15527%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14982-cwe-862-missing-authorization-in-wp-c6c3f78b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14982%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6969c56d7c726673b6f0ba69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1023-cwe-306-missing-authentication-for-c-90d98653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1023%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Statistics%20Database%20System&amp;severity=high&amp;id=6969b75e7c726673b6e69b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1022-cwe-23-relative-path-traversal-in-go-152a9f2a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1022%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Gotac%20Statistics%20Database%20System&amp;severity=high&amp;id=6969b75e7c726673b6e69b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1021-cwe-434-unrestricted-upload-of-file--c0c2c5ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1021%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=critical&amp;id=6969b0567c726673b6c490b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1020-cwe-36-absolute-path-traversal-in-go-dbe01ed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1020%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=medium&amp;id=6969b0567c726673b6c490b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1019-cwe-306-missing-authentication-for-c-041a882b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1019%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=critical&amp;id=6969b0567c726673b6c490ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1018-cwe-36-absolute-path-traversal-in-go-74dae460</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1018%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Gotac%20Police%20Statistics%20Database%20System&amp;severity=high&amp;id=6969a5c97c726673b6b924fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62581-cwe-321-use-of-hard-coded-cryptogra-18c1d511</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62581%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=6969a5c97c726673b6b924f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62582-cwe-306-missing-authentication-for--d3b61dc7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62582%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=6969a5c97c726673b6b924f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64769-cwe-319-in-aveva-process-optimizati-e10ec928</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64769%3A%20CWE-319%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65117-cwe-676-in-aveva-process-optimizati-5836ab29</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65117%3A%20CWE-676%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64729-cwe-862-in-aveva-process-optimizati-48fb5bf2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64729%3A%20CWE-862%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65118-cwe-427-in-aveva-process-optimizati-5718ed1b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65118%3A%20CWE-427%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61943-cwe-89-in-aveva-process-optimizatio-60e63e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61943%3A%20CWE-89%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64691-cwe-94-in-aveva-process-optimizatio-91c6aca2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64691%3A%20CWE-94%20in%20AVEVA%20Process%20Optimization&amp;severity=high&amp;id=696989a97c726673b69cdace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61937-cwe-94-in-aveva-process-optimizatio-3b3044cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61937%3A%20CWE-94%20in%20AVEVA%20Process%20Optimization&amp;severity=critical&amp;id=696989a97c726673b69cdac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-16-432be40f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-16&amp;severity=medium&amp;id=696ad256b22c7ad868047d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56451-na-1b45e936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56451%3A%20n%2Fa&amp;severity=medium&amp;id=696aaf65b22c7ad868f5fee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69581-na-cd6c2092</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69581%3A%20n%2Fa&amp;severity=medium&amp;id=696a9344b22c7ad868dc834e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68924-cwe-829-inclusion-of-functionality--0050f6aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68924%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Umbraco%20Forms&amp;severity=high&amp;id=696a88b8b22c7ad868ce94a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61873-na-d817035a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61873%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20bestpractical%20Request%20Tracker&amp;severity=low&amp;id=696a81b1b22c7ad868cae2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43904-cwe-863-incorrect-authorization-in--8c27b2c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43904%3A%20CWE-863%20Incorrect%20Authorization%20in%20SchedMD%20Slurm&amp;severity=medium&amp;id=696a7e2cb22c7ad868c7aa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51602-na-dfdedc72</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51602%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VideoLAN%20VLC%20media%20player&amp;severity=medium&amp;id=696a7e2cb22c7ad868c7aa03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24531-cwe-393-return-of-wrong-status-code-e5a061cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24531%3A%20CWE-393%20Return%20of%20Wrong%20Status%20Code%20in%20OpenSC%20project%20pam_pkcs11&amp;severity=medium&amp;id=696a7aa9b22c7ad868c5764a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31510-cwe-79-improper-neutralization-of-i-5e295fcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20lemonldap-ng%20LemonLDAP%3A%3ANG&amp;severity=high&amp;id=696a7aa9b22c7ad868c57647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24528-cwe-190-integer-overflow-or-wraparo-ed44f9a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24528%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20MIT%20Kerberos%205&amp;severity=high&amp;id=696a7724b22c7ad868c4289a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70746-na-deaef130</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70746%3A%20n%2Fa&amp;severity=high&amp;id=696a620db22c7ad868babe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71020-na-6800fcaf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71020%3A%20n%2Fa&amp;severity=high&amp;id=696a5b05b22c7ad868b74e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68921-na-2a1c9855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68921%3A%20n%2Fa&amp;severity=high&amp;id=696a5078b22c7ad868b11dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14237-cwe-787-out-of-bounds-write-in-cano-abf0cbe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14237%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697f1e7c726673b68c4162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14236-cwe-787-out-of-bounds-write-in-cano-e90be9e1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14236%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14235-cwe-787-out-of-bounds-write-in-cano-86d77d6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14235%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14234-cwe-787-out-of-bounds-write-in-cano-d160e8dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14234%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14233-cwe-763-release-of-invalid-pointer--26aac043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14233%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14232-cwe-787-out-of-bounds-write-in-cano-73d64ac5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14232%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14231-cwe-787-out-of-bounds-write-in-cano-064e172c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14231%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20LBP670C%20Series&amp;severity=critical&amp;id=69697b997c726673b68af95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1011-cwe-79-improper-neutralization-of-in-3c3d4f6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=medium&amp;id=696978157c726673b6895f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1010-cwe-79-improper-neutralization-of-in-37663ca5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Enterprise%20Server&amp;severity=high&amp;id=696974917c726673b6855148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22864-cwe-77-improper-neutralization-of-s-6edc20a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22864%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=696974917c726673b685514b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22863-cwe-325-missing-cryptographic-step--3361159c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22863%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20denoland%20deno&amp;severity=critical&amp;id=696974917c726673b6855151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1009-cwe-79-improper-neutralization-of-in-0988a46f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=critical&amp;id=6969710d7c726673b6836a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68671-cwe-294-authentication-bypass-by-ca-fae84d96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68671%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20treeverse%20lakeFS&amp;severity=medium&amp;id=6969710d7c726673b6836a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1008-cwe-79-improper-neutralization-of-in-bd59933a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Altium%20Altium%20Live&amp;severity=high&amp;id=69696d897c726673b67e92cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0915-cwe-908-use-of-uninitialized-resourc-945e6348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0915%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696966817c726673b661c89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21921-cwe-416-use-after-free-in-juniper-n-a76791a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21921%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=696951f81ab3796b10539d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21920-cwe-252-unchecked-return-value-in-j-78aeb347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21920%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21918-cwe-415-double-free-in-juniper-netw-7963ee06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21918%3A%20CWE-415%20Double%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21917-cwe-1286-improper-validation-of-syn-b1f662ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21917%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=696951f81ab3796b10539cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21914-cwe-667-improper-locking-in-juniper-6bbb1d2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21914%3A%20CWE-667%20Improper%20Locking%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b1050015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21913-cwe-1419-incorrect-initialization-o-6d6acb31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21913%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b10500157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21912-cwe-367-time-of-check-time-of-use-t-48ab73a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21912%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b10500153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21911-cwe-682-incorrect-calculation-in-ju-f9e2c67c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21911%3A%20CWE-682%20Incorrect%20Calculation%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=69694e771ab3796b1050014f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21910-cwe-754-improper-check-for-unusual--565e570b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21910%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b1050014b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21909-cwe-401-missing-release-of-memory-a-f10fdd96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21909%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e771ab3796b10500147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21908-cwe-416-use-after-free-in-juniper-n-f96611ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21908%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e771ab3796b10500143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21907-cwe-327-use-of-a-broken-or-risky-cr-e0f690bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21907%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=69694e771ab3796b1050013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21906-cwe-755-improper-handling-of-except-02d5cac0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21906%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b1050010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21905-cwe-835-loop-with-unreachable-exit--0e61f2b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21905%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b1050010a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21903-cwe-121-stack-based-buffer-overflow-c722cbf1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21903%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b10500106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0203-cwe-755-improper-handling-of-excepti-980f4f2a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0203%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b10500102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60011-cwe-754-improper-check-for-unusual--6c07a66e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60011%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60007-cwe-476-null-pointer-dereference-in-511d4875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60003-cwe-126-buffer-over-read-in-juniper-d2abf351</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60003%3A%20CWE-126%20Buffer%20Over-read%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b105000f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59961-cwe-732-incorrect-permission-assign-00405344</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59961%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69694e761ab3796b105000ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59960-cwe-754-improper-check-for-unusual--f0b21a74</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59960%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=69694e761ab3796b105000ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59959-cwe-822-untrusted-pointer-dereferen-de77e745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59959%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=69695d667c726673b645f26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52987-cwe-1021-improper-restriction-of-re-896bfca5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52987%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Juniper%20Networks%20Paragon%20Automation%20(Pathfinder%2C%20Planner%2C%20Insights)&amp;severity=medium&amp;id=69695d667c726673b645f26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23746-cwe-306-missing-authentication-for--3ee3d0fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23746%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Entrust%20Corporation%20Instant%20Financial%20Issuance%20(IF)&amp;severity=critical&amp;id=6969476c1ab3796b1034af87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-codebuild-misconfiguration-exposed-github-repo-8d88a99d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20CodeBuild%20Misconfiguration%20Exposed%20GitHub%20Repos%20to%20Potential%20Supply%20Chain%20Attacks&amp;severity=critical&amp;id=696964ea7c726673b65bc225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23622-cwe-352-cross-site-request-forgery--29cd7f09</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23622%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alextselegidis%20easyappointments&amp;severity=high&amp;id=6969476c1ab3796b1034af96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23527-cwe-444-inconsistent-interpretation-8672415e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23527%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20h3js%20h3&amp;severity=high&amp;id=6969476c1ab3796b1034af92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23520-cwe-78-improper-neutralization-of-s-a885c742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23520%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20getarcaneapp%20arcane&amp;severity=critical&amp;id=6969476c1ab3796b1034af8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23766-b3f40f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23766&amp;severity=null&amp;id=6990b91cc9e1ff5ad8a36ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23519-cwe-208-observable-timing-discrepan-0c871956</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23519%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20RustCrypto%20utils&amp;severity=high&amp;id=6969476c1ab3796b1034af9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22775-cwe-405-asymmetric-resource-consump-a140cbfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22775%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=69693b3453752d4047d52868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22774-cwe-405-asymmetric-resource-consump-350cc646</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22774%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=69693b3453752d4047d5286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0227-cwe-754-improper-check-for-unusual-o-59ec22cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0227%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=69693e4b1ab3796b101b8835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22803-cwe-789-memory-allocation-with-exce-39b2be76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22803%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20sveltejs%20kit&amp;severity=high&amp;id=69693e4b1ab3796b101b8838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67647-cwe-248-uncaught-exception-in-svelt-82550457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67647%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20sveltejs%20kit&amp;severity=high&amp;id=6969342c53752d4047cfdaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13845-cwe-416-use-after-free-in-schneider-0cd394f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13845%3A%20CWE-416%20Use%20After%20Free%20in%20Schneider%20Electric%20EcoStruxure%20Power%20Build%20Rapsody&amp;severity=high&amp;id=6969342c53752d4047cfdaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13844-cwe-415-double-free-in-schneider-el-8351af62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13844%3A%20CWE-415%20Double%20Free%20in%20Schneider%20Electric%20EcoStruxure%20Power%20Build%20Rapsody&amp;severity=high&amp;id=6969342c53752d4047cfdadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stackwarp-attack-threatens-confidential-vms-on-005abf70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98StackWarp%E2%80%99%20Attack%20Threatens%20Confidential%20VMs%20on%20AMD%20Processors&amp;severity=critical&amp;id=69692cf153752d4047c83ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36911-information-disclosure-in-google-an-ff46e1a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36911%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=696929a053752d4047c61cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9014-cwe-20-improper-input-validation-in--61beb757</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9014%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14&amp;severity=medium&amp;id=696929a053752d4047c61cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coding-tested-ai-agents-nail-sqli-but-fail-mi-3d1039bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe%20Coding%20Tested%3A%20AI%20Agents%20Nail%20SQLi%20but%20Fail%20Miserably%20on%20Security%20Controls&amp;severity=medium&amp;id=696921fb53752d4047a62dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/humint-operations-uncover-cryptojacking-campaign-d-3649a378</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HUMINT%20Operations%20Uncover%20Cryptojacking%20Campaign%3A%20Discord-Based%20Distribution%20of%20Clipboard%20Hijacking%20Malware%20Targeting%20Cryptocurrency%20Communities&amp;severity=medium&amp;id=696a3ee4b22c7ad868a7522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62193-cwe-78-improper-neutralization-of-s-5ff62ee0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62193%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20National%20Oceanic%20and%20Atmospheric%20Administration%20(NOAA)%20Live%20Access%20Server%20(LAS)&amp;severity=critical&amp;id=69691b9253752d4047972530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20075-improper-neutralization-of-input-du-954de297</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=69691b9253752d404797253f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20047-improper-neutralization-of-script-r-997c95f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20047%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69691b9253752d404797253c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20076-improper-neutralization-of-input-du-2c2b760e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=69691b9253752d4047972542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22867-cwe-79-improper-neutralization-of-i-03fd4933</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suitenumerique%20docs&amp;severity=high&amp;id=696916c94c611209ad420daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66417-cwe-89-improper-neutralization-of-s-6a1ea466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66417%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=high&amp;id=696916c94c611209ad420d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66292-cwe-22-improper-limitation-of-a-pat-88df64f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66292%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20donknap%20dpanel&amp;severity=high&amp;id=696916c94c611209ad420d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64516-cwe-284-improper-access-control-in--98125ae4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64516%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=high&amp;id=696913454c611209ad3d9faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-analysis-full-execution-break-57f30e94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%20Analysis%3A%20Full%20Execution%20Breakdown&amp;severity=medium&amp;id=69690c3d4c611209ad343769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-wordpress-modular-ds-plugin-flaw-actively-25b680c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WordPress%20Modular%20DS%20Plugin%20Flaw%20Actively%20Exploited%20to%20Gain%20Admin%20Access&amp;severity=critical&amp;id=6969216753752d4047a49a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunting-lazarus-inside-the-contagious-interview-c2-ba092a78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunting%20Lazarus%3A%20Inside%20the%20Contagious%20Interview%20C2%20Infrastructure&amp;severity=medium&amp;id=69690c3d4c611209ad343777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-desktop-window-manager-zero-day-vulnerab-46f9d36a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Desktop%20Window%20Manager%20Zero-Day%20Vulnerability%20(CVE-2026-20805)%20Actively%20Exploited%3B%20Urgent%20Patch%20Released&amp;severity=high&amp;id=6969064c4c611209ad2d78bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/command-evade-turlas-kazuar-v3-loader-5ae953d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Command%20%26%20Evade%3A%20Turla&apos;s%20Kazuar%20v3%20Loader&amp;severity=medium&amp;id=696908b84c611209ad2ef0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61973-cwe-284-improper-access-control-in--aefac3ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61973%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Epic%20Games%20Epic%20Games%20Store&amp;severity=high&amp;id=696908b94c611209ad2ef133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-sextortion-a-new-threat-to-privacy-kasp-12b568bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-powered%20sextortion%3A%20a%20new%20threat%20to%20privacy%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=696905724c611209ad2b6595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-reveal-reprompt-attack-allowing-single-d2213d98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Reveal%20Reprompt%20Attack%20Allowing%20Single-Click%20Data%20Exfiltration%20From%20Microsoft%20Copilot&amp;severity=low&amp;id=6969216753752d4047a49a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0992-uncontrolled-resource-consumption-in-62b16cbd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0992%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6968faa94c611209ad23897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0989-uncontrolled-recursion-in-red-hat-re-f874fb4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0989%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=6968faa94c611209ad238972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0990-uncontrolled-recursion-in-red-hat-re-4f0050ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0990%3A%20Uncontrolled%20Recursion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6968faa94c611209ad238976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0897-cwe-770-allocation-of-resources-with-da1bfc54</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0897%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Google%20Keras&amp;severity=high&amp;id=6968f7254c611209ad1c4a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-voice-cloning-exploit-wi-fi-9921f37b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Voice%20Cloning%20Exploit%2C%20Wi-Fi%20Kill%20Switch%2C%20PLC%20Vulns%2C%20and%2014%20More%20Stories&amp;severity=medium&amp;id=6969216753752d4047a49a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13859-cwe-862-missing-authorization-in-wp-d4f33893</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13859%3A%20CWE-862%20Missing%20Authorization%20in%20wpcenter%20AffiliateX%20%E2%80%93%20Amazon%20Affiliate%20Plugin&amp;severity=medium&amp;id=6968ec9a4c611209ad10ace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13062-cwe-434-unrestricted-upload-of-file-75b879c4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13062%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20divisupreme%20Supreme%20Modules%20Lite%20%E2%80%93%20Divi%20Theme%2C%20Extra%20Theme%20and%20Divi%20Builder&amp;severity=high&amp;id=6968ec9a4c611209ad10ace0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12895-cwe-862-missing-authorization-in-la-2326194c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12895%3A%20CWE-862%20Missing%20Authorization%20in%20Laborator%20Kalium%203%20%7C%20Creative%20WordPress%20%26%20WooCommerce%20Theme&amp;severity=medium&amp;id=6968ec9a4c611209ad10acdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22646-cwe-209-generation-of-error-message-42b8f4f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22646%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9b4c611209ad10ad41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22645-cwe-200-exposure-of-sensitive-infor-8a1b00cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22645%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9b4c611209ad10ad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22644-cwe-598-use-of-get-request-method-w-f9cade54</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22644%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20Incoming%20Goods%20Suite&amp;severity=medium&amp;id=6968ec9a4c611209ad10ad19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22643-cwe-20-improper-input-validation-in-371b592c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22643&amp;severity=null&amp;id=6968ec9a4c611209ad10ad11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22642-cwe-601-url-redirection-to-untruste-3c957cb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22642&amp;severity=null&amp;id=6968ec9a4c611209ad10ad09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22641-cwe-285-improper-authorization-in-s-fdb80616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22641&amp;severity=null&amp;id=6968ec9a4c611209ad10ad01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22640-cwe-284-improper-access-control-in--1338975e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22640&amp;severity=null&amp;id=6968ec9a4c611209ad10acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22639-cwe-200-exposure-of-sensitive-infor-81002f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22639&amp;severity=null&amp;id=6968ec9a4c611209ad10acf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22638-cwe-601-url-redirection-to-untruste-9b73a328</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22638&amp;severity=null&amp;id=6968ec9a4c611209ad10ace9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22637-cwe-79-improper-neutralization-of-i-6e859694</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22637&amp;severity=null&amp;id=6968e9244c611209ad0e7136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0713-cwe-863-incorrect-authorization-in-s-380c37bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0713&amp;severity=null&amp;id=6968e9244c611209ad0e712e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0712-cwe-601-url-redirection-to-untrusted-0ab8d3d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0712&amp;severity=null&amp;id=6968e9244c611209ad0e7126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22920-cwe-1391-use-of-weak-credentials-in-0cee6b9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22920%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=low&amp;id=6968e9254c611209ad0e71b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22919-cwe-79-improper-neutralization-of-i-7652367f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=low&amp;id=6968e9254c611209ad0e71a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22918-cwe-1021-improper-restriction-of-re-b14062af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22918%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e71a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22917-cwe-770-allocation-of-resources-wit-aaaced2b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22917%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22916-cwe-266-incorrect-privilege-assignm-d6f06f95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22916%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22915-cwe-497-exposure-of-sensitive-syste-bee82d8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22915%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22914-cwe-266-incorrect-privilege-assignm-4e1a484c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22914%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9254c611209ad0e7180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22913-cwe-79-improper-neutralization-of-i-7e7b681e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e716e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isverified-emerges-from-stealth-with-voice-deepfak-5a56747b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=isVerified%20Emerges%20From%20Stealth%20With%20Voice%20Deepfake%20Detection%20Apps&amp;severity=medium&amp;id=6968e8e24c611209ad0d75b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22912-cwe-601-url-redirection-to-untruste-0836dc15</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22912%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e7166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22911-cwe-798-use-of-hard-coded-credentia-f9297156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22911%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=medium&amp;id=6968e9244c611209ad0e715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22910-cwe-1391-use-of-weak-credentials-in-c48b460f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22910%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TDC-X401GL&amp;severity=high&amp;id=6968e9244c611209ad0e7156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22909-cwe-284-improper-access-control-in--38bfe6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22909%3A%20CWE-284%20Improper%20Access%20Control%20in%20SICK%20AG%20TDC-X401GL&amp;severity=high&amp;id=6968e9244c611209ad0e714e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22908-cwe-266-incorrect-privilege-assignm-12035fba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22908%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=critical&amp;id=6968e9244c611209ad0e7146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22907-cwe-266-incorrect-privilege-assignm-26174fb1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22907%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SICK%20AG%20TDC-X401GL&amp;severity=critical&amp;id=6968e9244c611209ad0e713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-reprompt-attack-silently-siphons-microsoft-cop-70050aef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Reprompt%E2%80%99%20Attack%20Silently%20Siphons%20Microsoft%20Copilot%20Data&amp;severity=low&amp;id=6968dad24c611209addfcef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0976-improper-input-validation-in-red-hat-6af7e9f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0976%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=6968db144c611209ade073ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-espionage-leveraging-geopolitical-themes-1b4a1cae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20espionage%20leveraging%20geopolitical%20themes&amp;severity=medium&amp;id=696dfc59d302b072d996ad70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-chinas-hosting-ecosystem-18000-malware-c2-s-85e5f7b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20China&apos;s%20Hosting%20Ecosystem%3A%2018%2C000%2B%20Malware%20C2%20Servers%20Mapped%20Across%20Major%20ISPs&amp;severity=medium&amp;id=696df551d302b072d9926058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-security-is-the-wrong-frame-the-real-risk-is-f4112a00</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Model%20Security%20Is%20the%20Wrong%20Frame%20%E2%80%93%20The%20Real%20Risk%20Is%20Workflow%20Security&amp;severity=low&amp;id=6969216753752d4047a49a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/battling-cryptojacking-botnets-and-iabs-x5bguest-d-2930c78d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Battling%20Cryptojacking%2C%20Botnets%2C%20and%20IABs%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Thu%2C%20Jan%2015th)&amp;severity=medium&amp;id=6968c8f10b074b1fa504091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/central-maine-healthcare-data-breach-impacts-14500-be42e222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Central%20Maine%20Healthcare%20Data%20Breach%20Impacts%20145%2C000%20Individuals&amp;severity=medium&amp;id=6968c5de0b074b1fa50040a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-legal-action-disrupts-redvds-cybercrime--d893183d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Legal%20Action%20Disrupts%20RedVDS%20Cybercrime%20Infrastructure%20Used%20for%20Online%20Fraud&amp;severity=low&amp;id=6968b75b0b074b1fa5e95ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/voidlink-linux-malware-framework-targets-cloud-env-9d3bab6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VoidLink%20Linux%20Malware%20Framework%20Targets%20Cloud%20Environments&amp;severity=medium&amp;id=6968b76f0b074b1fa5e9ef87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-601393fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Schneider%2C%20Aveva%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=6968b0550b074b1fa5d7b269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traveler-information-stolen-in-eurail-data-breach-28d4714f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traveler%20Information%20Stolen%20in%20Eurail%20Data%20Breach&amp;severity=medium&amp;id=6968a5c90b074b1fa5b3e28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-fixes-globalprotect-dos-flaw-that-can-cr-7a63a1ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Fixes%20GlobalProtect%20DoS%20Flaw%20That%20Can%20Crash%20Firewalls%20Without%20Login&amp;severity=high&amp;id=6968e1514c611209ad042ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14457-cwe-862-missing-authorization-in-gl-9efade58</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14457%3A%20CWE-862%20Missing%20Authorization%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=low&amp;id=696891250b074b1fa58c19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14448-cwe-79-improper-neutralization-of-i-9b530d45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=69687bcc0b074b1fa56e40e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67823-na-d453dfa5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67823%3A%20n%2Fa&amp;severity=high&amp;id=696a048eb22c7ad86858d3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-15-747be9e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-15&amp;severity=medium&amp;id=6969826b7c726673b691eb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67822-na-0432bac0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67822%3A%20n%2Fa&amp;severity=critical&amp;id=69695f797c726673b6518731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65368-na-d3cc52d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65368%3A%20n%2Fa&amp;severity=medium&amp;id=696958ff1ab3796b105ce50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67025-na-8103763e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67025%3A%20n%2Fa&amp;severity=medium&amp;id=6969557c1ab3796b1059780a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70893-na-2592c988</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70893%3A%20n%2Fa&amp;severity=high&amp;id=696951f81ab3796b10539cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70892-na-68687072</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70892%3A%20n%2Fa&amp;severity=critical&amp;id=696951f81ab3796b10539ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70891-na-8a5af78d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70891%3A%20n%2Fa&amp;severity=medium&amp;id=696951f81ab3796b10539ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70890-na-118b9885</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70890%3A%20n%2Fa&amp;severity=medium&amp;id=69694e761ab3796b105000fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65349-na-a0c6bc03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65349%3A%20n%2Fa&amp;severity=medium&amp;id=69694af11ab3796b104b1134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48077-na-7a20d12f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48077%3A%20n%2Fa&amp;severity=high&amp;id=6969476c1ab3796b1034af99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70303-na-9b8b01e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70303%3A%20n%2Fa&amp;severity=medium&amp;id=6969342c53752d4047cfdaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70302-na-d18ea1ab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70302%3A%20n%2Fa&amp;severity=medium&amp;id=696930ac53752d4047cbfe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70299-na-7c51b7c3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70299%3A%20n%2Fa&amp;severity=medium&amp;id=69692d3453752d4047c938cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70307-na-eadaa7a3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70307%3A%20n%2Fa&amp;severity=high&amp;id=6969261c53752d4047c39ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70305-na-d3f062d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70305%3A%20n%2Fa&amp;severity=medium&amp;id=69691f1453752d40479e43e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70656-na-31371b51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70656%3A%20n%2Fa&amp;severity=high&amp;id=69691b9253752d4047972539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70298-na-841e237f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70298%3A%20n%2Fa&amp;severity=high&amp;id=69691b9253752d4047972536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70310-na-80f722d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70310%3A%20n%2Fa&amp;severity=medium&amp;id=696916c94c611209ad420da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70308-na-a598fbf7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70308%3A%20n%2Fa&amp;severity=high&amp;id=696916c94c611209ad420da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70304-na-f4ac57cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70304%3A%20n%2Fa&amp;severity=high&amp;id=696916c94c611209ad420da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70309-na-3a33ddb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70309%3A%20n%2Fa&amp;severity=medium&amp;id=696913454c611209ad3d9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67246-na-c14e6dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67246%3A%20n%2Fa&amp;severity=high&amp;id=69690fc14c611209ad3adf0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67079-na-ee86966e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67079%3A%20n%2Fa&amp;severity=critical&amp;id=696908b94c611209ad2ef142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67078-na-40adadd0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67078%3A%20n%2Fa&amp;severity=medium&amp;id=696908b94c611209ad2ef13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67077-na-fd090e1d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67077%3A%20n%2Fa&amp;severity=high&amp;id=696908b94c611209ad2ef13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67076-na-7a0522c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67076%3A%20n%2Fa&amp;severity=high&amp;id=696908b94c611209ad2ef136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67084-na-fb5e13bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67084%3A%20n%2Fa&amp;severity=critical&amp;id=696905364c611209ad2b4f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67083-na-be4e7ab4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67083%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67082-na-d4d11422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67082%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67081-na-38911281</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67081%3A%20n%2Fa&amp;severity=medium&amp;id=696905364c611209ad2b4f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71019-na-3b79885b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71019%3A%20n%2Fa&amp;severity=high&amp;id=6968fe2e4c611209ad26113d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70744-na-02d37615</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70744%3A%20n%2Fa&amp;severity=high&amp;id=6968fe2e4c611209ad26113a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-15-17cfb709</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-15&amp;severity=low&amp;id=6968748e0b074b1fa5681360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0600-cwe-918-server-side-request-forgery--86bb8623</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0600%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69681d11f809b25a98e646e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12166-cwe-89-improper-neutralization-of-s-c0bbbf6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12166%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=69681d11f809b25a98e646db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14058-cwe-306-missing-authentication-for--f0f32602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14058%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lenovo%20Tab%20M11%20TB330FU%20TB330XU&amp;severity=low&amp;id=69681d11f809b25a98e646e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0421-cwe-252-unchecked-return-value-in-le-969dbc15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0421%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20Lenovo%20ThinkPad%20L13%20Gen%206%20BIOS&amp;severity=high&amp;id=6968198df809b25a98d552a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13455-cwe-290-authentication-bypass-by-sp-80e9a103</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13455%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=high&amp;id=6968198df809b25a98d5529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13454-cwe-319-cleartext-transmission-of-s-72e52ef0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13454%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=medium&amp;id=6968198df809b25a98d5529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13453-cwe-311-missing-encryption-of-sensi-42865113</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13453%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Lenovo%20ThinkPlus%20FU100&amp;severity=medium&amp;id=6968198df809b25a98d55297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13154-cwe-59-improper-link-resolution-bef-c3602914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13154%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=6968198df809b25a98d55294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0601-cwe-79-improper-neutralization-of-in-b5543384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0601%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=69681608f809b25a98cc777c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0861-cwe-190-integer-overflow-or-wraparou-82abbb78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0861%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=696807fbf809b25a9881d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23512-cwe-426-untrusted-search-path-in-su-529632de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23512%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20sumatrapdfreader%20sumatrapdf&amp;severity=high&amp;id=696800f0f809b25a9857d26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0961-cwe-787-out-of-bounds-write-in-wires-cba205f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0961%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0962-cwe-787-out-of-bounds-write-in-wires-1e32079b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0962%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0960-cwe-835-loop-with-unreachable-exit-c-11784e4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0960%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a98440570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0959-cwe-787-out-of-bounds-write-in-wires-6093b375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0959%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6967fd6ff809b25a9844056c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-redvds-how-a-single-virtual-desktop-provide-81604c60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20RedVDS%3A%20How%20a%20single%20virtual%20desktop%20provider%20fueled%20worldwide%20cybercriminal%20operations&amp;severity=medium&amp;id=6968d02b0b074b1fa510bc12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22036-cwe-770-allocation-of-resources-wit-1655d009</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22036%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nodejs%20undici&amp;severity=medium&amp;id=6967ebd9f809b25a98d9ca09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-null-route-over-550-kimwolf-and-aisuru-e976d1a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Null-Route%20Over%20550%20Kimwolf%20and%20Aisuru%20Botnet%20Command%20Servers&amp;severity=medium&amp;id=69682be609a9118869f2d64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14557-cwe-79-improper-neutralization-of-i-ed1922b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Facebook%20Pixel&amp;severity=medium&amp;id=6967e85ff809b25a98c7765e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14556-cwe-79-improper-neutralization-of-i-44c620b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Flag&amp;severity=medium&amp;id=6967e85ff809b25a98c77656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33206-cwe-78-improper-neutralization-of-s-28460223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33206%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NSIGHT%20Graphics&amp;severity=high&amp;id=6967e189d0ff220b953a1231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23497-cwe-79-improper-neutralization-of-i-f0c46ca1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23497%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=6967e189d0ff220b953a1236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infection-repeatedly-adds-scheduled-tasks-and-incr-69db298f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain%2C%20(Wed%2C%20Jan%2014th)&amp;severity=medium&amp;id=6967f375f809b25a98068854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23477-cwe-269-improper-privilege-manageme-39fd5320</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23477%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20RocketChat%20Rocket.Chat&amp;severity=high&amp;id=6967de03d0ff220b953260fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22819-cwe-366-race-condition-within-a-thr-2b5443e2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22819%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20akinloluwami%20outray&amp;severity=medium&amp;id=6967de03d0ff220b953260fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22787-cwe-79-improper-neutralization-of-i-9574b0d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22787%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eKoopmans%20html2pdf.js&amp;severity=high&amp;id=6967e9c5f809b25a98cd9f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22779-cwe-113-improper-neutralization-of--173940b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22779%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20Neoteroi%20BlackSheep&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21889-cwe-284-improper-access-control-in--1c6049c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=6967c8edd0ff220b95d99078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37181-vulnerability-in-hewlett-packard-en-fae182dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37181%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37185-vulnerability-in-hewlett-packard-en-ecdfaf9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37185%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=medium&amp;id=6967c568d0ff220b95b357ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37184-vulnerability-in-hewlett-packard-en-f41d52da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37184%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=critical&amp;id=6967c568d0ff220b95b357ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37183-vulnerability-in-hewlett-packard-en-29fa7cd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37183%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37182-vulnerability-in-hewlett-packard-en-45744db8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37182%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20EdgeConnect%20SD-WAN%20Orchestrator&amp;severity=high&amp;id=6967c568d0ff220b95b357e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14242-integer-overflow-or-wraparound-in-r-c62b4962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14242%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6967b759d0ff220b956d62cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agents-are-becoming-privilege-escalation-paths-13828f5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agents%20Are%20Becoming%20Authorization%20Bypass%20Paths&amp;severity=medium&amp;id=6967bf72d0ff220b959531d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22820-cwe-367-time-of-check-time-of-use-t-8ccdd136</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22820%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20akinloluwami%20outray&amp;severity=medium&amp;id=6967b3d8d0ff220b954bfaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redvds-cybercrime-service-disrupted-by-microsoft-a-c57ccfa2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedVDS%20Cybercrime%20Service%20Disrupted%20by%20Microsoft%20and%20Law%20Enforcement&amp;severity=medium&amp;id=6967b01cd0ff220b952e52dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22240-cwe-312-cleartext-storage-of-sensit-5905588f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22240%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967b065d0ff220b95304c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22239-cwe-400-uncontrolled-resource-consu-fbd10b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22239%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22238-cwe-306-missing-authentication-for--9047ed73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22238%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22237-cwe-200-exposure-of-sensitive-infor-f5ddd129</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22237%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22236-cwe-287-improper-authentication-in--2b9aa917</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22236%3A%20CWE-287%20Improper%20Authentication%20in%20Bluspark%20Global%20BLUVOYIX&amp;severity=critical&amp;id=6967accdd0ff220b951852a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9142-cwe-22-improper-limitation-of-a-path-8bdd81d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9142%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;).%20in%20checkpoint%20Hramony%20SASE&amp;severity=high&amp;id=6967accdd0ff220b9518529e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sicarii-ransomware-truth-vs-myth-235251a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sicarii%20Ransomware%3A%20Truth%20vs%20Myth&amp;severity=medium&amp;id=6967a966d0ff220b9507e8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-c-ares-dll-side-loading-to-bypass--52eff2b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20c-ares%20DLL%20Side-Loading%20to%20Bypass%20Security%20and%20Deploy%20Malware&amp;severity=medium&amp;id=6967a91cd0ff220b9503dcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-turns-failed-attacks-into-intelli-48a342df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20Spyware%20Turns%20Failed%20Attacks%20Into%20Intelligence%20for%20Future%20Exploits&amp;severity=medium&amp;id=6967a1d08330e067166c873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14317-cwe-359-exposure-of-private-persona-8d49fc92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14317%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Emaintenance%20Crazy%20Bubble%20Tea&amp;severity=high&amp;id=69679e808330e0671667a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13175-cwe-549-missing-password-field-mask-102e56e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13175%3A%20CWE-549%20Missing%20Password%20Field%20Masking%20in%20YSoft%20SafeQ%206&amp;severity=medium&amp;id=696790718330e067162c1a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14338-cwe-284-improper-access-control-in--b3e41c5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14338%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20https%3A%2F%2Fgithub.com%2FShadowBlip%20inputplumber&amp;severity=high&amp;id=696785e78330e06716fcefd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66005-cwe-863-improper-authorization-in-h-069d8bbd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66005%3A%20CWE-863%3A%20Improper%20Authorization%20in%20https%3A%2F%2Fgithub.com%2FShadowBlip%20inputplumber&amp;severity=high&amp;id=696785e78330e06716fcefd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fixes-critical-fortisiem-flaw-allowing-un-978a6498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Fixes%20Critical%20FortiSIEM%20Flaw%20Allowing%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=6967bf72d0ff220b959531d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66169-cypher-injection-in-apache-software-7709fb01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66169%3A%20Cypher%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20Camel%20Neo4j&amp;severity=medium&amp;id=696785e78330e06716fcefdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67859-cwe-287-improper-authentication-in--cbf2ed7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67859%3A%20CWE-287%3A%20Improper%20Authentication%20in%20https%3A%2F%2Fgithub.com%2Flinrunner%20TLP&amp;severity=medium&amp;id=696782608330e06716f2b246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-64-of-3rd-party-applications-access-s-12ef4635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%2064%25%20of%203rd-Party%20Applications%20Access%20Sensitive%20Data%20Without%20Justification&amp;severity=medium&amp;id=6967bf72d0ff220b959531d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0647-cwe-226-sensitive-information-in-res-be4654e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0647%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Arm%20Neoverse-N2&amp;severity=high&amp;id=6967aad3d0ff220b950c94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/robo-advisor-betterment-discloses-data-breach-d4f5764f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Robo-Advisor%20Betterment%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=696777a08330e06716d4231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0532-cwe-918-server-side-request-forgery--12583095</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0532%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=696770cc8330e06716a7ebca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0529-cwe-129-improper-validation-of-array-7a873c8b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0529%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69676d488330e0671697f6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-vulnerabilities-in-forti-ed3747fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20Vulnerabilities%20in%20FortiFone%2C%20FortiSIEM&amp;severity=critical&amp;id=696769928330e067167f6c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-144-firefox-147-patch-high-severity-vulnera-87319021</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20144%2C%20Firefox%20147%20Patch%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=696769928330e067167f6c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-114-windows-flaws-in-january-2026--f28a2b16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixes%20114%20Windows%20Flaws%20in%20January%202026%20Patch%2C%20One%20Actively%20Exploited&amp;severity=critical&amp;id=6967bf72d0ff220b959531d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-nodejs-vulnerability-can-cause-server-cra-6450e38b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Node.js%20Vulnerability%20Can%20Cause%20Server%20Crashes%20via%20async_hooks%20Stack%20Overflow&amp;severity=critical&amp;id=6967bf72d0ff220b959531dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15475-cwe-862-missing-authorization-in-pa-598bd777</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15475%3A%20CWE-862%20Missing%20Authorization%20in%20payhere%20PayHere%20Payment%20Gateway%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=69673f948330e06716b84f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15376-cwe-352-cross-site-request-forgery--7e0ceddc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15376%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rndsand81%20Stopwords%20for%20comments&amp;severity=medium&amp;id=69673f948330e06716b84f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14173-cwe-862-missing-authorization-in-pe-02506ee5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14173%3A%20CWE-862%20Missing%20Authorization%20in%20perfitdev%20Perfit%20WooCommerce&amp;severity=medium&amp;id=69673f948330e06716b84f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14846-cwe-352-cross-site-request-forgery--57a0ae63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14846%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialchampio%20SocialChamp%20with%20WordPress&amp;severity=medium&amp;id=69673f948330e06716b84f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15513-cwe-863-incorrect-authorization-in--da9ac488</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15513%3A%20CWE-863%20Incorrect%20Authorization%20in%20floattechnologies%20Float%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0741-cwe-79-improper-neutralization-of-in-dba929c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0741%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20electric-studio%20Electric%20Studio%20Download%20Counter&amp;severity=medium&amp;id=69673f948330e06716b84fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15512-cwe-862-missing-authorization-in-ap-2489c516</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15512%3A%20CWE-862%20Missing%20Authorization%20in%20aplazopayment%20Aplazo%20Payment%20Gateway&amp;severity=medium&amp;id=69673f948330e06716b84f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0813-cwe-79-improper-neutralization-of-in-4d411496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasannasp%20Short%20Link&amp;severity=medium&amp;id=69673f958330e06716b84fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0734-cwe-79-improper-neutralization-of-in-dba6a60d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dfieldfl%20WP%20Allowed%20Hosts&amp;severity=medium&amp;id=69673f948330e06716b84f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0812-cwe-79-improper-neutralization-of-in-b6ee1ce6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20guillaumev%20LinkedIn%20SC&amp;severity=medium&amp;id=69673f958330e06716b84fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14770-cwe-89-improper-neutralization-of-s-d50da540</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14770%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tridenttechnolabs%20Shipping%20Rate%20By%20Cities&amp;severity=high&amp;id=69673f948330e06716b84f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0739-cwe-79-improper-neutralization-of-in-520ad265</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webbu%20WMF%20Mobile%20Redirector&amp;severity=medium&amp;id=69673f948330e06716b84fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluggyape-malware-uses-signal-and-whatsapp-to-targ-c63e8573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PLUGGYAPE%20Malware%20Uses%20Signal%20and%20WhatsApp%20to%20Target%20Ukrainian%20Defense%20Forces&amp;severity=medium&amp;id=6967bf72d0ff220b959531df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15486-cwe-79-improper-neutralization-of-i-3bc01800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kunzemarketing%20Kunze%20Law&amp;severity=medium&amp;id=69672e018330e067168f4031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14502-cwe-22-improper-limitation-of-a-pat-fd560aec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14502%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vaghasia3%20News%20and%20Blog%20Designer%20Bundle&amp;severity=critical&amp;id=69672e008330e067168f3fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14854-cwe-862-missing-authorization-in-no-eccb7f97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14854%3A%20CWE-862%20Missing%20Authorization%20in%20nofearinc%20WP-CRM%20System%20%E2%80%93%20Manage%20Clients%20and%20Projects&amp;severity=medium&amp;id=69672e018330e067168f400f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12178-cwe-79-improper-neutralization-of-i-f1518670</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aankit%20SpiceForms%20Form%20Builder&amp;severity=medium&amp;id=69672e008330e067168f3fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14613-cwe-918-server-side-request-forgery-7dc03cb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14613%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20daschmi%20GetContentFromURL&amp;severity=high&amp;id=69672e008330e067168f3fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15021-cwe-79-improper-neutralization-of-i-38ba238a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gothamdev%20Gotham%20Block%20Extra%20Light&amp;severity=medium&amp;id=69672e018330e067168f401c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15266-cwe-79-improper-neutralization-of-i-d3581586</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ahmadgb%20GeekyBot%20%E2%80%94%20Generate%20AI%20Content%20Without%20Prompt%2C%20Chatbot%20and%20Lead%20Generation&amp;severity=high&amp;id=69672e018330e067168f4020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15020-cwe-22-improper-limitation-of-a-pat-e8336307</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15020%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gothamdev%20Gotham%20Block%20Extra%20Light&amp;severity=medium&amp;id=69672e018330e067168f4018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14464-cwe-200-exposure-of-sensitive-infor-2135fa14</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14464%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20kiwicommerce%20PDF%20Resume%20Parser&amp;severity=medium&amp;id=69672e008330e067168f3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14880-cwe-862-missing-authorization-in-ne-57f16c66</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14880%3A%20CWE-862%20Missing%20Authorization%20in%20netcashpaynow%20Netcash%20WooCommerce%20Payment%20Gateway&amp;severity=medium&amp;id=69672e018330e067168f4014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14482-cwe-862-missing-authorization-in-cr-8f4a578b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14482%3A%20CWE-862%20Missing%20Authorization%20in%20crushpics%20Crush.pics%20Image%20Optimizer%20%E2%80%93%20Image%20Compression%20and%20Optimization&amp;severity=medium&amp;id=69672e008330e067168f3fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0635-cwe-862-missing-authorization-in-tec-7cefa81a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0635%3A%20CWE-862%20Missing%20Authorization%20in%20techknowprime%20Responsive%20Accordion%20Slider&amp;severity=medium&amp;id=69672e028330e067168f4045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15378-cwe-79-improper-neutralization-of-i-ba2c79e8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajseidl%20AJS%20Footnotes&amp;severity=high&amp;id=69672e018330e067168f402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0678-cwe-89-improper-neutralization-of-sp-4acf0e73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0678%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20logiceverest%20Shipping%20Rates%20by%20City%20for%20WooCommerce&amp;severity=medium&amp;id=69672e028330e067168f4049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15283-cwe-79-improper-neutralization-of-i-8dbfdf0d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeroenpeters1986%20Name%20Directory&amp;severity=high&amp;id=69672e018330e067168f4024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14379-cwe-79-improper-neutralization-of-i-585950f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adoncreatives%20Testimonials%20Creator&amp;severity=medium&amp;id=69672e008330e067168f3fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15377-cwe-352-cross-site-request-forgery--141ac85c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20abage%20Sosh%20Share%20Buttons&amp;severity=medium&amp;id=69672e018330e067168f4029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14301-cwe-22-improper-limitation-of-a-pat-07697570</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14301%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20woosaai%20Integration%20Opvius%20AI%20for%20WooCommerce&amp;severity=critical&amp;id=69672e008330e067168f3fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0680-cwe-79-improper-neutralization-of-in-74800aee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0680%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vk011%20Real%20Post%20Slider%20Lite&amp;severity=medium&amp;id=69672e028330e067168f404e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14725-cwe-79-improper-neutralization-of-i-c566dc8a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sablab%20Internal%20Link%20Builder&amp;severity=medium&amp;id=69672e008330e067168f3fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0717-cwe-200-exposure-of-sensitive-inform-07f89079</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0717%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lottiefile%20LottieFiles%20%E2%80%93%20Lottie%20block%20for%20Gutenberg&amp;severity=medium&amp;id=69672e028330e067168f4053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14389-cwe-352-cross-site-request-forgery--33d20633</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14389%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20obridgeacademy%20WPBlogSyn&amp;severity=medium&amp;id=69672e008330e067168f3fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14615-cwe-352-cross-site-request-forgery--8be6ea33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14615%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dashboardbuilder%20DASHBOARD%20BUILDER%20%E2%80%93%20WordPress%20plugin%20for%20Charts%20and%20Graphs&amp;severity=high&amp;id=69672e008330e067168f3fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0594-cwe-79-improper-neutralization-of-in-52c6a368</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0594%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mallsop%20List%20Site%20Contributors&amp;severity=medium&amp;id=69672e018330e067168f4036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22718-cwe-78-improper-neutralization-of-s-645c1589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22718%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Spring%20CLI%20VSCode%20Extension&amp;severity=medium&amp;id=696726f68330e067167ea630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68959-cwe-200-exposure-of-sensitive-infor-f3b7fdc2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68959%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68970-cwe-20-improper-input-validation-in-1bf861b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68970%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6ab01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68963-cwe-521-weak-password-requirements--931fa1d2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68963%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68967-cwe-264-permissions-privileges-and--b0d80b56</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68967%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6aaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68966-cwe-200-exposure-of-sensitive-infor-5d3172db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68966%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68965-cwe-200-exposure-of-sensitive-infor-63635eaf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68965%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68964-cwe-20-improper-input-validation-in-3736734f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68964%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68969-cwe-362-concurrent-execution-using--e9d3a639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68969%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703d08330e06716e6aafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68968-cwe-6-j2ee-misconfiguration-insuffi-0c867b76</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68968%3A%20CWE-6%20J2EE%20Misconfiguration%3A%20Insufficient%20Session-ID%20Length%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703d08330e06716e6aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68962-cwe-362-concurrent-execution-using--28159f71</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68962%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68961-cwe-362-concurrent-execution-using--e1ba188a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68961%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=696703cf8330e06716e6aac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68960-cwe-362-concurrent-execution-using--a25faefa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68960%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68958-cwe-362-concurrent-execution-using--21022c2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68958%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68957-cwe-362-concurrent-execution-using--a12d414e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68957%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=696703cf8330e06716e6aab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68956-cwe-362-concurrent-execution-using--b5b1cfa8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68956%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6966f9438330e06716ca9adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68955-cwe-362-concurrent-execution-using--bc6a8cd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68955%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6966f9438330e06716ca9ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12053-cwe-787-out-of-bounds-write-in-insy-7102c50c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12053%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12052-cwe-787-out-of-bounds-write-in-insy-83483d0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12052%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12051-cwe-787-out-of-bounds-write-in-insy-75e654b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12051%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966f9438330e06716ca9ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12050-cwe-787-out-of-bounds-write-in-insy-fd31fbc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12050%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O%20tools&amp;severity=high&amp;id=6966eeb78330e067167d7c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-14-0f81328d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-14&amp;severity=medium&amp;id=69682fce09a911886913344a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67835-na-8c02ea3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67835%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67834-na-25eaab25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67834%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67833-na-0aadd67f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67833%3A%20n%2Fa&amp;severity=medium&amp;id=6967e9c5f809b25a98cd9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70747-na-6eceb0b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70747%3A%20n%2Fa&amp;severity=high&amp;id=6967d6fcd0ff220b9516d4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63644-na-aa49f809</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63644%3A%20n%2Fa&amp;severity=medium&amp;id=6967d6fcd0ff220b9516d49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71021-na-70779c9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71021%3A%20n%2Fa&amp;severity=high&amp;id=6967d378d0ff220b95084e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65397-na-bf9b57ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65397%3A%20n%2Fa&amp;severity=medium&amp;id=6967d378d0ff220b95084e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65396-na-f02ae953</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65396%3A%20n%2Fa&amp;severity=medium&amp;id=6967d002d0ff220b95fb6486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67399-na-e9d40e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67399%3A%20n%2Fa&amp;severity=medium&amp;id=6967c1ebd0ff220b95a1807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70968-na-945bbebb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70968%3A%20n%2Fa&amp;severity=critical&amp;id=6967c1ebd0ff220b95a18078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56226-na-a4085a93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56226%3A%20n%2Fa&amp;severity=medium&amp;id=6967accdd0ff220b9518529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krvtz-ids-alerts-for-2026-01-14-ed203902</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KRVTZ%20IDS%20alerts%20for%202026-01-14&amp;severity=low&amp;id=696757fa8330e0671614d4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22686-cwe-693-protection-mechanism-failur-1e5297be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22686%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20agentfront%20enclave&amp;severity=critical&amp;id=6966d4a6a60475309fc2e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0716-buffer-access-with-incorrect-length--6cbd3f80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0716%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=6966d122a60475309fc20b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23478-cwe-602-client-side-enforcement-of--103cf445</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23478%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20calcom%20cal.com&amp;severity=critical&amp;id=6966bf90a60475309fb963d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68947-cwe-862-missing-authorization-in-ns-af41b690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68947%3A%20CWE-862%20Missing%20Authorization%20in%20NSecsoft%20NSecKrnl&amp;severity=medium&amp;id=6966b887a60475309fb6f589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0543-cwe-20-improper-input-validation-in--f0bbf8e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0543%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b887a60475309fb6f593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0531-cwe-770-allocation-of-resources-with-c6d54bb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0531%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b887a60475309fb6f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0530-cwe-770-allocation-of-resources-with-639320fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0530%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=6966b503a60475309fb63c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0528-cwe-129-improper-validation-of-array-9efcc787</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0528%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Elastic%20Metricbeat&amp;severity=medium&amp;id=6966b503a60475309fb63c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-exploited-windows-zero-day-111-o-50da8e88</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Exploited%20Windows%20Zero-Day%2C%20111%20Other%20Vulnerabilities&amp;severity=medium&amp;id=6966a33da60475309fab3bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22871-cwe-22-improper-limitation-of-a-pat-7c90d0ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22871%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DataDog%20guarddog&amp;severity=high&amp;id=6966b182a60475309fb4b276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22870-cwe-409-improper-handling-of-highly-2e700db7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22870%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20DataDog%20guarddog&amp;severity=high&amp;id=6966b182a60475309fb4b272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15056-cwe-74-improper-neutralization-of-s-63bac5ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15056%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Slab%20Quill&amp;severity=medium&amp;id=6966b182a60475309fb4b26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22869-cwe-94-improper-control-of-generati-ef740212</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22869%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eigent-ai%20eigent&amp;severity=high&amp;id=6966adfba60475309fb28999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22868-cwe-20-improper-input-validation-in-8854a076</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22868%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=6966adfba60475309fb28995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22862-cwe-20-improper-input-validation-in-81bb4629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22862%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ethereum%20go-ethereum&amp;severity=high&amp;id=6966adfba60475309fb28991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22861-cwe-252-unchecked-return-value-in-i-cb241259</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22861%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=6966bf90a60475309fb963cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21301-null-pointer-dereference-cwe-476-in-31260b18</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21301%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966bf90a60475309fb963e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21299-out-of-bounds-write-cwe-787-in-adob-dab34463</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21299%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=6966bf90a60475309fb963e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21298-out-of-bounds-write-cwe-787-in-adob-d04f0a45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21298%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=6966bc0ba60475309fb87b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21300-null-pointer-dereference-cwe-476-in-b283b402</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21300%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21303-out-of-bounds-read-cwe-125-in-adobe-3f2489e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21303%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21302-out-of-bounds-read-cwe-125-in-adobe-aac579fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21302%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=6966e30ba60475309f63f227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37186-vulnerability-in-hewlett-packard-en-ffaa4463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37186%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Virtual%20Intranet%20Access%20(VIA)&amp;severity=high&amp;id=6966e30ba60475309f63f221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37179-vulnerability-in-hewlett-packard-en-57d0742d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37179%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb0883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37178-vulnerability-in-hewlett-packard-en-2fe753cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37178%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb0883a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37177-vulnerability-in-hewlett-packard-en-b5cd1b64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37177%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb08837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37176-vulnerability-in-hewlett-packard-en-ac7edbf4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37176%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=6966aa78a60475309fb08834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37175-vulnerability-in-hewlett-packard-en-c6d1e731</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37175%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21308-out-of-bounds-read-cwe-125-in-adobe-bd88ab9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21308%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=6966aa79a60475309fb08853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21307-out-of-bounds-write-cwe-787-in-adob-8d50c26a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21307%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=6966aa79a60475309fb08850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/direct-and-reverse-nfc-relay-attacks-being-used-to-2de4fe54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Direct%20and%20reverse%20NFC%20relay%20attacks%20being%20used%20to%20steal%20money%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6966a72ea60475309faf515d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37174-vulnerability-in-hewlett-packard-en-7b5a2eb2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37174%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb0882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37173-vulnerability-in-hewlett-packard-en-17519006</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37173%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb0882b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37172-vulnerability-in-hewlett-packard-en-3026c02b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37172%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37171-vulnerability-in-hewlett-packard-en-03bd6576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37171%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37170-vulnerability-in-hewlett-packard-en-d82bf12b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37170%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966aa78a60475309fb08822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37169-vulnerability-in-hewlett-packard-en-6bff60b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37169%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966a6f3a60475309faf46db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37168-vulnerability-in-hewlett-packard-en-2c275581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37168%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=6966a6f3a60475309faf46d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21306-out-of-bounds-write-cwe-787-in-adob-eac442d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21306%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=6966e30ba60475309f63f22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-critical-apache-tika-bug-in-coldfusi-0df4d5be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Critical%20Apache%20Tika%20Bug%20in%20ColdFusion&amp;severity=critical&amp;id=6966a33da60475309fab3baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22817-cwe-347-improper-verification-of-cr-d41263e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22817%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20honojs%20hono&amp;severity=high&amp;id=6966a38da60475309fabea79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22818-cwe-347-improper-verification-of-cr-8537c4c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22818%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20honojs%20hono&amp;severity=high&amp;id=6966a38da60475309fabea7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21287-use-after-free-cwe-416-in-adobe-sub-3bd7fe33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21287%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6966a38da60475309fabea76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22814-cwe-915-improperly-controlled-modif-4d391c99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22814%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20adonisjs%20lucid&amp;severity=high&amp;id=6966a38da60475309fabea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-magecart-network-uncovered-disrupting-online-s-4ec647ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Magecart%20Network%20Uncovered%3A%20Disrupting%20Online%20Shoppers%20Worldwide&amp;severity=medium&amp;id=696777e78330e06716d549fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22809-cwe-1333-inefficient-regular-expres-f95190c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22809%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=69669feba60475309fa994da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21305-out-of-bounds-write-cwe-787-in-adob-64ad7065</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21305%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69669feba60475309fa994d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68925-cwe-347-improper-verification-of-cr-5efac3a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68925%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20samrocketman%20jervis&amp;severity=medium&amp;id=69669feba60475309fa994ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68704-cwe-330-use-of-insufficiently-rando-e98de218</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68704%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68703-cwe-326-inadequate-encryption-stren-990b39e6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68703%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68702-cwe-327-use-of-a-broken-or-risky-cr-f132ccf1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68702%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68701-cwe-327-use-of-a-broken-or-risky-cr-4c22d348</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68701%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669feba60475309fa994de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68931-cwe-287-improper-authentication-in--2b2fc86c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68931%3A%20CWE-287%3A%20Improper%20Authentication%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669c68a60475309fa82b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68698-cwe-327-use-of-a-broken-or-risky-cr-b21acaf5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68698%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20samrocketman%20jervis&amp;severity=high&amp;id=69669c68a60475309fa82b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/january-2026-microsoft-patch-tuesday-summary-tue-j-0a0405a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=January%202026%20Microsoft%20Patch%20Tuesday%20Summary%2C%20(Tue%2C%20Jan%2013th)&amp;severity=medium&amp;id=696698b5a60475309fa620ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21283-heap-based-buffer-overflow-cwe-122--ef8206b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21283%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=696698e5a60475309fa629b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21281-heap-based-buffer-overflow-cwe-122--54422115</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21281%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69669561a60475309fa56558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68949-cwe-134-use-of-externally-controlle-38c1a8e5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68949%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=69669561a60475309fa56543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21280-untrusted-search-path-cwe-426-in-ad-c0a78b01</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21280%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69669561a60475309fa56555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21288-null-pointer-dereference-cwe-476-in-24b1dbbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21288%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=69669561a60475309fa5655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21277-heap-based-buffer-overflow-cwe-122--099a2ea6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21277%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5654f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21304-heap-based-buffer-overflow-cwe-122--1e19d0a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21304%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21275-access-of-uninitialized-pointer-cwe-66ab4305</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21275%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa56549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21278-out-of-bounds-read-cwe-125-in-adobe-7916f80b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21278%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=69669561a60475309fa56552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21276-access-of-uninitialized-pointer-cwe-d7c4dc57</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21276%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69669561a60475309fa5654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68271-cwe-95-improper-neutralization-of-d-1211a650</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68271%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20OpenC3%20cosmos&amp;severity=critical&amp;id=69669561a60475309fa56540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21267-improper-neutralization-of-special--6f519a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21267%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21271-improper-input-validation-cwe-20-in-85aaadc2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21271%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21274-incorrect-authorization-cwe-863-in--714788af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21274%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21272-improper-input-validation-cwe-20-in-c05090a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21272%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21268-improper-input-validation-cwe-20-in-ef4cc6cb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21268%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=696691dba60475309fa2ca7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21226-cwe-502-deserialization-of-untruste-4efdfff3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21226%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Core%20shared%20client%20library%20for%20Python&amp;severity=high&amp;id=69668e5fa60475309fa0810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20941-cwe-59-improper-link-resolution-bef-c8d2e5a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20941%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae4a60475309f9ae208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20958-cwe-918-server-side-request-forgery-a336cafb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20958%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69668ae6a60475309f9ae265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20957-cwe-191-integer-underflow-wrap-or-w-beace7a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20957%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae6a60475309f9ae262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20952-cwe-416-use-after-free-in-microsoft-148a371b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20952%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20950-cwe-416-use-after-free-in-microsoft-49c6cffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20950%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20949-cwe-284-improper-access-control-in--f5d5f45b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20949%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20948-cwe-822-untrusted-pointer-dereferen-af2d5ad6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20948%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20939-cwe-200-exposure-of-sensitive-infor-f6b76fca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20939%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20937-cwe-200-exposure-of-sensitive-infor-7471f287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20937%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20936-cwe-125-out-of-bounds-read-in-micro-fe2e6d31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20936%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20935-cwe-822-untrusted-pointer-dereferen-727d597e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20935%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20931-cwe-73-external-control-of-file-nam-d54e259d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20931%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20929-cwe-284-improper-access-control-in--e2a17c27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20929%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20874-cwe-362-concurrent-execution-using--37162a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20874%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20873-cwe-362-concurrent-execution-using--ba55325a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20873%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20872-cwe-73-external-control-of-file-nam-11a37ee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20872%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae1a60475309f9ae169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20871-cwe-416-use-after-free-in-microsoft-bfbec2c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20871%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668ae1a60475309f9ae166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20870-cwe-416-use-after-free-in-microsoft-2d7ed236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20870%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae1a60475309f9ae163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20868-cwe-122-heap-based-buffer-overflow--bc12b543</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20868%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20867-cwe-362-concurrent-execution-using--2fb4c3f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20867%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20866-cwe-362-concurrent-execution-using--06e586bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20866%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20863-cwe-415-double-free-in-microsoft-wi-29a97616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20863%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae0a60475309f9ae12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20862-cwe-200-exposure-of-sensitive-infor-f29a4bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20862%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668ae0a60475309f9ae12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20861-cwe-362-concurrent-execution-using--6d97d24b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20861%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21219-cwe-416-use-after-free-in-microsoft-32eb6c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21219%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20SDK&amp;severity=high&amp;id=69668ae6a60475309f9ae274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20854-cwe-416-use-after-free-in-microsoft-6a50b1f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20854%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae0a60475309f9ae0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20853-cwe-362-concurrent-execution-using--5ea47f9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20853%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20849-cwe-807-reliance-on-untrusted-input-9e4224ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20849%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20848-cwe-362-concurrent-execution-using--ca362173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20848%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20843-cwe-284-improper-access-control-in--64bb6f45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20843%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20947-cwe-89-improper-neutralization-of-s-0db09315</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20947%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69668ae5a60475309f9ae22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21224-cwe-121-stack-based-buffer-overflow-61104c02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21224%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=69668ae6a60475309f9ae27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21221-cwe-362-concurrent-execution-using--975da00a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21221%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae6a60475309f9ae277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20830-cwe-362-concurrent-execution-using--95441eb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20830%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=69668adda60475309f9adfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20963-cwe-502-deserialization-of-untruste-a7ea6daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20963%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=critical&amp;id=69668ae6a60475309f9ae26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20959-cwe-79-improper-neutralization-of-i-fd5c91f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20959%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=69668ae6a60475309f9ae268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20956-cwe-822-untrusted-pointer-dereferen-ab8c056c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20956%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae6a60475309f9ae25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20955-cwe-822-untrusted-pointer-dereferen-7f81c789</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20955%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20953-cwe-416-use-after-free-in-microsoft-f245d44e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20953%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20951-cwe-20-improper-input-validation-in-ba0ca05b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20951%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69668ae5a60475309f9ae23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20946-cwe-125-out-of-bounds-read-in-micro-902c6400</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20946%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20944-cwe-125-out-of-bounds-read-in-micro-c19f96ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20944%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69668ae5a60475309f9ae229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20943-cwe-426-untrusted-search-path-in-mi-2b8c5ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20943%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Office%202016&amp;severity=high&amp;id=69668ae4a60475309f9ae20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20940-cwe-822-untrusted-pointer-dereferen-95beac17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20940%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae4a60475309f9ae205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20938-cwe-822-untrusted-pointer-dereferen-78e0153f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20938%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae4a60475309f9ae1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20934-cwe-362-concurrent-execution-using--ef76d3ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20934%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae4a60475309f9ae1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20932-cwe-200-exposure-of-sensitive-infor-cb74b003</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20932%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae4a60475309f9ae1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20927-cwe-362-concurrent-execution-using--66aed030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20927%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae3a60475309f9ae1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20926-cwe-362-concurrent-execution-using--645ca07f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20926%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20925-cwe-73-external-control-of-file-nam-36e34a31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20925%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae3a60475309f9ae1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20924-cwe-416-use-after-free-in-microsoft-8d0061e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20924%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae3a60475309f9ae1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20923-cwe-416-use-after-free-in-microsoft-2035408f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20923%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae3a60475309f9ae1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20922-cwe-122-heap-based-buffer-overflow--dbc11d35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20922%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20921-cwe-362-concurrent-execution-using--88a80120</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20921%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae3a60475309f9ae1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20920-cwe-416-use-after-free-in-microsoft-a1bff524</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20920%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668ae3a60475309f9ae1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20919-cwe-362-concurrent-execution-using--d977d261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20919%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae1a60475309f9ae17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20918-cwe-362-concurrent-execution-using--8643b6f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20918%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20877-cwe-416-use-after-free-in-microsoft-f6917a76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20877%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae1a60475309f9ae178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20876-cwe-122-heap-based-buffer-overflow--52744e00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20876%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668ae1a60475309f9ae175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20875-cwe-476-null-pointer-dereference-in-4a071c7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20875%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae1a60475309f9ae172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20869-cwe-362-concurrent-execution-using--e8bd4abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20869%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20865-cwe-416-use-after-free-in-microsoft-c0ec4798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20865%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20864-cwe-122-heap-based-buffer-overflow--344e47f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20864%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20860-cwe-843-access-of-resource-using-in-cd4b05aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20860%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20859-cwe-416-use-after-free-in-microsoft-6ca956c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20859%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668ae0a60475309f9ae10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20858-cwe-416-use-after-free-in-microsoft-0d710ae0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20858%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20857-cwe-822-untrusted-pointer-dereferen-358eda2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20857%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668ae0a60475309f9ae105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20856-cwe-20-improper-input-validation-in-2ac6a21a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20856%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20852-cwe-266-incorrect-privilege-assignm-a2ac47df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20852%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668ae0a60475309f9ae0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20851-cwe-125-out-of-bounds-read-in-micro-8ff7b70d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20851%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69668ae0a60475309f9ae0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20847-cwe-200-exposure-of-sensitive-infor-f86fc0ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20847%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adea60475309f9ae0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20844-cwe-416-use-after-free-in-microsoft-30bd69d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20844%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20842-cwe-416-use-after-free-in-microsoft-6b3ebf07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20842%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668adea60475309f9ae09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20840-cwe-122-heap-based-buffer-overflow--82f0ae34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20840%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20839-cwe-284-improper-access-control-in--901aa39c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20839%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adea60475309f9ae097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20838-cwe-209-generation-of-error-message-b965f687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20838%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668adea60475309f9ae094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20837-cwe-122-heap-based-buffer-overflow--7fb07bde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20837%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668adea60475309f9ae091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20836-cwe-362-concurrent-execution-using--af7fa2bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20836%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adea60475309f9ae08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20835-cwe-125-out-of-bounds-read-in-micro-e51ca40b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20835%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69668adea60475309f9ae08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20834-cwe-36-absolute-path-traversal-in-m-286b7b9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20834%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20833-cwe-327-use-of-a-broken-or-risky-cr-02f04bb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20833%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=69668adda60475309f9adff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20832-cwe-415-double-free-in-microsoft-wi-7f9e3ab4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20832%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20831-cwe-367-time-of-check-time-of-use-t-cb44d8e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20831%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20829-cwe-125-out-of-bounds-read-in-micro-39bfeac9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668adda60475309f9adfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20828-cwe-125-out-of-bounds-read-in-micro-20d87af8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20828%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20827-cwe-200-exposure-of-sensitive-infor-0d63ab39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20827%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adda60475309f9adfde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20826-cwe-362-concurrent-execution-using--6a9445aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20826%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adda60475309f9adfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20825-cwe-284-improper-access-control-in--703830df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20825%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668adda60475309f9adfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20824-cwe-693-protection-mechanism-failur-f69f8ff3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20824%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20823-cwe-200-exposure-of-sensitive-infor-067b7234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20823%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20822-cwe-416-use-after-free-in-microsoft-0fcc9563</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20822%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20821-cwe-200-exposure-of-sensitive-infor-738c00a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20821%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adba60475309f9adf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20820-cwe-122-heap-based-buffer-overflow--dbea749a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20820%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20819-cwe-822-untrusted-pointer-dereferen-e80e9055</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20819%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=69668adba60475309f9adf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20818-cwe-532-insertion-of-sensitive-info-f651f2b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20818%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=69668adba60475309f9adf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20817-cwe-280-improper-handling-of-insuff-db913280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20817%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=69668adba60475309f9adf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20816-cwe-367-time-of-check-time-of-use-t-07436142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20816%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adba60475309f9adf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20815-cwe-362-concurrent-execution-using--bf377b09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20815%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668adba60475309f9adf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20814-cwe-362-concurrent-execution-using--0592d606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20814%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20812-cwe-20-improper-input-validation-in-fcd02ec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20812%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adaa60475309f9adf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20811-cwe-843-access-of-resource-using-in-11467ead</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20811%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=69668adaa60475309f9adf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20810-cwe-590-free-of-memory-not-on-the-h-606ebe1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20810%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69668adaa60475309f9adf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20809-cwe-367-time-of-check-time-of-use-t-2ee5fd97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20809%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20808-cwe-362-concurrent-execution-using--d5b3c16c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20808%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69668adaa60475309f9adf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20805-cwe-200-exposure-of-sensitive-infor-5ffd2065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20805%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668adaa60475309f9adf3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20804-cwe-266-incorrect-privilege-assignm-e0828e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20804%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69668adaa60475309f9adf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20965-cwe-347-improper-verification-of-cr-c652ba2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20965%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%20Admin%20Center%20in%20Azure%20Portal&amp;severity=high&amp;id=69668ae6a60475309f9ae271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20803-cwe-306-missing-authentication-for--5085f96c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20803%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=69668adaa60475309f9adf34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0386-cwe-284-improper-access-control-in-m-c9a25aee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0386%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69668adaa60475309f9adf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21265-cwe-1329-reliance-on-component-that-4c5b2422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21265%3A%20CWE-1329%20-%20Reliance%20on%20Component%20That%20is%20Not%20Updateable%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69668ae7a60475309f9ae299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20962-cwe-908-use-of-uninitialized-resour-df000b33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20962%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69668ae6a60475309f9ae26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37166-vulnerability-in-hewlett-packard-en-6f8b03b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37166%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Instant%20On&amp;severity=high&amp;id=69668750a60475309f98298f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37165-vulnerability-in-hewlett-packard-en-4b4e9567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37165%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Instant%20On&amp;severity=high&amp;id=69668750a60475309f98298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/long-running-web-skimming-campaign-steals-credit-c-759ec50f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Long-Running%20Web%20Skimming%20Campaign%20Steals%20Credit%20Cards%20From%20Online%20Checkout%20Pages&amp;severity=medium&amp;id=6966f7db8330e06716c60389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10865-cwe-416-use-after-free-in-imaginati-6a65b1a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10865%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=696683cba60475309f96bab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-extension-steals-mexc-api-keys-by-c3a58eea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20Extension%20Steals%20MEXC%20API%20Keys%20by%20Masquerading%20as%20Trading%20Tool&amp;severity=medium&amp;id=69668011a60475309f936e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gobruteforcer-botnet-targeting-crypto-blockchain-p-47c3e17d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoBruteforcer%20Botnet%20Targeting%20Crypto%2C%20Blockchain%20Projects&amp;severity=medium&amp;id=69668026a60475309f9370f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-goldman-jpmorgan-discloses-law-firm-data-bre-6ccb5b67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20Goldman%2C%20JPMorgan%20Discloses%20Law%20Firm%20Data%20Breach&amp;severity=high&amp;id=69667c91a60475309f91e05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-insights-2026-external-attack-surface-manage-d414178f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Insights%202026%3A%20External%20Attack%20Surface%20Management&amp;severity=medium&amp;id=69667c91a60475309f91e061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58411-cwe-416-use-after-free-in-imaginati-ec4e5c38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58411%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=69667940a60475309f8fa685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58409-cwe-cwe-119-improper-restriction-of-54854673</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58409%3A%20CWE%20-%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=low&amp;id=69667940a60475309f8fa694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62182-cwe-434-unrestricted-upload-of-file-6a1e4239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62182%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=69667940a60475309f8fa69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46685-cwe-378-creation-of-temporary-file--bc94129f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46685%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=high&amp;id=69667940a60475309f8fa68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8090-cwe-476-null-pointer-dereference-in--6bfd7f9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8090%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20BlackBerry%20Ltd%20QNX%20Software%20Development%20Platform&amp;severity=medium&amp;id=69667941a60475309f8fa6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25249-execute-unauthorized-code-or-comman-3d27fe27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25249%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchManager&amp;severity=high&amp;id=69667940a60475309f8fa68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47855-improper-access-control-in-fortinet-68522f01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47855%3A%20Improper%20access%20control%20in%20Fortinet%20FortiFone&amp;severity=critical&amp;id=69667940a60475309f8fa691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67685-improper-access-control-in-fortinet-90f881f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67685%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=low&amp;id=69667941a60475309f8fa6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58693-execute-unauthorized-code-or-comman-1e3177e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58693%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69667940a60475309f8fa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59922-execute-unauthorized-code-or-comman-792f3b01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59922%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=69667940a60475309f8fa69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64155-execute-unauthorized-code-or-comman-f410151b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64155%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=69667941a60475309f8fa6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25176-cwe-668-exposure-of-resource-to-wro-61b7925a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25176%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=69667940a60475309f8fa688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46684-cwe-378-creation-of-temporary-file--80177220</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46684%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery%2C&amp;severity=medium&amp;id=69667237a60475309f879e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowreactor-text-only-staging-net-reactor-and-in-251b7c29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SHADOW%23REACTOR%20%E2%80%93%20Text-Only%20Staging%2C%20.NET%20Reactor%2C%20and%20In-Memory%20Remcos%20RAT%20Deployments&amp;severity=medium&amp;id=69667238a60475309f879f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0404-cwe-20-improper-input-validation-in--bddf293f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0404%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RBRE960&amp;severity=medium&amp;id=69667237a60475309f879e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0408-cwe-287-improper-authentication-in-n-beccef9d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0408%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20EX5000&amp;severity=medium&amp;id=69667237a60475309f879ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0407-cwe-287-improper-authentication-in-n-f2489e2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0407%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20EX5000&amp;severity=medium&amp;id=69667237a60475309f879ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0406-cwe-20-improper-input-validation-in--29284271</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0406%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20XR1000v2&amp;severity=medium&amp;id=69667237a60475309f879eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0405-cwe-287-improper-authentication-in-n-30e6359b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0405%3A%20CWE-287%20Improper%20Authentication%20in%20NETGEAR%20RBE970&amp;severity=medium&amp;id=69667237a60475309f879e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0403-cwe-20-improper-input-validation-in--470465b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0403%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RBR750&amp;severity=low&amp;id=69667237a60475309f879e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12548-missing-authentication-for-critical-ed788dc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12548%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Dev%20Spaces%20(RHOSDS)%203.22&amp;severity=critical&amp;id=696667b3a60475309f7ab4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68789-a37e1fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68789&amp;severity=null&amp;id=698b1e0c4b57a58fa101b8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22755-cwe-77-improper-neutralization-of-s-1e56c0a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22755%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Vivotek%20Affected%20device%20model%20numbers%20are%20FD8365%2C%20FD8365v2%2C%20FD9165%2C%20FD9171%2C%20FD9187%2C%20FD9189%2C%20FD9365%2C%20FD9371%2C%20FD9381%2C%20FD9387%2C%20FD9389%2C%20FD9391%2CFE9180%2CFE9181%2C%20FE9191%2C%20FE9381%2C%20FE9382%2C%20FE9391%2C%20FE9582%2C%20IB9365%2C%20IB93587LPR%2C%20IB9371%2CIB9381%2C%20IB9387%2C%20IB9389%2C%20IB939%2CIP9165%2CIP9171%2C%20IP9172%2C%20IP9181%2C%20IP9191%2C%20IT9389%2C%20MA9321%2C%20MA9322%2C%20MS9321%2C%20MS9390%2C%20TB9330&amp;severity=critical&amp;id=69666427a60475309f6cdbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36640-cwe-269-improper-privilege-manageme-af9418e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36640%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69666427a60475309f6cdbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13447-improper-neutralization-of-special--5a4b73a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13447%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%98OS%20Command%20Injection%E2%80%99)%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=6966bf90a60475309fb963dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13444-improper-neutralization-of-special--77de4d98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13444%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%98OS%20Command%20Injection%E2%80%99)%20in%20Progress%20Software%20LoadMaster&amp;severity=high&amp;id=6966bf90a60475309fb963d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11669-cwe-862-missing-authorization-in-zo-724214ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11669%3A%20CWE-862%20Missing%20Authorization%20in%20Zohocorp%20ManageEngine%20PAM360&amp;severity=high&amp;id=6966562fa60475309f43a465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadcom-wi-fi-chipset-flaw-allows-hackers-to-disr-0206332a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadcom%20Wi-Fi%20Chipset%20Flaw%20Allows%20Hackers%20to%20Disrupt%20Networks&amp;severity=low&amp;id=696655e4a60475309f434006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cloud-native-malware-framework-ecbed222</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Cloud-Native%20Malware%20Framework&amp;severity=medium&amp;id=69666b30a60475309f804a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14507-cwe-200-exposure-of-sensitive-infor-9112b77d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14507%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=69664f10a60475309f2ea2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0684-cwe-863-incorrect-authorization-in-c-5b13dd45</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0684%3A%20CWE-863%20Incorrect%20Authorization%20in%20codepeople%20CP%20Image%20Store%20with%20Slideshow&amp;severity=medium&amp;id=69664f10a60475309f2ea2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-agentic-ai-from-mcps-and-tool-access-to-s-dd229501</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20Agentic%20AI%3A%20From%20MCPs%20and%20Tool%20Access%20to%20Shadow%20API%20Key%20Sprawl&amp;severity=low&amp;id=6966f7db8330e06716c6038c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9427-cwe-79-improper-neutralization-of-in-3ad08fb3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lemonsoft%20WordPress%20add-on&amp;severity=high&amp;id=69664f10a60475309f2ea2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11250-cwe-290-authentication-bypass-by-sp-31d0f606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11250%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Zohocorp%20ManageEngine%20ADSelfService%20Plus&amp;severity=critical&amp;id=69664f10a60475309f2ea2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0892-vulnerability-in-mozilla-firefox-1157939b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0892%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f11a60475309f2ea33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0891-vulnerability-in-mozilla-firefox-c08e04a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0891%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f11a60475309f2ea335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0890-vulnerability-in-mozilla-firefox-d91c4f97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0890%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0889-vulnerability-in-mozilla-firefox-c19e8484</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0889%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f11a60475309f2ea32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0888-vulnerability-in-mozilla-firefox-a799450f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0888%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0887-vulnerability-in-mozilla-firefox-b5bf8224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0887%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0886-vulnerability-in-mozilla-firefox-455bedfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0886%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0885-vulnerability-in-mozilla-firefox-147b2e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0885%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0884-vulnerability-in-mozilla-firefox-f8f10b5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0884%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f11a60475309f2ea313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0883-vulnerability-in-mozilla-firefox-48090893</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0883%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69664f11a60475309f2ea30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0882-vulnerability-in-mozilla-firefox-86ba16c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0882%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0881-vulnerability-in-mozilla-firefox-ebe6a0d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0881%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f10a60475309f2ea2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0880-vulnerability-in-mozilla-firefox-f691ebc9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0880%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0879-vulnerability-in-mozilla-firefox-70135ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0879%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69664f10a60475309f2ea2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0878-vulnerability-in-mozilla-firefox-f20e910c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0878%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0877-vulnerability-in-mozilla-firefox-52c9d00a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0877%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69664f10a60475309f2ea2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9435-cwe-22-improper-limitation-of-a-path-8ebb819b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9435%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=medium&amp;id=69664b8ba60475309f2116b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13774-cwe-89-improper-neutralization-of-s-316c0137</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13774%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Progress%20Software%20Flowmon%20ADS&amp;severity=high&amp;id=6966562fa60475309f43a468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saps-january-2026-security-updates-patch-critical--f6b732fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%E2%80%99s%20January%202026%20Security%20Updates%20Patch%20Critical%20Vulnerabilities&amp;severity=critical&amp;id=696639c3a60475309febac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-linux-voidlink-malware-targets-cloud--d0914fd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Linux%20VoidLink%20Malware%20Targets%20Cloud%20and%20container%20Environments&amp;severity=medium&amp;id=6966f7db8330e06716c6038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-should-we-learn-from-how-attackers-leveraged--45d98537</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20Should%20We%20Learn%20From%20How%20Attackers%20Leveraged%20AI%20in%202025%3F&amp;severity=medium&amp;id=696632baa60475309fdb65a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0859-cwe-502-deserialization-of-untrusted-05d55b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0859%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe49827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59022-cwe-862-missing-authorization-in-ty-c6fc6833</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59022%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=69663672a60475309fe49821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59021-cwe-862-missing-authorization-in-ty-d2447066</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59021%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe4981b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59020-cwe-863-incorrect-authorization-in--f531f3c1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59020%3A%20CWE-863%20Incorrect%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=69663672a60475309fe49815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-port-hacker-sentenced-to-prison-701774d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Port%20Hacker%20Sentenced%20to%20Prison&amp;severity=medium&amp;id=696632d8a60475309fdc8ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-patches-critical-ai-platform-flaw-allow-e4021d47</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20Patches%20Critical%20AI%20Platform%20Flaw%20Allowing%20Unauthenticated%20User%20Impersonation&amp;severity=critical&amp;id=696632baa60475309fdb65a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14001-cwe-862-missing-authorization-in-ni-8efab0e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14001%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Duplicate%20Page&amp;severity=medium&amp;id=69662f6ba60475309fd33d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-energy-company-endesa-hacked-521d8746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Energy%20Company%20Endesa%20Hacked&amp;severity=medium&amp;id=696624aca60475309fc1fee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40944-cwe-400-uncontrolled-resource-consu-ae6588f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40944%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SIMATIC%20ET%20200AL%20IM%20157-1%20PN&amp;severity=high&amp;id=696616cfa60475309f9ce613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40942-cwe-250-execution-with-unnecessary--c991f78f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40942%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Siemens%20TeleControl%20Server%20Basic&amp;severity=high&amp;id=696616cfa60475309f9ce60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40805-cwe-639-authorization-bypass-throug-65406d33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40805%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20Industrial%20Edge%20Cloud%20Device%20(IECD)&amp;severity=critical&amp;id=696616cfa60475309f9ce608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-campaign-delivers-remcos-rat-through-m-9fb43d9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Campaign%20Delivers%20Remcos%20RAT%20Through%20Multi-Stage%20Windows%20Attack&amp;severity=low&amp;id=6966f7db8330e06716c60392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-fraud-overtakes-ransomware-as-top-ceo-concer-1e5b19e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Fraud%20Overtakes%20Ransomware%20as%20Top%20CEO%20Concern%3A%20WEF&amp;severity=medium&amp;id=69660184a60475309f5f3bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41717-cwe-94-improper-control-of-generati-8b7f95c2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41717%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Phoenix%20Contact%20TC%20ROUTER%203002T-3G&amp;severity=high&amp;id=6965faafa60475309f41c759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-exploitation-of-gogs-vulnerab-9dfef5b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Exploitation%20of%20Gogs%20Vulnerability%20Enabling%20Code%20Execution&amp;severity=high&amp;id=6966f7db8330e06716c60395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-voidlink-a-stealthy-cloud-native-linux-m-b6da384d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unveiling%20VoidLink%20%E2%80%93%20A%20Stealthy%2C%20Cloud-Native%20Linux%20Malware%20Framework&amp;severity=medium&amp;id=6965e91ba60475309ffb8736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14829-cwe-862-missing-authorization-in-e--73c33d17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14829%3A%20CWE-862%20Missing%20Authorization%20in%20E-xact%20%7C%20Hosted%20Payment%20%7C&amp;severity=critical&amp;id=6965e214a60475309fe0da9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10915-cwe-862-missing-authorization-in-dr-ef19f079</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10915%3A%20CWE-862%20Missing%20Authorization%20in%20Dreamer%20Blog&amp;severity=critical&amp;id=6965e214a60475309fe0da99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66177-vulnerability-in-hikvision-ds-96xxx-8679cdd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66177%3A%20Vulnerability%20in%20Hikvision%20DS-96xxxNI-Hx&amp;severity=high&amp;id=6965b0daa60475309ff8e4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66176-vulnerability-in-hikvision-ds-k1t33-eda72d38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66176%3A%20Vulnerability%20in%20Hikvision%20DS-K1T331&amp;severity=high&amp;id=6965b0daa60475309ff8e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0514-cwe-79-improper-neutralization-of-in-209301b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0514%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6965a2cda60475309fcd6857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0513-cwe-601-url-redirection-to-untrusted-6bfbb03e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0513%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(SICF%20Handler%20in%20SRM%20Catalog)&amp;severity=medium&amp;id=6965a2cda60475309fcd6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0511-cwe-862-missing-authorization-in-sap-dcd1fde6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0511%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=high&amp;id=6965a2cda60475309fcd684f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0510-cwe-326-inadequate-encryption-streng-cbf3ae75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0510%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20SAP_SE%20NW%20AS%20Java%20UME%20User%20Mapping&amp;severity=low&amp;id=6965a2cda60475309fcd684b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0507-cwe-78-improper-neutralization-of-sp-64c6f1f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0507%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20SAP_SE%20SAP%20Application%20Server%20for%20ABAP%20and%20SAP%20NetWeaver%20RFCSDK&amp;severity=high&amp;id=6965a2cda60475309fcd6847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0506-cwe-862-missing-authorization-in-sap-c60cc951</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0506%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=6965a2cda60475309fcd6843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0504-cwe-943-improper-neutralization-of-s-d54d7599</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0504%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20SAP_SE%20SAP%20Identity%20Management&amp;severity=low&amp;id=6965a2cda60475309fcd683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0503-cwe-862-missing-authorization-in-sap-da5f56c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0503%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20ERP%20Central%20Component%20and%20SAP%20S%2F4HANA%20(SAP%20EHS%20Management)&amp;severity=medium&amp;id=6965a2cda60475309fcd683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0501-cwe-89-improper-neutralization-of-sp-98703910</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20S%2F4HANA%20Private%20Cloud%20and%20On-Premise%20(Financials%20%EF%BF%BD%20General%20Ledger)&amp;severity=critical&amp;id=6965a2cda60475309fcd6837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0500-cwe-94-improper-control-of-generatio-03cfe97c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0500%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Wily%20Introscope%20Enterprise%20Manager%20(WorkStation)&amp;severity=critical&amp;id=6965a2cca60475309fcd6829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0499-cwe-79-improper-neutralization-of-in-1626a96a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=6965a2cca60475309fcd6825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0498-cwe-94-improper-control-of-generatio-20b85674</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0498%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20and%20On-Premise)&amp;severity=critical&amp;id=6965a2cca60475309fcd6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0497-cwe-862-missing-authorization-in-sap-9c6a1d92</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0497%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Business%20Server%20Pages%20Application%20(Product%20Designer%20Web%20UI)&amp;severity=medium&amp;id=6965a2cca60475309fcd681d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0496-cwe-434-unrestricted-upload-of-file--720a373e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0496%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0495-cwe-15-external-control-of-system-or-57bf771a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0495%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0494-cwe-497-exposure-of-sensitive-system-e3bdc7b7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0494%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd6811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0493-cwe-352-cross-site-request-forgery-i-9296ebe0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0493%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20in%20SAP_SE%20SAP%20Fiori%20App%20(Intercompany%20Balance%20Reconciliation)&amp;severity=medium&amp;id=6965a2cca60475309fcd680d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0492-cwe-306-missing-authentication-for-c-97a1a64f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0492%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20HANA%20database&amp;severity=high&amp;id=6965a2cca60475309fcd6809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0491-cwe-94-improper-control-of-generatio-6c6ef53c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0491%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation&amp;severity=critical&amp;id=6965a2cca60475309fcd6805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-13-36782745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-13&amp;severity=medium&amp;id=6966defda60475309fc8a4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68707-na-8a0b7acb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68707%3A%20n%2Fa&amp;severity=high&amp;id=69667941a60475309f8fa6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25652-na-0ab4d48e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25652%3A%20n%2Fa&amp;severity=high&amp;id=69667940a60475309f8fa681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65783-na-2391eadf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65783%3A%20n%2Fa&amp;severity=critical&amp;id=69667237a60475309f879ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65784-na-e4c3fa10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65784%3A%20n%2Fa&amp;severity=medium&amp;id=69667237a60475309f879e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70753-na-9f172076</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70753%3A%20n%2Fa&amp;severity=high&amp;id=69666eb2a60475309f84037f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69992-na-ab29e6dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69992%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f84037c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69991-na-4982ee1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69991%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f840379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69990-na-8c6037d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69990%3A%20n%2Fa&amp;severity=critical&amp;id=69666eb2a60475309f840376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71027-na-1ea15405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71027%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71026-na-e1a62762</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71026%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71025-na-74f0b9b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71025%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71024-na-6618dd02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71024%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71023-na-07aee9e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71023%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66698-na-6c1d3bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66698%3A%20n%2Fa&amp;severity=high&amp;id=69666b2ea60475309f804a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54855-na-d6cd7b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54855%3A%20n%2Fa&amp;severity=medium&amp;id=696667b3a60475309f7ab4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55462-na-627451d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55462%3A%20n%2Fa&amp;severity=medium&amp;id=69665d1fa60475309f5854cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58340-cwe-1333-inefficient-regular-expres-d42d439b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58340%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20LangChain%20AI%20LangChain&amp;severity=high&amp;id=69658281da2266e838450d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14021-cwe-502-deserialization-of-untruste-ffe8f337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14021%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20run-llama%20llama_index&amp;severity=high&amp;id=69658281da2266e838450d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58339-cwe-770-allocation-of-resources-wit-c49016b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58339%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20run-llama%20llama_index&amp;severity=high&amp;id=69658281da2266e838450d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22214-cwe-121-stack-based-buffer-overflow-50ccce35</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22214%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20RIOT%20RIOT%20OS&amp;severity=medium&amp;id=69658281da2266e838450d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22213-cwe-121-stack-based-buffer-overflow-484218fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22213%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20RIOT%20RIOT%20OS&amp;severity=low&amp;id=69658281da2266e838450d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22801-cwe-125-out-of-bounds-read-in-pnggr-4a6fb606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22801%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69657efdda2266e83842302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22695-cwe-125-out-of-bounds-read-in-pnggr-931ee5d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22695%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=69657efdda2266e838423029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22813-cwe-79-improper-neutralization-of-i-b67efd3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22813%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anomalyco%20opencode&amp;severity=critical&amp;id=69657efdda2266e838423035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22812-cwe-306-missing-authentication-for--06adb808</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22812%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20anomalyco%20opencode&amp;severity=high&amp;id=69657efdda2266e838423032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22804-cwe-269-improper-privilege-manageme-aa2b68a9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22804%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Termix-SSH%20Termix&amp;severity=high&amp;id=69657471da2266e83834ab9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22800-cwe-352-cross-site-request-forgery--c92cb401</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22800%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20THM-Health%20PILOS&amp;severity=low&amp;id=69657471da2266e83834ab9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22798-cwe-532-insertion-of-sensitive-info-ceca105a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22798%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20softwarepub%20hermes&amp;severity=medium&amp;id=696570edda2266e83831189d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22794-cwe-346-origin-validation-error-in--7f185239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22794%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20appsmithorg%20appsmith&amp;severity=critical&amp;id=696570edda2266e8383118a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22789-cwe-434-unrestricted-upload-of-file-ec23b47c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22789%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SMEWebify%20WebErpMesv2&amp;severity=medium&amp;id=69656d69da2266e8382e9812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22788-cwe-306-missing-authentication-for--7ba39fa6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22788%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SMEWebify%20WebErpMesv2&amp;severity=high&amp;id=69656d69da2266e8382e9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12420-vulnerability-in-servicenow-now-ass-62928d94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12420%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20ServiceNow%20Now%20Assist%20AI%20Agents&amp;severity=critical&amp;id=696569e5da2266e8382bb6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22786-cwe-434-unrestricted-upload-of-file-838371a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22786%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20flipped-aurora%20gin-vue-admin&amp;severity=high&amp;id=69656661da2266e838286f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22772-cwe-918-server-side-request-forgery-dad33e76</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22772%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sigstore%20fulcio&amp;severity=medium&amp;id=696562ddda2266e83825fa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-a-multi-stage-asyncrat-campaign-via-mana-cc911a22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20a%20Multi-Stage%20AsyncRAT%20Campaign%20via%20Managed%20Detection%20and%20Response&amp;severity=medium&amp;id=69666eb2a60475309f84032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reflecting-on-ai-in-2025-faster-attacks-same-old-t-59e7b24a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reflecting%20on%20AI%20in%202025%3A%20Faster%20Attacks%2C%20Same%20Old%20Tradecraft&amp;severity=medium&amp;id=69666eb2a60475309f840324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/activity-masking-infostealer-dropper-kaspersky-off-099213ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Activity-masking%20infostealer%20dropper%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69655508da2266e83813d37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22785-cwe-77-improper-neutralization-of-s-2adc68dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22785%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20orval-labs%20orval&amp;severity=critical&amp;id=6965433ada2266e838fe6b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22784-cwe-863-incorrect-authorization-in--cc21530a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22784%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=6965433ada2266e838fe6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22200-cwe-74-improper-neutralization-of-s-86015e71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22200%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Enhancesoft%20osTicket&amp;severity=high&amp;id=6965433ada2266e838fe6b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22783-cwe-434-unrestricted-upload-of-file-39504cea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22783%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dfir-iris%20iris-web&amp;severity=critical&amp;id=69653fb6da2266e838f91b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22781-cwe-78-improper-neutralization-of-s-9e75e136</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22781%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20maximmasiutin%20TinyWeb&amp;severity=critical&amp;id=69653fb6da2266e838f91b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22776-cwe-409-improper-handling-of-highly-b276e0d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22776%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=69653fb6da2266e838f91b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22771-cwe-94-improper-control-of-generati-23e3aa96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22771%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20envoyproxy%20gateway&amp;severity=high&amp;id=69653c31da2266e838f5b98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22252-cwe-285-improper-authorization-in-d-2b686608</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22252%3A%20CWE-285%3A%20Improper%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=critical&amp;id=69653c31da2266e838f5b98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22251-cwe-200-exposure-of-sensitive-infor-747cdcb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22251%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20wlc&amp;severity=medium&amp;id=696538adda2266e838f1b6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22250-cwe-295-improper-certificate-valida-b7bb3e6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22250%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20WeblateOrg%20wlc&amp;severity=low&amp;id=696538adda2266e838f1b6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22033-cwe-79-improper-neutralization-of-i-c388acd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22033%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HumanSignal%20label-studio&amp;severity=high&amp;id=696538adda2266e838f1b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68657-cwe-415-double-free-in-espressif-es-c3ddf34d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68657%3A%20CWE-415%3A%20Double%20Free%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=6965433ada2266e838fe6b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68656-cwe-416-use-after-free-in-espressif-26c23c45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68656%3A%20CWE-416%3A%20Use%20After%20Free%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=696531a5da2266e838e9c377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22050-639-in-netapp-ontap-9-37cbb899</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22050%3A%20639%20in%20NETAPP%20ONTAP%209&amp;severity=medium&amp;id=696531a5da2266e838e9c37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68622-cwe-121-stack-based-buffer-overflow-365b9324</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68622%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20espressif%20esp-usb&amp;severity=medium&amp;id=69652e21da2266e838e2547e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-supply-chain-attack-abuses-community-nodes-to--2cbbd375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=n8n%20Supply%20Chain%20Attack%20Abuses%20Community%20Nodes%20to%20Steal%20OAuth%20Tokens&amp;severity=low&amp;id=69656ba9da2266e8382d8192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-71063-cwe-295-improper-certificate-valida-bed4a106</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-71063%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20mrvladus%20Errands&amp;severity=high&amp;id=69651c8dda2266e838cf6d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41078-cwe-863-incorrect-authorization-in--26f58e79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41078%3A%20CWE-863%20Incorrect%20Authorization%20in%20Viafirma%20Viafirma%20Documents&amp;severity=high&amp;id=69650e81da2266e838bdb80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41077-cwe-639-authorization-bypass-throug-3aee7e91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41077%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Viafirma%20Inbox&amp;severity=high&amp;id=69650e81da2266e838bdb809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41006-cwe-89-improper-neutralization-of-s-07740c69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41006%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20MEMS%20Events%20CRM&amp;severity=critical&amp;id=69650af9da2266e838b9ce85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41005-cwe-89-improper-neutralization-of-s-63afbb7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41005%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20MEMS%20Events%20CRM&amp;severity=high&amp;id=69650af9da2266e838b9ce82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/instagram-fixes-password-reset-vulnerability-amid--60be51ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Instagram%20Fixes%20Password%20Reset%20Vulnerability%20Amid%20User%20Data%20Leak&amp;severity=low&amp;id=696503beda2266e838b232fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41004-cwe-89-improper-neutralization-of-s-c1bc818a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41004%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Imaster%20Patient%20Record%20Management%20System&amp;severity=high&amp;id=6965006dda2266e838af18b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41003-cwe-79-improper-neutralization-of-i-a7cb6fab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41003%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Imaster%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6964fcfbda2266e838a66dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-ai-automation-exploits-telecom-espion-8d716900</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20AI%20Automation%20Exploits%2C%20Telecom%20Espionage%2C%20Prompt%20Poaching%20%26%20More&amp;severity=medium&amp;id=6964fcb5da2266e838a5f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-apt28-targeting-energy-research-defense-co-d821d563</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20APT28%20Targeting%20Energy%20Research%2C%20Defense%20Collaboration%20Entities&amp;severity=medium&amp;id=6964eb22da2266e8388fbedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llms-in-attacker-crosshairs-warns-threat-intel-fir-fbde6ae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLMs%20in%20Attacker%20Crosshairs%2C%20Warns%20Threat%20Intel%20Firm&amp;severity=medium&amp;id=6964e41ada2266e83885b4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40978-cwe-79-improper-neutralization-of-i-6d195fc5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40978%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20eCommerceGo%20SaaS&amp;severity=medium&amp;id=6964dd45da2266e83875f342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40977-cwe-79-improper-neutralization-of-i-9df5a55c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20eCommerceGo%20SaaS&amp;severity=medium&amp;id=6964dd45da2266e83875f33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40976-cwe-79-improper-neutralization-of-i-6141dc21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20TicketGo&amp;severity=medium&amp;id=6964dd45da2266e83875f33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40975-cwe-79-improper-neutralization-of-i-7c82a7b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WorkDo%20HRMGo&amp;severity=medium&amp;id=6964dd45da2266e83875f339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gobruteforcer-botnet-targets-crypto-project-databa-d9999070</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoBruteforcer%20Botnet%20Targets%20Crypto%20Project%20Databases%20by%20Exploiting%20Weak%20Credentials&amp;severity=medium&amp;id=69656baada2266e8382d8195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/12th-january-threat-intelligence-report-9a9c5f3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=12th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6964c82eda2266e83846a841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-launches-claude-ai-for-healthcare-with-s-9beed601</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Launches%20Claude%20AI%20for%20Healthcare%20with%20Secure%20Health%20Record%20Access&amp;severity=low&amp;id=69656baada2266e8382d8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14279-cwe-346-origin-validation-error-in--b6200423</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14279%3A%20CWE-346%20Origin%20Validation%20Error%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=high&amp;id=6964af91da2266e83826df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-service-providers-fueling-indu-b97a9f02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Service%20Providers%20Fueling%20Industrial-Scale%20Pig%20Butchering%20Fraud&amp;severity=medium&amp;id=69656baada2266e8382d819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0855-cwe-78-improper-neutralization-of-sp-1ab86f60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0855%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20P2&amp;severity=high&amp;id=69649dfdda2266e838104fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14579-cwe-79-cross-site-scripting-xss-in--95b08dfb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14579%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Quiz%20Maker&amp;severity=medium&amp;id=69648fedda2266e838f9f65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0854-cwe-78-improper-neutralization-of-sp-923c0f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0854%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DH032&amp;severity=high&amp;id=69648fedda2266e838f9f662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69276-cwe-502-deserialization-of-untruste-a9d1ef15</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69276%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=696481ddda2266e838e784ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69275-cwe-1395-dependency-on-vulnerable-t-7aa11158</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69275%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=696481ddda2266e838e784e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69274-cwe-639-authorization-bypass-throug-ecfb37cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69274%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=696481ddda2266e838e784e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69273-cwe-287-improper-authentication-in--85d3d68e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69273%3A%20CWE-287%20Improper%20Authentication%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647e59da2266e838e3846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69272-cwe-319-cleartext-transmission-of-s-53ff48e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69272%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=medium&amp;id=69647e59da2266e838e38468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69271-cwe-522-insufficiently-protected-cr-4a67b129</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69271%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=69647e59da2266e838e38465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69270-cwe-598-information-exposure-throug-07a13a77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69270%3A%20CWE-598%20Information%20Exposure%20Through%20Query%20Strings%20in%20GET%20Request%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=low&amp;id=69647e59da2266e838e38462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69269-cwe-78-improper-neutralization-of-s-87aeac8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69269%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647751da2266e838db8762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69268-cwe-79-improper-neutralization-of-i-d78046a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=medium&amp;id=69647750da2266e838db875f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69267-cwe-22-improper-limitation-of-a-pat-67b8db09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69267%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Broadcom%20DX%20NetOps%20Spectrum&amp;severity=high&amp;id=69647750da2266e838db875c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0853-cwe-497-exposure-of-sensitive-system-14983d1d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0853%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20A-Plus%20Video%20Technologies%20AP-RM864P&amp;severity=medium&amp;id=69647049da2266e838bbbd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52694-vulnerability-in-advantech-iotsuite-9175176d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52694%3A%20Vulnerability%20in%20Advantech%20IoTSuite%20and%20IoT%20Edge%20Products&amp;severity=critical&amp;id=69646941da2266e8387b4dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-accessed-university-of-hawaii-cancer-cente-ebdb8a71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Accessed%20University%20of%20Hawaii%20Cancer%20Center%20Patient%20Data%3B%20They%20Weren%E2%80%99t%20Immediately%20Notified&amp;severity=medium&amp;id=69645afeda2266e83834c747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-monday-january-12th-2026-httpsis-16180210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Monday%2C%20January%2012th%2C%202026%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9762%2C%20(Mon%2C%20Jan%2012th)&amp;severity=medium&amp;id=6964577ada2266e8381ec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0852-sql-injection-in-code-projects-onlin-2d32b4d6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0852%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69644295da2266e838c90f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-12-06bcd262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-12&amp;severity=medium&amp;id=69658cd7da2266e838514171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29329-na-b59d45bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29329%3A%20n%2Fa&amp;severity=critical&amp;id=69656d69da2266e8382e981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67146-na-5093ee06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67146%3A%20n%2Fa&amp;severity=critical&amp;id=69656661da2266e838286f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67147-na-e401f39b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67147%3A%20n%2Fa&amp;severity=critical&amp;id=696562ddda2266e83825f9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51567-na-6c53af1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51567%3A%20n%2Fa&amp;severity=critical&amp;id=69654dc5da2266e8380b35d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66802-na-a933d092</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66802%3A%20n%2Fa&amp;severity=critical&amp;id=69654a41da2266e83806dde7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66689-na-fcb70365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66689%3A%20n%2Fa&amp;severity=medium&amp;id=6965433ada2266e838fe6b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63314-na-ebfc7bb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63314%3A%20n%2Fa&amp;severity=critical&amp;id=69652e21da2266e838e25479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46070-na-3478a295</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46070%3A%20n%2Fa&amp;severity=critical&amp;id=69652719da2266e838dbf0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46068-na-8358d1d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46068%3A%20n%2Fa&amp;severity=high&amp;id=69652719da2266e838dbf0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46067-na-38da9646</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46067%3A%20n%2Fa&amp;severity=high&amp;id=69652396da2266e838d748ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46066-na-1779a1b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46066%3A%20n%2Fa&amp;severity=critical&amp;id=69652396da2266e838d748a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66939-na-c920ad5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66939%3A%20n%2Fa&amp;severity=medium&amp;id=69651c8dda2266e838cf6d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67813-na-7eb13817</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67813%3A%20n%2Fa&amp;severity=medium&amp;id=69651909da2266e838cc4bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65553-na-5687711a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65553%3A%20n%2Fa&amp;severity=medium&amp;id=69650e81da2266e838bdb813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65552-na-07be22b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65552%3A%20n%2Fa&amp;severity=critical&amp;id=69650e81da2266e838bdb80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0851-sql-injection-in-code-projects-onlin-571698dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0851%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69643809da2266e8389ee33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0850-sql-injection-in-code-projects-inter-a7d01122</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0850%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=69643101da2266e83885d1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-depth-analysis-of-trojanized-winrar-installer-d-cd0c688f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-depth%20Analysis%20of%20Trojanized%20WinRAR%20Installer%20Distributing%20Winzipper%20Malware&amp;severity=high&amp;id=6963ca3eda2266e838fd16ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greynoise-labs-weekly-oast-report-mcp-server-comma-250aa7f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreyNoise%20Labs%20Weekly%20OAST%20Report%3A%20MCP%20Server%20Command%20Injection%20and%20React2Shell%20Exploitation%20Campaigns%20%E2%80%93%20Week%20Ending%202026-01-09&amp;severity=high&amp;id=6963c58cda2266e838e6b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-analysis-and-poc-for-cve-2026-21440-criti-b09b0b41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20Analysis%20and%20PoC%20for%20CVE-2026-21440%3A%20Critical%20Path%20Traversal%20in%20AdonisJS%20Multipart%20Upload&amp;severity=high&amp;id=6963b421da2266e8389e4129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-hack-exposes-complete-user-database-o-10b1fe43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Hack%20Exposes%20Complete%20User%20Database%20of%20Major%20Dark%20Web%20Forum&amp;severity=high&amp;id=6963b286da2266e83896b62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68493-cwe-112-missing-xml-validation-in-a-4c72d466</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68493%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=696406d1da2266e838e19a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-x-1110-release-hash-function-warnings-sun-jan-2c39521a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YARA-X%201.11.0%20Release%3A%20Hash%20Function%20Warnings%2C%20(Sun%2C%20Jan%2011th)&amp;severity=medium&amp;id=6963880dda2266e838ea0556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15506-out-of-bounds-read-in-academysoftwa-fd492ba7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15506%3A%20Out-of-Bounds%20Read%20in%20AcademySoftwareFoundation%20OpenColorIO&amp;severity=medium&amp;id=69638841da2266e838eaba6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0843-sql-injection-in-jiujiujia-jjjfood-363d4f88</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0843%3A%20SQL%20Injection%20in%20jiujiujia%20jjjfood&amp;severity=medium&amp;id=6963689dda2266e8386cdffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0842-missing-authentication-in-flycatcher-655b5122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0842%3A%20Missing%20Authentication%20in%20Flycatcher%20Toys%20smART%20Sketcher&amp;severity=medium&amp;id=69635e11da2266e83844dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0841-buffer-overflow-in-utt-520w-c35591d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0841%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69635385da2266e8381701f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0840-buffer-overflow-in-utt-520w-8dcd4355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0840%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69634575da2266e838e49e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0839-buffer-overflow-in-utt-520w-5eb5141d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0839%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=696341f1da2266e838d6cea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0838-buffer-overflow-in-utt-520w-184f8330</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0838%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69633ae9da2266e838b6f459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0837-buffer-overflow-in-utt-520w-94dfca02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0837%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=6963305cda2266e838a3d63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0836-buffer-overflow-in-utt-520w-ee5a5350</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0836%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=69632cd8da2266e8389b679b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15505-cross-site-scripting-in-luxul-xwr-6-31807ed8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15505%3A%20Cross%20Site%20Scripting%20in%20Luxul%20XWR-600&amp;severity=medium&amp;id=6963062cda2266e8382ec9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-11-a4613dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-11&amp;severity=medium&amp;id=69643b57da2266e838ab12c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0824-cross-site-scripting-in-questdb-ui-50677978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0824%3A%20Cross%20Site%20Scripting%20in%20questdb%20ui&amp;severity=medium&amp;id=69626638f2400df44e63e552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13393-cwe-918-server-side-request-forgery-c5f37460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13393%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=69625bacf2400df44e52a8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12379-cwe-79-improper-neutralization-of-i-ed9d3dab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=69625bacf2400df44e52a8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0822-heap-based-buffer-overflow-in-quickj-5c9cd8a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0822%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69625828f2400df44e4e54f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-leak-of-chinas-contractor-driven-cyber-9e20e930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20Leak%20of%20China&apos;s%20Contractor-Driven%20Cyber-Espionage%20Ecosystem&amp;severity=medium&amp;id=6964e460da2266e838862f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0821-heap-based-buffer-overflow-in-quickj-492bea30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0821%3A%20Heap-based%20Buffer%20Overflow%20in%20quickjs-ng%20quickjs&amp;severity=medium&amp;id=69625120f2400df44e458d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14555-cwe-79-improper-neutralization-of-i-3ef8c944</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Countdown%20Timer%20%E2%80%93%20Widget%20Countdown&amp;severity=medium&amp;id=69624d9bf2400df44e29ca76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15504-null-pointer-dereference-in-lief-pr-8f4a2417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15504%3A%20NULL%20Pointer%20Dereference%20in%20lief-project%20LIEF&amp;severity=medium&amp;id=69623af0545d6fe9686cca16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14506-cwe-79-improper-neutralization-of-i-3e133689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imtiazrayhan%20ConvertForce%20Popup%20Builder&amp;severity=medium&amp;id=69623af0545d6fe9686cca20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-launches-rustywater-rat-via-spear-phish-e42d1e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Launches%20RustyWater%20RAT%20via%20Spear-Phishing%20Across%20Middle%20East%20Sectors&amp;severity=medium&amp;id=69624c67f2400df44e25edb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52435-cwe-5-j2ee-misconfiguration-data-tr-031c323e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52435%3A%20CWE-5%20J2EE%20Misconfiguration%3A%20Data%20Transmission%20Without%20Encryption%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53470-cwe-125-out-of-bounds-read-in-apach-105deab2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53470%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=low&amp;id=69622254545d6fe9682dfba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53477-cwe-476-null-pointer-dereference-in-15f9a1ce</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53477%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62235-cwe-290-authentication-bypass-by-sp-3aad4363</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62235%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Apache%20Software%20Foundation%20Apache%20Mynewt%20NimBLE&amp;severity=high&amp;id=69622254545d6fe9682dfbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0831-cwe-863-incorrect-authorization-in-w-98686f30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0831%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpdevteam%20Templately%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Template%20Library%3A%206500%2B%20Free%20%26%20Pro%20Ready%20Templates%20And%20Cloud!&amp;severity=medium&amp;id=69621eda545d6fe96820a5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15503-unrestricted-upload-in-sangfor-oper-a37d1a7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15503%3A%20Unrestricted%20Upload%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=medium&amp;id=69621ae8c540fa4b549251c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-arrests-34-black-axe-members-in-spain-over-49e78d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20Arrests%2034%20Black%20Axe%20Members%20in%20Spain%20Over%20%E2%82%AC5.9M%20Fraud%20and%20Organized%20Crime&amp;severity=medium&amp;id=69622835545d6fe9683f8f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14976-cwe-352-cross-site-request-forgery--0f853673</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%20Builder%2C%20Custom%20Login%20Form%2C%20User%20Profile%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69621061c540fa4b547cca6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15502-os-command-injection-in-sangfor-ope-a8fe9b82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15502%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=medium&amp;id=69620954c540fa4b54731a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14948-cwe-862-missing-authorization-in-cy-18261d16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14948%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20miniOrange%20OTP%20Verification%20and%20SMS%20Notification%20for%20WooCommerce&amp;severity=medium&amp;id=6961fec8c540fa4b54639bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22777-cwe-93-improper-neutralization-of-c-6225e01b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22777%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Comfy-Org%20ComfyUI-Manager&amp;severity=high&amp;id=6961f7c0c540fa4b54565841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22773-cwe-770-allocation-of-resources-wit-d959c300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22773%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6961f7c0c540fa4b5456583e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14943-cwe-863-incorrect-authorization-in--19f73930</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14943%3A%20CWE-863%20Incorrect%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6961f7c0c540fa4b54565839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22704-cwe-79-improper-neutralization-of-i-ef07962f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22704%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=6961f43cc540fa4b54400bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22705-cwe-1240-use-of-a-cryptographic-pri-c008e8a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22705%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20RustCrypto%20signatures&amp;severity=medium&amp;id=6961f0b8c540fa4b5432ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22703-cwe-345-insufficient-verification-o-c63a5814</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22703%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20sigstore%20cosign&amp;severity=medium&amp;id=6961f0b8c540fa4b5432b9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22702-cwe-59-improper-link-resolution-bef-e945b11f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22702%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20pypa%20virtualenv&amp;severity=medium&amp;id=6961f0b8c540fa4b5432b9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22701-cwe-59-improper-link-resolution-bef-b81aed94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22701%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20tox-dev%20filelock&amp;severity=medium&amp;id=6961ed34c540fa4b542a0971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22689-cwe-1385-missing-origin-validation--13d8cc60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22689%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20axllent%20mailpit&amp;severity=medium&amp;id=6961e9bac540fa4b541edd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22685-cwe-22-improper-limitation-of-a-pat-b1b9695d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22685%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DevToys-app%20DevToys&amp;severity=high&amp;id=6961e9bac540fa4b541edcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22611-cwe-20-improper-input-validation-in-348733b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22611%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aws%20aws-sdk-net&amp;severity=low&amp;id=6961e73719784dcf52f13f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22700-cwe-20-improper-input-validation-in-f32d064d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22700%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed6559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22699-cwe-20-improper-input-validation-in-8bd765fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22699%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed6554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22698-cwe-331-insufficient-entropy-in-rus-fea75a65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22698%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20RustCrypto%20elliptic-curves&amp;severity=high&amp;id=6961e3b319784dcf52ed654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22691-cwe-1333-inefficient-regular-expres-e399fa40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22691%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=6961dcab19784dcf52e61fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22690-cwe-400-uncontrolled-resource-consu-26e94a29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22690%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=low&amp;id=6961dcab19784dcf52e61fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22688-cwe-77-improper-neutralization-of-s-404bc99e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22688%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=critical&amp;id=6961d21f19784dcf52da7b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22687-cwe-89-improper-neutralization-of-s-df06a02b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22687%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=6961d21f19784dcf52da7b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13457-cwe-639-authorization-bypass-throug-6de3db01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13457%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20woocommerce%20WooCommerce%20Square&amp;severity=high&amp;id=6961cb1719784dcf52be20ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61674-cwe-79-improper-neutralization-of-i-4519ffe2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61674%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=6961cb1719784dcf52be20d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61676-cwe-79-improper-neutralization-of-i-74991bdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61676%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=6961cb1719784dcf52be20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65091-cwe-89-improper-neutralization-of-s-5017f49b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65091%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki-contrib%20macro-fullcalendar&amp;severity=critical&amp;id=6961cb1719784dcf52be20dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65090-cwe-200-exposure-of-sensitive-infor-33219640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65090%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki-contrib%20macro-fullcalendar&amp;severity=medium&amp;id=6961cb1719784dcf52be20d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22597-cwe-918-server-side-request-forgery-3b835494</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22597%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TryGhost%20Ghost&amp;severity=medium&amp;id=6961c40f19784dcf52acebdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22596-cwe-89-improper-neutralization-of-s-666f06d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22596%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TryGhost%20Ghost&amp;severity=medium&amp;id=6961c40f19784dcf52ace87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22595-cwe-863-incorrect-authorization-in--3f0ce617</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22595%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=6961c40f19784dcf52ace878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22594-cwe-287-improper-authentication-in--fe262f90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22594%3A%20CWE-287%3A%20Improper%20Authentication%20in%20TryGhost%20Ghost&amp;severity=high&amp;id=6961c40f19784dcf52ace873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22030-cwe-346-origin-validation-error-in--0f93f67d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22030%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20remix-run%20react-router&amp;severity=medium&amp;id=6961c40f19784dcf52ace870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22029-cwe-79-improper-neutralization-of-i-1944a18c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22029%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21884-cwe-79-improper-neutralization-of-i-0def8d25</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21884%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61686-cwe-22-improper-limitation-of-a-pat-74207ab3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61686%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20remix-run%20react-router&amp;severity=critical&amp;id=6961c40f19784dcf52ace864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59057-cwe-79-improper-neutralization-of-i-eaa6ce70</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59057%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remix-run%20react-router&amp;severity=high&amp;id=6961c40f19784dcf52ace861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68470-cwe-601-url-redirection-to-untruste-022f4f9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68470%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20remix-run%20react-router&amp;severity=medium&amp;id=6961c40f19784dcf52ace867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22612-cwe-502-deserialization-of-untruste-85e6c743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22612%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b007ed32c7f018eb901e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22609-cwe-184-incomplete-list-of-disallow-e3282f46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22609%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb9002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22608-cwe-184-incomplete-list-of-disallow-6db587b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22608%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22607-cwe-184-incomplete-list-of-disallow-99461a0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22607%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22606-cwe-184-incomplete-list-of-disallow-9e29139b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22606%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6961b006ed32c7f018eb8ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22605-cwe-284-improper-access-control-in--d1ab303d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22605%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22604-cwe-200-exposure-of-sensitive-infor-b70f4bda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22604%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22603-cwe-307-improper-restriction-of-exc-22d84d42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22603%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20opf%20openproject&amp;severity=medium&amp;id=6961b006ed32c7f018eb8fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22602-cwe-200-exposure-of-sensitive-infor-30882214</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22602%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=low&amp;id=6961b006ed32c7f018eb8fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22601-cwe-77-improper-neutralization-of-s-a36f0711</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22601%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20opf%20openproject&amp;severity=high&amp;id=6961b006ed32c7f018eb8fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22600-cwe-200-exposure-of-sensitive-infor-3257d9bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22600%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opf%20openproject&amp;severity=critical&amp;id=6961b006ed32c7f018eb8fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22697-cwe-122-heap-based-buffer-overflow--fda69094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f6ed32c7f018d59bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22027-cwe-122-heap-based-buffer-overflow--6ef01b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22027%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22026-cwe-789-memory-allocation-with-exce-8c44eca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22026%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f6ed32c7f018d59bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22025-cwe-401-missing-release-of-memory-a-8f886709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22025%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22024-cwe-401-missing-release-of-memory-a-ea3f7a46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22024%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f6ed32c7f018d59be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22023-cwe-125-out-of-bounds-read-in-nasa--168120da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22023%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21900-cwe-125-out-of-bounds-read-in-nasa--90270853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21900%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21899-cwe-125-out-of-bounds-read-in-nasa--aa6f3635</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21899%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=medium&amp;id=6961a1f5ed32c7f018d59bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21898-cwe-125-out-of-bounds-read-in-nasa--3cc029c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21898%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21897-cwe-787-out-of-bounds-write-in-nasa-2dbd3726</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21897%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6961a1f5ed32c7f018d59bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-10-6a196e6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-10&amp;severity=medium&amp;id=6962e9d6da2266e838fdfbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15501-os-command-injection-in-sangfor-ope-69faae4f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15501%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=critical&amp;id=696183e045ea0302aa99be03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22584-cwe-94-improper-control-of-generati-639176ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22584%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Salesforce%20Uni2TS&amp;severity=critical&amp;id=6961805b45ea0302aa992bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15500-os-command-injection-in-sangfor-ope-5c54cb5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15500%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=critical&amp;id=696175d145ea0302aa963f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15499-os-command-injection-in-sangfor-ope-adcd5c2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15499%3A%20OS%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Management%20System&amp;severity=high&amp;id=696175d145ea0302aa963f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46297-an-app-may-be-able-to-access-protec-6b9b8ddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46297%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20files%20within%20an%20App%20Sandbox%20container%20in%20Apple%20macOS&amp;severity=medium&amp;id=696175d145ea0302aa963f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62487-the-product-performs-an-authorizati-c1ea0f19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62487%3A%20The%20product%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Palantir%20com.palantir.acme%3Agotham-default-apps-bundle&amp;severity=low&amp;id=696175d145ea0302aa963f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46298-processing-maliciously-crafted-web--09009782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46298%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=696175d145ea0302aa963f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46299-processing-maliciously-crafted-web--71789247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46299%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Safari&amp;severity=medium&amp;id=696175d145ea0302aa963f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46286-restoring-from-a-backup-may-prevent-584becb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46286%3A%20Restoring%20from%20a%20backup%20may%20prevent%20passcode%20from%20being%20required%20immediately%20after%20Face%20ID%20enrollment%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=696175d145ea0302aa963f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0830-cwe-78-improper-neutralization-of-sp-da0f7abf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0830%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AWS%20Kiro%20IDE&amp;severity=high&amp;id=6961724c45ea0302aa817a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploit-vmware-esxi-zero-days-8db6607d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploit%20VMware%20ESXi%20Zero-Days%20to%20Escape%20Virtual%20Machines&amp;severity=medium&amp;id=696159b2047de42cfc9a6d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15035-cwe-20-improper-input-validation-in-cf8edbfb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15035%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20Systems%20Inc.%20Archer%20AXE75%20v1.6&amp;severity=medium&amp;id=69613a016c9099d823001a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15496-sql-injection-in-guchengwuyue-yshop-726abf2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15496%3A%20SQL%20Injection%20in%20guchengwuyue%20yshopmall&amp;severity=medium&amp;id=6961367d6c9099d823eb7eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15495-unrestricted-upload-in-biggidroid-s-34e15769</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15495%3A%20Unrestricted%20Upload%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=6961367d6c9099d823eb7ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15494-sql-injection-in-rainygao-docsys-b9ed3d2b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15494%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=696132fa6c9099d823e5607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15493-sql-injection-in-rainygao-docsys-95bd2619</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15493%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=696132fa6c9099d823e56075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69426-cwe-732-incorrect-permission-assign-df9b59f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69426%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20RUCKUS%20Networks%20vRIoT%20IOT%20Controller&amp;severity=critical&amp;id=69614e21047de42cfc77cc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46645-cwe-78-improper-neutralization-of-s-34ef8268</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46645%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=medium&amp;id=69614e21047de42cfc77cc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69425-cwe-306-missing-authentication-for--7c60bcd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69425%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20RUCKUS%20Networks%20vRIoT%20IoT%20Controller&amp;severity=critical&amp;id=69614e21047de42cfc77cc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46643-cwe-122-heap-based-buffer-overflow--75a6fbb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46643%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=low&amp;id=69612bfb6c9099d823dc1098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15492-sql-injection-in-rainygao-docsys-163271c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15492%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=69612bfb6c9099d823dc1091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-8000-ransomware-attacks-china-hacked-a4cdf4f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%208%2C000%20Ransomware%20Attacks%2C%20China%20Hacked%20US%20Gov%20Emails%2C%20IDHS%20Breach%20Impacts%20700k&amp;severity=medium&amp;id=69612822f9fa58d972817532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0817-cwe-862-missing-authorization-in-wik-ef87ed37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0817%3A%20CWE-862%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20CampaignEvents%20extension&amp;severity=medium&amp;id=69612866f9fa58d97281823c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46676-cwe-200-exposure-of-sensitive-infor-cb1c8441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46676%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=low&amp;id=69612866f9fa58d972818239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0803-sql-injection-in-phpgurukul-online-c-0b1019d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0803%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration%20System&amp;severity=medium&amp;id=6961214ef9fa58d9727fd834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46644-cwe-78-improper-neutralization-of-s-691fbffa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46644%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20Feature%20Release&amp;severity=medium&amp;id=6961214ef9fa58d9727fd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt28-runs-credential-stealing-campaign-ta-61b75677</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT28%20Runs%20Credential-Stealing%20Campaign%20Targeting%20Energy%20and%20Policy%20Organizations&amp;severity=medium&amp;id=69613e3b6c9099d823010d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-north-korean-spear-phishing-attacks-use-malici-b8cc8ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20North%20Korean%20Spear-Phishing%20Attacks%20Use%20Malicious%20QR%20Codes&amp;severity=medium&amp;id=69611a12f9fa58d97269d5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-patches-critical-code-execution-flaw-i-38b01ac0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Patches%20Critical%20Code%20Execution%20Flaw%20in%20Apex%20Central&amp;severity=critical&amp;id=69610d0e7a8fb5c58f6edc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-closes-10-emergency-directives-as-vulnerabili-3ee49b64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Closes%2010%20Emergency%20Directives%20as%20Vulnerability%20Catalog%20Takes%20Over&amp;severity=medium&amp;id=696106067a8fb5c58f6d4760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zombieagent-attack-let-researchers-take-over-chatg-13543cd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98ZombieAgent%E2%80%99%20Attack%20Let%20Researchers%20Take%20Over%20ChatGPT&amp;severity=medium&amp;id=6960f7f67a8fb5c58f55e0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14598-cwe-89-improper-neutralization-of-s-7e759583</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14598%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BeeS%20Software%20Solutions%20BET%20ePortal&amp;severity=critical&amp;id=6960f4a57a8fb5c58f4f0361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/377000-impacted-by-data-breach-at-texas-gas-statio-8254c4b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=377%2C000%20Impacted%20by%20Data%20Breach%20at%20Texas%20Gas%20Station%20Firm&amp;severity=medium&amp;id=6960f0ee7a8fb5c58f4aff74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66052-cwe-78-improper-neutralization-of-s-1b7d1539</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66052%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vivotek%20IP7137&amp;severity=high&amp;id=6960fbad7a8fb5c58f6b1a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66051-cwe-22-improper-limitation-of-a-pat-a0c98502</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66051%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Vivotek%20IP7137&amp;severity=medium&amp;id=6960eda77a8fb5c58f471d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66050-cwe-1393-use-of-default-password-in-cc64c4e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66050%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20Vivotek%20IP7137&amp;severity=critical&amp;id=6960eda77a8fb5c58f471d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66049-cwe-306-missing-authentication-for--bc9f6576</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66049%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vivotek%20IP7137&amp;severity=high&amp;id=6960eda77a8fb5c58f471d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-for-vmware-zero-day-flaws-likely-built-a-y-3c6cf8ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20for%20VMware%20Zero-Day%20Flaws%20Likely%20Built%20a%20Year%20Before%20Public%20Disclosure&amp;severity=medium&amp;id=6960e884a48af7d8cea17a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7072-cwe-798-use-of-hard-coded-credential-c76f9088</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7072%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20KAON%20CG3000T&amp;severity=critical&amp;id=6960e8e3a48af7d8cea1877c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22082-cwe-384-session-fixation-in-tenda-3-7271f053</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22082%3A%20CWE-384%20Session%20Fixation%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e8e3a48af7d8cea1877f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22081-cwe-1004-sensitive-cookie-without-h-6c2e9b06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22081%3A%20CWE-1004%20-%20Sensitive%20Cookie%20Without%20HttpOnly%20Flag%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e8e4a48af7d8cea187dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11453-cwe-79-improper-neutralization-of-i-10cfd606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anand_kumar%20Header%20and%20Footer%20Scripts&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13908-cwe-79-improper-neutralization-of-i-1a13649d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alobaidi%20The%20Tooltip&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13862-cwe-79-improper-neutralization-of-i-61acbe5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20furqan-khanzada%20Menu%20Card&amp;severity=medium&amp;id=6960e8e3a48af7d8cea187a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14172-cwe-862-missing-authorization-in-in-89d22ceb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14172%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20WP%20Page%20Permalink%20Extension&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13717-cwe-862-missing-authorization-in-as-1231bd29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13717%3A%20CWE-862%20Missing%20Authorization%20in%20ashishajani%20Contact%20Form%20vCard%20Generator&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13704-cwe-79-improper-neutralization-of-i-e986f136</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amirshk%20Autogen%20Headers%20Menu&amp;severity=medium&amp;id=6960e8e3a48af7d8cea1878b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13892-cwe-79-improper-neutralization-of-i-c01b2e51</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mountaingrafix%20MG%20AdvancedOptions&amp;severity=medium&amp;id=6960e8e3a48af7d8cea187a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13897-cwe-79-improper-neutralization-of-i-4b8014ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Client%20Testimonial%20Slider&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13854-cwe-79-improper-neutralization-of-i-0cf2cef3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soniz%20Curved%20Text&amp;severity=medium&amp;id=6960e8e3a48af7d8cea1879e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13701-cwe-79-improper-neutralization-of-i-b624a523</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beshkin%20Shabat%20Keeper&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13967-cwe-79-improper-neutralization-of-i-2f50c770</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woodpeckerleadform%20Woodpecker%20for%20WordPress&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13852-cwe-79-improper-neutralization-of-i-53c97df4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debtcom%20Debt.com%20Business%20in%20a%20Box&amp;severity=medium&amp;id=6960e8e3a48af7d8cea18799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13893-cwe-79-improper-neutralization-of-i-eb1710ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burtrw%20Lesson%20Plan%20Book&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13903-cwe-79-improper-neutralization-of-i-664fb296</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ctietze%20PullQuote&amp;severity=medium&amp;id=6960e8e4a48af7d8cea187c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22080-cwe-319-cleartext-transmission-of-s-88d2d6d0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22080%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e55ba48af7d8cea09102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22079-cwe-319-cleartext-transmission-of-s-d5dc5aa5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22079%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tenda%20300Mbps%20Wireless%20Router%20F3%20and%20N300%20Easy%20Setup%20Router&amp;severity=high&amp;id=6960e1d7a48af7d8ce8b5d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cncert-risk-warning-regarding-the-black-cat-gangs--1c7bab1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CNCERT%3A%20Risk%20Warning%20Regarding%20the%20%22Black%20Cat%22%20Gang&apos;s%20Use%20of%20Search%20Engines%20to%20Spread%20Counterfeit%20Notepad%2B%2B%20Download%20Remote%20Control%20Backdoors&amp;severity=medium&amp;id=6960d845a48af7d8ce7d3bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64093-vulnerability-in-zenitel-icx500-a507f0a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64093%3A%20Vulnerability%20in%20Zenitel%20ICX500&amp;severity=critical&amp;id=6960d929a48af7d8ce7ea268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64092-vulnerability-in-zenitel-icx500-df6fe1d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64092%3A%20Vulnerability%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=6960d929a48af7d8ce7ea264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-apex-central-rce-flaw-scores-98-cvss-i-a9c5b236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Apex%20Central%20RCE%20Flaw%20Scores%209.8%20CVSS%20in%20On-Prem%20Windows%20Versions&amp;severity=critical&amp;id=6960d422ecefc3cd7c1cf7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64091-vulnerability-in-zenitel-tcis-3-c7bac969</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64091%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=high&amp;id=6960d46aecefc3cd7c1d0dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64090-vulnerability-in-zenitel-tcis-3-397975fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64090%3A%20Vulnerability%20in%20Zenitel%20TCIS-3%2B&amp;severity=critical&amp;id=6960d46aecefc3cd7c1d0df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-research-phaltblyx-fake-bsods-and-trusted-b-7ff05388</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Research%3A%20PHALT%23BLYX%3A%20Fake%20BSODs%20and%20Trusted%20Build%20Tools&amp;severity=medium&amp;id=6960d469ecefc3cd7c1d0dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13895-cwe-79-improper-neutralization-of-i-be77849d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20top-position%20Top%20Position%20Google%20Finance&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13900-cwe-79-improper-neutralization-of-i-bb55912f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelocation%20WP%20Popup%20Magic&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13853-cwe-79-improper-neutralization-of-i-c9969000</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lnbadmin1%20Nearby%20Now%20Reviews&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13729-cwe-79-improper-neutralization-of-i-3375d11e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13729%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20greenshady%20Entry%20Views&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-retires-10-emergency-cybersecurity-directives-7fe43828</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Retires%2010%20Emergency%20Cybersecurity%20Directives%20Issued%20Between%202019%20and%202024&amp;severity=low&amp;id=6960e804a48af7d8cea16b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0627-cwe-79-improper-neutralization-of-in-7bd42955</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=6960bf3fecefc3cd7c1371c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-process-environment-block-manipulation-f-b9392057</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Process%20Environment%20Block%20Manipulation%2C%20(Fri%2C%20Jan%209th)&amp;severity=medium&amp;id=6960bb88ecefc3cd7c1243fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69195-stack-based-buffer-overflow-60838973</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69195%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=6960b846ecefc3cd7c11645f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69194-improper-limitation-of-a-pathname-t-698382b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69194%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=6960b4b3ecefc3cd7c10677e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14657-cwe-862-missing-authorization-in-ar-02c706f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14657%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Manager%2C%20Event%20Booking%2C%20Calendar%2C%20Tickets%20and%20Registration%20Plugin%20(AI%20Powered)&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13753-cwe-863-incorrect-authorization-in--54e16daf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13753%3A%20CWE-863%20Incorrect%20Authorization%20in%20wptb%20WP%20Table%20Builder%20%E2%80%93%20Drag%20%26%20Drop%20Table%20Builder&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13935-cwe-862-missing-authorization-in-th-35a53dbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13935%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13934-cwe-862-missing-authorization-in-th-dd05fa9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13934%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14741-cwe-862-missing-authorization-in-sh-14527b14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14741%3A%20CWE-862%20Missing%20Authorization%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=6960b130ecefc3cd7c0f7d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13628-cwe-862-missing-authorization-in-th-ec8db5ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13628%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14937-cwe-79-improper-neutralization-of-i-2cfd494a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14146-cwe-862-missing-authorization-in-wp-a7fbbfd3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14146%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21409-authorization-bypass-through-user-c-a279d64e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21409%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=medium&amp;id=6960b130ecefc3cd7c0f7d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70974-cwe-829-inclusion-of-functionality--fe198d2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70974%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Alibaba%20Fastjson&amp;severity=critical&amp;id=6960a6a3ecefc3cd7c0ce3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14574-cwe-200-exposure-of-sensitive-infor-f92e2b26</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14574%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15055-cwe-79-improper-neutralization-of-i-34da0141</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=6960a320ecefc3cd7c0b983f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15057-cwe-79-improper-neutralization-of-i-77ce3fde</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=high&amp;id=6960a320ecefc3cd7c0b9843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14718-cwe-862-missing-authorization-in-pu-59fa6d63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14718%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14720-cwe-862-missing-authorization-in-am-e419d6f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14720%3A%20CWE-862%20Missing%20Authorization%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b982a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0563-cwe-79-improper-neutralization-of-in-068f9f2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0563%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20WP%20Google%20Street%20View%20(with%20360%C2%B0%20virtual%20tour)%20%26%20Google%20maps%20%2B%20Local%20SEO&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14782-cwe-862-missing-authorization-in-wp-9c0238fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14782%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14980-cwe-200-exposure-of-sensitive-infor-603c451f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20%20Knowledge%20Base%20Documentation%20%26%20FAQ%20Solution%20for%20Elementor%20%26%20Block%20Editor&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b9836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15019-cwe-79-improper-neutralization-of-i-43842cb2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20Bulk%20Auto%20Image%20Alt%20Text%20(Alt%20tag%2C%20Alt%20attribute)%20optimizer%20(image%20SEO)&amp;severity=medium&amp;id=6960a320ecefc3cd7c0b983b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14736-cwe-269-improper-privilege-manageme-92ffb5c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14736%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=6960a320ecefc3cd7c0b982e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20976-cwe-20-improper-input-validation-in-b3ca800c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20976%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20975-cwe-280-improper-handling-of-insuff-5f046621</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20975%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Cloud&amp;severity=low&amp;id=69609f9becefc3cd7c0ad50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20974-cwe-20-improper-input-validation-in-ba1bf244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20974%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20973-cwe-125-out-of-bounds-read-in-samsu-534c343e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20973%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20972-cwe-926-improper-export-of-android--1fa5dbea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20972%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20971-cwe-416-use-after-free-in-samsung-m-f3fa5fc5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20971%3A%20CWE-416%20Use%20After%20Free%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69609f9becefc3cd7c0ad501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20970-cwe-284-improper-access-control-in--33a90e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20970%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20969-cwe-20-improper-input-validation-in-b581d4b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20969%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=69609f9becefc3cd7c0ad4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20968-cwe-416-use-after-free-in-samsung-m-28492dd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20968%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=69609f9becefc3cd7c0ad4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14803-cwe-79-cross-site-scripting-xss-in--cf1816b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14803%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20NEX-Forms&amp;severity=medium&amp;id=69609c17ecefc3cd7c0a38d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-north-korean-hackers-using-malicious-qr--2bcf0954</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20North%20Korean%20Hackers%20Using%20Malicious%20QR%20Codes%20in%20Spear-Phishing&amp;severity=medium&amp;id=6960e804a48af7d8cea16b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13749-cwe-352-cross-site-request-forgery--d21b8837</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13749%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=69609510ecefc3cd7c07ebe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14886-cwe-862-missing-authorization-in-sh-cc2d8640</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14886%3A%20CWE-862%20Missing%20Authorization%20in%20shoheitanaka%20Japanized%20for%20WooCommerce&amp;severity=medium&amp;id=69608a83ecefc3cd7c041599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66315-cwe-269-improper-privilege-manageme-a0a2659f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66315%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20MF258K&amp;severity=medium&amp;id=69606ae0ecefc3cd7ca6fe33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22712-cwe-116-improper-encoding-or-escapi-9829c07f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22712%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ApprovedRevs%20Extension&amp;severity=low&amp;id=6960d929a48af7d8ce7ea26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22713-cwe-79-improper-neutralization-of-i-147e5abf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=low&amp;id=6960d929a48af7d8ce7ea270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-09-4176f191</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-09&amp;severity=medium&amp;id=69619ab7ed32c7f01844536f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51626-na-36e5ff99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51626%3A%20n%2Fa&amp;severity=medium&amp;id=69616ec845ea0302aa7aa328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60538-na-bca78eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60538%3A%20n%2Fa&amp;severity=medium&amp;id=69616b4445ea0302aa763b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66715-na-c08c1da4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66715%3A%20n%2Fa&amp;severity=medium&amp;id=6961693845ea0302aa73d9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67811-na-e528b345</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67811%3A%20n%2Fa&amp;severity=medium&amp;id=696158a2047de42cfc869267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67810-na-9be9a4f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67810%3A%20n%2Fa&amp;severity=medium&amp;id=696158a2047de42cfc869263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-70161-na-6b8ba75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-70161%3A%20n%2Fa&amp;severity=critical&amp;id=69614fa0047de42cfc79a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67070-na-b36c12eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67070%3A%20n%2Fa&amp;severity=high&amp;id=69614b956c9099d8230406a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66744-na-b30d2a00</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66744%3A%20n%2Fa&amp;severity=high&amp;id=69613a016c9099d823001aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69542-na-faa12c97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69542%3A%20n%2Fa&amp;severity=critical&amp;id=696132fa6c9099d823e56083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67004-na-6171f99b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67004%3A%20n%2Fa&amp;severity=medium&amp;id=696132fa6c9099d823e56070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56225-na-8c05ec57</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56225%3A%20n%2Fa&amp;severity=high&amp;id=69612bfb6c9099d823dc109b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67282-na-614da349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67282%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67281-na-6196c6e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67281%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67280-na-f8428dcb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67280%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67279-na-d6d53ef7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67279%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67278-na-244bbf53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67278%3A%20n%2Fa&amp;severity=medium&amp;id=696124d1f9fa58d97280bf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67133-na-0409a09e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67133%3A%20n%2Fa&amp;severity=high&amp;id=6961214ef9fa58d9727fd82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22714-cwe-79-improper-neutralization-of-i-35c83ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Monaco%20Skin&amp;severity=low&amp;id=696047b7ecefc3cd7c756a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22710-cwe-79-improper-neutralization-of-i-9fa0ef59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikibase%20Extension&amp;severity=low&amp;id=69604433ecefc3cd7c741f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0733-sql-injection-in-phpgurukul-online-c-47e6a0d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0733%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration%20System&amp;severity=medium&amp;id=696040afecefc3cd7c736701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0732-command-injection-in-d-link-di-8200g-65e04b49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0732%3A%20Command%20Injection%20in%20D-Link%20DI-8200G&amp;severity=medium&amp;id=696040afecefc3cd7c7366f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0731-null-pointer-dereference-in-totolink-587777cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0731%3A%20NULL%20Pointer%20Dereference%20in%20TOTOLINK%20WA1200&amp;severity=medium&amp;id=696039a7ecefc3cd7c720a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0730-cross-site-scripting-in-phpgurukul-s-d99fea42</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0730%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Staff%20Leave%20Management%20System&amp;severity=medium&amp;id=6960329fecefc3cd7c7029a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0729-sql-injection-in-code-projects-inter-c0e5e154</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0729%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=6960248fecefc3cd7c4fa16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14436-cwe-79-improper-neutralization-of-i-ffe6b89c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neeraj_slit%20Brevo%20for%20WooCommerce&amp;severity=high&amp;id=6960248fecefc3cd7c4fa165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14505-cwe-1240-use-of-a-cryptographic-pri-da8a0e79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14505%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Elliptic&amp;severity=medium&amp;id=69602115ecefc3cd7c4b694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15464-cwe-926-improper-export-of-android--7aa6f84d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15464%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20yintibao%20Fun%20Print%20Mobile&amp;severity=high&amp;id=69602115ecefc3cd7c4b6952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0728-sql-injection-in-code-projects-inter-99e684ab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0728%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=696015f101d35e5d0ca3affb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0747-cwe-200-exposure-of-sensitive-inform-698ec942</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0747%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=low&amp;id=69600ee901d35e5d0ca2a7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22253-cwe-863-incorrect-authorization-in--da7b9039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22253%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20charmbracelet%20soft-serve&amp;severity=medium&amp;id=695ffd5601d35e5d0c85d737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21860-cwe-67-improper-handling-of-windows-8e57b3f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21860%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=695ffd5601d35e5d0c85d733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22257-cwe-79-improper-neutralization-of-i-b7cea917</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22257%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=695ffd5601d35e5d0c85d73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22256-cwe-79-improper-neutralization-of-i-068fdb7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22256%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salvo-rs%20salvo&amp;severity=high&amp;id=695ffd5601d35e5d0c85d73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guloader-malware-being-disguised-as-employee-perfo-f9600c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guloader%20Malware%20Being%20Disguised%20as%20Employee%20Performance%20Reports&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boto-cor-de-rosa-campaign-reveals-astaroth-whatsap-2257bd3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boto-Cor-de-Rosa%20campaign%20reveals%20Astaroth%20WhatsApp-based%20worm%20activity%20in%20Brazil&amp;severity=medium&amp;id=6960c9cbecefc3cd7c16abcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reborn-in-rust-muddywater-evolves-tooling-with-rus-f2c886d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reborn%20in%20Rust%3A%20MuddyWater%20Evolves%20Tooling%20with%20RustyWater%20Implant&amp;severity=medium&amp;id=6960cd4fecefc3cd7c180bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21896-cwe-863-incorrect-authorization-in--4f04eaa7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21896%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20getkirby%20kirby&amp;severity=medium&amp;id=695ff65701d35e5d0c7d3f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22235-cwe-639-authorization-bypass-throug-cdd7f537</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22235%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eComplaint&amp;severity=high&amp;id=695fe7de2717593a336ad51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22234-cwe-639-authorization-bypass-throug-cdf5684d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22234%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20OPEXUS%20eCase%20Portal&amp;severity=critical&amp;id=695fe7de2717593a336ad517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22233-cwe-79-improper-neutralization-of-i-f384c61e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22233%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22232-cwe-79-improper-neutralization-of-i-a378ed30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22232%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22231-cwe-79-improper-neutralization-of-i-5e71d6a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20eCASE%20Audit&amp;severity=medium&amp;id=695fe7de2717593a336ad508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22230-cwe-863-incorrect-authorization-in--e01a693b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22230%3A%20CWE-863%20Incorrect%20Authorization%20in%20OPEXUS%20eCASE%20Audit&amp;severity=high&amp;id=695fe7de2717593a336ad503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-worm-spreads-astaroth-banking-trojan-acro-8ed6135a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Worm%20Spreads%20Astaroth%20Banking%20Trojan%20Across%20Brazil%20via%20Contact%20Auto-Messaging&amp;severity=medium&amp;id=6960058501d35e5d0ca0a539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22587-cwe-79-improper-neutralization-of-i-6a2f2889</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ideagen%20DevonWay&amp;severity=medium&amp;id=695fe7de2717593a336ad51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22486-cwe-862-missing-authorization-in-ha-2bfe4ed4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22486%3A%20Missing%20Authorization%20in%20Hakob%20Re%20Gallery&amp;severity=null&amp;id=695fe4612717593a336a2000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22487-cwe-862-missing-authorization-in-ba-639bdea8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22487%3A%20Missing%20Authorization%20in%20baqend%20Speed%20Kit&amp;severity=null&amp;id=695fe4612717593a336a2003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22488-cwe-862-missing-authorization-in-id-e2898ba4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22488%3A%20Missing%20Authorization%20in%20IdeaBox%20Creations%20Dashboard%20Welcome%20for%20Beaver%20Builder&amp;severity=high&amp;id=695fe4612717593a336a1fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22489-cwe-639-authorization-bypass-throug-b0f9ee3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22489%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Wptexture%20Image%20Slider%20Slideshow&amp;severity=high&amp;id=695fe4612717593a336a1fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-high-value-telecommunications-infrastructu-12021b8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20high%20value%20telecommunications%20infrastructure%20in%20South%20Asia&amp;severity=medium&amp;id=695fe4592717593a336a123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22490-cwe-862-missing-authorization-in-ni-76cdc5bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22490%3A%20Missing%20Authorization%20in%20niklaslindemann%20Bulk%20Landing%20Page%20Creator%20for%20WordPress%20LPagery&amp;severity=null&amp;id=695fe4612717593a336a1fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22492-cwe-862-missing-authorization-in-na-98391b73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22492%3A%20Missing%20Authorization%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=null&amp;id=695fe4612717593a336a1ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22517-cwe-862-missing-authorization-in-pa-6bf9aae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22517%3A%20Missing%20Authorization%20in%20Passionate%20Brains%20GA4WP%3A%20Google%20Analytics%20for%20WordPress&amp;severity=null&amp;id=695fe4612717593a336a1ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0671-cwe-79-improper-neutralization-of-in-6be47e30</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20UploadWizard%20extension&amp;severity=medium&amp;id=695fd9d02717593a334c2bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22518-cwe-79-improper-neutralization-of-i-b8832fda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=high&amp;id=695fd9d02717593a334c2be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22519-cwe-79-improper-neutralization-of-i-3ebf74ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20MediaPress&amp;severity=high&amp;id=695fd9d02717593a334c2be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22521-cwe-98-improper-control-of-filename-9b7efea9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22521%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20G5Theme%20Handmade%20Framework&amp;severity=critical&amp;id=695fd9d02717593a334c2beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59468-vulnerability-in-veeam-backup-and-r-83f9e674</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59468%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55125-vulnerability-in-veeam-backup-and-r-9da41fad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55125%3A%20Vulnerability%20in%20Veeam%20Backup%20And%20Recovery&amp;severity=high&amp;id=695fd9d02717593a334c2bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59469-vulnerability-in-veeam-backup-and-r-110221a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59469%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59470-vulnerability-in-veeam-backup-and-r-84fa8bde</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59470%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=695fd9d02717593a334c2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22522-cwe-862-missing-authorization-in-mu-89d8f119</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22522%3A%20Missing%20Authorization%20in%20Munir%20Kamal%20Block%20Slider&amp;severity=high&amp;id=695fd9d12717593a334c2c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21639-vulnerability-in-ubiquiti-inc-airma-3788a8cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21639%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20airMAX%20AC&amp;severity=medium&amp;id=695fd9d02717593a334c2be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21638-vulnerability-in-ubiquiti-inc-ubb-x-be288a3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21638%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UBB-XG&amp;severity=high&amp;id=695fd9d02717593a334c2bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22255-cwe-20-improper-input-validation-in-8e0abdcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22255%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695fd2d12717593a3341ed67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67858-cwe-88-improper-neutralization-of-a-e58bba60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67858%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20https%3A%2F%2Fgithub.com%2FFoobarOy%2F%20Foomuuri&amp;severity=high&amp;id=695fceb6c901b06321fdd524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22244-cwe-1336-improper-neutralization-of-c40ee942</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22244%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20open-metadata%20OpenMetadata&amp;severity=high&amp;id=695fceb6c901b06321fdd528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22241-cwe-434-unrestricted-upload-of-file-2a85b330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22241%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gunet%20openeclass&amp;severity=high&amp;id=695fcb32c901b06321fa8309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67603-cwe-285-improper-authorization-in-h-a946f8ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67603%3A%20CWE-285%3A%20Improper%20Authorization%20in%20https%3A%2F%2Fgithub.com%2FFoobarOy%2F%20Foomuuri&amp;severity=medium&amp;id=695fcb32c901b06321fa8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66003-cwe-73-external-control-of-file-nam-dc355c22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66003%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20https%3A%2F%2Fgithub.com%2FKDE%2F%20smb4k&amp;severity=high&amp;id=695fc7afc901b06321f9519d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4596-cwe-639-authorization-bypass-through-db2bb68a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4596%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Asseco%20AMDX&amp;severity=medium&amp;id=695fc7afc901b06321f9519a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-uat-7290-targets-telecoms-with-linux--dedf79ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20UAT-7290%20Targets%20Telecoms%20with%20Linux%20Malware%20and%20ORB%20Nodes&amp;severity=medium&amp;id=695fe16f2717593a3368db6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22041-cwe-704-incorrect-type-conversion-o-dde80bb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22041%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20armurox%20loggingredactor&amp;severity=low&amp;id=695fc7afc901b06321f951a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22034-cwe-636-not-failing-securely-failin-e9d94fcf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22034%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20jvoisin%20snuffleupagus&amp;severity=critical&amp;id=695fc7afc901b06321f951a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66002-cwe-88-improper-neutralization-of-a-0f312f8e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66002%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20https%3A%2F%2Fgithub.com%2FKDE%2F%20smb4k&amp;severity=medium&amp;id=695fc426c901b06321f8223e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-malware-and-phishing-analysis-breaking-down-a-8618ad40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20Malware%20and%20Phishing%20Analysis%20-%20Breaking%20Down%20an%20Access-Code-Gated%20Malware%20Delivery%20Chain&amp;severity=medium&amp;id=695fc0a3c901b06321f657cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22028-cwe-843-access-of-resource-using-in-424e4a3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22028%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20preactjs%20preact&amp;severity=high&amp;id=695fc0a3c901b06321f657fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21895-cwe-703-improper-check-or-handling--6a8429b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21895%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20RustCrypto%20RSA&amp;severity=low&amp;id=695fbd1fc901b06321f46f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21891-cwe-287-improper-authentication-in--5685fcec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21891%3A%20CWE-287%3A%20Improper%20Authentication%20in%20IceWhaleTech%20ZimaOS&amp;severity=critical&amp;id=695fb9abc901b06321f2a5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rethinking-security-for-agentic-ai-ed96c8db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rethinking%20Security%20for%20Agentic%20AI&amp;severity=medium&amp;id=695fb968c901b06321f28355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21885-cwe-918-server-side-request-forgery-0aafb775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21885%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20miniflux%20v2&amp;severity=medium&amp;id=695fb9abc901b06321f2a5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14025-incorrect-execution-assigned-permis-ec02e850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14025%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=695fb9abc901b06321f2a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8307-cwe-257-storing-passwords-in-a-recov-d90d2cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8307%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Asseco%20InfoMedica%20Plus&amp;severity=medium&amp;id=695fb9abc901b06321f2a5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8306-cwe-1220-insufficient-granularity-of-dbab0da2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8306%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Asseco%20InfoMedica%20Plus&amp;severity=medium&amp;id=695fb9abc901b06321f2a5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-patched-in-jspdf-f547f89e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Patched%20in%20jsPDF&amp;severity=critical&amp;id=695faeddc901b06321ecc624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-exposes-n8n-instances-to-ta-7d28c0ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Exposes%20n8n%20Instances%20to%20Takeover%20Attacks&amp;severity=critical&amp;id=695faeddc901b06321ecc628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69260-cwe-346-origin-validation-error-in--e0b42137</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69260%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=695fab8ac901b06321eb9687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69259-cwe-346-origin-validation-error-in--b364d952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69259%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=695fab8ac901b06321eb9682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69258-cwe-290-authentication-bypass-by-sp-4c2c3579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69258%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=695fab8ac901b06321eb967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-rustfs-flaw-iranian-ops-webui--51511695</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20RustFS%20Flaw%2C%20Iranian%20Ops%2C%20WebUI%20RCE%2C%20Cloud%20Leaks%2C%20and%2012%20More%20Stories&amp;severity=medium&amp;id=695fe16f2717593a3368db6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-whill-wheelchair-safety-risks-v-6669d0f4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20WHILL%20Wheelchair%20Safety%20Risks%20via%20Remote%20Hacking&amp;severity=low&amp;id=695fa7dec901b06321ea46d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0719-stack-based-buffer-overflow-in-red-h-79d4cd86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0719%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=695fab8ac901b06321eb968c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62877-cwe-1188-initialization-of-a-resour-55c4d7c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62877%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20SUSE%20harvester&amp;severity=critical&amp;id=695fa483c901b06321e778f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-state-of-trusted-open-source-74a77711</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20State%20of%20Trusted%20Open%20Source&amp;severity=medium&amp;id=695f9d45c901b06321e3fba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-deliver-nodecordrat-57b5d428</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NPM%20Packages%20Deliver%20NodeCordRAT&amp;severity=medium&amp;id=695fa482c901b06321e77866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluedelta-evolves-credential-harvesting-f2bf1165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueDelta%20Evolves%20Credential%20Harvesting&amp;severity=medium&amp;id=695fa482c901b06321e7786b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-browser-updates-targeting-wordpress-administr-6d53f235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Browser%20Updates%20Targeting%20WordPress%20Administrators%20via%20Malicious%20Plugin&amp;severity=medium&amp;id=695fa482c901b06321e77875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-hpe-oneview-vulnerability-exploited-in-at-236d5b77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20HPE%20OneView%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=695f92bcc901b06321dddc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-ise-security-vulnerability-after-pub-7c9b7842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20ISE%20Security%20Vulnerability%20After%20Public%20PoC%20Exploit%20Release&amp;severity=low&amp;id=695fe16f2717593a3368db70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-nodecordrat-hidden-in-npm-bitc-55f3fadd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20NodeCordRAT%20Hidden%20in%20npm%20Bitcoin-Themed%20Packages&amp;severity=low&amp;id=695fe16f2717593a3368db73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66001-cwe-295-improper-certificate-valida-1cc9c04d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66001%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20neuvector&amp;severity=high&amp;id=695f8862c901b06321d89e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21894-cwe-290-authentication-bypass-by-sp-abdc7b71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21894%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=695f815bc901b06321d3faf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coolify-discloses-11-critical-flaws-enabling-full--817621ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coolify%20Discloses%2011%20Critical%20Flaws%20Enabling%20Full%20Server%20Compromise%20on%20Self-Hosted%20Instances&amp;severity=critical&amp;id=695fe16f2717593a3368db76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21874-cwe-772-missing-release-of-resource-267725cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21874%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21873-cwe-79-improper-neutralization-of-i-e5235d5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=695f815bc901b06321d3fb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21872-cwe-79-improper-neutralization-of-i-33e479c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21872%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21871-cwe-79-improper-neutralization-of-i-75a4b0d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21871%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=695f815bc901b06321d3fafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14984-cwe-79-improper-neutralization-of-i-0cc71297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20Form%20%E2%80%93%20Contact%20Form%20Builder%2C%20Booking%2C%20Reservation%2C%20Subscribe%20for%20Block%20Editor&amp;severity=medium&amp;id=695f7a58c901b06321d0bb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0676-missing-authorization-in-g5theme-zor-49fcece6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0676%3A%20Missing%20Authorization%20in%20G5Theme%20Zorka&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0675-exposure-of-sensitive-system-informa-eba9da76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0675&amp;severity=null&amp;id=695f7a5cc901b06321d0bc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0674-missing-authorization-in-campaign-mo-9d15d4cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0674%3A%20Missing%20Authorization%20in%20Campaign%20Monitor%20Campaign%20Monitor%20for%20WordPress&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69169-improper-neutralization-of-script-r-002a22c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69169%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Noor%20Alam%20Easy%20Media%20Download&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68892-improper-neutralization-of-input-du-f98ab1d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%40hotmail.com%20Scroll%20rss%20excerpt&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68891-improper-neutralization-of-input-du-f4133803</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Sutana%20WP%20App%20Bar&amp;severity=high&amp;id=695f7a5cc901b06321d0bc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68890-improper-neutralization-of-input-du-8d192e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hands01%20e-shops&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68887-improper-neutralization-of-input-du-4e9ba80b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=high&amp;id=695f7a5cc901b06321d0bc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68875-improper-neutralization-of-input-du-08f5807d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jcaruso001%20Flaming%20Password%20Reset&amp;severity=medium&amp;id=695f7a5cc901b06321d0bc56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68874-improper-neutralization-of-input-du-560bb713</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20Visitor%20Stats%20Widget&amp;severity=high&amp;id=695f7a5bc901b06321d0bc2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68873-improper-neutralization-of-input-du-5671c8e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chlo%C3%A9digital%20PRIMER%20by%20chlo%C3%A9digital&amp;severity=high&amp;id=695f7a5bc901b06321d0bc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68867-improper-neutralization-of-input-du-3d8da08e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anibalwainstein%20Effect%20Maker&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67937-improper-control-of-filename-for-in-35b85a68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Hendon&amp;severity=high&amp;id=695f7a5bc901b06321d0bc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67936-improper-control-of-filename-for-in-16578b3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67936%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Curly&amp;severity=high&amp;id=695f7a5bc901b06321d0bc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67935-improper-control-of-filename-for-in-47653ee3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Optimize&amp;severity=high&amp;id=695f7a5bc901b06321d0bc20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67934-improper-control-of-filename-for-in-ea2bd869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67934%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wellspring&amp;severity=high&amp;id=695f7a5bc901b06321d0bc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67932-improper-neutralization-of-input-du-22c8f156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67931-insertion-of-sensitive-information--805d24f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67931%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AITpro%20BulletProof%20Security&amp;severity=high&amp;id=695f7a5bc901b06321d0bc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67930-improper-neutralization-of-input-du-77488d71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vernon%20Systems%20Limited%20eHive%20Search&amp;severity=medium&amp;id=695f7a5bc901b06321d0bc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67928-improper-neutralization-of-special--625fe5f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themesuite%20Automotive%20Listings&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67927-improper-neutralization-of-input-du-e1912707</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67926-missing-authorization-in-shahjahan--bd1e512f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67926%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=high&amp;id=695f7a5ac901b06321d0bbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67925-improper-control-of-filename-for-in-9899a226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Corpkit&amp;severity=high&amp;id=695f7a5ac901b06321d0bbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67924-unrestricted-upload-of-file-with-da-3e2ed3af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67924%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20zozothemes%20Corpkit&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67922-improper-neutralization-of-input-du-fc31c3e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67921-improper-neutralization-of-special--86d74aed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67921%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VanKarWai%20Lobo&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67920-improper-control-of-filename-for-in-2662c706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67920%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Neo%20Ocular&amp;severity=critical&amp;id=695f7a5ac901b06321d0bbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67919-authorization-bypass-through-user-c-b1bd716b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67919%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WofficeIO%20Woffice%20Core&amp;severity=high&amp;id=695f7a5ac901b06321d0bbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67918-improper-neutralization-of-input-du-741baa31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WofficeIO%20Woffice&amp;severity=medium&amp;id=695f7a5ac901b06321d0bbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67917-missing-authorization-in-shinetheme-4feea974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67917%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=695f7a59c901b06321d0bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67916-improper-neutralization-of-input-du-455113d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Jobify&amp;severity=medium&amp;id=695f7a59c901b06321d0bbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67915-authentication-bypass-using-an-alte-31496ea3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67915%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Arraytics%20Timetics&amp;severity=critical&amp;id=695f7a59c901b06321d0bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67914-path-traversal-in-beeteam368-vidmov-8d0e5cfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67914%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20beeteam368%20VidMov&amp;severity=high&amp;id=695f7a59c901b06321d0bbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67913-missing-authorization-in-arubait-de-ae13f281</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67913%3A%20Missing%20Authorization%20in%20Aruba.it%20Dev%20Aruba%20HiSpeed%20Cache&amp;severity=critical&amp;id=695f7a59c901b06321d0bba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67911-deserialization-of-untrusted-data-i-1611c32e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67911%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tribulant%20Software%20Newsletters&amp;severity=critical&amp;id=695f7a59c901b06321d0bba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27004-improper-neutralization-of-input-du-901001d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Famous%20-%20Responsive%20Image%20And%20Video%20Grid%20Gallery%20WordPress%20Plugin&amp;severity=medium&amp;id=695f7a59c901b06321d0bba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27002-improper-neutralization-of-input-du-cf552652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27002%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20CountDown%20With%20Image%20or%20Video%20Background&amp;severity=medium&amp;id=695f7a59c901b06321d0bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23993-improper-neutralization-of-special--807b5bf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=695f7a59c901b06321d0bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23504-authentication-bypass-using-an-alte-338b8f53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23504%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=695f7a59c901b06321d0bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22728-improper-neutralization-of-special--a1d3c18d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22728%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20Workreap%20(theme&apos;s%20plugin)&amp;severity=critical&amp;id=695f7a58c901b06321d0bb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22726-server-side-request-forgery-ssrf-in-d25250ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22726%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20_nK%20nK%20Themes%20Helper&amp;severity=critical&amp;id=695f7a58c901b06321d0bb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22725-improper-neutralization-of-input-du-22129f92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22725%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loopus%20WP%20Virtual%20Assistant&amp;severity=medium&amp;id=695f7a58c901b06321d0bb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22715-missing-authorization-in-loopus-wp--bb20f474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22715%3A%20Missing%20Authorization%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=high&amp;id=695f7a58c901b06321d0bb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22713-improper-neutralization-of-special--f789e7b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22713%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=critical&amp;id=695f7a58c901b06321d0bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22712-improper-control-of-filename-for-in-f3c03723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22712%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QantumThemes%20Typify&amp;severity=critical&amp;id=695f7a58c901b06321d0bb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22708-improper-control-of-filename-for-in-c75952d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Mitech&amp;severity=critical&amp;id=695f7a58c901b06321d0bb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22707-improper-control-of-filename-for-in-9459765a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22707%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Moody&amp;severity=critical&amp;id=695f7a58c901b06321d0bb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22509-improper-control-of-filename-for-in-ee6f4eee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22509%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TMRW-studio%20Atlas&amp;severity=critical&amp;id=695f7a58c901b06321d0bb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14431-improper-control-of-filename-for-in-19773b5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20THEMELOGI%20Navian&amp;severity=critical&amp;id=695f7a56c901b06321d0bb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14430-improper-control-of-filename-for-in-799c0ebc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14430%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Brook&amp;severity=critical&amp;id=695f7a56c901b06321d0bb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14429-improper-control-of-filename-for-in-3357f4f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20AeroLand&amp;severity=critical&amp;id=695f7a56c901b06321d0bb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14360-missing-authorization-in-kaira-bloc-3771edfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14360%3A%20Missing%20Authorization%20in%20Kaira%20Blockons&amp;severity=critical&amp;id=695f7a56c901b06321d0bb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14359-improper-control-of-filename-for-in-397f90b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20brandexponents%20Oshine&amp;severity=critical&amp;id=695f7a56c901b06321d0baff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14358-missing-authorization-in-sizam-rehu-4f69b90e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14358%3A%20Missing%20Authorization%20in%20sizam%20REHub%20Framework&amp;severity=critical&amp;id=695f7a56c901b06321d0bafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13504-improper-neutralization-of-input-du-a40e55b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Real%20Estate%20Pro&amp;severity=medium&amp;id=695f7a56c901b06321d0baf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12551-improper-neutralization-of-input-du-9ef8f551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20ListingHub&amp;severity=medium&amp;id=695f7a56c901b06321d0baf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12550-improper-control-of-filename-for-in-5b07e167</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12550%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20OchaHouse&amp;severity=critical&amp;id=695f7a56c901b06321d0baf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12549-improper-control-of-filename-for-in-b8432961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12549%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Rozy%20-%20Flower%20Shop&amp;severity=critical&amp;id=695f7a56c901b06321d0baf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0701-sql-injection-in-code-projects-inter-2e172073</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0701%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f68bec901b06321bec204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13679-cwe-862-missing-authorization-in-th-ad4d3464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13679%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=695f5aaec901b06321b263ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0700-sql-injection-in-code-projects-inter-686078d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0700%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f5aaec901b06321b263b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-launches-chatgpt-health-with-isolated-encry-7f957863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Launches%20ChatGPT%20Health%20with%20Isolated%2C%20Encrypted%20Health%20Data%20Controls&amp;severity=low&amp;id=695fe16f2717593a3368db79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0699-sql-injection-in-code-projects-inter-b85136f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0699%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f5022c901b06321a78445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0698-sql-injection-in-code-projects-inter-76fded15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0698%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f4596c901b06321a377e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-microsoft-office-and-hpe-oneview-bugs-a-85288de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Microsoft%20Office%20and%20HPE%20OneView%20Bugs%20as%20Actively%20Exploited&amp;severity=low&amp;id=695fe16f2717593a3368db7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0697-sql-injection-in-code-projects-inter-219dd5f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0697%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=695f3786c901b063217f0239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21427-uncontrolled-search-path-element-in-aad0c32f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PIONEER%20CORPORATION%20USB%20DAC%20Amplifier%20APS-DA101JS&amp;severity=high&amp;id=695f3089c901b0632175e2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0707-incorrect-behavior-order-authorizati-e87902c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0707%3A%20Incorrect%20Behavior%20Order%3A%20Authorization%20Before%20Parsing%20and%20Canonicalization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=695f2d53e471bcf0302d1c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12640-cwe-862-missing-authorization-in-ga-44a422b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12640%3A%20CWE-862%20Missing%20Authorization%20in%20galdub%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=695f1f43e471bcf0300999b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14275-cwe-79-improper-neutralization-of-i-01fc7803</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Kit%20for%20Elementor%20%E2%80%93%20Powerful%20Addons%20for%20Elementor%2C%20Widgets%20%26%20Templates%20for%20WordPress&amp;severity=medium&amp;id=695f1f43e471bcf0300999b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21877-cwe-94-improper-control-of-generati-ab77daef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21877%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=695f0dafe471bcf030f5212d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21868-cwe-1333-inefficient-regular-expres-5e63e72a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21868%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=695efc26e471bcf030c50479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-using-gephi-with-dshield-sensor-data-wed--245fe4bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data%2C%20(Wed%2C%20Jan%207th)&amp;severity=medium&amp;id=695ef93a07b8a419a776ec28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-08-6ebd0adb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-08&amp;severity=medium&amp;id=69604781ecefc3cd7c74f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68718-na-173f2be3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68718%3A%20n%2Fa&amp;severity=medium&amp;id=69602115ecefc3cd7c4b6955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68719-na-e1c0f72f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68719%3A%20n%2Fa&amp;severity=high&amp;id=6960197501d35e5d0ca49c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68716-na-0ad23b88</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68716%3A%20n%2Fa&amp;severity=high&amp;id=696015f101d35e5d0ca3aff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68717-na-21140e62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68717%3A%20n%2Fa&amp;severity=critical&amp;id=6960126e01d35e5d0ca32a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65731-na-c6d28df0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65731%3A%20n%2Fa&amp;severity=medium&amp;id=696007e501d35e5d0ca11112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68715-na-e2ecb9a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68715%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca1110e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66916-na-e51fb6f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66916%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca11109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66913-na-091de65a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66913%3A%20n%2Fa&amp;severity=critical&amp;id=696007e501d35e5d0ca11105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67325-na-ab4cd6cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67325%3A%20n%2Fa&amp;severity=critical&amp;id=695ffd5601d35e5d0c85d72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65518-na-4a47a9ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65518%3A%20n%2Fa&amp;severity=high&amp;id=695ffd5601d35e5d0c85d72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67825-na-4635c23b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67825%3A%20n%2Fa&amp;severity=medium&amp;id=695fe7de2717593a336ad4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61550-na-1073f50c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61550%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a202c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61549-na-a8ca8bbf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61549%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61548-na-d7c9e0d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61548%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4622717593a336a2026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61547-na-ee49a114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61547%3A%20n%2Fa&amp;severity=medium&amp;id=695fe4622717593a336a2023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61546-na-f0011f4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61546%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4622717593a336a2020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50334-na-9d3e8590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50334%3A%20n%2Fa&amp;severity=high&amp;id=695fe4622717593a336a2019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56425-na-4205a5a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56425%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4612717593a336a1ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56424-na-35b7b549</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56424%3A%20n%2Fa&amp;severity=high&amp;id=695fe4612717593a336a1ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61246-na-22648793</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61246%3A%20n%2Fa&amp;severity=critical&amp;id=695fe4612717593a336a1fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67091-na-672ab351</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67091%3A%20n%2Fa&amp;severity=medium&amp;id=695fd2d12717593a3341ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67090-na-904d4e45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67090%3A%20n%2Fa&amp;severity=medium&amp;id=695fd2d12717593a3341ed5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67089-na-8b9c997f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67089%3A%20n%2Fa&amp;severity=high&amp;id=695fd2d12717593a3341ed5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63611-na-223c28fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63611%3A%20n%2Fa&amp;severity=high&amp;id=695fd2d12717593a3341ed56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21858-cwe-20-improper-input-validation-in-722f9002</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21858%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=695ef5ea07b8a419a7738b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21875-cwe-89-improper-neutralization-of-s-b0c482ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21875%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=critical&amp;id=695ef26a07b8a419a77247a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21869-cwe-787-out-of-bounds-write-in-ggml-e267ba1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21869%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=695eeee107b8a419a7712f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15346-cwe-306-missing-authentication-for--99034569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15346%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20wolfSSL%20wolfSSL-py&amp;severity=critical&amp;id=695eeee107b8a419a7712f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21859-cwe-918-server-side-request-forgery-cc5f877d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21859%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20axllent%20mailpit&amp;severity=medium&amp;id=695eeee107b8a419a7712f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21695-cwe-915-improperly-controlled-modif-d4ca135e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21695%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20kromitgmbh%20titra&amp;severity=medium&amp;id=695eeee107b8a419a7712f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21694-cwe-284-improper-access-control-in--29f24380</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21694%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20kromitgmbh%20titra&amp;severity=medium&amp;id=695eeb5d07b8a419a75c0a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62224-cwe-451-user-interface-ui-misrepres-3f2120c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62224%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=695ee7de07b8a419a7566a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21697-cwe-362-concurrent-execution-using--3b069392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21697%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rezmoss%20axios4go&amp;severity=high&amp;id=695ee0db07b8a419a74d164c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21851-cwe-22-improper-limitation-of-a-pat-afbd0b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21851%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Project-MONAI%20MONAI&amp;severity=medium&amp;id=695ee0db07b8a419a74d1653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22047-cwe-20-improper-input-validation-in-22fbe620</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22047%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695edb802efadb62cf875e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12776-cwe-79-improper-neutralization-of-i-a457465f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Commvault%20WebConsole&amp;severity=low&amp;id=695edb802efadb62cf875e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22046-cwe-20-improper-input-validation-in-0728d445</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22046%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695edb802efadb62cf875e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21693-cwe-20-improper-input-validation-in-b2a76a3a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21693%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ee29307b8a419a74fbfe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21692-cwe-20-improper-input-validation-in-e2089966</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21692%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ee29307b8a419a74fbfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21691-cwe-20-improper-input-validation-in-3f0702c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21691%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21690-cwe-20-improper-input-validation-in-54e7f8fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21690%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21689-cwe-20-improper-input-validation-in-d3f14076</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21689%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695ed7fb2efadb62cf86c415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21688-cwe-20-improper-input-validation-in-b11fd34e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21688%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed7fb2efadb62cf86c410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21687-cwe-20-improper-input-validation-in-05a2397a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21687%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21686-cwe-20-improper-input-validation-in-3e125ec9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21686%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21685-cwe-20-improper-input-validation-in-dd5e1027</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21685%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed4782efadb62cf85dbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21684-cwe-20-improper-input-validation-in-4696263e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf845619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69222-cwe-918-server-side-request-forgery-6b2634c3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69222%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20danny-avila%20LibreChat&amp;severity=critical&amp;id=695ed0f72efadb62cf84560f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13151-cwe-120-buffer-copy-without-checkin-c9bb9538</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13151%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20GnuTLS%20libtasn1&amp;severity=high&amp;id=695ed0f72efadb62cf84560b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21683-cwe-20-improper-input-validation-in-49152906</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21683%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf845614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69221-cwe-862-missing-authorization-in-da-f1390c60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69221%3A%20CWE-862%3A%20Missing%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=695ecd702efadb62cf830358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21682-cwe-20-improper-input-validation-in-2596520c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21682%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ed0f72efadb62cf84561e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69220-cwe-862-missing-authorization-in-da-78b98c56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69220%3A%20CWE-862%3A%20Missing%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=695ec9ec2efadb62cf81f4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21681-cwe-20-improper-input-validation-in-efe8ad98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21681%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695ec9ec2efadb62cf81f4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22187-cwe-502-deserialization-of-untruste-761986c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22187%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Open%20Microscopy%20Environment%20Bio-Formats&amp;severity=medium&amp;id=695ec6692efadb62cf814038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22186-cwe-611-improper-restriction-of-xml-9cf3ffb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22186%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Open%20Microscopy%20Environment%20Bio-Formats&amp;severity=medium&amp;id=695ec6692efadb62cf814033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22185-cwe-125-out-of-bounds-read-in-openl-149c6b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22185%3A%20CWE-125%20Out-of-bounds%20Read%20in%20OpenLDAP%20Foundation%20OpenLDAP&amp;severity=medium&amp;id=695ec6692efadb62cf81402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22184-cwe-120-buffer-copy-without-checkin-2d99f8c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22184%3A%20CWE-787%20Out-of-bounds%20Write%20in%20zlib%20software%20zlib&amp;severity=medium&amp;id=695ec6692efadb62cf814027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66620-cwe-553-command-shell-in-externally-ff6ed5ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66620%3A%20CWE-553%20Command%20Shell%20in%20Externally%20Accessible%20Directory%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebf602efadb62cf7fc350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64305-cwe-313-cleartext-storage-in-a-file-29a0875f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64305%3A%20CWE-313%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebf602efadb62cf7fc34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61939-cwe-923-improper-restriction-of-com-04b70488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61939%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Columbia%20Weather%20Systems%20MicroServer&amp;severity=high&amp;id=695ebbdb2efadb62cf6b2ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0670-cwe-79-improper-neutralization-of-in-ad1ac8dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20ProofreadPage%20Extension&amp;severity=medium&amp;id=695eb01e7349d0379dbd7dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21856-cwe-89-improper-neutralization-of-s-8cdebb6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21856%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20the-hideout%20tarkov-data-manager&amp;severity=high&amp;id=695ea9147349d0379dba5700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21855-cwe-79-improper-neutralization-of-i-ad553004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20the-hideout%20tarkov-data-manager&amp;severity=critical&amp;id=695ea9147349d0379dba56fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21854-cwe-287-improper-authentication-in--7cc8c676</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21854%3A%20CWE-287%3A%20Improper%20Authentication%20in%20the-hideout%20tarkov-data-manager&amp;severity=critical&amp;id=695ea9147349d0379dba56f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21680-cwe-476-null-pointer-dereference-in-047e320f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21680%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e9e877349d0379db58c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0669-cwe-22-improper-limitation-of-a-path-051a3740</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0669%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20CSS%20extension&amp;severity=high&amp;id=695e9e877349d0379db58c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0668-cwe-1333-inefficient-regular-express-21491780</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0668%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Wikimedia%20Foundation%20MediaWiki%20-%20VisualData%20Extension&amp;severity=medium&amp;id=695e9e877349d0379db58c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66560-cwe-770-allocation-of-resources-wit-b1c6da4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66560%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20quarkusio%20quarkus&amp;severity=medium&amp;id=695e9b047349d0379db428c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61782-cwe-601-url-redirection-to-untruste-13f1c6b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61782%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=695e9b047349d0379db428c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58441-cwe-918-server-side-request-forgery-3b26c3ad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58441%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KnowageLabs%20Knowage-Server&amp;severity=medium&amp;id=695e97857349d0379db35c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22539-cwe-201-insertion-of-sensitive-info-0d68abb6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22539%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e97867349d0379db35c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21679-cwe-20-improper-input-validation-in-2c518fac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21679%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695e97867349d0379db35c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21678-cwe-20-improper-input-validation-in-0c47d3b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21678%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695e97867349d0379db35c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21506-cwe-20-improper-input-validation-in-31f187d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21506%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21505-cwe-20-improper-input-validation-in-712baf89</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21505%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21503-cwe-20-improper-input-validation-in-1c4e70a0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21503%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21504-cwe-122-heap-based-buffer-overflow--e39a2a83</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21504%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97867349d0379db35c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21501-cwe-20-improper-input-validation-in-eead7bde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21501%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21502-cwe-20-improper-input-validation-in-8e09d8ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21502%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21500-cwe-20-improper-input-validation-in-61e61046</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21500%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21499-cwe-20-improper-input-validation-in-13cb06df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21499%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21498-cwe-20-improper-input-validation-in-e0e991fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21498%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21496-cwe-20-improper-input-validation-in-19443145</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21496%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4677-cwe-613-insufficient-session-expirat-37530d49</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4677%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=medium&amp;id=695e97857349d0379db35c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/black-cat-behind-seo-poisoning-malware-campaign-ta-e273b63e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Black%20Cat%20Behind%20SEO%20Poisoning%20Malware%20Campaign%20Targeting%20Popular%20Software%20Searches&amp;severity=medium&amp;id=695ec4a92efadb62cf80eb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21497-cwe-20-improper-input-validation-in-5f20b0a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21497%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21495-cwe-20-improper-input-validation-in-cf10371c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21495%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695e97857349d0379db35c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22537-cwe-497-exposure-of-sensitive-syste-d934be58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22537%3A%20CWE-497%3A%20Exposure%20of%20sensitive%20system%20information%20to%20an%20unauthorized%20control%20sphere%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e93fd7349d0379db27899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4676-cwe-303-incorrect-implementation-of--73ca6166</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4676%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=high&amp;id=695e93fd7349d0379db27893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0618-cwe-79-improper-neutralization-of-in-b2d96a0c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Devolutions%20PowerShell%20Universal&amp;severity=medium&amp;id=695e93fd7349d0379db27896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4675-cwe-754-improper-check-for-unusual-o-57c617f2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4675%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20ABB%20WebPro%20SNMP%20Card%20PowerValue&amp;severity=medium&amp;id=695e93fd7349d0379db278a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22536-cwe-269-improper-privilege-manageme-73d1af88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22536%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e93fd7349d0379db278ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22535-cwe-1366-frail-security-in-protocol-7dc80036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22535%3A%20CWE-1366%3A%20Frail%20Security%20in%20Protocols%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e90787349d0379db110ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20029-improper-restriction-of-xml-externa-18fc28d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20029%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20027-exposure-of-sensitive-information-t-3a7e9bbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20027%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20026-double-free-in-cisco-cisco-secure-f-811fd0ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20026%3A%20Double%20Free%20in%20Cisco%20Cisco%20Secure%20Firewall%20Threat%20Defense%20(FTD)%20Software&amp;severity=medium&amp;id=695e8cf77349d0379db03203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22544-cwe-319-cleartext-transmission-of-s-944ed6fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22544%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e8cf77349d0379db0320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22543-cwe-261-week-encoding-for-passwords-53f4a645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22543%3A%20CWE-261%3A%20Week%20encoding%20for%20passwords%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=medium&amp;id=695e89727349d0379daecb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12543-improper-input-validation-in-red-ha-a7633912</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12543%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204.14.4%20for%20Spring%20Boot%203.5.11&amp;severity=critical&amp;id=695e89727349d0379daecb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22542-cwe-400-uncontrolled-resource-consu-ef7dbc79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22542%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=critical&amp;id=695e7ee47349d0379daa4383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62327-cwe-522-insufficiently-protected-cr-876f1fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62327%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20HCLSoftware%20DevOps%20Deploy&amp;severity=medium&amp;id=695e7b617349d0379da9360d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22541-cwe-400-uncontrolled-resource-consu-e55d8252</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22541%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC%2060%2F90%2F120&amp;severity=high&amp;id=695e7b617349d0379da93610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extensions-with-900000-downloads-caught-ste-bc653709</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extensions%20With%20900%2C000%20Downloads%20Caught%20Stealing%20AI%20Chats&amp;severity=medium&amp;id=695e77a97349d0379da82ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22540-cwe-400-uncontrolled-resource-consu-2abb1104</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22540%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20EFACEC%20QC60%2F90%2F120&amp;severity=critical&amp;id=695e6d507349d0379da4e26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49335-cwe-918-server-side-request-forgery-ecdae545</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49335%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20minnur%20External%20Media&amp;severity=null&amp;id=695e6d507349d0379da4e26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-totolink-range-extender-allows-de-5ce887e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20Totolink%20Range%20Extender%20Allows%20Device%20Takeover&amp;severity=low&amp;id=695e66157349d0379da2f167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-vulnerability-cvss-100-allows-unauthe-5ad0cf4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Vulnerability%20(CVSS%2010.0)%20Allows%20Unauthenticated%20Attackers%20to%20Take%20Full%20Control&amp;severity=critical&amp;id=695ec4a92efadb62cf80eb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/several-code-execution-flaws-patched-in-veeam-back-d3fbbb64</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Several%20Code%20Execution%20Flaws%20Patched%20in%20Veeam%20Backup%20%26%20Replication&amp;severity=medium&amp;id=695e62917349d0379da25619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15479-ngsurvey-enterprise-364-stored-xss--f860fbd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15479%3A%20NGSurvey%20Enterprise%203.6.4%20stored%20XSS%20via%20survey%20content%20enables%20arbitrary%20JavaScript%20execution%20in%20Data%20Illusion%20%20Zumbrunn%20NGSurvey&amp;severity=medium&amp;id=695e62d67349d0379da25d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-gobruteforcer-ai-generated-server-defaults--fb78f184</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20GoBruteforcer%3A%20AI-Generated%20Server%20Defaults%2C%20Weak%20Passwords%2C%20and%20Crypto-Focused%20Campaigns&amp;severity=medium&amp;id=695e5bc17349d0379da06cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6225-cwe-78-improper-neutralization-of-sp-9604023e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kieback%26Peter%20Neutrino-GLT&amp;severity=medium&amp;id=695e5f407349d0379da193fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47552-cwe-502-deserialization-of-untruste-379cd3b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47552%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=critical&amp;id=695e5bc07349d0379da06c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46494-cwe-79-improper-neutralization-of-i-e942f792</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesgrove%20WidgetKit%20Pro&amp;severity=high&amp;id=695e5bc07349d0379da06c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46434-cwe-862-missing-authorization-in-po-352c9581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46434%3A%20CWE-862%20Missing%20Authorization%20in%20POSIMYTH%20Innovation%20The%20Plus%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=695e54ca7349d0379d8a6f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46256-cwe-35-path-traversal-in-sigmaplugi-a9b59d9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46256%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SigmaPlugin%20Advanced%20Database%20Cleaner%20PRO&amp;severity=medium&amp;id=695e54ca7349d0379d8a6f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-zero-day-in-discontinued-d-link-de-18bfc2bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Zero-Day%20in%20Discontinued%20D-Link%20Devices&amp;severity=critical&amp;id=695e54817349d0379d8a4f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32303-cwe-89-improper-neutralization-of-s-e8e6b759</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32303%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mojoomla%20WPCHURCH&amp;severity=critical&amp;id=695e54ca7349d0379d8a6f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32300-cwe-79-improper-neutralization-of-i-d9ebbb0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=high&amp;id=695e4dab7349d0379d7f2b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31643-cwe-266-incorrect-privilege-assignm-54b5b8f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31643%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Dasinfomedia%20WPCHURCH&amp;severity=high&amp;id=695e4dab7349d0379d7f2b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69080-cwe-98-improper-control-of-filename-5d7b6f22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69080%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JanStudio%20Gecko&amp;severity=high&amp;id=695e4dab7349d0379d7f2b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69081-cwe-98-improper-control-of-filename-68382000</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69081%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Hope&amp;severity=critical&amp;id=695e4c107349d0379d7d5646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69082-cwe-79-improper-neutralization-of-i-7cb8008a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frenify%20Arlo&amp;severity=high&amp;id=695e4c107349d0379d7d5649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69333-cwe-862-missing-authorization-in-cr-8715fc87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69333%3A%20Missing%20Authorization%20in%20Crocoblock%20JetEngine&amp;severity=high&amp;id=695e4c107349d0379d7d564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69344-cwe-862-missing-authorization-in-th-7166ad74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69344%3A%20Missing%20Authorization%20in%20themehunk%20Oneline%20Lite&amp;severity=high&amp;id=695e4c107349d0379d7d564f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-actors-exploiting-complex-routing-scenari-85a18e07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20actors%20exploiting%20complex%20routing%20scenarios%20and%20misconfigured%20spoof%20protections&amp;severity=medium&amp;id=695e48e2a55ed4ed99a6732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/complex-routing-misconfigurations-exploited-for-do-a7e27402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Complex%20Routing%2C%20Misconfigurations%20Exploited%20for%20Domain%20Spoofing%20in%20Phishing%20Attacks&amp;severity=medium&amp;id=695e452ca55ed4ed99a529de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n8n-warns-of-cvss-100-rce-vulnerability-affecting--56ace4da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=n8n%20Warns%20of%20CVSS%2010.0%20RCE%20Vulnerability%20Affecting%20Self-Hosted%20and%20Cloud%20Versions&amp;severity=critical&amp;id=695e5b897349d0379da03fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-future-of-cybersecurity-includes-non-human-emp-e322fd74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Future%20of%20Cybersecurity%20Includes%20Non-Human%20Employees&amp;severity=medium&amp;id=695e5b897349d0379da03fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/veeam-patches-critical-rce-vulnerability-with-cvss-e6b200e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Veeam%20Patches%20Critical%20RCE%20Vulnerability%20with%20CVSS%209.0%20in%20Backup%20%26%20Replication&amp;severity=critical&amp;id=695e5b897349d0379da03faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-misconfigured-email-routing-can-en-234c9c8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20Misconfigured%20Email%20Routing%20Can%20Enable%20Internal%20Domain%20Phishing&amp;severity=medium&amp;id=695e5b897349d0379da03fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68637-cwe-297-improper-validation-of-cert-54595ab4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68637%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Uniffle&amp;severity=critical&amp;id=695e2cc2a55ed4ed999bf8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-campaign-with-qr-codes-rendered-using-a-712d9617</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table%2C%20(Wed%2C%20Jan%207th)&amp;severity=medium&amp;id=695e290ca55ed4ed999b4180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13722-cwe-862-missing-authorization-in-te-4e0569ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13722%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=695e4c107349d0379d7d5664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14057-cwe-79-improper-neutralization-of-i-e0cbca8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tugbucket%20Multi-column%20Tag%20Map&amp;severity=medium&amp;id=695e4c117349d0379d7d56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14077-cwe-352-cross-site-request-forgery--993e8e7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14077%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20openchamp%20Simcast&amp;severity=medium&amp;id=695e4c137349d0379d7d5789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15058-cwe-80-improper-neutralization-of-s-684b5e13</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15058%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20spwebguy%20Responsive%20Pricing%20Table&amp;severity=medium&amp;id=695e4c147349d0379d7d581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14114-cwe-79-improper-neutralization-of-i-03ca8042</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14114%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrisblackwell%201180px%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d57a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14460-cwe-862-missing-authorization-in-en-1f2470ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14460%3A%20CWE-862%20Missing%20Authorization%20in%20enartia%20Piraeus%20Bank%20WooCommerce%20Payment%20Gateway&amp;severity=medium&amp;id=695e4c147349d0379d7d5801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14122-cwe-79-improper-neutralization-of-i-b24e104e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anybodesign%20AD%20Sliding%20FAQ&amp;severity=medium&amp;id=695e4c137349d0379d7d57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13974-cwe-79-improper-neutralization-of-i-e3145fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Email%20Customizer%20for%20WooCommerce%20%7C%20Drag%20and%20Drop%20Email%20Templates%20Builder&amp;severity=medium&amp;id=695e4c117349d0379d7d5696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14121-cwe-79-improper-neutralization-of-i-f07bdc99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samikeijonen%20EDD%20Download%20Info&amp;severity=medium&amp;id=695e4c137349d0379d7d57ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14147-cwe-79-improper-neutralization-of-i-14e5718c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corsonr%20Easy%20GitHub%20Gist%20Shortcodes&amp;severity=medium&amp;id=695e4c147349d0379d7d57f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13841-cwe-79-improper-neutralization-of-i-6a08a83f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clevelandwebdeveloper%20Smart%20App%20Banners&amp;severity=medium&amp;id=695e4c117349d0379d7d567d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13801-cwe-22-improper-limitation-of-a-pat-0c4d1947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13801%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20yocoadmin%20Yoco%20Payments&amp;severity=high&amp;id=695e4c107349d0379d7d5668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14070-cwe-862-missing-authorization-in-xf-6996e1d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14070%3A%20CWE-862%20Missing%20Authorization%20in%20xfinitysoft%20Reviewify%20%E2%80%94%20Review%20Discounts%20%26%20Photo%2FVideo%20Reviews%20for%20WooCommerce&amp;severity=high&amp;id=695e4c137349d0379d7d5780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13990-cwe-352-cross-site-request-forgery--f7c6b6b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mamurjor%20Mamurjor%20Employee%20Info&amp;severity=medium&amp;id=695e4c117349d0379d7d569b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13419-cwe-862-missing-authorization-in-ah-6529d8c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13419%3A%20CWE-862%20Missing%20Authorization%20in%20aharonyan%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor%20%E2%80%93%20WP%20Front%20User%20Submit&amp;severity=medium&amp;id=695e4c107349d0379d7d5656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14465-cwe-352-cross-site-request-forgery--85ee642c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14465%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20praveentamil%20Sticky%20Action%20Buttons&amp;severity=medium&amp;id=695e4c147349d0379d7d5810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14144-cwe-79-improper-neutralization-of-i-6420e3c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mstoic%20Mstoic%20Shortcodes&amp;severity=medium&amp;id=695e4c147349d0379d7d57e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14131-cwe-79-improper-neutralization-of-i-8e3976b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damienoh%20WP%20Widget%20Changer&amp;severity=medium&amp;id=695e4c147349d0379d7d57e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14453-cwe-79-improper-neutralization-of-i-8bec3ccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruhul080%20My%20Album%20Gallery&amp;severity=medium&amp;id=695e4c147349d0379d7d57fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14113-cwe-79-improper-neutralization-of-i-588286bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viitorcloudvc%20Viitor%20Button%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14112-cwe-79-improper-neutralization-of-i-24efc4e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mattiaspkallio%20Snillrik%20Restaurant&amp;severity=medium&amp;id=695e4c137349d0379d7d579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13418-cwe-79-improper-neutralization-of-i-e82a2746</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13418%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spwebguy%20Responsive%20Pricing%20Table&amp;severity=medium&amp;id=695e4c107349d0379d7d5652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14626-cwe-79-improper-neutralization-of-i-a822f052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20www15to%20QR%20Code%20for%20WooCommerce%20order%20emails%2C%20PDF%20invoices%2C%20packing%20slips&amp;severity=medium&amp;id=695e4c147349d0379d7d5814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14130-cwe-79-improper-neutralization-of-i-eb7c6dd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuvixsystem%20Post%20Like%20Dislike&amp;severity=medium&amp;id=695e4c147349d0379d7d57dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13849-cwe-79-improper-neutralization-of-i-24ef5430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matiasanca%20Cool%20YT%20Player&amp;severity=medium&amp;id=695e4c117349d0379d7d568c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13887-cwe-79-improper-neutralization-of-i-92be4de5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wisdmlabs%20AI%20BotKit%20%E2%80%93%20AI%20Chatbot%20%26%20Live%20Support%20for%20WordPress%20(No-Code)&amp;severity=medium&amp;id=695e4c117349d0379d7d5691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14145-cwe-79-improper-neutralization-of-i-87c77c4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14145%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20djrowling%20Niche%20Hero%20%7C%20Beautifully-designed%20blocks%20in%20seconds&amp;severity=medium&amp;id=695e4c147349d0379d7d57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14352-cwe-863-incorrect-authorization-in--be940e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14352%3A%20CWE-863%20Incorrect%20Authorization%20in%20nahian91%20Awesome%20Hotel%20Booking&amp;severity=medium&amp;id=695e4c147349d0379d7d57f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14110-cwe-79-improper-neutralization-of-i-f7464f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pichel%20WP%20Js%20List%20Pages%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d5793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13848-cwe-79-improper-neutralization-of-i-91b471de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergiotoca%20STM%20Gallery%201.9&amp;severity=medium&amp;id=695e4c117349d0379d7d5687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14118-cwe-79-improper-neutralization-of-i-2f923a99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20callumalden%20Starred%20Review&amp;severity=medium&amp;id=695e4c137349d0379d7d57a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14028-cwe-79-improper-neutralization-of-i-354cf620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bruterdregz%20Contact%20Us%20Simple%20Form&amp;severity=medium&amp;id=695e4c117349d0379d7d56a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14796-cwe-79-improper-neutralization-of-i-3cadd7e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruhul080%20My%20Album%20Gallery&amp;severity=medium&amp;id=695e4c147349d0379d7d5819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14128-cwe-79-improper-neutralization-of-i-bd3a2d49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mitchoyoshitaka%20Stumble!%20for%20WordPress&amp;severity=medium&amp;id=695e4c147349d0379d7d57d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14127-cwe-79-improper-neutralization-of-i-867a4f66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpcorso%20Testimonial%20Master&amp;severity=medium&amp;id=695e4c147349d0379d7d57d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13667-cwe-79-improper-neutralization-of-i-2a626003</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tomiup%20WP%20Recipe%20Manager&amp;severity=medium&amp;id=695e4c107349d0379d7d565a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14109-cwe-79-improper-neutralization-of-i-ba86c581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14109%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ahecht%20AH%20Shortcodes&amp;severity=medium&amp;id=695e4c137349d0379d7d578e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13694-cwe-348-use-of-less-trusted-source--48900554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13694%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20aaextensions%20AA%20Block%20country&amp;severity=medium&amp;id=695e4c107349d0379d7d565f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14053-cwe-79-improper-neutralization-of-i-d31b2fa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jseto%20Travel%20Bucket%20List%20%E2%80%93%20Wish%20To%20Go&amp;severity=medium&amp;id=695e4c117349d0379d7d56ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13847-cwe-79-improper-neutralization-of-i-924ce35c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13847%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidangel%20PhotoFade&amp;severity=medium&amp;id=695e4c117349d0379d7d5682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15018-cwe-639-authorization-bypass-throug-608b91ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15018%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20djanym%20Optional%20Email&amp;severity=critical&amp;id=695e1b30a55ed4ed998cb6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13521-cwe-352-cross-site-request-forgery--c10ab985</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13521%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fulippo%20WP%20Status%20Notifier&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15158-cwe-434-unrestricted-upload-of-file-09cb5665</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15158%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20eastsidecode%20WP%20Enable%20WebP&amp;severity=high&amp;id=695e1b30a55ed4ed998cb6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13497-cwe-79-improper-neutralization-of-i-444d08b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zanderz%20Recras&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13496-cwe-862-missing-authorization-in-mo-d5f2da90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13496%3A%20CWE-862%20Missing%20Authorization%20in%20moosend%20Moosend%20Landing%20Pages&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13520-cwe-352-cross-site-request-forgery--c72d1d69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13520%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mtcaptcha%20MTCaptcha%20WordPress%20Plugin&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13493-cwe-862-missing-authorization-in-we-8d11fb91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13493%3A%20CWE-862%20Missing%20Authorization%20in%20webrndexperts%20Latest%20Registered%20Users&amp;severity=high&amp;id=695e1b2fa55ed4ed998cb638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13527-cwe-352-cross-site-request-forgery--3518c67f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13527%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anwerashif%20xShare&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12958-cwe-285-improper-authorization-in-r-d4c90f9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12958%3A%20CWE-285%20Improper%20Authorization%20in%20rankology%20Rankology%20SEO%20and%20Analytics%20Tool&amp;severity=low&amp;id=695e1b2fa55ed4ed998cb634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13529-cwe-862-missing-authorization-in-co-72df2e41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13529%3A%20CWE-862%20Missing%20Authorization%20in%20codeclouds%20Unify&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14999-cwe-352-cross-site-request-forgery--366d1c1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14999%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kentothemes%20Latest%20Tabs&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12540-cwe-200-exposure-of-sensitive-infor-71dc33f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12540%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sharethis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12030-cwe-639-authorization-bypass-throug-d6bdac07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12030%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20airesvsg%20ACF%20to%20REST%20API&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13519-cwe-352-cross-site-request-forgery--85353855</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13519%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smjrifle%20SVG%20Map%20Plugin&amp;severity=medium&amp;id=695e1b2fa55ed4ed998cb649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13531-cwe-79-improper-neutralization-of-i-964fbc77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13531%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hayyatapps%20Stylish%20Order%20Form%20Builder&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15000-cwe-79-improper-neutralization-of-i-0d095431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tfrommen%20Page%20Keys&amp;severity=medium&amp;id=695e1b30a55ed4ed998cb69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11877-cwe-862-missing-authorization-in-so-268e505f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11877%3A%20CWE-862%20Missing%20Authorization%20in%20solwininfotech%20User%20Activity%20Log&amp;severity=high&amp;id=695e1b2fa55ed4ed998cb627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0980-vulnerability-in-nokia-sr-linux-ed11aff0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0980%3A%20Vulnerability%20in%20Nokia%20SR%20Linux&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31964-cwe-200-exposure-of-sensitive-infor-34926e9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31964%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e0d1ea55ed4ed99880feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14792-cwe-80-improper-neutralization-of-s-ae411024</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14792%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20audrasjb%20Key%20Figures&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12449-cwe-862-missing-authorization-in-ko-902abd76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12449%3A%20CWE-862%20Missing%20Authorization%20in%20kodezen%20aBlocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks%2C%20User%20Dashboard%20Builder%2C%20Popup%20Builder%2C%20Form%20Builder%20%26%20GSAP%20Animation%20Builder&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13369-cwe-79-improper-neutralization-of-i-e09e33c6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20premmerce%20Premmerce%20WooCommerce%20Customers%20Manager&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14802-cwe-639-authorization-bypass-throug-506830ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14802%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=695e0d1ea55ed4ed99880fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31963-cwe-306-missing-authentication-for--11fde0e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31963%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e099ba55ed4ed9987094e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31962-cwe-613-insufficient-session-expira-dd8cbfbe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31962%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCLSoftware%20BigFix%20IVR&amp;severity=low&amp;id=695e0617a55ed4ed9985b33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14867-cwe-22-improper-limitation-of-a-pat-8013b993</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14867%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20liangshao%20Flashcard%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=695e0293a55ed4ed9984d542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14842-cwe-434-unrestricted-upload-of-file-5ab02e7e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14842%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=695e0293a55ed4ed9984d532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0656-cwe-862-missing-authorization-in-ipa-8561cb90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0656%3A%20CWE-862%20Missing%20Authorization%20in%20ipaymu%20iPaymu%20Payment%20Gateway%20for%20WooCommerce&amp;severity=high&amp;id=695e0294a55ed4ed9984d573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13371-cwe-200-exposure-of-sensitive-infor-887a551f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13371%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20moneyspace%20Money%20Space&amp;severity=high&amp;id=695e0293a55ed4ed9984d522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14845-cwe-352-cross-site-request-forgery--47a4521d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14845%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nsthemes%20NS%20Ie%20Compatibility%20Fixer&amp;severity=medium&amp;id=695e0293a55ed4ed9984d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14888-cwe-79-improper-neutralization-of-i-851eb1b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anjan011%20Simple%20User%20Meta%20Editor&amp;severity=medium&amp;id=695e0293a55ed4ed9984d553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13657-cwe-352-cross-site-request-forgery--67c6a973</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13657%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20helpdeskcom%20HelpDesk%20contact%20form%20plugin&amp;severity=medium&amp;id=695e0293a55ed4ed9984d529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14887-cwe-79-improper-neutralization-of-i-3ce685be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcommerz%20twinklesmtp%20%E2%80%93%20Email%20Service%20Provider%20For%20WordPress&amp;severity=medium&amp;id=695e0293a55ed4ed9984d54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14370-cwe-862-missing-authorization-in-me-37f2f4c0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14370%3A%20CWE-862%20Missing%20Authorization%20in%20metodiew%20Quote%20Comments&amp;severity=medium&amp;id=695e0293a55ed4ed9984d52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14875-cwe-79-improper-neutralization-of-i-e20c283d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hblpay%20HBLPAY%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=695e0293a55ed4ed9984d546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14901-cwe-862-missing-authorization-in-bi-5ae1d686</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14901%3A%20CWE-862%20Missing%20Authorization%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%20Form%20%26%20Payment%20Form%20builder&amp;severity=medium&amp;id=695e0293a55ed4ed9984d557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14904-cwe-352-cross-site-request-forgery--5e97b248</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14904%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anilankola%20Newsletter%20Email%20Subscribe&amp;severity=medium&amp;id=695e0294a55ed4ed9984d56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14804-cwe-73-external-control-of-file-nam-ac2e2a67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14804%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Frontend%20File%20Manager%20Plugin&amp;severity=high&amp;id=695dfb8aa55ed4ed9983420a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14719-cwe-89-sql-injection-in-relevanssi-9a223d0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14719%3A%20CWE-89%20SQL%20Injection%20in%20Relevanssi&amp;severity=medium&amp;id=695dfb8aa55ed4ed99834207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14835-cwe-80-improper-neutralization-of-s-524211cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14835%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=high&amp;id=695df0fea55ed4ed9968749d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15474-cwe-770-allocation-of-resources-wit-3cd7a6ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15474%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20AuntyFey%20AuntyFey%20Smart%20Combination%20Lock&amp;severity=medium&amp;id=695de67da55ed4ed995516f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14468-cwe-352-cross-site-request-forgery--b6163dc0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14468%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=695de67ca55ed4ed995516f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-attacks-exploiting-critical-rce-vulnerabil-cfdd79da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20Attacks%20Exploiting%20Critical%20RCE%20Vulnerability%20in%20Legacy%20D-Link%20DSL%20Routers&amp;severity=critical&amp;id=695df29ca55ed4ed997953c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0650-cwe-306-missing-authentication-for-c-19273490</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0650%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20OpenFlagr%20Flagr&amp;severity=critical&amp;id=695de67da55ed4ed995516fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9611-cwe-749-exposed-dangerous-method-or--345ee18d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9611%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Microsoft%20Playwright&amp;severity=high&amp;id=695de3cb873865b86365f414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14059-cwe-73-external-control-of-file-nam-7f23642d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14059%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20roxnor%20EmailKit%20%E2%80%93%20Email%20Customizer%20for%20WooCommerce%20%26%20WP&amp;severity=medium&amp;id=695dd93f873865b8635a453f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14891-cwe-79-improper-neutralization-of-i-327f1b29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=695dd93f873865b8635a4544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-20893-origin-validation-error-in-fujitsu--bc6bdb8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-20893%3A%20Origin%20validation%20error%20in%20Fujitsu%20Client%20Computing%20Limited%20Fujitsu%20Security%20Solution%20AuthConductor%20Client%20Basic%20V2&amp;severity=high&amp;id=695dd93f873865b8635a454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12648-cwe-552-files-or-directories-access-cb7dd16f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12648%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=695dc7b5873865b863116d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14631-cwe-476-null-pointer-dereference-in-f282dd7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14631%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TP-Link%20Systems%20Inc.%20Archer%20BE400&amp;severity=high&amp;id=695db4a0ee4c93a4aad5f9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0649-server-side-request-forgery-in-invoi-9ad906ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0649%3A%20Server-Side%20Request%20Forgery%20in%20invoiceninja&amp;severity=medium&amp;id=695dad98ee4c93a4aacc6451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14020-improperly-controlled-modification--f735b51d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14020%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20in%20carboneio%20carbone&amp;severity=low&amp;id=695da690ee4c93a4aaaf9618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-07-ddc7a0e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-07&amp;severity=medium&amp;id=695ef5b307b8a419a7735a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61492-na-50a9abe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61492%3A%20n%2Fa&amp;severity=critical&amp;id=695ea20c7349d0379db7dc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67366-na-b149ee6e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67366%3A%20n%2Fa&amp;severity=high&amp;id=695e93fd7349d0379db278a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66686-na-6458d2b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66686%3A%20n%2Fa&amp;severity=medium&amp;id=695e93fd7349d0379db278a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61489-na-41ab4a6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61489%3A%20n%2Fa&amp;severity=medium&amp;id=695e93fd7349d0379db2789c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67364-na-9ea7ab90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67364%3A%20n%2Fa&amp;severity=high&amp;id=695e90787349d0379db110a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66786-na-f9fe9fa5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66786%3A%20n%2Fa&amp;severity=high&amp;id=695e8cf77349d0379db03200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65805-na-671e9204</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65805%3A%20n%2Fa&amp;severity=high&amp;id=695e8cf77349d0379db031fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66837-na-42137d50</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66837%3A%20n%2Fa&amp;severity=medium&amp;id=695e89727349d0379daecb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66838-na-93995104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66838%3A%20n%2Fa&amp;severity=medium&amp;id=695e85eb7349d0379dadb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0628-insufficient-policy-enforcement-in-g-6d67a575</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0628%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=high&amp;id=695da30cee4c93a4aaa68c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0643-unrestricted-upload-in-projectworlds-08c9d342</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0643%3A%20Unrestricted%20Upload%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=695d9de7ee4c93a4aa9fb410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47396-cwe-415-double-free-in-qualcomm-inc-579002be</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47396%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93ce65deeab1b95d81d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47395-cwe-126-buffer-over-read-in-qualcom-4cd348e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47395%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93ce65deeab1b95d81ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47394-cwe-120-buffer-copy-without-checkin-242ed732</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47394%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47393-cwe-129-improper-validation-of-arra-9db5fa8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47393%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47388-cwe-120-buffer-copy-without-checkin-aec82a55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47388%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47380-cwe-822-untrusted-pointer-dereferen-ec05184d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47380%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47369-cwe-200-information-exposure-in-qua-6cd0b00e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47369%3A%20CWE-200%20Information%20Exposure%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cd65deeab1b95d81b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47356-cwe-415-double-free-in-qualcomm-inc-3f7209f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47356%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47348-cwe-457-use-of-uninitialized-variab-74ffcb5f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47348%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47346-cwe-787-out-of-bounds-write-in-qual-2ddbe3f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47346%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47345-cwe-323-reusing-a-nonce-key-pair-in-441b2f5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47345%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cd65deeab1b95d81a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47344-cwe-367-time-of-check-time-of-use-t-c9eb249f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47344%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cd65deeab1b95d81a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47343-cwe-822-untrusted-pointer-dereferen-c381ff30</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47343%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cc65deeab1b95d816f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47339-cwe-416-use-after-free-in-qualcomm--abf87fb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47339%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=695d93cc65deeab1b95d816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47337-cwe-416-use-after-free-in-qualcomm--3e476817</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47337%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47336-cwe-416-use-after-free-in-qualcomm--38bba7b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47336%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47335-cwe-120-buffer-copy-without-checkin-babe18dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47335%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47334-cwe-120-buffer-copy-without-checkin-3898b314</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47334%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47333-cwe-416-use-after-free-in-qualcomm--f5108cab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47333%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d815d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47332-cwe-367-time-of-check-time-of-use-t-89bf8d55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47332%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d815a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47331-cwe-126-buffer-over-read-in-qualcom-5c35ae39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47331%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47330-cwe-126-buffer-over-read-in-qualcom-1f7487a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47330%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=695d93cc65deeab1b95d8154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0642-cross-site-scripting-in-projectworld-5c338b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0642%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20House%20Rental%20and%20Property%20Listing&amp;severity=medium&amp;id=695d904765deeab1b948281c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11235-cwe-620-unverified-password-change--9232b481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11235%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Progress%20MOVEit%20Transfer&amp;severity=low&amp;id=695d8cc265deeab1b941f6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15472-os-command-injection-in-trendnet-te-33c003d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15472%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-811DRU&amp;severity=high&amp;id=695d893f65deeab1b93cbef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14625-cwe-427-uncontrolled-search-path-el-a32ce309</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14625%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d85c665deeab1b937e24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14614-cwe-377-insecure-temporary-file-in--582fdc90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14614%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d85c665deeab1b937e249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15471-os-command-injection-in-trendnet-te-ae0e5fc4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15471%3A%20OS%20Command%20Injection%20in%20TRENDnet%20TEW-713RE&amp;severity=critical&amp;id=695d818706d60d7483a4bf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14599-cwe-427-uncontrolled-search-path-el-e207da72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14599%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=695d818706d60d7483a4bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14612-cwe-377-insecure-temporary-file-in--7e142a3a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14612%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d818706d60d7483a4bf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14605-cwe-427-uncontrolled-search-path-el-43df8804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14605%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d818706d60d7483a4bf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31642-cwe-79-improper-neutralization-of-i-e1a634d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dasinfomedia%20WPCHURCH&amp;severity=high&amp;id=695d7e0406d60d7483a3d746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31051-cwe-497-exposure-of-sensitive-syste-f5818644</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31051%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20EngoTheme%20Plant%20-%20Gardening%20%26%20Houseplants%20WordPress%20Theme&amp;severity=medium&amp;id=695d7e0406d60d7483a3d743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14596-cwe-427-uncontrolled-search-path-el-b831b1dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14596%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=695d7e0406d60d7483a3d740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30996-cwe-434-unrestricted-upload-of-file-87255422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30996%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themify%20Themify%20Sidepane%20WordPress%20Theme&amp;severity=critical&amp;id=695d7a7f06d60d7483a3454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13744-cwe-79-improper-neutralization-of-i-0ec36f22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13744%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=695d76fb06d60d7483a21fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30631-cwe-79-improper-neutralization-of-i-4e8a749d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA-Team%20Woocommerce%20Sales%20Funnel%20Builder&amp;severity=high&amp;id=695d737806d60d7483a10a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29004-cwe-266-incorrect-privilege-assignm-c7e68fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29004%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20AA-Team%20Premium%20Age%20Verification%20%2F%20Restriction%20for%20WordPress&amp;severity=high&amp;id=695d737806d60d7483a10a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21492-cwe-252-unchecked-return-value-in-i-7e39f554</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21492%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d737806d60d7483a10a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7048-cwe-805-in-arista-networks-eos-fbb1d89d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7048%3A%20CWE-805%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21491-cwe-122-heap-based-buffer-overflow--8b0a3ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21491%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d6079a7c70f178f8eabee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21490-cwe-122-heap-based-buffer-overflow--a486e590</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21490%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d6079a7c70f178f8eabe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0641-command-injection-in-totolink-wa300-4c595f84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0641%3A%20Command%20Injection%20in%20TOTOLINK%20WA300&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21494-cwe-122-heap-based-buffer-overflow--8ca155ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21494%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d63fda7c70f178f8fbb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15382-cwe-125-out-of-bounds-read-in-wolfs-7c756e7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15382%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20wolfSSL%20wolfSSH&amp;severity=medium&amp;id=695d4b63a7c70f178f7611fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32304-cwe-98-improper-control-of-filename-977da061</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32304%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mojoomla%20WPCHURCH&amp;severity=high&amp;id=695d4b63a7c70f178f761203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14942-cwe-287-improper-authentication-in--ede5eb61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14942%3A%20CWE-287%20Improper%20Authentication%20in%20wolfSSL%20wolfSSH&amp;severity=critical&amp;id=695d4b63a7c70f178f761200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-stealing-chatgpt-and--4521f6c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Stealing%20ChatGPT%20and%20DeepSeek%20Chats%20from%20900%2C000%20Users&amp;severity=low&amp;id=695d4d51a7c70f178f8acfc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39477-cwe-862-missing-authorization-in-sf-a67962a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39477%3A%20CWE-862%20Missing%20Authorization%20in%20Sfwebservice%20InWave%20Jobs&amp;severity=critical&amp;id=695d40dfa7c70f178f66a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31088-cwe-79-improper-neutralization-of-i-8bd58e51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WPShop.ru%20AdsPlace&apos;r%20%E2%80%93%20Ad%20Manager%2C%20Inserter%2C%20AdSense%20Ads&amp;severity=medium&amp;id=695d4299a7c70f178f68ea96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30547-cwe-79-improper-neutralization-of-i-529bdb61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shazdeh%20Header%20Image%20Slider&amp;severity=high&amp;id=695d4299a7c70f178f68ea93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47553-cwe-502-deserialization-of-untruste-d51e5f94</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47553%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digital%20zoom%20studio%20DZS%20Video%20Gallery&amp;severity=high&amp;id=695d4299a7c70f178f68ea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69083-cwe-98-improper-control-of-filename-0dd666fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69083%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Frapp%C3%A9&amp;severity=critical&amp;id=695d4299a7c70f178f68ea9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69364-missing-authorization-in-cloudways--98b6513a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69364%3A%20Missing%20Authorization%20in%20Cloudways%20Breeze&amp;severity=medium&amp;id=695d3e3a326bcb029a44a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69363-missing-authorization-in-cyberchimp-5d2dc9c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69363%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695d3e3a326bcb029a44a09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69362-improper-neutralization-of-input-du-bc5ff078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20UiChemy&amp;severity=medium&amp;id=695d3e3a326bcb029a44a097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69361-missing-authorization-in-publishpre-2bbbf451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69361%3A%20Missing%20Authorization%20in%20PublishPress%20Post%20Expirator&amp;severity=medium&amp;id=695d3e3a326bcb029a44a094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69360-improper-neutralization-of-input-du-668f3930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=medium&amp;id=695d3e3a326bcb029a44a091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69359-missing-authorization-in-wpfunnels--49f7f64c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69359%3A%20Missing%20Authorization%20in%20WPFunnels%20Creator%20LMS&amp;severity=medium&amp;id=695d3e3a326bcb029a44a08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69357-improper-neutralization-of-input-du-c62e4e0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=medium&amp;id=695d3e39326bcb029a44a069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69356-improper-control-of-filename-for-in-d72f23c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69356%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=high&amp;id=695d3e39326bcb029a44a066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69354-missing-authorization-in-bbr-plugin-809f608c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69354%3A%20Missing%20Authorization%20in%20BBR%20Plugins%20Better%20Business%20Reviews&amp;severity=medium&amp;id=695d3e39326bcb029a44a063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69352-missing-authorization-in-stellarwp--55ee216b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69352%3A%20Missing%20Authorization%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=medium&amp;id=695d3e39326bcb029a44a060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69351-improper-neutralization-of-special--8ba1081c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69351%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=medium&amp;id=695d3e39326bcb029a44a05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69350-improper-neutralization-of-input-du-a07201da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Accordion&amp;severity=medium&amp;id=695d3e39326bcb029a44a05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69349-missing-authorization-in-fahad-mahm-8a97ce50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69349%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20RSS%20Feed%20Widget&amp;severity=medium&amp;id=695d3e39326bcb029a44a057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69348-missing-authorization-in-coolhappy--5da3f66a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69348%3A%20Missing%20Authorization%20in%20CoolHappy%20The%20Events%20Calendar%20Countdown%20Addon&amp;severity=medium&amp;id=695d3e39326bcb029a44a054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69346-missing-authorization-in-wpcenter-a-e1eb4fd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69346%3A%20Missing%20Authorization%20in%20WPCenter%20AffiliateX&amp;severity=medium&amp;id=695d3e39326bcb029a44a051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69345-missing-authorization-in-boldgrid-p-f8421357</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69345%3A%20Missing%20Authorization%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=medium&amp;id=695d3e39326bcb029a44a04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69342-improper-control-of-filename-for-in-c625ad3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69342%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20VanKarWai%20Calafate&amp;severity=high&amp;id=695d3e39326bcb029a44a03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69341-missing-authorization-in-buddhathem-92fe0030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69341%3A%20Missing%20Authorization%20in%20BuddhaThemes%20WeDesignTech%20Ultimate%20Booking%20Addon&amp;severity=medium&amp;id=695d3e39326bcb029a44a03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69336-missing-authorization-in-bdthemes-u-ccfe8362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69336%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=695d3e39326bcb029a44a037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69335-improper-neutralization-of-input-du-4b510941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Team%20Showcase&amp;severity=medium&amp;id=695d3e39326bcb029a44a034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69334-improper-neutralization-of-input-du-88efc39c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=695d3e39326bcb029a44a031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69331-missing-authorization-in-jeroen-sch-c66ba793</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69331%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=695d3e39326bcb029a44a02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69327-missing-authorization-in-magepeople-f1e72b5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69327%3A%20Missing%20Authorization%20in%20magepeopleteam%20Car%20Rental%20Manager&amp;severity=medium&amp;id=695d3e39326bcb029a44a02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69084-cwe-79-improper-neutralization-of-i-dd60f056</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69084%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=high&amp;id=695d3e39326bcb029a44a022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69085-cwe-79-improper-neutralization-of-i-315a15b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20JobBank&amp;severity=high&amp;id=695d3e39326bcb029a44a025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69086-cwe-98-improper-control-of-filename-069ab445</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69086%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20Issabella&amp;severity=critical&amp;id=695d3e39326bcb029a44a028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36589-cwe-611-improper-restriction-of-xml-dac542b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36589%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Unisphere%20for%20PowerMax&amp;severity=high&amp;id=695d3ab2326bcb029a439109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63082-cwe-79-improper-neutralization-of-i-0f43ea4c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=695d3ab2326bcb029a439110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63083-cwe-79-improper-neutralization-of-i-3e72fd6a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=695d3ab2326bcb029a439113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-firmware-flaw-exposes-totolink-ex200-to--76f46dab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Firmware%20Flaw%20Exposes%20TOTOLINK%20EX200%20to%20Full%20Remote%20Device%20Takeover&amp;severity=low&amp;id=695d4d51a7c70f178f8acfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0640-buffer-overflow-in-tenda-ac23-5438cf9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0640%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695d2ca3326bcb029a2b303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14979-cwe-732-incorrect-permission-assign-c5b90371</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14979%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20AirVPN%20Eddie&amp;severity=high&amp;id=695d3027326bcb029a4049de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46696-cwe-250-execution-with-unnecessary--eac32f54</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46696%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Secure%20Connect%20Gateway%20(SCG)%20Appliance&amp;severity=medium&amp;id=695d291f326bcb029a24f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14026-cwe-1104-use-of-unmaintained-third--c8a0f57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14026%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third-Party%20Components%20in%20Forcepoint%20Forcepoint%20One%20Endpoint%20(F1E)&amp;severity=high&amp;id=695d222d326bcb029a1be3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21493-cwe-188-reliance-on-datamemory-layo-991c7c73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21493%3A%20CWE-188%3A%20Reliance%20on%20Data%2FMemory%20Layout%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d1b6b769e869ac5e3160b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-trap-scattered-lapsus-hunters-in-honey-c862e0a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Trap%20Scattered%20Lapsus%24%20Hunters%20in%20Honeypot&amp;severity=medium&amp;id=695d17b4769e869ac5da7742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21489-cwe-125-out-of-bounds-read-in-inter-6e33c750</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21489%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d17f6769e869ac5db8e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21488-cwe-122-heap-based-buffer-overflow--56374fc4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21488%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695d17f6769e869ac5db8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-dolby-vulnerability-patched-in-android-c7b4bf7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Dolby%20Vulnerability%20Patched%20in%20Android&amp;severity=critical&amp;id=695d1430769e869ac5d57dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-clickfix-campaign-targeting-hospital-3206c22c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20ClickFix%20Campaign%20Targeting%20Hospitality%20Sector&amp;severity=medium&amp;id=695d0ffb3839e441751b973e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dozens-of-major-data-breaches-linked-to-single-thr-14f7ef26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dozens%20of%20Major%20Data%20Breaches%20Linked%20to%20Single%20Threat%20Actor&amp;severity=medium&amp;id=695d01eb3839e44175171c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-booking-emails-redirect-hotel-staff-to-fake-b-695fcbff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Booking%20Emails%20Redirect%20Hotel%20Staff%20to%20Fake%20BSoD%20Pages%20Delivering%20DCRat&amp;severity=medium&amp;id=695d1e21769e869ac5f7ef42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-identity-dark-matter-d6425cdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20Identity%20Dark%20Matter%3F&amp;severity=low&amp;id=695d1e21769e869ac5f7ef45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-forks-recommend-missing-extensions-creatin-8f09575d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20Forks%20Recommend%20Missing%20Extensions%2C%20Creating%20Supply%20Chain%20Risk%20in%20Open%20VSX&amp;severity=medium&amp;id=695d1e21769e869ac5f7ef48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nordvpn-denies-breach-after-hacker-leaks-data-e492eb55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NordVPN%20Denies%20Breach%20After%20Hacker%20Leaks%20Data&amp;severity=medium&amp;id=695cf3db3839e4417511a33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9318-cwe-89-improper-neutralization-of-sp-06a5609d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9318%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cd7ee3839e4417504db30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9637-cwe-862-missing-authorization-in-exp-acee29b8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9637%3A%20CWE-862%20Missing%20Authorization%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cd7ee3839e4417504db34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14552-cwe-79-improper-neutralization-of-i-ac928f33</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20buddydev%20MediaPress&amp;severity=medium&amp;id=695cd7ee3839e4417504db2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5919-cwe-862-missing-authorization-in-arr-a46843a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5919%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20Appointment%20Booking%20Calendar%20%E2%80%93%20WP%20Timetics%20Booking%20Plugin&amp;severity=medium&amp;id=695cc9de3839e44175ff5dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13964-cwe-862-missing-authorization-in-th-f315da6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13964%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=695cc9de3839e44175ff5dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9294-cwe-285-improper-authorization-in-ex-36eaa5a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9294%3A%20CWE-285%20Improper%20Authorization%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=medium&amp;id=695cc9de3839e44175ff5dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13766-cwe-862-missing-authorization-in-st-11a20e42</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13766%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=695cc9de3839e44175ff5dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13812-cwe-862-missing-authorization-in-ru-a72e00aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13812%3A%20CWE-862%20Missing%20Authorization%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=medium&amp;id=695cbbce3839e44175f9f00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12067-cwe-79-improper-neutralization-of-i-241d7a4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonua%20Table%20Field%20Add-on%20for%20ACF%20and%20SCF&amp;severity=medium&amp;id=695cbbce3839e44175f9f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14371-cwe-862-missing-authorization-in-st-6cde3bb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14371%3A%20CWE-862%20Missing%20Authorization%20in%20stevejburge%20TaxoPress%3A%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger&amp;severity=medium&amp;id=695cbbce3839e44175f9f012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4776-cwe-79-improper-neutralization-of-in-ee2f4cf6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Phlox&amp;severity=medium&amp;id=695cb1423839e44175f61ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13215-cwe-200-exposure-of-sensitive-infor-802342ad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13215%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=695cb1423839e44175f61ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21411-authentication-bypass-using-an-alte-e5985135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21411%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Plat&apos;Home%20Co.%2CLtd.%20OpenBlocks%20IoT%20DX1%20(FW5.0.x)&amp;severity=high&amp;id=695cb1423839e44175f61fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-n8n-vulnerability-99-cvss-lets-authenticated-u-86301403</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20n8n%20Vulnerability%20(9.9%20CVSS)%20Lets%20Authenticated%20Users%20Execute%20System%20Commands&amp;severity=critical&amp;id=695c9bf53839e44175edad18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14997-cwe-22-improper-limitation-of-a-pat-7765da9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14997%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20buddydev%20BuddyPress%20Xprofile%20Custom%20Field%20Types&amp;severity=high&amp;id=695c95223839e44175ebc5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14120-cwe-79-improper-neutralization-of-i-90a28dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bww%20URL%20Image%20Importer&amp;severity=medium&amp;id=695c95223839e44175ebc598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14438-cwe-918-server-side-request-forgery-61e10ce7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14438%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=medium&amp;id=695c95223839e44175ebc59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14441-cwe-862-missing-authorization-in-ro-e2155daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14441%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=medium&amp;id=695c95223839e44175ebc5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15001-cwe-639-authorization-bypass-throug-f4017150</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15001%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20fsylum%20FS%20Registration%20Password&amp;severity=critical&amp;id=695c95223839e44175ebc5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14996-cwe-639-authorization-bypass-throug-bc6c558f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14996%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aksharsoftsolutions%20AS%20Password%20Field%20In%20Default%20Registration%20Form&amp;severity=critical&amp;id=695c95223839e44175ebc5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21486-cwe-122-heap-based-buffer-overflow--d070eb08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21486%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c8a973839e44175e8471a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-adonisjs-bodyparser-flaw-cvss-92-enables--8bc97d84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20AdonisJS%20Bodyparser%20Flaw%20(CVSS%209.2)%20Enables%20Arbitrary%20File%20Write%20on%20Servers&amp;severity=critical&amp;id=695d1e21769e869ac5f7ef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21487-cwe-20-improper-input-validation-in-efa8cc59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21487%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=medium&amp;id=695c8a973839e44175e8471e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13746-cwe-79-improper-neutralization-of-i-579b0ada</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20ForumWP%20%E2%80%93%20Forum%20%26%20Discussion%20Board&amp;severity=medium&amp;id=695c838f3839e44175cef8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14034-cwe-862-missing-authorization-in-gh-2d65674f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14034%3A%20CWE-862%20Missing%20Authorization%20in%20ghera74%20ilGhera%20Support%20System%20for%20WooCommerce&amp;severity=medium&amp;id=695c838f3839e44175cef8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11370-cwe-862-missing-authorization-in-av-267d8a55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11370%3A%20CWE-862%20Missing%20Authorization%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=695c838f3839e44175cef8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14153-cwe-89-improper-neutralization-of-s-5d2fb565</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14153%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vikasratudi%20Page%20Expire%20Popup%2FRedirection%20for%20WordPress&amp;severity=medium&amp;id=695c838f3839e44175cef8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0604-cwe-22-improper-limitation-of-a-path-8f1083b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0604%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ninjateam%20FastDup%20%E2%80%93%20Fastest%20WordPress%20Migration%20%26%20Duplicator&amp;severity=medium&amp;id=695c838f3839e44175cef8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13652-cwe-89-improper-neutralization-of-s-17a12da1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13652%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20manchumahara%20CBX%20Bookmark%20%26%20Favorite&amp;severity=medium&amp;id=695c838f3839e44175cef8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11723-cwe-330-use-of-insufficiently-rando-d1220129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11723%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=695c838f3839e44175cef8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13409-cwe-89-improper-neutralization-of-s-e7abbb04</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpvibes%20Form%20Vibes%20%E2%80%93%20Database%20Manager%20for%20Forms&amp;severity=medium&amp;id=695c838f3839e44175cef8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21485-cwe-20-improper-input-validation-in-a42a5703</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c838f3839e44175cef903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21677-cwe-758-reliance-on-undefined-unspe-1020703d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21677%3A%20CWE-758%3A%20Reliance%20on%20Undefined%2C%20Unspecified%2C%20or%20Implementation-Defined%20Behavior%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c83903839e44175cef95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21676-cwe-122-heap-based-buffer-overflow--c38a7384</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21676%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c838f3839e44175cef908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12793-cwe-426-untrusted-search-path-in-as-e2a12dd5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12793%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20ASUS%20ASCI&amp;severity=high&amp;id=695c79023839e44175c0fa44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15364-cwe-353-missing-support-for-integri-b06e524c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15364%3A%20CWE-353%20Missing%20Support%20for%20Integrity%20Check%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=695c6e793839e44175bdd387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20807-cwe-190-integer-overflow-in-mediate-5ead14e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20807%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20806-cwe-416-use-after-free-in-mediatek--7dac359c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20806%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20805-cwe-416-use-after-free-in-mediatek--1d1093f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20805%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20804-cwe-416-use-after-free-in-mediatek--f0d1048b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20804%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20803-cwe-190-integer-overflow-in-mediate-45033e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20803%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20787-cwe-416-use-after-free-in-mediatek--7966b391</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20787%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20786-cwe-415-double-free-in-mediatek-inc-156546ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20786%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20785-cwe-416-use-after-free-in-mediatek--01d4f91c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20785%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20784-cwe-457-use-of-uninitialized-variab-4287ec2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20784%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20783-cwe-787-out-of-bounds-write-in-medi-07d2144f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20783%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20782-cwe-787-out-of-bounds-write-in-medi-c437775b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20782%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20781-cwe-415-double-free-in-mediatek-inc-ba9fe5e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20781%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20780-cwe-416-use-after-free-in-mediatek--9b15d9e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20780%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20779-cwe-416-use-after-free-in-mediatek--aec567ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20779%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20778-cwe-787-out-of-bounds-write-in-medi-e3e220f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20778%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e793839e44175bdd398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20802-cwe-416-use-after-free-in-mediatek--9280135a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20802%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20801-cwe-415-double-free-in-mediatek-inc-b697c26c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20801%3A%20CWE-415%20Double%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20800-cwe-787-out-of-bounds-write-in-medi-5022f732</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20799-cwe-416-use-after-free-in-mediatek--d7e5ea8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20799%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20798-cwe-787-out-of-bounds-write-in-medi-cf229274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20798%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20797-cwe-121-stack-overflow-in-mediatek--90788ce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20797%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20796-cwe-1285-specified-index-position-o-2a4ef148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20796%3A%20CWE-1285%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20760-cwe-617-reachable-assertion-in-medi-a9db1c6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20760%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20761-cwe-754-improper-check-for-unusual--504655a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20761%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20762-cwe-617-reachable-assertion-in-medi-7f1f3bff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20762%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e793839e44175bdd395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20793-cwe-476-null-pointer-dereference-in-95cfb7b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20793%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20794-cwe-121-stack-overflow-in-mediatek--9aff97c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20794%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=medium&amp;id=695c6e7a3839e44175bdd3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20795-cwe-787-out-of-bounds-write-in-medi-2bb4d8fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MediaTek%20chipset&amp;severity=high&amp;id=695c6e7a3839e44175bdd3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21675-cwe-416-use-after-free-in-internati-4bcae5b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21675%3A%20CWE-416%3A%20Use%20After%20Free%20in%20InternationalColorConsortium%20iccDEV&amp;severity=critical&amp;id=695c6e7b3839e44175bdd443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15385-cwe-345-insufficient-verification-o-6c64a8b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15385%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20TECNO%20Mobile%20com.afmobi.boomplayer&amp;severity=critical&amp;id=695c6e793839e44175bdd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21674-cwe-401-missing-release-of-memory-a-a5c54c14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21674%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20InternationalColorConsortium%20iccDEV&amp;severity=low&amp;id=695c6e7b3839e44175bdd43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21673-cwe-190-integer-overflow-or-wraparo-b7e989c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21673%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c6e7b3839e44175bdd439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69197-cwe-287-improper-authentication-in--f8e3986d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69197%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pterodactyl%20panel&amp;severity=medium&amp;id=695c5ce23839e44175a692c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68954-cwe-613-insufficient-session-expira-eff6b377</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68954%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20pterodactyl%20panel&amp;severity=high&amp;id=695c5ce23839e44175a692bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15444-cwe-1395-dependency-on-vulnerable-t-86571d52</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15444%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20IAMB%20Crypt%3A%3ASodium%3A%3AXS&amp;severity=critical&amp;id=695c595e3839e44175a2e0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21507-cwe-835-loop-with-unreachable-exit--9b0ec589</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21507%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20InternationalColorConsortium%20iccDEV&amp;severity=high&amp;id=695c595e3839e44175a2e0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-06-18ab5f7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-06&amp;severity=medium&amp;id=695da2d6ee4c93a4aaa5488b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60534-na-d17acec7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60534%3A%20n%2Fa&amp;severity=critical&amp;id=695d3ab2326bcb029a43910c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59379-na-f52e9a28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59379%3A%20n%2Fa&amp;severity=high&amp;id=695d33aa326bcb029a411f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60262-na-4fa768b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60262%3A%20n%2Fa&amp;severity=critical&amp;id=695d3027326bcb029a4049e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65212-na-412bd942</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65212%3A%20n%2Fa&amp;severity=critical&amp;id=695d2ca3326bcb029a2b3039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69230-cwe-779-logging-of-excessive-data-i-d313c817</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69230%3A%20CWE-779%3A%20Logging%20of%20Excessive%20Data%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=695d12c1769e869ac5d3c5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69229-cwe-770-allocation-of-resources-wit-a514f81d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69229%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4ed43839e4417599068d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0607-sql-injection-in-code-projects-onlin-4f334ca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0607%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695c4ed43839e44175990692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69228-cwe-770-allocation-of-resources-wit-4454955f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69228%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4ed43839e44175990689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69227-cwe-835-loop-with-unreachable-exit--6f6435a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69227%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c4b4e3839e44175984995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69225-cwe-444-inconsistent-interpretation-7a9bf39b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69225%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=695c47ca3839e4417597a3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0606-sql-injection-in-code-projects-onlin-8f75354e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0606%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695d12c1769e869ac5d3c5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69226-cwe-22-improper-limitation-of-a-pat-a447a2c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69226%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c44473839e44175970366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69224-cwe-444-inconsistent-interpretation-ff126449</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69224%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=695c40c23839e4417595ee5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68456-cwe-770-allocation-of-resources-wit-f9cb2c6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68456%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20craftcms%20cms&amp;severity=high&amp;id=695c39ba3839e4417594b416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69223-cwe-409-improper-handling-of-highly-5fefff3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69223%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20aio-libs%20aiohttp&amp;severity=high&amp;id=695c36383839e44175942eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68455-cwe-470-use-of-externally-controlle-2b7374e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68455%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=695c36383839e44175942eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68454-cwe-1336-improper-neutralization-of-5dc1f666</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68454%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c36383839e44175942eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68437-cwe-918-server-side-request-forgery-fe43cee0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68437%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c36383839e44175942ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68436-cwe-200-exposure-of-sensitive-infor-54ac44b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68436%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20craftcms%20cms&amp;severity=medium&amp;id=695c32b23839e44175939730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68428-cwe-35-path-traversal-in-parallax-j-1307335d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68428%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20parallax%20jsPDF&amp;severity=critical&amp;id=695c32b23839e4417593972b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67732-cwe-200-exposure-of-sensitive-infor-ad487420</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67732%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langgenius%20dify&amp;severity=high&amp;id=695c32b23839e44175939728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0625-cwe-78-improper-neutralization-of-sp-229a7d9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0625%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DSL-2640B&amp;severity=critical&amp;id=695c2bac3839e441759217e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0621-cwe-1333-inefficient-regular-express-a9d9d749</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0621%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Anthropic%20MCP%20TypeScript%20SDK&amp;severity=high&amp;id=695c28263839e441759152d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64425-cwe-644-improper-neutralization-of--0190a779</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64425%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c24a73839e441759038ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64424-cwe-77-improper-neutralization-of-s-1b0a13a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64424%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c24a73839e441759038e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64423-cwe-287-improper-authentication-in--7dbc9d50</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64423%3A%20CWE-287%3A%20Improper%20Authentication%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c24a73839e441759038f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0605-sql-injection-in-code-projects-onlin-8c51d4cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0605%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695c24a73839e441759038f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64422-cwe-770-allocation-of-resources-wit-b34c9f4d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64422%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20coollabsio%20coolify&amp;severity=medium&amp;id=695c211f3839e441758f3419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64421-cwe-863-incorrect-authorization-in--e8147a1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64421%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20coollabsio%20coolify&amp;severity=high&amp;id=695c16933839e441758db0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64420-cwe-522-insufficiently-protected-cr-4ed45eac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64420%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c0f8a3839e441758c3636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64419-cwe-77-improper-neutralization-of-s-667382e8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64419%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695c0f8a3839e441758c3632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-aligned-hackers-abuse-viber-to-target-ukrai-3642f161</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Aligned%20Hackers%20Abuse%20Viber%20to%20Target%20Ukrainian%20Military%20and%20Government&amp;severity=high&amp;id=695bff543839e4417589374f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61781-cwe-285-improper-authorization-in-o-07523d2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61781%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=695bfdf63839e4417574ec20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-unlikely-in-communications-failure-tha-8cd79eae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Unlikely%20in%20Communications%20Failure%20That%20Grounded%20Flights%20in%20Greece&amp;severity=medium&amp;id=695bfa413839e441756f45f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59955-cwe-201-insertion-of-sensitive-info-12aefdd9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59955%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20coollabsio%20coolify&amp;severity=medium&amp;id=695bfa903839e441756fd45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59158-cwe-116-improper-encoding-or-escapi-c7a9e49a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59158%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brightspeed-investigating-cyberattack-ecdd199a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brightspeed%20Investigating%20Cyberattack&amp;severity=medium&amp;id=695bfa413839e441756f45fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59157-cwe-78-improper-neutralization-of-s-bff58062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59157%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59156-cwe-78-improper-neutralization-of-s-c47641a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59156%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=695bfa903839e441756fd455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55204-cwe-94-improper-control-of-generati-3cecd5f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55204%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20staniel359%20muffon&amp;severity=high&amp;id=695c017b3839e4417589846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risks-of-oob-access-via-ip-kvm-devices-mon-jan-5th-31f382af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices%2C%20(Mon%2C%20Jan%205th)&amp;severity=low&amp;id=695bf6ca3839e441756a5aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sedgwick-confirms-cyberattack-on-government-subsid-cf91fd40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sedgwick%20Confirms%20Cyberattack%20on%20Government%20Subsidiary&amp;severity=medium&amp;id=695bf6bb3839e441756a4e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10933-cwe-125-out-of-bounds-read-in-silab-5ca2b1de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10933%3A%20CWE-125%20Out-of-bounds%20Read%20in%20silabs.com%20Z-Wave%20Protocol%20Controller&amp;severity=medium&amp;id=695bf3783839e44175668256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39484-cwe-89-improper-neutralization-of-s-9f0af156</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39484%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Waituk%20Entrada&amp;severity=critical&amp;id=695bf018b7d6203139564fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39497-cwe-79-improper-neutralization-of-i-3c51e357</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dokan%20Dokan%20Pro&amp;severity=medium&amp;id=695bec94b7d62031395509b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39561-cwe-862-missing-authorization-in-ma-d7b7b22e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39561%3A%20CWE-862%20Missing%20Authorization%20in%20Marketing%20Fire%2C%20LLC%20LoginWP%20-%20Pro&amp;severity=medium&amp;id=695bec94b7d62031395509b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21635-vulnerability-in-ubiquiti-inc-unifi-c725f60b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21635%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Lite&amp;severity=medium&amp;id=695bec94b7d62031395509e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21634-vulnerability-in-ubiquiti-inc-unifi-4f6b923c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21634%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=medium&amp;id=695bec94b7d62031395509de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59467-vulnerability-in-ubiquiti-inc-ucrm--c7fadd3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59467%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UCRM%20Argentina%20AFIP%20invoices%20Plugin&amp;severity=high&amp;id=695bec94b7d62031395509d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21633-vulnerability-in-ubiquiti-inc-unifi-4ed99ac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21633%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=high&amp;id=695bec94b7d62031395509db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46255-cwe-862-missing-authorization-in-ma-73af8421</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46255%3A%20CWE-862%20Missing%20Authorization%20in%20Marketing%20Fire%20LLC%20LoginWP%20-%20Pro&amp;severity=high&amp;id=695bec94b7d62031395509bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53344-cwe-352-cross-site-request-forgery--04120430</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53344%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20Thim%20Core&amp;severity=medium&amp;id=695bec94b7d62031395509c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53735-cwe-79-improper-neutralization-of-i-5c842eaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corourke%20iPhone%20Webclip%20Manager&amp;severity=high&amp;id=695bec94b7d62031395509b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-infects-over-2-million-devi-3c5ccac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Android%20Botnet%20Infects%20Over%202%20Million%20Devices%20via%20Exposed%20ADB%20and%20Proxy%20Networks&amp;severity=medium&amp;id=695bff543839e44175893752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30516-cwe-1284-improper-validation-of-spe-cbc86df8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30516%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20SaasProject%20Booking%20Package&amp;severity=high&amp;id=695bec99b7d6203139550ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30461-cwe-79-improper-neutralization-of-i-6a667fd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tumult%20Inc%20Tumult%20Hype%20Animations&amp;severity=high&amp;id=695bec94b7d62031395509e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14346-cwe-306-missing-authentication-for--166dc7e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14346%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WHILL%20Model%20C2%20Electric%20Wheelchair&amp;severity=critical&amp;id=695bde83b7d620313938fa7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-kev-catalog-expanded-20-in-2025-topping-1480--c65316d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20KEV%20Catalog%20Expanded%2020%25%20in%202025%2C%20Topping%201%2C480%20Entries&amp;severity=medium&amp;id=695bd5ff3dc84013b27dde6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15029-cwe-89-improper-neutralization-of-s-1cd247a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15029%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=critical&amp;id=695bcf2a3dc84013b27be7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0597-sql-injection-in-campcodes-supplier--6aa0c95b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0597%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695bcf2a3dc84013b27be7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15026-cwe-306-missing-authentication-for--442b2314</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15026%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Centreon%20Infra%20Monitoring&amp;severity=critical&amp;id=695bcf2a3dc84013b27be7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12511-cwe-79-improper-neutralization-of-i-34aaad16</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695bc8233dc84013b278cf70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68280-cwe-611-improper-restriction-of-xml-06cbf5fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68280%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20SIS&amp;severity=medium&amp;id=695bc49d3dc84013b27640fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12513-cwe-79-improper-neutralization-of-i-09abe926</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695bc49d3dc84013b27640fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23511-cwe-79-improper-neutralization-of-i-92f21458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=medium&amp;id=695bc49d3dc84013b27640f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0592-sql-injection-in-code-projects-onlin-0eb0fa02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0592%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bd93cb7d6203139313f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0591-sql-injection-in-code-projects-onlin-430f5a28</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0591%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bba123dc84013b271744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-iot-exploits-wallet-breaches-rogue-ex-9abc1faf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20IoT%20Exploits%2C%20Wallet%20Breaches%2C%20Rogue%20Extensions%2C%20AI%20Abuse%20%26%20More&amp;severity=medium&amp;id=695be3b2b7d62031395311c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-grows-through-residential-p-28019fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Android%20Botnet%20Grows%20Through%20Residential%20Proxy%20Networks&amp;severity=low&amp;id=695bb65b3dc84013b2709633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5th-january-threat-intelligence-report-163db2f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5th%20January%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=695bb30c3dc84013b26f70bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0590-sql-injection-in-code-projects-onlin-cdb3bf77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0590%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bb30a3dc84013b26f706f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0589-improper-authentication-in-code-proj-93adb195</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0589%3A%20Improper%20Authentication%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695bd93cb7d6203139313f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-spotlights-whatsapp-metadata-leak-as-me-c3200f03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Spotlights%20WhatsApp%20Metadata%20Leak%20as%20Meta%20Begins%20Rolling%20Out%20Fixes&amp;severity=medium&amp;id=695ba84b3dc84013b256f8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0588-cross-site-scripting-in-xinhu-rainro-643f6b43</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0588%3A%20Cross%20Site%20Scripting%20in%20Xinhu%20Rainrock%20RockOA&amp;severity=medium&amp;id=695ba4fa3dc84013b24fee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0587-cross-site-scripting-in-xinhu-rainro-b93a727c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0587%3A%20Cross%20Site%20Scripting%20in%20Xinhu%20Rainrock%20RockOA&amp;severity=medium&amp;id=695b9cd2d0cafea50bf0271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68865-cwe-89-improper-neutralization-of-s-47ae013b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68865%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Infility%20Infility%20Global&amp;severity=high&amp;id=695b99acdb813ff03e48b58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68850-cwe-862-missing-authorization-in-co-6b3e8c7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68850%3A%20Missing%20Authorization%20in%20codepeople%20Sell%20Downloads&amp;severity=high&amp;id=695b99acdb813ff03e48b589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68547-cwe-862-missing-authorization-in-wp-86fa8eb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68547%3A%20Missing%20Authorization%20in%20wpweb%20Follow%20My%20Blog%20Post&amp;severity=high&amp;id=695b99acdb813ff03e48b586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68044-cwe-639-authorization-bypass-throug-1601dac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68044%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=high&amp;id=695b99acdb813ff03e48b583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68033-cwe-201-insertion-of-sensitive-info-8e39e2bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68033%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Brecht%20Custom%20Related%20Posts&amp;severity=high&amp;id=695b99acdb813ff03e48b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68029-cwe-201-insertion-of-sensitive-info-f1872075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68029%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=high&amp;id=695b99acdb813ff03e48b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68014-cwe-201-insertion-of-sensitive-info-378ff15b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68014%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20awethemes%20AweBooking&amp;severity=high&amp;id=695b99acdb813ff03e48b57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0586-cross-site-scripting-in-code-project-11184c2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0586%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b9617db813ff03e47ed9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31048-cwe-434-unrestricted-upload-of-file-3977fc78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31048%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themify%20Shopo&amp;severity=critical&amp;id=695b9617db813ff03e47ed97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31047-cwe-502-deserialization-of-untruste-ea5db360</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31047%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Themify%20Themify%20Edmin&amp;severity=high&amp;id=695b9617db813ff03e47ed94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31046-cwe-862-missing-authorization-in-wp-695ca694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31046%3A%20CWE-862%20Missing%20Authorization%20in%20WPvibes%20AnyWhere%20Elementor%20Pro&amp;severity=medium&amp;id=695b9617db813ff03e47ed91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31044-cwe-89-improper-neutralization-of-s-a42ed9b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31044%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Premium%20SEO%20Pack&amp;severity=high&amp;id=695b9617db813ff03e47ed8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30633-cwe-89-improper-neutralization-of-s-13bbada5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30633%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Amazon%20Native%20Shopping%20Recommendations&amp;severity=critical&amp;id=695b9617db813ff03e47ed8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69087-cwe-98-improper-control-of-filename-61037791</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69087%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jwsthemes%20FreeAgent&amp;severity=critical&amp;id=695b9291db813ff03e4708a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12519-cwe-862-missing-authorization-in-ce-a154a52b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12519%3A%20CWE-862%20Missing%20Authorization%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695b9291db813ff03e4708a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13056-cwe-79-improper-neutralization-of-i-97f39e09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=695b9291db813ff03e4708a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5965-cwe-78-improper-neutralization-of-sp-5decf22f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5965%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=695b8f06db813ff03e463837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0585-sql-injection-in-code-projects-onlin-c0ec63e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0585%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b8f06db813ff03e46383a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitfinex-hack-convict-ilya-lichtenstein-released-e-ff2631ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitfinex%20Hack%20Convict%20Ilya%20Lichtenstein%20Released%20Early%20Under%20U.S.%20First%20Step%20Act&amp;severity=medium&amp;id=695baa623dc84013b26b95e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0584-sql-injection-in-code-projects-onlin-d60ce6e2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0584%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b8b83db813ff03e454d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0583-sql-injection-in-code-projects-onlin-70e1b231</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0583%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695b847bdb813ff03e438308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66518-cwe-27-path-traversal-dirfilename-i-1922cceb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66518%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Apache%20Software%20Foundation%20Apache%20Kyuubi&amp;severity=high&amp;id=695b7d73db813ff03e41d61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0582-sql-injection-in-itsourcecode-societ-54fc004d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0582%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695b7d73db813ff03e41d61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15240-cwe-434-unrestricted-upload-of-file-7cc36ef1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15240%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b79eedb813ff03e40d8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15239-cwe-89-improper-neutralization-of-s-e92bd6e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15239%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b766adb813ff03e3fec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0581-command-injection-in-tenda-ac1206-10bd5beb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0581%3A%20Command%20Injection%20in%20Tenda%20AC1206&amp;severity=medium&amp;id=695b766adb813ff03e3fec8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15238-cwe-89-improper-neutralization-of-s-bcd3d8b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15238%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b72e7db813ff03e3f5bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-vvs-stealer-malware-targets-discord-accounts-v-1de74c79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VVS%20Stealer%20Malware%20Targets%20Discord%20Accounts%20via%20Obfuscated%20Python%20Code&amp;severity=medium&amp;id=695baa623dc84013b26b95eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15237-cwe-36-absolute-path-traversal-in-q-cfdfbb54</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15237%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=medium&amp;id=695b6f63db813ff03e3e8880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15236-cwe-36-absolute-path-traversal-in-q-f58b2236</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15236%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=medium&amp;id=695b6f63db813ff03e3e887c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0580-cross-site-scripting-in-sourcecodest-1896cf87</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0580%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20API%20Key%20Manager%20App&amp;severity=medium&amp;id=695b6bdfdb813ff03e3dbaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15235-cwe-862-missing-authorization-in-qu-4a3ee6ed</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15235%3A%20CWE-862%20Missing%20Authorization%20in%20Quanta%20Computer%20QOCA%20aim%20AI%20Medical%20Cloud%20Platform&amp;severity=high&amp;id=695b6bdfdb813ff03e3dbaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15462-buffer-overflow-in-utt-520w-b83561ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15462%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b64d6db813ff03e3bf10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15461-buffer-overflow-in-utt-520w-8bd73dbd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15461%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b5dcfdb813ff03e3996cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15460-buffer-overflow-in-utt-520w-54ddef69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15460%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b56c7db813ff03e37ad07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9543-cwe-79-cross-site-scripting-xss-in-f-f1e9d907</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9543%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FlexTable&amp;severity=low&amp;id=695b56c7db813ff03e37ad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14124-cwe-89-sql-injection-in-team-e0aaae6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14124%3A%20CWE-89%20SQL%20Injection%20in%20Team&amp;severity=high&amp;id=695b56c7db813ff03e37ad04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15459-buffer-overflow-in-utt-520w-35aa842a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15459%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=695b4fbfdb813ff03e35d1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15458-improper-authentication-in-bg5sbk-m-864ac174</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15458%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b48b6db813ff03e33445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15457-improper-authentication-in-bg5sbk-m-6a343c28</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15457%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b41aedb813ff03e31b0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15456-improper-authentication-in-bg5sbk-m-70de1b54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15456%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b3e2bdb813ff03e30af0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15455-improper-authentication-in-bg5sbk-m-fd5fb37e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15455%3A%20Improper%20Authentication%20in%20bg5sbk%20MiniCMS&amp;severity=medium&amp;id=695b3722db813ff03e2e334c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15454-cross-site-scripting-in-zhanglun-le-64f53889</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15454%3A%20Cross%20Site%20Scripting%20in%20zhanglun%20lettura&amp;severity=low&amp;id=695b2c97db813ff03e0dbd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15453-deserialization-in-milvus-b1a9e644</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15453%3A%20Deserialization%20in%20milvus&amp;severity=medium&amp;id=695b2c97db813ff03e0dbd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15452-cross-site-scripting-in-xnx3-wangma-5a15d8fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15452%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=695b220adb813ff03e08439e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15451-cross-site-scripting-in-xnx3-wangma-02fd0ca0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15451%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=695b220adb813ff03e084398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15450-sql-injection-in-sfturing-hosporder-1683e20d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15450%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=695b13fadb813ff03efd5859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15449-path-traversal-in-cld378632668-java-c79a73e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15449%3A%20Path%20Traversal%20in%20cld378632668%20JavaMall&amp;severity=medium&amp;id=695b0cf2db813ff03ef897b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5591-cwe-79-improper-neutralization-of-in-f992aea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Kentico%20Xperience&amp;severity=high&amp;id=695b096fdb813ff03ef6b20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15448-unrestricted-upload-in-cld378632668-eb9aff55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15448%3A%20Unrestricted%20Upload%20in%20cld378632668%20JavaMall&amp;severity=medium&amp;id=695b096fdb813ff03ef6b204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-05-15c584a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-05&amp;severity=medium&amp;id=695c52203839e44175999659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67419-na-c36685b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67419%3A%20n%2Fa&amp;severity=high&amp;id=695c1d9a3839e441758ea7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67427-na-04528a16</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67427%3A%20n%2Fa&amp;severity=medium&amp;id=695c16933839e441758db0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52516-na-6253e4f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52516%3A%20n%2Fa&amp;severity=medium&amp;id=695c08823839e441758ae8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43706-na-4ddd2c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43706%3A%20n%2Fa&amp;severity=high&amp;id=695c08823839e441758ae8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27807-na-960c7051</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27807%3A%20n%2Fa&amp;severity=critical&amp;id=695c08823839e441758ae8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67397-na-d23f3940</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67397%3A%20n%2Fa&amp;severity=critical&amp;id=695c05013839e441758a3892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53966-na-be553183</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53966%3A%20n%2Fa&amp;severity=high&amp;id=695c05013839e441758a388e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49495-na-b30b793a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49495%3A%20n%2Fa&amp;severity=high&amp;id=695c05013839e441758a388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65922-na-17d6f126</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65922%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e44175898474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52517-na-ab2f5576</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52517%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e4417589846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52515-na-802bdb41</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52515%3A%20n%2Fa&amp;severity=medium&amp;id=695c017b3839e44175898467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52519-na-07c52c7d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52519%3A%20n%2Fa&amp;severity=high&amp;id=695bf3783839e44175668259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57836-na-7a4447cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57836%3A%20n%2Fa&amp;severity=high&amp;id=695bec99b7d6203139550ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67316-na-ff1ad204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67316%3A%20n%2Fa&amp;severity=medium&amp;id=695be90fb7d6203139541a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65328-na-2ccfef04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65328%3A%20n%2Fa&amp;severity=medium&amp;id=695be58cb7d6203139538ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67303-na-2236ed72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67303%3A%20n%2Fa&amp;severity=high&amp;id=695be207b7d62031393eafe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67315-na-c4f59cdc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67315%3A%20n%2Fa&amp;severity=medium&amp;id=695be207b7d62031393eae0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66376-cwe-79-improper-neutralization-of-i-163928a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zimbra%20Collaboration&amp;severity=high&amp;id=695bd2af3dc84013b27cfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15447-sql-injection-in-seeyon-zhiyuan-oa--6ddb354b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15447&amp;severity=null&amp;id=695afb5fdb813ff03ef1439b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15446-sql-injection-in-seeyon-zhiyuan-oa--dda8c3f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15446&amp;severity=null&amp;id=695af456db813ff03ef034af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0579-sql-injection-in-code-projects-onlin-5af30a32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0579%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a60afdb813ff03ed02ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0578-sql-injection-in-code-projects-onlin-b40a0b17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0578%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a59a7db813ff03eceb68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15443-sql-injection-in-crmeb-d04c5dae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15443%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=695a52a0db813ff03ecd5ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15442-sql-injection-in-crmeb-70a9a933</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15442%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=695a4b97db813ff03ecbba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0577-unrestricted-upload-in-code-projects-d1ce7073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0577%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a367fdb813ff03ec78a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14830-cwe-79-improper-neutralization-of-i-362d4b4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JFrog%20Artifactory%20(Workers)&amp;severity=medium&amp;id=695a32fadb813ff03ec70731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0576-sql-injection-in-code-projects-onlin-5004ce46</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0576%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a2f77db813ff03ec525e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0575-sql-injection-in-code-projects-onlin-4e9b35f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0575%3A%20SQL%20Injection%20in%20code-projects%20Online%20Product%20Reservation%20System&amp;severity=medium&amp;id=695a0547db813ff03eb47238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptocurrency-scam-emails-and-web-pages-as-we-ent-45f003f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026%2C%20(Sun%2C%20Jan%204th)&amp;severity=medium&amp;id=6959effcdb813ff03eac9305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0574-improper-authorization-in-yeqifu-war-abcf8498</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0574%3A%20Improper%20Authorization%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=6959cd06db813ff03e7f215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-04-4b8cf66f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-04&amp;severity=medium&amp;id=695b0231db813ff03ef2c705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3660-improper-authorization-of-index-cont-3e60d3bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3660%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3654-improper-authorization-of-index-cont-b47f1f02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3654%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3653-improper-authorization-of-index-cont-2d7465bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3653%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3652-authentication-bypass-using-an-alter-7e33ab53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3652%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3646-missing-authentication-for-critical--eed88241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3646%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15115-missing-authorization-in-petlibrio--7ec5e489</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15115%3A%20Missing%20Authorization%20in%20Petlibrio%20Smart%20Pet%20Feeder%20Platform&amp;severity=medium&amp;id=6959a9dfdb813ff03e731c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34171-361be593</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34171%3A%20CWE-862%20Missing%20Authorization%20in%20IceWhale%20Tech%20CasaOS&amp;severity=medium&amp;id=6957f5dddb813ff03ef50c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-in-shinyhunters-claim-breach-of-us-cybersecur-83930754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20In%3A%20ShinyHunters%20Claim%20Breach%20of%20US%20Cybersecurity%20Firm%20Resecurity%2C%20Screenshots%20Show%20Internal%20Access&amp;severity=high&amp;id=69594ac4db813ff03e5f8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-is-using-react2shell-to-hijack-tho-65dbbe4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20is%20Using%20React2Shell%20to%20Hijack%20Thousands%20of%20Unpatched%20Devices&amp;severity=medium&amp;id=69593228db813ff03e5a2c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-coldfusion-exploit-attempts-spotted-d-eb527f74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20ColdFusion%20exploit%20attempts%20spotted%20during%20Christmas%20holiday&amp;severity=high&amp;id=69592093db813ff03e5684c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-snakes-by-the-riverbank-ab557ee1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%3A%20Snakes%20by%20the%20riverbank&amp;severity=medium&amp;id=695b9dfc3dc84013b246d8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/longnosedgoblin-tries-to-sniff-out-governmental-af-95ee9be0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LongNosedGoblin%20tries%20to%20sniff%20out%20governmental%20affairs%20in%20Southeast%20Asia%20and%20Japan&amp;severity=medium&amp;id=695b9dfc3dc84013b246d8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/president-trump-orders-divestment-in-29-million-ch-bbc4edb7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=President%20Trump%20Orders%20Divestment%20in%20%242.9%20Million%20Chips%20Deal%20to%20Protect%20US%20Security%20Interests&amp;severity=medium&amp;id=6958f660db813ff03e4f426e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kermit-exploit-defeats-police-ai-podcast-your-righ-9068c77e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kermit%20Exploit%20Defeats%20Police%20AI%3A%20Podcast%20Your%20Rights%20to%20Challenge%20the%20Record%20Integrity&amp;severity=high&amp;id=6958ebd7db813ff03e4dd288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21484-cwe-203-observable-discrepancy-in-m-feea7b0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21484%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Mintplex-Labs%20anything-llm&amp;severity=medium&amp;id=69587451db813ff03e162b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64124-cwe-78-improper-neutralization-of-s-8fd8727d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64124%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69586640db813ff03e0db0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64125-cwe-441-unintended-proxy-or-interme-b38ae03f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64125%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20in%20Nuvation%20Energy%20nCloud%20VPN%20Service&amp;severity=critical&amp;id=69586640db813ff03e0db0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-03-c5d81326</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-03&amp;severity=medium&amp;id=6959b0b1db813ff03e7417d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64123-cwe-78-improper-neutralization-of-s-ade8ddce</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64123%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69583c10db813ff03e02aa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64122-cwe-522-insufficiently-protected-cr-7b6e64e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64122%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=high&amp;id=69583c10db813ff03e02aa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64121-cwe-288-authentication-bypass-using-e870bc00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64121%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=critical&amp;id=69583c10db813ff03e02aa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64120-cwe-78-improper-neutralization-of-s-dfeaa13c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64120%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nuvation%20Energy%20Multi-Stack%20Controller%20(MSC)&amp;severity=critical&amp;id=69583c10db813ff03e02aa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64119-cwe-603-in-nuvation-energy-battery--a46ce8db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64119%3A%20CWE-603%20in%20Nuvation%20Energy%20Battery%20Management%20System&amp;severity=critical&amp;id=6958388ddb813ff03e020325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21483-cwe-79-improper-neutralization-of-i-8206b461</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20knadh%20listmonk&amp;severity=medium&amp;id=69583509db813ff03e019c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21452-cwe-400-uncontrolled-resource-consu-f1c49e53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21452%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20msgpack%20msgpack-java&amp;severity=high&amp;id=69583184db813ff03e011ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0571-path-traversal-in-yeqifu-warehouse-94df3301</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0571%3A%20Path%20Traversal%20in%20yeqifu%20warehouse&amp;severity=medium&amp;id=695826f8db813ff03efea567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21445-cwe-306-missing-authentication-for--38cd4a1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21445%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69581c6edb813ff03efc8412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21444-cwe-327-use-of-a-broken-or-risky-cr-e643cca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21444%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20stefanberger%20libtpms&amp;severity=medium&amp;id=69581901db813ff03efbfeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21440-cwe-22-improper-limitation-of-a-pat-1ab6f0b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21440%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adonisjs%20core&amp;severity=critical&amp;id=69581901db813ff03efbfead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covenant-health-data-breach-after-ransomware-attac-a2a805de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covenant%20Health%20data%20breach%20after%20ransomware%20attack%20impacted%20over%20478%2C000%20people&amp;severity=high&amp;id=695818e7db813ff03efbfbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0570-sql-injection-in-code-projects-onlin-1e0574c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0570%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69581901db813ff03efbfea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-10k-fortinet-firewalls-exposed-to-actively-ex-ab9c98b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2010K%20Fortinet%20firewalls%20exposed%20to%20actively%20exploited%202FA%20bypass&amp;severity=high&amp;id=695818e7db813ff03efbfbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tokyo-fm-data-breach-hacker-claims-over-3-million--03a7ef62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tokyo%20FM%20Data%20Breach%3A%20Hacker%20Claims%20Over%203%20Million%20Records%20Stolen&amp;severity=high&amp;id=695811dedb813ff03efad351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0569-sql-injection-in-code-projects-onlin-b84c43d0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0569%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=695811f1db813ff03efad660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0568-sql-injection-in-code-projects-onlin-45aee655</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0568%3A%20SQL%20Injection%20in%20code-projects%20Online%20Music%20Site&amp;severity=medium&amp;id=69580ad8db813ff03ef98cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0567-sql-injection-in-code-projects-conte-5b243309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0567%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=695803d0db813ff03ef8206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15439-sql-injection-in-daptin-79e40f73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15439%3A%20SQL%20Injection%20in%20Daptin&amp;severity=medium&amp;id=6957fcc6db813ff03ef64afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69417-cwe-863-incorrect-authorization-in--ccf52c26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69417%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20plex.tv%20backend&amp;severity=medium&amp;id=6957fcc6db813ff03ef64b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69416-cwe-863-incorrect-authorization-in--97acdffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69416%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20plex.tv%20backend&amp;severity=medium&amp;id=6957f952db813ff03ef5aecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69415-cwe-672-operation-on-a-resource-aft-2ac0c1e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69415%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=6957f952db813ff03ef5aecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69414-cwe-863-incorrect-authorization-in--7df6bff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69414%3A%20CWE-863%20Incorrect%20Authorization%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=6957f965db813ff03ef5b265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0566-unrestricted-upload-in-code-projects-ec4488f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0566%3A%20Unrestricted%20Upload%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=6957f965db813ff03ef5b268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59389-cwe-89-in-qnap-systems-inc-hyper-da-e848d35c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59389%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Hyper%20Data%20Protector&amp;severity=high&amp;id=6957eb35db813ff03ef35595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62842-cwe-73-in-qnap-systems-inc-hbs-3-hy-fad20694</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62842%3A%20CWE-73%20in%20QNAP%20Systems%20Inc.%20HBS%203%20Hybrid%20Backup%20Sync&amp;severity=high&amp;id=6957eb35db813ff03ef3559b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62840-cwe-209-in-qnap-systems-inc-hbs-3-h-5dc54d76</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62840%3A%20CWE-209%20in%20QNAP%20Systems%20Inc.%20HBS%203%20Hybrid%20Backup%20Sync&amp;severity=high&amp;id=6957eb35db813ff03ef35598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11837-cwe-94-in-qnap-systems-inc-malware--01b67e6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11837%3A%20CWE-94%20in%20QNAP%20Systems%20Inc.%20Malware%20Remover&amp;severity=high&amp;id=6957eb35db813ff03ef35592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69284-cwe-284-improper-access-control-in--b5b979e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69284%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20makeplane%20plane&amp;severity=medium&amp;id=6957eb35db813ff03ef355a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62852-cwe-121-in-qnap-systems-inc-qts-640e89f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62852%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59387-cwe-89-in-qnap-systems-inc-mars-mul-365f7996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59387%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20MARS%20(Multi-Application%20Recovery%20Service)&amp;severity=high&amp;id=6957e42ddb813ff03ef241d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59384-cwe-22-in-qnap-systems-inc-qfiling-283cc204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59384%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qfiling&amp;severity=high&amp;id=6957e42ddb813ff03ef241d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59381-cwe-22-in-qnap-systems-inc-qts-3fa3e827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59381%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e42ddb813ff03ef241d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59380-cwe-22-in-qnap-systems-inc-qts-91aa99af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59380%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e42ddb813ff03ef241ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53597-cwe-121-in-qnap-systems-inc-license-aaa1e91c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53597%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6957e42ddb813ff03ef241cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53594-cwe-22-in-qnap-systems-inc-qfinder--9c2c2ec3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53594%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qfinder%20Pro%20Mac&amp;severity=medium&amp;id=6957e42ddb813ff03ef241c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52871-cwe-125-in-qnap-systems-inc-license-2728acf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52871%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6957e42ddb813ff03ef241c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48721-cwe-120-in-qnap-systems-inc-qts-78ba2fc1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48721%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9110-cwe-497-in-qnap-systems-inc-qts-8028bbe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9110%3A%20CWE-497%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957e42ddb813ff03ef241dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57705-cwe-770-in-qnap-systems-inc-qts-cc71e0c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57705%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef1420b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54166-cwe-125-in-qnap-systems-inc-qts-5e64de99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54166%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef14208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54165-cwe-125-in-qnap-systems-inc-qts-6d7a0d62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54165%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957e0a8db813ff03ef14205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54164-cwe-125-in-qnap-systems-inc-qts-8dca5c6a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54164%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957dd47db813ff03ef066bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53596-cwe-476-in-qnap-systems-inc-qts-9f8afab4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53596%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53593-cwe-121-in-qnap-systems-inc-qts-fa47faa3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53593%3A%20CWE-121%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53592-cwe-476-in-qnap-systems-inc-qts-95fe50f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53592%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53591-cwe-134-in-qnap-systems-inc-qts-ca58fadd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53591%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53590-cwe-476-in-qnap-systems-inc-qts-fe2f829b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53590%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53589-cwe-476-in-qnap-systems-inc-qts-8a57f6ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53589%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd47db813ff03ef066a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53414-cwe-476-in-qnap-systems-inc-qts-5cde872f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53414%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53405-cwe-476-in-qnap-systems-inc-qts-5d774bc8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53405%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52872-cwe-120-in-qnap-systems-inc-qts-0bb94e21</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52872%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0667b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52864-cwe-120-in-qnap-systems-inc-qts-ffcf2f22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52864%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52863-cwe-120-in-qnap-systems-inc-qts-1b6925f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52863%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52431-cwe-476-in-qnap-systems-inc-qts-dc45854a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52431%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52430-cwe-476-in-qnap-systems-inc-qts-d36776bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52430%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0666f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52426-cwe-476-in-qnap-systems-inc-qts-f2963f27</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52426%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef0666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47208-cwe-770-in-qnap-systems-inc-qts-a829ed17</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47208%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6957dd46db813ff03ef06669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44013-cwe-476-in-qnap-systems-inc-qts-ee5f2b21</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44013%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=6957dd46db813ff03ef06666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-launches-new-rat-attacks-against-7e20b52e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Launches%20New%20RAT%20Attacks%20Against%20Indian%20Government%20and%20Academia&amp;severity=high&amp;id=6957dd24db813ff03ef06173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62857-cwe-79-in-qnap-systems-inc-qumagie-e4cb0c7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62857%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=low&amp;id=6957dd47db813ff03ef066c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-kimwolf-botnet-is-stalking-your-local-network-8b22c4a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Kimwolf%20Botnet%20is%20Stalking%20Your%20Local%20Network&amp;severity=high&amp;id=6957dd24db813ff03ef0616f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15438-deserialization-in-pluxml-5717081c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15438%3A%20Deserialization%20in%20PluXml&amp;severity=medium&amp;id=6957d9a2db813ff03eef48ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0565-sql-injection-in-code-projects-conte-7aa41759</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0565%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=6957d298db813ff03eed8b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-launches-new-rat-attacks-against-8ba4828c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Launches%20New%20RAT%20Attacks%20Against%20Indian%20Government%20and%20Academia&amp;severity=medium&amp;id=6957cf0ddb813ff03eec907e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vvs-discord-stealer-using-pyarmor-for-obfuscation--a634aa2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VVS%20Discord%20Stealer%20Using%20Pyarmor%20for%20Obfuscation%20and%20Detection%20Evasion&amp;severity=medium&amp;id=6957cf29db813ff03eec98a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flock-exposes-its-ai-enabled-surveillance-cameras-70340cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flock%20Exposes%20Its%20AI-Enabled%20Surveillance%20Cameras&amp;severity=medium&amp;id=6957cf29db813ff03eec98a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-abuses-google-cloud-application--5d341205</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20campaign%20abuses%20Google%20Cloud%20Application%20to%20impersonate%20legitimate%20Google%20emails&amp;severity=medium&amp;id=6957cf29db813ff03eec989f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vvs-discord-stealer-using-pyarmor-for-obfuscation--c429a73c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VVS%20Discord%20Stealer%20Using%20Pyarmor%20for%20Obfuscation%20and%20Detection%20Evasion&amp;severity=medium&amp;id=6957f23cdb813ff03ef4a1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-registry-persistence-techniques-without-re-e0554d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Registry%20Persistence%20Techniques%20without%20Registry%20Callbacks&amp;severity=medium&amp;id=6957c80cdb813ff03eeaffbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-us-cybersecurity-pros-plead-guilty-over-ransom-02a06284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20US%20Cybersecurity%20Pros%20Plead%20Guilty%20Over%20Ransomware%20Attacks&amp;severity=medium&amp;id=6957b674db813ff03ee6876a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-roi-problem-in-attack-surface-management-9967b931</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ROI%20Problem%20in%20Attack%20Surface%20Management&amp;severity=low&amp;id=6958603ddb813ff03e0a0a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploiting-react2shell-vulnerabili-bbaded6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploiting%20React2Shell%20Vulnerability&amp;severity=medium&amp;id=6957a863db813ff03ee2bb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covenant-health-data-breach-impacts-478000-individ-0c946c66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covenant%20Health%20Data%20Breach%20Impacts%20478%2C000%20Individuals&amp;severity=medium&amp;id=69579dd8db813ff03edf84fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-coldfusion-servers-targeted-in-coordinated-c-c049fe53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20ColdFusion%20Servers%20Targeted%20in%20Coordinated%20Campaign&amp;severity=medium&amp;id=69579a53db813ff03ede64e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0547-unrestricted-upload-in-phpgurukul-on-0b0384d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0547%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=69579353db813ff03edc3e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-google-cloud-email-feature-in-b0852113</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Google%20Cloud%20Email%20Feature%20in%20Multi-Stage%20Phishing%20Campaign&amp;severity=medium&amp;id=6958603ddb813ff03e0a0a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0546-sql-injection-in-code-projects-conte-37323882</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0546%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=69578c4bdb813ff03edaa617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15437-cross-site-scripting-in-ligerosmart-24338344</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15437%3A%20Cross%20Site%20Scripting%20in%20LigeroSmart&amp;severity=medium&amp;id=69578543db813ff03ed9340b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15436-sql-injection-in-yonyou-ksoa-884c8d59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15436%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69577e3bdb813ff03ed8028d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15435-sql-injection-in-yonyou-ksoa-eb01c9b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15435%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69577733db813ff03ed646cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15434-sql-injection-in-yonyou-ksoa-d865a8da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15434%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=6957702ddb813ff03ed46cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15432-path-traversal-in-yeqifu-carrental-59c46a94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15432%3A%20Path%20Traversal%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=69576923db813ff03ed2f10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15431-buffer-overflow-in-utt-512w-986c5285</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15431%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=6957621bdb813ff03ed0f787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14072-cwe-287-improper-authentication-in--fcdd338c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14072%3A%20CWE-287%20Improper%20Authentication%20in%20Ninja%20Forms&amp;severity=medium&amp;id=6957621bdb813ff03ed0f784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13456-cwe-79-cross-site-scripting-xss-in--2ad540af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13456%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20ShopBuilder&amp;severity=medium&amp;id=6957621bdb813ff03ed0f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13153-cwe-79-cross-site-scripting-xss-in--8bd50900</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13153%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Logo%20Slider&amp;severity=medium&amp;id=6957621bdb813ff03ed0f77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12685-cwe-352-cross-site-request-forgery--052e8f12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPBookit&amp;severity=medium&amp;id=6957621bdb813ff03ed0f77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15430-buffer-overflow-in-utt-512w-b701d7fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15430%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69575b13db813ff03ece591e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15429-buffer-overflow-in-utt-512w-1edbb386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15429%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=6957578fdb813ff03ecd2435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15428-buffer-overflow-in-utt-512w-0eacf5ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15428%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69575087db813ff03ecb9937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15427-sql-injection-in-seeyon-zhiyuan-oa--6893a432</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15427&amp;severity=null&amp;id=695745fadb813ff03ec87323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15426-unrestricted-upload-in-jackying-h-u-20044b21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15426%3A%20Unrestricted%20Upload%20in%20jackying%20H-ui.admin&amp;severity=medium&amp;id=69574277db813ff03ec73231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15425-sql-injection-in-yonyou-ksoa-0317e057</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15425%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695737ecdb813ff03ea62d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15424-sql-injection-in-yonyou-ksoa-35d7090b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15424%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695737ecdb813ff03ea62d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15423-unrestricted-upload-in-empiresoft-e-e21ca2bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15423%3A%20Unrestricted%20Upload%20in%20EmpireSoft%20EmpireCMS&amp;severity=medium&amp;id=695843a1db813ff03e04a595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14998-cwe-639-authorization-bypass-throug-6c57fe02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14998%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpmudev%20Branda%20%E2%80%93%20White%20Label%20%26%20Branding%2C%20Free%20Login%20Page%20Customizer&amp;severity=critical&amp;id=695843a1db813ff03e04a584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14047-cwe-862-missing-authorization-in-ta-a3aa4d0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14047%3A%20CWE-862%20Missing%20Authorization%20in%20tareq1988%20User%20Frontend%3A%20AI%20Powered%20Frontend%20Posting%2C%20User%20Directory%2C%20Profile%2C%20Membership%20%26%20User%20Registration&amp;severity=medium&amp;id=695843a1db813ff03e04a577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15422-protection-mechanism-failure-in-emp-f6526326</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15422%3A%20Protection%20Mechanism%20Failure%20in%20EmpireSoft%20EmpireCMS&amp;severity=medium&amp;id=695722d3db813ff03e9b27ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/built-an-automated-red-team-tool-to-find-llm-vulne-c6daf098</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Built%20an%20automated%20red-team%20tool%20to%20find%20LLM%20vulnerabilities.%20Most%20AI%20apps%20are%20frighteningly%20easy%20to%20break.&amp;severity=critical&amp;id=69571f50db813ff03e988f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15421-sql-injection-in-yonyou-ksoa-15b66d8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15421%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=69571bcbdb813ff03e966c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15420-sql-injection-in-yonyou-ksoa-8ff00d8a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15420%3A%20SQL%20Injection%20in%20Yonyou%20KSOA&amp;severity=medium&amp;id=695714c3db813ff03e90983a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15419-denial-of-service-in-open5gs-a191d9a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15419%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=695714c3db813ff03e909831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-02-6e26c7bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-02&amp;severity=medium&amp;id=69585f31db813ff03e094b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65125-na-2d5f29b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65125%3A%20n%2Fa&amp;severity=critical&amp;id=695843a1db813ff03e04a572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45286-na-e23b921a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45286%3A%20n%2Fa&amp;severity=medium&amp;id=695843a1db813ff03e04a56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67158-na-b31284cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67158%3A%20n%2Fa&amp;severity=high&amp;id=6957f965db813ff03ef5b260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67159-na-3d467c17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67159%3A%20n%2Fa&amp;severity=high&amp;id=6957f602db813ff03ef51678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67160-na-7d2c9953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67160%3A%20n%2Fa&amp;severity=high&amp;id=6957f23ddb813ff03ef4a1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67268-na-1196050b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67268%3A%20n%2Fa&amp;severity=critical&amp;id=6957eeb8db813ff03ef3fe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67269-na-a3b7ad16</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67269%3A%20n%2Fa&amp;severity=high&amp;id=6957eb35db813ff03ef3559e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55374-na-942b2e66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55374%3A%20n%2Fa&amp;severity=medium&amp;id=6957e0a8db813ff03ef14201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15418-denial-of-service-in-open5gs-c29fc1bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15418%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=695706b3db813ff03e8adb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15417-denial-of-service-in-open5gs-d3430b44</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15417%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=6956ffabdb813ff03e890340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15416-cross-site-scripting-in-xnx3-wangma-9067db30</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15416%3A%20Cross%20Site%20Scripting%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=6956f8a3db813ff03e8725ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15415-unrestricted-upload-in-xnx3-wangmar-23fa7946</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15415%3A%20Unrestricted%20Upload%20in%20xnx3%20wangmarket&amp;severity=medium&amp;id=6956f1e1db813ff03e8571d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15414-server-side-request-forgery-in-go-s-014a07a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15414%3A%20Server-Side%20Request%20Forgery%20in%20go-sonic%20sonic&amp;severity=medium&amp;id=6956ea94db813ff03e836007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15413-memory-corruption-in-wasm3-ae72b50d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15413%3A%20Memory%20Corruption%20in%20wasm3&amp;severity=medium&amp;id=6956e38cdb813ff03e814b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15412-out-of-bounds-read-in-webassembly-w-cbc26af0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15412%3A%20Out-of-Bounds%20Read%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6956dc84db813ff03e7ed0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15411-memory-corruption-in-webassembly-wa-c86fe015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15411%3A%20Memory%20Corruption%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6956ce74db813ff03e7b35a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15410-sql-injection-in-code-projects-onli-512f39ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15410%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956c76cdb813ff03e78cd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69203-cwe-290-authentication-bypass-by-sp-a082b007</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69203%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=6956c3e8db813ff03e77f10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68619-cwe-94-improper-control-of-generati-6e946495</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68619%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=6956c3e8db813ff03e77f102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15409-sql-injection-in-code-projects-onli-d88f38b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15409%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956f1e1db813ff03e8571dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55065-cwe-89-improper-neutralization-of-s-db8f01f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55065%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kopek%20Reem%20ReKord%20client&amp;severity=high&amp;id=6956f1e1db813ff03e8571e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68620-cwe-288-authentication-bypass-using-28a1205e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68620%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=6956c3e8db813ff03e77f106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68273-cwe-200-exposure-of-sensitive-infor-4aa8ca46</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68273%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SignalK%20signalk-server&amp;severity=medium&amp;id=6956bce0db813ff03e75fde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68272-cwe-400-uncontrolled-resource-consu-b8c7fa57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68272%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SignalK%20signalk-server&amp;severity=high&amp;id=6956bce0db813ff03e75fdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21437-cwe-353-missing-support-for-integri-b87ca50f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21437%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20getsolus%20eopkg&amp;severity=low&amp;id=6956bce0db813ff03e75fdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21436-cwe-24-path-traversal-filedir-in-ge-e0e1ea95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21436%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20getsolus%20eopkg&amp;severity=medium&amp;id=6956bce0db813ff03e75fdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15408-sql-injection-in-code-projects-onli-b47ded96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15408%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956bce0db813ff03e75fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66398-cwe-78-improper-neutralization-of-s-ff983985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66398%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SignalK%20signalk-server&amp;severity=critical&amp;id=6956b95edb813ff03e75250c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21428-cwe-93-improper-neutralization-of-c-0e9b9e91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21428%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=6956b5dbdb813ff03e73e079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15407-sql-injection-in-code-projects-onli-f357110b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15407%3A%20SQL%20Injection%20in%20code-projects%20Online%20Guitar%20Store&amp;severity=medium&amp;id=6956b256db813ff03e730128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15406-missing-authorization-in-phpgurukul-900eb7ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15406%3A%20Missing%20Authorization%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=6956ab4edb813ff03e6ffc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47411-cwe-269-improper-privilege-manageme-3f471c13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47411%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20StreamPipes&amp;severity=high&amp;id=6956a7c9db813ff03e6f0ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14627-cwe-918-server-side-request-forgery-09da3e9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14627%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=medium&amp;id=6956a0c2db813ff03e6d157a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14428-cwe-862-missing-authorization-in-ga-62d49b42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14428%3A%20CWE-862%20Missing%20Authorization%20in%20galdub%20All-in-one%20Sticky%20Floating%20Contact%20Form%2C%20Call%2C%20Click%20to%20Chat%2C%20and%2050%2B%20Social%20Icon%20Tabs%20%20%E2%80%93%20My%20Sticky%20Elements&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48769-cwe-416-use-after-free-in-apache-so-56a89349</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48769%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48768-cwe-763-release-of-invalid-pointer--be0d46ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48768%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=medium&amp;id=6956a0c2db813ff03e6d1580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ghostad-drain-macos-attacks-pr-55121ae2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20GhostAd%20Drain%2C%20macOS%20Attacks%2C%20Proxy%20Botnets%2C%20Cloud%20Exploits%2C%20and%2012%2B%20Stories&amp;severity=medium&amp;id=6956f86fdb813ff03e871356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15405-cross-site-request-forgery-in-phpem-2015e739</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15405%3A%20Cross-Site%20Request%20Forgery%20in%20PHPEMS&amp;severity=medium&amp;id=69568f2edb813ff03e66b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-story-of-a-perfect-exploit-chain-six-bugs-that-01b02b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Story%20of%20a%20Perfect%20Exploit%20Chain%3A%20Six%20Bugs%20That%20Looked%20Harmless%20Until%20They%20Became%20Pre-Auth%20RCE%20in%20a%20Security%20Appliance&amp;severity=high&amp;id=69568bacdb813ff03e65d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15404-unrestricted-upload-in-campcodes-sc-cbf79a7b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15404%3A%20Unrestricted%20Upload%20in%20campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=69567a16db813ff03e61fb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-critical-react2shell-flaw-53322b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploits%20Critical%20React2Shell%20Flaw%20to%20Hijack%20IoT%20Devices%20and%20Web%20Servers&amp;severity=critical&amp;id=6956617adb813ff03e5b1417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-critical-react2shell-flaw-82c88218</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Exploits%20Critical%20React2Shell%20Flaw%20to%20Hijack%20IoT%20Devices%20and%20Web%20Servers&amp;severity=critical&amp;id=6956f86fdb813ff03e871359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0544-sql-injection-in-itsourcecode-school-7b433049</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0544%3A%20SQL%20Injection%20in%20itsourcecode%20School%20Management%20System&amp;severity=medium&amp;id=69563ad1db813ff03e5276ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11157-cwe-502-deserialization-of-untruste-512c4e8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20feast-dev%20feast-dev%2Ffeast&amp;severity=high&amp;id=6956f1e1db813ff03e8571ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13820-cwe-269-improper-privilege-manageme-eb286025</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13820%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Comments&amp;severity=medium&amp;id=695610a1db813ff03e43b0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2026-01-01-1e8a00ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202026-01-01&amp;severity=medium&amp;id=69570db0db813ff03e8cf12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69412-cwe-295-improper-certificate-valida-871316b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69412%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20KDE%20messagelib&amp;severity=low&amp;id=6955b1b6db813ff03e0732d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deedrat-unpacking-a-modern-backdoors-playbook-c3e3b2a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeedRAT%3A%20Unpacking%20a%20Modern%20Backdoor&apos;s%20Playbook&amp;severity=medium&amp;id=6957a4e6db813ff03ee16357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-european-space-agency-breach-selling-e82f758b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Claims%20European%20Space%20Agency%20Breach%2C%20Selling%20200GB%20of%20Data&amp;severity=high&amp;id=6955aaaadb813ff03e06314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67711-cwe-79-improper-neutralization-of-i-9cda60ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a72adb813ff03e05b24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67710-cwe-79-improper-neutralization-of-i-589cf50c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67709-cwe-79-improper-neutralization-of-i-072e1f66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67708-cwe-79-improper-neutralization-of-i-16ecd8a4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67707-cwe-434-unrestricted-upload-of-file-c14974c1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67707%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67706-cwe-434-unrestricted-upload-of-file-9ed6311b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67706%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67705-cwe-79-improper-neutralization-of-i-c34ddd48</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67704-cwe-79-improper-neutralization-of-i-0187848a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67703-cwe-79-improper-neutralization-of-i-aae6d110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=medium&amp;id=6955a3a5db813ff03e04e498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15398-weak-password-recovery-in-uasoft-ba-c23e7162</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15398%3A%20Weak%20Password%20Recovery%20in%20Uasoft%20badaso&amp;severity=medium&amp;id=6955a05adb813ff03e045d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69288-cwe-20-improper-input-validation-in-e6c8be90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69288%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kromitgmbh%20titra&amp;severity=critical&amp;id=6955a05adb813ff03e045d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69286-cwe-340-generation-of-predictable-n-5834d285</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69286%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69559c9ddb813ff03e037d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7332-cwe-1284-improper-validation-of-spec-06c42df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7332%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20pmmp%20PocketMine-MP&amp;severity=high&amp;id=69559919db813ff03e029ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68700-cwe-78-improper-neutralization-of-s-50efb60e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68700%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20infiniflow%20ragflow&amp;severity=high&amp;id=69559595db813ff03e01bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7331-sql-injection-in-pkrystian-full-stac-9be4e667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7331%3A%20SQL%20Injection%20in%20PKrystian%20Full-Stack-Bank&amp;severity=medium&amp;id=69559212db813ff03e014811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53235-cwe-79-improper-neutralization-of-i-7a64fbad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osuthorpe%20Easy%20Social&amp;severity=null&amp;id=69558786db813ff03eff62bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52739-cwe-79-improper-neutralization-of-i-00167716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Sala&amp;severity=high&amp;id=69558402db813ff03efee310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50053-cwe-79-improper-neutralization-of-i-78586778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nebelhorn%20Blappsta%20Mobile%20App%20Plugin%20%26%238211%3B%20Your%20native%2C%20mobile%20iPhone%20App%20and%20Android%20App&amp;severity=null&amp;id=69558402db813ff03efee30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31054-cwe-352-cross-site-request-forgery--9885f2f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31054%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themefy%20Bloggie&amp;severity=high&amp;id=69558402db813ff03efee30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30628-cwe-89-improper-neutralization-of-s-6b4c5419</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AA-Team%20Amazon%20Affiliates%20Addon%20for%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=high&amp;id=69558402db813ff03efee307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28973-cwe-35-path-traversal-in-aa-team-pr-3a591040</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28973%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20AA-Team%20Pro%20Bulk%20Watermark%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69558402db813ff03efee304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28949-cwe-89-improper-neutralization-of-s-1677eae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28949%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codedraft%20Mediabay%20-%20WordPress%20Media%20Library%20Folders&amp;severity=high&amp;id=69558402db813ff03efee301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23757-cwe-79-improper-neutralization-of-i-87e49272</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Proloy%20Chakroborty%20ZD%20Scribd%20iPaper&amp;severity=null&amp;id=69558403db813ff03efee336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23719-cwe-79-improper-neutralization-of-i-5ebea873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zckevin%20ZhinaTwitterWidget&amp;severity=null&amp;id=69558402db813ff03efee31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23707-cwe-79-improper-neutralization-of-i-03b9c366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matamko%20En%20Masse&amp;severity=high&amp;id=69558402db813ff03efee319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23705-cwe-79-improper-neutralization-of-i-3f486cf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23705%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20Zielke%20Zielke%20Design%20Project%20Gallery&amp;severity=high&amp;id=69558402db813ff03efee316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23667-cwe-79-improper-neutralization-of-i-6c7afbb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Christopher%20Churchill%20custom-post-edit&amp;severity=high&amp;id=69558402db813ff03efee313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66144-cwe-862-missing-authorization-in-me-6a8938c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66144%3A%20Missing%20Authorization%20in%20merkulove%20Worker%20for%20Elementor&amp;severity=high&amp;id=6955807ddb813ff03efdb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66145-cwe-862-missing-authorization-in-me-913f8fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66145%3A%20Missing%20Authorization%20in%20merkulove%20Worker%20for%20WPBakery&amp;severity=high&amp;id=6955807ddb813ff03efdb3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66146-cwe-862-missing-authorization-in-me-ee6451ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66146%3A%20Missing%20Authorization%20in%20merkulove%20Logger%20for%20Elementor&amp;severity=high&amp;id=6955807ddb813ff03efdb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66148-cwe-862-missing-authorization-in-me-204d435b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66148%3A%20Missing%20Authorization%20in%20merkulove%20Conformer%20for%20Elementor&amp;severity=high&amp;id=6955807ddb813ff03efdb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15394-code-injection-in-icms-6bc32797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15394%3A%20Code%20Injection%20in%20iCMS&amp;severity=medium&amp;id=695575f2db813ff03efb6cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34467-cwe-667-improper-locking-in-fredtem-85d211dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34467%3A%20CWE-667%20Improper%20Locking%20in%20fredtempez%20ZwiiCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66149-cwe-862-missing-authorization-in-me-b17fe228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66149%3A%20Missing%20Authorization%20in%20merkulove%20UnGrabber&amp;severity=high&amp;id=6955a05adb813ff03e045d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66150-cwe-862-missing-authorization-in-me-78c0fb6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66150%3A%20Missing%20Authorization%20in%20merkulove%20Appender&amp;severity=high&amp;id=6955a05adb813ff03e045d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66151-cwe-862-missing-authorization-in-me-b3b692d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66151%3A%20Missing%20Authorization%20in%20merkulove%20Countdowner%20for%20Elementor&amp;severity=high&amp;id=6955a05adb813ff03e045d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66152-cwe-862-missing-authorization-in-me-4ccaa334</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66152%3A%20Missing%20Authorization%20in%20merkulove%20Criptopayer%20for%20Elementor&amp;severity=high&amp;id=6955a05adb813ff03e045d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15393-code-injection-in-kohana-kodicms-e1c4a3c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15393%3A%20Code%20Injection%20in%20Kohana%20KodiCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66153-cwe-862-missing-authorization-in-me-8fe23e2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66153%3A%20Missing%20Authorization%20in%20merkulove%20Headinger%20for%20Elementor&amp;severity=high&amp;id=6955a05adb813ff03e045d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-screenconnect-common-social-engineering-tact-98835fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20ScreenConnect%3A%20Common%20Social%20Engineering%20Tactics%20Seen%20in%202025&amp;severity=medium&amp;id=6957a4e6db813ff03ee16364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15392-sql-injection-in-kohana-kodicms-40b92352</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15392%3A%20SQL%20Injection%20in%20Kohana%20KodiCMS&amp;severity=medium&amp;id=69556b65db813ff03ef8e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15391-command-injection-in-d-link-dir-806-a1fb2a5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15391%3A%20Command%20Injection%20in%20D-Link%20DIR-806A&amp;severity=medium&amp;id=695560d9db813ff03ef63216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49355-cwe-79-improper-neutralization-of-i-8f87f78c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ikaes%20Accessibility%20Press&amp;severity=null&amp;id=69555d55db813ff03ef562a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49337-cwe-79-improper-neutralization-of-i-3d4d9778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janhenckens%20Dashboard%20Beacon&amp;severity=null&amp;id=69555d55db813ff03ef562a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59135-cwe-79-improper-neutralization-of-i-1e2cf793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=high&amp;id=69555d55db813ff03ef562ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62989-cwe-79-improper-neutralization-of-i-2b34650c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gora%20Tech%20Cooked&amp;severity=high&amp;id=69555d55db813ff03ef562af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkspectre-browser-extension-campaigns-exposed-af-0d2585b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkSpectre%20Browser%20Extension%20Campaigns%20Exposed%20After%20Impacting%208.8%20Million%20Users%20Worldwide&amp;severity=high&amp;id=695559cedb813ff03ef4d8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-drain-39m-from-unleash-protocol-after-mult-085bde42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20drain%20%243.9M%20from%20Unleash%20Protocol%20after%20multisig%20hijack&amp;severity=high&amp;id=695559cedb813ff03ef4d8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-exploits-react2shell-flaw-to-breac-47841fbd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20botnet%20exploits%20React2Shell%20flaw%20to%20breach%20Next.js%20servers&amp;severity=high&amp;id=695559cedb813ff03ef4d8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23608-cwe-79-improper-neutralization-of-i-b2476142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Omar%20Mohamed%20Mohamoud%20LIVE%20TV&amp;severity=high&amp;id=69555d55db813ff03ef562b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62088-cwe-918-server-side-request-forgery-eb9235e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62088%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20extendons%20WordPress%20%26%20WooCommerce%20Scraper%20Plugin%2C%20Import%20Data%20from%20Any%20Site&amp;severity=high&amp;id=69555a03db813ff03ef4dd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59138-cwe-918-server-side-request-forgery-367c4873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59138%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Jthemes%20Genemy&amp;severity=high&amp;id=69555a03db813ff03ef4dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66154-cwe-862-missing-authorization-in-me-274a30f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66154%3A%20Missing%20Authorization%20in%20merkulove%20Couponer%20for%20Elementor&amp;severity=high&amp;id=69555a03db813ff03ef4dd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66155-cwe-862-missing-authorization-in-me-7a082f6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66155%3A%20Missing%20Authorization%20in%20merkulove%20Questionar%20for%20Elementor&amp;severity=high&amp;id=69555a03db813ff03ef4dd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66156-cwe-862-missing-authorization-in-me-2c35169b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66156%3A%20Missing%20Authorization%20in%20merkulove%20Watcher%20for%20Elementor&amp;severity=high&amp;id=69555a03db813ff03ef4dd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66157-cwe-862-missing-authorization-in-me-fa3c0c97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66157%3A%20Missing%20Authorization%20in%20merkulove%20Sliper%20for%20Elementor&amp;severity=high&amp;id=69555a03db813ff03ef4dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66158-cwe-862-missing-authorization-in-me-1ff036e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66158%3A%20Missing%20Authorization%20in%20merkulove%20Gmaper%20for%20Elementor&amp;severity=high&amp;id=69555650db813ff03ef42843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66159-cwe-862-missing-authorization-in-me-869c3d02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66159%3A%20Missing%20Authorization%20in%20merkulove%20Walker%20for%20Elementor&amp;severity=high&amp;id=69555650db813ff03ef42846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66160-cwe-862-missing-authorization-in-me-3ef29876</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66160%3A%20Missing%20Authorization%20in%20merkulove%20Select%20Graphist%20for%20Elementor%09%20Graphist%20for%20Elementor&amp;severity=high&amp;id=69555650db813ff03ef42849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63021-cwe-79-improper-neutralization-of-i-07278eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetipi%20Valenti%20Engine&amp;severity=high&amp;id=69555650db813ff03ef42852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62874-cwe-862-missing-authorization-in-al-58848d62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62874%3A%20Missing%20Authorization%20in%20Alexander%20AnyComment&amp;severity=medium&amp;id=69555650db813ff03ef4284f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62099-cwe-862-missing-authorization-in-ap-a05285fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62099%3A%20Missing%20Authorization%20in%20approveme%20Signature%20Add-On%20for%20Gravity%20Forms&amp;severity=high&amp;id=69555650db813ff03ef4284c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-1tb-of-stolen-asus-data-cbeaeca1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%201TB%20of%20Stolen%20ASUS%20Data&amp;severity=medium&amp;id=695552c7db813ff03ef38ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62101-cwe-352-cross-site-request-forgery--e283b53e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62101%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Omid%20Shamloo%20Pardakht%20Delkhah&amp;severity=medium&amp;id=695552dadb813ff03ef39011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63038-cwe-862-missing-authorization-in-no-03b772c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63038%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20WP%20Custom%20Admin%20Interface&amp;severity=high&amp;id=695552dadb813ff03ef3901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62078-cwe-862-missing-authorization-in-fa-d0cb0aa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62078%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Easy%20Upload%20Files%20During%20Checkout&amp;severity=high&amp;id=695552dadb813ff03ef3900b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49339-cwe-862-missing-authorization-in-di-67b9bb89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49339%3A%20Missing%20Authorization%20in%20Digages%20Direct%20Payments%20WP&amp;severity=null&amp;id=695552dadb813ff03ef39002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49340-cwe-497-exposure-of-sensitive-syste-4c7bbb15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49340%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Digages%20Direct%20Payments%20WP&amp;severity=null&amp;id=695552dadb813ff03ef39005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62083-cwe-497-exposure-of-sensitive-syste-0a947bc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62083%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Messiah%20BoomDevs%20WordPress%20Coming%20Soon&amp;severity=high&amp;id=695552dadb813ff03ef3900e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-hack-drains-85m-via--cb4c99ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20Extension%20Hack%20Drains%20%248.5M%20via%20Shai-Hulud%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=6955a5badb813ff03e056249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62113-cwe-352-cross-site-request-forgery--cc4c72e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20emendo_seb%20Co-marquage%20service-public.fr&amp;severity=medium&amp;id=695552dadb813ff03ef39014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62115-cwe-862-missing-authorization-in-th-741dfd42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62115%3A%20Missing%20Authorization%20in%20ThemeBoy%20Hide%20Plugins&amp;severity=medium&amp;id=695552dadb813ff03ef39017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62123-cwe-352-cross-site-request-forgery--a4c29170</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62123%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20inkthemes%20WP%20Gmail%20SMTP&amp;severity=medium&amp;id=695552dadb813ff03ef3901a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49352-cwe-639-authorization-bypass-throug-f24271a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49352%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20YoOhw%20Studio%20Order%20Cancellation%20%26amp%3B%20Returns%20for%20WooCommerce&amp;severity=null&amp;id=695552dadb813ff03ef39008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkspectre-browser-extension-campaigns-exposed-af-7a9aa111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkSpectre%20Browser%20Extension%20Campaigns%20Exposed%20After%20Impacting%208.8%20Million%20Users%20Worldwide&amp;severity=medium&amp;id=69554f35db813ff03ef2ee0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62087-cwe-862-missing-authorization-in-we-47519fde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62087%3A%20Missing%20Authorization%20in%20Web%20Builder%20143%20Sticky%20Notes%20for%20WP%20Dashboard&amp;severity=medium&amp;id=69554bc2db813ff03ef247f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63040-cwe-352-cross-site-request-forgery--cf7eb4f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63040%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20Post%20Snippets&amp;severity=medium&amp;id=69554bc2db813ff03ef2480b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49356-cwe-862-missing-authorization-in-my-f9f3b74e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49356%3A%20Missing%20Authorization%20in%20Mykola%20Lukin%20Orders%20Chat%20for%20WooCommerce&amp;severity=null&amp;id=69554bc2db813ff03ef247f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63004-cwe-862-missing-authorization-in-sk-79f15563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63004%3A%20Missing%20Authorization%20in%20Skynet%20Technologies%20USA%20LLC%20All%20in%20One%20Accessibility&amp;severity=high&amp;id=69554bc2db813ff03ef24808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62130-cwe-862-missing-authorization-in-wp-6fca1b7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62130%3A%20Missing%20Authorization%20in%20wpdiscover%20Accordion%20Slider%20Gallery&amp;severity=high&amp;id=69554bc2db813ff03ef247f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62131-cwe-862-missing-authorization-in-st-fd5cae27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62131%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Tasty%20Recipes%20Lite&amp;severity=medium&amp;id=69554bc2db813ff03ef247fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62132-cwe-862-missing-authorization-in-st-e1d606ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62132%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Tasty%20Recipes%20Lite&amp;severity=medium&amp;id=69554bc2db813ff03ef247ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62751-cwe-862-missing-authorization-in-ex-26e727a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62751%3A%20Missing%20Authorization%20in%20extendthemes%20Vireo&amp;severity=high&amp;id=69554bc2db813ff03ef24805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62133-cwe-352-cross-site-request-forgery--b7b8092c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62133%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20manidoraisamy%20FormFacade&amp;severity=medium&amp;id=69554bc2db813ff03ef24802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63014-cwe-352-cross-site-request-forgery--20991e06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Serhii%20Pasyuk%20Gmedia%20Photo%20Gallery&amp;severity=medium&amp;id=6955483edb813ff03ef16423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62089-cwe-352-cross-site-request-forgery--9ef0262b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62089%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MERGADO%20Mergado%20Pack&amp;severity=medium&amp;id=6955483edb813ff03ef16420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62084-cwe-352-cross-site-request-forgery--f1f1889f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62084%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Imdad%20Next%20Web%20iNext%20Woo%20Pincode%20Checker&amp;severity=medium&amp;id=6955483edb813ff03ef1641d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62143-cwe-497-exposure-of-sensitive-syste-7525ddcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62143%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20nicashmu%20Post%20Video%20Players&amp;severity=medium&amp;id=6955483edb813ff03ef1642c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62148-cwe-352-cross-site-request-forgery--fa6ccc15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62148%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eugen%20Bobrowski%20Robots.txt%20rewrite&amp;severity=medium&amp;id=6955483edb813ff03ef1642f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62080-cwe-352-cross-site-request-forgery--d39198ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62080%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Channelize.io%20Team%20Live%20Shopping%20%26amp%3B%20Shoppable%20Videos%20For%20WooCommerce&amp;severity=medium&amp;id=6955483edb813ff03ef16429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62150-cwe-862-missing-authorization-in-th-f41b7dae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62150%3A%20Missing%20Authorization%20in%20themesawesome%20History%20Timeline&amp;severity=high&amp;id=6955483edb813ff03ef16432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62154-cwe-862-missing-authorization-in-re-b500927e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62154%3A%20Missing%20Authorization%20in%20recorp%20AI%20Content%20Writing%20Assistant%20(Content%20Writer%2C%20ChatGPT%2C%20Image%20Generator)%20All%20in%20One&amp;severity=high&amp;id=695544badb813ff03ef0a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62114-cwe-497-exposure-of-sensitive-syste-cbd7ccf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62114%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20marcelotorres%20Download%20Media%20Library&amp;severity=high&amp;id=695544badb813ff03ef0a09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62116-cwe-862-missing-authorization-in-qu-6fe2f561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62116%3A%20Missing%20Authorization%20in%20quadlayers%20AI%20Copilot&amp;severity=high&amp;id=695544badb813ff03ef0a0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62122-cwe-862-missing-authorization-in-so-bc691faa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62122%3A%20Missing%20Authorization%20in%20solwininfotech%20Trash%20Duplicate%20and%20301%20Redirect&amp;severity=medium&amp;id=695544badb813ff03ef0a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62079-cwe-862-missing-authorization-in-da-aac35ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62079%3A%20Missing%20Authorization%20in%20Damian%20WP%20Export%20Categories%20%26amp%3B%20Taxonomies&amp;severity=high&amp;id=695544badb813ff03ef0a09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62126-cwe-201-insertion-of-sensitive-info-97ec1fe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62126%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Razvan%20Stanga%20Varnish%2FNginx%20Proxy%20Caching&amp;severity=high&amp;id=695544badb813ff03ef0a0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62747-cwe-862-missing-authorization-in-au-fb6d9152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62747%3A%20Missing%20Authorization%20in%20Aum%20Watcharapon%20Featured%20Image%20Generator&amp;severity=high&amp;id=695544badb813ff03ef0a0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15390-missing-authorization-in-phpgurukul-3f22c3e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15390%3A%20Missing%20Authorization%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=695544badb813ff03ef0a0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49334-cwe-639-authorization-bypass-throug-7ba91f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49334%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Eduardo%20Vill%C3%A3o%20MyD%20Delivery&amp;severity=null&amp;id=695544badb813ff03ef0a0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59136-cwe-201-insertion-of-sensitive-info-302417cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59136%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ef%C3%AD%20Bank%20Gerencianet%20Oficial&amp;severity=high&amp;id=695544bbdb813ff03ef0a0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62129-cwe-862-missing-authorization-in-ma-e5a443c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62129%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=high&amp;id=695544bbdb813ff03ef0a0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62755-cwe-862-missing-authorization-in-gs-35d1ef43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62755%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Portfolio%20for%20Envato&amp;severity=high&amp;id=695544bbdb813ff03ef0a0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63031-cwe-862-missing-authorization-in-wp-d471de04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63031%3A%20Missing%20Authorization%20in%20WP%20Grids%20EasyTest&amp;severity=high&amp;id=69553db2db813ff03eef57de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62139-cwe-201-insertion-of-sensitive-info-8f4af0c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62139%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=medium&amp;id=69553db2db813ff03eef57cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62141-cwe-862-missing-authorization-in-10-5817ecab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62141%3A%20Missing%20Authorization%20in%20Information%20Technology%20Wawp&amp;severity=high&amp;id=69553db2db813ff03eef57cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63022-cwe-862-missing-authorization-in-il-175a2223</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63022%3A%20Missing%20Authorization%20in%20topdevs.net%20Simple%20Like%20Page&amp;severity=high&amp;id=69553db2db813ff03eef57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63016-cwe-862-missing-authorization-in-qu-27876358</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63016%3A%20Missing%20Authorization%20in%20quadlayers%20QuadLayers%20TikTok%20Feed&amp;severity=medium&amp;id=69553db2db813ff03eef57d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62145-cwe-862-missing-authorization-in-ne-64ee547d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62145%3A%20Missing%20Authorization%20in%20NewClarity%20DMCA%20Protection%20Badge&amp;severity=high&amp;id=69553db2db813ff03eef57d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62147-cwe-862-missing-authorization-in-ni-505c3e00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62147%3A%20Missing%20Authorization%20in%20nikmelnik%20Realbig&amp;severity=high&amp;id=69553db2db813ff03eef57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62081-cwe-862-missing-authorization-in-ch-9e700cb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62081%3A%20Missing%20Authorization%20in%20Channelize.io%20Team%20Live%20Shopping%20%26amp%3B%20Shoppable%20Videos%20For%20WooCommerce&amp;severity=high&amp;id=69553db2db813ff03eef57c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63053-cwe-639-authorization-bypass-throug-a6842a92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63053%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69553db2db813ff03eef57e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63001-cwe-862-missing-authorization-in-ni-aea155ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63001%3A%20Missing%20Authorization%20in%20nicdark%20Hotel%20Booking&amp;severity=high&amp;id=69553db2db813ff03eef57e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49349-cwe-862-missing-authorization-in-re-a8c7f477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49349%3A%20Missing%20Authorization%20in%20Reuters%20News%20Agency%20Reuters%20Direct&amp;severity=null&amp;id=69553a2edb813ff03eee80f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62098-cwe-862-missing-authorization-in-to-bde5c667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62098%3A%20Missing%20Authorization%20in%20totalsoft%20Portfolio%20Gallery&amp;severity=high&amp;id=69553a2edb813ff03eee80fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-modified-shai-hulud-worm-testing--ce676bbe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Modified%20Shai-Hulud%20Worm%20Testing%20Payload%20on%20npm%20Registry&amp;severity=high&amp;id=695536a7db813ff03eedc9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62091-cwe-862-missing-authorization-in-vo-d1af9184</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62091%3A%20Missing%20Authorization%20in%20Vollstart%20Serial%20Codes%20Generator%20and%20Validator%20with%20WooCommerce%20Support&amp;severity=high&amp;id=69553327db813ff03eed15ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62108-cwe-862-missing-authorization-in-sa-a1859227</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62108%3A%20Missing%20Authorization%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=medium&amp;id=69553327db813ff03eed15d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62888-cwe-862-missing-authorization-in-ma-98cb41ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62888%3A%20Missing%20Authorization%20in%20Marco%20Milesi%20WP%20Attachments&amp;severity=high&amp;id=69553327db813ff03eed15d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62117-cwe-352-cross-site-request-forgery--8e4b073b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62117%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jayce53%20EasyIndex&amp;severity=high&amp;id=69552c1edb813ff03eeb80d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62120-cwe-352-cross-site-request-forgery--f607646d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62120%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rick%20Beckman%20OpenHook&amp;severity=high&amp;id=69552c1edb813ff03eeb80d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62134-cwe-352-cross-site-request-forgery--290dcac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62134%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Contact%20Form%20Widget&amp;severity=high&amp;id=69552c1edb813ff03eeb80da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62138-cwe-862-missing-authorization-in-ce-3bc81f11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62138%3A%20Missing%20Authorization%20in%20cedcommerce%20WP%20Advanced%20PDF&amp;severity=high&amp;id=69552c1edb813ff03eeb80dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62144-cwe-862-missing-authorization-in-mo-0e19e9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62144%3A%20Missing%20Authorization%20in%20Mohammed%20Kaludi%20Core%20Web%20Vitals%20%26%20PageSpeed%20Booster&amp;severity=high&amp;id=69552c1edb813ff03eeb80e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59003-cwe-201-insertion-of-sensitive-info-7bd636ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59003%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20inkthemescom%20ColorWay&amp;severity=high&amp;id=69552c1edb813ff03eeb80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62119-cwe-79-improper-neutralization-of-i-86b5ce16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ViitorCloud%20Technologies%20Pvt%20Ltd%20Add%20Featured%20Image%20Custom%20Link&amp;severity=high&amp;id=69552c1edb813ff03eeb80e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62121-cwe-79-improper-neutralization-of-i-c53868b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62121%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20Logo%20Slider%20%2C%20Logo%20Carousel%20%2C%20Logo%20showcase%20%2C%20Client%20Logo&amp;severity=high&amp;id=69552c1edb813ff03eeb80e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62124-cwe-79-improper-neutralization-of-i-98b9c41e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soli%20WP%20Post%20Signature&amp;severity=high&amp;id=6955289adb813ff03eeaf248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-warns-of-critical-api-connect-bug-allowing-rem-bb565a8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20CVSS%209.8%20Flaw%20Found%20in%20IBM%20API%20Connect%20Authentication%20System&amp;severity=critical&amp;id=6955a5badb813ff03e05624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62750-cwe-79-improper-neutralization-of-i-650996f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Filipe%20Seabra%20WooCommerce%20Parcelas&amp;severity=high&amp;id=6955289adb813ff03eeaf24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-modified-shai-hulud-worm-testing--421fc379</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Modified%20Shai-Hulud%20Worm%20Testing%20Payload%20on%20npm%20Registry&amp;severity=medium&amp;id=6955a5badb813ff03e05624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62140-cwe-79-improper-neutralization-of-i-9bc58405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62140%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20Locatoraid%20Store%20Locator&amp;severity=high&amp;id=6955289adb813ff03eeaf24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62142-cwe-79-improper-neutralization-of-i-b83b606e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicashmu%20Post%20Video%20Players&amp;severity=high&amp;id=69552525db813ff03eea3684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62149-cwe-79-improper-neutralization-of-i-0aa0931e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=medium&amp;id=69552525db813ff03eea3687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62095-cwe-79-improper-neutralization-of-i-620c571b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neilgee%20Bootstrap%20Modals&amp;severity=high&amp;id=69552525db813ff03eea367b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2-us-cybersecurity-experts-guilty-of-extortion-sch-fcbe7d20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2%20US%20Cybersecurity%20Experts%20Guilty%20of%20Extortion%20Scheme%20for%20ALPHV%20Ransomware&amp;severity=medium&amp;id=69552512db813ff03eea350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62096-cwe-79-improper-neutralization-of-i-2c423dda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Maximum%20Products%20per%20User%20for%20WooCommerce&amp;severity=high&amp;id=69552525db813ff03eea367e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62097-cwe-79-improper-neutralization-of-i-e7a7ac0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seothemes%20SEO%20Slider&amp;severity=high&amp;id=69552525db813ff03eea3681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63020-cwe-79-improper-neutralization-of-i-b03d3db9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wayne%20Allen%20Postie&amp;severity=high&amp;id=69552526db813ff03eea368a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62111-cwe-79-improper-neutralization-of-i-b0a35392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62111%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Extra%20Shortcodes&amp;severity=high&amp;id=69552191db813ff03ee950df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62118-cwe-79-improper-neutralization-of-i-5b4ec2dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kcseopro%20AdWords%20Conversion%20Tracking%20Code&amp;severity=high&amp;id=69552191db813ff03ee950e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62990-cwe-79-improper-neutralization-of-i-e77fb9e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Beaver%20Builder&amp;severity=high&amp;id=69552191db813ff03ee950ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62125-cwe-79-improper-neutralization-of-i-b57c70dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62125%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anshul%20Gangrade%20Custom%20Background%20Changer&amp;severity=high&amp;id=69552191db813ff03ee950e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62743-cwe-79-improper-neutralization-of-i-4b12da5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=high&amp;id=69552191db813ff03ee950e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62744-cwe-79-improper-neutralization-of-i-d9f25b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Steman%20Page%20Title%20Splitter&amp;severity=high&amp;id=69552191db813ff03ee950eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62748-cwe-79-improper-neutralization-of-i-9317f75a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Genetech%20Products%20Web%20and%20WooCommerce%20Addons%20for%20WPBakery%20Builder&amp;severity=high&amp;id=69554136db813ff03eefd38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49358-cwe-79-improper-neutralization-of-i-abb87ade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ruhul%20Amin%20Content%20Fetcher&amp;severity=null&amp;id=69554136db813ff03eefd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62749-cwe-79-improper-neutralization-of-i-a3888bd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bainternet%20User%20Specific%20Content&amp;severity=high&amp;id=69554136db813ff03eefd392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-supply-chain-attack-led-to-85-million-t-99716b1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20Supply%20Chain%20Attack%20Led%20to%20%248.5%20Million%20Trust%20Wallet%20Heist&amp;severity=low&amp;id=69551373db813ff03ee619cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62752-cwe-79-improper-neutralization-of-i-827f401c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kalender.digital%20Calendar.online%20%2F%20Kalender.digital&amp;severity=medium&amp;id=69551396db813ff03ee6224b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62135-cwe-79-improper-neutralization-of-i-00d7c0bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20landwire%20Responsive%20Block%20Control&amp;severity=high&amp;id=69551396db813ff03ee62248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62756-cwe-79-improper-neutralization-of-i-cfa6a678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lvaudore%20The%20Moneytizer&amp;severity=high&amp;id=69551396db813ff03ee6224e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62757-cwe-79-improper-neutralization-of-i-347986b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebMan%20Design%20%7C%20Oliver%20Juhas%20WebMan%20Amplifier&amp;severity=high&amp;id=69551023db813ff03ee548e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62991-cwe-79-improper-neutralization-of-i-4f8e3893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Minamaze&amp;severity=high&amp;id=69551023db813ff03ee548e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63032-cwe-79-improper-neutralization-of-i-54998eb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Consulting&amp;severity=high&amp;id=69551023db813ff03ee548ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disney-will-pay-10-million-to-settle-childrens-dat-837290e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disney%20will%20pay%20%2410%20million%20to%20settle%20children&apos;s%20data%20privacy%20lawsuit&amp;severity=high&amp;id=69550ffbdb813ff03ee545c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-warns-of-critical-api-connect-auth-bypass-vuln-46286c5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IBM%20warns%20of%20critical%20API%20Connect%20auth%20bypass%20vulnerability&amp;severity=critical&amp;id=69550ffbdb813ff03ee545bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/30000-korean-air-employee-records-stolen-as-cl0p-l-6a12adba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=30%2C000%20Korean%20Air%20Employee%20Records%20Stolen%20as%20Cl0p%20Leaks%20450gb%20of%20Data%20Online&amp;severity=medium&amp;id=69550c77db813ff03ee3e18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-space-agency-confirms-breach-after-hacker-0604158e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Space%20Agency%20Confirms%20Breach%20After%20Hacker%20Offers%20to%20Sell%20Data&amp;severity=medium&amp;id=6954f04bdb813ff03edbd02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15389-cwe-78-improper-neutralization-of-s-06a6e83f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15389%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954ecd6db813ff03edabf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-treasury-lifts-sanctions-on-three-individuals-l-b477d519</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Treasury%20Lifts%20Sanctions%20on%20Three%20Individuals%20Linked%20to%20Intellexa%20and%20Predator%20Spyware&amp;severity=high&amp;id=6954e94edb813ff03ed9a5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49028-cwe-352-cross-site-request-forgery--3021ae32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49028%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zoho%20Mail%20Zoho%20ZeptoMail&amp;severity=null&amp;id=6954e963db813ff03ed9a74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15388-cwe-78-improper-neutralization-of-s-1b98deb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15388%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954e963db813ff03ed9a746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62136-cwe-79-improper-neutralization-of-i-0e16f771</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkupthemes%20Melos&amp;severity=high&amp;id=6954e963db813ff03ed9a74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62992-cwe-352-cross-site-request-forgery--a39e955a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62992%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20everestthemes%20Everest%20Backup&amp;severity=high&amp;id=6954e963db813ff03ed9a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62137-cwe-79-improper-neutralization-of-i-569165d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shuttlethemes%20Shuttle&amp;severity=high&amp;id=6955a05adb813ff03e045d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62758-cwe-79-improper-neutralization-of-i-103b1b40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Funnelforms%20Funnelforms%20Free&amp;severity=high&amp;id=6955a05adb813ff03e045dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62759-cwe-79-improper-neutralization-of-i-a4b646d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Tadlock%20Series&amp;severity=high&amp;id=6955a05adb813ff03e045dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62760-cwe-79-improper-neutralization-of-i-cffb444d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20BuddyPress%20Activity%20Shortcode&amp;severity=high&amp;id=6955a05adb813ff03e045dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63000-cwe-79-improper-neutralization-of-i-e984071f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63000%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpforchurch%20Sermon%20Manager&amp;severity=high&amp;id=6955a05adb813ff03e045dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62146-cwe-79-improper-neutralization-of-i-72b6b7a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62146%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maksym%20Marko%20MX%20Time%20Zone%20Clocks&amp;severity=high&amp;id=6954e5cedb813ff03ed8c526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63005-cwe-79-improper-neutralization-of-i-a40c43d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20WordPress%20Tooltips&amp;severity=high&amp;id=6954e5cfdb813ff03ed8c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62761-cwe-79-improper-neutralization-of-i-89d84afb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BasePress%20Knowledge%20Base%20documentation%20%26%20wiki%20plugin%20%E2%80%93%20BasePress&amp;severity=high&amp;id=6954e5cfdb813ff03ed8c529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15387-cwe-331-insufficient-entropy-in-qno-d5d780dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15387%3A%20CWE-331%20Insufficient%20Entropy%20in%20QNO%20Technology%20VPN%20Firewall&amp;severity=high&amp;id=6954e24adb813ff03ed79303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15017-cwe-489-active-debug-code-in-moxa-n-8edd86b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15017%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Moxa%20NPort%205000AI-M12%20Series&amp;severity=high&amp;id=6954d7bedb813ff03ed404d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2026-cwe-170-improper-null-termination-in-2185ebc9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2026%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Moxa%20NPort%206100-G2%2F6200-G2%20Series&amp;severity=high&amp;id=6954d43bdb813ff03ed2b252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1977-cwe-250-execution-with-unnecessary-p-8abad923</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1977%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20NPort%206100-G2%2F6200-G2%20Series&amp;severity=high&amp;id=6954d0b7db813ff03ed1d613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14783-cwe-640-weak-password-recovery-mech-3c628701</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14783%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=6954c62bdb813ff03ece1113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14434-cwe-862-missing-authorization-in-ul-57a94541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14434%3A%20CWE-862%20Missing%20Authorization%20in%20Ultimate%20Post%20Kit%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6954bf22db813ff03ecb3d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13029-cwe-862-missing-authorization-in-kn-d68d7e05</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13029%3A%20CWE-862%20Missing%20Authorization%20in%20Knowband%20Mobile%20App%20Builder&amp;severity=high&amp;id=6954bf22db813ff03ecb3d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49342-cwe-352-cross-site-request-forgery--98f229ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20merzedes%20Custom%20Style&amp;severity=null&amp;id=6954bb9edb813ff03eca28b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49353-cwe-352-cross-site-request-forgery--ca82064b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marcin%20Kijak%20Noindex%20by%20Path&amp;severity=null&amp;id=6954b81adb813ff03ec990bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68885-cwe-352-cross-site-request-forgery--a88909d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68885%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20page-carbajal%20Custom%20Post%20Status&amp;severity=high&amp;id=6954b81adb813ff03ec990c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49354-cwe-352-cross-site-request-forgery--6349a428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49354%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mindstien%20Technologies%20Recent%20Posts%20From%20Each%20Category&amp;severity=null&amp;id=6954b81adb813ff03ec990c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49343-cwe-352-cross-site-request-forgery--3a693984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialprofilr%20Social%20Profilr&amp;severity=null&amp;id=6954b81adb813ff03ec990c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49344-cwe-352-cross-site-request-forgery--7d3723af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20reneade%20SensitiveTagCloud&amp;severity=null&amp;id=6954b81adb813ff03ec990c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49345-cwe-352-cross-site-request-forgery--512892cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49345%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mg12%20WP-EasyArchives&amp;severity=null&amp;id=6954b496db813ff03ec88a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-treasury-lifts-sanctions-on-three-individuals-l-1386f087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Treasury%20Lifts%20Sanctions%20on%20Three%20Individuals%20Linked%20to%20Intellexa%20and%20Predator%20Spyware&amp;severity=low&amp;id=6955a5badb813ff03e056252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15375-deserialization-in-eyoucms-252aafab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15375%3A%20Deserialization%20in%20EyouCMS&amp;severity=medium&amp;id=6954b113db813ff03ec76317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49346-cwe-352-cross-site-request-forgery--3e5e70f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49346%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20peterwsterling%20Simple%20Archive%20Generator&amp;severity=null&amp;id=69556460db813ff03ef78082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59137-cwe-352-cross-site-request-forgery--b5d86e7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=high&amp;id=69556460db813ff03ef78085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15374-cross-site-scripting-in-eyoucms-25a6e41b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15374%3A%20Cross%20Site%20Scripting%20in%20EyouCMS&amp;severity=medium&amp;id=6955a05adb813ff03e045dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15373-server-side-request-forgery-in-eyou-f3bf806f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15373%3A%20Server-Side%20Request%20Forgery%20in%20EyouCMS&amp;severity=medium&amp;id=6954a302db813ff03ec15f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15223-cross-site-scripting-in-philipinho--e4573780</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15223%3A%20Cross%20Site%20Scripting%20in%20Philipinho%20Simple-PHP-Blog&amp;severity=medium&amp;id=69548debdb813ff03e97609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15372-cross-site-scripting-in-youlaitech--27a6541b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15372%3A%20Cross%20Site%20Scripting%20in%20youlaitech%20vue3-element-admin&amp;severity=medium&amp;id=69548debdb813ff03e9760a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68131-cwe-212-improper-removal-of-sensiti-44fcde2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68131%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20agronholm%20cbor2&amp;severity=medium&amp;id=6954835edb813ff03e856042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15371-hard-coded-credentials-in-tenda-i24-b8cfa17a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15371%3A%20Hard-coded%20Credentials%20in%20Tenda%20i24&amp;severity=high&amp;id=69547c56db813ff03e760a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11964-cwe-787-out-of-bounds-write-in-the--73861582</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11964%3A%20CWE-787%20Out-of-bounds%20Write%20in%20The%20Tcpdump%20Group%20libpcap&amp;severity=low&amp;id=69547c56db813ff03e760a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11961-cwe-126-buffer-over-read-in-the-tcp-6c702504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11961%3A%20CWE-126%20Buffer%20Over-read%20in%20The%20Tcpdump%20Group%20libpcap&amp;severity=low&amp;id=69547c56db813ff03e760a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-31-9c886a19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-31&amp;severity=medium&amp;id=6955bc30db813ff03e0aca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64699-na-f1e1679d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64699%3A%20n%2Fa&amp;severity=high&amp;id=6955483edb813ff03ef16426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61037-na-aa254d3a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61037%3A%20n%2Fa&amp;severity=high&amp;id=695544badb813ff03ef0a097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-errtraffic-service-enables-clickfix-attacks-vi-eb9c3eff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ErrTraffic%20service%20enables%20ClickFix%20attacks%20via%20fake%20browser%20glitches&amp;severity=high&amp;id=69546032db813ff03e4e3dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59131-cwe-352-cross-site-request-forgery--25075ae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59131%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hoernerfranz%20WP-CalDav2ICS&amp;severity=high&amp;id=69545cb1db813ff03e4d2622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15114-exposure-of-file-descriptor-to-unin-a925b5ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15114%3A%20CWE-403%20Exposure%20of%20file%20descriptor%20to%20unintended%20control%20sphere%20(&apos;file%20descriptor%20leak&apos;)%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592fdb813ff03e385603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15113-plaintext-storage-of-a-password-in--a52c6363</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15113%3A%20CWE-256%20Plaintext%20storage%20of%20a%20password%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592edb813ff03e38559a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15112-url-redirection-to-untrusted-site-o-ef02bf18</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15112%3A%20CWE-601%20URL%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=medium&amp;id=6954592edb813ff03e385594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15111-use-of-hard-coded-credentials-in-ks-0c8678d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15111%3A%20CWE-259%20Use%20of%20hard-coded%20password%20in%20Ksenia%20Security%20S.p.A.%20lares&amp;severity=critical&amp;id=6954592edb813ff03e38558e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58338-incorrect-privilege-assignment-in-a-f7694504</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58338%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ateme%20Flamingo%20XL&amp;severity=high&amp;id=6954592edb813ff03e385588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58337-missing-authorization-in-the-akuvox-a564647c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58337%3A%20Missing%20Authorization%20in%20The%20Akuvox%20Company%20Akuvox%20Smart%20Doorphone&amp;severity=high&amp;id=6954592edb813ff03e385582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58336-missing-authentication-for-critical-bebc812d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58336%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20The%20Akuvox%20Company%20Akuvox%20Smart%20Doorphone&amp;severity=high&amp;id=6954592edb813ff03e38557d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58315-unquoted-search-path-or-element-in--1de85834</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58315%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Tosibox%20Oy%20Tosibox%20Key%20Service&amp;severity=high&amp;id=6954592edb813ff03e385577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54327-missing-authorization-in-tinycontro-2d7878f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54327%3A%20Missing%20Authorization%20in%20Tinycontrol%20LAN%20Controller&amp;severity=critical&amp;id=6954592edb813ff03e385571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54163-improper-neutralization-of-special--5582e714</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54163%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NLB%20Banka%20AD%20Skopje%20NLB%20mKlik%20Makedonija&amp;severity=high&amp;id=6954592edb813ff03e38556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53983-use-of-hard-coded-credentials-in-at-6648bf40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53983%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Ateme%20Anevia%20Flamingo%20XL%2FXS&amp;severity=critical&amp;id=6954592edb813ff03e385562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62753-cwe-98-improper-control-of-filename-8e384849</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62753%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20MadrasThemes%20MAS%20Videos&amp;severity=high&amp;id=695455a9db813ff03e324076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csa-issues-alert-on-critical-smartermail-bug-allow-cc967373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSA%20Issues%20Alert%20on%20Critical%20SmarterMail%20Bug%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69545221db813ff03e2d7848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15360-unrestricted-upload-in-newbee-mall--699c458f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15360%3A%20Unrestricted%20Upload%20in%20newbee-mall-plus&amp;severity=medium&amp;id=695450a0db813ff03e2bda58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmm-abuse-in-a-crypto-wallet-distribution-campaign-d22731d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMM%20Abuse%20in%20a%20Crypto%20Wallet%20Distribution%20Campaign&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61594-cwe-212-improper-removal-of-sensiti-3dd18d0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61594%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20ruby%20uri&amp;severity=low&amp;id=695450a0db813ff03e2bda74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15357-command-injection-in-d-link-di-7400-64a89479</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15357%3A%20Command%20Injection%20in%20D-Link%20DI-7400G%2B&amp;severity=medium&amp;id=695450a0db813ff03e2bda6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15356-buffer-overflow-in-tenda-ac20-636a2f51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15356%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=695450a0db813ff03e2bda65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15354-sql-injection-in-itsourcecode-socie-340a17be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15354%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695450a0db813ff03e2bda5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15353-sql-injection-in-itsourcecode-socie-7dfac788</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15353%3A%20SQL%20Injection%20in%20itsourcecode%20Society%20Management%20System&amp;severity=medium&amp;id=695450a1db813ff03e2be01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69210-cwe-79-improper-neutralization-of-i-1a9d8f07</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NeoRazorX%20facturascripts&amp;severity=low&amp;id=695450a1db813ff03e2be029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69257-cwe-269-improper-privilege-manageme-c5fbd534</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69257%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20AsfhtgkDavid%20theshit&amp;severity=medium&amp;id=695450a2db813ff03e2be05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15264-server-side-request-forgery-in-feeh-0a3813c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15264%3A%20Server-Side%20Request%20Forgery%20in%20FeehiCMS&amp;severity=medium&amp;id=695450a2db813ff03e2be06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15263-sql-injection-in-biggidroid-simple--9e020cc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15263%3A%20SQL%20Injection%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450a2db813ff03e2be067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cybersecurity-experts-plead-guilty-to-blackcat--106a8c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20cybersecurity%20experts%20plead%20guilty%20to%20BlackCat%20ransomware%20attacks&amp;severity=high&amp;id=69544fcedb813ff03e2aff49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-stealer-browser-extensions-harvest-corporate--24a26564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20Stealer%20browser%20extensions%20harvest%20corporate%20meeting%20intelligence&amp;severity=high&amp;id=69544fcedb813ff03e2aff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-space-agency-confirms-breach-of-external--64ace173</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Space%20Agency%20confirms%20breach%20of%20%22external%20servers%22&amp;severity=high&amp;id=69544fcedb813ff03e2aff3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15262-unrestricted-upload-in-biggidroid-s-197472c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15262%3A%20Unrestricted%20Upload%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450a2db813ff03e2be061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15258-open-redirect-in-edimax-br-6208ac-0c363eb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15258%3A%20Open%20Redirect%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15257-command-injection-in-edimax-br-6208-05538cbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15257%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emeditor-homepage-download-button-served-malware-f-8bb957e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EmEditor%20Homepage%20Download%20Button%20Served%20Malware%20for%204%20Days&amp;severity=medium&amp;id=69544fc0db813ff03e2ae6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52835-cwe-352-cross-site-request-forgery--2b72c46b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52835%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ConoHa%20by%20GMO%20WING%20WordPress%20Migrator&amp;severity=null&amp;id=695450a2db813ff03e2be072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66103-cwe-79-improper-neutralization-of-i-4b1cbf27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revmakx%20WPCal.io&amp;severity=high&amp;id=695450a2db813ff03e2be078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15256-command-injection-in-edimax-br-6208-5b03bee1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15256%3A%20Command%20Injection%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=695450a4db813ff03e2be132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csa-issues-alert-on-critical-smartermail-bug-allow-6a5b9593</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSA%20Issues%20Alert%20on%20Critical%20SmarterMail%20Bug%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=69544e28b932a5a22ffaf4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62128-cwe-862-missing-authorization-in-si-428acc57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62128%3A%20Missing%20Authorization%20in%20SiteLock%20SiteLock%20Security%20%E2%80%93%20WP%20Hardening%2C%20Login%20Security%20%26%20Malware%20Scans&amp;severity=medium&amp;id=695450a2db813ff03e2be075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62112-cwe-352-cross-site-request-forgery--0fc85d30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62112%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Merv%20Barrett%20Import%20into%20Easy%20Property%20Listings&amp;severity=medium&amp;id=695450a1db813ff03e2be038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66094-cwe-79-improper-neutralization-of-i-46c1141e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dmccan%20Yada%20Wiki&amp;severity=high&amp;id=695450a1db813ff03e2be03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62746-cwe-79-improper-neutralization-of-i-67d31b3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeFlavors%20Featured%20Video%20for%20WordPress%20%26%238211%3B%20VideographyWP&amp;severity=high&amp;id=695450a4db813ff03e2be15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66080-cwe-862-missing-authorization-in-wp-862fff27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66080%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=695450a1db813ff03e2be03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63027-cwe-79-improper-neutralization-of-i-a7054129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcreations907%20WBC907%20Core&amp;severity=high&amp;id=695450a1db813ff03e2be032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15255-stack-based-buffer-overflow-in-tend-1583de47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15255%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W6-S&amp;severity=critical&amp;id=695450a4db813ff03e2be12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64190-cwe-79-improper-neutralization-of-i-81420c60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=695450a1db813ff03e2be035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15254-os-command-injection-in-tenda-w6-s-41775fb0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15254%3A%20OS%20Command%20Injection%20in%20Tenda%20W6-S&amp;severity=medium&amp;id=695450aadb813ff03e2be6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeymyte-aka-mustang-panda-deploys-toneshell-back-964db2ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HoneyMyte%20(aka%20Mustang%20Panda)%20Deploys%20ToneShell%20Backdoor%20in%20New%20Attacks%20in%20South%20and%20East%20Asia&amp;severity=medium&amp;id=69544fcedb813ff03e2aff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15253-stack-based-buffer-overflow-in-tend-640eb944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15253%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450a8db813ff03e2be5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15252-stack-based-buffer-overflow-in-tend-4997a533</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15252%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450acdb813ff03e2bebb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15251-xml-external-entity-reference-in-be-6f953def</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15251%3A%20XML%20External%20Entity%20Reference%20in%20beecue%20FastBee&amp;severity=medium&amp;id=695450acdb813ff03e2bebc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15250-code-injection-in-08cms-novel-syste-a3583dc0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15250%3A%20Code%20Injection%20in%2008CMS%20Novel%20System&amp;severity=medium&amp;id=695450acdb813ff03e2bebe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lithuanian-suspect-arrested-over-kmsauto-malware-t-cf50bf54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lithuanian%20suspect%20arrested%20over%20KMSAuto%20malware%20that%20infected%202.8M%20systems&amp;severity=medium&amp;id=69544fcedb813ff03e2affba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ai-generated-images-to-get-refunds-schneier--5d3434fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20AI-Generated%20Images%20to%20Get%20Refunds%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=69544fcedb813ff03e2affbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15249-cross-site-scripting-in-zhujunliang-2e8fa958</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15249%3A%20Cross%20Site%20Scripting%20in%20zhujunliang3%20work_platform&amp;severity=medium&amp;id=695450acdb813ff03e2bebde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15248-cross-site-scripting-in-sunhailin12-c69da681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15248%3A%20Cross%20Site%20Scripting%20in%20sunhailin12315%20product-review%20%E5%95%86%E5%93%81%E8%AF%84%E4%BB%B7%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=695450aedb813ff03e2bec41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54290-b533dfb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54290&amp;severity=null&amp;id=695450acdb813ff03e2bebf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14426-cwe-862-missing-authorization-in-wp-5b787ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14426%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=695450aedb813ff03e2bec24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54256-52aaefa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54256&amp;severity=null&amp;id=695450acdb813ff03e2bebf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54212-97d75d3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54212&amp;severity=null&amp;id=695450addb813ff03e2bec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15247-heap-based-buffer-overflow-in-gmg13-4120c6a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15247%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=695450aedb813ff03e2bec3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emeditor-homepage-download-button-served-malware-f-c0e21a85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EmEditor%20Homepage%20Download%20Button%20Served%20Malware%20for%204%20Days&amp;severity=medium&amp;id=69544fcedb813ff03e2aff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15246-deserialization-in-aizuda-snail-job-fa75406e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15246%3A%20Deserialization%20in%20aizuda%20snail-job&amp;severity=medium&amp;id=695450aedb813ff03e2bec37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14509-cwe-94-improper-control-of-generati-132e9f08</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Lucky%20Wheel%20for%20WooCommerce%20%E2%80%93%20Spin%20a%20Sale&amp;severity=high&amp;id=695450aedb813ff03e2bec2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15245-path-traversal-in-d-link-dcs-850l-3cefefd3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15245%3A%20Path%20Traversal%20in%20D-Link%20DCS-850L&amp;severity=medium&amp;id=695450aedb813ff03e2bec30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69093-missing-authorization-in-wpdesk-sho-245812d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69093%3A%20Missing%20Authorization%20in%20wpdesk%20ShopMagic&amp;severity=medium&amp;id=695450b1db813ff03e2bedf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69092-improper-neutralization-of-input-du-bb113c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=medium&amp;id=695450b1db813ff03e2bedf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69091-missing-authorization-in-kraft-plug-9ffa6e69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69091%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Demo%20Importer%20Plus&amp;severity=medium&amp;id=695450b1db813ff03e2bedf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69089-improper-neutralization-of-input-du-d5f69fa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20autolistings%20Auto%20Listings&amp;severity=medium&amp;id=695450b1db813ff03e2beded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69088-improper-neutralization-of-input-du-0e83a9a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vidish%20Combo%20Offers%20WooCommerce&amp;severity=medium&amp;id=695450b1db813ff03e2bedea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69034-improper-control-of-filename-for-in-8e0f4c1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Lekker&amp;severity=high&amp;id=695450b1db813ff03e2bede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69033-improper-neutralization-of-input-du-ef201e11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A%20WP%20Life%20Blog%20Filter&amp;severity=medium&amp;id=695450b1db813ff03e2bede4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69032-authorization-bypass-through-user-c-2717c1c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69032%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20FiveStar&amp;severity=medium&amp;id=695450b0db813ff03e2bedd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69031-missing-authorization-in-skywarrior-dd6f718f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69031%3A%20Missing%20Authorization%20in%20Skywarrior%20Arcane&amp;severity=medium&amp;id=695450b0db813ff03e2bedcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69030-authorization-bypass-through-user-c-962b0239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69030%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mikado-Themes%20Backpack%20Traveler&amp;severity=medium&amp;id=695450b0db813ff03e2bedca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69029-authorization-bypass-through-user-c-6e658217</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69029%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Select-Themes%20Struktur&amp;severity=medium&amp;id=695450b0db813ff03e2bedc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69028-missing-authorization-in-boldgrid-w-28551582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69028%3A%20Missing%20Authorization%20in%20BoldGrid%20weForms&amp;severity=medium&amp;id=695450b0db813ff03e2bedc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69027-missing-authorization-in-tychesoftw-6a6d812e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69027%3A%20Missing%20Authorization%20in%20tychesoftwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=695450b0db813ff03e2bedc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69026-exposure-of-sensitive-system-inform-02a01682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69026%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Roxnor%20PopupKit&amp;severity=medium&amp;id=695450b0db813ff03e2bedbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69025-exposure-of-sensitive-system-inform-c5da4af7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69025%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Aethonic%20Poptics&amp;severity=medium&amp;id=695450b0db813ff03e2bedbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69024-missing-authorization-in-bizswoop-b-ced31511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69024%3A%20Missing%20Authorization%20in%20bizswoop%20BizPrint&amp;severity=medium&amp;id=695450b0db813ff03e2bedb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69023-missing-authorization-in-marketing--0592e86d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69023%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Discussion%20Board&amp;severity=medium&amp;id=695450b0db813ff03e2bedb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69022-missing-authorization-in-weblizar-w-f91a4c03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69022%3A%20Missing%20Authorization%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20HR%20Management%20Lite&amp;severity=medium&amp;id=695450afdb813ff03e2bec74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69021-cross-site-request-forgery-csrf-in--4c2a67c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69021%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Popup%20box&amp;severity=medium&amp;id=695450afdb813ff03e2bec71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69020-improper-neutralization-of-input-du-d3a1bf4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=medium&amp;id=695450acdb813ff03e2bebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69018-improper-neutralization-of-input-du-e90cd5b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=medium&amp;id=695450acdb813ff03e2bebc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69017-improper-neutralization-of-input-du-6a8f1e84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=695450acdb813ff03e2bebdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69016-missing-authorization-in-averta-sho-b64e0b83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69016%3A%20Missing%20Authorization%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=695450acdb813ff03e2bebd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69015-missing-authorization-in-automattic-1f78b122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69015%3A%20Missing%20Authorization%20in%20Automattic%20Crowdsignal%20Forms&amp;severity=low&amp;id=695450acdb813ff03e2bebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69013-missing-authorization-in-jetmonster-cb458efb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69013%3A%20Missing%20Authorization%20in%20jetmonsters%20Stratum&amp;severity=medium&amp;id=695450addb813ff03e2bec0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69012-missing-authorization-in-stephen-ha-16dff902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69012%3A%20Missing%20Authorization%20in%20Stephen%20Harris%20Event%20Organiser&amp;severity=medium&amp;id=695450acdb813ff03e2bebe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69010-missing-authorization-in-themebeez--a3c01909</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69010%3A%20Missing%20Authorization%20in%20themebeez%20Themebeez%20Toolkit&amp;severity=medium&amp;id=695450addb813ff03e2bec00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69009-missing-authorization-in-kamleshyad-69c0c703</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69009%3A%20Missing%20Authorization%20in%20kamleshyadav%20Medicalequipment&amp;severity=medium&amp;id=695450addb813ff03e2bec08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69008-improper-neutralization-of-input-du-143372f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Inboxify%20Inboxify%20Sign%20Up%20Form&amp;severity=medium&amp;id=695450addb813ff03e2bec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69007-improper-neutralization-of-input-du-ffab4867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69007%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Popping%20Sidebars%20and%20Widgets%20Light&amp;severity=medium&amp;id=695450acdb813ff03e2beba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69006-improper-neutralization-of-input-du-b6aa829a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atte%20Moisio%20AM%20Events&amp;severity=medium&amp;id=695450acdb813ff03e2bebbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68998-cross-site-request-forgery-csrf-in--452db036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68998%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Heateor%20Support%20Heateor%20Social%20Login&amp;severity=medium&amp;id=695450acdb813ff03e2beb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68997-authorization-bypass-through-user-c-30f73078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68997%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AdvancedCoding%20wpDiscuz&amp;severity=medium&amp;id=695450abdb813ff03e2beb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68996-improper-control-of-filename-for-in-e0f709c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68996%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=695450abdb813ff03e2beb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68995-missing-authorization-in-gal-dubins-ae0190c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68995%3A%20Missing%20Authorization%20in%20Premio%20My%20Sticky%20Elements&amp;severity=medium&amp;id=695450aadb813ff03e2be6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68994-missing-authorization-in-xforwoocom-c40b8f2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68994%3A%20Missing%20Authorization%20in%20XforWooCommerce%20Product%20Loops%20for%20WooCommerce&amp;severity=medium&amp;id=695450a9db813ff03e2be64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68993-missing-authorization-in-xforwoocom-e57b2278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68993%3A%20Missing%20Authorization%20in%20XforWooCommerce%20Share%2C%20Print%20and%20PDF%20Products%20for%20WooCommerce&amp;severity=medium&amp;id=695450a9db813ff03e2be641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68992-improper-neutralization-of-input-du-6b4cfd8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Knowledge%20Base%20Manager&amp;severity=medium&amp;id=695450a9db813ff03e2be63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68991-improper-neutralization-of-input-du-44839d6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xenioushk%20BWL%20Pro%20Voting%20Manager&amp;severity=medium&amp;id=695450a1db813ff03e2be026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68990-improper-neutralization-of-special--b3c6bf13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68990%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xenioushk%20BWL%20Pro%20Voting%20Manager&amp;severity=critical&amp;id=695450a0db813ff03e2bda55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68989-insertion-of-sensitive-information--8d7b877b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68989%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Renzo%20Johnson%20contact-form-7-mailchimp-extension&amp;severity=high&amp;id=695450a0db813ff03e2bda52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68988-exposure-of-sensitive-system-inform-432d43b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68988%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20o2oe%20E-Invoice%20App%20Malaysia&amp;severity=high&amp;id=695450a0db813ff03e2bda4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68987-improper-control-of-filename-for-in-07595cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68987%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Cinerama&amp;severity=critical&amp;id=695450a0db813ff03e2bda4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68985-improper-control-of-filename-for-in-34ad655a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68985%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=critical&amp;id=695450afdb813ff03e2bec6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68984-improper-control-of-filename-for-in-e7167b64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68984%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Puca&amp;severity=critical&amp;id=695450afdb813ff03e2bec6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68983-improper-control-of-filename-for-in-08a0e879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68983%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Greenmart&amp;severity=critical&amp;id=695450afdb813ff03e2bec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68982-missing-authorization-in-designthem-6304d88c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68982%3A%20Missing%20Authorization%20in%20designthemes%20DesignThemes%20LMS%20Addon&amp;severity=high&amp;id=695450afdb813ff03e2bec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68981-missing-authorization-in-designthem-ed8824ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68981%3A%20Missing%20Authorization%20in%20designthemes%20HomeFix%20Elementor%20Portfolio&amp;severity=high&amp;id=695450afdb813ff03e2bec62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68980-missing-authorization-in-designthem-3030acad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68980%3A%20Missing%20Authorization%20in%20designthemes%20WeDesignTech%20Portfolio&amp;severity=high&amp;id=695450afdb813ff03e2bec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68979-authorization-bypass-through-user-c-84e8b0f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68979%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SimpleCalendar%20Google%20Calendar%20Events&amp;severity=high&amp;id=695450afdb813ff03e2bec5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68978-improper-neutralization-of-input-du-f51a4c5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core&amp;severity=medium&amp;id=695450a8db813ff03e2be601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68977-improper-neutralization-of-input-du-d2b76d73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Portfolio%20Addon&amp;severity=medium&amp;id=695450a8db813ff03e2be5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68976-missing-authorization-in-eagle-them-fc580b29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68976%3A%20Missing%20Authorization%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=695450afdb813ff03e2bec59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68975-authorization-bypass-through-user-c-aa7835f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68975%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Eagle-Themes%20Eagle%20Booking&amp;severity=high&amp;id=695450aedb813ff03e2bec4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68974-improper-control-of-filename-for-in-f15e34c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68974%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20WordPress%20Social%20Login%20and%20Register&amp;severity=critical&amp;id=695450aedb813ff03e2bec49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-targets-indian-users-with-tax-themed-em-52559c67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Targets%20Indian%20Users%20With%20Tax-Themed%20Emails%20Delivering%20ValleyRAT%20Malware&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15244-race-condition-in-phpems-0f365c23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15244%3A%20Race%20Condition%20in%20PHPEMS&amp;severity=medium&amp;id=695450a6db813ff03e2be31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-mustang-panda-caught-using-kernel-mode-09a5fa0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Mustang%20Panda%20Caught%20Using%20Kernel-Mode%20Rootkit&amp;severity=medium&amp;id=69544f40db813ff03e2a1839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-to-split-117-billion-among-337-million-dat-549885c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20to%20split%20%241.17%20billion%20among%2033.7%20million%20data%20breach%20victims&amp;severity=high&amp;id=69544fcedb813ff03e2aff39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-uses-signed-kernel-mode-rootkit-to-l-795f651d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Uses%20Signed%20Kernel-Mode%20Rootkit%20to%20Load%20TONESHELL%20Backdoor&amp;severity=high&amp;id=69544fcedb813ff03e2aff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15243-sql-injection-in-code-projects-simp-c1a47f83</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15243%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15242-race-condition-in-phpems-c450a593</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15242%3A%20Race%20Condition%20in%20PHPEMS&amp;severity=low&amp;id=695450a6db813ff03e2be310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15359-cwe-787-out-of-bounds-write-in-delt-fb40b2a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15359%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=critical&amp;id=695450a8db813ff03e2be60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15358-cwe-20-improper-input-validation-in-35bfe4f8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15358%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=high&amp;id=695450a8db813ff03e2be60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15241-open-redirect-in-cloudpanel-communi-ce6222c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15241%3A%20Open%20Redirect%20in%20CloudPanel%20Community%20Edition&amp;severity=medium&amp;id=695450acdb813ff03e2bebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15103-cwe-200-exposure-of-sensitive-infor-f235f3c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15103%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=high&amp;id=695450a5db813ff03e2be182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korean-air-data-compromised-in-oracle-ebs-hack-b93ec7b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korean%20Air%20Data%20Compromised%20in%20Oracle%20EBS%20Hack&amp;severity=medium&amp;id=69544f40db813ff03e2a183c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15102-cwe-288-authentication-bypass-using-8ef45d07</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15102%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Delta%20Electronics%20DVP-12SE11T&amp;severity=critical&amp;id=695450a5db813ff03e2be17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-uses-signed-kernel-mode-rootkit-to-l-32bee55b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Uses%20Signed%20Kernel-Mode%20Rootkit%20to%20Load%20TONESHELL%20Backdoor&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15234-heap-based-buffer-overflow-in-tenda-5ac9b0ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15234%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450acdb813ff03e2beba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15233-heap-based-buffer-overflow-in-tenda-ae002c8c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15233%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15355-cwe-79-improper-neutralization-of-i-418490c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetVision%20Information%20ISOinsight&amp;severity=medium&amp;id=695450a8db813ff03e2be5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15232-stack-based-buffer-overflow-in-tend-b36a6e32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15232%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15231-stack-based-buffer-overflow-in-tend-c0b871dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15231%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15230-heap-based-buffer-overflow-in-tenda-5c1e8035</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15230%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=695450abdb813ff03e2beb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15229-denial-of-service-in-tenda-ch22-0b25f925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15229%3A%20Denial%20of%20Service%20in%20Tenda%20CH22&amp;severity=medium&amp;id=695450abdb813ff03e2beb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14313-cwe-79-cross-site-scripting-xss-in--9f819fdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14313%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advance%20WP%20Query%20Search%20Filter&amp;severity=medium&amp;id=695450a5db813ff03e2be17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14312-cwe-79-cross-site-scripting-xss-in--6c65ee47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14312%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advance%20WP%20Query%20Search%20Filter&amp;severity=medium&amp;id=695450a5db813ff03e2be179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15222-deserialization-in-dromara-sa-token-a440b332</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15222%3A%20Deserialization%20in%20Dromara%20Sa-Token&amp;severity=low&amp;id=695450abdb813ff03e2beb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15221-cross-site-scripting-in-sohutv-cach-13804611</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15221%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450abdb813ff03e2beb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15220-cross-site-scripting-in-sohutv-cach-a48f490c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15220%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450aadb813ff03e2be6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15219-cross-site-scripting-in-sohutv-cach-14e7d34c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15219%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450aadb813ff03e2be68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15218-buffer-overflow-in-tenda-ac10u-87b4a6f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15218%3A%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=high&amp;id=695450aadb813ff03e2be686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15217-buffer-overflow-in-tenda-ac23-50b71d11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15217%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695450a3db813ff03e2be0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15216-stack-based-buffer-overflow-in-tend-395bed09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15216%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=695450a3db813ff03e2be0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15215-buffer-overflow-in-tenda-ac10u-d075e045</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15215%3A%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=high&amp;id=695450a3db813ff03e2be0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15214-cross-site-scripting-in-campcodes-p-4bd60176</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15214%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Park%20Ticketing%20System&amp;severity=medium&amp;id=695450a3db813ff03e2be0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69235-cwe-346-origin-validation-error-in--00523337</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69235%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=695450b1db813ff03e2bee02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69234-cwe-358-improperly-implemented-secu-2cc1a01e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69234%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=695450b1db813ff03e2bedff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15213-improper-authorization-in-code-proj-8d33b8d7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15213%3A%20Improper%20Authorization%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=695450a3db813ff03e2be0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15212-sql-injection-in-code-projects-refu-3df67c64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15212%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a2db813ff03e2be086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15211-sql-injection-in-code-projects-refu-a7f2d1b7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15211%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a2db813ff03e2be07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-30-542a9515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-30&amp;severity=medium&amp;id=69546ab0db813ff03e51b650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61557-na-94a333ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61557%3A%20n%2Fa&amp;severity=high&amp;id=695450a5db813ff03e2be16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65925-na-700ef966</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65925%3A%20n%2Fa&amp;severity=medium&amp;id=695450a4db813ff03e2be15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66848-na-ba4b5e0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66848%3A%20n%2Fa&amp;severity=critical&amp;id=695450a4db813ff03e2be156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65411-na-0940d80d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65411%3A%20n%2Fa&amp;severity=high&amp;id=695450a4db813ff03e2be149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65409-na-b108bdfd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65409%3A%20n%2Fa&amp;severity=high&amp;id=695450a4db813ff03e2be143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56332-na-94ea4996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56332%3A%20n%2Fa&amp;severity=critical&amp;id=695450a4db813ff03e2be139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66835-na-146f76ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66835%3A%20n%2Fa&amp;severity=high&amp;id=695450a3db813ff03e2be0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66834-na-a05c6e52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66834%3A%20n%2Fa&amp;severity=high&amp;id=695450a3db813ff03e2be0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66824-na-df333349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66824%3A%20n%2Fa&amp;severity=high&amp;id=695450a2db813ff03e2be07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66823-na-d62a6660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66823%3A%20n%2Fa&amp;severity=low&amp;id=695450a1db813ff03e2be02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50343-na-f7003477</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50343%3A%20n%2Fa&amp;severity=critical&amp;id=695450a1db813ff03e2be01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66723-na-222b3b68</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66723%3A%20n%2Fa&amp;severity=high&amp;id=695450a0db813ff03e2bda7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23554-cwe-79-improper-neutralization-of-i-7ab66fc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakub%20Glos%20Off%20Page%20SEO&amp;severity=high&amp;id=695450a3db813ff03e2be0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23550-cwe-79-improper-neutralization-of-i-4a910a83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kemal%20YAZICI%20Product%20Puller&amp;severity=high&amp;id=695450a8db813ff03e2be5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23458-cwe-79-improper-neutralization-of-i-9a61ff8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rakessh%20Ads24%20Lite&amp;severity=high&amp;id=695450a9db813ff03e2be632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15210-sql-injection-in-code-projects-refu-c5c1893c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15210%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68036-cwe-862-missing-authorization-in-em-42123364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68036%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=high&amp;id=695450a9db813ff03e2be635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68040-cwe-201-insertion-of-sensitive-info-3b015c56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68040%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20weDevs%20WP%20Project%20Manager&amp;severity=high&amp;id=695450a9db813ff03e2be638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41656-cwe-862-missing-authorization-in-wp-cb9f755d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41656%3A%20CWE-862%20Missing%20Authorization%20in%20wpdive%20Better%20Elementor%20Addons&amp;severity=medium&amp;id=695450a8db813ff03e2be607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32238-vulnerability-in-codexthemes-thegem-0dfe05ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32238%3A%20Vulnerability%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=medium&amp;id=695450a8db813ff03e2be604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68498-cwe-862-missing-authorization-in-cr-923ab839</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68498%3A%20Missing%20Authorization%20in%20Crocoblock%20JetTabs&amp;severity=high&amp;id=695450a3db813ff03e2be0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68499-cwe-79-improper-neutralization-of-i-466523d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=high&amp;id=695450a3db813ff03e2be0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15209-sql-injection-in-code-projects-refu-598967f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15209%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15284-cwe-20-improper-input-validation-4da53598</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15284%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=medium&amp;id=695450a8db813ff03e2be5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15208-sql-injection-in-code-projects-refu-6af596e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15208%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15207-sql-injection-in-campcodes-supplier-faa2b8d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15207%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-arrested-for-kmsauto-malware-campaign-with--c732ded7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20arrested%20for%20KMSAuto%20malware%20campaign%20with%202.8%20million%20downloads&amp;severity=high&amp;id=69544fcedb813ff03e2aff4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15206-sql-injection-in-campcodes-supplier-1ca0c63d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15206%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68502-cwe-639-authorization-bypass-throug-9d688c8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68502%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Crocoblock%20JetPopup&amp;severity=high&amp;id=695450b1db813ff03e2bee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68503-cwe-862-missing-authorization-in-cr-f178da74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68503%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlog&amp;severity=high&amp;id=695450b1db813ff03e2bee2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68504-cwe-79-improper-neutralization-of-i-502470b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=high&amp;id=695450a9db813ff03e2be63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68562-cwe-434-unrestricted-upload-of-file-d9646de3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68562%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=critical&amp;id=695450a9db813ff03e2be648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68607-cwe-79-improper-neutralization-of-i-6391990a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hiroaki%20Miyashita%20Custom%20Field%20Template&amp;severity=high&amp;id=695450a9db813ff03e2be64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15205-sql-injection-in-code-projects-stud-12baf67d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15205%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=695450a6db813ff03e2be2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69205-cwe-20-improper-input-validation-in-ab71e66d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69205%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20olell%20uURU&amp;severity=medium&amp;id=695450a9db813ff03e2be682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-google-themed-phishing-wave-hits-over-3000-glo-ffcbfdd3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Google-Themed%20Phishing%20Wave%20Hits%20Over%203%2C000%20Global%20Organisations&amp;severity=medium&amp;id=69544fcedb813ff03e2affc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15204-cross-site-scripting-in-sohutv-cach-9638f1e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15204%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a6db813ff03e2be2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-coinbase-support-agent-arrested-for-helping-8ff81d84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20Coinbase%20support%20agent%20arrested%20for%20helping%20hackers&amp;severity=high&amp;id=69544fcedb813ff03e2aff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-energy-provider-hit-by-gentlemen-ransomwa-c2363cda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20energy%20provider%20hit%20by%20Gentlemen%20ransomware%20attack&amp;severity=high&amp;id=69544fcedb813ff03e2aff79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-real-world-attacks-behind-owasp-agentic-ai-top-35869202</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Real-World%20Attacks%20Behind%20OWASP%20Agentic%20AI%20Top%2010&amp;severity=high&amp;id=69544fcedb813ff03e2aff7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-says-2596-wallets-drained-in-7-millio-ce38881d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20says%202%2C596%20wallets%20drained%20in%20%247%20million%20crypto%20theft%20attack&amp;severity=high&amp;id=69544fcedb813ff03e2aff89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15203-cross-site-scripting-in-sohutv-cach-ad9b3972</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15203%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a5db813ff03e2be191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-weaponizes-react2shell-c9839964</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDoX%20Botnet%20Weaponizes%20React2Shell&amp;severity=medium&amp;id=69544fc0db813ff03e2ae6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15202-cross-site-scripting-in-sohutv-cach-760b5f7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15202%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450a5db813ff03e2be18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14175-cwe-327-use-of-a-broken-or-risky-cr-3e822f3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14175%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20TP-Link%20Systems%20Inc.%20TL-WR820N%20v2.8&amp;severity=medium&amp;id=695450b2db813ff03e2bee67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69202-cwe-524-use-of-cache-containing-sen-cb7532b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69202%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20arthurfiorette%20axios-cache-interceptor&amp;severity=medium&amp;id=695450b2db813ff03e2bee73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ubisoft-shuts-down-rainbow-six-siege-after-mongodb-a2d6874d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ubisoft%20Shuts%20Down%20Rainbow%20Six%20Siege%20After%20MongoDB%20Exploit%20Hits%20Players&amp;severity=high&amp;id=69544fcedb813ff03e2aff91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68431-cwe-125-out-of-bounds-read-in-struk-83ef3f16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68431%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20strukturag%20libheif&amp;severity=medium&amp;id=695450b3db813ff03e2beea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14728-cwe-22-improper-limitation-of-a-pat-4ee27fb4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14728%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=695450b2db813ff03e2bee77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15201-cross-site-scripting-in-sohutv-cach-4944a10c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15201%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b3db813ff03e2beea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15200-cross-site-scripting-in-sohutv-cach-2269a032</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15200%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b3db813ff03e2beec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/39c3-multiple-vulnerabilities-in-gnupg-and-other-c-540768d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=39C3%3A%20Multiple%20vulnerabilities%20in%20GnuPG%20and%20other%20cryptographic%20tools&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13592-cwe-94-improper-control-of-generati-e6077c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13592%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=695450b3db813ff03e2beed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14280-cwe-200-exposure-of-sensitive-infor-1f1fb677</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14280%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=medium&amp;id=695450b3db813ff03e2beed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15199-unrestricted-upload-in-code-project-d4553a3d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15199%3A%20Unrestricted%20Upload%20in%20code-projects%20College%20Notes%20Uploading%20System&amp;severity=medium&amp;id=695450b4db813ff03e2beeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15198-sql-injection-in-code-projects-coll-58efda3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15198%3A%20SQL%20Injection%20in%20code-projects%20College%20Notes%20Uploading%20System&amp;severity=medium&amp;id=695450b4db813ff03e2bef01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55064-cwe-79-improper-neutralization-of-i-08596a2b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b3db813ff03e2beec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68861-missing-authorization-in-pluginopti-bf994e6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68861%3A%20Missing%20Authorization%20in%20pluginoptimizer%20Plugin%20Optimizer&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55063-cwe-79-improper-neutralization-of-i-93a6281a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b5db813ff03e2bf26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55062-cwe-79-improper-neutralization-of-i-30f4a759</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b5db813ff03e2bf267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55061-cwe-434-unrestricted-upload-of-file-dd277146</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55061%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Priority%20Web&amp;severity=high&amp;id=695450b4db813ff03e2bef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55060-cwe-601-url-redirection-to-untruste-e503720d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55060%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Priority%20Web&amp;severity=medium&amp;id=695450b4db813ff03e2bef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15197-unrestricted-upload-in-code-project-119f10f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15197%3A%20Unrestricted%20Upload%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=695450a5db813ff03e2be185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15196-sql-injection-in-code-projects-asse-b75c9933</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15196%3A%20SQL%20Injection%20in%20code-projects%20Assessment%20Management&amp;severity=medium&amp;id=695450b6db813ff03e2bf328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53627-cwe-1287-improper-validation-of-spe-ec2a415c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53627%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=695450b7db813ff03e2bf33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68868-cwe-79-improper-neutralization-of-i-414a7aac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeaffairs%20Wp%20Text%20Slider%20Widget&amp;severity=high&amp;id=695450b7db813ff03e2bf354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68870-cwe-98-improper-control-of-filename-578ac616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68870%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20reDim%20GmbH%20CookieHint%20WP&amp;severity=high&amp;id=695450b7db813ff03e2bf357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68876-cwe-79-improper-neutralization-of-i-f269bdcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20INVELITY%20Invelity%20SPS%20connect&amp;severity=high&amp;id=695450b7db813ff03e2bf35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68877-cwe-98-improper-control-of-filename-9550df20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68877%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cedcommerce%20CedCommerce%20Integration%20for%20Good%20Market&amp;severity=high&amp;id=695450b7db813ff03e2bf35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15195-sql-injection-in-code-projects-asse-121e9194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15195%3A%20SQL%20Injection%20in%20code-projects%20Assessment%20Management&amp;severity=medium&amp;id=695450b6db813ff03e2bf321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69211-cwe-367-time-of-check-time-of-use-t-f2c6d84c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69211%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20nestjs%20nest&amp;severity=medium&amp;id=695450b7db813ff03e2bf37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68878-cwe-79-improper-neutralization-of-i-bda943d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasadkirpekar%20Advanced%20Custom%20CSS&amp;severity=high&amp;id=695450b7db813ff03e2bf369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68879-cwe-79-improper-neutralization-of-i-2ecc13fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20councilsoft%20Content%20Grid%20Slider&amp;severity=high&amp;id=695450b7db813ff03e2bf36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68893-cwe-918-server-side-request-forgery-8b0da527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68893%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HETWORKS%20WordPress%20Image%20shrinker&amp;severity=high&amp;id=695450b7db813ff03e2bf36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68897-cwe-94-improper-control-of-generati-6ce7a238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68897%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Mohammad%20I.%20Okfie%20IF%20AS%20Shortcode&amp;severity=critical&amp;id=695450b7db813ff03e2bf372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69206-cwe-918-server-side-request-forgery-a8c5bb90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69206%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HemmeligOrg%20Hemmelig.app&amp;severity=medium&amp;id=695450b7db813ff03e2bf37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69201-cwe-77-improper-neutralization-of-s-d081ac76</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69201%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Quenary%20tugtainer&amp;severity=high&amp;id=695450b7db813ff03e2bf375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/top-us-accounting-firm-sax-discloses-2024-data-bre-dd3e692a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Top%20US%20Accounting%20Firm%20Sax%20Discloses%202024%20Data%20Breach%20Impacting%20220%2C000&amp;severity=medium&amp;id=69544f40db813ff03e2a183f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15194-stack-based-buffer-overflow-in-d-li-10140e0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15194%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-600&amp;severity=critical&amp;id=695450badb813ff03e2bf7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69200-cwe-202-exposure-of-sensitive-infor-b5056c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69200%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=695450badb813ff03e2bf7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68951-cwe-79-improper-neutralization-of-i-a89c9033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68951%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=695450badb813ff03e2bf7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korean-air-data-breach-exposes-data-of-thousands-o-d5f4c954</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korean%20Air%20data%20breach%20exposes%20data%20of%20thousands%20of%20employees&amp;severity=high&amp;id=69544fcedb813ff03e2aff41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68928-cwe-79-improper-neutralization-of-i-be3c3552</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68928%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20crm&amp;severity=medium&amp;id=695450badb813ff03e2bf7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15193-buffer-overflow-in-d-link-dwr-m920-6e780a45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15193%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450badb813ff03e2bf7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15192-command-injection-in-d-link-dwr-m92-a595c141</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15192%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=695450badb813ff03e2bf7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15191-command-injection-in-d-link-dwr-m92-ee55654f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15191%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=695450bddb813ff03e2bf8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-mongodb-attacks-wallet-breaches-andro-2db72cca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20MongoDB%20Attacks%2C%20Wallet%20Breaches%2C%20Android%20Spyware%2C%20Insider%20Crime%20%26%20More&amp;severity=medium&amp;id=69544e28b932a5a22ffaf4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15190-stack-based-buffer-overflow-in-d-li-da06f287</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15190%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450bddb813ff03e2bf8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-honeymyte-apt-now-protects-malware-with-a-kern-5ec6fd5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20HoneyMyte%20APT%20now%20protects%20malware%20with%20a%20kernel-mode%20rootkit&amp;severity=medium&amp;id=69544fc0db813ff03e2ae70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15189-buffer-overflow-in-d-link-dwr-m920-7a378f33</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15189%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=695450bfdb813ff03e2bfc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-attacks-exploiting-old-vulne-d488c40a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20New%20Attacks%20Exploiting%20Old%20Vulnerability&amp;severity=low&amp;id=69544f40db813ff03e2a1842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-0day-flaw-exposes-70000-xspeeder-devices--01b167b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%200day%20flaw%20Exposes%2070%2C000%20XSpeeder%20Devices%20as%20Vendor%20Ignores%20Alert&amp;severity=critical&amp;id=69544fcedb813ff03e2aff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15188-cross-site-scripting-in-campcodes-c-570b8b1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15188%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-to-issue-117-billion-in-vouchers-over-data-c5fbfb04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20to%20Issue%20%241.17%20Billion%20in%20Vouchers%20Over%20Data%20Breach&amp;severity=medium&amp;id=69544f40db813ff03e2a1845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15187-path-traversal-in-greencms-9e09e525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15187%3A%20Path%20Traversal%20in%20GreenCMS&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22-million-affected-by-aflac-data-breach-55789947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22%20Million%20Affected%20by%20Aflac%20Data%20Breach&amp;severity=medium&amp;id=69544f40db813ff03e2a1848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29th-december-threat-intelligence-report-8cbd6ec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=29th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69545139db813ff03e2c9ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15186-sql-injection-in-code-projects-refu-142c5dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15186%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bfdb813ff03e2bfc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-malware-delivered-in-emeditor-supply-c-5c095a8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Malware%20Delivered%20in%20EmEditor%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69544f40db813ff03e2a184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15185-sql-injection-in-code-projects-refu-4eb02a05</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15185%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15184-sql-injection-in-code-projects-refu-ede4d722</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15184%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15183-sql-injection-in-code-projects-refu-c9938682</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15183%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450bedb813ff03e2bf90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fresh-mongodb-vulnerability-exploited-in-attacks-a0ef0da8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fresh%20MongoDB%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=high&amp;id=69544f40db813ff03e2a184e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-panda-cyberespionage-campaign-uses-dns-poi-ec875179</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Panda%20cyberespionage%20campaign%20uses%20DNS%20poisoning%20to%20install%20MgBot%20backdoor&amp;severity=medium&amp;id=69544fcedb813ff03e2affb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mongodb-vulnerability-cve-2025-14847-under-active--8b9d09d0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MongoDB%20Vulnerability%20CVE-2025-14847%20Under%20Active%20Exploitation%20Worldwide&amp;severity=low&amp;id=69544e28b932a5a22ffaf4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27-malicious-npm-packages-used-as-phishing-infrast-76290b65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27%20Malicious%20npm%20Packages%20Used%20as%20Phishing%20Infrastructure%20to%20Steal%20Login%20Credentials&amp;severity=critical&amp;id=69544e28b932a5a22ffaf4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15182-sql-injection-in-code-projects-refu-cc3dcc9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15182%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450b9db813ff03e2bf6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-theft-of-40-million-cond-nast-record-ae43a788</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Claims%20Theft%20of%2040%20Million%20Cond%C3%A9%20Nast%20Records%20After%20Wired%20Data%20Leak&amp;severity=medium&amp;id=69544f40db813ff03e2a1851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15181-sql-injection-in-code-projects-refu-97e56528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15181%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=695450b8db813ff03e2bf3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15180-stack-based-buffer-overflow-in-tend-d6da6130</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15180%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15179-stack-based-buffer-overflow-in-tend-68f9f5c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15179%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15178-stack-based-buffer-overflow-in-tend-7a395b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15178%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b8db813ff03e2bf3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15228-cwe-434-unrestricted-upload-of-file-86c9ba3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15228%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WELLTEND%20TECHNOLOGY%20BPMFlowWebkit&amp;severity=critical&amp;id=695450b9db813ff03e2bf6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15227-cwe-36-absolute-path-traversal-in-w-e51ca937</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15227%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WELLTEND%20TECHNOLOGY%20BPMFlowWebkit&amp;severity=high&amp;id=695450bedb813ff03e2bf8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15177-stack-based-buffer-overflow-in-tend-44e19e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15177%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450bddb813ff03e2bf8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15226-cwe-434-unrestricted-upload-of-file-b4fdff47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15226%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sunnet%20WMPro&amp;severity=critical&amp;id=695450bedb813ff03e2bf8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traditional-security-frameworks-leave-organization-388f8038</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traditional%20Security%20Frameworks%20Leave%20Organizations%20Exposed%20to%20AI-Specific%20Attack%20Vectors&amp;severity=low&amp;id=69544e28b932a5a22ffaf4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15176-reachable-assertion-in-open5gs-09c73495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15176%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=695450bddb813ff03e2bf8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15225-cwe-23-relative-path-traversal-in-s-df677faf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15225%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Sunnet%20WMPro&amp;severity=high&amp;id=695450b9db813ff03e2bf6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15175-cross-site-scripting-in-sohutv-cach-9986c342</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15175%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b6db813ff03e2bf319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13958-cwe-79-cross-site-scripting-xss-in--3a358256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13958%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20YaMaps%20for%20WordPress%20Plugin&amp;severity=medium&amp;id=695450b2db813ff03e2bee60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13417-cwe-89-sql-injection-in-plugin-orga-ddec5dbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13417%3A%20CWE-89%20SQL%20Injection%20in%20Plugin%20Organizer&amp;severity=high&amp;id=695450b2db813ff03e2bee5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15174-cross-site-scripting-in-sohutv-cach-9edc1770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15174%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b6db813ff03e2bf312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15070-cwe-200-exposure-of-sensitive-infor-4dbfe805</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15070%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gmission%20Web%20Fax&amp;severity=medium&amp;id=695450b6db813ff03e2bf2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15069-cwe-287-improper-authentication-in--e58ad2d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15069%3A%20CWE-287%20Improper%20Authentication%20in%20Gmission%20Web%20Fax&amp;severity=high&amp;id=695450b6db813ff03e2bf2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15068-cwe-862-missing-authorization-in-gm-840e10de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15068%3A%20CWE-862%20Missing%20Authorization%20in%20Gmission%20Web%20Fax&amp;severity=high&amp;id=695450b5db813ff03e2bf27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15173-cross-site-scripting-in-sohutv-cach-f9c3ced9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15173%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b5db813ff03e2bf274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15172-cross-site-scripting-in-sohutv-cach-dd0c8538</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15172%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b5db813ff03e2bf26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15171-cross-site-scripting-in-sohutv-cach-7f0fe415</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15171%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450bddb813ff03e2bf8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15170-cross-site-scripting-in-advaya-soft-834d3c9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15170%3A%20Cross%20Site%20Scripting%20in%20Advaya%20Softech%20GEMS%20ERP%20Portal&amp;severity=medium&amp;id=695450bddb813ff03e2bf8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15169-sql-injection-in-biggidroid-simple--21795ad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15169%3A%20SQL%20Injection%20in%20BiggiDroid%20Simple%20PHP%20CMS&amp;severity=medium&amp;id=695450badb813ff03e2bf7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15168-sql-injection-in-itsourcecode-stude-a8c4bc97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15168%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=695450b6db813ff03e2bf30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52691-vulnerability-in-smartertools-smart-0974873e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52691%3A%20Vulnerability%20in%20SmarterTools%20SmarterMail&amp;severity=critical&amp;id=695450b7db813ff03e2bf339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15167-sql-injection-in-itsourcecode-onlin-b6a9b8dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15167%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b5db813ff03e2bf260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15166-sql-injection-in-itsourcecode-onlin-1a56a211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15166%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b3db813ff03e2beeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15165-sql-injection-in-itsourcecode-onlin-51a81c78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15165%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=695450b2db813ff03e2bee6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15067-cwe-434-unrestricted-upload-of-file-7670a9d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15067%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Innorix%20Innorix%20WP&amp;severity=high&amp;id=695450b5db813ff03e2bf282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15066-cwe-22-improper-limitation-of-a-pat-8b2e2d0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15066%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Innorix%20Innorix%20WP&amp;severity=medium&amp;id=695450b5db813ff03e2bf27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15164-stack-based-buffer-overflow-in-tend-386733c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15164%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450bfdb813ff03e2bfc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15065-cwe-200-exposure-of-sensitive-infor-0df4a5ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15065%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kings%20Information%20%26%20Network%20Co.%20KESS%20Enterprise&amp;severity=high&amp;id=695450b1db813ff03e2bee3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15163-stack-based-buffer-overflow-in-tend-2e45f503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15163%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b2db813ff03e2bee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57460-na-0b914ec7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57460%3A%20n%2Fa&amp;severity=critical&amp;id=695450bedb813ff03e2bf907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65570-na-0a4121e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65570%3A%20n%2Fa&amp;severity=critical&amp;id=695450bddb813ff03e2bf898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56333-na-b5c46c27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56333%3A%20n%2Fa&amp;severity=critical&amp;id=695450badb813ff03e2bf7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66861-na-09879b85</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66861%3A%20n%2Fa&amp;severity=low&amp;id=695450b9db813ff03e2bf6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66866-na-811d85af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66866%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66864-na-8c485912</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66864%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65442-na-6b81495f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65442%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60458-na-b06c4858</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60458%3A%20n%2Fa&amp;severity=medium&amp;id=695450b7db813ff03e2bf343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67255-na-6dd7edef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67255%3A%20n%2Fa&amp;severity=high&amp;id=695450b4db813ff03e2beef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67254-na-76844ed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67254%3A%20n%2Fa&amp;severity=high&amp;id=695450b4db813ff03e2beef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68706-na-f2f55eee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68706%3A%20n%2Fa&amp;severity=critical&amp;id=695450b3db813ff03e2beecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30855-na-a94e39d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30855%3A%20n%2Fa&amp;severity=high&amp;id=695450b2db813ff03e2bee63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27480-na-3dd42f0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27480%3A%20n%2Fa&amp;severity=critical&amp;id=695450b2db813ff03e2bee5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25182-na-bea3e943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25182%3A%20n%2Fa&amp;severity=critical&amp;id=695450b2db813ff03e2bee57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57462-na-478261e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57462%3A%20n%2Fa&amp;severity=medium&amp;id=695450acdb813ff03e2bebbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66877-na-1b96073c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66877%3A%20n%2Fa&amp;severity=high&amp;id=695450abdb813ff03e2beb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66869-na-eb17fa38</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66869%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66865-na-f643d785</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66865%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66863-na-f0cc1d4b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66863%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66862-na-21d83737</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66862%3A%20n%2Fa&amp;severity=high&amp;id=695450aadb813ff03e2be6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25183-na-41f93c72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25183%3A%20n%2Fa&amp;severity=high&amp;id=695450a5db813ff03e2be176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25181-na-e8b0bdcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25181%3A%20n%2Fa&amp;severity=critical&amp;id=695450a5db813ff03e2be173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-29-cb7a6ab2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-29&amp;severity=medium&amp;id=69544e27b932a5a22ffaf0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15162-stack-based-buffer-overflow-in-tend-0eebf42b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15162%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b1db813ff03e2bee3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15161-stack-based-buffer-overflow-in-tend-cdcbd525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15161%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b1db813ff03e2bee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15160-stack-based-buffer-overflow-in-tend-fa75d401</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15160%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=high&amp;id=695450b9db813ff03e2bf71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-mongobleed-flaw-leaks-mongodb-secrets-87-8caf568a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20MongoBleed%20flaw%20leaks%20MongoDB%20secrets%2C%2087K%20servers%20exposed&amp;severity=high&amp;id=69544fcedb813ff03e2aff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15156-null-pointer-dereference-in-omec-pr-726c8043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15156%3A%20NULL%20Pointer%20Dereference%20in%20omec-project%20UPF&amp;severity=medium&amp;id=695450b9db813ff03e2bf716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-lastpass-backups-enable-crypto-theft-throug-339d0526</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20LastPass%20backups%20enable%20crypto%20theft%20through%202025&amp;severity=medium&amp;id=69544fcedb813ff03e2affc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-to-leak-wired-database-with-23-milli-fc0be0bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20claims%20to%20leak%20WIRED%20database%20with%202.3%20million%20records&amp;severity=high&amp;id=69544fcedb813ff03e2aff81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15155-stack-based-buffer-overflow-in-floo-000c8b90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15155%3A%20Stack-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=695450bddb813ff03e2bf8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15154-use-of-less-trusted-source-in-pboot-d66f9650</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15154%3A%20Use%20of%20Less%20Trusted%20Source%20in%20PbootCMS&amp;severity=medium&amp;id=695450bddb813ff03e2bf89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15153-files-or-directories-accessible-in--6ca46105</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15153%3A%20Files%20or%20Directories%20Accessible%20in%20PbootCMS&amp;severity=medium&amp;id=695450bddb813ff03e2bf892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15152-unrestricted-upload-in-h-moses-moga-7081a4b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15152%3A%20Unrestricted%20Upload%20in%20h-moses%20moga-mall&amp;severity=medium&amp;id=695450bcdb813ff03e2bf878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15151-password-in-configuration-file-in-t-d0b6d407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15151%3A%20Password%20in%20Configuration%20File%20in%20TaleLin%20Lin-CMS&amp;severity=medium&amp;id=695450bcdb813ff03e2bf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15150-stack-based-buffer-overflow-in-px4--8346c34b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15150%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4%20PX4-Autopilot&amp;severity=medium&amp;id=695450b9db813ff03e2bf70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15149-cross-site-scripting-in-rawchen-ecm-9eccac06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15149%3A%20Cross%20Site%20Scripting%20in%20rawchen%20ecms&amp;severity=medium&amp;id=695450b1db813ff03e2bee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15148-code-injection-in-cmseasy-4649066c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15148%3A%20Code%20Injection%20in%20CmsEasy&amp;severity=medium&amp;id=695450b1db813ff03e2bee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15146-cross-site-scripting-in-sohutv-cach-7a503536</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15146%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b1db813ff03e2bee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15145-cross-site-scripting-in-sohutv-cach-a6b0ebd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15145%3A%20Cross%20Site%20Scripting%20in%20SohuTV%20CacheCloud&amp;severity=medium&amp;id=695450b1db813ff03e2bee15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15144-cross-site-scripting-in-dayrui-xunr-2d5ac17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15144%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=695450b1db813ff03e2bee0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15143-sql-injection-in-eyoucms-ce492585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15143%3A%20SQL%20Injection%20in%20EyouCMS&amp;severity=medium&amp;id=695450b9db813ff03e2bf708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15142-sql-injection-in-9786-phpok3w-9e27a8b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15142%3A%20SQL%20Injection%20in%209786%20phpok3w&amp;severity=medium&amp;id=695450b9db813ff03e2bf702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15141-information-disclosure-in-halo-c37fbf3f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15141%3A%20Information%20Disclosure%20in%20Halo&amp;severity=low&amp;id=695450b9db813ff03e2bf6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15140-sql-injection-in-saiftheboss7-onlin-d76f5f9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15140%3A%20SQL%20Injection%20in%20saiftheboss7%20onlinemcqexam&amp;severity=medium&amp;id=695450bbdb813ff03e2bf84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15139-command-injection-in-trendnet-tew-8-6748e06f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15139%3A%20Command%20Injection%20in%20TRENDnet%20TEW-822DRE&amp;severity=medium&amp;id=695450bbdb813ff03e2bf848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15138-path-traversal-in-prasathmani-tinyf-4fe74e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15138%3A%20Path%20Traversal%20in%20prasathmani%20TinyFileManager&amp;severity=medium&amp;id=695450b8db813ff03e2bf3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15137-command-injection-in-trendnet-tew-8-8f166541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15137%3A%20Command%20Injection%20in%20TRENDnet%20TEW-800MB&amp;severity=high&amp;id=695450b6db813ff03e2bf2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15136-command-injection-in-trendnet-tew-8-5f1a00e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15136%3A%20Command%20Injection%20in%20TRENDnet%20TEW-800MB&amp;severity=high&amp;id=695450b6db813ff03e2bf2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15135-improper-authentication-in-joey-zho-b3c4bcfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15135%3A%20Improper%20Authentication%20in%20joey-zhou%20xiaozhi-esp32-server-java&amp;severity=medium&amp;id=695450b5db813ff03e2bf257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15134-cross-site-scripting-in-yourmaileye-f4b184e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15134%3A%20Cross%20Site%20Scripting%20in%20yourmaileyes%20MOOC&amp;severity=medium&amp;id=695450b5db813ff03e2bf250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15133-command-injection-in-zspace-z4pro-c83a4404</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15133%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15132-command-injection-in-zspace-z4pro-c1cefaa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15132%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15131-command-injection-in-zspace-z4pro-e1fb44b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15131%3A%20Command%20Injection%20in%20ZSPACE%20Z4Pro%2B&amp;severity=medium&amp;id=695450b4db813ff03e2bef0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15130-code-injection-in-shanyu-sycms-1951a355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15130%3A%20Code%20Injection%20in%20shanyu%20SyCms&amp;severity=medium&amp;id=695450b4db813ff03e2beefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15129-code-injection-in-chenjinchuang-lin-2816b5ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15129%3A%20Code%20Injection%20in%20ChenJinchuang%20Lin-CMS-TP5&amp;severity=medium&amp;id=695450b3db813ff03e2beebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15128-unprotected-storage-of-credentials--0cd8d136</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15128%3A%20Unprotected%20Storage%20of%20Credentials%20in%20ZKTeco%20BioTime&amp;severity=medium&amp;id=695450bbdb813ff03e2bf842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15127-sql-injection-in-fantasticlbp-hotel-9b248b3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15127%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels_Server&amp;severity=medium&amp;id=695450bbdb813ff03e2bf83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15126-improper-authorization-in-jeecgboot-dbc4f2ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15126%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15125-improper-authorization-in-jeecgboot-3d625a7a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15125%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15124-improper-authorization-in-jeecgboot-71a33653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15124%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15123-improper-authorization-in-jeecgboot-bc164e5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15123%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450bbdb813ff03e2bf824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15122-improper-authorization-in-jeecgboot-fed35077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15122%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b8db813ff03e2bf3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15121-information-disclosure-in-jeecgboot-532c1d86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15121%3A%20Information%20Disclosure%20in%20JeecgBoot&amp;severity=medium&amp;id=695450b8db813ff03e2bf3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15120-improper-authorization-in-jeecgboot-9e4faed7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15120%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b8db813ff03e2bf3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15119-improper-authorization-in-jeecgboot-baf53065</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15119%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=695450b3db813ff03e2beeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15118-improper-authorization-in-macrozhen-77683775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15118%3A%20Improper%20Authorization%20in%20macrozheng%20mall&amp;severity=medium&amp;id=695450b8db813ff03e2bf3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15117-deserialization-in-dromara-sa-token-1d569065</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15117%3A%20Deserialization%20in%20Dromara%20Sa-Token&amp;severity=low&amp;id=695450b8db813ff03e2bf39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15116-race-condition-in-opencart-62e59fd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15116%3A%20Race%20Condition%20in%20OpenCart&amp;severity=medium&amp;id=695450b7db813ff03e2bf389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-28-99c7d7df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-28&amp;severity=medium&amp;id=69544e26b932a5a22ffaeea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/petlibro-your-pet-feeder-is-feeding-data-to-anyone-c72b1a5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Petlibro%3A%20Your%20Pet%20Feeder%20Is%20Feeding%20Data%20To%20Anyone%20Who%20Asks&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15110-unrestricted-upload-in-jackq-xcms-e9275597</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15110%3A%20Unrestricted%20Upload%20in%20jackq%20XCMS&amp;severity=medium&amp;id=695450b6db813ff03e2bf305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14177-cwe-125-out-of-bounds-read-in-php-g-17d890ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14177%3A%20CWE-125%20Out-of-bounds%20Read%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=695450badb813ff03e2bf7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14178-cwe-787-out-of-bounds-write-in-php--bed270d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14178%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=695450badb813ff03e2bf7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14180-cwe-476-null-pointer-dereference-in-8221dc6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14180%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20PHP%20Group%20PHP&amp;severity=high&amp;id=695450bbdb813ff03e2bf81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15109-unrestricted-upload-in-jackq-xcms-4e9e56c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15109%3A%20Unrestricted%20Upload%20in%20jackq%20XCMS&amp;severity=medium&amp;id=695450bbdb813ff03e2bf81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/implicit-execution-authority-is-the-real-failure-m-c4845665</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Implicit%20execution%20authority%20is%20the%20real%20failure%20mode%20behind%20prompt%20injection&amp;severity=medium&amp;id=6954513bdb813ff03e2c9fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15108-use-of-hard-coded-cryptographic-key-5c0526fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15108%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PandaXGO%20PandaX&amp;severity=medium&amp;id=695450bcdb813ff03e2bf86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15107-use-of-hard-coded-cryptographic-key-961c2436</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15107%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20actiontech%20sqle&amp;severity=medium&amp;id=695450bcdb813ff03e2bf865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15106-improper-authorization-in-getmaxun--dda24507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15106%3A%20Improper%20Authorization%20in%20getmaxun%20maxun&amp;severity=medium&amp;id=695450bcdb813ff03e2bf85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-024cec06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MongoDB%20Flaw%20Lets%20Unauthenticated%20Attackers%20Read%20Uninitialized%20Memory&amp;severity=high&amp;id=694fb495613270c7b7ffb853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openais-chatgpt-ads-will-allegedly-prioritize-spon-6838c740</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI&apos;s%20ChatGPT%20ads%20will%20allegedly%20prioritize%20sponsored%20content%20in%20answers&amp;severity=high&amp;id=694fb495613270c7b7ffb857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-runtime-attacks-stay-quiet-for-so-long-61468bb1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20runtime%20attacks%20stay%20quiet%20for%20so%20long&amp;severity=medium&amp;id=694fadebd43a27076d86e1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15105-use-of-hard-coded-cryptographic-key-9a892d06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15105%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20getmaxun%20maxun&amp;severity=medium&amp;id=694fa35cd43a27076d7b384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mongodb-flaw-lets-unauthenticated-attackers-re-701f4a01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MongoDB%20Flaw%20Lets%20Unauthenticated%20Attackers%20Read%20Uninitialized%20Memory&amp;severity=high&amp;id=694f983f46aa44436a57c516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-verified-sha-256-second-preimage-collision-s-99c70243</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20verified%20SHA-256%20second-preimage%20collision%3A%20Structural%20analysis%20of%20the%20W-schedule%20vulnerability&amp;severity=high&amp;id=694f3fd333784cecd4bb6a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68952-cwe-94-improper-control-of-generati-d00ad68e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20eigent-ai%20eigent&amp;severity=critical&amp;id=694f5b38b11716a1460d26a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68948-cwe-321-use-of-hard-coded-cryptogra-cbac227e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68948%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20siyuan-note%20siyuan&amp;severity=medium&amp;id=694f5b38b11716a1460d26a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68927-cwe-79-improper-neutralization-of-i-3c80206e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68927%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abhinavxd%20libredesk&amp;severity=high&amp;id=694f5b38b11716a1460d26a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54322-cwe-95-improper-neutralization-of-d-0b1e7694</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54322%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Xspeeder%20SXZOS&amp;severity=critical&amp;id=695450b7db813ff03e2bf33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-27-278341d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-27&amp;severity=medium&amp;id=69544e27b932a5a22ffaf2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68474-cwe-787-out-of-bounds-write-in-espr-9754a97b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68474%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=694f23b933784cecd4a2ce7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66203-cwe-78-improper-neutralization-of-s-bc8f18e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66203%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemon8866%20StreamVault&amp;severity=critical&amp;id=694f202f33784cecd4a18a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-group-claims-theft-of-over-1tb--0d277026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Group%20Claims%20Theft%20of%20Over%201TB%20of%20Chrysler%20Data&amp;severity=high&amp;id=694f0e9833784cecd49bbf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67729-cwe-502-deserialization-of-untruste-d7495667</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67729%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20InternLM%20lmdeploy&amp;severity=high&amp;id=694f079233784cecd499b7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68697-cwe-269-improper-privilege-manageme-eb98d913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68697%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20n8n-io%20n8n&amp;severity=high&amp;id=694f079233784cecd499b7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68668-cwe-693-protection-mechanism-failur-bcbb4231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68668%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=694f040e33784cecd498bd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61914-cwe-79-improper-neutralization-of-i-3caedd8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61914%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=694f040e33784cecd498bd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-group-noname057-claims-cyberattack-on--27e7ead6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20group%20Noname057%20claims%20cyberattack%20on%20La%20Poste%20services&amp;severity=medium&amp;id=694ef98033784cecd495b6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-grubhub-emails-promise-tenfold-return-on-sent-716cb93f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20GrubHub%20emails%20promise%20tenfold%20return%20on%20sent%20cryptocurrency&amp;severity=high&amp;id=694ef98033784cecd495b6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13158-cwe-1321-improperly-controlled-modi-61fce7bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13158%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20apiDoc%20apidoc-core&amp;severity=critical&amp;id=694eb33b33784cecd475b0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-breach-caused-7-mill-4908a715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20Extension%20Breach%20Caused%20%247%20Million%20Crypto%20Loss%20via%20Malicious%20Code&amp;severity=low&amp;id=694ebaa733784cecd47d1e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-evasive-panda-ran-dns-poisoning-campa-de4fd13f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Evasive%20Panda%20Ran%20DNS%20Poisoning%20Campaign%20to%20Deliver%20MgBot%20Malware&amp;severity=high&amp;id=694ea99af5f69c8dc2a0d494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64645-cwe-367-time-of-check-time-of-use-t-3886589b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64645%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20IBM%20Concert&amp;severity=high&amp;id=694e9f3b2bc1afab4ba470b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36230-cwe-80-improper-neutralization-of-s-74e5d956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36230%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Faspex%205&amp;severity=medium&amp;id=694e9f3b2bc1afab4ba470b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36229-cwe-497-exposure-of-sensitive-syste-ee8c7117</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36229%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Aspera%20Faspex%205&amp;severity=low&amp;id=694e9bb32bc1afab4ba051ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36228-cwe-279-incorrect-execution-assigne-c83eb68f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36228%3A%20CWE-279%20Incorrect%20Execution-Assigned%20Permissions%20in%20IBM%20Aspera%20Faspex%205&amp;severity=low&amp;id=694e9bb32bc1afab4ba051ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36192-cwe-862-missing-authorization-in-ib-ee403eab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36192%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20DS8A00(%20R10.1)&amp;severity=medium&amp;id=694e98cd2bc1afab4b9c3a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14687-cwe-602-client-side-enforcement-of--e85a1f20</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14687%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Db2%20Intelligence%20Center&amp;severity=medium&amp;id=694e8dcb1cd79ac615c4b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13915-cwe-305-authentication-bypass-by-pr-11cca0f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13915%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20API%20Connect&amp;severity=critical&amp;id=694e8dcb1cd79ac615c4b7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ferry-iot-hack-5b55cfb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ferry%20IoT%20Hack&amp;severity=medium&amp;id=694e8a471cd79ac615c0f045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12771-cwe-119-improper-restriction-of-ope-e7d7d9d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12771%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Concert&amp;severity=high&amp;id=694e8a571cd79ac615c0ff4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1721-cwe-244-improper-clearing-of-heap-me-3f8bca1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1721%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=694e8a571cd79ac615c0ff4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langchain-core-vulnerability-exposes-secr-ecd8d0fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20LangChain%20Core%20Vulnerability%20Exposes%20Secrets%20via%20Serialization%20Injection&amp;severity=critical&amp;id=694e7c9ccb0c2e4fdeb3e18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trust-wallet-chrome-extension-hack-tied-to-million-df7f6f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trust%20Wallet%20Chrome%20extension%20hack%20tied%20to%20millions%20in%20losses&amp;severity=high&amp;id=694e7c9ccb0c2e4fdeb3e18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spotify-cracks-down-on-unlawful-scraping-of-86-mil-a2457526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spotify%20cracks%20down%20on%20unlawful%20scraping%20of%2086%20million%20songs&amp;severity=high&amp;id=694e7c9ccb0c2e4fdeb3e193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-year-old-fortinet-fortios-ssl-vpn-flaw-active-3a11fdb1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five-year-old%20Fortinet%20FortiOS%20SSL%20VPN%20flaw%20actively%20exploited&amp;severity=medium&amp;id=694e64d1ddaad31618addf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-langchain-core-vulnerability-exposes-secr-24b8ea8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20LangChain%20Core%20Vulnerability%20Exposes%20Secrets%20via%20Serialization%20Injection&amp;severity=critical&amp;id=694e64e4ddaad31618adf431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67450-cwe-427-uncontrolled-search-path-el-730bb734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67450%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20UPS%20Companion%20software&amp;severity=high&amp;id=694e3453f3b146189c0afb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59888-cwe-428-unquoted-search-path-or-ele-bcb5c8a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59888%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Eaton%20UPS%20Companion%20software&amp;severity=medium&amp;id=694e3453f3b146189c0afb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59887-cwe-427-uncontrolled-search-path-el-b954d403</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59887%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20Eaton%20UPS%20Companion%20Software&amp;severity=high&amp;id=694e3453f3b146189c0afb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62578-cwe-319-cleartext-transmission-of-s-5af203d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62578%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Delta%20Electronics%20DVP-12SE&amp;severity=high&amp;id=694e29d4f3b146189c00bac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8075-cwe-20-improper-input-validation-in--d394635e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8075%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e12d9f3548aedd14cdc88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52601-cwe-321-use-of-hard-coded-cryptogra-706197e2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52601%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20Device%20Manager&amp;severity=medium&amp;id=694e12d9f3548aedd14cdc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52600-cwe-20-improper-input-validation-in-b14ca427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52600%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52599-cwe-269-improper-privilege-manageme-fe306a0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52599%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52598-cwe-295-improper-certificate-valida-7c93afa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52598%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20QNV-C8012&amp;severity=medium&amp;id=694e0f54f3548aedd1483f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15099-improper-authentication-in-simstudi-24cea6ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15099%3A%20Improper%20Authentication%20in%20simstudioai%20sim&amp;severity=medium&amp;id=694e0bd1f3548aedd14620a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15098-server-side-request-forgery-in-yuna-7f3bb429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15098%3A%20Server-Side%20Request%20Forgery%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=694dfdd590f5ab8d8496eb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15097-improper-authentication-in-alteryx--ff12d8a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15097%3A%20Improper%20Authentication%20in%20Alteryx%20Server&amp;severity=medium&amp;id=694df6cb90f5ab8d8495363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15095-cross-site-scripting-in-postmanlabs-ce50d497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15095%3A%20Cross%20Site%20Scripting%20in%20postmanlabs%20httpbin&amp;severity=medium&amp;id=694df6cb90f5ab8d84953634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15094-cross-site-scripting-in-sunkaifei-f-590ca55e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15094%3A%20Cross%20Site%20Scripting%20in%20sunkaifei%20FlyCMS&amp;severity=medium&amp;id=694dec4090f5ab8d848ddc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15093-cross-site-scripting-in-sunkaifei-f-2e22a3c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15093%3A%20Cross%20Site%20Scripting%20in%20sunkaifei%20FlyCMS&amp;severity=medium&amp;id=694de1be90f5ab8d8485b016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15092-buffer-overflow-in-utt-512w-4ff41af4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15092%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dd5fa8e70994989d5204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-26-66477bd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-26&amp;severity=medium&amp;id=694f23a733784cecd4a2ba30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66738-na-f81b2c51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66738%3A%20n%2Fa&amp;severity=high&amp;id=694ebaca33784cecd47d2b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44065-na-ea0be00f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44065%3A%20n%2Fa&amp;severity=critical&amp;id=694ebaca33784cecd47d2b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66737-na-e956d76b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66737%3A%20n%2Fa&amp;severity=medium&amp;id=694eb6b333784cecd47a79ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42718-na-2dd731cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42718%3A%20n%2Fa&amp;severity=medium&amp;id=694eb6b333784cecd47a79aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29720-na-d262a0ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29720%3A%20n%2Fa&amp;severity=medium&amp;id=694eb33b33784cecd475b0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57403-na-b89d59b8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57403%3A%20n%2Fa&amp;severity=high&amp;id=694eb33b33784cecd475b0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67014-na-41ddc1ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67014%3A%20n%2Fa&amp;severity=high&amp;id=694eac67f5f69c8dc2a51203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66947-na-fffce203</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66947%3A%20n%2Fa&amp;severity=medium&amp;id=694ea97cf5f69c8dc2a0b964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67015-na-35bedd05</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67015%3A%20n%2Fa&amp;severity=high&amp;id=694ea97cf5f69c8dc2a0b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67013-na-9ad5da5f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67013%3A%20n%2Fa&amp;severity=medium&amp;id=694ea97cf5f69c8dc2a0b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25341-na-52f6fdc5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25341%3A%20n%2Fa&amp;severity=high&amp;id=694ea55ef5f69c8dc29d5015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67349-na-dabe5216</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67349%3A%20n%2Fa&amp;severity=medium&amp;id=694ea1e7f5f69c8dc2984abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65885-na-128e8357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65885%3A%20n%2Fa&amp;severity=medium&amp;id=694e9f3b2bc1afab4ba470b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15091-buffer-overflow-in-utt-512w-a4ed831e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15091%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dcb6d8e70994989c8c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14913-cwe-862-missing-authorization-in-wp-254f1c52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14913%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=694dc7eb8e70994989c72dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15090-buffer-overflow-in-utt-512w-48838686</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15090%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dd8a490f5ab8d848037d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15089-buffer-overflow-in-utt-512w-d90fd5fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15089%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=694dc5dd8e70994989c5c8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15088-sql-injection-in-ketr-jepaas-37627fd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15088%3A%20SQL%20Injection%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=694db6612ae90972ac5c78a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15087-improper-authorization-in-youlaitec-6bc441ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15087%3A%20Improper%20Authorization%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694da8ba9e3e753cc31e3817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15086-improper-access-controls-in-youlait-d3f42cf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15086%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694da1bc9e3e753cc3176e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68936-cwe-79-improper-neutralization-of-i-8929366f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694d9b76ac739891066893e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68935-cwe-79-improper-neutralization-of-i-a1d33b23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694d9b76ac739891066893e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15085-improper-authorization-in-youlaitec-88700874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15085%3A%20Improper%20Authorization%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=694d9b76ac739891066893e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15084-improper-access-controls-in-youlait-95491511</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15084%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=low&amp;id=694d87052ffa995e0cff37ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15083-on-chip-debug-and-test-interface-wi-3e4729a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15083%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20TOZED%20ZLT%20M30s&amp;severity=low&amp;id=694d7662f4aff2fc081e1f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15082-information-disclosure-in-tozed-zlt-81a0e5d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15082%3A%20Information%20Disclosure%20in%20TOZED%20ZLT%20M30s&amp;severity=medium&amp;id=694d6f65f4aff2fc0818851c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15081-command-injection-in-jd-cloud-be650-1008c4b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15081%3A%20Command%20Injection%20in%20JD%20Cloud%20BE6500&amp;severity=medium&amp;id=694d55421baa80570922cc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-stealth-loaders-ai-chatbot-fla-99e7b5e5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Stealth%20Loaders%2C%20AI%20Chatbot%20Flaws%20AI%20Exploits%2C%20Docker%20Hack%2C%20and%2015%20More%20Stories&amp;severity=medium&amp;id=694d59541baa805709281622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2307-cwe-79-improper-neutralization-of-in-29d3bb3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Aidango&amp;severity=high&amp;id=694d3ac1a66482ded1ed29ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2406-cwe-79-improper-neutralization-of-in-f29ffd48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Trizbi&amp;severity=high&amp;id=694d3ac1a66482ded1ed2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2405-cwe-79-improper-neutralization-of-in-22548e54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Verisay%20Communication%20and%20Information%20Technology%20Industry%20and%20Trade%20Ltd.%20Co.%20Titarus&amp;severity=high&amp;id=694d3ac1a66482ded1ed2a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-mas-windows-activation-domain-used-to-spread--c59c8530</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20MAS%20Windows%20activation%20domain%20used%20to%20spread%20PowerShell%20malware&amp;severity=high&amp;id=694d373ea66482ded1ea090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-digiever-nvr-vulnera-4793cc5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20Digiever%20NVR%20Vulnerability%20Allowing%20Remote%20Code%20Execution&amp;severity=high&amp;id=694d373ea66482ded1ea08f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-active-exploitation-of-fortios-s-7588133f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20Active%20Exploitation%20of%20FortiOS%20SSL%20VPN%202FA%20Bypass%20Vulnerability&amp;severity=high&amp;id=694d373ea66482ded1ea08fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-2022-breach-led-to-years-long-cryptocurre-2c8e1d63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%202022%20Breach%20Led%20to%20Years-Long%20Cryptocurrency%20Thefts%2C%20TRM%20Labs%20Finds&amp;severity=medium&amp;id=694d373ea66482ded1ea092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/csrf-protection-without-tokens-or-hidden-form-fiel-a9bc5643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSRF%20Protection%20without%20Tokens%20or%20Hidden%20Form%20Fields&amp;severity=medium&amp;id=694d1965e0af5c9a9a86af7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-active-exploitation-of-fortios-s-5e3d59b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20Active%20Exploitation%20of%20FortiOS%20SSL%20VPN%202FA%20Bypass%20Vulnerability&amp;severity=low&amp;id=694cf78a3d2785a864bf3f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-digiever-nvr-vulnera-5de96a0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20Digiever%20NVR%20Vulnerability%20Allowing%20Remote%20Code%20Execution&amp;severity=critical&amp;id=694d0abe9393940d4873d875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15078-sql-injection-in-itsourcecode-stude-dbef1ba7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15078%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cc81abddd8c7d7f664829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15077-sql-injection-in-itsourcecode-stude-a57572a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15077%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cba530921a92379b92d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15076-path-traversal-in-tenda-ch22-e4cfe51b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15076%3A%20Path%20Traversal%20in%20Tenda%20CH22&amp;severity=medium&amp;id=694cb5998e23ad4a677a863f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15075-sql-injection-in-itsourcecode-stude-adeb5c49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15075%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694cab0d8e23ad4a67740162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15074-sql-injection-in-itsourcecode-onlin-711b6435</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15074%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=694cab0d8e23ad4a6774015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-25-be54d0ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-25&amp;severity=medium&amp;id=694dd26a8e70994989cf121e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freebsd-rtsold-15x-remote-code-execution-via-dnssl-4131792e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreeBSD%20rtsold%2015.x%20-%20Remote%20Code%20Execution%20via%20DNSSL&amp;severity=critical&amp;id=694d89022ffa995e0c012b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chained-quiz-135-unauthenticated-insecure-direct-o-4650e5dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chained%20Quiz%20%201.3.5%20-%20Unauthenticated%20Insecure%20Direct%20Object%20Reference%20via%20Cookie&amp;severity=medium&amp;id=694d89022ffa995e0c012b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-quiz-maker-67056-sql-injection-b1412d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Quiz%20Maker%206.7.0.56%20-%20SQL%20Injection&amp;severity=medium&amp;id=694d89022ffa995e0c012b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66378-cwe-863-incorrect-authorization-in--84f7457e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66378%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pexip%20Infinity&amp;severity=medium&amp;id=694cc81abddd8c7d7f664839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66377-cwe-306-missing-authentication-for--49ad67de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66377%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59683-cwe-863-incorrect-authorization-in--67144ea5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59683%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48704-cwe-617-reachable-assertion-in-pexi-da833cc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48704%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc81abddd8c7d7f664830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66443-cwe-617-reachable-assertion-in-pexi-cc25f33f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66443%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66379-cwe-617-reachable-assertion-in-pexi-7de5280c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66379%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49088-cwe-617-reachable-assertion-in-pexi-892678d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49088%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=medium&amp;id=694cc4e20921a92379c39d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32096-cwe-617-reachable-assertion-in-pexi-0e88440b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32096%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32095-cwe-617-reachable-assertion-in-pexi-2da95b82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32095%3A%20CWE-617%20Reachable%20Assertion%20in%20Pexip%20Infinity&amp;severity=high&amp;id=694cc4e20921a92379c39d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/websocket-rce-in-the-curseforge-launcher-6c8dbc1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebSocket%20RCE%20in%20the%20CurseForge%20Launcher&amp;severity=medium&amp;id=694c81885f4e95c0c378ae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15073-sql-injection-in-itsourcecode-onlin-836a4e29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15073%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Frozen%20Foods%20Ordering%20System&amp;severity=medium&amp;id=694c7418585daa086f41f356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68920-cwe-862-missing-authorization-in-ke-f2f7c763</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68920%3A%20CWE-862%20Missing%20Authorization%20in%20kermitproject%20C-Kermit&amp;severity=high&amp;id=694c648a9a174f390b50ac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-targeting-india-using-tax-themed-phishi-778f2deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Targeting%20India%20Using%20Tax%20Themed%20Phishing%20Lures&amp;severity=medium&amp;id=694e5d4fddaad31618a6af91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68919-cwe-532-insertion-of-sensitive-info-22835cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68919%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Fujitsu%20%2F%20Fsas%20Technologies%20ETERNUS%20SF%20ACM%2FSC%2FExpress&amp;severity=medium&amp;id=694c5c919a174f390b469df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68917-cwe-79-improper-neutralization-of-i-01fd401c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ONLYOFFICE%20Document%20Server&amp;severity=medium&amp;id=694c4f8fd9ecbeec2ac2a95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8769-cwe-20-in-megasys-computer-technolog-34cd1760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8769%3A%20CWE-20%20in%20MegaSys%20Computer%20Technologies%20Telenium%20Online%20Web%20Application&amp;severity=critical&amp;id=694c4c0ad9ecbeec2abe38b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3232-cwe-306-in-mitsubishi-electric-europ-d9ab6730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3232%3A%20CWE-306%20in%20Mitsubishi%20Electric%20Europe%20smartRTU&amp;severity=high&amp;id=694c4887d9ecbeec2abc776c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68916-cwe-25-path-traversal-filedir-in-ri-5d011025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68916%3A%20CWE-25%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20Riello%20NetMan&amp;severity=critical&amp;id=694c450ed9ecbeec2ab862a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68915-cwe-79-improper-neutralization-of-i-691de484</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Riello%20NetMan&amp;severity=medium&amp;id=694c450ed9ecbeec2ab8629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68914-cwe-89-improper-neutralization-of-s-f429854c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68914%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Riello%20NetMan&amp;severity=medium&amp;id=694c450ed9ecbeec2ab8629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36154-cwe-313-cleartext-storage-in-a-file-67d69f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36154%3A%20CWE-313%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20IBM%20Concert&amp;severity=medium&amp;id=694c3aaadf08e956cf26e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-macos-stealer-uses-signed-app-to-bypas-3139da34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20macOS%20Stealer%20Uses%20Signed%20App%20to%20Bypass%20Apple%20Gatekeeper&amp;severity=high&amp;id=694c303a484fa739dbdc500e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-macos-stealer-uses-signed-app-to-bypas-d4ac26f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20macOS%20Stealer%20Uses%20Signed%20App%20to%20Bypass%20Apple%20Gatekeeper&amp;severity=medium&amp;id=694c2f82484fa739dbdb4e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2515-incorrect-authorization-in-eclipse-f-10af996d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2515%3A%20Incorrect%20Authorization%20in%20Eclipse%20Foundation%20BlueChi&amp;severity=high&amp;id=694c14c8c1b1db9e83c081da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-domain-storing-bank-credentials-stolen--ed46e74d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%20domain%20storing%20bank%20credentials%20stolen%20from%20U.S.%20victims&amp;severity=high&amp;id=694c114cc1b1db9e83bc86ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mongodb-warns-admins-to-patch-severe-rce-flaw-imme-69c4c61c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MongoDB%20warns%20admins%20to%20patch%20severe%20RCE%20flaw%20immediately&amp;severity=critical&amp;id=694c114cc1b1db9e83bc86a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43876-cwe-78-improper-neutralization-of-s-ef95807e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43876%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=694c098b550a31ae84b9ba46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43875-cwe-78-improper-neutralization-of-s-97654d86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43875%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=694c0608550a31ae84b6c530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-hackers-claim-cyberattack-on-french-po-b945c549</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Hackers%20Claim%20Cyberattack%20on%20French%20Postal%20Service&amp;severity=medium&amp;id=694bfbad5a2eea8446bf8390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2155-cwe-434-unrestricted-upload-of-file--729e743a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2155%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Echo%20Call%20Center%20Services%20Trade%20and%20Industry%20Inc.%20Specto%20CM&amp;severity=high&amp;id=694bfbca5a2eea8446bfa2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2154-cwe-79-improper-neutralization-of-in-8026720a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2154%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Echo%20Call%20Center%20Services%20Trade%20and%20Industry%20Inc.%20Specto%20CM&amp;severity=medium&amp;id=694bfbca5a2eea8446bfa2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-panda-apt-poisons-dns-requests-to-deliver--2df365db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Panda%20APT%20poisons%20DNS%20requests%20to%20deliver%20MgBot&amp;severity=medium&amp;id=694c0607550a31ae84b6c4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68606-exposure-of-sensitive-system-inform-45d0e715</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68606%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPXPO%20PostX&amp;severity=high&amp;id=694bea27279c98bf57f75488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68605-improper-neutralization-of-input-du-57892407</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=medium&amp;id=694bea27279c98bf57f75485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68603-missing-authorization-in-marketing--1fa6060f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68603%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Editorial%20Calendar&amp;severity=high&amp;id=694bea25279c98bf57f75472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68602-url-redirection-to-untrusted-site-o-3eb82e75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68602%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Scott%20Paterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=694bea25279c98bf57f7546f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68601-cross-site-request-forgery-csrf-in--5507ce57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=high&amp;id=694bea25279c98bf57f7546c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68600-server-side-request-forgery-ssrf-in-c3cb034b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68600%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Yannick%20Lefebvre%20Link%20Library&amp;severity=critical&amp;id=694bea25279c98bf57f75469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68599-improper-neutralization-of-input-du-676d4414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Embeds%20For%20YouTube%20Plugin%20Support%20YouTube%20Embed&amp;severity=medium&amp;id=694bea25279c98bf57f75466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68598-improper-neutralization-of-input-du-3ce8a961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiveComposer%20Page%20Builder%3A%20Live%20Composer&amp;severity=medium&amp;id=694bea25279c98bf57f75463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68597-improper-neutralization-of-input-du-1552e644</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=medium&amp;id=694bea25279c98bf57f75460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68596-missing-authorization-in-bit-apps-b-ab595958</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68596%3A%20Missing%20Authorization%20in%20Bit%20Apps%20Bit%20Assist&amp;severity=high&amp;id=694bea25279c98bf57f7545d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68595-missing-authorization-in-trustindex-c6c34d56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68595%3A%20Missing%20Authorization%20in%20Trustindex%20Widgets%20for%20Social%20Photo%20Feed&amp;severity=high&amp;id=694bea25279c98bf57f7545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68594-missing-authorization-in-assaf-para-994714a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68594%3A%20Missing%20Authorization%20in%20Opinion%20Stage%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=high&amp;id=694bea25279c98bf57f75457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68593-missing-authorization-in-liton-aref-607a8db7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68593%3A%20Missing%20Authorization%20in%20Liton%20Arefin%20WP%20Adminify&amp;severity=high&amp;id=694bea23279c98bf57f752cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68592-missing-authorization-in-liton-aref-7dee314a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68592%3A%20Missing%20Authorization%20in%20Liton%20Arefin%20WP%20Adminify&amp;severity=high&amp;id=694bea23279c98bf57f752ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68591-missing-authorization-in-mitchell-b-270364fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68591%3A%20Missing%20Authorization%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=high&amp;id=694bea23279c98bf57f752c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68590-improper-neutralization-of-special--5849784a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20HubSpot&amp;severity=critical&amp;id=694bea23279c98bf57f752c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68589-missing-authorization-in-wp-socio-w-34e87768</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68589%3A%20Missing%20Authorization%20in%20WP%20Socio%20WP%20Telegram%20Widget%20and%20Join%20Link&amp;severity=high&amp;id=694bea23279c98bf57f752c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68588-missing-authorization-in-totalsoft--3a4b17d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68588%3A%20Missing%20Authorization%20in%20totalsoft%20TS%20Poll&amp;severity=high&amp;id=694bea23279c98bf57f752be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68587-missing-authorization-in-bob-watu-q-b2d3b854</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68587%3A%20Missing%20Authorization%20in%20Bob%20Watu%20Quiz&amp;severity=high&amp;id=694bea23279c98bf57f752bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68586-missing-authorization-in-gora-tech--e11fcfc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68586%3A%20Missing%20Authorization%20in%20Gora%20Tech%20Cooked&amp;severity=high&amp;id=694bea23279c98bf57f752b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68585-missing-authorization-in-ben-balter-19e9ceaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68585%3A%20Missing%20Authorization%20in%20Ben%20Balter%20WP%20Document%20Revisions&amp;severity=high&amp;id=694bea23279c98bf57f752b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68584-cross-site-request-forgery-csrf-in--fbd9bc8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68584%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Constantin%20Boiangiu%20Vimeotheque&amp;severity=high&amp;id=694bea23279c98bf57f752b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68583-cross-site-request-forgery-csrf-in--02da362c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tikweb%20Management%20Fast%20User%20Switching&amp;severity=high&amp;id=694bea21279c98bf57f7529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68582-missing-authorization-in-funnelform-baba8937</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68582%3A%20Missing%20Authorization%20in%20Funnelforms%20Funnelforms%20Free&amp;severity=high&amp;id=694bea21279c98bf57f75297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68581-missing-authorization-in-yithemes-y-6a15eea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68581%3A%20Missing%20Authorization%20in%20YITHEMES%20YITH%20Slider%20for%20page%20builders&amp;severity=high&amp;id=694bea21279c98bf57f75294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68580-cross-site-request-forgery-csrf-in--8e5e1458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68580%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pluginsware%20Advanced%20Classifieds%20%26%20Directory%20Pro&amp;severity=high&amp;id=694bea21279c98bf57f75291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68579-missing-authorization-in-foliovisio-b6436965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68579%3A%20Missing%20Authorization%20in%20FolioVision%20FV%20Simpler%20SEO&amp;severity=high&amp;id=694bea21279c98bf57f7528e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68575-missing-authorization-in-wappointme-9d2aca1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68575%3A%20Missing%20Authorization%20in%20Wappointment%20team%20Wappointment&amp;severity=high&amp;id=694bea21279c98bf57f7528b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68574-improper-neutralization-of-input-du-ebee53be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidcoders%20WPBakery%20Visual%20Composer%20WHMCS%20Elements&amp;severity=medium&amp;id=694bea21279c98bf57f75288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68573-cross-site-request-forgery-csrf-in--7d187062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68573%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Simple%20Keyword%20to%20Link&amp;severity=high&amp;id=694bea21279c98bf57f75285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68572-missing-authorization-in-spider-the-bc813c8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68572%3A%20Missing%20Authorization%20in%20Spider%20Themes%20BBP%20Core&amp;severity=high&amp;id=694bea21279c98bf57f75282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68571-missing-authorization-in-salesmanag-a18de078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68571%3A%20Missing%20Authorization%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=high&amp;id=69cd7651e6bfc5ba1df0b2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68570-improper-neutralization-of-special--dfb7803e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20captivateaudio%20Captivate%20Sync&amp;severity=critical&amp;id=694bea21279c98bf57f7527f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68569-missing-authorization-in-codepeople-17c47c6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68569%3A%20Missing%20Authorization%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=high&amp;id=694bea1e279c98bf57f75256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68568-missing-authorization-in-integratio-eedddb58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68568%3A%20Missing%20Authorization%20in%20Claspo%20Popup%20Builders%20Claspo%20%E2%80%93%20Popups%2C%20Spin%20the%20Wheel%20%26%20Email%20Capture&amp;severity=high&amp;id=694bea1e279c98bf57f75253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68567-cross-site-request-forgery-csrf-in--001ee464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68567%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=694bea1e279c98bf57f75250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68566-improper-neutralization-of-input-du-04d80a8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=694bea1e279c98bf57f7524d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68565-missing-authorization-in-jaybee-twi-49be1953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68565%3A%20Missing%20Authorization%20in%20JayBee%20Twitch%20Player&amp;severity=critical&amp;id=694bea1e279c98bf57f7524a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68506-improper-control-of-filename-for-in-60e27d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=critical&amp;id=694bea1e279c98bf57f75247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68038-deserialization-of-untrusted-data-i-36a7f7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68038%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Icegram%20Icegram%20Express%20Pro&amp;severity=critical&amp;id=694bea1e279c98bf57f75244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67909-authorization-bypass-through-user-c-e45d875b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67909%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=high&amp;id=694bea1e279c98bf57f75241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67633-improper-neutralization-of-input-du-d52e2331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brownbagmarketing%20Greenhouse%20Job%20Board&amp;severity=medium&amp;id=694bea1e279c98bf57f7523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67632-improper-neutralization-of-input-du-acfaf597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Plugin%20Factory%20Google%20AdSense%20for%20Responsive%20Design%20%26%238211%3B%20GARD&amp;severity=medium&amp;id=694bea1e279c98bf57f7523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67631-improper-neutralization-of-input-du-289ad904</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ecommerce%20Platforms%20Gift%20Hunt&amp;severity=medium&amp;id=694bea1c279c98bf57f751fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67630-improper-neutralization-of-input-du-5050b5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webheadcoder%20WH%20Tweaks&amp;severity=medium&amp;id=694bea1c279c98bf57f751fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67629-improper-neutralization-of-input-du-c9760941</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basticom%20Basticom%20Framework&amp;severity=medium&amp;id=694bea1c279c98bf57f751f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67628-improper-neutralization-of-input-du-1dea10f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AMP-MODE%20Review%20Disclaimer&amp;severity=medium&amp;id=694bea1c279c98bf57f751f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67627-improper-neutralization-of-input-du-b5fad6a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TouchOfTech%20Draft%20Notify&amp;severity=medium&amp;id=694bea1c279c98bf57f751f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67625-cross-site-request-forgery-csrf-in--a85bb7c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67625%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tmtraderunner%20Trade%20Runner&amp;severity=high&amp;id=694bea1c279c98bf57f751ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67623-server-side-request-forgery-ssrf-in-19dd6f91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67623%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%206Storage%206Storage%20Rentals&amp;severity=critical&amp;id=694bea1c279c98bf57f751eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67622-cross-site-request-forgery-csrf-in--c3aba9d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67622%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20titopandub%20Evergreen%20Post%20Tweeter&amp;severity=high&amp;id=694bea1c279c98bf57f751e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67621-exposure-of-sensitive-system-inform-300cbe53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67621%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%2010up%20Eight%20Day%20Week%20Print%20Workflow&amp;severity=high&amp;id=694bea1c279c98bf57f751e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nomani-investment-scam-surges-62-using-ai-deepfake-df8f7f6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nomani%20Investment%20Scam%20Surges%2062%25%20Using%20AI%20Deepfake%20Ads%20on%20Social%20Media&amp;severity=medium&amp;id=694bfc755a2eea8446c1242a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54161-e7b46d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54161&amp;severity=null&amp;id=695450bcdb813ff03e2bf882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54103-4d022dec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54103&amp;severity=null&amp;id=695450acdb813ff03e2bebf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54082-e3880816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54082&amp;severity=null&amp;id=695450bcdb813ff03e2bf880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40679-cwe-862-missing-authorization-in-je-21216bf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40679%3A%20CWE-862%20Missing%20Authorization%20in%20Jewel%20Theme%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694be306279c98bf57efd5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32120-cwe-79-improper-neutralization-of-i-d07786cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=medium&amp;id=694be306279c98bf57efd5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28619-cwe-862-missing-authorization-in-bn-281a81ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28619%3A%20CWE-862%20Missing%20Authorization%20in%20bnayawpguy%20Resoto&amp;severity=medium&amp;id=694be306279c98bf57efd5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68608-missing-authorization-in-deluxethem-afcdec58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68608%3A%20Missing%20Authorization%20in%20DeluxeThemes%20Userpro&amp;severity=high&amp;id=694bdf8b279c98bf57ee5aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68563-improper-control-of-filename-for-in-88bf04c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68563%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Unlock%20Lite&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68540-improper-control-of-filename-for-in-5bc65fc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68540%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68537-improper-control-of-filename-for-in-57d681ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68537%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68535-missing-authorization-in-sunshineph-80ac8ddc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68535%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=critical&amp;id=694bdf8b279c98bf57ee5ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68533-improper-neutralization-of-input-du-20c724a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20WC%20Builder&amp;severity=medium&amp;id=694bdf88279c98bf57ee5779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68532-improper-neutralization-of-input-du-ca683309</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20modeltheme%20ModelTheme%20Addons%20for%20WPBakery%20and%20Elementor&amp;severity=medium&amp;id=694bdf88279c98bf57ee5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68530-improper-control-of-filename-for-in-310b31ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68530%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pavothemes%20Bookory&amp;severity=critical&amp;id=694bdf88279c98bf57ee5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68529-cross-site-request-forgery-csrf-in--bbd0073a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rhys%20Wynne%20WP%20Email%20Capture&amp;severity=high&amp;id=694bdf88279c98bf57ee5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68528-improper-neutralization-of-input-du-dd800929</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Free%20Shipping%20Bar%3A%20Amount%20Left%20for%20Free%20Shipping%20for%20WooCommerce&amp;severity=medium&amp;id=694bdf88279c98bf57ee576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68527-improper-neutralization-of-input-du-b6e1ad0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=medium&amp;id=694bdf88279c98bf57ee576a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68525-improper-neutralization-of-input-du-49c67a1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Category%20Icon&amp;severity=medium&amp;id=694bdf88279c98bf57ee5767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68523-missing-authorization-in-spiffy-plu-fe61153d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68523%3A%20Missing%20Authorization%20in%20Spiffy%20Plugins%20Spiffy%20Calendar&amp;severity=high&amp;id=694bdf88279c98bf57ee5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68519-improper-neutralization-of-special--89d8abea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BeRocket%20Brands%20for%20WooCommerce&amp;severity=critical&amp;id=694bdf88279c98bf57ee5761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68517-missing-authorization-in-essekia-ta-1adda1d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68517%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=694bdf88279c98bf57ee575e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68516-insertion-of-sensitive-information--5f260c3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68516%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Essekia%20Tablesome&amp;severity=high&amp;id=694bdf86279c98bf57ee5739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68513-improper-neutralization-of-input-du-f18e7e1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Timeline%20Lite&amp;severity=medium&amp;id=694bdf86279c98bf57ee5736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68512-improper-neutralization-of-input-du-e518f476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68512%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativeinteractivemedia%20Real%203D%20FlipBook&amp;severity=medium&amp;id=694bdf86279c98bf57ee5733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68511-missing-authorization-in-jegstudio--7b211a48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68511%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20Form&amp;severity=critical&amp;id=694bdf86279c98bf57ee5730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68509-url-redirection-to-untrusted-site-o-11879abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68509%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Jeff%20Starr%20User%20Submitted%20Posts&amp;severity=medium&amp;id=694bdf86279c98bf57ee572d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68505-missing-authorization-in-icc0rz-h5p-eb4c9926</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68505%3A%20Missing%20Authorization%20in%20icc0rz%20H5P&amp;severity=high&amp;id=694bdf86279c98bf57ee572a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68500-server-side-request-forgery-ssrf-in-ddcb1747</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68500%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor&amp;severity=critical&amp;id=694bdf86279c98bf57ee5727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68497-improper-neutralization-of-input-du-74e13614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Widgets&amp;severity=medium&amp;id=694bdf86279c98bf57ee5724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68496-improper-neutralization-of-special--129f996e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68496%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20User%20Feedback&amp;severity=critical&amp;id=694bdf86279c98bf57ee5721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68494-exposure-of-sensitive-system-inform-f13a9e04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68494%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=high&amp;id=694bdf86279c98bf57ee571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54061-260db88a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54061&amp;severity=null&amp;id=695450bcdb813ff03e2bf886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54054-7169bde6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54054&amp;severity=null&amp;id=695450acdb813ff03e2bebee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-deep-dive-how-early-boot-dma-attacks-are-ba0ecb99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Deep%20Dive%3A%20How%20Early-Boot%20DMA%20Attacks%20are%20bypassing%20IOMMU%20on%20modern%20UEFI%20systems&amp;severity=critical&amp;id=694bd1cbd92b37ea4884053d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacks-are-evolving-3-ways-to-protect-your-busine-70c77822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacks%20are%20Evolving%3A%203%20Ways%20to%20Protect%20Your%20Business%20in%202026&amp;severity=medium&amp;id=694bd7b3d92b37ea488ac8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurostar-accused-researchers-of-blackmail-for-repo-f0a44ae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurostar%20Accused%20Researchers%20of%20Blackmail%20for%20Reporting%20Serious%20AI%20Chatbot%20Vulnerabilities&amp;severity=high&amp;id=694bce40d92b37ea48822362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-54029-f060d5c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-54029&amp;severity=low&amp;id=695b99acdb813ff03e48b591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sec-files-charges-over-14-million-crypto-scam-usin-1112e1ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEC%20Files%20Charges%20Over%20%2414%20Million%20Crypto%20Scam%20Using%20Fake%20AI-Themed%20Investment%20Tips&amp;severity=medium&amp;id=694bc6d99aa9cfad4fc54f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57840-cwe-269-improper-privilege-manageme-db7f2da9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57840%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Honor%20Magic%20OS&amp;severity=low&amp;id=694b9152c9988d5885b407ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-fines-apple-986-million-over-att-rules-limit-19b0a03f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Fines%20Apple%20%E2%82%AC98.6%20Million%20Over%20ATT%20Rules%20Limiting%20App%20Store%20Competition&amp;severity=low&amp;id=694ba4ad8a0fdcaea830efc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13407-cwe-434-unrestricted-upload-of-file-51add803</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13407%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gravity%20Forms&amp;severity=medium&amp;id=694b843854de1641bdb80e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linearizing-sha-256-via-fractional-modular-analysi-7cd38114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linearizing%20SHA-256%20via%20fractional%20modular%20analysis%20(Kaoru%20Method)&amp;severity=medium&amp;id=694b7d3554de1641bdadf303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66444-cwe-79-improper-neutralization-of-i-600eea9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=694b763354de1641bda79407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66445-cwe-306-missing-authentication-for--a6a62849</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66445%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=high&amp;id=694b736bce42f4d6d98ab670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13773-cwe-94-improper-control-of-generati-9e9b2019</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13773%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=critical&amp;id=694b6fe5ce42f4d6d986e053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15053-sql-injection-in-code-projects-stud-f5d42ed6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15053%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=694b66f1ce42f4d6d97d5045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15052-cross-site-scripting-in-code-projec-d3edc2df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15052%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=694b66f1ce42f4d6d97d503e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15050-unrestricted-upload-in-code-project-a4f6811e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15050%3A%20Unrestricted%20Upload%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=694b38e9b05e549e5d30882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/availability-of-old-crypto-exchange-user-email-add-c2595c46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Availability%20of%20old%20crypto%20exchange%20user%20email%20addresses%3F%20-%20Help%20to%20notify%20victims%20of%20the%20Bitfinex%20Hack%20-%20Now%20the%20largest%20forfeiture%20(113000%20Bitcoins)&amp;severity=medium&amp;id=694b2ef10a0f3cdd674eb766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-24-12cf5821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-24&amp;severity=medium&amp;id=694c81775f4e95c0c3788b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60935-na-b350b626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60935%3A%20n%2Fa&amp;severity=medium&amp;id=694c0d10550a31ae84bde24f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40317-na-f8358d37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40317%3A%20n%2Fa&amp;severity=medium&amp;id=694c098b550a31ae84b9ba42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39037-na-1ee7f50e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39037%3A%20n%2Fa&amp;severity=medium&amp;id=694c0608550a31ae84b6c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35322-na-0ed41982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35322%3A%20n%2Fa&amp;severity=medium&amp;id=694c0608550a31ae84b6c528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58335-cwe-611-improper-restriction-of-xml-955c09dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58335%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20jcthiele%20OpenXRechnungToolbox&amp;severity=medium&amp;id=694b7d3054de1641bdaded10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15049-sql-injection-in-code-projects-onli-e29fbcf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15049%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=694b21afd0b9012ffd6d18db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68696-cwe-918-server-side-request-forgery-bdfea579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68696%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jnunemaker%20httparty&amp;severity=high&amp;id=694b21b0d0b9012ffd6d18e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68665-cwe-502-deserialization-of-untruste-ca398625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68665%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langchainjs&amp;severity=high&amp;id=694b21afd0b9012ffd6d18e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-a-multi-stage-macos-infostealer-0b0922e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20a%20Multi-Stage%20macOS%20Infostealer&amp;severity=medium&amp;id=694b1e37d0b9012ffd6895af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68669-cwe-79-improper-neutralization-of-i-63086d96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68669%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=694b1e31d0b9012ffd688bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68664-cwe-502-deserialization-of-untruste-afc7ade4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68664%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langchain&amp;severity=critical&amp;id=694b1e31d0b9012ffd688bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15048-command-injection-in-tenda-wh450-92b1c857</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15048%3A%20Command%20Injection%20in%20Tenda%20WH450&amp;severity=medium&amp;id=694b2534d0b9012ffd70d6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66213-cwe-78-improper-neutralization-of-s-1966d389</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66213%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66212-cwe-78-improper-neutralization-of-s-88cd29aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66212%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guide-to-preventing-the-most-common-enterprise-soc-56f05de7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guide%20to%20preventing%20the%20most%20common%20enterprise%20social%20engineering%20attacks&amp;severity=medium&amp;id=694b149fd69af40f3136cce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15047-stack-based-buffer-overflow-in-tend-201507ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15047%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b149ad69af40f3136cc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66211-cwe-78-improper-neutralization-of-s-d8597e5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66211%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b149ad69af40f3136cc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-gitlab-breach-exposes-data-of-21000-nissan-3cd215ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20GitLab%20breach%20exposes%20data%20of%2021%2C000%20Nissan%20customers&amp;severity=high&amp;id=694b1115d69af40f31320638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66210-cwe-78-improper-neutralization-of-s-38cb6bef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66210%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b1125d69af40f3132312c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12491-cwe-200-exposure-of-sensitive-infor-a302c821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12491%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Senstar%20Symphony&amp;severity=high&amp;id=694b1125d69af40f31323131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66209-cwe-78-improper-neutralization-of-s-31b72d66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coollabsio%20coolify&amp;severity=critical&amp;id=694b1125d69af40f31323140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12840-cwe-122-heap-based-buffer-overflow--4ad434c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12840%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f3132313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12839-cwe-122-heap-based-buffer-overflow--aed6601a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12839%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f3132313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12495-cwe-122-heap-based-buffer-overflow--24bbd9a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12495%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=high&amp;id=694b1125d69af40f31323134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12838-cwe-59-improper-link-resolution-bef-4a4f503d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12838%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20MSP360%20Free%20Backup&amp;severity=high&amp;id=694b1125d69af40f31323137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13698-cwe-22-improper-limitation-of-a-pat-7d1fce6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13698%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=694b0d93d69af40f312d385a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13715-cwe-502-deserialization-of-untruste-4b7a6668</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13715%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20FaceDetection-DSFD&amp;severity=high&amp;id=694b0d93d69af40f312d387e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13709-cwe-502-deserialization-of-untruste-f9c89a0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13709%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20TFace&amp;severity=high&amp;id=694b0d93d69af40f312d386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13711-cwe-502-deserialization-of-untruste-ffa36311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13711%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20TFace&amp;severity=high&amp;id=694b0d93d69af40f312d3872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13706-cwe-502-deserialization-of-untruste-d380745b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13706%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20PatrickStar&amp;severity=high&amp;id=694b0d93d69af40f312d385e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13708-cwe-502-deserialization-of-untruste-741519b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13708%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20NeuralNLP-NeuralClassifier&amp;severity=high&amp;id=694b0d93d69af40f312d3866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13716-cwe-502-deserialization-of-untruste-3f94be8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13716%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20MimicMotion&amp;severity=high&amp;id=694b0d95d69af40f312d389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13714-cwe-502-deserialization-of-untruste-6024b824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13714%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20MedicalNet&amp;severity=high&amp;id=694b0d93d69af40f312d387a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13710-cwe-502-deserialization-of-untruste-f6f65021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13710%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanVideo&amp;severity=high&amp;id=694b0d93d69af40f312d386e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13707-cwe-502-deserialization-of-untruste-4aaf9e74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13707%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanDiT&amp;severity=high&amp;id=694b0d93d69af40f312d3862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13712-cwe-502-deserialization-of-untruste-0dffb87c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13712%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20HunyuanDiT&amp;severity=high&amp;id=694b0d93d69af40f312d3876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13713-cwe-502-deserialization-of-untruste-9d594f99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13713%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tencent%20Hunyuan3D-1&amp;severity=high&amp;id=694b0d95d69af40f312d38a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15046-stack-based-buffer-overflow-in-tend-bb8b390f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b0d95d69af40f312d38a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13703-cwe-732-incorrect-permission-assign-54400d17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13703%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=694b0d95d69af40f312d389e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14414-cwe-356-product-ui-does-not-warn-us-bd621d58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14414%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0d95d69af40f312d38a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14415-cwe-356-product-ui-does-not-warn-us-d05e72cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14415%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14413-cwe-22-improper-limitation-of-a-pat-9750c4ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14413%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14412-cwe-356-product-ui-does-not-warn-us-e149b9c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14412%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a14d69af40f312b7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14411-cwe-125-out-of-bounds-read-in-soda--16ad1dca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14411%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a14d69af40f312b7ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14410-cwe-125-out-of-bounds-read-in-soda--422d79ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14410%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14409-cwe-787-out-of-bounds-write-in-soda-aaf40247</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14409%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a12d69af40f312b7db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14408-cwe-125-out-of-bounds-read-in-soda--4d00ae35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14408%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14407-cwe-119-improper-restriction-of-ope-9a6bf049</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14407%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Soda%20PDF%20Desktop&amp;severity=low&amp;id=694b0a12d69af40f312b7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14406-cwe-427-uncontrolled-search-path-el-6b0ce000</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14406%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Soda%20PDF%20Desktop&amp;severity=high&amp;id=694b0a12d69af40f312b7da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14421-cwe-125-out-of-bounds-read-in-pdffo-45771e42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14421%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pdfforge%20PDF%20Architect&amp;severity=low&amp;id=694b0a14d69af40f312b7e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14420-cwe-22-improper-limitation-of-a-pat-cbe44120</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14420%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14419-cwe-119-improper-restriction-of-ope-8e33a1be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14419%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14418-cwe-356-product-ui-does-not-warn-us-1d40233a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14418%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14417-cwe-356-product-ui-does-not-warn-us-1f4cc08d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14417%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14416-cwe-356-product-ui-does-not-warn-us-b1fc5776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14416%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20pdfforge%20PDF%20Architect&amp;severity=high&amp;id=694b0a14d69af40f312b7df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14405-cwe-427-uncontrolled-search-path-el-9c217a53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14405%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20PDFsam%20Enhanced&amp;severity=medium&amp;id=694b0a12d69af40f312b7da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14404-cwe-356-product-ui-does-not-warn-us-43ea9253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14404%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14403-cwe-356-product-ui-does-not-warn-us-10cd75a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14403%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14402-cwe-356-product-ui-does-not-warn-us-b0d1ac32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14402%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14401-cwe-125-out-of-bounds-read-in-pdfsa-740f307e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14401%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDFsam%20Enhanced&amp;severity=high&amp;id=694b0a12d69af40f312b7d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14501-cwe-476-null-pointer-dereference-in-d2278806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14501%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Sante%20PACS%20Server&amp;severity=high&amp;id=694b0a18d69af40f312b7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14498-cwe-427-uncontrolled-search-path-el-a8aa08f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14498%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20TradingView%20Desktop&amp;severity=high&amp;id=694b0a18d69af40f312b7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14494-cwe-749-exposed-dangerous-method-or-51ecad4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14494%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14491-cwe-749-exposed-dangerous-method-or-e3145f40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14491%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14489-cwe-749-exposed-dangerous-method-or-10cc5dbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14489%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14490-cwe-749-exposed-dangerous-method-or-31ba8435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14490%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14488-cwe-749-exposed-dangerous-method-or-10f24e49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14488%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14497-cwe-749-exposed-dangerous-method-or-c22ee38f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14497%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14495-cwe-749-exposed-dangerous-method-or-a4ac5c4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14495%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14493-cwe-749-exposed-dangerous-method-or-cd4a49c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14493%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14496-cwe-749-exposed-dangerous-method-or-cf9a401c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14496%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14492-cwe-749-exposed-dangerous-method-or-f2885f23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14492%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20RealDefense%20SUPERAntiSpyware&amp;severity=high&amp;id=694b0a16d69af40f312b7e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14932-cwe-121-stack-based-buffer-overflow-435a0656</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14932%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14933-cwe-190-integer-overflow-or-wraparo-47049827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14933%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14934-cwe-121-stack-based-buffer-overflow-b99bc4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14934%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14935-cwe-122-heap-based-buffer-overflow--7b5e3188</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14935%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14936-cwe-121-stack-based-buffer-overflow-3de4cb37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14936%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20NSF%20Unidata%20NetCDF-C&amp;severity=high&amp;id=694b06504eddf7475afca1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14925-cwe-502-deserialization-of-untruste-330be640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14925%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Accelerate&amp;severity=high&amp;id=694b064e4eddf7475afca179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14922-cwe-502-deserialization-of-untruste-903b28bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14922%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Diffusers&amp;severity=high&amp;id=694b064e4eddf7475afca173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14931-cwe-502-deserialization-of-untruste-f426cae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14931%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20smolagents&amp;severity=critical&amp;id=694b06504eddf7475afca195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14930-cwe-502-deserialization-of-untruste-99c41a0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14930%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14928-cwe-94-improper-control-of-generati-c1738c78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14928%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14924-cwe-502-deserialization-of-untruste-050f3747</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14924%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14920-cwe-502-deserialization-of-untruste-a0d964d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14920%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14926-cwe-94-improper-control-of-generati-c5732c31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14926%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14927-cwe-94-improper-control-of-generati-4d47d1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14921-cwe-502-deserialization-of-untruste-cacb5701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14921%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14929-cwe-502-deserialization-of-untruste-73e34153</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14929%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=694b064e4eddf7475afca185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15045-stack-based-buffer-overflow-in-tend-0cd0200a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15045%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694b06504eddf7475afca1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11419-allocation-of-resources-without-lim-bd726837</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11419%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=694aff404eddf7475af4bf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15044-stack-based-buffer-overflow-in-tend-3c7e80e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15044%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694aff404eddf7475af4bf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53982-improper-neutralization-of-special--2e3e8b04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53982%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sigb%20PMB&amp;severity=critical&amp;id=694af0d43b03476441e1a525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-knocks-offline-frances-postal-banking--a5e5f306</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20knocks%20offline%20France&apos;s%20postal%2C%20banking%20services&amp;severity=high&amp;id=694ae2c73b03476441d427fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-secretly-stealing-cre-30cc9d50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Secretly%20Stealing%20Credentials%20from%20Over%20170%20Sites&amp;severity=high&amp;id=694ae2c73b03476441d427fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-stealer-disguised-as-trusted-mac-app-h-4133f791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20Stealer%20Disguised%20as%20Trusted%20Mac%20App%20Hunts%20Your%20Saved%20Passwords&amp;severity=medium&amp;id=694ad8d52a62208f8b330ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33222-cwe-798-use-of-hard-coded-credentia-89cf704b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33222%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33223-cwe-250-execution-with-unnecessary--627533aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33223%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33224-cwe-250-execution-with-unnecessary--af7b58e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33224%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20NVIDIA%20Isaac%20Launchable&amp;severity=critical&amp;id=694acf18a81ab5ceedee7e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-holiday-scams-docusign-phishing-meets-loan-sp-af1eedb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%20Holiday%20Scams%3A%20Docusign%20Phishing%20Meets%20Loan%20Spam&amp;severity=medium&amp;id=694ad1d72a62208f8b2cf541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-chrome-extensions-caught-secretly-stealing-cre-cbf3b7bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Chrome%20Extensions%20Caught%20Secretly%20Stealing%20Credentials%20from%20Over%20170%20Sites&amp;severity=medium&amp;id=694abd65e971240e2a7b89a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9684-cwe-119-improper-restriction-of-oper-c53b4ea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9684%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20FreyrSCADA%20IEC-60870-5-104&amp;severity=high&amp;id=694aac52a6db0d9209ededd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-hits-romanian-water-authority-1000-syst-d08e6bf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Hits%20Romanian%20Water%20Authority%2C%201000%20Systems%20Knocked%20Offline&amp;severity=medium&amp;id=694a9e45a6db0d9209e0a479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13183-cwe-79-improper-neutralization-of-i-b694b461</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Hotech%20Software%20Inc.%20Otello&amp;severity=high&amp;id=694a96bf8594d4628a6218f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-confirms-impact-from-red-hat-data-breach-b6230865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20Confirms%20Impact%20From%20Red%20Hat%20Data%20Breach&amp;severity=medium&amp;id=694a8c348594d4628a576146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-password-database-used-in-massive-bank--207ad22c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20Password%20Database%20Used%20in%20Massive%20Bank%20Account%20Takeover%20Scheme&amp;severity=medium&amp;id=694a88b570354fdeefe463bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24844-cwe-862-missing-authorization-in-id-0a5f922a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24844%3A%20CWE-862%20Missing%20Authorization%20in%20IdeaBox%20Creations%20PowerPack%20Pro%20for%20Elementor&amp;severity=high&amp;id=694a88f670354fdeefe4c6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52210-vulnerability-in-tyche-softwares-pr-a2c1afa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52210%3A%20Vulnerability%20in%20Tyche%20softwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=694a88f670354fdeefe4c6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68546-cwe-98-improper-control-of-filename-4fc99eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68546%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=critical&amp;id=694a88f670354fdeefe4c6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68544-cwe-98-improper-control-of-filename-ba5e03d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68544%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=high&amp;id=694a855570354fdeefe116a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68548-cwe-79-improper-neutralization-of-i-a7e1cdbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=high&amp;id=694a855570354fdeefe116ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68550-cwe-89-improper-neutralization-of-s-d09e4513</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68550%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VillaTheme%20WPBulky&amp;severity=high&amp;id=694a855570354fdeefe116ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68551-cwe-497-exposure-of-sensitive-syste-893513b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68551%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=high&amp;id=694a81d070354fdeefdcefb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68556-cwe-862-missing-authorization-in-vi-dc415fa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68556%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=medium&amp;id=694a81d070354fdeefdcefb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68557-cwe-862-missing-authorization-in-vi-5dcfeed1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68557%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20Chakra%20test&amp;severity=high&amp;id=694a81d070354fdeefdcefbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68559-cwe-79-improper-neutralization-of-i-1eb5b8e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=high&amp;id=694a81d070354fdeefdcefc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68560-cwe-98-improper-control-of-filename-59c77b4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68560%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20Elementor)&amp;severity=high&amp;id=694a81d070354fdeefdcefc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interpol-arrests-574-in-africa-ukrainian-ransomwar-81ec7e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=INTERPOL%20Arrests%20574%20in%20Africa%3B%20Ukrainian%20Ransomware%20Affiliate%20Pleads%20Guilty&amp;severity=medium&amp;id=694a882670354fdeefe3b3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68561-cwe-89-improper-neutralization-of-s-59c2fc04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68561%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20AutomatorWP&amp;severity=high&amp;id=694a81d070354fdeefdcefc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59886-cwe-20-improper-input-validation-in-2d4c1c69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59886%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Eaton%20Eaton%20xComfort%20ECI&amp;severity=high&amp;id=694a81d070354fdeefdcefbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passwd-a-walkthrough-of-the-google-workspace-passw-1f9ca260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Passwd%3A%20A%20walkthrough%20of%20the%20Google%20Workspace%20Password%20Manager&amp;severity=medium&amp;id=694a882670354fdeefe3b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14635-cwe-79-improper-neutralization-of-i-722f1448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=694a88f670354fdeefe4c6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14000-cwe-79-improper-neutralization-of-i-b54c07cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=694a88f670354fdeefe4c6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pirate-group-annas-archive-copies-256-million-spot-722bf333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pirate%20Group%20Anna%E2%80%99s%20Archive%20Copies%20256%20Million%20Spotify%20Songs%20in%20Data%20Scrape&amp;severity=medium&amp;id=694a7ace70354fdeefd70248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cvss-99-enables-arbitrary-code-e-dac31bf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20(CVSS%209.9)%20Enables%20Arbitrary%20Code%20Execution%20Across%20Thousands%20of%20Instances&amp;severity=critical&amp;id=694a77833c0d0694898a009b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-seizes-fraud-domain-behind-146-million-bank-7bb19014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DoJ%20Seizes%20Fraud%20Domain%20Behind%20%2414.6%20Million%20Bank%20Account%20Takeover%20Scheme&amp;severity=high&amp;id=694a77833c0d0694898a009f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/baker-university-says-2024-data-breach-impacts-530-6582b7cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Baker%20University%20says%202024%20data%20breach%20impacts%2053%2C000%20people&amp;severity=high&amp;id=694a77833c0d0694898a0093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-with-56000-downloads-steals-whatsapp-c-7a751ca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Package%20With%2056%2C000%20Downloads%20Steals%20WhatsApp%20Credentials%2C%20Data&amp;severity=medium&amp;id=694a77573c0d06948989e89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turning-list-unsubscribe-into-an-ssrfxss-gadget-e71ff148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Turning%20List-Unsubscribe%20into%20an%20SSRF%2FXSS%20Gadget&amp;severity=medium&amp;id=694a6cf23c0d0694897f6e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italy-antitrust-agency-fines-apple-116-million-ove-1faa2894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italy%20Antitrust%20Agency%20Fines%20Apple%20%24116%20Million%20Over%20Privacy%20Feature%3B%20Apple%20Announces%20Appeal&amp;severity=medium&amp;id=694a6cd03c0d0694897f57e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-foreign-made-drones-and-key-parts-over-us-251b166f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20Foreign-Made%20Drones%20and%20Key%20Parts%20Over%20U.S.%20National%20Security%20Risks&amp;severity=high&amp;id=694a69643c0d0694897b184c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-digiever-ds-2105-pro-to-its-550b672f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20Digiever%20DS-2105%20Pro%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=694a69643c0d0694897b1850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/574-arrested-3-million-seized-in-crackdown-on-afri-2aecf863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=574%20Arrested%2C%20%243%20Million%20Seized%20in%20Crackdown%20on%20African%20Cybercrime%20Rings&amp;severity=medium&amp;id=694a62a1033f6f66d7774d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14388-cwe-158-improper-neutralization-of--469918d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14388%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20kiboit%20PhastPress&amp;severity=critical&amp;id=694a62c0033f6f66d77784e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12934-cwe-862-missing-authorization-in-be-58e0e17f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12934%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=high&amp;id=694a62c0033f6f66d77784cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14163-cwe-352-cross-site-request-forgery--eb1639ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14163%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=694a62c0033f6f66d77784db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14548-cwe-79-improper-neutralization-of-i-b8f90af3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14548%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kieranoshea%20Calendar&amp;severity=medium&amp;id=694a62c0033f6f66d77784e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14155-cwe-862-missing-authorization-in-le-fcfd4c9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14155%3A%20CWE-862%20Missing%20Authorization%20in%20leap13%20Premium%20Addons%20for%20Elementor%20%E2%80%93%20Powerful%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=694a62c0033f6f66d77784d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-seizes-fraud-domain-behind-146-million-bank-d3911225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DoJ%20Seizes%20Fraud%20Domain%20Behind%20%2414.6%20Million%20Bank%20Account%20Takeover%20Scheme&amp;severity=medium&amp;id=694a76ef3c0d0694898962fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-n8n-flaw-cvss-99-enables-arbitrary-code-e-e75bd99b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20n8n%20Flaw%20(CVSS%209.9)%20Enables%20Arbitrary%20Code%20Execution%20Across%20Thousands%20of%20Instances&amp;severity=critical&amp;id=694a54f9ef649361abadc9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/35-million-affected-by-university-of-phoenix-data--73c7ea66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3.5%20Million%20Affected%20by%20University%20of%20Phoenix%20Data%20Breach&amp;severity=medium&amp;id=694a4707ef649361ab9ffec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-bans-foreign-made-drones-and-key-parts-over-us-4fba9572</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Bans%20Foreign-Made%20Drones%20and%20Key%20Parts%20Over%20U.S.%20National%20Security%20Risks&amp;severity=critical&amp;id=694a4007576fb14eec735518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-disrupts-frances-postal-service-and-ba-f2ab1950</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Disrupts%20France%E2%80%99s%20Postal%20Service%20and%20Banking%20During%20Christmas%20Rush&amp;severity=medium&amp;id=694a2f701ebffca81fee60cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-stealer-evolves-from-clickfix-to-code-sign-22a6d93c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20Stealer%20Evolves%3A%20From%20ClickFix%20to%20Code-Signed%20Swift%20Malware&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trial-error-and-typos-why-some-malware-attacks-are-8fea923a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trial%2C%20Error%2C%20and%20Typos%3A%20Why%20Some%20Malware%20Attacks%20Aren&apos;t%20as%20&apos;Sophisticated&apos;%20as%20You%20Think&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macsync-malware-dropper-evades-macos-gatekeepe-3ecdfa66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MacSync%20malware%20dropper%20evades%20macOS%20Gatekeeper%20checks&amp;severity=high&amp;id=6949f6592404c2324fd731d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-says-thousands-of-customers-exposed-in-red--fc220f6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20says%20thousands%20of%20customers%20exposed%20in%20Red%20Hat%20breach&amp;severity=high&amp;id=6949f6592404c2324fd731c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15034-sql-injection-in-itsourcecode-stude-a1536eb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15034%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=694a15813b5cae87d6da8425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67743-cwe-918-server-side-request-forgery-7319c56c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67743%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LearningCircuit%20local-deep-research&amp;severity=medium&amp;id=694a15813b5cae87d6da842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-23-bf1bb18f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-23&amp;severity=medium&amp;id=694b2edc0a0f3cdd674e7536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65354-na-20a3c195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65354%3A%20n%2Fa&amp;severity=critical&amp;id=694af4523b03476441e587e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25364-na-b2a1931e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25364%3A%20n%2Fa&amp;severity=high&amp;id=694adfdf2a62208f8b3adbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51511-na-3ce435fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51511%3A%20n%2Fa&amp;severity=critical&amp;id=694ad8e82a62208f8b331179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65410-na-f1c896cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65410%3A%20n%2Fa&amp;severity=medium&amp;id=694acb94a81ab5ceedeb10c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65713-na-c0df9882</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65713%3A%20n%2Fa&amp;severity=medium&amp;id=694ac811a81ab5ceede6bf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57521-na-37e5a65a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57521%3A%20n%2Fa&amp;severity=critical&amp;id=694ac811a81ab5ceede6bf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29228-na-4201ef46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29228%3A%20n%2Fa&amp;severity=critical&amp;id=694ac48ca81ab5ceede4f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67111-na-bd2b6c90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67111%3A%20n%2Fa&amp;severity=high&amp;id=694ac115a81ab5ceede10cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50526-na-2157bbff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50526%3A%20n%2Fa&amp;severity=critical&amp;id=694ac115a81ab5ceede10ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45493-na-65f2c3b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45493%3A%20n%2Fa&amp;severity=medium&amp;id=694ac115a81ab5ceede10cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29229-na-2b83df69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29229%3A%20n%2Fa&amp;severity=critical&amp;id=694ac115a81ab5ceede10cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65865-na-83c35a2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65865%3A%20n%2Fa&amp;severity=high&amp;id=694abdbbe971240e2a7c28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67109-na-443d973e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67109%3A%20n%2Fa&amp;severity=critical&amp;id=694ab6b2e971240e2a747f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67108-na-09aab092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67108%3A%20n%2Fa&amp;severity=critical&amp;id=694ab6b2e971240e2a747eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66845-na-97607a2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66845%3A%20n%2Fa&amp;severity=medium&amp;id=694aa1c2a6db0d9209e4958a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-supabase-is-public-33d270ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Supabase%20Is%20Public&amp;severity=medium&amp;id=6949c93566e722bb4ceafa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53964-missing-authentication-for-critical-736117f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53964%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=high&amp;id=6949bf36edc45005c15e342d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53963-improper-neutralization-of-special--558d1744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53963%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf36edc45005c15e3427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53962-improper-limitation-of-a-pathname-t-dd85bb58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53962%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=high&amp;id=6949bf36edc45005c15e3421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53961-cross-site-request-forgery-csrf-in--847bb2d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53961%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=medium&amp;id=6949bf36edc45005c15e341b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53960-improper-neutralization-of-special--30f07277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53960%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf36edc45005c15e3415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53955-authorization-bypass-through-user-c-31e53ed8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53955%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SOUND4%20Ltd.%20Impact%2FPulse%2FFirst&amp;severity=critical&amp;id=6949bf35edc45005c15e340f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53981-improper-neutralization-of-special--e3263d1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53981%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20thibaud-rohmer%20PhotoShow&amp;severity=high&amp;id=6949bf39edc45005c15e34ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53978-improper-neutralization-of-input-du-2793ae8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e348a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53977-improper-neutralization-of-input-du-db59c6e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e3485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53976-improper-neutralization-of-input-du-852834e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mybb%20myBB%20forums&amp;severity=medium&amp;id=6949bf37edc45005c15e3480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53975-improper-neutralization-of-special--2a4e2592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53975%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thedigicraft%20Atom%20CMS&amp;severity=critical&amp;id=6949bf37edc45005c15e347b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53974-missing-authentication-for-critical-e2a4778b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53974%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DSL-124%20Wireless%20N300%20ADSL2%2B&amp;severity=high&amp;id=6949bf37edc45005c15e3475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53973-incorrect-privilege-assignment-in-z-606a5e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53973%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Zillya%20Zillya%20Total%20Security&amp;severity=high&amp;id=6949bf37edc45005c15e3470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53972-improper-neutralization-of-special--85c7b79d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20luiswang%20WebTareas&amp;severity=critical&amp;id=6949bf37edc45005c15e346b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53971-unrestricted-upload-of-file-with-da-4270a38c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53971%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20luiswang%20WebTareas&amp;severity=high&amp;id=6949bf37edc45005c15e3466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53970-missing-authentication-for-critical-c3b85a4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53970%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=high&amp;id=6949bf37edc45005c15e345f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53969-missing-authentication-for-critical-9e6961c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53969%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf37edc45005c15e3458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53968-missing-authentication-for-critical-a38eefbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53968%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf36edc45005c15e3446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53967-missing-authentication-for-critical-6938aa98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53967%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=critical&amp;id=6949bf36edc45005c15e343f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53966-use-of-externally-controlled-format-cd173db7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53966%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SOUND4%20Ltd.%20SOUND4%20LinkAndShare%20Transmitter&amp;severity=critical&amp;id=6949bf36edc45005c15e3439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53965-unquoted-search-path-or-element-in--7cdd93c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53965%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20SOUND4%20Ltd.%20SOUND4%20Server%20Service&amp;severity=high&amp;id=6949bf36edc45005c15e3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68476-cwe-22-improper-limitation-of-a-pat-ba1a9014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kedacore%20keda&amp;severity=high&amp;id=6949bf39edc45005c15e34dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68475-cwe-1333-inefficient-regular-expres-65a715a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68475%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20fedify-dev%20fedify&amp;severity=high&amp;id=6949bb2eedc45005c15a5728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34457-cwe-121-stack-based-buffer-overflow-f17fe992</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20wb2osz%20Dire%20Wolf&amp;severity=high&amp;id=6949bb2eedc45005c15a571c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34458-cwe-617-reachable-assertion-in-wb2o-7d8e8cd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34458%3A%20CWE-617%20Reachable%20Assertion%20in%20wb2osz%20Dire%20Wolf&amp;severity=high&amp;id=6949bb2eedc45005c15a5722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68480-cwe-405-asymmetric-resource-consump-86b8f8d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68480%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20marshmallow-code%20marshmallow&amp;severity=medium&amp;id=6949bf39edc45005c15e34e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interpol-led-action-decrypts-6-ransomware-strains--0779daf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interpol-led%20action%20decrypts%206%20ransomware%20strains%2C%20arrests%20hundreds&amp;severity=high&amp;id=69499cf3c525bff625e6a22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romanian-water-authority-hit-by-ransomware-attack--e161185b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Romanian%20water%20authority%20hit%20by%20ransomware%20attack%20over%20weekend&amp;severity=high&amp;id=69499cf3c525bff625e6a231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-steals-whatsapp-accounts-and-aabdb973</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20package%20steals%20WhatsApp%20accounts%20and%20messages&amp;severity=high&amp;id=69499cf3c525bff625e6a235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urban-vpn-proxy-spies-on-ai-chatbot-conversations-6bc24134</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urban%20VPN%20Proxy%20Spies%20on%20AI%20Chatbot%20Conversations&amp;severity=medium&amp;id=69499cf3c525bff625e6a239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thank-you-reddit-ubroadexample-updated-version-of--c1a8a589</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thank%20you%20reddit%20(u%2Fbroadexample)%20-%20updated%20version%20of%20my%20STIX%20feed&amp;severity=medium&amp;id=69499d45c525bff625e767b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-websites-can-detection-vision-based-ai-agents--d3672297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Websites%20can%20detection%20Vision-Based%20AI%20Agents%20like%20Claude%20Computer%20Use%20and%20OpenAI%20Operator&amp;severity=medium&amp;id=694995f2c525bff625de514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15033-cwe-639-authorization-bypass-throug-4f0a7ed6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15033%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Automattic%20WooCommerce&amp;severity=medium&amp;id=69499d40c525bff625e76670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/19-vulnerabilities-pocs-for-the-mediatek-mt7622-wi-2bb67e74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=19%2B%20Vulnerabilities%20%2B%20PoCs%20for%20the%20MediaTek%20MT7622%20Wifi%20Driver&amp;severity=medium&amp;id=69499281c525bff625dc98a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jetpack-image-sitemap-enumerates-historical-wp-med-bb4ffab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jetpack%20image%20sitemap%20enumerates%20historical%20WP%20media%20content%20even%20when%20not%20present%20in%20published%20HTML%20(timeleak%20pattern)&amp;severity=medium&amp;id=69499265c525bff625dc87fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-breach-affecting-337-million-users-raises--b92d76a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20breach%20affecting%2033.7%20million%20users%20raises%20data%20protection%20questions&amp;severity=high&amp;id=694981a35b5b68b8f5d32598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-phoenix-data-breach-impacts-nearly-3-1c3f7338</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Phoenix%20data%20breach%20impacts%20nearly%203.5%20million%20individuals&amp;severity=high&amp;id=694981a35b5b68b8f5d3258c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-national-pleads-guilty-in-nefilim-ransom-898ad26c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20National%20Pleads%20Guilty%20in%20Nefilim%20Ransomware%20Conspiracy&amp;severity=medium&amp;id=69497e2c5b5b68b8f5cf2c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-income-tax-themed-phishing-campaign-targets-396dda1d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Income%20Tax-Themed%20Phishing%20Campaign%20Targets%20Local%20Businesses&amp;severity=medium&amp;id=694a5f2d033f6f66d772eb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ung0801-tracking-threat-clusters-obsessed-with-av--2217646d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNG0801%3A%20Tracking%20Threat%20Clusters%20obsessed%20with%20AV%20Icon%20Spoofing%20targeting%20Israel&amp;severity=medium&amp;id=694a5f2d033f6f66d772eafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-whatsapp-api-package-on-npm-steals-messages-c-b35e8a61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20WhatsApp%20API%20Package%20on%20npm%20Steals%20Messages%2C%20Contacts%2C%20and%20Login%20Tokens&amp;severity=medium&amp;id=69498cbc5b5b68b8f5deea6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frogblight-malware-targets-android-users-with-fake-860ebbec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frogblight%20Malware%20Targets%20Android%20Users%20With%20Fake%20Court%20and%20Aid%20Apps&amp;severity=medium&amp;id=694970f3d6cb72e86e3c39ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10021-cwe-457-use-of-uninitialized-variab-892ca771</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10021%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Open%20Design%20Alliance%20ODA%20Drawings%20SDK%20-%20All%20Versions%20%3C%202026.12&amp;severity=high&amp;id=69496a9ea3c8169c9ce67026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-caught-a-rust-ddos-botnet-on-my-honeypot-reverse-281667c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20caught%20a%20Rust%20DDoS%20botnet%20on%20my%20honeypot%2C%20reverse%20engineered%20it%2C%20and%20now%20I&apos;m%20monitoring%20its%20targets%20in%20real-time&amp;severity=medium&amp;id=69496aa1a3c8169c9ce67036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61740-cwe-346-origin-validation-error-in--32ecdd5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61740%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=694959ea89a9ac879c469573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26379-cwe-338-use-of-cryptographically-we-dd645ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26379%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=694955df89a9ac879c424572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/54-charged-in-us-over-atm-attacks-involving-ploutu-2cc855e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ATM%20Hackers%20Using%20%E2%80%98Ploutus%E2%80%99%20Malware%20Charged%20in%20US&amp;severity=medium&amp;id=69494ec789a9ac879c3b6f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14018-cwe-428-unquoted-search-path-or-ele-d1a2df04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14018%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20NetBT%20Consulting%20Services%20Inc.%20e-Fatura&amp;severity=high&amp;id=69494ee289a9ac879c3b8d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macsync-macos-malware-distributed-via-signed-swift-d5c63753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacSync%20macOS%20Malware%20Distributed%20via%20Signed%20Swift%20Application&amp;severity=medium&amp;id=69494186120b5bbb4ee44c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-popular-monitoring-tool-nezha-as-a-s-4fde7c18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Popular%20Monitoring%20Tool%20Nezha%20as%20a%20Stealth%20Trojan&amp;severity=medium&amp;id=6949419d120b5bbb4ee45867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22nd-december-threat-intelligence-report-94c45600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22nd%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69493e10120b5bbb4ee25d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-firewall-exploits-ai-data-theft-andro-770aa404</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Firewall%20Exploits%2C%20AI%20Data%20Theft%2C%20Android%20Hacks%2C%20APT%20Attacks%2C%20Insider%20Leaks%20%26%20More&amp;severity=medium&amp;id=694937e70a7f5b66fcfa78e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/insider-threat-hackers-offering-cash-for-company-i-f174e3ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Insider%20Threat%3A%20Hackers%20Offering%20Cash%20for%20Company%20Insiders%20to%20Bypass%20Security&amp;severity=medium&amp;id=694933e20a7f5b66fcf615ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54890-cwe-79-improper-neutralization-of-i-070f5001</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=694929690a7f5b66fcebbfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12514-cwe-89-improper-neutralization-of-s-b03e453a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12514%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring%20-%20Open-tickets&amp;severity=high&amp;id=694926ef9679ab05af621755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-nefilim-ransomware-affiliate-pleads-guil-376563e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Nefilim%20Ransomware%20Affiliate%20Pleads%20Guilty%20in%20US&amp;severity=medium&amp;id=694926d69679ab05af620d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8460-cwe-79-improper-neutralization-of-in-4bf5a4a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=694926ef9679ab05af621758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/waymo-suspends-service-after-power-outage-hit-san--3d6fd441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Waymo%20suspends%20service%20after%20power%20outage%20hit%20San%20Francisco&amp;severity=medium&amp;id=69491f509679ab05af5852d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-discloses-a-data-breach-impac-db43eafe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20discloses%20a%20data%20breach%20impacting%2027%2C000%20people&amp;severity=high&amp;id=69491f509679ab05af5852d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-hacker-admits-affiliate-role-in-nefilim--60cd7b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20hacker%20admits%20affiliate%20role%20in%20Nefilim%20ransomware%20gang&amp;severity=high&amp;id=69491f509679ab05af5852d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61739-cwe-323-reusing-a-nonce-key-pair-in-b4f9f167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61739%3A%20CWE-323%20Reusing%20a%20Nonce%2C%20Key%20pair%20in%20encryption%20in%20Johnson%20Controls%20IQ%20Panels2%2C%202%2B%2C%20IQHub%2C%20IQPanel%204%2C%20PowerG&amp;severity=high&amp;id=69491f829679ab05af587010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61738-cwe-319-cleartext-transmission-of-s-226a1fc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61738%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Johnson%20Controls%20IQPanel2%2C%09IQHub%2CIQPanel2%2B%2CIQPanel%204%2CPowerG&amp;severity=low&amp;id=69491bd19679ab05af567f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62094-cwe-79-improper-neutralization-of-i-361917d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidthemes%20Void%20Elementor%20WHMCS%20Elements%20For%20Elementor%20Page%20Builder&amp;severity=high&amp;id=694915f817ee8e546cf7ec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-patches-firebox-zero-day-exploited-in-t-8e6753b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Patches%20Firebox%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=694915d517ee8e546cf7bcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62107-cwe-352-cross-site-request-forgery--eac51b26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62107%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginOps%20Feather%20Login%20Page&amp;severity=high&amp;id=694915f817ee8e546cf7ec96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62880-cwe-352-cross-site-request-forgery--ece79c6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kunal%20Custom%20404%20Pro&amp;severity=medium&amp;id=694915f817ee8e546cf7ec99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-government-acknowledges-it-is-investigating-cyb-618545e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Government%20Acknowledges%20It%20Is%20Investigating%20Cyber%20Incident%20After%20Media%20Reports&amp;severity=low&amp;id=69490aac17ee8e546cec44ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8305-cwe-200-exposure-of-sensitive-inform-0faa840c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8305%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Identity%20Awareness&amp;severity=medium&amp;id=6948fd2e2cf13c7ddd47406e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8304-cwe-200-exposure-of-sensitive-inform-698100f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8304%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Identity%20Agent&amp;severity=medium&amp;id=6948fd2e2cf13c7ddd474071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-operations-merge-droppers-sms-thef-28c10803</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Operations%20Merge%20Droppers%2C%20SMS%20Theft%2C%20and%20RAT%20Capabilities%20at%20Scale&amp;severity=medium&amp;id=6948f3514c0b8833c8a1e25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11545-cwe-497-exposure-of-sensitive-syste-092c5862</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11545%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-PA1705UL-W%2C%20NP-PA1705UL-W%2B%2C%20NP-PA1705UL-B%2C%20NP-PA1705UL-B%2B%2C%20NP-PA1505UL-W%2C%20NP-PA1505UL-W%2B%2C%20NP-PA1505UL-B%2C%20NP-PA1505UL-B%2B%2C%20NP-PA1505UL-BJL%20NP-PV800UL-W%2C%20NP-PV800UL-W%2B%2C%20NP-PV800UL-B%2C%20NP-PV800UL-B%2B%2C%20NP-PV710UL-W%2C%20NP-PV710UL-W%2B%2C%20NP-PV710UL-B%2C%20NP-PV710UL-B%2B%2C%20NP-PV800UL-W1%2C%20NP-PV800UL-B1%2C%20NP-PV710UL-W1%2C%20NP-PV710UL-B1%2C%20NP-PV800UL-B1G%2C%20NP-PV710UL-B1G%2C%20NP-PV800UL-WH%2C%20NP-PV710UL-WH%2C%20NP-P627UL%2C%20NP-P627ULG%2C%20NP-P627UL%2B%2C%20NP-P547UL%2C%20NP-P547ULG%2C%20NP-P607UL%2B%2C%20NP-CG6600UL%2C%20NP-H6271UL%2C%20NP-H5471UL%2C%20NP-P627ULH%2C%20NP-P547ULH%20NP-PV710UL%2B%20NP-PA1004UL-W%2C%20NP-PA1004UL-WG%2C%20NP-PA1004UL-W%2B%2C%20NP-PA1004UL-WH%2C%20NP-PA1004UL-B%2C%20NP-PA1004UL-BG%2C%20NP-PA1004UL-B%2B%2C%20NP-PA804UL-W%2C%20NP-PA804UL-WG%2C%20NP-PA804UL-W%2B%2C%20NP-PA804UL-WH%2C%20NP-PA804UL-B%2C%20NP-PA804UL-BG%2C%20NP-PA804UL-B%2B%2C%20NP-PA1004UL-BH%2C%20NP-PA804UL-BH%2C%20NP-PE455UL%2C%20NP-PE455ULG%2C%20NP-PE455WL%2C%20NP-PE455WLG%2C%20NP-PE505XLG%2C%20NP-CG6500XL%2C%20NP-CG6400UL%2C%20NP-CG6400WL%2C%20NP-CB4500XL%2C%20NP-CA4120X%2C%20NP-CA4160W%2C%20NP-CA4160X%2C%20NP-CA4200U%2C%20NP-CA4200W%2C%20NP-CA4202W%2C%20NP-CA4260X%2C%20NP-CA4300X%2C%20NP-CA4355X%2C%20NP-CD2100U%2C%20NP-CD2120X%2C%20NP-CD2300X%2C%20NP-CR2100X%2C%20NP-CR2170W%2C%20NP-CR2170X%2C%20NP-CR2200U%2C%20NP-CR2200W%2C%20NP-CR2280X%2C%20NP-CR2310X%2C%20NP-CR2350X%2C%20NP-MC302XG%2C%20NP-MC332WG%2C%20NP-MC342XG%2C%20NP-MC372X%2C%20NP-MC372XG%2C%20NP-MC382W%2C%20NP-MC382WG%2C%20NP-MC422XG%2C%20NP-ME342UG%2C%20NP-ME372W%2C%20NP-ME372WG%2C%20NP-ME382U%2C%20NP-ME382UG%2C%20NP-ME402X%2C%20NP-ME402XG%20NP-CU4300XD%2C%20NP-CU4200XD%2C%20NP-CU4200WD%2C%20NP-UM383WL%2C%20NP-UM383WLG%2C%20NP-CJ2200WD%2C%20NP-PH3501QL%2C%20NP-PH3501QL%2B%2C%20NP-PH2601QL%2C%20NP-PH2601QL%2B%2C%20NP-PH350Q40L%2C%20NP-PH260Q30L%2C%20NP-PX1005QL-W%2C%20NP-PX1005QL-B%2C%20NP-PX1005QL-B%2B%2C%20NP-P525UL%2C%20NP-P525ULG%2C%20NP-P525UL%2B%2C%20NP-P525WL%2C%20NP-P525WLG%2C%20NP-P525WL%2B%2C%20NP-P605UL%2C%20NP-P605ULG%2C%20NP-P605UL%2B&amp;severity=critical&amp;id=6948d6e9f380eec6876e960d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11544-cwe-912-hidden-functionality-in-sha-156315c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11544%3A%20CWE-912%3A%20Hidden%20Functionality%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P627UL%2C%20NP-P627ULG%2C%20NP-P627UL%2B%2C%20NP-P547UL%2C%20NP-P547ULG%2C%20NP-P607UL%2B%2C%20NP-CG6600UL%2C%20NP-H6271UL%2C%20NP-H5471UL%2C%20NP-P627ULH%2C%20NP-P547ULH%2C%20NP-PE455UL%2C%20NP-PE455ULG%2C%20NP-PE455WL%2C%20NP-PE455WLG%2C%20NP-PE505XLG%2C%20NP-CG6500XL%2C%20NP-CG6400UL%2C%20NP-CG6400WL%2C%20NP-CB4500XL%2C%20NP-CA4120X%2C%20NP-CA4160W%2C%20NP-CA4160X%2C%20NP-CA4200U%2C%20NP-CA4200W%2C%20NP-CA4202W%2C%20NP-CA4260X%2C%20NP-CA4300X%2C%20NP-CA4355X%2C%20NP-CD2100U%2C%20NP-CD2120X%2C%20NP-CD2300X%2C%20NP-CR2100X%2C%20NP-CR2170W%2C%20NP-CR2170X%2C%20NP-CR2200U%2C%20NP-CR2200W%2C%20NP-CR2280X%2C%20NP-CR2310X%2C%20NP-CR2350X%2C%20NP-MC302XG%2C%20NP-MC332WG%2C%20NP-MC342XG%2C%20NP-MC372X%2C%20NP-MC372XG%2C%20NP-MC382W%2C%20NP-MC382WG%2C%20NP-MC422XG%2C%20NP-ME342UG%2C%20NP-ME372W%2C%20NP-ME372WG%2C%20NP-ME382U%2C%20NP-ME382UG%2C%20NP-ME402X%2C%20NP-ME402XG%2C%20NP-P525UL%2C%20NP-P525ULG%2C%20NP-P525UL%2B%2C%20NP-P525WL%2C%20NP-P525WLG%2C%20NP-P525WL%2B%2C%20NP-P605UL%2C%20NP-P605ULG%2C%20NP-P605UL%2B%2C%20NP-CG6500UL%2C%20NP-CG6500WL%2C%20NP-CB4500UL%2C%20NP-CB4500WL%2C%20NP-P525ULH%2C%20NP-P525WLH%2C%20NP-P605ULH%2C%20NP-P554U%2C%20NP-P554UG%2C%20NP-P554U%2B%2C%20NP-P554W%2C%20NP-P554WG%2C%20NP-P554W%2B%2C%20NP-P474U%2C%20NP-P474UG%2C%20NP-P474W%2C%20NP-P474WG%2C%20NP-P604XG%2C%20NP-P604X%2B%2C%20NP-P603XG%2C%20NP-P523X%2B%2C%20NP-PE523XG%2C%20NP-PE523X%2B%2C%20NP-CF6600U%2C%20NP-CF6600W%2C%20NP-CF6700X%2C%20NP-CF6500X%2C%20NP-CB4600U%2C%20NP-P554UH%2C%20NP-P554WH%2C%20NP-P474UH%2C%20NP-P474WH%2C%20NP-P604XH%2C%20NP-P603XH%2C%20NP-PE523XH%2C%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%20%2CNP-ME401W%2C%20NP-ME361W%2C%20NP-ME331W%2C%20NP-ME301W%2C%20NP-ME401X%2C%20NP-ME361X%2C%20NP-ME331X%2C%20NP-ME301X%2C%20NP-ME401WG%2C%20NP-ME361WG%2C%20NP-ME331WG%2C%20NP-ME301WG%2C%20NP-ME401XG%2C%20NP-ME361XG%2C%20NP-ME331XG%2C%20NP-ME301XG%2C%20NP-CA4155W%2C%20NP-CA4350X%2C%20NP-CA4255X%2C%20NP-CA4155X%2C%20NP-CA4115X%2C%20NP-MC331WG%2C%20NP-MC421XG%2C%20NP-MC401XG%2C%20NP-MC371XG%2C%20NP-MC331XG%2C%20NP-MC301XG%2C%20NP-CK4155W%2C%20NP-CK4255X%2C%20NP-CK4155X%2C%20NP-CK4055X%2C%20NP-CM4150X%2C%20NP-CM4050X%2C%20NP-CK4155WG%2C%20NP-CK4255XG%2C%20NP-CK4155XG%2C%20NP-CR2165W%2C%20NP-CR2305X%2C%20NP-CR2275X%2C%20NP-CR2165X%2C%20NP-CR2155X%2C%20NP-CD2115X%2C%20NP-CD2105X%2C%20NP-CM4151X%2C%20NP-CR2276X%2C%20NP-CD2116X%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W&amp;severity=critical&amp;id=6948d6e9f380eec6876e960a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11543-cwe-354-improper-validation-of-inte-576d4b82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11543%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11542-cwe-121-stack-based-buffer-overflow-0c9f51ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11542%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=high&amp;id=6948e1f1f380eec6877c45d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11541-cwe-121-stack-based-buffer-overflow-423506bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11541%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11540-cwe-22-improper-limitation-of-a-pat-93647b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11540%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-P502HL-2%2C%20NP-P502WL-2%2C%20NP-P502HLG-2%2C%20NP-P502WLG%2C%20NP-P502H%2C%20NP-P502W%2C%20NP-P452H%2C%20NP-P452W%2C%20NP-P502HG%2C%20NP-P502WG%2C%20NP-P452HG%2C%20NP-P452WG%2C%20NP-P502H%2B%2C%20NP-P502W%2B%2C%20NP-CR5450H%2C%20NP-CR5450W%2C%20NP-P502HL%2C%20NP-P502WL%2C%20NP-P502HLG%2C%20NP-P502WLG%2C%20NP-P502HL%2B%2C%20NP-P502WL%2B%2C%20NP-CR5450HL%2C%20NP-CR5450WL%2C%20NP-UM352W%2C%20NP-UM352WG%2C%20NP-UM352W%2B&amp;severity=critical&amp;id=6948e1f1f380eec6877c45cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12049-cwe-306-missing-authentication-for--3a29601c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12049%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20Media%20Player%20MP-01&amp;severity=critical&amp;id=6948e1f1f380eec6877c45d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15014-sql-injection-in-loganhong-php-loga-d4c3c0db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15014%3A%20SQL%20Injection%20in%20loganhong%20php%20loganSite&amp;severity=medium&amp;id=6948e1f1f380eec6877c45da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15013-stack-based-buffer-overflow-in-floo-e7e5488a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15013%3A%20Stack-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=6948d0ddf3d40542c74aa483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15012-sql-injection-in-code-projects-refu-86a7903c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15012%3A%20SQL%20Injection%20in%20code-projects%20Refugee%20Food%20Management%20System&amp;severity=medium&amp;id=6948d0ddf3d40542c74aa48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-artemis-analysis-of-hwp-based-dll-side-l-03d8a559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Artemis%3A%20Analysis%20of%20HWP-Based%20DLL%20Side%20Loading%20Attacks&amp;severity=medium&amp;id=69491f829679ab05af586fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15011-sql-injection-in-code-projects-simp-c332fcf7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15011%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=6948c1179b5fbca4f51854f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15016-cwe-321-use-of-hard-coded-cryptogra-828a99de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15016%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=critical&amp;id=6948c1179b5fbca4f51854fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15015-cwe-23-relative-path-traversal-in-r-9dd6db79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15015%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=high&amp;id=6948c1179b5fbca4f51854f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15010-stack-based-buffer-overflow-in-tend-05e7daf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15010%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=6948ba199b5fbca4f5110ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59301-cwe-20-improper-input-validation-in-d559bd68</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59301%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Delta%20Electronics%20DVP15MC11T&amp;severity=medium&amp;id=6948ba199b5fbca4f5110eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15009-unrestricted-upload-in-liweiyi-ches-38c9a37a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15009%3A%20Unrestricted%20Upload%20in%20liweiyi%20ChestnutCMS&amp;severity=medium&amp;id=6948b19135589e6cb165ba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15008-stack-based-buffer-overflow-in-tend-c840f55c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15008%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=medium&amp;id=6948b19135589e6cb165ba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15007-stack-based-buffer-overflow-in-tend-32e684d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=6948a94d0a1294c2fe493cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15006-stack-based-buffer-overflow-in-tend-8430c353</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15006%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=69489e000a1294c2fe3241ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15005-use-of-hard-coded-cryptographic-key-849c0d51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15005%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20CouchCMS&amp;severity=medium&amp;id=694897e7a595d307a79322bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15004-sql-injection-in-dedecms-b9181687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15004%3A%20SQL%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=69489057a595d307a785c50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-22-55f63229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-22&amp;severity=medium&amp;id=6949dd7eefa849cc1322059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66735-na-2c8d719a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66735%3A%20n%2Fa&amp;severity=high&amp;id=6949bf39edc45005c15e34e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67436-na-b2cf1dd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67436%3A%20n%2Fa&amp;severity=medium&amp;id=6949bf39edc45005c15e34d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65857-na-3b607dbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65857%3A%20n%2Fa&amp;severity=high&amp;id=6949bf39edc45005c15e34d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66736-na-44e0a840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66736%3A%20n%2Fa&amp;severity=high&amp;id=6949b7a0edc45005c155e0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65856-na-11fd2d6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65856%3A%20n%2Fa&amp;severity=critical&amp;id=6949b7a0edc45005c155e0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65817-na-db490a51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65817%3A%20n%2Fa&amp;severity=high&amp;id=6949aa669d3de339c6b17817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67291-na-02aa6d96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67291%3A%20n%2Fa&amp;severity=medium&amp;id=6949a6e09d3de339c6ad0f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67290-na-96e8ea15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67290%3A%20n%2Fa&amp;severity=medium&amp;id=6949a6e09d3de339c6ad0f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27708-na-5d50372c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27708%3A%20n%2Fa&amp;severity=critical&amp;id=6949a6e09d3de339c6ad0f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65790-na-8f1aa0ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65790%3A%20n%2Fa&amp;severity=medium&amp;id=6949a35b9d3de339c6aad188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65837-na-aec8491e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65837%3A%20n%2Fa&amp;severity=medium&amp;id=6949a35b9d3de339c6aad184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67418-na-722b7814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67418%3A%20n%2Fa&amp;severity=critical&amp;id=69499fe29d3de339c6a6aefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25812-na-f1ac14ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25812%3A%20n%2Fa&amp;severity=medium&amp;id=69499d40c525bff625e7666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35321-na-fd2fcd6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35321%3A%20n%2Fa&amp;severity=medium&amp;id=6949997dc525bff625e31dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25814-na-93ead183</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25814%3A%20n%2Fa&amp;severity=medium&amp;id=6949997dc525bff625e31dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67288-na-ea93a173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67288%3A%20n%2Fa&amp;severity=critical&amp;id=69498ef9c525bff625d87afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63664-na-1a474005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63664%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63663-na-887291a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63663%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63662-na-fa8c276e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63662%3A%20n%2Fa&amp;severity=high&amp;id=69498ef9c525bff625d87af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26787-na-567c5e45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26787%3A%20n%2Fa&amp;severity=medium&amp;id=69498ef9c525bff625d87aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68645-na-fe921bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68645%3A%20n%2Fa&amp;severity=high&amp;id=69498cb05b5b68b8f5dee2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67289-na-46d41f94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67289%3A%20n%2Fa&amp;severity=critical&amp;id=69498cb05b5b68b8f5dee2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65270-na-5c19a053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65270%3A%20n%2Fa&amp;severity=medium&amp;id=69498cb05b5b68b8f5dee2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67443-na-09f871d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67443%3A%20n%2Fa&amp;severity=medium&amp;id=69497803d6cb72e86e42a14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67826-na-b2fb3279</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67826%3A%20n%2Fa&amp;severity=high&amp;id=6949600fa3c8169c9cdce196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15003-sql-injection-in-seacms-53188bdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15003%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=694886b83ccd96b7b746ed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-15002-sql-injection-in-seacms-8c466e46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-15002%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=69487f303ccd96b7b73da3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62901-cwe-79-improper-neutralization-of-i-f009e1e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62901%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20WP%20Microdata&amp;severity=high&amp;id=69486686250e8b2ef81b7a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62926-cwe-79-improper-neutralization-of-i-d06592db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyDevs%20TempTool%20%20%5BShow%20Current%20Template%20Info%5D&amp;severity=high&amp;id=69486686250e8b2ef81b7a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62955-cwe-497-exposure-of-sensitive-syste-6ce72f1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62955%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HappyDevs%20TempTool%20%20%5BShow%20Current%20Template%20Info%5D&amp;severity=medium&amp;id=69486301250e8b2ef817cae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-android-botnet-kimwolf-infects-millions-st-37ffb723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Android%20botnet%20Kimwolf%20infects%20millions%2C%20strikes%20with%20DDoS&amp;severity=medium&amp;id=6947f4d2e026439f1e12e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnhalla-picking-the-true-vulnerabilities-from-th-89208606</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnhalla%3A%20Picking%20the%20true%20vulnerabilities%20from%20the%20CodeQL%20haystack&amp;severity=medium&amp;id=6947d39b26a902801d433cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14995-stack-based-buffer-overflow-in-tend-4ac05581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14995%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6947b3aa3cbe12b6f35cac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14994-stack-based-buffer-overflow-in-tend-84473859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14994%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14800-cwe-434-unrestricted-upload-of-file-d6002914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14800%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14855-cwe-79-improper-neutralization-of-i-e9088a96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Other%20Custom%20Form%20Builder&amp;severity=high&amp;id=6947a34f3cbe12b6f34a58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14993-stack-based-buffer-overflow-in-tend-b5631f8a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14993%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=69477b5ddaa649f723885181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-infy-apt-resurfaces-with-new-malware-activ-bdecb56e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Infy%20APT%20Resurfaces%20with%20New%20Malware%20Activity%20After%20Years%20of%20Silence&amp;severity=medium&amp;id=69478fcd598cfcf336c8656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14992-stack-based-buffer-overflow-in-tend-a3382e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14992%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=69477456daa649f7237d58f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14991-cross-site-scripting-in-campcodes-c-1ab969a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14991%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694770dcdaa649f7237704d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13361-cwe-352-cross-site-request-forgery--5ea9dfef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13361%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dipesh_patel%20Web%20to%20SugarCRM%20Lead&amp;severity=medium&amp;id=694770dcdaa649f7237704cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13220-cwe-79-improper-neutralization-of-i-65adb83f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=694770dcdaa649f7237704c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12654-cwe-73-external-control-of-file-nam-d7dbb5ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12654%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid%20Backup%20%26%20Migration&amp;severity=low&amp;id=694770dcdaa649f7237704bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13693-cwe-79-improper-neutralization-of-i-3bea09b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=694770dcdaa649f7237704d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12398-cwe-79-improper-neutralization-of-i-dac3cafe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codersaiful%20Product%20Table%20for%20WooCommerce&amp;severity=medium&amp;id=694770dcdaa649f7237704b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9343-cwe-79-improper-neutralization-of-in-be5fc715</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=high&amp;id=694770dcdaa649f7237704e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14990-sql-injection-in-campcodes-complete-f74d16ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14990%3A%20SQL%20Injection%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694766ae8da8a612761646df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68644-cwe-290-authentication-bypass-by-sp-a28dec5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68644%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Yealink%20RPS&amp;severity=high&amp;id=694766ae8da8a612761646e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12980-cwe-862-missing-authorization-in-wp-d70fd0d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12980%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20for%20News%2C%20Magazines%2C%20Blog%20Websites%20%E2%80%93%20PostX&amp;severity=high&amp;id=69475fa78da8a612760a1abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14054-cwe-79-improper-neutralization-of-i-fb60ab26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hasthemes%20WC%20Builder%20%E2%80%93%20WooCommerce%20Page%20Builder%20for%20WPBakery&amp;severity=medium&amp;id=69475fa78da8a612760a1ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13838-cwe-79-improper-neutralization-of-i-eeab8c23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20WishSuite%20%E2%80%93%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69475fa78da8a612760a1ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14071-cwe-502-deserialization-of-untruste-b346b7cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14071%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20livecomposer%20Live%20Composer%20%E2%80%93%20Free%20WordPress%20Website%20Builder&amp;severity=high&amp;id=69475fa78da8a612760a1acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14080-cwe-862-missing-authorization-in-wp-cb10bc18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14080%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=69475fa78da8a612760a1ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11496-cwe-79-improper-neutralization-of-i-d40d9863</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Five%20Star%20Restaurant%20Reservations%20%E2%80%93%20WordPress%20Booking%20Plugin&amp;severity=medium&amp;id=69475fa78da8a612760a1ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47232-vulnerability-in-mojofywp-wp-affili-809ae75c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47232%3A%20Vulnerability%20in%20mojofywp%20WP%20Affiliate%20Disclosure&amp;severity=medium&amp;id=69474498db1f51f880c173f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25446-cwe-862-missing-authorization-in-ha-ffaa9462</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25446%3A%20CWE-862%20Missing%20Authorization%20in%20HappyFiles%20HappyFiles%20Pro&amp;severity=high&amp;id=69474498db1f51f880c173f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25445-cwe-862-missing-authorization-in-ha-4ae6e79b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25445%3A%20CWE-862%20Missing%20Authorization%20in%20HappyFiles%20HappyFiles%20Pro&amp;severity=medium&amp;id=69474498db1f51f880c173ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-21-c515f019</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-21&amp;severity=medium&amp;id=69488cc7a595d307a781fae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25068-cwe-862-missing-authorization-in-ma-21a979e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25068%3A%20CWE-862%20Missing%20Authorization%20in%20Mapro%20Collins%20Magazine%20Edge&amp;severity=medium&amp;id=694739fbdb1f51f880b2a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14989-sql-injection-in-campcodes-complete-69d7be57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14989%3A%20SQL%20Injection%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=694733b5c9c6df9f5ceaa1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomhouse-upgrades-encryption-with-multi-layered-c84bab0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RansomHouse%20upgrades%20encryption%20with%20multi-layered%20data%20processing&amp;severity=high&amp;id=6947184f6364f0d3b54121f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34290-cwe-250-execution-with-unnecessary--3537b5e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34290%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Versa%20Networks%20SASE%20Client%20for%20Windows&amp;severity=high&amp;id=6947030ab06cf8342301ae4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-fake-id-template-domains-operating-from-e395c62e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Seizes%20Fake%20ID%20Template%20Domains%20Operating%20from%20Bangladesh&amp;severity=medium&amp;id=6946ec0edf378ae201258978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-sidewinder-apt-campaign-detected-33d72334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20SideWinder%20APT%20Campaign%20Detected&amp;severity=medium&amp;id=69491f829679ab05af586fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-doj-charges-54-in-atm-jackpotting-scheme-using--4703ff40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20DOJ%20Charges%2054%20in%20ATM%20Jackpotting%20Scheme%20Using%20Ploutus%20Malware&amp;severity=medium&amp;id=6946b15e987e301cd64ae78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7782-cwe-862-missing-authorization-in-wp--38b9bbfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7782%3A%20CWE-862%20Missing%20Authorization%20in%20WP%20JobHunt&amp;severity=high&amp;id=6946aa3f987e301cd6415949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7733-cwe-639-authorization-bypass-through-96dce83b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7733%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=medium&amp;id=6946aa3f987e301cd6415945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wk-51-north-korean-infiltrator-caught-working-in-a-5fbbbaf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8WK%2051%3A%20North%20Korean%20Infiltrator%20Caught%20Working%20in%20Amazon%20IT%20Department%2C%20EU%20Fines%20X%20%E2%82%AC140%20Million%2C%20Cisco%20Customers%20Hit%20by%20China-Linked%20APT...&amp;severity=medium&amp;id=6946981a3f10de0b706b5d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-watchguard-fireware-os-to-i-22620824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20WatchGuard%20Fireware%20OS%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=694691cd73e2535dfefe0060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14298-cwe-79-improper-neutralization-of-i-a2db8710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damian-gora%20FiboSearch%20%E2%80%93%20Ajax%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=69465e70aa65b5798e1d3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12492-cwe-200-exposure-of-sensitive-infor-d492d455</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12492%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69465e70aa65b5798e1d3c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13619-cwe-269-improper-privilege-manageme-48700e01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13619%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20CMSSuperHeroes%20Flex%20Store%20Users&amp;severity=critical&amp;id=694651418d921bbd6b8e5b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12820-cwe-862-missing-authorization-in-pu-ae3ab761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12820%3A%20CWE-862%20Missing%20Authorization%20in%20Pure%20WC%20Variation%20Swatches&amp;severity=medium&amp;id=6946402959945ce0dd08adc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13365-cwe-352-cross-site-request-forgery--9818f34d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13365%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tikolan%20WP%20Hallo%20Welt&amp;severity=medium&amp;id=694619d2c376abdb7ecb86a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12581-cwe-79-improper-neutralization-of-i-4da1c0de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaizencoders%20Attachments%20Handler&amp;severity=medium&amp;id=694619d1c376abdb7ecb869c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13329-cwe-434-unrestricted-upload-of-file-e47819d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13329%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20snowray%20File%20Uploader%20for%20WooCommerce&amp;severity=critical&amp;id=694619d2c376abdb7ecb86a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14168-cwe-352-cross-site-request-forgery--b872e166</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14168%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmaniax%20WP%20DB%20Booster&amp;severity=medium&amp;id=694619d2c376abdb7ecb86bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13624-cwe-79-improper-neutralization-of-i-af28a405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20travishoki%20Overstock%20Affiliate%20Links&amp;severity=medium&amp;id=694619d2c376abdb7ecb86b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14633-cwe-862-missing-authorization-in-ni-871d843a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14633%3A%20CWE-862%20Missing%20Authorization%20in%20niao70%20F70%20Lead%20Document%20Download&amp;severity=medium&amp;id=694619d2c376abdb7ecb86c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14721-cwe-79-improper-neutralization-of-i-920861e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mansoormunib%20RESPONSIVE%20AND%20SWIPE%20SLIDER!&amp;severity=medium&amp;id=694619d2c376abdb7ecb86cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12898-cwe-862-missing-authorization-in-lb-6401d6d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12898%3A%20CWE-862%20Missing%20Authorization%20in%20lbell%20Pretty%20Google%20Calendar&amp;severity=medium&amp;id=694619d2c376abdb7ecb86a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14734-cwe-352-cross-site-request-forgery--45adb2e5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14734%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nestornoe%20Amazon%20affiliate%20lite%20Plugin&amp;severity=medium&amp;id=694619d3c376abdb7ecb8faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14164-cwe-352-cross-site-request-forgery--d309b53c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14164%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edckwt%20Quran%20Gateway&amp;severity=medium&amp;id=694619d2c376abdb7ecb86b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14735-cwe-80-improper-neutralization-of-s-e544b8ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14735%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nestornoe%20Amazon%20affiliate%20lite%20Plugin&amp;severity=medium&amp;id=694619d3c376abdb7ecb8fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14591-vulnerability-in-perforce-delphix-c-e7634947</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14591%3A%20Vulnerability%20in%20Perforce%20Delphix%20Continuous%20Compliance&amp;severity=medium&amp;id=694619d2c376abdb7ecb86c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14300-cwe-306-missing-authentication-for--8b24a75f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14300%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14299-cwe-770-allocation-of-resources-wit-cc3e31a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14299%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8065-cwe-400-uncontrolled-resource-consum-b3fbab90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8065%3A%20CWE-121%20Stack-based%20buffer%20overflow%20in%20TP-Link%20Systems%20Inc.%20Tapo%20C200%20V3&amp;severity=high&amp;id=6945fa2fc376abdb7e67a379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-20-10c92024</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-20&amp;severity=medium&amp;id=694739e9db1f51f880b29b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68613-cwe-913-improper-control-of-dynamic-ff9feacf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68613%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=6945d4648954746f284878c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53950-unrestricted-upload-of-file-with-da-c7bcfb0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53950%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20innovastudio%20WYSIWYG%20Editor&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53959-uncontrolled-search-path-element-in-44f19486</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53959%3A%20Uncontrolled%20Search%20Path%20Element%20in%20filezilla-project%20FileZilla%20Client&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53958-weak-password-recovery-mechanism-fo-a24bdc5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53958%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20ltb-project%20LDAP%20Tool%20Box%20Self%20Service%20Password&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53956-unrestricted-upload-of-file-with-da-473b2792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53956%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20altervista%20flatnux&amp;severity=high&amp;id=6945c32cf5c5e8dffe81cb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53951-improper-verification-of-cryptograp-8f12262e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53951%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Gauzy%20ever%20gauzy&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53948-improper-neutralization-of-special--8fc96bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53948%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20cat03%20Lilac-Reloaded&amp;severity=critical&amp;id=6945c32cf5c5e8dffe81caf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53947-unquoted-search-path-or-element-in--80258714</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53947%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20oscinventory%20OCS%20Inventory%20NG&amp;severity=high&amp;id=6945c32cf5c5e8dffe81caf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53946-unquoted-search-path-or-element-in--2ada9fcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53946%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Arcsoft%20PhotoStudio&amp;severity=high&amp;id=6945c32cf5c5e8dffe81caec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-tapo-c200-hardcoded-keys-buffer-overflows--31590741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Tapo%20C200%3A%20Hardcoded%20Keys%2C%20Buffer%20Overflows%20and%20Privacy%20in%20the%20Era%20of%20AI%20Assisted%20Reverse%20Engineering&amp;severity=medium&amp;id=6945ec33c376abdb7e50f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67712-cwe-79-improper-neutralization-of-i-bb130446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Web%20AppBuilder%20%7BDeveloper%20Edition)&amp;severity=medium&amp;id=6945b49d94037f6b535f8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14968-sql-injection-in-code-projects-simp-f2719609</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14968%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=6945b49d94037f6b535f882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12874-cwe-444-inconsistent-interpretation-dc5ece68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12874%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Quest%20Coexistence%20Manager%20for%20Notes&amp;severity=medium&amp;id=6945ad9494037f6b5356f5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14967-sql-injection-in-itsourcecode-stude-f05ca633</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14967%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6945aa0f94037f6b535451d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14966-sql-injection-in-fastadmin-169a822e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14966%3A%20SQL%20Injection%20in%20FastAdmin&amp;severity=medium&amp;id=6945aa0f94037f6b535451d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thailand-conference-launches-international-initiat-eea5de12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thailand%20Conference%20Launches%20International%20Initiative%20to%20Fight%20Online%20Scams&amp;severity=medium&amp;id=6945a43e0919c128849dab14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14965-path-traversal-in-1541492390c-yougo-b8e99b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14965%3A%20Path%20Traversal%20in%201541492390c%20yougou-mall&amp;severity=medium&amp;id=6945a4610919c128849db32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14964-stack-based-buffer-overflow-in-toto-be6aedc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14964%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=critical&amp;id=6945a4610919c128849db330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14962-cross-site-scripting-in-code-projec-d50cb772</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14962%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=69459d520919c12884942cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14961-sql-injection-in-code-projects-simp-ae37d208</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14961%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=69459d520919c12884942cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-series-of-unfortunate-rmm-events-a2f17747</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Series%20of%20Unfortunate%20(RMM)%20Events&amp;severity=medium&amp;id=69459d520919c12884942c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-advertising-company-hacked-72a3b5d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Advertising%20Company%20Hacked&amp;severity=medium&amp;id=694596380919c128848e2644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-blames-russia-for-destructive-cyberattack--d866fce5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20blames%20Russia%20for%20destructive%20cyberattack%20on%20water%20utility&amp;severity=high&amp;id=694596380919c128848e2638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-25000-forticloud-sso-devices-exposed-to-remot-e6deeb43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2025%2C000%20FortiCloud%20SSO%20devices%20exposed%20to%20remote%20attacks&amp;severity=high&amp;id=694596380919c128848e263c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14960-sql-injection-in-code-projects-simp-025af685</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14960%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Blood%20Donor%20Management%20System&amp;severity=medium&amp;id=694596660919c128848e41e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14959-sql-injection-in-code-projects-simp-f747c480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14959%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=694596660919c128848e41d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-hackers-use-microsoft-365-device-cod-8c2c93b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Linked%20Hackers%20Use%20Microsoft%20365%20Device%20Code%20Phishing%20for%20Account%20Takeovers&amp;severity=low&amp;id=6945b57794037f6b53608bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14958-heap-based-buffer-overflow-in-flooo-b7c70023</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14958%3A%20Heap-based%20Buffer%20Overflow%20in%20floooh%20sokol&amp;severity=medium&amp;id=69458e67f063e4fadf084613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68430-cwe-24-path-traversal-filedir-in-cv-211a2800</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68430%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=69458ae3f063e4fadf03d176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68478-cwe-73-external-control-of-file-nam-228a882f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68478%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=69458ae3f063e4fadf03d17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14957-null-pointer-dereference-in-webasse-4f1cda29</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14957%3A%20NULL%20Pointer%20Dereference%20in%20WebAssembly%20Binaryen&amp;severity=medium&amp;id=6945875ff063e4fadffe4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68477-cwe-918-server-side-request-forgery-92aa0069</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68477%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=694583dbf063e4fadffb129e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68457-cwe-79-improper-neutralization-of-i-b924277b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68457%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boscop-fr%20orejime&amp;severity=low&amp;id=694583dbf063e4fadffb1299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14809-cwe-1021-improper-restriction-of-re-c46befdd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14809%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=694583dbf063e4fadffb1296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14812-cwe-1021-improper-restriction-of-re-501eeae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14812%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20ArcSearch&amp;severity=high&amp;id=69458084f063e4fadff5e82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66580-cwe-94-improper-control-of-generati-8d6c3eb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66580%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=critical&amp;id=69458084f063e4fadff5e847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65035-cwe-502-deserialization-of-untruste-bddb3352</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65035%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pluginsGLPI%20databaseinventory&amp;severity=medium&amp;id=69458084f063e4fadff5e842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30971-this-weakness-has-been-deprecated-b-88e2315d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30971%3A%20This%20weakness%20has%20been%20deprecated%20because%20it%20covered%20redundant%20concepts%20already%20described%20in%20CWE-287.%20in%20Palantir%20com.palantir.acme.gaia%3Agaia&amp;severity=medium&amp;id=69458083f063e4fadff5e827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49587-the-authentication-algorithm-is-sou-b53b34e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49587%3A%20The%20authentication%20algorithm%20is%20sound%2C%20but%20the%20implemented%20mechanism%20can%20be%20bypassed%20as%20the%20result%20of%20a%20separate%20weakness%20that%20is%20primary%20to%20the%20authentication%20error.%20in%20Palantir%20com.palantir.gotham%3Aglutton&amp;severity=critical&amp;id=69458084f063e4fadff5e82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14956-heap-based-buffer-overflow-in-webas-de7ae511</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14956%3A%20Heap-based%20Buffer%20Overflow%20in%20WebAssembly%20Binaryen&amp;severity=medium&amp;id=69458084f063e4fadff5e839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14955-improper-initialization-in-open5gs-cf773d19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14955%3A%20Improper%20Initialization%20in%20Open5GS&amp;severity=medium&amp;id=69458084f063e4fadff5e830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-sniff-out-governmental-affairs-in-sout-9f45d5a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20sniff%20out%20governmental%20affairs%20in%20Southeast%20Asia%20and%20Japan&amp;severity=medium&amp;id=69459d520919c12884942c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-busted-north-korean-worker-posing-as-us-sta-ea41aac8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Busted%20North%20Korean%20Worker%20Posing%20as%20US%20Staff%20After%20Keyboard%20Lag&amp;severity=medium&amp;id=69457d16133fda1465c6ad06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-docker-ai-attack-google-sues-chinese-d3819014</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Docker%20AI%20Attack%2C%20Google%20Sues%20Chinese%20Cybercriminals%2C%20Coupang%20Hacked%20by%20Employee&amp;severity=medium&amp;id=69457988133fda1465c25886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14954-reachable-assertion-in-open5gs-06d109a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14954%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=694579a3133fda1465c274d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14953-null-pointer-dereference-in-open5gs-f0ac8021</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14953%3A%20NULL%20Pointer%20Dereference%20in%20Open5GS&amp;severity=low&amp;id=694579a3133fda1465c274c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34433-cwe-94-improper-control-of-generati-6b212350</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34433%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=critical&amp;id=694572a4133fda1465b9f67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracked-software-and-youtube-videos-spread-countlo-44ebd0cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracked%20Software%20and%20YouTube%20Videos%20Spread%20CountLoader%20and%20GachiLoader%20Malware&amp;severity=medium&amp;id=6945727d133fda1465b9bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-blames-russia-for-cyberattacks-ahead-of-el-3c4afed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20Blames%20Russia%20for%20Cyberattacks%20Ahead%20of%20Elections%20and%20on%20Water%20Utility&amp;severity=medium&amp;id=69456746a90e3c9a1540af74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-longnosedgoblin-targeting-asian-govern-b265ce62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20%E2%80%98LongNosedGoblin%E2%80%99%20Targeting%20Asian%20Governments&amp;severity=medium&amp;id=694563a2a90e3c9a153ea496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14952-sql-injection-in-campcodes-supplier-d4710ed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14952%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=69456762a90e3c9a1540c4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14951-sql-injection-in-code-projects-scho-7ee18e07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14951%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=694563c4a90e3c9a153eb8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-sapcar-four-local-privilege-escalation-bu-3e2ea23e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20SAPCAR%3A%20Four%20Local%20Privilege%20Escalation%20Bugs%20in%20SAR%20Archive%20Parsing&amp;severity=medium&amp;id=6945602ea90e3c9a153ccdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14950-sql-injection-in-code-projects-scho-e65c5a36</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14950%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=69455922a90e3c9a153a0e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-uat-9686-is-targeting-cisco-secur-923e338c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20UAT-9686%20is%20targeting%20Cisco%20Secure%20Email%20Gateway%20and%20Secure%20Email%20and%20Web%20Manager&amp;severity=medium&amp;id=69455218a90e3c9a1536c246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-critical-watchguard-firebox-firewall-flaw-expl-7c584dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20critical%20WatchGuard%20Firebox%20firewall%20flaw%20exploited%20in%20attacks&amp;severity=critical&amp;id=69455218a90e3c9a1536c23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asrock-asus-gigabyte-msi-boards-vulnerable-to-pre--7cdf1ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASRock%2C%20ASUS%2C%20GIGABYTE%2C%20MSI%20Boards%20vulnerable%20to%20pre-boot%20memory%20attacks&amp;severity=medium&amp;id=69455218a90e3c9a1536c24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-shuts-down-crypto-exchange-e-note-charges-russi-49b32b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Shuts%20Down%20Crypto%20Exchange%20E-Note%2C%20Charges%20Russian%20Administrator&amp;severity=medium&amp;id=69454e8aa90e3c9a1534b73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14946-improper-neutralization-of-argument-7f78966a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14946%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Red%20Hat%20libnbd&amp;severity=medium&amp;id=69455253a90e3c9a1536f3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-fixes-ask-gordon-ai-flaw-that-enabled-metad-bdb3bdb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Fixes%20%E2%80%98Ask%20Gordon%E2%80%99%20AI%20Flaw%20That%20Enabled%20Metadata-Based%20Attacks&amp;severity=medium&amp;id=69454b11a90e3c9a1532a008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14882-cwe-639-authorization-bypass-throug-e0d1d418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14882%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pretix%20pretix-offlinesales&amp;severity=low&amp;id=6945478da90e3c9a1530ec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1928-cwe-307-improper-restriction-of-exce-093697df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1928%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=critical&amp;id=6945440aa90e3c9a152fb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1927-cwe-352-cross-site-request-forgery-c-76034cc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1927%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=high&amp;id=69454096a90e3c9a152ce8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-data-breach-affects-27000-ind-cf62c273</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20Data%20Breach%20Affects%2027%2C000%20Individuals&amp;severity=medium&amp;id=6945407aa90e3c9a152cdb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-android-botnet-ensnares-18-million-devices-153a1bc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Kimwolf%E2%80%99%20Android%20Botnet%20Ensnares%201.8%20Million%20Devices&amp;severity=medium&amp;id=69453cf6a90e3c9a152a261a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1885-cwe-601-url-redirection-to-untrusted-2e698a7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1885%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Restajet%20Information%20Technologies%20Inc.%20Online%20Food%20Delivery%20System&amp;severity=medium&amp;id=69453d1ba90e3c9a152a49e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-warns-of-active-exploitation-of-critica-7a91ba7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Warns%20of%20Active%20Exploitation%20of%20Critical%20Fireware%20OS%20VPN%20Vulnerability&amp;severity=critical&amp;id=69454869a90e3c9a1531997c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14847-cwe-130-improper-handling-of-length-dd0a4a45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14847%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=high&amp;id=6945326bd11fe727795f9186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dlls-x26-tls-callbacks-fri-dec-19th-03e4850e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x26%3B%23xa%3BDLLs%20%26%23x26%3B%20TLS%20Callbacks%2C%20(Fri%2C%20Dec%2019th)&amp;severity=medium&amp;id=69453259d11fe727795f70ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nigeria-arrests-raccoono365-phishing-developer-lin-8976cecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nigeria%20Arrests%20RaccoonO365%20Phishing%20Developer%20Linked%20to%20Microsoft%20365%20Attacks&amp;severity=high&amp;id=69452b4ed11fe7277955fdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-digital-surge-2b-stolen-in-crypto-as--6251bbc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20Digital%20Surge%3A%20%242B%20Stolen%20in%20Crypto%20as%20Amazon%20Blocks%201%2C800%20Fake%20IT%20Workers&amp;severity=medium&amp;id=6945243eac896f72532c0166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14455-cwe-862-missing-authorization-in-wp-f85c4ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14455%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=69451dcdc326d36e537b0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12361-cwe-862-missing-authorization-in-sa-acd99d13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12361%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20myCred%20%E2%80%93%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Program.&amp;severity=medium&amp;id=69451dcdc326d36e537b0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66524-cwe-502-deserialization-of-untruste-b2316260</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66524%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20NiFi&amp;severity=high&amp;id=69451a4cc326d36e53765d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-uefi-flaw-enables-early-boot-dma-attacks-on-as-403cd23b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20UEFI%20Flaw%20Enables%20Early-Boot%20DMA%20Attacks%20on%20ASRock%2C%20ASUS%2C%20GIGABYTE%2C%20MSI%20Motherboards&amp;severity=medium&amp;id=69450f474227c5364db3e81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11747-cwe-79-improper-neutralization-of-i-d0aabd5a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=69450d534227c5364db27c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14151-cwe-79-improper-neutralization-of-i-3ab9f1a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14151%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20SlimStat%20Analytics&amp;severity=medium&amp;id=69450d534227c5364db27c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-pwned-x-twitter-vercel-cursor-discord-and-h-9860143b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20pwned%20X%20(Twitter)%2C%20Vercel%2C%20Cursor%2C%20Discord%2C%20and%20hundreds%20of%20companies%20through%20a%20supply-chain%20attack&amp;severity=medium&amp;id=69451342c326d36e536dff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66522-cwe-79-improper-neutralization-of-i-360d1aab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66521-cwe-79-improper-neutralization-of-i-e5651c4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66520-cwe-79-improper-neutralization-of-i-b0667f4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66519-cwe-79-improper-neutralization-of-i-e4e18a78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66502-cwe-79-improper-neutralization-of-i-d4893b5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=69450fe2c326d36e5368d33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66501-cwe-79-improper-neutralization-of-i-561c3445</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20pdfonline.foxit.com&amp;severity=medium&amp;id=6944ff0c19341fe1888b869e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66500-cwe-79-improper-neutralization-of-i-b8d63d9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Foxit%20Software%20Inc.%20webplugins.foxit.com&amp;severity=medium&amp;id=6944ff0c19341fe1888b869b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66499-cwe-190-integer-overflow-or-wraparo-9cd261f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66499%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66498-cwe-125-out-of-bounds-read-in-foxit-229caee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66498%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66497-cwe-125-out-of-bounds-read-in-foxit-523c74ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66497%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66496-cwe-125-out-of-bounds-read-in-foxit-f8ef853b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66496%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=6944fb8919341fe1888ac95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66495-cwe-416-use-after-free-in-foxit-sof-e36af769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66495%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66494-cwe-416-use-after-free-in-foxit-sof-dea8f968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66494%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944fb8919341fe1888ac957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66493-cwe-416-use-after-free-in-foxit-sof-0528ceff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66493%3A%20CWE-416%20Use%20After%20Free%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Editor&amp;severity=high&amp;id=6944fb8919341fe1888ac954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13008-cwe-359-exposure-of-private-persona-6ed57175</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13008%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=6944fb8919341fe1888ac951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13999-cwe-918-server-side-request-forgery-5d7ec843</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13999%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20HTML5%20Audio%20Player%20%E2%80%93%20The%20Ultimate%20No-Code%20Podcast%2C%20MP3%20%26%20Audio%20Player&amp;severity=high&amp;id=6944f80919341fe18889df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14449-cwe-79-improper-neutralization-of-i-44a54a37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=medium&amp;id=6944f80919341fe18889df18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13754-cwe-862-missing-authorization-in-cr-437e9840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13754%3A%20CWE-862%20Missing%20Authorization%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=6944f80919341fe18889df10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66174-vulnerability-in-hikvision-ds-7104h-2d4bb1ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66174%3A%20Vulnerability%20in%20Hikvision%20DS-7104HGHI-F1&amp;severity=medium&amp;id=6944f80919341fe18889df1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66173-vulnerability-in-hikvision-ds-7104h-46a488ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66173%3A%20Vulnerability%20in%20Hikvision%20DS-7104HGHI-F1&amp;severity=medium&amp;id=6944f80919341fe18889df1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14267-cwe-212-improper-removal-of-sensiti-9044f6c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14267%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6944f0fd19341fe188885b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13307-cwe-94-improper-control-of-generati-4568600d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13307%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ocean%20Modal%20Window&amp;severity=high&amp;id=6944ed7819341fe18887d792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14546-cross-site-request-forgery-csrf-in--0167bf96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14546%3A%20Cross-site%20Request%20Forgery%20(CSRF)%20in%20fastapi-sso&amp;severity=medium&amp;id=6944df6e19341fe18884f730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14940-sql-injection-in-code-projects-scho-08664755</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14940%3A%20SQL%20Injection%20in%20code-projects%20Scholars%20Tracking%20System&amp;severity=medium&amp;id=6944d15919341fe188822336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14939-sql-injection-in-code-projects-onli-7bf2961b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14939%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6944d15919341fe188822319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/research-geometric-analysis-of-sha-256-finding-68--d4c16e12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BResearch%5D%20Geometric%20analysis%20of%20SHA-256%3A%20Finding%2068%25%20bit-match%20pairs%20through%20dimensional%20transformation&amp;severity=medium&amp;id=6944b4524eb3efac36c3350b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13941-cwe-732-incorrect-permission-assign-0aef8af7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13941%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Foxit%20Software%20Inc.%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=6944b7d24eb3efac36c40a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52692-vulnerability-in-linksys-linksys-e9-4ceaf0da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52692%3A%20Vulnerability%20in%20Linksys%20Linksys%20E9450-SG&amp;severity=high&amp;id=6944b7d24eb3efac36c40a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14910-path-traversal-in-edimax-br-6208ac-2c60754f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14910%3A%20Path%20Traversal%20in%20Edimax%20BR-6208AC&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14909-manage-user-sessions-in-jeecgboot-807bf1b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14909%3A%20Manage%20User%20Sessions%20in%20JeecgBoot&amp;severity=medium&amp;id=6944a9c54eb3efac36c013f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14908-improper-authentication-in-jeecgboo-5a05bcaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14908%3A%20Improper%20Authentication%20in%20JeecgBoot&amp;severity=medium&amp;id=6944a2ba4eb3efac36beeb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11774-cwe-78-improper-neutralization-of-s-cf4c89d8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11774%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=69449f434eb3efac36bb56a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14900-sql-injection-in-codeastro-real-est-3937182a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14900%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=69449f434eb3efac36bb56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14899-sql-injection-in-codeastro-real-est-5f54f327</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14899%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=69449f434eb3efac36bb56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14733-cwe-787-out-of-bounds-write-in-watc-6a8ed88f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14733%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=critical&amp;id=69449f434eb3efac36bb56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-19-936b8ab9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-19&amp;severity=medium&amp;id=6945e89ad64a69f72fb550f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63665-na-3788a013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63665%3A%20n%2Fa&amp;severity=critical&amp;id=6945875ff063e4fadffe4631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67442-na-fb96278b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67442%3A%20n%2Fa&amp;severity=high&amp;id=69457615133fda1465bcd188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66905-na-dac37d1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66905%3A%20n%2Fa&amp;severity=high&amp;id=694570c4133fda1465b7b150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66906-na-574df72b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66906%3A%20n%2Fa&amp;severity=medium&amp;id=69456e3ba90e3c9a15456616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66908-na-170811fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66908%3A%20n%2Fa&amp;severity=medium&amp;id=69456762a90e3c9a1540c4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66910-na-b1f4754d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66910%3A%20n%2Fa&amp;severity=medium&amp;id=69456762a90e3c9a1540c4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50681-na-6dd0a897</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50681%3A%20n%2Fa&amp;severity=high&amp;id=69456762a90e3c9a1540c4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66909-na-368d6d13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66909%3A%20n%2Fa&amp;severity=high&amp;id=694563c4a90e3c9a153eb8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66911-na-9d398eb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66911%3A%20n%2Fa&amp;severity=medium&amp;id=69456029a90e3c9a153cc466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67846-cwe-472-external-control-of-assumed-9813c718</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67846%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67845-cwe-24-path-traversal-filedir-in-mi-ac7a313c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67845%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67844-cwe-425-direct-request-forced-brows-4d47529d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67844%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67843-cwe-1336-improper-neutralization-of-73b33a02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67843%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Mintlify%20Mintlify%20Platform&amp;severity=high&amp;id=6944b7d24eb3efac36c40a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67842-cwe-829-inclusion-of-functionality--cf753aa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67842%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Mintlify%20Mintlify%20Platform&amp;severity=medium&amp;id=6944b7d24eb3efac36c40a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14898-sql-injection-in-codeastro-real-est-5142238d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14898%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=694491254eb3efac36b3b60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14897-sql-injection-in-codeastro-real-est-3a585ee7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14897%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=694491254eb3efac36b3b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64675-cwe-79-improper-neutralization-of-i-197cbe83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64675%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Cosmos%20DB&amp;severity=high&amp;id=69448da64eb3efac36b2e5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68398-cwe-20-improper-input-validation-in-186802ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68398%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20WeblateOrg%20weblate&amp;severity=critical&amp;id=69448a1d4eb3efac36b25ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68279-cwe-22-improper-limitation-of-a-pat-32cc7cef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68279%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WeblateOrg%20weblate&amp;severity=high&amp;id=69448a1d4eb3efac36b25ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68422-cwe-863-incorrect-authorization-in--fa007da8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68422%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=694483164eb3efac36b0f27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68386-cwe-863-incorrect-authorization-in--acad51ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68386%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=694483164eb3efac36b0f280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68390-cwe-770-allocation-of-resources-wit-4f6b919c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68390%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=69447f924eb3efac36af9a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68389-cwe-770-allocation-of-resources-wit-e3a8c1ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68389%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69447f924eb3efac36af9a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68387-cwe-79-improper-neutralization-of-i-60505a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69447f924eb3efac36af9a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68385-cwe-79-improper-neutralization-of-i-ec595932</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69447f924eb3efac36af9a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68384-cwe-770-allocation-of-resources-wit-0091fbad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68384%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=69447c134eb3efac36aec21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64677-cwe-79-improper-neutralization-of-i-f84c1f6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64677%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Office%20Out-of-Box%20Experience&amp;severity=high&amp;id=69447c134eb3efac36aec210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64676-cwe-94-improper-control-of-generati-e958604e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64676%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=69447c134eb3efac36aec20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65037-cwe-94-improper-control-of-generati-ddd87b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65037%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20Container%20Apps&amp;severity=critical&amp;id=69447c134eb3efac36aec213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65041-cwe-285-improper-authorization-in-m-738f9e8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65041%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=69447c134eb3efac36aec216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64663-cwe-918-server-side-request-forgery-4a0523d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64663%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Cognitive%20Service%20for%20Language&amp;severity=critical&amp;id=69447c134eb3efac36aec20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65046-spoofing-in-microsoft-microsoft-edg-c7e523a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65046%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=low&amp;id=69447c134eb3efac36aec219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68383-cwe-1284-improper-validation-of-spe-5a5d7031</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68383%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Elastic%20Filebeat&amp;severity=medium&amp;id=69447c134eb3efac36aec21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13427-cwe-287-improper-authentication-in--4490b313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13427%3A%20CWE-287%20Improper%20Authentication%20in%20Google%20Cloud%20Dialogflow%20CX%20Messenger&amp;severity=medium&amp;id=69447c134eb3efac36aec222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68382-cwe-125-out-of-bounds-read-in-elast-65a4ffd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68382%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=69447c134eb3efac36aec225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68381-cwe-787-out-of-bounds-write-in-elas-67fe2acd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68381%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=6944788a4eb3efac36ae0ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68388-cwe-770-allocation-of-resources-wit-dcae1706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68388%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Elastic%20Packetbeat&amp;severity=medium&amp;id=694475234eb3efac36ad1c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-targets-gladinet-centrestack-in-da-c35cedf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20ransomware%20targets%20Gladinet%20CentreStack%20in%20data%20theft%20attacks&amp;severity=high&amp;id=694475034eb3efac36ad185d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-sydney-suffers-data-breach-exposing--2bf13239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Sydney%20suffers%20data%20breach%20exposing%20student%20and%20staff%20info&amp;severity=high&amp;id=694475034eb3efac36ad1859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34451-cwe-121-stack-based-buffer-overflow-b557dacc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34451%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20rofl0r%20proxychains-ng&amp;severity=medium&amp;id=694471834eb3efac36abad29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34450-cwe-121-stack-based-buffer-overflow-73a71696</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34450%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20merbanan%20rtl_433&amp;severity=medium&amp;id=694471834eb3efac36abad23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34449-cwe-119-improper-restriction-of-ope-b8f14c0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34449%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Genymobile%20scrcpy&amp;severity=medium&amp;id=694471834eb3efac36abad1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53710-the-product-does-not-properly-compa-237abb75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53710%3A%20The%20product%20does%20not%20properly%20compartmentalize%20or%20isolate%20functionality%2C%20processes%2C%20or%20resources%20that%20require%20different%20privilege%20levels%2C%20rights%2C%20or%20permissions.%20in%20Palantir%20com.palantir.compute%3Acompute-service&amp;severity=high&amp;id=694471834eb3efac36abad33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68161-cwe-297-improper-validation-of-cert-e05a34ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68161%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20Apache%20Software%20Foundation%20Apache%20Log4j%20Core&amp;severity=medium&amp;id=69446a7c4eb3efac36a96175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67653-cwe-22-in-advantech-webaccessscada-6eeebc62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67653%3A%20CWE-22%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=69446a7c4eb3efac36a96197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62004-cwe-367-time-of-check-time-of-use-t-c33b54ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62004%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20BullWall%20Server%20Intrusion%20Protection&amp;severity=high&amp;id=69446a7c4eb3efac36a96193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62003-cwe-367-time-of-check-time-of-use-t-93d17383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62003%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20BullWall%20Server%20Intrusion%20Protection&amp;severity=high&amp;id=69446a7c4eb3efac36a9618f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46268-cwe-89-in-advantech-webaccessscada-8758bd00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46268%3A%20CWE-89%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=69446a7c4eb3efac36a9618a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14848-cwe-36-in-advantech-webaccessscada-1dd8a4cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14848%3A%20CWE-36%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=medium&amp;id=694466f94eb3efac36a822ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62002-cwe-358-improperly-implemented-secu-2dd2851a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62002%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20BullWall%20Ransomware%20Containment&amp;severity=medium&amp;id=694466f94eb3efac36a822c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14849-cwe-434-in-advantech-webaccessscada-fb4363c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14849%3A%20CWE-434%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=high&amp;id=694466f94eb3efac36a822b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62001-cwe-420-unprotected-alternate-chann-c08209ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62001%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20BullWall%20Ransomware%20Containment&amp;severity=high&amp;id=694466f94eb3efac36a822c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62000-cwe-1023-incomplete-comparison-with-6b3774ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62000%3A%20CWE-1023%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20BullWall%20Ransomware%20Containment&amp;severity=high&amp;id=694466f94eb3efac36a822bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14850-cwe-22-in-advantech-webaccessscada-a5857d11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14850%3A%20CWE-22%20in%20Advantech%20WebAccess%2FSCADA&amp;severity=high&amp;id=694466f94eb3efac36a822b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13911-cwe-250-in-inductive-automation-ign-4659c19c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13911%3A%20CWE-250%20in%20Inductive%20Automation%20Ignition&amp;severity=medium&amp;id=69446a7c4eb3efac36a9617d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14889-improper-authorization-in-campcodes-768d03ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14889%3A%20Improper%20Authorization%20in%20Campcodes%20Advanced%20Voting%20Management%20System&amp;severity=medium&amp;id=69445ff04eb3efac36a51161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53940-improper-control-of-generation-of-c-41124e09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53940%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Alfonzm%20Codigo%20Markdown%20Editor&amp;severity=high&amp;id=69445ff04eb3efac36a5115c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58323-improper-neutralization-of-input-du-e04b8df2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58322-improper-neutralization-of-input-du-ae016e7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a5145c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58321-improper-neutralization-of-input-du-93d3908c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58320-exposure-of-sensitive-system-inform-55a8ee17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58320%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58319-improper-neutralization-of-input-du-d4bcaecf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58318-improper-neutralization-of-input-du-7dce5008</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58318%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a5144c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58317-sensitive-cookie-in-https-session-w-f022bc87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58317%3A%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff24eb3efac36a51448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53944-improper-limitation-of-a-pathname-t-e72a8f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53944%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Easyphp%20EasyPHP%20Webserver&amp;severity=high&amp;id=69445ff24eb3efac36a51443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53943-observable-discrepancy-in-glpi-proj-1ed08ea6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53943%3A%20Observable%20Discrepancy%20in%20Glpi-Project%20GLPI&amp;severity=medium&amp;id=69445ff24eb3efac36a5143e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53942-unrestricted-upload-of-file-with-da-33ff8834</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53942%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20leefish%20File%20Thingie&amp;severity=critical&amp;id=69445ff24eb3efac36a51439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53941-improper-neutralization-of-special--e06a1807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53941%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Easyphp%20EasyPHP%20Webserver&amp;severity=critical&amp;id=69445ff04eb3efac36a51187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53938-improper-neutralization-of-input-du-704d5343</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iwind%20RockMongo&amp;severity=medium&amp;id=69445ff04eb3efac36a51182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53936-improper-neutralization-of-input-du-b7cb8c17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuzitio%20Cameleon%20CMS&amp;severity=medium&amp;id=69445ff04eb3efac36a5117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53935-improper-neutralization-of-special--70960e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53935%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codester%20WBiz%20Desk&amp;severity=medium&amp;id=69445ff04eb3efac36a51178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53934-improper-neutralization-of-server-s-45238502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53934%3A%20Improper%20Neutralization%20of%20Server-Side%20Includes%20(SSI)%20Within%20a%20Web%20Page%20in%20Kentico%20Xperience&amp;severity=high&amp;id=69445ff04eb3efac36a51174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53738-improper-neutralization-of-input-du-bd88573c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a51170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53737-improper-neutralization-of-input-du-d4695a57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a5116c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53736-improper-neutralization-of-input-du-32d50676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=69445ff04eb3efac36a51168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64400-the-product-does-not-restrict-or-in-1e9733f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64400%3A%20The%20product%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Palantir%20com.palantir.controlpanel%3Acontrol-panel&amp;severity=medium&amp;id=694459184eb3efac36a3bd24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-password-spraying-attacks-target-cisco-pan-vpn-253ff13e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20password%20spraying%20attacks%20target%20Cisco%2C%20PAN%20VPN%20gateways&amp;severity=high&amp;id=694458e34eb3efac36a3a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-aligned-threat-group-uses-windows-group-poli-ccd395e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Aligned%20Threat%20Group%20Uses%20Windows%20Group%20Policy%20to%20Deploy%20Espionage%20Malware&amp;severity=high&amp;id=694458e34eb3efac36a3a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dig-ai-uncensored-darknet-ai-assistant-at-the-serv-44b25b6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DIG%20AI%3A%20Uncensored%20Darknet%20AI%20Assistant%20at%20the%20Service%20of%20Criminals%20and%20Terrorists&amp;severity=medium&amp;id=694458e34eb3efac36a3a0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-beavertail-malware-variant-linked-to-lazarus-g-9523fb47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BeaverTail%20Malware%20Variant%20Linked%20to%20Lazarus%20Group&amp;severity=high&amp;id=694455604eb3efac36a30571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-steals-over-2bn-in-crypto-in-2025-50c7260d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%20Steals%20Over%20%242bn%20in%20Crypto%20in%202025&amp;severity=high&amp;id=694455604eb3efac36a30575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-oneview-flaw-rated-cvss-100-allows-unauthentic-6d3538dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20OneView%20Flaw%20Rated%20CVSS%2010.0%20Allows%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=high&amp;id=694455604eb3efac36a30579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pathfindingcloud-a-library-of-aws-iam-privilege-es-31582a04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=pathfinding.cloud%20-%20A%20library%20of%20AWS%20IAM%20privilege%20escalation%20paths&amp;severity=medium&amp;id=69444e634eb3efac36a13f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-embed-new-beavertail-variant-in-deve-c44bf866</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Embed%20New%20BeaverTail%20Variant%20in%20Developer%20Tools&amp;severity=medium&amp;id=69444ad84eb3efac36a081f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67745-cwe-402-transmission-of-private-res-0147fce4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67745%3A%20CWE-402%3A%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Aiven-Open%20myhoard&amp;severity=high&amp;id=69444e5e4eb3efac36a13dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14885-unrestricted-upload-in-sourcecodest-6b02eee6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14885%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=69444e5e4eb3efac36a13dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14739-cwe-824-access-of-uninitialized-poi-ee6d5fa5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14739%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20TP-Link%20Systems%20Inc.%20WR940N%20and%20WR941ND&amp;severity=medium&amp;id=694447544eb3efac369fb3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14738-cwe-287-improper-authentication-in--f3738763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14738%3A%20CWE-287%20Improper%20Authentication%20in%20TP-Link%20Systems%20Inc.%20WA850RE&amp;severity=medium&amp;id=694443d04eb3efac369ef739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14737-cwe-78-improper-neutralization-of-s-52edd935</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14737%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20WA850RE&amp;severity=high&amp;id=694443d04eb3efac369ef733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-apt-prince-of-persia-resurfaces-with-new-t-69092c6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20APT%20%E2%80%98Prince%20of%20Persia%E2%80%99%20Resurfaces%20With%20New%20Tools%20and%20Global%20Targets&amp;severity=medium&amp;id=694435bc4eb3efac369bc19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14884-command-injection-in-d-link-dir-605-f27fb0bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14884%3A%20Command%20Injection%20in%20D-Link%20DIR-605&amp;severity=high&amp;id=694435d24eb3efac369bca07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14879-stack-based-buffer-overflow-in-tend-980d32bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14879%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=694435d24eb3efac369bca00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62960-cwe-862-missing-authorization-in-sp-07ee6c5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62960%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Construction%20Light&amp;severity=high&amp;id=6944323d4eb3efac369b379a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62961-cwe-862-missing-authorization-in-sp-96a77111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62961%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Sparkle%20FSE&amp;severity=high&amp;id=6944323d4eb3efac369b379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62998-cwe-201-insertion-of-sensitive-info-4b85d3fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62998%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Messiah%20WP%20AI%20CoPilot&amp;severity=high&amp;id=6944323d4eb3efac369b37a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63002-cwe-862-missing-authorization-in-wp-5aedb54f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63002%3A%20Missing%20Authorization%20in%20wpforchurch%20Sermon%20Manager&amp;severity=medium&amp;id=6944323d4eb3efac369b37a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63043-cwe-639-authorization-bypass-throug-156d0aca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63043%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=high&amp;id=6944323d4eb3efac369b37a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64235-cwe-22-improper-limitation-of-a-pat-c4795854</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64235%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Tuturn&amp;severity=medium&amp;id=6944323d4eb3efac369b37a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64236-cwe-288-authentication-bypass-using-414f4af6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64236%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Tuturn&amp;severity=critical&amp;id=6944323d4eb3efac369b37af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14896-files-or-directories-accessible-to--f96436ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14896%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20yuzutech%20kroki&amp;severity=high&amp;id=6944323d4eb3efac369b37ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64282-cwe-639-authorization-bypass-throug-3c6dd366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64282%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=high&amp;id=69443cc84eb3efac369d2e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64355-cwe-79-improper-neutralization-of-i-94e56e13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=high&amp;id=6944323d4eb3efac369b37b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66058-cwe-862-missing-authorization-in-pi-5620b7ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66058%3A%20Missing%20Authorization%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=high&amp;id=6944323d4eb3efac369b37b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14878-stack-based-buffer-overflow-in-tend-832aeece</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14878%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=69442b344eb3efac36990c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14877-sql-injection-in-campcodes-supplier-9e879e33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14877%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=69442b344eb3efac36990c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14823-cwe-201-insertion-of-sensitive-info-a7d3f81a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14823%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ConnectWise%20ScreenConnect&amp;severity=medium&amp;id=6944242d4eb3efac36964740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uefi-vulnerability-in-major-motherboards-enables-e-f792c7c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UEFI%20Vulnerability%20in%20Major%20Motherboards%20Enables%20Early-Boot%20Attacks&amp;severity=medium&amp;id=6944209a4eb3efac369568a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64724-cwe-276-incorrect-default-permissio-363ef435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64724%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20arduino%20arduino-ide&amp;severity=medium&amp;id=69441d2a4eb3efac369420af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64723-cwe-276-incorrect-default-permissio-c22765a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64723%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20arduino%20arduino-ide&amp;severity=medium&amp;id=69441d2a4eb3efac369420a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65011-cwe-425-direct-request-forced-brows-4322ca1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65011%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65010-cwe-306-missing-authentication-for--4e3e22c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65010%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65009-cwe-256-plaintext-storage-of-a-pass-0ec48ee3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65009%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65008-cwe-78-improper-neutralization-of-s-d341792b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65008%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WODESYS%20WD-R608U&amp;severity=critical&amp;id=69441d2f4eb3efac369421ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65007-cwe-306-missing-authentication-for--727ac4e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WODESYS%20WD-R608U&amp;severity=high&amp;id=69441d2f4eb3efac369421a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-patches-critical-flaw-in-it-infrastructure-man-912fda4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20Patches%20Critical%20Flaw%20in%20IT%20Infrastructure%20Management%20Software&amp;severity=critical&amp;id=694419924eb3efac3690e8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64469-cwe-121-stack-based-buffer-overflow-1b1ce284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64469%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64468-cwe-416-use-after-free-in-ni-labvie-40c52f4a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64468%3A%20CWE-416%20Use%20After%20Free%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7358-cwe-798-use-of-hard-coded-credential-d9b40039</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7358%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=694416204eb3efac368e65d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7047-cwe-862-missing-authorization-in-uta-85b0834d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7047%3A%20CWE-862%20Missing%20Authorization%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=medium&amp;id=694416204eb3efac368e65e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64467-cwe-125-out-of-bounds-read-in-ni-la-4b37ff21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64467%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-oneview-flaw-rated-cvss-100-allows-unauthentic-92e1896b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20OneView%20Flaw%20Rated%20CVSS%2010.0%20Allows%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=6944e77519341fe1888671e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64466-cwe-125-out-of-bounds-read-in-ni-la-ade9688b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64466%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694416204eb3efac368e65dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64465-cwe-125-out-of-bounds-read-in-ni-la-03680b5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64465%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64464-cwe-125-out-of-bounds-read-in-ni-la-c761ae48</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64464%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64463-cwe-125-out-of-bounds-read-in-ni-la-727099c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64463%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1031-cwe-639-authorization-bypass-through-52f38987</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1031%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=694412994eb3efac368d95d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64462-cwe-125-out-of-bounds-read-in-ni-la-2b265abe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64462%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=694412994eb3efac368d95d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1030-cwe-359-exposure-of-private-personal-fe8e64a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1030%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Utarit%20Informatics%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=69440f154eb3efac368cd70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64461-cwe-787-out-of-bounds-write-in-ni-l-3c49877a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64461%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=69440f154eb3efac368cd710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14861-vulnerability-in-mozilla-firefox-9685657f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14861%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69440f154eb3efac368cd706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14860-vulnerability-in-mozilla-firefox-82f60082</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14860%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69440f154eb3efac368cd702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14744-vulnerability-in-mozilla-firefox-fo-bde4dbc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14744%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=69440f154eb3efac368cd6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1029-cwe-798-use-of-hard-coded-credential-6b7120c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1029%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Information%20Services%20Inc.%20SoliClub&amp;severity=high&amp;id=69440f154eb3efac368cd70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9787-cwe-79-improper-neutralization-of-in-52164820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=69440f154eb3efac368cd713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65000-cwe-212-improper-removal-of-sensiti-4c4606b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65000%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=low&amp;id=69440bfa4eb3efac368bf684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-hubspot-phishing-campaign-9c5426b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20HubSpot%20Phishing%20Campaign&amp;severity=medium&amp;id=694408114eb3efac368aaf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-stealka-stealer-hijacks-accounts-and-steals-cr-5c6750cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Stealka%20stealer%20hijacks%20accounts%20and%20steals%20crypto%20while%20masquerading%20as%20pirated%20software%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6944054f4eb3efac3689efa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/access-granted-phishing-with-device-code-authoriza-75df8ed8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Access%20granted%3A%20phishing%20with%20device%20code%20authorization%20for%20account%20takeover&amp;severity=medium&amp;id=6944242b4eb3efac36964678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-flaw-in-asus-update-tool-252cfa27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20Flaw%20in%20Asus%20Update%20Tool&amp;severity=medium&amp;id=6944051a4eb3efac3689cb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40898-cwe-22-improper-limitation-of-a-pat-9b5d57c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40898%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=694401044eb3efac3688609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40893-cwe-79-improper-neutralization-of-i-099af892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=694401044eb3efac36886097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40892-cwe-79-improper-neutralization-of-i-acbcde93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=694401044eb3efac36886094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40891-cwe-79-improper-neutralization-of-i-6aec0b9f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=low&amp;id=694401044eb3efac36886091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-whatsapp-hijacks-mcp-leaks-ai--0207a7b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20WhatsApp%20Hijacks%2C%20MCP%20Leaks%2C%20AI%20Recon%2C%20React2Shell%20Exploit%20and%2015%20More%20Stories&amp;severity=medium&amp;id=6944e77519341fe1888671ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-hackers-steal-202-billion-in-20-e0770956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-Linked%20Hackers%20Steal%20%242.02%20Billion%20in%202025%2C%20Leading%20Global%20Crypto%20Theft&amp;severity=medium&amp;id=6944e77519341fe1888671ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13110-cwe-639-authorization-bypass-throug-e2175abb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13110%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=6943f2f44eb3efac36830805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14437-cwe-532-insertion-of-sensitive-info-132acec1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14437%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20wpmudev%20Hummingbird%20Performance%20%E2%80%93%20Cache%20%26%20Page%20Speed%20Optimization%20for%20Core%20Web%20Vitals%20%7C%20Critical%20CSS%20%7C%20Minify%20CSS%20%7C%20Defer%20CSS%20Javascript%20%7C%20CDN&amp;severity=high&amp;id=6943f2f44eb3efac3683080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14618-cwe-862-missing-authorization-in-li-b0bcebfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14618%3A%20CWE-862%20Missing%20Authorization%20in%20listingthemes%20Sweet%20Energy%20Efficiency&amp;severity=medium&amp;id=6943f2f44eb3efac36830812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14277-cwe-918-server-side-request-forgery-c4d54bf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14277%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6943f2f44eb3efac3683080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-case-for-dynamic-ai-saas-security-as-copilots--814f4403</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Case%20for%20Dynamic%20AI-SaaS%20Security%20as%20Copilots%20Scale&amp;severity=medium&amp;id=6944e77519341fe1888671f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10910-cwe-639-authorization-bypass-throug-3488e573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10910%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Govee%20H6056&amp;severity=critical&amp;id=6943e86c4eb3efac367ff766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/113000-impacted-by-data-breach-at-virginia-mental--28f003f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=113%2C000%20Impacted%20by%20Data%20Breach%20at%20Virginia%20Mental%20Health%20Authority&amp;severity=medium&amp;id=6943e1514eb3efac367e3aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-hacking-event-awards-3200000-for-11--58d27060</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zeroday%20Cloud%20hacking%20event%20awards%20%24320%2C0000%20for%2011%20zero%20days&amp;severity=critical&amp;id=6943da584eb3efac367cd1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-asus-live-update-flaw-after-ev-95e8b5d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20ASUS%20Live%20Update%20Flaw%20After%20Evidence%20of%20Active%20Exploitation&amp;severity=critical&amp;id=6943da584eb3efac367cd1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-spreads-docswap-android-malware-via-qr-phi-8f1eaaf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Spreads%20DocSwap%20Android%20Malware%20via%20QR%20Phishing%20Posing%20as%20Delivery%20App&amp;severity=high&amp;id=6943da584eb3efac367cd1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-probes-foreign-interference-after-remote-co-aea49651</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%20Probes%20%E2%80%98Foreign%20Interference%E2%80%99%20After%20Remote%20Control%20Malware%20Found%20on%20Passenger%20Ferry&amp;severity=medium&amp;id=6943d3424eb3efac367b3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orm-leaking-more-than-you-joined-for-part-33-on-or-59b12903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ORM%20Leaking%20More%20Than%20You%20Joined%20For%20-%20Part%203%2F3%20on%20ORM%20Leak%20Vulnerabilities&amp;severity=medium&amp;id=6943cc4d4eb3efac36794bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14364-cwe-862-missing-authorization-in-kr-d026b68d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14364%3A%20CWE-862%20Missing%20Authorization%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=6943cc484eb3efac36794b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13730-cwe-79-improper-neutralization-of-i-0ed3a838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daggerhart%20OpenID%20Connect%20Generic%20Client&amp;severity=medium&amp;id=6943cc484eb3efac36794b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13641-cwe-22-improper-limitation-of-a-pat-737604d8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13641%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smub%20Photo%20Gallery%2C%20Sliders%2C%20Proofing%20and%20Themes%20%E2%80%93%20NextGEN%20Gallery&amp;severity=high&amp;id=6943cc484eb3efac36794b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64997-cwe-280-improper-handling-of-insuff-32f1c412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64997%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=6943c8c34eb3efac3678171c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-patches-exploited-sma-1000-zero-day-0b1eed74</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Patches%20Exploited%20SMA%201000%20Zero-Day&amp;severity=critical&amp;id=6943c5314eb3efac3676c54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14874-improper-check-or-handling-of-excep-67b511f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14874%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Management%20for%20Kubernetes%202&amp;severity=medium&amp;id=6943c1bb4eb3efac3675c967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14318-cwe-863-incorrect-authorization-in--dc1411c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14318%3A%20CWE-863%20Incorrect%20Authorization%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=6943b3ab4eb3efac3671aa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67546-exposure-of-sensitive-system-inform-ae67d079</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67546%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20weDevs%20WP%20ERP&amp;severity=medium&amp;id=6943b0574eb3efac36700b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66119-improper-neutralization-of-input-du-29b87daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=high&amp;id=6943b0574eb3efac36700b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66118-improper-neutralization-of-input-du-706be7f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=high&amp;id=6943b0574eb3efac36700b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66117-missing-authorization-in-ays-pro-ea-5d57de8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66117%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Easy%20Form&amp;severity=high&amp;id=6943b0574eb3efac36700b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66116-insertion-of-sensitive-information--44febdc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66116%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20UserElements%20Ultimate%20Member%20Widgets%20for%20Elementor&amp;severity=high&amp;id=6943b0574eb3efac36700b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66104-missing-authorization-in-anton-vany-cd195efc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66104%3A%20Missing%20Authorization%20in%20Anton%20Vanyukov%20Offload%2C%20AI%20%26amp%3B%20Optimize%20with%20Cloudflare%20Images&amp;severity=medium&amp;id=6943b0574eb3efac36700b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66102-improper-neutralization-of-input-du-beae84bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20FV%20Antispam&amp;severity=high&amp;id=6943b0574eb3efac36700b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66100-missing-authorization-in-magnigenie-e1c75802</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66100%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=medium&amp;id=6943b0574eb3efac36700b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66088-missing-authorization-in-property-h-1ca157f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66088%3A%20Missing%20Authorization%20in%20Property%20Hive%20PropertyHive&amp;severity=high&amp;id=6943b0564eb3efac36700b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66078-improper-control-of-generation-of-c-3efabb23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66078%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jetmonsters%20Hotel%20Booking%20Lite&amp;severity=critical&amp;id=6943b0564eb3efac36700b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66074-unrestricted-upload-of-file-with-da-496ef0ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66074%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cozmoslabs%20WP%20Webhooks&amp;severity=critical&amp;id=6943b0564eb3efac36700b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66070-missing-authorization-in-tomdever-w-10b207cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66070%3A%20Missing%20Authorization%20in%20Tomdever%20wpForo%20Forum&amp;severity=high&amp;id=6943b0564eb3efac36700b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66068-missing-authorization-in-instawp-in-8ccc0e9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66068%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=medium&amp;id=6943b0564eb3efac36700b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66054-missing-authorization-in-thimpress--ef86ffb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66054%3A%20Missing%20Authorization%20in%20ThimPress%20LearnPress&amp;severity=high&amp;id=6943b0564eb3efac36700b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64378-missing-authorization-in-cridiostud-06d3196a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64378%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64377-improper-control-of-filename-for-in-ad79603f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64377%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64376-improper-neutralization-of-input-du-0b7551cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=high&amp;id=6943b0564eb3efac36700b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64375-missing-authorization-in-mahmudul-h-01257310</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64375%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20WP%20Social%20Ninja&amp;severity=medium&amp;id=6943b0564eb3efac36700b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64374-unrestricted-upload-of-file-with-da-157631bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64374%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20Motors&amp;severity=critical&amp;id=6943b0544eb3efac36700ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64373-improper-control-of-filename-for-in-77102f0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64373%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64372-improper-neutralization-of-input-du-1dcb7b31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64372%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64371-improper-neutralization-of-special--d8f288ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64371%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=high&amp;id=6943b0544eb3efac36700ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64295-insertion-of-sensitive-information--cba8bb88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64295%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=medium&amp;id=6943b0544eb3efac36700ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64273-missing-authorization-in-getrespons-15884e0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64273%3A%20Missing%20Authorization%20in%20GetResponse%20Email%20marketing%20for%20WordPress%20by%20GetResponse%20Official&amp;severity=high&amp;id=6943b0544eb3efac36700ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64272-exposure-of-sensitive-system-inform-440d7d4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64272%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20GetResponse%20Email%20marketing%20for%20WordPress%20by%20GetResponse%20Official&amp;severity=medium&amp;id=6943b0544eb3efac36700ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64270-exposure-of-sensitive-system-inform-df4da6e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64270%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=medium&amp;id=6943b0544eb3efac36700acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64268-missing-authorization-in-arraytics--f8238140</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64268%3A%20Missing%20Authorization%20in%20Arraytics%20Timetics&amp;severity=high&amp;id=6943b0544eb3efac36700aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64266-deserialization-of-untrusted-data-i-aa9cfce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64266%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=high&amp;id=6943b0544eb3efac36700ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64260-improper-neutralization-of-input-du-4508b2aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marco%20Milesi%20ANAC%20XML%20Bandi%20di%20Gara&amp;severity=high&amp;id=6943b0534eb3efac36700aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64258-exposure-of-sensitive-system-inform-8beff33b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64258%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20wpweb%20Follow%20My%20Blog%20Post&amp;severity=high&amp;id=6943b0534eb3efac36700ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64233-deserialization-of-untrusted-data-i-eb415402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64233%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Codiqa&amp;severity=critical&amp;id=6943b0534eb3efac36700ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64231-unrestricted-upload-of-file-with-da-0100cecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64231%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RedefiningTheWeb%20WordPress%20Contact%20Form%207%20PDF%2C%20Google%20Sheet%20%26%20Database&amp;severity=critical&amp;id=6943b0534eb3efac36700ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64230-improper-limitation-of-a-pathname-t-1226ec74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64230%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Chill%20Filr&amp;severity=high&amp;id=6943b0534eb3efac36700aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64227-deserialization-of-untrusted-data-i-d0b8dbab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64227%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=critical&amp;id=6943b0534eb3efac36700aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64225-improper-neutralization-of-script-r-72de1e5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64225%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20colabrio%20Stockie%20Extra&amp;severity=medium&amp;id=6943b0534eb3efac36700aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64223-improper-control-of-filename-for-in-8647e9ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64223%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20PenNews&amp;severity=high&amp;id=6943b0534eb3efac36700aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64222-missing-authorization-in-fantasticp-55de75f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64222%3A%20Missing%20Authorization%20in%20FantasticPlugins%20WooCommerce%20Recover%20Abandoned%20Cart&amp;severity=high&amp;id=6943b0534eb3efac36700aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64221-improper-neutralization-of-input-du-eba2349f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64221%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Reservation%20Plugin&amp;severity=high&amp;id=6943b0534eb3efac36700a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64218-insertion-of-sensitive-information--7186db2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64218%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Chill%20Passster&amp;severity=high&amp;id=6943b0514eb3efac36700a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64217-improper-neutralization-of-input-du-ad04acc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64217%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6943b0514eb3efac36700a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64214-missing-authorization-in-stylemixth-cbd3d425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64214%3A%20Missing%20Authorization%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6943b0514eb3efac36700a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64213-insertion-of-sensitive-information--b49195e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64213%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6943b0514eb3efac36700a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64209-missing-authorization-in-stylemixth-c6e023c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64209%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy&amp;severity=high&amp;id=6943b0514eb3efac36700a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64207-improper-neutralization-of-input-du-a07a09be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64207%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=6943b0514eb3efac36700a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64206-deserialization-of-untrusted-data-i-54558714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64206%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TieLabs%20Jannah&amp;severity=critical&amp;id=6943b0514eb3efac36700a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64205-improper-control-of-filename-for-in-898693ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64205%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=high&amp;id=6943b0514eb3efac36700a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64203-improper-neutralization-of-input-du-0bd9616a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64203%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20Mailster&amp;severity=high&amp;id=6943b0514eb3efac36700a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64193-improper-control-of-filename-for-in-7a872eb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64193%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=6943b0514eb3efac36700a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64192-missing-authorization-in-8theme-xst-5f9866e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64192%3A%20Missing%20Authorization%20in%208theme%20XStore&amp;severity=medium&amp;id=6943b04f4eb3efac36700888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64191-improper-neutralization-of-input-du-046b5834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64191%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=6943b04f4eb3efac36700885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64189-improper-neutralization-of-input-du-b34d095a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64189%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208theme%20XStore%20Core&amp;severity=high&amp;id=6943b04f4eb3efac36700882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64188-incorrect-privilege-assignment-in-p-5d0acbf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64188%3A%20Incorrect%20Privilege%20Assignment%20in%20PenciDesign%20Soledad&amp;severity=critical&amp;id=6943b04f4eb3efac3670087f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6326-improper-control-of-filename-for-inc-310fbee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Inset&amp;severity=high&amp;id=6943b0574eb3efac36700b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6324-improper-neutralization-of-input-dur-fa24820e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatrixAddons%20Easy%20Invoice&amp;severity=high&amp;id=6943b0574eb3efac36700b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63039-missing-authorization-in-cridiostud-2f0ce5bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63039%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=6943b04f4eb3efac3670087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60182-improper-neutralization-of-input-du-9e5993e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60182%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=high&amp;id=6943b04f4eb3efac36700879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60180-deserialization-of-untrusted-data-i-c6d73945</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60180%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Salesforce&amp;severity=critical&amp;id=6943b04f4eb3efac36700876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60178-deserialization-of-untrusted-data-i-7c1c4a50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60178%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20HubSpot&amp;severity=critical&amp;id=6943b04f4eb3efac36700873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60174-deserialization-of-untrusted-data-i-2c012f73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60174%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Constant%20Contact%20Plugin&amp;severity=critical&amp;id=6943b04f4eb3efac36700870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60091-deserialization-of-untrusted-data-i-bcc97e76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60091%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zoho%20CRM%20and%20Bigin&amp;severity=critical&amp;id=6943b04f4eb3efac3670086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60090-deserialization-of-untrusted-data-i-8078a441</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60090%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Insightly&amp;severity=critical&amp;id=6943b04e4eb3efac36700394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60089-deserialization-of-untrusted-data-i-2935f42a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60089%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20FreshDesk%20Plugin&amp;severity=critical&amp;id=6943b04e4eb3efac36700391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60088-missing-authorization-in-saleswonde-0d01330e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60088%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20WebinarIgnition&amp;severity=medium&amp;id=6943b04e4eb3efac3670038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60086-missing-authorization-in-matt-wp-vo-d20e9f75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60086%3A%20Missing%20Authorization%20in%20Matt%20WP%20Voting%20Contest&amp;severity=high&amp;id=6943b04e4eb3efac3670038b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60084-deserialization-of-untrusted-data-i-cce7d12f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=high&amp;id=6943b04e4eb3efac36700388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60083-deserialization-of-untrusted-data-i-8c8b0a51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60083%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=high&amp;id=6943b04e4eb3efac36700385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60082-deserialization-of-untrusted-data-i-a3acb28d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60082%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=high&amp;id=6943b04e4eb3efac36700382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60081-deserialization-of-untrusted-data-i-70f10eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60081%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Contact%20Form%207&amp;severity=high&amp;id=6943b04e4eb3efac3670037f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60080-deserialization-of-untrusted-data-i-9b656e2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60080%3A%20Deserialization%20of%20Untrusted%20Data%20in%20add-ons.org%20PDF%20for%20Gravity%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=high&amp;id=6943b04e4eb3efac3670037c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60079-missing-authorization-in-bplugins-p-3a661dbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60079%3A%20Missing%20Authorization%20in%20bPlugins%20Parallax%20Section%20block&amp;severity=high&amp;id=6943b04e4eb3efac36700379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60078-improper-control-of-filename-for-in-9a39ec2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60078%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Agence%20web%20Eoxia%20%26%238211%3B%20Montpellier%20Task%20Manager&amp;severity=high&amp;id=6943b04c4eb3efac36700367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60077-missing-authorization-in-yaycommerc-bae79feb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60077%3A%20Missing%20Authorization%20in%20YayCommerce%20YayPricing&amp;severity=high&amp;id=6943b04c4eb3efac36700364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60076-improper-control-of-filename-for-in-29481198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=high&amp;id=6943b04c4eb3efac36700361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60072-improper-control-of-filename-for-in-0af44a05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60072%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Anchor%20smooth%20scroll&amp;severity=high&amp;id=6943b04c4eb3efac3670035e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60071-improper-control-of-filename-for-in-1d495539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60071%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20don-themes%20Riode&amp;severity=high&amp;id=6943b04c4eb3efac3670035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60070-improper-control-of-generation-of-c-23d08543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60070%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20The4%20Molla&amp;severity=medium&amp;id=6943b04c4eb3efac36700358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60069-improper-control-of-filename-for-in-23fdf38a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60069%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP&amp;severity=high&amp;id=6943b04c4eb3efac36700355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60068-improper-control-of-generation-of-c-31d72f12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60068%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20javothemes%20Javo%20Core&amp;severity=medium&amp;id=6943b04c4eb3efac36700352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60067-improper-control-of-filename-for-in-dbb9b1fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Giardino&amp;severity=high&amp;id=6943b04c4eb3efac3670034f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60066-improper-control-of-filename-for-in-9458d725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Katelyn&amp;severity=high&amp;id=6943b04c4eb3efac3670034c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60065-improper-control-of-filename-for-in-c16eddc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pinevale&amp;severity=high&amp;id=6943b04b4eb3efac366ffb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60064-improper-control-of-filename-for-in-70a85ac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Renewal&amp;severity=high&amp;id=6943b04b4eb3efac366ffb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60063-improper-control-of-filename-for-in-33de8f2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60063%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rosalinda&amp;severity=high&amp;id=6943b04b4eb3efac366ffb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60062-improper-neutralization-of-special--eae2adb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60062%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mmetrodw%20tPlayer&amp;severity=critical&amp;id=6943b04b4eb3efac366ffb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60061-improper-control-of-filename-for-in-3df43892</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Kicker&amp;severity=high&amp;id=6943b04b4eb3efac366ffb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60060-improper-control-of-filename-for-in-fb3c8f34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pubzinne&amp;severity=high&amp;id=6943b04b4eb3efac366ffb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60059-improper-control-of-filename-for-in-77acb870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60059%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=6943b04b4eb3efac366ffb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60058-improper-control-of-filename-for-in-91e7a02c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60058%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DetailX&amp;severity=high&amp;id=6943b04b4eb3efac366ffb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60057-improper-control-of-filename-for-in-60442586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60057%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20DJ%20Rainflow&amp;severity=high&amp;id=6943b04b4eb3efac366ffb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60056-improper-control-of-filename-for-in-d38acf97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60056%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Winger&amp;severity=high&amp;id=6943b04b4eb3efac366ffb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60055-improper-control-of-filename-for-in-2e231458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fabrica&amp;severity=high&amp;id=6943b0494eb3efac366ffa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60054-improper-control-of-filename-for-in-e52ea841</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20OnLeash&amp;severity=high&amp;id=6943b0494eb3efac366ffa91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60053-improper-control-of-filename-for-in-0d697375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20MaxCube&amp;severity=high&amp;id=6943b0494eb3efac366ffa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60052-improper-control-of-filename-for-in-e89862a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60052%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20W%26D&amp;severity=high&amp;id=6943b0494eb3efac366ffa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60051-improper-control-of-filename-for-in-e31bdccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60051%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Rare%20Radio&amp;severity=high&amp;id=6943b0494eb3efac366ffa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60050-improper-control-of-filename-for-in-e3a122e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60050%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Panda&amp;severity=high&amp;id=6943b0494eb3efac366ffa81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60049-improper-control-of-filename-for-in-348d1db2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60049%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Soleil&amp;severity=high&amp;id=6943b0494eb3efac366ffa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60048-improper-control-of-filename-for-in-10365e4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Tripster&amp;severity=high&amp;id=6943b0494eb3efac366ffa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60047-improper-control-of-filename-for-in-66f15b0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60047%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20IPharm&amp;severity=high&amp;id=6943b0494eb3efac366ffa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60046-improper-control-of-filename-for-in-5a5d1cc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60046%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20HeartStar&amp;severity=high&amp;id=6943b0494eb3efac366ffa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60045-missing-authorization-in-themeateli-91a26c30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60045%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=high&amp;id=6943b0474eb3efac366ff9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60044-improper-control-of-filename-for-in-3f2a9741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60044%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Fribbo&amp;severity=high&amp;id=6943b0474eb3efac366ff9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60043-improper-control-of-filename-for-in-729a73c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60043%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Wanderic&amp;severity=high&amp;id=6943b0474eb3efac366ff9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60042-improper-control-of-filename-for-in-2a45b4a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60042%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Chinchilla&amp;severity=high&amp;id=6943b0474eb3efac366ff9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59134-incorrect-privilege-assignment-in-j-3e4eaf3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59134%3A%20Incorrect%20Privilege%20Assignment%20in%20Jthemes%20Sale!%20Immigration%20law%2C%20Visa%20services%20support%2C%20Migration%20Agent%20Consulting&amp;severity=high&amp;id=6943b0474eb3efac366ff9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58951-improper-neutralization-of-special--fd987dfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58951%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Advance%20Seat%20Reservation%20Management%20for%20WooCommerce&amp;severity=critical&amp;id=6943b0474eb3efac366ff9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58950-improper-control-of-filename-for-in-3b05f9fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58950%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lione&amp;severity=high&amp;id=6943b0474eb3efac366ff9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58949-improper-control-of-filename-for-in-57145155</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58949%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Spock&amp;severity=high&amp;id=6943b0474eb3efac366ff99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58948-improper-control-of-filename-for-in-47bf2b58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58948%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Aromatica&amp;severity=high&amp;id=6943b0474eb3efac366ff99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58947-improper-control-of-filename-for-in-37a32cce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58947%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Athos&amp;severity=high&amp;id=6943b0474eb3efac366ff997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58946-improper-control-of-filename-for-in-1397df49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Vocal&amp;severity=high&amp;id=6943b0454eb3efac366ff8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58945-improper-control-of-filename-for-in-1e6aa6da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20EcoGrow&amp;severity=high&amp;id=6943b0454eb3efac366ff8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58944-improper-control-of-filename-for-in-26b08cbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58944%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Manufactory&amp;severity=high&amp;id=6943b0454eb3efac366ff8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58943-improper-control-of-filename-for-in-9edbdc25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58943%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Agricola&amp;severity=high&amp;id=6943b0454eb3efac366ff8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58942-improper-control-of-filename-for-in-5d9ef633</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58942%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Dwell&amp;severity=high&amp;id=6943b0454eb3efac366ff8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58941-improper-control-of-filename-for-in-cd91f554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Fabric&amp;severity=high&amp;id=6943b0454eb3efac366ff8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58940-improper-control-of-filename-for-in-e53941f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58940%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Basil&amp;severity=high&amp;id=6943b0454eb3efac366ff8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58938-missing-authorization-in-themeateli-dd754428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58938%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=high&amp;id=6943b0454eb3efac366ff8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58937-improper-control-of-filename-for-in-df193e72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Tacticool&amp;severity=high&amp;id=6943b0454eb3efac366ff8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58936-improper-control-of-filename-for-in-c10bd1e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58936%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Catamaran&amp;severity=high&amp;id=6943b0454eb3efac366ff8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58935-improper-control-of-filename-for-in-5573f75e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lunna&amp;severity=high&amp;id=6943b0434eb3efac366ff646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58934-improper-control-of-filename-for-in-dbf57e0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58934%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20The%20Gig&amp;severity=high&amp;id=6943b0434eb3efac366ff643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58933-improper-control-of-filename-for-in-c2bd8165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58933%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Anubis&amp;severity=high&amp;id=6943b0434eb3efac366ff640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58932-improper-control-of-filename-for-in-261168fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58932%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Prisma&amp;severity=high&amp;id=6943b0434eb3efac366ff63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58931-improper-control-of-filename-for-in-c5fabb91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58931%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Palatio&amp;severity=high&amp;id=6943b0434eb3efac366ff63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58930-improper-control-of-filename-for-in-4fae6fc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58930%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20FitFlex&amp;severity=high&amp;id=6943b0434eb3efac366ff637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58929-improper-control-of-filename-for-in-28dc98b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58929%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Pantry&amp;severity=high&amp;id=6943b0434eb3efac366ff634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58928-improper-control-of-filename-for-in-dd890eb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58928%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Heart&amp;severity=high&amp;id=6943b0434eb3efac366ff631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58927-improper-control-of-filename-for-in-c9d1da75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58927%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Stallion&amp;severity=high&amp;id=6943b0434eb3efac366ff62e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58926-improper-control-of-filename-for-in-a57389f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58926%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Cerebrum&amp;severity=high&amp;id=6943b0434eb3efac366ff62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58925-improper-control-of-filename-for-in-bd40899b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Neptunus&amp;severity=high&amp;id=6943b0414eb3efac366ff3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58923-improper-control-of-filename-for-in-58b8a01e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58923%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Critique&amp;severity=high&amp;id=6943b0414eb3efac366ff3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58901-improper-control-of-filename-for-in-afaf1f0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58901%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Takeout&amp;severity=high&amp;id=6943b0414eb3efac366ff3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58900-improper-control-of-filename-for-in-3ce6cd5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58900%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20UniTravel&amp;severity=high&amp;id=6943b0414eb3efac366ff3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58899-improper-control-of-filename-for-in-40a20cfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58899%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Frame&amp;severity=high&amp;id=6943b0414eb3efac366ff3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58898-improper-control-of-filename-for-in-790c3d65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58898%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20HealthHub&amp;severity=high&amp;id=6943b0414eb3efac366ff3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58896-improper-control-of-filename-for-in-f91a931d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58896%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Otaku&amp;severity=high&amp;id=6943b0414eb3efac366ff3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58895-improper-control-of-filename-for-in-088847ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58895%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Integro&amp;severity=high&amp;id=6943b0414eb3efac366ff3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58894-improper-control-of-filename-for-in-a257ac96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Good%20Mood&amp;severity=high&amp;id=6943b0414eb3efac366ff3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58893-improper-control-of-filename-for-in-353da234</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58893%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Alright&amp;severity=high&amp;id=6943b0414eb3efac366ff3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58892-improper-control-of-filename-for-in-b4c42cb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58892%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Tourimo&amp;severity=high&amp;id=6943b03f4eb3efac366ff385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58891-improper-control-of-filename-for-in-3d774b71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58891%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Sanger&amp;severity=high&amp;id=6943b03f4eb3efac366ff381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58890-improper-control-of-filename-for-in-fceb0925</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Playful&amp;severity=high&amp;id=6943b03f4eb3efac366ff379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58889-improper-control-of-filename-for-in-785cb2b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Towny&amp;severity=high&amp;id=6943b03f4eb3efac366ff374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58888-improper-control-of-filename-for-in-85e53538</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58888%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20The%20Flash&amp;severity=high&amp;id=6943b03f4eb3efac366ff370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58885-improper-control-of-filename-for-in-6b2630d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58885%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Pathfinder&amp;severity=high&amp;id=6943b03f4eb3efac366ff36b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58879-improper-control-of-filename-for-in-0b739edd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58879%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Festy&amp;severity=high&amp;id=6943b03f4eb3efac366ff365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58877-missing-authorization-in-javothemes-f0edaeb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58877%3A%20Missing%20Authorization%20in%20javothemes%20Javo%20Core&amp;severity=high&amp;id=6943b03f4eb3efac366ff361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58803-improper-control-of-filename-for-in-59cab053</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58803%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Algenix&amp;severity=high&amp;id=6943b03f4eb3efac366ff35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58710-incorrect-privilege-assignment-in-e-f6108903</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58710%3A%20Incorrect%20Privilege%20Assignment%20in%20e-plugins%20Hotel%20Listing&amp;severity=high&amp;id=6943b03f4eb3efac366ff35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58709-improper-control-of-filename-for-in-025dbbf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58709%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Legacy&amp;severity=high&amp;id=6943b03e4eb3efac366ff31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58708-improper-control-of-filename-for-in-faaf2138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20777&amp;severity=high&amp;id=6943b03e4eb3efac366ff319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58706-improper-control-of-filename-for-in-7299fb46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58706%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Woo%20Hoo&amp;severity=high&amp;id=6943b03e4eb3efac366ff316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58225-improper-control-of-filename-for-in-89f942b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58225%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Paragon&amp;severity=high&amp;id=6943b03e4eb3efac366ff313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57897-improper-neutralization-of-input-du-5b72dbd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20venusweb%20Logtik&amp;severity=high&amp;id=6943b03e4eb3efac366ff310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55707-incorrect-privilege-assignment-in-w-dcd3c231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55707%3A%20Incorrect%20Privilege%20Assignment%20in%20WPXPO%20PostX&amp;severity=high&amp;id=6943b03e4eb3efac366ff30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54751-missing-authorization-in-wpxpo-post-7eb00c6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54751%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=high&amp;id=6943b03e4eb3efac366ff30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54748-improper-limitation-of-a-pathname-t-190aa8a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54748%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RomanCode%20MapSVG&amp;severity=medium&amp;id=6943b03e4eb3efac366ff307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54745-missing-authorization-in-miniorange-1e238856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54745%3A%20Missing%20Authorization%20in%20miniOrange%20miniOrange&apos;s%20Google%20Authenticator&amp;severity=medium&amp;id=6943b03e4eb3efac366ff304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54743-missing-authorization-in-mkscripts--46b67fb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54743%3A%20Missing%20Authorization%20in%20mkscripts%20Download%20After%20Email&amp;severity=medium&amp;id=6943b03e4eb3efac366ff301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54741-missing-authorization-in-tyler-moor-5e00d0a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54741%3A%20Missing%20Authorization%20in%20Tyler%20Moore%20Super%20Blank&amp;severity=high&amp;id=6943b03c4eb3efac366ff2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54723-deserialization-of-untrusted-data-i-945f8145</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54723%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20DentiCare&amp;severity=critical&amp;id=6943b03c4eb3efac366ff2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53453-improper-control-of-filename-for-in-0feab8c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53453%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Hygia&amp;severity=high&amp;id=6943b03c4eb3efac366ff2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53449-improper-control-of-filename-for-in-a23709c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53449%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Convex&amp;severity=high&amp;id=6943b03c4eb3efac366ff2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53448-improper-control-of-filename-for-in-02dea056</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53448%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rally&amp;severity=high&amp;id=6943b03c4eb3efac366ff2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53447-improper-control-of-filename-for-in-e1791361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53447%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Assembly&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53446-improper-control-of-filename-for-in-864d7d0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53446%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Beautique&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53445-improper-control-of-filename-for-in-3dc12dc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53445%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Catwalk&amp;severity=high&amp;id=6943b03c4eb3efac366ff2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53443-improper-control-of-filename-for-in-75687fb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53443%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Smash&amp;severity=high&amp;id=6943b03c4eb3efac366ff2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53442-improper-control-of-filename-for-in-69bb9ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53442%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Rentic&amp;severity=high&amp;id=6943b03c4eb3efac366ff2bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53441-improper-control-of-filename-for-in-4ec54b9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53441%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Greeny&amp;severity=high&amp;id=6943b03a4eb3efac366ff24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53439-improper-control-of-filename-for-in-6410179c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Harper&amp;severity=high&amp;id=6943b03a4eb3efac366ff24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53438-improper-control-of-filename-for-in-4594ac0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53438%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20FitLine&amp;severity=high&amp;id=6943b03a4eb3efac366ff247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53437-improper-control-of-filename-for-in-46ace214</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53437%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Greenorganic&amp;severity=high&amp;id=6943b03a4eb3efac366ff244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53436-improper-control-of-filename-for-in-e596625d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Monki&amp;severity=high&amp;id=6943b03a4eb3efac366ff241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53435-improper-control-of-filename-for-in-aac62298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Plan%20My%20Day&amp;severity=high&amp;id=6943b03a4eb3efac366ff23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53434-improper-control-of-filename-for-in-1aa7b023</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ChildHope&amp;severity=high&amp;id=6943b03a4eb3efac366ff23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53433-improper-control-of-filename-for-in-8e74ca6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53433%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20EasyEat&amp;severity=critical&amp;id=6943b03a4eb3efac366ff238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53432-improper-control-of-filename-for-in-e3632a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Echo&amp;severity=high&amp;id=6943b03a4eb3efac366ff235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53431-improper-control-of-filename-for-in-c67f9230</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53431%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Emberlyn&amp;severity=high&amp;id=6943b03a4eb3efac366ff232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53430-improper-control-of-filename-for-in-4679fc9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53430%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Etta&amp;severity=high&amp;id=6943b0394eb3efac366ff21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53429-improper-control-of-filename-for-in-da038cf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Exit%20Game&amp;severity=high&amp;id=6943b0394eb3efac366ff217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52768-improper-control-of-filename-for-in-9be21078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52768%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Faith%20%26%20Hope&amp;severity=high&amp;id=6943b0394eb3efac366ff214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52745-improper-control-of-filename-for-in-3c36c44a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52745%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Farm%20Agrico&amp;severity=high&amp;id=6943b0394eb3efac366ff211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49943-improper-control-of-filename-for-in-66b22dac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49943%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Femme&amp;severity=high&amp;id=6943b0394eb3efac366ff20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49942-improper-control-of-filename-for-in-db48eb4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49942%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gardis&amp;severity=high&amp;id=6943b0394eb3efac366ff20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49941-improper-control-of-filename-for-in-62a5ffa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49941%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20GlamChic&amp;severity=high&amp;id=6943b0394eb3efac366ff208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49919-insertion-of-sensitive-information--16c712b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49919%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20DigitalME%20eRoom&amp;severity=medium&amp;id=6943b0394eb3efac366ff205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49918-insertion-of-sensitive-information--da68a59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49918%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=medium&amp;id=6943b0394eb3efac366ff202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49914-exposure-of-sensitive-system-inform-491b1455</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49914%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=medium&amp;id=6943b0394eb3efac366ff1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49902-missing-authorization-in-a-wp-life--741e5c92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49902%3A%20Missing%20Authorization%20in%20A%20WP%20Life%20Login%20Page%20Customizer%20%26%238211%3B%20Customizer%20Login%20Page%2C%20Admin%20Page%2C%20Custom%20Design&amp;severity=medium&amp;id=6943b0374eb3efac366ff1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49379-incorrect-privilege-assignment-in-s-f3bde4bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49379%3A%20Incorrect%20Privilege%20Assignment%20in%20silverplugins217%20Custom%20Fields%20Account%20Registration%20For%20Woocommerce&amp;severity=high&amp;id=6943b0374eb3efac366ff1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49371-improper-control-of-filename-for-in-7fadea29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49371%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Strux&amp;severity=high&amp;id=6943b0374eb3efac366ff1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49370-improper-control-of-filename-for-in-8db2ddee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49370%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Lymcoin&amp;severity=high&amp;id=6943b0374eb3efac366ff1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49369-improper-control-of-filename-for-in-503a2486</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49369%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Lettuce&amp;severity=high&amp;id=6943b0374eb3efac366ff1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49368-improper-control-of-filename-for-in-86eadbe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49368%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Palladio&amp;severity=high&amp;id=6943b0374eb3efac366ff1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49367-improper-control-of-filename-for-in-5385a03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49367%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Monyxi&amp;severity=high&amp;id=6943b0374eb3efac366ff1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49366-improper-control-of-filename-for-in-bf62c6f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49366%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Hanani&amp;severity=high&amp;id=6943b0374eb3efac366ff1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49365-improper-control-of-filename-for-in-040f2626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49365%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Jack%20Well&amp;severity=high&amp;id=6943b0374eb3efac366ff1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49364-improper-control-of-filename-for-in-f1c2024f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Ludos%20Paradise&amp;severity=high&amp;id=6943b0374eb3efac366ff1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49363-improper-control-of-filename-for-in-67fd9c40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Kings%20%26%20Queens&amp;severity=high&amp;id=6943b0354eb3efac366fee44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49362-improper-control-of-filename-for-in-61b15c7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Gracioza&amp;severity=high&amp;id=6943b0354eb3efac366fee41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49361-improper-control-of-filename-for-in-dd85cf09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49361%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Mamita&amp;severity=high&amp;id=6943b0354eb3efac366fee3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49360-improper-control-of-filename-for-in-e1ac84ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20Militarology&amp;severity=high&amp;id=6943b0354eb3efac366fee3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49359-improper-control-of-filename-for-in-b4e01207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20ShieldGroup&amp;severity=high&amp;id=6943b0354eb3efac366fee38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49041-missing-authorization-in-the-africa-bbe2ce0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49041%3A%20Missing%20Authorization%20in%20The%20African%20Boss%20Get%20Cash&amp;severity=medium&amp;id=6943b0354eb3efac366fee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14314-improper-neutralization-of-special--04230435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14314%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Roxnor%20PopupKit&amp;severity=high&amp;id=6943b0354eb3efac366fee32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10019-authorization-bypass-through-user-c-a2a1c206</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10019%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=6943b0354eb3efac366fee20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13498-cwe-862-missing-authorization-in-co-67ba6149</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13498%3A%20CWE-862%20Missing%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=6943b0354eb3efac366fee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12976-cwe-79-improper-neutralization-of-i-92338fbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=6943b0354eb3efac366fee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploiting-zero-day-in-cisco--a6ad105e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploiting%20Zero-Day%20in%20Cisco%20Security%20Gear&amp;severity=critical&amp;id=6943ac954eb3efac366e6b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68459-improper-neutralization-of-special--4b835e83</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68459%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20AP180-PE%20V3.xx&amp;severity=high&amp;id=694399e758cc240f07af7a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47387-cwe-822-untrusted-pointer-dereferen-965c2dc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47387%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963a58cc240f07ac2f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47382-cwe-863-incorrect-authorization-in--722d39f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47382%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47372-cwe-120-buffer-copy-without-checkin-1257e58a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47372%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=6943963858cc240f07ac2f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47350-cwe-416-use-after-free-in-qualcomm--ec7a2b22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47350%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47325-cwe-822-untrusted-pointer-dereferen-70eeda71</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47325%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6943963858cc240f07ac2f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47323-cwe-190-integer-overflow-or-wraparo-3b822062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47323%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47322-cwe-416-use-after-free-in-qualcomm--e6ada09c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47322%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47321-cwe-120-buffer-copy-without-checkin-32100740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47321%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47320-cwe-787-out-of-bounds-write-in-qual-e40aee57</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47320%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47319-cwe-497-exposure-of-sensitive-syste-59bdb4c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47319%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6943963858cc240f07ac2f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27063-cwe-416-use-after-free-in-qualcomm--3e9f347f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27063%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=6943963858cc240f07ac2f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68462-cwe-732-incorrect-permission-assign-19f4d074</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68462%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Debian%20FreedomBox&amp;severity=low&amp;id=694392b458cc240f07a98528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-asus-live-update-flaw-after-ev-7604611d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20ASUS%20Live%20Update%20Flaw%20After%20Evidence%20of%20Active%20Exploitation&amp;severity=critical&amp;id=69439e2358cc240f07b4a6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68461-cwe-79-improper-neutralization-of-i-1c741b3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Webmail&amp;severity=high&amp;id=69438dec4dbf28c5ead2005c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68460-cwe-116-improper-encoding-or-escapi-b07cfa5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68460%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Roundcube%20Webmail&amp;severity=high&amp;id=69438a6a4dbf28c5eacdbe29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-active-attacks-exploiting-unpatched-61fa3aaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20Active%20Attacks%20Exploiting%20Unpatched%200-Day%20in%20AsyncOS%20Email%20Security%20Appliances&amp;severity=medium&amp;id=69438be94dbf28c5eacfb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12885-cwe-79-improper-neutralization-of-i-20218e28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awsmin%20Embed%20Any%20Document%20%E2%80%93%20Embed%20PDF%2C%20Word%2C%20PowerPoint%20and%20Excel%20Files&amp;severity=medium&amp;id=69437e144dbf28c5eab53ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14856-code-injection-in-yproject-ruoyi-86a8b163</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14856%3A%20Code%20Injection%20in%20y_project%20RuoYi&amp;severity=medium&amp;id=69435e96f4a1ba78f2daa41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-arrests-22-year-old-after-hack-of-interior--86218121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%20Arrests%2022%20Year%20Old%20After%20Hack%20of%20Interior%20Ministry%20Systems&amp;severity=medium&amp;id=69434cfdf4a1ba78f2c11aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14841-null-pointer-dereference-in-offis-d-074f920e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14841%3A%20NULL%20Pointer%20Dereference%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=69434d1ff4a1ba78f2c14a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-4-nick-smart-and-andrii-so-0577ad05</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%204%20-%20Nick%20Smart%20and%20Andrii%20Sovershennyi&amp;severity=medium&amp;id=69457da2133fda1465c8178d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-18-0edeec95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-18&amp;severity=medium&amp;id=6944981c4eb3efac36b4fea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63950-na-bd510531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63950%3A%20n%2Fa&amp;severity=high&amp;id=694471834eb3efac36abad2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63948-na-788e7230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63948%3A%20n%2Fa&amp;severity=medium&amp;id=69446a7c4eb3efac36a96186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63947-na-ecfddcfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63947%3A%20n%2Fa&amp;severity=medium&amp;id=69446a7c4eb3efac36a96182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63951-na-76406042</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63951%3A%20n%2Fa&amp;severity=high&amp;id=694466f94eb3efac36a822cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63949-na-53dc807c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63949%3A%20n%2Fa&amp;severity=medium&amp;id=694466f94eb3efac36a822c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67163-na-13618c01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67163%3A%20n%2Fa&amp;severity=medium&amp;id=694463734eb3efac36a5c4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65566-na-69b4dde7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65566%3A%20n%2Fa&amp;severity=high&amp;id=694455994eb3efac36a31642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65565-na-5771b4f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65565%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65564-na-69bb4fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65564%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65563-na-047b5841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65563%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65562-na-b5533be2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65562%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65568-na-160c9cb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65568%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65567-na-87bbdd63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65567%3A%20n%2Fa&amp;severity=high&amp;id=694451e44eb3efac36a23a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65561-na-56a55538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65561%3A%20n%2Fa&amp;severity=high&amp;id=69444e5e4eb3efac36a13dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65559-na-4be14d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65559%3A%20n%2Fa&amp;severity=high&amp;id=69444e5e4eb3efac36a13dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63387-na-56c624b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63387%3A%20n%2Fa&amp;severity=high&amp;id=69444aef4eb3efac36a086c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56157-na-16b6ceb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56157%3A%20n%2Fa&amp;severity=critical&amp;id=69444aef4eb3efac36a086bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63386-na-29524515</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63386%3A%20n%2Fa&amp;severity=critical&amp;id=694427b04eb3efac36978401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63390-na-262242df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63390%3A%20n%2Fa&amp;severity=medium&amp;id=6944242d4eb3efac36964743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63388-na-d8cfafee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63388%3A%20n%2Fa&amp;severity=critical&amp;id=694420bc4eb3efac36956eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63391-na-cfa36b98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63391%3A%20n%2Fa&amp;severity=high&amp;id=69441d2a4eb3efac369420a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63389-na-64dbd776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63389%3A%20n%2Fa&amp;severity=critical&amp;id=69441d2a4eb3efac369420a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63757-na-a459094a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63757%3A%20n%2Fa&amp;severity=high&amp;id=694416204eb3efac368e65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14837-code-injection-in-zzcms-89492e18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14837%3A%20Code%20Injection%20in%20ZZCMS&amp;severity=medium&amp;id=69433ef3f4a1ba78f2b59656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68435-cwe-305-authentication-bypass-by-pr-6cbd93fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68435%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20nicotsx%20zerobyte&amp;severity=critical&amp;id=69433981058703ef3fd47411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14836-cleartext-storage-in-a-file-or-on-d-fc9a3d86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14836%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20ZZCMS&amp;severity=medium&amp;id=69433981058703ef3fd4741d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14834-sql-injection-in-code-projects-simp-8b1d8255</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14834%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Stock%20System&amp;severity=medium&amp;id=69433981058703ef3fd47416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68433-cwe-77-improper-neutralization-of-s-bd9efb5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68433%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=69433603058703ef3fd02122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53917-improper-neutralization-of-special--77f28945</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20powerstonegh%20Affiliate%20Me&amp;severity=high&amp;id=69433601058703ef3fd020bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68432-cwe-77-improper-neutralization-of-s-7c4486fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68432%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zed-industries%20zed&amp;severity=high&amp;id=69433603058703ef3fd0211d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53933-unrestricted-upload-of-file-with-da-ff8ad256</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53933%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20s9y%20Serendipity&amp;severity=high&amp;id=69433603058703ef3fd02117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53932-improper-neutralization-of-input-du-28b84f9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20s9y%20Serendipity&amp;severity=medium&amp;id=69433603058703ef3fd02112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53928-improper-neutralization-of-input-du-f27244da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Php-fusion%20PHPFusion&amp;severity=medium&amp;id=69433603058703ef3fd0210d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53927-improper-neutralization-of-input-du-0ab51043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHPJabbers%20Simple%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53926-improper-neutralization-of-special--e45b6b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53926%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPJabbers%20Simple%20CMS&amp;severity=high&amp;id=69433601058703ef3fd020c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53921-unrestricted-upload-of-file-with-da-ecfc0aaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53921%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sitemagic%20SitemagicCMS&amp;severity=high&amp;id=69433601058703ef3fd020c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53912-unquoted-search-path-or-element-in--f54ffd1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53912%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20BiniSoft%20USB%20Flash%20Drives%20Control&amp;severity=high&amp;id=69433601058703ef3fd020b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53911-improper-neutralization-of-input-du-d82893ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tmrswrr%20Textpattern%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53910-improper-neutralization-of-input-du-e65c9d38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbce-cms%20WBCE%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53909-improper-neutralization-of-input-du-75493285</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbce-cms%20WBCE%20CMS&amp;severity=medium&amp;id=69433601058703ef3fd020a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53908-improper-privilege-management-in-be-f53944b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53908%3A%20Improper%20Privilege%20Management%20in%20Belden%20HiSecOS&amp;severity=high&amp;id=69433601058703ef3fd020a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53907-improper-limitation-of-a-pathname-t-6ee61da8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53907%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Bludit%20Backup%20Plugin&amp;severity=high&amp;id=69433601058703ef3fd0209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66029-cwe-522-insufficiently-protected-cr-b9fc3983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66029%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20OSC%20ondemand&amp;severity=high&amp;id=6943327a058703ef3fcb5ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14833-sql-injection-in-code-projects-onli-35555b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14833%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6943327a058703ef3fcb5ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68429-cwe-200-exposure-of-sensitive-infor-5d66d7b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68429%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20storybookjs%20storybook&amp;severity=high&amp;id=6943327a058703ef3fcb5caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-confirms-what-we-suspected-every-llm--528c867c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20research%20confirms%20what%20we%20suspected%3A%20every%20LLM%20tested%20can%20be%20exploited&amp;severity=medium&amp;id=69432f0b058703ef3fc98973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68145-cwe-22-improper-limitation-of-a-pat-bc581cde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68145%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68144-cwe-88-improper-neutralization-of-a-2aa85bd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68144%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68143-cwe-22-improper-limitation-of-a-pat-9cdc3058</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68143%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=medium&amp;id=69432efa058703ef3fc97f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68129-cwe-863-incorrect-authorization-in--be75163a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68129%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20auth0-PHP&amp;severity=medium&amp;id=69432b79058703ef3fc51862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14832-sql-injection-in-itsourcecode-onlin-9f6ed03c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14832%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=69432b79058703ef3fc5185b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68275-cwe-79-improper-neutralization-of-i-e859cc68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68275%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69432992fab815a9fc299edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68401-cwe-79-improper-neutralization-of-i-934dcf70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68401%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=69432992fab815a9fc299ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68400-cwe-89-improper-neutralization-of-s-e8f3a7a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68400%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc251847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68399-cwe-79-improper-neutralization-of-i-7b48662c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68399%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=low&amp;id=6943260ffab815a9fc251853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68112-cwe-89-improper-neutralization-of-s-533a5f5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68112%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc251850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68111-cwe-89-improper-neutralization-of-s-ecf0e2bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68111%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6943260ffab815a9fc25184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68110-cwe-200-exposure-of-sensitive-infor-dac7d6cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68110%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943260ffab815a9fc25184a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68109-cwe-78-improper-neutralization-of-s-8c67d683</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68109%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=6943229bfab815a9fc1fb3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67877-cwe-89-improper-neutralization-of-s-9b7049b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67877%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6943229bfab815a9fc1fb3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-defeating-nodejs-malware-with-api-trac-5816058f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%3A%20Defeating%20Node.js%20Malware%20with%20API%20Tracing&amp;severity=medium&amp;id=69433981058703ef3fd47271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nuget-malware-targets-crypto-wallets-oauth-tokens-0d0b398e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NuGet%20malware%20targets%20crypto%20wallets%2C%20OAuth%20tokens&amp;severity=medium&amp;id=69433981058703ef3fd4727f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-botnet-hijacks-18-million-android-tvs-laun-ddb21d6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Botnet%20Hijacks%201.8%20Million%20Android%20TVs%2C%20Launches%20Large-Scale%20DDoS%20Attacks&amp;severity=high&amp;id=69432285fab815a9fc1faebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-fixes-actively-exploited-cve-2025-40602--cb24fce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Fixes%20Actively%20Exploited%20CVE-2025-40602%20in%20SMA%20100%20Appliances&amp;severity=high&amp;id=69431f01fab815a9fc1ddbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-unpatched-asyncos-zero-day-exploite-0ffcf769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20unpatched%20AsyncOS%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=69431f01fab815a9fc1ddbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67876-cwe-79-improper-neutralization-of-i-625b81b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=69431f35fab815a9fc1ded24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67875-cwe-79-improper-neutralization-of-i-0de84221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=69431f35fab815a9fc1ded21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68114-cwe-124-buffer-underwrite-buffer-un-421cf5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68114%3A%20CWE-124%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20capstone-engine%20capstone&amp;severity=medium&amp;id=69431f35fab815a9fc1ded27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67873-cwe-122-heap-based-buffer-overflow--18ff7f1b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67873%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20capstone-engine%20capstone&amp;severity=medium&amp;id=69431f35fab815a9fc1ded1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67493-cwe-20-improper-input-validation-in-56691d24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67493%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=69432d1e058703ef3fc81e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43514-an-app-may-be-able-to-access-protec-afae3e0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43514%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431980c9138a40d2f661ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46281-an-app-may-be-able-to-break-out-of--f3b7b019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46281%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69431982c9138a40d2f6625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46278-an-app-may-be-able-to-access-protec-e6c0ac50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46278%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f6624d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46279-an-app-may-be-able-to-identify-what-6a7e3d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46279%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69431982c9138a40d2f66251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43535-processing-maliciously-crafted-web--1d399922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43535%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46291-an-app-may-bypass-gatekeeper-checks-7e2cb154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46291%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f6626b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43533-a-malicious-hid-device-may-cause-an-50931694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43533%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431980c9138a40d2f661c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43529-processing-maliciously-crafted-web--ded99654</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43529%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2026.%20CVE-2025-14174%20was%20also%20issued%20in%20response%20to%20this%20report.%20in%20Apple%20Safari&amp;severity=high&amp;id=69431980c9138a40d2f661b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43475-an-app-may-be-able-to-access-user-s-890d6416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43475%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431980c9138a40d2f661a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43526-on-a-mac-with-lockdown-mode-enabled-2ee671ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43526%3A%20On%20a%20Mac%20with%20Lockdown%20Mode%20enabled%2C%20web%20content%20opened%20via%20a%20file%20URL%20may%20be%20able%20to%20use%20Web%20APIs%20that%20should%20be%20restricted%20in%20Apple%20Safari&amp;severity=critical&amp;id=69431980c9138a40d2f661af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46288-an-app-may-be-able-to-access-sensit-efb6bcf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46288%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20payment%20tokens%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f66264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43531-processing-maliciously-crafted-web--10ac1aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43531%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=low&amp;id=69431980c9138a40d2f661bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55254-cwe-601-url-redirection-to-untruste-ad8c3d9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55254%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=low&amp;id=69431987c9138a40d2f6643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46292-an-app-may-be-able-to-access-user-s-d9561db9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46292%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f6626f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43536-processing-maliciously-crafted-web--be8b4b7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43536%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43428-photos-in-the-hidden-photos-album-m-8cbc28f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43428%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69431980c9138a40d2f6619d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46283-an-app-may-be-able-to-access-sensit-9a414a86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46283%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69431982c9138a40d2f66261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43541-processing-maliciously-crafted-web--be5d1ce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43541%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431982c9138a40d2f66241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43501-processing-maliciously-crafted-web--e94ec6d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43501%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431980c9138a40d2f661a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46282-an-app-may-be-able-to-access-sensit-8b20591e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46282%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20Safari&amp;severity=medium&amp;id=69431982c9138a40d2f6625d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46277-an-app-may-be-able-to-access-a-user-a69d4439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46277%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user%E2%80%99s%20Safari%20history%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69431982c9138a40d2f66248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59849-cwe-1021-improper-restriction-of-re-43370891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59849%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=medium&amp;id=694315f3c9138a40d2f24a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53000-cwe-427-uncontrolled-search-path-el-0ad4c221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53000%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20jupyter%20nbconvert&amp;severity=high&amp;id=694315f3c9138a40d2f24a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66647-cwe-120-buffer-copy-without-checkin-ab17f2b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66647%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RIOT-OS%20RIOT&amp;severity=low&amp;id=6943126ec9138a40d2ed3260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14764-cwe-327-use-of-a-broken-or-risky-cr-14eab340</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14764%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20Go&amp;severity=medium&amp;id=6943126ec9138a40d2ed325d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14763-cwe-327-use-of-a-broken-or-risky-cr-ffeb3020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14763%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20Java&amp;severity=medium&amp;id=6943126ec9138a40d2ed325a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14762-cwe-327-use-of-a-broken-or-risky-cr-287a2707</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14762%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20Ruby&amp;severity=medium&amp;id=6943126ec9138a40d2ed3257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14761-cwe-327-use-of-a-broken-or-risky-cr-1c1e0bbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14761%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20PHP&amp;severity=medium&amp;id=6943126ec9138a40d2ed3254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14760-cwe-327-use-of-a-broken-or-risky-cr-33ee7551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14760%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20AWS%20SDK%20for%20C%2B%2B&amp;severity=medium&amp;id=69430eeac9138a40d2eb2e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14759-cwe-327-use-of-a-broken-or-risky-cr-f701ab62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14759%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AWS%20S3%20Encryption%20Client%20for%20.NET&amp;severity=medium&amp;id=69430eeac9138a40d2eb2e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluedeltas-persistent-campaign-against-ukrnet-bb35bec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueDelta%E2%80%99s%20Persistent%20Campaign%20Against%20UKR.NET&amp;severity=medium&amp;id=69433981058703ef3fd4738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-9686-actively-targets-cisco-secure-email-gatew-6ecdf845</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-9686%20actively%20targets%20Cisco%20Secure%20Email%20Gateway%20and%20Secure%20Email%20and%20Web%20Manager&amp;severity=medium&amp;id=69433981058703ef3fd473c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34438-cwe-639-authorization-bypass-throug-a7b67404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34438%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=69430b71c9138a40d2e72f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34437-cwe-639-authorization-bypass-throug-9c60e9ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34437%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34435-cwe-639-authorization-bypass-throug-430ab558</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34435%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34436-cwe-639-authorization-bypass-throug-1949ebbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34436%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=high&amp;id=69430b71c9138a40d2e72f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34434-cwe-306-missing-authentication-for--c3cb7a3b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34434%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=critical&amp;id=69430b71c9138a40d2e72f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34439-cwe-601-url-redirection-to-untruste-d54b1aaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34439%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34440-cwe-601-url-redirection-to-untruste-9c00d425</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34440%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34442-cwe-497-exposure-of-sensitive-syste-f89422c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34442%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34441-cwe-359-exposure-of-private-persona-75140e38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34441%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20World%20Wide%20Broadcast%20Network%20AVideo&amp;severity=medium&amp;id=694309ba0b6f32e62bf653d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-could-take-control-of-car-dashboard-by-hac-7c0ab88c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Could%20Take%20Control%20of%20Car%20Dashboard%20by%20Hacking%20Its%20Modem&amp;severity=high&amp;id=6943098c0b6f32e62bf64877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-of-new-sma1000-zero-day-exploited--feac9fe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sonicwall%20warns%20of%20new%20SMA1000%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=6943098c0b6f32e62bf64866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66646-cwe-476-null-pointer-dereference-in-73c988e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66646%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20RIOT-OS%20RIOT&amp;severity=low&amp;id=6943060a0b6f32e62bf23024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66397-cwe-284-improper-access-control-in--0f8cb49e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66397%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66396-cwe-89-improper-neutralization-of-s-7c40182b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66396%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66395-cwe-89-improper-neutralization-of-s-ef22abc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66395%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=694302860b6f32e62bed0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62521-cwe-94-improper-control-of-generati-99532462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62521%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=critical&amp;id=694302860b6f32e62bed0ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-posthog-how-ssrf-a-clickhouse-sql-escaping--63450a5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20PostHog%3A%20How%20SSRF%2C%20a%20ClickHouse%20SQL%20Escaping%200day%2C%20and%20Default%20PostgreSQL%20Credentials%20Formed%20an%20RCE%20Chain%20(ZDI-25-099%2C%20ZDI-25-097%2C%20ZDI-25-096)&amp;severity=medium&amp;id=6942ff090b6f32e62beb38c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14081-cwe-863-incorrect-authorization-in--df9dfbc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14081%3A%20CWE-863%20Incorrect%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6942f8e8847f7e98df04b54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13537-cwe-79-improper-neutralization-of-i-3cd560a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livecomposer%20Live%20Composer%20%E2%80%93%20Free%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=6942f8e8847f7e98df04b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13217-cwe-79-improper-neutralization-of-i-ec65218d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=6942f8e7847f7e98df04b541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-fixes-actively-exploited-cve-2025-40602--0c4c7b57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Fixes%20Actively%20Exploited%20CVE-2025-40602%20in%20SMA%20100%20Appliances&amp;severity=high&amp;id=69433af3058703ef3fd57b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/14-malicious-nuget-packages-found-stealing-crypto--c88979cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=14%20Malicious%20NuGet%20Packages%20Found%20Stealing%20Crypto%20Wallets%20and%20Ad%20Data&amp;severity=medium&amp;id=6942f55f847f7e98df00b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimwolf-botnet-hijacks-18-million-android-tvs-laun-f8bcd5cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimwolf%20Botnet%20Hijacks%201.8%20Million%20Android%20TVs%2C%20Launches%20Large-Scale%20DDoS%20Attacks&amp;severity=medium&amp;id=69433af3058703ef3fd57b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maybe-a-little-bit-more-interesting-react2shell-ex-8f7e1deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maybe%20a%20Little%20Bit%20More%20Interesting%20React2Shell%20Exploit%2C%20(Wed%2C%20Dec%2017th)&amp;severity=medium&amp;id=6942e5571c1ff0913684af70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20393-improper-input-validation-in-cisco--c638b419</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20393%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Secure%20Email&amp;severity=critical&amp;id=6942e1e21c1ff091367fecea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russias-quiet-pivot-how-misconfigured-network-devi-6dbe5073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%E2%80%99s%20Quiet%20Pivot%3A%20How%20Misconfigured%20Network%20Devices%20Became%20the%20New%20Front%20Line%20in%20Critical%20Infrastructure%20Cyber%20Risk%20-%20hack3d.news&amp;severity=critical&amp;id=6942d8b4b2cbfb3efaad1eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26381-cwe-425-direct-request-forced-brows-298e491e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26381%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Johnson%20Controls%20OpenBlue%20Workplace%20(formerly%20FM%20Systems)&amp;severity=medium&amp;id=6942d8c9b2cbfb3efaad4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43873-cwe-78-improper-neutralization-of-s-9a500d1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43873%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Control%20iSTAR%20Ultra%2C%20iSTAR%20Ultra%20SE%2C%20iSTAR%20Ultra%20G2%2C%20iSTAR%20Ultra%20G2%20SE%2C%20iSTAR%20Edge%20G2&amp;severity=high&amp;id=6942d536b2cbfb3efaa86de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14727-cwe-22-improper-limitation-of-a-pat-b3541a68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14727%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20NGINX%20Ingress%20Controller&amp;severity=high&amp;id=6942d1adb2cbfb3efaa33d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-targets-ukrainian-ukr-net-users-in-long-runn-09216ce3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Targets%20Ukrainian%20UKR-net%20Users%20in%20Long-Running%20Credential%20Phishing%20Campaign&amp;severity=medium&amp;id=6942d853b2cbfb3efaac9c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44005-cwe-287-improper-authentication-in--a1fcdb6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44005%3A%20CWE-287%3A%20Improper%20Authentication%20in%20smallstep%20Step-CA&amp;severity=critical&amp;id=6942ce29b2cbfb3efaa16b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clickfix-attack-uses-fake-browser-fix-to-insta-7aa340eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ClickFix%20Attack%20Uses%20Fake%20Browser%20Fix%20to%20Install%20DarkGate%20Malware%20on%20Your%20Device&amp;severity=medium&amp;id=6942c8c3f1f5b73852a8e1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-forumtroll-phishing-attacks-target-russian-sch-abdd1962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ForumTroll%20Phishing%20Attacks%20Target%20Russian%20Scholars%20Using%20Fake%20eLibrary%20Emails&amp;severity=medium&amp;id=6942d853b2cbfb3efaac9c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parked-domains-become-weapons-with-direct-search-a-6bc2d55d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Parked%20Domains%20Become%20Weapons%20with%20Direct%20Search%20Advertising&amp;severity=medium&amp;id=69433981058703ef3fd473ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-linear-to-complex-an-upgrade-in-ransomhouse-e-073aacd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Linear%20to%20Complex%3A%20An%20Upgrade%20in%20RansomHouse%20Encryption&amp;severity=medium&amp;id=69432ef1058703ef3fc97a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gachiloader-defeating-nodejs-malware-with-api-trac-ac2d957f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GachiLoader%3A%20Defeating%20Node.js%20Malware%20with%20API%20Tracing&amp;severity=medium&amp;id=6942bac1f1f5b73852995944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nmfta-warns-of-surge-and-sophistication-of-cyber-e-44536358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NMFTA%20Warns%20of%20Surge%20and%20Sophistication%20of%20Cyber-Enabled%20Cargo%20Theft&amp;severity=medium&amp;id=6942b5654a800b14e7fca561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14266-cwe-352-cross-site-request-forgery--db410f69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14266%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ercom%20Cryptobox&amp;severity=low&amp;id=6942b5b04a800b14e7fcbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deliberate-internet-shutdowns-schneier-on-security-96bde887</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deliberate%20Internet%20Shutdowns%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6942b58d4a800b14e7fcb5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/askul-data-breach-exposed-over-700000-records-afte-edbc1b49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Askul%20data%20breach%20exposed%20over%20700%2C000%20records%20after%20ransomware%20attack&amp;severity=high&amp;id=6942b58d4a800b14e7fcb5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-campaign-by-the-forumtroll-apt-group-e016dc15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20campaign%20by%20the%20ForumTroll%20APT%20group&amp;severity=medium&amp;id=69432b79058703ef3fc51713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-150-cellik-rat-grants-android-control-trojaniz-8f91973d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%24150%20Cellik%20RAT%20Grants%20Android%20Control%2C%20Trojanizes%20Google%20Play%20Apps&amp;severity=medium&amp;id=6942a8fbd5dc0d5a04f881ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61736-cwe-298-improper-validation-of-cert-8c275ac9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61736%3A%20CWE-298-Improper%20Validation%20of%20certificate%20expiration%20in%20Johnson%20Controls%20iSTAReX%2C%20iSTAR%20Edge%2C%20iSTAR%20Ultra%20LT%2C%20iSTAR%20Ultra%20%2C%20iSTAR%20Ultra%20SE&amp;severity=high&amp;id=6942a932d5dc0d5a04f89566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14097-cwe-287-improper-authentication-in--97f20f54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14097%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=high&amp;id=6942a932d5dc0d5a04f89563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14096-cwe-798-use-of-hard-coded-credentia-97a254f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14096%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=high&amp;id=6942a591d5dc0d5a04f3ed84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-claim-stealing-94gb-of-pornhub-premium-use-d7adf0bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Claim%20Stealing%2094GB%20of%20Pornhub%20Premium%20User%20Watch%20Histories&amp;severity=medium&amp;id=6942a209d5dc0d5a04edbc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67895-cwe-669-incorrect-resource-transfer-8e97ed9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67895%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Edge3&amp;severity=critical&amp;id=6942998e034dcf4950468cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14095-cwe-284-improper-access-control-in--9c122bac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14095%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Radiometer%20Medical%20Aps%20ABL90%20FLEX%20and%20ABL90%20FLEX%20PLUS%20Analyzers&amp;severity=medium&amp;id=6942998e034dcf4950468ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-a-flaw-in-multiple-fortinet-products--43ca79cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20a%20flaw%20in%20multiple%20Fortinet%20products%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=69429960034dcf4950467d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-ink-dragon-group-hides-in-european-governm-d10be6f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Ink%20Dragon%20Group%20Hides%20in%20European%20Government%20Networks&amp;severity=high&amp;id=69429960034dcf4950467d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-ink-dragon-hacks-governments-using-sh-11eaecee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Ink%20Dragon%20Hacks%20Governments%20Using%20ShadowPad%20and%20FINALDRAFT%20Malware&amp;severity=medium&amp;id=6942a888d5dc0d5a04f7d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forumtroll-targets-political-scientists-kaspersky--b1f95c92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ForumTroll%20targets%20political%20scientists%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69428ec8034dcf49503b045e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostposter-firefox-extensions-hide-malware-in-ico-e0151e7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostPoster%20Firefox%20Extensions%20Hide%20Malware%20in%20Icons&amp;severity=medium&amp;id=6942890c76794366d0b4baa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14101-cwe-639-authorization-bypass-throug-28919e82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14101%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GG%20Soft%20Software%20Services%20Inc.%20PaperWork&amp;severity=high&amp;id=694278ef2a34f2e402b2a883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auto-parts-giant-lkq-confirms-oracle-ebs-breach-3240b6ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auto%20Parts%20Giant%20LKQ%20Confirms%20Oracle%20EBS%20Breach&amp;severity=medium&amp;id=6942755c2a34f2e402ada2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostposter-malware-found-in-17-firefox-add-ons-wi-d600a4bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostPoster%20Malware%20Found%20in%2017%20Firefox%20Add-ons%20with%2050%2C000%2B%20Downloads&amp;severity=medium&amp;id=6942894276794366d0b4e39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14347-cwe-79-improper-neutralization-of-i-50d26826</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20OBS%20(Student%20Affairs%20Information%20System)0&amp;severity=medium&amp;id=6942697da68039dadb6d7560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14399-cwe-352-cross-site-request-forgery--edd51fc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14399%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcodefactory%20Download%20Plugins%20and%20Themes%20in%20ZIP%20from%20Dashboard&amp;severity=medium&amp;id=6942697da68039dadb6d7568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12496-cwe-22-improper-limitation-of-a-pat-1777d542</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12496%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=6942697da68039dadb6d7563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11924-cwe-639-authorization-bypass-throug-69810fa6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11924%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=694254ebbd21432f8e5297b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13750-cwe-862-missing-authorization-in-ma-0ba43c10</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13750%3A%20CWE-862%20Missing%20Authorization%20in%20mateuszgbiorczyk%20Converter%20for%20Media%20%E2%80%93%20Optimize%20images%20%7C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=694254ebbd21432f8e5297bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14061-cwe-862-missing-authorization-in-wp-267a805a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14061%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Banner%2C%20Cookie%20Consent%2C%20Consent%20Log%2C%20Cookie%20Scanner%2C%20Script%20Blocker%20(for%20GDPR%2C%20CCPA%20%26%20ePrivacy)%20%3A%20WP%20Cookie%20Consent&amp;severity=medium&amp;id=694254ebbd21432f8e5297c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14817-cwe-269-improper-privilege-manageme-e299a65f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14817%3A%20CWE-862%20Missing%20Authorization%20in%20TECNO%20Tecno%20Pova6%20Pro%205G&amp;severity=medium&amp;id=69425167bd21432f8e4d5fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14154-cwe-79-improper-neutralization-of-i-9b862588</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14154%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%20for%20WordPress%2C%20BuddyPress%2C%20PeepSo%2C%20Ultimate%20Member%2C%20BuddyBoss&amp;severity=medium&amp;id=694241cd1f9b086b9ae6dd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14385-cwe-79-improper-neutralization-of-i-56c392d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=69423560364d4dab9cc00c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13880-cwe-862-missing-authorization-in-ad-8cc3f6de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13880%3A%20CWE-862%20Missing%20Authorization%20in%20adreastrian%20WP%20Social%20Ninja%20%E2%80%93%20Embed%20Social%20Feeds%2C%20User%20Reviews%20%26%20Chat%20Widgets&amp;severity=medium&amp;id=69423560364d4dab9cc00c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13861-cwe-79-improper-neutralization-of-i-eb021f23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linksoftware%20HTML%20Forms%20%E2%80%93%20Simple%20WordPress%20Forms%20Plugin&amp;severity=medium&amp;id=69423560364d4dab9cc00c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59374-cwe-506-embedded-malicious-code-in--b20044d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59374%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20ASUS%20live%20update&amp;severity=critical&amp;id=69423560364d4dab9cc00c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11775-cwe-125-out-of-bounds-read-in-asus--3d78c2b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11775%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=69423560364d4dab9cc00c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11901-cwe-284-improper-access-control-in--8373da85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11901%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20ASUS%20B460%20series&amp;severity=high&amp;id=69423560364d4dab9cc00c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64700-cross-site-request-forgery-csrf-in--e2bde16a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64700%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=694231dc364d4dab9cbab4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14305-cwe-863-incorrect-authorization-in--73e0d293</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14305%3A%20CWE-863%20Incorrect%20Authorization%20in%20Acer%20ListCheck.exe&amp;severity=high&amp;id=69422931473cb759e1edea2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14304-cwe-693-protection-mechanism-failur-0bffe3fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14304%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20ASRock%20Intel%20500%20chipset%20motherboard&amp;severity=high&amp;id=69422931473cb759e1edea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13977-cwe-79-improper-neutralization-of-i-66b837ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=69422931473cb759e1edea20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14303-cwe-693-protection-mechanism-failur-b62925ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14303%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20MSI%20Intel%20600%20chipset%20motherboard&amp;severity=high&amp;id=6942222a473cb759e1eb9cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14302-cwe-693-protection-mechanism-failur-5ba842ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14302%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20GIGABYTE%20intel%20600%20chipset%20Motherboard&amp;severity=high&amp;id=6942222a473cb759e1eb9cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blindeagle-targets-colombian-government-agency-wit-f335be46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlindEagle%20Targets%20Colombian%20Government%20Agency%20with%20Caminho%20and%20DCRAT&amp;severity=medium&amp;id=694295c3034dcf495041dbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14801-cross-site-scripting-in-xiweicheng--4de27927</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14801%3A%20Cross%20Site%20Scripting%20in%20xiweicheng%20TMS&amp;severity=medium&amp;id=69421096473cb759e1e64c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11369-cwe-862-missing-authorization-in-wp-49665f9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11369%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=69421096473cb759e1e64bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11009-cwe-312-cleartext-storage-of-sensit-3bc7992a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11009%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GT%20Designer3%20Version1%20(GOT2000)&amp;severity=medium&amp;id=6942060f473cb759e1e34e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trufflehog-now-detects-jwts-with-public-key-signat-bfa88e5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TruffleHog%20now%20detects%20JWTs%20with%20public-key%20signatures%20and%20verifies%20them%20for%20liveness&amp;severity=medium&amp;id=6941ff06473cb759e1d48eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53524-cwe-787-in-fuji-electric-monitouch--1218f3bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53524%3A%20CWE-787%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=6941f9b7d2cd6f6c37c00b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14700-cwe-1336-improper-neutralization-of-bf9964e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14700%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=critical&amp;id=6941f9b7d2cd6f6c37c0072f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14701-cwe-79-improper-neutralization-of-i-805e78d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14701%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=6941f9b7d2cd6f6c37c00b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-17-bdf56445</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-17&amp;severity=medium&amp;id=694345e7f4a1ba78f2b7cc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67794-na-5c197ce5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67794%3A%20n%2Fa&amp;severity=high&amp;id=6943260ffab815a9fc251844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-residentbat-a-new-spyware-family-used-by-bel-618fcae5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ResidentBat%3A%20A%20new%20spyware%20family%20used%20by%20Belarusian%20KGB&amp;severity=medium&amp;id=694325fbfab815a9fc24fb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67791-na-ba4cf99b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67791%3A%20n%2Fa&amp;severity=critical&amp;id=6943229bfab815a9fc1fb3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67790-na-d232425c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67790%3A%20n%2Fa&amp;severity=critical&amp;id=69431b97fab815a9fc199cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67793-na-39d42ae5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67793%3A%20n%2Fa&amp;severity=critical&amp;id=69431987c9138a40d2f66457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67792-na-81d0c909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67792%3A%20n%2Fa&amp;severity=high&amp;id=69431987c9138a40d2f66453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67789-na-09242368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67789%3A%20n%2Fa&amp;severity=medium&amp;id=694315f3c9138a40d2f24a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67787-na-a043d065</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67787%3A%20n%2Fa&amp;severity=critical&amp;id=69430eeac9138a40d2eb2e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67781-na-25540013</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67781%3A%20n%2Fa&amp;severity=critical&amp;id=69430eeac9138a40d2eb2e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65233-na-fbeecb8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65233%3A%20n%2Fa&amp;severity=medium&amp;id=694309ba0b6f32e62bf653df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67074-na-ad90f45c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67074%3A%20n%2Fa&amp;severity=medium&amp;id=6943060a0b6f32e62bf23030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67073-na-6e304afe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67073%3A%20n%2Fa&amp;severity=critical&amp;id=694302860b6f32e62bed0ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46062-na-466b53e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46062%3A%20n%2Fa&amp;severity=high&amp;id=6942ff050b6f32e62beb35ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67174-na-dccb63ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67174%3A%20n%2Fa&amp;severity=medium&amp;id=6942fb890b6f32e62be62d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66953-na-b7f870d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66953%3A%20n%2Fa&amp;severity=high&amp;id=6942fb890b6f32e62be62d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46060-na-2043728a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46060%3A%20n%2Fa&amp;severity=high&amp;id=6942fb890b6f32e62be62d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67171-na-ccf7bf28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67171%3A%20n%2Fa&amp;severity=high&amp;id=6942f8e8847f7e98df04b557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67168-na-3ed5abab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67168%3A%20n%2Fa&amp;severity=medium&amp;id=6942f8e8847f7e98df04b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67173-na-a8065ceb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67173%3A%20n%2Fa&amp;severity=medium&amp;id=6942f571847f7e98df00bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67170-na-653cb1ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67170%3A%20n%2Fa&amp;severity=medium&amp;id=6942f571847f7e98df00bfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53919-na-2f169e9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53919%3A%20n%2Fa&amp;severity=high&amp;id=6942ec89847f7e98dff8667b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53398-na-2d775721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53398%3A%20n%2Fa&amp;severity=high&amp;id=6942ec89847f7e98dff86677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67172-na-ecf46117</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67172%3A%20n%2Fa&amp;severity=high&amp;id=6942eae7847f7e98dff54f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65203-na-96907401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65203%3A%20n%2Fa&amp;severity=high&amp;id=6942eae7847f7e98dff54efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66924-na-a49f6c6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66924%3A%20n%2Fa&amp;severity=medium&amp;id=6942e8e71c1ff0913689279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66923-na-a73893e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66923%3A%20n%2Fa&amp;severity=high&amp;id=6942e8e71c1ff09136892798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67165-na-afd66dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67165%3A%20n%2Fa&amp;severity=critical&amp;id=6942e1e21c1ff091367fecf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67164-na-8aab4327</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67164%3A%20n%2Fa&amp;severity=critical&amp;id=6942e1e21c1ff091367feced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66921-na-42c238c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66921%3A%20n%2Fa&amp;severity=high&amp;id=6942e1e21c1ff091367fece6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67285-na-3e81af47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67285%3A%20n%2Fa&amp;severity=high&amp;id=6942d8c9b2cbfb3efaad419f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65855-na-2aa7fbb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65855%3A%20n%2Fa&amp;severity=medium&amp;id=6942d8c9b2cbfb3efaad419b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65185-na-d8c19bf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65185%3A%20n%2Fa&amp;severity=low&amp;id=6942d8c9b2cbfb3efaad4196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29371-na-a9b2daea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29371%3A%20n%2Fa&amp;severity=high&amp;id=6942d536b2cbfb3efaa86de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29370-na-766c87a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29370%3A%20n%2Fa&amp;severity=medium&amp;id=6942d1adb2cbfb3efaa33d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14766-out-of-bounds-read-and-write-in-goo-22c194bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14766%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=6941e6798258306a9da22878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14765-use-after-free-in-google-chrome-60af4a1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14765%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6941e6798258306a9da22874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soundcloud-hit-by-cyberattack-breach-affects-20-of-902e6d94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SoundCloud%20Hit%20by%20Cyberattack%2C%20Breach%20Affects%2020%25%20of%20its%20Users&amp;severity=high&amp;id=6941e2f38258306a9d9d1852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34288-cwe-732-incorrect-permission-assign-c4519e9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34288%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20Enterprises%20Nagios%20XI&amp;severity=high&amp;id=6941dbf98258306a9d96c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68274-cwe-476-null-pointer-dereference-in-080bd02e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68274%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20emiago%20sipgo&amp;severity=high&amp;id=6941da4bb8ff87d8f94579f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64520-cwe-862-missing-authorization-in-gl-9990351a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64520%3A%20CWE-862%3A%20Missing%20Authorization%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=6941d6c9b8ff87d8f9416195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14466-cwe-770-allocation-of-resources-wit-f0fec304</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14466%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20G%C3%BCralp%20Systems%20Fortimus%20Series&amp;severity=medium&amp;id=6941d344b8ff87d8f93c7337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13532-cwe-916-use-of-password-hash-with-i-c52cab23</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13532%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Fortra%20Core%20Privileged%20Access%20Manager%20(BoKS)&amp;severity=medium&amp;id=6941bc63535cdcbc0ad63cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-risk-in-virtualization-why-hypervisors--615dd39d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Risk%20in%20Virtualization%3A%20Why%20Hypervisors%20are%20a%20Ransomware%20Magnet&amp;severity=high&amp;id=6941b7290d5f6f4391b94106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-nuget-package-poses-as-tracerfody-steals-cry-d9a9ce0a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20NuGet%20Package%20Poses%20as%20Tracer.Fody%2C%20Steals%20Cryptocurrency%20Wallet%20Data&amp;severity=high&amp;id=6941b7290d5f6f4391b9410e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-iam-credentials-power-a-large-aws-cryp-c05e4887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20IAM%20Credentials%20Power%20a%20Large%20AWS%20Crypto%20Mining%20Campaign&amp;severity=high&amp;id=6941b7290d5f6f4391b94102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/texas-sues-tv-makers-for-taking-screenshots-of-wha-8bcbf088</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Texas%20sues%20TV%20makers%20for%20taking%20screenshots%20of%20what%20people%20watch&amp;severity=high&amp;id=6941b7290d5f6f4391b94112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8872-cwe-400-uncontrolled-resource-consum-0eeca28e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8872%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=6941b76a0d5f6f4391b96408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14553-cwe-200-exposure-of-sensitive-infor-d14cd0b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14553%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20Tapo%20App&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68270-cwe-862-missing-authorization-in-op-c7d17376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68270%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openedx%20edx-platform&amp;severity=critical&amp;id=6941ae5b0d5f6f4391b0c398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68156-cwe-770-allocation-of-resources-wit-2b56119d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68156%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20expr-lang%20expr&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68155-cwe-22-improper-limitation-of-a-pat-16ba5c53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68155%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite-plugin-react&amp;severity=high&amp;id=6941a4041a61eff6269a9351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68154-cwe-78-improper-neutralization-of-s-41f82666</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68154%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20sebhildebrandt%20systeminformation&amp;severity=high&amp;id=6941a4041a61eff6269a934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68150-cwe-918-server-side-request-forgery-f5f91259</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=6941a4041a61eff6269a9348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68146-cwe-367-time-of-check-time-of-use-t-d4005e0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68146%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20tox-dev%20filelock&amp;severity=medium&amp;id=6941a4041a61eff6269a9342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46296-an-authorization-bypass-vulnerabili-72992d35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46296%3A%20An%20authorization%20bypass%20vulnerability%20in%20FileMaker%20Server%20Admin%20Console%20allowed%20administrator%20roles%20with%20minimal%20privileges%20to%20access%20administrative%20features%20such%20as%20viewing%20license%20details%20and%20downloading%20application%20logs.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46295-apache-commons-text-versions-prior--b0b7aaed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46295%3A%20Apache%20Commons%20Text%20versions%20prior%20to%201.10.0%20included%20interpolation%20features%20that%20could%20be%20abused%20when%20applications%20passed%20untrusted%20input%20into%20the%20text-substitution%20API.%20Because%20some%20interpolators%20could%20trigger%20actions%20like%20executing%20commands%20or%20accessing%20external%20resources%2C%20an%20attacker%20could%20potentially%20achieve%20remote%20code%20execution.%20in%20Claris%20FileMaker%20Server&amp;severity=critical&amp;id=6941ae5b0d5f6f4391b0c3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46294-the-iis-shortname-vulnerability-exp-e89c4e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46294%3A%20The%20IIS%20Shortname%20Vulnerability%20exploits%20how%20Microsoft%20IIS%20handles%20legacy%208.3%20short%20filenames%2C%20allowing%20attackers%20to%20infer%20the%20existence%20of%20files%20or%20directories%20by%20crafting%20requests%20with%20the%20tilde%20(~)%20character.%20in%20Claris%20FileMaker%20Server&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68142-cwe-1333-inefficient-regular-expres-1cfe4711</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68142%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20facelessuser%20pymdown-extensions&amp;severity=low&amp;id=6941ae5c0d5f6f4391b0c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-open-source-to-openai-the-evolution-of-third--40358618</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Open%20Source%20to%20OpenAI%3A%20The%20Evolution%20of%20Third-Party%20Risk&amp;severity=medium&amp;id=6941a06f1a61eff626985458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-threat-intelligence-warns-russian-gru-hacke-369fb50c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Threat%20Intelligence%20Warns%20Russian%20GRU%20Hackers%20Now%20Favor%20Misconfigured%20Devices%20Over%20Vulnerabilities&amp;severity=medium&amp;id=6941a0851a61eff6269860f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwning-santa-before-the-bad-guys-do-a-hybrid-bug-b-65d57e1c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwning%20Santa%20before%20the%20bad%20guys%20do%3A%20A%20hybrid%20bug%20bounty%20%2F%20CTF%20for%20container%20isolation&amp;severity=medium&amp;id=69419d9a1a61eff62695ce95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33235-cwe-362-concurrent-execution-using--bae3f820</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33235%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Resiliency%20Extension&amp;severity=high&amp;id=69419b7d9050fe85080f3cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33225-cwe-61-unix-symbolic-link-symlink-f-eb6bc1d0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33225%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20NVIDIA%20Resiliency%20Extension&amp;severity=high&amp;id=69419b7d9050fe85080f3cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33210-cwe-502-deserialization-of-untruste-c0f2ea24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33210%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Isaac%20Lab&amp;severity=critical&amp;id=694197f79050fe85080b12af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33226-cwe-502-deserialization-of-untruste-9614cc99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33226%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=694197f79050fe85080b12b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33212-cwe-502-deserialization-of-untruste-121f7f0f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33212%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=694197f79050fe85080b12b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53896-missing-authentication-for-critical-e7811ddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53896%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20D-Link%20DAP-1325&amp;severity=high&amp;id=694194749050fe8508060875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53901-url-redirection-to-untrusted-site-o-216e992b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53901%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WBCE%20CMS&amp;severity=high&amp;id=69446e034eb3efac36aa8f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53899-server-side-request-forgery-ssrf-0486edd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53899%3A%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=69446e034eb3efac36aa8f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53894-weak-authentication-in-dulldusk-php-19de8a9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53894%3A%20Weak%20Authentication%20in%20Dulldusk%20phpfm&amp;severity=critical&amp;id=694194749050fe8508060882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geminijack-a-prompt-injection-challenge-demonstrat-d2bfdfdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeminiJack%3A%20A%20prompt-injection%20challenge%20demonstrating%20real-world%20LLM%20abuse&amp;severity=medium&amp;id=694190f09050fe85080407ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempting-cross-translation-unit-taint-analysis-f-05d871c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempting%20Cross%20Translation%20Unit%20Taint%20Analysis%20for%20Firefox%20with%20Clang%20Static%20Analyzer&amp;severity=high&amp;id=69418d819050fe8508ffd529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68116-cwe-79-improper-neutralization-of-i-f4cb6712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68116%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=high&amp;id=69418d769050fe8508ffb304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-iam-credentials-power-a-large-aws-cryp-c27ba8dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20IAM%20Credentials%20Power%20a%20Large%20AWS%20Crypto%20Mining%20Campaign&amp;severity=medium&amp;id=694209ae473cb759e1e46806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59935-cwe-79-improper-neutralization-of-i-51c11d03</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59935%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=69418d769050fe8508ffb301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-in-telegram-mini-apps-how-to-avoid-taking-712ebf7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20in%20Telegram%20Mini%20Apps%3A%20how%20to%20avoid%20taking%20the%20bait%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69418bb53e7fd18214c3d792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37164-vulnerability-in-hewlett-packard-en-2672bb21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37164%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20OneView&amp;severity=critical&amp;id=69418d769050fe8508ffb2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10450-cwe-359-exposure-of-private-persona-f18307df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10450%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=694188253e7fd18214bf80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rogue-nuget-package-poses-as-tracerfody-steals-cry-02754561</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rogue%20NuGet%20Package%20Poses%20as%20Tracer.Fody%2C%20Steals%20Cryptocurrency%20Wallet%20Data&amp;severity=medium&amp;id=694209ae473cb759e1e46809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68269-cwe-349-in-jetbrains-intellij-idea-b8f5905e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68269%3A%20CWE-349%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=69417c3609f61faec595078c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68268-cwe-79-in-jetbrains-teamcity-8fd63ffa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68268%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68267-cwe-272-in-jetbrains-teamcity-88645205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68267%3A%20CWE-272%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68166-cwe-79-in-jetbrains-teamcity-d30f76a3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68166%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68165-cwe-79-in-jetbrains-teamcity-e3e4b445</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68165%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=69417c3609f61faec5950780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68164-cwe-203-in-jetbrains-teamcity-6459069c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68164%3A%20CWE-203%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec595077d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68163-cwe-79-in-jetbrains-teamcity-d4e67bb7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68163%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec595077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68162-cwe-829-in-jetbrains-teamcity-129a0fe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68162%3A%20CWE-829%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=69417c3609f61faec5950777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14432-cwe-532-insertion-of-sensitive-info-fb159eae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14432%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HP%20Inc%20Poly%20G7500&amp;severity=high&amp;id=694178b209f61faec5907335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62329-cwe-613-insufficient-session-expira-21d57530</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62329%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20DevOps%20Deploy%20%2F%20Launch&amp;severity=medium&amp;id=694178b209f61faec5907338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ink-dragons-relay-network-and-stealthy-offensive-o-92ff5e3f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ink%20Dragon&apos;s%20Relay%20Network%20and%20Stealthy%20Offensive%20Operation&amp;severity=medium&amp;id=6941acaa0d5f6f4391ada9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-distributing-malicious-mobile-app-via-qr-c-f3dcf26a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Distributing%20Malicious%20Mobile%20App%20via%20QR%20Code&amp;severity=medium&amp;id=6941b0230d5f6f4391b1e56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urban-vpn-browser-extension-caught-harvesting-ai-c-8d006c0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urban%20VPN%20Browser%20Extension%20Caught%20Harvesting%20AI%20Chat%20Conversations%20from%20Millions%20of%20Users&amp;severity=high&amp;id=6941753609f61faec58b50f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700000-records-compromised-in-askul-ransomware-att-df249994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700%2C000%20Records%20Compromised%20in%20Askul%20Ransomware%20Attack&amp;severity=medium&amp;id=69416c5f77659b3df3503eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68224-1f020b8c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68224&amp;severity=null&amp;id=6957eb35db813ff03ef355aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68203-ed505aa5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68203&amp;severity=null&amp;id=6957eb35db813ff03ef355a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumpcloud-remote-assist-flaw-lets-users-gain-full--0016f86e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JumpCloud%20Remote%20Assist%20Flaw%20Lets%20Users%20Gain%20Full%20Control%20of%20Company%20Devices&amp;severity=medium&amp;id=6941656377659b3df346365d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tldr-hide-your-headless-bot-by-mimicking-a-webview-09b66c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TL%3BDR%3A%20Hide%20your%20headless%20bot%20by%20mimicking%20a%20WebView%20(Sec-Fetch%20and%20Client%20Hints%20inconsistencies)&amp;severity=medium&amp;id=694165b177659b3df34666be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortigate-under-active-attack-through-sam-54bab342</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiGate%20Under%20Active%20Attack%20Through%20SAML%20SSO%20Authentication%20Bypass&amp;severity=high&amp;id=6941656377659b3df3463655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/european-authorities-dismantle-call-center-fraud-r-0ae902c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20authorities%20dismantle%20call%20center%20fraud%20ring%20in%20Ukraine&amp;severity=high&amp;id=6941656377659b3df3463659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40361-60165bf4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40361&amp;severity=null&amp;id=6960dacfa48af7d8ce806bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-russian-hackers-now-favor-misconfigurations-de396171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%3A%20Russian%20Hackers%20Now%20Favor%20Misconfigurations%20in%20Critical%20Infrastructure%20Attacks&amp;severity=critical&amp;id=69415d7d83e5b48efc059ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14780-sql-injection-in-xiongwei-smart-cat-cd25a57d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14780%3A%20SQL%20Injection%20in%20Xiongwei%20Smart%20Catering%20Cloud%20Platform&amp;severity=medium&amp;id=69415d9883e5b48efc05b0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-ink-dragon-revealing-the-relay-network-and--b1a1626f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20Ink%20Dragon%3A%20Revealing%20the%20Relay%20Network%20and%20Inner%20Workings%20of%20a%20Stealthy%20Offensive%20Operation&amp;severity=high&amp;id=69415a0a83e5b48efc0390b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-exposes-years-long-gru-cyber-campaign-targe-a5b9d6fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Exposes%20Years-Long%20GRU%20Cyber%20Campaign%20Targeting%20Energy%20and%20Cloud%20Infrastructure&amp;severity=critical&amp;id=694209ae473cb759e1e4680c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65076-cwe-22-improper-limitation-of-a-pat-978950f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65076%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=high&amp;id=694154d05e006677ae0dd914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65075-cwe-22-improper-limitation-of-a-pat-0dcb4cf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65075%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=medium&amp;id=694154d05e006677ae0dd90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65074-cwe-22-improper-limitation-of-a-pat-3ae30a8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65074%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WaveStore%20WaveStore%20Server&amp;severity=high&amp;id=694154d05e006677ae0dd860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14443-server-side-request-forgery-ssrf-in-9c5f2d2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14443%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=694151495e006677ae09a90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jumpcloud-remote-assist-vulnerability-can-expose-s-9a59f443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JumpCloud%20Remote%20Assist%20Vulnerability%20Can%20Expose%20Systems%20to%20Takeover&amp;severity=low&amp;id=694146bc5e006677aefdeda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-data-security-and-privacy-need-to-start-in-cod-dd915236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Data%20Security%20and%20Privacy%20Need%20to%20Start%20in%20Code&amp;severity=medium&amp;id=694155985e006677ae0eaf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13474-cwe-639-authorization-bypass-throug-873cadd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13474%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Menulux%20Software%20Inc.%20Mobile%20App&amp;severity=high&amp;id=694144fdb7167ed5be7864c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13741-cwe-862-missing-authorization-in-pu-e73cee3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13741%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=694144fdb7167ed5be7864d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11220-cwe-79-improper-neutralization-of-i-ed2ebb13</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=694144fdb7167ed5be7864cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0836-cwe-862-missing-authorization-in-mil-79aed365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0836%3A%20CWE-862%20Missing%20Authorization%20in%20Milestone%20Systems%20XProtect%20VMS&amp;severity=medium&amp;id=69413e06b7167ed5be6e7a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fortigate-under-active-attack-through-sam-fbe8c785</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20FortiGate%20Under%20Active%20Attack%20Through%20SAML%20SSO%20Authentication%20Bypass&amp;severity=critical&amp;id=69413de7b7167ed5be6e5c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/user-data-compromised-in-soundcloud-hack-0a10a0db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=User%20Data%20Compromised%20in%20SoundCloud%20Hack&amp;severity=medium&amp;id=69413a65b7167ed5be6bc09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-santastealer-malware-steals-data-from-browsers-4c097a70</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SantaStealer%20malware%20steals%20data%20from%20browsers%2C%20crypto%20wallets&amp;severity=high&amp;id=69413a7bb7167ed5be6bd723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/askul-confirms-theft-of-740k-customer-records-in-r-3594939a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Askul%20confirms%20theft%20of%20740k%20customer%20records%20in%20ransomware%20attack&amp;severity=high&amp;id=69413a7bb7167ed5be6bd727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-to-shut-down-dark-web-monitoring-tool-in-fe-3b686551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20to%20Shut%20Down%20Dark%20Web%20Monitoring%20Tool%20in%20February%202026&amp;severity=high&amp;id=69413a7bb7167ed5be6bd72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-interior-minister-says-hackers-breached-its-d4e47474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Interior%20Minister%20says%20hackers%20breached%20its%20email%20servers&amp;severity=medium&amp;id=69413a7bb7167ed5be6bd733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-exposed-details-of-56-millio-94b89fcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20Data%20Breach%20Exposed%20Details%20of%205.6%20Million%20Consumers%20Including%20SSNs.&amp;severity=high&amp;id=694135161c9332043ad4c808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-the-infrastructure-behind-ddosias-at-87296225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20the%20Infrastructure%20Behind%20DDoSia&apos;s%20Attacks&amp;severity=medium&amp;id=694154d05e006677ae0dd866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-actor-phishes-the-baltics-and-the-balk-6fae1177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20actor%20phishes%20the%20Baltics%20and%20the%20Balkans&amp;severity=medium&amp;id=694154d05e006677ae0dd919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-the-wild-exploitation-of-fresh-fortinet-flaws-b-cb36df54</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In-the-Wild%20Exploitation%20of%20Fresh%20Fortinet%20Flaws%20Begins&amp;severity=critical&amp;id=6941270b1c9332043ac20a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14002-cwe-287-improper-authentication-in--2dce4fae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14002%3A%20CWE-287%20Improper%20Authentication%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=69412552594e45819d817425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-vulnerability-actively-exploited-to-de-d91b3da6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Vulnerability%20Actively%20Exploited%20to%20Deploy%20Linux%20Backdoors&amp;severity=medium&amp;id=694155985e006677ae0eaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13231-cwe-362-concurrent-execution-using--a9a3b571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13231%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=69411abe594e45819d7515df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68088-missing-authorization-in-merkulove--0e7f26c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68088%3A%20Missing%20Authorization%20in%20merkulove%20Huger%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68087-missing-authorization-in-merkulove--d7abe184</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68087%3A%20Missing%20Authorization%20in%20merkulove%20Modalier%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68086-missing-authorization-in-merkulove--fedb16e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68086%3A%20Missing%20Authorization%20in%20merkulove%20Reformer%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68085-missing-authorization-in-merkulove--af053296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68085%3A%20Missing%20Authorization%20in%20merkulove%20Buttoner%20for%20Elementor&amp;severity=medium&amp;id=69411758594e45819d70dc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68084-missing-authorization-in-nitesh-ult-32182db0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68084%3A%20Missing%20Authorization%20in%20Nitesh%20Ultimate%20Auction&amp;severity=medium&amp;id=69411758594e45819d70dc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68083-cross-site-request-forgery-csrf-in--5d4907a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68083%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Meks%20Meks%20Quick%20Plugin%20Disabler&amp;severity=medium&amp;id=69411758594e45819d70dc5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68082-cross-site-request-forgery-csrf-in--5257ee55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68082%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SEMrush%20CY%20LTD%20Semrush%20Content%20Toolkit&amp;severity=medium&amp;id=69411758594e45819d70dc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68080-improper-neutralization-of-input-du-8c240ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20User%20Avatar%20-%20Reloaded&amp;severity=medium&amp;id=69411758594e45819d70dc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68079-improper-neutralization-of-input-du-4d5b6c56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68079%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Shortcodes&amp;severity=medium&amp;id=69411756594e45819d70d850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68078-improper-neutralization-of-input-du-8e9f15b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Portfolio&amp;severity=medium&amp;id=69411756594e45819d70d84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68077-improper-neutralization-of-input-du-3f8a5ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Stockholm&amp;severity=medium&amp;id=69411756594e45819d70d84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68076-improper-neutralization-of-input-du-1661e62e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Stockholm%20Core&amp;severity=medium&amp;id=69411756594e45819d70d847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68071-authorization-bypass-through-user-c-b5fec355</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68071%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=69411756594e45819d70d844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68070-improper-neutralization-of-input-du-5ced6c6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68070%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vektor%2CInc.%20VK%20Google%20Job%20Posting%20Manager&amp;severity=medium&amp;id=69411756594e45819d70d841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68068-improper-control-of-filename-for-in-75f2f7ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68068%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Stockholm&amp;severity=high&amp;id=69411756594e45819d70d83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68067-improper-control-of-filename-for-in-a0e7d80f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Stockholm%20Core&amp;severity=high&amp;id=69411756594e45819d70d83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68066-improper-control-of-filename-for-in-0b1d59d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20Soledad&amp;severity=high&amp;id=69411756594e45819d70d838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68065-improper-control-of-filename-for-in-0c87a061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68065%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LiquidThemes%20Hub%20Core&amp;severity=high&amp;id=69411756594e45819d70d835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68062-improper-control-of-filename-for-in-bada404d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP&amp;severity=high&amp;id=69411755594e45819d70d69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68061-improper-control-of-filename-for-in-bb1da9c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68061%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall&amp;severity=high&amp;id=69411755594e45819d70d69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68056-improper-neutralization-of-special--aab25123</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68056%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LBG%20Zoominoutslider&amp;severity=high&amp;id=69411755594e45819d70d698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68055-improper-neutralization-of-special--5a43a174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68055%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=69411755594e45819d70d695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68054-improper-neutralization-of-special--ce61930b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68054%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20CountDown%20With%20Image%20or%20Video%20Background&amp;severity=high&amp;id=69411755594e45819d70d692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68053-improper-neutralization-of-special--97057880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68053%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20xPromoter&amp;severity=high&amp;id=69411755594e45819d70d68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67999-improper-neutralization-of-special--82006b4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67999%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stefano%20Lissa%20Newsletter&amp;severity=high&amp;id=69411755594e45819d70d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67989-server-side-request-forgery-ssrf-in-2572ab30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67989%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LMPixels%20Kerge&amp;severity=medium&amp;id=69411755594e45819d70d689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67986-improper-neutralization-of-input-du-a9cfe3d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67986%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Barn2%20Plugins%20Document%20Library%20Lite&amp;severity=medium&amp;id=69411755594e45819d70d686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67985-authorization-bypass-through-user-c-32398551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67985%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Barn2%20Plugins%20Document%20Library%20Lite&amp;severity=medium&amp;id=69411755594e45819d70d683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67983-improper-neutralization-of-input-du-c7befc6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=69411753594e45819d70ccd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67976-missing-authorization-in-bob-watu-q-e82aef9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67976%3A%20Missing%20Authorization%20in%20Bob%20Watu%20Quiz&amp;severity=medium&amp;id=69411753594e45819d70ccd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67965-missing-authorization-in-favethemes-f31e3a32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67965%3A%20Missing%20Authorization%20in%20favethemes%20Homey%20Core&amp;severity=medium&amp;id=69411753594e45819d70cccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67962-improper-neutralization-of-special--05616468</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67962%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AIOSEO%20Plugin%20Team%20Broken%20Link%20Checker&amp;severity=high&amp;id=69411753594e45819d70ccca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67951-improper-neutralization-of-input-du-882cebfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPZOOM%20WPZOOM%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69411753594e45819d70ccc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67950-improper-neutralization-of-special--a95dd924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67950%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=high&amp;id=69411753594e45819d70ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67948-exposure-of-sensitive-system-inform-6d54b8b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67948%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=medium&amp;id=69411753594e45819d70ccc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67929-missing-authorization-in-templatein-271d97c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67929%3A%20Missing%20Authorization%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=69411753594e45819d70ccbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67912-improper-neutralization-of-input-du-2e08586c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premio%20Stars%20Testimonials&amp;severity=medium&amp;id=69411753594e45819d70ccbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66167-missing-authorization-in-merkulove--01ae56bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66167%3A%20Missing%20Authorization%20in%20merkulove%20Lottier&amp;severity=medium&amp;id=69411753594e45819d70ccb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66166-missing-authorization-in-merkulove--99a465e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66166%3A%20Missing%20Authorization%20in%20merkulove%20Lottier%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66165-missing-authorization-in-merkulove--05ca9d4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66165%3A%20Missing%20Authorization%20in%20merkulove%20Lottier%20for%20WPBakery&amp;severity=medium&amp;id=69411752594e45819d70cb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66164-missing-authorization-in-merkulove--da23dbb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66164%3A%20Missing%20Authorization%20in%20merkulove%20Laser&amp;severity=medium&amp;id=69411752594e45819d70cb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66163-missing-authorization-in-merkulove--7c649501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66163%3A%20Missing%20Authorization%20in%20merkulove%20Masker%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66162-missing-authorization-in-merkulove--eb8f0428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66162%3A%20Missing%20Authorization%20in%20merkulove%20Spoter%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66161-missing-authorization-in-merkulove--5b555682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66161%3A%20Missing%20Authorization%20in%20merkulove%20Grider%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66147-missing-authorization-in-merkulove--d9735ec2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66147%3A%20Missing%20Authorization%20in%20merkulove%20Coder%20for%20Elementor&amp;severity=medium&amp;id=69411752594e45819d70cb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66134-missing-authorization-in-ninjateam--254917e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66134%3A%20Missing%20Authorization%20in%20NinjaTeam%20FileBird%20Pro&amp;severity=medium&amp;id=69411752594e45819d70cb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66133-missing-authorization-in-wp-legal-p-f89bfdc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66133%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=69411752594e45819d70cb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66132-authorization-bypass-through-user-c-30f0ab1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66132%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20FAPI%20Business%20s.r.o.%20FAPI%20Member&amp;severity=medium&amp;id=69411752594e45819d70cb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66131-missing-authorization-in-yaadsarig--bacbc562</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66131%3A%20Missing%20Authorization%20in%20yaadsarig%20Yaad%20Sarig%20Payment%20Gateway%20For%20WC&amp;severity=critical&amp;id=69411750594e45819d70c756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66130-missing-authorization-in-etruel-wp--39feb8ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66130%3A%20Missing%20Authorization%20in%20etruel%20WP%20Views%20Counter&amp;severity=medium&amp;id=69411750594e45819d70c753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66129-missing-authorization-in-wppochipp--be62de5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66129%3A%20Missing%20Authorization%20in%20wppochipp%20Pochipp&amp;severity=medium&amp;id=69411750594e45819d70c750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66128-missing-authorization-in-brevo-send-499c3b54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66128%3A%20Missing%20Authorization%20in%20Brevo%20Sendinblue%20for%20WooCommerce&amp;severity=medium&amp;id=69411750594e45819d70c74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66127-missing-authorization-in-g5theme-es-85993736</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66127%3A%20Missing%20Authorization%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=69411750594e45819d70c74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66126-insertion-of-sensitive-information--07e14078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66126%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wowpress.host%20Fix%20Media%20Library&amp;severity=medium&amp;id=69411750594e45819d70c747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66125-insertion-of-sensitive-information--4bab3433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66125%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Nitesh%20Ultimate%20Auction&amp;severity=medium&amp;id=69411750594e45819d70c744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66124-missing-authorization-in-zeen101-le-7a3eed6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66124%3A%20Missing%20Authorization%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=medium&amp;id=69411750594e45819d70c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66122-missing-authorization-in-design-sty-8fbbfed3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66122%3A%20Missing%20Authorization%20in%20Design%20Stylish%20Price%20List&amp;severity=medium&amp;id=69411750594e45819d70c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66121-missing-authorization-in-siteground-84f6210c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66121%3A%20Missing%20Authorization%20in%20SiteGround%20SiteGround%20Security&amp;severity=medium&amp;id=69411750594e45819d70c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64639-missing-authorization-in-wp-compres-ba710c44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64639%3A%20Missing%20Authorization%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=medium&amp;id=6941174f594e45819d70c5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64638-missing-authorization-in-onpayio-on-64d9c883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64638%3A%20Missing%20Authorization%20in%20OnPay.io%20OnPay.io%20for%20WooCommerce&amp;severity=medium&amp;id=6941174f594e45819d70c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64635-missing-authorization-in-syed-balkh-7cb25363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64635%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Feeds%20for%20YouTube&amp;severity=medium&amp;id=6941174f594e45819d70c5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64634-missing-authorization-in-themefusio-ea300690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64634%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada&amp;severity=high&amp;id=6941174f594e45819d70c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64633-improper-neutralization-of-script-r-b164d6e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64633%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20colabrio%20Norebro%20Extra&amp;severity=medium&amp;id=6941174f594e45819d70c5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64632-missing-authorization-in-auctollo-g-e66cf382</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64632%3A%20Missing%20Authorization%20in%20Auctollo%20Google%20XML%20Sitemaps&amp;severity=medium&amp;id=6941174f594e45819d70c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64631-missing-authorization-in-wc-lovers--aeff6e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64631%3A%20Missing%20Authorization%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=medium&amp;id=6941174f594e45819d70c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64630-missing-authorization-in-strategy11-925240a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64630%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=6941174f594e45819d70c59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64253-path-traversal-in-wordpressorg-heal-38180214</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64253%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20WordPress.org%20Health%20Check%20%26%20Troubleshooting&amp;severity=medium&amp;id=6941174f594e45819d70c598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64251-missing-authorization-in-azzaroco-u-96b8140d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64251%3A%20Missing%20Authorization%20in%20azzaroco%20Ultimate%20Learning%20Pro&amp;severity=medium&amp;id=6941174f594e45819d70c595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64250-url-redirection-to-untrusted-site-o-03e3b33e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64250%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpWax%20Directorist&amp;severity=medium&amp;id=6941174d594e45819d70c405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64249-missing-authorization-in-wp-experts-e0069cfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64249%3A%20Missing%20Authorization%20in%20WP-EXPERTS.IN%20Protect%20WP%20Admin&amp;severity=medium&amp;id=6941174d594e45819d70c402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64248-missing-authorization-in-emarket-de-397e329e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64248%3A%20Missing%20Authorization%20in%20emarket-design%20Request%20a%20Quote&amp;severity=medium&amp;id=6941174d594e45819d70c3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64247-missing-authorization-in-edmonparke-15689752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64247%3A%20Missing%20Authorization%20in%20edmon.parker%20Read%20More%20%26%20Accordion&amp;severity=medium&amp;id=6941174d594e45819d70c3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64246-missing-authorization-in-netopsae-a-12e0626d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64246%3A%20Missing%20Authorization%20in%20netopsae%20Accessibility%20by%20AudioEye&amp;severity=medium&amp;id=6941174d594e45819d70c3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64245-missing-authorization-in-ryanpcmcqu-e0320036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64245%3A%20Missing%20Authorization%20in%20ryanpcmcquen%20Import%20external%20attachments&amp;severity=medium&amp;id=6941174d594e45819d70c3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64244-missing-authorization-in-codexpert--f5da3b19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64244%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20Restrict%20Elementor%20Widgets%2C%20Columns%20and%20Sections&amp;severity=medium&amp;id=6941174d594e45819d70c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64243-missing-authorization-in-e-plugins--4ef6d695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64243%3A%20Missing%20Authorization%20in%20e-plugins%20Directory%20Pro&amp;severity=medium&amp;id=6941174d594e45819d70c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64242-missing-authorization-in-merv-barre-46bb16f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64242%3A%20Missing%20Authorization%20in%20Merv%20Barrett%20Easy%20Property%20Listings&amp;severity=medium&amp;id=6941174d594e45819d70c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64241-missing-authorization-in-imtiaz-ray-be5648b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64241%3A%20Missing%20Authorization%20in%20Imtiaz%20Rayhan%20WP%20Coupons%20and%20Deals&amp;severity=medium&amp;id=6941174d594e45819d70c3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64239-cross-site-request-forgery-csrf-in--3d465108</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64239%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yoav%20Farhi%20RTL%20Tester&amp;severity=medium&amp;id=6941174b594e45819d70bb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64238-missing-authorization-in-nicolaskul-d988c882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64238%3A%20Missing%20Authorization%20in%20NicolasKulka%20WPS%20Bidouille&amp;severity=medium&amp;id=6941174b594e45819d70bb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64237-cross-site-request-forgery-csrf-in--67abc086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64237%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=medium&amp;id=6941174b594e45819d70bb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59009-cross-site-request-forgery-csrf-in--0b7ef99e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Astoundify%20Listify&amp;severity=medium&amp;id=6941174b594e45819d70bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59001-missing-authorization-in-themenecta-45e0f75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59001%3A%20Missing%20Authorization%20in%20ThemeNectar%20Salient%20Core&amp;severity=medium&amp;id=6941174b594e45819d70bb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58999-cross-site-request-forgery-csrf-in--e3fae455</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58999%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Attractive%20Donations%20System%20-%20Easy%20Stripe%20%26%20Paypal%20donations&amp;severity=medium&amp;id=6941174b594e45819d70bb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54045-missing-authorization-in-creativemi-3640d361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54045%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=medium&amp;id=6941174b594e45819d70bb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54005-missing-authorization-in-sonalsinha-eef15f90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54005%3A%20Missing%20Authorization%20in%20sonalsinha21%20SKT%20Page%20Builder&amp;severity=medium&amp;id=6941174b594e45819d70bb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54004-missing-authorization-in-wc-lovers--9f665bc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54004%3A%20Missing%20Authorization%20in%20WC%20Lovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce&amp;severity=low&amp;id=6941174b594e45819d70bb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49300-insertion-of-sensitive-information--4e57656b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49300%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20shinetheme%20Traveler%20Option%20Tree&amp;severity=low&amp;id=6941174b594e45819d70bb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-appsec-via-chrome-devtools-mcp-600-min--5d3be28a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20AppSec%20via%20Chrome%20DevTools%20(MCP)%3A%20600%20min%20%E2%86%92%203.5%20min%20on%20OWASP%20Juice%20Shop&amp;severity=medium&amp;id=6941175d594e45819d70df7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11991-cwe-862-missing-authorization-in-je-7ec62977</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11991%3A%20CWE-862%20Missing%20Authorization%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=medium&amp;id=69410b259bfd1ab9ba9ec080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13439-cwe-200-exposure-of-sensitive-infor-d8447c75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13439%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=medium&amp;id=69410b259bfd1ab9ba9ec084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66635-stack-based-buffer-overflow-in-seik-b3221617</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66635%3A%20Stack-based%20buffer%20overflow%20in%20SEIKO%20EPSON%20CORPORATION%20Web%20Config&amp;severity=high&amp;id=6941063f15f8de78ec7f942a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62330-cwe-319-cleartext-transmission-of-s-b362ac9f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62330%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20DevOps%20Deploy&amp;severity=medium&amp;id=6940feba15f8de78ec72ee2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-to-shut-down-dark-web-monitoring-tool-in-fe-1841de7b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20to%20Shut%20Down%20Dark%20Web%20Monitoring%20Tool%20in%20February%202026&amp;severity=medium&amp;id=6941068815f8de78ec7fc211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12809-cwe-862-missing-authorization-in-we-445ee50e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12809%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20Dokan%20Pro&amp;severity=medium&amp;id=6940f308a4f72ecfca032936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13794-cwe-862-missing-authorization-in-th-33143b06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13794%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20Auto%20Featured%20Image%20(Auto%20Post%20Thumbnail)&amp;severity=medium&amp;id=6940f308a4f72ecfca03293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14252-vulnerability-in-advantech-susi-cdc40913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14252%3A%20Vulnerability%20in%20Advantech%20SUSI&amp;severity=high&amp;id=6940ef85a4f72ecfcafdd982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14777-authentication-bypass-by-alternate--765a6a72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14777%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=6940ec04a4f72ecfcafbad2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66357-improper-check-for-unusual-or-excep-dd525d25</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66357%3A%20Improper%20check%20for%20unusual%20or%20exceptional%20conditions%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=medium&amp;id=6940e76154c229a9f5d8d5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59479-improper-restriction-of-rendered-ui-5231958d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59479%3A%20Improper%20restriction%20of%20rendered%20UI%20layers%20or%20frames%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=medium&amp;id=6940e76154c229a9f5d8d5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61976-improper-check-for-unusual-or-excep-3cc7b8f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61976%3A%20Improper%20check%20for%20unusual%20or%20exceptional%20conditions%20in%20Inaba%20Denki%20Sangyo%20Co.%2C%20Ltd.%20CHOCO%20TEI%20WATCHER%20mini%20(IB-MCT001)&amp;severity=high&amp;id=6940e76154c229a9f5d8d5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13956-cwe-862-missing-authorization-in-th-cbf34457</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13956%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=6940e3e754c229a9f5d4c70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14749-improper-access-controls-in-ningyua-bb8b7fba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14749%3A%20Improper%20Access%20Controls%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940cec5d9bcdf3f3d1f60d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14748-improper-access-controls-in-ningyua-f6ae90c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14748%3A%20Improper%20Access%20Controls%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940cec5d9bcdf3f3d1f60d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59385-cwe-290-in-qnap-systems-inc-qts-976483fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59385%3A%20CWE-290%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6940c7c9d9bcdf3f3d1a9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62847-cwe-88-in-qnap-systems-inc-qts-9cc1e515</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62847%3A%20CWE-88%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62848-cwe-476-in-qnap-systems-inc-qts-26997ee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62848%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6940c7c9d9bcdf3f3d1a981d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62849-cwe-89-in-qnap-systems-inc-qts-e243fee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62849%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a9820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14747-denial-of-service-in-ningyuanda-tc1-7c16042f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14747%3A%20Denial%20of%20Service%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a9810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14746-improper-authentication-in-ningyuan-1fd9c740</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14746%3A%20Improper%20Authentication%20in%20Ningyuanda%20TC155&amp;severity=medium&amp;id=6940c7c9d9bcdf3f3d1a980a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autonomous-code-analyzer-beats-all-human-teams-at--1c48a073</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autonomous%20code%20analyzer%20beats%20all%20human%20teams%20at%20OSS%20zero-day%20competition&amp;severity=critical&amp;id=6940af32d9bcdf3f3d14f703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68115-cwe-79-improper-neutralization-of-i-91559319</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68115%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68113-cwe-115-misinterpretation-of-input--2c2eb7f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68113%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20altcha-org%20altcha-lib&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67751-cwe-89-improper-neutralization-of-s-2b97b28f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67751%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=high&amp;id=6940b2a5d9bcdf3f3d15a2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67874-cwe-204-observable-response-discrep-cfea1afd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67874%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=6940b2a5d9bcdf3f3d15a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67744-cwe-94-improper-control-of-generati-e699b3d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67744%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=6940b2a5d9bcdf3f3d15a2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67748-cwe-184-incomplete-list-of-disallow-1dc75921</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67748%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6940abb2d9bcdf3f3d14315e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14758-cwe-1188-initialization-of-a-resour-9ca98302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14758%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20ALASCA%20YAOOK&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67747-cwe-184-incomplete-list-of-disallow-5eb97c09</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67747%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20trailofbits%20fickling&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67736-cwe-89-improper-neutralization-of-s-4283d66c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67736%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20tts&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67722-cwe-426-untrusted-search-path-in-fr-6d28d12e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67722%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20FreePBX%20framework&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66449-cwe-22-improper-limitation-of-a-pat-b798008f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66449%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20C4illin%20ConvertX&amp;severity=high&amp;id=6940abb2d9bcdf3f3d143143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67715-cwe-284-improper-access-control-in--771eb11e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67715%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d14314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67492-cwe-1286-improper-validation-of-syn-b7f84d26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67492%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=6940abb2d9bcdf3f3d143148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-16-3c6b020b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-16&amp;severity=medium&amp;id=6941f612d2cd6f6c37b6aef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65834-na-00e2b8df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65834%3A%20n%2Fa&amp;severity=critical&amp;id=6941bc63535cdcbc0ad63cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65589-na-057d12ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65589%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5c0d5f6f4391b0c3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65581-na-3b8c31da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65581%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52196-na-f0e6466e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52196%3A%20n%2Fa&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65593-na-486a36aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65593%3A%20n%2Fa&amp;severity=high&amp;id=6941ae5b0d5f6f4391b0c390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65592-na-4856c6da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65592%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65591-na-faa69fe0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65591%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65590-na-3683ac85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65590%3A%20n%2Fa&amp;severity=medium&amp;id=6941a4041a61eff6269a9336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62862-na-9f706d9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62862%3A%20n%2Fa&amp;severity=medium&amp;id=694194749050fe8508060890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62864-na-91fd75e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62864%3A%20n%2Fa&amp;severity=critical&amp;id=694194749050fe850806087e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62863-na-4905d9e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62863%3A%20n%2Fa&amp;severity=critical&amp;id=694194749050fe850806087a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50401-na-29c7c5f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50401%3A%20n%2Fa&amp;severity=critical&amp;id=694190eb9050fe8508040787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50398-na-8481b724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50398%3A%20n%2Fa&amp;severity=critical&amp;id=694190eb9050fe8508040784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29231-na-f12e61c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29231%3A%20n%2Fa&amp;severity=medium&amp;id=69418d769050fe8508ffb2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63414-na-f12b194c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63414%3A%20n%2Fa&amp;severity=critical&amp;id=69418ba93e7fd18214c3d71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65427-na-74e6ad8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65427%3A%20n%2Fa&amp;severity=medium&amp;id=694188253e7fd18214bf80c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65319-na-f7e35328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65319%3A%20n%2Fa&amp;severity=critical&amp;id=694184a13e7fd18214ba0e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65318-na-e986605a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65318%3A%20n%2Fa&amp;severity=critical&amp;id=694184a13e7fd18214ba0e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64012-na-0ff9f27b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64012%3A%20n%2Fa&amp;severity=medium&amp;id=694178b209f61faec590733b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esm-dev-136-path-traversal-7009fd5a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=esm-dev%20136%20-%20Path%20Traversal&amp;severity=medium&amp;id=6941062315f8de78ec7f738b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/summar-employee-portal-3980-authenticated-sql-inje-1a5894c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Summar%20Employee%20Portal%20%203.98.0%20-%20Authenticated%20SQL%20Injection&amp;severity=medium&amp;id=6941062315f8de78ec7f7386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10900-cwe-787-out-of-bounds-write-in-auto-0f23ab01</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10900%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10899-cwe-787-out-of-bounds-write-in-auto-b3f70d7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10899%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10898-cwe-787-out-of-bounds-write-in-auto-1220e63c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10898%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pornhub-extorted-after-hackers-steal-premium-membe-35c054a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PornHub%20extorted%20after%20hackers%20steal%20Premium%20member%20activity%20data&amp;severity=high&amp;id=69409d8ad9bcdf3f3d09c512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10889-cwe-120-buffer-copy-without-checkin-aadcd24c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10889%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=6940a116d9bcdf3f3d0ad52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10888-cwe-787-out-of-bounds-write-in-auto-a477ebcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10888%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10887-cwe-120-buffer-copy-without-checkin-eb07023e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10887%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10886-cwe-120-buffer-copy-without-checkin-1ecf1926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10886%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10884-cwe-787-out-of-bounds-write-in-auto-e66a526d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10884%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10883-cwe-125-out-of-bounds-read-in-autod-d51543c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10883%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10882-cwe-787-out-of-bounds-write-in-auto-08fa27e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10882%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10881-cwe-122-heap-based-buffer-overflow--c1e428e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10881%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9460-cwe-125-out-of-bounds-read-in-autode-98e778e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9460%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9459-cwe-125-out-of-bounds-read-in-autode-a4610cfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9459%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9457-cwe-120-buffer-copy-without-checking-a078e733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9457%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9456-cwe-120-buffer-copy-without-checking-96381e35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9456%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9cd9bcdf3f3d09c715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66407-cwe-352-cross-site-request-forgery--bfb6621f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66407%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=69409d9cd9bcdf3f3d09c710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9455-cwe-125-out-of-bounds-read-in-autode-66f2c235</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9455%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9454-cwe-125-out-of-bounds-read-in-autode-58273f8a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9454%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9453-cwe-125-out-of-bounds-read-in-autode-1cbab4b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9453%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9452-cwe-120-buffer-copy-without-checking-403f5cb2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9452%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14731-improper-neutralization-of-special--8752e394</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14731%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409d9ed9bcdf3f3d09c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14593-cwe-125-out-of-bounds-read-in-autod-fa228c31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14593%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=69409d9ed9bcdf3f3d09c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66482-cwe-307-improper-restriction-of-exc-9f26c8c2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66482%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20misskey-dev%20misskey&amp;severity=medium&amp;id=69409a3bd9bcdf3f3d093948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66402-cwe-862-missing-authorization-in-mi-47451996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66402%3A%20CWE-862%3A%20Missing%20Authorization%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=6940db0754c229a9f5cc423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14730-code-injection-in-ctcms-content-man-25b007c1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14730%3A%20Code%20Injection%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409685d9bcdf3f3d08b5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14729-code-injection-in-ctcms-content-man-ad7fee5d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14729%3A%20Code%20Injection%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=69409685d9bcdf3f3d08b5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64338-2856e089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690d7e3a3ea13e495ec6402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9121-cwe-502-deserialization-of-untrusted-8844fc9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9121%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=high&amp;id=69409306d9bcdf3f3d07fefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9122-cwe-209-generation-of-error-message--93abb040</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9122%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Hitachi%20Vantara%20Pentaho%20Data%20Integration%20and%20Analytics&amp;severity=medium&amp;id=69409306d9bcdf3f3d07feff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/featured-chrome-browser-extension-caught-intercept-08650a51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Featured%20Chrome%20Browser%20Extension%20Caught%20Intercepting%20Millions%20of%20Users&apos;%20AI%20Chats&amp;severity=high&amp;id=694084f1d9bcdf3f3d0519a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defending-against-the-cve-2025-55182-react2shell-v-2ba359a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Defending%20against%20the%20CVE-2025-55182%20(React2Shell)%20vulnerability%20in%20React%20Server%20Components&amp;severity=medium&amp;id=694121d1594e45819d7c8716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/makop-ransomware-guloader-and-privilege-escalation-dd31bfb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Makop%20ransomware%3A%20GuLoader%20and%20privilege%20escalation%20in%20attacks%20against%20Indian%20businesses&amp;severity=medium&amp;id=69407a67d9bcdf3f3d02bafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-discover-and-secure-ownerless-corporate-it--580d01a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20discover%20and%20secure%20ownerless%20corporate%20IT%20assets&amp;severity=medium&amp;id=6940736ed9bcdf3f3d00c64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53879-stack-based-buffer-overflow-in-neon-8bd783f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53879%3A%20Stack-based%20Buffer%20Overflow%20in%20neonguvenlik%20NVClient&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14722-cross-site-scripting-in-vion707-dma-24aeaf84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14722%3A%20Cross%20Site%20Scripting%20in%20vion707%20DMadmin&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53893-server-side-request-forgery-ssrf-in-b776626d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53893%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ateme%20TITAN&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53892-unrestricted-upload-of-file-with-da-0ac5cfc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53892%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blackcat-cms%20Blackcat%20CMS&amp;severity=high&amp;id=69407362d9bcdf3f3d00c437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53891-improper-neutralization-of-input-du-fe4191a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blackcat-cms%20Blackcat%20CMS&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53886-stack-based-buffer-overflow-in-xlig-cd288835</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53886%3A%20Stack-based%20Buffer%20Overflow%20in%20Xlightftpd%20Xlight%20FTP%20Server&amp;severity=medium&amp;id=69407361d9bcdf3f3d00c42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53884-improper-neutralization-of-input-du-8c695424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webedition%20Webedition%20CMS&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53883-improper-control-of-generation-of-c-7c105846</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53883%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Webedition%20Webedition%20CMS&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53882-improper-neutralization-of-input-du-ef822bfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jlexart%20JLex%20GuestBook&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53881-cleartext-transmission-of-sensitive-a67e9315</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53881%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Ruijie%20ReyeeOS&amp;severity=critical&amp;id=69407360d9bcdf3f3d00c3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53878-inconsistent-interpretation-of-http-8a2502f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53878%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Phpjabbers%20Member%20Login%20Script&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53877-improper-neutralization-of-special--9cb2dff2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53877%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Phpjabbers%20Bus%20Reservation%20System&amp;severity=critical&amp;id=69407360d9bcdf3f3d00c3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53876-unrestricted-upload-of-file-with-da-ca3dfcfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53876%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Creativeitem%20Academy%20LMS&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53875-cleartext-transmission-of-sensitive-4affd249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53875%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Gomlab%20GOM%20Player&amp;severity=high&amp;id=69407360d9bcdf3f3d00c3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53874-buffer-copy-without-checking-size-o-266a59c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53874%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Gomlab%20GOM%20Player&amp;severity=medium&amp;id=69407360d9bcdf3f3d00c3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53868-unrestricted-upload-of-file-with-da-d8d59762</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53868%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Coppermine%20coppermine-gallery&amp;severity=high&amp;id=69406fd9d9bcdf3f3d0056a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64725-cwe-286-incorrect-user-management-i-649a9abe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64725%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=69406fd9d9bcdf3f3d0056ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13489-cwe-319-cleartext-transmission-of-s-061fede2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13489%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20UCD%20-%20IBM%20DevOps%20Deploy&amp;severity=medium&amp;id=694068d4d9bcdf3f3dfeb53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14503-cwe-266-incorrect-privilege-assignm-951716a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14503%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20AWS%20Harmonix%20on%20AWS&amp;severity=high&amp;id=694068d4d9bcdf3f3dfeb539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14148-cwe-522-insufficiently-protected-cr-1bb94094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14148%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20UCD%20-%20IBM%20DevOps%20Deploy&amp;severity=medium&amp;id=694068d4d9bcdf3f3dfeb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12035-integer-overflow-or-wraparound-in-z-93bfce85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12035%3A%20Integer%20Overflow%20or%20Wraparound%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36360-cwe-613-insufficient-session-expira-5a6f2530</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36360%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20UCD%20-%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=69407362d9bcdf3f3d00c44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14038-cwe-862-missing-authorization-in-en-fc7c4832</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14038%3A%20CWE-862%20Missing%20Authorization%20in%20EnterpriseDB%20Hybrid%20Manager%20-%20LTS&amp;severity=high&amp;id=69405034d9bcdf3f3df776ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/featured-chrome-browser-extension-caught-intercept-c07f5bad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Featured%20Chrome%20Browser%20Extension%20Caught%20Intercepting%20Millions%20of%20Users&apos;%20AI%20Chats&amp;severity=medium&amp;id=6941068815f8de78ec7fc214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-links-more-chinese-hacking-groups-to-react2-b12ff58f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20links%20more%20Chinese%20hacking%20groups%20to%20React2Shell%20attacks&amp;severity=high&amp;id=69404cb0d9bcdf3f3df63af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freepbx-patches-critical-sqli-file-upload-and-auth-2fb17efb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreePBX%20Patches%20Critical%20SQLi%2C%20File-Upload%2C%20and%20AUTHTYPE%20Bypass%20Flaws%20Enabling%20RCE&amp;severity=critical&amp;id=69404cb0d9bcdf3f3df63aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-impacts-58-million-vehicle-d-43fd0225</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20data%20breach%20impacts%205.8%20million%20vehicle%20dealership%20customers&amp;severity=high&amp;id=69404927d9bcdf3f3df49985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/militant-groups-are-experimenting-with-ai-and-the--88181817</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Militant%20Groups%20Are%20Experimenting%20With%20AI%2C%20and%20the%20Risks%20Are%20Expected%20to%20Grow&amp;severity=medium&amp;id=6940459fd9bcdf3f3df2aa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11393-unintended-proxy-or-intermediary-co-620255c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11393%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20Red%20Hat%20Red%20Hat%20Lightspeed%20(formerly%20Insights)%20for%20Runtimes%201&amp;severity=high&amp;id=69404222d9bcdf3f3df0a13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fragile-lock-novel-bypasses-for-saml-authentic-6519dcb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fragile%20Lock%3A%20Novel%20Bypasses%20For%20SAML%20Authentication&amp;severity=medium&amp;id=69403093d9bcdf3f3de86a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13888-incorrect-privilege-assignment-in-r-34919c9f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13888%3A%20Incorrect%20Privilege%20Assignment%20in%20redhat-developer%20gitops-operator&amp;severity=critical&amp;id=69402d09d9bcdf3f3de5a0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14387-cwe-79-improper-neutralization-of-i-8d8eea0c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=69402d09d9bcdf3f3de5a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13824-cwe-763-release-of-invalid-pointer--c8fe8d72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13824%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Rockwell%20Automation%20Micro820%C2%AE%2C%20Micro850%C2%AE%2C%20%20Micro870%C2%AE&amp;severity=high&amp;id=69402985d9bcdf3f3de49055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13823-cwe-1395-dependency-on-vulnerable-t-e3b87deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13823%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Rockwell%20Automation%20Micro820%C2%AE%2C%20Micro850%C2%AE%2C%20%20Micro870%C2%AE&amp;severity=high&amp;id=69402985d9bcdf3f3de49052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34412-cwe-693-protection-mechanism-failur-ec5556ce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34412&amp;severity=medium&amp;id=6940227fd9bcdf3f3de2753d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34411-cwe-862-missing-authorization-in-eq-39897481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34411&amp;severity=high&amp;id=6940227fd9bcdf3f3de27537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34181-cwe-22-improper-limitation-of-a-pat-86c1f77a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34181%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de27533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34180-cwe-257-storing-passwords-in-a-reco-8310c550</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34180%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de2752f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34179-cwe-89-improper-neutralization-of-s-aea9afd2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34179%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NetSupport%20Software%20Manager&amp;severity=high&amp;id=6940227fd9bcdf3f3de2752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14156-cwe-20-improper-input-validation-in-c485fe9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14156%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ays-pro%20Fox%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=critical&amp;id=69401ef9d9bcdf3f3de12798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13950-cwe-862-missing-authorization-in-on-85c14803</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13950%3A%20CWE-862%20Missing%20Authorization%20in%20onesignal%20OneSignal%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13728-cwe-79-improper-neutralization-of-i-ec83f04d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20FluentAuth%20%E2%80%93%20The%20Ultimate%20Authorization%20%26%20Security%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1278c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14383-cwe-89-improper-neutralization-of-s-ac94675e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14383%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=high&amp;id=69401ef9d9bcdf3f3de1279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12900-cwe-862-missing-authorization-in-ni-108bcb0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12900%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13610-cwe-79-improper-neutralization-of-i-a361d5ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14003-cwe-862-missing-authorization-in-wp-70ed37ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14003%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13367-cwe-79-improper-neutralization-of-i-e471635d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%20Builder%2C%20Custom%20Login%20Form%2C%20User%20Profile%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de1277e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13608-cwe-79-improper-neutralization-of-i-0695e3c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caterhamcomputing%20CC%20Child%20Pages&amp;severity=medium&amp;id=69401ef9d9bcdf3f3de12784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sees-5-chinese-groups-exploiting-react2shel-775d2d47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sees%205%20Chinese%20Groups%20Exploiting%20React2Shell%20for%20Malware%20Delivery&amp;severity=medium&amp;id=6940146ad9bcdf3f3dddfa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/16tb-of-mongodb-database-exposes-43-billion-lead-g-ce6f65ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=16TB%20of%20MongoDB%20Database%20Exposes%204.3%20Billion%20Lead%20Gen%20Records&amp;severity=medium&amp;id=694010e7d9bcdf3f3ddd33d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-react2shell-exploits-cve-2025-55182-mon-dec-1-e2ae8110</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20React2Shell%20Exploits%20CVE-2025-55182%2C%20(Mon%2C%20Dec%2015th)&amp;severity=medium&amp;id=69400d5fd9bcdf3f3ddc5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15th-december-threat-intelligence-report-a6fd60cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=694009e2d9bcdf3f3ddb9e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frogblight-banking-trojan-targets-android-users-in-28fb5a82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frogblight%20banking%20Trojan%20targets%20Android%20users%20in%20Turkey&amp;severity=medium&amp;id=69404937d9bcdf3f3df4a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hamas-linked-hackers-using-ashtag-malware-against--60dd9bd5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hamas%20Linked%20Hackers%20Using%20AshTag%20Malware%20Against%20Diplomatic%20Offices&amp;severity=medium&amp;id=6940065cd9bcdf3f3ddab940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-apple-0-days-winrar-exploit-lastpass--18ea88b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Apple%200-Days%2C%20WinRAR%20Exploit%2C%20LastPass%20Fines%2C%20.NET%20RCE%2C%20OAuth%20Scams%20%26%20More&amp;severity=critical&amp;id=6941068815f8de78ec7fc21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nextjs-59k-servers-compromised-in-48h-i-breached-t-7082090a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Next.js%3A%2059k%20servers%20compromised%20in%2048h%20-%20I%20breached%20the%20attackers&apos;%20C2%20and%20here&apos;s%20what%20I%20found&amp;severity=medium&amp;id=693ffbd1d9bcdf3f3dd7fb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-browser-extension-risk-guide-after-the-shadypand-11eea072</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Browser%20Extension%20Risk%20Guide%20After%20the%20ShadyPanda%20Campaign&amp;severity=medium&amp;id=6941068815f8de78ec7fc21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66388-cwe-201-insertion-of-sensitive-info-baac17da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66388%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=693ff4c7d9bcdf3f3dd5a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-ceo-steps-down-after-data-breach-hits-337--c2fc7f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20CEO%20Steps%20Down%20After%20Data%20Breach%20Hits%2033.7%20Million%20Users&amp;severity=high&amp;id=693ff143d9bcdf3f3dd4f67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-recommends-completely-deactivate-wi-fi-whe-0eecae5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT-FR%20recommends%20completely%20deactivate%20Wi-Fi%20whenever%20it%E2%80%99s%20not%20in%20use&amp;severity=medium&amp;id=693ff143d9bcdf3f3dd4f67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11670-cwe-200-exposure-of-sensitive-infor-57e69760</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11670%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=medium&amp;id=693fedd0d9bcdf3f3dd41433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atlassian-patches-critical-apache-tika-flaw-47955dff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atlassian%20Patches%20Critical%20Apache%20Tika%20Flaw&amp;severity=critical&amp;id=693fedbcd9bcdf3f3dd41015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37731-cwe-287-improper-authentication-in--c4df8dd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37731%3A%20CWE-287%20Improper%20Authentication%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=693fea3cd9bcdf3f3dd304fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-draftkings-hacker-pleads-guilty-c799614c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third%20DraftKings%20Hacker%20Pleads%20Guilty&amp;severity=medium&amp;id=693fe6b3d9bcdf3f3dce5191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14714-cwe-288-authentication-bypass-using-cd727fa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14714%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=693fea3cd9bcdf3f3dd304f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volklocker-ransomware-exposed-by-hard-coded-master-6c991677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VolkLocker%20Ransomware%20Exposed%20by%20Hard-Coded%20Master%20Key%20Allowing%20Free%20Decryption&amp;severity=high&amp;id=693fe331d9bcdf3f3dcd632a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37732-cwe-79-improper-neutralization-of-i-33a3e897</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=693fe6dbd9bcdf3f3dce5d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-stealer-spread-by-iso-phishing-emails-hitt-db941019</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Stealer%20Spread%20by%20ISO%20Phishing%20Emails%20Hitting%20Russian%20Finance%20Sector&amp;severity=medium&amp;id=6941068815f8de78ec7fc220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/700credit-data-breach-impacts-58-million-individua-db8ea5b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=700Credit%20Data%20Breach%20Impacts%205.8%20Million%20Individuals&amp;severity=medium&amp;id=693fd51fd9bcdf3f3dc8a7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakes-in-the-castle-inside-the-walls-of-python-dr-c0d471ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snakes%20in%20the%20Castle%3A%20Inside%20the%20Walls%20of%20Python-Driven%20CastleLoader%20Delivery&amp;severity=medium&amp;id=693fd19fd9bcdf3f3dc76eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-two-zero-days-tied-to-mysterious-exp-9383fbc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Two%20Zero-Days%20Tied%20to%20Mysterious%20Exploited%20Chrome%20Flaw&amp;severity=medium&amp;id=693fce1ad9bcdf3f3dc61c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14711-sql-injection-in-fantasticlbp-hotel-df384f6a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14711%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=693fc3c1d9bcdf3f3dc24d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14710-sql-injection-in-fantasticlbp-hotel-0343299c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14710%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=693fbc87d9bcdf3f3dbffad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14709-buffer-overflow-in-shiguangwu-sgwbo-9e06ff4f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14709%3A%20Buffer%20Overflow%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fb590d9bcdf3f3dbe2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14023-na-in-line-corporation-line-client--ff86cd7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14023%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=low&amp;id=693fb1fed9bcdf3f3dbd0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14022-na-in-line-corporation-line-client--dfe05da8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14022%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=high&amp;id=693fb1fed9bcdf3f3dbd0785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14021-na-in-line-corporation-line-client--29071296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14021%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=medium&amp;id=693fb1fed9bcdf3f3dbd0782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14020-na-in-line-corporation-line-client--7769a125</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14020%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20Android&amp;severity=medium&amp;id=693fb1fed9bcdf3f3dbd077f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14019-na-in-line-corporation-line-client--3c6bbad5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14019%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20Android&amp;severity=low&amp;id=693fb1fed9bcdf3f3dbd077c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14708-buffer-overflow-in-shiguangwu-sgwbo-53f42704</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14708%3A%20Buffer%20Overflow%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fae77d9bcdf3f3dbb3e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14707-command-injection-in-shiguangwu-sgw-931e2bae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14707%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fa76fd9bcdf3f3db90012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13355-cwe-79-cross-site-scripting-xss-in--df9ac663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13355%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20URL%20Shortify&amp;severity=high&amp;id=693fa76fd9bcdf3f3db9000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12684-cwe-79-cross-site-scripting-xss-in--7093858e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12684%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20URL%20Shortify&amp;severity=high&amp;id=693fa76fd9bcdf3f3db9000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11363-cwe-434-unrestricted-upload-of-file-af6f3d14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11363%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Royal%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693fa76fd9bcdf3f3db90008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14712-cwe-497-exposure-of-sensitive-syste-cc121420</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14712%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20JHENG%20GAO%20Student%20Learning%20Assessment%20and%20Support%20System&amp;severity=high&amp;id=693fa079d9bcdf3f3db5fb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volklocker-ransomware-exposed-by-hard-coded-master-dc2792a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VolkLocker%20Ransomware%20Exposed%20by%20Hard-Coded%20Master%20Key%20Allowing%20Free%20Decryption&amp;severity=low&amp;id=6941068815f8de78ec7fc223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14706-command-injection-in-shiguangwu-sgw-4786a150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14706%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693fa079d9bcdf3f3db5fb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14705-command-injection-in-shiguangwu-sgw-5b1fe27c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14705%3A%20Command%20Injection%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=critical&amp;id=693f9960d9bcdf3f3db32099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14704-path-traversal-in-shiguangwu-sgwbox-f43657a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14704%3A%20Path%20Traversal%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=medium&amp;id=693f95ffd9bcdf3f3db20cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14703-improper-authentication-in-shiguang-2b16c39b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14703%3A%20Improper%20Authentication%20in%20Shiguangwu%20sgwbox%20N3&amp;severity=medium&amp;id=693f8b50d9bcdf3f3da77ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67907-706df7bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67907&amp;severity=null&amp;id=693f87d9d9bcdf3f3da2a96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14702-path-traversal-in-smartbit-commv-sm-e90913a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14702%3A%20Path%20Traversal%20in%20Smartbit%20CommV%20Smartschool%20App&amp;severity=medium&amp;id=693f87d9d9bcdf3f3da2a967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13740-cwe-79-improper-neutralization-of-i-d404172e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13740%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20someguy9%20Lightweight%20Accordion&amp;severity=medium&amp;id=693f87d9d9bcdf3f3da2a963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14699-path-traversal-in-municorn-fax-app-7fc9a4fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14699%3A%20Path%20Traversal%20in%20Municorn%20FAX%20App&amp;severity=medium&amp;id=693f7e6cb0f1e1d5304c6a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14698-path-traversal-in-atlaszz-ai-photo--7466cca7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14698%3A%20Path%20Traversal%20in%20atlaszz%20AI%20Photo%20Team%20Galleryit%20App&amp;severity=medium&amp;id=693f898ad9bcdf3f3da64752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14697-files-or-directories-accessible-in--f7a7303d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14697%3A%20Files%20or%20Directories%20Accessible%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=693f898ad9bcdf3f3da6474b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14696-weak-password-recovery-in-shenzhen--53664c48</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14696%3A%20Weak%20Password%20Recovery%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=693f6ccdb0f1e1d5304319ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14695-dynamically-managed-code-resources--d30fa4cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14695%3A%20Dynamically-Managed%20Code%20Resources%20in%20SamuNatsu%20HaloBot&amp;severity=medium&amp;id=693f6265b0f1e1d5303925e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14694-sql-injection-in-ketr-jepaas-5d7f7428</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14694%3A%20SQL%20Injection%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=693f5b33b0f1e1d53033ca22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14693-symlink-following-in-ugreen-dh2100-cbc10b10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14693%3A%20Symlink%20Following%20in%20Ugreen%20DH2100%2B&amp;severity=high&amp;id=693f5b33b0f1e1d53033ca1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-15-5179208d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-15&amp;severity=medium&amp;id=6940a486d9bcdf3f3d0c54db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55895-na-027eb7e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55895%3A%20n%2Fa&amp;severity=critical&amp;id=694076f2d9bcdf3f3d023769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38913-na-9407046e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38913%3A%20n%2Fa&amp;severity=medium&amp;id=694076f2d9bcdf3f3d023765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36338-na-ec042ebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36338%3A%20n%2Fa&amp;severity=medium&amp;id=694076f2d9bcdf3f3d023761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55703-na-77aee29e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55703%3A%20n%2Fa&amp;severity=low&amp;id=694068d4d9bcdf3f3dfeb541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67809-na-e0da105a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67809%3A%20n%2Fa&amp;severity=medium&amp;id=6940654ed9bcdf3f3dfde263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65213-na-4ff21a86</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65213%3A%20n%2Fa&amp;severity=critical&amp;id=69405ac4d9bcdf3f3dfb23d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51962-na-ce7addc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51962%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36337-na-f317b36b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36337%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65835-na-81efe64d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65835%3A%20n%2Fa&amp;severity=medium&amp;id=69405ac4d9bcdf3f3dfb23c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65176-na-fac74852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65176%3A%20n%2Fa&amp;severity=high&amp;id=69405ac4d9bcdf3f3dfb23bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kunai-analysis-report-malware-sample-abusing-open--aba43cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kunai%20Analysis%20Report%20-%20Malware%20Sample%20Abusing%20Open%20Recursive%20DNS%20for%20Exfiltration&amp;severity=medium&amp;id=69405ab7d9bcdf3f3dfb1be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66438-na-e5f56ca0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66438%3A%20n%2Fa&amp;severity=critical&amp;id=69404938d9bcdf3f3df4a610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66440-na-521cb8e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66440%3A%20n%2Fa&amp;severity=critical&amp;id=694045bfd9bcdf3f3df2bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66439-na-1a777ee7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66439%3A%20n%2Fa&amp;severity=critical&amp;id=694045bfd9bcdf3f3df2be9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66437-na-5300a490</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66437%3A%20n%2Fa&amp;severity=high&amp;id=694045bfd9bcdf3f3df2be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66436-na-589804a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66436%3A%20n%2Fa&amp;severity=medium&amp;id=694045bfd9bcdf3f3df2be97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55901-na-11eafa79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55901%3A%20n%2Fa&amp;severity=medium&amp;id=69404222d9bcdf3f3df0a143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55893-na-29151203</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55893%3A%20n%2Fa&amp;severity=medium&amp;id=69404222d9bcdf3f3df0a13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66435-na-9669dd17</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66435%3A%20n%2Fa&amp;severity=medium&amp;id=69403ea1d9bcdf3f3deea90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66434-na-34073bfb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66434%3A%20n%2Fa&amp;severity=high&amp;id=69403ea1d9bcdf3f3deea906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65742-na-dcdf4357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65742%3A%20n%2Fa&amp;severity=high&amp;id=69403ea1d9bcdf3f3deea902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60786-na-b147fe3b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60786%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de9937e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44599-na-41f8cf07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44599%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de9937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44598-na-6e5e7c3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44598%3A%20n%2Fa&amp;severity=high&amp;id=69403410d9bcdf3f3de99376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66963-na-dea6632a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66963%3A%20n%2Fa&amp;severity=medium&amp;id=69403091d9bcdf3f3de86a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66843-na-99552eba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66843%3A%20n%2Fa&amp;severity=medium&amp;id=69403091d9bcdf3f3de86a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66844-na-3fcfcd51</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66844%3A%20n%2Fa&amp;severity=critical&amp;id=69403091d9bcdf3f3de86a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65782-na-3ca73d4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65782%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65781-na-21d62d3f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65781%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65780-na-e3dbf689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65780%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65779-na-b5420b02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65779%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65778-na-9af62770</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65778%3A%20n%2Fa&amp;severity=high&amp;id=694017f1d9bcdf3f3ddec583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65431-na-40b8f153</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65431%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65430-na-fa2935d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65430%3A%20n%2Fa&amp;severity=medium&amp;id=694017f1d9bcdf3f3ddec57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67901-cwe-1284-improper-validation-of-spe-52d7049e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67901%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20kristapsdz%20openrsync&amp;severity=medium&amp;id=693f50a7b0f1e1d5302d6805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14692-open-redirect-in-mayan-edms-1827b2b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14692%3A%20Open%20Redirect%20in%20Mayan%20EDMS&amp;severity=medium&amp;id=693f4d23b0f1e1d5302caa57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14691-cross-site-scripting-in-mayan-edms-f917a4a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14691%3A%20Cross%20Site%20Scripting%20in%20Mayan%20EDMS&amp;severity=medium&amp;id=693f461cb0f1e1d5302a462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67900-cwe-829-inclusion-of-functionality--155a752c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67900%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20NXLog%20NXLog%20Agent&amp;severity=high&amp;id=693f42a8b0f1e1d53029ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67899-cwe-674-uncontrolled-recursion-in-u-26411a0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67899%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20uriparser%20project%20uriparser&amp;severity=low&amp;id=693f3b90b0f1e1d530275ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capabilities-are-the-only-way-to-secure-agent-dele-18321400</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Capabilities%20Are%20the%20Only%20Way%20to%20Secure%20Agent%20Delegation&amp;severity=medium&amp;id=693f380eb0f1e1d530263cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-paypal-subscriptions-abused-to-send-fake-pu-fc28d827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%3A%20PayPal%20subscriptions%20abused%20to%20send%20fake%20purchase%20emails&amp;severity=high&amp;id=693f2d7db0f1e1d5302341e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14674-injection-in-aizuda-snail-job-6d238b41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14674%3A%20Injection%20in%20aizuda%20snail-job&amp;severity=medium&amp;id=693effcdb0f1e1d53011dae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14673-heap-based-buffer-overflow-in-gmg13-211600e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14673%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=693ef8c5b0f1e1d5300e83c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14672-heap-based-buffer-overflow-in-gmg13-0335456d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14672%3A%20Heap-based%20Buffer%20Overflow%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=693effcdb0f1e1d53011daec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14668-sql-injection-in-campcodes-advanced-136e252d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14668%3A%20SQL%20Injection%20in%20campcodes%20Advanced%20Online%20Examination%20System&amp;severity=medium&amp;id=693ee8f15a3f956d14b1f862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-462-released-sun-dec-14th-8d0ac67a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.6.2%20Released%2C%20(Sun%2C%20Dec%2014th)&amp;severity=medium&amp;id=693ee1e95a3f956d14aa014a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14667-sql-injection-in-itsourcecode-covid-234f0a01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14667%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693ee1f85a3f956d14aa0f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14666-sql-injection-in-itsourcecode-covid-02dbd20a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14666%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693edcf93c5c518da22e3b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14665-stack-based-buffer-overflow-in-tend-27bfc3c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14665%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20WH450&amp;severity=critical&amp;id=693ed5ec3c5c518da224526c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14664-sql-injection-in-campcodes-supplier-d2ff4a37</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14664%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ecdcc5f8758ba47d4695a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14663-cross-site-scripting-in-code-projec-c2f0e7d1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14663%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693ec6c15f8758ba47c9dbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14662-cross-site-scripting-in-code-projec-95dd2efe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14662%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693ebffd5f8758ba47c2e121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14661-sql-injection-in-itsourcecode-stude-b38cfc67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14661%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Managemen%20System&amp;severity=medium&amp;id=693ebaa4cd21bcc771e2fc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14660-improper-access-controls-in-decocms-44e20bbd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14660%3A%20Improper%20Access%20Controls%20in%20DecoCMS%20Mesh&amp;severity=medium&amp;id=693ebe20cd21bcc771e7ab9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-found-an-unsecured-16tb-database-containin-f1eb7b4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20found%20an%20unsecured%2016TB%20database%20containing%204.3B%20professional%20records&amp;severity=high&amp;id=693ea79451e054acf32ab656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14659-command-injection-in-d-link-dir-860-f54db216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14659%3A%20Command%20Injection%20in%20D-Link%20DIR-860LB1&amp;severity=high&amp;id=693eaea151e054acf3354728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14656-buffer-overflow-in-tenda-ac20-26c310a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14656%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e9ba865369625b09f1b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14655-stack-based-buffer-overflow-in-tend-e9864b69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14655%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e949f65369625b096c0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14654-stack-based-buffer-overflow-in-tend-a5f2ddfb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14654%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=693e9015f795bf52904ccd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14653-sql-injection-in-itsourcecode-stude-b19caa17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14653%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e84eaf795bf52903ec977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14652-sql-injection-in-itsourcecode-onlin-5ce71ab1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14652%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e7fbd6ded7774d2f4ad11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14651-use-of-hard-coded-cryptographic-key-b47d6645</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14651%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20MartialBE%20one-hub&amp;severity=medium&amp;id=693e78bf6ded7774d2ea03fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14650-sql-injection-in-itsourcecode-onlin-47026e3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14650%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e71bf6ded7774d2e18b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14649-sql-injection-in-itsourcecode-onlin-c9589dbc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14649%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Cake%20Ordering%20System&amp;severity=medium&amp;id=693e69fde4d3911676ba2e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14648-command-injection-in-dedebiz-49cc483b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14648%3A%20Command%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=693e6316e4d3911676b3275d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14647-sql-injection-in-code-projects-comp-07a7d828</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14647%3A%20SQL%20Injection%20in%20code-projects%20Computer%20Book%20Store&amp;severity=medium&amp;id=693e5e61b7454206b45b08df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14646-sql-injection-in-code-projects-stud-24edb2dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14646%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e53edb7454206b44f10e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12696-cwe-862-missing-authorization-in-he-491a2493</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12696%3A%20CWE-862%20Missing%20Authorization%20in%20HelloLeads%20CRM%20Form%20Shortcode&amp;severity=medium&amp;id=693e53edb7454206b44f10df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14645-sql-injection-in-code-projects-stud-a4a92679</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14645%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e4f9cc223240c4b621aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12537-cwe-79-improper-neutralization-of-i-e159bef2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpvibes%20Addon%20Elements%20for%20Elementor%20(formerly%20Elementor%20Addon%20Elements)&amp;severity=medium&amp;id=693e4c24c223240c4b5cf0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67897-cwe-195-signed-to-unsigned-conversi-9c7a013f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67897%3A%20CWE-195%20Signed%20to%20Unsigned%20Conversion%20Error%20in%20sequoia-pgp%20sequoia&amp;severity=medium&amp;id=693e40e9230e04755d15db8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13126-cwe-89-improper-neutralization-of-s-ffb42f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13126%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=693e3d5a230e04755d107f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14644-sql-injection-in-itsourcecode-stude-37855f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14644%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e35e094fb796273326d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14643-sql-injection-in-code-projects-simp-df9097a8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14643%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Attendance%20Record%20System&amp;severity=medium&amp;id=693e2ed894fb7962733072cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14642-unrestricted-upload-in-code-project-207e6f9c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14642%3A%20Unrestricted%20Upload%20in%20code-projects%20Computer%20Laboratory%20System&amp;severity=medium&amp;id=693e27da94fb7962732e5068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14641-unrestricted-upload-in-code-project-0a55ce91</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14641%3A%20Unrestricted%20Upload%20in%20code-projects%20Computer%20Laboratory%20System&amp;severity=medium&amp;id=693e27da94fb7962732e5061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14640-sql-injection-in-code-projects-stud-698edd21</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14640%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693e1d4594fb7962731e0cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-calls-in-russian-ambassador-over-air-traff-33638060</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20calls%20in%20Russian%20Ambassador%20over%20air%20traffic%20control%20hack%20claims&amp;severity=medium&amp;id=693e136e94fb7962731203ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14639-sql-injection-in-itsourcecode-stude-7b68f121</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14639%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693e138194fb7962731227f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14638-sql-injection-in-itsourcecode-onlin-13472fa1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14638%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693e0bb194fb796273058a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-14-4d892203</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-14&amp;severity=medium&amp;id=693f5421b0f1e1d5302e7a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-still-using-the-finger-sat-dec-13-a56ccd28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Still%20Using%20the%20Finger%2C%20(Sat%2C%20Dec%2013th)&amp;severity=medium&amp;id=693dc1e296904561db586efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14637-sql-injection-in-itsourcecode-onlin-35753e1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14637%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693dc1f196904561db587985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14636-use-of-weak-hash-in-tenda-ax9-53457b65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14636%3A%20Use%20of%20Weak%20Hash%20in%20Tenda%20AX9&amp;severity=medium&amp;id=693dbe2f5e445230437e2446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14623-sql-injection-in-code-projects-stud-02390b1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14623%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693db0395e445230436e3a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14622-sql-injection-in-code-projects-stud-5647dab3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14622%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693db0395e445230436e3a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-sierra-wireless-route-cd87c321</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20Sierra%20Wireless%20Router%20Flaw%20Enabling%20RCE%20Attacks&amp;severity=high&amp;id=693da3ef241bd09a9280dfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14621-sql-injection-in-code-projects-stud-5007c55f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14621%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d9a7ada1dfeffd84e3e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14620-sql-injection-in-code-projects-stud-c7eb4f56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14620%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d92a3da1dfeffd840fc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/offline-decryption-messenger-concept-proposal-and--2fe27b4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Offline%20Decryption%20Messenger%3A%20Concept%20Proposal%20and%20Request%20for%20Constructive%20Feedback&amp;severity=medium&amp;id=693d8f20da1dfeffd83d88f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uks-ico-fine-lastpass-12-million-over-2022-securit-d610bc22</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%E2%80%99s%20ICO%20Fine%20LastPass%20%C2%A31.2%20Million%20Over%202022%20Security%20Breach&amp;severity=high&amp;id=693d88810ce66cbce37cbabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14619-sql-injection-in-code-projects-stud-d42ce29c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14619%3A%20SQL%20Injection%20in%20code-projects%20Student%20File%20Management%20System&amp;severity=medium&amp;id=693d88960ce66cbce37d0915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14617-path-traversal-in-jehovahs-witnesse-98452149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14617%3A%20Path%20Traversal%20in%20Jehovahs%20Witnesses%20JW%20Library%20App&amp;severity=medium&amp;id=693d75402c268cf8855cb26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14607-memory-corruption-in-offis-dcmtk-8717237e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14607%3A%20Memory%20Corruption%20in%20OFFIS%20DCMTK&amp;severity=medium&amp;id=693d666c38f0070a6570c1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-actively-exploited-sierra-wireless-route-7362fe33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Actively%20Exploited%20Sierra%20Wireless%20Router%20Flaw%20Enabling%20RCE%20Attacks&amp;severity=high&amp;id=693d796a2c268cf8856201af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14606-deserialization-in-tiny-rdm-tiny-rd-78dae41c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14606%3A%20Deserialization%20in%20tiny-rdm%20Tiny%20RDM&amp;severity=low&amp;id=693d630838f0070a656ba6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14590-sql-injection-in-code-projects-pris-c1f2133c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14590%3A%20SQL%20Injection%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=693d5cc238f0070a6566cb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14589-sql-injection-in-code-projects-pris-34679355</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14589%3A%20SQL%20Injection%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=693d41eacfba580c44f20e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14588-sql-injection-in-itsourcecode-stude-c7295743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14588%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693d3aaccf86d060b98c8baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14542-cwe-501-trust-boundary-violation-15837d61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14542%3A%20CWE-501%20Trust%20Boundary%20Violation&amp;severity=high&amp;id=693d3aaccf86d060b98c8ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-security-updates-after-two-webkit-fla-f7cb6e1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Issues%20Security%20Updates%20After%20Two%20WebKit%20Flaws%20Found%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=693d3a72cf86d060b98c5eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14587-sql-injection-in-itsourcecode-onlin-1551ef15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14587%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Pet%20Shop%20Management%20System&amp;severity=medium&amp;id=693d36fbcf86d060b987576b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8780-cwe-79-improper-neutralization-of-in-7b0d5872</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20SiteOrigin%20Widgets&amp;severity=medium&amp;id=693d2749f35c2264d84723aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9856-cwe-79-improper-neutralization-of-in-ac2e0cce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=693d2749f35c2264d84723b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8687-cwe-79-improper-neutralization-of-in-aa917f6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=693d2749f35c2264d84723a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8199-cwe-79-improper-neutralization-of-in-f220f592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8199%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debuggersstudio%20Marquee%20Addons%20for%20Elementor%20%E2%80%93%20Advanced%20Elements%20%26%20Modern%20Motion%20Widgets&amp;severity=medium&amp;id=693d2749f35c2264d84723a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8195-cwe-79-improper-neutralization-of-in-7dfbef45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8195%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=693d2747f35c2264d8472304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0969-cwe-359-exposure-of-private-personal-52597f6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0969%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=693d2747f35c2264d84722e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7960-cwe-79-improper-neutralization-of-in-3b2a27de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%204%2C000%2B%20ready%20Elementor%20sections%2C%20650%2B%20templates%2C%2070%2B%20FREE%20widgets%20for%20Elementor&amp;severity=medium&amp;id=693d2747f35c2264d8472300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36747-cwe-798-use-of-hard-coded-credentia-55cb0be8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36747%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36752-cwe-798-use-of-hard-coded-credentia-6ed12f6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36752%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36754-cwe-290-authentication-bypass-by-sp-a4d6b30d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36754%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36748-cwe-79-improper-neutralization-of-i-8e97e071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36750-cwe-79-improper-neutralization-of-i-0ce8ddc5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36753-cwe-290-authentication-bypass-by-sp-4f3c0251</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36753%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Growatt%20ShineLan-X&amp;severity=high&amp;id=693d2747f35c2264d84722f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36751-cwe-311-missing-encryption-of-sensi-f552bd97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36751%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Growatt%20ShineLan-X&amp;severity=critical&amp;id=693d2747f35c2264d84722f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/building-an-open-source-ai-powered-auto-exploiter--9194f102</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Building%20an%20Open-Source%20AI-Powered%20Auto-Exploiter%20with%20a%201.7B%20Parameter%20Model&amp;severity=high&amp;id=693d1dc5dd056aa40b78a293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10289-cwe-89-improper-neutralization-of-s-c5987c83</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10289%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wssoffice21%20Filter%20%26%20Grids&amp;severity=medium&amp;id=693d169bdd056aa40b71808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8779-cwe-79-improper-neutralization-of-in-040eeb06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shamsbd71%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=693d169bdd056aa40b718091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9207-cwe-20-improper-input-validation-in--47a9b844</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9207%3A%20CWE-20%20Improper%20Input%20Validation%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=693d169bdd056aa40b718096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10738-cwe-89-improper-neutralization-of-s-08eed048</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10738%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rupok98%20URL%20Shortener%20Plugin%20For%20WordPress&amp;severity=critical&amp;id=693d0b25fa0068b267d3239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14586-os-command-injection-in-totolink-x5-c2536654</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14586%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20X5000R&amp;severity=medium&amp;id=693d0b25fa0068b267d323a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9116-cwe-79-cross-site-scripting-xss-in-w-c44cc957</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9116%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPS%20Visitor%20Counter&amp;severity=medium&amp;id=693d05d0fa0068b267cfe0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12362-cwe-862-missing-authorization-in-sa-686288c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12362%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20myCred%20%E2%80%93%20Points%20Management%20System%20For%20Gamification%2C%20Ranks%2C%20Badges%2C%20and%20Loyalty%20Program.&amp;severity=medium&amp;id=693cff4ed69a8ed577177bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-security-updates-after-two-webkit-fla-ad401b82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Issues%20Security%20Updates%20After%20Two%20WebKit%20Flaws%20Found%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=693d796a2c268cf8856201b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14446-cwe-862-missing-authorization-in-gh-37afa328</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14446%3A%20CWE-862%20Missing%20Authorization%20in%20ghozylab%20Popup%20Builder&amp;severity=medium&amp;id=693cef65d977419e584a508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11693-cwe-200-exposure-of-sensitive-infor-d010e42a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11693%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20recorp%20Export%20WP%20Pages%20to%20HTML%20%26%20PDF%20%E2%80%93%20Simply%20Create%20a%20Static%20Website&amp;severity=critical&amp;id=693cef62d977419e584a4fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9488-cwe-79-improper-neutralization-of-in-21b8e657</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20Redux%20Framework&amp;severity=medium&amp;id=693cef67d977419e584a527e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12109-cwe-79-improper-neutralization-of-i-172775d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12109%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahethekiller%20Header%20Footer%20Script%20Adder%20%E2%80%93%20Insert%20Code%20in%20Header%2C%20Body%20%26%20Footer&amp;severity=medium&amp;id=693cef62d977419e584a4fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13092-cwe-862-missing-authorization-in-aj-31fad52d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13092%3A%20CWE-862%20Missing%20Authorization%20in%20ajitdas%20Devs%20CRM%20%E2%80%93%20Manage%20tasks%2C%20attendance%20and%20teams%20all%20together&amp;severity=medium&amp;id=693cef62d977419e584a4fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14394-cwe-352-cross-site-request-forgery--b0984d25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20melodicmedia%20Popover%20Windows&amp;severity=medium&amp;id=693cef64d977419e584a5039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14365-cwe-862-missing-authorization-in-du-93846379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14365%3A%20CWE-862%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=medium&amp;id=693cef64d977419e584a5026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12077-cwe-79-improper-neutralization-of-i-90c8a3a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP%20to%20LinkedIn%20Auto%20Publish&amp;severity=medium&amp;id=693cef62d977419e584a4fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11164-cwe-862-missing-authorization-in-cr-d234eee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11164%3A%20CWE-862%20Missing%20Authorization%20in%20creativthemes%20Mavix%20Education&amp;severity=medium&amp;id=693cef62d977419e584a4fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11707-cwe-330-use-of-insufficiently-rando-c34fa2c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11707%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20webfactory%20Login%20Lockdown%20%26%20Protection&amp;severity=medium&amp;id=693cef62d977419e584a4fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14440-cwe-565-reliance-on-cookies-without-51904fb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14440%3A%20CWE-565%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20jayarsiech%20JAY%20Login%20%26%20Register&amp;severity=critical&amp;id=693cef65d977419e584a508b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14508-cwe-862-missing-authorization-in-ya-055ddbcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14508%3A%20CWE-862%20Missing%20Authorization%20in%20yalogica%20MediaCommander%20%E2%80%93%20Bring%20Folders%20to%20Media%2C%20Posts%2C%20and%20Pages&amp;severity=medium&amp;id=693cef65d977419e584a50b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14539-cwe-94-improper-control-of-generati-78707cd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rang501%20Shortcode%20Ajax&amp;severity=medium&amp;id=693cef65d977419e584a50b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8617-cwe-79-improper-neutralization-of-in-c82c23f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20WooCommerce%20Quick%20View&amp;severity=medium&amp;id=693cef67d977419e584a5273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14367-cwe-862-missing-authorization-in-co-5c81d537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14367%3A%20CWE-862%20Missing%20Authorization%20in%20corsonr%20Easy%20Theme%20Options&amp;severity=medium&amp;id=693cef64d977419e584a5030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7058-cwe-79-improper-neutralization-of-in-47b06241</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Kingcabs&amp;severity=medium&amp;id=693cef67d977419e584a526e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12076-cwe-79-improper-neutralization-of-i-d77b7073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20Social%20Media%20Auto%20Publish&amp;severity=medium&amp;id=693cef62d977419e584a4fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13093-cwe-862-missing-authorization-in-aj-d92aa8b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13093%3A%20CWE-862%20Missing%20Authorization%20in%20ajitdas%20Devs%20CRM%20%E2%80%93%20Manage%20tasks%2C%20attendance%20and%20teams%20all%20together&amp;severity=medium&amp;id=693cef64d977419e584a5014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13077-cwe-89-improper-neutralization-of-s-80e91189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13077%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20payamito%20%D8%A7%D9%81%D8%B2%D9%88%D9%86%D9%87%20%D9%BE%DB%8C%D8%A7%D9%85%DA%A9%20%D9%88%D9%88%DA%A9%D8%A7%D9%85%D8%B1%D8%B3%20%D9%81%D9%88%D9%82%20%D8%AD%D8%B1%D9%81%D9%87%20%D8%A7%DB%8C%20(%D8%AC%D8%AF%DB%8C%D8%AF)%20payamito%20sms%20woocommerce&amp;severity=high&amp;id=693cef62d977419e584a4fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14451-cwe-601-url-redirection-to-untruste-3141468e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14451%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20solutionsbysteve%20Solutions%20Ad%20Manager&amp;severity=medium&amp;id=693cef65d977419e584a5099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9218-cwe-862-missing-authorization-in-rtc-0bf41431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9218%3A%20CWE-862%20Missing%20Authorization%20in%20rtcamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=low&amp;id=693cef67d977419e584a5279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14288-cwe-862-missing-authorization-in-ga-b8cb4c68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14288%3A%20CWE-862%20Missing%20Authorization%20in%20gallerycreator%20Gallery%20Blocks%20with%20Lightbox.%20Image%20Gallery%2C%20(HTML5%20video%20%2C%20YouTube%2C%20Vimeo)%20Video%20Gallery%20and%20Lightbox%20for%20native%20gallery&amp;severity=medium&amp;id=693cef64d977419e584a5021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13705-cwe-79-improper-neutralization-of-i-b90c4c4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blakelong%20Custom%20Frames&amp;severity=medium&amp;id=693cef64d977419e584a501c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14476-cwe-502-deserialization-of-untruste-dfa78ab0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14476%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20unitecms%20Doubly%20%E2%80%93%20Cross%20Domain%20Copy%20Paste%20for%20WordPress&amp;severity=high&amp;id=693cef65d977419e584a50ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14475-cwe-98-improper-control-of-filename-a5e88b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14475%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nenad-obradovic%20Extensive%20VC%20Addons%20for%20WPBakery%20page%20builder&amp;severity=high&amp;id=693cef65d977419e584a50a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14462-cwe-352-cross-site-request-forgery--a80032df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14462%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20owais4377%20Lucky%20Draw%20Contests&amp;severity=medium&amp;id=693cef65d977419e584a509e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11376-cwe-79-improper-neutralization-of-i-6269575a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=693cef62d977419e584a4fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13094-cwe-434-unrestricted-upload-of-file-7b235ab5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13094%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wp3d%20WP3D%20Model%20Import%20Viewer&amp;severity=high&amp;id=693cef64d977419e584a5018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14447-cwe-862-missing-authorization-in-pc-67d8d364</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14447%3A%20CWE-862%20Missing%20Authorization%20in%20pcantoni%20AnnunciFunebri%20Impresa&amp;severity=medium&amp;id=693cef65d977419e584a5094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14397-cwe-862-missing-authorization-in-fr-88bbb22e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14397%3A%20CWE-862%20Missing%20Authorization%20in%20franciscopalacios%20Postem%20Ipsum&amp;severity=high&amp;id=693cef65d977419e584a5087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14378-cwe-79-improper-neutralization-of-i-15c9df4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeregion%20Quick%20Testimonials&amp;severity=medium&amp;id=693cef64d977419e584a5035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14366-cwe-862-missing-authorization-in-du-1c33d54d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14366%3A%20CWE-862%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=medium&amp;id=693cef64d977419e584a502b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9873-cwe-79-improper-neutralization-of-in-22f15364</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20a3%20Lazy%20Load&amp;severity=medium&amp;id=693cef67d977419e584a5284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14395-cwe-862-missing-authorization-in-me-a0edaadc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14395%3A%20CWE-862%20Missing%20Authorization%20in%20melodicmedia%20Popover%20Windows&amp;severity=medium&amp;id=693cef64d977419e584a503d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11970-cwe-918-server-side-request-forgery-7913ba3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11970%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20emplibot%20Emplibot%20%E2%80%93%20AI%20Content%20Writer%20with%20Keyword%20Research%2C%20Infographics%2C%20and%20Linking%20%7C%20SEO%20Optimized%20%7C%20Fully%20Automated&amp;severity=medium&amp;id=693cef62d977419e584a4fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14454-cwe-352-cross-site-request-forgery--82bb628a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Image%20Slider%20by%20Ays-%20Responsive%20Slider%20and%20Carousel&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14050-cwe-89-improper-neutralization-of-s-02d0e604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14050%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uxl%20Design%20Import%2FExport%20%E2%80%93%20Styles%2C%20Templates%2C%20Template%20Parts%20and%20Patterns&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13089-cwe-89-improper-neutralization-of-s-39a10248</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13089%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=high&amp;id=693ce0d37c4acd10e84d925b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14278-cwe-79-improper-neutralization-of-i-bd6716ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20HT%20Slider%20For%20Elementor&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14056-cwe-79-improper-neutralization-of-i-b168ccba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdevstudios%20Custom%20Post%20Type%20UI&amp;severity=medium&amp;id=693ce0d37c4acd10e84d926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12512-cwe-200-exposure-of-sensitive-infor-d96935a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12512%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14581-cwe-862-missing-authorization-in-vi-a15f8241</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14581%3A%20CWE-862%20Missing%20Authorization%20in%20villatheme%20HAPPY%20%E2%80%93%20Helpdesk%20Support%20Ticket%20System&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14477-cwe-89-improper-neutralization-of-s-8ee7385d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aaron13100%20404%20Solution&amp;severity=medium&amp;id=693ce0d37c4acd10e84d927e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13403-cwe-862-missing-authorization-in-em-c55ad222</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13403%3A%20CWE-862%20Missing%20Authorization%20in%20emarket-design%20Employee%20Spotlight%20%E2%80%93%20Team%20Member%20Showcase%20%26%20Meet%20the%20Team%20Plugin&amp;severity=medium&amp;id=693ce0d37c4acd10e84d9260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-microsoft-teams-and-google-meet-downloads-spr-8cacf627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Microsoft%20Teams%20and%20Google%20Meet%20Downloads%20Spread%20Oyster%20Backdoor&amp;severity=medium&amp;id=693cb109b3e344112f52a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-13-1948210f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-13&amp;severity=medium&amp;id=693e00181ee4c1247d8579ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brickstorm-backdoor-mar-251165c1v1-e9af8144</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRICKSTORM%20Backdoor%20%20-%20MAR-251165.c1.v1&amp;severity=medium&amp;id=693d8f0cda1dfeffd83d742d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14585-sql-injection-in-itsourcecode-covid-8fc482c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14585%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693c99885292e65bc6167f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14584-sql-injection-in-itsourcecode-covid-3581ea2d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14584%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=693c99885292e65bc6167f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67721-cwe-201-insertion-of-sensitive-info-9e76d5da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67721%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20airlift%20aircompressor&amp;severity=medium&amp;id=693c99885292e65bc6167f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14583-unrestricted-upload-in-campcodes-on-61c8170c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14583%3A%20Unrestricted%20Upload%20in%20campcodes%20Online%20Student%20Enrollment%20System&amp;severity=medium&amp;id=693c958a5292e65bc6123153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14582-unrestricted-upload-in-campcodes-on-49946dba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14582%3A%20Unrestricted%20Upload%20in%20campcodes%20Online%20Student%20Enrollment%20System&amp;severity=medium&amp;id=693c958a5292e65bc612314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14611-vulnerability-in-gladinet-centresta-e4cb3dcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14611%3A%20Vulnerability%20in%20Gladinet%20CentreStack%20and%20TrioFox&amp;severity=high&amp;id=693c8579f55ccbd2c799d2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43518-an-app-may-be-able-to-inappropriate-07489bb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43518%3A%20An%20app%20may%20be%20able%20to%20inappropriately%20access%20files%20through%20the%20spellcheck%20API%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43522-an-app-may-be-able-to-access-user-s-76060859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43522%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43467-an-app-may-be-able-to-gain-root-pri-aa5ce0fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43467%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857bf55ccbd2c799d327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43471-an-app-may-be-able-to-access-sensit-baf40b9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43471%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43406-an-app-may-be-able-to-access-sensit-42ecb5ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43406%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43410-an-attacker-with-physical-access-ma-7a4c5b43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43410%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20view%20deleted%20notes%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43538-an-app-may-be-able-to-access-sensit-82249638</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43538%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43539-processing-a-file-may-lead-to-memor-3167418b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43539%3A%20Processing%20a%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43542-password-fields-may-be-unintentiona-f3880dc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43542%3A%20Password%20fields%20may%20be%20unintentionally%20revealed%20when%20remotely%20controlling%20a%20device%20over%20FaceTime%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43470-a-standard-user-may-be-able-to-view-25e5cebd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43470%3A%20A%20standard%20user%20may%20be%20able%20to%20view%20files%20made%20from%20a%20disk%20image%20belonging%20to%20an%20administrator%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43523-an-app-may-be-able-to-access-sensit-d3d5352c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43523%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43466-an-app-may-be-able-to-access-sensit-d3f98a04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43466%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43519-an-app-may-be-able-to-access-sensit-282ddde6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43519%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857ff55ccbd2c799d3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43512-an-app-may-be-able-to-elevate-privi-db51bec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43512%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43416-an-app-may-be-able-to-access-protec-b51956c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43416%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=693c857bf55ccbd2c799d30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43482-an-app-may-be-able-to-cause-a-denia-b790be61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43482%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46287-an-attacker-may-be-able-to-spoof-th-d3989ce5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46287%3A%20An%20attacker%20may%20be%20able%20to%20spoof%20their%20FaceTime%20caller%20ID%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=693c8581f55ccbd2c799d98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43494-an-attacker-may-be-able-to-cause-a--b39d8ca2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43494%3A%20An%20attacker%20may%20be%20able%20to%20cause%20a%20persistent%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43461-an-app-may-be-able-to-access-protec-c971b4cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43461%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43532-processing-malicious-data-may-lead--33a20304</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43532%3A%20Processing%20malicious%20data%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43437-an-app-may-be-able-to-fingerprint-t-2df07c4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43437%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c857bf55ccbd2c799d313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43509-an-app-may-be-able-to-access-sensit-d388ee1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43509%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43381-a-malicious-app-may-be-able-to-dele-c823cfa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43381%3A%20A%20malicious%20app%20may%20be%20able%20to%20delete%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43513-an-app-may-be-able-to-read-sensitiv-39e79f0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43513%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46285-an-app-may-be-able-to-gain-root-pri-a88a0e43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46285%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c8581f55ccbd2c799d989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43506-icloud-private-relay-may-not-activa-48e060af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43506%3A%20iCloud%20Private%20Relay%20may%20not%20activate%20when%20more%20than%20one%20user%20is%20logged%20in%20at%20the%20same%20time%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857df55ccbd2c799d36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43510-a-malicious-application-may-cause-u-bad5be46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43510%3A%20A%20malicious%20application%20may%20cause%20unexpected%20changes%20in%20memory%20shared%20between%20processes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=693c857df55ccbd2c799d376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43402-an-app-may-be-able-to-cause-unexpec-9ddec6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43402%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=693c8579f55ccbd2c799d2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43530-an-app-may-be-able-to-access-sensit-087d9b6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43530%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46289-an-app-may-be-able-to-access-protec-48947548</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46289%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8581f55ccbd2c799d991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43463-an-app-may-be-able-to-access-sensit-5be9bf76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43463%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43320-an-app-may-be-able-to-bypass-launch-e0fcbed2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43320%3A%20An%20app%20may%20be%20able%20to%20bypass%20launch%20constraint%20protections%20and%20execute%20malicious%20code%20with%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c8579f55ccbd2c799d2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43527-an-app-may-be-able-to-gain-root-pri-5d4f8a40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43527%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=693c857ff55ccbd2c799d3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43511-processing-maliciously-crafted-web--866beccc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43511%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=693c857df55ccbd2c799d380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43497-an-app-may-be-able-to-break-out-of--abb90150</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43497%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43473-an-app-may-be-able-to-access-sensit-99d654fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43473%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857df55ccbd2c799d35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46276-an-app-may-be-able-to-access-sensit-f9ee6c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46276%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=693c8581f55ccbd2c799d985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43465-an-app-may-be-able-to-access-sensit-10171174</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43465%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857bf55ccbd2c799d321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43520-a-malicious-application-may-be-able-9c96a0e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43520%3A%20A%20malicious%20application%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43388-an-app-may-be-able-to-access-sensit-3a7dd7fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43388%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43351-an-app-may-be-able-to-access-protec-655c9795</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43351%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43516-a-user-with-voice-control-enabled-m-29f8339a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43516%3A%20A%20user%20with%20Voice%20Control%20enabled%20may%20be%20able%20to%20transcribe%20another%20user&apos;s%20activity%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43404-an-app-may-be-able-to-access-sensit-ecdaa94e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43404%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c8579f55ccbd2c799d2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43393-an-app-may-be-able-to-break-out-of--4c1b39dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43393%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c8579f55ccbd2c799d2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43517-an-app-may-be-able-to-access-protec-edd90752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43517%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=693c857ff55ccbd2c799d39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43464-visiting-a-website-may-lead-to-an-a-c1bce520</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43464%3A%20Visiting%20a%20website%20may%20lead%20to%20an%20app%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857bf55ccbd2c799d31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43521-an-app-may-be-able-to-access-sensit-6943692b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43521%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=693c857ff55ccbd2c799d3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11266-cwe-787-out-of-bounds-write-in-gras-98e3097f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11266%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Grassroots%20DICOM%20(GDCM)&amp;severity=medium&amp;id=693c821af55ccbd2c7950af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67634-cwe-79-improper-neutralization-of-i-3368d246</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CISA%20Software%20Acquisition%20Guide%20Tool&amp;severity=medium&amp;id=693c7e77f55ccbd2c792b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14580-cross-site-scripting-in-qualitor-86c5b4e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14580%3A%20Cross%20Site%20Scripting%20in%20Qualitor&amp;severity=medium&amp;id=693c7e77f55ccbd2c792b9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58316-cwe-89-improper-neutralization-of-s-75b8a88f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58316%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PuneethReddyHC%20online-shopping-system-advanced&amp;severity=high&amp;id=693c7a77b31a4aba68228b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67750-cwe-94-improper-control-of-generati-d91bc995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67750%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Flow-Scanner%20lightning-flow-scanner&amp;severity=high&amp;id=693c7a77b31a4aba68228b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14578-sql-injection-in-itsourcecode-stude-5f624a28</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14578%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693c7642a3f11564d0d3b87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58314-cwe-78-improper-neutralization-of-s-7a6e1d4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58314%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ATCOM%20Technology%20co.%2C%20LTD.%20100M%20IP%20Phones&amp;severity=high&amp;id=693c7642a3f11564d0d3b893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58311-cwe-1245-improper-finite-state-mach-32a65046</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58311%3A%20CWE-1245%3A%20Improper%20Finite%20State%20Machines%20(FSMs)%20in%20Hardware%20Logic%20in%20dormakaba%20Dormakaba%20Saflok%20System%206000&amp;severity=high&amp;id=693c7642a3f11564d0d3b88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58299-cwe-121-stack-based-buffer-overflow-7ee849d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58299%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=critical&amp;id=693c7642a3f11564d0d3b889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14010-cwe-78-improper-neutralization-of-s-7831f1ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14010%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Typora&amp;severity=high&amp;id=693c7642a3f11564d0d3b884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67734-cwe-79-improper-neutralization-of-i-dfd406fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=693c72e1a3f11564d0cebd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-one-battle-after-another-torrent-hides-malwar-f0f7ea32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20%E2%80%98One%20Battle%20After%20Another%E2%80%99%20torrent%20hides%20malware%20in%20subtitles&amp;severity=high&amp;id=693c72b9a3f11564d0cea0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-data-breach-traced-to-ex-employee-who-reta-107f9445</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20data%20breach%20traced%20to%20ex-employee%20who%20retained%20system%20access&amp;severity=high&amp;id=693c72b9a3f11564d0cea0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14572-memory-corruption-in-utt-512w-2fa95b9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14572%3A%20Memory%20Corruption%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=693c72e1a3f11564d0cebd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8083-cwe-1321-improperly-controlled-modif-c5e30987</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8083%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Vuetify&amp;severity=high&amp;id=693c6f38a3f11564d0ccbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14373-inappropriate-implementation-in-goo-aedcf9d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14373%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=693c6bdfa3f11564d0c8e407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14372-use-after-free-in-google-chrome-f5bfb1f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14372%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=693c6bdfa3f11564d0c8e403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14174-out-of-bounds-memory-access-in-goog-689e7b53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14174%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=693c6bdfa3f11564d0c8e3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-osint-and-gpt-utility-github-repos-spread-pys-a03b1168</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20OSINT%20and%20GPT%20Utility%20GitHub%20Repos%20Spread%20PyStoreRAT%20Malware%20Payloads&amp;severity=medium&amp;id=693c6b3f53767fe238bb232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8082-cwe-79-improper-neutralization-of-in-1fc08562</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vuetify&amp;severity=medium&amp;id=693c630553767fe238afb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14571-sql-injection-in-projectworlds-adva-bd7d9afd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14571%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693c630553767fe238afb276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14570-sql-injection-in-projectworlds-adva-fff9f021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14570%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693c630553767fe238afb270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pystorerat-malware-targets-osint-researchers-t-b46e50dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PyStoreRAT%20Malware%20Targets%20OSINT%20Researchers%20Through%20GitHub%20Repos&amp;severity=medium&amp;id=693c592876ef5759461a92bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14569-use-after-free-in-ggml-org-whisperc-f57ef2ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14569%3A%20Use%20After%20Free%20in%20ggml-org%20whisper.cpp&amp;severity=medium&amp;id=693c5c0653767fe238a8342f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14568-sql-injection-in-haxxorsid-stock-ma-598e5b10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14568%3A%20SQL%20Injection%20in%20haxxorsid%20Stock-Management-System&amp;severity=medium&amp;id=693c5c0653767fe238a83428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14567-missing-authentication-in-haxxorsid-a179e138</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14567%3A%20Missing%20Authentication%20in%20haxxorsid%20Stock-Management-System&amp;severity=medium&amp;id=693c404ddc37602712b89673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13733-cwe-732-incorrect-permission-assign-b1c014be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13733%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dr.Buho%20BuhoNTFS&amp;severity=high&amp;id=693c3cd3dc37602712b2e436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-promptpwnd-attack-small-macos-bounti-2b649030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20PromptPwnd%20Attack%2C%20macOS%20Bounty%20Complaints%2C%20Chinese%20Hackers%20Trained%20in%20Cisco%20Academy&amp;severity=medium&amp;id=693c393adc37602712b0a19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14566-sql-injection-in-kidaze-courseselec-e5357e67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14566%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=693c45b972d8eb03a613ec58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14565-sql-injection-in-kidaze-courseselec-21484611</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14565%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=693c45b972d8eb03a613ec52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53960-cwe-1240-use-of-a-cryptographic-pri-48981d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53960%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=medium&amp;id=693c347d2e981ee9614b5b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54947-cwe-321-use-of-hard-coded-cryptogra-9ac5d2b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54947%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=medium&amp;id=693c347f2e981ee9614b5c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54981-cwe-327-use-of-a-broken-or-risky-cr-f8d9d0af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54981%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=693c347f2e981ee9614b5c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36746-cwe-79-improper-neutralization-of-i-99a76f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SolarEdge%20SolarEdge%20Monitoring%20platform%20(SaaS)&amp;severity=medium&amp;id=693c347d2e981ee9614b5bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36743-cwe1191-onchip-debug-and-test-inter-fda56fb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36743%3A%20CWE%E2%80%911191%20%E2%80%94%20On%E2%80%91Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20SolarEdge%20SE3680H&amp;severity=high&amp;id=693c347d2e981ee9614b5bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36744-cwe-1295-debug-messages-revealing-u-66f4b80e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36744%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20SolarEdge%20SE3680H&amp;severity=low&amp;id=693c347d2e981ee9614b5bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36745-cwe-1104-use-of-unmaintained-third--0f29a977</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36745%3A%20CWE-1104%20%E2%80%94%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20SolarEdge%20SE3680H&amp;severity=high&amp;id=693c347d2e981ee9614b5bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58770-cwe-280-improper-handling-of-insuff-43ffced4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58770%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20AMI%20AptioV&amp;severity=high&amp;id=693c302e2e981ee96144cd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36755-cwe-1244-internal-asset-exposed-to--74976005</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36755%3A%20CWE-1244%3A%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20CleverDisplay%20B.V.%20BlueOne%20(CleverDisplay%20Hardware%20Player)&amp;severity=low&amp;id=693c302e2e981ee96144cd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-phishing-kits-use-ai-and-mfa-bypass-t-294d398c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Phishing%20Kits%20Use%20AI%20and%20MFA%20Bypass%20Tactics%20to%20Steal%20Credentials%20at%20Scale&amp;severity=medium&amp;id=693c23bffd2a1aad42520e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-centrestack-flaw-exploited-to-hack-organi-73ae464e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20CentreStack%20Flaw%20Exploited%20to%20Hack%20Organizations&amp;severity=medium&amp;id=693c203ffd2a1aad424d3905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fieldtex-data-breach-impacts-238000-7640327b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fieldtex%20Data%20Breach%20Impacts%20238%2C000&amp;severity=medium&amp;id=693c1506b9e9371f90075e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/where-does-the-data-stolen-in-a-phishing-attack-go-f57e008a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Where%20does%20the%20data%20stolen%20in%20a%20phishing%20attack%20go%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=693c14b1b9e9371f9007430e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-windows-rasman-zero-day-flaw-gets-free-unoffic-9792c89b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Windows%20RasMan%20zero-day%20flaw%20gets%20free%2C%20unofficial%20patches&amp;severity=critical&amp;id=693c148fb9e9371f90071098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13506-cwe-250-execution-with-unnecessary--4054c5c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13506%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Nebim%20Neyir%20Computer%20Industry%20and%20Services%20Inc.%20Nebim%20V3%20ERP&amp;severity=high&amp;id=693c0957b9e9371f90f9bcb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-geoserver-vulnerability-exploited-in-attack-25287504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%20GeoServer%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=medium&amp;id=693c093cb9e9371f90f9a4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-releases-2025-list-of-top-25-most-dangerous--d14b241d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Releases%202025%20List%20of%20Top%2025%20Most%20Dangerous%20Software%20Vulnerabilities&amp;severity=low&amp;id=693c05102d1261d38d8c737b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-escalates-into-large-scal-f0372734</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Escalates%20into%20Large-Scale%20Global%20Attacks%2C%20Forcing%20Emergency%20Mitigation&amp;severity=critical&amp;id=693c03992d1261d38d8b6064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-shares-2025s-top-25-most-dangerous-software--954768c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20shares%202025&apos;s%20top%2025%20most%20dangerous%20software%20weaknesses&amp;severity=high&amp;id=693c03992d1261d38d8b606c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-react-rsc-vulnerabilities-enable-dos-and-sourc-437727c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20React%20RSC%20Vulnerabilities%20Enable%20DoS%20and%20Source%20Code%20Exposure&amp;severity=high&amp;id=693c03992d1261d38d8b6068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-feds-to-patch-actively-exploited-geose-093e92e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20orders%20feds%20to%20patch%20actively%20exploited%20Geoserver%20flaw&amp;severity=high&amp;id=693c03992d1261d38d8b6060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14030-cwe-79-improper-neutralization-of-i-be5b344c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14030%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soportecibeles%20AI%20Feeds&amp;severity=medium&amp;id=693bfc942d1261d38d80bda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12407-cwe-352-cross-site-request-forgery--aef49e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12407%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=693bfc942d1261d38d80bd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12408-cwe-200-exposure-of-sensitive-infor-6551acb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12408%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=693bfc942d1261d38d80bd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12965-cwe-79-improper-neutralization-of-i-ea6b2227</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Posts%20Display%20%E2%80%93%20Elementor%20Advanced%20Posts%20widgets&amp;severity=medium&amp;id=693bfc942d1261d38d80bd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14159-cwe-352-cross-site-request-forgery--8174a78b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14159%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=693bfc942d1261d38d80bdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14442-cwe-552-files-or-directories-access-c509e64d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14442%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=693bfc942d1261d38d80bdb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14065-cwe-862-missing-authorization-in-ro-637ebb6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14065%3A%20CWE-862%20Missing%20Authorization%20in%20rodolforizzo76%20Simple%20Bike%20Rental&amp;severity=medium&amp;id=693bfc942d1261d38d80bda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-bug-bounty-program-expanded-to-third-par-e131d1b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Bug%20Bounty%20Program%20Expanded%20to%20Third-Party%20Code&amp;severity=critical&amp;id=693bf9052d1261d38d7e8caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-patches-updater-flaw-after-reports-of-traf-c29f0eef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20Patches%20Updater%20Flaw%20After%20Reports%20of%20Traffic%20Hijacking&amp;severity=medium&amp;id=693bf53ee96055a68ba4f468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12835-cwe-22-improper-limitation-of-a-pat-476f2329</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12835%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WooMulti&amp;severity=high&amp;id=693beffae96055a68b9f7a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-genai-in-the-browser-policy-isolation-and-9a646a75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20GenAI%20in%20the%20Browser%3A%20Policy%2C%20Isolation%2C%20and%20Data%20Controls%20That%20Actually%20Work&amp;severity=medium&amp;id=693bf4c0e96055a68ba4d1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12841-cwe-862-missing-authorization-in-bo-8c1282c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12841%3A%20CWE-862%20Missing%20Authorization%20in%20Bookit&amp;severity=medium&amp;id=693beffae96055a68b9f7a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rto-challan-fraud-a-technical-report-on-apk-based--b19c1d20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RTO%20Challan%20Fraud%3A%20A%20Technical%20Report%20on%20APK-Based%20Financial%20and%20Identity%20Theft&amp;severity=medium&amp;id=693c104eb9e9371f90018228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26866-cwe-502-deserialization-of-untruste-6c3628b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26866%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20HugeGraph-Server&amp;severity=high&amp;id=693be422406b3dd4e02223e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58137-cwe-639-authorization-bypass-throug-4c06f0de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58137%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=693be422406b3dd4e02223e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12348-cwe-306-missing-authentication-for--76fba38b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12348%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Powerful%20Email%20Marketing%2C%20Post%20Notification%20%26%20Newsletter%20Plugin%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=693be422406b3dd4e02223ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13993-cwe-79-improper-neutralization-of-i-7de801d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailerlite%20MailerLite%20%E2%80%93%20Signup%20forms%20(official)&amp;severity=medium&amp;id=693be422406b3dd4e02223d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14074-cwe-862-missing-authorization-in-ad-126b6e61</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14074%3A%20CWE-862%20Missing%20Authorization%20in%20addonsorg%20PDF%20for%20Contact%20Form%207%20%2B%20Drag%20and%20Drop%20Template%20Builder&amp;severity=medium&amp;id=693be422406b3dd4e02223d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58130-cwe-522-insufficiently-protected-cr-6279900a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58130%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=critical&amp;id=693be422406b3dd4e02223e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23408-cwe-521-weak-password-requirements--0eac94fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23408%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=693be422406b3dd4e02223de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-react-rsc-vulnerabilities-enable-dos-and-sourc-5809e665</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20React%20RSC%20Vulnerabilities%20Enable%20DoS%20and%20Source%20Code%20Exposure&amp;severity=critical&amp;id=693be412406b3dd4e0220011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-the-blackforce-phishing-kit-a95b6a4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20the%20BlackForce%20Phishing%20Kit&amp;severity=medium&amp;id=693c14a1b9e9371f90071a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-moneymount-iso-deploying-phantom-stealer-3ba40aea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20MoneyMount%2C%20ISO%20Deploying%20Phantom%20Stealer&amp;severity=medium&amp;id=693c14a1b9e9371f900719fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-escalates-into-large-scal-824b0580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Escalates%20into%20Large-Scale%20Global%20Attacks%2C%20Forcing%20Emergency%20Mitigation&amp;severity=critical&amp;id=693be412406b3dd4e0220014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40829-cwe-908-use-of-uninitialized-resour-f06185d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40829%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=693be422406b3dd4e02223eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12960-cwe-22-improper-limitation-of-a-pat-ba77376c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12960%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iworks%20Simple%20CSV%20Table&amp;severity=medium&amp;id=693bd715406b3dd4e013825b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/320000-paid-out-at-zerodaycloud-for-open-source-so-f457dce5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%24320%2C000%20Paid%20Out%20at%20Zeroday.Cloud%20for%20Open%20Source%20Software%20Exploits&amp;severity=medium&amp;id=693bc7515f3fdafda4341007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67731-cwe-400-uncontrolled-resource-consu-02a51622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67731%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Aarondoran%20servify-express&amp;severity=high&amp;id=693bcae15f3fdafda43757dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67730-cwe-79-improper-neutralization-of-i-1496ff0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67730%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14169-cwe-89-improper-neutralization-of-s-4a2d287b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14169%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20amans2k%20FunnelKit%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20Checkout&amp;severity=high&amp;id=693bc3e35f3fdafda42e6cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10583-cwe-862-missing-authorization-in-em-c0f4b2af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10583%3A%20CWE-862%20Missing%20Authorization%20in%20emrevona%20WP%20Fastest%20Cache&amp;severity=low&amp;id=693bc3e35f3fdafda42e6cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13891-cwe-22-improper-limitation-of-a-pat-d8ebe694</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13891%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14049-cwe-79-improper-neutralization-of-i-761c3487</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRentItems%20Flexible%20Rental%20Management%20System&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4970-cwe-79-improper-neutralization-of-in-cb5bb5ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4970%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bannersky%20BSK%20PDF%20Manager&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11876-cwe-79-improper-neutralization-of-i-2bd7342f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jbrinley%20Mailgun%20Subscriptions&amp;severity=medium&amp;id=693bc3e35f3fdafda42e6cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67728-cwe-77-improper-neutralization-of-s-a1dfe2f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67728%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ShaneIsrael%20fireshare&amp;severity=critical&amp;id=693bc168e6d9263eb359d8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67727-cwe-94-improper-control-of-generati-b7d52253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67727%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=693bbde4e6d9263eb3549393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12655-cwe-862-missing-authorization-in-hi-d4865ad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12655%3A%20CWE-862%20Missing%20Authorization%20in%20hippooo%20Hippoo%20Mobile%20App%20for%20WooCommerce&amp;severity=medium&amp;id=693bbde4e6d9263eb3549376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14068-cwe-89-improper-neutralization-of-s-c3380dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14068%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20qdonow%20WPNakama%20%E2%80%93%20Team%20and%20multi-Client%20Collaboration%2C%20Editorial%20and%20Project%20Management&amp;severity=high&amp;id=693bbde4e6d9263eb3549382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14356-cwe-639-authorization-bypass-throug-79d0807a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14356%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=693bbde4e6d9263eb354938b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12570-cwe-79-improper-neutralization-of-i-692aab01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=high&amp;id=693bbde4e6d9263eb3549372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13660-cwe-200-exposure-of-sensitive-infor-64ba535c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13660%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20rcatheme%20Guest%20Support&amp;severity=medium&amp;id=693bbde4e6d9263eb354937c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67726-cwe-834-excessive-iteration-in-torn-d8384ca3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67726%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=693bc3e35f3fdafda42e6cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10684-cwe-287-improper-authentication-in--a6a3ae6c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10684%3A%20CWE-287%20Improper%20Authentication%20in%20Construction%20Light&amp;severity=medium&amp;id=693bb1545785fd87b5fd1ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67725-cwe-400-uncontrolled-resource-consu-0eec4b4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67725%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=693badd05785fd87b5f80b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67724-cwe-79-improper-neutralization-of-i-fa04bcb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67724%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tornadoweb%20tornado&amp;severity=medium&amp;id=693badd05785fd87b5f80b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67508-cwe-77-improper-neutralization-of-s-1176e27d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67508%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gardener%20gardenctl-v2&amp;severity=high&amp;id=693baa4c5785fd87b5e9ed61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-dlls-entrypoint-for-the-fun-fri-dec-12th-b3d5725a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20DLLs%20EntryPoint%20for%20the%20Fun%2C%20(Fri%2C%20Dec%2012th)&amp;severity=medium&amp;id=693ba6bb5785fd87b5e7d019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64781-initialization-of-a-resource-with-a-d249a40d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64781%3A%20Initialization%20of%20a%20resource%20with%20an%20insecure%20default%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62192-improper-neutralization-of-special--c1c210ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62192%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(&apos;SQL%20Injection&apos;)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58576-cross-site-request-forgery-csrf-in--7d19f4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58576%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61987-missing-origin-validation-in-websoc-0b285ee6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61987%3A%20Missing%20origin%20validation%20in%20WebSockets%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347333f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61950-authorization-bypass-through-user-c-8967ae86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61950%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347333b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65120-cross-site-scripting-xss-in-japan-t-76d34d29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65120%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347334b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57883-cross-site-scripting-xss-in-japan-t-75770a32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57883%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66284-cross-site-scripting-xss-in-japan-t-2b2ce0a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66284%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb3473350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53523-cross-site-scripting-xss-in-japan-t-595b3b46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53523%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54407-cross-site-scripting-xss-in-japan-t-143ab61e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54407%3A%20Cross-site%20scripting%20(XSS)%20in%20Japan%20Total%20System%20Co.%2CLtd.%20GroupSession%20Free%20edition&amp;severity=medium&amp;id=693bb362e6d9263eb347332e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-actively-exploited-geoserver-xxe-flaw-i-68ecd68d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Actively%20Exploited%20GeoServer%20XXE%20Flaw%20in%20Updated%20KEV%20Catalog&amp;severity=high&amp;id=693bb2fb5785fd87b5fe5343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-fines-lastpass-over-2022-data-breach-impacting--f8babf64</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20fines%20LastPass%20over%202022%20data%20breach%20impacting%201.6%20million%20users&amp;severity=high&amp;id=693b96d58624ffdf9f6d3250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notepad-fixes-flaw-that-let-attackers-push-malicio-05e5b9b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notepad%2B%2B%20fixes%20flaw%20that%20let%20attackers%20push%20malicious%20update%20files&amp;severity=high&amp;id=693b96d58624ffdf9f6d3258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-gladinet-centrestack-cryptographic-0ee91230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20Gladinet%20CentreStack%20cryptographic%20flaw%20in%20RCE%20attacks&amp;severity=high&amp;id=693b96d58624ffdf9f6d3254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14138-cwe-79-improper-neutralization-of-i-ec61bd66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpletsgo%20WPLG%20Default%20Mail%20From&amp;severity=medium&amp;id=693b9189650da22753edbda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13975-cwe-79-improper-neutralization-of-i-c693a115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20izuchy%20Contact%20Form%207%20with%20ChatWork&amp;severity=medium&amp;id=693b9187650da22753edbd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13843-cwe-79-improper-neutralization-of-i-2686031f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20susantabeura%20VigLink%20SpotLight%20By%20ShortCode&amp;severity=medium&amp;id=693b9183650da22753edbb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14391-cwe-352-cross-site-request-forgery--651d09b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14391%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20darendev%20Simple%20Theme%20Changer&amp;severity=medium&amp;id=693b918d650da22753edbee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13366-cwe-352-cross-site-request-forgery--c5410d2d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13366%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frapesce%20Rabbit%20Hole&amp;severity=medium&amp;id=693b9183650da22753edbb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13747-cwe-79-improper-neutralization-of-i-725044a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ice00%20NewStatPress&amp;severity=medium&amp;id=693b9183650da22753edbb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13850-cwe-79-improper-neutralization-of-i-ccef74de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ladislavsoukupgmailcom%20LS%20Google%20Map%20Router&amp;severity=medium&amp;id=693b9183650da22753edbb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14137-cwe-79-improper-neutralization-of-i-1fde2ba6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexdtn%20Simple%20AL%20Slider&amp;severity=medium&amp;id=693b9189650da22753edbda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12650-cwe-79-improper-neutralization-of-i-02f38bac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sgcoskey%20Simple%20post%20listing&amp;severity=medium&amp;id=693b9182650da22753edbad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12834-cwe-79-improper-neutralization-of-i-563a19f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zealopensource%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=693b9182650da22753edbae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13334-cwe-862-missing-authorization-in-bl-990573e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13334%3A%20CWE-862%20Missing%20Authorization%20in%20blazethemes%20Blaze%20Demo%20Importer&amp;severity=high&amp;id=693b9183650da22753edbb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12830-cwe-79-improper-neutralization-of-i-c9b89ad5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Better%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693b9182650da22753edbae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14160-cwe-352-cross-site-request-forgery--bf35eba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14160%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justdave%20Upcoming%20for%20Calendly&amp;severity=medium&amp;id=693b918b650da22753edbe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13963-cwe-79-improper-neutralization-of-i-d94e1fd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20FX%20Currency%20Converter&amp;severity=medium&amp;id=693b9185650da22753edbcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13962-cwe-79-improper-neutralization-of-i-087bee1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20klemmkeil%20Divelogs%20Widget&amp;severity=medium&amp;id=693b9185650da22753edbcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13987-cwe-352-cross-site-request-forgery--da60f628</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13987%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codnloc%20Purchase%20and%20Expense%20Manager&amp;severity=medium&amp;id=693b9187650da22753edbd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13314-cwe-862-missing-authorization-in-ma-7fa9ef25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13314%3A%20CWE-862%20Missing%20Authorization%20in%20markutos987%20Product%20Filtering%20by%20Categories%2C%20Tags%2C%20Price%20Range%20for%20WooCommerce%20%E2%80%93%20Filter%20Plus&amp;severity=medium&amp;id=693b9182650da22753edbaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13885-cwe-79-improper-neutralization-of-i-b73e4df9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imran3229%20Zenost%20Shortcodes&amp;severity=medium&amp;id=693b9185650da22753edbcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14062-cwe-352-cross-site-request-forgery--063ebd73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14062%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tekafran%20Animated%20Pixel%20Marquee%20Creator&amp;severity=medium&amp;id=693b9189650da22753edbd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12963-cwe-862-missing-authorization-in-la-b7f1f84a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12963%3A%20CWE-862%20Missing%20Authorization%20in%20lazycoders%20LazyTasks%20%E2%80%93%20Project%20%26%20Task%20Management%20with%20Collaboration%2C%20Kanban%20and%20Gantt%20Chart&amp;severity=critical&amp;id=693b9182650da22753edbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14132-cwe-79-improper-neutralization-of-i-ab50fa19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pandikamal03%20Category%20Dropdown%20List&amp;severity=medium&amp;id=693b9189650da22753edbd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13971-cwe-79-improper-neutralization-of-i-af82166b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13971%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thewellnessway%20TWW%20Protein%20Calculator&amp;severity=medium&amp;id=693b9187650da22753edbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13906-cwe-79-improper-neutralization-of-i-6be4ffdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ysh%20WP%20Flot&amp;severity=medium&amp;id=693b9185650da22753edbce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13988-cwe-79-improper-neutralization-of-i-ce7dc585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=693b9187650da22753edbd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13966-cwe-79-improper-neutralization-of-i-4ca0107e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonlamtn200%20Paypal%20Payment%20Shortcode&amp;severity=medium&amp;id=693b9187650da22753edbd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13961-cwe-79-improper-neutralization-of-i-efc0c043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13961%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20subhransu-sekhar%20Data%20Visualizer&amp;severity=medium&amp;id=693b9185650da22753edbced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13884-cwe-79-improper-neutralization-of-i-9564ef9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20buntegiraffe%20Hide%20Email%20Address&amp;severity=medium&amp;id=693b9185650da22753edbccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14035-cwe-79-improper-neutralization-of-i-af4e7124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremybmerrill%20DebateMaster&amp;severity=medium&amp;id=693b9187650da22753edbd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13840-cwe-79-improper-neutralization-of-i-b6e4c93f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobvanoorschot%20BUKAZU%20Search%20widget&amp;severity=medium&amp;id=693b9183650da22753edbb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13960-cwe-79-improper-neutralization-of-i-4d19a4d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidkeen%20GPXpress&amp;severity=medium&amp;id=693b9185650da22753edbce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13320-cwe-73-external-control-of-file-nam-d9d80c6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13320%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpusermanager%20WP%20User%20Manager%20%E2%80%93%20User%20Profile%20Builder%20%26%20Membership&amp;severity=medium&amp;id=693b9182650da22753edbafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13440-cwe-862-missing-authorization-in-pr-ed7a5975</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13440%3A%20CWE-862%20Missing%20Authorization%20in%20premmerce%20Premmerce%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=693b9183650da22753edbb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14392-cwe-862-missing-authorization-in-da-4b669c19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14392%3A%20CWE-862%20Missing%20Authorization%20in%20darendev%20Simple%20Theme%20Changer&amp;severity=medium&amp;id=693b918d650da22753edbeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14032-cwe-79-improper-neutralization-of-i-6f3f032a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Timeline%20Lite&amp;severity=medium&amp;id=693b9187650da22753edbd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13969-cwe-79-improper-neutralization-of-i-1ce0c56d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13969%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eurisko%20Reviews%20Sorted&amp;severity=medium&amp;id=693b9187650da22753edbd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14161-cwe-352-cross-site-request-forgery--ec9f279b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14161%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20truefy%20Truefy%20Embed&amp;severity=medium&amp;id=693b918b650da22753edbe2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14354-cwe-352-cross-site-request-forgery--d3eb44f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14354%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doubledome%20Resource%20Library%20for%20Logged%20In%20Users&amp;severity=medium&amp;id=693b918b650da22753edbe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14165-cwe-352-cross-site-request-forgery--aaa6f8dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14165%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20developerke%20Kirim.Email%20WooCommerce%20Integration&amp;severity=medium&amp;id=693b918b650da22753edbe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13846-cwe-79-improper-neutralization-of-i-2f30df6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13846%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qrevo%20Easy%20Map%20Creator&amp;severity=medium&amp;id=693b9183650da22753edbb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13363-cwe-352-cross-site-request-forgery--9374c5ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13363%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imaqpress%20IMAQ%20CORE&amp;severity=medium&amp;id=693b9183650da22753edbb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12783-cwe-862-missing-authorization-in-pr-0d7b5bff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12783%3A%20CWE-862%20Missing%20Authorization%20in%20premmerce%20Premmerce%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=693b9182650da22753edbad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14044-cwe-502-deserialization-of-untruste-5184c6b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14044%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20rodgerholl%20Visitor%20Logic%20Lite&amp;severity=high&amp;id=693b9187650da22753edbd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14166-cwe-94-improper-control-of-generati-b0b6b56e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14166%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ludwigyou%20WPMasterToolKit%20(WPMTK)%20%E2%80%93%20All%20in%20one%20plugin&amp;severity=medium&amp;id=693b918b650da22753edbe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14119-cwe-79-improper-neutralization-of-i-f373f1de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20App%20Landing%20Template%20Blocks%20for%20WPBakery%20(Visual%20Composer)%20Page%20Builder&amp;severity=medium&amp;id=693b9189650da22753edbd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14158-cwe-352-cross-site-request-forgery--b0e715e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14158%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20octagonsimon%20Coding%20Blocks&amp;severity=medium&amp;id=693b918b650da22753edbe22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13904-cwe-79-improper-neutralization-of-i-b58215a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lesion%20WPGancio&amp;severity=medium&amp;id=693b9185650da22753edbcde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14045-cwe-862-missing-authorization-in-ap-c9c0c6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14045%3A%20CWE-862%20Missing%20Authorization%20in%20apprhyme%20URL%20Media%20Uploader&amp;severity=medium&amp;id=693b9189650da22753edbd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12968-cwe-434-unrestricted-upload-of-file-a1f600ab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12968%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20infility%20Infility%20Global&amp;severity=high&amp;id=693b9182650da22753edbaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12824-cwe-22-improper-limitation-of-a-pat-d1a5ce73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12824%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tharkun69%20Player%20Leaderboard&amp;severity=high&amp;id=693b9182650da22753edbadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13408-cwe-352-cross-site-request-forgery--5a6e4aa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13408%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20foxtheme%20Foxtool%20All-in-One%3A%20Contact%20chat%20button%2C%20Custom%20login%2C%20Media%20optimize%20images&amp;severity=medium&amp;id=693b9183650da22753edbb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14344-cwe-22-improper-limitation-of-a-pat-561e2c4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14344%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sh1zen%20Multi%20Uploader%20for%20Gravity%20Forms&amp;severity=critical&amp;id=693b918b650da22753edbe4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12883-cwe-639-authorization-bypass-throug-7300795b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12883%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20campay%20Campay%20Woocommerce%20Payment%20Gateway&amp;severity=medium&amp;id=693b9182650da22753edbaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14048-cwe-79-improper-neutralization-of-i-e4e016a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonahsc%20SimplyConvert&amp;severity=medium&amp;id=693b9189650da22753edbd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14129-cwe-79-improper-neutralization-of-i-5eb2072a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wasiul99%20Like%20DisLike%20Voting&amp;severity=medium&amp;id=693b9189650da22753edbd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13989-cwe-79-improper-neutralization-of-i-9c97668b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nazsabuz%20WP%20Dropzone&amp;severity=medium&amp;id=693b9187650da22753edbd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14125-cwe-79-improper-neutralization-of-i-b4fcf910</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andru1%20Complag&amp;severity=medium&amp;id=693b9189650da22753edbd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14393-cwe-79-improper-neutralization-of-i-ca4b5e1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awanhrp%20Wpik%20WordPress%20Basic%20Ajax%20Form&amp;severity=medium&amp;id=693b918d650da22753edbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14143-cwe-79-improper-neutralization-of-i-95fcf899</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayothemes%20Ayo%20Shortcodes&amp;severity=medium&amp;id=693b918b650da22753edbe1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14064-cwe-862-missing-authorization-in-cy-67eb0895</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14064%3A%20CWE-862%20Missing%20Authorization%20in%20cytechltd%20BuddyTask&amp;severity=medium&amp;id=693b9189650da22753edbd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14467-cwe-79-improper-neutralization-of-i-c75495a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=693b918d650da22753edbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13889-cwe-79-improper-neutralization-of-i-f9a88be9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmus%20Simple%20Nivo%20Slider&amp;severity=medium&amp;id=693b9185650da22753edbcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14170-cwe-862-missing-authorization-in-st-5f350ba2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14170%3A%20CWE-862%20Missing%20Authorization%20in%20stiand%20Vimeo%20SimpleGallery&amp;severity=medium&amp;id=693b918b650da22753edbe48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13866-cwe-862-missing-authorization-in-lo-175b6c3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13866%3A%20CWE-862%20Missing%20Authorization%20in%20looks_awesome%20Flow-Flow%20Social%20Feed%20Stream&amp;severity=medium&amp;id=693b9185650da22753edbcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14162-cwe-352-cross-site-request-forgery--6d7a069b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14162%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magblogapi%20BMLT%20WordPress%20Plugin&amp;severity=medium&amp;id=693b918b650da22753edbe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13053-cwe-311-missing-encryption-of-sensi-5eb16f58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13053%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=693b86d8650da22753ea479b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13670-cwe-427-uncontrolled-search-path-el-b7281b97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13670%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20High%20Level%20Synthesis%20Compiler&amp;severity=medium&amp;id=693b86d8650da22753ea47a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13052-cwe-295-improper-certificate-valida-9228cdf2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13052%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=693b86d8650da22753ea4798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13669-cwe-427-uncontrolled-search-path-el-0e7845a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13669%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20High%20Level%20Synthesis%20Compiler&amp;severity=medium&amp;id=693b86d8650da22753ea479e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13886-cwe-98-improper-control-of-filename-3aaef83c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13886%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cvedovini%20LT%20Unleashed&amp;severity=high&amp;id=693b7fd3650da22753e7b18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13839-cwe-79-improper-neutralization-of-i-7045e665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jenyay%20LJUsers&amp;severity=medium&amp;id=693b7fd3650da22753e7b189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13665-cwe-427-uncontrolled-search-path-el-175d60d8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13665%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=693b7fd3650da22753e7b186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10451-cwe-787-out-of-bounds-write-in-insy-dffa50ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10451%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=693b63bf650da2275388ef61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/require-google-to-remove-one-click-full-logout-url-659cdc63</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Require%20Google%20to%20Remove%20One-Click%20Full%20Logout%20URLs&amp;severity=medium&amp;id=693b605e650da227537cb9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-12-5ba91531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-12&amp;severity=medium&amp;id=693cad76b3e344112f4b8ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64011-na-970a9fd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64011%3A%20n%2Fa&amp;severity=medium&amp;id=693c4cbf72d8eb03a61c7d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67819-na-d8ffe073</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67819%3A%20n%2Fa&amp;severity=medium&amp;id=693c45b972d8eb03a613ec4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67818-na-405845cb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67818%3A%20n%2Fa&amp;severity=high&amp;id=693c45b972d8eb03a613ec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29144-na-80357863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29144%3A%20n%2Fa&amp;severity=low&amp;id=693c45b972d8eb03a613ec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67342-na-a591b460</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67342%3A%20n%2Fa&amp;severity=medium&amp;id=693c43d3dc37602712bdbc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67341-na-a14f45aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67341%3A%20n%2Fa&amp;severity=medium&amp;id=693c404ddc37602712b89679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65854-na-a27cd0ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65854%3A%20n%2Fa&amp;severity=critical&amp;id=693c3cd3dc37602712b2e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67344-na-934a5a82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67344%3A%20n%2Fa&amp;severity=medium&amp;id=693c3cd3dc37602712b2e43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66430-na-91279388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66430%3A%20n%2Fa&amp;severity=critical&amp;id=693c3957dc37602712b0d798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65530-na-acaaa52f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65530%3A%20n%2Fa&amp;severity=high&amp;id=693c3957dc37602712b0d793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67779-cwe-502-deserialization-of-untruste-32dce7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67779%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data%2C%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-parcel&amp;severity=high&amp;id=693b579d8a7c12acf2c1d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67780-cwe-306-missing-authentication-for--aec69acd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67780%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SpaceX%20Starlink%20Dish&amp;severity=medium&amp;id=693b524b8a7c12acf2bed11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66452-cwe-79-improper-neutralization-of-i-eed0b410</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66452%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=693b4f8722246175c6a88f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66451-cwe-20-improper-input-validation-in-cbc28275</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66451%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20danny-avila%20LibreChat&amp;severity=medium&amp;id=693b487c22246175c6a6ed55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66450-cwe-80-improper-neutralization-of-s-52aec781</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66450%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=693b450222246175c6a639de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13668-cwe-427-uncontrolled-search-path-el-732e7a77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13668%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=693b450222246175c6a639db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66446-cwe-362-concurrent-execution-using--b298b86e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66446%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=693b3df122246175c6a4709d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34506-cwe-434-unrestricted-upload-of-file-2ee0c03e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34506%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WBCE%20WBCE%20CMS&amp;severity=high&amp;id=693b3df122246175c6a47094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34504-cwe-601-url-redirection-to-untruste-8398e97b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34504%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20kodcloud%20KodExplorer&amp;severity=medium&amp;id=693b3df122246175c6a4708e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58310-cwe-22-improper-limitation-of-a-pat-2db30a42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58310%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apc%20Network%20Management%20Card%204&amp;severity=high&amp;id=693b3df122246175c6a47089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58308-cwe-89-improper-neutralization-of-s-b853f96e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58308%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opensolution%20Quick.CMS&amp;severity=critical&amp;id=693b3df122246175c6a47083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58304-cwe-79-improper-neutralization-of-i-362a7411</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SPA-Cart%20SPA-CART%20CMS&amp;severity=medium&amp;id=693b3df322246175c6a4713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58303-cwe-1336-improper-neutralization-of-8aa5302d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58303%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20(SSTI)%20in%20Flarum%20FriendsofFlarum%20Pretty%20Mail&amp;severity=high&amp;id=693b3df322246175c6a47135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58302-cwe-98-improper-control-of-filename-a20d2e84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58302%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Flarum%20FriendsofFlarum%20Pretty%20Mail&amp;severity=medium&amp;id=693b3df322246175c6a4712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58301-cwe-89-improper-neutralization-of-s-e423d703</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58301%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20purei%20Purei%20CMS&amp;severity=critical&amp;id=693b3df322246175c6a4712a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58300-cwe-306-missing-authentication-for--d60ba640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58300%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siklu%20MultiHaul%20TG%20series&amp;severity=high&amp;id=693b3df322246175c6a47125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66419-cwe-362-concurrent-execution-using--8f2b565c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66419%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=693b3df322246175c6a47140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58298-cwe-434-unrestricted-upload-of-file-dd284420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58298%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BMC%20Software%20Compuware%20iStrobe%20Web&amp;severity=critical&amp;id=693b3df122246175c6a470c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58296-cwe-79-improper-neutralization-of-i-b507e6f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58296%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PhoenixCart%20CE%20Phoenix&amp;severity=medium&amp;id=693b3df122246175c6a470b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58295-cwe-434-unrestricted-upload-of-file-8939f84b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58295%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20elkarte%20ElkArte%20Forum&amp;severity=high&amp;id=693b3df122246175c6a470b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58292-cwe-79-improper-neutralization-of-i-5da1f4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58292%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xmbforum2%20XMB%20Forum&amp;severity=medium&amp;id=693b3df122246175c6a470ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58290-cwe-89-improper-neutralization-of-s-193455b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58290%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Elements%20Xhibiter%20NFT%20Marketplace&amp;severity=critical&amp;id=693b3df122246175c6a470a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58288-cwe-428-unquoted-search-path-or-ele-348aada4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58288%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Genexus%20Genexus%20Protection%20Server&amp;severity=high&amp;id=693b3a6c22246175c6a3cf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58286-cwe-78-improper-neutralization-of-s-e573a495</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58286%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20vexorian%20dizqueTV&amp;severity=critical&amp;id=693b3a6c22246175c6a3cf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64721-cwe-190-integer-overflow-or-wraparo-1c3827ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64721%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20sandboxie-plus%20Sandboxie&amp;severity=critical&amp;id=693b36e922246175c6a34f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14538-cross-site-scripting-in-yangshare-w-6d48ab27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14538%3A%20Cross%20Site%20Scripting%20in%20yangshare%20warehouseManager%20%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=693b450222246175c6a639e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66584-cwe-121-stack-based-buffer-overflow-d53558a2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66584&amp;severity=null&amp;id=693b336622246175c6a2b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66585-cwe-416-use-after-free-in-azeotech--779a7eac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66585%3A%20CWE-416%20Use%20After%20Free%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b336622246175c6a2b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13664-cwe-427-uncontrolled-search-path-el-6dd1c9c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13664%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Altera%20Quartus%20Prime%20Standard&amp;severity=medium&amp;id=693b450222246175c6a639e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66586-cwe-843-access-of-resource-using-in-af0dc2d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66586%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b450222246175c6a639eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66587-cwe-122-heap-based-buffer-overflow--ca48a191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66587&amp;severity=null&amp;id=693b450222246175c6a639ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66588-cwe-824-access-of-uninitialized-poi-3480f610</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66588%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b450222246175c6a639f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66589-cwe-125-out-of-bounds-read-in-azeot-531f080c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66589%3A%20CWE-125%20Out-of-bounds%20Read%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b2fe222246175c69eaa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66590-cwe-787-out-of-bounds-write-in-azeo-f7b7355d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66590%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AzeoTech%20DAQFactory&amp;severity=high&amp;id=693b2fe222246175c69eaa83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13663-cwe-279-incorrect-execution-assigne-fbc00d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13663%3A%20CWE-279%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20Altera%20Quartus%20Prime%20Pro&amp;severity=medium&amp;id=693b2fe222246175c69eaa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14537-sql-injection-in-code-projects-clas-e978ac52</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14537%3A%20SQL%20Injection%20in%20code-projects%20Class%20and%20Exam%20Timetable%20Management&amp;severity=medium&amp;id=693b2c5f22246175c6996d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14293-cwe-22-improper-limitation-of-a-pat-50edf3c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14293%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20AI-Powered%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=693b2c5f22246175c6996d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55184-cwe-502-deserialization-of-untruste-59984423</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55184%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data.%20(CWE-400)%20Uncontrolled%20Resource%20Consumption%20in%20Meta%20react-server-dom-webpack&amp;severity=high&amp;id=693b270d22246175c6965c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55183-cwe-502-deserialization-of-untruste-7a101b26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55183%3A%20(CWE-502)%20Deserialization%20of%20Untrusted%20Data.%20(CWE-497)%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Actor%20in%20Meta%20react-server-dom-webpack&amp;severity=medium&amp;id=693b270d22246175c6965c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14536-sql-injection-in-code-projects-clas-d5947bee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14536%3A%20SQL%20Injection%20in%20code-projects%20Class%20and%20Exam%20Timetable%20Management&amp;severity=medium&amp;id=693b270d22246175c6965c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13214-cwe-89-improper-neutralization-of-s-1e0fba3f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13214%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b24d97d4c6f31f7c3ec33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13148-cwe-620-unverified-password-change--b0f8539e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13148%3A%20CWE-620%20Unverified%20Password%20Change%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b270d22246175c6965c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13481-cwe-78-improper-neutralization-of-s-284019e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13481%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Aspera%20Orchestrator&amp;severity=high&amp;id=693b21637d4c6f31f7c352f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13211-cwe-799-improper-control-of-interac-29c34e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13211%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20IBM%20Aspera%20Orchestrator&amp;severity=medium&amp;id=693b21637d4c6f31f7c352ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42197-cwe-256-plaintext-storage-of-a-pass-9912afb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42197%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20HCL%20Software%20Workload%20Scheduler&amp;severity=medium&amp;id=693b21637d4c6f31f7c352f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36938-elevation-of-privilege-in-google-an-a07add33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36938%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=693b21667d4c6f31f7c3537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36937-remote-code-execution-in-google-and-45492619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36937%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=693b21667d4c6f31f7c35378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36936-elevation-of-privilege-in-google-an-d7686d50</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36936%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36935-elevation-of-privilege-in-google-an-11970228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36935%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36934-elevation-of-privilege-in-google-an-7b7613ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36934%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c3536f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36932-elevation-of-privilege-in-google-an-433d6ce1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36932%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c3536c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36931-elevation-of-privilege-in-google-an-d573d50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36931%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21667d4c6f31f7c35369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36930-elevation-of-privilege-in-google-an-49fa2dd8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36930%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36929-information-disclosure-in-google-an-ccd89043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36929%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c35334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36928-elevation-of-privilege-in-google-an-3001b801</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36928%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36927-elevation-of-privilege-in-google-an-847468e1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36927%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36925-elevation-of-privilege-in-google-an-993858bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36925%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3532b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36924-elevation-of-privilege-in-google-an-2c80c1b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36924%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36923-elevation-of-privilege-in-google-an-cbebcde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36923%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c35325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36922-elevation-of-privilege-in-google-an-cacc31d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36922%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c35322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36921-information-disclosure-in-google-an-8a1b88ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36921%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21657d4c6f31f7c3531f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36919-elevation-of-privilege-in-google-an-68939231</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36919%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21657d4c6f31f7c3531c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36918-elevation-of-privilege-in-google-an-1da2394b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36918%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21637d4c6f31f7c3530f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36917-denial-of-service-in-google-android-15428c78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36917%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c3530c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36916-elevation-of-privilege-in-google-an-c8270119</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36916%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=693b21637d4c6f31f7c35309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36912-denial-of-service-in-google-android-6ac1f15b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36912%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c35306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36889-information-disclosure-in-google-an-76128643</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36889%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=693b21637d4c6f31f7c35302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14535-buffer-overflow-in-utt-512w-d00ee28b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14535%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=critical&amp;id=693b21637d4c6f31f7c352fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14534-buffer-overflow-in-utt-512w-46bf1244</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14534%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=critical&amp;id=693b1a517d4c6f31f7c1d601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14531-crlf-injection-in-code-projects-ren-41420a31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14531%3A%20CRLF%20Injection%20in%20code-projects%20Rental%20Management%20System&amp;severity=medium&amp;id=693b0fc17d4c6f31f7bf9f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13780-vulnerability-in-pgadminorg-pgadmin-21431ea8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13780%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=693b0fc17d4c6f31f7bf9f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ais-exploiting-smart-contracts-schneier-on-securit-e8fa41f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AIs%20Exploiting%20Smart%20Contracts%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=693b0c397d4c6f31f7befa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-modern-tale-of-blinkenlights-560ab5f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20modern%20tale%20of%20blinkenlights&amp;severity=medium&amp;id=693b0c547d4c6f31f7beff53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64669-cwe-284-improper-access-control-in--6452b96e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64669%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14046-cwe-79-improper-neutralization-of-i-ff6a5891</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=693b08b87d4c6f31f7be3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14530-unrestricted-upload-in-sourcecodest-789dbf63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14530%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Real%20Estate%20Property%20Listing%20App&amp;severity=medium&amp;id=693b01b07d4c6f31f7bc5fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14529-sql-injection-in-campcodes-retro-ba-7e4aa8dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14529%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=693b01b07d4c6f31f7bc5fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-visual-studio-code-extensions-hide-troja-9d61238d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Visual%20Studio%20Code%20Extensions%20Hide%20Trojan%20in%20Fake%20PNG%20Files&amp;severity=medium&amp;id=693afe2a7d4c6f31f7bb5d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/empirical-analysis-non-linear-token-consumption-in-88c3bbce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Empirical%20Analysis%3A%20Non-Linear%20Token%20Consumption%20in%20AI%20Security%20Agents&amp;severity=medium&amp;id=693afe3d7d4c6f31f7bb62e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14528-information-disclosure-in-d-link-di-44183a7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14528%3A%20Information%20Disclosure%20in%20D-Link%20DIR-803&amp;severity=medium&amp;id=693b21667d4c6f31f7c35384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14527-sql-injection-in-projectworlds-adva-848d3888</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14527%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=693b21667d4c6f31f7c3537e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66048-cwe-121-stack-based-buffer-overflow-63acfcba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66048%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66047-cwe-121-stack-based-buffer-overflow-558eb0a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66047%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66046-cwe-121-stack-based-buffer-overflow-488eccfa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66046%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66045-cwe-121-stack-based-buffer-overflow-39fd2846</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66045%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66044-cwe-121-stack-based-buffer-overflow-9bbd1d59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66044%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66043-cwe-121-stack-based-buffer-overflow-e5b994bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66043%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=693afaa97d4c6f31f7bae1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14526-buffer-overflow-in-tenda-ch22-4c5a0970</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14526%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=693af7247d4c6f31f7ba56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8273-cwe-290-authentication-bypass-by-spo-f2b13a60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8273%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20HYPR%20Server&amp;severity=high&amp;id=693af7247d4c6f31f7ba56e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14522-unrestricted-upload-in-baowzh-hfly-5b21e5fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14522%3A%20Unrestricted%20Upload%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693af01c7d4c6f31f7b8523c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14521-path-traversal-in-baowzh-hfly-a9b21e5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14521%3A%20Path%20Traversal%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693af01c7d4c6f31f7b85236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14520-path-traversal-in-baowzh-hfly-69820617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14520%3A%20Path%20Traversal%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67742-cwe-22-in-jetbrains-teamcity-806e6fe1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67742%3A%20CWE-22%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67741-cwe-79-in-jetbrains-teamcity-f3b1e374</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67741%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67740-cwe-863-in-jetbrains-teamcity-3a7f0d29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67740%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67739-cwe-939-in-jetbrains-teamcity-7d768ed3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67739%3A%20CWE-939%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=693ae5917d4c6f31f7b66ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breach-of-120-000-ip-cameras-in-south-korea-securi-83a7314b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breach%20of%20120%20000%20IP%20cameras%20in%20South%20Korea%3A%20security%20tips%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=693ae21c7d4c6f31f7b56f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14519-cross-site-scripting-in-baowzh-hfly-ecaea1f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14519%3A%20Cross%20Site%20Scripting%20in%20baowzh%20hfly&amp;severity=medium&amp;id=693ade897d4c6f31f7b4ab93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14518-server-side-request-forgery-in-powe-a9e81fba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14518%3A%20Server-Side%20Request%20Forgery%20in%20PowerJob&amp;severity=medium&amp;id=693ade897d4c6f31f7b4ab8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-droidlock-android-malware-locks-users-out-and--f5b691a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98DroidLock%E2%80%99%20Android%20Malware%20Locks%20Users%20Out%20and%20Spies%20via%20Front%20Camera&amp;severity=medium&amp;id=693adb047d4c6f31f7b42ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanoremote-malware-uses-google-drive-api-for-hidde-327d2869</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NANOREMOTE%20Malware%20Uses%20Google%20Drive%20API%20for%20Hidden%20Control%20on%20Windows%20Systems&amp;severity=high&amp;id=693adb047d4c6f31f7b42acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13124-cwe-639-authorization-bypass-throug-3b0ad761</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13124%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Netiket%20Information%20Technologies%20Ltd.%20Co.%20ApplyLogic&amp;severity=high&amp;id=693ad7807d4c6f31f7b3bc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14265-cwe-494-download-of-code-without-in-33bc719b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14265%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ConnectWise%20ScreenConnect&amp;severity=critical&amp;id=693ad7807d4c6f31f7b3bc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40593-improper-access-control-in-fortinet-050250af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40593%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=693ad4127d4c6f31f7b2bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-accenture-employee-charged-over-cybersecuri-35e7011a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20Accenture%20Employee%20Charged%20Over%20Cybersecurity%20Fraud&amp;severity=medium&amp;id=693ad3f17d4c6f31f7b2badc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14517-improper-export-of-android-applicat-55724918</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14517%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Yalantis%20uCrop&amp;severity=medium&amp;id=693ad0797d4c6f31f7b1f560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14516-server-side-request-forgery-in-yala-fb47778b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14516%3A%20Server-Side%20Request%20Forgery%20in%20Yalantis%20uCrop&amp;severity=medium&amp;id=693ad0797d4c6f31f7b1f559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-posts-results-of-2025-attck-enterprise-evalu-0eb3a600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Posts%20Results%20of%202025%20ATT%26CK%20Enterprise%20Evaluations&amp;severity=medium&amp;id=693accfb7d4c6f31f7b0b9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-targeted-by-active-in-the-wild-exploit-tied-116bbe5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Targeted%20by%20Active%20In-the-Wild%20Exploit%20Tied%20to%20Undisclosed%20High-Severity%20Flaw&amp;severity=high&amp;id=693acd187d4c6f31f7b0c101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-spyware-alerts-mirai-strikes-d-730faa97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Spyware%20Alerts%2C%20Mirai%20Strikes%2C%20Docker%20Leaks%2C%20ValleyRAT%20Rootkit%20%E2%80%94%20and%2020%20More%20Stories&amp;severity=medium&amp;id=693acce57d4c6f31f7b0b4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-across-700-insta-b391b33d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20Across%20700%2B%20Instances%20Amid%20Active%20Attacks&amp;severity=critical&amp;id=693acd187d4c6f31f7b0c0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wirte-leverages-ashenloader-sideloading-to-install-3b1a361f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WIRTE%20Leverages%20AshenLoader%20Sideloading%20to%20Install%20the%20AshTag%20Espionage%20Backdoor&amp;severity=high&amp;id=693acd187d4c6f31f7b0c105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pierce-county-library-data-breach-impacts-340000-457ba017</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pierce%20County%20Library%20Data%20Breach%20Impacts%20340%2C000&amp;severity=medium&amp;id=693ac25c7d4c6f31f7ae2375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-sent-40000-e-signature-phishing-emails-sh-b78c2148</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Sent%2040%2C000%20E-Signature%20Phishing%20Emails%20(SharePoint%20and%20DocuSign)%20to%206%2C000%20Firms%20in%20Just%202%20Weeks&amp;severity=medium&amp;id=693abee27d4c6f31f7ad98f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14523-inconsistent-interpretation-of-http-4cbaaaee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14523%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=693abef77d4c6f31f7ada077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wide-range-of-malware-delivered-in-react2shell-att-e4cc449e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wide%20Range%20of%20Malware%20Delivered%20in%20React2Shell%20Attacks&amp;severity=medium&amp;id=693ab7d17d4c6f31f7aaecf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13003-cwe-639-authorization-bypass-throug-4b1cef45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13003%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Aksis%20Computer%20Services%20and%20Consulting%20Inc.%20AxOnboard&amp;severity=high&amp;id=693ab7f17d4c6f31f7aaff14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hamas-affiliated-ashen-lepus-targets-middle-easter-89ba00b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hamas-Affiliated%20Ashen%20Lepus%20Targets%20Middle%20Eastern%20Diplomatic%20Entities%20With%20New%20AshTag%20Malware%20Suite&amp;severity=medium&amp;id=693ae20b7d4c6f31f7b56950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gold-salem-tradecraft-for-deploying-warlock-ransom-79ef8b24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GOLD%20SALEM%20tradecraft%20for%20deploying%20Warlock%20ransomware&amp;severity=medium&amp;id=693ae20b7d4c6f31f7b56928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vs-code-extensions-contain-trojan-laden-fake-image-389d08f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VS%20Code%20extensions%20contain%20trojan-laden%20fake%20image&amp;severity=medium&amp;id=693adb2d7d4c6f31f7b42f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14515-sql-injection-in-campcodes-supplier-7c827075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14515%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ab7f17d4c6f31f7aaff17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-for-months-2cec6881</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20for%20Months&amp;severity=critical&amp;id=693ab44c7d4c6f31f7a8e69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14514-sql-injection-in-campcodes-supplier-fd2e52e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14514%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=693ab0d47d4c6f31f7a6d986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-impact-of-robotic-process-automation-rpa-on-id-cd999196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Impact%20of%20Robotic%20Process%20Automation%20(RPA)%20on%20Identity%20and%20Access%20Management&amp;severity=medium&amp;id=693b444622246175c6a5d1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64995-cwe-427-uncontrolled-search-path-el-2664f923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64995%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a5046b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64994-cwe-427-uncontrolled-search-path-el-58b16924</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64994%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a50468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64993-cwe-20-improper-input-validation-in-76053925</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64993%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad537d4c6f31f7a50465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64992-cwe-20-improper-input-validation-in-3ae08afb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64992%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64991-cwe-20-improper-input-validation-in-142d08d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64991%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64990-cwe-20-improper-input-validation-in-93368dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64989-cwe-20-improper-input-validation-in-4486ee6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64989%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64988-cwe-20-improper-input-validation-in-d94761f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64988%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64987-cwe-20-improper-input-validation-in-ba36c12c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64987%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64986-cwe-20-improper-input-validation-in-2309631f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64986%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46266-cwe-20-improper-input-validation-in-de06bcfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46266%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44016-cwe-20-improper-input-validation-in-2ebc4e53</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44016%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=high&amp;id=693aad517d4c6f31f7a4fe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12687-cwe-20-improper-input-validation-in-653d9b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12687%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TeamViewer%20DEX&amp;severity=medium&amp;id=693aad517d4c6f31f7a4fe31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-gogs-zero-day-exploited-across-700-insta-0bd31457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20Gogs%20Zero-Day%20Exploited%20Across%20700%2B%20Instances%20Amid%20Active%20Attacks&amp;severity=high&amp;id=693a9f317d4c6f31f79c024c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-attacks-exploit-gladinets-hard-coded-keys-f-4b87d4b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Attacks%20Exploit%20Gladinet&apos;s%20Hard-Coded%20Keys%20for%20Unauthorized%20Access%20and%20Code%20Execution&amp;severity=high&amp;id=693a9f527d4c6f31f79c062a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixes-eighth-chrome-zero-day-exploited-in-a-e1392167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixes%20eighth%20Chrome%20zero-day%20exploited%20in%20attacks%20in%202025&amp;severity=critical&amp;id=693a9f527d4c6f31f79c062e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ibm-patches-over-100-vulnerabilities-06bb5c85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IBM%20Patches%20Over%20100%20Vulnerabilities&amp;severity=critical&amp;id=693a9bb37d4c6f31f79b1658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-now-uses-python-loader-to-byp-e67c2569</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%20Now%20Uses%20Python%20Loader%20to%20Bypass%20Security&amp;severity=medium&amp;id=693a912e7d4c6f31f7964e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64701-privilege-chaining-in-qualitysoft-c-9f7cc552</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64701%3A%20Privilege%20chaining%20in%20QualitySoft%20Corporation%20QND%20Premium%2FAdvance%2FStandard&amp;severity=high&amp;id=693a7fa47d4c6f31f78f4e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-mysterious-chrome-zero-day-exploite-907589a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Mysterious%20Chrome%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=693a788e7d4c6f31f78cf3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14512-integer-overflow-or-wraparound-in-r-bbc3ea86</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14512%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20glib&amp;severity=medium&amp;id=693a726596da2fc9d6ded0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-targeted-by-active-in-the-wild-exploit-tied-838c9e82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Targeted%20by%20Active%20In-the-Wild%20Exploit%20Tied%20to%20Undisclosed%20High-Severity%20Flaw&amp;severity=high&amp;id=693b444622246175c6a5d1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-attacks-exploit-gladinets-hard-coded-keys-f-43cb43d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Attacks%20Exploit%20Gladinet&apos;s%20Hard-Coded%20Keys%20for%20Unauthorized%20Access%20and%20Code%20Execution&amp;severity=critical&amp;id=693a718296da2fc9d6dd0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9436-cwe-79-improper-neutralization-of-in-e72015b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Google%20Reviews&amp;severity=medium&amp;id=693a3ebcbbbecd30a6fa3302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10163-cwe-89-improper-neutralization-of-s-c79701db</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10163%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=693a3ebcbbbecd30a6fa32fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14485-command-injection-in-efm-iptime-a30-ddc1c3db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14485%3A%20Command%20Injection%20in%20EFM%20ipTIME%20A3004T&amp;severity=low&amp;id=693a37b4bbbecd30a6f5d200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-ai-gemma-3-locally-with-a-single-cpu-wed-dec-ae410137</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20%2C%20(Wed%2C%20Dec%2010th)&amp;severity=medium&amp;id=693a309cbbbecd30a6f44004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13764-cwe-269-improper-privilege-manageme-e97de041</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13764%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusTheme%20WP%20CarDealer&amp;severity=critical&amp;id=693a30aebbbecd30a6f44761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11467-cwe-918-server-side-request-forgery-0e91ec94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11467%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=693a30aebbbecd30a6f4475d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67720-cwe-22-improper-limitation-of-a-pat-98a8df5e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67720%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mayuri-Chan%20pyrofork&amp;severity=medium&amp;id=693a262ebbbecd30a6f23cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67719-cwe-620-unverified-password-change--b84becb0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67719%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20ibexa%20user&amp;severity=high&amp;id=693a262ebbbecd30a6f23ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67716-cwe-184-incomplete-list-of-disallow-9665847a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67716%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=693a149dbbbecd30a6dedd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67713-cwe-601-url-redirection-to-untruste-47c2726a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67713%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20miniflux%20v2&amp;severity=medium&amp;id=693a0f09e425ca5072e7e482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-11-7ee2fc62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-11&amp;severity=medium&amp;id=693b5e948a7c12acf2ca9aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66429-na-d7c48408</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66429%3A%20n%2Fa&amp;severity=high&amp;id=693b2c5f22246175c6996d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55816-na-5130dac0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55816%3A%20n%2Fa&amp;severity=medium&amp;id=693b28e322246175c6977630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56130-na-00db804b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56130%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56129-na-90d1c0b0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56129%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56127-na-09de8e5c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56127%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56124-na-32e7efad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56124%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56123-na-198b52d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56123%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56122-na-1114a23d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56122%3A%20n%2Fa&amp;severity=high&amp;id=693b13487d4c6f31f7c065a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56120-na-1f7a7a7c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56120%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56118-na-13c7ce23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56118%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56117-na-fd038fb9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56117%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56114-na-73fffd18</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56114%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56113-na-0eef2fd9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56113%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56111-na-9c6c9a52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56111%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc27d4c6f31f7bf9f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56110-na-ba168e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56110%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56109-na-320a31a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56109%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56108-na-f319f1b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56108%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56107-na-3895fa32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56107%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56106-na-78a308ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56106%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56102-na-4e1cc633</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56102%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56101-na-e04406b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56101%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56099-na-af426c88</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56099%3A%20n%2Fa&amp;severity=high&amp;id=693b0fc17d4c6f31f7bf9f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56091-na-93b6fc72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56091%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56090-na-a70936d3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56090%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56089-na-2e7a5644</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56089%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56088-na-6bd8c186</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56088%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56087-na-6cb764c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56087%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56086-na-e64eb0b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56086%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56085-na-93c616a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56085%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56084-na-69eaba9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56084%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56083-na-8e0df2a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56083%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4e7d4c6f31f7befd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56082-na-cffd4927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56082%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56079-na-42d0e74d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56079%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56077-na-a2b35e43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56077%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56098-na-45b83694</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56098%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56097-na-e262ebb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56097%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56096-na-b69f14ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56096%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56095-na-cd23e6ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56095%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56094-na-53ee51f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56094%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56093-na-535a78b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56093%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56092-na-cb46fcdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56092%3A%20n%2Fa&amp;severity=high&amp;id=693b0c4c7d4c6f31f7befcc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66918-na-a5f1de48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66918%3A%20n%2Fa&amp;severity=high&amp;id=693b01b07d4c6f31f7bc5fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65474-na-267bce03</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65474%3A%20n%2Fa&amp;severity=high&amp;id=693af7247d4c6f31f7ba56f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65471-na-3a47ebd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65471%3A%20n%2Fa&amp;severity=high&amp;id=693af7247d4c6f31f7ba56f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65473-na-acaf427e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65473%3A%20n%2Fa&amp;severity=critical&amp;id=693af3a07d4c6f31f7b8f5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65472-na-a783b09a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65472%3A%20n%2Fa&amp;severity=high&amp;id=693af3a07d4c6f31f7b8f5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55314-na-402053f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55314%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b7120f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55313-na-0f55f7b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55313%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b7120c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55312-na-50996030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55312%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b71209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55311-na-04eda2b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55311%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b71206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55310-na-2f7ab0fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55310%3A%20n%2Fa&amp;severity=high&amp;id=693ae91d7d4c6f31f7b71203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55309-na-43679c77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55309%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b71200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55308-na-3169c443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55308%3A%20n%2Fa&amp;severity=medium&amp;id=693ae91d7d4c6f31f7b711fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59803-na-a3093274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59803%3A%20n%2Fa&amp;severity=medium&amp;id=693ae5917d4c6f31f7b66ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59802-na-6b412f40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59802%3A%20n%2Fa&amp;severity=high&amp;id=693ae5917d4c6f31f7b66fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55307-na-e9ea8c0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55307%3A%20n%2Fa&amp;severity=low&amp;id=693ae5917d4c6f31f7b66feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67646-cwe-352-cross-site-request-forgery--bd97fdf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67646%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Telepedia%20TableProgressTracking&amp;severity=low&amp;id=693a0800e425ca5072db0c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67644-cwe-89-improper-neutralization-of-s-753ef587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67644%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=693a0800e425ca5072db0c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-droidlock-malware-locks-android-devices-and-de-0810409b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DroidLock%20malware%20locks%20Android%20devices%20and%20demands%20a%20ransom&amp;severity=high&amp;id=693a047be425ca5072d903d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67511-cwe-77-improper-neutralization-of-s-63820d7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67511%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20aliasrobotics%20cai&amp;severity=critical&amp;id=693a12a7bbbecd30a6dd4e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67509-cwe-94-improper-control-of-generati-ff5dc9b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67509%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20neuron-core%20neuron-ai&amp;severity=high&amp;id=6939ff557cb4621ebe9f6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67510-cwe-250-execution-with-unnecessary--4cf6ea08</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67510%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20neuron-core%20neuron-ai&amp;severity=critical&amp;id=6939fbd37cb4621ebe9b284d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67513-cwe-521-weak-password-requirements--883ee506</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67513%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20FreePBX%20endpoint&amp;severity=medium&amp;id=6939f84c7cb4621ebe960e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67505-cwe-362-concurrent-execution-using--8547fbfa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67505%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20okta%20okta-sdk-java&amp;severity=high&amp;id=6939f4c87cb4621ebe93c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67490-cwe-863-incorrect-authorization-in--805f2ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67490%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=6939f4c87cb4621ebe93c164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66474-cwe-95-improper-neutralization-of-d-8b993f01</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66474%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-rendering&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66473-cwe-770-allocation-of-resources-wit-74624010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66473%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66033-cwe-401-missing-release-of-memory-a-867c1ec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66033%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20okta%20okta-sdk-java&amp;severity=medium&amp;id=6939ec5a5ab76fdc5f2d8880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66472-cwe-79-improper-neutralization-of-i-5defd6b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66472%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=6939ec5a5ab76fdc5f2d8884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58283-cwe-434-unrestricted-upload-of-file-897086fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58283%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wbce%20WBCE%20CMS&amp;severity=high&amp;id=6939e5605ab76fdc5f2656e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58279-cwe-434-unrestricted-upload-of-file-6de1e447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58279%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20apprain%20appRain%20CMF&amp;severity=high&amp;id=6939e5605ab76fdc5f2656e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53776-cwe-384-session-fixation-in-db-elet-5166dbc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53776%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e5605ab76fdc5f2656db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-10000-docker-hub-images-found-leaking-credent-8ebfb8b7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2010%2C000%20Docker%20Hub%20images%20found%20leaking%20credentials%2C%20auth%20keys&amp;severity=high&amp;id=6939e54f5ab76fdc5f264c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53775-cwe-384-session-fixation-in-db-elet-ccb422bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53775%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e5605ab76fdc5f2656d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53741-cwe-384-session-fixation-in-db-elet-0c9487fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53741%3A%20CWE-384%3A%20Session%20Fixation%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=medium&amp;id=6939e1d75ab76fdc5f21095a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53740-cwe-862-missing-authorization-in-db-cf46e30d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53740%3A%20CWE-862%3A%20Missing%20Authorization%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20Series%20-%20Compact%20Radio%20DAB%20Transmitter&amp;severity=high&amp;id=6939e1d75ab76fdc5f210952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62181-cwe-204-observable-response-discrep-d58506b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62181%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=6939dce9a97935729e774028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65950-cwe-89-improper-neutralization-of-s-dae8c159</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65950%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WBCE%20WBCE_CMS&amp;severity=critical&amp;id=6939dceba97935729e77408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67460-cwe-693-protection-mechanism-failur-6af4b16b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67460%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=high&amp;id=6939dceba97935729e774094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67461-cwe-73-external-control-of-file-nam-8861551b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67461%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=medium&amp;id=6939dceba97935729e774097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/torrent-for-dicaprios-one-battle-after-another-mov-167c803a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Torrent%20for%20DiCaprio%E2%80%99s%20%E2%80%9COne%20Battle%20After%20Another%E2%80%9D%20Movie%20Drops%20Agent%20Tesla&amp;severity=medium&amp;id=6939d960a97935729e728209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-exploitation-delivers-crypto-miners-an-21a1bb4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Exploitation%20Delivers%20Crypto%20Miners%20and%20New%20Malware%20Across%20Multiple%20Sectors&amp;severity=medium&amp;id=6939dea8a97935729e794a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browser-hijacking-techniques-some-education-requir-9af8a4ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Browser%20Hijacking%20Techniques%3A%20Some%20education%20required&amp;severity=medium&amp;id=693a8a287d4c6f31f792ee34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/net-soapwn-flaw-opens-door-for-file-writes-and-rem-394da945</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=.NET%20SOAPwn%20Flaw%20Opens%20Door%20for%20File%20Writes%20and%20Remote%20Code%20Execution%20via%20Rogue%20WSDL&amp;severity=critical&amp;id=6939dea8a97935729e794a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-an-adversary-in-the-middle-phishing--13d77b93</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20an%20adversary-in-the-middle%20phishing%20campaign%20targeting%20Microsoft%20365%20and%20Okta%20users&amp;severity=medium&amp;id=693a8a287d4c6f31f792ee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures-16ab5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gogs%20Zero-Day%20RCE%20(CVE-2025-8110)%20Actively%20Exploited&amp;severity=medium&amp;id=682c992c7960f6956616ab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanoremote-cousin-of-finaldraft-bfb18425</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NANOREMOTE%2C%20cousin%20of%20FINALDRAFT&amp;severity=medium&amp;id=693a8a287d4c6f31f792edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/covert-red-team-phishing-343db125</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Covert%20red%20team%20phishing&amp;severity=medium&amp;id=6939bdc1fe7b3954b690bfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64622-cross-site-scripting-stored-xss-cwe-d5c989da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64622%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64582-cross-site-scripting-stored-xss-cwe-0ab4605c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64582%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64547-cross-site-scripting-stored-xss-cwe-0355764f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64547%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64833-cross-site-scripting-stored-xss-cwe-f514a9ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64833%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64613-cross-site-scripting-stored-xss-cwe-c1fac439</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64613%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64829-cross-site-scripting-stored-xss-cwe-ff0c1d1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64829%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64553-cross-site-scripting-stored-xss-cwe-ff291706</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64553%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64545-cross-site-scripting-dom-based-xss--9c6cf7ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64545%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64546-cross-site-scripting-stored-xss-cwe-6b7ad79c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64546%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64537-cross-site-scripting-dom-based-xss--ea0e3922</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64537%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690addf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64574-cross-site-scripting-stored-xss-cwe-949d77fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64574%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64550-cross-site-scripting-dom-based-xss--8decbdfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64550%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64827-cross-site-scripting-stored-xss-cwe-e4b0761f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64827%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64602-cross-site-scripting-stored-xss-cwe-01fd320a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64602%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64593-cross-site-scripting-stored-xss-cwe-5dfbfb82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64593%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64539-cross-site-scripting-dom-based-xss--a31615bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64539%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690ade5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64887-cross-site-scripting-dom-based-xss--9165240e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64887%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64548-cross-site-scripting-stored-xss-cwe-9c2a0040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64548%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64563-cross-site-scripting-dom-based-xss--f8f6a49d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64563%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64800-cross-site-scripting-stored-xss-cwe-5840d6fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64800%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64559-cross-site-scripting-stored-xss-cwe-c4f076fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64559%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64817-cross-site-scripting-stored-xss-cwe-3dab139f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64817%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64888-cross-site-scripting-dom-based-xss--84efb933</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64888%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64600-cross-site-scripting-stored-xss-cwe-eb45f841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64600%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64583-cross-site-scripting-dom-based-xss--0f144197</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64583%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64826-cross-site-scripting-stored-xss-cwe-0ee70e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64826%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64538-cross-site-scripting-dom-based-xss--a462f6dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64538%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=6939bda4fe7b3954b690ade2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64605-cross-site-scripting-stored-xss-cwe-b48df603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64605%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64875-cross-site-scripting-stored-xss-cwe-e02846b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64875%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64598-cross-site-scripting-stored-xss-cwe-6df1eda5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64598%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64558-cross-site-scripting-stored-xss-cwe-787b9263</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64558%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64616-cross-site-scripting-stored-xss-cwe-a4c649c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64616%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64820-cross-site-scripting-stored-xss-cwe-e40127dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64820%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64861-cross-site-scripting-stored-xss-cwe-900f0c1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64861%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64801-cross-site-scripting-stored-xss-cwe-50e02b46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64801%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64620-cross-site-scripting-stored-xss-cwe-18993c03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64620%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64601-cross-site-scripting-stored-xss-cwe-43929457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64601%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64560-cross-site-scripting-dom-based-xss--48d58b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64560%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64556-cross-site-scripting-stored-xss-cwe-e3dd1b42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64556%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64565-cross-site-scripting-dom-based-xss--28650235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64565%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64606-cross-site-scripting-stored-xss-cwe-abd6c6b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64606%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64823-cross-site-scripting-stored-xss-cwe-92bd1b51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64823%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64596-cross-site-scripting-stored-xss-cwe-501a521b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64596%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64572-cross-site-scripting-stored-xss-cwe-f72dcda4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64572%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64541-cross-site-scripting-stored-xss-cwe-993e417d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64541%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690ade8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64609-cross-site-scripting-stored-xss-cwe-39d027a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64609%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64822-cross-site-scripting-stored-xss-cwe-47fdc99e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64822%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64789-cross-site-scripting-stored-xss-cwe-4f685868</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64789%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64881-cross-site-scripting-stored-xss-cwe-7fad6cea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64881%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64825-cross-site-scripting-stored-xss-cwe-45644575</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64825%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64845-cross-site-scripting-stored-xss-cwe-b433f035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64845%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64626-cross-site-scripting-stored-xss-cwe-b9a34e65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64626%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64544-cross-site-scripting-dom-based-xss--ffff894d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64544%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64597-cross-site-scripting-stored-xss-cwe-609d6ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64597%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64611-cross-site-scripting-stored-xss-cwe-96c8dbc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64611%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64821-cross-site-scripting-stored-xss-cwe-652105dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64821%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64580-cross-site-scripting-stored-xss-cwe-62250efd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64580%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64586-cross-site-scripting-stored-xss-cwe-329887b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64586%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64627-cross-site-scripting-stored-xss-cwe-3e24f0a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64627%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64566-cross-site-scripting-dom-based-xss--aae7d734</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64566%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64604-cross-site-scripting-stored-xss-cwe-bb5ebe7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64604%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64599-cross-site-scripting-stored-xss-cwe-203e2085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64599%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64804-cross-site-scripting-stored-xss-cwe-f9af0c28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64804%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64623-cross-site-scripting-stored-xss-cwe-5737cd57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64623%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64858-cross-site-scripting-stored-xss-cwe-4f77fa3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64858%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64847-cross-site-scripting-stored-xss-cwe-06581d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64847%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64607-cross-site-scripting-stored-xss-cwe-9f9a71ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64607%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64803-cross-site-scripting-stored-xss-cwe-d92d291a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64803%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34429-cwe-352-cross-site-request-forgery--cdc26e79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34429%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=high&amp;id=6939bda4fe7b3954b690add5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64577-cross-site-scripting-stored-xss-cwe-c620d46f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64577%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64863-cross-site-scripting-stored-xss-cwe-fcd0ec3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64863%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64853-cross-site-scripting-stored-xss-cwe-0dbbd564</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64853%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64814-cross-site-scripting-stored-xss-cwe-c999e1f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64814%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64612-cross-site-scripting-stored-xss-cwe-9064e575</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64612%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64857-cross-site-scripting-stored-xss-cwe-abeb7e82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64857%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690bec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64794-cross-site-scripting-stored-xss-cwe-6baa027a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64794%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64591-cross-site-scripting-stored-xss-cwe-cc44b1b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64591%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64555-cross-site-scripting-stored-xss-cwe-c6eb5c56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64555%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64549-cross-site-scripting-stored-xss-cwe-cbb97323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64549%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64808-cross-site-scripting-stored-xss-cwe-db0c87a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64808%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64840-cross-site-scripting-stored-xss-cwe-c8da1c70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64840%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690bea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64564-cross-site-scripting-dom-based-xss--ca078768</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64564%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64551-cross-site-scripting-dom-based-xss--47dfa67f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64551%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64569-cross-site-scripting-dom-based-xss--7b2d3a31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64569%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64850-cross-site-scripting-stored-xss-cwe-d9c57326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64850%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64592-cross-site-scripting-stored-xss-cwe-dcc86619</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64592%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64543-cross-site-scripting-dom-based-xss--33f4d9b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64543%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda4fe7b3954b690adeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64578-cross-site-scripting-stored-xss-cwe-7b36503f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64578%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64839-cross-site-scripting-stored-xss-cwe-1ac36baa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64839%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb5fe7b3954b690be9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34430-cwe-352-cross-site-request-forgery--bc04049c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34430%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=medium&amp;id=6939bda4fe7b3954b690adda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64554-cross-site-scripting-stored-xss-cwe-96dfce29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64554%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64791-cross-site-scripting-stored-xss-cwe-44682a38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64791%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64841-cross-site-scripting-stored-xss-cwe-a7d263d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64841%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64619-cross-site-scripting-stored-xss-cwe-dc5f7c0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64619%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64799-cross-site-scripting-stored-xss-cwe-606de0e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64799%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64581-cross-site-scripting-stored-xss-cwe-90cab848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64581%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64852-cross-site-scripting-stored-xss-cwe-2d46487f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64852%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb6fe7b3954b690beba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64576-cross-site-scripting-stored-xss-cwe-40028bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64576%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64615-cross-site-scripting-stored-xss-cwe-5b9ac2d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64615%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64873-cross-site-scripting-stored-xss-cwe-da9ce92e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64873%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64590-cross-site-scripting-stored-xss-cwe-d7725f89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64590%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64557-cross-site-scripting-stored-xss-cwe-1c49cb63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64557%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda5fe7b3954b690ae1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64790-cross-site-scripting-stored-xss-cwe-07d86705</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64790%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64585-cross-site-scripting-stored-xss-cwe-4ff1c024</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64585%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64797-cross-site-scripting-stored-xss-cwe-14e06d79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64797%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64579-cross-site-scripting-stored-xss-cwe-a9daae9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64579%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64869-cross-site-scripting-stored-xss-cwe-47ed696a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64869%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690bed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64796-cross-site-scripting-stored-xss-cwe-83437c29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64796%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64603-cross-site-scripting-stored-xss-cwe-b4b1b0ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64603%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdacfe7b3954b690bb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64792-cross-site-scripting-stored-xss-cwe-909e434d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64792%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64575-cross-site-scripting-stored-xss-cwe-c2717fed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64575%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda9fe7b3954b690b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64802-cross-site-scripting-stored-xss-cwe-f966ae2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64802%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb3fe7b3954b690be57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64793-cross-site-scripting-stored-xss-cwe-c3079333</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64793%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb1fe7b3954b690bbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64594-cross-site-scripting-stored-xss-cwe-f85a0e88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64594%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaafe7b3954b690b33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64614-cross-site-scripting-stored-xss-cwe-ab85b942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64614%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdaefe7b3954b690bb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64872-cross-site-scripting-stored-xss-cwe-21ead94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64872%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bdb8fe7b3954b690beda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64562-cross-site-scripting-dom-based-xss--88bcc4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64562%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6939bda7fe7b3954b690b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65199-cwe-78-improper-neutralization-of-s-275a32aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65199%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Windscribe%20Windscribe%20for%20Linux%20Desktop%20App&amp;severity=high&amp;id=6939ba1ffe7b3954b68b96e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5467-cwe-708-incorrect-ownership-assignme-3a4651f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5467%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20Canonical%20apport&amp;severity=low&amp;id=6939b696fe7b3954b689178f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-stealer-hiding-in-blender-3d-models-kaspersky-of-14ce5b74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20stealer%20hiding%20in%20Blender%203D%20models%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6939b6a0fe7b3954b6891b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ruse-valleyrat-hits-china-via-fake-microso-b28fbd5d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ruse%3A%20ValleyRAT%20Hits%20China%20via%20Fake%20Microsoft%20Teams%20Attack&amp;severity=medium&amp;id=693a8a287d4c6f31f792edc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13607-cwe-306-missing-authentication-for--49c1ceb8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13607%3A%20CWE-306%20in%20D-Link%20DCS-F5614-L1&amp;severity=critical&amp;id=6939ae2d62aa6c8a0e4448a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soapwn-pwning-net-framework-applications-through-h-d0196e41</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SOAPwn%3A%20Pwning%20.NET%20Framework%20Applications%20Through%20HTTP%20Client%20Proxies%20And%20WSDL%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=6939ae3162aa6c8a0e444984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-has-entered-the-chat-3ff6e63a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20has%20entered%20the%20chat&amp;severity=high&amp;id=6939a67462aa6c8a0e3c6b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67643-vulnerability-in-jenkins-project-je-61431caa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67643%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Redpen%20-%20Pipeline%20Reporter%20for%20Jira%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67642-vulnerability-in-jenkins-project-je-81600b0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67642%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HashiCorp%20Vault%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67641-vulnerability-in-jenkins-project-je-b7f4f1d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67641%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Coverage%20Plugin&amp;severity=high&amp;id=6939a66f62aa6c8a0e3c6b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67640-vulnerability-in-jenkins-project-je-07d868d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67640%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20client%20Plugin&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67639-vulnerability-in-jenkins-project-je-324e19b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67639%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=low&amp;id=6939a66f62aa6c8a0e3c6b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67638-vulnerability-in-jenkins-project-je-617b3e61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67638%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67637-vulnerability-in-jenkins-project-je-d015ddf2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67637%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67636-vulnerability-in-jenkins-project-je-26a550b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67636%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=6939a66f62aa6c8a0e3c6b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67635-vulnerability-in-jenkins-project-je-e676f964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67635%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=6939a66f62aa6c8a0e3c6b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-deploy-etherrat-malware-in-re-b48ea74c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Deploy%20EtherRAT%20Malware%20in%20React2Shell%20Exploits&amp;severity=medium&amp;id=6939a2f762aa6c8a0e36f854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-pcie-encryption-weaknesses-expose-pcie-50-sy-9aadf782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20PCIe%20Encryption%20Weaknesses%20Expose%20PCIe%205.0%2B%20Systems%20to%20Faulty%20Data%20Handling&amp;severity=high&amp;id=6939a1a8b45ef26b31b81e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34410-cwe-352-cross-site-request-forgery--ff5d8ced</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LXware%201Panel&amp;severity=high&amp;id=69399ca286adcdec9b1a61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-fake-video-scams-schneier-on-security-322efc99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Fake%20Video%20Scams%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6939991e86adcdec9b16478c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-hacker-charged-with-helping-russian-hack-1fc3c034</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20hacker%20charged%20with%20helping%20Russian%20hacktivist%20groups&amp;severity=high&amp;id=6939991e86adcdec9b164788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34395-cwe-22-improper-limitation-of-a-pat-d21fd03a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34395%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Barracuda%20Networks%20RMM&amp;severity=high&amp;id=6939994886adcdec9b166036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34394-cwe-502-deserialization-of-untruste-9032e7c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34394%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b166031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34393-cwe-470-use-of-externally-controlle-f9b8725c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34393%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b16602c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34392-cwe-36-absolute-path-traversal-in-b-1926d191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34392%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Barracuda%20Networks%20RMM&amp;severity=critical&amp;id=6939994886adcdec9b166027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-exploit-variant-for-cve-2024-9042-kuberne-e93b1ef6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20exploit%20variant%20for%20CVE-2024-9042%20(Kubernetes%20OS%20Command%20Injection)%2C%20(Wed%2C%20Dec%2010th)&amp;severity=medium&amp;id=6939920a86adcdec9b0f4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracking-valleyrat-from-builder-secrets-to-kernel--5cc63cce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracking%20ValleyRAT%3A%20From%20Builder%20Secrets%20to%20Kernel%20Rootkits&amp;severity=high&amp;id=693989485f410c6b20afc44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild-16aa45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PeerBlight%20Linux%20Backdoor%20Exploits%20React2Shell%20CVE-2025-55182&amp;severity=medium&amp;id=682c992c7960f6956616aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13125-cwe-639-authorization-bypass-throug-b2e7c443</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13125%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Im%20Park%20Information%20Technology%2C%20Electronics%2C%20Press%2C%20Publishing%20and%20Advertising%2C%20Education%20Ltd.%20Co.%20DijiDemi&amp;severity=medium&amp;id=6939823e5f410c6b20a8995d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13155-cwe-276-incorrect-default-permissio-b276ee43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13155%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Baiying%20Client&amp;severity=high&amp;id=6939823e5f410c6b20a89964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13152-cwe-427-uncontrolled-search-path-el-f35f2b7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13152%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20One%20Client&amp;severity=high&amp;id=6939823e5f410c6b20a89960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12046-cwe-427-uncontrolled-search-path-el-0210ef82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12046%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6939823e5f410c6b20a8995a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-indicts-extradited-ukrainian-on-charges-of-aidi-908fa38b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Indicts%20Extradited%20Ukrainian%20on%20Charges%20of%20Aiding%20Russian%20Hacking%20Groups&amp;severity=medium&amp;id=69397b3b471be09b6e3bf760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-pcie-encryption-weaknesses-expose-pcie-50-sy-205ba99f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20PCIe%20Encryption%20Weaknesses%20Expose%20PCIe%205.0%2B%20Systems%20to%20Faulty%20Data%20Handling&amp;severity=medium&amp;id=69398a745f410c6b20b073ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13127-cwe-79-improper-neutralization-of-i-abd031cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TAC%20Information%20Services%20Internal%20and%20External%20Trade%20Inc.%20GoldenHorn&amp;severity=low&amp;id=69397d1d471be09b6e3e8e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2105-cwe-1287-improper-validation-of-spec-bcb25c66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2105%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20JBL%20Flip%205&amp;severity=medium&amp;id=69397292471be09b6e332fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2104-cwe-306-missing-authentication-for-c-3d0772bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2104%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20JBL%20LIVE%20PRO%202%20TWS&amp;severity=high&amp;id=69397292471be09b6e332ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-gemini-enterprise-vulnerability-exp-0971881f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Gemini%20Enterprise%20Vulnerability%20Exposing%20Corporate%20Data&amp;severity=medium&amp;id=69396f0a471be09b6e2de08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-patches-critical-authentication-bypass-vu-38652f63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Patches%20Critical%20Authentication%20Bypass%20Vulnerabilities&amp;severity=critical&amp;id=69396a548e5e216c62f539e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-security-fixes-for-56-flaws-inclu-22efa0f4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Security%20Fixes%20for%2056%20Flaws%2C%20Including%20Active%20Exploit%20and%20Two%20Zero-Days&amp;severity=high&amp;id=69396a6f8e5e216c62f54396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-microsoft-windows-and-winrar-flaws-to-485c8f26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Microsoft%20Windows%20and%20WinRAR%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=69396a6f8e5e216c62f5439a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13184-cwe-306-missing-authentication-for--6aa8fc80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13184%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Toto%20Link%20X5000R&apos;s%20(AX1800%20router)&amp;severity=critical&amp;id=69396f2b471be09b6e2e184c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-poisoning-amos-stealer-how-trust-became-the-big-96e2d626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Poisoning%20%26%20AMOS%20Stealer%3A%20How%20Trust%20Became%20the%20Biggest%20Mac%20Threat&amp;severity=medium&amp;id=693985c05f410c6b20aa8a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-winrar-vulnerability-cve-2025-6218-under-a-3751b2b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%3A%20WinRAR%20Vulnerability%20CVE-2025-6218%20Under%20Active%20Attack%20by%20Multiple%20Threat%20Groups&amp;severity=medium&amp;id=693962928e5e216c62ed6a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-how-attackers-exploit-cloud-misconfigurati-7c23d909</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20How%20Attackers%20Exploit%20Cloud%20Misconfigurations%20Across%20AWS%2C%20AI%20Models%2C%20and%20Kubernetes&amp;severity=medium&amp;id=693962928e5e216c62ed6a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-epm-update-patches-critical-remote-code-exe-3e64c730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20EPM%20Update%20Patches%20Critical%20Remote%20Code%20Execution%20Flaw&amp;severity=critical&amp;id=693962ba8e5e216c62ed8d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13953-cwe-290-authentication-bypass-by-sp-ba953c19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13953%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20GTT%20Sistema%20de%20Informaci%C3%B3n%20Tributario&amp;severity=critical&amp;id=69395cf9e27bef3ae4bfd886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41358-cwe-639-authorization-bypass-throug-31721b4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41358%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CronosWeb%20i2A%20CronosWeb&amp;severity=high&amp;id=69395a3ce27bef3ae4bc14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-vulnerabilities-with-december-b8b2aaaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Vulnerabilities%20With%20December%202025%20Security%20Updates&amp;severity=critical&amp;id=693955e7e27bef3ae4b677e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41732-cwe-121-stack-based-buffer-overflow-83be94cd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41732%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%20Indsutrial-Managed-Switches&amp;severity=critical&amp;id=69395606e27bef3ae4b69151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41730-cwe-121-stack-based-buffer-overflow-997ca2ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41730%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WAGO%20Indsutrial-Managed-Switches&amp;severity=critical&amp;id=69395606e27bef3ae4b6914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-woman-in-us-custody-for-aiding-russian-n-b69c49c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Woman%20in%20US%20Custody%20for%20Aiding%20Russian%20NoName057%20and%20CyberArmyofRussia_Reborn%20(CARR)%20Hacker%20Groups&amp;severity=medium&amp;id=69394a29681246c13df8636c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7073-cwe-59-improper-link-resolution-befo-55aefd0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7073%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Bitdefender%20Total%20Security&amp;severity=high&amp;id=693945e9681246c13df087ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-c81b34b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Fixed%20by%20Siemens%2C%20Rockwell%2C%20Schneider&amp;severity=medium&amp;id=69394257681246c13decfdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/udpgangster-campaigns-target-multiple-countries-36af0845</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UDPGangster%20Campaigns%20Target%20Multiple%20Countries&amp;severity=medium&amp;id=693945e8681246c13df08639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-byovd-loader-behind-deadlock-ransomware-attack-21e84d6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BYOVD%20loader%20behind%20DeadLock%20ransomware%20attack&amp;severity=medium&amp;id=693945e8681246c13df0864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-chimerawire-trojan-boosts-website-popularity-b-8e4db2c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ChimeraWire%20trojan%20boosts%20website%20popularity%20by%20skillfully%20pretending%20to%20be%20human&amp;severity=medium&amp;id=693945e8681246c13df08656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66675-cwe-459-incomplete-cleanup-in-apach-61559a01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66675%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=693945e9681246c13df087fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14390-cwe-434-unrestricted-upload-of-file-147fbd1e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14390%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20videomerchant%20Video%20Merchant&amp;severity=high&amp;id=69393d10fd479f45ea600bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-storm-0249-moves-from-mass-phishi-472482eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20Storm-0249%20Moves%20from%20Mass%20Phishing%20to%20Precision%20EDR%20Exploitation&amp;severity=medium&amp;id=69393d10fd479f45ea600b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66004-cwe-35-path-traversal-in-libimobile-a616342a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66004%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20libimobiledevice%20usbmuxd&amp;severity=medium&amp;id=69393d10fd479f45ea600bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14082-improper-access-control-in-red-hat--8439bcda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14082%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69393d10fd479f45ea600bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1161-cwe-648-incorrect-use-of-privileged--9a69feca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1161%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20NomySoft%20Information%20Technology%20Training%20and%20Consulting%20Inc.%20Nomysem&amp;severity=high&amp;id=69393d10fd479f45ea600bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14087-integer-overflow-or-wraparound-in-r-f2a8850d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14087%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20glib&amp;severity=medium&amp;id=6939398dfd479f45ea5b2e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-security-fixes-for-56-flaws-inclu-72859fb1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Security%20Fixes%20for%2056%20Flaws%2C%20Including%20Active%20Exploit%20and%20Two%20Zero-Days&amp;severity=critical&amp;id=69394a9c681246c13df8f911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9315-cwe-915-improperly-controlled-modifi-42e07a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9315%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Moxa%20MXsecurity%20Series&amp;severity=medium&amp;id=69393610fd479f45ea552451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13955-cwe-330-use-of-insufficiently-rando-ef4a57fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13955%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=critical&amp;id=69393610fd479f45ea55244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13954-cwe-798-use-of-hard-coded-credentia-75c8e886</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13954%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EZCast%20EZCast%20Pro%20II&amp;severity=critical&amp;id=69393610fd479f45ea55244b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-amd-processors-affected-by-pcie-vulnerabilit-ed071ff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%2C%20AMD%20Processors%20Affected%20by%20PCIe%20Vulnerabilities&amp;severity=low&amp;id=69392a434db6a6ddfda90a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-honey-tokens-for-breach-detection-no-signup-0150b93e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Free%20Honey%20Tokens%20for%20Breach%20Detection%20-%20No%20Signup&amp;severity=high&amp;id=6939261a4db6a6ddfda2455a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12952-cwe-269-improper-privilege-manageme-e43c89ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12952%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Dialogflow%20CX&amp;severity=high&amp;id=69392a654db6a6ddfda93e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9571-cwe-502-deserialization-of-untrusted-57d07aa3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9571%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Google%20Cloud%20Cloud%20Data%20Fusion&amp;severity=high&amp;id=69391d0bed5c5e39c813c142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13073-cwe-79-cross-site-scripting-xss-in--eacde70e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13073%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20HandL%20UTM%20Grabber%20%2F%20Tracker&amp;severity=high&amp;id=69390de80d2afef9e5da1fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13072-cwe-79-cross-site-scripting-xss-in--a7caa04c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13072%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20HandL%20UTM%20Grabber%20%2F%20Tracker&amp;severity=high&amp;id=69390de80d2afef9e5da1fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-ivanti-and-sap-issue-urgent-patches-for-a-9a0f9a74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%2C%20Ivanti%2C%20and%20SAP%20Issue%20Urgent%20Patches%20for%20Authentication%20and%20Code%20Execution%20Flaws&amp;severity=critical&amp;id=6938fe57422a156f1941a383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13339-cwe-22-improper-limitation-of-a-pat-8a3e757b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13339%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hippooo%20Hippoo%20Mobile%20App%20for%20WooCommerce&amp;severity=high&amp;id=6938fae1422a156f193ca26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9056-cwe-863-incorrect-authorization-in-t-3cc06726</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9056%3A%20CWE-863%20Incorrect%20Authorization%20in%20TECNO%20com.transsion.audiosmartconnect&amp;severity=medium&amp;id=6938ec92bc985c89a3e00f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13677-cwe-22-improper-limitation-of-a-pat-d2914fa3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13677%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=6938ec92bc985c89a3e00f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-sanctions-russian-and-chinese-firms-suspected-o-f6ec3f82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Sanctions%20Russian%20and%20Chinese%20Firms%20Suspected%20of%20Being%20%E2%80%98Malign%20Actors%E2%80%99%20in%20Information%20Warfare&amp;severity=critical&amp;id=6938de74bc985c89a3db811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13613-cwe-289-authentication-bypass-by-al-337c03b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13613%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Elated%20Themes%20Elated%20Membership&amp;severity=critical&amp;id=6938de9abc985c89a3dc30ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67507-cwe-287-improper-authentication-in--ba9bcc7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67507%3A%20CWE-287%3A%20Improper%20Authentication%20in%20filamentphp%20filament&amp;severity=high&amp;id=6938c96abc985c89a39766e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67485-cwe-693-protection-mechanism-failur-ecaac0e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67485%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20machphy%20mad-proxy&amp;severity=medium&amp;id=6938c4f57205ca471f2ee9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-10-15c6d22a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-10&amp;severity=medium&amp;id=693a0b73e425ca5072e02556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65297-na-48f48ec7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65297%3A%20n%2Fa&amp;severity=high&amp;id=6939efe25ab76fdc5f31bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65296-na-d9c9fce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65296%3A%20n%2Fa&amp;severity=medium&amp;id=6939efe25ab76fdc5f31bfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65295-na-a3ec530c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65295%3A%20n%2Fa&amp;severity=high&amp;id=6939ec5a5ab76fdc5f2d887d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65294-na-59ea7988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65294%3A%20n%2Fa&amp;severity=critical&amp;id=6939e8d65ab76fdc5f28af17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65293-na-71da3245</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65293%3A%20n%2Fa&amp;severity=medium&amp;id=6939e8d65ab76fdc5f28af14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65292-na-efd74866</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65292%3A%20n%2Fa&amp;severity=high&amp;id=6939e8d65ab76fdc5f28af11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65291-na-ac461b5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65291%3A%20n%2Fa&amp;severity=high&amp;id=6939e5605ab76fdc5f2656f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65290-na-bac4e138</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65290%3A%20n%2Fa&amp;severity=high&amp;id=6939e5605ab76fdc5f2656ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65832-na-e570b36f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65832%3A%20n%2Fa&amp;severity=medium&amp;id=6939e076a97935729e7b806d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65831-na-f69ea1c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65831%3A%20n%2Fa&amp;severity=high&amp;id=6939e076a97935729e7b8069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65830-na-3199f22e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65830%3A%20n%2Fa&amp;severity=critical&amp;id=6939e076a97935729e7b8065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65829-na-d61fbce7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65829%3A%20n%2Fa&amp;severity=medium&amp;id=6939e076a97935729e7b8061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65828-na-00871c42</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65828%3A%20n%2Fa&amp;severity=medium&amp;id=6939dceba97935729e77408b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65827-na-cd303f74</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65827%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65826-na-72c16726</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65826%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65825-na-8d5e22e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65825%3A%20n%2Fa&amp;severity=medium&amp;id=6939dce9a97935729e774040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65824-na-dd523ced</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65824%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e77403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65823-na-20e0c8a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65823%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e774038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65822-na-406ca77e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65822%3A%20n%2Fa&amp;severity=medium&amp;id=6939dce9a97935729e774034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65821-na-a422c937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65821%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e774030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65820-na-1aa1e722</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65820%3A%20n%2Fa&amp;severity=critical&amp;id=6939dce9a97935729e77402b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24857-na-ec5847ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24857%3A%20n%2Fa&amp;severity=high&amp;id=6939dce9a97935729e774025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65512-na-694d07ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65512%3A%20n%2Fa&amp;severity=high&amp;id=6939d96fa97935729e728440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65602-na-ebac8a04</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65602%3A%20n%2Fa&amp;severity=critical&amp;id=6939d0b8c9771d4f43425bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63895-na-3154bb99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63895%3A%20n%2Fa&amp;severity=high&amp;id=6939cd32c9771d4f433dddb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56431-na-b38ca49e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56431%3A%20n%2Fa&amp;severity=high&amp;id=6939c62bc9771d4f4336c991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56430-na-6587a6ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56430%3A%20n%2Fa&amp;severity=high&amp;id=6939c2b1c9771d4f43317e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56429-na-21e193fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56429%3A%20n%2Fa&amp;severity=medium&amp;id=6939c2b1c9771d4f43317e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65754-na-81bd12d0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65754%3A%20n%2Fa&amp;severity=medium&amp;id=6939b31dfe7b3954b6837bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63094-na-af680748</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63094%3A%20n%2Fa&amp;severity=high&amp;id=6939b0fa62aa6c8a0e4897a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52493-na-cbaaee07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52493%3A%20n%2Fa&amp;severity=medium&amp;id=6939a9f462aa6c8a0e3e35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65815-na-f22a9cc4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65815%3A%20n%2Fa&amp;severity=medium&amp;id=6939a47a62aa6c8a0e3b194b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65814-na-d80f8477</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65814%3A%20n%2Fa&amp;severity=medium&amp;id=6939a47a62aa6c8a0e3b1947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65792-na-271a8ac3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65792%3A%20n%2Fa&amp;severity=critical&amp;id=6939a30c62aa6c8a0e375594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65807-na-3d03cacc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65807%3A%20n%2Fa&amp;severity=high&amp;id=6939921d86adcdec9b0f4b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65803-na-b44e725c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65803%3A%20n%2Fa&amp;severity=medium&amp;id=6939921d86adcdec9b0f4b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67502-cwe-601-url-redirection-to-untruste-9ad65c05</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67502%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20remram44%20taguette&amp;severity=medium&amp;id=6938b8747205ca471f053ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67501-cwe-89-improper-neutralization-of-s-14e94ab2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67501%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6938b6b4b56b439e93ee886a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61808-unrestricted-upload-of-file-with-da-35155246</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61808%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20(CWE-434)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee886f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61813-improper-restriction-of-xml-externa-3444802a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61813%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee887e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61812-improper-input-validation-cwe-20-in-2d638faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61812%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee887b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61821-improper-restriction-of-xml-externa-ff48f269</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61821%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64898-insufficiently-protected-credential-73fed4fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64898%3A%20Insufficiently%20Protected%20Credentials%20(CWE-522)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b6b56b439e93ee88a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61810-deserialization-of-untrusted-data-c-f27bc1e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61810%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=6938b6b4b56b439e93ee8875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61809-improper-input-validation-cwe-20-in-f5a3ca2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61809%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee8872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61822-improper-input-validation-cwe-20-in-916a397f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61822%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64897-improper-access-control-cwe-284-in--c3b971b1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64897%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b6b56b439e93ee88a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61823-improper-restriction-of-xml-externa-da5215ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61823%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=6938b6b4b56b439e93ee8887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61811-improper-access-control-cwe-284-in--df9b3e90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61811%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=6938b6b4b56b439e93ee8878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67499-cwe-200-exposure-of-sensitive-infor-eb778acf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67499%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20containernetworking%20plugins&amp;severity=medium&amp;id=6938aedab56b439e93e4e8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67496-cwe-79-improper-neutralization-of-i-9b629976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67496%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6938a95ab56b439e93e1dcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-spiderman-phishing-kit-targets-european-banks--092c0b4b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Spiderman%20Phishing%20Kit%20Targets%20European%20Banks%20with%20Real-Time%20Credential%20Theft&amp;severity=medium&amp;id=6938a337d4eb7e5ad78128f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36437-cwe-209-generation-of-error-message-b9195b06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36437%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=69389fb7d4eb7e5ad77c2812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66645-cwe-22-improper-limitation-of-a-pat-4abc9d25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66645%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zauberzeug%20nicegui&amp;severity=high&amp;id=69389a31d4eb7e5ad778aab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66039-cwe-287-improper-authentication-in--caeaff94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66039%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FreePBX%20framework&amp;severity=critical&amp;id=693897e052fe50f9a4957ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53774-cwe-306-missing-authentication-for--706e5168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53774%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MiniDVBLinux%20Simple%20VideoDiskRecorder%20Protocol%20SVDRP%20(svdrpsend.sh)%20Exploit&amp;severity=medium&amp;id=693890dd52fe50f9a48c9bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53771-cwe-306-missing-authentication-for--5900f5a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53771%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20MiniDVBLinux%20MiniDVBLinux%20Change%20Root%20Password%20PoC&amp;severity=critical&amp;id=693890dd52fe50f9a48c9bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67489-cwe-94-improper-control-of-generati-dafe53aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67489%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vitejs%20vite-plugin-react&amp;severity=critical&amp;id=693890dd52fe50f9a48c9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53770-cwe-260-password-in-configuration-f-2e22b9e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53770%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20MiniDVBLinux%20MiniDVBLinux(TM)%20Distribution%20(MLD)&amp;severity=high&amp;id=693890dd52fe50f9a48c9bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53739-cwe-260-password-in-configuration-f-bd0ef598</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53739%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20Tinycontrol%20Tinycontrol%20LAN%20Controller%20v&amp;severity=critical&amp;id=69388d5552fe50f9a48acd12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13743-cwe-532-insertion-of-sensitive-info-5471929f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13743%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=low&amp;id=693889e152fe50f9a4851f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64896-creation-of-temporary-file-in-direc-d8c28ae3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64896%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Creative%20Cloud%20Desktop&amp;severity=medium&amp;id=693889e152fe50f9a4851f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-nearly-140-vulnerabilities-b7196b0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Nearly%20140%20Vulnerabilities&amp;severity=medium&amp;id=6938887ef4a79be77cce0cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67488-cwe-22-improper-limitation-of-a-pat-b778b9f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67488%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20siyuan-note%20siyuan&amp;severity=high&amp;id=693888a8f4a79be77cce2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-57-vulnerabilities-three-zero-da-c36bdb2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%2057%20Vulnerabilities%2C%20Three%20Zero-Days&amp;severity=low&amp;id=6938887ef4a79be77cce0cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64899-out-of-bounds-read-cwe-125-in-adobe-c55f424b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64899%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69388b5252fe50f9a48983c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64785-untrusted-search-path-cwe-426-in-ad-9c2ad417</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64785%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69388b5252fe50f9a48983b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64786-improper-verification-of-cryptograp-fad1612e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64786%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20(CWE-347)%20in%20Adobe%20Acrobat%20Reader&amp;severity=low&amp;id=69388b5252fe50f9a48983b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64787-improper-verification-of-cryptograp-0b8443f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64787%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20(CWE-347)%20in%20Adobe%20Acrobat%20Reader&amp;severity=low&amp;id=69388b5252fe50f9a48983bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-december-2025-tue-dec-9th-44777e0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20December%202025%2C%20(Tue%2C%20Dec%209th)&amp;severity=critical&amp;id=6938954452fe50f9a4927f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66626-cwe-23-relative-path-traversal-in-a-aa6110fb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66626%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=69388b5252fe50f9a48983c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-critical-forticloud-sso-login-au-00e63c42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20warns%20of%20critical%20FortiCloud%20SSO%20login%20auth%20bypass%20flaws&amp;severity=critical&amp;id=69388506f4a79be77cca2917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66625-cwe-200-exposure-of-sensitive-infor-e91dd722</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66625%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=69388517f4a79be77cca2bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66457-cwe-94-improper-control-of-generati-0be57f6a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66457%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20elysiajs%20elysia&amp;severity=high&amp;id=69388517f4a79be77cca2bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66456-cwe-1321-improperly-controlled-modi-88a4b2e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66456%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20elysiajs%20elysia&amp;severity=critical&amp;id=69387e02f4a79be77cc30993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66214-cwe-502-deserialization-of-untruste-ad9b4fc7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66214%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wearefrank%20ladybug&amp;severity=high&amp;id=69388517f4a79be77cca2bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14337-sql-injection-in-itsourcecode-stude-581de7c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14337%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69388517f4a79be77cca2bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadside-botnet-hits-tbk-dvrs-raising-alarms-for--3174ec3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadside%20botnet%20hits%20TBK%20DVRs%2C%20raising%20alarms%20for%20maritime%20logistics&amp;severity=medium&amp;id=693878cbef540ebbadc60712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-iab-abuses-edr-for-stealthy-malware-exe-1349a142</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20IAB%20abuses%20EDR%20for%20stealthy%20malware%20execution&amp;severity=high&amp;id=693878cbef540ebbadc6070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-arrests-teen-who-stole-64-million-personal-d-b546dba8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20arrests%20teen%20who%20stole%2064%20million%20personal%20data%20records&amp;severity=high&amp;id=693878cbef540ebbadc6070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-warns-of-critical-endpoint-manager-code-exe-ea7b1d32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20warns%20of%20critical%20Endpoint%20Manager%20code%20execution%20flaw&amp;severity=critical&amp;id=693878cbef540ebbadc606fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64113-cwe-640-weak-password-recovery-mech-c6550325</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64113%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20EmbySupport%20security&amp;severity=critical&amp;id=6938790eef540ebbadc6252b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14336-sql-injection-in-itsourcecode-stude-70660a6c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14336%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69387706ef540ebbadc35cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14335-sql-injection-in-itsourcecode-stude-a0e990a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14335%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69387706ef540ebbadc35ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9613-cwe-459-incomplete-cleanup-in-pci-si-fc6fc5a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9613%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9614-cwe-354-improper-validation-of-integ-f867a994</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9614%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9612-cwe-404-improper-resource-shutdown-o-5eff9416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9612%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20PCI-SIG%20PCI%20Express%20Integrity%20and%20Data%20Encryption%20(PCIe%20IDE)%20Specification&amp;severity=medium&amp;id=693871e8ef540ebbadbcf671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14334-sql-injection-in-itsourcecode-stude-a3a1f160</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14334%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69386e50ef540ebbadbb02e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11531-cwe-22-improper-limitation-of-a-pat-9f005c87</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11531%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20HP%20Inc%20HP%20System%20Event%20Utility&amp;severity=medium&amp;id=69386e50ef540ebbadbb02dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-actors-exploit-react2shell-to-d-9b86b0ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-linked%20Actors%20Exploit%20React2Shell%20to%20Deploy%20New%20EtherRAT%20Malware&amp;severity=critical&amp;id=69387729ef540ebbadc365b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34414-cwe-502-deserialization-of-untruste-f62487a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34414%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Entrust%20Corporation%20Instant%20Financial%20Issuance%20(IF)&amp;severity=critical&amp;id=693867e174ebaa3babaf6f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34413-cwe-693-protection-mechanism-failur-88097e70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34413%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20DigitalPA%20S.r.l.%20Legality%20WHISTLEBLOWING&amp;severity=high&amp;id=693867e174ebaa3babaf6f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62221-cwe-416-use-after-free-in-microsoft-4c0e0d1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54100-cwe-77-improper-neutralization-of-s-56e11712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54100%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64680-cwe-122-heap-based-buffer-overflow--0204fd83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64680%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=693867eb74ebaa3babafb7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64679-cwe-122-heap-based-buffer-overflow--0674a726</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64679%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=693867eb74ebaa3babafb7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64678-cwe-122-heap-based-buffer-overflow--c0a7ae6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64678%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867eb74ebaa3babafb7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64672-cwe-79-improper-neutralization-of-i-90ca043f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64672%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Server%20Subscription%20Edition&amp;severity=high&amp;id=693867eb74ebaa3babafb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64671-cwe-77-improper-neutralization-of-s-1a452cf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64671%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20GitHub%20Copilot%20Plugin%20for%20JetBrains%20IDEs&amp;severity=high&amp;id=693867eb74ebaa3babafb7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64661-cwe-362-concurrent-execution-using--e1d6745a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64661%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62565-cwe-416-use-after-free-in-microsoft-412c450f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62565%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62570-cwe-284-improper-access-control-in--fea7ccb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62570%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62569-cwe-416-use-after-free-in-microsoft-bb3caabf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62569%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62567-cwe-191-integer-underflow-wrap-or-w-f8d0da72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62567%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=693867e974ebaa3babafb6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62560-cwe-822-untrusted-pointer-dereferen-df9ce3a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62560%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62559-cwe-416-use-after-free-in-microsoft-c9c241a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62559%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62558-cwe-416-use-after-free-in-microsoft-d7817460</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62558%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62557-cwe-416-use-after-free-in-microsoft-ad420750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62557%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62556-cwe-822-untrusted-pointer-dereferen-a769aee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62556%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62555-cwe-416-use-after-free-in-microsoft-246f5577</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62555%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62554-cwe-843-access-of-resource-using-in-106f4f2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62554%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62553-cwe-416-use-after-free-in-microsoft-85669f53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62553%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e574ebaa3babafb3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62552-cwe-23-relative-path-traversal-in-m-185ee976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62552%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e574ebaa3babafb3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62550-cwe-787-out-of-bounds-write-in-micr-389e1f59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62550%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=693867e574ebaa3babafb3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62474-cwe-284-improper-access-control-in--e8c6f36f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62474%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62468-cwe-125-out-of-bounds-read-in-micro-1041844b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62468%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=693867e574ebaa3babafb38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62467-cwe-190-integer-overflow-or-wraparo-3470a249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62467%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55233-cwe-125-out-of-bounds-read-in-micro-50ee2fc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55233%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62465-cwe-476-null-pointer-dereference-in-5653b24e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62465%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=medium&amp;id=693867e374ebaa3babaf6ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62464-cwe-126-buffer-over-read-in-microso-154b74f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62464%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62463-cwe-476-null-pointer-dereference-in-ba9af8f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62463%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=693867e374ebaa3babaf6fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62462-cwe-126-buffer-over-read-in-microso-a7af1c74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62462%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62461-cwe-126-buffer-over-read-in-microso-7e852e52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62461%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62455-cwe-20-improper-input-validation-in-c7819a26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62455%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59517-cwe-284-improper-access-control-in--2fb8cc37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59517%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e174ebaa3babaf6f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59516-cwe-306-missing-authentication-for--3f64e08b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59516%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64673-cwe-284-improper-access-control-in--1e4b2440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64673%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867eb74ebaa3babafb7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64670-cwe-200-exposure-of-sensitive-infor-23fd6f99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64670%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=693867eb74ebaa3babafb7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64666-cwe-20-improper-input-validation-in-6a3a2311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64666%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=693867eb74ebaa3babafb7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64667-cwe-451-user-interface-ui-misrepres-b79402df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64667%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=693867eb74ebaa3babafb7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64658-cwe-362-concurrent-execution-using--33d73186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64658%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e974ebaa3babafb701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62573-cwe-416-use-after-free-in-microsoft-4b105914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62573%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62572-cwe-125-out-of-bounds-read-in-micro-7d92b211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62572%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e974ebaa3babafb6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62571-cwe-20-improper-input-validation-in-e5298d66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62571%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e974ebaa3babafb6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62564-cwe-125-out-of-bounds-read-in-micro-4bd1b933</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62564%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e974ebaa3babafb6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62563-cwe-416-use-after-free-in-microsoft-dc52c52d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62563%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62562-cwe-416-use-after-free-in-microsoft-f45ea8b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62562%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62561-cwe-822-untrusted-pointer-dereferen-883e48d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62561%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=693867e774ebaa3babafb43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62549-cwe-822-untrusted-pointer-dereferen-7b61d989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62549%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62473-cwe-126-buffer-over-read-in-microso-c65b8fab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62473%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=693867e574ebaa3babafb397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62472-cwe-908-use-of-uninitialized-resour-8fc74d8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62472%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62470-cwe-122-heap-based-buffer-overflow--bf8c4644</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62470%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e574ebaa3babafb391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62469-cwe-362-concurrent-execution-using--d16bbf63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62469%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=693867e574ebaa3babafb38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62466-cwe-476-null-pointer-dereference-in-a8524255</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62466%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e374ebaa3babaf6ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62458-cwe-122-heap-based-buffer-overflow--7d64282b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62458%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=693867e374ebaa3babaf6fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62457-cwe-125-out-of-bounds-read-in-micro-908d948e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62457%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e374ebaa3babaf6fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62456-cwe-122-heap-based-buffer-overflow--967b8009</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62456%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=693867e374ebaa3babaf6fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62454-cwe-122-heap-based-buffer-overflow--f81300dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62454%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=693867e174ebaa3babaf6f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33214-cwe-502-deserialization-of-untruste-30b025c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33214%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVTabular&amp;severity=high&amp;id=693867eb74ebaa3babafb7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33213-cwe-502-deserialization-of-untruste-d59c5935</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33213%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=693867ed74ebaa3babafb8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-dismantle-eur-700-million-crypto-scam-that--e184d41d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Dismantle%20EUR%20700%20Million%20Crypto%20Scam%20That%20Used%20Deepfakes&amp;severity=medium&amp;id=6938611874ebaa3baba454b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64784-heap-based-buffer-overflow-cwe-122--8a02c151</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64784%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64894-integer-overflow-or-wraparound-cwe--842e6216</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64894%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=medium&amp;id=693867ed74ebaa3babafb8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64893-out-of-bounds-read-cwe-125-in-adobe-e4ecb79d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64893%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64783-integer-overflow-or-wraparound-cwe--22b0cfca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64783%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20DNG%20SDK&amp;severity=high&amp;id=693867ed74ebaa3babafb8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46636-cwe-59-improper-link-resolution-bef-4942ae5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46636%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Encryption&amp;severity=medium&amp;id=6938612b74ebaa3baba47aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46637-cwe-59-improper-link-resolution-bef-b894dd04</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46637%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Encryption&amp;severity=high&amp;id=6938612b74ebaa3baba47aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13924-cwe-352-cross-site-request-forgery--fc7fc2e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maartenbelmans%20Advanced%20Product%20Fields%20(Product%20Addons)%20for%20WooCommerce&amp;severity=medium&amp;id=69385e4c74ebaa3baba14004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47570-escalation-of-privilege-in-fortinet-81742f65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47570%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSASE&amp;severity=medium&amp;id=69385e4c74ebaa3baba14001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59718-improper-access-control-in-fortinet-0f876669</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59718%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSwitchManager&amp;severity=critical&amp;id=69385e4c74ebaa3baba14018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59719-improper-access-control-in-fortinet-0920e1a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59719%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=critical&amp;id=69385e4c74ebaa3baba1401b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53679-execute-unauthorized-code-or-comman-fa38c6e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53679%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69385e4c74ebaa3baba14009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54353-execute-unauthorized-code-or-comman-b58aab62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54353%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=69385e4c74ebaa3baba1400f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53949-execute-unauthorized-code-or-comman-db263690</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53949%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=69385e4c74ebaa3baba1400c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59810-information-disclosure-in-fortinet--b96c4fc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59810%3A%20Information%20disclosure%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69385e4e74ebaa3baba142a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59808-improper-access-control-in-fortinet-d7f8a0a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59808%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=69385e4c74ebaa3baba1401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54838-denial-of-service-in-fortinet-forti-e8d0a8dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54838%3A%20Denial%20of%20service%20in%20Fortinet%20FortiPortal&amp;severity=medium&amp;id=69385e4c74ebaa3baba14012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62631-improper-access-control-in-fortinet-62f1b11c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62631%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=69385e4e74ebaa3baba142af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57823-information-disclosure-in-fortinet--8a6cd450</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57823%3A%20Information%20disclosure%20in%20Fortinet%20FortiAuthenticator&amp;severity=low&amp;id=69385e4c74ebaa3baba14015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64153-execute-unauthorized-code-or-comman-e30e4830</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64153%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=69385e4e74ebaa3baba142b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59923-escalation-of-privilege-in-fortinet-6fbcb894</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59923%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiAuthenticator&amp;severity=low&amp;id=69385e4e74ebaa3baba142a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64156-execute-unauthorized-code-or-comman-af1c03a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64156%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=medium&amp;id=69385e4e74ebaa3baba142b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64471-escalation-of-privilege-in-fortinet-8c5b7680</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64471%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69385e4e74ebaa3baba142bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60024-escalation-of-privilege-in-fortinet-f779c471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60024%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=69385e4e74ebaa3baba142ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64447-escalation-of-privilege-in-fortinet-c796bd90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64447%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=69385e4e74ebaa3baba142b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deceptive-layoff-themed-hr-email-distributes-remco-3d46f4ce</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deceptive%20Layoff-Themed%20HR%20Email%20Distributes%20Remcos%20RAT%20Malware&amp;severity=medium&amp;id=69393d10fd479f45ea600b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-deep-dive-cve-2025-55182-exploit-mecha-e59529aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Deep%20Dive%3A%20CVE-2025-55182%20Exploit%20Mechanics&amp;severity=medium&amp;id=69385e4a74ebaa3baba13e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12946-cwe-20-improper-input-validation-in-32c2e1ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12946%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20RS700&amp;severity=medium&amp;id=693859487515e08d31691a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12945-cwe-20-improper-input-validation-in-da55affa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12945%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20R7000P&amp;severity=low&amp;id=693859487515e08d31691a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12941-cwe-306-missing-authentication-for--35b134a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12941%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NETGEAR%20C6220&amp;severity=medium&amp;id=693859487515e08d31691a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22675-cwe-352-cross-site-request-forgery--2d9848f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22675%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taylor%20Hawkes%20WP%20Fast%20Cache&amp;severity=medium&amp;id=693856d07515e08d316631d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23729-cwe-862-missing-authorization-in-br-7808f784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23729%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20Spectra&amp;severity=medium&amp;id=693856d07515e08d316631d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13662-cwe-347-improper-verification-of-cr-f05b8f97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13662%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13661-cwe-22-improper-limitation-of-a-pat-70c8d3fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-threat-clusters-using-castleloader-as-graybra-6ffca990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four%20Threat%20Clusters%20Using%20CastleLoader%20as%20GrayBravo%20Expands%20Its%20Malware%20Service%20Infrastructure&amp;severity=medium&amp;id=693856987515e08d31661ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13659-cwe-913-improper-control-of-dynamic-a0dcaef6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13659%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69384a3e795dcaf6c511e70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9638-cwe-79-improper-neutralization-of-in-fcf4868d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=69384a3e795dcaf6c511e718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5469-cwe-427-uncontrolled-search-path-ele-8e154ec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5469%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Messenger&amp;severity=high&amp;id=69384a3e795dcaf6c511e71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10573-cwe-79-improper-neutralization-of-i-6f6b03b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=69384a3e795dcaf6c511e71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5471-cwe-427-uncontrolled-search-path-ele-ba521245</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5471%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Telemost&amp;severity=high&amp;id=69384a3e795dcaf6c511e722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5470-cwe-427-uncontrolled-search-path-ele-6ba69e90</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5470%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Yandex%20Disk&amp;severity=high&amp;id=693846bf795dcaf6c50de093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13642-cwe-94-improper-control-of-generati-c7ae8165</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13642%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=69383fbf795dcaf6c50728aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-attacks-linked-to-north-korean-hackers-7b3221f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%20Attacks%20Linked%20to%20North%20Korean%20Hackers&amp;severity=medium&amp;id=69383fa3795dcaf6c506fbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67467-cross-site-request-forgery-csrf-in--9a0b18d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20GiveWP&amp;severity=medium&amp;id=69383cf4795dcaf6c5045d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66533-improper-control-of-generation-of-c-6530de79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66533%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20StellarWP%20GiveWP&amp;severity=high&amp;id=69383cf4795dcaf6c5045d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-geminijack-0-click-flaw-in-gemini-ai-exposed-u-7d49ff8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GeminiJack%200-Click%20Flaw%20in%20Gemini%20AI%20Exposed%20Users%20to%20Data%20Leaks&amp;severity=medium&amp;id=69383a9b29cea75c35b75806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2296-cwe-20-improper-input-validation-in--66719f1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2296%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TianoCore%20EDK2&amp;severity=high&amp;id=69383abe29cea75c35b76e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14345-cwe-667-improper-locking-in-mongodb-0773889f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14345%3A%20CWE-667%20Improper%20Locking%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69383abe29cea75c35b76e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38798-cwe-200-exposure-of-sensitive-infor-d77915c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38798%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TianoCore%20EDK2&amp;severity=medium&amp;id=69383abe29cea75c35b76e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63077-missing-authorization-in-happymonst-785e6147</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63077%3A%20Missing%20Authorization%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69383acf29cea75c35b7703e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63076-improper-control-of-filename-for-in-96a02240</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63076%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dream-Theme%20The7%20Elements&amp;severity=high&amp;id=69383acf29cea75c35b7703b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63075-improper-neutralization-of-input-du-d215a044</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muffingroup%20Betheme&amp;severity=medium&amp;id=69383acf29cea75c35b77038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63074-improper-control-of-filename-for-in-ac7d45e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dream-Theme%20The7&amp;severity=high&amp;id=69383acf29cea75c35b77035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63073-improper-neutralization-of-input-du-d0d5b764</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7&amp;severity=medium&amp;id=69383acf29cea75c35b77032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63072-improper-neutralization-of-input-du-e44b6168</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20THEMECO%20Cornerstone&amp;severity=medium&amp;id=69383acd29cea75c35b77013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63071-insertion-of-sensitive-information--88c7db5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63071%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=69383acd29cea75c35b77010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63070-exposure-of-sensitive-system-inform-70e8417d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63070%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Shahjada%20Download%20Manager&amp;severity=medium&amp;id=69383acd29cea75c35b7700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63069-missing-authorization-in-vinod-dalv-8299237e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63069%3A%20Missing%20Authorization%20in%20Vinod%20Dalvi%20Ivory%20Search&amp;severity=medium&amp;id=69383acd29cea75c35b7700a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63068-improper-neutralization-of-script-r-4fe6f810</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63068%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sevenspark%20Contact%20Form%207%20%E2%80%93%20Dynamic%20Text%20Extension&amp;severity=medium&amp;id=69383acd29cea75c35b77007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63067-missing-authorization-in-p-themes-p-66a25afc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63067%3A%20Missing%20Authorization%20in%20p-themes%20Porto%20Theme%20-%20Functionality&amp;severity=medium&amp;id=69383acd29cea75c35b77004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63066-improper-neutralization-of-input-du-11dc8daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20p-themes%20Porto%20Theme%20-%20Functionality&amp;severity=medium&amp;id=69383acd29cea75c35b77001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63065-authorization-bypass-through-user-c-aefb1ca5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63065%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=medium&amp;id=69383acd29cea75c35b76ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63064-improper-neutralization-of-input-du-46273717</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63064%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashanjay%20EventON&amp;severity=medium&amp;id=69383acd29cea75c35b76ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63063-missing-authorization-in-yandex-met-5efa5a8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63063%3A%20Missing%20Authorization%20in%20Yandex%20Metrika%20Yandex.Metrica&amp;severity=medium&amp;id=69383acd29cea75c35b76ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63062-improper-control-of-filename-for-in-e964683c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63062%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=high&amp;id=69383acb29cea75c35b76fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63061-improper-neutralization-of-input-du-430ac3c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=69383acb29cea75c35b76fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63060-cross-site-request-forgery-csrf-in--b203696b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63060%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=69383acb29cea75c35b76fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63059-improper-neutralization-of-input-du-7eb35267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arscode%20Ninja%20Popups&amp;severity=medium&amp;id=69383acb29cea75c35b76fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63058-exposure-of-sensitive-system-inform-1a819795</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63058%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Hiroaki%20Miyashita%20Custom%20Field%20Template&amp;severity=medium&amp;id=69383acb29cea75c35b76fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63057-improper-neutralization-of-input-du-bb038a8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=high&amp;id=69383acb29cea75c35b76fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63056-missing-authorization-in-bestwebsof-ad070b73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63056%3A%20Missing%20Authorization%20in%20bestwebsoft%20Contact%20Form%20by%20BestWebSoft&amp;severity=medium&amp;id=69383acb29cea75c35b76fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63055-improper-neutralization-of-input-du-231e3c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Master%20Addons%20for%20Elementor&amp;severity=medium&amp;id=69383acb29cea75c35b76fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63054-missing-authorization-in-expresstec-b23a1914</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63054%3A%20Missing%20Authorization%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=69383acb29cea75c35b76fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63052-improper-neutralization-of-input-du-7cbb11a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63052%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=medium&amp;id=69383acb29cea75c35b76fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63050-improper-neutralization-of-input-du-86f99dcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20REHub%20Framework&amp;severity=medium&amp;id=69383ac929cea75c35b76f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63049-missing-authorization-in-cridiostud-5896101b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63049%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro%20Lead%20Form&amp;severity=medium&amp;id=69383ac929cea75c35b76f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63048-improper-neutralization-of-input-du-5386c11e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro%20Lead%20Form&amp;severity=medium&amp;id=69383ac929cea75c35b76f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63047-missing-authorization-in-cridiostud-cc0e655a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63047%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=69383ac929cea75c35b76f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63046-improper-neutralization-of-input-du-bacbd573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=medium&amp;id=69383ac929cea75c35b76f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63045-improper-neutralization-of-input-du-9e7aa94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20Pro&amp;severity=medium&amp;id=69383ac929cea75c35b76f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63044-improper-neutralization-of-input-du-64a85726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=medium&amp;id=69383ac929cea75c35b76f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63042-improper-neutralization-of-input-du-c4b3100a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Tutor%20LMS%20Elementor%20Addons&amp;severity=medium&amp;id=69383ac929cea75c35b76f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63037-improper-neutralization-of-input-du-c9f9cedb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DFDevelopment%20Ronneby%20Theme%20Core&amp;severity=medium&amp;id=69383ac929cea75c35b76f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63036-improper-control-of-filename-for-in-69cfb5e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63036%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DFDevelopment%20Ronneby%20Theme%20Core&amp;severity=high&amp;id=69383ac929cea75c35b76f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63035-improper-neutralization-of-input-du-8d5bcbcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=medium&amp;id=69383ac729cea75c35b76f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63034-missing-authorization-in-steve-trum-11a1c383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63034%3A%20Missing%20Authorization%20in%20Steve%20Truman%20Page%20View%20Count&amp;severity=medium&amp;id=69383ac729cea75c35b76f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63033-improper-neutralization-of-input-du-6a96a2d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Riyadh%20Ahmed%20Make%20Section%20%26amp%3B%20Column%20Clickable%20For%20Elementor&amp;severity=medium&amp;id=69383ac729cea75c35b76f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63030-cross-site-request-forgery-csrf-in--bfb022de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63030%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=high&amp;id=69383ac729cea75c35b76f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63028-missing-authorization-in-shinetheme-6a80dce8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63028%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=medium&amp;id=69383ac729cea75c35b76f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63024-missing-authorization-in-tychesoftw-1fd23310</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63024%3A%20Missing%20Authorization%20in%20tychesoftwares%20Order%20Delivery%20Date%20for%20WooCommerce&amp;severity=medium&amp;id=69383ac729cea75c35b76f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63023-missing-authorization-in-easy-payme-c33060bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63023%3A%20Missing%20Authorization%20in%20Easy%20Payment%20Payment%20Gateway%20for%20PayPal%20on%20WooCommerce&amp;severity=medium&amp;id=69383ac729cea75c35b76f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63015-missing-authorization-in-paysera-wo-764d677f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63015%3A%20Missing%20Authorization%20in%20paysera%20WooCommerce%20Payment%20Gateway%20-%20Paysera&amp;severity=medium&amp;id=69383ac729cea75c35b76f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63013-exposure-of-sensitive-system-inform-879cfbe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63013%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac729cea75c35b76f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63012-cross-site-request-forgery-csrf-in--e32dac84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac729cea75c35b76f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63011-improper-neutralization-of-input-du-8e77617a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=69383ac529cea75c35b76f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63010-server-side-request-forgery-ssrf-in-5bd4188b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63010%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemesInflow%20Hercules%20Core&amp;severity=medium&amp;id=69383ac529cea75c35b76f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63009-exposure-of-sensitive-system-inform-e29bc895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63009%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20yuvalo%20WP%20Google%20Analytics%20Events&amp;severity=medium&amp;id=69383ac529cea75c35b76f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63008-missing-authorization-in-wedevs-wp--e2f0fb76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63008%3A%20Missing%20Authorization%20in%20weDevs%20WP%20ERP&amp;severity=medium&amp;id=69383ac529cea75c35b76f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63007-insertion-of-sensitive-information--14143a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63007%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=69383ac529cea75c35b76f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63006-missing-authorization-in-metagauss--67cb0e84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63006%3A%20Missing%20Authorization%20in%20Metagauss%20EventPrime&amp;severity=medium&amp;id=69383ac529cea75c35b76f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63003-improper-control-of-filename-for-in-1404e90d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63003%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20North%20-%20Required%20Plugin&amp;severity=high&amp;id=69383ac529cea75c35b76f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62999-missing-authorization-in-themezaa-l-c625092a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62999%3A%20Missing%20Authorization%20in%20themezaa%20Litho%20Addons&amp;severity=medium&amp;id=69383ac529cea75c35b76f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62997-insertion-of-sensitive-information--b76045cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62997%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20levelfourdevelopment%20WP%20EasyCart&amp;severity=medium&amp;id=69383ac529cea75c35b76f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62996-missing-authorization-in-code-amp-c-32eb9273</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62996%3A%20Missing%20Authorization%20in%20Code%20Amp%20Custom%20Layouts%20%E2%80%93%20Post%20%2B%20Product%20grids%20made%20easy&amp;severity=medium&amp;id=69383ac529cea75c35b76f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62995-missing-authorization-in-multiparce-ce24186a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62995%3A%20Missing%20Authorization%20in%20multiparcels%20MultiParcels%20Shipping%20For%20WooCommerce&amp;severity=medium&amp;id=69383ac329cea75c35b76f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62994-insertion-of-sensitive-information--078c693b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62994%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WP%20Messiah%20WP%20AI%20CoPilot&amp;severity=medium&amp;id=69383ac329cea75c35b76f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62993-missing-authorization-in-rainafarai-d17511ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62993%3A%20Missing%20Authorization%20in%20rainafarai%20Notification%20for%20Telegram&amp;severity=medium&amp;id=69383ac329cea75c35b76f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62873-cross-site-request-forgery-csrf-in--a45528b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62873%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Flashyapp%20WP%20Flashy%20Marketing%20Automation&amp;severity=medium&amp;id=69383ac329cea75c35b76f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62872-cross-site-request-forgery-csrf-in--eb3469b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62872%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JK%20Social%20Photo%20Fetcher&amp;severity=medium&amp;id=69383ac329cea75c35b76f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62871-cross-site-request-forgery-csrf-in--497b6be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62871%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20TinyMCE%20Custom%20Styles&amp;severity=medium&amp;id=69383ac329cea75c35b76f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62870-missing-authorization-in-eupago-eup-a35029c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62870%3A%20Missing%20Authorization%20in%20Eupago%20Eupago%20Gateway%20For%20Woocommerce&amp;severity=medium&amp;id=69383ac329cea75c35b76f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62869-missing-authorization-in-gravitecne-0e2bb350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62869%3A%20Missing%20Authorization%20in%20Gravitec.net%20-%20Web%20Push%20Notifications%20Gravitec.net%20%26%238211%3B%20Web%20Push%20Notifications&amp;severity=medium&amp;id=69383ac329cea75c35b76f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62867-missing-authorization-in-ergonet-er-a17844a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62867%3A%20Missing%20Authorization%20in%20ergonet%20Ergonet%20Cache&amp;severity=medium&amp;id=69383ac329cea75c35b76f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62866-cross-site-request-forgery-csrf-in--6f328beb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62866%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Valerio%20Monti%20Auto%20Alt%20Text&amp;severity=medium&amp;id=69383ac329cea75c35b76f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62865-missing-authorization-in-evan-herma-ec74df0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62865%3A%20Missing%20Authorization%20in%20Evan%20Herman%20Post%20Cloner&amp;severity=medium&amp;id=69383ac129cea75c35b76eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62762-cross-site-request-forgery-csrf-in--aea9bc4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62762%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20photoboxone%20SMTP%20Mail&amp;severity=medium&amp;id=69383ac129cea75c35b76ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62740-missing-authorization-in-mario-pesh-d8b55eba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62740%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=medium&amp;id=69383ac129cea75c35b76ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62739-cross-site-request-forgery-csrf-in--ae737b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62739%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=high&amp;id=69383ac129cea75c35b76ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62738-missing-authorization-in-mmattax-fo-2ed827ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62738%3A%20Missing%20Authorization%20in%20mmattax%20Formstack%20Online%20Forms&amp;severity=medium&amp;id=69383ac129cea75c35b76ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62737-exposure-of-sensitive-system-inform-9616ecea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62737%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20opicron%20Image%20Cleanup&amp;severity=medium&amp;id=69383ac129cea75c35b76edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62736-missing-authorization-in-opicron-im-9b627ff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62736%3A%20Missing%20Authorization%20in%20opicron%20Image%20Cleanup&amp;severity=medium&amp;id=69383ac129cea75c35b76ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62735-exposure-of-sensitive-system-inform-7955f5a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62735%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Joel%20User%20Spam%20Remover&amp;severity=medium&amp;id=69383ac129cea75c35b76ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62734-cross-site-request-forgery-csrf-in--568b1d08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62734%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20M.Code%20Media%20Library%20Downloader&amp;severity=medium&amp;id=69383ac129cea75c35b76ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62733-cross-site-request-forgery-csrf-in--8d31b1cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62733%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProteusThemes%20Custom%20Sidebars%20by%20ProteusThemes&amp;severity=medium&amp;id=69383ac129cea75c35b76ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62153-missing-authorization-in-graham-qui-f17eeeb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62153%3A%20Missing%20Authorization%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=high&amp;id=69383abf29cea75c35b76eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62151-missing-authorization-in-virtuaria--57b64cca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62151%3A%20Missing%20Authorization%20in%20Virtuaria%20Virtuaria%20PagBank%20%2F%20PagSeguro%20para%20Woocommerce&amp;severity=high&amp;id=69383abf29cea75c35b76ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62109-insertion-of-sensitive-information--cfacd158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62109%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20INFINITUM%20FORM%20Geo%20Controller&amp;severity=high&amp;id=69383abf29cea75c35b76ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62103-cross-site-request-forgery-csrf-in--6bd47f17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmediadownload%20Media%20Library%20File%20Download&amp;severity=medium&amp;id=69383abf29cea75c35b76ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62102-cross-site-request-forgery-csrf-in--2793e6dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62102%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=medium&amp;id=69383abf29cea75c35b76e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62100-missing-authorization-in-themerain--fbab56d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62100%3A%20Missing%20Authorization%20in%20themerain%20ThemeRain%20Core&amp;severity=medium&amp;id=69383abf29cea75c35b76e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62093-improper-neutralization-of-special--20834e1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62093%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Image%26Video%20FullScreen%20Background&amp;severity=high&amp;id=69383abf29cea75c35b76e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62090-missing-authorization-in-jegstudio--fd1cae60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62090%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20News%20%E2%80%93%20Advanced%20News%20Magazine%20Blog%20Gutenberg%20Blocks%20Addons&amp;severity=medium&amp;id=69383abf29cea75c35b76e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62086-missing-authorization-in-akazanstev-28a7de5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62086%3A%20Missing%20Authorization%20in%20akazanstev%20%D0%AF%D0%BD%D0%B4%D0%B5%D0%BA%D1%81%20%D0%94%D0%BE%D1%81%D1%82%D0%B0%D0%B2%D0%BA%D0%B0%20(Boxberry)&amp;severity=medium&amp;id=69383abf29cea75c35b76e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62085-missing-authorization-in-berthaai-b-f1d24aff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62085%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%26%238211%3B%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=medium&amp;id=69383abf29cea75c35b76e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62082-improper-neutralization-of-input-du-6ac34db4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nasir%20Uddin%20Generic%20Elements&amp;severity=medium&amp;id=69383abe29cea75c35b76e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59132-cross-site-request-forgery-csrf-in--c571cccc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59132%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Badi%20Jones%20Duplicate%20Content%20Cure&amp;severity=medium&amp;id=69383abe29cea75c35b76e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49351-cross-site-request-forgery-csrf-in--2eb8ee63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Valentin%20Agachi%20Create%20Posts%20%26amp%3B%20Terms&amp;severity=high&amp;id=69383abe29cea75c35b76e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49350-missing-authorization-in-marcoingra-a530dcf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49350%3A%20Missing%20Authorization%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=medium&amp;id=69383abe29cea75c35b76e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49347-cross-site-request-forgery-csrf-in--f7ce8d0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jupitercow%20WP%20sIFR&amp;severity=high&amp;id=69383abe29cea75c35b76e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49341-cross-site-request-forgery-csrf-in--6503febd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49341%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Furr%20PDF%20Creator%20Lite&amp;severity=high&amp;id=69383abe29cea75c35b76e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10655-cwe-89-improper-neutralization-of-s-208859b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Frappe%20Frappe%20HelpDesk&amp;severity=high&amp;id=69383abe29cea75c35b76e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12504-cwe-89-improper-neutralization-of-s-68b62eb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12504%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Talent%20Software%20UNIS&amp;severity=critical&amp;id=6938372729cea75c35b3810a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6923-cwe-79-improper-neutralization-of-in-effdb21e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20UNIS&amp;severity=medium&amp;id=693833b029cea75c35ae5795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67599-missing-authorization-in-webtoffee--c35558b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67599%3A%20Missing%20Authorization%20in%20WebToffee%20WebToffee%20eCommerce%20Marketing%20Automation&amp;severity=medium&amp;id=693833b029cea75c35ae5792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67598-cross-site-request-forgery-csrf-in--b67e0650</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67598%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PSM%20Plugins%20SupportCandy&amp;severity=medium&amp;id=693833b029cea75c35ae578f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67597-missing-authorization-in-shahjahan--25738481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67597%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Booking&amp;severity=medium&amp;id=693833b029cea75c35ae578c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67596-cross-site-request-forgery-csrf-in--173af554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=693833ae29cea75c35ae5779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67595-cross-site-request-forgery-csrf-in--ebd40c1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67595%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=medium&amp;id=693833ae29cea75c35ae5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67594-authorization-bypass-through-user-c-3361b4dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67594%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=medium&amp;id=693833ae29cea75c35ae5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67593-cross-site-request-forgery-csrf-in--630227aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stiofan%20UsersWP&amp;severity=medium&amp;id=693833ae29cea75c35ae5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67592-missing-authorization-in-joe-dolson-cf0837cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67592%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Calendar&amp;severity=medium&amp;id=693833ae29cea75c35ae576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67591-cross-site-request-forgery-csrf-in--596b00b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67591%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jegtheme%20JNews%20Paywall&amp;severity=medium&amp;id=693833ae29cea75c35ae576a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67590-cross-site-request-forgery-csrf-in--5d9bc0e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Ultimate%20FAQ&amp;severity=medium&amp;id=693833ae29cea75c35ae5767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67589-missing-authorization-in-wp-overnig-13cca67e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67589%3A%20Missing%20Authorization%20in%20WP%20Overnight%20WooCommerce%20PDF%20Invoices%20%26%20Packing%20Slips&amp;severity=medium&amp;id=693833ae29cea75c35ae5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67588-missing-authorization-in-elementor--ab56bbcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67588%3A%20Missing%20Authorization%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=medium&amp;id=693833ae29cea75c35ae5761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67587-url-redirection-to-untrusted-site-o-9bb99b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67587%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20FreshDesk%20Plugin&amp;severity=medium&amp;id=693833ae29cea75c35ae575e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67586-missing-authorization-in-ronald-hue-95f96fa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67586%3A%20Missing%20Authorization%20in%20Ronald%20Huereca%20Highlight%20and%20Share&amp;severity=medium&amp;id=693833ad29cea75c35ae571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67585-url-redirection-to-untrusted-site-o-b688a46f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67585%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=medium&amp;id=693833ad29cea75c35ae571a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67584-missing-authorization-in-rtcamp-god-1f3e88a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67584%3A%20Missing%20Authorization%20in%20rtCamp%20GoDAM&amp;severity=medium&amp;id=693833ad29cea75c35ae5717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67583-missing-authorization-in-themeateli-4ff15b64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67583%3A%20Missing%20Authorization%20in%20Foysal%20Imran%20IDonate&amp;severity=medium&amp;id=693833ad29cea75c35ae5714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67582-missing-authorization-in-wbcomdesig-4b6b752c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67582%3A%20Missing%20Authorization%20in%20wbcomdesigns%20Wbcom%20Designs&amp;severity=medium&amp;id=693833ad29cea75c35ae5711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67581-missing-authorization-in-themetechm-00e4a9a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67581%3A%20Missing%20Authorization%20in%20themetechmount%20TrueBooker&amp;severity=medium&amp;id=693833ad29cea75c35ae570e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67580-missing-authorization-in-constant-c-d339a2c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67580%3A%20Missing%20Authorization%20in%20Constant%20Contact%20Constant%20Contact%20%2B%20WooCommerce&amp;severity=medium&amp;id=693833ad29cea75c35ae570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67579-missing-authorization-in-vanquish-u-2d6a3a8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67579%3A%20Missing%20Authorization%20in%20vanquish%20User%20Extra%20Fields&amp;severity=medium&amp;id=693833ad29cea75c35ae5708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67578-missing-authorization-in-rhys-wynne-0ad3314a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67578%3A%20Missing%20Authorization%20in%20Rhys%20Wynne%20WP%20Email%20Capture&amp;severity=medium&amp;id=693833ad29cea75c35ae5705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67577-missing-authorization-in-hassantafr-e71a04c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67577%3A%20Missing%20Authorization%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=medium&amp;id=693833ad29cea75c35ae5702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67576-missing-authorization-in-quantumclo-6a55b341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67576%3A%20Missing%20Authorization%20in%20QuantumCloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=693833ab29cea75c35ae56ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67575-missing-authorization-in-andrew-lim-c9f95871</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67575%3A%20Missing%20Authorization%20in%20Andrew%20Lima%20Sitewide%20Notice%20WP&amp;severity=medium&amp;id=693833ab29cea75c35ae56e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67574-missing-authorization-in-wpdevart-b-2be34c23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67574%3A%20Missing%20Authorization%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=693833ab29cea75c35ae56e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67573-missing-authorization-in-thimpress--af14614a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67573%3A%20Missing%20Authorization%20in%20ThimPress%20Sailing&amp;severity=medium&amp;id=693833ab29cea75c35ae56e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67572-missing-authorization-in-pencidesig-572e2687</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67572%3A%20Missing%20Authorization%20in%20PenciDesign%20PenNews&amp;severity=medium&amp;id=693833ab29cea75c35ae56e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67570-missing-authorization-in-gsheetconn-e5c06848</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67570%3A%20Missing%20Authorization%20in%20WesternDeal%20WPForms%20Google%20Sheet%20Connector&amp;severity=medium&amp;id=693833ab29cea75c35ae56dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67569-missing-authorization-in-scriptsbun-5654b18b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67569%3A%20Missing%20Authorization%20in%20scriptsbundle%20AdForest&amp;severity=medium&amp;id=693833ab29cea75c35ae56da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67568-missing-authorization-in-xtemos-bas-81a72714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67568%3A%20Missing%20Authorization%20in%20xtemos%20Basel&amp;severity=medium&amp;id=693833ab29cea75c35ae56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67567-exposure-of-sensitive-system-inform-4ef39e2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67567%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20uixthemes%20Sober&amp;severity=medium&amp;id=693833ab29cea75c35ae56d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67566-missing-authorization-in-wofficeio--f4c32b89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67566%3A%20Missing%20Authorization%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=693833ab29cea75c35ae56d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67565-exposure-of-sensitive-system-inform-823bd606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67565%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20sizam%20Rehub&amp;severity=medium&amp;id=693833a929cea75c35ae56b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67564-exposure-of-sensitive-system-inform-5708047f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67564%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=693833a929cea75c35ae56b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67563-missing-authorization-in-saad-iqbal-4b60609c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67563%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=medium&amp;id=693833a929cea75c35ae56af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67562-missing-authorization-in-webcodingp-3e1f68bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67562%3A%20Missing%20Authorization%20in%20WebCodingPlace%20Image%20Caption%20Hover%20Pro&amp;severity=medium&amp;id=693833a929cea75c35ae56ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67561-missing-authorization-in-oleksandr--c4e44fe9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67561%3A%20Missing%20Authorization%20in%20Oleksandr%20Lysyi%20Debug%20Log%20Viewer&amp;severity=medium&amp;id=693833a929cea75c35ae56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67560-missing-authorization-in-webilia-in-31c6cbaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67560%3A%20Missing%20Authorization%20in%20Webilia%20Inc.%20Listdom&amp;severity=medium&amp;id=693833a929cea75c35ae56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67559-missing-authorization-in-vcita-onli-38afffd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67559%3A%20Missing%20Authorization%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=medium&amp;id=693833a929cea75c35ae56a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67558-improper-neutralization-of-input-du-a6fcfee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacques%20Malgrange%20Rencontre&amp;severity=medium&amp;id=693833a929cea75c35ae56a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67557-improper-neutralization-of-input-du-f68e3c0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhys%20Wynne%20WP%20eBay%20Product%20Feeds&amp;severity=medium&amp;id=693833a929cea75c35ae569d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67556-improper-neutralization-of-input-du-f525e7ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHigh%20Advanced%20FAQ%20Manager&amp;severity=medium&amp;id=693833a929cea75c35ae569a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67555-improper-neutralization-of-input-du-df68242c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useStrict%20UseStrict%26%23039%3Bs%20Calendly%20Embedder&amp;severity=medium&amp;id=693833a729cea75c35ae534e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67554-improper-neutralization-of-input-du-5acad7ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Humanityco%20Cookie%20Notice%20%26%20Compliance%20for%20GDPR%20%2F%20CCPA&amp;severity=medium&amp;id=693833a729cea75c35ae534b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67553-improper-neutralization-of-input-du-7c578907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHigh%20Advanced%20FAQ%20Manager&amp;severity=medium&amp;id=693833a729cea75c35ae5348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67552-improper-neutralization-of-input-du-8921e8d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WalkerWP%20Walker%20Core&amp;severity=medium&amp;id=693833a729cea75c35ae5345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67551-improper-neutralization-of-input-du-41b2bc27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wappointment%20team%20Wappointment&amp;severity=medium&amp;id=693833a729cea75c35ae5342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67550-improper-neutralization-of-input-du-a3322e64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhewlif%20Donation%20Thermometer&amp;severity=medium&amp;id=693833a729cea75c35ae533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67549-improper-neutralization-of-input-du-40b567a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=medium&amp;id=693833a729cea75c35ae533c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67545-improper-neutralization-of-input-du-6518bc15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FirePlugins%20FireBox&amp;severity=medium&amp;id=693833a729cea75c35ae5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67544-improper-neutralization-of-input-du-5cd294d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Get%20Bowtied%20Shopkeeper%20Extender&amp;severity=medium&amp;id=693833a729cea75c35ae5336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67543-improper-neutralization-of-input-du-8b7a965c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Catch%20Themes%20Essential%20Widgets&amp;severity=medium&amp;id=693833a729cea75c35ae5333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67542-improper-neutralization-of-input-du-5340c43d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SilkyPress%20Multi-Step%20Checkout%20for%20WooCommerce&amp;severity=medium&amp;id=693833a629cea75c35ae52fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67541-improper-neutralization-of-input-du-8d13c3bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lester%20Chan%20WP-ShowHide&amp;severity=high&amp;id=693833a629cea75c35ae52fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67540-missing-authorization-in-wealcoder--aa599489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67540%3A%20Missing%20Authorization%20in%20Wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=693833a629cea75c35ae52f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67539-improper-neutralization-of-input-du-adf6bc3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Select-Themes%20Select%20Core&amp;severity=medium&amp;id=693833a629cea75c35ae52f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67538-improper-neutralization-of-input-du-99313a42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20JNews%20Gallery&amp;severity=medium&amp;id=693833a629cea75c35ae52f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67537-improper-neutralization-of-input-du-ce35981c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blair%20Williams%20ThirstyAffiliates&amp;severity=medium&amp;id=693833a529cea75c35ae52ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67536-improper-neutralization-of-input-du-85a929de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress&amp;severity=medium&amp;id=693833a529cea75c35ae52ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67535-deserialization-of-untrusted-data-i-56be1f60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67535%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Flipper%20Code%20-%20WordPress%20Development%20Company%20WP%20Maps&amp;severity=medium&amp;id=693833a529cea75c35ae52e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67534-cross-site-request-forgery-csrf-in--e617f5a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67534%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jacques%20Malgrange%20Rencontre&amp;severity=high&amp;id=693833a529cea75c35ae52e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67533-improper-neutralization-of-input-du-5331b767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Portfolio%20Post&amp;severity=medium&amp;id=693833a529cea75c35ae52e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67532-improper-control-of-filename-for-in-146f7fdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67532%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=critical&amp;id=693833a329cea75c35ae52af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67531-improper-control-of-filename-for-in-c1d5d142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Turitor&amp;severity=critical&amp;id=693833a329cea75c35ae52ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67530-improper-control-of-filename-for-in-370cb7d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67530%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=critical&amp;id=693833a329cea75c35ae52a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67529-improper-control-of-filename-for-in-c6112063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67529%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opal_WP%20Fashion&amp;severity=critical&amp;id=693833a329cea75c35ae52a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67528-improper-control-of-filename-for-in-6d24602e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67528%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=medium&amp;id=693833a329cea75c35ae52a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67527-improper-control-of-filename-for-in-0575eb75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67527%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Digiqole&amp;severity=critical&amp;id=693833a329cea75c35ae52a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67526-improper-control-of-filename-for-in-ee00b5fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67526%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20Sailing&amp;severity=critical&amp;id=693833a329cea75c35ae529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67525-improper-control-of-filename-for-in-4d090bb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67525%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opal_WP%20ekommart&amp;severity=critical&amp;id=693833a329cea75c35ae529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67524-improper-control-of-filename-for-in-500122e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67524%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NooTheme%20Jobmonster%20Elementor%20Addon&amp;severity=critical&amp;id=693833a329cea75c35ae5297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67523-improper-control-of-filename-for-in-dd897ff0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67523%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trippleS%20Exhibz&amp;severity=critical&amp;id=693833a329cea75c35ae5294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67522-improper-control-of-filename-for-in-52b6c00f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67522%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=critical&amp;id=693833a229cea75c35ae5248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67521-improper-control-of-filename-for-in-a5e6f293</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67521%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Select%20Core&amp;severity=critical&amp;id=693833a229cea75c35ae5245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67520-improper-neutralization-of-special--86b58465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67520%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tiny%20Solutions%20Media%20Library%20Tools&amp;severity=critical&amp;id=693833a229cea75c35ae5242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67519-improper-neutralization-of-special--e8cf7b3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Ninja%20Tables&amp;severity=critical&amp;id=693833a129cea75c35ae523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67518-improper-neutralization-of-special--762ace43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Accordion%20Slider%20PRO&amp;severity=critical&amp;id=693833a129cea75c35ae523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67517-improper-neutralization-of-special--54a116cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67517%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20artplacer%20ArtPlacer%20Widget&amp;severity=critical&amp;id=693833a129cea75c35ae5238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67516-improper-neutralization-of-special--0dae50fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67516%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=critical&amp;id=693833a129cea75c35ae5235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67515-improper-control-of-filename-for-in-c5ce483f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67515%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wilm%C3%ABr&amp;severity=critical&amp;id=693833a129cea75c35ae5232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67474-missing-authorization-in-ultimate-m-8201ffb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67474%3A%20Missing%20Authorization%20in%20Ultimate%20Member%20ForumWP&amp;severity=medium&amp;id=693833a129cea75c35ae522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67473-cross-site-request-forgery-csrf-in--986a518e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codeworkweb%20CWW%20Companion&amp;severity=high&amp;id=693833a129cea75c35ae522c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67472-cross-site-request-forgery-csrf-in--860719ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67472%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=high&amp;id=693833a029cea75c35ae51f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67471-cross-site-request-forgery-csrf-in--ce1fd08c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67471%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saad%20Iqbal%20Quick%20Contact%20Form&amp;severity=high&amp;id=693833a029cea75c35ae51f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67470-exposure-of-sensitive-system-inform-f678fb99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67470%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Essential%20Plugin%20Portfolio%20and%20Projects&amp;severity=medium&amp;id=693833a029cea75c35ae51f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67469-cross-site-request-forgery-csrf-in--3a1db176</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67469%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kubiq%20PDF%20Thumbnail%20Generator&amp;severity=high&amp;id=693833a029cea75c35ae51ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67468-missing-authorization-in-crm-perks--04a5b423</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67468%3A%20Missing%20Authorization%20in%20CRM%20Perks%20Integration%20for%20Salesforce%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%2C%20Ninja%20Forms&amp;severity=medium&amp;id=693833a029cea75c35ae51eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67466-missing-authorization-in-sergiotrin-9dc6fdf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67466%3A%20Missing%20Authorization%20in%20sergiotrinity%20Trinity%20Audio&amp;severity=high&amp;id=693833a029cea75c35ae51e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67465-cross-site-request-forgery-csrf-in--c5bf03ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67465%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QuantumCloud%20Simple%20Link%20Directory&amp;severity=high&amp;id=693833a029cea75c35ae51e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66534-missing-authorization-in-elated-the-547c0344</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66534%3A%20Missing%20Authorization%20in%20Elated-Themes%20The%20Aisle&amp;severity=high&amp;id=693833a029cea75c35ae51e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66532-missing-authorization-in-mikado-the-e11e371c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66532%3A%20Missing%20Authorization%20in%20Mikado-Themes%20Powerlift&amp;severity=high&amp;id=693833a029cea75c35ae51df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66531-cross-site-request-forgery-csrf-in--56483f6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66531%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=high&amp;id=693833a029cea75c35ae51dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66530-missing-authorization-in-webba-appo-4968db25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66530%3A%20Missing%20Authorization%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=high&amp;id=6938339e29cea75c35ae4c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66529-cross-site-request-forgery-csrf-in--7d6d14f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Chartify&amp;severity=high&amp;id=6938339e29cea75c35ae4c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66528-missing-authorization-in-villatheme-358cbc5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66528%3A%20Missing%20Authorization%20in%20VillaTheme%20Thank%20You%20Page%20Customizer%20for%20WooCommerce&amp;severity=high&amp;id=6938339e29cea75c35ae4c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66527-missing-authorization-in-vankarwai--51e99026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66527%3A%20Missing%20Authorization%20in%20VanKarWai%20Lobo&amp;severity=medium&amp;id=6938339e29cea75c35ae4c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66526-missing-authorization-in-essekia-ta-19147bb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66526%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome&amp;severity=medium&amp;id=6938339e29cea75c35ae4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66525-missing-authorization-in-elastic-em-1e36780c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66525%3A%20Missing%20Authorization%20in%20Elastic%20Email%20Elastic%20Email%20Sender&amp;severity=medium&amp;id=6938339e29cea75c35ae4c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64257-missing-authorization-in-joe-dolson-37698cfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64257%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=medium&amp;id=6938339e29cea75c35ae4c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64256-cross-site-request-forgery-csrf-in--2f42f9f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64256%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressTigers%20Simple%20Folio&amp;severity=high&amp;id=6938339e29cea75c35ae4c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64255-missing-authorization-in-bowo-admin-7ca4ddbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64255%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=high&amp;id=6938339e29cea75c35ae4c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64254-missing-authorization-in-ronald-hue-b5959794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64254%3A%20Missing%20Authorization%20in%20Ronald%20Huereca%20Photo%20Block&amp;severity=high&amp;id=6938339e29cea75c35ae4c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9368-cwe-770-allocation-of-resources-with-37c19149</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9368%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Rockwell%20Automation%20432ES-IG3%20Series%20A&amp;severity=high&amp;id=6938301129cea75c35ac7daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12807-cwe-89-improper-neutralization-of-s-87565862</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12807%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69382bbdabbdc4595cd8b6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12558-cwe-200-exposure-of-sensitive-infor-d9e6dad6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12558%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12705-cwe-79-improper-neutralization-of-i-267f3118</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20widgetpack%20Reviews%20Widget%20for%20Google%2C%20Yelp%20%26%20Recommendations&amp;severity=high&amp;id=69382bbdabbdc4595cd8b6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10876-cwe-79-improper-neutralization-of-i-536c4b49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20e-BAP%20Automation&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12381-cwe-269-improper-privilege-manageme-b5ea9b7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12381%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20AlgoSec%20Firewall%20Analyzer&amp;severity=medium&amp;id=69382bbdabbdc4595cd8b6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6924-cwe-79-improper-neutralization-of-in-81334038</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Talent%20Software%20e-BAP%20Automation&amp;severity=medium&amp;id=69382835abbdc4595cd48505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14333-vulnerability-in-mozilla-firefox-338be044</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14333%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382835abbdc4595cd48500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14332-vulnerability-in-mozilla-firefox-a8b9cae5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14332%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382835abbdc4595cd484fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14331-vulnerability-in-mozilla-firefox-f5731ea9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14331%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69382835abbdc4595cd484f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14330-vulnerability-in-mozilla-firefox-d3f25089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14330%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382835abbdc4595cd484f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14329-vulnerability-in-mozilla-firefox-41afe31c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14329%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14328-vulnerability-in-mozilla-firefox-64edfbb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14328%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14327-vulnerability-in-mozilla-firefox-1f64f716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14327%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd484a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14326-vulnerability-in-mozilla-firefox-47304e2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14326%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd484a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14325-vulnerability-in-mozilla-firefox-339f7358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14325%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd4849f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14324-vulnerability-in-mozilla-firefox-23edcca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14324%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd48499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14323-vulnerability-in-mozilla-firefox-7f450cf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14323%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd48493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14322-vulnerability-in-mozilla-firefox-2a656996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14322%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69382833abbdc4595cd4848d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14321-vulnerability-in-mozilla-firefox-d6dd328a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14321%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69382833abbdc4595cd48488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-0249-escalates-ransomware-attacks-with-click-b1c0ccc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-0249%20Escalates%20Ransomware%20Attacks%20with%20ClickFix%2C%20Fileless%20PowerShell%2C%20and%20DLL%20Sideloading&amp;severity=low&amp;id=693835f429cea75c35b236f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stac6565-targets-canada-in-80-of-attacks-as-gold-b-064d51de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=STAC6565%20Targets%20Canada%20in%2080%25%20of%20Attacks%20as%20Gold%20Blade%20Deploys%20QWCrypt%20Ransomware&amp;severity=high&amp;id=693824acabbdc4595cceb6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56464-cwe-548-in-ibm-ibm-qradar-siem-4947e234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56464%3A%20CWE-548%20in%20IBM%20IBM%20QRadar%20SIEM&amp;severity=low&amp;id=69382833abbdc4595cd48485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simplex-chat-x-account-hacked-fake-site-promotes-c-5fac797c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimpleX%20Chat%20X%20Account%20Hacked%2C%20Fake%20Site%20Promotes%20Crypto%20Wallet%20Scam&amp;severity=medium&amp;id=693824acabbdc4595cceb6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-211edcb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=medium&amp;id=69381cd61b76610347c61f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-lazaruss-it-workers-scheme-was-caught-live-on--00a199ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Lazarus&apos;s%20IT%20Workers%20Scheme%20Was%20Caught%20Live%20on%20Camera&amp;severity=medium&amp;id=69381cd61b76610347c61f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11022-cwe-352-cross-site-request-forgery--17082a46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11022%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Personal%20Project%20Panilux&amp;severity=critical&amp;id=69381cd71b76610347c61fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-posts-10-million-bounty-for-iranian-hackers-73d9ee27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Posts%20%2410%20Million%20Bounty%20for%20Iranian%20Hackers&amp;severity=medium&amp;id=693817c81b76610347be18df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-broadside-botnet-poses-risk-to-shipping-compan-766cd5e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%E2%80%98Broadside%E2%80%99%20Botnet%20Poses%20Risk%20to%20Shipping%20Companies&amp;severity=medium&amp;id=69380ec81b76610347b0f87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-streamline-zero-trust-using-the-shared-sign-834f41d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Streamline%20Zero%20Trust%20Using%20the%20Shared%20Signals%20Framework&amp;severity=medium&amp;id=6938173f1b76610347bd8cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-adds-layered-defenses-to-chrome-to-block-in-5e8cf916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Adds%20Layered%20Defenses%20to%20Chrome%20to%20Block%20Indirect%20Prompt%20Injection%20Threats&amp;severity=low&amp;id=6938173f1b76610347bd8cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40941-cwe-200-exposure-of-sensitive-infor-4b7cba68</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40941%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009429016b16de45ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40940-cwe-200-exposure-of-sensitive-infor-c879c455</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40940%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009229016b16de45fef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40939-cwe-284-improper-access-control-in--a833a871</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40939%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=6938009229016b16de45fef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40938-cwe-798-use-of-hard-coded-credentia-2d01bae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40938%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=high&amp;id=6938009229016b16de45fef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40937-cwe-77-improper-neutralization-of-s-11d658c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40937%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=high&amp;id=6938009229016b16de45feed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40935-cwe-20-improper-input-validation-in-a1cf7e89</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40935%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20RUGGEDCOM%20RMC8388%20V5.X&amp;severity=medium&amp;id=6938009229016b16de45feea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40831-cwe-20-improper-input-validation-in-f6c49cb2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40831%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=6938009229016b16de45fee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40830-cwe-285-improper-authorization-in-s-a35e877d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40830%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=6938009229016b16de45fee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40820-cwe-940-improper-verification-of-so-205975b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40820%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Siemens%20SIDOOR%20ATD430W&amp;severity=high&amp;id=6938009229016b16de45fee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40819-cwe-863-incorrect-authorization-in--28af2c58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40819%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=6938009229016b16de45fede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40818-cwe-732-incorrect-permission-assign-0d67538c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40818%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=low&amp;id=6938009229016b16de45fedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40807-cwe-294-authentication-bypass-by-ca-a2c79d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40807%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Siemens%20Gridscale%20X%20Prepay&amp;severity=medium&amp;id=6938009029016b16de45feae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40806-cwe-204-observable-response-discrep-022bcb0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40806%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Gridscale%20X%20Prepay&amp;severity=medium&amp;id=6938009029016b16de45feab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40801-cwe-295-improper-certificate-valida-a9403f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40801%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20COMOS%20V10.6&amp;severity=high&amp;id=6938009029016b16de45fea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40800-cwe-295-improper-certificate-valida-524ee832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40800%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20COMOS%20V10.6&amp;severity=high&amp;id=6938009029016b16de45fea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56840-cwe-74-improper-neutralization-of-s-bbdbcc10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56840%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56839-cwe-74-improper-neutralization-of-s-4ce939fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56839%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56838-cwe-74-improper-neutralization-of-s-06f53dd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56838%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56837-cwe-77-improper-neutralization-of-s-7849a436</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56837%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56836-cwe-77-improper-neutralization-of-s-578b6f12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56836%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56835-cwe-74-improper-neutralization-of-s-509c330a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56835%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=6938009029016b16de45fe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-gangs-turn-to-shanya-exe-packer-to-hide-0b4fe55b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20gangs%20turn%20to%20Shanya%20EXE%20packer%20to%20hide%20EDR%20killers&amp;severity=high&amp;id=6938006b29016b16de45e52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-malicious-vs-code-go-npm-and-rust-3a2ba24e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Malicious%20VS%20Code%2C%20Go%2C%20npm%2C%20and%20Rust%20Packages%20Stealing%20Developer%20Data&amp;severity=high&amp;id=6938006b29016b16de45e535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300000-individuals-impacted-by-vitas-hospice--afd2e027</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%2C000%20Individuals%20Impacted%20by%20Vitas%20Hospice%20Data%20Breach&amp;severity=medium&amp;id=6937f19127e9f45fce65528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stac6565-targets-canada-in-80-of-attacks-as-gold-b-4e1065a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=STAC6565%20Targets%20Canada%20in%2080%25%20of%20Attacks%20as%20Gold%20Blade%20Deploys%20QWCrypt%20Ransomware&amp;severity=high&amp;id=6938069e29016b16de4f9968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-amos-infostealer-is-piggybacking-chatgpts-chat-49a39f2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AMOS%20infostealer%20is%20piggybacking%20ChatGPT%E2%80%99s%20chat-sharing%20feature%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6937ee2327e9f45fce633bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59029-cwe-617-reachable-assertion-in-powe-52b30495</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59029%3A%20CWE-617%20Reachable%20Assertion%20in%20PowerDNS%20Recursor&amp;severity=medium&amp;id=6937f1ad27e9f45fce65730b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59030-cwe-276-incorrect-default-permissio-0c33e98f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59030%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=6937f1ad27e9f45fce65730e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66271-unquoted-search-path-or-element-in--88268e8a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66271%3A%20Unquoted%20search%20path%20or%20element%20in%20ELECOM%20CO.%2CLTD.%20Clone%20for%20Windows&amp;severity=medium&amp;id=6937e2ceca0f3871ecb6363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64696-use-of-cache-containing-sensitive-i-d2a72885</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64696%3A%20Use%20of%20cache%20containing%20sensitive%20information%20in%20Brother%20Industries%2C%20Ltd.%20Android%20App%20%22Brother%20iPrint%26Scan%22&amp;severity=low&amp;id=6937def0ca0f3871ecb2c5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41693-cwe-770-allocation-of-resources-wit-a73993fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41693%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41696-cwe-798-use-of-hard-coded-credentia-11a96c38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41696%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41694-cwe-770-allocation-of-resources-wit-9e794692</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41694%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41692-cwe-916-use-of-password-hash-with-i-476e0764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41692%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41697-cwe-1299-missing-protection-mechani-0fdb4d6b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41697%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=medium&amp;id=6937da90964788758a8a3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41695-cwe-79-improper-neutralization-of-i-cca55d68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41745-cwe-79-improper-neutralization-of-i-d9a0a9f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41745%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41746-cwe-79-improper-neutralization-of-i-39f72e90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41747-cwe-79-improper-neutralization-of-i-ae45e959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41748-cwe-79-improper-neutralization-of-i-6e52ee35</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da90964788758a8a3fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41749-cwe-79-improper-neutralization-of-i-a32d191e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a4048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41750-cwe-79-improper-neutralization-of-i-7c678f4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a404b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41751-cwe-79-improper-neutralization-of-i-c5f7c48b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a404e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41752-cwe-79-improper-neutralization-of-i-11daa6b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20Contact%20FL%20SWITCH%202005&amp;severity=high&amp;id=6937da92964788758a8a4051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-malicious-vs-code-go-npm-and-rust-d7223e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Malicious%20VS%20Code%2C%20Go%2C%20npm%2C%20and%20Rust%20Packages%20Stealing%20Developer%20Data&amp;severity=medium&amp;id=6937ea6bca0f3871ecc0fe59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14309-cwe-476-null-pointer-dereference-in-d0ed9382</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14309%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ravynsoft%20ravynos&amp;severity=high&amp;id=6937d709964788758a861be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14308-cwe-190-integer-overflow-or-wraparo-15413a22</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14308%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d709964788758a861be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14307-cwe-377-in-robocode-project-robocod-28898719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14307%3A%20CWE-377%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d385964788758a7fe753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14306-cwe-22-improper-limitation-of-a-pat-c54e87ac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14306%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Robocode%20Project%20Robocode&amp;severity=critical&amp;id=6937d709964788758a861be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13428-cwe-20-improper-input-validation-in-257aa804</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13428%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Google%20Cloud%20SecOps%20SOAR&amp;severity=high&amp;id=6937c4a55092139813fc0f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13071-cwe-79-cross-site-scripting-xss-in--48937ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13071%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Custom%20Admin%20Menu&amp;severity=high&amp;id=6937bd663ce8502056bafcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13070-cwe-22-improper-limitation-of-a-pat-9c609082</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13070%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CSV%20to%20SortTable&amp;severity=medium&amp;id=6937bd663ce8502056bafcc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13031-cwe-79-cross-site-scripting-xss-in--2d39b083</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13031%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=6937bd663ce8502056bafcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-activity-clusters-target-multiple-ind-43d97952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Activity%20Clusters%20Target%20Multiple%20Industries&amp;severity=medium&amp;id=693819561b76610347bfb3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14284-cross-site-scripting-xss-in-tiptape-17ed7e90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14284%3A%20Cross-site%20Scripting%20(XSS)%20in%20%40tiptap%2Fextension-link&amp;severity=medium&amp;id=6937aed7c0f7ae2eacecdbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13604-cwe-79-improper-neutralization-of-i-adbf2583</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cleantalk%20Login%20Security%2C%20FireWall%2C%20Malware%20removal%20by%20CleanTalk&amp;severity=high&amp;id=6937aa2bf0d475f65e959edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67504-cwe-331-insufficient-entropy-in-wbc-5bf971f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67504%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20WBCE%20WBCE_CMS&amp;severity=critical&amp;id=69379c1c0af42da4c573d331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66631-cwe-502-deserialization-of-untruste-6f9015f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66631%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MarimerLLC%20csla&amp;severity=high&amp;id=69379c1c0af42da4c573d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66627-cwe-416-use-after-free-in-wasmi-lab-12994177</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66627%3A%20CWE-416%3A%20Use%20After%20Free%20in%20wasmi-labs%20wasmi&amp;severity=high&amp;id=6937a044f0d475f65e8bac86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66578-cwe-248-uncaught-exception-in-robri-9f49337f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66578%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20robrichards%20xmlseclibs&amp;severity=medium&amp;id=6937a044f0d475f65e8bac81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42928-cwe-502-deserialization-of-untruste-9ab39dbb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42928%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20jConnect%20-%20SDK%20for%20ASE&amp;severity=critical&amp;id=69378a8b0af42da4c56f97c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42904-cwe-549-missing-password-field-mask-b1d71738</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42904%3A%20CWE-549%3A%20Missing%20Password%20Field%20Masking%20in%20SAP_SE%20Application%20Server%20ABAP&amp;severity=medium&amp;id=69378a8b0af42da4c56f97c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42896-cwe-116-improper-encoding-or-escapi-31d1342b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42896%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=69378a890af42da4c56f96d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42891-cwe-862-missing-authorization-in-sa-631c1b08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42891%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Enterprise%20Search%20for%20ABAP&amp;severity=medium&amp;id=69378a890af42da4c56f96d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42880-cwe-94-improper-control-of-generati-51f11621</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42880%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Solution%20Manager&amp;severity=critical&amp;id=69378a890af42da4c56f96d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42878-cwe-1244-internal-asset-exposed-to--d50ed2de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42878%3A%20CWE-1244%3A%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20SAP_SE%20SAP%20Web%20Dispatcher%20and%20Internet%20Communication%20Manager%20(ICM)&amp;severity=high&amp;id=69378a890af42da4c56f96cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42877-cwe-787-out-of-bounds-write-in-saps-4e99348d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42877%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAP%20Web%20Dispatcher%2C%20Internet%20Communication%20Manager%20and%20SAP%20Content%20Server&amp;severity=high&amp;id=69378a890af42da4c56f96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42876-cwe-405-asymmetric-resource-consump-c168cc00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42876%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20S%2F4%20HANA%20Private%20Cloud%20(Financials%20General%20Ledger)&amp;severity=high&amp;id=69378a890af42da4c56f96c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42875-cwe-306-missing-authentication-for--47f7742c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42875%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20NetWeaver%20Internet%20Communication%20Framework&amp;severity=medium&amp;id=69378a890af42da4c56f96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42874-cwe-405-asymmetric-resource-consump-4ce1bcd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42874%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAP%20NetWeaver%20(remote%20service%20for%20Xcelsius)&amp;severity=high&amp;id=69378a890af42da4c56f96bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42873-cwe-405-asymmetric-resource-consump-002faf62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42873%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20in%20SAP_SE%20SAPUI5%20framework%20(Markdown-it%20component)&amp;severity=medium&amp;id=69378a890af42da4c56f96b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42872-cwe-489-active-debug-code-in-sapse--7d460c4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42872%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=69378a890af42da4c56f96b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66622-cwe-755-improper-handling-of-except-969a34b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66622%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20matrix-org%20matrix-rust-sdk&amp;severity=low&amp;id=69378a8b0af42da4c56f97d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66568-cwe-347-improper-verification-of-cr-3227f29f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66568%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=69378a8b0af42da4c56f97cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66567-cwe-347-improper-verification-of-cr-c4aef5a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66567%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=69378a8b0af42da4c56f97ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66565-cwe-252-unchecked-return-value-in-g-89b510f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66565%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20gofiber%20utils&amp;severity=critical&amp;id=693783830af42da4c56cfe7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66508-cwe-290-authentication-bypass-by-sp-ea0053f3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66508%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%201Panel-dev%201Panel&amp;severity=medium&amp;id=693783830af42da4c56cfe76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14286-information-disclosure-in-tenda-ac9-b6d0c498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14286%3A%20Information%20Disclosure%20in%20Tenda%20AC9&amp;severity=medium&amp;id=693783830af42da4c56cfe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53835-9236f4e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53835&amp;severity=null&amp;id=6937d709964788758a861bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66507-cwe-602-client-side-enforcement-of--e0e5b8e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66507%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%201Panel-dev%201Panel&amp;severity=high&amp;id=693783830af42da4c56cfe71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14285-sql-injection-in-code-projects-empl-8baecf01</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14285%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=693779c10af42da4c555dffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66481-cwe-80-improper-neutralization-of-s-13a5bdaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66481%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=693771bc9bbcd7dc91e5c88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66470-cwe-79-improper-neutralization-of-i-ed065f81</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66470%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=69376b769bbcd7dc91d243c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53805-985112e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53805&amp;severity=null&amp;id=6937dce3ca0f3871ecb1621e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53779-f67384b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53779&amp;severity=low&amp;id=695b8f06db813ff03e463842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-09-dc261da7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-09&amp;severity=medium&amp;id=6938ba537205ca471f065815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65513-na-22176379</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65513%3A%20n%2Fa&amp;severity=high&amp;id=6938956652fe50f9a492979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65882-na-7d1d5ed6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65882%3A%20n%2Fa&amp;severity=critical&amp;id=69387706ef540ebbadc35cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65741-na-4d681e7f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65741%3A%20n%2Fa&amp;severity=critical&amp;id=69387706ef540ebbadc35ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65572-na-006ced74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65572%3A%20n%2Fa&amp;severity=medium&amp;id=693871e8ef540ebbadbcf66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65300-na-de53d473</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65300%3A%20n%2Fa&amp;severity=medium&amp;id=693871e8ef540ebbadbcf667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65573-na-f55e4ea1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65573%3A%20n%2Fa&amp;severity=high&amp;id=69386e50ef540ebbadbb02e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61258-na-a34410c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61258%3A%20n%2Fa&amp;severity=high&amp;id=693867ed74ebaa3babafb8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61078-na-d19b7157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61078%3A%20n%2Fa&amp;severity=medium&amp;id=693867ed74ebaa3babafb8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65594-na-3c6098e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65594%3A%20n%2Fa&amp;severity=high&amp;id=693867e174ebaa3babaf6f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64085-na-c623bbcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64085%3A%20n%2Fa&amp;severity=medium&amp;id=6938612b74ebaa3baba47ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64086-na-7fbb2559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64086%3A%20n%2Fa&amp;severity=medium&amp;id=69385b9074ebaa3bab9ecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63742-na-4fa27747</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63742%3A%20n%2Fa&amp;severity=critical&amp;id=693856d07515e08d316631e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63740-na-fd775487</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63740%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63739-na-f4063b4d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63739%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63738-na-d84bc5ad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63738%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63737-na-737624fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63737%3A%20n%2Fa&amp;severity=medium&amp;id=693856d07515e08d316631dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56704-na-1ebe633b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56704%3A%20n%2Fa&amp;severity=high&amp;id=693856d07515e08d316631d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65289-na-e29a5368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65289%3A%20n%2Fa&amp;severity=medium&amp;id=693852147515e08d31601b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65288-na-da37b364</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65288%3A%20n%2Fa&amp;severity=medium&amp;id=693852147515e08d31601b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65287-na-b43a1068</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65287%3A%20n%2Fa&amp;severity=high&amp;id=693843e8795dcaf6c50a72c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61075-na-4fe468ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61075%3A%20n%2Fa&amp;severity=high&amp;id=69383fbf795dcaf6c50728b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61074-na-357642de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61074%3A%20n%2Fa&amp;severity=medium&amp;id=69383fbf795dcaf6c50728b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66469-cwe-79-improper-neutralization-of-i-fdd6e9a9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66469%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=6937671f9bbcd7dc91cb4c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66204-cwe-307-improper-restriction-of-exc-5e29a722</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66204%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WBCE%20WBCE_CMS&amp;severity=medium&amp;id=693765059bbcd7dc91c9e948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66202-cwe-647-use-of-non-canonical-url-pa-8f58c5f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66202%3A%20CWE-647%3A%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20withastro%20astro&amp;severity=medium&amp;id=693763792bceb4b25b4513aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65964-cwe-829-inclusion-of-functionality--14b531c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65964%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=critical&amp;id=693763792bceb4b25b4513af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65962-cwe-352-cross-site-request-forgery--80114d16</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65962%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69375ffc2bceb4b25b402a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64760-cwe-352-cross-site-request-forgery--4bf27619</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64760%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69375c702bceb4b25b3c00be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64499-cwe-352-cross-site-request-forgery--164979cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64499%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693756d12bceb4b25b3829eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64498-cwe-352-cross-site-request-forgery--0550d940</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64498%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693755498d836cc4e0fc05cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64497-cwe-639-authorization-bypass-throug-1c2837ee</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64497%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=693755498d836cc4e0fc05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36140-cwe-770-allocation-of-resources-wit-95180fbd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36140%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=693751c58d836cc4e0f76ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12635-cwe-79-improper-neutralization-of-i-7d6e371b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=69374abd8d836cc4e0f08cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64650-cwe-532-insertion-of-sensitive-info-a31ea1e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64650%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Storage%20Defender%20-%20Resiliency%20Service&amp;severity=medium&amp;id=69374abd8d836cc4e0f08cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12832-cwe-918-server-side-request-forgery-b954c793</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12832%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=693748a28d836cc4e0ef5ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36017-cwe-526-in-ibm-controller-209cce35</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36017%3A%20CWE-526%20in%20IBM%20Controller&amp;severity=medium&amp;id=693746f956e18237059c6663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14276-command-injection-in-ilevia-eve-x1--6e7a3738</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14276%3A%20Command%20Injection%20in%20Ilevia%20EVE%20X1%20Server&amp;severity=medium&amp;id=693746f956e18237059c6666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36102-cwe-602-client-side-enforcement-of--5cf9a494</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36102%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Controller&amp;severity=low&amp;id=693746f956e18237059c666f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33111-cwe-379-creation-of-temporary-file--8b08ffae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33111%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20IBM%20Controller&amp;severity=medium&amp;id=693746f956e18237059c666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36015-cwe-1284-improper-validation-of-spe-c39f93cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36015%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Controller&amp;severity=medium&amp;id=6937437656e1823705989915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrimerawire-trojan-targets-windows-fakes-chrome-a-a936c1d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChrimeraWire%20Trojan%20Targets%20Windows%2C%20Fakes%20Chrome%20Activity%20to%20Manipulate%20Search%20Rankings&amp;severity=medium&amp;id=69373866d081e9e7fd351a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-confirm-jssmuggler-uses-compromised-sites--e0097b19</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Confirm%20JS%23SMUGGLER%20Uses%20Compromised%20Sites%20to%20Deploy%20NetSupport%20RAT&amp;severity=high&amp;id=69372a5ed081e9e7fd22dc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-crooks-manipulate-online-photos-to-fuel-virtua-98398763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%3A%20Crooks%20manipulate%20online%20photos%20to%20fuel%20virtual%20kidnapping%20ransoms&amp;severity=medium&amp;id=69372a5ed081e9e7fd22dc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poland-arrests-ukrainians-utilizing-advanced-hacki-d125e355</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poland%20arrests%20Ukrainians%20utilizing%20&apos;advanced&apos;%20hacking%20equipment&amp;severity=high&amp;id=69372a5ed081e9e7fd22dc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-users-watch-out-new-jssmuggler-campaign-dr-a750fc34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Users%20Watch%20Out%3A%20New%20JS%23SMUGGLER%20Campaign%20Drops%20NetSupport%20RAT%20Through%20Infected%20Sites&amp;severity=medium&amp;id=693717a306c06374c7fc8c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14261-cwe-331-insufficient-entropy-in-lit-bb85e4c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14261%3A%20CWE-331%20Insufficient%20Entropy%20in%20Litmuschaos%20litmus&amp;severity=high&amp;id=693717ba06c06374c7fca710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14259-sql-injection-in-jihai-jshop-minipr-19e45c64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14259%3A%20SQL%20Injection%20in%20Jihai%20Jshop%20MiniProgram%20Mall%20System&amp;severity=medium&amp;id=6937143506c06374c7f73fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fortifies-chrome-agentic-ai-against-indirec-d4380cb5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Fortifies%20Chrome%20Agentic%20AI%20Against%20Indirect%20Prompt%20Injection%20Attacks&amp;severity=medium&amp;id=6937141b06c06374c7f7189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-not-so-hidden-dangers-of-age-verification-a818daf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20(Not%20So)%20Hidden%20Dangers%20of%20Age%20Verification&amp;severity=medium&amp;id=6937109b06c06374c7f4e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/campaign-uses-clickfix-page-to-push-netsupport-rat-a45f131d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Campaign%20uses%20ClickFix%20page%20to%20push%20NetSupport%20RAT&amp;severity=medium&amp;id=693819561b76610347bfb3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-confirm-jssmuggler-uses-compromised-sites--c2faf5b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Confirm%20JS%23SMUGGLER%20Uses%20Compromised%20Sites%20to%20Deploy%20NetSupport%20RAT&amp;severity=medium&amp;id=6937244c7c9ad9ea57bd6eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14258-sql-injection-in-itsourcecode-stude-88d71820</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14258%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69370e8e06c06374c7f392fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48625-elevation-of-privilege-in-google-an-28202f83</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48625%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69370e8e06c06374c7f3930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48608-information-disclosure-in-google-an-92b970a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48608%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69370e8e06c06374c7f39309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48606-elevation-of-privilege-in-google-an-d4f639b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48606%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69370e8e06c06374c7f39306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48569-denial-of-service-in-google-android-b3ffd32e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48569%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=69370e8e06c06374c7f39303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lummastealer-dropped-via-fake-updates-from-itchio--c868d435</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LummaStealer%20dropped%20via%20fake%20updates%20from%20itch.io%20and%20Patreon&amp;severity=medium&amp;id=693819561b76610347bfb39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14257-sql-injection-in-itsourcecode-stude-7df91217</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14257%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=6937057e52c2eb5957f2e56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-critical-vulnerability-in-react-290a3101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2shell%3A%20Critical%20vulnerability%20in%20react&amp;severity=critical&amp;id=6937058c52c2eb5957f3550c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48639-elevation-of-privilege-in-google-an-daf63e16</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48639%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48638-elevation-of-privilege-in-google-an-489b6fec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48638%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48637-elevation-of-privilege-in-google-an-0e76eb7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48637%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48633-information-disclosure-in-google-an-e5379ff0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48633%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058652c2eb5957f2f179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48632-elevation-of-privilege-in-google-an-40461887</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48632%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48631-denial-of-service-in-google-android-512e0f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48631%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058552c2eb5957f2f12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48629-elevation-of-privilege-in-google-an-2bae4244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48629%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48628-information-disclosure-in-google-an-17e3c9e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48628%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48627-elevation-of-privilege-in-google-an-b751909a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48627%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48626-elevation-of-privilege-in-google-an-8e0be547</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48626%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48624-elevation-of-privilege-in-google-an-5702f9df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48624%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48623-elevation-of-privilege-in-google-an-9d6a36df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48623%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48622-information-disclosure-in-google-an-fb77859e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48622%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058552c2eb5957f2f10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48621-elevation-of-privilege-in-google-an-af90a51b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48621%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48620-elevation-of-privilege-in-google-an-63495e7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48620%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058552c2eb5957f2f104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48618-elevation-of-privilege-in-google-an-67fe9929</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48618%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48615-elevation-of-privilege-in-google-an-5187df21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48615%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058352c2eb5957f2f0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48614-denial-of-service-in-google-android-c19955ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48614%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48612-elevation-of-privilege-in-google-an-4c540405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48612%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058352c2eb5957f2f0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48610-information-disclosure-in-google-an-d4c57874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48610%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48607-denial-of-service-in-google-android-3032c148</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48607%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48604-information-disclosure-in-google-an-0815471d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48604%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48603-denial-of-service-in-google-android-12d0a9a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48603%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48601-elevation-of-privilege-in-google-an-d417be9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48601%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48600-information-disclosure-in-google-an-60be2def</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48600%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058352c2eb5957f2f0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48599-elevation-of-privilege-in-google-an-fdf1c792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48599%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48598-elevation-of-privilege-in-google-an-6c6a9f3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48598%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48597-elevation-of-privilege-in-google-an-7b795845</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48597%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48596-elevation-of-privilege-in-google-an-7ea14d68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48596%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48594-elevation-of-privilege-in-google-an-ae9ef588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48594%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48592-information-disclosure-in-google-an-67223ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48592%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48591-information-disclosure-in-google-an-2c72e8b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48591%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48590-denial-of-service-in-google-android-4ca6dfe4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48590%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937058152c2eb5957f2eebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48589-elevation-of-privilege-in-google-an-a5c08000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48589%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48588-elevation-of-privilege-in-google-an-9b5d5df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48588%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058152c2eb5957f2eeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48586-elevation-of-privilege-in-google-an-3f0a5c62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48586%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48584-denial-of-service-in-google-android-a87802f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48584%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937057f52c2eb5957f2e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48583-elevation-of-privilege-in-google-an-78dcd99f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48583%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48580-elevation-of-privilege-in-google-an-32d568ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48580%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48576-denial-of-service-in-google-android-b9b3c429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48576%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=6937057f52c2eb5957f2e5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48575-elevation-of-privilege-in-google-an-9444c0c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48575%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48573-elevation-of-privilege-in-google-an-0ea2933f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48573%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48572-elevation-of-privilege-in-google-an-9ca789a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48572%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48566-elevation-of-privilege-in-google-an-436aed13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48566%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48565-elevation-of-privilege-in-google-an-0e329f99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48565%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057f52c2eb5957f2e5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48564-elevation-of-privilege-in-google-an-af230c2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48564%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48555-information-disclosure-in-google-an-9b3aa07a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48555%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48536-elevation-of-privilege-in-google-an-c886a5fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48536%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48525-elevation-of-privilege-in-google-an-2c155039</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48525%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32329-elevation-of-privilege-in-google-an-f9fdd96f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32329%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32328-elevation-of-privilege-in-google-an-03e61eaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32328%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32319-elevation-of-privilege-in-google-an-6db421ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32319%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937057e52c2eb5957f2e57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22432-elevation-of-privilege-in-google-an-957a188d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22432%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=6937057e52c2eb5957f2e579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22420-elevation-of-privilege-in-google-an-8704b66e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22420%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937057e52c2eb5957f2e575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-automated-threat-hunting-brings-ghostpenguin-ou-22b1db0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Automated%20Threat%20Hunting%20Brings%20GhostPenguin%20Out%20of%20the%20Shadows&amp;severity=medium&amp;id=693819561b76610347bfb394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14256-sql-injection-in-itsourcecode-stude-af143abb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14256%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=693701f752c2eb5957f05743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14251-sql-injection-in-code-projects-onli-fee5fe78</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14251%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936fa8b3bff8e510987a749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14250-sql-injection-in-code-projects-onli-27dd2930</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14250%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936f16d3bff8e51097ebcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14271-625b0c4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14271&amp;severity=null&amp;id=6936f16d3bff8e51097ebd00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-china-linked-threat-actors-weaponized-react2sh-7bee9779</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%3A%20China-linked%20threat%20actors%20weaponized%20React2Shell%20hours%20after%20disclosure&amp;severity=medium&amp;id=6936ebcf04c1ddb1a4e1f16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14249-sql-injection-in-code-projects-onli-50d28fa0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14249%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6936ebea04c1ddb1a4e2085a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14248-sql-injection-in-code-projects-simp-9c63831c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14248%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936e4d104c1ddb1a4d9d98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14247-sql-injection-in-code-projects-simp-7ac88ecb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14247%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936dd48dc63120ed94d35de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14246-sql-injection-in-code-projects-simp-0a6b705d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14246%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6936d63fdc63120ed944e4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/substitution-cipher-based-on-the-voynich-manuscrip-2fc98498</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Substitution%20Cipher%20Based%20on%20The%20Voynich%20Manuscript%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6936d2c1dc63120ed93d5df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/space-bears-ransomware-claims-comcast-data-theft-t-9e39c14a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Space%20Bears%20Ransomware%20Claims%20Comcast%20Data%20Theft%20Through%20Quasar%20Breach&amp;severity=high&amp;id=6936d210e64c706dbb206f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8th-december-threat-intelligence-report-62e2aaf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8th%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6936ce90e64c706dbb1c6278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tri-century-eye-care-data-breach-impacts-200000-in-199c9ff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tri-Century%20Eye%20Care%20Data%20Breach%20Impacts%20200%2C000%20Individuals&amp;severity=medium&amp;id=6936cb04e64c706dbb17160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-usb-malware-react2shell-whatsapp-worm-21762801</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20USB%20Malware%2C%20React2Shell%2C%20WhatsApp%20Worms%2C%20AI%20IDE%20Bugs%20%26%20More&amp;severity=medium&amp;id=6936db3cdc63120ed94b30fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14245-sql-injection-in-ideacms-4ff3b032</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14245%3A%20SQL%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=6936c788e64c706dbb14c805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-surpassed-45-billion-us-treasu-745c68d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Payments%20Surpassed%20%244.5%20Billion%3A%20US%20Treasury&amp;severity=high&amp;id=6936c3085f72f49d1523d830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42620-cwe-79-improper-neutralization-of-i-436bc029</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42620%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42616-cwe-352-cross-site-request-forgery--d8f2c7ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14244-cross-site-scripting-in-greencms-1c58531f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14244%3A%20Cross%20Site%20Scripting%20in%20GreenCMS&amp;severity=medium&amp;id=6936c3245f72f49d1523dfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42615-cwe-307-improper-restriction-of-exc-4574821b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42615%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20CIRCL%20Vulnerability-Lookup&amp;severity=high&amp;id=6936c3245f72f49d1523dfe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-can-retailers-cyber-prepare-for-the-most-vulne-f9f19d1b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Can%20Retailers%20Cyber-Prepare%20for%20the%20Most%20Vulnerable%20Time%20of%20the%20Year%3F&amp;severity=high&amp;id=6936db3cdc63120ed94b3101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-70-domains-used-in-months-long-phishing-spree-e27c96d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2070%20Domains%20Used%20in%20Months-Long%20Phishing%20Spree%20Against%20US%20Universities&amp;severity=medium&amp;id=6936bc035f72f49d1519692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14230-sql-injection-in-code-projects-dail-c92f6367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14230%3A%20SQL%20Injection%20in%20code-projects%20Daily%20Time%20Recording%20System&amp;severity=medium&amp;id=6936bc165f72f49d1519946d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14229-csv-injection-in-sourcecodester-inv-4c6c3adf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14229%3A%20CSV%20Injection%20in%20SourceCodester%20Inventory%20Management%20System&amp;severity=medium&amp;id=6936b3f681782ca67e5acd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-fvncbot-seedsnatcher-and-clayrat-g-32b3fd39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20FvncBot%2C%20SeedSnatcher%2C%20and%20ClayRat%20Gain%20Stronger%20Data%20Theft%20Features&amp;severity=medium&amp;id=6936bda25f72f49d151d2502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-apache-tika-vulnerability-leads-to-xxe-in-0a72bacd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Apache%20Tika%20Vulnerability%20Leads%20to%20XXE%20Injection&amp;severity=critical&amp;id=6936ace781782ca67e50ab4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14228-cross-site-scripting-in-yealink-sip-248d48cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14228%3A%20Cross%20Site%20Scripting%20in%20Yealink%20SIP-T21P%20E2&amp;severity=medium&amp;id=6936b07281782ca67e564521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-36d737ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=high&amp;id=6936a96681782ca67e4dd963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14227-sql-injection-in-philipinho-simple--8c570b89</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14227%3A%20SQL%20Injection%20in%20Philipinho%20Simple-PHP-Blog&amp;severity=medium&amp;id=6936a54eb488c525a1e13b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-react2shell-surges-d6677c2e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20React2Shell%20Surges&amp;severity=medium&amp;id=69369e41b488c525a1d6f755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14262-cwe-708-in-knime-knime-business-hub-3cb6320c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14262%3A%20CWE-708%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=69369e58b488c525a1d75c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14226-sql-injection-in-itsourcecode-stude-4f7b60af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14226%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Management%20System&amp;severity=medium&amp;id=69369e58b488c525a1d75c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66461-unquoted-search-path-or-element-in--7d3873c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66461%3A%20Unquoted%20search%20path%20or%20element%20in%20GS%20Yuasa%20International%20Ltd.%20FULLBACK%20Manager%20Pro%20(for%20Windows)&amp;severity=medium&amp;id=69369e58b488c525a1d75c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27020-cwe-306-missing-authentication-for--156b66fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27020%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Infinera%20MTC-9&amp;severity=critical&amp;id=69369ac1b488c525a1d4258d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27019-cwe-306-missing-authentication-for--a0e783ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27019%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Infinera%20MTC-9&amp;severity=critical&amp;id=69369ac1b488c525a1d4258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneeit-wordpress-rce-exploited-in-the-wild-while-i-a61dcbf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneeit%20WordPress%20RCE%20Exploited%20in%20the%20Wild%20While%20ICTBroadcast%20Bug%20Fuels%20Frost%20Botnet%20Attacks&amp;severity=critical&amp;id=6936ae6081782ca67e53c78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14225-command-injection-in-d-link-dcs-930-5a0af0d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14225%3A%20Command%20Injection%20in%20D-Link%20DCS-930L&amp;severity=medium&amp;id=693698b3b488c525a1d24590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26489-cwe-20-improper-input-validation-in-3d027e23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26489%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20MTC-9&amp;severity=medium&amp;id=693696a4ddfbd9e35f9789a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26488-cwe-20-improper-input-validation-in-c6c4479b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26488%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20MTC-9&amp;severity=high&amp;id=693696a4ddfbd9e35f97899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26487-cwe-918-server-side-request-forgery-2e6cf9cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26487%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Infinera%20MTC-9&amp;severity=high&amp;id=69369326ddfbd9e35f933089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12956-cwe-79-improper-neutralization-of-i-7c179921</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=69369326ddfbd9e35f933086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66330-cwe-200-exposure-of-sensitive-infor-3284f659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66330%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66329-cwe-264-permissions-privileges-and--e1f97561</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66329%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14224-path-traversal-in-yottamaster-dm2-9267bdc2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14224%3A%20Path%20Traversal%20in%20Yottamaster%20DM2&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66325-cwe-264-permissions-privileges-and--0504e50a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66325%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58279-cwe-200-exposure-of-sensitive-infor-e033fe1e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58279%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368f9cddfbd9e35f8dc87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66334-cwe-494-download-of-code-without-in-0e54d12b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66334%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368f9cddfbd9e35f8dc88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66333-cwe-494-download-of-code-without-in-944d5e6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66333%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b2791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66332-cwe-494-download-of-code-without-in-3ec9848b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66332%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b278e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66331-cwe-494-download-of-code-without-in-583f79a4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66331%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=69368c28ddfbd9e35f8b278b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66328-cwe-362-concurrent-execution-using--cc58afbc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66328%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368c28ddfbd9e35f8b2788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66327-cwe-362-concurrent-execution-using--a5ee53a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66327%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368c28ddfbd9e35f8b2785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66326-cwe-416-use-after-free-in-huawei-ha-ac3c914a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66326%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66324-cwe-269-improper-privilege-manageme-d7215e4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66324%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=69368a07ddfbd9e35f898b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66323-cwe-358-improperly-implemented-secu-8ff1cb71</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66323%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14223-sql-injection-in-code-projects-simp-61984c4e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14223%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Leave%20Manager&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66322-cwe-362-concurrent-execution-using--2e27a1ce</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66322%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=69368a07ddfbd9e35f898b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66321-cwe-362-concurrent-execution-using--3b37d24c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66321%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6936848645c01810695adba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66320-cwe-362-concurrent-execution-using--fdf61234</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66320%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6936848645c01810695adba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14255-cwe-89-improper-neutralization-of-s-ff6c5314</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14255%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=6936848645c01810695adbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14254-cwe-89-improper-neutralization-of-s-3df14a20</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14254%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=high&amp;id=6936848645c01810695adbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14253-cwe-36-absolute-path-traversal-in-g-fbc31473</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14253%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Galaxy%20Software%20Services%20Vitals%20ESP&amp;severity=medium&amp;id=6936848645c01810695adba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14222-sql-injection-in-code-projects-empl-647a88c6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14222%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=6936810245c0181069558092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14221-cross-site-scripting-in-sourcecodes-9cb71bb6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14221%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Banking%20System&amp;severity=medium&amp;id=693678a9232db2b373874e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-deploys-udpgangster-backdoor-in-targete-29053629</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Deploys%20UDPGangster%20Backdoor%20in%20Targeted%20Turkey-Israel-Azerbaijan%20Campaign&amp;severity=low&amp;id=6936824d45c0181069588df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14220-path-traversal-in-orico-cd3510-7d4148fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14220%3A%20Path%20Traversal%20in%20ORICO%20CD3510&amp;severity=medium&amp;id=69367514232db2b37382295c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14219-unrestricted-upload-in-campcodes-re-c28386d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14219%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69367514232db2b373822965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/publishing-malicious-vs-code-extensions-bypassing--7319308e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Publishing%20Malicious%20VS%20Code%20Extensions%3A%20Bypassing%20VS%20Code%20Marketplace%20Analysis%20and%20the%20Insecurity%20of%20OpenVSX%20(Cursor%20AI%2FWindsurf)&amp;severity=medium&amp;id=69366aa7232db2b3737222ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14218-sql-injection-in-code-projects-curr-1aeb0557</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14218%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=6936668b6c0bb4b65b3ec243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14217-sql-injection-in-code-projects-curr-5f5339a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14217%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=69365f946c0bb4b65b365d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14216-sql-injection-in-code-projects-curr-89649ece</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14216%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=693657e9b529634ccd8059f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14215-sql-injection-in-code-projects-curr-a1011fae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14215%3A%20SQL%20Injection%20in%20code-projects%20Currency%20Exchange%20System&amp;severity=medium&amp;id=69365457b529634ccd7a72eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14214-sql-injection-in-itsourcecode-stude-5c53fb03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14214%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=69364a1f28b66c5f4ed25052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14212-sql-injection-in-projectworlds-adva-a82932ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14212%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=6936430628b66c5f4ed00063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14211-sql-injection-in-projectworlds-adva-29e9f6f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14211%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=6936430628b66c5f4ed0005d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14210-sql-injection-in-projectworlds-adva-2e0f00f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14210%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=69364ecab529634ccd756ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14209-sql-injection-in-campcodes-school-f-89a5b979</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14209%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=6936317e28b66c5f4ec304b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53749-9149de2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53749&amp;severity=null&amp;id=695450bcdb813ff03e2bf884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14208-command-injection-in-d-link-dir-823-7504327e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14208%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=693626f928b66c5f4ebbe7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14207-sql-injection-in-tushar-2223-hotel--19a9ca9c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14207%3A%20SQL%20Injection%20in%20tushar-2223%20Hotel-Management-System&amp;severity=medium&amp;id=69361ff428b66c5f4eb47eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14206-improper-authorization-in-sourcecod-9b34dba6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14206%3A%20Improper%20Authorization%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=69361c2c4a07f71cf650fcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-08-4165bff2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-08&amp;severity=medium&amp;id=69376a7f9bbcd7dc91cd7d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65228-na-35081934</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65228%3A%20n%2Fa&amp;severity=low&amp;id=6937387cd081e9e7fd35434b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65229-na-bb737467</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65229%3A%20n%2Fa&amp;severity=medium&amp;id=693734e9d081e9e7fd30bf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65230-na-7891b0f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65230%3A%20n%2Fa&amp;severity=medium&amp;id=69372dddd081e9e7fd297ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65231-na-61f295cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65231%3A%20n%2Fa&amp;severity=medium&amp;id=693722bf7c9ad9ea57ba3097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65849-na-92cbcf05</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65849%3A%20n%2Fa&amp;severity=critical&amp;id=69371f3a7c9ad9ea57b7cd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65548-na-9771dc99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65548%3A%20n%2Fa&amp;severity=critical&amp;id=693717ba06c06374c7fca71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65271-na-f866e554</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65271%3A%20n%2Fa&amp;severity=high&amp;id=693717ba06c06374c7fca714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64081-na-681a6197</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64081%3A%20n%2Fa&amp;severity=critical&amp;id=6937143506c06374c7f73fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65804-na-a92d6b98</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65804%3A%20n%2Fa&amp;severity=medium&amp;id=69370e8e06c06374c7f3930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluck-477-dev2-php-code-execution-d4449686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pluck%204.7.7-dev2%20-%20%20PHP%20Code%20Execution&amp;severity=medium&amp;id=693708ee52c2eb5957f7d791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59391-na-c7eddd49</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59391%3A%20n%2Fa&amp;severity=medium&amp;id=6937058652c2eb5957f2f18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63721-na-b46b935d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63721%3A%20n%2Fa&amp;severity=critical&amp;id=693701f752c2eb5957f0574b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65799-na-0462fce9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65799%3A%20n%2Fa&amp;severity=medium&amp;id=6936fe0c3bff8e51098be2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65363-na-c47dbb22</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65363%3A%20n%2Fa&amp;severity=high&amp;id=6936fe0c3bff8e51098be2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65796-na-f0a5aa8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65796%3A%20n%2Fa&amp;severity=medium&amp;id=6936fa8b3bff8e510987a750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65797-na-9a9e22f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65797%3A%20n%2Fa&amp;severity=medium&amp;id=6936fa8b3bff8e510987a743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65795-na-e7b7aa51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65795%3A%20n%2Fa&amp;severity=high&amp;id=6936fa8b3bff8e510987a73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65798-na-4de357d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65798%3A%20n%2Fa&amp;severity=medium&amp;id=6936f7043bff8e5109832fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61318-na-7df04a53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61318%3A%20n%2Fa&amp;severity=medium&amp;id=6936f16d3bff8e51097ebd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60912-na-553e54c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60912%3A%20n%2Fa&amp;severity=low&amp;id=6936ebea04c1ddb1a4e20861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telegram-phishing-and-related-activities-88211766</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telegram%20phishing%20and%20related%20activities&amp;severity=medium&amp;id=6936d9b6dc63120ed947a35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14205-cross-site-scripting-in-code-projec-8a342957</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14205%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Chamber%20of%20Commerce%20Membership%20Management%20System&amp;severity=medium&amp;id=69360f7d4a07f71cf640fdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14204-os-command-injection-in-tykodev-che-126a4b21</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14204%3A%20OS%20Command%20Injection%20in%20TykoDev%20cherry-studio-TykoFork&amp;severity=medium&amp;id=69360a2e96e8d1719bc52541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14203-sql-injection-in-code-projects-ques-01b21e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14203%3A%20SQL%20Injection%20in%20code-projects%20Question%20Paper%20Generator&amp;severity=medium&amp;id=6935f4ac4dfbcbe9ef77b262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/portugal-updates-cybercrime-law-to-exempt-security-e1a7abd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Portugal%20updates%20cybercrime%20law%20to%20exempt%20security%20researchers&amp;severity=high&amp;id=6935f0e6a6cc62dd6e3b64fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14201-cross-site-scripting-in-alokjaiswal-29327f6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14201%3A%20Cross%20Site%20Scripting%20in%20alokjaiswal%20Hotel-Management-services-using-MYSQL-and-php&amp;severity=medium&amp;id=6935c6fc81c8736e4c1ad8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14200-cross-site-scripting-in-alokjaiswal-07fbf7b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14200%3A%20Cross%20Site%20Scripting%20in%20alokjaiswal%20Hotel-Management-services-using-MYSQL-and-php&amp;severity=medium&amp;id=6935bc191ce29f222165335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14199-unrestricted-upload-6c4e9aaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14199%3A%20Unrestricted%20Upload&amp;severity=medium&amp;id=6935b5201ce29f22215bf218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-almost-any-phone-number-can-be-tracked-via-wha-c1960e0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20(almost)%20any%20phone%20number%20can%20be%20tracked%20via%20WhatsApp%20%26%20Signal%20%E2%80%93%20open-source%20PoC&amp;severity=high&amp;id=6935adb3551a24bb8cca3466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14198-information-disclosure-9a5872ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14198%3A%20Information%20Disclosure&amp;severity=medium&amp;id=6935adb1551a24bb8cca33db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patching-pulse-oximeter-firmware-388a4fb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patching%20Pulse%20Oximeter%20Firmware&amp;severity=medium&amp;id=6935adb3551a24bb8cca346a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14197-information-disclosure-c6ab3803</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14197%3A%20Information%20Disclosure&amp;severity=medium&amp;id=6935aa3c551a24bb8cc60a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14196-buffer-overflow-in-h3c-magic-b1-e84401a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14196%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B1&amp;severity=high&amp;id=69359f44ced1bbd5af6778cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14195-unrestricted-upload-in-code-project-da55b800</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14195%3A%20Unrestricted%20Upload%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=6935a119551a24bb8cbbdc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14194-cross-site-scripting-in-code-projec-5828086a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14194%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=693590d756f2fcb39f350249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14193-sql-injection-in-code-projects-empl-3fe72876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14193%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Profile%20Management%20System&amp;severity=medium&amp;id=69358a9756f2fcb39f2bcb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14192-sql-injection-in-rashmindungrani-on-ff18faf2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14192%3A%20SQL%20Injection%20in%20RashminDungrani%20online-banking&amp;severity=medium&amp;id=69358a9756f2fcb39f2bcb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14191-buffer-overflow-in-utt-512w-f886a277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14191%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20512W&amp;severity=high&amp;id=69357a6c705c380fd9783155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14190-sql-injection-in-chanjet-tplus-d641a022</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14190%3A%20SQL%20Injection%20in%20Chanjet%20TPlus&amp;severity=medium&amp;id=693572f137e7cb8c9bebccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14189-sql-injection-in-chanjet-crm-716e2149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14189%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=6935691437e7cb8c9be15eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14188-command-injection-in-ugreen-dh2100-7ececf1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14188%3A%20Command%20Injection%20in%20UGREEN%20DH2100%2B&amp;severity=high&amp;id=693560d76d1d87ed0c725dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-50-infrastructure-exposed-in-new-server-ip-fb382e24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%205.0%20Infrastructure%20Exposed%20in%20New%20Server%2C%20IP%2C%20and%20Domain%20Leak&amp;severity=high&amp;id=693556416d1d87ed0c65a0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-wsus-remote-code-execution-cve-2025-5928-9781ebf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20WSUS%20Remote%20Code%20Execution%20(CVE-2025-59287)%20Actively%20Exploited%20in%20the%20Wild%20(Updated%20November%203)&amp;severity=medium&amp;id=693717b806c06374c7fca668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14187-buffer-overflow-in-ugreen-dh2100-bd7ea556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14187%3A%20Buffer%20Overflow%20in%20UGREEN%20DH2100%2B&amp;severity=high&amp;id=69353dcaffe3c58b9f071ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stillepost-or-how-to-proxy-your-c2s-http-traffic-t-c0561b51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stillepost%20-%20Or%3A%20How%20to%20Proxy%20your%20C2s%20HTTP-Traffic%20through%20Chromium%20%7C%20mischief&amp;severity=medium&amp;id=69352f35be54460d664f2525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14186-basic-cross-site-scripting-in-grand-cf5b2d9b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14186%3A%20Basic%20Cross%20Site%20Scripting%20in%20Grandstream%20GXP1625&amp;severity=medium&amp;id=69352f32be54460d664f24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14185-sql-injection-in-yonyou-u8-cloud-eef10b29</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14185%3A%20SQL%20Injection%20in%20Yonyou%20U8%20Cloud&amp;severity=medium&amp;id=69350bd6d5925d6ea2ce785f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14184-command-injection-in-sgai-space1-na-2c7efab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14184%3A%20Command%20Injection%20in%20SGAI%20Space1%20NAS%20N1211DS&amp;severity=medium&amp;id=6935065f5cd7c00bf6e3233d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14183-unprotected-storage-of-credentials--837342c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14183%3A%20Unprotected%20Storage%20of%20Credentials%20in%20SGAI%20Space1%20NAS%20N1211DS&amp;severity=medium&amp;id=6934fd445cd7c00bf6d1c497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14182-path-traversal-in-sobey-media-conve-d7bd707f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14182%3A%20Path%20Traversal%20in%20Sobey%20Media%20Convergence%20System&amp;severity=medium&amp;id=6934e7470265b8b2b61784c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-launch-dual-campaign-on-globalprotect-po-09fd80bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20launch%20dual%20campaign%20on%20GlobalProtect%20portals%20and%20SonicWall%20APIs&amp;severity=medium&amp;id=6934d9340265b8b2b60965a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-07-9a43a65f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-07&amp;severity=medium&amp;id=693618854a07f71cf64a70c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/barts-health-nhs-confirms-oracle-ebs-linked-data-b-9ae7682b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Barts%20Health%20NHS%20Confirms%20Oracle%20EBS%20Linked%20Data%20Breach%20from%20Cl0p%20Ransomware&amp;severity=high&amp;id=69345f416c01a8c605b4dc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14141-buffer-overflow-in-utt-520w-c6cc8954</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14141%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=693456cca98e58ac8622ed62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14140-buffer-overflow-in-utt-520w-c180e378</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14140%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=high&amp;id=6934506ea98e58ac861acdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-30-flaws-in-ai-coding-tools-en-5c971663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%2030%2B%20Flaws%20in%20AI%20Coding%20Tools%20Enabling%20Data%20Theft%20and%20RCE%20Attacks&amp;severity=critical&amp;id=69345f5b6c01a8c605b56f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drones-to-diplomas-how-russias-largest-private-uni-847a2067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Drones%20to%20Diplomas%3A%20How%20Russia%E2%80%99s%20Largest%20Private%20University%20is%20Linked%20to%20a%20%2425M%20Essay%20Mill&amp;severity=medium&amp;id=69344c37a98e58ac86167832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14139-buffer-overflow-in-utt-520w-53617f4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14139%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20520W&amp;severity=medium&amp;id=6934487c0f17eabd84814c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react2shell-flaw-added-to-cisa-kev-after--e293bc02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React2Shell%20Flaw%20Added%20to%20CISA%20KEV%20After%20Confirmed%20Active%20Exploitation&amp;severity=critical&amp;id=693436d8e435a964bf0ac7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-state-hackers-use-new-brickstorm-malware-a-0556d5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20State%20Hackers%20Use%20New%20BRICKSTORM%20Malware%20Against%20VMware%20Systems&amp;severity=medium&amp;id=69342be88daff6a4f6fb7cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14136-stack-based-buffer-overflow-in-link-e0ef136b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14136%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=69342bf48daff6a4f6fb8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react2shell-flaw-added-to-cisa-kev-after--ea2329c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React2Shell%20Flaw%20Added%20to%20CISA%20KEV%20After%20Confirmed%20Active%20Exploitation&amp;severity=critical&amp;id=6934174311364f3ab440a492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14135-stack-based-buffer-overflow-in-link-fc3b66c1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14135%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=6934172811364f3ab4401e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-prompt-injection-attack-vectors-through-mcp-sa-e3a2ecb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Prompt%20Injection%20Attack%20Vectors%20Through%20MCP%20Sampling&amp;severity=medium&amp;id=69340f26092893b302a3c94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14134-stack-based-buffer-overflow-in-link-f77fe5c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14134%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=69340f40092893b302a4ad60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14133-stack-based-buffer-overflow-in-link-0787550c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14133%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6500&amp;severity=high&amp;id=693408d1092893b3029c1957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14126-hard-coded-credentials-in-tozed-zlt-3f98c3ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14126%3A%20Hard-coded%20Credentials%20in%20TOZED%20ZLT%20M30S&amp;severity=high&amp;id=6934009fb96ba7cdea90c2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13065-cwe-434-unrestricted-upload-of-file-171779c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20Starter%20Templates%20%E2%80%93%20AI-Powered%20Templates%20for%20Elementor%20%26%20Gutenberg&amp;severity=high&amp;id=6933f997b96ba7cdea885820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12966-cwe-434-unrestricted-upload-of-file-e5c2245d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12966%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=6933f997b96ba7cdea88581c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sharpening-the-knife-strategic-evolution-of-gold-b-c02e52b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sharpening%20the%20knife%3A%20strategic%20evolution%20of%20GOLD%20BLADE&amp;severity=medium&amp;id=69381cd61b76610347c61f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12499-cwe-79-improper-neutralization-of-i-f24346c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20widgetpack%20Rich%20Shortcodes%20for%20Google%20Reviews&amp;severity=high&amp;id=6933dd63c1b0382f6aac62a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13377-cwe-22-improper-limitation-of-a-pat-7c7aa1e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13377%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%2010web%2010Web%20Booster%20%E2%80%93%20Website%20speed%20optimization%2C%20Cache%20%26%20Page%20Speed%20optimizer&amp;severity=critical&amp;id=6933d18711163305effc5a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13748-cwe-639-authorization-bypass-throug-41ae3d2f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13748%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=6933d18711163305effc5a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13358-cwe-862-missing-authorization-in-co-6fce8efb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13358%3A%20CWE-862%20Missing%20Authorization%20in%20codeconfig%20CodeConfig%20Accessibility&amp;severity=medium&amp;id=6933c71e11163305efef3dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13309-cwe-862-missing-authorization-in-co-8684df95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13309%3A%20CWE-862%20Missing%20Authorization%20in%20codeconfig%20CodeConfig%20Accessibility&amp;severity=medium&amp;id=6933c71e11163305efef3dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13894-cwe-79-improper-neutralization-of-i-7399ce59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sumotto%20CSV%20Sumotto&amp;severity=medium&amp;id=6933c71e11163305efef3df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12091-cwe-862-missing-authorization-in-in-3df67056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12091%3A%20CWE-862%20Missing%20Authorization%20in%20instantsearchplus%20Search%2C%20Filters%20%26%20Merchandising%20for%20WooCommerce&amp;severity=medium&amp;id=6933c71c11163305efef3527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13857-cwe-79-improper-neutralization-of-i-bfcc147f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ksakai%20Yet%20Another%20WebClap%20for%20WordPress&amp;severity=medium&amp;id=6933c71e11163305efef3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13856-cwe-79-improper-neutralization-of-i-0e8648f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michaelcole1991%20Extra%20Post%20Images&amp;severity=medium&amp;id=6933c71e11163305efef3de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13863-cwe-79-improper-neutralization-of-i-272b89fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20krupenik%20RevInsite&amp;severity=medium&amp;id=6933c71e11163305efef3df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13907-cwe-79-improper-neutralization-of-i-3ef7d435</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13907%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tunilame%20CSS3%20Buttons&amp;severity=medium&amp;id=6933c72011163305efef4283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12717-cwe-79-improper-neutralization-of-i-b89f6ee3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cgrymala%20List%20Attachments%20Shortcode&amp;severity=medium&amp;id=6933c71c11163305efef353e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12577-cwe-862-missing-authorization-in-pa-c454a4fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12577%3A%20CWE-862%20Missing%20Authorization%20in%20passionui%20Listar%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=medium&amp;id=6933c71c11163305efef3530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12715-cwe-79-improper-neutralization-of-i-ec4113a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emaude%20Canadian%20Nutrition%20Facts%20Label&amp;severity=medium&amp;id=6933c71c11163305efef353a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13656-cwe-79-improper-neutralization-of-i-d0e11230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnabkumar%20Cute%20News%20Ticker&amp;severity=medium&amp;id=6933c71e11163305efef3dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13899-cwe-79-improper-neutralization-of-i-8d9d8271</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pntrinh%20TR%20Timthumb&amp;severity=medium&amp;id=6933c72011163305efef427d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13308-cwe-79-improper-neutralization-of-i-446187ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20georgestephanis%20Application%20Passwords&amp;severity=medium&amp;id=6933c71c11163305efef3553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13666-cwe-862-missing-authorization-in-he-f4f6e251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13666%3A%20CWE-862%20Missing%20Authorization%20in%20helloprint%20Plug%20your%20WooCommerce%20into%20the%20largest%20catalog%20of%20customized%20print%20products%20from%20Helloprint&amp;severity=medium&amp;id=6933c71e11163305efef3de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13629-cwe-352-cross-site-request-forgery--33e5be1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13629%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xbenx%20WP%20Landing%20Page&amp;severity=medium&amp;id=6933c71e11163305efef3dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12673-cwe-434-unrestricted-upload-of-file-74b9ba78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12673%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ajitdas%20Flex%20QR%20Code%20Generator&amp;severity=critical&amp;id=6933c71c11163305efef3534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12720-cwe-285-improper-authorization-in-g-429b15e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12720%3A%20CWE-285%20Improper%20Authorization%20in%20garidium%20g-FFL%20Cockpit&amp;severity=medium&amp;id=6933c71c11163305efef3543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12574-cwe-862-missing-authorization-in-pa-5912c10b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12574%3A%20CWE-862%20Missing%20Authorization%20in%20passionui%20Listar%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=medium&amp;id=6933c71c11163305efef352c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12721-cwe-862-missing-authorization-in-ga-f65f2aea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12721%3A%20CWE-862%20Missing%20Authorization%20in%20garidium%20g-FFL%20Cockpit&amp;severity=medium&amp;id=6933c71c11163305efef3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13896-cwe-79-improper-neutralization-of-i-ee7ce8d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Social%20Feed%20Gallery%20Portfolio&amp;severity=medium&amp;id=6933c72011163305efef426f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13898-cwe-79-improper-neutralization-of-i-b11b79c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sozan45%20Ultra%20Skype%20Button&amp;severity=medium&amp;id=6933c72011163305efef4276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13137-cwe-79-improper-neutralization-of-i-b4d137a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delabon%20Live%20Sales%20Notification%20for%20Woocommerce%20%E2%80%93%20Woomotiv&amp;severity=medium&amp;id=6933c71c11163305efef354f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13626-cwe-79-improper-neutralization-of-i-5041cab0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realloc%20myLCO&amp;severity=medium&amp;id=6933c71e11163305efef3dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14117-cross-site-request-forgery-in-fit2c-f4c93b17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14117%3A%20Cross-Site%20Request%20Forgery%20in%20fit2cloud%20Halo&amp;severity=medium&amp;id=6933c088c86a12d0de69d1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13292-cwe-269-improper-privilege-manageme-ce6b9bde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13292%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Apigee-X&amp;severity=high&amp;id=6933bc4bc86a12d0de63b6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13922-cwe-89-improper-neutralization-of-s-2d287121</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13922%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6933b4e62271496a0fa6c3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12505-cwe-285-improper-authorization-in-w-ce3225cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12505%3A%20CWE-285%20Improper%20Authorization%20in%20wedevs%20weDocs%3A%20AI%20Powered%20Knowledge%20Base%2C%20Docs%2C%20Documentation%2C%20Wiki%20%26%20AI%20Chatbot&amp;severity=medium&amp;id=6933b4e62271496a0fa6c3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11263-cwe-79-improper-neutralization-of-i-d46d2833</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linkwhspr%20Link%20Whisper%20Free&amp;severity=medium&amp;id=6933a6d1f88dbe026c8d8254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12510-cwe-79-improper-neutralization-of-i-f1941bb8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Google%20Reviews&amp;severity=high&amp;id=6933a6d1f88dbe026c8d8258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-06-8f68157b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-06&amp;severity=medium&amp;id=6934c75dcc1a9ed479e7a1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14116-server-side-request-forgery-in-xerr-9af87fe9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14116%3A%20Server-Side%20Request%20Forgery%20in%20xerrors%20Yuxi-Know&amp;severity=medium&amp;id=6933607ff88dbe026c285293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14111-path-traversal-in-rarlab-rar-app-fc126145</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14111%3A%20Path%20Traversal%20in%20Rarlab%20RAR%20App&amp;severity=low&amp;id=6933607ff88dbe026c28528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14108-command-injection-in-zspace-q2c-nas-00eaf7f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14108%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=69335977f88dbe026c240f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14107-command-injection-in-zspace-q2c-nas-3fb9b479</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14107%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=6933526ff88dbe026c2031d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14106-command-injection-in-zspace-q2c-nas-49414b8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14106%3A%20Command%20Injection%20in%20ZSPACE%20Q2C%20NAS&amp;severity=high&amp;id=6933526ff88dbe026c2031cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13426-cwe-913-improper-control-of-dynamic-826cfac1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13426%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Google%20Cloud%20Apigee%20hybrid%20Javacallout%20policy&amp;severity=high&amp;id=69334eebf88dbe026c1f61de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14105-denial-of-service-in-tozed-zlt-m30s-7c2d21fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14105%3A%20Denial%20of%20Service%20in%20TOZED%20ZLT%20M30S&amp;severity=medium&amp;id=69334b6ff88dbe026c1e4442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8148-cwe-732-incorrect-permission-assignm-2ecba3c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8148%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=693347f3f88dbe026c1c0562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/barts-health-nhs-discloses-data-breach-after-oracl-51d2560a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Barts%20Health%20NHS%20discloses%20data%20breach%20after%20Oracle%20zero-day%20hack&amp;severity=critical&amp;id=693347e2f88dbe026c1c039f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46603-cwe-307-improper-restriction-of-exc-142d8db3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46603%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20CloudBoost%20Virtual%20Appliance&amp;severity=high&amp;id=69332f7ef88dbe026c0dd0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-virtual-kidnapping-scams-using-altere-41363ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20virtual%20kidnapping%20scams%20using%20altered%20social%20media%20photos&amp;severity=high&amp;id=6933283df88dbe026c0463ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66623-cwe-200-exposure-of-sensitive-infor-2d0b4eb0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66623%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20strimzi%20strimzi-kafka-operator&amp;severity=high&amp;id=69332850f88dbe026c04683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66581-cwe-863-incorrect-authorization-in--38b7daba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66581%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=69332850f88dbe026c046838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66577-cwe-117-improper-output-neutralizat-a1be9753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66577%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=693324bbf88dbe026c02bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66570-cwe-290-authentication-bypass-by-sp-dc26efd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66570%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20yhirose%20cpp-httplib&amp;severity=critical&amp;id=693324bbf88dbe026c02bd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66566-cwe-201-insertion-of-sensitive-info-f71df300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66566%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20yawkat%20lz4-java&amp;severity=high&amp;id=69332135f88dbe026c014958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66562-cwe-79-improper-neutralization-of-i-431fd684</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66562%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AI-QL%20tuui&amp;severity=high&amp;id=69332135f88dbe026c014953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66558-cwe-639-authorization-bypass-throug-f4d1b6bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66558%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69332135f88dbe026c01494d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-cyber-threat-groups-rapidly-exploit-re-2ebc0255</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-nexus%20cyber%20threat%20groups%20rapidly%20exploit%20React2Shell%20vulnerability%20(CVE-2025-55182)&amp;severity=medium&amp;id=69331db4f88dbe026c0066bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66556-cwe-639-authorization-bypass-throug-5f362a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66556%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69332135f88dbe026c01495c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-click-agentic-browser-attack-can-delete-entir-6ca9b1af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Click%20Agentic%20Browser%20Attack%20Can%20Delete%20Entire%20Google%20Drive%20Using%20Crafted%20Emails&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66554-cwe-79-improper-neutralization-of-i-f37d0ba1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66554%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c00670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66549-cwe-209-generation-of-error-message-b2f541f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66549%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c00671b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66545-cwe-707-improper-neutralization-in--73fa08a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66545%3A%20CWE-707%3A%20Improper%20Neutralization%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331db5f88dbe026c006715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66515-cwe-287-improper-authentication-in--f26ad275</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66515%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66514-cwe-79-improper-neutralization-of-i-2b2ec064</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66514%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66557-cwe-284-improper-access-control-in--430a0d0a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66557%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69331a32f88dbe026cff02b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66548-cwe-116-improper-encoding-or-escapi-12e3ac9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66548%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69331a32f88dbe026cff02b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34256-cwe-321-use-of-hard-coded-cryptogra-3c681503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34256%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=critical&amp;id=693316aef88dbe026cfdbdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34265-cwe-79-improper-neutralization-of-i-90adca90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66553-cwe-639-authorization-bypass-throug-fbf5a7b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66553%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34263-cwe-79-improper-neutralization-of-i-d05244cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34266-cwe-79-improper-neutralization-of-i-5d8e9790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34264-cwe-79-improper-neutralization-of-i-ebe74830</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34262-cwe-79-improper-neutralization-of-i-e4e29f91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34258-cwe-79-improper-neutralization-of-i-0ecef541</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34259-cwe-79-improper-neutralization-of-i-a8c88718</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34261-cwe-79-improper-neutralization-of-i-fa86d9f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34260-cwe-79-improper-neutralization-of-i-5f1a2e84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34257-cwe-79-improper-neutralization-of-i-5a1eb3a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34257%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20Co.%2C%20Ltd.%20WISE-DeviceOn%20Server&amp;severity=medium&amp;id=693316aef88dbe026cfdbe02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66551-cwe-639-authorization-bypass-throug-f3ce54dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66551%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66513-cwe-639-authorization-bypass-throug-99516d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66513%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693316b0f88dbe026cfdbe3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14094-os-command-injection-in-edimax-br-6-f064d969</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14094%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69331326f88dbe026cfc76d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66550-cwe-241-improper-handling-of-unexpe-35a0b1e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66550%3A%20CWE-241%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69331326f88dbe026cfc76d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66546-cwe-639-authorization-bypass-throug-b63bfb9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66546%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=69330fa6f88dbe026cfb407e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66511-cwe-330-use-of-insufficiently-rando-5d56da14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66511%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66552-cwe-778-insufficient-logging-in-nex-1fc88742</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66552%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66547-cwe-639-authorization-bypass-throug-17681735</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66547%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=69330c20f88dbe026cf88df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14093-os-command-injection-in-edimax-br-6-c5b06834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14093%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69330c20f88dbe026cf88de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intellexa-leaks-reveal-zero-days-and-ads-based-vec-7f25cade</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intellexa%20Leaks%20Reveal%20Zero-Days%20and%20Ads-Based%20Vector%20for%20Predator%20Spyware%20Delivery&amp;severity=high&amp;id=6933089af88dbe026cf7736b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pharma-firm-inotiv-discloses-data-breach-after-ran-1670e3d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pharma%20firm%20Inotiv%20discloses%20data%20breach%20after%20ransomware%20attack&amp;severity=high&amp;id=6933089af88dbe026cf77363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blames-todays-outage-on-emergency-react-8fa199de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20blames%20today&apos;s%20outage%20on%20emergency%20React2Shell%20patch&amp;severity=critical&amp;id=6933089af88dbe026cf77373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-have-started-exploiting-the-newly--4109413c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Have%20Started%20Exploiting%20the%20Newly%20Disclosed%20React2Shell%20Vulnerability&amp;severity=high&amp;id=6933089af88dbe026cf7736f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-xxe-bug-cve-2025-66516-cvss-100-hits-apac-d08561e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20XXE%20Bug%20CVE-2025-66516%20(CVSS%2010.0)%20Hits%20Apache%20Tika%2C%20Requires%20Urgent%20Patch&amp;severity=critical&amp;id=6933b3cf2271496a0fa5db13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66512-cwe-80-improper-neutralization-of-s-48973679</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66512%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693308e8f88dbe026cf7915a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14104-out-of-bounds-read-in-red-hat-red-h-31ec701d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14104%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=693308e8f88dbe026cf7914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66510-cwe-359-exposure-of-private-persona-5f77ad95</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66510%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=693308e8f88dbe026cf79155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65036-cwe-862-missing-authorization-in-xw-9f6355a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65036%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20xwiki-pro-macros&amp;severity=high&amp;id=693308e8f88dbe026cf79160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14092-os-command-injection-in-edimax-br-6-4142d319</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14092%3A%20OS%20Command%20Injection%20in%20Edimax%20BR-6478AC%20V3&amp;severity=medium&amp;id=69330517f88dbe026cf63b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14091-sql-injection-in-trippwastaken-php--581f8838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14091%3A%20SQL%20Injection%20in%20TrippWasTaken%20PHP-Guitar-Shop&amp;severity=medium&amp;id=69330517f88dbe026cf63b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-x-fined-120-million-array-flaw-explo-2fcbc0f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20X%20Fined%20%E2%82%AC120%20Million%2C%20Array%20Flaw%20Exploited%2C%20New%20Iranian%20Backdoor&amp;severity=medium&amp;id=6933b4822271496a0fa66583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14090-sql-injection-in-amtt-hotel-broadba-1cf0bd3e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14090%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14089-improper-authorization-in-himool-er-bf99091b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14089%3A%20Improper%20Authorization%20in%20Himool%20ERP&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-variant-of-clayrat-android-spyware-seizes-full-032ec3e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Variant%20of%20ClayRat%20Android%20Spyware%20Seizes%20Full%20Device%20Control&amp;severity=medium&amp;id=6932fa88f88dbe026cf03906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-outage-caused-by-react2shell-mitigation-c6e3c984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Outage%20Caused%20by%20React2Shell%20Mitigations&amp;severity=critical&amp;id=6932f6fbf88dbe026cee6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14088-improper-authorization-in-ketr-jepa-78a1e9b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14088%3A%20Improper%20Authorization%20in%20ketr%20JEPaaS&amp;severity=medium&amp;id=6932f006f88dbe026ce9d2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-organizations-warned-of-chinese-malware-used-fo-7c023c5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Organizations%20Warned%20of%20Chinese%20Malware%20Used%20for%20Long-Term%20Persistence&amp;severity=medium&amp;id=6932ec71f88dbe026ce620bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-have-started-exploiting-the-newly--36f9fb99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Have%20Started%20Exploiting%20the%20Newly%20Disclosed%20React2Shell%20Vulnerability&amp;severity=critical&amp;id=6933b3cf2271496a0fa5db16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14086-improper-access-controls-in-youlait-4c87bed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14086%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=6932e8f6f88dbe026ce496ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14085-improper-control-of-dynamically-ide-01696bc4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14085%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=6932e8f6f88dbe026ce496a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58098-cwe-201-insertion-of-sensitive-info-8bc5a1d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58098%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932e1eef88dbe026cde8eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ssrf-payload-generator-for-fuzzing-pdf-generators--80dbefb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SSRF%20Payload%20Generator%20for%20fuzzing%20PDF%20Generators%20etc...&amp;severity=medium&amp;id=6932de75f88dbe026cdbbc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6966-cwe-476-null-pointer-dereference-in--592f235b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6966%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Canonical%20python-apt&amp;severity=medium&amp;id=6932dae7f88dbe026cd171b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whitebox-simulation-vs-blackbox-red-team-phishing-c25d50a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whitebox%20(simulation)%20vs.%20blackbox%20(red%20team)%20phishing&amp;severity=medium&amp;id=6932c95df88dbe026c9e697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intellexa-leaks-reveal-zero-days-and-ads-based-vec-ac3734d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intellexa%20Leaks%20Reveal%20Zero-Days%20and%20Ads-Based%20Vector%20for%20Predator%20Spyware%20Delivery&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-reports-prc-hackers-using-brickstorm-for-long-0c744b00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Reports%20PRC%20Hackers%20Using%20BRICKSTORM%20for%20Long-Term%20Access%20in%20U.S.%20Systems&amp;severity=high&amp;id=6932c5d0f88dbe026c9d1935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66200-moduserdirsuexec-bypass-via-allowov-1b3179fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66200%3A%20mod_userdir%2Bsuexec%20bypass%20via%20AllowOverride%20FileInfo%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6932beccf88dbe026c9a1a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13620-cwe-862-missing-authorization-in-ro-95a9c114</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13620%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=medium&amp;id=6932d3dff88dbe026cbce002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65082-cwe-150-improper-neutralization-of--e4ae2047</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65082%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6932bb45f88dbe026c9804e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-powers-record-ddos-attack-peaking-at-72c320b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20Botnet%20Powers%20Record%20DDoS%20Attack%20Peaking%20at%2029%20Tbps&amp;severity=medium&amp;id=6932b7b3f88dbe026c96858a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59775-cwe-918-server-side-request-forgery-bfa90704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59775%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932b486f88dbe026c950fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55753-cwe-190-integer-overflow-or-wraparo-f05daf4d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55753%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6932b486f88dbe026c950fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jpcert-confirms-active-command-injection-attacks-o-96e65e96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JPCERT%20Confirms%20Active%20Command%20Injection%20Attacks%20on%20Array%20AG%20Gateways&amp;severity=high&amp;id=6932b0b5f88dbe026c931d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cacti-command-injection-vulnerability-let-attacker-4238439c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cacti%20Command%20Injection%20Vulnerability%20Let%20Attackers%20Execute%20Malicious%20Code%20Remotely&amp;severity=high&amp;id=6932b0b5f88dbe026c931d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13682-cwe-79-improper-neutralization-of-i-b85ee274</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phegman%20Trail%20Manager&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13614-cwe-79-improper-neutralization-of-i-7f71da3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkube%20Cool%20Tag%20Cloud&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13678-cwe-79-improper-neutralization-of-i-2308cf35</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siamlottery%20Thai%20Lottery%20Widget&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12876-cwe-862-missing-authorization-in-pr-4e1b6675</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12876%3A%20CWE-862%20Missing%20Authorization%20in%20projectopia%20Projectopia%20%E2%80%93%20WordPress%20Project%20Management&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12879-cwe-352-cross-site-request-forgery--b91fd5c5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12879%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vinoth06%20User%20Generator%20and%20Importer&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13739-cwe-79-improper-neutralization-of-i-e35bcfcd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20d3395%20CryptX&amp;severity=medium&amp;id=6932a9b1f88dbe026c8e9fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12851-cwe-98-improper-control-of-filename-6253ed97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12851%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=6932a9b1f88dbe026c8e9fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-reports-prc-hackers-using-brickstorm-for-long-cab26aff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Reports%20PRC%20Hackers%20Using%20BRICKSTORM%20for%20Long-Term%20Access%20in%20U.S.%20Systems&amp;severity=medium&amp;id=6933b3cf2271496a0fa5db1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploiting-react2shell-vulnerabili-acb8d966</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploiting%20React2Shell%20Vulnerability&amp;severity=medium&amp;id=69328d83f88dbe026c81bed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12130-cwe-352-cross-site-request-forgery--7de8683f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12130%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wcvendors%20WC%20Vendors%20%E2%80%93%20WooCommerce%20Multivendor%2C%20WooCommerce%20Marketplace%2C%20Product%20Vendors&amp;severity=medium&amp;id=69328da7f88dbe026c81c65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13684-cwe-352-cross-site-request-forgery--0f41760d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexkar%20ARK%20Related%20Posts&amp;severity=medium&amp;id=69328da7f88dbe026c81c65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autoit3-compiled-scripts-dropping-shellcodes-fri-d-a9496d28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes%2C%20(Fri%2C%20Dec%205th)&amp;severity=medium&amp;id=6933b4eb2271496a0fa6c8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12850-cwe-89-improper-neutralization-of-s-a9c55820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12850%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=high&amp;id=69328306f88dbe026c7e31d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13515-cwe-79-improper-neutralization-of-i-2f20c4e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danrajkumar%20Nouri.sh%20Newsletter&amp;severity=medium&amp;id=69327c01f88dbe026c7c159f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12093-cwe-862-missing-authorization-in-vo-899ffa1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12093%3A%20CWE-862%20Missing%20Authorization%20in%20voidek%20Voidek%20Employee%20Portal&amp;severity=medium&amp;id=69327c01f88dbe026c7c1587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12355-cwe-862-missing-authorization-in-bi-e14b24b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12355%3A%20CWE-862%20Missing%20Authorization%20in%20bigmaster%20Payaza&amp;severity=medium&amp;id=69327c01f88dbe026c7c1593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12374-cwe-287-improper-authentication-in--8c3c4127</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12374%3A%20CWE-287%20Improper%20Authentication%20in%20pickplugins%20User%20Verification%20by%20PickPlugins&amp;severity=critical&amp;id=69327c01f88dbe026c7c159b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12354-cwe-862-missing-authorization-in-do-b4c1c152</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12354%3A%20CWE-862%20Missing%20Authorization%20in%20dojodigital%20Live%20CSS%20Preview&amp;severity=medium&amp;id=69327c01f88dbe026c7c158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12373-cwe-352-cross-site-request-forgery--e3abab3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12373%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20torod%20Torod%20%E2%80%93%20The%20smart%20shipping%20and%20delivery%20portal%20for%20e-shops%20and%20retailers&amp;severity=medium&amp;id=69327c01f88dbe026c7c1597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12186-cwe-79-improper-neutralization-of-i-886b5389</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michael_j_reid%20Weekly%20Planner&amp;severity=medium&amp;id=69327c01f88dbe026c7c158b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jpcert-confirms-active-command-injection-attacks-o-cb7c9a43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JPCERT%20Confirms%20Active%20Command%20Injection%20Attacks%20on%20Array%20AG%20Gateways&amp;severity=low&amp;id=6933b3cf2271496a0fa5db22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13528-cwe-862-missing-authorization-in-ne-fd1c163c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13528%3A%20CWE-862%20Missing%20Authorization%20in%20nedwp%20Feedback%20Modal%20for%20Website&amp;severity=medium&amp;id=69327173f88dbe026c7799bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13860-cwe-79-improper-neutralization-of-i-2d970f9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webradykal%20Easy%20Jump%20Links%20Menus&amp;severity=medium&amp;id=69327173f88dbe026c7799da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12154-cwe-434-unrestricted-upload-of-file-d5a5f06b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12154%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20moderntribe%20Auto%20Thumbnailer&amp;severity=high&amp;id=69327172f88dbe026c779911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12190-cwe-352-cross-site-request-forgery--ef6ea5d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12190%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20duddi%20Image%20Optimizer%20by%20wps.sk&amp;severity=medium&amp;id=69327172f88dbe026c779928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12191-cwe-79-improper-neutralization-of-i-c45b901e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ovologics%20PDF%20Catalog%20for%20WooCommerce&amp;severity=medium&amp;id=69327173f88dbe026c779992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12189-cwe-352-cross-site-request-forgery--c4477421</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12189%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20breadbutter%20Bread%20%26%20Butter%3A%20Gate%20content%20%26%20Improve%20lead%20conversion%20in%2060%20seconds&amp;severity=medium&amp;id=69327172f88dbe026c779922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12128-cwe-352-cross-site-request-forgery--b66ed757</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kaushikankrani%20Hide%20Categories%20Or%20Products%20On%20Shop%20Page&amp;severity=medium&amp;id=69327172f88dbe026c779905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12133-cwe-862-missing-authorization-in-pa-4e091bfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12133%3A%20CWE-862%20Missing%20Authorization%20in%20paulepro2019%20EPROLO%20Dropshipping&amp;severity=medium&amp;id=69327172f88dbe026c779909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12153-cwe-434-unrestricted-upload-of-file-57d99cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12153%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tsaiid%20Featured%20Image%20via%20URL&amp;severity=high&amp;id=69327172f88dbe026c77990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13623-cwe-79-improper-neutralization-of-i-76a162e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20natambu%20Twitscription&amp;severity=medium&amp;id=69327173f88dbe026c7799ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13622-cwe-79-improper-neutralization-of-i-c94fd007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20missi%20Jabbernotification&amp;severity=medium&amp;id=69327173f88dbe026c7799c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10055-cwe-352-cross-site-request-forgery--146338ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10055%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mrdenny%20Time%20Sheets&amp;severity=medium&amp;id=69327172f88dbe026c7798fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13625-cwe-79-improper-neutralization-of-i-eba63968</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13625%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20switch2mac%20WP-SOS-Donate%20Donation%20Sidebar%20Plugin&amp;severity=medium&amp;id=69327173f88dbe026c7799d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13360-cwe-352-cross-site-request-forgery--7dda349c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13360%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20monkeyboz%20Quantic%20Social%20Image%20Hover&amp;severity=medium&amp;id=69327173f88dbe026c7799af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12368-cwe-79-improper-neutralization-of-i-13ec37a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpforchurch%20Sermon%20Manager&amp;severity=medium&amp;id=69327173f88dbe026c779997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13621-cwe-352-cross-site-request-forgery--1e5390c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13621%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20teamdream%20dream%20gallery&amp;severity=medium&amp;id=69327173f88dbe026c7799c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12165-cwe-862-missing-authorization-in-hu-225d6602</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12165%3A%20CWE-862%20Missing%20Authorization%20in%20huyme%20Webcake%20%E2%80%93%20Landing%20Page%20Builder&amp;severity=medium&amp;id=69327172f88dbe026c77991e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12163-cwe-434-unrestricted-upload-of-file-968edd0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12163%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=69327172f88dbe026c779915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13512-cwe-79-improper-neutralization-of-i-981b6d36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jiangxin%20CoSign%20Single%20Signon&amp;severity=medium&amp;id=69327173f88dbe026c7799b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12124-cwe-79-improper-neutralization-of-i-658cdaa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12124%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevindees%20FitVids%20for%20WordPress&amp;severity=medium&amp;id=69327172f88dbe026c779901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13312-cwe-862-missing-authorization-in-dr-e751d33c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13312%3A%20CWE-862%20Missing%20Authorization%20in%20dripadmin%20CRM%20Memberships&amp;severity=medium&amp;id=69326360f88dbe026c71794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13006-cwe-200-exposure-of-sensitive-infor-cb23fe12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13006%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpeka-club%20SurveyFunnel%20%E2%80%93%20Survey%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69326360f88dbe026c717946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13313-cwe-862-missing-authorization-in-dr-61158105</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13313%3A%20CWE-862%20Missing%20Authorization%20in%20dripadmin%20CRM%20Memberships&amp;severity=critical&amp;id=69326360f88dbe026c717950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13362-cwe-352-cross-site-request-forgery--ae3731db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13362%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jevgenisultanov%20Norby%20AI&amp;severity=medium&amp;id=69326360f88dbe026c717958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13494-cwe-200-exposure-of-sensitive-infor-d7998fb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13494%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jimmyredline80%20SSP%20Debug&amp;severity=medium&amp;id=69326360f88dbe026c71795d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12417-cwe-79-improper-neutralization-of-i-d9f9a221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12417%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeka-club%20SurveyFunnel%20%E2%80%93%20Survey%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=69326360f88dbe026c717941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-with-sagemaker-and-theres-mor-22ea5223</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20escalation%20with%20SageMaker%20and%20there&apos;s%20more%20hiding%20in%20execution%20roles&amp;severity=medium&amp;id=69325fe5f88dbe026c6cfa4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13066-cwe-434-unrestricted-upload-of-file-299ff291</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13066%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=high&amp;id=693255a910edf2688fec311d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12804-cwe-79-improper-neutralization-of-i-5cfb9f06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6932441b10edf2688fd42d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11759-cwe-352-cross-site-request-forgery--69653492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11759%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20watchful%20Backup%2C%20Restore%20and%20Migrate%20your%20sites%20with%20XCloner&amp;severity=medium&amp;id=6932441b10edf2688fd42d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/predator-spyware-uses-new-infection-vector-for-zer-5b9e3101</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Predator%20spyware%20uses%20new%20infection%20vector%20for%20zero-click%20attacks&amp;severity=high&amp;id=6932280a10edf2688fa50fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62223-cwe-451-user-interface-ui-misrepres-4bfccf35</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62223%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69322b9410edf2688fa9d45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scam-telegram-uncovering-a-network-of-groups-sprea-5d74cf32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scam%20Telegram%3A%20Uncovering%20a%20network%20of%20groups%20spreading%20crypto%20drainers&amp;severity=medium&amp;id=6932250aca35b6b64b3de0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14052-improper-access-controls-in-youlait-d7f43c1b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14052%3A%20Improper%20Access%20Controls%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69322501ca35b6b64b3d997e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-05-19fb5a30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-05&amp;severity=medium&amp;id=69337586f88dbe026c314958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66644-cwe-78-improper-neutralization-of-s-b695b96a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66644%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Array%20Networks%20ArrayOS%20AG&amp;severity=high&amp;id=69332bc4f88dbe026c09c124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65879-na-9c30855d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65879%3A%20n%2Fa&amp;severity=high&amp;id=693308e8f88dbe026cf79163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65878-na-570405b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65878%3A%20n%2Fa&amp;severity=high&amp;id=693308e8f88dbe026cf79152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65897-na-be1f93c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65897%3A%20n%2Fa&amp;severity=high&amp;id=69330517f88dbe026cf63b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64052-na-d41f7f2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64052%3A%20n%2Fa&amp;severity=medium&amp;id=6932fe10f88dbe026cf26f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64054-na-c414aa7c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64054%3A%20n%2Fa&amp;severity=critical&amp;id=6932fe10f88dbe026cf26f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64053-na-7d072d57</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64053%3A%20n%2Fa&amp;severity=high&amp;id=6932fe10f88dbe026cf26f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65730-na-d39e0484</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65730%3A%20n%2Fa&amp;severity=high&amp;id=6932faa1f88dbe026cf03a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64056-na-40738bac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64056%3A%20n%2Fa&amp;severity=medium&amp;id=6932faa1f88dbe026cf03a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64057-na-55640d3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64057%3A%20n%2Fa&amp;severity=high&amp;id=6932f385f88dbe026cec3912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66270-cwe-290-authentication-bypass-by-sp-b75d63e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66270%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20KDE%20KDE%20Connect%20protocol&amp;severity=medium&amp;id=69327175f88dbe026c7799fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32900-cwe-348-use-of-less-trusted-source--9a75dd13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32900%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20KDE%20KDE%20Connect%20information-exchange%20protocol&amp;severity=medium&amp;id=69327175f88dbe026c7799f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32901-na-a07e35c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32901%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20KDE%20KDEConnect&amp;severity=medium&amp;id=69326a69f88dbe026c743adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32899-cwe-1250-improper-preservation-of-c-9341e416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32899%3A%20CWE-1250%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20KDE%20KDEConnect&amp;severity=medium&amp;id=693266fdf88dbe026c734aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32898-cwe-331-insufficient-entropy-in-kde-617ab461</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32898%3A%20CWE-331%20Insufficient%20Entropy%20in%20KDE%20KDE%20Connect%20verification-code%20protocol&amp;severity=medium&amp;id=69326360f88dbe026c717962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13373-cwe-89-improper-neutralization-of-s-a2ccfc80</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13373%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20iView&amp;severity=high&amp;id=69321472c0111c56163e71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66564-cwe-405-asymmetric-resource-consump-58f6633f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66564%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sigstore%20timestamp-authority&amp;severity=high&amp;id=69321040c0111c56163950c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66563-cwe-79-improper-neutralization-of-i-34304f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66563%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monkeytypegame%20monkeytype&amp;severity=high&amp;id=69320cc6c0111c561635040d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14051-improper-control-of-dynamically-ide-fe6d3923</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14051%3A%20Improper%20Control%20of%20Dynamically-Identified%20Variables%20in%20youlaitech%20youlai-mall&amp;severity=medium&amp;id=69320cc6c0111c5616350401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66561-cwe-79-improper-neutralization-of-i-892367d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syslifters%20sysreptor&amp;severity=high&amp;id=69320cc6c0111c561635040a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66559-cwe-129-improper-validation-of-arra-c9ff8982</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66559%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20taikoxyz%20taiko-mono&amp;severity=high&amp;id=69320cc6c0111c5616350411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-claims-data-theft-from-church-of--f7a427f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Claims%20Data%20Theft%20from%20Church%20of%20Scientology&amp;severity=medium&amp;id=6932099a2bd9ee5f78fe6188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1547-cwe-121-stack-based-buffer-overflow--d3aa260d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1547%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693209ac2bd9ee5f78fe683b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66506-cwe-405-asymmetric-resource-consump-1804d010</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66506%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20sigstore%20fulcio&amp;severity=high&amp;id=693209ac2bd9ee5f78fe683e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1910-cwe-77-improper-neutralization-of-sp-9cebf594</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1910%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WatchGuard%20Mobile%20VPN%20with%20SSL%20Client&amp;severity=medium&amp;id=693206ca2bd9ee5f78fbc0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12986-cwe-410-insufficient-resource-pool--14c293a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12986%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20silabs.com%20Gecko%20SDK&amp;severity=medium&amp;id=693206ca2bd9ee5f78fbc0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6946-cwe-79-improper-neutralization-of-in-7f651186</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1545-cwe-91-xml-injection-aka-blind-xpath-44b78644</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1545%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11838-cwe-763-release-of-invalid-pointer--927400d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11838%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6b9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13940-cwe-440-expected-behavior-violation-384f17b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13940%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13939-cwe-79-improper-neutralization-of-i-c7532d91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13938-cwe-79-improper-neutralization-of-i-5a4c1d51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13937-cwe-79-improper-neutralization-of-i-5dc448e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13936-cwe-79-improper-neutralization-of-i-ee08a34b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=693202962bd9ee5f78f6ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12196-cwe-787-out-of-bounds-write-in-watc-920de881</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12196%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202972bd9ee5f78f6ba26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53704-cwe-640-in-maxhub-pivot-client-appl-76df85fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53704%3A%20CWE-640%20in%20MAXHUB%20Pivot%20client%20application&amp;severity=high&amp;id=693202972bd9ee5f78f6ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12195-cwe-787-out-of-bounds-write-in-watc-9bcbbe25</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12195%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12026-cwe-787-out-of-bounds-write-in-watc-fcb543e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12026%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=693202962bd9ee5f78f6ba16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10285-cwe-200-exposure-of-sensitive-infor-0a366a3a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10285%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20silabs.com%20Simplicity%20Studio%20V6&amp;severity=high&amp;id=693206ca2bd9ee5f78fbc0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13932-cwe-639-authorization-bypass-throug-aa31b8e6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13932%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SolisCloud%20Monitoring%20Platform%20(Cloud%20API%20%26%20Device%20Control%20API)&amp;severity=high&amp;id=6931fbea0459f550ec00bb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66238-cwe-288-authentication-bypass-using-f951a49f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66238%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Sunbird%20DCIM%20dcTrack&amp;severity=high&amp;id=6931fbea0459f550ec00bb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66237-cwe-798-use-of-hard-coded-credentia-00b7a013</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66237%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sunbird%20DCIM%20dcTrack&amp;severity=high&amp;id=6931f91e0459f550ecfdf6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66479-cwe-693-protection-mechanism-failur-d411fa32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66479%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20anthropic-experimental%20sandbox-runtime&amp;severity=low&amp;id=6931f91e0459f550ecfdf6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66576-cwe-78-improper-neutralization-of-s-60d48901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66576%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Remotecontrolio%20Remote%20Keyboard%20Desktop&amp;severity=high&amp;id=6931f4df0459f550ecf89e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66575-cwe-428-unquoted-search-path-or-ele-0c73d453</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66575%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20VeePN%20VeeVPN&amp;severity=high&amp;id=6931f4df0459f550ecf89e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66574-cwe-79-improper-neutralization-of-i-e3d906be</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66574%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Compass%20Plustechologies%20TranzAxis&amp;severity=medium&amp;id=6931f4df0459f550ecf89e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66573-cwe-319-cleartext-transmission-of-s-e57ea8a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66573%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20mersive%20Solstice%20Pod%20API%20Session%20Key%20Extraction%20via%20API%20Endpoint&amp;severity=medium&amp;id=6931f4e10459f550ecf89e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66572-cwe-78-improper-neutralization-of-s-4e4cc644</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66572%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20loadedcommerce%20Loaded%20Commerce&amp;severity=medium&amp;id=6931f4e10459f550ecf89e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66571-cwe-502-deserialization-of-untruste-c276a0d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66571%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20UNA%20CMS&amp;severity=critical&amp;id=6931f4e10459f550ecf89e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66555-cwe-306-missing-authentication-for--4e34efa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66555%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20airkeyboardapp%20AirKeyboard%20iOS%20App&amp;severity=high&amp;id=6931f4e10459f550ecf89e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58278-cwe-78-improper-neutralization-of-s-1f5c991d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58278%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IndigoSTAR%20Software%20perl2exe&amp;severity=high&amp;id=6931f4df0459f550ecf89e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58277-cwe-312-cleartext-storage-of-sensit-b570aa70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58277%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20R%20Radio%20Network%20Radio%20Network%20FM%20Transmitter&amp;severity=high&amp;id=6931f4df0459f550ecf89e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58275-cwe-88-improper-neutralization-of-a-f7a91610</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58275%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20jpylypiw%20Easywall&amp;severity=high&amp;id=6931f4df0459f550ecf89e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53734-cwe-89-improper-neutralization-of-s-7c3938e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53734%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mayurik%20dawa-pharma&amp;severity=high&amp;id=6931f4df0459f550ecf89e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27935-cwe-306-missing-authentication-for--f577cd8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27935%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Ping%20Identity%20One-Time%20Passcode%20Integration%20Kit%20for%20PingFederate&amp;severity=high&amp;id=6931f4df0459f550ecf89e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13543-cwe-434-unrestricted-upload-of-file-8332a041</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13543%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rtowebsites%20PostGallery&amp;severity=high&amp;id=6931f1640459f550ecf415b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12997-cwe-639-authorization-bypass-throug-cdb1f64b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Medtronic%20CareLink%20Network&amp;severity=low&amp;id=6931eb9b6255310dc4c890ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12996-cwe-532-insertion-of-sensitive-info-c219bffc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12996%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Medtronic%20CareLink%20Network&amp;severity=medium&amp;id=6931eb9b6255310dc4c890aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12995-cwe-307-improper-restriction-of-exc-f9390566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12995%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Medtronic%20CareLink%20Network&amp;severity=high&amp;id=6931eb9b6255310dc4c890a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-state-hackers-device-infected-with-lu-a5340a31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20State%20Hacker&apos;s%20Device%20Infected%20with%20LummaC2%20Infostealer%20Shows%20Links%20to%20%241.4B%20ByBit%20Breach%2C%20Tools%2C%20Specs%20and%20More&amp;severity=high&amp;id=6931eb876255310dc4c888db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12994-cwe-204-observable-response-discrep-9aba6b96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12994%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Medtronic%20CareLink%20Network&amp;severity=medium&amp;id=6931eb9b6255310dc4c890a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-inside-github-actions-01092a5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20Injection%20Inside%20GitHub%20Actions&amp;severity=medium&amp;id=6931dffae9ea82452668a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55182-vulnerability-in-react-and-nextjs-k-612a8fd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55182%20vulnerability%20in%20React%20and%20Next.js%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6931dd90e9ea82452666b3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-rolls-back-order-to-preinstall-cybersecurity-b168cdbc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Rolls%20Back%20Order%20to%20Preinstall%20Cybersecurity%20App%20on%20Smartphones&amp;severity=medium&amp;id=6931dd27e9ea824526660c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12097-cwe-23-relative-path-traversal-in-n-de70215d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12097%3A%20CWE-23-%20Relative%20Path%20Traversal%20in%20NI%20LabVIEW&amp;severity=high&amp;id=6931dff2e9ea82452668a407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65945-cwe-347-improper-verification-of-cr-7797bebd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65945%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20auth0%20node-jws&amp;severity=high&amp;id=6931d8e6e9ea82452660f546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14016-improper-authorization-in-macrozhen-7a5443ac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14016%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6931d8e6e9ea82452660f53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14015-buffer-overflow-in-h3c-magic-b0-6f43cdeb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14015%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B0&amp;severity=high&amp;id=6931d8e6e9ea82452660f535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13488-cwe-79-improper-neutralization-of-i-d2dab45d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sonatype%20Nexus%20Repository&amp;severity=medium&amp;id=6931d56de9ea8245265c6741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14013-cross-site-scripting-in-jizhicms-824721d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14013%3A%20Cross%20Site%20Scripting%20in%20JIZHICMS&amp;severity=medium&amp;id=6931d6d1e9ea8245265fa5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9127-cwe-116-improper-encoding-or-escapin-13b5596b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9127%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Pure%20Storage%20PX%20Enterprise&amp;severity=high&amp;id=6931cf8f911f2f20c4b83bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-order-prompt-injection-attacks-on-serviceno-c993cd29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20order%20prompt%20injection%20attacks%20on%20ServiceNow%20Now%20Assist&amp;severity=medium&amp;id=6931cb4f911f2f20c4b34d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contractors-with-hacking-records-accused-of-wiping-bdff6e3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contractors%20with%20hacking%20records%20accused%20of%20wiping%2096%20govt%20databases&amp;severity=high&amp;id=6931cb30911f2f20c4b341af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14012-sql-injection-in-jizhicms-233ea526</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14012%3A%20SQL%20Injection%20in%20JIZHICMS&amp;severity=medium&amp;id=6931c7b5911f2f20c4ae9818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14011-sql-injection-in-jizhicms-404bfb1f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14011%3A%20SQL%20Injection%20in%20JIZHICMS&amp;severity=medium&amp;id=6931c7b5911f2f20c4ae9811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-uses-fake-microsoft-teams-installer-to--b14de7ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Uses%20Fake%20Microsoft%20Teams%20Installer%20to%20Spread%20ValleyRAT%20Malware%20in%20China&amp;severity=medium&amp;id=6931cf03911f2f20c4b70883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66287-buffer-copy-without-checking-size-o-ad825aa7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66287%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20The%20WebKitGTK%20Team%20WebKitGTK&amp;severity=high&amp;id=6931bd5b6ade94f1c7900e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blocks-aisuru-botnet-powered-largest-ev-bc6f6a69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blocks%20Aisuru%20Botnet%20Powered%20Largest%20Ever%2029.7%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=6931b6c3739651d5d52f702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66516-cwe-611-improper-restriction-of-xml-fa601313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66516%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Tika%20core&amp;severity=high&amp;id=6931b6d8739651d5d52faf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8074-origin-validation-error-in-synology--c113a79c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8074%3A%20Origin%20Validation%20Error%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=medium&amp;id=6931a8e704d931fa5b427e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54160-improper-limitation-of-a-pathname-t-82534a15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54160%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-clickjacking-a-novel-and-powerful-twist-on-an--b121f58a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Clickjacking%3A%20A%20novel%20and%20powerful%20twist%20on%20an%20old%20classic&amp;severity=medium&amp;id=6931a58e04d931fa5b3e2722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54159-missing-authorization-in-synology-b-355a1b0c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54159%3A%20Missing%20Authorization%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54158-missing-authentication-for-critical-ad30c5f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54158%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synology%20BeeDrive%20for%20desktop&amp;severity=high&amp;id=6931a8e704d931fa5b427e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2848-missing-authorization-in-synology-sy-c316b554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2848%3A%20Missing%20Authorization%20in%20Synology%20Synology%20Mail%20Server&amp;severity=medium&amp;id=6931a58504d931fa5b3e25d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inotiv-says-personal-information-stolen-in-ransomw-a96dc2b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inotiv%20Says%20Personal%20Information%20Stolen%20in%20Ransomware%20Attack&amp;severity=medium&amp;id=6931a56404d931fa5b3df6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14008-server-side-request-forgery-in-dayr-50f3b6b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14008%3A%20Server-Side%20Request%20Forgery%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=6931a58504d931fa5b3e25c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29846-improper-limitation-of-a-pathname-t-4ea0b4cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29846%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=high&amp;id=6931a58504d931fa5b3e25ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29845-improper-limitation-of-a-pathname-t-98d02142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29845%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29844-improper-limitation-of-a-pathname-t-e6579483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29844%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29843-improper-limitation-of-a-pathname-t-015a41e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29843%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Synology%20Router%20Manager%20(SRM)&amp;severity=medium&amp;id=6931a58504d931fa5b3e25dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14007-cross-site-scripting-in-dayrui-xunr-d0f78d5c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14007%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=low&amp;id=69319e6104d931fa5b36215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14006-cross-site-scripting-in-dayrui-xunr-6b756ac1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14006%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=69319e6104d931fa5b36214c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5401-improper-control-of-dynamically-mana-78e4ecce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5401%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=69319adf5cc187f88da3627b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45539-out-of-bounds-write-in-synology-dis-c3a17529</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45539%3A%20Out-of-bounds%20Write%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=high&amp;id=69319adf5cc187f88da36278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45538-cross-site-request-forgery-csrf-in--0fd197e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=critical&amp;id=69319adf5cc187f88da36275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reporters-without-borders-targeted-by-russian-hack-c491730c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reporters%20Without%20Borders%20Targeted%20by%20Russian%20Hackers&amp;severity=medium&amp;id=693197f05cc187f88da02929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14005-cross-site-scripting-in-dayrui-xunr-4ce13c38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14005%3A%20Cross%20Site%20Scripting%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=693190595cc187f88d96ed39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14004-server-side-request-forgery-in-dayr-6224eecc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14004%3A%20Server-Side%20Request%20Forgery%20in%20dayrui%20XunRuiCMS&amp;severity=medium&amp;id=693190595cc187f88d96ed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webxr-flaw-hits-4-billion-chromium-users-update-yo-bbd19cbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebXR%20Flaw%20Hits%204%20Billion%20Chromium%20Users%2C%20Update%20Your%20Browser%20Now&amp;severity=medium&amp;id=69318d4ba63052f0b8f415a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-cyber-agencies-issue-ai-security-guidance-f-c90bd730</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Cyber%20Agencies%20Issue%20AI%20Security%20Guidance%20for%20Critical%20Infrastructure%20OT&amp;severity=critical&amp;id=69318d2ca63052f0b8f3da9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-sold-albiriox-android-malware-targets-banks--3361558e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Sold%20Albiriox%20Android%20Malware%20Targets%20Banks%20and%20Crypto%20Holders&amp;severity=medium&amp;id=6931862ea63052f0b8ebf220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11222-na-in-line-corporation-central-dogm-d33e4199</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11222%3A%20na%20in%20LINE%20Corporation%20Central%20Dogma&amp;severity=medium&amp;id=69317f86e2bf61707fe31262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/personal-information-compromised-in-freedom-mobile-793d79b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Personal%20Information%20Compromised%20in%20Freedom%20Mobile%20Data%20Breach&amp;severity=medium&amp;id=69317870e2bf61707fdabe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-wi-fi-hack-npm-worm-defi-theft-48af21c2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Wi-Fi%20Hack%2C%20npm%20Worm%2C%20DeFi%20Theft%2C%20Phishing%20Blasts%E2%80%94%20and%2015%20More%20Stories&amp;severity=critical&amp;id=693189bea63052f0b8ef5911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-threats-that-reshaped-web-security-this-year-202-48692fa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Threats%20That%20Reshaped%20Web%20Security%20This%20Year%20%5B2025%5D&amp;severity=medium&amp;id=69317c20e2bf61707fde762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-impacts-over-780000-people-da17734a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20Data%20Breach%20Impacts%20Over%20780%2C000%20People&amp;severity=medium&amp;id=69316ef003f8574ee0f5a787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/protecting-llm-chats-from-the-eavesdropping-whispe-df64ff5c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Protecting%20LLM%20chats%20from%20the%20eavesdropping%20Whisper%20Leak%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=6931677103f8574ee0ebfa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vscode-extension-launches-multi-stage-at-5a020cbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSCode%20Extension%20Launches%20Multi-Stage%20Attack%20Chain%20with%20Anivia%20Loader%20and%20OctoRAT&amp;severity=medium&amp;id=69316adc03f8574ee0f04a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marquis-data-breach-impacts-over-74-us-banks-credi-b690f9f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marquis%20data%20breach%20impacts%20over%2074%20US%20banks%2C%20credit%20unions&amp;severity=high&amp;id=693160f8475c06cd943e1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kohlers-encrypted-smart-toilet-camera-is-not-actua-1483ebf2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kohler&apos;s%20Encrypted%20Smart%20Toilet%20Camera%20is%20not%20Actually%20end-to-end%20Encrypted&amp;severity=high&amp;id=693160f8475c06cd943e1bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goldfactory-hits-southeast-asia-with-modified-bank-c713d794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoldFactory%20Hits%20Southeast%20Asia%20with%20Modified%20Banking%20Apps%20Driving%2011%2C000%2B%20Infections&amp;severity=high&amp;id=693160f8475c06cd943e1bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/react2shell-in-the-wild-exploitation-expected-for--b4d27fa6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=React2Shell%3A%20In-the-Wild%20Exploitation%20Expected%20for%20Critical%20React%20Vulnerability&amp;severity=critical&amp;id=693160ab475c06cd943d3d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14010-vulnerability-in-red-hat-red-hat-ce-29da00cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14010%3A%20Vulnerability%20in%20ansible-collections%20Ansible%20Community%20General%20Collection&amp;severity=medium&amp;id=69315a47475c06cd943687bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goldfactory-hits-southeast-asia-with-modified-bank-02d60138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoldFactory%20Hits%20Southeast%20Asia%20with%20Modified%20Banking%20Apps%20Driving%2011%2C000%2B%20Infections&amp;severity=medium&amp;id=693156a8744de630efd7f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-corporate-web-26104f3c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Corporate%20Web&amp;severity=medium&amp;id=69316f2803f8574ee0f61229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/record-297-tbps-ddos-attack-linked-to-aisuru-botne-78e9ca71</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Record%2029.7%20Tbps%20DDoS%20Attack%20Linked%20to%20AISURU%20Botnet%20with%20up%20to%204%20Million%20Infected%20Hosts&amp;severity=medium&amp;id=693138a3a5c331a7096817c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12826-cwe-862-missing-authorization-in-we-0d0be3e1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12826%3A%20CWE-862%20Missing%20Authorization%20in%20webdevstudios%20Custom%20Post%20Type%20UI&amp;severity=medium&amp;id=69313190a5c331a7095e7764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12782-cwe-862-missing-authorization-in-be-5f0ae18e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12782%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=69313190a5c331a7095e7760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13513-cwe-79-improper-neutralization-of-i-7de1723e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codejunkie%20Clik%20stats&amp;severity=medium&amp;id=69312035c33ce07f96ee3309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11727-cwe-79-improper-neutralization-of-i-5973f017</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codisto%20Omnichannel%20for%20WooCommerce%3A%20Google%2C%20Amazon%2C%20eBay%20%26%20Walmart%20Integration%20%E2%80%93%20Powered%20by%20Codisto&amp;severity=high&amp;id=693111e8654141e59c21c0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11379-cwe-200-exposure-of-sensitive-infor-39e3c0ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11379%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20roselldk%20WebP%20Express&amp;severity=medium&amp;id=693111e8654141e59c21c0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-reverse-engineered-a-billion-dollar-legal-ai-cad2ef16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Reverse%20Engineered%20a%20Billion-Dollar%20Legal%20AI%20Tool%20and%20Found%20100k%2B%20Confidential%20Files&amp;severity=medium&amp;id=69310764654141e59c0584b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-attack-or-compromised-governmentx3f-x-807f38b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Attack%20or%20Compromised%20Government%26%23x3f%3B%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Thu%2C%20Dec%204th)&amp;severity=medium&amp;id=6930f0a7899a68ecde2f4009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-04-1cd4a56e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-04&amp;severity=medium&amp;id=693224eeca35b6b64b3d6b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65900-na-4c728d8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65900%3A%20n%2Fa&amp;severity=medium&amp;id=6931fbea0459f550ec00bb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65899-na-bad1d1a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65899%3A%20n%2Fa&amp;severity=medium&amp;id=6931fbea0459f550ec00bb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63896-na-99a39207</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63896%3A%20n%2Fa&amp;severity=high&amp;id=6931f4df0459f550ecf89e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55948-na-fedd745d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55948%3A%20n%2Fa&amp;severity=high&amp;id=6931f4df0459f550ecf89e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63499-na-18bfdaf3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63499%3A%20n%2Fa&amp;severity=medium&amp;id=6931e72c6255310dc4c3572f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29269-na-16ef8899</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29269%3A%20n%2Fa&amp;severity=critical&amp;id=6931e372e9ea8245266ca5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29268-na-94efe30c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29268%3A%20n%2Fa&amp;severity=critical&amp;id=6931e372e9ea8245266ca5ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65883-na-e0c8b88e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65883%3A%20n%2Fa&amp;severity=high&amp;id=6931e372e9ea8245266ca5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65806-na-829274a3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65806%3A%20n%2Fa&amp;severity=medium&amp;id=6931dff2e9ea82452668a427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59788-na-4fd54974</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59788%3A%20n%2Fa&amp;severity=high&amp;id=6931d8e6e9ea82452660f541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63362-na-15a72bb4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63362%3A%20n%2Fa&amp;severity=critical&amp;id=6931d6d1e9ea8245265fa5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63361-na-72a87078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63361%3A%20n%2Fa&amp;severity=medium&amp;id=6931d6d1e9ea8245265fa5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65637-na-c50d04ee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65637%3A%20n%2Fa&amp;severity=high&amp;id=6931d56de9ea8245265c6745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63363-na-d6577472</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63363%3A%20n%2Fa&amp;severity=high&amp;id=6931cb48911f2f20c4b34cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66373-na-409527d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66373%3A%20n%2Fa&amp;severity=medium&amp;id=6931bd5b6ade94f1c7900e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63364-na-dc02eac0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63364%3A%20n%2Fa&amp;severity=high&amp;id=6931bd5b6ade94f1c7900e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65516-na-0bd91c4c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65516%3A%20n%2Fa&amp;severity=medium&amp;id=6931b411739651d5d52cf9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61148-na-0a686bdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61148%3A%20n%2Fa&amp;severity=medium&amp;id=6931afbe739651d5d527e7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57213-na-2afcd05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57213%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57212-na-efe85f5a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57212%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57210-na-bc7ede44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57210%3A%20n%2Fa&amp;severity=high&amp;id=6931ac46739651d5d523c1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63681-na-134feafc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63681%3A%20n%2Fa&amp;severity=medium&amp;id=6931a8e704d931fa5b427e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56427-na-6de141a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56427%3A%20n%2Fa&amp;severity=high&amp;id=6931a8e704d931fa5b427e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54306-na-0a159f36</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54306%3A%20n%2Fa&amp;severity=high&amp;id=6931a58604d931fa5b3e2611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54305-na-45043029</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54305%3A%20n%2Fa&amp;severity=high&amp;id=6931a58604d931fa5b3e260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54304-na-dc4117e5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54304%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58604d931fa5b3e2607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54303-na-52a0db41</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54303%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53963-na-97d350e6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53963%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65346-na-16d9c416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65346%3A%20n%2Fa&amp;severity=critical&amp;id=6931a58504d931fa5b3e25d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54307-na-e6ebcca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54307%3A%20n%2Fa&amp;severity=high&amp;id=6931a58504d931fa5b3e25d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freedom-mobile-discloses-data-breach-exposing-cust-55c3e46d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Freedom%20Mobile%20discloses%20data%20breach%20exposing%20customer%20data&amp;severity=high&amp;id=6930ce18cd38a5251eb53e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-diy-retail-giant-leroy-merlin-discloses-a-d-7c36c903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20DIY%20retail%20giant%20Leroy%20Merlin%20discloses%20a%20data%20breach&amp;severity=high&amp;id=6930ce18cd38a5251eb53e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62173-cwe-89-improper-neutralization-of-s-d682e58e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62173%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20restapps&amp;severity=high&amp;id=6930c7c5cd38a5251eae5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66404-cwe-77-improper-neutralization-of-s-3a2d92df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66404%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=medium&amp;id=6930a178e580ff243da31211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66293-cwe-125-out-of-bounds-read-in-pnggr-15674502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66293%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6930a178e580ff243da3120b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/43-million-browsers-infected-inside-shadypandas-7--0f872fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4.3%20Million%20Browsers%20Infected%3A%20Inside%20ShadyPanda&apos;s%207-Year%20Malware%20Campaign&amp;severity=medium&amp;id=69316f2803f8574ee0f6121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/albiriox-exposed-a-new-rat-mobile-malware-targetin-749c2dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Albiriox%20Exposed%3A%20A%20New%20RAT%20Mobile%20Malware%20Targeting%20Global%20Finance%20and%20Crypto%20Wallets&amp;severity=medium&amp;id=69316f2803f8574ee0f61206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-lets-criminals-control-your-ph-8277a9f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20malware%20lets%20criminals%20control%20your%20phone%20and%20drain%20your%20bank%20account&amp;severity=medium&amp;id=69319e6204d931fa5b362195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/build-script-exposes-pypi-to-domain-takeover-attac-2890f8be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bootstrap%20script%20exposes%20PyPI%20to%20domain%20takeover%20attacks&amp;severity=medium&amp;id=69256fb97e8c0fda07b5dbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-king-addons-flaw-under-active-attack-let-42f01a83</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20King%20Addons%20Flaw%20Under%20Active%20Attack%20Lets%20Hackers%20Make%20Admin%20Accounts&amp;severity=high&amp;id=693096ae728fb3f62eb63b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-blocks-roblox-over-distribution-of-lgbt-pro-7c3b8041</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20blocks%20Roblox%20over%20distribution%20of%20LGBT%20%22propaganda%22&amp;severity=high&amp;id=693096ae728fb3f62eb63b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-patches-windows-lnk-flaw-after--c3b97aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Patches%20Windows%20LNK%20Flaw%20After%20Years%20of%20Active%20Exploitation&amp;severity=high&amp;id=693096ae728fb3f62eb63b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rsc-bugs-in-react-and-nextjs-allow-unauth-3bcb230e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RSC%20Bugs%20in%20React%20and%20Next.js%20Allow%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=693096ae728fb3f62eb63b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66489-cwe-303-incorrect-implementation-of-10655bf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66489%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20calcom%20cal.com&amp;severity=critical&amp;id=693096f5728fb3f62eb70505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65097-cwe-284-improper-access-control-in--7bc73d15</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65097%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20rommapp%20romm&amp;severity=high&amp;id=693096f5728fb3f62eb70502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65096-cwe-284-improper-access-control-in--ca4c2490</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65096%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20rommapp%20romm&amp;severity=medium&amp;id=693096f5728fb3f62eb704ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12385-cwe-770-allocation-of-resources-wit-3651cb1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12385%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=6930935d728fb3f62eb0af7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61727-cwe-295-improper-certificate-valida-3e76eb3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61727%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=medium&amp;id=6930935d728fb3f62eb0af83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65027-cwe-79-improper-neutralization-of-i-5b6b216f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65027%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rommapp%20romm&amp;severity=high&amp;id=6930935d728fb3f62eb0af89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66453-cwe-400-uncontrolled-resource-consu-5df87036</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66453%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20mozilla%20rhino&amp;severity=medium&amp;id=693096f5728fb3f62eb70508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attempts-to-bypass-cdns-wed-dec-3rd-4d50d6cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attempts%20to%20Bypass%20CDNs%2C%20(Wed%2C%20Dec%203rd)&amp;severity=medium&amp;id=6930934a728fb3f62eb089e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66406-cwe-863-incorrect-authorization-in--bb8ea01e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66406%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20smallstep%20certificates&amp;severity=medium&amp;id=69308fb4728fb3f62ea9b175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13992-side-channel-information-leakage-in-32bb09d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13992%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=69308c0f7d648701e00af4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-clickhouse-for-real-time-l7-ddos-bot-traffic-148695cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20ClickHouse%20for%20Real-Time%20L7%20DDoS%20%26%20Bot%20Traffic%20Analytics%20with%20Tempesta%20FW&amp;severity=high&amp;id=69308c147d648701e00af5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12819-untrusted-search-path-in-pgbouncer-04ecd573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12819%3A%20Untrusted%20Search%20Path%20in%20PgBouncer&amp;severity=high&amp;id=69308c0f7d648701e00af4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12084-vulnerability-in-python-software-fo-8434a7e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12084%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=693088877d648701e003bbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/68-of-phishing-websites-are-protected-by-cloudflar-0c03102a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=68%25%20Of%20Phishing%20Websites%20Are%20Protected%20by%20CloudFlare&amp;severity=medium&amp;id=6930888d7d648701e00402d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3884-improper-input-validation-in-red-hat-c30c3e30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3884%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%207.1%20EUS%20for%20RHEL%207&amp;severity=high&amp;id=693088877d648701e003bbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66222-cwe-94-improper-control-of-generati-ddf80d66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66222%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=693088877d648701e003bbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66220-cwe-170-improper-null-termination-i-b431f4cb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66220%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=693088877d648701e003bbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66208-cwe-78-improper-neutralization-of-s-44b853d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66208%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CollaboraOnline%20online&amp;severity=high&amp;id=693081947d648701e0f8358f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33208-cwe-427-uncontrolled-search-path-el-1d33caee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33208%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20TAO&amp;severity=high&amp;id=693081947d648701e0f83582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rsc-bugs-in-react-and-nextjs-allow-unauth-4e911b0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RSC%20Bugs%20in%20React%20and%20Next.js%20Allow%20Unauthenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=693089977d648701e00701bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66032-cwe-77-improper-neutralization-of-s-4aa2eec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66032%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=693081947d648701e0f8358c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33211-cwe-1284-improper-validation-of-spe-d6579ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33211%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=693081947d648701e0f83587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33201-cwe-754-improper-check-for-unusual--34aa7337</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33201%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=693081947d648701e0f8357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64763-cwe-693-protection-mechanism-failur-7a66d914</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64763%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20envoyproxy%20envoy&amp;severity=low&amp;id=693081947d648701e0f83595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64527-cwe-476-null-pointer-dereference-in-659d438a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64527%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=693081947d648701e0f83592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-uncovers-infrastructure-used-in-sso-attacks-09f47a6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%20Uncovers%20Infrastructure%20Used%20in%20SSO%20Attacks&amp;severity=medium&amp;id=69307b18b129615efa19324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discover-the-ai-tools-fueling-the-next-cybercrime--d9e05e7e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discover%20the%20AI%20Tools%20Fueling%20the%20Next%20Cybercrime%20Wave%20%E2%80%94%20Watch%20the%20Webinar&amp;severity=low&amp;id=6930324c720cedca79479e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-patches-windows-lnk-flaw-after--32cf48e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Patches%20Windows%20LNK%20Flaw%20After%20Years%20of%20Active%20Exploitation&amp;severity=medium&amp;id=69307a4cb129615efa16ecf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64443-cwe-749-exposed-dangerous-method-or-67ded4cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64443%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20docker%20mcp-gateway&amp;severity=high&amp;id=69307b19b129615efa193349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-atlas-browser-used-in-clickfix-attack-a77a8755</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20Atlas%20Browser%20Used%20in%20ClickFix%20Attack%20to%20Steal%20Passwords&amp;severity=medium&amp;id=693076d4b129615efa105af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-king-addons-flaw-under-active-attack-let-7dd87bc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20King%20Addons%20Flaw%20Under%20Active%20Attack%20Lets%20Hackers%20Make%20Admin%20Accounts&amp;severity=critical&amp;id=69307ac6b129615efa180f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-dive-into-dragonforce-ransomware-and-its-scat-6bb1bae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20dive%20into%20DragonForce%20ransomware%20and%20its%20Scattered%20Spider%20connection&amp;severity=high&amp;id=69306f9387f844e860798c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54065-cwe-913-improper-control-of-dynamic-0af04d93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54065%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20ZDoom%20gzdoom&amp;severity=high&amp;id=69306fa787f844e8607995d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20388-the-web-server-receives-a-url-or-si-c31f0719</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20388%3A%20The%20web%20server%20receives%20a%20URL%20or%20similar%20request%20from%20an%20upstream%20component%20and%20retrieves%20the%20contents%20of%20this%20URL%2C%20but%20it%20does%20not%20sufficiently%20ensure%20that%20the%20request%20is%20being%20sent%20to%20the%20expected%20destination.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20389-the-product-does-not-validate-or-in-395c6662</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20389%3A%20The%20product%20does%20not%20validate%20or%20incorrectly%20validates%20input%20that%20can%20affect%20the%20control%20flow%20or%20data%20flow%20of%20a%20program.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20387-the-product-specifies-permissions-f-fc097e52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20387%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69306fa787f844e8607995ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20383-the-product-exposes-sensitive-infor-3e262b85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20383%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20384-the-software-does-not-neutralize-or-4d803748</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20384%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20output%20that%20is%20written%20to%20logs.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=69306fa787f844e8607995e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20386-the-product-specifies-permissions-f-7022fb3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20386%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69306fa787f844e8607995eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20385-the-software-does-not-neutralize-or-41b2ffe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20385%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20381-the-software-performs-an-authorizat-864f96c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20381%3A%20The%20software%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Splunk%20Splunk%20MCP%20Server&amp;severity=medium&amp;id=69306fa787f844e8607995dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20382-a-web-application-accepts-a-user-co-fc7491e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20382%3A%20A%20web%20application%20accepts%20a%20user-controlled%20input%20that%20specifies%20a%20link%20to%20an%20external%20site%2C%20and%20uses%20that%20link%20in%20a%20Redirect.%20This%20simplifies%20phishing%20attacks.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=69306fa787f844e8607995df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34319-cwe-78-improper-neutralization-of-s-9672dc71</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34319%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20N300RT&amp;severity=critical&amp;id=69306fa987f844e860799605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13492-cwe-363-race-condition-enabling-lin-e2f4b223</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13492%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20HP%20Inc%20HP%20Image%20Assistant&amp;severity=medium&amp;id=69306cb887f844e860730073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-security-vulnerability-in-react-server-co-5b266d01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Security%20Vulnerability%20in%20React%20Server%20Components%20%E2%80%93%20React&amp;severity=critical&amp;id=6930642dca1782a906c02ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7044-cwe-269-improper-privilege-managemen-83b8e25f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7044%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Ubuntu%20MAAS&amp;severity=high&amp;id=69305d3dca1782a906b23327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55182-deserialization-of-untrusted-data-c-103df002</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55182%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Meta%20react-server-dom-webpack&amp;severity=critical&amp;id=69305d3dca1782a906b2331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazil-hit-by-banking-trojan-spread-via-whatsapp-w-0ea2e022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazil%20Hit%20by%20Banking%20Trojan%20Spread%20via%20WhatsApp%20Worm%20and%20RelayNFC%20NFC%20Relay%20Fraud&amp;severity=high&amp;id=69306c7187f844e86071d6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13949-unrestricted-upload-in-proudmubai-g-89572ba0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13949%3A%20Unrestricted%20Upload%20in%20ProudMuBai%20GoFilm&amp;severity=medium&amp;id=69304b991f9e797ee289a5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13948-use-of-hard-coded-cryptographic-key-1935dcd0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13948%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20opsre%20go-ldap-admin&amp;severity=medium&amp;id=69304b991f9e797ee289a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spotted-lazaruss-remote-it-workers-in--136485a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20spotted%20Lazarus%E2%80%99s%20remote%20IT%20workers%20in%20action&amp;severity=medium&amp;id=69304b691f9e797ee28988f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-phoenix-discloses-data-breach-after--6b4a089a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Phoenix%20discloses%20data%20breach%20after%20Oracle%20hack&amp;severity=high&amp;id=69304b691f9e797ee28988ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dupehike-targeting-russian-employees-wit-4fe48642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DupeHike%3A%20Targeting%20Russian%20employees%20with%20DUPERUNNER%20and%20AdaptixC2&amp;severity=medium&amp;id=693076e4b129615efa107004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-behind-new-record-breaking-297-tbps--5b06cbe3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20botnet%20behind%20new%20record-breaking%2029.7%20Tbps%20DDoS%20attack&amp;severity=high&amp;id=69304b691f9e797ee28988e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-zero-to-system-building-printspoofer-from-scr-448e4637</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Zero%20to%20SYSTEM%3A%20Building%20PrintSpoofer%20from%20Scratch&amp;severity=medium&amp;id=693047c951392e1c8b1ec81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13359-cwe-89-improper-neutralization-of-s-158518fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13359%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6930444551392e1c8b19b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13756-cwe-862-missing-authorization-in-te-9095e370</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13756%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Fluent%20Booking%20%E2%80%93%20The%20Ultimate%20Appointments%20Scheduling%2C%20Events%20Booking%2C%20Events%20Calendar%20Solution&amp;severity=medium&amp;id=6930444551392e1c8b19b547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13401-cwe-79-improper-neutralization-of-i-a1a02eb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimizingmatters%20Autoptimize&amp;severity=medium&amp;id=6930444551392e1c8b19b543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13390-cwe-303-incorrect-implementation-of-72fdb94c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13390%3A%20CWE-303%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=critical&amp;id=6930444551392e1c8b19b53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13354-cwe-862-missing-authorization-in-st-a39935ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13354%3A%20CWE-862%20Missing%20Authorization%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=6930444551392e1c8b19b537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-king-addons-vulnerability-exploited-to-ha-ded30ec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20King%20Addons%20Vulnerability%20Exploited%20to%20Hack%20WordPress%20Sites&amp;severity=critical&amp;id=69303d2e51392e1c8b10e82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/picklescan-bugs-allow-malicious-pytorch-models-to--44c7f561</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Picklescan%20Bugs%20Allow%20Malicious%20PyTorch%20Models%20to%20Evade%20Scans%20and%20Execute%20Code&amp;severity=high&amp;id=69303d4551392e1c8b10f034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13109-cwe-639-authorization-bypass-throug-dbf7c3b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13109%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=69302ef1720cedca79452381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12358-cwe-352-cross-site-request-forgery--afcb5b3c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12358%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=medium&amp;id=69302ef1720cedca79452379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13342-cwe-862-missing-authorization-in-sh-326b132b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13342%3A%20CWE-862%20Missing%20Authorization%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=69302ef1720cedca79452385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12887-cwe-862-missing-authorization-in-sa-2584c293</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12887%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20SMTP%20Solution%20with%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=medium&amp;id=69302ef1720cedca7945237d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arizona-attorney-general-sues-chinese-online-retai-5d7ee877</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arizona%20Attorney%20General%20Sues%20Chinese%20Online%20Retailer%20Temu%20Over%20Data%20Theft%20Claims&amp;severity=medium&amp;id=69302ed9720cedca7945161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/penn-and-phoenix-universities-disclose-data-breach-1eb1293a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Penn%20and%20Phoenix%20Universities%20Disclose%20Data%20Breach%20After%20Oracle%20Hack&amp;severity=medium&amp;id=693020471e6d1f9abb0c6704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-silently-mitigated-exploited-lnk-vulnera-aa5a20a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Silently%20Mitigated%20Exploited%20LNK%20Vulnerability&amp;severity=critical&amp;id=6930184de1f6412a905e92d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-year-long-shadypanda-attack-spied-on-43m-chrome--7f0ebe7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7%20Year%20Long%20ShadyPanda%20Attack%20Spied%20on%204.3M%20Chrome%20and%20Edge%20Users&amp;severity=medium&amp;id=69301873e1f6412a905e9aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pytorch-users-at-risk-unveiling-3-zero-day-pickles-5a0b81ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyTorch%20Users%20at%20Risk%3A%20Unveiling%203%20Zero-Day%20PickleScan%20Vulnerabilities&amp;severity=critical&amp;id=69300af87fb5593475cc5f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/korea-arrests-suspects-selling-intimate-videos-fro-ab5b059b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Korea%20arrests%20suspects%20selling%20intimate%20videos%20from%20hacked%20IP%20cameras&amp;severity=high&amp;id=69300ad57fb5593475cc523a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chopping-ai-down-to-size-turning-disruptive-techno-e6994fa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chopping%20AI%20Down%20to%20Size%3A%20Turning%20Disruptive%20Technology%20into%20a%20Strategic%20Advantage&amp;severity=medium&amp;id=69301494e1f6412a90591c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lets-encrypt-to-reduce-certificate-validity-from-9-7fc8a1d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Let%E2%80%99s%20Encrypt%20to%20Reduce%20Certificate%20Validity%20from%2090%20Days%20to%2045%20Days&amp;severity=high&amp;id=69300ad57fb5593475cc5242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13947-vulnerability-in-red-hat-red-hat-en-a6fdd8f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13947%3A%20Vulnerability%20in%20The%20WebKitGTK%20Team%20webkitgtk&amp;severity=high&amp;id=69300af47fb5593475cc5a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/picklescan-bugs-allow-malicious-pytorch-models-to--366a8dd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Picklescan%20Bugs%20Allow%20Malicious%20PyTorch%20Models%20to%20Evade%20Scans%20and%20Execute%20Code&amp;severity=critical&amp;id=69301494e1f6412a90591c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teams-social-engineering-attack-threat-actors-impe-f930ae76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Teams%20Social%20Engineering%20Attack%3A%20Threat%20Actors%20Impersonate%20IT%20to%20Steal%20Credentials%20via%20Quick%20Assist&amp;severity=medium&amp;id=69301885e1f6412a905ea62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/valleyrat-campaign-targets-job-seekers-abuses-foxi-6be9d4fd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ValleyRAT%20Campaign%20Targets%20Job%20Seekers%2C%20Abuses%20Foxit%20PDF%20Reader%20for%20DLL%20Side-loading&amp;severity=medium&amp;id=693014f4e1f6412a905955b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-143-patches-high-severity-vulnerabilities-6db3884c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20143%20Patches%20High-Severity%20Vulnerabilities&amp;severity=high&amp;id=692ffc9010a87570525e15d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-matanbuchus-30-258ccfbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Matanbuchus%203.0&amp;severity=medium&amp;id=69301885e1f6412a905ea620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-poses-risk-to-npm-supply-chain-fbfc969b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20V2%20Poses%20Risk%20to%20NPM%20Supply%20Chain&amp;severity=medium&amp;id=69301885e1f6412a905ea615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13472-cwe-862-missing-authorization-in-pe-f514d38a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13472%3A%20CWE-862%20Missing%20Authorization%20in%20Perforce%20BlazeMeter&amp;severity=medium&amp;id=692ffe297fb5593475bc861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rust-crate-delivers-os-specific-malware--5beded43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Rust%20Crate%20Delivers%20OS-Specific%20Malware%20to%20Web3%20Developer%20Systems&amp;severity=medium&amp;id=69301494e1f6412a90591c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12744-improper-neutralization-of-special--86861de4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12744%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=692ff91810a8757052587e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29864-cwe-693-protection-mechanism-failur-67cfa2c5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29864%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20ESTsoft%20ALZip&amp;severity=medium&amp;id=692ff59510a8757052538201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13946-cwe-835-loop-with-unreachable-exit--b76a7a1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13946%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=692ff21010a87570524f4ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13945-cwe-1325-improperly-controlled-sequ-d601fd2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13945%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=692ff21010a87570524f4ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13486-cwe-94-improper-control-of-generati-abf63164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13486%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hwk-fr%20Advanced%20Custom%20Fields%3A%20Extended&amp;severity=critical&amp;id=692fdfe670961fbaa28b6194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12954-cwe-639-authorization-bypass-throug-e64fd5d2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12954%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Timetable%20and%20Event%20Schedule%20by%20MotoPress&amp;severity=low&amp;id=692fd8dd70961fbaa2808df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10304-cwe-862-missing-authorization-in-ev-477128dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10304%3A%20CWE-862%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=medium&amp;id=692fb1c7619fec35b4585800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12585-cwe-200-exposure-of-sensitive-infor-ef91f6c2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12585%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mxchat%20MxChat%20%E2%80%93%20AI%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=692fb1c7619fec35b4585804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13495-cwe-89-improper-neutralization-of-s-ed673efb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpmanageninja%20FluentCart%20A%20New%20Era%20of%20eCommerce%20%E2%80%93%20Faster%2C%20Lighter%2C%20and%20Simpler&amp;severity=medium&amp;id=692fb1c7619fec35b4585809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13646-cwe-434-unrestricted-upload-of-file-7a8848e4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13646%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=692fa033619fec35b4509f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13448-cwe-79-improper-neutralization-of-i-1194198c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anastis%20CSSIgniter%20Shortcodes&amp;severity=medium&amp;id=692fa033619fec35b4509f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13645-cwe-22-improper-limitation-of-a-pat-1c73e0b1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13645%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=high&amp;id=692fa033619fec35b4509f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-allocated-cves-on-an-ics-5g-modem-47813f69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20allocated%20CVEs%20on%20an%20ICS%205G%20modem&amp;severity=critical&amp;id=692fa037619fec35b450a37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-the-meatmeet-bbq-probe-ble-bbq-botnet-0d2d2058</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20the%20Meatmeet%20BBQ%20Probe%20%E2%80%94%20BLE%20BBQ%20Botnet&amp;severity=medium&amp;id=692f8824619fec35b4355c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-03-68658295</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-03&amp;severity=medium&amp;id=6930d0dbcd38a5251eb82279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64055-na-ca092a11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64055%3A%20n%2Fa&amp;severity=critical&amp;id=6930a5c0e580ff243daab7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65868-na-f646e312</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65868%3A%20n%2Fa&amp;severity=critical&amp;id=69309f55e580ff243da01908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65345-na-784b00b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65345%3A%20n%2Fa&amp;severity=medium&amp;id=69309a36728fb3f62ec00aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50361-na-bc646533</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50361%3A%20n%2Fa&amp;severity=medium&amp;id=693096f5728fb3f62eb704fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63402-na-576ee601</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63402%3A%20n%2Fa&amp;severity=medium&amp;id=693088877d648701e003bbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63401-na-7d5265e7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63401%3A%20n%2Fa&amp;severity=medium&amp;id=693088877d648701e003bbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50360-na-488fd0cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50360%3A%20n%2Fa&amp;severity=high&amp;id=693088877d648701e003bbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/django-5113-sql-injection-c417d485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Django%205.1.13%20-%20SQL%20Injection&amp;severity=medium&amp;id=69307a4db129615efa16edc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mangoswebv4-406-reflected-xss-3c807e92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaNGOSWebV4%20%204.0.6%20-%20Reflected%20XSS&amp;severity=medium&amp;id=69307a4db129615efa16edbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgery-csrf-fdea48ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%202.9.8%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=69307a4db129615efa16edba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgerycsrf-b7584494</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%202.9.8%20-%20Cross-Site%20Request%20Forgery(CSRF)&amp;severity=medium&amp;id=69307a4db129615efa16edb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54326-na-82dc8755</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54326%3A%20n%2Fa&amp;severity=high&amp;id=6930731787f844e860805d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53965-na-481ff2f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53965%3A%20n%2Fa&amp;severity=medium&amp;id=6930731787f844e860805d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65842-na-26019e80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65842%3A%20n%2Fa&amp;severity=medium&amp;id=69306fa987f844e86079960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65841-na-bc0143ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65841%3A%20n%2Fa&amp;severity=medium&amp;id=69306fa987f844e86079960a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65843-na-d65ec0bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65843%3A%20n%2Fa&amp;severity=high&amp;id=69306cb887f844e860730076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-298-cross-site-request-forgery-csrf-478a313a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFaq%202.9.8%20-%20Cross%20Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=69306c2987f844e860718477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62686-na-d5629c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62686%3A%20n%2Fa&amp;severity=medium&amp;id=6930666887f844e8606805b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55076-na-e4a5c80a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55076%3A%20n%2Fa&amp;severity=medium&amp;id=6930666887f844e8606805b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65320-na-a5da9e94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65320%3A%20n%2Fa&amp;severity=high&amp;id=69306429ca1782a906c01f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57202-na-d2573b7e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57202%3A%20n%2Fa&amp;severity=medium&amp;id=693060a5ca1782a906b8901c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57199-na-4d6145c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57199%3A%20n%2Fa&amp;severity=high&amp;id=69305d3dca1782a906b23322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57201-na-1bffe90d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57201%3A%20n%2Fa&amp;severity=high&amp;id=6930599dca1782a906ae61c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57198-na-050b7acc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57198%3A%20n%2Fa&amp;severity=high&amp;id=6930599dca1782a906ae61bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57200-na-5b7e84ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57200%3A%20n%2Fa&amp;severity=medium&amp;id=693055f81f9e797ee2973435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65267-na-abf373e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65267%3A%20n%2Fa&amp;severity=critical&amp;id=693052741f9e797ee291ba0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53841-cwe-829-inclusion-of-functionality--f3f84827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53841%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Akamai%20Guardicore%20Platform%20Agent&amp;severity=high&amp;id=69304fa91f9e797ee28efe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/opensis-community-edition-80-sql-injection-24a9359d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=openSIS%20Community%20Edition%208.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pluckcms-4710-unrestricted-file-upload-3a229877</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PluckCMS%204.7.10%20-%20Unrestricted%20File%20Upload&amp;severity=medium&amp;id=6930038e7fb5593475c25d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rosariosis-672-cross-site-scripting-xss-f92c0fe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RosarioSIS%206.7.2%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rosariosis-672-cross-site-scripting-xss-4d3614cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RosarioSIS%206.7.2%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyadmin-500-sql-injection-85bbe257</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyAdmin%205.0.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openrepeater-21-os-command-injection-a7ec780c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenRepeater%202.1%20-%20OS%20Command%20Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-14-sql-injection-cc8fc93d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.4%20-%20SQL-Injection&amp;severity=medium&amp;id=6930038e7fb5593475c25cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobiledetect-2831-cross-site-scripting-xss-f5d2c590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MobileDetect%202.8.31%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=6930038e7fb5593475c25ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65955-4f13c19e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65955&amp;severity=null&amp;id=6933721cf88dbe026c2f889d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55181-excessive-iteration-cwe-834-in-face-8b81852c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55181%3A%20Excessive%20Iteration%20(CWE-834)%20in%20Facebook%20proxygen&amp;severity=medium&amp;id=692f6512ecdd9d4651b6b4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-npm-malware-attack-exposed-up-to-400-6efb9a71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%20NPM%20malware%20attack%20exposed%20up%20to%20400%2C000%20dev%20secrets&amp;severity=high&amp;id=692f5aa33b1ed793e3777f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-investment-platform-reputation-laundering-fel-2408de50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Investment%20Platform%20Reputation%20Laundering%3A%20Felix%20Markets&amp;severity=medium&amp;id=69301885e1f6412a905ea612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ipcola-a-tangled-mess-ade1e94f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IPCola%3A%20A%20Tangled%20Mess&amp;severity=medium&amp;id=69301885e1f6412a905ea5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salty2fa-tycoon2fa-hybrid-phishing-threat-59c5c85a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salty2FA%20%26%20Tycoon2FA%3A%20Hybrid%20Phishing%20Threat&amp;severity=medium&amp;id=69301bdbe1f6412a9062f6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62575-cwe-732-incorrect-permission-assign-f42fee2c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62575%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64778-cwe-798-use-of-hard-coded-credentia-aabd284f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64778%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-autonomously-finds-7-ffmpeg-vulnerabilities-e4767235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Autonomously%20Finds%207%20FFmpeg%20Vulnerabilities&amp;severity=medium&amp;id=692f572f3b1ed793e36e769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61940-cwe-603-in-mirion-medical-ec2-softw-5039d0fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61940%3A%20CWE-603%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64298-cwe-732-incorrect-permission-assign-cfb58323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64298%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e7587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64642-cwe-732-incorrect-permission-assign-634111cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64642%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Mirion%20Medical%20EC2%20Software%20NMIS%20BioDose&amp;severity=high&amp;id=692f572b3b1ed793e36e758a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13658-cwe-94-improper-control-of-generati-128a847f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13658%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Industrial%20Video%20%26%20Control%20Longwatch&amp;severity=critical&amp;id=692f4367afa3b8e14e1402ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13510-cwe-306-missing-authentication-for--5529c5ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13510%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Iskra%20iHUB%20and%20iHUB%20Lite&amp;severity=critical&amp;id=692f3fe3afa3b8e14e0f8b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13542-cwe-269-improper-privilege-manageme-f7f7617b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13542%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DesignThemes%20DesignThemes%20LMS&amp;severity=critical&amp;id=692f3fe3afa3b8e14e0f8b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13633-use-after-free-in-google-chrome-62a8e7d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13633%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3c0ae0601f8fcd7fd7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13721-race-in-google-chrome-b3d1a5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13721%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=692f388ae0601f8fcd7a94f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13720-bad-cast-in-google-chrome-51116d11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13720%3A%20Bad%20cast%20in%20Google%20Chrome&amp;severity=high&amp;id=692f388ae0601f8fcd7a94f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13640-inappropriate-implementation-in-goo-aec0d8fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13640%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=low&amp;id=692f3888e0601f8fcd7a94e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13639-inappropriate-implementation-in-goo-05006092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13639%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13638-use-after-free-in-google-chrome-be4f96c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13638%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13637-inappropriate-implementation-in-goo-506cdd51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13637%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13636-inappropriate-implementation-in-goo-b9e1ebbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13636%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13635-inappropriate-implementation-in-goo-2f08d906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13635%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13634-inappropriate-implementation-in-goo-44eb0ccb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13634%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13632-inappropriate-implementation-in-goo-f4c332ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13632%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=692f3888e0601f8fcd7a94ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13631-inappropriate-implementation-in-goo-6b35b0c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13631%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13630-type-confusion-in-google-chrome-6ca63907</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13630%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=692f3888e0601f8fcd7a94c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61729-cwe-400-uncontrolled-resource-consu-cab160cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61729%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=692f388ae0601f8fcd7a9500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57850-incorrect-default-permissions-in-re-73698159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57850%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Dev%20Spaces&amp;severity=medium&amp;id=692f388ae0601f8fcd7a94fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66468-cwe-79-improper-neutralization-of-i-c3881662</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66468%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aimeos%20ai-cms-grapesjs&amp;severity=high&amp;id=692f388ae0601f8fcd7a9506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34352-cwe-378-creation-of-temporary-file--0593710e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34352%3A%20CWE-378%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20JumpCloud%20Inc.%20Remote%20Assist&amp;severity=high&amp;id=692f3503e0601f8fcd752d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66454-cwe-321-use-of-hard-coded-cryptogra-a6049b44</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66454%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ArcadeAI%20arcade-mcp&amp;severity=medium&amp;id=692f3503e0601f8fcd752d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-asus-breach-and-1tb-data-de1c2b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20ASUS%20Breach%20and%201TB%20Data%20Theft%20and%20Camera%20Source%20Code&amp;severity=high&amp;id=692f2e02e0601f8fcd6c881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66416-cwe-1188-insecure-default-initializ-5b3049bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66416%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=692f388ae0601f8fcd7a9517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66414-cwe-1188-insecure-default-initializ-6f8d5c09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66414%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20modelcontextprotocol%20typescript-sdk&amp;severity=high&amp;id=692f388ae0601f8fcd7a9513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66409-cwe-125-out-of-bounds-read-in-espre-ad11dd44</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66409%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=low&amp;id=692f388ae0601f8fcd7a950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52622-cwe-1188-initialization-of-a-resour-5281ccea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52622%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=692f2e1ae0601f8fcd6cf191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-orders-messaging-apps-to-work-only-with-acti-b8ec7336</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Orders%20Messaging%20Apps%20to%20Work%20Only%20With%20Active%20SIM%20Cards%20to%20Prevent%20Fraud%20and%20Misuse&amp;severity=medium&amp;id=692f364ce0601f8fcd788da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-calendly-invites-spoof-top-brands-to-hijack-a-f73337a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Calendly%20invites%20spoof%20top%20brands%20to%20hijack%20ad%20manager%20accounts&amp;severity=high&amp;id=692f23a13286267b25e22b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-capture-lazarus-apts-remote-worker-sch-57700cf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Capture%20Lazarus%20APT&apos;s%20Remote-Worker%20Scheme%20Live%20on%20Camera&amp;severity=high&amp;id=692f23a13286267b25e22b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-strikes-israel-with-advanced-muddyviper-2334153d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20strikes%20Israel%20with%20advanced%20MuddyViper%20malware&amp;severity=medium&amp;id=692f23a13286267b25e22b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64750-cwe-61-unix-symbolic-link-symlink-f-68f3491c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64750%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20sylabs%20singularity&amp;severity=medium&amp;id=692f23d63286267b25e270f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cheaters-use-rigged-deckmate-2-shuffling-machi-c7c59261</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20cheaters%20use%20rigged%20DeckMate%202%20shuffling%20machines%20in%20poker%20games%20%7C%20Kaspersky%20official%20blog&amp;severity=low&amp;id=692f1cc417aa519cfe209dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nk-hackers-push-200-malicious-npm-packages-with-ot-9aa70280</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NK%20Hackers%20Push%20200%20Malicious%20npm%20Packages%20with%20OtterCookie%20Malware&amp;severity=medium&amp;id=692f15ad17aa519cfe1668c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13877-use-of-hard-coded-cryptographic-key-7c398c0e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13877%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20nocobase&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12630-cwe-862-missing-authorization-in-up-c197e569</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12630%3A%20CWE-862%20Missing%20Authorization%20in%20Upload.am&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58113-cwe-125-out-of-bounds-read-in-pdf-x-fa9855c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58113%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=692f093f16d939a309c3098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64460-cwe-407-inefficient-algorithmic-com-67ad7ade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64460%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=692f093f16d939a309c309a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13372-cwe-89-improper-neutralization-of-s-aebb4096</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13372%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=medium&amp;id=692f093f16d939a309c3099b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13876-path-traversal-in-rareprob-hd-video-66867314</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13876%3A%20Path%20Traversal%20in%20Rareprob%20HD%20Video%20Player%20All%20Formats%20App&amp;severity=medium&amp;id=692f01f216d939a309b5f1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13875-path-traversal-in-yohann0617-oci-he-9fb91636</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13875%3A%20Path%20Traversal%20in%20Yohann0617%20oci-helper&amp;severity=medium&amp;id=692f01f216d939a309b5f1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-capture-lazarus-apts-remote-worker-sch-089210a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Capture%20Lazarus%20APT&apos;s%20Remote-Worker%20Scheme%20Live%20on%20Camera&amp;severity=medium&amp;id=692f090716d939a309c2cf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-returns-with-24-malicious-extensions-imp-4df0adc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Returns%20with%2024%20Malicious%20Extensions%20Impersonating%20Popular%20Developer%20Tools&amp;severity=medium&amp;id=692f090716d939a309c2cf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-pennsylvania-confirms-new-data-breac-e921d302</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Pennsylvania%20confirms%20new%20data%20breach%20after%20Oracle%20hack&amp;severity=high&amp;id=692efea13a1612a93738ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakes-by-the-riverbank-cfe5c4a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snakes%20by%20the%20riverbank&amp;severity=medium&amp;id=69307ddeb129615efa1d7bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unraveling-water-sacis-new-multi-format-ai-enhance-47fb0232</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unraveling%20Water%20Saci&apos;s%20New%20Multi-Format%2C%20AI-Enhanced%20Attacks%20Propagated%20via%20WhatsApp&amp;severity=medium&amp;id=693076e4b129615efa107016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13505-cwe-79-improper-neutralization-of-i-08d63ef8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Datateam%20Information%20Technologies%20Inc.%20Datactive&amp;severity=medium&amp;id=692ef7463a1612a9372eef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-uses-hidden-prompt-and-scrip-401387e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Package%20Uses%20Hidden%20Prompt%20and%20Script%20to%20Evade%20AI%20Security%20Tools&amp;severity=medium&amp;id=692f090716d939a309c2cf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41066-cwe-200-exposure-of-sensitive-infor-d3761bb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41066%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Horde%20Groupware&amp;severity=medium&amp;id=692ef3cb3a1612a937294c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13731-cwe-79-improper-neutralization-of-i-10f26bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20Nexter%20Extension%20%E2%80%93%20Site%20Enhancements%20Toolkit&amp;severity=medium&amp;id=692ef09b5ae7112264d5b08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cops-are-using-flock-safetys-alpr-network-to-s-d43435cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Cops%20Are%20Using%20Flock%20Safety&apos;s%20ALPR%20Network%20to%20Surveil%20Protesters%20and%20Activists&amp;severity=medium&amp;id=692ef0865ae7112264d5af97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-edge-extensions-caught-tracking-users-creat-e20163e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%2C%20Edge%20Extensions%20Caught%20Tracking%20Users%2C%20Creating%20Backdoors&amp;severity=medium&amp;id=692ef06f5ae7112264d5ae48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13295-cwe-201-insertion-of-sensitive-info-0aead834</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13295%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Argus%20Technology%20Inc.%20BILGER&amp;severity=high&amp;id=692ef09b5ae7112264d5b09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-9m-yeth-exploit-how-16-wei-became-infinite-tok-7c241be6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20%249M%20yETH%20Exploit%3A%20How%2016%20Wei%20Became%20Infinite%20Tokens&amp;severity=critical&amp;id=692eecf55ae7112264d1dd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-hits-israeli-sectors-with-new--fea2a300</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Hit%20Israeli%20Sectors%20with%20New%20MuddyViper%20Backdoor%20in%20Targeted%20Attacks&amp;severity=medium&amp;id=692efe6f3a1612a93738610c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41086-cwe-639-authorization-bypass-throug-8f9fad01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41086%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AMS%20Development%20Corp.%20GAMS&amp;severity=medium&amp;id=692eecf35ae7112264d1dd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41015-cwe-200-exposure-of-sensitive-infor-f4771ec2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41015%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TCMAN%20GIM&amp;severity=medium&amp;id=692eecf35ae7112264d1dd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41014-cwe-200-exposure-of-sensitive-infor-aa49defe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41014%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TCMAN%20GIM&amp;severity=medium&amp;id=692eecf35ae7112264d1dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41013-cwe-89-improper-neutralization-of-s-f1aeff9c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41013%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=692eecf35ae7112264d1dd37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41012-cwe-862-missing-authorization-in-tc-44d90a3f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41012%3A%20CWE-862%20Missing%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=692ee9715ae7112264cd39c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40700-cwe-79-improper-neutralization-of-i-134adbb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IDI%20Eikon%20Governalia&amp;severity=medium&amp;id=692ee9715ae7112264cd39c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11789-cwe-125-out-of-bounds-read-in-sge-p-f354691c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11789%3A%20CWE-125%20Out-of-bounds%20Read%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9715ae7112264cd39c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11788-cwe-122-heap-based-buffer-overflow--dc42eba6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11788%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9715ae7112264cd39bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11787-cwe-78-improper-neutralization-of-s-d52179af</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11787%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd398e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11786-cwe-121-stack-based-buffer-overflow-5755912b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11786%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11785-cwe-121-stack-based-buffer-overflow-a0b7f11a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11785%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11784-cwe-121-stack-based-buffer-overflow-5033d87c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11784%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11783-cwe-121-stack-based-buffer-overflow-db329ef2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11783%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11782-cwe-121-stack-based-buffer-overflow-185fca02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11782%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd397f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11781-cwe-321-use-of-hard-coded-cryptogra-35fce0bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11781%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd397c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11780-cwe-120-buffer-copy-without-checkin-92bbfbf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11780%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=high&amp;id=692ee9705ae7112264cd3979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11779-cwe-121-stack-based-buffer-overflow-d7539e65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11779%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=critical&amp;id=692ee9705ae7112264cd3976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11778-cwe-122-heap-based-buffer-overflow--acbe803a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11778%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20SGE-PLC1000%20SGE-PLC50%20Circutor&amp;severity=critical&amp;id=692ee9705ae7112264cd3973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13879-cwe-22-improper-limitation-of-a-pat-848a5ff8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13879%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SOLIDserver%20SOLIDserver%20IPAM&amp;severity=medium&amp;id=692edee35ae7112264c4ce02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12465-cwe-89-improper-neutralization-of-s-0c9c5a83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12465%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=high&amp;id=692edb645ae7112264c240c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-openai-coding-agent-could-facilit-00a6797b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20OpenAI%20Coding%20Agent%20Could%20Facilitate%20Attacks%20on%20Developers&amp;severity=medium&amp;id=692ed7d35ae7112264c0ae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxyearth-tool-lets-anyone-trace-location-of-user-b0216d58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proxyearth%20Tool%20Lets%20Anyone%20Trace%20Location%20of%20Users%20in%20India%20with%20Just%20a%20Mobile%20Number&amp;severity=medium&amp;id=692ed4555ae7112264bed510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13090-cwe-89-improper-neutralization-of-s-1fee9c78</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13090%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=medium&amp;id=692ed0d35ae7112264bc9d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-107-android-flaws-including-two-fra-75ab0a8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20107%20Android%20Flaws%2C%20Including%20Two%20Framework%20Bugs%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=692ec9c95ae7112264b9022a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13353-cwe-330-use-of-insufficiently-rando-d49b9655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13353%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Cloudflare%20gokey&amp;severity=high&amp;id=692ec9d25ae7112264b9032e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41742-cwe-1394-use-of-default-cryptograph-af68d0ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41742%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=critical&amp;id=692ef5303a1612a9372cbab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/personal-information-of-337-million-stolen-from-co-1c313a96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Personal%20Information%20of%2033.7%20Million%20Stolen%20From%20Coupang&amp;severity=medium&amp;id=692ec2bb5ae7112264afaae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41743-cwe-326-inadequate-encryption-stren-0959ce89</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41743%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=medium&amp;id=692ef5303a1612a9372cbab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41744-cwe-1394-use-of-default-cryptograph-b679cc53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41744%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20Sprecher%20Automation%20SPRECON-E-C&amp;severity=critical&amp;id=692ef5303a1612a9372cbab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/situsamc-cyberattack-exposes-client-data-third-par-fd1c6535</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22SitusAMC%20Cyberattack%20Exposes%20Client%20Data%3A%20Third-Party%20Risks%20%26%20AI%20Threats%20in%20Focus%22&amp;severity=medium&amp;id=692ebbb95ae7112264a68f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-hackers-use-npmscancom-to-hack-web-apps-nextjs-f3c31266</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Hackers%20Use%20NPMSCan.com%20to%20Hack%20Web%20Apps%20(Next.js%2C%20Nuxt.js%2C%20React%2C%20Bun)&amp;severity=high&amp;id=692ebbce5ae7112264a691db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13873-cwe-79-improper-neutralization-of-i-ad3a0937</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ObjectPlanet%20Opinio&amp;severity=medium&amp;id=692ebbcb5ae7112264a69121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13872-cwe-918-server-side-request-forgery-e9d4de2a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13872%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ObjectPlanet%20Opinio&amp;severity=low&amp;id=692ebbcb5ae7112264a6911e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13871-cwe-352-cross-site-request-forgery--4adbe25f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13871%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ObjectPlanet%20Opinio&amp;severity=low&amp;id=692eb8375ae7112264a43086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androids-december-2025-updates-patch-two-zero-days-78243fb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Zero-Days%20Patched%20in%20December%202025%20Security%20Update&amp;severity=medium&amp;id=692eb4ab5ae7112264a2108b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13516-cwe-434-unrestricted-upload-of-file-a39e78b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13516%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20SureMail%20%E2%80%93%20SMTP%20and%20Email%20Logs%20Plugin%20with%20Amazon%20SES%2C%20Postmark%2C%20and%20Other%20Providers&amp;severity=high&amp;id=692ef5303a1612a9372cbaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13724-cwe-89-improper-neutralization-of-s-af5f6c3d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13724%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=692ef5303a1612a9372cbac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13534-cwe-269-improper-privilege-manageme-a9dce4b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13534%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=692ef5303a1612a9372cbac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10543-cwe-681-incorrect-conversion-betwee-902262b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10543%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Eclipse%20Foundation%20paho.mqtt.golang%20(Go%20MQTT%20v3.1%20library)&amp;severity=medium&amp;id=692ef09b5ae7112264d5b098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10971-cwe-922-insecure-storage-of-sensiti-7613a2bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10971%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20FERMAX%20ELECTR%C3%93NICA%20S.A.U%20MeetMe&amp;severity=high&amp;id=692e9c175ae7112264944d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11726-cwe-862-missing-authorization-in-be-0f3b40f2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11726%3A%20CWE-862%20Missing%20Authorization%20in%20beaverbuilder%20Beaver%20Builder%20Page%20Builder%20%E2%80%93%20Drag%20and%20Drop%20Website%20Builder&amp;severity=medium&amp;id=692e98935ae71122648fbfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13696-cwe-200-exposure-of-sensitive-infor-8cce1899</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13696%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=medium&amp;id=692e98935ae71122648fbfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-107-android-flaws-including-two-fra-69b5356f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20107%20Android%20Flaws%2C%20Including%20Two%20Framework%20Bugs%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=692efe6f3a1612a937386112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12483-cwe-89-improper-neutralization-of-s-434bf61e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=medium&amp;id=692e8e125ae71122647f9683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13140-cwe-352-cross-site-request-forgery--64a8b2f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13140%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20WordPress%20Form%20Builder%20to%20create%2C%20style%20and%20embed%20multiple%20forms%20of%20any%20complexity&amp;severity=medium&amp;id=692e8e125ae71122647f9691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13685-cwe-352-cross-site-request-forgery--7fd5717c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Photo%20Gallery%20by%20Ays%20%E2%80%93%20Responsive%20Image%20Gallery&amp;severity=medium&amp;id=692e8e125ae71122647f9696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13007-cwe-79-improper-neutralization-of-i-eeed28e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13007%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adreastrian%20WP%20Social%20Ninja%20%E2%80%93%20Embed%20Social%20Feeds%2C%20Customer%20Reviews%2C%20Chat%20Widgets%20(Google%20Reviews%2C%20YouTube%20Feed%2C%20Photo%20Feeds%2C%20and%20More)&amp;severity=medium&amp;id=692e8e125ae71122647f9689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13001-cwe-89-sql-injection-in-donation-bc21badc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13001%3A%20CWE-89%20SQL%20Injection%20in%20donation&amp;severity=medium&amp;id=692e8375fdda6c2fef754182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13000-cwe-89-sql-injection-in-db-access-bbe27b8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13000%3A%20CWE-89%20SQL%20Injection%20in%20db-access&amp;severity=high&amp;id=692e8375fdda6c2fef75417e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13606-cwe-352-cross-site-request-forgery--3b3b15bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13606%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=medium&amp;id=692e6edbf8429d84f3bf2bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13387-cwe-79-improper-neutralization-of-i-26c42757</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=high&amp;id=692e6edbf8429d84f3bf2bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20789-cwe-201-information-exposure-throug-ae3c1cd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20789%3A%20CWE-201%20Information%20Exposure%20Through%20Sent%20Data%20in%20MediaTek%2C%20Inc.%20MT6781%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6893%2C%20MT8196&amp;severity=medium&amp;id=692e57b3f2f793a7de7f602c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20788-cwe-1262-improper-access-control-fo-1c04acbc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20788%3A%20CWE-1262%20Improper%20Access%20Control%20for%20Register%20Interface%20in%20MediaTek%2C%20Inc.%20MT6991%2C%20MT8196&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20777-cwe-787-out-of-bounds-write-in-medi-6bd6db28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20777%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20776-cwe-125-out-of-bounds-read-in-media-eafc648d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20776%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20775-cwe-415-double-free-in-mediatek-inc-5c572c82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20775%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20774-cwe-122-heap-overflow-in-mediatek-i-80054830</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20774%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b3f2f793a7de7f601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20773-cwe-415-double-free-in-mediatek-inc-5da0d224</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20773%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b3f2f793a7de7f601a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20772-cwe-415-double-free-in-mediatek-inc-f6e6f2a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20772%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8188%2C%20MT8196%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8796%2C%20MT8798%2C%20MT8873%2C%20MT8883&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20771-cwe-457-use-of-uninitialized-variab-fd9ecaec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20771%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20770-cwe-416-use-after-free-in-mediatek--dfa1302a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20770%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20769-cwe-121-stack-overflow-in-mediatek--366ff4de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20769%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=low&amp;id=692e57b1f2f793a7de7f5f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20768-cwe-125-out-of-bounds-read-in-media-6973298f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20768%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20767-cwe-787-out-of-bounds-write-in-medi-f40a52d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20767%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20766-cwe-457-use-of-uninitialized-variab-4d6ad914</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20766%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20765-cwe-415-double-free-in-mediatek-inc-fc58df29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20765%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8113%2C%20MT8115%2C%20MT8139%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8512%2C%20MT8516%2C%20MT8518%2C%20MT8519%2C%20MT8532%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698&amp;severity=medium&amp;id=692e57b1f2f793a7de7f5f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20764-cwe-787-out-of-bounds-write-in-medi-5213981f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20764%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8873%2C%20MT8893&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20763-cwe-787-out-of-bounds-write-in-medi-0073e8ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20763%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8873%2C%20MT8893&amp;severity=high&amp;id=692e57b1f2f793a7de7f5f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20750-cwe-476-null-pointer-dereference-in-111d2e82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20750%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20751-cwe-787-out-of-bounds-write-in-medi-77ba213f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20751%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20791-cwe-617-reachable-assertion-in-medi-4554b767</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20791%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20752-cwe-617-reachable-assertion-in-medi-6a79c733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20752%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8791T&amp;severity=medium&amp;id=692e57aff2f793a7de7f5efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20756-cwe-1287-specified-type-in-mediatek-e71a999f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20756%3A%20CWE-1287%20Specified%20Type%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20757-cwe-617-reachable-assertion-in-medi-520122b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20757%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20758-cwe-248-uncaught-exception-in-media-1425e72a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20758%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20759-cwe-125-out-of-bounds-read-in-media-504bed14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20759%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8673%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20790-cwe-476-null-pointer-dereference-in-a133528c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20790%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57b3f2f793a7de7f602f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20755-cwe-476-null-pointer-dereference-in-6fd41c4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20755%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20754-cwe-248-uncaught-exception-in-media-09981611</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20754%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=692e57aff2f793a7de7f5f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20753-cwe-248-uncaught-exception-in-media-4f0f0048</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20753%3A%20CWE-248%20Uncaught%20Exception%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=692e57aff2f793a7de7f5eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20792-cwe-617-reachable-assertion-in-medi-4f615484</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20792%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8791T&amp;severity=medium&amp;id=692e57b3f2f793a7de7f6035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/need-guidance-where-to-take-report-on-15-potential-2c128138</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Need%20Guidance%3A%20Where%20to%20take%20report%20on%2015%20potential%20Linux%20Kernel%20%2F%20VFS%20Vulnerabilities%20(including%20LPE%20Race%20Condition%20fix)&amp;severity=critical&amp;id=692e50a8f2f793a7de7cda65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45675-cwe-309-use-of-password-system-for--17a54da6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45675%3A%20CWE-309%20Use%20of%20Password%20System%20for%20Primary%20Authentication%20in%20IBM%20Informix%20Dynamic%20Server&amp;severity=high&amp;id=692e50a4f2f793a7de7cda09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13697-cwe-79-improper-neutralization-of-i-a015aa89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20BlockArt%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20Blocks%20%2CWordPress%20Block%20Plugin%2C%20Sections%20%26%20Template%20Library&amp;severity=medium&amp;id=692e50a4f2f793a7de7cda11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12529-cwe-73-external-control-of-file-nam-e14e9285</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12529%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=high&amp;id=692e50a4f2f793a7de7cda0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55129-vulnerability-in-revive-revive-adse-6a3ffc38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55129%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=692e499df2f793a7de78511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58488-cwe-940-improper-verification-of-so-b739ed9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58488%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Samsung%20Mobile%20SmartTouchCall&amp;severity=medium&amp;id=692e499ef2f793a7de785153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58487-cwe-285-improper-authorization-in-s-16ba15ce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58487%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=692e499ef2f793a7de785150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58486-cwe-20-improper-input-validation-in-b2d5ff3b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58486%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=692e499ef2f793a7de78514d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58485-cwe-20-improper-input-validation-in-abf348ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=692e499ef2f793a7de78514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58484-cwe-276-incorrect-default-permissio-a2cf9060</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58484%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Cloud%20Assistant&amp;severity=medium&amp;id=692e499ef2f793a7de785147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58483-cwe-926-improper-export-of-android--77735cea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58483%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Galaxy%20Store%20for%20Galaxy%20Watch&amp;severity=medium&amp;id=692e499ef2f793a7de785144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58482-cwe-284-improper-access-control-in--fdb0f591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58482%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20MotionPhoto&amp;severity=high&amp;id=692e499ef2f793a7de785141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58481-cwe-284-improper-access-control-in--99bb086b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58481%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20MotionPhoto&amp;severity=high&amp;id=692e499df2f793a7de785134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58480-cwe-122-heap-based-buffer-overflow--cd04d6b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58480%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58479-cwe-125-out-of-bounds-read-in-samsu-4d5d215c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58479%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58478-cwe-787-out-of-bounds-write-in-sams-3c904326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58478%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78512b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58477-cwe-787-out-of-bounds-write-in-sams-39144dd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58477%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58476-cwe-125-out-of-bounds-read-in-samsu-145f9b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58476%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58475-cwe-20-improper-input-validation-in-6e0122f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58475%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21080-cwe-926-improper-export-of-android--144c456a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21080%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de78511c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21072-cwe-787-out-of-bounds-write-in-sams-6b26598c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21072%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=692e499df2f793a7de785119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-in-third-wave-of-malicio-1726810a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Glassworm%20malware%20returns%20in%20third%20wave%20of%20malicious%20VS%20Code%20packages&amp;severity=high&amp;id=692e3805f2f793a7de175e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-02-f9395fb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-02&amp;severity=medium&amp;id=692f8089619fec35b42a60bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65657-na-8a528a6c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65657%3A%20n%2Fa&amp;severity=medium&amp;id=692f54d5c92f9eed9394b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65380-na-68be8bb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65380%3A%20n%2Fa&amp;severity=medium&amp;id=692f54d5c92f9eed9394b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65379-na-fe06e323</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65379%3A%20n%2Fa&amp;severity=medium&amp;id=692f4a55c92f9eed9384ceea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65877-na-9d14b7ac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65877%3A%20n%2Fa&amp;severity=high&amp;id=692f4367afa3b8e14e1402b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60736-na-e7416105</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60736%3A%20n%2Fa&amp;severity=critical&amp;id=692f3dc6afa3b8e14e0c8d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65896-na-118d4658</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65896%3A%20n%2Fa&amp;severity=critical&amp;id=692f3503e0601f8fcd752d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58386-na-d356c279</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58386%3A%20n%2Fa&amp;severity=critical&amp;id=692f2e1ae0601f8fcd6cf194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65844-na-b6ac5ae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65844%3A%20n%2Fa&amp;severity=high&amp;id=692f2aab3286267b25ed5c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65215-na-13df7342</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65215%3A%20n%2Fa&amp;severity=medium&amp;id=692f279a3286267b25e84bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65881-na-a05acd27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65881%3A%20n%2Fa&amp;severity=medium&amp;id=692f279a3286267b25e84bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60854-na-5e201724</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60854%3A%20n%2Fa&amp;severity=critical&amp;id=692f279a3286267b25e84bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-16-reflected-cross-site-scripting-xss-d11c911e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.6%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e74000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-16-reflected-cross-site-scripting-xss-d6e123a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.6%20-%20Reflected-Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e73ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piwigo-1360-sql-injection-98ccb474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piwigo%2013.6.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=692f27653286267b25e73ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpipam-151-sql-injection-0fa2586a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpIPAM%201.5.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=692f27653286267b25e73ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyfaq-317-reflected-cross-site-scripting-xss-301a3518</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=phpMyFAQ%20%203.1.7%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=692f27653286267b25e73fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yourls-182-cross-site-request-forgery-csrf-6a2d795f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YOURLS%201.8.2%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=692f27653286267b25e73fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64070-na-579bf546</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64070%3A%20n%2Fa&amp;severity=medium&amp;id=692f1cb917aa519cfe209c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65656-na-b5067d2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65656%3A%20n%2Fa&amp;severity=critical&amp;id=692f193817aa519cfe1ae18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65358-na-5f9ee883</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65358%3A%20n%2Fa&amp;severity=critical&amp;id=692f15bf17aa519cfe1691ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65186-na-26103630</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65186%3A%20n%2Fa&amp;severity=medium&amp;id=692f11fa0eb63243a5f7cdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65187-na-412c2a0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65187%3A%20n%2Fa&amp;severity=medium&amp;id=692f0ffa16d939a309ce6a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63872-na-9944c6df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63872%3A%20n%2Fa&amp;severity=medium&amp;id=692f093f16d939a309c30998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59704-na-a43f8136</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59704%3A%20n%2Fa&amp;severity=high&amp;id=692f093f16d939a309c30994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59703-na-b58b08e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59703%3A%20n%2Fa&amp;severity=critical&amp;id=692f093f16d939a309c30990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59698-na-bcdf4ccc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59698%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59697-na-c5de3a1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59697%3A%20n%2Fa&amp;severity=high&amp;id=692efeb83a1612a93738c05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59696-na-b428a79d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59696%3A%20n%2Fa&amp;severity=low&amp;id=692efeb83a1612a93738c057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59702-na-f2b622de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59702%3A%20n%2Fa&amp;severity=high&amp;id=692efeb83a1612a93738c053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59701-na-130cae0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59701%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59700-na-0d816107</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59700%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59699-na-1adaa270</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59699%3A%20n%2Fa&amp;severity=medium&amp;id=692efeb83a1612a93738c047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59705-na-50a8aa71</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59705%3A%20n%2Fa&amp;severity=medium&amp;id=692eface3a1612a93732ddee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59695-na-21b8a579</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59695%3A%20n%2Fa&amp;severity=critical&amp;id=692eface3a1612a93732ddea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59694-na-90898d44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59694%3A%20n%2Fa&amp;severity=medium&amp;id=692eface3a1612a93732dde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59693-na-02d041fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59693%3A%20n%2Fa&amp;severity=critical&amp;id=692eface3a1612a93732dde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65858-na-96a43481</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65858%3A%20n%2Fa&amp;severity=low&amp;id=692ef09b5ae7112264d5b095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-hunting-for-sharepoint-in-memory-f8d88bbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads%2C%20(Tue%2C%20Dec%202nd)&amp;severity=medium&amp;id=692e26e43bec74f1ee0bf6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66448-cwe-94-improper-control-of-generati-02908ecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66448%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vllm-project%20vllm&amp;severity=high&amp;id=692e1c816dbd3477d752f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66401-cwe-78-improper-neutralization-of-s-6ace6b6d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66401%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kapilduraphe%20mcp-watch&amp;severity=critical&amp;id=692e1c816dbd3477d752f017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66415-cwe-441-unintended-proxy-or-interme-7fa1f179</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66415%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20fastify%20fastify-reply-from&amp;severity=medium&amp;id=692e1c816dbd3477d752f020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66410-cwe-22-improper-limitation-of-a-pat-667bc08e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66410%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flipped-aurora%20gin-vue-admin&amp;severity=high&amp;id=692e19186dbd3477d74d63d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66405-cwe-918-server-side-request-forgery-f0bcd980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66405%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Portkey-AI%20gateway&amp;severity=medium&amp;id=692e19186dbd3477d74d63cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66403-cwe-79-improper-neutralization-of-i-474b9419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66403%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20error311%20FileRise&amp;severity=medium&amp;id=692e15786dbd3477d748216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66400-cwe-20-improper-input-validation-in-d862827f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66400%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20syntax-tree%20mdast-util-to-hast&amp;severity=medium&amp;id=692e15786dbd3477d7482169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66313-cwe-89-improper-neutralization-of-s-99cc37fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66313%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ChurchCRM%20CRM&amp;severity=medium&amp;id=692e15786dbd3477d7482165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66312-cwe-79-improper-neutralization-of-i-52d6d84c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66312%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66311-cwe-79-improper-neutralization-of-i-d58403cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66311%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66310-cwe-79-improper-neutralization-of-i-6ec75368</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66310%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66309-cwe-79-improper-neutralization-of-i-d347b8ab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66309%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e19186dbd3477d74d63d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66308-cwe-79-improper-neutralization-of-i-c716202d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66308%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e11fe6dbd3477d7432f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66307-cwe-204-observable-response-discrep-df950e09</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66307%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e11fe6dbd3477d7432f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66306-cwe-639-authorization-bypass-throug-ecfb8a43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66306%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe46181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66305-cwe-248-uncaught-exception-in-getgr-63ff439d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66305%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe4618a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66304-cwe-200-exposure-of-sensitive-infor-be139073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66304%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0ef03937fa579fe46185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66303-cwe-400-uncontrolled-resource-consu-1165153b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66303%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66302-cwe-22-improper-limitation-of-a-pat-ad183ec0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66302%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66301-cwe-285-improper-authorization-in-g-76821d69</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66301%3A%20CWE-285%3A%20Improper%20Authorization%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0bb43937fa579fdf7d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66300-cwe-22-improper-limitation-of-a-pat-3b3b1e15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66300%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e07e33937fa579fd7fc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66299-cwe-94-improper-control-of-generati-cff7c66d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66299%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e07e33937fa579fd7fc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66298-cwe-1336-improper-neutralization-of-b5584524</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66298%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0bb43937fa579fdf7d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66297-cwe-1336-improper-neutralization-of-ca26f562</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66297%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd2924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66296-cwe-266-incorrect-privilege-assignm-c7ee3281</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66296%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd29248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-coupang-data-breach-impacts-337-milli-757a5e1f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Coupang%20data%20breach%20impacts%2033.7%20million%20customers&amp;severity=high&amp;id=692e04673937fa579fd1ccd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadypanda-turns-popular-browser-extensions-with-4-ab37b14b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadyPanda%20Turns%20Popular%20Browser%20Extensions%20with%204.3%20Million%20Installs%20Into%20Spyware&amp;severity=high&amp;id=692e04673937fa579fd1ccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66294-cwe-94-improper-control-of-generati-47fe02a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66294%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e048c3937fa579fd29254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66295-cwe-22-improper-limitation-of-a-pat-5e7aa583</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66295%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getgrav%20grav&amp;severity=high&amp;id=692e0147821c4e4a8f8d8923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51999-cwe-915-improperly-controlled-modif-de89690f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51999&amp;severity=null&amp;id=692dfa38821c4e4a8f7fb95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55749-cwe-284-improper-access-control-in--b07fde79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55749%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=692dfa38821c4e4a8f7fb963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arkanix-stealer-newly-discovered-short-term-profit-57314659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arkanix%20Stealer%3A%20Newly%20discovered%20short%20term%20profit%20malware&amp;severity=medium&amp;id=692e048b3937fa579fd280c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11772-cwe-427-uncontrolled-search-path-el-55e3b0b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11772%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Synaptics%20Synaptics%20Fingerprint%20Driver&amp;severity=medium&amp;id=692de5b91fcc71981e9338bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coupang-data-breach-affects-all-337-million-south--a5486ab4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coupang%20Data%20Breach%20Affects%20All%2033.7%20Million%20South%20Korean%20Accounts&amp;severity=high&amp;id=692de2311fcc71981e8d6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13837-vulnerability-in-python-software-fo-1d6cc1b2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13837%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=692ddb371fcc71981e81acf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13836-vulnerability-in-python-software-fo-68751bab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13836%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=692ddb371fcc71981e81acee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13653-cwe-200-exposure-of-sensitive-infor-3e318179</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13653%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=692ddb371fcc71981e81acea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13835-cwe-79-improper-neutralization-of-i-c7e0abf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=high&amp;id=692dd814d2272025770082fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-orders-phone-makers-to-pre-install-sanchar-s-baaa0fbd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India%20Orders%20Phone%20Makers%20to%20Pre-Install%20Government%20App%20to%20Tackle%20Telecom%20Fraud&amp;severity=low&amp;id=692de2321fcc71981e8d67c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadypanda-turns-popular-browser-extensions-with-4-c399d778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadyPanda%20Turns%20Popular%20Browser%20Extensions%20with%204.3%20Million%20Installs%20Into%20Spyware&amp;severity=medium&amp;id=692de2321fcc71981e8d67c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-analysis-and-community-resources-0345aab9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%202.0%3A%20Analysis%20and%20Community%20Resources&amp;severity=medium&amp;id=692dd10bd227202577f65ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-embedded-systems-security-whats-new-a01c11ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20Embedded%20Systems%20Security%3A%20what%E2%80%99s%20new%3F&amp;severity=medium&amp;id=692dcd99d227202577f153ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7007-cwe-476-null-pointer-dereference-in--a49d01a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7007%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Avast%20Antivirus&amp;severity=high&amp;id=692dc6d195b0bac45943a6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-seize-cryptomixer-domains-infrastructure-an-0bfa42e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Seize%20Cryptomixer%20Domains%2C%20Infrastructure%20and%2028%20Million%20Dollars%20in%20Bitcoin&amp;severity=medium&amp;id=692dc34695b0bac4593f5e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3500-cwe-190-integer-overflow-or-wraparou-15cc1095</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3500%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Avast%20Antivirus&amp;severity=critical&amp;id=692dbfd095b0bac45939d90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64775-cwe-459-incomplete-cleanup-in-apach-b1583f8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64775%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=692dbfd095b0bac45939d90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facial-recognitions-trust-problem-4e753531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Facial%20Recognition%E2%80%99s%20Trust%20Problem&amp;severity=medium&amp;id=692dbc8df910530b0eb7ec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8351-cwe-122-heap-based-buffer-overflow-i-5f121e14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8351%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Avast%20Antivirus&amp;severity=critical&amp;id=692dbca6f910530b0eb80df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13829-cwe-863-incorrect-authorization-in--d808720b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13829%3A%20CWE-863%20Incorrect%20Authorization%20in%20Data%20Illusion%20Zumbrunn%20NGSurvey&amp;severity=high&amp;id=692dbca6f910530b0eb80dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-audit-of-openexr-luma-39bc6d64</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Audit%20of%20OpenEXR%20%C2%B7%20Luma&amp;severity=medium&amp;id=692db92bf910530b0eb07489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29-million-worth-of-bitcoin-seized-in-cryptomixer--f2d13741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2429%20Million%20Worth%20of%20Bitcoin%20Seized%20in%20Cryptomixer%20Takedown&amp;severity=medium&amp;id=692db909f910530b0eb041f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10101-cwe-122-heap-based-buffer-overflow--b6644347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10101%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Avast%20Antivirus&amp;severity=high&amp;id=692db924f910530b0eb071f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48894-cwe-319-cleartext-transmission-of-s-acb6698c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48894%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=medium&amp;id=692db924f910530b0eb071ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53684-cwe-352-cross-site-request-forgery--5fa517fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53684%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45370-cwe-302-authentication-bypass-by-as-cfcb00b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45370%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Socomec%20Easy%20Config%20System&amp;severity=high&amp;id=692db924f910530b0eb071e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49572-cwe-306-missing-authentication-for--b9b4b470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49572%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48882-cwe-306-missing-authentication-for--762d1d21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48882%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20085-cwe-306-missing-authentication-for--fdda7e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20085%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db924f910530b0eb071f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23417-cwe-306-missing-authentication-for--d7fcc15a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23417%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db926f910530b0eb07232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26858-cwe-20-improper-input-validation-in-6b75cc84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26858%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db926f910530b0eb07236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54851-cwe-306-missing-authentication-for--c55748de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54851%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54850-cwe-306-missing-authentication-for--0067071b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54850%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54849-cwe-306-missing-authentication-for--5f7458e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54849%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb0723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54848-cwe-306-missing-authentication-for--e730799d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54848%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb0723a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55222-cwe-306-missing-authentication-for--a587d2b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55222%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55221-cwe-306-missing-authentication-for--2e378d65</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55221%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Socomec%20DIRIS%20Digiware%20M-70&amp;severity=high&amp;id=692db927f910530b0eb07246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11699-cwe-613-insufficient-session-expira-8507906b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11699%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20nopSolutions%20nopCommerce&amp;severity=high&amp;id=692dbca6f910530b0eb80e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13129-cwe-841-improper-enforcement-of-beh-c1e3fbde</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13129%3A%20CWE-841%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Seneka%20Software%20Hardware%20Information%20Technology%20Trade%20Contracting%20and%20Industry%20Ltd.%20Co.%20Onaylar%C4%B1m&amp;severity=medium&amp;id=692da9695a8d386a3dbfed8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-albiriox-android-malware-developed-by-russian--de62543a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Albiriox%20Android%20Malware%20Developed%20by%20Russian%20Cybercriminals&amp;severity=medium&amp;id=692da9415a8d386a3dbf6d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gitlab-surpasses-bitbucket-in-leaked-secrets-micro-a2eab245</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitLab%20Surpasses%20Bitbucket%20in%20Leaked%20Secrets%2C%20Microsoft%20Introduces%20Copilot%20Studio%20Security%2C%20Amazon%20Enhances%20Global%20DNS&amp;severity=medium&amp;id=692da9585a8d386a3dbf9dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deletes-x-post-after-getting-caught-using-a-0e585ce6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20deletes%20X%20post%20after%20getting%20caught%20using%20a%20%E2%80%98stolen%E2%80%99%20AI%20recipe%20infographic&amp;severity=high&amp;id=692da0ff17445d7f7a5a7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-found-a-europaeu-compromise-6f3ee22f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20i%20found%20a%20europa.eu%20compromise&amp;severity=medium&amp;id=692da11017445d7f7a5a888b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evil-twin-wifi-hacker-jailed-for-7-years-after-ste-ea8242dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evil%20Twin%20Wi%E2%80%91Fi%20Hacker%20Jailed%20for%207%20Years%20After%20Stealing%20Data%20Mid%E2%80%91Flight&amp;severity=medium&amp;id=692d9a06038b4a5c0ddaa39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61260-openai-codex-cli-command-injection--ad7df2f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61260%20%E2%80%94%20OpenAI%20Codex%20CLI%3A%20Command%20Injection%20via%20Project-Local%20Configuration&amp;severity=low&amp;id=692d9685038b4a5c0dd28ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-hot-cves-npm-worm-returns-firefox-rce-db11a4e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Hot%20CVEs%2C%20npm%20Worm%20Returns%2C%20Firefox%20RCE%2C%20M365%20Email%20Raid%20%26%20More&amp;severity=medium&amp;id=692d965a038b4a5c0dd2435c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-link-edr-tampering-18e69f87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bind%20Link%20%E2%80%93%20EDR%20Tampering&amp;severity=medium&amp;id=692d8f86038b4a5c0dc8f34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-the-agentic-trojan-horse-why-the-new-ai-br-06d8bd6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20The%20%22Agentic%22%20Trojan%20Horse%3A%20Why%20the%20New%20AI%20Browsers%20War%20is%20a%20Nightmare%20for%20Security%20Teams&amp;severity=medium&amp;id=692d8554110e7c684f803955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13296-cwe-352-cross-site-request-forgery--16c6c40c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13296%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tekrom%20Technology%20Inc.%20T-Soft%20E-Commerce&amp;severity=medium&amp;id=692d821d110e7c684f7933a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-an-openplc-scadabr-flaw-to-its-known--10a9bb2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20an%20OpenPLC%20ScadaBR%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=692d81e0110e7c684f77d0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-takes-down-cryptomixer-cryptocurrency-mixin-312e3713</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20takes%20down%20Cryptomixer%20cryptocurrency%20mixing%20service&amp;severity=high&amp;id=692d81e0110e7c684f77d0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/royal-borough-of-kensington-and-chelsea-reveals-da-2fa26a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Royal%20Borough%20of%20Kensington%20and%20Chelsea%20Reveals%20Data%20Breach&amp;severity=high&amp;id=692d81e0110e7c684f77d0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-man-gets-seven-years-for-running-evil-t-eddb5f05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20Man%20Gets%20Seven%20Years%20for%20Running%20%E2%80%9CEvil%20Twin%E2%80%9D%20Wi-Fi&amp;severity=high&amp;id=692d81e0110e7c684f77d0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58408-cwe-cwe-416-use-after-free-418-in-i-bac39c4b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58408%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=692d7afd8a708c3c5e993c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-scadabr-vulnerability-after-hacktivi-45b8de12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20ScadaBR%20Vulnerability%20After%20Hacktivist%20ICS%20Attack&amp;severity=medium&amp;id=692d775b8a708c3c5e9240b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41070-cwe-79-in-sanoma-clickedu-afaaec6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41070%3A%20CWE-79%20in%20Sanoma%20Clickedu&amp;severity=medium&amp;id=692d73e38a708c3c5e8abc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6349-cwe-416-use-after-free-in-arm-ltd-va-89c57b6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6349%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac170278280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8045-cwe-416-use-after-free-in-arm-ltd-va-21d9991b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8045%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac170278283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2879-cwe-200-exposure-of-sensitive-inform-8f0e2f6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2879%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=692d70a066fdaac17027827a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59789-cwe-674-uncontrolled-recursion-in-a-fc911356</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59789%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=high&amp;id=692d70a066fdaac17027827d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tomiris-shifts-to-public-service-implants-for-stea-c648eac8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tomiris%20Shifts%20to%20Public-Service%20Implants%20for%20Stealthier%20C2%20in%20Attacks%20on%20Government%20Targets&amp;severity=high&amp;id=692d6d1a66fdaac1701f1e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41700-cwe-502-deserialization-of-untruste-712ed6fe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41700%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20CODESYS%20CODESYS%20Development%20System&amp;severity=high&amp;id=692d6d2e66fdaac1701f50ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41738-cwe-843-access-of-resource-using-in-469b4e19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41738%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20CODESYS%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=692d6d2e66fdaac1701f50ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41739-cwe-125-out-of-bounds-read-in-codes-9f22099f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41739%3A%20CWE-125%20Out-of-bounds%20Read%20in%20CODESYS%20CODESYS%20PLCHandler&amp;severity=medium&amp;id=692d6d2e66fdaac1701f50f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13819-cwe-601-url-redirection-to-untruste-10088214</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13819%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20MiR%20Robot&amp;severity=medium&amp;id=692d652686d7d117cd35a8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1st-december-threat-intelligence-report-2784e45b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1st%20December%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=692d5ab286d7d117cd190a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-man-sentenced-to-prison-for-wi-fi-attac-b633146f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20Man%20Sentenced%20to%20Prison%20for%20Wi-Fi%20Attacks%20at%20Airports%20and%20on%20Flights&amp;severity=medium&amp;id=692d5a9986d7d117cd189a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-albiriox-maas-malware-targets-400-apps-for-on--26330253</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Albiriox%20MaaS%20Malware%20Targets%20400%2B%20Apps%20for%20On-Device%20Fraud%20and%20Screen%20Control&amp;severity=medium&amp;id=692d6cd466fdaac1701e59ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13816-path-traversal-in-moxi159753-mogu-b-dd3b4f1a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13816%3A%20Path%20Traversal%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d572086d7d117cd0ea3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13815-unrestricted-upload-in-moxi159753-m-f8926766</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13815%3A%20Unrestricted%20Upload%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d5052e7f98a81a70becdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61610-cwe-20-improper-input-validation-in-8e20d7e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61610%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa788c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61609-cwe-20-improper-input-validation-in-c12fa7ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61609%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61608-cwe-20-improper-input-validation-in-0e8e7d77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61608%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61607-cwe-20-improper-input-validation-in-0441335e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61607%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61619-cwe-20-improper-input-validation-in-6fb7ec77</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61619%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4909e7f98a81a7fa78f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61618-cwe-20-improper-input-validation-in-3dcb0cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61618%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61617-cwe-20-improper-input-validation-in-2bf264db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61617%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3012-cwe-125-out-of-bounds-read-in-unisoc-5f15ed7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3012%3A%20cwe-125%20Out-of-bounds%20Read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11133-cwe-20-improper-input-validation-in-45c6154d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11133%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa787d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11132-cwe-20-improper-input-validation-in-ac87b460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11132%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa787a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11131-cwe-20-improper-input-validation-in-0fc8fd71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11131%3A%20cwe-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T8100%2FT9100%2FT8200%2FT8300&amp;severity=high&amp;id=692d4907e7f98a81a7fa7877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13814-server-side-request-forgery-in-moxi-835230a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13814%3A%20Server-Side%20Request%20Forgery%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d458c0729cca2074a0c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13813-missing-authorization-in-moxi159753-c6fb9b2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13813%3A%20Missing%20Authorization%20in%20moxi159753%20Mogu%20Blog%20v2&amp;severity=medium&amp;id=692d42240729cca207418fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13811-sql-injection-in-jsnjfz-webstack-gu-89bb44a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13811%3A%20SQL%20Injection%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=692d3b0e0729cca2073502d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13810-path-traversal-in-jsnjfz-webstack-g-afb11172</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13810%3A%20Path%20Traversal%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=692d3498a9f72c8cb92b0ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13809-server-side-request-forgery-in-orio-708d56f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13809%3A%20Server-Side%20Request%20Forgery%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d2adeda1a649aa335076c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tomiris-shifts-to-public-service-implants-for-stea-b3901418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tomiris%20Shifts%20to%20Public-Service%20Implants%20for%20Stealthier%20C2%20in%20Attacks%20on%20Government%20Targets&amp;severity=high&amp;id=692d3462a9f72c8cb92a5ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13808-improper-authorization-in-orionsec--8c4c4e01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13808%3A%20Improper%20Authorization%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d23d5da1a649aa3258a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13807-improper-authorization-in-orionsec--d343a0c1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13807%3A%20Improper%20Authorization%20in%20orionsec%20orion-ops&amp;severity=medium&amp;id=692d205cda1a649aa31ec292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13806-improper-authorization-in-nutzam-nu-37d1e542</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13806%3A%20Improper%20Authorization%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d19cffcc4df0b65192240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13805-deserialization-in-nutzam-nutzboot-34c3a164</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13805%3A%20Deserialization%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d142cfcc4df0b650cf5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13804-information-disclosure-in-nutzam-nu-499ce105</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13804%3A%20Information%20Disclosure%20in%20nutzam%20NutzBoot&amp;severity=medium&amp;id=692d0b4da0d303b752f438e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13803-improper-neutralization-of-http-hea-0a82351b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13803%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20MediaCrush&amp;severity=medium&amp;id=692d00c1a0d303b752e79ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13802-cross-site-scripting-in-jairiidriss-e4c1d826</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13802%3A%20Cross%20Site%20Scripting%20in%20jairiidriss%20RestaurantWebsite&amp;severity=medium&amp;id=692d00c1a0d303b752e79abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13800-command-injection-in-adslr-nbr1005g-f8520544</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13800%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692d142cfcc4df0b650cf5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13799-command-injection-in-adslr-nbr1005g-24c665f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13799%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692cebc9a0d303b752b9851e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13798-command-injection-in-adslr-nbr1005g-14264e60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13798%3A%20Command%20Injection%20in%20ADSLR%20NBR1005GPEV2&amp;severity=medium&amp;id=692ce4c3a0d303b752af5f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64772-uncontrolled-search-path-element-in-9a6721ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64772%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Sony%20Corporation%20INZONE%20Hub&amp;severity=high&amp;id=692ce4c3a0d303b752af5f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13797-command-injection-in-adslr-b-qe2w40-0cd980a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13797%3A%20Command%20Injection%20in%20ADSLR%20B-QE2W401&amp;severity=medium&amp;id=692ce4c3a0d303b752af5f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-12-01-863ff896</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-12-01&amp;severity=medium&amp;id=692e30f3f2f793a7dee80360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65622-na-684f92f8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65622%3A%20n%2Fa&amp;severity=medium&amp;id=692e0bb43937fa579fdf7d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65621-na-64722c3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65621%3A%20n%2Fa&amp;severity=medium&amp;id=692e048c3937fa579fd29250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65840-na-668e8e4a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65840%3A%20n%2Fa&amp;severity=high&amp;id=692e0147821c4e4a8f8d8927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65838-na-18568c3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65838%3A%20n%2Fa&amp;severity=high&amp;id=692df6be821c4e4a8f796b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65836-na-a3462f91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65836%3A%20n%2Fa&amp;severity=critical&amp;id=692df37565b70a5c71304505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63317-na-ba1b179c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63317%3A%20n%2Fa&amp;severity=medium&amp;id=692df37565b70a5c71304502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51683-na-99da478d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51683%3A%20n%2Fa&amp;severity=critical&amp;id=692deff365b70a5c712a42a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51682-na-08f33e0d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51682%3A%20n%2Fa&amp;severity=critical&amp;id=692deff365b70a5c712a429f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65407-na-15f7f6a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65407%3A%20n%2Fa&amp;severity=medium&amp;id=692ddeb01fcc71981e87429d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63365-na-11087d68</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63365%3A%20n%2Fa&amp;severity=high&amp;id=692ddeb01fcc71981e874299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65406-na-a2e7eb18</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65406%3A%20n%2Fa&amp;severity=medium&amp;id=692dca5195b0bac459490639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65408-na-e0724807</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65408%3A%20n%2Fa&amp;severity=medium&amp;id=692dca5195b0bac459490635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65405-na-62d6fe71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65405%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65404-na-a010ce37</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65404%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65403-na-e30f7141</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65403%3A%20n%2Fa&amp;severity=medium&amp;id=692dbfd095b0bac45939d911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63535-na-115cdd1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63535%3A%20n%2Fa&amp;severity=critical&amp;id=692dbca6f910530b0eb80e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63534-na-d0d3eae8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63534%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63533-na-18802aa8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63533%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63532-na-53d7bd51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63532%3A%20n%2Fa&amp;severity=critical&amp;id=692dbca6f910530b0eb80e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63095-na-cc5dd34c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63095%3A%20n%2Fa&amp;severity=medium&amp;id=692dbca6f910530b0eb80e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61229-na-bb15ef03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61229%3A%20n%2Fa&amp;severity=high&amp;id=692dbca6f910530b0eb80dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61228-na-0a743fe0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61228%3A%20n%2Fa&amp;severity=high&amp;id=692db927f910530b0eb07251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57489-na-b2d88c7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57489%3A%20n%2Fa&amp;severity=high&amp;id=692db927f910530b0eb0724c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32388-na-530730b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32388%3A%20n%2Fa&amp;severity=medium&amp;id=692db924f910530b0eb071de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39148-na-3ecdbd4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39148%3A%20n%2Fa&amp;severity=high&amp;id=692db924f910530b0eb071da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32384-na-ab0e8f0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32384%3A%20n%2Fa&amp;severity=medium&amp;id=692db924f910530b0eb071d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63531-na-e9583c69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63531%3A%20n%2Fa&amp;severity=critical&amp;id=692db372f910530b0ea42beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63529-na-3b40de4e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63529%3A%20n%2Fa&amp;severity=medium&amp;id=692db372f910530b0ea42be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63528-na-747148c1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63528%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63527-na-a50bb73c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63527%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63526-na-add4c57d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63526%3A%20n%2Fa&amp;severity=high&amp;id=692db372f910530b0ea42bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63525-na-9c0dc096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63525%3A%20n%2Fa&amp;severity=critical&amp;id=692db372f910530b0ea42bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63523-na-ef962f1f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63523%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63522-na-cc86a529</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63522%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63520-na-ffcdb15a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63520%3A%20n%2Fa&amp;severity=medium&amp;id=692db01b5d7189e19832fc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64030-na-bfb364a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64030%3A%20n%2Fa&amp;severity=medium&amp;id=692dacd15a8d386a3dc7783e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56089-na-1e567b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56089%3A%20n%2Fa&amp;severity=high&amp;id=692da9695a8d386a3dbfed88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13796-server-side-request-forgery-in-deco-846e4819</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13796%3A%20Server-Side%20Request%20Forgery%20in%20deco-cx%20apps&amp;severity=medium&amp;id=692cd729c368b5914d210412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13795-cross-site-scripting-in-codingwithe-18d89f69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13795%3A%20Cross%20Site%20Scripting%20in%20codingWithElias%20School%20Management%20System&amp;severity=medium&amp;id=692cd072a283b5b3e9fecc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2000-fake-shopping-sites-spotted-before-cyber-9abcac02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C000%20Fake%20Shopping%20Sites%20Spotted%20Before%20Cyber%20Monday&amp;severity=medium&amp;id=692cc966a283b5b3e9f242d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35028-cwe-78-improper-neutralization-of-s-2af51158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35028%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%200x4m4%20HexStrike%20AI&amp;severity=critical&amp;id=692cba459b44bc92c28db476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13793-cross-site-scripting-in-winston-dso-7dc87a72</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13793%3A%20Cross%20Site%20Scripting%20in%20winston-dsouza%20Ecommerce-Website&amp;severity=medium&amp;id=692c7b0378578326fc873245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13792-code-injection-in-qualitor-4749467e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13792%3A%20Code%20Injection%20in%20Qualitor&amp;severity=medium&amp;id=692c6db6979ac8a99b76f716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13791-path-traversal-in-scada-lts-5e427368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13791%3A%20Path%20Traversal%20in%20Scada-LTS&amp;severity=medium&amp;id=692c6a32979ac8a99b70b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13790-cross-site-request-forgery-in-scada-f87d91dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13790%3A%20Cross-Site%20Request%20Forgery%20in%20Scada-LTS&amp;severity=medium&amp;id=692c5d1e0c99497f3fe5ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13789-server-side-request-forgery-in-zent-13a43243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13789%3A%20Server-Side%20Request%20Forgery%20in%20ZenTao&amp;severity=medium&amp;id=692c516b90ddf300dc641733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13788-sql-injection-in-chanjet-crm-a9ca18f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13788%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=692c3f82c10e5a11c9bde77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13787-improper-privilege-management-in-ze-0d39d9cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13787%3A%20Improper%20Privilege%20Management%20in%20ZenTao&amp;severity=medium&amp;id=692c1e20395d5becff8a1cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13786-code-injection-in-taosir-wtcms-ce32bc49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13786%3A%20Code%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692c0aa1a4ca46306ac5b99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13785-information-disclosure-in-yungifez--1730f27a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13785%3A%20Information%20Disclosure%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=medium&amp;id=692bf7b982f933c5fe612651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13784-cross-site-scripting-in-yungifez-sk-076b65a5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13784%3A%20Cross%20Site%20Scripting%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=medium&amp;id=692befdd450a33c8c67db72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13783-sql-injection-in-taosir-wtcms-905c531c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13783%3A%20SQL%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692be26fb017dbc398eab769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13782-sql-injection-in-taosir-wtcms-d24634f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13782%3A%20SQL%20Injection%20in%20taosir%20WTCMS&amp;severity=medium&amp;id=692bb8adb00568eef0ca8d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13615-cwe-639-authorization-bypass-throug-06fc0649</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13615%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20phpface%20StreamTube%20Core&amp;severity=critical&amp;id=692ba718b00568eef09a0bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-30-e65b8263</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-30&amp;severity=medium&amp;id=692cdd3bc368b5914d2dc59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66433-na-b8b3153e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66433%3A%20CWE-863%20Incorrect%20Authorization%20in%20wisc%20HTCondor&amp;severity=medium&amp;id=692bcbdbd16937600915085f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66432-cwe-420-unprotected-alternate-chann-f1b4f789</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66432%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Oxide%20Omicron&amp;severity=medium&amp;id=692bcbdad169376009150859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66424-cwe-863-incorrect-authorization-in--40b2985b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66424%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tryton%20trytond&amp;severity=medium&amp;id=692bb1a5b00568eef0c40044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66423-cwe-863-incorrect-authorization-in--5b710efe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66423%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tryton%20trytond&amp;severity=high&amp;id=692bb1a5b00568eef0c40040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66422-cwe-402-transmission-of-private-res-a7619db8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66422%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Tryton%20trytond&amp;severity=medium&amp;id=692bb1a5b00568eef0c4003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66421-cwe-79-improper-neutralization-of-i-2fab24a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tryton%20sao&amp;severity=medium&amp;id=692bb1a5b00568eef0c40038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66420-cwe-79-improper-neutralization-of-i-645204a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tryton%20sao&amp;severity=medium&amp;id=692bb1a5b00568eef0c40034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japanese-beer-giant-asahi-says-data-breach-hit-15--dd1187eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japanese%20beer%20giant%20Asahi%20says%20data%20breach%20hit%201.5%20million%20people&amp;severity=high&amp;id=692b680900da60bff9a0c902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simulating-a-water-control-system-in-my-home-offic-f5abb7bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Simulating%20a%20Water%20Control%20System%20in%20my%20Home%20Office&amp;severity=medium&amp;id=692b29d7c0587105f6e364d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hashjack-attack-uses-url-to-control-ai-browser-beh-4c459c5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HashJack%20Attack%20Uses%20URL%20%E2%80%98%23%E2%80%99%20to%20Control%20AI%20Browser%20Behavior&amp;severity=medium&amp;id=692b020992c70cc0395cf6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-8-foundational-cache-poisoning-attacks-840e396a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%208%20Foundational%20Cache%20Poisoning%20Attacks%20(HackerOne%2C%20GitHub%2C%20Shopify)%20-%20Part%201&amp;severity=medium&amp;id=692af12898abb602783e1f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6666-use-of-hard-coded-cryptographic-key--bb4a6dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6666%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20motogadget%20mo.lock%20Ignition%20Lock&amp;severity=low&amp;id=692aba9af06c0845ceb4025c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66221-cwe-67-improper-handling-of-windows-867d4fea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66221%3A%20CWE-67%3A%20Improper%20Handling%20of%20Windows%20Device%20Names%20in%20pallets%20werkzeug&amp;severity=medium&amp;id=692a637a2a13ea799fe08f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53939-cwe-20-improper-input-validation-in-01cf8267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53939%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a637a2a13ea799fe08f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53900-cwe-267-privilege-defined-with-unsa-5e7c7ac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53900%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a637a2a13ea799fe08f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53899-cwe-941-incorrectly-specified-desti-f31f732d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53899%3A%20CWE-941%3A%20Incorrectly%20Specified%20Destination%20in%20a%20Communication%20Channel%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=692a637a2a13ea799fe08f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53897-cwe-352-cross-site-request-forgery--5e69dbc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53897%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kiteworks%20security-advisories&amp;severity=medium&amp;id=692a5c732a13ea799fd8c851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53896-cwe-613-insufficient-session-expira-eda8e740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53896%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20kiteworks%20security-advisories&amp;severity=high&amp;id=692a5c732a13ea799fd8c84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58436-cwe-400-uncontrolled-resource-consu-98ee79b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58436%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=692a5c732a13ea799fd8c854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61915-cwe-129-improper-validation-of-arra-80ae1c75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61915%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=692a5c732a13ea799fd8c859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66216-cwe-131-incorrect-calculation-of-bu-3c4fa0e3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66216%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20jvde-github%20AIS-catcher&amp;severity=critical&amp;id=692a5c732a13ea799fd8c85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66217-cwe-122-heap-based-buffer-overflow--af131106</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66217%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20jvde-github%20AIS-catcher&amp;severity=high&amp;id=692a5c732a13ea799fd8c862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66219-cwe-77-improper-neutralization-of-s-0fbda680</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66219%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20shama%20willitmerge&amp;severity=medium&amp;id=692a51f32a13ea799fcc56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66201-cwe-20-improper-input-validation-in-a3d24953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=692a51f32a13ea799fcc56d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66036-cwe-79-improper-neutralization-of-i-6cf236f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66036%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anjaliavv51%20Retro&amp;severity=medium&amp;id=692a51f32a13ea799fcc56d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66027-cwe-200-exposure-of-sensitive-infor-1a05c92c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66027%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lukevella%20rallly&amp;severity=high&amp;id=692a4ade2a13ea799f617d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65112-cwe-862-missing-authorization-in-ri-9362452e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65112%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ricardoboss%20PubNet&amp;severity=critical&amp;id=692a43d62a13ea799f1dc479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65113-cwe-770-allocation-of-resources-wit-71649b63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65113%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=692a43d62a13ea799f1dc47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-29-01219cc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-29&amp;severity=medium&amp;id=692b8ba76c75fe45dc732858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65892-na-0e21071f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65892%3A%20n%2Fa&amp;severity=medium&amp;id=692a6e062a13ea799fea6fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65540-na-95fcfa46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65540%3A%20n%2Fa&amp;severity=medium&amp;id=692a6e062a13ea799fea6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctf-challenge-malware-busters-c75ff592</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTF%20challenge%20Malware%20Busters&amp;severity=medium&amp;id=692a19f54121026312cc0fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-sensitive-secrets-published-on-jsonfo-e653ed90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20sensitive%20secrets%20published%20on%20JSONFormatter%20and%20CodeBeautify&amp;severity=medium&amp;id=692a12e74121026312ca6fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-football-federation-discloses-data-breach-a-88a35f0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Football%20Federation%20discloses%20data%20breach%20after%20cyberattack&amp;severity=high&amp;id=692a12e74121026312ca6fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-deploy-197-npm-packages-to-sp-0425e4ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Deploy%20197%20npm%20Packages%20to%20Spread%20Updated%20OtterCookie%20Malware&amp;severity=high&amp;id=692a12e74121026312ca6fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legacy-python-bootstrap-scripts-create-domain-take-958f5068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legacy%20Python%20Bootstrap%20Scripts%20Create%20Domain-Takeover%20Risk%20in%20Multiple%20PyPI%20Packages&amp;severity=high&amp;id=692a12e74121026312ca6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/public-gitlab-repositories-exposed-more-than-17000-96480a7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Public%20GitLab%20repositories%20exposed%20more%20than%2017%2C000%20secrets&amp;severity=high&amp;id=692a12e74121026312ca6fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-856be041</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20behind%20in-flight%20Evil%20Twin%20WiFi%20attacks%20gets%207%20years%20in%20prison&amp;severity=high&amp;id=692a0f614121026312c91890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13683-cwe-200-exposure-of-sensitive-infor-2906ec91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13683%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=6929d7244121026312b92a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legacy-python-bootstrap-scripts-create-domain-take-631a88f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legacy%20Python%20Bootstrap%20Scripts%20Create%20Domain-Takeover%20Risk%20in%20Multiple%20PyPI%20Packages&amp;severity=medium&amp;id=692a29aa4c03a75d3ff23714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12183-cwe-125-out-of-bounds-read-b6983615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12183%3A%20CWE-125%20Out-of-bounds%20Read&amp;severity=high&amp;id=6929c9154121026312b544be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58360-geoserver-xxe-vulnerability-analysi-5d5a526d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58360%3A%20GeoServer%20XXE%20Vulnerability%20Analysis&amp;severity=high&amp;id=6929b7954121026312ae528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-soccer-federation-hit-by-cyberattack-member-1ce3eda9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20Soccer%20Federation%20Hit%20by%20Cyberattack%2C%20Member%20Data%20Stolen&amp;severity=medium&amp;id=6929b7784121026312ae222e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11156-cwe-476-null-pointer-dereference-in-4bb6501e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11156%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=6929b3fd4121026312a8f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59792-reveals-plaintext-credentials-in-th-e4903382</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59792%3A%20Reveals%20plaintext%20credentials%20in%20the%20MONITOR%20command%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=medium&amp;id=6929b3fd4121026312a8f981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59790-cwe-269-improper-privilege-manageme-945d166a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59790%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=medium&amp;id=6929b3fd4121026312a8f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anonymized-case-study-autonomous-security-assessme-7f63d24c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anonymized%20case%20study%3A%20autonomous%20security%20assessment%20of%20a%20500-AMR%20fleet%20using%20AI%20%2B%20MCP&amp;severity=medium&amp;id=6929b07c4121026312a55e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-the-supply-chain-attack-that-learned-5c852516</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%3A%20the%20supply%20chain%20attack%20that%20learned&amp;severity=medium&amp;id=6929acf84121026312a3e051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-hanoi-thief-vietnam-apt-96bfacaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Hanoi%20Thief%3A%20Vietnam%20APT&amp;severity=medium&amp;id=6929efc34121026312bf9b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12638-cwe-22-improper-limitation-of-a-pat-1648d2c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12638%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20keras-team%20keras-team%2Fkeras&amp;severity=high&amp;id=6929b0784121026312a55d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12143-cwe-121-stack-based-buffer-overflow-c1f654ab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12143%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=6929945b41210263129c4da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-organizations-are-turning-to-rpam-d4109f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Organizations%20Are%20Turning%20to%20RPAM&amp;severity=critical&amp;id=692a29aa4c03a75d3ff2371a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-block-unauthorized-scripts-in-entra-i-ac077420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Block%20Unauthorized%20Scripts%20in%20Entra%20ID%20Logins%20with%202026%20CSP%20Update&amp;severity=high&amp;id=692982c7412102631296bd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-warns-of-hackers-hijacking-radio-equipment-for-734ac78b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20Warns%20of%20Hackers%20Hijacking%20Radio%20Equipment%20For%20False%20Alerts&amp;severity=high&amp;id=692982c7412102631296be39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-expands-java-based-netsupport-rat-atta-d8545856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Expands%20Java-based%20NetSupport%20RAT%20Attacks%20in%20Kyrgyzstan%20and%20Uzbekistan&amp;severity=high&amp;id=692982c7412102631296be3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-says-crooks-stole-data-of-approximately-2m-c-25e265e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20says%20crooks%20stole%20data%20of%20approximately%202M%20customers%20and%20employees&amp;severity=high&amp;id=692982c7412102631296be45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-teams-guest-access-can-remove-defender-protecti-b06f384b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MS%20Teams%20Guest%20Access%20Can%20Remove%20Defender%20Protection%20When%20Users%20Join%20External%20Tenants&amp;severity=high&amp;id=692982c7412102631296be41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-hashjack-ai-browser-attack-charming--d3146348</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20HashJack%20AI%20Browser%20Attack%2C%20Charming%20Kitten%20Leak%2C%20Hacker%20Unmasked&amp;severity=medium&amp;id=69297bb7412102631289558a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-anatomy-of-a-bulletproof-hoster-a-data-driven--93279e44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Anatomy%20of%20a%20Bulletproof%20Hoster%3A%20A%20Data-Driven%20Reconstruction%20of%20Media%20Land&amp;severity=medium&amp;id=692969ab5ab17d2ce149f3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-teams-guest-access-can-remove-defender-protecti-70143e9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MS%20Teams%20Guest%20Access%20Can%20Remove%20Defender%20Protection%20When%20Users%20Join%20External%20Tenants&amp;severity=low&amp;id=69296fac5ab17d2ce1532843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tomiris-tools-and-techniques-multiple-reverse--0bea187c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tomiris%20tools%20and%20techniques%3A%20multiple%20reverse%20shells%2C%20Havoc%2C%20AdaptixC2&amp;severity=medium&amp;id=6929601cbc8dfaadef995ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13771-cwe-23-relative-path-traversal-in-u-c33e17b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13771%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=692956f0c500e1d7cafe8eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13770-cwe-89-improper-neutralization-of-s-946f39a8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13770%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13769-cwe-89-improper-neutralization-of-s-01a3e986</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13769%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13768-cwe-639-authorization-bypass-throug-0fb8386f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13768%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Uniong%20WebITR&amp;severity=high&amp;id=69295336c500e1d7caf90dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13737-cwe-352-cross-site-request-forgery--29da6bbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13737%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nextendweb%20Nextend%20Social%20Login%20and%20Register&amp;severity=medium&amp;id=692919d1a7cba954100dd851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64312-cwe-200-exposure-of-sensitive-infor-c44f7481</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64312%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58311-cwe-416-use-after-free-in-huawei-ha-34cfef14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58311%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58308-cwe-358-improperly-implemented-secu-281d6016</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58308%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692917bace4290e3e3b61b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58305-cwe-200-exposure-of-sensitive-infor-4a6a6ccc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58305%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58304-cwe-199-information-management-erro-bc2c6c1f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58304%3A%20CWE-199%20Information%20Management%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692917bace4290e3e3b61b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58302-cwe-264-permissions-privileges-and--7634fe98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58302%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692917bace4290e3e3b61b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58294-cwe-264-permissions-privileges-and--1db5e7eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58294%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64313-cwe-362-concurrent-execution-using--64d05fa1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64313%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b5ce4290e3e3b49073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64311-cwe-200-exposure-of-sensitive-infor-fb01ff46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64311%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b4904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58315-cwe-264-permissions-privileges-and--fa1f7fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58315%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58314-cwe-125-out-of-bounds-read-in-huawe-272b5cd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58314%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58312-cwe-264-permissions-privileges-and--515b1b0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58312%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b4903f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58310-cwe-843-access-of-resource-using-in-fb95d159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58310%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b4903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58309-cwe-264-permissions-privileges-and--f6e7ff22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58309%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58307-cwe-416-use-after-free-in-huawei-ha-a02a4269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58307%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b4ce4290e3e3b49036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58316-cwe-362-concurrent-execution-using--fe7c0559</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58316%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b49048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58303-cwe-362-concurrent-execution-using--5d178b7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58303%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=692910b4ce4290e3e3b49033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64315-cwe-264-permissions-privileges-and--304046a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64315%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=692910b5ce4290e3e3b49079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64314-cwe-843-access-of-resource-using-in-e6e520d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64314%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=692910b5ce4290e3e3b49076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/write-path-traversal-to-a-rce-art-department-f881e664</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Write%20Path%20Traversal%20to%20a%20RCE%20Art%20Department&amp;severity=medium&amp;id=6928f819ce4290e3e38bcce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-28-f11bce42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-28&amp;severity=medium&amp;id=692a3a7eb7a5e2eddeb4ce26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51734-na-0332e4f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51734%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51733-na-765d452b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51733%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51736-na-da2d10de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51736%3A%20n%2Fa&amp;severity=medium&amp;id=6929b3fd4121026312a8f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51735-na-dbd30761</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51735%3A%20n%2Fa&amp;severity=high&amp;id=6929b3fd4121026312a8f96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66386-na-6a2f7f6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66386%3A%20n%2Fa&amp;severity=medium&amp;id=69294930842b163e002c8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66385-cwe-472-external-control-of-assumed-6cd61d91</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66385%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20cerebrate-project%20Cerebrate&amp;severity=critical&amp;id=69294930842b163e002c8ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66382-cwe-407-inefficient-algorithmic-com-2b279580</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66382%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20libexpat%20project%20libexpat&amp;severity=low&amp;id=69293eaf842b163e001fac42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66372-cwe-611-improper-restriction-of-xml-cc19678d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66372%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20mustangproject%20Mustang&amp;severity=low&amp;id=692919d1a7cba954100dd85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66371-cwe-611-improper-restriction-of-xml-d8b13d5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66371%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Iteras%20Peppol-py&amp;severity=medium&amp;id=692919d1a7cba954100dd856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2000-holiday-themed-fake-stores-detected-expl-a853a732</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C000%20Holiday-Themed%20Fake%20Stores%20Detected%20Exploiting%20Black%20Friday%20and%20Festive%20Sales&amp;severity=medium&amp;id=692963a0bc8dfaadef9e1242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-lumma-infostealer-e5da70e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Lumma%20infostealer&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/striking-panda-attacks-apt31-today-f48fd7d0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Striking%20Panda%20Attacks%3A%20APT31%20Today&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-minefield-between-syntaxes-exploiting-syntax-c-30e96f3a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20minefield%20between%20syntaxes%3A%20exploiting%20syntax%20confusions%20in%20the%20wild&amp;severity=medium&amp;id=69289ac3b57256b0ceacb0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-google-play-adware-drains-devices-and-disru-32f3ee1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Google%20Play%20Adware%20Drains%20Devices%20and%20Disrupts%20Millions%20of%20Users&amp;severity=medium&amp;id=6928a076fbb391e68ec3ea85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bloody-wolf-expands-java-based-netsupport-rat-atta-abc9a98f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bloody%20Wolf%20Expands%20Java-based%20NetSupport%20RAT%20Attacks%20in%20Kyrgyzstan%20and%20Uzbekistan&amp;severity=medium&amp;id=6928a707fbb391e68ecd6349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3261-d09052f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3261&amp;severity=null&amp;id=69413e06b7167ed5be6e7a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/report-names-teen-leader-in-scattered-lapsus-hunte-623e9256</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Report%20Names%20Teen%20Leader%20in%20Scattered%20LAPSUS%24%20Hunters%2C%20Group%20Denies&amp;severity=medium&amp;id=692889c8d91ec0679dc7afb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-your-dashcam-can-be-hacked-and-how-to-protect--1b4bd895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20your%20dashcam%20can%20be%20hacked%2C%20and%20how%20to%20protect%20yourself%20from%20the%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69288043d78caf05d336200b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-data-breach-impacts-2-million-individuals-a7c325a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20Data%20Breach%20Impacts%202%20Million%20Individuals&amp;severity=medium&amp;id=6928742ba95a569c55df0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-to-block-unauthorized-scripts-in-entra-i-f0c0afec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20to%20Block%20Unauthorized%20Scripts%20in%20Entra%20ID%20Logins%20with%202026%20CSP%20Update&amp;severity=medium&amp;id=69287307a95a569c55dd0617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13758-cwe-200-exposure-of-sensitive-infor-e714e54c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13758%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=low&amp;id=69287327a95a569c55dd13ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13757-cwe-89-improper-neutralization-of-s-8330a6fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13757%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Devolutions%20Server&amp;severity=high&amp;id=69287327a95a569c55dd13ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13765-cwe-200-exposure-of-sensitive-infor-cc4237c2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13765%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Server&amp;severity=medium&amp;id=69287327a95a569c55dd13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-learn-to-spot-risks-and-patch-safely-with--2fee78ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%3A%20Learn%20to%20Spot%20Risks%20and%20Patch%20Safely%20with%20Community-Maintained%20Tools&amp;severity=medium&amp;id=6926ecac61dc91128fa49d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-campaign-targets-cloud-and-developer-5f484eef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-hulud%202.0%20Campaign%20Targets%20Cloud%20and%20Developer%20Ecosystems&amp;severity=medium&amp;id=692896ecb57256b0cea75afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defending-against-sha1-hulud-the-second-coming-138ea839</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Defending%20Against%20Sha1-Hulud%3A%20The%20Second%20Coming&amp;severity=medium&amp;id=69289abfb57256b0ceacaf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-take-aim-at-zendesk-users-4b334816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Take%20Aim%20At%20Zendesk%20Users&amp;severity=medium&amp;id=69289abfb57256b0ceacaf2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12140-cwe-95-improper-neutralization-of-d-9f4885f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12140%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Simple%20SA%20Wirtualna%20Uczelnia&amp;severity=critical&amp;id=69285b2504903f3285f53283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13692-cwe-79-improper-neutralization-of-i-3aee33f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20for%20Elementor%20(Premium)&amp;severity=high&amp;id=69285b2504903f3285f53286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8890-cwe-78-improper-neutralization-of-sp-8ed5a589</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8890%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SDMC%20NE6037&amp;severity=critical&amp;id=6928580d8c27b4da49ad4164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12971-cwe-863-incorrect-authorization-in--8159a52a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12971%3A%20CWE-863%20Incorrect%20Authorization%20in%20galdub%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=692846e93362f74ea5ac7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-api-user-data-exposed-in-mixpanel-breach-ch-be101941</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20API%20User%20Data%20Exposed%20in%20Mixpanel%20Breach%2C%20ChatGPT%20Unaffected&amp;severity=high&amp;id=6928435b3362f74ea5a84fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-user-data-exposed-in-mixpanel-hack-9500f574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20User%20Data%20Exposed%20in%20Mixpanel%20Hack&amp;severity=medium&amp;id=69283fd73362f74ea5a3c3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54057-cwe-80-improper-neutralization-of-s-4c986984</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54057%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20SkyWalking&amp;severity=medium&amp;id=69283d66e4a84287b53ab814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59302-cwe-94-improper-control-of-generati-e3d69fd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59302%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=69283d66e4a84287b53ab817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59454-cwe-200-exposure-of-sensitive-infor-ca53fcba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59454%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=69283990e4a84287b535af7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10476-cwe-862-missing-authorization-in-em-4d5a9e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10476%3A%20CWE-862%20Missing%20Authorization%20in%20emrevona%20WP%20Fastest%20Cache&amp;severity=medium&amp;id=692830538da2ca36c17c097d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadowv2-botnet-malware-used-aws-outage-as-a-t-23d42e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ShadowV2%20botnet%20malware%20used%20AWS%20outage%20as%20a%20test%20opportunity&amp;severity=high&amp;id=692830138da2ca36c17ac485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gainsight-expands-impacted-customer-list-following-e2e01d8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gainsight%20Expands%20Impacted%20Customer%20List%20Following%20Salesforce%20Security%20Alert&amp;severity=high&amp;id=692830138da2ca36c17ac47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-asus-firmware-patches-critical-aicloud-vulnera-cb199cbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ASUS%20firmware%20patches%20critical%20AiCloud%20vulnerability&amp;severity=critical&amp;id=692830138da2ca36c17ac495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59890-cwe-22-improper-limitation-of-a-pat-88960ab6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59890%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20Eaton%20Galileo%20Software&amp;severity=high&amp;id=692830538da2ca36c17c0982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-malware-voice-bot-flaws-cry-3d473ab6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Malware%2C%20Voice%20Bot%20Flaws%2C%20Crypto%20Laundering%2C%20IoT%20Attacks%20%E2%80%94%20and%2020%20More%20Stories&amp;severity=medium&amp;id=69282ff98da2ca36c17aa522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13381-cwe-862-missing-authorization-in-ay-b9d40858</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13381%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6928251f23c3d7b26904cfc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12584-cwe-200-exposure-of-sensitive-infor-601896ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12584%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shapedplugin%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=6928251f23c3d7b26904cfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13378-cwe-918-server-side-request-forgery-a74da752</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13378%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ays-pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=medium&amp;id=6928251f23c3d7b26904cfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59026-improper-neutralization-of-input-du-c10b944c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59025-improper-neutralization-of-input-du-4ac474c2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30190-improper-neutralization-of-input-du-aa9e66c4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30186-improper-neutralization-of-input-du-7a642821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=6928251f23c3d7b26904cfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13536-cwe-434-unrestricted-upload-of-file-7c738957</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13536%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blubrry%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=high&amp;id=69280bc90a6cf06979bbe46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gainsight-expands-impacted-customer-list-following-dd52ef0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gainsight%20Expands%20Impacted%20Customer%20List%20Following%20Salesforce%20Security%20Alert&amp;severity=low&amp;id=6928158e0a6cf06979c7df35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13157-cwe-639-authorization-bypass-throug-6a374371</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13157%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20qodeinteractive%20QODE%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=6927f676e2794b4b765ba39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13441-cwe-862-missing-authorization-in-th-5792aedb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13441%3A%20CWE-862%20Missing%20Authorization%20in%20themesupport%20Hide%20Category%20by%20User%20Role%20for%20WooCommerce&amp;severity=medium&amp;id=6927f676e2794b4b765ba3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13143-cwe-352-cross-site-request-forgery--69e8fcd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20assafp%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=medium&amp;id=6927e4dfbdf69728cfe5941f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13525-cwe-79-improper-neutralization-of-i-0faf5d90</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13525%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=medium&amp;id=6927e4dfbdf69728cfe59424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12123-cwe-79-improper-neutralization-of-i-73b7032f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Customer%20Reviews%20Collector%20for%20WooCommerce&amp;severity=medium&amp;id=6927e15abdf69728cfdf7dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12185-cwe-79-improper-neutralization-of-i-e9613167</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20era404%20StaffList&amp;severity=medium&amp;id=6927e15abdf69728cfdf7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12758-incomplete-filtering-of-one-or-more-f9d94ef8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12758%3A%20Incomplete%20Filtering%20of%20One%20or%20More%20Instances%20of%20Special%20Elements%20in%20validator&amp;severity=high&amp;id=6927e863bdf69728cfecb8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13539-cwe-288-authentication-bypass-using-44fd7030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13539%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated%20Themes%20FindAll%20Membership&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13540-cwe-269-improper-privilege-manageme-f3141125</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13540%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Qode%20Interactive%20Tiare%20Membership&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13680-cwe-269-improper-privilege-manageme-0f199875</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13680%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DirectoryThemes%20Tiger&amp;severity=high&amp;id=6927d764d4a4bdffcb26cfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12151-cwe-79-improper-neutralization-of-i-ee87367f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12151%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20presstigers%20Simple%20Folio&amp;severity=medium&amp;id=6927d764d4a4bdffcb26cfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13675-cwe-269-improper-privilege-manageme-85b1b12c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13675%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20DirectoryThemes%20Tiger&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7820-cwe-602-client-side-enforcement-of-s-0b0e758f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7820%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20sonalsinha21%20SKT%20PayPal%20for%20WooCommerce&amp;severity=high&amp;id=6927d764d4a4bdffcb26cfef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13538-cwe-269-improper-privilege-manageme-2da30aa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13538%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Elated%20Themes%20FindAll%20Listing&amp;severity=critical&amp;id=6927d764d4a4bdffcb26cfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3784-cwe-312-cleartext-storage-of-sensiti-7fd774ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3784%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works2&amp;severity=medium&amp;id=6927d764d4a4bdffcb26cfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-20-aggressive-automated-one-of-fastest--07e41a5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%202.0%3A%20Aggressive%20%26%20Automated%2C%20One%20Of%20Fastest%20Spreading%20NPM%20Supply%20Chain%20Attacks%20Ever%20Observed&amp;severity=medium&amp;id=692811bf0a6cf06979c24620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13762-cwe-20-improper-input-validation-in-ce05c470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13762%3A%20CWE-20%20Improper%20Input%20Validation%20in%20CyberArk%20CyberArk%20Secure%20Web%20Sessions%20Extension&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34351-cwe-1188-insecure-default-initializ-f281119f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34351&amp;severity=null&amp;id=6927bf816cbf1e727e3d95b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12713-cwe-79-improper-neutralization-of-i-1718eaa9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpoets%20Soundslides&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12670-cwe-79-improper-neutralization-of-i-de942f80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realin%20wp-twitpic&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12649-cwe-79-improper-neutralization-of-i-43125712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sscovil%20SortTable%20Post&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12579-cwe-862-missing-authorization-in-rn-c5d3a5b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12579%3A%20CWE-862%20Missing%20Authorization%20in%20rnags%20Reuters%20Direct&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12712-cwe-79-improper-neutralization-of-i-49f652f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gungorbudak%20Shouty&amp;severity=medium&amp;id=6927bf816cbf1e727e3d95a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12666-cwe-79-improper-neutralization-of-i-6459155c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oscaruh%20Google%20Drive%20upload%20and%20download%20link&amp;severity=medium&amp;id=6927bf816cbf1e727e3d959d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12578-cwe-352-cross-site-request-forgery--f2ee19d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12578%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rnags%20Reuters%20Direct&amp;severity=medium&amp;id=6927bf816cbf1e727e3d9591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66314-cwe-269-improper-privilege-manageme-beee8dfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66314%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20ElasticNet%20UME%20R32&amp;severity=high&amp;id=6927c23b485554d54fc0aeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5540-cwe-79-improper-neutralization-of-in-0faf2177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Automated%20Logic%20WebCTRL&amp;severity=medium&amp;id=6927a51dd322a87b22026c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5539-cwe-863-incorrect-authorization-in-a-7bbf2753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5539%3A%20CWE-863%20Incorrect%20Authorization%20in%20Automated%20Logic%20WebCTRL&amp;severity=critical&amp;id=6927a51dd322a87b22026c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0657-cwe-129-improper-validation-of-array-7ab615cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0657%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Automated%20Logic%20WebCtrl&amp;severity=high&amp;id=6927a51dd322a87b22026c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0658-cwe-20-improper-input-validation-in--8332e6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0658%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Automated%20Logic%20Zone%20Controllers&amp;severity=high&amp;id=6927a51dd322a87b22026c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taking-down-nextjs-servers-for-00001-cents-a-pop-db11161b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taking%20down%20Next.js%20servers%20for%200.0001%20cents%20a%20pop&amp;severity=medium&amp;id=6927a526d322a87b22027793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-27-3147ae7b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-27&amp;severity=medium&amp;id=6928e9f7ce4290e3e3801337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66359-cwe-79-improper-neutralization-of-i-bce74ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66359%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Logpoint%20SIEM&amp;severity=high&amp;id=6928e52bb0d67dda9e89c4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66361-cwe-1336-improper-neutralization-of-b4988fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66361%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Logpoint%20SIEM&amp;severity=medium&amp;id=6928e1a8b0d67dda9e866c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66360-na-f39aee65</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66360%3A%20CWE-863%20Incorrect%20Authorization%20in%20Logpoint%20SIEM&amp;severity=medium&amp;id=6928e1a8b0d67dda9e866c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66040-cwe-79-improper-neutralization-of-i-feae1efd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66040%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spotipy-dev%20spotipy&amp;severity=low&amp;id=69278c4fd322a87b22e753d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64344-cwe-121-stack-based-buffer-overflow-7b45fa15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64344%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64330-cwe-122-heap-based-buffer-overflow--03ddec2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64330%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64331-cwe-121-stack-based-buffer-overflow-cc09d2c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64331%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64332-cwe-121-stack-based-buffer-overflow-008e619e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64332%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64333-cwe-121-stack-based-buffer-overflow-f4c8e327</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64333%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=high&amp;id=692788ccd322a87b22e671c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64335-cwe-476-null-pointer-dereference-in-7e4440db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64335%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=69278547d322a87b22e58f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64334-cwe-770-allocation-of-resources-wit-1573ef25</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64334%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20suricata&amp;severity=high&amp;id=69278547d322a87b22e58f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40934-cwe-347-improper-verification-of-cr-41470759</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40934%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20TIMLEGGE%20XML%3A%3ASig&amp;severity=critical&amp;id=69278547d322a87b22e58f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62593-cwe-94-improper-control-of-generati-15eefc0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62593%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ray-project%20ray&amp;severity=critical&amp;id=692781c3d322a87b22e508d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66030-cwe-190-integer-overflow-or-wraparo-3fa7f465</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66030%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20digitalbazaar%20forge&amp;severity=medium&amp;id=692781c3d322a87b22e508d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66031-cwe-674-uncontrolled-recursion-in-d-86f64623</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66031%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20digitalbazaar%20forge&amp;severity=high&amp;id=692781c3d322a87b22e508d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prepared-statements-prepared-to-be-vulnerable-c5843ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prepared%20Statements%3F%20Prepared%20to%20Be%20Vulnerable.&amp;severity=medium&amp;id=6927773bd322a87b22e1900c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-campaign-spreads-from-npm-to-maven-e-e43b1915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20v2%20Campaign%20Spreads%20From%20npm%20to%20Maven%2C%20Exposing%20Thousands%20of%20Secrets&amp;severity=high&amp;id=69277031d322a87b22d93289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comcast-to-pay-15m-fine-for-vendor-breach-affectin-15e2b2fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Comcast%20to%20pay%20%241.5M%20fine%20for%20vendor%20breach%20affecting%20270K%20customers&amp;severity=high&amp;id=69277031d322a87b22d93275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-exchange-on-premises-hardening-recommend-05d003bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Exchange%20on-premises%20hardening%20recommendations&amp;severity=medium&amp;id=692761520192bc7fb417f8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-v2-campaign-spreads-from-npm-to-maven-e-fa4ca7d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20v2%20Spreads%20From%20npm%20to%20Maven%2C%20as%20Campaign%20Exposes%20Thousands%20of%20Secrets&amp;severity=medium&amp;id=692742820de433ec09574d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-london-councils-it-systems-disrupted-by-c-1d0bc672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20London%20councils&apos;%20IT%20systems%20disrupted%20by%20cyberattack&amp;severity=high&amp;id=692740b70de433ec0954ddaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20373-information-written-to-log-files-ca-9bcabc97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20373%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Add-on%20for%20Palo%20Alto%20Networks&amp;severity=low&amp;id=692740e20de433ec09559d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-rey-the-admin-of-scattered-lapsus-hunters-2cbca93a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20Rey%2C%20the%20Admin%20of%20%E2%80%98Scattered%20Lapsus%24%20Hunters%E2%80%99&amp;severity=high&amp;id=692740b70de433ec0954ddae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64130-cwe-79-in-zenitel-tciv-3-929b32fb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64130%3A%20CWE-79%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64129-cwe-787-in-zenitel-tciv-3-0105844f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64129%3A%20CWE-787%20in%20Zenitel%20TCIV-3%2B&amp;severity=high&amp;id=692740e20de433ec09559d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64128-cwe-78-in-zenitel-tciv-3-0d3761ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64128%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64127-cwe-78-in-zenitel-tciv-3-84453c4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64127%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=692740e20de433ec09559d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64126-cwe-78-in-zenitel-tciv-3-b8427054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64126%3A%20CWE-78%20in%20Zenitel%20TCIV-3%2B&amp;severity=critical&amp;id=69273d3b0de433ec0950b8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11461-cwe-89-improper-neutralization-of-s-54232b2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11461%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Frappe%20Frappe%20CRM&amp;severity=high&amp;id=69273d3b0de433ec0950b8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13084-cwe-1230-in-opto-22-groov-view-serv-2f8b3269</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13084%3A%20CWE-1230%20in%20Opto%2022%20groov%20View%20Server&amp;severity=high&amp;id=69273d3b0de433ec0950b8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2486-cwe-489-active-debug-code-in-ubuntu--23368ecd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2486%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Ubuntu%20edk2&amp;severity=low&amp;id=69273d3b0de433ec0950b8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-flaw-in-guest-chat-exposes-users-t-3aef71f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Flaw%20in%20Guest%20Chat%20Exposes%20Users%20to%20Malware%20Attacks&amp;severity=medium&amp;id=6927292a6d0980878b38f69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13601-integer-overflow-or-wraparound-in-r-d06b12db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13601%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=6927165b55a49d3da8582be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-turns-south-korean-msp-breach-int-f8b9a17d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Turns%20South%20Korean%20MSP%20Breach%20Into%2028-Victim%20&apos;Korean%20Leaks&apos;%20Data%20Heist&amp;severity=medium&amp;id=69272577b6bca73b242a39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/account-takeover-fraud-caused-262-million-in-losse-14aa653e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Account%20Takeover%20Fraud%20Caused%20%24262%20Million%20in%20Losses%20in%202025%3A%20FBI&amp;severity=medium&amp;id=69270231b9c2c409f8ba71ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extension-caught-injecting-hidden-solana-tr-d47d585b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extension%20Caught%20Injecting%20Hidden%20Solana%20Transfer%20Fees%20Into%20Raydium%20Swaps&amp;severity=high&amp;id=6926fec1b9c2c409f8b5f62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emergency-alerts-go-dark-after-cyberattack-on-onso-c32fe61f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emergency%20alerts%20go%20dark%20after%20cyberattack%20on%20OnSolve%20CodeRED&amp;severity=critical&amp;id=6926fec1b9c2c409f8b5f62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-warns-of-new-critical-auth-bypass-flaw-in-aic-fad848af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20warns%20of%20new%20critical%20auth%20bypass%20flaw%20in%20AiCloud%20routers&amp;severity=critical&amp;id=6926fec1b9c2c409f8b5f617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/huawei-and-chinese-surveillance-schneier-on-securi-cfffc460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Huawei%20and%20Chinese%20Surveillance%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6926fec1b9c2c409f8b5f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samourai-wallet-founders-jailed-in-237m-crypto-lau-e7b2dd89</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samourai%20Wallet%20Founders%20Jailed%20in%20%24237M%20Crypto%20Laundering%20Case&amp;severity=medium&amp;id=6926fec1b9c2c409f8b5f633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-secrets-leaked-on-code-formatting-pla-8e6126c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Secrets%20Leaked%20on%20Code%20Formatting%20Platforms&amp;severity=medium&amp;id=6926fbd76359f79d717e3c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9163-cwe-79-improper-neutralization-of-in-f51dd7cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=6926f4dc6359f79d7175be7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9191-cwe-502-deserialization-of-untrusted-b006c9a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9191%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=6926f4dc6359f79d7175be81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-2m-security-detection-fails-can-your-soc-3811423b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Your%20%242M%20Security%20Detection%20Fails%3A%20Can%20your%20SOC%20Save%20You%3F&amp;severity=medium&amp;id=6926fd0d6359f79d7180ab34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-disrupts-local-emergency-alert-s-b751d60a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20Disrupts%20Local%20Emergency%20Alert%20System%20Across%20US&amp;severity=medium&amp;id=6926e7de61dc91128fa26c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13674-cwe-824-access-of-uninitialized-poi-b421819d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13674%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6926e80361dc91128fa27e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-battlefield-6-downloads-are-spreading-malware-8d167e86</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Battlefield%206%20Downloads%20Are%20Spreading%20Malware%2C%20Stealing%20Player%20Data&amp;severity=medium&amp;id=6926e46361dc91128f9eb0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-extension-caught-injecting-hidden-solana-tr-8ad50597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Extension%20Caught%20Injecting%20Hidden%20Solana%20Transfer%20Fees%20Into%20Raydium%20Swaps&amp;severity=medium&amp;id=6926ecac61dc91128fa49d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-dprks-fake-job-platform-targeting-us-ai-tal-2a631b5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20DPRK&apos;s%20Fake%20Job%20Platform%20Targeting%20U.S.%20AI%20Talent&amp;severity=medium&amp;id=6926d42e63e47a62eb4f31d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-bear-attacks-what-we-learned-about-the-phishin-38596e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20&apos;Bear&apos;%20attacks%3A%20what%20we%20learned%20about%20the%20phishing%20campaign%20targeting%20Russian%20organizations&amp;severity=medium&amp;id=6926ceff91609981b6f87aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59390-cwe-338-use-of-cryptographically-we-fab80e5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59390%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Apache%20Software%20Foundation%20Apache%20Druid&amp;severity=critical&amp;id=6926c34b1118926627ff927f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62728-cwe-89-improper-neutralization-of-s-63531780</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62728%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Hive&amp;severity=medium&amp;id=6926bfc71118926627fad662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/romcom-uses-socgholish-fake-update-attacks-to-deli-3b7e2b90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RomCom%20Uses%20SocGholish%20Fake%20Update%20Attacks%20to%20Deliver%20Mythic%20Agent%20Malware&amp;severity=high&amp;id=6926d02d91609981b6fb17d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dartmouth-college-confirms-data-theft-in-oracle-ha-7d4b6406</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dartmouth%20College%20Confirms%20Data%20Theft%20in%20Oracle%20Hack&amp;severity=medium&amp;id=6926b9bda99853a7c84011a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-malware-deploys-in-fake-job-scams-02afef83</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20Malware%20Deploys%20in%20Fake%20Job%20Scams&amp;severity=medium&amp;id=6926d198986a99cf1699507a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13735-cwe-125-out-of-bounds-read-in-asr-l-b8cf832b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13735%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASR%20Lapwing_Linux&amp;severity=high&amp;id=69269d33e3ad539e3a6f9c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12061-cwe-862-missing-authorization-in-ta-a0548111</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12061%3A%20CWE-862%20Missing%20Authorization%20in%20TAX%20SERVICE%20Electronic%20HDM&amp;severity=high&amp;id=692699b0e3ad539e3a6b2fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9557-buffer-copy-without-checking-size-of-89d49424</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9557%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=6926a089ecc6d4a57428146b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9558-buffer-copy-without-checking-size-of-92e9b220</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9558%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=6926a089ecc6d4a57428146e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64983-active-debug-code-in-switchbot-smar-354c7303</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64983%3A%20Active%20debug%20code%20in%20SwitchBot%20Smart%20Video%20Doorbell&amp;severity=high&amp;id=692685df1243ed466a4a3826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-reports-262m-in-ato-fraud-as-researchers-cite--76989253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Reports%20%24262M%20in%20ATO%20Fraud%20as%20Researchers%20Cite%20Growing%20AI%20Phishing%20and%20Holiday%20Scams&amp;severity=medium&amp;id=692687361243ed466a4d4606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66022-cwe-829-inclusion-of-functionality--623a9be1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66022%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20factionsecurity%20faction&amp;severity=critical&amp;id=692669caca41832e1e64f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66021-cwe-79-improper-neutralization-of-i-7d7cb5f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66021%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OWASP%20java-html-sanitizer&amp;severity=high&amp;id=69265f3eca41832e1e61653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66020-cwe-1333-inefficient-regular-expres-926f4261</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66020%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20open-circle%20valibot&amp;severity=high&amp;id=69265f3eca41832e1e61653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66269-cwe-428-unquoted-search-path-or-ele-5703f7c2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66269%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20MegaTec%20Taiwan%20UPSilon2000V6.0&amp;severity=high&amp;id=69265f3eca41832e1e616544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66266-cwe-269-improper-privilege-manageme-76992282</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66266%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MegaTec%20Taiwan%20UPSilon2000V6.0&amp;severity=critical&amp;id=69265f3eca41832e1e616541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66265-cwe-269-improper-privilege-manageme-b38de6bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66265%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MegaTec%20Taiwan%20ClientMate&amp;severity=medium&amp;id=692654b3ca41832e1e5d9fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66264-cwe-428-unquoted-search-path-or-ele-074b793e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66264%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20MegaTec%20Taiwan%20ClientMate&amp;severity=high&amp;id=692654b3ca41832e1e5d9fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66263-cwe-158-unauthenticated-arbitrary-f-a58d8583</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66263%3A%20CWE-158%20Unauthenticated%20Arbitrary%20File%20Read%20via%20Null%20Byte%20Injection%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66262-cwe-22-arbitrary-file-overwrite-via-a79c9cf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66262%3A%20CWE-22%20Arbitrary%20File%20Overwrite%20via%20Tar%20Extraction%20Path%20Traversal%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66261-cwe-78-unauthenticated-os-command-i-e3fa977a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66261%3A%20CWE-78%20Unauthenticated%20OS%20Command%20Injection%20(restore_settings.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66260-cwe-89-postgresql-sql-injection-sta-d7104582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66260%3A%20CWE-89%20PostgreSQL%20SQL%20Injection%20(status_sql.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66259-cwe-20-improper-input-validation-in-9a138e69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66259%3A%20CWE-20%20Improper%20Input%20Validation%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=692654b3ca41832e1e5d9fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66258-cwe-79-stored-cross-site-scripting--3eccfa79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66258%3A%20CWE-79%20Stored%20Cross-Site%20Scripting%20via%20XML%20Injection%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=692654b3ca41832e1e5d9faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66257-cwe-73-unauthenticated-arbitrary-fi-71769393</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66257%3A%20CWE-73%20Unauthenticated%20Arbitrary%20File%20Deletion%20(patch_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66256-cwe-434-unauthenticated-arbitrary-f-2dcb4ccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66256%3A%20CWE-434%20Unauthenticated%20Arbitrary%20File%20Upload%20(patch_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66255-cwe-345-unauthenticated-arbitrary-f-93802dee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66255%3A%20CWE-345%20Unauthenticated%20Arbitrary%20File%20Upload%20(upgrade_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66254-cwe-73-unauthenticated-arbitrary-fi-f3c91cb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66254%3A%20CWE-73%20Unauthenticated%20Arbitrary%20File%20Deletion%20(upgrade_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66253-cwe-78-unauthenticated-os-command-i-fb13e787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66253%3A%20CWE-78%20Unauthenticated%20OS%20Command%20Injection%20(start_upgrade.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66252-cwe-835-infinite-loop-denial-of-ser-fec7f0b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66252%3A%20CWE-835%20Infinite%20Loop%20Denial%20of%20Service%20via%20Failed%20File%20Deletion%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66251-cwe-22-unauthenticated-path-travers-5efd3afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66251%3A%20CWE-22%20Unauthenticated%20Path%20Traversal%20with%20Arbitrary%20File%20Deletion%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=high&amp;id=69265837ca41832e1e5f38ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66250-cwe-434-unauthenticated-arbitrary-f-5729bc0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66250%3A%20CWE-434%20Unauthenticated%20Arbitrary%20File%20Upload%20(status_contents.php)%20in%20DB%20Electronica%20Telecomunicazioni%20S.p.A.%20Mozart%20FM%20Transmitter&amp;severity=critical&amp;id=69265837ca41832e1e5f38ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-us-engineering-firm-because-46b2dde5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20US%20Engineering%20Firm%20Because%20of%20Work%20Done%20for%20Ukrainian%20Sister%20City&amp;severity=medium&amp;id=69264a35ca41832e1e4a7332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64657-cwe-121-stack-based-buffer-overflow-b2c66871</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64657%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Azure%20App%20Gateway&amp;severity=critical&amp;id=69264a57ca41832e1e4ac27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64656-cwe-125-out-of-bounds-read-in-micro-1400505a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64656%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Azure%20App%20Gateway&amp;severity=critical&amp;id=69264a57ca41832e1e4ac279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sha1-hulud-november-2025-ef47d469</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sha1-Hulud%20-%20November%202025&amp;severity=medium&amp;id=692aac9afd873eca28420b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-gainsight-security-advisory-nov-2025-a3c77be3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Gainsight%20Security%20Advisory%20-%20Nov%202025&amp;severity=medium&amp;id=692aac9afd873eca28420b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-26-7e304bfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-26&amp;severity=medium&amp;id=692796c5d322a87b22e9fdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65202-na-fd92ebc5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65202%3A%20n%2Fa&amp;severity=high&amp;id=69276a3ac7c0a5a0bac75a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65670-na-2d1ed691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65670%3A%20n%2Fa&amp;severity=medium&amp;id=69275cdeea1ddeeb60e50d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50433-na-afb79f46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50433%3A%20n%2Fa&amp;severity=critical&amp;id=69275cdeea1ddeeb60e50d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65278-na-a2e04951</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65278%3A%20n%2Fa&amp;severity=high&amp;id=6927595aea1ddeeb60e12f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65276-na-2020b873</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65276%3A%20n%2Fa&amp;severity=critical&amp;id=6927595aea1ddeeb60e12f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65669-na-a0b4ef9b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65669%3A%20n%2Fa&amp;severity=critical&amp;id=6927505dbd9e0dd06440c115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65676-na-e5efbf4f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65676%3A%20n%2Fa&amp;severity=medium&amp;id=69274dc48e37a182565e4564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65681-na-6c4d9912</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65681%3A%20n%2Fa&amp;severity=low&amp;id=69274dc48e37a182565e455f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65675-na-3b152de7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65675%3A%20n%2Fa&amp;severity=medium&amp;id=69274a408e37a182565a4464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65672-na-bb986b43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65672%3A%20n%2Fa&amp;severity=high&amp;id=69274a408e37a182565a445f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26155-na-be652fc3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26155%3A%20n%2Fa&amp;severity=critical&amp;id=692746bc8e37a182565603e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55471-na-a54153ca</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55471%3A%20n%2Fa&amp;severity=high&amp;id=692743458e37a1825651967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55469-na-bcd4665a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55469%3A%20n%2Fa&amp;severity=critical&amp;id=692740e20de433ec09559d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65237-na-d15c28a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65237%3A%20n%2Fa&amp;severity=medium&amp;id=692733b56d0980878b469f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65235-na-98e99aa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65235%3A%20n%2Fa&amp;severity=critical&amp;id=692733b56d0980878b469f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65236-na-13518308</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65236%3A%20n%2Fa&amp;severity=critical&amp;id=692733b56d0980878b469f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65238-na-dc948eb8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65238%3A%20n%2Fa&amp;severity=medium&amp;id=69272cad6d0980878b3dd34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65239-na-834ea9f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65239%3A%20n%2Fa&amp;severity=medium&amp;id=6927289df2ee3b97400f2f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63938-na-8fc327f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63938%3A%20n%2Fa&amp;severity=medium&amp;id=6927289df2ee3b97400f2f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46175-na-95c4841f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46175%3A%20n%2Fa&amp;severity=high&amp;id=6927289df2ee3b97400f2f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46174-na-3144f751</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46174%3A%20n%2Fa&amp;severity=high&amp;id=692726ab522797cb4ab1a601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50399-na-abe5ecbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50399%3A%20n%2Fa&amp;severity=critical&amp;id=692723bab6bca73b24276606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45311-na-f8479b24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45311%3A%20n%2Fa&amp;severity=high&amp;id=692723bab6bca73b24276602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50402-na-44c40abd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50402%3A%20n%2Fa&amp;severity=critical&amp;id=692723bab6bca73b242765fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56396-na-0c5d1b49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56396%3A%20n%2Fa&amp;severity=high&amp;id=692723bab6bca73b242765f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59820-cwe-1284-improper-validation-of-spe-846057d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59820%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20KDE%20Krita&amp;severity=medium&amp;id=692699b0e3ad539e3a6b2fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55174-cwe-684-incorrect-provision-of-spec-64441b28</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55174%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20KDE%20Skanpage&amp;severity=low&amp;id=692692b1e3ad539e3a636d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65963-cwe-284-improper-access-control-in--e8879ef2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65963%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20humhub%20cfiles&amp;severity=medium&amp;id=69263fd05765e822eef9c741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66019-cwe-400-uncontrolled-resource-consu-a37fade8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66019%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=69263fd05765e822eef9c745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65957-cwe-200-exposure-of-sensitive-infor-a7002cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65957%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Intercore-Productions%20Core-Bot&amp;severity=high&amp;id=69264a57ca41832e1e4ac27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65956-cwe-79-improper-neutralization-of-i-3135a111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65956%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getformwork%20formwork&amp;severity=medium&amp;id=69263c525765e822eef59465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65952-cwe-22-improper-limitation-of-a-pat-3ffa6097</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iiDk-the-actual%20Console&amp;severity=high&amp;id=69263566acb2eea424e18f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13597-cwe-434-unrestricted-upload-of-file-188b0f58</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13597%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20soportecibeles%20AI%20Feeds&amp;severity=critical&amp;id=692631dfacb2eea424dd30df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13595-cwe-434-unrestricted-upload-of-file-82ab0c8d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13595%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20soportecibeles%20CIBELES%20AI&amp;severity=critical&amp;id=692631dfacb2eea424dd30d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64713-cwe-119-improper-restriction-of-ope-b512b911</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64713%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=69262ac94ed5c2dbbb0fc281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64704-cwe-754-improper-check-for-unusual--cc35e8b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64704%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=69262ac94ed5c2dbbb0fc27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62703-cwe-502-deserialization-of-untruste-cb47f5a2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62703%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fugue-project%20fugue&amp;severity=high&amp;id=692621d54ed5c2dbbb064b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66017-cwe-327-use-of-a-broken-or-risky-cr-5a8408ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66017%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20LFDT-Lockness%20cggmp21&amp;severity=high&amp;id=69260c0cffc41f183f7e2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66016-cwe-345-insufficient-verification-o-5b8661a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66016%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20LFDT-Lockness%20cggmp21&amp;severity=critical&amp;id=69260c0cffc41f183f7e2cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65965-cwe-212-improper-removal-of-sensiti-56118a5a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65965%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20anchore%20grype&amp;severity=high&amp;id=69260888ffc41f183f790649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12816-cwe-436-interpretation-conflict-in--05c57b02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12816%3A%20CWE-436%20Interpretation%20Conflict%20in%20Digital%20Bazaar%20node-forge&amp;severity=high&amp;id=692601e4ffc41f183f725864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34350-cwe-22-improper-limitation-of-a-pat-eb9ec087</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34350%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synergetic%20Data%20Systems%2C%20Inc.%20UnForm%20Server&amp;severity=high&amp;id=692601e4ffc41f183f725869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-spyware-targeting-messaging-app-user-565179a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Spyware%20Targeting%20Messaging%20App%20Users&amp;severity=high&amp;id=6925f3c2ea01c5f8b82fc012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33203-cwe-918-server-side-request-forgery-9bd8bb1f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33203%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NVIDIA%20NeMo%20Agent%20ToolKit&amp;severity=high&amp;id=6925f3dfea01c5f8b8301208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33205-cwe-829-inclusion-of-functionality--bd2e791e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33205%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6925f3dfea01c5f8b8301212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33204-cwe-94-improper-control-of-generati-30e73709</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33204%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=6925f3dfea01c5f8b830120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33200-cwe-226-sensitive-information-in-re-1a0b095e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33200%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b8301203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33199-cwe-670-always-incorrect-control-fl-2646cf85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33199%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b83011fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33198-cwe-226-sensitive-information-in-re-310c4117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33198%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=low&amp;id=6925f3dfea01c5f8b83011f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33197-cwe-476-null-pointer-dereference-in-282c354f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33197%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f3dfea01c5f8b83011f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33196-cwe-226-sensitive-information-in-re-a432024d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33196%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33195-cwe-119-improper-restriction-of-ope-f16f3515</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33195%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33194-cwe-180-incorrect-behavior-order-va-34fc6673</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33194%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33193-cwe-354-improper-validation-of-inte-bcacddd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33193%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33192-cwe-690-unchecked-return-value-to-n-4a43c480</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33192%3A%20CWE-690%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33191-cwe-20-improper-input-validation-in-fbda1b94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33191%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33190-cwe-787-out-of-bounds-write-in-nvid-6b5512fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33190%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20DGX%20Spark&amp;severity=medium&amp;id=6925f0bc94b153c6e1167e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33189-cwe-787-out-of-bounds-write-in-nvid-5d6ef151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33189%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20DGX%20Spark&amp;severity=high&amp;id=6925f0bc94b153c6e1167e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33188-cwe-269-improper-privilege-manageme-f3a612ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33188%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NVIDIA%20DGX%20Spark&amp;severity=high&amp;id=6925f0bc94b153c6e1167e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33187-cwe-269-improper-privilege-manageme-7ed57606</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33187%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NVIDIA%20DGX%20Spark&amp;severity=critical&amp;id=6925f0bc94b153c6e1167e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65085-cwe-122-heap-based-buffer-overflow--854f1342</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65085%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=6925f0be94b153c6e11684f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65084-cwe-787-out-of-bounds-write-in-ashl-89b31184</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65084%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=6925f0be94b153c6e11684f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13483-cwe-306-missing-authentication-for--4e67c2d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13483%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SiRcom%20SMART%20Alert%20(SiSA&amp;severity=high&amp;id=6925ed1794b153c6e111ebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-breach-at-spains-nationa-52d01432</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20ransomware%20claims%20breach%20at%20Spain%E2%80%99s%20national%20airline%20Iberia%20with%20596%20GB%20data%20theft&amp;severity=high&amp;id=6925e61794b153c6e10ae0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/years-of-jsonformatter-and-codebeautify-leaks-expo-93607956</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Years%20of%20JSONFormatter%20and%20CodeBeautify%20Leaks%20Expose%20Thousands%20of%20Passwords%20and%20API%20Keys&amp;severity=critical&amp;id=6925e565174e41d3fb49883b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13467-deserialization-of-untrusted-data-i-33bdd2d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13467%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=6925d6df159f97fbc0f9aed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toddycats-new-hacking-tools-steal-outlook-emails-a-05acb965</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToddyCat&apos;s%20New%20Hacking%20Tools%20Steal%20Outlook%20Emails%20and%20Microsoft%20365%20Access%20Tokens&amp;severity=high&amp;id=6925d349159f97fbc0f5138c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-beautifiers-expose-credentials-from-banks-gov-050af2c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20beautifiers%20expose%20credentials%20from%20banks%2C%20govt%2C%20tech%20orgs&amp;severity=high&amp;id=6925d34a159f97fbc0f51390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40890-cwe-79-improper-neutralization-of-i-3fd36a23</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=6925cfc8159f97fbc0f17f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0248-cwe-20-improper-input-validation-in--8289b1d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0248%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20iNotes&amp;severity=high&amp;id=6925cc51159f97fbc0ed83f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36134-cwe-1275-in-ibm-sterling-b2b-integr-551a678b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36134%3A%20CWE-1275%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=6925c2045b1d823317eed0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jackfix-uses-fake-windows-update-pop-ups-on-adult--3785608d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JackFix%20Uses%20Fake%20Windows%20Update%20Pop-Ups%20on%20Adult%20Sites%20to%20Deliver%20Multiple%20Stealers&amp;severity=critical&amp;id=6925cb495b1d823317fa685d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alumni-student-and-staff-information-stolen-from-h-0a78d7e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alumni%2C%20Student%2C%20and%20Staff%20Information%20Stolen%20From%20Harvard%20University&amp;severity=medium&amp;id=6925bb0e6dc31f06e917db71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scam-phone-numbers-how-to-spot-them-avoid-fraud-an-05dc5cab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scam%20Phone%20Numbers%3A%20How%20to%20Spot%20Them%2C%20Avoid%20Fraud%2C%20and%20Protect%20Yourself&amp;severity=medium&amp;id=6925bb286dc31f06e917e35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fluent-bit-vulnerabilities-expose-cloud-services-t-ff848435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fluent%20Bit%20Vulnerabilities%20Expose%20Cloud%20Services%20to%20Takeover&amp;severity=critical&amp;id=6925b4096dc31f06e90fa535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jack-of-all-trades-shaihulud-malware-steals-secret-0c76b81a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jack%20of%20all%20trades%3A%20Shai%E2%80%91Hulud%20malware%20steals%20secrets%2C%20AIPAC%20data%20breach%20uncovered&amp;severity=high&amp;id=6925b42f6dc31f06e90fb859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wormgpt-4-and-kawaiigpt-new-dark-llms-boost-cyberc-5fa51279</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WormGPT%204%20and%20KawaiiGPT%3A%20New%20Dark%20LLMs%20Boost%20Cybercrime%20Automation&amp;severity=medium&amp;id=6925b4096dc31f06e90fa539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hide-the-threat-gpo-lateral-movement-f9b4425f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hide%20the%20threat%20-%20GPO%20lateral%20movement&amp;severity=medium&amp;id=6925b0996dc31f06e90b300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-us-banks-impacted-by-situsamc-hack-172600ba</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20US%20Banks%20Impacted%20by%20SitusAMC%20Hack&amp;severity=medium&amp;id=69259e98a8d212b82783c007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dartmouth-college-confirms-data-breach-after-clop--ac1fae10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dartmouth%20College%20confirms%20data%20breach%20after%20Clop%20extortion%20attack&amp;severity=high&amp;id=692598bfa8d212b8277bf437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-spyware-campaigns-hijacking-h-d353fdb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Spyware%20Campaigns%20Hijacking%20High-Value%20Signal%20and%20WhatsApp%20Users&amp;severity=high&amp;id=692598bfa8d212b8277bf43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/situsamc-confirms-data-breach-affecting-customer-i-d262e57c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SitusAMC%20confirms%20data%20breach%20affecting%20customer%20information&amp;severity=high&amp;id=692598bfa8d212b8277bf440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toddycats-new-hacking-tools-steal-outlook-emails-a-567fbe39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToddyCat%E2%80%99s%20New%20Hacking%20Tools%20Steal%20Outlook%20Emails%20and%20Microsoft%20365%20Access%20Tokens&amp;severity=low&amp;id=6925ac106d2b27733e2f3516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hijack-blender-3d-assets-to-deploy-stealc--37734e13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hijack%20Blender%203D%20Assets%20to%20Deploy%20StealC%20V2%20Data-Stealing%20Malware&amp;severity=medium&amp;id=69259532a8d212b827789180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/640-npm-packages-infected-in-new-shai-hulud-supply-e7405928</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=640%20NPM%20Packages%20Infected%20in%20New%20%E2%80%98Shai-Hulud%E2%80%99%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69258aa57fd7dcae45bdde11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13502-integer-overflow-or-wraparound-in-r-0f720288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13502%3A%20Out-of-bounds%20Read%20in%20The%20WebKitGTK%20Team%20webkitgtk&amp;severity=high&amp;id=69256893690aeb35a2ca49fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59372-cwe-22-improper-limitation-of-a-pat-a6cd8f62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59372%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59371-cwe-330-use-of-insufficiently-rando-7f7b84a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59371%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e2a292ce6fc00be065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59370-cwe-78-improper-neutralization-of-s-c25430c4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59370%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e2a292ce6fc00be065a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59369-cwe-89-improper-neutralization-of-s-7e846994</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59369%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQLCommand%20(&apos;SQL%20Injection&apos;)%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59368-cwe-191-integer-underflow-in-asus-r-cda50801</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59368%3A%20CWE-191%3A%20Integer%20Underflow%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be0654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12003-cwe-306-missing-authentication-for--acd4d286</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12003%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20ASUS%20Router&amp;severity=high&amp;id=69255e27292ce6fc00be05bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12587-cwe-352-cross-site-request-forgery--049a0147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12587%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webgarh%20Peer%20Publish&amp;severity=medium&amp;id=69255e27292ce6fc00be05d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13385-cwe-89-improper-neutralization-of-s-02a6d761</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bylancer%20Bookme%20%E2%80%93%20Free%20Online%20Appointment%20Booking%20and%20Scheduling%20Plugin&amp;severity=medium&amp;id=69255e28292ce6fc00be0616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12634-cwe-862-missing-authorization-in-su-c51157ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12634%3A%20CWE-862%20Missing%20Authorization%20in%20sunarc%20Refund%20Request%20for%20WooCommerce&amp;severity=medium&amp;id=69255e27292ce6fc00be05de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13370-cwe-89-improper-neutralization-of-s-6f487c24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ov3rkll%20ProjectList&amp;severity=medium&amp;id=69255e28292ce6fc00be05f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13311-cwe-79-improper-neutralization-of-i-98da3bd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sigalitam%20Just%20Highlight&amp;severity=medium&amp;id=69255e28292ce6fc00be05f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12645-cwe-79-improper-neutralization-of-i-12636017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12645%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karthiksg%20Inline%20frame%20%E2%80%93%20Iframe&amp;severity=medium&amp;id=69255e27292ce6fc00be05e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13405-cwe-862-missing-authorization-in-bu-eddace4a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13405%3A%20CWE-862%20Missing%20Authorization%20in%20buywptemplates%20Ace%20Post%20Type%20Builder&amp;severity=medium&amp;id=69255e2a292ce6fc00be063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13380-cwe-73-external-control-of-file-nam-d175a848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13380%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20liquidthemes%20AI%20Engine%20for%20WordPress%3A%20ChatGPT%2C%20GPT%20Content%20Generator&amp;severity=medium&amp;id=69255e28292ce6fc00be0603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13382-cwe-639-authorization-bypass-throug-7f50fbd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13382%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=69255e28292ce6fc00be060b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13404-cwe-862-missing-authorization-in-do-86d5286a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13404%3A%20CWE-862%20Missing%20Authorization%20in%20docjojo%20atec%20Duplicate%20Page%20%26%20Post&amp;severity=medium&amp;id=69255e28292ce6fc00be0625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12025-cwe-79-improper-neutralization-of-i-be8c2bc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12025%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahabubs%20YouTube%20Subscribe&amp;severity=medium&amp;id=69255e27292ce6fc00be05bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13386-cwe-862-missing-authorization-in-ly-52791f46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13386%3A%20CWE-862%20Missing%20Authorization%20in%20lyrathemes%20Social%20Images%20Widget&amp;severity=medium&amp;id=69255e28292ce6fc00be061b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12525-cwe-200-exposure-of-sensitive-infor-a713e520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12525%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20appglut%20Locker%20Content&amp;severity=medium&amp;id=69255e27292ce6fc00be05d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13389-cwe-639-authorization-bypass-throug-7263e877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13389%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=69255e28292ce6fc00be0620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13376-cwe-434-unrestricted-upload-of-file-d330b753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13376%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ov3rkll%20ProjectList&amp;severity=high&amp;id=69255e28292ce6fc00be05fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12040-cwe-639-authorization-bypass-throug-a8fe76e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themehunk%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=69255e27292ce6fc00be05c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12586-cwe-352-cross-site-request-forgery--9f1d1728</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12586%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20evolurise%20Conditionnal%20Maintenance%20Mode%20for%20WordPress&amp;severity=medium&amp;id=69255e27292ce6fc00be05d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13452-cwe-639-authorization-bypass-throug-3e0abe10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13452%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=69255e2a292ce6fc00be0647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12032-cwe-79-improper-neutralization-of-i-2483c388</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vithanhlam%20Zweb%20Social%20Mobile%20%E2%80%93%20%E1%BB%A8ng%20D%E1%BB%A5ng%20N%C3%BAt%20G%E1%BB%8Di%20Mobile&amp;severity=medium&amp;id=69255e27292ce6fc00be05c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13383-cwe-79-improper-neutralization-of-i-7315652b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Job%20Board%20by%20BestWebSoft&amp;severity=medium&amp;id=69255e28292ce6fc00be0610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13414-cwe-862-missing-authorization-in-gw-4c6e772c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13414%3A%20CWE-862%20Missing%20Authorization%20in%20gwendydd%20Chamber%20Dashboard%20Business%20Directory&amp;severity=medium&amp;id=69255e2a292ce6fc00be0642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12043-cwe-862-missing-authorization-in-au-ca88d6b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12043%3A%20CWE-862%20Missing%20Authorization%20in%20autochat%20Autochat%20Automatic%20Conversation&amp;severity=medium&amp;id=69255e27292ce6fc00be05cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59365-cwe-121-stack-based-buffer-overflow-68efcc7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59365%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Router&amp;severity=medium&amp;id=69255e2a292ce6fc00be064e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59366-cwe-22-path-traversal-in-asus-route-0b36589e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59366%3A%20CWE-22%3A%20Path%20Traversal%20in%20ASUS%20Router&amp;severity=critical&amp;id=69255e2a292ce6fc00be0651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canon-says-subsidiary-impacted-by-oracle-ebs-hack-96f930c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canon%20Says%20Subsidiary%20Impacted%20by%20Oracle%20EBS%20Hack&amp;severity=medium&amp;id=69255a9b292ce6fc00b9519c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64693-heap-based-buffer-overflow-in-inter-ce979d27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64693%3A%20Heap-based%20buffer%20overflow%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=critical&amp;id=69255ab1292ce6fc00b965af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62691-stack-based-buffer-overflow-in-inte-93f6b262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62691%3A%20Stack-based%20buffer%20overflow%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=critical&amp;id=69255ab1292ce6fc00b965ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59485-incorrect-default-permissions-in-in-f1a03053</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59485%3A%20Incorrect%20default%20permissions%20in%20Intercom%2C%20Inc.%20Security%20Point%20(Windows)%20of%20MaLion&amp;severity=low&amp;id=69255ab1292ce6fc00b965a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-spyware-campaigns-hijacking-h-4ec962b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Spyware%20Campaigns%20Hijacking%20High-Value%20Signal%20and%20WhatsApp%20Users&amp;severity=high&amp;id=692553225d11bc51878e9805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12742-cwe-78-improper-neutralization-of-s-ec748b90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12742%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=6925421a441560fe7ee98db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13644-cwe-617-reachable-assertion-in-mong-7ed62f1d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13644%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=6925421a441560fe7ee98db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13643-cwe-862-missing-authorization-in-mo-c81940c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13643%3A%20CWE-862%3A%20Missing%20Authorization%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=low&amp;id=69253e96441560fe7ee5716c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12893-cwe-295-improper-certificate-valida-da0f54ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12893%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69253b14441560fe7ee1e752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13507-cwe-1284-improper-validation-of-spe-921c93f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13507%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=high&amp;id=6925392a441560fe7ee067dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13068-cwe-79-improper-neutralization-of-i-c380ee1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20Telegram%20Bot%20%26%20Channel&amp;severity=high&amp;id=6925392a441560fe7ee067df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13559-cwe-269-improper-privilege-manageme-9ab9ee47</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13559%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20venusweb%20EduKart%20Pro&amp;severity=critical&amp;id=6925392a441560fe7ee067e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13558-cwe-862-missing-authorization-in-pr-b4c47034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13558%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6925392a441560fe7ee067e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64730-cross-site-scripting-xss-in-sony-co-a4302e20</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64730%3A%20Cross-site%20scripting%20(XSS)%20in%20Sony%20Corporation%20SNC-CX600W&amp;severity=medium&amp;id=6925392a441560fe7ee067f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62497-cross-site-request-forgery-csrf-in--371b7d7e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62497%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20Sony%20Corporation%20SNC-CX600W&amp;severity=low&amp;id=6925392a441560fe7ee067ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64304-use-of-hard-coded-cryptographic-key-55b49f41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64304%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20Fuji%20Television%20Network%2C%20Inc.%20%22FOD%22%20App%20for%20Android&amp;severity=medium&amp;id=692534a1f17e04acaf6c88e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10646-cwe-862-missing-authorization-in-qu-89108b3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10646%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Search%20Exclude&amp;severity=medium&amp;id=692527c82a08b12b0e80cc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6389-cwe-94-improper-control-of-generatio-740e50f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6389%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Sneeit%20Sneeit%20Framework&amp;severity=critical&amp;id=692519cd2a08b12b0e7e45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59373-cwe-732-incorrect-permission-assign-a59b9646</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59373%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ASUS%20MyASUS&amp;severity=high&amp;id=692512aa2a08b12b0e7cf688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65951-cwe-200-exposure-of-sensitive-infor-42a10bc6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65951%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mescuwa%20entropy-derby&amp;severity=high&amp;id=6924fa182a08b12b0e784280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65944-cwe-201-insertion-of-sensitive-info-ba27e5db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65944%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20getsentry%20sentry-javascript&amp;severity=medium&amp;id=6924fa182a08b12b0e78427a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9803-cwe-287-improper-authentication-in-l-b3eaaf9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9803%3A%20CWE-287%20Improper%20Authentication%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=6924fa182a08b12b0e784284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-25-3f99b78d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-25&amp;severity=medium&amp;id=692646c25765e822ee01c625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63735-na-78b6b7c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63735%3A%20n%2Fa&amp;severity=medium&amp;id=692621d54ed5c2dbbb064b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51746-na-5ea9b0cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51746%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51745-na-1c52bc21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51745%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51744-na-de3d72e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51744%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51743-na-324a7de8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51743%3A%20n%2Fa&amp;severity=critical&amp;id=69261d1814e694ef3cf57caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51741-na-9fbfea92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51741%3A%20n%2Fa&amp;severity=high&amp;id=69261d1814e694ef3cf57caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51742-na-02a07797</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51742%3A%20n%2Fa&amp;severity=critical&amp;id=69260c0cffc41f183f7e2ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65647-na-c0e92f18</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65647%3A%20n%2Fa&amp;severity=medium&amp;id=69260888ffc41f183f790645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64067-na-95375f19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64067%3A%20n%2Fa&amp;severity=medium&amp;id=6925faccea01c5f8b8382a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61168-na-19f86d63</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61168%3A%20n%2Fa&amp;severity=critical&amp;id=6925faccea01c5f8b8382a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61167-na-7a610355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61167%3A%20n%2Fa&amp;severity=medium&amp;id=6925faccea01c5f8b8382a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64065-na-e65ecfee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64065%3A%20n%2Fa&amp;severity=high&amp;id=6925f747ea01c5f8b834af02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64064-na-ecb52644</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64064%3A%20n%2Fa&amp;severity=high&amp;id=6925f747ea01c5f8b834aefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64063-na-e7b0f7ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64063%3A%20n%2Fa&amp;severity=critical&amp;id=6925f747ea01c5f8b834aefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64062-na-f25178cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64062%3A%20n%2Fa&amp;severity=high&amp;id=6925f3dfea01c5f8b8301218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64066-na-f625abf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64066%3A%20n%2Fa&amp;severity=high&amp;id=6925f0be94b153c6e11684f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64061-na-d00e0823</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64061%3A%20n%2Fa&amp;severity=medium&amp;id=6925e2cb174e41d3fb46673b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63729-na-89f1140c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63729%3A%20n%2Fa&amp;severity=critical&amp;id=6925dbc3174e41d3fb3e2416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60739-na-1e4371c2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60739%3A%20n%2Fa&amp;severity=critical&amp;id=6925d6df159f97fbc0f9aed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64050-na-40aaec94</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64050%3A%20n%2Fa&amp;severity=high&amp;id=6925d374159f97fbc0f524dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64049-na-324f5566</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64049%3A%20n%2Fa&amp;severity=medium&amp;id=6925d374159f97fbc0f524d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62155-cwe-918-server-side-request-forgery-16942ca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62155%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=6924f361c5f5f1e21b6201dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65018-cwe-787-out-of-bounds-write-in-pngg-00219fbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65018%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6924f361c5f5f1e21b6201df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64720-cwe-125-out-of-bounds-read-in-pnggr-8ffd8af9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=high&amp;id=6924efddc5f5f1e21b5dde43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64506-cwe-125-out-of-bounds-read-in-pnggr-c548bb38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64506%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=6924efddc5f5f1e21b5dde4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64505-cwe-125-out-of-bounds-read-in-pnggr-cc20cedc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64505%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pnggroup%20libpng&amp;severity=medium&amp;id=6924efddc5f5f1e21b5dde49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/split-second-side-doors-how-bot-delegated-toctou-b-185f1568</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Split-Second%20Side%20Doors%3A%20How%20Bot-Delegated%20TOCTOU%20Breaks%20The%20CI%2FCD%20Threat%20Model&amp;severity=medium&amp;id=6924e5dc8d8147e8943bc1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10144-cwe-89-improper-neutralization-of-s-ca69e924</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10144%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quadlayers%20Perfect%20Brands%20for%20WooCommerce&amp;severity=medium&amp;id=6924dcee8d8147e89432b4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stories-from-the-soc-mystery-of-the-postponed-prox-ff0ee2de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stories%20from%20the%20SOC%3A%20Mystery%20of%20the%20postponed%20proxyware%20install&amp;severity=medium&amp;id=6925732e7e8c0fda07ba767b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-gets-creative-malware-buried-in-images-d646caab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Gets%20Creative%3A%20Malware%20Buried%20in%20Images&amp;severity=medium&amp;id=6925732e7e8c0fda07ba7658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29933-cwe-787-out-of-bounds-write-in-amd--285cbf25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29933%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6924ccc0338d19296f824bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48511-cwe-1285-improper-validation-of-spe-1c7ed30b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48511%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6924c9b1e1f3fb2621007d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48510-cwe-394-unexpected-status-code-or-r-a158c006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48510%3A%20CWE-394%20%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=high&amp;id=6924c9b1e1f3fb2621007d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52538-cwe-190-integer-overflow-or-wraparo-233f7a71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52538%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924c62de1f3fb2621fbb452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0003-cwe-413-improper-resource-locking-in-00499a06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0003%3A%20CWE-413%20%20Improper%20Resource%20Locking%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924c2e2e1f3fb2621f8d20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0007-cwe-710-improper-adherence-to-coding-869874f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0007%3A%20CWE-710%20%20Improper%20Adherence%20to%20Coding%20Standards%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7330-cwe-434-unrestricted-upload-of-file--ff7a18c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7330%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Beijing%20Star-Net%20Ruijie%20Network%20Technology%20Co.%2C%20Ltd.%20NBR%20Series%20Routers&amp;severity=critical&amp;id=6924c2e2e1f3fb2621f8d201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14007-cwe-306-missing-authentication-for--5b150429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Shenzhen%20TVT%20Digital%20Technology%20Co.%2C%20Ltd.%20NVMS-9000&amp;severity=high&amp;id=6924c2e2e1f3fb2621f8d208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36150-cwe-327-use-of-a-broken-or-risky-cr-6e8abf6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36150%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-systemic-flaw-in-binances-ip-whitelisting-model--7be62523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20systemic%20flaw%20in%20Binance%E2%80%99s%20IP%20Whitelisting%20model%3A%20listenKeys%20bypass%20the%20protection%20entirely&amp;severity=medium&amp;id=6924ba58228e5e387419b415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0005-cwe-190-integer-overflow-or-wraparou-e45ff811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0005%3A%20CWE-190%20%20Integer%20Overflow%20or%20Wraparound%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924ba55228e5e387419b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52539-cwe-121-stack-based-buffer-overflow-4c6a03dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52539%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20AMD%20Xilinx%20Run%20Time%20(XRT)&amp;severity=high&amp;id=6924b6d1228e5e38741697d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/real-estate-finance-services-giant-situsamc-breach-f74a100d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Real-estate%20finance%20services%20giant%20SitusAMC%20breach%20exposes%20client%20data&amp;severity=high&amp;id=6924a5b565c0297328aa8965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36112-cwe-497-in-ibm-sterling-b2b-integra-d8aeffcc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36112%3A%20CWE-497%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6924acb465c0297328b2f7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13609-use-of-multiple-resources-with-dupl-dda2b4b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13609%3A%20Use%20of%20Multiple%20Resources%20with%20Duplicate%20Identifier%20in%20Keylime%20Project%20keylime&amp;severity=high&amp;id=6924a2b20ea9183d5bf9f772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-linked-malware-campaign-hides-in-blender-3-4d76750e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian-linked%20Malware%20Campaign%20Hides%20in%20Blender%203D%20Files&amp;severity=high&amp;id=69249ba70ea9183d5bf293cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-university-discloses-data-breach-affecting-062bc1e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20University%20discloses%20data%20breach%20affecting%20alumni%2C%20donors&amp;severity=high&amp;id=69249ba70ea9183d5bf293cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/delta-dental-of-virginia-data-breach-impacts-14591-54f810ac</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Delta%20Dental%20of%20Virginia%20data%20breach%20impacts%20145%2C918%20customers&amp;severity=high&amp;id=69249ba70ea9183d5bf293d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fluent-bit-flaws-expose-cloud-to-rce-and-steal-2225d104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fluent%20Bit%20Flaws%20Expose%20Cloud%20to%20RCE%20and%20Stealthy%20Infrastructure%20Intrusions&amp;severity=high&amp;id=69249ba70ea9183d5bf293d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conflicts-between-url-mapping-and-url-based-access-588cec79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control.%2C%20(Mon%2C%20Nov%2024th)&amp;severity=high&amp;id=69248e03ac857ca3cacf22fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-npm-worm-impacts-26000-repos-in-supply--63b4f678</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%20npm%20Worm%20Impacts%2026%2C000%2B%20Repos%20in%20Supply%20Chain%20Attack%20Including%20Zapier%2C%20ENS%20and%20Postman&amp;severity=medium&amp;id=692483fbd5a1e53350b382d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-confirms-exploitation-of-recent-oracle-identi-41db2283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Confirms%20Exploitation%20of%20Recent%20Oracle%20Identity%20Manager%20Vulnerability&amp;severity=medium&amp;id=69247c8eefc7406fa6689474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-npm-worm-infects-19000-packages-in-majo-344c0cf9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai%20Hulud%20npm%20Worm%20Infects%2019%2C000%20Packages%20in%20Major%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69247ca7efc7406fa6689bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10555-cwe-79-improper-neutralization-of-i-c2af2f74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Service%20Process%20Engineer&amp;severity=high&amp;id=69247cb8efc7406fa668b295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10554-cwe-79-improper-neutralization-of-i-f7c27a88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Product%20Manager&amp;severity=high&amp;id=69247cb8efc7406fa668b292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-insider-helped-hackers-falsely-claim-s-d3990b33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20Insider%20Helped%20Hackers%20Falsely%20Claim%20System%20Breach&amp;severity=medium&amp;id=69247919efc7406fa6647da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44018-cwe-295-improper-certificate-valida-526e2dab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44018%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20GL-Inet%20GL-AXT1800&amp;severity=high&amp;id=6924792eefc7406fa6649b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12978-cwe-187-partial-string-comparison-i-c36d99b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12978%3A%20CWE-187%3A%20Partial%20String%20Comparison%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb42fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12969-cwe-306-missing-authentication-for--c628dba8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12969%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb42f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12972-cwe-35-path-traversal-in-fluentbit--62953ec5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12972%3A%20CWE-35%3A%20Path%20Traversal%20in%20FluentBit%20Fluent%20Bit&amp;severity=medium&amp;id=6929e1b04121026312bb4304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12977-cwe-187-partial-string-comparison-i-afafdf0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12977%3A%20CWE-187%3A%20Partial%20String%20Comparison%20in%20FluentBit%20Fluent%20Bit&amp;severity=critical&amp;id=6929e1b04121026312bb4308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12970-cwe-121-stack-based-buffer-overflow-a82b41c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12970%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20FluentBit%20Fluent%20Bit&amp;severity=high&amp;id=6929e1b04121026312bb4300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11921-cwe-732-incorrect-permission-assign-588b2598</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11921%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Bjango%20iStats&amp;severity=high&amp;id=69246d8d7150efb62b9155c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-deepseek-r1-ai-generates-insecure-code-whe-9109e2ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20DeepSeek-R1%20AI%20Generates%20Insecure%20Code%20When%20Prompts%20Mention%20Tibet%20or%20Uyghurs&amp;severity=high&amp;id=692467c7ff33e781bff0cd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-sha1-hulud-wave-affects-25000-repositories--f517574d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20Sha1-Hulud%20Wave%20Affects%2025%2C000%2B%20Repositories%20via%20npm%20Preinstall%20Credential%20Theft&amp;severity=high&amp;id=692467c7ff33e781bff0cd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65998-cwe-321-use-of-hard-coded-cryptogra-147361a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65998%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=high&amp;id=69246443ff33e781bfec6d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-highlights-security-risks-introduced-by--4103237d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Highlights%20Security%20Risks%20Introduced%20by%20New%20Agentic%20AI%20Feature&amp;severity=high&amp;id=692460bcff33e781bfe93e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/second-sha1-hulud-wave-affects-25000-repositories--e120fa20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Second%20Sha1-Hulud%20Wave%20Affects%2025%2C000%2B%20Repositories%20via%20npm%20Preinstall%20Credential%20Theft&amp;severity=medium&amp;id=69246a5eff33e781bff46df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12628-cwe-331-insufficient-entropyy-in-wp-ac8173b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12628%3A%20CWE-331%20Insufficient%20Entropyy%20in%20WP%202FA&amp;severity=medium&amp;id=69245c1900c839aeb21861fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/live-updates-shai1-hulud-the-second-coming-hundred-6cc04660</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Live%20Updates%3A%20Shai1-Hulud%2C%20The%20Second%20Coming%20-%20Hundreds%20of%20NPM%20Packages%20Compromised&amp;severity=medium&amp;id=6924554600c839aeb20fcf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-prettier-extension-on-vscode-marketplace-drop-d7b5d185</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Prettier%20Extension%20on%20VSCode%20Marketplace%20Dropped%20Anivia%20Stealer&amp;severity=medium&amp;id=6924552400c839aeb20f9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mazda-says-no-data-leakage-or-operational-impact-f-29da8d3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mazda%20Says%20No%20Data%20Leakage%20or%20Operational%20Impact%20From%20Oracle%20Hack&amp;severity=medium&amp;id=6924550e00c839aeb20f2584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-hidden-threats-protect-your-online-store-ecomme-f8523cc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Hidden%20Threats%20Protect%20Your%20Online%20Store%3A%20Ecommerce%20Cybsersecurity&amp;severity=medium&amp;id=6924552400c839aeb20f9bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploit-chrome-0-day-badiis--f0daf758</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploit%2C%20Chrome%200-Day%2C%20BadIIS%20Malware%2C%20Record%20DDoS%2C%20SaaS%20Breach%20%26%20More&amp;severity=medium&amp;id=69246a5eff33e781bff46dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41017-cwe-862-missing-authorization-in-da-a946c1ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41017%3A%20CWE-862%20Missing%20Authorization%20in%20Davantis%20DFUSION&amp;severity=medium&amp;id=6924518b00c839aeb20c718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41016-cwe-862-missing-authorization-in-da-0564a689</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41016%3A%20CWE-862%20Missing%20Authorization%20in%20Davantis%20DFUSION&amp;severity=high&amp;id=6924518b00c839aeb20c718a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-airline-iberia-notifies-customers-of-data--a567c4a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Airline%20Iberia%20Notifies%20Customers%20of%20Data%20Breach&amp;severity=medium&amp;id=69244d6d911d225366050680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazilian-campaign-spreading-the-malware-via-whats-1922fc4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazilian%20Campaign%3A%20Spreading%20the%20Malware%20via%20WhatsApp&amp;severity=medium&amp;id=69244dd3911d225366056a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsukys-ongoing-evolution-of-kimjongrat-and-expan-f6206769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky&apos;s%20Ongoing%20Evolution%20of%20KimJongRAT%20and%20Expanding%20Threats&amp;severity=medium&amp;id=69244e1100c839aeb2084876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-radzarat-spyware-poses-as-file-manager-to-hija-2fab30d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20RadzaRat%20Spyware%20Poses%20as%20File%20Manager%20to%20Hijack%20Android%20Devices%2C%20Evades%20All%2066%20Antivirus%20on%20VirusTotal&amp;severity=medium&amp;id=692446d8911d225366fbe14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/146000-impacted-by-delta-dental-of-virginia-data-b-4a9c49c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=146%2C000%20Impacted%20by%20Delta%20Dental%20of%20Virginia%20Data%20Breach&amp;severity=medium&amp;id=692446c5911d225366fbd883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12741-cwe-20-improper-input-validation-in-c20badd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12741%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69244dd2911d225366056a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12740-cwe-20-improper-input-validation-in-fdb6d825</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12740%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69244dd2911d225366056a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41087-cwe-79-improper-neutralization-of-i-242cbdfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Taclia%20Taclia&apos;s%20web%20application&amp;severity=medium&amp;id=69244343911d225366f85a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41729-cwe-1287-improper-validation-of-spe-060e9a1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41729%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Janitza%20UMG%2096-PA&amp;severity=high&amp;id=69244343911d225366f85a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-deepseek-r1-ai-generates-insecure-code-whe-93576b9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20DeepSeek-R1%20AI%20Generates%20Insecure%20Code%20When%20Prompts%20Mention%20Tibet%20or%20Uyghurs&amp;severity=medium&amp;id=69244d03911d22536604edf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cox-confirms-oracle-ebs-hack-as-cybercriminals-nam-c5bb7076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cox%20Confirms%20Oracle%20EBS%20Hack%20as%20Cybercriminals%20Name%20100%20Alleged%20Victims&amp;severity=medium&amp;id=6924390e296ff79352ebf870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/24th-november-threat-intelligence-report-d9ab7894</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=24th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69243921296ff79352ebfa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowpad-malware-actively-exploits-wsus-vulnerabi-669b068b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowPad%20Malware%20Actively%20Exploits%20WSUS%20Vulnerability%20for%20Full%20System%20Access&amp;severity=high&amp;id=69243211296ff79352e3abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-returns-over-300-npm-packages-and-21k-g-470c136c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20Returns%3A%20Over%20300%20NPM%20Packages%20and%2021K%20Github%20Repos%20infected%20via%20Fake%20Bun%20Runtime%20Within%20Hours&amp;severity=medium&amp;id=69242f333dd5bbb718bbeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12739-cwe-79-improper-neutralization-of-i-b025b75c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=69242f303dd5bbb718bbea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13596-cwe-209-generation-of-error-message-0b27d9e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13596%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ATISoluciones%20CIGES&amp;severity=low&amp;id=69240ce6272f5312cdbb624a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowpad-malware-actively-exploits-wsus-vulnerabi-9be01087</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowPad%20Malware%20Actively%20Exploits%20WSUS%20Vulnerability%20for%20Full%20System%20Access&amp;severity=medium&amp;id=692420aa3a0ff800317c82bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13588-server-side-request-forgery-in-lkin-7be263b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13588%3A%20Server-Side%20Request%20Forgery%20in%20lKinderBueno%20Streamity%20Xtream%20IPTV%20Player&amp;severity=medium&amp;id=69240640272f5312cdb48a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13586-sql-injection-in-sourcecodester-onl-445082c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13586%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=6923f9c2011871acbdf06d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12629-cwe-79-cross-site-scripting-xss-in--f82a86b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12629%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Broken%20Link%20Manager&amp;severity=high&amp;id=6923f52e8313f4d201985fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12569-cwe-601-url-redirection-to-untruste-c21e20ca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12569%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Guest%20posting%20%2F%20Frontend%20Posting%20%2F%20Front%20Editor&amp;severity=medium&amp;id=6923f52e8313f4d201985f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12394-cwe-200-information-exposure-in-bac-ee2a85e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12394%3A%20CWE-200%20Information%20Exposure%20in%20Backup%20Migration&amp;severity=medium&amp;id=6923f52e8313f4d201985f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14015-cwe-79-cross-site-scripting-xss-in--c5238676</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14015%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WordPress%20eCommerce%20Plugin&amp;severity=high&amp;id=6923f52e8313f4d201985f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13585-sql-injection-in-code-projects-covi-4b465460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13585%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=6923f820011871acbdece00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13584-cross-site-scripting-in-eigenfocus-d268de6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13584%3A%20Cross%20Site%20Scripting%20in%20Eigenfocus&amp;severity=medium&amp;id=6923e9501e6a877a1a5be181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7402-cwe-89-improper-neutralization-of-sp-c1c197c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7402%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6923e5eb1e6a877a1a57700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13583-sql-injection-in-code-projects-ques-3a58c829</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13583%3A%20SQL%20Injection%20in%20code-projects%20Question%20Paper%20Generator&amp;severity=medium&amp;id=6923e2d64350076d0de522b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13582-sql-injection-in-code-projects-jonn-8c647ee0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13582%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=6923e5eb1e6a877a1a577011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13581-sql-injection-in-itsourcecode-stude-6893678e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13581%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=6923d671a532ea377e9087ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13589-cwe-79-improper-neutralization-of-i-0d2e1dde</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Otsuka%20Information%20Technology%20FMS&amp;severity=medium&amp;id=6923d671a532ea377e9087f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13580-sql-injection-in-code-projects-libr-2fb4d90e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13580%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923cf69a532ea377e8d8efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13579-sql-injection-in-code-projects-libr-86b8f488</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13579%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923cf69a532ea377e8d8ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13578-sql-injection-in-code-projects-libr-e79a5b93</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13578%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6923c4dda532ea377e83711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13577-cross-site-scripting-in-phpgurukul--53fcf512</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13577%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6923ba52a532ea377e78c9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13576-improper-authorization-in-code-proj-da2c9881</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13576%3A%20Improper%20Authorization%20in%20code-projects%20Blog%20Site&amp;severity=medium&amp;id=6923d9fd4350076d0dda999c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13575-sql-injection-in-code-projects-blog-3724ca20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13575%3A%20SQL%20Injection%20in%20code-projects%20Blog%20Site&amp;severity=medium&amp;id=6923ac41a532ea377e68fa0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13574-unrestricted-upload-in-code-project-a361421c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13574%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6923a272a532ea377e5f0ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-24-fd6f33e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-24&amp;severity=medium&amp;id=6924f356c5f5f1e21b61f348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47856-na-301a6340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47856%3A%20n%2Fa&amp;severity=critical&amp;id=6924d3bc338d19296f897f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54347-na-477a6049</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54347%3A%20n%2Fa&amp;severity=critical&amp;id=6924d037338d19296f865e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63674-na-21bd9cbe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63674%3A%20n%2Fa&amp;severity=medium&amp;id=6924d037338d19296f865e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54563-na-a560e07c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54563%3A%20n%2Fa&amp;severity=high&amp;id=6924d037338d19296f865e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54341-na-3f00375f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54341%3A%20n%2Fa&amp;severity=medium&amp;id=6924d037338d19296f865e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54338-na-27c07b09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54338%3A%20n%2Fa&amp;severity=high&amp;id=6924d037338d19296f865e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63498-na-ae437c3d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63498%3A%20n%2Fa&amp;severity=medium&amp;id=6924c2e2e1f3fb2621f8d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56400-na-2286e4eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56400%3A%20n%2Fa&amp;severity=high&amp;id=6924bdd9228e5e38741e15f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64048-na-1b11167f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64048%3A%20n%2Fa&amp;severity=medium&amp;id=6924ba55228e5e387419b3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64047-na-accc8e20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64047%3A%20n%2Fa&amp;severity=medium&amp;id=6924b35c228e5e3874124c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63914-na-58084588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63914%3A%20n%2Fa&amp;severity=medium&amp;id=6924b03965c0297328b78395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63435-na-ec78ca0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63435%3A%20n%2Fa&amp;severity=medium&amp;id=6924918bac857ca3cad235c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63434-na-f1fdf6ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63434%3A%20n%2Fa&amp;severity=high&amp;id=6924918bac857ca3cad235c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63433-na-a9d56e95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63433%3A%20n%2Fa&amp;severity=medium&amp;id=69248e18ac857ca3cacf2914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63432-na-548a2853</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63432%3A%20n%2Fa&amp;severity=medium&amp;id=69248e18ac857ca3cacf2910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63958-na-f46fb463</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63958%3A%20n%2Fa&amp;severity=critical&amp;id=69248c2fac857ca3cacc8733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63953-na-abb21f5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63953%3A%20n%2Fa&amp;severity=medium&amp;id=69248a62ea0759ac8b7c828f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63952-na-2523f49c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63952%3A%20n%2Fa&amp;severity=medium&amp;id=69248a62ea0759ac8b7c828b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60638-na-50e3a94b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60638%3A%20n%2Fa&amp;severity=high&amp;id=6924840cd5a1e53350b3a58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60917-na-1b0a537f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60917%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b077a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60633-na-4bc761c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60633%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b0779c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60632-na-0f70d6ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60632%3A%20n%2Fa&amp;severity=medium&amp;id=69248078d5a1e53350b07798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60916-na-3db96d69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60916%3A%20n%2Fa&amp;severity=medium&amp;id=69247cb8efc7406fa668b29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60915-na-00d03424</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60915%3A%20n%2Fa&amp;severity=high&amp;id=69247cb8efc7406fa668b298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60914-na-dbfc256f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60914%3A%20n%2Fa&amp;severity=medium&amp;id=6924792eefc7406fa6649b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56423-na-fffd75a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56423%3A%20n%2Fa&amp;severity=medium&amp;id=6924792eefc7406fa6649b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56401-na-0054ae22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56401%3A%20n%2Fa&amp;severity=high&amp;id=6924792eefc7406fa6649b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65503-na-8747f859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65503%3A%20n%2Fa&amp;severity=high&amp;id=692467edff33e781bff0ea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65502-na-90f2fb34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65502%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65501-na-ceedd044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65501%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65500-na-2eab75bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65500%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65499-na-97c0a8e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65499%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65498-na-61bed763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65498%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65497-na-43a5fa5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65497%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65496-na-ca961f86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65496%3A%20n%2Fa&amp;severity=medium&amp;id=692467ebff33e781bff0e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65495-na-13986d9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65495%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65494-na-e3232ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65494%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65493-na-ee53f652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65493%3A%20n%2Fa&amp;severity=high&amp;id=692467ebff33e781bff0e35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13573-unrestricted-upload-in-projectworld-9c4347ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13573%3A%20Unrestricted%20Upload%20in%20projectworlds%20can%20pass%20malicious%20payloads&amp;severity=medium&amp;id=69239b6adfa0c74de8802fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13572-sql-injection-in-projectworlds-adva-6e1fc13f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13572%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=69239609dfa0c74de87abf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12800-cwe-918-server-side-request-forgery-d9c2a2ac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12800%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=69238d0dec5d308f09cb6a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13571-sql-injection-in-code-projects-simp-3f0692a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13571%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=692388afec5d308f09c843f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13570-sql-injection-in-itsourcecode-covid-a4464fb3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13570%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69238059f1913078bbfcf627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13569-sql-injection-in-itsourcecode-covid-a101d4a3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13569%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69237977f1913078bbf586a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13568-sql-injection-in-itsourcecode-covid-e742d0a4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13568%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=692372e6962646bb5af86ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13567-sql-injection-in-itsourcecode-covid-30fe99eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13567%3A%20SQL%20Injection%20in%20itsourcecode%20COVID%20Tracking%20System&amp;severity=medium&amp;id=69236ac46d4acfe6c0ac2364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13566-double-free-in-jarun-nnn-3660b685</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13566%3A%20Double%20Free%20in%20jarun%20nnn&amp;severity=medium&amp;id=6923643de9cdbb117d0d9be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13565-weak-password-recovery-in-sourcecod-76c59514</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13565%3A%20Weak%20Password%20Recovery%20in%20SourceCodester%20Inventory%20Management%20System&amp;severity=medium&amp;id=69235d40e9cdbb117d05e3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13564-denial-of-service-in-sourcecodester-71b01ff8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13564%3A%20Denial%20of%20Service%20in%20SourceCodester%20Pre-School%20Management%20System&amp;severity=medium&amp;id=69235870aa55e2112d7fa2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13562-command-injection-in-d-link-dir-852-d81b2b6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13562%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=69234d6ea8cb427b79f42970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13561-sql-injection-in-sourcecodester-com-16a52f71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13561%3A%20SQL%20Injection%20in%20SourceCodester%20Company%20Website%20CMS&amp;severity=medium&amp;id=692349eba8cb427b79efb919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54515-cwe-1284-improper-validation-of-spe-aa977176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54515%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Versal%E2%84%A2%20Adaptive%20SoC%20Devices&amp;severity=low&amp;id=69234496a8cb427b79e9d239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48507-cwe-1284-improper-validation-of-spe-d9783ee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48507%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Kria%E2%84%A2%20SOM&amp;severity=high&amp;id=692342efa8cb427b79e69085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13560-sql-injection-in-sourcecodester-com-7660d362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13560%3A%20SQL%20Injection%20in%20SourceCodester%20Company%20Website%20CMS&amp;severity=medium&amp;id=69233fd377ebf6e86e532d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13557-sql-injection-in-campcodes-online-p-debde1a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13557%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Polling%20System&amp;severity=medium&amp;id=692338cc77ebf6e86e4a9392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21923-cwe-426-untrusted-search-path-in-am-7f12f0a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21923%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20AMD%20AMD%20StoreMI%E2%84%A2&amp;severity=high&amp;id=692338cc77ebf6e86e4a938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21922-cwe-426-untrusted-search-path-in-am-33b665c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21922%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20AMD%20AMD%20StoreMI%E2%84%A2&amp;severity=high&amp;id=692338cc77ebf6e86e4a938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13556-sql-injection-in-campcodes-online-p-d425454f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13556%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Polling%20System&amp;severity=medium&amp;id=692336f877ebf6e86e4931d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13555-sql-injection-in-campcodes-school-f-3e1650f9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13555%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management%20System&amp;severity=medium&amp;id=69232a874f4cb01c4da9aee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13554-sql-injection-in-campcodes-supplier-6cf20fdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13554%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=692330ff650f1bc966f5721e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13553-buffer-overflow-in-d-link-dwr-m920-19b8e301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13553%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=69231653c2ed1a32d9e8f9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-autonomous-ai-cyberattack-why-saas-secur-c5bf2f7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%20Autonomous%20AI%20Cyberattack%3A%20Why%20SaaS%20Security%20Must%20Change&amp;severity=medium&amp;id=69230fc9237b8255a0386f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13552-buffer-overflow-in-d-link-dir-822k-4ad6c40a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13552%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=69230fc6237b8255a0386f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13551-buffer-overflow-in-d-link-dir-822k-fa75096a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13551%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=69230a5f237b8255a033933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-7-zip-vulnerability-with-public-exploit-r-52105bbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%207%20Zip%20Vulnerability%20With%20Public%20Exploit%20Requires%20Manual%20Update&amp;severity=critical&amp;id=6923053df051329c1a1f466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13550-buffer-overflow-in-d-link-dir-822k-bf09d948</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13550%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6923054af051329c1a1f7d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13549-buffer-overflow-in-d-link-dir-822k-63c160aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13549%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922fabcf051329c1a12556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13548-buffer-overflow-in-d-link-dir-822k-a1baf005</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13548%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922f42ae2031d6840968b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13547-memory-corruption-in-d-link-dir-822-525229cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13547%3A%20Memory%20Corruption%20in%20D-Link%20DIR-822K&amp;severity=high&amp;id=6922eec9e2031d684090bbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-x-1100-release-fix-warnings-sun-nov-23rd-b06c4153</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YARA-X%201.10.0%20Release%3A%20Fix%20Warnings%2C%20(Sun%2C%20Nov%2023rd)&amp;severity=medium&amp;id=6922e728bbe41230bc1301a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-441-released-sun-nov-23rd-e2aebe1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.4.1%20Released%2C%20(Sun%2C%20Nov%2023rd)&amp;severity=medium&amp;id=6922e728bbe41230bc1301a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13546-sql-injection-in-ashraf-kabir-trave-c023f406</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13546%3A%20SQL%20Injection%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922e3a8bbe41230bc0bab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-analysed-over-3-million-exposed-databases-using--0d31ed0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20Analysed%20Over%203%20Million%20Exposed%20Databases%20Using%20Netlas&amp;severity=medium&amp;id=6922e029bbe41230bc056cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13545-sql-injection-in-ashraf-kabir-trave-e5099c7a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13545%3A%20SQL%20Injection%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922dcc7bbe41230bcffa4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13544-unrestricted-upload-in-ashraf-kabir-9cfb676e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13544%3A%20Unrestricted%20Upload%20in%20ashraf-kabir%20travel-agency&amp;severity=medium&amp;id=6922d024ff9e296518d8d20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-23-0f27826d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-23&amp;severity=medium&amp;id=6923a0dadfa0c74de886e41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/piecing-together-the-puzzle-a-qilin-ransomware-inv-a53b5462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Piecing%20Together%20the%20Puzzle%3A%20A%20Qilin%20Ransomware%20Investigation&amp;severity=high&amp;id=6922409cc6e51a12697d89bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cox-enterprises-discloses-oracle-e-business-suite--bf811ba0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cox%20Enterprises%20discloses%20Oracle%20E-Business%20Suite%20data%20breach&amp;severity=high&amp;id=6922409cc6e51a12697d89b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt31-launches-stealthy-cyberattacks--77e7ae00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT31%20Launches%20Stealthy%20Cyberattacks%20on%20Russian%20IT%20Using%20Cloud%20Services&amp;severity=high&amp;id=6922409cc6e51a12697d89b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-fires-worker-over-insider-leak-to-scat-e93f5eb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20Fires%20Worker%20Over%20Insider%20Leak%20to%20Scattered%20Lapsus%20Hunters&amp;severity=medium&amp;id=6921e21f6499b98ae6c2e321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt31-launches-stealthy-cyberattacks--744c9ac0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT31%20Launches%20Stealthy%20Cyberattacks%20on%20Russian%20IT%20Using%20Cloud%20Services&amp;severity=medium&amp;id=6921f3b332b9fb10dcdbb5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13526-cwe-200-exposure-of-sensitive-infor-c69efaff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13526%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20walterpinem%20OneClick%20Chat%20to%20Order&amp;severity=high&amp;id=69219bd9de5ac9d38c932d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-confirms-october-windows-updates-cause-gami-1f3b9082</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nvidia%20confirms%20October%20Windows%20updates%20cause%20gaming%20issues&amp;severity=high&amp;id=69218aa02d0b68805e12c79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-actively-exploited-critical-oracle-i-0e583bed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Actively%20Exploited%20Critical%20Oracle%20Identity%20Manager%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=69218aa02d0b68805e12c797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matrix-push-c2-uses-browser-notifications-for-file-af10dc24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Matrix%20Push%20C2%20Uses%20Browser%20Notifications%20for%20Fileless%2C%20Cross-Platform%20Phishing%20Attacks&amp;severity=high&amp;id=69218aa02d0b68805e12c79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13318-cwe-862-missing-authorization-in-co-b89f94b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13318%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=medium&amp;id=692176e04ffda11ec247b4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13136-cwe-862-missing-authorization-in-we-c2151b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13136%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20GSheetConnector%20For%20Ninja%20Forms&amp;severity=medium&amp;id=692176e04ffda11ec247b4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12877-cwe-862-missing-authorization-in-th-b5113971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12877%3A%20CWE-862%20Missing%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=69216996633f6b6b24ab4788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12752-cwe-345-insufficient-verification-o-f97548b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12752%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20scottpaterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=69216996633f6b6b24ab4783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13384-cwe-862-missing-authorization-in-co-a8aeb71d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13384%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20CP%20Contact%20Form%20with%20PayPal&amp;severity=high&amp;id=69216996633f6b6b24ab4794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13317-cwe-862-missing-authorization-in-co-feb88ec8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13317%3A%20CWE-862%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=medium&amp;id=69216996633f6b6b24ab478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-actively-exploited-critical-oracle-i-f247f1c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Actively%20Exploited%20Critical%20Oracle%20Identity%20Manager%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=692197f8f26e99e45525990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11186-cwe-79-improper-neutralization-of-i-3017599a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humanityco%20Cookie%20Notice%20%26%20Compliance%20for%20GDPR%20%2F%20CCPA&amp;severity=medium&amp;id=692146e5c842cd8eff6ede85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-22-8690a755</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-22&amp;severity=medium&amp;id=692251b6e19ebcc2d2e1e346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11933-cwe-20-improper-input-validation-in-3e97d985</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11933%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wofSSL%20wolfSSL&amp;severity=low&amp;id=6920e83b27835fd566e7934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65947-cwe-400-uncontrolled-resource-consu-202f86ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65947%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20jzeuzs%20thread-amount&amp;severity=high&amp;id=6920e83b27835fd566e7935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-26-lazarus-groups-attack-campaig-6e35fbec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-26%20(Lazarus)%20Group&apos;s%20Attack%20Campaign%20Using%20Remote%20IT%20Disguise%20to%20Deploy%20Monitoring%20Software&amp;severity=medium&amp;id=6920e4b627835fd566e3a2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65946-cwe-77-improper-neutralization-of-s-2fc11be1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65946%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=6920e83b27835fd566e79355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65111-cwe-277-insecure-inherited-permissi-f28bfb4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65111%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20authzed%20spicedb&amp;severity=low&amp;id=6920e4b727835fd566e3a362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65109-cwe-830-inclusion-of-web-functional-19ee3a38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65109%3A%20CWE-830%3A%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20mindersec%20minder&amp;severity=high&amp;id=6920e16727835fd566e05955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65108-cwe-94-improper-control-of-generati-dced66f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65108%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20simonhaenisch%20md-to-pdf&amp;severity=critical&amp;id=6920e16727835fd566e0595a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65106-cwe-1336-improper-neutralization-of-60d52be5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65106%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20langchain-ai%20langchain&amp;severity=high&amp;id=6920de31ac1487f7bb25177e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65102-cwe-120-buffer-copy-without-checkin-d902ded3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65102%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=high&amp;id=6920de31ac1487f7bb251783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65092-cwe-125-out-of-bounds-read-in-espre-d1916e34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65092%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=6920de31ac1487f7bb25178a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0504-cwe-266-incorrect-privilege-assignme-514293b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0504%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Black%20Duck%20Black%20Duck%20SCA&amp;severity=medium&amp;id=6920de31ac1487f7bb251787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31216-an-attacker-with-physical-access-to-4be80ab9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31216%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20override%20managed%20Wi-Fi%20profiles%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6920daacac1487f7bb20ab51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31266-a-website-may-be-able-to-spoof-the--b1d348fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31266%3A%20A%20website%20may%20be%20able%20to%20spoof%20the%20domain%20name%20in%20the%20title%20of%20a%20pop-up%20window%20in%20Apple%20Safari&amp;severity=medium&amp;id=6920daacac1487f7bb20ab5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43374-an-attacker-in-physical-proximity-m-cc0b4834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43374%3A%20An%20attacker%20in%20physical%20proximity%20may%20be%20able%20to%20cause%20an%20out-of-bounds%20read%20in%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6920daacac1487f7bb20ab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31248-an-app-may-be-able-to-access-sensit-a6c285d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31248%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=6920daacac1487f7bb20ab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11087-cwe-352-cross-site-request-forgery--a2745dcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11087%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zozothemes%20Zegen%20Core&amp;severity=high&amp;id=6920cd59d9b84775478ce89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13524-cwe-404-improper-resource-shutdown--f8c020d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13524%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AWS%20Wickr&amp;severity=medium&amp;id=6920c6d9d9b8477547869881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36149-cwe-1021-improper-restriction-of-re-46ffb35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36149%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6920c3c04429ea99a572eb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48502-cwe-1285-improper-validation-of-spe-7eb8426f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48502%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=6920b9ca4429ea99a5688864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62609-cwe-476-null-pointer-dereference-in-f877e22b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62609%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ml-explore%20mlx&amp;severity=medium&amp;id=6920b9ca4429ea99a5688867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62608-cwe-122-heap-based-buffer-overflow--01465f49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62608%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ml-explore%20mlx&amp;severity=medium&amp;id=6920b9ca4429ea99a568886a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62626-cwe-333-improper-handling-of-insuff-2503f37c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62626%3A%20CWE-333%20%20Improper%20Handling%20of%20Insufficient%20Entropy%20in%20TRNG%20in%20AMD%20AMD%20Ryzen%E2%84%A2%209000HX%20Series%20Processors&amp;severity=high&amp;id=6920b65f6ec873750a9f2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64767-cwe-323-reusing-a-nonce-key-pair-in-186c6bb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64767%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20dajiaji%20hpke-js&amp;severity=critical&amp;id=6920b65f6ec873750a9f2a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29934-cwe-459-incomplete-cleanup-in-amd-a-dd91a08d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29934%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=medium&amp;id=6920b65f6ec873750a9f2a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grafana-patches-cvss-100-scim-flaw-enabling-impers-8f83a03b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grafana%20Patches%20CVSS%2010.0%20SCIM%20Flaw%20Enabling%20Impersonation%20and%20Privilege%20Escalation&amp;severity=high&amp;id=6920a91de2e82c33851a87fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-rolls-back-cybersecurity-rules-for-telcos-desp-fc26eddd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20rolls%20back%20cybersecurity%20rules%20for%20telcos%2C%20despite%20state-hacking%20risks&amp;severity=medium&amp;id=6920a91ee2e82c33851a8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crowdstrike-catches-insider-feeding-information-to-97861b31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrowdStrike%20catches%20insider%20feeding%20information%20to%20hackers&amp;severity=high&amp;id=6920a91de2e82c33851a87fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13132-cwe-1021-improper-restriction-of-re-36428c02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13132%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20The%20Browser%20Company%20of%20New%20York%20Dia&amp;severity=high&amp;id=6920a952e2e82c33851aa18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64483-cwe-284-improper-access-control-in--c348a962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64483%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20wazuh%20wazuh-dashboard-plugins&amp;severity=medium&amp;id=6920a952e2e82c33851aa18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13470-cwe-330-use-of-insufficiently-rando-68969447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13470%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Ribose%20RNP&amp;severity=high&amp;id=6920a035e2e82c338511ca88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/syncro-lovable-rat-delivery-via-ai-generated-websi-5440c7b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Syncro%20%2B%20Lovable%3A%20RAT%20delivery%20via%20AI-generated%20websites%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69209d99d229a3709c4237c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-android-malware-reads-whatsapp-telegra-1240df11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Android%20Malware%20Reads%20WhatsApp%2C%20Telegram%2C%20Signal%20Chats%20via%20Accessibility%20Abuse&amp;severity=medium&amp;id=69209a19d229a3709c3e2b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12973-cwe-434-unrestricted-upload-of-file-da6451f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12973%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20oc3dots%20S2B%20AI%20Assistant%20%E2%80%93%20ChatBot%2C%20ChatGPT%2C%20OpenAI%2C%20Content%20%26%20Image%20Generator&amp;severity=high&amp;id=6920a035e2e82c338511ca92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-atm-jackpotting-whatsapp-nso-lawsuit-51951431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20ATM%20Jackpotting%2C%20WhatsApp-NSO%20Lawsuit%20Continues%2C%20CISA%20Hiring&amp;severity=medium&amp;id=692088af0f995c4f64f0f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-breach-gainsight-apps-on-salesforce-c-6f24af47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Breach%20Gainsight%20Apps%20on%20Salesforce%2C%20Claim%20Data%20from%20Top%201000%20Firms&amp;severity=high&amp;id=692085360f995c4f64ece0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13357-cwe-1188-initialization-of-a-resour-82aa5381</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13357%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20HashiCorp%20Tooling&amp;severity=high&amp;id=6920823c0f995c4f64ea2855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tools-and-techniques-of-toddycat-apt-7ccd3269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tools%20and%20Techniques%20of%20ToddyCat%20APT&amp;severity=medium&amp;id=6920e4b627835fd566e3a2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41115-vulnerability-in-grafana-grafana-en-a6c59db4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41115%3A%20Vulnerability%20in%20Grafana%20Grafana%20Enterprise&amp;severity=critical&amp;id=6920778b69daa88a9a1ad75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13432-cwe-863-incorrect-authorization-in--9497e98e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13432%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20HashiCorp%20Terraform%20Enterprise&amp;severity=medium&amp;id=6920778b69daa88a9a1ad75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-oracle-identity-manager-flaw-possibly-exp-230f24ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Oracle%20Identity%20Manager%20Flaw%20Possibly%20Exploited%20as%20Zero-Day&amp;severity=critical&amp;id=69206eca40c35a606131d6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11127-cwe-639-authorization-bypass-throug-fc25013c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11127%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Mstoreapp%20Mobile%20App&amp;severity=critical&amp;id=69206ee440c35a606131e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sliver-c2-vulnerability-enables-attack-on-c2-opera-a2756876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sliver%20C2%20vulnerability%20enables%20attack%20on%20C2%20operators%20through%20insecure%20Wireguard%20network&amp;severity=medium&amp;id=692067d040c35a60612a111d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-brings-airdrop-compatibility-to-androids-qu-34cc82be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Brings%20AirDrop%20Compatibility%20to%20Android%E2%80%99s%20Quick%20Share%20Using%20Rust-Hardened%20Security&amp;severity=low&amp;id=6920e0aaac1487f7bb280f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66115-improper-control-of-filename-for-in-8db6ce53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66115%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20MatrixAddons%20Easy%20Invoice&amp;severity=medium&amp;id=69205c34c36be036e6ff2a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66114-missing-authorization-in-theme-fund-83ea93dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66114%3A%20Missing%20Authorization%20in%20theme%20funda%20Show%20Variations%20as%20Single%20Products%20Woocommerce&amp;severity=medium&amp;id=69205c33c36be036e6ff27c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66113-missing-authorization-in-themeateli-9ed7407e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66113%3A%20Missing%20Authorization%20in%20ThemeAtelier%20Better%20Chat%20Support%20for%20Messenger&amp;severity=medium&amp;id=69205c33c36be036e6ff27c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66112-missing-authorization-in-webtoffee--8fdac7a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66112%3A%20Missing%20Authorization%20in%20WebToffee%20Accessibility%20Toolkit%20by%20WebYes&amp;severity=medium&amp;id=69205c33c36be036e6ff27c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66111-improper-neutralization-of-input-du-dc8d328e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66111%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nelio%20Software%20Nelio%20Popups&amp;severity=medium&amp;id=69205c33c36be036e6ff27bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66110-missing-authorization-in-bplugins-t-bc59da05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66110%3A%20Missing%20Authorization%20in%20bPlugins%20Tiktok%20Feed&amp;severity=medium&amp;id=69205c33c36be036e6ff27ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66109-missing-authorization-in-octolize-c-bd300288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66109%3A%20Missing%20Authorization%20in%20Octolize%20Shipping%20Plugins%20Cart%20Weight%20for%20WooCommerce&amp;severity=medium&amp;id=69205c33c36be036e6ff27b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66108-missing-authorization-in-merlot-dig-6d78b761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66108%3A%20Missing%20Authorization%20in%20Merlot%20Digital%20(by%20TNC)%20TNC%20Toolbox%3A%20Web%20Performance&amp;severity=medium&amp;id=69205c33c36be036e6ff27b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66107-missing-authorization-in-scott-pate-990b8a9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66107%3A%20Missing%20Authorization%20in%20Scott%20Paterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=69205c33c36be036e6ff27b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66106-missing-authorization-in-essential--46a7d63f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66106%3A%20Missing%20Authorization%20in%20Essential%20Plugin%20Featured%20Post%20Creative&amp;severity=medium&amp;id=69205c33c36be036e6ff27ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66101-missing-authorization-in-sabuj-kund-2e9fe0ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66101%3A%20Missing%20Authorization%20in%20Sabuj%20Kundu%20CBX%20Bookmark%20%26%20Favorite&amp;severity=medium&amp;id=69205c33c36be036e6ff27ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66099-missing-authorization-in-themeateli-0357207f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66099%3A%20Missing%20Authorization%20in%20ThemeAtelier%20Chat%20Help&amp;severity=medium&amp;id=69205c31c36be036e6ff2770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66098-improper-neutralization-of-input-du-254f8772</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Camille%20V%20Travelers&apos;%20Map&amp;severity=medium&amp;id=69205c31c36be036e6ff276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66097-cross-site-request-forgery-csrf-in--f3d2fb93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66097%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Jerosimi%C4%87%20I%20Order%20Terms&amp;severity=medium&amp;id=69205c31c36be036e6ff276a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66096-missing-authorization-in-imtiaz-ray-3d1e4901</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66096%3A%20Missing%20Authorization%20in%20Imtiaz%20Rayhan%20Table%20Block%20by%20Tableberg&amp;severity=medium&amp;id=69205c31c36be036e6ff2767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66095-improper-neutralization-of-special--3bc15538</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66095%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20KiviCare&amp;severity=medium&amp;id=69205c31c36be036e6ff2764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66093-improper-neutralization-of-input-du-0b9e6f44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=69205c31c36be036e6ff2761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66092-improper-neutralization-of-input-du-4e40bb13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Accordion%20Slider&amp;severity=medium&amp;id=69205c31c36be036e6ff275e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66091-improper-neutralization-of-input-du-a7736fcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Design%20Stylish%20Cost%20Calculator&amp;severity=medium&amp;id=69205c31c36be036e6ff275b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66090-improper-neutralization-of-input-du-9d4c6df5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=medium&amp;id=69205c31c36be036e6ff2758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66089-missing-authorization-in-webtoffee--d8a32048</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66089%3A%20Missing%20Authorization%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=medium&amp;id=69205c31c36be036e6ff2755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66087-missing-authorization-in-property-h-de64c116</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66087%3A%20Missing%20Authorization%20in%20Property%20Hive%20PropertyHive&amp;severity=medium&amp;id=69205c30c36be036e6ff273f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66086-missing-authorization-in-cozy-visio-c54fe459</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66086%3A%20Missing%20Authorization%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=medium&amp;id=69205c30c36be036e6ff273c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66085-missing-authorization-in-tychesoftw-51770505</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66085%3A%20Missing%20Authorization%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=medium&amp;id=69205c30c36be036e6ff2739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66084-missing-authorization-in-shahjahan--7c1015fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66084%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20FluentCommunity&amp;severity=medium&amp;id=69205c30c36be036e6ff2736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66083-missing-authorization-in-magepeople-c91a254d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66083%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69205c30c36be036e6ff2733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66082-missing-authorization-in-magepeople-5b92adfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66082%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=medium&amp;id=69205c30c36be036e6ff2730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66081-improper-neutralization-of-input-du-a12af44c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66081%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Head%20Meta%20Data&amp;severity=medium&amp;id=69205c30c36be036e6ff272d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66079-missing-authorization-in-jegstudio--a0dba2dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66079%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse%20Form&amp;severity=medium&amp;id=69205c30c36be036e6ff272a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66077-missing-authorization-in-wpwax-lega-820db950</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66077%3A%20Missing%20Authorization%20in%20wpWax%20Legal%20Pages&amp;severity=medium&amp;id=69205c30c36be036e6ff2727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66075-missing-authorization-in-wp-legal-p-561babd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66075%3A%20Missing%20Authorization%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=medium&amp;id=69205c30c36be036e6ff2724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66073-deserialization-of-untrusted-data-i-43a58f67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66073%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20WP%20Webhooks&amp;severity=medium&amp;id=69205c2fc36be036e6ff270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66072-missing-authorization-in-stiofan-us-eae83e9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66072%3A%20Missing%20Authorization%20in%20Stiofan%20UsersWP&amp;severity=critical&amp;id=69205c2fc36be036e6ff270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66071-missing-authorization-in-tychesoftw-4fc0ab35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66071%3A%20Missing%20Authorization%20in%20tychesoftwares%20Custom%20Order%20Numbers%20for%20WooCommerce&amp;severity=medium&amp;id=69205c2fc36be036e6ff2708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66069-missing-authorization-in-themeisle--ce99c8fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66069%3A%20Missing%20Authorization%20in%20Themeisle%20PPOM%20for%20WooCommerce&amp;severity=medium&amp;id=69205c2ec36be036e6ff2705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66067-improper-neutralization-of-input-du-215807dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66067%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=medium&amp;id=69205c2ec36be036e6ff2702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66066-improper-neutralization-of-input-du-66cbe8a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66066%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnvoThemes%20Envo%20Extra&amp;severity=medium&amp;id=69205c2ec36be036e6ff26ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66065-missing-authorization-in-jegstudio--6cfef704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66065%3A%20Missing%20Authorization%20in%20Jegstudio%20Gutenverse&amp;severity=medium&amp;id=69205c2ec36be036e6ff26fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66064-cross-site-request-forgery-csrf-in--a229181d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66064%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=medium&amp;id=69205c2ec36be036e6ff26f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66063-missing-authorization-in-jgwhite33--0d43e325</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66063%3A%20Missing%20Authorization%20in%20jgwhite33%20WP%20Google%20Review%20Slider&amp;severity=medium&amp;id=69205c2ec36be036e6ff26f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66062-url-redirection-to-untrusted-site-o-a1f1394e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66062%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Frank%20Goossens%20WP%20YouTube%20Lyte&amp;severity=low&amp;id=69205c2ec36be036e6ff26f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66061-cross-site-request-forgery-csrf-in--452dd78d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66061%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66060-missing-authorization-in-craig-hewi-d67dd67f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66060%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66059-exposure-of-sensitive-system-inform-6395ecac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66059%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66057-improper-neutralization-of-input-du-7d6057af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66056-exposure-of-sensitive-system-inform-2fb45be5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66056%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=medium&amp;id=69205c2dc36be036e6ff26d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66055-deserialization-of-untrusted-data-i-59d5ebe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66055%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Icegram%20Email%20Subscribers%20%26%20Newsletters&amp;severity=high&amp;id=69205c2dc36be036e6ff26ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66053-improper-neutralization-of-input-du-4c15e8bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold&amp;severity=medium&amp;id=69205c2dc36be036e6ff26cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10039-cwe-639-authorization-bypass-throug-84c10025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10039%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69205c2dc36be036e6ff26bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12935-cwe-79-improper-neutralization-of-i-847bccf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20FluentCRM%20%E2%80%93%20Email%20Newsletter%2C%20Automation%2C%20Email%20Marketing%2C%20Email%20Campaigns%2C%20Optins%2C%20Leads%2C%20and%20CRM%20Solution&amp;severity=medium&amp;id=69205c2dc36be036e6ff26c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10054-cwe-862-missing-authorization-in-el-b3f23475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10054%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=69205c2dc36be036e6ff26c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-patches-high-severity-flaws-in-firewalls-aeda4c7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Patches%20High-Severity%20Flaws%20in%20Firewalls%2C%20Email%20Security%20Appliance&amp;severity=high&amp;id=69205c10c36be036e6ff0e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cyberspies-deploy-badaudio-malware-via-sup-4f8a0874</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cyberspies%20Deploy%20%E2%80%98BadAudio%E2%80%99%20Malware%20via%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=692051051a6f98a3eddd2992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squarex-and-perplexity-quarrel-over-alleged-comet--87b376dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquareX%20and%20Perplexity%20Quarrel%20Over%20Alleged%20Comet%20Browser%20Vulnerability&amp;severity=medium&amp;id=69204a061a6f98a3edd419e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt24-deploys-badaudio-in-years-long-espionage-hit-e8f1feb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT24%20Deploys%20BADAUDIO%20in%20Years-Long%20Espionage%20Hitting%20Taiwan%20and%201%2C000%2B%20Domains&amp;severity=medium&amp;id=6920e0aaac1487f7bb280f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/use-of-css-stuffing-as-an-obfuscation-techniquex3f-ee608ee6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%26%23x3f%3B%2C%20(Fri%2C%20Nov%2021st)&amp;severity=medium&amp;id=69203653b6fc887540a4b876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-instances-hacked-via-gainsight-integrat-e4ef3f90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Instances%20Hacked%20via%20Gainsight%20Integrations&amp;severity=medium&amp;id=69203643b6fc887540a4a8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12750-cwe-89-improper-neutralization-of-s-f4dd2363</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20trainingbusinesspros%20Groundhogg%20%E2%80%94%20CRM%2C%20Newsletters%2C%20and%20Marketing%20Automation&amp;severity=medium&amp;id=692032ceb6fc887540a02d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12160-cwe-79-improper-neutralization-of-i-d593386d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nmedia%20Simple%20User%20Registration&amp;severity=high&amp;id=692032ceb6fc887540a02d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12066-cwe-79-improper-neutralization-of-i-084c93a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etruel%20WP%20Delete%20Post%20Copies&amp;severity=medium&amp;id=692032ceb6fc887540a02d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12964-cwe-79-improper-neutralization-of-i-7e9b5e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12964%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Products%20Display%20%E2%80%93%20Elementor%20WooCommerce%20Widgets%20%7C%20Product%20Sliders%2C%20Grids%20%26%20AJAX%20Search&amp;severity=medium&amp;id=692032ceb6fc887540a02d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13138-cwe-89-improper-neutralization-of-s-1166d4c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13138%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=high&amp;id=692032ceb6fc887540a02d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13156-cwe-434-unrestricted-upload-of-file-9f39b926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13156%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20appsbd%20Vitepos%20%E2%80%93%20Point%20of%20Sale%20(POS)%20for%20WooCommerce&amp;severity=high&amp;id=69202539cf2d47c3899a7b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11808-cwe-79-improper-neutralization-of-i-c839f951</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antiochinteractive%20Shortcode%20for%20Google%20Street%20View&amp;severity=medium&amp;id=69202539cf2d47c3899a7b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13141-cwe-79-improper-neutralization-of-i-33e6250d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=69202539cf2d47c3899a7b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13149-cwe-862-missing-authorization-in-pu-36d21510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13149%3A%20CWE-862%20Missing%20Authorization%20in%20publishpress%20Schedule%20Post%20Changes%20With%20PublishPress%20Future%3A%20Unpublish%2C%20Delete%2C%20Change%20Status%2C%20Trash%2C%20Change%20Categories&amp;severity=medium&amp;id=69202539cf2d47c3899a7b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11826-cwe-79-improper-neutralization-of-i-30c4f59f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdeleasa%20WP%20Company%20Info&amp;severity=medium&amp;id=69202539cf2d47c3899a7b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11973-cwe-73-external-control-of-file-nam-4f7c3166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11973%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path&amp;severity=medium&amp;id=69202539cf2d47c3899a7b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12039-cwe-200-exposure-of-sensitive-infor-0c5b085f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12039%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20devsmip%20BigBuy%20Dropshipping%20Connector%20for%20WooCommerce&amp;severity=medium&amp;id=69202539cf2d47c3899a7b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11803-cwe-79-improper-neutralization-of-i-e1ddfab2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpfanyi%20WPSite%20Shortcode&amp;severity=medium&amp;id=69202539cf2d47c3899a7b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sec-drops-solarwinds-case-after-years-of-high-stak-d3107cc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEC%20Drops%20SolarWinds%20Case%20After%20Years%20of%20High-Stakes%20Cybersecurity%20Scrutiny&amp;severity=high&amp;id=69201f0fdd76cb6d6068c37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11800-cwe-79-improper-neutralization-of-i-c58ea578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20MiniCRM%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11985-cwe-862-missing-authorization-in-no-920ac29d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11985%3A%20CWE-862%20Missing%20Authorization%20in%20nootheme%20Realty%20Portal&amp;severity=high&amp;id=69202359cf2d47c38997b49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11802-cwe-79-improper-neutralization-of-i-c1c6185e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bartboy011%20Bulma%20Shortcodes&amp;severity=medium&amp;id=69202359cf2d47c38997b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11773-cwe-862-missing-authorization-in-be-9b3a3559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11773%3A%20CWE-862%20Missing%20Authorization%20in%20beycanpress%20Cryptocurrency%20(Token)%2C%20Launchpad%20(Presale)%2C%20ICO%20%26%20IDO%2C%20Airdrop%20by%20TokenICO&amp;severity=medium&amp;id=69202359cf2d47c38997b47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11763-cwe-79-improper-neutralization-of-i-54900776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustybadrobot%20Display%20Pages%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13135-cwe-79-improper-neutralization-of-i-0ddcdf2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationshotelrunner%20HotelRunner%20Booking%20Widget&amp;severity=medium&amp;id=6920235bcf2d47c38997b54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11764-cwe-79-improper-neutralization-of-i-bcba4791</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fastmover%20Shortcodes%20Bootstrap&amp;severity=medium&amp;id=69202359cf2d47c38997b3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10938-cwe-862-missing-authorization-in-ad-8a296093</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10938%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11771-cwe-306-missing-authentication-for--d1b76c82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11771%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20beycanpress%20Cryptocurrency%20(Token)%2C%20Launchpad%20(Presale)%2C%20ICO%20%26%20IDO%2C%20Airdrop%20by%20TokenICO&amp;severity=medium&amp;id=69202359cf2d47c38997b415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11003-cwe-862-missing-authorization-in-ad-7ef4beb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11003%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11799-cwe-79-improper-neutralization-of-i-19d2ff0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Affiliate%20AI%20Lite&amp;severity=medium&amp;id=69202359cf2d47c38997b482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11456-cwe-434-unrestricted-upload-of-file-923ed709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11456%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=critical&amp;id=69202359cf2d47c38997b3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12881-cwe-639-authorization-bypass-throug-9d9ee48c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12881%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=6920235bcf2d47c38997b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11815-cwe-285-improper-authorization-in-a-9e096e51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11815%3A%20CWE-285%20Improper%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=medium&amp;id=69202359cf2d47c38997b493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13159-cwe-79-improper-neutralization-of-i-5ba765cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flothemesplugins%20Flo%20Forms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=6920235bcf2d47c38997b556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13134-cwe-352-cross-site-request-forgery--11ecc19e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13134%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20powerblogservice%20AuthorSure&amp;severity=medium&amp;id=6920235bcf2d47c38997b54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12135-cwe-79-improper-neutralization-of-i-6092e1b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=69202359cf2d47c38997b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11885-cwe-79-improper-neutralization-of-i-7a152037</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itvn9online%20EchBay%20Admin%20Security&amp;severity=medium&amp;id=69202359cf2d47c38997b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13142-cwe-352-cross-site-request-forgery--521d21e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20farvehandleren%20Custom%20Post%20Type&amp;severity=medium&amp;id=6920235bcf2d47c38997b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11768-cwe-79-improper-neutralization-of-i-442d6787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darto%20Islamic%20Phrases&amp;severity=medium&amp;id=69202359cf2d47c38997b3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11770-cwe-79-improper-neutralization-of-i-c3cf1952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20billybigpotatoes%20BrightTALK%20WordPress%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11767-cwe-79-improper-neutralization-of-i-53a51c1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fpcorso%20Tips%20Shortcode&amp;severity=medium&amp;id=69202359cf2d47c38997b3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12894-cwe-552-files-or-directories-access-407703ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12894%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=medium&amp;id=6920235bcf2d47c38997b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11801-cwe-79-improper-neutralization-of-i-d3a7ab57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidangel%20AudioTube&amp;severity=medium&amp;id=69202359cf2d47c38997b48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12138-cwe-434-unrestricted-upload-of-file-e6be311b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12138%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bww%20URL%20Image%20Importer&amp;severity=high&amp;id=6920235bcf2d47c38997b52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11765-cwe-79-improper-neutralization-of-i-bbab4592</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20developdaly%20Stock%20Tools&amp;severity=medium&amp;id=69202359cf2d47c38997b3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12170-cwe-862-missing-authorization-in-ba-650de3bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12170%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20Checkbox&amp;severity=medium&amp;id=6920235bcf2d47c38997b534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12086-cwe-639-authorization-bypass-throug-dc0de6dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12086%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce&amp;severity=medium&amp;id=69202359cf2d47c38997b4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12661-cwe-79-improper-neutralization-of-i-4a6b7d30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qzzr%20Pollcaster%20Shortcode%20Plugin&amp;severity=medium&amp;id=6920235bcf2d47c38997b53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13322-cwe-73-external-control-of-file-nam-7fd7d276</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13322%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20husainali52%20WP%20AUDIO%20GALLERY&amp;severity=high&amp;id=6920235bcf2d47c38997b878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12660-cwe-79-improper-neutralization-of-i-270ea890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coffeebite%20Padlet%20Shortcode&amp;severity=medium&amp;id=6920235bcf2d47c38997b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64695-uncontrolled-search-path-element-in-70cf3f5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64695%3A%20Uncontrolled%20Search%20Path%20Element%20in%20LogStare%20Inc.%20Installer%20of%20LogStare%20Collector%20(for%20Windows)&amp;severity=high&amp;id=6920092a04dd2c5f9994c018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64299-insertion-of-sensitive-information--87b3d590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64299%3A%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62687-cross-site-request-forgery-csrf-in--30ce278f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62687%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62189-incorrect-authorization-in-logstare-250232df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62189%3A%20Incorrect%20authorization%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61949-cross-site-scripting-xss-in-logstar-a04b6441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61949%3A%20Cross-site%20scripting%20(XSS)%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58097-incorrect-default-permissions-in-lo-cad12027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58097%3A%20Incorrect%20default%20permissions%20in%20LogStare%20Inc.%20LogStare%20Collector%20(for%20Windows)&amp;severity=medium&amp;id=6920092a04dd2c5f9994c004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13499-cwe-824-access-of-uninitialized-poi-dde9f5a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13499%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=692005a604dd2c5f9990df0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12169-cwe-862-missing-authorization-in-el-034b949f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12169%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12022-cwe-862-missing-authorization-in-el-342a8da7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12022%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12085-cwe-862-missing-authorization-in-el-ee14e70f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12085%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12023-cwe-862-missing-authorization-in-el-d20d54a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12023%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=medium&amp;id=691ffc17a535ade79490ffbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11368-cwe-200-exposure-of-sensitive-infor-313b2bf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11368%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=691ffc17a535ade79490ffb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-flags-unauthorized-data-access-via-gain-38c13911</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Flags%20Unauthorized%20Data%20Access%20via%20Gainsight-Linked%20OAuth%20Activity&amp;severity=medium&amp;id=69200b7904dd2c5f999794b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reoccurring-use-of-highly-suspicious-pdf-editors-t-c6459ebc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reoccurring%20Use%20of%20Highly%20Suspicious%20PDF%20Editors%20to%20Infiltrate%20Environments&amp;severity=medium&amp;id=692032cfb6fc887540a02d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64310-improper-restriction-of-excessive-a-919b7551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64310%3A%20Improper%20restriction%20of%20excessive%20authentication%20attempts%20in%20SEIKO%20EPSON%20CORPORATION%20EPSON%20WebConfig%20for%20SEIKO%20EPSON%20Projector%20Products&amp;severity=critical&amp;id=691fd59470da09562fab65e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/its-not-personal-its-just-business-fa23a3e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It&apos;s%20not%20personal%2C%20it&apos;s%20just%20business&amp;severity=medium&amp;id=692032cfb6fc887540a02d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64762-cwe-524-use-of-cache-containing-sen-e4c820e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64762%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20workos%20authkit-nextjs&amp;severity=high&amp;id=691fc3ff70da09562fa7fca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62372-cwe-129-improper-validation-of-arra-e03484d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62372%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20vllm-project%20vllm&amp;severity=high&amp;id=691fc3ff70da09562fa7fc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62426-cwe-770-allocation-of-resources-wit-efc9cb1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62426%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=691fc3ff70da09562fa7fc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62164-cwe-20-improper-input-validation-in-b2b9032c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62164%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=high&amp;id=691fc3ff70da09562fa7fc8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64755-cwe-78-improper-neutralization-of-s-ff3ccb17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64755%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=691fc3ff70da09562fa7fca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/4-people-indicted-in-alleged-conspiracy-to-smuggle-cc35ec9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=4%20People%20Indicted%20in%20Alleged%20Conspiracy%20to%20Smuggle%20Supercomputers%20and%20Nvidia%20Chips%20to%20China&amp;severity=high&amp;id=691fb5f870da09562f99df09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esbuild-xss-bug-that-survived-5b-downloads-and-byp-7278ec6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Esbuild%20XSS%20Bug%20That%20Survived%205B%20Downloads%20and%20Bypassed%20HTML%20Sanitization&amp;severity=medium&amp;id=691fac729bfed6bde22cd559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13485-sql-injection-in-itsourcecode-onlin-7a44a97d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13485%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20File%20Management%20System&amp;severity=medium&amp;id=691fac6e9bfed6bde22c976d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-21-9c6abe4d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-21&amp;severity=medium&amp;id=6920fe842cd4adea235208d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13484-cross-site-scripting-in-campcodes-c-9da2aea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13484%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Complete%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=691f98772b54a79d3490b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62459-cwe-79-improper-neutralization-of-i-206ca234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62459%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20365%20Defender%20Portal&amp;severity=high&amp;id=691f98772b54a79d3490b348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64660-cwe-284-improper-access-control-in--7ee6959a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64660%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=691f98772b54a79d3490b34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62207-cwe-918-server-side-request-forgery-eddd1b15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62207%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Monitor%20Control%20Service&amp;severity=high&amp;id=691f98772b54a79d3490b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49752-cwe-294-authentication-bypass-by-ca-8a434aea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49752%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Microsoft%20Azure%20Bastion%20Developer&amp;severity=critical&amp;id=691f98772b54a79d3490b33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59245-cwe-502-deserialization-of-untruste-ba16b807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59245%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Online&amp;severity=critical&amp;id=691f98772b54a79d3490b342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64655-cwe-285-improper-authorization-in-m-10e45e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64655%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Dynamics%20OmniChannel%20SDK%20Storage%20Containers&amp;severity=high&amp;id=691f98772b54a79d3490b34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hacking-suspect-wanted-by-the-fbi-arrested-4c63be64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hacking%20Suspect%20Wanted%20by%20the%20FBI%20Arrested%20on%20Thai%20Resort%20Island&amp;severity=medium&amp;id=691f94ed2b54a79d348a2980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tsundere-botnet-uses-the-ethereum-blockchain-t-aff761df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Tsundere%20botnet%20uses%20the%20Ethereum%20blockchain%20to%20infect%20its%20targets&amp;severity=medium&amp;id=692032cfb6fc887540a02d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36072-cwe-502-deserialization-of-untruste-75722675</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36072%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20webMethods%20Integration&amp;severity=high&amp;id=691f95052b54a79d348a4b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-claims-to-steal-23tb-data-from-italian-rail-dd707b7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20claims%20to%20steal%202.3TB%20data%20from%20Italian%20rail%20group%2C%20Almavia&amp;severity=high&amp;id=691f8f07b342c1dca41c2e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13087-cwe-78-improper-neutralization-of-s-1349e98f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13087%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Opto22%20GRV-EPIC-PR1&amp;severity=high&amp;id=691f8b86b342c1dca4180130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36153-cwe-79-improper-neutralization-of-i-bfa12b3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36158-cwe-674-uncontrolled-recursion-in-i-9f563568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36158%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36159-cwe-117-improper-output-neutralizat-cae66a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36159%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f880cb342c1dca413b0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36160-cwe-497-exposure-of-sensitive-syste-c6a0b0b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36160%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f85874f1c50aa2eb92647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62674-cwe-306-in-icam365-p201-9230f076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62674%3A%20CWE-306%20in%20iCam365%20P201&amp;severity=high&amp;id=691f7e7c4f1c50aa2eb161a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-investigates-customer-data-theft-via-ga-e918966a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20investigates%20customer%20data%20theft%20via%20Gainsight%20breach&amp;severity=high&amp;id=691f7b004f1c50aa2eacb308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tsundere-botnet-expands-using-game-lures-and-ether-418d1a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tsundere%20Botnet%20Expands%20Using%20Game%20Lures%20and%20Ethereum-Based%20C2%20on%20Windows&amp;severity=high&amp;id=691f7b004f1c50aa2eacb30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-exploits-unpatched-ray-flaw-to-build--c863b3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%20Exploits%20Unpatched%20Ray%20Flaw%20to%20Build%20Self-Spreading%20GPU%20Cryptomining%20Botnet&amp;severity=high&amp;id=691f7a1328b41f27b440ffba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64770-cwe-306-in-icam365-p201-290be593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64770%3A%20CWE-306%20in%20iCam365%20P201&amp;severity=high&amp;id=691f7c954f1c50aa2eb03748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unquoted-paths-the-decades-old-windows-flaw-still--cac45693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unquoted%20Paths%3A%20The%20Decades-Old%20Windows%20Flaw%20Still%20Enabling%20Hidden%20Code%20Execution&amp;severity=medium&amp;id=691f731228b41f27b438ba43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-to-multi-vector-attacks-d8f8f213</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT24%20%20Pivot%20to%20Multi-Vector%20Attacks&amp;severity=medium&amp;id=691f8f1ab342c1dca41c3372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-banking-malware-bypassing-whatsapp-telegram-26d7c0ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Banking%20Malware%20bypassing%20WhatsApp%2C%20Telegram%20and%20Signal%20Encryption&amp;severity=medium&amp;id=691f8f1ab342c1dca41c339a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-compromise-leads-to-astaroth-deployment-c169a524</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20compromise%20leads%20to%20Astaroth%20deployment&amp;severity=medium&amp;id=691f9295b342c1dca420b6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35029-cwe-79-improper-neutralization-of-i-f94da58c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35029%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=691f6f9228b41f27b434758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52668-vulnerability-in-revive-revive-adse-9f5231f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52668%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48986-vulnerability-in-revive-revive-adse-4091652c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48986%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48987-vulnerability-in-revive-revive-adse-4dcfc783</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48987%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55123-vulnerability-in-revive-revive-adse-567d7ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55123%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52671-vulnerability-in-revive-revive-adse-b47f1c79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52671%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52666-vulnerability-in-revive-revive-adse-730a1f46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52666%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087528a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52669-vulnerability-in-revive-revive-adse-0a553568</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52669%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0640b920e270875293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55124-vulnerability-in-revive-revive-adse-af3710ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55124%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f6d0840b920e2708759af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52670-vulnerability-in-revive-revive-adse-40057dbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52670%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=691f6d0640b920e270875296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52667-vulnerability-in-revive-revive-adse-191b55af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52667%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=low&amp;id=691f6d0640b920e27087528d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55126-vulnerability-in-revive-revive-adse-ba3497a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55126%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55127-vulnerability-in-revive-revive-adse-b99c2e3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55127%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55128-vulnerability-in-revive-revive-adse-53c4fddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55128%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=691f698540b920e2708380e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10571-cwe-288-authentication-bypass-using-44a6782d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10571%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ABB%20ABB%20Ability%20Edgenius&amp;severity=critical&amp;id=691f5c4ce672cd9080e8d38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64524-cwe-122-heap-based-buffer-overflow--fbfe4378</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64524%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20cups-filters&amp;severity=low&amp;id=691f58cde672cd9080e446f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-breached-brazilian-ener-ae22f401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Breached%20Brazilian%20Energy%20Giant%20Petrobras&amp;severity=high&amp;id=691f58bee672cd9080e41a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tv-streaming-piracy-service-with-26m-yearly-visits-fe8c606f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TV%20streaming%20piracy%20service%20with%2026M%20yearly%20visits%20shut%20down&amp;severity=high&amp;id=691f515438b88f02b51b9979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-the-watering-hole-apt24s-pivot-to-multi-vec-43e857b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20the%20Watering%20Hole%3A%20APT24&apos;s%20Pivot%20to%20Multi-Vector%20Attacks&amp;severity=medium&amp;id=691f515438b88f02b51b9981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/d-link-warns-of-new-rce-flaws-in-end-of-life-dir-8-62328988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=D-Link%20warns%20of%20new%20RCE%20flaws%20in%20end-of-life%20DIR-878%20routers&amp;severity=high&amp;id=691f515438b88f02b51b9975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-exploits-unpatched-ray-flaw-to-build--0d0ab054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%20Exploits%20Unpatched%20Ray%20Flaw%20to%20Build%20Self-Spreading%20GPU%20Cryptomining%20Botnet&amp;severity=medium&amp;id=691fbbd770da09562fa00949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sonicwall-sonicos-flaw-allows-hackers-to-crash-bc3b45df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SonicWall%20SonicOS%20flaw%20allows%20hackers%20to%20crash%20firewalls&amp;severity=high&amp;id=691f515438b88f02b51b997d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64185-cwe-277-insecure-inherited-permissi-14dc3335</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64185%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20OSC%20ondemand&amp;severity=medium&amp;id=691f4b4ed2e902043d281088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tsundere-botnet-expands-using-game-lures-and-ether-79375339</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tsundere%20Botnet%20Expands%20Using%20Game%20Lures%20and%20Ethereum-Based%20C2%20on%20Windows&amp;severity=medium&amp;id=691fbbd770da09562fa0094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62724-cwe-61-unix-symbolic-link-symlink-f-b6e40ee0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62724%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20OSC%20ondemand&amp;severity=medium&amp;id=691f4e5838b88f02b5191673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-identity-manager-exploit-observation-from-s-9db45a40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Identity%20Manager%20Exploit%20Observation%20from%20September%20(CVE-2025-61757)%2C%20(Thu%2C%20Nov%2020th)&amp;severity=critical&amp;id=691fbca370da09562fa0bb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62709-cwe-640-weak-password-recovery-mech-2d2a4583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62709%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=691f4e5838b88f02b519166f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13437-cwe-706-use-of-incorrectly-resolved-26af9fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13437%3A%20CWE-706%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20Google%20zx&amp;severity=medium&amp;id=691f4446d2e902043d1f9194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62875-cwe-754-improper-check-for-unusual--80a44513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62875%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=691f3e06b661599aeb29272e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-banking-trojan-targets-whatsapp-telegr-6eb390b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Banking%20Trojan%20Targets%20WhatsApp%2C%20Telegram%2C%20Signal%20Messages&amp;severity=medium&amp;id=691f36f1b661599aeb20cba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34320-cwe-22-improper-limitation-of-a-pat-c6ebdee7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BASIS%20International%20Ltd.%20BASIS%20BBj&amp;severity=critical&amp;id=691f3714b661599aeb20f31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13425-cwe-476-null-pointer-dereference-in-331e34da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13425%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Google%20OSV-SCALIBR&amp;severity=low&amp;id=691f3714b661599aeb20f317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36161-cwe-327-use-of-a-broken-or-risky-cr-dd3da164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36161%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert&amp;severity=medium&amp;id=691f3714b661599aeb20f31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nknshell-malware-distributed-via-vpn-website-d695fc0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NKNShell%20Malware%20Distributed%20via%20VPN%20Website&amp;severity=medium&amp;id=691f9295b342c1dca420b6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/october-2025-infostealer-trend-report-4ba60ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=October%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=691f9295b342c1dca420b68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/october-2025-trends-report-on-phishing-emails-40cb846e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=October%202025%20Trends%20Report%20on%20Phishing%20Emails&amp;severity=medium&amp;id=691f9295b342c1dca420b6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-eternidade-stealer-spreads-via-whatsapp-to-ste-01415930</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Eternidade%20Stealer%20Spreads%20Via%20WhatsApp%20to%20Steal%20Banking%20and%20Crypto%20Data&amp;severity=medium&amp;id=691f1dd53e6177767e7f4ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0645-cwe-434-unrestricted-upload-of-file--48528534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0645%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Narkom%20Communication%20and%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Pyxis%20Signage&amp;severity=high&amp;id=691f1de63e6177767e7f6c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13469-cross-site-scripting-in-public-know-6dca8e08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13469%3A%20Cross%20Site%20Scripting%20in%20Public%20Knowledge%20Project%20omp&amp;severity=medium&amp;id=691f1de63e6177767e7f6c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13468-missing-authorization-in-sourcecode-93a30d17</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13468%3A%20Missing%20Authorization%20in%20SourceCodester%20Alumni%20Management%20System&amp;severity=medium&amp;id=691f1a653e6177767e7adff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-50000-asus-routers-hacked-in-operation-wrthug-06ea9abd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2050%2C000%20Asus%20Routers%20Hacked%20in%20%E2%80%98Operation%20WrtHug%E2%80%99&amp;severity=medium&amp;id=691f1a473e6177767e7ac56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0643-cwe-79-improper-neutralization-of-in-05f21db9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Narkom%20Communication%20and%20Software%20Technologies%20Trade%20Ltd.%20Co.%20Pyxis%20Signage&amp;severity=high&amp;id=691f1a653e6177767e7adfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-and-allies-sanction-russian-bulletproof-hosting-02a9a3a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20and%20Allies%20Sanction%20Russian%20Bulletproof%20Hosting%20Service%20Providers&amp;severity=medium&amp;id=691f0ff063b28c178c82ff31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comet-browser-flaw-lets-hidden-api-run-commands-on-6917801c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Comet%20Browser%20Flaw%20Lets%20Hidden%20API%20Run%20Commands%20on%20Users%E2%80%99%20Devices&amp;severity=medium&amp;id=691f0c7663b28c178c7eba58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-0-days-linkedin-spies-crypto-c-dea83a3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%200-Days%2C%20LinkedIn%20Spies%2C%20Crypto%20Crimes%2C%20IoT%20Flaws%20and%20New%20Malware%20Waves&amp;severity=medium&amp;id=691f158663b28c178c8a2615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40601-cwe-121-stack-based-buffer-overflow-6e3b704d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40601%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=691f0c8663b28c178c7ec081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40605-cwe-23-relative-path-traversal-in-s-8c5366d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40605%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=691f097d63b28c178c7c152c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40604-cwe-494-download-of-code-without-in-08dc3a3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40604%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20SonicWall%20Email%20Security&amp;severity=medium&amp;id=691f097d63b28c178c7c1528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eternidade-stealer-whatsapp-hijacking-for-banking--06dbe44a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eternidade%20Stealer%3A%20WhatsApp%20Hijacking%20for%20Banking%20Fraud&amp;severity=medium&amp;id=691f04a4d820e5151fbc3c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-allowed-scraping-of-35-billion-whats-58b86501</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20Allowed%20Scraping%20of%203.5%20Billion%20WhatsApp%20Accounts&amp;severity=low&amp;id=691f0488d820e5151fbc22be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctm360-exposes-a-global-whatsapp-hijacking-campaig-8ef1b943</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTM360%20Exposes%20a%20Global%20WhatsApp%20Hijacking%20Campaign%3A%20HackOnChat&amp;severity=medium&amp;id=691f158663b28c178c8a2618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sturnus-android-trojan-quietly-captures-encryp-4fcb76b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sturnus%20Android%20Trojan%20Quietly%20Captures%20Encrypted%20Chats%20and%20Hijacks%20Devices&amp;severity=medium&amp;id=691f158663b28c178c8a261b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recent-7-zip-vulnerability-exploited-in-attacks-0c66f025</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recent%207-Zip%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=691ef3b4961e3d19a6b1a017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12414-cwe-290-authentication-bypass-by-sp-bce1904b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12414%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Google%20Cloud%20Looker&amp;severity=critical&amp;id=691ef03b961e3d19a6aa6309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tamperedchef-malware-spreads-via-fake-software-ins-70f04923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TamperedChef%20Malware%20Spreads%20via%20Fake%20Software%20Installers%20in%20Ongoing%20Global%20Campaign&amp;severity=high&amp;id=691eea8e6e8172836e888023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-mapped-ship-ais-data-days-befo-da81040c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Mapped%20Ship%20AIS%20Data%20Days%20Before%20Real-World%20Missile%20Strike%20Attempt&amp;severity=high&amp;id=691eea8e6e8172836e888027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cooking-up-trouble-how-tamperedchef-uses-signed-ap-137b3209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cooking%20up%20trouble%3A%20How%20TamperedChef%20uses%20signed%20apps%20to%20deliver%20stealthy%20payloads&amp;severity=medium&amp;id=691ee3886e8172836e79b641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11676-cwe-20-improper-input-validation-in-3eefe3e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11676%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TP-Link%20System%20Inc.%20TL-WR940N%20V6&amp;severity=high&amp;id=691ed086337afffbc004aae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62346-cwe-352-cross-site-request-forgery--37fa3373</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62346%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HCL%20Software%20Glovius%20Cloud&amp;severity=medium&amp;id=691ed086337afffbc004aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/third-party-failures-are-becoming-the-real-threat--64d0a3c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Third-party%20failures%20are%20becoming%20the%20real%20threat%20to%20your%20security&amp;severity=medium&amp;id=691ec98e337afffbc0fb8c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-hackers-mapped-ship-ais-data-days-befo-963436b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Hackers%20Mapped%20Ship%20AIS%20Data%20Days%20Before%20Real-World%20Missile%20Strike%20Attempt&amp;severity=medium&amp;id=691f158663b28c178c8a261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-patches-three-critical-serv-u-vulnerabi-bf5bd40d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Patches%20Three%20Critical%20Serv-U%20Vulnerabilities&amp;severity=critical&amp;id=691ec34f9f5a9374a9d0e191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-updates-backfire-rce-in-windows-update-health-7faa95b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Updates%20Backfire%3A%20RCE%20in%20Windows%20Update%20Health%20Tools&amp;severity=medium&amp;id=691ec3799f5a9374a9d1171f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64984-cwe-79-improper-neutralization-of-i-6905466f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64984%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kaspersky%20Kaspersky%20Endpoint%20Security&amp;severity=medium&amp;id=691ebfd49f5a9374a9cb4412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5092-cwe-79-improper-neutralization-of-in-2442521d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lightgalleryteam%20LightGallery%20WP&amp;severity=medium&amp;id=691eb8d39f5a9374a9bdd7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12502-cwe-89-sql-injection-in-attention-b-60a07d7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12502%3A%20CWE-89%20SQL%20Injection%20in%20attention-bar&amp;severity=medium&amp;id=691eaf76c29bdb682bd1c59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12778-cwe-862-missing-authorization-in-us-a8812238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12778%3A%20CWE-862%20Missing%20Authorization%20in%20userelements%20Ultimate%20Member%20Widgets%20for%20Elementor%20%E2%80%93%20WordPress%20User%20Directory&amp;severity=medium&amp;id=691e9cde6a37eb355c413d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/helixguard-uncovers-malicious-spellchecker-package-f6c98000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HelixGuard%20uncovers%20malicious%20%22spellchecker%22%20packages%20on%20PyPI%20using%20multi-layer%20encryption%20to%20steal%20crypto%20wallets.&amp;severity=medium&amp;id=691e901a1af65083e688d8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13451-sql-injection-in-sourcecodester-onl-44a74aad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13451%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e890f1af65083e684c093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13450-cross-site-scripting-in-sourcecodes-b420f123</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13450%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e890f1af65083e684c08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13449-sql-injection-in-code-projects-onli-2241845a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13449%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shop%20Project&amp;severity=medium&amp;id=691e858b1af65083e68334ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13446-stack-based-buffer-overflow-in-tend-955c8679</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13446%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=691e858b1af65083e68334a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13445-stack-based-buffer-overflow-in-tend-2d090035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13445%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=691e7b7b1af65083e67f4584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13443-improper-access-controls-in-macrozh-b53a5c6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13443%3A%20Improper%20Access%20Controls%20in%20macrozheng%20mall&amp;severity=medium&amp;id=691e7b7b1af65083e67f457e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13442-command-injection-in-utt-750w-0d3f1567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13442%3A%20Command%20Injection%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=medium&amp;id=691e73fd1af65083e67a8485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13435-path-traversal-in-dreampie-resty-c53579e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13435%3A%20Path%20Traversal%20in%20Dreampie%20Resty&amp;severity=medium&amp;id=691e73fd1af65083e67a847f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13434-improper-neutralization-of-http-hea-f7d7045b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13434%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20jameschz%20Hush%20Framework&amp;severity=medium&amp;id=691e696b1af65083e66d8f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13433-unquoted-search-path-in-muse-group--3c22ea80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13433%3A%20Unquoted%20Search%20Path%20in%20Muse%20Group%20MuseHub&amp;severity=high&amp;id=691e65e61af65083e66926d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13424-sql-injection-in-campcodes-supplier-583dc519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13424%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691e5c8df78d7eef03ef72ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-20-554a5ed3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-20&amp;severity=medium&amp;id=691fae469bfed6bde22f2b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61138-na-975e9156</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61138%3A%20n%2Fa&amp;severity=high&amp;id=691f880cb342c1dca413b0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25613-na-10b73eeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25613%3A%20n%2Fa&amp;severity=high&amp;id=691f82044f1c50aa2eb5aeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63685-na-1dbcd6cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63685%3A%20n%2Fa&amp;severity=critical&amp;id=691f82024f1c50aa2eb5ae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63807-na-82b5b42b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63807%3A%20n%2Fa&amp;severity=critical&amp;id=691f7e7c4f1c50aa2eb161ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63700-na-4cbc8dfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63700&amp;severity=null&amp;id=691f628a40b920e2707a8c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63888-na-25ec4281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63888%3A%20n%2Fa&amp;severity=critical&amp;id=691f58cde672cd9080e446fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63889-na-b9ed9834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63889%3A%20n%2Fa&amp;severity=high&amp;id=691f553ce672cd9080df8ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63848-na-e685503a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63848%3A%20n%2Fa&amp;severity=medium&amp;id=691f4b4ed2e902043d281084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64027-na-03759e74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64027%3A%20n%2Fa&amp;severity=medium&amp;id=691f47cad2e902043d2402e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52410-na-99640c1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52410%3A%20n%2Fa&amp;severity=critical&amp;id=691f4446d2e902043d1f9197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60737-na-8b9924af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60737%3A%20n%2Fa&amp;severity=medium&amp;id=691f3714b661599aeb20f321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60738-na-c0d732ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60738%3A%20n%2Fa&amp;severity=critical&amp;id=691f3400b661599aeb1e39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65226-na-9b94106a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65226%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60794-na-0dda3562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60794%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65220-na-313874e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65220%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac456251f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60799-na-ed47d199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60799%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac456251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60798-na-54f57fa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60798%3A%20n%2Fa&amp;severity=medium&amp;id=691f31a85f37bd1ac4562516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65223-na-399d4943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65223%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65222-na-7486c305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65222%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65221-na-44f29dce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65221%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60797-na-3421a26f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60797%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60796-na-959bd500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60796%3A%20n%2Fa&amp;severity=medium&amp;id=691f2ef845657ce9d4e9f7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13423-unrestricted-upload-in-campcodes-re-8fdd6dc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13423%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e5586f78d7eef03e60e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13422-sql-injection-in-freeprojectscodes--cb3a4430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13422%3A%20SQL%20Injection%20in%20freeprojectscodes%20Sports%20Club%20Management%20System&amp;severity=medium&amp;id=691e5586f78d7eef03e60e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13421-sql-injection-in-itsourcecode-human-6949e510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13421%3A%20SQL%20Injection%20in%20itsourcecode%20Human%20Resource%20Management%20System&amp;severity=medium&amp;id=691e51178e880a653f859b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lite-xl-rce-cve-2025-12121-656c948a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LITE%20XL%20RCE%20(CVE-2025-12121)&amp;severity=medium&amp;id=691e49ef8e880a653f7b7f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13420-sql-injection-in-itsourcecode-human-a7fb6624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13420%3A%20SQL%20Injection%20in%20itsourcecode%20Human%20Resource%20Management%20System&amp;severity=medium&amp;id=691e46748e880a653f7616ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky2fa-phaas-kit-now-uses-redteamers-browser-in-dbe41d96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky2FA%20PhaaS%20kit%20now%20uses%20redteamers&apos;%20Browser-in-the-Browser%20attack&amp;severity=high&amp;id=691e450d7eddc5e77790088b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13415-cross-site-scripting-in-icret-easyi-2e913485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13415%3A%20Cross%20Site%20Scripting%20in%20icret%20EasyImages&amp;severity=medium&amp;id=691e3faf6a7f50ea54b7fb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11884-cwe-79-improper-neutralization-of-i-c8a5a8e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%E2%84%A2%20uCMDB&amp;severity=low&amp;id=691e365f4e81ab18fb53789d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/network-devices-compromised-for-adversary-in-the-m-0ac252b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlushDaemon%20compromises%20network%20devices%20for%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=691ee3886e8172836e79b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13412-cross-site-scripting-in-campcodes-r-2721a28f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13412%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e32d34e81ab18fb4e5e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13147-cwe-918-server-side-request-forgery-babcce70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13147%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Progress%20MOVEit%20Transfer&amp;severity=medium&amp;id=691e2f504e81ab18fb499ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47914-cwe-237-in-golangorgxcrypto-golango-f5a02464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47914%3A%20CWE-237%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh%2Fagent&amp;severity=medium&amp;id=691e2bd54e81ab18fb452bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58181-cwe-1284-in-golangorgxcrypto-golang-3473129b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58181%3A%20CWE-1284%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh&amp;severity=medium&amp;id=691e2bd54e81ab18fb452bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13411-unrestricted-upload-in-campcodes-re-fce26ed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13411%3A%20Unrestricted%20Upload%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13410-sql-injection-in-campcodes-retro-ba-715291c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13410%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-via-a-malicious-svg-in-mpdf-73bd7b2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20via%20a%20malicious%20SVG%20in%20mPDF&amp;severity=medium&amp;id=691e92636a37eb355c323aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36371-cwe-598-use-of-get-request-method-w-450ad9eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36371%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=medium&amp;id=691e248d4d0ffcb40bb0867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65103-cwe-89-improper-neutralization-of-s-6fd11025</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65103%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20devcode-it%20openstamanager&amp;severity=high&amp;id=691e18af49ba98bd8186a296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65094-cwe-266-incorrect-privilege-assignm-62848762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65094%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20WBCE%20WBCE_CMS&amp;severity=high&amp;id=691e248d4d0ffcb40bb0868e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-exposes-bulletproof-hosting-operator-linked-to--796ce78b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Exposes%20Bulletproof%20Hosting%20Operator%20Linked%20to%20BlackBasta%2C%20Evil%20Corp%20and%20LockBit%20Ransomware&amp;severity=medium&amp;id=691e153049ba98bd8181cfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-based-whatsapp-worm-spreads-eternidade-stea-64313459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python-Based%20WhatsApp%20Worm%20Spreads%20Eternidade%20Stealer%20Across%20Brazilian%20Devices&amp;severity=high&amp;id=691e12c2e0559f5704617ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65100-cwe-693-protection-mechanism-failur-c62ed801</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65100%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20ilbers%20isar&amp;severity=medium&amp;id=691e12eee0559f5704623244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-actively-exploiting-7-zip-symbolic-linkbas-a3ed7028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Actively%20Exploiting%207-Zip%20Symbolic%20Link%E2%80%93Based%20RCE%20Vulnerability%20(CVE-2025-11001)&amp;severity=high&amp;id=691e12c2e0559f5704617ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64759-cwe-20-improper-input-validation-in-dcc518e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64759%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20homarr-labs%20homarr&amp;severity=high&amp;id=691e12eee0559f5704623249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-details-irans-cyber-enabled-kinetic-attacks-0eef9793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Details%20Iran%E2%80%99s%20Cyber-Enabled%20Kinetic%20Attacks%20Linking%20Digital%20Spying%20to%20Physical%20Strikes&amp;severity=medium&amp;id=691e0bb0e0559f570458859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13316-cwe-321-use-of-hard-coded-cryptogra-12776ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13316%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Lynxtechnology%20Twonky%20Server&amp;severity=high&amp;id=691e09e0e0559f57045745b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13315-cwe-420-unprotected-alternate-chann-f279de98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13315%3A%20CWE-420%3A%20Unprotected%20Alternate%20Channel%20in%20Lynxtechnology%20Twonky%20Server&amp;severity=critical&amp;id=691e09e0e0559f57045745ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65089-cwe-862-missing-authorization-in-xw-df21fcec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65089%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20xwiki-pro-macros&amp;severity=medium&amp;id=691e09e0e0559f57045745bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65099-cwe-94-improper-control-of-generati-47f2c548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65099%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=691e026693c808727dc91d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65026-cwe-94-improper-control-of-generati-935434d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65026%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20esm-dev%20esm.sh&amp;severity=medium&amp;id=691e026693c808727dc91d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65025-cwe-22-improper-limitation-of-a-pat-ddafd98a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65025%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=691e026693c808727dc91d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65034-cwe-639-authorization-bypass-throug-7d192086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65034%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65033-cwe-285-improper-authorization-in-l-60e747fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65033%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65032-cwe-639-authorization-bypass-throug-d19dbfa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65032%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026793c808727dc91d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65031-cwe-285-improper-authorization-in-l-1d97cd52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65031%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026793c808727dc91d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65030-cwe-285-improper-authorization-in-l-7320d1dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65030%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65029-cwe-285-improper-authorization-in-l-3e4af100</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65029%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=high&amp;id=691e026793c808727dc91d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65021-cwe-285-improper-authorization-in-l-d9b86aa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65021%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=critical&amp;id=691e026693c808727dc91d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65020-cwe-285-improper-authorization-in-l-a5ca4882</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65020%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026693c808727dc91d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65028-cwe-285-improper-authorization-in-l-54713461</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65028%3A%20CWE-285%3A%20Improper%20Authorization%20in%20lukevella%20rallly&amp;severity=medium&amp;id=691e026693c808727dc91d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-whatsapp-flaw-leaks-phone-numbers-for-over-cc5f8049</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20WhatsApp%20flaw%20leaks%20phone%20numbers%20for%20over%203.5B%20users.&amp;severity=high&amp;id=691dfb6593c808727dbff02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64708-cwe-613-insufficient-session-expira-ec5ea700</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64708%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=691dfb7693c808727dc04388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64521-cwe-289-authentication-bypass-by-al-2b5b0b85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64521%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=691dfb7693c808727dc04384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13400-buffer-overflow-in-tenda-ch22-098b1390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13400%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=691dfb7693c808727dc0437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-selling-alleged-samsung-medison-healthcare--583b48bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Selling%20Alleged%20Samsung%20Medison%20Healthcare%20Data%20Stolen%20In%203rd%20Party%20Breach&amp;severity=high&amp;id=691df93ccb9b476b7d5bec2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12743-cwe-89-improper-neutralization-of-s-6af430ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64765-cwe-22-improper-limitation-of-a-pat-e99d26ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64765%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64764-cwe-80-improper-neutralization-of-s-afdf0627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64764%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20withastro%20astro&amp;severity=high&amp;id=691df5b8cb9b476b7d56e48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65019-cwe-79-improper-neutralization-of-i-c93269f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65019%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=691df5b8cb9b476b7d56e495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64757-cwe-22-improper-limitation-of-a-pat-04b40712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64757%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20withastro%20astro&amp;severity=low&amp;id=691df5b8cb9b476b7d56e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-actively-exploiting-7-zip-symbolic-linkbas-fef89429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NHS%20Warns%20of%20PoC%20Exploit%20for%207-Zip%20Symbolic%20Link%E2%80%93Based%20RCE%20Vulnerability&amp;severity=low&amp;id=691df220cb9b476b7d51d960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34335-cwe-78-improper-neutralization-of-s-2ccf7582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34335%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34334-cwe-78-improper-neutralization-of-s-5b18a611</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34334%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34332-cwe-276-incorrect-default-permissio-8f40942f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34332%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34329-cwe-434-unrestricted-upload-of-file-6805136f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34329%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=critical&amp;id=691df24bcb9b476b7d51eaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34331-cwe-306-missing-authentication-for--5219f7db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34331%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34328-cwe-434-unrestricted-upload-of-file-a923c7e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34328%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=critical&amp;id=691df24bcb9b476b7d51eae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34330-cwe-434-unrestricted-upload-of-file-4be33253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34330%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=medium&amp;id=691df24bcb9b476b7d51eaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34333-cwe-276-incorrect-default-permissio-3f3a598d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34333%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AudioCodes%20Limited%20AudioCodes%20Fax%2FIVR%20Appliance&amp;severity=high&amp;id=691df24bcb9b476b7d51eb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12766-cwe-639-authorization-bypass-throug-dadccd45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12766%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BlackBerry%20BlackBerry%C2%AE%20AtHoc%C2%AE%20(OnPrem)&amp;severity=medium&amp;id=691deebacb9b476b7d4d1fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65022-cwe-89-improper-neutralization-of-s-e58ebe1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65022%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65023-cwe-89-improper-neutralization-of-s-462dd1e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65023%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65024-cwe-89-improper-neutralization-of-s-e866ec3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65024%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20portabilis%20i-educar&amp;severity=high&amp;id=691dec83964c14ffeeaeeafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unicode-it-is-more-than-funny-domain-names-wed-nov-7eccdf33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names.%2C%20(Wed%2C%20Nov%2012th)&amp;severity=high&amp;id=691dec62964c14ffeeae536b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10703-cwe-94-improper-control-of-generati-1cca29eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10703%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Progress%20DataDirect%20Connect%20for%20JDBC%20for%20Amazon%20Redshift&amp;severity=high&amp;id=691de8ff964c14ffeea99620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10702-cwe-94-improper-control-of-generati-cfbe7bd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10702%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Progress%20DataDirect%20Connect%20for%20JDBC%20for%20Amazon%20Redshift&amp;severity=high&amp;id=691de8ff964c14ffeea9961d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blames-outage-on-internal-configuration-c4a25b7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blames%20Outage%20on%20Internal%20Configuration%20Error&amp;severity=medium&amp;id=691de8dd964c14ffeea97bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/california-man-admits-to-laundering-crypto-stolen--26f23f22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=California%20man%20admits%20to%20laundering%20crypto%20stolen%20in%20%24230M%20heist&amp;severity=high&amp;id=691de568964c14ffeea48423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13397-null-pointer-dereference-in-mrubyc-ca0aea54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13397%3A%20NULL%20Pointer%20Dereference%20in%20mrubyc&amp;severity=medium&amp;id=691de57d964c14ffeea48e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13396-sql-injection-in-code-projects-cour-1ceb2f09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13396%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691de57d964c14ffeea48e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-fixed-2-critical-zero-day-vulnerabilities-fd0f239a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Fixed%202%20Critical%20Zero-Day%20Vulnerabilities%20in%20FortiWeb&amp;severity=critical&amp;id=691dd2c8338171324080af84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11963-cwe-79-improper-neutralization-of-i-7b41c278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20StarCities&amp;severity=medium&amp;id=691dd2e93381713240811e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-railway-braking-systems-open-to-tampering-35fd7d1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Railway%20Braking%20Systems%20Open%20to%20Tampering&amp;severity=critical&amp;id=691dcf3833817132407c1066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0421-cwe-1021-improper-restriction-of-ren-90bf7f61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0421%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Shopside%20Software%20Technologies%20Inc.%20Shopside&amp;severity=medium&amp;id=691dc9e6338171324075e919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-year-old-ray-ai-framework-flaw-exploited-in-on-18133971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two-Year-Old%20Ray%20AI%20Framework%20Flaw%20Exploited%20in%20Ongoing%20Campaign&amp;severity=medium&amp;id=691dc7ce0d9a5150f8cf793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8528-cwe-79-improper-neutralization-of-in-4593920c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Automated%20Logic%20WebCtrl&amp;severity=medium&amp;id=691dc7eb0d9a5150f8cfb1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8527-cwe-601-url-redirection-to-untrusted-fd0dfc1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8527%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Automated%20Logic%20WebCtrl&amp;severity=high&amp;id=691dc7eb0d9a5150f8cfb1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-black-friday-using-llms-to-save-on-the-sal-b2eddb90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Black%20Friday%3A%20using%20LLMs%20to%20save%20on%20the%20%E2%80%9Csale%20of%20the%20year%E2%80%9D%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=691dc0e50d9a5150f8c7142d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wrthug-exploits-six-asus-wrt-flaws-to-hijack-tens--a19440f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WrtHug%20Exploits%20Six%20ASUS%20WRT%20Flaws%20to%20Hijack%20Tens%20of%20Thousands%20of%20EoL%20Routers%20Worldwide&amp;severity=medium&amp;id=691e7bc51af65083e67f6131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12592-cwe-1392-cwe-1392-use-of-default-cr-f7eb4745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12592%3A%20CWE-1392%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Vivotek%20Affected%20device%20model%20numbers%20are%20FD7131-VVTK%2CFD7131-VVTK%2CFD7131-VVTK%2CFD7141-VVTK%2CIP7131-VVTK%2CIP7133-VVTK%2CIP7133-VVTK%2CIP7133-VVTK%2CIP7134-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7135-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7137-VVTK%2CIP7138-VVTK%2CIP7142-VVTK%2CIP7142-VVTK%2CIP7151-VVTK%2CIP7152-VVTK%2CIP7153-VVTK%2CIP7153-VVTK%2CIP7154-VVTK%2CIP7330-VVTK%2CIP7330-VVTK%2CIP7330-VVTK%2CIP8131-VVTK%2CIP8131-VVTK%2CIP8131-VVTK%2CIP8131W-VVTK%2CPT7135-VVTK%2CPT7137-TCON%2CPT7137-VVTK%2CPT7137-VVTK%2CPT7137-VVTK%2CPT7137-VVTK%2CPZ7131-VVTK%2CPZ7131-VVTK%2CPZ71X1-VVTK%2CPZ71X1-VVTK%2CPZ71X2-VVTK%2CSD73X3-VVTK%2CSD73X3-VVTK%2CSD73X3-VVTK%2CTC5330-VVTK%2CTC5332-TCVV%2CTC5333-TCVV%2CTC5633-TCVV%2CTC5633-VVTK%2CVS7100-VVTK%2CVS7100-VVTK%2CVS7100-VVTK&amp;severity=critical&amp;id=691dbe8df37b5c9bf1714e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cline-bot-ai-agent-for-coding-vulnerable-to-data-t-23c82fef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cline%20Bot%20AI%20Agent%20for%20Coding%20Vulnerable%20to%20Data%20Theft%20and%20Code%20Execution&amp;severity=medium&amp;id=691db403f37b5c9bf1636867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-is-supercharging-phishing-heres-how-to-fight-ba-c7716430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Is%20Supercharging%20Phishing%3A%20Here%E2%80%99s%20How%20to%20Fight%20Back&amp;severity=medium&amp;id=691e7c6d1af65083e67fe617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/application-containment-how-to-use-ringfencing-to--1f653049</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Application%20Containment%3A%20How%20to%20Use%20Ringfencing%20to%20Prevent%20the%20Weaponization%20of%20Trusted%20Software&amp;severity=medium&amp;id=691e7bc51af65083e67f6134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10437-cwe-89-improper-neutralization-of-s-a1c76425</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Eksagate%20Electronic%20Engineering%20and%20Computer%20Industry%20Trade%20Inc.%20Webpack%20Management%20System&amp;severity=critical&amp;id=691dae1b258ca46eb4871df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/largest-azure-ddos-attack-powered-by-aisuru-botnet-b97c6ed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Largest%20Azure%20DDoS%20Attack%20Powered%20by%20Aisuru%20Botnet&amp;severity=medium&amp;id=691da712258ca46eb47db42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurofiber-confirms-november-13-hack-data-theft-and-d7aa2ebe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurofiber%20confirms%20November%2013%20hack%2C%20data%20theft%2C%20and%20extortion%20attempt&amp;severity=high&amp;id=691da72c258ca46eb47e1524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edgestepper-implant-reroutes-dns-queries-to-deploy-59c3c03e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EdgeStepper%20Implant%20Reroutes%20DNS%20Queries%20to%20Deploy%20Malware%20via%20Hijacked%20Software%20Updates&amp;severity=high&amp;id=691da48da788429a71e88406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plushdaemon-hackers-hijack-software-updates-in-sup-c375edd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PlushDaemon%E2%80%99%20hackers%20hijack%20software%20updates%20in%20supply-chain%20attacks&amp;severity=high&amp;id=691da48da788429a71e8840a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-operation-wrthug-hijacks-thousands-of-7c3af5f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Operation%20%E2%80%9CWrtHug%E2%80%9D%20Hijacks%20Thousands%20of%20ASUS%20Routers&amp;severity=high&amp;id=691da48da788429a71e8840e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13395-sql-injection-in-codehub666-94list-2f5b1313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13395%3A%20SQL%20Injection%20in%20codehub666%2094list&amp;severity=medium&amp;id=691da73c258ca46eb47e777a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64408-cwe-502-deserialization-of-untruste-2c84b4b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64408%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Causeway&amp;severity=medium&amp;id=691da109a788429a71e487c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12472-cwe-362-concurrent-execution-using--2d410649</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12472%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=691da109a788429a71e487c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-ai-agents-can-be-tricked-into-acting-ag-7a7b8e8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20AI%20Agents%20Can%20Be%20Tricked%20Into%20Acting%20Against%20Each%20Other%20via%20Second-Order%20Prompts&amp;severity=medium&amp;id=691e7bc51af65083e67f613a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58412-execute-unauthorized-code-or-comman-00f3c2a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58412%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=691d946612537358e42c14bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-discloses-second-exploited-fortiweb-zero--2cc1aab1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Discloses%20Second%20Exploited%20FortiWeb%20Zero-Day%20in%20a%20Week&amp;severity=low&amp;id=691d944712537358e42be659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11230-cwe-407-inefficient-algorithmic-com-994b4ebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11230%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20HAProxy%20Technologies%20HAProxy%20Community%20Edition&amp;severity=high&amp;id=691d90cc12537358e424faf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webjack-evolving-iis-hijacking-campaign-abuses-seo-ab34b9b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WEBJACK%3A%20Evolving%20IIS%20Hijacking%20Campaign%20Abuses%20SEO%20for%20Fraud%20and%20Monetization&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpt-trade-fake-google-play-store-drops-btmob-spywa-ca6fb560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPT%20Trade%3A%20Fake%20Google%20Play%20Store%20drops%20BTMob%20Spyware%20and%20UASecurity%20Miner%20on%20Android%20Devices&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roningloader-dragonbreaths-new-path-to-ppl-abuse-14b37752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RONINGLOADER%3A%20DragonBreath&apos;s%20New%20Path%20to%20PPL%20Abuse&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11446-cwe-532-insertion-of-sensitive-info-34cb8f44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11446%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20upKeeper%20Solutions%20upKeeper%20Manager&amp;severity=high&amp;id=691d8797ce29a4e4be976738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-tuoni-c2-attack-on-us-real-estate-fi-85ae45b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Tuoni%20C2%20Attack%20on%20U.S.%20Real%20Estate%20Firm%20Thwarted&amp;severity=medium&amp;id=691d8b10ce29a4e4be9cd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/license-to-encrypt-make-their-move-35fc53e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=License%20to%20Encrypt%3A%20Make%20Their%20Move&amp;severity=medium&amp;id=691d90c112537358e424f598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13035-cwe-94-improper-control-of-generati-5296eda6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13035%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codesnippetspro%20Code%20Snippets&amp;severity=high&amp;id=691d774cfcf6450804cbcaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13206-cwe-79-improper-neutralization-of-i-8a48be31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stellarwp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=high&amp;id=691d774cfcf6450804cbcaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12484-cwe-79-improper-neutralization-of-i-d6f326dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Giveaways%20and%20Contests%20by%20RafflePress%20%E2%80%93%20Get%20More%20Website%20Traffic%2C%20Email%20Subscribers%2C%20and%20Social%20Followers&amp;severity=high&amp;id=691d774bfcf6450804cbcae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11243-cwe-770-allocation-of-resources-wit-07445dd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11243%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Shelly%20Pro%204PM&amp;severity=high&amp;id=691d6a73a27e6d5e91bd838d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12056-cwe-125-out-of-bounds-read-in-shell-1e6ca5a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12056%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Shelly%20Pro%203EM&amp;severity=high&amp;id=691d6a73a27e6d5e91bd8391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12535-cwe-352-cross-site-request-forgery--8fcf301f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12535%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Custom%20Form%20Builder%2C%20Calculator%20%26%20More&amp;severity=medium&amp;id=691d6a73a27e6d5e91bd8394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13085-cwe-285-improper-authorization-in-s-121b85ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13085%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=691d6a73a27e6d5e91bd839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12057-cwe-434-unrestricted-upload-of-file-32d029b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12057%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WavePlayer&amp;severity=critical&amp;id=691d5dd0b5b376a4835ad660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12814-cwe-285-improper-authorization-in-s-7477a3ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12814%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12822-cwe-862-missing-authorization-in-cy-8533f080</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12822%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20WP%20Login%20and%20Register%20using%20JWT&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12359-cwe-918-server-side-request-forgery-fbf6ec04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12359%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12174-cwe-862-missing-authorization-in-wp-22290457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12174%3A%20CWE-862%20Missing%20Authorization%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%20Plugin%20with%20Classified%20Ads%20Listings&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12878-cwe-79-improper-neutralization-of-i-08b81964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20FunnelKit%20%E2%80%93%20Funnel%20Builder%20for%20WooCommerce%20Checkout&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13145-cwe-502-deserialization-of-untruste-08158add</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13145%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=high&amp;id=691d6898a27e6d5e91bc24d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12646-cwe-89-improper-neutralization-of-s-fc01026e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12646%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=high&amp;id=691d6897a27e6d5e91bc16c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13054-cwe-79-improper-neutralization-of-i-89fcb2cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12710-cwe-79-improper-neutralization-of-i-d8d8342f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwmanagement%20Pet-Manager%20%E2%80%93%20Petfinder&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12751-cwe-862-missing-authorization-in-el-9e5026bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12751%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20WSChat%20%E2%80%93%20WordPress%20Live%20Chat&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12842-cwe-20-improper-input-validation-in-6817e8c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12842%3A%20CWE-20%20Improper%20Input%20Validation%20in%20timeslotplugins%20Booking%20Plugin%20for%20WordPress%20Appointments%20%E2%80%93%20Time%20Slot&amp;severity=medium&amp;id=691d6897a27e6d5e91bc16e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12426-cwe-200-exposure-of-sensitive-infor-86f1392c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=691d4b629140b486bbdab6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12349-cwe-306-missing-authentication-for--ad0d6d83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12349%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20icegram%20Email%20Subscribers%20%26%20Newsletters%20%E2%80%93%20Powerful%20Email%20Marketing%2C%20Post%20Notification%20%26%20Newsletter%20Plugin%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=691d4b629140b486bbdab6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-active-global-campaign-hijacks-ray-ai-c7b6a9bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%3A%20Active%20Global%20Campaign%20Hijacks%20Ray%20AI%20Infrastructure%20Into%20Self-Propagating%20Botnet&amp;severity=medium&amp;id=691d8407ce29a4e4be9214c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-fortiweb-cve-2025-58034-vuln-3e41771d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Warns%20of%20New%20FortiWeb%20CVE-2025-58034%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=691e7bc51af65083e67f613d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12427-cwe-639-authorization-bypass-throug-0aad03ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12427%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6251-cwe-79-improper-neutralization-of-in-6f4fb4ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6251%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Addons%20for%20Elementor%20%E2%80%93%20Addons%20and%20Templates%20Kit%20for%20Elementor&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12770-cwe-200-exposure-of-sensitive-infor-b03b1919</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12770%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20saadiqbal%20New%20User%20Approve&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12777-cwe-285-improper-authorization-in-y-117c42fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12777%3A%20CWE-285%20Improper%20Authorization%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=691d3cbbc00dea8b9c9becc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13051-cwe-427-uncontrolled-search-path-el-9b7b1033</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13051%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ASUSTOR%20ABP%20and%20AES&amp;severity=critical&amp;id=691d3937c00dea8b9c9a69ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supapwn-hacking-our-way-into-lovables-office-and-h-cf201feb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SupaPwn%3A%20Hacking%20Our%20Way%20into%20Lovable&apos;s%20Office%20and%20Helping%20Secure%20Supabase&amp;severity=medium&amp;id=691d3233c00dea8b9c96f862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13225-vulnerability-in-tanium-tanos-25a8217c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13225%3A%20Vulnerability%20in%20Tanium%20TanOS&amp;severity=medium&amp;id=691d3230c00dea8b9c96f7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/request-suggestions-to-detect-bgp-hijack-events-29043d82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=request%20suggestions%20to%20detect%20bgp%20hijack%20events&amp;severity=medium&amp;id=691d2eafc00dea8b9c958bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadowray-attacks-convert-ray-clusters-into-cr-e655a4b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ShadowRay%20attacks%20convert%20Ray%20clusters%20into%20crypto%20miners&amp;severity=high&amp;id=691d241dc00dea8b9c90b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-an-akira-ransomware-attack-when-a-fake--1b9b949c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20an%20Akira%20Ransomware%20Attack%3A%20When%20a%20Fake%20CAPTCHA%20Led%20to%2042%20Days%20of%20Compromise&amp;severity=medium&amp;id=691d2099c00dea8b9c8fb1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12852-cwe-427-uncontrolled-search-path-el-4d3fe5a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12852%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20NEC%20Corporation%20RakurakuMusen%20Start%20EX&amp;severity=high&amp;id=691d1e32c00dea8b9c8d38b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-analyzed-python-packages-that-can-be-abused-to-b-d744a144</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20analyzed%20Python%20packages%20that%20can%20be%20abused%20to%20build%20surveillance%20tools%20%E2%80%94%20here%E2%80%99s%20what%20I%20found&amp;severity=medium&amp;id=691d0f29c00dea8b9c7c7245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-19-606c9bd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-19&amp;severity=medium&amp;id=691e5c7df78d7eef03ef1825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63719-na-9bd2d219</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63719%3A%20n%2Fa&amp;severity=high&amp;id=691e32d34e81ab18fb4e5e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63371-na-08da67ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63371%3A%20n%2Fa&amp;severity=high&amp;id=691e2f504e81ab18fb499ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63932-na-77fbdbb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63932%3A%20n%2Fa&amp;severity=high&amp;id=691e266e4d0ffcb40bb1dd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63214-na-2c86b8ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63214%3A%20n%2Fa&amp;severity=medium&amp;id=691e248d4d0ffcb40bb0868a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51663-na-9bc8d406</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51663%3A%20n%2Fa&amp;severity=high&amp;id=691e248d4d0ffcb40bb08686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51662-na-ba93e796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51662%3A%20n%2Fa&amp;severity=medium&amp;id=691e248d4d0ffcb40bb08682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51661-na-1ea646be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51661%3A%20n%2Fa&amp;severity=high&amp;id=691e248d4d0ffcb40bb0867e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63213-na-8d5dcc4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63213%3A%20n%2Fa&amp;severity=critical&amp;id=691e1fb449ba98bd818e9a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63212-na-e1760616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63212%3A%20n%2Fa&amp;severity=medium&amp;id=691e1fb449ba98bd818e9a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63211-na-8334dcef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63211%3A%20n%2Fa&amp;severity=medium&amp;id=691e0bcde0559f5704589585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63209-na-2883e050</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63209%3A%20n%2Fa&amp;severity=high&amp;id=691e026693c808727dc91d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63208-na-26d15f3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63208%3A%20n%2Fa&amp;severity=high&amp;id=691e026693c808727dc91d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63207-na-9a83d4eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63207%3A%20n%2Fa&amp;severity=critical&amp;id=691e026693c808727dc91d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63210-na-54eda0ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63210%3A%20n%2Fa&amp;severity=critical&amp;id=691e026693c808727dc91d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63206-na-4d497d2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63206%3A%20n%2Fa&amp;severity=critical&amp;id=691dfee093c808727dc4717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63205-na-6f49544f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63205%3A%20n%2Fa&amp;severity=high&amp;id=691dfee093c808727dc4717a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63879-na-143d2ffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63879%3A%20n%2Fa&amp;severity=medium&amp;id=691df058cb9b476b7d50830c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63224-na-707ca38a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63224%3A%20n%2Fa&amp;severity=critical&amp;id=691dec83964c14ffeeaeeaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63223-na-0940d10a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63223%3A%20n%2Fa&amp;severity=critical&amp;id=691dec83964c14ffeeaeeaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63220-na-9afbd3b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63220%3A%20n%2Fa&amp;severity=high&amp;id=691de8ff964c14ffeea99627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63221-na-2229629d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63221%3A%20n%2Fa&amp;severity=critical&amp;id=691de8ff964c14ffeea99623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63878-na-b2cd9384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63878%3A%20n%2Fa&amp;severity=medium&amp;id=691de57d964c14ffeea48e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63219-na-55ff3193</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63219%3A%20n%2Fa&amp;severity=high&amp;id=691ddf9152987e43f7248323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63218-na-730a36e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63218%3A%20n%2Fa&amp;severity=critical&amp;id=691ddc1352987e43f71fbd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63243-na-3cd6a8a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63243%3A%20n%2Fa&amp;severity=medium&amp;id=691dd2e93381713240811e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65015-cwe-770-allocation-of-resources-wit-940d1ee8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65015%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authlib%20joserfc&amp;severity=critical&amp;id=691d040cb61595322dd84bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65012-cwe-79-improper-neutralization-of-i-cdb26557</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65012%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=691cf9367ccfba78bc94ec8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64515-cwe-20-improper-input-validation-in-b28efedf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64515%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=691d040cb61595322dd84bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64325-cwe-79-improper-neutralization-of-i-b9dba396</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EmbySupport%20Emby.Security&amp;severity=high&amp;id=691cf5c07ccfba78bc8d7b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54990-cwe-276-incorrect-default-permissio-4e3c38a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54990%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20xwikisas%20application-admintools&amp;severity=medium&amp;id=691cf3d4be2811888e545747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-tuoni-c2s-role-in-an-attempted--eb0e3cc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Tuoni%20C2&apos;s%20Role%20in%20an%20Attempted%202025%20Real-Estate%20Cyber%20Intrusion&amp;severity=high&amp;id=691cecc9be2811888e450e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-warns-of-new-fortiweb-zero-day-exploited--19828267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20warns%20of%20new%20FortiWeb%20zero-day%20exploited%20in%20attacks&amp;severity=critical&amp;id=691cecc9be2811888e450e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/330-custom-email-domains-and-what-this-tells-us-ab-d8379c87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=330%20custom%20email%20domains%2C%20and%20what%20this%20tells%20us%20about%20how%20attackers%20build%20infrastructure%20for%20fake%20account%20creation&amp;severity=medium&amp;id=691cecc0be2811888e44fead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-break-iot-devices-open-to-silent-takeover-vi-04020f80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Break%3A%20IoT%20Devices%20Open%20to%20Silent%20Takeover%20Via%20Firewalls&amp;severity=medium&amp;id=691d1dbec00dea8b9c8c94cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-a-global-decentralized-system-save-cve-data-9680efeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20a%20Global%2C%20Decentralized%20System%20Save%20CVE%20Data%3F&amp;severity=medium&amp;id=691cdf8890fff14d7013a216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-nexus-threat-actor-unc1549-takes-aim-at-aeros-ddebf1d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Nexus%20Threat%20Actor%20UNC1549%20Takes%20Aim%20at%20Aerospace&amp;severity=medium&amp;id=691d1dbec00dea8b9c8c94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12119-cwe-825-expired-pointer-dereference-18cc6e5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12119%3A%20CWE-825%20Expired%20Pointer%20Dereference%20in%20MongoDB%20C%20Driver&amp;severity=medium&amp;id=691ceaedbe2811888e43645d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37162-vulnerability-in-hewlett-packard-en-a7b64784</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37162%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20100%20Series%20Cellular%20Bridge&amp;severity=medium&amp;id=691ccaa45990fe54bdf5a3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37161-vulnerability-in-hewlett-packard-en-750c00fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37161%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20100%20Series%20Cellular%20Bridge&amp;severity=high&amp;id=691ccaa45990fe54bdf5a3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37163-vulnerability-in-hewlett-packard-en-b2309533</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37163%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Management%20Software%20(Airwave)&amp;severity=high&amp;id=691cd1d3b044fc99aa3c771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52639-cwe-201-insertion-of-sensitive-info-90a24080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52639%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20HCL%20Software%20Connections&amp;severity=low&amp;id=691cc3a85990fe54bdeb5a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37160-vulnerability-in-hewlett-packard-en-8cb835ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37160%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc3a85990fe54bdeb5a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37159-vulnerability-in-hewlett-packard-en-9a5fdd48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37159%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37158-vulnerability-in-hewlett-packard-en-3997fe9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37158%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37157-vulnerability-in-hewlett-packard-en-cd06eca5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37157%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networkign%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37156-vulnerability-in-hewlett-packard-en-b0bc9d81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37156%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37155-vulnerability-in-hewlett-packard-en-4b91167e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37155%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS-CX&amp;severity=high&amp;id=691cc1a4fcab56a016e27ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-2fa-phishing-kit-adds-bitb-pop-ups-designed-de3bced3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky%202FA%20Phishing%20Kit%20Adds%20BitB%20Pop-ups%20Designed%20to%20Mimic%20the%20Browser%20Address%20Bar&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54770-expired-pointer-dereference-in-red--301b7a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54770%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cc1a4fcab56a016e27ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61664-expired-pointer-dereference-in-red--b909d86d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61664%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61663-expired-pointer-dereference-in-red--3349e2bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61663%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61662-vulnerability-in-red-hat-red-hat-en-a3cf946a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61662%3A%20Vulnerability%20in%20GNU%20grub2&amp;severity=high&amp;id=691cbabbfcab56a016d7f805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61661-incorrect-calculation-of-buffer-siz-5e5161a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61661%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54771-expired-pointer-dereference-in-red--f830c704</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54771%3A%20Expired%20Pointer%20Dereference%20in%20GNU%20grub2&amp;severity=medium&amp;id=691cbabbfcab56a016d7f7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-hit-by-outage-affecting-global-network--b25c06d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20hit%20by%20outage%20affecting%20global%20network%20services&amp;severity=high&amp;id=691cba99fcab56a016d7e1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-tycoon-2fa-phishing-platform-and-the-collapse--47b6e8c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Tycoon%202FA%20Phishing%20Platform%20and%20the%20Collapse%20of%20Legacy%20MFA&amp;severity=high&amp;id=691cba99fcab56a016d7e1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-says-highly-disruptive-outage-not-cause-9708af39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Outage%20Not%20Caused%20by%20Cyberattack&amp;severity=high&amp;id=691cb71bfcab56a016d30b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lsass-dump-windows-error-reporting-50208113</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LSASS%20Dump%20%E2%80%93%20Windows%20Error%20Reporting&amp;severity=medium&amp;id=691caa8431331b1c39300c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-888-claims-lg-electronics-data-breach-93a33f72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20%22888%22%20Claims%20LG%20Electronics%20Data%20Breach%20-%20Source%20Code%20and%20Hardcoded%20Credentials%20Allegedly%20Leaked%20%5BUnconfirmed%5D&amp;severity=high&amp;id=691caa8431331b1c39300c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53843-execute-unauthorized-code-or-comman-2a4dc3ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53843%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=691ca897209f2030fa016955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48839-execute-unauthorized-code-or-comman-cb1dc19d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48839%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=691ca897209f2030fa016952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54821-escalation-of-privilege-in-fortinet-994a3842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54821%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=691ca897209f2030fa01695b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58413-execute-unauthorized-code-or-comman-14642e2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58413%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=691ca897209f2030fa016967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46215-execute-unauthorized-code-or-comman-165afa16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46215%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=691ca896209f2030fa0168ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59669-improper-access-control-in-fortinet-4e883c21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59669%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=691ca899209f2030fa016985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54660-information-disclosure-in-fortinet--f5ea3114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54660%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=691ca897209f2030fa016958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61713-information-disclosure-in-fortinet--57bf6412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61713%3A%20Information%20disclosure%20in%20Fortinet%20FortiPAM&amp;severity=low&amp;id=691ca899209f2030fa016988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46776-escalation-of-privilege-in-fortinet-9c4f3ec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46776%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=691ca896209f2030fa0168f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46775-information-disclosure-in-fortinet--82d9c3f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46775%3A%20Information%20disclosure%20in%20Fortinet%20FortiExtender&amp;severity=medium&amp;id=691ca896209f2030fa0168f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54971-information-disclosure-in-fortinet--071776c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54971%3A%20Information%20disclosure%20in%20Fortinet%20FortiADC&amp;severity=low&amp;id=691ca897209f2030fa01695e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54972-information-disclosure-in-fortinet--53df4449</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54972%3A%20Information%20disclosure%20in%20Fortinet%20FortiMail&amp;severity=low&amp;id=691ca897209f2030fa016961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46373-execute-unauthorized-code-or-comman-ac3a622a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46373%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=691ca896209f2030fa0168ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58692-execute-unauthorized-code-or-comman-057086a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58692%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=691ca897209f2030fa01696a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58034-execute-unauthorized-code-or-comman-b8a9c4f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58034%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=691ca897209f2030fa016964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47761-execute-unauthorized-code-or-comman-72d786c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47761%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=691ca897209f2030fa01694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-securely-vet-browser-extensions-across-your-0e156888</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20securely%20vet%20browser%20extensions%20across%20your%20organization&amp;severity=medium&amp;id=691ca8a0209f2030fa016a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33184-cwe-94-improper-control-of-generati-fdf76b5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33184%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1.5&amp;severity=high&amp;id=691ca896209f2030fa0168e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33183-cwe-94-improper-control-of-generati-4681f9cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33183%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1.5&amp;severity=high&amp;id=691ca896209f2030fa0168e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12761-cwe-79-improper-neutralization-of-i-3545fa16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%22Cross-site%20Scripting%22)%20in%20Drupal%20Simple%20multi%20step%20form&amp;severity=low&amp;id=691ca896209f2030fa0168d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12760-cwe-288-authentication-bypass-using-c443eed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12760%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Email%20TFA&amp;severity=medium&amp;id=691ca896209f2030fa0168d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13083-cwe-525-use-of-web-browser-cache-co-47eb802f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13083%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Drupal%20Drupal%20core&amp;severity=low&amp;id=691ca896209f2030fa0168df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13082-cwe-451-user-interface-ui-misrepres-4eba2431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13082%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca896209f2030fa0168dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13081-cwe-915-improperly-controlled-modif-6963c670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13081%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca514209f2030fafbb901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13080-cwe-754-improper-check-for-unusual--68a40648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13080%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=691ca514209f2030fafbb8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-abuse-adspect-cloaking-in-c-d565d946</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Npm%20Packages%20Abuse%20Adspect%20Cloaking%20in%20Crypto%20Scam&amp;severity=medium&amp;id=691cdf8890fff14d7013a219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bug-bounty-programs-rise-as-key-strategic-security-4197ef43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bug%20Bounty%20Programs%20Rise%20as%20Key%20Strategic%20Security%20Solutions&amp;severity=medium&amp;id=691cdf8890fff14d7013a21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34324-cwe-347-improper-verification-of-cr-579620c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34324%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Tinexta%20InfoCert%20S.p.A.%20GoSign%20Desktop&amp;severity=high&amp;id=691ca514209f2030fafbb90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mi5-warns-lawmakers-that-chinese-spies-are-trying--93ad46a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MI5%20Warns%20Lawmakers%20That%20Chinese%20Spies%20Are%20Trying%20to%20Reach%20Them%20via%20LinkedIn&amp;severity=medium&amp;id=691c9e0f209f2030faf12e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53360-cwe-284-improper-access-control-in--fb3b122c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53360%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20pluginsGLPI%20databaseinventory&amp;severity=medium&amp;id=691c9c349b9483ee9a797597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-expands-whatsapp-security-research-with-new-p-7b4ea7a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Expands%20WhatsApp%20Security%20Research%20with%20New%20Proxy%20Tool%20and%20%244M%20in%20Bounties%20This%20Year&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9977-cwe-89-improper-neutralization-of-sp-342d88a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9977%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Times%20Software%20E-Payroll&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowray-20-active-global-campaign-hijacks-ray-ai-a9a97f49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowRay%202.0%3A%20Active%20Global%20Campaign%20Hijacks%20Ray%20AI%20Infrastructure%20Into%20Self-Propagating%20Botnet%20%7C%20Oligo%20Security&amp;severity=medium&amp;id=691c91b99b9483ee9a696167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12383-cwe-362-concurrent-execution-using--237b881a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12383%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Eclipse%20Foundation%20Jersey&amp;severity=critical&amp;id=691c901eb718280d68a97e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58121-cwe-280-improper-handling-of-insuff-de021ad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58121%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58122-cwe-280-improper-handling-of-insuff-1c3831be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58122%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64996-cwe-732-incorrect-permission-assign-db7a37f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64996%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=691c901eb718280d68a97e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13349-cross-site-scripting-in-sourcecodes-7c14eddb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13349%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=691c7ff93fd37bbc395da093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-tuoni-c2s-role-in-an-attempted--72ee2b25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Tuoni%20C2&apos;s%20Role%20in%20an%20Attempted%202025%20Real-Estate%20Cyber%20Intrusion&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55179-incorrect-authorization-cwe-863-in--77d597b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55179%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Facebook%20WhatsApp%20Business%20for%20iOS&amp;severity=medium&amp;id=691c7c583fd37bbc3957664a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12545-cwe-200-exposure-of-sensitive-infor-c2c5cd40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12545%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce%20%E2%80%93%20Track%20Conversions%20and%20Analytics%2C%20Google%20Ads%2C%20TikTok%20and%20more&amp;severity=medium&amp;id=691c7c583fd37bbc39576645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12376-cwe-918-server-side-request-forgery-c19876e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12376%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Icon%20List%20Block%20%E2%80%93%20Add%20Icon-Based%20Lists%20with%20Custom%20Styles&amp;severity=medium&amp;id=691c7c583fd37bbc39576641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59116-cwe-204-observable-response-discrep-4375b645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59116%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59111-cwe-863-incorrect-authorization-in--2b38eb75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59111%3A%20CWE-863%20Incorrect%20Authorization%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59117-cwe-79-improper-neutralization-of-i-00016b2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59115-cwe-79-improper-neutralization-of-i-1ac64c1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59114-cwe-352-cross-site-request-forgery--92a2c942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59114%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59113-cwe-307-improper-restriction-of-exc-8e5c76cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59113%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59112-cwe-352-cross-site-request-forgery--05e1e30f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59112%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59110-cwe-352-cross-site-request-forgery--c8c5192f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59110%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JCD%20Windu%20CMS&amp;severity=medium&amp;id=691c7a583fd37bbc3955e429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pennsylvania-attorney-general-confirms-data-breach-678947eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pennsylvania%20Attorney%20General%20Confirms%20Data%20Breach%20After%20Ransomware%20Attack&amp;severity=medium&amp;id=691c834c3fd37bbc3964247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13347-sql-injection-in-sourcecodester-tra-66e07fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13347%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c7a583fd37bbc3955e44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/princeton-university-data-breach-impacts-alumni-st-4cd0892c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Princeton%20University%20Data%20Breach%20Impacts%20Alumni%2C%20Students%2C%20Employees&amp;severity=medium&amp;id=691c834c3fd37bbc3964247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-use-deeproot-and-twostroke-malware-d9f488f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Use%20DEEPROOT%20and%20TWOSTROKE%20Malware%20in%20Aerospace%20and%20Defense%20Attacks&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13346-sql-injection-in-sourcecodester-tra-7c598414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13346%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6c69c50334694ab71ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8084-cwe-918-server-side-request-forgery--f88329cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8084%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tigroumeow%20AI%20Engine&amp;severity=medium&amp;id=691c6dffc50334694aba91b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-stolen-in-eurofiber-france-hack-054dd329</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Stolen%20in%20Eurofiber%20France%20Hack&amp;severity=medium&amp;id=691c673ae9a43f0a37c3800a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9312-cwe-306-missing-authentication-for-c-96f55cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9312%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=691c6c69c50334694ab71cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13345-sql-injection-in-sourcecodester-tra-609081c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13345%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6dffc50334694aba91c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13344-sql-injection-in-sourcecodester-tra-fc9bfea8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13344%3A%20SQL%20Injection%20in%20SourceCodester%20Train%20Station%20Ticketing%20System&amp;severity=medium&amp;id=691c6dffc50334694aba91bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13343-cross-site-scripting-in-sourcecodes-16bde475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13343%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Interview%20Management%20System&amp;severity=medium&amp;id=691c5b0103ddb54749becbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6670-cwe-352-cross-site-request-forgery-c-69f552ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6670%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WSO2%20WSO2%20Open%20Banking%20AM&amp;severity=high&amp;id=691c5b0103ddb54749becbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41350-cwe-79-improper-neutralization-of-i-d9392634</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=medium&amp;id=691c5b0103ddb54749becbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41349-cwe-79-improper-neutralization-of-i-b57b43c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=medium&amp;id=691c5b0103ddb54749becbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41348-cwe-89-improper-neutralization-of-s-f6696c80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41348%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=high&amp;id=691c5b0103ddb54749becbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41347-cwe-434-unrestricted-upload-of-file-3899941b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41347%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=high&amp;id=691c544503ddb54749b63b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11427-cwe-918-server-side-request-forgery-3853f00f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11427%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpengine%20WP%20Migrate%20Lite%20%E2%80%93%20WordPress%20Migration%20Made%20Easy&amp;severity=medium&amp;id=691c544503ddb54749b63b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-iam-silos-why-the-identity-security-fabric--84aad751</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20IAM%20Silos%3A%20Why%20the%20Identity%20Security%20Fabric%20is%20Essential%20for%20Securing%20AI%20and%20Non-Human%20Identities&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seven-npm-packages-use-adspect-cloaking-to-trick-v-c22cdb1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Seven%20npm%20Packages%20Use%20Adspect%20Cloaking%20to%20Trick%20Victims%20Into%20Crypto%20Scam%20Pages&amp;severity=medium&amp;id=691cdeaa90fff14d7012a9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41737-cwe-284-improper-access-control-in--058e1afd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41737%3A%20CWE-284%20Improper%20Access%20Control%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b581406714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41736-cwe-35-path-traversal-in-metz-conne-557cac52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41736%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b581406711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41735-cwe-434-unrestricted-upload-of-file-29f17bfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41735%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=high&amp;id=691c4a8a8ab8e3b58140670e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41734-cwe-98-improper-control-of-filename-025d6355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41734%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=critical&amp;id=691c4a8a8ab8e3b58140670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41733-cwe-305-authentication-bypass-by-pr-ec381b17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41733%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20METZ%20CONNECT%20Energy-Controlling%20EWIO2-M&amp;severity=critical&amp;id=691c4a8a8ab8e3b581406708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotchas-in-email-parsing-lessons-from-jakarta-mail-3dab4f31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotchas%20in%20Email%20Parsing%20-%20Lessons%20from%20Jakarta%20Mail&amp;severity=medium&amp;id=691c453aa312a743bb5b935e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41346-cwe-863-incorrect-authorization-in--3f733ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41346%3A%20CWE-863%20Incorrect%20Authorization%20in%20Informatica%20del%20Este%20WinPlus&amp;severity=critical&amp;id=691c47108ab8e3b5813b58ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12391-cwe-862-missing-authorization-in-se-8ba827c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12391%3A%20CWE-862%20Missing%20Authorization%20in%20seventhqueen%20Restrictions%20for%20BuddyPress&amp;severity=medium&amp;id=691c3e32a312a743bb510b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12457-cwe-79-improper-neutralization-of-i-4463363d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideastocode%20Enable%20SVG%2C%20WebP%2C%20and%20ICO%20Upload&amp;severity=medium&amp;id=691c3e32a312a743bb510b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12691-cwe-79-improper-neutralization-of-i-16de36de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sayontan%20Photonic%20Gallery%20%26%20Lightbox%20for%20Flickr%2C%20SmugMug%20%26%20Others&amp;severity=medium&amp;id=691c3e32a312a743bb510b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12639-cwe-862-missing-authorization-in-su-9bc93b58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12639%3A%20CWE-862%20Missing%20Authorization%20in%20sundayfanz%20wModes%20%E2%80%93%20Catalog%20Mode%2C%20Product%20Pricing%2C%20Enquiry%20Forms%20%26%20Promotions%20%7C%20for%20WooCommerce&amp;severity=medium&amp;id=691c3e32a312a743bb510b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12392-cwe-862-missing-authorization-in-tr-3c10d0b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12392%3A%20CWE-862%20Missing%20Authorization%20in%20tripleatechnology%20Cryptocurrency%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=691c3e32a312a743bb510b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12088-cwe-79-improper-neutralization-of-i-045c8891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhargavbhandari90%20Meta%20Display%20Block&amp;severity=medium&amp;id=691c3e32a312a743bb510b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12481-cwe-862-missing-authorization-in-ni-3a509485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12481%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Duplicate%20Page&amp;severity=medium&amp;id=691c3e32a312a743bb510b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13069-cwe-434-unrestricted-upload-of-file-26d6e7dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13069%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ideastocode%20Enable%20SVG%2C%20WebP%2C%20and%20ICO%20Upload&amp;severity=high&amp;id=691c3e34a312a743bb510bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12079-cwe-79-improper-neutralization-of-i-ea21a2a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12079%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP%20Twitter%20Auto%20Publish&amp;severity=medium&amp;id=691c3e32a312a743bb510b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13133-cwe-1236-improper-neutralization-of-1c8cfc8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13133%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20vaniivan%20Simple%20User%20Import%20Export&amp;severity=medium&amp;id=691c3e34a312a743bb510bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12955-cwe-862-missing-authorization-in-ra-31d848a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12955%3A%20CWE-862%20Missing%20Authorization%20in%20rajeshsingh520%20Live%20sales%20notification%20for%20WooCommerce&amp;severity=high&amp;id=691c3e32a312a743bb510ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13196-cwe-79-improper-neutralization-of-i-ae77b586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=691c3e34a312a743bb510bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4212-cwe-79-improper-neutralization-of-in-0d5aebb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Checkout%20Files%20Upload%20for%20WooCommerce&amp;severity=high&amp;id=691c3e34a312a743bb510bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11734-cwe-862-missing-authorization-in-ai-d8f24edf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11734%3A%20CWE-862%20Missing%20Authorization%20in%20aioseo%20Broken%20Link%20Checker%20by%20AIOSEO%20%E2%80%93%20Easily%20Fix%2FMonitor%20Internal%20and%20External%20links&amp;severity=medium&amp;id=691c3e32a312a743bb510b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-security-fix-for-actively-exploited--d9373f77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Security%20Fix%20for%20Actively%20Exploited%20Chrome%20V8%20Zero-Day%20Vulnerability&amp;severity=critical&amp;id=691c3b3ea312a743bb4e5eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-azure-blocks-massive-1572-tbps-of-ddos-a-ddbae2b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Azure%20Blocks%20Massive%2015.72%20Tbps%20of%20DDoS%20Attack%20Powered%20by%20Aisuru%20Botnet&amp;severity=medium&amp;id=691c375e35a0ab0a562ec2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40545-cwe-601-url-redirection-to-untruste-20b70efb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40545%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=691c376d35a0ab0a562ec558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26391-cwe-79-improper-neutralization-of-i-97db1cc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=691c376d35a0ab0a562ec55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40549-cwe-22-improper-limitation-of-a-pat-162a86bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40549%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40548-cwe-269-improper-privilege-manageme-667468e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40548%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40547-cwe-116-improper-encoding-or-escapi-2ab7750f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40547%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20SolarWinds%20Serv-U&amp;severity=critical&amp;id=691c33dd35a0ab0a5629b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11868-cwe-79-improper-neutralization-of-i-aef13502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20everviz%20everviz%20%E2%80%93%20Charts%2C%20Maps%20and%20Tables%20%E2%80%93%20Interactive%20and%20responsive&amp;severity=medium&amp;id=691c305835a0ab0a56270fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12078-cwe-79-improper-neutralization-of-i-8dcc648d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artibot%20ArtiBot%20Free%20Chat%20Bot%20for%20WebSites&amp;severity=medium&amp;id=691c305835a0ab0a56270fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12406-cwe-352-cross-site-request-forgery--5d46eccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12406%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awensley%20Project%20Honey%20Pot%20Spam%20Trap&amp;severity=medium&amp;id=691c305835a0ab0a56270fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12961-cwe-862-missing-authorization-in-ar-2ff6009c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12961%3A%20CWE-862%20Missing%20Authorization%20in%20arkadiykilesso%20Download%20Panel%20(Biggiko%20Team)&amp;severity=medium&amp;id=691c305a35a0ab0a56271071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13088-cwe-98-improper-control-of-filename-cc2aec51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13088%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ikhodal%20Category%20and%20Product%20Woocommerce%20Tabs&amp;severity=high&amp;id=691c305b35a0ab0a5627107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12372-cwe-862-missing-authorization-in-lu-5f94947c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12372%3A%20CWE-862%20Missing%20Authorization%20in%20_luigi%20The%20Permalinks%20Cascade&amp;severity=medium&amp;id=691c305835a0ab0a56270ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12775-cwe-434-unrestricted-upload-of-file-eb28307e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12775%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nazsabuz%20WP%20Dropzone&amp;severity=high&amp;id=691c305935a0ab0a56271010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8609-cwe-79-improper-neutralization-of-in-85c4bb7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rometheme%20RTMKit&amp;severity=medium&amp;id=691c305b35a0ab0a56271083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12173-cwe-352-cross-site-request-forgery--7e2d8b6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12173%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20WP%20Admin%20Microblog&amp;severity=medium&amp;id=691c305835a0ab0a56270ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12937-cwe-862-missing-authorization-in-va-18ae7e0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12937%3A%20CWE-862%20Missing%20Authorization%20in%20valentinpellegrin%20ACF%20Flexible%20Layouts%20Manager&amp;severity=medium&amp;id=691c305a35a0ab0a5627106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8605-cwe-79-improper-neutralization-of-in-d7d2323d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8605%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeyatri%20Gutenify%20%E2%80%93%20Visual%20Site%20Builder%20Blocks%20%26%20Site%20Templates.&amp;severity=medium&amp;id=691c305b35a0ab0a5627107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12827-cwe-352-cross-site-request-forgery--18ac1df3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12827%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20denishua%20Top%20Friends&amp;severity=medium&amp;id=691c305a35a0ab0a56271069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12962-cwe-918-server-side-request-forgery-4a630d20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12962%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20willbontrager%20Local%20Syndication&amp;severity=medium&amp;id=691c305a35a0ab0a56271076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12404-cwe-352-cross-site-request-forgery--c417926d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12404%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nikolayyordanov%20Like-it&amp;severity=medium&amp;id=691c305835a0ab0a56270ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12823-cwe-79-improper-neutralization-of-i-ffc6b076</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sscovil%20CSV%20to%20SortTable&amp;severity=medium&amp;id=691c305a35a0ab0a56271065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9625-cwe-352-cross-site-request-forgery-c-4aa09df1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9625%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20interledger%20Coil%20Web%20Monetization&amp;severity=medium&amp;id=691c305b35a0ab0a56271088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12528-cwe-434-unrestricted-upload-of-file-f7196f0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12528%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20genetechproducts%20Pie%20Forms%20%E2%80%94%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=691c305935a0ab0a5627100a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11620-cwe-862-missing-authorization-in-je-f10fda1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11620%3A%20CWE-862%20Missing%20Authorization%20in%20jemoreto%20Multiple%20Roles%20per%20User&amp;severity=high&amp;id=691c305835a0ab0a56270fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12411-cwe-89-improper-neutralization-of-s-7a2902ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12411%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=high&amp;id=691c305835a0ab0a56271005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mitigates-record-572-tbps-ddos-attack-dr-43f827b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Mitigates%20Record%2015.72%20Tbps%20DDoS%20Attack%20Driven%20by%20AISURU%20Botnet&amp;severity=medium&amp;id=691c3a1b35a0ab0a56323a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8727-cwe-121-stack-based-buffer-overflow--04a7fbdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8727%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20X13SEDW-F&amp;severity=high&amp;id=691c27b723be15589aef5883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8404-cwe-121-stack-based-buffer-overflow--e59980a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8404%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10089-cwe-427-uncontrolled-search-path-el-6c060c4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10089%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Mitsubishi%20Electric%20Corporation%20MILCO.S%20Setting%20Application&amp;severity=high&amp;id=691c2e7635a0ab0a5625e9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11265-cwe-80-improper-neutralization-of-s-42af464f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11265%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11267-cwe-80-improper-neutralization-of-s-e8a232cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11267%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=691c2e7635a0ab0a5625e9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-update-patches-exploited-zero-day-0c3916ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Update%20Patches%20Exploited%20Zero-Day&amp;severity=medium&amp;id=691c1ef891aee3c1015f016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8076-cwe-121-stack-based-buffer-overflow--3b3fb5c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8076%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=high&amp;id=691c1f0d91aee3c1015f038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kongtuke-activity-tue-nov-18th-2127cdf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KongTuke%20activity%2C%20(Tue%2C%20Nov%2018th)&amp;severity=medium&amp;id=691c1ef791aee3c1015f015b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7623-cwe-121-stack-based-buffer-overflow--c2265807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7623%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20MBD-X13SEDW-F&amp;severity=medium&amp;id=691c1f0d91aee3c1015f0391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12524-cwe-639-authorization-bypass-throug-67dd1610</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12524%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20johnjamesjacoby%20Post%20Type%20Switcher&amp;severity=medium&amp;id=691c17f491aee3c10155a86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48593-remote-code-execution-in-google-and-3ca254ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48593%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=691c09b712fe1630eb814e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-security-fix-for-actively-exploited--5cac9701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Security%20Fix%20for%20Actively%20Exploited%20Chrome%20V8%20Zero-Day%20Vulnerability&amp;severity=medium&amp;id=691c3a1b35a0ab0a56323a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64734-cwe-772-missing-release-of-resource-555248bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64734%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Gallagher%20T21%20Reader&amp;severity=low&amp;id=691bed9bd4c3ef3c7a628533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52578-cwe-335-incorrect-usage-of-seeds-in-0a270115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52578%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Gallagher%20High%20Sec%20End%20of%20Line%20Module&amp;severity=medium&amp;id=691bed9bd4c3ef3c7a62852e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52457-cwe-208-observable-timing-discrepan-f85f0568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52457%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Gallagher%20HBUS%20Devices&amp;severity=medium&amp;id=691bed9bd4c3ef3c7a628529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frontline-intelligence-analysis-of-unc1549-ttps-cu-39f95a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frontline%20Intelligence%3A%20Analysis%20of%20UNC1549%20TTPs%2C%20Custom%20Tools%2C%20and%20Malware%20Targeting%20the%20Aerospace%20and%20Defense%20Ecosystem&amp;severity=medium&amp;id=691bd87cd4c3ef3c7a5e99bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8693-cwe-78-improper-neutralization-of-sp-9e514a8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8693%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20DX3300-T0%20firmware&amp;severity=high&amp;id=691bd17ad4c3ef3c7a5d6d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6599-cwe-400-uncontrolled-resource-consum-cdfea7ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6599%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zyxel%20DX3301-T0%20firmware&amp;severity=medium&amp;id=691bd17ad4c3ef3c7a5d6d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13325-sql-injection-in-itsourcecode-stude-74fb4f8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13325%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=691bb966d4c3ef3c7a51160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13323-sql-injection-in-code-projects-simp-e2a18356</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13323%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=691bb966d4c3ef3c7a511605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-18-9c04fbd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-18&amp;severity=medium&amp;id=691d0cedb61595322de4c34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63229-na-501f48ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63229%3A%20n%2Fa&amp;severity=medium&amp;id=691ceaeebe2811888e436478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63217-na-a766bede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63217%3A%20n%2Fa&amp;severity=critical&amp;id=691ceaeebe2811888e436474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63216-na-1be25468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63216%3A%20n%2Fa&amp;severity=critical&amp;id=691ceaedbe2811888e43646f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63215-na-eeb49ca4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63215%3A%20n%2Fa&amp;severity=high&amp;id=691ceaedbe2811888e436468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63228-na-100e34e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63228%3A%20n%2Fa&amp;severity=critical&amp;id=691cd3b5b044fc99aa3e1008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63225-na-2b318b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63225%3A%20n%2Fa&amp;severity=critical&amp;id=691cd1d3b044fc99aa3c771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63227-na-dc4d6627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63227%3A%20n%2Fa&amp;severity=high&amp;id=691ccaa45990fe54bdf5a3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63226-na-a392e3b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63226%3A%20n%2Fa&amp;severity=medium&amp;id=691cc7215990fe54bdf056a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63994-na-bc7f8126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63994%3A%20n%2Fa&amp;severity=critical&amp;id=691cc5445990fe54bdeeceda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63695-na-55b6320d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63695%3A%20n%2Fa&amp;severity=critical&amp;id=691cc5445990fe54bdeeced6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63955-na-29b549c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63955%3A%20n%2Fa&amp;severity=high&amp;id=691cc1a5fcab56a016e2a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63749-na-61333b1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63749%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a5fcab56a016e2a045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60455-na-e975b468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60455%3A%20n%2Fa&amp;severity=high&amp;id=691cc1a4fcab56a016e27ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54321-na-0086e060</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54321%3A%20n%2Fa&amp;severity=critical&amp;id=691cc1a4fcab56a016e27ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56499-na-01ab51de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56499%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54320-na-9511da1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54320%3A%20n%2Fa&amp;severity=medium&amp;id=691cc1a4fcab56a016e27e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63693-na-b311c0cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63693%3A%20n%2Fa&amp;severity=medium&amp;id=691cbabbfcab56a016d7f811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63828-na-242fa359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63828%3A%20n%2Fa&amp;severity=medium&amp;id=691cb8bafcab56a016d65d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63514-na-e473f872</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63514%3A%20n%2Fa&amp;severity=medium&amp;id=691cb8bafcab56a016d65d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56643-na-b06a6f14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56643%3A%20n%2Fa&amp;severity=critical&amp;id=691cb50331331b1c393fbbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64076-na-bc19dbc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64076%3A%20n%2Fa&amp;severity=high&amp;id=691cb50331331b1c393fbbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63694-na-ab81bdaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63694%3A%20n%2Fa&amp;severity=critical&amp;id=691cb50331331b1c393fbbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63829-na-b9a83567</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63829%3A%20n%2Fa&amp;severity=medium&amp;id=691cac1d31331b1c39338b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55796-na-dc886065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55796%3A%20n%2Fa&amp;severity=high&amp;id=691cac1d31331b1c39338b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63513-na-283103e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63513%3A%20n%2Fa&amp;severity=medium&amp;id=691ca514209f2030fafbb909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63258-na-2297ba71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63258%3A%20n%2Fa&amp;severity=medium&amp;id=691ca514209f2030fafbb904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63800-na-5deddf99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63800%3A%20n%2Fa&amp;severity=high&amp;id=691c9c359b9483ee9a7975ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63512-na-be7bfb92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63512%3A%20n%2Fa&amp;severity=medium&amp;id=691c9c359b9483ee9a7975aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56527-na-72934aa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56527%3A%20n%2Fa&amp;severity=high&amp;id=691c9c359b9483ee9a7975a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56526-na-19a56d47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56526%3A%20n%2Fa&amp;severity=medium&amp;id=691c9c359b9483ee9a79759e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63604-na-7268a54e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63604%3A%20n%2Fa&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63603-na-88b7067e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63603%3A%20n%2Fa&amp;severity=medium&amp;id=691c98b19b9483ee9a7411a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63602-na-60fdeb21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63602%3A%20n%2Fa&amp;severity=high&amp;id=691c93529b9483ee9a6cccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63408-na-bd4f5fa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63408%3A%20n%2Fa&amp;severity=medium&amp;id=691c901eb718280d68a97e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63892-na-376ed066</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63892%3A%20n%2Fa&amp;severity=medium&amp;id=691c88f8b718280d689a277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63883-na-2dc6dc67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63883%3A%20n%2Fa&amp;severity=medium&amp;id=691c88f8b718280d689a2777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-3-yashraj-solanki-9f5f02bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%203%20-%20Yashraj%20Solanki&amp;severity=medium&amp;id=691c8529b718280d689345ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-mitigated-the-largest-cloud-ddos-ever-re-307996c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20mitigated%20the%20largest%20cloud%20DDoS%20ever%20recorded%2C%2015.7%20Tbps&amp;severity=medium&amp;id=691bb70ca75c6bac5fb98316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-police-seizes-250-servers-used-by-bulletproo-8b0b4916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20police%20seizes%20250%20servers%20used%20by%20%E2%80%9Cbulletproof%20hosting%E2%80%9D%20service&amp;severity=high&amp;id=691bb70ca75c6bac5fb98312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/princeton-university-discloses-data-breach-affecti-74e682ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Princeton%20University%20discloses%20data%20breach%20affecting%20donors%2C%20alumni&amp;severity=high&amp;id=691bb70ca75c6bac5fb9830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eurofiber-france-warns-of-breach-after-hacker-trie-6c3849bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eurofiber%20France%20warns%20of%20breach%20after%20hacker%20tries%20to%20sell%20customer%20data&amp;severity=high&amp;id=691bb70ca75c6bac5fb9830a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13306-command-injection-in-d-link-dwr-m92-684b81c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13306%3A%20Command%20Injection%20in%20D-Link%20DWR-M920&amp;severity=medium&amp;id=691bb389a75c6bac5fb415b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13230-type-confusion-in-google-chrome-6bb46a80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13230%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13229-type-confusion-in-google-chrome-4bf79d83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13229%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13228-type-confusion-in-google-chrome-b865d10a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13228%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13227-type-confusion-in-google-chrome-210ef1ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13227%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13226-type-confusion-in-google-chrome-c8165382</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13226%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bb004a75c6bac5fafa697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13224-type-confusion-in-google-chrome-775058da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13224%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691bac8aa75c6bac5fab647d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13223-type-confusion-in-google-chrome-06120bf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13223%3A%20Vulnerability%20in%20Google%20Chrome&amp;severity=high&amp;id=691bac8aa75c6bac5fab6479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13305-buffer-overflow-in-d-link-dwr-m920-37aeaa2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13305%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=691bac8aa75c6bac5fab6481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31649-cwe-908-use-of-uninitialized-resour-cd9e5c59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31649%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c9502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31361-cwe-908-use-of-uninitialized-resour-bae09bb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31361%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c94fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36463-cwe-805-buffer-access-with-incorrec-e2354285</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36463%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c950e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36462-cwe-805-buffer-access-with-incorrec-507cd900</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36462%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36461-cwe-805-buffer-access-with-incorrec-95e6b3f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36461%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691baab2bb922d22627c9506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36460-cwe-805-buffer-access-with-incorrec-e65b38e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36460%3A%20CWE-805%20-%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba72ebb922d226277cd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32089-cwe-120-buffer-copy-without-checkin-4b61881c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32089%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba3aabb922d226272e03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13304-buffer-overflow-in-d-link-dwr-m920-28cafbb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13304%3A%20Buffer%20Overflow%20in%20D-Link%20DWR-M920&amp;severity=high&amp;id=691ba3aabb922d226272e02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7711-cwe-94-improper-control-of-generatio-991747f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7711%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=691ba3aabb922d226272e042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36553-cwe-120-buffer-copy-without-checkin-29f1dbf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36553%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=691ba3aabb922d226272e03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13303-sql-injection-in-code-projects-cour-e88dba4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13303%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691ba1c4bb922d22627154ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64766-cwe-798-use-of-hard-coded-credentia-19e41cf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64766%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20NixOS%20nixpkgs&amp;severity=medium&amp;id=691b98f601a6b16707f49d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13302-sql-injection-in-code-projects-cour-9755ab2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13302%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=691b98f601a6b16707f49d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-fortinet-fortiweb-waf-bug-exploited-in-th-0d45240c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Fortinet%20FortiWeb%20WAF%20Bug%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=691bc6a3d4c3ef3c7a5bc8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13301-sql-injection-in-itsourcecode-web-b-995d91be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13301%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b957101a6b16707efdd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-citizens-plead-guilty-to-aiding-north-korean-it-7f6562fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Citizens%20Plead%20Guilty%20to%20Aiding%20North%20Korean%20IT%20Worker%20Campaigns&amp;severity=medium&amp;id=691bc6a3d4c3ef3c7a5bc8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36118-cwe-244-improper-clearing-of-heap-m-b1a08026</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36118%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Storage%20Virtualize&amp;severity=high&amp;id=691b8c9b26779d9a5eb718c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13300-sql-injection-in-itsourcecode-web-b-e5cd5982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13300%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b891926779d9a5eb241ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36299-cwe-540-in-ibm-ibm-planning-analyti-e452ad68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36299%3A%20CWE-540%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=691b821c26779d9a5ea959fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36357-cwe-36-in-ibm-ibm-planning-analytic-2b1c2efd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36357%3A%20CWE-36%20in%20IBM%20IBM%20Planning%20Analytics%20Local&amp;severity=high&amp;id=691b821c26779d9a5ea959fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13299-sql-injection-in-itsourcecode-web-b-f1c6d198</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13299%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b800b6e6bf6953cd4fd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13298-sql-injection-in-itsourcecode-web-b-ea95dff2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13298%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b7c896e6bf6953cd06d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-able-n-central-from-n-days-to-0-days-36e1fdd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N-able%20N-central%3A%20From%20N-days%20to%200-days&amp;severity=medium&amp;id=691b6ff3f84694138de3dbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cats-got-your-files-lynx-ransomware-45d707bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cat&apos;s%20Got%20Your%20Files%3A%20Lynx%20Ransomware&amp;severity=medium&amp;id=691bd87cd4c3ef3c7a5e99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13297-sql-injection-in-itsourcecode-web-b-3717c6aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13297%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=691b66e9c08982598afd8f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragon-breath-uses-roningloader-to-disable-securit-a50c2143</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dragon%20Breath%20Uses%20RONINGLOADER%20to%20Disable%20Security%20Tools%20and%20Deploy%20Gh0st%20RAT&amp;severity=high&amp;id=691b6369c08982598af82f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-confirms-major-disruption-and-19-6bdd0287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20confirms%20major%20disruption%20and%20%C2%A3196M%20cost%20from%20September%20cyberattack&amp;severity=medium&amp;id=691b6369c08982598af82f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pennsylvania-ag-confirms-data-breach-after-inc-ran-9cb2fe24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pennsylvania%20AG%20confirms%20data%20breach%20after%20INC%20Ransom%20attack&amp;severity=high&amp;id=691b6369c08982598af82f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34323-cwe-732-incorrect-permission-assign-1cc70422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34323%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=691b639ec08982598af882b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34322-cwe-78-improper-neutralization-of-s-3c5dcdcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34322%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=691b68f8f84694138ddb8361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55059-cwe-79-improper-neutralization-of-i-63fc8af8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5fe0c08982598af311d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55058-cwe-20-improper-input-validation-in-ef23a1a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55058%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5fe0c08982598af311cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55057-multiple-cwe-352-cross-site-request-733d1102</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55057%3A%20Multiple%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64756-cwe-78-improper-neutralization-of-s-19997de1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64756%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20isaacs%20node-glob&amp;severity=high&amp;id=691b5ce0c08982598af07855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55056-multiple-cwe-79-improper-neutraliza-7d5336a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55056%3A%20Multiple%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55055-cwe-78-improper-neutralization-of-s-41c872e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55055%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Rumpus%20FTP%20Server&amp;severity=medium&amp;id=691b5ce0c08982598af07843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64758-cwe-79-improper-neutralization-of-i-9d748d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64758%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DependencyTrack%20frontend&amp;severity=medium&amp;id=691b5ce0c08982598af07859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64342-cwe-754-improper-check-for-unusual--a47d3085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64342%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=691b5ce0c08982598af0784c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58407-cwe-cwe-367-time-of-check-time-of-u-df862441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58407%3A%20CWE%20-%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=691b5a78903b8a3ddb6f53a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13193-incorrect-default-permissions-in-re-3cbaa734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13193%3A%20Incorrect%20Default%20Permissions&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13291-sql-injection-in-campcodes-supplier-183047f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13291%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58410-cwe-cwe-280-improper-handling-of-in-4dc99d04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58410%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.18)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=691b56f4903b8a3ddb69fcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-evalusion-clickfix-campaign-delivers-amatera-s-b7fae61f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EVALUSION%20ClickFix%20Campaign%20Delivers%20Amatera%20Stealer%20and%20NetSupport%20RAT&amp;severity=medium&amp;id=691bc610d4c3ef3c7a5b4586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62519-cwe-89-improper-neutralization-of-s-2c1edf22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62519%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=691b5380903b8a3ddb64b9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-stole-data-of-millions--ba294bbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Stole%20Data%20of%20Millions%20of%20Under%20Armour%20Customers%20and%20345GB%20of%20Internal%20Records&amp;severity=medium&amp;id=691b536d903b8a3ddb64b2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13319-cwe-20-improper-input-validation-in-6a8b1d67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13319%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Nettec%20AS%20Digi%20On-Prem%20Manager&amp;severity=high&amp;id=691b5188903b8a3ddb62ff68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13290-sql-injection-in-code-projects-simp-45c18c8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13290%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13289-sql-injection-in-1000projects-desig-c7ba0f94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13289%3A%20SQL%20Injection%20in%201000projects%20Design%20%26%20Development%20of%20Student%20Database%20Management%20System&amp;severity=medium&amp;id=691b4a4dbf18c64a4b316bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cracker-barrel-vulnerability-5947abfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cracker%20Barrel%20vulnerability&amp;severity=medium&amp;id=691b4344bf18c64a4b25e07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-issue-paves-way-for-credential-stealing-att-0217f173</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20Issue%20Paves%20Way%20for%20Credential-Stealing%20Attacks&amp;severity=low&amp;id=691bc6a3d4c3ef3c7a5bc8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13288-buffer-overflow-in-tenda-ch22-258d55c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13288%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=691b46c7bf18c64a4b2b8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4321-cwe-240-improper-handling-of-inconsi-cf418d26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4321%3A%20CWE-240%20Improper%20Handling%20of%20Inconsistent%20Structural%20Elements%20in%20silabs.com%20RS9116W&amp;severity=high&amp;id=691b3a49c14a66f6d6c9eb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13287-sql-injection-in-itsourcecode-onlin-6ca6ee03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13287%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b33e6c14a66f6d6c06a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-target-defense-and-government-offi-ec571e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Target%20Defense%20and%20Government%20Officials%20in%20Ongoing%20Campaign&amp;severity=medium&amp;id=691b33cac14a66f6d6c02cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13286-sql-injection-in-itsourcecode-onlin-8c10d189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13286%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b2dc5884abd7c70dc0f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13285-sql-injection-in-itsourcecode-onlin-58493ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13285%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=691b26c7884abd7c70d2416e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/echogram-flaw-bypasses-guardrails-in-major-llms-705e0e83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EchoGram%20Flaw%20Bypasses%20Guardrails%20in%20Major%20LLMs&amp;severity=medium&amp;id=691b24c1e3df22298b284cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13280-sql-injection-in-codeastro-simple-i-9afbf9bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13280%3A%20SQL%20Injection%20in%20CodeAstro%20Simple%20Inventory%20System&amp;severity=medium&amp;id=691b2143e3df22298b219e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-says-personal-information-stolen-in-data--f50b034d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20Says%20Personal%20Information%20Stolen%20in%20Data%20Breach&amp;severity=medium&amp;id=691b1db9e3df22298b1bd5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-plead-guilty-in-us-to-helping-north-korean-it-wo-90f53e55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Plead%20Guilty%20in%20US%20to%20Helping%20North%20Korean%20IT%20Workers&amp;severity=medium&amp;id=691b1a9fe3df22298b18666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-fortinet-exploited-chinas-ai-hacks-ph-c4f4d2e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Fortinet%20Exploited%2C%20China&apos;s%20AI%20Hacks%2C%20PhaaS%20Empire%20Falls%20%26%20More&amp;severity=medium&amp;id=691b2660e3df22298b29a4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13279-sql-injection-in-code-projects-nero-ac54ed4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13279%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=691b1ab3e3df22298b18a286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13278-sql-injection-in-projectworlds-adva-4f807721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13278%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691b14b667e4f3aad62a0225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/5-reasons-why-attackers-are-phishing-over-linkedin-2eeafac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=5%20Reasons%20Why%20Attackers%20Are%20Phishing%20Over%20LinkedIn&amp;severity=medium&amp;id=691b2660e3df22298b29a4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40936-cwe-125-out-of-bounds-read-in-sieme-241e804e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40936%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20PS%2FIGES%20Parasolid%20Translator%20Component&amp;severity=high&amp;id=691b0bd1502dbbeec6e1cf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40834-cwe-79-improper-neutralization-of-i-0f2ab76b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40834%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Mendix%20RichText&amp;severity=medium&amp;id=691b0bd1502dbbeec6e1cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13277-sql-injection-in-code-projects-nero-a150bb07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13277%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=691b0bd1502dbbeec6e1cf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11681-cwe-400-uncontrolled-resource-consu-b54a5fa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11681%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=691b0bd1502dbbeec6e1cf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragon-breath-uses-roningloader-to-disable-securit-294e54ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dragon%20Breath%20Uses%20RONINGLOADER%20to%20Disable%20Security%20Tools%20and%20Deploy%20Gh0st%20RAT&amp;severity=medium&amp;id=691b0d52502dbbeec6e296f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/logitech-confirms-data-breach-following-designatio-e264d6f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Logitech%20Confirms%20Data%20Breach%20Following%20Designation%20as%20Oracle%20Hack%20Victim&amp;severity=low&amp;id=691b04c5502dbbeec6d6a1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/widespread-exploitation-of-xwiki-vulnerability-obs-f10fb388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Widespread%20Exploitation%20of%20XWiki%20Vulnerability%20Observed&amp;severity=medium&amp;id=691b04c5502dbbeec6d6a1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/17th-november-threat-intelligence-report-6d2aa196</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=17th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=691b01b1502dbbeec6d34efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13276-sql-injection-in-g33kyrash-online-b-0c89b930</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13276%3A%20SQL%20Injection%20in%20g33kyrash%20Online-Banking-System&amp;severity=medium&amp;id=691b0db867e4f3aad6206f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13275-unrestricted-upload-in-iqbolshoh-ph-448444ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13275%3A%20Unrestricted%20Upload%20in%20Iqbolshoh%20php-business-website&amp;severity=medium&amp;id=691afbcd631894e18a64dcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-adoption-drives-android-memory-safety-bugs-be-c5fa767e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust%20Adoption%20Drives%20Android%20Memory%20Safety%20Bugs%20Below%2020%25%20for%20First%20Time&amp;severity=high&amp;id=691af824631894e18a5ef98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13274-sql-injection-in-campcodes-school-f-268c6857</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13274%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691b01b0502dbbeec6d34d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13273-sql-injection-in-campcodes-school-f-0467b1ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13273%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691aef39a2e1787363359ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13272-sql-injection-in-campcodes-school-f-99bfccbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13272%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ae642a21117b502ed9957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13271-sql-injection-in-campcodes-school-f-6ef7343d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13271%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691adf3aa21117b502e22de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13270-sql-injection-in-campcodes-school-f-216add20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13270%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ad9de77ef4e346a52dea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13269-sql-injection-in-campcodes-school-f-a85d80e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13269%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=691ad0ec77ef4e346a4686cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/decoding-binary-numeric-expressions-mon-nov-17th-fe2233e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Decoding%20Binary%20Numeric%20Expressions%2C%20(Mon%2C%20Nov%2017th)&amp;severity=low&amp;id=691acd5a848ad39aa20de2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13268-injection-in-dromara-datacompare-0e9e163f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13268%3A%20Injection%20in%20Dromara%20dataCompare&amp;severity=medium&amp;id=691acd6f848ad39aa20e3f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13165-cwe-770-allocation-of-resources-wit-944a9dc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13165%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Digiwin%20EasyFlow%20GP&amp;severity=high&amp;id=691ac658848ad39aa203c516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13267-sql-injection-in-sourcecodester-den-21f44f6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13267%3A%20SQL%20Injection%20in%20SourceCodester%20Dental%20Clinic%20Appointment%20Reservation%20System&amp;severity=medium&amp;id=691ac658848ad39aa203c51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13164-cwe-522-insufficiently-protected-cr-33d570e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13164%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Digiwin%20EasyFlow%20GP&amp;severity=medium&amp;id=691ac33f848ad39aa20115d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13163-cwe-522-insufficiently-protected-cr-965e214e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13163%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Digiwin%20EasyFlow%20GP&amp;severity=medium&amp;id=691ac33f848ad39aa20115d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13266-path-traversal-in-wwwlike-vlife-7e1577fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13266%3A%20Path%20Traversal%20in%20wwwlike%20vlife&amp;severity=medium&amp;id=691abd7c1ba1a3acd855a6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-adoption-drives-android-memory-safety-bugs-be-d85bd9a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust%20Adoption%20Drives%20Android%20Memory%20Safety%20Bugs%20Below%2020%25%20for%20First%20Time&amp;severity=low&amp;id=691ae7b2a21117b502eef093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9501-cwe-78-os-command-injection-in-w3-to-58cc2bce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9501%3A%20CWE-78%20OS%20Command%20Injection%20in%20W3%20Total%20Cache&amp;severity=critical&amp;id=691abd7c1ba1a3acd855a6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60022-improper-certificate-validation-in--1e5631cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60022%3A%20Improper%20certificate%20validation%20in%20KDDI%20CORPORATION%20&apos;%E3%83%87%E3%82%B8%E3%83%A9%E3%82%A2%E3%83%97%E3%83%AA&apos;%20App%20for%20iOS&amp;severity=medium&amp;id=691ab9fc1ba1a3acd84ff7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13265-path-traversal-in-lsfusion-platform-06acf530</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13265%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691ab4bd8eaa519f4313878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13264-sql-injection-in-sourcecodester-onl-2ed07e64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13264%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Magazine%20Management%20System&amp;severity=medium&amp;id=691aadb58eaa519f4308c9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13263-sql-injection-in-sourcecodester-onl-9b0763a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13263%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Magazine%20Management%20System&amp;severity=medium&amp;id=691aa8617644a7cc141f22d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13262-path-traversal-in-lsfusion-platform-e4d614d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13262%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691aaaae8eaa519f4305faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13261-path-traversal-in-lsfusion-platform-0bd80ffb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13261%3A%20Path%20Traversal%20in%20lsfusion%20platform&amp;severity=medium&amp;id=691a9d62c118c0da2e5d7e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13283-cwe-352-cross-site-request-forgery--0bcb621a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13283%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chunghwa%20Telecom%20TenderDocTransfer&amp;severity=high&amp;id=691a9d62c118c0da2e5d7ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13282-cwe-352-cross-site-request-forgery--6b3e8d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13282%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chunghwa%20Telecom%20TenderDocTransfer&amp;severity=high&amp;id=691a967cc118c0da2e5a3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13260-sql-injection-in-campcodes-supplier-27b3f684</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13260%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691a967cc118c0da2e5a3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10460-cwe-20-improper-input-validation-in-45eca59b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20BEIMS%20Contractor%20Web&amp;severity=critical&amp;id=691a8f51c118c0da2e582c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13259-sql-injection-in-campcodes-supplier-21b0de01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13259%3A%20SQL%20Injection%20in%20Campcodes%20Supplier%20Management%20System&amp;severity=medium&amp;id=691a8f51c118c0da2e582c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13258-buffer-overflow-in-tenda-ac20-f036b48b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13258%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=691a8851c118c0da2e55dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13257-sql-injection-in-itsourcecode-inven-9b2345a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13257%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691a8142c118c0da2e53955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aipac-says-hundreds-affected-in-data-breach-30582189</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AIPAC%20Says%20Hundreds%20Affected%20in%20Data%20Breach&amp;severity=high&amp;id=691a7dbac118c0da2e4bc9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13256-sql-injection-in-projectworlds-adva-e93f7815</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13256%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a76b5c118c0da2e3dce34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13255-sql-injection-in-projectworlds-adva-fd882eac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13255%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6fd3c118c0da2e30eb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13254-sql-injection-in-projectworlds-adva-0c6bbd91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13254%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6fd3c118c0da2e30eb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-17-7c533ee4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-17&amp;severity=medium&amp;id=691bb86aa75c6bac5fb9fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44664-na-41c1fd24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44664%3A%20n%2Fa&amp;severity=medium&amp;id=691b800b6e6bf6953cd4fd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44659-na-1e26051b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44659%3A%20n%2Fa&amp;severity=critical&amp;id=691b800b6e6bf6953cd4fd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44661-na-fe2a0902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44661%3A%20n%2Fa&amp;severity=medium&amp;id=691b7c896e6bf6953cd06d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44662-na-f65a277d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44662%3A%20n%2Fa&amp;severity=medium&amp;id=691b7378f84694138de869a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44660-na-053b8e33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44660%3A%20n%2Fa&amp;severity=medium&amp;id=691b7378f84694138de869a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44663-na-02be901c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44663%3A%20n%2Fa&amp;severity=medium&amp;id=691b6ff3f84694138de3dbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44658-na-3c5d3bcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44658%3A%20n%2Fa&amp;severity=medium&amp;id=691b6ff3f84694138de3dbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46335-na-dffb3a48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46335%3A%20n%2Fa&amp;severity=medium&amp;id=691b6c6ff84694138ddf7098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44651-na-9a6019d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44651%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb835d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63292-na-fa91762f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63292%3A%20n%2Fa&amp;severity=low&amp;id=691b68f8f84694138ddb8359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44655-na-012e74d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44655%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb8355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44654-na-89398cf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44654%3A%20n%2Fa&amp;severity=medium&amp;id=691b68f8f84694138ddb8351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44657-na-f598d25a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44657%3A%20n%2Fa&amp;severity=medium&amp;id=691b66e9c08982598afd8f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44653-na-102b5c3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44653%3A%20n%2Fa&amp;severity=medium&amp;id=691b639ec08982598af882ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46336-na-105acde7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46336%3A%20n%2Fa&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44652-na-6cc58d69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44652%3A%20n%2Fa&amp;severity=medium&amp;id=691b5a78903b8a3ddb6f53a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46334-na-7f89b4e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46334%3A%20n%2Fa&amp;severity=medium&amp;id=691b5380903b8a3ddb64b9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44648-na-3b64b4ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44648%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44647-na-767b1429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44647%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44644-na-3edff7d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44644%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44641-na-82751bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44641%3A%20n%2Fa&amp;severity=medium&amp;id=691b5188903b8a3ddb62ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63918-na-a9f9ac2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63918%3A%20n%2Fa&amp;severity=medium&amp;id=691b4e50b1dcb1316b016571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63917-na-ba45e176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63917%3A%20n%2Fa&amp;severity=high&amp;id=691b4e4fb1dcb1316b01656b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63916-na-60e5aa6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63916%3A%20n%2Fa&amp;severity=high&amp;id=691b4a4dbf18c64a4b316bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63748-na-3aed058c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63748%3A%20n%2Fa&amp;severity=high&amp;id=691b4a4dbf18c64a4b316bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63747-na-080ae277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63747%3A%20n%2Fa&amp;severity=critical&amp;id=691b4a4dbf18c64a4b316be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64046-na-73f2af6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64046%3A%20n%2Fa&amp;severity=medium&amp;id=691b46c6bf18c64a4b2b8194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65083-cwe-295-improper-certificate-valida-4e03f5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65083%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Tinexta%20Infocert%20GoSign%20Desktop&amp;severity=low&amp;id=691b46c6bf18c64a4b2b8190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63708-na-898dc99f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63708%3A%20n%2Fa&amp;severity=medium&amp;id=691b46c6bf18c64a4b2b818c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65073-na-3fc701d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65073%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenStack%20Keystone&amp;severity=high&amp;id=691ad1de77ef4e346a475a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13253-sql-injection-in-projectworlds-adva-45b36b4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13253%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=691a6057bc1ae26b3e2e5df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13252-hard-coded-credentials-in-shsuishan-64031bd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13252%3A%20Hard-coded%20Credentials%20in%20shsuishang%20ShopSuite%20ModulithShop&amp;severity=medium&amp;id=691a5aab40bd38dff3126b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reposecu-free-3-in-1-sast-scanner-for-github-semgr-18b8b86a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reposecu%3A%20Free%203-in-1%20SAST%20Scanner%20for%20GitHub%20(Semgrep%20%2B%20Trivy%20%2B%20Detect-Secrets)%20%E2%80%93%20Beta%20Feedback%20Welcome&amp;severity=medium&amp;id=691a21218a2260cc8e952608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13251-sql-injection-in-weiye-jing-datax-w-109f851e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13251%3A%20SQL%20Injection%20in%20WeiYe-Jing%20datax-web&amp;severity=medium&amp;id=6919ceee66db7136d9af53ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13250-improper-access-controls-in-weiye-j-95b6bf21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13250%3A%20Improper%20Access%20Controls%20in%20WeiYe-Jing%20datax-web&amp;severity=medium&amp;id=6919c1b3f176205dc4fad9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13249-unrestricted-upload-in-jiusi-oa-f3d4e085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13249%3A%20Unrestricted%20Upload%20in%20Jiusi%20OA&amp;severity=medium&amp;id=6919b890ea52702b1491872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13248-sql-injection-in-sourcecodester-pat-153faa2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13248%3A%20SQL%20Injection%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=6919b363cd4374a700c8728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-ai-ran-autonomous-espionage-operations-0f7ef30c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20AI%20ran%20autonomous%20espionage%20operations&amp;severity=medium&amp;id=6919afe3cd4374a700c3a5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13247-sql-injection-in-phpgurukul-tourism-7500ee86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13247%3A%20SQL%20Injection%20in%20PHPGurukul%20Tourism%20Management%20System&amp;severity=medium&amp;id=6919ac5acd4374a700bea47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13246-path-traversal-in-shsuishang-shopsu-46b60442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13246%3A%20Path%20Traversal%20in%20shsuishang%20ShopSuite%20ModulithShop&amp;severity=medium&amp;id=6919aa6fcd4374a700bd6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13245-cross-site-scripting-in-code-projec-7daf8f03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13245%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69199619be70e745c858593a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13244-cross-site-scripting-in-code-projec-011444cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13244%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69198d7a1be9ed16ddc78a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13243-sql-injection-in-code-projects-stud-e5f136cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13243%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=691987a9349a492776909535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13242-sql-injection-in-code-projects-stud-53b30022</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13242%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=691980a1349a492776852116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fingerexe-x26-clickfix-sun-nov-16th-df340bd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x26%3B%23xa%3BFinger.exe%20%26%23x26%3B%20ClickFix%2C%20(Sun%2C%20Nov%2016th)&amp;severity=medium&amp;id=69197d8c349a492776829d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13241-sql-injection-in-code-projects-stud-742f4732</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13241%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69197b67f90981bc0ff20957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13240-sql-injection-in-code-projects-stud-04f4cbcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13240%3A%20SQL%20Injection%20in%20code-projects%20Student%20Information%20System&amp;severity=medium&amp;id=69197159f90981bc0fe630f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13239-enforcement-of-behavioral-workflow--a40ec0c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13239%3A%20Enforcement%20of%20Behavioral%20Workflow%20in%20Bdtask%20Isshue%20Multi%20Store%20eCommerce%20Shopping%20Cart%20Solution&amp;severity=medium&amp;id=69196bbd3a8d0e8ca2f8dfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13238-unrestricted-upload-in-bdtask-fligh-2972affc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13238%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=69196324d6c6237fbda66dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13237-sql-injection-in-itsourcecode-inven-fd0d1eee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13237%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=69195fa0d6c6237fbda1960e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12482-cwe-89-improper-neutralization-of-s-530517f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12482%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=high&amp;id=6919535f826a51df38f44767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13236-sql-injection-in-itsourcecode-inven-372cae7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13236%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=69195912d6c6237fbd9a14d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13235-sql-injection-in-itsourcecode-inven-a95719f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13235%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691948fab279ec117793ceeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13234-sql-injection-in-itsourcecode-inven-230a0b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13234%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691941f1b279ec117792a9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13233-sql-injection-in-itsourcecode-inven-cf1d5c47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13233%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=691941f1b279ec117792a9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13232-cross-site-scripting-in-projectsend-abd607e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13232%3A%20Cross%20Site%20Scripting%20in%20projectsend&amp;severity=medium&amp;id=691925d1b279ec11778c28a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-16-026ecbe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-16&amp;severity=medium&amp;id=691a6a54bc1ae26b3e3b67e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-exploits-unpatched-xwiki-servers-to-pull--f6506c38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Exploits%20Unpatched%20XWiki%20Servers%20to%20Pull%20More%20Devices%20Into%20Its%20Botnet&amp;severity=high&amp;id=6919166609545414a9be6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/decades-old-finger-protocol-abused-in-clickfix-mal-6e4a26f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Decades-old%20%E2%80%98Finger%E2%80%99%20protocol%20abused%20in%20ClickFix%20malware%20attacks&amp;severity=high&amp;id=6919166609545414a9be6977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-vulnerabilities-in-gosign-desktop-lead-to-5f5b6dab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20Vulnerabilities%20in%20GoSign%20Desktop%20lead%20to%20Remote%20Code%20Execution&amp;severity=medium&amp;id=6919166609545414a9be697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13221-unprotected-storage-of-credentials--1d294bd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13221%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20UnniTI&amp;severity=medium&amp;id=6918d703cdb3e870ee55d48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13210-sql-injection-in-itsourcecode-inven-2ceb90c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13210%3A%20SQL%20Injection%20in%20itsourcecode%20Inventory%20Management%20System&amp;severity=medium&amp;id=6918d21a583c8b7d37900dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-hit-by-new-data-breach-after-an-employee--116ee313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20hit%20by%20new%20data%20breach%20after%20an%20employee%20falls%20for%20social%20engineering%20scam&amp;severity=high&amp;id=6918cb0e583c8b7d3786ce3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13209-xml-external-entity-reference-in-be-372dc688</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13209%3A%20XML%20External%20Entity%20Reference%20in%20bestfeng%20oa_git_free&amp;severity=medium&amp;id=6918d42bcdb3e870ee534ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13208-sql-injection-in-fantasticlbp-hotel-eab451f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13208%3A%20SQL%20Injection%20in%20FantasticLBP%20Hotels%20Server&amp;severity=medium&amp;id=6918c2a66c45b14c393afde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13203-sql-injection-in-code-projects-simp-036d531f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13203%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918bc476c45b14c39340630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13202-cross-site-scripting-in-code-projec-19e4a0a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13202%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918b301838c73fda942a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-exploits-unpatched-xwiki-servers-to-pull--2bf18a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Exploits%20Unpatched%20XWiki%20Servers%20to%20Pull%20More%20Devices%20Into%20Its%20Botnet&amp;severity=critical&amp;id=6918adf344c00f9fdd5f0721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberrecon-project-baddb41f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberRecon%20project&amp;severity=medium&amp;id=6918aa8544c00f9fdd5ab1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13201-sql-injection-in-code-projects-simp-efeafebd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13201%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=6918b028838c73fda94019c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13200-exposure-of-information-through-dir-323502f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13200%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=6918a1f63494992e767dd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/att-data-breach-settlement-deadline-nears-for-clai-c7e13e08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AT%26T%20Data%20Breach%20Settlement%20Deadline%20Nears%20for%20Claims%20Up%20to%20%247%2C500&amp;severity=high&amp;id=6918866ebddd42d2a8c78f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/logitech-confirms-data-breach-after-clop-extortion-f2a8999d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Logitech%20confirms%20data%20breach%20after%20Clop%20extortion%20attack&amp;severity=high&amp;id=691882e5bddd42d2a8c27d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-doppelgangers-anatomy-of-evolving-imperson-46bd85e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Doppelgangers%3A%20Anatomy%20of%20Evolving%20Impersonation%20Campaigns%20Distributing%20Gh0st%20RAT&amp;severity=medium&amp;id=691882e5bddd42d2a8c27d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-plead-guilty-in-us-for-helping-north-korean-i-fe02968e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Plead%20Guilty%20in%20U.S.%20for%20Helping%20North%20Korean%20IT%20Workers%20Infiltrate%20136%20Companies&amp;severity=high&amp;id=691882e5bddd42d2a8c27d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/face-scrapper-ai-like-faceseek-netsec-analysis-32081dd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Face%20Scrapper%20Ai%20like%20faceSeek%20-netsec%20analysis&amp;severity=medium&amp;id=69187deee1cec89a0573d3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13199-path-traversal-filedir-in-code-proj-a9437a15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13199%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20code-projects%20Email%20Logging%20Interface&amp;severity=medium&amp;id=69185a1a429a1e97bc072ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-plead-guilty-in-us-for-helping-north-korean-i-f91beefe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20Plead%20Guilty%20in%20U.S.%20for%20Helping%20North%20Korean%20IT%20Workers%20Infiltrate%20136%20Companies&amp;severity=low&amp;id=6919279ab279ec11778d97e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeypot-fortiweb-cve-2025-64446-exploits-sat-nov--4c79cbeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeypot%3A%20FortiWeb%20CVE-2025-64446%20Exploits%2C%20(Sat%2C%20Nov%2015th)&amp;severity=medium&amp;id=69184e1c5aa1a593e1cc40bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13198-unrestricted-upload-in-douphp-14075958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13198%3A%20Unrestricted%20Upload%20in%20DouPHP&amp;severity=medium&amp;id=691844485aa1a593e1c111b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13191-stack-based-buffer-overflow-in-d-li-be124aec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13191%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69182a67b7cdcddb4cb0121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12849-cwe-862-missing-authorization-in-co-0ac7e244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12849%3A%20CWE-862%20Missing%20Authorization%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%20%26%20Sell%20with%20PayPal%20and%20Stripe&amp;severity=medium&amp;id=69182360b7cdcddb4ca68f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13190-stack-based-buffer-overflow-in-d-li-386fd159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13190%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69181fe6b7cdcddb4ca2270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13189-stack-based-buffer-overflow-in-d-li-31fd3f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13189%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=high&amp;id=69181a9193cc35e7aa416d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-doppelgangers-anatomy-of-evolving-imperson-6d47f8ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Doppelgangers%3A%20Anatomy%20of%20Evolving%20Impersonation%20Campaigns%20Distributing%20Gh0st%20RAT&amp;severity=medium&amp;id=691aebada2e17873632ea95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12494-cwe-285-improper-authorization-in-w-7eb45f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12494%3A%20CWE-285%20Improper%20Authorization%20in%20wpchill%20Image%20Gallery%20%E2%80%93%20Photo%20Grid%20%26%20Video%20Gallery&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8994-cwe-89-improper-neutralization-of-sp-01e256ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8994%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20Project%20Management%20%26%20Task%20Manager%20with%20Kanban%20Board%20%26%20Gantt%20Chart%20%E2%80%93%20WP%20Project%20Manager&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12847-cwe-862-missing-authorization-in-sm-ab2c82a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12847%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=6918143b93cc35e7aa3af0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-closer-look-at-outlook-macros-and-more-09057529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Closer%20Look%20at%20Outlook%20Macros%20and%20More&amp;severity=medium&amp;id=691aebada2e17873632ea951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ai-is-fueling-a-new-wave-of-black-friday-scams-93c85b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20AI%20Is%20Fueling%20a%20New%20Wave%20of%20Black%20Friday%20Scams&amp;severity=medium&amp;id=691aef31a2e178736335862b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12182-cwe-284-improper-access-control-in--8dc59ec4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12182%3A%20CWE-284%20Improper%20Access%20Control%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=6917f71bb6d0b801e4d2e75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-15-c5648ff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-15&amp;severity=medium&amp;id=6919165309545414a9be561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8386-cwe-80-in-aveva-application-server-a9f86cae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8386%3A%20CWE-80%20in%20AVEVA%20Application%20Server&amp;severity=medium&amp;id=6917c40aed594783724e114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9317-cwe-327-in-aveva-edge-e409a7a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9317%3A%20CWE-327%20in%20AVEVA%20Edge&amp;severity=high&amp;id=6917c40aed594783724e1150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64309-cwe-523-in-brightpick-ai-brightpick-d41753a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64309%3A%20CWE-523%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=high&amp;id=6917c086ed59478372495959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64308-cwe-523-in-brightpick-ai-brightpick-65756869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64308%3A%20CWE-523%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=high&amp;id=6917c086ed59478372495954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64307-cwe-306-in-brightpick-ai-brightpick-ae8adcf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64307%3A%20CWE-306%20in%20Brightpick%20AI%20Brightpick%20Mission%20Control%20%2F%20Internal%20Logic%20Control&amp;severity=medium&amp;id=6917bd92ed59478372471172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62765-cwe-319-in-general-industrial-contr-068de6a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62765%3A%20CWE-319%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed59478372471183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59780-cwe-306-in-general-industrial-contr-57ea6207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59780%3A%20CWE-306%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed5947837247117f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58083-cwe-306-in-general-industrial-contr-be7e139e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58083%3A%20CWE-306%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=critical&amp;id=6917bd92ed5947837247117b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55034-cwe-521-in-general-industrial-contr-fbd7ca64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55034%3A%20CWE-521%20in%20General%20Industrial%20Controls%20Lynx%2B%20Gateway&amp;severity=high&amp;id=6917bd92ed59478372471177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7328-cwe-306-missing-authentication-for-c-1c8b50d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7328%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20DB%20Elettronica%20Telecomunicazioni%20SpA%20Screen%20SFT%20DAB%20600%2FC&amp;severity=medium&amp;id=6917b3f1290dbf2fa84d9aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13188-stack-based-buffer-overflow-in-d-li-0c93ff6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13188%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816L&amp;severity=critical&amp;id=6917ae6b6c3a21c7a18a418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13187-unprotected-storage-of-credentials--12815829</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13187%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20ICIP&amp;severity=medium&amp;id=6917aae76c3a21c7a1852eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-raas-targets-nutanix-vms-threatens-critical--dcc4d0a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20RaaS%20Targets%20Nutanix%20VMs%2C%20Threatens%20Critical%20Orgs&amp;severity=critical&amp;id=6917d672b6d0b801e4cd1d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13186-cross-site-scripting-in-bdtask-issh-6a4bc9bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13186%3A%20Cross%20Site%20Scripting%20in%20Bdtask%20Isshue%20Multi%20Store%20eCommerce%20Shopping%20Cart%20Solution&amp;severity=medium&amp;id=6917a20470bcf5e35c56472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13185-unrestricted-upload-in-bdtask-news3-563af386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13185%3A%20Unrestricted%20Upload%20in%20Bdtask%20News365&amp;severity=medium&amp;id=69179afc70bcf5e35c4ca9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-security-tools-target-growing-macos-threats-871e7dc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Security%20Tools%20Target%20Growing%20macOS%20Threats&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13182-cross-site-scripting-in-pojoin-h3bl-b8f2eb23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13182%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=6917959ad767b187e9434e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardened-containers-look-to-eliminate-common-sourc-bb50198a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hardened%20Containers%20Look%20to%20Eliminate%20Common%20Source%20of%20Vulnerabilities&amp;severity=medium&amp;id=69179208d767b187e93e2249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/150000-packages-flood-npm-registry-in-token-farmin-93d1007a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=150%2C000%20Packages%20Flood%20NPM%20Registry%20in%20Token%20Farming%20Campaign&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortinet-confirms-active-exploitation-of-critical--b24a27c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortinet%20Confirms%20Active%20Exploitation%20of%20Critical%20FortiWeb%20Vulnerability&amp;severity=critical&amp;id=69178e87d767b187e9397d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13181-cross-site-scripting-in-pojoin-h3bl-70b94899</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13181%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=69178ea9d767b187e9398dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13033-interpretation-conflict-in-red-hat--57f98143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13033%3A%20Interpretation%20Conflict%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Management%20for%20Kubernetes%202&amp;severity=high&amp;id=691785a2901ba91f32301aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13180-basic-cross-site-scripting-in-bdtas-45f5fedf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13180%3A%20Basic%20Cross%20Site%20Scripting%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=691785a2901ba91f32301afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13179-cross-site-request-forgery-in-bdtas-a0806b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13179%3A%20Cross-Site%20Request%20Forgery%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=691785a2901ba91f32301af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13178-basic-cross-site-scripting-in-bdtas-c86b933a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13178%3A%20Basic%20Cross%20Site%20Scripting%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=69177ea4901ba91f3226fd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13177-cross-site-request-forgery-in-bdtas-66db0f7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13177%3A%20Cross-Site%20Request%20Forgery%20in%20Bdtask%20SalesERP&amp;severity=medium&amp;id=69177ea4901ba91f3226fd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13174-server-side-request-forgery-in-rach-68148516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13174%3A%20Server-Side%20Request%20Forgery%20in%20rachelos%20WeRSS%20we-mp-rss&amp;severity=medium&amp;id=691779316b210bb35bbae6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-turn-json-services-into-cover-02ea040b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Turn%20JSON%20Services%20into%20Covert%20Malware%20Delivery%20Channels&amp;severity=medium&amp;id=6917bcfbed594783724528cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13172-sql-injection-in-codeastro-gym-mana-8e2e2dee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13172%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=691772da6b210bb35bb4509b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4618-cwe-316-cleartext-storage-of-sensiti-a37766ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4618%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=medium&amp;id=691772da6b210bb35bb450a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-attacks-on-cisco-asa-and-fire-1ebad68b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Attacks%20on%20Cisco%20ASA%20and%20Firepower%20Flaws&amp;severity=medium&amp;id=69176cb9db1bcd4e0c8a13c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4617-cwe-424-improper-protection-of-alter-7c47c766</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4617%3A%20CWE-424%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=low&amp;id=691772da6b210bb35bb450a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-launch-spearspecter-spy-operation--30c837e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Launch%20%E2%80%98SpearSpecter%E2%80%99%20Spy%20Operation%20on%20Defense%20%26%20Government%20Targets&amp;severity=high&amp;id=69176cb9db1bcd4e0c8a13bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-of-sites-at-risk-from-imunify360-critical-7df6edc7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Millions%20of%20sites%20at%20risk%20from%20Imunify360%20critical%20flaw%20exploit&amp;severity=critical&amp;id=69176cb9db1bcd4e0c8a13c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkoutcom-snubs-hackers-after-data-breach-to-don-eaa141e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkout.com%20snubs%20hackers%20after%20data%20breach%2C%20to%20donate%20ransom%20instead&amp;severity=high&amp;id=69176cb9db1bcd4e0c8a13b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4616-cwe-354-improper-validation-of-integ-28294681</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4616%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Palo%20Alto%20Networks%20Prisma%20Browser&amp;severity=low&amp;id=69176937db1bcd4e0c85680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13171-sql-injection-in-zzcms-26348ba4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13171%3A%20SQL%20Injection%20in%20ZZCMS&amp;severity=medium&amp;id=69176937db1bcd4e0c856804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13204-cwe-1321-improperly-controlled-modi-4f17de25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13204%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20silentmatt%20expr-eval&amp;severity=high&amp;id=691763c61dec7bb205e65289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/identity-governance-and-administration-app-prolife-6e985ead</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Identity%20Governance%20and%20Administration%2C%20App%20Proliferation%2C%20and%20the%20App%20Integration%20Chasm&amp;severity=medium&amp;id=6917d672b6d0b801e4cd1d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-state-hackers-jailbroke-claude-ai-code-for-65ac7b9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20State%20Hackers%20Jailbroke%20Claude%20AI%20Code%20for%20Automated%20Breaches&amp;severity=medium&amp;id=691757407ba9501c4c9bf36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13170-sql-injection-in-code-projects-simp-89762270</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13170%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=691753bf7ba9501c4c978717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8870-cwe-248-in-arista-networks-eos-58a7bbba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8870%3A%20CWE-248%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=691753bf7ba9501c4c97871e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64446-escalation-of-privilege-in-fortinet-4a5fe3c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64446%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=critical&amp;id=691753bf7ba9501c4c978725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13169-sql-injection-in-code-projects-simp-ff58b66a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13169%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-deepwatch-layoffs-macos-vulnerabilit-6a5fdc62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Deepwatch%20Layoffs%2C%20macOS%20Vulnerability%2C%20Amazon%20AI%20Bug%20Bounty&amp;severity=medium&amp;id=69174cb67ba9501c4c8df1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-serious-ai-bugs-exposing-meta-nvi-0b2014b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Serious%20AI%20Bugs%20Exposing%20Meta%2C%20Nvidia%2C%20and%20Microsoft%20Inference%20Frameworks&amp;severity=critical&amp;id=6917bcfbed594783724528cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13168-sql-injection-in-ury-erp-ury-2315c711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13168%3A%20SQL%20Injection%20in%20ury-erp%20ury&amp;severity=medium&amp;id=69174732ec553ac0a0d74e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-tech-firm-leak-reportedly-exposes-state-li-9d049120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Tech%20Firm%20Leak%20Reportedly%20Exposes%20State%20Linked%20Hacking%20Operations&amp;severity=medium&amp;id=691743acec553ac0a0d1e30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-launch-spearspecter-spy-operation--206abe6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Launch%20%E2%80%98SpearSpecter%E2%80%99%20Spy%20Operation%20on%20Defense%20%26%20Government%20Targets&amp;severity=medium&amp;id=6917bcfbed594783724528d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bsi-issues-guidelines-to-counter-evasion-attacks-t-97e5944b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BSI%20issues%20guidelines%20to%20counter%20evasion%20attacks%20targeting%20LLMs&amp;severity=medium&amp;id=691740d2ec553ac0a0ce3eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-warns-of-critical-auth-bypass-flaw-in-dsl-ser-54ca9afe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20warns%20of%20critical%20auth%20bypass%20flaw%20in%20DSL%20series%20routers&amp;severity=critical&amp;id=691740d2ec553ac0a0ce3ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-anthropics-ai-to-launch-automa-1718b9f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Anthropic&apos;s%20AI%20to%20Launch%20Automated%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=691740d2ec553ac0a0ce3eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomwares-fragmentation-reaches-a-breaking-point-c863a7ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware&apos;s%20Fragmentation%20Reaches%20a%20Breaking%20Point%20While%20LockBit%20Returns&amp;severity=high&amp;id=691740d2ec553ac0a0ce3ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-the-impersonation-function-gets-used-to-imper-5795925d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20The%20Impersonation%20Function%20Gets%20Used%20To%20Impersonate%20Users%20(Fortinet%20FortiWeb%20(%3F%3F)%20Auth.%20Bypass)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=69173e2b3d7715a824cb7e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21635-cwe-287-improper-authentication-in--3a61e067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21635%3A%20CWE-287%3A%20Improper%20Authentication%20in%20usememos%20memos&amp;severity=high&amp;id=69173aa53d7715a824c558f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12149-cwe-200-exposure-of-sensitive-infor-8877c0ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12149%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=691737213d7715a824c0d570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-russian-dolls-fri-nov-14th-e1045b9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20Russian%20Dolls%2C%20(Fri%2C%20Nov%2014th)&amp;severity=medium&amp;id=6917339f3d7715a824bc0f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11918-cwe-121-stack-based-buffer-overflow-a424016a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11918%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=69173170355db8f6997c8029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10018-cwe-79-improper-neutralization-of-i-0e75c6ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69172e00355db8f699772cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9982-cwe-256-plaintext-storage-of-a-passw-56cd1fb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9982%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=69172e00355db8f699772cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/checkoutcom-discloses-data-breach-after-extortion--836d4a63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Checkout.com%20Discloses%20Data%20Breach%20After%20Extortion%20Attempt&amp;severity=medium&amp;id=69172de3355db8f69977184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-post-says-nearly-10000-employees-impact-20f0b925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post%20Says%20Nearly%2010%2C000%20Employees%20Impacted%20by%20Oracle%20Hack&amp;severity=medium&amp;id=6917249fdd0733879bf84c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8855-cwe-639-authorization-bypass-through-6426f978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Optimus%20Software%20Brokerage%20Automation&amp;severity=high&amp;id=69172781355db8f6996ec1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-actors-now-utilize-json-stora-34a54520</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%20Actors%20Now%20Utilize%20JSON%20Storage%20Services%20for%20Malware%20Delivery&amp;severity=medium&amp;id=69172119dd0733879bf23f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-encryption-structure-of-yurei-ransomwa-e113e511</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Encryption%20Structure%20of%20Yurei%20Ransomware%20Go-based%20Builder&amp;severity=medium&amp;id=69172119dd0733879bf23f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcomet-rat-malware-hidden-inside-fake-bitcoin-t-6bb87cf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkComet%20RAT%20Malware%20Hidden%20Inside%20Fake%20Bitcoin%20Tool&amp;severity=medium&amp;id=69172119dd0733879bf23f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novastealer-apple-intelligence-is-leaving-a-plist--18ee82e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NovaStealer%20-%20Apple%20Intelligence%20is%20leaving%20a%20plist..%20it%20is%20legit%2C%20right%3F&amp;severity=medium&amp;id=69172119dd0733879bf23f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-group-made-244-million-in-ransom--e2870eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Group%20Made%20%24244%20Million%20in%20Ransom%20Proceeds&amp;severity=medium&amp;id=69171ac1dd0733879be8ef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11981-cwe-89-improper-neutralization-of-s-39218ca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11981%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=691714694632ec4a625824d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-detects-150000-npm-packages-in-worm-powered-d3402ad3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Detects%20150%2C000%20NPM%20Packages%20in%20Worm-Powered%20Campaign&amp;severity=medium&amp;id=69170798b0f7ea9b98308ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomwares-fragmentation-reaches-a-breaking-point-8b766e3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware&apos;s%20Fragmentation%20Reaches%20a%20Breaking%20Point%20While%20LockBit%20Returns&amp;severity=high&amp;id=6917bcfbed594783724528d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kraken-ransomware-benchmarks-systems-for-optimal-e-1833d32f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kraken%20ransomware%20benchmarks%20systems%20for%20optimal%20encryption%20choice&amp;severity=high&amp;id=6916fe7f9283ad5d6da7510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doordash-hit-by-new-data-breach-in-october-exposin-d222738a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoorDash%20hit%20by%20new%20data%20breach%20in%20October%20exposing%20user%20information&amp;severity=high&amp;id=6916fe7f9283ad5d6da750fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-anthropics-ai-to-launch-automa-47bf4626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Anthropic&apos;s%20AI%20to%20Launch%20Automated%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=6917bcfbed594783724528d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/now-patched-fortinet-fortiweb-flaw-exploited-in-at-69bf889f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Now-Patched%20Fortinet%20FortiWeb%20Flaw%20Exploited%20in%20Attacks%20to%20Create%20Admin%20Accounts&amp;severity=high&amp;id=6916fe7f9283ad5d6da75102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/imunify360-vulnerability-could-expose-millions-of--b93736ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Imunify360%20Vulnerability%20Could%20Expose%20Millions%20of%20Sites%20to%20Hacking&amp;severity=medium&amp;id=6916faec9283ad5d6da1b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/now-patched-fortinet-fortiweb-flaw-exploited-in-at-f98d4794</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Now-Patched%20Fortinet%20FortiWeb%20Flaw%20Exploited%20in%20Attacks%20to%20Create%20Admin%20Accounts&amp;severity=low&amp;id=6917bcfbed594783724528db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anthropic-says-claude-ai-powered-90-of-chinese-esp-6201508b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anthropic%20Says%20Claude%20AI%20Powered%2090%25%20of%20Chinese%20Espionage%20Campaign&amp;severity=medium&amp;id=6916e72382a5a4c8fc237df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ai-ecommerce-website-builder-works-073bf2cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20AI%20Ecommerce%20Website%20Builder%20Works%3F&amp;severity=medium&amp;id=6916e4f9a17a058cf58eb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-public-evidence-redtail-cryptominer-targets--1a0dfaae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8%20FIRST%20PUBLIC%20EVIDENCE%3A%20RedTail%20Cryptominer%20Targets%20Docker%20APIs&amp;severity=medium&amp;id=6916e17aa17a058cf5884ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-says-chinese-lighthouse-phishing-kit-disrup-90b2896e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Says%20Chinese%20%E2%80%98Lighthouse%E2%80%99%20Phishing%20Kit%20Disrupted%20Following%20Lawsuit&amp;severity=low&amp;id=6916dde7a17a058cf5828861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10686-cwe-22-improper-limitation-of-a-pat-ee083f18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10686%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Creta%20Testimonial%20Showcase&amp;severity=high&amp;id=6916cb5051947119364339be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64444-improper-neutralization-of-special--595d7110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64444%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sony%20Network%20Communications%20Inc.%20NCP-HG100%2FCellular%20model&amp;severity=high&amp;id=6916bcd463774206fb66ba21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13161-cwe-23-relative-path-traversal-in-i-52498e53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13161%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IQ%20Service%20International%20IQ-Support&amp;severity=high&amp;id=6916a1fb6e2bdc534ef61d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13160-cwe-497-exposure-of-sensitive-syste-77a7b35c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13160%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IQ%20Service%20International%20IQ-Support&amp;severity=medium&amp;id=6916a1fb6e2bdc534ef61d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hurricane-melissa-relief-scams-how-criminals-explo-f9a72fbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hurricane%20Melissa%20Relief%20Scams%3A%20How%20Criminals%20Exploit%20Disaster&amp;severity=medium&amp;id=6917145e4632ec4a62582224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/increase-in-lumma-stealer-activity-coincides-with--2a4ed981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Increase%20in%20Lumma%20Stealer%20Activity%20Coincides%20with%20Use%20of%20Adaptive%20Browser%20Fingerprinting%20Tactics&amp;severity=medium&amp;id=691717e24632ec4a625e2df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13107-inappropriate-implementation-in-goo-e7ddbcf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13107%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169be0b9f11918f9cf7257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7021-inappropriate-implementation-in-goog-9b95cdb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7021%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf612f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13178-inappropriate-implementation-in-goo-9443559a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13178%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf6123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7017-inappropriate-implementation-in-goog-89356ed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7017%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69169bdeb9f11918f9cf612b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9126-use-after-free-in-google-chrome-d926e0f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9126%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69169bdeb9f11918f9cf6133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13102-inappropriate-implementation-in-goo-4e8e6b28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13102%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf613f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11919-inappropriate-implementation-in-goo-e8a7fa0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11919%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf611b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11920-inappropriate-implementation-in-goo-cfebc9ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11920%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf611f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13983-inappropriate-implementation-in-goo-f17c1306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13983%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf6127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9479-out-of-bounds-read-in-google-chrome-3ad5425c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9479%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169be0b9f11918f9cf725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13097-inappropriate-implementation-in-goo-cf06fea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13097%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=69169bdeb9f11918f9cf613b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12904-cwe-79-improper-neutralization-of-i-6488aea7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otacke%20SNORDIAN&apos;s%20H5PxAPIkatchu&amp;severity=high&amp;id=69169bdeb9f11918f9cf6137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-friday-november-14th-2025-httpsi-f36ce8e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Friday%2C%20November%2014th%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9700%2C%20(Fri%2C%20Nov%2014th)&amp;severity=medium&amp;id=691683dd65beb25638350b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-post-data-breach-impacts-nearly-10k-emp-e891caef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post%20data%20breach%20impacts%20nearly%2010K%20employees%2C%20contractors&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-14-bd1860ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-14&amp;severity=medium&amp;id=6917c3f5ed594783724dd8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63745-na-837b18b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63745%3A%20n%2Fa&amp;severity=medium&amp;id=6917984270bcf5e35c4ad930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64084-na-35b49a20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64084%3A%20n%2Fa&amp;severity=medium&amp;id=6917959ad767b187e9434ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63744-na-003892d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63744%3A%20n%2Fa&amp;severity=medium&amp;id=6917959ad767b187e9434ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63891-na-09ad56f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63891%3A%20n%2Fa&amp;severity=high&amp;id=69179229d767b187e93e4612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63701-na-ac6ef506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63701%3A%20n%2Fa&amp;severity=medium&amp;id=69178bbdd767b187e9376a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63291-na-c5daa1a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63291%3A%20n%2Fa&amp;severity=medium&amp;id=69177ea4901ba91f3226fd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63680-na-04a6fca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63680%3A%20n%2Fa&amp;severity=high&amp;id=691779316b210bb35bbae6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54560-na-b742bf7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54560%3A%20n%2Fa&amp;severity=low&amp;id=691772da6b210bb35bb450af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54345-na-2325ec3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54345%3A%20n%2Fa&amp;severity=high&amp;id=691772da6b210bb35bb450ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63724-na-25278036</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63724%3A%20n%2Fa&amp;severity=medium&amp;id=691772da6b210bb35bb450a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54562-na-fac47a04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54562%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54561-na-fe77c7c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54561%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54348-na-43e5506c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54348%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63725-na-b0756138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63725%3A%20n%2Fa&amp;severity=medium&amp;id=69176d03db1bcd4e0c8a81d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54559-na-62a69509</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54559%3A%20n%2Fa&amp;severity=low&amp;id=69176d03db1bcd4e0c8a81cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54342-na-c0d11c67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54342%3A%20n%2Fa&amp;severity=low&amp;id=69176d03db1bcd4e0c8a81c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54346-na-e96175ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54346%3A%20n%2Fa&amp;severity=high&amp;id=69176937db1bcd4e0c856816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54343-na-d10cd226</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54343%3A%20n%2Fa&amp;severity=critical&amp;id=69176937db1bcd4e0c856812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54340-na-b9d6a5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54340%3A%20n%2Fa&amp;severity=medium&amp;id=69176937db1bcd4e0c85680e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63830-na-3d3bb314</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63830%3A%20n%2Fa&amp;severity=medium&amp;id=6917665fdb1bcd4e0c837836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54339-na-dcbbadcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54339%3A%20n%2Fa&amp;severity=critical&amp;id=6917665fdb1bcd4e0c837832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44640-na-349443a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44640%3A%20n%2Fa&amp;severity=medium&amp;id=6917574f7ba9501c4c9c2491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44639-na-27a6a514</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44639%3A%20n%2Fa&amp;severity=medium&amp;id=6917574f7ba9501c4c9c248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44630-na-9b346bc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44630%3A%20n%2Fa&amp;severity=medium&amp;id=691753bf7ba9501c4c978721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55016-na-860df5af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55016%3A%20n%2Fa&amp;severity=medium&amp;id=691753bf7ba9501c4c978713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44635-na-7cd390ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44635%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44632-na-d442ca8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44632%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44636-na-bf373124</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44636%3A%20n%2Fa&amp;severity=medium&amp;id=6917503b7ba9501c4c92bc01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44633-na-d25e8e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44633%3A%20n%2Fa&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42749-na-5839200c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42749%3A%20n%2Fa&amp;severity=medium&amp;id=69174cd17ba9501c4c8e3c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-flaw-in-imunifyav-puts-millions-of-linux-hoste-3e003ebe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20flaw%20in%20ImunifyAV%20puts%20millions%20of%20Linux-hosted%20sites%20at%20risk&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-create-4300-fake-travel-sites-to-s-ba699a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Create%204%2C300%20Fake%20Travel%20Sites%20to%20Steal%20Hotel%20Guests&apos;%20Payment%20Data&amp;severity=high&amp;id=691673f17c4d52e6fb3dfc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-terrible-horrible-no-good-very-bad-day-8561d29a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20terrible%2C%20horrible%2C%20no%20good%2C%20very%20bad%20day&amp;severity=medium&amp;id=6917145e4632ec4a62582236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64530-cwe-288-authentication-bypass-using-87832440</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64530%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20apollographql%20federation&amp;severity=high&amp;id=691672127c4d52e6fb3b2e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13131-incorrect-default-permissions-in-so-dbaaf0bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13131%3A%20Incorrect%20Default%20Permissions%20in%20Sonarr&amp;severity=high&amp;id=69165800ef0b598b9f6fad7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13130-incorrect-default-permissions-in-ra-28b4edc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13130%3A%20Incorrect%20Default%20Permissions%20in%20Radarr&amp;severity=high&amp;id=69165800ef0b598b9f6fad75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36236-cwe-22-improper-limitation-of-a-pat-697fd261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36236%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20AIX&amp;severity=high&amp;id=69165800ef0b598b9f6fad84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36250-cwe-114-process-control-in-ibm-aix-0e598a57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36250%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36096-cwe-522-insufficiently-protected-cr-b2685315</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36096%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36251-cwe-114-process-control-in-ibm-aix-9533e607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36251%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69165800ef0b598b9f6fad8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64754-cwe-601-url-redirection-to-untruste-b15ad9d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64754%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20jitsi%20jitsi-meet&amp;severity=low&amp;id=6916529405b975ba75927702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64753-cwe-863-incorrect-authorization-in--e02c1711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64753%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gristlabs%20grist-core&amp;severity=medium&amp;id=6916529405b975ba759276fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64752-cwe-918-server-side-request-forgery-254cc206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64752%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gristlabs%20grist-core&amp;severity=medium&amp;id=6916529405b975ba759276fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47913-cwe-703-improper-handling-of-except-65eac4c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47913%3A%20CWE-703%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20golang.org%2Fx%2Fcrypto%20golang.org%2Fx%2Fcrypto%2Fssh%2Fagent&amp;severity=high&amp;id=69164f1005b975ba758cef31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64745-cwe-79-improper-neutralization-of-i-31c0a50c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64745%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=low&amp;id=691642cf819e592e58c8d6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4619-cwe-754-improper-check-for-unusual-o-667a4034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4619%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=691642cf819e592e58c8d6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64726-cwe-15-external-control-of-system-o-fde71248</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64726%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20SocketDev%20firewall-release&amp;severity=high&amp;id=69163a0b6c6480bc321d2e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64709-cwe-918-server-side-request-forgery-59006f73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64709%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20baptisteArno%20typebot.io&amp;severity=critical&amp;id=691636876c6480bc3217c441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46369-cwe-377-insecure-temporary-file-in--9757af05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46369%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=high&amp;id=691636876c6480bc3217c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46370-cwe-114-process-control-in-dell-ali-79d42362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46370%3A%20CWE-114%3A%20Process%20Control%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=low&amp;id=691636876c6480bc3217c43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46362-cwe-284-improper-access-control-in--07c6187e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46362%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=medium&amp;id=691634ab6c6480bc32165eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46368-cwe-377-insecure-temporary-file-in--6e793cfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46368%3A%20CWE-377%3A%20Insecure%20Temporary%20File%20in%20Dell%20Alienware%20Command%20Center%206.x%20(AWCC)&amp;severity=medium&amp;id=6916330e6c6480bc3212e0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46367-cwe-390-detection-of-error-conditio-09c026b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46367%3A%20CWE-390%3A%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Dell%20Alienware%20Command%20Center&amp;severity=high&amp;id=691634ab6c6480bc32165ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43515-an-unauthenticated-user-on-the-same-ab07fd38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43515%3A%20An%20unauthenticated%20user%20on%20the%20same%20network%20as%20a%20Compressor%20server%20may%20be%20able%20to%20execute%20arbitrary%20code%20in%20Apple%20Compressor&amp;severity=high&amp;id=69162e9f19431ce75c5ca197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13123-sql-injection-in-amtt-hotel-broadba-50b33b05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13123%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=69162e9f19431ce75c5ca191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unleashing-the-kraken-ransomware-group-6417305b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unleashing%20the%20Kraken%20ransomware%20group&amp;severity=medium&amp;id=691639fd6c6480bc321d297a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13122-sql-injection-in-sourcecodester-pat-17ce1220</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13122%3A%20SQL%20Injection%20in%20SourceCodester%20Patients%20Waiting%20Area%20Queue%20Management%20System&amp;severity=medium&amp;id=69162015cdc01d126425d790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-fake-ai-sidebar-can-steal-your-data-kaspersk-5a22f5e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20fake%20AI%20sidebar%20can%20steal%20your%20data%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69161cb1cdc01d1264200490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-are-abusing-whatsapp-screen-sharing-to-st-ce01814a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20are%20Abusing%20WhatsApp%20Screen%20Sharing%20to%20Steal%20OTPs%20and%20Funds&amp;severity=medium&amp;id=69161c96cdc01d12641fe35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64706-cwe-639-authorization-bypass-throug-e77b565a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64706%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20baptisteArno%20typebot.io&amp;severity=medium&amp;id=69161ca8cdc01d12641febbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12785-cwe-200-exposure-of-sensitive-infor-b2650aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12785%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc%20HP%20Color%20LaserJet%20MFP%20M478-M479%20series&amp;severity=medium&amp;id=69161915cdc01d12641ad2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12784-cwe-200-exposure-of-sensitive-infor-b7bd0c32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12784%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc%20HP%20Color%20LaserJet%20MFP%20M478-M479%20series&amp;severity=medium&amp;id=69161915cdc01d12641ad2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/homeland-security-brief-november-2025-a2f73a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Homeland%20Security%20Brief%20-%20November%202025&amp;severity=medium&amp;id=691613a173934fe85f09e999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11538-binding-to-an-unrestricted-ip-addre-8ef7dacb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11538%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=medium&amp;id=69160ca773934fe85fff682b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13121-sql-injection-in-cameasy-liketea-0f8251f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13121%3A%20SQL%20Injection%20in%20cameasy%20Liketea&amp;severity=medium&amp;id=69160aa2eb29b6dceb121465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20346-improper-privilege-management-in-ci-5a9f150a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20346%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=69160aa2eb29b6dceb12146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20355-url-redirection-to-untrusted-site-o-437bcec1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20355%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20353-improper-neutralization-of-input-du-78c7c6b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20349-improper-neutralization-of-special--831cb1cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20349%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20341-improper-access-control-in-cisco-ci-8b0f6412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20341%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=high&amp;id=6916072eeb29b6dceb0d3f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orgs-move-to-sso-passkeys-to-solve-bad-password-ha-34360c9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orgs%20Move%20to%20SSO%2C%20Passkeys%20to%20Solve%20Bad%20Password%20Habits&amp;severity=medium&amp;id=6916070feb29b6dceb0d2532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-takes-down-rhadamanthys-infostea-073e4386</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Takes%20Down%20Rhadamanthys%20Infostealer%2C%20VenomRAT%20and%20Elysium%20Botnet%2C%20Seize%201025%20servers%20and%20Arrest%201&amp;severity=medium&amp;id=69160395eb29b6dceb07d9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64525-cwe-918-server-side-request-forgery-a0e0219b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64525%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=medium&amp;id=6916072eeb29b6dceb0d3f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64703-cwe-200-exposure-of-sensitive-infor-89fb686b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64703%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=6916001feb29b6dceb02d4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64511-cwe-918-server-side-request-forgery-d374dba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64511%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%201Panel-dev%20MaxKB&amp;severity=high&amp;id=6916001feb29b6dceb02d4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-vulnerability-exposed-underlying-cloud-inf-158ef921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Vulnerability%20Exposed%20Underlying%20Cloud%20Infrastructure&amp;severity=medium&amp;id=6915fe3977eaf5a849601df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64718-cwe-1321-improperly-controlled-modi-3d12c916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64718%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nodeca%20js-yaml&amp;severity=medium&amp;id=6915fe5477eaf5a849603956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13120-use-after-free-in-mruby-d35bb9d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13120%3A%20Use%20After%20Free%20in%20mruby&amp;severity=medium&amp;id=6915fe5477eaf5a84960393e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1000-servers-hit-in-law-enforcement-takedown-of-rh-7a8587be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C000%2B%20Servers%20Hit%20in%20Law%20Enforcement%20Takedown%20of%20Rhadamanthys%2C%20VenomRAT%2C%20Elysium&amp;severity=medium&amp;id=6915f73177eaf5a84954dbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62484-cwe-1333-inefficient-regular-expres-f71949ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62484%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=high&amp;id=6915f74f77eaf5a84954f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-updates-guidance-on-patching-cisco-devices-ta-a2a308ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Updates%20Guidance%20on%20Patching%20Cisco%20Devices%20Targeted%20in%20China-Linked%20Attacks&amp;severity=medium&amp;id=6915f3b777eaf5a849502757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62483-cwe-212-improper-removal-of-sensiti-7f4529d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62483%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=medium&amp;id=6915f74f77eaf5a84954f4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13119-cross-site-request-forgery-in-fabia-5f70faa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13119%3A%20Cross-Site%20Request%20Forgery%20in%20Fabian%20Ros%20Simple%20E-Banking%20System&amp;severity=medium&amp;id=6915fe5477eaf5a849603960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13118-improper-authorization-in-macrozhen-284bd7a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13118%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915fe5477eaf5a84960395a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62482-cwe-79-improper-neutralization-of-i-8b9fa58a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace&amp;severity=medium&amp;id=6915fe5577eaf5a84960398c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30662-cwe-646-reliance-on-file-name-or-ex-b8f60925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30662%3A%20CWE-646%3A%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20VDI%20Plugin%20macOS%20Universal%20installer&amp;severity=medium&amp;id=6915fe5577eaf5a849603989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30669-cwe-295-improper-certificate-valida-e5acdbb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30669%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=6915fac277eaf5a8495aabde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64741-cwe-74-improper-neutralization-of-s-767691eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64741%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20Android&amp;severity=high&amp;id=6915fe5577eaf5a84960398f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64740-cwe-347-improper-verification-of-cr-86cdaa62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64740%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20VDI%20Client&amp;severity=high&amp;id=6915ee5ff690f81e3c76b56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-state-of-ransomware-q3-2025-8062ee4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20State%20of%20Ransomware%20%E2%80%93%20Q3%202025&amp;severity=high&amp;id=6915ee61f690f81e3c76b650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13117-improper-authorization-in-macrozhen-a51caec2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13117%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64739-cwe-73-external-control-of-file-nam-674c2ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64739%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64738-cwe-73-external-control-of-file-nam-4a1808bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64738%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20macOS&amp;severity=medium&amp;id=6915ee5ff690f81e3c76b572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13116-improper-authorization-in-macrozhen-ddd4f292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13116%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e75af690f81e3c6bfb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-maverick-banking-trojans-run-rampant-in-bra-439b7b1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%2C%20Maverick%20Banking%20Trojans%20Run%20Rampant%20in%20Brazil&amp;severity=medium&amp;id=6915e559b9a712c4986ecd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13115-improper-authorization-in-macrozhen-b2c266a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13115%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e1e1b9a712c498695705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13114-improper-authorization-in-macrozhen-49006b49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13114%3A%20Improper%20Authorization%20in%20macrozheng%20mall-swarm&amp;severity=medium&amp;id=6915e1e1b9a712c4986956ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41069-cwe-639-authorization-bypass-throug-6d688542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41069%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20T-Innova%20DeporSite%20DSuite%202025&amp;severity=medium&amp;id=6915de5db9a712c4986429d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tens-of-thousands-of-malicious-npm-packages-distri-5e602bad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tens%20of%20Thousands%20of%20Malicious%20NPM%20Packages%20Distribute%20Self-Replicating%20Worm&amp;severity=medium&amp;id=6915d902f0c8e942cdf27149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chrome-extension-safery-steals-ethereum-walle-6e547bb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Chrome%20Extension%20%E2%80%9CSafery%E2%80%9D%20Steals%20Ethereum%20Wallet%20Seed%20Phrases%20Using%20Sui%20Blockchain&amp;severity=medium&amp;id=6917bcfbed594783724528e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12818-integer-overflow-or-wraparound-in-p-b40a45fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12818%3A%20Integer%20Overflow%20or%20Wraparound%20in%20PostgreSQL&amp;severity=medium&amp;id=6915d923f0c8e942cdf27495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12817-missing-authorization-in-postgresql-52bb5a53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12817%3A%20Missing%20Authorization%20in%20PostgreSQL&amp;severity=low&amp;id=6915d923f0c8e942cdf27492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12765-vulnerability-in-pgadminorg-pgadmin-00c51997</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12765%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6915d923f0c8e942cdf2748f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12764-vulnerability-in-pgadminorg-pgadmin-a24dcb53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12764%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=6915d923f0c8e942cdf2748c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12763-vulnerability-in-pgadminorg-pgadmin-ba91ddad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12763%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=medium&amp;id=6915d923f0c8e942cdf27489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12762-vulnerability-in-pgadminorg-pgadmin-c79bed57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12762%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=6915d923f0c8e942cdf27486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40681-cwe-79-improper-neutralization-of-i-a0393514</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20xCally%20Omnichannel&amp;severity=medium&amp;id=6915d923f0c8e942cdf27498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nhs-investigating-oracle-ebs-hack-claims-as-hacker-de1dbb5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NHS%20Investigating%20Oracle%20EBS%20Hack%20Claims%20as%20Hackers%20Name%20Over%2040%20Alleged%20Victims&amp;severity=medium&amp;id=6915d57ef0c8e942cded1836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-watchguard-firebox-vulnerability-exploite-9e8148c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WatchGuard%20Firebox%20Vulnerability%20Exploited%20in%20Attacks&amp;severity=critical&amp;id=6915d1faf0c8e942cde6f92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-attacks-come-faster-than-patches-why-2026-wil-61c21427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Attacks%20Come%20Faster%20Than%20Patches%3A%20Why%202026%20Will%20be%20the%20Year%20of%20Machine-Speed%20Security&amp;severity=medium&amp;id=6917bcfbed594783724528e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12377-cwe-862-missing-authorization-in-sm-f50a5a9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12377%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Gallery%20Plugin%20for%20WordPress%20%E2%80%93%20Envira%20Photo%20Gallery&amp;severity=medium&amp;id=6915c26127981db3b432b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/synnovis-confirms-patient-information-stolen-in-di-db242213</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Synnovis%20Confirms%20Patient%20Information%20Stolen%20in%20Disruptive%20Ransomware%20Attack&amp;severity=medium&amp;id=6915becf27981db3b42d0d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-dismantles-rhadamanthys-venom-ra-8d4d3091</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Dismantles%20Rhadamanthys%2C%20Venom%20RAT%2C%20and%20Elysium%20Botnet%20in%20Global%20Crackdown&amp;severity=medium&amp;id=6917bcfbed594783724528e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-67000-fake-npm-packages-flood-registry-in-wor-4b00f9b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2067%2C000%20Fake%20npm%20Packages%20Flood%20Registry%20in%20Worm-Like%20Spam%20Attack&amp;severity=high&amp;id=6915b5da6afadf441850216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-watchguard-fireware-flaw-expos-ea334abc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20WatchGuard%20Fireware%20Flaw%20Exposing%2054%2C000%20Fireboxes%20to%20No-Login%20Attacks&amp;severity=critical&amp;id=6915b5da6afadf441850215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dehashed-alternative-for-pentestersred-teamers-fe3a05ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dehashed%20alternative%20for%20pentesters%2Fred%20teamers&amp;severity=medium&amp;id=6915b6026afadf4418506925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-cisco-0-days-ai-bug-bounties-c-41e7970c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20Cisco%200-Days%2C%20AI%20Bug%20Bounties%2C%20Crypto%20Heists%2C%20State-Linked%20Leaks%20and%2020%20More%20Stories&amp;severity=medium&amp;id=6915b6e86afadf4418514a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-citrixbleed-2-vulnerabilities-exploited--7c26f5e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%2C%20CitrixBleed%202%20Vulnerabilities%20Exploited%20as%20Zero-Days%3A%20Amazon&amp;severity=critical&amp;id=6915aa13dac9b42fc37a402f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64384-missing-authorization-in-jetmonster-89e4da7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64384%3A%20Missing%20Authorization%20in%20jetmonsters%20JetFormBuilder&amp;severity=medium&amp;id=6915aa35dac9b42fc37a5aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64383-improper-neutralization-of-input-du-ffcede09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Qode%20Qi%20Blocks&amp;severity=medium&amp;id=6915aa35dac9b42fc37a5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64382-missing-authorization-in-webtoffee--0496d5d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64382%3A%20Missing%20Authorization%20in%20WebToffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64381-improper-neutralization-of-input-du-01fa1860</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64381%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64380-improper-neutralization-of-input-du-3911b3c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64380%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64379-missing-authorization-in-pluggabl-b-8c7ef4a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64379%3A%20Missing%20Authorization%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64370-missing-authorization-in-yop-yop-po-1e4ace09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64370%3A%20Missing%20Authorization%20in%20YOP%20YOP%20Poll&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64369-missing-authorization-in-codepeople-5789f6de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64369%3A%20Missing%20Authorization%20in%20codepeople%20Contact%20Form%20Email&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64292-improper-neutralization-of-input-du-397c1bed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PascalBajorat%20Analytics%20Germanized%20for%20Google%20Analytics&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64277-missing-authorization-in-quantumclo-7e18c364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64277%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64276-missing-authorization-in-ays-pro-su-4a42a3fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64276%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64275-improper-neutralization-of-input-du-4ef839f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Manager&amp;severity=medium&amp;id=6915aa34dac9b42fc37a58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64274-missing-authorization-in-wpkoitheme-39572292</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64274%3A%20Missing%20Authorization%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64271-cross-site-request-forgery-csrf-in--a8bccbed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HasThemes%20WP%20Plugin%20Manager&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64269-missing-authorization-in-edgarrojas-41a41385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64269%3A%20Missing%20Authorization%20in%20EDGARROJAS%20WooCommerce%20PDF%20Invoice%20Builder&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64267-exposure-of-sensitive-system-inform-0c0a607d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64267%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPSwings%20WooCommerce%20Ultimate%20Points%20And%20Rewards&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64265-missing-authorization-in-n-media-fr-1529ea5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64265%3A%20Missing%20Authorization%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64264-improper-neutralization-of-input-du-f3eec651</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Popup%20addon%20for%20Ninja%20Forms&amp;severity=medium&amp;id=6915aa33dac9b42fc37a58a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64263-missing-authorization-in-pluginever-696af5bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64263%3A%20Missing%20Authorization%20in%20PluginEver%20WP%20Content%20Pilot&amp;severity=medium&amp;id=6915aa33dac9b42fc37a589e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64262-cross-site-request-forgery-csrf-in--030f728d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ramon%20fincken%20Auto%20Prune%20Posts&amp;severity=medium&amp;id=6915aa33dac9b42fc37a589b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64261-missing-authorization-in-codepeople-004f3de6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64261%3A%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=medium&amp;id=6915aa33dac9b42fc37a5898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64259-missing-authorization-in-jeroen-sch-53c32c71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64259%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=medium&amp;id=6915aa33dac9b42fc37a5895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7704-cwe-121-stack-based-buffer-overflow--ba55be8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7704%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20SMCI%20SYS-111C-NR&amp;severity=medium&amp;id=6915a604dac9b42fc374b8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-delivered-through-multiple-scripts-thu-no-488dbf6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Formbook%20Delivered%20Through%20Multiple%20Scripts%2C%20(Thu%2C%20Nov%2013th)&amp;severity=medium&amp;id=69159dbff47b1f1c8b576bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11769-cwe-79-improper-neutralization-of-i-0f22f952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20WordPress%20Content%20Flipper&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11260-cwe-693-protection-mechanism-failur-9875e2e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11260%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20benmoody%20WP%20Headless%20CMS%20Framework&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10295-cwe-79-improper-neutralization-of-i-585702ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kayapati%20Angel%20%E2%80%93%20Fashion%20Model%20Agency%20WordPress%20CMS%20Theme&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8397-cwe-79-improper-neutralization-of-in-6ddcfcce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20restpack%20Save%20as%20PDF%20Button&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12015-cwe-862-missing-authorization-in-sa-e6e0beaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12015%3A%20CWE-862%20Missing%20Authorization%20in%20sanderkah%20Convert%20WebP%20%26%20AVIF%20%7C%20Quicq%20%7C%20Best%20image%20optimizer%20and%20compression%20plugin%20%7C%20Improve%20your%20Google%20Pagespeed&amp;severity=medium&amp;id=691599b6f47b1f1c8b520c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12844-cwe-502-deserialization-of-untruste-df085492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12844%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=691590f26cb36fb34fdfdf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12681-cwe-200-exposure-of-sensitive-infor-d1081c97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12681%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ronalfy%20Comment%20Edit%20Core%20%E2%80%93%20Simple%20Comment%20Editing&amp;severity=medium&amp;id=691590f26cb36fb34fdfdf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-critical-watchguard-fireware-flaw-expos-bcc7dca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Critical%20WatchGuard%20Fireware%20Flaw%20Exposing%2054%2C000%20Fireboxes%20to%20No-Login%20Attacks&amp;severity=critical&amp;id=691591c46cb36fb34fe04ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12620-cwe-89-improper-neutralization-of-s-ca82dd6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12620%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=691579339e485ce1c4d841f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-145-and-chrome-142-patch-high-severity-fla-bab22c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20145%20and%20Chrome%20142%20Patch%20High-Severity%20Flaws%20in%20Latest%20Releases&amp;severity=high&amp;id=69156c738f1a6240445ac526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-46000-fake-npm-packages-flood-registry-in-wor-4c2f0da1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2067%2C000%20Fake%20npm%20Packages%20Flood%20Registry%20in%20Worm-Like%20Spam%20Attack&amp;severity=medium&amp;id=691579379e485ce1c4d84262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12891-cwe-862-missing-authorization-in-ay-977c1f25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12891%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=691562068f1a6240444c43e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11923-cwe-269-improper-privilege-manageme-7cdf09f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11923%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=high&amp;id=691553e024a15f0eafbbc090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12536-cwe-359-exposure-of-private-persona-54ca21a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12536%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20SureForms%20%E2%80%93%20Contact%20Form%2C%20Custom%20Form%20Builder%2C%20Calculator%20%26%20More&amp;severity=medium&amp;id=691553e024a15f0eafbbc0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12733-cwe-94-improper-control-of-generati-c6e4037a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12733%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpallimport%20Import%20any%20XML%2C%20CSV%20or%20Excel%20File%20to%20WordPress&amp;severity=high&amp;id=691553e024a15f0eafbbc0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12892-cwe-862-missing-authorization-in-ay-388ec258</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12892%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=691553e024a15f0eafbbc0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12979-cwe-862-missing-authorization-in-us-7fdbf067</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12979%3A%20CWE-862%20Missing%20Authorization%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=691553e024a15f0eafbbc0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12366-cwe-639-authorization-bypass-throug-f1a60945</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12366%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=691553e024a15f0eafbbc09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12089-cwe-22-improper-limitation-of-a-pat-e4abebb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12089%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20supsysticcom%20Data%20Tables%20Generator%20by%20Supsystic&amp;severity=medium&amp;id=691553e024a15f0eafbbc097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59367-cwe-288-authentication-bypass-by-al-142847a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59367%3A%20CWE-288%3A%20Authentication%20Bypass%20by%20Alternate%20Path%20or%20Channel%20in%20ASUS%20DSL-AC51&amp;severity=critical&amp;id=691543c7edb89fd9702216e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64716-cwe-79-improper-neutralization-of-i-ffa5944e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TecharoHQ%20anubis&amp;severity=medium&amp;id=691543c7edb89fd9702216ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64710-cwe-79-improper-neutralization-of-i-547b76bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64710%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitfoundation%20bitplatform&amp;severity=medium&amp;id=691543c7edb89fd9702216e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-13-4241e92f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-13&amp;severity=medium&amp;id=691673de7c4d52e6fb3d2c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47222-na-3971523e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47222%3A%20n%2Fa&amp;severity=medium&amp;id=691649d9819e592e58d3e48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47221-na-6acab099</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47221%3A%20n%2Fa&amp;severity=medium&amp;id=691649d9819e592e58d3e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47220-na-cbfdf08e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47220%3A%20n%2Fa&amp;severity=medium&amp;id=69164657819e592e58ce3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60679-na-952ebf8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60679%3A%20n%2Fa&amp;severity=high&amp;id=691634ab6c6480bc32165ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60702-na-1b186ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60702%3A%20n%2Fa&amp;severity=medium&amp;id=691634ab6c6480bc32165ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60699-na-559ebb15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60699%3A%20n%2Fa&amp;severity=medium&amp;id=691634ab6c6480bc32165eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63406-na-3e6ebacd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63406%3A%20n%2Fa&amp;severity=high&amp;id=69162e9f19431ce75c5ca19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55810-na-60392777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55810%3A%20n%2Fa&amp;severity=medium&amp;id=69162e9f19431ce75c5ca18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60676-na-e79a1e58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60676%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c569446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60674-na-22166f30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60674%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c569440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60673-na-d59a08c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60673%3A%20n%2Fa&amp;severity=medium&amp;id=69162b1819431ce75c56943a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60675-na-e5398e38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60675%3A%20n%2Fa&amp;severity=medium&amp;id=6916279419431ce75c50bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60672-na-b6d4f89d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60672%3A%20n%2Fa&amp;severity=medium&amp;id=6916279419431ce75c50bd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60698-na-7630704f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60698%3A%20n%2Fa&amp;severity=high&amp;id=69162015cdc01d126425d79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60697-na-2106c3cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60697%3A%20n%2Fa&amp;severity=high&amp;id=69162015cdc01d126425d796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60701-na-736eafec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60701%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60700-na-0c00e123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60700%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60671-na-1f67e596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60671%3A%20n%2Fa&amp;severity=medium&amp;id=69162015cdc01d126425d77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60693-na-bc595625</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60693%3A%20n%2Fa&amp;severity=medium&amp;id=69161ca8cdc01d12641febb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60695-na-1b507137</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60695%3A%20n%2Fa&amp;severity=medium&amp;id=6916102073934fe85f046f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60694-na-a3c3b9d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60694%3A%20n%2Fa&amp;severity=high&amp;id=6916102073934fe85f046f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60689-na-354cdf1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60689%3A%20n%2Fa&amp;severity=medium&amp;id=69160e4773934fe85f031b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60696-na-b428add8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60696%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb121479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60692-na-3fff8020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60692%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb121474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60691-na-61ad5377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60691%3A%20n%2Fa&amp;severity=high&amp;id=69160aa2eb29b6dceb12146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60690-na-f5da5270</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60690%3A%20n%2Fa&amp;severity=high&amp;id=6916072eeb29b6dceb0d3f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60686-na-da6465f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60686%3A%20n%2Fa&amp;severity=medium&amp;id=6916001feb29b6dceb02d49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60685-na-a1c9c731</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60685%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60683-na-8fbc777d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60683%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a84960394c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60682-na-e7cc3df4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60682%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60688-na-4bb4c91d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60688%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60687-na-2c99f993</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60687%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a849603934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60684-na-a540ae9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60684%3A%20n%2Fa&amp;severity=medium&amp;id=6915fe5477eaf5a84960392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52186-na-5a2610a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52186%3A%20n%2Fa&amp;severity=medium&amp;id=6915fac277eaf5a8495aabda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-mpdf-with-regex-and-logic-9f99b913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20mPDF%20with%20regex%20and%20logic&amp;severity=medium&amp;id=69151a4aa47dcaa1fc2ad29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13076-sql-injection-in-code-projects-resp-4ce91d89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13076%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=6915154012715e9af4610fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13075-sql-injection-in-code-projects-resp-218ac7ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13075%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=69150e3812715e9af456ea49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrixbleed-2-wreaks-havoc-as-zero-day-bug-d3cc0456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;CitrixBleed%202&apos;%20Wreaks%20Havoc%20as%20Zero-Day%20Bug&amp;severity=critical&amp;id=6915168512715e9af461a29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64707-cwe-863-incorrect-authorization-in--6049d360</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64707%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20frappe%20lms&amp;severity=low&amp;id=69150c3912715e9af455a30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64705-cwe-200-exposure-of-sensitive-infor-4d904d7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64705%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20frappe%20lms&amp;severity=low&amp;id=69150c3912715e9af455a309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7326-cwe-400-uncontrolled-resource-consum-0790d07e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7326%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Seiko%20Epson%20Epson%20Stylus%20SX510W&amp;severity=high&amp;id=691509abe6b3e50d509f11ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64517-cwe-287-improper-authentication-in--83cfa17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64517%3A%20CWE-287%3A%20Improper%20Authentication%20in%20trifectatechfoundation%20sudo-rs&amp;severity=medium&amp;id=691509abe6b3e50d509f11d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7327-cwe-22-improper-limitation-of-a-path-ba3b1530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7327%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ozeki%20Ltd.%20Ozeki%20SMS%20Gateway&amp;severity=high&amp;id=691509abe6b3e50d509f11bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7329-cwe-306-missing-authentication-for-c-dab427df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7329%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20tinycontrol%20Lan%20Controller&amp;severity=high&amp;id=691509abe6b3e50d509f11c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64503-cwe-787-out-of-bounds-write-in-open-a071cb62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64503%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20OpenPrinting%20cups-filters&amp;severity=medium&amp;id=691509abe6b3e50d509f11cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/making-net-serialization-gadgets-by-hand-c34129fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Making%20.NET%20Serialization%20Gadgets%20by%20Hand&amp;severity=medium&amp;id=69150587e6b3e50d5099d1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-looks-to-dim-lighthouse-phishing-as-a-servi-7336eac2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Looks%20to%20Dim%20&apos;Lighthouse&apos;%20Phishing-as-a-Service%20Op&amp;severity=medium&amp;id=6915168512715e9af461a29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartapesg-campaign-uses-clickfix-page-to-push-net-2df7d469</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartApeSG%20campaign%20uses%20ClickFix%20page%20to%20push%20NetSupport%20RAT%2C%20(Wed%2C%20Nov%2012th)&amp;severity=medium&amp;id=691501f3e6b3e50d5094b0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64482-cwe-352-cross-site-request-forgery--3c809db6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64482%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=69150002e6b3e50d50936baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64345-cwe-362-concurrent-execution-using--0561429f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64345%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=6914fdef6c8e220c428f7f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mindgard-finds-sora-2-vulnerability-leaking-hidden-8d351166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mindgard%20Finds%20Sora%202%20Vulnerability%20Leaking%20Hidden%20System%20Prompt%20via%20Audio&amp;severity=medium&amp;id=6914fdd96c8e220c428f7c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33119-cwe-260-password-in-configuration-f-1fc87cf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33119%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20QRadar%20Security%20Information%20and%20Event%20Management&amp;severity=medium&amp;id=6914fdef6c8e220c428f7f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36223-cwe-644-improper-neutralization-of--c6ee5299</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36223%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13063-missing-authorization-in-dinukanava-718b8562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13063%3A%20Missing%20Authorization%20in%20DinukaNavaratna%20Dee%20Store&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64186-cwe-347-improper-verification-of-cr-39ffc2a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64186%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20evervault%20evervault-go&amp;severity=high&amp;id=6914f08607da5f027f55f1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13061-unrestricted-upload-in-itsourcecode-ee410065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13061%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Online%20Voting%20System&amp;severity=medium&amp;id=6914f08607da5f027f55f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64170-cwe-549-missing-password-field-mask-f10b3a6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64170%3A%20CWE-549%3A%20Missing%20Password%20Field%20Masking%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=6914f08607da5f027f55f1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46608-cwe-284-improper-access-control-in--8232e27c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46608%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Data%20Lakehouse&amp;severity=critical&amp;id=6914ed2507da5f027f521f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13060-sql-injection-in-sourcecodester-sur-29d5585e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13060%3A%20SQL%20Injection%20in%20SourceCodester%20Survey%20Application%20System&amp;severity=medium&amp;id=6914eb7ff3584f3d8b259f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13059-sql-injection-in-sourcecodester-alu-4890cf58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13059%3A%20SQL%20Injection%20in%20SourceCodester%20Alumni%20Management%20System&amp;severity=medium&amp;id=6914eb7ff3584f3d8b259f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46427-cwe-77-improper-neutralization-of-s-2d6dcee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46427%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=6914eb7ff3584f3d8b259f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46428-cwe-77-improper-neutralization-of-s-7ce1c2ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46428%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=6914e7f6f3584f3d8b21226f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48829-cwe-94-improper-control-of-generati-0daf5554</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48829%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=6914e7f6f3584f3d8b212272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13058-cross-site-scripting-in-soerennb-ex-6031653d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13058%3A%20Cross%20Site%20Scripting%20in%20soerennb%20eXtplorer&amp;severity=medium&amp;id=6914e278f3584f3d8b1a26ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12048-cwe-434-unrestricted-upload-of-file-463b8834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12048%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Lenovo%20Scanner%20Pro&amp;severity=high&amp;id=6914e033789e20b800798cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12047-cwe-295-improper-certificate-valida-3e86fa86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12047%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20Scanner%20Pro&amp;severity=medium&amp;id=6914e033789e20b800798cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10495-cwe-295-improper-certificate-valida-be9c50ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10495%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6914e033789e20b800798cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8485-cwe-276-incorrect-default-permission-7f087b8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8485%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20App%20Store&amp;severity=high&amp;id=6914e033789e20b800798ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8421-cwe-276-incorrect-default-permission-8ff71c21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8421%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Dock%20Manager&amp;severity=medium&amp;id=6914e033789e20b800798cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64117-cwe-352-cross-site-request-forgery--434e3e46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64117%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=6914e033789e20b800798ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27368-cwe-497-exposure-of-sensitive-syste-9e22d28e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27368%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=6914e033789e20b800798ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64099-cwe-74-improper-neutralization-of-s-357dce7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64099%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20OpenIdentityPlatform%20OpenAM&amp;severity=high&amp;id=6914d9d9789e20b800721473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61667-cwe-276-incorrect-default-permissio-bfd3e499</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61667%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20DataDog%20datadog-agent&amp;severity=high&amp;id=6914d9d9789e20b800721476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57812-cwe-125-out-of-bounds-read-in-openp-058083b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPrinting%20libcupsfilters&amp;severity=low&amp;id=6914d7b9e9dc40953bf857d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-china-based-hackers-behind-1-billion-l-6537319e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sues%20China-Based%20Hackers%20Behind%20%241%20Billion%20Lighthouse%20Phishing%20Platform&amp;severity=high&amp;id=6914d432e9dc40953bf2f673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13057-sql-injection-in-campcodes-school-f-6d5a00c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13057%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=6914d470e9dc40953bf3791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcomet-rat-resurfaces-disguised-as-bitcoin-wall-dc6222bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkComet%20RAT%20Resurfaces%20Disguised%20as%20Bitcoin%20Wallet&amp;severity=medium&amp;id=6914d432e9dc40953bf2f677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25236-cwe-204-observable-discrepancy-resp-c66f1bec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25236%3A%20CWE-204%20Observable%20Discrepancy%20Response%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=6914cdd8e9dc40953be8734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-exchange-under-imminent-threat-act-now-a5b8937c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Exchange%20&apos;Under%20Imminent%20Threat%2C&apos;%20Act%20Now&amp;severity=medium&amp;id=6914c49cf490e7dc3cca23ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20379-the-product-exposes-sensitive-infor-5e4e2ec7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20379%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6914cdd8e9dc40953be87359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20378-a-web-application-accepts-a-user-co-8b2c7716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20378%3A%20A%20web%20application%20accepts%20a%20user-controlled%20input%20that%20specifies%20a%20link%20to%20an%20external%20site%2C%20and%20uses%20that%20link%20in%20a%20Redirect.%20This%20simplifies%20phishing%20attacks.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=6914cdd8e9dc40953be87356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12649-vulnerability-in-the-canon-ttf-inte-500d6b6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12649%3A%20vulnerability%20in%20the%20Canon%20TTF%20interpreter&amp;severity=medium&amp;id=6914bf85be619665a24c28be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13042-inappropriate-implementation-in-goo-d8b09865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13042%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6914bbf8be619665a2474cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59089-allocation-of-resources-without-lim-7b726020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59089%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20latchset%20kdcproxy&amp;severity=medium&amp;id=6914bbf8be619665a2474cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2843-incorrect-privilege-assignment-in-re-e0804672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2843%3A%20Incorrect%20Privilege%20Assignment%20in%20rhobs%20observability-operator&amp;severity=high&amp;id=6914c133f490e7dc3cc5b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59088-server-side-request-forgery-ssrf-in-bac330b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59088%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20latchset%20kdcproxy&amp;severity=high&amp;id=6914c133f490e7dc3cc5b76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinas-cyber-silence-is-more-worrying-than-russias-01abac19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%E2%80%99s%20Cyber%20Silence%20Is%20More%20Worrying%20Than%20Russia%E2%80%99s%20Noise%2C%20Chief%20Cybersecurity%20Strategist%20Says&amp;severity=medium&amp;id=6914b867be619665a241f6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11797-cwe-416-use-after-free-in-autodesk--8ec171c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11797%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6914b570be619665a23e09e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11795-cwe-787-out-of-bounds-write-in-auto-c921b4c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11795%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6914b570be619665a23e09dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64293-cwe-89-improper-neutralization-of-s-f52b3fe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64293%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Golemiq%200%20Day%20Analytics&amp;severity=high&amp;id=6914afd8224357dd22f5a671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-tool-uses-smart-redirects-to-bypass-detec-6d2b39b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Tool%20Uses%20Smart%20Redirects%20to%20Bypass%20Detection&amp;severity=medium&amp;id=6914b537be619665a23d4a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-ttp-based-defenses-outperform-traditional-ioc--2685c3fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20TTP-based%20Defenses%20Outperform%20Traditional%20IoC%20Hunting&amp;severity=high&amp;id=6914ac47224357dd22f05d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11367-cwe-502-deserialization-of-untruste-64bc34ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11367%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20N-able%20N-central&amp;severity=critical&amp;id=6914ac61224357dd22f06447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11366-cwe-22-improper-limitation-of-a-pat-07866850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11366%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20N-able%20N-central&amp;severity=critical&amp;id=6914ac61224357dd22f06444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11700-cwe-611-improper-restriction-of-xml-e6e5c2c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11700%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20N-able%20N-central&amp;severity=high&amp;id=6914ac61224357dd22f0644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9316-cwe-1284-improper-validation-of-spec-71e572e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9316%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20N-able%20N-central&amp;severity=medium&amp;id=6914a8db224357dd22ebe356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-uncovers-attacks-exploited-cisco-ise-and-ci-34fe2991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Uncovers%20Attacks%20Exploited%20Cisco%20ISE%20and%20Citrix%20NetScaler%20as%20Zero-Day%20Flaws&amp;severity=critical&amp;id=6914a720917942a77a06bc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australias-spy-chief-warns-of-china-linked-threats-974228ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%E2%80%99s%20spy%20chief%20warns%20of%20China-linked%20threats%20to%20critical%20infrastructure&amp;severity=critical&amp;id=6914a720917942a77a06bc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-kakaotalk-and-google-find-2e027671</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20KakaoTalk%20and%20Google%20Find%20Hub%20in%20Android%20Spyware%20Attack&amp;severity=medium&amp;id=69149acae0dfecc86585b18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-uncovers-attacks-exploited-cisco-ise-and-ci-defa187e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Uncovers%20Attacks%20Exploited%20Cisco%20ISE%20and%20Citrix%20NetScaler%20as%20Zero-Day%20Flaws&amp;severity=critical&amp;id=69149bc7e0dfecc865864127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11567-cwe-276-incorrect-default-permissio-f8739d42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11567%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=high&amp;id=691491c4e0dfecc865795596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11566-cwe-307-improper-restriction-of-exc-5193587d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11566%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=medium&amp;id=691491c4e0dfecc865795593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11565-cwe-22-improper-limitation-of-a-pat-7ea4cccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11565%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20PowerChute%E2%84%A2%20Serial%20Shutdown&amp;severity=high&amp;id=69148b1edc194680d69bd95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-chinese-cybercriminals-behind-lighthou-98477771</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sues%20Chinese%20Cybercriminals%20Behind%20%E2%80%98Lighthouse%E2%80%99%20Phishing%20Kit&amp;severity=medium&amp;id=6914878edc194680d69590be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62876-cwe-250-execution-with-unnecessary--ed4ac18e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62876%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SUSE%20openSUSE&amp;severity=medium&amp;id=691487b6dc194680d695990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-vulnerabilities-patched-by-ivanti-an-92daa945</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Vulnerabilities%20Patched%20by%20Ivanti%20and%20Zoom&amp;severity=high&amp;id=69147b3c73eb0cdb45ee5003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-paid-out-458000-at-live-hacking-event-98d639fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Paid%20Out%20%24458%2C000%20at%20Live%20Hacking%20Event&amp;severity=medium&amp;id=6914728b7ef2915d491408e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12998-cwe-287-improper-authentication-in--d28b293e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12998%3A%20CWE-287%20Improper%20Authentication%20in%20TYPO3%20Extension%20%22Modules%22&amp;severity=high&amp;id=69146f167ef2915d490f0559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-under-siege-why-critical-infrastr-87160f7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20Under%20Siege%3A%20Why%20Critical%20Infrastructure%20Needs%20Stronger%20Security&amp;severity=critical&amp;id=6914773f7ef2915d491ab343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11994-cwe-79-improper-neutralization-of-i-40e30a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=high&amp;id=69146d167ef2915d490dc38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11454-cwe-89-improper-neutralization-of-s-3cdc0cd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11454%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20giuse%20Specific%20Content%20For%20Mobile%20%E2%80%93%20Customize%20the%20mobile%20version%20without%20redirections&amp;severity=medium&amp;id=69146d167ef2915d490dc387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/facebookmailcom-invites-exploited-to-phish-faceboo-833d457b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%40facebookmail.com%20Invites%20Exploited%20to%20Phish%20Facebook%20Business%20Users%20in%20Global%20Campaign&amp;severity=medium&amp;id=69146b987ef2915d490a7d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chipmaker-patch-tuesday-over-60-vulnerabilities-pa-4480d100</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chipmaker%20Patch%20Tuesday%3A%20Over%2060%20Vulnerabilities%20Patched%20by%20Intel&amp;severity=medium&amp;id=6914642aeaee7c6cd8a1da05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitcoin-queen-gets-11-years-in-prison-for-73-billi-9dca68cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CBitcoin%20Queen%E2%80%9D%20gets%2011%20years%20in%20prison%20for%20%247.3%20billion%20Bitcoin%20scam&amp;severity=high&amp;id=69146443eaee7c6cd8a1df7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-triofox-antivirus-feature-to-deploy--064fec21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20abuse%20Triofox%20antivirus%20feature%20to%20deploy%20remote%20access%20tools&amp;severity=high&amp;id=69146443eaee7c6cd8a1df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-fixed-a-maximum-severity-flaw-in-sql-anywhere--404d4e00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20fixed%20a%20maximum%20severity%20flaw%20in%20SQL%20Anywhere%20Monitor&amp;severity=medium&amp;id=69146443eaee7c6cd8a1df84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/synology-fixes-beestation-zero-days-demoed-at-pwn2-e3bf5817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Synology%20fixes%20BeeStation%20zero-days%20demoed%20at%20Pwn2Own%20Ireland&amp;severity=high&amp;id=691460b1eaee7c6cd89c5415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40144-4f986a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40144&amp;severity=null&amp;id=69201f2edd76cb6d6068db26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40128-42733db7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40128&amp;severity=null&amp;id=69161915cdc01d12641ad2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-infostealer-disrupted-as-cybercrimina-6a6155e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20infostealer%20disrupted%20as%20cybercriminals%20lose%20server%20access&amp;severity=high&amp;id=691460b1eaee7c6cd89c5419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-63-security-flaws-including-a-wind-296e00fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixes%2063%20Security%20Flaws%2C%20Including%20a%20Windows%20Kernel%20Zero-Day%20Under%20Active%20Attack&amp;severity=critical&amp;id=6914773f7ef2915d491ab346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37734-cwe-346-origin-validation-error-in--111ba0d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37734%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=69145d30eaee7c6cd896f657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-the-link-between-two-evolving-brazilian--60c96394</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20the%20Link%20Between%20Two%20Evolving%20Brazilian%20Banking%20Trojans&amp;severity=medium&amp;id=691457ec32a6693f6a217616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12382-cwe-22-improper-limitation-of-a-pat-4e00646e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12382%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AlgoSec%20Firewall%20Analyzer&amp;severity=high&amp;id=691457fb32a6693f6a219e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-infection-vector-using-applescripts-to-bypas-5a929635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MacOS%20Infection%20Vector%3A%20Using%20AppleScripts%20to%20bypass%20Gatekeeper&amp;severity=medium&amp;id=6914547632a6693f6a1c8ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61623-cwe-79-improper-neutralization-of-i-a8d862cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=medium&amp;id=6914547632a6693f6a1c8ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59118-cwe-434-unrestricted-upload-of-file-1421ffd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59118%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=high&amp;id=6914547632a6693f6a1c8aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11962-cwe-79-improper-neutralization-of-i-233f188e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DivvyDrive%20Information%20Technologies%20Inc.%20Digital%20Corporate%20Warehouse&amp;severity=high&amp;id=6914547632a6693f6a1c8ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64407-cwe-862-missing-authorization-in-ap-364fe2cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64407%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=6914547632a6693f6a1c8ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64406-cwe-787-out-of-bounds-write-in-apac-e25fbb6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64406%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=691450f332a6693f6a1683f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64405-cwe-862-missing-authorization-in-ap-8c73f704</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64405%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64404-cwe-862-missing-authorization-in-ap-6bbd619d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64404%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64403-cwe-862-missing-authorization-in-ap-0a2cddc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64403%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=691450f332a6693f6a1683e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64402-cwe-862-missing-authorization-in-ap-dfd30df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64402%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=medium&amp;id=691450f332a6693f6a1683e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64401-cwe-862-missing-authorization-in-ap-e28401a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64401%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OpenOffice&amp;severity=high&amp;id=69144e2332a6693f6a14571c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-launches-private-ai-compute-secure-ai-proce-dbebb724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Launches%20&apos;Private%20AI%20Compute&apos;%20%E2%80%94%20Secure%20AI%20Processing%20with%20On-Device-Level%20Privacy&amp;severity=medium&amp;id=691458e032a6693f6a225981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12903-cwe-639-authorization-bypass-throug-f2db291a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12903%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mrclayton%20Payment%20Plugins%20Braintree%20For%20WooCommerce&amp;severity=high&amp;id=6914483ad823118ac8c87d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12732-cwe-200-exposure-of-sensitive-infor-dc8d38f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12732%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=medium&amp;id=6914483ad823118ac8c87d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-vulnerabilities-addressed-by-sie-fae2a683</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Vulnerabilities%20Addressed%20by%20Siemens%2C%20Rockwell%2C%20Aveva%2C%20Schneider&amp;severity=medium&amp;id=69144422d823118ac8c2feb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13047-cwe-89-improper-neutralization-of-s-c96c5d17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13047&amp;severity=null&amp;id=691442b3d823118ac8c20f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13046-cwe-89-improper-neutralization-of-s-92a0314c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13046&amp;severity=null&amp;id=69143f7a41f31825271e58d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12872-cwe-79-improper-neutralization-of-i-a2eb0040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=medium&amp;id=69143f7a41f31825271e58da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12871-cwe-1390-weak-authentication-in-aen-ea6bb62a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12871%3A%20CWE-1390%20Weak%20Authentication%20in%20aEnrich%20a%2BHRD&amp;severity=critical&amp;id=69143bf741f3182527191a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12870-cwe-1390-weak-authentication-in-aen-ba4648c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12870%3A%20CWE-1390%20Weak%20Authentication%20in%20aEnrich%20a%2BHRD&amp;severity=critical&amp;id=69143bf741f3182527191a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12869-cwe-79-improper-neutralization-of-i-c20f7fba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20aEnrich%20a%2BHRD&amp;severity=medium&amp;id=6914387341f318252713cf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12018-cwe-79-improper-neutralization-of-i-755afbb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sourcefound%20MembershipWorks%20%E2%80%93%20Membership%2C%20Events%20%26%20Directory&amp;severity=medium&amp;id=6914387341f318252713cf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12113-cwe-862-missing-authorization-in-we-f835ba61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12113%3A%20CWE-862%20Missing%20Authorization%20in%20webtoffee%20Alt%20Text%20Generator%20AI%20%E2%80%93%20Auto%20Generate%20%26%20Bulk%20Update%20Alt%20Texts%20For%20Images&amp;severity=medium&amp;id=6914387341f318252713cf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12633-cwe-862-missing-authorization-in-st-96b3459f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12633%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20Booking%20Calendar%20%7C%20Appointment%20Booking%20%7C%20Bookit&amp;severity=high&amp;id=6914387341f318252713cf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-leak-no-problem-bypassing-aslr-with-a-rop-chain-7255e599</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Leak%2C%20No%20Problem%20-%20Bypassing%20ASLR%20with%20a%20ROP%20Chain%20to%20Gain%20RCE&amp;severity=medium&amp;id=6914387341f318252713cf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11560-cwe-79-cross-site-scripting-xss-in--6bb1e9bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11560%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Team%20Members%20Showcase&amp;severity=high&amp;id=691423e692108619e6de5f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12901-cwe-352-cross-site-request-forgery--d1cca107</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12901%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20asgaros%20Asgaros%20Forum&amp;severity=medium&amp;id=691410463f7e91646d5ffa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12833-cwe-639-authorization-bypass-throug-ce618d2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12833%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=medium&amp;id=691410463f7e91646d5ffa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12087-cwe-639-authorization-bypass-throug-7a161748</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12087%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20acowebs%20Wishlist%20and%20Save%20for%20later%20for%20Woocommerce&amp;severity=medium&amp;id=691410463f7e91646d5ffa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54983-cwe-772-missing-release-of-resource-4fd2fbab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54983%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Zscaler%20Zscaler%20Client%20Connector&amp;severity=medium&amp;id=6913fe4faf9b993b90ac5582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43205-an-app-may-be-able-to-bypass-aslr-i-e8289a95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43205%3A%20An%20app%20may%20be%20able%20to%20bypass%20ASLR%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6913d87f385fb4be458c9b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-12-ed7d1e08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-12&amp;severity=medium&amp;id=6915213aa47dcaa1fc35ec0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63645-na-80d499e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63645%3A%20n%2Fa&amp;severity=medium&amp;id=6914fdef6c8e220c428f7f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63396-na-e796c969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63396%3A%20n%2Fa&amp;severity=low&amp;id=6914f6446c8e220c4284c5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57310-na-07f36aab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57310%3A%20n%2Fa&amp;severity=high&amp;id=6914dcae789e20b800748ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56385-na-a308a841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56385%3A%20n%2Fa&amp;severity=critical&amp;id=6914dcae789e20b800748adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63929-na-0913a1c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63929%3A%20n%2Fa&amp;severity=high&amp;id=6914d9d9789e20b800721479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63679-na-7907f420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63679%3A%20n%2Fa&amp;severity=critical&amp;id=6914d9d9789e20b80072146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63927-na-40eb4cfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63927%3A%20n%2Fa&amp;severity=medium&amp;id=6914d7b9e9dc40953bf857e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60646-na-dcb90289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60646%3A%20n%2Fa&amp;severity=medium&amp;id=6914d470e9dc40953bf37921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63811-na-c3a5e037</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63811%3A%20n%2Fa&amp;severity=high&amp;id=6914cdd8e9dc40953be8735c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65001-cwe-787-out-of-bounds-write-in-fuji-97cfedd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65001%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Fujitsu%20fbiosdrv.sys&amp;severity=high&amp;id=6914cdd8e9dc40953be87352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60645-na-7f73a914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60645%3A%20n%2Fa&amp;severity=medium&amp;id=6914cdd8e9dc40953be8734a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65002-cwe-863-incorrect-authorization-in--95cbd85a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65002%3A%20CWE-863%20Incorrect%20Authorization%20in%20Fujitsu%20%2F%20Fsas%20Technologies%20iRMC&amp;severity=high&amp;id=6914cbb4f490e7dc3cd418cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52331-na-441e461c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52331%3A%20n%2Fa&amp;severity=medium&amp;id=6914c133f490e7dc3cc5b761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63419-na-bf10203e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63419%3A%20n%2Fa&amp;severity=medium&amp;id=6914bf7cbe619665a24c2606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59491-na-253f7347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59491%3A%20n%2Fa&amp;severity=medium&amp;id=6914b570be619665a23e09e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64281-na-f0518d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64281%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64280-na-36a9403c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64280%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63353-na-0a4b09fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63353%3A%20n%2Fa&amp;severity=critical&amp;id=6914b35c224357dd22fa7e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63289-na-2259ad26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63289%3A%20n%2Fa&amp;severity=critical&amp;id=6914afd8224357dd22f5a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63666-na-e05fd733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63666%3A%20n%2Fa&amp;severity=critical&amp;id=6914a3a0917942a77a010ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63667-na-8345481e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63667%3A%20n%2Fa&amp;severity=high&amp;id=69149adfe0dfecc86585ba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-29-vulnerabilities-1ba101c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%2029%20Vulnerabilities&amp;severity=medium&amp;id=6913a8b3768d655a7be2ad49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-actively-exploited-windows-kerne-a7d7d5c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Actively%20Exploited%20Windows%20Kernel%20Zero-Day&amp;severity=medium&amp;id=6913a538768d655a7bdc570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61835-integer-underflow-wrap-or-wraparoun-4bce971a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61835%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61833-out-of-bounds-read-cwe-125-in-adobe-0c3f2afd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61833%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64531-use-after-free-cwe-416-in-adobe-sub-e8ed0aae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64531%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61834-use-after-free-cwe-416-in-adobe-sub-43e653f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61834%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=6913a41ef4d5bbdab5b686ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-now-microsoft-flags-zero-day-amp-critical-ze-fee5fd63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Now%3A%20Microsoft%20Flags%20Zero-Day%20%26amp%3B%20Critical%20Zero-Click%20Bugs&amp;severity=critical&amp;id=6913dd72385fb4be4590de3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40827-cwe-427-uncontrolled-search-path-el-5d011f68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40827%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Siemens%20Software%20Center&amp;severity=high&amp;id=6913a08cf4d5bbdab5b1c76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40817-cwe-306-missing-authentication-for--2559547b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40817%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40816-cwe-306-missing-authentication-for--4b35fe39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40816%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40815-cwe-120-buffer-copy-without-checkin-cef0120a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40815%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20LOGO!%2012%2F24RCE&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40763-cwe-427-uncontrolled-search-path-el-b781678a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40763%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Altair%20Grid%20Engine&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40760-cwe-209-generation-of-error-message-f1bb3cc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40760%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Siemens%20Altair%20Grid%20Engine&amp;severity=medium&amp;id=6913a08bf4d5bbdab5b1c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40744-cwe-295-improper-certificate-valida-c42cb791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40744%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32014-cwe-732-incorrect-permission-assign-1f4b4046</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32014%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Spectrum%20Power%204&amp;severity=medium&amp;id=6913a08bf4d5bbdab5b1c734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32011-cwe-829-inclusion-of-functionality--9532e1cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32011%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32010-cwe-732-incorrect-permission-assign-04b2acf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32010%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32009-cwe-266-incorrect-privilege-assignm-ca1262db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32009%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32008-cwe-648-incorrect-use-of-privileged-4ec5bdd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32008%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Siemens%20Spectrum%20Power%204&amp;severity=high&amp;id=6913a08bf4d5bbdab5b1c728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41116-cwe-653-in-grafana-labs-grafana-dat-8cc4fcf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41116%3A%20CWE-653%20in%20Grafana%20Labs%20Grafana%20Databricks%20Datasource%20Plugin&amp;severity=low&amp;id=6913a6d6768d655a7be0441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3717-cwe-653-in-grafana-labs-grafana-snow-c766e893</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3717%3A%20CWE-653%20in%20Grafana%20Labs%20Grafana%20Snowflake%20Datasource%20Plugin&amp;severity=low&amp;id=6913a6d6768d655a7be04419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12748-allocation-of-resources-without-lim-09c56e7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12748%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=6913946b553a74ed95f8eddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-ransomware-lists-nhs-uk-as-victim-days-after--a7fe826e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cl0p%20Ransomware%20Lists%20NHS%20UK%20as%20Victim%2C%20Days%20After%20Washington%20Post%20Breach&amp;severity=high&amp;id=69139457553a74ed95f8cf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-for-november-2025-tue-nov--3fb8b7ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20for%20November%202025%2C%20(Tue%2C%20Nov%2011th)&amp;severity=critical&amp;id=691390c8553a74ed95f3a54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61843-out-of-bounds-read-cwe-125-in-adobe-03f74a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61843%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61839-out-of-bounds-read-cwe-125-in-adobe-eaa4dd99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61839%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61845-out-of-bounds-read-cwe-125-in-adobe-50dacef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61845%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61840-out-of-bounds-read-cwe-125-in-adobe-d72212a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61840%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61837-heap-based-buffer-overflow-cwe-122--8f979584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61837%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61838-heap-based-buffer-overflow-cwe-122--e6457f48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61838%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Format%20Plugins&amp;severity=high&amp;id=691388803abd2cedbf57e438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61841-out-of-bounds-read-cwe-125-in-adobe-b5d14a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61841%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61842-use-after-free-cwe-416-in-adobe-for-e86f2f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61842%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61844-out-of-bounds-read-cwe-125-in-adobe-9df87e2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61844%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Format%20Plugins&amp;severity=medium&amp;id=691388803abd2cedbf57e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-malware-maverick-hijacks-browser-sessions-c711f61c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Malware%20&apos;Maverick&apos;%20Hijacks%20Browser%20Sessions%20to%20Target%20Brazil&apos;s%20Biggest%20Banks&amp;severity=medium&amp;id=6913dcc3385fb4be45906327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61830-incorrect-authorization-cwe-863-in--e211b755</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61830%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Pass&amp;severity=high&amp;id=69138f06553a74ed95f238b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-fake-hotel-domains-used-in-massive-ph-e00a9ed9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Fake%20Hotel%20Domains%20Used%20in%20Massive%20Phishing%20Campaign&amp;severity=medium&amp;id=69138101c532f1ef717691b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30398-cwe-862-missing-authorization-in-mi-8525b819</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30398%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Nuance%20PowerScribe%20360%20version%204.0.1&amp;severity=high&amp;id=69137c4747ab3590319da053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62453-cwe-1426-improper-validation-of-gen-c5c18320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62453%3A%20CWE-1426%3A%20Improper%20Validation%20of%20Generative%20AI%20Output%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=69137c4d47ab3590319dbf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60721-cwe-270-privilege-context-switching-2ca92e32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60721%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4a47ab3590319da0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62449-cwe-22-improper-limitation-of-a-pat-b9158742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62449%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=medium&amp;id=69137c4d47ab3590319dbf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62222-cwe-77-improper-neutralization-of-s-4f6c6b06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62222%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=69137c4c47ab3590319dbefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62213-cwe-416-use-after-free-in-microsoft-15624c49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62213%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62215-cwe-362-concurrent-execution-using--7521150c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62215%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4c47ab3590319dbeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62214-cwe-77-improper-neutralization-of-s-451fb3bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62214%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=medium&amp;id=69137c4c47ab3590319dbee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62211-cwe-79-improper-neutralization-of-i-a2d38082</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62211%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(online)&amp;severity=high&amp;id=69137c4c47ab3590319dbee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59499-cwe-89-improper-neutralization-of-s-75128a85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59499%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=69137c4747ab3590319da05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62209-cwe-532-insertion-of-sensitive-info-a7be5b0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62209%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69137c4b47ab3590319dbec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62208-cwe-532-insertion-of-sensitive-info-253717a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62208%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69137c4b47ab3590319dbec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62205-cwe-416-use-after-free-in-microsoft-e7ece5c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62205%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62204-cwe-502-deserialization-of-untruste-3c39ca12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62204%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69137c4b47ab3590319dbeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62203-cwe-416-use-after-free-in-microsoft-ba882bb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62203%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62202-cwe-125-out-of-bounds-read-in-micro-4c651779</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62202%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62201-cwe-122-heap-based-buffer-overflow--f185cded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62201%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62200-cwe-822-untrusted-pointer-dereferen-f58e1ae8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62200%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4b47ab3590319dbeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60724-cwe-122-heap-based-buffer-overflow--8ba2b170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60724%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=critical&amp;id=69137c4a47ab3590319da106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60723-cwe-362-concurrent-execution-using--d608174f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60723%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69137c4a47ab3590319da103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60720-cwe-126-buffer-over-read-in-microso-b5cb5d56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60720%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4a47ab3590319da0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60718-cwe-426-untrusted-search-path-in-mi-d3103e9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60718%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4947ab3590319da0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60717-cwe-416-use-after-free-in-microsoft-5c22b32d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60717%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60716-cwe-416-use-after-free-in-microsoft-09a4fcf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60716%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60715-cwe-122-heap-based-buffer-overflow--fce55c24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60715%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60714-cwe-122-heap-based-buffer-overflow--eec556c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60714%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60713-cwe-822-untrusted-pointer-dereferen-706dbdb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60713%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=69137c4947ab3590319da0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59515-cwe-416-use-after-free-in-microsoft-70863b22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59515%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4847ab3590319da094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59514-cwe-269-improper-privilege-manageme-2f9942ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59514%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47179-cwe-284-improper-access-control-in--e51584e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47179%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=69137c4747ab3590319da056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59240-cwe-200-exposure-of-sensitive-infor-b10b8291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59240%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69137c4747ab3590319da059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62452-cwe-122-heap-based-buffer-overflow--5bb3b416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62452%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4d47ab3590319dbf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62220-cwe-122-heap-based-buffer-overflow--d16614f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62220%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Subsystem%20for%20Linux%20GUI&amp;severity=high&amp;id=69137c4c47ab3590319dbef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62219-cwe-415-double-free-in-microsoft-wi-61854063</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62219%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62218-cwe-362-concurrent-execution-using--2046682f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62218%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62217-cwe-362-concurrent-execution-using--d5272c53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62217%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4c47ab3590319dbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60722-cwe-22-improper-limitation-of-a-pat-0c579c8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60722%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20OneDrive%20for%20Android&amp;severity=medium&amp;id=69137c4a47ab3590319da100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60719-cwe-822-untrusted-pointer-dereferen-1ca968ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60719%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4a47ab3590319da0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62216-cwe-416-use-after-free-in-microsoft-72cd18bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62216%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4c47ab3590319dbeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62210-cwe-79-improper-neutralization-of-i-35018d6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62210%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(online)&amp;severity=high&amp;id=69137c4b47ab3590319dbec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62206-cwe-200-exposure-of-sensitive-infor-08dd1692</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62206%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=69137c4b47ab3590319dbebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62199-cwe-416-use-after-free-in-microsoft-562e5d11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60728-cwe-822-untrusted-pointer-dereferen-9cdfe06a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60728%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=69137c4a47ab3590319da10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60727-cwe-125-out-of-bounds-read-in-micro-b5bf22ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60727%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60726-cwe-125-out-of-bounds-read-in-micro-883f7fd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60726%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69137c4a47ab3590319da109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60710-cwe-59-improper-link-resolution-bef-960ec2ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60710%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69137c4947ab3590319da0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60709-cwe-125-out-of-bounds-read-in-micro-e44aac41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60709%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4947ab3590319da0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60708-cwe-822-untrusted-pointer-dereferen-c673c25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60708%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4947ab3590319da0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60707-cwe-416-use-after-free-in-microsoft-ec18a66e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60707%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4947ab3590319da0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60706-cwe-125-out-of-bounds-read-in-micro-61b4092d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60706%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60705-cwe-284-improper-access-control-in--49429161</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60705%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60704-cwe-325-missing-cryptographic-step--7deb0de7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60704%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60703-cwe-822-untrusted-pointer-dereferen-8d7f0efb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60703%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59513-cwe-125-out-of-bounds-read-in-micro-ad738bd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59513%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59512-cwe-284-improper-access-control-in--978ed218</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59512%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4847ab3590319da08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59511-cwe-73-external-control-of-file-nam-f7bae898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59511%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69137c4847ab3590319da088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59510-cwe-59-improper-link-resolution-bef-cdae5dd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59510%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69137c4847ab3590319da085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59509-cwe-201-insertion-of-sensitive-info-c39115d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59509%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=69137c4747ab3590319da06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59508-cwe-362-concurrent-execution-using--cf0c4445</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59508%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59507-cwe-362-concurrent-execution-using--2d6ff914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59507%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59506-cwe-362-concurrent-execution-using--ff15ce0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59506%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59505-cwe-415-double-free-in-microsoft-wi-b513b0fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59505%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69137c4747ab3590319da062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59504-cwe-122-heap-based-buffer-overflow--8277f06c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59504%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=69137c4747ab3590319da05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-cpu-spike-led-to-uncovering-a-ransomhub-rans-5e444c90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20CPU%20spike%20led%20to%20uncovering%20a%20RansomHub%20ransomware%20attack&amp;severity=high&amp;id=691378bc47ab359031985a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fantasy-hub-russian-sold-android-rat-boasts-full-d-d86dfbe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fantasy%20Hub%3A%20Russian-sold%20Android%20RAT%20boasts%20full%20device%20espionage%20as%20MaaS&amp;severity=medium&amp;id=691378bc47ab359031985a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/globallogic-warns-10000-employees-of-data-theft-af-9afa4caf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlobalLogic%20warns%2010%2C000%20employees%20of%20data%20theft%20after%20Oracle%20breach&amp;severity=high&amp;id=691378bc47ab359031985a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-fixes-hardcoded-credentials-flaw-in-sql-anywhe-870f228c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20fixes%20hardcoded%20credentials%20flaw%20in%20SQL%20Anywhere%20Monitor&amp;severity=high&amp;id=691378bc47ab359031985a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61828-out-of-bounds-write-cwe-787-in-adob-0a1b3006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61828%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab35903198925f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61827-heap-based-buffer-overflow-cwe-122--1f2b3e62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61827%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab35903198925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61826-integer-underflow-wrap-or-wraparoun-1fda6622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61826%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61829-heap-based-buffer-overflow-cwe-122--a60a22ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61829%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61836-integer-underflow-wrap-or-wraparoun-ce469a8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61836%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=691378fc47ab359031989265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61831-out-of-bounds-write-cwe-787-in-adob-39b629ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61831%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=6913708312d2ca32afd4839d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61820-heap-based-buffer-overflow-cwe-122--2f685b7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61820%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=6913708312d2ca32afd4839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61819-heap-based-buffer-overflow-cwe-122--a81afdd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61819%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd48397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61818-use-after-free-cwe-416-in-adobe-inc-9a125929</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61818%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61816-heap-based-buffer-overflow-cwe-122--3ae891ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61816%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61817-use-after-free-cwe-416-in-adobe-inc-f2746b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61817%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=6913708312d2ca32afd483b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61815-use-after-free-cwe-416-in-adobe-ind-64faab50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61815%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61814-use-after-free-cwe-416-in-adobe-ind-4fc45bc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61814%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708312d2ca32afd483aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61824-heap-based-buffer-overflow-cwe-122--febaaebc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61824%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708412d2ca32afd483f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61832-heap-based-buffer-overflow-cwe-122--63497d09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61832%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=6913708412d2ca32afd483f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35972-escalation-of-privilege-in-intel-mp-acf53ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35972%3A%20Escalation%20of%20Privilege%20in%20Intel%20MPI%20Library&amp;severity=medium&amp;id=69136b7412d2ca32afccdbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35971-denial-of-service-in-intelr-prosetw-7875367c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35971%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7412d2ca32afccdbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35968-escalation-of-privilege-in-slim-boo-9651f763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35968%3A%20Escalation%20of%20Privilege%20in%20Slim%20Bootloader&amp;severity=high&amp;id=69136b7412d2ca32afccdbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35967-denial-of-service-in-intelr-prosetw-e50f67d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35967%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35963-denial-of-service-in-intelr-prosetw-d0026c7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35963%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33029-denial-of-service-in-intelr-prosetw-b49d631f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33029%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7312d2ca32afccdba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33000-escalation-of-privilege-in-intel-qu-c3f7f00f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33000%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology&amp;severity=high&amp;id=69136b7312d2ca32afccdba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32732-denial-of-service-in-intelr-qat-win-32ff3334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32732%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32449-escalation-of-privilege-in-pri-driv-cf66d30d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32449%3A%20Escalation%20of%20Privilege%20in%20PRI%20Driver%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32446-escalation-of-privilege-in-intel-qu-1fdc9a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32446%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32091-escalation-of-privilege-in-intelr-a-38abb795</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32091%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Arc(TM)%20B-series%20GPUs&amp;severity=high&amp;id=69136b7312d2ca32afccdb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32088-denial-of-service-in-intelr-qat-win-08e42ed0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32088%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32038-escalation-of-privilege-in-intel-on-60fbd012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32038%3A%20Escalation%20of%20Privilege%20in%20Intel%20oneAPI%20DPC%2B%2BC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=69136b7312d2ca32afccdb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32037-denial-of-service-in-intelr-present-b87c2c07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32037%3A%20Denial%20of%20Service%20in%20Intel(R)%20PresentMon&amp;severity=low&amp;id=69136b7212d2ca32afccdb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32001-escalation-of-privilege-in-intelr-p-2194e05c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32001%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=medium&amp;id=69136b7212d2ca32afccdb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31948-denial-of-service-in-intelr-oneapi--822c6ab0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31948%3A%20Denial%20of%20Service%20in%20Intel(R)%20oneAPI%20Math%20Kernel%20Library&amp;severity=medium&amp;id=69136b7212d2ca32afccdb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31940-escalation-of-privilege-in-intelr-t-14e4ce0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31940%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Thread%20Director%20Visualizer%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31937-denial-of-service-in-intelr-qat-win-04c54dd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31937%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31931-escalation-of-privilege-in-instrume-3f52a2f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31931%3A%20Escalation%20of%20Privilege%20in%20Instrumentation%20and%20Tracing%20Technology%20API%20(ITT%20API)%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31647-escalation-of-privilege-in-intelr-g-3b5ecd31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31647%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31645-escalation-of-privilege-in-system-e-f675cca3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31645%3A%20Escalation%20of%20Privilege%20in%20System%20Event%20Log%20Viewer%20Utility%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31146-denial-of-service-in-intel-ethernet-b5c6db02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31146%3A%20Denial%20of%20Service%20in%20Intel%20Ethernet%20Adapter%20Complete%20Driver%20Pack%20software&amp;severity=medium&amp;id=69136b7212d2ca32afccdb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30518-escalation-of-privilege-in-intelr-p-b54ab4da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30518%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20PresentMon&amp;severity=medium&amp;id=69136b7212d2ca32afccdb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30509-escalation-of-privilege-in-intel-qu-bd0a2da1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30509%3A%20Escalation%20of%20Privilege%20in%20Intel%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30506-escalation-of-privilege-in-intel-dr-7d6cb8b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30506%3A%20Escalation%20of%20Privilege%20in%20Intel%20Driver%20and%20Support%20Assistant&amp;severity=medium&amp;id=69136b7112d2ca32afccdb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30255-denial-of-service-in-intelr-prosetw-cc867c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30255%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=69136b7112d2ca32afccdb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30185-escalation-of-privilege-denial-of-s-b3a276e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30185%3A%20Escalation%20of%20Privilege%2C%20Denial%20of%20Service%20in%20Intel%20UEFI%20reference%20platforms&amp;severity=high&amp;id=69136b7112d2ca32afccdb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30182-escalation-of-privilege-in-intelr-d-a260cdaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30182%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Distribution%20for%20Python%20software%20installers&amp;severity=medium&amp;id=69136b7112d2ca32afccdb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27725-denial-of-service-in-acat-00c9bfdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27725%3A%20Denial%20of%20Service%20in%20ACAT&amp;severity=medium&amp;id=69136b7112d2ca32afccdb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27713-escalation-of-privilege-in-intelr-q-82aef77d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27713%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=high&amp;id=69136b7112d2ca32afccdb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27712-escalation-of-privilege-in-intelr-n-1ad547b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27712%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Neural%20Compressor%20software&amp;severity=low&amp;id=69136b7112d2ca32afccdb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27711-escalation-of-privilege-in-intelr-o-82feefe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27711%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20One%20Boot%20Flash%20Update%20(Intel(R)%20OFU)%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27710-information-disclosure-in-intelr-qa-6549795c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27710%3A%20Information%20Disclosure%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7112d2ca32afccdb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27249-denial-of-service-in-gaudi-software-d11bd282</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27249%3A%20Denial%20of%20Service%20in%20Gaudi%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27246-escalation-of-privilege-in-intelr-p-0c902e99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27246%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=medium&amp;id=69136b7012d2ca32afccdb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26694-denial-of-service-in-intelr-qat-win-81832c6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26694%3A%20Denial%20of%20Service%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26405-denial-of-service-in-intelr-npu-dri-98e2aefe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26405%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=69136b7012d2ca32afccdb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26402-denial-of-service-in-intelr-npu-dri-b1326d94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26402%3A%20Denial%20of%20Service%20in%20Intel(R)%20NPU%20Drivers&amp;severity=medium&amp;id=69136b7012d2ca32afccdb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25216-denial-of-service-in-intelr-graphic-ac4c5817</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25216%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers%20and%20Intel%20LTS%20kernels&amp;severity=low&amp;id=69136b7012d2ca32afccdb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25059-escalation-of-privilege-in-intelr-o-187efdc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25059%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20One%20Boot%20Flash%20Update%20(Intel(R)%20OFU)%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24918-escalation-of-privilege-in-intelr-s-f51758fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24918%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20Configuration%20Utility%20software%20and%20Intel(R)%20Server%20Firmware%20Update%20Utility%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24863-information-disclosure-in-intelr-ci-d65844a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24863%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b7012d2ca32afccdb0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24862-escalation-of-privilege-in-intelr-c-06fd24ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24862%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b7012d2ca32afccdb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24848-escalation-of-privilege-in-intelr-c-c354dfb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24848%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24847-information-disclosure-in-intelr-ci-c9aaed07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24847%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24842-escalation-of-privilege-in-intelr-s-67f94b52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24842%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20System%20Support%20Utility&amp;severity=medium&amp;id=69136b6f12d2ca32afccda45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24838-escalation-of-privilege-in-intelr-c-dba81dfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24838%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=high&amp;id=69136b6f12d2ca32afccda42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24834-information-disclosure-in-intelr-ci-17d21ff2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24834%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24519-escalation-of-privilege-in-intelr-q-35ef233f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24519%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20Windows%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24516-information-disclosure-in-intelr-ci-63f9097b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24516%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24512-denial-of-service-in-intelr-prosetw-e1e0284f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24512%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=medium&amp;id=69136b6f12d2ca32afccda36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24491-escalation-of-privilege-in-intelr-k-d0738585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24491%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Killer(TM)%20Performance%20Suite%20software&amp;severity=medium&amp;id=69136b6f12d2ca32afccda33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24327-escalation-of-privilege-in-intelr-r-0c3503a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24327%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Rapid%20Storage%20Technology%20Application&amp;severity=medium&amp;id=69136b6f12d2ca32afccda30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24314-information-disclosure-in-intelr-ci-fed80f06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24314%3A%20Information%20Disclosure%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b6e12d2ca32afccda17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24307-escalation-of-privilege-in-intelr-c-ef5c664d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24307%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=low&amp;id=69136b6e12d2ca32afccda14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24299-escalation-of-privilege-in-intelr-c-0c4793b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24299%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=high&amp;id=69136b6e12d2ca32afccda11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22391-escalation-of-privilege-in-sigtest-27512e47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22391%3A%20Escalation%20of%20Privilege%20in%20SigTest&amp;severity=medium&amp;id=69136b6e12d2ca32afccda0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20622-information-disclosure-in-intelr-np-2bd612de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20622%3A%20Information%20Disclosure%20in%20Intel(R)%20NPU%20Drivers%20for%20Windows&amp;severity=low&amp;id=69136b6e12d2ca32afccda0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20614-escalation-of-privilege-in-intelr-c-fdeaefb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20614%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccda08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20065-escalation-of-privilege-in-display--264465b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20065%3A%20Escalation%20of%20Privilege%20in%20Display%20Virtualization%20for%20Windows%20OS%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccda05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20056-escalation-of-privilege-in-intel-vt-f4012e36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20056%3A%20Escalation%20of%20Privilege%20in%20Intel%20VTune%20Profiler&amp;severity=medium&amp;id=69136b6e12d2ca32afccda02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20050-escalation-of-privilege-in-intelr-c-8e0ae3af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20050%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20CIP%20software&amp;severity=medium&amp;id=69136b6e12d2ca32afccd9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20010-escalation-of-privilege-in-intelr-p-5e178b63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20010%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processor%20Identification%20Utility&amp;severity=high&amp;id=69136b6e12d2ca32afccd9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-pixnapping-vulnerability-and-how-to-pr-f86fdfc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20Pixnapping%20vulnerability%2C%20and%20how%20to%20protect%20your%20Android%20smartphone%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69136631f922b639ab601387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33186-cwe-798-use-of-hard-coded-credentia-acf2a764</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33186%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20NVIDIA%20AuthN%20component%20of%20NVIDIA%20AIStore&amp;severity=high&amp;id=69136629f922b639ab60127a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33185-cwe-862-missing-authorization-in-nv-0993ca5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33185%3A%20CWE-862%20Missing%20Authorization%20in%20NVIDIA%20AuthN%20component%20of%20NVIDIA%20AIStore&amp;severity=medium&amp;id=69136629f922b639ab601275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33202-cwe-121-stack-based-buffer-overflow-bb587535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33202%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=69136629f922b639ab60127f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33178-cwe-94-improper-control-of-generati-31cf333e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33178%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69136629f922b639ab601270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23361-cwe-94-improper-control-of-generati-b574a985</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23361%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=69136629f922b639ab60126b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12944-cwe-20-improper-input-validation-in-3dd765ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12944%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20DGN2200v4&amp;severity=medium&amp;id=69136629f922b639ab601267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12943-cwe-295-improper-certificate-valida-ab25bf56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12943%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20NETGEAR%20RAX30&amp;severity=medium&amp;id=69136629f922b639ab601262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12942-cwe-20-improper-input-validation-in-712ef338</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12942%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NETGEAR%20R6260&amp;severity=medium&amp;id=69136629f922b639ab60125d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12940-cwe-532-insertion-of-sensitive-info-0c2878b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12940%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NETGEAR%20WAX610&amp;severity=low&amp;id=691362a4f922b639ab5baf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23357-cwe-94-improper-control-of-generati-028ccdb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23357%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=691362a4f922b639ab5baf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13032-cwe-367-time-of-check-time-of-use-t-193bf47e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13032%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Avast%20(Free%2FPremiium%2FUltimeat)%20Antivirus&amp;severity=critical&amp;id=691362a4f922b639ab5baf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10905-cwe-693-protection-mechanism-failur-c43ff941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10905%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Avast%20Free%20Antivirus&amp;severity=medium&amp;id=69135f1ef922b639ab566fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13027-vulnerability-in-mozilla-firefox-993e9be1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13027%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d98f922b639ab555fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13020-vulnerability-in-mozilla-firefox-9ceb3403</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13020%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13019-vulnerability-in-mozilla-firefox-50a90c9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13019%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13018-vulnerability-in-mozilla-firefox-246cf439</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13018%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13017-vulnerability-in-mozilla-firefox-25d14d7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13017%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13026-vulnerability-in-mozilla-firefox-81f48656</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13026%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13025-vulnerability-in-mozilla-firefox-086538a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13025%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d98f922b639ab555fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13024-vulnerability-in-mozilla-firefox-be9a6062</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13024%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13016-vulnerability-in-mozilla-firefox-467f579b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13016%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13023-vulnerability-in-mozilla-firefox-4fe99db0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13023%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13022-vulnerability-in-mozilla-firefox-301dd4e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13022%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d98f922b639ab555fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13021-vulnerability-in-mozilla-firefox-29039dd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13021%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69135d97f922b639ab555f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13015-vulnerability-in-mozilla-firefox-17595576</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13015%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=low&amp;id=69135d97f922b639ab555f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13014-vulnerability-in-mozilla-firefox-8ec798d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13014%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13013-vulnerability-in-mozilla-firefox-fbf5119f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13013%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69135d97f922b639ab555f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13012-vulnerability-in-mozilla-firefox-e3142bab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13012%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69135d97f922b639ab555f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-is-back-using-a-new-font-trick-to-hide--237ab899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GootLoader%20Is%20Back%2C%20Using%20a%20New%20Font%20Trick%20to%20Hide%20Malware%20on%20WordPress%20Sites&amp;severity=medium&amp;id=69135a23b36faa5b6c0e4fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9408-privilege-context-switching-error-in-42aa32aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9408%3A%20Privilege%20Context%20Switching%20Error%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10918-cwe-276-incorrect-default-permissio-0e26dc9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10918%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandparents-to-c-suite-elder-fraud-reveals-gaps-i-33c8c305</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandparents%20to%20C-Suite%3A%20Elder%20Fraud%20Reveals%20Gaps%20in%20Human-Centered%20Cybersecurity&amp;severity=medium&amp;id=6913dd72385fb4be4590de3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-triofox-vulnerability-exploited-in-the-wi-aed46803</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Triofox%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=691356a3b36faa5b6c099ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64773-cwe-362-in-jetbrains-youtrack-b7904d44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64773%3A%20CWE-362%20in%20JetBrains%20YouTrack&amp;severity=low&amp;id=691356bfb36faa5b6c09d257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11959-cwe-552-files-or-directories-access-7e61ecfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11959%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Premierturk%20Information%20Technologies%20Inc.%20Excavation%20Management%20Information%20System&amp;severity=high&amp;id=6913479c9f8eafcddaf75f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-firefox-protections-halve-the-number-of-tracka-3b363dbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Firefox%20Protections%20Halve%20the%20Number%20of%20Trackable%20Users&amp;severity=medium&amp;id=691342d1e55e7c79b8cee282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-in-ai-browsers-6d354b57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20Injection%20in%20AI%20Browsers&amp;severity=medium&amp;id=691342e6e55e7c79b8cee9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11697-cwe-200-exposure-of-sensitive-infor-7a27a34a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11697%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Rockwell%20Automation%20Studio%205000%20%C2%AE%20Simulation%20Interface&amp;severity=high&amp;id=691342f4e55e7c79b8cef9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11696-cwe-22-improper-limitation-of-a-pat-ab878ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11696%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rockwell%20Automation%20Studio%205000%C2%AE%20Simulation%20Interface%E2%84%A2&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12101-cwe-79-improper-neutralization-of-i-8a911c53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetScaler%20ADC&amp;severity=medium&amp;id=69133f64e55e7c79b8ca8feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11862-cwe-863-incorrect-authorization-in--920d5051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11862%3A%20CWE-863%20Incorrect%20Authorization%20in%20Rockwell%20Automation%20Verve%20Asset%20Manager&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-flaws-in-sql-anywhere-monitor-c1bc148e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Flaws%20in%20SQL%20Anywhere%20Monitor%2C%20Solution%20Manager&amp;severity=critical&amp;id=69133f49e55e7c79b8ca7d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11085-cwe-116-improper-encoding-or-escapi-3bbd7e67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11085%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69133f64e55e7c79b8ca8ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9227-cwe-79-improper-neutralization-of-in-30e1308c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20OpManager&amp;severity=medium&amp;id=69133f64e55e7c79b8ca8ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11084-cwe-1390-weak-authentication-in-roc-7958b431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11084%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20DataMosaix%E2%84%A2%20Private%20Cloud&amp;severity=high&amp;id=69133f64e55e7c79b8ca8fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cmmc-live-pentagon-demands-verified-cybersecurity--51d5d936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CMMC%20Live%3A%20Pentagon%20Demands%20Verified%20Cybersecurity%20From%20Contractors&amp;severity=medium&amp;id=69133bc5e55e7c79b8c58d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9223-cwe-77-improper-neutralization-of-sp-90963a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9223%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=high&amp;id=691346259f8eafcddaf6083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8324-cwe-89-improper-neutralization-of-sp-aebfbfd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8324%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20Analytics%20Plus&amp;severity=critical&amp;id=6913371a85a5d1234f7f3b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10161-cwe-307-improper-restriction-of-exc-e303164f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10161%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Turkguven%20Software%20Technologies%20Inc.%20Perfektive&amp;severity=high&amp;id=6913339a85a5d1234f7ad4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/have-i-been-pwned-adds-196b-accounts-from-synthien-2c7c029f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Have%20I%20Been%20Pwned%20Adds%201.96B%20Accounts%20From%20Synthient%20Credential%20Data&amp;severity=medium&amp;id=6913301085a5d1234f759295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41106-cwe-79-improper-neutralization-of-i-05c121be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41105-cwe-79-improper-neutralization-of-i-2d5c267a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41105%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41104-cwe-79-improper-neutralization-of-i-0d495bae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41103-cwe-79-improper-neutralization-of-i-119f1929</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132c9785a5d1234f7108ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whisper-leak-llm-side-channel-attack-infers-user-p-b2ba1dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Whisper%20Leak%E2%80%99%20LLM%20Side-Channel%20Attack%20Infers%20User%20Prompt%20Topics&amp;severity=medium&amp;id=69132b29f1a0d9a2f13727d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisos-expert-guide-to-ai-supply-chain-attacks-66b9ca98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO&apos;s%20Expert%20Guide%20To%20AI%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=691327a3f1a0d9a2f132acff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41102-cwe-79-improper-neutralization-of-i-5f5ee28c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41102%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=691327c1f1a0d9a2f132ccc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detect-malicious-npm-package-targeting-d00e275b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Npm%20Package%20Targeting%20GitHub-Owned%20Repositories%20Flagged%20as%20Red%20Team%20Exercise&amp;severity=medium&amp;id=6913dcc3385fb4be4590632a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-npm-package-with-206k-downloads-targeted-gith-6efb88cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20NPM%20Package%20With%20206K%20Downloads%20Targeted%20GitHub%20for%20Credentials&amp;severity=medium&amp;id=69132428f1a0d9a2f12d61c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41101-cwe-79-improper-neutralization-of-i-35f70b4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41101%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fairsketch%20RISE%20CRM%20Framework&amp;severity=medium&amp;id=69132437f1a0d9a2f12d675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11960-cwe-79-improper-neutralization-of-i-75833a6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Aryom%20Software%20High%20Technology%20Systems%20Inc.%20KVKNET&amp;severity=medium&amp;id=69132437f1a0d9a2f12d675a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-trojan-fantasy-hub-malware-service-turns-t-63bbcc00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Trojan%20&apos;Fantasy%20Hub&apos;%20Malware%20Service%20Turns%20Telegram%20Into%20a%20Hub%20for%20Hackers&amp;severity=low&amp;id=6913dcc3385fb4be4590632d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-apt-takes-over-south-korean-androids-abuse-b4ac8db2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20APT%20Takes%20Over%20South%20Korean%20Androids%2C%20Abuses%20KakaoTalk&amp;severity=medium&amp;id=6913dd72385fb4be4590de41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12846-cwe-434-unrestricted-upload-of-file-4ecae2aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12846%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=high&amp;id=69131c131c700d145d0c4ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12788-cwe-602-client-side-enforcement-of--228956de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12788%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20themefic%20Hydra%20Booking%20%E2%80%94%20Appointment%20Scheduling%20%26%20Booking%20Calendar&amp;severity=medium&amp;id=69131c131c700d145d0c4ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12953-cwe-862-missing-authorization-in-te-4f88e0b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12953%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20AI-Powered%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=69131c131c700d145d0c4cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12787-cwe-330-use-of-insufficiently-rando-76cf99be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12787%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20themefic%20Hydra%20Booking%20%E2%80%94%20Appointment%20Scheduling%20%26%20Booking%20Calendar&amp;severity=medium&amp;id=69131c131c700d145d0c4ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12539-cwe-922-insecure-storage-of-sensiti-c9e639ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12539%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20leopardhost%20TNC%20Toolbox%3A%20Web%20Performance&amp;severity=critical&amp;id=69131c131c700d145d0c4ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantum-route-redirect-phaas-targets-microsoft-365-1432e29e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantum%20Route%20Redirect%20PhaaS%20targets%20Microsoft%20365%20users%20worldwide&amp;severity=high&amp;id=691318691c700d145d067ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt37-hackers-abuse-google-find-hub-in-android-dat-da1c45da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT37%20hackers%20abuse%20Google%20Find%20Hub%20in%20Android%20data-wiping%20attacks&amp;severity=high&amp;id=691318691c700d145d067ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-triofox-bug-exploited-to-run-malicious-pa-7c49b93a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Triofox%20bug%20exploited%20to%20run%20malicious%20payloads%20via%20AV%20configuration&amp;severity=critical&amp;id=691318691c700d145d067de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-finds-open-weight-ai-models-easy-to-exploit--ae411e66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Finds%20Open-Weight%20AI%20Models%20Easy%20to%20Exploit%20in%20Long%20Conversations&amp;severity=high&amp;id=691313ce4e59013eb31f4e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7633-cwe-79-improper-neutralization-of-in-4e693893</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7632-cwe-79-improper-neutralization-of-in-1579055e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7430-cwe-79-improper-neutralization-of-in-f7897222</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=691313db4e59013eb31f4ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5317-cwe-862-missing-authorization-in-bit-6a10435c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5317%3A%20CWE-862%20Missing%20Authorization%20in%20Bitdefender%20Endpoint%20Security%20Tools%20for%20Mac&amp;severity=medium&amp;id=6912f0f7b7bc43ed74712fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7429-cwe-79-improper-neutralization-of-in-795f5f1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=6912f40ef9e2bb16257bdc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9055-cwe-250-execution-with-unnecessary-p-a09c255e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9055%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e86ab7bc43ed74661873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8998-cwe-73-external-control-of-file-name-9e7e8b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8998%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=low&amp;id=6912e86ab7bc43ed74661870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9524-cwe-1287-improper-validation-of-spec-b708b828</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9524%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e86ab7bc43ed74661876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10714-cwe-428-unquoted-search-path-or-ele-7a627b50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10714%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Axis%20Communications%20AB%20AXIS%20Optimizer&amp;severity=high&amp;id=6912e555a26e42951ce84f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8108-cwe-1287-improper-validation-of-spec-d89921ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8108%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6779-cwe-732-incorrect-permission-assignm-34380ef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6779%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6571-cwe-522-insufficiently-protected-cre-bda7216c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6571%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5452-cwe-214-invocation-of-process-using--968933e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5452%3A%20CWE-214%3A%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6298-cwe-1287-improper-validation-of-spec-2576a712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6298%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912e1d7a26e42951ce3f067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5718-cwe-59-improper-link-resolution-befo-176fe35a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5718%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5454-cwe-35-path-traversal-in-axis-commun-a248cae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5454%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4645-cwe-1287-improper-validation-of-spec-954220fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4645%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=6912de4da26e42951cdeabcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11855-cwe-269-improper-privilege-manageme-0beac750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11855%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20age-restriction&amp;severity=high&amp;id=6912d40cdcb51f5ee464bb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11307-cwe-79-cross-site-scripting-xss-in--c7b3f6ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11307%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=high&amp;id=6912d40cdcb51f5ee464bb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11237-cwe-862-missing-authorization-in-ma-f06be6cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11237%3A%20CWE-862%20Missing%20Authorization%20in%20Make%20Email%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6912d40cdcb51f5ee464bb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12667-cwe-79-improper-neutralization-of-i-a14445da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paul1999%20GitHub%20Gist%20Shortcode%20Plugin&amp;severity=medium&amp;id=6912b13314bc3e00ba783db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12651-cwe-79-improper-neutralization-of-i-e10f4d38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eggemplo%20Live%20Photos%20on%20WordPress&amp;severity=medium&amp;id=6912b13314bc3e00ba783d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12019-cwe-79-improper-neutralization-of-i-2553830f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mervinpraison%20Featured%20Image&amp;severity=medium&amp;id=6912b13014bc3e00ba783d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11521-cwe-285-improper-authorization-in-a-4d7ee02e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11521%3A%20CWE-285%20Improper%20Authorization%20in%20astrasecuritysuite%20Astra%20Security%20Suite%20%E2%80%93%20Firewall%20%26%20Malware%20Scan&amp;severity=high&amp;id=6912b12e14bc3e00ba783ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11999-cwe-862-missing-authorization-in-kr-0955a644</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11999%3A%20CWE-862%20Missing%20Authorization%20in%20krishaweb%20Add%20Multiple%20Marker&amp;severity=medium&amp;id=6912b13014bc3e00ba783d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12662-cwe-79-improper-neutralization-of-i-7422d699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrico%20Coon%20Google%20Maps&amp;severity=medium&amp;id=6912b13314bc3e00ba783da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11129-cwe-79-improper-neutralization-of-i-796a5764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mheob%20Include%20Fussball.de%20Widgets&amp;severity=medium&amp;id=6912b12e14bc3e00ba783c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11986-cwe-306-missing-authentication-for--70b08077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11986%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20odude%20Crypto%20Tool&amp;severity=medium&amp;id=6912b13014bc3e00ba783d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12126-cwe-639-authorization-bypass-throug-29a2a5b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12126%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ryanmoyer%20The%20Total%20Book%20Project&amp;severity=medium&amp;id=6912b13114bc3e00ba783d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12637-cwe-94-improper-control-of-generati-788a5052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12637%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20koopersmith%20Elastic%20Theme%20Editor&amp;severity=high&amp;id=6912b13314bc3e00ba783d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11882-cwe-79-improper-neutralization-of-i-2928c118</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ethoseo%20Simple%20Donate&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12663-cwe-79-improper-neutralization-of-i-9fd0cbdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jahed%20Jeba%20Cute%20forkit&amp;severity=medium&amp;id=6912b13314bc3e00ba783dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11860-cwe-79-improper-neutralization-of-i-cb5aa992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caselock%20Twitter%20Feed&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11821-cwe-79-improper-neutralization-of-i-2ef4243d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elvismdev%20Woocommerce%20%E2%80%93%20Products%20By%20Custom%20Tax&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12668-cwe-79-improper-neutralization-of-i-f35def4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sitedin%20WP%20Count%20Down%20Timer&amp;severity=medium&amp;id=6912b13414bc3e00ba783dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12658-cwe-79-improper-neutralization-of-i-9c5bd4f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mmdeveloper%20Preload%20Current%20Images&amp;severity=medium&amp;id=6912b13314bc3e00ba783da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11859-cwe-79-improper-neutralization-of-i-553df0ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coenjacobs%20Paypal%20Donation%20Shortcode&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11532-cwe-639-authorization-bypass-throug-8d09d9bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11532%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20softivus%20Wisly&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12631-cwe-79-improper-neutralization-of-i-73426b32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spokanetony%20Squirrels%20Auto%20Inventory&amp;severity=medium&amp;id=6912b13114bc3e00ba783d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12665-cwe-862-missing-authorization-in-lo-af41e0ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12665%3A%20CWE-862%20Missing%20Authorization%20in%20lovelightplugins%20Ninja%20Countdown%20%7C%20Fastest%20Countdown%20Builder&amp;severity=medium&amp;id=6912b13314bc3e00ba783db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12671-cwe-79-improper-neutralization-of-i-6b8cb69f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrx3k1%20WP-Iconics&amp;severity=medium&amp;id=6912b13414bc3e00ba783dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11869-cwe-79-improper-neutralization-of-i-dff98443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simonpedge%20Precise%20Columns&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12526-cwe-862-missing-authorization-in-mi-5a0f36ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12526%3A%20CWE-862%20Missing%20Authorization%20in%20michielve%20Private%20Google%20Calendars&amp;severity=medium&amp;id=6912b13114bc3e00ba783d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11828-cwe-79-improper-neutralization-of-i-ab1206c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11828%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pubudu-malalasekara%20Magazine%20Companion&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12753-cwe-80-improper-neutralization-of-s-20c15c5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12753%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sagortouch%20Chart%20Expert&amp;severity=medium&amp;id=6912b13414bc3e00ba783dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11170-cwe-434-unrestricted-upload-of-file-3da2ad24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11170%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kddiwebcommunications%20WP%E7%A7%BB%E8%A1%8C%E5%B0%82%E7%94%A8%E3%83%97%E3%83%A9%E3%82%B0%E3%82%A4%E3%83%B3%20for%20CPI&amp;severity=critical&amp;id=6912b12e14bc3e00ba783c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12711-cwe-79-improper-neutralization-of-i-7497e289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pritenhshah%20Share%20to%20Google%20Classroom&amp;severity=medium&amp;id=6912b13414bc3e00ba783dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12813-cwe-94-improper-control-of-generati-e892d4a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12813%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20strix-bubol5%20Holiday%20class%20post%20calendar&amp;severity=critical&amp;id=6912b13414bc3e00ba783de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11457-cwe-269-improper-privilege-manageme-ee3667f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11457%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20easycommerce%20EasyCommerce%20%E2%80%93%20AI-Powered%2C%20Fast%20%26%20Beautiful%20WordPress%20Ecommerce%20Plugin&amp;severity=critical&amp;id=6912b12e14bc3e00ba783ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11856-cwe-79-improper-neutralization-of-i-a0ea12e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eventbee%20Eventbee%20Ticketing%20Widget&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12590-cwe-352-cross-site-request-forgery--ee90bfa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12590%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andreaferracani%20YSlider&amp;severity=medium&amp;id=6912b13114bc3e00ba783d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12021-cwe-79-improper-neutralization-of-i-c0cdd41e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hectavex%20WP-OAuth&amp;severity=medium&amp;id=6912b13114bc3e00ba783d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12588-cwe-352-cross-site-request-forgery--e7b305c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20behzadrohizadeh%20USB%20Qr%20Code%20Scanner%20For%20Woocommerce&amp;severity=medium&amp;id=6912b13114bc3e00ba783d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12020-cwe-79-improper-neutralization-of-i-eec81234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanwei_doublethedonation%20Double%20the%20Donation%20%E2%80%93%20A%20workplace%20giving%20tool&amp;severity=medium&amp;id=6912b13114bc3e00ba783d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12132-cwe-352-cross-site-request-forgery--234920f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12132%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20larsactionhero%20WP%20Custom%20Admin%20Login%20Page%20Logo&amp;severity=medium&amp;id=6912b13114bc3e00ba783d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12589-cwe-352-cross-site-request-forgery--11392215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12589%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20baronen%20WP-Walla&amp;severity=medium&amp;id=6912b13114bc3e00ba783d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12672-cwe-79-improper-neutralization-of-i-0d8ed3ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuvuscripts%20Flickr%20Show&amp;severity=medium&amp;id=6912b13414bc3e00ba783dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11997-cwe-200-exposure-of-sensitive-infor-96fa7b4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11997%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ngothoai%20Document%20Pro%20Elementor%20%E2%80%93%20Documentation%20%26%20Knowledge%20Base&amp;severity=medium&amp;id=6912b13014bc3e00ba783d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11451-cwe-73-external-control-of-file-nam-2bb0b851</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11451%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20miunosoft%20Auto%20Amazon%20Links%20%E2%80%93%20Amazon%20Associates%20Affiliate%20Plugin&amp;severity=high&amp;id=6912b12e14bc3e00ba783c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12010-cwe-200-exposure-of-sensitive-infor-dc49f3b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12010%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpkube%20Authors%20List&amp;severity=medium&amp;id=6912b13014bc3e00ba783d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12754-cwe-79-improper-neutralization-of-i-27a5648d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rampantlogic%20Geopost&amp;severity=medium&amp;id=6912b13414bc3e00ba783ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11805-cwe-79-improper-neutralization-of-i-e344ea1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20doytch%20Skip%20to%20Timestamp&amp;severity=medium&amp;id=6912b12e14bc3e00ba783caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12644-cwe-79-improper-neutralization-of-i-85a0557c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcox%20Nonaki%20%E2%80%93%20Drag%20and%20Drop%20Email%20Template%20builder%20and%20Newsletter%20plugin%20for%20WordPress&amp;severity=medium&amp;id=6912b13314bc3e00ba783d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11886-cwe-352-cross-site-request-forgery--d558d203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11886%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codethislab%20CTL%20Arcade%20Lite&amp;severity=medium&amp;id=6912b13014bc3e00ba783d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12632-cwe-79-improper-neutralization-of-i-c7743531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loveless%20RandomQuotr&amp;severity=medium&amp;id=6912b13314bc3e00ba783d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12538-cwe-79-improper-neutralization-of-i-0ff1ff8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iworks%20Fleet%20Manager&amp;severity=medium&amp;id=6912b13114bc3e00ba783d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12880-cwe-79-improper-neutralization-of-i-e805a5a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobayer534%20Progress%20Bar%20Blocks%20for%20Gutenberg&amp;severity=medium&amp;id=6912b13414bc3e00ba783de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11996-cwe-862-missing-authorization-in-to-3a4eeacc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11996%3A%20CWE-862%20Missing%20Authorization%20in%20toastwebsites%20Find%20Unused%20Images&amp;severity=medium&amp;id=6912b13014bc3e00ba783d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11863-cwe-79-improper-neutralization-of-i-903b961a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mindstien%20My%20Geo%20Posts%20Free&amp;severity=medium&amp;id=6912b12f14bc3e00ba783cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11988-cwe-862-missing-authorization-in-od-78285aee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11988%3A%20CWE-862%20Missing%20Authorization%20in%20odude%20Crypto%20Tool&amp;severity=medium&amp;id=6912b13014bc3e00ba783d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11829-cwe-79-improper-neutralization-of-i-881075f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11829%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20five9%20Five9%20Live%20Chat&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12652-cwe-79-improper-neutralization-of-i-e31ba7f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oscaruribe%20Ungapped%20Widgets&amp;severity=medium&amp;id=6912b13314bc3e00ba783d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11168-cwe-269-improper-privilege-manageme-2ed49b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11168%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20mvirik%20Mementor%20Core&amp;severity=high&amp;id=6912b12e14bc3e00ba783c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11873-cwe-79-improper-neutralization-of-i-84d036eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eflyjason%20WP%20BBCode&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11874-cwe-80-improper-neutralization-of-s-790b7b8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11874%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mitegvg%20Slippy%20Slider%20%E2%80%93%20Responsive%20Touch%20Navigation%20Slider&amp;severity=medium&amp;id=6912b12f14bc3e00ba783ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11891-cwe-538-insertion-of-sensitive-info-86169ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11891%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20shelfplanner%20Shelf%20Planner&amp;severity=medium&amp;id=6912b13014bc3e00ba783d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11822-cwe-79-improper-neutralization-of-i-613c3be8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virtus-designs%20WP%20Bootstrap%20Tabs&amp;severity=medium&amp;id=6912b12e14bc3e00ba783cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11894-cwe-862-missing-authorization-in-sh-b3a4ca1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11894%3A%20CWE-862%20Missing%20Authorization%20in%20shelfplanner%20Shelf%20Planner&amp;severity=medium&amp;id=6912b13014bc3e00ba783d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31719-cwe-665-improper-initialization-in--1b9f65f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31719%3A%20cwe-665%20Improper%20Initialization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42940-cwe-787-out-of-bounds-write-in-saps-cfdc8073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42940%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAP%20CommonCryptoLib&amp;severity=high&amp;id=6912870814bc3e00ba6f3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42924-cwe-601-url-redirection-to-untruste-96990b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42924%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20S%2F4HANA%20landscape%20(SAP%20E-Recruiting%20BSP)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42919-cwe-22-improper-limitation-of-a-pat-1892d8de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42919%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42899-cwe-862-missing-authorization-in-sa-2212ff5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42899%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S4CORE%20(Manage%20Journal%20Entries)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42897-cwe-522-insufficiently-protected-cr-f30abd12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42897%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=medium&amp;id=6912870814bc3e00ba6f3c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42895-cwe-94-improper-control-of-generati-a4993b7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42895%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20HANA%20JDBC%20Client&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42894-cwe-22-improper-limitation-of-a-pat-dfc27f7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42894%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42893-cwe-601-url-redirection-to-untruste-55e7bd9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42893%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42892-cwe-78-improper-neutralization-of-s-9e315964</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42892%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870814bc3e00ba6f3bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42890-cwe-798-use-of-hard-coded-credentia-91b98cfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42890%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20SAP_SE%20SQL%20Anywhere%20Monitor%20(Non-Gui)&amp;severity=critical&amp;id=6912870714bc3e00ba6f3be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42889-cwe-89-improper-neutralization-of-s-5fbdc362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42889%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20SAP_SE%20SAP%20Starter%20Solution%20(PL%20SAFT)&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42888-cwe-316-cleartext-storage-of-sensit-99b28eb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42888%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42887-cwe-94-improper-control-of-generati-7ff873ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42887%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Solution%20Manager&amp;severity=critical&amp;id=6912870714bc3e00ba6f3bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42886-cwe-79-improper-neutralization-of-i-668a6ab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42886%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Connector&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42885-cwe-306-missing-authentication-for--573a4d6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42885%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20HANA%202.0%20(hdbrss)&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42884-cwe-943-improper-neutralization-of--82aff810</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42884%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42883-cwe-434-unrestricted-upload-of-file-32bf205b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42883%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP%20(Migration%20Workbench)&amp;severity=low&amp;id=6912870714bc3e00ba6f3bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42882-cwe-862-missing-authorization-in-sa-8488bf51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42882%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=6912870714bc3e00ba6f3bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-11-2a6f9ec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-11&amp;severity=medium&amp;id=6913cffa74e5e09a14beac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57695-na-322268d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57695%3A%20n%2Fa&amp;severity=high&amp;id=69134ea49f8eafcdda031b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11578-cwe-59-improper-link-resolution-bef-95a6bf97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11578%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69126c0c6b3b7718db092a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11892-cwe-79-improper-neutralization-of-i-d2aac8ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=69126c0c6b3b7718db092a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64529-cwe-770-allocation-of-resources-wit-cd6fa7bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64529%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20authzed%20spicedb&amp;severity=low&amp;id=691268886b3b7718db04cf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/owasp-highlights-supply-chain-risks-in-new-top-10--3deccfb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OWASP%20Highlights%20Supply%20Chain%20Risks%20in%20New%20Top%2010%20List&amp;severity=high&amp;id=69129bc014bc3e00ba7424fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64522-cwe-918-server-side-request-forgery-b1a9435c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64522%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20soft-serve&amp;severity=critical&amp;id=6912671f6b3b7718db03f35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64518-cwe-611-improper-restriction-of-xml-bf744b65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64518%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20CycloneDX%20cyclonedx-core-java&amp;severity=high&amp;id=691264812d2520af5f327675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64513-cwe-287-improper-authentication-in--2cbfc97a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64513%3A%20CWE-287%3A%20Improper%20Authentication%20in%20milvus-io%20milvus&amp;severity=critical&amp;id=691264812d2520af5f32766f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unauthenticated-remote-access-via-triofox-vulnerab-afc6b1ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unauthenticated%20Remote%20Access%20via%20Triofox%20Vulnerability%20CVE-2025-12480&amp;severity=medium&amp;id=691308308240c40e4c090aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64512-cwe-502-deserialization-of-untruste-8aacc917</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64512%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pdfminer%20pdfminer.six&amp;severity=high&amp;id=6912626244f28dbfe990a14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64507-cwe-269-improper-privilege-manageme-aa82c817</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64507%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20lxc%20incus&amp;severity=high&amp;id=6912626244f28dbfe990a148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-returns-slices-back-into-vs-code-extensi-f7c0b614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Returns%2C%20Slices%20Back%20into%20VS%20Code%20Extensions&amp;severity=medium&amp;id=69129bc014bc3e00ba742501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64502-cwe-201-insertion-of-sensitive-info-f884f232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64502%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64501-cwe-79-improper-neutralization-of-i-99a44780</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64501%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etaminstudio%20prosemirror_to_html&amp;severity=high&amp;id=69125dcc44f28dbfe98bf0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64183-cwe-416-use-after-free-in-academyso-19fcca57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64183%3A%20CWE-416%3A%20Use%20After%20Free%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64182-cwe-120-buffer-copy-without-checkin-00dc5500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64182%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=69125dcc44f28dbfe98bf105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64181-cwe-457-use-of-uninitialized-variab-2ce8d603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64181%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20AcademySoftwareFoundation%20openexr&amp;severity=low&amp;id=69125a3d26655404d5684626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62780-cwe-79-improper-neutralization-of-i-431bee76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62780%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=low&amp;id=69125a3d26655404d5684623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64167-cwe-79-improper-neutralization-of-i-dcffaec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64167%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912576658b9e66d50002ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49145-cwe-863-incorrect-authorization-in--fbc2710a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49145%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912576658b9e66d50002ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/popular-javascript-library-expr-eval-vulnerable-to-418367c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Popular%20JavaScript%20library%20expr-eval%20vulnerable%20to%20RCE%20flaw&amp;severity=high&amp;id=691253de58b9e66d50fc5b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-triofox-flaw-to-install-remote--094f0056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploiting%20Triofox%20Flaw%20to%20Install%20Remote%20Access%20Tools%20via%20Antivirus%20Feature&amp;severity=critical&amp;id=69129af814bc3e00ba7407a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48878-cwe-862-missing-authorization-in-co-e1ae13b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48878%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Combodo%20iTop&amp;severity=medium&amp;id=6912505b58b9e66d50f7c9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48065-cwe-79-improper-neutralization-of-i-3e730e71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48065%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=6912505b58b9e66d50f7c9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48055-cwe-79-improper-neutralization-of-i-6ec27387</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48055%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69124ce358b9e66d50f34b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konni-hackers-turn-googles-find-hub-into-a-remote--ca6d826f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konni%20Hackers%20Turn%20Google%E2%80%99s%20Find%20Hub%20into%20a%20Remote%20Data-Wiping%20Weapon&amp;severity=medium&amp;id=69129af814bc3e00ba7407a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12729-inappropriate-implementation-in-goo-6f34e228</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12729%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465f941466772c506b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12728-inappropriate-implementation-in-goo-c8dece2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12728%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465f941466772c506b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12727-inappropriate-implementation-in-goo-135af20f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12727%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465f941466772c506b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12726-inappropriate-implementation-in-goo-a9617a0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12726%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465f941466772c506b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12725-out-of-bounds-read-in-google-chrome-d3bba38d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12725%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465d941466772c506b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12447-incorrect-security-ui-in-google-chr-1ae2195b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12447%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12446-incorrect-security-ui-in-google-chr-93668527</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12446%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12445-policy-bypass-in-google-chrome-12fe166e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12445%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12444-incorrect-security-ui-in-google-chr-28d1886a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12444%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12443-out-of-bounds-read-in-google-chrome-14beda5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12443%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12441-out-of-bounds-read-in-google-chrome-25f18816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12441%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12440-inappropriate-implementation-in-goo-d34a4674</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12440%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12439-inappropriate-implementation-in-goo-4c7ff807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12439%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465d941466772c506b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12438-use-after-free-in-google-chrome-f7fb85bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12438%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465d941466772c506b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12437-use-after-free-in-google-chrome-830726c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12437%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12436-policy-bypass-in-google-chrome-f58fcd24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12436%3A%20Policy%20bypass%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12435-incorrect-security-ui-in-google-chr-e6a35931</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12435%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12434-race-in-google-chrome-fd9b95d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12434%3A%20Race%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12433-inappropriate-implementation-in-goo-60e5797f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12433%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12432-race-in-google-chrome-02526513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12432%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12431-inappropriate-implementation-in-goo-c665dcf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12431%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=6912465c941466772c506ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12430-object-lifecycle-issue-in-google-ch-d9d48b68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12430%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12429-inappropriate-implementation-in-goo-9394d491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12429%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12428-type-confusion-in-google-chrome-4d8840dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12428%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6912465c941466772c506aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33150-cwe-552-files-or-directories-access-01ca809c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33150%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20IBM%20Cognos%20Analytics%20Certified%20Containers&amp;severity=medium&amp;id=69124159941466772c4b1f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47932-cwe-79-improper-neutralization-of-i-96ba7cee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47932%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123dd5819dd34e6850aab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47773-cwe-79-improper-neutralization-of-i-e39c2755</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47773%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123a5b819dd34e684c5420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43723-cwe-327-use-of-a-broken-or-risky-cr-a4d8617d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43723%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=69123a5b819dd34e684c541d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47286-cwe-74-improper-neutralization-of-s-9880d5ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47286%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=69123410a4f3f087830c43ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-sues-ex-engineer-for-stealing-18000-top-secr-6c8706b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%20Sues%20Ex-Engineer%20for%20Stealing%2018%2C000%20%E2%80%98Top%20Secret%E2%80%99%20Files%20Before%20Layoff&amp;severity=medium&amp;id=69122d12a4f3f0878303b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12967-cwe-470-use-of-externally-controlle-ef63eb58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12967%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20AWS%20JDBC%20Wrapper&amp;severity=high&amp;id=69122d25a4f3f0878303d256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attacks-against-secure-enclaves-schneier-on-se-356ef94d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attacks%20Against%20Secure%20Enclaves%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=69122642eeb17d72b8d02558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denmark-and-norway-investigate-yutong-bus-security-c677db9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denmark%20and%20Norway%20investigate%20Yutong%20bus%20security%20flaw%20amid%20rising%20tech%20fears&amp;severity=medium&amp;id=69122642eeb17d72b8d0255c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-aligned-uta0388-uses-ai-tools-in-global-phis-3c891616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Aligned%20UTA0388%20Uses%20AI%20Tools%20in%20Global%20Phishing%20Campaigns&amp;severity=high&amp;id=69122642eeb17d72b8d02550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43079-cwe-732-incorrect-permission-assign-262928b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43079%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Qualys%20Inc%20Qualys%20Agent&amp;severity=medium&amp;id=69121fbbc86173478b6e1457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-spyware-targeted-samsung-galaxy-phones-vi-ab02cf53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LANDFALL%20Spyware%20Targeted%20Samsung%20Galaxy%20Phones%20via%20Malicious%20WhatsApp%20Images&amp;severity=medium&amp;id=69121650cab732a2636e5bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disclosure-doordash-enabled-5-year-xsshtml-injecti-b33109e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BDISCLOSURE%5D%20DoorDash%20Enabled%205-Year%20XSS%2FHTML%20Injection%20Flaw%20via%20Official%20Email%3B%20VDP%20Misclassified%20Report%20for%2015%20Months&amp;severity=critical&amp;id=69121361d84bdc1ba6926f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-filefix-a-clickfix-variation-kaspersky-off-6b722fec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20FileFix%20%E2%80%94%20a%20ClickFix%20variation%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69121380d84bdc1ba692821c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/many-forbes-ai-50-companies-leak-secrets-on-github-9a25a636</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Many%20Forbes%20AI%2050%20Companies%20Leak%20Secrets%20on%20GitHub&amp;severity=medium&amp;id=69120fe0d84bdc1ba68e943b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46430-cwe-250-execution-with-unnecessary--9b87c3a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46430%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Display%20and%20Peripheral%20Manager&amp;severity=high&amp;id=69121a68c86173478b6866f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http-request-smuggling-in-kestrel-via-chunk-extens-5622aaed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%20Request%20Smuggling%20in%20Kestrel%20via%20chunk%20extensions%20(CVE-2025-55315)&amp;severity=medium&amp;id=69120c59d84bdc1ba68a05eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-isnt-always-defaults-scans-for-3cx-usernames-mo-a7867b47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%20isn&apos;t%20always%20defaults%3A%20Scans%20for%203CX%20usernames%2C%20(Mon%2C%20Nov%2010th)&amp;severity=medium&amp;id=69120474b8ffd8a38b9d8f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-campaign-targets-hotels-spurs-secondary-c-c2180c38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Campaign%20Targets%20Hotels%2C%20Spurs%20Secondary%20Customer%20Attacks&amp;severity=medium&amp;id=69129bc014bc3e00ba742504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/runc-vulnerabilities-can-be-exploited-to-escape-co-f850a904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Runc%20Vulnerabilities%20Can%20Be%20Exploited%20to%20Escape%20Containers&amp;severity=medium&amp;id=6911f71c500a810dcc094fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10th-november-threat-intelligence-report-2c72c1ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10th%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=6911eb4bbb27cbde2e79d800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64457-cwe-367-in-jetbrains-dottrace-11881476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64457%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20JetBrains%20ReSharper%2C%20Rider%20and%20dotTrace&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c666b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64456-cwe-347-in-jetbrains-resharper-1d8f1964</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64456%3A%20CWE-347%20in%20JetBrains%20ReSharper&amp;severity=high&amp;id=6911ecfbbb27cbde2e7c6668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64690-cwe-862-in-jetbrains-youtrack-9a6a7a0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64690&amp;severity=null&amp;id=6911ecfcbb27cbde2e7c6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64689-cwe-522-in-jetbrains-youtrack-7be8105f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64689&amp;severity=null&amp;id=6911ecfcbb27cbde2e7c6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64688-cwe-639-in-jetbrains-youtrack-baca4cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64688&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c6683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64687-cwe-862-in-jetbrains-youtrack-88d99abe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64687&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c6680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64686-cwe-672-in-jetbrains-youtrack-9847f1e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64686&amp;severity=null&amp;id=6911ecfbbb27cbde2e7c667d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64685-cwe-295-in-jetbrains-youtrack-a06c4620</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64685%3A%20CWE-295%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=6911ecfbbb27cbde2e7c667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64684-cwe-862-in-jetbrains-youtrack-5a221939</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64684%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c6677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64683-cwe-362-in-jetbrains-hub-d4493de4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64683%3A%20CWE-362%20in%20JetBrains%20Hub&amp;severity=medium&amp;id=6911ecfbbb27cbde2e7c6674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64682-cwe-362-in-jetbrains-hub-6b0be68f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64682%3A%20CWE-362%20in%20JetBrains%20Hub&amp;severity=low&amp;id=6911ecfbbb27cbde2e7c6671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64681-cwe-862-in-jetbrains-hub-b5b40db1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64681%3A%20CWE-862%20in%20JetBrains%20Hub&amp;severity=low&amp;id=6911ecfbbb27cbde2e7c666e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-new-web-application-risk-categories-added-to-o-bd3073f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20New%20Web%20Application%20Risk%20Categories%20Added%20to%20OWASP%20Top%2010&amp;severity=critical&amp;id=6911e8bf6161266dcb98ea0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-discovered-in-three-vs-code-exte-68d14ab5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Malware%20Discovered%20in%20Three%20VS%20Code%20Extensions%20with%20Thousands%20of%20Installs&amp;severity=high&amp;id=6911e8d86161266dcb99127d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/large-scale-clickfix-phishing-attacks-target-hotel-3ce395d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Large-Scale%20ClickFix%20Phishing%20Attacks%20Target%20Hotel%20Systems%20with%20PureRAT%20Malware&amp;severity=high&amp;id=6911e8d86161266dcb991279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nine-nuget-packages-disrupt-dbs-and-industrial-sys-07536777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nine%20NuGet%20packages%20disrupt%20DBs%20and%20industrial%20systems%20with%20time-delayed%20payloads&amp;severity=medium&amp;id=6911e8d86161266dcb991281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louvre-museums-camera-network-password-was-reporte-9b17fb8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louvre%20Museum%E2%80%99s%20Camera%20Network%20Password%20Was%20Reportedly%20Just%20%E2%80%9CLouvre%E2%80%9D&amp;severity=medium&amp;id=6911e66be2a2408170ade3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12939-sql-injection-in-sourcecodester-int-362217c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12939%3A%20SQL%20Injection%20in%20SourceCodester%20Interview%20Management%20System&amp;severity=medium&amp;id=6911e67fe2a2408170ae1f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-hyper-v-malware-malicious-ai-bots-rdp-98d90e6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Hyper-V%20Malware%2C%20Malicious%20AI%20Bots%2C%20RDP%20Exploits%2C%20WhatsApp%20Lockdown%20and%20More&amp;severity=high&amp;id=69129af814bc3e00ba7407a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-to-open-vsx-emerges-on-g-3a8a8daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20Malware%20Returns%20to%20Open%20VSX%2C%20Emerges%20on%20GitHub&amp;severity=medium&amp;id=6911e022c3394bcf0da644ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12938-sql-injection-in-projectworlds-onli-d8ca496e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12938%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=6911dc1bc3394bcf0da063c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-browser-security-report-reveals-emerging-threa-1b377d57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Browser%20Security%20Report%20Reveals%20Emerging%20Threats%20for%20Enterprises&amp;severity=low&amp;id=69129af814bc3e00ba7407ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-30-alleged-victims-of-oracle-ebs-hack-named-ffb9fd70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%2030%20Alleged%20Victims%20of%20Oracle%20EBS%20Hack%20Named%20on%20Cl0p%20Ransomware%20Site&amp;severity=medium&amp;id=6911d18053b42a4b74ce76e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fantasy-hub-another-russian-based-rat-as-malware-a-90c83e7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fantasy%20Hub%3A%20Another%20Russian%20Based%20RAT%20as%20Malware-as-a-Service&amp;severity=medium&amp;id=6911d19153b42a4b74ce7a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-remote-wipe-tactics-targeting-andr-08e8da9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Remote%20Wipe%20Tactics%20Targeting%20Android%20Devices&amp;severity=medium&amp;id=6911ca57c9af41ae0ebf1d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-targets-aerospace-and-defense-with-n-e1ff8123</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20targets%20Aerospace%20and%20Defense%20with%20new%20Comebacker%20variant&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-patches-vulnerabilities-exploited-at-pwn2own--6b66551d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20Patches%20Vulnerabilities%20Exploited%20at%20Pwn2Own%20Ireland&amp;severity=critical&amp;id=6911c6d6c9af41ae0ebb903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-monsta-ftp-vulnerability-exposed-thousand-b6e12da0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Monsta%20FTP%20Vulnerability%20Exposed%20Thousands%20of%20Servers%20to%20Full%20Takeover&amp;severity=critical&amp;id=6911c6e9c9af41ae0ebba311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australia-sanctions-hackers-supporting-north-korea-2b91902e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%20Sanctions%20Hackers%20Supporting%20North%20Korea%E2%80%99s%20Weapons%20Program&amp;severity=medium&amp;id=6911c353c9af41ae0eb6aa0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12405-cwe-269-improper-privilege-manageme-bf184c0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12405%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911b458512c1b862c8e34fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41107-cwe-79-improper-neutralization-of-i-1aad2daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20QDOCS%20Smart%20Schoo&amp;severity=medium&amp;id=6911ad57512c1b862c84c0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12409-cwe-89-improper-neutralization-of-s-3c372f02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12409%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911aa71983053a663d21209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12397-cwe-89-improper-neutralization-of-s-d31b84d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12397%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Google%20Cloud%20Looker%20Studio&amp;severity=high&amp;id=6911aa71983053a663d21205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12155-cwe-77-improper-neutralization-of-s-e2c239be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12155%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Google%20Cloud%20Looker&amp;severity=high&amp;id=6911aa71983053a663d2120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41731-cwe-338-use-of-cryptographically-we-7cc12fcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41731%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Jumo%20variTRON300&amp;severity=high&amp;id=6911a2ea983053a663c8b2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12933-sql-injection-in-sourcecodester-bab-8f0f2f0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12933%3A%20SQL%20Injection%20in%20SourceCodester%20Baby%20Care%20System&amp;severity=medium&amp;id=69117a853d94f7819bac325f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12932-sql-injection-in-sourcecodester-bab-81f71413</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12932%3A%20SQL%20Injection%20in%20SourceCodester%20Baby%20Care%20System&amp;severity=medium&amp;id=691175e6d0f5adfa3d85f74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12613-arbitrary-argument-injection-in-clo-d3c7d951</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12613%3A%20Arbitrary%20Argument%20Injection%20in%20cloudinary&amp;severity=high&amp;id=691175e6d0f5adfa3d85f74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12931-sql-injection-in-sourcecodester-foo-35c7c00f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12931%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=69116eded0f5adfa3d7d797f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62689-heap-based-buffer-overflow-in-gnu-p-dfdc73e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62689%3A%20Heap-based%20buffer%20overflow%20in%20GNU%20Project%20GNU%20libbmicrohttpd&amp;severity=high&amp;id=69116a20b0eb67653eb0f0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59777-null-pointer-dereference-in-gnu-pro-47f9438d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59777%3A%20NULL%20pointer%20dereference%20in%20GNU%20Project%20GNU%20libbmicrohttpd&amp;severity=high&amp;id=69116a20b0eb67653eb0f0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12930-sql-injection-in-sourcecodester-foo-2af1c10d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12930%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20System&amp;severity=medium&amp;id=691166511e0afa394a9d233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12929-sql-injection-in-sourcecodester-sur-aa4a821f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12929%3A%20SQL%20Injection%20in%20SourceCodester%20Survey%20Application%20System&amp;severity=medium&amp;id=69116258b9239aa390814bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12868-cwe-603-use-of-client-side-authenti-63bfb658</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12868%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20CyberTutor%20New%20Site%20Server&amp;severity=critical&amp;id=69115ed4b9239aa3908085aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12867-cwe-434-unrestricted-upload-of-file-8460192f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12867%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Hundred%20Plus%20EIP%20Plus&amp;severity=high&amp;id=69115ed4b9239aa3908085a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12928-sql-injection-in-code-projects-onli-36045207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12928%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=69115ed4b9239aa3908085ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12866-cwe-640-weak-password-recovery-mech-3284230c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12866%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Hundred%20Plus%20EIP%20Plus&amp;severity=critical&amp;id=691157ccb9239aa3907e6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12927-sql-injection-in-dedebiz-9db5dc76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12927%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=691157ccb9239aa3907e6b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12865-cwe-89-improper-neutralization-of-s-8e7a12b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12865%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e-Excellence%20U-Office%20Force&amp;severity=high&amp;id=69114d40b9239aa3907ac87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12864-cwe-89-improper-neutralization-of-s-2bc67a3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12864%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20e-Excellence%20U-Office%20Force&amp;severity=high&amp;id=69114d40b9239aa3907ac87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12926-sql-injection-in-sourcecodester-far-d9458103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12926%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=69114d40b9239aa3907ac882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12925-missing-authorization-in-rymcu-fore-58a3f75d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12925%3A%20Missing%20Authorization%20in%20rymcu%20forest&amp;severity=medium&amp;id=691142b4b9239aa39070f832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12924-missing-authorization-in-rymcu-fore-ac058fb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12924%3A%20Missing%20Authorization%20in%20rymcu%20forest&amp;severity=medium&amp;id=691142b4b9239aa39070f82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12923-path-traversal-in-liweiyi-chestnutc-4dc173cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12923%3A%20Path%20Traversal%20in%20liweiyi%20ChestnutCMS&amp;severity=medium&amp;id=691134b9b9239aa39064e0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12922-path-traversal-in-openclinica-commu-667c3259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12922%3A%20Path%20Traversal%20in%20OpenClinica%20Community%20Edition&amp;severity=medium&amp;id=691134b9b9239aa39064e0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-10-ab85e832</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-10&amp;severity=medium&amp;id=69127ff014bc3e00ba67453c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63678-na-42ef7c3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63678%3A%20n%2Fa&amp;severity=low&amp;id=69126fa46b3b7718db0c7bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phantomcaptcha-multi-stage-websocket-rat-tar-ea72d1dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PhantomCaptcha%20%7C%20Multi-Stage%20WebSocket%20RAT%20Targets%20Ukraine%20in%20Single-Day%20Spearphishing%20Operation&amp;severity=medium&amp;id=69126f856b3b7718db0c6ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63397-na-d10b10c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63397%3A%20n%2Fa&amp;severity=medium&amp;id=6912576658b9e66d50002eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63296-na-7fa46e64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63296%3A%20n%2Fa&amp;severity=medium&amp;id=691253f258b9e66d50fc71d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63384-na-b28d115d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63384%3A%20n%2Fa&amp;severity=medium&amp;id=691249dd941466772c5416cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63617-na-4dfed4ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63617%3A%20n%2Fa&amp;severity=medium&amp;id=691249dd941466772c5416c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60876-na-6ecd776b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60876%3A%20n%2Fa&amp;severity=medium&amp;id=6912465f941466772c506b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56503-na-83f770ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56503%3A%20n%2Fa&amp;severity=medium&amp;id=6912465f941466772c506b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63149-na-05bf7092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63149%3A%20n%2Fa&amp;severity=high&amp;id=69124159941466772c4b1f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63288-na-fe48e93b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63288%3A%20n%2Fa&amp;severity=high&amp;id=69123a5b819dd34e684c5423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63497-na-d519aa46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63497%3A%20n%2Fa&amp;severity=high&amp;id=69121c24c86173478b6a098f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63834-na-7588b1e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63834%3A%20n%2Fa&amp;severity=medium&amp;id=69121b9bc86173478b69b3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63456-na-8685dfab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63456%3A%20n%2Fa&amp;severity=medium&amp;id=69121b9bc86173478b69b3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63455-na-f78d82bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63455%3A%20n%2Fa&amp;severity=high&amp;id=69121b9bc86173478b69b3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63835-na-b2b6762b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63835%3A%20n%2Fa&amp;severity=medium&amp;id=6912165ecab732a2636e714b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63147-na-952031df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63147%3A%20n%2Fa&amp;severity=medium&amp;id=6912165ecab732a2636e7148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63457-na-9a9fd077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63457%3A%20n%2Fa&amp;severity=medium&amp;id=69121361d84bdc1ba6926f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63154-na-8f4aa309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63154%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63153-na-f76e6836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63153%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63152-na-6a65654e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63152%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63712-na-00ab6d24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63712%3A%20n%2Fa&amp;severity=medium&amp;id=69120774b8ffd8a38ba23792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63710-na-69a80133</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63710%3A%20n%2Fa&amp;severity=medium&amp;id=69120774b8ffd8a38ba2378e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63709-na-c95eee49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63709%3A%20n%2Fa&amp;severity=medium&amp;id=6911fe20500a810dcc12633d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63711-na-3f5fadbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63711%3A%20n%2Fa&amp;severity=high&amp;id=6911fa9b500a810dcc0e18aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12921-xml-injection-in-openclinica-commun-5f24dcac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12921%3A%20XML%20Injection%20in%20OpenClinica%20Community%20Edition&amp;severity=medium&amp;id=69112787a0a00dcacbece57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12920-cross-site-scripting-in-qianfox-fox-b6fa4694</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12920%3A%20Cross%20Site%20Scripting%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=69112046b991753c98029761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12919-improper-control-of-resource-identi-73b478b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12919%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20EverShop&amp;severity=medium&amp;id=691102ed4abca22cf3180d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dangerous-runc-flaws-could-allow-hackers-to-escape-bf6584fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dangerous%20runC%20flaws%20could%20allow%20hackers%20to%20escape%20Docker%20containers&amp;severity=high&amp;id=6910e4d3e28c534f9cea922f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-malware-returns-on-openvsx-with-3-new-vs-196168aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%20malware%20returns%20on%20OpenVSX%20with%203%20new%20VSCode%20extensions&amp;severity=high&amp;id=69106e5ccf04d12accf04540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-target-us-non-profit-in-long--b9bfaf78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20hackers%20target%20U.S.%20non-profit%20in%20long-term%20espionage%20campaign&amp;severity=medium&amp;id=69106e5ccf04d12accf04544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12918-improper-control-of-resource-identi-c22bdf02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12918%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20yungifez%20Skuul%20School%20Management%20System&amp;severity=low&amp;id=69104ccfc7861954111d1f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12917-denial-of-service-in-tozed-zlt-t10-10ff89d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12917%3A%20Denial%20of%20Service%20in%20TOZED%20ZLT%20T10&amp;severity=medium&amp;id=6910457ac786195411069ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watch-out-for-svg-files-booby-trapped-with-malware-5579952d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Watch%20out%20for%20SVG%20files%20booby-trapped%20with%20malware&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-primitive-crypto-theft-to-sophisticated-ai-ba-69c16e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20primitive%20crypto%20theft%20to%20sophisticated%20AI-based%20deception&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotta-fly-targeting-the-uav-sector-f211c012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotta%20fly%3A%20Targeting%20the%20UAV%20sector&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-09-7b9b5b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-09&amp;severity=medium&amp;id=69112f0da0a00dcacbf6b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12916-command-injection-in-sangfor-operat-72fe5375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12916%3A%20Command%20Injection%20in%20Sangfor%20Operation%20and%20Maintenance%20Security%20Management%20System&amp;severity=medium&amp;id=690fd5651fa9d93f266108d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12915-file-inclusion-in-70mai-x200-a0652ef7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12915%3A%20File%20Inclusion%20in%2070mai%20X200&amp;severity=high&amp;id=690fcfd8932891ff16e907d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12914-sql-injection-in-aapanel-baota-438049e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12914%3A%20SQL%20Injection%20in%20aaPanel%20BaoTa&amp;severity=medium&amp;id=690fb8cd7021794900e353c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12913-sql-injection-in-code-projects-resp-d4e0c815</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12913%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690fa36310a10cc633780a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-uncovers-whisper-leak-attack-that-identi-f9fe2002</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Uncovers%20&apos;Whisper%20Leak&apos;%20Attack%20That%20Identifies%20AI%20Chat%20Topics%20in%20Encrypted%20Traffic&amp;severity=high&amp;id=690f8fe62cf59ec1f17535a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-italian-citizen-was-targeted-with-paragons-g-ad5f9684</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20Italian%20citizen%20was%20targeted%20with%20Paragon%E2%80%99s%20Graphite%20spyware.%20We%20have%20a%20serious%20problem&amp;severity=high&amp;id=690f8fe62cf59ec1f17535a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-uncovers-whisper-leak-attack-that-identi-eaeb40fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Uncovers%20&apos;Whisper%20Leak&apos;%20Attack%20That%20Identifies%20AI%20Chat%20Topics%20in%20Encrypted%20Traffic&amp;severity=medium&amp;id=6911531fb9239aa3907cc387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-open-source-file-scanner-bf7939a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=free%2C%20open-source%20file%20scanner&amp;severity=high&amp;id=690f56578fc7843e3d462bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arbitrary-app-installation-on-intune-managed-andro-96f1ea7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arbitrary%20App%20Installation%20on%20Intune%20Managed%20Android%20Enterprise%20BYOD%20in%20Work%20Profile&amp;severity=medium&amp;id=690f4f0fa9ae4c51c61b25ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-actively-exploited-firewall-flaws-now-abused-032b82c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%3A%20Actively%20exploited%20firewall%20flaws%20now%20abused%20for%20DoS%20attacks&amp;severity=high&amp;id=690f2536d127c1b08b96ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs--dd6b8851</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Log4j%20to%20IIS%2C%20China%E2%80%99s%20Hackers%20Turn%20Legacy%20Bugs%20into%20Global%20Espionage%20Tools&amp;severity=high&amp;id=690f21bad127c1b08b91d688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-fixes-seven-nas-zero-day-flaws-exploited-at-p-7f2caaca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20fixes%20seven%20NAS%20zero-day%20flaws%20exploited%20at%20Pwn2Own&amp;severity=critical&amp;id=690f21bad127c1b08b91d67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nuget-packages-drop-disruptive-time-bomb-2b1c3e4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NuGet%20packages%20drop%20disruptive%20&apos;time%20bombs&apos;&amp;severity=high&amp;id=690f21bad127c1b08b91d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12399-cwe-434-unrestricted-upload-of-file-2d963d08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12399%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20alexreservations%20Alex%20Reservations%3A%20Smart%20Restaurant%20Booking&amp;severity=high&amp;id=690f0e9f15ddfe7d54073e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11967-cwe-434-unrestricted-upload-of-file-277b2bf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11967%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20getwpfunnels%20Mail%20Mint%20%E2%80%93%20Newsletters%2C%20Email%20Marketing%2C%20Automation%2C%20WooCommerce%20Emails%2C%20Post%20Notification%2C%20and%20more&amp;severity=high&amp;id=690f0e9f15ddfe7d54073e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11448-cwe-862-missing-authorization-in-sm-00b93c9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11448%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Gallery%20Plugin%20for%20WordPress%20%E2%80%93%20Envira%20Photo%20Gallery&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12837-cwe-79-improper-neutralization-of-i-05dbe6ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12643-cwe-79-improper-neutralization-of-i-cc4f70fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saphali%20Saphali%20LiqPay%20for%20donate&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11980-cwe-89-improper-neutralization-of-s-b7d7d4b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11980%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kybernetikservices%20Quick%20Featured%20Images&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12092-cwe-22-improper-limitation-of-a-pat-da06969a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12092%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gregross%20CYAN%20Backup&amp;severity=medium&amp;id=690f0e9f15ddfe7d54073e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12098-cwe-200-exposure-of-sensitive-infor-0626340b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20academylms%20Academy%20LMS%20Pro&amp;severity=medium&amp;id=690f02ef224224608af9754f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12099-cwe-502-deserialization-of-untruste-4f0a42e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12099%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20academylms%20Academy%20LMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20Complete%20eLearning%20Solution&amp;severity=high&amp;id=690f02ef224224608af97553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12621-cwe-863-incorrect-authorization-in--239f4ae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12621%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpdesk%20Flexible%20Refund%20and%20Return%20Order%20for%20WooCommerce&amp;severity=medium&amp;id=690ef21a097c6a910ad5e3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12498-cwe-862-missing-authorization-in-me-1c2e239b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12498%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=690ee8d444af18c375220269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/honeypot-requests-for-code-repositories-sat-nov-8t-8abd15aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Honeypot%3A%20Requests%20for%20(Code)%20Repositories%2C%20(Sat%2C%20Nov%208th)&amp;severity=medium&amp;id=690ee0222137a290ee061dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9334-cwe-94-improper-control-of-generatio-828c3590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9334%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=high&amp;id=690edcb42137a290ee0198e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12125-cwe-79-improper-neutralization-of-i-b42d44e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linksoftware%20HTML%20Forms%20%E2%80%93%20Simple%20WordPress%20Forms%20Plugin&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12112-cwe-79-improper-neutralization-of-i-fdb4fc65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20Insert%20Headers%20and%20Footers%20Code%20%E2%80%93%20HT%20Script&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12000-cwe-22-improper-limitation-of-a-pat-84002efc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12000%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getwpfunnels%20Easy%20WordPress%20Funnel%20Builder%20To%20Collect%20Leads%20And%20Increase%20Sales%20%E2%80%93%20WPFunnels&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11748-cwe-639-authorization-bypass-throug-43924098</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11748%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20itthinx%20Groups&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6420c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12161-cwe-434-unrestricted-upload-of-file-7dd7582a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12161%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20burhandodhy%20Smart%20Auto%20Upload%20Images%20%E2%80%93%20Import%20External%20Images&amp;severity=high&amp;id=690ebeaf3a8fd010ecf6422b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12193-cwe-79-improper-neutralization-of-i-94b2f4fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12193%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitae-park%20Mang%20Board%20WP&amp;severity=medium&amp;id=690ebeb03a8fd010ecf64252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11972-cwe-89-improper-neutralization-of-s-3824ae02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11972%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stevejburge%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager%20%E2%80%93%20AI%20Autotagger%20with%20OpenAI&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7663-cwe-862-missing-authorization-in-ova-de40624e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7663%3A%20CWE-862%20Missing%20Authorization%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=medium&amp;id=690ebeb03a8fd010ecf6425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12353-cwe-639-authorization-bypass-throug-eb442bcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12353%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getwpfunnels%20Easy%20WordPress%20Funnel%20Builder%20To%20Collect%20Leads%20And%20Increase%20Sales%20%E2%80%93%20WPFunnels&amp;severity=medium&amp;id=690ebeb03a8fd010ecf64256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12042-cwe-862-missing-authorization-in-we-d9b39f8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12042%3A%20CWE-862%20Missing%20Authorization%20in%20werbeagenturcommotion%20Course%20Booking%20System&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6421b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12064-cwe-79-improper-neutralization-of-i-e654ccac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20WP2Social%20Auto%20Publish&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6421f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12177-cwe-321-use-of-hard-coded-cryptogra-e1fb6848</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12177%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf64233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12167-cwe-862-missing-authorization-in-rn-2d3c8ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12167%3A%20CWE-862%20Missing%20Authorization%20in%20rnzo%20Contact%20Form%207%20AWeber%20Extension&amp;severity=medium&amp;id=690ebeaf3a8fd010ecf6422f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12583-cwe-862-missing-authorization-in-ne-33b2fc78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12583%3A%20CWE-862%20Missing%20Authorization%20in%20neofix%20Simple%20Downloads%20List&amp;severity=medium&amp;id=690eb0d73a8fd010ecf282da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11452-cwe-89-improper-neutralization-of-s-30f144b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11452%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20asgaros%20Asgaros%20Forum&amp;severity=high&amp;id=690eb0d73a8fd010ecf282d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64494-cwe-150-improper-neutralization-of--af0ffe90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64494%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20charmbracelet%20soft-serve&amp;severity=medium&amp;id=690e9f0a3a8fd010ecd0f4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64493-cwe-89-improper-neutralization-of-s-266fcbe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64493%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=690e9f0a3a8fd010ecd0f4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64492-cwe-89-improper-neutralization-of-s-6bbff9d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64492%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=high&amp;id=690e9f0a3a8fd010ecd0f4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-08-53832820</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-08&amp;severity=medium&amp;id=690fdc521fa9d93f266a607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64486-cwe-73-external-control-of-file-nam-d894c775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64486%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20kovidgoyal%20calibre&amp;severity=critical&amp;id=690e812b0e7acb8066fb4466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12911-inappropriate-implementation-in-goo-b46e6c13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12911%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb445e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12910-inappropriate-implementation-in-goo-b50be9dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12910%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12909-insufficient-policy-enforcement-in--25baa46d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12909%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12908-insufficient-validation-of-untruste-71cd81ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12908%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12907-insufficient-validation-of-untruste-88e4df1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12907%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=690e812b0e7acb8066fb444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12906-inappropriate-implementation-in-goo-96437911</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12906%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12905-inappropriate-implementation-in-goo-5147d9e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12905%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690e812b0e7acb8066fb4446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64485-cwe-22-improper-limitation-of-a-pat-aef7038b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=690e812b0e7acb8066fb4462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-rise-of-online-casino-spam-29af03bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Rise%20of%20Online%20Casino%20Spam&amp;severity=medium&amp;id=6911ce0353b42a4b74c9b5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37736-cwe-863-incorrect-authorization-in--679fb322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37736%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Elastic%20Cloud%20Enterprise%20(ECE)&amp;severity=high&amp;id=690e71563a5f68e27f2ed920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12418-cwe-59-improper-link-resolution-bef-58225bcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12418%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Revenera%20InstallShield&amp;severity=medium&amp;id=690e653fde4eb1b9f756d678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-malware-targeted-samsung-galaxy-users-daa9203c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Landfall&apos;%20Malware%20Targets%20Samsung%20Galaxy%20Users&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12863-use-after-free-in-red-hat-red-hat-e-6f448282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12863&amp;severity=null&amp;id=690e5f49323c4112fbad3517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomvibing-infests-visual-studio-extension-marke-ba369b63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Ransomvibing&apos;%20Infests%20Visual%20Studio%20Extension%20Market&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64481-cwe-601-url-redirection-to-untruste-b90ff5a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64481%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20simonw%20datasette&amp;severity=low&amp;id=694f079233784cecd499b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12875-out-of-bounds-write-in-mruby-a5920cd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12875%3A%20Out-of-bounds%20Write%20in%20mruby&amp;severity=medium&amp;id=690e59e81aa5a3f4ee1fc7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12896-cwe-307-improper-restriction-of-exc-32187ba3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12896%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Solidigm%E2%84%A2%20D5-P5316%2C%20D7-P5510%2C%20D7-P5520%2FD7-P5620%2C%20D5-P5430%2C%20D5-P5336&amp;severity=medium&amp;id=690e5d6d1aa5a3f4ee24f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12902-cwe-665-improper-initialization-in--94915407</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12902%3A%20CWE-665%20Improper%20Initialization%20in%20Solidigm%E2%84%A2%20D5-P5316%2C%20D5-P5430%2C%20D7-P5520%2FD7-P5620%2C%20D5-P5336&amp;severity=medium&amp;id=690e5d6d1aa5a3f4ee24f35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64439-cwe-502-deserialization-of-untruste-12c0bc65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=690e623c323c4112fbb14727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-backs-massive-ai-push-in-uae-raising-sec-9e75cb73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Backs%20Massive%20AI%20Push%20in%20UAE%2C%20Raising%20Security%20Concerns&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10230-improper-neutralization-of-special--4e28a7fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10230%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=690e4d7dc4445bd1e6c78d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36006-cwe-404-improper-resource-shutdown--b248aa76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36006%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e449cdc0204d2f6657991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7700-null-pointer-dereference-4f448a73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7700%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=690e449cdc0204d2f6657997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36008-cwe-770-allocation-of-resources-wit-f4f71011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36008%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e449cdc0204d2f6657994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36131-cwe-359-exposure-of-private-persona-675fbfa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36131%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36136-cwe-770-allocation-of-resources-wit-73a37965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36136%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36185-cwe-943-improper-neutralization-of--9a425597</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36185%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e411fdc0204d2f6606159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12890-improper-check-or-handling-of-excep-1694b706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12890%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=690e411fdc0204d2f660615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36186-cwe-250-execution-with-unnecessary--202d6663</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36186%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Db2&amp;severity=high&amp;id=690e3d99dc0204d2f65bf867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33012-cwe-324-use-of-a-key-past-its-expir-2d834222</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33012%3A%20CWE-324%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d99dc0204d2f65bf864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2534-cwe-789-memory-allocation-with-exces-8b0f1c70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2534%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d99dc0204d2f65bf861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36135-cwe-79-improper-neutralization-of-i-83b55546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47118-cwe-121-stack-based-buffer-overflow-e1b6b891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47118%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12829-cwe-125-out-of-bounds-read-in-amazo-16a00e5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Amazon%20Ion-C&amp;severity=medium&amp;id=690e35acf29beb96f88f84a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12873-sql-injection-in-campcodes-school-f-e9d77667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12873%3A%20SQL%20Injection%20in%20Campcodes%20School%20File%20Management&amp;severity=medium&amp;id=690e35acf29beb96f88f84a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9458-cwe-120-buffer-copy-without-checking-71ea4f13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9458%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=690e35acf29beb96f88f84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-zero-click-flaw-exploited-to-deploy-landfa-eebc5c61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20Mobile%20Flaw%20Exploited%20as%20Zero-Day%20to%20Deploy%20LANDFALL%20Android%20Spyware&amp;severity=low&amp;id=690eb03c3a8fd010ecf20020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64430-cwe-918-server-side-request-forgery-c86441a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64430%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20parse-community%20parse-server&amp;severity=high&amp;id=690e3d06dc0204d2f65bb8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64347-cwe-284-improper-access-control-in--c126b0b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64347%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20apollographql%20router&amp;severity=high&amp;id=690e3201f29beb96f88aff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12862-unrestricted-upload-in-projectworld-fc491cf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12862%3A%20Unrestricted%20Upload%20in%20projectworlds%20Online%20Notes%20Sharing%20Platform&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3222-cwe-287-improper-authentication-in-g-a21e94c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3222%3A%20CWE-287%20Improper%20Authentication%20in%20GE%20Vernova%20Smallworld&amp;severity=critical&amp;id=690e23aa5ed2b3c9882b3441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7719-cwe-22-improper-limitation-of-a-path-aad7bef7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7719%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GE%20Vernova%20Smallworld&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b3448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-controversial-ransomware-report-goot-5c934bae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Controversial%20Ransomware%20Report%2C%20Gootloader%20Returns%2C%20More%20AN0M%20Arrests&amp;severity=medium&amp;id=690e1c965ed2b3c98821386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-log4j-to-iis-chinas-hackers-turn-legacy-bugs--50b0e8fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Log4j%20to%20IIS%2C%20China%E2%80%99s%20Hackers%20Turn%20Legacy%20Bugs%20into%20Global%20Espionage%20Tools&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12861-sql-injection-in-dedebiz-d5e521c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12861%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e19295ed2b3c9881d11e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-paid-twice-scam-infects-bookingcom-and-other-boo-b082842f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CI%20Paid%20Twice%E2%80%9D%20Scam%20Infects%20Booking.com%20and%20Other%20Booking%20Sites&apos;%20Users%20with%20PureRAT%20via%20ClickFix&amp;severity=medium&amp;id=690e17380d6e36ffa27aa06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/landfall-android-spyware-targeted-samsung-phones-v-8f3d9a2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Landfall%20Android%20Spyware%20Targeted%20Samsung%20Phones%20via%20Zero-Day&amp;severity=medium&amp;id=690e13ab0d6e36ffa27582b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47207-cwe-476-in-qnap-systems-inc-file-st-327e6d86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47207%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e10330d6e36ffa2711b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52425-cwe-89-in-qnap-systems-inc-qumagie-f7ca937e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52425%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=critical&amp;id=690e10330d6e36ffa2711b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52865-cwe-476-in-qnap-systems-inc-file-st-5bc39ea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52865%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e10330d6e36ffa2711b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53408-cwe-476-in-qnap-systems-inc-file-st-c750caec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53408%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e10330d6e36ffa2711b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53409-cwe-770-in-qnap-systems-inc-file-st-cb75bff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53409%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53410-cwe-770-in-qnap-systems-inc-file-st-9451c2e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53410%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53411-cwe-770-in-qnap-systems-inc-file-st-9205e18b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53411%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53412-cwe-476-in-qnap-systems-inc-file-st-cdb4220f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53412%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53413-cwe-770-in-qnap-systems-inc-file-st-1add67a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53413%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54167-cwe-79-in-qnap-systems-inc-notifica-dd3a8c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54167%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Notification%20Center&amp;severity=high&amp;id=690e0fbd0d6e36ffa270ef38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54168-cwe-79-in-qnap-systems-inc-qulog-ce-699cf2f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54168%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57706-cwe-79-in-qnap-systems-inc-file-sta-cbc99d41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57706%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57712-cwe-22-in-qnap-systems-inc-qsync-ce-d48d964d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57712%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58463-cwe-23-in-qnap-systems-inc-download-827e9f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58463%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58464-cwe-23-in-qnap-systems-inc-qumagie-7ae37603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58464%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=high&amp;id=690e0fbe0d6e36ffa270ef7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58465-cwe-79-in-qnap-systems-inc-download-e971514b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58465%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58469-cwe-352-in-qnap-systems-inc-qulog-c-9c8484d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58469%3A%20CWE-352%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12860-sql-injection-in-dedebiz-db8a5451</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12860%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12859-sql-injection-in-dedebiz-34a1039f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12859%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54167-cwe-79-in-qnap-systems-inc-notifica-dd3a8c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54167%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Notification%20Center&amp;severity=high&amp;id=690e0fbd0d6e36ffa270ef38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54168-cwe-79-in-qnap-systems-inc-qulog-ce-699cf2f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54168%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57706-cwe-79-in-qnap-systems-inc-file-sta-cbc99d41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57706%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57712-cwe-22-in-qnap-systems-inc-qsync-ce-d48d964d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57712%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=690e0fbd0d6e36ffa270ef41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58463-cwe-23-in-qnap-systems-inc-download-827e9f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58463%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbd0d6e36ffa270ef44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58464-cwe-23-in-qnap-systems-inc-qumagie-7ae37603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58464%3A%20CWE-23%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=high&amp;id=690e0fbe0d6e36ffa270ef7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58465-cwe-79-in-qnap-systems-inc-download-e971514b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58465%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20Download%20Station&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58469-cwe-352-in-qnap-systems-inc-qulog-c-9c8484d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58469%3A%20CWE-352%20in%20QNAP%20Systems%20Inc.%20QuLog%20Center&amp;severity=low&amp;id=690e0fbe0d6e36ffa270ef86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12860-sql-injection-in-dedebiz-db8a5451</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12860%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12859-sql-injection-in-dedebiz-34a1039f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12859%3A%20SQL%20Injection%20in%20DedeBIZ&amp;severity=medium&amp;id=690e0b59623ee59e95d5a1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agents-are-going-rogue-heres-how-to-rein-them-i-49b68ab1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agents%20Are%20Going%20Rogue%3A%20Here&apos;s%20How%20to%20Rein%20Them%20In&amp;severity=medium&amp;id=690e0b3d623ee59e95d58d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-security-agents-get-personas-to-make-them-more--9ef30911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Security%20Agents%20Get%20Persona%20Makeovers&amp;severity=medium&amp;id=690e0438623ee59e95cbb95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-use-email-for-blackmail-and-extortion-e62b0cff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20use%20email%20for%20blackmail%20and%20extortion%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=690e005768fa31be9219230f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12857-sql-injection-in-code-projects-resp-4424d6a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12857%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ollama-nvidia-flaws-put-ai-infrastructure-at-risk-259bba8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ollama%2C%20Nvidia%20Flaws%20Put%20AI%20Infrastructure%20at%20Risk&amp;severity=critical&amp;id=690dfcad68fa31be9214e019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-exposure-vulnerability-found-in-deep-learning-d297c5ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Exposure%20Vulnerability%20Found%20in%20Deep%20Learning%20Tool%20Keras&amp;severity=medium&amp;id=690df93668fa31be921001b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whats-that-coming-over-the-hill-monsta-ftp-remote--1589dff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%E2%80%99s%20That%20Coming%20Over%20The%20Hill%3F%20(Monsta%20FTP%20Remote%20Code%20Execution%20CVE-2025-34299)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=690df95668fa31be92103442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12856-sql-injection-in-code-projects-resp-90c37754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12856%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12855-sql-injection-in-code-projects-resp-8dd72fa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12855%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Hotel%20Site&amp;severity=medium&amp;id=690e03b5623ee59e95cb7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-attacks-against-macos-users-evolving-fbb50b58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Attacks%20Against%20macOS%20Users%20Evolving&amp;severity=medium&amp;id=690df5a868fa31be920d2a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10968-cwe-89-improper-neutralization-of-s-c2e3cd70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10968%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GG%20Soft%20Software%20Services%20Inc.%20PaperWork&amp;severity=high&amp;id=690defa9f9c655f2f6a01ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-0-day-exploit-emails-trick-crypto-users-into--1cd97376</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%200-Day%20Exploit%20Emails%20Trick%20Crypto%20Users%20Into%20Running%20Malicious%20Code&amp;severity=high&amp;id=690deceefb039e6a56848667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12854-authorization-bypass-in-newbee-mall-681e755c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12854%3A%20Authorization%20Bypass%20in%20newbee-mall-plus&amp;severity=medium&amp;id=690de966fb039e6a5680e60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12853-sql-injection-in-sourcecodester-bes-f9f31f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12853%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=690de966fb039e6a5680e604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/free-test-for-post-quantum-cryptography-tls-abf9df69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Free%20test%20for%20Post-Quantum%20Cryptography%20TLS&amp;severity=medium&amp;id=690de267fb039e6a5677f1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-logic-bombs-in-malware-laced-nuget-packages-3f82666f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Logic%20Bombs%20in%20Malware-Laced%20NuGet%20Packages%20Set%20to%20Detonate%20Years%20After%20Installation&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-congressional-budget-office-was-hacked-it-says-0301f508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Congressional%20Budget%20Office%20Was%20Hacked.%20It%20Says%20It%20Has%20Implemented%20New%20Security%20Measures&amp;severity=medium&amp;id=690dd321c2e5047ad7450707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dragonforce-cartel-scattered-spider-at-the-gat-a983b8ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20DragonForce%20Cartel%3A%20Scattered%20Spider%20at%20the%20gate&amp;severity=medium&amp;id=690dcfa5c2e5047ad74185f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-update-patches-high-severity-flaws-8e16e61a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Update%20Patches%20High-Severity%20Flaws&amp;severity=critical&amp;id=690dcc1ec2e5047ad73cd2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enterprise-credentials-at-risk-same-old-same-old-ddb62a45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Enterprise%20Credentials%20at%20Risk%20%E2%80%93%20Same%20Old%2C%20Same%20Old%3F&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-became-aware-of-a-new-attack-variant-against-ee5c768a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20became%20aware%20of%20a%20new%20attack%20variant%20against%20Secure%20Firewall%20ASA%20and%20FTD%20devices&amp;severity=medium&amp;id=690dcb8e03ca312466af6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-group-claims-the-breach-of-the-was-c837e62c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20group%20claims%20the%20breach%20of%20The%20Washington%20Post&amp;severity=high&amp;id=690dc80903ca312466ab6c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-congressional-budget-office-hit-by-suspected-fo-6563847b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Congressional%20Budget%20Office%20hit%20by%20suspected%20foreign%20cyberattack&amp;severity=high&amp;id=690dc80903ca312466ab6c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coded-malicious-vs-code-extension-found-with--7b05f476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe-Coded%20Malicious%20VS%20Code%20Extension%20Found%20with%20Built-In%20Ransomware%20Capabilities&amp;severity=high&amp;id=690dc80903ca312466ab6c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-inedibleochotense-impersonates-e-3a260e85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20InedibleOchotense%20impersonates%20ESET%20to%20deploy%20backdoor%20on%20Ukrainian%20systems&amp;severity=medium&amp;id=690dc80903ca312466ab6c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/destructive-russian-cyberattacks-on-ukraine-expand-c82cecbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Destructive%20Russian%20Cyberattacks%20on%20Ukraine%20Expand%20to%20Grain%20Sector&amp;severity=medium&amp;id=690dbd7d03ca3124669e0a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10870-cwe-89-improper-neutralization-of-s-676f18de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10870%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DIAL%20CentrosNet&amp;severity=critical&amp;id=690dbd9f03ca3124669e5516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-phishing-campaign-targeting-hotels-and--3b7ab6b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20Phishing%20Campaign%20Targeting%20Hotels%20and%20Customers&amp;severity=medium&amp;id=690dbd8a03ca3124669e0ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-launches-new-maps-feature-to-help-businesse-8e34ffff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Launches%20New%20Maps%20Feature%20to%20Help%20Businesses%20Report%20Review-Based%20Extortion%20Attempts&amp;severity=low&amp;id=690eb03c3a8fd010ecf2002c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/18-arrested-in-crackdown-on-credit-card-fraud-ring-1632cce5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=18%20Arrested%20in%20Crackdown%20on%20Credit%20Card%20Fraud%20Rings&amp;severity=medium&amp;id=690dba571280f279b842fc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kimsuky-malware-endclient-rat-technical-report-d4b6f50b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kimsuky%20Malware%20%22EndClient%20RAT%22%3A%20Technical%20Report%20and%20IOCs&amp;severity=medium&amp;id=690dba651280f279b842fd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cavalry-werewolf-hacker-group-attacks-russian-stat-f193b8d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cavalry%20Werewolf%20hacker%20group%20attacks%20Russian%20state%20institutions&amp;severity=medium&amp;id=690dba651280f279b842fd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakyinjector-and-leakystealer-duo-hunts-for-crypt-f5059bf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakyInjector%20and%20LeakyStealer%20Duo%20Hunts%20For%20Crypto%20and%20Browser%20History&amp;severity=medium&amp;id=690dba651280f279b842fd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46413-use-of-password-hash-with-insuffici-7559e5b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46413%3A%20Use%20of%20password%20hash%20with%20insufficient%20computational%20effort%20in%20BUFFALO%20INC.%20WSR-1800AX4&amp;severity=medium&amp;id=690db7deafb341dfebb2fe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-coded-malicious-vs-code-extension-found-with--7826867f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe-Coded%20Malicious%20VS%20Code%20Extension%20Found%20with%20Built-In%20Ransomware%20Capabilities&amp;severity=medium&amp;id=690eb03c3a8fd010ecf2002f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64346-cwe-22-improper-limitation-of-a-pat-700a9e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64346%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jaredallard%20archives&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12527-cwe-862-missing-authorization-in-yy-b535c46f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12527%3A%20CWE-862%20Missing%20Authorization%20in%20yydevelopment%20Page%20%26%20Post%20Notes&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12520-cwe-79-improper-neutralization-of-i-b9c3f8fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Airbnb%20Review%20Slider&amp;severity=medium&amp;id=690d86fc82f4da9bb2f8a04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64343-cwe-289-authentication-bypass-by-al-98c81eba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64343%3A%20CWE-289%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20conda%20constructor&amp;severity=high&amp;id=690d838682f4da9bb2f4364e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64339-cwe-79-improper-neutralization-of-i-52c5b86b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64339%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=690d81c33ea13e495ecb0972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64336-cwe-79-improper-neutralization-of-i-e31649a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64336%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=690d79bf3ea13e495ec0cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4522-cwe-862-missing-authorization-in-the-a4eba6c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4522%3A%20CWE-862%20Missing%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=690d79bf3ea13e495ec0caf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4519-cwe-285-improper-authorization-in-th-b0fe8baa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4519%3A%20CWE-285%20Improper%20Authorization%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=high&amp;id=690d79bf3ea13e495ec0caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64328-cwe-78-improper-neutralization-of-s-7b278c42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64328%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20filestore&amp;severity=high&amp;id=690d71c16e13fd093e3db3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5483-cwe-862-missing-authorization-in-nia-1149b667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5483%3A%20CWE-862%20Missing%20Authorization%20in%20niaj%20Connector%20Wizard%20(formerly%20LC%20Wizard)&amp;severity=high&amp;id=690d71c16e13fd093e3db3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64323-cwe-862-missing-authorization-in-kg-4d199189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64323%3A%20CWE-862%3A%20Missing%20Authorization%20in%20kgateway-dev%20kgateway&amp;severity=medium&amp;id=690d65e75b03e68548857302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64184-cwe-22-improper-limitation-of-a-pat-c9922cf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64184%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcomics%20dosage&amp;severity=high&amp;id=690d65e75b03e685488572fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64180-cwe-367-time-of-check-time-of-use-t-ee12b800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64180%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Manager-io%20Manager&amp;severity=critical&amp;id=690d65e75b03e685488572fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11546-cwe-78-improper-neutralization-of-s-d690b3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11546%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NEC%20Corporation%20CLUSTERPRO%20X%20for%20Linux%20(EXPRESSCLUSTER%20X%20for%20Linux)&amp;severity=critical&amp;id=690d500c6b26dbd672d3921f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48985-vulnerability-in-vercel-ai-sdk-ff15e5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48985%3A%20Vulnerability%20in%20Vercel%20AI%20SDK&amp;severity=low&amp;id=690d4641dd7ca828ab196197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52662-vulnerability-in-vercel-nuxt-devtoo-ddb38cea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52662%3A%20Vulnerability%20in%20Vercel%20Nuxt%20Devtools&amp;severity=medium&amp;id=690d4641dd7ca828ab19619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remember-remember-the-fifth-of-november-e10a6632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remember%2C%20remember%20the%20fifth%20of%20November&amp;severity=medium&amp;id=690dba651280f279b842fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-07-23182676</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-07&amp;severity=medium&amp;id=690e8b920e7acb80660960cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63420-na-2c0c3583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63420%3A%20n%2Fa&amp;severity=medium&amp;id=690e653fde4eb1b9f756d67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60574-na-f1f4e398</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60574%3A%20n%2Fa&amp;severity=high&amp;id=690e653fde4eb1b9f756d67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63543-na-d3cdf1ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63543%3A%20n%2Fa&amp;severity=medium&amp;id=690e623c323c4112fbb14724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63544-na-af771253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63544%3A%20n%2Fa&amp;severity=medium&amp;id=690e59e81aa5a3f4ee1fc7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63640-na-2a62ff83</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63640%3A%20n%2Fa&amp;severity=medium&amp;id=690e52ee1aa5a3f4ee16c74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63639-na-1f2d55a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63639%3A%20n%2Fa&amp;severity=medium&amp;id=690e52ee1aa5a3f4ee16c748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63638-na-6e7e145a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63638%3A%20n%2Fa&amp;severity=medium&amp;id=690e5100c4445bd1e6cc8eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63718-na-b29569fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63718%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63713-na-947e9d57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63713%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61261-na-ab63001f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61261%3A%20n%2Fa&amp;severity=medium&amp;id=690e3d06dc0204d2f65bb8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63717-na-27268ed0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63717%3A%20n%2Fa&amp;severity=medium&amp;id=690e3861a7fbadd0a6bb15c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63716-na-70168f70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63716%3A%20n%2Fa&amp;severity=medium&amp;id=690e35acf29beb96f88f84af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63714-na-a8ff97a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63714%3A%20n%2Fa&amp;severity=medium&amp;id=690e3201f29beb96f88aff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57697-na-437e2ee0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57697%3A%20n%2Fa&amp;severity=medium&amp;id=690e3201f29beb96f88aff95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63785-na-f449aacf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63785%3A%20n%2Fa&amp;severity=medium&amp;id=690e23aa5ed2b3c9882b3444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57698-na-e0631ef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57698%3A%20n%2Fa&amp;severity=high&amp;id=690e23aa5ed2b3c9882b3438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63784-na-a05f8789</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63784%3A%20n%2Fa&amp;severity=medium&amp;id=690e20275ed2b3c988264701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63687-na-04697aee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63687%3A%20n%2Fa&amp;severity=medium&amp;id=690e1c1a5ed2b3c988210d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63783-na-8f83404a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63783%3A%20n%2Fa&amp;severity=high&amp;id=690e19295ed2b3c9881d11ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63686-na-b9514941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63686%3A%20n%2Fa&amp;severity=medium&amp;id=690e17530d6e36ffa27ab8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63689-na-4ab30e8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63689%3A%20n%2Fa&amp;severity=critical&amp;id=690e13c80d6e36ffa2758cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63691-na-6df29cbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63691%3A%20n%2Fa&amp;severity=critical&amp;id=690e10330d6e36ffa2711b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63690-na-24d195a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63690%3A%20n%2Fa&amp;severity=critical&amp;id=690e10330d6e36ffa2711b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12789-url-redirection-to-untrusted-site-o-f128c0fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12789%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20Single%20Sign-On%207&amp;severity=medium&amp;id=690d31bfc99da72cbe178d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58423-cwe-22-in-advantech-deviceoniedge-8a469319</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58423%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd5543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59171-cwe-22-in-advantech-deviceoniedge-46b94232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59171%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd5548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62630-cwe-22-in-advantech-deviceoniedge-42bf251b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62630%3A%20CWE-22%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=high&amp;id=690d258e790724a13ccd554d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11460-use-after-free-in-google-chrome-705b7beb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11460%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258d790724a13ccd5537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11458-heap-buffer-overflow-in-google-chro-5d3e6bd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11458%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258d790724a13ccd5533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11756-use-after-free-in-google-chrome-311a7470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11756%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258e790724a13ccd553b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12036-inappropriate-implementation-in-goo-da7c430d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12036%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690d258e790724a13ccd553f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64302-cwe-79-in-advantech-deviceoniedge-52d9eb42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64302%3A%20CWE-79%20in%20Advantech%20DeviceOn%2FiEdge&amp;severity=medium&amp;id=690d258e790724a13ccd5552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12636-cwe-522-in-ubia-ubox-0ca6d3c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12636%3A%20CWE-522%20in%20Ubia%20Ubox%20Android&amp;severity=medium&amp;id=690d258e790724a13ccd5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11219-use-after-free-in-google-chrome-6d401465</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11219%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=low&amp;id=690d1f62a155e591f58b6604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11216-inappropriate-implementation-in-goo-baf1c387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11216%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f62a155e591f58b6600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11215-off-by-one-error-in-google-chrome-542fb659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11215%3A%20Off%20by%20one%20error%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b65a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11213-inappropriate-implementation-in-goo-a985cc0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11213%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b659e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11212-inappropriate-implementation-in-goo-18d5d3a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11212%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11211-out-of-bounds-read-in-google-chrome-d935f395</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11211%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b6593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11210-side-channel-information-leakage-in-9b28a315</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11210%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b658e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11209-inappropriate-implementation-in-goo-4bcef65a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11209%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b658a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11208-inappropriate-implementation-in-goo-ab276424</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11208%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11207-side-channel-information-leakage-in-14e24c42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11207%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=medium&amp;id=690d1f60a155e591f58b6582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11206-heap-buffer-overflow-in-google-chro-7ca107d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11206%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b657e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11205-heap-buffer-overflow-in-google-chro-b21b8f53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11205%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=690d1f60a155e591f58b657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64179-cwe-862-missing-authorization-in-tr-b5542c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64179%3A%20CWE-862%3A%20Missing%20Authorization%20in%20treeverse%20lakeFS&amp;severity=medium&amp;id=690d1bd3a155e591f5870723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12125-improper-preservation-of-permission-e97f8f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12125%3A%20Improper%20Preservation%20of%20Permissions%20in%203scale%20porta&amp;severity=high&amp;id=690d1bd3a155e591f5870727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64178-cwe-918-server-side-request-forgery-fe16c62e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64178%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jon4hz%20jellysweep&amp;severity=high&amp;id=690d1871a155e591f583f3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sora-2-makes-videos-so-believable-reality-checks-a-5788fef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sora%202%20Makes%20Videos%20So%20Believable%2C%20Reality%20Checks%20Are%20Required&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64177-cwe-79-improper-neutralization-of-i-0e3f9198</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d1871a155e591f583f3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64176-cwe-20-improper-input-validation-in-7616768a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64176%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d131508e329e0f8f68c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12790-path-traversal-filename-in-red-hat--a0e4bac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12790%3A%20Path%20Traversal%3A%20&apos;..filename&apos;%20in%20Nicholas%20J%20Humfrey%20ruby-mqtt&amp;severity=high&amp;id=690d0f9108e329e0f8f19b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64327-cwe-918-server-side-request-forgery-4f7cf67c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64327%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MatiasDesuu%20ThinkDashboard&amp;severity=medium&amp;id=690d0f9108e329e0f8f19b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64326-cwe-212-improper-removal-of-sensiti-7ae919f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64326%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=690d0c0d08e329e0f8ef65ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-firewall-backups-stolen-by-nation-state--edd437ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Firewall%20Backups%20Stolen%20by%20Nation-State%20Actor&amp;severity=medium&amp;id=690eb1433a8fd010ecf2c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64174-cwe-79-improper-neutralization-of-i-889a5a08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64174%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenMage%20magento-lts&amp;severity=medium&amp;id=690d0c0d08e329e0f8ef65d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33110-cwe-80-improper-neutralization-of-s-0d93e084</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33110%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=690d0c0d08e329e0f8ef65c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64173-cwe-288-authentication-bypass-using-25a47fbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64173%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20apollographql%20router&amp;severity=high&amp;id=690d0c0d08e329e0f8ef65cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52881-cwe-61-unix-symbolic-link-symlink-f-22d5c489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52881%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690d06aae0be3996723e47c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12486-cwe-79-improper-neutralization-of-i-6bbf6296</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Heimdall%20Data%20Database%20Proxy&amp;severity=high&amp;id=690d06aae0be3996723e47da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12487-cwe-807-reliance-on-untrusted-input-ffa604f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12487%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=690d06aae0be3996723e47dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12488-cwe-807-reliance-on-untrusted-input-03a30621</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12488%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20oobabooga%20text-generation-webui&amp;severity=critical&amp;id=690d06aae0be3996723e47e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12490-cwe-22-improper-limitation-of-a-pat-d25efcdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12490%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense&amp;severity=high&amp;id=690d0327e0be3996723a126b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52565-cwe-61-unix-symbolic-link-symlink-f-11414537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52565%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690d0327e0be3996723a126f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34247-cwe-89-improper-neutralization-of-s-219bab26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cffa2e0be399672357164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34246-cwe-89-improper-neutralization-of-s-2520184f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34246%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a129c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34245-cwe-89-improper-neutralization-of-s-5424843e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34245%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34244-cwe-89-improper-neutralization-of-s-4aaee6a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34244%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34243-cwe-89-improper-neutralization-of-s-7ca826be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34243%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a128d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34242-cwe-89-improper-neutralization-of-s-03deb6ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34242%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0327e0be3996723a1288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34241-cwe-89-improper-neutralization-of-s-ec01adf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34241%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690d0327e0be3996723a1283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34240-cwe-89-improper-neutralization-of-s-201ea04b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34240%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34239-cwe-78-improper-neutralization-of-s-c0e954c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34239%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34238-cwe-22-improper-limitation-of-a-pat-e568d0e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34238%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34237-cwe-79-improper-neutralization-of-i-863e0efa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34236-cwe-79-improper-neutralization-of-i-e07ba982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Advantech%20WebAccess%2FVPN&amp;severity=medium&amp;id=690cfc1ee0be39967232fe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-infrastructure-finds-stability-with-auro-0ed63b44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Infrastructure%20Finds%20Stability%20with%20aurologic%20GmbH&amp;severity=medium&amp;id=690d0318e0be3996723a0747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31133-cwe-61-unix-symbolic-link-symlink-f-fb315234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31133%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20opencontainers%20runc&amp;severity=high&amp;id=690cf8a6e0be3996722ed9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22397-cwe-22-improper-limitation-of-a-pat-2acfe304</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22397%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Integrated%20Dell%20Remote%20Access%20Controller%209%2014G%20Versions&amp;severity=medium&amp;id=690cf8a6e0be3996722ed99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12815-cwe-283-unverified-ownership-in-aws-decaad33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12815%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20AWS%20Research%20and%20Engineering%20Studio%20(RES)&amp;severity=medium&amp;id=690cd9af1c9f718888294807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10885-cwe-250-execution-with-unnecessary--e1fc50b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10885%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Autodesk%20Installer&amp;severity=high&amp;id=690cd7dc70ae18879c793e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12485-cwe-269-improper-privilege-manageme-21312e47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12485%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Devolutions%20Server&amp;severity=high&amp;id=690cd45870ae18879c759e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12808-cwe-284-improper-access-control-in--a86a6461</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12808%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=690cd0d370ae18879c72e598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/7-new-chatgpt-vulnerabilities-let-hackers-steal-da-dd3d7205</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=7%20New%20ChatGPT%20Vulnerabilities%20Let%20Hackers%20Steal%20Data%20and%20Hijack%20Memory&amp;severity=medium&amp;id=690ccd4d70ae18879c71a563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64287-improper-control-of-filename-for-in-c9143514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64287%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Alloggio%20-%20Hotel%20Booking&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64232-improper-neutralization-of-input-du-b6010889</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Import%20from%20YML&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64224-improper-neutralization-of-input-du-ab1bd953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeGoods%20Grand%20Conference%20Theme%20Custom%20Post%20Type&amp;severity=high&amp;id=690cc81eca26fb4dd2f59cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64198-improper-neutralization-of-input-du-0c8bc194</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appscreo%20Easy%20Social%20Share%20Buttons&amp;severity=high&amp;id=690cc81eca26fb4dd2f59ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64196-improper-neutralization-of-input-du-97a4dd87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=690cc81eca26fb4dd2f59ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6327-unrestricted-upload-of-file-with-dan-ac142e1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6327%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=critical&amp;id=690cc81eca26fb4dd2f59cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6325-incorrect-privilege-assignment-in-ki-ac0fa496</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6325%3A%20Incorrect%20Privilege%20Assignment%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=critical&amp;id=690cc81eca26fb4dd2f59cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62950-cross-site-request-forgery-csrf-in--725d6875</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62950%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=medium&amp;id=690cc81eca26fb4dd2f59ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62914-missing-authorization-in-anibalwain-14b82191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62914%3A%20Missing%20Authorization%20in%20anibalwainstein%20Effect%20Maker&amp;severity=medium&amp;id=690cc81aca26fb4dd2f59c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62076-improper-neutralization-of-input-du-41787187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62075-improper-control-of-filename-for-in-2f7be238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62075%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62074-improper-neutralization-of-input-du-e16e8cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amauri%20WPMobile.App&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62067-improper-control-of-filename-for-in-ab0bf6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62067%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Savory&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62066-improper-control-of-filename-for-in-bd8c37a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62066%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fuelthemes%20Revolution&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62065-unrestricted-upload-of-file-with-da-f700e695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62065%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Rometheme%20RTMKit&amp;severity=critical&amp;id=690cc81aca26fb4dd2f59c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62064-authentication-bypass-using-an-alte-67539e0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62064%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Search%20%26%20Go&amp;severity=critical&amp;id=690cc81aca26fb4dd2f59c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62059-improper-neutralization-of-input-du-001f8598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20SureRank&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62057-improper-neutralization-of-input-du-ebe11a9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=690cc81aca26fb4dd2f59c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62055-improper-control-of-filename-for-in-f5be0d76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62055%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elated-Themes%20Academist&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62053-improper-control-of-filename-for-in-0ac312de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62053%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62051-improper-neutralization-of-input-du-40cb62a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62049-missing-authorization-in-stylemix-c-810a77fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62049%3A%20Missing%20Authorization%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62047-unrestricted-upload-of-file-with-da-91d8cb9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62047%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Case-Themes%20Case%20Addons&amp;severity=critical&amp;id=690cc816ca26fb4dd2f59b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62046-missing-authorization-in-codextheme-e2c697cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62046%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem%20Demo%20Import%20(for%20WPBakery)&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62045-improper-control-of-filename-for-in-89499e84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62045%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62044-improper-neutralization-of-input-du-2c42e2fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20Theme%20Elements%20(for%20WPBakery)&amp;severity=medium&amp;id=690cc816ca26fb4dd2f59b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62041-improper-neutralization-of-input-du-66464271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62040-improper-neutralization-of-input-du-a30fb70b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YOP%20YOP%20Poll&amp;severity=high&amp;id=690cc816ca26fb4dd2f59b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62039-insertion-of-sensitive-information--6d353a5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62039%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ays%20Pro%20AI%20ChatBot%20with%20ChatGPT%20and%20Content%20Generator%20by%20AYS&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62038-insertion-of-sensitive-information--bbd419f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62038%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Sovlix%20MeetingHub&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62037-missing-authorization-in-uxper-togo-9977a3a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62037%3A%20Missing%20Authorization%20in%20uxper%20Togo&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62036-improper-neutralization-of-input-du-4677544d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62035-deserialization-of-untrusted-data-i-f824e158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62035%3A%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62034-incorrect-privilege-assignment-in-u-3f16263a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62034%3A%20Incorrect%20Privilege%20Assignment%20in%20uxper%20Togo&amp;severity=high&amp;id=690cc814ca26fb4dd2f59b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62033-missing-authorization-in-uxper-togo-2bc7f19c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62033%3A%20Missing%20Authorization%20in%20uxper%20Togo&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62032-improper-neutralization-of-input-du-adefbc7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Cloud%20Library&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62031-improper-neutralization-of-input-du-febed961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=high&amp;id=690cc814ca26fb4dd2f59afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62030-improper-neutralization-of-input-du-edc07529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=690cc814ca26fb4dd2f59afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62028-missing-authorization-in-themenecta-3430ee51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62028%3A%20Missing%20Authorization%20in%20ThemeNectar%20Salient&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62018-missing-authorization-in-hogash-kal-afb9b8d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62018%3A%20Missing%20Authorization%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62017-missing-authorization-in-hogash-kal-5ca74e98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62017%3A%20Missing%20Authorization%20in%20hogash%20KALLYAS&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62016-unrestricted-upload-of-file-with-da-aebc8057</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62016%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hogash%20KALLYAS&amp;severity=critical&amp;id=690cc810ca26fb4dd2f596ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62014-improper-control-of-filename-for-in-12fe845b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20ITok&amp;severity=high&amp;id=690cc810ca26fb4dd2f596a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62012-improper-neutralization-of-input-du-05ebc36f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62011-improper-neutralization-of-input-du-a26f242e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodexThemes%20TheGem&amp;severity=medium&amp;id=690cc810ca26fb4dd2f596a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62010-improper-control-of-filename-for-in-0b033482</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62010%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Famita&amp;severity=high&amp;id=690cc810ca26fb4dd2f5969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60248-improper-control-of-filename-for-in-7e98aa9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60248%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPClever%20WPC%20Product%20Options%20for%20WooCommerce&amp;severity=high&amp;id=690cc810ca26fb4dd2f5969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60247-missing-authorization-in-bux-bux-wo-1a7533cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60247%3A%20Missing%20Authorization%20in%20Bux%20Bux%20Woocommerce&amp;severity=medium&amp;id=690cc810ca26fb4dd2f59697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60244-improper-neutralization-of-script-r-8ffeaee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60244%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20RealMag777%20TableOn&amp;severity=high&amp;id=690cc80cca26fb4dd2f595e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60243-incorrect-privilege-assignment-in-h-b129cfb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60243%3A%20Incorrect%20Privilege%20Assignment%20in%20Holest%20Engineering%20Selling%20Commander%20for%20WooCommerce&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60242-improper-limitation-of-a-pathname-t-f6facc5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60242%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Anatoly%20Download%20Counter&amp;severity=high&amp;id=690cc80cca26fb4dd2f595e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60240-improper-control-of-filename-for-in-dc15f2ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60240%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alexander%20AnyComment&amp;severity=high&amp;id=690cc80cca26fb4dd2f595df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60239-improper-neutralization-of-special--f66272de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60239%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=high&amp;id=690cc80cca26fb4dd2f595dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60235-unrestricted-upload-of-file-with-da-9bb9a303</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60235%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Plugify%20Support%20Ticket%20System%20for%20WooCommerce%20(Premium)&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60207-unrestricted-upload-of-file-with-da-d80d98f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60207%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Addify%20Custom%20User%20Registration%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=690cc80cca26fb4dd2f595d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60204-improper-control-of-filename-for-in-70b6ee9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60204%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Josh%20Kohlbach%20WooCommerce%20Store%20Toolkit&amp;severity=high&amp;id=690cc80cca26fb4dd2f595d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60203-improper-control-of-filename-for-in-de31576a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60203%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Josh%20Kohlbach%20Store%20Exporter&amp;severity=high&amp;id=690cc80cca26fb4dd2f595d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60202-improper-control-of-filename-for-in-0c533443</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60202%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Kyle%20Phillips%20Favorites&amp;severity=high&amp;id=690cc80cca26fb4dd2f595cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60201-improper-control-of-filename-for-in-4db0e833</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60201%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=high&amp;id=690cc809ca26fb4dd2f594e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60200-improper-control-of-filename-for-in-f60d3d30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60200%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20LearnPress%20Export%20Import&amp;severity=high&amp;id=690cc809ca26fb4dd2f594e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60199-improper-control-of-filename-for-in-32038179</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60199%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20InHype%20-%20Blog%20%26%20Magazine%20WordPress%20Theme&amp;severity=high&amp;id=690cc809ca26fb4dd2f594de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60198-improper-control-of-filename-for-in-d7902855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60198%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20Saxon%20-%20Viral%20Content%20Blog%20%26%20Magazine%20Marketing%20WordPress%20Theme&amp;severity=high&amp;id=690cc809ca26fb4dd2f594db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60197-improper-control-of-filename-for-in-68df6462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60197%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20owenr88%20Simple%20Contact%20Forms&amp;severity=high&amp;id=690cc809ca26fb4dd2f594d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60196-improper-control-of-filename-for-in-c8629ef1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60196%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Clearblue%20Clearblue%C2%AE%20Ovulation%20Calculator&amp;severity=high&amp;id=690cc809ca26fb4dd2f594d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60195-incorrect-privilege-assignment-in-v-ae37057d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60195%3A%20Incorrect%20Privilege%20Assignment%20in%20Vito%20Peleg%20Atarim&amp;severity=critical&amp;id=690cc809ca26fb4dd2f594d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60194-improper-control-of-filename-for-in-233bcd35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60194%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=high&amp;id=690cc809ca26fb4dd2f594cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60193-improper-control-of-filename-for-in-d69e0ec6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60193%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=high&amp;id=690cc809ca26fb4dd2f594cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60192-improper-control-of-filename-for-in-96eee885</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60192%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=high&amp;id=690cc809ca26fb4dd2f594c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60191-improper-control-of-filename-for-in-0e13e8f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60191%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Wishlist%20for%20WooCommerce&amp;severity=high&amp;id=690cc801ca26fb4dd2f593f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60190-improper-control-of-filename-for-in-4a51c0d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60190%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hinnerk%20Altenburg%20Immocaster%20WordPress%20Plugin&amp;severity=high&amp;id=690cc801ca26fb4dd2f593ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60189-improper-control-of-filename-for-in-2ab3885c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60189%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PoloPag%20PoloPag%20%26%238211%3B%20Pix%20Autom%C3%A1tico%20para%20Woocommerce&amp;severity=high&amp;id=690cc801ca26fb4dd2f593ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60188-insertion-of-sensitive-information--61ea6cde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60188%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vito%20Peleg%20Atarim&amp;severity=high&amp;id=690cc801ca26fb4dd2f593e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60187-unrestricted-upload-of-file-with-da-8f913a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60187%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vito%20Peleg%20Atarim&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60074-improper-control-of-filename-for-in-56758241</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60074%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Lazy%20Load%20Optimizer&amp;severity=high&amp;id=690cc801ca26fb4dd2f593e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60073-improper-control-of-filename-for-in-05961d47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60073%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Processby%20Responsive%20Sidebar&amp;severity=high&amp;id=690cc801ca26fb4dd2f593de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59556-improper-neutralization-of-input-du-61d92859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20GoStore&amp;severity=high&amp;id=690cc801ca26fb4dd2f593d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58998-deserialization-of-untrusted-data-i-2dfbc093</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58998%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58996-unrestricted-upload-of-file-with-da-5ddb7c95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58996%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58995-improper-control-of-filename-for-in-6fc263ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58995%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creatives_Planet%20Leblix&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58994-improper-control-of-filename-for-in-e1080e64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58994%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Greenify&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58986-missing-authorization-in-ganddser-j-25ea8b2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58986%3A%20Missing%20Authorization%20in%20ganddser%20Jock%20On%20Air%20Now%20(JOAN)&amp;severity=medium&amp;id=690cc7f7ca26fb4dd2f590b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58972-path-traversal-in-dmitry-v-ceo-of-u-fb5c3105</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58972%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58964-improper-neutralization-of-input-du-cb2d9559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Enzy&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58638-improper-neutralization-of-input-du-151a9787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Institutions%20Directory&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58636-deserialization-of-untrusted-data-i-bb216451</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58636%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Keap%2FInfusionsoft&amp;severity=critical&amp;id=690cc7f7ca26fb4dd2f590a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58629-missing-authorization-in-kamleshyad-6038c386</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58629%3A%20Missing%20Authorization%20in%20kamleshyadav%20Miraculous&amp;severity=high&amp;id=690cc7f7ca26fb4dd2f590a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58627-authorization-bypass-through-user-c-41381fa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58627%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=critical&amp;id=690cc7f5ca26fb4dd2f59062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58619-deserialization-of-untrusted-data-i-743adc33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58619%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sbouey%20Falang%20multilanguage&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f5905f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58595-authentication-bypass-by-spoofing-i-6472f50b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58595%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Saad%20Iqbal%20All%20In%20One%20Login&amp;severity=critical&amp;id=690cc7f5ca26fb4dd2f5905c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58592-deserialization-of-untrusted-data-i-95585646</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58592%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20TranslatePress&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f59059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58243-missing-authorization-in-jthemes-im-66c08558</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58243%3A%20Missing%20Authorization%20in%20Jthemes%20imEvent&amp;severity=medium&amp;id=690cc7f5ca26fb4dd2f59056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58207-missing-authorization-in-wp-messiah-81900cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58207%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=high&amp;id=690cc7f5ca26fb4dd2f59053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5803-missing-authorization-in-e4jvikwp-vi-586d966e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5803%3A%20Missing%20Authorization%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=high&amp;id=690cc801ca26fb4dd2f593db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54737-improper-neutralization-of-input-du-2cd33b0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f59050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54722-improper-neutralization-of-input-du-d51ac229</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ex-Themes%20WooTour&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f5904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54721-improper-neutralization-of-input-du-db451d62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Resca&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f5904a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54719-deserialization-of-untrusted-data-i-33975485</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54719%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Yogi%20-%20Health%20Beauty%20%26%20Yoga&amp;severity=high&amp;id=690cc7f4ca26fb4dd2f59045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54718-improper-neutralization-of-input-du-a26043f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Yogi%20-%20Health%20Beauty%20%26%20Yoga&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54711-missing-authorization-in-bplugins-i-131867df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54711%3A%20Missing%20Authorization%20in%20bPlugins%20Info%20Cards&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53586-deserialization-of-untrusted-data-i-9f68c363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53586%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20WeMusic&amp;severity=critical&amp;id=690cc7f2ca26fb4dd2f58ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53585-improper-neutralization-of-input-du-2b1ffa90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20WeMusic&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53574-improper-neutralization-of-input-du-e382b85b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ptibogxiv%20Doliconnect&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53573-improper-neutralization-of-input-du-6c1993ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Epic%20Review&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53349-improper-neutralization-of-input-du-cd984c4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Laborator%20Kalium&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53324-improper-neutralization-of-input-du-26fd73dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53316-cross-site-request-forgery-csrf-in--393a07f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53316%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20WP%20GDPR%20Cookie%20Consent&amp;severity=high&amp;id=690cc7f2ca26fb4dd2f58b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53286-improper-neutralization-of-input-du-69e55344</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jhainey%20Milevis%20Dropify&amp;severity=medium&amp;id=690cc7f2ca26fb4dd2f58b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53283-unrestricted-upload-of-file-with-da-3e4237c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53283%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20borisolhor%20Drop%20Uploader%20for%20CF7%20-%20Drag%26Drop%20File%20Uploader%20Addon&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53252-improper-control-of-filename-for-in-ee9f667a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53252%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zozothemes%20Zegen&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53246-missing-authorization-in-gaurav-agg-1296edd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53246%3A%20Missing%20Authorization%20in%20Gaurav%20Aggarwal%20Backup%20and%20Move&amp;severity=high&amp;id=690cc7f0ca26fb4dd2f58b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53245-improper-neutralization-of-input-du-917a563d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Afzal%20Multani%20WP%20Logo%20Changer&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53242-deserialization-of-untrusted-data-i-9290cf85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53242%3A%20Deserialization%20of%20Untrusted%20Data%20in%20VictorThemes%20Seil&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53239-improper-neutralization-of-input-du-3a81bda6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bnovotny%20User%20Registration%20Aide&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53214-missing-authorization-in-sertifier--42ae7fce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53214%3A%20Missing%20Authorization%20in%20sertifier%20Sertifier%20Certificate%20%26%20Badge%20Maker&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52773-improper-neutralization-of-special--9b0c4b8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52773%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hiecor%20HieCOR%20Payment%20Gateway%20Plugin&amp;severity=critical&amp;id=690cc7f0ca26fb4dd2f58b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52764-improper-neutralization-of-input-du-c4c9ad04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marielav%20flexoslider&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49909-improper-neutralization-of-input-du-16ef2e34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Bookmark%20%26%20Follow&amp;severity=medium&amp;id=690cc7f0ca26fb4dd2f58b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49905-improper-neutralization-of-input-du-faa8af29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsCafe%20Range%20Slider%20Addon%20for%20Gravity%20Forms&amp;severity=medium&amp;id=690cc7eeca26fb4dd2f58b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49904-improper-neutralization-of-input-du-7f303d99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=medium&amp;id=690cc7eeca26fb4dd2f58b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49900-incorrect-privilege-assignment-in-b-55fe2f85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49900%3A%20Incorrect%20Privilege%20Assignment%20in%20bPlugins%20Advanced%20scrollbar&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49394-missing-authorization-in-bplugins-i-9336cb5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49394%3A%20Missing%20Authorization%20in%20bPlugins%20Image%20Gallery%20block%20%E2%80%93%20Create%20and%20display%20photo%20gallery%2Fphoto%20album.&amp;severity=high&amp;id=690cc7edca26fb4dd2f58b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49393-deserialization-of-untrusted-data-i-f970e6f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49393%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49390-improper-neutralization-of-input-du-57b20c2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20christophrado%20Cookie%20Notice%20%26%20Consent&amp;severity=medium&amp;id=690cc7edca26fb4dd2f58b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49386-deserialization-of-untrusted-data-i-f5af9d35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49386%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Scott%20Reilly%20Preserve%20Code%20Formatting&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49372-improper-control-of-generation-of-c-6c75e0af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49372%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20VillaTheme%20HAPPY&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48330-improper-control-of-filename-for-in-729bc385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48330%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48290-improper-control-of-filename-for-in-d4b0f559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48290%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bslthemes%20Kinsley&amp;severity=critical&amp;id=690cc7edca26fb4dd2f58afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48090-path-traversal-in-cocobasic-blanka--58fd83cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48090%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20CocoBasic%20Blanka%20-%20One%20Page%20WordPress%20Theme&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48089-improper-neutralization-of-special--2b2cfbd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48089%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rainbow-Themes%20Education%20WordPress%20Theme%20%7C%20HiStudy&amp;severity=critical&amp;id=690cc7cdca26fb4dd2f57a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48086-deserialization-of-untrusted-data-i-05956df8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48086%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpdreams%20Ajax%20Search%20Lite&amp;severity=critical&amp;id=690cc7cdca26fb4dd2f57a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48085-cross-site-request-forgery-csrf-in--0025c22e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48085%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZIPANG%20Simple%20Stripe&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48083-cross-site-request-forgery-csrf-in--c74fe185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48083%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andriassundskard%20wpNamedUsers&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48078-cross-site-request-forgery-csrf-in--a6b8061f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48078%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Norbert%20Slick%20Google%20Map&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48077-cross-site-request-forgery-csrf-in--ed600bf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48077%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nitinmaurya12%20Block%20Country&amp;severity=high&amp;id=690cc7cdca26fb4dd2f57a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47588-improper-control-of-generation-of-c-fa9ccb57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47588%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20acowebs%20Dynamic%20Pricing%20With%20Discount%20Rules%20for%20WooCommerce&amp;severity=critical&amp;id=690cc7caca26fb4dd2f57a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39468-improper-control-of-filename-for-in-368ce5a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39468%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=critical&amp;id=690cc7caca26fb4dd2f57a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39467-path-traversal-in-mikado-themes-wan-02bfd5d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39467%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20Wanderland&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39466-improper-control-of-filename-for-in-8ffe6ee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39466%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20D%C3%B8r&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39465-missing-authorization-in-flippercod-20f09185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39465%3A%20Missing%20Authorization%20in%20flippercode%20Advanced%20Google%20Maps&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39463-improper-control-of-filename-for-in-94f6103a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39463%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Select-Themes%20Dessau&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32222-improper-control-of-generation-of-c-12513e85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32222%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Widgetlogic.org%20Widget%20Logic&amp;severity=critical&amp;id=690cc7c9ca26fb4dd2f57a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31029-improper-neutralization-of-input-du-9cc9d3dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31029%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bingu%20replyMail&amp;severity=medium&amp;id=690cc7c9ca26fb4dd2f57a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28953-improper-neutralization-of-special--edba27f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28953%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20axiomthemes%20smart%20SEO&amp;severity=high&amp;id=690cc7c9ca26fb4dd2f57a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22288-path-traversal-in-wpmu-dev-your-all-cd6b88d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22288%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Smush%20Image%20Compression%20and%20Optimization&amp;severity=medium&amp;id=690cc7c9ca26fb4dd2f57a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-hack-chatgpt-memories-and-web-search-f-157f1281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Hack%20ChatGPT%20Memories%20and%20Web%20Search%20Features&amp;severity=medium&amp;id=690cc3ca2a1e959dda36d66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12556-cwe-88-improper-neutralization-of-a-9a433af2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12556%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20IDIS%20ICM%20Viewer&amp;severity=high&amp;id=690cc3e82a1e959dda36da33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojanized-eset-installers-drop-kalambur-backdoor--7409e011</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojanized%20ESET%20Installers%20Drop%20Kalambur%20Backdoor%20in%20Phishing%20Attacks%20on%20Ukraine&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leakyinjector-and-leakystealer-duo-hunts-for-crypt-2de545d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeakyInjector%20and%20LeakyStealer%20Duo%20Hunts%20For%20Crypto%20and%20Browser%20History&amp;severity=medium&amp;id=690cbccf2a1e959dda31c62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-new-firewall-attack-exploiting-cve--68eddc4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20New%20Firewall%20Attack%20Exploiting%20CVE-2025-20333%20and%20CVE-2025-20362&amp;severity=medium&amp;id=690eb03c3a8fd010ecf20035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11956-cwe-79-improper-neutralization-of-i-85ad9854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=690cb9462a1e959dda2bef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10955-cwe-79-improper-neutralization-of-i-407fe68b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10955%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20Software%20Inc.%20Netigma&amp;severity=medium&amp;id=690cb9462a1e959dda2bef56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37735-cwe-281-improper-preservation-of-pe-f9688ea3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37735%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Elastic%20Kibana&amp;severity=high&amp;id=690cb5652a1e959dda296a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-returns-what-goodies-did-they-bring-9f3bb99b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gootloader%20Returns%3A%20What%20Goodies%20Did%20They%20Bring%3F&amp;severity=medium&amp;id=690cb1e3ad97a06a3c494305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36054-cwe-79-improper-neutralization-of-i-7dba545d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Business%20Automation%20Workflow%20containers&amp;severity=medium&amp;id=690cb1f4ad97a06a3c497cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sandworm-hackers-use-data-wipers-to-disrupt-ukrain-a860235c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sandworm%20hackers%20use%20data%20wipers%20to%20disrupt%20Ukraine&apos;s%20grain%20sector&amp;severity=high&amp;id=690caad5ad97a06a3c439c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rigged-poker-games-schneier-on-security-201e9aef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rigged%20Poker%20Games%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=690caad5ad97a06a3c439c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cavalry-werewolf-hackers-hit-russian-government-or-c9c68d9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cavalry%20Werewolf%20Hackers%20Hit%20Russian%20Government%20Organization%20with%20New%20ShellNET%20Backdoor&amp;severity=medium&amp;id=690ca3d1ad97a06a3c3cb0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evading-elastic-edrs-call-stack-signatures-with-ca-9965f623</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evading%20Elastic%20EDR&apos;s%20call%20stack%20signatures%20with%20call%20gadgets&amp;severity=medium&amp;id=690ca3e8ad97a06a3c3cbf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/follow-pragmatic-interventions-to-keep-agentic-ai--66decd0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Follow%20Pragmatic%20Interventions%20to%20Keep%20Agentic%20AI%20in%20Check&amp;severity=low&amp;id=690c98f748bc5002b4ff8001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defi-protocol-balancer-starts-recovering-funds-sto-e53d6abb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeFi%20Protocol%20Balancer%20Starts%20Recovering%20Funds%20Stolen%20in%20%24128%20Million%20Heist&amp;severity=medium&amp;id=690c91ee48bc5002b4fd58d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-ransomware-attack-started-months-before-it--10bd6374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20Ransomware%20Attack%20Started%20Months%20Before%20It%20Was%20Discovered%2C%20Per%20Report&amp;severity=medium&amp;id=690c8e7448bc5002b4fc803b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ai-tools-in-malware-botnets-gd-4a8a37eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20AI%20Tools%20in%20Malware%2C%20Botnets%2C%20GDI%20Flaws%2C%20Election%20Attacks%20%26%20More&amp;severity=medium&amp;id=690eb03c3a8fd010ecf2003b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-are-the-best-practices-for-reducing-ecommerce-7c11e0af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20are%20the%20best%20practices%20for%20reducing%20ecommerce%20payment%20fraud%3F&amp;severity=medium&amp;id=690c876b48bc5002b4faf504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automotive-it-firm-hyundai-autoever-discloses-data-f4ca9aec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automotive%20IT%20Firm%20Hyundai%20AutoEver%20Discloses%20Data%20Breach&amp;severity=medium&amp;id=690c83de48bc5002b4fa1dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-acrobat-2020-end-of-life-06829c29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Acrobat%202020%20End%20of%20Life&amp;severity=medium&amp;id=690c796c48bc5002b4f627d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-patches-critical-vulnerabilities-in-contact--a8856138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Patches%20Critical%20Vulnerabilities%20in%20Contact%20Center%20Appliance&amp;severity=critical&amp;id=690c795248bc5002b4f619ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-d997c4d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Windows%20Hyper-V%20to%20Hide%20Linux%20VM%20and%20Evade%20EDR%20Detection&amp;severity=high&amp;id=690c796c48bc5002b4f627d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-chatgpt-security-bugs-allow-rampant-data--397f2d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20ChatGPT%20Security%20Bugs%20Allow%20Rampant%20Data%20Theft&amp;severity=low&amp;id=690c724d48bc5002b4f026d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-hackers-stole-sonicwall-cloud-back-bf5ab30c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Hackers%20Stole%20SonicWall%20Cloud%20Backups%20in%20Recent%20Attack&amp;severity=medium&amp;id=690c727448bc5002b4f05843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fedora-linux-41-end-of-life-b92135b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fedora%20Linux%2041%20End%20of%20Life&amp;severity=medium&amp;id=690c6b4b48bc5002b4e8a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11268-cwe-79-improper-neutralization-of-i-acfd61c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=690c621403d968117476fb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12360-cwe-285-improper-authorization-in-c-71462715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12360%3A%20CWE-285%20Improper%20Authorization%20in%20codesolz%20Better%20Find%20and%20Replace%20%E2%80%93%20AI-Powered%20Suggestions&amp;severity=medium&amp;id=690c517b03d96811746f9a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-windows-hyper-v-to-hide-linux-vm-2b4db4be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20Windows%20Hyper-V%20to%20Hide%20Linux%20VM%20and%20Evade%20EDR%20Detection&amp;severity=medium&amp;id=690c513803d96811746f64b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10259-cwe-1284-improper-validation-of-spe-008ec737</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10259%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=690c4cee03d96811746c8703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12471-cwe-79-improper-neutralization-of-i-f02d371f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12471%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nerdpressteam%20Hubbub%20Lite%20%E2%80%93%20Fast%2C%20free%20social%20sharing%20and%20follow%20buttons&amp;severity=medium&amp;id=690c45e503d96811746b0702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9338-cwe-119-improper-restriction-of-oper-7c577b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9338%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=690c3ee903d9681174680384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-confirms-state-sponsored-hackers-behind--4f512768</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Confirms%20State-Sponsored%20Hackers%20Behind%20September%20Cloud%20Backup%20Breach&amp;severity=medium&amp;id=690c37c603d968117461108a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12560-cwe-918-server-side-request-forgery-be79bb7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12560%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=690c37e403d968117461160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11271-cwe-807-reliance-on-untrusted-input-82bf2d88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11271%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=690c27e36cabeda23dacfe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12563-cwe-862-missing-authorization-in-pr-4c17214d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12563%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=690c27e36cabeda23dacfe9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61994-cross-site-scripting-xss-in-growi-i-3781f18c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61994%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=690c245f6cabeda23da8ace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10691-cwe-352-cross-site-request-forgery--b7fcb326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10691%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=medium&amp;id=690c1959fd0d6d226485656f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10683-cwe-89-improper-neutralization-of-s-632e66d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10683%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20yudiz%20Easy%20Email%20Subscription&amp;severity=medium&amp;id=690c0ec4fd0d6d226483c9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/binary-breadcrumbs-correlating-malware-samples-wit-85dde6fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%26%23x5b%3BGuest%20Diary%26%23x5d%3B%2C%20(Wed%2C%20Nov%205th)&amp;severity=medium&amp;id=690c09dcfd0d6d2264828491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-bronze-butler-exploits-zero-day-to-root-japan--8a6c8023</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20&apos;Bronze%20Butler&apos;%20Exploits%20Zero-Day%20to%20Root%20Japan%20Orgs&amp;severity=critical&amp;id=690c042bfd0d6d22647d78f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gootloader-malware-is-back-with-new-tricks-after-7-0fcc26c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gootloader%20malware%20is%20back%20with%20new%20tricks%20after%207-month%20break&amp;severity=high&amp;id=690bebb6fd0d6d226463faa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64171-cwe-862-missing-authorization-in-3s-ce6d0c03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64171%3A%20CWE-862%3A%20Missing%20Authorization%20in%203scale-sre%20marin3r&amp;severity=high&amp;id=690bef58fd0d6d2264685b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hyundai-autoever-america-data-breach-exposes-ssns--4993b304</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hyundai%20AutoEver%20America%20data%20breach%20exposes%20SSNs%2C%20drivers%20licenses&amp;severity=high&amp;id=690be821fd0d6d22645fbcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-06-83c82901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-06&amp;severity=medium&amp;id=690d3944c99da72cbe1ff26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63551-na-83e9aa6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63551%3A%20n%2Fa&amp;severity=high&amp;id=690cfba3e0be39967232b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60541-na-6e2eb37d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60541%3A%20n%2Fa&amp;severity=high&amp;id=690cfba3e0be39967232b9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27919-na-7e2ea11d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27919%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f718888294817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27918-na-c2275be1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27918%3A%20n%2Fa&amp;severity=critical&amp;id=690cd9af1c9f718888294813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27917-na-50d9712d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27917%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f71888829480e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27916-na-b487ea7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27916%3A%20n%2Fa&amp;severity=high&amp;id=690cd9af1c9f71888829480a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63560-na-db0dd909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63560%3A%20n%2Fa&amp;severity=high&amp;id=690cd45870ae18879c759e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59396-na-39f3cc84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59396&amp;severity=null&amp;id=690cd0d370ae18879c72e59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63589-na-c11f6a8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63589%3A%20n%2Fa&amp;severity=high&amp;id=690ccd5c70ae18879c71a8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63588-na-0d89e966</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63588%3A%20n%2Fa&amp;severity=high&amp;id=690ccd5c70ae18879c71a8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63307-na-ecd21af8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63307%3A%20n%2Fa&amp;severity=high&amp;id=690cc9d770ae18879c6de90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59392-na-0b55d9d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59392%3A%20n%2Fa&amp;severity=medium&amp;id=690cc801ca26fb4dd2f593d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64114-cwe-89-improper-neutralization-of-s-c4d85aef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64114%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690bdff52de49fb2b59d6991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62596-cwe-61-unix-symbolic-link-symlink-f-8855d46f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62596%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=690bdc882de49fb2b5990aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-personal-data-and-17000-slack-messag-0b9634fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Steal%20Personal%20Data%20and%2017%2C000%2B%20Slack%20Messages%20in%20Nikkei%20Data%20Breach&amp;severity=high&amp;id=690bdc6f2de49fb2b598fda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62161-cwe-363-race-condition-enabling-lin-20d92f00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62161%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=690bdc882de49fb2b5990a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55278-cwe-613-insufficient-session-expira-569288c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55278%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20DevOps%20Loop&amp;severity=high&amp;id=690bd5375c8b8caf26f32450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nikkei-suffers-breach-via-slack-compromise-bb6c5ccb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nikkei%20Suffers%20Breach%20Via%20Slack%20Compromise&amp;severity=medium&amp;id=690c087afd0d6d22648229e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12779-cwe-497-access-of-sensitive-system--923d280a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12779%3A%20CWE-497%20Access%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Amazon%20Amazon%20WorkSpaces&amp;severity=high&amp;id=690bc2956ab8174a0d403370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/half-of-the-worlds-satellite-traffic-is-unencrypte-74621f21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Half%20of%20the%20world&apos;s%20satellite%20traffic%20is%20unencrypted%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=690bb050976718a7330913ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-uncovers-promptflux-malware-that-uses-gemin-aef26eb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Uncovers%20PROMPTFLUX%20Malware%20That%20Uses%20Gemini%20AI%20to%20Rewrite%20Its%20Code%20Hourly&amp;severity=high&amp;id=690bb027976718a733090a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/university-of-pennsylvania-confirms-data-stolen-in-4e808e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=University%20of%20Pennsylvania%20confirms%20data%20stolen%20in%20cyberattack&amp;severity=high&amp;id=690baca3976718a73305f3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-carriers-to-block-spoofed-phone-numbers-in-frau-60eb0d73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20carriers%20to%20block%20spoofed%20phone%20numbers%20in%20fraud%20crackdown&amp;severity=high&amp;id=690baca3976718a73305f3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-says-state-sponsored-hackers-behind-sept-955116cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20says%20state-sponsored%20hackers%20behind%20September%20security%20breach&amp;severity=high&amp;id=690baca3976718a73305f3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-critical-centos-web-panel-bug-exploi-197deaee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20critical%20CentOS%20Web%20Panel%20bug%20exploited%20in%20attacks&amp;severity=critical&amp;id=690baca3976718a73305f3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10853-cwe-79-improper-neutralization-of-i-fc4c8e11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=690ba5a1976718a733ff3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crossed-wires-a-case-study-of-iranian-espionage-an-24932ba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crossed%20wires%3A%20a%20case%20study%20of%20Iranian%20espionage%20and%20attribution&amp;severity=medium&amp;id=690bc71a5c8b8caf26e670c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5770-cwe-79-improper-neutralization-of-in-c5156c6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=690ba217976718a733fdd256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43418-an-attacker-with-physical-access-to-e81b086e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43418%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690b9d3f5191fb7cf2298936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43000-processing-maliciously-crafted-web--6b2720b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43000%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=690b9d3f5191fb7cf2298925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12745-buffer-over-read-in-quickjs-c448c738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12745%3A%20Buffer%20Over-read%20in%20QuickJS&amp;severity=medium&amp;id=690b9d3f5191fb7cf229892d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11093-cwe-94-improper-control-of-generati-4775beb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11093%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WSO2%20WSO2%20Micro%20Integrator&amp;severity=high&amp;id=690b9d3f5191fb7cf229892a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31954-cwe-598-use-of-get-request-method-w-d55b0736</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31954%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20HCL%20Software%20iAutomate&amp;severity=medium&amp;id=690b99bc5191fb7cf2265e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10907-cwe-434-unrestricted-upload-of-file-8a18c482</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10907%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=690b96345191fb7cf2240254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10713-cwe-611-improper-restriction-of-xml-44cdf70d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10713%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=690b8b09ffac907e5bf4a9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-react-native-flaw-exposes-developer-systems-39d58deb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20React%20Native%20Flaw%20Exposes%20Developer%20Systems%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690b83f9ffac907e5beedf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43990-cwe-250-execution-with-unnecessary--0ffefb12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43990%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Command%20Monitor%20(DCM)&amp;severity=high&amp;id=690b877dffac907e5bf1d3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46366-cwe-256-plaintext-storage-of-a-pass-dbd48aec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46366%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8418ffac907e5bef31c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46424-cwe-1240-use-of-a-cryptographic-pri-96d0647c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46424%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46365-cwe-77-improper-neutralization-of-s-46d00478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46365%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46364-cwe-269-improper-privilege-manageme-89bb2a81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46364%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20CloudLin&amp;severity=critical&amp;id=690b8077ffac907e5bea79ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20304-improper-neutralization-of-input-du-a30eaf42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea7942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20305-insufficient-granularity-of-access--747a5089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20305%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20289-improper-neutralization-of-input-du-e5398db0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20303-improper-neutralization-of-input-du-d904009e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=690b8074ffac907e5bea793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45379-cwe-78-improper-neutralization-of-s-5ff8fa05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45379%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=high&amp;id=690b8077ffac907e5bea79b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20377-exposure-of-sensitive-information-t-3dd7dca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20377%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Packaged%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=690b8077ffac907e5bea79aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20375-unrestricted-upload-of-file-with-da-c7022c7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20375%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20376-unrestricted-upload-of-file-with-da-a55edaad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20376%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20374-improper-limitation-of-a-pathname-t-631a67a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20374%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=690b8074ffac907e5bea7951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20358-missing-authentication-for-critical-31c5a58e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20358%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=critical&amp;id=690b8074ffac907e5bea794e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20354-unrestricted-upload-of-file-with-da-8626db6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20354%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=critical&amp;id=690b8074ffac907e5bea794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20343-incorrect-comparison-in-cisco-cisco-044c2318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20343%3A%20Incorrect%20Comparison%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=high&amp;id=690b8074ffac907e5bea7948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30479-cwe-78-improper-neutralization-of-s-2e03a643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30479%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=high&amp;id=690b8077ffac907e5bea79b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45378-cwe-78-improper-neutralization-of-s-4f87045a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45378%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20CloudLink&amp;severity=critical&amp;id=690b7c74ffac907e5be8d8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updates-to-domainname-api-wed-nov-5th-eb8b8086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updates%20to%20Domainname%20API%2C%20(Wed%2C%20Nov%205th)&amp;severity=low&amp;id=690c09dcfd0d6d2264828494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operational-technology-security-poses-inherent-ris-bfdef819</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operational%20Technology%20Security%20Poses%20Inherent%20Risks%20for%20Manufacturers&amp;severity=medium&amp;id=690c087afd0d6d22648229e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-now-uses-ai-during-execution-to-mutate-and-1b42396b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Now%20Uses%20AI%20During%20Execution%20to%20Mutate%20and%20Collect%20Data%2C%20Google%20Warns&amp;severity=medium&amp;id=690b6efe39a16b4c6e57b6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64459-cwe-89-improper-neutralization-of-s-e82fc809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64459%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=critical&amp;id=690b6b8d39a16b4c6e53b82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64458-cwe-407-inefficient-algorithmic-com-3038ebb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64458%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20djangoproject%20Django&amp;severity=high&amp;id=690b6b8d39a16b4c6e53b829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47151-cwe-843-access-of-resource-using-in-86a1a865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47151%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Entr&apos;ouvert%20Lasso&amp;severity=critical&amp;id=690b6825eb4434bb4f92e008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46404-cwe-476-null-pointer-dereference-in-6ac4b37c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46404%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92dfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46784-cwe-401-improper-release-of-memory--81bc4c36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46784%3A%20CWE-401%3A%20Improper%20Release%20of%20Memory%20Before%20Removing%20Last%20Reference%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92e005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46705-cwe-617-reachable-assertion-in-entr-60f19323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46705%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Entr&apos;ouvert%20Lasso&amp;severity=high&amp;id=690b6825eb4434bb4f92e002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3125-cwe-434-unrestricted-upload-of-file--e62e4ad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3125%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=690b6825eb4434bb4f92e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52602-cwe-359-exposure-of-private-persona-a67db4c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52602%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20BigFix%20Query&amp;severity=medium&amp;id=690b6825eb4434bb4f92e00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-site-takeover-flaw-affects-400k-wordpress-69adb202</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Site%20Takeover%20Flaw%20Affects%20400K%20WordPress%20Sites&amp;severity=critical&amp;id=690c087afd0d6d22648229e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webinar-today-scattered-spider-exposed-critical-ta-f32fb066</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Webinar%20Today%3A%20Scattered%20Spider%20Exposed%20%E2%80%93%20Critical%20Takeaways%20for%20Cyber%20Defenders&amp;severity=critical&amp;id=690b5d79eb4434bb4f9100eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-chatgpt-vulnerabilities-that-let--29c8ad6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20ChatGPT%20Vulnerabilities%20That%20Let%20Attackers%20Trick%20AI%20Into%20Leaking%20Data&amp;severity=medium&amp;id=690c07d3fd0d6d226481f700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/closing-the-ai-execution-gap-in-cybersecurity-a-ci-900947c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Closing%20the%20AI%20Execution%20Gap%20in%20Cybersecurity%20%E2%80%94%20A%20CISO%20Framework&amp;severity=critical&amp;id=690c087afd0d6d22648229ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/risk-comparable-to-solarwinds-incident-lurks-in-po-1b19016d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Risk%20&apos;Comparable&apos;%20to%20SolarWinds%20Incident%20Lurks%20in%20Popular%20Software%20Update%20Tool&amp;severity=medium&amp;id=690b59f4eb4434bb4f8f9b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norton-researchers-crack-midnight-ransomware-relea-892c5cc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norton%20Researchers%20Crack%20Midnight%20Ransomware%2C%20Release%20Free%20Decryptor&amp;severity=medium&amp;id=690b5a12eb4434bb4f8fa0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-cybersecurity-firm-experts-attempted-to-ext-6b6019a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20cybersecurity%20firm%20experts%20attempted%20to%20extort%20five%20U.S.%20companies%20in%202023%20using%20BlackCat%20ransomware%20attacks&amp;severity=medium&amp;id=690b4f71eb4434bb4f8c90e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-10-north-korean-entities-for-launderi-05676a63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%2010%20North%20Korean%20Entities%20for%20Laundering%20%2412.7M%20in%20Crypto%20and%20IT%20Fraud&amp;severity=high&amp;id=690b4f71eb4434bb4f8c90dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-smudgedserpent-hackers-target-us-policy-804e173f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mysterious%20&apos;SmudgedSerpent&apos;%20Hackers%20Target%20U.S.%20Policy%20Experts%20Amid%20Iran%E2%80%93Israel%20Tensions&amp;severity=high&amp;id=690b4f71eb4434bb4f8c90e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-military-documents-deliver-advanced-ssh-19fcfce5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Military%20Documents%20Deliver%20Advanced%20SSH-Tor%20Backdoor&amp;severity=medium&amp;id=690bc39f5c8b8caf26e1ed7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dragon-breath-apt-q-27-dimensional-reduc-dc76cc1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Dragon%20Breath%20(APT-Q-27)%3A%20Dimensional%20Reduction%20Attack%20Against%20the%20Gambling%20Industry&amp;severity=medium&amp;id=690bc39f5c8b8caf26e1ed95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-peek-a-baku-silent-lynx-apt-targets-dush-1e3d9910</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Peek-a-Baku%3A%20Silent%20Lynx%20APT%20Targets%20Dushanbe%20with%20Espionage%20Campaign&amp;severity=medium&amp;id=690bc2866ab8174a0d402f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-new-android-malware-takes-over-your-phone-h-884285ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Sneaky%22%20new%20Android%20malware%20takes%20over%20your%20phone%2C%20hiding%20in%20fake%20news%20and%20ID%20apps&amp;severity=medium&amp;id=690bc2866ab8174a0d402f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-data-reveals-credentials-and-misconfigurations-3dfc23db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20Data%20Reveals%20Credentials%20and%20Misconfigurations%20Behind%20Most%20Cloud%20Breaches&amp;severity=medium&amp;id=690b44e5eb4434bb4f8a7ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-an-attacker-drained-128m-from-balancer-through-905af0c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20an%20Attacker%20Drained%20%24128M%20from%20Balancer%20Through%20Rounding%20Error%20Exploitation&amp;severity=medium&amp;id=690b3f8ceb4434bb4f895c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-the-open-android-ecosystem-with-samsung-k-962b8fa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20the%20Open%20Android%20Ecosystem%20with%20Samsung%20Knox&amp;severity=critical&amp;id=690b3e49eb4434bb4f89372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploited-post-smtp-plugin-flaw-exposes-wordpress--0a03d9b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploited%20%E2%80%98Post%20SMTP%E2%80%99%20Plugin%20Flaw%20Exposes%20WordPress%20Sites%20to%20Takeover&amp;severity=critical&amp;id=690b3f66eb4434bb4f8958fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11745-cwe-80-improper-neutralization-of-s-c0995e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11745%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20spacetime%20Ad%20Inserter%20%E2%80%93%20Ad%20Manager%20%26%20AdSense%20Ads&amp;severity=medium&amp;id=690b36fdeb4434bb4f874748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12497-cwe-98-improper-control-of-filename-d347b1e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12497%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20averta%20Premium%20Portfolio%20Features%20for%20Phlox%20theme&amp;severity=high&amp;id=690b36fdeb4434bb4f87474d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nikkei-says-17000-impacted-by-data-breach-stemming-5bda1a32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nikkei%20Says%2017%2C000%20Impacted%20by%20Data%20Breach%20Stemming%20From%20Slack%20Account%20Hack&amp;severity=medium&amp;id=690b36cfeb4434bb4f873567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-flaws-allowed-attackers-to-fake-id-fc1857f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Flaws%20Allowed%20Attackers%20to%20Fake%20Identities%20and%20Rewrite%20Chats&amp;severity=medium&amp;id=690b36eceb4434bb4f8736fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-smudgedserpent-hackers-target-us-policy-ce236eef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mysterious%20&apos;SmudgedSerpent&apos;%20Hackers%20Target%20U.S.%20Policy%20Experts%20Amid%20Iran%E2%80%93Israel%20Tensions&amp;severity=medium&amp;id=690b3e49eb4434bb4f89372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-10-north-korean-entities-for-launderi-c686582c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%2010%20North%20Korean%20Entities%20for%20Laundering%20%2412.7M%20in%20Crypto%20and%20IT%20Fraud&amp;severity=medium&amp;id=690b3e49eb4434bb4f893730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elusive-iranian-apt-phishes-influential-us-policy--c9c6d00b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran&apos;s%20Elusive%20%26quot%3BSmudgedSerpent&apos;%20APT%20Phishes%20Influential%20US%20Policy%20Wonks&amp;severity=medium&amp;id=690b21b3eb4434bb4f7b0c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dragonforce-cartel-scattered-spider-at-the-gat-8b44e587</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20DragonForce%20Cartel%3A%20Scattered%20Spider%20at%20the%20gate&amp;severity=medium&amp;id=690dba651280f279b842fd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasion-and-persistence-via-hidden-hyper-v-virtual-ecf418b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasion%20and%20Persistence%20via%20Hidden%20Hyper-V%20Virtual%20Machines&amp;severity=medium&amp;id=690b1bc097eccd90738774a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12192-cwe-697-incorrect-comparison-in-ste-a2759a8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12192%3A%20CWE-697%20Incorrect%20Comparison%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=690b1bd197eccd907387bdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12469-cwe-862-missing-authorization-in-am-7780dbfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12469%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=690b1bd197eccd907387bdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11987-cwe-80-improper-neutralization-of-s-61a054bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11987%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brechtvds%20Visual%20Link%20Preview&amp;severity=medium&amp;id=690b1bd197eccd907387bdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12468-cwe-200-exposure-of-sensitive-infor-c909e088</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12468%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=690b1bd197eccd907387bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11820-cwe-79-improper-neutralization-of-i-a06dcbfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20Graphina%20%E2%80%93%20Charts%20and%20Graphs%20For%20Elementor&amp;severity=medium&amp;id=690b1bd197eccd907387bdb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58337-cwe-284-improper-access-control-in--2e3abcdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58337%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Doris-MCP-Server&amp;severity=medium&amp;id=690b1bd197eccd907387bdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55108-cwe-306-missing-authentication-for--6d680f41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=690b184397eccd90738383be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-north-korean-bankers-accused-of-laund-7250c556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Sanctions%20North%20Korean%20Bankers%20Accused%20of%20Laundering%20Stolen%20Cryptocurrency&amp;severity=medium&amp;id=690b0b5580abb2a1204aa5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/update-on-attacks-by-threat-group-apt-c-60-952bb079</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Update%20on%20Attacks%20by%20Threat%20Group%20APT-C-60&amp;severity=medium&amp;id=690b113e97eccd907379bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10622-client-side-enforcement-of-server-s-93f89c5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10622%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20The%20Foreman%20Foreman&amp;severity=high&amp;id=690b0215da9019f6f2715678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12675-cwe-862-missing-authorization-in-my-d4ddb8e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12675%3A%20CWE-862%20Missing%20Authorization%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12676-cwe-259-use-of-hard-coded-password--8cf4c833</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12676%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12674-cwe-434-unrestricted-upload-of-file-e0d702d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12674%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mykiot%20KiotViet%20Sync&amp;severity=critical&amp;id=690afea4da9019f6f26cbded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12677-cwe-200-exposure-of-sensitive-infor-109f049b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12677%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mykiot%20KiotViet%20Sync&amp;severity=medium&amp;id=690afea4da9019f6f26cbdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-cwp-vulnerability-exploited-in-the-w-922135ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20CWP%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=690afe86da9019f6f26c8926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12384-cwe-862-missing-authorization-in-bp-9a5a8015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12384%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20Document%20Embedder%20%E2%80%93%20Embed%20PDFs%2C%20Word%2C%20Excel%2C%20and%20Other%20Files&amp;severity=high&amp;id=690af19c063e7c5f011fbd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12388-cwe-918-server-side-request-forgery-ec85e019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12388%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Carousel%20Block%20%E2%80%93%20Responsive%20Image%20and%20Content%20Carousel&amp;severity=medium&amp;id=690af19c063e7c5f011fbd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11373-cwe-862-missing-authorization-in-av-b6d09c97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11373%3A%20CWE-862%20Missing%20Authorization%20in%20averta%20Popup%20and%20Slider%20Builder%20by%20Depicter%20%E2%80%93%20Add%20Email%20collecting%20Popup%2C%20Popup%20Modal%2C%20Coupon%20Popup%2C%20Image%20Slider%2C%20Carousel%20Slider%2C%20Post%20Slider%20Carousel&amp;severity=medium&amp;id=690af19c063e7c5f011fbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12139-cwe-200-exposure-of-sensitive-infor-6173f7dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12139%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20princeahmed%20File%20Manager%20for%20Google%20Drive%20%E2%80%93%20Integrate%20Google%20Drive&amp;severity=high&amp;id=690af19c063e7c5f011fbd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11917-cwe-918-server-side-request-forgery-02412c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11917%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=690af19c063e7c5f011fbd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62225-unquoted-search-path-or-element-in--4cd70736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62225%3A%20Unquoted%20search%20path%20or%20element%20in%20Sony%20Corporation%20Optical%20Disc%20Archive%20Software%20(for%20Windows)&amp;severity=medium&amp;id=690aee14063e7c5f011b583c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64151-unquoted-search-path-or-element-in--d5fe30df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64151%3A%20Unquoted%20search%20path%20or%20element%20in%20Roboticsware%20PTE.%20LTD.%20FA-Panel6&amp;severity=medium&amp;id=690aee14063e7c5f011b5840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-gladinet-and-cwp-flaws-to-kev-catalog-am-5549eefd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Gladinet%20and%20CWP%20Flaws%20to%20KEV%20Catalog%20Amid%20Active%20Exploitation%20Evidence&amp;severity=low&amp;id=690b3e49eb4434bb4f893736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6027-cwe-287-improper-authentication-in-a-d055708d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6027%3A%20CWE-287%20Improper%20Authentication%20in%20Ace%20User%20Management&amp;severity=medium&amp;id=690aea9b063e7c5f0116da7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11072-cwe-22-improper-limitation-of-a-pat-bbfb67ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11072%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MelAbu%20WP%20Download%20Counter%20Button&amp;severity=medium&amp;id=690aea9b063e7c5f0116da7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10873-cwe-862-missing-authorization-in-el-c9eeb523</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10873%3A%20CWE-862%20Missing%20Authorization%20in%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=690aea9b063e7c5f0116da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10567-cwe-79-cross-site-scripting-xss-in--358fe4a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10567%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FunnelKit&amp;severity=medium&amp;id=690aea9b063e7c5f0116da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21079-cwe-20-improper-input-validation-in-0a36b1d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21079%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=high&amp;id=690aed84063e7c5f011b288f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21078-cwe-330-use-of-insufficiently-rando-177cbcdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21078%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=690aed84063e7c5f011b288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21077-cwe-20-improper-input-validation-in-6ed562bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21077%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Email&amp;severity=low&amp;id=690aed84063e7c5f011b2889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21076-cwe-280-improper-handling-of-insuff-717d2266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21076%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Account&amp;severity=medium&amp;id=690aed84063e7c5f011b2886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21075-cwe-787-out-of-bounds-write-in-sams-4f55802f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21075%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b2883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21074-cwe-125-out-of-bounds-read-in-samsu-af1dd65b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21074%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b2880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21073-cwe-1188-initialization-of-a-resour-c6204bed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21073%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b287d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21071-cwe-787-out-of-bounds-write-in-sams-f87e8197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21071%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=690aed84063e7c5f011b287a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11749-cwe-200-exposure-of-sensitive-infor-fe07229e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11749%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tigroumeow%20AI%20Engine&amp;severity=critical&amp;id=690ae4c4c336e58df48942bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12197-cwe-89-improper-neutralization-of-s-0832a5ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12197%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=high&amp;id=690ad7c644b7a50adeab69d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11162-cwe-79-improper-neutralization-of-i-82aa9a01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20Gutenberg%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=690ad7c644b7a50adeab69d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11835-cwe-862-missing-authorization-in-co-96368cfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11835%3A%20CWE-862%20Missing%20Authorization%20in%20cozmoslabs%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=690ac97016b8dcb1e3eaa161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12580-cwe-79-improper-neutralization-of-i-8fe84616</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stanleychoi%20SMS%20for%20WordPress&amp;severity=medium&amp;id=690ac97016b8dcb1e3eaa165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12582-cwe-862-missing-authorization-in-kl-e96adf4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12582%3A%20CWE-862%20Missing%20Authorization%20in%20klicher%20Features&amp;severity=medium&amp;id=690abee616b8dcb1e3e916b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8871-cwe-502-deserialization-of-untrusted-e8b62189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8871%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=medium&amp;id=690abee616b8dcb1e3e916b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-debuts-httptroy-backdoor-against-south-kor-900fb401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Debuts%20HTTPTroy%20Backdoor%20Against%20South%20Korea%20Users&amp;severity=medium&amp;id=690ab0c616b8dcb1e3e1b7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12735-cwe-94-improper-control-of-generati-0c7d97f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12735%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(%E2%80%98Code%20Injection%E2%80%99)%20in%20silentmatt%20expr-eval&amp;severity=critical&amp;id=690a9bd016b8dcb1e3c928b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-05-c6186166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-05&amp;severity=medium&amp;id=690be6ed2de49fb2b5a3549b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60784-na-331b7120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60784%3A%20n%2Fa&amp;severity=medium&amp;id=690bb7fc6ab8174a0d369d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63585-na-d53a6dc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63585%3A%20n%2Fa&amp;severity=medium&amp;id=690bb4796ab8174a0d3511e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63334-na-ccb46fe7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63334%3A%20n%2Fa&amp;severity=critical&amp;id=690bacf6976718a73306413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55343-na-371d7a9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55343%3A%20n%2Fa&amp;severity=critical&amp;id=690ba5a1976718a733ff315c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63418-na-f95bcbfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63418%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63417-na-17b6d5d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63417%3A%20n%2Fa&amp;severity=high&amp;id=690ba1a5976718a733fd90dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55342-na-ea66e506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55342%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55341-na-215677d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55341%3A%20n%2Fa&amp;severity=medium&amp;id=690ba1a5976718a733fd90d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63416-na-4e575f93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63416%3A%20n%2Fa&amp;severity=critical&amp;id=690b9d3f5191fb7cf2298939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56232-na-c990d8c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56232%3A%20n%2Fa&amp;severity=medium&amp;id=690b99bc5191fb7cf2265e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56231-na-c46b039d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56231%3A%20n%2Fa&amp;severity=critical&amp;id=690b96345191fb7cf2240257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59716-na-6c6d933d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59716%3A%20n%2Fa&amp;severity=medium&amp;id=690b8eb35191fb7cf21e1afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57244-na-b9f9dc02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57244%3A%20n%2Fa&amp;severity=medium&amp;id=690b8077ffac907e5bea79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61304-na-914aa049</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61304%3A%20n%2Fa&amp;severity=critical&amp;id=690b7c74ffac907e5be8d906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63248-na-cfe63466</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63248%3A%20n%2Fa&amp;severity=high&amp;id=690b7c74ffac907e5be8d902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57130-na-cc37a31f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57130%3A%20n%2Fa&amp;severity=high&amp;id=690b78ebf80d35c469c0bdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63601-na-2f1b09d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63601%3A%20n%2Fa&amp;severity=critical&amp;id=690b728e39a16b4c6e598be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60753-na-1872e9fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60753%3A%20n%2Fa&amp;severity=medium&amp;id=690b728e39a16b4c6e598bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61084-na-e5356601</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61084%3A%20n%2Fa&amp;severity=high&amp;id=690b648deb4434bb4f926ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-with-jupyter-from-the-command-448f6782</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20Escalation%20With%20Jupyter%20From%20the%20Command%20Line&amp;severity=medium&amp;id=690a860e327a9365e25838e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59596-vulnerability-in-absolute-security--4b9ad083</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59596%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=690a8612327a9365e25841c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59595-vulnerability-in-absolute-secure-ac-0ba87216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59595%3A%20Vulnerability%20in%20Absolute%20Secure%20Access&amp;severity=high&amp;id=690a8612327a9365e25841c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62722-cwe-79-improper-neutralization-of-i-4d71fd61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a8287327a9365e253b11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62721-cwe-200-exposure-of-sensitive-infor-991f470e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62721%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a797a9e609817bf7d764b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62720-cwe-200-exposure-of-sensitive-infor-56ba6c79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62720%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=690a797a9e609817bf7d7646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62719-cwe-918-server-side-request-forgery-b375642d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62719%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kovah%20LinkAce&amp;severity=low&amp;id=690a797a9e609817bf7d7650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54526-cwe-121-in-fuji-electric-monitouch--7dc27291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54526%3A%20CWE-121%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=690a75ef9e609817bf78f742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62715-cwe-79-improper-neutralization-of-i-e7a6157e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62715%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=690a75ef9e609817bf78f747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54496-cwe-122-in-fuji-electric-monitouch--1275230b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54496%3A%20CWE-122%20in%20Fuji%20Electric%20Monitouch%20V-SFT-6&amp;severity=high&amp;id=690a75ef9e609817bf78f73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-hackers-use-linux-vms-to-hide-in-windo-99a7df5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Hackers%20Use%20Linux%20VMs%20to%20Hide%20in%20Windows&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-makes-ransomware-groups-successful-88bc6609</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20Makes%20Ransomware%20Groups%20Successful%3F&amp;severity=medium&amp;id=690c087afd0d6d22648229f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62369-cwe-94-improper-control-of-generati-aaa8e03d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62369%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xibosignage%20xibo-cms&amp;severity=high&amp;id=690a75ef9e609817bf78f74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europe-sees-increase-in-ransomware-extortion-attac-d9ac7400</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europe%20Sees%20Increase%20in%20Ransomware%2C%20Extortion%20Attacks&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32786-cwe-89-improper-neutralization-of-s-e05e06b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32786%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=high&amp;id=690a624d4499e136c2117c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-expands-chrome-autofill-to-passports-and-li-6582b47e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Expands%20Chrome%20Autofill%20to%20Passports%20and%20Licenses&amp;severity=medium&amp;id=690a5c32a730e5a3d9e111d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23358-cwe-427-uncontrolled-search-path-el-7b1ad387</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23358%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20NVApp&amp;severity=high&amp;id=690a5c46a730e5a3d9e13c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33176-cwe-923-improper-restriction-of-com-a6e091a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33176%3A%20CWE-923%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20NVIDIA%20RunAI&amp;severity=medium&amp;id=690a5c46a730e5a3d9e13c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12108-cwe-306-missing-authentication-for--826d6506</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Survision%20License%20Plate%20Recognition%20Camera&amp;severity=critical&amp;id=690a4c012a90255b94d06938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64322-cwe-732-incorrect-permission-assign-404be1b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64322%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a4c012a90255b94d0693b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64321-cwe-1427-improper-neutralization-of-bbfb7838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64321%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a47346d939959c8021a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64320-cwe-1427-improper-neutralization-of-d5f8887c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64320%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Agentforce%20Vibes%20Extension&amp;severity=medium&amp;id=690a47346d939959c8021a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64319-cwe-732-incorrect-permission-assign-8b79e7c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64319%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a47346d939959c8021a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sesameop-backdoor-abused-openai-assistants-api-9692d3fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SesameOp%20Backdoor%20Abused%20OpenAI%20Assistants%20API%20for%20Remote%20Access&amp;severity=medium&amp;id=690a470b6d939959c801f032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64318-cwe-1427-improper-neutralization-of-6268ed80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64318%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a47346d939959c8021a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10875-cwe-1427-improper-neutralization-of-4f2a929e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10875%3A%20CWE-1427%20Improper%20Neutralization%20of%20Input%20Used%20for%20LLM%20Prompting%20in%20Salesforce%20Mulesoft%20Anypoint%20Code%20Builder&amp;severity=medium&amp;id=690a439b6d939959c8fdd563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cybercrime-merger-like-no-other-scattered-spider-d6040d7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cybercrime%20Merger%20Like%20No%20Other%20%E2%80%94%20Scattered%20Spider%2C%20LAPSUS%24%2C%20and%20ShinyHunters%20Join%20Forces&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-cli-flaw-exposed-millions-of-1dddc1ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20CLI%20Flaw%20Exposed%20Millions%20of%20Developers%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690a2eb5f0ba78a05054882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61956-cwe-306-missing-authentication-for--0e27e1b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61956%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54863-cwe-522-insufficiently-protected-cr-d009cf59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54863%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61945-cwe-306-missing-authentication-for--6f9507e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61945%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiometrics%20VizAir&amp;severity=critical&amp;id=690a2ddcf0ba78a050535a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaw-in-popular-react-native-npm-package--699bd2c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaw%20in%20Popular%20React%20Native%20NPM%20Package%20Exposes%20Developers%20to%20Attacks&amp;severity=critical&amp;id=690a279c93114d0ef5c88a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-and-eurojust-dismantle-600-million-crypto--1ebaae11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=European%20Authorities%20Dismantle%20%E2%82%AC600%20Million%20Crypto%20Fraud%20Network%20in%20Global%20Sweep&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-court-delivers-split-verdict-in-getty-images-vs-06e52db2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Court%20Delivers%20Split%20Verdict%20in%20Getty%20Images%20vs.%20Stability%20AI%20Image%20Generation%20Case&amp;severity=medium&amp;id=690a21d69fe43a2ba317e0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transportation-companies-hacked-to-steal-cargo-ec32d741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transportation%20Companies%20Hacked%20to%20Steal%20Cargo&amp;severity=medium&amp;id=690a141d5ba1a6c630003dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sesameop-backdoor-uses-openai-api-for-covert-c2-43d711a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SesameOp%20Backdoor%20Uses%20OpenAI%20API%20for%20Covert%20C2&amp;severity=medium&amp;id=690ab78416b8dcb1e3e7ac9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12184-cwe-79-improper-neutralization-of-i-15675e7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rboatright%20MeetingList&amp;severity=medium&amp;id=690a109f5ba1a6c630faf34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-react-native-cli-flaw-exposed-millions-of-ec4faa00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20React%20Native%20CLI%20Flaw%20Exposed%20Millions%20of%20Developers%20to%20Remote%20Attacks&amp;severity=critical&amp;id=690ab65816b8dcb1e3e70738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/built-slopguard-open-source-defense-against-ai-sup-6a0b4cbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Built%20SlopGuard%20-%20open-source%20defense%20against%20AI%20supply%20chain%20attacks%20(slopsquatting)&amp;severity=medium&amp;id=690a0cc4dc8910934c489e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-bugs-let-attackers-impersonate-col-6f82070b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20Bugs%20Let%20Attackers%20Impersonate%20Colleagues%20and%20Edit%20Messages%20Unnoticed&amp;severity=low&amp;id=690ab65816b8dcb1e3e7073b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-microsoft-teams-impersonation-and-spoof-1c2977ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20Microsoft%20Teams%3A%20Impersonation%20and%20Spoofing%20Vulnerabilities%20Exposed&amp;severity=medium&amp;id=690a05e9dc8910934c3e995c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-skycloak-deploys-tor-enabled-openssh-bac-14ab2e8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SkyCloak%20Deploys%20Tor-Enabled%20OpenSSH%20Backdoor%20Targeting%20Defense%20Sectors&amp;severity=high&amp;id=690a05b8dc8910934c3e5e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-targeting-payroll-sites-schneier-on-09694e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Targeting%20Payroll%20Sites%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=690a05b8dc8910934c3e5e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12682-cwe-434-unrestricted-upload-of-file-baa0401b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12682%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20fahadmahmood%20Easy%20Upload%20Files%20During%20Checkout&amp;severity=critical&amp;id=690a05dfdc8910934c3e7291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sesameop-malware-abuses-openai-api-f0490f88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SesameOp%20Malware%20Abuses%20OpenAI%20API&amp;severity=medium&amp;id=690a022cdc8910934c3b3175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12695-cwe-653-improper-isolation-or-compa-25cbba3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12695%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization&amp;severity=medium&amp;id=690a0152dc8910934c3a8e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41345-cwe-862-missing-authorization-in-ca-9f5279a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41345%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0154dc8910934c3a8ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41344-cwe-862-missing-authorization-in-ca-aef247af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41344%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0154dc8910934c3a8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41343-cwe-862-missing-authorization-in-ca-a475d37f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41343%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41342-cwe-862-missing-authorization-in-ca-1e825907</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41342%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41341-cwe-862-missing-authorization-in-ca-161acb57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41341%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41340-cwe-862-missing-authorization-in-ca-b10a2dbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41340%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41339-cwe-862-missing-authorization-in-ca-6d15d4ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41339%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41338-cwe-862-missing-authorization-in-ca-35acb405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41338%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41337-cwe-862-missing-authorization-in-ca-81f4a027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41337%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41336-cwe-862-missing-authorization-in-ca-043bc7ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41336%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41335-cwe-862-missing-authorization-in-ca-7d24dd40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41335%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=690a0152dc8910934c3a8e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41114-cwe-862-missing-authorization-in-ca-9579beab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41114%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41113-cwe-862-missing-authorization-in-ca-101956ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41113%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41112-cwe-862-missing-authorization-in-ca-a098abd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41112%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41111-cwe-862-missing-authorization-in-ca-3cc0cc50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41111%3A%20CWE-862%20Missing%20Authorization%20in%20CanalDenuncia%20CanalDenuncia.app&amp;severity=high&amp;id=6909fc133cfa4baba4c198b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kernel-bluetooth-rce-b5dd106f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20kernel%20Bluetooth%20RCE&amp;severity=medium&amp;id=6909f5293cfa4baba4ba3922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-everything-again-tue-nov-4th-c9a84d18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Everything%2C%20Again%2C%20(Tue%2C%20Nov%204th)&amp;severity=medium&amp;id=6909eef84c0d499dad8661a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12045-cwe-79-improper-neutralization-of-i-1695383c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=6909e325e8d08963ed86c4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12493-cwe-22-improper-limitation-of-a-pat-643653c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12493%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B21%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=critical&amp;id=6909e325e8d08963ed86c4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-19-webkit-vulnerabilities-f0859c76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%2019%20WebKit%20Vulnerabilities&amp;severity=critical&amp;id=6909df99e8d08963ed81a71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-defense-using-the-wazuh-open-source-pla-bcf2478f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Defense%20Using%20the%20Wazuh%20Open%20Source%20Platform&amp;severity=critical&amp;id=690ab65816b8dcb1e3e7073e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-target-cisco-aka-firewalls-in-5d7d4cbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Target%20Cisco%20AKA%20Firewalls%20in%20Global%20Campaign&amp;severity=medium&amp;id=6909dfbae8d08963ed81b70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-critical-auth-bypass-flaw-in-jobmo-e6cf9407</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20critical%20auth%20bypass%20flaw%20in%20JobMonster%20WordPress%20theme&amp;severity=critical&amp;id=6909dc1ce8d08963ed7c7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-ai-big-sleep-finds-5-new-vulnerabilities-i-78d4b758</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20AI%20&apos;Big%20Sleep&apos;%20Finds%205%20New%20Vulnerabilities%20in%20Apple&apos;s%20Safari%20WebKit&amp;severity=high&amp;id=6909dc1ce8d08963ed7c7754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11690-cwe-639-authorization-bypass-throug-d15b640e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11690%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CFMOTO%20RIDE&amp;severity=high&amp;id=6909e7104c0d499dad7bcb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-update-patches-critical-remote-code-execut-ce5bdd09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Update%20Patches%20Critical%20Remote%20Code%20Execution%20Flaw&amp;severity=critical&amp;id=6909c74a70fe4617e5489145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-rondodox-v2-a-650-expansion-in-exploi-e48b1077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20RondoDox%20v2%2C%20a%20650%25%20Expansion%20in%20Exploits&amp;severity=high&amp;id=6909c3cf70fe4617e5439bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-ai-big-sleep-finds-5-new-vulnerabilities-i-6f5b6b43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%E2%80%99s%20AI%20%E2%80%98Big%20Sleep%E2%80%99%20Finds%205%20New%20Vulnerabilities%20in%20Apple%E2%80%99s%20Safari%20WebKit&amp;severity=low&amp;id=690ab65816b8dcb1e3e70744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-prosecutors-indict-cybersecurity-insiders-accus-59419f37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Prosecutors%20Indict%20Cybersecurity%20Insiders%20Accused%20of%20BlackCat%20Ransomware%20Attacks&amp;severity=medium&amp;id=690ab65816b8dcb1e3e70747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20749-cwe-121-stack-overflow-in-mediatek--438230a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20749%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6835%2C%20MT6855%2C%20MT6878%2C%20MT6879%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8169%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8781%2C%20MT8796&amp;severity=medium&amp;id=6909a1aad66f5e62e3849366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20748-cwe-120-classic-buffer-overflow-in--d33fdbff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20748%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1aad66f5e62e3849363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20741-cwe-122-heap-overflow-in-mediatek-i-cdbbc0c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20741%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20747-cwe-121-stack-overflow-in-mediatek--c40c5745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20747%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6982%2C%20MT6985%2C%20MT6986%2C%20MT6986D%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8893&amp;severity=medium&amp;id=6909a1aad66f5e62e3849360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20746-cwe-121-stack-overflow-in-mediatek--4e3cda7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20746%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6982%2C%20MT6985%2C%20MT6986%2C%20MT6986D%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8755%2C%20MT8893&amp;severity=medium&amp;id=6909a1aad66f5e62e384935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20739-cwe-121-stack-overflow-in-mediatek--e40d2999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20739%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e384933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20738-cwe-121-stack-overflow-in-mediatek--fb568ac8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20738%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e384933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20736-cwe-121-stack-overflow-in-mediatek--11309f57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20736%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20734-cwe-122-heap-overflow-in-mediatek-i-f6d54018</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20734%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20732-cwe-121-stack-overflow-in-mediatek--3f48bd90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20732%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20731-cwe-122-heap-overflow-in-mediatek-i-c67fed31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20731%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20729-cwe-122-heap-overflow-in-mediatek-i-4617cb59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20729%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20745-cwe-416-use-after-free-in-mediatek--cc8d5f57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20745%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6989%2C%20MT6991%2C%20MT8370%2C%20MT8390%2C%20MT8395%2C%20MT8676%2C%20MT8678%2C%20MT87920&amp;severity=medium&amp;id=6909a1aad66f5e62e384935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20744-cwe-416-use-after-free-in-mediatek--b04c33cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20744%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6899%2C%20MT6991%2C%20MT8793&amp;severity=medium&amp;id=6909a1a8d66f5e62e384934c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20743-cwe-416-use-after-free-in-mediatek--64d01756</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20743%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6853%2C%20MT6877%2C%20MT6886%2C%20MT6893%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6989%2C%20MT6991%2C%20MT8113%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8321%2C%20MT8365%2C%20MT8385%2C%20MT8390%2C%20MT8391%2C%20MT8512%2C%20MT8516%2C%20MT8519%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698%2C%20MT8755%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788E%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20742-cwe-122-heap-overflow-in-mediatek-i-ee1f26e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20742%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20740-cwe-367-time-of-check-time-of-use-t-88025ee1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20740%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=6909a1a8d66f5e62e3849340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20737-cwe-121-stack-overflow-in-mediatek--04e7e2b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20737%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20735-cwe-122-heap-overflow-in-mediatek-i-41ff93ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20735%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a8d66f5e62e3849331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20733-cwe-122-heap-overflow-in-mediatek-i-6d764ad7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20733%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20730-cwe-287-improper-authentication-gen-cbbdd504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20730%3A%20CWE-287%20Improper%20Authentication%20-%20Generic%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8188%2C%20MT8195%2C%20MT8676%2C%20MT8678%2C%20MT8696&amp;severity=medium&amp;id=6909a1a6d66f5e62e3848f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20728-cwe-122-heap-overflow-in-mediatek-i-1a9ce91d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20728%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20725-cwe-787-out-of-bounds-write-in-medi-8495b48c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20725%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20726-cwe-122-heap-overflow-in-mediatek-i-1bac505a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20726%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20727-cwe-787-out-of-bounds-write-in-medi-6035c779</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20727%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8793%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=6909a1a6d66f5e62e3848f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-detects-sesameop-backdoor-using-openais--d47f3fc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Detects%20%22SesameOp%22%20Backdoor%20Using%20OpenAI&apos;s%20API%20as%20a%20Stealth%20Command%20Channel&amp;severity=medium&amp;id=690ab65816b8dcb1e3e7074a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12396-cwe-79-improper-neutralization-of-i-15a9f062</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alaminopu%20clubmember&amp;severity=medium&amp;id=690984dd2b77ca42b4883ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11812-cwe-79-improper-neutralization-of-i-1625327f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11812%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redq%20Reuse%20Builder&amp;severity=medium&amp;id=690984dc2b77ca42b4883e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12403-cwe-352-cross-site-request-forgery--0d584639</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12403%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20revokee%20Associados%20Amazon%20Plugin&amp;severity=medium&amp;id=690984df2b77ca42b4883f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11753-cwe-79-improper-neutralization-of-i-ec78f777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20augustinfotech%20Bootstrap%20Multi-language%20Responsive%20Portfolio&amp;severity=medium&amp;id=690984dc2b77ca42b4883e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12158-cwe-862-missing-authorization-in-ta-2fe2b264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12158%3A%20CWE-862%20Missing%20Authorization%20in%20tanvirahmed1984%20Simple%20User%20Capabilities&amp;severity=critical&amp;id=690984dd2b77ca42b4883eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12452-cwe-352-cross-site-request-forgery--3e87e22d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12452%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bestiadurmiente%20Visit%20Counter&amp;severity=medium&amp;id=690984df2b77ca42b4883f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11733-cwe-79-improper-neutralization-of-i-4cb98692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Footnotes%20Made%20Easy&amp;severity=high&amp;id=690984dc2b77ca42b4883e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12065-cwe-79-improper-neutralization-of-i-b41a83f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carticon%20WP%20Carticon&amp;severity=medium&amp;id=690984dc2b77ca42b4883e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12371-cwe-79-improper-neutralization-of-i-28b67e58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shakhi%20Nari%20Accountant&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12389-cwe-862-missing-authorization-in-si-343301a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12389%3A%20CWE-862%20Missing%20Authorization%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11704-cwe-98-improper-control-of-filename-f32ca2a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11704%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20impacttechlab%20Elegance%20Menu&amp;severity=high&amp;id=690984dc2b77ca42b4883e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12402-cwe-352-cross-site-request-forgery--c2554007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12402%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bondnono%20LinkedIn%20Resume&amp;severity=medium&amp;id=690984df2b77ca42b4883f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12415-cwe-352-cross-site-request-forgery--25cf328f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12415%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sugiartha%20MapMap&amp;severity=medium&amp;id=690984df2b77ca42b4883f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12156-cwe-862-missing-authorization-in-ai-93b4bb65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12156%3A%20CWE-862%20Missing%20Authorization%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=medium&amp;id=690984dc2b77ca42b4883e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11724-cwe-434-unrestricted-upload-of-file-ef8932f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11724%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20erinmorelli%20EM%20Beer%20Manager&amp;severity=high&amp;id=690984dc2b77ca42b4883e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12456-cwe-352-cross-site-request-forgery--11a483dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12456%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20centangle%20Centangle-Team&amp;severity=medium&amp;id=690984df2b77ca42b4883f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12400-cwe-352-cross-site-request-forgery--659d65b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12400%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lmbbox%20LMB%5EBox%20Smileys&amp;severity=medium&amp;id=690984dd2b77ca42b4883ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12369-cwe-79-improper-neutralization-of-i-f6dea0bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hupe13%20Extensions%20for%20Leaflet%20Map&amp;severity=medium&amp;id=690984dd2b77ca42b4883ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11890-cwe-862-missing-authorization-in-be-b605ee21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11890%3A%20CWE-862%20Missing%20Authorization%20in%20beycanpress%20Crypto%20Payment%20Gateway%20with%20Payeer%20for%20WooCommerce&amp;severity=high&amp;id=690984dc2b77ca42b4883e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12157-cwe-862-missing-authorization-in-ta-5993750b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12157%3A%20CWE-862%20Missing%20Authorization%20in%20tanvirahmed1984%20Simple%20User%20Capabilities&amp;severity=medium&amp;id=690984dd2b77ca42b4883ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12410-cwe-352-cross-site-request-forgery--2ac2930d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samhoamt%20SH%20Contextual%20Help&amp;severity=medium&amp;id=690984df2b77ca42b4883f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11758-cwe-862-missing-authorization-in-co-193596ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11758%3A%20CWE-862%20Missing%20Authorization%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=690984dc2b77ca42b4883e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12413-cwe-352-cross-site-request-forgery--0e8136c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12413%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20socialmedialtd%20WPCF7%20Stop%20words&amp;severity=medium&amp;id=690984df2b77ca42b4883f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12350-cwe-862-missing-authorization-in-do-31a2cbcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12350%3A%20CWE-862%20Missing%20Authorization%20in%20domiinodev%20DominoKit&amp;severity=medium&amp;id=690984dd2b77ca42b4883eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12393-cwe-79-improper-neutralization-of-i-a160cc62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kris_iv%20Free%20Quotation&amp;severity=medium&amp;id=690984dd2b77ca42b4883ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12416-cwe-352-cross-site-request-forgery--e8545de3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12416%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mahype%20Pagerank%20tools&amp;severity=medium&amp;id=690984df2b77ca42b4883f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10896-cwe-862-missing-authorization-in-li-df13c3ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10896%3A%20CWE-862%20Missing%20Authorization%20in%20litonice13%20Master%20Blocks%20%E2%80%93%20Ultimate%20Gutenberg%20Blocks%20for%20Marketers&amp;severity=high&amp;id=690984dc2b77ca42b4883e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12412-cwe-352-cross-site-request-forgery--b164eb2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12412%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josereyev%20Top%20Bar%20Notification&amp;severity=medium&amp;id=690984df2b77ca42b4883f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12188-cwe-352-cross-site-request-forgery--d883b447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmasterscom%20Posts%20Navigation%20Links%20for%20Sections%20and%20Headings%20%E2%80%93%20Free%20by%20WP%20Masters&amp;severity=medium&amp;id=690984dd2b77ca42b4883eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12683-cwe-269-improper-privilege-manageme-edb2ef75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12683%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Voidtools%20Everything&amp;severity=medium&amp;id=690984df2b77ca42b4883f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12069-cwe-352-cross-site-request-forgery--de9046bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12069%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stiand%20WP%20Global%20Screen%20Options&amp;severity=medium&amp;id=690977bf78d4f574c2b12d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11008-cwe-532-insertion-of-sensitive-info-28ecf379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11008%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=690977bf78d4f574c2b12d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12401-cwe-352-cross-site-request-forgery--85553ba1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12401%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theode%20Label%20Plugins&amp;severity=medium&amp;id=690977bf78d4f574c2b12d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11007-cwe-306-missing-authentication-for--e3e5c925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11007%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=690977bf78d4f574c2b12d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47370-cwe-617-reachable-assertion-in-qual-fec8b16c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47370%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977c178d4f574c2b12d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47368-cwe-126-buffer-over-read-in-qualcom-0981403a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47368%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47367-cwe-787-out-of-bounds-write-in-qual-b405118e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47367%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47365-cwe-190-integer-overflow-or-wraparo-dd773da3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47365%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47362-cwe-126-buffer-over-read-in-qualcom-9339dc64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47362%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977c178d4f574c2b12d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47361-cwe-129-improper-validation-of-arra-240c3273</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47361%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47360-cwe-121-stack-based-buffer-overflow-398239f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47360%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977c178d4f574c2b12d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47357-cwe-306-missing-authentication-for--4ab003cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47357%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47353-cwe-749-exposed-dangerous-method-or-53d18303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47353%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47352-cwe-129-improper-validation-of-arra-f29d1643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47352%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27074-cwe-131-incorrect-calculation-of-bu-fc3b18fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27074%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27070-cwe-787-out-of-bounds-write-in-qual-871c271b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27070%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=690977bf78d4f574c2b12d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27064-cwe-126-buffer-over-read-in-qualcom-e9a43067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27064%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=690977bf78d4f574c2b12d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12324-cwe-79-improper-neutralization-of-i-dcbad306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=69096d2c78d4f574c2addf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11841-cwe-79-improper-neutralization-of-i-d567fe19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=690977c178d4f574c2b12d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43373-an-app-may-be-able-to-cause-unexpec-4bc9b8ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43373%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43365-an-unprivileged-process-may-be-able-eba39b95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43365%3A%20An%20unprivileged%20process%20may%20be%20able%20to%20terminate%20a%20root%20processes%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba678d4f574c2a8f22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43430-processing-maliciously-crafted-web--735a3a18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43430%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43426-an-app-may-be-able-to-access-sensit-abab13f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43426%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bad78d4f574c2a8f36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43390-an-app-may-be-able-to-access-user-s-e0add798</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43390%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43447-an-app-may-be-able-to-cause-unexpec-569d0d0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43447%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43502-an-app-may-be-able-to-bypass-certai-9ec435d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43502%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bb578d4f574c2a8f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43386-processing-a-maliciously-crafted-me-722e128e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43386%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba878d4f574c2a8f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43345-an-app-may-be-able-to-access-sensit-d2d2f51f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43345%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43493-visiting-a-malicious-website-may-le-bc46f72e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43493%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43387-a-malicious-app-may-be-able-to-gain-aaeeba9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43387%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba878d4f574c2a8f278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43411-an-app-may-be-able-to-access-user-s-7b1b4f11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43411%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43446-an-app-may-be-able-to-modify-protec-9ace1888</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43446%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43503-visiting-a-malicious-website-may-le-7c70c6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43503%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb578d4f574c2a8f60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43450-an-app-may-be-able-to-learn-informa-d7e40151</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43450%3A%20An%20app%20may%20be%20able%20to%20learn%20information%20about%20the%20current%20camera%20view%20before%20being%20granted%20camera%20access%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43391-an-app-may-be-able-to-access-sensit-f717a638</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43391%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43407-an-app-may-be-able-to-break-out-of--cf59ee3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43407%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43309-an-attacker-with-physical-access-to-b78c54a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43309%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20contents%20from%20the%20Lock%20Screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba578d4f574c2a8f1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43427-processing-maliciously-crafted-web--45fc93ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43427%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43431-processing-maliciously-crafted-web--50dbdc94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43431%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bad78d4f574c2a8f385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43348-an-app-may-bypass-gatekeeper-checks-7b4dd2c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43348%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43364-an-app-may-be-able-to-break-out-of--7d8e67bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43364%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43396-a-sandboxed-app-may-be-able-to-acce-4f6b5798</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43396%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43379-an-app-may-be-able-to-access-protec-e38634ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43379%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43457-processing-maliciously-crafted-web--4926b968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43457%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb078d4f574c2a8f451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43441-processing-maliciously-crafted-web--defb4887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43441%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43504-a-user-in-a-privileged-network-posi-274839b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43504%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69095bb578d4f574c2a8f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43338-processing-a-maliciously-crafted-me-afd3f74e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43338%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba578d4f574c2a8f1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43380-parsing-a-file-may-lead-to-an-unexp-9eb224cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43380%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43288-an-app-may-be-able-to-bypass-privac-4d60b0d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43288%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43322-an-app-may-be-able-to-access-user-s-b6de3793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43322%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43334-an-app-may-be-able-to-access-user-s-1ace3175</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43334%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43436-an-app-may-be-able-to-enumerate-a-u-0115c8ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43436%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bae78d4f574c2a8f3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43420-an-app-may-be-able-to-access-sensit-0d11cfa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43420%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43498-an-app-may-be-able-to-access-sensit-9ce3ab2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43498%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43477-an-app-may-be-able-to-access-sensit-8ece605b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43477%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43499-an-app-may-be-able-to-access-sensit-c1b1a890</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43499%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43476-an-app-may-be-able-to-break-out-of--b8a24997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43476%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43421-processing-maliciously-crafted-web--8ea7616d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43421%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bab78d4f574c2a8f349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43460-an-attacker-with-physical-access-to-01f312e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43460%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43335-an-app-may-be-able-to-access-user-s-e0c72b08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43335%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43323-an-app-may-be-able-to-fingerprint-t-cc391836</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43323%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba578d4f574c2a8f1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43495-an-app-may-be-able-to-monitor-keyst-06188090</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43495%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43440-processing-maliciously-crafted-web--c1d9efbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43440%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43505-processing-a-maliciously-crafted-fi-c49b40d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43505%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20Xcode&amp;severity=high&amp;id=69095bb578d4f574c2a8f618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43397-an-app-may-be-able-to-cause-a-denia-b0d5a61a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43397%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43378-an-app-may-be-able-to-access-sensit-d2a0d093</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43378%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43401-a-remote-attacker-may-be-able-to-ca-6e76160f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43401%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43479-an-app-may-be-able-to-access-sensit-90e66f13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43479%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43496-remote-content-may-be-loaded-even-w-bd90f5cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43496%3A%20Remote%20content%20may%20be%20loaded%20even%20when%20the%20&apos;Load%20Remote%20Images&apos;%20setting%20is%20turned%20off%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb378d4f574c2a8f4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43438-processing-maliciously-crafted-web--c548a4ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43438%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43480-a-malicious-website-may-exfiltrate--bd49eea7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43480%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bb378d4f574c2a8f4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43382-an-app-may-be-able-to-access-sensit-c1c687aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43382%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43414-a-shortcut-may-be-able-to-access-fi-24a5759b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43414%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43443-processing-maliciously-crafted-web--11eda922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43443%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43455-a-malicious-app-may-be-able-to-take-32210236</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43455%3A%20A%20malicious%20app%20may%20be%20able%20to%20take%20a%20screenshot%20of%20sensitive%20information%20in%20embedded%20views%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43394-an-app-may-be-able-to-access-protec-9032b479</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43394%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43422-an-attacker-with-physical-access-to-0d378202</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43422%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20disable%20Stolen%20Device%20Protection%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43434-processing-maliciously-crafted-web--36051cd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43434%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43361-a-malicious-app-may-be-able-to-read-e62b1bff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43361%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095ba678d4f574c2a8f223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43336-an-app-with-root-privileges-may-be--32e63968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43336%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095ba578d4f574c2a8f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43459-an-attacker-with-physical-access-to-d33ab445</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43459%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20Apple%20Watch%20may%20be%20able%20to%20view%20Live%20Voicemail%20in%20Apple%20watchOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43377-an-app-may-be-able-to-cause-a-denia-a70f117e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43377%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43398-an-app-may-be-able-to-cause-unexpec-ef0b0a78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43398%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43376-a-remote-attacker-may-be-able-to-vi-bf1ceb44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43376%3A%20A%20remote%20attacker%20may%20be%20able%20to%20view%20leaked%20DNS%20queries%20with%20Private%20Relay%20turned%20on%20in%20Apple%20Safari&amp;severity=high&amp;id=69095ba678d4f574c2a8f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43399-an-app-may-be-able-to-access-protec-e14673ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43399%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43458-processing-maliciously-crafted-web--6ed0773a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43458%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bb178d4f574c2a8f466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43360-password-fields-may-be-unintentiona-40ac4262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43360%3A%20Password%20fields%20may%20be%20unintentionally%20revealed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba678d4f574c2a8f220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43419-processing-maliciously-crafted-web--4a4e258a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43419%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bab78d4f574c2a8f33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43462-an-app-may-be-able-to-cause-unexpec-63ba2b38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43462%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43435-processing-maliciously-crafted-web--80440aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43435%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43423-an-attacker-with-physical-access-to-ff82e867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43423%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20paired%20with%20a%20Mac%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20system%20logging%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095bad78d4f574c2a8f35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43474-an-app-may-be-able-to-cause-unexpec-d5ad011c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43474%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43395-an-app-may-be-able-to-access-protec-d53947d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43395%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=69095baa78d4f574c2a8f2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43454-a-device-may-persistently-fail-to-l-f8b6b380</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43454%3A%20A%20device%20may%20persistently%20fail%20to%20lock%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43507-an-app-may-be-able-to-fingerprint-t-6b367eb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43507%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb578d4f574c2a8f61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43442-an-app-may-be-able-to-identify-what-221cc050</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43442%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095bae78d4f574c2a8f400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43383-processing-a-maliciously-crafted-me-033de638</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43383%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43481-an-app-may-be-able-to-break-out-of--104b51e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43481%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43439-an-app-may-be-able-to-fingerprint-t-1c171731</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43439%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bae78d4f574c2a8f3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43478-an-app-may-be-able-to-cause-unexpec-a085dad9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43478%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb378d4f574c2a8f49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43424-a-malicious-hid-device-may-cause-an-86a5a865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43424%3A%20A%20malicious%20HID%20device%20may%20cause%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bad78d4f574c2a8f364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43432-processing-maliciously-crafted-web--7b912960</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43432%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43449-a-malicious-app-may-be-able-to-trac-816aa556</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43449%3A%20A%20malicious%20app%20may%20be%20able%20to%20track%20users%20between%20installs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb078d4f574c2a8f440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43408-an-attacker-with-physical-access-ma-57c5dd11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43408%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=low&amp;id=69095bab78d4f574c2a8f323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43469-an-app-may-be-able-to-access-sensit-778a9a8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43469%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43384-processing-a-maliciously-crafted-me-b9c38480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43384%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43412-an-app-may-be-able-to-break-out-of--165a8cad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43412%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43500-an-app-may-be-able-to-access-sensit-ad815492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43500%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bb378d4f574c2a8f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43445-processing-a-maliciously-crafted-me-74c16cea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43445%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43392-a-website-may-exfiltrate-image-data-46a25dc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43392%3A%20A%20website%20may%20exfiltrate%20image%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095baa78d4f574c2a8f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43405-an-app-may-be-able-to-access-user-s-a6d3f8df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43405%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69095baa78d4f574c2a8f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43452-keyboard-suggestions-may-display-se-b6d18d9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43452%3A%20Keyboard%20suggestions%20may%20display%20sensitive%20information%20on%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43444-an-app-may-be-able-to-fingerprint-t-e10381b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43444%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bae78d4f574c2a8f40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43413-a-sandboxed-app-may-be-able-to-obse-2c34eb4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43413%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20observe%20system-wide%20network%20connections%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69095bab78d4f574c2a8f332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43385-processing-a-maliciously-crafted-me-6cfdca7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43385%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43468-an-app-may-be-able-to-access-sensit-5c13ac4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43468%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bb178d4f574c2a8f479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43429-processing-maliciously-crafted-web--24196af0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43429%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43350-an-attacker-may-be-able-to-view-res-9a51e3c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43350%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69095ba678d4f574c2a8f21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43409-an-app-may-be-able-to-access-sensit-f2743abc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43409%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69095bab78d4f574c2a8f327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43448-an-app-may-be-able-to-break-out-of--3c65c86b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43448%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095bb078d4f574c2a8f438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43389-an-app-may-be-able-to-access-sensit-ebe3133b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43389%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69095ba878d4f574c2a8f27b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43433-processing-maliciously-crafted-web--068db1c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43433%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=69095bad78d4f574c2a8f393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43425-processing-maliciously-crafted-web--6664d6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43425%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69095bad78d4f574c2a8f367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43472-an-app-may-be-able-to-gain-root-pri-b768dc49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43472%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69095bb178d4f574c2a8f481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35021-cwe-1188-insecure-default-initializ-4494496b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35021%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Abilis%20CPX&amp;severity=medium&amp;id=69094d8778d4f574c2794f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-04-fbd6dafe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-04&amp;severity=medium&amp;id=690a982816b8dcb1e3c3e05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56230-na-d157d9d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56230%3A%20n%2Fa&amp;severity=high&amp;id=690a75ef9e609817bf78f74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27374-na-99cb7080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27374%3A%20n%2Fa&amp;severity=medium&amp;id=690a6cce4499e136c21ec516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52910-na-6a9dae74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52910%3A%20n%2Fa&amp;severity=critical&amp;id=690a694c4499e136c21a9bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54335-na-a24684c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54335%3A%20n%2Fa&amp;severity=medium&amp;id=690a65c74499e136c215e603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56426-na-4aab81d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56426%3A%20n%2Fa&amp;severity=high&amp;id=690a624d4499e136c2117c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49494-na-09d9c60e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49494%3A%20n%2Fa&amp;severity=high&amp;id=690a5fc6a730e5a3d9e580e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54327-na-098914ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54327%3A%20n%2Fa&amp;severity=medium&amp;id=690a58b2a730e5a3d9dc1464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61431-na-21e6f0e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61431%3A%20n%2Fa&amp;severity=medium&amp;id=690a53132a90255b94da5743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52512-na-ef3e7358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52512%3A%20n%2Fa&amp;severity=high&amp;id=690a47346d939959c8021a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54334-na-54255b4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54334%3A%20n%2Fa&amp;severity=high&amp;id=690a439b6d939959c8fdd56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52513-na-1b4d5861</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52513%3A%20n%2Fa&amp;severity=high&amp;id=690a439b6d939959c8fdd566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54325-na-0dddca44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54325%3A%20n%2Fa&amp;severity=medium&amp;id=690a40ddff58c9332ff73d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54333-na-47a07cc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54333%3A%20n%2Fa&amp;severity=medium&amp;id=690a3d63ff58c9332ff26cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54332-na-32ed6a3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54332%3A%20n%2Fa&amp;severity=high&amp;id=690a323af0ba78a050599551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54331-na-7fb65d35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54331%3A%20n%2Fa&amp;severity=medium&amp;id=690a323af0ba78a050599547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54323-na-ec2018af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54323%3A%20n%2Fa&amp;severity=high&amp;id=690a2ec3f0ba78a05054a163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60925-na-6c65a3a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60925%3A%20n%2Fa&amp;severity=medium&amp;id=690a2ddcf0ba78a050535a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54330-na-f448294a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54330%3A%20n%2Fa&amp;severity=medium&amp;id=690a2ddcf0ba78a050535a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54329-na-b369ae1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54329%3A%20n%2Fa&amp;severity=high&amp;id=690a2ddcf0ba78a050535a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63294-na-857c890a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63294%3A%20n%2Fa&amp;severity=medium&amp;id=690a1e549fe43a2ba3125a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/research-unvalidated-trust-cross-stage-failure-mod-a3df6706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BResearch%5D%20Unvalidated%20Trust%3A%20Cross-Stage%20Failure%20Modes%20in%20LLM%2Fagent%20pipelines%20arXiv&amp;severity=medium&amp;id=6909438ca63c015b1ad8e1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-mutes-alerts-drains-crypto-wallets-4af149a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Mutes%20Alerts%2C%20Drains%20Crypto%20Wallets&amp;severity=medium&amp;id=6909762578d4f574c2b06798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34501-cwe-798-use-of-hard-coded-credentia-b365052b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34501%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=690929a9fe7723195e0fd62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13997-cwe-269-improper-privilege-manageme-8f643a65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13997%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=critical&amp;id=690929a9fe7723195e0fd62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13998-cwe-497-exposure-of-sensitive-syste-db841278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13998%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=medium&amp;id=69092613fe7723195e0b3000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11193-cwe-256-plaintext-storage-of-a-pass-7cb21465</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11193%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Lenovo%20Tab%20M11%20TB330FU%20TB330XU&amp;severity=medium&amp;id=6909227bfe7723195e06123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-142-released-two-high-severity-v8-flaws-fix-a4b8b149</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20142%20Released%3A%20Two%20high-severity%20V8%20flaws%20fixed%2C%20%24100K%20in%20rewards%20paid&amp;severity=high&amp;id=69091dc4c28fd46ded866acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oauth-device-code-phishing-azure-vs-google-compare-d2a0b4f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OAuth%20Device%20Code%20Phishing%3A%20Azure%20vs.%20Google%20Compared&amp;severity=medium&amp;id=69091dc4c28fd46ded866ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-rmm-tools-to-breach-freighters-and-ste-4217769e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20use%20RMM%20tools%20to%20breach%20freighters%20and%20steal%20cargo%20shipments&amp;severity=high&amp;id=69091dc4c28fd46ded866ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36172-cwe-79-improper-neutralization-of-i-666d9f1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=69091e13c28fd46ded8695da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vsx-extension-sleepyduck-uses-ethereum-t-2ecf319c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSX%20Extension%20%22SleepyDuck%22%20Uses%20Ethereum%20to%20Keep%20Its%20Command%20Server%20Alive&amp;severity=medium&amp;id=69091dc4c28fd46ded866ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jabber-zeus-developer-mricq-extradited-to-us-from--da3b0f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jabber%20Zeus%20developer%20%E2%80%98MrICQ%E2%80%99%20extradited%20to%20US%20from%20Italy&amp;severity=medium&amp;id=69091dc4c28fd46ded866ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12657-cwe-754-improper-check-for-unusual--6be44fd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12657%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20MongoDB%20Inc.%20MongoDB%20Server&amp;severity=medium&amp;id=69092135fe7723195e0534bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12531-cwe-611-improper-restriction-of-xml-93abefeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12531%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=690910fe7fff0e30ceee30a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-remote-tools-to-hijack-cargo-fre-dd281088</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=On%20the%20Road%20Again%3A%20Hackers%20Hijack%20Physical%20Cargo%20Freight&amp;severity=medium&amp;id=6909762578d4f574c2b0679b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mssql-exploitation-run-commands-like-a-pro-e8078eb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSSQL%20Exploitation%20-%20Run%20Commands%20Like%20A%20Pro&amp;severity=medium&amp;id=6908f876f612d110fea1760c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8558-cwe-306-missing-authentication-for-c-44e25d51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8558%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Proofpoint%20Insider%20Threat%20Management%20(ITM)%20Server&amp;severity=low&amp;id=6908f874f612d110fea175d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-vsx-extension-sleepyduck-uses-ethereum-t-3f858c73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20VSX%20Extension%20%22SleepyDuck%22%20Uses%20Ethereum%20to%20Keep%20Its%20Command%20Server%20Alive&amp;severity=medium&amp;id=6909758c78d4f574c2b04f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dante-spyware-linked-to-rebranded-hacking-team-2e492322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Dante%20Spyware%20Linked%20to%20Rebranded%20Hacking%20Team%2C%20Now%20Memento%20Labs&amp;severity=medium&amp;id=6908ed3b1c2a0078ae50e584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sniffing-established-ble-connections-with-hackrf-o-1e56d858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sniffing%20established%20BLE%20connections%20with%20HackRF%20One&amp;severity=low&amp;id=6908e5321c2a0078ae46cf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12463-cwe-89-improper-neutralization-of-s-957135d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12463%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Guetebruck%20G-Cam&amp;severity=critical&amp;id=6908e0dc2caf14b4c6e437c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-extradited-to-us-faces-charges-in-jabber-1ca8013a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Extradited%20to%20US%20Faces%20Charges%20in%20Jabber%20Zeus%20Cybercrime%20Case&amp;severity=medium&amp;id=6908dc622caf14b4c6de9f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10280-cwe-79-improper-neutralization-of-i-80f5396a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10280%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SailPoint%20Technologies%20IdentityIQ&amp;severity=high&amp;id=6908dc732caf14b4c6dea3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11953-cwe-78-improper-neutralization-of-s-8d972ba7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11953%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=6908dc732caf14b4c6dea3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-software-development-teams-can-securely-and-et-07f74eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Software%20Development%20Teams%20Can%20Securely%20and%20Ethically%20Deploy%20AI%20Tools&amp;severity=medium&amp;id=6908d4cabdcf00867c5adfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36093-cwe-602-client-side-enforcement-of--f9b8f397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36093%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908d14bbdcf00867c55ae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36092-cwe-1284-improper-validation-of-spe-e0929f82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36092%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36091-cwe-283-unverified-ownership-in-ibm-6047ad88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36091%3A%20CWE-283%20Unverified%20Ownership%20in%20IBM%20Cloud%20Pak%20For%20Business%20Automation&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b466d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11761-cwe-427-uncontrolled-search-path-el-40269164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11761%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HP%20Inc%20HP%20Client%20Management%20Script%20Library&amp;severity=high&amp;id=6908ca4cbdcf00867c4b466a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciso-burnout-epidemic-endemic-or-simply-inevitable-19153d04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISO%20Burnout%20%E2%80%93%20Epidemic%2C%20Endemic%2C%20or%20Simply%20Inevitable%3F&amp;severity=medium&amp;id=6908c44969f0cf13c915470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-access-real-cargo-cybercriminals-targeting--75eab978</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20access%2C%20real%20cargo%3A%20cybercriminals%20targeting%20trucking%20and%20logistics&amp;severity=medium&amp;id=690909ee7fff0e30cee423ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveraging-generative-ai-to-reverse-engineer-xload-c07d0d8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveraging%20Generative%20AI%20to%20Reverse%20Engineer%20XLoader&amp;severity=medium&amp;id=690909ee7fff0e30cee423d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8900-cwe-269-improper-privilege-managemen-c576ab7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8900%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dreamstechnologies%20Doccure%20Core&amp;severity=critical&amp;id=6908c0d069f0cf13c9121bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-solrsearch-exploit-attempts-cve-2025-24893-w-ead34534</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20SolrSearch%20Exploit%20Attempts%20(CVE-2025-24893)%20with%20link%20to%20Chicago%20Gangs%2FRappers%2C%20(Mon%2C%20Nov%203rd)&amp;severity=critical&amp;id=6908bd0532a746b8e5d27d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-v2-when-an-iot-botnet-goes-enterprise-rea-30f5456d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20v2%3A%20When%20an%20IoT%20Botnet%20Goes%20Enterprise-Ready&amp;severity=high&amp;id=6908ba5132a746b8e5cf6041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-peek-a-baku-apt-targets-dushanbe-with-es-d26a9dcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Peek-a-Baku%3A%20APT%20Targets%20Dushanbe%20with%20Espionage%20Campaign&amp;severity=medium&amp;id=690909ee7fff0e30cee423ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lets-get-physical-a-new-convergence-for-electrical-cc3d7cce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Let&apos;s%20Get%20Physical%3A%20A%20New%20Convergence%20for%20Electrical%20Grid%20Security&amp;severity=medium&amp;id=6908b6c532a746b8e5ca09fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beating-xloader-at-speed-generative-ai-as-a-force--2a64250d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beating%20XLoader%20at%20Speed%3A%20Generative%20AI%20as%20a%20Force%20Multiplier%20for%20Reverse%20Engineering&amp;severity=medium&amp;id=6908b6f832a746b8e5ca6ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/claude-ai-apis-can-be-abused-for-data-exfiltration-033a3ff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Claude%20AI%20APIs%20Can%20Be%20Abused%20for%20Data%20Exfiltration&amp;severity=medium&amp;id=6908af3073fc97d070c66b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-exploit-remote-monitoring-tools-to--69b8ed40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Exploit%20Remote%20Monitoring%20Tools%20to%20Infiltrate%20Logistics%20and%20Freight%20Networks&amp;severity=medium&amp;id=6908c95e69f0cf13c91d2d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64294-cwe-862-missing-authorization-in-d3-f5919c90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64294%3A%20Missing%20Authorization%20in%20d3wp%20WP%20Snow%20Effect&amp;severity=null&amp;id=6908adda73fc97d070c5c443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12626-path-traversal-in-jeecgboot-jeewx-b-fd2e7bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12626%3A%20Path%20Traversal%20in%20jeecgboot%20jeewx-boot&amp;severity=medium&amp;id=6908adda73fc97d070c5c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-caught-on-video-using-ai-filt-bfff95db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Caught%20on%20Video%20Using%20AI%20Filters%20in%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=6908b6da32a746b8e5ca0bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-httptroy-backdoor-poses-as-vpn-invoice-in-targ-26a1b1fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HttpTroy%20Backdoor%20Poses%20as%20VPN%20Invoice%20in%20Targeted%20Cyberattack%20on%20South%20Kore&amp;severity=high&amp;id=6908a96c73fc97d070bec004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-bankbot-ynrk-and-deliveryrat-a-86a9412b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20BankBot-YNRK%20and%20DeliveryRAT%20Android%20Trojans%20Stealing%20Financial%20Da&amp;severity=high&amp;id=6908a96c73fc97d070bec008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-lazarus-hits-web3-intelamd-tees-crack-df598cf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Lazarus%20Hits%20Web3%2C%20Intel%2FAMD%20TEEs%20Cracked%2C%20Dark%20Web%20Leak%20Tool%20%26%20More&amp;severity=medium&amp;id=6908a94c73fc97d070bebaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-developed-code-5-critical-security-checkpoints--58cc4a5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Developed%20Code%3A%205%20Critical%20Security%20Checkpoints%20for%20Human%20Oversight&amp;severity=critical&amp;id=6908aeab73fc97d070c61fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-evolution-of-soc-operations-how-continuous-exp-5f5c0e23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Evolution%20of%20SOC%20Operations%3A%20How%20Continuous%20Exposure%20Management%20Transforms%20Security%20Operations&amp;severity=medium&amp;id=6908ae0d73fc97d070c5dc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0987-cwe-639-authorization-bypass-through-3b0bdac5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0987%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20CB%20Project%20Ltd.%20Co.%20CVLand&amp;severity=critical&amp;id=69089bb7e3f4acb2c352ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-rotates-access-tokens-used-in-supply-chai-1f41102a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20rotates%20access%20tokens%20used%20in%20supply-chain%20malware%20attack&amp;severity=high&amp;id=69089836e3f4acb2c34f1b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-jabber-zeus-coder-mricq-in-us-custody-e321b621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Jabber%20Zeus%20Coder%20%E2%80%98MrICQ%E2%80%99%20in%20U.S.%20Custody&amp;severity=high&amp;id=69089836e3f4acb2c34f1b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/penn-hacker-claims-to-have-stolen-12-million-donor-1c69e86e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Penn%20hacker%20claims%20to%20have%20stolen%201.2%20million%20donor%20records%20in%20data%20breach&amp;severity=high&amp;id=690894b7e3f4acb2c34ab250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/conduent-january-2025-breach-impacts-10m-people-32ca261b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Conduent%20January%202025%20breach%20impacts%2010M%2B%20people&amp;severity=high&amp;id=690894b7e3f4acb2c34ab254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-bankbot-ynrk-and-deliveryrat-a-9c296903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20BankBot-YNRK%20and%20DeliveryRAT%20Android%20Trojans%20Stealing%20Financial%20Data&amp;severity=medium&amp;id=6908a0cbe3f4acb2c35b4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/youtube-ghost-network-spreads-infostealer-via-3000-d38387c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YouTube%20%E2%80%98Ghost%20Network%E2%80%99%20Spreads%20Infostealer%20via%203%2C000%20Fake%20Videos&amp;severity=medium&amp;id=69088dc45abee5c7f3616422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trufflenet-attack-wields-stolen-credentials-agains-962912f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;TruffleNet&apos;%20Attack%20Wields%20Stolen%20Credentials%20Against%20AWS&amp;severity=medium&amp;id=6908c9fc69f0cf13c91d7280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-httptroy-backdoor-poses-as-vpn-invoice-in-targ-ff3cda7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HttpTroy%20Backdoor%20Poses%20as%20VPN%20Invoice%20in%20Targeted%20Cyberattack%20on%20South%20Korea&amp;severity=medium&amp;id=69088a3c5abee5c7f35a3e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-uses-airstalk-malware-in-supply-chain--ff5ffaa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Uses%20%E2%80%98Airstalk%E2%80%99%20Malware%20in%20Supply%20Chain%20Attacks&amp;severity=medium&amp;id=690883a67dae335bea13e8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprks-playbook-httptroy-and-new-blindingcan-varian-cc93e7a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK&apos;s%20Playbook%3A%20HttpTroy%20and%20New%20BLINDINGCAN%20Variant&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/certified-oysterloader-tracking-rhysida-ransomware-f37d37ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Certified%20OysterLoader%3A%20Tracking%20Rhysida%20ransomware%20gang%20activity%20via%20code-signing%20certificates&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3rd-november-threat-intelligence-report-0190ee2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3rd%20November%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=69087cb87dae335bea0b08dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breaking-down-8-open-source-ai-security-tools-at-b-ad4bf0e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Breaking%20Down%208%20Open%20Source%20AI%20Security%20Tools%20at%20Black%20Hat%20Europe%202025%20Arsenal&amp;severity=medium&amp;id=69087ca07dae335bea0b00ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-pays-100000-in-rewards-for-two-chrome-vulne-60950c8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Pays%20%24100%2C000%20in%20Rewards%20for%20Two%20Chrome%20Vulnerabilities&amp;severity=high&amp;id=690872355b1bd484a8c9bf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-writeup-for-what-to-check-when-you-see-fireb-21a1f14d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20writeup%20for%20what%20to%20check%20when%20you%20see%20Firebase%20in%20a%20pentest&amp;severity=medium&amp;id=6908724c5b1bd484a8c9c7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48397-cwe-306-missing-authentication-for--52125ac9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48397%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Eaton%20Eaton%20Brightlayer%20Software%20Suite%20(BLSS)&amp;severity=high&amp;id=6908698d3bb3e250c652e21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12623-authorization-bypass-in-fushengqian-aae4f917</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12623%3A%20Authorization%20Bypass%20in%20fushengqian%20fuint&amp;severity=low&amp;id=690862853bb3e250c648388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48396-cwe-434-unrestricted-upload-of-file-ea15d9fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48396%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Eaton%20Eaton%20Brightlayer%20Software%20Suite%20(BLSS)&amp;severity=high&amp;id=690862853bb3e250c6483890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12622-buffer-overflow-in-tenda-ac10-891cb438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12622%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=69085df94b5305b1c0b87d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12619-buffer-overflow-in-tenda-a15-3fd827e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12619%3A%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=690856ef4b5305b1c0ad521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12503-cwe-89-improper-neutralization-of-s-9cd40743</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12503%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=high&amp;id=690852be2e0de603d5414690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12618-buffer-overflow-in-tenda-ac8-4178f479</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12618%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=690852be2e0de603d5414694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12617-sql-injection-in-itsourcecode-billi-05c510fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12617%3A%20SQL%20Injection%20in%20itsourcecode%20Billing%20System&amp;severity=medium&amp;id=6908334e257da31884c8b6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12616-insertion-of-sensitive-information--38ef055d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12616%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=69082c50451a199c687e5d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12615-use-of-hard-coded-cryptographic-key-9124d76a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12615%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PHPGurukul%20News%20Portal&amp;severity=low&amp;id=690825a268fbb04b61f1dfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12614-sql-injection-in-sourcecodester-bes-cd12bfac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12614%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=69081ea068fbb04b61f07fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12612-sql-injection-in-campcodes-school-f-e9d7b82d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12612%3A%20SQL%20Injection%20in%20Campcodes%20School%20Fees%20Payment%20Management%20System&amp;severity=medium&amp;id=6908179b68fbb04b61ed8a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12611-buffer-overflow-in-tenda-ac21-cd0e66db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12611%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=6908179b68fbb04b61ed8a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12610-sql-injection-in-codeastro-gym-mana-5188a280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12610%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=69080d0b68fbb04b61e3d3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12609-sql-injection-in-codeastro-gym-mana-26866042</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12609%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=690805fd68fbb04b61dd3046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12608-sql-injection-in-itsourcecode-onlin-4fbe7188</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12608%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907ffe668fbb04b61d889be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12607-sql-injection-in-itsourcecode-onlin-e16fa7fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12607%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907f80268fbb04b61d3775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-03-9eab0c1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-03&amp;severity=medium&amp;id=6909437da63c015b1ad88f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63293-na-f346df31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63293%3A%20n%2Fa&amp;severity=medium&amp;id=6909133ec28fd46ded78ba28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50735-na-06b35192</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50735%3A%20n%2Fa&amp;severity=high&amp;id=690909fb7fff0e30cee434ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63593-na-7e95b1d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63593%3A%20n%2Fa&amp;severity=medium&amp;id=6909084f7fff0e30cee234fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63441-na-f9bbf39d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63441%3A%20n%2Fa&amp;severity=high&amp;id=6908d8e12caf14b4c6da1111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50363-na-9cf09b4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50363%3A%20n%2Fa&amp;severity=medium&amp;id=6908d8e12caf14b4c6da110d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60503-na-f4f0c7f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60503%3A%20n%2Fa&amp;severity=high&amp;id=6908d4e3bdcf00867c5ae6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60785-na-257cc4ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60785%3A%20n%2Fa&amp;severity=high&amp;id=6908d4e3bdcf00867c5ae6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63452-na-141833c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63452%3A%20n%2Fa&amp;severity=critical&amp;id=6908d14bbdcf00867c55ae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63453-na-caa4488b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63453%3A%20n%2Fa&amp;severity=critical&amp;id=6908d14bbdcf00867c55ae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63449-na-16b61803</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63449%3A%20n%2Fa&amp;severity=medium&amp;id=6908cdd1bdcf00867c4fc665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63451-na-7e18ff7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63451%3A%20n%2Fa&amp;severity=critical&amp;id=6908cdd1bdcf00867c4fc657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63450-na-b43eb49c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63450%3A%20n%2Fa&amp;severity=medium&amp;id=6908cdd1bdcf00867c4fc651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63448-na-a238d6d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63448%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63447-na-e1f5113e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63447%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63446-na-59bc6720</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63446%3A%20n%2Fa&amp;severity=medium&amp;id=6908ca4cbdcf00867c4b4673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63443-na-9ebe62fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63443%3A%20n%2Fa&amp;severity=medium&amp;id=6908c7d269f0cf13c91ad0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63442-na-dba89a3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63442%3A%20n%2Fa&amp;severity=medium&amp;id=6908c7d269f0cf13c91ad0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60892-na-06710ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60892%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c9156063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29699-na-e1ec2e33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29699%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c915605f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51317-na-e3f33d44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51317%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c915605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45663-na-dd71b373</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45663%3A%20n%2Fa&amp;severity=medium&amp;id=6908c45e69f0cf13c9156057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12606-sql-injection-in-itsourcecode-onlin-9d0f36f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12606%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907eab77f25edc77b67d006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12605-sql-injection-in-itsourcecode-onlin-ca8361d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12605%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907e56eedf7d393671f50e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steal-ms-teams-app-cookies-6e3d8e3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steal%20MS%20Teams%20app%20cookies&amp;severity=medium&amp;id=6907df7bedf7d393671779e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12604-sql-injection-in-itsourcecode-onlin-2e36bec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12604%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=6907cf0ae86687b6d231194c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scans-for-port-85308531-tcp-likely-related-to-wsus-21cddef0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scans%20for%20Port%208530%2F8531%20(TCP).%20Likely%20related%20to%20WSUS%20Vulnerability%20CVE-2025-59287%2C%20(Sun%2C%20Nov%202nd)&amp;severity=medium&amp;id=69079dc57eef5c312db38b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drawn-to-danger-windows-graphics-vulnerabilities-l-4462158f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Drawn%20to%20Danger%3A%20Windows%20Graphics%20Vulnerabilities%20Lead%20to%20Remote%20Code%20Execution%20and%20Memory%20Exposure&amp;severity=critical&amp;id=6907626a2d54209f78d98806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12598-sql-injection-in-sourcecodester-bes-75c9891c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12598%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=69074a3c2c5f3d6573056ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12597-sql-injection-in-sourcecodester-bes-b847db98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12597%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=6907424c2c5f3d6573fcfe15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12596-buffer-overflow-in-tenda-ac23-c61abae8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12596%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=69073c6d82ffca841a909986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12595-buffer-overflow-in-tenda-ac23-58e3253b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12595%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=69072ecb55f62b0f9af90999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12594-sql-injection-in-code-projects-simp-9ecc3119</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12594%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=69071a8adb62f9b0ce09a13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12593-unrestricted-upload-in-code-project-b5b6341c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12593%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6906f96c7ed26d3e679435ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-02-5b3c6ac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-02&amp;severity=medium&amp;id=6907f3c97f25edc77b73844f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asd-warns-of-ongoing-badcandy-attacks-exploiting-c-205f23af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASD%20Warns%20of%20Ongoing%20BADCANDY%20Attacks%20Exploiting%20Cisco%20IOS%20XE%20Vulnerability&amp;severity=high&amp;id=69065d1d4f0ef70af711d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12603-cwe-787-out-of-bounds-write-in-azur-4b111aed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12603%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69065d944f0ef70af712612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12602-cwe-787-out-of-bounds-write-in-azur-87667d98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12602%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69065d944f0ef70af712611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12601-cwe-730-denial-of-service-in-azure--b3b372c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12601%3A%20CWE-730%20Denial%20of%20Service%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12600-cwe-730-denial-of-service-in-azure--bcd06cc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12600%3A%20CWE-730%20Denial%20of%20Service%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12599-cwe-321-use-of-hard-coded-cryptogra-f6ccf1ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12599%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690657e0fdaff23802df3e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quantifying-swiss-cheese-the-bayesian-way-1c725fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quantifying%20Swiss%20Cheese%2C%20the%20Bayesian%20Way&amp;severity=high&amp;id=69064fe2bd22b54dd70fbe0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kurdish-hacktivists-hezi-rash-behind-350-ddos--0cb53e94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kurdish%20Hacktivists%20Hezi%20Rash%20Behind%20350%20DDoS%20Attacks%20in%202%20Months&amp;severity=medium&amp;id=690626b8a9f0be756def3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-source-cve-scanner-for-project-dependencies-v-d4ed9b9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=open%20source%20CVE%20scanner%20for%20project%20dependencies.%20VSCode%20extension.&amp;severity=medium&amp;id=69061c34a9f0be756decfa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asd-warns-of-ongoing-badcandy-attacks-exploiting-c-2a68257e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASD%20Warns%20of%20Ongoing%20BADCANDY%20Attacks%20Exploiting%20Cisco%20IOS%20XE%20Vulnerability&amp;severity=critical&amp;id=6906ae5b4dd0d643165de7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36367-cwe-862-missing-authorization-6422a3cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36367%3A%20CWE-862%20Missing%20Authorization&amp;severity=high&amp;id=6905f7d9b1eaf3d2f0fca9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-redir-v2-blind-edr-with-fake-program-files-d6747ad6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR-Redir%20V2%3A%20Blind%20EDR%20With%20Fake%20%22Program%20Files%22&amp;severity=medium&amp;id=6905e809d7cf94fba2ea608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-abuse-at-scale-9267025a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Abuse%20at%20Scale&amp;severity=medium&amp;id=69088a4d5abee5c7f35a4db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australia-warns-of-badcandy-infections-on-unpatche-df32f5a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australia%20warns%20of%20BadCandy%20infections%20on%20unpatched%20Cisco%20devices&amp;severity=high&amp;id=6905d7fe3e4baa1dbaf8b646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/we-got-hacked-emails-threaten-to-leak-university-o-b590b958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98We%20got%20hacked%E2%80%99%20emails%20threaten%20to%20leak%20University%20of%20Pennsylvania%20data&amp;severity=high&amp;id=6905d7fe3e4baa1dbaf8b63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6988-cwe-79-improper-neutralization-of-in-fb9a778e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=medium&amp;id=6905b8c4149d58da8cb27fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6990-cwe-94-improper-control-of-generatio-d8cacd8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6990%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6905b8c4149d58da8cb27fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12137-cwe-73-external-control-of-file-nam-26695e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12137%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=medium&amp;id=6905ae02e1b1aafea8d7ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12171-cwe-434-unrestricted-upload-of-file-bf6d8f39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12171%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20anthonyeden%20RESTful%20Content%20Syndication&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11755-cwe-434-unrestricted-upload-of-file-f99e3169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11755%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpdelicious%20WP%20Delicious%20%E2%80%93%20Recipe%20Plugin%20for%20Food%20Bloggers%20(formerly%20Delicious%20Recipes)&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10487-cwe-94-improper-control-of-generati-9184271b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10487%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11499-cwe-434-unrestricted-upload-of-file-6af947e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11499%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20essekia%20Tablesome%20Table%20%E2%80%93%20Contact%20Form%20DB%20%E2%80%93%20WPForms%2C%20CF7%2C%20Gravity%2C%20Forminator%2C%20Fluent&amp;severity=critical&amp;id=6905ae02e1b1aafea8d7ec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6574-cwe-639-authorization-bypass-through-d6c582b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6574%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=high&amp;id=6905ae02e1b1aafea8d7ec94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11502-cwe-79-improper-neutralization-of-i-cc3eaefa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11740-cwe-89-improper-neutralization-of-s-818a25b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11740%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12038-cwe-863-incorrect-authorization-in--edb88ace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12038%3A%20CWE-863%20Incorrect%20Authorization%20in%20wpfolderly%20Folderly&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11983-cwe-200-exposure-of-sensitive-infor-20804bb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11983%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20scossar%20WP%20Discourse&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12090-cwe-79-improper-neutralization-of-i-7bb2e7a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Spotlight%20%E2%80%93%20Team%20Member%20Showcase%20%26%20Meet%20the%20Team%20Plugin&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12180-cwe-862-missing-authorization-in-qo-1a4778eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12180%3A%20CWE-862%20Missing%20Authorization%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=69059f2e1e4a8d05dce595dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11927-cwe-79-improper-neutralization-of-i-af727743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11927%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gijo%20Flying%20Images%3A%20Optimize%20and%20Lazy%20Load%20Images%20for%20Faster%20Page%20Speed&amp;severity=medium&amp;id=69058f8066e0c23159a8ccf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5949-cwe-639-authorization-bypass-through-fde58663</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5949%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=high&amp;id=69058f8066e0c23159a8cd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12118-cwe-79-improper-neutralization-of-i-52fe8b11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevingillispie%20Schema%20Scalpel&amp;severity=medium&amp;id=69058f8066e0c23159a8ccff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11995-cwe-79-improper-neutralization-of-i-fc09cd7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=high&amp;id=69058f8066e0c23159a8ccfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11377-cwe-200-exposure-of-sensitive-infor-171addb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11377%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=69058f8066e0c23159a8ccef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11928-cwe-79-improper-neutralization-of-i-7a721ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11928%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wipeoutmedia%20CSS%20%26%20JavaScript%20Toolbox&amp;severity=medium&amp;id=6905841371a6fc4aff3da4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12367-cwe-285-improper-authorization-in-s-7eb2a310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12367%3A%20CWE-285%20Improper%20Authorization%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=6905841371a6fc4aff3da4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11833-cwe-862-missing-authorization-in-sa-8d513e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11833%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20Complete%20SMTP%20Solution%20with%20Logs%2C%20Alerts%2C%20Backup%20SMTP%20%26%20Mobile%20App&amp;severity=critical&amp;id=6905841371a6fc4aff3da4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62275-cwe-863-incorrect-authorization-in--dba97816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62275%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6905798771a6fc4aff3b85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11922-cwe-79-improper-neutralization-of-i-281d1d6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20j_3rk%20Inactive%20Logout&amp;severity=medium&amp;id=690567f271a6fc4aff36b3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11920-cwe-98-improper-control-of-filename-37d199f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11920%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=690567f271a6fc4aff36b3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11174-cwe-285-improper-authorization-in-b-14d445b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11174%3A%20CWE-285%20Improper%20Authorization%20in%20barn2media%20Document%20Library%20Lite&amp;severity=medium&amp;id=690567f271a6fc4aff36b3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11816-cwe-862-missing-authorization-in-wp-b4a75309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11816%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Privacy%20Policy%20Generator%2C%20Terms%20%26%20Conditions%20Generator%20WordPress%20Plugin%20%3A%20WP%20Legal%20Pages&amp;severity=medium&amp;id=690567f271a6fc4aff36b3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-11-01-6229a138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-11-01&amp;severity=medium&amp;id=6906a1ea3dd8f1d01dd46f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62276-cwe-525-use-of-web-browser-cache-co-e0c14fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62276%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6905491afb7fda9fbd25249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-arrests-meduza-stealer-developers-after-gov-a46174ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Arrests%20Meduza%20Stealer%20Developers%20After%20Government%20Hack&amp;severity=medium&amp;id=69052f2fa02e7fe8a679652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12464-stack-based-buffer-overflow-in-red--e68ed452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12464%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=6905290a5a7d71ee5de3edbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-skycloak-tor-campaign-targets-military-o-18dd853b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SkyCloak%3A%20Tor%20Campaign%20targets%20Military%20of%20Russia%20%26%20Belarus&amp;severity=medium&amp;id=69052bb4a02e7fe8a6757d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-targets-european-diplomatic-entities-with--508ebc4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Targets%20European%20Diplomatic%20Entities%20With%20Windows%20Exploit&amp;severity=medium&amp;id=69055f4871a6fc4aff359281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ribbon-communications-breach-marks-latest-telecom--01eaced1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ribbon%20Communications%20Breach%20Marks%20Latest%20Telecom%20Attack&amp;severity=medium&amp;id=69055f4871a6fc4aff359284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60711-cwe-693-protection-mechanism-failur-9988d1b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60711%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69050e83f07fd4df0f173840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10693-cwe-757-selection-of-less-secure-al-c9798528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10693%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20silabs.com%20Silicon%20Labs%20Z-Wave%20SDK&amp;severity=high&amp;id=69050e83f07fd4df0f173843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12547-improper-restriction-of-excessive-a-448a33af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12547%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=690504b88e4e311697907915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12546-cross-site-scripting-in-logicaldoc--362369f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12546%3A%20Cross%20Site%20Scripting%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=690504b88e4e31169790790f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62267-cwe-79-improper-neutralization-of-i-c0578934</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6904fe6639657deb20180355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62264-cwe-79-improper-neutralization-of-i-363c3f09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6904faef39657deb2013f7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-unveils-aardvark-gpt-5-agent-that-finds-and-577cd8b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Unveils%20Aardvark%3A%20GPT-5%20Agent%20That%20Finds%20and%20Fixes%20Code%20Flaws%20Automatically&amp;severity=medium&amp;id=69055e2471a6fc4aff34f132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59501-cwe-290-authentication-bypass-by-sp-7cc506b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59501%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=6904e98dae52ebddb37144ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6075-vulnerability-in-python-software-fou-52ab587c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6075%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=6904e98dae52ebddb37144c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nation-state-hackers-deploy-new-airstalk-malware-i-2e4ab527</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nation-State%20Hackers%20Deploy%20New%20Airstalk%20Malware%20in%20Suspected%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=69055e2471a6fc4aff34f135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12554-cwe-693-protection-mechanism-failur-d8b806fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12554%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=6904e78dae52ebddb370320f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12509-cwe-829-inclusion-of-functionality--893f2856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12509%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Bizerba%20BRAIN2&amp;severity=high&amp;id=6904e78dae52ebddb3703209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12508-cwe-319-cleartext-transmission-of-s-3727b2a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12508%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Bizerba%20BRAIN2&amp;severity=high&amp;id=6904e78dae52ebddb3703206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12507-cwe-428-unquoted-search-path-or-ele-c577aded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12507%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Bizerba%20_connect.BRAIN&amp;severity=high&amp;id=6904e78dae52ebddb3703203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12553-cwe-599-missing-validation-of-opens-52e3c03d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12553%3A%20CWE-599%20Missing%20Validation%20of%20OpenSSL%20Certificate%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6904e78dae52ebddb370320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12552-cwe-521-weak-password-requirements--eea5b071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12552%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=6904db52cf9c100c41c3e00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-approach-to-disrupt-cyber-scams-is-frag-8aa7e605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%20Approach%20to%20Disrupt%20Cyber%20Scams%20is%20&apos;Fragmented&apos;&amp;severity=medium&amp;id=6909762578d4f574c2b0679e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12357-cwe-923-in-iso-15118-2-network-and--3ffa7d8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12357%3A%20CWE-923%20in%20ISO%2015118-2%20Network%20and%20Application%20Protocol%20Requirements%20EV%20Car%20Chargers&amp;severity=medium&amp;id=6904db52cf9c100c41c3e00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-whatsapp-passkey-encrypted-backups-r-077c4282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20WhatsApp%20Passkey-Encrypted%20Backups%2C%20Russia%20Targets%20Meduza%20Malware%2C%20New%20Mastercard%20Solution&amp;severity=medium&amp;id=6904d42fdadb00d130f6c830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64168-cwe-362-concurrent-execution-using--af3aeef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64168%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20agno-agi%20agno&amp;severity=high&amp;id=6904d0bddadb00d130f3212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64385-cwe-20-improper-input-validation-in-417f5325</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64385%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Circutor%20TCPRS1plus&amp;severity=critical&amp;id=6904c9ac8ec00889be37f4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64389-cwe-319-cleartext-transmission-of-s-74fab0d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64389%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Circutor%20TCPRS1plus&amp;severity=high&amp;id=6904c9ac8ec00889be37f503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64388-cwe-400-uncontrolled-resource-consu-cac32ed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64388%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Circutor%20TCPRS1plus&amp;severity=critical&amp;id=6904c7b38ec00889be3656e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64387-cwe-1021-improper-restriction-of-re-e1206d6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64387%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Circutor%20TCPRS1plus&amp;severity=medium&amp;id=6904c7b38ec00889be3656e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12501-integer-overflow-in-opera-norway-as-8fa09d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12501%3A%20Integer%20Overflow%20in%20Opera%20Norway%20AS%20GameMaker%20IDE&amp;severity=high&amp;id=6904c7b38ec00889be3656e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-exploit-windows-shortcut-flaw-49e2be6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Exploit%20Windows%20Shortcut%20Flaw%20to%20Target%20European%20Diplomats&amp;severity=medium&amp;id=6904c289f54b4a899781a306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12460-cwe-79-improper-neutralization-of-i-f31bb708</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Afterlogic%20Aurora&amp;severity=medium&amp;id=6904c2a6f54b4a899781b912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12521-cwe-200-exposure-of-sensitive-infor-c1fe9368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12521%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Analytify%20Analytify%20Pro&amp;severity=medium&amp;id=6904c2a6f54b4a899781b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ernst-young-exposes-4tb-sql-server-backup-publicly-fd1b4d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ernst%20%26%20Young%20Exposes%204TB%20SQL%20Server%20Backup%20Publicly%20on%20Microsoft%20Azure&amp;severity=high&amp;id=6904bf0ef54b4a89977c21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-zero-day-actively-exploited-to-spy-on-euro-aed45052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20zero-day%20actively%20exploited%20to%20spy%20on%20European%20diplomats&amp;severity=critical&amp;id=6904bf0ef54b4a89977c21c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64386-cwe-1021-improper-restriction-of-re-71b1ca95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64386%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Circutor%20TCPRS1plus&amp;severity=high&amp;id=6904bf30f54b4a89977c5647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-tick-group-exploits-lanscope-zero-day-99b087f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Tick%20Group%20Exploits%20Lanscope%20Zero-Day%20to%20Hijack%20Corporate%20Systems&amp;severity=critical&amp;id=69055e2471a6fc4aff34f138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-man-extradited-from-ireland-to-us-over-c-da4dcca6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Man%20Extradited%20From%20Ireland%20to%20US%20Over%20Conti%20Ransomware%20Charges&amp;severity=medium&amp;id=6904b827a6ddfd238693b43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36249-cwe-614-sensitive-cookie-in-https-s-1d452c9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36249%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=low&amp;id=6904bd22f54b4a89977ab6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33003-cwe-250-execution-with-unnecessary--c0741535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33003%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=6904bd22f54b4a89977ab6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wsus-flaw-to-spread-skuld-stealer--6ea5f322</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WSUS%20Flaw%20to%20Spread%20Skuld%20Stealer%20Despite%20Microsoft%20Patch&amp;severity=high&amp;id=6904b12fa6ddfd23868a9dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13992-cwe-79-improper-neutralization-of-i-0a1ca514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6904b13fa6ddfd23868ab73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4952-cwe-732-incorrect-permission-assignm-a2c0b981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4952%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ESET%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=6904add5541c5042bae1090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/open-vsx-downplays-impact-from-glassworm-campaign-69597ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Open%20VSX%20Downplays%20Impact%20From%20GlassWorm%20Campaign&amp;severity=medium&amp;id=6904adbc541c5042bae0faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64368-cross-site-request-forgery-csrf-in--340979d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64368%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mikado-Themes%20Bard&amp;severity=medium&amp;id=6904a350479ed964d8ea1f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64367-improper-neutralization-of-input-du-7cdabec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=medium&amp;id=6904a350479ed964d8ea1f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64366-improper-neutralization-of-special--dbb299fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64366%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=high&amp;id=6904a350479ed964d8ea1f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64365-improper-neutralization-of-input-du-c31b385b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64365%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colabrio%20Ohio%20Extra&amp;severity=medium&amp;id=6904a350479ed964d8ea1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64364-improper-control-of-filename-for-in-78389db8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Masterstudy&amp;severity=high&amp;id=6904a350479ed964d8ea1f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64363-improper-control-of-filename-for-in-2e46e954</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64363%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SeventhQueen%20Kleo&amp;severity=high&amp;id=6904a350479ed964d8ea1f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64362-improper-neutralization-of-input-du-74f88d70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20K%20Elements&amp;severity=medium&amp;id=6904a34e479ed964d8ea1ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64361-improper-neutralization-of-input-du-84f75ece</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StylemixThemes%20Consulting%20Elementor%20Widgets&amp;severity=medium&amp;id=6904a34e479ed964d8ea1ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64360-improper-control-of-filename-for-in-c2398146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Consulting%20Elementor%20Widgets&amp;severity=high&amp;id=6904a34e479ed964d8ea1ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64359-improper-control-of-filename-for-in-f82d57b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Consulting&amp;severity=high&amp;id=6904a34e479ed964d8ea1ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64358-missing-authorization-in-webtoffee--e6c936a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64358%3A%20Missing%20Authorization%20in%20WebToffee%20Smart%20Coupons%20for%20WooCommerce&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64357-cross-site-request-forgery-csrf-in--56cf65a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Younes%20JFR.%20Advanced%20Database%20Cleaner&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64356-missing-authorization-in-f1logic-in-d4863d62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64356%3A%20Missing%20Authorization%20in%20f1logic%20Insert%20PHP%20Code%20Snippet&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64354-improper-neutralization-of-input-du-1ca1acd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matias%20Ventura%20Gutenberg&amp;severity=medium&amp;id=6904a34e479ed964d8ea1e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64353-deserialization-of-untrusted-data-i-c5a4bd0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64353%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chouby%20Polylang&amp;severity=high&amp;id=6904a34e479ed964d8ea1e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64352-missing-authorization-in-wpdevelope-6b2c87b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64352%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=low&amp;id=6904a34e479ed964d8ea1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-conti-ransomware-suspect-extradited-to-u-395ed5c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Conti%20Ransomware%20Suspect%20Extradited%20to%20US%20from%20Ireland&amp;severity=medium&amp;id=69049fc8479ed964d8e4638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40603-cwe-532-insertion-of-sensitive-info-eb095ea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40603%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SonicWall%20SMA100&amp;severity=medium&amp;id=690498e560041281bb1cf1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-exploited-xwiki-vmware-flaws-to-kev-cata-9f30d19b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Exploited%20XWiki%2C%20VMware%20Flaws%20to%20KEV%20Catalog&amp;severity=medium&amp;id=690498c760041281bb1cecd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-exploits-unpatched-windows-flaw-in-rec-e110ee35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Exploits%20Unpatched%20Windows%20Flaw%20in%20Recent%20Attacks&amp;severity=medium&amp;id=6904917f8338aee69048baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11602-cwe-226-sensitive-information-in-re-e629c409</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11602%3A%20CWE-226%3A%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20neo4j%20Enterprise%20Edition&amp;severity=medium&amp;id=69048e028338aee690446fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11843-cwe-290-authentication-bypass-by-sp-06a0d0b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11843%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Therefore%20Corporation%20GmbH%20Therefore%20Online%20and%20Therefore%20On-Premises&amp;severity=high&amp;id=6904870d8338aee69039b244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-cyberattacks-by-apt-group-cloud-atlas--8a38ba1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20wave%20of%20cyberattacks%20by%20APT%20group%20Cloud%20Atlas%20on%20Russia&apos;s%20government%20sector&amp;severity=medium&amp;id=69049c46479ed964d8e04a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-brazil-with-love-new-tactics-from-lampion-fef0df3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Brazil%20with%20Love%3A%20New%20Tactics%20from%20Lampion&amp;severity=medium&amp;id=69049c46479ed964d8e04a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-an-evolving-discord-based-rat-family-380166e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20an%20evolving%20Discord-based%20RAT%20family&amp;severity=medium&amp;id=690498dc60041281bb1ceeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latam-baited-into-the-delivery-of-purehvnc-3d15ff64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LATAM%20baited%20into%20the%20delivery%20of%20PureHVNC&amp;severity=medium&amp;id=690498dc60041281bb1cefe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-loader-executing-tornet-and-purehvnc-efed6f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Loader%20Executing%20TorNet%20and%20PureHVNC&amp;severity=medium&amp;id=690498dc60041281bb1cf013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-report-androidbankbot-ynrk-mobile-ba-7334d161</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20Report%3A%20Android%2FBankBot-YNRK%20Mobile%20Banking%20Trojan&amp;severity=medium&amp;id=690491968338aee69048ea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12115-cwe-602-client-side-enforcement-of--9dc63988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12115%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20wpclever%20WPC%20Name%20Your%20Price%20for%20WooCommerce&amp;severity=high&amp;id=690483ba189d660333d91771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12041-cwe-862-missing-authorization-in-ap-a8e1e44e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12041%3A%20CWE-862%20Missing%20Authorization%20in%20apos37%20ERI%20File%20Library&amp;severity=medium&amp;id=690483ba189d660333d9176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-vmware-zero-day-exploited-by-china-link-2ed1373a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20VMware%20Zero-Day%20Exploited%20by%20China-Linked%20Hackers%20in%20Active%20Attacks&amp;severity=critical&amp;id=690483a0189d660333d909de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-revokes-leaked-open-vsx-tokens--da758c0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Revokes%20Leaked%20Open%20VSX%20Tokens%20Following%20Wiz%20Discovery&amp;severity=high&amp;id=690483a0189d660333d909e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30189-improper-preservation-of-consistenc-b9045fba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30189%3A%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=69048024189d660333d32ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30191-improper-restriction-of-rendered-ui-9790f329</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30191%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=69047ca9189d660333cf19e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30188-uncontrolled-resource-consumption-i-68cd8ed6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30188%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=high&amp;id=69047ca9189d660333cf19e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62232-cwe-532-insertion-of-sensitive-info-dfa48615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62232%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=high&amp;id=69047ca9189d660333cf19e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-and-nsa-issue-urgent-guidance-to-secure-wsus--eb3952bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20and%20NSA%20Issue%20Urgent%20Guidance%20to%20Secure%20WSUS%20and%20Microsoft%20Exchange%20Servers&amp;severity=medium&amp;id=69055e2471a6fc4aff34f13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-weaponizes-zdi-can-25373-vulnerability-to--cd80b558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Weaponizes%20ZDI-CAN-25373%20Vulnerability%20to%20Deploy%20PlugX%20Against%20Hungarian%20and%20Belgian%20Diplomatic%20Entities&amp;severity=medium&amp;id=69047c9e189d660333cf0809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8383-cwe-352-cross-site-request-forgery-c-cc6a2cdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20averta%20Depicter%20%E2%80%94%20Popup%20%26%20Slider%20Builder&amp;severity=medium&amp;id=690475de992e7194db50fe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12094-cwe-693-protection-mechanism-failur-76331afb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12094%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20oopspam%20OOPSpam%20Anti-Spam%3A%20Spam%20Protection%20for%20WordPress%20Forms%20%26%20Comments%20(No%20CAPTCHA)&amp;severity=medium&amp;id=690475de992e7194db50fe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12175-cwe-862-missing-authorization-in-st-a86d5f51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12175%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20The%20Events%20Calendar&amp;severity=medium&amp;id=690475de992e7194db50fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eclipse-foundation-revokes-leaked-open-vsx-tokens--c073460e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eclipse%20Foundation%20Revokes%20Leaked%20Open%20VSX%20Tokens%20Following%20Wiz%20Discovery&amp;severity=low&amp;id=69055e2471a6fc4aff34f141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/japan-issues-ot-security-guidance-for-semiconducto-681d2db8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Japan%20Issues%20OT%20Security%20Guidance%20for%20Semiconductor%20Factories&amp;severity=medium&amp;id=69046b5ec4aece8eb7bba98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6520-cwe-89-improper-neutralization-of-sp-41035cd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6520%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Abis%20Technology%20BAPSIS&amp;severity=critical&amp;id=69046b76c4aece8eb7bbb0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8385-cwe-22-improper-limitation-of-a-path-8abeba51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8385%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PX-lab%20Zombify&amp;severity=medium&amp;id=6904678cd694fb7fc736cf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10897-cwe-22-improper-limitation-of-a-pat-aba0df75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=high&amp;id=6904678cd694fb7fc736cefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-vmware-zero-day-exploited-by-china-link-797a141c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20VMware%20Zero-Day%20Exploited%20by%20China-Linked%20Hackers%20in%20Active%20Attacks&amp;severity=high&amp;id=690463f2d694fb7fc7319064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7846-cwe-36-absolute-path-traversal-in-va-90866acd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7846%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20vanquish%20WordPress%20User%20Extra%20Fields&amp;severity=high&amp;id=69045cb533ef7ec31284379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8489-cwe-269-improper-privilege-managemen-b5b3a721</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8489%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20kingaddons%20King%20Addons%20for%20Elementor%20%E2%80%93%204%2C000%2B%20ready%20Elementor%20sections%2C%20650%2B%20templates%2C%2070%2B%20FREE%20widgets%20for%20Elementor&amp;severity=critical&amp;id=69045cb533ef7ec3128437a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5397-cwe-288-authentication-bypass-using--eaf3d7aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5397%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Noo%20JobMonster&amp;severity=critical&amp;id=69045cb533ef7ec312843799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11191-cwe-862-missing-authorization-in-re-3344a713</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11191%3A%20CWE-862%20Missing%20Authorization%20in%20RealPress&amp;severity=medium&amp;id=69045e81d694fb7fc7296d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54763-improper-neutralization-of-special--f08e1930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54763%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Century%20Systems%20Co.%2C%20Ltd.%20FutureNet%20MA-X%20series&amp;severity=high&amp;id=6904523333ef7ec31273476b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58152-files-or-directories-accessible-to--59c3d4da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58152%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20Century%20Systems%20Co.%2C%20Ltd.%20FutureNet%20MA-X%20series&amp;severity=medium&amp;id=6904523333ef7ec31273476f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-security-layer-for-macos-takes-aim-at-admin--476b0907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Security%20Layer%20for%20macOS%20Takes%20Aim%20at%20Admin%20Errors%20Before%20Hackers%20Do&amp;severity=medium&amp;id=69055e2471a6fc4aff34f144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11806-cwe-79-improper-neutralization-of-i-c75f04f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qzzr%20Qzzr%20Shortcode%20Plugin&amp;severity=medium&amp;id=69042534aebfcd547431d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11975-cwe-862-missing-authorization-in-fu-b813de93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11975%3A%20CWE-862%20Missing%20Authorization%20in%20fusewp%20FuseWP%20%E2%80%93%20WordPress%20User%20Sync%20to%20Email%20List%20%26%20Marketing%20Automation%20(Mailchimp%2C%20Constant%20Contact%2C%20ActiveCampaign%20etc.)&amp;severity=medium&amp;id=69042534aebfcd547431d430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6176-cwe-400-uncontrolled-resource-consum-e86a6505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6176%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20scrapy%20scrapy%2Fscrapy&amp;severity=high&amp;id=6903fe8daebfcd5474a63725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-31-c0274374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-31&amp;severity=medium&amp;id=6905500cfb7fda9fbd2ed095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63563-na-9d5d3738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63563%3A%20n%2Fa&amp;severity=medium&amp;id=69051bc430c0d02a22040343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63561-na-530bbb87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63561%3A%20n%2Fa&amp;severity=high&amp;id=6905184f30c0d02a22fffc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63562-na-0eedc4d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63562%3A%20n%2Fa&amp;severity=medium&amp;id=69051574f07fd4df0f20dbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63458-na-b4598c46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63458%3A%20n%2Fa&amp;severity=high&amp;id=690508328e4e311697948c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63454-na-77503cc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63454%3A%20n%2Fa&amp;severity=high&amp;id=6905063d8e4e3116979314c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63460-na-1a6f26b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63460%3A%20n%2Fa&amp;severity=high&amp;id=6904f211986dd4e4187f7593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63459-na-d1dc2699</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63459%3A%20n%2Fa&amp;severity=high&amp;id=6904f08d986dd4e4187ccde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63465-na-5cb624f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63465%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63464-na-e5c62316</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63464%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63463-na-9883fd32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63463%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63462-na-72b95be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63462%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63461-na-2a1ed345</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63461%3A%20n%2Fa&amp;severity=high&amp;id=6904e98dae52ebddb37144b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63469-na-57c23d27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63469%3A%20n%2Fa&amp;severity=high&amp;id=6904e78dae52ebddb3703212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57108-na-58043a4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57108%3A%20n%2Fa&amp;severity=critical&amp;id=6904dcd4cf9c100c41c66458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63468-na-53a3f353</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63468%3A%20n%2Fa&amp;severity=high&amp;id=6904db52cf9c100c41c3e016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63466-na-afc69715</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63466%3A%20n%2Fa&amp;severity=high&amp;id=6904db52cf9c100c41c3e013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63467-na-6bfa0cbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63467%3A%20n%2Fa&amp;severity=high&amp;id=6904d7cadadb00d130fc157c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29270-na-c3c48668</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29270%3A%20n%2Fa&amp;severity=critical&amp;id=6904d7cadadb00d130fc1579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57107-na-4bb31bbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57107%3A%20n%2Fa&amp;severity=high&amp;id=6904d0bddadb00d130f32132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57106-na-3e4ad546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57106%3A%20n%2Fa&amp;severity=high&amp;id=6904d0bddadb00d130f3212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60749-na-64f7bea6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60749%3A%20n%2Fa&amp;severity=high&amp;id=6904cd2f8ec00889be3d7aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61427-na-d9dd7be0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61427%3A%20n%2Fa&amp;severity=medium&amp;id=6904c9ac8ec00889be37f4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flowise-304-remote-code-execution-rce-0d4ee7ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flowise%203.0.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6904bcc1f54b4a89977a2e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23050-cwe-125-out-of-bounds-read-in-qt-8bd20c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23050%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Qt&amp;severity=low&amp;id=69041725aebfcd5474f35bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8849-cwe-400-uncontrolled-resource-consum-d4797e85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8849%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=6903fb06aebfcd5474a51c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fcc-will-vote-to-scrap-telecom-cybersecurity-requi-955b1987</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FCC%20will%20vote%20to%20scrap%20telecom%20cybersecurity%20requirements&amp;severity=medium&amp;id=6903f780aebfcd5474a443c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zombie-projects-rise-again-to-undermine-security-98d9685d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zombie%20Projects%20Rise%20Again%20to%20Undermine%20Security&amp;severity=medium&amp;id=69055f4871a6fc4aff359287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48983-vulnerability-in-veeam-backup-and-r-c62835d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48983%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=critical&amp;id=6903f7a3aebfcd5474a44742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48982-vulnerability-in-veeam-agent-for-mi-e117654c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48982%3A%20Vulnerability%20in%20Veeam%20Agent%20for%20Microsoft%20Windows&amp;severity=high&amp;id=6903f7a3aebfcd5474a4473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27208-vulnerability-in-revive-revive-adse-f4fa953d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27208%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=medium&amp;id=6903f7a3aebfcd5474a4473c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48984-vulnerability-in-veeam-backup-and-r-9e80df79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48984%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Replication&amp;severity=high&amp;id=6903f7a3aebfcd5474a4474d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brush-exploit-can-cause-any-chromium-browser-to-co-ccedb57d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brush%20exploit%20can%20cause%20any%20Chromium%20browser%20to%20collapse%20in%2015-60%20seconds&amp;severity=high&amp;id=6903f780aebfcd5474a443c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52665-vulnerability-in-ubiquiti-inc-unifi-32cc4757</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52665%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Access%20Application&amp;severity=critical&amp;id=6903f7a3aebfcd5474a44756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52663-vulnerability-in-ubiquiti-inc-unifi-990c9baf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52663%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Talk%20Touch&amp;severity=high&amp;id=6903f7a3aebfcd5474a44750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48980-vulnerability-in-brave-desktop-brow-e9cf4c9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48980%3A%20Vulnerability%20in%20Brave%20Desktop%20Browser&amp;severity=medium&amp;id=6903f7a3aebfcd5474a4474a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52664-vulnerability-in-revive-revive-adse-6ba87dfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52664%3A%20Vulnerability%20in%20Revive%20Revive%20Adserver&amp;severity=high&amp;id=6903f7a3aebfcd5474a44753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-claims-it-stole-23gb-from-apache--0b215574</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Claims%20It%20Stole%2023GB%20from%20Apache%20OpenOffice&amp;severity=medium&amp;id=6903f077aebfcd5474a1faef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7316-cwe-79-improper-neutralization-of-in-309084e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7315-cwe-79-improper-neutralization-of-in-ebcc7746</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14001-cwe-79-improper-neutralization-of-i-a4ce2627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7318-cwe-79-improper-neutralization-of-in-9d172c6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14000-cwe-79-improper-neutralization-of-i-c08f3f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7313-cwe-79-improper-neutralization-of-in-f309c714</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7314-cwe-79-improper-neutralization-of-in-7eb9eefb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53688-cwe-79-improper-neutralization-of-i-400c930d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e67f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7317-cwe-862-missing-authorization-in-nag-58b17b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7317%3A%20CWE-862%20Missing%20Authorization%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee7aebfcd54749e67fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13996-cwe-613-insufficient-session-expira-a18b20c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13996%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13993-cwe-79-improper-neutralization-of-i-451fccf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee7aebfcd54749e6800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14008-cwe-78-improper-neutralization-of-s-34bf2173</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14008%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e682b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34286-cwe-78-improper-neutralization-of-s-efb80336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34286%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e683f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14003-cwe-78-improper-neutralization-of-s-4a624af2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14003%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34134-cwe-78-improper-neutralization-of-s-ab21e3af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34134%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14009-cwe-269-improper-privilege-manageme-8f97daba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14009%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14004-cwe-269-improper-privilege-manageme-304ddc2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14004%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Nagios%20XI&amp;severity=high&amp;id=6903dee8aebfcd54749e681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34287-cwe-732-incorrect-permission-assign-b2b17dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34287%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20XI&amp;severity=high&amp;id=6903deeaaebfcd54749e6b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34135-cwe-732-incorrect-permission-assign-5f207cbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34135%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Nagios%20XI&amp;severity=medium&amp;id=6903dee8aebfcd54749e683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14006-cwe-346-origin-validation-error-in--5fac1da3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14006%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Nagios%20XI&amp;severity=high&amp;id=6903dee8aebfcd54749e6826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-18-year-old-codebase-left-smart-buildings-wide--afaed408</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%2018-Year-Old%20Codebase%20Left%20Smart%20Buildings%20Wide%20Open&amp;severity=medium&amp;id=69055f4871a6fc4aff35928a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14005-cwe-78-improper-neutralization-of-s-637c7973</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903dee8aebfcd54749e6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14002-cwe-98-improper-control-of-filename-73b69dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14002%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db62aebfcd54749cd818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34284-cwe-78-improper-neutralization-of-s-1addf98c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34284%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20XI&amp;severity=critical&amp;id=6903db62aebfcd54749cd81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13995-cwe-497-exposure-of-sensitive-syste-4d322a9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13995%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db62aebfcd54749cd813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34283-cwe-497-exposure-of-sensitive-syste-34edced4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34283%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db64aebfcd54749cd8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13994-cwe-862-missing-authorization-in-na-10fe0d2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13994%3A%20CWE-862%20Missing%20Authorization%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db63aebfcd54749cd84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13999-cwe-497-exposure-of-sensitive-syste-480dc901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13999%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20XI&amp;severity=high&amp;id=6903db63aebfcd54749cd853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7319-cwe-79-improper-neutralization-of-in-4b1988d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=medium&amp;id=6903db62aebfcd54749cd831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34278-cwe-79-improper-neutralization-of-i-208c0262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=medium&amp;id=6903db64aebfcd54749cd8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34280-cwe-78-improper-neutralization-of-s-a8eb2c7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34280%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Network%20Analyzer&amp;severity=high&amp;id=6903db64aebfcd54749cd8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7321-cwe-79-improper-neutralization-of-in-10f871a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7321%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db62aebfcd54749cd835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7323-cwe-79-improper-neutralization-of-in-53b4d033</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db62aebfcd54749cd83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58272-cwe-79-improper-neutralization-of-i-685a8f7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58272&amp;severity=null&amp;id=6903db63aebfcd54749cd858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34298-cwe-281-improper-preservation-of-pe-60d50680</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34298%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db64aebfcd54749cd8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34277-cwe-94-improper-control-of-generati-e781fd2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34277%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=6903db64aebfcd54749cd8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34272-cwe-200-exposure-of-sensitive-infor-d8859d85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34272%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db63aebfcd54749cd872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34273-cwe-863-incorrect-authorization-in--59a87b49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34273%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58273-cwe-266-incorrect-privilege-assignm-632aa834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58273%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34274-cwe-250-execution-with-unnecessary--6979e6b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34274%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=6903db63aebfcd54749cd87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7322-cwe-863-incorrect-authorization-in-n-e0241be2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7322%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db62aebfcd54749cd839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34271-cwe-319-cleartext-transmission-of-s-ae1309bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34271%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=6903db63aebfcd54749cd86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34270-cwe-312-cleartext-storage-of-sensit-66961f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34270%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Nagios%20Log%20Server&amp;severity=medium&amp;id=6903db63aebfcd54749cd867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53689-cwe-79-improper-neutralization-of-i-c228cc64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53690-cwe-79-improper-neutralization-of-i-4edc0ff4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7312-cwe-79-improper-neutralization-of-in-12faff53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7312%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Nagios%20Fusion&amp;severity=medium&amp;id=6903db62aebfcd54749cd82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34269-cwe-613-insufficient-session-expira-9d180085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34269&amp;severity=null&amp;id=6903db63aebfcd54749cd862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34249-cwe-307-improper-restriction-of-exc-92c6659c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34249&amp;severity=null&amp;id=6903d7ddaebfcd54749bf69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7325-cwe-306-missing-authentication-for-c-b6820620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7325%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Anheng%20Information%20(Hangzhou%20DBAPP%20Security%20Information%20Technology%20Co.%2C%20Ltd.)%20Mingyu%20Operations%20and%20Maintenance%20Audit%20and%20Risk%20Control%20System&amp;severity=critical&amp;id=6903d7ddaebfcd54749bf69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-stands-out-in-refusal-to-sign-un-cybercrime-tre-96a4d257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Stands%20Out%20in%20Refusal%20to%20Sign%20UN%20Cybercrime%20Treaty&amp;severity=low&amp;id=69055f4871a6fc4aff35928d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-claroty-authentication-bypass-flaw-opened-04540570</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Claroty%20Authentication%20Bypass%20Flaw%20Opened%20OT%20to%20Attack&amp;severity=critical&amp;id=69055f4871a6fc4aff359290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automating-comdcom-vulnerability-research-f704b274</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automating%20COM%2FDCOM%20vulnerability%20research&amp;severity=medium&amp;id=6903c9ceaebfcd54749995e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8850-cwe-440-expected-behavior-violation--36b4c778</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8850%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=low&amp;id=6903c64aaebfcd5474991deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lotl-attack-hides-malware-in-windows-native-ai-sta-41166944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LotL%20Attack%20Hides%20Malware%20in%20Windows%20Native%20AI%20Stack&amp;severity=medium&amp;id=69055f4871a6fc4aff359293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3356-cwe-22-improper-limitation-of-a-path-a7e7c432</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6903bbbdaebfcd5474960ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3355-cwe-22-improper-limitation-of-a-path-46c85436</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3355%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6903bbbdaebfcd5474960ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36137-cwe-250-execution-with-unnecessary--d12693ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36137%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Sterling%20Connect%3ADirect%20for%20Unix&amp;severity=high&amp;id=6903b838aebfcd5474944466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62265-cwe-79-improper-neutralization-of-i-d21a69fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6903b13baebfcd5474914704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-plugged-chatgpt-dalle-and-whatsapp-apps-ta-3876fa1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware-Plugged%20ChatGPT%2C%20DALL%C2%B7E%20and%20WhatsApp%20Apps%20Target%20US%20Users&amp;severity=medium&amp;id=6903adaaaebfcd54748fc5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64118-cwe-362-concurrent-execution-using--5e631f30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64118%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20isaacs%20node-tar&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-you-break-our-pickle-sandbox-blog-exploit-chal-9c9b9bbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20you%20break%20our%20pickle%20sandbox%3F%20Blog%20%2B%20exploit%20challenge%20inside&amp;severity=high&amp;id=6903a6a5aebfcd54748ac6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64112-cwe-79-improper-neutralization-of-i-db2db47d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64112%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20statamic%20cms&amp;severity=high&amp;id=6903a6a4aebfcd54748ac668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64115-cwe-601-url-redirection-to-untruste-3b477e22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64115%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20leepeuker%20movary&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62266-cwe-601-url-redirection-to-untruste-ab6fc836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62266%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64116-cwe-601-url-redirection-to-untruste-3e14f705</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64116%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20leepeuker%20movary&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64096-cwe-121-stack-based-buffer-overflow-f4e21142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64096%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=6903adccaebfcd54748fc906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-built-in-ai-defenses-on-android-now-block--a4a184e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20Built-In%20AI%20Defenses%20on%20Android%20Now%20Block%2010%20Billion%20Scam%20Messages%20a%20Month&amp;severity=medium&amp;id=69055e2471a6fc4aff34f147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-ransomware-gangs-weaponize-open-source-ada-0e297d19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Ransomware%20Gangs%20Weaponize%20Open-Source%20AdaptixC2%20for%20Advanced%20Attacks&amp;severity=medium&amp;id=69055e2471a6fc4aff34f14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/year-long-nation-state-hack-hits-us-telecom-ribbon-203d4c95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Year-Long%20Nation-State%20Hack%20Hits%20US%20Telecom%20Ribbon%20Communications&amp;severity=medium&amp;id=6903951aaebfcd5474815d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62726-cwe-829-inclusion-of-functionality--0fa144da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62726%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20n8n-io%20n8n&amp;severity=high&amp;id=69039529aebfcd547481615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11998-cwe-200-exposure-of-sensitive-infor-dd7d8c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11998%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc.%20Card%20Readers%20B%20Model&amp;severity=medium&amp;id=69038e10aebfcd54747db0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-found-2k-vulns-400-secrets-and-175-pii-inst-1aa44553</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20found%20%2B2k%20vulns%2C%20400%2B%20secrets%20and%20175%20PII%20instances%20in%20publicly%20exposed%20apps%20built%20on%20vibe-coded%20platforms%20(Research%20methodology)&amp;severity=critical&amp;id=69038a86aebfcd54747b5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12517-cwe-448-obsolete-feature-in-ui-in-a-ac63c9bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12517%3A%20CWE-448%20Obsolete%20Feature%20in%20UI%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=69038a85aebfcd54747b5ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12516-cwe-394-unexpected-status-code-or-r-2740e6ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12516%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69038a85aebfcd54747b5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12515-cwe-394-unexpected-status-code-or-r-8361783b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12515%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69038a85aebfcd54747b5ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-deep-dive-into-warlock-ransomware-deployed-via-t-88ca7719</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Deep%20Dive%20Into%20Warlock%20Ransomware%20Deployed%20Via%20ToolShell%20SharePoint%20Chained%20Vulnerabilities&amp;severity=medium&amp;id=69038701aebfcd5474799457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36592-cwe-79-improper-neutralization-of-i-b913e0c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36592%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Secure%20Connect%20Gateway%20SCG%20Policy%20Manager&amp;severity=medium&amp;id=69038700aebfcd5474799441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46363-cwe-23-relative-path-traversal-in-d-0b443e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46363%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20Secure%20Connect%20Gateway%20SCG%205.0%20Application%20and%20Appliance&amp;severity=medium&amp;id=69038700aebfcd5474799447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-brash-exploit-crashes-chromium-browsers-instan-940fa577</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Brash%22%20Exploit%20Crashes%20Chromium%20Browsers%20Instantly%20with%20a%20Single%20Malicious%20URL&amp;severity=low&amp;id=69055e2471a6fc4aff34f14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5347-cwe-79-improper-neutralization-of-in-fc242a99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=690378f1aebfcd547472f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5343-cwe-79-improper-neutralization-of-in-0f1845c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=690378f1aebfcd547472f157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43942-cwe-78-improper-neutralization-of-s-e2e2b8cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43942%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=690378f1aebfcd547472f154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloud-outages-highlight-the-need-for-resilient-sec-e42f7fa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloud%20Outages%20Highlight%20the%20Need%20for%20Resilient%2C%20Secure%20Infrastructure%20Recovery&amp;severity=high&amp;id=69055f4871a6fc4aff359296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5342-cwe-400-uncontrolled-resource-consum-77d83293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5342%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zohocorp%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=medium&amp;id=6903756daebfcd547471732a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46422-cwe-78-improper-neutralization-of-s-71ebb324</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46422%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903756daebfcd547471731f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46423-cwe-78-improper-neutralization-of-s-65ea5176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46423%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903756daebfcd5474717322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43027-cwe-284-improper-access-control-in--36520a6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43027%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Genetec%20Inc.%20Genetec%20Security%20Center&amp;severity=critical&amp;id=6903756daebfcd547471731b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43939-cwe-78-improper-neutralization-of-s-17f5567f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43939%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;%20in%20Dell%20Unity&amp;severity=high&amp;id=690378f1aebfcd547472f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43940-cwe-78-improper-neutralization-of-s-655404b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43940%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6903a6a4aebfcd54748ac679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43941-cwe-78-improper-neutralization-of-s-65a134ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43941%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=690371e9aebfcd54746e8f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-request-purpose-identifying-research-and-bug-bou-15a7e400</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X-Request-Purpose%3A%20Identifying%20%22research%22%20and%20bug%20bounty%20related%20scans%26%23x3f%3B%2C%20(Thu%2C%20Oct%2030th)&amp;severity=medium&amp;id=69036752aebfcd5474676d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-impacted-by-conduent-data-breach-86274f88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Million%20Impacted%20by%20Conduent%20Data%20Breach&amp;severity=medium&amp;id=690363d0aebfcd547465b5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10348-cwe-79-improper-neutralization-of-i-45900c42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eveo%20URVE%20Smart%20Office&amp;severity=medium&amp;id=690363e9aebfcd547465bb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-defense-contractor-exec-pleads-guilty-to-sellin-2a7b8f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Defense%20contractor%20exec%20pleads%20guilty%20to%20selling%20cyber%20exploits%20to%20Russia&amp;severity=medium&amp;id=69036054aebfcd547464671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-us-telecom-backbone-firm-hacked-by-nation-st-53e5efd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20US%20Telecom%20Backbone%20Firm%20Hacked%20by%20Nation-State%20Actors&amp;severity=medium&amp;id=69035cc8aebfcd547462d39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-exploit-adaptix-multi-platform-pen-4a316877</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Exploit%20Adaptix%20Multi-Platform%20Pentesting%20Tool%20in%20Ransomware%20Attacks&amp;severity=high&amp;id=690355cdaebfcd54745fa958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-death-of-the-security-checkbox-bas-is-the-powe-bcca287c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Death%20of%20the%20Security%20Checkbox%3A%20BAS%20Is%20the%20Power%20Behind%20Real%20Defense&amp;severity=medium&amp;id=69055e2471a6fc4aff34f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10317-cwe-352-cross-site-request-forgery--8303a24e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10317%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20Quick.Cart&amp;severity=medium&amp;id=69035245aebfcd54745da8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-says-hackers-tampered-with-ics-at-water-fac-3fbf71e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20Says%20Hackers%20Tampered%20With%20ICS%20at%20Water%20Facility%2C%20Oil%20and%20Gas%20Firm&amp;severity=medium&amp;id=69034eb8aebfcd54745be6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/136-npm-packages-delivering-infostealers-downloade-b4a33748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=136%20NPM%20Packages%20Delivering%20Infostealers%20Downloaded%20100%2C000%20Times&amp;severity=medium&amp;id=690345d3aebfcd54745867b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-dns-poisoning-flaw-supply-chai-e92d73d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20DNS%20Poisoning%20Flaw%2C%20Supply-Chain%20Heist%2C%20Rust%20Malware%20Trick%20and%20New%20RATs%20Rising&amp;severity=high&amp;id=69055e2471a6fc4aff34f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53883-cwe-80-improper-neutralization-of-s-3c6ac075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53883%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%20manager%205.0&amp;severity=critical&amp;id=690345edaebfcd54745877ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39663-cwe-80-improper-neutralization-of-s-3992d94f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39663%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=690345edaebfcd54745877ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53880-cwe-35-path-traversal-in-suse-conta-6026aa4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53880%3A%20CWE-35%3A%20Path%20Traversal%20in%20SUSE%20Container%20suse%2Fmanager%2F4.3%2Fproxy-httpd%3Alatest&amp;severity=high&amp;id=690340b1aebfcd547455b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomraven-malware-found-in-126-npm-packages-ste-028e3a3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomRaven%20Malware%20Found%20in%20126%20npm%20Packages%20Stealing%20GitHub%20Tokens%20From%20Devs&amp;severity=medium&amp;id=69055e2471a6fc4aff34f160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54471-cwe-321-use-of-hard-coded-cryptogra-df538edb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54471%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=690335411ead54a02dedddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54941-cwe-78-improper-neutralization-of-s-7534876f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54941%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=690335411ead54a02dedddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54469-cwe-78-improper-neutralization-of-s-36f98e7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54469%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SUSE%20neuvector&amp;severity=critical&amp;id=690335411ead54a02dedddc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54470-cwe-295-improper-certificate-valida-63474386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54470%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SUSE%20neuvector&amp;severity=high&amp;id=6903330c1ead54a02de8d06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/former-us-defense-contractor-executive-admits-to-s-05341e44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Former%20US%20Defense%20Contractor%20Executive%20Admits%20to%20Selling%20Exploits%20to%20Russia&amp;severity=medium&amp;id=690332f21ead54a02de8b063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62402-cwe-250-execution-with-unnecessary--81f6a57a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62402%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69032fc11ead54a02de5c439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62503-cwe-250-execution-with-unnecessary--3f793a6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62503%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=69032fc11ead54a02de5c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11906-cwe-732-incorrect-permission-assign-19bbd1a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11906%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Progress%20Software%20Flowmon&amp;severity=medium&amp;id=690319b962f3017fc2134dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11881-cwe-862-missing-authorization-in-sc-6f85f453</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11881%3A%20CWE-862%20Missing%20Authorization%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=medium&amp;id=69030ee925802725f5b0163a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10636-cwe-79-cross-site-scripting-xss-in--9fcea5f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10636%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20NS%20Maintenance%20Mode%20for%20WP&amp;severity=low&amp;id=69030287a36935f67201748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-leak-outs-students-of-irans-mois-training-aca-1529e86a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Leak%20Outs%20Hacker%20Students%20of%20Iran&apos;s%20MOIS%20Training%20Academy&amp;severity=medium&amp;id=6903026aa36935f672014418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62229-use-after-free-in-red-hat-red-hat-e-8c4c6704</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62229%3A%20Use%20After%20Free%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=69030287a36935f67201749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10008-cwe-862-missing-authorization-in-re-5b3bfb23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10008%3A%20CWE-862%20Missing%20Authorization%20in%20remyb92%20Translate%20WordPress%20and%20go%20Multilingual%20%E2%80%93%20Weglot&amp;severity=medium&amp;id=69030287a36935f672017491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11627-cwe-117-improper-output-neutralizat-25e43d00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11627%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20sminozzi%20Site%20Checkup%20Debug%20AI%20Troubleshooting%20with%20Wizard%20and%20Tips%20for%20Each%20Issue&amp;severity=medium&amp;id=69030287a36935f672017496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62230-use-after-free-in-red-hat-red-hat-e-c766d3dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62230%3A%20Use%20After%20Free%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=6902f902867527dded2d9ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62231-integer-overflow-or-wraparound-in-r-f94f0749</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62231%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20Xwayland&amp;severity=high&amp;id=6902f42fa7d593c99349cd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12475-cwe-79-improper-neutralization-of-i-62c7d03d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12475%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=6902ed45a7d593c993388b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-breach-canadas-critical-infrastructure-98178fda</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%20breach%20Canada%E2%80%99s%20critical%20infrastructure%2C%20cyber%20Agency%20warns&amp;severity=critical&amp;id=6902aac604b4f2cbf902fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50739-na-f0a70666</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50739%3A%20n%2Fa&amp;severity=critical&amp;id=69043203fe27b1aa12d0c69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50736-na-962ab9d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50736%3A%20n%2Fa&amp;severity=medium&amp;id=69043203fe27b1aa12d0c699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-30-dbde9e0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-30&amp;severity=medium&amp;id=6903fe7aaebfcd5474a5f00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60950-na-e294cc14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60950%3A%20n%2Fa&amp;severity=medium&amp;id=6903d46daebfcd54749b1920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61498-na-e9239115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61498%3A%20n%2Fa&amp;severity=high&amp;id=6903d46daebfcd54749b191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61141-na-091e4a36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61141%3A%20n%2Fa&amp;severity=high&amp;id=6903d46daebfcd54749b1917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63423-na-745342b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63423%3A%20n%2Fa&amp;severity=high&amp;id=6903bf40aebfcd547497a028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63422-na-4d4ac0e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63422%3A%20n%2Fa&amp;severity=high&amp;id=6903b838aebfcd5474944469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63885-na-0049e6f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63885%3A%20n%2Fa&amp;severity=medium&amp;id=6903b13baebfcd547491470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61196-na-cd0397fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61196%3A%20n%2Fa&amp;severity=high&amp;id=6903b13baebfcd547491470b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63298-na-bd8ad9a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63298%3A%20n%2Fa&amp;severity=high&amp;id=6903b13baebfcd5474914707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52180-na-6bd746f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52180%3A%20n%2Fa&amp;severity=medium&amp;id=6903b13baebfcd5474914700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57109-na-cb2986d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57109%3A%20n%2Fa&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52179-na-c0584ef0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52179%3A%20n%2Fa&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56313-na-7538d73e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56313%3A%20n%2Fa&amp;severity=medium&amp;id=6903a323aebfcd5474891e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61121-na-770a4d2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61121%3A%20n%2Fa&amp;severity=high&amp;id=69039529aebfcd5474816158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61120-na-cbf0a87c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61120%3A%20n%2Fa&amp;severity=high&amp;id=69039529aebfcd5474816155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60319-na-a97e1990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60319%3A%20n%2Fa&amp;severity=medium&amp;id=69039529aebfcd5474816151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61119-na-f40069bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61119%3A%20n%2Fa&amp;severity=high&amp;id=69039192aebfcd54747facdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61114-na-fdabc6ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61114%3A%20n%2Fa&amp;severity=high&amp;id=69039192aebfcd54747facda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61118-na-a879ba80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61118%3A%20n%2Fa&amp;severity=high&amp;id=69038e10aebfcd54747db0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61117-na-d4255f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61117%3A%20n%2Fa&amp;severity=high&amp;id=69038a85aebfcd54747b5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61116-na-0090662a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61116%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd547479944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61113-na-d96c61dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61113%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd547479944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61115-na-82157f97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61115%3A%20n%2Fa&amp;severity=high&amp;id=69038700aebfcd5474799444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50574-na-1e69c7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50574%3A%20n%2Fa&amp;severity=medium&amp;id=6903756daebfcd5474717325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63608-na-3c8df444</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63608%3A%20n%2Fa&amp;severity=medium&amp;id=69035ce4aebfcd547462d5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-security-posture-management-what-does-best-in-42b4ac67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Security%20Posture%20Management%20%E2%80%94%20What%20Does%20&apos;Best%20in%20Class&apos;%20Look%20Like%3F&amp;severity=low&amp;id=69055f4871a6fc4aff359299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62257-cwe-307-improper-restriction-of-exc-1f076a25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62257%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6902a496d6627ef5904f74b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12466-cwe-288-authentication-bypass-using-0eddf91c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12466%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Simple%20OAuth%20(OAuth2)%20%26%20OpenID%20Connect&amp;severity=high&amp;id=6902a10ed6627ef5904a7ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12083-cwe-79-improper-neutralization-of-i-53978d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20CivicTheme%20Design%20System&amp;severity=medium&amp;id=6902a10ed6627ef5904a7abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12082-cwe-863-incorrect-authorization-in--33597dfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12082%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20CivicTheme%20Design%20System&amp;severity=high&amp;id=6902a10ed6627ef5904a7abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10929-cwe-1288-improper-validation-of-con-15756f96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10929%3A%20CWE-1288%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20Drupal%20Reverse%20Proxy%20Header&amp;severity=medium&amp;id=6902a10ed6627ef5904a7ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10930-cwe-352-cross-site-request-forgery--d296d724</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10930%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Currency&amp;severity=medium&amp;id=6902a10ed6627ef5904a7ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10931-cwe-79-improper-neutralization-of-i-51c07ba6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Umami%20Analytics&amp;severity=low&amp;id=6902a10ed6627ef5904a7ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10928-cwe-307-improper-restriction-of-exc-6c155f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10928%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Access%20code&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10927-cwe-79-improper-neutralization-of-i-0788e1e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10927%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Plausible%20tracking&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10926-cwe-79-improper-neutralization-of-i-0f30e46c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20JSON%20Field&amp;severity=medium&amp;id=6902a10ed6627ef5904a7aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9954-cwe-862-missing-authorization-in-dru-0f631a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9954%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Acquia%20DAM&amp;severity=high&amp;id=6902a10ed6627ef5904a7ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54549-cwe-347-improper-verification-of-cr-916649c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54549%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54548-cwe-200-exposure-of-sensitive-infor-3dd9e603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54548%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54547-cwe-613-in-arista-networks-danz-mon-abbcb9b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54547%3A%20CWE-613%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=medium&amp;id=69029c9ff29b216d6d6a4c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54546-cwe-732-in-arista-networks-danz-mon-2bb9a658</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54546%3A%20CWE-732%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=high&amp;id=69029c9ff29b216d6d6a4c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54545-cwe-732-in-arista-networks-danz-mon-839b197b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54545%3A%20CWE-732%20in%20Arista%20Networks%20DANZ%20Monitoring%20Fabric&amp;severity=high&amp;id=69029c9ff29b216d6d6a4c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-nfc-relay-malware-to-clone-android-tap-d7689093</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20NFC%20Relay%20Malware%20to%20Clone%20Android%20Tap-to-Pay%20Transactions&amp;severity=medium&amp;id=69029784f29b216d6d62bfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61724-cwe-407-inefficient-algorithmic-com-bdc8fdca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61724%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20net%2Ftextproto&amp;severity=medium&amp;id=69029404f29b216d6d5e20db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58183-cwe-400-uncontrolled-resource-consu-5f89bd3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58183%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20archive%2Ftar&amp;severity=medium&amp;id=69029404f29b216d6d5e20b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58188-cwe-248-uncaught-exception-in-go-st-452ba3cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58188%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69029404f29b216d6d5e20c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58186-cwe-400-uncontrolled-resource-consu-c94217ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58186%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=69029404f29b216d6d5e20bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58185-cwe-400-uncontrolled-resource-consu-25539bbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58185%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20encoding%2Fasn1&amp;severity=medium&amp;id=69029404f29b216d6d5e20b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47912-cwe-1286-improper-validation-of-syn-ab015c69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47912%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Go%20standard%20library%20net%2Furl&amp;severity=medium&amp;id=69029404f29b216d6d5e20ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61723-cwe-407-inefficient-algorithmic-com-f02bb21a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61723%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20encoding%2Fpem&amp;severity=high&amp;id=69029404f29b216d6d5e20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58189-cwe-117-improper-output-neutralizat-b638c8bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58189%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Go%20standard%20library%20crypto%2Ftls&amp;severity=medium&amp;id=69029404f29b216d6d5e20cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58187-cwe-407-inefficient-algorithmic-com-fc38edee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58187%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=69029404f29b216d6d5e20c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61725-cwe-407-inefficient-algorithmic-com-793630da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61725%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Go%20standard%20library%20net%2Fmail&amp;severity=high&amp;id=69029406f29b216d6d5e20ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61959-cwe-209-generation-of-error-message-c46868e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61959%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Vertikal%20Systems%20Hospital%20Manager%20Backend%20Services&amp;severity=medium&amp;id=69028fd8779efea1caa7305b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54459-cwe-497-exposure-of-sensitive-syste-a3bbb673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54459%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Vertikal%20Systems%20Hospital%20Manager%20Backend%20Services&amp;severity=high&amp;id=69028fd8779efea1caa73058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-disguised-with-invisible-de-60254b4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20NPM%20Packages%20Disguised%20With%20&apos;Invisible&apos;%20Dependencies&amp;severity=low&amp;id=690281ce8daac4bcead4b020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-search-tools-easily-fooled-by-fake-content-a8c75471</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Search%20Tools%20Easily%20Fooled%20by%20Fake%20Content&amp;severity=medium&amp;id=69028f16779efea1caa6d31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dentsu-subsidiary-breached-employee-data-stolen-a6542214</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dentsu%20Subsidiary%20Breached%2C%20Employee%20Data%20Stolen&amp;severity=medium&amp;id=690281ce8daac4bcead4b023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11465-cwe-416-use-after-free-in-ashlar-ve-73982a09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11465%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027029ea3d051f22387348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11464-cwe-122-heap-based-buffer-overflow--5383a5e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11464%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027029ea3d051f22387345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11463-cwe-190-integer-overflow-or-wraparo-931f582f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11463%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=69027028ea3d051f22387342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9870-cwe-59-improper-link-resolution-befo-f063dc65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9870%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69027029ea3d051f2238734b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9871-cwe-59-improper-link-resolution-befo-021a2f44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9871%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69027029ea3d051f2238734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9869-cwe-59-improper-link-resolution-befo-433a46ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9869%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Razer%20Synapse%203&amp;severity=high&amp;id=69026ca6ea3d051f2234935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64104-cwe-89-improper-neutralization-of-s-5fe153a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64104%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20langchain-ai%20langgraph&amp;severity=high&amp;id=69026375e09a14ef713ad330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-look-at-polaredge-adjacent-infrastructure-bd6bad13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smoking%20Gun%20Uncovered%3A%20RPX%20Relay%20at%20PolarEdge&apos;s%20Core%20Exposed&amp;severity=medium&amp;id=68e0f2efb66c7f7acdd19dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-scripts-to-systems-a-comprehensive-look-at-ta-edc5174a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Scripts%20to%20Systems%3A%20A%20Comprehensive%20Look%20at%20Tangerine%20Turkey%20Operations&amp;severity=medium&amp;id=6902755fea3d051f2241b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-october-2025-cyber-attacks-your-soc-cant-ign-6479382e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20October%202025%20Cyber%20Attacks%20Your%20SOC%20Can&apos;t%20Ignore&amp;severity=medium&amp;id=6902755fea3d051f2241b5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11232-cwe-823-use-of-out-of-range-pointer-ad8fa2cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11232%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20ISC%20Kea&amp;severity=high&amp;id=6902598f52c03fa7b6eb66e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-security-change-for-azure-vms-creates-pi-ffb6f9ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Security%20Change%20for%20Azure%20VMs%20Creates%20Pitfalls&amp;severity=medium&amp;id=690255ff52c03fa7b6e5ac3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62797-cwe-352-cross-site-request-forgery--dfc70b3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62797%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rathena%20FluxCP&amp;severity=high&amp;id=6902561b52c03fa7b6e5bf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1549-cwe-77-improper-neutralization-of-sp-f30a95b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1549%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20WatchGuard%20Mobile%20VPN%20with%20SSL%20Client&amp;severity=medium&amp;id=69024872c461420f24c8f564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12479-cwe-352-cross-site-request-forgery--adbd5512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12479%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=69024872c461420f24c8f561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12478-cwe-326-inadequate-encryption-stren-0796a748</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12478%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c54244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12477-cwe-306-missing-authentication-for--5d81e1ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12477%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c54241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12476-cwe-306-missing-authentication-for--785223db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12476%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690244f5c461420f24c5423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hijack-corporate-xwiki-servers-for-crypto--9073ddc4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hijack%20Corporate%20XWiki%20Servers%20for%20Crypto%20Mining&amp;severity=medium&amp;id=6902400de6b2d94ab7036e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/botnets-step-up-cloud-attacks-via-flaws-misconfigu-56c29260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Botnets%20Step%20Up%20Cloud%20Attacks%20Via%20Flaws%2C%20Misconfigurations&amp;severity=medium&amp;id=69026876e09a14ef7141f993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-npm-packages-caught-stealing-developer-credenti-5b906cd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20npm%20Packages%20Caught%20Stealing%20Developer%20Credentials%20on%20Windows%2C%20macOS%2C%20and%20Linux&amp;severity=high&amp;id=69023d22b9e127f7a36f1099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-ukrainian-organizations-usi-676e7bfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20Ukrainian%20Organizations%20Using%20Stealthy%20Living-Off-the-Land%20Tactics&amp;severity=high&amp;id=69023d22b9e127f7a36f109d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-reports-sharp-increase-in-automated-botnet-84315c2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Reports%20Sharp%20Increase%20in%20Automated%20Botnet%20Attacks%20Targeting%20PHP%20Servers%20and%20IoT%20Devices&amp;severity=medium&amp;id=69023607b9e127f7a36545eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12148-cwe-200-exposure-of-sensitive-infor-e1f04e9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12148%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69023631b9e127f7a3656331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14012-cwe-426-untrusted-search-path-in-re-966cba5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14012%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Revenera%20InstallShield&amp;severity=high&amp;id=69023631b9e127f7a365632e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12147-cwe-200-exposure-of-sensitive-infor-a2555f16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12147%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20floragunn%20Search%20Guard%20FLX&amp;severity=medium&amp;id=69023421b9e127f7a363597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/which-social-media-are-the-most-privacy-oriented-i-6df90d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Which%20social%20media%20are%20the%20most%20privacy-oriented%20in%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=69022fd983bae5e856672194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58269-cwe-532-insertion-of-sensitive-info-892443ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58269%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SUSE%20rancher&amp;severity=medium&amp;id=69022c4683bae5e8566219d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ai-targeted-cloaking-attack-tricks-ai-crawlers-1b2fba5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20AI-Targeted%20Cloaking%20Attack%20Tricks%20AI%20Crawlers%20Into%20Citing%20Fake%20Info%20as%20Verified%20Facts&amp;severity=medium&amp;id=69025c2652c03fa7b6eeccaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32199-cwe-281-improper-preservation-of-pe-6d66cde8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32199%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20SUSE%20rancher&amp;severity=medium&amp;id=69022c4683bae5e8566219ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10932-cwe-400-uncontrolled-resource-consu-8a9cae93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10932%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Progress%20MOVEit%20Transfer&amp;severity=high&amp;id=690226d083bae5e8565b1722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitre-unveils-attck-v18-with-updates-to-detections-1ab94de5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MITRE%20Unveils%20ATT%26CK%20v18%20With%20Updates%20to%20Detections%2C%20Mobile%2C%20ICS&amp;severity=medium&amp;id=69021a6014cc779bff04bff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64150-vulnerability-in-jenkins-project-je-a837192d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64150%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64149-vulnerability-in-jenkins-project-je-f0977504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64149%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64148-vulnerability-in-jenkins-project-je-2ede9281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64148%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Publish%20to%20Bitbucket%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64147-vulnerability-in-jenkins-project-je-dc873849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64147%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Curseforge%20Publisher%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64146-vulnerability-in-jenkins-project-je-0e12b12f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64146%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Curseforge%20Publisher%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64145-vulnerability-in-jenkins-project-je-f08e6f2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64145%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ByteGuard%20Build%20Actions%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64144-vulnerability-in-jenkins-project-je-e92ac7d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64144%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ByteGuard%20Build%20Actions%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64143-vulnerability-in-jenkins-project-je-ff876257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64143%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenShift%20Pipeline%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff051072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64142-vulnerability-in-jenkins-project-je-f58a1c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64142%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Task%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64141-vulnerability-in-jenkins-project-je-23e863f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64141%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Task%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8714cc779bff05106c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64140-vulnerability-in-jenkins-project-je-fde60171</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64140%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Azure%20CLI%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64139-vulnerability-in-jenkins-project-je-efe70d08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64139%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Start%20Windocks%20Containers%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64138-vulnerability-in-jenkins-project-je-025e7dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64138%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Start%20Windocks%20Containers%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64137-vulnerability-in-jenkins-project-je-a92f410b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64137%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Themis%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64136-vulnerability-in-jenkins-project-je-4453b905</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64136%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Themis%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64135-vulnerability-in-jenkins-project-je-b2b2a89c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64135%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Eggplant%20Runner%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64134-vulnerability-in-jenkins-project-je-b4a24dd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64134%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20JDepend%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64133-vulnerability-in-jenkins-project-je-bdfec17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64133%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Extensible%20Choice%20Parameter%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64132-vulnerability-in-jenkins-project-je-be245172</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64132%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20MCP%20Server%20Plugin&amp;severity=medium&amp;id=69021a8414cc779bff050fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64131-vulnerability-in-jenkins-project-je-14782c0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64131%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20SAML%20Plugin&amp;severity=high&amp;id=69021a8414cc779bff050fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suspected-nation-state-threat-actor-uses-new-airst-3cd86ab2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Suspected%20Nation-State%20Threat%20Actor%20Uses%20New%20Airstalk%20Malware%20in%20a%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=690216e314cc779bff00702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11587-cwe-862-missing-authorization-in-jg-9e2672d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11587%3A%20CWE-862%20Missing%20Authorization%20in%20jgrietveld%20Call%20Now%20Button%20%E2%80%93%20The%20%231%20Click%20to%20Call%20Button%20for%20WordPress&amp;severity=medium&amp;id=69020d512a3e20b1cb02a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11632-cwe-862-missing-authorization-in-jg-f713491e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11632%3A%20CWE-862%20Missing%20Authorization%20in%20jgrietveld%20Call%20Now%20Button%20%E2%80%93%20The%20%231%20Click%20to%20Call%20Button%20for%20WordPress&amp;severity=medium&amp;id=69020d512a3e20b1cb02a675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12142-cwe-120-buffer-copy-without-checkin-06391073</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12142%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=690204523aaa02566521b4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/preparing-for-the-digital-battlefield-of-2026-ghos-2ad8e93c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Preparing%20for%20the%20Digital%20Battlefield%20of%202026%3A%20Ghost%20Identities%2C%20Poisoned%20Accounts%2C%20%26%20AI%20Agent%20Havoc&amp;severity=medium&amp;id=690212ea2a3e20b1cb0af1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-target-ukrainian-organizations-usi-decc4b12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Target%20Ukrainian%20Organizations%20Using%20Stealthy%20Living-Off-the-Land%20Tactics&amp;severity=medium&amp;id=690212ea2a3e20b1cb0af200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberridge-emerges-from-stealth-with-26-million-fo-a1dcd543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberRidge%20Emerges%20From%20Stealth%20With%20%2426%20Million%20for%20Photonic%20Encryption%20Solution&amp;severity=medium&amp;id=6901ff873aaa02566519c5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-vulnerability-exploited-in-cryptocurrency-mi-ed45fbf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20Vulnerability%20Exploited%20in%20Cryptocurrency%20Mining%20Operation&amp;severity=medium&amp;id=6901f6848cf71dc7fdc07f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12461-cwe-522-insufficiently-protected-cr-f7089a96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12461%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Grupo%20Castilla%20Epsilon%20RH&amp;severity=medium&amp;id=6901f6a28cf71dc7fdc086b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-trigona-threat-actors-latest-attack-ca-ee5b0ab6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Trigona%20Threat%20Actor&apos;s%20Latest%20Attack%20Cases&amp;severity=medium&amp;id=6901f6978cf71dc7fdc08496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostgrab-android-malware-132acc8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GHOSTGRAB%20ANDROID%20MALWARE&amp;severity=medium&amp;id=6901f6978cf71dc7fdc084a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/team46-and-taxoff-two-sides-of-the-same-coin-1179b947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Team46%20and%20TaxOff%3A%20Two%20Sides%20of%20the%20Same%20Coin&amp;severity=medium&amp;id=6901f1da8cf71dc7fdb8619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ad-and-pr-giant-dentsu-says-hackers-stole-merkle-d-db990c1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ad%20and%20PR%20Giant%20Dentsu%20Says%20Hackers%20Stole%20Merkle%20Data&amp;severity=medium&amp;id=6901f1cc8cf71dc7fdb84caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-eys-cloud-went-public-4tb-time-bomb-neo-securi-4e1d5f32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20EY&apos;s%20cloud%20went%20public.%204TB%20Time%20Bomb%20-%20Neo%20Security%20Labs&amp;severity=medium&amp;id=6901ee588cf71dc7fdb4878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-two-more-actively-exploited-dassault-32c23902</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20two%20more%20actively%20exploited%20Dassault%20vulnerabilities&amp;severity=high&amp;id=6901e4c367364219a65adb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-abuses-wsl-to-run-linux-encryptor-a01d069e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20ransomware%20abuses%20WSL%20to%20run%20Linux%20encryptors%20in%20Windows&amp;severity=high&amp;id=6901e4c367364219a65adb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-teefail-side-channel-attack-extracts-secrets-f-01167ddc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TEE.Fail%20Side-Channel%20Attack%20Extracts%20Secrets%20from%20Intel%20and%20AMD%20DDR5%20Secure%20Enclaves&amp;severity=high&amp;id=6901e4c367364219a65adb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/advertising-giant-dentsu-reports-data-breach-at-su-727ac59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Advertising%20giant%20Dentsu%20reports%20data%20breach%20at%20subsidiary%20Merkle&amp;severity=high&amp;id=6901e4c367364219a65adb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisuru-botnet-shifts-from-ddos-to-residential-prox-c0191837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aisuru%20Botnet%20Shifts%20from%20DDoS%20to%20Residential%20Proxies&amp;severity=high&amp;id=6901e4c367364219a65adb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/herodotus-android-malware-mimics-human-typing-to-e-1dd4d6a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Herodotus%20Android%20malware%20mimics%20human%20typing%20to%20evade%20detection&amp;severity=medium&amp;id=6901e4c367364219a65adb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-to-turn-https-on-by-default-for-public-site-a0c59282</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20to%20Turn%20HTTPS%20on%20by%20Default%20for%20Public%20Sites&amp;severity=medium&amp;id=6901e4a267364219a65ac38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12450-cwe-79-improper-neutralization-of-i-cad3a62c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litespeedtech%20LiteSpeed%20Cache&amp;severity=medium&amp;id=6901dfdacaab5f688cecedce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64291-improper-neutralization-of-input-du-5654c0fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=medium&amp;id=6901d66086d093201c2b6248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64290-cross-site-request-forgery-csrf-in--ed7d957c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64290%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b6245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64289-improper-neutralization-of-input-du-2caa9d00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premmerce%20Premmerce%20Product%20Search%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b6242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64286-cross-site-request-forgery-csrf-in--c6779568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64286%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WpEstate%20WP%20Rentals&amp;severity=medium&amp;id=6901d66086d093201c2b623f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64285-missing-authorization-in-premmerce--f076ce9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64285%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Wholesale%20Pricing%20for%20WooCommerce&amp;severity=medium&amp;id=6901d66086d093201c2b623c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64283-authorization-bypass-through-user-c-34d24bfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64283%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Rometheme%20RTMKit&amp;severity=medium&amp;id=6901d66086d093201c2b6239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64229-missing-authorization-in-boldgrid-c-eb9f2f4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64229%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=medium&amp;id=6901d66086d093201c2b6236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64228-exposure-of-sensitive-system-inform-d6ec4dac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64228%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=medium&amp;id=6901d65e86d093201c2b6191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64226-cross-site-request-forgery-csrf-in--9e1033b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64226%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20colabrio%20Stockie%20Extra&amp;severity=medium&amp;id=6901d65e86d093201c2b618e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64220-improper-neutralization-of-input-du-ad07a313</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ReyCommerce%20Rey%20Core&amp;severity=medium&amp;id=6901d65e86d093201c2b618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64219-missing-authorization-in-strategy11-4a49f173</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64219%3A%20Missing%20Authorization%20in%20Strategy11%20Team%20Business%20Directory&amp;severity=medium&amp;id=6901d65e86d093201c2b6188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64216-improper-control-of-filename-for-in-0697eb9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeSphere%20SmartMag&amp;severity=high&amp;id=6901d65e86d093201c2b6185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64212-missing-authorization-in-stylemixth-b08a53d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64212%3A%20Missing%20Authorization%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=medium&amp;id=6901d65e86d093201c2b6182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64211-missing-authorization-in-stylemixth-324169c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64211%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy%20Elementor%20Widgets&amp;severity=medium&amp;id=6901d65e86d093201c2b617f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64210-missing-authorization-in-stylemixth-3de49d9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64210%3A%20Missing%20Authorization%20in%20StylemixThemes%20Masterstudy%20Elementor%20Widgets&amp;severity=medium&amp;id=6901d65e86d093201c2b617c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64208-improper-neutralization-of-input-du-4b222e06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Jannah%20-%20Extensions&amp;severity=medium&amp;id=6901d65e86d093201c2b6179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64204-improper-neutralization-of-input-du-f7dadb6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64204%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeSphere%20SmartMag&amp;severity=medium&amp;id=6901d65e86d093201c2b6176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64202-improper-neutralization-of-input-du-1b941b7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64202%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TieLabs%20Sahifa&amp;severity=medium&amp;id=6901d65c86d093201c2b463f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64201-cross-site-request-forgery-csrf-in--543eedb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64201%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=medium&amp;id=6901d65c86d093201c2b463c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64200-improper-neutralization-of-input-du-a701cb09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64200%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Email%20Template%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=6901d65c86d093201c2b4639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64199-missing-authorization-in-wpestate-w-527b922b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64199%3A%20Missing%20Authorization%20in%20WpEstate%20wpresidence&amp;severity=medium&amp;id=6901d65c86d093201c2b4636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64197-improper-neutralization-of-input-du-fe5e9cc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sizam%20Rehub&amp;severity=medium&amp;id=6901d65c86d093201c2b4633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64195-improper-control-of-filename-for-in-2c84f972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64195%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20Eduma&amp;severity=high&amp;id=6901d65c86d093201c2b4630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64194-improper-neutralization-of-input-du-d4b6aa70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Eduma&amp;severity=medium&amp;id=6901d65c86d093201c2b462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60075-cross-site-request-forgery-csrf-in--f2ba5def</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60075%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Allegro%20Marketing%20hpb%20seo%20plugin%20for%20WordPress&amp;severity=high&amp;id=6901d65c86d093201c2b462a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58939-cross-site-request-forgery-csrf-in--6da036ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58939%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=medium&amp;id=6901d65c86d093201c2b4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58711-missing-authorization-in-solwin-blo-568d49c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58711%3A%20Missing%20Authorization%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=medium&amp;id=6901d65c86d093201c2b4624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-npm-packages-caught-stealing-developer-credenti-f2bbe61e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20npm%20Packages%20Caught%20Stealing%20Developer%20Credentials%20on%20Windows%2C%20macOS%2C%20and%20Linux&amp;severity=medium&amp;id=6901f64a8cf71dc7fdc00fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-delmia-factory-software-vu-44b6e187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20DELMIA%20Factory%20Software%20Vulnerabilities&amp;severity=medium&amp;id=6901d10486d093201c2485b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-targets-ddr5-memory-to-steal-keys-from--737dd12c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20Targets%20DDR5%20Memory%20to%20Steal%20Keys%20From%20Intel%20and%20AMD%20TEEs&amp;severity=medium&amp;id=6901c83eb4ac2fa6696c05be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-exploits-hit-dassault-and-xwiki-cisa-confir-b5a0c7e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Exploits%20Hit%20Dassault%20and%20XWiki%20%E2%80%94%20CISA%20Confirms%20Critical%20Flaws%20Under%20Attack&amp;severity=critical&amp;id=6901dc1786d093201c32a356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7320-cwe-200-exposure-of-sensitive-inform-25d7f739</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7320%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20automattic%20WooCommerce&amp;severity=medium&amp;id=6901bb2cc38b57fedae38b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9544-cwe-862-missing-authorization-in-dop-222b5114</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9544%3A%20CWE-862%20Missing%20Authorization%20in%20Doppler%20Forms&amp;severity=medium&amp;id=6901af7f6b54f8e6682010d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybersecurity-firms-see-surge-in-ai-powered-attack-36403765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybersecurity%20Firms%20See%20Surge%20in%20AI-Powered%20Attacks%20Across%20Africa&amp;severity=medium&amp;id=6901af5e6b54f8e6681ff0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacker-target-vscode-extension-marketplace-ide-p-c19644a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacker%20Target%20VSCode%20Extension%20Marketplace%2C%20IDE%20Plugins%20Face%20Higher%20Supply%20Chain%20Attack%20Risks&amp;severity=medium&amp;id=6901a34214defc143b949662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-collect-memory-only-filesystems-on-linux-sy-263a639d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems%2C%20(Wed%2C%20Oct%2029th)&amp;severity=medium&amp;id=69019e7314defc143b8e8dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49042-cwe-79-improper-neutralization-of-i-802e71d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WooCommerce&amp;severity=null&amp;id=6901a8d56b54f8e6681812fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62776-uncontrolled-search-path-element-in-8a38e015</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62776%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Wireless%20Tsukamoto%20Co.%2C%20Ltd.%20WTW%20EAGLE%20(for%20Windows)&amp;severity=high&amp;id=69019e3e14defc143b8e5540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11705-cwe-862-missing-authorization-in-sc-2c285992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11705%3A%20CWE-862%20Missing%20Authorization%20in%20scheeeli%20Anti-Malware%20Security%20and%20Brute-Force%20Firewall&amp;severity=medium&amp;id=69019e3e14defc143b8e553c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64296-cwe-862-missing-authorization-in-fa-9f48e531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64296%3A%20Missing%20Authorization%20in%20Facebook%20Facebook%20for%20WooCommerce&amp;severity=null&amp;id=690194de28becc2dd67dfacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57931-cwe-352-cross-site-request-forgery--ef26ba33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Popup%20box&amp;severity=null&amp;id=690194de28becc2dd67dfac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-indias-largest-automaker-tata-motors-60604083</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20India&apos;s%20largest%20automaker%3A%20Tata%20Motors&amp;severity=medium&amp;id=690170ca3499185cc34fea3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-code-poses-security-bloat-challenges-6d3d0232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Code%20Poses%20Security%2C%20Bloat%20Challenges&amp;severity=medium&amp;id=69026876e09a14ef7141f999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xctdh-crypto-heist-part-2-ellis-stannard-ea905212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCTDH%20Crypto%20Heist%20Part%202%20-%20Ellis%20Stannard&amp;severity=medium&amp;id=6903ded8aebfcd54749e6436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-29-43a4812c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-29&amp;severity=medium&amp;id=6902ae2004b4f2cbf9067471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60320-na-eeabd0fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60320%3A%20n%2Fa&amp;severity=medium&amp;id=69026ca6ea3d051f22349360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61876-na-d0d8dcbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61876%3A%20n%2Fa&amp;severity=medium&amp;id=69026375e09a14ef713ad32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57227-na-e69ee319</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57227%3A%20n%2Fa&amp;severity=high&amp;id=6902561b52c03fa7b6e5bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61234-na-3268eb37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61234%3A%20n%2Fa&amp;severity=high&amp;id=69024872c461420f24c8f55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56558-na-2e0ec680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56558%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Dyson%20MQTT%20server&amp;severity=low&amp;id=69024872c461420f24c8f55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60595-na-dc72a69c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60595%3A%20n%2Fa&amp;severity=high&amp;id=690244f5c461420f24c54247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60542-na-605053ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60542%3A%20n%2Fa&amp;severity=medium&amp;id=69023421b9e127f7a3635987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60898-na-03be67a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60898%3A%20n%2Fa&amp;severity=medium&amp;id=69023421b9e127f7a3635983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-63622-na-ba164808</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-63622%3A%20n%2Fa&amp;severity=critical&amp;id=69022fcb83bae5e85666db54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61429-na-fbc4b30f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61429%3A%20n%2Fa&amp;severity=high&amp;id=69022fcb83bae5e85666db51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61156-na-7864386f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61156%3A%20n%2Fa&amp;severity=high&amp;id=69022c4683bae5e8566219d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45162-na-0d1cad9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45162%3A%20n%2Fa&amp;severity=critical&amp;id=690222c7d3833ffc6eb7191e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45161-na-222c67bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45161%3A%20n%2Fa&amp;severity=medium&amp;id=690222c7d3833ffc6eb7191a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61161-na-578ef76c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61161%3A%20n%2Fa&amp;severity=high&amp;id=690222c7d3833ffc6eb71916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-2950-cross-site-request-forgery-csrf-3b50a255</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%202.95.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=6901b966c38b57fedaddc1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4665-cwe-89-improper-neutralization-of-sp-5cca9eab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4665%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WordPress%20Contact%20Form%207%20Database%20Addon%20CFDB7%20By%20Arshid%20CFDB7&amp;severity=critical&amp;id=69015aaf30d110a1a6d3e830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-data-on-insider-threats-what-1000-real--19ddb8a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Data%20on%20Insider%20Threats%3A%20What%201%2C000%20Real%20Cases%20Reveal%20About%20Hidden%20Risk&amp;severity=medium&amp;id=6902049e3aaa02566521ca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-att-carrier-records-deman-a766ddd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%20AT%26T%20Carrier%20Records%2C%20Demands%20%241M%20for%20Dublin%20Airport%20Passenger%20Data&amp;severity=medium&amp;id=69014702608506ea4395e4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64095-cwe-434-unrestricted-upload-of-file-9698bbb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64095%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=6901419f608506ea438f86a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64094-cwe-79-improper-neutralization-of-i-b32ddcd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=6901419f608506ea438f86a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62802-cwe-1188-insecure-default-initializ-0a28b162</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62802%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=69013a71995b0464d953776b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62801-cwe-78-improper-neutralization-of-s-57fdd28c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62801%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69013a71995b0464d9537768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-soc-teams-operationalize-real-time-defense-aga-4dd49a09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20SOC%20Teams%20Operationalize%20Real-Time%20Defense%20Against%20Credential%20Replay%20Attacks&amp;severity=medium&amp;id=69013a76995b0464d9538345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62800-cwe-79-improper-neutralization-of-i-f3956d20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62800%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jlowin%20fastmcp&amp;severity=medium&amp;id=69013a71995b0464d953776e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62798-cwe-79-improper-neutralization-of-i-1018d9fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62798%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20code16%20sharp&amp;severity=medium&amp;id=6901300969001fc67a67b9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62794-cwe-522-insufficiently-protected-cr-af93f1a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62794%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20RichardoC%20github-workflow-updater-extension&amp;severity=low&amp;id=6901300969001fc67a67b9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43017-cwe-250-execution-with-unnecessary--8c723362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43017%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20HP%20Inc.%20HP%20ThinPro%208.1&amp;severity=high&amp;id=69012c8569001fc67a62663e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-trust-paradox-why-security-teams-fear-autom-273985f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20Trust%20Paradox%3A%20Why%20Security%20Teams%20Fear%20Automated%20Remediation&amp;severity=medium&amp;id=69055f4871a6fc4aff35929c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/youtube-ghost-network-utilizes-spooky-tactics-to-t-e9b83789</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YouTube%20Ghost%20Network%20Utilizes%20Spooky%20Tactics%20to%20Target%20Users&amp;severity=medium&amp;id=69016ef83499185cc34fb172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11374-cwe-770-allocation-of-resources-wit-13136369</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11374%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=6901290f69001fc67a5e1760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62727-cwe-407-inefficient-algorithmic-com-22b7a8fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62727%3A%20CWE-407%3A%20Inefficient%20Algorithmic%20Complexity%20in%20Kludex%20starlette&amp;severity=high&amp;id=690126348f7e67aef0117ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11375-cwe-770-allocation-of-resources-wit-2325c23e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11375%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=690126348f7e67aef0117de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62368-cwe-502-deserialization-of-untruste-97e46c7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62368%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20taigaio%20taiga-back&amp;severity=critical&amp;id=690126348f7e67aef0117dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-attack-victims-may-be-more-numerous-tha-375cf505</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Attack%20Victims%20May%20Be%20More%20Numerous%20Than%20Expected&amp;severity=medium&amp;id=69016ef83499185cc34fb175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62367-cwe-89-improper-neutralization-of-s-65aff5ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62367%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20taigaio%20taiga-back&amp;severity=medium&amp;id=690122b38f7e67aef00c128e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59837-cwe-918-server-side-request-forgery-fe9f7df8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59837%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=high&amp;id=690122b38f7e67aef00c1291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27093-cwe-284-improper-access-control-in--0e852adf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27093%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20BishopFox%20sliver&amp;severity=medium&amp;id=69011c4b8f31b6f061ed5cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-teefail-side-channel-attack-extracts-secrets-f-fba67eff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TEE.Fail%20Side-Channel%20Attack%20Extracts%20Secrets%20from%20Intel%20and%20AMD%20DDR5%20Secure%20Enclaves&amp;severity=low&amp;id=6901629430d110a1a6e799c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40843-cwe-121-stack-based-buffer-overflow-008a5fe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40843%3A%20CWE-121%20Stack%20based%20buffer%20overflow%20in%20Ericsson%20CodeChecker&amp;severity=medium&amp;id=6901125021370b3f606d87be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-mimics-human-behavior-to-evade-74f1b687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Malware%20Mimics%20Human%20Behavior%20to%20Evade%20Detection&amp;severity=medium&amp;id=690118ba8f31b6f061e7a729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12425-cwe-269-improper-privilege-manageme-5cc68efa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12425%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901154e8f31b6f061e30bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12424-cwe-269-improper-privilege-manageme-ac110a5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12424%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=690116f28f31b6f061e5f1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12423-cwe-248-uncaught-exception-in-azure-9b7c3217</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12423%3A%20CWE-248%20Uncaught%20Exception%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901154e8f31b6f061e30bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12422-cwe-22-improper-limitation-of-a-pat-d501cd78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12422%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=6901089f8bc57bfc69a7043b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stragglers-from-myanmar-scam-center-raided-by-army-9f8dda96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stragglers%20From%20Myanmar%20Scam%20Center%20Raided%20by%20Army%20Cross%20Into%20Thailand%20as%20Buildings%20are%20Blown%20Up&amp;severity=low&amp;id=6900ff80c2498ce55d2bc08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-atroposia-malware-comes-with-a-local-vulnerabi-20e6f9ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Atroposia%20malware%20comes%20with%20a%20local%20vulnerability%20scanner&amp;severity=high&amp;id=6900fc0ec2498ce55d254038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bidi-swap-the-bidirectional-text-trick-that-makes--fe9a50ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BiDi%20Swap%3A%20The%20bidirectional%20text%20trick%20that%20makes%20fake%20URLs%20look%20real&amp;severity=high&amp;id=6900fc0ec2498ce55d25403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-group-claimed-the-hack-of-swedens-power-gr-24b37274</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20group%20claimed%20the%20hack%20of%20Sweden%E2%80%99s%20power%20grid%20operator%20Svenska%20kraftn%C3%A4t&amp;severity=medium&amp;id=6900fc0ec2498ce55d254040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-trojan-herodotus-outsmarts-anti-fraud--d986d67a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Trojan%20&apos;Herodotus&apos;%20Outsmarts%20Anti-Fraud%20Systems%20by%20Typing%20Like%20a%20Human&amp;severity=medium&amp;id=6901629430d110a1a6e799c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-ghostcall-and-ghosthire-bluenor-12ab82a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20GhostCall%20and%20GhostHire%3A%20BlueNoroff&apos;s%20New%20Malware%20Chains&amp;severity=medium&amp;id=6901629430d110a1a6e799c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-bluenoroff-expands-scope-of-crypto-he-7c298672</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20BlueNoroff%20Expands%20Scope%20of%20Crypto%20Heists&amp;severity=medium&amp;id=69016ef83499185cc34fb178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36386-cwe-305-authentication-bypass-by-pr-4ac640d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36386%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IBM%20IBM%20Maximo%20Application%20Suite&amp;severity=critical&amp;id=6900e9469137f7a53a1f9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34294-cwe-367-time-of-check-time-of-use-t-3f5579b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34294&amp;severity=null&amp;id=6900f0e28b5ca1e4f6b448e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostcall-and-ghosthire-two-campaigns-by-bluenorof-0f247596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostCall%20and%20GhostHire%20%E2%80%94%20two%20campaigns%20by%20BlueNoroff&amp;severity=medium&amp;id=6900e057d44cb7cb5001080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hack-cessibility-when-dll-hijacks-meet-windows-hel-48f72209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hack-cessibility%3A%20When%20DLL%20Hijacks%20Meet%20Windows%20Helpers&amp;severity=medium&amp;id=6900dcd5d44cb7cb50fc4e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36085-cwe-918-server-side-request-forgery-d20f33cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36085%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert&amp;severity=medium&amp;id=6900dcd1d44cb7cb50fc4af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36083-cwe-244-improper-clearing-of-heap-m-36294c47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36083%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6900dae71e78ed0e58915f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36081-cwe-117-improper-output-neutralizat-be7dce55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36081%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=6900dae71e78ed0e58915f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-netbak-pc-agent-affected-by-recent-aspnet-cor-5267e80f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20NetBak%20PC%20Agent%20Affected%20by%20Recent%20ASP.NET%20Core%20Vulnerability&amp;severity=critical&amp;id=6900daca1e78ed0e58913f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34311-cwe-78-improper-neutralization-of-s-d104dfe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34311%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34312-cwe-78-improper-neutralization-of-s-e8879c01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34312%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34304-cwe-89-improper-neutralization-of-s-74be124f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34304%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IPFire.org%20IPFire&amp;severity=high&amp;id=6900d7521e78ed0e5889e099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34307-cwe-79-improper-neutralization-of-i-08ef4284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34306-cwe-79-improper-neutralization-of-i-f1d199a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34306%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34308-cwe-79-improper-neutralization-of-i-ebace10f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34318-cwe-79-improper-neutralization-of-i-166f58e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34317-cwe-79-improper-neutralization-of-i-5203fde9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34309-cwe-79-improper-neutralization-of-i-8d7e12f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34309%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34301-cwe-79-improper-neutralization-of-i-b5ff6af4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34316-cwe-79-improper-neutralization-of-i-f38b43c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7531e78ed0e5889e0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34305-cwe-79-improper-neutralization-of-i-702fb559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34310-cwe-79-improper-neutralization-of-i-b178f180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34310%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900d7521e78ed0e5889e0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34315-cwe-79-improper-neutralization-of-i-ada648a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34302-cwe-79-improper-neutralization-of-i-5b560915</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34314-cwe-79-improper-neutralization-of-i-6f36ab4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34313-cwe-79-improper-neutralization-of-i-edf0a3d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34303-cwe-79-improper-neutralization-of-i-6af4e558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IPFire.org%20IPFire&amp;severity=medium&amp;id=6900de73d44cb7cb50ff0ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redtiger-malware-steals-data-discord-tokens-and-ev-1e79c588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedTiger%20Malware%20Steals%20Data%2C%20Discord%20Tokens%20and%20Even%20Webcam%20Images&amp;severity=medium&amp;id=6900d1661db591194a8911e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12380-use-after-free-in-webgpu-internals--f33cb850</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12380%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6900d1771db591194a8915da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turbomirai-class-aisuru-botnet-blamed-for-20-tbps--3c9d5e2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TurboMirai-Class%20%E2%80%98Aisuru%E2%80%99%20Botnet%20Blamed%20for%2020%2B%20Tbps%20DDoS%20Attacks&amp;severity=medium&amp;id=6900cdd91db591194a82376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53855-cwe-787-out-of-bounds-write-in-gcc--67a350fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53855%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GCC%20Productions%20Inc.%20Fade%20In&amp;severity=high&amp;id=6900ca721db591194a7e02b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53814-cwe-416-use-after-free-in-gcc-produ-261d3773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53814%3A%20CWE-416%3A%20Use%20After%20Free%20in%20GCC%20Productions%20Inc.%20Fade%20In&amp;severity=high&amp;id=6900ca721db591194a7e02b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12103-incorrect-privilege-assignment-in-r-a5738811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12103%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%203.0&amp;severity=medium&amp;id=6900c82a05cd0025c8e834e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12390-session-fixation-in-red-hat-red-hat-8209dbcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12390%3A%20Session%20Fixation%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=6900c82a05cd0025c8e834e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-hit-record-low-only-23-pay-in--897eb089</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20payments%20hit%20record%20low%3A%20only%2023%25%20Pay%20in%20Q3%202025&amp;severity=low&amp;id=6900bf0feaec14ffc64824b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1038-cwe-78-improper-neutralization-of-sp-0528c4c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1038%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b80ceaec14ffc63cb7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1037-cwe-269-improper-privilege-managemen-9d72790e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1037%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b80ceaec14ffc63cb7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1036-cwe-78-improper-neutralization-of-sp-6880a802</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1036%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TropOS%204th%20Gen&amp;severity=high&amp;id=6900b5d793060580263d9ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/industrial-giants-schneider-electric-and-emerson-n-21d0de32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Industrial%20Giants%20Schneider%20Electric%20and%20Emerson%20Named%20as%20Victims%20of%20Oracle%20Hack&amp;severity=medium&amp;id=6900b25393060580263724dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9313-cwe-288-authentication-bypass-using--12c062cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9313%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Asseco%20Poland%20S.A.%20mMedica&amp;severity=critical&amp;id=6900aee0930605802632913a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ubuntu-kernel-lpe-6343474c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ubuntu%20Kernel%20LPE!&amp;severity=medium&amp;id=6900acd316bbdbbc937764e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-trade-183-million-stolen-credential-6b0ca70b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Trade%20183%20Million%20Stolen%20Credentials%20on%20Telegram%2C%20Dark%20Forums&amp;severity=medium&amp;id=6900a5c016bbdbbc936b0aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-your-google-workspace-as-secure-as-you-think-it-af127eaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Your%20Google%20Workspace%20as%20Secure%20as%20You%20Think%20it%20is%3F&amp;severity=low&amp;id=6901629430d110a1a6e799cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-with-invisible-characters-in-the-subjec-cff17914</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line%2C%20(Tue%2C%20Oct%2028th)&amp;severity=medium&amp;id=69008f7868b9eefb8dadc43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mass-attack-targets-wordpress-sites-via-gutenkit-a-27c9c270</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mass%20Attack%20Targets%20WordPress%20Sites%20via%20GutenKit%20and%20Hunk%20Companion%20Plugins&amp;severity=medium&amp;id=690096201b1da53ce4946161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55758-cwe-352-cross-site-request-forgery--a4d534c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jdownloads.com%20JDownloads%20component%20for%20Joomla&amp;severity=medium&amp;id=690099981b1da53ce49acbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-swedish-power-grid-operator-a515a4ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Swedish%20Power%20Grid%20Operator&amp;severity=medium&amp;id=690096091b1da53ce49450c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/memento-labs-the-ghost-of-hacking-team-has-returne-f9dd3870</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Memento%20Labs%2C%20the%20ghost%20of%20Hacking%20Team%2C%20has%20returned%20%E2%80%94%20or%20maybe%20it%20was%20never%20gone%20at%20all.&amp;severity=medium&amp;id=69008f9668b9eefb8dae1d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-disputes-false-claims-of-massive-gmail-data-7e83c7b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20disputes%20false%20claims%20of%20massive%20Gmail%20data%20breach&amp;severity=high&amp;id=69008f9668b9eefb8dae1d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sidewinder-adopts-new-clickonce-based-attack-chain-1319ef9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SideWinder%20Adopts%20New%20ClickOnce-Based%20Attack%20Chain%20Targeting%20South%20Asian%20Diplomats&amp;severity=high&amp;id=69008bfc68b9eefb8da84dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41090-cwe-306-missing-authentication-for--c0b84407</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41090%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CCN-CERT%20microCLAUDIA&amp;severity=high&amp;id=69008c1568b9eefb8da85d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-zero-day-exploited-to-deliver-italian-memen-ddf9932f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Zero-Day%20Exploited%20to%20Deliver%20Italian%20Memento%20Labs&apos;%20LeetAgent%20Spyware&amp;severity=medium&amp;id=6901629430d110a1a6e799cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crafting-self-masking-functions-using-llvm-65e64f02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crafting%20self%20masking%20functions%20using%20LLVM&amp;severity=medium&amp;id=690079e4682198e57b19b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10151-cwe-667-improper-locking-in-softing-fdebb895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10151%3A%20CWE-667%20Improper%20Locking%20in%20Softing%20Industrial%20Automation%20GmbH%20smartLink%20HW-PN&amp;severity=high&amp;id=6900734ec20c2200665f5b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10150-cwe-833-deadlock-in-softing-industr-f035f88f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10150%3A%20CWE-833%3A%20Deadlock%20in%20Softing%20Industrial%20Automation%20GmbH%20smartLink%20HW-PN&amp;severity=high&amp;id=6900734ec20c2200665f5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12378-unrestricted-upload-in-code-project-f15752d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12378%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=69005d1b5553ed2111ccc338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11735-cwe-89-improper-neutralization-of-s-6dba87c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=69005d1b5553ed2111ccc334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10145-cwe-918-server-side-request-forgery-dcd0bf2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10145&amp;severity=null&amp;id=69005d1b5553ed2111ccc330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62777-use-of-hard-coded-credentials-in-pl-9fa12352</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62777%3A%20Use%20of%20hard-coded%20credentials%20in%20PLANEX%20COMMUNICATIONS%20INC.%20MZK-DP300N&amp;severity=high&amp;id=690053d57fd05562372c1e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sidewinder-adopts-new-clickonce-based-attack-chain-c9417719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SideWinder%20Adopts%20New%20ClickOnce-Based%20Attack%20Chain%20Targeting%20South%20Asian%20Diplomats&amp;severity=medium&amp;id=6901629430d110a1a6e799d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-wasted-bluenoroffs-ghost-mirage-of-funding--7e49ab3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20wasted%3A%20BlueNoroff%E2%80%99s%20ghost%20mirage%20of%20funding%20and%20jobs&amp;severity=medium&amp;id=69008f8b68b9eefb8dadcb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10939-uncontrolled-search-path-element-in-97508820</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10939%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.4&amp;severity=low&amp;id=69003706ba6dffc5e2309f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12347-unrestricted-upload-in-maxsite-cms-449bf3ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12347%3A%20Unrestricted%20Upload%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=690028ffba6dffc5e22648c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12346-unrestricted-upload-in-maxsite-cms-e3ffe8d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12346%3A%20Unrestricted%20Upload%20in%20MaxSite%20CMS&amp;severity=medium&amp;id=690028ffba6dffc5e22648be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12344-unrestricted-upload-in-yonyou-u8-cl-ecedd8b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12344%3A%20Unrestricted%20Upload%20in%20Yonyou%20U8%20Cloud&amp;severity=medium&amp;id=690021eeba6dffc5e22267fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12342-sql-injection-in-serdar-bayram-ghos-a4aa7fef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12342%3A%20SQL%20Injection%20in%20Serdar%20Bayram%20Ghost%20Hot%20Spot&amp;severity=medium&amp;id=6900176aba6dffc5e21fd5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12341-link-following-in-ermig1979-antidup-2858bc81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12341%3A%20Link%20Following%20in%20ermig1979%20AntiDupl&amp;severity=high&amp;id=6900176aba6dffc5e21fd5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12339-sql-injection-in-campcodes-retro-ba-2dc798c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12339%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=690013efba6dffc5e21f118b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12338-sql-injection-in-campcodes-retro-ba-74389302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12338%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=690013efba6dffc5e21f1184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12337-sql-injection-in-campcodes-retro-ba-f7470e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12337%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69000cd9ba6dffc5e21dd5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12336-sql-injection-in-campcodes-retro-ba-dcefa458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12336%3A%20SQL%20Injection%20in%20Campcodes%20Retro%20Basketball%20Shoes%20Online%20Store&amp;severity=medium&amp;id=69000cd9ba6dffc5e21dd5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-28-80e3fb3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-28&amp;severity=medium&amp;id=69015a9b30d110a1a6d3c523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61235-na-d878544c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61235%3A%20n%2Fa&amp;severity=critical&amp;id=690122b38f7e67aef00c128b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60805-na-73841a13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60805%3A%20n%2Fa&amp;severity=high&amp;id=69010ce521370b3f6065e07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61080-na-98592e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61080%3A%20n%2Fa&amp;severity=medium&amp;id=690101a38bc57bfc699ad6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60800-na-bb613e2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60800%3A%20n%2Fa&amp;severity=high&amp;id=6900ffacc2498ce55d2bf488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60355-na-01f45604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60355%3A%20n%2Fa&amp;severity=critical&amp;id=6900ffacc2498ce55d2bf485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60354-na-24b62900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60354%3A%20n%2Fa&amp;severity=high&amp;id=6900ffacc2498ce55d2bf482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54605-na-2b727aa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54605%3A%20n%2Fa&amp;severity=high&amp;id=6900f88bc2498ce55d20aefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61155-na-377c9ca5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61155%3A%20n%2Fa&amp;severity=medium&amp;id=6900f0e28b5ca1e4f6b448ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60349-na-bbeedfff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60349%3A%20n%2Fa&amp;severity=high&amp;id=6900f0e28b5ca1e4f6b448e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54604-na-4ff0c0fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54604%3A%20n%2Fa&amp;severity=high&amp;id=6900ef4f8b5ca1e4f6b16412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60858-na-78780f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60858%3A%20n%2Fa&amp;severity=high&amp;id=6900e9469137f7a53a1f9d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56399-na-d99932dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56399%3A%20n%2Fa&amp;severity=high&amp;id=6900e5cb9137f7a53a1afc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61107-na-97ade869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61107%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61106-na-a7777de9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61106%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61104-na-9f9825b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61104%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61103-na-22d8a93f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61103%3A%20n%2Fa&amp;severity=high&amp;id=6900de73d44cb7cb50ff0afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61128-na-9f129f2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61128%3A%20n%2Fa&amp;severity=critical&amp;id=6900dcd1d44cb7cb50fc4af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61043-na-08bc5af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61043%3A%20n%2Fa&amp;severity=critical&amp;id=6900d7531e78ed0e5889e105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33133-cwe-787-out-of-bounds-write-in-ibm--0a0e7918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33133%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33132-cwe-467-use-of-sizeof-on-a-pointer--9800ffc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33132%3A%20CWE-467%20Use%20of%20sizeof()%20on%20a%20Pointer%20Type%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33131-cwe-120-buffer-copy-without-checkin-0fef9c46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33131%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33126-cwe-131-incorrect-calculation-of-bu-a7deff6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33126%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20DB2%20High%20Performance%20Unload&amp;severity=medium&amp;id=69000951ba6dffc5e21a9f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12335-cross-site-scripting-in-code-projec-735b5c79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12335%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=6900024dba6dffc5e21931f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12332-cross-site-scripting-in-sourcecodes-0b1f4942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12332%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=6900024dba6dffc5e2193200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43024-cwe-497-exposure-of-sensitive-syste-f608330d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43024%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HP%20Inc%20ThinPro%208.1&amp;severity=medium&amp;id=68fffec9ba6dffc5e218c2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62258-cwe-352-cross-site-request-forgery--04efa349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62258%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=high&amp;id=68fffb41ba6dffc5e218209b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12334-cross-site-scripting-in-code-projec-89bf1079</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12334%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68fff444ba6dffc5e21326a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12333-cross-site-scripting-in-code-projec-0195957d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12333%3A%20Cross%20Site%20Scripting%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68fff444ba6dffc5e21326a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62259-cwe-863-incorrect-authorization-in--839a3a9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62259%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68fff444ba6dffc5e21326af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12331-unrestricted-upload-in-willow-cms-4896ff1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12331%3A%20Unrestricted%20Upload%20in%20Willow%20CMS&amp;severity=medium&amp;id=68ffed31ba6dffc5e2122369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12330-cross-site-scripting-in-willow-cms-4bc70c5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12330%3A%20Cross%20Site%20Scripting%20in%20Willow%20CMS&amp;severity=medium&amp;id=68ffed31ba6dffc5e2122362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62260-cwe-400-uncontrolled-resource-consu-face2cfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62260%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68ffe9aeba6dffc5e211b781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12329-sql-injection-in-shawon100-ruet-oj-4c36d51b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12329%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12328-sql-injection-in-shawon100-ruet-oj-e99790fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12328%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62781-cwe-613-insufficient-session-expira-44094685</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62781%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffe632ba6dffc5e21130cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62779-cwe-79-improper-neutralization-of-i-4168794f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62779%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=68ffe632ba6dffc5e21130c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62778-cwe-425-direct-request-forced-brows-1700e009</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62778%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20frappe%20lms&amp;severity=low&amp;id=68ffe632ba6dffc5e21130c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62261-cwe-312-cleartext-storage-of-sensit-a1956b0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62261%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffe2a8ba6dffc5e210be3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-highlights-retail-cyber-threats-257bed41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Jingle%20Thief&apos;%20Highlights%20Retail%20Cyber%20Threats&amp;severity=high&amp;id=69016ef83499185cc34fb17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-tainted-memories-exploit-enables-command-i-fcbe7d33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98ChatGPT%20Tainted%20Memories%E2%80%99%20Exploit%20Enables%20Command%20Injection%20in%20Atlas%20Browser&amp;severity=high&amp;id=68ffdf22ba6dffc5e20e967e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12327-sql-injection-in-shawon100-ruet-oj-f72a0206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12327%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e9776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12326-sql-injection-in-shawon100-ruet-oj-5e250c47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12326%3A%20SQL%20Injection%20in%20shawon100%20RUET%20OJ&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e9771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62784-cwe-837-improper-enforcement-of-a-s-6e55b336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62784%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e977b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62783-cwe-837-improper-enforcement-of-a-s-23210f90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62783%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdf31ba6dffc5e20e977f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62782-cwe-837-improper-enforcement-of-a-s-7c6c421b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62782%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Phoenix616%20InventoryGui&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-warns-users-with-security-keys-to-re-enroll-befo-abe552c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X%20Warns%20Users%20With%20Security%20Keys%20to%20Re-Enroll%20Before%20November%2010%20to%20Avoid%20Lockouts&amp;severity=high&amp;id=68ffdb9cba6dffc5e20d78d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italian-spyware-vendor-linked-to-chrome-zero-day-a-394e7909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italian%20spyware%20vendor%20linked%20to%20Chrome%20zero-day%20attacks&amp;severity=critical&amp;id=68ffdb9cba6dffc5e20d78c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qnap-warns-of-critical-aspnet-flaw-in-its-windows--3fa86493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QNAP%20warns%20of%20critical%20ASP.NET%20flaw%20in%20its%20Windows%20backup%20software&amp;severity=critical&amp;id=68ffdb9cba6dffc5e20d78cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-profits-drop-as-victims-stop-paying-hac-3c22df97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20profits%20drop%20as%20victims%20stop%20paying%20hackers&amp;severity=high&amp;id=68ffdb9cba6dffc5e20d78d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62262-cwe-532-insertion-of-sensitive-info-1d13d28b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62262%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62725-cwe-22-improper-limitation-of-a-pat-abc8fd06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62725%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20docker%20compose&amp;severity=high&amp;id=68ffdbe2ba6dffc5e20d7f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12325-sql-injection-in-sourcecodester-bes-f1093c2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12325%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12322-buffer-overflow-in-tenda-ch22-c4af0141</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12322%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ffdbe2ba6dffc5e20d7f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12316-sql-injection-in-code-projects-cour-ca1ab1fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12316%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=68ffdbe2ba6dffc5e20d7f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62524-cwe-200-exposure-of-sensitive-infor-6cb5e3d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62523-cwe-942-permissive-cross-domain-pol-4b2c1f0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62523%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20THM-Health%20PILOS&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c657d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12315-sql-injection-in-code-projects-food-f143d504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12315%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12314-sql-injection-in-code-projects-food-ba12fe90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12314%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c658c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12313-command-injection-in-d-link-di-7001-1c796b40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12313%3A%20Command%20Injection%20in%20D-Link%20DI-7001%20MINI&amp;severity=medium&amp;id=68ffd495ba6dffc5e20c6585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/memento-spyware-tied-to-chrome-zero-day-attacks-bbe63122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Memento%20Spyware%20Tied%20to%20Chrome%20Zero-Day%20Attacks&amp;severity=medium&amp;id=69016ef83499185cc34fb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62516-cwe-200-exposure-of-sensitive-infor-60b50e0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62516&amp;severity=null&amp;id=68ffcd8cba6dffc5e20add2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59151-cwe-93-improper-neutralization-of-c-8e6231bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59151%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20pi-hole%20web&amp;severity=high&amp;id=68ffcd8cba6dffc5e20add29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62263-cwe-79-improper-neutralization-of-i-ce2f2a13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffcd8cba6dffc5e20add2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58356-cwe-347-improper-verification-of-cr-c05554f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58356%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20edgelesssys%20constellation&amp;severity=high&amp;id=68ffca08ba6dffc5e209fffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12312-cross-site-scripting-in-phpgurukul--a1716d8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12312%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffca08ba6dffc5e209fff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12311-cross-site-scripting-in-phpgurukul--cfb30418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12311%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffca08ba6dffc5e209ffee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12310-improper-restriction-of-excessive-a-624bf1ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12310%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20VirtFusion&amp;severity=medium&amp;id=68ffca08ba6dffc5e209ffe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-sell-turnkey-remote-access-trojan-atropo-cc886787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Sell%20Turnkey%20Remote%20Access%20Trojan%20&apos;Atroposia&apos;&amp;severity=low&amp;id=69016ef83499185cc34fb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53533-cwe-79-improper-neutralization-of-i-70c3e71d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53533%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=medium&amp;id=68ffc684ba6dffc5e2095d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12309-sql-injection-in-code-projects-nero-fdbbe3dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12309%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12308-sql-injection-in-code-projects-nero-298884a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12308%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12307-sql-injection-in-code-projects-nero-3a926002</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12307%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62253-cwe-601-url-redirection-to-untruste-3af9a573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62253%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ffc300ba6dffc5e2087c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36138-cwe-79-improper-neutralization-of-i-4cb70af9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36170-cwe-79-improper-neutralization-of-i-81e3e383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32785-cwe-79-improper-neutralization-of-i-fc0fbf05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32785%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20web&amp;severity=low&amp;id=68ffbf81ba6dffc5e207e32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46602-cwe-538-insertion-of-sensitive-info-25585f05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46602%3A%20CWE-538%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36007-cwe-266-incorrect-privilege-assignm-0be2ee83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36007%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=68ffbf81ba6dffc5e207e332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12306-sql-injection-in-code-projects-nero-20fb7e7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12306%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12305-deserialization-in-quequnlong-shiyi-c4c833bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12305%3A%20Deserialization%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12304-improper-authorization-in-dulaiduwa-719577c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12304%3A%20Improper%20Authorization%20in%20dulaiduwang003%20TIME-SEA-PLUS&amp;severity=medium&amp;id=68ffbf81ba6dffc5e207e344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12365-cwe-209-generation-of-error-message-8fdfba16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12365%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68ffbbf8ba6dffc5e2076444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12364-cwe-521-weak-password-requirements--0d6651d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12364%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68ffb875ba6dffc5e206e0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12363-cwe-200-exposure-of-sensitive-infor-7417b286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12363%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68ffb875ba6dffc5e206e0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12303-cross-site-scripting-in-phpgurukul--c5e1b330</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12303%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=68ffb875ba6dffc5e206e0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12302-cross-site-scripting-in-code-projec-b9438a5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12302%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffb875ba6dffc5e206e0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12301-unrestricted-upload-in-code-project-110679de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12301%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffadeaba6dffc5e2050665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12300-cross-site-scripting-in-code-projec-40373787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12300%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffadeaba6dffc5e205065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61795-cwe-404-improper-resource-shutdown--a43301b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61795%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=68ffadeaba6dffc5e205067d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55752-cwe-23-relative-path-traversal-in-a-66522afd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55752%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68ffadeaba6dffc5e205066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55754-cwe-150-improper-neutralization-of--8d7d2fcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55754%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=68ffadeaba6dffc5e2050674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12299-cross-site-scripting-in-code-projec-3fb1957c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12299%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffa6e0ba6dffc5e2036881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12298-cross-site-scripting-in-code-projec-dba6429f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12298%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ffa6e0ba6dffc5e203687a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12297-information-disclosure-in-atjiu-pyb-9c88682a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12297%3A%20Information%20Disclosure%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12296-os-command-injection-in-d-link-dap--9f83be38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12296%3A%20OS%20Command%20Injection%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=68ffa364ba6dffc5e202cce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12295-improper-verification-of-cryptograp-e875a592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12295%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20D-Link%20DAP-2695&amp;severity=high&amp;id=68ffa364ba6dffc5e202cce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x-warns-users-with-security-keys-to-re-enroll-befo-7003c9a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=X%20Warns%20Users%20With%20Security%20Keys%20to%20Re-Enroll%20Before%20November%2010%20to%20Avoid%20Lockouts&amp;severity=medium&amp;id=6901629430d110a1a6e799d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12294-sql-injection-in-sourcecodester-poi-f9285c25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12294%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff98e5ba6dffc5e201350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12293-sql-injection-in-sourcecodester-poi-5961733f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12293%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff98e5ba6dffc5e2013503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/house-democrats-resume-bank-domewatch-leaked-data--75eba7cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=House%20Democrats%E2%80%99%20Resume%20Bank%20DomeWatch%20Leaked%20Data%20of%20Thousands%20of%20Capitol%20Hill%20Job%20Applicants&amp;severity=medium&amp;id=68ff98d2ba6dffc5e2013270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12292-sql-injection-in-sourcecodester-poi-ff18ccff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12292%3A%20SQL%20Injection%20in%20SourceCodester%20Point%20of%20Sales&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12291-unrestricted-upload-in-ashymuzuro-f-dc6bc574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12291%3A%20Unrestricted%20Upload%20in%20ashymuzuro%20Full-Ecommece-Website&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leetagent-a-tool-shared-by-forumtroll-and-dante-f716c828</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LeetAgent%3A%20a%20tool%20shared%20by%20ForumTroll%20and%20Dante&amp;severity=medium&amp;id=68ff8e5eba6dffc5e2ff113d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-water-saci-campaign-spreading-via-whatsapp--3ad4bff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Water%20Saci%20Campaign%20Spreading%20Via%20WhatsApp%20Features%20Multi-Vector%20Persistence%20and%20Sophisticated%20C%26C&amp;severity=medium&amp;id=68ff9fd0ba6dffc5e2023fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-targets-windows-hosts-with-linux-based-ranso-17c9bfb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Targets%20Windows%20Hosts%20With%20Linux-Based%20Ransomware&amp;severity=medium&amp;id=69016ef83499185cc34fb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34133-cwe-352-cross-site-request-forgery--03d5610a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34133%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cloud%20Solutions%20SAS%20Wimi%20Teamwork&amp;severity=high&amp;id=68ff8e44ba6dffc5e2ff0b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-weve-learned-from-scanning-thousands-of-smart-8462d68a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20we%E2%80%99ve%20learned%20from%20scanning%20thousands%20of%20smart%20contracts%20with%20SolidityScan&amp;severity=high&amp;id=68ff8e47ba6dffc5e2ff0bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10023-cwe-79-improper-neutralization-of-i-bd75db39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10023%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ff8e44ba6dffc5e2ff0b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12351-cwe-639-authorization-bypass-throug-6104be6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12351%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Honeywell%20S35%203M%2F5M%2F8M%2FPinhole%2FKit%20Camera&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12290-cross-site-scripting-in-sui-shang-i-4b26cad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12290%3A%20Cross%20Site%20Scripting%20in%20Sui%20Shang%20Information%20Technology%20Suishang%20Enterprise-Level%20B2B2C%20Multi-User%20Mall%20System&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12289-cross-site-scripting-in-sui-shang-i-dcda611e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12289%3A%20Cross%20Site%20Scripting%20in%20Sui%20Shang%20Information%20Technology%20Suishang%20Enterprise-Level%20B2B2C%20Multi-User%20Mall%20System&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36121-cwe-80-improper-neutralization-of-s-59e9719c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36121%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=68ff8ac4ba6dffc5e2fe0fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34292-cwe-502-deserialization-of-untruste-f9adb8b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34292%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20BeWelcome%20Rox&amp;severity=critical&amp;id=68ff8744ba6dffc5e2fd65e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12288-authorization-bypass-in-bdtask-phar-9ead32ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12288%3A%20Authorization%20Bypass%20in%20Bdtask%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=68ff8744ba6dffc5e2fd65e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12287-sql-injection-in-bdtask-wholesale-i-15a9788c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12287%3A%20SQL%20Injection%20in%20Bdtask%20Wholesale%20Inventory%20Control%20and%20Inventory%20Management%20System&amp;severity=medium&amp;id=68ff8744ba6dffc5e2fd65da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chatgpt-atlas-browser-exploit-lets-attackers-p-369ffb12</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ChatGPT%20Atlas%20Browser%20Exploit%20Lets%20Attackers%20Plant%20Persistent%20Hidden%20Commands&amp;severity=low&amp;id=6901629430d110a1a6e799d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12286-unquoted-search-path-in-veepn-7896ce70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12286%3A%20Unquoted%20Search%20Path%20in%20VeePN&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12283-authorization-bypass-in-code-projec-87d8913b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12283%3A%20Authorization%20Bypass%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff7cafba6dffc5e2fbe790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9164-cwe-427-uncontrolled-search-path-ele-5228e4d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9164%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50055-cwe-79-improper-neutralization-of-i-9ecd431f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50055%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenVPN%20Access%20Server&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12282-cross-site-scripting-in-code-projec-38d7b6e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12282%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12281-cross-site-scripting-in-code-projec-0e8722b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12281%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12280-cross-site-scripting-in-code-projec-dc805d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12280%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff792cba6dffc5e2fb2acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-china-linked-smishing-campaign-leveraged-1-12e4c165</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20China-Linked%20Smishing%20Campaign%20Leveraged%20194%2C000%20Domains&amp;severity=medium&amp;id=68ff75a2ba6dffc5e2fab31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-hyperrat-android-malware-sold-as-ready-made-sp-de335054</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20HyperRat%20Android%20Malware%20Sold%20as%20Ready-Made%20Spy%20Tool&amp;severity=medium&amp;id=68ff75b8ba6dffc5e2fab4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-variant-of-qilin-ransomware-targets-windows--df686a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20variant%20of%20Qilin%20Ransomware%20targets%20Windows%20via%20remote%20management%20tools%20and%20BYOVD&amp;severity=medium&amp;id=68ff7222ba6dffc5e2fa4f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-wap-a-surveillance-computer-youve-never-hear-1db43d4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20Wap%3A%20A%20Surveillance%20Computer%20You&apos;ve%20Never%20Heard%20Of%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68ff7222ba6dffc5e2fa4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12279-cross-site-scripting-in-code-projec-4275b1da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12279%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12277-sql-injection-in-abdullah-hasan-saj-4f4753fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12277%3A%20SQL%20Injection%20in%20Abdullah-Hasan-Sajjad%20Online-School&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12276-information-disclosure-in-learnhous-75a2b057</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12276%3A%20Information%20Disclosure%20in%20LearnHouse&amp;severity=medium&amp;id=68ff7241ba6dffc5e2fa53b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11248-cwe-532-insertion-of-sensitive-info-66d30e77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11248%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Zohocorp%20ManageEngine%20Endpoint%20Central&amp;severity=low&amp;id=68ff7241ba6dffc5e2fa53b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-wsus-exploited-lockbit-50-returns-tel-9088ce9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20WSUS%20Exploited%2C%20LockBit%205.0%20Returns%2C%20Telegram%20Backdoor%2C%20F5%20Breach%20Widens&amp;severity=medium&amp;id=68ff6b16ba6dffc5e2f831fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41068-cwe-617-reachable-assertion-in-newp-d8a4c263</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41068%3A%20CWE-617%20Reachable%20Assertion%20in%20NewPlane%20Open5GS&amp;severity=high&amp;id=68ff6edbba6dffc5e2f97675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41067-cwe-617-reachable-assertion-in-newp-75c0fca9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41067%3A%20CWE-617%20Reachable%20Assertion%20in%20NewPlane%20Open5GS&amp;severity=high&amp;id=68ff6edbba6dffc5e2f97671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12274-buffer-overflow-in-tenda-ch22-373686ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12274%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff6796ba6dffc5e2f5779f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12273-buffer-overflow-in-tenda-ch22-f6899b4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12273%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff6796ba6dffc5e2f57798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12272-buffer-overflow-in-tenda-ch22-005a7234</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12272%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff609aba6dffc5e2ea040b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12271-buffer-overflow-in-tenda-ch22-109a818f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12271%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff609aba6dffc5e2ea0404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12270-improper-control-of-resource-identi-ceb2317a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12270%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20LearnHouse&amp;severity=medium&amp;id=68ff6099ba6dffc5e2ea03fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41009-cwe-89-improper-neutralization-of-s-0a593df3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41009%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Disenno%20de%20Recursos%20Educativos%20S.L%20virtual%20campus%20platform&amp;severity=critical&amp;id=68ff5b452359da13b53d315f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12269-cross-site-scripting-in-learnhouse-c10dedc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12269%3A%20Cross%20Site%20Scripting%20in%20LearnHouse&amp;severity=medium&amp;id=68ff5b452359da13b53d3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12268-unrestricted-upload-in-learnhouse-99d0273b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12268%3A%20Unrestricted%20Upload%20in%20LearnHouse&amp;severity=medium&amp;id=68ff5b452359da13b53d3153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11955-cwe-299-improper-check-for-certific-c32cbfcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11955%3A%20CWE-299%3A%20Improper%20Check%20for%20Certificate%20Revocation%20in%20TheGreenBow%20TheGreenBow%20VPN%20Client%20Windows%20Enterprise&amp;severity=high&amp;id=68ff59692359da13b53b5873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-firefox-extensions-required-to-disclose-data-c-6ccd95f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Firefox%20Extensions%20Required%20to%20Disclose%20Data%20Collection%20Practices&amp;severity=medium&amp;id=68ff55c904434cffeae9505f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12267-cross-site-scripting-in-abhicodebox-a97a9001</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12267%3A%20Cross%20Site%20Scripting%20in%20abhicodebox%20ModernShop&amp;severity=medium&amp;id=68ff524a04434cffeae2d25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12266-code-injection-in-zytec-dalian-zhuo-d21002f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12266%3A%20Code%20Injection%20in%20Zytec%20Dalian%20Zhuoyun%20Technology%20Central%20Authentication%20Service&amp;severity=medium&amp;id=68ff524a04434cffeae2d259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12265-buffer-overflow-in-tenda-ch22-78ff9447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12265%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff524a04434cffeae2d252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/year-old-wordpress-plugin-flaws-exploited-to-hack--d70cee15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Year-Old%20WordPress%20Plugin%20Flaws%20Exploited%20to%20Hack%20Websites&amp;severity=critical&amp;id=68ff4ed204434cffeade4f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/27th-october-threat-intelligence-report-e014336a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=27th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68ff4d12bbaf5d265c8ed70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-discord-accounts-with-redtiger-based-fc3c7187</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20steal%20Discord%20accounts%20with%20RedTiger-based%20infostealer&amp;severity=high&amp;id=68ff4ce5bbaf5d265c8de265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordfence-blocks-87m-attacks-exploiting-old-gutenk-4ff330b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wordfence%20blocks%208.7M%20attacks%20exploiting%20old%20GutenKit%20and%20Hunk%20Companion%20flaws&amp;severity=medium&amp;id=68ff4ce5bbaf5d265c8de269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bytes-over-dns-sans-internet-storm-center-d8ccc291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bytes%20over%20DNS%20-%20SANS%20Internet%20Storm%20Center&amp;severity=medium&amp;id=68ff4ce5bbaf5d265c8de26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12264-cross-site-scripting-in-wisencode-fe8f788b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12264%3A%20Cross%20Site%20Scripting%20in%20Wisencode&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12263-sql-injection-in-code-projects-onli-c02c22b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12263%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12262-sql-injection-in-code-projects-onli-13a3f798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12262%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4d0fbbaf5d265c8ed1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-payments-dropped-in-q3-2025-analysis-16c3acbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Payments%20Dropped%20in%20Q3%202025%3A%20Analysis&amp;severity=medium&amp;id=68ff4960bbaf5d265c875b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59463-cwe-833-deadlock-in-sick-ag-tloc100-3b4d7a5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59463%3A%20CWE-833%20Deadlock%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=medium&amp;id=68ff4972bbaf5d265c87718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59462-cwe-248-uncaught-exception-in-sick--5337da09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59462%3A%20CWE-248%20Uncaught%20Exception%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=medium&amp;id=68ff4972bbaf5d265c877185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59461-cwe-862-missing-authorization-in-si-cba65bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59461%3A%20CWE-862%20Missing%20Authorization%20in%20SICK%20AG%20TLOC100-100%20all%20Firmware%20versions&amp;severity=high&amp;id=68ff4972bbaf5d265c87717d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-dream-job-to-malware-dreamloaders-in-recent-c-185b6ce0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Dream%20Job%20to%20Malware%3A%20DreamLoaders%20in%20Recent%20Campaign&amp;severity=medium&amp;id=68ff4ce1bbaf5d265c8de12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59460-cwe-1391-use-of-weak-credentials-in-4191a421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59460%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20SICK%20AG%20TLOC100-100%20with%20Firmware%20%3C7.1.1&amp;severity=high&amp;id=68ff4972bbaf5d265c877175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59459-cwe-770-allocation-of-resources-wit-86c816c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59459%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20TLOC100-100&amp;severity=medium&amp;id=68ff4972bbaf5d265c87716d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8432-cwe-276-incorrect-default-permission-b9d1c12e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8432%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ff45eabbaf5d265c824126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12261-sql-injection-in-codeastro-gym-mana-7d47a7bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12261%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ff45eabbaf5d265c82411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12260-stack-based-buffer-overflow-in-toto-696570db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12260%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff45eabbaf5d265c824118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12259-stack-based-buffer-overflow-in-toto-437deb94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12259%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff45eabbaf5d265c824111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10561-cwe-1104-use-of-unmaintained-third--44afcc9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10561&amp;severity=null&amp;id=68ff45eabbaf5d265c824109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chrome-zero-day-exploitation-linked-to-hacking-tea-a2746689</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%20Zero-Day%20Exploitation%20Linked%20to%20Hacking%20Team%20Spyware&amp;severity=medium&amp;id=68ff3cec092efa8a037267c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12258-stack-based-buffer-overflow-in-toto-40657c71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12258%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff4783bbaf5d265c856c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12257-sql-injection-in-sourcecodester-onl-242ff922</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12257%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Result%20System&amp;severity=medium&amp;id=68ff4783bbaf5d265c856c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12256-sql-injection-in-code-projects-onli-45cc6d8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12256%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff4783bbaf5d265c856c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46583-cwe-116-improper-encoding-or-escapi-2a3a2588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46583%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20ZTE%20MC889A%20Pro&amp;severity=medium&amp;id=68ff3b148ee3628e2d7f52dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bytes-over-dns-mon-oct-27th-685a5807</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bytes%20over%20DNS%2C%20(Mon%2C%20Oct%2027th)&amp;severity=low&amp;id=68ff378d8ee3628e2d779a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12255-sql-injection-in-code-projects-onli-f1d59206</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12255%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12254-sql-injection-in-code-projects-onli-29770114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12254%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12253-sql-injection-in-amtt-hotel-broadba-1502365e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12253%3A%20SQL%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=68ff37aa8ee3628e2d77b5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-combines-linux-payload-with-byovd-659322bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Combines%20Linux%20Payload%20With%20BYOVD%20Exploit%20in%20Hybrid%20Attack&amp;severity=high&amp;id=68ff6e72ba6dffc5e2f95f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12080-cwe-345-insufficient-verification-o-b1e5b7dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12080%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Google%20WearOS&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46582-cwe-321-use-of-hard-coded-cryptogra-199079ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46582%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ZTE%20ZXMP%20M721&amp;severity=high&amp;id=68ff324b8f87cfec3dea7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12252-sql-injection-in-code-projects-onli-41edc75d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12252%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12251-cross-site-scripting-in-openwga-d0584e75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12251%3A%20Cross%20Site%20Scripting%20in%20OpenWGA&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12250-path-traversal-in-openwga-d2dc7eff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12250%3A%20Path%20Traversal%20in%20OpenWGA&amp;severity=medium&amp;id=68ff324b8f87cfec3dea7cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jettys-addpath-allows-lfi-in-windows-traccar-unaut-81e8d559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jetty&apos;s%20addPath%20allows%20LFI%20in%20Windows%20-%20Traccar%20Unauthenticated%20LFI%20v5.8-v6.8.1&amp;severity=medium&amp;id=68ff2ec58f87cfec3de3053c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-qilin-attack-methods-exposed-through-mu-acbc9c75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Qilin%20attack%20methods%20exposed%20through%20multiple%20cases&amp;severity=medium&amp;id=68ff45e5bbaf5d265c82404a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12249-csv-injection-in-axosoft-scrum-and--1f7ac8c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12249%3A%20CSV%20Injection%20in%20Axosoft%20Scrum%20and%20Bug%20Tracking&amp;severity=medium&amp;id=68ff2ce08f87cfec3de104fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12248-sql-injection-in-cltphp-92597427</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12248%3A%20SQL%20Injection%20in%20CLTPHP&amp;severity=medium&amp;id=68ff2ce08f87cfec3de104f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12247-unquoted-search-path-in-hasleo-back-78db9bb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12247%3A%20Unquoted%20Search%20Path%20in%20Hasleo%20Backup%20Suite&amp;severity=high&amp;id=68ff2ce08f87cfec3de104eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cophish-new-oauth-phishing-technique-abuses-micros-eb55c328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoPHish%3A%20New%20OAuth%20phishing%20technique%20abuses%20Microsoft%20Copilot%20Studio%20chatbots%20to%20create%20convincing%20credential%20theft%20campaigns&amp;severity=medium&amp;id=68ff29743fb824cb8ce78a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11682-cwe-79-improper-neutralization-of-i-68c1e2a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Perx%20Technologies%20Customer%20Engagement%20%26%20Loyalty%20Platform&amp;severity=high&amp;id=68ff22703fb824cb8cdada05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12246-cross-site-scripting-in-chatwoot-d3443e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12246%3A%20Cross%20Site%20Scripting%20in%20chatwoot&amp;severity=medium&amp;id=68ff24083fb824cb8cde2125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12245-origin-validation-error-in-chatwoot-8578d8cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12245%3A%20Origin%20Validation%20Error%20in%20chatwoot&amp;severity=medium&amp;id=68ff24083fb824cb8cde211f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12244-cross-site-scripting-in-code-projec-6f2c1302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12244%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20E-Banking%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-atlas-browser-can-be-tricked-by-fake-urls--61e7d615</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20Atlas%20Browser%20Can%20Be%20Tricked%20by%20Fake%20URLs%20into%20Executing%20Hidden%20Commands&amp;severity=medium&amp;id=68ff6e72ba6dffc5e2f95f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12243-sql-injection-in-code-projects-clie-6daa66fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12243%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12242-sql-injection-in-codeastro-gym-mana-8cac826c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12242%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ff24083fb824cb8cde2132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12241-stack-based-buffer-overflow-in-toto-d045e579</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12241%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff24083fb824cb8cde212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12055-cwe-22-improper-limitation-of-a-pat-c5f9e325</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MPDV%20Mikrolab%20GmbH%20MIP%202&amp;severity=high&amp;id=68ff17d045f6dd1a506a0db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12240-buffer-overflow-in-totolink-a3300r-4ea3e5be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12240%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff17d045f6dd1a506a0dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12239-buffer-overflow-in-totolink-a3300r-4faf0f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12239%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3300R&amp;severity=high&amp;id=68ff17d045f6dd1a506a0dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12238-sql-injection-in-code-projects-auto-865364d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12238%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ff17d045f6dd1a506a0db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12237-sql-injection-in-projectworlds-adva-0f230df9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12237%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68ff1b307e25bac6d3f8f116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12236-buffer-overflow-in-tenda-ch22-8b2ef6be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12236%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12235-buffer-overflow-in-tenda-ch22-25e20edc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12235%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12234-buffer-overflow-in-tenda-ch22-554c77c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12234%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12233-buffer-overflow-in-tenda-ch22-0503470d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12233%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12232-buffer-overflow-in-tenda-ch22-c08fd25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12232%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ff1b307e25bac6d3f8f0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12231-cross-site-scripting-in-projectworl-f3e2101b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12231%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12230-cross-site-scripting-in-projectworl-594ed5bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12230%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11154-cwe-862-missing-authorization-in-id-f208f23b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11154%3A%20CWE-862%20Missing%20Authorization%20in%20IDonate&amp;severity=medium&amp;id=68ff0bad4c2556d99606b1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12229-cross-site-scripting-in-projectworl-cc2ff137</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12229%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12228-cross-site-scripting-in-projectworl-e50f0a79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12228%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Expense%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12227-cross-site-scripting-in-projectworl-a0b15e5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12227%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Gate%20Pass%20Management%20System&amp;severity=medium&amp;id=68ff0690748f7c5f7ca8c155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12226-sql-injection-in-sourcecodester-bes-a8427e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12226%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=68feff90748f7c5f7c9b0427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12225-stack-based-buffer-overflow-in-tend-0ad87a0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12225%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68feff90748f7c5f7c9b0420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12224-cross-site-scripting-in-iqbolshoh-p-a3df1387</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12224%3A%20Cross%20Site%20Scripting%20in%20Iqbolshoh%20php-business-website&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12223-unrestricted-upload-in-bdtask-fligh-cef5830d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12223%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12222-unrestricted-upload-in-bdtask-fligh-42c3e97c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12222%3A%20Unrestricted%20Upload%20in%20Bdtask%20Flight%20Booking%20Software&amp;severity=medium&amp;id=68ff0129748f7c5f7c9e45b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12215-sql-injection-in-projectworlds-onli-847f26c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12215%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Shopping%20System&amp;severity=medium&amp;id=68fef1ce79a7bb5513bbd8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12214-stack-based-buffer-overflow-in-tend-51b2371e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12214%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fef1ce79a7bb5513bbd8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12213-stack-based-buffer-overflow-in-tend-5061791d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12213%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fef1ce79a7bb5513bbd8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/globalcve-opensource-unified-cve-data-from-around--8cb9a2a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlobalCVE%20%E2%80%94%20OpenSource%20Unified%20CVE%20Data%20from%20Around%20the%20World&amp;severity=medium&amp;id=68feec4623a7bbed3251185f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12212-stack-based-buffer-overflow-in-tend-ae4ac0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12212%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68feefec79a7bb5513b9db66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12211-stack-based-buffer-overflow-in-tend-7637e1c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12211%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68feefec79a7bb5513b9db5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12210-stack-based-buffer-overflow-in-tend-de540c6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12210%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fee1ba23a7bbed324e8bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12209-stack-based-buffer-overflow-in-tend-2a5adfe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12209%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3&amp;severity=high&amp;id=68fee1ba23a7bbed324e8bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12208-sql-injection-in-sourcecodester-bes-0f41bfb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12208%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20House%20Rental%20Management%20System&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12207-null-pointer-dereference-in-kamaili-0be4da41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12207%3A%20NULL%20Pointer%20Dereference%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12206-null-pointer-dereference-in-kamaili-c00be081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12206%3A%20NULL%20Pointer%20Dereference%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12205-use-after-free-in-kamailio-5b7d0b93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12205%3A%20Use%20After%20Free%20in%20Kamailio&amp;severity=medium&amp;id=68fee1ba23a7bbed324e8ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48088-cwe-79-improper-neutralization-of-i-6f736b56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm_Force%20Ultimate%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68fedab123a7bbed324d60d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58918-cwe-352-cross-site-request-forgery--44b0df49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58918%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Waituk%20Entrada&amp;severity=medium&amp;id=68fedab123a7bbed324d60d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12204-heap-based-buffer-overflow-in-kamai-6fccc870</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12204%3A%20Heap-based%20Buffer%20Overflow%20in%20Kamailio&amp;severity=medium&amp;id=68fedab123a7bbed324d60d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12203-path-traversal-in-givanz-vvveb-adeae2e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12203%3A%20Path%20Traversal%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68fedab123a7bbed324d60c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62988-server-side-request-forgery-ssrf-in-226e8d31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62988%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Codeless%20Slider%20Templates&amp;severity=medium&amp;id=68fed03623a7bbed324accd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62987-improper-neutralization-of-input-du-b9b3e38a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Builderall%20Builderall%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68fed03623a7bbed324acccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62986-cross-site-request-forgery-csrf-in--1529806b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FanBridge%20FanBridge%20signup&amp;severity=high&amp;id=68fed03623a7bbed324acccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62985-improper-neutralization-of-input-du-70fe6fdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62985%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20llamaman%20Simple%20Pull%20Quote&amp;severity=medium&amp;id=68fed03623a7bbed324accc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62984-improper-neutralization-of-input-du-53f6b178</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=medium&amp;id=68fed03623a7bbed324accc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62983-improper-neutralization-of-input-du-193b49c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sudar%20Muthu%20Posts%20By%20Tag&amp;severity=medium&amp;id=68fed03623a7bbed324accc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62982-improper-neutralization-of-input-du-535d93eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarah%20Giles%20Dynamic%20User%20Directory&amp;severity=medium&amp;id=68fed03623a7bbed324accc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62981-url-redirection-to-untrusted-site-o-13d7833f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62981%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zoho%20CRM%20and%20Bigin&amp;severity=medium&amp;id=68fed03623a7bbed324accbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62980-missing-authorization-in-mdz-persia-07d61d0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62980%3A%20Missing%20Authorization%20in%20MDZ%20Persian%20Admnin%20Fonts&amp;severity=high&amp;id=68fed03623a7bbed324accba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62979-insertion-of-sensitive-information--da9ef522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62979%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20airesvsg%20ACF%20to%20REST%20API&amp;severity=medium&amp;id=68fed03523a7bbed324accad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62978-missing-authorization-in-kiotviet-k-879d79d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62978%3A%20Missing%20Authorization%20in%20Kiotviet%20KiotViet%20Sync&amp;severity=medium&amp;id=68fed03523a7bbed324accaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62977-missing-authorization-in-seobing-0b1a43e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62977%3A%20Missing%20Authorization%20in%20%E7%99%BE%E5%BA%A6%E7%AB%99%E9%95%BFSEO%E5%90%88%E9%9B%86(%E6%94%AF%E6%8C%81%E7%99%BE%E5%BA%A6%2F%E7%A5%9E%E9%A9%AC%2FBing%2F%E5%A4%B4%E6%9D%A1%E6%8E%A8%E9%80%81)&amp;severity=medium&amp;id=68fed03523a7bbed324acca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62976-missing-authorization-in-joovii-sen-e8b84f75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62976%3A%20Missing%20Authorization%20in%20Joovii%20Sendle%20Shipping&amp;severity=medium&amp;id=68fed03523a7bbed324acca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62974-improper-neutralization-of-input-du-7290b3d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoSchedule%20Headline%20Analyzer&amp;severity=medium&amp;id=68fed03523a7bbed324acca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62973-missing-authorization-in-themekraft-48a470a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62973%3A%20Missing%20Authorization%20in%20Themekraft%20BuddyForms&amp;severity=medium&amp;id=68fed03523a7bbed324acc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62972-missing-authorization-in-wpwebinars-4a3db737</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62972%3A%20Missing%20Authorization%20in%20WPWebinarSystem%20WebinarPress&amp;severity=medium&amp;id=68fed03523a7bbed324acc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62971-improper-neutralization-of-input-du-57d7362d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CrestaProject%20Attesa%20Extra&amp;severity=medium&amp;id=68fed03523a7bbed324acc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62970-missing-authorization-in-spencer-ha-92fa4573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62970%3A%20Missing%20Authorization%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=medium&amp;id=68fed03523a7bbed324acc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62969-improper-neutralization-of-input-du-97a27164</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62969%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=68fed03523a7bbed324acc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62968-improper-neutralization-of-input-du-9cf9623d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sayan%20Datta%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=68fed03423a7bbed324acc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62967-improper-neutralization-of-input-du-bb8a5bc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62967%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Designinvento%20DirectoryPress&amp;severity=medium&amp;id=68fed03423a7bbed324acc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62966-missing-authorization-in-apiki-goca-07ddd724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62966%3A%20Missing%20Authorization%20in%20Apiki%20GoCache&amp;severity=medium&amp;id=68fed03423a7bbed324acc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62965-missing-authorization-in-wpseek-adm-e1312e80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62965%3A%20Missing%20Authorization%20in%20wpseek%20Admin%20Management%20Xtended&amp;severity=high&amp;id=68fed03423a7bbed324acc7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62964-missing-authorization-in-realmag777-931fcbf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62964%3A%20Missing%20Authorization%20in%20RealMag777%20MDTF&amp;severity=high&amp;id=68fed03423a7bbed324acc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62962-cross-site-request-forgery-csrf-in--5d506231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62962%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Andrea%20Landonio%20CloudSearch&amp;severity=high&amp;id=68fed03423a7bbed324acc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62959-improper-control-of-generation-of-c-b2066890</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62959%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=critical&amp;id=68fed03423a7bbed324acc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62958-cross-site-request-forgery-csrf-in--68e56aa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62958%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Clifton%20Griffin%20Simple%20Content%20Templates%20for%20Blog%20Posts%20%26amp%3B%20Pages&amp;severity=high&amp;id=68fed03423a7bbed324acc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62957-cross-site-request-forgery-csrf-in--5d4d9729</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62957%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NikanWP%20NikanWP%20WooCommerce%20Reporting&amp;severity=high&amp;id=68fed03423a7bbed324acc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62956-cross-site-request-forgery-csrf-in--1f76cfe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iseremet%20Reloadly&amp;severity=high&amp;id=68fed03423a7bbed324acc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62954-missing-authorization-in-codeinwp-r-e36df88c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62954%3A%20Missing%20Authorization%20in%20rsocial%20Revive%20Old%20Posts&amp;severity=high&amp;id=68fed03323a7bbed324acc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62953-missing-authorization-in-nanbu-welc-73c5015c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62953%3A%20Missing%20Authorization%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=high&amp;id=68fed03323a7bbed324acc5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62952-missing-authorization-in-quantumclo-4988b1d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62952%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=high&amp;id=68fed03323a7bbed324acc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62951-improper-neutralization-of-input-du-d74555f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icc0rz%20H5P&amp;severity=medium&amp;id=68fed03323a7bbed324acc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62949-improper-neutralization-of-input-du-a5fa908b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=medium&amp;id=68fed03323a7bbed324acc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62948-improper-neutralization-of-input-du-89f557ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Konstantin%20Pankratov%20Date%20counter&amp;severity=medium&amp;id=68fed03323a7bbed324acc4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62946-missing-authorization-in-everestthe-34eb943f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62946%3A%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup&amp;severity=high&amp;id=68fed03323a7bbed324acc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62945-cross-site-request-forgery-csrf-in--6385d974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62945%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eduard%20Pinuaga%20Linares%20Did%20Prestashop%20Display&amp;severity=high&amp;id=68fed03323a7bbed324acc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62944-missing-authorization-in-mark-odonn-d56cf597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62944%3A%20Missing%20Authorization%20in%20Mark%20O&apos;Donnell%20MSTW%20CSV%20EXPORTER&amp;severity=critical&amp;id=68fed03323a7bbed324acc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62943-improper-neutralization-of-input-du-c5b80cc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20McInvale%20Next%20Page%2C%20Not%20Next%20Post&amp;severity=medium&amp;id=68fed03323a7bbed324acc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62942-improper-neutralization-of-input-du-41b9e7bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62942%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tempranova%20WP%20Mapbox%20GL%20JS%20Maps&amp;severity=medium&amp;id=68fed03223a7bbed324acc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62941-improper-neutralization-of-input-du-d2fbfba9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dFactory%20Events%20Maker%20by%20dFactory&amp;severity=medium&amp;id=68fed03223a7bbed324acc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62940-improper-neutralization-of-input-du-d82e2e00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20Diego%20Blox%20Lite&amp;severity=medium&amp;id=68fed03223a7bbed324acc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62939-improper-neutralization-of-input-du-9f959e70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Open%20Currency%20Converter&amp;severity=medium&amp;id=68fed03223a7bbed324acc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62938-missing-authorization-in-reoon-tech-7aa417c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62938%3A%20Missing%20Authorization%20in%20Reoon%20Technology%20Reoon%20Email%20Verifier&amp;severity=high&amp;id=68fed03223a7bbed324acc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62937-improper-neutralization-of-input-du-523b0769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johnny%20Post%20List%20Featured%20Image&amp;severity=medium&amp;id=68fed03223a7bbed324acc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62936-improper-neutralization-of-script-r-708e9c45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62936%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Jthemes%20xSmart&amp;severity=medium&amp;id=68fed03223a7bbed324acc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62935-missing-authorization-in-ilmosys-op-891870f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62935%3A%20Missing%20Authorization%20in%20StackWC%20Open%20Close%20WooCommerce%20Store&amp;severity=high&amp;id=68fed03223a7bbed324acc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62934-cross-site-request-forgery-csrf-in--ca610a8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62934%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mejar%20WP%20Business%20Hours&amp;severity=high&amp;id=68fed03223a7bbed324acc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62933-cross-site-request-forgery-csrf-in--df61abb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Prakash%20Awesome%20Testimonials&amp;severity=high&amp;id=68fed03223a7bbed324acc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62932-missing-authorization-in-wprio-tabl-0c184cd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62932%3A%20Missing%20Authorization%20in%20wprio%20Table%20Block%20by%20RioVizual&amp;severity=high&amp;id=68fed03123a7bbed324acbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62931-missing-authorization-in-microsofts-674d8242</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62931%3A%20Missing%20Authorization%20in%20microsoftstart%20MSN%20Partner%20Hub&amp;severity=high&amp;id=68fed03123a7bbed324acbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62930-improper-neutralization-of-input-du-69983315</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=medium&amp;id=68fed03123a7bbed324acbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62929-missing-authorization-in-pickplugin-92795d43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62929%3A%20Missing%20Authorization%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=high&amp;id=68fed03123a7bbed324acbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62928-missing-authorization-in-joby-josep-52246db1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62928%3A%20Missing%20Authorization%20in%20Joby%20Joseph%20SEO%20Meta%20Description%20Updater&amp;severity=high&amp;id=68fed03123a7bbed324acbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62927-missing-authorization-in-nelio-soft-9e959958</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62927%3A%20Missing%20Authorization%20in%20Nelio%20Software%20Nelio%20Content&amp;severity=high&amp;id=68fed03123a7bbed324acbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62925-missing-authorization-in-conversios-37e991b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62925%3A%20Missing%20Authorization%20in%20Conversios%20Conversios.io&amp;severity=high&amp;id=68fed03123a7bbed324acbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62924-missing-authorization-in-pickplugin-8b4ac23d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62924%3A%20Missing%20Authorization%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=high&amp;id=68fed03123a7bbed324acbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62923-improper-neutralization-of-input-du-b2bf3591</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debuggers%20Studio%20Marquee%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed03123a7bbed324acbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62922-missing-authorization-in-shambhu-pa-f2312bb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62922%3A%20Missing%20Authorization%20in%20Shambhu%20Patnaik%20Export%20Categories&amp;severity=high&amp;id=68fed03123a7bbed324acbda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62921-improper-neutralization-of-input-du-7be0151a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pagup%20Bulk%20Auto%20Image%20Title%20Attribute&amp;severity=medium&amp;id=68fed03023a7bbed324acbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62920-improper-neutralization-of-input-du-b71097ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webnique%20USERCENTRICS%20CMP&amp;severity=medium&amp;id=68fed03023a7bbed324acbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62919-missing-authorization-in-themeshopy-88384875</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62919%3A%20Missing%20Authorization%20in%20themeshopy%20TS%20Demo%20Importer&amp;severity=critical&amp;id=68fed03023a7bbed324acbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62918-missing-authorization-in-ignitionwp-09d3c763</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62918%3A%20Missing%20Authorization%20in%20ignitionwp%20IgnitionDeck&amp;severity=high&amp;id=68fed03023a7bbed324acbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62917-improper-neutralization-of-input-du-da5b5635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jamel.Z%20Tooltipy&amp;severity=medium&amp;id=68fed03023a7bbed324acbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62916-missing-authorization-in-adivaha-fl-0e6630ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62916%3A%20Missing%20Authorization%20in%20Travon%20WP%20Flights%20%26amp%3B%20Hotels%20Booking%20WP%20Plugin&amp;severity=high&amp;id=68fed03023a7bbed324acbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62915-missing-authorization-in-clicksend--24b98750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62915%3A%20Missing%20Authorization%20in%20clicksend%20SMS%20Contact%20Form%207%20Notifications%20by%20ClickSend&amp;severity=high&amp;id=68fed03023a7bbed324acbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62913-improper-neutralization-of-input-du-2153671a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20Opal%20Service&amp;severity=medium&amp;id=68fed03023a7bbed324acbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62912-improper-neutralization-of-input-du-185b3c1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SiteGround%20SiteGround%20Email%20Marketing&amp;severity=medium&amp;id=68fed03023a7bbed324acbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62911-improper-neutralization-of-input-du-2921bf02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rock%20Content%20Rock%20Convert&amp;severity=medium&amp;id=68fed03023a7bbed324acbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62910-improper-neutralization-of-input-du-006fc555</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deshine%20Video%20Gallery%20by%20Huzzaz&amp;severity=medium&amp;id=68fed02f23a7bbed324acb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62909-missing-authorization-in-mrityunjay-efab0dba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62909%3A%20Missing%20Authorization%20in%20mrityunjay%20Smart%20WeTransfer&amp;severity=high&amp;id=68fed02f23a7bbed324acb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62908-missing-authorization-in-gerritvana-d1652fc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62908&amp;severity=critical&amp;id=68fed02f23a7bbed324acb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62907-improper-neutralization-of-input-du-f7f1dd72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Custom%20Post%20Type%20Attachment&amp;severity=medium&amp;id=68fed02f23a7bbed324acb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62906-missing-authorization-in-epiphanyit-fb25270c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62906%3A%20Missing%20Authorization%20in%20epiphanyit321%20Referral%20Link%20Tracker&amp;severity=critical&amp;id=68fed02f23a7bbed324acb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62905-improper-neutralization-of-input-du-ba75d48f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Tadlock%20Query%20Posts&amp;severity=medium&amp;id=68fed02f23a7bbed324acb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62904-improper-neutralization-of-input-du-7deb6a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ben%20Huson%20WP%20Geo&amp;severity=medium&amp;id=68fed02f23a7bbed324acb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62903-improper-neutralization-of-input-du-7441aced</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPClever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=68fed02f23a7bbed324acb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62902-exposure-of-sensitive-system-inform-5dd31129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62902%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeHunk%20WP%20Popup%20Builder&amp;severity=high&amp;id=68fed02f23a7bbed324acb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62900-improper-neutralization-of-input-du-e5722c87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WeblineIndia%20Popular%20Posts%20by%20Webline&amp;severity=medium&amp;id=68fed02f23a7bbed324acb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62899-improper-neutralization-of-input-du-117341c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20THRIVE%20-%20Web%20Design%20Gold%20Coast%20Photospace%20Responsive&amp;severity=medium&amp;id=68fed02e23a7bbed324acb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62898-improper-neutralization-of-input-du-cd2b0734</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maarten%20Links%20shortcode&amp;severity=medium&amp;id=68fed02e23a7bbed324acb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62897-improper-neutralization-of-script-r-ec0a36e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62897%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Brecht%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=68fed02e23a7bbed324acb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62896-cross-site-request-forgery-csrf-in--b63f7d12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62896%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitaldonkey%20Multilang%20Contact%20Form&amp;severity=high&amp;id=68fed02e23a7bbed324acb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62895-insertion-of-sensitive-information--f6305b7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62895%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vito%20Peleg%20Atarim&amp;severity=high&amp;id=68fed02e23a7bbed324acb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62894-improper-neutralization-of-input-du-3e06604e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magicoders%20ACF%20Recent%20Posts%20Widget&amp;severity=medium&amp;id=68fed02e23a7bbed324acb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62893-authorization-bypass-through-user-c-f237aa6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62893&amp;severity=null&amp;id=68fed02e23a7bbed324acb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62892-missing-authorization-in-sunshineph-50a5c653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62892%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=critical&amp;id=68fed02e23a7bbed324acb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62891-cross-site-request-forgery-csrf-in--09d9573c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62891%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=high&amp;id=68fed02e23a7bbed324acb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62890-cross-site-request-forgery-csrf-in--ff9b2620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62890%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Premmerce%20Premmerce%20Brands%20for%20WooCommerce&amp;severity=high&amp;id=68fed02e23a7bbed324acb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62889-missing-authorization-in-kingaddons-61ca6730</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62889%3A%20Missing%20Authorization%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=high&amp;id=68fed02d23a7bbed324acb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62887-improper-neutralization-of-input-du-c9ca9ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68fed02d23a7bbed324acb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62886-cross-site-request-forgery-csrf-in--76abdd10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62886%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdevart%20Pricing%20Table%20builder&amp;severity=high&amp;id=68fed02d23a7bbed324acb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62885-improper-neutralization-of-input-du-14795a70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RexTheme%20WP%20VR&amp;severity=medium&amp;id=68fed02d23a7bbed324acb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62884-missing-authorization-in-elliot-sow-2edd4f3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62884%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=medium&amp;id=68fed02d23a7bbed324acb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62883-missing-authorization-in-premmerce--35cbc8e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62883%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20User%20Roles&amp;severity=medium&amp;id=68fed02d23a7bbed324acb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62882-missing-authorization-in-craig-hewi-633bd11e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62882%3A%20Missing%20Authorization%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=68fed02d23a7bbed324acb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62881-missing-authorization-in-wp-lab-wp--05b88413</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62881%3A%20Missing%20Authorization%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=medium&amp;id=68fed02d23a7bbed324acb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12202-cross-site-request-forgery-in-ajayr-76beddd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12202%3A%20Cross-Site%20Request%20Forgery%20in%20ajayrandhawa%20User-Management-PHP-MYSQL%20web&amp;severity=medium&amp;id=68fed02d23a7bbed324acb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12201-unrestricted-upload-in-ajayrandhawa-fe14b4fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12201%3A%20Unrestricted%20Upload%20in%20ajayrandhawa%20User-Management-PHP-MYSQL&amp;severity=medium&amp;id=68fed02d23a7bbed324acb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12200-null-pointer-dereference-in-dnsmasq-db79851f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12200&amp;severity=null&amp;id=68fec91d23a7bbed324576ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12199-null-pointer-dereference-in-dnsmasq-70b08edf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12199&amp;severity=null&amp;id=68fec91d23a7bbed324576a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12198-heap-based-buffer-overflow-in-dnsma-c0eb5f5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12198&amp;severity=null&amp;id=68fec91d23a7bbed3245769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-27-9162ce75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-27&amp;severity=medium&amp;id=69000944ba6dffc5e21a945f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61102-na-7fb5356f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61102%3A%20n%2Fa&amp;severity=high&amp;id=68ffd110ba6dffc5e20b749d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61105-na-8cfdf762</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61105%3A%20n%2Fa&amp;severity=high&amp;id=68ffca08ba6dffc5e20a0007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61101-na-0484b4c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61101%3A%20n%2Fa&amp;severity=high&amp;id=68ffca08ba6dffc5e20a0001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61100-na-270345a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61100%3A%20n%2Fa&amp;severity=high&amp;id=68ffc300ba6dffc5e2087c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61099-na-1e69e751</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61099%3A%20n%2Fa&amp;severity=high&amp;id=68ffbf81ba6dffc5e207e33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60983-na-4c14f908</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60983%3A%20n%2Fa&amp;severity=medium&amp;id=68ffb16eba6dffc5e205a2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60982-na-aaa241ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60982%3A%20n%2Fa&amp;severity=medium&amp;id=68ffb16eba6dffc5e205a2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54965-na-daeb9b57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54965%3A%20n%2Fa&amp;severity=medium&amp;id=68ffadeaba6dffc5e2050680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61385-na-0df91256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61385%3A%20n%2Fa&amp;severity=critical&amp;id=68ffadeaba6dffc5e2050679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54970-na-4d42913e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54970%3A%20n%2Fa&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27225-na-fe629335</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27225%3A%20n%2Fa&amp;severity=high&amp;id=68ffa364ba6dffc5e202ccf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27224-na-260f14b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27224%3A%20n%2Fa&amp;severity=critical&amp;id=68ffa364ba6dffc5e202ccf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54969-na-0c722094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54969%3A%20n%2Fa&amp;severity=medium&amp;id=68ffa364ba6dffc5e202ccdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54968-na-d2356e8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54968%3A%20n%2Fa&amp;severity=high&amp;id=68ffa364ba6dffc5e202ccd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54967-na-42db0a14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54967%3A%20n%2Fa&amp;severity=medium&amp;id=68ff9fd9ba6dffc5e20240f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27223-na-f88eb5e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27223%3A%20n%2Fa&amp;severity=high&amp;id=68ff9fd9ba6dffc5e20240ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27222-na-813b04ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27222%3A%20n%2Fa&amp;severity=high&amp;id=68ff9fd9ba6dffc5e20240e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60791-na-76de6d51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60791%3A%20n%2Fa&amp;severity=medium&amp;id=68ff98e5ba6dffc5e2013511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49440-na-ff1b4d4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49440%3A%20n%2Fa&amp;severity=high&amp;id=68ff954cba6dffc5e200a747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60424-na-913192f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60424%3A%20n%2Fa&amp;severity=high&amp;id=68ff91d3ba6dffc5e2000d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37749-na-bc27e7fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37749%3A%20n%2Fa&amp;severity=medium&amp;id=68ff91d3ba6dffc5e2000d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60425-na-a1b8ac54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60425%3A%20n%2Fa&amp;severity=high&amp;id=68ff91d3ba6dffc5e2000d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61247-na-e79795af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61247%3A%20n%2Fa&amp;severity=high&amp;id=68ff8e44ba6dffc5e2ff0b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61482-na-a50536cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61482%3A%20n%2Fa&amp;severity=high&amp;id=68ff83b8ba6dffc5e2fcfce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52268-na-e33c3e97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52268%3A%20n%2Fa&amp;severity=high&amp;id=68ff8033ba6dffc5e2fca3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52264-na-647a03d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52264%3A%20n%2Fa&amp;severity=high&amp;id=68ff8033ba6dffc5e2fca3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61481-na-31ea4533</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61481%3A%20n%2Fa&amp;severity=critical&amp;id=68ff7cafba6dffc5e2fbe7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52263-na-8292bdcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52263%3A%20n%2Fa&amp;severity=high&amp;id=68ff7cafba6dffc5e2fbe79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60291-na-b2c9e1dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60291%3A%20n%2Fa&amp;severity=critical&amp;id=68ff75d1ba6dffc5e2fab9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safepay-ransomware-group-claims-the-hack-of-profes-d3862f29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safepay%20ransomware%20group%20claims%20the%20hack%20of%20professional%20video%20surveillance%20provider%20Xortec&amp;severity=medium&amp;id=68fe8eeba0e43e902b0ef7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-says-it-stole-15-million-dublin-c2392495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Says%20It%20Stole%201.5%20Million%20Dublin%20Airport%20Passenger%20Records%20and%2018%2C000%20Air%20Arabia%20Employee%20Data&amp;severity=medium&amp;id=68fe78b79c27a1610cf281d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12285-cwe-20-improper-input-validation-in-af8754dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12285%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fe4e4702add13148482e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12284-cwe-20-improper-input-validation-in-f1e51e1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12284%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fe4e4702add13148482e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12275-cwe-20-improper-input-validation-in-0ba39d72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12275%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fe513db833b4e939da9c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12278-cwe-20-improper-input-validation-in-e19329d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12278%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fe513db833b4e939da9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tesla-fsd-shows-ai-getting-worse-over-time-5f1b99d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tesla%20FSD%20Shows%20AI%20Getting%20Worse%20Over%20Time&amp;severity=medium&amp;id=68fe31493279c2433b74b8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-edr-redir-to-break-edr-via-bind-link-and-clo-edc3879b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20EDR-Redir%20To%20Break%20EDR%20Via%20Bind%20Link%20and%20Cloud%20Filter&amp;severity=medium&amp;id=68fe2c5fcf01b13a1864bb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-in-plain-sight-how-we-followed-one-maliciou-70ab338d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20in%20Plain%20Sight%3A%20How%20we%20followed%20one%20malicious%20extension%20to%20uncover%20a%20multi-extension%E2%80%A6&amp;severity=high&amp;id=68fe12e4925c27e1cd3c6402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-the-world-poker-tour-inside-clubwpt-golds--2ed4ccc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20the%20World%20Poker%20Tour%3A%20Inside%20ClubWPT%20Gold%E2%80%99s%20Back%20Office&amp;severity=medium&amp;id=68fe0a673c975fd57d80eee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8709-cwe-89-improper-neutralization-of-sp-b531fe8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8709%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68fdb65d9f5d064e8728d1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-26-0c569d29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-26&amp;severity=medium&amp;id=68feb97f1b250a83dcfad996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cophish-attack-steals-oauth-tokens-via-copilot-266ec823</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20CoPhish%20attack%20steals%20OAuth%20tokens%20via%20Copilot%20Studio%20agents&amp;severity=high&amp;id=68fd35f5bfa5fb493c427170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-rosselkhoznadzor-hit-by-ddos-attack-food-s-01253072</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Rosselkhoznadzor%20hit%20by%20DDoS%20attack%2C%20food%20shipments%20across%20Russia%20delayed&amp;severity=medium&amp;id=68fd35f5bfa5fb493c427174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55757-cwe-79-improper-neutralization-of-i-97286c4f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virtuemart.net%20Virtuemart%20component%20for%20Joomla&amp;severity=medium&amp;id=68fd19d5bfa5fb493c3f08d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12221-cwe-16-common-vulnerabilities-in-so-2dedc981</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12221%3A%20CWE-16%3A%20Common%20Vulnerabilities%20in%20Software%20Configuration%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=low&amp;id=68fcf6aebfa5fb493c3aeb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12220-cwe-1395-dependency-on-vulnerable-t-3f7348e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12220%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12219-cwe-1395-dependency-on-vulnerable-t-f587a9f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12219%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12218-cwe-1392-use-of-default-credentials-f5630d65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12218%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcf32abfa5fb493c3aa018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12217-cwe-1392-use-of-default-credentials-ea5afb06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12217%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fd989f05a4076d11f4e3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12216-cwe-1301-insufficient-or-incomplete-6985dd77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12216%3A%20CWE-1301%3A%20Insufficient%20or%20Incomplete%20Data%20Removal%20within%20Hardware%20Component%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fcefa6bfa5fb493c39fa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11897-cwe-79-improper-neutralization-of-i-52720fe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7%20%E2%80%94%20Website%20and%20eCommerce%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68fcc57ebfa5fb493c33d06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1m-whatsapp-hack-flops-only-low-risk-bugs-disclose-73328d5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%241M%20WhatsApp%20Hack%20Flops%3A%20Only%20Low-Risk%20Bugs%20Disclosed%20to%20Meta%20After%20Pwn2Own%20Withdrawal&amp;severity=low&amp;id=68fcb763bfa5fb493c32522f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-atlas-omnibox-is-vulnerable-to-jailbreaks-61c0f4ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Atlas%20Omnibox%20Is%20Vulnerable%20to%20Jailbreaks&amp;severity=medium&amp;id=68fcb764bfa5fb493c32523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11875-cwe-79-improper-neutralization-of-i-f6d599a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dr-thomas-fuessl%20SpendeOnline.org&amp;severity=medium&amp;id=68fc745855d697d32d439075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11976-cwe-352-cross-site-request-forgery--b0264535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fusewp%20FuseWP%20%E2%80%93%20WordPress%20User%20Sync%20to%20Email%20List%20%26%20Marketing%20Automation%20(Mailchimp%2C%20Constant%20Contact%2C%20ActiveCampaign%20etc.)&amp;severity=medium&amp;id=68fc745955d697d32d439083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8416-cwe-89-improper-neutralization-of-sp-840bd934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Filter%20by%20WBW&amp;severity=high&amp;id=68fc745a55d697d32d4390d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4203-cwe-89-improper-neutralization-of-sp-fb9d1208</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4203%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=high&amp;id=68fc745955d697d32d43908c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10637-cwe-862-missing-authorization-in-qu-f2e2efbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10637%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Social%20Feed%20Gallery&amp;severity=medium&amp;id=68fc745855d697d32d438ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8483-cwe-94-improper-control-of-generatio-6d94034a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8483%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20marketingfire%20Discussion%20Board%20%E2%80%93%20WordPress%20Forum%20Plugin&amp;severity=medium&amp;id=68fc745a55d697d32d4390d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9322-cwe-89-improper-neutralization-of-sp-0fd782d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9322%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20Stripe%20Payment%20Forms%20by%20WP%20Full%20Pay%20%E2%80%93%20Accept%20Credit%20Card%20Payments%2C%20Donations%20%26%20Subscriptions&amp;severity=high&amp;id=68fc745a55d697d32d4390da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10580-cwe-79-improper-neutralization-of-i-11e041b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marketingfire%20Widget%20Options%20%E2%80%93%20Advanced%20Conditional%20Visibility%20for%20Gutenberg%20Blocks%20%26%20Classic%20Widgets&amp;severity=medium&amp;id=68fc745855d697d32d438fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11255-cwe-862-missing-authorization-in-cy-28be2aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11255%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Password%20Policy%20Manager%20%7C%20Password%20Manager&amp;severity=medium&amp;id=68fc745855d697d32d43906a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11497-cwe-20-improper-input-validation-in-72988d71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11497%3A%20CWE-20%20Improper%20Input%20Validation%20in%20symptote%20Advanced%20Database%20Cleaner&amp;severity=medium&amp;id=68fc745855d697d32d439071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11893-cwe-89-improper-neutralization-of-s-98fbf1d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=high&amp;id=68fc745955d697d32d43907b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10488-cwe-22-improper-limitation-of-a-pat-0c7a580c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10488%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%20Plugin%20with%20Classified%20Ads%20Listings&amp;severity=high&amp;id=68fc745855d697d32d438f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12034-cwe-79-improper-neutralization-of-i-c7d3e1ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alignak%20Fast%20Velocity%20Minify&amp;severity=medium&amp;id=68fc745955d697d32d439087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12095-cwe-352-cross-site-request-forgery--b5a03db9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12095%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20astoundify%20Simple%20Registration%20for%20WooCommerce&amp;severity=high&amp;id=68fc626907185a1a52fd761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12005-cwe-285-improper-authorization-in-r-8dcfa872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12005%3A%20CWE-285%20Improper%20Authorization%20in%20rextheme%20WP%20VR%20%E2%80%93%20360%20Panorama%20and%20Free%20Virtual%20Tour%20Builder%20For%20WordPress&amp;severity=medium&amp;id=68fc626907185a1a52fd7617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10694-cwe-862-missing-authorization-in-sm-e50a62b0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10694%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20User%20Feedback%20%E2%80%93%20Create%20Interactive%20Feedback%20Form%2C%20User%20Surveys%2C%20and%20Polls%20in%20Seconds&amp;severity=medium&amp;id=68fc626907185a1a52fd75f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6639-cwe-285-improper-authorization-in-th-9d4511a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6639%3A%20CWE-285%20Improper%20Authorization%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=medium&amp;id=68fc626a07185a1a52fd762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11888-cwe-863-incorrect-authorization-in--a116156d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11888%3A%20CWE-863%20Incorrect%20Authorization%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=low&amp;id=68fc626907185a1a52fd7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10737-cwe-79-improper-neutralization-of-i-0687ab32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StudioPress%20Open%20Source%20Genesis%20Framework&amp;severity=medium&amp;id=68fc626907185a1a52fd75f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11879-cwe-285-improper-authorization-in-e-cf841b43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11879%3A%20CWE-285%20Improper%20Authorization%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=68fc626907185a1a52fd760d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8588-cwe-79-improper-neutralization-of-in-0235a16e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20publishpress%20Gutenberg%20Blocks%20%E2%80%93%20PublishPress%20Blocks%20Controls%2C%20Visibility%2C%20Reusable%20Blocks&amp;severity=medium&amp;id=68fc626a07185a1a52fd7637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11244-cwe-285-improper-authorization-in-s-c5141c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11244%3A%20CWE-285%20Improper%20Authorization%20in%20saadiqbal%20Password%20Protected%20%E2%80%94%20Lock%20Entire%20Site%2C%20Pages%2C%20Posts%2C%20Categories%2C%20and%20Partial%20Content&amp;severity=low&amp;id=68fc626907185a1a52fd75ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11564-cwe-862-missing-authorization-in-th-01782b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11564%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=68fc626907185a1a52fd7609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8666-cwe-79-improper-neutralization-of-in-90bfa779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uapp%20Testimonial%20Carousel%20For%20Elementor&amp;severity=medium&amp;id=68fc626a07185a1a52fd763c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6680-cwe-284-improper-access-control-in-t-3f659073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6680%3A%20CWE-284%20Improper%20Access%20Control%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=68fc626a07185a1a52fd762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8413-cwe-79-improper-neutralization-of-in-3712ba28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20Listeo%20-%20Directory%20%26%20Listings%20With%20Booking%20-%20WordPress%20Theme&amp;severity=medium&amp;id=68fc626a07185a1a52fd7633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11238-cwe-79-improper-neutralization-of-i-57d0e0aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasunsen%20Watu%20Quiz&amp;severity=high&amp;id=68fc626907185a1a52fd75fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11269-cwe-862-missing-authorization-in-wo-f9799e7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11269%3A%20CWE-862%20Missing%20Authorization%20in%20woobewoo%20Product%20Filter%20by%20WBW&amp;severity=medium&amp;id=68fc626907185a1a52fd7604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11823-cwe-80-improper-neutralization-of-s-17fa3174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11823%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B21%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=68fc525a9a6ac51d5490d294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10579-cwe-862-missing-authorization-in-wp-180bfe17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10579%3A%20CWE-862%20Missing%20Authorization%20in%20wp_media%20BackWPup%20%E2%80%93%20WordPress%20Backup%20%26%20Restore%20Plugin&amp;severity=medium&amp;id=68fc525a9a6ac51d5490d28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11760-cwe-200-exposure-of-sensitive-infor-101447ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11760%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpcenter%20eRoom%20%E2%80%93%20Webinar%20%26%20Meeting%20Plugin%20for%20Zoom%2C%20Google%20Meet%2C%20Microsoft%20Teams&amp;severity=medium&amp;id=68fc33f2f816635dda09c014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-25-12ce565f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-25&amp;severity=medium&amp;id=68fd6728bfa5fb493c4932b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34503-cwe-347-improper-verification-of-cr-7f1518f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34503%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%201&amp;severity=high&amp;id=68fc09d0f816635ddaf339e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34502-cwe-1326-missing-immutable-root-of--fe950508</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34502%3A%20CWE-1326%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=68fc09d0f816635ddaf339e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34500-cwe-321-use-of-hard-coded-cryptogra-6cec96a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34500%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Light%20%26%20Wonder%2C%20Inc.%20%2F%20SHFL%20Entertainment%2C%20Inc.%20%2F%20Shuffle%20Master%2C%20Inc.%20Deck%20Mate%202&amp;severity=high&amp;id=68fc063ff816635ddaf2f2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12194-cwe-400-uncontrolled-resource-consu-3223442c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12194%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20FIPS&amp;severity=medium&amp;id=68fc063ff816635ddaf2f2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62711-cwe-755-improper-handling-of-except-11d9b6e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62711%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=68fbf839f816635ddaf181e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4106-cwe-489-active-debug-code-in-watchgu-8e14f689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4106%3A%20CWE-489%20Active%20Debug%20Code%20in%20WatchGuard%20Fireware%20OS&amp;severity=high&amp;id=68fbf126f816635ddaf05ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34293-cwe-639-authorization-bypass-throug-dbe8ff0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34293%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Naviga%20Global%20%2F%20Miles%2033%20GN4%20Publishing%20System&amp;severity=high&amp;id=68fbedaaf816635ddaeff541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62723-cwe-772-missing-release-of-resource-288663a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62723%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20halfgaar%20FlashMQ&amp;severity=medium&amp;id=68fbe316f816635ddaee62b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentesting-nextjs-server-actions-a1fcb3bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentesting%20Next.js%20Server%20Actions&amp;severity=high&amp;id=68fbdf97f816635ddaedfc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62716-cwe-79-improper-neutralization-of-i-5000e19c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62716%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makeplane%20plane&amp;severity=high&amp;id=68fbdf95f816635ddaedfbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smishing-triad-linked-to-194000-malicious-domains--abea59af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smishing%20Triad%20Linked%20to%20194%2C000%20Malicious%20Domains%20in%20Global%20Phishing%20Operation&amp;severity=high&amp;id=68fbdc0df816635ddaed99d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-launch-mass-attacks-exploiting-outdated-wo-c24bd372</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20launch%20mass%20attacks%20exploiting%20outdated%20WordPress%20plugins&amp;severity=high&amp;id=68fbdc0df816635ddaed99cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-emergency-patch-for-critical-wind-34dc1837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Issues%20Emergency%20Patch%20for%20Critical%20Windows%20Server%20Bug&amp;severity=critical&amp;id=68fc64e207185a1a52fe2bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mozilla-new-firefox-extensions-must-disclose-data--ff0e13a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mozilla%3A%20New%20Firefox%20extensions%20must%20disclose%20data%20collection%20practices&amp;severity=high&amp;id=68fbbc69f816635ddae90c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-targets-indian-government-with-golang-based--10fe43ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20Targets%20Indian%20Government%20with%20Golang-Based%20DeskRAT%20Malware%20Campaign&amp;severity=high&amp;id=68fbbc69f816635ddae90c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-lastpass-death-claims-used-to-breach-password-22480ce0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20LastPass%20death%20claims%20used%20to%20breach%20password%20vaults&amp;severity=high&amp;id=68fbbc69f816635ddae90c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cisa-layoffs-weaken-civilian-cyber-defense-41ef79dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20CISA%20Layoffs%20Weaken%20Civilian%20Cyber%20Defense&amp;severity=medium&amp;id=68fc64e207185a1a52fe2bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-att-careers-breach-with--473f02c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20AT%26T%20Careers%20Breach%20with%20576%2C000%20Records&amp;severity=high&amp;id=68fbb8eff816635ddae567da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-issues-emergency-patch-for-actively-expl-5cb364dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Patched%20Critical%20Microsoft%20WSUS%20Flaw%20Comes%20Under%20Active%20Exploitation&amp;severity=critical&amp;id=68fbc58bf816635ddaea4365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shutdown-sparks-85-increase-in-us-government-cyber-1685f38a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shutdown%20Sparks%2085%25%20Increase%20in%20US%20Government%20Cyberattacks&amp;severity=medium&amp;id=68fc64e207185a1a52fe2bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privacy-rankings-of-popular-messaging-apps-in-2025-15ed1bb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privacy%20rankings%20of%20popular%20messaging%20apps%20in%202025%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68fba6d444c617250775d1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12176-cwe-1242-inclusion-of-undocumented--6c13ea97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12176%3A%20CWE-1242%3A%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68fba47553dd06bf204856d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62714-cwe-862-missing-authorization-in-ka-011b8bf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62714%3A%20CWE-862%3A%20Missing%20Authorization%20in%20karmada-io%20dashboard&amp;severity=high&amp;id=68fba0f053dd06bf20425529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-windows-server-wsus-vulnerability-exploit-cfb4e058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Windows%20Server%20WSUS%20Vulnerability%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=68fb9135b0116405c2a4ced3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11145-cwe-203-observable-discrepancy-in-c-04b51405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11145%3A%20CWE-203%20Observable%20Discrepancy%20in%20CBK%20Soft%20Software%20Hardware%20Electronic%20Computer%20Systems%20Industry%20and%20Trade%20Inc.%20enVision&amp;severity=high&amp;id=68fb9152b0116405c2a4da20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8536-cwe-89-improper-neutralization-of-sp-d5c02924</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8536%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=critical&amp;id=68fb9152b0116405c2a4da1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43994-cwe-306-missing-authentication-for--9e8af551</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43994%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=high&amp;id=68fb93e23b281b3632d40dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43995-cwe-287-improper-authentication-in--5f7681b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43995%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=critical&amp;id=68fb956d3b281b3632d6adf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46425-cwe-611-improper-restriction-of-xml-cdf6bdad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46425%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Dell%20Storage%20Manager&amp;severity=medium&amp;id=68fb8a56b0116405c29b03ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-perplexity-comet-browser-users-bea24928</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Perplexity%20Comet%20Browser%20Users&amp;severity=medium&amp;id=68fb884fecfa37776dced118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-aim-at-european-drone-compani-337e37f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Aim%20at%20European%20Drone%20Companies&amp;severity=medium&amp;id=68fb7f59a4ecdcc9296547ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-ios-26-deletes-spyware-evidence-shad-4a08df82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20iOS%2026%20Deletes%20Spyware%20Evidence%2C%20Shadow%20Escape%20Attack%2C%20Cyber%20Exec%20Sold%20Secrets%20to%20Russia&amp;severity=medium&amp;id=68fb75fc65a68e4110999d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11576-cwe-1236-improper-neutralization-of-10b57814</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11576%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20newcodebyte%20AI%20Chatbot%20Free%20Models%20%E2%80%93%20Customer%20Support%2C%20Live%20Chat%2C%20Virtual%20Assistant&amp;severity=medium&amp;id=68fb728365a68e4110938108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3000-youtube-videos-exposed-as-malware-traps-in-ma-95227076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3%2C000%20YouTube%20Videos%20Exposed%20as%20Malware%20Traps%20in%20Massive%20Ghost%20Network%20Operation&amp;severity=high&amp;id=68fb6f0665a68e41108eaf27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toys-r-us-canada-warns-customers-info-leaked-in-da-145c7d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toys%20%E2%80%9CR%E2%80%9D%20Us%20Canada%20warns%20customers&apos;%20info%20leaked%20in%20data%20breach&amp;severity=high&amp;id=68fb6f0665a68e41108eaf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-earn-1024750-for-73-zero-days-at-pwn2own-i-f8f061f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20earn%20%241%2C024%2C750%20for%2073%20zero-days%20at%20Pwn2Own%20Ireland&amp;severity=high&amp;id=68fb6f0665a68e41108eaf2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-server-emergency-patches-fix-wsus-bug-with-4c43c143</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Server%20emergency%20patches%20fix%20WSUS%20bug%20with%20PoC%20exploit&amp;severity=critical&amp;id=68fb6cbde72abe49433d7dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10861-cwe-918-server-side-request-forgery-eef41d53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10861%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=68fb65c0e72abe4943328fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-smishing-deluge-china-based-campaign-flooding--646edf86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Smishing%20Deluge%3A%20China-Based%20Campaign%20Flooding%20Global%20Text%20Messages&amp;severity=medium&amp;id=68fb62139505544a4c4d54fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toys-r-us-canada-customer-information-leaked-onlin-eae39eaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Toys%20%E2%80%98R%E2%80%99%20Us%20Canada%20Customer%20Information%20Leaked%20Online&amp;severity=medium&amp;id=68fb62089505544a4c4d5394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cybersecurity-perception-gap-why-executives-an-50951c87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Cybersecurity%20Perception%20Gap%3A%20Why%20Executives%20and%20Practitioners%20See%20Risk%20Differently&amp;severity=medium&amp;id=68fbc58bf816635ddaea436b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-spotted-baohuo-android-backdoor-is-hijacking-243c0662</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Spotted%20Baohuo%20Android%20Backdoor%20Is%20Hijacking%20Telegram%20Accounts%20Through%20Fake%20Telegram%20X%20App&amp;severity=medium&amp;id=68fb5e8e9505544a4c484bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5605-vulnerability-in-wso2-wso2-identity--b223b425</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5605%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68fb50f0c5193890929c8395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5350-cwe-918-server-side-request-forgery--ee5374ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5350%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68fb50f0c5193890929c8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-disables-downloaded-file-previews-to-blo-419ee883</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Disables%20Downloaded%20File%20Previews%20to%20Block%20NTLM%20Hash%20Leaks&amp;severity=medium&amp;id=68fb4f21c8f3a4177c5d3c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36361-missing-authorization-in-ibm-app-co-e4c07416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36361%3A%20CWE-862%20Missing%20Authorization%20in%20IBM%20App%20Connect%20Enterprise&amp;severity=medium&amp;id=68fb4ba8c8f3a4177c54ac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12134-cwe-862-missing-authorization-in-bd-82ee9698</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12134%3A%20CWE-862%20Missing%20Authorization%20in%20bdthemes%20ZoloBlocks%20%E2%80%93%20Gutenberg%20Block%20Editor%20Plugin%20with%20Advanced%20Blocks%2C%20Dynamic%20Content%2C%20Templates%20%26%20Patterns&amp;severity=medium&amp;id=68fb482ec8f3a4177c4fd797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12136-cwe-918-server-side-request-forgery-a137d54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12136%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20devowl%20Real%20Cookie%20Banner%3A%20GDPR%20%26%20ePrivacy%20Cookie%20Consent&amp;severity=medium&amp;id=68fb482ec8f3a4177c4fd79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jewelbug-chinese-apt-group-widens-reach-to-russia-63a80dac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jewelbug%3A%20Chinese%20APT%20Group%20Widens%20Reach%20to%20Russia&amp;severity=medium&amp;id=68fb4682df38e44162dd7192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11253-cwe-89-improper-neutralization-of-s-697280a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11253%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aksis%20Technology%20Inc.%20Netty%20ERP&amp;severity=critical&amp;id=68fb3da20691a1b5991c5184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10749-cwe-862-missing-authorization-in-10-d11ff0a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10749%3A%20CWE-862%20Missing%20Authorization%20in%2010up%20Microsoft%20Azure%20Storage%20for%20WordPress&amp;severity=medium&amp;id=68fb3a1e0691a1b599160705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12017-cwe-79-improper-neutralization-of-i-08f2d7f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teyldoan%20VNPAY%20Payment%20gateway&amp;severity=medium&amp;id=68fb3a1f0691a1b59916073e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11172-cwe-862-missing-authorization-in-pl-7a0c8f14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11172%3A%20CWE-862%20Missing%20Authorization%20in%20plagiarismchecker%20Check%20Plagiarism&amp;severity=medium&amp;id=68fb3a1e0691a1b599160712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10901-cwe-862-missing-authorization-in-or-fec8e4fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10901%3A%20CWE-862%20Missing%20Authorization%20in%20originalityai%20Originality.ai%20AI%20Checker&amp;severity=medium&amp;id=68fb3a1e0691a1b59916070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10902-cwe-285-improper-authorization-in-o-7b4cd60e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10902%3A%20CWE-285%20Improper%20Authorization%20in%20originalityai%20Originality.ai%20AI%20Checker&amp;severity=medium&amp;id=68fb3a1e0691a1b59916070e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12014-cwe-862-missing-authorization-in-ge-115206c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12014%3A%20CWE-862%20Missing%20Authorization%20in%20getclouder%20NGINX%20Cache%20Optimizer&amp;severity=medium&amp;id=68fb3a1f0691a1b599160736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11889-cwe-434-unrestricted-upload-of-file-83928661</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11889%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20edgarrojas%20AIO%20Forms%20%E2%80%93%20Craft%20Complex%20Forms%20Easily&amp;severity=high&amp;id=68fb3a1f0691a1b59916072e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11257-cwe-862-missing-authorization-in-li-4984cf4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11257%3A%20CWE-862%20Missing%20Authorization%20in%20limelightmarketing%20LLM%20Hubspot%20Blog%20Import&amp;severity=medium&amp;id=68fb3a1e0691a1b599160716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12096-cwe-79-improper-neutralization-of-i-8b8ffc95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prawas%20Simple%20Excel%20Pricelist%20for%20WooCommerce&amp;severity=medium&amp;id=68fb3a1f0691a1b59916074c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11504-cwe-532-insertion-of-sensitive-info-325ea0cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11504%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20quickcreator%20Quickcreator%20%E2%80%93%20AI%20Blog%20Writer&amp;severity=high&amp;id=68fb3a1e0691a1b59916071a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10748-cwe-89-improper-neutralization-of-s-2238b942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10748%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onlinediagnosticbd%20RapidResult&amp;severity=medium&amp;id=68fb3a1e0691a1b599160701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12028-cwe-352-cross-site-request-forgery--73da3966</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12028%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20indieweb%20IndieAuth&amp;severity=high&amp;id=68fb3a1f0691a1b599160742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10701-cwe-79-improper-neutralization-of-i-3ffc61e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Time%20Clock%20%E2%80%93%20A%20WordPress%20Employee%20%26%20Volunteer%20Time%20Clock%20Plugin&amp;severity=medium&amp;id=68fb3a1e0691a1b5991606f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11887-cwe-862-missing-authorization-in-ti-61b03fc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11887%3A%20CWE-862%20Missing%20Authorization%20in%20tiagohillebrandt%20Supervisor&amp;severity=medium&amp;id=68fb3a1e0691a1b59916071e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10740-cwe-89-improper-neutralization-of-s-785ac503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10740%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rupok98%20URL%20Shortener%20Plugin%20For%20WordPress&amp;severity=medium&amp;id=68fb3a1e0691a1b5991606fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12072-cwe-352-cross-site-request-forgery--9c18d1b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12072%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mynamevenu24%20Disable%20Content%20Editor%20For%20Specific%20Template&amp;severity=medium&amp;id=68fb3a1f0691a1b599160748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11992-cwe-80-improper-neutralization-of-s-78ac763a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11992%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20cnaveenkumar%20Multi%20Item%20Responsive%20Slider&amp;severity=medium&amp;id=68fb3a1f0691a1b599160732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12016-cwe-79-improper-neutralization-of-i-058bef98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12016%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muniyandibg%20qnotsquiz&amp;severity=medium&amp;id=68fb3a1f0691a1b59916073a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-whatsapp-hacker-says-exploit-privately-rep-407be76f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20WhatsApp%20Hacker%20Says%20Exploit%20Privately%20Disclosed%20to%20Meta&amp;severity=medium&amp;id=68fb350e5d093e3bcff6dc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62868-cwe-98-improper-control-of-filename-23df7f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62868%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Edge%20CPT&amp;severity=high&amp;id=68fb31975d093e3bcfef2e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6440-cwe-434-unrestricted-upload-of-file--7ab8e512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6440%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=critical&amp;id=68fb2c431dfaf394b9f9a8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-spreading-glassworm-infects-vs-code-extension-7950b3ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Spreading%20&apos;GlassWorm&apos;%20Infects%20VS%20Code%20Extensions%20in%20Widespread%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=68fbc58bf816635ddaea4371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9158-cwe-79-improper-neutralization-of-in-3d977a2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9158%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Best%20Practical%20Request%20Tracker&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9978-cwe-79-cross-site-scripting-xss-in-j-90e5fe26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9978%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Jeg%20Kit%20for%20Elementor&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10874-cwe-918-server-side-request-forgery-3f851184</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10874%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Orbit%20Fox%3A%20Duplicate%20Page%2C%20Menu%20Icons%2C%20SVG%20Support%2C%20Cookie%20Notice%2C%20Custom%20Fonts%20%26%20More&amp;severity=medium&amp;id=68fb1ac81658c9c3946ecbc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10723-cwe-22-improper-limitation-of-a-pat-6e959d61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10723%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PixelYourSite&amp;severity=low&amp;id=68fb1ac81658c9c3946ecbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61931-cross-site-scripting-xss-in-implem--ac7d5524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61931%3A%20Cross-site%20scripting%20(XSS)%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=68fb0eacd0b277ca6d24c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58070-cross-site-scripting-xss-in-implem--7731de11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58070%3A%20Cross-site%20scripting%20(XSS)%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=68fb0eacd0b277ca6d24c224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-is-attempting-a-comeback-as-a-new-ransomwa-fcf647a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%20is%20attempting%20a%20comeback%20as%20a%20new%20ransomware%20variant%20%22ChuongDong%22%20targeting%20Windows%2C%20Linux%2C%20and%20ESXi&amp;severity=medium&amp;id=68faf36e00e9e97283b9a298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-crypto-bust-offers-hope-in-battle-against-cyber-0b78c9b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Crypto%20Bust%20Offers%20Hope%20in%20Battle%20Against%20Cybercrime%20Syndicates&amp;severity=medium&amp;id=68fade4400e9e97283b3df02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-cloud-account-for-information-thu-oct-23r-39696158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Cloud%20Account%20for%20Information%2C%20(Thu%2C%20Oct%2023rd)&amp;severity=medium&amp;id=68faccc100e9e97283ae5144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-24-f5dc1d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-24&amp;severity=medium&amp;id=68fc143ef816635ddaf4dc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60954-na-f9107b26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60954%3A%20n%2Fa&amp;severity=high&amp;id=68fbe316f816635ddaee62ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52099-na-893fb4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52099&amp;severity=null&amp;id=68fbe316f816635ddaee62b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60419-na-984f9b0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60419%3A%20n%2Fa&amp;severity=medium&amp;id=68fbd88af816635ddaed1bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60730-na-c703a3c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60730%3A%20n%2Fa&amp;severity=high&amp;id=68fbbfeff816635ddae95b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60735-na-e1013000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60735%3A%20n%2Fa&amp;severity=high&amp;id=68fbbc9cf816635ddae913b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60731-na-e8cace3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60731%3A%20n%2Fa&amp;severity=high&amp;id=68fbbc9cf816635ddae913b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60729-na-8d656ffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60729%3A%20n%2Fa&amp;severity=medium&amp;id=68fbbc9cf816635ddae913ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60561-na-89d06c3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60561%3A%20n%2Fa&amp;severity=high&amp;id=68fba6ca44c617250775a793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60559-na-30f10c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60559%3A%20n%2Fa&amp;severity=high&amp;id=68fba6ca44c617250775a790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60803-na-755648fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60803%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47653dd06bf20485769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60552-na-51a759a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60552%3A%20n%2Fa&amp;severity=high&amp;id=68fba47653dd06bf20485766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60551-na-1153cba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60551%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60550-na-a1a0c3d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60550%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf2048570e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60549-na-0288829a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60549%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf2048570b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60564-na-ea8e2f67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60564%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60563-na-f2ea1fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60563%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60562-na-1fd806b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60562%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf20485701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60553-na-b5590e09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60553%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47553dd06bf204856fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60548-na-5ca89883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60548%3A%20n%2Fa&amp;severity=critical&amp;id=68fba47553dd06bf204856fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60547-na-bac5dfb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60547%3A%20n%2Fa&amp;severity=high&amp;id=68fba47553dd06bf204856f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60558-na-3234c5a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60558%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60557-na-60b907ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60557%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60556-na-bb5b24f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60556%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf20425520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60555-na-412cd212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60555%3A%20n%2Fa&amp;severity=high&amp;id=68fba0f053dd06bf2042551d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60554-na-f30e070e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60554%3A%20n%2Fa&amp;severity=critical&amp;id=68fba0f053dd06bf2042551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60801-na-1b83e602</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60801%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203dab00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60566-na-d5344691</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60566%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203daafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60565-na-e7ac0d06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60565%3A%20n%2Fa&amp;severity=high&amp;id=68fb9d7b53dd06bf203daafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56438-na-9b6baa6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56438%3A%20n%2Fa&amp;severity=medium&amp;id=68fb975e3b281b3632d8256f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60938-na-0037679b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60938%3A%20n%2Fa&amp;severity=high&amp;id=68fb956d3b281b3632d6adfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60936-na-df3b04fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60936%3A%20n%2Fa&amp;severity=medium&amp;id=68fb956d3b281b3632d6adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60570-na-162d34b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60570%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60569-na-6fa93d41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60569%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60568-na-06b5f253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60568%3A%20n%2Fa&amp;severity=high&amp;id=68fb93e23b281b3632d40dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61430-na-2152dfea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61430%3A%20n%2Fa&amp;severity=medium&amp;id=68fb9152b0116405c2a4da23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60572-na-7d629312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60572%3A%20n%2Fa&amp;severity=high&amp;id=68fb9152b0116405c2a4da19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60571-na-750c6cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60571%3A%20n%2Fa&amp;severity=high&amp;id=68fb9152b0116405c2a4da16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46185-na-487c379a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46185%3A%20n%2Fa&amp;severity=medium&amp;id=68fb8a56b0116405c29b03a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46183-na-5ea9f7eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46183%3A%20n%2Fa&amp;severity=high&amp;id=68fb886cecfa37776dcfb8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7730-cwe-79-improper-neutralization-of-in-34540007</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=68faafd950358b89bd7bfd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60023-cwe-23-in-automationdirect-producti-3cd44c14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60023%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faafd950358b89bd7bfd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59776-cwe-23-in-automationdirect-producti-276eaa44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59776%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faac5550358b89bd740d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62254-cwe-22-improper-limitation-of-a-pat-691acb94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62254%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68faac5550358b89bd740d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58429-cwe-23-in-automationdirect-producti-211f46c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58429%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faac5550358b89bd740d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58078-cwe-23-in-automationdirect-producti-0577a3f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58078%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa8db50358b89bd6f0362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58456-cwe-23-in-automationdirect-producti-b3197443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58456%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa8db50358b89bd6f0368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61934-cwe-1327-in-automationdirect-produc-1d9e035a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61934%3A%20CWE-1327%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=critical&amp;id=68faa76d436a4ae5df819867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62688-cwe-732-in-automationdirect-product-3d64145f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62688%3A%20CWE-732%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=medium&amp;id=68faa76d436a4ae5df81986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61977-cwe-640-in-automationdirect-product-d357dedb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61977%3A%20CWE-640%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa76d436a4ae5df819873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/help-wanted-vietnamese-actors-using-fake-job-posti-b7d16ca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Help%20Wanted%3A%20Vietnamese%20Actors%20Using%20Fake%20Job%20Posting%20Campaigns%20to%20Deliver%20Malware%20and%20Steal%20Credentials&amp;severity=medium&amp;id=68fb42fddf38e44162d5bae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparenttribe-targets-indian-military-with-desk-bd6f2394</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransparentTribe%20Targets%20Indian%20Military%20with%20DeskRAT%20Malware&amp;severity=medium&amp;id=68fb42fddf38e44162d5baf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62498-cwe-23-in-automationdirect-producti-938f2593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62498%3A%20CWE-23%20in%20AutomationDirect%20Productivity%20Suite&amp;severity=high&amp;id=68faa3e9436a4ae5df797f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fear-the-sessionreaper-adobe-commerce-flaw-under-a-4ca43c60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fear%20the%20&apos;SessionReaper&apos;%3A%20Adobe%20Commerce%20Flaw%20Under%20Attack&amp;severity=critical&amp;id=68fad07600e9e97283b1707b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59503-cwe-918-server-side-request-forgery-8b007bb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59503%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Compute%20Resource%20Provider&amp;severity=critical&amp;id=68fa9f43ff7543f249ea8df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59273-cwe-284-improper-access-control-in--4308bfe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59273%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Event%20Grid%20System&amp;severity=high&amp;id=68fa9f42ff7543f249ea8df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59500-cwe-284-improper-access-control-in--7c264155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59500%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Notification%20Service&amp;severity=high&amp;id=68fa9bb9ff7543f249e2ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12100-cwe-276-incorrect-default-permissio-ba3d994a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12100%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20BI%20Connector%20ODBC%20driver&amp;severity=high&amp;id=68fa99bbff7543f249e1540f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/my-aws-account-got-hacked-here-is-what-happened-2154829d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=My%20AWS%20Account%20Got%20Hacked%20-%20Here%20Is%20What%20Happened&amp;severity=medium&amp;id=68fa983eff7543f249de820a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tired-of-unpaid-toll-texts-blame-the-smishing-tria-a2e1241a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tired%20of%20Unpaid%20Toll%20Texts%3F%20Blame%20the%20&apos;Smishing%20Triad&apos;&amp;severity=high&amp;id=68fad07600e9e97283b1707e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57848-incorrect-default-permissions-in-re-60d7dc8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57848%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Virtualization%204&amp;severity=medium&amp;id=68fa8e34326f59cb11ee3240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62517-cwe-1321-improperly-controlled-modi-641442dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62517%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20rollbar%20rollbar.js&amp;severity=medium&amp;id=68fa8fc31a753c8dfc003b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58428-cwe-77-improper-neutralization-of-s-c25d3ee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58428%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Veeder-Root%20TLS4B%20Automatic%20Tank%20Gauge%20System&amp;severity=critical&amp;id=68fa8736326f59cb11e0f20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55067-cwe-190-integer-overflow-or-wraparo-1f384240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55067%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Veeder-Root%20TLS4B%20Automatic%20Tank%20Gauge%20System&amp;severity=high&amp;id=68fa85e2a3a2e7083d940cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-a-way-to-use-a-computer-mouse-for-2f1dd309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20find%20a%20way%20to%20use%20a%20computer%20mouse%20for%20eavesdropping&amp;severity=low&amp;id=68fa85f0a3a2e7083d940ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62236-cwe-204-observable-response-discrep-10a1e0c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62236%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Frontier%20Airlines%20flyfrontier.com&amp;severity=medium&amp;id=68fa85e2a3a2e7083d940cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-leaks-834-gb-of-comcast-data-aft-c7175c97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Leaks%20834%20GB%20of%20Comcast%20Data%20After%20%241.2%20Million%20Ransom%20Demand&amp;severity=medium&amp;id=68fa85cfa3a2e7083d93e9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12044-cwe-770-allocation-of-resources-wit-3b1e9a44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12044%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68fa824ea3a2e7083d8baf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11621-cwe-288-authentication-bypass-using-690b69bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11621%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68fa7ed3a3a2e7083d87191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6978-cwe-78-improper-neutralization-of-sp-32aedff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6978%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62255-cwe-79-improper-neutralization-of-i-11a4e110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68fa7cdd3832d3f145b8bf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6979-cwe-287-improper-authentication-in-a-30933e7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6979%3A%20CWE-287%20Improper%20Authentication%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6980-cwe-200-exposure-of-sensitive-inform-032afac5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6980%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Arista%20Networks%20Arista%20Edge%20Threat%20Management%20-%20Arista%20Next%20Generation%20Firewall&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23352-cwe-824-access-of-uninitialized-poi-20eb5fef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23352%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=high&amp;id=68fa7cdd3832d3f145b8bf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23347-cwe-276-incorrect-default-permissio-ed918689</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23347%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68fa73f6bf11aeb6491dbf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23345-cwe-125-out-of-bounds-read-in-nvidi-8d9c7c75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23345%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23332-cwe-476-null-pointer-dereference-in-48e9cf1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23332%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23330-cwe-476-null-pointer-dereference-in-f56d74ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23330%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10937-cwe-754-improper-check-for-unusual--c39503c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10937%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Oxford%20Nano%20Technologies%20MinKNOW&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23300-cwe-476-null-pointer-dereference-in-31c3b95f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23300%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=medium&amp;id=68fa73f6bf11aeb6491dbf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54808-cwe-522-insufficiently-protected-cr-c4e34744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54808%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Oxford%20Nano%20Technologies%20MinKNOW&amp;severity=high&amp;id=68fa73f6bf11aeb6491dbf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shadow-escape-0-click-attack-in-ai-assistants--b7e3857a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shadow%20Escape%200-Click%20Attack%20in%20AI%20Assistants%20Puts%20Trillions%20of%20Records%20at%20Risk&amp;severity=medium&amp;id=68fa680a9122777b72f8cee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34156-cwe-497-exposure-of-sensitive-syste-26ef4f26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34156%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Tibbo%20Systems%20AggreGate%20Network%20Manager&amp;severity=medium&amp;id=68fa5a8d2f85fa8bca6362c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34155-cwe-204-observable-response-discrep-b65226e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34155%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Tibbo%20Systems%20AggreGate%20Network%20Manager&amp;severity=medium&amp;id=68fa5a8d2f85fa8bca6362c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62169-cwe-287-improper-authentication-in--860ec987</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62169%3A%20CWE-287%3A%20Improper%20Authentication%20in%20WildRikku%20OctoPrint-SpoolManager&amp;severity=high&amp;id=68fa55172f85fa8bca58f7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privescing-a-laptop-with-bitlocker-pin-cc796d59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privescing%20a%20Laptop%20with%20BitLocker%20%2B%20PIN&amp;severity=medium&amp;id=68fa4e950fcf0b81396757df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12114-cwe-1191-on-chip-debug-and-test-int-8c011b7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12114%3A%20CWE-1191%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68fa4ca10fcf0b8139659480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-lure-defense-engineers-with-f-9daef1cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Lure%20Defense%20Engineers%20With%20Fake%20Jobs%20to%20Steal%20Drone%20Secrets&amp;severity=medium&amp;id=68facf9f00e9e97283b112e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59048-cwe-863-incorrect-authorization-in--407aa5bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59048%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20openbao%20openbao-plugins&amp;severity=high&amp;id=68fa49d81a6be256cbb1964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-government-now-actively-managing-cybercrim-6b63a856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Government%20Now%20Actively%20Managing%20Cybercrime%20Groups%3A%20Security%20Firm&amp;severity=medium&amp;id=68fa40a0958c70c1028a71f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12110-insufficient-session-expiration-in--7b1abdc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12110%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=68fa3b37958c70c10281cfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11429-insufficient-session-expiration-in--d01122fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11429%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.2&amp;severity=medium&amp;id=68fa382cf7adcc2ea5025029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modding-and-distributing-mobile-apps-with-frida-e78e7cc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modding%20And%20Distributing%20Mobile%20Apps%20with%20Frida&amp;severity=medium&amp;id=68fa382ff7adcc2ea502504f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leveraging-machine-learning-to-enhance-acoustic-ea-ae3d9c66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leveraging%20Machine%20Learning%20to%20Enhance%20Acoustic%20Eavesdropping%20Attacks%20(Blog%20Series)&amp;severity=medium&amp;id=68fa34acf7adcc2ea5f9d3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1679-cwe-79-improper-neutralization-of-in-bb28313e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1679%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moxa%20TN-4500A%20Series&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gotta-fly-lazarus-targets-the-uav-sector-e9ac2223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gotta%20fly%3A%20Lazarus%20targets%20the%20UAV%20sector&amp;severity=medium&amp;id=68fb5e869505544a4c48472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-youtubes-malware-distribution-network-9f709208</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20YouTube&apos;s%20Malware%20Distribution%20Network&amp;severity=medium&amp;id=68fb62139505544a4c4d5526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agenda-ransomware-deploys-linux-variant-on-windows-72d5fb88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Agenda%20Ransomware%20Deploys%20Linux%20Variant%20on%20Windows%20Systems%20Through%20Remote%20Management%20Tools%20and%20BYOVD%20Techniques&amp;severity=medium&amp;id=690891465abee5c7f36b3228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62256-cwe-862-missing-authorization-in-li-4c6ce82a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62256%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53701-cwe-79-improper-neutralization-of-i-0b0d0f3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vilar%20VS-IPC1002&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53702-cwe-755-improper-handling-of-except-d1078036</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53702%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Vilar%20VS-IPC1002&amp;severity=high&amp;id=68fa34abf7adcc2ea5f9d39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-sidebar-spoofing-puts-chatgpt-atlas-perplexity--ecfa21e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Sidebar%20Spoofing%20Puts%20ChatGPT%20Atlas%2C%20Perplexity%20Comet%20and%20Other%20Browsers%20at%20Risk&amp;severity=medium&amp;id=68fa289b4ebc55e8a8379c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-youtubes-malware-distribution-network-bcfe546b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20YouTube%E2%80%99s%20Malware%20Distribution%20Network&amp;severity=medium&amp;id=68fa270e60d00e69dc99facd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10705-cwe-918-server-side-request-forgery-d217f5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10705%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mxchat%20MxChat%20%E2%80%93%20AI%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=68fa270860d00e69dc99f587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11128-cwe-918-server-side-request-forgery-176e8037</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11128%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=68fa270960d00e69dc99fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8427-cwe-79-improper-neutralization-of-in-d7a5bda3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Beaver%20Builder%20Team%20Beaver%20Builder%20Plugin%20(Starter%20Version)&amp;severity=medium&amp;id=68fa270960d00e69dc99fa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11023-cwe-829-inclusion-of-functionality--095c680d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11023%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20ArkSigner%20Software%20and%20Hardware%20Inc.%20AcBakImzala&amp;severity=critical&amp;id=68fa270860d00e69dc99f5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/183-million-synthient-stealer-credentials-added-to-9ead0342</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=183%20Million%20Synthient%20Stealer%20Credentials%20Added%20to%20Have%20I%20Been%20Pwned&amp;severity=medium&amp;id=68fa238b60d00e69dc91d411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealer-targeting-android-devices-thu-oct-23rd-50719d6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealer%20Targeting%20Android%20Devices%2C%20(Thu%2C%20Oct%2023rd)&amp;severity=medium&amp;id=68fa1e1cfd7c94938af099d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secure-ai-at-scale-and-speed-learn-the-framework-i-eb90ad5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secure%20AI%20at%20Scale%20and%20Speed%20%E2%80%94%20Learn%20the%20Framework%20in%20this%20Free%20Webinar&amp;severity=medium&amp;id=68facf9f00e9e97283b112e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-176m-crypto-fine-hacking-formu-edb56137</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20%24176M%20Crypto%20Fine%2C%20Hacking%20Formula%201%2C%20Chromium%20Vulns%2C%20AI%20Hijack%20%26%20More&amp;severity=high&amp;id=68facf9f00e9e97283b112e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62401-improper-authorization-448cd1e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62401%3A%20Improper%20Authorization&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62395-improper-access-control-0125e526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62395%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68fa15ae457d6b06b51715d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62400-exposure-of-sensitive-information-t-3f2c83da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62400%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62399-improper-restriction-of-excessive-a-13554b4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62399%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=68fa15ae457d6b06b51715e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62398-improper-authentication-8c81a77e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62398%3A%20Improper%20Authentication&amp;severity=medium&amp;id=68fa15ae457d6b06b51715e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62397-generation-of-error-message-contain-78f436af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62397%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=68fa15ae457d6b06b51715de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62396-exposure-of-information-through-dir-c035d8cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62396%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing&amp;severity=medium&amp;id=68fa15ae457d6b06b51715da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62394-incorrect-authorization-43727613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62394%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=68fa15ae457d6b06b51715d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62393-improper-access-control-43fc1251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62393%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68fa15ae457d6b06b51715ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomcaptcha-rat-attack-targets-aid-groups-suppo-7c17bb47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCaptcha%20RAT%20Attack%20Targets%20Aid%20Groups%20Supporting%20Ukraine&amp;severity=medium&amp;id=68fa1221457d6b06b50f1451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10355-cwe-601-url-redirection-to-untruste-3ffbcc0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10355%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20MOLGENIS%20MOLGENIS%20EMX2&amp;severity=medium&amp;id=68fa18a8fd7c94938ae69a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-codings-real-problem-isnt-bugsits-judgment-17728542</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vibe%20Coding%E2%80%99s%20Real%20Problem%20Isn%E2%80%99t%20Bugs%E2%80%94It%E2%80%99s%20Judgment&amp;severity=low&amp;id=68fad14a00e9e97283b1a878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-critical-adobe-commerce-flaw-puts--74131384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Critical%20Adobe%20Commerce%20Flaw%20Puts%20Many%20eCommerce%20Sites%20at%20Risk&amp;severity=critical&amp;id=68fa0d2f551b7103c484092f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-organizations-are-abandoning-static-secrets-fo-f8e7ccc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Organizations%20Are%20Abandoning%20Static%20Secrets%20for%20Managed%20Identities&amp;severity=medium&amp;id=68fa0d19551b7103c483f168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unseeable-prompt-injections-in-screenshots-more-vu-6db4bd4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unseeable%20prompt%20injections%20in%20screenshots%3A%20more%20vulnerabilities%20in%20Comet%20and%20other%20AI%20browsers%20%7C%20Brave&amp;severity=medium&amp;id=68fa0d4d551b7103c4840b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41073-cwe-22-improper-limitation-of-a-pat-685565bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41073%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=68fa0d4a551b7103c4840ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40643-cwe-79-improper-neutralization-of-i-717361c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68fa09a5551b7103c47b3236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-glassworm-malware-targets-develop-4e1327e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self%20Propagating%20GlassWorm%20Malware%20Targets%20Developers%20Through%20OpenVSX%20Marketplace&amp;severity=medium&amp;id=68fa047bd2c9d59cd47fb9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bind-updates-address-high-severity-cache-poisoning-9c888792</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIND%20Updates%20Address%20High-Severity%20Cache%20Poisoning%20Flaws&amp;severity=high&amp;id=68fa00ecd2c9d59cd477a34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-lanscope-endpoint-manager-bug-exploited-i-fdd6aa12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Lanscope%20Endpoint%20Manager%20Bug%20Exploited%20in%20Ongoing%20Cyberattacks%2C%20CISA%20Confirms&amp;severity=critical&amp;id=68f9fd99d2c9d59cd4735ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lanscope-endpoint-manager-zero-day-exploited-in-th-637e74c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lanscope%20Endpoint%20Manager%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=medium&amp;id=68f9fd7fd2c9d59cd472dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-63dcd28c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20250%20Magento%20Stores%20Hit%20Overnight%20as%20Hackers%20Exploit%20New%20Adobe%20Commerce%20Flaw&amp;severity=high&amp;id=68f9fd99d2c9d59cd4735ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-hackers-exploit-cloud-infrastructure--3cd64a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CJingle%20Thief%E2%80%9D%20Hackers%20Exploit%20Cloud%20Infrastructure%20to%20Steal%20Millions%20in%20Gift%20Cards&amp;severity=high&amp;id=68f9fbee3c8ea3a7c444b197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9981-cwe-79-improper-neutralization-of-in-0f7e25e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68f9f86d3c8ea3a7c43ca072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9980-cwe-79-improper-neutralization-of-in-7c295aa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9980%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68f9f86d3c8ea3a7c43ca06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobile-security-verizon-says-attacks-soar-ai-power-6de30997</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mobile%20Security%3A%20Verizon%20Says%20Attacks%20Soar%2C%20AI-Powered%20Threats%20Raise%20Alarm&amp;severity=medium&amp;id=68f9f4e43c8ea3a7c4381c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12105-use-after-free-in-red-hat-red-hat-e-793ac9a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12105%3A%20Use%20After%20Free%20in%20GNOME%20libsoup&amp;severity=high&amp;id=68f9f347eae24e6f559392cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10914-cwe-79-improper-neutralization-of-i-d60a4c3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proliz%20Software%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=68f9ea97c5ff90d17f9c4f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10727-cwe-79-improper-neutralization-of-i-f5a20b7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ArkSigner%20Software%20and%20Hardware%20Inc.%20AcBakImzala&amp;severity=medium&amp;id=68f9edcdeae24e6f5589b0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-hackers-exploit-cloud-infrastructure--7b5d1412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Jingle%20Thief&apos;%20Hackers%20Exploit%20Cloud%20Infrastructure%20to%20Steal%20Millions%20in%20Gift%20Cards&amp;severity=medium&amp;id=68facf9f00e9e97283b112ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mideast-african-hackers-target-govts-banks-small-r-03dc4a40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mideast%2C%20African%20Hackers%20Target%20Gov&apos;ts%2C%20Banks%2C%20Small%20Retailers&amp;severity=medium&amp;id=68f9c4b24e1be15805b4dd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-250-magento-stores-hit-overnight-as-hackers-e-c68791e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20250%20Magento%20Stores%20Hit%20Overnight%20as%20Hackers%20Exploit%20New%20Adobe%20Commerce%20Flaw&amp;severity=critical&amp;id=68f9c49e4e1be15805b4c918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-lanscope-endpoint-manager-bug-exploited-i-5750d6df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Lanscope%20Endpoint%20Manager%20Bug%20Exploited%20in%20Ongoing%20Cyberattacks%2C%20CISA%20Confirms&amp;severity=critical&amp;id=68facf9f00e9e97283b112ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61865-unquoted-search-path-or-element-in--9158600e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61865%3A%20Unquoted%20search%20path%20or%20element%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20NarSuS%20App&amp;severity=medium&amp;id=68f9af5e102015466a3d3402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54806-cross-site-scripting-xss-in-growi-i-f1f520aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54806%3A%20Cross-site%20scripting%20(XSS)%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=68f9af5e102015466a3d33f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62499-cross-site-scripting-xss-in-six-apa-02607c96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62499%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68f9af5e102015466a3d3406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54856-cross-site-scripting-xss-in-six-apa-4987ac0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54856%3A%20Cross-site%20scripting%20(XSS)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68f9af5e102015466a3d33fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-hunts-european-drone-manufacturing-d-e31792f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Hunts%20European%20Drone%20Manufacturing%20Data&amp;severity=medium&amp;id=68f9abcb102015466a3513b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12104-cwe-1104-use-of-unmaintained-third--a70890e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12104%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f9a9e6102015466a330fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48430-cwe-248-uncaught-exception-in-galla-decbc686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48430%3A%20CWE-248%20Uncaught%20Exception%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a331000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48428-cwe-312-cleartext-storage-of-sensit-8083aea0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48428%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47699-cwe-497-exposure-of-sensitive-syste-5df26031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47699%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=critical&amp;id=68f9a9e6102015466a330ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41402-cwe-602-client-side-enforcement-of--17a7f9a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41402%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35981-cwe-359-exposure-of-private-persona-74657a96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35981%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=68f9a9e6102015466a330ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11575-cwe-276-incorrect-default-permissio-d7416d16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11575%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20Atlas%20SQL%20ODBC%20driver&amp;severity=high&amp;id=68f97a0b93bcde9f320064af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-23-361e19b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-23&amp;severity=medium&amp;id=68fac5a500e9e97283a8ae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54963-na-94c6248b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54963%3A%20n%2Fa&amp;severity=medium&amp;id=68fa8e34326f59cb11ee323c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54966-na-283c71dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54966%3A%20n%2Fa&amp;severity=medium&amp;id=68fa8ab1326f59cb11e6286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54964-na-17f464c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54964%3A%20n%2Fa&amp;severity=high&amp;id=68fa8ab1326f59cb11e62869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60859-na-766eb2ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60859%3A%20n%2Fa&amp;severity=medium&amp;id=68fa805aa3a2e7083d89a8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60837-na-3be9713a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60837%3A%20n%2Fa&amp;severity=medium&amp;id=68fa805aa3a2e7083d89a8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61413-na-c2b37c29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61413%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57240-na-15529262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57240%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61464-na-3f777462</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61464%3A%20n%2Fa&amp;severity=medium&amp;id=68fa681d9122777b72f8df35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50951-na-b3d1aa67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50951%3A%20n%2Fa&amp;severity=medium&amp;id=68fa4e920fcf0b8139674ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50950-na-535fa866</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50950%3A%20n%2Fa&amp;severity=high&amp;id=68fa49d81a6be256cbb1964c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50949-na-468022bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50949%3A%20n%2Fa&amp;severity=medium&amp;id=68fa49d81a6be256cbb19649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61132-na-f2702853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61132%3A%20n%2Fa&amp;severity=high&amp;id=68fa46541a6be256cba9872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61136-na-fb27f586</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61136%3A%20n%2Fa&amp;severity=high&amp;id=68fa44661a6be256cba791e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56009-na-0eb16cea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56009%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56008-na-16987524</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56008%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56007-na-a8a8ea75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56007%3A%20n%2Fa&amp;severity=medium&amp;id=68fa3d2c958c70c10283cd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60852-na-4ba12307</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60852%3A%20n%2Fa&amp;severity=medium&amp;id=68fa34abf7adcc2ea5f9d3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62820-cwe-420-unprotected-alternate-chann-d80d62e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62820%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Slack%20Nebula&amp;severity=medium&amp;id=68f9a9e6102015466a330ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62813-cwe-158-improper-neutralization-of--393cd73e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62813&amp;severity=null&amp;id=68f9a43693bcde9f3214157f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-aid-groups-targeted-through-fake-zoom-meet-f22a18fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Aid%20Groups%20Targeted%20Through%20Fake%20Zoom%20Meetings%20and%20Weaponized%20PDF%20Files&amp;severity=high&amp;id=68f95d53505c7fab67fda400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-muddywater-targets-100-organisations-i-49c83235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20MuddyWater%20Targets%20100%2B%20Organisations%20in%20Global%20Espionage%20Campaign&amp;severity=high&amp;id=68f95d53505c7fab67fda3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-fines-cybercrime-friendly-cryptomus-176m-07f01da5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20Fines%20Cybercrime%20Friendly%20Cryptomus%20%24176M&amp;severity=high&amp;id=68f95d53505c7fab67fda404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-critical-sessionreaper-flaw-in--036d97d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploiting%20critical%20%22SessionReaper%22%20flaw%20in%20Adobe%20Magento&amp;severity=critical&amp;id=68f95d53505c7fab67fda3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-day-2-hackers-exploit-56-zero-days-for-790-50167eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Day%202%3A%20Hackers%20exploit%2056%20zero-days%20for%20%24790%2C000&amp;severity=high&amp;id=68f95d53505c7fab67fda3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-underscores-secure-development-concerns-fb9c2e0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Underscores%20Secure%20Development%20Concerns&amp;severity=high&amp;id=68fad07600e9e97283b17081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62710-cwe-337-predictable-seed-in-pseudo--59da75f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62710%3A%20CWE-337%3A%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20sakaiproject%20sakai&amp;severity=medium&amp;id=68f96334884d3b6631feb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-best-end-user-security-awareness-programs-aren-a86b7cdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Best%20End%20User%20Security%20Awareness%20Programs%20Aren&apos;t%20About%20Awareness%20Anymore&amp;severity=medium&amp;id=68fad07600e9e97283b17084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62708-cwe-409-improper-handling-of-highly-3c9f2426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62708%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=68f95300066c59488c99ac1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62707-cwe-834-excessive-iteration-in-py-p-eaa72a5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62707%3A%20CWE-834%3A%20Excessive%20Iteration%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=68f95300066c59488c99ac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62614-cwe-862-missing-authorization-in-bo-bb4906f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62614%3A%20CWE-862%3A%20Missing%20Authorization%20in%20booklore-app%20booklore&amp;severity=high&amp;id=68f9488fb5ec6c3fed4b87a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62613-cwe-79-improper-neutralization-of-i-6a4a61b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62613%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20steveseguin%20vdo.ninja&amp;severity=medium&amp;id=68f9472e5256beec8efc5608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62612-cwe-918-server-side-request-forgery-d4b5943b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62612%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=68f943aa5256beec8ef3de6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-takes-only-250-documents-to-poison-any-ai-model-7a63db6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%20Takes%20Only%20250%20Documents%20to%20Poison%20Any%20AI%20Model&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/too-many-secrets-attackers-pounce-on-sensitive-dat-b8b4694d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Too%20Many%20Secrets%3A%20Attackers%20Pounce%20on%20Sensitive%20Data%20Sprawl&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multi-stage-websocket-rat-targets-ukraine-in-singl-c0aa85d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCaptcha%3A%20Multi-Stage%20WebSocket%20RAT%20Targets%20Ukraine%20in%20Single-Day%20Spearphishing%20Operation&amp;severity=medium&amp;id=68f9361b62bc771d0f55e424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62611-cwe-73-external-control-of-file-nam-0b51fb2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62611%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20aio-libs%20aiomysql&amp;severity=high&amp;id=68f932a662bc771d0f4e4a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62247-cwe-862-missing-authorization-in-li-f5e428f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62247%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=low&amp;id=68f932a662bc771d0f4e4aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62610-cwe-285-improper-authorization-in-h-b7c008eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62610%3A%20CWE-285%3A%20Improper%20Authorization%20in%20honojs%20hono&amp;severity=high&amp;id=68f932a662bc771d0f4e4aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62248-cwe-79-improper-neutralization-of-i-98160480</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62248%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f92df1491c54bae897dd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-python-rat-targets-gamers-via-minecraft-f2248658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Python%20RAT%20Targets%20Gamers%20via%20Minecraft&amp;severity=medium&amp;id=68f9361b62bc771d0f55e481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iis-servers-owned-by-rudepanda-like-its-2003-7eea466b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IIS%20servers%20owned%20by%20RudePanda%20like%20it&apos;s%202003&amp;severity=medium&amp;id=68f9361b62bc771d0f55e442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitter-apt-exploiting-old-winrar-vulnerability-and-c6a6ee86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitter%20APT%20Exploiting%20Old%20WinRAR%20Vulnerability%20and%20Office%20Files%20in%20New%20Backdoor%20Attacks&amp;severity=medium&amp;id=68f92a68491c54bae88fa338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58712-incorrect-default-permissions-in-re-65f23d62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58712%3A%20Incorrect%20Default%20Permissions%20in%20apache%20activemq-artemis&amp;severity=medium&amp;id=68f92183732d1470b7fcdfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-secures-ban-on-nso-group-after-6-year-leg-0eafb927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Secures%20Ban%20on%20NSO%20Group%20After%206-Year%20Legal%20Battle&amp;severity=medium&amp;id=68f9194c2887d40ca3b9ce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-nethereum-nuget-package-used-homoglyph-trick--d32190c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Nethereum%20NuGet%20Package%20Used%20Homoglyph%20Trick%20to%20Steal%20Crypto%20Wallet%20Keys&amp;severity=high&amp;id=68f913f4519b403272389dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-muddywater-targets-100-organisations-i-fffaf094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20MuddyWater%20Targets%20100%2B%20Organisations%20in%20Global%20Espionage%20Campaign&amp;severity=high&amp;id=68f9831e93bcde9f320bfbd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-async-tar-rust-library-allows--41bbfade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20flaw%20in%20Async-Tar%20Rust%20library%20allows%20to%20smuggle%20extra%20archives%20when%20the%20library%20is%20processing%20nested%20TAR%20files&amp;severity=medium&amp;id=68f913f4519b403272389dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11957-cwe-639-authorization-bypass-throug-8e06826e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11957%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Devolutions%20Server&amp;severity=critical&amp;id=68f9120a519b40327236e527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11958-cwe-20-improper-input-validation-in-88a22836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11958%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68f9120a519b40327236e52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-aid-groups-targeted-through-fake-zoom-meet-f46270bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Aid%20Groups%20Targeted%20Through%20Fake%20Zoom%20Meetings%20and%20Weaponized%20PDF%20Files&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22178-improper-authorization-in-atlassian-f98929e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22178%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3c99c688c2fb43c67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22169-improper-authorization-in-atlassian-8c691bbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22169%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22173-improper-authorization-in-atlassian-34a2b2ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22173%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22170-improper-authorization-in-atlassian-cecb089a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22170%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22174-improper-authorization-in-atlassian-71101333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22174%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22172-improper-authorization-in-atlassian-44d49049</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22172%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22176-improper-authorization-in-atlassian-124acd9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22176%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22171-improper-authorization-in-atlassian-711e1b7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22171%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22168-improper-authorization-in-atlassian-a1b0c6aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22168%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22177-improper-authorization-in-atlassian-762ab795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22177%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22175-improper-authorization-in-atlassian-2a6c756b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22175%3A%20Improper%20Authorization%20in%20Atlassian%20Jira%20Align&amp;severity=medium&amp;id=68f90a3b99c688c2fb43c649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rival-hackers-dox-alleged-operators-of-lumma-steal-54acfe41</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rival%20Hackers%20Dox%20Alleged%20Operators%20of%20Lumma%20Stealer&amp;severity=medium&amp;id=68f9008aa70370bc87f7fc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40780-cwe-341-predictable-from-observable-f5cc22c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40780%3A%20CWE-341%20Predictable%20from%20Observable%20State%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40778-cwe-349-acceptance-of-extraneous-un-761b2f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40778%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8677-cwe-405-asymmetric-resource-consumpt-118c69a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8677%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20ISC%20BIND%209&amp;severity=high&amp;id=68f8ffa56e01a0ac47e2cb6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62607-cwe-306-missing-authentication-for--91b1a6d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62607%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20nautobot%20nautobot-app-ssot&amp;severity=medium&amp;id=68f8fc246e01a0ac47db56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62659-cwe-79-improper-neutralization-of-i-85f045c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62659%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20CookieConsent%20extension&amp;severity=low&amp;id=68f8fa3f6e01a0ac47d8a3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23299-cwe-787-out-of-bounds-write-in-nvid-aec4eb14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23299%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20BlueField%20GA&amp;severity=medium&amp;id=68f8f7aea2d588d2bde2ff2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62606-cwe-89-improper-neutralization-of-s-6cf35fb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62606%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20My-Little-Forum%20mylittleforum&amp;severity=high&amp;id=68f8f43ba2d588d2bddb93c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-popular-rust-library-leads-to--9c451573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20Flaw%20in%20Popular%20Rust%20Library%20Leads%20to%20RCE&amp;severity=low&amp;id=68f8f420a2d588d2bddb2712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11965-cwe-552-files-or-directories-access-c199d529</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11965%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Eclipse%20Foundation%20Vert.x&amp;severity=medium&amp;id=68f8f0b1a2d588d2bdd5f4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11966-cwe-79-improper-neutralization-of-i-2d4bf23e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eclipse%20Foundation%20Vert.x&amp;severity=low&amp;id=68f8f249a2d588d2bdd990e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62073-missing-authorization-in-sovlix-mee-7d327abb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62073%3A%20Missing%20Authorization%20in%20Sovlix%20MeetingHub&amp;severity=medium&amp;id=68f8effb04677bbd79439bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62072-missing-authorization-in-rustaurius-d2884e51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62072%3A%20Missing%20Authorization%20in%20Rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=68f8effb04677bbd79439bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62071-missing-authorization-in-repuso-soc-2cad2518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62071%3A%20Missing%20Authorization%20in%20Repuso%20Social%20proof%20testimonials%20and%20reviews%20by%20Repuso&amp;severity=medium&amp;id=68f8effb04677bbd79439bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62070-missing-authorization-in-wpxpo-wowr-3e60771d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62070%3A%20Missing%20Authorization%20in%20WPXPO%20WowRevenue&amp;severity=medium&amp;id=68f8effb04677bbd79439ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62069-improper-neutralization-of-input-du-b3b0ce63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68f8effb04677bbd79439ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62063-improper-neutralization-of-input-du-d965e1c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Travel%20WP%20Travel%20Gutenberg%20Blocks&amp;severity=medium&amp;id=68f8effb04677bbd79439ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62062-insertion-of-sensitive-information--7abc9c29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62062%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ThemeRuby%20Easy%20Post%20Submission&amp;severity=medium&amp;id=68f8effb04677bbd79439b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62061-cross-site-request-forgery-csrf-in--be02ba2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62061%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=medium&amp;id=68f8effb04677bbd79439b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62060-improper-neutralization-of-input-du-a0bb517b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62060%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Tab%20Ultimate&amp;severity=medium&amp;id=68f8effb04677bbd79439b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62058-improper-neutralization-of-input-du-12ee61e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=medium&amp;id=68f8effb04677bbd79439b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62054-improper-control-of-filename-for-in-42e9f77a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62054%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=68f8eff904677bbd79439b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62052-missing-authorization-in-horea-radu-0fde957c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62052%3A%20Missing%20Authorization%20in%20Horea%20Radu%20One%20Page%20Express%20Companion&amp;severity=medium&amp;id=68f8eff904677bbd79439b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62048-missing-authorization-in-wpmu-dev-y-8431bd18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62048%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20SmartCrawl&amp;severity=medium&amp;id=68f8eff904677bbd79439b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62042-improper-neutralization-of-input-du-7e162b55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=medium&amp;id=68f8eff904677bbd79439b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62029-improper-control-of-filename-for-in-d0798786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themesion%20Grevo&amp;severity=high&amp;id=68f8eff904677bbd79439b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62027-missing-authorization-in-stellarwp--39d45c84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62027%3A%20Missing%20Authorization%20in%20StellarWP%20Event%20Tickets&amp;severity=medium&amp;id=68f8eff904677bbd79439b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62025-deserialization-of-untrusted-data-i-a449fa84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62025%3A%20Deserialization%20of%20Untrusted%20Data%20in%20eyecix%20JobSearch&amp;severity=critical&amp;id=68f8eff904677bbd79439b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62024-improper-neutralization-of-input-du-69e593cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Jernigan%20Pie%20Calendar&amp;severity=medium&amp;id=68f8eff904677bbd79439b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62023-improper-control-of-generation-of-c-63f6b24b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62023%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=critical&amp;id=68f8eff904677bbd79439b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62021-missing-authorization-in-made-neat--bceff550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62021%3A%20Missing%20Authorization%20in%20Made%20Neat%20Acknowledgify&amp;severity=medium&amp;id=68f8eff904677bbd79439b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62020-improper-neutralization-of-input-du-0b83f449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=high&amp;id=68f8eff804677bbd79439b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62019-missing-authorization-in-wpzoom-rec-6ce7607d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62019%3A%20Missing%20Authorization%20in%20WPZOOM%20Recipe%20Card%20Blocks%20for%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=68f8eff804677bbd79439b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62015-improper-neutralization-of-special--641be62d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62015%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Josh%20Kohlbach%20Advanced%20Coupons%20for%20WooCommerce%20Coupons&amp;severity=high&amp;id=68f8eff804677bbd79439b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62013-missing-authorization-in-posimyth-u-f6c4199f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62013%3A%20Missing%20Authorization%20in%20POSIMYTH%20UiChemy&amp;severity=medium&amp;id=68f8eff804677bbd79439b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62009-cross-site-request-forgery-csrf-in--0870ef70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=medium&amp;id=68f8eff804677bbd79439b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62008-deserialization-of-untrusted-data-i-586fb42c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62008%3A%20Deserialization%20of%20Untrusted%20Data%20in%20acowebs%20Product%20Table%20For%20WooCommerce&amp;severity=high&amp;id=68f8eff804677bbd79439b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62007-incorrect-privilege-assignment-in-b-1ffe391e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62007%3A%20Incorrect%20Privilege%20Assignment%20in%20bPlugins%20Voice%20Feedback&amp;severity=high&amp;id=68f8eff804677bbd79439b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62006-missing-authorization-in-veronalabs-bdaee1ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62006%3A%20Missing%20Authorization%20in%20VeronaLabs%20WP%20SMS&amp;severity=medium&amp;id=68f8eff804677bbd79439b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62005-cross-site-request-forgery-csrf-in--ffccadcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=high&amp;id=68f8eff804677bbd79439b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60246-improper-neutralization-of-input-du-fc3f97d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weissmike%20Simple%20Finance%20Calculator&amp;severity=high&amp;id=68f8eff804677bbd79439afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60234-deserialization-of-untrusted-data-i-6d699473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60234%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Single%20Property&amp;severity=high&amp;id=68f8eff704677bbd79439add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60232-deserialization-of-untrusted-data-i-737799aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60232%3A%20Deserialization%20of%20Untrusted%20Data%20in%20quantumcloud%20KBx%20Pro%20Ultimate&amp;severity=critical&amp;id=68f8eff704677bbd79439ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60228-deserialization-of-untrusted-data-i-4e30c275</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60228%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Knowledge%20Base&amp;severity=high&amp;id=68f8eff704677bbd79439ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60227-improper-limitation-of-a-pathname-t-e83f99aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60227%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68f8eff704677bbd79439ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60226-deserialization-of-untrusted-data-i-4b790ea4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60226%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20White%20Rabbit&amp;severity=critical&amp;id=68f8eff704677bbd79439ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60225-deserialization-of-untrusted-data-i-734d4821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60225%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20BugsPatrol&amp;severity=critical&amp;id=68f8eff704677bbd79439ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60224-deserialization-of-untrusted-data-i-b2b6fc34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60224%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=critical&amp;id=68f8eff704677bbd79439acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60222-incorrect-privilege-assignment-in-f-a9928163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60222%3A%20Incorrect%20Privilege%20Assignment%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=high&amp;id=68f8eff704677bbd79439ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60221-deserialization-of-untrusted-data-i-c88e42ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60221%3A%20Deserialization%20of%20Untrusted%20Data%20in%20captivateaudio%20Captivate%20Sync&amp;severity=critical&amp;id=68f8eff704677bbd79439ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60220-incorrect-privilege-assignment-in-p-25a25ff6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60220%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXxL&amp;severity=critical&amp;id=68f8eff704677bbd79439ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60217-improper-limitation-of-a-pathname-t-e174702d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60217%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ypromo%20PT%20Luxa%20Addons&amp;severity=high&amp;id=68f8eff704677bbd79439ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60216-deserialization-of-untrusted-data-i-29aa4869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60216%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Addison&amp;severity=critical&amp;id=68f8eff604677bbd79439ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60215-deserialization-of-untrusted-data-i-33428adf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60215%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Kriya&amp;severity=high&amp;id=68f8eff604677bbd79439aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60214-deserialization-of-untrusted-data-i-bec92f6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60214%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Goldenblatt&amp;severity=critical&amp;id=68f8eff604677bbd79439aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60213-deserialization-of-untrusted-data-i-18b66c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60213%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Whitebox-Studio%20Scape&amp;severity=critical&amp;id=68f8eff604677bbd79439aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60212-deserialization-of-untrusted-data-i-f5c0d1fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60212%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20VEDA&amp;severity=high&amp;id=68f8eff604677bbd79439aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60211-incorrect-privilege-assignment-in-e-eae879b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60211%3A%20Incorrect%20Privilege%20Assignment%20in%20extendons%20WooCommerce%20Registration%20Fields%20Plugin%20-%20Custom%20Signup%20Fields&amp;severity=high&amp;id=68f8eff604677bbd79439aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60210-deserialization-of-untrusted-data-i-d23e97da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60210%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20-%20Frontend%20Listing&amp;severity=critical&amp;id=68f8eff604677bbd79439aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60209-deserialization-of-untrusted-data-i-60dfb540</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60209%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=critical&amp;id=68f8eff604677bbd79439a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60208-cross-site-request-forgery-csrf-in--b1e897f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60208%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tusko%20Trush%20Advanced%20Custom%20Fields%20%3A%20CPT%20Options%20Pages&amp;severity=high&amp;id=68f8eff604677bbd79439a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60206-improper-control-of-generation-of-c-8a470208</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60206%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=critical&amp;id=68f8eff504677bbd79439a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60176-improper-neutralization-of-input-du-560283f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tattersoftware%20WP%20Tesseract&amp;severity=medium&amp;id=68f8eff504677bbd79439a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60168-cross-site-request-forgery-csrf-in--a5ff62e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60168%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20integrationshotelrunner%20HotelRunner%20Booking%20Widget&amp;severity=high&amp;id=68f8eff504677bbd79439a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60151-url-redirection-to-untrusted-site-o-98fbb7c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60151%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20HubSpot&amp;severity=medium&amp;id=68f8eff504677bbd79439a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60135-improper-neutralization-of-input-du-b79fb6be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NIKITAS%20GEORGOPOULOS%20WeShare%20Buttons&amp;severity=medium&amp;id=68f8eff504677bbd79439a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60134-cross-site-request-forgery-csrf-in--747e8722</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60134%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20James%20Jacoby%20WP%20Media%20Categories&amp;severity=medium&amp;id=68f8eff504677bbd79439a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60132-cross-site-request-forgery-csrf-in--cf852300</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60132%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20johnh10%20Video%20Blogster%20Lite&amp;severity=medium&amp;id=68f8eff504677bbd79439a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60131-improper-neutralization-of-input-du-8b8fd21d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoefff%20Werk%20aan%20de%20Muur&amp;severity=medium&amp;id=68f8eff504677bbd79439a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60041-authentication-bypass-using-an-alte-6f36d74f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60041%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Iulia%20Cazan%20Emails%20Catch%20All&amp;severity=high&amp;id=68f8eff504677bbd79439a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60039-deserialization-of-untrusted-data-i-4c1d5b78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60039%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Noisa&amp;severity=critical&amp;id=68f8eff504677bbd79439a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59593-improper-neutralization-of-input-du-d4374129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=68f8eff504677bbd79439a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59580-incorrect-privilege-assignment-in-g-7e1e998e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59580%3A%20Incorrect%20Privilege%20Assignment%20in%20GoodLayers%20Goodlayers%20Core&amp;severity=high&amp;id=68f8eff504677bbd79439a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59579-insertion-of-sensitive-information--39dc72d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59579%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20PressTigers%20Simple%20Job%20Board&amp;severity=high&amp;id=68f8eff504677bbd79439a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59578-insertion-of-sensitive-information--4454a299</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59578%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpdesk%20ShopMagic&amp;severity=medium&amp;id=68f8eff504677bbd79439a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59575-exposure-of-sensitive-system-inform-a06d3e28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59575%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=medium&amp;id=68f8eff504677bbd79439a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59571-improper-neutralization-of-input-du-4fddcaae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purethemes%20WorkScout-Core&amp;severity=high&amp;id=68f8eff504677bbd79439a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59566-improper-limitation-of-a-pathname-t-1c1c7035</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Workreap%20(theme&apos;s%20plugin)&amp;severity=high&amp;id=68f8eff504677bbd79439a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59564-improper-control-of-filename-for-in-72ae8ff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59564%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall&amp;severity=high&amp;id=68f8eff504677bbd79439a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59558-improper-control-of-filename-for-in-a5b12f45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59558%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Billey&amp;severity=high&amp;id=68f8eff504677bbd79439a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59557-improper-neutralization-of-special--ebf4aeec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59557%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThemeMove%20Learts%20Addons&amp;severity=critical&amp;id=68f8eff504677bbd79439a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59555-improper-control-of-filename-for-in-ea0b42a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59555%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Medizin&amp;severity=high&amp;id=68f8eff404677bbd79439a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59550-improper-control-of-filename-for-in-6eecd681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59550%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Xcare&amp;severity=high&amp;id=68f8eff404677bbd79439a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59007-deserialization-of-untrusted-data-i-bb9a1ace</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59007%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themesflat%20TF%20Woo%20Product%20Grid%20Addon%20For%20Elementor&amp;severity=high&amp;id=68f8eff404677bbd79439a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59006-improper-neutralization-of-input-du-b2084ec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Easy%20Woocommerce%20Customizer&amp;severity=high&amp;id=68f8eff404677bbd79439a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59004-improper-neutralization-of-input-du-754b6123</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59004%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pco_58%20WC%20Return%20products&amp;severity=high&amp;id=68f8eff404677bbd79439a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58971-improper-neutralization-of-input-du-f52360c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AmentoTech%20Doctreat&amp;severity=high&amp;id=68f8eff404677bbd79439a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58970-improper-neutralization-of-script-r-aa41ace7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58970%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20AmentoTech%20Doctreat&amp;severity=medium&amp;id=68f8eff404677bbd79439a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58967-improper-control-of-filename-for-in-2d511584</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58967%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Businext&amp;severity=high&amp;id=68f8eff404677bbd79439a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58966-improper-neutralization-of-input-du-ad8823f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms%20LITE&amp;severity=high&amp;id=68f8eff404677bbd79439a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58963-unrestricted-upload-of-file-with-da-ce45f313</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58963%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%207oroof%20Medcity&amp;severity=critical&amp;id=68f8eff404677bbd79439a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58961-improper-neutralization-of-input-du-8aa7fc2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58961%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20CF7%20Auto%20Responder%20Addon&amp;severity=high&amp;id=68f8eff304677bbd794399f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58959-improper-limitation-of-a-pathname-t-b486dca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58959%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AmentoTech%20Taskbot&amp;severity=high&amp;id=68f8eff304677bbd794399f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58958-improper-control-of-filename-for-in-9d8f14a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58958%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20SmilePure&amp;severity=high&amp;id=68f8eff304677bbd794399f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58955-improper-control-of-filename-for-in-b73f9a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58955%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designervily%20Karzo&amp;severity=high&amp;id=68f8eff304677bbd794399ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58921-improper-neutralization-of-input-du-cbfa2bc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arevico%20WP%20Tactical%20Popup&amp;severity=high&amp;id=68f8eff304677bbd794399ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58916-improper-neutralization-of-input-du-07031c09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Munzir%20Author%3A%20Munzir&amp;severity=high&amp;id=68f8eff304677bbd794399e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53428-incorrect-privilege-assignment-in-n-686b2067</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53428%3A%20Incorrect%20Privilege%20Assignment%20in%20N-Media%20Simple%20User%20Registration&amp;severity=high&amp;id=68f8eff304677bbd794399e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53427-improper-neutralization-of-input-du-3fadf8ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chibueze%20Okechukwu%20SEO%20Pyramid&amp;severity=high&amp;id=68f8eff304677bbd794399e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53426-improper-neutralization-of-input-du-b2fb78f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Likert%20Survey%20Master&amp;severity=high&amp;id=68f8eff304677bbd794399dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53425-incorrect-privilege-assignment-in-d-035f710b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53425%3A%20Incorrect%20Privilege%20Assignment%20in%20Dokan%2C%20Inc.%20Dokan&amp;severity=high&amp;id=68f8eff204677bbd794399c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53424-missing-authorization-in-vanquish-w-d912d86e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53424%3A%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=medium&amp;id=68f8eff204677bbd794399c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53423-improper-neutralization-of-input-du-c172c180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53423%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Triss&amp;severity=high&amp;id=68f8eff204677bbd794399bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53422-improper-neutralization-of-input-du-fafb5e41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeWarriors%20WhatsApp%20Chat%20for%20WordPress%20and%20WooCommerce&amp;severity=high&amp;id=68f8eff204677bbd794399bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53421-missing-authorization-in-pickplugin-ef4c9d02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53421%3A%20Missing%20Authorization%20in%20PickPlugins%20Accordion&amp;severity=medium&amp;id=68f8eff204677bbd794399b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53420-improper-neutralization-of-input-du-54c61171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=68f8eff204677bbd794399b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53352-improper-neutralization-of-input-du-aa25bf29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20G5Theme%20Grid%20Plus&amp;severity=high&amp;id=68f8eff204677bbd794399b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53351-improper-neutralization-of-input-du-cab0b1c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fidelo%20Software%20GmbH%20Fidelo%20Snippet&amp;severity=high&amp;id=68f8eff204677bbd794399b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53350-improper-neutralization-of-input-du-68cac151</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webjunk%20Calendar%20Plus&amp;severity=high&amp;id=68f8eff204677bbd794399ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53297-improper-neutralization-of-input-du-d199680b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA-Team%20Woocommerce%20Envato%20Affiliates&amp;severity=high&amp;id=68f8eff204677bbd794399aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53238-improper-neutralization-of-input-du-7d8e694b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Toast%20Plugins%20Toast%20Mobile%20Menu&amp;severity=high&amp;id=68f8eff104677bbd7943998b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53236-missing-authorization-in-andondesig-3b3f859c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53236%3A%20Missing%20Authorization%20in%20AndonDesign%20UDesign%20Core&amp;severity=medium&amp;id=68f8eff104677bbd79439986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53234-improper-neutralization-of-input-du-cb9a0aef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AndonDesign%20UDesign%20Core&amp;severity=high&amp;id=68f8eff104677bbd79439980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53232-insertion-of-sensitive-information--534d2652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53232%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20inkthemes%20WP%20Gmail%20SMTP&amp;severity=medium&amp;id=68f8eff104677bbd7943997c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53229-improper-neutralization-of-input-du-3af5f375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kamleshyadav%20RockON%20DJ&amp;severity=high&amp;id=68f8eff104677bbd79439979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53218-insertion-of-sensitive-information--8b47cc1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53218%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saad%20Iqbal%20AppExperts&amp;severity=medium&amp;id=68f8eff104677bbd79439976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52770-improper-neutralization-of-input-du-d1768e87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appscreo%20Hello%20Followers&amp;severity=high&amp;id=68f8eff104677bbd79439973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52763-improper-neutralization-of-input-du-9c93571a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52763%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NickDuncan%20Nifty%20Backups&amp;severity=high&amp;id=68f8eff104677bbd79439970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52760-improper-neutralization-of-input-du-4b541149</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Globalis%20MultiSite%20Clone%20Duplicator&amp;severity=medium&amp;id=68f8eff104677bbd7943996d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52758-unrestricted-upload-of-file-with-da-8df40abc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52758%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Gesundheit%20Bewegt%20GmbH%20Zippy&amp;severity=critical&amp;id=68f8eff104677bbd7943996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52757-missing-authorization-in-fantasticp-59fb877c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52757%3A%20Missing%20Authorization%20in%20FantasticPlugins%20SUMO%20Memberships%20for%20WooCommerce&amp;severity=medium&amp;id=68f8eff004677bbd79439914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52756-improper-control-of-generation-of-c-e09b0395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52756%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Sayan%20Datta%20WP%20Last%20Modified%20Info&amp;severity=high&amp;id=68f8eff004677bbd79439911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52755-improper-neutralization-of-input-du-8eb9640e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Child%20Themes&amp;severity=high&amp;id=68f8eff004677bbd7943990e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52754-improper-neutralization-of-input-du-2b6d6d39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20selloio%20Sello%20ChannelConnector&amp;severity=high&amp;id=68f8eff004677bbd7943990b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52753-improper-neutralization-of-input-du-c7c36ddb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52753%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsystic%20Contact%20Form%20by%20Supsystic&amp;severity=high&amp;id=68f8eff004677bbd79439908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52752-exposure-of-sensitive-system-inform-0ae7caa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52752%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ThemeAtelier%20IDonatePro&amp;severity=medium&amp;id=68f8eff004677bbd79439905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52751-improper-neutralization-of-input-du-624fb37e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colome%20Slide%20Puzzle&amp;severity=high&amp;id=68f8eff004677bbd79439902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52750-improper-neutralization-of-input-du-c8e8f0f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Juergen%20Schulze%20Emu2&amp;severity=high&amp;id=68f8eff004677bbd794398ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52749-improper-neutralization-of-input-du-11410a9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Activity%20Track%20Uji%20Countdown&amp;severity=high&amp;id=68f8eff004677bbd794398fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52748-improper-neutralization-of-input-du-74beab4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Directory%20Pro&amp;severity=high&amp;id=68f8eff004677bbd794398f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52743-improper-neutralization-of-input-du-a98fa698</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik-privacy-policy&amp;severity=high&amp;id=68f8efef04677bbd794398de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52742-improper-neutralization-of-input-du-cf7d3e2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Igor%20Benic%20Pets&amp;severity=high&amp;id=68f8efef04677bbd794398db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52741-improper-neutralization-of-input-du-5ff8ee78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Barry%20Kooij%20Post%20Connector&amp;severity=high&amp;id=68f8efef04677bbd794398d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52740-deserialization-of-untrusted-data-i-859dc604</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52740%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hernan%20Villanueva%20Boldermail&amp;severity=high&amp;id=68f8efef04677bbd794398d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52738-missing-authorization-in-wikimedia--42d19275</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52738%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Wikipedia%20Preview&amp;severity=medium&amp;id=68f8efef04677bbd794398d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52737-deserialization-of-untrusted-data-i-ad67f52a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52737%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Tijmen%20Smit%20WP%20Store%20Locator&amp;severity=high&amp;id=68f8efef04677bbd794398cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52736-improper-neutralization-of-input-du-9251d9a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daman%20Jeet%20Finale%20Lite&amp;severity=high&amp;id=68f8efef04677bbd794398cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52735-improper-neutralization-of-input-du-5c13a3e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XLPlugins%20NextMove%20Lite&amp;severity=medium&amp;id=68f8efef04677bbd794398c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52734-improper-neutralization-of-input-du-e7699294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ERA404%20CropRefine&amp;severity=medium&amp;id=68f8efef04677bbd794398c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49992-improper-neutralization-of-input-du-86be53f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20LearnPress%20Export%20Import&amp;severity=high&amp;id=68f8efef04677bbd794398c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49963-improper-neutralization-of-input-du-51d17239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20growniche%20Simple%20Stripe%20Checkout&amp;severity=high&amp;id=68f8efee04677bbd794398b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49962-improper-neutralization-of-input-du-2e913cda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20useStrict%20bbPress%20Notify&amp;severity=high&amp;id=68f8efee04677bbd794398b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49961-missing-authorization-in-breeze-tea-1a897630</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49961%3A%20Missing%20Authorization%20in%20Breeze%20Team%20Breeze%20Checkout&amp;severity=medium&amp;id=68f8efee04677bbd794398b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49960-improper-neutralization-of-input-du-2e35fbed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leadbi%20LeadBI%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68f8efee04677bbd794398ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49959-improper-neutralization-of-input-du-cc9a7f5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pascal%20Casier%20bbPress%20Move%20Topics&amp;severity=high&amp;id=68f8efee04677bbd794398aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49958-improper-neutralization-of-input-du-61bd81ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49958%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robokassa%20Robokassa%20payment%20gateway%20for%20Woocommerce&amp;severity=high&amp;id=68f8efee04677bbd794398a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49957-improper-neutralization-of-input-du-c6e72013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weboccult%20Technologies%20Pvt%20Ltd%20Email%20Attachment%20by%20Order%20Status%20%26amp%3B%20Products&amp;severity=high&amp;id=68f8efee04677bbd794398a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49956-improper-neutralization-of-input-du-7e8c3887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anandaraj%20Balu%20Fade%20Slider&amp;severity=high&amp;id=68f8efee04677bbd794398a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49955-improper-neutralization-of-input-du-d930fbf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rajan%20Vijayan%20WP%20Smart%20Flexslider&amp;severity=high&amp;id=68f8efee04677bbd7943989e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49954-improper-neutralization-of-input-du-c336736f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mithra62%20WP-Click-Tracker&amp;severity=high&amp;id=68f8efee04677bbd7943989b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49953-improper-neutralization-of-input-du-bbcc9968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49953%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeinity%20ShareBang%2C%20Ultimate%20Social%20Share%20Buttons%20for%20WordPress&amp;severity=high&amp;id=68f8efed04677bbd7943988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49952-authorization-bypass-through-user-c-c9d3c1cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49952%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=68f8efed04677bbd7943988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49951-improper-neutralization-of-input-du-4642d16a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcrunch%20gAppointments&amp;severity=high&amp;id=68f8efed04677bbd79439888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49950-missing-authorization-in-billingo-o-2b00827d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49950%3A%20Missing%20Authorization%20in%20billingo%20Official%20Integration%20for%20Billingo&amp;severity=high&amp;id=68f8efed04677bbd79439885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49948-improper-neutralization-of-input-du-5d9b8be6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ahmad%20Awais%20WP%20Super%20Edit&amp;severity=high&amp;id=68f8efed04677bbd79439882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49947-improper-neutralization-of-input-du-385dd9eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendons%20WooCommerce%20Registration%20Fields%20Plugin%20-%20Custom%20Signup%20Fields&amp;severity=high&amp;id=68f8efed04677bbd7943987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49946-improper-neutralization-of-input-du-91d74910</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49946%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cynob%20IT%20Consultancy%20Auto%20Login%20After%20Registration&amp;severity=high&amp;id=68f8efed04677bbd7943987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49945-improper-neutralization-of-input-du-b81828b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kylegetson%20Shortcode%20Generator&amp;severity=high&amp;id=68f8efed04677bbd79439879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49944-improper-neutralization-of-input-du-3f8c8501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49944%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonatan%20Jumbert%20WPCode%20Content%20Ratio&amp;severity=high&amp;id=68f8efed04677bbd79439876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49940-improper-neutralization-of-input-du-2a97d50d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Fusion%20Builder&amp;severity=medium&amp;id=68f8efed04677bbd79439873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49939-improper-neutralization-of-input-du-10c3d3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=medium&amp;id=68f8efec04677bbd79439866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49938-improper-neutralization-of-input-du-163a04a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=medium&amp;id=68f8efec04677bbd79439863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49937-missing-authorization-in-syed-balkh-a18e95c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49937%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Smash%20Balloon%20Social%20Post%20Feed&amp;severity=medium&amp;id=68f8efec04677bbd79439860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49936-improper-neutralization-of-input-du-ee6fe639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xtemos%20WoodMart&amp;severity=medium&amp;id=68f8efec04677bbd7943985d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49935-improper-control-of-filename-for-in-ad009b1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49935%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xtemos%20WoodMart&amp;severity=high&amp;id=68f8efec04677bbd7943985a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49934-improper-neutralization-of-input-du-c4483961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=medium&amp;id=68f8efec04677bbd79439857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49933-improper-neutralization-of-input-du-8752728d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=68f8efec04677bbd79439854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49932-improper-neutralization-of-input-du-7d03d48d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=medium&amp;id=68f8efec04677bbd79439851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49931-improper-neutralization-of-special--7c8c04d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49931%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=critical&amp;id=68f8efec04677bbd7943984e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49930-improper-neutralization-of-input-du-ffcbefe0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=high&amp;id=68f8efec04677bbd7943984b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49928-improper-neutralization-of-input-du-e836b6c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=medium&amp;id=68f8efeb04677bbd7943980f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49927-improper-neutralization-of-input-du-a41c8da2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=medium&amp;id=68f8efeb04677bbd7943980c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49926-improper-control-of-generation-of-c-6ab5318e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49926%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Laborator%20Kalium&amp;severity=high&amp;id=68f8efeb04677bbd79439809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49925-missing-authorization-in-vibethemes-374fe6bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49925%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=high&amp;id=68f8efeb04677bbd79439806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49924-incorrect-privilege-assignment-in-j-44791b6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49924%3A%20Incorrect%20Privilege%20Assignment%20in%20Josh%20Kohlbach%20Wholesale%20Suite&amp;severity=high&amp;id=68f8efeb04677bbd79439803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49923-improper-neutralization-of-input-du-5e6ba82f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=68f8efeb04677bbd79439800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49922-missing-authorization-in-etruel-wpe-62eb03bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49922%3A%20Missing%20Authorization%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=68f8efeb04677bbd794397fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49921-improper-control-of-filename-for-in-d8712cec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49921%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetReviews&amp;severity=high&amp;id=68f8efeb04677bbd794397fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49920-missing-authorization-in-accessibe--b6933120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49920%3A%20Missing%20Authorization%20in%20accessiBe%20Web%20Accessibility%20By%20accessiBe&amp;severity=medium&amp;id=68f8efeb04677bbd794397f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49917-server-side-request-forgery-ssrf-in-dcad35dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49917%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Icegram%20Icegram%20Express%20Pro&amp;severity=medium&amp;id=68f8efeb04677bbd794397f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49915-improper-neutralization-of-special--d10a9e1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49915%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=critical&amp;id=68f8efea04677bbd794397c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49912-improper-neutralization-of-input-du-e2b9c72a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nks%20Email%20Subscription%20Popup&amp;severity=medium&amp;id=68f8efea04677bbd794397c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49911-improper-neutralization-of-input-du-3a3a3282</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpinstinct%20WooCommerce%20Vehicle%20Parts%20Finder&amp;severity=high&amp;id=68f8efea04677bbd794397c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49910-missing-authorization-in-amentotech-7ee4ab94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49910%3A%20Missing%20Authorization%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=high&amp;id=68f8efea04677bbd794397be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49908-improper-neutralization-of-input-du-20369c20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPClever%20WPC%20Countdown%20Timer%20for%20WooCommerce&amp;severity=medium&amp;id=68f8efea04677bbd794397bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49907-missing-authorization-in-realmag777-7d293354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49907%3A%20Missing%20Authorization%20in%20RealMag777%20MDTF&amp;severity=medium&amp;id=68f8efea04677bbd794397b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49906-missing-authorization-in-stellarwp--370654d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49906%3A%20Missing%20Authorization%20in%20StellarWP%20WPComplete&amp;severity=medium&amp;id=68f8efea04677bbd794397b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49903-missing-authorization-in-bdthemes-z-858fe8db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49903%3A%20Missing%20Authorization%20in%20bdthemes%20ZoloBlocks&amp;severity=medium&amp;id=68f8efea04677bbd794397b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49901-authentication-bypass-using-an-alte-000d706e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49901%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=critical&amp;id=68f8efea04677bbd794397af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49899-missing-authorization-in-jjlemstra--b655d126</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49899%3A%20Missing%20Authorization%20in%20jjlemstra%20Whydonate&amp;severity=medium&amp;id=68f8efea04677bbd794397ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49380-deserialization-of-untrusted-data-i-3f8f7dbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49380%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpinstinct%20WooCommerce%20Vehicle%20Parts%20Finder&amp;severity=medium&amp;id=68f8efe904677bbd79439797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49378-improper-neutralization-of-special--a71edfd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49378%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=68f8efe904677bbd79439794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49377-missing-authorization-in-themefic-h-dd934b94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49377%3A%20Missing%20Authorization%20in%20Themefic%20Hydra%20Booking&amp;severity=high&amp;id=68f8efe904677bbd79439791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49376-missing-authorization-in-delucks-de-b0acff8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49376%3A%20Missing%20Authorization%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=high&amp;id=68f8efe904677bbd7943978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49060-unrestricted-upload-of-file-with-da-63678d3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49060%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CMSSuperHeroes%20Wastia&amp;severity=critical&amp;id=68f8efe904677bbd7943978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48338-improper-control-of-filename-for-in-d7195aa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48338%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=high&amp;id=68f8efe904677bbd79439788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48106-unrestricted-upload-of-file-with-da-d250c5bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48106%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CMSSuperHeroes%20Clanora&amp;severity=critical&amp;id=68f8efe904677bbd79439785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48099-cross-site-request-forgery-csrf-in--dcb2be1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48099%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Code%20Amp%20Search%20%26%20Filter&amp;severity=medium&amp;id=68f8efe904677bbd79439782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48098-improper-neutralization-of-input-du-e36f9886</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=high&amp;id=68f8efe904677bbd7943977f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48097-improper-neutralization-of-input-du-8f37fe32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiva%20WSAnalytics&amp;severity=high&amp;id=68f8efe904677bbd7943977c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48096-missing-authorization-in-freshface--234f5c42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48096%3A%20Missing%20Authorization%20in%20FRESHFACE%20Custom%20CSS&amp;severity=medium&amp;id=68f8efe804677bbd79439745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48095-improper-neutralization-of-input-du-5bbabecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=medium&amp;id=68f8efe804677bbd79439742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48093-improper-neutralization-of-input-du-9fcbae2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Calvaweb%20Password%20only%20login&amp;severity=high&amp;id=68f8efe804677bbd7943973f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48092-improper-neutralization-of-input-du-f9734beb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jurajpuchky%20Fix%20Multiple%20Redirects&amp;severity=high&amp;id=68f8efe804677bbd7943973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48091-improper-neutralization-of-special--3ffc37ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48091%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alexander%20AnyComment&amp;severity=high&amp;id=68f8efe804677bbd79439739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39534-improper-neutralization-of-input-du-b54ccadc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Somonator%20Terms%20Dictionary&amp;severity=high&amp;id=68f8efe804677bbd79439736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32657-improper-control-of-filename-for-in-b0708ff2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32657%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Testimonial%20Slider%20And%20Showcase%20Pro&amp;severity=high&amp;id=68f8efe804677bbd79439733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32283-deserialization-of-untrusted-data-i-db727760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32283%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Solar%20Energy&amp;severity=high&amp;id=68f8efe804677bbd79439730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31634-deserialization-of-untrusted-data-i-1a7fcecf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31634%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Insurance&amp;severity=high&amp;id=68f8efe804677bbd7943972d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30944-missing-authorization-in-essekia-ta-3d1778e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30944%3A%20Missing%20Authorization%20in%20Essekia%20Tablesome%20Table%20Premium&amp;severity=high&amp;id=68f8efe804677bbd7943972a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57870-cwe-89-improper-neutralization-of-s-52468760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57870%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=critical&amp;id=68f8eff304677bbd794399e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webctrlcgiblue-angel-software-suite-exploit-attemp-2639e953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=webctrl.cgi%2FBlue%20Angel%20Software%20Suite%20Exploit%20Attempts.%20Maybe%20CVE-2025-34033%20Variant%26%23x3f%3B%2C%20(Wed%2C%20Oct%2022nd)&amp;severity=medium&amp;id=68f9856a93bcde9f320d1cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/socgholish-malware-using-compromised-sites-and-fak-b6ee9fd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SocGholish%20Malware%20Using%20Compromised%20Sites%20and%20Fake%20Software%20Updates%20to%20Deliver%20Ransomware&amp;severity=medium&amp;id=68f8e7f537b5c18bc8279a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-pivots-cracks-down-on-low-level-hackers-b5e786d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Pivots%2C%20Cracks%20Down%20on%20Resident%20Hackers&amp;severity=medium&amp;id=68f8e46737b5c18bc8200478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-path-traversal-to-supply-chain-compromise-bre-161bc713</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Path%20Traversal%20to%20Supply%20Chain%20Compromise%3A%20Breaking%20MCP%20Server%20Hosting&amp;severity=medium&amp;id=68f8e49737b5c18bc820e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8848-cwe-94-improper-control-of-generatio-ec36af05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8848%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68f8e49237b5c18bc820c5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerabilities-patched-in-tp-links-omada-9fdedc17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerabilities%20Patched%20in%20TP-Link%E2%80%99s%20Omada%20Gateways&amp;severity=critical&amp;id=68f8e01d2e6b0a7b0dd18d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-targets-100-gov-entities-in-mea-with-ph-9e431c60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Targets%20100%2B%20Gov%20Entities%20in%20MEA%20With%20Phoenix%20Backdoor&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11844-cwe-643-improper-neutralization-of--02fb03fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11844%3A%20CWE-643%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20in%20huggingface%20huggingface%2Fsmolagents&amp;severity=medium&amp;id=68f8dca32e6b0a7b0dc9bfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11750-cwe-544-missing-standardized-error--569abda6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11750%3A%20CWE-544%20Missing%20Standardized%20Error%20Handling%20Mechanism%20in%20langgenius%20langgenius%2Fdify&amp;severity=medium&amp;id=68f8dca32e6b0a7b0dc9bfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-actors-exploit-toolshell-sharepoint-2f425f77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Actors%20Exploit%20ToolShell%20SharePoint%20Flaw%20Weeks%20After%20Microsoft&apos;s%20July%20Patch&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-security-paradox-of-local-llms-f614d401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20security%20paradox%20of%20local%20LLMs&amp;severity=medium&amp;id=68f8d4ae79108345beae04be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-time-is-itx3f-accuracy-of-poolntporg-tue-oct--94972b3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20time%20is%20it%26%23x3f%3B%20Accuracy%20of%20pool.ntp.org.%2C%20(Tue%2C%20Oct%2021st)&amp;severity=medium&amp;id=68f78c23a08cdec9506cd8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11411-cwe-349-acceptance-of-extraneous-un-0a5bf447</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11411%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20NLnet%20Labs%20Unbound&amp;severity=medium&amp;id=68f8d2c779108345beab68dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt-switches-to-new-backdoor-after-malware-cd849e43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT%20Switches%20to%20New%20Backdoor%20After%20Malware%20Exposed%20by%20Researchers&amp;severity=medium&amp;id=68f8c847c46ffb59836826e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bridging-the-remediation-gap-introducing-pentera-r-0c2edfa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bridging%20the%20Remediation%20Gap%3A%20Introducing%20Pentera%20Resolve&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-nethereum-nuget-package-used-homoglyph-trick--1830795d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Nethereum%20NuGet%20Package%20Used%20Homoglyph%20Trick%20to%20Steal%20Crypto%20Wallet%20Keys&amp;severity=medium&amp;id=68f9831e93bcde9f320bfbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11086-cwe-269-improper-privilege-manageme-b9d4c655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11086%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20academylms%20Academy%20LMS%20Pro&amp;severity=high&amp;id=68f8c035f0152f21d78f1008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jingle-thief-inside-a-cloud-based-gift-card-fraud--edef2e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jingle%20Thief%3A%20Inside%20a%20Cloud-Based%20Gift%20Card%20Fraud%20Campaign&amp;severity=medium&amp;id=68f8efcd04677bbd79438542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fencing-and-pet-company-jewett-cameron-hit-by-rans-f657e0f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fencing%20and%20Pet%20Company%20Jewett-Cameron%20Hit%20by%20Ransomware&amp;severity=medium&amp;id=68f8c01bf0152f21d78f0166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-october-2025-patches-48725978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Releases%20October%202025%20Patches&amp;severity=critical&amp;id=68f8ac89d137066578396fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verizon-mobile-blindspot-leads-to-needless-data-br-cd23a84f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verizon%3A%20Mobile%20Blindspot%20Leads%20to%20Needless%20Data%20Breaches&amp;severity=medium&amp;id=68f8ac7bd137066578390b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-you-should-swap-passwords-for-passphrases-f2cffa3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20You%20Should%20Swap%20Passwords%20for%20Passphrases&amp;severity=low&amp;id=68f9831e93bcde9f320bfbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6833-cwe-639-authorization-bypass-through-b45949b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6833%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=68f8a807ce3bbdd80f3596fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-34-zero-days-on-first-day-of-pwn2o-495657af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%2034%20zero-days%20on%20first%20day%20of%20Pwn2Own%20Ireland&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-windsurf-ides-riddled-with-94-n-day-chromiu-bb4d731d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%2C%20Windsurf%20IDEs%20riddled%20with%2094%2B%20n-day%20Chromium%20vulnerabilities&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vidar-stealer-20-adds-multi-threaded-data-theft-be-44957d78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vidar%20Stealer%202.0%20adds%20multi-threaded%20data%20theft%2C%20better%20evasion&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-four-omada-gateway-flaws-two-allow-2c9a85fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Four%20Omada%20Gateway%20Flaws%2C%20Two%20Allow%20Remote%20Code%20Execution&amp;severity=high&amp;id=68f8a479ce3bbdd80f2cd00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11915-cwe-444-inconsistent-interpretation-3cf55591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11915%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Google%20Cloud%20Vertex%20AI%3A%20Partner%20Models%20for%20MaaS&amp;severity=medium&amp;id=68f8a4c3ce3bbdd80f2df544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-identify-passiveneuron-apt-using-neurs-760e4c0b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Identify%20PassiveNeuron%20APT%20Using%20Neursite%20and%20NeuralExecutor%20Malware&amp;severity=medium&amp;id=68f89fcadd2148b88894b0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11825-cwe-79-improper-neutralization-of-i-addd1d96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pedrolaxe%20Playerzbr&amp;severity=medium&amp;id=68f897b0d59611fbd969791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10047-cwe-89-improper-neutralization-of-s-5301ca8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10047%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pmbaldha%20Email%20Tracker%20%E2%80%93%20Email%20Log%2C%20Email%20Open%20Tracking%2C%20Email%20Analytics%20%26%20Email%20Management%20for%20WordPress%20Emails&amp;severity=medium&amp;id=68f897afd59611fbd96978c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11883-cwe-79-improper-neutralization-of-i-d49195b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rene-puchinger%20Responsive%20Progress%20Bar&amp;severity=medium&amp;id=68f897b2d59611fbd9697951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11817-cwe-79-improper-neutralization-of-i-309453ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garyhukkeri%20Simple%20Tableau%20Viz&amp;severity=medium&amp;id=68f897afd59611fbd96978ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11870-cwe-79-improper-neutralization-of-i-1992682f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dmbarber%20Simple%20Business%20Data&amp;severity=medium&amp;id=68f897b1d59611fbd9697935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11867-cwe-79-improper-neutralization-of-i-116e6ce2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vbog%20Bg%20Book%20Publisher&amp;severity=medium&amp;id=68f897b1d59611fbd9697931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11819-cwe-79-improper-neutralization-of-i-c43438f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robocasters%20WP-Thumbnail&amp;severity=medium&amp;id=68f897b0d59611fbd9697911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11824-cwe-79-improper-neutralization-of-i-b8722ee3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madebycinza%20Cinza%20Grid&amp;severity=medium&amp;id=68f897b0d59611fbd9697916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11866-cwe-79-improper-neutralization-of-i-0f7bab03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aurelienpierre%20Photographers%20galleries&amp;severity=medium&amp;id=68f897b1d59611fbd969792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11830-cwe-79-improper-neutralization-of-i-b93f8d94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdrift%20WP%20Restaurant%20Listings&amp;severity=medium&amp;id=68f897b0d59611fbd9697925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11880-cwe-79-improper-neutralization-of-i-fb7f3806</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sierramike%20SM%20CountDown%20Widget&amp;severity=medium&amp;id=68f897b2d59611fbd969794d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11811-cwe-79-improper-neutralization-of-i-afa3d0bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewmarichiba%20Simple%20Youtube%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11813-cwe-79-improper-neutralization-of-i-3f34769a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressmaninc%20Responsive%20iframe%20GoogleMap&amp;severity=medium&amp;id=68f897afd59611fbd96978e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11810-cwe-79-improper-neutralization-of-i-07b6ecfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrishurst%20Name%3A%20Print%20Button%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11818-cwe-79-improper-neutralization-of-i-e96e787d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vobi%20WP%20Responsive%20Meet%20The%20Team&amp;severity=medium&amp;id=68f897afd59611fbd96978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11807-cwe-79-improper-neutralization-of-i-beb4491c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrgeorgegray%20Mixlr%20Shortcode&amp;severity=medium&amp;id=68f897afd59611fbd96978d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10138-cwe-79-improper-neutralization-of-i-e406bfc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrex84%20This-or-That&amp;severity=medium&amp;id=68f897afd59611fbd96978cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11827-cwe-79-improper-neutralization-of-i-969cfe2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oboxgroup%20Oboxmedia%20Ads&amp;severity=medium&amp;id=68f897b0d59611fbd9697920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11878-cwe-79-improper-neutralization-of-i-5ffa44ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beautifultemplates%20ST%20Categories%20Widget&amp;severity=medium&amp;id=68f897b2d59611fbd9697949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11809-cwe-79-improper-neutralization-of-i-fa1d556d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nazakatali32%20WP-Force%20Images%20Download&amp;severity=medium&amp;id=68f897afd59611fbd96978db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11872-cwe-79-improper-neutralization-of-i-1e25f405</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mcostales84%20Material%20Design%20Iconic%20Font%20Integration&amp;severity=medium&amp;id=68f897b1d59611fbd9697939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11804-cwe-79-improper-neutralization-of-i-ebfcd22a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobair%20JB%20News%20Ticker&amp;severity=medium&amp;id=68f897afd59611fbd96978d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11834-cwe-79-improper-neutralization-of-i-3544d69c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wiellyam%20WP%20AD%20Gallery&amp;severity=medium&amp;id=68f897b0d59611fbd9697929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11952-cwe-79-improper-neutralization-of-i-f1429ea3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11952%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Oct8ne%20Chatbot&amp;severity=medium&amp;id=68f897b2d59611fbd9697956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41110-cwe-287-improper-authentication-in--cc8ecdda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41110%3A%20CWE-287%20Improper%20Authentication%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=high&amp;id=68f8942bd59611fbd95e6918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41109-cwe-798-use-of-hard-coded-credentia-49266820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41109%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=high&amp;id=68f8942ad59611fbd95e690a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41108-cwe-287-improper-authentication-in--fef464fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41108%3A%20CWE-287%20Improper%20Authentication%20in%20Ghost%20Robotics%20Vision%2060&amp;severity=critical&amp;id=68f89429d59611fbd95e68ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-earn-over-520000-on-first-day-of-pwn2own-i-95252bc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Earn%20Over%20%24520%2C000%20on%20First%20Day%20of%20Pwn2Own%20Ireland%202025&amp;severity=medium&amp;id=68f88c10e21654ab74afd1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tarmageddon-flaw-in-async-tar-rust-library-could-e-e0b926a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TARmageddon%20Flaw%20in%20Async-Tar%20Rust%20Library%20Could%20Enable%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41724-cwe-239failure-to-handle-incomplete-f0cddbc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41724%3A%20CWE-239%3AFailure%20to%20Handle%20Incomplete%20Element%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f886d515c9ea51bb7190c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41723-cwe-35path-traversal-in-sauter-modu-7719e10e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41723%3A%20CWE-35%3APath%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=critical&amp;id=68f886d515c9ea51bb7190c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41722-cwe-798-use-of-hard-coded-credentia-bb25f452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41722%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f8835515c9ea51bb6854f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41721-cwe-77improper-neutralization-of-sp-5efa09b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41721%3A%20CWE-77%3AImproper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=low&amp;id=68f8835515c9ea51bb6854f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41720-cwe-646reliance-on-file-name-or-ext-dd42a7ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41720%3A%20CWE-646%3AReliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=medium&amp;id=68f8816c15c9ea51bb64fa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41719-cwe-1286improper-validation-of-synt-0718017a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41719%3A%20CWE-1286%3AImproper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Sauter%20modulo%206%20devices%20modu680-AS&amp;severity=high&amp;id=68f8816c15c9ea51bb64fa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10570-cwe-639-authorization-bypass-throug-4975db7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10570%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpdesk%20Flexible%20Refund%20and%20Return%20Order%20for%20WooCommerce&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12033-cwe-79-improper-neutralization-of-i-85567379</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12033%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rpetersen29%20Simple%20Banner%20%E2%80%93%20Easily%20add%20multiple%20Banners%2FBars%2FNotifications%2FAnnouncements%20to%20the%20top%20or%20bottom%20of%20your%20website&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10588-cwe-352-cross-site-request-forgery--ba016e8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixelyoursite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20%26%20API%20Manager&amp;severity=medium&amp;id=68f87dba01fe9fee6c20e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5983-cwe-601-url-redirection-to-untrusted-ea0a8fa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5983%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Meta%20Tag%20Manager&amp;severity=medium&amp;id=68f875a3431d95e35de16147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10638-cwe-862-missing-authorization-in-ns-b198ef91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10638%3A%20CWE-862%20Missing%20Authorization%20in%20NS%20Maintenance%20Mode%20for%20WP&amp;severity=medium&amp;id=68f875a3431d95e35de16144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unlocking-free-wifi-on-british-airways-2e558a3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unlocking%20free%20WiFi%20on%20British%20Airways&amp;severity=medium&amp;id=68f86e89431d95e35dd02a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10651-cwe-79-improper-neutralization-of-i-8f62059a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68f86dad5aedc7cf04246c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-patches-four-omada-gateway-flaws-two-allow-b15bc3da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20Patches%20Four%20Omada%20Gateway%20Flaws%2C%20Two%20Allow%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68f9831e93bcde9f320bfbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazilian-caminho-loader-employs-lsb-steganography-a13f600a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazilian%20Caminho%20Loader%20Employs%20LSB%20Steganography%20and%20Fileless%20Execution%20to%20Deliver%20Multiple%20Malware%20Families%20Across%20South%20America%2C%20Africa%2C%20and%20Eastern%20Europe&amp;severity=medium&amp;id=68f8c95f88c5cfbf96a22627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22167-path-traversal-arbitrary-readwrite--3042529d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22167%3A%20Path%20Traversal%20(Arbitrary%20Read%2FWrite)%20in%20Atlassian%20Jira%20Software%20Data%20Center&amp;severity=high&amp;id=68f8307187e9a01451ebf3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asian-nations-ramp-up-pressure-on-cybercrime-scam--feca4a4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asian%20Nations%20Ramp%20Up%20Pressure%20on%20Cybercrime%20&apos;Scam%20Factories&apos;&amp;severity=medium&amp;id=68f9841f93bcde9f320ce1e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-22-89aa788e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-22&amp;severity=medium&amp;id=68f97123a68f163431ee7400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60343-na-d54e1a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60343%3A%20n%2Fa&amp;severity=high&amp;id=68f91cdf2887d40ca3c19bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60342-na-5e09a8f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60342%3A%20n%2Fa&amp;severity=high&amp;id=68f91cdf2887d40ca3c19bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60341-na-e1d049da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60341%3A%20n%2Fa&amp;severity=high&amp;id=68f919682887d40ca3ba54fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60340-na-354723cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60340%3A%20n%2Fa&amp;severity=high&amp;id=68f915e12887d40ca3b4b713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60339-na-8888ea39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60339%3A%20n%2Fa&amp;severity=high&amp;id=68f915e12887d40ca3b4b710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60337-na-19eafbc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60337%3A%20n%2Fa&amp;severity=high&amp;id=68f91416519b403272390e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60336-na-a36c53f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60336%3A%20n%2Fa&amp;severity=high&amp;id=68f91416519b403272390e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60338-na-bb77ac72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60338%3A%20n%2Fa&amp;severity=high&amp;id=68f8fc246e01a0ac47db56a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60335-na-6889e0c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60335%3A%20n%2Fa&amp;severity=high&amp;id=68f8fa3f6e01a0ac47d8a3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60334-na-bbbddb20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60334%3A%20n%2Fa&amp;severity=high&amp;id=68f8f7aea2d588d2bde2ff37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60333-na-5477565e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60333%3A%20n%2Fa&amp;severity=high&amp;id=68f8f7aea2d588d2bde2ff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60331-na-58c93695</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60331%3A%20n%2Fa&amp;severity=high&amp;id=68f8f43ba2d588d2bddb93c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60332-na-3141d43f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60332%3A%20n%2Fa&amp;severity=high&amp;id=68f8f249a2d588d2bdd990e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56447-na-c35cb2a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56447%3A%20n%2Fa&amp;severity=critical&amp;id=68f8e80537b5c18bc8279b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61035-na-1d9ef3fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61035%3A%20n%2Fa&amp;severity=high&amp;id=68f8e49237b5c18bc820c5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58274-cwe-78-improper-neutralization-of-s-1a40631c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58274%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hikvision%20CSMP%20iSecure%20Center&amp;severity=high&amp;id=68f856df8c4621f9a336a1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53691-cwe-24-path-traversal-filedir-in-hi-882e1cf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53691%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Hikvision%20CSMP%20iSecure%20Center&amp;severity=high&amp;id=68f856df8c4621f9a336a1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62775-cwe-669-incorrect-resource-transfer-5bbba3c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62775%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Mercku%20M6a&amp;severity=high&amp;id=68f8501287e9a014511a9019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62774-cwe-331-insufficient-entropy-in-mer-e40dad61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62774%3A%20CWE-331%20Insufficient%20Entropy%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a9015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62773-cwe-912-hidden-functionality-in-mer-9436ca64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62773%3A%20CWE-912%20Hidden%20Functionality%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a9011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62772-cwe-305-authentication-bypass-by-pr-d4e2908c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62772%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Mercku%20M6a&amp;severity=low&amp;id=68f8501287e9a014511a900d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62771-cwe-352-cross-site-request-forgery--3cb7e8e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62771%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mercku%20M6a&amp;severity=high&amp;id=68f8501287e9a014511a9009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61756-easily-exploitable-vulnerability-al-1b5aaf76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61756%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f8144a6b1ace0f36b001a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casting-a-netty-for-bugs-and-catching-a-big-one-cv-7990ce9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casting%20a%20Net(ty)%20for%20Bugs%2C%20and%20Catching%20a%20Big%20One%20(CVE-2025-59419)&amp;severity=critical&amp;id=68f805f5061d6011e857c8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mirai-the-iot-botnet-9e031f8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mirai%3A%20The%20IoT%20Botnet&amp;severity=medium&amp;id=68f8941fd59611fbd95e412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tykit-analysis-new-phishing-kit-stealing-hundreds--d337919c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tykit%20Analysis%3A%20New%20Phishing%20Kit%20Stealing%20Hundreds%20of%20Microsoft%20Accounts%20in%20Finance&amp;severity=medium&amp;id=68f88fd4e21654ab74ba35c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electronic-warfare-puts-commercial-gps-users-on-no-388ae97f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electronic%20Warfare%20Puts%20Commercial%20GPS%20Users%20on%20Notice&amp;severity=medium&amp;id=68f8343e87e9a01451028aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62641-easily-exploitable-vulnerability-al-6f76e0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62641%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62592-easily-exploitable-vulnerability-al-b987be96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62592%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e97201721c03c6f13f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62591-easily-exploitable-vulnerability-al-1f43d916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62591%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e97201721c03c6f13f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62590-easily-exploitable-vulnerability-al-9c0015f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62590%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62589-easily-exploitable-vulnerability-al-5cc4d88c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62589%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62588-easily-exploitable-vulnerability-al-15f76695</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62588%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62587-easily-exploitable-vulnerability-al-a0bd34b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62587%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97201721c03c6f13f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62481-easily-exploitable-vulnerability-al-b3306be9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62481%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Marketing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Marketing.%20in%20Oracle%20Corporation%20Oracle%20Marketing&amp;severity=critical&amp;id=68f7e97201721c03c6f13f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62480-easily-exploitable-vulnerability-al-394250b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62480%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=68f7e97201721c03c6f13f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62479-easily-exploitable-vulnerability-al-8e7c5c9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62479%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=low&amp;id=68f7e97201721c03c6f13f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62478-easily-exploitable-vulnerability-al-ebbc8979</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62478%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62477-easily-exploitable-vulnerability-al-98f4948e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62477%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62476-easily-exploitable-vulnerability-al-f8c80c31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62476%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62475-easily-exploitable-vulnerability-al-39decc46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62475%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97201721c03c6f13f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62290-easily-exploitable-vulnerability-al-7f5d936a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62290%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=high&amp;id=68f7e97201721c03c6f13f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62289-easily-exploitable-vulnerability-al-f9475939</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62289%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e97101721c03c6f13eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62288-easily-exploitable-vulnerability-al-ed50aeb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62288%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Health%20Sciences%20Data%20Management%20Workbench&amp;severity=medium&amp;id=68f7e97101721c03c6f13eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62287-easily-exploitable-vulnerability-al-66ccdafe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Life%20Sciences%20InForm%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61885-easily-exploitable-vulnerability-al-1d05ec65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61885%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Life%20Sciences%20InForm.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Life%20Sciences%20InForm%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Life%20Sciences%20InForm&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61881-difficult-to-exploit-vulnerability--0d2ac84b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61881%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=68f7e97101721c03c6f13ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61764-easily-exploitable-vulnerability-al-c1cc7bee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61764%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=68f7e97101721c03c6f13edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61763-easily-exploitable-vulnerability-al-0acf5a24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61763%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Essbase.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Essbase%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Essbase%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Essbase&amp;severity=high&amp;id=68f7e97101721c03c6f13edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61762-easily-exploitable-vulnerability-al-775fe056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61762%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Payables.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20FIN%20Payables%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20FIN%20Payables%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20PeopleSoft%20Enterprise%20FIN%20Payables.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Payables&amp;severity=medium&amp;id=68f7e97101721c03c6f13ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61761-easily-exploitable-vulnerability-al-3b55b785</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61761%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20Maintenance%20Management&amp;severity=medium&amp;id=68f7e97101721c03c6f13ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61760-difficult-to-exploit-vulnerability--daf50cc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61760%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=68f7e97101721c03c6f13ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61759-easily-exploitable-vulnerability-al-ac23fe1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61759%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61758-easily-exploitable-vulnerability-al-0a1e2f57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61758%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20FIN%20IT%20Asset%20Management&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61757-easily-exploitable-vulnerability-al-e6a75922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61757%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Identity%20Manager.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Identity%20Manager.%20in%20Oracle%20Corporation%20Identity%20Manager&amp;severity=critical&amp;id=68f7e96f01721c03c6f13e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61755-difficult-to-exploit-vulnerability--b1890674</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61755%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GraalVM%20for%20JDK%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20GraalVM%20for%20JDK&amp;severity=low&amp;id=68f7e96f01721c03c6f13e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61754-easily-exploitable-vulnerability-al-d829e4f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61754%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20BI%20Publisher&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61753-easily-exploitable-vulnerability-al-dffe752c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61753%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Scripting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Scripting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Scripting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61752-easily-exploitable-vulnerability-al-02e1bf24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61752%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%2F2%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=68f7e96f01721c03c6f13e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61751-easily-exploitable-vulnerability-al-bc591457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61751%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f7e96f01721c03c6f13e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61750-easily-exploitable-vulnerability-al-28af73fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61750%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61749-easily-exploitable-vulnerability-al-d1eb9249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61749%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20DBA%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Unified%20Audit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Unified%20Audit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=68f7e96f01721c03c6f13e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61748-difficult-to-exploit-vulnerability--c47b1bb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61748%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=68f7e96f01721c03c6f13e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53072-easily-exploitable-vulnerability-al-1b560ecf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53072%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Marketing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Marketing.%20in%20Oracle%20Corporation%20Oracle%20Marketing&amp;severity=critical&amp;id=68f7e96f01721c03c6f13e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53071-easily-exploitable-vulnerability-al-aff75ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53071%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53070-easily-exploitable-vulnerability-al-7c44fa44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53070%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53069-easily-exploitable-vulnerability-al-6150c453</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53069%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53068-easily-exploitable-vulnerability-al-ad8604af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53068%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53067-easily-exploitable-vulnerability-al-ce0aa0b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53067%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53066-easily-exploitable-vulnerability-al-640079b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53066%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=68f7e96f01721c03c6f13e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53065-easily-exploitable-vulnerability-al-51a0f3d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53065%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53064-easily-exploitable-vulnerability-al-3f186fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53064%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=68f7e96f01721c03c6f13e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53063-easily-exploitable-vulnerability-al-cb8808f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53063%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53062-easily-exploitable-vulnerability-al-213e28ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53062%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53061-easily-exploitable-vulnerability-al-1e0226db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53061%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20While%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53060-easily-exploitable-vulnerability-al-4696ac2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53060%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53059-easily-exploitable-vulnerability-al-079f839e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53059%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53058-easily-exploitable-vulnerability-al-dddc40be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53058%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Manager.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Manager%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Manager%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Manager%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Manager&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53057-difficult-to-exploit-vulnerability--04100289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53057%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53056-easily-exploitable-vulnerability-al-69e76422</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53056%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JD%20Edwards%20EnterpriseOne%20Tools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53055-easily-exploitable-vulnerability-al-a09852bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53055%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53054-easily-exploitable-vulnerability-al-4ce202fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53054%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96e01721c03c6f13e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53053-easily-exploitable-vulnerability-al-ceb8f5ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53053%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53052-easily-exploitable-vulnerability-al-6cef64ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53052%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Workflow.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Workflow%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Workflow%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Workflow%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Workflow&amp;severity=medium&amp;id=68f7e96d01721c03c6f13df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53051-easily-exploitable-vulnerability-al-eda986bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53051%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20SYSDBA%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RDBMS%20Functional%20Index.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20RDBMS%20Functional%20Index%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=68f7e96d01721c03c6f13df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53050-easily-exploitable-vulnerability-al-aec91c58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53050%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20PeopleSoft%20Enterprise%20PeopleTools.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=high&amp;id=68f7e96d01721c03c6f13df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53049-easily-exploitable-vulnerability-al-89d258e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53049%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=high&amp;id=68f7e96d01721c03c6f13df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53048-easily-exploitable-vulnerability-al-b33bd7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53048%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=68f7e96d01721c03c6f13ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53047-easily-exploitable-vulnerability-al-5e18e2e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53047%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Bonjour%20to%20compromise%20Portable%20Clusterware.%20%20While%20the%20vulnerability%20is%20in%20Portable%20Clusterware%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Portable%20Clusterware%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53046-easily-exploitable-vulnerability-al-ed13818c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53046%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Oracle%20ZFS%20Storage%20Appliance%20Kit&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53045-easily-exploitable-vulnerability-al-79a46f25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53045%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53044-easily-exploitable-vulnerability-al-6d030414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53044%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96d01721c03c6f13de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53043-easily-exploitable-vulnerability-al-6915cefd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53043%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Product%20Hub.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Product%20Hub%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Product%20Hub%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Product%20Hub&amp;severity=high&amp;id=68f7e96c01721c03c6f13dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53042-easily-exploitable-vulnerability-al-52833639</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53042%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53041-easily-exploitable-vulnerability-al-a5ad1c44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53041%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iStore.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20iStore%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20iStore%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iStore%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20iStore&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53040-easily-exploitable-vulnerability-al-e3feb773</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53040%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53037-easily-exploitable-vulnerability-al-768a4355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53037%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=critical&amp;id=68f7e96c01721c03c6f13dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53036-easily-exploitable-vulnerability-al-853ab8c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53036%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=high&amp;id=68f7e96c01721c03c6f13dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53035-easily-exploitable-vulnerability-al-407e1517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53035%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53034-easily-exploitable-vulnerability-al-1abd9ad6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53034%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50075-easily-exploitable-vulnerability-al-5341b988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50075%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=68f7e96c01721c03c6f13dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50074-easily-exploitable-vulnerability-al-f1877392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50074%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=68f7e96c01721c03c6f13db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62661-cwe-276-incorrect-default-permissio-b2298725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62661%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Thanks%20Extension%2C%20Mediawiki%20-%20Growth%20Experiments%20Extension&amp;severity=medium&amp;id=68f7e40601721c03c6e7330b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-apt-targets-global-telecom-and-energy-5760f494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20APT%20Targets%20Global%20Telecom%20and%20Energy%20Sectors%2C%20Says%20Darktrace&amp;severity=medium&amp;id=68f7e1630ecb6bf811944952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polaredge-targets-cisco-asus-qnap-synology-routers-0150cb39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PolarEdge%20Targets%20Cisco%2C%20ASUS%2C%20QNAP%2C%20Synology%20Routers%20in%20Expanding%20Botnet%20Campaign&amp;severity=high&amp;id=68f7d1841612af152e93b339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/real-time-audio-deepfakes-are-now-a-reality-f30b247f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Real-Time%20Audio%20Deepfakes%20Are%20Now%20a%20Reality&amp;severity=medium&amp;id=68f7d1841612af152e93b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-evolve-malware-pushed-in-i-am-not--434b3061</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20hackers%20evolve%20malware%20pushed%20in%20%22I%20am%20not%20a%20robot%22%20captchas&amp;severity=high&amp;id=68f7d1841612af152e93b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62249-cwe-79-improper-neutralization-of-i-447eb88d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62249%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f7d1bd1612af152e93e22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11757-cwe-155-improper-neutralization-of--56e88257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11757%3A%20CWE-155%20Improper%20Neutralization%20of%20Wildcards%20or%20Matching%20Symbols%20in%20CloudEdge%20CloudEdge%20App&amp;severity=high&amp;id=68f7c43cdde5d1d51b4c0d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12031-cwe-1004-sensitive-cookie-without-h-9fd8446e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12031%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8050-cwe-73-external-control-of-file-name-7128149d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8050%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-use-deepseek-both-privately-and-securely-ka-f23c6a98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20use%20DeepSeek%20both%20privately%20and%20securely%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68f7c1f341ea2e78b89c740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11534-cwe-288-authentication-bypass-using-811d9833</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11534%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Raisecomm%20RAX701-GC-WP-01%20P200R002C52&amp;severity=critical&amp;id=68f7be6441ea2e78b8952f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/glassworm-self-propagating-vscode-extension-worm-b3f3cc38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GlassWorm%3A%20Self-Propagating%20VSCode%20Extension%20Worm&amp;severity=medium&amp;id=68f7ddd50ecb6bf8118c7f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62598-cwe-79-improper-neutralization-of-i-8076d8a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62598%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68f7ba157853ccdda8797446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62597-cwe-79-improper-neutralization-of-i-9b87e51b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62597%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68f7ba157853ccdda8797441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62595-cwe-601-url-redirection-to-untruste-50fe52c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62595%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20koajs%20koa&amp;severity=medium&amp;id=68f7b4a07853ccdda86f81c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62518-cwe-843-access-of-resource-using-in-8a9c1aa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62518%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20astral-sh%20tokio-tar&amp;severity=high&amp;id=68f7b4a07853ccdda86f81b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privacy-and-prizes-rewards-from-a-malicious-browse-33d21902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privacy%20and%20Prizes%3A%20Rewards%20from%20a%20Malicious%20Browser%20Extension&amp;severity=medium&amp;id=68f7b2cca08cdec950742a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-branding-used-in-new-tech-support-scam-73df4e31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Branding%20Used%20in%20New%20Tech%20Support%20Scam&amp;severity=medium&amp;id=68f7af44a08cdec95073a2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22166-dos-denial-of-service-in-atlassian--827b25f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22166%3A%20DoS%20(Denial%20of%20Service)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=68f7b2d6a08cdec950742b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62250-cwe-346-origin-validation-error-in--8c85a559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62250%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68f7abc9a08cdec95072febd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-videos-promoting-malware-installation-b2b76930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Videos%20Promoting%20Malware%20Installation&amp;severity=medium&amp;id=68f7b2cca08cdec9507429fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-rolls-out-new-tools-to-protect-whatsapp-and-m-5d064cda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20Rolls%20Out%20New%20Tools%20to%20Protect%20WhatsApp%20and%20Messenger%20Users%20from%20Scams&amp;severity=medium&amp;id=68f8339087e9a01451fc31bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberespionage-campaign-passiveneuron-targets-mach-d4f05152</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberespionage%20campaign%20PassiveNeuron%20targets%20machines%20running%20Windows%20Server&amp;severity=medium&amp;id=68f7af44a08cdec95073a2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/government-industrial-servers-targeted-in-china-li-80f7f107</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Government%2C%20Industrial%20Servers%20Targeted%20in%20China-Linked%20%E2%80%98PassiveNeuron%E2%80%99%20Campaign&amp;severity=high&amp;id=68f79a2da08cdec9506f41d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polaredge-targets-cisco-asus-qnap-synology-routers-169d781f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PolarEdge%20Targets%20Cisco%2C%20ASUS%2C%20QNAP%2C%20Synology%20Routers%20in%20Expanding%20Botnet%20Campaign&amp;severity=medium&amp;id=68f8339087e9a01451fc31c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9339-cwe-89-improper-neutralization-of-sp-90cf6288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9339%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simple%20SA%20SIMPLE.ERP&amp;severity=high&amp;id=68f7932da08cdec9506e3459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/streaming-fraud-campaigns-rely-on-ai-tools-bots-3974731c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Streaming%20Fraud%20Campaigns%20Rely%20on%20AI%20Tools%2C%20Bots&amp;severity=medium&amp;id=68f8343e87e9a01451028aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11625-cwe-287-improper-authentication-in--7ad22a33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11625%3A%20CWE-287%20Improper%20Authentication%20in%20wolfSSL%20wolfSSH&amp;severity=critical&amp;id=695d4b63a7c70f178f7611fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11151-cwe-200-exposure-of-sensitive-infor-63b83537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11151%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Beyaz%20Bilgisayar%20Software%20Design%20Industry%20and%20Trade%20Ltd.%20Co.%20CityPLus&amp;severity=high&amp;id=68f796b2a08cdec9506ea1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-copilot-arbitrary-data-exfiltration--e118a303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20Copilot%20-%20Arbitrary%20Data%20Exfiltration%20Via%20Mermaid%20Diagrams&amp;severity=medium&amp;id=68f7851fa08cdec9506bda67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-exploited-apple-kentico-microsoft-vu-6958dfb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Exploited%20Apple%2C%20Kentico%2C%20Microsoft%20Vulnerabilities&amp;severity=high&amp;id=68f78192a08cdec9506b2f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6239-cwe-200-exposure-of-sensitive-inform-e528b257</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6239%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zohocorp%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=68f781a9a08cdec9506b3157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/envoy-air-american-airlines-confirms-oracle-ebs-0--c8ba43de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Envoy%20Air%20(American%20Airlines)%20Confirms%20Oracle%20EBS%200-Day%20Breach%20Linked%20to%20Cl0p%20Ransomware&amp;severity=high&amp;id=68f77e12a08cdec9506a7545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-23h2-end-of-life-a37b5736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%2023H2%20End%20of%20Life&amp;severity=medium&amp;id=68f77a95a08cdec95069ccc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10020-cwe-77-improper-neutralization-of-s-525ab93d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10020%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zohocorp%20ManageEngine%20ADManager%20Plus&amp;severity=high&amp;id=68f77e24a08cdec9506a767f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealth-bgp-hijacks-with-urpf-filtering-74fdfdad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealth%20BGP%20Hijacks%20with%20uRPF%20Filtering&amp;severity=medium&amp;id=68f7770da08cdec950690ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10641-cwe-319-cleartext-transmission-of-s-12113cfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10641%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=high&amp;id=68f7770ba08cdec950690ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10640-cwe-602-client-side-enforcement-of--727102fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10640%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=critical&amp;id=68f77387a08cdec9506874ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9428-cwe-89-improper-neutralization-of-sp-c3c46b9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zohocorp%20Analytics%20Plus&amp;severity=high&amp;id=68f77387a08cdec9506874f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10639-cwe-798-use-of-hard-coded-credentia-429367ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10639%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20EfficientLab%20WorkExaminer%20Professional&amp;severity=high&amp;id=68f77387a08cdec9506874f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-targets-vs-code-extensions-wit-c884df58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Targets%20VS%20Code%20Extensions%20With%20%E2%80%98GlassWorm%E2%80%99%20Malware&amp;severity=medium&amp;id=68f77002a08cdec95067798d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securing-ai-to-benefit-from-ai-94676909</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Securing%20AI%20to%20Benefit%20from%20AI&amp;severity=medium&amp;id=68f778e6a08cdec9506979f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7473-cwe-91-xml-injection-aka-blind-xpath-5c4dc517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7473%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Zohocorp%20Endpoint%20Central&amp;severity=medium&amp;id=68f76a99a08cdec9505dbb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passiveneuron-cyber-spies-target-orgs-with-custom--8931ee41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98PassiveNeuron%E2%80%99%20Cyber%20Spies%20Target%20Orgs%20With%20Custom%20Malware&amp;severity=medium&amp;id=68f8343e87e9a01451028aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-used-snappybee-malware-and-citrix-flaw-to--7d0f1a09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Used%20Snappybee%20Malware%20and%20Citrix%20Flaw%20to%20Breach%20European%20Telecom%20Network&amp;severity=high&amp;id=68f75d097f1dc93a1e7a1d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5496-cwe-269-improper-privilege-managemen-62594cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5496%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zohocorp%20Endpoint%20Central&amp;severity=low&amp;id=68f762f3fa1db7d161aa94c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-73000-watchguard-firebox-devices-impacted-by--f67a0e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2073%2C000%20WatchGuard%20Firebox%20Devices%20Impacted%20by%20Recent%20Critical%20Flaw&amp;severity=critical&amp;id=68f75cf67f1dc93a1e79e343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/myanmar-military-shuts-down-major-cybercrime-cente-2e1fc786</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Myanmar%20Military%20Shuts%20Down%20Major%20Cybercrime%20Center%20and%20Detains%20Over%202%2C000%20People&amp;severity=medium&amp;id=68f758df159af2a541c15996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/to-be-a-robot-or-not-to-be-new-malware-attributed--c19c2406</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=To%20Be%20(A%20Robot)%20or%20Not%20to%20Be%3A%20New%20Malware%20Attributed%20to%20Russia%20State-Sponsored%20COLDRIVER&amp;severity=medium&amp;id=68f758f1159af2a541c15c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phishing-emails-pretend-to-offer-jobs-in-top-f-c9e16dde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phishing%20Emails%20Pretend%20to%20Offer%20Jobs%20in%20Top%20Firms%20to%20Steal%20Facebook%20Logins&amp;severity=medium&amp;id=68f750b0cab76000dd2a7865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10612-cwe-79-improper-neutralization-of-i-56c8a3aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20giSoft%20Information%20Technologies%20City%20Guide&amp;severity=medium&amp;id=68f74b48cab76000dd20dfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-confirms-exploitation-of-latest-oracle-ebs-vu-00d83904</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Confirms%20Exploitation%20of%20Latest%20Oracle%20EBS%20Vulnerability&amp;severity=medium&amp;id=68f748e76588c2a0ccddaf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/article-kerberos-security-attacks-and-detection-52d9726a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BArticle%5D%20Kerberos%20Security%3A%20Attacks%20and%20Detection&amp;severity=medium&amp;id=68f740e575ebabd95bb1c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26392-cwe-89-improper-neutralization-of-s-7b88a781</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26392%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=68f73d5075ebabd95ba9f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-identifies-three-new-russian-malware-famili-62a06544</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Identifies%20Three%20New%20Russian%20Malware%20Families%20Created%20by%20COLDRIVER%20Hackers&amp;severity=low&amp;id=68f73955d69d6f92d657d10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11949-cwe-306-missing-authentication-for--476d88ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11949%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Digiwin%20EasyFlow%20.NET&amp;severity=high&amp;id=68f731c8068ea03ee5af7f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12004-cwe-732-incorrect-permission-assign-e4ef87a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12004%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Lockdown%20Extension&amp;severity=critical&amp;id=68f72c58068ea03ee5a63d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10916-cwe-73-external-control-of-file-nam-9c91d826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10916%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20FormGent&amp;severity=critical&amp;id=68f724a6523859c72c10f9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62701-cwe-79-improper-neutralization-of-i-fecbad38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikistories&amp;severity=medium&amp;id=68f713c10f6a5ff36739b251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62702-cwe-79-improper-neutralization-of-i-bc0b858b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20PageTriage%20Extension&amp;severity=medium&amp;id=68f7103e0f6a5ff36732bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62694-cwe-79-improper-neutralization-of-i-8e11ab71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiLove%20Extension&amp;severity=medium&amp;id=68f70e570f6a5ff3672ff423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62695-cwe-79-improper-neutralization-of-i-d5a4eda6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiLambda%20Extension&amp;severity=medium&amp;id=68f708cf187cf981f21c9b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62696-cwe-77-improper-neutralization-of-s-6da6e8d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62696%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20Foundation%20-%20Springboard%20Extension&amp;severity=medium&amp;id=68f70e570f6a5ff3672ff427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62699-cwe-200-exposure-of-sensitive-infor-53b5edb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62699%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Translate%20Extension&amp;severity=medium&amp;id=68f70566187cf981f21700e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9133-cwe-862-missing-authorization-in-zyx-9f9b9459</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9133%3A%20CWE-862%20Missing%20Authorization%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f6f0dbb870ea37e2aefe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8078-cwe-78-improper-neutralization-of-sp-491e49e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8078%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f6f0dbb870ea37e2aefe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7851-vulnerability-in-tp-link-systems-inc-fc5e84d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7851%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=high&amp;id=68f6d853b870ea37e2a651e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7850-cwe-78-improper-neutralization-of-sp-ea7871c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7850%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=critical&amp;id=68f6d853b870ea37e2a651e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6542-cwe-78-improper-neutralization-of-sp-d3ffc6ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6542%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=critical&amp;id=68f6d853b870ea37e2a651dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6541-cwe-78-improper-neutralization-of-sp-34885acc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6541%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Omada%20gateways&amp;severity=high&amp;id=68f6d853b870ea37e2a651d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-21-a456d457</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-21&amp;severity=medium&amp;id=68f8216e1fa795c94c4b2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52079-na-5292046b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52079%3A%20n%2Fa&amp;severity=high&amp;id=68f7e1720ecb6bf811944a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61457-na-58cfa808</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61457%3A%20n%2Fa&amp;severity=medium&amp;id=68f7dc040ecb6bf8118a36e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56802-na-f7cfd176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56802%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56801-na-a88e56ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56801%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56800-na-0ca70483</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56800%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace2167d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56799-na-1ad2327b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56799%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9a4247d717aace21679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61255-na-4b0d0aae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61255%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d410247d717aacd8c59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60507-na-83bf8c05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60507%3A%20n%2Fa&amp;severity=high&amp;id=68f7c9acdde5d1d51b5517bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60790-na-4cc1f59a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60790%3A%20n%2Fa&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60427-na-20b43510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60427%3A%20n%2Fa&amp;severity=medium&amp;id=68f7c43cdde5d1d51b4c0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60772-na-b71e1c33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60772%3A%20n%2Fa&amp;severity=critical&amp;id=68f7be6441ea2e78b8952f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60511-na-5b068702</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60511%3A%20n%2Fa&amp;severity=medium&amp;id=68f7be6441ea2e78b8952f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60506-na-5ab4b573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60506%3A%20n%2Fa&amp;severity=medium&amp;id=68f7be6441ea2e78b8952f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60500-na-d8a0e77f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60500%3A%20n%2Fa&amp;severity=high&amp;id=68f7be6441ea2e78b8952f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62763-cwe-918-server-side-request-forgery-ef8d059c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62763%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Zimbra%20Collaboration&amp;severity=medium&amp;id=68f7bc7541ea2e78b89317a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60280-na-2a296f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60280%3A%20n%2Fa&amp;severity=medium&amp;id=68f7af4da08cdec95073a432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61220-na-d6acc624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61220%3A%20n%2Fa&amp;severity=high&amp;id=68f7abc9a08cdec95072fec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61194-na-090a8f6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61194%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a844a08cdec950723b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60751-na-89eac558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60751%3A%20n%2Fa&amp;severity=high&amp;id=68f7a844a08cdec950723b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61181-na-84e74787</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61181%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a844a08cdec950723b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60344-na-61323593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60344%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20D-Link%20DSR-150&amp;severity=high&amp;id=68f7a4cea08cdec950718deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56450-na-4aab1ca0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56450%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a4cea08cdec950718de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57521-na-9dc346a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57521%3A%20n%2Fa&amp;severity=medium&amp;id=68f7a146a08cdec95070f589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60934-na-d2974705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60934%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec950700394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60933-na-0a76309c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60933%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec950700391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60932-na-0b98d863</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60932%3A%20n%2Fa&amp;severity=medium&amp;id=68f79dc6a08cdec95070038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59438-na-17201df9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59438%3A%20n%2Fa&amp;severity=medium&amp;id=68f79a48a08cdec9506f4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns0eu-private-dns-service-shuts-down-over-sustain-818a88a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS0.EU%20private%20DNS%20service%20shuts%20down%20over%20sustainability%20issues&amp;severity=high&amp;id=68f6c63b81b1d362526373ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-lynk-group-leaks-sensitive-uk-mod-files-in-44fe32a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Lynk%20group%20leaks%20sensitive%20UK%20MoD%20files%2C%20including%20info%20on%20eight%20military%20bases&amp;severity=high&amp;id=68f6c63b81b1d362526373ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-october-21st-2025-httpsi-e403e625</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20October%2021st%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9664%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f6bec880866bef67247b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12001-cwe-20-improper-input-validation-in-96c4a1a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12001%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f6b0519b180d42fd423cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-spreading-glassworm-malware-hits-openvsx-vs-c-e2d7523e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-spreading%20GlassWorm%20malware%20hits%20OpenVSX%2C%20VS%20Code%20registries&amp;severity=high&amp;id=68f6b0009b180d42fd4135c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-75000-watchguard-security-devices-vulnerable--83aaced6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2075%2C000%20WatchGuard%20security%20devices%20vulnerable%20to%20critical%20RCE&amp;severity=critical&amp;id=68f6b0009b180d42fd4135bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-muji-halts-online-sales-after-ransomw-01b7ae6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Muji%20halts%20online%20sales%20after%20ransomware%20attack%20on%20supplier&amp;severity=high&amp;id=68f6b0009b180d42fd4135bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-new-exploited-bugs-land-in-cisas-catalog-orac-21b6af4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20New%20Exploited%20Bugs%20Land%20in%20CISA&apos;s%20Catalog%20%E2%80%94%20Oracle%20and%20Microsoft%20Among%20Targets&amp;severity=high&amp;id=68f6b0009b180d42fd4135c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coldriver-drops-fresh-malware-on-targets-64a9baad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ColdRiver%20Drops%20Fresh%20Malware%20on%20Targets&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11536-cwe-918-server-side-request-forgery-3b5b3872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11536%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68f6ac1bd243d1f5a41c5f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-sting-takes-down-sim-box-criminal-ne-e5393b2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Sting%20Takes%20Down%20SIM%20Box%20Criminal%20Network&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-your-car-a-byod-risk-researchers-demonstrate-ho-7682e581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Your%20Car%20a%20BYOD%20Risk%3F%20Researchers%20Demonstrate%20How&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62658-cwe-89-improper-neutralization-of-s-38d5d7dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20WatchAnalytics%20extension&amp;severity=high&amp;id=68f69d3c82b5baa232a16e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62657-cwe-79-improper-neutralization-of-i-bc18b46d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20PageForms%20extension&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62656-cwe-79-improper-neutralization-of-i-830d2cce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20GlobalBlocking%20extension&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62528-cwe-79-improper-neutralization-of-i-347af122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62528%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remram44%20taguette&amp;severity=medium&amp;id=68f697d682b5baa2329830c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62527-cwe-15-external-control-of-system-o-cc98c365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62527%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20remram44%20taguette&amp;severity=high&amp;id=68f697d682b5baa2329830bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8052-cwe-564-sql-injection-in-opentext-fl-3bc75e7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8052%3A%20CWE-564%20SQL%20Injection%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f697d682b5baa2329830c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62522-cwe-22-improper-limitation-of-a-pat-3ad29971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62522%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=68f697d682b5baa2329830b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8048-cwe-73-external-control-of-file-name-4b617e1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8048%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f695d3769ba8ba7073f766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8049-cwe-1220-insufficient-granularity-of-3b464b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8049%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f695d3769ba8ba7073f769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8051-cwe-35-path-traversal-in-opentext-fl-2aff0d74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8051%3A%20CWE-35%20Path%20Traversal%20in%20opentext%20Flipper&amp;severity=medium&amp;id=68f695d3769ba8ba7073f76c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8053-cwe-1220-insufficient-granularity-of-e419b317</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8053%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20opentext%20Flipper&amp;severity=low&amp;id=68f695d3769ba8ba7073f76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/better-auth-critical-account-takeover-via-unauthen-f2040d12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Better-Auth%20Critical%20Account%20Takeover%20via%20Unauthenticated%20API%20Key%20Creation%20(CVE-2025-61928)&amp;severity=critical&amp;id=68f6924d769ba8ba706d73cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62697-cwe-74-improper-neutralization-of-s-ba7e412f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62697%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20LanguageSelector%20Extension&amp;severity=high&amp;id=68f68e75ecfb41cc9f200fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/five-new-exploited-bugs-land-in-cisas-catalog-orac-0de9f951</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Five%20New%20Exploited%20Bugs%20Land%20in%20CISA&apos;s%20Catalog%20%E2%80%94%20Oracle%20and%20Microsoft%20Among%20Targets&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/south-korea-seeks-to-arrest-dozens-of-online-scam--bdef40a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=South%20Korea%20Seeks%20to%20Arrest%20Dozens%20of%20Online%20Scam%20Suspects%20Repatriated%20From%20Cambodia&amp;severity=medium&amp;id=68f68726b7571ea2b185f823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5517-cwe-122-heap-based-buffer-overflow-i-0362fdc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5517%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox%20(UL40%2F80A)&amp;severity=medium&amp;id=68f6838cb7571ea2b17f2afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flawed-vendor-guidance-exposes-enterprises-to-avoi-0bfd8040</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flawed%20Vendor%20Guidance%20Exposes%20Enterprises%20to%20Avoidable%20Risk&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62698-cwe-79-improper-neutralization-of-i-02542a06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62698%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ExternalGuidance&amp;severity=medium&amp;id=68f67c627bf8d449e91d409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62700-cwe-79-improper-neutralization-of-i-2ed8c981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20MultiBoilerplate%20Extensionmaste&amp;severity=medium&amp;id=68f67a417bf8d449e919cf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47902-cwe-89-improper-neutralization-of-s-c9708ccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47902%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3465-cwe-22-improper-limitation-of-a-path-aeceba29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3465%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABB%20CoreSense%E2%84%A2%20HM&amp;severity=high&amp;id=68f6785707c863f509432ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62693-cwe-79-improper-neutralization-of-i-a1eeae6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20LastModified%20Extension&amp;severity=medium&amp;id=68f6785707c863f509432cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55086-cwe-1285-in-eclipse-foundation-next-dde775bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55086%3A%20CWE-1285%20in%20Eclipse%20Foundation%20NextX%20Duo&amp;severity=medium&amp;id=68f6785707c863f509432cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47901-cwe-78-improper-neutralization-of-s-7f1717fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47901%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11979-cwe-416-use-after-free-in-mongodb-i-c6e3e1e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11979%3A%20CWE-416%20Use%20After%20Free%20in%20MongoDB%20Inc.%20Server&amp;severity=medium&amp;id=68f6785707c863f509432cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47900-cwe-78-improper-neutralization-of-s-b457946a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47900%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Microchip%20Time%20Provider%204100&amp;severity=high&amp;id=68f6785707c863f509432cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62510-cwe-280-improper-handling-of-insuff-4c414aff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62510%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20error311%20FileRise&amp;severity=high&amp;id=68f674d107c863f5093c9144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62509-cwe-280-improper-handling-of-insuff-1a0dadee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62509%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20error311%20FileRise&amp;severity=high&amp;id=68f674d107c863f5093c913f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tunneling-wireguard-over-https-using-wstunnel-bdf53d9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tunneling%20WireGuard%20over%20HTTPS%20using%20Wstunnel&amp;severity=medium&amp;id=68f674d107c863f5093c916b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9574-cwe-306-missing-authentication-for-c-2fbe3678</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9574%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20ALS-mini-s4%20IP&amp;severity=critical&amp;id=68f66ab8b4f32a3742401d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6515-cwe-330-use-of-insufficiently-random-74d7342a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6515%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20oatpp%20oatpp-mcp&amp;severity=medium&amp;id=68f6617fd7e10ba5fa8c36f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62429-cwe-94-improper-control-of-generati-f8a5ba0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62429%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=high&amp;id=68f6617fd7e10ba5fa8c36f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10678-cwe-1392-use-of-default-credentials-8231ef9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10678%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20NetBird%20VPN%20NetBird&amp;severity=critical&amp;id=68f65a059f0e7cefe16a9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-microchip-tech-protects-vehicles-from-laser-at-1ed9c4ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bombarding%20Cars%20With%20Lasers%3A%20Novel%20Auto%20Cyberattacks%20Emerge&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-view-on-a-recent-salt-typhoon-intrusion-5d49395c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20view%20on%20a%20recent%20Salt%20Typhoon%20intrusion&amp;severity=medium&amp;id=68f75555159af2a541b9f98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57738-cwe-653-improper-isolation-or-compa-27df8ae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57738%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Apache%20Software%20Foundation%20Apache%20Syncope&amp;severity=high&amp;id=68f64d4e059c7cb96272a087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-glassworm-attacks-vs-code-supply--6d5edb16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20GlassWorm%20Attacks%20VS%20Code%20Supply%20Chain&amp;severity=medium&amp;id=68f6dd03b870ea37e2ab9fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8884-cwe-639-authorization-bypass-through-68b9802e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8884%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20VHS%20Electronic%20Software%20Ltd.%20Co.%20ACE%20Center&amp;severity=medium&amp;id=68f64b0d50505a0863bf2f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41390-cwe-829-inclusion-of-functionality--e0a7f915</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41390%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Truffle%20Security%20Co.%20TruffleHog&amp;severity=high&amp;id=68f64d4e059c7cb96272a08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11680-cwe-787-out-of-bounds-write-in-warm-f4e9afcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11680%3A%20CWE-787%20Out-of-bounds%20Write%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f6439468d8b0c0b432bc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11679-cwe-125-out-of-bounds-read-in-warmc-f0b24989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11679%3A%20CWE-125%20Out-of-bounds%20Read%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f6439468d8b0c0b432bc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11678-cwe-121-stack-based-buffer-overflow-13ece604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11678%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20warmcat%20libwebsocket&amp;severity=high&amp;id=68f6402668d8b0c0b42c1773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysing-clickfix-3-reasons-why-copypaste-attacks-fee115d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysing%20ClickFix%3A%203%20Reasons%20Why%20Copy%2FPaste%20Attacks%20Are%20Driving%20Security%20Breaches&amp;severity=high&amp;id=68f6401268d8b0c0b42bc79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11677-cwe-416-use-after-free-in-warmcat-l-1c9a13bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11677%3A%20CWE-416%20Use%20After%20Free%20in%20warmcat%20libwebsockets&amp;severity=medium&amp;id=68f63e2c68d8b0c0b429afd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20th-october-threat-intelligence-report-100cd357</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=critical&amp;id=68f638650ac38c6dbff6cdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-farm-dismantled-in-europe-seven-arrested-bde49dc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM%20Farm%20Dismantled%20in%20Europe%2C%20Seven%20Arrested&amp;severity=high&amp;id=68f63395f866bd7f70e5a581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-activity-drops-after-doxxing-baf8d7da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20Activity%20Drops%20After%20Doxxing&amp;severity=medium&amp;id=68f6300df866bd7f70dd4ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-patches-critical-flaw-in-automate-rmm--6903ecce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20Patches%20Critical%20Flaw%20in%20Automate%20RMM%20Tool&amp;severity=critical&amp;id=68f62be673b0747ff349a7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-f5-breached-linux-rootkits-pixnapping-bbdcd3de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20F5%20Breached%2C%20Linux%20Rootkits%2C%20Pixnapping%20Attack%2C%20EtherHiding%20%26%20More&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aws-outage-crashes-amazon-primevideo-fortnite-perp-65e5852d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AWS%20outage%20crashes%20Amazon%2C%20PrimeVideo%2C%20Fortnite%2C%20Perplexity%20and%20more&amp;severity=high&amp;id=68f62bf873b0747ff349aed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysing-clickfix-3-reasons-why-copypaste-attacks-4a9b0d53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysing%20ClickFix%3A%203%20Reasons%20Why%20Copy%2FPaste%20Attacks%20Are%20Driving%20Security%20Breaches&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/131-chrome-extensions-caught-hijacking-whatsapp-we-8b992db0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=131%20Chrome%20Extensions%20Caught%20Hijacking%20WhatsApp%20Web%20for%20Massive%20Spam%20Campaign&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-configure-privacy-and-security-in-chatgpt-k-b20c8132</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20configure%20privacy%20and%20security%20in%20ChatGPT%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68f60950ed66740820aaf350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8349-cwe-79-improper-neutralization-of-in-b3aead97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tawk%20Live%20Chat&amp;severity=medium&amp;id=68f6093ced66740820aae006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerability-in-dolby-decoder-can-allow-zero-clic-c5830828</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerability%20in%20Dolby%20Decoder%20Can%20Allow%20Zero-Click%20Attacks&amp;severity=low&amp;id=68f6059eed66740820a57c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nso-ordered-to-stop-hacking-whatsapp-but-damages-c-69ddc943</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NSO%20Ordered%20to%20Stop%20Hacking%20WhatsApp%2C%20but%20Damages%20Cut%20to%20%244%20Million&amp;severity=medium&amp;id=68f604eb256a77fc0567920a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/many-online-services-and-websites-affected-by-an-a-db8a312d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Many%20Online%20Services%20and%20Websites%20Affected%20by%20an%20AWS%20Outage%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f604ea256a77fc056791f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mss-claims-nsa-used-42-cyber-tools-in-multi-stage--2059d544</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSS%20Claims%20NSA%20Used%2042%20Cyber%20Tools%20in%20Multi-Stage%20Attack%20on%20Beijing%20Time%20Systems&amp;severity=high&amp;id=68f5fd3c1a5d33d7b2f0373f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41028-cwe-89-improper-neutralization-of-s-e49230fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41028%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Grupo%20Castilla%20Epsilon%20RH&amp;severity=critical&amp;id=68f5fd4a1a5d33d7b2f03a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ottercandy-malware-used-by-waterplum-6705a1c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OtterCandy%2C%20malware%20used%20by%20WaterPlum&amp;severity=medium&amp;id=68f5f63a1a5d33d7b2e42ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57837-cwe-200-exposure-of-sensitive-infor-882febea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57837%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20FCP-AN10&amp;severity=low&amp;id=68f5f23f58c1f730f1d98293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57839-cwe-200-exposure-of-sensitive-infor-e838b3e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57839%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20MagicOS&amp;severity=medium&amp;id=68f5ee79ee3f99bfc7e1bfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57838-cwe-200-exposure-of-sensitive-infor-b3771347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57838%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Honor%20MagicOS&amp;severity=medium&amp;id=68f5ee79ee3f99bfc7e1bfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31342-cwe-434-unrestricted-upload-of-file-4391e83b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31342%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Galaxy%20Software%20Services%20Corporation%20Vitals%20ESP&amp;severity=critical&amp;id=68f5ee79ee3f99bfc7e1bfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/american-airlines-subsidiary-envoy-air-hit-by-orac-40069e64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=American%20Airlines%20Subsidiary%20Envoy%20Air%20Hit%20by%20Oracle%20Hack&amp;severity=medium&amp;id=68f5eae0ee3f99bfc7daf5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61932-improper-verification-of-source-of--8024309c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61932%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20MOTEX%20Inc.%20Lanscope%20Endpoint%20Manager%20(On-Premises)%20(Client%20program%20(MR)%20and%20Detection%20agent%20(DA))&amp;severity=critical&amp;id=68f5e704b3e3725554c349af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/using-syscall-for-obfuscationfileless-activity-mon-a695658b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Using%20Syscall()%20for%20Obfuscation%2FFileless%20Activity%2C%20(Mon%2C%20Oct%2020th)&amp;severity=medium&amp;id=68f5d82f16b8590182261279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62577-incorrect-default-permissions-in-fs-7000f9c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62577%3A%20Incorrect%20default%20permissions%20in%20Fsas%20Technologies%20Inc.%20ETERNUS%20SF%20AdvancedCopy%20Manager%20Standard%20Edition%20(for%20Solaris%2010%2F%2011)&amp;severity=high&amp;id=68f5cd683fa25f9d08ba72fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mss-claims-nsa-used-42-cyber-tools-in-multi-stage--e06c9632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSS%20Claims%20NSA%20Used%2042%20Cyber%20Tools%20in%20Multi-Stage%20Attack%20on%20Beijing%20Time%20Systems&amp;severity=medium&amp;id=68f6dc22b870ea37e2ab86fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11948-cwe-434-unrestricted-upload-of-file-efde2151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11948%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Excellent%20Infotek%20Document%20Management%20System&amp;severity=critical&amp;id=68f5b12c4f503908ae911c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-accuses-us-of-cyberattack-on-national-time-c-51cb577f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Accuses%20US%20of%20Cyberattack%20on%20National%20Time%20Center&amp;severity=medium&amp;id=68f58a7e4f503908ae796fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-20-d36baf7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-20&amp;severity=medium&amp;id=68f6cea1b870ea37e284378d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54764-na-ad689708</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54764%3A%20n%2Fa&amp;severity=medium&amp;id=68f6a8a4d243d1f5a415cf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61303-na-e4f67c7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61303%3A%20n%2Fa&amp;severity=critical&amp;id=68f6a14fe073070bd6ef9959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61301-na-4dbdf6b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61301%3A%20n%2Fa&amp;severity=high&amp;id=68f6a14fe073070bd6ef9954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60781-na-f265f054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60781%3A%20n%2Fa&amp;severity=medium&amp;id=68f69f66e073070bd6ed126c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60783-na-31845747</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60783%3A%20n%2Fa&amp;severity=medium&amp;id=68f69d3c82b5baa232a16e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61488-na-eda8f875</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61488%3A%20n%2Fa&amp;severity=high&amp;id=68f67fa87bf8d449e923053c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48025-na-0b0f0c1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48025%3A%20n%2Fa&amp;severity=medium&amp;id=68f65c0bd7e10ba5fa83242c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60856-na-99f6c6cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60856%3A%20n%2Fa&amp;severity=medium&amp;id=68f65c0bd7e10ba5fa832428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55568-na-8657cbd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55568%3A%20n%2Fa&amp;severity=high&amp;id=68f65a059f0e7cefe16a9d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26782-na-9e045923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26782%3A%20n%2Fa&amp;severity=high&amp;id=68f656869f0e7cefe163cf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26781-na-0f23c91e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26781%3A%20n%2Fa&amp;severity=high&amp;id=68f656869f0e7cefe163cf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61417-na-58b3f4c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61417%3A%20n%2Fa&amp;severity=high&amp;id=68f652b7059c7cb9627c07ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54957-na-539cd8e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54957%3A%20n%2Fa&amp;severity=critical&amp;id=68f64f36059c7cb96275288e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61456-na-357e2d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61456%3A%20n%2Fa&amp;severity=medium&amp;id=68f64d4e059c7cb96272a08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61455-na-d372975c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61455%3A%20n%2Fa&amp;severity=critical&amp;id=68f63bd90ac38c6dbffe0b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61454-na-9005b0c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61454%3A%20n%2Fa&amp;severity=medium&amp;id=68f634eb0ac38c6dbff2af93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56223-na-fdf80d5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56223%3A%20n%2Fa&amp;severity=high&amp;id=68f634eb0ac38c6dbff2af8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56224-na-d97f3959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56224%3A%20n%2Fa&amp;severity=high&amp;id=68f633a7f866bd7f70e5a6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56219-na-ec567ddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56219%3A%20n%2Fa&amp;severity=high&amp;id=68f633a7f866bd7f70e5a6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experian-fined-32-million-for-mass-collecting-pers-0cd8e478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experian%20fined%20%243.2%20million%20for%20mass-collecting%20personal%20data&amp;severity=high&amp;id=68f57b63de6e321f23070d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11947-heap-based-buffer-overflow-in-bftpd-04c2b5a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11947%3A%20Heap-based%20Buffer%20Overflow%20in%20bftpd&amp;severity=low&amp;id=68f561fd0acf3516df87a330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11946-cross-site-scripting-in-logicaldoc--6cea66c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11946%3A%20Cross%20Site%20Scripting%20in%20LogicalDOC%20Community%20Edition&amp;severity=medium&amp;id=68f55abbd03e41f5d7ce2284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11945-cross-site-scripting-in-toeverythin-fd53f05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11945%3A%20Cross%20Site%20Scripting%20in%20toeverything%20AFFiNE&amp;severity=medium&amp;id=68f556d8283c10e6bde4a71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11944-sql-injection-in-givanz-vvveb-6d219942</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11944%3A%20SQL%20Injection%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68f5484344f1d399063009ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11943-use-of-default-credentials-in-70mai-57cab3c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11943%3A%20Use%20of%20Default%20Credentials%20in%2070mai%20X200&amp;severity=medium&amp;id=68f540b8b572bcaa2b43c10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11942-missing-authentication-in-70mai-x20-317172c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11942%3A%20Missing%20Authentication%20in%2070mai%20X200&amp;severity=medium&amp;id=68f50e6f33dbe6918a21d6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-data-breach-what-happened-and-how-it-impacts-yo-8c427a49</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Data%20Breach%3A%20What%20Happened%20and%20How%20It%20Impacts%20You&amp;severity=critical&amp;id=68f505665c78ab3001fe5759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11941-path-traversal-in-e107-cms-eeec1d2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11941%3A%20Path%20Traversal%20in%20e107%20CMS&amp;severity=medium&amp;id=68f506f75c78ab30010130f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defenderwrite-abusing-whitelisted-programs-for-arb-9420ecc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DefenderWrite%3A%20Abusing%20Whitelisted%20Programs%20for%20Arbitrary%20Writes%20into%20Antivirus&apos;s%20Operating%20Folder&amp;severity=medium&amp;id=68f4eda1fcc669043b4f9bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11940-uncontrolled-search-path-in-librewo-7cc9289e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11940%3A%20Uncontrolled%20Search%20Path%20in%20LibreWolf&amp;severity=high&amp;id=68f4a3e9a1caf49d9dcb28ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11939-path-traversal-in-churchcrm-2d917641</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11939%3A%20Path%20Traversal%20in%20ChurchCRM&amp;severity=medium&amp;id=68f49c99a2d65d4c729ee8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11938-deserialization-in-churchcrm-edbd9490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11938%3A%20Deserialization%20in%20ChurchCRM&amp;severity=medium&amp;id=68f4954ddd9718ca70979f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-dismantles-sim-farm-network-powering-49-mi-024a7e76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20Dismantles%20SIM%20Farm%20Network%20Powering%2049%20Million%20Fake%20Accounts%20Worldwide&amp;severity=medium&amp;id=68f591024f503908ae7cd144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hardbit-40-investigation-by-reyben-cortes-41984652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HardBit%204.0%20Investigation%20by%20Reyben%20Cortes&amp;severity=medium&amp;id=68facdcb00e9e97283af56c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-19-d3fc21df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-19&amp;severity=medium&amp;id=68f57f34424fb841ffc0f36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62672-na-a500cfe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62672%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20boyns%20rplay&amp;severity=medium&amp;id=68f43dd577122960c164e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-airport-chaos-to-cyber-intrigue-everest-gang--71029c3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Airport%20chaos%20to%20cyber%20intrigue%3A%20Everest%20Gang%20takes%20credit%20for%20Collins%20Aerospace%20breach%20-%20Security%20Affairs&amp;severity=high&amp;id=68f403d7099f60e0b7fe466b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winos-40-hackers-expand-to-japan-and-malaysia-with-d58136a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Winos%204.0%20hackers%20expand%20to%20Japan%20and%20Malaysia%20with%20new%20malware&amp;severity=medium&amp;id=68f403d7099f60e0b7fe466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/notice-google-gemini-ais-undisclosed-911-auto-dial-93405d38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Notice%3A%20Google%20Gemini%20AI&apos;s%20Undisclosed%20911%20Auto-Dial%20Bypass%20%E2%80%93%20Logs%20and%20Evidence%20Available&amp;severity=critical&amp;id=68f3cc8e9bcc951554e2d6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47410-cwe-352-cross-site-request-forgery--058a3311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47410%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=high&amp;id=68f3b0a2a1588a753f9e7244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-net-capi-backdoor-targets-russian-auto-and-e-c-14dece74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20.NET%20CAPI%20Backdoor%20Targets%20Russian%20Auto%20and%20E-Commerce%20Firms%20via%20Phishing%20ZIPs&amp;severity=high&amp;id=68f39f94cbcef15488c39fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/american-airlines-subsidiary-envoy-confirms-oracle-501bab35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=American%20Airlines%20subsidiary%20Envoy%20confirms%20Oracle%20data%20theft%20attack&amp;severity=high&amp;id=68f370bf9828099f3096efa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-fixes-automate-bug-allowing-aitm-updat-85668075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20fixes%20Automate%20bug%20allowing%20AiTM%20update%20attacks&amp;severity=high&amp;id=68f370bf9828099f3096efa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-expands-winos-40-attacks-to-japan-and-m-b27e1677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Expands%20Winos%204.0%20Attacks%20to%20Japan%20and%20Malaysia%20via%20HoldingHands%20RAT&amp;severity=high&amp;id=68f370bf9828099f3096efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11926-cwe-79-improper-neutralization-of-i-45c4b447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdreams%20Related%20Posts%20Lite&amp;severity=medium&amp;id=68f361e78febb5b10781da79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9890-cwe-352-cross-site-request-forgery-c-55937c52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9890%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20Theme%20Editor&amp;severity=high&amp;id=68f352f16320622d3355204a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5555-stack-based-buffer-overflow-in-nixdo-1a9e9be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5555%3A%20Stack-based%20Buffer%20Overflow%20in%20Nixdorf%20Wincor%20PORT%20IO%20Driver&amp;severity=high&amp;id=68f34ba09cdc1302af5780fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10750-cwe-200-exposure-of-sensitive-infor-bb3d3f9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10750%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberlord92%20PowerBI%20Embed%20Reports&amp;severity=medium&amp;id=68f3445827133b8ceda05e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11256-cwe-285-improper-authorization-in-k-3c49a6a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11256%3A%20CWE-285%20Improper%20Authorization%20in%20kognetiks%20Kognetiks%20Chatbot&amp;severity=medium&amp;id=68f3445827133b8ceda05e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-expands-winos-40-attacks-to-japan-and-m-b014396f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20Expands%20Winos%204.0%20Attacks%20to%20Japan%20and%20Malaysia%20via%20HoldingHands%20RAT&amp;severity=medium&amp;id=68f43e5777122960c1652c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11691-cwe-89-improper-neutralization-of-s-3ab6f026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11691%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20PPOM%20%E2%80%93%20Product%20Addons%20%26%20Custom%20Fields%20for%20WooCommerce&amp;severity=high&amp;id=68f33944197c8629076f80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11372-cwe-862-missing-authorization-in-th-95d639c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11372%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=68f33944197c8629076f80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11391-cwe-434-unrestricted-upload-of-file-2c60773c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11391%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20PPOM%20%E2%80%93%20Product%20Addons%20%26%20Custom%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=68f33944197c8629076f80ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11270-cwe-79-improper-neutralization-of-i-c4e4a0cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11270%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=68f33944197c8629076f80c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11519-cwe-639-authorization-bypass-throug-ba40b26c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11519%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20optimole%20Optimole%20%E2%80%93%20Optimize%20Images%20%7C%20Convert%20WebP%20%26%20AVIF%20%7C%20CDN%20%26%20Lazy%20Load%20%7C%20Image%20Optimization&amp;severity=medium&amp;id=68f33944197c8629076f80db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11510-cwe-285-improper-authorization-in-n-e890a4e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11510%3A%20CWE-285%20Improper%20Authorization%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=68f33944197c8629076f80d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9562-cwe-79-improper-neutralization-of-in-1d40aebd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=medium&amp;id=68f33945197c8629076fa118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11703-cwe-349-acceptance-of-extraneous-un-01a25b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11703%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=68f33944197c8629076f80e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10006-cwe-79-improper-neutralization-of-i-05f7f7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68f33944197c8629076f80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10187-cwe-89-improper-neutralization-of-s-597c2a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10187%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20creative-solutions-1%20GSpeech%20TTS%20%E2%80%93%20WordPress%20Text%20To%20Speech%20Plugin&amp;severity=medium&amp;id=68f33944197c8629076f80bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11741-cwe-639-authorization-bypass-throug-ba1864c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11741%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpclever%20WPC%20Smart%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=68f33945197c8629076fa114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11517-cwe-639-authorization-bypass-throug-078b8190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11517%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20theeventscalendar%20Event%20Tickets%20and%20Registration&amp;severity=high&amp;id=68f33944197c8629076f80d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11742-cwe-862-missing-authorization-in-wp-f735f0ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11742%3A%20CWE-862%20Missing%20Authorization%20in%20wpclever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=68f32a83bd206a5487a89662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11857-cwe-79-improper-neutralization-of-i-40f03655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mxp%20XX2WP%20Integration%20Tools&amp;severity=medium&amp;id=68f32a83bd206a5487a89666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11738-cwe-73-external-control-of-file-nam-7bd2b601</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11738%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68f32a83bd206a5487a8965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11937-cwe-79-improper-neutralization-of-i-4547ad51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20Extension&amp;severity=medium&amp;id=68f3288dbd206a5487a3223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62666-cwe-770-allocation-of-resources-wit-5a044c36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62666%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CirrusSearch%20Extension&amp;severity=medium&amp;id=68f31f48eba81d1dad81143c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62667-cwe-79-improper-neutralization-of-i-9b892851</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=68f31f48eba81d1dad811440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62668-cwe-276-incorrect-default-permissio-fd526937</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62668%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments%20Extension&amp;severity=medium&amp;id=68f31bbeeba81d1dad79f298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62669-cwe-200-exposure-of-sensitive-infor-55efe4b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62669%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=medium&amp;id=68f31bbeeba81d1dad79f29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62670-cwe-79-improper-neutralization-of-i-6ed0ddc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20FlexDiagrams%20Extension&amp;severity=medium&amp;id=68f319cceba81d1dad76b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11361-cwe-918-server-side-request-forgery-b8f2d118</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11361%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpdevteam%20Gutenberg%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Blocks%20%26%20Patterns&amp;severity=medium&amp;id=68f319cceba81d1dad76b565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62671-cwe-79-improper-neutralization-of-i-dbbd73e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Cargo%20Extension&amp;severity=medium&amp;id=68f319cceba81d1dad76b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62662-cwe-79-improper-neutralization-of-i-de3cfa0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20AdvancedSearch%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62663-cwe-79-improper-neutralization-of-i-af2537f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20UploadWizard%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62664-cwe-79-improper-neutralization-of-i-b54d33d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20ImageRating%20Extension&amp;severity=medium&amp;id=68f317da8ff74c446c8a11f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62665-cwe-79-improper-neutralization-of-i-f66e9e58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Skin%3ABlueSky&amp;severity=medium&amp;id=68f314568ff74c446c82ccd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11378-cwe-862-missing-authorization-in-sh-6762cb4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11378%3A%20CWE-862%20Missing%20Authorization%20in%20shortpixel%20ShortPixel%20Image%20Optimizer%20%E2%80%93%20Optimize%20Images%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=68f30d8cba51437ed4aaca68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-18-9190835c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-18&amp;severity=medium&amp;id=68f42bc1512992bed08622fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62655-cwe-89-improper-neutralization-of-s-ce74ba60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20Cargo%20extension&amp;severity=low&amp;id=68f2cadb9c34d0947f492883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62654-cwe-79-improper-neutralization-of-i-fa1f3570</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62654%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20QuizGame%20extension&amp;severity=low&amp;id=68f2c7559c34d0947f4887e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62653-cwe-79-improper-neutralization-of-i-5a41e0e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20PollNY%20extension&amp;severity=low&amp;id=68f30b9cba51437ed4a824e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62652-cwe-79-improper-neutralization-of-i-9540b2a9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20Wikimedia%20Foundation%20MediaWiki%20WebAuthn%20extension&amp;severity=medium&amp;id=68f2c3d09c34d0947f47e1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62515-cwe-502-deserialization-of-untruste-91ef1bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62515%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20marsupialtail%20quokka&amp;severity=critical&amp;id=68f2ab359c34d0947f42a464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11914-path-traversal-in-shenzhen-ruiming--5184be78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11914%3A%20Path%20Traversal%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2ab359c34d0947f42a45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62508-cwe-79-improper-neutralization-of-i-234e0f70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62508%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=68f2aebd9c34d0947f437b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixes-highest-severity-aspnet-core-flaw--8086a971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20fixes%20highest-severity%20ASP.NET%20Core%20flaw%20ever&amp;severity=high&amp;id=68f2a7ae9c34d0947f41ca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/europol-dismantles-sim-box-operation-renting-numbe-fd267a13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Europol%20dismantles%20SIM%20box%20operation%20renting%20numbers%20for%20cybercrime&amp;severity=high&amp;id=68f2a7ae9c34d0947f41ca5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11913-path-traversal-in-shenzhen-ruiming--b07303b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11913%3A%20Path%20Traversal%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2a4339c34d0947f40c74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11912-sql-injection-in-shenzhen-ruiming-t-5612c2aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11912%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f2a4339c34d0947f40c744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11925-cwe-754-improper-check-for-unusual--a7ed82d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11925%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68f2a0a79c34d0947f3fb6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62511-cwe-367-time-of-check-time-of-use-t-c0bf1169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62511%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20zheny-creator%20YtGrabber-TUI&amp;severity=medium&amp;id=68f2a0a79c34d0947f3fb6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11911-sql-injection-in-shenzhen-ruiming-t-a90f5c5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11911%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f29d239c34d0947f3eff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11910-sql-injection-in-shenzhen-ruiming-t-fe6044ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11910%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f29d239c34d0947f3eff55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34282-cwe-918-server-side-request-forgery-82d72a6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34282%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThingsBoard%2C%20Inc.%20ThingsBoard&amp;severity=medium&amp;id=68f28f159c34d0947f3bb428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34281-cwe-79-improper-neutralization-of-i-c8b0980b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ThingsBoard%2C%20Inc.%20ThingsBoard&amp;severity=medium&amp;id=68f28f159c34d0947f3bb423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11909-sql-injection-in-shenzhen-ruiming-t-4d6d812d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11909%3A%20SQL%20Injection%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f28f159c34d0947f3bb41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11908-unrestricted-upload-in-shenzhen-rui-7cb292b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11908%3A%20Unrestricted%20Upload%20in%20Shenzhen%20Ruiming%20Technology%20Streamax%20Crocus&amp;severity=medium&amp;id=68f28f159c34d0947f3bb416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62505-cwe-918-server-side-request-forgery-0755ce4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62505%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lobehub%20lobe-chat&amp;severity=low&amp;id=68f28b909c34d0947f3b1473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malware-and-attack-expansion-a-hacker-gro-00b433af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Malware%20and%20Attack%20Expansion%3A%20A%20Hacker%20Group&apos;s%20Journey%20across%20Asia&amp;severity=medium&amp;id=68f5f5be58c1f730f1e065df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-disrupts-ransomware-campaign-abusing-azu-068b694c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Disrupts%20Ransomware%20Campaign%20Abusing%20Azure%20Certificates&amp;severity=medium&amp;id=68f43f2a77122960c1656a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62430-cwe-79-improper-neutralization-of-i-f8b4237d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f284899c34d0947f39a008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62424-cwe-22-improper-limitation-of-a-pat-31aeb83b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62424%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f27d809c34d0947f370a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-agent-security-whose-responsibility-is-it-0c7fc083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Agent%20Security%3A%20Whose%20Responsibility%20Is%20It%3F&amp;severity=medium&amp;id=68f43f2a77122960c1656a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiktok-videos-promoting-malware-installation-fri-o-c915aba1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TikTok%20Videos%20Promoting%20Malware%20Installation%2C%20(Fri%2C%20Oct%2017th)&amp;severity=low&amp;id=68f1f4589c34d0947f07f3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-russia-china-increasingly-using-ai-to-es-e188af61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%3A%20Russia%2C%20China%20Increasingly%20Using%20AI%20to%20Escalate%20Cyberattacks%20on%20the%20US&amp;severity=medium&amp;id=68f26f669c34d0947f3317a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62168-cwe-209-generation-of-error-message-87fa303f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62168%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20squid-cache%20squid&amp;severity=critical&amp;id=68f26f829c34d0947f331b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8414-cwe-20-improper-input-validation-in--77d2d526</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8414%3A%20CWE-20%20Improper%20Input%20Validation%20in%20silabs.com%20Simplicity%20SDK&amp;severity=critical&amp;id=68f26bed9c34d0947f3176bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/capi-backdoor-net-stealer-targeting-russian-auto-c-459ca4e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CAPI%20Backdoor%3A%20.NET%20Stealer%20Targeting%20Russian%20Auto-Commerce&amp;severity=medium&amp;id=68f268639c34d0947f2fb2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58747-cwe-79-improper-neutralization-of-i-732f4fea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58747%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=low&amp;id=68f268709c34d0947f2fc04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-chat-data-is-historys-most-thorough-record-of-e-60d469af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Chat%20Data%20Is%20History&apos;s%20Most%20Thorough%20Record%20of%20Enterprise%20Secrets.%20Secure%20It%20Wisely&amp;severity=medium&amp;id=68f43f2a77122960c1656a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62356-cwe-22-improper-limitation-of-a-pat-3d1f9415</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Qodo%20Qodo%20Gen&amp;severity=high&amp;id=68f264e59c34d0947f2e3de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11905-code-injection-in-yanyutao0402-chan-78b75398</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11905%3A%20Code%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f264e59c34d0947f2e3de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/email-bombs-exploit-lax-authentication-in-zendesk-691b5add</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Email%20Bombs%20Exploit%20Lax%20Authentication%20in%20Zendesk&amp;severity=high&amp;id=68f2615f9c34d0947f2ce6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11904-sql-injection-in-yanyutao0402-chanc-9b55c7e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11904%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f25ddf9c34d0947f2bbef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55085-cwe-125-out-of-bounds-read-in-eclip-133baa34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55085%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=high&amp;id=68f256d89c34d0947f29326a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48087-cwe-79-improper-neutralization-of-i-9e6124f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20C.%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=68f253519c34d0947f285c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11903-sql-injection-in-yanyutao0402-chanc-fc7d450f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11903%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f24fd29c34d0947f2503e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11902-sql-injection-in-yanyutao0402-chanc-94adf364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11902%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68f24fd29c34d0947f2503d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48044-cwe-863-incorrect-authorization-in--c0eb71bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48044%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68f24c4a9c34d0947f23ccc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-crowdstrike-vulnerabilities-cisa-lay-125ab212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20CrowdStrike%20Vulnerabilities%2C%20CISA%20Layoffs%2C%20Mango%20Data%20Breach&amp;severity=medium&amp;id=68f248bc9c34d0947f22e051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-combine-beavertail-and-otterc-a7507f78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Combine%20BeaverTail%20and%20OtterCookie%20into%20Advanced%20JS%20Malware&amp;severity=medium&amp;id=68f43e5777122960c1652c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-links-why-your-website-traffic-is-declining-f6cc87f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20links%3A%20why%20your%20website%20traffic%20is%20declining&amp;severity=medium&amp;id=68f268639c34d0947f2fb2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-package-with-adaptixc2-framework-agent-f-1419d77f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20package%20with%20AdaptixC2%20framework%20agent%20found%20in%20npm%20registry&amp;severity=medium&amp;id=68f268639c34d0947f2fb372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/links-to-porn-and-online-casinos-hidden-inside-cor-d8f2847a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Links%20to%20porn%20and%20online%20casinos%20hidden%20inside%20corporate%20websites&amp;severity=medium&amp;id=68f2293b9c34d0947f196f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-sensitive-data-from-auction-house-so-9f38a086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Steal%20Sensitive%20Data%20From%20Auction%20House%20Sotheby%E2%80%99s&amp;severity=medium&amp;id=68f229159c34d0947f196c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-perplexity-comet-browser-download-ads-pu-1dfe242f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Perplexity%20Comet%20Browser%20Download%20Ads%20Push%20Password%20Stealer%20Via%20Google%20Search&amp;severity=medium&amp;id=68f2259b9c34d0947f17c982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28815-vulnerability-in-hikvision-isecure--e6054b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28815%3A%20Vulnerability%20in%20Hikvision%20iSecure%20Center&amp;severity=critical&amp;id=68f30b9cba51437ed4a824e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28814-vulnerability-in-hikvision-isecure--c7ca8c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28814%3A%20Vulnerability%20in%20Hikvision%20iSecure%20Center&amp;severity=critical&amp;id=68f225aa9c34d0947f17ca54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/identity-security-your-first-and-last-line-of-defe-5497e0f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Identity%20Security%3A%20Your%20First%20and%20Last%20Line%20of%20Defense&amp;severity=medium&amp;id=68f43e5777122960c1652c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/powerschool-hacker-got-four-years-in-prison-a3f28143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PowerSchool%20hacker%20got%20four%20years%20in%20prison&amp;severity=medium&amp;id=68f222299c34d0947f168b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-watchguard-vpn-bug-that-could--71bc42b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20WatchGuard%20VPN%20Bug%20That%20Could%20Let%20Attackers%20Take%20Over%20Devices&amp;severity=high&amp;id=68f222299c34d0947f168b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/highest-ever-severity-score-assigned-by-microsoft--6b2f16c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%98Highest%20Ever%E2%80%99%20Severity%20Score%20Assigned%20by%20Microsoft%20to%20ASP.NET%20Core%20Vulnerability&amp;severity=high&amp;id=68f2220d9c34d0947f168903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11895-cwe-639-authorization-bypass-throug-1b08bc2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11895%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20letscms%20Binary%20MLM%20Plan&amp;severity=medium&amp;id=68f210859c34d0947f1033d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-watchguard-vpn-bug-that-could--9bfb583e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20WatchGuard%20VPN%20Bug%20That%20Could%20Let%20Attackers%20Take%20Over%20Devices&amp;severity=critical&amp;id=68f43e5777122960c1652c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-brief-nation-state-actor-steals-f5-source-c-a454f9e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Brief%3A%20Nation-State%20Actor%20Steals%20F5%20Source%20Code%20and%20Undisclosed%20Vulnerabilities&amp;severity=medium&amp;id=68f20cfe9c34d0947f0f3de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auction-giant-sothebys-says-data-breach-exposed-fi-1b9f42c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auction%20giant%20Sotheby%E2%80%99s%20says%20data%20breach%20exposed%20financial%20information&amp;severity=high&amp;id=68f20cfe9c34d0947f0f3dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-200-fraudulent-certificates-used-6335f99b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20200%20Fraudulent%20Certificates%20Used%20in%20Rhysida%20Ransomware%20Campaign&amp;severity=high&amp;id=68f209799c34d0947f0e6bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prosper-data-breach-impacts-176-million-accounts-a7e3f7f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prosper%20Data%20Breach%20Impacts%2017.6%20Million%20Accounts&amp;severity=medium&amp;id=68f2026a9c34d0947f0ce078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-allow-disruption-of-phoenix-contac-8b2315d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Allow%20Disruption%20of%20Phoenix%20Contact%20UPS%20Devices&amp;severity=low&amp;id=68f1fee59c34d0947f0b8972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-patches-exploited-centrestack-vulnerabili-581515c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20Patches%20Exploited%20CentreStack%20Vulnerability&amp;severity=low&amp;id=68f1f7e39c34d0947f094cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-reversed-amazons-kindle-web-obfuscation-beca-d4992c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Reversed%20Amazon&apos;s%20Kindle%20Web%20Obfuscation%20Because%20Their%20App%20Sucked&amp;severity=medium&amp;id=68f1ed649c34d0947f04cbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55087-cwe-1285-improper-validation-of-spe-169a084d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55087%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Eclipse%20Foundation%20NextX%20Duo&amp;severity=medium&amp;id=68f1df4d9c34d0947ffd557a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-200-fraudulent-certificates-used-e670ded8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20200%20Fraudulent%20Certificates%20Used%20in%20Rhysida%20Ransomware%20Campaign&amp;severity=medium&amp;id=68f43e5777122960c1652c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55100-cwe-125-out-of-bounds-read-in-eclip-3e5dda77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55100%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55099-cwe-125-out-of-bounds-read-in-eclip-a93ade97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55099%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55098-cwe-125-out-of-bounds-read-in-eclip-263a5a9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55097-cwe-125-out-of-bounds-read-in-eclip-17b5b763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55097%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20USBX&amp;severity=low&amp;id=68f1d8459c34d0947ffb7eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55096-cwe-191-integer-underflow-wrap-or-w-198a2eb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55096%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=low&amp;id=68f1d5f59c34d0947ffa1173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55094-cwe-125-out-of-bounds-read-in-eclip-c2a9d29e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55094%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d5f59c34d0947ffa1170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55093-cwe-126-buffer-over-read-in-eclipse-6b42688e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55093%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55092-cwe-125-out-of-bounds-read-in-eclip-db4e29df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55092%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11849-directory-traversal-in-mammoth-101efb9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11849%3A%20Directory%20Traversal%20in%20mammoth&amp;severity=medium&amp;id=68f1d13d9c34d0947ff86bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11900-cwe-78-improper-neutralization-of-s-acbc1deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11900%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HGiga%20iSherlock%204.5&amp;severity=critical&amp;id=68f1bf5fc417520e4ddfcc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11899-cwe-321-use-of-hard-coded-cryptogra-8545e765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11899%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Flowring%20Technology%20Agentflow&amp;severity=critical&amp;id=68f1bf5fc417520e4ddfcc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11898-cwe-23-relative-path-traversal-in-f-55a39568</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11898%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Flowring%20Technology%20Agentflow&amp;severity=high&amp;id=68f1bf5fc417520e4ddfcbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6950-cwe-798-use-of-hard-coded-credential-0e6643cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6950%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1b8039f8a5dbaea8c0706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6949-cwe-250-execution-with-unnecessary-p-a99a72ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6949%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1b8039f8a5dbaea8c0703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6894-cwe-250-execution-with-unnecessary-p-36bf7976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6894%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=medium&amp;id=68f1ba682c5d344c54e5d94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6893-cwe-250-execution-with-unnecessary-p-cd75690d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6893%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Moxa%20EDR-G9010%20Series&amp;severity=critical&amp;id=68f1ba682c5d344c54e5d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6892-cwe-863-incorrect-authorization-in-m-1b7367be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6892%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Moxa%20EDR-G9010%20Series&amp;severity=high&amp;id=68f1ba682c5d344c54e5d94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-17-ae57d6b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-17&amp;severity=medium&amp;id=68f2dc5c9c34d0947f4c6772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62645-cwe-266-incorrect-privilege-assignm-f73d8c8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62645%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=critical&amp;id=68f2aebd9c34d0947f437b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62644-cwe-359-exposure-of-private-persona-4ae35cea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62644%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2aebd9c34d0947f437b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62643-cwe-319-cleartext-transmission-of-s-b6270560</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62643%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=low&amp;id=68f2aebd9c34d0947f437b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62646-cwe-669-incorrect-resource-transfer-eb780049</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62646%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62649-cwe-603-use-of-client-side-authenti-796ca3f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62649%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62648-cwe-863-incorrect-authorization-in--d5cb6046</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62648%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62647-cwe-863-incorrect-authorization-in--c1266568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62647%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62642-cwe-862-missing-authorization-in-re-30946901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62642%3A%20CWE-862%20Missing%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62651-cwe-863-incorrect-authorization-in--290004b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62651%3A%20CWE-863%20Incorrect%20Authorization%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=medium&amp;id=68f2ab359c34d0947f42a452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62650-cwe-603-use-of-client-side-authenti-7dd89d61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62650%3A%20CWE-603%20Use%20of%20Client-Side%20Authentication%20in%20Restaurant%20Brands%20International%20assistant%20platform&amp;severity=high&amp;id=68f2ab359c34d0947f42a44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56221-na-8241ab30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56221%3A%20n%2Fa&amp;severity=critical&amp;id=68f28f159c34d0947f3bb42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31573-na-6bbe4db4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31573%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20XMLUnit%20XMLUnit%20for%20Java&amp;severity=medium&amp;id=68f28f159c34d0947f3bb40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56320-na-b4b10bb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56320%3A%20n%2Fa&amp;severity=medium&amp;id=68f28b909c34d0947f3b146e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56316-na-a3a35313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56316%3A%20n%2Fa&amp;severity=critical&amp;id=68f28b909c34d0947f3b146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56218-na-76fab4a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56218%3A%20n%2Fa&amp;severity=critical&amp;id=68f28b909c34d0947f3b1465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60514-na-40fa0634</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60514%3A%20n%2Fa&amp;severity=medium&amp;id=68f2880c9c34d0947f3a7c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57164-na-2f018d06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57164%3A%20n%2Fa&amp;severity=medium&amp;id=68f284899c34d0947f39a003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60279-na-e20ffaff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60279%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57567-na-0b493e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57567%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60361-na-ee4d8eca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60361%3A%20n%2Fa&amp;severity=low&amp;id=68f256d89c34d0947f29326d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60360-na-134777a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60360%3A%20n%2Fa&amp;severity=medium&amp;id=68f24fd29c34d0947f2503ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60359-na-e55dc443</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60359%3A%20n%2Fa&amp;severity=medium&amp;id=68f24fd29c34d0947f2503e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attacks-and-how-victims-respond-209d3c5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20attacks%20and%20how%20victims%20respond&amp;severity=medium&amp;id=68f1e9dc9c34d0947f026e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62504-cwe-416-use-after-free-in-envoyprox-c14c0eae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62504%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68f1639f9f8a5dbaea0c0fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11864-server-side-request-forgery-in-nucl-d71cf618</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11864%3A%20Server-Side%20Request%20Forgery%20in%20NucleoidAI%20Nucleoid&amp;severity=medium&amp;id=68f160199f8a5dbaea0a238f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattackers-target-lastpass-top-password-manage-b799d77d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattackers%20Target%20LastPass%2C%20Top%20Password%20Managers&amp;severity=medium&amp;id=68f1d64d9c34d0947ffa2453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-cisco-snmp-flaw-to-deploy-rootkit--f4740f32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploit%20Cisco%20SNMP%20flaw%20to%20deploy%20rootkit%20on%20switches&amp;severity=high&amp;id=68f1558c9f8a5dbaea04a4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42192-cwe-522-insufficiently-protected-cr-f3fb1c60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42192%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20HCL%20Software%20Traveler%20for%20Microsoft%20Outlook&amp;severity=medium&amp;id=68f159139f8a5dbaea066b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaks-in-microsoft-vs-code-marketplace-put-supply--49a36ffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaks%20in%20Microsoft%20VS%20Code%20Marketplace%20Put%20Supply%20Chain%20at%20Risk&amp;severity=medium&amp;id=68f1d64d9c34d0947ffa2456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11853-improper-access-controls-in-sismics-5c4175e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11853%3A%20Improper%20Access%20Controls%20in%20Sismics%20Teedy&amp;severity=medium&amp;id=68f143fc9f8a5dbaeaf964be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11852-missing-authentication-in-apeman-id-9979efc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11852%3A%20Missing%20Authentication%20in%20Apeman%20ID71&amp;severity=medium&amp;id=68f143fc9f8a5dbaeaf964b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11493-cwe-494-download-of-code-without-in-d5861a74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11493%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ConnectWise%20Automate&amp;severity=high&amp;id=68f143fc9f8a5dbaeaf964b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11492-cwe-319-cleartext-transmission-of-s-fc777e45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11492%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20ConnectWise%20Automate&amp;severity=critical&amp;id=68f143fc9f8a5dbaeaf964b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62428-cwe-601-url-redirection-to-untruste-89c6dd26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62428%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Drawing-Captcha%20Drawing-Captcha-APP&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34253-cwe-79-improper-neutralization-of-i-09432ac4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34253%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34255-cwe-204-observable-response-discrep-7591ef13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34255%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34254-cwe-204-observable-response-discrep-f010ccec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34254%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20D-Link%20Nuclias%20Connect&amp;severity=medium&amp;id=68f140779f8a5dbaeaf6e5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62427-cwe-918-server-side-request-forgery-4df3a1d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62427%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20angular%20angular-cli&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62425-cwe-620-unverified-password-change--3f03ac08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62425%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20element-hq%20matrix-authentication-service&amp;severity=high&amp;id=68f140779f8a5dbaeaf6e5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62423-cwe-89-improper-neutralization-of-s-81755ef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62423%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MacWarrior%20clipbucket-v5&amp;severity=medium&amp;id=68f13cf29f8a5dbaeaf4a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/misconfigured-netcorecloud-server-exposed-40-billi-77262a19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Misconfigured%20NetcoreCloud%20Server%20Exposed%2040%20Billion%20Records%20in%2013.4TB%20of%20Data&amp;severity=medium&amp;id=68f135f29f8a5dbaeaf0fc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62413-cwe-79-improper-neutralization-of-i-772b81f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62413%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emqx%20MQTTX&amp;severity=medium&amp;id=68f136089f8a5dbaeaf0ff12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34517-cwe-22-improper-limitation-of-a-pat-72f78f39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34517%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34514-cwe-78-improper-neutralization-of-s-46c53c9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34514%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34519-cwe-327-use-of-a-broken-or-risky-cr-ea145229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34519%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34512-cwe-79-improper-neutralization-of-i-f905e707</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34518-cwe-22-improper-limitation-of-a-pat-7e785b04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68f132679f8a5dbaeaef9b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34515-cwe-250-execution-with-unnecessary--40189c8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34515%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34513-cwe-78-improper-neutralization-of-s-c9bfc265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34513%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-group-on-the-block-unc5142-leverages-etherhidi-0deb2cf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Group%20on%20the%20Block%3A%20UNC5142%20Leverages%20EtherHiding%20to%20Distribute%20Malware&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfdd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-adopts-etherhiding-nation-state-malware-hidin-1806b93e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Adopts%20EtherHiding%3A%20Nation-State%20Malware%20Hiding%20on%20Blockchains&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odyssey-stealer-amos-hit-macos-developers-with-fak-34ce0793</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odyssey%20Stealer%20%26%20AMOS%20Hit%20macOS%20Developers%20with%20Fake%20Homebrew%20Sites&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-customers-it-has-not-been-hacked-am-a5289031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20Customers%20It%20Has%20Not%20Been%20Hacked%20Amid%20Phishing%20Emails&amp;severity=medium&amp;id=68f163919f8a5dbaea0bfe92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34516-cwe-1392-use-of-default-credentials-c75d55d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34516%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68f132679f8a5dbaeaef9b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62409-cwe-476-null-pointer-dereference-in-4f308a08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62409%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61924-cwe-184-incomplete-list-of-disallow-c8590deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61924%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20PrestaShopCorp%20ps_checkout&amp;severity=low&amp;id=68f12ee39f8a5dbaeaee6015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61923-cwe-22-improper-limitation-of-a-pat-1ec0b857</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61923%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PrestaShopCorp%20ps_checkout&amp;severity=medium&amp;id=68f12ee39f8a5dbaeaee6012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61922-cwe-287-improper-authentication-in--78f6af06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61922%3A%20CWE-287%3A%20Improper%20Authentication%20in%20PrestaShopCorp%20ps_checkout&amp;severity=critical&amp;id=68f12ee39f8a5dbaeaee601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61909-cwe-250-execution-with-unnecessary--26cce72e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61909%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Icinga%20icinga2&amp;severity=medium&amp;id=68f12ee39f8a5dbaeaee6018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62586-cwe-306-missing-authentication-for--57de8b07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62586%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20OPEXUS%20FOIAXpress&amp;severity=high&amp;id=68f12ee39f8a5dbaeaee6025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61908-cwe-476-null-pointer-dereference-in-994f39aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61908%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Icinga%20icinga2&amp;severity=high&amp;id=68f12b5e9f8a5dbaeaed1b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61907-cwe-200-exposure-of-sensitive-infor-d24c6554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61907%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icinga2&amp;severity=high&amp;id=68f12b5e9f8a5dbaeaed1b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-jewelbug-targets-russian-it-provi-9d00bf24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20Jewelbug%20targets%20Russian%20IT%20provider%20in%20rare%20cross-nation%20cyberattack&amp;severity=medium&amp;id=68f127e39f8a5dbaeaeb791e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activa-247742b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkPro%20Linux%20Rootkit%20Uses%20eBPF%20to%20Hide%20and%20Activates%20via%20Magic%20TCP%20Packets&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb790a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-maximum-severity-adobe-flaw-now-exploited-in--39d4ae62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Maximum-severity%20Adobe%20flaw%20now%20exploited%20in%20attacks&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-blockchain-smart-contracts-to-spread-8082c766</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Blockchain%20Smart%20Contracts%20to%20Spread%20Malware%20via%20Infected%20WordPress%20Sites&amp;severity=high&amp;id=68f127e39f8a5dbaeaeb7912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-context-protocol-credential-weakness-raises--07ba0af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Model%20Context%20Protocol%20credential%20weakness%20raises%20red%20flags%20%7C%20ReversingLabs&amp;severity=medium&amp;id=68f127e39f8a5dbaeaeb7922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-initiative-pwn2own-automotive-returns-to--b083b293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero%20Day%20Initiative%20%E2%80%94%20Pwn2Own%20Automotive%20Returns%20to%20Tokyo%20with%20Expanded%20Chargers%20and%20More!&amp;severity=critical&amp;id=68f127e39f8a5dbaeaeb791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gladinet-fixes-actively-exploited-zero-day-in-file-07cc4269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gladinet%20fixes%20actively%20exploited%20zero-day%20in%20file-sharing%20software&amp;severity=critical&amp;id=68f127e39f8a5dbaeaeb7906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-hackers-test-ai-optimized-attack-chains-in-t-aed01742</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Hackers%20Test%20AI-Optimized%20Attack%20Chains%20in%20Taiwan&amp;severity=medium&amp;id=68f127cc9f8a5dbaeaeb76d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61789-cwe-204-observable-response-discrep-99f0fa3c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61789%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Icinga%20icingadb-web&amp;severity=medium&amp;id=68f1284b9f8a5dbaeaeb9039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36128-cwe-772-missing-release-of-resource-a84859f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36128%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20IBM%20MQ&amp;severity=high&amp;id=68f124619f8a5dbaeaea87b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58051-cwe-841-improper-enforcement-of-beh-d1c6dc24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58051%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=68f124619f8a5dbaeaea87b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-famous-chollima-hackers-use-beavertai-1c556f66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea&apos;s%20Famous%20Chollima%20hackers%20Use%20BeaverTail%20and%20OtterCookie%20Malware%20in%20Job%20Scam&amp;severity=medium&amp;id=68f124519f8a5dbaeaea763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11851-cross-site-scripting-in-apeman-id71-edeb51ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11851%3A%20Cross%20Site%20Scripting%20in%20Apeman%20ID71&amp;severity=medium&amp;id=68f119c69f8a5dbaeae59d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11842-path-traversal-in-shazwazza-smidge-e071d5df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11842%3A%20Path%20Traversal%20in%20Shazwazza%20Smidge&amp;severity=medium&amp;id=68f112c09f8a5dbaeae05646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11840-out-of-bounds-read-in-gnu-binutils-8bd2a714</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11840%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68f112c09f8a5dbaeae0563d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9559-cwe-639-authorization-bypass-through-577eb5b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9559%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=68f112c09f8a5dbaeae0564d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-etherhiding-to-hide-malwa-3666fabe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20EtherHiding%20to%20Hide%20Malware%20Inside%20Blockchain%20Smart%20Contracts&amp;severity=medium&amp;id=68f1d5609c34d0947ff9968e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36002-password-in-configuration-file-in-i-1ccccda4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36002%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68f108349f8a5dbaeadb9478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41254-cwe-352-cross-site-request-forgery--e9855997</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41254%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=68f108349f8a5dbaeadb947b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-revokes-over-200-certificates-to-disrupt-66ed92fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Revokes%20Over%20200%20Certificates%20to%20Disrupt%20Ransomware%20Campaign&amp;severity=medium&amp;id=68f104a69f8a5dbaeada4666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkpro-linux-rootkit-uses-ebpf-to-hide-and-activa-fbc386d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkPro%20Linux%20Rootkit%20Uses%20eBPF%20to%20Hide%20and%20Activates%20via%20Magic%20TCP%20Packets&amp;severity=medium&amp;id=68f1d5609c34d0947ff99694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41253-cwe-917-improper-neutralization-of--c34c7bed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41253%3A%20CWE-917%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20VMware%20Spring%20Cloud%20Gateway%20Server%20Webflux&amp;severity=high&amp;id=68f104c59f8a5dbaeada61fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/denial-of-fuzzing-rust-in-the-windows-kernel-6b4f7100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Denial%20of%20Fuzzing%3A%20Rust%20in%20the%20Windows%20kernel&amp;severity=low&amp;id=68f101329f8a5dbaead96a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11839-unchecked-return-value-in-gnu-binut-f93c4b52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11839%3A%20Unchecked%20Return%20Value%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68f0fda89f8a5dbaead89164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46752-information-disclosure-in-fortinet--1889cdb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46752%3A%20Information%20disclosure%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead8916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53950-information-disclosure-in-fortinet--62e1c919</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53950%3A%20Information%20disclosure%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead8916f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53951-escalation-of-privilege-in-fortinet-7e4ebf82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53951%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiDLP&amp;severity=medium&amp;id=68f0fda89f8a5dbaead89172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54658-escalation-of-privilege-in-fortinet-8f87356a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54658%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiDLP&amp;severity=high&amp;id=68f0fda89f8a5dbaead89175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/postgresql-13-end-of-life-lansweeper-b22bb2e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PostgreSQL%2013%20End%20of%20Life%20-%20Lansweeper&amp;severity=medium&amp;id=68f0f04f9f8a5dbaead45d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aisle-emerges-from-stealth-with-ai-based-reasoning-93416730</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AISLE%20Emerges%20From%20Stealth%20With%20AI-Based%20Reasoning%20System%20to%20Remediate%20Vulnerabilities%20on%20the%20Fly&amp;severity=medium&amp;id=68f0f0329f8a5dbaead45ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9152-vulnerability-in-wso2-wso2-api-manag-67b8e91f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9152%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=68f0ec159f8a5dbaead3754e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9804-vulnerability-in-wso2-wso2-identity--2d9ea20f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9804%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=critical&amp;id=68f0ec159f8a5dbaead37551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/organizations-warned-of-exploited-adobe-aem-forms--57e72b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Organizations%20Warned%20of%20Exploited%20Adobe%20AEM%20Forms%20Vulnerability&amp;severity=medium&amp;id=68f0e5029f8a5dbaead026db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9955-vulnerability-in-wso2-wso2-enterpris-efc29a4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9955%3A%20Vulnerability%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=68f0e51d9f8a5dbaead0282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10611-vulnerability-in-wso2-wso2-api-mana-3a47c8f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10611%3A%20Vulnerability%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=68f0e51d9f8a5dbaead0282c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fuji-electric-hmi-configurator-flaws-expose-indust-5ad75406</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fuji%20Electric%20HMI%20Configurator%20Flaws%20Expose%20Industrial%20Organizations%20to%20Hacking&amp;severity=medium&amp;id=68f0ddfd9f8a5dbaeacdfb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/architectures-risks-and-adoption-how-to-assess-and-dbfdcdc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Architectures%2C%20Risks%2C%20and%20Adoption%3A%20How%20to%20Assess%20and%20Choose%20the%20Right%20AI-SOC%20Platform&amp;severity=medium&amp;id=68f1d5609c34d0947ff99697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-silk-lure-scheduled-tasks-weaponized-for-10d54c6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Silk%20Lure%3A%20Scheduled%20Tasks%20Weaponized%20for%20DLL%20Side-Loading%20(drops%20ValleyRAT)&amp;severity=medium&amp;id=68f108289f8a5dbaeadb936b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-deploy-linux-rootkits-via-cisco-snmp-flaw--b71dcbef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Deploy%20Linux%20Rootkits%20via%20Cisco%20SNMP%20Flaw%20in%20&apos;Zero%20Disco&apos;%20Attacks&amp;severity=low&amp;id=68f1d5609c34d0947ff9969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tech-support-scam-uses-microsoft-logo-to-fake--4f1305a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Tech%20Support%20Scam%20Uses%20Microsoft%20Logo%20to%20Fake%20Browser%20Lock%20to%20Steal%20Data&amp;severity=medium&amp;id=68f0da7d9f8a5dbaeacca292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-routers-hacked-for-rootkit-deployment-822a906c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Routers%20Hacked%20for%20Rootkit%20Deployment&amp;severity=medium&amp;id=68f0d36e9f8a5dbaeaca1504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-cambodian-executive-in-massive-crypto-s-fee93d6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Charges%20Cambodian%20Executive%20in%20Massive%20Crypto%20Scam%20and%20Seizes%20More%20Than%20%2414%20Billion%20in%20Bitcoin&amp;severity=medium&amp;id=68f0cfea9f8a5dbaeac8de38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-the-hidden-costs-of-pen-testing-6c760732</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20the%20Hidden%20Costs%20of%20Pen%20Testing&amp;severity=medium&amp;id=68f1d5609c34d0947ff9969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-with-a-new-javascript-module-ac262daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20with%20a%20new%20Javascript%20module&amp;severity=medium&amp;id=68f108289f8a5dbaeadb937f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58426-use-of-hard-coded-cryptographic-key-32bdd84c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58426%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58079-improper-protection-of-alternate-pa-7329530d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58079%3A%20Improper%20Protection%20of%20Alternate%20Path%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55072-cross-site-scripting-xss-in-neojapa-8e15e819</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55072%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54859-cross-site-scripting-xss-in-neojapa-5038059c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54859%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54760-cross-site-scripting-xss-in-neojapa-3722dd85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54760%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52583-cross-site-scripting-xss-in-neojapa-9e957c7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52583%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20Web%20Server&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24833-cross-site-scripting-xss-in-neojapa-99ec283d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24833%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20desknet&apos;s%20NEO&amp;severity=medium&amp;id=68f0c5669f8a5dbaeac6c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/four-year-prison-sentence-for-powerschool-hacker-72f30719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Four-Year%20Prison%20Sentence%20for%20PowerSchool%20Hacker&amp;severity=medium&amp;id=68f0be569f8a5dbaeac537dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6338-cwe-459-incomplete-cleanup-in-the-qt-517f4824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6338%3A%20CWE-459%20Incomplete%20Cleanup%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68f0be6f9f8a5dbaeac53a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-15b-crypto-bust-satellite-spyi-05370867</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20%2415B%20Crypto%20Bust%2C%20Satellite%20Spying%2C%20Billion-Dollar%20Smishing%2C%20Android%20RATs%20%26%20More&amp;severity=medium&amp;id=68f0bace9f8a5dbaeac43ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58115-cross-site-scripting-xss-in-neojapa-1b7e34a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58115%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac23886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54461-insufficient-granularity-of-access--e9303ffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54461%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac23882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53858-cross-site-scripting-xss-in-neojapa-de1b3eda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53858%3A%20Cross-site%20scripting%20(XSS)%20in%20NEOJAPAN%20Inc.%20ChatLuck&amp;severity=medium&amp;id=68f0b5089f8a5dbaeac2387e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-hack-attack-linked-to-china-big-ip-flaws-patche-70a8b07b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Hack%3A%20Attack%20Linked%20to%20China%2C%20BIG-IP%20Flaws%20Patched%2C%20Governments%20Issue%20Alerts&amp;severity=medium&amp;id=68f0b0469f8a5dbaeabeb78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61581-cwe-1333-inefficient-regular-expres-b2ce45c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61581%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Control&amp;severity=high&amp;id=68f0b5089f8a5dbaeac2388a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0277-cwe-693-protection-mechanism-failure-16cb869d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0277%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20BigFix%20Mobile&amp;severity=medium&amp;id=68f0b05f9f8a5dbaeabeba55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54539-cwe-502-deserialization-of-untruste-8253ccf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54539%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20NMS%20AMQP%20Client&amp;severity=critical&amp;id=68f0accc9f8a5dbaeaba941c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0276-cwe-693-protection-mechanism-failure-b5e4a800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0276%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20BigFix%20Modern%20Client%20Management&amp;severity=medium&amp;id=68f0accc9f8a5dbaeaba9419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41021-cwe-79-improper-neutralization-of-i-32d08f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sergestec%20SISTICK&amp;severity=medium&amp;id=68f0b5099f8a5dbaeac23896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41020-cwe-639-authorization-bypass-throug-a017f033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41020%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Sergestec%20Exito&amp;severity=high&amp;id=68f0b5089f8a5dbaeac23893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41019-cwe-89-improper-neutralization-of-s-562ea712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41019%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sergestec%20SISTICK&amp;severity=critical&amp;id=68f0b5089f8a5dbaeac23890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55091-cwe-125-out-of-bounds-read-in-eclip-b3264547</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55091%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f0b5099f8a5dbaeac23899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41018-cwe-89-improper-neutralization-of-s-90a50b37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41018%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sergestec%20Exito&amp;severity=critical&amp;id=68f0b5089f8a5dbaeac2388d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62585-cwe-358-improperly-implemented-secu-17c01d07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62585%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=68f0983c20d29eed058254bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62584-cwe-346-origin-validation-error-in--8efee3aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62584%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=68f0983c20d29eed058254b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62583-cwe-358-improperly-implemented-secu-51576771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62583%3A%20CWE-358%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=68f0983c20d29eed058254b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10849-cwe-862-missing-authorization-in-ri-40ca6a46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10849%3A%20CWE-862%20Missing%20Authorization%20in%20RiceTheme%20Felan%20Framework&amp;severity=medium&amp;id=68f0983c20d29eed058254ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10850-cwe-798-use-of-hard-coded-credentia-3db122b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10850%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20RiceTheme%20Felan%20Framework&amp;severity=critical&amp;id=68f0983c20d29eed058254b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10742-cwe-639-authorization-bypass-throug-3b4248e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10742%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dreamstechnologies%20Truelysell%20Core&amp;severity=critical&amp;id=68f0983c20d29eed058254aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10706-cwe-862-missing-authorization-in-cr-aff2e787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10706%3A%20CWE-862%20Missing%20Authorization%20in%20Cridio%20Studio%20ClassifiedPro%20-%20reCommerce%20WordPress%20Theme&amp;severity=high&amp;id=68f0983c20d29eed058254a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55090-cwe-125-out-of-bounds-read-in-eclip-692b0402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55090%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f09eb3b8696e8de1b1589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55089-cwe-119-improper-restriction-of-ope-68ad5817</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55089%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Eclipse%20Foundation%20FileX&amp;severity=critical&amp;id=68f0938de05ddc61b131ce1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55084-cwe-126-buffer-over-read-in-eclipse-3c83968d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55084%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68f0938de05ddc61b131ce1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58778-hidden-functionality-in-ruijie-netw-a3e1db1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58778%3A%20Hidden%20functionality%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20RG-EST300&amp;severity=high&amp;id=68f08e21e05ddc61b12878f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0275-cwe-306-missing-authentication-for-c-20f46470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0275%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCL%20Software%20BigFix%20Mobile&amp;severity=medium&amp;id=68f083e40279cbc56ef7734e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0274-cwe-306-missing-authentication-for-c-590dbebc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0274%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HCL%20Software%20BigFix%20Modern%20Client%20Management&amp;severity=medium&amp;id=68f07c48b3384a6fd3f74acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11814-cwe-79-improper-neutralization-of-i-517fad7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=68f076d9b3384a6fd3edb858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-adobe-aem-flaw-with-perfect-100-score-a-a57d6b9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Adobe%20AEM%20Flaw%20with%20Perfect%2010.0%20Score%20%E2%80%94%20Already%20Under%20Active%20Attack&amp;severity=critical&amp;id=68f0b4f79f8a5dbaeac236f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10700-cwe-352-cross-site-request-forgery--b26a79c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10700%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elemntor%20Ally%20%E2%80%93%20Web%20Accessibility%20%26%20Usability&amp;severity=medium&amp;id=68f05ee44f645e963f14c52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62580-cwe-121-stack-based-buffer-overflow-3b731f6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62580%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=68f06f6c79054d06ca3cb5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62579-cwe-121-stack-based-buffer-overflow-b5ee64a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62579%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ASDA-Soft&amp;severity=high&amp;id=68f06f6c79054d06ca3cb5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11683-cwe-119-improper-restriction-of-ope-574c85a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11683%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TODDR%20YAML%3A%3ASyck&amp;severity=medium&amp;id=68f03f534f645e963f083876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-16-63acfc99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-16&amp;severity=medium&amp;id=68f18a389f8a5dbaea422005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60358-na-b0ae39a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60358%3A%20n%2Fa&amp;severity=medium&amp;id=68f1520b9f8a5dbaea02a8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61539-na-d2027800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61539%3A%20n%2Fa&amp;severity=medium&amp;id=68f14e869f8a5dbaea003e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60855-na-353018e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60855%3A%20n%2Fa&amp;severity=medium&amp;id=68f14b039f8a5dbaeafdfa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61554-na-5bcaaf8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61554%3A%20n%2Fa&amp;severity=medium&amp;id=68f14b039f8a5dbaeafdfa84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61553-na-2967dd9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61553%3A%20n%2Fa&amp;severity=high&amp;id=68f143fc9f8a5dbaeaf964c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61514-na-aea655d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61514%3A%20n%2Fa&amp;severity=medium&amp;id=68f13cf29f8a5dbaeaf4a7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60639-na-c2bfa4e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60639%3A%20n%2Fa&amp;severity=medium&amp;id=68f136089f8a5dbaeaf0ff0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61330-na-5ddd016e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61330%3A%20n%2Fa&amp;severity=medium&amp;id=68f132689f8a5dbaeaef9be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60641-na-8326e285</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60641%3A%20n%2Fa&amp;severity=medium&amp;id=68f132679f8a5dbaeaef9b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56699-na-7cf72c62</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56699%3A%20n%2Fa&amp;severity=medium&amp;id=68f124619f8a5dbaeaea87bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56700-na-f5ebe7af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56700%3A%20n%2Fa&amp;severity=medium&amp;id=68f120ce9f8a5dbaeae91931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61540-na-4efd01ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61540%3A%20n%2Fa&amp;severity=medium&amp;id=68f112c09f8a5dbaeae05654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22381-na-b7568af4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22381%3A%20n%2Fa&amp;severity=high&amp;id=68f112c09f8a5dbaeae05650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61543-na-3a4a6de4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61543%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb9488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61541-na-a7982b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61541%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb9483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61536-na-10fa8bb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61536%3A%20n%2Fa&amp;severity=high&amp;id=68f108349f8a5dbaeadb947f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mysterious-elephant-moves-beyond-recycled-malware-1e494d03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Mysterious%20Elephant&apos;%20Moves%20Beyond%20Recycled%20Malware&amp;severity=medium&amp;id=68f04b034f645e963f102fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43282-an-app-may-be-able-to-cause-unexpec-53003581</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43282%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d1301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43313-an-app-may-be-able-to-access-sensit-d4b1485a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43313%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43280-forwarding-an-email-could-display-r-3f9ce239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43280%3A%20Forwarding%20an%20email%20could%20display%20remote%20images%20in%20Mail%20in%20Lockdown%20Mode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f00082d6afaf303e7d12fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43281-a-local-attacker-may-be-able-to-ele-c4f67dac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43281%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68f00082d6afaf303e7d12fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11619-cwe-295-improper-certificate-valida-cd73fcd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11619%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Devolutions%20Devolutions%20Server&amp;severity=high&amp;id=68f00082d6afaf303e7d1310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11568-improper-validation-of-specified-qu-ff058e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11568%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Latchset%20luksmeta&amp;severity=medium&amp;id=68effb19d6afaf303e734bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62375-cwe-295-improper-certificate-valida-1e430518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62375%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20in-toto%20go-witness&amp;severity=medium&amp;id=68eff91f8fdbc4b28b29b763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11832-cwe-770-allocation-of-resources-wit-5c379ebf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11832%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Azure%20Access%20Technology%20BLU-IC2&amp;severity=critical&amp;id=68eff3b78fdbc4b28b200684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-big-ip-environment-breached-by-nation-state-act-b206e6d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20BIG-IP%20Environment%20Breached%20by%20Nation-State%20Actor&amp;severity=medium&amp;id=68f04b034f645e963f102fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wiretap-and-battering-ram-attacks-on-tees-kaspersk-f6dbea37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WireTap%20and%20Battering%20RAM%3A%20attacks%20on%20TEEs%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68eff2298fdbc4b28b1cbaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-releases-big-ip-patches-for-stolen-security-vul-4d23cf6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20releases%20BIG-IP%20patches%20for%20stolen%20security%20vulnerabilities&amp;severity=high&amp;id=68efee6e610883e4f9527ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-confirms-nation-state-breach-source-code-and-vu-de96bb17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Confirms%20Nation-State%20Breach%2C%20Source%20Code%20and%20Vulnerability%20Data%20Stolen&amp;severity=high&amp;id=68efe74cd1a220c1e982638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-oct-2025-fixs-175-vulnerab-61c0cd4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20Oct%202025%20Fixs%20175%20Vulnerabilities%20including%203%20Zero-Days&amp;severity=medium&amp;id=68efdc66d4cab3a2882c910f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-group-jewelbug-quietly-infiltrated--7dd94623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Group%20&apos;Jewelbug&apos;%20Quietly%20Infiltrated%20Russian%20IT%20Network%20for%20Months&amp;severity=medium&amp;id=68f049d84f645e963f0fedfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62371-cwe-295-improper-certificate-valida-580b94d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62371%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20opensearch-project%20data-prepper&amp;severity=high&amp;id=68efdcb86817339dcf782799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62410-cwe-1321-improperly-controlled-modi-fdcd7008</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62410%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20capricorn86%20happy-dom&amp;severity=critical&amp;id=68efdcb86817339dcf78279f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62381-cwe-1321-improperly-controlled-modi-ac03fd09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62381%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20ciscoheat%20sveltekit-superforms&amp;severity=high&amp;id=68efd906d4cab3a288267939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-says-hackers-stole-undisclosed-big-ip-flaws-sou-a9712439</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20says%20hackers%20stole%20undisclosed%20BIG-IP%20flaws%2C%20source%20code&amp;severity=high&amp;id=68efd8e8d4cab3a288255172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clothing-giant-mango-discloses-data-breach-exposin-e11687b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clothing%20giant%20MANGO%20discloses%20data%20breach%20exposing%20customer%20info&amp;severity=high&amp;id=68efd8e8d4cab3a28825516e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62382-cwe-73-external-control-of-file-nam-bfb81067</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62382%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20blakeblackshear%20frigate&amp;severity=high&amp;id=68efd906d4cab3a28826793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62378-cwe-706-use-of-incorrectly-resolved-37e47862</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62378%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20underctrl-io%20commandkit&amp;severity=medium&amp;id=68efd53e346ce4cfc57b3a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-latest-mirai-wave-exploiting-tbk-d-aec68058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Maverick%3A%20a%20new%20banking%20trojan%20abusing%20WhatsApp%20in%20a%20massive%20scale%20distribution&amp;severity=medium&amp;id=684585c571f4d251b54eaf44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10577-cwe-266-in-hp-inc-sound-research-1b898718</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10577%3A%20CWE-266%20in%20HP%2C%20Inc.%20Sound%20Research&amp;severity=high&amp;id=68efd53e346ce4cfc57b3a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10576-cwe-266-in-hp-inc-sound-research-989a82a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10576%3A%20CWE-266%20in%20HP%2C%20Inc.%20Sound%20Research&amp;severity=high&amp;id=68efd53e346ce4cfc57b3a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62380-cwe-79-improper-neutralization-of-i-ed39fc35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62380%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68efd53e346ce4cfc57b3a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54271-time-of-check-time-of-use-toctou-ra-cc64b448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54271%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(CWE-367)%20in%20Adobe%20Creative%20Cloud%20Desktop&amp;severity=medium&amp;id=68efce11ed06978b6a61650d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20360-buffer-access-with-incorrect-length-23f4019f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20360%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68efca8eed06978b6a597396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20359-buffer-under-read-in-cisco-cisco-cy-3e3310ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20359%3A%20Buffer%20Under-read%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68efca8eed06978b6a597393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20351-improper-neutralization-of-input-du-5d374e7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68efca8eed06978b6a597390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20350-stack-based-buffer-overflow-in-cisc-c634f8d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20350%3A%20Stack-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=high&amp;id=68efca8eed06978b6a59738d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20329-insertion-of-sensitive-information--04505814</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20329%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Cisco%20Cisco%20RoomOS%20Software&amp;severity=medium&amp;id=68efca8eed06978b6a59738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58133-cwe-288-authentication-bypass-using-cb4811d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58133%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Zoom%20Communications%20Inc.%20Zoom%20Rooms&amp;severity=medium&amp;id=68efca8eed06978b6a59739c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58132-cwe-77-improper-neutralization-of-s-c9aaea6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58132%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=68efca8eed06978b6a597399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-breach-exposes-big-ip-source-code-nation-state--b1c16ce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Breach%20Exposes%20BIG-IP%20Source%20Code%20%E2%80%94%20Nation-State%20Hackers%20Behind%20Massive%20Intrusion&amp;severity=high&amp;id=68f049d84f645e963f0fedfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62379-cwe-601-url-redirection-to-untruste-1f153e25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62379%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20reflex-dev%20reflex&amp;severity=low&amp;id=68efc69b60c3b60ff6f859d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62370-cwe-248-uncaught-exception-in-alloy-1df2a86c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62370%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20alloy-rs%20core&amp;severity=high&amp;id=68efbf6451297e5c13a0013f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2529-cwe-228-improper-handling-of-syntact-a4434123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2529%3A%20CWE-228%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20IBM%20Terracotta&amp;severity=low&amp;id=68efbf6451297e5c13a0013c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61990-cwe-415-double-free-in-f5-big-ip-56894874</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61990%3A%20CWE-415%20Double%20Free%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a00152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57780-cwe-250-in-f5-f5os-appliance-4e839be1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57780%3A%20CWE-250%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=68efbf6451297e5c13a00146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61933-cwe-79-improper-neutralization-of-i-bb5e3347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61933%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efbf6451297e5c13a0014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58071-cwe-457-use-of-uninitialized-variab-09e0d98d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58071%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a00149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61935-cwe-252-unchecked-return-value-in-f-86ebebb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61935%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efbf6451297e5c13a0014f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53860-cwe-214-invocation-of-process-using-5be1347d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53860%3A%20CWE-214%3A%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efbbee51297e5c1399a27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-university-breached-in-oracle-zero-day-att-b34cf7be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20University%20Breached%20in%20Oracle%20Zero-Day%20Attack&amp;severity=medium&amp;id=68f04b034f645e963f102fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/f5-blames-nation-state-hackers-for-theft-of-source-dcae8651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=F5%20Says%20Nation-State%20Hackers%20Stole%20Source%20Code%20and%20Vulnerability%20Data&amp;severity=medium&amp;id=68efb494ea97afbedf527648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10699-cwe-295-improper-certificate-valida-1fb34407</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10699%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20LeCloud%20Client&amp;severity=medium&amp;id=68efb2aeea97afbedf4f99ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10581-cwe-427-uncontrolled-search-path-el-d06dac66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10581%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68efb2aeea97afbedf4f99a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9548-cwe-476-null-pointer-dereference-in--6befc85e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9548%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Lenovo%20Power%20Management%20Driver&amp;severity=medium&amp;id=68efb2aeea97afbedf4f99b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8486-cwe-250-execution-with-unnecessary-p-b2064c24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8486%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68efb2aeea97afbedf4f99b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6026-cwe-295-improper-certificate-validat-84af9df2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6026%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Lenovo%20Universal%20Device%20Client&amp;severity=low&amp;id=68efb2aeea97afbedf4f99b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-vs-code-extensions-exposed-developers-to--aa4e76a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20VS%20Code%20Extensions%20Exposed%20Developers%20to%20Hidden%20Supply%20Chain%20Risks&amp;severity=critical&amp;id=68f049d84f645e963f0fee01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55083-cwe-126-buffer-over-read-in-eclipse-aede0deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55083%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68efb0ddb00d656ee54120bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60015-cwe-787-out-of-bounds-write-in-f5-f-464f4b71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60015%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99527d7577a180040de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54755-cwe-146-improper-neutralization-of--8718748c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a1800408c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59483-cwe-73-external-control-of-file-nam-66d2033f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59483%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61974-cwe-401-missing-release-of-memory-a-54b96a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61974%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59481-cwe-250-execution-with-unnecessary--83f0750d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59481%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61960-cwe-476-null-pointer-dereference-in-c64305e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61960%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61955-cwe-95-improper-neutralization-of-d-82ec768a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61955%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=68efa99527d7577a180040ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54854-cwe-125-out-of-bounds-read-in-f5-bi-60ca6c22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54854%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61958-cwe-250-execution-with-unnecessary--f7a64daa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61958%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53521-cwe-770-allocation-of-resources-wit-0dad3b3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53521%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20F5%20BIG-IP&amp;severity=critical&amp;id=68efa99327d7577a18004061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58096-cwe-787-out-of-bounds-write-in-f5-b-cb8c6bef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58096%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54858-cwe-674-uncontrolled-recursion-in-f-7dd2f977</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54858%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53868-cwe-78-improper-neutralization-of-s-768dd43b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53868%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58120-cwe-476-null-pointer-dereference-in-a3b4c3e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58120%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=high&amp;id=68efa99427d7577a180040a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60013-cwe-78-improper-neutralization-of-s-ed76e46f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60013%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99427d7577a180040cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61951-cwe-125-out-of-bounds-read-in-f5-bi-b26ff8f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61951%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53856-cwe-705-incorrect-control-flow-scop-ad63bf5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53856%3A%20CWE-705%20Incorrect%20Control%20Flow%20Scoping%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54479-cwe-787-out-of-bounds-write-in-f5-b-0f2f407b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54479%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a1800406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59778-cwe-770-allocation-of-resources-wit-7ce0575e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59778%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20F5OS%20-%20Chassis&amp;severity=high&amp;id=68efa99427d7577a180040c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54805-cwe-401-missing-release-of-memory-a-0578be16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54805%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=medium&amp;id=68efa99427d7577a1800408f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55670-cwe-770-allocation-of-resources-wit-63c09158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55670%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP%20Next%20SPK&amp;severity=medium&amp;id=68efa99427d7577a1800409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41430-cwe-770-allocation-of-resources-wit-4d6ce177</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41430%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18001345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61938-cwe-1284-improper-validation-of-spe-d71ab58b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61938%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58424-cwe-340-generation-of-predictable-n-6aa3aad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58424%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55036-cwe-787-out-of-bounds-write-in-f5-b-439be2f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55036%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a18004098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59781-cwe-459-incomplete-cleanup-in-f5-bi-45c32ff3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59781%3A%20CWE-459%20Incomplete%20Cleanup%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47150-cwe-401-missing-release-of-memory-a-22acb820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47150%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=68efa99327d7577a18004055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46706-cwe-770-allocation-of-resources-wit-a0e8f6db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46706%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18001348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55669-cwe-672-operation-on-a-resource-aft-de0ddcac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55669%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a1800409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48008-cwe-416-use-after-free-in-f5-big-ip-df4215d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48008%3A%20CWE-416%20Use%20After%20Free%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a18004058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58153-cwe-703-improper-check-or-handling--e79a969e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58153%3A%20CWE-667%20Improper%20Locking%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60016-cwe-119-improper-restriction-of-ope-bba05d17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60016%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99527d7577a180040e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59478-cwe-824-access-of-uninitialized-poi-e0dd4b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59478%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99427d7577a180040c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58474-cwe-770-allocation-of-resources-wit-fd730576</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58474%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47148-cwe-404-improper-resource-shutdown--20dde908</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47148%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99327d7577a1800134b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59269-cwe-79-improper-neutralization-of-i-8270cfe4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59268-cwe-201-in-f5-big-ip-35754850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59268%3A%20CWE-201%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=68efa99427d7577a180040ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53474-cwe-120-buffer-copy-without-checkin-cd786f84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53474%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68efa99327d7577a1800405e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/singularity-deep-dive-into-a-modern-stealth-linux--d9610ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Singularity%3A%20Deep%20Dive%20into%20a%20Modern%20Stealth%20Linux%20Kernel%20Rootkit%20%E2%80%93%20Kyntra%20Blog&amp;severity=medium&amp;id=68efa99227d7577a18001308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customer-service-firm-5ca-denies-responsibility-fo-9e15361c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Customer%20Service%20Firm%205CA%20Denies%20Responsibility%20for%20Discord%20Data%20Breach&amp;severity=medium&amp;id=68ef9edba4b88470136161a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elasticsearch-server-leak-exposes-6-billion-record-569ea046</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elasticsearch%20Server%20Leak%20Exposes%206%20Billion%20Records%20from%20Scraping%2C%20Old%20and%20New%20Breaches&amp;severity=medium&amp;id=68ef9f0aa4b884701362a8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9640-vulnerability-in-red-hat-red-hat-ent-80ad4a53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9640%3A%20Use%20of%20Uninitialized%20Resource&amp;severity=medium&amp;id=68ef9b21178f764e1f470999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10869-cwe-79-improper-neutralization-of-i-95d18883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Oct8ne%20Chatbot&amp;severity=medium&amp;id=68ef9b21178f764e1f470996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fake-google-job-offer-email-scam-targets-works-e375a8bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fake%20Google%20Job%20Offer%20Email%20Scam%20Targets%20Workspace%20and%20Microsoft%20365%20Users&amp;severity=medium&amp;id=68ef8c9dedb8272845fde0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-attackers-bypass-synced-passkeys-7002d36c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Attackers%20Bypass%20Synced%20Passkeys&amp;severity=medium&amp;id=68f049d84f645e963f0fee04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ics-patch-tuesday-fixes-announced-by-siemens-schne-4c1e9412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ICS%20Patch%20Tuesday%3A%20Fixes%20Announced%20by%20Siemens%2C%20Schneider%2C%20Rockwell%2C%20ABB%2C%20Phoenix%20Contact&amp;severity=medium&amp;id=68ef8561290e66ee3b417082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55082-cwe-125-out-of-bounds-read-in-eclip-36fb26e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55082%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68ef81e7290e66ee3b3a9f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55081-cwe-126-buffer-over-read-in-eclipse-d2c5befb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55081%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Eclipse%20Foundation%20NetX%20Duo&amp;severity=medium&amp;id=68ef7e24507ec470927a1454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unencrypted-satellites-expose-global-communication-97b78012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unencrypted%20satellites%20expose%20global%20communications&amp;severity=medium&amp;id=68ef736aa13d368f6fc3c5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-new-windows-zero-days-exploited-in-the-wild-on-b19f3281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20New%20Windows%20Zero-Days%20Exploited%20in%20the%20Wild%20%E2%80%94%20One%20Affects%20Every%20Version%20Ever%20Shipped&amp;severity=medium&amp;id=68f049d84f645e963f0fee07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anatomy-of-an-attack-the-blacksuit-blitz-at-a-glob-c314d471</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anatomy%20of%20an%20Attack%3A%20The%20%22BlackSuit%20Blitz%22%20at%20a%20Global%20Equipment%20Manufacturer&amp;severity=medium&amp;id=68ef64715578b80782323ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-ictbroadcast-servers-via-cookie-exp-e8c39b79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20ICTBroadcast%20Servers%20via%20Cookie%20Exploit%20to%20Gain%20Remote%20Shell%20Access&amp;severity=high&amp;id=68ef64715578b80782323aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-cvss-100-bugs-in-red-lion-rtus-could-hand-hack-a06f3f21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20CVSS%2010.0%20Bugs%20in%20Red%20Lion%20RTUs%20Could%20Hand%20Hackers%20Full%20Industrial%20Control&amp;severity=medium&amp;id=68ef64715578b80782323aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10194-cwe-79-improper-neutralization-of-i-2adcd731</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10194%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eflyjason%20Shortcode%20Button&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5696b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11701-cwe-862-missing-authorization-in-qu-bd0773d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11701%3A%20CWE-862%20Missing%20Authorization%20in%20quicoto%20Zip%20Attachments&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10056-cwe-918-server-side-request-forgery-8ac7cbb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10056%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20miunosoft%20Task%20Scheduler&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11728-cwe-306-missing-authentication-for--38282594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11728%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20oceanpayment%20Oceanpayment%20CreditCard%20Gateway&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10313-cwe-862-missing-authorization-in-ja-62fd2fa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10313%3A%20CWE-862%20Missing%20Authorization%20in%20jankimoradiya%20Find%20And%20Replace%20content%20for%20WordPress&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11196-cwe-200-exposure-of-sensitive-infor-ea14ff45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11196%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tbenyon%20External%20Login&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10486-cwe-532-insertion-of-sensitive-info-330a0223</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10486%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20steadycontent%20Content%20Writer&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10294-cwe-288-authentication-bypass-using-42eb1a0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10294%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20victornavarro%20OwnID%20Passwordless%20Login&amp;severity=critical&amp;id=68ef5c7cc4f69c9730e56974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9967-cwe-288-authentication-bypass-using--f980e8c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9967%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20gsayed786%20Orion%20SMS%20OTP%20Verification&amp;severity=critical&amp;id=68ef5c7ec4f69c9730e56a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10140-cwe-79-improper-neutralization-of-i-b220e2d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10140%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreiigna%20Quick%20Social%20Login&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11692-cwe-862-missing-authorization-in-qu-d90e376c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11692%3A%20CWE-862%20Missing%20Authorization%20in%20quicoto%20Zip%20Attachments&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11365-cwe-89-improper-neutralization-of-s-ace3dbb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11365%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20akbrohi%20WP%20Google%20Map%20Plugin&amp;severity=medium&amp;id=68ef5c7ec4f69c9730e56a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10303-cwe-862-missing-authorization-in-ow-60c3fed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10303%3A%20CWE-862%20Missing%20Authorization%20in%20owthub%20Library%20Management%20System&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10312-cwe-352-cross-site-request-forgery--efd86491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10312%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20steve-forster%20Theme%20Importer&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5698f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10300-cwe-352-cross-site-request-forgery--52dad469</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10300%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fmeaddons%20TopBar&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10135-cwe-79-improper-neutralization-of-i-930994fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10135%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falldeaf%20WP%20ViewSTL&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e5694c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10038-cwe-266-incorrect-privilege-assignm-0f6181ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10038%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20letscms%20Binary%20MLM%20Plan&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e5692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10132-cwe-79-improper-neutralization-of-i-f4791f08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dash8x%20Dhivehi%20Text&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10743-cwe-89-improper-neutralization-of-s-af5c99ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20maycorolbuche1%20Outdoor&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11722-cwe-98-improper-control-of-filename-d4d01f09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11722%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ikhodal%20Woocommerce%20Category%20and%20Products%20Accordion%20Panel&amp;severity=high&amp;id=68ef5c7ec4f69c9730e56a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10133-cwe-79-improper-neutralization-of-i-88fa7849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salamzadeh%20URLYar%20URL%20Shortner&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10299-cwe-862-missing-authorization-in-ha-81ade7aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10299%3A%20CWE-862%20Missing%20Authorization%20in%20hakik%20WPBifr%C3%B6st%20%E2%80%93%20Instant%20Passwordless%20Temporary%20Login%20Links&amp;severity=high&amp;id=68ef5c7cc4f69c9730e56978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11177-cwe-89-improper-neutralization-of-s-25cc0e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11177%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tbenyon%20External%20Login&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10051-cwe-434-unrestricted-upload-of-file-a42ee4a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10051%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeinwp%20Demo%20Import%20Kit&amp;severity=high&amp;id=68ef5c7bc4f69c9730e5693c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10041-cwe-434-unrestricted-upload-of-file-c35e01cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10041%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ajitdas%20Flex%20QR%20Code%20Generator&amp;severity=critical&amp;id=68ef5c7bc4f69c9730e56933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10186-cwe-862-missing-authorization-in-jj-da1e7f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10186%3A%20CWE-862%20Missing%20Authorization%20in%20jjlemstra%20WhyDonate%20%E2%80%93%20FREE%20Donate%20button%20%E2%80%93%20Crowdfunding%20%E2%80%93%20Fundraising&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10575-cwe-89-improper-neutralization-of-s-38688de1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10575%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ivycat%20WP%20jQuery%20Pager&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10301-cwe-352-cross-site-request-forgery--fe7e78ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10301%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flenskiproject%20FunKItools&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e56982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10730-cwe-89-improper-neutralization-of-s-98799312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10730%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplushotmailcom%20Wp%20tabber%20widget&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10045-cwe-89-improper-neutralization-of-s-52a1756a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10045%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onofficeweb%20onOffice%20for%20WP-Websites&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10310-cwe-89-improper-neutralization-of-s-11c35d1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10310%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jayce53%20Rich%20Snippet%20Site%20Report&amp;severity=medium&amp;id=68ef5c7cc4f69c9730e5698a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10660-cwe-89-improper-neutralization-of-s-62dc4b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10660%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nicholasbosch%20WP%20Dashboard%20Chat&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10648-cwe-862-missing-authorization-in-cy-e60be01c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10648%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20YourMembership%20Single%20Sign%20On%20%E2%80%93%20YM%20SSO%20Login&amp;severity=medium&amp;id=68ef5c7dc4f69c9730e569d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10293-cwe-287-improper-authentication-in--22f8bf9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10293%3A%20CWE-287%20Improper%20Authentication%20in%20nexist%20Keyy%20Two%20Factor%20Authentication%20(like%20Clef)&amp;severity=high&amp;id=68ef5c7cc4f69c9730e56970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10139-cwe-79-improper-neutralization-of-i-9dbd64eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10139%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remko%20WP%20BookWidgets&amp;severity=medium&amp;id=68ef5c7bc4f69c9730e56950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10754-cwe-434-unrestricted-upload-of-file-bdf6bb7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10754%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20geolocationtechnology%20DocoDoco%20Store%20Locator&amp;severity=high&amp;id=68ef5c7dc4f69c9730e569e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/africa-remains-top-global-target-even-as-attacks-d-2058604c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Africa%20Remains%20Top%20Global%20Target%2C%20Even%20as%20Attacks%20Decline&amp;severity=medium&amp;id=68ef54ef8373f2b27ae48205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-severity-vulnerabilities-patched-by-fortinet--7c55936b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High-Severity%20Vulnerabilities%20Patched%20by%20Fortinet%20and%20Ivanti&amp;severity=high&amp;id=68ef51708373f2b27ade0858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61941-improper-limitation-of-a-pathname-t-917c06b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61941%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20BUFFALO%20INC.%20WXR9300BE6P%20series&amp;severity=high&amp;id=68ef50c5cae19e7fe92c3789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11501-cwe-89-improper-neutralization-of-s-e3315a70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11501%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20markomaksym%20Dynamically%20Display%20Posts&amp;severity=high&amp;id=68ef50c5cae19e7fe92c3785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55039-cwe-347-improper-verification-of-cr-bcfac309</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55039%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=medium&amp;id=68ef4d40cae19e7fe9244039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-cvss-100-bugs-in-red-lion-rtus-could-hand-hack-a9782699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20CVSS%2010.0%20Bugs%20in%20Red%20Lion%20RTUs%20Could%20Hand%20Hackers%20Full%20Industrial%20Control&amp;severity=critical&amp;id=68f049d84f645e963f0fee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11160-cwe-80-improper-neutralization-of-s-3e4ff3a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11160%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68ef451c439e765f09a73bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11161-cwe-80-improper-neutralization-of-s-ce9868da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11161%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=68ef451c439e765f09a73be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-ictbroadcast-servers-via-cookie-exp-e3a2b978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20ICTBroadcast%20Servers%20via%20Cookie%20Exploit%20to%20Gain%20Remote%20Shell%20Access&amp;severity=critical&amp;id=68f049d84f645e963f0fee0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26861-uncontrolled-search-path-element-in-88945977</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26861%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteCall%20Remote%20Support%20Program%20(for%20Operator)&amp;severity=high&amp;id=68ef3b8a68c5b4250c33579e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26860-uncontrolled-search-path-element-in-fe860ec5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26860%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteCall%20Remote%20Support%20Program%20(for%20Operator)&amp;severity=high&amp;id=68ef3b8a68c5b4250c33579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26859-uncontrolled-search-path-element-in-249ce6ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26859%3A%20Uncontrolled%20Search%20Path%20Element%20in%20RSUPPORT%20CO.%2C%20LTD.%20RemoteView%20PC%20Application%20Console&amp;severity=high&amp;id=68ef3b8a68c5b4250c335796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10406-cwe-22-improper-limitation-of-a-pat-4064aa80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10406%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BlindMatrix%20e-Commerce&amp;severity=medium&amp;id=68ef3b8a68c5b4250c335793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31702-cwe-732-incorrect-permission-assign-2f31752c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31702%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dahua%20IPC&amp;severity=medium&amp;id=68ef39aeb5560353b8eac1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55080-cwe-233-improper-handling-of-parame-4e08bbbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55080%3A%20CWE-233%20Improper%20Handling%20of%20Parameters%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=high&amp;id=68ef3627b5560353b8e3938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipboard-pictures-exfiltration-in-python-infostea-43601c4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer%2C%20(Wed%2C%20Oct%2015th)&amp;severity=medium&amp;id=68ef360ab5560353b8e37a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sap-netweaver-bug-lets-attackers-take-over-ser-737fd0d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20SAP%20NetWeaver%20Bug%20Lets%20Attackers%20Take%20Over%20Servers%20Without%20Login&amp;severity=medium&amp;id=68f049d84f645e963f0fee10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8561-cwe-87-improper-neutralization-of-al-585e517b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8561%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20ovatheme%20Ova%20Advent&amp;severity=medium&amp;id=68ef32334e16767881e4a827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6042-cwe-269-improper-privilege-managemen-7386e9e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6042%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20pebas%20Lisfinity%20Core%20-%20Lisfinity%20Core%20plugin%20used%20for%20pebas%C2%AE%20Lisfinity%20WordPress%20theme&amp;severity=high&amp;id=68ef32334e16767881e4a823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11176-cwe-639-authorization-bypass-throug-2d06dd12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11176%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20kybernetikservices%20Quick%20Featured%20Images&amp;severity=medium&amp;id=68ef32334e16767881e4a81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55079-cwe-770-allocation-of-resources-wit-fa06acb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55079%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=medium&amp;id=68ef254480e6e715302a8099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-patches-critical-vulnerability-in-connect-co-9ed3c920</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Patches%20Critical%20Vulnerability%20in%20Connect%20Collaboration%20Suite&amp;severity=critical&amp;id=68ef235099201ce2fe1bf537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-173-vulnerabilities-including-ex-93b5fb30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20173%20Vulnerabilities%2C%20Including%20Exploited%20Windows%20Flaws&amp;severity=critical&amp;id=68ef1fcd99201ce2fe14aa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/search-click-steal-the-hidden-threat-of-spoofed-iv-d7e6f359</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Search%2C%20Click%2C%20Steal%3A%20The%20Hidden%20Threat%20of%20Spoofed%20Ivanti%20VPN%20Client%20Sites&amp;severity=medium&amp;id=68ef5ff1c4f69c9730edcbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11746-cwe-22-improper-limitation-of-a-pat-6edf1434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11746%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%208theme%20XStore&amp;severity=high&amp;id=68ef0c4955734f1608eb63a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7305-cwe-434-unrestricted-upload-of-file--4480cd22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7305%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Guangzhou%20Smart%20Software%20Co.%2C%20Ltd.%20SmartBI&amp;severity=critical&amp;id=68eefe3955734f1608e6823f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7304-cwe-78-improper-neutralization-of-sp-a66b027f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7304%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ruijie%20Networks%20Co.%2C%20Ltd.%20RG-UAC&amp;severity=critical&amp;id=68eefe3955734f1608e6823b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13991-cwe-22-improper-limitation-of-a-pat-456d957b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13991%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huijietong%20Cloud%20Video%20Platform&amp;severity=high&amp;id=68eefe3955734f1608e6824b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7311-cwe-78-improper-neutralization-of-sp-1891bbc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7311%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BYTEVALUE%20(Luoyang%20Baiwei%20Intelligent%20Technology%20Co.%2C%20Ltd.)%20Flow%20Control%20Router&amp;severity=critical&amp;id=68eefe3955734f1608e68245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54268-heap-based-buffer-overflow-cwe-122--bb64a6a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54268%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=68eefe3955734f1608e6824f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54278-heap-based-buffer-overflow-cwe-122--27dd54a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54278%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=68eefe3955734f1608e68252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61804-heap-based-buffer-overflow-cwe-122--bcfeafac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61804%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=high&amp;id=68eef02955734f1608d3dfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54279-use-after-free-cwe-416-in-adobe-ani-56bc48cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54279%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=68eef02955734f1608d3dfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54269-out-of-bounds-read-cwe-125-in-adobe-ceb22c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54269%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=68eef02955734f1608d3dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54270-null-pointer-dereference-cwe-476-in-04563f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54270%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=68eef02955734f1608d3dfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-15-9eae5e7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-15&amp;severity=medium&amp;id=68f0379eae27d187307571e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56749-na-185ced5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56749%3A%20n%2Fa&amp;severity=critical&amp;id=68efb2aeea97afbedf4f99b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56748-na-b3644c91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56748%3A%20n%2Fa&amp;severity=medium&amp;id=68efb0ddb00d656ee54120c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56746-na-2999ba81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56746%3A%20n%2Fa&amp;severity=low&amp;id=68efad53b00d656ee539c3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62376-cwe-287-improper-authentication-in--b492ac59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62376%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pwncollege%20dojo&amp;severity=critical&amp;id=68eecaf64a57b2a930bdf0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49552-cross-site-scripting-dom-based-xss--8c606fff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49552%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=high&amp;id=68eeccd7eb8be918751956eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49553-cross-site-scripting-dom-based-xss--cdc1ca5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49553%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=68eeccd7eb8be918751956ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54196-url-redirection-to-untrusted-site-o-7b5b301f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54196%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Adobe%20Connect&amp;severity=low&amp;id=68eeccd7eb8be918751956f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-drops-terrifyingly-large-october-patch-u-89ba9cfc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Drops%20Terrifyingly%20Large%20October%20Patch%20Update&amp;severity=high&amp;id=68eef95355734f1608e4f99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61797-cross-site-scripting-stored-xss-cwe-4b82bfbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61797%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc719b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54272-cross-site-scripting-stored-xss-cwe-c1451b3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54272%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc7195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61796-cross-site-scripting-stored-xss-cwe-12672735</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61796%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68eec00f519df59857dc7198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinas-flax-typhoon-turns-geo-mapping-server-into--cbe6c8fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China&apos;s%20Flax%20Typhoon%20Turns%20Geo-Mapping%20Server%20into%20a%20Backdoor&amp;severity=medium&amp;id=68eef95355734f1608e4f99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-15-billion-in-crypto-from-pig-butchering-2357033f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20seizes%20%2415%20billion%20in%20crypto%20from%20&apos;pig%20butchering&apos;%20kingpin&amp;severity=high&amp;id=68eebc3407f6bbeafa149923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-widespread-rdp-attacks-by-100k-b0249da9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20warn%20of%20widespread%20RDP%20attacks%20by%20100K-node%20botnet&amp;severity=medium&amp;id=68eebc3407f6bbeafa149927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcp-snitch-the-mcp-security-tool-you-probably-need-e9160c82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MCP%20Snitch%20-%20The%20MCP%20Security%20Tool%20You%20Probably%20Need&amp;severity=medium&amp;id=68eeb4a254d2200316a0d6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54267-incorrect-authorization-cwe-863-in--23f5a2e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54267%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54266-cross-site-scripting-stored-xss-cwe-f5436672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54266%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54263-incorrect-authorization-cwe-863-in--ce7f93a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54263%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68eeb4a054d2200316a0d6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54277-incorrect-authorization-cwe-863-in--5e2368e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54277&amp;severity=null&amp;id=68eeb4a054d2200316a0d6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54265-incorrect-authorization-cwe-863-in--85d8ddae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54265%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68eeb4a054d2200316a0d6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54264-cross-site-scripting-stored-xss-cwe-aa33f662</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54264%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68eeb4a054d2200316a0d6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixnapping-attack-lets-attackers-steal-2fa-on-andr-b3579615</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixnapping%20Attack%20Lets%20Attackers%20Steal%202FA%20on%20Android&amp;severity=low&amp;id=68eef95355734f1608e4f9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62374-cwe-1321-improperly-controlled-modi-6a068842</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62374%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20Parse-SDK-JS&amp;severity=medium&amp;id=68eeaf1354d220031697493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61803-integer-overflow-or-wraparound-cwe--ff149b91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61803%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61802-use-after-free-cwe-416-in-adobe-sub-d06a85c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61802%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61805-out-of-bounds-read-cwe-125-in-adobe-c4ef7c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61805%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61807-integer-overflow-or-wraparound-cwe--7fbda66a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61807%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61806-out-of-bounds-read-cwe-125-in-adobe-3927684b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61806%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68eea95bbbec4fba96d9c8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61799-out-of-bounds-read-cwe-125-in-adobe-5087f64a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61799%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61798-out-of-bounds-read-cwe-125-in-adobe-810b93cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61798%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61800-integer-overflow-or-wraparound-cwe--f8961cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61800%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61801-use-after-free-cwe-416-in-adobe-dim-840ef41b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61801%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=68eea752bbec4fba96d79eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61678-cwe-434-unrestricted-upload-of-file-7e5425aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61678%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FreePBX%20endpointman&amp;severity=high&amp;id=68eea752bbec4fba96d79ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34267-cwe-77-improper-neutralization-of-s-083774ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34267%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68eea752bbec4fba96d79ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61675-cwe-89-improper-neutralization-of-s-bf957697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61675%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=high&amp;id=68eea752bbec4fba96d79edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54283-out-of-bounds-write-cwe-787-in-adob-51e3f098</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54283%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=68eea592ae73b78941f498c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54284-out-of-bounds-write-cwe-787-in-adob-6c64ecde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54284%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=68eea592ae73b78941f498c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59429-cwe-79-improper-neutralization-of-i-15a741e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59429%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreePBX%20core&amp;severity=high&amp;id=68eea592ae73b78941f498ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33177-cwe-400-uncontrolled-resource-consu-1d8a8e0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33177%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20NVIDIA%20Jetson%20Orin%20Series&amp;severity=medium&amp;id=68eea752bbec4fba96d79ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54282-heap-based-buffer-overflow-cwe-122--ef0b522b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54282%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=68eea752bbec4fba96d79ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54281-use-after-free-cwe-416-in-adobe-ado-120ffdc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54281%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=68eea592ae73b78941f498d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59051-cwe-78-improper-neutralization-of-s-aa3be3c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59051%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=high&amp;id=68eea592ae73b78941f498d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54276-out-of-bounds-read-cwe-125-in-adobe-93f24f29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54276%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68eea592ae73b78941f498cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33182-cwe-862-missing-authorization-in-nv-ab250f56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33182%3A%20CWE-862%20Missing%20Authorization%20in%20NVIDIA%20Jetson%20Orin%20Series&amp;severity=high&amp;id=68eea212ae73b78941ef5551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54274-stack-based-buffer-overflow-cwe-121-ceef99e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54274%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54273-out-of-bounds-write-cwe-787-in-adob-2115cb90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef5554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54275-out-of-bounds-write-cwe-787-in-adob-af035f21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=68eea212ae73b78941ef555a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54280-out-of-bounds-write-cwe-787-in-adob-cf8ce6f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54280%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68eea212ae73b78941ef555d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bombshell-uefi-shell-vulnerabilities-allow-attacke-7e20677f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BombShell%3A%20UEFI%20shell%20vulnerabilities%20allow%20attackers%20to%20bypass%20Secure%20Boot%20on%20Framework%20Devices&amp;severity=medium&amp;id=68ee9814d8f994a66ec32b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patch-tuesday-october-2025-tue-oct-14th-a1d916ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patch%20Tuesday%20October%202025%2C%20(Tue%2C%20Oct%2014th)&amp;severity=critical&amp;id=68ee9068f2e93b27b0244a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23356-cwe-306-in-nvidia-isaac-lab-02fa91bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23356%3A%20CWE-306%20in%20NVIDIA%20Isaac%20Lab&amp;severity=high&amp;id=68ee8c743dd1bfb0b7f039c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11736-sql-injection-in-itsourcecode-onlin-0def9c44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11736%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Examination%20System&amp;severity=medium&amp;id=68ee8c743dd1bfb0b7f039cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8459-cwe-79-improper-neutralization-of-in-70aa891d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ee8e6cf2e93b27b022870f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37145-vulnerability-in-hewlett-packard-en-6684be75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37145%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59497-cwe-367-time-of-check-time-of-use-t-f2207c75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59497%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59289-cwe-415-double-free-in-microsoft-wi-c38b0059</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59289%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59287-cwe-502-deserialization-of-untruste-56bc0296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59287%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Windows%20Server%202012&amp;severity=critical&amp;id=68ee85903dd1bfb0b7e4238d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59285-cwe-502-deserialization-of-untruste-2ca2fb0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59285%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=68ee85903dd1bfb0b7e4238a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59278-cwe-1287-improper-validation-of-spe-024a5d81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59278%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59275-cwe-1287-improper-validation-of-spe-60831a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59275%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37144-vulnerability-in-hewlett-packard-en-51bdb555</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37144%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59261-cwe-367-time-of-check-time-of-use-t-eedfad3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59261%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59260-cwe-200-exposure-of-sensitive-infor-b8069c9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59260%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59253-cwe-284-improper-access-control-in--ca3315a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59253%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858e3dd1bfb0b7e41c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59230-cwe-284-improper-access-control-in--b617baab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59230%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59248-cwe-20-improper-input-validation-in-96deefe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59248%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59244-cwe-73-external-control-of-file-nam-5dd68607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59244%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858e3dd1bfb0b7e41c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59241-cwe-59-improper-link-resolution-bef-c6b73d76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59241%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59238-cwe-416-use-after-free-in-microsoft-e5b46ca1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59238%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59232-cwe-125-out-of-bounds-read-in-micro-dd512353</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59232%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59229-cwe-248-uncaught-exception-in-micro-e06e3bdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59229%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68ee858d3dd1bfb0b7e41c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59227-cwe-416-use-after-free-in-microsoft-8fb0e5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59227%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59226-cwe-416-use-after-free-in-microsoft-6996e114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59226%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59225-cwe-416-use-after-free-in-microsoft-07e7d3ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59225%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59224-cwe-416-use-after-free-in-microsoft-6a1041af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59223-cwe-416-use-after-free-in-microsoft-f0267063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59223%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59222-cwe-416-use-after-free-in-microsoft-19f40732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59222%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59221-cwe-416-use-after-free-in-microsoft-866c0812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59214-cwe-200-exposure-of-sensitive-infor-3faa4ba9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59214%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858d3dd1bfb0b7e40cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59213-cwe-89-improper-neutralization-of-s-06fceafa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59213%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59210-cwe-416-use-after-free-in-microsoft-3137998a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59210%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e40645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59209-cwe-200-exposure-of-sensitive-infor-2f402466</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59209%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858c3dd1bfb0b7e40642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59208-cwe-125-out-of-bounds-read-in-micro-a7982385</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59208%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e4063f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59205-cwe-362-concurrent-execution-using--6654249f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59205%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e40636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59203-cwe-532-insertion-of-sensitive-info-17c36457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59203%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858b3dd1bfb0b7e40630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59198-cwe-20-improper-input-validation-in-2b863ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59198%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e40555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59197-cwe-532-insertion-of-sensitive-info-bd7d79e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59197%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e40552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59194-cwe-908-use-of-uninitialized-resour-17911375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59194%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59193-cwe-362-concurrent-execution-using--4b5216d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59193%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59192-cwe-126-buffer-over-read-in-microso-a137fea9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59192%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59191-cwe-122-heap-based-buffer-overflow--4190b1de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59191%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59190-cwe-20-improper-input-validation-in-e690db7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59190%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59189-cwe-416-use-after-free-in-microsoft-77fc7d3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59189%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59188-cwe-200-exposure-of-sensitive-infor-be84c4a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59188%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59187-cwe-20-improper-input-validation-in-0f2c2cb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59187%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e401a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59184-cwe-200-exposure-of-sensitive-infor-3c1236c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59184%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e4019f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58739-cwe-200-exposure-of-sensitive-infor-1ba4aa5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58739%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e4019c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58738-cwe-416-use-after-free-in-microsoft-509f47a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58738%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58737-cwe-416-use-after-free-in-microsoft-87d0ae4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58737%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58736-cwe-416-use-after-free-in-microsoft-3101c2b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58736%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58734-cwe-416-use-after-free-in-microsoft-5278606d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58733-cwe-416-use-after-free-in-microsoft-9455c015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58733%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58731-cwe-416-use-after-free-in-microsoft-dbb12639</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58731%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58730-cwe-416-use-after-free-in-microsoft-2b826a12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58729-cwe-1287-improper-validation-of-spe-f2bb59fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58729%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85893dd1bfb0b7e3fd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58727-cwe-362-concurrent-execution-using--1bf6f99c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58727%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58726-cwe-284-improper-access-control-in--ea01f350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58726%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58725-cwe-122-heap-based-buffer-overflow--850f757c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58725%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58724-cwe-284-improper-access-control-in--1aeb1725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58724%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58720-cwe-1240-use-of-a-cryptographic-pri-d34923cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58720%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58718-cwe-416-use-after-free-in-microsoft-b4fec7c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58718%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58714-cwe-284-improper-access-control-in--271deec8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58714%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55699-cwe-200-exposure-of-sensitive-infor-81e44474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55699%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55698-cwe-476-null-pointer-dereference-in-fb473587</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55698%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55697-cwe-122-heap-based-buffer-overflow--2ad52d3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55696-cwe-367-time-of-check-time-of-use-t-87f24b6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55696%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55695-cwe-125-out-of-bounds-read-in-micro-1886bd6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55695%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55694-cwe-284-improper-access-control-in--89095ad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55694%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55693-cwe-416-use-after-free-in-microsoft-2d3e6351</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55693%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55692-cwe-20-improper-input-validation-in-3e26b266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55692%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55691-cwe-416-use-after-free-in-microsoft-1aca4ea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55691%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55690-cwe-416-use-after-free-in-microsoft-c1381d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55690%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55688-cwe-416-use-after-free-in-microsoft-573ff9c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55688%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55684-cwe-416-use-after-free-in-microsoft-34f766d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55684%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55683-cwe-200-exposure-of-sensitive-infor-0761f883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55683%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55682-cwe-841-improper-enforcement-of-beh-2e6fd883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55682%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55680-cwe-367-time-of-check-time-of-use-t-9b8ee541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55680%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55679-cwe-20-improper-input-validation-in-3a0d9005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55679%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55678-cwe-416-use-after-free-in-microsoft-2fbfb60b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55678%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55337-cwe-841-improper-enforcement-of-beh-e3a99106</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55337%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55334-cwe-312-cleartext-storage-of-sensit-8e598b54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55334%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55332-cwe-841-improper-enforcement-of-beh-98e12cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55332%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55331-cwe-416-use-after-free-in-microsoft-a1094552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55331%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55330-cwe-841-improper-enforcement-of-beh-1ee9f15e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55330%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55328-cwe-362-concurrent-execution-using--24c58b07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55328%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55326-cwe-416-use-after-free-in-microsoft-d0a5ac77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55326%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55248-cwe-326-inadequate-encryption-stren-f0ae79b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55248%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Microsoft%20.NET%208.0&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55240-cwe-284-improper-access-control-in--82ce5529</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55240%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53768-cwe-416-use-after-free-in-microsoft-ea18b58d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53768%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53139-cwe-319-cleartext-transmission-of-s-561dafdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53139%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50175-cwe-416-use-after-free-in-microsoft-f27e8535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50175%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53150-cwe-416-use-after-free-in-microsoft-8f4aa23a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53150%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50152-cwe-125-out-of-bounds-read-in-micro-bbd882ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50152%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53717-cwe-807-reliance-on-untrusted-input-0e7f2808</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53717%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25004-cwe-284-improper-access-control-in--977be0f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25004%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48813-cwe-324-use-of-a-key-past-its-expir-2137d0f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48813%3A%20CWE-324%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59502-cwe-400-uncontrolled-resource-consu-909ed232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59502%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59494-cwe-284-improper-access-control-in--67771589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59494%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59295-cwe-122-heap-based-buffer-overflow--a5983a5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59295%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59294-cwe-200-exposure-of-sensitive-infor-def82b92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59294%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68ee85903dd1bfb0b7e4239f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59292-cwe-73-external-control-of-file-nam-0a43e586</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59292%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=high&amp;id=68ee85903dd1bfb0b7e4239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59291-cwe-73-external-control-of-file-nam-6560353e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59291%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59290-cwe-416-use-after-free-in-microsoft-184a8f92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59290%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59288-cwe-347-improper-verification-of-cr-12c453ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59288%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20microsoft%2Fplaywright&amp;severity=medium&amp;id=68ee85903dd1bfb0b7e42390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59284-cwe-200-exposure-of-sensitive-infor-532dc7c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59284%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=low&amp;id=68ee85903dd1bfb0b7e42387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59282-cwe-362-concurrent-execution-using--5d6ff542</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59282%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85903dd1bfb0b7e42384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59281-cwe-59-improper-link-resolution-bef-d1a1da96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59281%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47979-cwe-532-insertion-of-sensitive-info-8b87495a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47979%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59280-cwe-287-improper-authentication-in--01409627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59280%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68ee858f3dd1bfb0b7e41d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59277-cwe-1287-improper-validation-of-spe-df8e1cb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59277%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858f3dd1bfb0b7e41d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59259-cwe-1287-improper-validation-of-spe-53758d07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59259%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59258-cwe-532-insertion-of-sensitive-info-c7b270c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59258%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59257-cwe-1287-improper-validation-of-spe-1e714fad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59257%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee858f3dd1bfb0b7e41d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59255-cwe-122-heap-based-buffer-overflow--8779f984</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59255%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59254-cwe-122-heap-based-buffer-overflow--5942782f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59254%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59250-cwe-20-improper-input-validation-in-87e97893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59250%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20JDBC%20Driver%20for%20SQL%20Server%2010.2&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59249-cwe-1390-weak-authentication-in-mic-4ae2aadb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59249%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59243-cwe-416-use-after-free-in-microsoft-f0065a25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59243%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49708-cwe-416-use-after-free-in-microsoft-5623b877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49708%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=68ee85833dd1bfb0b7e3e65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59242-cwe-122-heap-based-buffer-overflow--733db26c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59242%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858e3dd1bfb0b7e41c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59237-cwe-502-deserialization-of-untruste-55ba3e2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59237%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59236-cwe-416-use-after-free-in-microsoft-1095d1e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59236%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59235-cwe-125-out-of-bounds-read-in-micro-7ae4b377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59235%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59234-cwe-416-use-after-free-in-microsoft-260e4267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59234%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59233-cwe-843-access-of-resource-using-in-96187bb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59233%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59231-cwe-843-access-of-resource-using-in-55cc6b67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59231%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e41c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59228-cwe-20-improper-input-validation-in-705799c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59228%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68ee858d3dd1bfb0b7e40cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59211-cwe-200-exposure-of-sensitive-infor-6caf2516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59211%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858c3dd1bfb0b7e40648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59207-cwe-822-untrusted-pointer-dereferen-23c06e08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59207%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858c3dd1bfb0b7e4063c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59206-cwe-416-use-after-free-in-microsoft-74cb6fe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59206%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e40639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59204-cwe-908-use-of-uninitialized-resour-9b508cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59204%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee858b3dd1bfb0b7e40633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59202-cwe-416-use-after-free-in-microsoft-e1407c22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59202%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68ee858b3dd1bfb0b7e4062d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59201-cwe-284-improper-access-control-in--8dc0bac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59201%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4055e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59200-cwe-362-concurrent-execution-using--6419bb7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59200%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4055b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59199-cwe-284-improper-access-control-in--bb7bc249</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59199%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e40558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59196-cwe-362-concurrent-execution-using--1a0ba6ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59196%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4054f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59195-cwe-362-concurrent-execution-using--6b7aee0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59195%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee858a3dd1bfb0b7e4054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59186-cwe-200-exposure-of-sensitive-infor-847cdccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59186%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59185-cwe-73-external-control-of-file-nam-ea154171</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59185%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee858a3dd1bfb0b7e401a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58735-cwe-416-use-after-free-in-microsoft-2088f594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58732-cwe-416-use-after-free-in-microsoft-e834bbbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58732%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58728-cwe-416-use-after-free-in-microsoft-0a6667e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58728%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85893dd1bfb0b7e3fd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58722-cwe-122-heap-based-buffer-overflow--255756a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58722%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58719-cwe-416-use-after-free-in-microsoft-e4816b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58719%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68ee85883dd1bfb0b7e3f8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58717-cwe-125-out-of-bounds-read-in-micro-a929dcba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58717%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85883dd1bfb0b7e3f8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37143-vulnerability-in-hewlett-packard-en-b7c7b7a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37143%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58716-cwe-20-improper-input-validation-in-9be34fe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58716%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85883dd1bfb0b7e3f8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58715-cwe-190-integer-overflow-or-wraparo-0e930cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58715%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55701-cwe-1287-improper-validation-of-spe-2a73f269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55701%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85873dd1bfb0b7e3f5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55700-cwe-125-out-of-bounds-read-in-micro-86fa41e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55700%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85873dd1bfb0b7e3f5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55689-cwe-416-use-after-free-in-microsoft-462043ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55689%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55687-cwe-362-concurrent-execution-using--fcd80125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55687%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55686-cwe-416-use-after-free-in-microsoft-dcdd1a64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55686%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55685-cwe-416-use-after-free-in-microsoft-552d4e32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55685%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85863dd1bfb0b7e3f4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55681-cwe-125-out-of-bounds-read-in-micro-d0bbfee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55681%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55677-cwe-822-untrusted-pointer-dereferen-61d063a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55677%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55676-cwe-209-generation-of-error-message-ef0cb86b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55676%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68ee85853dd1bfb0b7e3f14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55340-cwe-287-improper-authentication-in--1ca77a4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55340%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55339-cwe-125-out-of-bounds-read-in-micro-733fcc01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55339%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85853dd1bfb0b7e3f145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55338-security-feature-bypass-in-microsof-dcc69d37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55338%3A%20CWE-1310%3A%20Missing%20Ability%20to%20Patch%20ROM%20Code%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55336-cwe-200-exposure-of-sensitive-infor-4fea751f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55336%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55335-cwe-416-use-after-free-in-microsoft-02bc342d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55335%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85843dd1bfb0b7e3ed12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55333-cwe-1023-incomplete-comparison-with-0b489e65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55333%3A%20CWE-1023%3A%20Incomplete%20Comparison%20with%20Missing%20Factors%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85843dd1bfb0b7e3ed0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55325-cwe-126-buffer-over-read-in-microso-5ecffc49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55325%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55320-cwe-89-improper-neutralization-of-s-7d3b6790</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55320%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24052-cwe-121-stack-based-buffer-overflow-36ea267a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24052%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24990-cwe-822-untrusted-pointer-dereferen-403d3e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24990%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68ee85823dd1bfb0b7e3e08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55315-cwe-444-inconsistent-interpretation-f826b6db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55315%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Microsoft%20ASP.NET%20Core%202.3&amp;severity=critical&amp;id=68ee85833dd1bfb0b7e3e745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55247-cwe-59-improper-link-resolution-bef-75809cdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55247%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53782-cwe-303-incorrect-implementation-of-6fe53990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53782%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50174-cwe-416-use-after-free-in-microsoft-e932973e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50174%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48004-cwe-416-use-after-free-in-microsoft-20e805a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48004%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47989-cwe-284-improper-access-control-in--ae8ae1be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47989%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Arc%20Enabled%20Servers%20-%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68ee85833dd1bfb0b7e3e655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37142-vulnerability-in-hewlett-packard-en-2012c30d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37142%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37141-vulnerability-in-hewlett-packard-en-4af9352d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37141%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37140-vulnerability-in-hewlett-packard-en-86736df7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37140%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee85823dd1bfb0b7e3e092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37139-vulnerability-in-hewlett-packard-en-17619d8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37139%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37138-vulnerability-in-hewlett-packard-en-11c61a2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37138%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37137-vulnerability-in-hewlett-packard-en-060e608d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37137%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37136-vulnerability-in-hewlett-packard-en-19e09fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37136%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37135-vulnerability-in-hewlett-packard-en-c5c0c55e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37135%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37134-vulnerability-in-hewlett-packard-en-f0363fc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37134%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploit-arcgis-server-as-backdoor--d4665610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploit%20ArcGIS%20Server%20as%20Backdoor%20for%20Over%20a%20Year&amp;severity=medium&amp;id=68ee81d88fa40b621b088938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8430-cwe-79-improper-neutralization-of-in-417e72bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8430%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee81fc8fa40b621b08e8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37133-vulnerability-in-hewlett-packard-en-391ae6c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37133%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37132-vulnerability-in-hewlett-packard-en-30298e0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37132%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee81fc8fa40b621b08e88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11548-cwe-94-improper-control-of-generati-deb7e16b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11548%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ibi%20WebFOCUS&amp;severity=critical&amp;id=68ee81fc8fa40b621b08e8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37148-vulnerability-in-hewlett-packard-en-1c3050f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37148%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=medium&amp;id=68ee7e6d8fa40b621b022aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37147-vulnerability-in-hewlett-packard-en-0411cf35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37147%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee7e6d8fa40b621b022aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37146-vulnerability-in-hewlett-packard-en-3ecd48a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37146%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20(AOS)&amp;severity=high&amp;id=68ee7e6d8fa40b621b022aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pixnapping-android-flaw-lets-rogue-apps-steal--d59fda90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Pixnapping%20Android%20Flaw%20Lets%20Rogue%20Apps%20Steal%202FA%20Codes%20Without%20Permissions&amp;severity=high&amp;id=68ee772175ce224a043334e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-abuse-geo-mapping-tool-for-year-lo-6eeb6b1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20hackers%20abuse%20geo-mapping%20tool%20for%20year-long%20persistence&amp;severity=high&amp;id=68ee772175ce224a043334ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secure-boot-bypass-risk-threatens-nearly-200000-li-27b76ca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secure%20Boot%20bypass%20risk%20threatens%20nearly%20200%2C000%20Linux%20Framework%20laptops&amp;severity=high&amp;id=68ee772175ce224a043334e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37149-vulnerability-in-hewlett-packard-en-1217854d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37149%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ProLiant%20RL300%20Gen11%20Server&amp;severity=medium&amp;id=68ee73a175ce224a042d3465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11577-cwe-321-use-of-hardcoded-cryptograp-df81799a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11577%3A%20CWE-321%20Use%20of%20Hard%E2%80%91coded%20Cryptographic%20Key%20in%20Clevo%20Notebook%20System%20Firmware&amp;severity=high&amp;id=68ee702b75ce224a0426b537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8429-cwe-79-improper-neutralization-of-in-7e968e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee702c75ce224a0426b924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54893-cwe-79-improper-neutralization-of-i-9044cf01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee702c75ce224a0426b914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31514-information-disclosure-in-fortinet--81a7aba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31514%3A%20Information%20disclosure%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=68ee702b75ce224a0426b559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46774-escalation-of-privilege-in-fortinet-78ff3290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46774%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=medium&amp;id=68ee702c75ce224a0426b90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54822-improper-access-control-in-fortinet-f50df995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54822%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee702c75ce224a0426b911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62366-cwe-79-improper-neutralization-of-i-5d324b7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62366%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68ee702c75ce224a0426b920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31365-execute-unauthorized-code-or-comman-6d08eeb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31365%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientMac&amp;severity=medium&amp;id=68ee702b75ce224a0426b556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53845-improper-access-control-in-fortinet-0d010291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53845%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=68ee702c75ce224a0426b90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59921-information-disclosure-in-fortinet--ae1dab5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59921%3A%20Information%20disclosure%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=68ee702c75ce224a0426b91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33507-denial-of-service-privilege-escalat-f9d56898</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33507%3A%20Denial%20of%20service%2C%20Privilege%20escalation%20in%20Fortinet%20FortiIsolator&amp;severity=high&amp;id=68ee702b75ce224a0426b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57716-execute-unauthorized-code-or-comman-613daaa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57716%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=68ee702c75ce224a0426b91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25255-improper-access-control-in-fortinet-9cb7d4fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25255%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25252-improper-access-control-in-fortinet-bc7a1be9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25252%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26008-denial-of-service-in-fortinet-forti-221c90fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26008%3A%20Denial%20of%20service%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee702b75ce224a0426b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47569-information-disclosure-in-fortinet--0f5d4aa2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47569%3A%20Information%20disclosure%20in%20Fortinet%20FortiManager%20Cloud&amp;severity=medium&amp;id=68ee702b75ce224a0426b549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54973-improper-access-control-in-fortinet-5626ba59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54973%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAnalyzer&amp;severity=medium&amp;id=68ee702c75ce224a0426b917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46718-execute-unauthorized-code-or-comman-48b25376</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46718%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68ee702b75ce224a0426b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50571-execute-unauthorized-code-or-comman-13926225</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50571%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=68ee702b75ce224a0426b54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31366-improper-access-control-in-fortinet-2b86f10d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31366%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22258-escalation-of-privilege-in-fortinet-46345852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22258%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25253-information-disclosure-in-fortinet--ee20411d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25253%3A%20Information%20disclosure%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0402f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57740-execute-unauthorized-code-or-comman-0f3cebcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57740%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e0403b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47890-improper-access-control-in-fortinet-e6626c76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47890%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSASE&amp;severity=low&amp;id=68ee6cbb1b3029e3c7e04035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57741-escalation-of-privilege-in-fortinet-9a6930de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57741%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e0403e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49201-execute-unauthorized-code-or-comman-c178c16f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49201%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e04038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58325-escalation-of-privilege-in-fortinet-8447598b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58325%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=68ee6cbb1b3029e3c7e04044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58324-execute-unauthorized-code-or-comman-787c7b0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58324%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58903-denial-of-service-in-fortinet-forti-5d572aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58903%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68ee6cbc1b3029e3c7e04054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48891-escalation-of-privilege-in-fortinet-eb4cdc48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48891%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSOAR%20on-premise&amp;severity=medium&amp;id=68ee6cbb1b3029e3c7e04029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62172-cwe-80-improper-neutralization-of-s-87ef0280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62172%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20home-assistant%20core&amp;severity=high&amp;id=68ee6cbc1b3029e3c7e04057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54891-cwe-79-improper-neutralization-of-i-4abddc9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee69461b3029e3c7d96f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62157-cwe-522-insufficiently-protected-cr-58061e6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62157%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=68ee69461b3029e3c7d96f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54892-cwe-79-improper-neutralization-of-i-790983b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee69461b3029e3c7d96f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54889-cwe-79-improper-neutralization-of-i-4d227b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee65b283f5d4e8a43ff594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62156-cwe-22-improper-limitation-of-a-pat-829c0aa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62156%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20argoproj%20argo-workflows&amp;severity=high&amp;id=68ee65b283f5d4e8a43ff597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0033-cwe-284-improper-access-control-in-a-aa8c05fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0033%3A%20CWE-284%20%20Improper%20Access%20Control%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors%20(formerly%20codenamed%20%22Milan%22)&amp;severity=medium&amp;id=68ee6aa71b3029e3c7dc1688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44088-cwe-79-improper-neutralization-of-i-16a1770e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=medium&amp;id=68ee623083f5d4e8a43949f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5946-cwe-78-improper-neutralization-of-sp-071c6d2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5946%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=high&amp;id=68ee5f184c738d5ce3163a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10986-cwe-22-improper-limitation-of-a-pat-52f1e296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10986%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=medium&amp;id=68ee5f184c738d5ce3163a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8428-cwe-79-improper-neutralization-of-in-b53b8284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20Infra%20Monitoring&amp;severity=medium&amp;id=68ee5f184c738d5ce3163a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10985-cwe-78-improper-neutralization-of-s-7d0c7eb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10985%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee5f184c738d5ce3163a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10243-cwe-78-improper-neutralization-of-s-78f16f8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10243%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee639883f5d4e8a43c4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10242-cwe-78-improper-neutralization-of-s-f6d95e81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10242%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=68ee639883f5d4e8a43c4d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27906-cwe-548-exposure-of-information-thr-b2ea9622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27906%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=68ee639883f5d4e8a43c4d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-limits-ie-mode-in-edge-after-chakra-zero-7c1f8e3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Limits%20IE%20Mode%20in%20Edge%20After%20Chakra%20Zero-Day%20Activity%20Detected&amp;severity=critical&amp;id=68ee5b974c738d5ce30f2a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33044-cwe-119-improper-restriction-of-ope-7fe1e62b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33044%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22833-cwe-787-out-of-bounds-write-in-ami--2eae5f4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22833%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22832-cwe-787-out-of-bounds-write-in-ami--cd19ef40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22832%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22831-cwe-787-out-of-bounds-write-in-ami--f00835d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22831%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68ee5bac4c738d5ce30f7da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-patches-critical-vulnerabilities-in-netweaver--1140eff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20Patches%20Critical%20Vulnerabilities%20in%20NetWeaver%2C%20Print%20Service%2C%20SRM&amp;severity=critical&amp;id=68ee587d2f0a6ddb6c7aeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47856-execute-unauthorized-code-or-comman-2b934ff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47856%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiVoice&amp;severity=high&amp;id=68ee550c2f0a6ddb6c734b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9178-cwe-787-out-of-bounds-write-in-rockw-58d4a8d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9178%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Rockwell%20Automation%201715-AENTR%20EtherNet%2FIP%20Adapter&amp;severity=high&amp;id=68ee4b3a509368ccaa76d788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9177-cwe-770-allocation-of-resources-with-32c13096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9177%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Rockwell%20Automation%201715-AENTR%20EtherNet%2FIP%20Adapter&amp;severity=high&amp;id=68ee4b3a509368ccaa76d785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-is-first-confirmed-victim-of-oracle-ebs-ze-98b0275d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20Is%20First%20Confirmed%20Victim%20of%20Oracle%20EBS%20Zero-Day%20Hack&amp;severity=medium&amp;id=68ee47b1509368ccaa6f7316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7330-cwe-352-cross-site-request-forgery-c-31e9a41f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7330%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10610-cwe-89-improper-neutralization-of-s-9e6b2322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SFS%20Consulting%20Information%20Processing%20Industry%20and%20Foreign%20Trade%20Inc.%20Winsure&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11498-cwe-1236-improper-neutralization-of-67b4f8c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11498%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7329-cwe-79-improper-neutralization-of-in-db8c44d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7329%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7328-cwe-306-missing-authentication-for-c-505b1ccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7328%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20Comms%20-%201783-NATR&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11720-spoofing-risk-in-android-custom-tab-3f789d77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11720%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47d0509368ccaa6fc9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11718-address-bar-could-be-spoofed-on-and-9693bd23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11718%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47d0509368ccaa6fc99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11717-the-password-edit-screen-was-not-hi-d0c1a0a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11717%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11721-memory-safety-bug-fixed-in-firefox--034643e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11721%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11719-use-after-free-caused-by-the-native-2eb86c2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11719%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11716-sandboxed-iframes-allowed-links-to--85e6e601</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11716%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11715-memory-safety-bugs-fixed-in-firefox-d7d91895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11715%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11713-potential-user-assisted-code-execut-9f1c24fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11713%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11712-an-object-tag-type-attribute-overro-f7980773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11712%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11708-use-after-free-in-mediatrackgraphim-8aefe1c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11708%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11714-memory-safety-bugs-fixed-in-firefox-d179cdde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11714%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68ee47cf509368ccaa6fc8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11711-some-non-writable-object-properties-72a5cfe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11711%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68ee47cf509368ccaa6fc8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11710-cross-process-information-leaked-du-9a26668c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11710%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee47cf509368ccaa6fc8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11709-out-of-bounds-readwrite-in-a-privil-26725319</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11709%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68ee4920509368ccaa72487e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9067-cwe-269-improper-privilege-managemen-3abe94b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9067%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Rockwell%20Automation%20FactoryTalk%20Linx&amp;severity=high&amp;id=68ee4920509368ccaa72488f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9124-cwe-248-uncaught-exception-in-rockwe-0bc4e2be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9124%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Rockwell%20Automation%20Compact%20GuardLogix%C2%AE%205370&amp;severity=high&amp;id=68ee4920509368ccaa724895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9068-cwe-269-improper-privilege-managemen-21f0c63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9068%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Rockwell%20Automation%20FactoryTalk%20Linx&amp;severity=high&amp;id=68ee4920509368ccaa724892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9064-cwe-287-improper-authentication-in-r-5ddcf4cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9064%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%20View%20Machine%20Edition&amp;severity=high&amp;id=68ee4920509368ccaa724889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9063-cwe-287-improper-authentication-in-r-f43c7d7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9063%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Rockwell%20Automation%20PanelView%20Plus%207%20Performance%20Series%20B&amp;severity=high&amp;id=68ee4920509368ccaa724886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9066-cwe-20-improper-input-validation-in--3202352d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9066%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20FactoryTalk%20ViewPoint&amp;severity=high&amp;id=68ee4920509368ccaa72488c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9437-cwe-755-improper-handling-of-excepti-a334b193</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9437%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Rockwell%20Automation%20ArmorStart%20AOP&amp;severity=high&amp;id=68ee412a6844b28d82f10590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixnapping-attack-steals-data-from-google-samsung--bad7c6fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixnapping%20Attack%20Steals%20Data%20From%20Google%2C%20Samsung%20Android%20Phones&amp;severity=medium&amp;id=68ee3a7865eb75fc048633fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmpocalypse-single-8-byte-write-shatters-amds-sev--d47e3566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMPocalypse%3A%20Single%208-Byte%20Write%20Shatters%20AMD%E2%80%99s%20SEV-SNP%20Confidential%20Computing&amp;severity=medium&amp;id=68eef85f55734f1608e47850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intents-android-12-fonctionnement-scurit-et-exempl-ab4e6ba9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intents%20Android%20(1%2F2)%20%3A%20fonctionnement%2C%20s%C3%A9curit%C3%A9%20et%20exemples%20d&apos;attaques&amp;severity=medium&amp;id=68ee3773f4a587eca87a8509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pixnapping-android-flaw-lets-rogue-apps-steal--7c977b39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Pixnapping%20Android%20Flaw%20Lets%20Rogue%20Apps%20Steal%202FA%20Codes%20Without%20Permissions&amp;severity=medium&amp;id=68eef85f55734f1608e47853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-ai-reveals-about-web-applications-and-why-it--639e85dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20AI%20Reveals%20About%20Web%20Applications%E2%80%94%20and%20Why%20It%20Matters&amp;severity=low&amp;id=68eef85f55734f1608e47856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rmpocalypse-new-attack-breaks-amd-confidential-com-3064afef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RMPocalypse%3A%20New%20Attack%20Breaks%20AMD%20Confidential%20Computing&amp;severity=low&amp;id=68ee2d1aeab6788b87c8510e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-10-still-on-over-40-of-devices-as-it-reach-7d3b7fce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2010%20Still%20on%20Over%2040%25%20of%20Devices%20as%20It%20Reaches%20End%20of%20Support&amp;severity=medium&amp;id=68ee1fe5fadadd4ae262ba32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-pypi-and-rubygems-packages-found-sending-devel-7f81f155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%2C%20PyPI%2C%20and%20RubyGems%20Packages%20Found%20Sending%20Developer%20Data%20to%20Discord%20Channels&amp;severity=high&amp;id=68ee2008fadadd4ae263392a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-trojan-targets-windows-uses-github-images-4d9a7ae3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Trojan%20Targets%20Windows%2C%20Uses%20GitHub%20Images%20to%20Stay%20Active%20After%20Takedowns&amp;severity=medium&amp;id=68ee2008fadadd4ae263392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unverified-cots-hardware-enables-persistent-attack-27301b7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unverified%20COTS%20hardware%20enables%20persistent%20attacks%20in%20small%20satellites%20via%20SpyChain&amp;severity=medium&amp;id=68ee2008fadadd4ae2633932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10228-cwe-384-session-fixation-in-rolanti-40f2e4fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10228%3A%20CWE-384%20Session%20Fixation%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=high&amp;id=68ee16307eab8b438c025d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40812-cwe-125-out-of-bounds-read-in-sieme-e9e76491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40811-cwe-125-out-of-bounds-read-in-sieme-07b3932b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40811%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40810-cwe-787-out-of-bounds-write-in-siem-b13e8bc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40810%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40809-cwe-787-out-of-bounds-write-in-siem-39a22030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40809%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2024&amp;severity=high&amp;id=68ee16327eab8b438c025d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40774-cwe-257-storing-passwords-in-a-reco-2664a477</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40774%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Siemens%20SiPass%20integrated&amp;severity=medium&amp;id=68ee16327eab8b438c025d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40773-cwe-639-authorization-bypass-throug-190cbd72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40773%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Siemens%20SiPass%20integrated&amp;severity=low&amp;id=68ee16327eab8b438c025d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40772-cwe-79-improper-neutralization-of-i-6fb5df8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40772%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20SiPass%20integrated&amp;severity=high&amp;id=68ee16327eab8b438c025d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40771-cwe-306-missing-authentication-for--c662fe93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40771%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20SIMATIC%20CP%201542SP-1&amp;severity=critical&amp;id=68ee16317eab8b438c025d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40765-cwe-306-missing-authentication-for--e591b3ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40765%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20TeleControl%20Server%20Basic%20V3.1&amp;severity=critical&amp;id=68ee16317eab8b438c025d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40755-cwe-89-improper-neutralization-of-s-c3cfa8d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40755%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=68ee16317eab8b438c025d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20724-cwe-125-out-of-bounds-read-in-media-b812432a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20724%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=68ee16317eab8b438c025d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20717-cwe-121-stack-overflow-in-mediatek--fb0f91e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20717%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20716-cwe-787-out-of-bounds-write-in-medi-2b148028</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20716%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20715-cwe-787-out-of-bounds-write-in-medi-41d2d89a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20715%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20723-cwe-787-out-of-bounds-write-in-medi-8451e58a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20723%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8791T%2C%20MT8796%2C%20MT8873&amp;severity=high&amp;id=68ee16317eab8b438c025d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20722-cwe-190-integer-overflow-in-mediate-e2646c80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20722%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8791T%2C%20MT8796%2C%20MT8873&amp;severity=medium&amp;id=68ee16317eab8b438c025d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20714-cwe-121-stack-overflow-in-mediatek--064e4a57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20714%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20713-cwe-121-stack-overflow-in-mediatek--41b8193b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20713%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20721-cwe-787-out-of-bounds-write-in-medi-4eb918e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20721%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8195%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8395%2C%20MT8792%2C%20MT8793&amp;severity=high&amp;id=68ee16317eab8b438c025d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20720-cwe-122-heap-overflow-in-mediatek-i-3c87af6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20720%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20719-cwe-121-stack-overflow-in-mediatek--d236e968</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20719%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7603%2C%20MT7615%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20718-cwe-121-stack-overflow-in-mediatek--753dd459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20718%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16317eab8b438c025d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20709-cwe-120-classic-buffer-overflow-in--eb16bfe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20709%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20710-cwe-190-integer-overflow-in-mediate-a7e820e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20710%3A%20CWE-190%20Integer%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20711-cwe-1287-specified-type-in-mediatek-fc0942b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20711%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=68ee16307eab8b438c025d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20712-cwe-122-heap-overflow-in-mediatek-i-d5f66391</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20712%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6990%2C%20MT7990%2C%20MT7991%2C%20MT7992%2C%20MT7993&amp;severity=high&amp;id=68ee16307eab8b438c025d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banking-trojan-abusing-github-for-resilience-c9f6e401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banking%20Trojan%20Abusing%20GitHub%20for%20Resilience&amp;severity=medium&amp;id=68ee16217eab8b438c022a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46581-cwe-94-improper-control-of-generati-d70ae5ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46581%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZTE%20ZXCDN&amp;severity=critical&amp;id=68ee12ad7eab8b438cfa7656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41699-cwe-94-improper-control-of-generati-b83ab47f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41699%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=68ee0c499bdcb32828080e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-ta585s-monsterv2-malware-capabi-93ef58cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20TA585%E2%80%99s%20MonsterV2%20Malware%20Capabilities%20and%20Attack%20Chain&amp;severity=high&amp;id=68ee0c389bdcb3282807d1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/streamlining-vulnerability-research-with-the-idali-ad5388b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Streamlining%20Vulnerability%20Research%20with%20the%20idalib%20Rust%20Bindings%20for%20IDA%209.2%20-%20HN%20Security&amp;severity=medium&amp;id=68ee0c4a9bdcb32828081204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41718-cwe-319-cleartext-transmission-of-s-16a7a6f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41718%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Murrelektronik%20Firmware%20Impact67%20Pro%2054630&amp;severity=high&amp;id=68ee0c499bdcb32828080e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41707-cwe-120-buffer-copy-without-checkin-d09ef133</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41707%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41706-cwe-120-buffer-copy-without-checkin-0f218ffa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41706%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41705-cwe-523-unprotected-transport-of-cr-8f6ad93b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41705%3A%20CWE-523%20Unprotected%20Transport%20of%20Credentials%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41704-cwe-770-allocation-of-resources-wit-fc6345fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41704%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=medium&amp;id=68ee0d9d9bdcb328280b3ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41703-cwe-306-missing-authentication-for--b00c23de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41703%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20QUINT4-UPS%2F24DC%2F24DC%2F5%2FEIP&amp;severity=high&amp;id=68ee0d9d9bdcb328280b3ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55078-cwe-233-improper-handling-of-parame-9d51b4d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55078%3A%20CWE-233%20Improper%20Handling%20of%20Parameters%20in%20Eclipse%20Foundation%20ThreadX&amp;severity=medium&amp;id=68edfbefcfc28f75da6ec64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-pypi-and-rubygems-packages-found-sending-devel-5d3d22fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=npm%2C%20PyPI%2C%20and%20RubyGems%20Packages%20Found%20Sending%20Developer%20Data%20to%20Discord%20Channels&amp;severity=medium&amp;id=68eef85f55734f1608e47859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11731-access-of-resource-using-incompatib-b846153a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11731%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)&amp;severity=low&amp;id=68edeb573aa78542cebbacfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8594-cwe-918-server-side-request-forgery--266e1754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8594%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pz-LinkCard&amp;severity=low&amp;id=68edeb573aa78542cebbad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10357-cwe-79-cross-site-scripting-xss-in--71bf745c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10357%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Simple%20SEO&amp;severity=medium&amp;id=68edeb573aa78542cebbacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10732-cwe-862-missing-authorization-in-br-3eb8f7e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10732%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Contact%20Form%20Builder%20%E2%80%93%20Multi-step%20Forms%2C%20Conversational%20Forms%20and%20more&amp;severity=medium&amp;id=68ede1c61a06eb79bea0b465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59889-cwe-427-uncontrolled-search-path-el-5a993389</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59889%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Eaton%20Eaton%20IPP%20software&amp;severity=high&amp;id=68edde4b1a06eb79be991ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-critical-bugs-in-adobe-experience-manager-a7d1cbf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Critical%20Bugs%20in%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=68edd1460a9b8f553a63bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-the-monster-bytes-tracking-ta585-and-its-arse-4d0ae5ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20the%20monster%20bytes%3A%20tracking%20TA585%20and%20its%20arsenal&amp;severity=medium&amp;id=68ee12a37eab8b438cfa6e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42939-cwe-863-incorrect-authorization-in--34a47f5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42939%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Processing%20Rules%20-%20For%20Bank%20Statements)&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42937-cwe-35-path-traversal-in-sapse-sap--b5678cbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42937%3A%20CWE-35%3A%20Path%20Traversal%20in%20SAP_SE%20SAP%20Print%20Service&amp;severity=critical&amp;id=68ed9e3ae121319cf76b7b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42910-cwe-434-unrestricted-upload-of-file-49ee3843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42910%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management&amp;severity=critical&amp;id=68ed9e3ae121319cf76b7b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42909-cwe-1004-sensitive-cookie-without-h-2fee8b90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42909%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20HttpOnly%20Flag%20in%20SAP_SE%20SAP%20Cloud%20Appliance%20Library%20Appliances&amp;severity=low&amp;id=68ed9e3ae121319cf76b7b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42908-cwe-352-cross-site-request-forgery--cebee152</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42908%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42906-cwe-22-improper-limitation-of-a-pat-605d17db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42906%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20Commerce%20Cloud&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42903-cwe-204-observable-response-discrep-b3df29bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42903%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20SAP_SE%20SAP%20Financial%20Service%20Claims%20Management&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42902-cwe-476-null-pointer-dereference-in-df41b2c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42902%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20SAP_SE%20SAP%20Netweaver%20AS%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42901-cwe-94-improper-control-of-generati-9b6e0af6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42901%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Application%20Server%20for%20ABAP%20(BAPI%20Browser)&amp;severity=medium&amp;id=68ed9e3ae121319cf76b7b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-14-5bfe3b3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-14&amp;severity=medium&amp;id=68eee8a6b519a370726fef6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60374-na-0ee40893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60374%3A%20n%2Fa&amp;severity=medium&amp;id=68eeacdbbbec4fba96e15baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60540-na-005c1fd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60540%3A%20n%2Fa&amp;severity=medium&amp;id=68eea752bbec4fba96d79ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60537-na-53053d84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60537%3A%20n%2Fa&amp;severity=medium&amp;id=68ee8e6cf2e93b27b022870a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60536-na-f6295c18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60536%3A%20n%2Fa&amp;severity=high&amp;id=68ee8e6cf2e93b27b0228705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57618-na-709eed91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57618%3A%20n%2Fa&amp;severity=high&amp;id=68ee88ef3dd1bfb0b7e95c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57563-na-5c5f5539</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57563%3A%20n%2Fa&amp;severity=medium&amp;id=68ee88ef3dd1bfb0b7e95c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60535-na-f5020c8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60535%3A%20n%2Fa&amp;severity=high&amp;id=68ee85913dd1bfb0b7e42b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54603-na-09d577f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54603%3A%20n%2Fa&amp;severity=medium&amp;id=68ee85833dd1bfb0b7e3e738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56747-na-c0463182</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56747%3A%20n%2Fa&amp;severity=medium&amp;id=68ee6aa71b3029e3c7dc168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62363-cwe-59-improper-link-resolution-bef-0bed9b13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62363%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20zheny-creator%20YtGrabber-TUI&amp;severity=high&amp;id=68ed73a7efcc33289f4e04fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62362-cwe-359-exposure-of-private-persona-6c4a41d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62362%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20GPP-Woo%20GPP-burgerportaal&amp;severity=medium&amp;id=68ed73a7efcc33289f4e04f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62361-cwe-601-url-redirection-to-untruste-b694bc0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62361%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed702cefcc33289f469148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62360-cwe-89-improper-neutralization-of-s-f2c80d34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62360%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68ed702cefcc33289f469154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62251-cwe-732-incorrect-permission-assign-53240f75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62251%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed702cefcc33289f46914c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62359-cwe-79-improper-neutralization-of-i-350bf7fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62359%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed702cefcc33289f46914f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62358-cwe-79-improper-neutralization-of-i-19e93bc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62358%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62179-cwe-89-improper-neutralization-of-s-52a05542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62179%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ed6d2e38344d8bcf324872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62384-cwe-89-improper-neutralization-of-s-0ae68dd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62384%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf32487d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62386-cwe-89-improper-neutralization-of-s-dc44eca4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62386%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62383-cwe-89-improper-neutralization-of-s-a7bf65f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62383%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf32487a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62391-cwe-89-improper-neutralization-of-s-d947fb12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62391%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62178-cwe-79-improper-neutralization-of-i-af2eb4f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62178%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=68ed6d2e38344d8bcf32486d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62385-cwe-89-improper-neutralization-of-s-a9c0b82e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62387-cwe-89-improper-neutralization-of-s-d0cf5ea6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62387%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62388-cwe-89-improper-neutralization-of-s-dfdc5512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62388%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62389-cwe-89-improper-neutralization-of-s-ef7721d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62389%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62390-cwe-89-improper-neutralization-of-s-28fe940a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62390%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62392-cwe-89-improper-neutralization-of-s-2d649999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62392%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2f38344d8bcf3248bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62177-cwe-89-improper-neutralization-of-s-cea4d891</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62177%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ed6d2e38344d8bcf324869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11623-cwe-89-improper-neutralization-of-s-be0efed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11623%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=68ed6d2e38344d8bcf324866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9713-cwe-22-improper-limitation-of-a-path-84467dc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9713%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68ed718fefcc33289f495f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11622-cwe-502-deserialization-of-untruste-cdfd6d4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11622%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68ed718fefcc33289f495f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61688-cwe-200-exposure-of-sensitive-infor-db5e4078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61688%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20siderolabs%20omni&amp;severity=high&amp;id=68ed66ece828b4dd3cc6ab2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59836-cwe-703-improper-check-or-handling--54944e44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59836%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20siderolabs%20omni&amp;severity=medium&amp;id=68ed66ece828b4dd3cc6ab26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62252-cwe-639-authorization-bypass-throug-80773cbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62252%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed66ece828b4dd3cc6ab2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-releases-emergency-patch-for-new-e-business-e88d1bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20releases%20emergency%20patch%20for%20new%20E-Business%20Suite%20flaw&amp;severity=critical&amp;id=68ed66bee828b4dd3cc60f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-multi-country-botnet-targets-rdp-services--469a9630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20multi-country%20botnet%20targets%20RDP%20services%20in%20the%20US&amp;severity=high&amp;id=68ed66bee828b4dd3cc60fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customer-payment-data-stolen-in-unity-technologies-fc80d594</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Customer%20payment%20data%20stolen%20in%20Unity%20Technologies%E2%80%99s%20SpeedTree%20website%20compromise&amp;severity=high&amp;id=68ed66bee828b4dd3cc60fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62364-cwe-59-improper-link-resolution-bef-5a1ba851</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62364%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20oobabooga%20text-generation-webui&amp;severity=medium&amp;id=68ed6345e828b4dd3cbdd2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62246-cwe-79-improper-neutralization-of-i-1441d158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62246%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed60592e9a9eee888b853d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62241-cwe-639-authorization-bypass-throug-4144fee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62241%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20DXP&amp;severity=medium&amp;id=68ed566e06a2a330d3233343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62242-cwe-639-authorization-bypass-throug-af80d1a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62242%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed57c406a2a330d326046c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/judicial-notification-phish-targets-colombian-user-72f40cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Judicial%20Notification%20Phish%20Targets%20Colombian%20Users%20%E2%80%93%20.SVG%20Attachment%20Deploys%20Info-stealer%20Malware&amp;severity=medium&amp;id=68ed566406a2a330d32311e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61775-cwe-613-insufficient-session-expira-952fa92c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61775%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Whimsies-YAT%20Vickey&amp;severity=medium&amp;id=68ed396165e259ed7edc1e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62243-cwe-863-incorrect-authorization-in--6599d06e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62243%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed35e765e259ed7ed4fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-leak-millions-of-users-data-from-qant-d0bf1155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Leak%20Millions%20of%20Users&apos;%20Data%20from%20Qantas%2C%20Vietnam%20Airlines%20and%20Others&amp;severity=medium&amp;id=68ed32d939004152d7f5a900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62244-cwe-639-authorization-bypass-throug-9bd702f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62244%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68ed375065e259ed7ed7d000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/heads-up-scans-for-esafenet-cdg-v5-mon-oct-13th-31120a59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20%2C%20(Mon%2C%20Oct%2013th)&amp;severity=medium&amp;id=68ed2be94a0d14fc5abc2db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11695-cwe-295-improper-certificate-valida-40f7100c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11695%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20MongoDB%20Rust%20Driver&amp;severity=high&amp;id=68ed30c839004152d7ef8a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7707-cwe-377-insecure-temporary-file-in-r-a038680d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7707%3A%20CWE-377%20Insecure%20Temporary%20File%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ed28784a0d14fc5ab516ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/def-con-33-how-i-hacked-over-1000-car-dealerships--d5544abc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(DEF%20CON%2033)%20How%20I%20hacked%20over%201%2C000%20car%20dealerships%20across%20the%20US&amp;severity=medium&amp;id=68ed1ec2e2beed89262b47ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-trojan-abuses-github-to-host-configs-and--d2f1ecb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Trojan%20abuses%20GitHub%20to%20host%20configs%20and%20evade%20takedowns&amp;severity=medium&amp;id=68ed1e6ee2beed89262a5ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-rondodox-botnet-is-weaponizing-ov-3262c5f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20RondoDox%20Botnet%20is%20Weaponizing%20Over%2050%20Flaws%20Across%2030%2B%20Vendors&amp;severity=high&amp;id=68ed1e6ee2beed89262a5eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harvard-investigating-breach-linked-to-oracle-zero-bf1df288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harvard%20investigating%20breach%20linked%20to%20Oracle%20zero-day%20exploit&amp;severity=critical&amp;id=68ed1e6ee2beed89262a5ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-unmonitored-javascript-is-your-biggest-holiday-276eab24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Unmonitored%20JavaScript%20Is%20Your%20Biggest%20Holiday%20Security%20Risk&amp;severity=high&amp;id=68ed1e6ee2beed89262a5ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simonmed-imaging-discloses-a-data-breach-impacting-e9b2392f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimonMed%20Imaging%20discloses%20a%20data%20breach%20impacting%20over%201.2%20million%20people&amp;severity=high&amp;id=68ed1e6ee2beed89262a5ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openais-guardrails-can-be-bypassed-by-simple-promp-b8c2a5a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%E2%80%99s%20Guardrails%20Can%20Be%20Bypassed%20by%20Simple%20Prompt%20Injection%20Attack&amp;severity=medium&amp;id=68ed1af6e2beed8926232566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llm-honeypot-vs-cryptojacking-understanding-the-en-a4fb08ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLM%20Honeypot%20vs.%20Cryptojacking%3A%20Understanding%20the%20Enemy&amp;severity=medium&amp;id=68ed179d9bc739241f40d343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/financial-other-industries-urged-to-prepare-for-qu-8ff07b57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Financial%2C%20Other%20Industries%20Urged%20to%20Prepare%20for%20Quantum%20Computers&amp;severity=medium&amp;id=68eda150e121319cf76c6bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43991-cwe-61-unix-symbolic-link-symlink-f-092f9a6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43991%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=medium&amp;id=68ed158d9bc739241f3ccd69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-code-on-unity-website-skims-information--ded398fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Code%20on%20Unity%20Website%20Skims%20Information%20From%20Hundreds%20of%20Customers&amp;severity=medium&amp;id=68ed0d6352482bb54d52d4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-infrastructure-cisos-cant-ignore-back-off-3a58fb63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20infrastructure%20CISOs%20Can&apos;t%20Ignore%20&apos;Back-Office%20Clutter&apos;%20Data&amp;severity=critical&amp;id=68ed066025fb26f08f8b77a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37729-cwe-1336-in-elastic-elastic-cloud-e-d422b4c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37729%3A%20CWE-1336%20in%20Elastic%20Elastic%20Cloud%20Enterprise%20(ECE)&amp;severity=critical&amp;id=68ed034f67696672afefd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-whatsapp-worm-critical-cves-oracle-0--080fef14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20WhatsApp%20Worm%2C%20Critical%20CVEs%2C%20Oracle%200-Day%2C%20Ransomware%20Cartel%20%26%20More&amp;severity=critical&amp;id=68eda062e121319cf76c34fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-ssl-vpn-accounts-in-attacker-crosshairs-668916d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SSL%20VPN%20Accounts%20in%20Attacker%20Crosshairs&amp;severity=medium&amp;id=68ecfc877da36148c99f8e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9902-cwe-639-authorization-bypass-through-477d5848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9902%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20AKIN%20Software%20Computer%20Import%20Export%20Industry%20and%20Trade%20Co.%20Ltd.%20QRMenu&amp;severity=high&amp;id=68ed014867696672afeb29c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6919-cwe-89-improper-neutralization-of-sp-a7de2e17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6919%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cats%20Information%20Technology%20Software%20Development%20Technologies%20Aykome%20License%20Tracking%20System&amp;severity=critical&amp;id=68ecf9147da36148c998a6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simonmed-imaging-data-breach-impacts-12-million-48b0a62e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SimonMed%20Imaging%20Data%20Breach%20Impacts%201.2%20Million&amp;severity=medium&amp;id=68ecf247dd5e0d603050473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-unmonitored-javascript-is-your-biggest-holiday-db4069a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Unmonitored%20JavaScript%20Is%20Your%20Biggest%20Holiday%20Security%20Risk&amp;severity=critical&amp;id=68eda062e121319cf76c3500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-infrastructure-abused-in-phishing-campaign-aim-632ab965</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Infrastructure%20Abused%20in%20Phishing%20Campaign%20Aimed%20at%20Industrial%20and%20Electronics%20Firms&amp;severity=medium&amp;id=68ece878daa53b24786fa2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invoicely-database-leak-exposes-180000-sensitive-r-de8c5f1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invoicely%20Database%20Leak%20Exposes%20180%2C000%20Sensitive%20Records&amp;severity=medium&amp;id=68ece1834f0998eca3fbdb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-patches-ebs-vulnerability-allowing-access-t-d29731a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Patches%20EBS%20Vulnerability%20Allowing%20Access%20to%20Sensitive%20Data&amp;severity=low&amp;id=68ecd6b89fb532f07af2d401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-rondodox-botnet-is-weaponizing-ov-0b0e2ae7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20RondoDox%20Botnet%20is%20Weaponizing%20Over%2050%20Flaws%20Across%2030%2B%20Vendors&amp;severity=medium&amp;id=68eda062e121319cf76c3503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-locks-down-ie-mode-after-hackers-turned--56f20384</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Locks%20Down%20IE%20Mode%20After%20Hackers%20Turned%20Legacy%20Feature%20Into%20Backdoor&amp;severity=medium&amp;id=68eda062e121319cf76c3506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10720-cwe-639-authorization-bypass-throug-58f4d786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10720%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=68ecd13f847004351751526f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spanish-authorities-dismantle-gxc-team-crime-as-a--10b85e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spanish%20Authorities%20Dismantle%20%E2%80%98GXC%20Team%E2%80%99%20Crime-as-a-Service%20Operation&amp;severity=medium&amp;id=68ecc8f7ff270e1f1a064f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9337-cwe-476-null-pointer-dereference-in--df657ce0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9337%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=68ecc911ff270e1f1a069210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9336-cwe-121-stack-based-buffer-overflow--885cab87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9336%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Armoury%20Crate&amp;severity=medium&amp;id=68ecc911ff270e1f1a06920d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11184-cwe-79-improper-neutralization-of-i-2336a6aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20qwc-services%20qwc-registration-gui&amp;severity=medium&amp;id=68ecc5a7617226e321685f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11183-cwe-79-improper-neutralization-of-i-1a12943f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20QGIS%20QWC2&amp;severity=medium&amp;id=68ecc5a7617226e321685f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13th-october-threat-intelligence-report-57b35e13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68ecbed9fcb31871cb71f1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/extortion-group-leaks-millions-of-records-from-sal-c3670b48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Extortion%20Group%20Leaks%20Millions%20of%20Records%20From%20Salesforce%20Hacks&amp;severity=medium&amp;id=68ecbec2fcb31871cb71dd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9968-cwe-59-improper-link-resolution-befo-e9de5c51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9968%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=68ecbcbcfcb31871cb6ddb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11668-sql-injection-in-code-projects-auto-3a805de6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11668%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ecb4ba5296f0f0802d7ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11675-cwe-434-unrestricted-upload-of-file-6f9a4b74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11675%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ragic%20Enterprise%20Cloud%20Database&amp;severity=high&amp;id=68ecb1b913a035d7a75ed865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11674-cwe-918-server-side-request-forgery-f8427d3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11674%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PiExtract%20SOOP-CLM&amp;severity=medium&amp;id=68ecb62b5296f0f080308ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10558-cwe-79-improper-neutralization-of-i-d09a4d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10558%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%203DSwymer&amp;severity=high&amp;id=68ecae3d13a035d7a7575c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10557-cwe-79-improper-neutralization-of-i-a2e438c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10557%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=68ecae3d13a035d7a7575c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10556-cwe-79-improper-neutralization-of-i-2fd7399a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10556%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20ENOVIA%20Specification%20Manager&amp;severity=high&amp;id=68ecae3d13a035d7a7575bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10552-cwe-79-improper-neutralization-of-i-29d539dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%203DSwymer&amp;severity=high&amp;id=68ecae3d13a035d7a7575bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11673-cwe-912-hidden-functionality-in-pie-76f1b7ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11673%3A%20CWE-912%20Hidden%20Functionality%20in%20PiExtract%20SOOP-CLM&amp;severity=high&amp;id=68ecae3d13a035d7a7575c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9976-cwe-78-improper-neutralization-of-sp-2b6cdb67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9976%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Station%20Launcher%20App%20in%203DEXPERIENCE%20platform&amp;severity=critical&amp;id=68ecae3d13a035d7a7575c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11672-cwe-306-missing-authentication-for--c99d1601</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11672%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EBM%20Technologies%20Uniweb%2FSoliPACS%20WebServer&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11667-sql-injection-in-code-projects-auto-6c36a341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11667%3A%20SQL%20Injection%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11671-cwe-306-missing-authentication-for--f56cfc81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11671%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EBM%20Technologies%20Uniweb%2FSoliPACS%20WebServer&amp;severity=medium&amp;id=68ecae3d13a035d7a7575c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11666-use-of-hard-coded-password-in-tenda-31abd94e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11666%3A%20Use%20of%20Hard-coded%20Password%20in%20Tenda%20RP3%20Pro&amp;severity=high&amp;id=68eca73af9d7069310c27773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8915-cwe-200-exposure-of-sensitive-inform-a666c6b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8915%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Kiloview%20N30&amp;severity=high&amp;id=68eca3f676ac24bf78e1805f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9265-cwe-346-origin-validation-error-in-k-d982bf26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9265%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Kiloview%20NDI&amp;severity=critical&amp;id=68eca3f676ac24bf78e18062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/astaroth-banking-trojan-abuses-github-to-remain-op-59a3fe52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Astaroth%20Banking%20Trojan%20Abuses%20GitHub%20to%20Remain%20Operational%20After%20Takedowns&amp;severity=medium&amp;id=68eda062e121319cf76c3509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11665-os-command-injection-in-d-link-dap--379f7223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11665%3A%20OS%20Command%20Injection%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=68eca07b76ac24bf78d95a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0636-cwe-78-improper-neutralization-of-sp-d317c429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0636%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ericsson%20Site%20Controller%206610&amp;severity=high&amp;id=68ec9d40a7330cdb49adeae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27258-cwe-284-improper-access-control-in--80cca729</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27258%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Ericsson%20Ericsson%20Network%20Manager(ENM)&amp;severity=medium&amp;id=68ec9d40a7330cdb49adeaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27259-cwe-79-improper-neutralization-of-i-c9e5f153</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ericsson%20Ericsson%20Network%20Manager(ENM)&amp;severity=low&amp;id=68ec9d40a7330cdb49adeaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11664-sql-injection-in-campcodes-online-b-05766d68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11664%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68ec99d4a7330cdb49a66d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9698-cwe-79-cross-site-scripting-xss-in-t-aade89ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9698%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68ec96c744969315cfd5cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11663-sql-injection-in-campcodes-online-b-047e65ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11663%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68ec9049d25177382441df02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-rust-based-malware-chaosbot-uses-discord-chann-515129af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Rust-Based%20Malware%20%22ChaosBot%22%20Uses%20Discord%20Channels%20to%20Control%20Victims&apos;%20PCs&amp;severity=low&amp;id=68eda062e121319cf76c350c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11662-sql-injection-in-sourcecodester-bes-84d90fcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11662%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68ec89cf1590c630c202cbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31995-cwe-20-improper-input-validation-in-85de45d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31995%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20MaxAI%20Workbench&amp;severity=low&amp;id=68ec89cf1590c630c202cbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11661-missing-authentication-in-projectsa-b86c44ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11661%3A%20Missing%20Authentication%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec836385888e71ae1a402e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11660-unrestricted-upload-in-projectsandp-8e07fbfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11660%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec7cd32800e7e3a061fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31994-cwe-79-improper-neutralization-of-i-548263d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20Unica%20Campaign&amp;severity=medium&amp;id=68ec815385888e71ae15df7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31996-cwe-552-files-or-directories-access-ca4b4bed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31996%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20HCL%20Software%20Unica%20Platform&amp;severity=medium&amp;id=68ec79542800e7e3a05a7f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11659-unrestricted-upload-in-projectsandp-dab5650a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11659%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec764afbc519dcfe649f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11658-unrestricted-upload-in-projectsandp-a3b4a187</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11658%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec72b9fbc519dcfe63011b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11657-unrestricted-upload-in-projectsandp-4a15bdb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11657%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec6bb7fbc519dcfe6190f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11656-unrestricted-upload-in-projectsandp-c2a14beb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11656%3A%20Unrestricted%20Upload%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68ec64b6fbc519dcfe601ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11655-unrestricted-upload-in-totaljs-flow-8281e6c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11655%3A%20Unrestricted%20Upload%20in%20Total.js%20Flow&amp;severity=medium&amp;id=68ec5d9efbc519dcfe5dfc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11654-sql-injection-in-yousaf530-inferno--290b59e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11654%3A%20SQL%20Injection%20in%20yousaf530%20Inferno%20Online%20Clothing%20Store&amp;severity=medium&amp;id=68ec5315fbc519dcfe5c047e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36087-cwe-798-use-of-hard-coded-credentia-772d0dd8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36087%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Security%20Verify%20Access&amp;severity=high&amp;id=68ec4e11fbc519dcfe5af6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11653-buffer-overflow-in-utt-hiper-2620g-feb39aa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11653%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%202620G&amp;severity=high&amp;id=68ec4e11fbc519dcfe5af6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11652-buffer-overflow-in-utt-518g-f8b679f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11652%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20518G&amp;severity=high&amp;id=68ec4896fbc519dcfe53b447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-13-cf0ca0f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-13&amp;severity=medium&amp;id=68ed93f253be882d4e4b5136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11651-buffer-overflow-in-utt-518g-f5994709</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11651%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20518G&amp;severity=high&amp;id=68ec3b1ffb97228d20438bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11650-use-of-weak-hash-in-tomofun-furbo-3-891749cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11650%3A%20Use%20of%20Weak%20Hash%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec3621b99bb870f150ee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11649-use-of-hard-coded-password-in-tomof-948cb52a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11649%3A%20Use%20of%20Hard-coded%20Password%20in%20Tomofun%20Furbo%20360&amp;severity=high&amp;id=68ec2e4f54ebfa14c6b73c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11648-server-side-request-forgery-in-tomo-8e23d8ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11648%3A%20Server-Side%20Request%20Forgery%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec27b2152e6fbe60df9308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11647-information-disclosure-in-tomofun-f-7c635ab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11647%3A%20Information%20Disclosure%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec21584063b57761c6472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-oracle-e-business-suite-bug-could-let-hackers--d9fc564a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Oracle%20E-Business%20Suite%20Bug%20Could%20Let%20Hackers%20Access%20Data%20Without%20Login&amp;severity=high&amp;id=68ec1e512951d0f0a8781ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11646-improper-access-controls-in-tomofun-47d6d427</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11646%3A%20Improper%20Access%20Controls%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec1ad92951d0f0a8712bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11645-insecure-storage-of-sensitive-infor-203d2854</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11645%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20Mobile%20App&amp;severity=low&amp;id=68ec117fb0f2f6c74eaacec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11644-insecure-storage-of-sensitive-infor-0100ce95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11644%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ec0b3b8f179ca8e875fda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-dismantles-gxc-team-cybercrime-syndicate-arr-351f2e4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20dismantles%20%E2%80%9CGXC%20Team%E2%80%9D%20cybercrime%20syndicate%2C%20arrests%20leader&amp;severity=high&amp;id=68ec0b018f179ca8e87579be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-inflation-refund-texts-target-new-yorkers-in--fee95c7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20&apos;Inflation%20Refund&apos;%20texts%20target%20New%20Yorkers%20in%20new%20scam&amp;severity=high&amp;id=68ec0b018f179ca8e87579c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-group-claims-the-hack-of-harvard-u-3fed64c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20group%20claims%20the%20hack%20of%20Harvard%20University&amp;severity=medium&amp;id=68ec0b018f179ca8e87579c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11643-hard-coded-credentials-in-tomofun-f-4f0feb69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11643%3A%20Hard-coded%20Credentials%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ec04772ad1f36bd948e97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11642-denial-of-service-in-tomofun-furbo--a41afc9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11642%3A%20Denial%20of%20Service%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebfdab326426c3ce4b9041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11641-improper-access-controls-in-tomofun-976c73a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11641%3A%20Improper%20Access%20Controls%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ebf5e4b1bbab260229ddf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11640-cleartext-transmission-of-sensitive-42bbee41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11640%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68ebf07242ddb1210bc1e905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11639-insecure-storage-of-sensitive-infor-576356d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11639%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebe832514ee80e17c46bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-oracle-e-business-suite-bug-could-let-hackers--7c970d10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Oracle%20E-Business%20Suite%20Bug%20Could%20Let%20Hackers%20Access%20Data%20Without%20Login&amp;severity=high&amp;id=68ec4cb8fbc519dcfe59fede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11638-denial-of-service-in-tomofun-furbo--83fd62c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11638%3A%20Denial%20of%20Service%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebe1892b9503bda4776cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11637-race-condition-in-tomofun-furbo-360-5f5b5ad2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11637%3A%20Race%20Condition%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebdaac94f05d7804bfc0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11636-server-side-request-forgery-in-tomo-c79c5d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11636%3A%20Server-Side%20Request%20Forgery%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebc5b38f89936022b765da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11635-resource-consumption-in-tomofun-fur-59e05df6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11635%3A%20Resource%20Consumption%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68ebb8db8ff13aa08ba99207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2138-cwe-602-client-side-enforcement-of-s-4ea38d89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2138%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=low&amp;id=68ebb20ce7e4c74b800ba668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2139-cwe-602-client-side-enforcement-of-s-3df394bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2139%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=low&amp;id=68ebb20ce7e4c74b800ba66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2140-cwe-346-origin-validation-error-in-i-570e4a6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2140%3A%20CWE-346%20Origin%20Validation%20Error%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=medium&amp;id=68ebb20ce7e4c74b800ba66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33096-cwe-674-uncontrolled-recursion-in-i-d8e26230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33096%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20IBM%20Engineering%20Requirements%20Management%20Doors%20Next&amp;severity=medium&amp;id=68ebb20ce7e4c74b800ba671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11634-information-disclosure-in-tomofun-f-e2719d68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11634%3A%20Information%20Disclosure%20in%20Tomofun%20Furbo%20360&amp;severity=low&amp;id=68eba4434919031131a7368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11633-improper-certificate-validation-in--4858f15d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11633%3A%20Improper%20Certificate%20Validation%20in%20Tomofun%20Furbo%20360&amp;severity=medium&amp;id=68eb9db55b13363b9aae311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52615-cwe-693-protection-mechanism-failur-0f224390</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52615%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20HCL%20Software%20Unica%20Platform&amp;severity=low&amp;id=68eb66275e31a5ce11114464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11631-path-traversal-in-rainygao-docsys-4b92fd72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11631%3A%20Path%20Traversal%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb6abbca4916fd91025b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52614-cwe-614-sensitive-cookie-in-https-s-d7d00b09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52614%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20HCL%20Software%20Unica%20Platform&amp;severity=low&amp;id=68eb5f99e1ad852e9038ab35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31969-cwe-358-improperly-implemented-secu-c3c03f31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31969%3A%20CWE-358%20%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20HCL%20Software%20Unica%20Platform&amp;severity=medium&amp;id=68eb64135e31a5ce110d0bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11630-path-traversal-in-rainygao-docsys-94536486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11630%3A%20Path%20Traversal%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb5c37e1ad852e9031a4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireshark-4410-and-460-released-sun-oct-12th-62c56c58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireshark%204.4.10%20and%204.6.0%20Released%2C%20(Sun%2C%20Oct%2012th)&amp;severity=medium&amp;id=68eb5c1ae1ad852e903127e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11629-sql-injection-in-rainygao-docsys-8898313b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11629%3A%20SQL%20Injection%20in%20RainyGao%20DocSys&amp;severity=medium&amp;id=68eb55984e7fa26e3d2396e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31992-cwe-80-improper-neutralization-of-s-368b5e65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31992%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20HCL%20Software%20MaxAI%20Assistant&amp;severity=medium&amp;id=68eb454c3a1a0b12de17ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11628-sql-injection-in-jimit105-project-o-d9481388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11628%3A%20SQL%20Injection%20in%20jimit105%20Project-Online-Shopping-Website&amp;severity=medium&amp;id=68eb38594d1b2b17802d79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52616-cwe-497-exposure-of-sensitive-syste-b2c16011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52616%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20HCL%20Software%20Unica&amp;severity=medium&amp;id=68eb31dec96eae101eba8414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-enumeration-of-grpc-services-69d72040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Enumeration%20of%20gRPC%20Services&amp;severity=medium&amp;id=68eb23a39e4c4c77c0af044a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31998-cwe-703-improper-check-or-handling--9fe412b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31998%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=low&amp;id=68eb18ce5baaa01f1c02ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61884-easily-exploitable-vulnerability-al-08dc9c67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61884%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Configurator.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Configurator%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Configurator&amp;severity=high&amp;id=68eb18ce5baaa01f1c02ffa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31997-cwe-639-authorization-bypass-throug-280b4e36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31997%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=medium&amp;id=68eb18ce5baaa01f1c02ff9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31993-cwe-918-server-side-request-forgery-c1354369</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31993%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HCL%20Software%20Unica%20Centralized%20Offer%20Management&amp;severity=low&amp;id=68eb18ce5baaa01f1c02ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-12-bec3dff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-12&amp;severity=medium&amp;id=68ec44fafbc519dcfe506e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11615-sql-injection-in-sourcecodester-bes-366ee80e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11615%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68eacef65baaa01f1cdaf783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11614-sql-injection-in-sourcecodester-bes-58604d75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11614%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68eac0e95baaa01f1cd4ba18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-warn-of-widespread-sonicwall-vpn-compromis-7c043863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Warn%20of%20Widespread%20SonicWall%20VPN%20Compromise%20Impacting%20Over%20100%20Accounts&amp;severity=high&amp;id=68eab9e15baaa01f1cd2ca64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11613-sql-injection-in-code-projects-simp-b0baa22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11613%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68eab2d95baaa01f1cd0f778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11612-sql-injection-in-code-projects-simp-1b80a0eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11612%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68eaabda5baaa01f1cce7baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11611-sql-injection-in-sourcecodester-sim-302effdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11611%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Inventory%20System&amp;severity=medium&amp;id=68eaa4d85baaa01f1cccb515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11610-sql-injection-in-sourcecodester-sim-604c58f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11610%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Inventory%20System&amp;severity=medium&amp;id=68eb218d9e4c4c77c0aa679f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11609-use-of-hard-coded-cryptographic-key-39683e2f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11609%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20code-projects%20Hospital%20Management%20System&amp;severity=medium&amp;id=68ea96c55baaa01f1cc98d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11608-sql-injection-in-code-projects-e-ba-5c7d6b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11608%3A%20SQL%20Injection%20in%20code-projects%20E-Banking%20System&amp;severity=medium&amp;id=68ea8fb15baaa01f1cc7ee1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11607-path-traversal-in-harry0703-moneypr-a534a8b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11607%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=68ea88af5baaa01f1cc5800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11606-sql-injection-in-ipynch-social-netw-32679cc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11606%3A%20SQL%20Injection%20in%20iPynch%20Social%20Network%20Website&amp;severity=medium&amp;id=68ea73935baaa01f1cbf8143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11605-sql-injection-in-code-projects-clie-645a6232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11605%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68ea6c8a5baaa01f1cbd7828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11604-sql-injection-in-projectworlds-onli-3052b7eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11604%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Ordering%20Food%20System&amp;severity=medium&amp;id=68ea65895baaa01f1cbb6470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11603-sql-injection-in-code-projects-simp-7a2e5e00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11603%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ea5e7a5baaa01f1cb96f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-warn-of-widespread-sonicwall-vpn-compromis-a532dc91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Warn%20of%20Widespread%20SonicWall%20VPN%20Compromise%20Impacting%20Over%20100%20Accounts&amp;severity=medium&amp;id=68ec4cb8fbc519dcfe59fee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-turn-velociraptor-dfir-tool-into-weapon-in-1024e98e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Turn%20Velociraptor%20DFIR%20Tool%20Into%20Weapon%20in%20LockBit%20Ransomware%20Attacks&amp;severity=medium&amp;id=68ec4cb8fbc519dcfe59fee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11601-sql-injection-in-sourcecodester-onl-a633600c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11601%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Result%20System&amp;severity=medium&amp;id=68ea57795baaa01f1cb66479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11600-sql-injection-in-code-projects-simp-7dce2bb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11600%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68ea506a5baaa01f1cb35758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11599-sql-injection-in-campcodes-online-a-3c2bc02a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11599%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68eb218d9e4c4c77c0aa67a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11597-sql-injection-in-code-projects-e-co-8022c8e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11597%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68ea3b545baaa01f1cab1962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11596-sql-injection-in-code-projects-e-co-2564d46b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11596%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68ea2d435baaa01f1ca3be09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iamantimalware-inject-malicious-code-into-antiviru-8906fa70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IAmAntimalware%3A%20Inject%20Malicious%20Code%20Into%20Antivirus&amp;severity=medium&amp;id=68ea29c25baaa01f1ca27b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11595-sql-injection-in-campcodes-online-a-dcf44a7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11595%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10376-cwe-352-cross-site-request-forgery--574ba577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10376%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ercbs%20Course%20Redirects%20for%20Learndash%20Plugin&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10129-cwe-79-improper-neutralization-of-i-16bb8075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miksco%20WordPress%20Live%20Webcam%20Widget%20%26%20Shortcode&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10375-cwe-352-cross-site-request-forgery--8efebdb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20accessibewp%20Web%20Accessibility%20by%20accessiBe&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9947-cwe-89-improper-neutralization-of-sp-2fed07b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9947%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kunalnagar%20Custom%20404%20Pro&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8606-cwe-352-cross-site-request-forgery-c-87f0ef33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8606%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20westerndeal%20GSheetConnector%20For%20Gravity%20Forms&amp;severity=low&amp;id=68ea263e5baaa01f1ca0ffed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10175-cwe-89-improper-neutralization-of-s-d1448a12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10175%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rico-macchi%20WP%20Links%20Page&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8593-cwe-862-missing-authorization-in-wes-c29e6199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8593%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20GSheetConnector%20For%20Gravity%20Forms&amp;severity=high&amp;id=68ea263e5baaa01f1ca0ffe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8484-cwe-200-exposure-of-sensitive-inform-5864d773</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8484%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nickclarkweb%20Code%20Quality%20Control%20Tool&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9950-cwe-22-improper-limitation-of-a-path-455b0c7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9950%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bestwebsoft%20Error%20Log%20Viewer%20by%20BestWebSoft&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8682-cwe-862-missing-authorization-in-the-933ec437</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8682%3A%20CWE-862%20Missing%20Authorization%20in%20themeansar%20Newsup&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9626-cwe-352-cross-site-request-forgery-c-44d687a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9626%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20softwud%20Page%20Blocks&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10190-cwe-79-improper-neutralization-of-i-3ef136ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10190%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husainahmedqureshi%20WP%20Easy%20Toggles&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9975-cwe-918-server-side-request-forgery--c9e43dee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9975%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20rico-macchi%20WP%20Scraper&amp;severity=medium&amp;id=68ea263e5baaa01f1ca1000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6439-cwe-22-improper-limitation-of-a-path-0932a760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6439%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JMA%20Plugins%20WooCommerce%20Designer%20Pro&amp;severity=critical&amp;id=68ea263d5baaa01f1ca0ffa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7652-cwe-79-improper-neutralization-of-in-e6c4e4ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ndiego%20Easy%20Plugin%20Stats&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10167-cwe-79-improper-neutralization-of-i-e3e8f333</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodefactory%20Stock%20History%20%26%20Reports%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=68ea263d5baaa01f1ca0ff82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9621-cwe-352-cross-site-request-forgery-c-fc05f531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9621%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20widgetpack%20WidgetPack%20Comment%20System&amp;severity=medium&amp;id=68ea263e5baaa01f1ca0fff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58293-cwe-264-permissions-privileges-and--39b5bf2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58293%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263e5baaa01f1ca10016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58289-cwe-840-business-logic-errors-in-hu-a0fb5537</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58289%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263e5baaa01f1ca1000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58301-cwe-121-stack-based-buffer-overflow-5adb99b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58301%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea263f5baaa01f1ca1003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58300-cwe-121-stack-based-buffer-overflow-4413a861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58300%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea22b95baaa01f1c9f768f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58299-cwe-416-use-after-free-in-huawei-ha-b7649818</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58299%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1f345baaa01f1c9e3c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58298-cwe-121-stack-based-buffer-overflow-d55dfbb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58298%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1f345baaa01f1c9e3c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11594-improper-validation-of-specified-qu-5d063e17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11594%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20ywxbear%20PHP-Bookstore-Website-Example&amp;severity=medium&amp;id=68ea1f345baaa01f1c9e3c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58297-cwe-121-stack-based-buffer-overflow-8d84767c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58297%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1f345baaa01f1c9e3c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58295-cwe-121-stack-based-buffer-overflow-6c4a6891</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58295%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1bb15baaa01f1c9d1d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58292-cwe-27-path-traversal-dirfilename-i-3936ca1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58292%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58291-cwe-29-path-traversal-filename-in-h-764c8d91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58291%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58290-cwe-41-improper-resolution-of-path--41a359bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58290%3A%20CWE-41%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58288-cwe-275-permission-issues-in-huawei-07e051ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58288%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ea1bb15baaa01f1c9d1d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58287-cwe-275-permission-issues-in-huawei-f474e5d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58287%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ea1bb15baaa01f1c9d1d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58286-cwe-25-path-traversal-filedir-in-hu-e61f3bdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58286%3A%20CWE-25%20Path%20Traversal%3A%20&apos;%2F..%2Ffiledir&apos;%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68ea1bb15baaa01f1c9d1d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11167-cwe-601-url-redirection-to-untruste-524ec643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11167%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20creativemindssolutions%20CM%20Registration%20%E2%80%93%20Tailored%20tool%20for%20seamless%20login%20and%20invitation-based%20registrations&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11518-cwe-639-authorization-bypass-throug-4f852b5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11518%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpclever%20WPC%20Smart%20Wishlist%20for%20WooCommerce&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11254-cwe-1236-improper-neutralization-of-52f67e4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11254%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%20%26%20Sell%20with%20PayPal%20and%20Stripe&amp;severity=medium&amp;id=68ea182c5baaa01f1c9bed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6553-cwe-434-unrestricted-upload-of-file--b45e0c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6553%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=critical&amp;id=68ea182c5baaa01f1c9bed36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10185-cwe-89-improper-neutralization-of-s-e62abbf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10185%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68ea07c7ea13521b93fae104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10048-cwe-89-improper-neutralization-of-s-95a50c00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10048%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=68ea07c7ea13521b93fae100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9196-cwe-200-exposure-of-sensitive-inform-1823c363</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9196%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68ea07c7ea13521b93fae112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11197-cwe-79-improper-neutralization-of-i-ba3a6fd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11197%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=68ea07c7ea13521b93fae109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11533-cwe-269-improper-privilege-manageme-36e924d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11533%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusTheme%20WP%20Freeio&amp;severity=critical&amp;id=68ea07c7ea13521b93fae10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9496-cwe-79-improper-neutralization-of-in-b2bd13b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20Enable%20Media%20Replace&amp;severity=medium&amp;id=68ea07c7ea13521b93fae116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11593-sql-injection-in-codeastro-gym-mana-649342e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11593%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68ea044cea13521b93f32531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11592-sql-injection-in-codeastro-gym-mana-f03fa658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11592%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9fdd46ec084c5e89a5566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11591-sql-injection-in-codeastro-gym-mana-47c5220f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11591%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9e6f7cd0503e930188560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58285-cwe-264-permissions-privileges-and--23a5f992</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58285%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9de46bc1e212db987cfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58284-cwe-264-permissions-privileges-and--69159c3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58284%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9de46bc1e212db987cffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58283-cwe-264-permissions-privileges-and--bdb66415</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58283%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d65caf47a96dabc8f9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58282-cwe-264-permissions-privileges-and--e67bb8c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58282%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=68e9d65caf47a96dabc8f9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58278-cwe-200-exposure-of-sensitive-infor-5e6c6cf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58278%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d65caf47a96dabc8f9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58277-cwe-200-exposure-of-sensitive-infor-96d0c883</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58277%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9d38e54cfe91d8ff083ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-story-about-bypassing-air-canadas-in-flight-netw-98c21b6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Story%20About%20Bypassing%20Air%20Canada&apos;s%20In-flight%20Network%20Restrictions&amp;severity=medium&amp;id=68e9d00f54cfe91d8fefed1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealit-campaign-abuses-nodejs-single-executab-de061660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealit%20Campaign%20Abuses%20Node.js%20Single%20Executable%20Application&amp;severity=medium&amp;id=68ecd3468470043517556eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11380-cwe-862-missing-authorization-in-ev-608ef6b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11380%3A%20CWE-862%20Missing%20Authorization%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=medium&amp;id=68e9c57e54cfe91d8fee2b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9560-cwe-79-improper-neutralization-of-in-4dd5ab81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=68e9c57e54cfe91d8fee2b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54654-cwe-264-permissions-privileges-and--34f6e38a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54654%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68e9be7854cfe91d8fec883f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11590-sql-injection-in-codeastro-gym-mana-05e18dc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11590%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e9b06754cfe91d8fea642c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31718-cwe-78-os-command-injection-in-unis-6bf0c291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31718%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T606%2FT612%2FT616%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=high&amp;id=68e9a97654cfe91d8fe5c94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31717-cwe-78-os-command-injection-in-unis-4cbe3d70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31717%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20T750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=high&amp;id=68e9a97654cfe91d8fe5c94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-11-edcafc36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-11&amp;severity=medium&amp;id=68eaf2135baaa01f1ce556ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11626-cwe-835-loop-with-unreachable-exit--ff2a18d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11626%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=68e98d8a427d841ed4f6b6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9554-vulnerability-in-drupal-owl-carousel-c2210e58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9554%3A%20Vulnerability%20in%20Drupal%20Owl%20Carousel%202&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9553-vulnerability-in-drupal-api-key-mana-b8296744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9553%3A%20Vulnerability%20in%20Drupal%20API%20Key%20manager&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9552-vulnerability-in-drupal-synchronize--28ebba23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9552%3A%20Vulnerability%20in%20Drupal%20Synchronize%20composer.json%20With%20Contrib%20Modules&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9551-cwe-307-improper-restriction-of-exce-28270199</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9551%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Protected%20Pages&amp;severity=medium&amp;id=68e98a03a6e766b7172b96a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9550-cwe-79-improper-neutralization-of-in-c125be01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Facets&amp;severity=medium&amp;id=68e98a03a6e766b7172b969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9549-cwe-862-missing-authorization-in-dru-b8e02924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9549%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Facets&amp;severity=medium&amp;id=68e98a03a6e766b7172b969a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8093-cwe-288-authentication-bypass-using--d090a7bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8093%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Authenticator%20Login&amp;severity=high&amp;id=68e98a03a6e766b7172b9697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52647-cwe-644-improper-neutralization-of--21bc2246</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52647%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20HCL%20Software%20BigFix%20WebUI&amp;severity=medium&amp;id=68e98689a6e766b717250985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploiting-zero-day-in-gladinet-file-shari-edeb0bb5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20exploiting%20zero-day%20in%20Gladinet%20file%20sharing%20software&amp;severity=critical&amp;id=68e97fb88031eb1aa2d23790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11589-sql-injection-in-codeastro-gym-mana-13f46a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11589%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e97fc68031eb1aa2d2662c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11588-sql-injection-in-codeastro-gym-mana-9a485f6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11588%3A%20SQL%20Injection%20in%20CodeAstro%20Gym%20Management%20System&amp;severity=medium&amp;id=68e97fc68031eb1aa2d26625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1password-addresses-critical-ai-browser-agent-secu-cdd52355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1Password%20Addresses%20Critical%20AI%20Browser%20Agent%20Security%20Gap&amp;severity=critical&amp;id=68e9af5454cfe91d8fea39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11586-stack-based-buffer-overflow-in-tend-c5664a1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11586%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e9756d807ca07d502307f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11585-sql-injection-in-code-projects-proj-86d935d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11585%3A%20SQL%20Injection%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68e9756d807ca07d502307f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-infostealer-to-full-rat-dissecting-the-purera-7934e8b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20infostealer%20to%20full%20RAT%3A%20dissecting%20the%20PureRAT%20attack%20chain&amp;severity=medium&amp;id=68e96e4d4338e1ae7d84ca8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11584-sql-injection-in-code-projects-onli-40929b28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11584%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e971f7807ca07d501c4640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62158-cwe-200-exposure-of-sensitive-infor-917267ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62158%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20frappe%20lms&amp;severity=low&amp;id=68e96ae14338e1ae7d7efb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11583-sql-injection-in-code-projects-onli-e4197f13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11583%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e96ae14338e1ae7d7efb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11582-sql-injection-in-code-projects-onli-4b63eef0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11582%3A%20SQL%20Injection%20in%20code-projects%20Online%20Job%20Search%20Engine&amp;severity=medium&amp;id=68e96ae14338e1ae7d7efb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61929-cwe-94-improper-control-of-generati-e750e089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61929%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=critical&amp;id=68e9657bb83e3429f3274514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61927-cwe-94-improper-control-of-generati-630ef7e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20capricorn86%20happy-dom&amp;severity=high&amp;id=68e96415b83e3429f324341a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61925-cwe-470-use-of-externally-controlle-daced5a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61925%3A%20CWE-470%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=68e96415b83e3429f3243537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-an-exploit-shotgun-for-edge-vulns-ee297d14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%3A%20an%20&apos;Exploit%20Shotgun&apos;%20for%20Edge%20Vulns&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-now-offers-2-million-for-zero-click-rce-vuln-925e6c17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20now%20offers%20%242%20million%20for%20zero-click%20RCE%20vulnerabilities&amp;severity=high&amp;id=68e95d14710816ddd72cdab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-to-revoke-notification-access-for-in-39d7580d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20to%20revoke%20notification%20access%20for%20inactive%20sites&amp;severity=high&amp;id=68e95d14710816ddd72cdab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62245-cwe-352-cross-site-request-forgery--6b3391c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62245%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e95d32710816ddd72d64df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11581-missing-authorization-in-powerjob-a3cd7e9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11581%3A%20Missing%20Authorization%20in%20PowerJob&amp;severity=medium&amp;id=68e95d32710816ddd72d64e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fight-against-ransomware-heats-up-on-the-facto-4c3cf2d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fight%20Against%20Ransomware%20Heats%20Up%20on%20the%20Factory%20Floor&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11580-missing-authorization-in-powerjob-c7b3ae0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11580%3A%20Missing%20Authorization%20in%20PowerJob&amp;severity=medium&amp;id=68e94f461df34bad8db23a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-clickfix-factory-first-exposure-of-iuam-clickf-34f428d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20ClickFix%20Factory%3A%20First%20Exposure%20of%20IUAM%20ClickFix%20Generator&amp;severity=medium&amp;id=68e94bbba811ebd3155d19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23282-cwe-415-double-free-in-nvidia-virtu-4cb39d6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23282%3A%20CWE-415%20Double%20Free%20in%20NVIDIA%20Virtual%20GPU%20Manager&amp;severity=high&amp;id=68e9484da811ebd31556bed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23280-cwe-416-use-after-free-in-nvidia-ge-b066e491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23280%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68e9484da811ebd31556bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23309-cwe-427-uncontrolled-search-path-el-abe288af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23309%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20GeForce&amp;severity=high&amp;id=68e9484da811ebd31556bee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crimson-collective-a-new-threat-group-observed-ope-10ee0f34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crimson%20Collective%3A%20A%20New%20Threat%20Group%20Observed%20Operating%20in%20the%20Cloud&amp;severity=medium&amp;id=68e94164a46c174737d6e699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11618-cwe-476-null-pointer-dereference-in-0d5832b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11618%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11617-cwe-126-buffer-over-read-in-aws-fre-779213f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11617%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20AWS%20FreeRTOS-Plus-TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11616-cwe-126-buffer-over-read-in-aws-fre-ee6010fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11616%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20AWS%20FreeRTOS-Plus_TCP&amp;severity=medium&amp;id=68e94174a46c174737d6e76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-payroll-pirates-hijacking-hr-sa-90cc9a30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20%E2%80%98Payroll%20Pirates%E2%80%99%20Hijacking%20HR%20SaaS%20Accounts%20to%20Steal%20Employee%20Salaries&amp;severity=high&amp;id=68e93e0f811be5ca96d13eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blog-anatomy-of-a-hacktivist-attack-russian-aligne-6ff697f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blog%20Anatomy%20of%20a%20Hacktivist%20Attack%3A%20Russian-Aligned%20Group%20Targets%20OT%2FICS&amp;severity=medium&amp;id=68e93e03811be5ca96d13cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61689-cwe-113-improper-neutralization-of--04169100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61689%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20JuliaWeb%20HTTP.jl&amp;severity=high&amp;id=68e93a9c811be5ca96ca6d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-shutter-shinyhunters-salesforce-extortion-sit-03a097d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Shutter%20ShinyHunters%20Salesforce%20Extortion%20Site&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-risks-of-vibe-coding-and-llm-assistants-f-6ccfe02f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20risks%20of%20vibe%20coding%20and%20LLM%20assistants%20for%20developers&amp;severity=medium&amp;id=68e93752ca439c55520f8597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auth-bypass-flaw-in-service-finder-wordpress-plugi-e76c2598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auth%20Bypass%20Flaw%20in%20Service%20Finder%20WordPress%20Plugin%20Under%20Active%20Exploit&amp;severity=high&amp;id=68e933d1ca439c5552087378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48043-cwe-863-incorrect-authorization-in--23695597</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48043%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68e93535ca439c55520b301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-use-velociraptor-ir-tool-in-ransom-fd66d3f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Use%20Velociraptor%20IR%20Tool%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-sees-surge-in-ai-powered-cyberattacks-by-r-687fbec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20sees%20surge%20in%20AI-Powered%20cyberattacks%20by%20Russia-linked%20Threat%20Actors&amp;severity=medium&amp;id=68e91f6393e1426593c0ee9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-patched-nine-critical-flaws-in-junos-space-a77110eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20patched%20nine%20critical%20flaws%20in%20Junos%20Space&amp;severity=critical&amp;id=68e91f6393e1426593c0ee9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealit-malware-using-nodejs-to-hide-in-fake-game--b5973dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealit%20Malware%20Using%20Node.js%20to%20Hide%20in%20Fake%20Game%20and%20VPN%20Installers&amp;severity=medium&amp;id=68e9189899b0507a101d806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepfake-awareness-high-at-orgs-but-cyber-defenses-8d7f6004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepfake%20Awareness%20High%20at%20Orgs%2C%20But%20Cyber%20Defenses%20Badly%20Lag&amp;severity=high&amp;id=68e9af5454cfe91d8fea39b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mid-sized-firms-worried-but-confident-over-deepfak-3901303b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mid-Sized%20Firms%20Worried%20But%20Confident%20Over%20Deepfakes&amp;severity=medium&amp;id=68e9187d99b0507a101d5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealit-malware-abuses-nodejs-single-executable-fe-303f2e88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealit%20Malware%20Abuses%20Node.js%20Single%20Executable%20Feature%20via%20Game%20and%20VPN%20Installers&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/living-off-nodejs-addons-f4de520c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Living%20off%20Node.js%20Addons&amp;severity=medium&amp;id=68e918a999b0507a101de8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-gladinet-flaw-exploitation-attacks-o-3d92f1e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20Gladinet%20Flaw%20Exploitation%2C%20Attacks%20on%20ICS%20Honeypot%2C%20ClayRat%20Spyware&amp;severity=medium&amp;id=68e915809497c34e0b75da4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8887-cwe-639-authorization-bypass-through-d2562d34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8887%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Usta%20Information%20Systems%20Inc.%20Aybs%20Interaktif&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8886-cwe-732-incorrect-permission-assignm-809090ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8886%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Usta%20Information%20Systems%20Inc.%20Aybs%20Interaktif&amp;severity=medium&amp;id=68e9137e9497c34e0b718e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-payroll-pirates-hijacking-hr-sa-81ac3c25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Warns%20of%20%E2%80%98Payroll%20Pirates%E2%80%99%20Hijacking%20HR%20SaaS%20Accounts%20to%20Steal%20Employee%20Salaries&amp;severity=high&amp;id=68e9ae2654cfe91d8fe9e2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62237-cwe-79-improper-neutralization-of-i-6818521f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fortinet-palo-alto-networks-devices-targeted-38318fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%2C%20Fortinet%2C%20Palo%20Alto%20Networks%20Devices%20Targeted%20in%20Coordinated%20Campaign&amp;severity=medium&amp;id=68e9019cfd0dca528e8b3eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62238-cwe-79-improper-neutralization-of-i-c24ab4bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62239-cwe-79-improper-neutralization-of-i-fdb6ecd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e8fe2ffd0dca528e83b21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-takes-exploit-shotgun-approach-dbc1d3da</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20Takes%20%E2%80%98Exploit%20Shotgun%E2%80%99%20Approach&amp;severity=medium&amp;id=68e8f7744fe17e26d4190908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-vector-analysis-250-surge-prom-74811b93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Attack%20Vector%20Analysis%3A%20250%25%20Surge%20Prompts%20CISA%20Emergency%20Response&amp;severity=critical&amp;id=68e8f7964fe17e26d4199524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-detection-to-patch-fortra-reveals-full-timeli-d569181c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Detection%20to%20Patch%3A%20Fortra%20Reveals%20Full%20Timeline%20of%20CVE-2025-10035%20Exploitation&amp;severity=critical&amp;id=68e9ae2654cfe91d8fe9e2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7374-cwe-863-incorrect-authorization-in-w-bb12706b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7374%3A%20CWE-863%20Incorrect%20Authorization%20in%20WP%20JobHunt&amp;severity=medium&amp;id=68e8f247395901574383ec06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7781-cwe-79-improper-neutralization-of-in-d00e9554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20JobHunt&amp;severity=medium&amp;id=68e8f247395901574383ec0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11579-cwe-789-memory-allocation-with-exce-5b6fc628</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11579%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nwaples%20rardecode&amp;severity=medium&amp;id=68e8f247395901574383ec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61864-use-after-free-in-fuji-electric-co--daba407a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61864%3A%20Use%20after%20free%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8ea6230774abc8f786ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11190-cwe-89-improper-neutralization-of-s-251c9d38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11190%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=medium&amp;id=68e8ea6230774abc8f786ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11189-cwe-79-improper-neutralization-of-i-df00ef1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=high&amp;id=68e8ea6230774abc8f786ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11188-cwe-89-improper-neutralization-of-s-c6ce3745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11188%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Synchroweb%20Kiwire&amp;severity=high&amp;id=68e8ea6230774abc8f786ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61863-out-of-bounds-read-in-fuji-electric-2a8883e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61863%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8ea6230774abc8f786ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ai-soc-stack-of-2026-what-sets-top-tier-platfo-85aa321f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20AI%20SOC%20Stack%20of%202026%3A%20What%20Sets%20Top-Tier%20Platforms%20Apart%3F&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61862-out-of-bounds-read-in-fuji-electric-48460685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61862%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e768bc5428e10f9f4407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-takes-down-breachforums-portal-used-for-salesf-31fd873a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20takes%20down%20BreachForums%20portal%20used%20for%20Salesforce%20extortion&amp;severity=high&amp;id=68e8e746bc5428e10f9eb2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61861-out-of-bounds-read-in-fuji-electric-7d539e4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61861%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e768bc5428e10f9f4403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-lfi-to-rce-active-exploitation-detected-in-gl-07926b0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20LFI%20to%20RCE%3A%20Active%20Exploitation%20Detected%20in%20Gladinet%20and%20TrioFox%20Vulnerability&amp;severity=high&amp;id=68e8e746bc5428e10f9eb2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/175-malicious-npm-packages-with-26000-downloads-us-d487aae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=175%20Malicious%20npm%20Packages%20with%2026%2C000%20Downloads%20Used%20in%20Credential%20Phishing%20Campaign&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61860-out-of-bounds-read-in-fuji-electric-7b826e15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61860%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e3e0bc5428e10f97dccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-grafana-flaw-to-its-known-exploited-v-a38a1860</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Grafana%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e8e3d0bc5428e10f97838c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61859-out-of-bounds-write-in-fuji-electri-c7cead73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61859%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e3e0bc5428e10f97dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61857-out-of-bounds-write-in-fuji-electri-61db863d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61857%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be5865212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52625-cwe-525-in-hcl-aion-6be1b91c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52625%3A%20CWE-525%20in%20HCL%20AION&amp;severity=low&amp;id=68e8e0e3aec0381be5865208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61858-out-of-bounds-write-in-fuji-electri-970a60f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61858%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be5865216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/juniper-networks-patches-critical-junos-space-vuln-c5afe2ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Juniper%20Networks%20Patches%20Critical%20Junos%20Space%20Vulnerabilities&amp;severity=critical&amp;id=68e8e0c0aec0381be585eef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52624-cwe-1032-in-hcl-aion-80fb7b4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52624%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=medium&amp;id=68e8e0e3aec0381be5865205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52635-cwe-1032-in-hcl-aion-2ef35cc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52635%3A%20CWE-1032%20in%20HCL%20AION&amp;severity=low&amp;id=68e8e0e3aec0381be586520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61856-stack-based-buffer-overflow-in-fuji-3aa39b11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61856%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT&amp;severity=high&amp;id=68e8e0e3aec0381be586520e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52632-cwe-614-in-hcl-aion-65282dad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52632%3A%20CWE-614%20in%20HCL%20AION&amp;severity=medium&amp;id=68e8dd52aec0381be57eb4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37727-cwe-532-insertion-of-sensitive-info-7648d052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37727%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=68e8da15014f1108aabb06d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52630-cwe-200-exposure-of-sensitive-infor-fb244a51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52630%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20AION&amp;severity=low&amp;id=68e8da15014f1108aabb06db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ida-tips-for-reversing-u-boot-1093d40e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IDA%20tips%20for%20reversing%20U-Boot&amp;severity=medium&amp;id=68e8da18014f1108aabb07a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25017-cwe-79-improper-neutralization-of-i-60245127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e8da15014f1108aabb06d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30001-cwe-279-incorrect-execution-assigne-89232480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30001%3A%20CWE-279%20Incorrect%20Execution-Assigned%20Permissions%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=68e8da15014f1108aabb06d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25018-cwe-79-improper-neutralization-of-i-adf76ccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25018%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e8debbaec0381be58193b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zdi-drops-13-unpatched-ivanti-endpoint-manager-vul-235adb03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZDI%20Drops%2013%20Unpatched%20Ivanti%20Endpoint%20Manager%20Vulnerabilities&amp;severity=low&amp;id=68e8d68e014f1108aab3a90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52634-cwe-200-exposure-of-sensitive-infor-78c30aa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52634%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20HCL%20AION&amp;severity=low&amp;id=68e8d6b0014f1108aab40a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-emergency-directive-ai-powered-phishing-campa-d846f0fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Emergency%20Directive%3A%20AI-Powered%20Phishing%20Campaign%20Analysis%20-%20300%25%20Surge%2C%20%242.3B%20Q3%20Losses&amp;severity=critical&amp;id=68e8d6b3014f1108aab41ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-lfi-to-rce-active-exploitation-detected-in-gl-29e57b73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20LFI%20to%20RCE%3A%20Active%20Exploitation%20Detected%20in%20Gladinet%20and%20TrioFox%20Vulnerability&amp;severity=low&amp;id=68e9ae2654cfe91d8fe9e2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52650-cwe-1032-in-hcl-hcl-aion-dc72f665</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52650%3A%20CWE-1032%20in%20HCL%20HCL%20AION&amp;severity=high&amp;id=68e8d389cad02c497658ef8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41089-cwe-79-improper-neutralization-of-i-763c9561</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xibo%20Signage%20Xibo%20CMS&amp;severity=medium&amp;id=68e8d178cad02c49765494c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41088-cwe-79-improper-neutralization-of-i-325cd76d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xibo%20Signage%20Xibo%20CMS&amp;severity=medium&amp;id=68e8d178cad02c49765494c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-ai-remembers-too-much-persistent-behaviors-in-0cf1d022</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20AI%20Remembers%20Too%20Much%20%E2%80%93%20Persistent%20Behaviors%20in%20Agents%E2%80%99%20Memory&amp;severity=medium&amp;id=68e8cc54a06d5f7cba036b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-targets-56-flaws-across-30-device--6d9907b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20Botnet%20targets%2056%20flaws%20across%2030%2B%20device%20types%20worldwide&amp;severity=medium&amp;id=68e8cc54a06d5f7cba036b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52655-cwe-829-inclusion-of-functionality--e291599b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52655%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20HCL%20HCL%20MyXalytics&amp;severity=low&amp;id=68e8cc6ea06d5f7cba03b390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-vietnamese-threat-actors-shift-from-pxa-stealer--6f7821c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Vietnamese%20threat%20actor&apos;s%20shift%20from%20PXA%20Stealer%20to%20PureRAT&amp;severity=medium&amp;id=68e8c5819fd71783de4a68f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40640-cwe-79-improper-neutralization-of-i-af068634</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40640%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68e8c37b9fd71783de462c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clayrat-a-new-android-spyware-targeting-russia-0c5e5919</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClayRat%3A%20A%20New%20Android%20Spyware%20Targeting%20Russia&amp;severity=medium&amp;id=68e8c5819fd71783de4a68fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophisticated-malware-deployed-in-oracle-ebs-zero--fe30ec9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophisticated%20Malware%20Deployed%20in%20Oracle%20EBS%20Zero-Day%20Attacks&amp;severity=medium&amp;id=68e8b96063e03efae96a661e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21050-cwe-20-improper-input-validation-in-8592d5e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21050%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68e8ad897817465f6ff3a6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-linked-hackers-breach-dozens-of-organizations-889611b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CL0P-Linked%20Hackers%20Breach%20Dozens%20of%20Organizations%20Through%20Oracle%20Software%20Flaw&amp;severity=low&amp;id=68e9ae2654cfe91d8fe9e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21070-cwe-787-out-of-bounds-write-in-sams-aef990fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21070%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff2496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21069-cwe-125-out-of-bounds-read-in-samsu-ad471782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff2496b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21068-cwe-125-out-of-bounds-read-in-samsu-9017e0ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21068%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21067-cwe-125-out-of-bounds-read-in-samsu-83cd3717</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21067%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21066-cwe-125-out-of-bounds-read-in-samsu-a73b5841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21066%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21065-cwe-20-improper-input-validation-in-297d9420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21065%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Retail%20Mode&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21064-cwe-287-improper-authentication-in--23dba1fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21064%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff24952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21063-cwe-284-improper-access-control-in--3fc46bc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21063%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Voice%20Recorder&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2494f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21062-cwe-327-use-of-a-broken-or-risky-cr-cc37a901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21062%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff2494c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21061-cwe-312-cleartext-storage-of-sensit-d0968596</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21061%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=high&amp;id=68e8ab7a7817465f6ff24949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21060-cwe-312-cleartext-storage-of-sensit-b3870fce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21060%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21059-cwe-285-improper-authorization-in-s-e678590f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21059%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Health&amp;severity=medium&amp;id=68e8ab7a7817465f6ff24943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21058-cwe-284-improper-access-control-in--d216b3a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21058%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Routines&amp;severity=high&amp;id=68e8ab7a7817465f6ff24940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21057-cwe-927-use-of-implicit-intent-for--dae6c93b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21057%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2493d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21055-cwe-125-out-of-bounds-read-in-samsu-5821a4b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab7a7817465f6ff2493a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21054-cwe-125-out-of-bounds-read-in-samsu-169621de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21054%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2492d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21053-cwe-787-out-of-bounds-write-in-sams-8daa8fe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21053%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2492a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21052-cwe-787-out-of-bounds-write-in-sams-71c4da0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21052%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21051-cwe-787-out-of-bounds-write-in-sams-c2b413c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21051%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21049-cwe-284-improper-access-control-in--6e0198b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21049%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21048-cwe-23-relative-path-traversal-in-s-95b2beb1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21048%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2491e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21047-cwe-284-improper-access-control-in--5ce90712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21047%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff2491b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21046-cwe-284-improper-access-control-in--f05e3fe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21046%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=68e8ab797817465f6ff24918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21045-cwe-922-insecure-storage-of-sensiti-ba49c5b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21045%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21044-cwe-787-out-of-bounds-write-in-sams-1889ed4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21044%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68e8ab797817465f6ff24912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10124-cwe-863-incorrect-authorization-in--59c878ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10124%3A%20CWE-863%20Incorrect%20Authorization%20in%20Booking%20Manager&amp;severity=medium&amp;id=68e8ab7b7817465f6ff24971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11570-cross-site-scripting-xss-in-drupal--db336d05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11570%3A%20Cross-site%20Scripting%20(XSS)%20in%20drupal-pattern-lab%2Funified-twig-extensions&amp;severity=medium&amp;id=68e89b8508dbb565a295228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11569-directory-traversal-in-cross-zip-54f8c221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11569&amp;severity=null&amp;id=68e89b8508dbb565a295228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61871-unquoted-search-path-or-element-in--815d7fdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61871%3A%20Unquoted%20search%20path%20or%20element%20in%20BUFFALO%20INC.%20NAS%20Navigator2%20(Windows%20version%20only)&amp;severity=medium&amp;id=68e892fd3eb08f791a703a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11449-cwe-79-improper-neutralization-of-i-1e9afc49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=68e87f2bfb63177606d960e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11450-cwe-79-improper-neutralization-of-i-4b4410fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=68e87f2bfb63177606d960e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-10-f1495105</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-10&amp;severity=medium&amp;id=68e9a25054cfe91d8fdfba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55903-na-acafc25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55903%3A%20n%2Fa&amp;severity=high&amp;id=68e9657bb83e3429f3274517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61505-na-66d7fff9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61505%3A%20n%2Fa&amp;severity=medium&amp;id=68e952c11df34bad8db92885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60880-na-2e80506f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60880%3A%20n%2Fa&amp;severity=high&amp;id=68e952c11df34bad8db92882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60838-na-72242219</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60838%3A%20n%2Fa&amp;severity=medium&amp;id=68e94bc9a811ebd3155d6560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60268-na-1fc6e1b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60268%3A%20n%2Fa&amp;severity=medium&amp;id=68e949afa811ebd315597ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60308-na-2b892ae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60308%3A%20n%2Fa&amp;severity=medium&amp;id=68e93a9c811be5ca96ca6d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60269-na-f72f28c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60269%3A%20n%2Fa&amp;severity=critical&amp;id=68e93a9c811be5ca96ca6d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60306-na-3b85649b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60306%3A%20n%2Fa&amp;severity=critical&amp;id=68e93746ca439c55520f7f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60305-na-8911c90a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60305%3A%20n%2Fa&amp;severity=high&amp;id=68e92e74956de071395be5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60307-na-364b484b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60307%3A%20n%2Fa&amp;severity=critical&amp;id=68e9261b5488f82d99852e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60869-na-e8db0848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60869%3A%20n%2Fa&amp;severity=high&amp;id=68e91f8393e1426593c1e515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60378-na-1769f630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60378%3A%20n%2Fa&amp;severity=high&amp;id=68e91c0c99b0507a10243325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61319-na-b057c892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61319%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61152-na-f0e49284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61152%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60868-na-0cedec57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60868%3A%20n%2Fa&amp;severity=medium&amp;id=68e912159497c34e0b6ebdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62292-cwe-669-incorrect-resource-transfer-914bf3ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62292%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20SonarSource%20SonarQube&amp;severity=medium&amp;id=68e8a8b066587de92d235d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61926-cwe-453-insecure-default-variable-i-a908e295</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61926%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20ossf%20allstar&amp;severity=medium&amp;id=68e82b3aba0e608b4fad9ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adaptixc2-uncovered-capabilities-tactics-hunting-s-267686da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AdaptixC2%20Uncovered%3A%20Capabilities%2C%20Tactics%20%26%20Hunting%20Strategies&amp;severity=medium&amp;id=68e8c5819fd71783de4a68f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62240-cwe-79-improper-neutralization-of-i-0c08a7bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e827b1ba0e608b4fad4efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59286-cwe-77-improper-neutralization-of-s-a92d4f5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59286%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59272-cwe-77-improper-neutralization-of-s-3db4f965</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59272%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59271-cwe-285-improper-authorization-in-m-a73c6ff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59271%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Cache%20for%20Redis%20Enterprise&amp;severity=high&amp;id=68e827b1ba0e608b4fad4ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59252-cwe-77-improper-neutralization-of-s-08cd6b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59252%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Word%20Copilot&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55321-cwe-79-improper-neutralization-of-i-baefc863</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55321%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59247-cwe-269-improper-privilege-manageme-13970598</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59247%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Azure%20PlayFab&amp;severity=high&amp;id=68e827b1ba0e608b4fad4eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59246-cwe-306-missing-authentication-for--a1dd06df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59246%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59218-cwe-284-improper-access-control-in--bbedc393</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59218%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68e827b1ba0e608b4fad4ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11558-sql-injection-in-code-projects-e-co-71b772fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11558%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e8243cba0e608b4facfb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11557-sql-injection-in-projectworlds-gate-dc252956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11557%3A%20SQL%20Injection%20in%20projectworlds%20Gate%20Pass%20Management%20System&amp;severity=medium&amp;id=68e8243cba0e608b4facfb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-says-hackers-breached-all-of-its-firewal-64143b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Says%20Hackers%20Breached%20All%20of%20Its%20Firewall%20Backups&amp;severity=medium&amp;id=68e8242cba0e608b4facfa58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61783-cwe-303-incorrect-implementation-of-26ebadd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61783%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20python-social-auth%20social-app-django&amp;severity=medium&amp;id=68e8243cba0e608b4facfb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61779-cwe-639-authorization-bypass-throug-17c91dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61779%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20confidential-containers%20trustee&amp;severity=high&amp;id=68e8243cba0e608b4facfb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43296-an-app-may-bypass-gatekeeper-checks-7da254e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43296%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=68e820a9ba0e608b4facc8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34248-cwe-22-improper-limitation-of-a-pat-c75673c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34248%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20D-Link%20Nuclias%20Connect&amp;severity=high&amp;id=68e820a9ba0e608b4facc8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11556-sql-injection-in-code-projects-simp-558b652d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11556%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Leave%20Manager&amp;severity=medium&amp;id=68e87f2bfb63177606d960f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11555-sql-injection-in-campcodes-online-l-08ea1bcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11555%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68e87f2bfb63177606d960ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35061-cwe-294-authentication-bypass-by-ca-f055e56e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35061%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d27ba0e608b4fac9458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35062-cwe-276-incorrect-default-permissio-e376e4eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35062%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d27ba0e608b4fac945c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35060-cwe-79-improper-neutralization-of-i-5d727a61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d27ba0e608b4fac9454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35059-cwe-601-url-redirection-to-untruste-5ef79e35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35059%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35058-cwe-294-authentication-bypass-by-ca-8a5b9147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35058%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d26ba0e608b4fac9442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35057-cwe-294-authentication-bypass-by-ca-0c59a66f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35057%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac943e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35056-cwe-22-improper-limitation-of-a-pat-b8daada8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35056%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35055-cwe-22-improper-limitation-of-a-pat-cf9e5914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=high&amp;id=68e81d26ba0e608b4fac9434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35054-cwe-922-insecure-storage-of-sensiti-6f82877d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35054%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35053-cwe-22-improper-limitation-of-a-pat-b486f489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35053%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac942b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35052-cwe-321-use-of-hard-coded-cryptogra-4b9ce459</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35052%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Newforma%20Project%20Center&amp;severity=medium&amp;id=68e81d26ba0e608b4fac9427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35051-cwe-502-deserialization-of-untruste-9727e767</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35051%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Newforma%20Project%20Center&amp;severity=critical&amp;id=68e81d26ba0e608b4fac9422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35050-cwe-502-deserialization-of-untruste-5e60a06b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35050%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Newforma%20Project%20Center&amp;severity=critical&amp;id=68e81d26ba0e608b4fac941c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rondodox-botnet-targets-56-n-day-flaws-in-worldwid-725411f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RondoDox%20botnet%20targets%2056%20n-day%20flaws%20in%20worldwide%20attacks&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-healthkick-to-govershell-the-evolution-of-uta-08f1ce17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20HealthKick%20to%20GOVERSHELL%3A%20The%20Evolution%20of%20UTA0388&apos;s%20Espionage%20Malware&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-mistakenly-flags-sql-server-as--cab28825</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20mistakenly%20flags%20SQL%20Server%20as%20end-of-life&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-now-use-velociraptor-dfir-tool-in-ransomwa-f2d906de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20now%20use%20Velociraptor%20DFIR%20tool%20in%20ransomware%20attacks&amp;severity=high&amp;id=68e819a0ba0e608b4fac2f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11554-insecure-inherited-permissions-in-p-d9df09c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11554%3A%20Insecure%20Inherited%20Permissions%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68e87f2bfb63177606d960f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-copilot-camoleak-ai-attack-exfiltrates-data-70b57452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Copilot%20&apos;CamoLeak&apos;%20AI%20Attack%20Exfiltrates%20Data&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11553-sql-injection-in-code-projects-cour-f06fb15c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11553%3A%20SQL%20Injection%20in%20code-projects%20Courier%20Management%20System&amp;severity=medium&amp;id=68e80f15ba0e608b4fab452c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-100-of-firewall-backups-were-breached-e058c43c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%3A%20100%25%20of%20Firewall%20Backups%20Were%20Breached&amp;severity=medium&amp;id=68e9af5454cfe91d8fea39b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11552-sql-injection-in-code-projects-onli-46b30e35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11552%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e80b92ba0e608b4fab12d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59146-cwe-918-server-side-request-forgery-83379e96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59146%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumNous%20new-api&amp;severity=high&amp;id=68e8080dba0e608b4faad9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4615-cwe-83-improper-neutralization-of-sc-c65ded9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4615%3A%20CWE-83%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68e8048eba0e608b4faa7cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4614-cwe-497-exposure-of-sensitive-system-0c62414a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4614%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68e80105ba0e608b4fa9e3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11551-sql-injection-in-code-projects-stud-20222a84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11551%3A%20SQL%20Injection%20in%20code-projects%20Student%20Result%20Manager&amp;severity=medium&amp;id=68e7fd81ba0e608b4fa9648d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11550-null-pointer-dereference-in-tenda-w-df0770d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11550%3A%20NULL%20Pointer%20Dereference%20in%20Tenda%20W12&amp;severity=high&amp;id=68e7fd81ba0e608b4fa96486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11573-cwe-1286-improper-validation-of-syn-0140b7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11573%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Amazon%20Amazon.IonDotnet&amp;severity=high&amp;id=68e7fa08ba0e608b4fa8ce46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tiktok-and-whatsapp-apps-infect-android-devic-078d8374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20TikTok%20and%20WhatsApp%20Apps%20Infect%20Android%20Devices%20with%20ClayRat%20Spyware&amp;severity=medium&amp;id=68e7f2f6ba0e608b4fa56cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11549-stack-based-buffer-overflow-in-tend-c807d3f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11549%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=high&amp;id=68e7ebf3ba0e608b4fa3cf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-actively-exploiting-critical-vulnerabili-8f864e3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Actively%20Exploiting%20Critical%20Vulnerability%20in%20Service%20Finder%20Bookings%20Plugin&amp;severity=medium&amp;id=68e7ebe2ba0e608b4fa3ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11371-vulnerability-in-gladinet-centresta-a1700cc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11371%3A%20Vulnerability%20in%20Gladinet%20CentreStack%20and%20TrioFox&amp;severity=high&amp;id=68e7ebf3ba0e608b4fa3cf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-crown-prince-nezha-a-new-tool-favored-by-china-c9178a46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Crown%20Prince%2C%20Nezha%3A%20A%20New%20Tool%20Favored%20by%20China-Nexus%20Threat%20Actors&amp;severity=medium&amp;id=68e7ebe2ba0e608b4fa3c9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60010-cwe-262-not-using-password-aging-in-236c7b3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60010%3A%20CWE-262%20Not%20Using%20Password%20Aging%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60009-cwe-79-improper-neutralization-of-i-c54ce2e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60006-cwe-78-improper-neutralization-of-s-fb295dfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60006%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60004-cwe-754-improper-check-for-unusual--3f09ce38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60004%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68e7e4e6ba0e608b4fa29d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60002-cwe-79-improper-neutralization-of-i-cdf6c715</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60002%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60001-cwe-79-improper-neutralization-of-i-33b53c5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60000-cwe-79-improper-neutralization-of-i-0eea9f8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59999-cwe-79-improper-neutralization-of-i-fa4572f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59998-cwe-79-improper-neutralization-of-i-8afc3ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e4e6ba0e608b4fa29d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59997-cwe-79-improper-neutralization-of-i-fc2d6ca1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59996-cwe-79-improper-neutralization-of-i-6fa27740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59995-cwe-79-improper-neutralization-of-i-31adce3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59995%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59994-cwe-79-improper-neutralization-of-i-ef10b87c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59993-cwe-79-improper-neutralization-of-i-6f19958f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59992-cwe-79-improper-neutralization-of-i-4170f2e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59991-cwe-79-improper-neutralization-of-i-30cde6d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59990-cwe-79-improper-neutralization-of-i-e77d949d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59989-cwe-79-improper-neutralization-of-i-5b996997</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e164ba0e608b4fa1e4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59988-cwe-79-improper-neutralization-of-i-2084cf62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59987-cwe-79-improper-neutralization-of-i-dc524c1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59986-cwe-79-improper-neutralization-of-i-68c7191e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59985-cwe-79-improper-neutralization-of-i-e84ad20c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59984-cwe-79-improper-neutralization-of-i-77a7df38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59983-cwe-79-improper-neutralization-of-i-59c161f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59982-cwe-79-improper-neutralization-of-i-041a2d7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59982%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59981-cwe-79-improper-neutralization-of-i-d7b29ef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59980-cwe-305-authentication-bypass-by-pr-d4ff9bc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59980%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7e163ba0e608b4fa1e474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59978-cwe-79-improper-neutralization-of-i-b40549f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59978%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=critical&amp;id=68e7e163ba0e608b4fa1e471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59976-cwe-552-files-or-directories-access-c3bd5f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59976%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=medium&amp;id=68e7dde2ba0e608b4fa12b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59975-cwe-400-uncontrolled-resource-consu-419ca762</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59975%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Juniper%20Networks%20Junos%20Space&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59974-cwe-79-improper-neutralization-of-i-9b8f8a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20Space%20Security%20Director&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59968-cwe862-missing-authorization-in-jun-8ba387c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59968%3A%20CWE%E2%80%91862%3A%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20Space%20Security%20Director&amp;severity=high&amp;id=68e7dde2ba0e608b4fa12b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-of-a-medical-device-methods-and--51827958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%20of%20a%20medical%20device%3A%20Methods%20and%20Findings&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59967-cwe-476-null-pointer-dereference-in-fca82f20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59967%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7dde2ba0e608b4fa12b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59964-cwe-908-use-of-uninitialized-resour-72f413ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59964%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68e7da5fba0e608b4fa05bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10284-cwe-22-improper-limitation-of-a-pat-4e343310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10284%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=critical&amp;id=68e7da5eba0e608b4fa05b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10283-cwe-22-improper-limitation-of-a-pat-efceffeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10283%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=critical&amp;id=68e7da5eba0e608b4fa05b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10282-cwe-200-exposure-of-sensitive-infor-12c1764b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10282%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10281-cwe-200-exposure-of-sensitive-infor-8d07250b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10281%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BLSOPS%2C%20LLC%20bbot&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59962-cwe-824-access-of-uninitialized-poi-fbffa826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59962%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59958-cwe-754-improper-check-for-unusual--b40dc879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59958%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59957-cwe-346-origin-validation-error-in--82d4676d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59957%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52961-cwe-400-uncontrolled-resource-consu-be110863</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52961%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52960-cwe-120-buffer-copy-without-checkin-6893900a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52960%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68e7da5eba0e608b4fa05b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11198-cwe-306-missing-authentication-for--5ec89938</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11198%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Security%20Director%20Policy%20Enforcer&amp;severity=high&amp;id=68e7da5eba0e608b4fa05b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-hackers-stole-70000-government-id-pho-e0c029d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%20Hackers%20Stole%2070%2C000%20Government%20ID%20Photos%2C%20Dismisses%20Extortion%20Claims&amp;severity=medium&amp;id=68e7d6d4ba0e608b4f9f9ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-clayrat-spyware-targets-android-users-via-fake-428db3a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ClayRat%20Spyware%20Targets%20Android%20Users%20via%20Fake%20WhatsApp%20and%20TikTok%20Apps&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39664-cwe-22-improper-limitation-of-a-pat-5f421917</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39664%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=68e7cfcdba0e608b4f9eb509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32919-cwe-427-uncontrolled-search-path-el-2c1bda5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32919%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=68e7cfcdba0e608b4f9eb506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32916-cwe-598-use-of-get-request-method-w-8543614d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32916%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=low&amp;id=68e7cfcdba0e608b4f9eb503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-cpu-spikes-to-defense-b0ff69cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20CPU%20Spikes%20to%20Defense&amp;severity=high&amp;id=68e7c8ecba0e608b4f9e1ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/take-note-cyber-risks-with-ai-notetakers-7818be46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Take%20Note%3A%20Cyber-Risks%20With%20AI%20Notetakers&amp;severity=medium&amp;id=68e7c1b4ba0e608b4f9cd844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36171-cwe-770-allocation-of-resources-wit-81125b68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36171%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36225-cwe-203-observable-discrepancy-in-i-b35a534e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36225%3A%20CWE-203%20Observable%20Discrepancy%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37401-cwe-942-overly-permissive-cross-dom-dc8b4f2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37401%3A%20CWE-942%20Overly%20Permissive%20Cross-domain%20Whitelist%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68e7c1d2ba0e608b4f9cd960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-access-sonicwall-cloud-firewall-backups-sp-58f51ccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Access%20SonicWall%20Cloud%20Firewall%20Backups%2C%20Spark%20Urgent%20Security%20Checks&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11561-improper-privilege-management-in-re-4598bc8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11561%3A%20Improper%20Privilege%20Management&amp;severity=high&amp;id=68e7be44ba0e608b4f9c42d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-your-car-from-hacking-kaspersky-off-6f51ff48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20your%20car%20from%20hacking%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e7bacaba0e608b4f9be812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62228-cwe-89-improper-neutralization-of-s-e620fd97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62228%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Flink%20CDC&amp;severity=medium&amp;id=68e7b744ba0e608b4f9b9a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-shipment-notification-is-now-a-malware-droppe-0dd9875c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Shipment%20Notification%20Is%20Now%20a%20Malware%20Dropper&amp;severity=medium&amp;id=68e7b732ba0e608b4f9b9961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/all-sonicwall-cloud-backup-users-have-firewall-con-56794710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=All%20SonicWall%20Cloud%20Backup%20Users%20Have%20Firewall%20Configuration%20Files%20Sto&amp;severity=high&amp;id=68e7b3acba0e608b4f9b07fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacktivists-target-critical-infrastructure-hit-dec-3eca830e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacktivists%20target%20critical%20infrastructure%2C%20hit%20decoy%20plant&amp;severity=critical&amp;id=68e7b3acba0e608b4f9b07f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10240-cwe-79-improper-neutralization-of-i-21cf3f4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=68e7b3ceba0e608b4f9b09a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10239-cwe-78-improper-neutralization-of-s-5ca3d8a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10239%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=high&amp;id=68e7b3ceba0e608b4f9b09a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-ms-teams-hack-mfa-hijacking-2b-c91c315f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20MS%20Teams%20Hack%2C%20MFA%20Hijacking%2C%20%242B%20Crypto%20Heist%2C%20Apple%20Siri%20Probe%20%26%20More&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chaos-c-ransomware-targets-windows-by-wiping-d-e83913b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chaos-C%2B%2B%20Ransomware%20Targets%20Windows%20by%20Wiping%20Data%20and%20Stealing%20Crypto&amp;severity=medium&amp;id=68e7a21cba0e608b4f97fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saas-breaches-start-with-tokens-what-security-team-74939a23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SaaS%20Breaches%20Start%20with%20Tokens%20-%20What%20Security%20Teams%20Must%20Watch&amp;severity=medium&amp;id=68e9ae2654cfe91d8fe9e30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9371-cwe-79-improper-neutralization-of-in-4c04bd5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=68e7a23bba0e608b4f980fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10249-cwe-23-relative-path-traversal-in-r-c538971d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10249%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=68e7a23aba0e608b4f980f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-copilot-chat-flaw-leaked-data-from-private--337a6fd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Copilot%20Chat%20Flaw%20Leaked%20Data%20From%20Private%20Repositories&amp;severity=low&amp;id=68e7962d253d340dd454117b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-denies-massive-breach-confirms-limited-exp-418662e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20denies%20massive%20breach%2C%20confirms%20limited%20exposure%20of%2070K%20ID%20photos&amp;severity=high&amp;id=68e7896301b7ab9c73bf525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-teams-installers-dropping-oyster-backdoor-aka-9f074269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Teams%20Installers%20Dropping%20Oyster%20Backdoor%20(aka%20Broomstick)%20in%20New%20Malvertising%20Scam&amp;severity=medium&amp;id=68e7896301b7ab9c73bf525e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chaos-ransomware-upgrades-with-aggressive-new-c-va-05a0671f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chaos%20Ransomware%20Upgrades%20With%20Aggressive%20New%20C%2B%2B%20Variant&amp;severity=medium&amp;id=68e9af5554cfe91d8fea39c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-breached-law-firm-williams-connoll-3fd757ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Breached%20Law%20Firm%20Williams%20%26%20Connolly%20via%20Zero-Day&amp;severity=medium&amp;id=68e785c7d7a0c363cfd4ac17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-uses-cache-smuggling-to-evade-s-d514c0a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20uses%20cache%20smuggling%20to%20evade%20security%20software&amp;severity=high&amp;id=68e78275d7a0c363cfd10a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-claim-discord-breach-exposed-data-of-55-mi-443ebeea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20claim%20Discord%20breach%20exposed%20data%20of%205.5%20million%20users&amp;severity=high&amp;id=68e78275d7a0c363cfd10a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-phishing-to-malware-ai-becomes-russias-new-cy-eaec2470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Phishing%20to%20Malware%3A%20AI%20Becomes%20Russia&apos;s%20New%20Cyber%20Weapon%20in%20War%20on%20Ukraine&amp;severity=medium&amp;id=68e7923401b7ab9c73cb0c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/all-sonicwall-cloud-backup-users-had-firewall-conf-f26c39c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=All%20SonicWall%20Cloud%20Backup%20Users%20Had%20Firewall%20Configurations%20Stolen&amp;severity=medium&amp;id=68e7745d6b49b1a4209508f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10862-cwe-89-improper-neutralization-of-s-c48468d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10862%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roxnor%20Popup%20builder%20with%20Gamification%2C%20Multi-Step%20Popups%2C%20Page-Level%20Targeting%2C%20and%20WooCommerce%20Triggers&amp;severity=high&amp;id=68e772546b49b1a420925e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-70000-users-had-ids-exposed-in-recent-a6300222</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%2070%2C000%20Users%20Had%20IDs%20Exposed%20in%20Recent%20Data%20Breach&amp;severity=medium&amp;id=68e76d22f5254f629ab65abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11522-cwe-288-authentication-bypass-using-18ab30f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11522%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Search%20%26%20Go%20-%20Directory%20WordPress%20Theme&amp;severity=critical&amp;id=68e766774454a62ee99e89df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11539-cwe-94-improper-control-of-generati-e55386f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Grafana%20grafana-image-renderer&amp;severity=critical&amp;id=68e762fe4454a62ee9978f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-exploit-lets-hackers-bypass-authenticatio-88280a13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Exploit%20Lets%20Hackers%20Bypass%20Authentication%20in%20WordPress%20Service%20Finder%20Theme&amp;severity=critical&amp;id=68e782118736dec42f6616fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7634-cwe-98-improper-control-of-filename--733a6ee0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7634%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=critical&amp;id=68e74b345132fb26fe2091fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7526-cwe-22-improper-limitation-of-a-path-df768a4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7526%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=critical&amp;id=68e74b345132fb26fe2091f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11530-sql-injection-in-code-projects-onli-7e571518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11530%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e72e7b32de7eb26af8bf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-building-better-defenses-redtail-36c9be11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Building%20Better%20Defenses%3A%20RedTail%20Observations%20from%20a%20Honeypot%2C%20(Thu%2C%20Oct%209th)&amp;severity=low&amp;id=68e7a4f8ba0e608b4f98b8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6038-cwe-639-authorization-bypass-through-cbec0b04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6038%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pebas%20Lisfinity%20Core%20-%20Lisfinity%20Core%20plugin%20used%20for%20pebas%C2%AE%20Lisfinity%20WordPress%20theme&amp;severity=high&amp;id=68e72afc32de7eb26af88bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47355-cwe-787-out-of-bounds-write-in-qual-ec8e312a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47355%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47354-cwe-416-use-after-free-in-qualcomm--5848c0c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47354%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47351-cwe-190-integer-overflow-or-wraparo-1b424d36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47351%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47349-cwe-823-use-of-out-of-range-pointer-88e7b744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47349%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afc32de7eb26af88baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47347-cwe-121-stack-based-buffer-overflow-f3d19047</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47347%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47342-cwe-416-use-after-free-in-qualcomm--17bbc8c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47342%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47341-cwe-120-buffer-copy-without-checkin-4df6206b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47341%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47340-cwe-787-out-of-bounds-write-in-qual-a2a75740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47340%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47338-cwe-822-untrusted-pointer-dereferen-6ef172f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47338%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27060-cwe-822-untrusted-pointer-dereferen-30271825</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27060%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27059-cwe-823-use-of-out-of-range-pointer-4fa55eb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27059%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27054-cwe-787-out-of-bounds-write-in-qual-aa3bfeda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27054%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27053-cwe-131-incorrect-calculation-of-bu-58c01f6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27053%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27049-cwe-126-buffer-over-read-in-qualcom-e6c44643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27049%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27048-cwe-822-untrusted-pointer-dereferen-7bef80d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27048%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68e72afb32de7eb26af88b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27045-cwe-126-buffer-over-read-in-qualcom-8db7af15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27045%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27041-cwe-126-buffer-over-read-in-qualcom-1c501c20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27041%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27040-cwe-20-improper-input-validation-in-f8f81cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27040%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27039-cwe-390-detection-of-error-conditio-9e906a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27039%3A%20CWE-390%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68e72afb32de7eb26af88b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11529-missing-authentication-in-churchcrm-06893d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11529%3A%20Missing%20Authentication%20in%20ChurchCRM&amp;severity=medium&amp;id=68e727b132de7eb26af7f8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11528-stack-based-buffer-overflow-in-tend-e7af37ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11528%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e727b132de7eb26af7f8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11527-stack-based-buffer-overflow-in-tend-af579991</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11527%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7240f32de7eb26af75f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11526-stack-based-buffer-overflow-in-tend-f8d558b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11526%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7240f32de7eb26af75f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10496-cwe-80-improper-neutralization-of-s-33beba2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10496%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20christophrado%20Cookie%20Notice%20%26%20Consent&amp;severity=high&amp;id=68e71ce832de7eb26af6c050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10586-cwe-89-improper-neutralization-of-s-01141e3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10586%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=critical&amp;id=68e71ce832de7eb26af6c057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11166-cwe-352-cross-site-request-forgery--c471a101</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11166%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=68e71ce832de7eb26af6c05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11525-stack-based-buffer-overflow-in-tend-652b9960</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11525%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7125c32de7eb26af59731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11524-stack-based-buffer-overflow-in-tend-d66ed925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11524%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68e7125c32de7eb26af5972a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11523-command-injection-in-tenda-ac7-f84a7fa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11523%3A%20Command%20Injection%20in%20Tenda%20AC7&amp;severity=medium&amp;id=68e7125c32de7eb26af59723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11516-sql-injection-in-code-projects-onli-13bd2dbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11516%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e7046932de7eb26af0f7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11515-sql-injection-in-code-projects-onli-572b2b4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11515%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e7046932de7eb26af0f7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11514-sql-injection-in-code-projects-onli-66d099e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11514%3A%20SQL%20Injection%20in%20code-projects%20Online%20Complaint%20Site&amp;severity=medium&amp;id=68e7046932de7eb26af0f7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-09-a742ff0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-09&amp;severity=medium&amp;id=68e84e4cba0e608b4fb0bae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60375-na-09a5e85e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60375%3A%20n%2Fa&amp;severity=high&amp;id=68e820a9ba0e608b4facc8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60316-na-0d849969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60316%3A%20n%2Fa&amp;severity=critical&amp;id=68e80b92ba0e608b4fab12d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60267-na-7a67c8e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60267%3A%20n%2Fa&amp;severity=medium&amp;id=68e7f304ba0e608b4fa56d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60304-na-489648e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60304%3A%20n%2Fa&amp;severity=medium&amp;id=68e7e86aba0e608b4fa35fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60266-na-9d957292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60266%3A%20n%2Fa&amp;severity=medium&amp;id=68e7e86aba0e608b4fa35fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60265-na-201f2e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60265%3A%20n%2Fa&amp;severity=medium&amp;id=68e7da5fba0e608b4fa05bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61577-na-ba4145fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61577%3A%20n%2Fa&amp;severity=high&amp;id=68e7d6e7ba0e608b4f9fa15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61532-na-76c03821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61532%3A%20n%2Fa&amp;severity=medium&amp;id=68e7d6e7ba0e608b4f9f9f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60302-na-698decca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60302%3A%20n%2Fa&amp;severity=medium&amp;id=68e7d6e7ba0e608b4f9f9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56426-na-123f26fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56426%3A%20n%2Fa&amp;severity=medium&amp;id=68e7d6e7ba0e608b4f9f9f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56683-na-9f4d3d30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56683%3A%20n%2Fa&amp;severity=critical&amp;id=68e7cfcdba0e608b4f9eb50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45095-na-5b96252f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45095%3A%20n%2Fa&amp;severity=high&amp;id=68e7c8edba0e608b4f9e1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11513-sql-injection-in-code-projects-e-co-42135f36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11513%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e6f7045269778ce9b0c3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11512-cross-site-scripting-in-code-projec-de8cae5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11512%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68e6f7045269778ce9b0c3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11511-sql-injection-in-code-projects-e-co-756531c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11511%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e6f1c50e1a2843ff9dd5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61913-cwe-22-improper-limitation-of-a-pat-524b5565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61913%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68e6f1c50e1a2843ff9dd5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11509-sql-injection-in-code-projects-e-co-1626101f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11509%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e6e6ee7a93ff0f45116434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11508-unrestricted-upload-in-code-project-cf4e97d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11508%3A%20Unrestricted%20Upload%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68e6e6ee7a93ff0f4511642d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11535-cwe-276-incorrect-default-permissio-27477207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11535%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MongoDB%20Inc%20MongoDB%20Connector%20for%20BI&amp;severity=high&amp;id=68e6e35e7a93ff0f450a133a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11507-sql-injection-in-phpgurukul-beauty--240c7ab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11507%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6e0a2cd67e8d183717e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11506-sql-injection-in-phpgurukul-beauty--f33ed649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11506%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6da3805e85d528e093f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11505-sql-injection-in-phpgurukul-beauty--0e319d7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11505%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6da3805e85d528e093f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vampire-bot-malware-sinks-fangs-into-job-hunters-e3af18be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vampire%20Bot%20Malware%20Sinks%20Fangs%20Into%20Job%20Hunters&amp;severity=medium&amp;id=68e70b6732de7eb26af5081d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-hackers-team-up-with-scattered-lapsus-hunt-dabf205e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20Hackers%20Team%20Up%20With%20Scattered%20Lapsus%24%20Hunters&amp;severity=medium&amp;id=68e70b6732de7eb26af50820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/draftkings-thwarts-credential-stuffing-attack-but--1d5c3fc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DraftKings%20thwarts%20credential%20stuffing%20attack%2C%20but%20urges%20password%20reset%20and%20MFA&amp;severity=medium&amp;id=68e6cda68d029ba8452a7873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-weaponize-open-source-nezha-tool-i-730d998f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Weaponize%20Open-Source%20Nezha%20Tool%20in%20New%20Attack%20Wave&amp;severity=high&amp;id=68e6cda68d029ba8452a786f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flok-license-plate-surveillance-97dfe516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flok%20License%20Plate%20Surveillance&amp;severity=medium&amp;id=68e6cda68d029ba8452a7877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wordpress-sites-to-power-next-gen--5bdea2fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WordPress%20Sites%20to%20Power%20Next-Gen%20ClickFix%20Phishing%20Attacks&amp;severity=high&amp;id=68e6ca2c8d029ba845235de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crimson-collective-hackers-target-aws-cloud-instan-3c1de480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crimson%20Collective%20hackers%20target%20AWS%20cloud%20instances%20for%20data%20theft&amp;severity=high&amp;id=68e6ca2c8d029ba845235de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragonforce-lockbit-and-qilin-a-new-triad-aims-to--b166eecb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DragonForce%2C%20LockBit%2C%20and%20Qilin%2C%20a%20new%20triad%20aims%20to%20dominate%20the%20ransomware%20landscape&amp;severity=medium&amp;id=68e6ca2c8d029ba845235de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11503-sql-injection-in-phpgurukul-beauty--0fc8ae51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11503%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e6c5b748d5c0a0f2492e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11495-heap-based-buffer-overflow-in-gnu-b-f2dce3b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11495%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e6c5b748d5c0a0f2492e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-qilin-amp-dragonforce-join-forces-in-ranso-a33373a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%2C%20Qilin%20%26amp%3B%20DragonForce%20Join%20Forces%20in%20Ransomware%20&apos;Cartel&apos;&amp;severity=medium&amp;id=68e70b6732de7eb26af50823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11494-out-of-bounds-read-in-gnu-binutils-9fedd9c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11494%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e6bdfa0d022f229cdb3b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11491-os-command-injection-in-wonderwhy-e-358a041b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11491%3A%20OS%20Command%20Injection%20in%20wonderwhy-er%20DesktopCommanderMCP&amp;severity=medium&amp;id=68e6b7bb76a6052c466fd265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11490-os-command-injection-in-wonderwhy-e-0005bd63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11490%3A%20OS%20Command%20Injection%20in%20wonderwhy-er%20DesktopCommanderMCP&amp;severity=medium&amp;id=68e6b1852ff6d6ea8f091143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-domain-joinown-accounts-revisited-9c1eed87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20domain%20(join)own%20accounts%20revisited%202025&amp;severity=high&amp;id=68e6ab3c69f5e3b72424960b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11489-symlink-following-in-wonderwhy-er-d-db50fb75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11489%3A%20Symlink%20Following%20in%20wonderwhy-er%20DesktopCommanderMCP&amp;severity=low&amp;id=68e6ab3a69f5e3b7242495f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11488-command-injection-in-d-link-dir-852-1d4e63dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11488%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68e6ab3a69f5e3b7242495ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11487-sql-injection-in-sourcecodester-far-434f706e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11487%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=68e6a25e2d3a96faa29891e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42701-cwe-367-time-of-check-time-of-use-t-8775ba1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42701%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20CrowdStrike%20Falcon%20sensor%20for%20Windows&amp;severity=medium&amp;id=68e6a07a2d3a96faa293b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42706-cwe-346-origin-validation-error-in--c1ed59e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42706%3A%20CWE-346%20Origin%20Validation%20Error%20in%20CrowdStrike%20Falcon%20sensor%20for%20Windows&amp;severity=medium&amp;id=68e6a07a2d3a96faa293b1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/figma-mcp-server-opens-orgs-to-agentic-ai-compromi-f6f15258</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Framelink%20Figma%20MCP%20Server%20Opens%20Orgs%20to%20Agentic%20AI%20Compromise&amp;severity=critical&amp;id=68e69ed02d3a96faa290bea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9868-cwe-918-server-side-request-forgery--2709c53e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9868%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Sonatype%20Nexus%20Repository&amp;severity=high&amp;id=68e69eeb2d3a96faa291106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11486-sql-injection-in-sourcecodester-far-38e037c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11486%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=68e69bbc55fe9682061a81d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11485-cross-site-scripting-in-sourcecodes-a0d4d192</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11485%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Grades%20Management%20System&amp;severity=medium&amp;id=68e69bbc55fe9682061a81cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-wordpress-sites-to-power-next-gen--39469315</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20WordPress%20Sites%20to%20Power%20Next-Gen%20ClickFix%20Phishing%20Attacks&amp;severity=medium&amp;id=68e70a4432de7eb26af4e138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9970-cwe-316-cleartext-storage-of-sensiti-de728000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9970%3A%20CWE-316%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20ABB%20MConfig&amp;severity=medium&amp;id=68e694c69d1d1c8c4f59bf84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11481-sql-injection-in-varunsardana004-bl-4f37e794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11481%3A%20SQL%20Injection%20in%20varunsardana004%20Blood-Bank-And-Donation-Management-System&amp;severity=medium&amp;id=68e694c69d1d1c8c4f59bf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/will-ai-spm-become-the-standard-security-layer-for-a6fa96a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Will%20AI-SPM%20Become%20the%20Standard%20Security%20Layer%20for%20Safe%20AI%20Adoption%3F&amp;severity=medium&amp;id=68e6913d9d1d1c8c4f53a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-police-arrest-two-teens-over-kido-nursery-ranso-4d632f7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Police%20Arrest%20Two%20Teens%20Over%20Kido%20Nursery%20Ransomware%20Attack&amp;severity=medium&amp;id=68e6915f9d1d1c8c4f541f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-evolution-of-qilin-raas-c8190f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Evolution%20of%20Qilin%20RaaS&amp;severity=medium&amp;id=68e691559d1d1c8c4f53d397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-meets-gpt-targeted-operations-with-untamed-llm-d23795a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20Meets%20GPT%3A%20Targeted%20Operations%20with%20Untamed%20LLMs&amp;severity=medium&amp;id=68e68dec47cdb70919db7f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5009-cwe-359-exposure-of-private-personal-02eaf6bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5009%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Google%20Gemini&amp;severity=low&amp;id=68e6855f620140f5ffd6acb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shuyal-stealer-advanced-infostealer-targeting-19-b-a4ae7a48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shuyal%20Stealer%3A%20Advanced%20Infostealer%20Targeting%2019%20Browsers&amp;severity=medium&amp;id=68e68dec47cdb70919db7efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nezha-tool-used-in-new-cyber-campaign-targeting-we-57f4da3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nezha%20Tool%20Used%20in%20New%20Cyber%20Campaign%20Targeting%20Web%20Applications&amp;severity=medium&amp;id=68e68dec47cdb70919db7f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-brickstorm-stealthy-backdoor-enabling-espi-43d888c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20BRICKSTORM%3A%20Stealthy%20Backdoor%20Enabling%20Espionage%20into%20Tech%20and%20Legal%20Sectors&amp;severity=medium&amp;id=68e683ab620140f5ffd3e0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36636-vulnerability-in-tenable-security-c-8cda4590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36636%3A%20Vulnerability%20in%20Tenable%20Security%20Center&amp;severity=medium&amp;id=68e683b8620140f5ffd3e1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61672-cwe-1287-improper-validation-of-spe-4ed93d97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61672%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20element-hq%20synapse&amp;severity=medium&amp;id=68e67d0e724b643b1d6515fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43724-cwe-639-authorization-bypass-throug-9cccf9a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43724%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=68e67ead724b643b1d67f7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11480-sql-injection-in-sourcecodester-sim-bd0cd886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11480%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-Commerce%20Bookstore&amp;severity=medium&amp;id=68e679d365720131af13d4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11479-sql-injection-in-sourcecodester-wed-fa433597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11479%3A%20SQL%20Injection%20in%20SourceCodester%20Wedding%20Reservation%20Management%20System&amp;severity=medium&amp;id=68e679d365720131af13d49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43771-cwe-79-improper-neutralization-of-i-8a4e9dd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43771%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e673033f6e1cf3f1f3e55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-nexus-actors-weaponize-nezha-open-source-too-61c1a5e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Nexus%20Actors%20Weaponize%20&apos;Nezha&apos;%20Open%20Source%20Tool&amp;severity=medium&amp;id=68e70b6732de7eb26af50826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11478-sql-injection-in-sourcecodester-far-d269a13e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11478%3A%20SQL%20Injection%20in%20SourceCodester%20Farm%20Management%20System&amp;severity=medium&amp;id=68e671233f6e1cf3f1f0272d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11477-sql-injection-in-sourcecodester-wed-ca0a3b2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11477%3A%20SQL%20Injection%20in%20SourceCodester%20Wedding%20Reservation%20Management%20System&amp;severity=medium&amp;id=68e671233f6e1cf3f1f02726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-weaponize-open-source-nezha-tool-i-3ac9337f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Weaponize%20Open-Source%20Nezha%20Tool%20in%20New%20Attack%20Wave&amp;severity=medium&amp;id=68e70a4432de7eb26af4e13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43829-cwe-79-cross-site-scripting-in-life-ceb11b1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43829%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e66f813f6e1cf3f1ed69c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/calling-all-influencers-spear-phishers-dangle-tesl-b631b30b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Calling%20All%20Influencers%3A%20Spear-Phishers%20Dangle%20Tesla%2C%20Red%20Bull%20Jobs&amp;severity=medium&amp;id=68e70b6732de7eb26af50829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11476-sql-injection-in-sourcecodester-sim-9320a063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11476%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-Commerce%20Bookstore&amp;severity=medium&amp;id=68e66a1b5e259e903d9159bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-deepminds-new-ai-agent-finds-and-fixes-vuln-ad51ac97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20DeepMind%E2%80%99s%20New%20AI%20Agent%20Finds%20and%20Fixes%20Vulnerabilities&amp;severity=medium&amp;id=68e6686c5e259e903d8ea0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43830-cwe-79-cross-site-scripting-in-life-08d5af95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43830%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e6688d5e259e903d8f09e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/look-mom-hr-application-look-mom-no-job-phishing-u-60ba0dfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Look%20mom%20HR%20application%2C%20look%20mom%20no%20job%20-%20phishing%20using%20Zoom%20docs%20to%20harvest%20Gmail%20creds&amp;severity=medium&amp;id=68e663069e2ffba8db3c0645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11475-sql-injection-in-projectworlds-adva-a42905c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11475%3A%20SQL%20Injection%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68e663569e2ffba8db3c4578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43821-cwe-79-improper-neutralization-of-i-c596bec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e663569e2ffba8db3c457e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11474-sql-injection-in-sourcecodester-hot-c1e1765a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11474%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e65ab6efc31e4e30866b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-offers-up-to-20000-in-new-ai-bug-bounty-pro-5730f00e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Offers%20Up%20to%20%2420%2C000%20in%20New%20AI%20Bug%20Bounty%20Program&amp;severity=medium&amp;id=68e65a98efc31e4e3086197b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockbit-qilin-and-dragonforce-join-forces-to-domin-bb73677e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockBit%2C%20Qilin%2C%20and%20DragonForce%20Join%20Forces%20to%20Dominate%20the%20Ransomware%20Ecosystem&amp;severity=medium&amp;id=68e70a4432de7eb26af4e141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11473-sql-injection-in-sourcecodester-hot-f7acac64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11473%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e653dc42bf4392300c2b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11472-sql-injection-in-sourcecodester-hot-c2df3d64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11472%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e653dc42bf4392300c2b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11471-sql-injection-in-sourcecodester-hot-8d659a90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11471%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e64d0011331cab562ed16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-finds-growing-exploitation-of-ai-tools-by-f-3cb25a34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Finds%20Growing%20Exploitation%20of%20AI%20Tools%20by%20Foreign%20Threat%20Groups&amp;severity=medium&amp;id=68e64cee11331cab562e8d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10649-cwe-89-improper-neutralization-of-s-705cb31c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10649%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68e649a87ee77265a91805fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-have-stolen-2-billion-in-cryp-eff9e053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Have%20Stolen%20%242%20Billion%20in%20Cryptocurrency%20in%202025&amp;severity=medium&amp;id=68e6498a7ee77265a917afca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/airline-mimicking-fraud-kaspersky-official-blog-687b1741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Airline-mimicking%20fraud%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e646267ee77265a9118015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/severe-figma-mcp-vulnerability-lets-hackers-execut-8f439e95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Severe%20Framelink%20Figma%20MCP%20Vulnerability%20Lets%20Hackers%20Execute%20Code%20Remotely&amp;severity=low&amp;id=68e70a4432de7eb26af4e144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10353-cwe-43-path-equivalence-filename-in-363738fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10353%3A%20CWE-43%3A%20Path%20Equivalence%3A%20&apos;filename....&apos;%20in%20Melis%20Technology%20Melis%20Platform&amp;severity=critical&amp;id=68e647c37ee77265a914398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10352-cwe-862-missing-authorization-in-me-f9e189f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10352%3A%20CWE-862%20Missing%20Authorization%20in%20Melis%20Technology%20Melis%20Platform&amp;severity=critical&amp;id=68e642d5f468503fc453c25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10351-cwe-89-improper-neutralization-of-s-232d8b98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10351%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Melis%20Technology%20Melis%20Platform&amp;severity=critical&amp;id=68e642d5f468503fc453c258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11470-unrestricted-upload-in-sourcecodest-88061fde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11470%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e638d621a669664c3e135b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11469-sql-injection-in-sourcecodester-hot-4a4384ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11469%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e638d621a669664c3e1353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shuyal-stealer-targets-17-web-browsers-for-log-d836e32f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shuyal%20Stealer%20Targets%2017%20Web%20Browsers%20for%20Login%20Data%20and%20Discord%20Tokens&amp;severity=medium&amp;id=68e62d3a859c29afa39e5316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-disrupts-russian-north-korean-and-chinese-h-d3987d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Disrupts%20Russian%2C%20North%20Korean%2C%20and%20Chinese%20Hackers%20Misusing%20ChatGPT%20for%20Cyberattacks&amp;severity=high&amp;id=68e62d3a859c29afa39e5312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-group-claims-attack-on-beer-giant-asahi-8eb6539f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Group%20Claims%20Attack%20on%20Beer%20Giant%20Asahi&amp;severity=medium&amp;id=68e62d0b859c29afa39e169e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/draftkings-warns-users-of-credential-stuffing-atta-8150af82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DraftKings%20Warns%20Users%20of%20Credential%20Stuffing%20Attacks&amp;severity=medium&amp;id=68e62d0b859c29afa39e16a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-time-to-waste-embedding-ai-to-cut-noise-and-red-d4d2221d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%20Time%20to%20Waste%3A%20Embedding%20AI%20to%20Cut%20Noise%20and%20Reduce%20Risk&amp;severity=medium&amp;id=68e70a4432de7eb26af4e147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11445-injection-in-kilo-code-43b434ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11445%3A%20Injection%20in%20Kilo%20Code&amp;severity=medium&amp;id=68e625ceda3febf7f3bdd31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11444-buffer-overflow-in-totolink-n600r-c9eba986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11444%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N600R&amp;severity=high&amp;id=68e61d166a38b6d000947f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-oracle-ebs-zero-day-started-2-mont-59431fb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Oracle%20EBS%20Zero-Day%20Started%202%20Months%20Before%20Patching&amp;severity=medium&amp;id=68e619b98c782e8a5017e69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/polymorphic-python-malware-wed-oct-8th-a0d41ed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Polymorphic%20Python%20Malware%2C%20(Wed%2C%20Oct%208th)&amp;severity=low&amp;id=68e70c8e32de7eb26af52226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11443-information-exposure-through-discre-6e6a2e0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11443%3A%20Information%20Exposure%20Through%20Discrepancy%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e616528c782e8a501129a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11442-cross-site-request-forgery-in-jhuma-30e35df2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11442%3A%20Cross-Site%20Request%20Forgery%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e616528c782e8a5011299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-disrupts-russian-north-korean-and-chinese-h-695dcf91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Disrupts%20Russian%2C%20North%20Korean%2C%20and%20Chinese%20Hackers%20Misusing%20ChatGPT%20for%20Cyberattacks&amp;severity=medium&amp;id=68e612e5460aa5f0575866f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11441-improper-restriction-of-excessive-a-6e4f94ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11441%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e60f7a460aa5f05751ac2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11440-improper-access-controls-in-jhumanj-2deedc04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11440%3A%20Improper%20Access%20Controls%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e60f7a460aa5f05751ac24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48464-cwe-200-exposure-of-sensitive-infor-ca73fa1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48464%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20DuckDuckGo%20DuckDuckGo%20Browser&amp;severity=medium&amp;id=68e60c4e521103a448f6da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11439-missing-authorization-in-jhumanj-op-a86e64d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11439%3A%20Missing%20Authorization%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e608d2521103a448f0285e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11438-missing-authorization-in-jhumanj-op-15b3b9a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11438%3A%20Missing%20Authorization%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e608d2521103a448f02841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11437-cross-site-scripting-in-jhumanj-opn-14a94ece</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11437%3A%20Cross%20Site%20Scripting%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e60222b199f16041195962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10635-cwe-89-sql-injection-in-find-me-on-0ce7ca32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10635%3A%20CWE-89%20SQL%20Injection%20in%20Find%20Me%20On&amp;severity=high&amp;id=68e60222b199f1604119595f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11436-unrestricted-upload-in-jhumanj-opnf-2186285e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11436%3A%20Unrestricted%20Upload%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e5fb6c339ddfd99564b614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11435-cross-site-scripting-in-jhumanj-opn-01f8c67a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11435%3A%20Cross%20Site%20Scripting%20in%20JhumanJ%20OpnForm&amp;severity=medium&amp;id=68e5fb6c339ddfd99564b60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11171-cwe-306-missing-authentication-for--03d31b5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11171%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ays-pro%20Chartify%20%E2%80%93%20WordPress%20Chart%20Plugin&amp;severity=medium&amp;id=68e5f884c921af165e2d8721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11434-sql-injection-in-itsourcecode-stude-7c400a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11434%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Transcript%20Processing%20System&amp;severity=medium&amp;id=68e5f6acc921af165e29156d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11433-cross-site-scripting-in-itsourcecod-12bfe3e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11433%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Leave%20Management%20System&amp;severity=medium&amp;id=68e5f6acc921af165e291566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11432-sql-injection-in-itsourcecode-leave-4b53f7c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11432%3A%20SQL%20Injection%20in%20itsourcecode%20Leave%20Management%20System&amp;severity=medium&amp;id=68e5eb8f699de06e9802b2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11204-cwe-89-improper-neutralization-of-s-eee58739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11204%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=high&amp;id=68e5f02d53704711fa0c3714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11431-sql-injection-in-code-projects-web--e45f8efc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11431%3A%20SQL%20Injection%20in%20code-projects%20Web-Based%20Inventory%20and%20POS%20System&amp;severity=medium&amp;id=68e5e55ce018c7f9c2035cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11430-sql-injection-in-sourcecodester-sim-905514cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11430%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20E-Commerce%20Bookstore&amp;severity=medium&amp;id=68e5dd90c8e674871eac10c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10587-cwe-89-improper-neutralization-of-s-ec38f44c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10587%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jackdewey%20Community%20Events&amp;severity=critical&amp;id=68e5dd90c8e674871eac10c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10494-cwe-73-external-control-of-file-nam-97bb4dfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10494%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=high&amp;id=68e5dd8fc8e674871eac10be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11426-unrestricted-upload-in-projectworld-e60472a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11426%3A%20Unrestricted%20Upload%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68e5d74ca677756fc9b5b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11425-cross-site-scripting-in-projectworl-b001acf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11425%3A%20Cross%20Site%20Scripting%20in%20projectworlds%20Advanced%20Library%20Management%20System&amp;severity=medium&amp;id=68e5d047a677756fc9ae27f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11424-sql-injection-in-code-projects-web--70126c76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11424%3A%20SQL%20Injection%20in%20code-projects%20Web-Based%20Inventory%20and%20POS%20System&amp;severity=medium&amp;id=68e5c93ca677756fc9ace994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11423-memory-corruption-in-tenda-ch22-49a9e856</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11423%3A%20Memory%20Corruption%20in%20Tenda%20CH22&amp;severity=critical&amp;id=68e5c93ca677756fc9ace98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-wont-fix-new-ascii-smuggling-attack-in-gemi-d7849929</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20won%E2%80%99t%20fix%20new%20ASCII%20smuggling%20attack%20in%20Gemini&amp;severity=high&amp;id=68e5c5b7a677756fc9acb11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-wage-broad-corporate-extortion-spree-a421ba45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Wage%20Broad%20Corporate%20Extortion%20Spree&amp;severity=high&amp;id=68e5c5b7a677756fc9acb126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-refuses-to-pay-ransom-over-widespread-d-045b8021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20refuses%20to%20pay%20ransom%20over%20widespread%20data%20theft%20attacks&amp;severity=high&amp;id=68e5c5b7a677756fc9acb11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11422-sql-injection-in-campcodes-advanced-25e0306b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11422%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e5c234a677756fc9ac4c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11421-cross-site-scripting-in-code-projec-cbdf7a04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11421%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68e5c234a677756fc9ac4c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-leads-to-beer-shortage-as-asahi-recove-28e5f1e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Leads%20to%20Beer%20Shortage%20as%20Asahi%20Recovers&amp;severity=medium&amp;id=68e70b6732de7eb26af5082c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61787-cwe-77-improper-neutralization-of-s-c5ff7c9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61787%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20denoland%20deno&amp;severity=high&amp;id=68e5c234a677756fc9ac4c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61786-cwe-269-improper-privilege-manageme-f64c5f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61786%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20denoland%20deno&amp;severity=low&amp;id=68e5b7a8a677756fc9ab1387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48981-vulnerability-in-compugroup-medical-5cea8c1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48981%3A%20Vulnerability%20in%20CompuGroup%20Medical%20CGM%20MEDICO&amp;severity=high&amp;id=68e5b7a8a677756fc9ab137d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61785-cwe-266-incorrect-privilege-assignm-4be643db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61785%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20denoland%20deno&amp;severity=low&amp;id=68e5b7a8a677756fc9ab1380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11420-sql-injection-in-code-projects-e-co-4cf7fd5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11420%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68e5b43da677756fc9a95d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11418-stack-based-buffer-overflow-in-tend-35fe3a84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11418%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=critical&amp;id=68e5b43da677756fc9a95d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-08-246ebac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-08&amp;severity=medium&amp;id=68e6fd3e32de7eb26aece213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60311-na-c7d3c98e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60311%3A%20n%2Fa&amp;severity=high&amp;id=68e6bdfa0d022f229cdb3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61524-na-cd1fdfea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61524%3A%20n%2Fa&amp;severity=high&amp;id=68e6b5002ff6d6ea8f108dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57457-na-84c9231b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57457%3A%20n%2Fa&amp;severity=high&amp;id=68e6b5002ff6d6ea8f108dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53967-na-8ed17cf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53967%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Framelink%20Figma%20MCP%20Server&amp;severity=high&amp;id=68e691709d1d1c8c4f54b380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59303-cwe-791-incomplete-filtering-of-spe-81a66a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59303%3A%20CWE-791%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20HAProxy%20HAProxy%20Kubernetes%20Ingress%20Controller&amp;severity=medium&amp;id=68e68dfc47cdb70919dbcb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60318-na-b61a20db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60318%3A%20n%2Fa&amp;severity=medium&amp;id=68e6855f620140f5ffd6acbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60313-na-84179033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60313%3A%20n%2Fa&amp;severity=medium&amp;id=68e6765965720131af0cf255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60834-na-a1eb9df9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60834%3A%20n%2Fa&amp;severity=medium&amp;id=68e673033f6e1cf3f1f3e55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60833-na-94e7dbdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60833%3A%20n%2Fa&amp;severity=medium&amp;id=68e671233f6e1cf3f1f02738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60830-na-1c4f87a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60830%3A%20n%2Fa&amp;severity=medium&amp;id=68e671233f6e1cf3f1f02734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61183-na-c430637f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61183%3A%20n%2Fa&amp;severity=medium&amp;id=68e66bf75e259e903d950569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60828-na-a113330a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60828%3A%20n%2Fa&amp;severity=medium&amp;id=68e66bf75e259e903d950565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60314-na-8b0cd3b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60314%3A%20n%2Fa&amp;severity=medium&amp;id=68e6688d5e259e903d8f09e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60299-na-65dddbfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60299%3A%20n%2Fa&amp;severity=medium&amp;id=68e663569e2ffba8db3c4585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60298-na-3d450388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60298%3A%20n%2Fa&amp;severity=medium&amp;id=68e663569e2ffba8db3c4581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11417-unrestricted-upload-in-campcodes-ad-47d68abe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11417%3A%20Unrestricted%20Upload%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e5a615a677756fc9a5e6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61999-cwe-79-improper-neutralization-of-i-f4db80d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61998-cwe-79-improper-neutralization-of-i-77e9750a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61997-cwe-79-improper-neutralization-of-i-bdb941f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61996-cwe-79-improper-neutralization-of-i-de326f78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61996%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OPEXUS%20FOIAXpress&amp;severity=medium&amp;id=68e5a292a677756fc9a5a203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11416-sql-injection-in-phpgurukul-beauty--69a12f6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11416%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e59f0da677756fc9a55d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11415-sql-injection-in-phpgurukul-beauty--d426d1e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11415%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e59f0da677756fc9a55d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11414-out-of-bounds-read-in-gnu-binutils-733ef33d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11414%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e59804a677756fc9a4be39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43822-cwe-79-improper-neutralization-of-i-22192320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e5948ca677756fc9a47c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11413-out-of-bounds-read-in-gnu-binutils-bde75d40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11413%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e590fca677756fc9a3f98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11412-out-of-bounds-read-in-gnu-binutils-8c9f638a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11412%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68e590fca677756fc9a3f982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43823-cwe-79-improper-neutralization-of-i-64f8f308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e58d79a677756fc9a383cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11410-sql-injection-in-campcodes-advanced-dec5c036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11410%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e589f9a677756fc9a320db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-season-spam-with-a-touch-of-salt-22246274</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Season%20Spam%20With%20a%20Touch%20of%20&apos;Salt&apos;&amp;severity=medium&amp;id=68e70b6732de7eb26af5082f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/draftkings-warns-of-account-breaches-in-credential-61f9a9d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DraftKings%20warns%20of%20account%20breaches%20in%20credential%20stuffing%20attacks&amp;severity=high&amp;id=68e582eaa677756fc9a25c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11409-sql-injection-in-campcodes-advanced-26813693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11409%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68e582fea677756fc9a25d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34252-cwe-506-embedded-malicious-code-in--7efafdd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34252&amp;severity=null&amp;id=68e582fea677756fc9a25d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11408-buffer-overflow-in-d-link-di-7001-m-e077544d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11408%3A%20Buffer%20Overflow%20in%20D-Link%20DI-7001%20MINI&amp;severity=high&amp;id=68e57be5a677756fc9a19479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11407-os-command-injection-in-d-link-di-7-8e856e97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11407%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7001%20MINI&amp;severity=medium&amp;id=68e574dca677756fc9a0e40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36565-cwe-88-improper-neutralization-of-a-6d9e717b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36565%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e57159a677756fc9a08302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6242-server-side-request-forgery-ssrf-in--6a610542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6242%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Red%20Hat%20Red%20Hat%20AI%20Inference%20Server&amp;severity=high&amp;id=68e57159a677756fc9a082fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11462-cwe-59-improper-link-resolution-bef-685a3221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11462%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AWS%20Client%20VPN&amp;severity=critical&amp;id=68e57159a677756fc9a082f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36566-cwe-78-improper-neutralization-of-s-b17adecc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36566%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e57159a677756fc9a082fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36569-cwe-78-improper-neutralization-of-s-2c8badc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36569%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56dd5a677756fc9a02cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11406-information-disclosure-in-kaifangqi-6403ae48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11406%3A%20Information%20Disclosure%20in%20kaifangqian%20kaifangqian-base&amp;severity=medium&amp;id=68e56dd5a677756fc9a02ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36567-cwe-78-improper-neutralization-of-s-374afa4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36567%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56dd5a677756fc9a02ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61910-cwe-789-memory-allocation-with-exce-83a69346</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61910%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20nasa-jpl%20ION-DTN&amp;severity=high&amp;id=68e56dd5a677756fc9a02cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43727-cwe-303-incorrect-implementation-of-7876d8c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43727%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=high&amp;id=68e56a54a677756fc99e5a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43910-cwe-121-stack-based-buffer-overflow-82f0b5c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43910%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=low&amp;id=68e56a54a677756fc99e5a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43909-cwe-327-use-of-a-broken-or-risky-cr-7557eb6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43909%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=low&amp;id=68e566d0a677756fc99d8dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-concerns-shadow-vibe-coding-adoption-23201591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Concerns%20Shadow%20Vibe%20Coding%20Adoption&amp;severity=medium&amp;id=68e70b6732de7eb26af50832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11192-cwe-287-improper-authentication-in--a9eb5881</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11192%3A%20CWE-287%20Improper%20Authentication%20in%20Extreme%20Networks%20Fabric%20Engine%20(VOSS)&amp;severity=high&amp;id=68e566d0a677756fc99d8dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43905-cwe-88-improper-neutralization-of-a-c0d12903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43905%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e566d0a677756fc99d8dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11405-sql-injection-in-sourcecodester-hot-dc42e115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11405%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e566d0a677756fc99d8dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61784-cwe-22-improper-limitation-of-a-pat-51bab548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61784%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hiyouga%20LLaMA-Factory&amp;severity=high&amp;id=68e566d0a677756fc99d8dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45375-cwe-121-stack-based-buffer-overflow-726c2b16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45375%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e566d0a677756fc99d8dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61776-cwe-522-insufficiently-protected-cr-46d73fbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61776%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20DependencyTrack%20dependency-track&amp;severity=medium&amp;id=68e566d0a677756fc99d8dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43913-cwe-327-use-of-a-broken-or-risky-cr-0017fa0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43913%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56349a677756fc99d111c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61670-cwe-772-missing-release-of-resource-8419984c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61670%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=68e56349a677756fc99d1128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43912-cwe-122-heap-based-buffer-overflow--9654dc48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43912%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56349a677756fc99d1125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43891-cwe-327-use-of-a-broken-or-risky-cr-3d73caff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43891%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e56349a677756fc99d1121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43889-cwe-22-improper-limitation-of-a-pat-2f0f7fc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43889%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55fc5a677756fc99c5724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11404-sql-injection-in-sourcecodester-hot-b5f2668a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11404%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e55fc5a677756fc99c571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43934-cwe-22-improper-limitation-of-a-pat-fcb2a14f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43934%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55fc5a677756fc99c5727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43908-cwe-78-improper-neutralization-of-s-57ae8f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43908%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55c41a677756fc99bb4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3449-cwe-340-generation-of-predictable-nu-7844f8a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3449%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=low&amp;id=68e55c41a677756fc99bb4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3448-cwe-79-improper-neutralization-of-in-a5fd5fef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20B%26R%20Industrial%20Automation%20GmbH%20Automation%20Runtime&amp;severity=medium&amp;id=68e55c41a677756fc99bb4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43907-cwe-35-path-traversal-in-dell-power-cd6a54a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43907%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55c41a677756fc99bb4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electronics-giant-avnet-confirms-breach-says-stole-e85b9afb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electronics%20giant%20Avnet%20confirms%20breach%2C%20says%20stolen%20data%20unreadable&amp;severity=high&amp;id=68e558bda677756fc99b47a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-stole-over-2-billion-in-crypt-8dd6a5fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20hackers%20stole%20over%20%242%20billion%20in%20crypto%20this%20year&amp;severity=high&amp;id=68e558bda677756fc99b47ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-exploited-oracle-zero-day-for-data-theft-sinc-00975fbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20exploited%20Oracle%20zero-day%20for%20data%20theft%20since%20early%20August&amp;severity=critical&amp;id=68e558bda677756fc99b47a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8291-vulnerability-in-python-software-fou-ebe6955f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8291%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=68e558f4a677756fc99b5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43911-cwe-78-improper-neutralization-of-s-fc6c37b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43911%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e558f4a677756fc99b5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3450-cwe-413-improper-resource-locking-in-73957373</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3450%3A%20CWE-413%20Improper%20Resource%20Locking%20in%20B%26R%20Industrial%20Automation%20Automation%20Runtime&amp;severity=critical&amp;id=68e558f4a677756fc99b51ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43906-cwe-78-improper-neutralization-of-s-31141612</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43906%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e558f4a677756fc99b5202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11403-sql-injection-in-sourcecodester-hot-01eb4632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11403%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e558f4a677756fc99b51f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43890-cwe-78-improper-neutralization-of-s-c2787076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43890%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20with%20Data%20Domain%20Operating%20System%20(DD%20OS)%20of%20Feature%20Release&amp;severity=medium&amp;id=68e55537a677756fc99a7728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1826-cwe-79-improper-neutralization-of-in-69a9cefb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=68e55537a677756fc99a7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43914-cwe-266-incorrect-privilege-assignm-47270ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43914%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20PowerProtect%20Data%20Domain%20BoostFS%20for%20Linux%20Ubuntu%20Feature%20Release&amp;severity=high&amp;id=68e55537a677756fc99a772b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13-year-old-redishell-vulnerability-puts-60000-red-90a50a75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13-Year-Old%20RediShell%20Vulnerability%20Puts%2060%2C000%20Redis%20Servers%20at%20Risk&amp;severity=medium&amp;id=68e551b0a677756fc999fc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36156-cwe-119-improper-restriction-of-ope-681f0ee1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36156%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20InfoSphere%20Data%20Replication%20VSAM%20for%20z%2FOS%20Remote%20Source&amp;severity=high&amp;id=68e551c3a677756fc999ff6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11402-sql-injection-in-sourcecodester-hot-2e33ee76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11402%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e551c3a677756fc999ff6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batshadow-group-uses-new-go-based-vampire-bot-malw-2fd7756e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BatShadow%20Group%20Uses%20New%20Go-Based%20&apos;Vampire%20Bot&apos;%20Malware%20to%20Hunt%20Job%20Seekers&amp;severity=medium&amp;id=68e70a4432de7eb26af4e14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11401-sql-injection-in-sourcecodester-hot-7c500958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11401%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e54aaaa677756fc998dc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-actors-exploit-critical-fortra-g-c90501d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Actors%20Exploit%20Critical%20Fortra%20GoAnywhere%20Flaw&amp;severity=critical&amp;id=68e70b6732de7eb26af50835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-against-freepbx-cve-2025-57819-with-code-e-20a51acc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20Against%20FreePBX%20(CVE-2025-57819)%20with%20code%20execution.%2C%20(Tue%2C%20Oct%207th)&amp;severity=low&amp;id=68e54014a677756fc996ba89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11400-sql-injection-in-sourcecodester-hot-6588b18c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11400%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e53c9ba677756fc9965d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-exploiting-goanywhere-mft-flaw-c-028a8fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Exploiting%20GoAnywhere%20MFT%20Flaw%2C%20Confirms%20Microsoft&amp;severity=medium&amp;id=68e53590a677756fc994434a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11399-sql-injection-in-sourcecodester-hot-48d2f9b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11399%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e535a2a677756fc994444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-new-ai-doesnt-just-find-vulnerabilities-it-902180b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20New%20AI%20Doesn&apos;t%20Just%20Find%20Vulnerabilities%20%E2%80%94%20It%20Rewrites%20Code%20to%20Patch%20Them&amp;severity=medium&amp;id=68e70a4432de7eb26af4e14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11398-unrestricted-upload-in-sourcecodest-5190437b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11398%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e52784a677756fc992c213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6215-vulnerability-in-hp-inc-hp-sure-star-0ec0c936</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6215%3A%20Vulnerability%20in%20HP%2C%20Inc.%20HP%20Sure%20Start%20IFD%20Protection&amp;severity=high&amp;id=68e52784a677756fc992c210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-60-returns-with-35-plugins-and-enhanced-data-e107f8bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%206.0%20Returns%20with%2035%2B%20Plugins%20and%20Enhanced%20Data%20Theft%20Capabilities&amp;severity=high&amp;id=68e52400a677756fc992607b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-ai-is-already-the-1-data-exfiltration-fa26005f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20AI%20Is%20Already%20the%20%231%20Data%20Exfiltration%20Channel%20in%20the%20Enterprise&amp;severity=high&amp;id=68e52400a677756fc992607f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59425-cwe-385-covert-timing-channel-in-vl-382e4a86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59425%3A%20CWE-385%3A%20Covert%20Timing%20Channel%20in%20vllm-project%20vllm&amp;severity=high&amp;id=68e5207aa677756fc991b831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11397-sql-injection-in-sourcecodester-hot-d8ae86a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11397%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20and%20Lodge%20Management%20System&amp;severity=medium&amp;id=68e5207aa677756fc991b826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25009-cwe-79-improper-neutralization-of-i-4823c67a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68e52784a677756fc992c1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54402-cwe-121-stack-based-buffer-overflow-3cbebbcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54402%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54401-cwe-121-stack-based-buffer-overflow-ed3e7f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54401%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54400-cwe-121-stack-based-buffer-overflow-4f73a460</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54400%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54399-cwe-121-stack-based-buffer-overflow-a6931196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54399%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54404-cwe-78-improper-neutralization-of-s-1f5d2496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54404%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54403-cwe-78-improper-neutralization-of-s-bbace43d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54403%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e52784a677756fc992c20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48826-cwe-134-use-of-externally-controlle-fd583422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48826%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e535a2a677756fc9944455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54406-cwe-78-improper-neutralization-of-s-c06c90d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54406%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e535a2a677756fc994445b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54405-cwe-78-improper-neutralization-of-s-c54e8bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54405%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20WGR-500&amp;severity=high&amp;id=68e535a2a677756fc9944458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37728-cwe-522-insufficiently-protected-cr-317b1202</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37728%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=68e51d0ca677756fc991120e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53476-cwe-775-missing-release-of-file-des-e66c056d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53476%3A%20CWE-775%3A%20Missing%20Release%20of%20File%20Descriptor%20or%20Handle%20after%20Effective%20Lifetime%20in%20OpenPLC%20OpenPLC_v3&amp;severity=medium&amp;id=68e51d0ca677756fc9911217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-stole-data-from-public-safety-comms-firm-b-9bad7ac4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Stole%20Data%20From%20Public%20Safety%20Comms%20Firm%20BK%20Technologies&amp;severity=medium&amp;id=68e515e9a677756fc98deb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11396-sql-injection-in-code-projects-simp-11b937b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11396%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68e51270a677756fc98d6741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40888-cwe-89-improper-neutralization-of-s-c53fb6db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40888%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50ee5a677756fc98ca4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40889-cwe-22-improper-limitation-of-a-pat-a193631d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40889%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68e50ee5a677756fc98ca4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40887-cwe-89-improper-neutralization-of-s-0a3512e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40887%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50ee5a677756fc98ca4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40886-cwe-89-improper-neutralization-of-s-1610ea97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40886%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68e50ee5a677756fc98ca4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40885-cwe-89-improper-neutralization-of-s-6da5477a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40885%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50ee5a677756fc98ca4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3719-cwe-863-incorrect-authorization-in-n-c7662e9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3719%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68e50b71a677756fc98c2731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3718-cwe-22-improper-limitation-of-a-path-a394732e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3718%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=medium&amp;id=68e50b71a677756fc98c272e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40676-cwe-639-authorization-bypass-throug-b1f95981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40676%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BBMRI-ERIC%20Negotiator&amp;severity=medium&amp;id=68e50b71a677756fc98c2737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40649-cwe-79-improper-neutralization-of-i-3656a29f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20BBMRI-ERIC%20Negotiator&amp;severity=medium&amp;id=68e50b71a677756fc98c2734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11390-cross-site-scripting-in-phpgurukul--f96bc6b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11390%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=68e5045da677756fc98b28cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0603-cwe-89-improper-neutralization-of-sp-99fd7352</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0603%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Callvision%20Healthcare%20Callvision%20Emergency%20Code&amp;severity=critical&amp;id=68e4fe9ca677756fc98a5099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11389-stack-based-buffer-overflow-in-tend-a3436941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11389%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4fe9ca677756fc98a509c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11388-stack-based-buffer-overflow-in-tend-bef1454f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11388%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4f655a677756fc988cb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-research-ai-is-already-the-1-data-exfiltration-be458a28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Research%3A%20AI%20Is%20Already%20the%20%231%20Data%20Exfiltration%20Channel%20in%20the%20Enterprise&amp;severity=critical&amp;id=68e70a4432de7eb26af4e150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-60-returns-with-35-plugins-and-enhanced-data-0efc8f9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%206.0%20Returns%20with%2035%2B%20Plugins%20and%20Enhanced%20Data%20Theft%20Capabilities&amp;severity=medium&amp;id=68e70a4432de7eb26af4e153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-now-redishell-threatens-cloud-via-redis-rce-2da94854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Now%3A%20&apos;RediShell&apos;%20Threatens%20Cloud%20Via%20Redis%20RCE&amp;severity=low&amp;id=68e70b6732de7eb26af50838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-firm-exposes-role-of-beijing-research-ins-1a56dfe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Firm%20Exposes%20Role%20of%20Beijing%20Research%20Institute%20in%20China%E2%80%99s%20Cyber%20Operations&amp;severity=medium&amp;id=68e4f01d4f7f35a610571911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11387-stack-based-buffer-overflow-in-tend-138267fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11387%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4ecad4f7f35a6104f9b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mic-e-mouse-attack-shows-computer-mice-can-cap-c004bbbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mic-E-Mouse%20Attack%20Shows%20Computer%20Mice%20Can%20Capture%20Conversations&amp;severity=medium&amp;id=68e4ea01434a490243e03ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11386-stack-based-buffer-overflow-in-tend-9095546d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11386%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=68e4e83c434a490243dbbf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortra-goanywhere-mft-zero-day-exploited-in-ransom-a688e086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortra%20GoAnywhere%20MFT%20Zero-Day%20Exploited%20in%20Ransomware%20Attacks&amp;severity=medium&amp;id=68e4e063ab797cfef8b07343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11385-buffer-overflow-in-tenda-ac20-9d3e51a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11385%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68e4e080ab797cfef8b0b8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-oracle-mozilla-microsoft-windows-linu-52937b7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Oracle%2C%20Mozilla%2C%20Microsoft%20Windows%2C%20Linux%20Kernel%2C%20and%20Microsoft%20IE%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e4dd9e6ce4090a3e84c089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11360-cross-site-scripting-in-jakowenko-d-2b4b57b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11360%3A%20Cross%20Site%20Scripting%20in%20jakowenko%20double-take&amp;severity=medium&amp;id=68e4da266ce4090a3e7d70a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-cve-2025-59489-vulnerability-in-unity-and-how--e517ca08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20CVE-2025-59489%20vulnerability%20in%20Unity%2C%20and%20how%20to%20fix%20it%20in%20games%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e4d779769a746382d0cc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-y2k38-bug-is-a-vulnerability-not-just-a-date-p-a62187a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Y2K38%20Bug%20Is%20a%20Vulnerability%2C%20Not%20Just%20a%20Date%20Problem%2C%20Researchers%20Warn&amp;severity=medium&amp;id=68e4d3ea769a746382c94569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/13-year-old-redis-flaw-exposed-cvss-100-vulnerabil-807db79d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=13-Year-Old%20Redis%20Flaw%20Exposed%3A%20CVSS%2010.0%20Vulnerability%20Lets%20Attackers%20Run%20Code%20Remotely&amp;severity=critical&amp;id=68e4fe7ca677756fc98a4e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-puts-60000-redis-servers-at-cc549522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20Puts%2060%2C000%20Redis%20Servers%20at%20Risk%20of%20Exploitation&amp;severity=critical&amp;id=68e4d12d768805d4eae397a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11359-sql-injection-in-code-projects-simp-d3c301c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11359%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=68e4d148768805d4eae3e95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10645-cwe-532-insertion-of-sensitive-info-66fef1aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10645%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20webfactory%20WP%20Reset&amp;severity=medium&amp;id=68e4d148768805d4eae3e95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-links-storm-1175-to-goanywhere-exploit-d-0e3afbff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Links%20Storm-1175%20to%20GoAnywhere%20Exploit%20Deploying%20Medusa%20Ransomware&amp;severity=critical&amp;id=68e4fe7ca677756fc98a4e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11358-sql-injection-in-code-projects-simp-33cd1f0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11358%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=68e4cb233f98f1161b9a3b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11357-sql-injection-in-code-projects-simp-4dfea686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11357%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=68e4c332b08cfbbcc3c5e902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7400-cwe-79-improper-neutralization-of-in-1141749d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68e4c18bb08cfbbcc3c2db23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11356-buffer-overflow-in-tenda-ac23-f3673b6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11356%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=68e4bd0a62e88349a68c2792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11355-buffer-overflow-in-utt-1250gw-0275a842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11355%3A%20Buffer%20Overflow%20in%20UTT%201250GW&amp;severity=high&amp;id=68e4bd0a62e88349a68c2799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11354-unrestricted-upload-in-code-project-ee0ac4c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11354%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e4af0350b3b89b2181d408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10162-cwe-22-improper-limitation-of-a-pat-f42cbe7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10162%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=high&amp;id=68e4af0350b3b89b2181d405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11353-unrestricted-upload-in-code-project-4d2bdafc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11353%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e4a8e1f36fcb72ab3b3d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-ebs-under-fire-as-cl0p-exploits-cve-2025-61-3ef6c79f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20EBS%20Under%20Fire%20as%20Cl0p%20Exploits%20CVE-2025-61882%20in%20Real-World%20Attacks&amp;severity=critical&amp;id=68e4fe7ca677756fc98a4e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11352-unrestricted-upload-in-code-project-0808c5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11352%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e4a2b8a0f5db0db2785ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11362-allocation-of-resources-without-lim-3be9168f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11362%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pdfmake&amp;severity=high&amp;id=68e4a2b8a0f5db0db2785ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11351-unrestricted-upload-in-code-project-19a0bd95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11351%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68e499fd3b3ae40543e7ee7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11350-sql-injection-in-campcodes-online-a-29092dd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11350%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e493d46ce96be75a0a2611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11349-sql-injection-in-campcodes-online-a-e3a28563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11349%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e48d326a45552f36eb7389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11348-sql-injection-in-campcodes-online-a-7695d4fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11348%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e4862a6a45552f36eb0390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11347-unrestricted-upload-in-code-project-95c6d13a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11347%3A%20Unrestricted%20Upload%20in%20code-projects%20Student%20Crud%20Operation&amp;severity=medium&amp;id=68e4862a6a45552f36eb0389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/isc-stormcast-for-tuesday-october-7th-2025-httpsis-3514c36f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ISC%20Stormcast%20For%20Tuesday%2C%20October%207th%2C%202025%20https%3A%2F%2Fisc.sans.edu%2Fpodcastdetail%2F9644%2C%20(Tue%2C%20Oct%207th)&amp;severity=medium&amp;id=68e4748c6a45552f36e9abd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-07-f7f0ab1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-07&amp;severity=medium&amp;id=68e5ad0ba677756fc9a6b000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62185-cwe-427-uncontrolled-search-path-el-42475e5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62185%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Ankitects%20Anki&amp;severity=medium&amp;id=68e582fea677756fc9a25d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62187-cwe-23-relative-path-traversal-in-a-b2ffe603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62187%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ankitects%20Anki&amp;severity=low&amp;id=68e582fea677756fc9a25d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62186-cwe-829-inclusion-of-functionality--ced2a08c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62186%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Ankitects%20Anki&amp;severity=medium&amp;id=68e582fea677756fc9a25d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44824-cwe-863-incorrect-authorization-in--127007c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44824%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nagios%20Log%20Server&amp;severity=high&amp;id=68e56dd5a677756fc9a02cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44823-cwe-497-exposure-of-sensitive-syste-989fc5cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44823%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nagios%20Log%20Server&amp;severity=critical&amp;id=68e56dd5a677756fc9a02cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56243-na-d229e563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56243%3A%20n%2Fa&amp;severity=medium&amp;id=68e54726a677756fc9984850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52021-na-2d913583</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52021%3A%20n%2Fa&amp;severity=critical&amp;id=68e54726a677756fc998484d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60312-na-bb8ec3e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60312%3A%20n%2Fa&amp;severity=medium&amp;id=68e53917a677756fc995dfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57564-na-4edce169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57564%3A%20n%2Fa&amp;severity=high&amp;id=68e5207aa677756fc991b82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50505-na-6ac24c46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50505%3A%20n%2Fa&amp;severity=high&amp;id=68e51d0ca677756fc9911211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-hacking-contest-offers-45-million-in-3de050e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zeroday%20Cloud%20hacking%20contest%20offers%20%244.5%20million%20in%20bounties&amp;severity=critical&amp;id=68e455e079fe82f008c207a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-critical-goanywhere-bug-exploited-in-ran-c18f5ff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%3A%20Critical%20GoAnywhere%20bug%20exploited%20in%20ransomware%20attacks&amp;severity=critical&amp;id=68e455e079fe82f008c2079e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-data-breach-escalates-as-shinyhunters-join-866ab16e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20data%20breach%20escalates%20as%20ShinyHunters%20joins%20extortion&amp;severity=high&amp;id=68e455e079fe82f008c207a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34251-cwe-269-improper-privilege-manageme-37b9d1ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34251%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tesla%20Telematics%20Control%20Unit%20(TCU)&amp;severity=high&amp;id=68e4536752d9d39e2226205f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43824-cwe-79-improper-neutralization-of-i-98f15cc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e43f694819f8f2e191a0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61768-cwe-20-improper-input-validation-in-6a4c1c9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61768%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xuemian168%20kuno&amp;severity=medium&amp;id=68e43b3134fac240349f66b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/know-your-enemy-how-cybercriminals-and-nation-stat-8efb73ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Know%20Your%20Enemy%3A%20How%20cybercriminals%20and%20nation-state%20hackers%20operate&amp;severity=medium&amp;id=68e369b5bd6176610b498abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattackers-exploit-zimbra-zero-day-via-ics-d14adc82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattackers%20Exploit%20Zimbra%20Zero-Day%20Via%20ICS&amp;severity=medium&amp;id=68e469f16a45552f36e90707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11346-deserialization-in-ilias-f66e3077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11346%3A%20Deserialization%20in%20ILIAS&amp;severity=medium&amp;id=68e41a9cfa9ee2dfa0ac712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-ransomware-hits-oracle-customers-via-zero-day-a29f9c11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20Ransomware%20Hits%20Oracle%20Customers%20Via%20Zero-Day%20Flaw&amp;severity=medium&amp;id=68e4160e4d3b0698c0125c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11345-deserialization-in-ilias-6f73f9fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11345%3A%20Deserialization%20in%20ILIAS&amp;severity=medium&amp;id=68e4144c4d3b0698c00df52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-v6-exploring-pivotal-plugins-afdf4405</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20V6%3A%20Exploring%20Pivotal%20Plugins&amp;severity=medium&amp;id=68e412954d3b0698c00ae5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-malware-spreading-via-whatsapp-ta-0f878fdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20Malware%20Spreading%20Via%20WhatsApp%2C%20Targets%20Brazilian%20Users&amp;severity=medium&amp;id=68e412954d3b0698c00ae607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11344-remote-code-execution-in-ilias-0c04ee9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11344%3A%20Code%20Injection%20in%20ILIAS&amp;severity=medium&amp;id=68e40de8cf87aa9c343fb6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-in-fake-signal-and-totok-apps-targets-uae--38fa80b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware%20in%20Fake%20Signal%20and%20ToTok%20Apps%20Targets%20UAE%20Android%20Users&amp;severity=medium&amp;id=68e405eb64f972a16d66fe4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11343-sql-injection-in-code-projects-stud-7b869aa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11343%3A%20SQL%20Injection%20in%20code-projects%20Student%20Crud%20Operation&amp;severity=medium&amp;id=68e4079864f972a16d6a0ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6985-cwe-611-improper-restriction-of-xml--804486b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6985%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68e405fa64f972a16d673f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11342-sql-injection-in-code-projects-onli-1c1cba7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11342%3A%20SQL%20Injection%20in%20code-projects%20Online%20Course%20Registration&amp;severity=medium&amp;id=68e3ff9d1c1196eac613431e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linkedin-sues-proapis-for-using-1m-fake-accounts-t-21412500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LinkedIn%20sues%20ProAPIs%20for%20using%201M%20fake%20accounts%20to%20scrape%20user%20data&amp;severity=high&amp;id=68e3f93d10d29ec2ec454b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redis-warns-of-critical-flaw-impacting-thousands-o-5bec5958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Redis%20warns%20of%20critical%20flaw%20impacting%20thousands%20of%20instances&amp;severity=critical&amp;id=68e3f93d10d29ec2ec454b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11341-xml-external-entity-reference-in-ji-7ad03120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11341%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68e3f95810d29ec2ec45cc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36354-cwe-78-improper-neutralization-of-s-9625c04d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36354%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=68e3f641083a44572bca373c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61778-cwe-290-authentication-bypass-by-sp-d3182a9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61778%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20akkadotnet%20akka.net&amp;severity=critical&amp;id=68e3f641083a44572bca3745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36355-cwe-829-inclusion-of-functionality--adcff379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36355%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=68e3f641083a44572bca373f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36356-cwe-250-execution-with-unnecessary--3837d4c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36356%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=critical&amp;id=68e3f641083a44572bca3742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61777-cwe-200-exposure-of-sensitive-infor-f157d5c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61777%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlagForgeCTF%20flagForge&amp;severity=critical&amp;id=68e3f46f083a44572bc63cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10363-cwe-502-deserialization-of-untruste-66015baa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10363%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Topal%20Solutions%20AG%20Topal%20Finanzbuchhaltung&amp;severity=critical&amp;id=68e3f2c5083a44572bc2aa12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11339-buffer-overflow-in-d-link-di-7100g--8d034ca7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11339%3A%20Buffer%20Overflow%20in%20D-Link%20DI-7100G%20C1&amp;severity=high&amp;id=68e3f2c5083a44572bc2aa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0038-cwe-1284-improper-validation-of-spec-acb882e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0038%3A%20CWE-1284%20-%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20AMD%20Kria(TM)%20SOM&amp;severity=medium&amp;id=68e3ecad3a3ccaa613952b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61766-cwe-674-uncontrolled-recursion-in-w-e6437333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61766%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20weirdgloop%20mediawiki-extensions-Bucket&amp;severity=medium&amp;id=68e3ecad3a3ccaa613952b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61765-cwe-502-deserialization-of-untruste-abbf83e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61765%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20miguelgrinberg%20python-socketio&amp;severity=medium&amp;id=68e3ea0f7f1d1774cab77ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11338-buffer-overflow-in-d-link-di-7100g--b1989bb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11338%3A%20Buffer%20Overflow%20in%20D-Link%20DI-7100G%20C1&amp;severity=high&amp;id=68e3ea0f7f1d1774cab77b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61687-cwe-434-unrestricted-upload-of-file-f035be13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61687%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68e3e8427f1d1774cab273fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybercrime-group-runs-global-seo-fraud-rin-843d88dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybercrime%20Group%20Runs%20Global%20SEO%20Fraud%20Ring%20Using%20Compromised%20IIS%20Servers&amp;severity=high&amp;id=68e3e3f60d99582527bb4695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-malware-resurfaces-with-ransomware-module-ov-91121c97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20malware%20resurfaces%20with%20ransomware%20module%2C%20over%2035%20plugins&amp;severity=high&amp;id=68e3e3f60d99582527bb4691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steam-and-microsoft-warn-of-unity-flaw-exposing-ga-2ac8180b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steam%20and%20Microsoft%20warn%20of%20Unity%20flaw%20exposing%20gamers%20to%20attacks&amp;severity=high&amp;id=68e3e3f60d99582527bb4699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taking-remote-control-over-industrial-generators-e72b45ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taking%20remote%20control%20over%20industrial%20generators&amp;severity=medium&amp;id=68e3e07e0d99582527b333af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59152-cwe-807-reliance-on-untrusted-input-55b27963</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59152%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20litestar-org%20litestar&amp;severity=high&amp;id=68e3e22d0d99582527b656f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52472-cwe-89-improper-neutralization-of-s-b863cc29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52472%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=68e3da725799e49c42c45190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49594-cwe-285-improper-authorization-in-x-069429c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49594%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki-contrib%20oidc&amp;severity=critical&amp;id=68e3d7f5cb24753c988f01cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49886-cwe-502-deserialization-of-untruste-96cc76ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49886%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=critical&amp;id=68e3d7f5cb24753c988f01c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-says-user-information-stolen-in-third-part-89fad90a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Says%20User%20Information%20Stolen%20in%20Third-Party%20Data%20Breach&amp;severity=medium&amp;id=68e3d7ddcb24753c988ee6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rainwalk-pet-insurance-exposes-158-gb-of-us-custom-fbb33983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rainwalk%20Pet%20Insurance%20Exposes%20158%20GB%20of%20US%20Customer%20and%20Pet%20Data&amp;severity=medium&amp;id=68e3d18bfa854abf392e0a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-govt-fronts-trick-the-west-to-obtain-cyber-4bd5f993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Gov&apos;t%20Fronts%20Trick%20the%20West%20to%20Obtain%20Cyber%20Tech&amp;severity=medium&amp;id=68e3ce0cfa854abf39264006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-report-links-research-firms-bieta-and-ciii-to--a438d07d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Report%20Links%20Research%20Firms%20BIETA%20and%20CIII%20to%20China%E2%80%99s%20MSS%20Cyber%20Operations&amp;severity=medium&amp;id=68e467466a45552f36e85b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11337-path-traversal-in-four-faith-water--1843beb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11337%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68e3c79efee0e782790922d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-and-steam-take-action-as-unity-vulnerabi-1d185d81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20and%20Steam%20Take%20Action%20as%20Unity%20Vulnerability%20Puts%20Games%20at%20Risk&amp;severity=low&amp;id=68e3c0edce01562c4aae4c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11336-path-traversal-in-four-faith-water--feb69fdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11336%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68e3c2aace01562c4ab140ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-dll-hijacking-with-ml-kaspersky-official-30097b42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20DLL%20hijacking%20with%20ML%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e3bda84ffbcd9cf4f9add0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quick-and-dirty-analysis-of-possible-oracle-e-busi-8d73c5a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Quick%20and%20Dirty%20Analysis%20of%20Possible%20Oracle%20E-Business%20Suite%20Exploit%20Script%20(CVE-2025-61882)%20%26%23x5b%3BUPDATED%26%23x5b%3B%2C%20(Mon%2C%20Oct%206th)&amp;severity=medium&amp;id=68e33efb99657e9cbd630ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11335-command-injection-in-d-link-di-7100-0aaf5ff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11335%3A%20Command%20Injection%20in%20D-Link%20DI-7100G%20C1&amp;severity=medium&amp;id=68e3ba264ffbcd9cf4f20805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weekly-recap-oracle-0-day-bitlocker-bypass-vmscape-60122db7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%9A%A1%20Weekly%20Recap%3A%20Oracle%200-Day%2C%20BitLocker%20Bypass%2C%20VMScape%2C%20WhatsApp%20Worm%20%26%20More&amp;severity=high&amp;id=68e467466a45552f36e85b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-rushes-patch-for-cve-2025-61882-after-cl0p--aefa1e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20Rushes%20Patch%20for%20CVE-2025-61882%20After%20Cl0p%20Exploited%20It%20in%20Data%20Theft%20Attacks&amp;severity=critical&amp;id=68e467466a45552f36e85b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-cybercrime-group-runs-global-seo-fraud-rin-da0a57dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Cybercrime%20Group%20Runs%20Global%20SEO%20Fraud%20Ring%20Using%20Compromised%20IIS%20Servers&amp;severity=high&amp;id=68e467466a45552f36e85b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11334-sql-injection-in-campcodes-online-a-d01b802c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11334%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=68e3aa44a74bcb39a88e54bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-extorting-salesforce-after-stealing-data-f-2461aa4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Extorting%20Salesforce%20After%20Stealing%20Data%20From%20Dozens%20of%20Customers&amp;severity=medium&amp;id=68e3aa2ca74bcb39a88e0017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/securitysnack-18e-crime-68c2af3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SecuritySnack%3A%2018%2BE-Crime&amp;severity=medium&amp;id=68e3a7d4a74bcb39a887eed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11333-cross-site-scripting-in-langleyfcu--9378a2f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11333%3A%20Cross%20Site%20Scripting%20in%20langleyfcu%20Online%20Banking%20System&amp;severity=medium&amp;id=68e3a6c5a74bcb39a885c280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-doctors-imaging-group-impacts-17100-cddc7318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20Breach%20at%20Doctors%20Imaging%20Group%20Impacts%20171%2C000%20People&amp;severity=medium&amp;id=68e39feb5c165d4385dfe321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11332-cross-site-scripting-in-cmseasy-ed23db07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11332%3A%20Cross%20Site%20Scripting%20in%20CmsEasy&amp;severity=medium&amp;id=68e39cda5ba1d306aee24fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dell-unityvsa-flaw-allows-command-execution-withou-294198dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dell%20UnityVSA%20Flaw%20Allows%20Command%20Execution%20Without%20Login&amp;severity=medium&amp;id=68e399615ba1d306aedb637b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11331-command-injection-in-ideacms-2bfcf5ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11331%3A%20Command%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=68e39650f4355415119cc432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-propagating-malware-hits-whatsapp-users-in-br-1c2c1e28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Propagating%20Malware%20Hits%20WhatsApp%20Users%20in%20Brazil&amp;severity=medium&amp;id=68e469f16a45552f36e9070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/6th-october-threat-intelligence-report-c732cf5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=6th%20October%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e39040a7175d123a625b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/45-million-offered-in-new-cloud-hacking-competitio-133068c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%244.5%20Million%20Offered%20in%20New%20Cloud%20Hacking%20Competition&amp;severity=medium&amp;id=68e3901aa7175d123a6216cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zimbra-users-targeted-in-zero-day-exploit-using-ic-5e63c328</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zimbra%20users%20targeted%20in%20zero-day%20exploit%20using%20iCalendar%20attachments&amp;severity=critical&amp;id=68e3902fa7175d123a624b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11330-sql-injection-in-phpgurukul-beauty--24b01308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11330%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68e38e59a7175d123a5dc02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0609-cwe-79-improper-neutralization-of-in-c27d19e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38ca5a7175d123a5aa1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0608-cwe-601-url-redirection-to-untrusted-be2154ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0608%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38ca5a7175d123a5aa1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0607-cwe-79-improper-neutralization-of-in-4a5eb377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0607%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38ca5a7175d123a5aa1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0606-cwe-639-authorization-bypass-through-7be5a571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0606%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Logo%20Software%20Inc.%20Logo%20Cloud&amp;severity=medium&amp;id=68e38a0e9a8b61c808612f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11329-sql-injection-in-code-projects-onli-5bb05afb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11329%3A%20SQL%20Injection%20in%20code-projects%20Online%20Course%20Registration&amp;severity=medium&amp;id=68e38a0e9a8b61c808612f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11328-stack-based-buffer-overflow-in-tend-2a8c2017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11328%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e380724a42da91e754f204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-southnet-sidewinder-expands-phishing-and-cc84627a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20SouthNet%3A%20SideWinder%20Expands%20Phishing%20and%20Malware%20Operations%20in%20South%20Asia&amp;severity=medium&amp;id=68e3a3645c165d4385e75d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59728-cwe-787-out-of-bounds-write-in-ffmp-12c00db6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59728%3A%20CWE-787%20Out-of-bounds%20Write%20in%20FFmpeg%20MPEG-DASH&amp;severity=high&amp;id=68e382204a42da91e7586492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warmcookie-one-year-later-new-features-and-fresh-i-aa79cc94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WARMCOOKIE%20One%20Year%20Later%3A%20New%20Features%20and%20Fresh%20Insights&amp;severity=medium&amp;id=68e3a3645c165d4385e75d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11327-stack-based-buffer-overflow-in-tend-5a717cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11327%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e382204a42da91e758648b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beer-giant-asahi-says-data-stolen-in-ransomware-at-89a450ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beer%20Giant%20Asahi%20Says%20Data%20Stolen%20in%20Ransomware%20Attack&amp;severity=medium&amp;id=68e3771ac6adcde93497ab3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-e-business-suite-zero-day-exploited-in-cl0p-34264bbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20E-Business%20Suite%20Zero-Day%20Exploited%20in%20Cl0p%20Attacks&amp;severity=critical&amp;id=68e3739bc6adcde9348f1fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-the-salesloft-drift-breach-c3298fa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20The%20Salesloft-Drift%20Breach&amp;severity=high&amp;id=68e373afc6adcde9348f4ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11326-stack-based-buffer-overflow-in-tend-9751ceba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11326%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e37266de39319c4ea35b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58579-cwe-497-exposure-of-sensitive-syste-98d3b533</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58579%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58591-cwe-22-improper-limitation-of-a-pat-c9061b0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58591%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58590-cwe-22-improper-limitation-of-a-pat-c8513d86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58590%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58589-cwe-200-exposure-of-sensitive-infor-c4820374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58589%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=low&amp;id=68e36cef0e76680ec164d67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58587-cwe-307-improper-restriction-of-exc-3a5d928d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58587%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58586-cwe-204-observable-response-discrep-e198427a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58586%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11325-stack-based-buffer-overflow-in-tend-f8e47d5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11325%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e36cee0e76680ec164d64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58585-cwe-497-exposure-of-sensitive-syste-4b50ced4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58585%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58584-cwe-598-use-of-get-request-method-w-f9599deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58584%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e36cef0e76680ec164d65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58583-cwe-497-exposure-of-sensitive-syste-ecc29e89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58583%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49caae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58582-cwe-770-allocation-of-resources-wit-b1856b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58582%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49caa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58581-cwe-200-exposure-of-sensitive-infor-2cf024a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58581%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49ca9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58580-cwe-117-improper-output-neutralizat-2c57fd81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58580%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49ca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58578-cwe-770-allocation-of-resources-wit-af7cea9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58578%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20SICK%20AG%20Enterprise%20Analytics&amp;severity=low&amp;id=68e369cfbd6176610b49ca8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9914-cwe-288-authentication-bypass-using--10231a47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9914%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e369cfbd6176610b49cab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9913-cwe-79-improper-neutralization-of-in-087784d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9913%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20Baggage%20Analytics&amp;severity=medium&amp;id=68e366f236c79392d67e7d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11324-stack-based-buffer-overflow-in-tend-54ce98ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11324%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68e366f236c79392d67e7d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11323-buffer-overflow-in-utt-1250gw-2c097f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11323%3A%20Buffer%20Overflow%20in%20UTT%201250GW&amp;severity=high&amp;id=68e35d5084408e5eb7a864a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zimbra-zero-day-exploited-to-target-brazilian-mili-609f5c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zimbra%20Zero-Day%20Exploited%20to%20Target%20Brazilian%20Military%20via%20Malicious%20ICS%20Files&amp;severity=medium&amp;id=68e467466a45552f36e85b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9710-cwe-79-cross-site-scripting-xss-in-r-0ff9e29a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9710%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=68e35d5084408e5eb7a864a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9703-cwe-79-cross-site-scripting-xss-in-u-0822e9d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9703%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ultimate%20Addons%20for%20Elementor%20(Formerly%20Elementor%20Header%20%26%20Footer%20Builder)&amp;severity=medium&amp;id=68e35d5084408e5eb7a864a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11322-weak-password-requirements-in-manga-2d918e72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11322%3A%20Weak%20Password%20Requirements%20in%20Mangati%20NovoSGA&amp;severity=medium&amp;id=68e35731815f0abbc161fe58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57781-uncontrolled-search-path-element-in-e2144a74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57781%3A%20Uncontrolled%20Search%20Path%20Element%20in%20DENSO%20TEN%20Limited.%20Multiple%20installers%20of%20DENSO%20TEN%20drive%20recorder%20viewer&amp;severity=high&amp;id=68e358fa815f0abbc1653e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11321-authorization-bypass-in-zhuimengsha-d69c473d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11321%3A%20Authorization%20Bypass%20in%20zhuimengshaonian%20wisdom-education&amp;severity=medium&amp;id=68e35113b4b904171a8a84bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11320-unrestricted-upload-in-zhuimengshao-64a9933e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11320%3A%20Unrestricted%20Upload%20in%20zhuimengshaonian%20wisdom-education&amp;severity=medium&amp;id=68e34872ef2a4689752637cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11319-sql-injection-in-nahiduddinahammed--935a26c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11319%3A%20SQL%20Injection%20in%20nahiduddinahammed%20Hospital-Management-System-Website&amp;severity=medium&amp;id=68e346c0ef2a46897521b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11318-unrestricted-upload-in-tipray-data--792c18f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11318%3A%20Unrestricted%20Upload%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e33c3494eb61166fa9b94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11317-sql-injection-in-tipray-data-leakag-6af56ead</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11317%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3352b94eb61166fa90df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11316-sql-injection-in-tipray-data-leakag-dff9df4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11316%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e32e2294eb61166fa847af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11315-sql-injection-in-tipray-data-leakag-87a406ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11315%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3271594eb61166fa5265a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11314-sql-injection-in-tipray-data-leakag-eac01e20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11314%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3200d94eb61166fa26433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11313-sql-injection-in-tipray-data-leakag-cb3aae91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11313%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3200d94eb61166fa2642b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11312-sql-injection-in-tipray-data-leakag-e83138a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11312%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3134894eb61166f9d7982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11311-sql-injection-in-tipray-data-leakag-fa93e6c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11311%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e3077c94eb61166f996f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-06-11c57eb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-06&amp;severity=medium&amp;id=68e4594d79fe82f008c9859c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59452-cwe-340-generation-of-predictable-n-d596e95d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59452%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20YoSmart%20YoLink%20API&amp;severity=medium&amp;id=68e422c3315b94cd152517a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59451-cwe-863-incorrect-authorization-in--169d82b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59451%3A%20CWE-863%20Incorrect%20Authorization%20in%20YoSmart%20YoLink%20application&amp;severity=low&amp;id=68e422c3315b94cd1525179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59450-cwe-312-cleartext-storage-of-sensit-cd6c7579</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59450%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20YoSmart%20YoLink%20Smart%20Hub&amp;severity=medium&amp;id=68e422c3315b94cd15251799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59449-cwe-863-incorrect-authorization-in--8ad16fb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59449%3A%20CWE-863%20Incorrect%20Authorization%20in%20YoSmart%20YoLink%20MQTT%20broker&amp;severity=medium&amp;id=68e420ef315b94cd1520a15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59448-cwe-319-cleartext-transmission-of-s-005ffce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59448%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20YoSmart%20YoLink%20ecosystem&amp;severity=medium&amp;id=68e420ef315b94cd1520a156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59447-cwe-497-exposure-of-sensitive-syste-76a29b40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59447%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20YoSmart%20YoLink%20Smart%20Hub&amp;severity=low&amp;id=68e41f4d315b94cd151daa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61985-cwe-158-improper-neutralization-of--db9e4a5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61985%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=68e40c3dcf87aa9c343ce4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61984-cwe-159-improper-handling-of-invali-fdc7bcf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61984%3A%20CWE-159%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20OpenBSD%20OpenSSH&amp;severity=low&amp;id=68e40c3dcf87aa9c343ce4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57515-na-dc581369</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57515%3A%20n%2Fa&amp;severity=critical&amp;id=68e4079864f972a16d6a0ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28129-na-63a75a75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28129%3A%20n%2Fa&amp;severity=medium&amp;id=68e403161c1196eac61ad847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56382-na-0e55c441</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56382%3A%20n%2Fa&amp;severity=medium&amp;id=68e3faeb10d29ec2ec48448a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60963-na-ec534a36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60963%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60962-na-56fee16f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60962%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60961-na-a1456843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60961%3A%20n%2Fa&amp;severity=medium&amp;id=68e3f95810d29ec2ec45cc61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60960-na-038613d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60960%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60959-na-8c12416d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60959%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60958-na-f281ca47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60958%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60957-na-8430085b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60957%3A%20n%2Fa&amp;severity=critical&amp;id=68e3f95810d29ec2ec45cc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60956-na-cc39f320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60956%3A%20n%2Fa&amp;severity=high&amp;id=68e3f95810d29ec2ec45cc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60969-na-bddb5804</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60969%3A%20n%2Fa&amp;severity=medium&amp;id=68e3f641083a44572bca3737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60967-na-6e9a7e5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60967%3A%20n%2Fa&amp;severity=high&amp;id=68e3f641083a44572bca3732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60965-na-e71e9456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60965%3A%20n%2Fa&amp;severity=critical&amp;id=68e3f641083a44572bca372d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60964-na-10cc2da9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60964%3A%20n%2Fa&amp;severity=critical&amp;id=68e3f641083a44572bca3728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57247-na-6b735d10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57247%3A%20n%2Fa&amp;severity=critical&amp;id=68e3ecad3a3ccaa613952b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61224-na-c19a241a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61224%3A%20n%2Fa&amp;severity=medium&amp;id=68e3e6967f1d1774caaf32f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61198-na-7a049191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61198%3A%20n%2Fa&amp;severity=medium&amp;id=68e3ce25fa854abf3926de95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61197-na-9354c197</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61197%3A%20n%2Fa&amp;severity=high&amp;id=68e3ce25fa854abf3926de91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50538-cwe-79-improper-neutralization-of-i-d4004771</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68e3200d94eb61166fa2643e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29192-cwe-79-improper-neutralization-of-i-4ac240e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29192%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68e3200d94eb61166fa26439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11310-sql-injection-in-tipray-data-leakag-03a58d4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11310%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e301c443279ad048c580f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11309-sql-injection-in-tipray-data-leakag-0043119c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11309%3A%20SQL%20Injection%20in%20Tipray%20%E5%8E%A6%E9%97%A8%E5%A4%A9%E9%94%90%E7%A7%91%E6%8A%80%E8%82%A1%E4%BB%BD%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Data%20Leakage%20Prevention%20System%20%E5%A4%A9%E9%94%90%E6%95%B0%E6%8D%AE%E6%B3%84%E9%9C%B2%E9%98%B2%E6%8A%A4%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68e2fba6ec9f95d72e436907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11308-cross-site-scripting-in-vanderlande-f080a8af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11308%3A%20Cross%20Site%20Scripting%20in%20Vanderlande%20Baggage%20360&amp;severity=medium&amp;id=68e2f3a3b3fd695dc7e5d86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11306-cross-site-scripting-in-qianfox-fox-c31003ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11306%3A%20Cross%20Site%20Scripting%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=68e2ed7bb3cc4ef154d59724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cometjacking-prompt-injection-attack-turns-perplex-3598c84f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CometJacking%3A%20Prompt%20Injection%20Attack%20Turns%20Perplexity%E2%80%99s%20Comet%20AI%20Browser%20Into%20a%20Data%20Exfiltration%20Vector&amp;severity=high&amp;id=68e2e7b547833ad03504d801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11305-buffer-overflow-in-utt-hiper-840g-da13cf28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11305%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68e2e6369dfa7c9a8bbe6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11304-permissive-cross-domain-policy-with-0bbc2153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11304%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20CodeCanyon%20Mentor%20LMS&amp;severity=medium&amp;id=68e2df953551304f9c7cf52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11303-command-injection-in-belkin-f9k1015-8cbfd6f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11303%3A%20Command%20Injection%20in%20Belkin%20F9K1015&amp;severity=medium&amp;id=68e2d93a186c081cfc65797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11302-buffer-overflow-in-belkin-f9k1015-666290f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11302%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2d0ccb074b89397637cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11301-buffer-overflow-in-belkin-f9k1015-744d969c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11301%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2c962a8dc79b36dd78b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11300-buffer-overflow-in-belkin-f9k1015-7216a39b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11300%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2c1e2e5b728efc8e2bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11299-buffer-overflow-in-belkin-f9k1015-3b3a4e0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11299%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2bd4453013999795405fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11298-command-injection-in-belkin-f9k1015-fbe46ca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11298%3A%20Command%20Injection%20in%20Belkin%20F9K1015&amp;severity=medium&amp;id=68e2b3a20e7d28f9448242cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11297-buffer-overflow-in-belkin-f9k1015-5fb2ed3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11297%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2adf0fcbc91e1679b440a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11296-buffer-overflow-in-belkin-f9k1015-f89639a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11296%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2a7dd787ae4b4d2635add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11295-buffer-overflow-in-belkin-f9k1015-a81cdec1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11295%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e29f135aee1242a853dcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11294-buffer-overflow-in-belkin-f9k1015-71599fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11294%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e297f66e5daa7007366d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11293-buffer-overflow-in-belkin-f9k1015-d7ee0971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11293%3A%20Buffer%20Overflow%20in%20Belkin%20F9K1015&amp;severity=high&amp;id=68e2901b53ceab86b661a8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parkmobile-pays-1-each-for-2021-data-breach-that-h-4c7f8c78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ParkMobile%20pays...%20%241%20each%20for%202021%20data%20breach%20that%20hit%2022%20million&amp;severity=high&amp;id=68e28bb5dc3a23974dd13e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-in-the-cloud-weaponizing-aws-x-ray-for-comma-588eb599</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20in%20the%20Cloud%3A%20Weaponizing%20AWS%20X-Ray%20for%20Command%20%26%20Control&amp;severity=medium&amp;id=68e28ac5af193d2522a88f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11292-command-injection-in-belkin-f9k1015-cf465a35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11292%3A%20Command%20Injection%20in%20Belkin%20F9K1015&amp;severity=medium&amp;id=68e27c0780a937f685525155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11291-cross-site-scripting-in-ixmaps-webs-b3a2d381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11291%3A%20Cross%20Site%20Scripting%20in%20ixmaps%20website2017&amp;severity=medium&amp;id=68e274eea08882725d27c484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11290-use-of-hard-coded-cryptographic-key-bd3356a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11290%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20CRMEB&amp;severity=medium&amp;id=68e25908f2976755585fea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11289-cross-site-scripting-in-westboy-cic-334916d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11289%3A%20Cross%20Site%20Scripting%20in%20westboy%20CicadasCMS&amp;severity=medium&amp;id=68e24be4a2a916f2cf693f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8917-cwe-22-improper-limitation-of-a-path-91cb7d81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8917%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20allegroai%20allegroai%2Fclearml&amp;severity=medium&amp;id=68e2493884495731131fb050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cometjacking-one-click-can-turn-perplexitys-comet--e258e834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CometJacking%3A%20One%20Click%20Can%20Turn%20Perplexity%E2%80%99s%20Comet%20AI%20Browser%20Into%20a%20Data%20Thief&amp;severity=high&amp;id=68e244d94f6cef8c834198f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-smartbedded-meteobridge-samsung-junip-7d3a448e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Smartbedded%20Meteobridge%2C%20Samsung%2C%20Juniper%20ScreenOS%2C%20Jenkins%2C%20and%20GNU%20Bash%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68e244d94f6cef8c834198fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8406-cwe-22-improper-limitation-of-a-path-fe45de37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8406%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20zenml-io%20zenml-io%2Fzenml&amp;severity=medium&amp;id=68e2361dd6879b519909ecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11288-sql-injection-in-crmeb-7bd19f02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11288%3A%20SQL%20Injection%20in%20CRMEB&amp;severity=medium&amp;id=68e2205a5af94fe5bed218f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/signal-introduces-sparse-post-quantum-ratchet-spqr-7189051c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Signal%20Introduces%20Sparse%20Post-Quantum%20Ratchet%20(SPQR)%20to%20Strengthen%20Encryption%20Against%20Quantum%20Attacks&amp;severity=high&amp;id=68e21dc55af94fe5bec97c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11287-improper-authentication-in-samanhap-5086afc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11287%3A%20Improper%20Authentication%20in%20samanhappy%20MCPHub&amp;severity=medium&amp;id=68e2199b345efa50bd0541f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11286-server-side-request-forgery-in-sama-46f26f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11286%3A%20Server-Side%20Request%20Forgery%20in%20samanhappy%20MCPHub&amp;severity=medium&amp;id=68e21448db3a1fc88804bd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11285-os-command-injection-in-samanhappy--605bc8a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11285%3A%20OS%20Command%20Injection%20in%20samanhappy%20MCPHub&amp;severity=medium&amp;id=68e20c8008606f182c48396b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netherlands-leads-europes-secure-quantum-communica-825a8b92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Netherlands%20Leads%20Europe%E2%80%99s%20Secure%20Quantum%20Communication%20Network%20Initiative&amp;severity=medium&amp;id=68e2075dfeae5fd536c5c47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11284-use-of-hard-coded-password-in-zytec-b53d6454</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11284%3A%20Use%20of%20Hard-coded%20Password%20in%20Zytec%20Dalian%20Zhuoyun%20Technology%20Central%20Authentication%20Service&amp;severity=medium&amp;id=68e204c6feae5fd536bee355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11283-cross-site-scripting-in-frappe-lms-ae15fc50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11283%3A%20Cross%20Site%20Scripting%20in%20Frappe%20LMS&amp;severity=medium&amp;id=68e1fdcc6e243458d9a4d56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11282-cross-site-scripting-in-frappe-lms-26887b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11282%3A%20Cross%20Site%20Scripting%20in%20Frappe%20LMS&amp;severity=medium&amp;id=68e1f7d3e418621140a2e09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11281-improper-access-controls-in-frappe--1f1b74b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11281%3A%20Improper%20Access%20Controls%20in%20Frappe%20LMS&amp;severity=low&amp;id=68e1f3765bfa5e0556990040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11280-direct-request-in-frappe-lms-74d7efc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11280%3A%20Direct%20Request%20in%20Frappe%20LMS&amp;severity=medium&amp;id=68e1ea81930c1d4e7e6b5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61882-easily-exploitable-vulnerability-al-a26af592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61882%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Concurrent%20Processing.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Concurrent%20Processing.%20in%20Oracle%20Corporation%20Oracle%20Concurrent%20Processing&amp;severity=critical&amp;id=68e1e6fe930c1d4e7e6b1149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11279-csv-injection-in-axosoft-scrum-and--44b66dc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11279%3A%20CSV%20Injection%20in%20Axosoft%20Scrum%20and%20Bug%20Tracking&amp;severity=medium&amp;id=68e1e37a930c1d4e7e6ac0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11278-cross-site-scripting-in-allstarlink-11d1fd81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11278%3A%20Cross%20Site%20Scripting%20in%20AllStarLink%20Supermon&amp;severity=medium&amp;id=68e1dc74930c1d4e7e6539eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11277-heap-based-buffer-overflow-in-open--687212e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11277%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=68e1d56e930c1d4e7e61e6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11276-cross-site-scripting-in-rebuild-60aa7f5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11276%3A%20Cross%20Site%20Scripting%20in%20Rebuild&amp;severity=medium&amp;id=68e1ef1f8f93edf234e8c3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11275-heap-based-buffer-overflow-in-open--9dd6d1a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11275%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=68e1c908930c1d4e7e5ce957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11274-allocation-of-resources-in-open-ass-66143806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11274%3A%20Allocation%20of%20Resources%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=68e1bcd1930c1d4e7e3cd5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-05-d395b4ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-05&amp;severity=medium&amp;id=68e30aea94eb61166f9a7c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11273-deserialization-in-lachatterie-verg-fc0de2f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11273%3A%20Deserialization%20in%20LaChatterie%20Verger&amp;severity=medium&amp;id=68e1ab7c6f9dba9571b552ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11272-improper-authorization-in-seriawei--8c9ffbd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11272%3A%20Improper%20Authorization%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68e180348ab2c50a2d2f9909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-data-breach-hackers-access-ids-billing-det-77f17325</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Data%20Breach%3A%20Hackers%20Access%20IDs%2C%20Billing%20Details%20and%20Support%20Chats&amp;severity=high&amp;id=68e14e9c8e3a3ddfb2918873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cometjacking-one-click-can-turn-perplexitys-comet--7bba96bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CometJacking%3A%20One%20Click%20Can%20Turn%20Perplexity%E2%80%99s%20Comet%20AI%20Browser%20Into%20a%20Data%20Thief&amp;severity=medium&amp;id=68e467466a45552f36e85b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-study-warns-several-free-ios-and-android-vpn-a-63f1987b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Study%20Warns%20Several%20Free%20iOS%20and%20Android%20VPN%20Apps%20Use%20Outdated%20Software%20and%20Leak%20User%20Data&amp;severity=medium&amp;id=68e119f5cd0b9d70e0a90a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-stealer-evolves-adds-device-fingerpri-0edbd286</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20Stealer%20Evolves%3A%20Adds%20Device%20Fingerprinting%2C%20PNG%20Steganography%20Payloads&amp;severity=high&amp;id=68e10bc4535c69599fe5451d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detour-dog-caught-running-dns-powered-malware-fact-0e1ac8d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detour%20Dog%20Caught%20Running%20DNS-Powered%20Malware%20Factory%20for%20Strela%20Stealer&amp;severity=high&amp;id=68e10bc4535c69599fe54519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-launches-data-leak-site-trinity-of-ch-5ac7b779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20Launches%20Data%20Leak%20Site%3A%20Trinity%20of%20Chaos%20Announces%20New%20Ransomware%20Victims&amp;severity=medium&amp;id=68e10bc4535c69599fe54525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-activity-on-palo-alto-networks-portals-ju-c1dfde7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Activity%20on%20Palo%20Alto%20Networks%20Portals%20Jump%20500%25%20in%20One%20Day&amp;severity=high&amp;id=68e467466a45552f36e85b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yurei-ransomware-the-digital-ghost-79f1c1ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=YUREI%20RANSOMWARE%3A%20THE%20DIGITAL%20GHOST&amp;severity=medium&amp;id=68e3772bc6adcde93497d5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ved-2026-after-cfi-data-only-2ddd9097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VED%202026%3A%20after%20CFI%20-%20data%20only&amp;severity=medium&amp;id=68e0a417cc3aa38dabff730d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9886-cwe-352-cross-site-request-forgery-c-e29e62c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9886%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68e0990b11971642e85c3bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10383-cwe-79-improper-neutralization-of-i-3aa2a0c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%20%26%20Sell%20with%20PayPal%20and%20Stripe&amp;severity=medium&amp;id=68e0990b11971642e85c3bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9952-cwe-79-improper-neutralization-of-in-c0d9d57a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9952%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergiotrinity%20Trinity%20Audio%20%E2%80%93%20Text%20to%20Speech%20AI%20audio%20player%20to%20convert%20content%20into%20audio&amp;severity=medium&amp;id=68e0990b11971642e85c3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9029-cwe-862-missing-authorization-in-pos-11cad23d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9029%3A%20CWE-862%20Missing%20Authorization%20in%20posimyththemes%20WDesignKit%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Starter%20Templates%2C%20Patterns%2C%20Cloud%20Workspace%20%26%20Widget%20Builder&amp;severity=medium&amp;id=68e0877c11971642e85b3476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9030-cwe-79-improper-neutralization-of-in-461642b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9030%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maneshtimilsina%20Majestic%20Before%20After%20Image&amp;severity=medium&amp;id=68e0877c11971642e85b347a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11228-cwe-862-missing-authorization-in-gi-79cdfe3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11228%3A%20CWE-862%20Missing%20Authorization%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=68e0877c11971642e85b346c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9485-cwe-347-improper-verification-of-cry-bc151e9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9485%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=critical&amp;id=68e0877c11971642e85b3483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10746-cwe-306-missing-authentication-for--0d66501c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10746%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20cyberlord92%20Integrate%20Dynamics%20365%20CRM&amp;severity=medium&amp;id=68e0877c11971642e85b345e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9243-cwe-862-missing-authorization-in-sty-060a8350</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9243%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=high&amp;id=68e0877c11971642e85b347e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8726-cwe-79-improper-neutralization-of-in-35c08650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=medium&amp;id=68e0877c11971642e85b3471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11227-cwe-285-improper-authorization-in-g-b992f2b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11227%3A%20CWE-285%20Improper%20Authorization%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=68e0877c11971642e85b3464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10751-cwe-732-incorrect-permission-assign-c646c6a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10751%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20MacEnhance%20MacForge&amp;severity=high&amp;id=68e0701f11971642e85862e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-04-385aa968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-04&amp;severity=medium&amp;id=68e1b8629540e595d5924d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61685-cwe-548-exposure-of-information-thr-ecb71101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61685%3A%20CWE-548%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20mastra-ai%20mastra&amp;severity=medium&amp;id=68e065e211971642e8580b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61681-cwe-79-improper-neutralization-of-i-3e497a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61681%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xuemian168%20kuno&amp;severity=medium&amp;id=68e045c4d49c5616e17c79ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61680-cwe-256-plaintext-storage-of-a-pass-8469008c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61680%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20jaketcooper%20Minecraft-rcon&amp;severity=medium&amp;id=68e04324a707627a15869645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61679-cwe-200-exposure-of-sensitive-infor-03b8b275</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61679%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20julien040%20anyquery&amp;severity=high&amp;id=68e0416dfe629daf7734019d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61677-cwe-502-deserialization-of-untruste-86257465</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61677%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20iterative%20datachain&amp;severity=low&amp;id=68e03fb9048a557269cb688e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43825-cwe-201-insertion-of-sensitive-info-6e5b5731</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43825%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68e03dfd61cc5255ff0f5c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61673-cwe-306-missing-authentication-for--0ab876ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61673%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Aiven-Open%20karapace&amp;severity=high&amp;id=68e03dfe61cc5255ff0f5c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59943-cwe-286-incorrect-user-management-i-5f22e24f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59943%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20thorsten%20phpMyFAQ&amp;severity=high&amp;id=68e036d86594606488593572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59829-cwe-61-unix-symbolic-link-symlink-f-5727afe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59829%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20anthropics%20claude-code&amp;severity=low&amp;id=68e02d46436ecd09b3607b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54374-cwe-94-improper-control-of-generati-9dba0c32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54374%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mayneyao%20eidos&amp;severity=high&amp;id=68e02d46436ecd09b3607b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53354-cwe-79-improper-neutralization-of-i-2369fdc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53354%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zauberzeug%20nicegui&amp;severity=medium&amp;id=68e0255f54e6f846175538d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-returns-with-salesforce-l-cda2b007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Returns%20With%20Salesforce%20Leak%20Site&amp;severity=medium&amp;id=68e469f16a45552f36e9070d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dutch-authorities-arrest-two-teens-for-alleged-pro-d2ed845e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dutch%20Authorities%20Arrest%20Two%20Teens%20for%20Alleged%20Pro-Russian%20Espionage&amp;severity=medium&amp;id=68e469f16a45552f36e90710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52656-cwe-915-in-hcl-hcl-myxalytics-2b3445a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52656%3A%20CWE-915%20in%20HCL%20HCL%20MyXalytics&amp;severity=high&amp;id=68e014ac1485ec6038e2a7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52658-hcl-myxalytics-product-is-affected--62b843a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52658%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20HCL%20Software%20MyXalytics&amp;severity=low&amp;id=68e014ac1485ec6038e2a7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57714-cwe-428-in-qnap-systems-inc-netbak--f67d8e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57714%3A%20CWE-428%20in%20QNAP%20Systems%20Inc.%20NetBak%20Replicator&amp;severity=high&amp;id=68e014ae1485ec6038e2a85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54154-cwe-287-in-qnap-systems-inc-qnap-au-614becc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54154%3A%20CWE-287%20in%20QNAP%20Systems%20Inc.%20QNAP%20Authenticator&amp;severity=medium&amp;id=68e014ad1485ec6038e2a835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54153-cwe-89-in-qnap-systems-inc-qsync-ce-43f4ee93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54153%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014ad1485ec6038e2a832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53595-cwe-89-in-qnap-systems-inc-qsync-ce-0cee0c02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53595%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014ad1485ec6038e2a82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53407-cwe-134-in-qnap-systems-inc-qts-41ea1916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53407%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53406-cwe-134-in-qnap-systems-inc-qts-ac6c98f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53406%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52867-cwe-400-in-qnap-systems-inc-qsync-c-5fc0e043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52867%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014ad1485ec6038e2a826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52866-cwe-476-in-qnap-systems-inc-qts-41af9e0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52866%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52862-cwe-476-in-qnap-systems-inc-qts-2aca512e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52862%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52860-cwe-476-in-qnap-systems-inc-qts-98456c53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52860%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52859-cwe-476-in-qnap-systems-inc-qts-edbe07ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52859%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ad1485ec6038e2a81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52858-cwe-476-in-qnap-systems-inc-qts-2987cbd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52858%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52857-cwe-476-in-qnap-systems-inc-qts-61d22eee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52857%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52855-cwe-476-in-qnap-systems-inc-qts-663aef7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52855%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52854-cwe-476-in-qnap-systems-inc-qts-5c197270</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52854%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52853-cwe-476-in-qnap-systems-inc-qts-5e4916d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52853%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52433-cwe-476-in-qnap-systems-inc-qts-4a6debe9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52433%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52432-cwe-476-in-qnap-systems-inc-qts-24452570</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52432%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52429-cwe-134-in-qnap-systems-inc-qts-29dfef64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52429%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52654-cwe-80-in-hcl-hcl-myxalytics-34e05753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52654%3A%20CWE-80%20in%20HCL%20Software%20HCL%20MyXalytics&amp;severity=medium&amp;id=68e014ac1485ec6038e2a7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52428-cwe-476-in-qnap-systems-inc-qts-50cc4803</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52428%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52427-cwe-476-in-qnap-systems-inc-qts-72c2233d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52427%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52424-cwe-476-in-qnap-systems-inc-qts-34c15b2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52424%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48730-cwe-134-in-qnap-systems-inc-qts-1486a2fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48730%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48729-cwe-476-in-qnap-systems-inc-qts-e7f554ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48729%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48728-cwe-476-in-qnap-systems-inc-qts-bd4b1551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48728%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48727-cwe-476-in-qnap-systems-inc-qts-2cc51470</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48727%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48726-cwe-476-in-qnap-systems-inc-qts-bdcac577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48726%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47214-cwe-476-in-qnap-systems-inc-qts-a0e39e8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47214%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47213-cwe-476-in-qnap-systems-inc-qts-0fee9eb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47213%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47212-cwe-78-in-qnap-systems-inc-qts-7f196fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47212%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014ab1485ec6038e2a765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47211-cwe-22-in-qnap-systems-inc-qts-164d6b10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47211%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68e014aa1485ec6038e2a762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47210-cwe-476-in-qnap-systems-inc-qsync-c-d786d123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47210%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44014-cwe-787-in-qnap-systems-inc-qsync-c-f2b66b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44014%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014aa1485ec6038e2a75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44012-cwe-770-in-qnap-systems-inc-qsync-c-9fb8433e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44012%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e014aa1485ec6038e2a759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44011-cwe-476-in-qnap-systems-inc-qsync-c-007ccaac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44011%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44010-cwe-476-in-qnap-systems-inc-qsync-c-a53e75cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44010%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44009-cwe-476-in-qnap-systems-inc-qsync-c-f4beb7e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44009%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44008-cwe-476-in-qnap-systems-inc-qsync-c-e74385e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44008%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e014aa1485ec6038e2a74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44007-cwe-770-in-qnap-systems-inc-qsync-c-54377676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44007%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44006-cwe-770-in-qnap-systems-inc-qsync-c-8d6f1e67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44006%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33040-cwe-770-in-qnap-systems-inc-qsync-c-5001e0cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33040%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33039-cwe-770-in-qnap-systems-inc-qsync-c-16e427c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33039%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68e065e211971642e8580b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33034-cwe-22-in-qnap-systems-inc-qsync-ce-ab82624c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33034%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68e065e211971642e8580b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56804-cwe-89-in-qnap-systems-inc-video-st-ce0ab9ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56804%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Video%20Station&amp;severity=medium&amp;id=68e0f3bdb66c7f7acdd3cb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52653-cwe-79-improper-neutralization-of-i-fba0ef79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20HCL%20MyXalytics&amp;severity=high&amp;id=68e01811b494e59f8222abeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-claim-salesforce-breach-1-d0ccf5df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20LAPSUS%24%20Hunters%20Claim%20Salesforce%20Breach%2C%201%20Billion%20Records%2C%2039%20Firms%20Listed&amp;severity=high&amp;id=68e00fb8acc68196644c0d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-exposure-of-180000-icsot-devices-raises-saf-b510fa3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Exposure%20of%20180%2C000%20ICS%2FOT%20Devices%20Raises%20Safety%20Concerns&amp;severity=medium&amp;id=68dff7792528db188ec74d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phoenix-rowhammer-that-works-on-ddr5-kaspersky-off-d1e132ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phoenix%3A%20Rowhammer%20that%20works%20on%20DDR5%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e95747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-stealer-evolves-adds-device-fingerpri-5ddd26f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%20Stealer%20Evolves%3A%20Adds%20Device%20Fingerprinting%2C%20PNG%20Steganography%20Payloads&amp;severity=medium&amp;id=68e467466a45552f36e85b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prospy-tospy-malware-pose-as-signal-and-totok-to-s-a5759593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ProSpy%2C%20ToSpy%20malware%20pose%20as%20Signal%20and%20ToTok%20to%20steal%20data%20in%20UAE&amp;severity=medium&amp;id=68dfee6388368ae77cfd5740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34226-cwe-664-improper-control-of-a-resou-348d4fac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34226%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20Its%20Lifetime%20in%20Autonomy%20Logic%20OpenPLC%20Runtime&amp;severity=high&amp;id=68dfee6e88368ae77cfd5805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-shows-cyberattacks-mean-bad-busi-fb31ebc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20Shows%20Cyberattacks%20Mean%20(Bad)%20Business&amp;severity=high&amp;id=68e469f16a45552f36e90713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cavalry-werewolf-attack-hits-russian-agencies--f7f967b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Cavalry%20Werewolf%22%20Attack%20Hits%20Russian%20Agencies%20with%20FoalShell%20and%20StallionRAT&amp;severity=high&amp;id=68dfe2a3e5c3f9235f449a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-self-spreading-whatsapp-malwar-71df1bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20of%20Self-Spreading%20WhatsApp%20Malware%20Named%20SORVEPOTEL&amp;severity=high&amp;id=68dfe1c908664d267fd05eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oracle-links-clop-extortion-attacks-to-july-2025-v-90d1b681</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oracle%20links%20Clop%20extortion%20attacks%20to%20July%202025%20vulnerabilities&amp;severity=high&amp;id=68dfe1c908664d267fd05ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10729-cwe-416-use-after-free-in-the-qt-co-82ba4b55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10729%3A%20CWE-416%20Use%20After%20Free%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68dfe1e808664d267fd061f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10728-cwe-674-uncontrolled-recursion-in-t-72d02fb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10728%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20The%20Qt%20Company%20Qt&amp;severity=critical&amp;id=68dfe0218ea44fea9ba2abad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/in-other-news-pqc-adoption-new-android-spyware-fem-8e5671b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=In%20Other%20News%3A%20PQC%20Adoption%2C%20New%20Android%20Spyware%2C%20FEMA%20Data%20Breach&amp;severity=medium&amp;id=68e46d046a45552f36e94aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bci-the-stuff-of-nightmares-or-dreams-8a7a3130</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BCI%3A%20The%20Stuff%20of%20Nightmares%20or%20Dreams%3F&amp;severity=medium&amp;id=68e469f16a45552f36e90716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsofts-voice-clone-becomes-scary-amp-unsalvage-84c59e50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft&apos;s%20Voice%20Clone%20Becomes%20Scary%20%26amp%3B%20Unsalvageable&amp;severity=medium&amp;id=68e469f16a45552f36e9071c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-8099-hijacks-reputable-sites-for-seo-fraud-amp-9766e128</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-8099%20Hijacks%20Reputable%20Sites%20for%20SEO%20Fraud%20%26amp%3B%20Theft&amp;severity=low&amp;id=68e469f16a45552f36e90719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cl0p-linked-gang-attempts-to-extort-oracle-e-busin-2f44d751</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cl0p-Linked%20Gang%20Attempts%20to%20Extort%20Oracle%20E-Business%20Customers&amp;severity=medium&amp;id=68dfc112cf1c65c05d2f19d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10609-cwe-798-use-of-hard-coded-credentia-d8560fdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10609%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Logo%20Software%20Inc.%20TigerWings%20ERP&amp;severity=medium&amp;id=68dfbe870a619476430d35c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unauthenticated-rce-flaw-patched-in-draytek-router-284925c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unauthenticated%20RCE%20Flaw%20Patched%20in%20DrayTek%20Routers&amp;severity=medium&amp;id=68e46d046a45552f36e94aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10547-cwe-456-in-draytek-corporation-vigo-9615ded5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10547%3A%20CWE-456%3A%20Missing%20Initialization%20of%20a%20Variable%20in%20DrayTek%20Corporation%20Vigor1000B&amp;severity=critical&amp;id=68dfb5c496307f28cda31bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/product-walkthrough-how-passwork-7-addresses-compl-542946e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Product%20Walkthrough%3A%20How%20Passwork%207%20Addresses%20Complexity%20of%20Enterprise%20Security&amp;severity=medium&amp;id=68e467466a45552f36e85b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0876-cwe-79-improper-neutralization-of-in-a51f3ed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Isin%20Basi%20Advertisement%20Information%20Technologies%20Trade%20Inc.%20IT&apos;s%20Workif&amp;severity=medium&amp;id=68dfb41981bced3a3cd42366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10302-cwe-352-cross-site-request-forgery--b0d478f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10302%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hameha%20Ultimate%20Viral%20Quiz&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10165-cwe-79-improper-neutralization-of-i-f1e7bb84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10165%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hovanesvn%20AP%20Background&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9897-cwe-352-cross-site-request-forgery-c-697c9914</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9897%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hovanesvn%20AP%20Background&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9212-cwe-434-unrestricted-upload-of-file--e1eb74cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9212%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ekndev%20WP%20Dispatcher&amp;severity=high&amp;id=68dfb275c3835a5fbe033c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9561-cwe-434-unrestricted-upload-of-file--7fd2cdcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9561%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hovanesvn%20AP%20Background&amp;severity=high&amp;id=68dfb276c3835a5fbe033c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9194-cwe-862-missing-authorization-in-ant-07a6df96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9194%3A%20CWE-862%20Missing%20Authorization%20in%20antonshevchuk%20Constructor&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9204-cwe-79-improper-neutralization-of-in-16cf153e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9129-cwe-79-improper-neutralization-of-in-df98051f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20odude%20Flexi%20%E2%80%93%20Guest%20Submit&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7825-cwe-96-improper-neutralization-of-di-49358ca1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7825%3A%20CWE-96%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20wpt00ls%20Schema%20Plugin%20For%20Divi%2C%20Gutenberg%20%26%20Shortcodes&amp;severity=medium&amp;id=68dfb275c3835a5fbe033bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9895-cwe-352-cross-site-request-forgery-c-82cb300a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9895%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20umarbajwa%20Notification%20Bar&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9858-cwe-79-improper-neutralization-of-in-90dc3fa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mtoolstec%20Auto%20Bulb%20Finder%20for%20WordPress&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9630-cwe-352-cross-site-request-forgery-c-eaf0706c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9630%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samueljesse%20WP%20SinoType&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10582-cwe-89-improper-neutralization-of-s-5cc33512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10582%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ekndev%20WP%20Dispatcher&amp;severity=high&amp;id=68dfb274c3835a5fbe033be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9889-cwe-352-cross-site-request-forgery-c-db8a7a20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9889%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20contentmx%20ContentMX%20Content%20Publisher&amp;severity=medium&amp;id=68dfb277c3835a5fbe033caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8669-cwe-352-cross-site-request-forgery-c-62dc9f1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8669%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pressmaximum%20Customify&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9859-cwe-79-improper-neutralization-of-in-43a6f4a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ambitioncloud%20Fintelligence%20Calculator&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8776-cwe-79-improper-neutralization-of-in-0f368528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mikemayhem3030%20Epic%20Bootstrap%20Buttons&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9372-cwe-79-improper-neutralization-of-in-6a6c7559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9372%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Ultimate%20Multi%20Design%20Video%20Carousel&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9200-cwe-89-improper-neutralization-of-sp-c026e78f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9200%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nebelhorn%20Blappsta%20Mobile%20App%20Plugin%20%E2%80%93%20Your%20native%2C%20mobile%20iPhone%20App%20and%20Android%20App&amp;severity=high&amp;id=68dfb275c3835a5fbe033c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9892-cwe-352-cross-site-request-forgery-c-3211d92c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9892%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devrix%20Restrict%20User%20Registration&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9199-cwe-89-improper-neutralization-of-sp-2898010c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9199%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Woo%20superb%20slideshow%20transition%20gallery%20with%20random%20effect&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10309-cwe-352-cross-site-request-forgery--3a603745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10309%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bsmye%20PayPal%20Forms&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10053-cwe-79-improper-neutralization-of-i-8d0f9464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20exlac%20TableGen%20%E2%80%93%20Data%20Table%20Generator&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9206-cwe-79-improper-neutralization-of-in-6a9ce5c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mekshq%20Meks%20Easy%20Maps&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9080-cwe-79-improper-neutralization-of-in-f2e04a8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdevs%20Generic%20Elements&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9854-cwe-79-improper-neutralization-of-in-f1f3ccfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piupiiu%20A%20Simple%20Multilanguage%20Plugin&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9945-cwe-352-cross-site-request-forgery-c-92ba89c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9945%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aryadhiratara%20Optimize%20More!%20%E2%80%93%20CSS&amp;severity=medium&amp;id=68dfb277c3835a5fbe033cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10306-cwe-73-external-control-of-file-nam-fe014aad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10306%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20backupbolt%20Backup%20Bolt&amp;severity=low&amp;id=68dfb274c3835a5fbe033bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10192-cwe-79-improper-neutralization-of-i-61166f47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10192%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20muhammad-rehman%20WP%20Photo%20Effects&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9884-cwe-352-cross-site-request-forgery-c-2015adc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9884%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webdevabq%20Mobile%20Site%20Redirect&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9077-cwe-79-improper-neutralization-of-in-f57d91a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultrapressorg%20Ultra%20Addons%20Lite%20for%20Elementor&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7721-cwe-98-improper-control-of-filename--4666f970</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7721%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beardev%20JoomSport%20%E2%80%93%20for%20Sports%3A%20Team%20%26%20League%2C%20Football%2C%20Hockey%20%26%20more&amp;severity=critical&amp;id=68dfb275c3835a5fbe033bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9332-cwe-79-improper-neutralization-of-in-919f0c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9332%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clickanatomy%20Interactive%20Human%20Anatomy%20with%20Clickable%20Body%20Parts&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9876-cwe-79-improper-neutralization-of-in-ce4ec567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inforrada%20Ird%20Slider&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9875-cwe-79-improper-neutralization-of-in-551cb3f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ticketspot%20Event%20Tickets%2C%20RSVPs%2C%20Calendar&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9198-cwe-89-improper-neutralization-of-sp-a8e45a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9198%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopi_plus%20Wp%20cycle%20text%20announcement&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9286-cwe-620-unverified-password-change-i-b1e65ee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9286%3A%20CWE-620%20Unverified%20Password%20Change%20in%20hancock11%20Appy%20Pie%20Connect%20for%20WooCommerce&amp;severity=critical&amp;id=68dfb275c3835a5fbe033c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9209-cwe-200-exposure-of-sensitive-inform-cf6f0b22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9209%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20magnigenie%20RestroPress%20%E2%80%93%20Online%20Food%20Ordering%20System&amp;severity=critical&amp;id=68dfb275c3835a5fbe033c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9885-cwe-352-cross-site-request-forgery-c-0bcc822d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9885%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20laudanumsoft%20MPWizard%20%E2%80%93%20Create%20Mercado%20Pago%20Payment%20Links&amp;severity=medium&amp;id=68dfb276c3835a5fbe033c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9333-cwe-79-improper-neutralization-of-in-63a1b185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibachal%20Smart%20Docs&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9130-cwe-79-improper-neutralization-of-in-70e2f381</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeclouds%20Unify&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10726-cwe-89-improper-neutralization-of-s-2adcc4f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10726%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quantumrose%20WPRecovery&amp;severity=critical&amp;id=68dfb274c3835a5fbe033be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10311-cwe-352-cross-site-request-forgery--66837dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10311%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tom_riddle%20Comment%20Info%20Detector&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9045-cwe-79-improper-neutralization-of-in-a3b9b8ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=medium&amp;id=68dfb275c3835a5fbe033c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10212-cwe-862-missing-authorization-in-si-fa7fb0da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10212%3A%20CWE-862%20Missing%20Authorization%20in%20sitealert%20SiteAlert%20(Formerly%20WP%20Health)&amp;severity=medium&amp;id=68dfb274c3835a5fbe033bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11234-use-after-free-in-red-hat-red-hat-e-faf9aa3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11234%3A%20Use%20After%20Free&amp;severity=high&amp;id=68dff4bbf049963e8ab8ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cavalry-werewolf-attack-hits-russian-agencies--5211fa67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%22Cavalry%20Werewolf%22%20Attack%20Hits%20Russian%20Agencies%20with%20FoalShell%20and%20StallionRAT&amp;severity=medium&amp;id=68e467466a45552f36e85b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6388-cwe-288-authentication-bypass-using--2aa8b1a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6388%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Theme-Spirit%20Spirit%20Framework&amp;severity=critical&amp;id=68df8882bb515cfcaa844c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-flags-meteobridge-cve-2025-4008-flaw-as-activ-674bac78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Flags%20Meteobridge%20CVE-2025-4008%20Flaw%20as%20Actively%20Exploited%20in%20the%20Wild&amp;severity=high&amp;id=68e467466a45552f36e85b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0616-cwe-89-improper-neutralization-of-sp-9dfe8429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0616%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Teknolojik%20Center%20Telecommunication%20Industry%20Trade%20Co.%20Ltd.%20B2B%20-%20Netsis%20Panel&amp;severity=high&amp;id=68df8882bb515cfcaa844c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11223-cwe-427-uncontrolled-search-path-el-058b7351</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11223%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Panasonic%20AutoDownloader&amp;severity=high&amp;id=68dff2c6bb74e9a7597c18dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59536-cwe-94-improper-control-of-generati-4e5a9c46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59536%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68df70b3322c599a48f0ae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59489-arbitrary-code-execution-in-unity-r-01fe00c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59489%3A%20Arbitrary%20Code%20Execution%20in%20Unity%20Runtime&amp;severity=medium&amp;id=68df5b034d2ee9b526abb806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/confucius-espionage-from-stealer-to-backdoor-38bf8b1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Confucius%20Espionage%3A%20From%20Stealer%20to%20Backdoor&amp;severity=medium&amp;id=68df908a0c40395553ed9975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59300-cwe-787-out-of-bounds-write-in-delt-45b0eca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59300%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59299-cwe-787-out-of-bounds-write-in-delt-90126031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59299%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59298-cwe-787-out-of-bounds-write-in-delt-1e2a7fe4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59298%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59297-cwe-787-out-of-bounds-write-in-delt-6557fff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59297%3A%20CWE-787%20Out-Of-Bounds%20Write%20in%20Delta%20Electronics%20DIAScreen&amp;severity=medium&amp;id=68df399e0005234f78fa5e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11241-cwe-80-improper-neutralization-of-s-98e6f6b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11241%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Yoast%20SEO%20Premium&amp;severity=medium&amp;id=68df32960005234f78fa30e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-03-88746b7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-03&amp;severity=medium&amp;id=68e0644b11971642e857a1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56551-na-c67197dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56551%3A%20n%2Fa&amp;severity=high&amp;id=68e003289ea10347bcc22d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55972-na-ecfdd028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55972%3A%20n%2Fa&amp;severity=high&amp;id=68dffc4fb7ee07964d95f622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60450-na-73f98480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60450%3A%20n%2Fa&amp;severity=medium&amp;id=68dff1cb58033f1b088a766a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60445-na-26bf56fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60445%3A%20n%2Fa&amp;severity=medium&amp;id=68dff1cb58033f1b088a7667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57423-na-9b961ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57423%3A%20n%2Fa&amp;severity=medium&amp;id=68dfeca493c3f6f177228e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55971-na-7988ed62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55971%3A%20n%2Fa&amp;severity=medium&amp;id=68dfe45063749ed1da7ba4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60787-na-d4ea20b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60787%3A%20n%2Fa&amp;severity=high&amp;id=68dfe1e808664d267fd061fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60449-na-e0ace1a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60449%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd89ea59dbcde03c0fdca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60447-na-e5532c17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60447%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd89ea59dbcde03c0fdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60448-na-f9cd1234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60448%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd6f4d911b0b97de3963f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60454-na-0ba4aa9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60454%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a84239e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60453-na-986289f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60453%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a84239b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60452-na-70a59b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60452%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a842398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60451-na-03b999d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60451%3A%20n%2Fa&amp;severity=medium&amp;id=68dfd2c47375cad79a842395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61668-cwe-476-null-pointer-dereference-in-03ae1dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61668%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20plone%20volto&amp;severity=high&amp;id=68def32ca247cd72dfc01a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61600-cwe-400-uncontrolled-resource-consu-e31e33e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61600%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20stalwartlabs%20stalwart&amp;severity=high&amp;id=68def0bad9a6bc6009193265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/renault-uk-alerts-customers-after-third-party-data-081c0ade</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Renault%20UK%20Alerts%20Customers%20After%20Third-Party%20Data%20Breach&amp;severity=high&amp;id=68deebd682b55c8660b6182b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61665-cwe-287-improper-authentication-in--35787790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61665%3A%20CWE-287%3A%20Improper%20Authentication%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68df13500005234f78f7269e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61606-cwe-601-url-redirection-to-untruste-0b7879d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61606%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68df13500005234f78f726a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54089-vulnerability-in-absolute-security--2163feed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54089%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68df13500005234f78f726b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61605-cwe-89-improper-neutralization-of-s-ef349190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61605%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68df13500005234f78f726b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54088-vulnerability-in-absolute-security--0b46eb48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54088%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68df13500005234f78f726ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61604-cwe-352-cross-site-request-forgery--f136085a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61604%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68df13500005234f78f726aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54087-vulnerability-in-absolute-security--91e9ccc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54087%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=low&amp;id=68df13500005234f78f726b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10653-cwe-288-in-raise3d-pro2-series-0fc318e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10653%3A%20CWE-288%20in%20Raise3D%20Pro2%20Series&amp;severity=high&amp;id=68df13500005234f78f726a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54086-vulnerability-in-absolute-security--d64d980a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54086%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68deda8d0830ba3f196a998a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61603-cwe-89-improper-neutralization-of-s-447d79a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61603%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68ded8e1d3babf1bddf68a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61595-cwe-400-uncontrolled-resource-consu-5039ac78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61595%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20MANTRA-Chain%20mantrachain&amp;severity=high&amp;id=68ded665257559930e8ffe03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-confirms-security-incident-after-hackers-b-667099dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20confirms%20security%20incident%20after%20hackers%20breach%20GitLab%20instance&amp;severity=high&amp;id=68decedb2a4fb8c5550cfe00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/confucius-hackers-hit-pakistan-with-new-wooperstea-23d92d62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Confucius%20Hackers%20Hit%20Pakistan%20With%20New%20WooperStealer%20and%20Anondoor%20Malware&amp;severity=high&amp;id=68decedb2a4fb8c5550cfe04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59835-cwe-23-relative-path-traversal-in-l-ac592181</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59835%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20langbot-app%20LangBot&amp;severity=high&amp;id=68dece099604eca2c589acfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/despite-more-cves-cyber-insurers-arent-altering-po-3bce7034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Despite%20More%20CVEs%2C%20Cyber%20Insurers%20Aren&apos;t%20Altering%20Policies&amp;severity=medium&amp;id=68e469f16a45552f36e9071f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/for-one-nfl-team-tackling-cyber-threats-is-basic-d-78f50e21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=For%20One%20NFL%20Team%2C%20Tackling%20Cyber%20Threats%20Is%20Basic%20Defense&amp;severity=medium&amp;id=68e469f16a45552f36e90722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-spyware-campaigns-target-privacy-conscious-and-08df66e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20spyware%20campaigns%20target%20privacy-conscious%20Android%20users%20in%20the%20UAE&amp;severity=medium&amp;id=68deaab857ef7b252d27f356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34210-cwe-256-plaintext-storage-of-a-pass-25d853ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34210%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68dea7707d138d8f7b8e83a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34208-cwe-327-use-of-a-broken-or-risky-cr-03a318e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34208%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68dea7707d138d8f7b8e83a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-investigates-widespread-breach-of-private--98f583e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20Investigates%20Widespread%20Breach%20of%20Private%20GitLab%20Repositories&amp;severity=medium&amp;id=68e469f16a45552f36e90739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-bug-triggers-erroneous-bios-upd-0fb61857</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20bug%20triggers%20erroneous%20BIOS%20update%20alerts&amp;severity=high&amp;id=68de989168392835ef667d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uat-8099-chinese-speaking-cybercrime-group-targets-46e8c5b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UAT-8099%3A%20Chinese-speaking%20cybercrime%20group%20targets%20high-value%20IIS%20for%20SEO%20fraud&amp;severity=medium&amp;id=68dea28f74e254631608624d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59774-cwe-79-improper-neutralization-of-i-8d463547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de921a9b49700e4c2875fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59773-cwe-79-improper-neutralization-of-i-23a47fe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59773%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de921a9b49700e4c2875fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59772-cwe-79-improper-neutralization-of-i-18686275</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59772%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de921a9b49700e4c2875f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59771-cwe-79-improper-neutralization-of-i-9b9aadb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59771%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59770-cwe-79-improper-neutralization-of-i-884249a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59769-cwe-79-improper-neutralization-of-i-7e8bb7c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59768-cwe-79-improper-neutralization-of-i-e19d1c8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9076d3a86bc5231afbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59767-cwe-79-improper-neutralization-of-i-d4ae2c4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59766-cwe-79-improper-neutralization-of-i-a66235e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59765-cwe-79-improper-neutralization-of-i-6a10d5a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59764-cwe-79-improper-neutralization-of-i-562e2a63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59763-cwe-79-improper-neutralization-of-i-dc53c98a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59762-cwe-79-improper-neutralization-of-i-28e12f2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59762%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59761-cwe-79-improper-neutralization-of-i-be289dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59760-cwe-79-improper-neutralization-of-i-e6cbca93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59759-cwe-79-improper-neutralization-of-i-2a00400b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59758-cwe-79-improper-neutralization-of-i-75e49c93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59757-cwe-79-improper-neutralization-of-i-6e0a4b5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8eda779290c94ba70b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59756-cwe-79-improper-neutralization-of-i-65f12f89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59755-cwe-79-improper-neutralization-of-i-2fa06806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59754-cwe-79-improper-neutralization-of-i-0e0cd476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59753-cwe-79-improper-neutralization-of-i-fe1dee1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59752-cwe-79-improper-neutralization-of-i-3f8bf326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59751-cwe-79-improper-neutralization-of-i-19b92c93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59750-cwe-79-improper-neutralization-of-i-727be281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de8edb779290c94ba70b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59749-cwe-79-improper-neutralization-of-i-74d932b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59748-cwe-79-improper-neutralization-of-i-4084824a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59747-cwe-79-improper-neutralization-of-i-313d5861</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59746-cwe-79-improper-neutralization-of-i-77f42154</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59745-cwe-327-use-of-a-broken-or-risky-cr-9ba18010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59745%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AndSoft%20e-TMS&amp;severity=medium&amp;id=68de9f650cc3618ea8d681b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59744-cwe-22-improper-limitation-of-a-pat-ba425756</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59744%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20AndSoft%20e-TMS&amp;severity=high&amp;id=68de8a13d034459bbdfb0c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59743-cwe-89-improper-neutralization-of-s-2174188f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de8a13d034459bbdfb0c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59742-cwe-89-improper-neutralization-of-s-645a39f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59742%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de8a13d034459bbdfb0c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59741-cwe-77-improper-neutralization-of-s-50399d99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59741%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de8a13d034459bbdfb0c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-well-known-scans-thu-oct-2nd-a9276f54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20.well-known%20Scans%2C%20(Thu%2C%20Oct%202nd)&amp;severity=medium&amp;id=68e46e546a45552f36e9696e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59740-cwe-77-improper-neutralization-of-s-593464b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59740%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20-yolink-iot-gateway-vulnerabilities-put-home-sec-52f92b14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%2420%20YoLink%20IoT%20Gateway%20Vulnerabilities%20Put%20Home%20Security%20at%20Risk&amp;severity=medium&amp;id=68de87821199a3d5d3438b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59739-cwe-77-improper-neutralization-of-s-ec557ddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59739%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59738-cwe-77-improper-neutralization-of-s-ba607136</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59738%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59737-cwe-77-improper-neutralization-of-s-c157d264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59737%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59736-cwe-77-improper-neutralization-of-s-1ba48086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59736%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-is-moving-from-email-to-mobile-is-your-se-2867e470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Is%20Moving%20From%20Email%20to%20Mobile.%20Is%20Your%20Security%3F&amp;severity=medium&amp;id=68e469f16a45552f36e9073c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59735-cwe-77-improper-neutralization-of-s-bcd23163</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59735%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20AndSoft%20e-TMS&amp;severity=critical&amp;id=68de87961199a3d5d3438cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53881-cwe-61-unix-symbolic-link-symlink-f-57b9f1c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53881%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=68de84261e53c7e7c4725dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-carplay-exploit-byovd-tactics--f10a8f97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20CarPlay%20Exploit%2C%20BYOVD%20Tactics%2C%20SQL%20C2%20Attacks%2C%20iCloud%20Backdoor%20Demand%20%26%20More&amp;severity=high&amp;id=68de7d6e751dcaab32f604a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-gemini-trifecta-vulnerabilities-in--b6cced57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20%E2%80%9CGemini%20Trifecta%E2%80%9D%20Vulnerabilities%20in%20Gemini%20AI%20Suite%20That%20Could%20Steal%20User%20Data&amp;severity=medium&amp;id=68de7a1333c890fca8cec193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alert-malicious-pypi-package-soopsocks-infects-265-d2c3fea5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alert%3A%20Malicious%20PyPI%20Package%20soopsocks%20Infects%202%2C653%20Systems%20Before%20Takedown&amp;severity=medium&amp;id=68e467466a45552f36e85b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/confucius-cyberspy-evolves-from-stealers-to-backdo-89e4bbb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Confucius&apos;%20Cyberspy%20Evolves%20From%20Stealers%20to%20Backdoors%20in%20Pakistan&amp;severity=medium&amp;id=68e469f16a45552f36e9073f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22862-escalation-of-privilege-in-fortinet-394ef087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22862%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=68de786dd3ffb1ecf5acc7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0642-cwe-798-use-of-hard-coded-credential-bea4fac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0642%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PosCube%20Hardware%20Software%20and%20Consulting%20Ltd.%20Co.%20Assist&amp;severity=medium&amp;id=68de74eced052d5593f9e4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11240-cwe-601-url-redirection-to-untruste-772cec7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11240%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=medium&amp;id=68de74eced052d5593f9e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11239-cwe-863-incorrect-authorization-in--e38aef84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11239%3A%20CWE-863%20Incorrect%20Authorization%20in%20KNIME%20KNIME%20Business%20Hub&amp;severity=low&amp;id=68de708c9a610dc11233fc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41010-cwe-942-permissive-cross-domain-sec-856fecb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41010%3A%20CWE-942%20Permissive%20Cross-domain%20Security%20Policy%20with%20Untrusted%20Domains%20in%20Hiberus%20Sintra&amp;severity=medium&amp;id=68de708c9a610dc11233fc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58260-cwe-863-incorrect-authorization-in--523a4997</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58260%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SUSE%20rancher&amp;severity=high&amp;id=68e0f3bfb66c7f7acdd3cc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58267-cwe-345-insufficient-verification-o-86317804</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58267%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20SUSE%20rancher&amp;severity=high&amp;id=68e0f3bfb66c7f7acdd3cbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-protect-yourself-from-voting-phishing-scams-be602f5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20protect%20yourself%20from%20%22voting%22%20phishing%20scams%2C%20and%20avoid%20losing%20your%20WhatsApp%20account%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9574a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatsday-bulletin-carplay-exploit-byovd-tactics--68685fef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatsDay%20Bulletin%3A%20CarPlay%20Exploit%2C%20BYOVD%20Tactics%2C%20SQL%20C2%20Attacks%2C%20iCloud%20Backdoor%20Demand%20%26%20More&amp;severity=critical&amp;id=68e467466a45552f36e85b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-mandiant-probes-new-oracle-extortion-wave-p-0d73c514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Mandiant%20Probes%20New%20Oracle%20Extortion%20Wave%20Possibly%20Linked%20to%20Cl0p%20Ransomware&amp;severity=medium&amp;id=68e467466a45552f36e85b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41064-cwe-287-improper-authentication-in--586fa36e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41064%3A%20CWE-287%20Improper%20Authentication%20in%20GTT%20OpenSIAC&amp;severity=critical&amp;id=68de612ad9c552cd9d084e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-close-threat-detection-gaps-your-socs-actio-ea1102bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Close%20Threat%20Detection%20Gaps%3A%20Your%20SOC&apos;s%20Action%20Plan&amp;severity=medium&amp;id=68e467466a45552f36e85b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40992-cwe-79-improper-neutralization-of-i-f85aab54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Sociopro&amp;severity=medium&amp;id=68dea19388ef6ccb1e84f5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40991-cwe-79-improper-neutralization-of-i-56ae8b04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Ekushey%20CRM&amp;severity=medium&amp;id=68de5841274727b051111922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54293-cwe-22-improper-limitation-of-a-pat-e2f8e728</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54293%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de5841274727b051111925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40990-cwe-79-improper-neutralization-of-i-8dfcb82a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Ekushey%20CRM&amp;severity=medium&amp;id=68de5841274727b05111191f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40989-cwe-79-improper-neutralization-of-i-a1ae8e06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Creativeitem%20Ekushey%20CRM&amp;severity=medium&amp;id=68de571d8613837f0a3aa611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-leverage-seo-poisoning-and-malicious-a97011e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Leverage%20SEO%20Poisoning%20and%20Malicious%20Ads%20to%20Distribute%20Backdoored%20Microsoft%20Teams%20Installers&amp;severity=medium&amp;id=68de53a267ab0ec8fec2bb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-zip-files-use-windows-shortcuts-to-drop--316fd0ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20ZIP%20Files%20Use%20Windows%20Shortcuts%20to%20Drop%20Malware&amp;severity=medium&amp;id=68de528432efd56130b54b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54468-cwe-200-exposure-of-sensitive-infor-d8c9835c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54468%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SUSE%20rancher&amp;severity=medium&amp;id=68de8a13d034459bbdfb0c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61735-cwe-918-server-side-request-forgery-2c607a80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61735%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=high&amp;id=68de4acb4e9ed523ee9b5d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61733-cwe-288-authentication-bypass-using-3d608e03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61733%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=high&amp;id=68de4acb4e9ed523ee9b5d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61734-cwe-552-files-or-directories-access-7e833018</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61734%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=high&amp;id=68de4acb4e9ed523ee9b5d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/werewolf-raids-russias-public-sector-with-trusted--8416492a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Werewolf%20raids%20Russia&apos;s%20public%20sector%20with%20trusted%20relationship%20attacks&amp;severity=medium&amp;id=68de7a2533c890fca8cec2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40646-cwe-79-improper-neutralization-of-i-c00f6033</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Status%20Tracker%20Energy%20CRM&amp;severity=medium&amp;id=68e8c37b9fd71783de462c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-analytics-bug-leaked-customer-tracking-data--8f2e8200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20Analytics%20bug%20leaked%20customer%20tracking%20data%20to%20other%20tenants&amp;severity=high&amp;id=68de4848cfd3705b75446bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-breach-at-dealership-software-provider-impact-1a3e69c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20breach%20at%20dealership%20software%20provider%20impacts%20766k%20clients&amp;severity=high&amp;id=68de4848cfd3705b75446bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clop-extortion-emails-claim-theft-of-oracle-e-busi-3aaf5e04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clop%20extortion%20emails%20claim%20theft%20of%20Oracle%20E-Business%20Suite%20data&amp;severity=high&amp;id=68de47693a84497e8a359283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt-phantom-taurus-uses-net-star-malw-84432eb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT%20Phantom%20Taurus%20uses%20Net-Star%20malware%20in%20espionage%20campaigns%20against%20key%20sectors&amp;severity=medium&amp;id=68de47693a84497e8a359287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54292-cwe-22-improper-limitation-of-a-pat-dd18fac9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54292%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54291-cwe-209-generation-of-error-message-2660b426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54291%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54290-cwe-200-exposure-of-sensitive-infor-5a5394d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-beware-of-android-spyware-disguised-as-sig-4cb5c2a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%3A%20Beware%20of%20Android%20Spyware%20Disguised%20as%20Signal%20Encryption%20Plugin%20and%20ToTok%20Pro&amp;severity=medium&amp;id=68e467476a45552f36e85b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54289-cwe-1385-missing-origin-validation--5c487b33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54289%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de46967ead30c0938fe4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54288-cwe-290-authentication-bypass-by-sp-6dfbb7db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54288%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Canonical%20LXD&amp;severity=medium&amp;id=68de46967ead30c0938fe4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54287-cwe-1336-improper-neutralization-of-d33a2ec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54287%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de5841274727b05111192b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54286-cwe-352-cross-site-request-forgery--7431f16f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54286%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Canonical%20LXD&amp;severity=high&amp;id=68de5841274727b051111928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-spyware-in-the-uae-masquerades-as-spyware-92285cf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Spyware%20in%20the%20UAE%20Masquerades%20as%20...%20Spyware&amp;severity=medium&amp;id=68e469f16a45552f36e90742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-ai-powered-ransomware-from-apt-group-5e4c492e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%3A%20AI-powered%20Ransomware%20from%20APT%20Group&amp;severity=medium&amp;id=68de31e168d1a1db7a820674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9697-cwe-89-sql-injection-in-ajax-woosear-dc2f2416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9697%3A%20CWE-89%20SQL%20Injection%20in%20Ajax%20WooSearch&amp;severity=critical&amp;id=68dea19388ef6ccb1e84f5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9587-cwe-89-sql-injection-in-ctl-behance--ffd38ebc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9587%3A%20CWE-89%20SQL%20Injection%20in%20CTL%20Behance%20Importer%20Lite&amp;severity=high&amp;id=68deb7bf5c73916daeaaaac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61690-buffer-underwrite-buffer-underflow--d098ddd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61690%3A%20Buffer%20underwrite%20(&apos;Buffer%20underflow&apos;)%20in%20KEYENCE%20CORPORATION%20KV%20STUDIO&amp;severity=high&amp;id=68deb9611faa9666742bb45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61692-use-after-free-in-keyence-corporati-d4970b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61692%3A%20Use%20after%20free%20in%20KEYENCE%20CORPORATION%20VT%20STUDIO&amp;severity=high&amp;id=68deb9611faa9666742bb45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61691-out-of-bounds-read-in-keyence-corpo-d49db5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61691%3A%20Out-of-bounds%20Read%20in%20KEYENCE%20CORPORATION%20VT%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac484c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58777-access-of-uninitialized-pointer-in--19b78a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58777%3A%20Access%20of%20uninitialized%20pointer%20in%20KEYENCE%20CORPORATION%20VT%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac4848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58776-stack-based-buffer-overflow-in-keye-865a358b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58776%3A%20Stack-based%20buffer%20overflow%20in%20KEYENCE%20CORPORATION%20KV%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac4844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58775-stack-based-buffer-overflow-in-keye-c750d1cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58775%3A%20Stack-based%20buffer%20overflow%20in%20KEYENCE%20CORPORATION%20KV%20STUDIO&amp;severity=high&amp;id=68debf28f18dd408beac4840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11020-cwe-89-improper-neutralization-of-s-e83d5431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11020%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MarkAny%20SafePC%20Enterprise&amp;severity=high&amp;id=68de0bcfb62217a1ee704c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11221-cwe-22-improper-limitation-of-a-pat-646e7621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11221%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GTONE%20ChangeFlow&amp;severity=critical&amp;id=68de0bcfb62217a1ee704c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11182-cwe-22-improper-limitation-of-a-pat-8ea92e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11182%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GTONE%20ChangeFlow&amp;severity=high&amp;id=68de0bcfb62217a1ee704c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28760-na-d48a8263</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28760%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3bfb66c7f7acdd3cc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60782-na-0425f91c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60782%3A%20n%2Fa&amp;severity=medium&amp;id=68df13500005234f78f726bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-02-64b03d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-02&amp;severity=medium&amp;id=68df12ee0005234f78f6ca74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57443-na-7059eb5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57443%3A%20n%2Fa&amp;severity=medium&amp;id=68ded30f7dcc80feb140548d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32942-na-9bfec992</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32942%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20SSH%20Tectia%20Server&amp;severity=high&amp;id=68decc6c903d1527944295fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54315-cwe-837-improper-enforcement-of-a-s-d1941b8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54315%3A%20CWE-837%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Matrix%20Matrix%20specification&amp;severity=high&amp;id=68dec76b0040948278cba87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49090-cwe-642-external-control-of-critica-e7807ddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49090%3A%20CWE-642%20External%20Control%20of%20Critical%20State%20Data%20in%20Matrix%20Matrix%20specification&amp;severity=high&amp;id=68dec76b0040948278cba874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56019-na-5b3f8867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56019%3A%20n%2Fa&amp;severity=medium&amp;id=68deb604da2dc2424f5e63c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59409-na-c9f688f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59409%3A%20n%2Fa&amp;severity=high&amp;id=68deb38427b31a41b5936d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59407-na-6971b607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59407%3A%20n%2Fa&amp;severity=critical&amp;id=68deb38427b31a41b5936d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59406-na-9d5c3e9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59406%3A%20n%2Fa&amp;severity=medium&amp;id=68deb38427b31a41b5936d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59405-na-f257c597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59405%3A%20n%2Fa&amp;severity=high&amp;id=68deb38427b31a41b5936d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59403-na-7cb568a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59403%3A%20n%2Fa&amp;severity=critical&amp;id=68deb12af660c882cd1794a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60663-na-6687108d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60663%3A%20n%2Fa&amp;severity=high&amp;id=68dea7707d138d8f7b8e83b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60661-na-f0403c3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60661%3A%20n%2Fa&amp;severity=medium&amp;id=68dea7707d138d8f7b8e83af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60662-na-59995b06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60662%3A%20n%2Fa&amp;severity=high&amp;id=68dea4352d88283ed76fb5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60660-na-3510feb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60660%3A%20n%2Fa&amp;severity=high&amp;id=68dea4342d88283ed76fb5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57305-na-9cb6494c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57305%3A%20n%2Fa&amp;severity=medium&amp;id=68dea4342d88283ed76fb5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56154-na-3d01a815</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56154%3A%20n%2Fa&amp;severity=medium&amp;id=68dea4342d88283ed76fb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56162-na-b4b0c4c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56162%3A%20n%2Fa&amp;severity=medium&amp;id=68de9f650cc3618ea8d681b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56161-na-d30d9a75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56161%3A%20n%2Fa&amp;severity=high&amp;id=68de9f650cc3618ea8d681b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61087-na-34807789</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61087%3A%20n%2Fa&amp;severity=medium&amp;id=68de9076d3a86bc5231afbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61096-na-96f73c5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61096%3A%20n%2Fa&amp;severity=medium&amp;id=68de8edb779290c94ba70b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56381-na-1b3d0276</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56381%3A%20n%2Fa&amp;severity=medium&amp;id=68de87961199a3d5d3438cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56380-na-3a62e1c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56380%3A%20n%2Fa&amp;severity=medium&amp;id=68de87961199a3d5d3438cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56379-na-7880b318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56379%3A%20n%2Fa&amp;severity=medium&amp;id=68de87961199a3d5d3438cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61583-cwe-20-improper-input-validation-in-57941a54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61583%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20joni1802%20ts3-manager&amp;severity=medium&amp;id=68ddaceb72d3e5aff1251267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61582-cwe-20-improper-input-validation-in-dc9b4167</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61582%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20joni1802%20ts3-manager&amp;severity=high&amp;id=68ddaceb72d3e5aff1251263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61587-cwe-601-url-redirection-to-untruste-1a3d83a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61587%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=68dda589b3e3ddcc713a4ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59951-cwe-348-use-of-less-trusted-source--d06676af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59951%3A%20CWE-348%3A%20Use%20of%20Less%20Trusted%20Source%20in%20LukeGus%20Termix&amp;severity=critical&amp;id=68dda3ebe96067ff09c5f065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nuclei-templates-for-detecting-ami-megarac-bmc-vul-a8e5139a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nuclei%20Templates%20for%20Detecting%20AMI%20MegaRAC%20BMC%20Vulnerabilities&amp;severity=medium&amp;id=68dda24aa0e683776d6fdadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23297-cwe-276-incorrect-default-permissio-0846e282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23297%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NVIDIA%20NVIDIA%20App&amp;severity=high&amp;id=68dd9c8d82ee871e1bdf1d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23355-cwe-427-uncontrolled-search-path-el-8e7d6c42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23355%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20NVIDIA%20Nsight%20Graphics&amp;severity=medium&amp;id=68dd9c8d82ee871e1bdf1d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sheds-light-on-shinyhunters-salesforce-tact-95f5971d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Sheds%20Light%20on%20ShinyHunters&apos;%20Salesforce%20Tactics&amp;severity=medium&amp;id=68e469f16a45552f36e90745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59538-cwe-248-uncaught-exception-in-argop-b0f330c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59538%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=68dd9a10b702a18e6b04b1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59537-cwe-20-improper-input-validation-in-a2deb911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59537%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=68dd986158b778dbe226e796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59531-cwe-703-improper-check-or-handling--dad3f4dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59531%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=68dd94f67eacd1ac925ba1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shutdown-threatens-us-intel-sharing-cyber-defense-1d56664e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shutdown%20Threatens%20US%20Intel%20Sharing%2C%20Cyber%20Defense&amp;severity=critical&amp;id=68e469f16a45552f36e90748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/westjet-confirms-passenger-ids-and-passports-stole-6db45990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WestJet%20Confirms%20Passenger%20IDs%20and%20Passports%20Stolen%20in%20Cyberattack&amp;severity=medium&amp;id=68dd919222e2e2668768dbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-09x-walk-through-the-updates-beb01102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%200.9.x%20-%20walk%20through%20the%20updates&amp;severity=medium&amp;id=68dda0a614065076695d09e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59150-cwe-476-null-pointer-dereference-in-53899199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59150%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=68dd8fe35b743f3e8e9287c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59149-cwe-121-stack-based-buffer-overflow-44a1064b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59149%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=medium&amp;id=68dd8addbe10d062bc70049e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58769-cwe-22-improper-limitation-of-a-pat-ca2d54b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58769%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20auth0%20laravel-auth0&amp;severity=low&amp;id=68dd88785d568b8243744790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59148-cwe-476-null-pointer-dereference-in-9f703e7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59148%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20OISF%20suricata&amp;severity=high&amp;id=68dd86de2801a4fa284df5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiretap-attack-extracts-intel-sgx-ecdsa-key-vi-b71d5cda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20WireTap%20Attack%20Extracts%20Intel%20SGX%20ECDSA%20Key%20via%20DDR4%20Memory-Bus%20Interposer&amp;severity=high&amp;id=68dd8378faa82da0fe7d9782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-bug-in-classic-outlook-can-only-be-fixed-via-m-ac222d7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20bug%20in%20classic%20Outlook%20can%20only%20be%20fixed%20via%20Microsoft%20support&amp;severity=high&amp;id=68dd8378faa82da0fe7d9786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59147-cwe-358-improperly-implemented-secu-3a581fd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59147%3A%20CWE-358%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20OISF%20suricata&amp;severity=high&amp;id=68dd82a3486fd6ef324febcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/allianz-life-says-july-data-breach-impacts-15-mill-6bb602b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Allianz%20Life%20says%20July%20data%20breach%20impacts%201.5%20million%20people&amp;severity=high&amp;id=68dd7cbd9b40a9292cf082c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10578-cwe-269-improper-privilege-manageme-d7e48e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10578%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20HP%20Inc.%20HP%20Support%20Assistant&amp;severity=medium&amp;id=68dd78861b22ab563598541f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wiretap-attack-extracts-intel-sgx-ecdsa-key-vi-797a0e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20WireTap%20Attack%20Extracts%20Intel%20SGX%20ECDSA%20Key%20via%20DDR4%20Memory-Bus%20Interposer&amp;severity=low&amp;id=68e467476a45552f36e85b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8679-cwe-307-improper-restriction-of-exce-4762a712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8679%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Extreme%20Networks%20ExtremeGuest%20Essentials&amp;severity=high&amp;id=68dd632038a5623ddac75ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49883-cwe-521-weak-password-requirements--fed88610</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49883%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50300-cwe-284-improper-access-control-in--30ea6316</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50300%3A%20CWE-284%20Improper%20Access%20Control%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49881-cwe-613-insufficient-session-expira-d9ebd4a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49881%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34182-cwe-79-improper-neutralization-of-i-b8f0ed7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Deciso%20OPNsense&amp;severity=medium&amp;id=68dd5ef5ebdfe95d2e1694d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11233-cwe-22-improper-limitation-of-a-pat-1907c86f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11233%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Rust%20Project%20std&amp;severity=medium&amp;id=68dd5d4e20bc8d682462ef3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-spamgpt-and-matrixpdf-new-ai-toolkits-driving-5c817eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20SpamGPT%20and%20MatrixPDF%2C%20New%20AI%20Toolkits%20Driving%20Malware%20and%20Phishing%20Attacks&amp;severity=medium&amp;id=68dd54df56e9634c8024fb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20357-improper-neutralization-of-input-du-0dd3ac59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68dd5401795552734e391052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20356-improper-neutralization-of-input-du-0bc65ba0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Cyber%20Vision&amp;severity=medium&amp;id=68dd5401795552734e39104f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20361-improper-neutralization-of-input-du-ab2f30a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=medium&amp;id=68dd5401795552734e391055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20368-the-software-does-not-neutralize-or-9fbb9f03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20368%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e39105e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20371-the-web-server-receives-a-url-or-si-c9ec118c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20371%3A%20The%20web%20server%20receives%20a%20URL%20or%20similar%20request%20from%20an%20upstream%20component%20and%20retrieves%20the%20contents%20of%20this%20URL%2C%20but%20it%20does%20not%20sufficiently%20ensure%20that%20the%20request%20is%20being%20sent%20to%20the%20expected%20destination.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=68dd5401795552734e391067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20367-the-software-does-not-neutralize-or-190193f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20367%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e39105b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20370-the-software-does-not-properly-cont-47bc9869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20370%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e391064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20366-the-software-does-not-restrict-or-i-258d8b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20366%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e391058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20369-the-software-uses-xml-documents-and-ec5676dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20369%3A%20The%20software%20uses%20XML%20documents%20and%20allows%20their%20structure%20to%20be%20defined%20with%20a%20Document%20Type%20Definition%20(DTD)%2C%20but%20it%20does%20not%20properly%20control%20the%20number%20of%20recursive%20definitions%20of%20entities.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=68dd5401795552734e391061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-openshift-ai-flaw-exposes-hybrid-cloud-inf-c7ab85af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20OpenShift%20AI%20Flaw%20Exposes%20Hybrid%20Cloud%20Infrastructure%20to%20Full%20Takeover&amp;severity=critical&amp;id=68dd4b1c114c3ddd031de7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50301-cwe-532-insertion-of-sensitive-info-2524c459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50301%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20Transformation%20Extender%20Advanced&amp;severity=low&amp;id=68e0f3c0b66c7f7acdd3d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-50-battering-ram-can-bust-confidential-computing-4df105d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20%2450%20&apos;Battering%20RAM&apos;%20Can%20Bust%20Confidential%20Computing&amp;severity=medium&amp;id=68e469f16a45552f36e9074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-security-hardening-kaspersky-official-blog-51e1a233</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20security%20hardening%3F%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9574d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/undead-operating-systems-haunt-enterprise-security-cfeab8db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Undead%20Operating%20Systems%20Haunt%20Enterprise%20Security%20Networks&amp;severity=medium&amp;id=68e469f16a45552f36e9074e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41421-cwe-59-improper-link-resolution-bef-142e87e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41421%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20TeamViewer%20Full%20Client&amp;severity=medium&amp;id=68ddc314107aa30f08655c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/onelogin-bug-let-attackers-use-api-keys-to-steal-o-35274fba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneLogin%20Bug%20Let%20Attackers%20Use%20API%20Keys%20to%20Steal%20OIDC%20Secrets%20and%20Impersonate%20Apps&amp;severity=high&amp;id=68e467476a45552f36e85b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detour-dogs-dns-hijacking-infects-30000-websites-w-836db2ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detour%20Dog&apos;s%20DNS%20Hijacking%20Infects%2030%2C000%20Websites%20with%20Strela%20Stealer&amp;severity=medium&amp;id=68dd2963da19b4c5d0e15b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/red-hat-openshift-ai-flaw-exposes-hybrid-cloud-inf-62fbcf1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Red%20Hat%20OpenShift%20AI%20Flaw%20Exposes%20Hybrid%20Cloud%20Infrastructure%20to%20Full%20Takeover&amp;severity=low&amp;id=68e467476a45552f36e85b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40648-cwe-79-improper-neutralization-of-i-61f36ba2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20issabel-pbx%20module%20Issabel&amp;severity=medium&amp;id=68dd426f50050273f35a9a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40647-cwe-79-improper-neutralization-of-i-af72b38d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20issabel-pbx%20module%20Issabel&amp;severity=medium&amp;id=68ddc314107aa30f08655c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-banking-trojan-klopatra-uses-hidden-vn-2af272c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Banking%20Trojan%20%E2%80%9CKlopatra%E2%80%9D%20Uses%20Hidden%20VNC%20to%20Control%20Infected%20Smartphones&amp;severity=high&amp;id=68dd169593313e20a68415e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/use-of-generative-ai-in-scams-f710c301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Use%20of%20Generative%20AI%20in%20Scams&amp;severity=medium&amp;id=68dd169593313e20a68415e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-milesight-routers-to-send-phishing-ae3bcc1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Milesight%20Routers%20to%20Send%20Phishing%20SMS%20to%20European%20Users&amp;severity=high&amp;id=68dd169593313e20a68415dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53502-f8985d97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53502&amp;severity=null&amp;id=68e0f3c1b66c7f7acdd3e945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53469-164931f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53469&amp;severity=null&amp;id=695450bcdb813ff03e2bf87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2025-cybersecurity-reality-check-breaches-hidden-a-72e4880d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2025%20Cybersecurity%20Reality%20Check%3A%20Breaches%20Hidden%2C%20Attack%20Surfaces%20Growing%2C%20and%20AI%20Misperceptions%20Rising&amp;severity=medium&amp;id=68e467476a45552f36e85b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-milesight-routers-to-send-phishing-e1cb7ed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Milesight%20Routers%20to%20Send%20Phishing%20SMS%20to%20European%20Users&amp;severity=medium&amp;id=68e467476a45552f36e85b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10847-vulnerability-in-broadcom-unified-i-73a653c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10847%3A%20Vulnerability%20in%20Broadcom%20Unified%20Infrastructure%20Management&amp;severity=high&amp;id=68dd07a25471b4f5afeb8f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-wd-my-cloud-bug-allows-remote-command-inj-c793dfd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20WD%20My%20Cloud%20bug%20allows%20remote%20command%20injection&amp;severity=critical&amp;id=68dcfbefe79dafb355ebb985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tesla-fixes-tcu-usb-flaw-allowing-root-access-6b750a8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tesla%20Fixes%20TCU%20USB%20Flaw%20Allowing%20Root%20Access&amp;severity=medium&amp;id=68dcfb17897535789374b089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-50-battering-ram-attack-breaks-intel-and-amd-c-3c09e7ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%2450%20Battering%20RAM%20Attack%20Breaks%20Intel%20and%20AMD%20Cloud%20Security%20Protections&amp;severity=high&amp;id=68dcfb17897535789374b081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-matrixpdf-toolkit-turns-pdfs-into-phishing-and-e00d9cc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20MatrixPDF%20toolkit%20turns%20PDFs%20into%20phishing%20and%20malware%20lures&amp;severity=high&amp;id=68dcfb17897535789374b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61622-cwe-502-deserialization-of-untruste-02ef2c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61622%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Fory&amp;severity=critical&amp;id=68ddc314107aa30f08655c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/westjet-confirms-cyberattack-exposed-ids-passports-dfc0321d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WestJet%20confirms%20cyberattack%20exposed%20IDs%2C%20passports%20in%20June%20incident&amp;severity=high&amp;id=68dcfa3cdf8d945b36ae8688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-warns-of-cabinetrat-backdoor-xll-add-ins-s-d35c4dd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Warns%20of%20CABINETRAT%20Backdoor%20%2B%20XLL%20Add-ins%20Spread%20via%20Signal%20ZIPs&amp;severity=high&amp;id=68dcfa3cdf8d945b36ae8684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhadamanthys-09x-walk-through-the-updates-302e69c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhadamanthys%200.9.x%20%E2%80%93%20walk%20through%20the%20updates&amp;severity=high&amp;id=68e46d3b6a45552f36e94e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39898-768d0b11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39898&amp;severity=null&amp;id=68fb79f0a4ecdcc9295d63fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostsocks-from-initial-access-to-residential-prox-e29bba4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostSocks%3A%20From%20Initial%20Access%20to%20Residential%20Proxy&amp;severity=medium&amp;id=68dceb233fb6425729d8e369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xiebroc2-identified-in-ms-sql-server-attack-cases-fea85048</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XiebroC2%20Identified%20in%20MS-SQL%20Server%20Attack%20Cases&amp;severity=medium&amp;id=68dceb233fb6425729d8e360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11226-cwe-20-improper-input-validation-in-adb3c95c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11226%3A%20CWE-20%20Improper%20Input%20Validation%20in%20QOS.CH%20Sarl%20Logback-core&amp;severity=medium&amp;id=68ddc314107aa30f08655c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraine-warns-of-cabinetrat-backdoor-xll-add-ins-s-d9526925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%20Warns%20of%20CABINETRAT%20Backdoor%20%2B%20XLL%20Add-ins%20Spread%20via%20Signal%20ZIPs&amp;severity=low&amp;id=68e467476a45552f36e85b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9512-cwe-79-cross-site-scripting-xss-in-s-3e64c629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9512%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=68dcc4bb8fb4916d8527d90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10538-cwe-288-authentication-bypass-using-8be572e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10538%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LG%20Innotek%20Camera%20Model%20LND7210&amp;severity=high&amp;id=68dca8f1ca6202e366a921c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9075-cwe-79-improper-neutralization-of-in-9b55ab6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20ZoloBlocks%20%E2%80%93%20Gutenberg%20Block%20Editor%20Plugin%20with%20Advanced%20Blocks%2C%20Dynamic%20Content%2C%20Templates%20%26%20Patterns&amp;severity=medium&amp;id=68dca0d55d588c52e5e0c389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10735-cwe-918-server-side-request-forgery-75e71915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10735%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20Block%20For%20Mailchimp%20%E2%80%93%20Easy%20Mailchimp%20Form%20Integration&amp;severity=medium&amp;id=68dca0d55d588c52e5e0c37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10744-cwe-200-exposure-of-sensitive-infor-fd1f154a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10744%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20softdiscover%20File%20Manager%2C%20Code%20Editor%2C%20and%20Backup%20by%20Managefy&amp;severity=medium&amp;id=68dca0d55d588c52e5e0c383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/software-secured-hacking-furbo-2-mobile-app-and-p2-434ee97d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Software%20Secured%20%7C%20Hacking%20Furbo%202%3A%20Mobile%20App%20and%20P2P%20Exploits%20%7C%20USA&amp;severity=medium&amp;id=68dc883e5d588c52e5dfa728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-imposes-one-hour-reporting-rule-for-major-cy-3f789fdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Imposes%20One-Hour%20Reporting%20Rule%20for%20Major%20Cyber%20Incidents&amp;severity=medium&amp;id=68e469f16a45552f36e90751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57494-na-84bb544e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57494%3A%20n%2Fa&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-10-01-dc2d5ba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-10-01&amp;severity=medium&amp;id=68ddc4dc107aa30f08656c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61045-na-dccc0430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61045%3A%20n%2Fa&amp;severity=high&amp;id=68ddc314107aa30f08655c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57389-na-a86aa78c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57389%3A%20n%2Fa&amp;severity=medium&amp;id=68dd8fe35b743f3e8e9287c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61189-na-822cdf22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61189%3A%20n%2Fa&amp;severity=medium&amp;id=68dd8addbe10d062bc7004a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61188-na-bba64a61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61188%3A%20n%2Fa&amp;severity=medium&amp;id=68dd8addbe10d062bc7004a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56588-na-169ec1d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56588%3A%20n%2Fa&amp;severity=high&amp;id=68dd86de2801a4fa284df5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57444-na-5db88632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57444%3A%20n%2Fa&amp;severity=medium&amp;id=68dd82a3486fd6ef324febc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43718-na-6d7132b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43718%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20freedesktop%20Poppler&amp;severity=low&amp;id=68dd7b129f41f345b1268044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59682-na-4ff519a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59682%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20djangoproject%20Django&amp;severity=low&amp;id=68dd78861b22ab5635985427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59681-cwe-89-improper-neutralization-of-s-9798d5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59681%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=high&amp;id=68dd78861b22ab5635985422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60991-na-af5633b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60991%3A%20n%2Fa&amp;severity=high&amp;id=68dd72dbabca8358e689ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46205-na-b8bfbfa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46205%3A%20n%2Fa&amp;severity=high&amp;id=68dd72dbabca8358e689ff99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57393-na-80d86369</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57393%3A%20n%2Fa&amp;severity=high&amp;id=68dd6f80b8c556e771f690da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28357-na-9db31b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28357%3A%20n%2Fa&amp;severity=high&amp;id=68dd6f80b8c556e771f690d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56515-na-585922ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56515%3A%20n%2Fa&amp;severity=high&amp;id=68dd4b2c114c3ddd031de8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56514-na-f7bb03a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56514%3A%20n%2Fa&amp;severity=medium&amp;id=68dd473d4f9fd6165021822f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61044-na-d84fcea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61044%3A%20n%2Fa&amp;severity=medium&amp;id=68dd426f50050273f35a9a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59687-na-31a465a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59687%3A%20n%2Fa&amp;severity=medium&amp;id=68dd426f50050273f35a9a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57275-na-adff0aff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57275%3A%20n%2Fa&amp;severity=medium&amp;id=68dd426f50050273f35a9a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59686-na-5db52955</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59686%3A%20n%2Fa&amp;severity=medium&amp;id=68dd40de844624949e000c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59685-na-1ed6a9ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59685%3A%20n%2Fa&amp;severity=medium&amp;id=68dd40de844624949e000c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59684-na-bc85ae98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59684%3A%20n%2Fa&amp;severity=high&amp;id=68dd40de844624949e000c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52040-na-86f2b1f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52040%3A%20n%2Fa&amp;severity=high&amp;id=68dd3f4eb7ffd96e585d7a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52041-na-b092a3e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52041%3A%20n%2Fa&amp;severity=high&amp;id=68dd3cf604e976796deff843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52039-na-882ad587</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52039%3A%20n%2Fa&amp;severity=high&amp;id=68dd3cf604e976796deff83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52042-na-37fa0262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52042%3A%20n%2Fa&amp;severity=high&amp;id=68dd3a90787d03c6c8e4750e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24525-cwe-321-in-keysight-ixia-vision-pro-c2c059fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24525%3A%20CWE-321%20in%20Keysight%20Ixia%20Vision%20Product%20Family&amp;severity=high&amp;id=68dc71325d588c52e5de4759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/x5bguest-diaryx5d-comparing-honeypot-passwords-wit-dde1510a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%26%23x5b%3BGuest%20Diary%26%23x5d%3B%20Comparing%20Honeypot%20Passwords%20with%20HIBP%2C%20(Wed%2C%20Oct%201st)&amp;severity=medium&amp;id=68e46e546a45552f36e96977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55191-cwe-362-concurrent-execution-using--e1dbe4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55191%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=68dc71325d588c52e5de475f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43826-cwe-79-improper-neutralization-of-i-1bb71f7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68dc71325d588c52e5de4767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-and-authentication-bypass-in-7a05163f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20and%20Authentication%20Bypass%20in%20Materialise%20OrthoView%20(CVE-2025-23049)&amp;severity=medium&amp;id=68dc4e72f6cdf058d6b2668a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-china-apt-strikes-with-precision-and-persisten-24ac20e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20China%20APT%20Strikes%20With%20Precision%20and%20Persistence&amp;severity=medium&amp;id=68e469f16a45552f36e90754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/klopatra-trojan-makes-bank-transfers-while-you-sle-d64302c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Klopatra&apos;%20Trojan%20Makes%20Bank%20Transfers%20While%20You%20Sleep&amp;severity=medium&amp;id=68e469f26a45552f36e90762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10659-cwe-78-improper-neutralization-of-s-c536e09c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10659%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MegaSys%20Telenium%20Online%20Web%20Application%3A&amp;severity=critical&amp;id=68dc412b4167b98bea01ab8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36262-cwe-1286-improper-validation-of-syn-80b50eb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36262%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=68dc412b4167b98bea01ab94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36132-cwe-79-improper-neutralization-of-i-986e9937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=68dc412b4167b98bea01ab91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-exploited-new-vmware-bug-for-nearly-a-year-679e9ece</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Exploited%20New%20VMware%20Bug%20for%20Nearly%20a%20Year&amp;severity=medium&amp;id=68e469f26a45552f36e90765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chinese-apt-phantom-taurus-targeted-ms-exchang-6cfa0f1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Chinese%20APT%20Phantom%20Taurus%20Targeted%20MS%20Exchange%20Servers%20Over%203%20Years&amp;severity=medium&amp;id=68dc2d1ee5213aba7a30154d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43827-cwe-639-authorization-bypass-throug-ae847805</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43827%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68dc293ea02184cd1d6a01d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zeroday-cloud-the-first-open-source-cloud-hacking--d2361272</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZeroDay%20Cloud%3A%20The%20first%20open-source%20cloud%20hacking%20competition&amp;severity=critical&amp;id=68dc2941a02184cd1d6a01df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-50-battering-ram-attack-breaks-intel-and-amd-c-50a716c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20%2450%20Battering%20RAM%20Attack%20Breaks%20Intel%20and%20AMD%20Cloud%20Security%20Protections&amp;severity=medium&amp;id=68e467476a45552f36e85b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-audits-fail-four-critical-pre-auth-vulnerabil-ce7f759f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Audits%20Fail%3A%20Four%20Critical%20Pre-Auth%20Vulnerabilities%20in%20TRUfusion%20Enterprise&amp;severity=critical&amp;id=68dc230df0f117f21d0d9d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11195-cwe-20-improper-input-validation-in-b04d4b0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11195%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rapid7%20AppSpider%20Pro&amp;severity=low&amp;id=68dc1e4eda058bed8e684ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disallow-security-research-crypto-phishing-sites-f-6280c528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disallow%3A%20%2Fsecurity-research%3F%20Crypto%20Phishing%20Sites&apos;%20Failed%20Attempt%20to%20Block%20Investigators&amp;severity=medium&amp;id=68dc34118d3f665f21c9d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23293-cwe-306-missing-authentication-for--79ad68b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23293%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=high&amp;id=68dc1a5e38591454ec7551be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23292-cwe-943-improper-neutralization-of--74acae9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23292%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=medium&amp;id=68dc1a5e38591454ec7551b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23291-cwe-312-cleartext-storage-of-sensit-33acde95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23291%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20NVIDIA%20DLS%20component%20of%20NVIDIA%20License%20System&amp;severity=low&amp;id=68dc1a5e38591454ec7551b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10725-incorrect-privilege-assignment-in-r-8d7818a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10725%3A%20Incorrect%20Privilege%20Assignment%20in%20opendatahub-io%20opendatahub-operator&amp;severity=critical&amp;id=68dc18cc7e0729622ee4ccef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-taurus-a-new-chinese-nexus-apt-and-the-dis-d3a6835a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Taurus%3A%20A%20New%20Chinese%20Nexus%20APT%20and%20the%20Discovery%20of%20the%20NET-STAR%20Malware%20Suite&amp;severity=medium&amp;id=68dc359a4fa123577f2a8430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-disclose-google-gemini-ai-flaws-allowi-02a24f92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Disclose%20Google%20Gemini%20AI%20Flaws%20Allowing%20Prompt%20Injection%20and%20Cloud%20Exploits&amp;severity=high&amp;id=68dc0e906d6bde08e78ae909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/broadcom-patches-vmware-zero-day-actively-exploite-8c61005b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Broadcom%20patches%20VMware%20Zero-Day%20actively%20exploited%20by%20UNC5174&amp;severity=critical&amp;id=68dc0dc527f4c7e4fcc7b63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploiting-vmware-zero-day-since-o-3c2766a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20hackers%20exploiting%20VMware%20zero-day%20since%20October%202024&amp;severity=critical&amp;id=68dc0dc527f4c7e4fcc7b639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-breaches-us-surveillance-firm-remotecom-acc-16589f0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Breaches%20US%20Surveillance%20Firm%20RemoteCOM%2C%20Accesses%20Court%20Supervision%20Records%20and%20Criminal%20Data&amp;severity=medium&amp;id=68dc04f86bb53bfbb49f9117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6034-cwe-125-out-of-bounds-read-in-ni-cir-2af95224</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6034%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=68dc027ac906f71936581348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantom-taurus-new-china-linked-hacker-group-hits--8496e67a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phantom%20Taurus%3A%20New%20China-Linked%20Hacker%20Group%20Hits%20Governments%20With%20Stealth%20Malware&amp;severity=medium&amp;id=68e467476a45552f36e85bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6033-cwe-787-out-of-bounds-write-in-ni-ci-b128f041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6033%3A%20CWE-787%C2%A0-%20Out%20of%20Bounds%20Write%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=68dc027ac906f71936581345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54477-cwe-203-observable-discrepancy-in-j-599ca730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54477%3A%20CWE-203%20Observable%20Discrepancy%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=68dc000c07b0365a4556815c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54476-cwe-79-improper-neutralization-of-i-12314d94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54476%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=68dc000c07b0365a45568159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-auto-insurance-platform-claimpix-leaked-107tb-o-73b53229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Auto%20Insurance%20Platform%20ClaimPix%20Leaked%2010.7TB%20of%20Records%20Online&amp;severity=medium&amp;id=68dbf7352da6e479b9e9883d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7493-insufficient-granularity-of-access-c-a5b0603a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7493%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=critical&amp;id=68dc000c07b0365a4556815f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/useradmin-sometimes-you-dont-even-need-to-log-in-t-470134fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22user%3Dadmin%22.%20Sometimes%20you%20don&apos;t%20even%20need%20to%20log%20in.%2C%20(Tue%2C%20Sep%2030th)&amp;severity=medium&amp;id=68e46e546a45552f36e9697a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7779-cwe-269-in-acronis-acronis-true-imag-52299677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7779%3A%20CWE-269%20in%20Acronis%20Acronis%20True%20Image&amp;severity=high&amp;id=68dbf9a6e965c789fc619924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11178-cwe-427-in-acronis-acronis-true-ima-e7b834c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11178%3A%20CWE-427%20in%20Acronis%20Acronis%20True%20Image&amp;severity=high&amp;id=68dbf9a6e965c789fc61991d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57852-incorrect-default-permissions-in-re-8319fb30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57852%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20AI%202.16&amp;severity=medium&amp;id=68dbf9a6e965c789fc619920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/can-shadow-ai-risks-be-stopped-28df19b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Can%20Shadow%20AI%20Risks%20Be%20Stopped%3F&amp;severity=medium&amp;id=68e469f26a45552f36e90768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-disclose-google-gemini-ai-flaws-allowi-430401c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Disclose%20Google%20Gemini%20AI%20Flaws%20Allowing%20Prompt%20Injection%20and%20Cloud%20Exploits&amp;severity=low&amp;id=68e467476a45552f36e85bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34217-cwe-321-use-of-hard-coded-cryptogra-4e89724b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34217%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68dbda3e53ffcfa45c3c44f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flipswitch-a-novel-syscall-hooking-technique-14feafb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FlipSwitch%3A%20a%20Novel%20Syscall%20Hooking%20Technique&amp;severity=medium&amp;id=68dc37ec0079d7edc75fa150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-expands-sentinel-into-agentic-security-p-995f692c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Expands%20Sentinel%20Into%20Agentic%20Security%20Platform%20With%20Unified%20Data%20Lake&amp;severity=low&amp;id=68e467476a45552f36e85bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10859-data-stored-in-cookies-for-non-html-04688e3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10859%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68dc71325d588c52e5de478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11153-jit-miscompilation-in-the-javascrip-242cb441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11153%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68dc71325d588c52e5de4795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11152-sandbox-escape-due-to-integer-overf-33088070</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11152%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68dc71325d588c52e5de4791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10217-cwe-117-improper-output-neutralizat-6bf49b6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10217%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Hitachi%20Energy%20Asset%20Suite&amp;severity=medium&amp;id=68dbcc0dc1fddf59aea26315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/datzbro-rat-hiding-behind-senior-travel-scams-4c8b5c54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Datzbro%3A%20RAT%20Hiding%20Behind%20Senior%20Travel%20Scams&amp;severity=medium&amp;id=68dc36656cc735edd4bd9857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stop-alert-chaos-context-is-the-key-to-effective-i-1c69b40d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stop%20Alert%20Chaos%3A%20Context%20Is%20the%20Key%20to%20Effective%20Incident%20Response&amp;severity=medium&amp;id=68e467476a45552f36e85bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41098-cwe-639-authorization-bypass-throug-9a3a26b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41098%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dc2f6b11d133094dbff38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41099-cwe-639-authorization-bypass-throug-68f5432a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41099%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b378e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41097-cwe-639-authorization-bypass-throug-a3c4aee2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41097%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b378b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41096-cwe-639-authorization-bypass-throug-10e08264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41096%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41095-cwe-639-authorization-bypass-throug-f08ba3ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41095%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41094-cwe-639-authorization-bypass-throug-d586a341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41094%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41093-cwe-639-authorization-bypass-throug-f607a452</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41093%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b377f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41092-cwe-639-authorization-bypass-throug-22a81a80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41092%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b377c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41091-cwe-639-authorization-bypass-throug-ceeb52ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41091%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GLOBAL%20PLANNING%20SOLUTIONS%20S.L%20(GPS)%20BOLD%20Workplanner&amp;severity=high&amp;id=68dbbca396e5c3a04c0b3779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urgent-china-linked-hackers-exploit-new-vmware-zer-9626ae12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Urgent%3A%20China-Linked%20Hackers%20Exploit%20New%20VMware%20Zero-Day%20Since%20October%202024&amp;severity=high&amp;id=68e467476a45552f36e85bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trifecta-of-google-gemini-flaws-turn-ai-into-attac-f062ea9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Trifecta&apos;%20of%20Google%20Gemini%20Flaws%20Turn%20AI%20Into%20Attack%20Vehicle&amp;severity=medium&amp;id=68e469f26a45552f36e9076b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8122-cwe-89-improper-neutralization-of-sp-46e2b9c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8122%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=high&amp;id=68dbac586e3c400c0ffa5e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8121-cwe-89-improper-neutralization-of-sp-3d47c63b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8121%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=high&amp;id=68dbac586e3c400c0ffa5e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8120-cwe-434-unrestricted-upload-of-file--44690427</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8120%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=critical&amp;id=68dbac586e3c400c0ffa5e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8119-cwe-352-cross-site-request-forgery-c-af8d96e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8119%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=medium&amp;id=68dbac586e3c400c0ffa5e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8118-cwe-307-improper-restriction-of-exce-0e889e8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8118%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=medium&amp;id=68dbac586e3c400c0ffa5dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8117-cwe-909-missing-initialization-of-re-b2142ebf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8117%3A%20CWE-909%20Missing%20Initialization%20of%20Resource%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=high&amp;id=68dbac586e3c400c0ffa5dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8116-cwe-79-improper-neutralization-of-in-c48c6b03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=medium&amp;id=68dbac586e3c400c0ffa5df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7065-cwe-434-unrestricted-upload-of-file--9377e05c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7065%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=critical&amp;id=68dbac586e3c400c0ffa5df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7063-cwe-434-unrestricted-upload-of-file--f9d21ef6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7063%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Polska%20Akademia%20Dost%C4%99pno%C5%9Bci%20PAD%20CMS&amp;severity=critical&amp;id=68dbac586e3c400c0ffa5df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-flags-ai-phishing-attack-hiding-in-svg-f-d454ac2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Flags%20AI%20Phishing%20Attack%20Hiding%20in%20SVG%20Files&amp;severity=medium&amp;id=68dbab8d1ffc5e5475e59bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asahi-halts-ordering-shipping-and-customer-service-3e772c34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asahi%20halts%20ordering%2C%20shipping%2C%20and%20customer%20service%20after%20cyberattack&amp;severity=medium&amp;id=68dba79e9cc38c2ec92e5025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-sounds-alarm-on-critical-sudo-flaw-actively-e-c47fc4ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Sounds%20Alarm%20on%20Critical%20Sudo%20Flaw%20Actively%20Exploited%20in%20Linux%20and%20Unix%20Systems&amp;severity=critical&amp;id=68dba208cbeea856edd1bafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-shinyhunters-restructure-new-atta-58933406</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%2C%20ShinyHunters%20Restructure%20-%20New%20Attacks%20Underway&amp;severity=medium&amp;id=68dba209cbeea856edd1bb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-trojan-datzbro-tricking-elderly-with-a-bba91f34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Trojan%20%E2%80%9CDatzbro%E2%80%9D%20Tricking%20Elderly%20with%20AI-Generated%20Facebook%20Travel%20Events&amp;severity=medium&amp;id=68e467476a45552f36e85bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/klopatra-exposing-a-new-android-banking-trojan-ope-55f3b5e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Klopatra%3A%20exposing%20a%20new%20Android%20banking%20trojan%20operation%20with%20roots%20in%20Turkey%20%7C%20Cleafy%20LABS&amp;severity=medium&amp;id=68db9fa0e0aba895b36c4866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-enterprise-defense-to-secure-the-modern-a-64052a2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20Enterprise%20Defense%20to%20Secure%20the%20Modern%20AI%20Supply%20Chain&amp;severity=medium&amp;id=68e467476a45552f36e85c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-police-just-seized-55-billion-in-bitcoin-the-wo-da1d49f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.K.%20Police%20Just%20Seized%20%C2%A35.5%20Billion%20in%20Bitcoin%20%E2%80%94%20The%20World%E2%80%99s%20Largest%20Crypto%20Bust&amp;severity=medium&amp;id=68e467476a45552f36e85c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-voice-cloning-raises-vishing-risks-958ce244</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Powered%20Voice%20Cloning%20Raises%20Vishing%20Risks&amp;severity=medium&amp;id=68e469f26a45552f36e9076e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-sounds-alarm-on-critical-sudo-flaw-actively-e-962c980c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Sounds%20Alarm%20on%20Critical%20Sudo%20Flaw%20Actively%20Exploited%20in%20Linux%20and%20Unix%20Systems&amp;severity=critical&amp;id=68e467476a45552f36e85c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11163-cwe-284-improper-access-control-in--1833562c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11163%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpmudev%20SmartCrawl%20SEO%20checker%2C%20analyzer%20%26%20optimizer&amp;severity=medium&amp;id=68db6be4e3e4268bc5ca6662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-profile-conti-ransomware-group-dc0f138b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Profile%3A%20Conti%20Ransomware%20Group&amp;severity=medium&amp;id=68db93c93772af9d5319a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11149-denial-of-service-dos-in-node-stati-54455e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11149%3A%20Denial%20of%20Service%20(DoS)%20in%20node-static&amp;severity=high&amp;id=68dc2b910f4bd9873cf3a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11148-command-injection-in-check-branches-2a7b1923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11148%3A%20Command%20Injection%20in%20check-branches&amp;severity=critical&amp;id=68dc2b910f4bd9873cf3a454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7052-cwe-352-cross-site-request-forgery-c-ef57fd3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7052%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=68db5dce3dea812c77a6ce67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7038-cwe-288-authentication-bypass-using--0b905191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7038%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=high&amp;id=68db5dce3dea812c77a6ce60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6941-cwe-79-improper-neutralization-of-in-441ab934</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=68db5dce3dea812c77a6ce5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6815-cwe-79-improper-neutralization-of-in-bd93274f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=68db5dce3dea812c77a6ce55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59668-null-pointer-dereference-in-nihon-k-416d4a22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59668%3A%20NULL%20pointer%20dereference%20in%20NIHON%20KOHDEN%20CORPORATION%20Central%20Monitor%20CNS-6201&amp;severity=high&amp;id=68dbfce0c26e85889f7966af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10196-cwe-79-improper-neutralization-of-i-33344384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sdebois%20Survey%20Anyplace&amp;severity=medium&amp;id=68db52aea473ffe031e447aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9946-cwe-352-cross-site-request-forgery-c-74d87bde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9946%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lockerpress%20LockerPress%20%E2%80%93%20WordPress%20Security%20Plugin&amp;severity=medium&amp;id=68db52afa473ffe031e447fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8214-cwe-79-improper-neutralization-of-in-3ac62182</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8214%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addon&amp;severity=medium&amp;id=68db52afa473ffe031e447c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10128-cwe-80-improper-neutralization-of-s-4d6d1df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10128%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20michaellow%20Eulerpool%20Research%20Systems&amp;severity=medium&amp;id=68db52aea473ffe031e44787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8608-cwe-79-improper-neutralization-of-in-d7f65226</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mihdan%20Mihdan%3A%20Elementor%20Yandex%20Maps&amp;severity=medium&amp;id=68db52afa473ffe031e447d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10189-cwe-79-improper-neutralization-of-i-4d01bed3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrwulf%20BP%20Direct%20Menus&amp;severity=medium&amp;id=68db52aea473ffe031e447a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9991-cwe-98-improper-control-of-filename--4dd3199d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9991%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20migli%20Tiny%20Bootstrap%20Elements%20Light&amp;severity=high&amp;id=68db52afa473ffe031e44804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10168-cwe-79-improper-neutralization-of-i-c7f07474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10168%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mucasoft%20Any%20News%20Ticker&amp;severity=medium&amp;id=68db52aea473ffe031e44794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9948-cwe-352-cross-site-request-forgery-c-dc2ae7ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9948%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20paulq%20Chat%20by%20Chatwee&amp;severity=medium&amp;id=68db52afa473ffe031e447ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10182-cwe-79-improper-neutralization-of-i-c19b0b76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20john-ackers%20dbview&amp;severity=medium&amp;id=68db52aea473ffe031e4479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8559-cwe-22-improper-limitation-of-a-path-6baf11c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8559%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sanzeeb3%20All%20in%20One%20Music%20Player&amp;severity=medium&amp;id=68db52afa473ffe031e447c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8624-cwe-79-improper-neutralization-of-in-4d3d8ba1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Nexa%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=68db52afa473ffe031e447df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10191-cwe-79-improper-neutralization-of-i-d68d3517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fusedsoftware%20Big%20Post%20Shipping%20for%20WooCommerce&amp;severity=medium&amp;id=68db52aea473ffe031e447a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8623-cwe-79-improper-neutralization-of-in-90a8aa04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bmoredrew%20WeedMaps%20Menu%20for%20WordPress&amp;severity=medium&amp;id=68db52afa473ffe031e447da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9762-cwe-78-improper-neutralization-of-sp-0eac9022</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9762%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20westi%20Post%20By%20Email&amp;severity=critical&amp;id=68db52afa473ffe031e447e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10131-cwe-79-improper-neutralization-of-i-1b83e6ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codiblog%20All%20Social%20Share%20Options&amp;severity=medium&amp;id=68db52aea473ffe031e44790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9993-cwe-98-improper-control-of-filename--fb9fb0b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9993%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20d3rd4v1d%20Bei%20Fen%20%E2%80%93%20WordPress%20Backup%20Plugin&amp;severity=high&amp;id=68db52afa473ffe031e44809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9852-cwe-79-improper-neutralization-of-in-3dcbf936</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20momostefan%20Yoga%20Schedule%20Momoyoga&amp;severity=medium&amp;id=68db52afa473ffe031e447eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8560-cwe-79-improper-neutralization-of-in-aedda588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghosttoast%20FancyTabs&amp;severity=medium&amp;id=68db52afa473ffe031e447cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10000-cwe-434-unrestricted-upload-of-file-5a1abb9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10000%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20patrickposner%20Qyrr%20%E2%80%93%20simply%20and%20modern%20QR-Code%20creation&amp;severity=medium&amp;id=68db52aea473ffe031e44783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10130-cwe-79-improper-neutralization-of-i-268faf8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stripeswp%20Layers&amp;severity=medium&amp;id=68db52aea473ffe031e4478b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8625-cwe-321-use-of-hard-coded-cryptograp-d75a4a6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8625%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20copypressdev%20Copypress%20Rest%20API&amp;severity=critical&amp;id=68db52afa473ffe031e447e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10179-cwe-79-improper-neutralization-of-i-ef5af4e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10179%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20myaskai%20My%20AskAI&amp;severity=medium&amp;id=68db52aea473ffe031e44799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8566-cwe-79-improper-neutralization-of-in-29e73242</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8566%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cssigniterteam%20GutenBee%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=68db52afa473ffe031e447d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10991-vulnerability-in-tp-link-systems-in-36e93e7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10991%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20Tapo%20D230S1%20V1.20&amp;severity=high&amp;id=68db2174a473ffe031e293ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55017-na-2d94af28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55017%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c3b66c7f7acdd3e9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-30-69b2755e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-30&amp;severity=medium&amp;id=68dc73165d588c52e5de5738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56301-na-1bede414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56301%3A%20n%2Fa&amp;severity=high&amp;id=68dc71325d588c52e5de477c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56207-na-2f01eb3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56207%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de4779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28016-na-b7f2d580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28016%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de4776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52049-na-1c414d1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52049%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de4772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52050-na-8c9f0e81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52050%3A%20n%2Fa&amp;severity=medium&amp;id=68dc71325d588c52e5de476e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56392-na-fdecdbe5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56392%3A%20n%2Fa&amp;severity=high&amp;id=68dc71325d588c52e5de476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61792-cwe-362-concurrent-execution-using--932ba9dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61792%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Quadient%20DS-700%20iQ&amp;severity=medium&amp;id=68dc71325d588c52e5de4764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56132-na-3f95ab0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56132%3A%20n%2Fa&amp;severity=high&amp;id=68dc27b1f4713a97a9e907e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56675-cwe-669-incorrect-resource-transfer-be8b10ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56675%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20EKEN%20video%20doorbell%20T6&amp;severity=low&amp;id=68dc1e4eda058bed8e684ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56200-na-4a9b4e34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56200%3A%20n%2Fa&amp;severity=medium&amp;id=68dc15a24cea8c94888a26c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56513-na-5db6394e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56513%3A%20n%2Fa&amp;severity=critical&amp;id=68dc1411c0dd278f0e2a225d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57254-na-3cc0588e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57254%3A%20n%2Fa&amp;severity=medium&amp;id=68dc11b7f7438576f4f7d413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56520-na-22d7b902</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56520%3A%20n%2Fa&amp;severity=medium&amp;id=68dc0f5ee5d0c285ebb3d67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55797-na-46b9357b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55797%3A%20n%2Fa&amp;severity=medium&amp;id=68dbfe6f055163c02d473839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56572-na-092c6565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56572%3A%20n%2Fa&amp;severity=high&amp;id=68dbfb4a5fb4e84ba9305f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56571-na-017cf134</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56571%3A%20n%2Fa&amp;severity=high&amp;id=68dbfb4a5fb4e84ba9305f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56018-na-23549a94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56018%3A%20n%2Fa&amp;severity=medium&amp;id=68dbfb4a5fb4e84ba9305f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56676-na-dc21ce36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56676%3A%20n%2Fa&amp;severity=medium&amp;id=68dbf9a6e965c789fc619918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52047-na-1595aca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52047%3A%20n%2Fa&amp;severity=medium&amp;id=68dbe4577491dc7f348b7539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52043-na-3f3cf41a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52043%3A%20n%2Fa&amp;severity=medium&amp;id=68dbe4577491dc7f348b7535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59956-cwe-350-reliance-on-reverse-dns-res-f9801434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59956%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20coder%20agentapi&amp;severity=medium&amp;id=68db2175a473ffe031e293b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58040-cwe-338-use-of-cryptographically-we-790f6a8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58040%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20QWER%20Crypt%3A%3ARandomEncryption&amp;severity=critical&amp;id=68e0f3c4b66c7f7acdd3ea29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59954-cwe-94-improper-control-of-generati-27061490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59954%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20KnowageLabs%20Knowage-Server&amp;severity=critical&amp;id=68db1ba69eb02b06e7e4affc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59952-cwe-20-improper-input-validation-in-9329c983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59952%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20minio%20minio-java&amp;severity=high&amp;id=68db1fa6a473ffe031e2788b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59942-cwe-190-integer-overflow-or-wraparo-771f0441</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59942%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20filecoin-project%20go-f3&amp;severity=high&amp;id=68db1fa6a473ffe031e2788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59941-cwe-305-authentication-bypass-by-pr-0a380493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59941%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20filecoin-project%20go-f3&amp;severity=medium&amp;id=68db1fa6a473ffe031e27892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43817-cwe-79-cross-site-scripting-in-life-67c71c7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43817%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e27899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36245-cwe-78-improper-neutralization-of-s-2f4b9195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36245%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=68db1fa6a473ffe031e27896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59940-cwe-20-improper-input-validation-in-137fec12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59940%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20mondeja%20mkdocs-include-markdown-plugin&amp;severity=medium&amp;id=68db1fa6a473ffe031e278a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59937-cwe-88-improper-neutralization-of-a-1ee81b63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59937%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20wneessen%20go-mail&amp;severity=high&amp;id=68db1fa6a473ffe031e2789f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43813-cwe-22-path-traversal-in-liferay-po-8a0d335f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43813%3A%20CWE-22%3A%20Path%20Traversal%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e2789c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43812-cwe-79-cross-site-scripting-in-life-845ab6a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43812%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db060a2f6a52bf6c323ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43811-cwe-79-cross-site-scripting-in-life-2b947dbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43811%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e278ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59163-cwe-350-reliance-on-reverse-dns-res-eda85696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59163%3A%20CWE-350%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20in%20safedep%20vet&amp;severity=low&amp;id=68db1fa7a473ffe031e278bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43820-cwe-79-cross-site-scripting-in-life-e7b22d1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43820%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68db1fa6a473ffe031e278ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iot-security-flounders-amid-churning-risk-aea1e7ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoT%20Security%20Flounders%20Amid%20Churning%20Risk&amp;severity=medium&amp;id=68e469f26a45552f36e90771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43818-cwe-79-cross-site-scripting-in-life-3f5aafa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43818%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68dafd8cdd654ac92628bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43815-cwe-79-improper-neutralization-of-i-05eb1a47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68daf8e9d2edde9b66264019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sneaky-malicious-mcp-server-exfiltrates-secrets-vi-3a7aab6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sneaky%2C%20Malicious%20MCP%20Server%20Exfiltrates%20Secrets%20via%20BCC&amp;severity=medium&amp;id=68e469f26a45552f36e90774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30247-cwe-78-improper-neutralization-of-s-8d14c7d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30247%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Western%20Digital%20My%20Cloud&amp;severity=critical&amp;id=68daf69abe7b2c5b088d344b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-hits-sonicwall-vpns-in-broad-ransomware-camp-1493c41a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Hits%20SonicWall%20VPNs%20in%20Broad%20Ransomware%20Campaign&amp;severity=medium&amp;id=68e469f26a45552f36e90777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34235-cwe-295-improper-certificate-valida-2148c2ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34235%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daf13ab7e37eb34163aac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34221-cwe-306-missing-authentication-for--539d89f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34221%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34215-cwe-306-missing-authentication-for--c767a88a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34215%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34224-cwe-306-missing-authentication-for--2f2232a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34224%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34220-cwe-306-missing-authentication-for--c83b34a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34220%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daefb54b0d68cddf56c5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34222-cwe-306-missing-authentication-for--ad8e9495</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34222%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34228-cwe-306-missing-authentication-for--63e78a5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34228%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34229-cwe-306-missing-authentication-for--89572015</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34229%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daefb54b0d68cddf56c612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34230-cwe-306-missing-authentication-for--e854b9f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34230%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daefb64b0d68cddf56c618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34231-cwe-306-missing-authentication-for--4f0a96e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34231%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb64b0d68cddf56c61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34225-cwe-306-missing-authentication-for--de20619d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34225%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34216-cwe-306-missing-authentication-for--d6296ff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34216%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34233-cwe693-protection-mechanism-failure-e95c1a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34233%3A%20CWE%E2%80%91693%20Protection%20Mechanism%20Failure%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb64b0d68cddf56c624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34207-cwe-522-insufficiently-protected-cr-58f550ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34207%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34223-cwe-798-use-of-hard-coded-credentia-d0c2d74e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34223%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daefb54b0d68cddf56c5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34212-cwe-494-download-of-code-without-in-4c092265</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34212%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68daefb54b0d68cddf56c5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34211-cwe-321-use-of-hard-coded-cryptogra-ecd64c85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34211%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34209-cwe-798-use-of-hard-coded-credentia-10399203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34209%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34234-cwe-321-use-of-hardcoded-cryptograp-0c3adfe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34234%3A%20CWE-321%20Use%20of%20Hard%E2%80%91coded%20Cryptographic%20Key%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34218-cwe-306-missing-authentication-for--326498fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34218%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68daee27ec38439ac41e3a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34232-cwe-306-missing-authentication-for--86fe99f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34232%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68daee27ec38439ac41e3a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-single-vulnerability-cve-2025-43400--335fc6cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400%2C%20(Mon%2C%20Sep%2029th)&amp;severity=medium&amp;id=68e46e546a45552f36e96980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45376-cwe-280-improper-handling-of-insuff-9d366c91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45376%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Dell%20Dell%20Repository%20Manager%20(DRM)&amp;severity=high&amp;id=68daea3ff2d6b484e3e84629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35034-cwe-79-improper-neutralization-of-i-ce5d218e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=medium&amp;id=68dae7e1c05da5c004a42960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35033-cwe-1236-improper-neutralization-of-902a83a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35033%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=medium&amp;id=68dae7e1c05da5c004a4295c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35032-cwe-434-unrestricted-upload-of-file-483dcfd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35032%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=68dae7e1c05da5c004a42958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35031-cwe-1295-debug-messages-revealing-u-7c02a092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35031%3A%20CWE-1295%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=low&amp;id=68dae7e1c05da5c004a42954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35030-cwe-352-cross-site-request-forgery--c5f6b83e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35030%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Medical%20Informatics%20Engineering%20Enterprise%20Health&amp;severity=high&amp;id=68dae7e1c05da5c004a42950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34196-cwe-798-use-of-hard-coded-credentia-a33832ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34196%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68dada9fcf5ae426d225ee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41252-cwe-203-observable-discrepancy-in-v-f1b2af09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41252%3A%20CWE-203%20Observable%20Discrepancy%20in%20VMware%20NSX&amp;severity=high&amp;id=68dad84b14cf74c068426806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evilai-malware-masquerades-as-ai-tools-to-infiltra-6e4e5028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EvilAI%20Malware%20Masquerades%20as%20AI%20Tools%20to%20Infiltrate%20Global%20Organizations&amp;severity=high&amp;id=68dad6bc78957a325c13e777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41251-cwe-640-weak-password-recovery-mech-b38c8df4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41251%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20vmware%20NSX&amp;severity=high&amp;id=68dad52838edf801b1798cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57871-cwe-79-improper-neutralization-of-i-d45252a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57872-cwe-601-url-redirection-to-untruste-74fa94d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57872%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57873-cwe-79-improper-neutralization-of-i-c3abf33c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57874-cwe-79-improper-neutralization-of-i-cff21167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57875-cwe-79-improper-neutralization-of-i-9a0ff3e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57877-cwe-79-improper-neutralization-of-i-585dd008</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57878-cwe-601-url-redirection-to-untruste-2162ef01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57878%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57879-cwe-601-url-redirection-to-untruste-e7210be7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57879%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57876-cwe-79-improper-neutralization-of-i-f11581c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=68dad2d15387373ba0f2cb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36099-cwe-770-allocation-of-resources-wit-5bdd8efe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36099%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=68dacfb938e990277d40876a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43400-processing-a-maliciously-crafted-fo-5fc2a3c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43400%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68dacc9fcb1797236e60a255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41250-cwe-77-improper-neutralization-of-s-9cbd3dc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41250%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20VMware%20vCenter&amp;severity=high&amp;id=68dac9871df083c7d5c131a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7104-cwe-915-improperly-controlled-modifi-6e9823c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7104%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68dabdf79d147c79351e02c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41245-cwe-1188-in-vmware-vmware-aria-oper-d83d8797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41245%3A%20CWE-1188%20in%20VMware%20VMware%20Aria%20Operations&amp;severity=medium&amp;id=68dab3b8bdc05a1fb23fae3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41244-cwe-267-in-vmware-vcf-operations-3ac057d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41244%3A%20CWE-267%20in%20VMware%20VCF%20operations&amp;severity=high&amp;id=68dab14e2d87401d280dfda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41246-cwe-863-incorrect-authorization-in--10a3af74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41246%3A%20CWE-863%20Incorrect%20Authorization%20in%20VMware%20Tools&amp;severity=high&amp;id=68daad45a142b006e54fd378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harrods-data-breach-430000-customer-records-stolen-e324a330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harrods%20Data%20Breach%3A%20430%2C000%20Customer%20Records%20Stolen%20Via%20Third-Party%20Attack&amp;severity=high&amp;id=68daa6c150257826091366dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11155-cwe-261-weak-encoding-for-password--f7cc7b10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11155%3A%20CWE-261%3A%20Weak%20Encoding%20for%20Password%20in%20SATO%20S86-ex%20203dpi&amp;severity=medium&amp;id=68daa6ce502578260913672f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-cops-spoofed-in-fileless-phishing-attack-a87d028b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Cops%20Spoofed%20in%20Fileless%20Phishing%20Attacks%20on%20Kyiv&amp;severity=medium&amp;id=68e469f26a45552f36e9077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36351-cwe-284-authentication-bypass-using-b2dd4883</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36351%3A%20CWE-284%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20IBM%20License%20Metric%20Tool&amp;severity=medium&amp;id=68da982a15f3c5a417dc16a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36352-cwe-79-improper-neutralization-of-i-37912c47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20License%20Metric%20Tool&amp;severity=medium&amp;id=68da982a15f3c5a417dc16ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13150-cwe-89-improper-neutralization-of-s-d4d5db37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13150%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Fayton%20Software%20and%20Consulting%20Services%20fayton.pro%20ERP&amp;severity=critical&amp;id=68e0f3c7b66c7f7acdd3eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/29th-september-threat-intelligence-report-80b90de6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=29th%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-set-up-anti-phishing-security-in-kaspersky--924f71cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20set%20up%20anti-phishing%20security%20in%20Kaspersky%20for%20Android%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e95753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/darkcloud-infostealer-relaunched-to-grab-credentia-6fffce17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DarkCloud%20Infostealer%20Relaunched%20to%20Grab%20Credentials%2C%20Crypto%20and%20Contacts&amp;severity=medium&amp;id=68da74d4045c927b2522a4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8868-cwe-200-exposure-of-sensitive-inform-0f357c73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8868%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Progress%20Software%20Chef%20Automate&amp;severity=critical&amp;id=68db1fa7a473ffe031e278d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6724-cwe-89-improper-neutralization-of-sp-ad237627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6724%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Progress%20Software%20Chef%20Automate&amp;severity=high&amp;id=68db1fa7a473ffe031e278d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11150-d9871bde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11150&amp;severity=null&amp;id=68dacfb938e990277d40876d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harrods-reveals-supply-chain-breach-impacting-onli-3f7288bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harrods%20Reveals%20Supply%20Chain%20Breach%20Impacting%20Online%20Customers&amp;severity=high&amp;id=68da58af1c73c30fea0e5390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lockbit-50-targets-windows-linux-esxi-eb7e8886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LockBit%205.0%20Targets%20Windows%2C%20Linux%2C%20ESXi&amp;severity=medium&amp;id=68da46bb648a8168815818d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-rat-delivered-via-shellcode-multi-stage-atta-183f899c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20RAT%20Delivered%20via%20Shellcode%3A%20Multi-Stage%20Attack%20Analysis&amp;severity=medium&amp;id=68da46bb648a8168815818d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/olymp-loader-a-new-malware-as-a-service-written-in-011178e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Olymp%20Loader%3A%20A%20new%20Malware-as-a-Service%20written%20in%20Assembly&amp;severity=medium&amp;id=68da477f0d493c953e7cd671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/potentially-unwanted-applications-puas-weaponized--761c1879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Potentially%20Unwanted%20Applications%20(PUAs)%20weaponized%20for%20covert%20delivery&amp;severity=medium&amp;id=68da4863b34724c7e2fd7fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48006-improper-restriction-of-xml-externa-781f81cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48006%3A%20Improper%20restriction%20of%20XML%20external%20entity%20reference%20in%20Saison%20Technology%20Co.%2CLtd.%20DataSpider%20Servista&amp;severity=high&amp;id=68db1fa7a473ffe031e278dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5200-cwe-79-cross-site-scripting-xss-in-p-6c7267eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5200%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Postie&amp;severity=medium&amp;id=68e0f3c5b66c7f7acdd3ea51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11141-os-command-injection-in-ruijie-nbr2-e2b48963</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11141%3A%20OS%20Command%20Injection%20in%20Ruijie%20NBR2100G-E&amp;severity=medium&amp;id=68db1fa7a473ffe031e278d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10504-cwe-122-heap-based-buffer-overflow--d8b81984</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ABB%20Terra%20AC%20wallbox&amp;severity=medium&amp;id=68db1fa7a473ffe031e278ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11140-xml-external-entity-reference-in-bj-941233de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11140%3A%20XML%20External%20Entity%20Reference%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=68da07a4c27c13ff57ca8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11139-path-traversal-in-bjskzy-zhiyou-erp-099b0216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11139%3A%20Path%20Traversal%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=68da015a49cfd472f5831785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11138-os-command-injection-in-mirweiye-we-ae51d2ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11138%3A%20OS%20Command%20Injection%20in%20mirweiye%20wenkucms&amp;severity=medium&amp;id=68d9fa5349cfd472f58152b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11137-cross-site-scripting-in-gstarsoft-g-bee9c657</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11137%3A%20Cross%20Site%20Scripting%20in%20Gstarsoft%20GstarCAD&amp;severity=medium&amp;id=68da7c77bcc355985f2b5cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11136-unrestricted-upload-in-yifang-cms-903838a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11136%3A%20Unrestricted%20Upload%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68d9ec4249cfd472f58041f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11135-deserialization-in-pmticket-project-43adaa4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11135%3A%20Deserialization%20in%20pmTicket%20Project-Management-Software&amp;severity=medium&amp;id=68d9e53a49cfd472f58008d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11134-cross-site-scripting-in-cudy-tr1200-b8433be9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11134%3A%20Cross%20Site%20Scripting%20in%20Cudy%20TR1200&amp;severity=medium&amp;id=68d9de3249cfd472f57c87fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-breaching-mfa-protected-sonicwall-191be991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20ransomware%20breaching%20MFA-protected%20SonicWall%20VPN%20accounts&amp;severity=high&amp;id=68d9dab449cfd472f57c71df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7698-cwe-125-out-of-bounds-read-in-canon--0f18c6f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7698%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=medium&amp;id=68d9de3249cfd472f57c8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9904-cwe-696-incorrect-behavior-order-in--60ce4fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9904%3A%20CWE-696%3A%20Incorrect%20Behavior%20Order%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=medium&amp;id=68d9de3249cfd472f57c880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9903-cwe-787-out-of-bounds-write-in-canon-0aeda4f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9903%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=medium&amp;id=68d9de3249cfd472f57c8808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fullhunt-open-source-39408-exploits-from-0daytoday-86bb2512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FullHunt%20%F0%9F%92%9C%20Open-Source%3A%2039%2C408%20Exploits%20from%200day.today%20is%20Back%20Online&amp;severity=medium&amp;id=68d9d72b49cfd472f579b057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11130-missing-authentication-in-ihongren--7a1af66f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11130%3A%20Missing%20Authentication%20in%20iHongRen%20pptp-vpn&amp;severity=high&amp;id=68d9d72a49cfd472f579b032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusa-ransomware-claims-comcast-data-breach-deman-032da118</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Medusa%20Ransomware%20Claims%20Comcast%20Data%20Breach%2C%20Demands%20%241.2M&amp;severity=high&amp;id=68d9d02149cfd472f57959b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11126-hard-coded-credentials-in-apeman-id-f63a45b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11126%3A%20Hard-coded%20Credentials%20in%20Apeman%20ID71&amp;severity=critical&amp;id=68d9ce3549cfd472f5795016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57412-na-30e1e559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57412%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-29-ff5cdc5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-29&amp;severity=medium&amp;id=68db216ea473ffe031e28fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56449-na-d76f3a8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56449%3A%20n%2Fa&amp;severity=high&amp;id=68db1fa7a473ffe031e278c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55795-na-281fea35</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55795%3A%20n%2Fa&amp;severity=low&amp;id=68db1fa7a473ffe031e278c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57266-na-2ae5c7df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57266%3A%20n%2Fa&amp;severity=critical&amp;id=68daea3ff2d6b484e3e8462c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56764-na-d693a9a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56764%3A%20n%2Fa&amp;severity=medium&amp;id=68dae7e1c05da5c004a42964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57424-na-f2a4b8a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57424%3A%20n%2Fa&amp;severity=high&amp;id=68dad52838edf801b1798cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56807-na-5fc5426d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56807%3A%20n%2Fa&amp;severity=medium&amp;id=68dacc9fcb1797236e60a25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57197-na-6cafbfa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57197%3A%20n%2Fa&amp;severity=medium&amp;id=68dac2946c49d694f9bd907c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57483-na-922d1ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57483%3A%20n%2Fa&amp;severity=high&amp;id=68dac04ba61193cb1a8a2190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56233-na-be9e1278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56233%3A%20n%2Fa&amp;severity=high&amp;id=68dabdf79d147c79351e02be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61659-cwe-377-insecure-temporary-file-in--27b4b04f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61659%3A%20CWE-377%20Insecure%20Temporary%20File%20in%20magicmonty%20bash-git-prompt&amp;severity=medium&amp;id=68dab94e936545403921621c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56234-na-4d70ea38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56234%3A%20n%2Fa&amp;severity=high&amp;id=68dab94e9365454039216219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51495-na-bb722e1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51495%3A%20n%2Fa&amp;severity=high&amp;id=68dab94e9365454039216213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56795-na-9113b2b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56795%3A%20n%2Fa&amp;severity=critical&amp;id=68dab55602c0cee7baf61d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57516-na-4c4e4bbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57516%3A%20n%2Fa&amp;severity=high&amp;id=68da982a15f3c5a417dc16af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57428-na-02d90bda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57428%3A%20n%2Fa&amp;severity=medium&amp;id=68da92e05fb35d5f62948633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11125-cross-site-scripting-in-langleyfcu--2fb8e622</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11125%3A%20Cross%20Site%20Scripting%20in%20langleyfcu%20Online%20Banking%20System&amp;severity=medium&amp;id=68d9c6ee9caa8e428e29d0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11124-cross-site-scripting-in-code-projec-080d8550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11124%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68d9ce3549cfd472f579501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11123-stack-based-buffer-overflow-in-tend-bfb6aa0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11123%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68d9b83dc6b35b90c30a3ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11122-stack-based-buffer-overflow-in-tend-e5991574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11122%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=68d9ce3549cfd472f5795023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11121-command-injection-in-tenda-ac18-9f75865b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11121%3A%20Command%20Injection%20in%20Tenda%20AC18&amp;severity=medium&amp;id=68d9ce3549cfd472f579502c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11120-buffer-overflow-in-tenda-ac8-ef461ad3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11120%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=68d9a4895caf7730a660807d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11119-cross-site-scripting-in-itsourcecod-ca52e230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11119%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d99d3728a6443cd4970ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11118-sql-injection-in-codeastro-student--84fc41e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11118%3A%20SQL%20Injection%20in%20CodeAstro%20Student%20Grading%20System&amp;severity=medium&amp;id=68d99688b966a587752dbb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11117-buffer-overflow-in-tenda-ch22-656c13b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11117%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68d98ed7da6b87fcc8fca724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11116-sql-injection-in-code-projects-simp-86b1983f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11116%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d987277554179dcb262790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11115-sql-injection-in-code-projects-simp-9f89161c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11115%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d980386591aad183f07cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11114-sql-injection-in-codeastro-online-l-c7a90cfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11114%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Leave%20Application&amp;severity=medium&amp;id=68d97af8bc6a13509115fa70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11113-sql-injection-in-codeastro-online-l-fab0feca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11113%3A%20SQL%20Injection%20in%20CodeAstro%20Online%20Leave%20Application&amp;severity=medium&amp;id=68d974c36031a9358c959a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11112-cross-site-scripting-in-phpgurukul--62546f07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11112%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=68d96bd7c3ae9676b3cf41db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11111-sql-injection-in-campcodes-advanced-588f75ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11111%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20Management%20System&amp;severity=medium&amp;id=68d963e6b675644cb601a668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-heap-exploitation-from-heap-overflow-to-ar-d03dbb8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Heap%20Exploitation%20-%20From%20Heap%20Overflow%20to%20Arbitrary%20R%2FW&amp;severity=medium&amp;id=68d96068f7c9c199916979d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11110-sql-injection-in-campcodes-online-l-5cf8ead5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11110%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d95cdf6dd299fc3f4ba59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11109-sql-injection-in-campcodes-computer-931cfc0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11109%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d956c29cc34a5a08126f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11108-sql-injection-in-code-projects-simp-3682cd60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11108%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d94fcc6b0e9d0a52738750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11107-sql-injection-in-code-projects-simp-c3868019</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11107%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d947dcbb80f31703d9c519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11106-sql-injection-in-code-projects-simp-a7773894</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11106%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d9ce3549cfd472f5795033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11105-sql-injection-in-code-projects-simp-662adf34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11105%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Scheduling%20System&amp;severity=medium&amp;id=68d9349fb9360513218c4c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11104-sql-injection-in-codeastro-electric-94410927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11104%3A%20SQL%20Injection%20in%20CodeAstro%20Electricity%20Billing%20System&amp;severity=medium&amp;id=68d92e77b92a55b72f034d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11103-unrestricted-upload-in-projectworld-b12215d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11103%3A%20Unrestricted%20Upload%20in%20Projectworlds%20Online%20Tours%20and%20Travels&amp;severity=medium&amp;id=68d917a2208e12cbe8df394b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11102-sql-injection-in-campcodes-online-l-64838289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11102%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d9ce3549cfd472f579503a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11101-sql-injection-in-itsourcecode-open--c3e9f676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11101%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d8df2fafce9a583e23ef78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11100-command-injection-in-d-link-dir-823-0f6cff66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11100%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d8d83686bcdf1cdb8b76d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11099-command-injection-in-d-link-dir-823-04193eea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11099%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d9ce3549cfd472f5795041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11098-command-injection-in-d-link-dir-823-8e422ff9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11098%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d8c9ef53264fd77f15183e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11097-command-injection-in-d-link-dir-823-e0b01262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11097%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d9ce3549cfd472f5795048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11096-command-injection-in-d-link-dir-823-2f3b477b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11096%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d8bbbb94f095cc8d909001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11095-command-injection-in-d-link-dir-823-4d5a4dc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11095%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d9ce3549cfd472f579504f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11094-sql-injection-in-code-projects-e-co-0fedd1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11094%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d8affe5d6228f86de0bf3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11092-command-injection-in-d-link-dir-823-805ad611</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11092%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d89e6a5d6228f86ddfa4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11091-buffer-overflow-in-tenda-ac21-c636529d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11091%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=68d897635d6228f86ddf2d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11090-sql-injection-in-itsourcecode-open--aeda70df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11090%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d88cdc5d6228f86dddbb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11089-sql-injection-in-kidaze-courseselec-bda05ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11089%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d87ec65d6228f86ddcb334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-28-1aab1102</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-28&amp;severity=medium&amp;id=68d9d01e49cfd472f57956c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11088-sql-injection-in-itsourcecode-open--4c98ba51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11088%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-microsoft-teams-installers-push-oyster-malwar-85aa3587</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Microsoft%20Teams%20installers%20push%20Oyster%20malware%20via%20malvertising&amp;severity=high&amp;id=68d870a66f70b44ea5888203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ohios-union-county-suffers-ransomware-attack-impac-4f7e5051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ohio%E2%80%99s%20Union%20County%20suffers%20ransomware%20attack%20impacting%2045%2C000%20people&amp;severity=medium&amp;id=68d870a66f70b44ea588820b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11083-heap-based-buffer-overflow-in-gnu-b-42f4d072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11083%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68d87cd15d6228f86ddc922a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11082-heap-based-buffer-overflow-in-gnu-b-7426b7a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11082%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11081-out-of-bounds-read-in-gnu-binutils-627730ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11081%3A%20Out-of-Bounds%20Read%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68d87cd15d6228f86ddc923e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11080-improper-authorization-in-zhuimengs-aff4ab90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11080%3A%20Improper%20Authorization%20in%20zhuimengshaonian%20wisdom-education&amp;severity=medium&amp;id=68d859aee2b9752dec525354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11079-file-and-directory-information-expo-38273c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11079%3A%20File%20and%20Directory%20Information%20Exposure%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68d85295d7f9d9c7bcfa2bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11078-unrestricted-upload-in-itsourcecode-d7e9c1c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11078%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d84aa323f504e55a7e3fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-is-the-first-time-ive-ever-found-chicken-in-a-e261a1bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20is%20the%20first%20time%20I&apos;ve%20ever%20found%20chicken%20in%20a%20public%20(storage)%20bucket.%20You&apos;re%20not%20ready%20for%20this%20masterpiece.&amp;severity=medium&amp;id=68d84720d7b3efc405b777f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11077-sql-injection-in-campcodes-online-l-cb3ee6f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11077%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d8447f1c0197ce5ba4800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11076-sql-injection-in-campcodes-online-l-cb3100f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11076%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d83c846f1be24301d853c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11075-sql-injection-in-campcodes-online-l-2a2b4221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11075%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d8358076282b26dbbfa827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11074-sql-injection-in-code-projects-proj-912fdd95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11074%3A%20SQL%20Injection%20in%20code-projects%20Project%20Monitoring%20System&amp;severity=medium&amp;id=68d82f89a61d1e3e38808fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11073-command-injection-in-keyfactor-rg-e-4fb12537</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11073%3A%20Command%20Injection%20in%20Keyfactor%20RG-EW5100BE&amp;severity=medium&amp;id=68d8272cc4b8961499c6ea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11071-sql-injection-in-seacms-b5fc3e56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11071%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=68d8206c8710982e4c769eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11070-sql-injection-in-projectworlds-onli-496b3ecb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11070%3A%20SQL%20Injection%20in%20Projectworlds%20Online%20Shopping%20System&amp;severity=medium&amp;id=68d819c0f98d3a6506964431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7647-cwe-378-creation-of-temporary-file-w-f720b2ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7647%3A%20CWE-378%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68d813d8c38eb2a1b8713fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11069-cross-site-scripting-in-westboy-cic-a02d6d57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11069%3A%20Cross%20Site%20Scripting%20in%20westboy%20CicadasCMS&amp;severity=medium&amp;id=68d813d8c38eb2a1b8713fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11068-cross-site-scripting-in-westboy-cic-2fa6e061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11068%3A%20Cross%20Site%20Scripting%20in%20westboy%20CicadasCMS&amp;severity=medium&amp;id=68d80d1139084229f5337fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11067-cross-site-scripting-in-projectworl-b7716501</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11067%3A%20Cross%20Site%20Scripting%20in%20Projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11066-sql-injection-in-code-projects-onli-73ef41c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11066%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc924e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11064-sql-injection-in-campcodes-online-l-6c7887e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11064%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11063-sql-injection-in-campcodes-online-l-e61de700</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11063%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11062-sql-injection-in-campcodes-online-l-93123059</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11062%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc9263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11061-sql-injection-in-campcodes-online-l-0c77c4b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11061%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d7dbd632b1dc6cfc30c795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11057-sql-injection-in-sourcecodester-pet-7ac00071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11057%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d7d47bbffa51b9449a73f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-fake-invoices-to-spread-xworm-rat-via--7a440033</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Fake%20Invoices%20to%20Spread%20XWorm%20RAT%20via%20Malicious%20Office%20Files&amp;severity=medium&amp;id=68d7c4412707e1ddffe13046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11056-sql-injection-in-projectsandprogram-cbef061d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11056%3A%20SQL%20Injection%20in%20ProjectsAndPrograms%20School%20Management%20System&amp;severity=medium&amp;id=68d87cd15d6228f86ddc926a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11055-sql-injection-in-sourcecodester-onl-adad1299</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11055%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d87cd25d6228f86ddc927a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11054-sql-injection-in-itsourcecode-open--80a94359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11054%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d7afe81660833d5ee9e775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11053-sql-injection-in-phpgurukul-small-c-2ad23b69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11053%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11052-sql-injection-in-kidaze-courseselec-671221c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11052%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9893-cwe-352-cross-site-request-forgery-c-b342faf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9893%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20milankyada%20VM%20Menu%20Reorder%20plugin&amp;severity=medium&amp;id=68d87cd25d6228f86ddc928e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9944-cwe-352-cross-site-request-forgery-c-79ce0dc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9944%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kelderic%20Professional%20Contact%20Form&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9898-cwe-352-cross-site-request-forgery-c-334e9965</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9898%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20compojoom%20cForms%20%E2%80%93%20Light%20speed%20fast%20Form%20Builder&amp;severity=medium&amp;id=68d87cd25d6228f86ddc929a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9899-cwe-352-cross-site-request-forgery-c-e7a07574</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9899%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20trustreviews%20Trust%20Reviews%20plugin%20for%20Google%2C%20Tripadvisor%2C%20Yelp%2C%20Airbnb%20and%20other%20platforms&amp;severity=medium&amp;id=68d87cd25d6228f86ddc929e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9894-cwe-352-cross-site-request-forgery-c-a287d3eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9894%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cristianr909090%20Sync%20Feedly&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9896-cwe-352-cross-site-request-forgery-c-3479a7ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20funnnny%20HidePost&amp;severity=medium&amp;id=68d87cd25d6228f86ddc9296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11051-cross-site-request-forgery-in-sourc-9d66c2c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11051%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3193-prototype-pollution-in-algoliasearch-097901a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3193%3A%20Prototype%20Pollution%20in%20algoliasearch-helper&amp;severity=high&amp;id=68d87cd25d6228f86ddc92bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10954-improper-validation-of-syntactic-co-b857a05f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10954%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20github.com%2Fnyaruka%2Fphonenumbers&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11050-improper-authorization-in-portabili-53d3d092</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11050%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d7695569faf04b7c596afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9816-cwe-79-improper-neutralization-of-in-06ff98c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20Simple%2C%20privacy-friendly%20Google%20Analytics%20alternative&amp;severity=high&amp;id=68d7695569faf04b7c596b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11049-improper-authorization-in-portabili-65068ccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11049%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d87cd25d6228f86ddc92c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10498-cwe-352-cross-site-request-forgery--a14528c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10498%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=68d7508979aa5c9d0857d8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10499-cwe-352-cross-site-request-forgery--558eb0ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10499%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=68d7508979aa5c9d0857d8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8440-cwe-79-improper-neutralization-of-in-9a027d46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spwebguy%20Team%20Members&amp;severity=medium&amp;id=68d7427979aa5c9d0857538f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36239-cwe-79-improper-neutralization-of-i-4d1c312b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Storage%20TS4500%20Library&amp;severity=medium&amp;id=68d7427979aa5c9d0857538c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43192-cwe-352-cross-site-request-forgery--06b066ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43192%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Storage%20TS4500%20Library&amp;severity=medium&amp;id=68e0f3c7b66c7f7acdd3eac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59945-cwe-266-incorrect-privilege-assignm-d3d73cef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59945%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Syslifters%20sysreptor&amp;severity=high&amp;id=68d73b6c79aa5c9d08560839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59932-cwe-284-improper-access-control-in--0c8bf7d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59932%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d73b6c79aa5c9d08560836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59939-cwe-89-improper-neutralization-of-s-b3c5ee7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59939%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68d7346479aa5c9d08557688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59936-cwe-116-improper-encoding-or-escapi-96a52517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59936%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20nearform%20get-jwks&amp;severity=critical&amp;id=68d7346479aa5c9d08557684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36144-cwe-532-insertion-of-sensitive-info-beb84e94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36144%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20watsonx.data&amp;severity=low&amp;id=68d730e279aa5c9d085546ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-27-147e99a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-27&amp;severity=medium&amp;id=68d87ebe5d6228f86ddcb0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59845-cwe-346-origin-validation-error-in--4acce862</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59845%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20apollographql%20embeddable-explorer&amp;severity=high&amp;id=68d7171e261b76bde8012a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11048-improper-authorization-in-portabili-a00699f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11048%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d72b6079aa5c9d0854f439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11047-improper-authorization-in-portabili-ae9dc414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11047%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d72b6079aa5c9d0854f432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10657-cwe-269-improper-privilege-manageme-68c902ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10657%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=68d7025dbc7d242638d7c86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11046-server-side-request-forgery-in-tenc-ccadf180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11046%3A%20Server-Side%20Request%20Forgery%20in%20Tencent%20WeKnora&amp;severity=medium&amp;id=68d6fff0e67893b049ed5375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11045-command-injection-in-wayos-lq04-d8b9cc18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11045%3A%20Command%20Injection%20in%20WAYOS%20LQ_04&amp;severity=medium&amp;id=68d6fa2b4787b50b9b4329bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-phishing-hits-ukraine-with-amatera-stealer-pur-3846f778</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Phishing%20hits%20Ukraine%20with%20Amatera%20Stealer%2C%20PureMiner&amp;severity=medium&amp;id=68da4fcd5fbdde62c760164d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11041-sql-injection-in-itsourcecode-open--69b3e9ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11041%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d6f394e3653e42a7283e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11040-sql-injection-in-code-projects-host-f8986289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11040%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d6f394e3653e42a7283e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volvo-employee-ssns-stolen-in-supplier-ransomware--a9b9271b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Volvo%20Employee%20SSNs%20Stolen%20in%20Supplier%20Ransomware%20Attack&amp;severity=medium&amp;id=68e469f26a45552f36e9077d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11039-sql-injection-in-campcodes-computer-2fc9c800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11039%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d6ec209a0af5971e60e6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11038-sql-injection-in-itsourcecode-onlin-5c4e17d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11038%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Clinic%20Management%20System&amp;severity=medium&amp;id=68d6ec209a0af5971e60e6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11037-sql-injection-in-code-projects-e-co-6a7deace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11037%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d6e4be631c4dd17dc9d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11036-sql-injection-in-code-projects-e-co-4e05a114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11036%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d6e4be631c4dd17dc9d933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-phantom-extension-backdooring-chrome-through-u-70706bcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Phantom%20Extension%3A%20Backdooring%20chrome%20through%20uncharted%20pathways&amp;severity=medium&amp;id=68d6de65d0242cefa1be0449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11035-xml-external-entity-reference-in-ji-9b652726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11035%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68d6de61d0242cefa1be041b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11034-path-traversal-in-dibo-data-decisio-fbf04357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11034%3A%20Path%20Traversal%20in%20Dibo%20Data%20Decision%20Making%20System&amp;severity=medium&amp;id=68d6de62d0242cefa1be0421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11033-sql-injection-in-kidaze-courseselec-22c6a926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11033%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d6d5a7721a41f476d92a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-scammers-have-mastered-ai-deepfakes-fake-websi-f736c34b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20scammers%20have%20mastered%20AI%3A%20deepfakes%2C%20fake%20websites%2C%20and%20phishing%20emails%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e95756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11032-sql-injection-in-kidaze-courseselec-02b5df58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11032%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68d6d342dc133514c6449453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11031-path-traversal-in-datatables-07b8aed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11031%3A%20Path%20Traversal%20in%20DataTables&amp;severity=medium&amp;id=68d6d342dc133514c644944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11030-improper-authorization-in-tutorials-e1145a93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11030%3A%20Improper%20Authorization%20in%20Tutorials-Website%20Employee%20Management%20System&amp;severity=medium&amp;id=68d6d342dc133514c6449444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11029-cross-site-request-forgery-in-givan-cdae3829</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11029%3A%20Cross-Site%20Request%20Forgery%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6c082ef60383855e1ad2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59844-cwe-78-improper-neutralization-of-s-abdec85f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59844%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonarSource%20sonarqube-scan-action&amp;severity=high&amp;id=68d6c082ef60383855e1ad37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ads-used-to-spread-trojan-disguised-as-trad-9de98198</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Ads%20Used%20to%20Spread%20Trojan%20Disguised%20as%20TradingView%20Premium&amp;severity=medium&amp;id=68d6bd68c8285d06b1f8bae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59843-cwe-359-exposure-of-private-persona-921b093f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59843%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlagForgeCTF%20flagForge&amp;severity=medium&amp;id=68d6bb0017bcb728eab3155b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11028-information-disclosure-in-givanz-vv-3d2e9507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11028%3A%20Information%20Disclosure%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6bb0017bcb728eab31555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11027-cross-site-scripting-in-givanz-vvve-5c660244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11027%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6bb0017bcb728eab3154f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-state-hackers-use-sslcom-certificates-to-s-14919e67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20State%20Hackers%20Use%20SSL.com%20Certificates%20to%20Sign%20Malware&amp;severity=medium&amp;id=68e469f26a45552f36e9078a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11026-information-disclosure-in-givanz-vv-ef3455cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11026%3A%20Information%20Disclosure%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68d6ac1736ec037b02fcaae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11019-cross-site-scripting-in-totaljs-cms-50d04156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11019%3A%20Cross%20Site%20Scripting%20in%20Total.js%20CMS&amp;severity=medium&amp;id=68d6a5c85686aca512dbede9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36326-cwe-321-use-of-hard-coded-cryptogra-ace23ee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36326%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20IBM%20Cognos%20Controller&amp;severity=low&amp;id=68d72b6179aa5c9d0854f47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36274-cwe-319-cleartext-transmission-of-s-df4301d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36274%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Aspera%20HTTP%20Gateway&amp;severity=high&amp;id=68d6a11b70abc604262e788c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6396-cwe-79-improper-neutralization-of-in-3d2f1aab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Webbeyaz%20Website%20Design%20Website%20Software&amp;severity=medium&amp;id=68d6a11b70abc604262e7893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11018-path-traversal-in-four-faith-water--d433d9e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11018%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68d69ecbfe14716afd8d9b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11017-null-pointer-dereference-in-ogrecav-808c4366</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11017%3A%20NULL%20Pointer%20Dereference%20in%20OGRECave%20Ogre&amp;severity=medium&amp;id=68d69ecbfe14716afd8d9b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-for-phishing-campaign-using-bitm-pages-e885506f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IOCs%20for%20phishing%20campaign%20using%20BitM%20pages&amp;severity=medium&amp;id=68d69af2bb2d0545928903c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prep-is-underway-but-2026-fifa-world-cup-poses-sig-23c028b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prep%20is%20Underway%2C%20But%202026%20FIFA%20World%20Cup%20Poses%20Significant%20Cyber%20Challenges&amp;severity=medium&amp;id=68e469f26a45552f36e9078d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11016-path-traversal-in-kalcaddle-kodbox-b3063f53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11016%3A%20Path%20Traversal%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=68d6f04fc05fe5ce539b34e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11015-mismatched-memory-management-routin-e176f000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11015%3A%20Mismatched%20Memory%20Management%20Routines%20in%20OGRECave%20Ogre&amp;severity=medium&amp;id=68d6f04fc05fe5ce539b34e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11025-cwe-201-insertion-of-sensitive-info-2a403648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11025%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Vimesoft%20Information%20Technologies%20and%20Software%20Inc.%20Vimesoft%20Corporate%20Messaging%20Platform&amp;severity=medium&amp;id=68d68c5d844c7fcfc6e06c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9267-cwe-427-uncontrolled-search-path-ele-22a1d274</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9267%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Seagate%20Toolkit&amp;severity=high&amp;id=68d72b6279aa5c9d0854f4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11014-heap-based-buffer-overflow-in-ogrec-6e0d303c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11014%3A%20Heap-based%20Buffer%20Overflow%20in%20OGRECave%20Ogre&amp;severity=medium&amp;id=68d68454446db3b7cfbd1064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11013-null-pointer-dereference-in-behavio-90135a53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11013%3A%20NULL%20Pointer%20Dereference%20in%20BehaviorTree&amp;severity=medium&amp;id=68d68454446db3b7cfbd105c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11060-incorrect-authorization-in-red-hat--34cc7105</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11060%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=68d68454446db3b7cfbd106b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11012-stack-based-buffer-overflow-in-beha-aa37cd38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11012%3A%20Stack-based%20Buffer%20Overflow%20in%20BehaviorTree&amp;severity=medium&amp;id=68d67b6d15851312793660d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11011-null-pointer-dereference-in-behavio-88b07eaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11011%3A%20NULL%20Pointer%20Dereference%20in%20BehaviorTree&amp;severity=medium&amp;id=68d67b6d15851312793660ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arcanedoor-threat-actor-resurfaces-in-continued-at-f3174e24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ArcaneDoor%20Threat%20Actor%20Resurfaces%20in%20Continued%20Attacks%20Against%20Cisco&amp;severity=high&amp;id=68d679d8777aff183e4c1841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11010-heap-based-buffer-overflow-in-vstak-94ce4c53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11010%3A%20Heap-based%20Buffer%20Overflow%20in%20vstakhov%20libucl&amp;severity=medium&amp;id=68d72b6279aa5c9d0854f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10544-cwe-434-unrestricted-upload-of-file-167892e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10544%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AvePoint%20DocAve&amp;severity=high&amp;id=68d66b42a36fdc65e40f724e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ukraine-police-notices-spread-new-amatera-ste-51520203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Ukraine%20Police%20Notices%20Spread%20New%20Amatera%20Stealer%20and%20PureMiner&amp;severity=medium&amp;id=68d66215f19eb20a2fa98cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/co-op-says-it-lost-107-million-after-scattered-spi-248636e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Co-op%20says%20it%20lost%20%24107%20million%20after%20Scattered%20Spider%20attack&amp;severity=high&amp;id=68d65acf01790ae50ff670d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unofficial-postmark-mcp-npm-silently-stole-users-e-1ec83bfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unofficial%20Postmark%20MCP%20npm%20silently%20stole%20users&apos;%20emails&amp;severity=high&amp;id=68d65acf01790ae50ff670d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-warns-of-new-xcsset-macos-malware-varian-b45be2d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20warns%20of%20new%20XCSSET%20macOS%20malware%20variant%20targeting%20Xcode%20devs&amp;severity=high&amp;id=68d65acf01790ae50ff670de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11021-out-of-bounds-read-in-red-hat-red-h-6555b8fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11021%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=68d6b4b791eb8c33bca9f9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60219-cwe-434-unrestricted-upload-of-file-2b86d959</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60219%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HaruTheme%20WooCommerce%20Designer%20Pro&amp;severity=null&amp;id=68d6b4b791eb8c33bca9f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60186-cwe-79-improper-neutralization-of-i-3ebd0ed1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Moss%20Google%2B%20Comments&amp;severity=null&amp;id=68d6b71e6694d7d085551510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60185-cwe-79-improper-neutralization-of-i-4b52990b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60185%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kontur.us%20kontur%20Admin%20Style&amp;severity=null&amp;id=68d692e2828ba7f61ebe57fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60184-cwe-79-improper-neutralization-of-i-3cba7690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60184%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20L.%20SEO%20Search%20Permalink&amp;severity=null&amp;id=68d692e1828ba7f61ebe57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60181-cwe-918-server-side-request-forgery-17dc3a7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60181%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=null&amp;id=68d692e1828ba7f61ebe57ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60179-cwe-79-improper-neutralization-of-i-81836f3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60179%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Space%20Studio%20Click%20%26amp%3B%20Tweet&amp;severity=medium&amp;id=68d692e1828ba7f61ebe57e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60177-cwe-79-improper-neutralization-of-i-d152bf52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rozx%20Recaptcha%20%26%238211%3B%20wp&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60173-cwe-352-cross-site-request-forgery--2df9965e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60173%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashwani%20kumar%20GST%20for%20WooCommerce&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60172-cwe-352-cross-site-request-forgery--f128fa08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60172%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flytedesk%20Flytedesk%20Digital&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60171-cwe-352-cross-site-request-forgery--99039d15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60171%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yourplugins%20Conditional%20Cart%20Messages%20for%20WooCommerce%20%26%238211%3B%20YourPlugins.com&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60170-cwe-352-cross-site-request-forgery--64fa9e67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60170%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taraprasad%20Swain%20HTACCESS%20IP%20Blocker&amp;severity=null&amp;id=68d72b6179aa5c9d0854f4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60169-cwe-352-cross-site-request-forgery--e58b42ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60169%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20W3S%20Cloud%20Technology%20W3SCloud%20Contact%20Form%207%20to%20Zoho%20CRM&amp;severity=null&amp;id=68d72b6179aa5c9d0854f4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60167-cwe-497-exposure-of-sensitive-syste-6dcb86f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60167%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20honzat%20Page%20Manager%20for%20Elementor&amp;severity=null&amp;id=68d6bb0017bcb728eab31561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60166-cwe-862-missing-authorization-in-wp-286d17a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60166%3A%20Missing%20Authorization%20in%20wpshuffle%20WP%20Subscription%20Forms%20PRO&amp;severity=null&amp;id=68d6bb0017bcb728eab3155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60165-cwe-862-missing-authorization-in-ha-2249690b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60165%3A%20Missing%20Authorization%20in%20HaruTheme%20Frames&amp;severity=null&amp;id=68d6bda8c8285d06b1f8f902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60164-cwe-352-cross-site-request-forgery--6d4340a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60164%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NewsMAN%20NewsmanApp&amp;severity=null&amp;id=68d6c082ef60383855e1ad3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60163-cwe-79-improper-neutralization-of-i-977f359f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60163%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robin%20W%20bbp%20topic%20count&amp;severity=null&amp;id=68d72b6179aa5c9d0854f462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60162-cwe-79-improper-neutralization-of-i-a6f0218c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60162%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=68d72b6079aa5c9d0854f44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60161-cwe-918-server-side-request-forgery-1b4a1033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60161%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bdthemes%20ZoloBlocks&amp;severity=null&amp;id=68d72b6079aa5c9d0854f449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60160-cwe-79-improper-neutralization-of-i-00910ddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60160%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sharkthemes%20Smart%20Related%20Products&amp;severity=null&amp;id=68d72b6079aa5c9d0854f446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60159-cwe-862-missing-authorization-in-we-d595ff36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60159%3A%20Missing%20Authorization%20in%20webmaniabr%20Nota%20Fiscal%20Eletr%C3%B4nica%20WooCommerce&amp;severity=null&amp;id=68d72b6179aa5c9d0854f49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60158-cwe-79-improper-neutralization-of-i-7c76f632</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60158%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webmaniabr%20Nota%20Fiscal%20Eletr%C3%B4nica%20WooCommerce&amp;severity=null&amp;id=68d6989183dae5453b6d11a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60157-cwe-79-improper-neutralization-of-i-7487580b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60157%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20WP%20Ticket%20Customer%20Service%20Software%20%26%20Support%20Ticket%20System&amp;severity=null&amp;id=68d69ecbfe14716afd8d9b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60156-cwe-352-cross-site-request-forgery--4ea44247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60156%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webandprint%20AR%20For%20WordPress&amp;severity=null&amp;id=68d6a11b70abc604262e7896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60155-cwe-862-missing-authorization-in-lo-bc113043</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60155%3A%20Missing%20Authorization%20in%20loopus%20WP%20Virtual%20Assistant&amp;severity=null&amp;id=68d72b6179aa5c9d0854f496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60154-cwe-79-improper-neutralization-of-i-49075a21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60154%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jennifer%20Moss%20MWW%20Disclaimer%20Buttons&amp;severity=null&amp;id=68d72b6379aa5c9d0854f51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60153-cwe-98-improper-control-of-filename-9be13b12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60153%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpshuffle%20Subscribe%20To%20Unlock&amp;severity=null&amp;id=68d692e1828ba7f61ebe57e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60152-cwe-862-missing-authorization-in-wp-e40d53a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60152%3A%20Missing%20Authorization%20in%20wpshuffle%20Subscribe%20To%20Unlock&amp;severity=null&amp;id=68d692e1828ba7f61ebe57e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60150-cwe-98-improper-control-of-filename-afe6e0f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60150%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=null&amp;id=68d692e1828ba7f61ebe57de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60149-cwe-79-improper-neutralization-of-i-c183a527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60149%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rocket%20Apps%20Notely&amp;severity=null&amp;id=68d692e1828ba7f61ebe57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60148-cwe-862-missing-authorization-in-wp-d31a6118</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60148%3A%20Missing%20Authorization%20in%20wpshuffle%20Subscribe%20to%20Download&amp;severity=null&amp;id=68d692e1828ba7f61ebe57d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60147-cwe-79-improper-neutralization-of-i-c54fc5af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60147%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Feed&amp;severity=null&amp;id=68d6a5c85686aca512dbedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60146-cwe-79-improper-neutralization-of-i-498d0ea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60146%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amit%20Verma%20Map%20Categories%20to%20Pages&amp;severity=null&amp;id=68d6a75c119dbca086c38a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60145-cwe-352-cross-site-request-forgery--ad85f2f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60145%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonifre%20Lenix%20scss%20compiler&amp;severity=null&amp;id=68d72b6179aa5c9d0854f490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60144-cwe-79-improper-neutralization-of-i-0cdfce47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60144%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonifre%20Lenix%20scss%20compiler&amp;severity=null&amp;id=68d72b6179aa5c9d0854f48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60142-cwe-79-improper-neutralization-of-i-6202f24c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DaganLev%20Simple%20Meta%20Tags&amp;severity=null&amp;id=68d692e1828ba7f61ebe57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60141-cwe-79-improper-neutralization-of-i-97f30e13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60141%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thetechtribe%20The%20Tribal&amp;severity=null&amp;id=68d692e1828ba7f61ebe57d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60140-cwe-201-insertion-of-sensitive-info-76fb0fbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60140%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20thetechtribe%20The%20Tribal&amp;severity=null&amp;id=68d72b6079aa5c9d0854f443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60139-cwe-352-cross-site-request-forgery--9dc7be92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60139%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Joovii%20Sendle%20Shipping&amp;severity=null&amp;id=68d72b6079aa5c9d0854f440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60138-cwe-79-improper-neutralization-of-i-35dab64d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60138%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=68d72b6179aa5c9d0854f468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60137-cwe-352-cross-site-request-forgery--1bfecabc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Galaxy%20Weblinks%20Post%20Featured%20Video&amp;severity=null&amp;id=68d72b6179aa5c9d0854f465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60136-cwe-79-improper-neutralization-of-i-58f2faff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartpauj%20User%20Notes&amp;severity=null&amp;id=68d72b6079aa5c9d0854f455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60133-cwe-79-improper-neutralization-of-i-db4b4afb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60133%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DJ-Extensions.com%20PE%20Easy%20Slider&amp;severity=null&amp;id=68d72b6079aa5c9d0854f452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60130-cwe-862-missing-authorization-in-we-d52fb743</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60130%3A%20Missing%20Authorization%20in%20wedos.com%20WEDOS%20Global&amp;severity=null&amp;id=68d72b6079aa5c9d0854f44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60128-cwe-862-missing-authorization-in-wp-84c5e197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60128%3A%20Missing%20Authorization%20in%20WP%20Delicious%20Delisho&amp;severity=null&amp;id=68d72b6179aa5c9d0854f48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60127-cwe-862-missing-authorization-in-ar-29247aa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60127%3A%20Missing%20Authorization%20in%20ArtistScope%20CopySafe%20Web%20Protection&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60126-cwe-98-improper-control-of-filename-73fd9e13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60126%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PluginOps%20Testimonial%20Slider&amp;severity=null&amp;id=68d692e0828ba7f61ebe57c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60125-cwe-201-insertion-of-sensitive-info-36f553f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60125%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20themelooks%20FoodBook&amp;severity=null&amp;id=68d692e0828ba7f61ebe57c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60124-cwe-79-improper-neutralization-of-i-a2dbbc44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Hellyer%20Simple%20Colorbox&amp;severity=null&amp;id=68d692e0828ba7f61ebe57bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60123-cwe-862-missing-authorization-in-hi-72e30ac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60123%3A%20Missing%20Authorization%20in%20HivePress%20HivePress%20Claim%20Listings&amp;severity=null&amp;id=68d692e0828ba7f61ebe57bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60122-cwe-862-missing-authorization-in-hi-3da0393d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60122%3A%20Missing%20Authorization%20in%20HivePress%20HivePress%20Claim%20Listings&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60121-cwe-862-missing-authorization-in-ex-11e32262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60121%3A%20Missing%20Authorization%20in%20Ex-Themes%20WooEvents&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60120-cwe-862-missing-authorization-in-wp-2981dd6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60120%3A%20Missing%20Authorization%20in%20WPDirectoryKit%20WP%20Directory%20Kit&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60118-cwe-89-improper-neutralization-of-s-00142826</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Potenzaglobalsolutions%20PGS%20Core&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60117-cwe-352-cross-site-request-forgery--168939bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60117%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TangibleWP%20Vehica%20Core&amp;severity=null&amp;id=68d72b6179aa5c9d0854f47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60116-cwe-862-missing-authorization-in-th-0a318c17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60116%3A%20Missing%20Authorization%20in%20ThemeGoods%20Grand%20Conference%20Theme%20Custom%20Post%20Type&amp;severity=null&amp;id=68d72b6179aa5c9d0854f477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60115-cwe-352-cross-site-request-forgery--5473b036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60115%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instapagedev%20Instapage%20Plugin&amp;severity=null&amp;id=68d72b6179aa5c9d0854f46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60114-cwe-94-improper-control-of-generati-6e61ee98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60114%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20YayCommerce%20YayCurrency&amp;severity=null&amp;id=68d72b6179aa5c9d0854f46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60113-cwe-352-cross-site-request-forgery--3d676e16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20grooni%20Groovy%20Menu&amp;severity=null&amp;id=68d692e0828ba7f61ebe57b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60112-cwe-79-improper-neutralization-of-i-80e4591f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=68d692e0828ba7f61ebe57ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60111-cwe-352-cross-site-request-forgery--e36a1982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60111%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20javothemes%20Javo%20Core&amp;severity=null&amp;id=68d692e0828ba7f61ebe57aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60110-cwe-89-improper-neutralization-of-s-12e88abb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60110%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20AllInOne%20-%20Banner%20Rotator&amp;severity=null&amp;id=68d72b6179aa5c9d0854f493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60109-cwe-89-improper-neutralization-of-s-fd1b5e7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60109%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Content%20Slider&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60108-cwe-89-improper-neutralization-of-s-4bd29716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60108%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Thumbnails&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60107-cwe-89-improper-neutralization-of-s-91b3fd8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60107%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20LambertGroup%20-%20AllInOne%20-%20Banner%20with%20Playlist&amp;severity=null&amp;id=68d6ac1736ec037b02fcaaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60106-cwe-862-missing-authorization-in-ro-f8411a74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60106%3A%20Missing%20Authorization%20in%20Roxnor%20EmailKit&amp;severity=null&amp;id=68d72b6179aa5c9d0854f474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60105-cwe-79-improper-neutralization-of-i-347d9583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60105%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaphorcreations%20Ditty&amp;severity=null&amp;id=68d72b6179aa5c9d0854f471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60104-cwe-79-improper-neutralization-of-i-4e0fbd32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60104%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Gallery%20Custom%20Links&amp;severity=null&amp;id=68d72b6379aa5c9d0854f51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60103-cwe-862-missing-authorization-in-cr-fc75f07a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60103%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=68d72b6379aa5c9d0854f518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60102-cwe-79-improper-neutralization-of-i-be735a61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syam%20Mohan%20WPFront%20User%20Role%20Editor&amp;severity=null&amp;id=68d69a346c7234617c8fd9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60099-cwe-79-improper-neutralization-of-i-2b50203d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awsm.in%20Embed%20Any%20Document&amp;severity=null&amp;id=68d69a346c7234617c8fd9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60100-cwe-80-improper-neutralization-of-s-84c7b1b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60100%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%208theme%20XStore&amp;severity=null&amp;id=68d72b6379aa5c9d0854f515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60101-improper-neutralization-of-input-du-b3b26950</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60101%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duongancol%20Woostify&amp;severity=null&amp;id=69cd7410e6bfc5ba1def503e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60098-cwe-862-missing-authorization-in-je-c5ba3ad6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60098%3A%20Missing%20Authorization%20in%20Jeff%20Farthing%20Theme%20My%20Login&amp;severity=null&amp;id=68d72b6379aa5c9d0854f508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60097-cwe-862-missing-authorization-in-co-298083a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60097%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem&amp;severity=null&amp;id=68d72b6379aa5c9d0854f505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60096-cwe-862-missing-authorization-in-co-0219e492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60096%3A%20Missing%20Authorization%20in%20CodexThemes%20TheGem%20(Elementor)&amp;severity=null&amp;id=68d72b6379aa5c9d0854f502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60095-cwe-201-insertion-of-sensitive-info-74fc05fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60095%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Benjamin%20Intal%20Stackable&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60094-cwe-862-missing-authorization-in-be-35ef1171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60094%3A%20Missing%20Authorization%20in%20Benjamin%20Intal%20Stackable&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60093-cwe-352-cross-site-request-forgery--1a329296</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjada%20Download%20Manager&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60092-cwe-497-exposure-of-sensitive-syste-42f1c19e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60092%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Shahjada%20Download%20Manager&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60040-cwe-79-improper-neutralization-of-i-d6890e5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fkrauthan%20wp-mpdf&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4957-cwe-79-improper-neutralization-of-in-0ee83745</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68d69bbb5823e76c4c18643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27006-cwe-79-improper-neutralization-of-i-08c84ded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeplugs%20Authorsy&amp;severity=null&amp;id=68d69bbb5823e76c4c18643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48107-cwe-79-improper-neutralization-of-i-bd2a8700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48107%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undsgn%20Uncode&amp;severity=null&amp;id=68d72b6179aa5c9d0854f499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48326-cwe-862-missing-authorization-in-ac-5aab6610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48326%3A%20Missing%20Authorization%20in%20Acclectic%20Media%20Acclectic%20Media%20Organizer&amp;severity=null&amp;id=68d72b6179aa5c9d0854f49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58914-cwe-352-cross-site-request-forgery--d5b26222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58914%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Di%20Themes%20Di%20Themes%20Demo%20Site%20Importer&amp;severity=null&amp;id=68d69ecbfe14716afd8d9b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58917-cwe-79-improper-neutralization-of-i-ccd22cf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20Verwymeren%20Quantities%20and%20Units%20for%20WooCommerce&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58919-cwe-862-missing-authorization-in-gu-a8ce9a7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58919%3A%20Missing%20Authorization%20in%20guihom%20Wide%20Banner&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59012-cwe-79-improper-neutralization-of-i-100f9f68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59002-cwe-22-improper-limitation-of-a-pat-7f1368ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59002%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59010-cwe-201-insertion-of-sensitive-info-da06db7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59010%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Maciej%20Bis%20Permalink%20Manager%20Lite&amp;severity=null&amp;id=68d72b6279aa5c9d0854f4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59011-cwe-862-missing-authorization-in-sh-11574461</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59011%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=68d72b6379aa5c9d0854f4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1862-cwe-434-unrestricted-upload-of-file--7a1bf76b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1862%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=68d72b6379aa5c9d0854f521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1396-vulnerability-in-wso2-wso2-identity--33faa5c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1396%3A%20CWE-203%20Observable%20Discrepancy%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=low&amp;id=68d646fc458ec434dfd2d0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54831-cwe-213-exposure-of-sensitive-infor-f5fb2b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54831%3A%20CWE-213%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Policies%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=68d642b69087ccfd2afd5d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35027-cwe-78-improper-neutralization-of-s-57149fc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35027%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Unitree%20Go2&amp;severity=high&amp;id=68d63a3cd03b6389fc3d0de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10490-cwe-79-improper-neutralization-of-i-47b84bf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=68d6368f9104bf76542472b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10136-cwe-79-improper-neutralization-of-i-995c7c59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20douglaskarr%20TweetThis%20Shortcode&amp;severity=medium&amp;id=68d6368f9104bf765424729f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10180-cwe-79-improper-neutralization-of-i-73b24b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10180%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jhoppe%20Markdown%20Shortcode&amp;severity=medium&amp;id=68d6368f9104bf76542472af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10137-cwe-918-server-side-request-forgery-cf3562b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10137%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20inc2734%20Snow%20Monkey&amp;severity=medium&amp;id=68d6368f9104bf76542472a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10307-cwe-22-improper-limitation-of-a-pat-d56bbc5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10307%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softaculous%20Backuply%20%E2%80%93%20Backup%2C%20Restore%2C%20Migrate%20and%20Clone&amp;severity=medium&amp;id=68d6368f9104bf76542472b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9490-cwe-79-improper-neutralization-of-in-c0feec88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popups%20Builder&amp;severity=medium&amp;id=68d625c5452d465b6e4d0619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10747-cwe-434-unrestricted-upload-of-file-9138534b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10747%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gamerz%20WP-DownloadManager&amp;severity=high&amp;id=68d625c5452d465b6e4d0610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10036-cwe-89-improper-neutralization-of-s-2eff1dce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10036%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9985-cwe-532-insertion-of-sensitive-infor-df823b7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9985%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9984-cwe-862-missing-authorization-in-mar-91702694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9984%3A%20CWE-862%20Missing%20Authorization%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10037-cwe-89-improper-neutralization-of-s-8ac3aaff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10037%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=68d6187890922828e6e3b94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11000-null-pointer-dereference-in-open-ba-0546b58c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11000%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=68d60d329e21be37e93b470d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10377-cwe-352-cross-site-request-forgery--081723c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10377%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20qriouslad%20System%20Dashboard&amp;severity=medium&amp;id=68d60d329e21be37e93b4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9044-cwe-79-improper-neutralization-of-in-d0a8f126</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mapster%20Mapster%20WP%20Maps&amp;severity=medium&amp;id=68d60d329e21be37e93b4714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10745-cwe-330-use-of-insufficiently-rando-3cf05f88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10745%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20specialk%20Banhammer%20%E2%80%93%20Monitor%20Site%20Traffic%2C%20Block%20Bad%20Users%20and%20Bots&amp;severity=medium&amp;id=68d60d329e21be37e93b4706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10173-cwe-862-missing-authorization-in-ro-2943e826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10173%3A%20CWE-862%20Missing%20Authorization%20in%20roxnor%20ShopEngine%20Elementor%20WooCommerce%20Builder%20Addon%20%E2%80%93%20All%20in%20One%20WooCommerce%20Solution&amp;severity=low&amp;id=68d60d329e21be37e93b46fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10999-null-pointer-dereference-in-open-ba-e33642ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10999%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=68d6062c9e21be37e93acc3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10998-null-pointer-dereference-in-open-ba-51b9a9df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10998%3A%20NULL%20Pointer%20Dereference%20in%20Open%20Babel&amp;severity=medium&amp;id=68d6062c9e21be37e93acc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10997-heap-based-buffer-overflow-in-open--b5df8006</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10997%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5ff229e21be37e93a76a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10996-heap-based-buffer-overflow-in-open--80da3d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10996%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5ff229e21be37e93a769a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10995-memory-corruption-in-open-babel-4f3b4a3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10995%3A%20Memory%20Corruption%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10994-use-after-free-in-open-babel-f65ff4fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10994%3A%20Use%20After%20Free%20in%20Open%20Babel&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10752-cwe-352-cross-site-request-forgery--30fb9893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10752%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8200-cwe-79-improper-neutralization-of-in-9ee142e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8200%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kraftplugins%20Mega%20Elements%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10178-cwe-79-improper-neutralization-of-i-61694d3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20Business%20Directory%20%E2%80%93%20Optimise%20and%20showcase%20local%20business&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8906-cwe-79-improper-neutralization-of-in-504afb4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustindex%20Widgets%20for%20Tiktok%20Feed&amp;severity=medium&amp;id=68d5f81a9e21be37e939ec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10993-code-injection-in-muyucms-dc0f5c3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10993%3A%20Code%20Injection%20in%20MuYuCMS&amp;severity=medium&amp;id=68d5f1129e21be37e93976ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10992-improper-authorization-in-roncoo-ro-807c2c99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10992%3A%20Improper%20Authorization%20in%20roncoo%20roncoo-pay&amp;severity=medium&amp;id=68d5f1129e21be37e93976b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10989-improper-authorization-in-yangzongz-20d7591a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10989%3A%20Improper%20Authorization%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=68d5e3049e21be37e93844d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10988-improper-authorization-in-yunaiv-ru-21599432</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10988%3A%20Improper%20Authorization%20in%20YunaiV%20ruoyi-vue-pro&amp;severity=medium&amp;id=68d5e3049e21be37e93844cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10987-improper-authorization-in-yunaiv-yu-74d93cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10987%3A%20Improper%20Authorization%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=68d5da069e21be37e937d02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10981-improper-authorization-in-jeecgboot-4061c98c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10981%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5da069e21be37e937d025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-26-202f4793</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-26&amp;severity=medium&amp;id=68d729d579aa5c9d0854568e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59362-na-57e80d49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59362%3A%20n%2Fa&amp;severity=medium&amp;id=68d6fa2b4787b50b9b4329d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55848-na-bfad1193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55848%3A%20n%2Fa&amp;severity=high&amp;id=68d6fa2b4787b50b9b4329ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26258-na-914348bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26258%3A%20n%2Fa&amp;severity=medium&amp;id=68d6fa2b4787b50b9b4329ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57692-na-0214a025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57692%3A%20n%2Fa&amp;severity=medium&amp;id=68d6e8d265371a9d75545af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58384-na-372c0abc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58384%3A%20n%2Fa&amp;severity=critical&amp;id=68d6d5a7721a41f476d92a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56383-na-47588b21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56383%3A%20n%2Fa&amp;severity=high&amp;id=68d6d410f1ae9b1f443404a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55847-na-3495b812</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55847%3A%20n%2Fa&amp;severity=high&amp;id=68d6ce8855cc370af661461a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45994-na-4bda6b6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45994%3A%20n%2Fa&amp;severity=high&amp;id=68d6ce8855cc370af6614616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58385-na-0d272ec3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58385%3A%20n%2Fa&amp;severity=high&amp;id=68d6b71e6694d7d08555150c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57292-na-a121fa93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57292%3A%20n%2Fa&amp;severity=medium&amp;id=68d6b0ce9ebdae9623c32eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56463-na-48efea09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56463%3A%20n%2Fa&amp;severity=medium&amp;id=68d6b0ce9ebdae9623c32ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55187-na-c8a5f04d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55187%3A%20n%2Fa&amp;severity=critical&amp;id=68d6a11b70abc604262e788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60251-cwe-306-missing-authentication-for--c9f3e86c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60251%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Unitree%20Go2&amp;severity=medium&amp;id=68d5e6869e21be37e938873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60250-cwe-321-use-of-hard-coded-cryptogra-1e871b42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60250%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Unitree%20Go2&amp;severity=medium&amp;id=68d5e6869e21be37e938873b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60017-cwe-78-improper-neutralization-of-s-206f95e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60017%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Unitree%20Go2&amp;severity=high&amp;id=68d5e6869e21be37e9388737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10980-improper-authorization-in-jeecgboot-d97da8ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10980%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5d2ab47dc232cc2f7e491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-signatures-detecting-lumma-stealer-with-an--4a502f36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20Signatures%3A%20Detecting%20Lumma%20Stealer%20with%20an%20ML-Powered%20Sandbox&amp;severity=medium&amp;id=68d6779375e7e97f9013399e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10979-improper-authorization-in-jeecgboot-76ff1337</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10979%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5da069e21be37e937d031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10978-improper-authorization-in-jeecgboot-592c2325</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10978%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68d5c33eadeba2ac3e9e5f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10977-improper-authorization-in-jeecgboot-a9c8048b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10977%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=68d5c33eadeba2ac3e9e5f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10976-improper-authorization-in-jeecgboot-7bbedfd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10976%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=low&amp;id=68d5bce02738e8358fa1962e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10975-deserialization-in-guanxinglu-vlarl-84a2ad49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10975%3A%20Deserialization%20in%20GuanxingLu%20vlarl&amp;severity=medium&amp;id=68d5b59634831eff076c22ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10974-deserialization-in-giantspatula-sew-9a61f15b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10974%3A%20Deserialization%20in%20giantspatula%20SewKinect&amp;severity=medium&amp;id=68d5b59634831eff076c22f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26482-cwe-1258-exposure-of-sensitive-syst-bbe45e12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26482%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20Dell%20PowerEdge%20R770&amp;severity=medium&amp;id=68d5b0d5a5b750d00e6b4b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10973-sql-injection-in-jackiedyh-resume-m-33504c61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10973%3A%20SQL%20Injection%20in%20JackieDYH%20Resume-management-system&amp;severity=medium&amp;id=68d5ae6ff728b01cbf7e14df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11005-cwe-78-improper-neutralization-of-s-acde5294</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11005%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=68d5a4d621839f32c6f2259f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43816-cwe-401-missing-release-of-memory-a-6f228f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43816%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d5da079e21be37e937d058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10967-sql-injection-in-mufen-mker-php-use-e3fb63d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10967%3A%20SQL%20Injection%20in%20MuFen-mker%20PHP-Usermm&amp;severity=medium&amp;id=68d5da079e21be37e937d052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10965-deserialization-in-lazyagi-lazyllm-c87437a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10965%3A%20Deserialization%20in%20LazyAGI%20LazyLLM&amp;severity=medium&amp;id=68d5da069e21be37e937d04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43993-cwe-428-unquoted-search-path-or-ele-5bbd6e69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43993%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Dell%20Wireless%205932e&amp;severity=high&amp;id=68d59bc858afd90a7d662e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10964-command-injection-in-wavlink-nu516u-11a36419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10964%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d59a07384a6c1fec5c37fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59817-cwe-77-improper-neutralization-of-s-62c96c83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59817%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zenitel%20TCIS-3%2B&amp;severity=high&amp;id=68d59a07384a6c1fec5c380d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59816-cwe-89-improper-neutralization-of-s-e06984a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59816%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=68d59a07384a6c1fec5c3809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59815-cwe-77-improper-neutralization-of-s-1f1b8c87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59815%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=68d59a07384a6c1fec5c3805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59814-cwe-89-improper-neutralization-of-s-ea0ee454</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59814%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zenitel%20ICX500&amp;severity=high&amp;id=68d59a07384a6c1fec5c3801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ciscos-wave-of-actively-exploited-zero-day-bugs-ta-a6ee9ddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco&apos;s%20Wave%20of%20Actively%20Exploited%20Zero-Day%20Bugs%20Targets%20Firewalls%2C%20IOS&amp;severity=medium&amp;id=68e469f26a45552f36e90790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-new-plugx-variant-abuses-dll-search-order-hi-84104983</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20new%20PlugX%20variant%20abuses%20DLL%20search%20order%20hijacking&amp;severity=medium&amp;id=68d5977082abd4e860dbde52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-drops-brickstorm-backdoors-on-edge-dev-67ea2ca5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Drops%20&apos;Brickstorm&apos;%20Backdoors%20on%20Edge%20Devices&amp;severity=medium&amp;id=68e469f26a45552f36e90793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10963-command-injection-in-wavlink-nu516u-39fc56b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10963%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d5985b1b02452dbc516200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10962-command-injection-in-wavlink-nu516u-c455cea6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10962%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d58ce367e88d0912c2c145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-asa-firewall-zero-days-exploited-in-32594d61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20ASA%20firewall%20zero-days%20exploited%20in%20attacks&amp;severity=high&amp;id=68d585a01eed5fe604593724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volvo-north-america-disclosed-a-data-breach-follow-441e5ad7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Volvo%20North%20America%20disclosed%20a%20data%20breach%20following%20a%20ransomware%20attack%20on%20IT%20provider%20Milj%C3%B6data&amp;severity=high&amp;id=68d584d1df58693707498d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-ai-agents-forced-to-leak-sensitive-data-24584e27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20AI%20Agents%20Forced%20to%20Leak%20Sensitive%20Data&amp;severity=medium&amp;id=68e469f26a45552f36e90796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10961-command-injection-in-wavlink-nu516u-d408fd2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10961%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d5866d384303d4316bb4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10960-command-injection-in-wavlink-nu516u-39d84b3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10960%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d5866d384303d4316bb4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10959-command-injection-in-wavlink-nu516u-547bdbab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10959%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d57e67e672e5bf72dcbaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10958-command-injection-in-wavlink-nu516u-711ab39b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10958%3A%20Command%20Injection%20in%20Wavlink%20NU516U1&amp;severity=medium&amp;id=68d57e67e672e5bf72dcbaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vietnamese-hackers-use-fake-copyright-notices-to-s-0ab5b523</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vietnamese%20Hackers%20Use%20Fake%20Copyright%20Notices%20to%20Spread%20Lone%20None%20Stealer&amp;severity=medium&amp;id=68d579a111274775d1091418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34227-cwe-78-improper-neutralization-of-s-891f7e62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34227%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nagios%20Nagios%20XI&amp;severity=high&amp;id=68d57805ed5018220eb18957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10880-cwe-522-insufficiently-protected-cr-a35fd05a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10880%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Dingtian%20DT-R002&amp;severity=high&amp;id=68d57020e272fbc5dc2d800f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10879-cwe-522-insufficiently-protected-cr-bfede555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10879%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Dingtian%20DT-R002&amp;severity=high&amp;id=68d57020e272fbc5dc2d800c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-primitive-crypto-theft-to-sophisticated-ai-ba-9ccfd471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeceptiveDevelopment%3A%20From%20primitive%20crypto%20theft%20to%20sophisticated%20AI-based%20deception&amp;severity=medium&amp;id=68d5944cf92361eae53e91ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xcsset-evolves-again-analyzing-the-latest-updates--8a1b1378</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XCSSET%20evolves%20again%3A%20Analyzing%20the%20latest%20updates%20to%20XCSSET&apos;s%20inventory&amp;severity=medium&amp;id=68d5905dc721681d7538d1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teen-suspected-of-vegas-casino-cyberattacks-releas-67193eac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Teen%20suspected%20of%20Vegas%20casino%20cyberattacks%20released%20to%20parents&amp;severity=high&amp;id=68d56daf8b0bcc090c43b033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-secure-are-passkeys-really-heres-what-you-need-0c18c8b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20secure%20are%20passkeys%2C%20really%3F%20Here&apos;s%20what%20you%20need%20to%20know&amp;severity=high&amp;id=68d56c1d8c285c7912be4d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20363-heap-based-buffer-overflow-in-cisco-e95eb40b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20363%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20IOS&amp;severity=critical&amp;id=68d56a80611617954beac295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20362-missing-authorization-in-cisco-cisc-0abfca33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20362%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=68d56a80611617954beac292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20333-buffer-copy-without-checking-size-o-c0dba447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20333%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=critical&amp;id=68d56a80611617954beac28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10953-buffer-overflow-in-utt-1200gw-e0e94239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10953%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68d5682325eee97faa1f4cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60019-null-pointer-dereference-c82b6dd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60019%3A%20NULL%20Pointer%20Dereference&amp;severity=low&amp;id=68d56693c17b2efb31c3d01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60018-out-of-bounds-read-e67b11c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60018%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=68d56693c17b2efb31c3d016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10952-information-disclosure-in-geyang-ml-3efdff5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10952%3A%20Information%20Disclosure%20in%20geyang%20ml-logger&amp;severity=medium&amp;id=68d56205919e15837c9c5a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-use-new-akdoortea-backdoor-to-b6efdfd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Use%20New%20AkdoorTea%20Backdoor%20to%20Target%20Global%20Crypto%20Developers&amp;severity=high&amp;id=68d55ef83768aa19ad4d4034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43943-cwe-78-improper-neutralization-of-s-58be7fe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43943%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Cloud%20Disaster%20Recovery&amp;severity=medium&amp;id=68d56a80611617954beac2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-forcedleak-vulnerability-in-salesforce-ag-47d05463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20ForcedLeak%20Vulnerability%20in%20Salesforce%20Agentforce%20AI%20Agent%20Exposed%20CRM%20Data&amp;severity=critical&amp;id=68d55d747985981ee483e2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26333-cwe-209-generation-of-error-message-1dd2b1a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26333%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Dell%20BSAFE%20Crypto-J&amp;severity=medium&amp;id=68d56a80611617954beac29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59841-cwe-384-session-fixation-in-flagfor-0c0a9e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59841%3A%20CWE-384%3A%20Session%20Fixation%20in%20FlagForgeCTF%20flagForge&amp;severity=critical&amp;id=68d5da079e21be37e937d09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10911-expired-pointer-dereference-in-red--ad3c5c39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10911%3A%20Expired%20Pointer%20Dereference&amp;severity=medium&amp;id=68d59bc858afd90a7d662e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33116-cwe-79-improper-neutralization-of-i-3eff7880</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Watson%20Studio%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=68d56a80611617954beac29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10951-path-traversal-in-geyang-ml-logger-59e4f519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10951%3A%20Path%20Traversal%20in%20geyang%20ml-logger&amp;severity=medium&amp;id=68d55a60971c2c3f09de9158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36601-cwe-200-exposure-of-sensitive-infor-6214d06a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36601%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=68d558e1bbd73d20e5f4081b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40838-cwe-522-insufficiently-protected-cr-33c0351f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40838%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=medium&amp;id=68d558e1bbd73d20e5f40821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40837-cwe-862-missing-authorization-in-er-59fe3125</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40837%3A%20CWE-862%20Missing%20Authorization%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d558e1bbd73d20e5f4081e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59838-cwe-79-improper-neutralization-of-i-fb619cac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monkeytypegame%20monkeytype&amp;severity=low&amp;id=68d558e1bbd73d20e5f40828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40836-cwe-20-improper-input-validation-in-03176d80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40836%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d5575aecede5b1064c44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59832-cwe-79-improper-neutralization-of-i-faba07be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59832%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=critical&amp;id=68d5575aecede5b1064c44b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27262-cwe-78-improper-neutralization-of-s-ca4aa4d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27262%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d555d5bcd404e045649dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36857-cwe-276-incorrect-default-permissio-30552de1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36857%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Rapid7%20Appspider%20Pro&amp;severity=low&amp;id=68d555d5bcd404e045649dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10542-cwe-1392-use-of-default-credentials-d4bdb270</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10542%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20iMonitor%20Software%20Inc.%20iMonitor%20EAM&amp;severity=critical&amp;id=68d5538429ad9c2ccd0a3db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10950-deserialization-in-geyang-ml-logger-1ca38c22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10950%3A%20Deserialization%20in%20geyang%20ml-logger&amp;severity=medium&amp;id=68d5538429ad9c2ccd0a3dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10949-cross-site-scripting-in-changsha-de-cbc3e521</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10949%3A%20Cross%20Site%20Scripting%20in%20Changsha%20Developer%20Technology%20iView%20Editor&amp;severity=medium&amp;id=68d5538429ad9c2ccd0a3db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10541-cwe-732-incorrect-permission-assign-f963b990</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10541%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20iMonitor%20Software%20Inc.%20iMonitor%20EAM&amp;severity=high&amp;id=68d5538429ad9c2ccd0a3dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59823-cwe-94-improper-control-of-generati-9e9e680c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59823%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20gardener%20gardener-extension-provider-aws&amp;severity=critical&amp;id=68d5511823f14e593ee333af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookworm-to-stately-taurus-using-the-attribution-f-7875d2e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bookworm%20to%20Stately%20Taurus%20Using%20the%20Attribution%20Framework&amp;severity=medium&amp;id=68d5905dc721681d7538d1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-worm-infects-npm-packages-67517ec1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shai-Hulud%20worm%20infects%20npm%20packages&amp;severity=medium&amp;id=68d5905dc721681d7538d1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10540-cwe-319-cleartext-transmission-of-s-db55c48c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10540%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20iMonitor%20Software%20Inc.%20iMonitor%20EAM&amp;severity=medium&amp;id=68d54e7be78e93d9c01760ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10948-buffer-overflow-in-mikrotik-routero-5b1b25fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10948%3A%20Buffer%20Overflow%20in%20MikroTik%20RouterOS&amp;severity=high&amp;id=68d54bd4b8fb385711ea40d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59426-cwe-601-url-redirection-to-untruste-6e7c5f2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59426%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=68d54bd4b8fb385711ea40db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59839-cwe-79-improper-neutralization-of-i-16346a34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59839%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenWiki%20mediawiki-extensions-EmbedVideo&amp;severity=high&amp;id=68d5511823f14e593ee333b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27261-cwe-89-improper-neutralization-of-s-e6c0217c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27261%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ericsson%20Indoor%20Connect%208855&amp;severity=high&amp;id=68d5538429ad9c2ccd0a3dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59834-cwe-77-improper-neutralization-of-s-810858f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59834%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20srmorete%20adb-mcp&amp;severity=critical&amp;id=68d54789ac522a786501f6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-cloud-service-disruptions-are-making-resilienc-2a393efd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Cloud%20Service%20Disruptions%20Are%20Making%20Resilience%20Critical%20for%20Developers&amp;severity=critical&amp;id=68e469f26a45552f36e90799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59831-cwe-77-improper-neutralization-of-s-776ce37f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59831%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20snowyu%20git-commiters.js&amp;severity=high&amp;id=68d54789ac522a786501f6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10467-cwe-79-improper-neutralization-of-i-f247353d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PROLIZ%20Computer%20Software%20Hardware%20Service%20Trade%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=high&amp;id=68d5da079e21be37e937d09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59422-cwe-284-improper-access-control-in--adfa4005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59422%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langgenius%20dify&amp;severity=medium&amp;id=68d5da079e21be37e937d0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5494-cwe-269-improper-privilege-managemen-3e572a75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5494%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zohocorp%20Endpoint%20Central&amp;severity=low&amp;id=68d541e7880f8ca3dd887c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10947-authorization-bypass-in-sistemas-pl-88cfb026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10947%3A%20Authorization%20Bypass%20in%20Sistemas%20Pleno%20Gest%C3%A3o%20de%20Loca%C3%A7%C3%A3o&amp;severity=medium&amp;id=68d53de3fd5656ece925daf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10946-cross-site-scripting-in-nuz007-smsb-09bf033e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10946%3A%20Cross%20Site%20Scripting%20in%20nuz007%20smsboom&amp;severity=medium&amp;id=68d53de3fd5656ece925daeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10449-cwe-22-improper-limitation-of-a-pat-2be8ea6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10449%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20Saysis%20Web%20Portal&amp;severity=high&amp;id=68d53de3fd5656ece925daf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10945-cross-site-scripting-in-nuz007-smsb-ccb77578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10945%3A%20Cross%20Site%20Scripting%20in%20nuz007%20smsboom&amp;severity=medium&amp;id=68d541e7880f8ca3dd887c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10944-cross-site-scripting-in-yi-ge-get-h-6999adde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10944%3A%20Cross%20Site%20Scripting%20in%20yi-ge%20get-header-ip&amp;severity=medium&amp;id=68d541e7880f8ca3dd887c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10943-cross-site-scripting-in-mikecen-wec-61b4ecd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10943%3A%20Cross%20Site%20Scripting%20in%20MikeCen%20WeChat-Face-Recognition&amp;severity=medium&amp;id=68d5324743ab49a6dbd6591f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10957-cwe-284-improper-access-control-in--a5610d7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10957%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Syrotech%20Networks%20Syrotech%20SY-GPON-2010-WADONT&amp;severity=high&amp;id=68d52c18ed49a32d85cd570f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rust-crates-steal-solana-and-ethereum-ke-1e596d3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Rust%20Crates%20Steal%20Solana%20and%20Ethereum%20Keys%20%E2%80%94%208%2C424%20Downloads%20Confirmed&amp;severity=high&amp;id=68d528f5e24b804ba5ca565e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40698-cwe-89-improper-neutralization-of-s-f783c08e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40698%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nedatec%20Consulting%20Prevengos&amp;severity=high&amp;id=68d525f3ffe4ae4539397db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10942-buffer-overflow-in-h3c-magic-b3-f6315552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10942%3A%20Buffer%20Overflow%20in%20H3C%20Magic%20B3&amp;severity=high&amp;id=68d523a21c4cbdeab7737b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10941-permission-issues-in-topaz-servcore-c3d29cfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10941%3A%20Permission%20Issues%20in%20Topaz%20SERVCore%20Teller&amp;severity=high&amp;id=68d523a21c4cbdeab7737b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-random-story-vbscripts-randomize-inter-b7a806a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20Random%20Story.%20VBScript&apos;s%20Randomize%20Internals.&amp;severity=medium&amp;id=68d51ef6e2e0da4db617259a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-cvss-10-flaw-in-goanywhere-file-transfer--6326b8f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20CVSS%2010%20Flaw%20in%20GoAnywhere%20File%20Transfer%20Threatens%2020%2C000%20Systems&amp;severity=critical&amp;id=68d51bd7e8d81b94073fdd3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10940-cross-site-scripting-in-totaljs-cms-d015dfd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10940%3A%20Cross%20Site%20Scripting%20in%20Total.js%20CMS&amp;severity=medium&amp;id=68d51b1690f1f33c6f4a1e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-furbo-a-hardware-research-project-part-5-e-5f10d1d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Furbo%20-%20A%20Hardware%20Research%20Project%20%E2%80%93%20Part%205%3A%20Exploiting%20BLE&amp;severity=medium&amp;id=68d51b1a90f1f33c6f4a1ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-hackers-hit-us-tech-firms-with-bricks-09696ac7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Hackers%20Hit%20US%20Tech%20Firms%20with%20BRICKSTORM%20Malware&amp;severity=medium&amp;id=68d511c5fb73ef7523214648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixed-actively-exploited-zero-day-in-cisco-i-dfe04cb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20fixed%20actively%20exploited%20zero-day%20in%20Cisco%20IOS%20and%20IOS%20XE%20software&amp;severity=critical&amp;id=68d50ba1fbffafbda1d8d1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-bringing-the-noise-adbb556d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20%E2%80%93%20Bringing%20the%20Noise&amp;severity=medium&amp;id=68d54d90ac1bc8e99ea1075e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompts-as-code-embedded-keys-the-hunt-for-llm-ena-da781beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompts%20as%20Code%20%26%20Embedded%20Keys%20%7C%20The%20Hunt%20for%20LLM-Enabled%20Malware&amp;severity=medium&amp;id=68d54d90ac1bc8e99ea10717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-rewrite-chinese-speaking-threat-actors-d-11e53419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Rewrite%3A%20Chinese-Speaking%20Threat%20Actors%20Deploy%20BadIIS%20in%20a%20Wide%20Scale%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=68d54f4fee8591765f469634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-online-speedtest-application-81dfe8ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Online%20Speedtest%20Application&amp;severity=medium&amp;id=68d5516523f14e593ee37144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-emerging-ddos-for-hire-botnet-bd8acff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20emerging%20DDoS%20for%20hire%20botnet&amp;severity=medium&amp;id=68d552bfee13037d38697208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10438-cwe-27-path-traversal-dirfilename-i-85109923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10438%3A%20CWE-27%20Path%20Traversal%3A%20&apos;dir%2F..%2F..%2Ffilename&apos;%20in%20Yordam%20Information%20Technology%20Consulting%20Education%20and%20Electrical%20Systems%20Industry%20Trade%20Inc.%20Yordam%20Katalog&amp;severity=high&amp;id=68d50baffbffafbda1d8d2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-contained-doesnt-mean-safe-in-modern-socs-6f2738c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20%E2%80%9Ccontained%E2%80%9D%20doesn%E2%80%99t%20mean%20%E2%80%9Csafe%E2%80%9D%20in%20modern%20SOCs&amp;severity=medium&amp;id=68d507d2afbf41d56563b961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21056-cwe-20-improper-input-validation-in-e72ee1b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21056%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Retail%20Mode&amp;severity=medium&amp;id=68d5da079e21be37e937d0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55557-na-385d7c93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55557%3A%20n%2Fa&amp;severity=high&amp;id=68d5da079e21be37e937d096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55556-na-106e2410</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55556%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da079e21be37e937d092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55554-na-9f6168ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55554%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da079e21be37e937d08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55553-na-c7c8ce91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55553%3A%20n%2Fa&amp;severity=high&amp;id=68d5da079e21be37e937d089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55552-na-94f15cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55552%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da079e21be37e937d085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55558-na-70efa2bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55558%3A%20n%2Fa&amp;severity=high&amp;id=68d5da079e21be37e937d080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59408-na-fe384ab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59408%3A%20n%2Fa&amp;severity=high&amp;id=68d5da069e21be37e937d046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59404-na-31f3e59a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59404%3A%20n%2Fa&amp;severity=high&amp;id=68d5da069e21be37e937d040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59402-na-b3114b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59402%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da069e21be37e937d03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56769-na-c4c55b32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56769%3A%20n%2Fa&amp;severity=medium&amp;id=68d5da069e21be37e937d037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-25-a47cf8d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-25&amp;severity=medium&amp;id=68d5d8739e21be37e93721bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57632-na-5fddaad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57632%3A%20n%2Fa&amp;severity=high&amp;id=68d5a008597989c5fdb74a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29156-na-6f43863e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29156%3A%20n%2Fa&amp;severity=medium&amp;id=68d58f789fccefb1f2be0d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29157-na-186a3ca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29157%3A%20n%2Fa&amp;severity=medium&amp;id=68d58ce367e88d0912c2c14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48707-na-d1c75d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48707%3A%20n%2Fa&amp;severity=high&amp;id=68d58265902a85114cc3a044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29155-na-1a055232</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29155%3A%20n%2Fa&amp;severity=medium&amp;id=68d580ce834f0486529e5af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57623-na-07c72b97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57623%3A%20n%2Fa&amp;severity=medium&amp;id=68d57cd0558a673da2800335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60249-cwe-79-improper-neutralization-of-i-705faf7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60249%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CIRCL%20vulnerability-lookup&amp;severity=medium&amp;id=68d57a717f709e48c38d3def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57446-na-0111accc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57446%3A%20n%2Fa&amp;severity=high&amp;id=68d56a80611617954beac298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55560-na-bdec813f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55560%3A%20n%2Fa&amp;severity=high&amp;id=68d5682325eee97faa1f4ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55559-na-06beeecf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55559%3A%20n%2Fa&amp;severity=high&amp;id=68d56205919e15837c9c5a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55551-na-003b24e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55551%3A%20n%2Fa&amp;severity=high&amp;id=68d558e1bbd73d20e5f40824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46153-na-f67db563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46153%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee333a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46152-na-da5ad851</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46152%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee333a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46150-na-a5369630</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46150%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee3339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46149-na-3a83907d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46149%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee33398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46148-na-16d5bd4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46148%3A%20n%2Fa&amp;severity=medium&amp;id=68d5511823f14e593ee33392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57317-na-b6602963</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57317%3A%20n%2Fa&amp;severity=high&amp;id=68d54e7be78e93d9c01760f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26278-na-cc3f0079</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26278%3A%20n%2Fa&amp;severity=high&amp;id=68d54e7be78e93d9c01760ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-supermicro-bmc-flaws-can-create-persistent-bac-9ce1a268</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Supermicro%20BMC%20flaws%20can%20create%20persistent%20backdoors&amp;severity=high&amp;id=68d4676795af6723ad453733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54520-cwe-1247-improper-protection-agains-e1c47753</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54520%3A%20CWE-1247%20%20Improper%20Protection%20Against%20Voltage%20and%20Clock%20Glitches%20in%20AMD%20Kintex%E2%84%A2%207-Series%20FPGA&amp;severity=high&amp;id=68d487f92f6beace9efc356e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-attackers-breach-federal-agency-via-critical--8f0b4f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%3A%20Attackers%20Breach%20Federal%20Agency%20via%20Critical%20GeoServer%20Flaw&amp;severity=critical&amp;id=68e469f26a45552f36e9079c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10894-embedded-malicious-code-dd656a23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10894%3A%20Embedded%20Malicious%20Code&amp;severity=critical&amp;id=68d487f92f6beace9efc3566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redisclosure-new-technique-for-exploiting-full-tex-830160e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ReDisclosure%3A%20New%20technique%20for%20exploiting%20Full-Text%20Search%20in%20MySQL%20(myBB%20case%20study)&amp;severity=high&amp;id=68d45f2b42da3d67ba36d943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59833-cwe-200-exposure-of-sensitive-infor-7e9af4c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59833%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d487f92f6beace9efc3571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59827-cwe-862-missing-authorization-in-fl-c5ed0def</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59827%3A%20CWE-862%3A%20Missing%20Authorization%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d453e8af778555c6843a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fall-of-scattered-spider-teen-member-surrender-35583819</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Fall%20of%20Scattered%20Spider%3F%20Teen%20Member%20Surrenders%20Amid%20Group&apos;s%20Shutdown%20Claims&amp;severity=medium&amp;id=68e469f26a45552f36e9079f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-targets-moldovan-election-in-disinformation-dd0a8062</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Targets%20Moldovan%20Election%20in%20Disinformation%20Play&amp;severity=medium&amp;id=68e469f26a45552f36e907a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59824-cwe-863-incorrect-authorization-in--576e0be5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59824%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20siderolabs%20omni&amp;severity=low&amp;id=68d487f92f6beace9efc3578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-ios-zero-day-vulnerability-exploite-84bafe4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20IOS%20zero-day%20vulnerability%20exploited%20in%20attacks&amp;severity=critical&amp;id=68d448a75cc31078ce44a101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59828-cwe-829-inclusion-of-functionality--9e0b47d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59828%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68d447f114a0e3bf04cbd2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59251-remote-code-execution-in-microsoft--51cba0b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59251%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=68d441f3006fc02db7d1f73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55322-cwe-1327-binding-to-an-unrestricted-beae1fb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55322%3A%20CWE-1327%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20Microsoft%20OmniParser&amp;severity=high&amp;id=68d441f3006fc02db7d1f737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55178-cwe-78-improper-neutralization-of-s-12d624a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55178%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Meta%20Platforms%2C%20Inc%20Llama%20Stack&amp;severity=medium&amp;id=68d43b319524cade097fb1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-flaw-in-oneplus-phones-lets-rogue-apps-t-f2b7f50b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20flaw%20in%20OnePlus%20phones%20lets%20rogue%20apps%20text%20messages&amp;severity=high&amp;id=68d4383098715fbf47f038f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-rednovember-target-global-governme-5d534e87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20RedNovember%20Target%20Global%20Governments%20Using%20Pantegana%20and%20Cobalt%20Strike&amp;severity=high&amp;id=68d436a858bf5b62d9cd8e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59525-cwe-79-improper-neutralization-of-i-35118202</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d4384798715fbf47f03b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59524-cwe-79-improper-neutralization-of-i-c241c072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59524%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d4352b82e2e362236e248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52907-cwe-20-improper-input-validation-in-69876063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52907%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=68d4352b82e2e362236e2475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20314-improper-handling-of-undefined-valu-6d4b4336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20314%3A%20Improper%20Handling%20of%20Undefined%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d4316e56f46ad084c135a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52906-cwe-78-improper-neutralization-of-s-4abc749a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52906%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TOTOLINK%20X6000R&amp;severity=critical&amp;id=68d42fee54b886c7946c3db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59343-cwe-22-improper-limitation-of-a-pat-e5756a8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59343%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mafintosh%20tar-fs&amp;severity=high&amp;id=68d42e6da3ef9dc8da572d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48867-cwe-79-improper-neutralization-of-i-48207c94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48867%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=68d42aa5b9c074a9a4466274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/python-software-foundation-warns-of-fake-pypi-logi-54a38742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Python%20Software%20Foundation%20Warns%20of%20Fake%20PyPI%20Login%20Site%20Stealing%20User%20Credentials&amp;severity=medium&amp;id=68d429e0b7cfebb6efe74f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-government-defense-and-technology-organiza-1f1f10ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20Government%2C%20Defense%2C%20and%20Technology%20Organizations&amp;severity=medium&amp;id=68d44a34f2b114103f06512a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48869-cwe-284-improper-access-control-in--49bc0c13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48869%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d428628faa9b2aaac16ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20316-improper-access-control-in-cisco-ci-5664271d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20316%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20293-incomplete-cleanup-in-cisco-cisco-i-fdf5deee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20293%3A%20Incomplete%20Cleanup%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20338-improper-neutralization-of-paramete-59c7234b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20338%3A%20Improper%20Neutralization%20of%20Parameter%2FArgument%20Delimiters%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428628faa9b2aaac16ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20240-incomplete-blacklist-to-cross-site--cbc522f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20240%3A%20Incomplete%20Blacklist%20to%20Cross-Site%20Scripting%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20149-buffer-copy-without-checking-size-o-433d240a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20149%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20IOS&amp;severity=medium&amp;id=68d428618faa9b2aaac16a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20313-path-traversal-in-cisco-cisco-ios-x-a2583902</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20313%3A%20Path%20Traversal%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=68d428618faa9b2aaac16aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20311-data-handling-in-cisco-cisco-ios-xe-33fbf401</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20311%3A%20Data%20Handling%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d428618faa9b2aaac16aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20327-improper-validation-of-specified-ty-753e195b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20327%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20IOS&amp;severity=high&amp;id=68d428618faa9b2aaac16ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20312-loop-with-unreachable-exit-conditio-1fb30851</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20312%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d428618faa9b2aaac16aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20352-stack-based-buffer-overflow-in-cisc-3a60cd99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20352%3A%20Stack-based%20Buffer%20Overflow%20in%20Cisco%20IOS&amp;severity=high&amp;id=68d428628faa9b2aaac16ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20160-improper-authentication-in-cisco-io-9a073271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20160%3A%20Improper%20Authentication%20in%20Cisco%20IOS&amp;severity=high&amp;id=68d428618faa9b2aaac16a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20315-buffer-access-with-incorrect-length-4f1b0ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20315%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d428618faa9b2aaac16aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20334-improper-neutralization-of-special--630d380a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20334%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68d4261cb958913f5513c5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20339-improper-access-control-in-cisco-ci-d416c5e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20339%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20SD-WAN%20vEdge%20Cloud&amp;severity=medium&amp;id=68d420cba63865f9ee9266d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20365-improper-verification-of-source-of--50195c58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20365%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20Cisco%20Cisco%20Aironet%20Access%20Point%20Software%20(IOS%20XE%20Controller)&amp;severity=medium&amp;id=68d420cba63865f9ee9266d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20364-origin-validation-error-in-cisco-ci-1ea1de2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20364%3A%20Origin%20Validation%20Error%20in%20Cisco%20Cisco%20Aironet%20Access%20Point%20Software%20(IOS%20XE%20Controller)&amp;severity=medium&amp;id=68d420cba63865f9ee9266d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10909-cross-site-scripting-in-mangati-nov-afb4f13e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10909%3A%20Cross%20Site%20Scripting%20in%20Mangati%20NovoSGA&amp;severity=medium&amp;id=68d41e84617790002496d56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10892-integer-overflow-in-google-chrome-a1f4faf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10892%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10891-integer-overflow-in-google-chrome-3664b2aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10891%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10890-side-channel-information-leakage-in-d59d66dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10890%3A%20Side-channel%20information%20leakage%20in%20Google%20Chrome&amp;severity=critical&amp;id=68d41b0baa6112407a6d866d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10502-heap-buffer-overflow-in-google-chro-9ecbd01a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10502%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10501-use-after-free-in-google-chrome-08dc055d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10501%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d8661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10500-use-after-free-in-google-chrome-ce6f773c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10500%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68d41b0baa6112407a6d865d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updates-arsenal-with-baitswitch-and-simplefix-194836d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updates%20Arsenal%20with%20BAITSWITCH%20and%20SIMPLEFIX&amp;severity=medium&amp;id=68d44a34f2b114103f06513a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10360-cwe-522-insufficiently-protected-cr-1c3baedc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10360%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Perforce%20Puppet%20Enterprise&amp;severity=medium&amp;id=68d4141b3928f2e6f6c93442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc5221-uses-brickstorm-backdoor-to-infiltrate-us--b845a76b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC5221%20Uses%20BRICKSTORM%20Backdoor%20to%20Infiltrate%20U.S.%20Legal%20and%20Technology%20Sectors&amp;severity=high&amp;id=68d40ff09a5cf4e1e38e8983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47329-cwe-763-release-of-invalid-pointer--5e4b0401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47329%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47328-cwe-126-buffer-over-read-in-qualcom-3cd420ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47328%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47327-cwe-416-use-after-free-in-qualcomm--4b575263</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47327%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b2ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47326-cwe-126-buffer-over-read-in-qualcom-428d2f08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47326%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47318-cwe-126-buffer-over-read-in-qualcom-a1ced5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47318%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47317-cwe-126-buffer-over-read-in-qualcom-a8df0bad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47317%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47316-cwe-415-double-free-in-qualcomm-inc-1fc67608</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47316%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47315-cwe-416-use-after-free-in-qualcomm--13e20409</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47315%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47314-cwe-20-improper-input-validation-in-411f9a19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47314%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27077-cwe-416-use-after-free-in-qualcomm--6b97ee9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27077%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27037-cwe-416-use-after-free-in-qualcomm--3f713055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27037%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41181d0cbc63b6d41b280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27036-cwe-126-buffer-over-read-in-qualcom-73b1bf31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27036%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68d41181d0cbc63b6d41b27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27034-cwe-129-improper-validation-of-arra-dc3bf59a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27034%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=68d41181d0cbc63b6d41b278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27033-cwe-126-buffer-over-read-in-qualcom-a7adca71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27033%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68d41180d0cbc63b6d41b260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27032-cwe-1257-improper-access-control-ap-9b841d5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27032%3A%20CWE-1257%3A%20Improper%20Access%20Control%20Applied%20to%20Mirrored%20or%20Aliased%20Memory%20Regions%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27030-cwe-126-buffer-over-read-in-qualcom-36936f39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27030%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=68d41180d0cbc63b6d41b25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21488-cwe-126-buffer-over-read-in-qualcom-e06c9756</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21488%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21487-cwe-126-buffer-over-read-in-qualcom-d6f4ab43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21487%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21484-cwe-126-buffer-over-read-in-qualcom-cee53c20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21484%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21483-cwe-119-improper-restriction-of-ope-35a3053b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21483%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=68d41180d0cbc63b6d41b24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21482-cwe-310-cryptographic-issues-in-qua-4fcbb3c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21482%3A%20CWE-310%20Cryptographic%20Issues%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21481-cwe-120-buffer-copy-without-checkin-41dd226b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21481%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21476-cwe-120-buffer-copy-without-checkin-9a75a4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21476%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68d41180d0cbc63b6d41b245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8869-vulnerability-in-python-packaging-au-2bf86130</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8869%3A%20Vulnerability%20in%20Python%20Packaging%20Authority%20pip&amp;severity=medium&amp;id=68d487f92f6beace9efc3584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowv2-botnet-uses-misconfigured-aws-docker-for--9cc47b8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowV2%20Botnet%20Uses%20Misconfigured%20AWS%20Docker%20for%20DDoS-For-Hire%20Service&amp;severity=medium&amp;id=68d3fa3ed1859119b259a48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48868-cwe-95-improper-neutralization-of-d-f657d4ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48868%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20horilla-opensource%20horilla&amp;severity=high&amp;id=68d3f8033fb9861b3d7aea82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovense-ignored-app-vulnerabilities-for-eight-year-b6f18874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovense%20ignored%20app%20vulnerabilities%20for%20eight%20years%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9575c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-macos-threat-abuses-ads-and-social-media-to-sp-4e1cbd8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20macOS%20threat%20abuses%20ads%20and%20social%20media%20to%20spread%20malware&amp;severity=low&amp;id=68d3f4feac62d707fa618453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iframe-security-exposed-the-blind-spot-fueling-pay-4f5f130d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iframe%20Security%20Exposed%3A%20The%20Blind%20Spot%20Fueling%20Payment%20Skimmer%20Attacks&amp;severity=high&amp;id=68d3f373b38162a24b52d414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-yibackdoor-malware-shares-major-code-overlaps--9ba4ad62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20YiBackdoor%20Malware%20Shares%20Major%20Code%20Overlaps%20with%20IcedID%20and%20Latrodectus&amp;severity=high&amp;id=68d3f373b38162a24b52d410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-one-bad-password-ended-a-158-year-old-business-7f335170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20One%20Bad%20Password%20Ended%20a%20158-Year-Old%20Business&amp;severity=high&amp;id=68d3f2af9540140ef66f3623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23354-cwe-94-improper-control-of-generati-e32ca15d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23354%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d5353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23353-cwe-94-improper-control-of-generati-dee94226</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23353%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d534e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23349-cwe-94-improper-control-of-generati-5572ae47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23349%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d5349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23348-cwe-94-improper-control-of-generati-0961fca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23348%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=68d3f06d37fc381b138d5344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23346-cwe-476-null-pointer-dereference-in-b4e47eeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23346%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06d37fc381b138d533f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23340-cwe-125-out-of-bounds-read-in-nvidi-45f3a336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23340%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06d37fc381b138d533a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23339-cwe-121-stack-based-buffer-overflow-c50e7298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23339%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d531d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23338-cwe-129-improper-validation-of-arra-ae0209f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23338%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d5318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23308-cwe-122-heap-based-buffer-overflow--043bd3ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23308%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d5313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23275-cwe-787-out-of-bounds-write-in-nvid-7aabadbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23275%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=68d3f06c37fc381b138d530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23274-cwe-125-out-of-bounds-read-in-nvidi-5cf9b7b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23274%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=68d3f06c37fc381b138d5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23273-cwe-369-divide-by-zero-in-nvidia-nv-a6f9427b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23273%3A%20CWE-369%20Divide%20By%20Zero%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d5304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23272-cwe-125-out-of-bounds-read-in-nvidi-c3e85ac8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23272%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=68d3f06c37fc381b138d52ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23271-cwe-125-out-of-bounds-read-in-nvidi-5ae5b189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23271%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d52f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23255-cwe-125-out-of-bounds-read-in-nvidi-932021d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23255%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d52f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23248-cwe-125-out-of-bounds-read-in-nvidi-3a42b32e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23248%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=low&amp;id=68d3f06c37fc381b138d52eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10906-missing-authentication-in-magnetism-45646a17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10906%3A%20Missing%20Authentication%20in%20Magnetism%20Studios%20Endurance&amp;severity=high&amp;id=68d3ed6019ed1d2da3209504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-deploys-overstep-backdoor-in-ongoing--5f723c58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Deploys%20&apos;OVERSTEP&apos;%20Backdoor%20in%20Ongoing%20SonicWall%20SMA%20Attacks&amp;severity=low&amp;id=68e469f26a45552f36e907a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9353-cwe-79-improper-neutralization-of-in-d2b69cc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=medium&amp;id=68d3e5327cf19d4a5bae2133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-arrest-made-after-cyberattack-disrupts-major-eu-4e69f528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Arrest%20Made%20After%20Cyberattack%20Disrupts%20Major%20European%20Airports&amp;severity=medium&amp;id=68d3e2adcb0d61278ba940fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9054-cwe-862-missing-authorization-in-tec-0b71f34b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9054%3A%20CWE-862%20Missing%20Authorization%20in%20Techspawn%20MultiLoca%20-%20WooCommerce%20Multi%20Locations%20Inventory%20Management&amp;severity=critical&amp;id=68d3ed6119ed1d2da320950e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-blocks-record-222-tbps-ddos-attack-2c79177a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Blocks%20Record%2022.2%20Tbps%20DDoS%20Attack&amp;severity=medium&amp;id=68d3d29f1d99fb2c28bb35d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kimsuky-attack-disguised-as-sex-offender-notificat-7ad0532f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kimsuky%20Attack%20Disguised%20as%20Sex%20Offender%20Notification%20Information&amp;severity=medium&amp;id=68d3dde1832437344391e242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nodejs-backdoors-delivering-proxyware-and-monetiza-d59f7692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NodeJS%20backdoors%20delivering%20proxyware%20and%20monetization%20schemes&amp;severity=medium&amp;id=68d3df81a166c667ef433e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-wordpress-backdoors-creating-admin-accounts-872b3946</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20WordPress%20Backdoors%20Creating%20Admin%20Accounts&amp;severity=medium&amp;id=68d3e11b48ec59f6d6c2febc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunra-ransomware-what-you-dont-know-87b4307a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GUNRA%20RANSOMWARE%3A%20What%20You%20Don&apos;t%20Know!&amp;severity=medium&amp;id=68d3e0484ff38f000da5fb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58457-cwe-280-improper-handling-of-insuff-f2cdd1ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58457%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=medium&amp;id=68d3f8033fb9861b3d7aea89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-fake-ic3-websites-designed-to-steal-p-640ba295</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Fake%20IC3%20Websites%20Designed%20to%20Steal%20Personal%20Data&amp;severity=medium&amp;id=68d3b835338068972fd9466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41716-cwe-306-missing-authentication-for--828e5eec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41716%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WAGO%20Solution%20Builder&amp;severity=medium&amp;id=68d3ed6119ed1d2da320950b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41715-cwe-306-missing-authentication-for--7f501764</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41715%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WAGO%20Device%20Sphere&amp;severity=critical&amp;id=68d3f06d37fc381b138d5358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boyd-gaming-discloses-data-breach-after-suffering--b43a46fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boyd%20Gaming%20discloses%20data%20breach%20after%20suffering%20a%20cyberattack&amp;severity=high&amp;id=68d3b2b0aa9793035950f590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-hides-malware-in-steganographic-qr-cod-4900fdbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Npm%20Package%20Hides%20Malware%20in%20Steganographic%20QR%20Codes&amp;severity=high&amp;id=68e469f36a45552f36e907b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-sponsored-hackers-exploiting-libraesva-email-c46f6480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Sponsored%20Hackers%20Exploiting%20Libraesva%20Email%20Security%20Gateway%20Vulnerability&amp;severity=high&amp;id=68d3b2b0aa9793035950f594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9031-cwe-208-observable-timing-discrepanc-71a73537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9031%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20DivvyDrive%20Information%20Technologies%20Inc.%20DivvyDrive%20Web&amp;severity=medium&amp;id=68d3ae7056b277b1e6ee79fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48392-dos-vulnerability-in-apache-softwar-7f551281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48392%3A%20DoS%20Vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=high&amp;id=68d3a5ab039276d2d8ab6599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48459-cwe-502-deserialization-of-untruste-6d053ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48459%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=medium&amp;id=68d3a5ab039276d2d8ab659c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58319-cwe-121-stack-based-buffer-overflow-5d36d61c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58319%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=68d3f06d37fc381b138d535e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58317-cwe-121-stack-based-buffer-overflow-9935dc50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58317%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=68d3f06d37fc381b138d535b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43819-cwe-613-insufficient-session-expira-628bf9d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43819%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d34db5712f26b964cfef9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-leans-on-researcher-pocs-to-spy-on-oth-0a0349ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Leans%20on%20Researcher%20PoCs%20to%20Spy%20on%20Other%20Countries&amp;severity=medium&amp;id=68e469f36a45552f36e907b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43779-cwe-79-cross-site-scripting-in-life-b18ce1d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43779%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d34329712f26b964cf395c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/as-incidents-rise-japanese-governments-cybersecuri-2ba49cae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=As%20Incidents%20Rise%2C%20Japanese%20Government&apos;s%20Cybersecurity%20Falls%20Short&amp;severity=critical&amp;id=68e469f36a45552f36e907b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-24-1a8a747c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-24&amp;severity=medium&amp;id=68d489c32f6beace9efc3b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57321-na-21146e68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57321%3A%20n%2Fa&amp;severity=critical&amp;id=68d487f92f6beace9efc357c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57324-na-83a04c9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57324%3A%20n%2Fa&amp;severity=medium&amp;id=68d487f92f6beace9efc3574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57318-na-8da35515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57318%3A%20n%2Fa&amp;severity=high&amp;id=68d45ac00d8469b2375cd9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57320-na-c0e926f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57320%3A%20n%2Fa&amp;severity=medium&amp;id=68d457a3d6be26694ed76f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57319-na-fa28a917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57319%3A%20n%2Fa&amp;severity=high&amp;id=68d457a3d6be26694ed76f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57323-na-fbc1aa89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57323%3A%20n%2Fa&amp;severity=high&amp;id=68d453e8af778555c6843a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57327-na-9dd59f9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57327%3A%20n%2Fa&amp;severity=high&amp;id=68d44aefd55094fd7eb40f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57326-na-972f6eff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57326%3A%20n%2Fa&amp;severity=high&amp;id=68d44aefd55094fd7eb40f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57325-na-6a7f1eef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57325%3A%20n%2Fa&amp;severity=high&amp;id=68d4466ec748203f5defd9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57329-na-b52d114a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57329%3A%20n%2Fa&amp;severity=high&amp;id=68d4442e04102bfdeaaefe70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57328-na-c0ebb878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57328%3A%20n%2Fa&amp;severity=high&amp;id=68d4442e04102bfdeaaefe6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57330-na-7fc1635c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57330%3A%20n%2Fa&amp;severity=high&amp;id=68d441f3006fc02db7d1f73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57349-na-e409666c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57349%3A%20n%2Fa&amp;severity=high&amp;id=68d440702e3ca83904e5f27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57347-na-db157bef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57347%3A%20n%2Fa&amp;severity=critical&amp;id=68d43b319524cade097fb1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57351-na-4e248591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57351%3A%20n%2Fa&amp;severity=medium&amp;id=68d4384798715fbf47f03b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57348-na-dffd3f8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57348%3A%20n%2Fa&amp;severity=medium&amp;id=68d4384798715fbf47f03b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59305-na-1bc64ff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59305%3A%20n%2Fa&amp;severity=high&amp;id=68d4352b82e2e362236e2489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57354-na-df6765d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57354%3A%20n%2Fa&amp;severity=medium&amp;id=68d4352b82e2e362236e2485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57353-na-61042408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57353%3A%20n%2Fa&amp;severity=medium&amp;id=68d4352b82e2e362236e2481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57352-na-f94bc7a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57352%3A%20n%2Fa&amp;severity=medium&amp;id=68d4352b82e2e362236e247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57350-na-3bf800a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57350%3A%20n%2Fa&amp;severity=high&amp;id=68d4352b82e2e362236e2479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56241-na-0b3dff78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56241%3A%20n%2Fa&amp;severity=high&amp;id=68d432ed74b22954c493700a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56816-na-131ad68a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56816%3A%20n%2Fa&amp;severity=high&amp;id=68d41e84617790002496d578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56815-na-149f45c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56815%3A%20n%2Fa&amp;severity=high&amp;id=68d41e84617790002496d574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56819-na-a2081b76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56819%3A%20n%2Fa&amp;severity=critical&amp;id=68d4186d03ebb2084b0a22f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57882-cwe-404-improper-resource-shutdown--c886b9ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57882%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d32020e9e7eb6a1ad1b627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55038-cwe-862-missing-authorization-in-au-302f2446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55038%3A%20CWE-862%20Missing%20Authorization%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d32020e9e7eb6a1ad1b623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58473-cwe-404-improper-resource-shutdown--0b58fd01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58473%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d336ac712f26b964ce8e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55069-cwe-337-predictable-seed-in-pseudo--2d156863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55069%3A%20CWE-337%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d336ac712f26b964ce8e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-a-new-plugx-variant-abuses-dll-search-order-hi-bba25f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20a%20new%20PlugX%20variant%20abuses%20DLL%20search%20order%20hijacking&amp;severity=medium&amp;id=68d3e458d2da9a2e8b223a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59484-cwe-327-use-of-a-broken-or-risky-cr-08b1c9fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59484%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=high&amp;id=68d31b57770bf6e4769153cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58069-cwe-321-use-of-hard-coded-cryptogra-eea845ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58069%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=medium&amp;id=68d31b57770bf6e4769153cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54855-cwe-312-cleartext-storage-of-sensit-dd069e61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54855%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20AutomationDirect%20CLICK%20PLUS%20C0-0x%20CPU%20firmware&amp;severity=medium&amp;id=68d319714a1305fb85d6f649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/artificial-intelligence-exposes-the-homoglyph-hust-58c93655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Artificial%20Intelligence%20Exposes%20the%20Homoglyph%20Hustle&amp;severity=medium&amp;id=68d317c4524e610dd61415f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-fixed-entra-id-vulnerability-allowing-gl-08075b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Fixed%20Entra%20ID%20Vulnerability%20Allowing%20Global%20Admin%20Impersonation&amp;severity=medium&amp;id=68d310a8aab392951c79d260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-aims-to-secure-supply-chain-as-npm-hacks-ra-d1798a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Aims%20to%20Secure%20Supply%20Chain%20as%20NPM%20Hacks%20Ramp%20Up&amp;severity=high&amp;id=68e469f36a45552f36e907bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-docker-daemons-fuel-ddos-botnet-c49ce35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20Docker%20Daemons%20Fuel%20DDoS%20Botnet&amp;severity=medium&amp;id=68e469f36a45552f36e907be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59826-cwe-862-missing-authorization-in-fl-5d6e88a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59826%3A%20CWE-862%3A%20Missing%20Authorization%20in%20FlagForgeCTF%20flagForge&amp;severity=high&amp;id=68d3042b708c92a6e0eb25ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59825-cwe-22-improper-limitation-of-a-pat-8c39d5c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59825%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20astral-sh%20tokio-tar&amp;severity=medium&amp;id=68d336ac712f26b964ce8e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58674-cwe-79-improper-neutralization-of-i-85ecbf39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WordPress&amp;severity=medium&amp;id=68d2ec7f8890fd6c4196a550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tea-continued-unauthenticated-access-to-150-fireba-dc3dc99f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tea%20continued%20-%20Unauthenticated%20access%20to%20150%2B%20Firebase%20databases%2C%20storage%20buckets%20and%20secrets&amp;severity=medium&amp;id=68d2eaf7ad5bdf3150921890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dark-reading-confidential-battle-space-cyber-pros--d6d8404b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dark%20Reading%20Confidential%3A%20Battle%20Space%3A%20Cyber%20Pros%20Land%20on%20the%20Front%20Lines%20of%20Protecting%20US%20Critical%20Infrastructure&amp;severity=critical&amp;id=68e469f36a45552f36e907c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-mitigates-new-record-breaking-222-tbps--3598993a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20mitigates%20new%20record-breaking%2022.2%20Tbps%20DDoS%20attack&amp;severity=high&amp;id=68d2e88b629c4b332c8f25ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/libraesva-esg-issues-emergency-fix-for-bug-exploit-d30394b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Libraesva%20ESG%20issues%20emergency%20fix%20for%20bug%20exploited%20by%20state%20hackers&amp;severity=critical&amp;id=68d2e88b629c4b332c8f25f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59534-cwe-78-improper-neutralization-of-s-2373c0ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59534%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=68d336ad712f26b964ce8eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54081-cwe-428-unquoted-search-path-or-ele-26d28f3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54081%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20LizardByte%20Sunshine&amp;severity=medium&amp;id=68d336ad712f26b964ce8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59548-cwe-79-improper-neutralization-of-i-a987a7fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59548%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d336ad712f26b964ce8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59547-cwe-176-improper-handling-of-unicod-1b3d613b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59547%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52905-cwe-20-improper-input-validation-in-7529b75b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52905%3A%20CWE-20%20Improper%20Input%20Validation%20in%20TOTOLINK%20X6000R&amp;severity=high&amp;id=68d2e0155bd4b74a8e69d443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8410-cwe-416-use-after-free-in-rti-connex-36a6b078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8410%3A%20CWE-416%20Use%20After%20Free%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4993-cwe-822-untrusted-pointer-dereferenc-fac093fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4993%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=68d2e0155bd4b74a8e69d440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4582-cwe-126-buffer-over-read-in-rti-conn-0476629d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4582%3A%20CWE-126%20Buffer%20Over-read%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1255-cwe-822-untrusted-pointer-dereferenc-67f9a1dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1255%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=68d2de69f9236bec1dff86d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59821-cwe-79-improper-neutralization-of-i-5b11304c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59821%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d336ad712f26b964ce8eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59546-cwe-79-improper-neutralization-of-i-e2ad5313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59546%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=low&amp;id=68d336ad712f26b964ce8ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59545-cwe-79-improper-neutralization-of-i-87f7a7d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59545%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=critical&amp;id=68d336ad712f26b964ce8ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59539-cwe-79-improper-neutralization-of-i-ac077122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59539%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d336ad712f26b964ce8ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0672-vulnerability-in-wso2-wso2-identity--c26227b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0672%3A%20Vulnerability%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=low&amp;id=68d2da7af7fe4c56f0792df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58246-cwe-201-insertion-of-sensitive-info-faa1a700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58246%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Automattic%20WordPress&amp;severity=medium&amp;id=68d2d9b550473c5b345e2613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0209-cwe-79-improper-neutralization-of-in-9bb00173</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0209%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=68d2d9b550473c5b345e2610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0663-vulnerability-in-wso2-wso2-open-bank-ab606ad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0663%3A%20Vulnerability%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=68d2d2a01f3dbb78c7815c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-dismantles-crypto-fraud-ring-linked-to-100--d63918e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20dismantles%20crypto%20fraud%20ring%20linked%20to%20%E2%82%AC100%20million%20in%20losses&amp;severity=high&amp;id=68d2cdf4cb0d0cd450bbd7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-secret-service-dismantled-covert-communications-1fd06b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Secret%20Service%20dismantled%20covert%20communications%20network%20near%20the%20U.N.%20in%20New%20York&amp;severity=medium&amp;id=68d2cdf4cb0d0cd450bbd7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hacking-group-nimbus-manticore-expands-eur-ee45e676</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hacking%20Group%20Nimbus%20Manticore%20Expands%20European%20Targeting&amp;severity=high&amp;id=68d2cdf4cb0d0cd450bbd7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-says-hackers-breached-federal-agency-using-ge-394f65bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20says%20hackers%20breached%20federal%20agency%20using%20GeoServer%20exploit&amp;severity=high&amp;id=68d2cdf4cb0d0cd450bbd7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9900-write-what-where-condition-in-red-ha-9474a469</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9900%3A%20Write-what-where%20Condition&amp;severity=high&amp;id=68d2cd2b61502ab9d1baaff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5717-cwe-94-improper-control-of-generatio-6da69580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5717%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=68d336ae712f26b964ce8ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-nimbus-manticore-hackers-use-fake-job-lure-7c72d3b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Nimbus%20Manticore%20Hackers%20Use%20Fake%20Job%20Lures%20to%20Breach%20Europe%E2%80%99s%20Critical%20Industries&amp;severity=critical&amp;id=68d2c475682ef734db53f9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4760-cwe-79-improper-neutralization-of-in-2bd5f65a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=68d2b59aa487dda776f3b297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6921-cwe-400-uncontrolled-resource-consum-b5c773f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6921%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68d2a78d3a159a196863e81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8354-cwe-843-type-confusion-in-autodesk-r-9aa50fa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8354%3A%20CWE-843%20Type%20Confusion%20in%20Autodesk%20Revit&amp;severity=high&amp;id=68d2a1f477d80345469516fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9844-cwe-427-uncontrolled-search-path-ele-a3c375de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9844%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Salesforce%20Salesforce%20CLI&amp;severity=high&amp;id=68d29eae037b8c5ce43060c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10184-cwe-862-missing-authorization-in-on-2f573df7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10184%3A%20CWE-862%20Missing%20Authorization%20in%20OnePlus%20OxygenOS&amp;severity=high&amp;id=68d29b75ad0b11e5ad17acba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9846-cwe-434-unrestricted-upload-of-file--0a4cbb5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9846%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TalentSys%20Consulting%20Information%20Technology%20Industry%20Inc.%20Inka.Net&amp;severity=critical&amp;id=68d2983f801f4b8d29164198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9966-cwe-269-improper-privilege-managemen-aa51e822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9966%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=high&amp;id=68d336ad712f26b964ce8ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9965-cwe-287-improper-authentication-in-n-9f256acf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9965%3A%20CWE-287%20Improper%20Authentication%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=critical&amp;id=68d336ad712f26b964ce8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9964-cwe-521-weak-password-requirements-i-f1fe4416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9964%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=high&amp;id=68d336ad712f26b964ce8e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10244-cwe-79-cross-site-scripting-xss-sto-213aeb68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10244%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20-%20Stored%20in%20Autodesk%20Fusion&amp;severity=high&amp;id=68d336ac712f26b964ce8e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inc-ransomware-claims-57-tb-of-data-theft-at-penns-b82f0ea9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inc%20Ransomware%20Claims%205.7%20TB%20of%20Data%20Theft%20at%20Pennsylvania%20Attorney%20General&amp;severity=medium&amp;id=68d280b34049718c66f8cc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9963-cwe-22-improper-limitation-of-a-path-b8af4764</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9963%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=critical&amp;id=68d336ac712f26b964ce8e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9962-cwe-120-buffer-copy-without-checking-4b528906</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9962%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Novakon%20P%20series%20(P07%2C%20P10%2C%20P12%2C%20P15)&amp;severity=critical&amp;id=68d27feb7aa9807c1fd5a5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seo-poisoning-campaign-tied-to-chinese-actor-1670513d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEO%20Poisoning%20Campaign%20Tied%20to%20Chinese%20Actor&amp;severity=medium&amp;id=68e469f36a45552f36e907c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7106-cwe-284-improper-access-control-in-d-942186d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7106%3A%20CWE-284%20Improper%20Access%20Control%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68d336ac712f26b964ce8e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10412-cwe-434-unrestricted-upload-of-file-e21a6693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10412%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20MooMoo%20Product%20Options%20and%20Price%20Calculation%20Formulas%20for%20WooCommerce%20%E2%80%93%20Uni%20CPO%20(Premium)&amp;severity=critical&amp;id=68d269a359387df52bc4222b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9342-cwe-639-authorization-bypass-through-16e052aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9342%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Anadolu%20Hayat%20Emeklilik%20Inc.%20AHE%20Mobile&amp;severity=medium&amp;id=68d336ac712f26b964ce8e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badiis-malware-spreads-via-seo-poisoning-redirects-f2362814</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadIIS%20Malware%20Spreads%20via%20SEO%20Poisoning%20%E2%80%94%20Redirects%20Traffic%2C%20Plants%20Web%20Shells&amp;severity=high&amp;id=68d26628ca3a77e99b9174c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-rewrite-chinese-speaking-threat-actors-d-fc26b654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Rewrite%3A%20Chinese-Speaking%20Threat%20Actors%20Deploy%20BadIIS%20in%20a%20Wide%20Scale%20SEO%20Poisoning%20Campaign&amp;severity=medium&amp;id=68d31564c30b0a5e712e6a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9798-cwe-79-improper-neutralization-of-in-59435c92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20Software%20Inc.%20Netigma&amp;severity=high&amp;id=68d25ea083280103b6dcf47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10857-sql-injection-in-campcodes-point-of-1c9963c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10857%3A%20SQL%20Injection%20in%20Campcodes%20Point%20of%20Sale%20System%20POS&amp;severity=medium&amp;id=68d25c4623e5eeb014d89dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10147-cwe-434-unrestricted-upload-of-file-49fe7271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10147%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=critical&amp;id=68d25c4623e5eeb014d89dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10851-sql-injection-in-campcodes-gym-mana-a487bc32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10851%3A%20SQL%20Injection%20in%20Campcodes%20Gym%20Management%20System&amp;severity=medium&amp;id=68d336ac712f26b964ce8e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9588-cwe-78-improper-neutralization-of-sp-e2c95a7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9588%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Iron%20Mountain%20Archiving%20Services%20Inc.%20enVision&amp;severity=critical&amp;id=68d336ad712f26b964ce8ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blacklock-ransomware-from-meteoric-rise-to-sudden--7c748ff1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlackLock%20Ransomware%3A%20From%20Meteoric%20Rise%20to%20Sudden%20Disruption&amp;severity=medium&amp;id=68d24e1f93e351beddcc1685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10848-sql-injection-in-campcodes-society--3738474a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10848%3A%20SQL%20Injection%20in%20Campcodes%20Society%20Membership%20Information%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10846-sql-injection-in-portabilis-i-educa-e3aedad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10846%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d247e7cc150725e5c5bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10548-cwe-295-improper-certificate-valida-f93ec92c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10548%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20CleverControl%20CleverControl%20employee%20monitoring%20software&amp;severity=medium&amp;id=68d336ac712f26b964ce8e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10845-sql-injection-in-portabilis-i-educa-58697547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10845%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d336ad712f26b964ce8ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10844-sql-injection-in-portabilis-i-educa-4a66cded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10844%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68d336ad712f26b964ce8e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10843-sql-injection-in-reservation-online-e663e6ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10843%3A%20SQL%20Injection%20in%20Reservation%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10842-sql-injection-in-code-projects-onli-c4df817f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10842%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39867-13022e61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39867&amp;severity=null&amp;id=68db1fa7a473ffe031e278fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8282-cwe-79-cross-site-scripting-xss-in-s-ec953e45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8282%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20SureForms&amp;severity=low&amp;id=68d336ad712f26b964ce8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10841-sql-injection-in-code-projects-onli-391eec87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10841%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d336ad712f26b964ce8e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26399-cwe-502-deserialization-of-untruste-8d02c526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26399%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=68d22c2079681e6adcf142e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10840-sql-injection-in-sourcecodester-pet-4040d471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10840%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d22c2079681e6adcf142e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10839-sql-injection-in-sourcecodester-pet-283a6391</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10839%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d2f210c36d6fa294642ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10838-buffer-overflow-in-tenda-ac21-a554c5f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10838%3A%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=high&amp;id=68d2f210c36d6fa294642acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9321-cwe-94-improper-control-of-generatio-997dc117</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9321%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpsight%20WPCasa&amp;severity=critical&amp;id=68d223009de83c5ed4d8df56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10837-cross-site-scripting-in-code-projec-6070ae52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10837%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68d2a78d3a159a196863e821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8902-cwe-79-improper-neutralization-of-in-0f8dae9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marketing%20Fire%2C%20LLC%20Widget%20Options%20-%20Extended&amp;severity=medium&amp;id=68d218bcefb46fd0305fd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10380-cwe-1336-improper-neutralization-of-e93fd060</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10380%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20wplakeorg%20Advanced%20Views%20%E2%80%93%20Display%20Posts%2C%20Custom%20Fields%2C%20and%20More&amp;severity=high&amp;id=68d218bcefb46fd0305fd7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10836-sql-injection-in-sourcecodester-pet-e5d736ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10836%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d218bcefb46fd0305fd7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10835-sql-injection-in-sourcecodester-pet-0b0d3956</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10835%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d218bcefb46fd0305fd7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10834-sql-injection-in-itsourcecode-open--55e301e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10834%3A%20SQL%20Injection%20in%20itsourcecode%20Open%20Source%20Job%20Portal&amp;severity=medium&amp;id=68d20e31efb46fd0305d8b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10833-sql-injection-in-1000projects-books-bb191fed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10833%3A%20SQL%20Injection%20in%201000projects%20Bookstore%20Management%20System&amp;severity=medium&amp;id=68d20aadefb46fd0305d7203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58915-cwe-79-improper-neutralization-of-i-baff75bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58915%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Request%20a%20Quote&amp;severity=null&amp;id=68d203c6efb46fd0305d3b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10832-sql-injection-in-sourcecodester-pet-14fba08d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10832%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d203c6efb46fd0305d3b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42907-cwe-918-server-side-request-forgery-250599d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42907%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20BI%20Platform&amp;severity=medium&amp;id=68d203c6efb46fd0305d3b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10831-sql-injection-in-campcodes-computer-119e2cbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10831%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1fc9cefb46fd030595bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10830-sql-injection-in-campcodes-computer-382f9a84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10830%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1fc9cefb46fd030595ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9495-cwe-602-client-side-enforcement-of-s-96538e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9495%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Viessmann%20Vitogate%20300&amp;severity=high&amp;id=68d1fc9cefb46fd030595bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9494-cwe-78-improper-neutralization-of-sp-66f87e2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9494%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Viessmann%20Vitogate%20300&amp;severity=high&amp;id=68d1fc9cefb46fd030595bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10829-sql-injection-in-campcodes-computer-b1ef290a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10829%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1fc9cefb46fd030595b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10828-sql-injection-in-sourcecodester-pet-d5d55fb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10828%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d1fc9cefb46fd030595b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10827-cross-site-scripting-in-phpjabbers--dd45a57f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10827%3A%20Cross%20Site%20Scripting%20in%20PHPJabbers%20Restaurant%20Menu%20Maker&amp;severity=medium&amp;id=68d1ee8defb46fd030578117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10826-sql-injection-in-campcodes-online-b-18cb75a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10826%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d1ee8defb46fd030578110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10825-sql-injection-in-campcodes-online-b-f23233b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10825%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d1ee8defb46fd030578109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10824-use-after-free-in-axboe-fio-4ea45fe7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10824%3A%20Use%20After%20Free%20in%20axboe%20fio&amp;severity=medium&amp;id=68d1ee8defb46fd030578102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-23-c97ca54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-23&amp;severity=medium&amp;id=68d3388c712f26b964cea694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57407-na-529deacc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57407%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ae712f26b964ce8f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29084-na-deefe8b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29084%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ae712f26b964ce8f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29083-na-e0b7aa9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29083%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ae712f26b964ce8f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55780-na-dc9b3075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55780%3A%20n%2Fa&amp;severity=high&amp;id=68d336ae712f26b964ce8efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57638-na-c36569af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57638%3A%20n%2Fa&amp;severity=high&amp;id=68d336ad712f26b964ce8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45326-na-2a460d40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45326%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ad712f26b964ce8ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57636-na-72b41799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57636%3A%20n%2Fa&amp;severity=medium&amp;id=68d336ac712f26b964ce8e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56311-na-52e21a3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56311%3A%20n%2Fa&amp;severity=medium&amp;id=68d301ca02d8cd39a20f2f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51005-na-90db0c42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51005%3A%20n%2Fa&amp;severity=high&amp;id=68d2f210c36d6fa294642aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57637-na-bf802e5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57637%3A%20n%2Fa&amp;severity=high&amp;id=68d2ec7f8890fd6c4196a54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56146-na-9f84275d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56146%3A%20n%2Fa&amp;severity=medium&amp;id=68d2ec7f8890fd6c4196a549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57639-na-a797b67b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57639%3A%20n%2Fa&amp;severity=medium&amp;id=68d2e0155bd4b74a8e69d447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56394-na-6d99e150</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56394%3A%20n%2Fa&amp;severity=high&amp;id=68d2da7bf7fe4c56f0792df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56304-na-90b04fb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56304%3A%20n%2Fa&amp;severity=medium&amp;id=68d2d435b8769c2ff1af173a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/comicform-and-sectorj149-hackers-deploy-formbook-m-fa0ce93c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ComicForm%20and%20SectorJ149%20Hackers%20Deploy%20Formbook%20Malware%20in%20Eurasian%20Cyberattacks&amp;severity=high&amp;id=68d1e09447a4e463e993677a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automaker-giant-stellantis-confirms-data-breach-af-ecad2255</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automaker%20giant%20Stellantis%20confirms%20data%20breach%20after%20Salesforce%20hack&amp;severity=high&amp;id=68d1e09447a4e463e9936776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10823-null-pointer-dereference-in-axboe-f-08d934bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10823%3A%20NULL%20Pointer%20Dereference%20in%20axboe%20fio&amp;severity=medium&amp;id=68d1ddf8e7559940ff19a781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10822-improper-authorization-in-fuyanglip-3ccc96c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10822%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1ddf8e7559940ff19a77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10821-improper-authorization-in-fuyanglip-7194358f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10821%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1d6fd72b9f38792d8c73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43814-cwe-201-insertion-of-sensitive-info-e9a17271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43814%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1d6fd72b9f38792d8c740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jeep-and-dodge-parent-company-stellantis-confirms--95584c0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jeep%20and%20Dodge%20Parent%20Company%20Stellantis%20Confirms%20Customer%20Data%20Breach&amp;severity=high&amp;id=68d1d0c313c60b927364ef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10820-improper-authorization-in-fuyanglip-3d28d538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10820%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1cf046f645f121d636567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10819-improper-authorization-in-fuyanglip-cb6a838d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10819%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68d1cf046f645f121d636561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43810-cwe-639-authorization-bypass-throug-32a88e1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1cf046f645f121d63656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/journeys-in-hosting-1x-precomputed-ssh-host-keys-5585ca41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Journeys%20in%20Hosting%201%2Fx%20-%20Precomputed%20SSH%20Host%20Keys&amp;severity=medium&amp;id=68d1c85eeb6ae793d1252b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10817-sql-injection-in-campcodes-online-l-9cb68880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10817%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d1c7fdeb6ae793d124fcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43806-cwe-863-incorrect-authorization-in--8d228220</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43806%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1e592efb46fd030526285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nimbus-manticore-deploys-new-malware-targeting-eur-e1b75e3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nimbus%20Manticore%20Deploys%20New%20Malware%20Targeting%20Europe&amp;severity=medium&amp;id=68d1c40bb929db36a9e2ef69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10816-xml-external-entity-reference-in-ji-c8482a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10816%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68d1c0e126675e69899f01e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10815-buffer-overflow-in-tenda-ac20-f5a501a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10815%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68d1bb698864f11789659da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47910-cwe-284-improper-access-control-in--2384e190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47910%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=68d1bb698864f11789659dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59535-cwe-20-improper-input-validation-in-b31abf9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59535%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68d1b91e11da864c54429234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10814-command-injection-in-d-link-dir-823-9903e2ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10814%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68d1b30dc6427514cac5c44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59532-cwe-20-improper-input-validation-in-34aab972</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59532%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20openai%20codex&amp;severity=high&amp;id=68d1b30dc6427514cac5c458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10813-sql-injection-in-code-projects-host-f936c6ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10813%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d1ac52392f2f9b111eeef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59528-cwe-94-improper-control-of-generati-dfa0f2a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59528%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68d1aabbdb6dbbc21876f6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59527-cwe-918-server-side-request-forgery-1d15220a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59527%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FlowiseAI%20Flowise&amp;severity=high&amp;id=68d1a936f1c6cd98eca24e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-zloader-updates-6cab1124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20Zloader%20Updates&amp;severity=medium&amp;id=68d1bb688864f11789659d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59434-cwe-200-exposure-of-sensitive-infor-86ff019a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59434%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68d1a62ada28327339612ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10812-sql-injection-in-code-projects-host-50de9478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10812%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d1a4acfea788f604d983ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59526-cwe-79-improper-neutralization-of-i-2cbd7ae2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59526%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eladnava%20mailgen&amp;severity=low&amp;id=68d1a4acfea788f604d983c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59432-cwe-208-observable-timing-discrepan-3c70ca46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59432%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20ongres%20scram&amp;severity=medium&amp;id=68d1a3298715dc2382a2ce15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10811-sql-injection-in-code-projects-host-c01fa95b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10811%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d19f5ffdac247d64feb198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8892-cwe-120-buffer-copy-without-checking-94f5ad6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8892%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68d19f5ffdac247d64feb19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59430-cwe-79-improper-neutralization-of-i-56e85d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FrontFin%20mesh-web-sdk&amp;severity=high&amp;id=68d19a1a93431051bd470175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10810-sql-injection-in-campcodes-online-l-0df56d7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10810%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d197d505d26ef41525082f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58956-cwe-352-cross-site-request-forgery--d5a9b6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Attractive%20Donations%20System&amp;severity=null&amp;id=68d197d705d26ef4152508ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58957-cwe-862-missing-authorization-in-vi-61ae61e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58957%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=68d197d705d26ef4152508d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58960-cwe-79-improper-neutralization-of-i-cb1c1bdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brijeshk89%20IP%20Based%20Login&amp;severity=null&amp;id=68d197d705d26ef4152508d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58965-cwe-79-improper-neutralization-of-i-f67d5c0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58965%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agency%20Dominion%20Inc.%20Fusion%20Page%20Builder%20%3A%20Extension%20%26%238211%3B%20Gallery&amp;severity=null&amp;id=68d197d705d26ef4152508f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58968-cwe-862-missing-authorization-in-ch-6fa891d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58968%3A%20Missing%20Authorization%20in%20Christiaan%20Pieterse%20MaxiBlocks&amp;severity=null&amp;id=68d197d705d26ef4152508f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58969-cwe-862-missing-authorization-in-gr-0907a2e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58969%3A%20Missing%20Authorization%20in%20Greg%20Winiarski%20Custom%20Login%20URL&amp;severity=null&amp;id=68d197d705d26ef4152508fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58973-cwe-98-improper-control-of-filename-40fd2ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58973%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=68d197d705d26ef4152508ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58974-cwe-79-improper-neutralization-of-i-fafdad1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20WPComplete&amp;severity=null&amp;id=68d197d705d26ef415250902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58992-cwe-79-improper-neutralization-of-i-c0aa0922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=null&amp;id=68d197d705d26ef415250905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59549-cwe-79-improper-neutralization-of-i-1f9f0d1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20GetResponse%20Forms&amp;severity=null&amp;id=68d197d705d26ef415250908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59551-cwe-862-missing-authorization-in-wp-53ead58e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59551%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=null&amp;id=68d197d705d26ef41525090b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59552-cwe-79-improper-neutralization-of-i-63a58de1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pdfcrowd%20Dev%20Team%20Save%20as%20PDF&amp;severity=null&amp;id=68d197d705d26ef41525090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59553-cwe-79-improper-neutralization-of-i-da917350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Coderz%20Studio%20Custom%20iFrame%20for%20Elementor&amp;severity=null&amp;id=68d197d705d26ef415250911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59559-cwe-862-missing-authorization-in-pa-8629f846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59559%3A%20Missing%20Authorization%20in%20payrexx%20Payrexx%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=68d197d805d26ef41525092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59561-cwe-862-missing-authorization-in-ha-4a2012f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59561%3A%20Missing%20Authorization%20in%20hashthemes%20Smart%20Blocks&amp;severity=null&amp;id=68d197d805d26ef41525092f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59562-authorization-bypass-through-user-c-4fc62140</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59562%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Kodezen%20LLC%20Academy%20LMS&amp;severity=null&amp;id=69cd7410e6bfc5ba1def503b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59565-cwe-79-improper-neutralization-of-i-53087b9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Swings%20Upsell%20Order%20Bump%20Offer%20for%20WooCommerce&amp;severity=null&amp;id=68d197d805d26ef415250932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59567-cwe-862-missing-authorization-in-el-ca8cadd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59567%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=68d197d805d26ef415250935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59569-cwe-79-improper-neutralization-of-i-b72c2fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59569%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=68d197d805d26ef415250938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59570-cwe-89-improper-neutralization-of-s-165e3e22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=68d197d805d26ef41525093b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59572-cwe-352-cross-site-request-forgery--35a2ad89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20purethemes%20WorkScout-Core&amp;severity=null&amp;id=68d197d805d26ef41525093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59573-cwe-80-improper-neutralization-of-s-c53825ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59573%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=68d197d805d26ef415250941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59576-cwe-862-missing-authorization-in-st-74d710e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59576%3A%20Missing%20Authorization%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=68d197d805d26ef415250944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59577-cwe-362-concurrent-execution-using--9ab3038e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59577%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=68d197d805d26ef415250947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59581-cwe-862-missing-authorization-in-vw-b1291058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59581%3A%20Missing%20Authorization%20in%20VW%20THEMES%20Ibtana&amp;severity=null&amp;id=68d197d905d26ef41525095d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59582-cwe-497-exposure-of-sensitive-syste-fdf0c41a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59582%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Darren%20Cooney%20Ajax%20Load%20More&amp;severity=null&amp;id=68d197d905d26ef415250960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59583-cwe-79-improper-neutralization-of-i-f19d06d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Filter%20Everything&amp;severity=null&amp;id=68d197d905d26ef415250963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59584-cwe-79-improper-neutralization-of-i-a905b0a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Podcast&amp;severity=null&amp;id=68d197d905d26ef415250966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59585-cwe-79-improper-neutralization-of-i-1c440e9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Recipe&amp;severity=null&amp;id=68d197d905d26ef415250969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59586-cwe-79-improper-neutralization-of-i-387411b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Portfolio&amp;severity=null&amp;id=68d197d905d26ef41525096c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59587-cwe-79-improper-neutralization-of-i-3cc4482d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Penci%20Shortcodes%20%26%20Performance&amp;severity=null&amp;id=68d197d905d26ef41525096f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59588-cwe-98-improper-control-of-filename-0986c635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59588%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PenciDesign%20Soledad&amp;severity=null&amp;id=68d197d905d26ef415250972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59589-cwe-79-improper-neutralization-of-i-966672e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PenciDesign%20Soledad&amp;severity=null&amp;id=68d197d905d26ef415250975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59590-cwe-79-improper-neutralization-of-i-19cf9ea1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=null&amp;id=68d197d905d26ef415250978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59591-cwe-862-missing-authorization-in-ad-502ada3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59591%3A%20Missing%20Authorization%20in%20AdvancedCoding%20wpDiscuz&amp;severity=null&amp;id=68d197d905d26ef415250993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59592-cwe-79-improper-neutralization-of-i-ca0e16b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fernando%20Acosta%20Make%20Column%20Clickable%20Elementor&amp;severity=null&amp;id=68d197da05d26ef415250996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53450-cwe-98-improper-control-of-filename-ab3a2023</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53450%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Pluginwale%20Easy%20Pricing%20Table%20WP&amp;severity=null&amp;id=68d197d505d26ef415250839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53452-cwe-862-missing-authorization-in-ba-7ca89b9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53452%3A%20CWE-862%20Missing%20Authorization%20in%20Barry%20Event%20Rocket&amp;severity=medium&amp;id=68d197d505d26ef41525083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53451-cwe-352-cross-site-request-forgery--eccb5046</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mihdan%20Mihdan%3A%20No%20External%20Links&amp;severity=null&amp;id=68d197d505d26ef41525083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53454-cwe-79-improper-neutralization-of-i-f9109844</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=68d197d505d26ef415250842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53455-cwe-79-improper-neutralization-of-i-15766ee3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CashBill%20CashBill.pl%20%26%238211%3B%20P%C5%82atno%C5%9Bci%20WooCommerce&amp;severity=null&amp;id=68d197d505d26ef415250845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53456-cwe-352-cross-site-request-forgery--405c2597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20activewebsight%20SEO%20Backlink%20Monitor&amp;severity=null&amp;id=68d197d505d26ef415250848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53457-cwe-918-server-side-request-forgery-b3f85067</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53457%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20activewebsight%20SEO%20Backlink%20Monitor&amp;severity=null&amp;id=68d197d505d26ef41525084b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53458-cwe-79-improper-neutralization-of-i-6322b41d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davaxi%20Goracash&amp;severity=null&amp;id=68d197d505d26ef41525084e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53459-9923ad27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53459&amp;severity=null&amp;id=68f8a4c3ce3bbdd80f2df547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36064-cwe-307-improper-restriction-of-exc-97395c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36064%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20Sterling%20Connect%3AExpress%20for%20Microsoft%20Windows&amp;severity=medium&amp;id=68d197d505d26ef415250836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53460-cwe-79-improper-neutralization-of-i-b463fed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20AffiliateWP%20%E2%80%93%20External%20Referral%20Links&amp;severity=null&amp;id=68d197d605d26ef415250861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53461-cwe-918-server-side-request-forgery-1845b859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53461%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Binsaifullah%20Beaf&amp;severity=null&amp;id=68d197d605d26ef415250864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53462-cwe-79-improper-neutralization-of-i-fe6abc4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAPO%20SAPO%20Feed&amp;severity=null&amp;id=68d197d605d26ef415250867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53463-cwe-79-improper-neutralization-of-i-2da09a3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68d197d605d26ef41525086a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53464-cwe-79-improper-neutralization-of-i-0fced7c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Online%20Optimisation%20WP%20Mailto%20Links&amp;severity=null&amp;id=68d197d605d26ef41525086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53465-cwe-502-deserialization-of-untruste-cbe4b2de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53465%3A%20Deserialization%20of%20Untrusted%20Data%20in%20raoinfotech%20GSheets%20Connector&amp;severity=null&amp;id=68d197d605d26ef415250870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53466-cwe-79-improper-neutralization-of-i-faf81789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53466%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeSolz%20Better%20Find%20and%20Replace&amp;severity=null&amp;id=68d197d605d26ef415250873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53467-cwe-79-improper-neutralization-of-i-9faf576f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Login-Logout&amp;severity=null&amp;id=68d197d605d26ef415250876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53468-cwe-89-improper-neutralization-of-s-4b9ec101</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53468%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%40hotmail.com%20Wp%20tabber%20widget&amp;severity=null&amp;id=68d197d605d26ef415250879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53469-cwe-79-improper-neutralization-of-i-c967e145</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mortgage%20Calculator%20BMI%20Adult%20%26%20Kid%20Calculator&amp;severity=null&amp;id=68d197d605d26ef41525087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53570-cwe-79-improper-neutralization-of-i-9efbae26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=68d197d605d26ef415250889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57898-cwe-79-improper-neutralization-of-i-fd967d69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jose%20Vega%20WP%20Frontend%20Admin&amp;severity=null&amp;id=68d197d605d26ef415250891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57899-cwe-862-missing-authorization-in-ar-462ce75a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57899%3A%20Missing%20Authorization%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=68d197d605d26ef415250894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57900-cwe-79-improper-neutralization-of-i-c86b687c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ataur%20R%20GutenKit&amp;severity=null&amp;id=68d197d605d26ef415250897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57901-cwe-79-improper-neutralization-of-i-41c47566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57901&amp;severity=null&amp;id=68d197d605d26ef41525089a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57902-cwe-352-cross-site-request-forgery--f1d2b576</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57902%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Md%20Taufiqur%20Rahman%20RIS%20Version%20Switcher%20%26%238211%3B%20Downgrade%20or%20Upgrade%20WP%20Versions%20Easily&amp;severity=null&amp;id=68d197d605d26ef41525089d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57903-cwe-79-improper-neutralization-of-i-a2124145</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPSuperiors%20Developer%20WooCommerce%20Additional%20Fees%20On%20Checkout%20(Free)&amp;severity=null&amp;id=68d197d605d26ef4152508a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57904-cwe-79-improper-neutralization-of-i-b5e352c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP-EXPERTS.IN%20Sales%20Count%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68d197d605d26ef4152508a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57905-cwe-352-cross-site-request-forgery--29b4a2d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57905%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Amin%20Y%20AgreeMe%20Checkboxes%20For%20WooCommerce&amp;severity=null&amp;id=68d197d605d26ef4152508a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57906-cwe-79-improper-neutralization-of-i-81ab3619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20epeken%20Epeken%20All%20Kurir&amp;severity=null&amp;id=68d197d705d26ef4152508b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57907-cwe-862-missing-authorization-in-he-5f2399ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57907%3A%20Missing%20Authorization%20in%20Heureka%20Group%20Heureka&amp;severity=null&amp;id=68d197d705d26ef4152508bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57908-cwe-79-improper-neutralization-of-i-79bb1f5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProWCPlugins%20Product%20Time%20Countdown%20for%20WooCommerce&amp;severity=null&amp;id=68d197d705d26ef4152508bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57909-cwe-862-missing-authorization-in-ro-039e8500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57909%3A%20Missing%20Authorization%20in%20Rouergue%20Cr%C3%A9ation%20Editor%20Custom%20Color%20Palette&amp;severity=null&amp;id=68d197d705d26ef4152508c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57910-cwe-79-improper-neutralization-of-i-33505c69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AnyClip%20Video%20Platform%20AnyClip%20Luminous%20Studio&amp;severity=null&amp;id=68d197d705d26ef4152508c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57911-cwe-79-improper-neutralization-of-i-e0597bc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Adverts&amp;severity=null&amp;id=68d197d705d26ef4152508c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57912-cwe-79-improper-neutralization-of-i-371d71a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dialogity%20Dialogity%20Free%20Live%20Chat&amp;severity=null&amp;id=68d197d705d26ef4152508cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57913-cwe-79-improper-neutralization-of-i-bd6421da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57914-cwe-352-cross-site-request-forgery--afe04ee5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57914%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matat%20Technologies%20Deliver%20via%20Shipos%20for%20WooCommerce&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57915-cwe-352-cross-site-request-forgery--6ff806ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57915%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20C%C3%A9sar%20Mart%C3%ADn%20TOCHAT.BE&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57916-cwe-497-exposure-of-sensitive-syste-ce07b05f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57916%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Nurul%20Amin%20WP%20System%20Information&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57917-cwe-862-missing-authorization-in-pr-80002190</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57917%3A%20Missing%20Authorization%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57918-cwe-352-cross-site-request-forgery--4ca2ae40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57918%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ERA404%20LinkedInclude&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57919-cwe-502-deserialization-of-untruste-31c6b44e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57919%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ConveyThis%20Language%20Translate%20Widget%20for%20WordPress%20%E2%80%93%20ConveyThis&amp;severity=high&amp;id=68d194c4a6a0abbafb7a38f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57920-cwe-79-improper-neutralization-of-i-9a590dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CK%20MacLeod%20Category%20Featured%20Images%20Extended&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57921-cwe-862-missing-authorization-in-n--5721fdc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57921%3A%20Missing%20Authorization%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57922-cwe-201-insertion-of-sensitive-info-ee80b0f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57922%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Coordinadora%20Mercantil%20S.A.%20Env%C3%ADos%20Coordinadora%20Woocommerce&amp;severity=null&amp;id=68d194c4a6a0abbafb7a38fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57923-cwe-201-insertion-of-sensitive-info-eef59c2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57923%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Ideal%20Postcodes%20UK%20Address%20Postcode%20Validation&amp;severity=null&amp;id=68d194c5a6a0abbafb7a391f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57924-cwe-352-cross-site-request-forgery--f91c38f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20Developer&amp;severity=medium&amp;id=68d194c5a6a0abbafb7a3922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57925-cwe-98-improper-control-of-filename-8ee1ebab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20immonex%20immonex%20Kickstart%20Team&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57926-cwe-79-improper-neutralization-of-i-8cf6c6a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Passster&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57927-cwe-352-cross-site-request-forgery--5a0d5e0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57927%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stephanie%20Leary%20Dashboard%20Notepad&amp;severity=null&amp;id=68d194c5a6a0abbafb7a392c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57928-cwe-80-improper-neutralization-of-s-5e8a3f3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57928%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Strategy11%20Team%20AWP%20Classifieds&amp;severity=null&amp;id=68d194c5a6a0abbafb7a392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57929-cwe-79-improper-neutralization-of-i-69e692bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanwei_doublethedonation%20Double%20the%20Donation&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57930-cwe-352-cross-site-request-forgery--4faf5ca1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57930%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kanwei_doublethedonation%20Double%20the%20Donation&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57932-cwe-79-improper-neutralization-of-i-bd51fa91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Diego%20Pereira%20PowerFolio&amp;severity=null&amp;id=68d194c5a6a0abbafb7a3938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57933-cwe-352-cross-site-request-forgery--d0006550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=68d194c5a6a0abbafb7a393b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57934-cwe-352-cross-site-request-forgery--bdda6483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57934%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aur%C3%A9lien%20LWS%20LWS%20Affiliation&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57935-cwe-79-improper-neutralization-of-i-260d253c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ricky%20Dawn%20Bot%20Block%20%26%238211%3B%20Stop%20Spam%20Referrals%20in%20Google%20Analytics&amp;severity=null&amp;id=68d194c6a6a0abbafb7a395c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57936-cwe-862-missing-authorization-in-me-ac3e2e42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57936%3A%20Missing%20Authorization%20in%20Meitar%20Subresource%20Integrity%20(SRI)%20Manager&amp;severity=null&amp;id=68d194c6a6a0abbafb7a395f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57937-cwe-497-exposure-of-sensitive-syste-3ab3c170</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57937%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57938-cwe-79-improper-neutralization-of-i-1bab1db5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themewant%20Easy%20Hotel%20Booking&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57939-cwe-862-missing-authorization-in-bl-06af126f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57939%3A%20Missing%20Authorization%20in%20Blocksera%20Image%20Hover%20Effects%20%E2%80%93%20Elementor%20Addon&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57940-cwe-79-improper-neutralization-of-i-f7710226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Suresh%20Kumar%20Mukhiya%20Append%20extensions%20on%20Pages&amp;severity=null&amp;id=68d194c6a6a0abbafb7a396c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57941-cwe-79-improper-neutralization-of-i-de3a202a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JonathanMH%20Append%20Link%20on%20Copy&amp;severity=null&amp;id=68d194c6a6a0abbafb7a396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57942-cwe-352-cross-site-request-forgery--dc96c6ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57942%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andy_moyle%20Emergency%20Password%20Reset&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57943-cwe-918-server-side-request-forgery-7301e444</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57943%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Skimlinks%20Skimlinks%20Affiliate%20Marketing%20Tool&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57944-cwe-862-missing-authorization-in-sk-6a8b270a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57944%3A%20Missing%20Authorization%20in%20Skimlinks%20Skimlinks%20Affiliate%20Marketing%20Tool&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57945-cwe-79-improper-neutralization-of-i-85f21c02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cedcommerce%20WP%20Advanced%20PDF&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57946-cwe-352-cross-site-request-forgery--2c45e269</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57946%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Loc%20Bui%20payOS&amp;severity=null&amp;id=68d194c6a6a0abbafb7a3997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57947-cwe-79-improper-neutralization-of-i-fa5353c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Photo%20Gallery%20by%20Ays&amp;severity=null&amp;id=68d194c6a6a0abbafb7a399a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57948-cwe-79-improper-neutralization-of-i-fe74cdf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57948%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e-plugins%20Directory%20Pro&amp;severity=null&amp;id=68d194c6a6a0abbafb7a399d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57949-cwe-862-missing-authorization-in-og-7bef1ee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57949%3A%20Missing%20Authorization%20in%20oggix%20Ongkoskirim.id&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57950-cwe-79-improper-neutralization-of-i-18dc8953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Glen%20Scott%20Plugin%20Security%20Scanner&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57951-cwe-79-improper-neutralization-of-i-9b528247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ken107%20SiteNarrator%20Text-to-Speech%20Widget&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57952-cwe-79-improper-neutralization-of-i-c1cda29c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Maps%20for%20WP&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57953-cwe-79-improper-neutralization-of-i-2cef4976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57953%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20100plugins%20Open%20User%20Map&amp;severity=null&amp;id=68d194c6a6a0abbafb7a39ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57954-cwe-79-improper-neutralization-of-i-16b0dcaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57955-cwe-862-missing-authorization-in-pl-9794e8d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57955%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20Post%20Carousel%20Slider%20for%20Elementor&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57956-cwe-79-improper-neutralization-of-i-03ab80f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcraft%20WooMS&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57957-cwe-862-missing-authorization-in-wp-49c0cde0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57957%3A%20Missing%20Authorization%20in%20wpcraft%20WooMS&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57958-cwe-862-missing-authorization-in-wp-f32a2dbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57958%3A%20Missing%20Authorization%20in%20WPXPO%20WowAddons&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57959-cwe-79-improper-neutralization-of-i-97dade6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmatsuur%20Slightly%20troublesome%20permalink&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57960-cwe-352-cross-site-request-forgery--331472bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57960%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TravelMap%20Travel%20Map&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57961-cwe-862-missing-authorization-in-co-79cfa9e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57961%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20CoDesigner&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57962-cwe-79-improper-neutralization-of-i-b106b119</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57963-cwe-79-improper-neutralization-of-i-d48d5b99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoho%20Subscriptions%20Zoho%20Billing&amp;severity=null&amp;id=68d194c7a6a0abbafb7a39e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57964-cwe-79-improper-neutralization-of-i-f5efec9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=null&amp;id=68d194c8a6a0abbafb7a39fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57965-cwe-79-improper-neutralization-of-i-b1685625</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20WP%20Proposals&amp;severity=medium&amp;id=68d194c8a6a0abbafb7a39fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57966-cwe-79-improper-neutralization-of-i-baa25372</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20Lightbox&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57967-cwe-79-improper-neutralization-of-i-b4357bff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57967%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20WPB%20Quick%20View%20for%20WooCommerce&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57968-cwe-79-improper-neutralization-of-i-504e40ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikRestaurants&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57969-cwe-862-missing-authorization-in-je-fb3fc3a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57969%3A%20Missing%20Authorization%20in%20Jeremy%20Saxey%20Hide%20WP%20Toolbar&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57970-cwe-352-cross-site-request-forgery--c5b0f830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57970%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=null&amp;id=68e0920311971642e85b877b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57971-cwe-862-missing-authorization-in-sa-082bd231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57971%3A%20Missing%20Authorization%20in%20SALESmanago%20SALESmanago%20%26%20Leadoo&amp;severity=null&amp;id=68e0920411971642e85b877e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57972-cwe-862-missing-authorization-in-wp-5ecd549e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57972%3A%20Missing%20Authorization%20in%20WPFactory%20Helpdesk%20Support%20Ticket%20System%20for%20WooCommerce&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57973-cwe-79-improper-neutralization-of-i-a4c2a80b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chad%20Butler%20WP-Members&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57974-cwe-79-improper-neutralization-of-i-72baca70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57974%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuyennv%20TZ%20PlusGallery&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57975-cwe-862-missing-authorization-in-ra-83632226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57975%3A%20Missing%20Authorization%20in%20RadiusTheme%20Team&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57976-cwe-862-missing-authorization-in-ca-314cc7df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57976%3A%20Missing%20Authorization%20in%20CardCom%20CardCom%20Payment%20Gateway&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57977-cwe-352-cross-site-request-forgery--77d588f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57977%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdesk%20Flexible%20PDF%20Invoices%20for%20WooCommerce%20%26amp%3B%20WordPress&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57978-cwe-352-cross-site-request-forgery--5f73fe76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57978%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themespride%20Advanced%20Appointment%20Booking%20%26amp%3B%20Scheduling&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57979-cwe-79-improper-neutralization-of-i-da390ca3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57979%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Russell%20Jamieson%20AuthorSure&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57980-cwe-79-improper-neutralization-of-i-4e883d89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20Cordero%20Safety%20Exit&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57981-cwe-79-improper-neutralization-of-i-d767790c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57981%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchsquare%20WP%20Social%20Widget&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57982-cwe-79-improper-neutralization-of-i-186500e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20Advance%20Portfolio%20Grid&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57983-cwe-352-cross-site-request-forgery--65dac4ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57983%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Damian%20BP%20Disable%20Activation%20Reloaded&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57984-cwe-918-server-side-request-forgery-1b86a4bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57984%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pratik%20Ghela%20MakeStories%20(for%20Google%20Web%20Stories)&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57985-cwe-862-missing-authorization-in-ma-fb7a7ba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57985%3A%20Missing%20Authorization%20in%20MantraBrain%20Ultimate%20Watermark&amp;severity=null&amp;id=68d194c8a6a0abbafb7a3a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57986-cwe-79-improper-neutralization-of-i-8c4d98d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57986%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husani%20WP%20Subtitle&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57987-cwe-862-missing-authorization-in-th-a14ae87a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57987%3A%20Missing%20Authorization%20in%20ThimPress%20WP%20Events%20Manager&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57988-cwe-79-improper-neutralization-of-i-812a0ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uncanny%20Owl%20Uncanny%20Toolkit%20for%20LearnDash&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57989-cwe-79-improper-neutralization-of-i-20a75d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brajesh%20Singh%20WordPress%20Widgets%20Shortcode&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57990-cwe-862-missing-authorization-in-so-98a5c393</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57990%3A%20Missing%20Authorization%20in%20solwininfotech%20Blog%20Designer&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57992-cwe-352-cross-site-request-forgery--fdf31d06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57992%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20InterServer%20Mail%20Baby%20SMTP&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57993-cwe-79-improper-neutralization-of-i-4e8128e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57993%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Pick%20Geolocation%20IP%20Detection&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57994-cwe-639-authorization-bypass-throug-9dfa123e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57994%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Sayful%20Islam%20Upcoming%20Events%20Lists&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57995-cwe-862-missing-authorization-in-de-79a0e638</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57995%3A%20Missing%20Authorization%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57996-cwe-79-improper-neutralization-of-i-a1660b15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57996%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewordie%20Buckets&amp;severity=null&amp;id=68d194c9a6a0abbafb7a3a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57997-cwe-862-missing-authorization-in-tr-389e7343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57997%3A%20Missing%20Authorization%20in%20Trustpilot%20Trustpilot%20Reviews&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57998-cwe-79-improper-neutralization-of-i-468723b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hamid%20Reza%20Yazdani%20E-namad%20%26amp%3B%20Shamed%20Logo%20Manager&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57999-cwe-79-improper-neutralization-of-i-6944a29f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57999%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58000-missing-authorization-in-memberful--41721f7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58000%3A%20Missing%20Authorization%20in%20memberful%20Memberful%20-%20Membership%20Plugin&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58001-cwe-79-improper-neutralization-of-i-9c96e596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Compact%20Archives&amp;severity=null&amp;id=68d194caa6a0abbafb7a3a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58002-cwe-79-improper-neutralization-of-i-cd8eb5c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58002%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Milan%20Petrovic%20GD%20bbPress%20Tools&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58003-cwe-862-missing-authorization-in-ja-bf515e27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58003%3A%20Missing%20Authorization%20in%20javothemes%20Javo%20Core&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58004-cwe-862-missing-authorization-in-sm-c70470ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58004%3A%20Missing%20Authorization%20in%20SmartDataSoft%20DriCub&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58005-cwe-918-server-side-request-forgery-977499ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58005%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20DriCub&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58006-cwe-601-url-redirection-to-untruste-7a874883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58006%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Keap%2FInfusionsoft&amp;severity=null&amp;id=68d194caa6a0abbafb7a3aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58007-cwe-497-exposure-of-sensitive-syste-08a12c4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58007%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NerdPress%20Hubbub%20Lite&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58008-cwe-79-improper-neutralization-of-i-0a8888f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xnau%20webdesign%20Participants%20Database&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58009-cwe-862-missing-authorization-in-co-be73f93c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58009%3A%20Missing%20Authorization%20in%20codepeople%20CP%20Multi%20View%20Event%20Calendar&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58010-cwe-352-cross-site-request-forgery--96b0aafe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58010%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20straightvisions%20GmbH%20SV%20Proven%20Expert&amp;severity=null&amp;id=68d194caa6a0abbafb7a3acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58011-cwe-918-server-side-request-forgery-5976ccce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58011%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Alex%20Content%20Mask&amp;severity=null&amp;id=68d194caa6a0abbafb7a3acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58012-cwe-639-authorization-bypass-throug-f2e3679f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58012%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Alex%20Content%20Mask&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58013-cwe-352-cross-site-request-forgery--8791d841</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58013%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pebas%20CouponXxL&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58014-cwe-352-cross-site-request-forgery--e89273e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58014%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58015-cwe-497-exposure-of-sensitive-syste-61adc086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58015%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=null&amp;id=68d194caa6a0abbafb7a3adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58016-cwe-862-missing-authorization-in-co-a561c6d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58016%3A%20Missing%20Authorization%20in%20Codexpert%2C%20Inc%20CF7%20Submissions&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58017-cwe-79-improper-neutralization-of-i-1c7acd53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=68d194caa6a0abbafb7a3ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58018-cwe-79-improper-neutralization-of-i-584e72d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Richard%20Leishman%20Mail%20Subscribe%20List&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58019-cwe-79-improper-neutralization-of-i-5b2ac129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58019%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Search%20Atlas%20Group%20Search%20Atlas%20SEO&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58020-cwe-79-improper-neutralization-of-i-d0be44e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58021-cwe-79-improper-neutralization-of-i-d496048a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20douglaskarr%20List%20Child%20Pages%20Shortcode&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58022-cwe-79-improper-neutralization-of-i-a96080d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxpagels%20ShortCode&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58023-cwe-79-improper-neutralization-of-i-39ac668a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20akdevs%20Genealogical%20Tree&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58025-cwe-79-improper-neutralization-of-i-4ca3e971</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58026-cwe-79-improper-neutralization-of-i-3bf8b956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20termageddon%20Termageddon%3A%20Cookie%20Consent%20%26%20Privacy%20Compliance&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58027-cwe-79-improper-neutralization-of-i-77978509</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo-HR%20NGG%20Smart%20Image%20Search&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58028-cwe-79-improper-neutralization-of-i-4a88ce36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58028%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aum%20Watcharapon%20Designil%20PDPA%20Thailand&amp;severity=null&amp;id=68d194cba6a0abbafb7a3b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58029-cwe-862-missing-authorization-in-su-50e3fb30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58029%3A%20Missing%20Authorization%20in%20Sumit%20Singh%20Classic%20Widgets%20with%20Block-based%20Widgets&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58030-cwe-79-improper-neutralization-of-i-fbc9d863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Page-list&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58031-cwe-79-improper-neutralization-of-i-0246886a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nextendweb%20Nextend%20Facebook%20Connect&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58032-cwe-352-cross-site-request-forgery--07579428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58032%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bytes.co%20WP%20Compiler&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58033-cwe-79-improper-neutralization-of-i-e42e2d08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leeshadle%20Draft&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58200-cwe-352-cross-site-request-forgery--79e9ab6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58200%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bage%20Flexible%20FAQ&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58219-cwe-352-cross-site-request-forgery--0977252c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58219%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LIJE%20Show%20Pages%20List&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58220-cwe-79-improper-neutralization-of-i-862dc7b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Techeshta%20Card%20Elements%20for%20WPBakery&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58221-cwe-862-missing-authorization-in-on-00386ea0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58221%3A%20Missing%20Authorization%20in%20ONTRAPORT%20PilotPress&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58222-cwe-862-missing-authorization-in-ma-4202eae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58222%3A%20Missing%20Authorization%20in%20Maidul%20Team%20Manager&amp;severity=null&amp;id=68d194cca6a0abbafb7a3b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58224-cwe-352-cross-site-request-forgery--ab8f2c99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58224%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Printeers%20Printeers%20Print%20%26%20Ship&amp;severity=medium&amp;id=68d194cda6a0abbafb7a3b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58223-cwe-79-improper-neutralization-of-i-93bccd3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58223%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20VoucherPress&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58226-cwe-201-insertion-of-sensitive-info-ddc50ca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58226%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58227-cwe-79-improper-neutralization-of-i-1273a355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58227%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alexander%20Lueken%20Podlove%20Subscribe%20button&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58228-cwe-79-improper-neutralization-of-i-8cde50ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShapedPlugin%20LLC%20Quick%20View%20for%20WooCommerce&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58229-cwe-79-improper-neutralization-of-i-ef7d5f88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Sitekit&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58230-cwe-79-improper-neutralization-of-i-31267cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58230%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20ZoloBlocks&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58231-cwe-79-improper-neutralization-of-i-a6759e05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitlydeveloper%20Bitly&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58232-cwe-79-improper-neutralization-of-i-6071f251</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ickata%20Image%20Editor%20by%20Pixo&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58233-cwe-79-improper-neutralization-of-i-dab573e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Guaven%20Labs%20SQL%20Chart%20Builder&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58234-cwe-79-improper-neutralization-of-i-23a15347</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58235-cwe-79-improper-neutralization-of-i-3a44a013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Front%20End%20Users&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58236-cwe-352-cross-site-request-forgery--70d808ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58236%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mayo%20Moriyama%20Force%20Update%20Translations&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58237-cwe-79-improper-neutralization-of-i-54b2ff53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Niaj%20Morshed%20LC%20Wizard&amp;severity=null&amp;id=68d194cda6a0abbafb7a3b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58238-cwe-79-improper-neutralization-of-i-4a4091ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ONTRAPORT%20PilotPress&amp;severity=null&amp;id=68d194cda6a0abbafb7a3ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58239-cwe-79-improper-neutralization-of-i-2e417056</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chandrika%20Sista%20WP%20Category%20Dropdown&amp;severity=null&amp;id=68d194cda6a0abbafb7a3ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58240-cwe-79-improper-neutralization-of-i-02898c04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-tidy-tags&amp;severity=null&amp;id=68d194cda6a0abbafb7a3ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58241-cwe-79-improper-neutralization-of-i-41d8e880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snapwidget%20SnapWidget%20Social%20Photo%20Feed%20Widget&amp;severity=null&amp;id=68d194cda6a0abbafb7a3bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58242-cwe-79-improper-neutralization-of-i-d09709f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58242%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vadim%20Bogaiskov%20Bg%20Church%20Memos&amp;severity=null&amp;id=68d194cda6a0abbafb7a3bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58244-cwe-352-cross-site-request-forgery--a4e25725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58244%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anps%20Constructo&amp;severity=null&amp;id=68d194cda6a0abbafb7a3bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58245-cwe-79-improper-neutralization-of-i-98df8782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Portfolio&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58247-cwe-862-missing-authorization-in-te-f19be31b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58247%3A%20Missing%20Authorization%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58248-cwe-79-improper-neutralization-of-i-8b46eef0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58248%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codefish%20Pinterest%20Pinboard%20Widget&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58249-cwe-201-insertion-of-sensitive-info-8d8b5083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58249%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Themeum%20Qubely&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58250-cwe-352-cross-site-request-forgery--73fd2b24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58250%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ApusTheme%20Findgo&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58251-cwe-862-missing-authorization-in-po-2d161fdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58251%3A%20Missing%20Authorization%20in%20POSIMYTH%20Sticky%20Header%20Effects%20for%20Elementor&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58252-cwe-201-insertion-of-sensitive-info-4cddeeea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58252%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20jetmonsters%20Getwid&amp;severity=null&amp;id=68d194cea6a0abbafb7a3be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58253-cwe-79-improper-neutralization-of-i-3387c75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=68d194cea6a0abbafb7a3be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58254-cwe-79-improper-neutralization-of-i-a98eef3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dtbaker%20StylePress%20for%20Elementor&amp;severity=null&amp;id=68d194cea6a0abbafb7a3be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58255-cwe-352-cross-site-request-forgery--ad803cb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58255%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20Custom%20Post%20Type%20Images&amp;severity=null&amp;id=68d194cea6a0abbafb7a3bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58256-cwe-79-improper-neutralization-of-i-20c5d8c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58256%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Brinley%20DOAJ%20Export&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58257-cwe-79-improper-neutralization-of-i-87b6d9ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58257%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Picture-Planet%20GmbH%20Verowa%20Connect&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58258-cwe-862-missing-authorization-in-nk-a4521a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58258%3A%20Missing%20Authorization%20in%20nK%20Lazy%20Blocks&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58259-cwe-352-cross-site-request-forgery--8fa45a2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58259%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scriptsbundle%20Nokri&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58260-cwe-79-improper-neutralization-of-i-5f864163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronald%20Huereca%20Highlight%20and%20Share&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58261-cwe-352-cross-site-request-forgery--9269713b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58261%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressPage%20Entertainment%20Inc%20Mavis%20HTTPS%20to%20HTTP%20Redirection&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58262-cwe-352-cross-site-request-forgery--f1aede7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPDirectoryKit%20Sweet%20Energy%20Efficiency&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58263-cwe-79-improper-neutralization-of-i-086ca2cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddyDev%20BuddyPress%20Notification%20Widget&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58264-cwe-79-improper-neutralization-of-i-8ae7ebdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20JupiterX%20Core&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58265-cwe-79-improper-neutralization-of-i-b186b1b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stonehenge%20Creations%20Events%20Manager%20%26%238211%3B%20OpenStreetMaps&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58266-cwe-79-improper-neutralization-of-i-42637206</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fumiki%20Takahashi%20Gianism&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58267-cwe-352-cross-site-request-forgery--1286bc07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58267%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aftabul%20Islam%20Stock%20Message&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58268-cwe-352-cross-site-request-forgery--4228b184</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58268%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPMK%20WPMK%20PDF%20Generator&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58269-cwe-798-use-of-hard-coded-credentia-8b2b1c46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58269%3A%20Use%20of%20Hard-coded%20Credentials%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58270-cwe-352-cross-site-request-forgery--2d9c9f0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58270%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NIX%20Solutions%20Ltd%20NIX%20Anti-Spam%20Light&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58271-cwe-79-improper-neutralization-of-i-ca2aa4ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58271%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AnyClip%20Video%20Platform%20AnyClip%20Luminous%20Studio&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58645-cwe-79-improper-neutralization-of-i-284b3331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gravitate%20Gravitate%20Automated%20Tester&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58646-cwe-79-improper-neutralization-of-i-c23e7435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chtombleson%20Mobi2Go&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58647-cwe-79-improper-neutralization-of-i-c2164821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Will.I.am%20Simple%20Restaurant%20Menu&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58648-cwe-79-improper-neutralization-of-i-7bfe5f2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nicu%20Micle%20Simple%20JWT%20Login&amp;severity=null&amp;id=68d194cfa6a0abbafb7a3c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58649-cwe-201-insertion-of-sensitive-info-337c15b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58649%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58650-cwe-862-missing-authorization-in-sy-1cccf5b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58650%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20All%20In%20One%20SEO%20Pack&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58652-cwe-79-improper-neutralization-of-i-ef8a579a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Carousel%20Ultimate&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58653-cwe-79-improper-neutralization-of-i-c2a16b9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JS%20Morisset%20JSM%20file_get_contents()%20Shortcode&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58654-cwe-79-improper-neutralization-of-i-d608b104</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-language&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58655-cwe-79-improper-neutralization-of-i-9f0189e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58655%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mat%20Category%20Featured%20Images&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58656-cwe-798-use-of-hard-coded-credentia-82e94a45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58656%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Risto%20Niinemets%20Estonian%20Shipping%20Methods%20for%20WooCommerce&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58657-cwe-352-cross-site-request-forgery--dd8d351d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58657%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EdwardBock%20Grid&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58658-cwe-79-improper-neutralization-of-i-92cab2b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58658%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Proof%20Factor%20LLC%20Proof%20Factor%20%26%238211%3B%20Social%20Proof%20Notifications&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58659-cwe-798-use-of-hard-coded-credentia-3a05f076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58659%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Essekia%20Helpie%20FAQ&amp;severity=null&amp;id=68d194d0a6a0abbafb7a3c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58660-cwe-862-missing-authorization-in-br-774ae4fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58660%3A%20Missing%20Authorization%20in%20brandexponents%20Oshine%20Core&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58661-cwe-79-improper-neutralization-of-i-56c984a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58661%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eZee%20Technosys%20eZee%20Online%20Hotel%20Booking%20Engine&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58662-cwe-502-deserialization-of-untruste-c888ccf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58662%3A%20Deserialization%20of%20Untrusted%20Data%20in%20awesomesupport%20Awesome%20Support&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58663-cwe-862-missing-authorization-in-th-cd60ec21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58663%3A%20Missing%20Authorization%20in%20Themeum%20Qubely&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58664-cwe-862-missing-authorization-in-az-b7e1c849</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58664%3A%20Missing%20Authorization%20in%20Azizul%20Hasan%20Text%20To%20Speech%20TTS%20Accessibility&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58665-cwe-79-improper-neutralization-of-i-b13b327b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tmontg1%20Form%20Generator%20for%20WordPress&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58666-cwe-862-missing-authorization-in-ko-1d560c7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58666%3A%20Missing%20Authorization%20in%20Kommo%20Website%20Chat%20Button%3A%20Kommo%20integration&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58667-cwe-862-missing-authorization-in-cr-6bf044d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58667%3A%20Missing%20Authorization%20in%20CridioStudio%20ListingPro%20Reviews&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58668-cwe-862-missing-authorization-in-vi-02beb68b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58668%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58669-cwe-79-improper-neutralization-of-i-b3bf960f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58669%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modern%20Minds%20Magento%202%20WordPress%20Integration&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58670-cwe-352-cross-site-request-forgery--2b90bec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58670%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shankaranand%20Maurya%20WP%20Content%20Protection&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58671-cwe-79-improper-neutralization-of-i-16c3133e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58671%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20morganrichards%20Auction%20Feed&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58672-cwe-862-missing-authorization-in-ta-a52806fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58672%3A%20Missing%20Authorization%20in%20weDevs%20WP%20User%20Frontend&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58673-cwe-94-improper-control-of-generati-2a18d1d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58673%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20weDevs%20WP%20User%20Frontend&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58675-cwe-352-cross-site-request-forgery--fc3375bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58675%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tryinteract%20Interact%3A%20Embed%20A%20Quiz%20On%20Your%20Site&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58676-cwe-352-cross-site-request-forgery--770e2b31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58676%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendyourweb%20HORIZONTAL%20SLIDER&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58677-cwe-352-cross-site-request-forgery--f5ebafe9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58677%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20puravida1976%20ShrinkTheWeb%20(STW)%20Website%20Previews&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58678-cwe-862-missing-authorization-in-pi-52b690db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58678%3A%20Missing%20Authorization%20in%20PickPlugins%20Accordion&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58681-cwe-862-missing-authorization-in-jr-5221a95b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58681%3A%20Missing%20Authorization%20in%20J%C3%BCrgen%20M%C3%BCller%20Easy%20Quotes&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58682-cwe-79-improper-neutralization-of-i-3d378eee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Timur%20Kamaev%20Kama%20Click%20Counter&amp;severity=null&amp;id=68d194d1a6a0abbafb7a3cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58683-cwe-79-improper-neutralization-of-i-bb58223e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luke%20Mlsna%20Last%20Updated%20Shortcode&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58684-cwe-79-improper-neutralization-of-i-57064799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Logo%20Showcase&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58685-cwe-862-missing-authorization-in-ce-c93e9b97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58685%3A%20Missing%20Authorization%20in%20cecabank%20Cecabank%20WooCommerce%20Plugin&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58686-cwe-89-improper-neutralization-of-s-b3e15f45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58686%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quadlayers%20Perfect%20Brands%20for%20WooCommerce&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58687-cwe-352-cross-site-request-forgery--761bdf6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58687%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20CMS%20Ninja%20Current%20Age%20Plugin&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58688-cwe-352-cross-site-request-forgery--841c96e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58688%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Casengo%20Casengo%20Live%20Chat%20Support&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58691-cwe-79-improper-neutralization-of-i-3c9b90b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58691%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Russell%20Jamieson%20Genesis%20Club%20Lite&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58690-cwe-352-cross-site-request-forgery--9c198f1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58690%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ptibogxiv%20Doliconnect&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58702-cwe-79-improper-neutralization-of-i-d126f9f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebWizards%20MarketKing&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58703-cwe-79-improper-neutralization-of-i-3ecc689b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skyword%20Skyword%20API%20Plugin&amp;severity=null&amp;id=68d194d2a6a0abbafb7a3d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58704-cwe-79-improper-neutralization-of-i-93692982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ren%20Ventura%20WP%20Delete%20User%20Accounts&amp;severity=null&amp;id=68d194d3a6a0abbafb7a3d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59418-cwe-770-allocation-of-resources-wit-4e1acf59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59418%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GSYT-Productions%20BunnyPad-SRC&amp;severity=medium&amp;id=68d194d3a6a0abbafb7a3d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10809-sql-injection-in-campcodes-online-l-d5eef7b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10809%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d18f781941fd9178dad985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10808-sql-injection-in-campcodes-farm-man-9229217b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10808%3A%20SQL%20Injection%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68d18a33f374b317608a7fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10807-sql-injection-in-campcodes-online-b-b6e50e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10807%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d181926d3a945b7030e02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10806-sql-injection-in-campcodes-online-b-9bcc54b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10806%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d17a761010bdf62ab0e30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmscape-attack-kaspersky-official-blog-85e51fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMScape%20attack%20%7C%20Kaspersky%20official%20blog&amp;severity=medium&amp;id=68e46dd46a45552f36e9575f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43807-cwe-79-improper-neutralization-of-i-95b84f5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68d1781a31c9c64c14377c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59413-cwe-862-missing-authorization-in-cu-a5fb9b7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59413%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cubecart%20v6&amp;severity=medium&amp;id=68d1781a31c9c64c14377c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59412-cwe-79-improper-neutralization-of-i-9585ee56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59412%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubecart%20v6&amp;severity=medium&amp;id=68d1781a31c9c64c14377c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59411-cwe-79-improper-neutralization-of-i-e47c75c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59411%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubecart%20v6&amp;severity=medium&amp;id=68d1781a31c9c64c14377c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59335-cwe-613-insufficient-session-expira-65b0ac3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59335%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20cubecart%20v6&amp;severity=high&amp;id=68d1781a31c9c64c14377c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10805-sql-injection-in-campcodes-online-b-e1969e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10805%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d17cd174c89a4b27bf04e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35042-cwe-1392-use-of-default-credentials-de871978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35042%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Airship%20AI%20Acropolis&amp;severity=critical&amp;id=68d1e592efb46fd03052629a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35041-cwe-307-improper-restriction-of-exc-1dac38fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35041%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Airship%20AI%20Acropolis&amp;severity=high&amp;id=68d1e592efb46fd030526296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10804-sql-injection-in-campcodes-online-b-106513f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10804%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Beauty%20Parlor%20Management%20System&amp;severity=medium&amp;id=68d16e40908623ce300f0d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-alerts-public-to-spoofed-ic3-site-used-in-frau-6cd654f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20alerts%20public%20to%20spoofed%20IC3%20site%20used%20in%20fraud%20schemes&amp;severity=medium&amp;id=68d16a1e1ea196d3ac0e78a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-says-recent-updates-cause-drm-video-play-5ee7340a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20says%20recent%20updates%20cause%20DRM%20video%20playback%20issues&amp;severity=high&amp;id=68d16a1e1ea196d3ac0e78a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36037-cwe-918-server-side-request-forgery-8481e9e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36037%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20webMethods%20Integration&amp;severity=medium&amp;id=68d16fe886694250c6d57f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ukrainian-police-emails-spread-new-countloade-cecf9bc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Ukrainian%20Police%20Emails%20Spread%20New%20CountLoader%20Malware%20Loader&amp;severity=medium&amp;id=68d16947b060ef32b6d70b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36202-cwe-134-use-of-externally-controlle-0b90da59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36202%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20IBM%20webMethods%20Integration&amp;severity=high&amp;id=68d16fe886694250c6d57f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10803-buffer-overflow-in-tenda-ac23-96bbeb45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10803%3A%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=68d18657c1d31cc80230d173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9038-cwe-269-improper-privilege-managemen-87601518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9038%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20GE%20Vernova%20S1%20Agile%20Configuration%20Software&amp;severity=high&amp;id=68d1634941f9e1eae1d16d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10802-sql-injection-in-code-projects-onli-057c7d3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10802%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d16058f02364aaa505cb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10801-sql-injection-in-sourcecodester-pet-b95f6806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10801%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68d158461855446d097a9d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10800-sql-injection-in-itsourcecode-onlin-cdebf549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10800%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68d150fe9da793c36eb64df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10799-sql-injection-in-code-projects-host-558a0771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10799%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d1538e87dc0eeebe98c5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nimbus-manticore-deploys-new-malware-targeting-eur-3bbcfb3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nimbus%20Manticore%20Deploys%20New%20Malware%20Targeting%20Europe&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10798-sql-injection-in-code-projects-host-4605deac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10798%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d14699803041629e2f990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infected-steam-game-blockblasters-downloads-crypto-12ca93bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infected%20Steam%20game%20%22BlockBlasters%22%20downloads%20crypto%20stealer%20malware&amp;severity=medium&amp;id=68d1a6ea45e15a9c326af23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10854-cwe-61-unix-symbolic-link-symlink-f-1df6b82f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10854%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&amp;severity=high&amp;id=68d141f085a0e7c3384637f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10797-sql-injection-in-code-projects-host-5951b90c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10797%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d14699803041629e2f991b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10796-sql-injection-in-code-projects-host-5e16da9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10796%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=68d135599209708d90811cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-malterminal-an-llm-enabled-malw-2bdbb51e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20expose%20MalTerminal%2C%20an%20LLM-enabled%20malware%20pioneer&amp;severity=medium&amp;id=68d13042359c900c607c6537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eu-agency-enisa-says-ransomware-attack-behind-airp-dd0ea499</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EU%20agency%20ENISA%20says%20ransomware%20attack%20behind%20airport%20disruptions&amp;severity=medium&amp;id=68d13042359c900c607c653b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9983-cwe-306-missing-authentication-for-c-e4d5166b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9983%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GALAYOU%20G2&amp;severity=high&amp;id=68d12f759fb0e7ec5cc11606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10795-sql-injection-in-code-projects-onli-51fe69ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10795%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d12dce38ee0fe1f3a7903e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10794-cross-site-scripting-in-phpgurukul--ae3dadee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10794%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Car%20Rental%20Project&amp;severity=medium&amp;id=68d126e5419b193bae2c43d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46711-cwe-476-null-pointer-dereference-in-cff145a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46711%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=68d1e592efb46fd0305262b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowleak-exploit-exposed-gmail-data-through-chat-e6d11cd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowLeak%20Exploit%20Exposed%20Gmail%20Data%20Through%20ChatGPT%20Deep%20Search%20Agent&amp;severity=high&amp;id=68d1223ea4797b1cf0769095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25177-cwe-cwe-416-use-after-free-417-in-i-f223b045</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25177%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.17)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=68d15a31cfd56a20b8773957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10793-sql-injection-in-code-projects-e-co-b149b909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10793%3A%20SQL%20Injection%20in%20code-projects%20E-Commerce%20Website&amp;severity=medium&amp;id=68d14699803041629e2f9914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/airport-chaos-enters-third-day-after-supply-chain--bdb0e444</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Airport%20Chaos%20Enters%20Third%20Day%20After%20Supply%20Chain%20Attack&amp;severity=high&amp;id=68d11dec4c929331fce2740e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verified-steam-game-steals-streamers-cancer-treatm-31d56310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verified%20Steam%20game%20steals%20streamer&apos;s%20cancer%20treatment%20donations&amp;severity=high&amp;id=68d11d0a94f93bcd57a4ef29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10792-buffer-overflow-in-d-link-dir-513-d0516cd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10792%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=68d119a4610b6faac8b60dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10009-cwe-434-unrestricted-upload-of-file-6c6c8d44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10009%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Invoice%20Ninja%20Invoice%20Ninja%205&amp;severity=high&amp;id=68d117efb26f32170e795dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9035-cwe-79-improper-neutralization-of-in-b43ec6d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Horato%20Internet%20Technologies%20Ind.%20and%20Trade%20Inc.%20Virtual%20Library%20Platform&amp;severity=medium&amp;id=68d1144d618e7518f19859e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dprk-hackers-use-clickfix-to-deliver-beavertail-ma-5cb65e1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DPRK%20Hackers%20Use%20ClickFix%20to%20Deliver%20BeaverTail%20Malware%20in%20Crypto%20Job%20Scams&amp;severity=high&amp;id=68d1136b34777a11854dfa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-patches-critical-entra-id-flaw-enabling--ff40b209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Patches%20Critical%20Entra%20ID%20Flaw%20Enabling%20Global%20Admin%20Impersonation%20Across%20Tenants&amp;severity=critical&amp;id=68d1136b34777a11854dfa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10791-sql-injection-in-code-projects-onli-8db8a408</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10791%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68d1129231fab51cc6b549db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8079-cwe-79-improper-neutralization-of-in-691e5c28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8079%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ak%C4%B1ll%C4%B1%20Ticaret%20Software%20Technologies%20Ltd.%20Co.%20Smart%20Trade%20E-Commerce&amp;severity=medium&amp;id=68d10e0c3262276ca81aee84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10790-sql-injection-in-sourcecodester-sim-c1755b3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10790%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Forum%20Discussion%20System&amp;severity=medium&amp;id=68d10c6e5d1c02090bb14a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/22nd-september-threat-intelligence-report-517038d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=22nd%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suspected-apt-c-00-delivers-havoc-trojan-b17227fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Suspected%20APT-C-00%20Delivers%20Havoc%20Trojan&amp;severity=medium&amp;id=68d1a6ea45e15a9c326af247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5962-improper-access-control-in-red-hat-r-7fbb7fe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5962%3A%20Improper%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=68d103c34b809de657261e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0875-cwe-639-authorization-bypass-through-7213d064</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0875%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PROLIZ%20Computer%20Software%20Hardware%20Service%20Trade%20Ltd.%20Co.%20OBS%20(Student%20Affairs%20Information%20System)&amp;severity=medium&amp;id=68d103c34b809de657261e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10789-sql-injection-in-sourcecodester-onl-ef39a164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10789%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d103c34b809de657261e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10788-sql-injection-in-sourcecodester-onl-cc162bc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10788%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68d17182eaa8a5844730acf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10787-server-side-request-forgery-in-muyu-c89dc5e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10787%3A%20Server-Side%20Request%20Forgery%20in%20MuYuCMS&amp;severity=medium&amp;id=68d0f4b66189482ceecd2b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10786-sql-injection-in-campcodes-grocery--6dfbc09d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10786%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d0eebb55c5efc64e8347e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10785-sql-injection-in-campcodes-grocery--fbf30b3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10785%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68d1e592efb46fd0305262a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9541-cwe-79-cross-site-scripting-xss-in-m-f97088e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9541%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Markup%20Markdown&amp;severity=medium&amp;id=68d16058f02364aaa505cb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9540-cwe-79-cross-site-scripting-xss-in-m-dbb81964</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9540%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Markup%20Markdown&amp;severity=medium&amp;id=68d165383ade50c92c378dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9487-cwe-79-cross-site-scripting-xss-in-a-75b33e01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9487%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=68d1781a31c9c64c14377c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9115-cwe-79-cross-site-scripting-xss-in-e-b33602ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9115%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Etsy%20Shop&amp;severity=medium&amp;id=68d1781a31c9c64c14377c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10784-sql-injection-in-campcodes-online-l-4585a914</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10784%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d0e13c5eca204502e5181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/electron-app-vulnerabilities-testcases-03790e6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Electron%20App%20Vulnerabilities%20testcases&amp;severity=medium&amp;id=68d0dd7ea20405275e6ddd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-god-mode-vulnerability-that-should-kill-trust--6eddeaea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20God%20Mode%20Vulnerability%20That%20Should%20Kill%20%E2%80%9CTrust%20Microsoft%E2%80%9D%20Forever&amp;severity=medium&amp;id=68d0d9b5f76fb45c1b0ea7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10783-sql-injection-in-campcodes-online-l-4c4d4daa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10783%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d17182eaa8a5844730aceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10782-sql-injection-in-campcodes-online-l-fb517560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10782%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d0d22a2292bf50abde952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10781-sql-injection-in-campcodes-online-l-4c68eb60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10781%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68d0caaeabfd0dcecbef9f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10780-sql-injection-in-codeastro-simple-p-51befc85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10780%3A%20SQL%20Injection%20in%20CodeAstro%20Simple%20Pharmacy%20Management&amp;severity=medium&amp;id=68d0c68eb68a0c387d4566fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10779-stack-based-buffer-overflow-in-d-li-7fa80f7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10779%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-935L&amp;severity=high&amp;id=68d0bf8cb68a0c387d44cdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-infostealer-campaign-targeting-mac-users-via-g-16687f13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Infostealer%20Campaign%20Targeting%20Mac%20Users%20via%20GitHub%20Pages%20Claiming%20to%20Offer%20LastPass%20Premium&amp;severity=medium&amp;id=68d0b888b68a0c387d443293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10778-race-condition-in-smartstore-a06d628f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10778%3A%20Race%20Condition%20in%20Smartstore&amp;severity=low&amp;id=68d0bc02b68a0c387d44b9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10777-path-traversal-in-jsc-r7-r7-office--3a0b79a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10777%3A%20Path%20Traversal%20in%20JSC%20R7%20R7-Office%20Document%20Server&amp;severity=medium&amp;id=68d0b4fab68a0c387d43e9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10776-cleartext-transmission-of-sensitive-fb283328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10776%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20LionCoders%20SalePro%20POS&amp;severity=medium&amp;id=68d0aa6eb68a0c387d43ae8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10775-os-command-injection-in-wavlink-wl--c5ec794e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10775%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=68d0a36db68a0c387d4351c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10774-os-command-injection-in-ruijie-6000-1ec3baaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10774%3A%20OS%20Command%20Injection%20in%20Ruijie%206000-E10&amp;severity=medium&amp;id=68d09c63b68a0c387d430362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10773-stack-based-buffer-overflow-in-b-li-d8fb0777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10773%3A%20Stack-based%20Buffer%20Overflow%20in%20B-Link%20BL-AC2100&amp;severity=high&amp;id=68d09c63b68a0c387d43035c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-22-1e6bba14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-22&amp;severity=medium&amp;id=68d1e779efb46fd03054ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57682-na-433145be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57682%3A%20n%2Fa&amp;severity=medium&amp;id=68d1e592efb46fd0305262a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57430-na-fd9c91e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57430%3A%20n%2Fa&amp;severity=high&amp;id=68d1e592efb46fd03052629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57432-na-a8f33114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57432%3A%20n%2Fa&amp;severity=critical&amp;id=68d1e592efb46fd030526292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55886-na-5d1c32f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55886%3A%20n%2Fa&amp;severity=medium&amp;id=68d1e592efb46fd03052628e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55888-na-31f3ad26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55888%3A%20n%2Fa&amp;severity=high&amp;id=68d1e592efb46fd030526288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57204-na-a73c7383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57204%3A%20n%2Fa&amp;severity=medium&amp;id=68d1b55562c5b9ff4b6b8c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57205-na-4008ed2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57205%3A%20n%2Fa&amp;severity=medium&amp;id=68d1b30dc6427514cac5c454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57203-na-2c5ab645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57203%3A%20n%2Fa&amp;severity=medium&amp;id=68d1a1a38eeb7847b80a61b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55887-na-afd4183a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55887%3A%20n%2Fa&amp;severity=medium&amp;id=68d19b97a9eb7abab7dee674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52367-na-6bc7d2fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52367%3A%20n%2Fa&amp;severity=medium&amp;id=68d19a1a93431051bd470171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57685-na-50fe9c3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57685%3A%20n%2Fa&amp;severity=high&amp;id=68d197d605d26ef41525088c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55885-na-ca996776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55885%3A%20n%2Fa&amp;severity=medium&amp;id=68d18f781941fd9178dad98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57440-na-3c536a58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57440%3A%20n%2Fa&amp;severity=high&amp;id=68d18a33f374b317608a7fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57439-na-d5441b78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57439%3A%20n%2Fa&amp;severity=high&amp;id=68d18a33f374b317608a7fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57441-na-47e56f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57441%3A%20n%2Fa&amp;severity=critical&amp;id=68d187eac9261cbf9d588d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57438-na-bab3f0b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57438%3A%20n%2Fa&amp;severity=medium&amp;id=68d187eac9261cbf9d588d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57437-na-e03a09f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57437%3A%20n%2Fa&amp;severity=critical&amp;id=68d18657c1d31cc80230d16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43953-na-c8467352</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43953%3A%20n%2Fa&amp;severity=high&amp;id=68d18657c1d31cc80230d16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57431-na-76457fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57431%3A%20n%2Fa&amp;severity=high&amp;id=68d183f9fb52d8f830638a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57434-na-aab9c58e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57434%3A%20n%2Fa&amp;severity=high&amp;id=68d17ff6009da204b74e7600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57433-na-c16a05b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57433%3A%20n%2Fa&amp;severity=medium&amp;id=68d17182eaa8a5844730ace7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57605-na-2c359610</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57605%3A%20n%2Fa&amp;severity=high&amp;id=68d16c8bd2635369c1db5476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57602-na-388d57cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57602%3A%20n%2Fa&amp;severity=critical&amp;id=68d16c8bd2635369c1db5473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57601-na-956842b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57601%3A%20n%2Fa&amp;severity=critical&amp;id=68d16c8bd2635369c1db5470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56075-na-e845d7ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56075%3A%20n%2Fa&amp;severity=medium&amp;id=68d1538e87dc0eeebe98c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56074-na-3255771c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56074%3A%20n%2Fa&amp;severity=critical&amp;id=68d1538e87dc0eeebe98c5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51006-na-6657e321</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51006%3A%20n%2Fa&amp;severity=high&amp;id=68d1538e87dc0eeebe98c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59798-cwe-121-stack-based-buffer-overflow-9e15fe41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59798%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=68d0c68eb68a0c387d456704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59801-cwe-121-stack-based-buffer-overflow-64b397fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59801%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Artifex%20GhostXPS&amp;severity=medium&amp;id=68d0bf8cb68a0c387d44cdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59800-cwe-190-integer-overflow-or-wraparo-84322c90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59800%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=68d0bf8cb68a0c387d44cdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59799-na-b0864926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59799%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=68d0bf8cb68a0c387d44cdf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10772-missing-authentication-in-huggingfa-457ead3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10772%3A%20Missing%20Authentication%20in%20huggingface%20LeRobot&amp;severity=medium&amp;id=68d0935fb68a0c387d42a91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10771-deserialization-in-jeecgboot-jimure-aa62f15b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10771%3A%20Deserialization%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=68d084bbd7d6140a8f93227f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10770-deserialization-in-jeecgboot-jimure-2cd1a997</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10770%3A%20Deserialization%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=68d07e84d222ba3d60fe0b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10767-os-command-injection-in-cosmodiumcs-10e8417e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10767%3A%20OS%20Command%20Injection%20in%20CosmodiumCS%20OnlyRAT&amp;severity=low&amp;id=68d0783404e7eb6dd3cd17a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53692-cwe-79-improper-neutralization-of-i-83d39c32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sitecore%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=68d0569885ecdfe9ee75771f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10769-deserialization-in-h2oai-h2o-3-bf950913</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10769%3A%20Deserialization%20in%20h2oai%20h2o-3&amp;severity=medium&amp;id=68cfc7e69cd607c66dc0c176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10768-deserialization-in-h2oai-h2o-3-880cad51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10768%3A%20Deserialization%20in%20h2oai%20h2o-3&amp;severity=medium&amp;id=68cfc7e69cd607c66dc0c16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-edr-freeze-tool-that-puts-edrs-and-antivirus-i-618e4a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EDR-Freeze%20Tool%20That%20Puts%20EDRs%20and%20Antivirus%20Into%20A%20Coma%20State&amp;severity=high&amp;id=68cfc04921221ebe18503515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6544-cwe-502-deserialization-of-untrusted-b39b18f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6544%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=68d0935fb68a0c387d42a921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10766-path-traversal-in-seriawei-zkeacms-3f4be03a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10766%3A%20Path%20Traversal%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68cfa49fd802737dba85e280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10765-server-side-request-forgery-in-seri-30cc21a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10765%3A%20Server-Side%20Request%20Forgery%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68d0935fb68a0c387d42a925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10764-server-side-request-forgery-in-seri-b5fef907</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10764%3A%20Server-Side%20Request%20Forgery%20in%20SeriaWei%20ZKEACMS&amp;severity=medium&amp;id=68d0935fb68a0c387d42a92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10763-unrestricted-upload-in-academico-si-47510286</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10763%3A%20Unrestricted%20Upload%20in%20academico-sis%20academico&amp;severity=medium&amp;id=68d0935fb68a0c387d42a931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10762-sql-injection-in-kuaifan-dootask-97b04815</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10762%3A%20SQL%20Injection%20in%20kuaifan%20DooTask&amp;severity=medium&amp;id=68d0935fb68a0c387d42a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/edr-freeze-a-tool-that-puts-edrs-and-antivirus-int-a9914fc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EDR-Freeze%3A%20A%20Tool%20That%20Puts%20EDRs%20And%20Antivirus%20Into%20A%20Coma%20State&amp;severity=medium&amp;id=68cf71e74a0b186b9323306b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10761-improper-restriction-of-excessive-a-d3af401a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10761%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Harness&amp;severity=medium&amp;id=68cf6e624a0b186b932318d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10760-server-side-request-forgery-in-harn-a21cd3cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10760%3A%20Server-Side%20Request%20Forgery%20in%20Harness&amp;severity=medium&amp;id=68cf6ade4a0b186b93230502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10759-authorization-bypass-in-webkul-qloa-ec78e3c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10759%3A%20Authorization%20Bypass%20in%20Webkul%20QloApps&amp;severity=medium&amp;id=68cf52424a0b186b932233e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10758-cross-site-scripting-in-htmly-dd9175ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10758%3A%20Cross%20Site%20Scripting%20in%20htmly&amp;severity=medium&amp;id=68cf4b3a4a0b186b932211cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-21-8263f433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-21&amp;severity=medium&amp;id=68d09551b68a0c387d42afa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10757-buffer-overflow-in-utt-1200gw-1cf61d2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10757%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68cf42444a0b186b9321b027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10756-buffer-overflow-in-utt-hiper-840g-91f9cd40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10756%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68cf42444a0b186b9321b02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10755-unrestricted-upload-in-selleo-menti-6920f6f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10755%3A%20Unrestricted%20Upload%20in%20Selleo%20Mentingo&amp;severity=medium&amp;id=68cf17bf3d7292ce7311ba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyberattack-disrupts-airport-check-in-systems-acro-c252ab95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyberattack%20Disrupts%20Airport%20Check-In%20Systems%20Across%20Europe&amp;severity=medium&amp;id=68cebf5fdf99f94e8bae1bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40925-cwe-340-generation-of-predictable-n-fd04a059</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40925%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20BLUEFEET%20Starch&amp;severity=critical&amp;id=68ce9f86302f5874260ddf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10741-unrestricted-upload-in-selleo-menti-816ce504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10741%3A%20Unrestricted%20Upload%20in%20Selleo%20Mentingo&amp;severity=medium&amp;id=68ce99775be37aaae63283d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deerstealer-malware-campaign-stealth-persistence-a-3d98f021</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeerStealer%20Malware%20Campaign%3A%20Stealth%2C%20Persistence%2C%20and%20Rootkit-Like%20Capabilities&amp;severity=medium&amp;id=68d1a5724d07d146b7e4df0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowleak-zero-click-flaw-leaks-gmail-data-via-op-0e1486a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowLeak%20Zero-Click%20Flaw%20Leaks%20Gmail%20Data%20via%20OpenAI%20ChatGPT%20Deep%20Research%20Agent&amp;severity=high&amp;id=68ce81d7a4659bba14c65af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-gpt-4-powered-malterminal-malw-f46fefb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20GPT-4-Powered%20MalTerminal%20Malware%20Creating%20Ransomware%2C%20Reverse%20Shell&amp;severity=high&amp;id=68ce81d7a4659bba14c65aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lastpass-warns-of-fake-repositories-infecting-maco-a5208c70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LastPass%20Warns%20of%20Fake%20Repositories%20Infecting%20macOS%20with%20Atomic%20Infostealer&amp;severity=high&amp;id=68ce81d7a4659bba14c65aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9887-cwe-352-cross-site-request-forgery-c-ce519091</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9887%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bittokazi%20Custom%20Login%20And%20Signup%20Widget&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9883-cwe-352-cross-site-request-forgery-c-59bc0986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9883%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bpedrassani%20Browser%20Sniff&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff3126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9882-cwe-352-cross-site-request-forgery-c-404d02e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9882%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20michaelbo%20osTicket%20WP%20Bridge&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff3121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10658-cwe-307-improper-restriction-of-exc-d19f8a1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10658%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20psmplugins%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=68ce4e4eab7f779c79ff311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9949-cwe-352-cross-site-request-forgery-c-2a31ba28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9949%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webraketen%20Internal%20Links%20Manager&amp;severity=medium&amp;id=68cf42444a0b186b9321b048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10002-cwe-89-improper-neutralization-of-s-af6152d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10002%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20clickwhale%20ClickWhale%20%E2%80%93%20Link%20Manager%2C%20Link%20Shortener%20and%20Click%20Tracker%20for%20Affiliate%20Links%20%26%20Link%20Pages&amp;severity=medium&amp;id=68cf42444a0b186b9321b035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10305-cwe-862-missing-authorization-in-en-8819e2ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10305%3A%20CWE-862%20Missing%20Authorization%20in%20endisha%20Secure%20Passkeys&amp;severity=medium&amp;id=68cf42444a0b186b9321b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10489-cwe-862-missing-authorization-in-br-96980389</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10489%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Contact%20Form%20Builder%20%E2%80%93%20Multi-step%20Forms%2C%20Conversational%20Forms%20and%20more&amp;severity=medium&amp;id=68cf42444a0b186b9321b044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10181-cwe-79-improper-neutralization-of-i-eb129895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10181%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Draft%20List&amp;severity=medium&amp;id=68cf42444a0b186b9321b039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10652-cwe-89-improper-neutralization-of-s-aec32e2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10652%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robcore89%20Robcore%20Netatmo&amp;severity=medium&amp;id=68ce0ffa4b8a032c4fafda28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-20-4cf2bb0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-20&amp;severity=medium&amp;id=68cf44294a0b186b9321b585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43808-cwe-732-incorrect-permission-assign-55a590e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43808%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68cdc2a44b8a032c4fad9eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10568-cwe-78-improper-neutralization-of-s-f48fa38a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10568%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HP%20Inc.%20HyperX%20NGENUITY&amp;severity=medium&amp;id=68cdb4944b8a032c4fad08cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43809-cwe-352-cross-site-request-forgery--87f7a12f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43809%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68cdad924b8a032c4faccd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13990-cwe-295-improper-certificate-valida-d7894691</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13990%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MicroWorld%20Technologies%20eScan%20AV&amp;severity=critical&amp;id=691dec83964c14ffeeaeeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26517-cwe-266-incorrect-privilege-assignm-0e48de8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26517%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34191-cwe-59-improper-link-following-in-v-a0d96090</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34191%3A%20CWE-59%20Improper%20Link%20Following%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cdaa094b8a032c4fac9ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26516-cwe-405-asymmetric-resource-consump-a3acde2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26516%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34190-cwe-306-missing-authentication-for--f8d636cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34190%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Vasion%20Print%20Application&amp;severity=high&amp;id=68cdaa094b8a032c4fac9adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34205-cwe-561-dead-code-in-vasion-print-v-eee5ffb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34205%3A%20CWE-561%20Dead%20Code%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cdaa094b8a032c4fac9aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43803-cwe-639-insecure-direct-object-refe-2fea4a55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43803%3A%20CWE-639%3A%20Insecure%20Direct%20Object%20Reference%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34202-cwe-291-reliance-on-ip-address-for--072b5869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34202%3A%20CWE-291%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cdaa094b8a032c4fac9ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34189-cwe-732-incorrect-permission-assign-2372aacf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34189%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=medium&amp;id=68cdaa094b8a032c4fac9ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34206-cwe-732-incorrect-permission-assign-e407380f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34206%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cdaa094b8a032c4fac9af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34199-cwe-319-cleartext-transmission-of-s-1a239ca7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34199%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a24b8a032c4fac76f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34193-cwe-755-improper-handling-of-except-665358d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34193%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34201-cwe-653-improper-isolation-or-compa-d870d402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34201%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac7704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34188-cwe-532-insertion-of-sensitive-info-87283699</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34188%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34194-cwe-59-improper-link-following-in-v-4d9a04ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34194%3A%20CWE-59%20Improper%20Link%20Following%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34200-cwe-312-cleartext-storage-of-sensit-a23f686a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34200%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac76fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34204-cwe-269-improper-privilege-manageme-c3439783</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34204%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a24b8a032c4fac770a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34198-cwe-798-use-of-hard-coded-credentia-639b4a8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34198%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a34b8a032c4fac7741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/17500-phishing-domains-target-316-brands-across-74-742eb688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=17%2C500%20Phishing%20Domains%20Target%20316%20Brands%20Across%2074%20Countries%20in%20Global%20PhaaS%20Surge&amp;severity=high&amp;id=68cda6834b8a032c4fac7659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34197-cwe-798-use-of-hard-coded-credentia-174150fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34197%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a34b8a032c4fac773b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortra-warns-of-max-severity-flaw-in-goanywhere-mf-dc7b99f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortra%20warns%20of%20max%20severity%20flaw%20in%20GoAnywhere%20MFT%E2%80%99s%20License%20Servlet&amp;severity=high&amp;id=68cda6834b8a032c4fac765d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34192-cwe-1104-use-of-unmaintained-third--a82f2f00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34192%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a34b8a032c4fac772f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34195-cwe-434-unrestricted-upload-of-file-14db65c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34195%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=high&amp;id=68cda6a34b8a032c4fac7735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34203-cwe-1395-dependency-on-vulnerable-t-2900d2c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34203%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Vasion%20Print%20Virtual%20Appliance%20Host&amp;severity=critical&amp;id=68cda6a34b8a032c4fac7747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-exposes-malware-kits-deployed-in-ivanti-epmm--171e86a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20exposes%20malware%20kits%20deployed%20in%20Ivanti%20EPMM%20attacks&amp;severity=high&amp;id=68cda2fe4b8a032c4fac5a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc1549-hacks-34-devices-in-11-telecom-firms-via-l-630e3467</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1549%20Hacks%2034%20Devices%20in%2011%20Telecom%20Firms%20via%20LinkedIn%20Job%20Lures%20and%20MINIBIKE%20Malware&amp;severity=high&amp;id=68cda2fe4b8a032c4fac5a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-cybercriminals-using-fake-fbi-crime-r-7f87b3ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20cybercriminals%20using%20fake%20FBI%20crime%20reporting%20portals&amp;severity=high&amp;id=68cda2fe4b8a032c4fac5a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26515-cwe-918-server-side-request-forgery-0b8276ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26515%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20NetApp%20StorageGRID&amp;severity=high&amp;id=68cda6a24b8a032c4fac7710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26514-cwe-79-improper-neutralization-of-i-82bd1602</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26514%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=68cda6a24b8a032c4fac7716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10722-improper-export-of-android-applicat-3bb59f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10722%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20SKTLab%20Mukbee%20App&amp;severity=medium&amp;id=68cd94ee4b8a032c4fabcb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10721-improper-export-of-android-applicat-d88e760b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10721%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Webull%20Investing%20%26%20Trading%20App&amp;severity=medium&amp;id=68cd94ee4b8a032c4fabcb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modus-operandi-of-subtle-snail-espionage-group-14558850</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modus%20Operandi%20of%20Subtle%20Snail%20Espionage%20Group&amp;severity=medium&amp;id=68cd86e04b8a032c4fab05d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36248-cwe-79-improper-neutralization-of-i-1f421af6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36248%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Copy%20Services%20Manager&amp;severity=medium&amp;id=68cd86df4b8a032c4fab05b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10718-improper-export-of-android-applicat-f9469c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10718%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Ooma%20Office%20Business%20Phone%20App&amp;severity=medium&amp;id=68cd7fd94b8a032c4faad0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59427-cwe-200-exposure-of-sensitive-infor-98245565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59427%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cloudflare%20workers-sdk&amp;severity=low&amp;id=68cd78da4b8a032c4faa7307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-network-selling-thousands-of-fake-us-and-c-ce7acf0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Network%20Selling%20Thousands%20of%20Fake%20US%20and%20Canadian%20IDs&amp;severity=medium&amp;id=68cd78ce4b8a032c4faa72f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8664-cwe-79-improper-neutralization-of-in-eda14a70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saysis%20Computer%20Systems%20Trade%20Ltd.%20Co.%20StarCities%20E-Municipality%20Management&amp;severity=medium&amp;id=68cd6d3342cc324345d33b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10717-improper-export-of-android-applicat-bd600384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10717%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20intsig%20CamScanner%20App&amp;severity=medium&amp;id=68cd6bdc148332b17b6b893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10716-improper-export-of-android-applicat-29ef86c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10716%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Creality%20Cloud%20App&amp;severity=medium&amp;id=68cd6bdc148332b17b6b8938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8532-cwe-639-authorization-bypass-through-45a90af2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8532%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Bimser%20Solution%20Software%20Trade%20Inc.%20eBA%20Document%20and%20Workflow%20Management%20System&amp;severity=medium&amp;id=68cd6982a12a4b86fff5d0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gamaredon-x-turla-collaboration-1f64c75b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gamaredon%20X%20Turla%20collaboration&amp;severity=medium&amp;id=68cd9f7a4b8a032c4fac3fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-urgent-chrome-140-update-after-zero--bd2dbc5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Urgent%20Chrome%20140%20Update%20After%20Zero-Day%20Exploited%20in%20the%20Wild&amp;severity=critical&amp;id=68cd5d786aa2e4be1d1280f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10715-improper-export-of-android-applicat-2d2de1af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10715%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20APEUni%20PTE%20Exam%20Practice%20App&amp;severity=medium&amp;id=68cd5bd4829848b34320abbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10712-sql-injection-in-07flycms-2b24c09f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10712%3A%20SQL%20Injection%20in%2007FLYCMS&amp;severity=medium&amp;id=68cd5bd4829848b34320abb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58114-cwe-20-improper-input-validation-in-16e94173</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58114%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c39360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57880-cwe-116-improper-encoding-or-escapi-0efa2c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57880%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c3935d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48007-cwe-116-improper-encoding-or-escapi-3386cfae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48007%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c3935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46703-cwe-116-improper-encoding-or-escapi-23170850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46703%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=medium&amp;id=68cd58f208353649d1c39357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10711-cross-site-scripting-in-07flycms-ec2b129b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10711%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=68cd76f94b8a032c4faa638f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10710-cross-site-scripting-in-07flycms-f1a1b53d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10710%3A%20Cross%20Site%20Scripting%20in%2007FLYCMS&amp;severity=medium&amp;id=68cd76f94b8a032c4faa6389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7665-cwe-862-missing-authorization-in-cyb-cff811f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7665%3A%20CWE-862%20Missing%20Authorization%20in%20cyberlord92%20Miniorange%20OTP%20Verification%20with%20Firebase&amp;severity=high&amp;id=68cd76f94b8a032c4faa6395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10709-path-traversal-in-four-faith-water--59e36934</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10709%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68cd478a343cc699e199ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10708-path-traversal-in-four-faith-water--59f2bb38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10708%3A%20Path%20Traversal%20in%20Four-Faith%20Water%20Conservancy%20Informatization%20Platform&amp;severity=medium&amp;id=68cd58f208353649d1c39369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10707-improper-authorization-in-jeecgboot-969066df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10707%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68cd58f208353649d1c39363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9969-cwe-79-improper-neutralization-of-in-3d137300</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9969%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vizly%20Web%20Design%20Real%20Estate%20Packages&amp;severity=high&amp;id=68cd3e7b6c952af2596c3908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10468-cwe-22-improper-limitation-of-a-pat-a275582f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10468%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Beyaz%20Computer%20CityPlus&amp;severity=high&amp;id=68cd3a1b8bde6210f51371fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10719-cwe-639-authorization-bypass-throug-a9ec9348</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10719%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WisdomGarden%20Tronclass&amp;severity=medium&amp;id=68cd2c28287bbd261d2ca758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10630-cwe-20-improper-input-validation-in-4eee045d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10630%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Grafana%20grafana-zabbix-plugin&amp;severity=medium&amp;id=68cd76f94b8a032c4faa63a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8531-cwe-130-improper-handling-of-length--09ac7c0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8531%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC-Q%20Series%20Q03UDVCPU&amp;severity=medium&amp;id=68cd23e474a5d0d73a2558d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-issues-fix-for-93-rated-firebox-firewal-9badc5d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20Issues%20Fix%20for%209.3-Rated%20Firebox%20Firewall%20Vulnerability&amp;severity=medium&amp;id=68cd223cb03991562587a619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/countloader-new-malware-loader-being-served-in-3-d-b36b2988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CountLoader%3A%20New%20Malware%20Loader%20Being%20Served%20in%203%20Different%20Versions&amp;severity=medium&amp;id=68cd339450280a3868eb60ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10647-cwe-434-unrestricted-upload-of-file-f23f533d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10647%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20salzano%20Embed%20PDF%20for%20WPForms&amp;severity=high&amp;id=68cd76f94b8a032c4faa63a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9905-cwe-913-improper-control-of-dynamica-aad5cbb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9905%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Keras-team%20Keras&amp;severity=high&amp;id=68cd127d2a8afe82184746e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9906-cwe-502-deserialization-of-untrusted-02b0f560</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9906%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Keras-team%20Keras&amp;severity=high&amp;id=68cd127d2a8afe82184746e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7702-cwe-601-url-redirection-to-untrusted-5faaa242</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7702%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Pusula%20Communication%20Information%20Internet%20Industry%20and%20Trade%20Ltd.%20Co.%20Manageable%20Email%20Sending%20System&amp;severity=medium&amp;id=68cd76f94b8a032c4faa63a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5948-cwe-639-authorization-bypass-through-7d5cf151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5948%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=68cd76f94b8a032c4faa639c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10456-integer-overflow-or-wraparound-in-z-91060f90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10456%3A%20Integer%20Overflow%20or%20Wraparound%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=68cd76f94b8a032c4faa6399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10458-improper-handling-of-length-paramet-5b177e45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10458%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=68cce8ce8a2c56cc58c0a3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7403-write-what-where-condition-in-zephyr-3fe65f90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7403%3A%20Write-what-where%20Condition%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=68cce8ce8a2c56cc58c0a3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10457-improperly-implemented-security-che-e6350814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10457%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=68cce8ce8a2c56cc58c0a3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5955-cwe-288-authentication-bypass-using--82b3dd06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5955%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20aonetheme%20Service%20Finder%20SMS%20System&amp;severity=high&amp;id=68cd5bd4829848b34320abc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10146-cwe-79-improper-neutralization-of-i-45e5739d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=68cd478b343cc699e199ec1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8487-cwe-862-missing-authorization-in-ext-c666e504</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8487%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=68ccd247ca83b36a9f71db42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10690-cwe-862-missing-authorization-in-be-b3adba75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10690%3A%20CWE-862%20Missing%20Authorization%20in%20Bearsthemes%20Goza%20-%20Nonprofit%20Charity%20WordPress%20Theme&amp;severity=critical&amp;id=68ccc437ca83b36a9f716bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7937-cwe-347-improper-verification-of-cry-89709c13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7937%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20MBD-X12STW&amp;severity=high&amp;id=68ccc437ca83b36a9f716beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6198-cwe-347-improper-verification-of-cry-b2bf1c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6198%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SMCI%20X13SEM-F&amp;severity=high&amp;id=68ccbd2fca83b36a9f7135ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-19-db1dad7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-19&amp;severity=medium&amp;id=68cdf0614b8a032c4faf46d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59689-cwe-77-improper-neutralization-of-s-5cac2d59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59689%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Libraesva%20Email%20Security%20Gateway&amp;severity=medium&amp;id=68cdbb9d4b8a032c4fad4197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57396-na-e0cd6159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57396%3A%20n%2Fa&amp;severity=medium&amp;id=68cdb8184b8a032c4fad2312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56762-na-fbb0369a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56762%3A%20n%2Fa&amp;severity=medium&amp;id=68cdb8184b8a032c4fad230e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54815-na-88bc4402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54815%3A%20n%2Fa&amp;severity=high&amp;id=68cdb4944b8a032c4fad08d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54761-na-84eccb47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54761%3A%20n%2Fa&amp;severity=high&amp;id=68cdb4944b8a032c4fad08d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52159-na-c7df2938</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52159%3A%20n%2Fa&amp;severity=high&amp;id=68cdb4944b8a032c4fad08cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57296-na-d5a9cb26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57296%3A%20n%2Fa&amp;severity=medium&amp;id=68cd7fd94b8a032c4faad105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56869-na-3014e78d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56869%3A%20n%2Fa&amp;severity=medium&amp;id=68cd7fd94b8a032c4faad100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55910-na-9128cfbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55910%3A%20n%2Fa&amp;severity=medium&amp;id=68cd78da4b8a032c4faa730d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57644-na-01402aad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57644%3A%20n%2Fa&amp;severity=critical&amp;id=68cd748d16d33c897eccce0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57528-na-eed1e118</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57528%3A%20n%2Fa&amp;severity=high&amp;id=68cd6bdc148332b17b6b8946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59717-cwe-843-access-of-resource-using-in-388c6415</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59717%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20DigitalOcean%20%40digitalocean%2Fdo-markdownit&amp;severity=medium&amp;id=68cccec3ca83b36a9f71c510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59714-cwe-863-incorrect-authorization-in--7639e72a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59714%3A%20CWE-863%20Incorrect%20Authorization%20in%20Internet2%20Grouper&amp;severity=medium&amp;id=68ccc437ca83b36a9f716be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59713-cwe-502-deserialization-of-untruste-d3ce71e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59713%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20snipeitapp%20Snipe-IT&amp;severity=medium&amp;id=68ccc437ca83b36a9f716be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59712-cwe-79-improper-neutralization-of-i-8e063be9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20snipeitapp%20Snipe-IT&amp;severity=medium&amp;id=68ccc437ca83b36a9f716be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30755-opengrok-1141-has-a-reflected-cross-ece729c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30755%3A%20OpenGrok%201.14.1%20has%20a%20reflected%20Cross-Site%20Scripting%20(XSS)%20issue%20when%20producing%20the%20cross%20reference%20page.%20This%20happens%20through%20improper%20handling%20of%20the%20revision%20parameter.%20The%20application%20reflects%20unsanitized%20user%20input%20into%20the%20HTML%20output.%20in%20Oracle%20Corporation%20OpenGrok&amp;severity=medium&amp;id=68cc97dfb3cee7708e8d3a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10035-cwe-77-improper-neutralization-of-s-2fc7b5b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10035%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=critical&amp;id=68cc81ade1e207df107c362d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53969-cwe-602-in-cognex-in-sight-2000-ser-4db64230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53969%3A%20CWE-602%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59220-cwe-362-concurrent-execution-using--5f5ff49e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59220%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68cc7d698ad1e78619f757d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59216-cwe-362-concurrent-execution-using--1f3da919</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59216%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68cc7d698ad1e78619f757d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54810-cwe-294-in-cognex-in-sight-2000-ser-be8d7b3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54810%3A%20CWE-294%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59215-cwe-416-use-after-free-in-microsoft-f3659c66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59215%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68cc7d698ad1e78619f757cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54818-cwe-319-in-cognex-in-sight-2000-ser-a877534b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54818%3A%20CWE-319%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54497-cwe-732-in-cognex-in-sight-2000-ser-50397b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54497%3A%20CWE-732%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52873-cwe-732-in-cognex-in-sight-2000-ser-06d5a6ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52873%3A%20CWE-732%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54860-cwe-307-in-cognex-in-sight-2000-ser-819d3d77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54860%3A%20CWE-307%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc9f1bca83b36a9f700a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53947-cwe-276-in-cognex-in-sight-2000-ser-aeb4aee2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53947%3A%20CWE-276%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc762b04807de649625fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47698-cwe-319-in-cognex-in-sight-2000-ser-2ea7739d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47698%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc762b04807de649625fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54754-cwe-259-in-cognex-in-sight-2000-ser-340f7991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54754%3A%20CWE-259%20in%20Cognex%20In-Sight%202000%20series&amp;severity=high&amp;id=68cc762b04807de649625fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30519-cwe-1391-in-dover-fueling-solutions-75708481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30519%3A%20CWE-1391%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=critical&amp;id=68cc710de742201e23dd5640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54807-cwe-321-in-dover-fueling-solutions--ce97c3f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54807%3A%20CWE-321%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=critical&amp;id=68cc6f9bc42e09d33b9ea2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55068-cwe-190-in-dover-fueling-solutions--791c5149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55068%3A%20CWE-190%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=high&amp;id=68cc6f9bc42e09d33b9ea2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10689-command-injection-in-d-link-dir-645-ef34cc4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10689%3A%20Command%20Injection%20in%20D-Link%20DIR-645&amp;severity=medium&amp;id=68cc6e2bef6beda3cd78d386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59424-cwe-79-improper-neutralization-of-i-529e6c8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59424%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=68cc64c6b0b9cd5a3ed10585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10688-sql-injection-in-sourcecodester-pet-69931951</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10688%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68cc5efe1b4327aecb9f66b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10650-cwe-269-improper-privilege-manageme-83e929a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10650%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SoftIron%20HyperCloud&amp;severity=low&amp;id=68cc59e1db1798280b3a58f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26503-cwe-119-improper-restriction-of-ope-a782e38a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26503%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Wind%20River%20Systems%20Inc%20VxWorks%207&amp;severity=medium&amp;id=68cc5867aea2c857718d4224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47906-cwe-115-misinterpretation-of-input--83e0566e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47906%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20Go%20standard%20library%20os%2Fexec&amp;severity=medium&amp;id=68cc6f9bc42e09d33b9ea2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/systembc-malware-turns-infected-vps-systems-into-p-1f2614b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SystemBC%20malware%20turns%20infected%20VPS%20systems%20into%20proxy%20highway&amp;severity=high&amp;id=68cc4afc16636d8dd03982ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-york-blood-center-alerts-194000-people-to-data-f2d10db6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20York%20Blood%20Center%20Alerts%20194%2C000%20People%20to%20Data%20Breach&amp;severity=high&amp;id=68cc4afc16636d8dd03982fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10687-sql-injection-in-sourcecodester-res-69383c46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10687%3A%20SQL%20Injection%20in%20SourceCodester%20Responsive%20E-Learning%20System&amp;severity=medium&amp;id=68cc43ca4250efa79f7b6a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10676-improper-authorization-in-fuyanglip-7f0db93d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10676%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68cc2e5c84c3e40d9e1945e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10675-improper-authorization-in-fuyanglip-781bb4e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10675%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68cc2e5b84c3e40d9e1945e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10674-improper-authorization-in-fuyanglip-cca81076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10674%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68cc27fc88e1289d50d4155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36146-cwe-497-exposure-of-sensitive-syste-5f3ec3e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36146%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=68cc237367c782851fe3185a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36143-cwe-78-improper-neutralization-of-s-d0d0ec41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36143%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=68cc237367c782851fe31857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36139-cwe-79-improper-neutralization-of-i-d0afcafe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36139%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20watsonx.data&amp;severity=medium&amp;id=68cc237367c782851fe31854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10673-sql-injection-in-itsourcecode-stude-f5842b4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10673%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68cc212964e6b4fd4107bb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-uk-teenagers-charged-over-transport-for-london-3969ee49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20UK%20Teenagers%20Charged%20Over%20Transport%20for%20London%20(TFL)%20Hack%20Linked%20to%20Scattered%20Spider&amp;severity=medium&amp;id=68cc1ee25f43eb352644a3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59421-cwe-770-allocation-of-resources-wit-fafc9890</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59421%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20frappe%20press&amp;severity=low&amp;id=68cc1bf715657adce9c5e0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59417-cwe-79-improper-neutralization-of-i-c85c88d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59417%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lobehub%20lobe-chat&amp;severity=medium&amp;id=68cc1a808818f871806daf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10672-missing-authentication-in-whuan132--0ec4356e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10672%3A%20Missing%20Authentication%20in%20whuan132%20AIBattery&amp;severity=high&amp;id=68cc18456ffb307f73dcb6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10671-insufficiently-random-values-in-you-04b8ccb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10671%3A%20Insufficiently%20Random%20Values%20in%20youth-is-as-pale-as-poetry%20e-learning&amp;severity=medium&amp;id=68cc18456ffb307f73dcb6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59040-cwe-280-improper-handling-of-insuff-802440cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59040%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=68cc18456ffb307f73dcb6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10670-sql-injection-in-itsourcecode-e-log-a70baba0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10670%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68cc112a80d290649cddf15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4444-resource-consumption-in-tor-9a29b95a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4444%3A%20Resource%20Consumption%20in%20Tor&amp;severity=medium&amp;id=68cc112a80d290649cddf166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10669-unrestricted-upload-in-airsonic-adv-3911ae6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10669%3A%20Unrestricted%20Upload%20in%20Airsonic-Advanced&amp;severity=medium&amp;id=68cc0b2216bc0da717cded50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10668-sql-injection-in-itsourcecode-onlin-88341288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10668%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68cc0b2216bc0da717cded49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10667-sql-injection-in-itsourcecode-onlin-380f5b44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10667%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68cc0508030f00d77e45da0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10666-buffer-overflow-in-d-link-dir-825-d8753a79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10666%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=68cc0508030f00d77e45da01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-empire-podcast-invites-target-crypto-industry-9a463b6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Empire%20Podcast%20Invites%20Target%20Crypto%20Industry%20with%20macOS%20AMOS%20Stealer&amp;severity=medium&amp;id=68cbf732216d83833ec15dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10665-sql-injection-in-kidaze-courseselec-30d15ecd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10665%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68cbf67185df6e2bfaa71549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10664-sql-injection-in-phpgurukul-small-c-886c98d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10664%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68cbf67185df6e2bfaa71542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13151-cwe-89-improper-neutralization-of-s-c9eff283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13151%3A%20CWE%20-%2089%20-%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ESBI%20Information%20and%20Telecommunication%20Industry%20and%20Trade%20Limited%20Company%20Auto%20Service%20Software&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40678-cwe-434-unrestricted-upload-of-file-3e88b24d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40678%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Summar%20Software%20Portal%20del%20Empleado&amp;severity=medium&amp;id=68cbf299ee6173ddfc334c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40677-cwe-89-improper-neutralization-of-s-027774ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40677%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Summar%20Software%20Portal%20del%20Empleado&amp;severity=high&amp;id=68cbf299ee6173ddfc334c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/watchguard-warns-of-critical-vulnerability-in-fire-523a02d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WatchGuard%20warns%20of%20critical%20vulnerability%20in%20Firebox%20firewalls&amp;severity=critical&amp;id=68cbedb003ae751429e19f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10585-is-the-sixth-actively-exploited-chr-a2c7e1ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10585%20is%20the%20sixth%20actively%20exploited%20Chrome%20zero-day%20patched%20by%20Google%20in%202025&amp;severity=critical&amp;id=68cbedb003ae751429e19fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10207-cwe-1287-improper-validation-of-spe-2c214691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10207%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20ABB%20FLXEON&amp;severity=high&amp;id=68cc0b2216bc0da717cded56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10663-sql-injection-in-phpgurukul-online--cced6d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10663%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68cbe8acaf984949a8d1d413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10662-sql-injection-in-seacms-17ca6b17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10662%3A%20SQL%20Injection%20in%20SeaCMS&amp;severity=medium&amp;id=68cc0cd80f883ea1bda59c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vane-viper-malvertising-network-posed-as-legit-adt-5e7e3396</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vane%20Viper%20Malvertising%20Network%20Posed%20as%20Legit%20Adtech%20in%20Global%20Scams&amp;severity=medium&amp;id=68cbd8d8dcf8f705bf19ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8565-cwe-862-missing-authorization-in-wpl-a2e35f01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8565%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Privacy%20Policy%20Generator%2C%20Terms%20%26%20Conditions%20Generator%20WordPress%20Plugin%20%3A%20WP%20Legal%20Pages&amp;severity=high&amp;id=68cc13c146e444568e341cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9992-cwe-79-improper-neutralization-of-in-786b8d9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nko%20Ghost%20Kit%20%E2%80%93%20Page%20Builder%20Blocks%2C%20Motion%20Effects%20%26%20Extensions&amp;severity=medium&amp;id=68cc13c146e444568e341cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30187-cwe-835-loop-with-unreachable-exit--903be3ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30187%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20PowerDNS%20DNSdist&amp;severity=low&amp;id=68cc13c146e444568e341cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-20162019-end-of-life-257e0133</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%202016%2F2019%20End%20of%20Life&amp;severity=medium&amp;id=68cbcd34c76bde0bbe9f9704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/40-of-corporate-client-devices-still-run-windows-1-ca34340b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=40%25%20of%20Corporate%20Client%20Devices%20Still%20Run%20Windows%2010&amp;severity=medium&amp;id=68cbcb8e758e629c051b50da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0547-cwe-79-improper-neutralization-of-in-c134329b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Para%C5%9F%C3%BCt%20Software%20Bizmu&amp;severity=medium&amp;id=68cc13c146e444568e341cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6237-cwe-73-external-control-of-file-name-ca47e439</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6237%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20invoke-ai%20invoke-ai%2Finvokeai&amp;severity=critical&amp;id=68cc0b2216bc0da717cded60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10493-cwe-639-authorization-bypass-throug-892d1cee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10493%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20prasunsen%20Chained%20Quiz&amp;severity=medium&amp;id=68cc13c146e444568e341cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9083-cwe-502-deserialization-of-untrusted-db2111ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9083%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ninja%20Forms&amp;severity=critical&amp;id=68cba0693675017f04545bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8942-cwe-284-improper-access-control-in-w-1ee9093f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8942%3A%20CWE-284%20Improper%20Access%20Control%20in%20WP%20Hotel%20Booking&amp;severity=critical&amp;id=68cba0693675017f04545bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5305-cwe-326-inadequate-encryption-streng-35cd2e8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5305%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Password%20Reset%20with%20Code%20for%20WordPress%20REST%20API&amp;severity=critical&amp;id=68cc9f1bca83b36a9f700a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepens-its-playbook-with-new-websites-and-targets-64447b32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepens%20Its%20Playbook%20with%20New%20Websites%20and%20Targets&amp;severity=medium&amp;id=68cbcd42c76bde0bbe9f97f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10642-cross-site-scripting-in-wangchenyi1-46d7773b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10642%3A%20Cross%20Site%20Scripting%20in%20wangchenyi1996%20chat_forum&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-packages-deliver-silentsync-rat-debd9b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Packages%20Deliver%20SilentSync%20RAT&amp;severity=medium&amp;id=68cbbbcef311b98db4ab1c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shai-hulud-worm-compromises-npm-ecosystem-in-suppl-3dc8e19d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Shai-Hulud%22%20Worm%20Compromises%20npm%20Ecosystem%20in%20Supply%20Chain%20Attack&amp;severity=medium&amp;id=68cbb4aa21dc7e84600939ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10634-command-injection-in-d-link-dir-823-b58fb9ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10634%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10632-cross-site-scripting-in-itsourcecod-35187365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10632%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Online%20Petshop%20Management%20System&amp;severity=medium&amp;id=68cc0b2216bc0da717cded59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10631-cross-site-scripting-in-itsourcecod-30d2b6f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10631%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Online%20Petshop%20Management%20System&amp;severity=medium&amp;id=68cb5713e5fa2c8b14911b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10629-command-injection-in-d-link-dir-852-e911ab0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10629%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68cb5713e5fa2c8b14911b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10628-command-injection-in-d-link-dir-852-6035659b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10628%3A%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68cb5713e5fa2c8b14911b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-18-d7325981</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-18&amp;severity=medium&amp;id=68cca102ca83b36a9f701d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57293-na-44ab7319</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57293%3A%20n%2Fa&amp;severity=high&amp;id=68cc6f9bc42e09d33b9ea2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57295-na-071f3dce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57295%3A%20n%2Fa&amp;severity=high&amp;id=68cc69197c2864fad4194622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55912-na-00b02a65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55912%3A%20n%2Fa&amp;severity=high&amp;id=68cc237367c782851fe31860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50255-na-ef707f3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50255%3A%20n%2Fa&amp;severity=high&amp;id=68cc237367c782851fe3185d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55911-na-59009e64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55911%3A%20n%2Fa&amp;severity=medium&amp;id=68cc1bf715657adce9c5e0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57452-na-bf82955d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57452%3A%20n%2Fa&amp;severity=medium&amp;id=68cc18456ffb307f73dcb6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10627-sql-injection-in-sourcecodester-onl-04273765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10627%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cb466bd31237010cfa6062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10626-sql-injection-in-sourcecodester-onl-22cfa876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10626%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cb466bd31237010cfa605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10625-sql-injection-in-sourcecodester-onl-74d00180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10625%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-claims-15-billion-salesforce-records--125cd228</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20claims%201.5%20billion%20Salesforce%20records%20stolen%20in%20Drift%20hacks&amp;severity=high&amp;id=68cb3a2c73a5a6cdbc6655b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-customers-to-reset-credentials-aft-0863a4b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20warns%20customers%20to%20reset%20credentials%20after%20breach&amp;severity=high&amp;id=68cb3a2c73a5a6cdbc6655a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vc-giant-insight-partners-warns-thousands-after-ra-d765b655</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VC%20giant%20Insight%20Partners%20warns%20thousands%20after%20ransomware%20breach&amp;severity=high&amp;id=68cb3a2c73a5a6cdbc6655a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta558-uses-ai-generated-scripts-to-deploy-venom-ra-dc327269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA558%20Uses%20AI-Generated%20Scripts%20to%20Deploy%20Venom%20RAT%20in%20Brazil%20Hotel%20Attacks&amp;severity=high&amp;id=68cb39657f563d9c088ee337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt41-targets-government-think-tanks--d5153ec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20APT41%20targets%20government%2C%20think%20tanks%2C%20and%20academics%20tied%20to%20US-China%20trade%20and%20policy&amp;severity=medium&amp;id=68cb38a2383d6a624cd967f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10624-sql-injection-in-phpgurukul-user-ma-ec0787ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10624%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10623-sql-injection-in-sourcecodester-hot-0d0594bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10623%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23337-cwe-1244-in-nvidia-hgx-gb200-hgx-gb-ed54112e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23337%3A%20CWE-1244%20in%20NVIDIA%20HGX%20GB200%2C%20HGX%20GB300%2C%20HGC%20B300&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23268-cwe-20-improper-input-validation-in-da6ba65c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23268%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68cb4e05e5fa2c8b1490b363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10621-sql-injection-in-sourcecodester-hot-d775ba82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10621%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23336-cwe-20-improper-input-validation-in-64a82390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23336%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23329-cwe-284-in-nvidia-triton-inference--8bd43a79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23329%3A%20CWE-284%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68cb4e05e5fa2c8b1490b369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23328-cwe-787-out-of-bounds-write-in-nvid-0c7e7407</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23328%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68cb4e05e5fa2c8b1490b366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23316-cwe-78-improper-neutralization-of-s-cd4be2a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23316%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68cb2f739685efe6fa5a5a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10620-sql-injection-in-itsourcecode-onlin-82dfc978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10620%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Clinic%20Management%20System&amp;severity=medium&amp;id=68cb4e05e5fa2c8b1490b36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59415-cwe-79-improper-neutralization-of-i-728152a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59415%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frappe%20lms&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10619-os-command-injection-in-sequa-ai-se-e08302b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10619%3A%20OS%20Command%20Injection%20in%20sequa-ai%20sequa-mcp&amp;severity=medium&amp;id=68cb22688afa0a79ca27307d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10618-sql-injection-in-itsourcecode-onlin-887d1fdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10618%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Clinic%20Management%20System&amp;severity=medium&amp;id=68cb22688afa0a79ca273076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7993-cwe-416-use-after-free-in-ashlar-vel-26d169db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7993%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8006-cwe-125-out-of-bounds-read-in-ashlar-3acad4f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8006%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8002-cwe-843-access-of-resource-using-inc-ad59624a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8002%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8004-cwe-125-out-of-bounds-read-in-ashlar-1ec95bf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8004%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8005-cwe-843-access-of-resource-using-inc-bdca17f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8005%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8001-cwe-119-improper-restriction-of-oper-603d7b4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8001%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8003-cwe-125-out-of-bounds-read-in-ashlar-8a8e4733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8003%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7997-cwe-125-out-of-bounds-read-in-ashlar-6dcd295f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7997%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8000-cwe-843-access-of-resource-using-inc-26f7f165</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8000%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7995-cwe-843-access-of-resource-using-inc-e646f2ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7995%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7996-cwe-787-out-of-bounds-write-in-ashla-aa234c5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7996%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7998-cwe-787-out-of-bounds-write-in-ashla-6335a6e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7998%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7994-cwe-125-out-of-bounds-read-in-ashlar-a5d002f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7994%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7999-cwe-843-access-of-resource-using-inc-4dbc664c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7999%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20eac138e352740b9f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7988-cwe-787-out-of-bounds-write-in-ashla-6974b729</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7988%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e9c138e352740b9f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7991-cwe-125-out-of-bounds-read-in-ashlar-349c3899</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7991%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7992-cwe-125-out-of-bounds-read-in-ashlar-58983909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7992%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7987-cwe-787-out-of-bounds-write-in-ashla-e4955a81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7987%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e9c138e352740b9f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7989-cwe-125-out-of-bounds-read-in-ashlar-9656be81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7989%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7986-cwe-787-out-of-bounds-write-in-ashla-374f0f22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7986%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7990-cwe-787-out-of-bounds-write-in-ashla-710a8d75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7990%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e9c138e352740b9f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7985-cwe-190-integer-overflow-or-wraparou-9a28ad4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7985%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7984-cwe-457-use-of-uninitialized-variabl-2b9a3a34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7984%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7983-cwe-122-heap-based-buffer-overflow-i-ce018fbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7983%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7981-cwe-457-use-of-uninitialized-variabl-3658100c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7981%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7979-cwe-121-stack-based-buffer-overflow--41a3e255</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7979%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7978-cwe-457-use-of-uninitialized-variabl-5f3f0448</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7978%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7980-cwe-787-out-of-bounds-write-in-ashla-26615e12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7980%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=68cb20e8c138e352740b9f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7982-cwe-190-integer-overflow-or-wraparou-7b0d4253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7982%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7977-cwe-125-out-of-bounds-read-in-ashlar-0338ec04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7977%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68cb20e8c138e352740b9f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10644-cwe-266-incorrect-privilege-assignm-899b2543</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10644%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Wondershare%20Repairit&amp;severity=critical&amp;id=68cb1dd46c72e58150640580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10643-cwe-732-incorrect-permission-assign-8d9fd377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10643%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Wondershare%20Repairit&amp;severity=critical&amp;id=68cb1dd46c72e5815064057d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10617-sql-injection-in-sourcecodester-onl-c31e7f52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10617%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68cb1c55752de33ea51cfe55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10616-unrestricted-upload-in-itsourcecode-afe7dbf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10616%3A%20Unrestricted%20Upload%20in%20itsourcecode%20E-Commerce%20Website&amp;severity=medium&amp;id=68cb1c55752de33ea51cfe4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10615-unrestricted-upload-in-itsourcecode-c2c58463</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10615%3A%20Unrestricted%20Upload%20in%20itsourcecode%20E-Commerce%20Website&amp;severity=medium&amp;id=68cb15679d86941e1ccd2bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59340-cwe-1336-improper-neutralization-of-b51614b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59340%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20HubSpot%20jinjava&amp;severity=critical&amp;id=68cb15679d86941e1ccd2bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59410-cwe-311-missing-encryption-of-sensi-170babe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59410%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59354-cwe-328-use-of-weak-hash-in-dragonf-89874023</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59354%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59353-cwe-295-improper-certificate-valida-65f92204</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59353%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=68cb4e06e5fa2c8b1490b384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59352-cwe-202-exposure-of-sensitive-infor-f5305b12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59352%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb125572cbf43db2b5418a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59351-cwe-476-null-pointer-dereference-in-1c57d1dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59351%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb4e06e5fa2c8b1490b39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59350-cwe-208-observable-timing-discrepan-72bd5562</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59350%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb4e06e5fa2c8b1490b397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59349-cwe-732-incorrect-permission-assign-026d62f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59349%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb0fb22139234af51c2bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10614-cross-site-scripting-in-itsourcecod-f0bae80f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10614%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68cb0df12a0094034ff87a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37122-vulnerability-in-hewlett-packard-en-96f9af31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37122%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20ClearPass%20Policy%20Manager&amp;severity=medium&amp;id=68cb0df12a0094034ff87a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59348-cwe-457-use-of-uninitialized-variab-90fad79e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59348%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb0df12a0094034ff87a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59347-cwe-295-improper-certificate-valida-331ac0e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59347%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20dragonflyoss%20dragonfly&amp;severity=low&amp;id=68cb0c2a00fa06367f3c97bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59346-cwe-918-server-side-request-forgery-1f3a2368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59346%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dragonflyoss%20dragonfly&amp;severity=medium&amp;id=68cb0b4650c37531b87a327c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59345-cwe-306-missing-authentication-for--0c69d7c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59345%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20dragonflyoss%20dragonfly&amp;severity=high&amp;id=68cb0df12a0094034ff87a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10613-sql-injection-in-itsourcecode-stude-e0546d97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10613%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=68cb06d7ab9d7384897e2e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59416-cwe-862-missing-authorization-in-th-4f6a099d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59416%3A%20CWE-862%3A%20Missing%20Authorization%20in%20The-Scratch-Channel%20tsc-web-client&amp;severity=high&amp;id=68cb0517688cbe8f4eb893dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10608-improper-access-controls-in-portabi-6cbcc853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10608%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68caff33b5624fa867f4a632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10607-information-disclosure-in-portabili-dc025d05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10607%3A%20Information%20Disclosure%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68caf94c33b75e972181a555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10606-cross-site-scripting-in-portabilis--22aa03ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10606%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68caf94c33b75e972181a54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59342-cwe-24-path-traversal-filedir-in-es-cff557f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59342%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20esm-dev%20esm.sh&amp;severity=medium&amp;id=68caf94c33b75e972181a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59341-cwe-23-relative-path-traversal-in-e-dfb5892c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59341%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20esm-dev%20esm.sh&amp;severity=high&amp;id=68caf79701ed836a75e1f9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59339-cwe-325-missing-cryptographic-step--880feb09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59339%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20ovh%20the-bastion&amp;severity=medium&amp;id=68cafbd7631213ff423d83fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58767-cwe-400-uncontrolled-resource-consu-a4252fae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58767%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20rexml&amp;severity=low&amp;id=68caf4a946aca7f3592e4643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-raven-stealer-malware-hits-browsers-for-cookie-cefabeb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Raven%20Stealer%20Malware%20Hits%20Browsers%20for%20Cookies%2C%20Passwords%20and%20Payment%20Data&amp;severity=medium&amp;id=68caf3c7d292aaab4d7d3a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58766-cwe-94-improper-control-of-generati-31efec3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58766%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dyad-sh%20dyad&amp;severity=critical&amp;id=68caf2f2822eeeec0bbb2583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10605-cross-site-scripting-in-portabilis--52d8c193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10605%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10604-sql-injection-in-phpgurukul-online--19d0b76e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10604%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68cb125572cbf43db2b5418e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58432-cwe-250-execution-with-unnecessary--e1e4f19e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58432%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20IceWhaleTech%20ZimaOS&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58431-cwe-250-execution-with-unnecessary--cd04b776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58431%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20IceWhaleTech%20ZimaOS&amp;severity=medium&amp;id=68caefa3050ae2a4a2bf03dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10603-sql-injection-in-phpgurukul-online--cd9d6e0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10603%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68caeaaf82663edd1bdc067a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10602-sql-injection-in-sourcecodester-onl-c769c77a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10602%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68caeaaf82663edd1bdc0673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35436-cwe-248-uncaught-exception-in-cisa--314d5960</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35436%3A%20CWE-248%20Uncaught%20Exception%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35435-cwe-369-divide-by-zero-in-cisa-thor-744c7aef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35435%3A%20CWE-369%20Divide%20By%20Zero%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35434-cwe-295-improper-certificate-valida-06742233</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35434%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35433-cwe-613-insufficient-session-expira-217429d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35433%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35432-cwe-400-uncontrolled-resource-consu-d19739c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35432%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35431-cwe-90-improper-neutralization-of-s-3be64d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35431%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cae909b253b63d00f0f6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35430-cwe-22-improper-limitation-of-a-pat-00e06308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35430%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CISA%20Thorium&amp;severity=medium&amp;id=68cb4e06e5fa2c8b1490b3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10601-sql-injection-in-sourcecodester-onl-83569e5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10601%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cae414bbadf27e02c744d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10600-unrestricted-upload-in-sourcecodest-100cd117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10600%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cae414bbadf27e02c744cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10599-sql-injection-in-itsourcecode-web-b-cb60193b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10599%3A%20SQL%20Injection%20in%20itsourcecode%20Web-Based%20Internet%20Laboratory%20Management%20System&amp;severity=medium&amp;id=68cade0df43ccdbecfedf8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10598-sql-injection-in-sourcecodester-pet-866d2e22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10598%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68cade0df43ccdbecfedf8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10597-sql-injection-in-kidaze-courseselec-ef2a3232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10597%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68caf4a946aca7f3592e4647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bidi-swap-unmasking-the-art-of-url-misleading-with-d847b3cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BIDI%20Swap%3A%20Unmasking%20the%20Art%20of%20URL%20Misleading%20with%20Bidirectional%20Text%20Tricks&amp;severity=medium&amp;id=68cad0e1a32a4f153290b7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-token-to-rule-them-all-obtaining-global-admin--e3d15293</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20Token%20to%20rule%20them%20all%20-%20obtaining%20Global%20Admin%20in%20every%20Entra%20ID%20tenant%20via%20Actor%20tokens&amp;severity=medium&amp;id=68cad024bcc5ab4e4ac09b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10596-sql-injection-in-sourcecodester-onl-10e38178</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10596%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68cacea66b131705ffa8ffad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10205-cwe-759-use-of-a-one-way-hash-with--7bce990e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10205%3A%20CWE-759%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20ABB%20FLXEON&amp;severity=high&amp;id=68cad0dca32a4f153290b77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10595-sql-injection-in-sourcecodester-onl-5b064d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10595%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68cac8129696ec3ac01d3cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40933-cwe-340-generation-of-predictable-n-2f440947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40933%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20KGOLDOV%20Apache%3A%3AAuthAny&amp;severity=high&amp;id=68cac5e01f355dcd5a94ad8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-shai-hulud-worm-infecting-npm-packages-with-mi-0b74e8a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Shai-hulud%20Worm%20Infecting%20npm%20Packages%20With%20Millions%20of%20Downloads&amp;severity=medium&amp;id=68cac17ed97bf4465cb5ccc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10594-sql-injection-in-sourcecodester-onl-7746ad6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10594%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68cac0c598f27b6b4d5b469c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10593-sql-injection-in-sourcecodester-onl-2f80958c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10593%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68caba2bbcb098e80ccc29d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59476-vulnerability-in-jenkins-project-je-18d005b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59476%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=68cab73ba2484644446021ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59475-vulnerability-in-jenkins-project-je-73e5d03d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59475%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=68cab73ba2484644446021a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59474-vulnerability-in-jenkins-project-je-cfdf6306</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59474%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=medium&amp;id=68cab73ba2484644446021a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10592-sql-injection-in-itsourcecode-onlin-78b3ec18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10592%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Public%20Access%20Catalog%20OPAC&amp;severity=medium&amp;id=68cab45254cf790925e52665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8463-cwe-639-authorization-bypass-through-0835edf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8463%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20SecHard%20Information%20Technologies%20SecHard&amp;severity=medium&amp;id=68cab09db62c8e2e63b2466a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/practical-guide-for-hunters-how-leaked-webhooks-ar-c01d20fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Practical%20guide%20for%20hunters%3A%20how%20leaked%20webhooks%20are%20abused%20and%20how%20to%20defend%20them&amp;severity=medium&amp;id=68caab79940d5859b9d108f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8077-cwe-1393-use-of-default-password-in--8649b1a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8077%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20SUSE%20neuvector&amp;severity=critical&amp;id=68caac2dd82284c39e479277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0879-cwe-79-improper-neutralization-of-in-899027d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Shopside%20Software%20Shopside%20App&amp;severity=medium&amp;id=68caac2dd82284c39e479269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54467-cwe-522-insufficiently-protected-cr-a72773a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54467%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=68caac2dd82284c39e479273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53884-cwe-759-use-of-a-one-way-hash-witho-8d919f27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53884%3A%20CWE-759%3A%20Use%20of%20a%20One-Way%20Hash%20without%20a%20Salt%20in%20SUSE%20neuvector&amp;severity=medium&amp;id=68caac2dd82284c39e47926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-shuts-down-raccoono365-phishing-ring-sei-daf791a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Shuts%20Down%20RaccoonO365%20Phishing%20Ring%2C%20Seizes%20338%20Websites&amp;severity=medium&amp;id=68caa93a6ee91fb4e7872552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10439-cwe-89-improper-neutralization-of-s-19f1d9eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10439%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yordam%20Informatics%20Yordam%20Library%20Automation%20System&amp;severity=critical&amp;id=68cab45354cf790925e52677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0546-cwe-79-improper-neutralization-of-in-92d90ed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Mevzuattr%20Software%20MevzuatTR&amp;severity=medium&amp;id=68cab45254cf790925e5266f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10157-cwe-693-protection-mechanism-failur-bf7ec55c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10157%3A%20CWE-693%20-%20Protection%20Mechanism%20Failure%20in%20mmaitre314%20picklescan&amp;severity=critical&amp;id=68cab45354cf790925e52672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8999-cwe-862-missing-authorization-in-ath-04ca3b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8999%3A%20CWE-862%20Missing%20Authorization%20in%20athemes%20Sydney&amp;severity=medium&amp;id=68cab45354cf790925e52693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8411-cwe-79-improper-neutralization-of-in-69b0a225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dokuzsoft%20Technology%20E-Commerce%20Web%20Design%20Product&amp;severity=high&amp;id=68cab45354cf790925e52686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10591-cross-site-scripting-in-portabilis--6dae0c5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10591%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68ca96e193b16c2d2a62e6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10590-cross-site-scripting-in-portabilis--efbc6c73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10590%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68ca96e193b16c2d2a62e6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10156-cwe-755-improper-handling-of-except-d82e8c95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10156%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20mmaitre314%20picklescan&amp;severity=critical&amp;id=68ca910cc83e56c86e2799ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hosting-a-website-on-a-disposable-vape-d7726a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hosting%20a%20website%20on%20a%20disposable%20vape&amp;severity=medium&amp;id=68ca8f8b64b2ab792f3d5afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tiantong-1-and-satphone-security-part-1-d778de43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tiantong-1%20and%20satphone%20security%20(part%201)&amp;severity=medium&amp;id=68ca884da4ccc8d40c13d97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vpn-ipv6-leak-3a309a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VPN%20IPv6%20leak&amp;severity=medium&amp;id=68ca884da4ccc8d40c13d980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/raccoono365-phishing-network-dismantled-as-microso-af8ceb5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RaccoonO365%20Phishing%20Network%20Dismantled%20as%20Microsoft%2C%20Cloudflare%20Take%20Down%20338%20Domains&amp;severity=high&amp;id=68ca8780e059f3f42136d909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10155-cwe-20-improper-input-validation-in-aa0633e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10155%3A%20CWE-20%20Improper%20Input%20Validation%20in%20mmaitre314%20picklescan&amp;severity=critical&amp;id=68ca83a8e0086ebab8fe744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0420-cwe-79-improper-neutralization-of-in-bb7c6293</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Para%C5%9F%C3%BCt%20Software%20Para%C5%9F%C3%BCt&amp;severity=medium&amp;id=68ca7d91f8eda5adc8374f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59458-cwe-77-in-jetbrains-junie-11bf0df7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59458%3A%20CWE-77%20in%20JetBrains%20Junie&amp;severity=high&amp;id=68cab45354cf790925e52683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59457-cwe-183-in-jetbrains-teamcity-5fdd26a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59457%3A%20CWE-183%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=68cab45354cf790925e52680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59456-cwe-23-in-jetbrains-teamcity-981d4e49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59456%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68cab45354cf790925e5267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59455-cwe-362-in-jetbrains-teamcity-e6f5f9ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59455%3A%20CWE-362%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68cab45354cf790925e5267a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0419-cwe-79-improper-neutralization-of-in-899038d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zirve%20Information%20Technologies%20Inc.%20Zirve%20Nova&amp;severity=medium&amp;id=68cab45254cf790925e5266c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9242-cwe-787-out-of-bounds-write-in-watch-1286bb67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9242%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WatchGuard%20Fireware%20OS&amp;severity=critical&amp;id=68ca64c1ac160e1955053429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9972-cwe-78-improper-neutralization-of-sp-b6c5aa83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9972%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Planet%20Technology%20ICG-2510WG-LTE%20(EU%2FUS)&amp;severity=critical&amp;id=68ca8d1320342ce327dbd2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9971-cwe-306-missing-authentication-for-c-bf9a01c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9971%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Planet%20Technology%20ICG-2510WG-LTE%20(EU%2FUS)&amp;severity=critical&amp;id=68ca5b313fcd6e1bf2513c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9565-cwe-79-improper-neutralization-of-in-c4209732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=68cab09db62c8e2e63b2469c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9216-cwe-434-unrestricted-upload-of-file--d3b3b2b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9216%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kodezen%20StoreEngine%20%E2%80%93%20Powerful%20WordPress%20eCommerce%20Plugin%20for%20Payments%2C%20Memberships%2C%20Affiliates%2C%20Sales%20%26%20More&amp;severity=high&amp;id=68cab09db62c8e2e63b24695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9203-cwe-79-improper-neutralization-of-in-a989c8a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Media%20Player%20Addons%20for%20Elementor%20%E2%80%93%20Audio%20and%20Video%20Widgets%20for%20Elementor&amp;severity=medium&amp;id=68cab09db62c8e2e63b24688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9215-cwe-22-improper-limitation-of-a-path-36210f1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9215%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kodezen%20StoreEngine%20%E2%80%93%20Powerful%20WordPress%20eCommerce%20Plugin%20for%20Payments%2C%20Memberships%2C%20Affiliates%2C%20Sales%20%26%20More&amp;severity=medium&amp;id=68cab09db62c8e2e63b2468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9450-cwe-457-use-of-uninitialized-variabl-9738c41c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9450%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=68ca52420a097cd99ae32361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9449-cwe-416-use-after-free-in-dassault-s-e7269636</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9449%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=68ca52420a097cd99ae3235e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9447-cwe-125-out-of-bounds-read-in-dassau-36a27153</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9447%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=68ca52420a097cd99ae3235b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/going-underground-china-aligned-ta415-conducts-us--6d79b657</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Going%20Underground%3A%20China-aligned%20TA415%20Conducts%20U.S.-China%20Economic%20Relations%20Targeting%20Using%20VS%20Code%20Remote%20Tunnels&amp;severity=medium&amp;id=68ca99c9e83bd2ac601399bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10057-cwe-94-improper-control-of-generati-2a54016c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10057%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=high&amp;id=68cab09db62c8e2e63b24673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10058-cwe-73-external-control-of-file-nam-606aedee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10058%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=high&amp;id=68cab09db62c8e2e63b24679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10042-cwe-89-improper-neutralization-of-s-42f18373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10042%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=68cab09db62c8e2e63b2466d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59307-unquoted-search-path-or-element-in--7274f9f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59307%3A%20Unquoted%20search%20path%20or%20element%20in%20Century%20Corporation%20RAID%20Manager&amp;severity=medium&amp;id=68ca3542cf800f555c4d167a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10125-cwe-80-improper-neutralization-of-s-3127118b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10125%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20strangerstudios%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=68cab09db62c8e2e63b2467f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10188-cwe-352-cross-site-request-forgery--d022a958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tvcnet%20The%20Hack%20Repair%20Guy&apos;s%20Plugin%20Archiver&amp;severity=medium&amp;id=68cab09db62c8e2e63b24684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10589-cwe-78-improper-neutralization-of-s-e7694850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10589%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20N-Partner%20N-Reporter&amp;severity=high&amp;id=68ca2f55571b2840ff02d5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58116-improper-neutralization-of-special--1d62e4cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58116%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20WN-7D36QR&amp;severity=high&amp;id=68ca2bd1571b2840ff02c43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55075-hidden-functionality-in-i-o-data-de-4bcb9b23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55075%3A%20Hidden%20functionality%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20WN-7D36QR&amp;severity=medium&amp;id=68ca2bd1571b2840ff02c43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9818-cwe-428-unquoted-search-path-or-elem-dd3623dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9818%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20OMRON%20SOCIAL%20SOLUTIONS%20CO.%2C%20Ltd.%20PowerAttendant%20Standard%20Edition&amp;severity=medium&amp;id=68ca2bd1571b2840ff02c446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10584-cross-site-scripting-in-portabilis--d7ba4837</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10584%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68ca2bd1571b2840ff02c434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8153-cwe-79-improper-neutralization-of-in-641e381f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8153%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NEC%20Corporation%20UNIVERGE%20IX&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9891-cwe-352-cross-site-request-forgery-c-6c29f695</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9891%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cyberlord92%20User%20Sync&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9629-cwe-352-cross-site-request-forgery-c-1568741a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9629%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shenyanzhi%20USS%20Upyun&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10050-cwe-22-improper-limitation-of-a-pat-bd115068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10050%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eskapism%20Developer%20Loggers%20for%20Simple%20History&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9851-cwe-79-improper-neutralization-of-in-6ffe0b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gentlesource%20Appointmind&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10143-cwe-98-improper-control-of-filename-51917e01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10143%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20catchthemes%20Catch%20Dark%20Mode&amp;severity=high&amp;id=68ca1a3d571b2840ff0172de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8394-cwe-79-improper-neutralization-of-in-c822be60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8394%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20productiveminds%20Productive%20Style%20%E2%80%93%20Optimisations%20%26%20Content%20Publishing%20Support&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10166-cwe-79-improper-neutralization-of-i-35954fc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10166%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tw2113%20Social%20Media%20Shortcodes&amp;severity=medium&amp;id=68ca1a3d571b2840ff0172e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-17-61a13a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-17&amp;severity=medium&amp;id=68cb4ffee5fa2c8b1490da0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56648-na-7d647a52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56648%3A%20n%2Fa&amp;severity=medium&amp;id=68cb06d7ab9d7384897e2e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59304-na-a827e978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59304%3A%20n%2Fa&amp;severity=critical&amp;id=68cae5b836e4949322b6f6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54390-na-46432655</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54390%3A%20n%2Fa&amp;severity=medium&amp;id=68cacafeb5ede819561abda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55904-na-ceb43ed3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55904%3A%20n%2Fa&amp;severity=medium&amp;id=68cac8129696ec3ac01d3cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57055-na-d54ed480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57055%3A%20n%2Fa&amp;severity=medium&amp;id=68cac5e01f355dcd5a94ad91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50709-na-cb54daff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50709%3A%20n%2Fa&amp;severity=medium&amp;id=68cabe94c63ec85b9b839237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59518-cwe-78-improper-neutralization-of-s-2faf1907</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59518%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemonldap-ng%20LemonLDAP%3A%3ANG&amp;severity=high&amp;id=68ca2bd1571b2840ff02c442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37125-vulnerability-in-hewlett-packard-en-a25d35e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37125%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e6efa26b70491bc85827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37123-vulnerability-in-hewlett-packard-en-3d3af7f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37123%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e57e1b7dc273b7496134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37124-vulnerability-in-hewlett-packard-en-482f958c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37124%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e57e1b7dc273b7496137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43804-cwe-79-improper-neutralization-of-i-45e08a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37128-vulnerability-in-hewlett-packard-en-1e4b83d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37128%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37129-vulnerability-in-hewlett-packard-en-fe853556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37129%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37127-vulnerability-in-hewlett-packard-en-b2460825</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37127%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e414de3f3ca929b62f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37130-vulnerability-in-hewlett-packard-en-6bbe562a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37130%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37126-vulnerability-in-hewlett-packard-en-8e5f203b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37126%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=high&amp;id=68c9e414de3f3ca929b62f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37131-vulnerability-in-hewlett-packard-en-b9a7b149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37131%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20EdgeConnect%20SD-WAN%20Gateway&amp;severity=medium&amp;id=68c9e414de3f3ca929b62f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-replicating-shai-hulud-worm-spreads-token-ste-9fe7ee76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-replicating%20Shai-hulud%20worm%20spreads%20token%20stealing%20malware%20on%20npm&amp;severity=medium&amp;id=68ca9a856f90669b55758b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43805-cwe-862-missing-authorization-in-li-af9c89f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43805%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c9d97f378f59cc24092211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10566-cross-site-scripting-in-campcodes-g-128e3d1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10566%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9d813d6e474b8e50ebcee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9708-cwe-295-improper-certificate-validat-9b326754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9708%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Kubernetes%20Kubernetes%20CSharp%20Client&amp;severity=medium&amp;id=68c9d48cc64fcd5cd5375ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10565-sql-injection-in-campcodes-grocery--867e729d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10565%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9c9e1a11609747ab60866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10564-sql-injection-in-campcodes-grocery--cc21e1c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10564%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9c9e1a11609747ab6085f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10563-sql-injection-in-campcodes-grocery--611e1891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10563%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9c2d13e74084d506c7f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34187-cwe-269-improper-privilege-manageme-ecaf56b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34187%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Ilevia%20Srl.%20EVE%20X1%2FX5%20Server&amp;severity=critical&amp;id=68c9c7c0c844de074c59d830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34186-cwe-287-improper-authentication-in--d3457de5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34186%3A%20CWE-287%20Improper%20Authentication%20in%20Ilevia%20Srl.%20EVE%20X1%2FX5%20Server&amp;severity=critical&amp;id=68c9c9e1a11609747ab6086d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34185-cwe-200-exposure-of-sensitive-infor-b384622f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34185%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=high&amp;id=68c9be8e5515080b7bb74f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34184-cwe-78-improper-neutralization-of-s-22f44d2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34184%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68c9be8e5515080b7bb74f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34183-cwe-532-insertion-of-sensitive-info-d37fa94d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34183%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Ilevia%20Srl.%20EVE%20X1%20Server&amp;severity=critical&amp;id=68c9be8e5515080b7bb74f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10562-sql-injection-in-campcodes-grocery--6b321c23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10562%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c9b60bd3e32ff68f895038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-dcom-part-1-78a4be08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20DCOM%20part%201&amp;severity=medium&amp;id=68c9b1f34dee7b73f6adc229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-filefix-attack-installs-stealc-infostealer-3972af01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20FileFix%20Attack%20Installs%20StealC%20Infostealer%20Via%20Fake%20Facebook%20Pages&amp;severity=medium&amp;id=68c9ad7fb2b6370f0fcceb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49728-cwe-312-cleartext-storage-of-sensit-645c7851</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49728%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=medium&amp;id=68c9ac1668484133f6b9fc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47967-cwe-357-insufficient-ui-warning-of--6cf9a517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47967%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68c9ac1668484133f6b9fc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54237-out-of-bounds-read-cwe-125-in-adobe-835d6ba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54237%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=68c99efff4c09bec87d9a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54262-out-of-bounds-read-cwe-125-in-adobe-ca19efa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54262%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=68c99efff4c09bec87d9a877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59336-cwe-22-improper-limitation-of-a-pat-eec051cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59336%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lumen-oss%20luanox&amp;severity=medium&amp;id=68c9985b238a0184d6560f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-extends-shutdown-after-cyberatta-aa8cc259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20extends%20shutdown%20after%20cyberattack%20by%20another%20week&amp;severity=high&amp;id=68c9956bcb0fe83b581fe751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/self-replicating-worm-hits-180-software-packages-af0482ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Self-Replicating%20Worm%20Hits%20180%2B%20Software%20Packages&amp;severity=high&amp;id=68c9956bcb0fe83b581fe75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/slopads-fraud-ring-exploits-224-android-apps-to-dr-328f15dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SlopAds%20Fraud%20Ring%20Exploits%20224%20Android%20Apps%20to%20Drive%202.3%20Billion%20Daily%20Ad%20Bids&amp;severity=high&amp;id=68c9956bcb0fe83b581fe755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59334-cwe-347-improper-verification-of-cr-c0a08755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59334%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20mohammadzain2008%20Linkr&amp;severity=critical&amp;id=68c995a8cb0fe83b58201ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fifteen-ransomware-gangs-retire-future-unclear-2e003cc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fifteen%20Ransomware%20Gangs%20%E2%80%9CRetire%2C%E2%80%9D%20Future%20Unclear&amp;severity=high&amp;id=68c9956bcb0fe83b581fe75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59161-cwe-20-improper-input-validation-in-48c32dbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59161%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20element-hq%20element-web&amp;severity=low&amp;id=68c995a8cb0fe83b58201ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10492-vulnerability-in-jaspersoft-jasperr-8b62b365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10492%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Jaspersoft%20JasperReports%20Library%20Community%20Edition&amp;severity=high&amp;id=68c995a8cb0fe83b58201ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59160-cwe-345-insufficient-verification-o-7c128355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59160%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20matrix-org%20matrix-js-sdk&amp;severity=low&amp;id=68c993298d6281de8b72eaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58174-cwe-79-improper-neutralization-of-i-742dbc4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58174%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=68c993298d6281de8b72eaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43801-cwe-606-unchecked-input-for-loop-co-42542335</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43801%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c98df7d592b4af578fc5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58749-cwe-822-untrusted-pointer-dereferen-dffc9d12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58749%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=low&amp;id=68c9896e330108e524b3d351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-supply-side-attack-s1ngularitynx-attackers-str-a1ec4d2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Supply%20Side%20Attack%20-%20S1ngularity%2Fnx%20attackers%20strike%20again&amp;severity=medium&amp;id=68c9826cde6d24f38e66944f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41243-cwe-917-improper-neutralization-of--cb22114f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41243%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20Spring%20Cloud%20Gateway&amp;severity=critical&amp;id=68c97badd327290d6e7319cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4953-creation-of-temporary-file-with-inse-d9a421ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4953%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions&amp;severity=high&amp;id=68c97badd327290d6e7319d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/appsuite-onestart-manualfinder-the-nexus-of-decept-6a6fb237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AppSuite%2C%20OneStart%20%26%20ManualFinder%3A%20The%20Nexus%20of%20Deception&amp;severity=medium&amp;id=68c9985a238a0184d6560ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59270-cwe-757-selection-of-less-secure-al-9e585016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59270%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20pspete%20psPAS&amp;severity=low&amp;id=68c978667303a81d6bf89e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36244-cwe-454-external-initialization-of--d1cdf923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36244%3A%20CWE-454%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20IBM%20AIX&amp;severity=high&amp;id=68c978667303a81d6bf89e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filefix-in-the-wild-new-filefix-campaign-goes-beyo-bccc3557</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FileFix%20in%20the%20wild!%20New%20FileFix%20campaign%20goes%20beyond%20POC%20and%20leverages%20steganography&amp;severity=medium&amp;id=68c97556c5f0f7930cac8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8894-cwe-122-heap-based-buffer-overflow-i-6f844875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8894%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=68c97484c3a8a11ff039d593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59333-cwe-284-improper-access-control-in--57cdcd27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59333%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20executeautomation%20mcp-database-server&amp;severity=high&amp;id=68c97484c3a8a11ff039d58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8893-cwe-787-out-of-bounds-write-in-autod-dd2fb5f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8893%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Revit&amp;severity=high&amp;id=68c97484c3a8a11ff039d58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8057-cwe-639-authorization-bypass-through-5de876d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8057%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Patika%20Global%20Technologies%20HumanSuite&amp;severity=medium&amp;id=68c96f20164fb734315ebab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8276-cwe-116-improper-encoding-or-escapin-294b08bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Patika%20Global%20Technologies%20HumanSuite&amp;severity=medium&amp;id=68c96f20164fb734315ebab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/august-2025-apt-attack-trends-report-ff0121fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=August%202025%20APT%20Attack%20Trends%20Report&amp;severity=medium&amp;id=68c972ebc2fae287eff2bab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/august-2025-infostealer-trend-report-3bdd0521</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=August%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=68c973c5ba2489d7522e0b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/under-the-pure-curtain-from-rat-to-builder-to-code-80732e1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Under%20the%20Pure%20Curtain%3A%20From%20RAT%20to%20Builder%20to%20Coder&amp;severity=medium&amp;id=68e301c843279ad048c58463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7355-cwe-639-authorization-bypass-through-cc7ed8bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7355%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Beefull%20Energy%20Technologies%20Beefull%20App&amp;severity=medium&amp;id=68c95d616f4da0585007d46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10290-opening-links-via-the-contextual-me-d4fb17a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10290%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10535-information-disclosure-mitigation-b-18ad242a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10535%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10534-spoofing-issue-in-the-site-permissi-b8aa5b84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10534%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10531-mitigation-bypass-in-the-web-compat-eaff9472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10531%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10530-spoofing-issue-in-the-webauthn-comp-e797c263</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10530%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10537-memory-safety-bugs-fixed-in-firefox-1b0a3150</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10537%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10536-information-disclosure-in-the-netwo-24360fc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10536%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10532-incorrect-boundary-conditions-in-th-a622c58b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10532%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10529-same-origin-policy-bypass-in-the-la-71f41072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10529%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10528-sandbox-escape-due-to-undefined-beh-28127e0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10528%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10527-sandbox-escape-due-to-use-after-fre-7604e379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10527%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10533-integer-overflow-in-the-svg-compone-79236a99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10533%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68c958bfff7c553b3ddd1eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55118-cwe-122-heap-based-buffer-overflow--da170a73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55118%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20BMC%20Control-M%2FAgent&amp;severity=high&amp;id=68c958c0ff7c553b3ddd1f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55117-cwe-121-stack-based-buffer-overflow-edb033b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55117%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958c0ff7c553b3ddd1f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55116-cwe-121-stack-based-buffer-overflow-0b953bd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55116%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c958bfff7c553b3ddd1f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55115-cwe-23-relative-path-traversal-in-b-581a75d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55115%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c958bfff7c553b3ddd1f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55114-cwe-696-incorrect-behavior-order-in-c913b9d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55114%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55113-cwe-158-improper-neutralization-of--43c4fe9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55113%3A%20CWE-158%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c958bfff7c553b3ddd1f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55112-cwe-321-use-of-hard-coded-cryptogra-d62b5b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55112%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20BMC%20Control-M%2FAgent&amp;severity=high&amp;id=68c958bfff7c553b3ddd1f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10546-cwe-79-improper-neutralization-of-i-31cf0282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PPC%20Technologies%20PPC%20XPON%20ONT%20(Optical%20Network%20Terminal)%202K15X&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55111-cwe-276-incorrect-default-permissio-cf5e8273</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55111%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55110-cwe-1392-use-of-default-credentials-44387093</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55110%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20BMC%20Control-M%2FAgent&amp;severity=medium&amp;id=68c958bfff7c553b3ddd1f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55109-cwe-295-improper-certificate-valida-f011060c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55109%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20BMC%20Control-M%2FAgent&amp;severity=critical&amp;id=68c9aeedde7b17539b24308a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7743-cwe-319-cleartext-transmission-of-se-4fe77ef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7743%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Dolusoft%20Omaspot&amp;severity=critical&amp;id=68c9bbbb28d23855bde227e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7744-cwe-89-improper-neutralization-of-sp-70f68a01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7744%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dolusoft%20Omaspot&amp;severity=critical&amp;id=68c9bbbb28d23855bde227e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6575-cwe-79-improper-neutralization-of-in-c1a7d16c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dolusoft%20Omaspot&amp;severity=medium&amp;id=68c9bbbb28d23855bde227df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockergoga-ransomware-admin-on-eu-most-wanted-list-3c2854aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockerGoga%20Ransomware%20Admin%20on%20EU%20Most%20Wanted%20List%20With%20%2410M%20DOJ%20Reward&amp;severity=medium&amp;id=68c94d573f860eb6de238022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-lg-vulnerability-lg-webos-tv-path-traversal-au-a0df1dc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20LG%20Vulnerability%20-%20LG%20WebOS%20TV%20Path%20Traversal%2C%20Authentication%20Bypass%20and%20Full%20Device%20Takeover&amp;severity=medium&amp;id=68c94c847c9dc3cee46e4e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8446-cwe-862-missing-authorization-in-bla-ab569f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8446%3A%20CWE-862%20Missing%20Authorization%20in%20blazethemes%20Blaze%20Demo%20Importer&amp;severity=medium&amp;id=68c9496f561c5e692a3e1c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41249-vulnerability-in-vmware-spring-fram-c2ba4cb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41249%3A%20Vulnerability%20in%20VMware%20Spring%20Framework&amp;severity=high&amp;id=68c93a2ba0289a6492bfcc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gucci-balenciaga-and-alexander-mcqueen-breach-link-38a3c797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gucci%2C%20Balenciaga%20and%20Alexander%20McQueen%20Breach%20Linked%20to%20ShinyHunters&amp;severity=high&amp;id=68c93962571dda8150db7b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41248-vulnerability-in-vmware-spring-secu-fd8f571e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41248%3A%20Vulnerability%20in%20VMware%20Spring%20Security&amp;severity=high&amp;id=68c93a2ba0289a6492bfcc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10016-cwe-863-incorrect-authorization-in--09b11dd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10016%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sparkle%20Project%20Sparkle&amp;severity=high&amp;id=68c9bbbb28d23855bde227da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10015-cwe-863-incorrect-authorization-in--fab63ce0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10015%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sparkle%20Project%20Sparkle&amp;severity=medium&amp;id=68c9bbbb28d23855bde227d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26711-cwe-200-exposure-of-sensitive-infor-b72d7f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26711%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZTE%20T5400&amp;severity=medium&amp;id=68c930ca3d980629458048fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26710-cwe-200-exposure-of-sensitive-infor-8f6817b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26710%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZTE%20T5400&amp;severity=low&amp;id=68c9ba513e540f592ae59bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10316-cwe-79-improper-neutralization-of-i-f77c85ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20Extension%20%22Form%20to%20Database%22%20(form_to_database)&amp;severity=low&amp;id=68c9ba513e540f592ae59bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/40-npm-packages-compromised-in-supply-chain-attack-0c7f16dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=40%20npm%20Packages%20Compromised%20in%20Supply%20Chain%20Attack%20Using%20bundle.js%20to%20Steal%20Credentials&amp;severity=high&amp;id=68c924b0c1430862a6bbbabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4688-cwe-89-improper-neutralization-of-sp-4464879c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4688%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BGS%20Interactive%20SINAV.LINK%20Exam%20Result%20Module&amp;severity=critical&amp;id=68c924bec1430862a6bbbb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2404-cwe-79-improper-neutralization-of-in-a7922b03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ubit%20Information%20Technologies%20STOYS&amp;severity=medium&amp;id=68c9ba513e540f592ae59bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53293-9bf7e503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53293&amp;severity=low&amp;id=6901fa173aaa0256651529b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5519-cwe-201-insertion-of-sensitive-infor-6b7d0fd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5519%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ArgusTech%20BILGER&amp;severity=medium&amp;id=68c9fc31571b2840ff007f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-smokeloader-version-2025-418a5976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20SmokeLoader%20Version%202025&amp;severity=medium&amp;id=68c930ca3d980629458048c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5518-cwe-639-authorization-bypass-through-4c4daf7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5518%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ArgusTech%20BILGER&amp;severity=medium&amp;id=68c9197a0bc99c4a12389274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9808-cwe-200-exposure-of-sensitive-inform-89c2c5b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9808%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20theeventscalendar%20The%20Events%20Calendar&amp;severity=medium&amp;id=68c9fc31571b2840ff007f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ctrltinycolor-and-40-npm-packages-compromised-c8a43d6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ctrl%2Ftinycolor%20and%2040%2B%20NPM%20Packages%20Compromised&amp;severity=medium&amp;id=68c8c185ee2781683eecac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/htmldoc-1913-stack-buffer-overflow-f22724c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTMLDOC%201.9.13%20-%20Stack%20Buffer%20Overflow&amp;severity=medium&amp;id=68db38bca473ffe031e3631d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http2-20-denial-of-service-dos-6c612151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%2F2%202.0%20-%20Denial%20Of%20Service%20(DOS)&amp;severity=medium&amp;id=68db38bca473ffe031e3631a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mbed-tls-364-use-after-free-9579efdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mbed%20TLS%203.6.4%20-%20Use-After-Free&amp;severity=medium&amp;id=68db38bca473ffe031e36317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/concrete-cms-943-stored-xss-d504df5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Concrete%20CMS%209.4.3%20-%20Stored%20XSS&amp;severity=medium&amp;id=68db38bba473ffe031e362ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-platform-151010-metasploit-module-for-remote-746e56f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%20Platform%2015.10.10%20-%20Metasploit%20Module%20for%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68db38bba473ffe031e362eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elex-woocommerce-wordpress-plugin-143-sql-injectio-5654ac6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ELEX%20WooCommerce%20WordPress%20Plugin%201.4.3%20-%20SQL%20Injection&amp;severity=critical&amp;id=68db38bba473ffe031e362e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dotcms-250702-1-authenticated-blind-sql-injection-df73a834</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=dotCMS%2025.07.02-1%20-%20Authenticated%20Blind%20SQL%20Injection&amp;severity=medium&amp;id=68db38bba473ffe031e362e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-2550-cross-site-request-forgery-csrf-b6a0caaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%202.55.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=68db38bba473ffe031e362e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tourism-management-system-20-arbitrary-shell-uploa-201a9e6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tourism%20Management%20System%202.0%20-%20Arbitrary%20Shell%20Upload&amp;severity=medium&amp;id=68db38bba473ffe031e362df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipbucket-552-build-90-server-side-request-forger-4c2123c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClipBucket%205.5.2%20Build%20%2390%20-%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=68db38bba473ffe031e362dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipbucket-550-arbitrary-file-upload-2e1ff91a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClipBucket%205.5.0%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=68db38bba473ffe031e362d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-server-2025-hyper-v-nt-kernel-in-ed709097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20Server%202025%20Hyper-V%20NT%20Kernel%20Integration%20VSP%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68db38bba473ffe031e362d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ilevia-eve-x1x5-server-47180eden-reverse-rootshell-eeb6d3fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ilevia%20EVE%20X1%2FX5%20Server%204.7.18.0.eden%20-%20Reverse%20Rootshell&amp;severity=medium&amp;id=68db38bba473ffe031e362d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57631-na-7ff53910</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57631%3A%20n%2Fa&amp;severity=critical&amp;id=68c9fc31571b2840ff007f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56264-na-f9f54c50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56264%3A%20n%2Fa&amp;severity=high&amp;id=68c9fc31571b2840ff007f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54391-na-2f9cfd07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54391%3A%20n%2Fa&amp;severity=critical&amp;id=68c9cd7b60de0cbc503e6cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56263-na-3dbe9927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56263%3A%20n%2Fa&amp;severity=high&amp;id=68c9bd25693550a54d63d2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56557-na-e29b7d0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56557%3A%20n%2Fa&amp;severity=critical&amp;id=68c9ac1668484133f6b9fc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57625-na-19190121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57625%3A%20n%2Fa&amp;severity=high&amp;id=68c9a92f69caf095b57bf38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57624-na-f6b05162</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57624%3A%20n%2Fa&amp;severity=high&amp;id=68c9a92f69caf095b57bf38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56562-na-2f4db3d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56562%3A%20n%2Fa&amp;severity=high&amp;id=68c9a92f69caf095b57bf384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30075-ba6d910c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30075%3A%20CWE-673%20External%20Influence%20of%20Sphere%20Definition%20in%20Alludo%20MindManager&amp;severity=low&amp;id=68c984c585f45fd53b6e2804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57145-na-45781c82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57145%3A%20n%2Fa&amp;severity=medium&amp;id=68c97dc81745d1bd2332d286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56295-na-618f7afc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56295%3A%20n%2Fa&amp;severity=high&amp;id=68c97badd327290d6e7319d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56293-na-21cc00a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56293%3A%20n%2Fa&amp;severity=medium&amp;id=68c978667303a81d6bf89e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56289-na-7182e976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56289%3A%20n%2Fa&amp;severity=medium&amp;id=68c97484c3a8a11ff039d588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56280-na-1cd43c80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56280%3A%20n%2Fa&amp;severity=medium&amp;id=68c9716b1028f00afd44d15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56276-na-54fde27b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56276%3A%20n%2Fa&amp;severity=medium&amp;id=68c96f20164fb734315ebaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57119-na-26cccaea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57119%3A%20n%2Fa&amp;severity=critical&amp;id=68c96c13c51a739278df7100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44034-na-b98bc89e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44034%3A%20n%2Fa&amp;severity=high&amp;id=68c96c13c51a739278df70fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52044-na-112e904d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52044%3A%20n%2Fa&amp;severity=high&amp;id=68c96805849d7237d8ea7a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55834-na-e27237df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55834%3A%20n%2Fa&amp;severity=medium&amp;id=68c95d616f4da0585007d46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56697-na-e4e17f60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56697%3A%20n%2Fa&amp;severity=medium&amp;id=68c9496f561c5e692a3e1c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56706-na-a56030cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56706%3A%20n%2Fa&amp;severity=high&amp;id=68c9472d35a89d3eac0aae49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59453-cwe-669-incorrect-resource-transfer-72c96cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59453%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20clickstudios%20Passwordstate&amp;severity=low&amp;id=68c8dd86ee2781683eed6b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59437-cwe-918-server-side-request-forgery-972cf459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59437%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fedorindutny%20ip&amp;severity=low&amp;id=68c8c86eee2781683eecc885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59436-cwe-918-server-side-request-forgery-64d3f7a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59436%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fedorindutny%20ip&amp;severity=low&amp;id=68c8c86eee2781683eecc881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finwise-insider-breach-impacts-689k-american-first-92e5b4b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FinWise%20insider%20breach%20impacts%20689K%20American%20First%20Finance%20customers&amp;severity=high&amp;id=68c89f75af2084f1f5772695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-confirms-fraudulent-account-created-in-law--cf8d0b02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20confirms%20fraudulent%20account%20created%20in%20law%20enforcement%20portal&amp;severity=high&amp;id=68c89f75af2084f1f5772699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-steal-millions-of-gucci-balenciaga-and-ale-44cf728e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20steal%20millions%20of%20Gucci%2C%20Balenciaga%2C%20and%20Alexander%20McQueen%20customer%20records&amp;severity=medium&amp;id=68c89f76af2084f1f577269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43332-an-app-may-be-able-to-break-out-of--5333542b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43332%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43298-an-app-may-be-able-to-gain-root-pri-dc790aba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43298%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6eee2781683eebd5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43349-processing-a-maliciously-crafted-vi-83b9aee9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43349%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68c8aa70ee2781683eebd6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43308-an-app-may-be-able-to-access-sensit-b1e122f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43308%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6eee2781683eebd609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43328-an-app-may-be-able-to-access-sensit-a4271767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43328%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6fee2781683eebd655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43294-an-app-may-be-able-to-access-sensit-e4efe66d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43294%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68c8aa6dee2781683eebd5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43369-an-app-may-be-able-to-access-protec-cb3bb5ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43369%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43312-an-app-may-be-able-to-cause-unexpec-786ed0ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43312%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43353-processing-a-maliciously-crafted-st-ad9f05f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43353%3A%20Processing%20a%20maliciously%20crafted%20string%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43304-an-app-may-be-able-to-gain-root-pri-c0136526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43304%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6eee2781683eebd5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43305-a-malicious-app-may-be-able-to-acce-a7efeda3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43305%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43344-an-app-may-be-able-to-cause-unexpec-499ef3c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43344%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68c8aa70ee2781683eebd6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43190-an-app-may-be-able-to-access-sensit-32ef4c99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43190%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43368-processing-maliciously-crafted-web--4a267181</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43368%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43295-an-app-may-be-able-to-cause-a-denia-94a8e5cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43295%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43329-an-app-may-be-able-to-break-out-of--8297a142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43329%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68c8aa6fee2781683eebd658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43283-an-app-may-be-able-to-cause-unexpec-54576239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43283%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6dee2781683eebd59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43333-an-app-may-be-able-to-gain-root-pri-1ecac34d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43333%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6fee2781683eebd66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43299-an-app-may-be-able-to-cause-a-denia-efe059d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43299%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43325-an-app-may-be-able-to-access-sensit-8f840805</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43325%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43372-processing-a-maliciously-crafted-me-eb039bc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43372%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43292-an-app-may-be-able-to-access-sensit-e92395f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43292%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43314-an-app-may-be-able-to-access-sensit-b5d9f16e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43314%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43343-processing-maliciously-crafted-web--ffafdb2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43343%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=68c8aa70ee2781683eebd6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43355-an-app-may-be-able-to-cause-a-denia-0501258f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43355%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43302-an-app-may-be-able-to-cause-unexpec-a29a8b93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43302%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43375-processing-an-overly-large-path-val-7525fefd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43375%3A%20Processing%20an%20overly%20large%20path%20value%20may%20crash%20a%20process%20in%20Apple%20Xcode&amp;severity=high&amp;id=68c8aa71ee2781683eebd7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31271-incoming-facetime-calls-can-appear--9bf28a7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31271%3A%20Incoming%20FaceTime%20calls%20can%20appear%20or%20be%20accepted%20on%20a%20locked%20macOS%20device%2C%20even%20with%20notifications%20disabled%20on%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6cee2781683eebd568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43318-an-app-with-root-privileges-may-be--886d621c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43318%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43359-a-udp-server-socket-bound-to-a-loca-ed167c55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43359%3A%20A%20UDP%20server%20socket%20bound%20to%20a%20local%20interface%20may%20become%20bound%20to%20all%20interfaces%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa70ee2781683eebd7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43358-a-shortcut-may-be-able-to-bypass-sa-147f9a22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43358%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sandbox%20restrictions%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68c8aa70ee2781683eebd7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43319-an-app-may-be-able-to-access-protec-bcb3be08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43319%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43362-an-app-may-be-able-to-monitor-keyst-c11105d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43362%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa70ee2781683eebd7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31270-an-app-may-be-able-to-access-protec-f629af30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31270%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43231-an-app-may-be-able-to-access-user-s-66bf8aff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43231%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43303-an-app-may-be-able-to-access-sensit-bc194d59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43303%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43354-an-app-may-be-able-to-access-sensit-affe9264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43354%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43342-processing-maliciously-crafted-web--1cf79370</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43342%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=68c8aa70ee2781683eebd6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43207-an-app-may-be-able-to-access-user-s-b953299f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43207%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43315-an-app-may-be-able-to-access-user-s-40681d86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43315%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43293-an-app-may-be-able-to-access-sensit-a4213db0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43293%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43285-an-app-may-be-able-to-access-protec-c9643b71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43285%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43357-an-app-may-be-able-to-fingerprint-t-c9cf594b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43357%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43204-an-app-may-be-able-to-break-out-of--7888deff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43204%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6cee2781683eebd577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43341-an-app-may-be-able-to-gain-root-pri-dc129ff0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43341%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa70ee2781683eebd6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43316-a-malicious-app-may-be-able-to-gain-b8d37055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43316%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6eee2781683eebd627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31269-an-app-may-be-able-to-access-protec-bbb5c8bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31269%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43286-an-app-may-be-able-to-break-out-of--ec94bbbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43286%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6dee2781683eebd5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43208-an-app-may-be-able-to-read-sensitiv-abec2da5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43208%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24088-an-app-may-be-able-to-override-mdm--302926b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24088%3A%20An%20app%20may%20be%20able%20to%20override%20MDM-enforced%20settings%20from%20profiles%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6cee2781683eebd538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43321-an-app-may-be-able-to-access-protec-eaf84d84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43321%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43337-an-app-may-be-able-to-access-sensit-35982685</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43337%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43272-processing-maliciously-crafted-web--c45cf4e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43272%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa6dee2781683eebd593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43287-processing-a-maliciously-crafted-im-c07fbc01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43287%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20corrupt%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6dee2781683eebd5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31268-an-app-may-be-able-to-access-protec-85cbd336</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31268%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43291-an-app-may-be-able-to-modify-protec-166dbf83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43291%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24197-an-app-may-be-able-to-access-sensit-096523ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24197%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43317-an-app-may-be-able-to-access-sensit-45791ad0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43317%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43340-an-app-may-be-able-to-break-out-of--79de87bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43340%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa70ee2781683eebd6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43356-a-website-may-be-able-to-access-sen-85efd7cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43356%3A%20A%20website%20may%20be%20able%20to%20access%20sensor%20information%20without%20user%20consent%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43301-an-app-may-be-able-to-access-contac-c4182c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43301%3A%20An%20app%20may%20be%20able%20to%20access%20contact%20info%20related%20to%20notifications%20in%20Notification%20Center%20in%20Apple%20macOS&amp;severity=low&amp;id=68c8aa6eee2781683eebd5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43367-an-app-may-be-able-to-access-protec-c4d5ad3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43367%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43330-an-app-may-be-able-to-break-out-of--c2fe6298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43330%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=68c8aa6fee2781683eebd65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43326-an-app-may-be-able-to-access-sensit-1e7510dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43326%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43263-an-app-may-be-able-to-read-and-writ-8e815ad2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43263%3A%20An%20app%20may%20be%20able%20to%20read%20and%20write%20files%20outside%20of%20its%20sandbox%20in%20Apple%20Xcode&amp;severity=high&amp;id=68c8aa6cee2781683eebd586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43371-an-app-may-be-able-to-break-out-of--30f0c770</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43371%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20Xcode&amp;severity=high&amp;id=68c8aa71ee2781683eebd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31255-an-app-may-be-able-to-access-sensit-442c68b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31255%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa6cee2781683eebd54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43347-an-input-validation-issue-was-addre-93eda499</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43347%3A%20An%20input%20validation%20issue%20was%20addressed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68c8aa70ee2781683eebd6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43310-an-app-may-be-able-to-trick-a-user--53b4456f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43310%3A%20An%20app%20may%20be%20able%20to%20trick%20a%20user%20into%20copying%20sensitive%20data%20to%20the%20pasteboard%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43279-an-app-may-be-able-to-access-user-s-f84462a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43279%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6dee2781683eebd59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30468-private-browsing-tabs-may-be-access-63593d39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30468%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43297-an-app-may-be-able-to-cause-a-denia-3d3452e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43297%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43311-an-app-may-be-able-to-access-protec-a8c54b7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43311%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43203-an-attacker-with-physical-access-to-39ec23cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43203%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20may%20be%20able%20to%20view%20an%20image%20in%20the%20most%20recently%20viewed%20locked%20note%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43346-processing-a-maliciously-crafted-me-5b62b180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43346%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31254-processing-maliciously-crafted-web--37c71d3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31254%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20unexpected%20URL%20redirection%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa6cee2781683eebd546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43307-an-app-may-be-able-to-access-sensit-dd4157dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43307%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6eee2781683eebd5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43370-processing-an-overly-large-path-val-9e38b5a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43370%3A%20Processing%20an%20overly%20large%20path%20value%20may%20crash%20a%20process%20in%20Apple%20Xcode&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43327-visiting-a-malicious-website-may-le-a7e77749</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43327%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=68c8aa6fee2781683eebd651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43262-usb-restricted-mode-may-not-be-appl-012d5cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43262%3A%20USB%20Restricted%20Mode%20may%20not%20be%20applied%20to%20accessories%20connected%20during%20boot%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6cee2781683eebd583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24133-keyboard-suggestions-may-display-se-5c1f138f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24133&amp;severity=null&amp;id=68c8aa6cee2781683eebd53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43331-an-app-may-be-able-to-access-protec-7f9ec14e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43331%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa6fee2781683eebd662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43366-an-app-may-be-able-to-disclose-copr-0e4a1df2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43366%3A%20An%20app%20may%20be%20able%20to%20disclose%20coprocessor%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=68c8aa70ee2781683eebd7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10485-cross-site-scripting-in-pojoin-h3bl-af894aff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10485%3A%20Cross%20Site%20Scripting%20in%20pojoin%20h3blog&amp;severity=medium&amp;id=68c8aa6cee2781683eebd532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10483-sql-injection-in-sourcecodester-onl-e1f19f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10483%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c8aa6cee2781683eebd52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10482-sql-injection-in-sourcecodester-onl-42496c63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10482%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c88d72d3590a194cba1bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10481-sql-injection-in-sourcecodester-onl-dbe1ff1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10481%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c88d72d3590a194cba1bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43802-cwe-79-improper-neutralization-of-i-871f591f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c88d72d3590a194cba1bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10480-unrestricted-upload-in-sourcecodest-880f98a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10480%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c887a0ade1c1a7413995e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43797-cwe-1188-insecure-default-initializ-b79b2876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43797%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8863160bc4e6b5be35132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6947-cwe-79-improper-neutralization-of-in-82d1bb42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=68c884bf6a59ddba4fb1ef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6999-cwe-444-inconsistent-interpretation--b9f69583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6999%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=68c884bf6a59ddba4fb1ef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59056-cwe-22-improper-limitation-of-a-pat-7c5d45f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59056%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FreePBX%20framework&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10479-sql-injection-in-sourcecodester-onl-8a763591</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10479%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20File%20Management%20System&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55211-cwe-78-improper-neutralization-of-s-f6ec615e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55211%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20FreePBX%20framework&amp;severity=medium&amp;id=68c8aa71ee2781683eebd7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43798-cwe-304-missing-critical-step-in-au-b275b277</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43798%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Liferay%20DXP&amp;severity=low&amp;id=68c8aa71ee2781683eebd801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59145-cwe-506-embedded-malicious-code-in--98aedd8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59145%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20colorjs%20color-name&amp;severity=high&amp;id=68c878ea26cffcb34e4501df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10477-sql-injection-in-kidaze-courseselec-220570fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10477%3A%20SQL%20Injection%20in%20kidaze%20CourseSelectionSystem&amp;severity=medium&amp;id=68c878ea26cffcb34e4501d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43799-cwe-1393-use-of-default-password-in-0377fab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43799%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c87688c684d8f83c917c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phoenix-attack-bypasses-rowhammer-defenses-in--2704226f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phoenix%20attack%20bypasses%20Rowhammer%20defenses%20in%20DDR5%20memory&amp;severity=high&amp;id=68c8729ac5b6362f674bc180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fairmont-federal-credit-union-2023-data-breach-imp-c4e5580b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fairmont%20Federal%20Credit%20Union%202023%20data%20breach%20impacted%20187K%20people&amp;severity=high&amp;id=68c8729ac5b6362f674bc184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mustang-panda-deploys-snakedisk-usb-worm-to-delive-0c8fd732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mustang%20Panda%20Deploys%20SnakeDisk%20USB%20Worm%20to%20Deliver%20Yokai%20Backdoor%20on%20Thailand%20IPs&amp;severity=high&amp;id=68c8729ac5b6362f674bc17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59332-cwe-79-improper-neutralization-of-i-1f81bf2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59332%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dolfinus%203DAlloy&amp;severity=high&amp;id=68c8742b2c83040ec3b092e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59154-cwe-290-authentication-bypass-by-sp-1f327a9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59154%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20igniterealtime%20Openfire&amp;severity=medium&amp;id=68c871cf33dcebdb35c678ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10475-denial-of-service-in-spyshelter-968525a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10475%3A%20Denial%20of%20Service%20in%20SpyShelter&amp;severity=medium&amp;id=68c871cf33dcebdb35c678e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59331-cwe-506-embedded-malicious-code-in--84d00a7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59331%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-is-arrayish&amp;severity=high&amp;id=68c86d1cd09586c390afd456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59330-cwe-506-embedded-malicious-code-in--4cb691b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59330%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-error-ex&amp;severity=high&amp;id=68c86d1cd09586c390afd44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59162-cwe-506-embedded-malicious-code-in--d427bf83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59162%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20color-convert&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59142-cwe-506-embedded-malicious-code-in--584e745e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59142%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20color-string&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59144-cwe-506-embedded-malicious-code-in--8050c169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59144%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20debug-js%20debug&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59143-cwe-506-embedded-malicious-code-in--42cb4c65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59143%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20color&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59141-cwe-506-embedded-malicious-code-in--a4ed7657</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59141%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-simple-swizzle&amp;severity=high&amp;id=68c866d82e2c3e5d6abeedae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59140-cwe-506-embedded-malicious-code-in--c2446ec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59140%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20Qix-%20node-backslash&amp;severity=high&amp;id=68c866d82e2c3e5d6abeeda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43800-cwe-79-improper-neutralization-of-i-16278a55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8aa72ee2781683eebd814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10473-sql-injection-in-yangzongzhuan-ruoy-240cc8ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10473%3A%20SQL%20Injection%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=68c8aa71ee2781683eebd804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dangers-of-storing-unencrypted-passwords-bf2cdb1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Dangers%20of%20Storing%20Unencrypted%20Passwords&amp;severity=medium&amp;id=68c866e12e2c3e5d6abeeded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digital-frontlines-india-under-multi-nation-hackti-76e5e01b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digital%20Frontlines%3A%20India%20Under%20Multi-Nation%20Hacktivist%20Attack&amp;severity=medium&amp;id=68c866e12e2c3e5d6abeedd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10472-path-traversal-in-harry0703-moneypr-868c9c51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10472%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=68c85d5defcb880aa9e16334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playing-with-http2-connect-8265d90c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Playing%20with%20HTTP%2F2%20CONNECT&amp;severity=medium&amp;id=68c8579c5265fac210ab6d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43791-cwe-79-improper-neutralization-of-i-7d61cd29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8579a5265fac210ab6d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59155-cwe-918-server-side-request-forgery-73cda405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59155%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20yuna0x0%20hackmd-mcp&amp;severity=medium&amp;id=68c8469be8cf1c5173493847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58177-cwe-79-improper-neutralization-of-i-3fdef5e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58177%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=68c8450c6a96d484bebadcfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58172-cwe-79-improper-neutralization-of-i-df798aea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plait-board%20drawnix&amp;severity=medium&amp;id=68c84ebea2f5a8445a4f6876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-kimsuky-group-uses-ai-generated-milit-8363c39b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20Kimsuky%20Group%20Uses%20AI-Generated%20Military%20IDs%20in%20New%20Attacks&amp;severity=medium&amp;id=68c841f06411cb71021b3d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10471-server-side-request-forgery-in-zkea-e6d7e811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10471%3A%20Server-Side%20Request%20Forgery%20in%20ZKEACMS&amp;severity=medium&amp;id=68c841fc6411cb71021b3df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10203-cwe-23-relative-path-traversal-in-d-1d2dc37c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10203%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Digilent%20WaveForms&amp;severity=high&amp;id=68c8579a5265fac210ab6d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59328-cwe-502-deserialization-of-untruste-d01c21d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59328%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Fory&amp;severity=medium&amp;id=68c8aa72ee2781683eebd825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43792-cwe-15-external-control-of-system-o-3a0f5c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43792%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Liferay%20Portal&amp;severity=low&amp;id=68c8579a5265fac210ab6d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10491-cwe-284-improper-access-control-in--b4311296</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10491%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=68c841fc6411cb71021b3dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43793-cwe-1284-improper-validation-of-spe-c261559d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43793%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c8332cc6fbfcc734e1fa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36082-cwe-525-information-exposure-throug-a699c43c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36082%3A%20CWE-525%20Information%20Exposure%20Through%20Browser%20Caching%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=68c8332cc6fbfcc734e1fa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6202-vulnerability-in-sk-hynix-ddr5-b7fe3105</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6202%3A%20Vulnerability%20in%20SK%20Hynix%20DDR5&amp;severity=high&amp;id=68c82c4e61269957fe261ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10459-sql-injection-in-phpgurukul-beauty--2a09e083</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10459%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68c82c4e61269957fe261eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8396-cwe-770-allocation-of-resources-with-d36b4e53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8396%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Temporal%20OSS%20Server&amp;severity=medium&amp;id=68c821294546c28387c2f386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53183-399b8282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53183&amp;severity=low&amp;id=695b99acdb813ff03e48b58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10448-sql-injection-in-campcodes-online-j-75887d29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10448%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Job%20Finder%20System&amp;severity=medium&amp;id=68c81eed25c9b2752eb48a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-criminal-groups-compromising-salesforce-inst-91b8ce72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Criminal%20Groups%20Compromising%20Salesforce%20Instances%20for%20Data%20Theft%20and%20Extortion&amp;severity=medium&amp;id=68c81efc25c9b2752eb48b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10447-unrestricted-upload-in-campcodes-on-9af03edc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10447%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Job%20Finder%20System&amp;severity=medium&amp;id=68c816c046d9c11e5a23765d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10446-sql-injection-in-campcodes-computer-2d6da06d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10446%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c810b8b7a9c003946d30b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15th-september-threat-intelligence-report-325e846d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15th%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10445-sql-injection-in-campcodes-computer-0dbc2ea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10445%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c808eec396be2414c8bd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hide-rmm-installs-as-fake-chrome-updates-a-14ea5eda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Hide%20RMM%20Installs%20as%20Fake%20Chrome%20Updates%20and%20Teams%20Invites&amp;severity=medium&amp;id=68c8065ad4203851b347cbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3025-cwe-552-files-or-directories-accessi-7050cb5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3025%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Gen%20Digital%20CCleaner&amp;severity=high&amp;id=68c808eec396be2414c8bd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10444-sql-injection-in-campcodes-online-j-20aee9b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10444%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Job%20Finder%20System&amp;severity=medium&amp;id=68c80217f4c0d71d10f561fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59361-cwe-78-improper-neutralization-of-s-6a56f7fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59361%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=68c7fcb9de24c9cd9e93fa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59360-cwe-78-improper-neutralization-of-s-a51018ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59360%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=68c7fcb9de24c9cd9e93fa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59359-cwe-78-improper-neutralization-of-s-864a34b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59359%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=68c7ffd636f16715d5b79722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59358-cwe-306-missing-authentication-for--85c214ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59358%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function&amp;severity=high&amp;id=68c80217f4c0d71d10f5620e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10443-buffer-overflow-in-tenda-ac9-28b8e5b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10443%3A%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=68c7fa5eb8737bd57b2256dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43794-cwe-79-improper-neutralization-of-i-dad03d2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c80217f4c0d71d10f5620b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10442-os-command-injection-in-tenda-ac9-bbf85c81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10442%3A%20OS%20Command%20Injection%20in%20Tenda%20AC9&amp;severity=medium&amp;id=68c80217f4c0d71d10f56202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10441-os-command-injection-in-d-link-di-8-6b0fa821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10441%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-8100G&amp;severity=medium&amp;id=68c7ec148959976f4c493b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9826-cwe-79-improper-neutralization-of-in-141d2f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9826%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20Hubshare&amp;severity=high&amp;id=68c7e8e796db7a5e0fec5312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-powered-villager-pen-testing-tool-hits-11000-py-42848b1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Powered%20Villager%20Pen%20Testing%20Tool%20Hits%2011%2C000%20PyPI%20Downloads%20Amid%20Abuse%20Concerns&amp;severity=high&amp;id=68c7e5cdba7455fd7c5604a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10440-os-command-injection-in-d-link-di-8-f3b5878e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10440%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-8100&amp;severity=medium&amp;id=68c8aa72ee2781683eebd82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10436-sql-injection-in-campcodes-computer-32c747e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10436%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c8aa72ee2781683eebd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-unc6040-unc6395-hackers-stealing-sale-fcc880cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20warns%20of%20UNC6040%2C%20UNC6395%20hackers%20stealing%20Salesforce%20data&amp;severity=high&amp;id=68c7db53c74b00e2f6d92a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inc-ransom-group-claimed-the-breach-of-panamas-min-500d90f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=INC%20ransom%20group%20claimed%20the%20breach%20of%20Panama%E2%80%99s%20Ministry%20of%20Economy%20and%20Finance&amp;severity=high&amp;id=68c7db53c74b00e2f6d92a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hiddengh0st-winos-and-kkrat-exploit-seo-github-pag-c7eb4443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HiddenGh0st%2C%20Winos%20and%20kkRAT%20Exploit%20SEO%2C%20GitHub%20Pages%20in%20Chinese%20Malware%20Attacks&amp;severity=high&amp;id=68c7db53c74b00e2f6d92a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10435-sql-injection-in-campcodes-computer-ad920eb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10435%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c8469be8cf1c517349384b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10434-cross-site-scripting-in-ibuyucms-3342a9fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10434%3A%20Cross%20Site%20Scripting%20in%20IbuyuCMS&amp;severity=medium&amp;id=68c7d17da2c318a4b22ed47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10433-deserialization-in-1panel-dev-maxkb-7c90f510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10433%3A%20Deserialization%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=68c7c965d246d5a39a739527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41713-cwe-1188-insecure-default-initializ-580cf2c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41713%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20WAGO%20CC100%200751-9301&amp;severity=medium&amp;id=68c7c965d246d5a39a73952f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-driven-deepfake-military-id-fraud-campaign-184b13bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Driven%20Deepfake%20Military%20ID%20Fraud%20Campaign&amp;severity=medium&amp;id=68c7dd9102ac746af6ec8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10432-stack-based-buffer-overflow-in-tend-af0efe1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10432%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=critical&amp;id=68c7c2949d6d35cc686fb7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10431-sql-injection-in-sourcecodester-pet-74c6d36b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10431%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c7bc8a82b0368c62bbbecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10430-sql-injection-in-sourcecodester-pet-b1fb2054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10430%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c7b690fabac0897cd1be92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10453-cwe-918-server-side-request-forgery-dfc5389a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10453%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PilotGaea%20Technologies%20O&apos;View%20MapServer&amp;severity=medium&amp;id=68c837c2b49def593d9ba14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10429-sql-injection-in-sourcecodester-pet-8085383f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10429%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c8aa72ee2781683eebd837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10428-unrestricted-upload-in-sourcecodest-aafb70b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10428%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c8aa72ee2781683eebd828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10427-unrestricted-upload-in-sourcecodest-af246b89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10427%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c79fa38ed571af3bf24875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10426-sql-injection-in-itsourcecode-onlin-603a654d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10426%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Laundry%20Management%20System&amp;severity=medium&amp;id=68c798584a132d3d4000d87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10425-unrestricted-upload-in-1000projects-4ff56dfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10425%3A%20Unrestricted%20Upload%20in%201000projects%20Online%20Student%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68c790caeccd1b27010717b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10424-unrestricted-upload-in-1000projects-d0e484e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10424%3A%20Unrestricted%20Upload%20in%201000projects%20Online%20Student%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68c78c4139776bc2a1496662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10423-guessable-captcha-in-newbee-mall-bfe3c3a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10423%3A%20Guessable%20CAPTCHA%20in%20newbee-mall&amp;severity=medium&amp;id=68c7853939776bc2a148fbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10452-cwe-306-missing-authentication-for--cceca56f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10452%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Gotac%20Statistical%20Database%20System&amp;severity=critical&amp;id=68c781b639776bc2a148c658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10422-improper-authorization-in-newbee-ma-13e13347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10422%3A%20Improper%20Authorization%20in%20newbee-mall&amp;severity=medium&amp;id=68c781b639776bc2a148c651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10421-sql-injection-in-sourcecodester-stu-2249be83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10421%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c77aad39776bc2a1487c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10420-sql-injection-in-sourcecodester-stu-47439b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10420%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c7702239776bc2a147ddb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10419-sql-injection-in-sourcecodester-stu-d6cb7637</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10419%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c7691a39776bc2a1471161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strategies-for-analyzing-native-code-in-android-ap-432fd876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Strategies%20for%20Analyzing%20Native%20Code%20in%20Android%20Applications%3A%20Combining%20Ghidra%20and%20Symbolic%E2%80%A6&amp;severity=medium&amp;id=68c7659739776bc2a146fef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10418-sql-injection-in-sourcecodester-stu-9a961e6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10418%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c7621239776bc2a146bc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10417-sql-injection-in-campcodes-grocery--8776268b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10417%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7621239776bc2a146bc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-15-c15b4dbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-15&amp;severity=medium&amp;id=68c8ac44ee2781683eebe982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57118-na-c8b866cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57118%3A%20n%2Fa&amp;severity=critical&amp;id=68c887a0ade1c1a7413995f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56274-na-3c8b6879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56274%3A%20n%2Fa&amp;severity=high&amp;id=68c887a0ade1c1a7413995ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57117-na-f54e01a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57117%3A%20n%2Fa&amp;severity=medium&amp;id=68c8863160bc4e6b5be35135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56448-na-30b12b7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56448%3A%20n%2Fa&amp;severity=medium&amp;id=68c8742b2c83040ec3b092dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45091-na-805d1ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45091%3A%20n%2Fa&amp;severity=medium&amp;id=68c8703cade7e5f13766e920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59398-cwe-392-missing-report-of-error-con-fe2da85e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59398%3A%20CWE-392%20Missing%20Report%20of%20Error%20Condition%20in%20EVerest%20libocpp&amp;severity=low&amp;id=68c85fca5c6c1197c2b41eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57174-na-e8c69c02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57174%3A%20n%2Fa&amp;severity=critical&amp;id=68c85fca5c6c1197c2b41eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59399-cwe-460-improper-cleanup-on-thrown--d6e93bc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59399%3A%20CWE-460%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20EVerest%20libocpp&amp;severity=low&amp;id=68c85d5defcb880aa9e1633a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52344-na-cca12890</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52344%3A%20n%2Fa&amp;severity=medium&amp;id=68c8539957f07d61793d40ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49089-na-cdb2d6d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49089%3A%20n%2Fa&amp;severity=medium&amp;id=68c848eec2afb2158518cf8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57176-na-514c5a67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57176%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ceragon%20Networks%20%2F%20Siklu%20Communication%20EtherHaul%20and%20MultiHaul%20Series%20microwave%20antennas&amp;severity=medium&amp;id=68c8469be8cf1c5173493843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57104-na-4a177f8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57104%3A%20n%2Fa&amp;severity=medium&amp;id=68c8469be8cf1c517349383f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59397-cwe-89-improper-neutralization-of-s-14906c28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59397%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20openwebanalytics%20Open%20Web%20Analytics&amp;severity=medium&amp;id=68c837c2b49def593d9ba144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52048-na-b5a953fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52048%3A%20n%2Fa&amp;severity=medium&amp;id=68c837c2b49def593d9ba140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57248-na-e813decd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57248%3A%20n%2Fa&amp;severity=high&amp;id=68c830e1b701c863c6f66b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56252-na-398cc1ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56252%3A%20n%2Fa&amp;severity=medium&amp;id=68c82ddaac4e81a4c8420828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52053-na-c7ce9141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52053%3A%20n%2Fa&amp;severity=critical&amp;id=68c82c4e61269957fe261ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46408-na-3ee9be13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46408%3A%20n%2Fa&amp;severity=critical&amp;id=68c81eed25c9b2752eb48a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50944-na-1921b5ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50944%3A%20n%2Fa&amp;severity=high&amp;id=68c81cad8674856831e4914e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50110-na-f9a28e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50110%3A%20n%2Fa&amp;severity=high&amp;id=68c81cad8674856831e4914b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56710-na-bf4feba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56710%3A%20n%2Fa&amp;severity=high&amp;id=68c81a1e1032ef8ad1e99103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59377-cwe-78-improper-neutralization-of-s-437aaa1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59377%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20feiskyer%20mcp-kubernetes-server&amp;severity=low&amp;id=68c81869a56a3262e7ec5ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59376-cwe-77-improper-neutralization-of-s-c90bf22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59376%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20feiskyer%20mcp-kubernetes-server&amp;severity=low&amp;id=68c816c046d9c11e5a237664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59378-cwe-669-incorrect-resource-transfer-12df4304</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59378%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20GNU%20Guix&amp;severity=medium&amp;id=68c7a873484436f1fcd044a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59375-cwe-770-allocation-of-resources-wit-82d0797d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59375%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libexpat%20project%20libexpat&amp;severity=high&amp;id=68c781b639776bc2a148c65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10416-sql-injection-in-campcodes-grocery--bc79e063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10416%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10415-sql-injection-in-campcodes-grocery--1afd6bad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10415%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10414-sql-injection-in-campcodes-grocery--42b8739e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10414%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-fixes-image-parsing-vulnerability-exploite-079bf89e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20Fixes%20Image%20Parsing%20Vulnerability%20Exploited%20in%20Android%20Attacks&amp;severity=medium&amp;id=68c73fb45077691efeffd8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10413-sql-injection-in-campcodes-grocery--85e55f34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10413%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68c73d8a5a306f7ce4d0ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10411-cross-site-scripting-in-itsourcecod-ca174b38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10411%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68c7591939776bc2a1466a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10410-server-side-request-forgery-in-sour-495fc5bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10410%3A%20Server-Side%20Request%20Forgery%20in%20SourceCodester%20Link%20Status%20Checker&amp;severity=medium&amp;id=68c72efd75230e773636f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10409-sql-injection-in-sourcecodester-stu-b0bd6271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10409%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c727b86b2b635a0cd65b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10408-sql-injection-in-sourcecodester-stu-2d7b565c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10408%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c721247a11a6d763ce7421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10407-sql-injection-in-sourcecodester-stu-879bc402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10407%3A%20SQL%20Injection%20in%20SourceCodester%20Student%20Grading%20System&amp;severity=medium&amp;id=68c719bea9cfbf958cb989a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10405-sql-injection-in-itsourcecode-bapti-ac3ce0e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10405%3A%20SQL%20Injection%20in%20itsourcecode%20Baptism%20Information%20Management%20System&amp;severity=medium&amp;id=68c70bd7169535fb44154e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10404-sql-injection-in-itsourcecode-bapti-c3c9bf56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10404%3A%20SQL%20Injection%20in%20itsourcecode%20Baptism%20Information%20Management%20System&amp;severity=medium&amp;id=68c703bc18915fc6ece40156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10403-sql-injection-in-phpgurukul-beauty--03eb0ed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10403%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6051-cwe-1333-inefficient-regular-express-dd5e8314</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6051%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68c6f734ed64d8647ec09549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10402-sql-injection-in-phpgurukul-beauty--cdf88e54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10402%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68c6ef1f5673b0861add6118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10401-command-injection-in-d-link-dir-823-4f3ef72c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10401%3A%20Command%20Injection%20in%20D-Link%20DIR-823x&amp;severity=medium&amp;id=68c6e0952f1f64d8cea24e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10400-sql-injection-in-sourcecodester-foo-61c6ded7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10400%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20Management%20System&amp;severity=medium&amp;id=68c6cbbe24663201be11a6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10399-sql-injection-in-korzh-easyquery-7ac92982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10399%3A%20SQL%20Injection%20in%20Korzh%20EasyQuery&amp;severity=medium&amp;id=68c6bdfb256f5833ca9071d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0164-cwe-732-incorrect-permission-assignm-424b8375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0164%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20QRadar%20SIEM&amp;severity=low&amp;id=68c6bdfb256f5833ca9071d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36035-cwe-770-allocation-of-resources-wit-8650efb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36035%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=68c7591939776bc2a1466a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10204-cwe-306-missing-authentication-for--b757c894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10204%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20LG%20Electronics%20AC%20Smart%20II&amp;severity=high&amp;id=68c6b93c72e3f37451632354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10398-unrestricted-upload-in-fcbazzm-ics--f9485ab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10398%3A%20Unrestricted%20Upload%20in%20fcba_zzm%20ics-park%20Smart%20Park%20Management%20System&amp;severity=medium&amp;id=68c6b1b98474b5068df1b80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10397-server-side-request-forgery-in-magi-8d6d3bdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10397%3A%20Server-Side%20Request%20Forgery%20in%20Magicblack%20MacCMS&amp;severity=medium&amp;id=68c6a2e40061ecec26d742f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geedge-mesa-leak-analyzing-the-great-firewalls-lar-b16ffc92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Geedge%20%26%20MESA%20Leak%3A%20Analyzing%20the%20Great%20Firewall%E2%80%99s%20Largest%20Document%20Leak&amp;severity=medium&amp;id=68c69fc863fec7beb71689c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10396-sql-injection-in-sourcecodester-pet-0c841b0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10396%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68c67fea0a4526498bada67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10395-server-side-request-forgery-in-magi-6088caae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10395%3A%20Server-Side%20Request%20Forgery%20in%20Magicblack%20MacCMS&amp;severity=medium&amp;id=68c678f16e1d0c27045ffea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10394-code-injection-in-fcbazzm-ics-park--fe741e8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10394%3A%20Code%20Injection%20in%20fcba_zzm%20ics-park%20Smart%20Park%20Management%20System&amp;severity=medium&amp;id=68c7591939776bc2a1466a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10393-server-side-request-forgery-in-miur-d345ea8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10393%3A%20Server-Side%20Request%20Forgery%20in%20miurla%20morphic&amp;severity=medium&amp;id=68c7591939776bc2a1466a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10392-stack-based-buffer-overflow-in-merc-ba96f253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10392%3A%20Stack-based%20Buffer%20Overflow%20in%20Mercury%20KM08-708H%20GiGA%20WiFi%20Wave2&amp;severity=critical&amp;id=68c7591939776bc2a1466a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10391-server-side-request-forgery-in-crme-809a7012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10391%3A%20Server-Side%20Request%20Forgery%20in%20CRMEB&amp;severity=medium&amp;id=68c64da614e9827585ce5f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10390-improper-authorization-in-crmeb-a79533b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10390%3A%20Improper%20Authorization%20in%20CRMEB&amp;severity=medium&amp;id=68c7591939776bc2a1466a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10389-improper-authorization-in-crmeb-1278585f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10389%3A%20Improper%20Authorization%20in%20CRMEB&amp;severity=medium&amp;id=68c640bd97607eadceed6251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10388-cross-site-scripting-in-selleo-ment-afbc0337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10388%3A%20Cross%20Site%20Scripting%20in%20Selleo%20Mentingo&amp;severity=medium&amp;id=68c7591939776bc2a1466a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10387-sql-injection-in-codesiddhant-jasmi-56cdb091</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10387%3A%20SQL%20Injection%20in%20codesiddhant%20Jasmin%20Ransomware&amp;severity=medium&amp;id=68c632832da15045691e1848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10386-cross-site-scripting-in-yida-ecms-c-319bd7dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10386%3A%20Cross%20Site%20Scripting%20in%20Yida%20ECMS%20Consulting%20Enterprise%20Management%20System&amp;severity=medium&amp;id=68c61e29e14ebf9f5ccb1827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10385-buffer-overflow-in-mercury-km08-708-e1fb8959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10385%3A%20Buffer%20Overflow%20in%20Mercury%20KM08-708H%20GiGA%20WiFi%20Wave2&amp;severity=high&amp;id=68c61721e14ebf9f5ccae6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-14-95ba7e0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-14&amp;severity=medium&amp;id=68c75b0539776bc2a146757f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59363-cwe-669-incorrect-resource-transfer-1609a0a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59363%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20One%20Identity%20OneLogin&amp;severity=high&amp;id=68c7591939776bc2a1466a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59364-cwe-674-uncontrolled-recursion-in-e-e521ae47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59364%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Express%20XSS%20Sanitizer%20project%20Express%20XSS%20Sanitizer&amp;severity=medium&amp;id=68c741df245000a1c9af49ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-salesforce-attacks-by-unc6040-and-unc-c8f77d0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Salesforce%20attacks%20by%20UNC6040%20and%20UNC6395&amp;severity=medium&amp;id=68c5fe83e14ebf9f5cc9ea9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10384-improper-authorization-in-yangzongz-a155d7cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10384%3A%20Improper%20Authorization%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=68c5c9cae14ebf9f5cc889e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10374-improper-authorization-in-shenzhen--6bbb08dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10374%3A%20Improper%20Authorization%20in%20Shenzhen%20Sixun%20Business%20Management%20System&amp;severity=medium&amp;id=68c5c2c0e14ebf9f5cc863f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10373-cross-site-scripting-in-portabilis--207e7d53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10373%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68c5bbbae14ebf9f5cc83e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10372-cross-site-scripting-in-portabilis--4364cce9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10372%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68c5b4bee14ebf9f5cc7eca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/600-gb-of-alleged-great-firewall-of-china-data-pub-6419f4f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=600%20GB%20of%20Alleged%20Great%20Firewall%20of%20China%20Data%20Published%20in%20Largest%20Leak%20Yet&amp;severity=medium&amp;id=68c5b4afe14ebf9f5cc7ec48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10371-unrestricted-upload-in-echarge-hard-479cdc59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10371%3A%20Unrestricted%20Upload%20in%20eCharge%20Hardy%20Barth%20Salia%20PLCC&amp;severity=medium&amp;id=68c5ada9e14ebf9f5cc7b7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10370-cross-site-scripting-in-miczflor-rp-1bfade34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10370%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c5a6a1e14ebf9f5cc782da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10369-cross-site-scripting-in-miczflor-rp-8d4966cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10369%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c59f9ae14ebf9f5cc7511d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qrator-labs-mitigated-record-l7-ddos-attack-from-5-c3e1e32c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qrator%20Labs%20Mitigated%20Record%20L7%20DDoS%20Attack%20from%205.76M-Device%20Botnet&amp;severity=medium&amp;id=68c59890e14ebf9f5cc71e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10368-cross-site-scripting-in-miczflor-rp-3baea73f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10368%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c5918ae14ebf9f5cc6fb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10367-cross-site-scripting-in-miczflor-rp-a9e750c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10367%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c57c72e14ebf9f5cc6689f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10366-cross-site-scripting-in-miczflor-rp-eb411dc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10366%3A%20Cross%20Site%20Scripting%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c5756be14ebf9f5cc6246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10359-os-command-injection-in-wavlink-wl--f8a8ec93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10359%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c56e63e14ebf9f5cc60d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-voidproxy-phishing-service-bypasses-mfa-on-mic-80e63ede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VoidProxy%20Phishing%20Service%20Bypasses%20MFA%20on%20Microsoft%20and%20Google%20Accounts&amp;severity=medium&amp;id=68c547b5e14ebf9f5cc50bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-unc6040-and-unc6395-targeting-salesfo-c8b054e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20UNC6040%20and%20UNC6395%20Targeting%20Salesforce%20Platforms%20in%20Data%20Theft%20Attacks&amp;severity=high&amp;id=68c54431e14ebf9f5cc4f72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10358-os-command-injection-in-wavlink-wl--a5810677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10358%3A%20OS%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c52813e14ebf9f5cc434f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wsass-old-but-gold-dumping-lsass-with-windows-erro-a1c2aafb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WSASS%20-%20Old%20But%20Gold%2C%20Dumping%20LSASS%20With%20Windows%20Error%20Reporting%20On%20Modern%20Windows%2011&amp;severity=medium&amp;id=68c52110e14ebf9f5cc40ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10340-cross-site-scripting-in-whatcd-gaze-d2a29685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10340%3A%20Cross%20Site%20Scripting%20in%20WhatCD%20Gazelle&amp;severity=medium&amp;id=68c4dcd46da8ad0abf38e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10332-cross-site-scripting-in-cdevroe-unm-17964787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10332%3A%20Cross%20Site%20Scripting%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4d9506da8ad0abf38b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10331-cross-site-scripting-in-cdevroe-unm-1e1bd4ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10331%3A%20Cross%20Site%20Scripting%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4cb406da8ad0abf38368f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-13-b57ab5a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-13&amp;severity=medium&amp;id=68c60905e14ebf9f5cca6831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10330-cross-site-scripting-in-cdevroe-unm-3b1209ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10330%3A%20Cross%20Site%20Scripting%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4a8226da8ad0abf36919f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10329-server-side-request-forgery-in-cdev-3ff28996</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10329%3A%20Server-Side%20Request%20Forgery%20in%20cdevroe%20unmark&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10328-os-command-injection-in-miczflor-rp-3690074e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10328%3A%20OS%20Command%20Injection%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c49285e7ced5bb5fd749ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10176-cwe-22-improper-limitation-of-a-pat-6ec55b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10176%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tvcnet%20The%20Hack%20Repair%20Guy&apos;s%20Plugin%20Archiver&amp;severity=high&amp;id=68c4911f425bab5fac53e14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fine-grained-http-filtering-for-claude-code-b2b6a653</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fine-grained%20HTTP%20filtering%20for%20Claude%20Code&amp;severity=medium&amp;id=68c48e4f02795a2a456e6e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10327-os-command-injection-in-miczflor-rp-d562f377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10327%3A%20OS%20Command%20Injection%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10326-os-command-injection-in-miczflor-rp-dfe72841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10326%3A%20OS%20Command%20Injection%20in%20MiczFlor%20RPi-Jukebox-RFID&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10325-command-injection-in-wavlink-wl-wn5-95f374c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10325%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c4832aefb44f63f386e3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43795-cwe-601-url-redirection-to-untruste-94bc7513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43795%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c4811ab0d74f55ea9c84b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10324-command-injection-in-wavlink-wl-wn5-47d08f2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10324%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c476a54a4a4e555d3ab11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43796-cwe-400-uncontrolled-resource-consu-9feec332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43796%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68c4726b93bc26e976274cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10323-command-injection-in-wavlink-wl-wn5-1febd98b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10323%3A%20Command%20Injection%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c473d4d1fbe3b93c93e4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10322-weak-password-recovery-in-wavlink-w-7b9cd43e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10322%3A%20Weak%20Password%20Recovery%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c461b9b1ab4abecae87e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58434-cwe-306-missing-authentication-for--dc4dfc7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58434%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20FlowiseAI%20Flowise&amp;severity=critical&amp;id=68c45b66055763ea6cf4ba8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10321-information-disclosure-in-wavlink-w-07ed248c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10321%3A%20Information%20Disclosure%20in%20Wavlink%20WL-WN578W2&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4234-cwe-532-insertion-of-sensitive-infor-39b007b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4234%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Microsoft%20365%20Defender%20Pack&amp;severity=low&amp;id=68c457e4c2c897903a232032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4235-cwe-497-exposure-of-sensitive-system-4fdf91a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4235%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20User-ID%20Credential%20Agent&amp;severity=high&amp;id=68c457e4c2c897903a232035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seo-poisoning-attack-hits-windows-users-with-hidde-f9e92952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEO%20Poisoning%20Attack%20Hits%20Windows%20Users%20With%20Hiddengh0st%20and%20Winos%20Malware&amp;severity=medium&amp;id=68c447a65361a8cc9f085e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43787-cwe-79-improper-neutralization-of-i-123bfa57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c45033d5e8565f6a94eca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10320-weak-password-requirements-in-iteac-f78ababc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10320%3A%20Weak%20Password%20Requirements%20in%20iteachyou%20Dreamer%20CMS&amp;severity=low&amp;id=68c4463f09e75f78de1a0efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39799-f41c3d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39799&amp;severity=null&amp;id=68db1fa7a473ffe031e278e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yurei-the-new-ransomware-group-on-the-scene-74bf43b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yurei%20the%20New%20Ransomware%20Group%20on%20the%20Scene&amp;severity=medium&amp;id=68c4753f61b7885b88584381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixes-high-severity-ios-xr-flaws-enabling-im-7d5de7fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20fixes%20high-severity%20IOS%20XR%20flaws%20enabling%20image%20bypass%20and%20DoS&amp;severity=high&amp;id=68c43a54688fca75bb311281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10319-improper-authorization-in-jeecgboot-fbf63af1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10319%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deconstructing-a-cyber-deception-an-analysis-of-th-b9d5d35c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deconstructing%20a%20Cyber%20Deception%3A%20An%20Analysis%20of%20the%20Clickfix%20HijackLoader%20Phishing%20Campaign&amp;severity=medium&amp;id=68c4749156cc6d7fb97f0b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10364-cwe-77-improper-neutralization-of-s-61dc228e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10364%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Evertz%203080ipx-10G&amp;severity=critical&amp;id=68c425deaba797cca94012aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10365-cwe-287-improper-authentication-in--39d28040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10365%3A%20CWE-287%20Improper%20Authentication%20in%20Evertz%203080ipx-10G&amp;severity=critical&amp;id=68c425deaba797cca94012ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59058-cwe-208-observable-timing-discrepan-f8582b52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59058%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20junkurihara%20httpsig-rs&amp;severity=medium&amp;id=68c41d5dd839f9a306304f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59139-cwe-400-uncontrolled-resource-consu-1dff05c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59139%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20honojs%20hono&amp;severity=medium&amp;id=68c41d5dd839f9a306304f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59054-cwe-552-files-or-directories-access-f6654f10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59054%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Dstack-TEE%20dstack&amp;severity=high&amp;id=68c431af701e2b3019751c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yurei-the-ghost-of-open-source-ransomware-93f108d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yurei%20%26%20The%20Ghost%20of%20Open%20Source%20Ransomware&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10318-improper-authorization-in-jeecgboot-c27edddc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10318%3A%20Improper%20Authorization%20in%20JeecgBoot&amp;severity=medium&amp;id=68c416fc4e1289924792d731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-train-operator-lner-london-north-eastern-railwa-5393a442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20train%20operator%20LNER%20(London%20North%20Eastern%20Railway)%20discloses%20a%20data%20breach&amp;severity=high&amp;id=68c40aea04036f09e518cef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsung-patches-actively-exploited-zero-day-report-136f92ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Samsung%20patches%20actively%20exploited%20zero-day%20reported%20by%20WhatsApp&amp;severity=critical&amp;id=68c40a357b764acc0df4e13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8699-cwe-922-insecure-storage-of-sensitiv-6146442d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8699%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20KioSoft%20Stored%20Value%20Unattended%20Payment%20Solution&amp;severity=critical&amp;id=68c403142c3fd21ea9204bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muck-stealer-malware-used-alongside-phishing-in-ne-a2a472cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Muck%20Stealer%20Malware%20Used%20Alongside%20Phishing%20in%20New%20Attack%20Waves&amp;severity=medium&amp;id=68c400eda65869593d00cc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6638-cwe-1333-inefficient-regular-express-69cbe25d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6638%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68c3fa7ca466eacfca92b720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10267-cwe-306-missing-authentication-for--debc73fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10267%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NewType%20Infortech%20NUP%20Portal&amp;severity=medium&amp;id=68c43a62688fca75bb311351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10266-cwe-89-improper-neutralization-of-s-cd78c7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10266%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NewType%20Infortech%20NUP%20Portal&amp;severity=critical&amp;id=68c3f48fd8e02c407295e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10265-cwe-78-improper-neutralization-of-s-a4af554b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10265%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Digiever%20DS-1200&amp;severity=high&amp;id=68c3f48fd8e02c407295e366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10264-cwe-497-exposure-of-sensitive-syste-b7ffb627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10264%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Digiever%20DS-1200&amp;severity=critical&amp;id=68c3f1b04d0b21a097082fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cursor-ai-code-editor-flaw-enables-silent-code-exe-ffa4e871</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cursor%20AI%20Code%20Editor%20Flaw%20Enables%20Silent%20Code%20Execution%20via%20Malicious%20Repositories&amp;severity=high&amp;id=68c3eb395e15e0cac086a4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-dassault-systmes-delmia-apriso-flaw-t-a8a3089e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68c3eb395e15e0cac086a4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-issues-spyware-warnings-as-cert-fr-confirms--1e15e792</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20issues%20spyware%20warnings%20as%20CERT-FR%20confirms%20attacks&amp;severity=medium&amp;id=68c3eb395e15e0cac086a4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7448-cwe-290-authentication-bypass-by-spo-b3a79aee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7448%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20silabs.com%20Wi-SUN%20Stack&amp;severity=high&amp;id=68c457e4c2c897903a232038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybervolk-ransomware-analysis-of-double-encryption-58a36cc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CyberVolk%20Ransomware%3A%20Analysis%20of%20Double%20Encryption%20Structure%20and%20Disguised%20Decryption%20Logic&amp;severity=medium&amp;id=68c3d5ba78082adedc8e768b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trigona-rebranding-suspicions-and-global-threats-a-8de59f2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trigona%20Rebranding%20Suspicions%20and%20Global%20Threats%2C%20and%20BlackNevas%20Ransomware%20Analysis&amp;severity=medium&amp;id=68c3d5ba78082adedc8e7683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-code-and-fake-apps-used-for-far-reach-a476992e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Code%20and%20Fake%20Apps%20Used%20for%20Far-Reaching%20Attacks&amp;severity=medium&amp;id=68c3d5ba78082adedc8e766b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21043-cwe-787-out-of-bounds-write-in-sams-096a0d22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21043%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68c3ca6dbf4f1a3f8fc87880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21042-cwe-787-out-of-bounds-write-in-sams-4cc702c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21042%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=68c3ca6dbf4f1a3f8fc8787d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8280-cwe-79-cross-site-scripting-xss-in-c-f7b207a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8280%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%207%20reCAPTCHA&amp;severity=medium&amp;id=68c44b486b89fb6d41320d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3650-cwe-79-cross-site-scripting-xss-in-j-edcb495f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3650%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20jQuery%20Colorbox&amp;severity=low&amp;id=68c44b486b89fb6d41320d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58781-improper-certificate-validation-in--194c96e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58781%3A%20Improper%20certificate%20validation%20in%20Wireless%20Tsukamoto%20Co.%2C%20Ltd.%20WTW-EAGLE%20App%20for%20iOS&amp;severity=medium&amp;id=68c44b486b89fb6d41320d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10291-improper-authorization-in-linlinjav-ed3e7bb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10291%3A%20Improper%20Authorization%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=68c44d67952198808531bac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8575-cwe-36-absolute-path-traversal-in-au-68d0c93f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8575%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20aurelienlws%20LWS%20Cleaner&amp;severity=high&amp;id=68c3afb5dee0ac6b6335ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10288-improper-authentication-in-roncoo-r-2f3656f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10288%3A%20Improper%20Authentication%20in%20roncoo%20roncoo-pay&amp;severity=medium&amp;id=68c41d5dd839f9a306304f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10287-direct-request-in-roncoo-roncoo-pay-9eea140e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10287%3A%20Direct%20Request%20in%20roncoo%20roncoo-pay&amp;severity=low&amp;id=68c455cda2d8b85c2507118f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10278-improper-authorization-in-yunaiv-ru-b8be9b8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10278%3A%20Improper%20Authorization%20in%20YunaiV%20ruoyi-vue-pro&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9881-cwe-352-cross-site-request-forgery-c-f70a9626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9881%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jensg%20Ultimate%20Blogroll&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9877-cwe-79-improper-neutralization-of-in-752e1798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elangovan%20Embed%20Google%20Datastudio&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9880-cwe-352-cross-site-request-forgery-c-9463ef7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9880%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dejocar%20Side%20Slide%20Responsive%20Menu&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9879-cwe-79-improper-neutralization-of-in-53a50ca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20slowmove%20Spotify%20Embed%20Creator&amp;severity=medium&amp;id=68c394f4b40dc0e4c24ff7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10277-improper-authorization-in-yunaiv-yu-bd55415a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10277%3A%20Improper%20Authorization%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=68c455cda2d8b85c25071189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10269-cwe-98-improper-control-of-filename-02b9f191</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10269%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Theme-Spirit%20Spirit%20Framework&amp;severity=high&amp;id=68c3859b563d4c3db0637010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43788-cwe-862-missing-authorization-in-li-c85fc171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43788%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c3859b563d4c3db063701a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10276-improper-authorization-in-yunaiv-ru-013df125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10276%3A%20Improper%20Authorization%20in%20YunaiV%20ruoyi-vue-pro&amp;severity=medium&amp;id=68c3859b563d4c3db0637014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43789-cwe-863-incorrect-authorization-in--b61d0f25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43789%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=low&amp;id=68c3859b563d4c3db063701d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9807-cwe-89-improper-neutralization-of-sp-9c6940ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9807%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20theeventscalendar%20The%20Events%20Calendar&amp;severity=high&amp;id=68c37e92563d4c3db0633810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-2025-energy-phishing-wave-chevron-conoc-9e32e564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%202025%20Energy%20Phishing%20Wave%3A%20Chevron%2C%20Conoco%2C%20PBF%2C%20Phillips%2066&amp;severity=medium&amp;id=68c3d71f1f88449e6f032ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10275-improper-authorization-in-yunaiv-yu-76f6f019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10275%3A%20Improper%20Authorization%20in%20YunaiV%20yudao-cloud&amp;severity=medium&amp;id=68c3778f563d4c3db0630923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55319-remote-code-execution-in-microsoft--aacdad5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55319%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=68c3778f563d4c3db0630929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beaches-and-breaches-d69b255b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beaches%20and%20breaches&amp;severity=medium&amp;id=68c3daac1ed0af3bad57537a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10274-cross-site-scripting-in-erjinzhi-10-64a52e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10274%3A%20Cross%20Site%20Scripting%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c36981563d4c3db0629e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-12-08e5c123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-12&amp;severity=medium&amp;id=68c4b61a6da8ad0abf37a4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55996-na-d0746ca1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55996%3A%20n%2Fa&amp;severity=medium&amp;id=68c4a9e26da8ad0abf36f2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45587-na-098f14e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45587%3A%20n%2Fa&amp;severity=high&amp;id=68c4811ab0d74f55ea9c84b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45586-na-1388091a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45586%3A%20n%2Fa&amp;severity=high&amp;id=68c4811ab0d74f55ea9c84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45585-na-b47fa4bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45585%3A%20n%2Fa&amp;severity=medium&amp;id=68c4811ab0d74f55ea9c84b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45584-na-3f4f63df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45584%3A%20n%2Fa&amp;severity=high&amp;id=68c4811ab0d74f55ea9c84ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45583-na-3f7789ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45583%3A%20n%2Fa&amp;severity=critical&amp;id=68c4811ab0d74f55ea9c84aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52074-na-c41a8af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52074%3A%20n%2Fa&amp;severity=medium&amp;id=68c44d67952198808531babd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56467-na-f8ee883e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56467%3A%20n%2Fa&amp;severity=medium&amp;id=68c44b486b89fb6d41320d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57579-na-4511741a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57579%3A%20n%2Fa&amp;severity=high&amp;id=68c4463f09e75f78de1a0f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57577-na-0e131e9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57577%3A%20n%2Fa&amp;severity=high&amp;id=68c44285875a4b523bb18107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57578-na-5eefd249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57578%3A%20n%2Fa&amp;severity=high&amp;id=68c43ded0a8cd083103f5868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55835-na-23a63442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55835%3A%20n%2Fa&amp;severity=critical&amp;id=68c43a62688fca75bb31134b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10273-path-traversal-in-erjinzhi-10oa-b8705d69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10273%3A%20Path%20Traversal%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c35eee563d4c3db0621dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10272-cross-site-scripting-in-erjinzhi-10-9871170e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10272%3A%20Cross%20Site%20Scripting%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c357e6563d4c3db061ed6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10271-cross-site-scripting-in-erjinzhi-10-6f2d7645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10271%3A%20Cross%20Site%20Scripting%20in%20erjinzhi%2010OA&amp;severity=medium&amp;id=68c342ce563d4c3db06120d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36222-cwe-1188-insecure-default-initializ-e0b07c70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36222%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20IBM%20Fusion&amp;severity=high&amp;id=68c41d5dd839f9a306304f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/payment-service-zelle-sued-for-bad-infosec-enablin-2de6ebb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Payment%20service%20Zelle%20sued%20for%20bad%20infosec%20enabling%20fraud&amp;severity=high&amp;id=68c334bc563d4c3db060972f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10127-cwe-640-in-daikin-security-gateway-718c2177</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10127%3A%20CWE-640%20in%20Daikin%20Europe%20N.V%20Security%20Gateway&amp;severity=critical&amp;id=68c32a32563d4c3db06004aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updated-toneshell-backdoor-and-novel-snakedisk-usb-3694f722</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updated%20Toneshell%20backdoor%20and%20novel%20SnakeDisk%20USB%20worm%20dropped&amp;severity=medium&amp;id=68c32a3a563d4c3db06004b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-vmscape-attack-breaks-guest-host-isolation-on--c98c4810</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20VMScape%20attack%20breaks%20guest-host%20isolation%20on%20AMD%2C%20Intel%20CPUs&amp;severity=high&amp;id=68c31c2a563d4c3db05f0e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-exploiting-critical-sonicwall-ssl-174f7fc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20ransomware%20exploiting%20critical%20SonicWall%20SSLVPN%20bug%20again&amp;severity=critical&amp;id=68c31c2a563d4c3db05f0e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bulletproof-host-stark-industries-evades-eu-sancti-e79cc1c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bulletproof%20Host%20Stark%20Industries%20Evades%20EU%20Sanctions&amp;severity=high&amp;id=68c31c2a563d4c3db05f0e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59055-cwe-918-server-side-request-forgery-4d471f59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59055%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20instantsoft%20icms2&amp;severity=medium&amp;id=68c31ac15fe4190550a2ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8061-cwe-782-exposed-ioctl-with-insuffici-e91651fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8061%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20Lenovo%20Dispatcher%203.0%20Driver&amp;severity=high&amp;id=68c3168a00f99c09afdc9644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8557-cwe-420-unprotected-alternate-channe-320e65ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8557%3A%20CWE-420%3A%20Unprotected%20Alternate%20Channel%20in%20Lenovo%20XClarity%20Orchestrator%20(LXCO)&amp;severity=high&amp;id=68c3168a00f99c09afdc9647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9214-cwe-306-missing-authentication-for-c-b7d47679</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9214%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lenovo%20LJ2206W%20Printer&amp;severity=medium&amp;id=68c3168a00f99c09afdc964d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9319-cwe-494-download-of-code-without-int-fd861321</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9319%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Lenovo%20Wallpaper%20Client&amp;severity=high&amp;id=68c3168a00f99c09afdc9650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9201-cwe-427-uncontrolled-search-path-ele-68e73f8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9201%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Browser&amp;severity=high&amp;id=68c3168a00f99c09afdc964a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59053-cwe-94-improper-control-of-generati-e7485f77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59053%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20moeru-ai%20airi&amp;severity=critical&amp;id=68c3168a00f99c09afdc9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59047-cwe-682-incorrect-calculation-in-ma-6c0b1ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59047%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20matrix-org%20matrix-rust-sdk&amp;severity=low&amp;id=68c310fa2375b43386b94f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58065-cwe-287-improper-authentication-in--5d1189ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58065%3A%20CWE-287%3A%20Improper%20Authentication%20in%20dpgaspar%20Flask-AppBuilder&amp;severity=medium&amp;id=68c30ee6172f807b3b87dfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43790-cwe-639-authorization-bypass-throug-57b0bd58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43790%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=high&amp;id=68c30d7c64551817faa3ade7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43782-cwe-639-authorization-bypass-throug-f225c962</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43782%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c307eebb38cc0521773a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58364-cwe-20-improper-input-validation-in-cdfec7d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58364%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20cups&amp;severity=medium&amp;id=68c307eebb38cc0521773a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/senator-urges-ftc-probe-into-microsoft-after-ascen-99740cee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Senator%20Urges%20FTC%20Probe%20Into%20Microsoft%20After%20Ascension%20Ransomware%20Attack&amp;severity=medium&amp;id=68c303c329fde658ffdd6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58060-cwe-287-improper-authentication-in--c5edaa28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58060%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenPrinting%20cups&amp;severity=high&amp;id=68c307eebb38cc0521773a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39751-aa606fca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39751&amp;severity=null&amp;id=68e392d0f435541511951758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-campaign-leverages-svgs-email-attachments--0a2c4470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Campaign%20Leverages%20SVGs%2C%20Email%20Attachments%2C%20and%20CDNs%20to%20Drop%20XWorm%20and%20Remcos%20via%20BAT%20Scripts&amp;severity=medium&amp;id=68c303cf29fde658ffdd6fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10255-cross-site-scripting-in-ascensio-sy-d099d5f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10255%3A%20Cross%20Site%20Scripting%20in%20Ascensio%20System%20SIA%20OnlyOffice&amp;severity=medium&amp;id=68c2f52b5d9f58bf45d52198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-google-appsheet-phishing-scam-deliver-fake-tra-6db5f665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Google%20AppSheet%20Phishing%20Scam%20Deliver%20Fake%20Trademark%20Notices&amp;severity=medium&amp;id=68c2f0467c81ad735a9035ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10254-cross-site-scripting-in-ascensio-sy-0faf6ae3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10254%3A%20Cross%20Site%20Scripting%20in%20Ascensio%20System%20SIA%20OnlyOffice&amp;severity=medium&amp;id=68c2ecd12dd08e98e9c669ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10193-cwe-346-origin-validation-error-in--bae7ccd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10193%3A%20CWE-346%20Origin%20Validation%20Error%20in%20neo4j%20neo4j-cypher%20MCP%20server&amp;severity=high&amp;id=68c2d8fd5aed1f7cf94a225a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10253-cross-site-scripting-in-opendcim-177ee08f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10253%3A%20Cross%20Site%20Scripting%20in%20openDCIM&amp;severity=medium&amp;id=68c2de05689da4b209a14d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/france-three-regional-healthcare-agencies-targeted-1db707ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%3A%20Three%20Regional%20Healthcare%20Agencies%20Targeted%20by%20Cyber-Attacks&amp;severity=high&amp;id=68c2d4a599ba2d5da4ef6326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-ssl-vpn-flaw-and-misconfigurations-activ-7a1903be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SSL%20VPN%20Flaw%20and%20Misconfigurations%20Actively%20Exploited%20by%20Akira%20Ransomware%20Hackers&amp;severity=high&amp;id=68c2d4a599ba2d5da4ef6322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8716-cwe-754-improper-check-for-unusual-o-9cc44c2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8716%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20OpenText%20OpenText%20Content%20Management&amp;severity=medium&amp;id=68c2d27a99acb0d7b1c676ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10252-deserialization-in-seat-queue-ticke-b1fd3d22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10252%3A%20Deserialization%20in%20SEAT%20Queue%20Ticket%20Kiosk&amp;severity=low&amp;id=68c2d10a9e4a63635b8cb09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-rail-operator-lner-confirms-cyber-attack-exposi-47ef753d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Rail%20Operator%20LNER%20Confirms%20Cyber%20Attack%20Exposing%20Passenger%20Data&amp;severity=medium&amp;id=68c2cb45ba74a000e3741deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10251-sql-injection-in-foxcms-c944f8cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10251%3A%20SQL%20Injection%20in%20FoxCMS&amp;severity=medium&amp;id=68c2c91dba2d080483a08ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40696-cwe-79-improper-neutralization-of-i-3fa4a8bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c2b8b2d0657d5b69535d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40695-cwe-79-improper-neutralization-of-i-85580465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40694-cwe-79-improper-neutralization-of-i-ae0198ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40693-cwe-79-improper-neutralization-of-i-6465a9cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40693%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68c2ba22120f9ec6779c135e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10250-use-of-hard-coded-cryptographic-key-53572a09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10250%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20DJI%20Mavic%20Spark&amp;severity=low&amp;id=68c2b46a9f88baefcaada8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40692-cwe-89-improper-neutralization-of-s-b5793a71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40692%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b30b3f80e9fbe98f4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40691-cwe-89-improper-neutralization-of-s-008debc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40691%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b30b3f80e9fbe98f4bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40690-cwe-89-improper-neutralization-of-s-a29137a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40690%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b1a9a5ae58c0a7c992ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40689-cwe-89-improper-neutralization-of-s-deac528f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40689%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b1a9a5ae58c0a7c992b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40687-cwe-89-improper-neutralization-of-s-8c6788b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40687%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=critical&amp;id=68c2b1a9a5ae58c0a7c992b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9018-cwe-862-missing-authorization-in-ger-9a311d0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9018%3A%20CWE-862%20Missing%20Authorization%20in%20germanpearls%20Time%20Tracker&amp;severity=high&amp;id=68c31dfb563d4c3db05f6e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chillyhell-macos-malware-resurfaces-using-googleco-e22548c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChillyHell%20macOS%20Malware%20Resurfaces%2C%20Using%20Google.com%20as%20a%20Decoy&amp;severity=medium&amp;id=68c2a3f27cf1d4f83c0ec579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/practice-spotting-typo-squatted-domains-browser-ga-b73620bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Practice%20spotting%20typo%20squatted%20domains%20(Browser%20game%3A%20Typosquat%20Detective)&amp;severity=medium&amp;id=68c299a8838cc57ee58bd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58320-cwe-22-improper-limitation-of-a-pat-c00bbd9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58320%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Delta%20Electronics%20DIALink&amp;severity=high&amp;id=68c28e22977d802f0c676e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58321-cwe-22-improper-limitation-of-a-pat-8bd3d48a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58321%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Delta%20Electronics%20DIALink&amp;severity=critical&amp;id=68c28e22977d802f0c676e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48041-cwe-770-allocation-of-resources-wit-79263ca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48041%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Erlang%20OTP&amp;severity=high&amp;id=68c31dfb563d4c3db05f6e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48040-cwe-400-uncontrolled-resource-consu-1571c9f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48040%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Erlang%20OTP&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48039-cwe-770-allocation-of-resources-wit-68b8fbc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48039%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Erlang%20OTP&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48038-cwe-770-allocation-of-resources-wit-2d27413a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48038%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Erlang%20OTP&amp;severity=medium&amp;id=68c31dfb563d4c3db05f6e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9918-cwe-22-improper-limitation-of-a-path-b2353e3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9918%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Cloud%20Google%20SecOps%20SOAR&amp;severity=high&amp;id=68c2c12d5fab504ad85bc105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9633-cwe-352-cross-site-request-forgery-c-d0e06e41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9633%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shawfactor%20LH%20Signing&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8691-cwe-79-improper-neutralization-of-in-288f5832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softmus%20WP%20Scriptcase&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8398-cwe-79-improper-neutralization-of-in-797329da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azurecurve%20azurecurve%20BBCode&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9855-cwe-79-improper-neutralization-of-in-572823a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zuotian%20Enhanced%20BibliPlug&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8425-cwe-862-missing-authorization-in-myt-bd38074c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8425%3A%20CWE-862%20Missing%20Authorization%20in%20mythemeshop%20My%20WP%20Translate&amp;severity=high&amp;id=68c27a22e1c560fa9d94d457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9123-cwe-79-improper-neutralization-of-in-0364428d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manchumahara%20CBX%20Map%20for%20Google%20Map%20%26%20OpenStreetMap&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9632-cwe-352-cross-site-request-forgery-c-c33b5e51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9632%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vinzzb%20PhpList%20Subber&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9617-cwe-352-cross-site-request-forgery-c-c972a128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9617%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20evidentlycube%20Publish%20approval&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9128-cwe-79-improper-neutralization-of-in-10ea515c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eideasy%20eID%20Easy&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9693-cwe-22-improper-limitation-of-a-path-002e9fa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9693%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20khaledsaikat%20User%20Meta%20%E2%80%93%20User%20Profile%20Builder%20and%20User%20management%20plugin&amp;severity=high&amp;id=68c27a23e1c560fa9d94d4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9620-cwe-352-cross-site-request-forgery-c-bf10a402</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9620%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edsteep%20Seo%20Monster&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8570-cwe-798-use-of-hard-coded-credential-d9213c0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8570%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20beyondcart%20BeyondCart%20Connector&amp;severity=critical&amp;id=68c27a22e1c560fa9d94d467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9451-cwe-89-improper-neutralization-of-sp-38a0f4de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9451%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcatai%20Smartcat%20Translator%20for%20WPML&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8689-cwe-79-improper-neutralization-of-in-6a6746c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cssigniterteam%20Elements%20Plus!&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8215-cwe-79-improper-neutralization-of-in-3e969012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%20Plugin%20and%20Elementor%20Templates&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8481-cwe-352-cross-site-request-forgery-c-15558eab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8481%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mdimran41%20Blog%20Designer%20For%20Elementor%20%E2%80%93%20Post%20Slider%2C%20Post%20Carousel%2C%20Post%20Grid&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9623-cwe-352-cross-site-request-forgery-c-17315cc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9623%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dontcare%20Admin%20in%20English%20with%20Switch&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8392-cwe-79-improper-neutralization-of-in-c9f49aa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bessermitfahren%20Mitfahrgelegenheit&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8492-cwe-862-missing-authorization-in-wor-6fc32471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8492%3A%20CWE-862%20Missing%20Authorization%20in%20wordpresschef%20Salon%20Booking%20System%2C%20Appointment%20Scheduling%20for%20Salons%2C%20Spas%20%26%20Small%20Businesses&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9627-cwe-352-cross-site-request-forgery-c-41b98442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9627%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20izem%20Run%20Log&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9860-cwe-79-improper-neutralization-of-in-dfc3f585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20natata7%20Mixtape&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9874-cwe-98-improper-control-of-filename--0253e5f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9874%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=high&amp;id=68c27a23e1c560fa9d94d4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9635-cwe-352-cross-site-request-forgery-c-5e79b904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9635%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ishan001%20Analytics%20Reduce%20Bounce%20Rate&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9634-cwe-352-cross-site-request-forgery-c-2eb336a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9634%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jegerwan%20Plugin%20updates%20blocker&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8318-cwe-79-improper-neutralization-of-in-b10ea462</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bmarshall511%20Jobify&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8423-cwe-862-missing-authorization-in-myt-d2255950</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8423%3A%20CWE-862%20Missing%20Authorization%20in%20mythemeshop%20My%20WP%20Translate&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8692-cwe-89-improper-neutralization-of-sp-e7f88629</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8692%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamilkhan%20Coupon%20API&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9073-cwe-89-improper-neutralization-of-sp-0f441910</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9073%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20maheshmthorat%20All%20in%20one%20Minifier&amp;severity=high&amp;id=68c27a22e1c560fa9d94d48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8445-cwe-79-improper-neutralization-of-in-af1f41fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaikhaezaz80%20Countdown%20Timer%20for%20Elementor&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5801-cwe-79-improper-neutralization-of-in-2de7d775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rejuancse%20Digital%20Events%20Calendar&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8417-cwe-94-improper-control-of-generatio-4ae8b3b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8417%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20idiatech%20Catalog%20Importer%2C%20Scraper%20%26%20Crawler&amp;severity=high&amp;id=68c27a21e1c560fa9d94d43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8422-cwe-73-external-control-of-file-name-a7694c93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8422%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20fassionstorage%20Propovoice%3A%20All-in-One%20Client%20Management%20System&amp;severity=high&amp;id=68c27a21e1c560fa9d94d442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9628-cwe-352-cross-site-request-forgery-c-02f9524c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9628%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jh5ru%20The%20integration%20of%20the%20AMO.CRM&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9861-cwe-79-improper-neutralization-of-in-d3c8e322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livingos%20ThemeLoom%20Widgets&amp;severity=medium&amp;id=68c27a23e1c560fa9d94d4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8686-cwe-79-improper-neutralization-of-in-03f55ddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wen-solutions%20WP%20Easy%20FAQs&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0763-cwe-862-missing-authorization-in-web-2632e041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0763%3A%20CWE-862%20Missing%20Authorization%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8316-cwe-79-improper-neutralization-of-in-62956cb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moreirapontocom%20Certifica%20WP&amp;severity=medium&amp;id=68c27a21e1c560fa9d94d426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9631-cwe-352-cross-site-request-forgery-c-7742b770</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9631%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gyaku%20AutoCatSet&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8721-cwe-79-improper-neutralization-of-in-d5594aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miriamgoldman%20Workable%20Api&amp;severity=medium&amp;id=68c27a22e1c560fa9d94d480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8479-cwe-352-cross-site-request-forgery-c-f2acd236</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8479%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zohoflow%20Zoho%20Flow%20%E2%80%93%20Integrate%20100%2B%20plugins%20with%201000%2B%20business%20apps%2C%20no-code%20workflow%20automation&amp;severity=medium&amp;id=68c2e1a5a8af254b635031c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9034-cwe-601-url-redirection-to-untrusted-90a8ecb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9034%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Wp%20Edit%20Password%20Protected&amp;severity=medium&amp;id=68c2e1a5a8af254b635031c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10247-improper-access-controls-in-jepaas-22a975f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10247%3A%20Improper%20Access%20Controls%20in%20JEPaaS&amp;severity=medium&amp;id=68c261240d4576fefdffec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-its-crucial-to-scan-qr-codes-securely-in-today-671e00e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20It&apos;s%20Crucial%20to%20Scan%20QR%20Codes%20Securely%20in%20Today&apos;s%20Cybersecurity%20Landscape&amp;severity=critical&amp;id=68c25d6170b5a178096c8c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9059-cwe-427-uncontrolled-search-path-ele-7051467f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9059%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Broadcom%208.6.IT%20Management%20Suite&amp;severity=high&amp;id=68c25cac1c86892753756734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10246-cross-site-scripting-in-lokibhardwa-b44ba9ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10246%3A%20Cross%20Site%20Scripting%20in%20lokibhardwaj%20PHP-Code-For-Unlimited-File-Upload&amp;severity=medium&amp;id=68c2e1a5a8af254b635031bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9910-cross-site-scripting-xss-in-jsondiff-0a1daf5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9910%3A%20Cross-site%20Scripting%20(XSS)%20in%20jsondiffpatch&amp;severity=low&amp;id=68c2cc018a22ab8ffbcec2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9776-cwe-89-improper-neutralization-of-sp-d42fcea9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9776%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20catfolders%20CatFolders%20%E2%80%93%20Tame%20Your%20WordPress%20Media%20Library%20by%20Category&amp;severity=medium&amp;id=68c2513d729aac9ae34ee3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10245-path-traversal-in-display-painis-tg-ef75c802</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10245%3A%20Path%20Traversal%20in%20Display%20Pain%C3%A9is%20TGA&amp;severity=medium&amp;id=68c229c512193b50d302ecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10236-path-traversal-in-binary-husky-gpta-dad823c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10236%3A%20Path%20Traversal%20in%20binary-husky%20gpt_academic&amp;severity=medium&amp;id=68c229c512193b50d302ecb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6088-cwe-285-improper-authorization-in-da-3424bedd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6088%3A%20CWE-285%20Improper%20Authorization%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68c21f3a12193b50d3026e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10235-cross-site-scripting-in-scada-lts-4b9ea76b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10235%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68c21bb612193b50d3025395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-11-f846e457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-11&amp;severity=medium&amp;id=68c365e7563d4c3db06266b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56556-na-651f9682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56556%3A%20n%2Fa&amp;severity=low&amp;id=68c31ac15fe4190550a2ff4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10234-cross-site-scripting-in-scada-lts-a172e010</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10234%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68c20da512193b50d3018eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10233-path-traversal-in-kalcaddle-kodbox-13097c15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10233%3A%20Path%20Traversal%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=68c206a012193b50d3015877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10232-path-traversal-in-299ko-baa5f095</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10232%3A%20Path%20Traversal%20in%20299ko&amp;severity=medium&amp;id=68c1ff9512193b50d3013746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10229-open-redirect-in-freshwork-eb4d13b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10229%3A%20Open%20Redirect%20in%20Freshwork&amp;severity=medium&amp;id=68c1f88d12193b50d301108e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealing-the-keys-from-the-octopus-exfiltrate-git--a4b4d511</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealing%20the%20keys%20from%20the%20octopus%3A%20Exfiltrate%20Git%20Credentials%20in%20Argocd&amp;severity=medium&amp;id=68c1f18912193b50d300cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10218-sql-injection-in-lostvip-com-ruoyi--caebd754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10218%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68c1f18512193b50d300cefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10216-race-condition-in-grandnode-fddfd053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10216%3A%20Race%20Condition%20in%20GrandNode&amp;severity=low&amp;id=68c1ea7d12193b50d300abec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47120-cwe-250-execution-with-unnecessary--2f487897</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47120%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Information%20Queue&amp;severity=medium&amp;id=69a0a1cc85912abc71d0bd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43783-cwe-79-improper-neutralization-of-i-1ad914c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c1dc6d12193b50d30006b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eggstreme-malware-unpacking-a-new-apt-framework-ta-486cfd4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EggStreme%20Malware%3A%20Unpacking%20a%20New%20APT%20Framework%20Targeting%20a%20Philippine%20Military%20Company&amp;severity=medium&amp;id=68c1dc6c12193b50d300065c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10211-server-side-request-forgery-in-yany-8ab5ece6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10211%3A%20Server-Side%20Request%20Forgery%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68c1dc6d12193b50d30006af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54376-cwe-200-exposure-of-sensitive-infor-cb1ea600</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54376%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SpectoLabs%20hoverfly&amp;severity=high&amp;id=68c1d8ec12193b50d3fff70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10201-inappropriate-implementation-in-goo-4610bbdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10201%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68c1ce8dc458e92ac0137389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10200-use-after-free-in-google-chrome-5d93539b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10200%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68c1ce8dc458e92ac0137385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43784-cwe-863-incorrect-authorization-in--e61bbadb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43784%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c1ce8dc458e92ac013738d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10210-sql-injection-in-yanyutao0402-chanc-7d4298a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10210%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68c1cc7ef286523e0b8be523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-kkrat-3f3f7be5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20kkRAT&amp;severity=medium&amp;id=68c1dc6c12193b50d3000635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54123-cwe-20-improper-input-validation-in-e83de7d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54123%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20SpectoLabs%20hoverfly&amp;severity=critical&amp;id=68c1c79bd98a03aa75d81631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10209-improper-authorization-in-papermerg-b4e67b6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10209%3A%20Improper%20Authorization%20in%20Papermerge%20DMS&amp;severity=medium&amp;id=68c1c4c764e7e03488ac5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8696-cwe-789-memory-allocation-with-exces-09ab01ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8696%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20ISC%20Stork&amp;severity=high&amp;id=68c1bf362fc5c5dfd9988aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt-hits-philippine-military-firm-with-new-53d0d406</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT%20Hits%20Philippine%20Military%20Firm%20with%20New%20EggStreme%20Fileless%20Malware&amp;severity=medium&amp;id=68c1b4a7be3ecb127f3ff141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-carplay-exploited-to-gain-root-access-by-exe-183da97b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20CarPlay%20Exploited%20To%20Gain%20Root%20Access%20By%20Executing%20Remote%20Code&amp;severity=high&amp;id=68c1ace4c91550039e05e205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-confirms-data-theft-after-recent-1d5a5caf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20confirms%20data%20theft%20after%20recent%20cyberattack&amp;severity=high&amp;id=68c1ac285b9fe1b8911bbed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adaptixc2-a-new-open-source-framework-leveraged-in-2881c691</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AdaptixC2%3A%20A%20New%20Open-Source%20Framework%20Leveraged%20in%20Real-World%20Attacks&amp;severity=medium&amp;id=68c1d4bb2da131ca1f63f0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43785-cwe-79-improper-neutralization-of-i-200e2697</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c1a63b3247d0c3ad2e9f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/learn-about-chillyhell-a-modular-mac-backdoor-16d24ddf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Learn%20about%20ChillyHell%2C%20a%20modular%20Mac%20backdoor&amp;severity=medium&amp;id=68c1d56f12193b50d3ff9e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59045-cwe-770-allocation-of-resources-wit-4d339154</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59045%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stalwartlabs%20stalwart&amp;severity=high&amp;id=68c1a33d65b18cd0836584b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43886-cwe-35-path-traversal-in-dell-power-e3cb28eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43886%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=68c1a33d65b18cd0836584b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20340-uncontrolled-resource-consumption-i-e4180e79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20340%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=68c1a33d65b18cd0836584b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20159-improper-access-control-in-cisco-ci-411529e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20159%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=68c1a33d65b18cd0836584ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20248-improper-verification-of-cryptograp-dab7623d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20248%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=68c1a33d65b18cd0836584af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fileless-malware-attack-spotted-using-asyncrat-f1317f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fileless%20Malware%20Attack%20Spotted%20Using%20AsyncRAT%20for%20Credential%20Theft&amp;severity=medium&amp;id=68c1a27c14292ccda25cd8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43938-cwe-256-plaintext-storage-of-a-pass-b7c71558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43938%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8681-cwe-79-improper-neutralization-of-in-449a7af5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Pegasystems%20Pega%20Infinity&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43887-cwe-276-incorrect-default-permissio-f65d8ca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43887%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c1a1c551d6d0ab833ae281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43725-cwe-276-incorrect-default-permissio-7e40721f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43725%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c1a1c551d6d0ab833ae27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43885-cwe-78-improper-neutralization-of-s-ce421d89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43885%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c1a0479f28e0fbf536df2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43884-cwe-78-improper-neutralization-of-s-a2566f2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43884%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c19e0ed3a3d6019ff9f126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43888-cwe-532-insertion-of-sensitive-info-6ff282a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43888%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=68c19d54cce016a9a48210ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59041-cwe-94-improper-control-of-generati-30e67775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59041%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68c196ac368ecf244925d85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58764-cwe-94-improper-control-of-generati-e3e04b73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58764%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=68c196ac368ecf244925d85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10231-cwe-276-incorrect-default-permissio-07efb51f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10231%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20N-able%20N-central&amp;severity=high&amp;id=68c180ede55cc6e90da2154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hello-gym-data-leak-exposes-16-million-audio-files-72fdbe9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hello%20Gym%20Data%20Leak%20Exposes%201.6%20Million%20Audio%20Files%20of%20Gym%20Members&amp;severity=medium&amp;id=68c17d67e55cc6e90da1fd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10227-cwe-311-missing-encryption-of-sensi-1b30b8d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10227%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=medium&amp;id=68c17661e55cc6e90da1cfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10226-cwe-1395-dependency-on-vulnerable-t-f4e49a82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10226%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=critical&amp;id=68c17661e55cc6e90da1cfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10225-cwe-119-improper-restriction-of-ope-e0736fbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10225%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=high&amp;id=68c17661e55cc6e90da1cfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10224-cwe-287-improper-authentication-in--21e1ece7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10224%3A%20CWE-287%3A%20Improper%20Authentication%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=medium&amp;id=68c17661e55cc6e90da1cf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10223-cwe-613-insufficient-session-expira-85334318</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10223%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=medium&amp;id=68c172f9e55cc6e90da1b4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10222-cwe-200-exposure-of-sensitive-infor-d622a983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10222%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=low&amp;id=68c172f9e55cc6e90da1b4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/killsec-ransomware-is-attacking-healthcare-institu-5adb33ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KillSec%20Ransomware%20is%20Attacking%20Healthcare%20Institutions%20in%20Brazil%20-%20Security%20Affairs&amp;severity=medium&amp;id=68c172dae55cc6e90da1b3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-apt41-hackers-target-us-trade-officia-f0103a0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20APT41%20Hackers%20Target%20U.S.%20Trade%20Officials%20Amid%202025%20Negotiations&amp;severity=high&amp;id=68c172dae55cc6e90da1b3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10221-cwe-532-insertion-of-sensitive-info-822a3fbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10221%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20AxxonSoft%20AxxonNet%20ARP%20Agent%20C-WerkNet&amp;severity=medium&amp;id=68c172f9e55cc6e90da1b4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10220-cwe-1104-use-of-unmaintained-third--9088d9c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10220%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20AxxonSoft%20AxxonOne%20C-Werk&amp;severity=critical&amp;id=68c172f9e55cc6e90da1b4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10219-3f9edce1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10219&amp;severity=null&amp;id=68c172f9e55cc6e90da1b4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7718-cwe-639-authorization-bypass-through-89f8fb25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7718%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pixel_prime%20Resideo%20Plugin%20for%20Resideo%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=68c172f9e55cc6e90da1b4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kerberoasting-0faa0f1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kerberoasting&amp;severity=medium&amp;id=68c16bd7e55cc6e90da18534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40725-cwe-79-improper-neutralization-of-i-0f8647b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Azon%20Dominator%20Azon%20Dominator%20PHP%20script&amp;severity=medium&amp;id=68c16853e55cc6e90da16fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40979-cwe-427-uncontrolled-search-path-el-968f5dcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40979%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Grandstream%20Networks%20Wave&amp;severity=high&amp;id=68c164cde55cc6e90da15a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-buterat-backdoor-malware-found-in-enterprise-a-569e815b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Buterat%20Backdoor%20Malware%20Found%20in%20Enterprise%20and%20Government%20Networks&amp;severity=medium&amp;id=68c156bae55cc6e90da0c999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36759-cwe-200-exposure-of-sensitive-infor-a20693bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36759%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=high&amp;id=68c13e20e55cc6e90da004a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36757-cwe-306-missing-authentication-for--878e2e45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36757%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=medium&amp;id=68c13e20e55cc6e90da0049c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36758-cwe-307-improper-restriction-of-exc-e028dd2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36758%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=medium&amp;id=68c13e20e55cc6e90da004a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36756-cwe-862-missing-authorization-in-so-8576b680</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36756%3A%20CWE-862%20Missing%20Authorization%20in%20SolaX%20Power%20SolaX%20Cloud&amp;severity=medium&amp;id=68c13e20e55cc6e90da00498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zynorrat-technical-analysis-reverse-engineering-a--65c05991</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZynorRAT%20technical%20analysis%3A%20Reverse%20engineering%20a%20novel%2C%20Turkish%20Go-based%20RAT&amp;severity=medium&amp;id=68c13393e55cc6e90d9fc6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-spotlight-speed-scale-and-stealth-how-axios-8c86afa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Spotlight%3A%20Speed%2C%20Scale%2C%20and%20Stealth%3A%20How%20Axios%20Powers%20Automated%20Phishing&amp;severity=medium&amp;id=68c13011e55cc6e90d9fa8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41714-cwe-22-improper-limitation-of-a-pat-5c603641</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41714%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Welotec%20SmartEMS%20Web%20Application&amp;severity=high&amp;id=68c12201e55cc6e90d9f5602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9943-cwe-89-improper-neutralization-of-sp-5ae32dc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9943%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shibboleth%20Service%20Provider&amp;severity=critical&amp;id=68c12201e55cc6e90d9f5605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10142-cwe-89-improper-neutralization-of-s-41af060c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10142%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20martins56%20PagBank%20%2F%20PagSeguro%20Connect%20para%20WooCommerce&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9857-cwe-79-improper-neutralization-of-in-a9c06f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Heateor%20Login%20%E2%80%93%20Social%20Login%20Plugin&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10126-cwe-79-improper-neutralization-of-i-fa14e368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markohoven%20MyBrain%20Utilities&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10001-cwe-434-unrestricted-upload-of-file-e21c95c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10001%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpallimport%20Import%20any%20XML%2C%20CSV%20or%20Excel%20File%20to%20WordPress&amp;severity=high&amp;id=68c11e7ce55cc6e90d9f3b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9888-cwe-352-cross-site-request-forgery-c-56924ffe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9888%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonifre%20Maspik%20%E2%80%93%20Ultimate%20Spam%20Protection&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9622-cwe-352-cross-site-request-forgery-c-34e42181</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9622%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpblast%20WP%20Blast%20%7C%20SEO%20%26%20Performance%20Booster&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10040-cwe-862-missing-authorization-in-sm-a7431c67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10040%3A%20CWE-862%20Missing%20Authorization%20in%20smackcoders%20WP%20Import%20%E2%80%93%20Ultimate%20CSV%20XML%20Importer%20for%20WordPress&amp;severity=high&amp;id=68c11e7ce55cc6e90d9f3b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7843-cwe-918-server-side-request-forgery--45596f39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7843%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fernandiez%20Auto%20Save%20Remote%20Images%20(Drafts)&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7826-cwe-89-improper-neutralization-of-sp-4ffa46e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7826%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20laki_patel%20Testimonial&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9367-cwe-79-improper-neutralization-of-in-1a008f43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9979-cwe-862-missing-authorization-in-yon-209e03bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9979%3A%20CWE-862%20Missing%20Authorization%20in%20yonifre%20Maspik%20%E2%80%93%20Ultimate%20Spam%20Protection&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8778-cwe-862-missing-authorization-in-nit-af2f9c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8778%3A%20CWE-862%20Missing%20Authorization%20in%20nitropack%20NitroPack%20%E2%80%93%20Caching%20%26%20Speed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Defer%20CSS%20%26%20JS%2C%20Lazy%20load%20Images%20and%20CDN&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9463-cwe-89-improper-neutralization-of-sp-1ecde312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9463%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20peachpay%20Payments%20Plugin%20and%20Checkout%20Plugin%20for%20WooCommerce%3A%20Stripe%2C%20PayPal%2C%20Square%2C%20Authorize.net&amp;severity=medium&amp;id=68c11e7ee55cc6e90d9f3b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6189-cwe-89-improper-neutralization-of-sp-30d618fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6189%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arjunthakur%20Duplicate%20Page%20and%20Post&amp;severity=medium&amp;id=68c11e7de55cc6e90d9f3b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7049-cwe-639-authorization-bypass-through-290d54f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7049%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=68c11e7de55cc6e90d9f3b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10049-cwe-434-unrestricted-upload-of-file-90a60516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10049%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nik00726%20Responsive%20Filterable%20Portfolio&amp;severity=high&amp;id=68c11e7ce55cc6e90d9f3b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8388-cwe-79-improper-neutralization-of-in-2a298544</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Elementor%20Addons%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=68c0fed8e55cc6e90d9e33aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10197-sql-injection-in-hjsoft-hcm-human-r-febe3b31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10197%3A%20SQL%20Injection%20in%20HJSoft%20HCM%20Human%20Resources%20Management%20System&amp;severity=medium&amp;id=68c0cb539ed239a66bae6162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10195-improper-export-of-android-applicat-353a6b23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10195%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Seismic%20App&amp;severity=medium&amp;id=68c0c7e29ed239a66bae3b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-10-e3941084</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-10&amp;severity=medium&amp;id=68c2149e12193b50d301bf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29592-na-9be3899c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29592%3A%20n%2Fa&amp;severity=medium&amp;id=68c1d71512193b50d3ffead6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50892-na-00c26325</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50892%3A%20n%2Fa&amp;severity=high&amp;id=68c1b6cbe8f25095999e12eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55976-na-16208a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55976%3A%20n%2Fa&amp;severity=high&amp;id=68c1b4b8be3ecb127f3ff26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57392-na-fee006b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57392%3A%20n%2Fa&amp;severity=high&amp;id=68c1b28e3b1fa0753e490df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57520-na-d1d72b71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57520%3A%20n%2Fa&amp;severity=medium&amp;id=68c1b073772de968f7fdd33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57642-na-67f5ef21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57642%3A%20n%2Fa&amp;severity=high&amp;id=68c1acf5c91550039e05e31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57571-na-79113669</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57571%3A%20n%2Fa&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57569-na-cc0fb9c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57569%3A%20n%2Fa&amp;severity=medium&amp;id=68c1a1c551d6d0ab833ae287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57572-na-aae707fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57572%3A%20n%2Fa&amp;severity=medium&amp;id=68c19e0ed3a3d6019ff9f129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57573-na-944537ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57573%3A%20n%2Fa&amp;severity=medium&amp;id=68c19d54cce016a9a48210d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57570-na-f9bba449</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57570%3A%20n%2Fa&amp;severity=medium&amp;id=68c19d54cce016a9a48210d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56466-na-bb818965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56466%3A%20n%2Fa&amp;severity=high&amp;id=68c19281e55cc6e90da2d551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56578-na-e7d484c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56578%3A%20n%2Fa&amp;severity=medium&amp;id=68c19281e55cc6e90da2d54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56407-na-58566794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56407%3A%20n%2Fa&amp;severity=high&amp;id=68c187f5e55cc6e90da24a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56413-na-1c2f1a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56413%3A%20n%2Fa&amp;severity=high&amp;id=68c187f5e55cc6e90da24a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56406-na-39f03135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56406%3A%20n%2Fa&amp;severity=high&amp;id=68c1847ae55cc6e90da22f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56405-na-54285e4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56405%3A%20n%2Fa&amp;severity=high&amp;id=68c1847ae55cc6e90da22f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56404-na-89937c41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56404%3A%20n%2Fa&amp;severity=high&amp;id=68c1847ae55cc6e90da22f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10172-buffer-overflow-in-utt-750w-861eab33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10172%3A%20Buffer%20Overflow%20in%20UTT%20750W&amp;severity=high&amp;id=68c0b63b9ed239a66badc434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59046-cwe-77-improper-neutralization-of-s-2646323f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59046%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ninofiliu%20interactive-git-checkout&amp;severity=critical&amp;id=68c0af389ed239a66bad90df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59044-cwe-1188-insecure-default-initializ-2166be93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59044%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=68c0af389ed239a66bad90da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59039-cwe-506-embedded-malicious-code-in--ca64ba7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59039%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20prebid%20prebid-universal-creative&amp;severity=critical&amp;id=68c0abb29ed239a66bad7807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59038-cwe-506-embedded-malicious-code-in--90ffb6a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59038%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20prebid%20Prebid.js&amp;severity=high&amp;id=68c0ec1da3df14e7d73649e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59036-cwe-298-improper-validation-of-cert-538b6e68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59036%3A%20CWE-298%3A%20Improper%20Validation%20of%20Certificate%20Expiration%20in%20opsmill%20infrahub&amp;severity=medium&amp;id=68c0a82b9ed239a66bad624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58131-cwe-367-time-of-check-time-of-use-t-3654f1ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58131%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20VDI%20Plugin%20macOS%20Universal%20installer%20for%20VMware%20Horizon&amp;severity=medium&amp;id=68c0a1239ed239a66bad109f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58135-cwe-837-improper-enforcement-of-a-s-55715b0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58135%3A%20CWE-837%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients%20for%20Windows&amp;severity=medium&amp;id=68c0a1239ed239a66bad10a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58134-cwe-863-incorrect-authorization-in--dc98c4bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58134%3A%20CWE-863%20Incorrect%20Authorization%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients%20for%20Windows&amp;severity=medium&amp;id=68c0a1239ed239a66bad10a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49461-cwe-79-improper-neutralization-of-i-01315244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49461%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=68c0a1239ed239a66bad10ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54258-use-after-free-cwe-416-in-adobe-sub-ba4e6395</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54258%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68c0a1239ed239a66bad10ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54259-integer-overflow-or-wraparound-cwe--0ef7a5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54259%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68c0a1239ed239a66bad10b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54260-out-of-bounds-read-cwe-125-in-adobe-55c67feb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54260%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=68c0a1239ed239a66bad10b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49460-cwe-400-uncontrolled-resource-consu-f5c057b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49460%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=68c0a1239ed239a66bad10a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10171-buffer-overflow-in-utt-1250gw-509ce996</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10171%3A%20Buffer%20Overflow%20in%20UTT%201250GW&amp;severity=high&amp;id=68c0a1239ed239a66bad10b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49459-cwe-862-missing-authorization-in-zo-004ff8cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49459%3A%20CWE-862%20Missing%20Authorization%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20for%20Windows%20on%20ARM&amp;severity=high&amp;id=68c09d9f9ed239a66bacf8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49458-cwe-120-buffer-copy-without-checkin-2c3e68bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49458%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Clients&amp;severity=medium&amp;id=68c09d9f9ed239a66bacf8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9997-cwe-78-improper-neutralization-of-sp-66e8b23c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9997%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20Saitel%20DR%20RTU&amp;severity=medium&amp;id=68c09d9f9ed239a66bacf8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9996-cwe-78-improper-neutralization-of-sp-913397b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9996%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20Saitel%20DR%20RTU&amp;severity=medium&amp;id=68c09a1b9ed239a66bacd6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54244-heap-based-buffer-overflow-cwe-122--860f4aa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54244%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68c09a1b9ed239a66bacd6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54243-out-of-bounds-write-cwe-787-in-adob-dc4e14cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54243%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68c09a1b9ed239a66bacd6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54245-out-of-bounds-write-cwe-787-in-adob-88ef1060</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54245%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=68c09a1b9ed239a66bacd6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58462-cwe-89-improper-neutralization-of-s-7583146c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58462%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=critical&amp;id=68c09a1b9ed239a66bacd6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-rise-of-raton-from-nfc-heists-to-remote-contro-07ab36a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Rise%20of%20RatOn%3A%20From%20NFC%20heists%20to%20remote%20control%20and%20ATS&amp;severity=medium&amp;id=68c0a4a69ed239a66bad4d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23344-cwe-78-improper-neutralization-of-s-b3e6ffa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23344%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVDebug%20tool&amp;severity=high&amp;id=68c096a79ed239a66bac6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23343-cwe-22-improper-limitation-of-a-pat-18507eec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23343%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20NVDebug%20tool&amp;severity=high&amp;id=68c096a79ed239a66bac6adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23342-cwe-522-insufficiently-protected-cr-e11a2e80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23342%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20NVIDIA%20NVDebug%20tool&amp;severity=high&amp;id=68c096a79ed239a66bac6ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10170-buffer-overflow-in-utt-1200gw-56a978cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10170%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68c096a79ed239a66bac6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7746-cwe-79-improper-neutralization-of-in-f359e109</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20ATV630%2F650%2F660%2F680%2F6A0%2F6B0%2F6L0%20Altivar%20Process%20Drives&amp;severity=medium&amp;id=68c096a79ed239a66bac6ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10169-buffer-overflow-in-utt-1200gw-e85eb40d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10169%3A%20Buffer%20Overflow%20in%20UTT%201200GW&amp;severity=high&amp;id=68c096a79ed239a66bac6ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10159-cwe-620-unverified-password-change--e438d018</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10159%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Sophos%20AP6%20Series%20Wireless%20Access%20Points&amp;severity=critical&amp;id=68c096a79ed239a66bac6acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-charges-admin-of-lockergoga-megacortex-nefilim--bf190de2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20charges%20admin%20of%20LockerGoga%2C%20MegaCortex%2C%20Nefilim%20ransomware&amp;severity=high&amp;id=68c095326cc3622422b098c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kosovo-hacker-pleads-guilty-to-running-blackdb-cyb-9782fe97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kosovo%20hacker%20pleads%20guilty%20to%20running%20BlackDB%20cybercrime%20marketplace&amp;severity=high&amp;id=68c0947aa0d4a986bd5c22b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-hide-behind-tor-in-exposed-docker-api-brea-60db40e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20hide%20behind%20Tor%20in%20exposed%20Docker%20API%20breaches&amp;severity=high&amp;id=68c0947aa0d4a986bd5c22b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54241-out-of-bounds-read-cwe-125-in-adobe-bf71971a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54241%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=68c093c4f10b3c489f23d347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54239-out-of-bounds-read-cwe-125-in-adobe-31bbcb22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54239%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=68c093c4f10b3c489f23d341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54240-out-of-bounds-read-cwe-125-in-adobe-94d83aca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54240%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=68c093c4f10b3c489f23d344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54084-cwe-78-improper-neutralization-of-s-b2e3e77f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54084%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c090f313e997301ccc53bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43491-cwe-99-in-hp-inc-poly-lens-793e9210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43491%3A%20CWE-99%20in%20HP%2C%20Inc.%20Poly%20Lens&amp;severity=high&amp;id=68c08ee596774cc5680167b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54083-cwe-922-insecure-storage-of-sensiti-33726c46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54083%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Calix%20GigaCenter%20ONT&amp;severity=medium&amp;id=68c08ee596774cc5680167b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59037-cwe-506-embedded-malicious-code-in--44ea6db1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59037%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20duckdb%20duckdb-node&amp;severity=high&amp;id=68c08ee596774cc5680167bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34178-cwe-79-improper-neutralization-of-i-8a75688a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c08ee596774cc5680167af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58768-cwe-94-improper-control-of-generati-955ee7cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58768%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=68c08cadbf8644e23a9d2227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34177-cwe-79-improper-neutralization-of-i-601c5109</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c08cadbf8644e23a9d221b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58765-cwe-79-improper-neutralization-of-i-4283ffb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58765%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webrecorder%20wabac.js&amp;severity=high&amp;id=68c08cadbf8644e23a9d2222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34176-cwe-22-improper-limitation-of-a-pat-279c61b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34176%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c08cadbf8644e23a9d2217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54255-violation-of-secure-design-principl-7c6f12e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54255%3A%20Violation%20of%20Secure%20Design%20Principles%20(CWE-657)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=68c089dc075fc5f733c91a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34175-cwe-79-improper-neutralization-of-i-3a8f6db1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c089dc075fc5f733c91a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54257-use-after-free-cwe-416-in-adobe-acr-d7d41a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54257%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=68c089dc075fc5f733c91a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7635-cwe-306-missing-authentication-for-c-d757ca9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7635%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c089dc075fc5f733c91a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34174-cwe-79-improper-neutralization-of-i-db988973</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34174%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c089dc075fc5f733c91a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53914-cwe-269-improper-privilege-manageme-7c90f626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53914%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c0983c9ed239a66bacc0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34173-cwe-22-improper-limitation-of-a-pat-5eaac10c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34173%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c0983c9ed239a66bacc0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58753-cwe-862-missing-authorization-in-90-9764591d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58753%3A%20CWE-862%3A%20Missing%20Authorization%20in%209001%20copyparty&amp;severity=medium&amp;id=68c0983c9ed239a66bacc0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53913-cwe-269-improper-privilege-manageme-56a4f39b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53913%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Calix%20GigaCenter%20ONT&amp;severity=high&amp;id=68c08ee596774cc5680167c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58759-cwe-20-improper-input-validation-in-be9843a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58759%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20datahihi1%20tiny-env&amp;severity=medium&amp;id=68c0983c9ed239a66bacc102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58758-cwe-703-improper-check-or-handling--3751f884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58758%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20datahihi1%20tiny-env&amp;severity=medium&amp;id=68c0983c9ed239a66bacc0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58435-cwe-262-not-using-password-aging-in-05cc53bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58435%3A%20CWE-262%3A%20Not%20Using%20Password%20Aging%20in%20OSC%20ondemand&amp;severity=medium&amp;id=68c0859d840cb93c117a091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34172-cwe-79-improper-neutralization-of-i-2064750b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netgate%20pfSense%20CE&amp;severity=medium&amp;id=68c0983c9ed239a66bacc105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-technical-analysis-on-how-a-chinese-company-is-e-2275dbf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Technical%20Analysis%20on%20How%20a%20Chinese%20Company%20is%20Exporting%20The%20Great%20Firewall%20to%20Autocratic%20Regimes&amp;severity=medium&amp;id=68c082c81d20e9585176ce07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58430-cwe-80-improper-neutralization-of-s-0033a11d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58430%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20knadh%20listmonk&amp;severity=high&amp;id=68c082c41d20e9585176cde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36011-cwe-614-sensitive-cookie-in-https-s-41d56416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36011%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=medium&amp;id=68c082c41d20e9585176cde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36125-cwe-79-improper-neutralization-of-i-e7e57ce2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Hardware%20Management%20Console&amp;severity=medium&amp;id=68c080a332300b81c82d9676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47415-cwe-22-improper-limitation-of-a-pat-9d24543d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47415%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CRESTRON%20TOUCHSCREENS%20x60%2C%20x70%20series&amp;severity=medium&amp;id=68c07f368d6da9cee16f97e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55054-cwe-79-improper-neutralization-of-i-2a97d2b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Baicells%20EG7035E-M11&amp;severity=medium&amp;id=68c07dca2a45f782fdb1779b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55053-cwe-328-use-of-weak-hash-in-baicell-1b44a7e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55053%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20Baicells%20NOVA430e%2F430i%2C%20NOVA436Q%2C%20NEUTRINO430%2C%20NOVA846&amp;severity=medium&amp;id=68c07dca2a45f782fdb17798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43786-cwe-79-improper-neutralization-of-i-c31da4a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c07dca2a45f782fdb17795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55052-cwe-200-exposure-of-sensitive-infor-98819cf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55052%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Baicells%20NEUTRINO430%2C%20NOVA436Q%2C%20NOVA430e%2F430i%2C%20NOVA846%2C%20NOVA246%2C%20NOVA243%2C%20NOVA233%2C%20NOVA227&amp;severity=medium&amp;id=68c07ba9b6075907d2127cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55051-cwe-1392-use-of-default-credentials-5a3f2ece</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55051%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Baicells%20NOVA430e%2F430i%2C%20NOVA436Q%2C%20NEUTRINO430%2C%20NOVA846&amp;severity=critical&amp;id=68c07ba9b6075907d2127ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55050-cwe-1242-in-baicells-nova430e430i-n-0281ff5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55050%3A%20CWE-1242%20in%20Baicells%20NOVA430e%2F430i%2C%20NOVA436Q%2C%20NEUTRINO430%2C%20NOVA846&amp;severity=critical&amp;id=68c079872c3c95605bcf75c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55730-cwe-116-improper-encoding-or-escapi-5feb2dc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55730%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c0782035242cb3d0f995b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55049-cwe-1394-in-baicells-neutrino430-37bfdf48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55049%3A%20CWE-1394%20in%20Baicells%20NEUTRINO430&amp;severity=critical&amp;id=68c0782035242cb3d0f995a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55729-cwe-116-improper-encoding-or-escapi-3e41fa58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55729%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c0782035242cb3d0f995aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43781-cwe-79-improper-neutralization-of-i-54c60550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c0782035242cb3d0f995a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55048-multiple-cwe-78-in-baicells-neutrin-9adfb7cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55048%3A%20Multiple%20CWE-78%20in%20Baicells%20NEUTRINO430%2C%20NOVA436Q%2C%20NOVA430e%2F430i%2C%20NOVA846%2C%20NOVA246%2C%20NOVA243%2C%20NOVA233%2C%20NOVA227&amp;severity=critical&amp;id=68c076b59256f7c60d152edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55047-cwe-798-use-of-hard-coded-credentia-c120d26e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55047%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Baicells%20SPECTRA%20LTE-U%20eNB&amp;severity=high&amp;id=68c076b59256f7c60d152edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55728-cwe-95-improper-neutralization-of-d-b60cc2c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55728%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c076b59256f7c60d152ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10164-deserialization-in-lmsys-sglang-443fc0fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10164%3A%20Deserialization%20in%20lmsys%20sglang&amp;severity=medium&amp;id=68c0749c2bd84bebdc41b969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55727-cwe-95-improper-neutralization-of-d-9a8779ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55727%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwikisas%20xwiki-pro-macros&amp;severity=critical&amp;id=68c0749c2bd84bebdc41b972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54242-use-after-free-cwe-416-in-adobe-pre-7cb50507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54242%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=68c071e0ce6ed8307545b972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54256-cross-site-request-forgery-csrf-cwe-49b03f51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54256%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20(CWE-352)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=68c071e0ce6ed8307545b975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43775-cwe-79-improper-neutralization-of-i-5f96e0ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c06f24349e966b172a6669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10199-cwe-428-unquoted-search-path-or-ele-87b21015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10199%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20LizardByte%20Sunshine%20for%20Windows&amp;severity=high&amp;id=68c064ee22bccc7413ab98b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10198-cwe-427-uncontrolled-search-path-el-97400766</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10198%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20LizardByte%20Sunshine%20for%20Windows&amp;severity=high&amp;id=68c064ee22bccc7413ab98b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9269-cwe-918-server-side-request-forgery--79b52d30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9269%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Lexmark%20CX%2C%20XC%2C%20CS%2C%20MS%2C%20MX%2C%20XM%2C%20et.%20al.&amp;severity=medium&amp;id=68c0749c2bd84bebdc41b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55234-cwe-287-improper-authentication-in--35e64249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55234%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e4ce6ed8307545babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55227-cwe-77-improper-neutralization-of-s-33863122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55227%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=68c071e4ce6ed8307545bab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55224-cwe-362-concurrent-execution-using--cde33692</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55224%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e4ce6ed8307545baad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54917-cwe-693-protection-mechanism-failur-decaf7de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54917%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e3ce6ed8307545ba8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54915-cwe-843-access-of-resource-using-in-599dd7c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54915%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c064ee22bccc7413ab98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54912-cwe-416-use-after-free-in-microsoft-60e8d38d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54912%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c064ee22bccc7413ab98c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54911-cwe-416-use-after-free-in-microsoft-c328338a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54911%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c064ee22bccc7413ab98c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54910-cwe-122-heap-based-buffer-overflow--23be1fd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54910%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c064ee22bccc7413ab98c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54901-cwe-126-buffer-over-read-in-microso-d149b065</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54901%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68c064ee22bccc7413ab98bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54900-cwe-122-heap-based-buffer-overflow--dad77e6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54900%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c064ee22bccc7413ab98bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54116-cwe-284-improper-access-control-in--356dec38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54116%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54115-cwe-362-concurrent-execution-using--520c8ec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54115%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e3ce6ed8307545ba45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54114-cwe-362-concurrent-execution-using--4aead464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54114%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c071e2ce6ed8307545ba2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54113-cwe-122-heap-based-buffer-overflow--9a0785ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54113%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=68c071e2ce6ed8307545ba2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54112-cwe-416-use-after-free-in-microsoft-986a7aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54112%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545ba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54109-cwe-843-access-of-resource-using-in-57c2866d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54109%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545ba20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54108-cwe-362-concurrent-execution-using--6c8faf58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54108%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c064ee22bccc7413ab98b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54107-cwe-41-improper-resolution-of-path--7f3af99a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54107%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545ba1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54105-cwe-362-concurrent-execution-using--8c5586f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54105%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c071e2ce6ed8307545ba17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54104-cwe-843-access-of-resource-using-in-bf257cfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54104%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545ba14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54103-cwe-416-use-after-free-in-microsoft-18befd8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54103%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c071e2ce6ed8307545b9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54098-cwe-284-improper-access-control-in--28bda28d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54098%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545b9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54094-cwe-843-access-of-resource-using-in-0d094577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54094%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54093-cwe-367-time-of-check-time-of-use-t-e8bfd8b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54093%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545b9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54092-cwe-362-concurrent-execution-using--54368422</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54092%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e1ce6ed8307545b9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54091-cwe-190-integer-overflow-or-wraparo-cccd91de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54091%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c06b1099c168b213afaf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53810-cwe-843-access-of-resource-using-in-482a6068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53810%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c06b1099c168b213afaf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53809-cwe-20-improper-input-validation-in-b48a8f3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53809%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53808-cwe-843-access-of-resource-using-in-5df691d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53808%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c06f24349e966b172a666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53807-cwe-362-concurrent-execution-using--4c3f124c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53807%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e1ce6ed8307545b9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53806-cwe-126-buffer-over-read-in-microso-063d5f02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53806%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53805-cwe-125-out-of-bounds-read-in-micro-d6822398</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53805%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68c071e1ce6ed8307545b9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53804-cwe-200-exposure-of-sensitive-infor-c7d1cbb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53804%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53803-cwe-209-generation-of-error-message-0857c040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53803%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e1ce6ed8307545b9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53802-cwe-416-use-after-free-in-microsoft-029bfbc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53802%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c071e1ce6ed8307545b9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53801-cwe-822-untrusted-pointer-dereferen-a08e6578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53801%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e1ce6ed8307545b9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53800-cwe-1419-incorrect-initialization-o-9d9c3a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53800%3A%20CWE-1419%3A%20Incorrect%20Initialization%20of%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c071e1ce6ed8307545b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53799-cwe-908-use-of-uninitialized-resour-b66eafee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53799%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=medium&amp;id=68c071e0ce6ed8307545b98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53796-cwe-126-buffer-over-read-in-microso-5f285a18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53796%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e0ce6ed8307545b985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47997-cwe-362-concurrent-execution-using--fd80b6c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47997%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=medium&amp;id=68c071e0ce6ed8307545b97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49692-cwe-284-improper-access-control-in--9a161827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49692%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68c071e0ce6ed8307545b97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55317-cwe-59-improper-link-resolution-bef-6b877592</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55317%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=68c071e5ce6ed8307545bae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55316-cwe-73-external-control-of-file-nam-d5e43680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55316%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=68c071e5ce6ed8307545bae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55243-cwe-200-exposure-of-sensitive-infor-adf09744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55243%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20OfficePLUS&amp;severity=high&amp;id=68c071e4ce6ed8307545bac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55245-cwe-59-improper-link-resolution-bef-2090f37b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55245%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=high&amp;id=68c071e5ce6ed8307545bade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55236-cwe-367-time-of-check-time-of-use-t-2d1aa7d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55236%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e4ce6ed8307545bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55232-cwe-502-deserialization-of-untruste-75a28431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55232%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20HPC%20Pack%202019&amp;severity=critical&amp;id=68c071e4ce6ed8307545babc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55228-cwe-362-concurrent-execution-using--81aeb638</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55228%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c071e4ce6ed8307545bab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55226-cwe-362-concurrent-execution-using--e300de27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55226%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e4ce6ed8307545bab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55225-cwe-125-out-of-bounds-read-in-micro-f471c1d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55225%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e4ce6ed8307545bab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55223-cwe-362-concurrent-execution-using--9ae8c7f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55223%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e4ce6ed8307545baaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54919-cwe-362-concurrent-execution-using--135a40cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54919%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c071e3ce6ed8307545ba91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54918-cwe-287-improper-authentication-in--809cdb90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54918%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54916-cwe-121-stack-based-buffer-overflow-1693850e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54916%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54913-cwe-362-concurrent-execution-using--566c5709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54913%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54908-cwe-416-use-after-free-in-microsoft-4b17d339</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54908%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54907-cwe-122-heap-based-buffer-overflow--9106d495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54907%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54906-cwe-416-use-after-free-in-microsoft-6be22266</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54906%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54905-cwe-822-untrusted-pointer-dereferen-e9ad562c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54905%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54904-cwe-416-use-after-free-in-microsoft-54fd3698</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54904%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54903-cwe-416-use-after-free-in-microsoft-c14d0b3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54903%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54902-cwe-125-out-of-bounds-read-in-micro-296f1355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54902%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54899-cwe-590-free-of-memory-not-on-the-h-2fcc5a71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54899%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54898-cwe-125-out-of-bounds-read-in-micro-9cc01fff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54898%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54897-cwe-502-deserialization-of-untruste-0c977396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54897%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68c071e3ce6ed8307545ba54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54896-cwe-416-use-after-free-in-microsoft-8e4fa7d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54896%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c071e3ce6ed8307545ba51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54895-cwe-190-integer-overflow-or-wraparo-00e1fd31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54895%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54894-cwe-122-heap-based-buffer-overflow--31ecd3e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54894%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e3ce6ed8307545ba4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54111-cwe-416-use-after-free-in-microsoft-823cf597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54111%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545ba26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54110-cwe-190-integer-overflow-or-wraparo-1d700f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54110%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545ba23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54106-cwe-190-integer-overflow-or-wraparo-52f304e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54106%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68c071e2ce6ed8307545ba1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54102-cwe-416-use-after-free-in-microsoft-21c148d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54102%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c071e2ce6ed8307545b9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54101-cwe-416-use-after-free-in-microsoft-e7b15a44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54099-cwe-121-stack-based-buffer-overflow-31ff7b7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54099%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c071e2ce6ed8307545b9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54097-cwe-125-out-of-bounds-read-in-micro-82c88c9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54097%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54096-cwe-125-out-of-bounds-read-in-micro-fe0715ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54096%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54095-cwe-125-out-of-bounds-read-in-micro-9a9d2e6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54095%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e2ce6ed8307545b9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53798-cwe-126-buffer-over-read-in-microso-9deb32f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53798%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e0ce6ed8307545b98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53797-cwe-126-buffer-over-read-in-microso-d830da69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53797%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=68c071e0ce6ed8307545b988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49734-cwe-923-improper-restriction-of-com-af28cf2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49734%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=68c071e0ce6ed8307545b982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54261-improper-limitation-of-a-pathname-t-cdaa0c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54261%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=68c0983c9ed239a66bacc113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54250-improper-input-validation-cwe-20-in-967985cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54250%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54247-improper-input-validation-cwe-20-in-a165fd7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54247%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54246-incorrect-authorization-cwe-863-in--154f13ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54246%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54248-improper-input-validation-cwe-20-in-3a5f56b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54248%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=68c05926ffcb452a184a8bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54251-xml-injection-aka-blind-xpath-injec-e2b41122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54251%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20(CWE-91)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54252-cross-site-scripting-stored-xss-cwe-557e77ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54252%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54249-server-side-request-forgery-ssrf-cw-e2475c4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54249%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68c05926ffcb452a184a8bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58975-cwe-352-cross-site-request-forgery--97af74b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58975%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=null&amp;id=68c05927ffcb452a184a8c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58976-cwe-862-missing-authorization-in-eq-11bb82c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58976%3A%20Missing%20Authorization%20in%20Equalize%20Digital%20Accessibility%20Checker%20by%20Equalize%20Digital&amp;severity=null&amp;id=68c05927ffcb452a184a8c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58977-cwe-918-server-side-request-forgery-f736548f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58977%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Rhys%20Wynne%20WP%20eBay%20Product%20Feeds&amp;severity=null&amp;id=68c05927ffcb452a184a8c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58978-cwe-862-missing-authorization-in-wp-1cf6fa74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58978%3A%20Missing%20Authorization%20in%20WP%20Swings%20PDF%20Generator%20for%20WordPress&amp;severity=null&amp;id=68c05927ffcb452a184a8c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58980-cwe-862-missing-authorization-in-re-1117e67a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58980%3A%20Missing%20Authorization%20in%20recorp%20Export%20WP%20Page%20to%20Static%20HTML%2FCSS&amp;severity=null&amp;id=68c05927ffcb452a184a8c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58981-cwe-862-missing-authorization-in-eq-93c881c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58981%3A%20Missing%20Authorization%20in%20Equalize%20Digital%20Accessibility%20Checker%20by%20Equalize%20Digital&amp;severity=null&amp;id=68c05927ffcb452a184a8c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58982-cwe-79-improper-neutralization-of-i-43cc0a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixeline%20Pixeline%26%23039%3Bs%20Email%20Protector&amp;severity=null&amp;id=68c05927ffcb452a184a8c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58983-cwe-79-improper-neutralization-of-i-a0f1e2d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stefano%20Lissa%20Include%20Me&amp;severity=null&amp;id=68c05927ffcb452a184a8c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58984-cwe-79-improper-neutralization-of-i-7748811a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=68c05927ffcb452a184a8c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58985-cwe-79-improper-neutralization-of-i-1f55e9ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58985%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Additional%20Custom%20Product%20Tabs%20for%20WooCommerce&amp;severity=null&amp;id=68c05927ffcb452a184a8c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58987-cwe-79-improper-neutralization-of-i-158b5b27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AntoineH%20Football%20Pool&amp;severity=null&amp;id=68c05927ffcb452a184a8c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58988-cwe-79-improper-neutralization-of-i-a7d94fa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=null&amp;id=68c05927ffcb452a184a8c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58989-cwe-79-improper-neutralization-of-i-2eeee953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silverplugins217%20Dynamic%20Text%20Field%20For%20Contact%20Form%207&amp;severity=null&amp;id=68c05927ffcb452a184a8c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58991-cwe-352-cross-site-request-forgery--35509bdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58991%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cristiano%20Zanca%20WooCommerce%20Booking%20Bundle%20Hours&amp;severity=high&amp;id=68c05927ffcb452a184a8c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58990-cwe-79-improper-neutralization-of-i-d281224c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58990%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20ShopLentor&amp;severity=null&amp;id=68c05927ffcb452a184a8c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58993-cwe-89-improper-neutralization-of-s-d438f51e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58993%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themeum%20Tutor%20LMS&amp;severity=null&amp;id=68c05927ffcb452a184a8c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58997-cwe-352-cross-site-request-forgery--276be5a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58997%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Frenify%20Mow&amp;severity=null&amp;id=68c05927ffcb452a184a8c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5500-improper-export-of-android-applicati-cfcf19c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5500%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20ZhenShi%20Mibro%20Fit%20App&amp;severity=medium&amp;id=68c05928ffcb452a184a8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5005-server-side-request-forgery-in-shang-50942c2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5005%3A%20Server-Side%20Request%20Forgery%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=68c05927ffcb452a184a8c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53303-cwe-502-deserialization-of-untruste-d3ca4573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53303%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeMove%20ThemeMove%20Core&amp;severity=null&amp;id=68c076b69256f7c60d152f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58215-cwe-98-improper-control-of-filename-391e1320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58215%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Ziston&amp;severity=null&amp;id=68c076b69256f7c60d152f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48101-cwe-502-deserialization-of-untruste-01993864</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48101%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdevstudios%20Constant%20Contact%20for%20WordPress&amp;severity=high&amp;id=68c076b69256f7c60d152f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49430-cwe-918-server-side-request-forgery-4ab99005</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49430%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FWDesign%20Ultimate%20Video%20Player&amp;severity=null&amp;id=68c076b69256f7c60d152f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gayfemboy-malware-campaign-64314d42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gayfemboy%20malware%20campaign&amp;severity=medium&amp;id=68c0558403c143c029d0f9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30875-cwe-79-improper-neutralization-of-i-36d84229</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alexandre%20Froger%20WP%20Weixin&amp;severity=null&amp;id=68c076b59256f7c60d152ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53291-cwe-862-missing-authorization-in-sp-f3aa170d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53291%3A%20Missing%20Authorization%20in%20spoddev2021%20Spreadconnect&amp;severity=null&amp;id=68c076b69256f7c60d152f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53340-cwe-862-missing-authorization-in-aw-016fb51a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53340%3A%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support&amp;severity=null&amp;id=68c076b69256f7c60d152f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53348-cwe-862-missing-authorization-in-la-7fa4abb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53348%3A%20Missing%20Authorization%20in%20Laborator%20Kalium&amp;severity=null&amp;id=68c076b69256f7c60d152f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54709-cwe-98-improper-control-of-filename-634be253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54709%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Sala&amp;severity=high&amp;id=68c076b69256f7c60d152f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32486-cwe-640-weak-password-recovery-mech-406f66bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32486%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=68c076b59256f7c60d152eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32689-cwe-1284-improper-validation-of-spe-19944913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32689%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Convers%20Lab%20WP%20SmartPay&amp;severity=null&amp;id=68c076b59256f7c60d152ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32688-cwe-862-missing-authorization-in-so-25e3a26c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32688%3A%20Missing%20Authorization%20in%20Nebojsa%20Target%20Video%20Easy%20Publish&amp;severity=null&amp;id=68c076b59256f7c60d152eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39541-cwe-862-missing-authorization-in-ro-e93022d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39541%3A%20Missing%20Authorization%20in%20Roland%20Murg%20WP%20Simple%20Booking%20Calendar&amp;severity=null&amp;id=68c076b59256f7c60d152ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39553-cwe-862-missing-authorization-in-an-1bfd6f33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39553%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=68c076b59256f7c60d152ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47437-cwe-918-server-side-request-forgery-e68cb61b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47437%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=68c076b59256f7c60d152efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47569-cwe-89-improper-neutralization-of-s-1449b12b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47569%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPSwings%20WooCommerce%20Ultimate%20Gift%20Card&amp;severity=null&amp;id=68c076b69256f7c60d152f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47570-cwe-79-improper-neutralization-of-i-b9512dd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20villatheme%20WooCommerce%20Photo%20Reviews&amp;severity=null&amp;id=68c076b69256f7c60d152f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47571-cwe-98-improper-control-of-filename-1fda9fb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47571%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=68c076b69256f7c60d152f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47579-cwe-502-deserialization-of-untruste-2a6aa236</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47579%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Photography&amp;severity=null&amp;id=68c076b69256f7c60d152f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47694-cwe-79-improper-neutralization-of-i-39f9f8c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47694%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=null&amp;id=68c076b69256f7c60d152f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47695-cwe-98-improper-control-of-filename-2cc9ab73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47695%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=null&amp;id=68c076b69256f7c60d152f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59005-cwe-862-missing-authorization-in-fr-d04d55ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59005%3A%20Missing%20Authorization%20in%20frenify%20Categorify&amp;severity=null&amp;id=68c076b69256f7c60d152f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59008-cwe-89-improper-neutralization-of-s-eb3e5c8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59008%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PressTigers%20ZIP%20Code%20Based%20Content%20Protection&amp;severity=null&amp;id=68c076b69256f7c60d152f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55144-cwe-862-missing-authorization-in-iv-a22fb06e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55144%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c04ef982742f13ef72ee75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55143-cwe-79-improper-neutralization-of-i-891512b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c04ef982742f13ef72ee72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55142-cwe-862-missing-authorization-in-iv-e665da6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55142%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04d9dbfc619fb092d2a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-salty2fa-phishing-kit-bypasses-mfa-and-clones--fe29f735</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Salty2FA%20Phishing%20Kit%20Bypasses%20MFA%20and%20Clones%20Login%20Pages&amp;severity=medium&amp;id=68c04ceea0bbf91eaf6af807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55141-cwe-862-missing-authorization-in-iv-b7acd44e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55141%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04d9dbfc619fb092d2a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55139-cwe-918-server-side-request-forgery-7d5b882f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55139%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c04c3b35778de20ebc6d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55148-cwe-862-missing-authorization-in-iv-02d072e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55148%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04a24f67a6277124b5fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55147-cwe-352-cross-site-request-forgery--e5905c79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55147%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=68c04a24f67a6277124b5f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55146-cwe-252-unchecked-return-value-in-i-e1df2b70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55146%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c0481fbd4e3b9088076674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55145-cwe-862-missing-authorization-in-iv-a964e0c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55145%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure%2022.7R2.9&amp;severity=high&amp;id=68c0481fbd4e3b9088076671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8711-cwe-352-cross-site-request-forgery-c-11a14454</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8711%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=68c0481fbd4e3b9088076677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8712-cwe-862-missing-authorization-in-iva-d567f140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8712%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Connect%20Secure%20before&amp;severity=medium&amp;id=68c0456a12a58f153632f07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9872-cwe-434-unrestricted-upload-of-file--44c79c35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9872%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68c0456a12a58f153632f085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9712-cwe-434-unrestricted-upload-of-file--a1b19543</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9712%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=68c0456a12a58f153632f082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10183-cwe-611-improper-restriction-of-xml-c43e6780</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10183%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20TecCom%20TecConnect&amp;severity=critical&amp;id=68c03f51fc6c09154073f357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10107-command-injection-in-trendnet-tew-8-6605d6f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10107%3A%20Command%20Injection%20in%20TRENDnet%20TEW-831DR&amp;severity=medium&amp;id=68c03beba5ec036039d1620f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43776-cwe-209-generation-of-error-message-d4e7616f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43776%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c039e58fbcd3351612442f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33045-cwe-123-write-what-where-condition--27eee157</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33045%3A%20CWE-123%3A%20Write-what-where%20Condition%20in%20AMI%20AptioV&amp;severity=high&amp;id=68c035030957a02cccbe8c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47416-cwe-697-incorrect-comparison-in-cre-363f0b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47416%3A%20CWE-697%20Incorrect%20Comparison%20in%20CRESTRON%20TOUCHSCREEN%20x70&amp;severity=medium&amp;id=68c032e6d1b33bcea25a9a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53609-information-disclosure-in-fortinet--767c8de3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53609%3A%20Information%20disclosure%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=68c03160878aabb0db6d7334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54236-improper-input-validation-cwe-20-in-869e3424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54236%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=critical&amp;id=68c02cbf9b1730b210897d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9994-cwe-306-missing-authentication-for-c-5dc7b462</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9994%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Amped%20RF%20BT-AP%20111&amp;severity=critical&amp;id=68c028f00b756cdd83640e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9161-cwe-77-improper-neutralization-of-sp-c036d16a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9161%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Rockwell%20Automation%20FactoryTalk%20Optix&amp;severity=high&amp;id=68c02524b7075cbbdbb1944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7350-cwe-74-improper-neutralization-of-sp-405c054f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7350%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Rockwell%20Automation%20Stratix%20IOS&amp;severity=high&amp;id=68c02524b7075cbbdbb19441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9065-cwe-610-externally-controlled-refere-d669189c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9065%3A%20CWE-610%3A%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20Rockwell%20Automation%20ThinManager&amp;severity=high&amp;id=68c02524b7075cbbdbb19447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7970-cwe-306-missing-authentication-for-c-557ae506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7970%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20FactoryTalk%20Activation%20Manager&amp;severity=high&amp;id=68c02524b7075cbbdbb19444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9364-cwe-497-exposure-of-sensitive-system-abff2cc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9364%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Analytics%E2%84%A2%20LogixAI%C2%AE&amp;severity=high&amp;id=68c02524b7075cbbdbb1944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9166-cwe-476-null-pointer-dereference-in--ffba8343</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9166%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Rockwell%20Automation%20ControlLogix%C2%AE%205580&amp;severity=high&amp;id=68c02092b132c07409a3e3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9160-cwe-306-missing-authentication-for-c-42677158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9160%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%20CompactLogix%C2%AE%205480&amp;severity=high&amp;id=68c02092b132c07409a3e3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8007-cwe-20-improper-input-validation-in--5387ed21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8007%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%201756-ENT2R%2C%201756-EN4TR%2C%201756-EN4TRXT&amp;severity=high&amp;id=68c02091b132c07409a3e3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8008-cwe-755-improper-handling-of-excepti-d25531e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8008%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Rockwell%20Automation%201756-ENT2R%2C%201756-EN4TR%2C%201756-EN4TRXT&amp;severity=high&amp;id=68c02092b132c07409a3e3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-docker-malware-strain-spotted-blocking-rivals--86ee01e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Docker%20Malware%20Strain%20Spotted%20Blocking%20Rivals%20on%20Exposed%20APIs&amp;severity=medium&amp;id=68c019b4bd6c3d06a0ca0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8277-missing-release-of-memory-after-effe-78d40c87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8277%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=low&amp;id=68c016a78380a768a8363979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-gentlemen-ransomware-tactics-techniq-4d04acc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20The%20Gentlemen%20Ransomware%3A%20Tactics%2C%20Techniques%2C%20and%20Procedures%20Revealed&amp;severity=medium&amp;id=68c0a4a69ed239a66bad4d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tor-based-cryptojacking-attack-expands-through-mis-0864f0e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TOR-Based%20Cryptojacking%20Attack%20Expands%20Through%20Misconfigured%20Docker%20APIs&amp;severity=high&amp;id=68c00ff39953a027ace1f38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-mostererat-to-clickfix-new-malware-campaigns--3c38381d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20MostereRAT%20to%20ClickFix%3A%20New%20Malware%20Campaigns%20Highlight%20Rising%20AI%20and%20Phishing%20Risks&amp;severity=high&amp;id=68c00ff39953a027ace1f389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cryptanalysis-of-the-fiat-shamir-protocol-schn-e763f3e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Cryptanalysis%20of%20the%20Fiat-Shamir%20Protocol%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68c00ff39953a027ace1f391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10095-cwe-89-improper-neutralization-of-s-d36b202f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10095%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Proximus%20sp.%20z%20o.o.%20SMSEagle&amp;severity=medium&amp;id=68bffb5303190e417d89476d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surge-in-networks-scans-targeting-cisco-asa-device-bf47628f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Surge%20in%20networks%20scans%20targeting%20Cisco%20ASA%20devices%20raise%20concerns&amp;severity=high&amp;id=68bff4dd6e8a17a29f14aaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/45-previously-unreported-domains-expose-longstandi-ddbc783c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=45%20Previously%20Unreported%20Domains%20Expose%20Longstanding%20Salt%20Typhoon%20Cyber%20Espionage&amp;severity=high&amp;id=68bff4dd6e8a17a29f14aaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plex-tells-users-to-reset-passwords-after-new-data-e51341a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Plex%20tells%20users%20to%20reset%20passwords%20after%20new%20data%20breach&amp;severity=high&amp;id=68bff4dd6e8a17a29f14aa9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48208-cwe-90-improper-neutralization-of-s-b98fdcbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48208%3A%20CWE-90%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat%20(incubating)&amp;severity=high&amp;id=68bff5086e8a17a29f14d445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lunalock-ransomware-threatens-victims-by-feeding-s-2aee14af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LunaLock%20Ransomware%20threatens%20victims%20by%20feeding%20stolen%20data%20to%20AI%20models&amp;severity=medium&amp;id=68bff40f1df5ae06be9cb417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24404-cwe-91-xml-injection-aka-blind-xpat-e8c9d0e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24404%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20HertzBeat%20(incubating)&amp;severity=high&amp;id=68bff5086e8a17a29f14d442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59019-cwe-200-exposure-of-sensitive-infor-73bcfd8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59019%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59018-cwe-200-exposure-of-sensitive-infor-20c988c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59018%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20TYPO3%20CMS&amp;severity=high&amp;id=68bfedc5a77866b25848a256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59017-cwe-862-missing-authorization-in-ty-2cdf5ad6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59017%3A%20CWE-862%20Missing%20Authorization%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59016-cwe-209-generation-of-error-message-70def09c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59016%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59015-cwe-331-insufficient-entropy-in-typ-48e56872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59015%3A%20CWE-331%20Insufficient%20Entropy%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59014-cwe-248-in-typo3-typo3-cms-a0472bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59014%3A%20CWE-248%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59013-cwe-601-url-redirection-to-untruste-6f7b7883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59013%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20TYPO3%20TYPO3%20CMS&amp;severity=medium&amp;id=68bfedc5a77866b25848a247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41701-cwe-502-deserialization-of-untruste-91ad4755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41701%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Beckhoff%20TE1000%20%7C%20TwinCAT%203%20Enineering&amp;severity=high&amp;id=68bfedc4a77866b25848a244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40804-cwe-732-incorrect-permission-assign-2347ba0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40804%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SIMATIC%20Virtualization%20as%20a%20Service%20(SIVaaS)&amp;severity=critical&amp;id=68bfec1952647a71632fbdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40803-cwe-200-exposure-of-sensitive-infor-4408e54e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40803%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=low&amp;id=68bfec1952647a71632fbdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40802-cwe-400-uncontrolled-resource-consu-65ce596d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40802%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=low&amp;id=68bfec1952647a71632fbdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40798-cwe-125-out-of-bounds-read-in-sieme-b37b950b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40798%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68bfec1952647a71632fbda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40797-cwe-125-out-of-bounds-read-in-sieme-398ba8da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40797%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68bfec1952647a71632fbda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40796-cwe-125-out-of-bounds-read-in-sieme-df066da7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40796%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68bfec1952647a71632fbda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40795-cwe-121-stack-based-buffer-overflow-ab2cc7f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40795%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=critical&amp;id=68bfec1952647a71632fbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40757-cwe-200-exposure-of-sensitive-infor-6bb12fd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40757%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20APOGEE%20PXC%20Series%20(BACnet)&amp;severity=medium&amp;id=68bfec1952647a71632fbd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40594-cwe-269-improper-privilege-manageme-47791970</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40594%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Siemens%20SINAMICS%20G220%20V6.4&amp;severity=medium&amp;id=68bfec1952647a71632fbd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10134-cwe-73-external-control-of-file-nam-e601e47a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10134%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Bearsthemes%20Goza%20-%20Nonprofit%20Charity%20WordPress%20Theme&amp;severity=critical&amp;id=68c080a332300b81c82d9679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9539-cwe-94-improper-control-of-generatio-f0d02e03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9539%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=high&amp;id=68bfcdd7fab242a8024d3084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9542-cwe-862-missing-authorization-in-rub-9b13c01f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9542%3A%20CWE-862%20Missing%20Authorization%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=medium&amp;id=68bfcdd7fab242a8024d3088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9111-cwe-79-cross-site-scripting-xss-in-a-7be68c89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9111%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AI%20ChatBot%20for%20WordPress&amp;severity=low&amp;id=68c082c41d20e9585176cdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8889-cwe-434-unrestricted-upload-of-file--0e157d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8889%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Compress%20%26%20Upload&amp;severity=low&amp;id=68c082c41d20e9585176cde9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9058-cwe-79-improper-neutralization-of-in-c334da01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mikado%20Themes%20Mikado%20Core&amp;severity=medium&amp;id=68c080a332300b81c82d967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9061-cwe-79-improper-neutralization-of-in-cf4e5811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mikado%20Themes%20Wilmer%20Core&amp;severity=medium&amp;id=68c080a332300b81c82d9681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mostererat-deployed-anydesktightvnc-for-covert-ful-d7023b22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MostereRAT%20Deployed%20AnyDesk%2FTightVNC%20for%20Covert%20Full%20Access&amp;severity=medium&amp;id=68c0122ff3699d7bbcf17071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9489-cwe-94-improper-control-of-generatio-ee2d6108</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9489%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=68c02cbf9b1730b210897da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43777-cwe-209-generation-of-error-message-81e56a9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43777%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68c02cbf9b1730b210897da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10123-command-injection-in-d-link-dir-823-6cf6721b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10123%3A%20Command%20Injection%20in%20D-Link%20DIR-823X&amp;severity=medium&amp;id=68bf9505d5a2966cfc85b35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10122-sql-injection-in-maccms10-141fb2de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10122%3A%20SQL%20Injection%20in%20Maccms10&amp;severity=medium&amp;id=68bf9505d5a2966cfc85b355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42958-cwe-250-execution-with-unnecessary--4d5f8bef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42958%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SAP_SE%20SAP%20NetWeaver&amp;severity=critical&amp;id=68bf8dfad5a2966cfc85818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42944-cwe-502-deserialization-of-untruste-3083bc7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42944%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20Netweaver%20(RMI-P4)&amp;severity=critical&amp;id=68bf8dfad5a2966cfc85817c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42938-cwe-79-improper-neutralization-of-i-28eeea0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Platform&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42933-cwe-522-insufficiently-protected-cr-33035dad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42933%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=high&amp;id=68bf8dfad5a2966cfc858174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42930-cwe-606-unchecked-input-for-loop-co-e632aeaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42930%3A%20CWE-606%3A%20Unchecked%20Input%20for%20Loop%20Condition%20in%20SAP_SE%20SAP%20Business%20Planning%20and%20Consolidation&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42929-cwe-1287-improper-validation-of-spe-2d1d0b8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42929%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20Replication%20Server&amp;severity=high&amp;id=68bf8dfad5a2966cfc85816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42927-cwe-1395-dependency-on-vulnerable-t-71256a97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42927%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20Java%20(Adobe%20Document%20Service)&amp;severity=low&amp;id=68bf8dfad5a2966cfc858168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42926-cwe-306-missing-authentication-for--8dd5b749</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42926%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42925-cwe-341-predictable-from-observable-0aeb4f77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42925%3A%20CWE-341%3A%20Predictable%20from%20Observable%20State%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20Java%20(IIOP%20Service)&amp;severity=medium&amp;id=68bf8dfad5a2966cfc858160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42923-cwe-352-cross-site-request-forgery--20908a07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42923%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SAP_SE%20SAP%20Fiori%20App%20(F4044%20Manage%20Work%20Center%20Groups)&amp;severity=medium&amp;id=68bf8dfad5a2966cfc85815c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42922-cwe-94-improper-control-of-generati-a894626c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42922%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20Java%20(Deploy%20Web%20Service)&amp;severity=critical&amp;id=68bf8dfad5a2966cfc858158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42920-cwe-79-improper-neutralization-of-i-29fb96ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42920%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85814a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42918-cwe-862-missing-authorization-in-sa-7979ce06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42918%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP%20(Background%20Processing)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc858146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42917-cwe-862-missing-authorization-in-sa-bd2f35b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42917%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(Approve%20Timesheets%20Fiori%202.0%20application)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc858142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42916-cwe-1287-improper-validation-of-spe-dd6088d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42916%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20or%20On-Premise)&amp;severity=high&amp;id=68bf8df9d5a2966cfc85813e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42915-cwe-862-missing-authorization-in-sa-1afb144d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42915%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20Fiori%20app%20(Manage%20Payment%20Blocks)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85813a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42914-cwe-862-missing-authorization-in-sa-b767ff3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42914%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(My%20Timesheet%20Fiori%202.0%20application)&amp;severity=low&amp;id=68bf8df9d5a2966cfc858136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42913-cwe-862-missing-authorization-in-sa-5de1a587</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42913%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(My%20Timesheet%20Fiori%202.0%20application)&amp;severity=low&amp;id=68bf8df9d5a2966cfc858132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42912-cwe-862-missing-authorization-in-sa-9819b7ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42912%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20HCM%20(My%20Timesheet%20Fiori%202.0%20application)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85812e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42911-cwe-862-missing-authorization-in-sa-42f76d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42911%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20(Service%20Data%20Download)&amp;severity=medium&amp;id=68bf8df9d5a2966cfc85812a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10121-sql-injection-in-uverif-3c8c530d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10121%3A%20SQL%20Injection%20in%20uverif&amp;severity=medium&amp;id=68bf8df9d5a2966cfc858124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10120-buffer-overflow-in-tenda-ac20-9c0b34cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10120%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68bf8703d5a2966cfc8533c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10118-sql-injection-in-itsourcecode-e-log-f148ca6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10118%3A%20SQL%20Injection%20in%20itsourcecode%20E-Logbook%20with%20Health%20Monitoring%20System%20for%20COVID-19&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43778-cwe-79-improper-neutralization-of-i-725661a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43778%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10117-cross-site-scripting-in-sourcecodes-2a40debd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10117%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Simple%20To-Do%20List%20System&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10116-unrestricted-upload-in-siemprecms-abdff28e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10116%3A%20Unrestricted%20Upload%20in%20SiempreCMS&amp;severity=medium&amp;id=68bf8703d5a2966cfc8533af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10115-sql-injection-in-siemprecms-72fd0c4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10115%3A%20SQL%20Injection%20in%20SiempreCMS&amp;severity=medium&amp;id=68bf78efd5a2966cfc84c986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10114-sql-injection-in-phpgurukul-small-c-301569d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10114%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68bf78efd5a2966cfc84c97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43774-cwe-79-cross-site-scripting-in-life-df7e09af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43774&amp;severity=null&amp;id=68bf78efd5a2966cfc84c98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10113-sql-injection-in-itsourcecode-stude-8a383724</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10113%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bf71d9d5a2966cfc847710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-09-785dae66</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-09&amp;severity=medium&amp;id=68c0c43d9ed239a66bae146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57059-na-34626d89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57059%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57058-na-394cecea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57058%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57057-na-b30da141</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57057%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57070-na-78b1d666</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57070%3A%20n%2Fa&amp;severity=high&amp;id=68c0983d9ed239a66bacc120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57665-na-6c5b4a67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57665%3A%20n%2Fa&amp;severity=medium&amp;id=68c0983c9ed239a66bacc10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57086-na-413375dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57086%3A%20n%2Fa&amp;severity=high&amp;id=68c0983c9ed239a66bacc109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44594-na-591fa0a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44594%3A%20n%2Fa&amp;severity=critical&amp;id=68c0983c9ed239a66bacc0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57633-na-cf214bbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57633%3A%20n%2Fa&amp;severity=critical&amp;id=68c0925da5dafa93e8bc09ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44595-na-35cb5868</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44595%3A%20n%2Fa&amp;severity=medium&amp;id=68c08ee596774cc5680167b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44593-na-ec5bc82d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44593%3A%20n%2Fa&amp;severity=medium&amp;id=68c08cadbf8644e23a9d221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57060-na-c9b70f59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57060%3A%20n%2Fa&amp;severity=high&amp;id=68c0782035242cb3d0f995b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29089-na-6f0784d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29089%3A%20n%2Fa&amp;severity=high&amp;id=68c0749c2bd84bebdc41b96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57278-na-7d23e6d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57278%3A%20n%2Fa&amp;severity=high&amp;id=68c071e0ce6ed8307545b978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57085-na-984c8811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57085%3A%20n%2Fa&amp;severity=critical&amp;id=68c06b1099c168b213afaf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57078-na-e05e5dc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57078%3A%20n%2Fa&amp;severity=high&amp;id=68c064ee22bccc7413ab98b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57087-na-c8f20c2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57087%3A%20n%2Fa&amp;severity=high&amp;id=68c060cd5eede281431406ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57072-na-a317f53f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57072%3A%20n%2Fa&amp;severity=high&amp;id=68c05ca9440e1c113d243f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57071-na-892a02a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57071%3A%20n%2Fa&amp;severity=high&amp;id=68c05ca9440e1c113d243f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57069-na-a63a22a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57069%3A%20n%2Fa&amp;severity=high&amp;id=68c05b484a9b2b5a7a8d3831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57063-na-03691336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57063%3A%20n%2Fa&amp;severity=high&amp;id=68c05b484a9b2b5a7a8d382e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57062-na-7064e3cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57062%3A%20n%2Fa&amp;severity=high&amp;id=68c05b484a9b2b5a7a8d382b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57540-na-f494c9f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57540%3A%20n%2Fa&amp;severity=medium&amp;id=68c05927ffcb452a184a8c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57539-na-6a02e9f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57539%3A%20n%2Fa&amp;severity=medium&amp;id=68c05927ffcb452a184a8c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57538-na-53849207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57538%3A%20n%2Fa&amp;severity=medium&amp;id=68c05926ffcb452a184a8c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57064-na-f1a766d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57064%3A%20n%2Fa&amp;severity=high&amp;id=68c05926ffcb452a184a8c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57061-na-9bb97288</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57061%3A%20n%2Fa&amp;severity=high&amp;id=68c05926ffcb452a184a8bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52915-na-027dd015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52915%3A%20n%2Fa&amp;severity=high&amp;id=68c0481fbd4e3b908807666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52322-na-bc21a910</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52322%3A%20n%2Fa&amp;severity=high&amp;id=68c0456a12a58f153632f07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52277-na-7a164792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52277%3A%20n%2Fa&amp;severity=medium&amp;id=68c03df74c19e63d3813a4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58757-cwe-502-deserialization-of-untruste-525dc9a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58757%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Project-MONAI%20MONAI&amp;severity=high&amp;id=68bf6ad1d5a2966cfc84363e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58756-cwe-502-deserialization-of-untruste-3f164411</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58756%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Project-MONAI%20MONAI&amp;severity=high&amp;id=68bf6ad1d5a2966cfc84363b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58755-cwe-22-improper-limitation-of-a-pat-e64972ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58755%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Project-MONAI%20MONAI&amp;severity=high&amp;id=68bf6ad1d5a2966cfc843648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10112-sql-injection-in-itsourcecode-stude-1cf7fbb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10112%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bf6ad1d5a2966cfc843641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43763-cwe-918-server-side-request-forgery-bed5d26f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43763%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68bf674cd5a2966cfc841563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10111-sql-injection-in-itsourcecode-stude-bf2a92a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10111%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bf63c7d5a2966cfc83ff15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurring-the-lines-intrusion-shows-connection-with-425bee25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurring%20the%20Lines%3A%20Intrusion%20Shows%20Connection%20With%20Three%20Major%20Ransomware%20Gangs&amp;severity=medium&amp;id=68c012ef6cae0adff416b7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58752-cwe-23-relative-path-traversal-in-v-301da041</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58752%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20vitejs%20vite&amp;severity=low&amp;id=68bf63c7d5a2966cfc83ff1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58751-cwe-22-improper-limitation-of-a-pat-207aa986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58751%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=low&amp;id=68bf6046d5a2966cfc83ed7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58746-cwe-79-improper-neutralization-of-i-dba724fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58746%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VolkovLabs%20business-links&amp;severity=critical&amp;id=68bf5ce1d5a2966cfc83ddad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58745-cwe-94-improper-control-of-generati-c421f401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58745%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68bf5ce1d5a2966cfc83ddaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58454-cwe-89-improper-neutralization-of-s-85cbe6bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58454%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68bf5ce1d5a2966cfc83ddbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10110-sql-injection-in-chancms-714c8419</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10110%3A%20SQL%20Injection%20in%20ChanCMS&amp;severity=medium&amp;id=68bf5ce1d5a2966cfc83ddb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10109-sql-injection-in-campcodes-online-l-41719c89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10109%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68bf5ce1d5a2966cfc83ddb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58453-cwe-89-improper-neutralization-of-s-6f16abd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58453%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68bf5946d5a2966cfc83c8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58452-cwe-79-improper-neutralization-of-i-25f62cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58452%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=68bf5946d5a2966cfc83c8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1761-cwe-824-improper-clearing-of-heap-me-eabed374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1761%3A%20CWE-824%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68bf5946d5a2966cfc83c8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58451-cwe-1333-inefficient-regular-expres-9324b97c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58451%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20IEatUranium238%20Cattown&amp;severity=high&amp;id=68bf5946d5a2966cfc83c902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10108-sql-injection-in-campcodes-online-l-91cd01db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10108%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68bf5946d5a2966cfc83c8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blurring-the-lines-intrusion-shows-connection-with-e67af522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blurring%20the%20Lines%3A%20Intrusion%20Shows%20Connection%20With%20Three%20Major%20Ransomware%20Gangs&amp;severity=medium&amp;id=68c0a4a69ed239a66bad4d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10106-sql-injection-in-yanyutao0402-chanc-2c8a1882</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10106%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68bf4eb7d5a2966cfc837d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58449-cwe-646-reliance-on-file-name-or-ex-49c7cb71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58449%3A%20CWE-646%3A%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20MahoCommerce%20maho&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58444-cwe-84-improper-neutralization-of-e-93ebcf86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58444%3A%20CWE-84%3A%20Improper%20Neutralization%20of%20Encoded%20URI%20Schemes%20in%20a%20Web%20Page%20in%20modelcontextprotocol%20inspector&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58365-cwe-95-improper-neutralization-of-d-92462a3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58365%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki-contrib%20application-blog&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57817-cwe-862-missing-authorization-in-et-2f24bd18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57817%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ethyca%20fides&amp;severity=high&amp;id=68bf4b2cd5a2966cfc836cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57816-cwe-799-improper-control-of-interac-68d37252</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57816%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20ethyca%20fides&amp;severity=medium&amp;id=68bf4b2cd5a2966cfc836cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57766-cwe-613-insufficient-session-expira-8b33e59c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57766%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20ethyca%20fides&amp;severity=low&amp;id=68bf4b2cd5a2966cfc836ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57815-cwe-307-improper-restriction-of-exc-1974f8bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57815%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20ethyca%20fides&amp;severity=low&amp;id=68bf4b2cd5a2966cfc836cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10105-sql-injection-in-yanyutao0402-chanc-c350bf66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10105%3A%20SQL%20Injection%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68bf40d9d5a2966cfc832c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10104-sql-injection-in-code-projects-onli-008e79af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10104%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68bf399cd5a2966cfc830bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54994-cwe-78-improper-neutralization-of-s-16346b12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54994%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20akoskm%20create-mcp-server-stdio&amp;severity=critical&amp;id=68bf3299d5a2966cfc82d270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53838-cwe-79-improper-neutralization-of-i-758ddbb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53838%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kovah%20LinkAce&amp;severity=high&amp;id=68bf2f30d5a2966cfc82a4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10103-sql-injection-in-code-projects-onli-bec5c705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10103%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68bf2ba8d5a2966cfc82975e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gpugate-malware-uses-google-ads-and-fake-github-co-3a61e8c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GPUGate%20Malware%20Uses%20Google%20Ads%20and%20Fake%20GitHub%20Commits%20to%20Target%20IT%20Firms&amp;severity=high&amp;id=68bf2807d5a2966cfc827766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-account-compromise-led-to-salesloft-drift-b-483602f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Account%20Compromise%20Led%20to%20Salesloft%20Drift%20Breach%20Affecting%2022%20Companies&amp;severity=high&amp;id=68bf2807d5a2966cfc827762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovesac-confirms-data-breach-after-ransomware-atta-bdf56c60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovesac%20confirms%20data%20breach%20after%20ransomware%20attack%20claims&amp;severity=high&amp;id=68bf2807d5a2966cfc82775e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/department-of-war-doesnt-defend-its-web-streams-fr-3272f9fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Department%20of%20War%20Doesn%E2%80%99t%20Defend%20its%20Web%20Streams%20From%20Hackers&amp;severity=medium&amp;id=68bf2841d5a2966cfc827925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43722-cwe-269-improper-privilege-manageme-7ff8543e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43722%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=68bf283dd5a2966cfc82790d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10102-sql-injection-in-code-projects-onli-ced2e281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10102%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68bf2487d5a2966cfc8267e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9114-cwe-639-authorization-bypass-through-10302110</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9114%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dreamstechnologies%20Doccure&amp;severity=critical&amp;id=68bf2103d5a2966cfc824db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9113-cwe-434-unrestricted-upload-of-file--bac3ef41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9113%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dreamstechnologies%20Doccure&amp;severity=critical&amp;id=68bf2103d5a2966cfc824dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9112-cwe-434-unrestricted-upload-of-file--ebd03dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9112%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dreamstechnologies%20Doccure&amp;severity=high&amp;id=68bf2103d5a2966cfc824da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10100-sql-injection-in-sourcecodester-sim-b1558ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10100%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Forum%20Discussion%20System&amp;severity=medium&amp;id=68bf1d80d5a2966cfc822472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10099-cross-site-scripting-in-portabilis--cd689204</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10099%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68bf1696d5a2966cfc81ef0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-debug-and-chalk-packages-compromised-a221f37a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20Debug%20and%20Chalk%20Packages%20Compromised&amp;severity=medium&amp;id=68bf169ad5a2966cfc81ef33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10098-sql-injection-in-phpgurukul-user-ma-3840dd7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10098%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68bf0f70d5a2966cfc81c06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-reveal-2-billion-weekly-downloads-comp-ef4fcd86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20reveal%202%20billion%20weekly%20downloads%20compromised%20in%20largest%20npm%20supply%20chain%20attack%20ever&amp;severity=medium&amp;id=68bf0884d5a2966cfc81938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10097-code-injection-in-simstudioai-sim-e02e165f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10097%3A%20Code%20Injection%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68bf0899d5a2966cfc8193ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-in-sitecore-exploited-to-deploy-weepsteel-d7b44702</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-Day%20in%20Sitecore%20Exploited%20to%20Deploy%20WEEPSTEEL%20Malware&amp;severity=critical&amp;id=68befdf1d5a2966cfc80e152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10096-server-side-request-forgery-in-sims-93c2c1a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10096%3A%20Server-Side%20Request%20Forgery%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68befa57d5a2966cfc80bd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadian-investment-platform-wealthsimple-disclose-3d5175d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canadian%20investment%20platform%20Wealthsimple%20disclosed%20a%20data%20breach&amp;severity=high&amp;id=68bef6d2d5a2966cfc80a079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/significant-risk-and-proactive-defense-9ea2de31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Significant%20Risk%20and%20Proactive%20Defense&amp;severity=medium&amp;id=68bef6ded5a2966cfc80a0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40930-cwe-122-heap-based-buffer-overflow--8b6af171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40930%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20PJUHASZ%20JSON%3A%3ASIMD&amp;severity=high&amp;id=68bef375d5a2966cfc808f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40929-cwe-122-heap-based-buffer-overflow--5c0d8e16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40929%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RURBAN%20Cpanel%3A%3AJSON%3A%3AXS&amp;severity=medium&amp;id=68bef375d5a2966cfc808f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40928-cwe-122-heap-based-buffer-overflow--38efe635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40928%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20MLEHMANN%20JSON%3A%3AXS&amp;severity=high&amp;id=68bef375d5a2966cfc808efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7709-cwe-190-integer-overflow-or-wraparou-4c2c4faf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7709%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20SQLite%20FTS5&amp;severity=medium&amp;id=68beefe5d5a2966cfc8062cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-targeted-with-rust-backdoor-and-python-loa-d35d673d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Targeted%20with%20Rust%20Backdoor%20and%20Python%20Loader&amp;severity=medium&amp;id=68bef6ded5a2966cfc80a0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venezuelas-president-maduro-said-his-huawei-mate-x-c083a4a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venezuela%E2%80%99s%20President%20Maduro%20said%20his%20Huawei%20Mate%20X6%20cannot%20be%20hacked%20by%20US%20cyber%20spies&amp;severity=medium&amp;id=68bee536d5a2966cfc802888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/you-didnt-get-phished-you-onboarded-the-attacker-080ce654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=You%20Didn%E2%80%99t%20Get%20Phished%20%E2%80%94%20You%20Onboarded%20the%20Attacker&amp;severity=high&amp;id=68bee536d5a2966cfc802884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mostererat-targets-windows-uses-anydesk-and-tightv-bb1e7abc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MostereRAT%20Targets%20Windows%2C%20Uses%20AnyDesk%20and%20TightVNC%20for%20Full%20Access&amp;severity=medium&amp;id=68bee536d5a2966cfc80288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36855-cwe-126-buffer-over-read-in-microso-1f991f8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36855%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=68bee1dfd5a2966cfc8014fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36854-cwe-416-use-after-free-in-microsoft-54a3531b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36854%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=68bee1dfd5a2966cfc801501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36853-cwe-190-integer-overflow-or-wraparo-ecb4cb1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36853%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=68bee1dfd5a2966cfc801505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-defenders-vulnerability-break-the-protecti-28d6d5b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20Defender&apos;s%20vulnerability%3A%20Break%20The%20Protective%20Shell%20Of%20Windows%20Defender%20With%20The%20Folder%20Redirect%20Technique&amp;severity=medium&amp;id=68bee1e3d5a2966cfc80151e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3212-cwe-416-use-after-free-in-arm-ltd-bi-7d32b617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3212%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=68bed3a1d5a2966cfc7f959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10093-information-disclosure-in-d-link-di-064339b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10093%3A%20Information%20Disclosure%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68bec91ed5a2966cfc7f4acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10092-xml-external-entity-reference-in-ji-8186259e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10092%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68bec20dd5a2966cfc7f292d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40642-cwe-79-improper-neutralization-of-i-7cec29cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WebWork%20WebWork%20PHP%20script&amp;severity=medium&amp;id=68bebe89d5a2966cfc7efccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8th-september-threat-intelligence-report-cd1e907c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8th%20September%20%E2%80%93%20Threat%20Intelligence%20Report&amp;severity=medium&amp;id=68e46d3b6a45552f36e94e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10091-xml-external-entity-reference-in-ji-6c88428a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10091%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68bebb05d5a2966cfc7edfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-deploys-malware-with-clickfix-scam-i-df063093</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Deploys%20Malware%20With%20ClickFix%20Scam%20in%20Fake%20Job%20Interviews&amp;severity=medium&amp;id=68beb077d5a2966cfc7e791c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5993-cwe-22-improper-limitation-of-a-path-c0605419</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5993%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ITCube%20Software%20ITCube%20CRM&amp;severity=critical&amp;id=68beb084d5a2966cfc7e7967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indicators-of-malicious-activity-and-recommendatio-a667181d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indicators%20of%20Malicious%20Activity%20and%20Recommendations%20for%20Impacted%20Organizations%20-%20Hunting%20pulse&amp;severity=medium&amp;id=68bebb19d5a2966cfc7ee07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-kimsuky-leak-how-the-kim-dump-exposed-n-6411c7fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20Kimsuky%20Leak%3A%20How%20the%20&apos;Kim&apos;%20Dump%20Exposed%20North%20Korea&apos;s%20Credential%20Theft%20Playbook&amp;severity=medium&amp;id=68bea98ad5a2966cfc7e55ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10090-sql-injection-in-jinher-oa-de418634</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10090%3A%20SQL%20Injection%20in%20Jinher%20OA&amp;severity=medium&amp;id=68bea5eed5a2966cfc7e3a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58782-cwe-502-deserialization-of-untruste-37c2f3e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58782%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Jackrabbit%20Core&amp;severity=medium&amp;id=68be9b63d5a2966cfc7df729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10088-cross-site-scripting-in-sourcecodes-3304fd48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10088%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Time%20Tracker&amp;severity=medium&amp;id=68be82c4d5a2966cfc7cc0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-actions-a-cloudy-day-for-security-part-1-27304a0b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Actions%3A%20A%20Cloudy%20Day%20for%20Security%20-%20Part%201&amp;severity=medium&amp;id=68be7bc0d5a2966cfc7c4f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41664-cwe-732-incorrect-permission-assign-1ef69b0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41664%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20WAGO%20Coupler%200750-0362&amp;severity=high&amp;id=68be7bbdd5a2966cfc7c4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41708-cwe-319-cleartext-transmission-of-s-31f8e1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41708%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Bender%20CC612&amp;severity=high&amp;id=68be7bbdd5a2966cfc7c4f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41682-cwe-522-insufficiently-protected-cr-ea31529c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41682%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Bender%20CC612&amp;severity=high&amp;id=68be7bbdd5a2966cfc7c4f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10087-sql-injection-in-sourcecodester-pet-56d13df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10087%3A%20SQL%20Injection%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68be7bbdd5a2966cfc7c4f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10086-improper-authorization-in-fuyanglip-3d8a98a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10086%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68be74bfd5a2966cfc7bda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8085-cwe-918-server-side-request-forgery--f2d7ca4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8085%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ditty&amp;severity=high&amp;id=68be7635d5a2966cfc7c3594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10085-unrestricted-upload-in-sourcecodest-b698a622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10085%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68be6b527c5dfe01cb12f135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10084-improper-authorization-in-elunez-el-59058421</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10084%3A%20Improper%20Authorization%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68be7635d5a2966cfc7c3597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58422-use-of-less-trusted-source-in-ricoh-56374cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58422%3A%20Use%20of%20less%20trusted%20source%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=low&amp;id=68be5f7f1de277c68dd71983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10083-unrestricted-upload-in-sourcecodest-6935344a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10083%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Grooming%20Management%20Software&amp;severity=medium&amp;id=68be7635d5a2966cfc7c359d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10082-sql-injection-in-sourcecodester-onl-e5997fac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10082%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be7635d5a2966cfc7c35a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10081-unrestricted-upload-in-sourcecodest-38217c1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10081%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Pet%20Management%20System&amp;severity=medium&amp;id=68be7635d5a2966cfc7c35ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10080-use-of-hard-coded-cryptographic-key-df0c629f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10080%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20running-elephant%20Datart&amp;severity=low&amp;id=68be4aede3f0bafba8ab80f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10079-sql-injection-in-phpgurukul-small-c-e5557c68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10079%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68be478fe3f0bafba8ab66f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10078-sql-injection-in-sourcecodester-onl-b090e85a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10078%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be4061e3f0bafba8ab4247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/killerpid-bof-04272595</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=killerPID-BOF&amp;severity=medium&amp;id=68be395ee3f0bafba8ab0ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10077-sql-injection-in-sourcecodester-onl-c17d9e17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10077%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be35f6e3f0bafba8aaf712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10076-sql-injection-in-sourcecodester-onl-7527cab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10076%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be2edfe3f0bafba8aac59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10075-cross-site-scripting-in-sourcecodes-2e386028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10075%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Polling%20System&amp;severity=medium&amp;id=68be280ae3f0bafba8aaad7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10074-cross-site-scripting-in-portabilis--5e892b84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10074%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be20e2e3f0bafba8aa6107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-08-1d8cc355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-08&amp;severity=medium&amp;id=68bf71ccd5a2966cfc846d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52288-na-3bac85a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52288%3A%20n%2Fa&amp;severity=high&amp;id=68bf40d9d5a2966cfc832c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52389-na-93ba6163</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52389%3A%20n%2Fa&amp;severity=high&amp;id=68bf3299d5a2966cfc82d26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55849-na-35108eee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55849%3A%20n%2Fa&amp;severity=high&amp;id=68bf2ba8d5a2966cfc829765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57285-na-2402a00a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57285%3A%20n%2Fa&amp;severity=critical&amp;id=68bf1696d5a2966cfc81ef0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56265-na-614735e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56265%3A%20n%2Fa&amp;severity=high&amp;id=68bf12f3d5a2966cfc81cf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56267-na-91f13213</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56267%3A%20n%2Fa&amp;severity=critical&amp;id=68bf0f70d5a2966cfc81c067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56266-na-2fc02ae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56266%3A%20n%2Fa&amp;severity=critical&amp;id=68bf0f70d5a2966cfc81c062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51586-na-19364e04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51586%3A%20n%2Fa&amp;severity=low&amp;id=68bf0899d5a2966cfc8193e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59033-na-98503abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59033%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20Microsoft%20Windows&amp;severity=high&amp;id=68bef375d5a2966cfc808f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55998-na-d6cf6eef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55998%3A%20n%2Fa&amp;severity=high&amp;id=68bef375d5a2966cfc808f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52161-na-eb9d12e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52161%3A%20n%2Fa&amp;severity=critical&amp;id=68bef375d5a2966cfc808f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57141-na-76ddca4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57141%3A%20n%2Fa&amp;severity=critical&amp;id=68beefe5d5a2966cfc8062ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56630-na-98c841d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56630%3A%20n%2Fa&amp;severity=high&amp;id=68bee8bed5a2966cfc803b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22956-na-f7db6ab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22956%3A%20n%2Fa&amp;severity=critical&amp;id=68bedaaad5a2966cfc7fda08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10073-improper-authorization-in-portabili-44fb2e8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10073%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be172b54d6dcfcfc897088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10072-improper-access-controls-in-portabi-ea814715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10072%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be110862f0ad016f7a9926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10071-improper-access-controls-in-portabi-a74c1f25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10071%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be09643478f9b54cf75609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10070-improper-access-controls-in-portabi-e35058d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10070%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68be1ecce3f0bafba8aa56ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesloft-drift-breach-traced-to-github-compromise-9684276c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesloft%20Drift%20Breach%20Traced%20to%20GitHub%20Compromise%20and%20Stolen%20OAuth%20Tokens&amp;severity=high&amp;id=68bdfdc702802e212efa5f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/czech-cyber-agency-warns-against-chinese-tech-in-c-a62ca12d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Czech%20cyber%20agency%20warns%20against%20Chinese%20tech%20in%20critical%20infrastructure&amp;severity=critical&amp;id=68bdf2f6d5aebbdbb953912b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/icloud-calendar-abused-to-send-phishing-emails-fro-3b9161b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=iCloud%20Calendar%20abused%20to%20send%20phishing%20emails%20from%20Apple%E2%80%99s%20servers&amp;severity=high&amp;id=68bdf2f6d5aebbdbb953912f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48042-cwe-863-incorrect-authorization-in--46372275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48042%3A%20CWE-863%20Incorrect%20Authorization%20in%20ash-project%20ash&amp;severity=high&amp;id=68bdac908c2d57aff41b42e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-salesloft-drift-breach-analyzing-the-biggest-s-a3ba525e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Salesloft-Drift%20Breach%3A%20Analyzing%20the%20Biggest%20SaaS%20Breach%20of%202025&amp;severity=high&amp;id=68bd31e1d15306d12f1024c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10068-sql-injection-in-itsourcecode-onlin-60d985e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10068%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68bd0b76b8f12c255cd10bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10067-cross-site-scripting-in-itsourcecod-eeb903d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10067%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bce42ba2c363fb1608c21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10066-cross-site-scripting-in-itsourcecod-4cb3743a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10066%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bcdd23a2c363fb16087c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36100-cwe-260-password-in-configuration-f-a4137e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36100%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20MQ&amp;severity=medium&amp;id=68bcd61ca2c363fb160852b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10065-cross-site-scripting-in-itsourcecod-f48c4600</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10065%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bcd61ca2c363fb160852ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10064-cross-site-scripting-in-itsourcecod-cae5534e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10064%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bcd61ca2c363fb160852a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-07-f7e5d5b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-07&amp;severity=medium&amp;id=68be20b5e3f0bafba8aa5d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10063-cross-site-scripting-in-itsourcecod-03ffff25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10063%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bccd0da2c363fb16078f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10062-sql-injection-in-itsourcecode-stude-b71d613b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10062%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68bccd0da2c363fb16078f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-cuts-executive-bonuses-by-15-after-a-july-d-c92e804f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20cuts%20executive%20bonuses%20by%2015%25%20after%20a%20July%20data%20breach&amp;severity=high&amp;id=68bc99e4a9171a64ba116615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/noisy-bear-targets-kazakhstan-energy-sector-with-b-9c943430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Noisy%20Bear%20Targets%20Kazakhstan%20Energy%20Sector%20With%20BarrelFire%20Phishing%20Campaign&amp;severity=high&amp;id=68bc99e4a9171a64ba116611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58445-cwe-200-exposure-of-sensitive-infor-0b7512ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58445%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20runatlantis%20atlantis&amp;severity=medium&amp;id=68bccd0da2c363fb16078f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58446-cwe-770-allocation-of-resources-wit-5a9e280e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58446%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mlc-ai%20xgrammar&amp;severity=medium&amp;id=68bc88c5337c3bba5b6942cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58438-cwe-22-improper-limitation-of-a-pat-712f9ed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58438%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jjjake%20internetarchive&amp;severity=critical&amp;id=68bc81f54a2de11313a12439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0034-cwe-787-out-of-bounds-write-in-amd-a-37121af9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0034%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Instinct%E2%84%A2%20MI300X&amp;severity=medium&amp;id=68bc809c209f30cfade91150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0032-cwe-459-incomplete-cleanup-in-amd-am-16c27609</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0032%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20EPYC%E2%84%A2%209005%20Series%20Processors&amp;severity=high&amp;id=68bc809c209f30cfade9114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0011-cwe-212-improper-removal-of-sensitiv-bf12cf04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0011%3A%20CWE-212%20%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20AMD%20AMD%20Ryzen%E2%84%A2%208000%20Series%20Desktop%20Processors&amp;severity=low&amp;id=68bccd0da2c363fb16078f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0010-cwe-787-out-of-bounds-write-in-amd-a-dfde9192</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0010%3A%20CWE-787%20%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Radeon%E2%84%A2%20RX%205000%20Series%20Graphics%20Products&amp;severity=medium&amp;id=68bccd0da2c363fb16078f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0009-cwe-476-null-pointer-dereference-in--90052fce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0009%3A%20CWE-476%20%20NULL%20Pointer%20Dereference%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207035%20Series%20Processor%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=68bc7b3026d967d8af3d147b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36354-cwe-1231-improper-prevention-of-loc-ed9dacaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36354%3A%20CWE-1231%20-%20Improper%20Prevention%20of%20Lock%20Bit%20Modification%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Processors&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36342-cwe-1285-improper-validation-of-spe-408c45c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36342%3A%20CWE-1285%20%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36331-cwe-665-improper-initialization-in--43773d4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36331%3A%20CWE-665%20%20Improper%20Initialization%20in%20AMD%20AMD%20EPYC%E2%84%A2%209004%20Series%20Processors&amp;severity=low&amp;id=6908ed741c2a0078ae510258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36326-cwe-862-missing-authorization-in-am-21645195</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36326%3A%20CWE-862%20%20Missing%20Authorization%20in%20AMD%20AMD%20Ryzen%E2%84%A2%207040%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21947-cwe-1220-insufficient-granularity-o-e0b86b64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21947%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20Threadripper%E2%84%A2%203000%20Processors&amp;severity=high&amp;id=69a0a1ca85912abc71d0bb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10034-buffer-overflow-in-d-link-dir-825-6b5651eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10034%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=68bccd0da2c363fb16078f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10033-sql-injection-in-itsourcecode-onlin-93b3e0fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10033%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Discussion%20Forum&amp;severity=medium&amp;id=68bc31d479caee59e39cc4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10032-cross-site-scripting-in-campcodes-g-a3232e95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10032%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68bc2cc6c834eb2dd9dc2bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostaction-attack-steals-3325-secrets-from-github-da2c4935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostAction%20Attack%20Steals%203%2C325%20Secrets%20from%20GitHub%20Projects&amp;severity=medium&amp;id=68bc2711dbd6aed9c4c57d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10031-sql-injection-in-campcodes-grocery--f62c5dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10031%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68bc25970bc49059264df568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-impersonate-flashbots-steal-5046dad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Packages%20Impersonate%20Flashbots%2C%20Steal%20Ethereum%20Wallet%20Keys&amp;severity=high&amp;id=68bc1fee5d3760275ec99882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meetc2-a-serverless-c2-framework-that-leverages-go-e5be6e12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MeetC2%20-%20A%20serverless%20C2%20framework%20that%20leverages%20Google%20Calendar%20APIs%20as%20a%20communication%20channel&amp;severity=medium&amp;id=68bc1fee5d3760275ec99886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasked-salat-stealer-a-deep-dive-into-its-advanc-50d19d5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasked%3A%20Salat%20Stealer%20%E2%80%93%20A%20Deep%20Dive%20into%20Its%20Advanced%20Persistence%20Mechanisms%20and%20C2%20Infrastructure&amp;severity=medium&amp;id=68bea268d5a2966cfc7e1c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10030-sql-injection-in-campcodes-grocery--0ad407a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10030%3A%20SQL%20Injection%20in%20Campcodes%20Grocery%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68bc0ed648e44a64aad8ca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10029-cross-site-scripting-in-itsourcecod-3e01d6e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10029%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bccd0da2c363fb16078fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-persistence-with-non-existent-executable--0156565c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20Persistence%20With%20Non-Existent%20Executable%20File&amp;severity=medium&amp;id=68bbdc4624da5655b4ce4614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9961-cwe-120-buffer-copy-without-checking-dc3818c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9961%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20Inc.%20AX10%20V1%2FV1.2%2FV2%2FV2.6%2FV3%2FV3.6&amp;severity=high&amp;id=68bccd0da2c363fb16078fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10046-cwe-89-improper-neutralization-of-s-da78ba33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10046%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elextensions%20ELEX%20WooCommerce%20Google%20Shopping%20(Google%20Product%20Feed)&amp;severity=medium&amp;id=68bccd0da2c363fb16078fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10028-cross-site-scripting-in-itsourcecod-0d45d62d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10028%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bbd65064d039b901d9c018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6757-cwe-79-improper-neutralization-of-in-a15dd904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themejunkie%20Recent%20Posts%20Widget%20Extended&amp;severity=medium&amp;id=68bccd0da2c363fb16078fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8149-cwe-79-improper-neutralization-of-in-73f446bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8564-cwe-79-improper-neutralization-of-in-789c2b32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7045-cwe-306-missing-authentication-for-c-18d8f8ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7045%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20cloudinfrastructureservices%20Cloud%20SAML%20SSO%20%E2%80%93%20Single%20Sign%20On%20Login&amp;severity=medium&amp;id=68bbabc7844ddfa4289c969e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9493-cwe-79-improper-neutralization-of-in-f21768d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20whiteshadow%20Admin%20Menu%20Editor&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7040-cwe-862-missing-authorization-in-clo-8aeb400c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7040%3A%20CWE-862%20Missing%20Authorization%20in%20cloudinfrastructureservices%20Cloud%20SAML%20SSO%20%E2%80%93%20Single%20Sign%20On%20Login&amp;severity=high&amp;id=68bbabc7844ddfa4289c9695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9442-cwe-79-improper-neutralization-of-in-a67da526</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9126-cwe-79-improper-neutralization-of-in-029f9bda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designful%20Smart%20Table%20Builder&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8722-cwe-79-improper-neutralization-of-in-7cca3d60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pt-guy%20Content%20Views%20%E2%80%93%20Post%20Grid%20%26%20Filter%2C%20Recent%20Posts%2C%20Category%20Posts%20%E2%80%A6%20(Shortcode%2C%20Blocks%2C%20and%20Elementor%20Widgets)&amp;severity=medium&amp;id=68bbabc7844ddfa4289c96b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10003-cwe-89-improper-neutralization-of-s-383cb14f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10003%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=68bb9c18535f4a97731dab4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9853-cwe-79-improper-neutralization-of-in-6bea57ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optio%20Optio%20Dentistry&amp;severity=medium&amp;id=68bb9c18535f4a97731dab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8359-cwe-288-authentication-bypass-using--d768ba99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8359%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=68bb9c18535f4a97731dab59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9085-cwe-89-improper-neutralization-of-sp-c3a2e1ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9085%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%20Builder%2C%20Custom%20Login%20Form%2C%20User%20Profile%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=68bb9c18535f4a97731dab62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9515-cwe-434-unrestricted-upload-of-file--c57ba8c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9515%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mondula2016%20Multi%20Step%20Form&amp;severity=high&amp;id=68bb9c18535f4a97731dab68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8360-cwe-79-improper-neutralization-of-in-58b6f45c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8360%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=68bb9c18535f4a97731dab5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58374-cwe-78-improper-neutralization-of-s-3e1a128a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58374%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68bb9c18535f4a97731dab54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6067-cwe-79-improper-neutralization-of-in-9361c8e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sjaved%20Easy%20Social%20Feed%20%E2%80%93%20Social%20Photos%20Gallery%20%E2%80%93%20Post%20Feed%20%E2%80%93%20Like%20Box&amp;severity=medium&amp;id=68bb9510535f4a97731d3e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9849-cwe-79-improper-neutralization-of-in-901590fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimuzzamanalim%20Html%20Social%20share%20buttons&amp;severity=medium&amp;id=68bb9510535f4a97731d3e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7368-cwe-200-exposure-of-sensitive-inform-794e5641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7368%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sizam%20REHub%20-%20Price%20Comparison%2C%20Multi%20Vendor%20Marketplace%20Wordpress%20Theme&amp;severity=medium&amp;id=68bb9510535f4a97731d3e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7366-cwe-94-improper-control-of-generatio-c820d939</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7366%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sizam%20REHub%20-%20Price%20Comparison%2C%20Multi%20Vendor%20Marketplace%20Wordpress%20Theme&amp;severity=high&amp;id=68bb9510535f4a97731d3e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58439-cwe-89-improper-neutralization-of-s-70e4d664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58439%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20frappe%20erpnext&amp;severity=high&amp;id=68bb8705535f4a97731c0bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-06-92945e19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-06&amp;severity=medium&amp;id=68bccf08a2c363fb1607a2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58373-cwe-59-improper-link-resolution-bef-953c23b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58373%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=medium&amp;id=68bb6e64535f4a97731a2e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58372-cwe-732-incorrect-permission-assign-125a295c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58372%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68bb6ae1535f4a977319deac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58371-cwe-78-improper-neutralization-of-s-77ec5e0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58371%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=critical&amp;id=68bb6ae1535f4a977319deb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58370-cwe-78-improper-neutralization-of-s-291f0574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58370%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68bb63db535f4a977319b0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58369-cwe-400-uncontrolled-resource-consu-e49481aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58369%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20typelevel%20fs2&amp;severity=medium&amp;id=68bb6059535f4a9773160d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58367-cwe-915-improperly-controlled-modif-953e36fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58367%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20seperman%20deepdiff&amp;severity=critical&amp;id=68bb5cd1535f4a977310270f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10027-cross-site-scripting-in-itsourcecod-332b92cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10027%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bb594d535f4a97730f6c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58366-cwe-522-insufficiently-protected-cr-1d9ea576</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58366%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20InseeFrLab%20onyxia&amp;severity=critical&amp;id=68bb594d535f4a97730f6c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10061-cwe-20-improper-input-validation-in-05d2d251</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10061%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=68bb4ec2535f4a97730ec319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10060-cwe-672-operation-on-a-resource-aft-8fdd004c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10060%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=68bb4ec2535f4a97730ec31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53791-cwe-284-improper-access-control-in--276f9e29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53791%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68bb4b3f535f4a97730eac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10059-cwe-732-incorrect-permission-assign-ec55d40a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10059%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=68bb4b3f535f4a97730eac11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10043-external-control-of-file-name-or-pa-0362fccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10043&amp;severity=null&amp;id=68bb4436535f4a97730e5828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10026-cross-site-scripting-in-itsourcecod-5fca4b01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10026%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20POS%20Point%20of%20Sale%20System&amp;severity=medium&amp;id=68bb4436535f4a97730e5821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10044-improper-neutralization-of-input-du-87bcfaa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.0&amp;severity=medium&amp;id=68bb425f535f4a97730e492a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9566-improper-limitation-of-a-pathname-to-49552f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=68bb425f535f4a97730e492e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10025-sql-injection-in-phpgurukul-online--5c7a2e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10025%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68bb3e77e50436161e29a02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-ss7-whatsapp-metadata-surveillance-need-e-256afc1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20SS7%20%2B%20WhatsApp%20metadata%20surveillance%20%E2%80%93%20need%20expert%20input&amp;severity=high&amp;id=68bb40c1535f4a97730de680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-ghostaction-campaign-3325-secrets-stolen-throu-a12eec36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20GhostAction%20Campaign%3A%203%2C325%20Secrets%20Stolen%20Through%20Compromised%20GitHub%20Workflows&amp;severity=medium&amp;id=68bb3163110bdeeeb703939e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9057-cwe-79-improper-neutralization-of-in-f290f4d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mikado%20Themes%20Biagiotti%20Core&amp;severity=medium&amp;id=68bb2b532275ef7b1c0861fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tls-noverify-bypass-all-the-things-66837bec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TLS%20NoVerify%3A%20Bypass%20All%20The%20Things&amp;severity=medium&amp;id=68bb23f8ab09d55d5457b08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35452-cwe-798-use-of-hard-coded-credentia-a0a8a280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35452%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PTZOptics%20PT12X-SE-xx-G3&amp;severity=critical&amp;id=68bb347efe6d142709f02386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30198-cwe-321-use-of-hard-coded-cryptogra-7bed4957</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30198%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ECOVACS%20DEEBOT%20X1%20Series&amp;severity=medium&amp;id=68bb230f3933eaf832a4e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30199-cwe-494-download-of-code-without-in-b437bed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30199%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ECOVACS%20DEEBOT%20X1%20Series&amp;severity=high&amp;id=68bb230f3933eaf832a4e5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35451-cwe-798-use-of-hard-coded-credentia-f67e6195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35451%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PTZOptics%20PT12X-SE-xx-G3&amp;severity=critical&amp;id=68bb230f3933eaf832a4e5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30200-cwe-321-use-of-hard-coded-cryptogra-a5ed53da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30200%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ECOVACS%20DEEBOT%20X1%20Series&amp;severity=medium&amp;id=68bb230f3933eaf832a4e5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10014-improper-authorization-in-elunez-el-ea19845c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10014%3A%20Improper%20Authorization%20in%20elunez%20eladmin&amp;severity=low&amp;id=68bb1fe2f9abd9586d5a6455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-barrelfire-targeting-kazakhstan-oil-gas-c1edc54d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20BarrelFire%3A%20Targeting%20Kazakhstan%20Oil%20%26%20Gas&amp;severity=medium&amp;id=68bb3cf16ebe005c8df37a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9709-cwe-1191-on-chip-debug-and-test-inte-42ceec8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9709%3A%20CWE-1191%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Nordic%20Semiconductor%20nRF52810&amp;severity=high&amp;id=68bb1c09adefd13a08301999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tag-150-develops-castlerat-in-python-and-c-expandi-14ecea13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TAG-150%20Develops%20CastleRAT%20in%20Python%20and%20C%2C%20Expanding%20CastleLoader%20Malware%20Operations&amp;severity=high&amp;id=68bb1b429ba166050147e279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/max-severity-argo-cd-api-flaw-leaks-repository-cre-a460f874</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Max%20severity%20Argo%20CD%20API%20flaw%20leaks%20repository%20credentials&amp;severity=high&amp;id=68bb1a7a88cd7f061cebca2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/financial-services-firm-wealthsimple-discloses-dat-34404809</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Financial%20services%20firm%20Wealthsimple%20discloses%20data%20breach&amp;severity=high&amp;id=68bb1a7a88cd7f061cebca2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-orders-immediate-patch-of-critical-sitecore-v-6ff77cb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Orders%20Immediate%20Patch%20of%20Critical%20Sitecore%20Vulnerability%20Under%20Active%20Exploitation&amp;severity=critical&amp;id=68bb1a7988cd7f061cebca26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9999-cwe-940-improper-verification-of-sou-3f9ed9a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9999%3A%20CWE-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20arcinfo%20PcVue&amp;severity=high&amp;id=68bb1516b1fe325ba15996e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9998-cwe-754-improper-check-for-unusual-o-1588fb1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9998%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=68bb12d27b333e59cd824c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27003-cwe-352-cross-site-request-forgery--30b57ee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27003%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fullworks%20Quick%20Paypal%20Payments&amp;severity=null&amp;id=68bb10947b3099d93300d113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53571-cwe-862-missing-authorization-in-vi-b377cc85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53571%3A%20Missing%20Authorization%20in%20VillaTheme%20HAPPY&amp;severity=null&amp;id=68bb10947b3099d93300d116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58206-cwe-98-improper-control-of-filename-6a734288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58206%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MaxCoach&amp;severity=null&amp;id=68bb10947b3099d93300d119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58214-cwe-98-improper-control-of-filename-063af2a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58214%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Indutri&amp;severity=null&amp;id=68bb10947b3099d93300d11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58628-cwe-89-improper-neutralization-of-s-f5e59866</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58628%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Miraculous&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48102-cwe-79-improper-neutralization-of-i-d21e74da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gourl%20GoUrl%20Bitcoin%20Payment%20Gateway%20%26amp%3B%20Paid%20Downloads%20%26amp%3B%20Membership&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48103-cwe-79-improper-neutralization-of-i-edb970e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48103%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mulscully%20Today%26%23039%3Bs%20Date%20Inserter&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48104-cwe-352-cross-site-request-forgery--c05cd435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48104%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ericzane%20Floating%20Window%20Music%20Player&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48105-cwe-79-improper-neutralization-of-i-3ba4630b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48105%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Boiardt%20Easy%20Flash%20Embed&amp;severity=null&amp;id=68bb0d9de11b59d9ac04ed3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48317-cwe-35-path-traversal-in-stefan-kel-2a52e95b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48317%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Stefan%20Keller%20WooCommerce%20Payment%20Gateway%20for%20Saferpay&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49401-cwe-502-deserialization-of-untruste-5023bf93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49401%3A%20Incorrect%20Privilege%20Assignment%20in%20axiomthemes%20smart%20SEO&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53307-cwe-79-improper-neutralization-of-i-6c4be8a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beaver%20Builder%20WordPress%20Assistant&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54744-cwe-862-missing-authorization-in-st-b2d642dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54744%3A%20Missing%20Authorization%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57889-cwe-98-improper-control-of-filename-057f9804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20InPost%20Gallery&amp;severity=null&amp;id=68bb0d9ee11b59d9ac04ed58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32320-elevation-of-privilege-in-google-an-5c467bee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32320%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68bb0d9de11b59d9ac04ed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32318-elevation-of-privilege-in-google-an-eb52dbf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32318%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68bb0d9de11b59d9ac04ed30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32317-information-disclosure-in-google-an-d6e3e755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32317%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68bb0d9de11b59d9ac04ed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32316-information-disclosure-in-google-an-c7fed1b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32316%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68bb0d9de11b59d9ac04ed2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26461-information-disclosure-in-google-an-75c1df86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26461%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=68bb0d9de11b59d9ac04ed27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26434-information-disclosure-in-google-an-f8e2c00e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26434%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68bb0d9de11b59d9ac04ed24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/virustotal-finds-44-undetected-svg-files-used-to-d-e7b80ca3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VirusTotal%20Finds%2044%20Undetected%20SVG%20Files%20Used%20to%20Deploy%20Base64-Encoded%20Phishing%20Pages&amp;severity=high&amp;id=68bb0615663fcc7fa5fe7a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-files-used-in-hidden-malware-campaign-imperson-6d760903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20files%20used%20in%20hidden%20malware%20campaign%20impersonating%20Colombian%20authorities&amp;severity=medium&amp;id=68bb055679cfce4135ad74f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-sitecore-android-and-linux-flaws-to-i-44a4e879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Sitecore%2C%20Android%2C%20and%20Linux%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68bb055679cfce4135ad74fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10013-improper-access-controls-in-portabi-f7f4ff4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10013%3A%20Improper%20Access%20Controls%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68bb03d23c4e52c5877cbbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10012-sql-injection-in-portabilis-i-educa-c7dae4e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10012%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68baf67b04f80bd19b650cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10011-sql-injection-in-portabilis-i-educa-b80dd881</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10011%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68baf67b04f80bd19b650cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58887-cwe-79-improper-neutralization-of-i-ad513583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Course%20Finder%20%7C%20andr%C3%A9%20martin%20-%20it%20solutions%20%26amp%3B%20research%20UG%20Course%20Booking%20Platform&amp;severity=null&amp;id=68baeaa757c5b37b67a461ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58886-cwe-79-improper-neutralization-of-i-8df2925d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58886%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tan%20Nguyen%20Instant%20Locations&amp;severity=null&amp;id=68baeaa757c5b37b67a461e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58884-cwe-79-improper-neutralization-of-i-802c32c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ivan%20Drago%20vipdrv&amp;severity=null&amp;id=68baeaa757c5b37b67a461e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58883-cwe-79-improper-neutralization-of-i-95771f6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thomas%20Harris%20Search%20Cloud%20One&amp;severity=null&amp;id=68baeaa757c5b37b67a461e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58882-cwe-79-improper-neutralization-of-i-07b5ec90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20w1zzard%20Simple%20Text%20Slider&amp;severity=null&amp;id=68baeaa757c5b37b67a461de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58881-cwe-89-improper-neutralization-of-s-2907ce1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58881%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20New%20Simple%20Gallery&amp;severity=null&amp;id=68baeaa757c5b37b67a461db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58880-cwe-79-improper-neutralization-of-i-6ff3b131</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reubenthiessen%20Translate%20This%20gTranslate%20Shortcode&amp;severity=null&amp;id=68baeaa757c5b37b67a461d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58878-cwe-352-cross-site-request-forgery--20eae3d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58878%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20usamafarooq%20Woocommerce%20Gifts%20Product&amp;severity=null&amp;id=68baeaa757c5b37b67a461d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58876-cwe-79-improper-neutralization-of-i-c10d9689</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ali%20Aghdam%20Aparat%20Video%20Shortcode&amp;severity=null&amp;id=68baeaa757c5b37b67a461d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58875-cwe-79-improper-neutralization-of-i-fcadc276</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sudar%20Muthu%20WP%20Github%20Gist&amp;severity=null&amp;id=68baeaa757c5b37b67a461b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58874-cwe-79-improper-neutralization-of-i-4d87abef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20josepsitjar%20StoryMap&amp;severity=null&amp;id=68baeaa757c5b37b67a461b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58873-cwe-79-improper-neutralization-of-i-43e436d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pusheco%20Pushe%20Web%20Push%20Notification&amp;severity=null&amp;id=68baeaa757c5b37b67a461ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58872-cwe-201-insertion-of-sensitive-info-55dd89b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58872%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20premiumbizthemes%20Simple%20Price%20Calculator&amp;severity=null&amp;id=68baeaa757c5b37b67a461ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58871-cwe-79-improper-neutralization-of-i-29a003e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luis%20Rock%20Master%20Paper%20Collapse%20Toggle&amp;severity=null&amp;id=68baeaa757c5b37b67a461a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58870-cwe-79-improper-neutralization-of-i-7e3607b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DeBAAT%20WP-GraphViz&amp;severity=null&amp;id=68baeaa757c5b37b67a461a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58869-cwe-352-cross-site-request-forgery--6bd67e6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58869%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Simasicher%20SimaCookie&amp;severity=null&amp;id=68baeaa757c5b37b67a461a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58868-cwe-79-improper-neutralization-of-i-9c6c3924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simasicher%20SimaCookie&amp;severity=null&amp;id=68baeaa757c5b37b67a4619e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58867-cwe-79-improper-neutralization-of-i-307e094b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Remi%20Corson%20Easy%20Download%20Media%20Counter&amp;severity=null&amp;id=68baeaa757c5b37b67a4619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58866-cwe-497-exposure-of-sensitive-syste-e8a320e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58866%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Rami%20Yushuvaev%20Site%20Info&amp;severity=null&amp;id=68baeaa757c5b37b67a46197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58865-cwe-352-cross-site-request-forgery--2a08c2a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58865%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20reimund%20Compact%20Admin&amp;severity=null&amp;id=68baeaa657c5b37b67a46172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58864-cwe-79-improper-neutralization-of-i-eab834c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=68baeaa657c5b37b67a4616f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58863-cwe-79-improper-neutralization-of-i-76397cce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SdeWijs%20Zoomify%20embed%20for%20WP&amp;severity=null&amp;id=68baeaa657c5b37b67a4616c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58862-cwe-79-improper-neutralization-of-i-b51e437e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58862%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20George%20Sexton%20WordPress%20Events%20Calendar%20Plugin%20%E2%80%93%20connectDaily&amp;severity=null&amp;id=68baeaa657c5b37b67a46168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58861-cwe-352-cross-site-request-forgery--8d613f22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58861%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Corner%20Quick%20Event%20Calendar&amp;severity=null&amp;id=68baeaa657c5b37b67a46165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58860-cwe-352-cross-site-request-forgery--b5f2ed63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58860%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20KaizenCoders%20Enable%20Latex&amp;severity=null&amp;id=68baeaa657c5b37b67a46162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58859-cwe-352-cross-site-request-forgery--117f1460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58859%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Merinas%20Add%20to%20Feedly&amp;severity=null&amp;id=68baeaa657c5b37b67a4615f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58858-cwe-79-improper-neutralization-of-i-cffba5cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20WPB%20Image%20Widget&amp;severity=null&amp;id=68baeaa657c5b37b67a4615c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58857-cwe-79-improper-neutralization-of-i-821e5bab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KaizenCoders%20Table%20of%20content&amp;severity=null&amp;id=68baeaa657c5b37b67a46159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58856-cwe-352-cross-site-request-forgery--de5594f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ablancodev%20Woocommerce%20Notify%20Updated%20Product&amp;severity=null&amp;id=68baeaa657c5b37b67a46156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58855-cwe-1236-improper-neutralization-of-e765ce6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58855%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Denis%20V%20(Artprima)%20AP%20HoneyPot%20WordPress%20Plugin&amp;severity=null&amp;id=68baeaa557c5b37b67a46132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58854-cwe-352-cross-site-request-forgery--bb7586e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58854%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Samer%20Bechara%20Ultimate%20AJAX%20Login&amp;severity=null&amp;id=68baeaa557c5b37b67a4612f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58853-cwe-352-cross-site-request-forgery--30f50134</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58853%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Popping%20Sidebars%20and%20Widgets%20Light&amp;severity=null&amp;id=68baeaa557c5b37b67a4612b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58852-cwe-352-cross-site-request-forgery--293624a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58852%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mark%20O&apos;Donnell%20MSTW%20League%20Manager&amp;severity=null&amp;id=68baeaa557c5b37b67a46128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58851-cwe-79-improper-neutralization-of-i-dfc30c46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DigitalCourt%20Boxed%20Content&amp;severity=null&amp;id=68baeaa557c5b37b67a46125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58850-cwe-79-improper-neutralization-of-i-83e0379e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcshowpass%20Showpass%20WordPress%20Extension&amp;severity=null&amp;id=68baeaa557c5b37b67a46122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58849-cwe-352-cross-site-request-forgery--aa207e51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58849%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Deepak%20S%20Hide%20Real%20Download%20Path&amp;severity=null&amp;id=68baeaa557c5b37b67a4611f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58848-cwe-352-cross-site-request-forgery--1ebcdc3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58848%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aakash1911%20WP%20likes&amp;severity=null&amp;id=68baeaa557c5b37b67a4611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58847-cwe-352-cross-site-request-forgery--cf5f6999</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58847%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yaidier%20WN%20Flipbox%20Pro&amp;severity=null&amp;id=68baeaa557c5b37b67a46119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58846-cwe-352-cross-site-request-forgery--aff10071</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58846%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dejan%20Markovic%20WordPress%20Buffer%20%E2%80%93%20HYPESocial.%20Social%20Media%20Auto%20Post%2C%20Social%20Media%20Auto%20Publish%20and%20Schedule&amp;severity=null&amp;id=68baeaa557c5b37b67a46116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58845-cwe-352-cross-site-request-forgery--ce1554dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58845%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChrisHurst%20Bulk%20Watermark&amp;severity=null&amp;id=68baeaa457c5b37b67a460f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58844-cwe-352-cross-site-request-forgery--911464e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58844%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Subhash%20Kumar%20Database%20to%20Excel&amp;severity=null&amp;id=68baeaa457c5b37b67a460ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58843-cwe-352-cross-site-request-forgery--8a11b027</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58843%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Merinas%20Auto%20Last%20Youtube%20Video&amp;severity=null&amp;id=68baeaa457c5b37b67a460ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58842-cwe-79-improper-neutralization-of-i-60462675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20givecloud%20Donation%20Forms%20WP%20by%20Givecloud&amp;severity=null&amp;id=68baeaa457c5b37b67a460e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58841-cwe-266-incorrect-privilege-assignm-84697dde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58841%3A%20Incorrect%20Privilege%20Assignment%20in%20John%20Luetke%20Media%20Author&amp;severity=null&amp;id=68baeaa457c5b37b67a460e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58840-cwe-79-improper-neutralization-of-i-23a36fce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ibnul%20H.%20Custom%20Team%20Manager&amp;severity=null&amp;id=68baeaa457c5b37b67a460e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58839-cwe-502-deserialization-of-untruste-21d6445e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58839%3A%20Deserialization%20of%20Untrusted%20Data%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=null&amp;id=68baeaa457c5b37b67a460de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58838-cwe-79-improper-neutralization-of-i-813d49e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zakir%20Smooth%20Accordion&amp;severity=null&amp;id=68baeaa457c5b37b67a460db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58837-cwe-79-improper-neutralization-of-i-f49a375f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiful%20H%20SS%20Font%20Awesome%20Icon&amp;severity=null&amp;id=68baeaa457c5b37b67a460d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58836-cwe-79-improper-neutralization-of-i-2b9c3087</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Franz%20Wieser%20FW%20Anker&amp;severity=null&amp;id=68baeaa457c5b37b67a460d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58835-cwe-1284-improper-validation-of-spe-bdf4527e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58835%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20calliko%20Bonus%20for%20Woo&amp;severity=null&amp;id=68baeaa457c5b37b67a460b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58834-cwe-79-improper-neutralization-of-i-63a30c47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gugu%20short.io&amp;severity=null&amp;id=68baeaa457c5b37b67a460b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58833-cwe-352-cross-site-request-forgery--d6850e99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58833%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20INVELITY%20Invelity%20MyGLS%20connect&amp;severity=null&amp;id=68baeaa457c5b37b67a460b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58832-cwe-79-improper-neutralization-of-i-e89ab18d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58832%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Search%20by%20Google&amp;severity=null&amp;id=68baeaa457c5b37b67a460b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58831-cwe-352-cross-site-request-forgery--cbc2a6c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58831%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20snagysandor%20Parallax%20Scrolling%20Enllax.js&amp;severity=null&amp;id=68baeaa457c5b37b67a460ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58830-cwe-79-improper-neutralization-of-i-a2a5e6c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58830%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snagysandor%20Parallax%20Scrolling%20Enllax.js&amp;severity=null&amp;id=68baeaa457c5b37b67a460aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58829-cwe-918-server-side-request-forgery-907af9ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58829%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=null&amp;id=68baeaa457c5b37b67a460a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58828-cwe-79-improper-neutralization-of-i-99503afb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58828%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=68baeaa457c5b37b67a460a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58827-cwe-94-improper-control-of-generati-a2c7e72d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58827%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=68baeaa457c5b37b67a460a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58826-cwe-79-improper-neutralization-of-i-5a7566e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric%20Mann%20WP%20Publication%20Archive&amp;severity=null&amp;id=68baeaa457c5b37b67a4609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58825-cwe-79-improper-neutralization-of-i-b22b397b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Habibur%20Rahman%20Comment%20Form%20WP%20%26%238211%3B%20Customize%20Default%20Comment%20Form&amp;severity=null&amp;id=68baeaa357c5b37b67a4607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58824-cwe-862-missing-authorization-in-we-b76a05c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58824%3A%20Missing%20Authorization%20in%20priyanshumittal%20Shk%20Corporate&amp;severity=null&amp;id=68baeaa357c5b37b67a46078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58823-cwe-79-improper-neutralization-of-i-01b72159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20African%20Boss%20Get%20Cash&amp;severity=null&amp;id=68baeaa357c5b37b67a46075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58822-cwe-79-improper-neutralization-of-i-8ef73cdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58822%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20WP%20Mail&amp;severity=null&amp;id=68baeaa357c5b37b67a46072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58821-cwe-79-improper-neutralization-of-i-98e44def</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58821%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdever%20WP%20Notification%20Bell&amp;severity=null&amp;id=68baeaa357c5b37b67a4606f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58820-cwe-79-improper-neutralization-of-i-d55b5e4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58820%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Carousel%20Ultimate&amp;severity=null&amp;id=68baeaa357c5b37b67a4606c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58819-cwe-434-unrestricted-upload-of-file-86410e5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58819%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CreedAlly%20Bulk%20Featured%20Image&amp;severity=null&amp;id=68baeaa357c5b37b67a46069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58818-cwe-352-cross-site-request-forgery--cfc8c4d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58818%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SwiftNinjaPro%20Developer%20Tools%20Blocker&amp;severity=null&amp;id=68baeaa357c5b37b67a46066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58817-cwe-862-missing-authorization-in-de-0824fbc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58817%3A%20Missing%20Authorization%20in%20desertthemes%20SoftMe&amp;severity=null&amp;id=68baeaa357c5b37b67a46063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58816-cwe-862-missing-authorization-in-pl-679a33d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58816%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20Product%20Carousel%20Slider%20for%20Elementor&amp;severity=null&amp;id=68baeaa357c5b37b67a46060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58815-cwe-502-deserialization-of-untruste-c294b78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58815%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Rubel%20Miah%20Aitasi%20Coming%20Soon&amp;severity=null&amp;id=68baeaa257c5b37b67a46033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58814-cwe-79-improper-neutralization-of-i-86059197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58814%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ram%20Ratan%20Maurya%20Stagtools&amp;severity=null&amp;id=68baeaa257c5b37b67a46030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58813-cwe-862-missing-authorization-in-th-94ccf36f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58813%3A%20Missing%20Authorization%20in%20themearile%20Consultstreet&amp;severity=null&amp;id=68baeaa257c5b37b67a4602d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58812-cwe-79-improper-neutralization-of-i-01da5669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PriceListo%20Best%20Restaurant%20Menu%20by%20PriceListo&amp;severity=null&amp;id=68baeaa257c5b37b67a4602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58811-cwe-79-improper-neutralization-of-i-e41346f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20Ultimate%20Client%20Dash&amp;severity=null&amp;id=68baeaa257c5b37b67a46027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58810-cwe-79-improper-neutralization-of-i-2a094d29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58810%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jimmywb%20Simple%20Link%20List%20Widget&amp;severity=null&amp;id=68baeaa257c5b37b67a46024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58809-cwe-352-cross-site-request-forgery--7d41f643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58809%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nick%20Ciske%20To%20Lead%20For%20Salesforce&amp;severity=null&amp;id=68baeaa257c5b37b67a46021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58808-cwe-79-improper-neutralization-of-i-6a5acd57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Babar%20prettyPhoto&amp;severity=null&amp;id=68baeaa257c5b37b67a4601e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58807-cwe-352-cross-site-request-forgery--59b30a38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58807%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dsingh%20Purge%20Varnish%20Cache&amp;severity=null&amp;id=68baeaa257c5b37b67a4601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58806-cwe-352-cross-site-request-forgery--2258fd4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58806%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tom%20Longridge%20WordPress%20Error%20Monitoring%20by%20Bugsnag&amp;severity=null&amp;id=68baeaa257c5b37b67a46018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58805-cwe-79-improper-neutralization-of-i-2ed7a7bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58804-cwe-352-cross-site-request-forgery--0441e470</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58804%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brijrajs%20WooCommerce%20Single%20Page%20Checkout&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58802-cwe-352-cross-site-request-forgery--b99bc336</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58802%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20michalzagdan%20TrustMate.io%20%E2%80%93%20WooCommerce%20integration&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58801-cwe-352-cross-site-request-forgery--67325b45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58801%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20KCS%20Responder&amp;severity=null&amp;id=68baeaa257c5b37b67a45ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58800-cwe-352-cross-site-request-forgery--472a200a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58800%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Steve%20Truman%20WP%20Email%20Template&amp;severity=null&amp;id=68baeaa157c5b37b67a45fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58799-cwe-352-cross-site-request-forgery--ded506bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58799%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelocation%20Custom%20WooCommerce%20Checkout%20Fields%20Editor&amp;severity=null&amp;id=68baeaa157c5b37b67a45fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58798-cwe-352-cross-site-request-forgery--a5cee920</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58798%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bjorn%20Manintveld%20BCM%20Duplicate%20Menu&amp;severity=null&amp;id=68baeaa157c5b37b67a45fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58797-cwe-497-exposure-of-sensitive-syste-201512e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58797%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Mahmudul%20Hasan%20Arif%20Ninja%20Charts&amp;severity=null&amp;id=68baeaa157c5b37b67a45fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58796-cwe-79-improper-neutralization-of-i-bf9b378a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dudaster%20Elementor%20Element%20Condition&amp;severity=null&amp;id=68baeaa157c5b37b67a45fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58795-cwe-862-missing-authorization-in-pa-b4315df3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58795%3A%20CWE-862%20Missing%20Authorization%20in%20Payoneer%20Inc.%20Payoneer%20Checkout&amp;severity=medium&amp;id=68c7f891cb571854b09ee8bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58794-cwe-352-cross-site-request-forgery--0b017aa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58794%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rainafarai%20Notification%20for%20Telegram&amp;severity=null&amp;id=68baeaa157c5b37b67a45fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58793-cwe-79-improper-neutralization-of-i-42f77ff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58793%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBean%20WPB%20Elementor%20Addons&amp;severity=null&amp;id=68baeaa157c5b37b67a45fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58792-cwe-352-cross-site-request-forgery--acdaa2ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58792%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPKube%20Authors%20List&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58791-cwe-79-improper-neutralization-of-i-4013af41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58791%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arjan%20Olsder%20SEO%20Auto%20Linker&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58790-cwe-79-improper-neutralization-of-i-40fe13f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58790%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPKube%20Kiwi&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58789-cwe-89-improper-neutralization-of-s-58e62031</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58789%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themeisle%20WP%20Full%20Stripe%20Free&amp;severity=null&amp;id=68baeaa157c5b37b67a45fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58788-cwe-89-improper-neutralization-of-s-9857a207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58788%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20License%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68baeaa157c5b37b67a45fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58787-cwe-79-improper-neutralization-of-i-70a036ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Popup&amp;severity=null&amp;id=68baeaa157c5b37b67a45faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58786-cwe-79-improper-neutralization-of-i-7b5153a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VW%20THEMES%20Ibtana%20%E2%80%93%20Ecommerce%20Product%20Addons&amp;severity=null&amp;id=68baeaa157c5b37b67a45fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58785-cwe-862-missing-authorization-in-jb-8cb1a4cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58785%3A%20Missing%20Authorization%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=null&amp;id=68baeaa157c5b37b67a45fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58784-cwe-79-improper-neutralization-of-i-2b9877c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58784%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arisoft%20ARI%20Fancy%20Lightbox&amp;severity=null&amp;id=68baeaa157c5b37b67a45fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8695-cwe-79-improper-neutralization-of-in-69ea8ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Netcad%20NetGIS%20Server&amp;severity=medium&amp;id=68baeaa757c5b37b67a461ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intercepting-thick-client-tcp-and-tls-traffic-d6c6c1a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intercepting%20Thick%20Client%20TCP%20and%20TLS%20Traffic&amp;severity=medium&amp;id=68bae86b6e64aaa791c4cbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-exploit-grok-ai-with-video-ad-scam-to-pus-adbd8b74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Exploit%20Grok%20AI%20With%20Video%20Ad%20Scam%20to%20Push%20Malware%20on%20X&amp;severity=high&amp;id=68bad208a7e573575a7b2654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-botnet-emerges-from-the-shadows-nightshadec2-a5dd44c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Botnet%20Emerges%20from%20the%20Shadows%3A%20NightshadeC2&amp;severity=medium&amp;id=68baf67a04f80bd19b650c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chesscom-discloses-recent-data-breach-via-file-tra-1eddfc7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chess.com%20discloses%20recent%20data%20breach%20via%20file%20transfer%20app&amp;severity=high&amp;id=68baad096d016eb92d466a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frances-cnil-fined-google-379m-and-shein-175m-for--b3be80a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=France%E2%80%99s%20CNIL%20fined%20Google%20%24379M%20and%20Shein%20%24175M%20for%20breaching%20cookie%20rules&amp;severity=medium&amp;id=68baac4e0d09a87147b70cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58313-cwe-362-concurrent-execution-using--f089bf7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58313%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68ba9a023d5df491ae76f9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58296-cwe-362-concurrent-execution-using--8e7d50c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58296%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68ba9a023d5df491ae76f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58281-cwe-125-out-of-bounds-read-in-huawe-5f8f5324</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58281%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68bae3f272cf923503aa9253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58280-cwe-1321-improperly-controlled-modi-d47c3e77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58280%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68bb425f535f4a97730e4948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58276-cwe-264-permissions-privileges-and--72c26cf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58276%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48395-cwe-22-improper-limitation-of-a-pat-e5f21a71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48395%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20NMC%20G2&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8944-cwe-863-incorrect-authorization-in-o-34416c56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8944%3A%20CWE-863%20Incorrect%20Authorization%20in%20OceanWP&amp;severity=medium&amp;id=68bb0d9ee11b59d9ac04ed5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58400-unquoted-search-path-or-element-in--23563f1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58400%3A%20Unquoted%20search%20path%20or%20element%20in%20RATOC%20Systems%2C%20Inc.%20RATOC%20RAID%20Monitoring%20Manager%20for%20Windows&amp;severity=medium&amp;id=68bae925d59db91efd7c5081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41408-improper-authorization-in-handler-f-644802bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41408%3A%20Improper%20authorization%20in%20handler%20for%20custom%20URL%20scheme%20in%20LY%20Corporation%20%22Yahoo!%20Shopping%22%20App%20for%20Android&amp;severity=medium&amp;id=68baeaa857c5b37b67a4621f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55671-uncontrolled-search-path-element-in-e2090de2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55671%3A%20Uncontrolled%20Search%20Path%20Element%20in%20kujirahand%20TkEasyGUI&amp;severity=high&amp;id=68baeaa857c5b37b67a46222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55037-improper-neutralization-of-special--7262963e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55037%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kujirahand%20TkEasyGUI&amp;severity=critical&amp;id=68bafaea6a6383f5684f36aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58401-cleartext-storage-of-sensitive-info-5439eba7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58401%3A%20Cleartext%20storage%20of%20sensitive%20information%20in%20Pierre-Adrien%20Vasseur%20Obsidian%20GitHub%20Copilot%20Plugin&amp;severity=medium&amp;id=68ba6856fa81f142ed788962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8684-cwe-79-improper-neutralization-of-in-7604f291</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ux-themes%20Flatsome&amp;severity=medium&amp;id=68ba5af3917fe820479959c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7445-cwe-532-insertion-of-sensitive-infor-1253091c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7445%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Kubernetes%20secrets-store-sync-controller&amp;severity=medium&amp;id=68ba50c5884997992440222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9990-cwe-98-improper-control-of-filename--fced1700</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9990%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20smackcoders%20WordPress%20Helpdesk%20Integration&amp;severity=high&amp;id=68ba50c58849979924402231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-05-703837cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-05&amp;severity=medium&amp;id=68bb7c68535f4a97731b7bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-widespread-data-theft-targets-salesforce-ins-4e44f211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Widespread%20Data%20Theft%20Targets%20Salesforce%20Instances%20via%20Salesloft%20Drift&amp;severity=medium&amp;id=68bafb9b919d4c0e2d82ec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58780-cwe-89-improper-neutralization-of-s-d222da4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58780%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ScienceLogic%20SL1&amp;severity=high&amp;id=68baf466f95ed0f86c9048fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58362-cwe-706-use-of-incorrectly-resolved-4f6479d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58362%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20honojs%20hono&amp;severity=high&amp;id=68ba2a1988499799243e4010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58359-cwe-325-missing-cryptographic-step--ceeb54b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58359%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20ZcashFoundation%20frost&amp;severity=medium&amp;id=68bb0b63cc26dbd53247d4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-compromised-keys-to-phishing-campaigns-inside-6e9a14f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Compromised%20Keys%20to%20Phishing%20Campaigns%3A%20Inside%20a%20Cloud%20Email%20Service%20Takeover&amp;severity=medium&amp;id=68ba9e275dfe45ba5d8cf008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostredirector-poisons-windows-servers-backdoors--c8d3c8cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostRedirector%20poisons%20Windows%20servers%3A%20Backdoors%20with%20a%20side%20of%20Potatoes&amp;severity=medium&amp;id=68ba9edb7a8eab2bb04a595f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58179-cwe-918-server-side-request-forgery-4434b140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58179%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20withastro%20astro&amp;severity=high&amp;id=68ba269488499799243e19b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58352-cwe-613-insufficient-session-expira-efd3438a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58352%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=68ba231188499799243e04ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55739-cwe-798-use-of-hard-coded-credentia-ae816c75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55739%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20FreePBX%20api&amp;severity=medium&amp;id=68ba231188499799243e04b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55241-cwe-287-improper-authentication-in--993fbfec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55241%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Entra&amp;severity=critical&amp;id=68ba1f8f88499799243df764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55238-cwe-284-improper-access-control-in--091e6431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55238%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Dynamics%20365%20FastTrack%20Implementation&amp;severity=high&amp;id=68ba1f8f88499799243df761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54914-cwe-284-improper-access-control-in--09f62958</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54914%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Networking&amp;severity=critical&amp;id=68ba1f8f88499799243df75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55242-cwe-200-exposure-of-sensitive-infor-127ec879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55242%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=medium&amp;id=68ba1f8f88499799243df767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55244-cwe-284-improper-access-control-in--c2cb490e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55244%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Bot%20Service&amp;severity=critical&amp;id=68ba1f8f88499799243df76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55209-cwe-79-improper-neutralization-of-i-a4ae1447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55209%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreePBX%20contactmanager&amp;severity=medium&amp;id=68ba1c0988499799243de53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/manipulating-indias-stock-market-the-gst-portal-da-09b6a3f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Manipulating%20India%E2%80%99s%20Stock%20Market%3A%20The%20GST%20Portal%20Data%20Leak&amp;severity=medium&amp;id=68ba188b88499799243dd6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55190-cwe-200-exposure-of-sensitive-infor-c3aae4b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55190%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20argoproj%20argo-cd&amp;severity=critical&amp;id=68ba188588499799243dd6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt28-deploys-notdoor-backdoor-through-mic-b7914837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT28%20Deploys%20%E2%80%9CNotDoor%E2%80%9D%20Backdoor%20Through%20Microsoft%20Outlook&amp;severity=medium&amp;id=68ba0a7488499799243d491d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/model-namespace-reuse-flaw-hijacks-ai-models-on-go-3d450592</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Model%20Namespace%20Reuse%22%20Flaw%20Hijacks%20AI%20Models%20on%20Google%20and%20Microsoft%20Platforms&amp;severity=medium&amp;id=68b9f55c88499799243cc417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58361-cwe-20-improper-input-validation-in-7fb39ceb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58361%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MarceloTessaro%20promptcraft-forge-studio&amp;severity=critical&amp;id=68b9ee5588499799243cac32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32322-elevation-of-privilege-in-google-an-54fbb59f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32322%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ee5588499799243cac2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58353-cwe-79-improper-neutralization-of-i-736931e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58353%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarceloTessaro%20promptcraft-forge-studio&amp;severity=high&amp;id=68b9ee5588499799243cac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26439-elevation-of-privilege-in-google-an-b6314324</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26439%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ead188499799243c8789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26431-elevation-of-privilege-in-google-an-004ab372</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26431%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ead188499799243c8786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26419-elevation-of-privilege-in-google-an-6872372f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26419%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=low&amp;id=68b9ead188499799243c8783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22415-elevation-of-privilege-in-google-an-9c64818b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22415%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ead188499799243c878f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22414-elevation-of-privilege-in-google-an-ebb25c43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22414%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ead188499799243c878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49731-elevation-of-privilege-in-google-an-1b0ebabc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49731%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a0a1ce85912abc71d0be87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48581-elevation-of-privilege-in-google-an-a90e8ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48581%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c3016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48563-elevation-of-privilege-in-google-an-4433dafd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48563%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c3012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48562-information-disclosure-in-google-an-9251d3d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48562%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48561-information-disclosure-in-google-an-843863b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48561%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c300a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48560-information-disclosure-in-google-an-d02df97f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48560%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c3006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48559-denial-of-service-in-google-android-47580209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48559%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc788499799243c3002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48558-elevation-of-privilege-in-google-an-30e94229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48558%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48556-elevation-of-privilege-in-google-an-d51af39a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48556%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48554-denial-of-service-in-google-android-e11717f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48554%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48553-elevation-of-privilege-in-google-an-fdbe195d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48553%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48552-elevation-of-privilege-in-google-an-6ae80e2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48552%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48551-information-disclosure-in-google-an-69c51239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48551%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48550-denial-of-service-in-google-android-9764cf9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48550%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48549-elevation-of-privilege-in-google-an-aff8e489</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48549%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48548-elevation-of-privilege-in-google-an-92e432f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48548%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48547-elevation-of-privilege-in-google-an-479f80ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48547%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48546-elevation-of-privilege-in-google-an-f0e68d8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48546%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48545-information-disclosure-in-google-an-c0cecca5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48545%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48544-elevation-of-privilege-in-google-an-56b6b00e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48544%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48543-elevation-of-privilege-in-google-an-6a0dceb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48543%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48542-denial-of-service-in-google-android-2da924fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48542%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48541-elevation-of-privilege-in-google-an-f4e93848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48541%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48540-elevation-of-privilege-in-google-an-56570f43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48540%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48539-remote-code-execution-in-google-and-e5992810</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48539%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48538-denial-of-service-in-google-android-ee843830</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48538%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc688499799243c2f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48537-information-disclosure-in-google-an-75f981ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48537%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc688499799243c2f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48535-elevation-of-privilege-in-google-an-fb4d9342</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48535%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48534-denial-of-service-in-google-android-c1ed2e2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48534%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48532-elevation-of-privilege-in-google-an-54872bce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48532%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48531-elevation-of-privilege-in-google-an-acbf9567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48531%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48529-information-disclosure-in-google-an-3aceb277</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48529%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48528-elevation-of-privilege-in-google-an-e47c9942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48528%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48527-information-disclosure-in-google-an-2b41849e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48527%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48526-elevation-of-privilege-in-google-an-66f3890d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48526%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48524-denial-of-service-in-google-android-1f0e708b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48524%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48523-elevation-of-privilege-in-google-an-6dfc93e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48523%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48522-elevation-of-privilege-in-google-an-db8fd1cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48522%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32350-elevation-of-privilege-in-google-an-5ac72159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32350%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32349-elevation-of-privilege-in-google-an-338a62fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32349%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32347-elevation-of-privilege-in-google-an-2754c4ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32347%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32346-elevation-of-privilege-in-google-an-61d17368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32346%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32345-elevation-of-privilege-in-google-an-1e059a84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32345%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32333-elevation-of-privilege-in-google-an-f89fd941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32333%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32332-unknown-in-google-android-38f21b75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32332%3A%20Unknown%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32331-elevation-of-privilege-in-google-an-1772eca7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32331%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc588499799243c2f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32330-information-disclosure-in-google-an-7a74fa74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32330%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9dcc588499799243c2f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32327-elevation-of-privilege-in-google-an-2c02d5bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32327%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32326-elevation-of-privilege-in-google-an-241a270e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32326%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32325-elevation-of-privilege-in-google-an-679b891d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32325%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32324-elevation-of-privilege-in-google-an-ba801421</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32324%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32323-elevation-of-privilege-in-google-an-94b03085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32323%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32321-elevation-of-privilege-in-google-an-22a07d2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32321%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26464-elevation-of-privilege-in-google-an-70c6c057</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26464%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26454-elevation-of-privilege-in-google-an-d82c5fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26454%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0089-elevation-of-privilege-in-google-and-f2fa1877</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0089%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc488499799243c2ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0076-information-disclosure-in-google-and-709161d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0076%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=low&amp;id=68b9dcc488499799243c2ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49714-elevation-of-privilege-in-google-an-18ffd434</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49714%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48533-elevation-of-privilege-in-google-an-9ccd9f77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48533%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c301f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48530-remote-code-execution-in-google-and-47aebee0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48530%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c301c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22441-elevation-of-privilege-in-google-an-3b6513db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22441%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9dcc788499799243c3019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-analysis-of-the-amos-stealer-campaign-targeting-938b8125</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20Analysis%20of%20the%20AMOS%20Stealer%20Campaign%20Targeting%20macOS%20via%20&apos;Cracked&apos;%20Apps&amp;severity=medium&amp;id=68ba036c88499799243d2377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/contagious-interview-north-korean-threat-actors-re-eb95642f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Contagious%20Interview%20%7C%20North%20Korean%20Threat%20Actors%20Reveal%20Plans%20and%20Ops%20by%20Abusing%20Cyber%20Intel%20Platforms&amp;severity=medium&amp;id=68e15325ecbb611120a5605f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/subverting-code-integrity-checks-to-locally-backdo-18da0dce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Subverting%20code%20integrity%20checks%20to%20locally%20backdoor%20Signal%2C%201Password%2C%20Slack%2C%20and%20more&amp;severity=medium&amp;id=68b9d25088499799243b66cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tire-giant-bridgestone-confirms-cyberattack-impact-79fb6aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tire%20giant%20Bridgestone%20confirms%20cyberattack%20impacts%20manufacturing&amp;severity=high&amp;id=68b9d23e88499799243b65fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tp-link-zero-day-surfaces-as-cisa-warns-other--41119cbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TP-Link%20zero-day%20surfaces%20as%20CISA%20warns%20other%20flaws%20are%20exploited&amp;severity=critical&amp;id=68b9d147f9dab285376f22c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32312-elevation-of-privilege-in-google-an-50bf866c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32312%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26463-denial-of-service-in-google-android-bf03b266</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26463%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ccbad6fd7c5a76c5d8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26462-elevation-of-privilege-in-google-an-8f10cfea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26462%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26458-elevation-of-privilege-in-google-an-40ff622c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26458%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26456-denial-of-service-in-google-android-107fa61e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26456%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ccbad6fd7c5a76c5d8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26455-elevation-of-privilege-in-google-an-44573c85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26455%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26453-information-disclosure-in-google-an-50402b60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26453%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9ccbad6fd7c5a76c5d89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26452-elevation-of-privilege-in-google-an-e74f1aae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26452%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9ccbad6fd7c5a76c5d899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26450-elevation-of-privilege-in-google-an-ddf16317</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26450%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26449-denial-of-service-in-google-android-8dc67a89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26449%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26448-information-disclosure-in-google-an-419984a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26448%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26445-information-disclosure-in-google-an-05427244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26445%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26443-elevation-of-privilege-in-google-an-990a9e22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26443%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26441-information-disclosure-in-google-an-060c51dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26441%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26437-information-disclosure-in-google-an-0dc5affe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26437%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26432-denial-of-service-in-google-android-92959440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26432%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26444-elevation-of-privilege-in-google-an-8ef3f303</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26444%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26442-information-disclosure-in-google-an-3962c09d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26442%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26440-elevation-of-privilege-in-google-an-97a520c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26440%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26438-elevation-of-privilege-in-google-an-2e9d1524</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26438%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26436-elevation-of-privilege-in-google-an-3529b1f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26436%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26435-elevation-of-privilege-in-google-an-500a8755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26435%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26430-elevation-of-privilege-in-google-an-7bf559bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26430%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3be88499799243bc17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26429-denial-of-service-in-google-android-7a195eb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26429%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26428-elevation-of-privilege-in-google-an-d280145a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26428%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=low&amp;id=68b9d3be88499799243bc175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26427-elevation-of-privilege-in-google-an-982ad0eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26427%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3be88499799243bc170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26426-elevation-of-privilege-in-google-an-ae8c9ac8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26426%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26425-elevation-of-privilege-in-google-an-8d1162a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26425%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26424-information-disclosure-in-google-an-4381d841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26424%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26423-elevation-of-privilege-in-google-an-399db0c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26423%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26422-elevation-of-privilege-in-google-an-bd58b85c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26422%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26421-elevation-of-privilege-in-google-an-06cf7aed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26421%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26420-elevation-of-privilege-in-google-an-1ee6a541</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26420%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22425-elevation-of-privilege-in-google-an-455b8c12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22425%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0087-elevation-of-privilege-in-google-and-4ad5911c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0087%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0077-elevation-of-privilege-in-google-and-00fd0596</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0077%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bd88499799243bc136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49739-elevation-of-privilege-in-google-an-2349160f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49739%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=69a0a1ce85912abc71d0be8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9636-vulnerability-in-pgadminorg-pgadmin--6a4359d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9636%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=high&amp;id=68b9c44a329bb27a4692c9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23262-cwe-863-incorrect-authorization-in--82526a50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23262%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20ConnectX%20GA&amp;severity=medium&amp;id=68b9b71bd4970d57ae860d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23261-cwe-532-insertion-of-sensitive-info-912098fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23261%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NVIDIA%20NVOS&amp;severity=medium&amp;id=68b9b71bd4970d57ae860d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23259-cwe-362-concurrent-execution-using--a6072994</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23259%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NVIDIA%20Mellanox%20DPDK%2022.11&amp;severity=medium&amp;id=68b9b65f14cfa2f169867da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23258-cwe-732-incorrect-permission-assign-695f1214</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23258%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20NVIDIA%20DOCA%20with%20collectx-dpeserver&amp;severity=high&amp;id=68b9b65f14cfa2f169867d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23257-cwe-732-incorrect-permission-assign-8c812290</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23257%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20NVIDIA%20DOCA%20with%20collectx-clxapidev&amp;severity=high&amp;id=68b9b65f14cfa2f169867d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23256-cwe-863-incorrect-authorization-in--b4c82519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23256%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20BlueField%20GA&amp;severity=high&amp;id=68b9b65f14cfa2f169867d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23302-cwe-1244-internal-asset-exposed-to--264217c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23302%3A%20CWE-1244%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20NVIDIA%20HGX%2C%20DGX%20Hopper&amp;severity=medium&amp;id=68b9b65f14cfa2f169867da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23301-cwe-1244-internal-asset-exposed-to--a189a576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23301%3A%20CWE-1244%20Internal%20Asset%20Exposed%20to%20Unsafe%20Debug%20Access%20Level%20or%20State%20in%20NVIDIA%20HGX%2C%20DGX%20Hopper&amp;severity=medium&amp;id=68b9b4c9eadac6644c66adeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25048-cwe-23-relative-path-traversal-in-i-2ae169c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25048%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IBM%20Jazz%20Foundation&amp;severity=medium&amp;id=68b9ab85b757c88947999204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2667-cwe-497-exposure-of-sensitive-system-090c36ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2667%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=68b9a6fddea7dd92b75def90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2694-cwe-79-improper-neutralization-of-in-cfb5b27b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68b9a6fddea7dd92b75def93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6785-cwe-74-improper-neutralization-of-sp-d0510a60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6785%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Tesla%20Model%203&amp;severity=medium&amp;id=68b9a281853c7233bf3749dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8311-cwe-89-improper-neutralization-of-sp-320ab272</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8311%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dotCMS%20dotCMS%20Cloud%20Services%20(dCS)&amp;severity=critical&amp;id=68b99f9af6759e9e78017a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-uses-windows-character-map-for-cryptom-9ec96765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Uses%20Windows%20Character%20Map%20for%20Cryptomining&amp;severity=medium&amp;id=68b991edfed3536caf3428ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7388-cwe-77-in-progress-software-corporat-10c05ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7388%3A%20CWE-77%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=high&amp;id=68b98edd1baff54e4f42af0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7385-cwe-89-improper-neutralization-of-sp-7d78ae8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Concept%20Intermedia%20GOV%20CMS&amp;severity=critical&amp;id=68b9835419f2aef16336f2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-lapsus-hunters-demand-google-fire-securi-25e18b28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Lapsus%24%20Hunters%20Demand%20Google%20Fire%20Security%20Experts%20or%20Face%20Data%20Leak&amp;severity=medium&amp;id=68b97cfaff9a251ac5d2100c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-development-for-ibm-i-turning-blind-as400--f69d0f41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20development%20for%20IBM%20i%20-%20turning%20blind%20AS%2F400%20command%20execution%20into%20a%20proper%20shell&amp;severity=high&amp;id=68b97c2df6fca6bfbff9132b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41063-cwe-79-improper-neutralization-of-i-5b53776e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41062-cwe-79-improper-neutralization-of-i-15c53fc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41061-cwe-79-improper-neutralization-of-i-a12506b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41060-cwe-79-improper-neutralization-of-i-bedfb418</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41059-cwe-79-improper-neutralization-of-i-5febe7cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41058-cwe-79-improper-neutralization-of-i-d0333e99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41057-cwe-79-improper-neutralization-of-i-cb08d14a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41056-cwe-79-improper-neutralization-of-i-07ec768a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cfc185832b7711f62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41055-cwe-79-improper-neutralization-of-i-00da82a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41054-cwe-79-improper-neutralization-of-i-8a51f260</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41053-cwe-79-improper-neutralization-of-i-111d298b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41052-cwe-79-improper-neutralization-of-i-6123530a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41052%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41051-cwe-79-improper-neutralization-of-i-74fd372b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41051%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41050-cwe-79-improper-neutralization-of-i-dd2505a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41049-cwe-79-improper-neutralization-of-i-5884e4d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41048-cwe-79-improper-neutralization-of-i-21611148</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41047-cwe-79-improper-neutralization-of-i-0170c18e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41046-cwe-79-improper-neutralization-of-i-4db704e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41045-cwe-79-improper-neutralization-of-i-b0de846b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41044-cwe-79-improper-neutralization-of-i-f2140a7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41043-cwe-79-improper-neutralization-of-i-d91dd235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41042-cwe-79-improper-neutralization-of-i-a1fb814c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41041-cwe-79-improper-neutralization-of-i-c2331aac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41040-cwe-79-improper-neutralization-of-i-c1e92e2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41039-cwe-79-improper-neutralization-of-i-df3b6e2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41038-cwe-79-improper-neutralization-of-i-c7f91682</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41038%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41037-cwe-79-improper-neutralization-of-i-2a4dcd42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41036-cwe-79-improper-neutralization-of-i-57d06b7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41036%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=medium&amp;id=68b975cec185832b7711f5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41035-cwe-22-improper-limitation-of-a-pat-6904d0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41035%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b99f9af6759e9e78017a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41034-cwe-89-improper-neutralization-of-s-f4527ece</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41034%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b9a281853c7233bf3749d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41033-cwe-89-improper-neutralization-of-s-b3e79c2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41033%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b9a281853c7233bf3749d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41032-cwe-89-improper-neutralization-of-s-7536f44d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41032%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appRain%20appRain%20CMF&amp;severity=high&amp;id=68b9a281853c7233bf3749d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-tp-link-wi-fi-and-whatsapp-spyware-flaws-a68f7ddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20TP-Link%20Wi-Fi%20and%20WhatsApp%20Spyware%20Flaws%20to%20KEV%20List&amp;severity=medium&amp;id=68b9669723d09a4424475bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guide-pour-relayer-ntlm-sur-http-lexemple-de-glpi-e752fdc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guide%20pour%20relayer%20NTLM%20sur%20HTTP%20-%20l&apos;exemple%20de%20GLPI&amp;severity=medium&amp;id=68b966f923d09a4424479575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/googles-september-2025-android-security-update-fix-1013661e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google&apos;s%20September%202025%20Android%20Security%20Update%20Fixes%20120%20Vulnerabilities%2C%20Including%202%20Active%20Zero-Day%20Exploits&amp;severity=critical&amp;id=68b9669723d09a4424475bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/saas-giant-workiva-discloses-data-breach-after-sal-91fbd7b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SaaS%20giant%20Workiva%20discloses%20data%20breach%20after%20Salesforce%20attack&amp;severity=high&amp;id=68b9669723d09a4424475bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sues-robot-toy-maker-for-exposing-childrens-dat-50cf4c9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20sues%20robot%20toy%20maker%20for%20exposing%20children&apos;s%20data%20to%20Chinese%20devs&amp;severity=medium&amp;id=68b9669723d09a4424475bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-tp-link-archer-c7eu-and-tl-wr841n-fla-2695c3a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20TP-Link%20Archer%20C7(EU)%20and%20TL-WR841N%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68b9669723d09a4424475be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-barrelfire-targeting-kazakhstan-oil-gas-eab2ec3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20BarrelFire%3A%20Targeting%20Kazakhstan%20Oil%20%26%20Gas&amp;severity=medium&amp;id=68b9fff288499799243d1abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6085-cwe-434-unrestricted-upload-of-file--eb5efcb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6085%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20integromat%20Make%20Connector&amp;severity=high&amp;id=68b966f323d09a44244794b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9616-cwe-352-cross-site-request-forgery-c-a2119b82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9616%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alobaidi%20PopAd&amp;severity=medium&amp;id=68b966f323d09a44244794c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2411-cwe-307-improper-restriction-of-exce-62db17f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2411%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20TaskPano&amp;severity=high&amp;id=68b966f323d09a44244794c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6984-cwe-200-exposure-of-sensitive-inform-dd54047f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6984%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=68b966f323d09a44244794c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2417-cwe-307-improper-restriction-of-exce-d129f608</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2417%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20e-Mutabakat&amp;severity=high&amp;id=68b966f323d09a44244794cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36887-elevation-of-privilege-in-google-an-44fb5a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36887%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b966f323d09a44244794cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56190-elevation-of-privilege-in-google-an-9c3e124f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56190%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1ce85912abc71d0be93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36909-information-disclosure-in-google-an-fa69e709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36909%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b9d3bf88499799243bc1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36908-elevation-of-privilege-in-google-an-8d98ee05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36908%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b994f6e06fce05ddc0580c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36907-elevation-of-privilege-in-google-an-83a46dba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36907%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b994f6e06fce05ddc05809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36906-elevation-of-privilege-in-google-an-3181ef44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36906%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b9d3bf88499799243bc1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36905-elevation-of-privilege-in-google-an-dc3beae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36905%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b99d8f2a7699688534ae15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36904-elevation-of-privilege-in-google-an-a06b59e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36904%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b986c1a992e2db914fa0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36903-elevation-of-privilege-in-google-an-8a5354b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36903%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b99d8f2a7699688534ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36902-elevation-of-privilege-in-google-an-6b393639</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36902%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b99d8f2a7699688534ae0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36901-elevation-of-privilege-in-google-an-fcbe451a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36901%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b986c1a992e2db914fa0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36900-elevation-of-privilege-in-google-an-7c5108f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36900%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=68b99d8f2a7699688534ae0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36899-elevation-of-privilege-in-google-an-0e93e04b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36899%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b99d8f2a7699688534ae09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36898-elevation-of-privilege-in-google-an-09e57d49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36898%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad00021078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36897-remote-code-execution-in-google-and-03465245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36897%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68b91d7ead5a09ad00021075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36896-elevation-of-privilege-in-google-an-c5d294fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36896%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b986c1a992e2db914fa0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36895-information-disclosure-in-google-an-74a7fd0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36895%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad00021072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36894-denial-of-service-in-google-android-084ca740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36894%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad0002106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36893-information-disclosure-in-google-an-1be81398</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36893%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b91d7ead5a09ad0002106c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36892-denial-of-service-in-google-android-4734aac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36892%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad00021069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36891-elevation-of-privilege-in-google-an-6785482d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36891%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b91d7ead5a09ad0002107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36890-elevation-of-privilege-in-google-an-df05f614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36890%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b91d7ead5a09ad0002107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9519-cwe-94-improper-control-of-generatio-9f7d5c3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9519%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kleor%20Easy%20Timer&amp;severity=high&amp;id=68b91670ad5a09ad00011cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9517-cwe-94-improper-control-of-generatio-3cb8e7e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9517%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20docjojo%20atec%20Debug&amp;severity=high&amp;id=68b91670ad5a09ad00011cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9516-cwe-36-absolute-path-traversal-in-do-cebe620a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9516%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20docjojo%20atec%20Debug&amp;severity=medium&amp;id=68b91670ad5a09ad00011ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9518-cwe-36-absolute-path-traversal-in-do-d9ba3f54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9518%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20docjojo%20atec%20Debug&amp;severity=high&amp;id=68b91670ad5a09ad00011cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43772-cwe-400-uncontrolled-resource-consu-5a3832bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43772%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68b8fa50ad5a09ad00fd449d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/not-safe-for-work-tracking-and-investigating-steal-9a6ddfe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Not%20Safe%20for%20Work%3A%20Tracking%20and%20Investigating%20Stealerium%20and%20Phantom%20Infostealers&amp;severity=medium&amp;id=68b966f223d09a442447948f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ethereum-smart-contracts-used-to-push-malicious-co-2a676a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ethereum%20smart%20contracts%20used%20to%20push%20malicious%20code%20on%20npm&amp;severity=medium&amp;id=68b966f223d09a4424479487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58358-cwe-77-improper-neutralization-of-s-e9ff11f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58358%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20zcaceres%20markdownify-mcp&amp;severity=high&amp;id=68b8e1b4ad5a09ad00fc4f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9942-unrestricted-upload-in-codeastro-rea-cbd4b16c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9942%3A%20Unrestricted%20Upload%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8e1b4ad5a09ad00fc4f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9941-unrestricted-upload-in-codeastro-rea-39f6a65a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9941%3A%20Unrestricted%20Upload%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8e1b4ad5a09ad00fc4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58357-cwe-79-improper-neutralization-of-i-52bcd1ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58357%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=68b8e1b4ad5a09ad00fc4f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9940-cross-site-scripting-in-codeastro-re-81ad7c7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9940%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8de39ad5a09ad00fc2504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9939-cross-site-scripting-in-codeastro-re-db986df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9939%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b8de39ad5a09ad00fc24fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-04-12937d1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-04&amp;severity=medium&amp;id=68ba2a0b88499799243e3b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57576-na-0d168552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57576%3A%20n%2Fa&amp;severity=medium&amp;id=68b9b65f14cfa2f169867dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57263-na-8919f2ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57263%3A%20n%2Fa&amp;severity=high&amp;id=68b994f6e06fce05ddc05806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58355-cwe-22-improper-limitation-of-a-pat-fcdacbe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58355%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20charmbracelet%20soft-serve&amp;severity=high&amp;id=68b8d729ad5a09ad00fbecad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9938-stack-based-buffer-overflow-in-d-lin-3834edb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9938%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8400&amp;severity=high&amp;id=68b8d3a4ad5a09ad00fbd95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9937-improper-authorization-in-elunez-ela-7acfb000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9937%3A%20Improper%20Authorization%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68b8d3a4ad5a09ad00fbd959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9936-improper-authorization-in-fuyanglipe-1f284d03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9936%3A%20Improper%20Authorization%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=68b8cc9dad5a09ad00fba05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9935-command-injection-in-totolink-n600r-3054328a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9935%3A%20Command%20Injection%20in%20TOTOLINK%20N600R&amp;severity=medium&amp;id=68b8cc9dad5a09ad00fba057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9934-command-injection-in-totolink-x5000r-632642cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9934%3A%20Command%20Injection%20in%20TOTOLINK%20X5000R&amp;severity=medium&amp;id=68b8c594ad5a09ad00fb5cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9933-sql-injection-in-phpgurukul-beauty-p-c41adae7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9933%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b8c594ad5a09ad00fb5cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58064-cwe-79-improper-neutralization-of-i-cdca5f26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58064%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=low&amp;id=68b8be8cad5a09ad00fb1d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9932-sql-injection-in-phpgurukul-beauty-p-eb2e6710</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9932%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b8be8cad5a09ad00fb1d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9931-cross-site-scripting-in-jinher-oa-6e0500b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9931%3A%20Cross%20Site%20Scripting%20in%20Jinher%20OA&amp;severity=medium&amp;id=68b8be8cad5a09ad00fb1d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-cyberattack-disrupts-production--5a5dff85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20Cyberattack%20Disrupts%20Production%20and%20Sales%20Operations&amp;severity=medium&amp;id=68b8bb07ad5a09ad00faffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-new-hexstrike-ai-tool-to-rapidly-explo-b5568238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20use%20new%20HexStrike-AI%20tool%20to%20rapidly%20exploit%20n-day%20flaws&amp;severity=high&amp;id=68b8b784ad5a09ad00fae4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9930-sql-injection-in-1000projects-beauty-b67e0507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9930%3A%20SQL%20Injection%20in%201000projects%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b8b794ad5a09ad00fae54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9929-cross-site-scripting-in-code-project-fdeaf577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9929%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Responsive%20Blog%20Site&amp;severity=medium&amp;id=68b8b794ad5a09ad00fae544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9928-sql-injection-in-projectworlds-trave-62f6e7d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9928%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b8b07bad5a09ad00faaa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9927-sql-injection-in-projectworlds-trave-14fccb48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9927%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b8a974ad5a09ad00fa4b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8268-cwe-862-missing-authorization-in-tig-db564ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8268%3A%20CWE-862%20Missing%20Authorization%20in%20tigroumeow%20AI%20Engine&amp;severity=medium&amp;id=68b8a5f1ad5a09ad00fa3003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55748-cwe-23-relative-path-traversal-in-x-7dcdaae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55748%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=68b8a5f1ad5a09ad00fa300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55747-cwe-23-relative-path-traversal-in-x-e2e50657</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55747%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=68b8a5f1ad5a09ad00fa3009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-campaign-discovered-via-manualfinder-149aba98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20malware%20campaign%20discovered%20via%20ManualFinder&amp;severity=medium&amp;id=68b8a26bad5a09ad00fa1283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53690-cwe-502-deserialization-of-untruste-47560685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53690%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=critical&amp;id=68b8a26cad5a09ad00fa1530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9926-sql-injection-in-projectworlds-trave-9fcf6514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9926%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b8a26cad5a09ad00fa1534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55162-cwe-613-insufficient-session-expira-a20d1661</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55162%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=68b89ee9ad5a09ad00f9f229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9365-cwe-502-deserialization-of-untrusted-14949b16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9365%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Fuji%20Electric%20FRENIC-Loader%204&amp;severity=high&amp;id=68b89b64ad5a09ad00f9d120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9925-sql-injection-in-projectworlds-trave-33578a8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9925%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b89b64ad5a09ad00f9d124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36193-cwe-732-incorrect-permission-assign-5f878875</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36193%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Transformation%20Advisor&amp;severity=high&amp;id=68b8945dad5a09ad00f99e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9924-sql-injection-in-projectworlds-trave-72b09527</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9924%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=68b88d54ad5a09ad00f963a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9923-cross-site-scripting-in-campcodes-sa-cd3b569d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9923%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68b88d54ad5a09ad00f9639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20328-improper-neutralization-of-input-du-1133ce5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20328%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20291-url-redirection-to-untrusted-site-o-2e66bb46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20291%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20335-improper-access-control-in-cisco-ci-ceff24d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20335%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20336-exposure-of-sensitive-information-t-54df5328</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20336%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Session%20Initiation%20Protocol%20(SIP)%20Software&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20330-improper-neutralization-of-input-du-7c170c2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager%20IM%20and%20Presence%20Service&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20280-improper-neutralization-of-input-du-23db35f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20326-cross-site-request-forgery-csrf-in--8cd32586</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20326%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20287-unrestricted-upload-of-file-with-da-413870ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20287%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20270-exposure-of-sensitive-information-t-cc5c6325</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20270%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68b87f45ad5a09ad00f8f358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tax-refund-scam-targets-californians-fd03eed5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tax%20refund%20scam%20targets%20Californians&amp;severity=medium&amp;id=68b89ee7ad5a09ad00f9f19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-campaign-targeting-diplomatic-assets-15779dc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Campaign%20Targeting%20Diplomatic%20Assets&amp;severity=medium&amp;id=68b89ee7ad5a09ad00f9f1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dire-wolf-ransomware-threat-combining-data-encrypt-eae6dcfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dire%20Wolf%20Ransomware%3A%20Threat%20Combining%20Data%20Encryption%20and%20Leak%20Extortion&amp;severity=medium&amp;id=68b89ee7ad5a09ad00f9f1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-notdoor-inside-apt28s-expanding-arsenal-4fba4913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20NotDoor%3A%20Inside%20APT28&apos;s%20Expanding%20Arsenal&amp;severity=medium&amp;id=68b89b64ad5a09ad00f9d0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9922-cross-site-scripting-in-campcodes-sa-7d76d6bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9922%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68b8783dad5a09ad00f89f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9921-cross-site-scripting-in-code-project-b111a4e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9921%3A%20Cross%20Site%20Scripting%20in%20code-projects%20POS%20Pharmacy%20System&amp;severity=medium&amp;id=68b8783dad5a09ad00f89f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9959-cwe-94-improper-control-of-generatio-72638d8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9959%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=68b87504ad5a09ad00f87cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-influence-assets-converge-on-moldovan-elec-fb8ba39f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Influence%20Assets%20Converge%20on%20Moldovan%20Elections&amp;severity=medium&amp;id=68b89b64ad5a09ad00f9d0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-hackers-exploit-100-embassy-email-accounts-12d82897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Hackers%20Exploit%20100%2B%20Embassy%20Email%20Accounts%20in%20Global%20Phishing%20Targeting%20Diplomats&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disney-to-pay-10m-to-settle-claims-it-collected-ki-2d93a03f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disney%20to%20pay%20%2410M%20to%20settle%20claims%20it%20collected%20kids%E2%80%99%20data%20on%20YouTube&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixes-actively-exploited-android-flaws-in-s-fd7d5811</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixes%20actively%20exploited%20Android%20flaws%20in%20September%20update&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-exploit-ethereum-smart-cont-51d4a962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Packages%20Exploit%20Ethereum%20Smart%20Contracts&amp;severity=high&amp;id=68b874b7ad5a09ad00f87b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-grab-130m-using-brazils-real-time-payment--1b1adb03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Grab%20%24130M%20Using%20Brazil&apos;s%20Real-Time%20Payment%20System&amp;severity=medium&amp;id=68b874b7ad5a09ad00f87b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9867-inappropriate-implementation-in-goog-3e16b054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9867%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68b86daead5a09ad00f83492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9866-inappropriate-implementation-in-goog-904435f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9866%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68b86daead5a09ad00f8348e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9865-inappropriate-implementation-in-goog-05006104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9865%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68b86daead5a09ad00f8348a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9864-use-after-free-in-google-chrome-623e3126</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9864&amp;severity=null&amp;id=68b86daead5a09ad00f83486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9920-file-inclusion-in-campcodes-recruitm-47b7c3a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9920%3A%20File%20Inclusion%20in%20Campcodes%20Recruitment%20Management%20System&amp;severity=medium&amp;id=68b86a2aad5a09ad00f81b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9919-sql-injection-in-1000projects-beauty-25452697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9919%3A%20SQL%20Injection%20in%201000projects%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b86a2aad5a09ad00f81b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-mitigates-largest-ever-recorded-ddos-at-8bc4df29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Mitigates%20Largest%20Ever%20Recorded%20DDoS%20Attack%20at%2011.5%20Tbps&amp;severity=medium&amp;id=68b86322ad5a09ad00f7d731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-salesforce-breach-a-deep-dive-into-the-chai-094c2681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Salesforce%20Breach%3A%20A%20Deep%20dive%20into%20the%20chain%20and%20extent%20of%20the%20compromise&amp;severity=medium&amp;id=68b8a26bad5a09ad00fa1350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0280-cwe-257-storing-passwords-in-a-recov-680a6743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0280%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20HCL%20Software%20Compass&amp;severity=high&amp;id=68b85f9fad5a09ad00f7a481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58460-vulnerability-in-jenkins-project-je-6ea5f0de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58460%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenTelemetry%20Plugin&amp;severity=medium&amp;id=68b85c1aad5a09ad00f7780e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58459-vulnerability-in-jenkins-project-je-300a5c6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58459%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20global-build-stats%20Plugin&amp;severity=medium&amp;id=68b85c1aad5a09ad00f7780b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58458-vulnerability-in-jenkins-project-je-92d05090</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58458%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20client%20Plugin&amp;severity=medium&amp;id=68b85c1aad5a09ad00f77808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58644-cwe-502-deserialization-of-untruste-0cc5f55b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58644%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20LTL%20Freight%20Quotes%20-%20TQL%20Edition&amp;severity=null&amp;id=68b85518ad5a09ad00f71ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58643-cwe-502-deserialization-of-untruste-3e1aadd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58643%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Daylight%20Edition&amp;severity=null&amp;id=68b85518ad5a09ad00f71edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58642-cwe-502-deserialization-of-untruste-245cd328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58642%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Day%20%26%20Ross%20Edition&amp;severity=null&amp;id=68b85518ad5a09ad00f71ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58641-cwe-918-server-side-request-forgery-da6d6af0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58641%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kamleshyadav%20Exit%20Intent%20Popup&amp;severity=null&amp;id=68b85518ad5a09ad00f71ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58640-cwe-79-improper-neutralization-of-i-bbb97078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MatrixAddons%20Document%20Engine&amp;severity=null&amp;id=68b85517ad5a09ad00f71ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58639-cwe-862-missing-authorization-in-al-d16fe3b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58639%3A%20Missing%20Authorization%20in%20Ali%20Khallad%20Contact%20Form%20By%20Mega%20Forms&amp;severity=null&amp;id=68b85517ad5a09ad00f71ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58637-cwe-98-improper-control-of-filename-eea03226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58637%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20immonex%20immonex%20Kickstart&amp;severity=null&amp;id=68b85517ad5a09ad00f71eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58635-cwe-862-missing-authorization-in-pa-ac46515f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58635%3A%20Missing%20Authorization%20in%20DevItems%20Support%20Genix&amp;severity=null&amp;id=68b85517ad5a09ad00f71eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58634-cwe-862-missing-authorization-in-pe-209a85e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58634%3A%20Missing%20Authorization%20in%20peachpay%20PeachPay%20Payments&amp;severity=null&amp;id=68b85517ad5a09ad00f71eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58633-cwe-79-improper-neutralization-of-i-f1482187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=null&amp;id=68b85517ad5a09ad00f71eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58632-cwe-79-improper-neutralization-of-i-225ba5a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dadevarzan%20Dadevarzan%20WordPress%20Common&amp;severity=null&amp;id=68b85517ad5a09ad00f71eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58631-cwe-79-improper-neutralization-of-i-2b9a445d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZEEN101%20IssueM&amp;severity=null&amp;id=68b85517ad5a09ad00f71eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58630-cwe-79-improper-neutralization-of-i-9dbffcb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rbaer%20Simple%20Matomo%20Tracking%20Code&amp;severity=null&amp;id=68b85517ad5a09ad00f71ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58626-cwe-79-improper-neutralization-of-i-e14a1c7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RumbleTalk%20RumbleTalk%20Live%20Group%20Chat&amp;severity=null&amp;id=68b85517ad5a09ad00f71ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58625-cwe-79-improper-neutralization-of-i-57f0b37c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiffy%20Plugins%20WP%20Flow%20Plus&amp;severity=null&amp;id=68b85517ad5a09ad00f71e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58624-cwe-79-improper-neutralization-of-i-ea2b2086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20Exchange%20Rates&amp;severity=null&amp;id=68b85517ad5a09ad00f71e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58623-cwe-79-improper-neutralization-of-i-c8db2cd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bohemia%20Plugins%20Event%20Feed%20for%20Eventbrite&amp;severity=null&amp;id=68b85517ad5a09ad00f71e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58622-cwe-862-missing-authorization-in-yy-1080bdae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58622%3A%20Missing%20Authorization%20in%20yydevelopment%20Mobile%20Contact%20Line&amp;severity=null&amp;id=68b85517ad5a09ad00f71e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58621-cwe-79-improper-neutralization-of-i-95f1f595</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amuse%20Labs%20PuzzleMe%20for%20WordPress&amp;severity=null&amp;id=68b85517ad5a09ad00f71e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58620-cwe-79-improper-neutralization-of-i-cdab5de2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=null&amp;id=68b85517ad5a09ad00f71e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58618-cwe-79-improper-neutralization-of-i-9ba684ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58618%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Jernigan%20Pie%20Calendar&amp;severity=null&amp;id=68b85517ad5a09ad00f71e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58617-cwe-862-missing-authorization-in-fa-fd6c7ae2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58617%3A%20Missing%20Authorization%20in%20FAKTOR%20VIER%20F4%20Media%20Taxonomies&amp;severity=null&amp;id=68b85517ad5a09ad00f71e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58616-cwe-862-missing-authorization-in-fr-0c40d32c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58616%3A%20Missing%20Authorization%20in%20Frisbii%20Frisbii%20Pay&amp;severity=null&amp;id=68b85517ad5a09ad00f71e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58615-cwe-918-server-side-request-forgery-38a363f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58615%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gfazioli%20WP%20Bannerize%20Pro&amp;severity=null&amp;id=68b85517ad5a09ad00f71e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58614-cwe-79-improper-neutralization-of-i-5fe8106e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jamel.Z%20Tooltipy&amp;severity=null&amp;id=68b85516ad5a09ad00f71e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58613-cwe-862-missing-authorization-in-ba-eba300df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58613%3A%20Missing%20Authorization%20in%20Barn2%20Plugins%20Posts%20Table%20with%20Search%20%26%20Sort&amp;severity=null&amp;id=68b85516ad5a09ad00f71e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58612-cwe-79-improper-neutralization-of-i-1b868a25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58612%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Property%20Hive%20PropertyHive&amp;severity=null&amp;id=68b85516ad5a09ad00f71e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58610-cwe-79-improper-neutralization-of-i-6393771d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Gallery%20PhotoBlocks&amp;severity=null&amp;id=68b85516ad5a09ad00f71e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58609-cwe-79-improper-neutralization-of-i-af4d86e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iulia%20Cazan%20Latest%20Post%20Shortcode&amp;severity=null&amp;id=68b85516ad5a09ad00f71e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58608-cwe-98-improper-control-of-filename-b6247877</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58608%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BuddyDev%20MediaPress&amp;severity=null&amp;id=68b85516ad5a09ad00f71e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58607-cwe-79-improper-neutralization-of-i-83a87955</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GDPR%20Info%20Cookie%20Notice%20%26amp%3B%20Consent%20Banner%20for%20GDPR%20%26amp%3B%20CCPA%20Compliance&amp;severity=null&amp;id=68b85516ad5a09ad00f71e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58606-cwe-862-missing-authorization-in-co-ed741e51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58606%3A%20Missing%20Authorization%20in%20cozythemes%20SaasLauncher&amp;severity=null&amp;id=68b85516ad5a09ad00f71e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58604-cwe-89-improper-neutralization-of-s-6170f70d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58604%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=68b85516ad5a09ad00f71e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58602-cwe-79-improper-neutralization-of-i-508fba69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20If-So%20Dynamic%20Content%20If-So%20Dynamic%20Content%20Personalization&amp;severity=null&amp;id=68b85516ad5a09ad00f71e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58601-cwe-862-missing-authorization-in-ra-8acd904a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58601%3A%20Missing%20Authorization%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=68b85515ad5a09ad00f71e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58600-cwe-862-missing-authorization-in-co-06db41f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58600%3A%20Missing%20Authorization%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=68b85515ad5a09ad00f71e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58599-cwe-862-missing-authorization-in-ty-316c479b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58599%3A%20Missing%20Authorization%20in%20tychesoftwares%20Order%20Delivery%20Date%20for%20WooCommerce&amp;severity=null&amp;id=68b85515ad5a09ad00f71e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58598-cwe-215-insertion-of-sensitive-info-284cbe91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58598%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20Klarna%20Klarna%20Order%20Management%20for%20WooCommerce&amp;severity=null&amp;id=68b85515ad5a09ad00f71e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58597-cwe-639-authorization-bypass-throug-d652429d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58597%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tomdever%20wpForo%20Forum&amp;severity=null&amp;id=68b85515ad5a09ad00f71e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58596-cwe-79-improper-neutralization-of-i-668b173e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58596%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20properfraction%20MailOptin&amp;severity=null&amp;id=68b85515ad5a09ad00f71e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58594-cwe-862-missing-authorization-in-th-07f1c951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58594%3A%20Missing%20Authorization%20in%20themefusecom%20Brizy&amp;severity=null&amp;id=68b85515ad5a09ad00f71e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58593-cwe-79-improper-neutralization-of-i-fc20ab65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=null&amp;id=68b85515ad5a09ad00f71e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inline-style-exfiltration-leaking-data-with-chaine-19d2176e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inline%20Style%20Exfiltration%3A%20leaking%20data%20with%20chained%20CSS%20conditionals&amp;severity=medium&amp;id=68b84a8cad5a09ad00f67903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marshal-madness-a-brief-history-of-ruby-deserializ-264da81a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marshal%20madness%3A%20A%20brief%20history%20of%20Ruby%20deserialization%20exploits&amp;severity=medium&amp;id=68b84a8cad5a09ad00f678ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47421-cwe-88-improper-neutralization-of-a-c0d49699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47421%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20CRESTRON%20TOUCHSCREENS%20x70&amp;severity=high&amp;id=68b84a86ad5a09ad00f67896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2416-cwe-307-improper-restriction-of-exce-599fe4ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2416%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20LimonDesk&amp;severity=high&amp;id=68b84702ad5a09ad00f6511b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0878-cwe-79-improper-neutralization-of-in-c0cc004b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Akinsoft%20LimonDesk&amp;severity=medium&amp;id=68b8437ead5a09ad00f6166b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-they-got-in-davitas-data-breach-db7c8773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20They%20Got%20In%20%E2%80%94%20DaVita%E2%80%99s%20Data%20Breach&amp;severity=high&amp;id=68b84029ad5a09ad00f5f8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3701-cwe-862-missing-authorization-in-mal-5a3e5737</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3701%3A%20Missing%20Authorization%20in%20Malcure%20Web%20Security%20Malcure%20Malware%20Scanner&amp;severity=null&amp;id=68b83ffbad5a09ad00f5f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53691-cwe-502-deserialization-of-untruste-80089fb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53691%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=68b83c77ad5a09ad00f5b6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53693-cwe-470-use-of-externally-controlle-b1f42ad7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53693%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Sitecore%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=critical&amp;id=68b83c77ad5a09ad00f5b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53694-cwe-200-exposure-of-sensitive-infor-7009b42b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53694%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sitecore%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=68b83c77ad5a09ad00f5b6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9901-use-of-cache-containing-sensitive-in-fdcfbf84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9901%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=68b83c77ad5a09ad00f5b700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/misconfigured-server-leaks-378-gb-of-navy-federal--61e6702c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Misconfigured%20Server%20Leaks%20378%20GB%20of%20Navy%20Federal%20Credit%20Union%20Backup%20Files&amp;severity=medium&amp;id=68b82056ad5a09ad00f41dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secondary-context-path-traversal-in-omnissa-worksp-20600b9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secondary%20Context%20Path%20Traversal%20in%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=68b81cd6ad5a09ad00f3c938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-anydesk-installer-spreads-metastealer-malware-afbae615</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AnyDesk%20Installer%20Spreads%20MetaStealer%20Malware%20Through%20ClickFix%20Scam&amp;severity=medium&amp;id=68b81247ad5a09ad00f2617e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaguar-land-rover-cyberattack-2025-what-happened-a-f8b18194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaguar%20Land%20Rover%20Cyberattack%202025%3A%20What%20Happened%20and%20Its%20Impact&amp;severity=medium&amp;id=68b81247ad5a09ad00f2617a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43166-cwe-276-incorrect-default-permissio-441db30f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43166%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=critical&amp;id=690a6f059e609817bf702efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2415-cwe-307-improper-restriction-of-exce-91ae8b19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2415%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20MyRezzta&amp;severity=high&amp;id=68b80438ad5a09ad00f096c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1740-cwe-307-improper-restriction-of-exce-baa338ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1740%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20MyRezzta&amp;severity=critical&amp;id=68b80438ad5a09ad00f096c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43115-cwe-20-improper-input-validation-in-feb6b99d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43115%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=690a6f039e609817bf702c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9219-cwe-862-missing-authorization-in-saa-7de0a93f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9219%3A%20CWE-862%20Missing%20Authorization%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20WP%20SMTP%20Plugin%20with%20Email%20Logs%20and%20Mobile%20App%20for%20Failure%20Notifications%20%E2%80%93%20Gmail%20SMTP%2C%20Office%20365%2C%20Brevo%2C%20Mailgun%2C%20Amazon%20SES%20and%20more&amp;severity=medium&amp;id=68b800b3ad5a09ad00f032bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9817-cwe-476-null-pointer-dereference-in--521cbb4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9817%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=68b7f2a3ad5a09ad00ef72bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anti-patterns-and-patterns-for-achieving-secure-ge-7c80ff8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=anti-patterns%20and%20patterns%20for%20achieving%20secure%20generation%20of%20code%20via%20AI&amp;severity=medium&amp;id=68b7ef23ad5a09ad00ef4ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8663-cwe-532-insertion-of-sensitive-infor-1b12ada8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8663%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20upKeeper%20Solutions%20upKeeper%20Manager&amp;severity=high&amp;id=68b7eb9cad5a09ad00eeec3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58210-cwe-862-missing-authorization-in-th-f8c98fbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58210%3A%20Missing%20Authorization%20in%20ThemeMove%20Makeaholic&amp;severity=null&amp;id=68b7e818ad5a09ad00eec202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32444-incorrect-privilege-assignment-in-i-9a4c0601</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32444%3A%20Incorrect%20Privilege%20Assignment%20in%20InspiryThemes%20RealHomes&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9378-cwe-79-improper-neutralization-of-in-4f06094f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Website%20Builder%20for%20the%20Block%20Editor&amp;severity=medium&amp;id=68b7e818ad5a09ad00eec205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21041-cwe-922-insecure-storage-of-sensiti-4236ea8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21041%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Secure%20Folder&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21040-cwe-925-improper-verification-of-in-4e872403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21040%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20S%20Assistant&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21039-cwe-925-improper-verification-of-in-0f9c3f6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21039%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20S%20Assistant&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21038-cwe-925-improper-verification-of-in-5d7ffdae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21038%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20S%20Assistant&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21037-cwe-284-improper-access-control-in--3d18ab78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21037%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20SamsungNotes&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21036-cwe-927-use-of-implicit-intent-for--5c3b195d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21036%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21035-cwe-284-improper-access-control-in--a8046aea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21035%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Calendar&amp;severity=medium&amp;id=68b7dd8fad5a09ad00edd1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21034-cwe-787-out-of-bounds-write-in-sams-94f2c016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21034%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21033-cwe-284-improper-access-control-in--a1b0d0ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21033%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21032-cwe-284-improper-access-control-in--a789e751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21032%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21031-cwe-284-improper-access-control-in--872bbc50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21031%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21030-cwe-280-improper-handling-of-insuff-eae5e6ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21030%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21029-cwe-280-improper-handling-of-insuff-540e9f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21029%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21028-cwe-269-improper-privilege-manageme-7f6ab935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21028%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21027-cwe-925-improper-verification-of-in-42a91ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21027%3A%20CWE-925%20%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21026-cwe-280-improper-handling-of-insuff-14edaef0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21026%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21025-cwe-284-improper-access-control-in--f9c1be52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21025%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68b7dd8ead5a09ad00edd1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-rapperbot-botnet-from-infection-to-ddos-4549c31d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20RapperBot%20Botnet%3A%20From%20Infection%20to%20DDoS%20%26%20More&amp;severity=medium&amp;id=68b7dd8dad5a09ad00edd125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-a-python-stealer-inf0s3c-stealer-26daa38c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNVEILING%20A%20PYTHON%20STEALER%20%E2%80%93%20INF0S3C%20STEALER&amp;severity=medium&amp;id=68b7dd8dad5a09ad00edd121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58272-cross-site-request-forgery-csrf-in--88c246f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58272%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20NTT%20EAST%2C%20Inc.%20Web%20Caster%20V130&amp;severity=low&amp;id=68b7d300ad5a09ad00ed52c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9785-cwe-295-improper-certificate-validat-299c4090</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9785%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20PaperCut%20Print%20Deploy&amp;severity=high&amp;id=68b7c4efad5a09ad00ec9825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58176-cwe-94-improper-control-of-generati-617c0385</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58176%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenAgentPlatform%20Dive&amp;severity=high&amp;id=68b7bde8ad5a09ad00ec5b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7039-improper-limitation-of-a-pathname-to-45184f19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7039%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=68b7a54cad5a09ad00eb4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58163-cwe-502-deserialization-of-untruste-de81b009</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58163%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68b79e44ad5a09ad00eb0921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9848-execution-after-redirect-in-scriptan-6dcafccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9848%3A%20Execution%20After%20Redirect%20in%20ScriptAndTools%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b79e44ad5a09ad00eb092c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9847-unrestricted-upload-in-scriptandtool-a01ab1d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9847%3A%20Unrestricted%20Upload%20in%20ScriptAndTools%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68b79e44ad5a09ad00eb0926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57806-cwe-312-cleartext-storage-of-sensit-c26c156c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57806%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20LearningCircuit%20local-deep-research&amp;severity=medium&amp;id=68b793b8ad5a09ad00ea85dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9845-cross-site-scripting-in-code-project-fe597d42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9845%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Fruit%20Shop%20Management%20System&amp;severity=medium&amp;id=68b79034ad5a09ad00ea404a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9843-information-disclosure-in-das-parkin-77a9fe58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9843%3A%20Information%20Disclosure%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68b79034ad5a09ad00ea4044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9842-information-disclosure-in-das-parkin-73613f73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9842%3A%20Information%20Disclosure%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68b7892dad5a09ad00e9da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-03-549a7bf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-03&amp;severity=medium&amp;id=68b8da9ead5a09ad00fc03b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57833-cwe-89-improper-neutralization-of-s-3ac921f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57833%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20djangoproject%20Django&amp;severity=high&amp;id=68b8a5f1ad5a09ad00fa3013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56139-na-21a40553</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56139%3A%20n%2Fa&amp;severity=medium&amp;id=68b8945dad5a09ad00f99e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57052-na-bfd6a96c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57052%3A%20n%2Fa&amp;severity=critical&amp;id=68b87f45ad5a09ad00f8f374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56803-na-448cf57a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56803%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57147-na-3521c6be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57147%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56752-na-3e240c8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56752%3A%20n%2Fa&amp;severity=critical&amp;id=68b87bc1ad5a09ad00f8da37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52494-na-2f882dac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52494%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45805-na-7ba9aefd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45805%3A%20n%2Fa&amp;severity=high&amp;id=68b87bc1ad5a09ad00f8da2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56689-na-af1104cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56689%3A%20n%2Fa&amp;severity=medium&amp;id=68b8783dad5a09ad00f89f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56761-na-df8754fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56761%3A%20n%2Fa&amp;severity=medium&amp;id=68b87504ad5a09ad00f87cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56760-na-935dd764</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56760%3A%20n%2Fa&amp;severity=medium&amp;id=68b87504ad5a09ad00f87cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56498-na-51bebda3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56498%3A%20n%2Fa&amp;severity=medium&amp;id=68b86330ad5a09ad00f7d7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55944-na-d3cc8f52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55944%3A%20n%2Fa&amp;severity=medium&amp;id=68b85f9fad5a09ad00f7a48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55852-na-e4d5c909</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55852%3A%20n%2Fa&amp;severity=high&amp;id=68b85f9fad5a09ad00f7a487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56435-na-ea89348f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56435%3A%20n%2Fa&amp;severity=medium&amp;id=68b85f9fad5a09ad00f7a484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57148-na-8df7535d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57148%3A%20n%2Fa&amp;severity=critical&amp;id=68b85898ad5a09ad00f74338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57146-na-745fe40c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57146%3A%20n%2Fa&amp;severity=high&amp;id=68b85898ad5a09ad00f74335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56608-na-6a1e0b6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56608%3A%20n%2Fa&amp;severity=medium&amp;id=68b85898ad5a09ad00f74330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57150-na-6245a8e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57150%3A%20n%2Fa&amp;severity=high&amp;id=68b85515ad5a09ad00f71e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57149-na-d127a959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57149%3A%20n%2Fa&amp;severity=medium&amp;id=68b85515ad5a09ad00f71e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57151-na-fb6e16ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57151%3A%20n%2Fa&amp;severity=high&amp;id=68b8518ead5a09ad00f6f1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26210-na-612e5535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26210%3A%20n%2Fa&amp;severity=high&amp;id=68b84a86ad5a09ad00f6789b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54588-cwe-416-use-after-free-in-envoyprox-0b3ee068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54588%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=68b78223ad5a09ad00e9adff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9841-unrestricted-upload-in-code-projects-287aab60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9841%3A%20Unrestricted%20Upload%20in%20code-projects%20Mobile%20Shop%20Management%20System&amp;severity=medium&amp;id=68b78d03ad5a09ad00ea2eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9260-cwe-502-deserialization-of-untrusted-0863a016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9260%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=68b77eabad5a09ad00e996ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-breach-fintech-firm-in-attempted-130m-bank-1324bdf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20breach%20fintech%20firm%20in%20attempted%20%24130M%20bank%20heist&amp;severity=high&amp;id=68b77e9fad5a09ad00e996a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9840-sql-injection-in-itsourcecode-sports-871be83f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9840%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b77b1bad5a09ad00e97caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9839-sql-injection-in-itsourcecode-studen-55124d52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9839%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b77414ad5a09ad00e94f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9838-sql-injection-in-itsourcecode-studen-943749e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9838%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b77414ad5a09ad00e94f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26416-elevation-of-privilege-in-google-an-498a89c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26416%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b77091ad5a09ad00e938e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22442-elevation-of-privilege-in-google-an-31f513f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22442%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22439-elevation-of-privilege-in-google-an-225aab9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22439%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22438-elevation-of-privilege-in-google-an-e6ed3b3e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22438%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22437-elevation-of-privilege-in-google-an-5cf14774</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22437%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22435-elevation-of-privilege-in-google-an-dc368023</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22435%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68b77091ad5a09ad00e938d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22434-elevation-of-privilege-in-google-an-d203406c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22434%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22433-elevation-of-privilege-in-google-an-ce90779a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22433%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77091ad5a09ad00e938c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22431-denial-of-service-in-google-android-912301f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22431%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=medium&amp;id=68b77091ad5a09ad00e938c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22430-information-disclosure-in-google-an-b5766a66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22430%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b77091ad5a09ad00e938c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22429-information-disclosure-in-google-an-892e90c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22429%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=critical&amp;id=68b77090ad5a09ad00e938b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22428-elevation-of-privilege-in-google-an-b04aec3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22428%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22427-elevation-of-privilege-in-google-an-274e5650</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22427%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22423-denial-of-service-in-google-android-5d62fc46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22423%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22422-elevation-of-privilege-in-google-an-051d71bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22422%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e938a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22421-information-disclosure-in-google-an-850f6833</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22421%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68b77090ad5a09ad00e9389e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22419-elevation-of-privilege-in-google-an-cbaa5670</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22419%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e9389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22418-elevation-of-privilege-in-google-an-19c428c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22418%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e93896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22417-elevation-of-privilege-in-google-an-7fdb1b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22417%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e93892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22416-elevation-of-privilege-in-google-an-a1808918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22416%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68b77090ad5a09ad00e9388e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49730-elevation-of-privilege-in-google-an-9d5fa300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49730%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1ce85912abc71d0be83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49720-elevation-of-privilege-in-google-an-b5353ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49720%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1ce85912abc71d0be7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40653-elevation-of-privilege-in-google-an-b8cf2721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40653%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9837-sql-injection-in-itsourcecode-studen-6ad5c821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9837%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b76d0bad5a09ad00e91e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9836-authorization-bypass-in-macrozheng-m-cd7ba1ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9836%3A%20Authorization%20Bypass%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68b76d0bad5a09ad00e91e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudflare-confirms-data-breach-linked-to-salesfor-b0be3488</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudflare%20Confirms%20Data%20Breach%20Linked%20to%20Salesforce%20and%20Salesloft%20Drift&amp;severity=high&amp;id=68b76602ad5a09ad00e8e835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9835-authorization-bypass-in-macrozheng-m-3bfaf3fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9835%3A%20Authorization%20Bypass%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68b76616ad5a09ad00e8e852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9834-cross-site-scripting-in-phpgurukul-s-a7bc17eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9834%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=68b75efbad5a09ad00e8b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9833-sql-injection-in-sourcecodester-onli-d8767761</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9833%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Farm%20Management%20System&amp;severity=medium&amp;id=68b75efbad5a09ad00e8b20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9832-sql-injection-in-sourcecodester-food-7317237a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9832%3A%20SQL%20Injection%20in%20SourceCodester%20Food%20Ordering%20Management%20System&amp;severity=medium&amp;id=68b757f4ad5a09ad00e8883c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9831-sql-injection-in-phpgurukul-beauty-p-01a80f15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9831%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b757f4ad5a09ad00e88844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9330-cwe-427-uncontrolled-search-path-ele-94a2eaa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9330%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e87001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9323-cwe-125-out-of-bounds-read-in-foxit--3d157edf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9323%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9324-cwe-125-out-of-bounds-read-in-foxit--28f0af27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9324%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9325-cwe-125-out-of-bounds-read-in-foxit--969bc25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9325%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9326-cwe-125-out-of-bounds-read-in-foxit--21bb8efb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9326%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e86ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9327-cwe-125-out-of-bounds-read-in-foxit--a66eef63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9327%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=68b7546fad5a09ad00e86ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9328-cwe-125-out-of-bounds-read-in-foxit--88134308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9328%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e86ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9329-cwe-125-out-of-bounds-read-in-foxit--68a8a315</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9329%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=68b7546fad5a09ad00e86ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8300-cwe-122-heap-based-buffer-overflow-i-ed512ada</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8300%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20rtl81xx%20SDK&amp;severity=high&amp;id=68b750ecad5a09ad00e85e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8299-cwe-122-heap-based-buffer-overflow-i-6cd717c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8299%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20rtl81xx%20SDK&amp;severity=high&amp;id=68b750ecad5a09ad00e85e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8298-cwe-125-out-of-bounds-read-in-realte-7084b7a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8298%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Realtek%20RTL8811AU&amp;severity=low&amp;id=68b750ecad5a09ad00e85e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8301-cwe-122-heap-based-buffer-overflow-i-e9b23c31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8301%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20RTL8811AU&amp;severity=high&amp;id=68b750ecad5a09ad00e85e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8302-cwe-122-heap-based-buffer-overflow-i-028315f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8302%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Realtek%20rtl81xx%20SDK&amp;severity=high&amp;id=68b750ecad5a09ad00e85e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9830-sql-injection-in-phpgurukul-beauty-p-4689937f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9830%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b750ecad5a09ad00e85e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9276-cwe-258-empty-password-in-configurat-0a144e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9276%3A%20CWE-258%3A%20Empty%20Password%20in%20Configuration%20File%20in%20Cockroach%20Labs%20cockroach-k8s-request-cert&amp;severity=critical&amp;id=68b750ecad5a09ad00e85e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9275-cwe-787-out-of-bounds-write-in-oxfor-c9f6fce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9275%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Oxford%20Instruments%20Imaris%20Viewer&amp;severity=high&amp;id=68b750ecad5a09ad00e85e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9274-cwe-824-access-of-uninitialized-poin-cce57658</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9274%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Oxford%20Instruments%20Imaris%20Viewer&amp;severity=high&amp;id=68b750ecad5a09ad00e85e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9273-cwe-552-files-or-directories-accessi-ad74b2a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9273%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20CData%20API%20Server&amp;severity=medium&amp;id=68b750ecad5a09ad00e85e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8613-cwe-78-improper-neutralization-of-sp-eba43314</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vacron%20Camera&amp;severity=high&amp;id=68b74d68ad5a09ad00e846b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6685-cwe-862-missing-authorization-in-ate-8fe9b012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6685%3A%20CWE-862%3A%20Missing%20Authorization%20in%20ATEN%20eco%20DC&amp;severity=high&amp;id=68b74d68ad5a09ad00e846a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7976-cwe-502-deserialization-of-untrusted-c394c2d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7976%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=68b74d68ad5a09ad00e846af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7975-cwe-22-improper-limitation-of-a-path-a5bfe37e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7975%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Anritsu%20ShockLine&amp;severity=high&amp;id=68b74d68ad5a09ad00e846ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-mystrodx-backdoor-using-dns-an-2ddbb2c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20of%20MystRodX%20Backdoor%20Using%20DNS%20and%20ICMP%20Triggers%20for%20Stealthy%20Control&amp;severity=high&amp;id=68b73f57ad5a09ad00e7be8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-group-expands-malware-arsenal-with-pondrat-afa279ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20Group%20Expands%20Malware%20Arsenal%20With%20PondRAT%2C%20ThemeForestRAT%2C%20and%20RemotePE&amp;severity=high&amp;id=68b73f57ad5a09ad00e7be90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36162-cwe-497-exposure-of-sensitive-syste-93b24a78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36162%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=68b73f70ad5a09ad00e7bf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9829-sql-injection-in-phpgurukul-beauty-p-0882f5ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9829%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b73bd2ad5a09ad00e79f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43726-cwe-59-improper-link-resolution-bef-a1c2412c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43726%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Alienware%20Command%20Center%205.x%20(AWCC)&amp;severity=medium&amp;id=68b7384fad5a09ad00e77ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57777-cwe-1285-improper-validation-of-spe-ecfb2ea7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57777%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57775-cwe-1285-improper-validation-of-spe-3e591a54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57775%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9188-cwe-502-deserialization-of-untrusted-906148c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9188%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57778-cwe-1285-improper-validation-of-spe-bd4fba26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57778%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57776-cwe-1285-improper-validation-of-spe-ca597d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57776%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57774-cwe-1285-improper-validation-of-spe-24103425</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57774%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9189-cwe-1285-improper-validation-of-spec-4c9219d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9189%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Digilent%20DASYLab&amp;severity=high&amp;id=68b7384fad5a09ad00e77f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/three-lazarus-rats-coming-for-your-cheese-ce48350c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Three%20Lazarus%20RATs%20coming%20for%20your%20cheese&amp;severity=medium&amp;id=68b742daad5a09ad00e7dc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9828-risky-cryptographic-algorithm-in-ten-45a99786</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9828%3A%20Risky%20Cryptographic%20Algorithm%20in%20Tenda%20CP6&amp;severity=medium&amp;id=68b726bbad5a09ad00e6df39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9696-cwe-798-use-of-hard-coded-credential-f014fe6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9696%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SunPower%20PVS6&amp;severity=critical&amp;id=68b71fb3ad5a09ad00e56fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-zscaler-and-pagerduty-hit-in-sa-86f8ca39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%2C%20Zscaler%20and%20PagerDuty%20Hit%20in%20Salesforce%20Linked%20Data%20Breaches&amp;severity=high&amp;id=68b70a9aad5a09ad00df84f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rapperbot-infection-ddos-in-seconds-deep-dive-writ-03e2656a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RapperBot%3A%20infection%20%E2%86%92%20DDoS%20in%20seconds%20(deep%20dive%20write-up)&amp;severity=medium&amp;id=68b7071dad5a09ad00df47a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9784-vulnerability-in-red-hat-red-hat-bui-5c8b2535</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9784%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=68b6f583ad5a09ad00ddfc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deep-specter-research-uncovers-a-global-phishing-e-ca4cbeaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deep%20Specter%20Research%20Uncovers%20a%20Global%20Phishing%20Empire&amp;severity=medium&amp;id=68b6f202ad5a09ad00ddc658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2413-cwe-307-improper-restriction-of-exce-2c6d4b98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2413%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20ProKuafor&amp;severity=high&amp;id=68b6f583ad5a09ad00ddfc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0670-cwe-639-authorization-bypass-through-80ef166b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0670%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Akinsoft%20ProKuafor&amp;severity=medium&amp;id=68b6f1fead5a09ad00ddc634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukrainian-network-fdn3-launches-massive-brute-forc-c36c48c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukrainian%20Network%20FDN3%20Launches%20Massive%20Brute-Force%20Attacks%20on%20SSL%20VPN%20and%20RDP%20Devices&amp;severity=high&amp;id=68b6e3edad5a09ad00dca59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-connected-third-party-drift-application-22d5e75b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce-Connected%20Third-Party%20Drift%20Application%20Incident%20Response&amp;severity=high&amp;id=68b6e3edad5a09ad00dca596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2414-cwe-307-improper-restriction-of-exce-888eb436</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2414%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20OctoCloud&amp;severity=high&amp;id=68b6dce7ad5a09ad00dc785b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0640-cwe-639-authorization-bypass-through-c20d04d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0640%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Akinsoft%20OctoCloud&amp;severity=medium&amp;id=68b6dce7ad5a09ad00dc7861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46810-cwe-61-unix-symbolic-link-symlink-f-5cfa6a7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46810%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20openSUSE%20Tumbleweed&amp;severity=high&amp;id=68b6d960ad5a09ad00dc4a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52551-cwe-306-missing-authentication-for--a1f24af2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52551%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Copeland%20LP%20E2%20Facility%20Management%20System&amp;severity=critical&amp;id=68b6d960ad5a09ad00dc4a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mobsf-security-testing-tool-vulnerability-let-atta-1bc94d83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MobSF%20Security%20Testing%20Tool%20Vulnerability%20Let%20Attackers%20Upload%20Malicious%20Files&amp;severity=critical&amp;id=68b6d5dbad5a09ad00dbf8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52550-cwe-347-improper-verification-of-cr-1dc1e45e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52550%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e9ad5a09ad00dbf905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52549-cwe-522-insufficiently-protected-cr-f37f1a3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52549%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=critical&amp;id=68b6d5e9ad5a09ad00dbf902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52548-cwe-1242-in-copeland-lp-e3-supervis-044aa78d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52548%3A%20CWE-1242%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=medium&amp;id=68b6d5e9ad5a09ad00dbf8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52547-cwe-20-improper-input-validation-in-0de581fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52547%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e9ad5a09ad00dbf8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52546-cwe-434-unrestricted-upload-of-file-badacfdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52546%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=medium&amp;id=68b6d5e8ad5a09ad00dbf8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52545-cwe-522-insufficiently-protected-cr-453b43c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52545%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e8ad5a09ad00dbf8f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52544-cwe-20-improper-input-validation-in-dd3712fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52544%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=high&amp;id=68b6d5e8ad5a09ad00dbf8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52543-cwe-836-use-of-password-hash-instea-0f064814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52543%3A%20CWE-836%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=medium&amp;id=68b6d5e8ad5a09ad00dbf8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6519-cwe-522-insufficiently-protected-cre-aeffc36e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6519%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Copeland%20LP%20E3%20Supervisory%20Control&amp;severity=critical&amp;id=68b6d5e9ad5a09ad00dbf908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5662-cwe-502-deserialization-of-untrusted-91b60adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5662%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=68b6d5e9ad5a09ad00dbf90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/golden-dmsa-5fa92611</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Golden%20dMSA&amp;severity=medium&amp;id=68b6ced5ad5a09ad00dbae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ksmbd-fuzzing-improvements-and-vulnerability-disco-465fa694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ksmbd%20Fuzzing%20Improvements%20and%20Vulnerability%20Discovery&amp;severity=medium&amp;id=68b6b9c7ad5a09ad00daefe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silver-fox-apt-exploits-signed-windows-driver-to-d-351bd566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silver%20Fox%20APT%20Exploits%20Signed%20Windows%20Driver%20to%20Deliver%20ValleyRAT%20Malware&amp;severity=high&amp;id=68b6b9bbad5a09ad00daef7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cti-analysis-malicious-email-campaign-941ef63e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CTI%20Analysis%3A%20Malicious%20Email%20Campaign&amp;severity=medium&amp;id=68b6b63cad5a09ad00dabf70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-package-nodejs-smtp-mimics-nodemaile-07792c55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20Package%20nodejs-smtp%20Mimics%20Nodemailer%2C%20Targets%20Atomic%20and%20Exodus%20Wallets&amp;severity=high&amp;id=68b6b2b2ad5a09ad00daa4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9573-cwe-78-improper-neutralization-of-sp-5be17cdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9573%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TYPO3%20Extension%20%22TYPO3%20Backup%20Plus%22&amp;severity=high&amp;id=68b6b2bfad5a09ad00daa4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sindoor-dropper-new-phishing-campaign-dc5a03e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sindoor%20Dropper%3A%20New%20Phishing%20Campaign&amp;severity=medium&amp;id=68b6b63cad5a09ad00dabf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41031-cwe-863-incorrect-authorization-in--285bee86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41031%3A%20CWE-863%20Incorrect%20Authorization%20in%20T-INNOVA%20Deporsite&amp;severity=medium&amp;id=68b6abafad5a09ad00da45c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41030-cwe-863-incorrect-authorization-in--edc1a342</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41030%3A%20CWE-863%20Incorrect%20Authorization%20in%20T-INNOVA%20Deporsite&amp;severity=medium&amp;id=68b6abafad5a09ad00da45c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41690-cwe-532-insertion-of-sensitive-info-d7b4fc8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41690%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Endress%2BHauser%20Promag%2010%20with%20HART&amp;severity=high&amp;id=68b6a826ad5a09ad00da0d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44017-insertion-of-sensitive-information--d9074f78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44017%3A%20Insertion%20of%20sensitive%20information%20into%20sent%20data%20in%20Gunosy%20Inc.%20%22Gunosy%22%20App%20for%20Android&amp;severity=medium&amp;id=68b6a11fad5a09ad00d9659a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9815-missing-authentication-in-alaneuler--8493c95a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9815%3A%20Missing%20Authentication%20in%20alaneuler%20batteryKid&amp;severity=high&amp;id=68b676eead5a09ad00d7ce37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9814-sql-injection-in-phpgurukul-beauty-p-bb2fc371</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9814%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=68b66c63ad5a09ad00d74c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9813-buffer-overflow-in-tenda-ch22-eaa1878d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9813%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68b66c63ad5a09ad00d74c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9812-buffer-overflow-in-tenda-ch22-badfe5e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9812%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68b661d8ad5a09ad00d709c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9811-sql-injection-in-campcodes-farm-mana-56c97c7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9811%3A%20SQL%20Injection%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68b661d8ad5a09ad00d709bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8662-vulnerability-in-openam-consortium-o-69c94821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8662%3A%20Vulnerability%20in%20OpenAM%20consortium%20OpenAM&amp;severity=low&amp;id=68b653c6ad5a09ad00d6b130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58178-cwe-77-improper-neutralization-of-s-b2a23e51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58178%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20SonarSource%20sonarqube-scan-action&amp;severity=high&amp;id=68b64234ad5a09ad00d5f972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58162-cwe-22-improper-limitation-of-a-pat-0a04bd44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58162%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=68b64234ad5a09ad00d5f96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58161-cwe-22-improper-limitation-of-a-pat-8dd82a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58161%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=low&amp;id=68b64234ad5a09ad00d5f967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9806-hard-coded-credentials-in-tenda-f120-688d4d6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9806%3A%20Hard-coded%20Credentials%20in%20Tenda%20F1202&amp;severity=low&amp;id=68b63eafad5a09ad00d5e517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9805-server-side-request-forgery-in-simst-77f0315b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9805%3A%20Server-Side%20Request%20Forgery%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68b63eafad5a09ad00d5e50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-02-47fd8f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-02&amp;severity=medium&amp;id=68b7891ead5a09ad00e9d59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32100-na-b6acbd45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32100%3A%20n%2Fa&amp;severity=medium&amp;id=68b734cbad5a09ad00e76254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32098-na-994ce7aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32098%3A%20n%2Fa&amp;severity=medium&amp;id=68b73147ad5a09ad00e73bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55824-na-2e15fc2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55824%3A%20n%2Fa&amp;severity=medium&amp;id=68b72dc3ad5a09ad00e7240c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51966-na-20bb7138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51966%3A%20n%2Fa&amp;severity=medium&amp;id=68b72dc3ad5a09ad00e72408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50565-na-2a029e22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50565%3A%20n%2Fa&amp;severity=medium&amp;id=68b72dc3ad5a09ad00e72405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55474-na-f2a37ec3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55474%3A%20n%2Fa&amp;severity=medium&amp;id=68b726bbad5a09ad00e6df34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55476-na-ce9c5cc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55476%3A%20n%2Fa&amp;severity=medium&amp;id=68b726bbad5a09ad00e6df2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55472-na-8198fb20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55472%3A%20n%2Fa&amp;severity=medium&amp;id=68b72337ad5a09ad00e5b3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55473-na-36c37be7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55473%3A%20n%2Fa&amp;severity=medium&amp;id=68b71fb3ad5a09ad00e56fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55373-na-9924d73b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55373%3A%20n%2Fa&amp;severity=medium&amp;id=68b71fb3ad5a09ad00e56fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55372-na-eba2f350</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55372%3A%20n%2Fa&amp;severity=medium&amp;id=68b718abad5a09ad00e3ac51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57616-na-604922f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57616%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e372a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57615-na-342b1b0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57615%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e3729e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57614-na-dc9ea377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57614%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e3729b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57613-na-d9501216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57613%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e37298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57612-na-97cd750e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57612%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e37295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57611-na-e1b5d9bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57611%3A%20n%2Fa&amp;severity=medium&amp;id=68b71529ad5a09ad00e37292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54599-na-60d2ac56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54599%3A%20n%2Fa&amp;severity=high&amp;id=68b70e25ad5a09ad00e2603a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50757-na-4a87725c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50757%3A%20n%2Fa&amp;severity=medium&amp;id=68b7071aad5a09ad00df4788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50755-na-f4798c7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50755%3A%20n%2Fa&amp;severity=medium&amp;id=68b7071aad5a09ad00df4785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46047-na-6a4d3170</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46047%3A%20n%2Fa&amp;severity=medium&amp;id=68b6f1fead5a09ad00ddc637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57140-na-7d85d817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57140%3A%20n%2Fa&amp;severity=critical&amp;id=68b6dce7ad5a09ad00dc7864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56254-na-738d4590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56254%3A%20n%2Fa&amp;severity=medium&amp;id=68b6dce7ad5a09ad00dc785e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9802-sql-injection-in-remoteclinic-e1ce4a5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9802%3A%20SQL%20Injection%20in%20RemoteClinic&amp;severity=medium&amp;id=68b6309ead5a09ad00d548a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9801-path-traversal-in-simstudioai-sim-d9971b39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9801%3A%20Path%20Traversal%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68b62996ad5a09ad00d519fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9800-unrestricted-upload-in-simstudioai-s-bb87374a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9800%3A%20Unrestricted%20Upload%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=68b6228ead5a09ad00d481cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9799-server-side-request-forgery-in-langf-6564d3bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9799%3A%20Server-Side%20Request%20Forgery%20in%20Langfuse&amp;severity=low&amp;id=68b61b86ad5a09ad00d4543f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9797-injection-in-mrvautin-expresscart-ce8342ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9797%3A%20Injection%20in%20mrvautin%20expressCart&amp;severity=medium&amp;id=68b61b86ad5a09ad00d45438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9796-cross-site-scripting-in-thinkgem-jee-d4ab70ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9796%3A%20Cross%20Site%20Scripting%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=68b6147ead5a09ad00d41685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28988-cwe-502-deserialization-of-untruste-45de83aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28988%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=69a0a1cc85912abc71d0bd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9795-unrestricted-upload-in-xujeff-tianti-9c2727f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9795%3A%20Unrestricted%20Upload%20in%20xujeff%20tianti%20%E5%A4%A9%E6%A2%AF&amp;severity=medium&amp;id=68b60d77ad5a09ad00d3ee9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-show-hidden-commands-in-images-exploit-afa5680c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Show%20Hidden%20Commands%20in%20Images%20Exploit%20AI%20Chatbots%20and%20Steal%20Data&amp;severity=high&amp;id=68b609f2ad5a09ad00d3d58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9794-sql-injection-in-campcodes-computer--2d78abcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9794%3A%20SQL%20Injection%20in%20Campcodes%20Computer%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68b6066ead5a09ad00d3bcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9793-sql-injection-in-itsourcecode-apartm-83d8d012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9793%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b5fc00ad5a09ad00d35a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-droppers-now-deliver-sms-stealers-and-spyw-29cf7c26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Droppers%20Now%20Deliver%20SMS%20Stealers%20and%20Spyware%2C%20Not%20Just%20Banking%20Trojans&amp;severity=high&amp;id=68b5fbe1ad5a09ad00d3593d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-hits-zscaler-via-salesloft-dri-a5c1e208</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply-chain%20attack%20hits%20Zscaler%20via%20Salesloft%20Drift%2C%20leaking%20customer%20info&amp;severity=high&amp;id=68b5fbe1ad5a09ad00d35941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9792-sql-injection-in-itsourcecode-apartm-2f64fa4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9792%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b5f85dad5a09ad00d3479c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9810-cwe-367-time-of-check-time-of-use-to-89f01062</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9810%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20antirez%20linenoise&amp;severity=medium&amp;id=68b5f155ad5a09ad00d306be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9791-stack-based-buffer-overflow-in-tenda-9a8ff63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9791%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68b5f155ad5a09ad00d306b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9809-cwe-787-out-of-bounds-write-in-libre-b84de0e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9809%3A%20CWE-787%20Out-of-bounds%20Write%20in%20libretro%20libretro-common&amp;severity=high&amp;id=68b5ea4dad5a09ad00d29545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9790-sql-injection-in-sourcecodester-hote-39caf821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9790%3A%20SQL%20Injection%20in%20SourceCodester%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68b5ea4dad5a09ad00d2953e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3586-cwe-863-incorrect-authorization-in-l-3ce82344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3586%3A%20CWE-863%20Incorrect%20Authorization%20in%20Liferay%20Portal&amp;severity=high&amp;id=68b5e345ad5a09ad00d1e197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9789-sql-injection-in-sourcecodester-onli-dea0362c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9789%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68b5e345ad5a09ad00d1e19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9788-sql-injection-in-sourcecodester-scho-b0195768</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9788%3A%20SQL%20Injection%20in%20SourceCodester%20School%20Log%20Management%20System&amp;severity=medium&amp;id=68b5dc3cad5a09ad00d1abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-koreas-scarcruft-targets-academics-with-rokr-54e50b22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%E2%80%99s%20ScarCruft%20Targets%20Academics%20With%20RokRAT%20Malware&amp;severity=medium&amp;id=68b5d8b8ad5a09ad00d19e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/article-ipv6-security-attacks-and-detection-method-dabfcd88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BArticle%5D%20IPv6%20Security%3A%20Attacks%20and%20Detection%20Methods&amp;severity=medium&amp;id=68b5d1b1ad5a09ad00d13c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57799-cwe-78-improper-neutralization-of-s-d35a63c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57799%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20lemon8866%20StreamVault&amp;severity=high&amp;id=68b5c3a1ad5a09ad00d0bec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55007-cwe-918-server-side-request-forgery-232dad52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55007%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20KnowageLabs%20Knowage-Server&amp;severity=low&amp;id=68b5c3a1ad5a09ad00d0bebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9786-sql-injection-in-campcodes-online-le-d4b6a555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9786%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b5c01cad5a09ad00d0a275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9783-buffer-overflow-in-totolink-a702r-c2519098</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9783%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b5b20dad5a09ad00d0144e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0656-cwe-79-improper-neutralization-of-in-8f6cb2ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33082-cwe-79-improper-neutralization-of-i-b79874f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33083-cwe-79-improper-neutralization-of-i-501f6e17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33084-cwe-327-use-of-a-broken-or-risky-cr-663bfceb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33084%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33099-cwe-295-improper-certificate-valida-bf8844e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33099%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33102-cwe-327-use-of-a-broken-or-risky-cr-cf10e780</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33102%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68b5ae89ad5a09ad00cffb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9782-buffer-overflow-in-totolink-a702r-5de4adc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9782%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b5ab04ad5a09ad00cfe65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-browsers-become-the-attack-surface-rethinking-5815e61b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Browsers%20Become%20the%20Attack%20Surface%3A%20Rethinking%20Security%20for%20Scattered%20Spider&amp;severity=high&amp;id=68b5a780ad5a09ad00cfcee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9781-buffer-overflow-in-totolink-a702r-c5ddb9e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9781%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b5a3fcad5a09ad00cfaebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-on-pennsylvanias-ag-office-disru-5c13ab06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20on%20Pennsylvania%E2%80%99s%20AG%20Office%20Disrupts%20Court%20Cases&amp;severity=high&amp;id=68b5a077ad5a09ad00cfa03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9780-buffer-overflow-in-totolink-a702r-fac0f29a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9780%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b59cf4ad5a09ad00cf6447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2412-cwe-307-improper-restriction-of-exce-b599a7d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2412%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Akinsoft%20QR%20Menu&amp;severity=high&amp;id=68b59972ad5a09ad00cf4509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0610-cwe-352-cross-site-request-forgery-c-acbb7fb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0610%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ak%C4%B1nsoft%20QR%20Men%C3%BC&amp;severity=high&amp;id=68b59972ad5a09ad00cf4506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9779-buffer-overflow-in-totolink-a702r-908ad5fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9779%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68b595edad5a09ad00cf3268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9778-hard-coded-credentials-in-tenda-w12-7cf88476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9778%3A%20Hard-coded%20Credentials%20in%20Tenda%20W12&amp;severity=low&amp;id=68b58ee5ad5a09ad00cef137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36133-cwe-532-insertion-of-sensitive-info-145bcae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36133%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=68b58b60ad5a09ad00cea898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-disrupts-russian-apt29-watering-hole-target-2bbbf37c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Disrupts%20Russian%20APT29%20Watering%20Hole%20Targeting%20Microsoft%20Authentication&amp;severity=medium&amp;id=68b580d4ad5a09ad00ce3b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9775-unrestricted-upload-in-remoteclinic-82ad2f43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9775%3A%20Unrestricted%20Upload%20in%20RemoteClinic&amp;severity=medium&amp;id=68b580e4ad5a09ad00ce3b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fraudster-stole-over-15-million-from-city-of-balti-16857b31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fraudster%20stole%20over%20%241.5%20million%20from%20city%20of%20Baltimore&amp;severity=medium&amp;id=68b579cbad5a09ad00cd5d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scarcruft-uses-rokrat-malware-in-operation-hankook-54de5d28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScarCruft%20Uses%20RokRAT%20Malware%20in%20Operation%20HanKook%20Phantom%20Targeting%20South%20Korean%20Academics&amp;severity=high&amp;id=68b579cbad5a09ad00cd5d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9774-information-disclosure-in-remoteclin-c6430c9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9774%3A%20Information%20Disclosure%20in%20RemoteClinic&amp;severity=medium&amp;id=68b579dfad5a09ad00cd5dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8-cybersecurity-news-worth-your-attention-this-wee-a6602148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8%20Cybersecurity%20News%20Worth%20Your%20Attention%20this%20Week%20Summarised%20%E2%80%93%202025-09-01&amp;severity=medium&amp;id=68b57646ad5a09ad00cd2188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9773-cross-site-scripting-in-remoteclinic-aa7f0a78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9773%3A%20Cross%20Site%20Scripting%20in%20RemoteClinic&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd036a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/traps-beneath-fault-repair-analysis-of-recent-atta-b67890a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Traps%20Beneath%20Fault%20Repair%3A%20Analysis%20of%20Recent%20Attacks%20Using%20ClickFix%20Technique&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-53-gamaredon-attack-on-ukrainian-d743a9ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-53%20(Gamaredon)%20Attack%20on%20Ukrainian%20Government%20Agencies&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-disrupts-watering-hole-campaign-by-russias--1d657948</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20disrupts%20watering%20hole%20campaign%20by%20Russia&apos;s%20APT29&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tinkywinkey-keylogger-ab948138</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TINKYWINKEY%20KEYLOGGER&amp;severity=medium&amp;id=68b572c2ad5a09ad00cd02db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9772-unrestricted-upload-in-remoteclinic-d2df5005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9772%3A%20Unrestricted%20Upload%20in%20RemoteClinic&amp;severity=medium&amp;id=68b56bd0ad5a09ad00cc91b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9771-sql-injection-in-sourcecodester-eye--9846118a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9771%3A%20SQL%20Injection%20in%20SourceCodester%20Eye%20Clinic%20Management%20System&amp;severity=medium&amp;id=68b564b3ad5a09ad00cc4d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9770-sql-injection-in-campcodes-hospital--9a48686f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9770%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b55dabad5a09ad00cbca18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9769-command-injection-in-d-link-di-7400g-2a8ce06d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9769%3A%20Command%20Injection%20in%20D-Link%20DI-7400G%2B&amp;severity=low&amp;id=68b556a3ad5a09ad00cb6387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9768-sql-injection-in-itsourcecode-sports-93ad0048</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9768%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b54f9bad5a09ad00ca9f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58318-cwe-306-missing-authentication-for--c415918c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58318%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Delta%20Electronics%20DIAView&amp;severity=medium&amp;id=68b54c17ad5a09ad00ca82bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9767-sql-injection-in-itsourcecode-sports-968da67e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9767%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b54893ad5a09ad00ca5c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9766-sql-injection-in-itsourcecode-sports-577bebb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9766%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9765-sql-injection-in-itsourcecode-sports-64ed2e9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9765%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b53a84ad5a09ad00c9ab97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9764-sql-injection-in-itsourcecode-sports-8a56389e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9764%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b5337bad5a09ad00c96e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54857-improper-neutralization-of-special--0c9250a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54857%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Seiko%20Solutions%20Inc.%20SkyBridge%20BASIC%20MB-A130&amp;severity=critical&amp;id=68b5300ead5a09ad00c93948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20707-cwe-416-use-after-free-in-mediatek--f9db8a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20707%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6853%2C%20MT6877%2C%20MT6893%2C%20MT6899%2C%20MT6991%2C%20MT8196%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8786%2C%20MT8788E%2C%20MT8791T%2C%20MT8792%2C%20MT8796%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68b52c73ad5a09ad00c8fc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20706-cwe-416-use-after-free-in-mediatek--7e4b2d34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20706%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT6899%2C%20MT6989%2C%20MT6991%2C%20MT8676%2C%20MT8678&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20705-cwe-416-use-after-free-in-mediatek--f0a1cc86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20705%3A%20CWE-416%20Use%20After%20Free%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT2735%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6980D%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8169%2C%20MT8186%2C%20MT8188%2C%20MT8676%2C%20MT8678%2C%20MT8696%2C%20MT8775%2C%20MT8792%2C%20MT8796&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20704-cwe-787-out-of-bounds-write-in-medi-e125fc50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20704%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6813%2C%20MT6835%2C%20MT6835T%2C%20MT6878%2C%20MT6878M%2C%20MT6897%2C%20MT6899%2C%20MT6991%2C%20MT8676%2C%20MT8678%2C%20MT8792%2C%20MT8863%2C%20MT8873%2C%20MT8883&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20703-cwe-125-out-of-bounds-read-in-media-edc0addd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20703%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68b52c73ad5a09ad00c8fc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20708-cwe-787-out-of-bounds-write-in-medi-a4a70418</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20708%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6813%2C%20MT6815%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=high&amp;id=68b52c73ad5a09ad00c8fc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6507-cwe-502-deserialization-of-untrusted-fcb4a255</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6507%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=68b52c73ad5a09ad00c8fc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9763-sql-injection-in-campcodes-online-le-15c2c9ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9763%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b52c73ad5a09ad00c8fc35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9761-sql-injection-in-campcodes-online-fe-eb5f8621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9761%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Feeds%20Product%20Inventory%20System&amp;severity=medium&amp;id=68b5256bad5a09ad00c88826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9760-improper-authorization-in-portabilis-9c0abcf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9760%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b51e63ad5a09ad00c8282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7731-cwe-319-cleartext-transmission-of-se-0bf88cee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7731%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=high&amp;id=68b51adfad5a09ad00c81c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7405-cwe-306-missing-authentication-for-c-c9aedcf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7405%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=high&amp;id=68b51adfad5a09ad00c81c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9759-sql-injection-in-campcodes-courier-m-196c8265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9759%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=68b5175bad5a09ad00c805db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9758-sql-injection-in-deepakmisal24-chemi-ddf96bc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9758%3A%20SQL%20Injection%20in%20deepakmisal24%20Chemical%20Inventory%20Management%20System&amp;severity=medium&amp;id=68b51053ad5a09ad00c7d0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-day-alert-automated-discovery-of-critical-cwm-d9ff5f58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZERO-DAY%20ALERT%3A%20Automated%20Discovery%20of%20Critical%20CWMP%20Stack%20Overflow%20in%20TP-Link%20Routers&amp;severity=critical&amp;id=68b50ccfad5a09ad00c7b5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9570-cwe-23-relative-path-traversal-in-su-5fc13631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9570%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b51053ad5a09ad00c7d0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9569-cwe-79-improper-neutralization-of-in-6481b125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9568-cwe-79-improper-neutralization-of-in-fc7105e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9567-cwe-79-improper-neutralization-of-in-72fe125c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9757-sql-injection-in-campcodes-courier-m-40a36d44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9757%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=68b5094bad5a09ad00c7a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9756-sql-injection-in-phpgurukul-user-man-a0c381d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9756%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9755-cross-site-scripting-in-khanakag-17--0b2909ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9755%3A%20Cross%20Site%20Scripting%20in%20Khanakag-17%20Library%20Management%20System&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9754-cross-site-scripting-in-campcodes-on-48f27ea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9754%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9753-cross-site-scripting-in-campcodes-on-fb98032e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9753%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b4f0afad5a09ad00c625f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9752-os-command-injection-in-d-link-dir-8-85759c89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9752%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-852&amp;severity=medium&amp;id=68b4ea0cad5a09ad00c5da88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-09-01-75b8764c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-09-01&amp;severity=medium&amp;id=68b6379ead5a09ad00d57d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9751-sql-injection-in-campcodes-online-le-167f60d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9751%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b4df1bad5a09ad00c44eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9750-sql-injection-in-campcodes-online-le-97e51f47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9750%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Learning%20Management%20System&amp;severity=medium&amp;id=68b4d814ad5a09ad00c3cecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9749-sql-injection-in-hkritesh009-grocery-72e1de1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9749%3A%20SQL%20Injection%20in%20HKritesh009%20Grocery%20List%20Management%20Web%20App&amp;severity=medium&amp;id=68b4d10cad5a09ad00c375df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9748-stack-based-buffer-overflow-in-tenda-0b456634</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9748%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68b4ca04ad5a09ad00c25241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9747-cross-site-request-forgery-in-koille-493c2b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9747%3A%20Cross-Site%20Request%20Forgery%20in%20Koillection&amp;severity=medium&amp;id=68b4c2fcad5a09ad00c21962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9746-cross-site-scripting-in-campcodes-ho-cbb406e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9746%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68b4bbf4ad5a09ad00c1d425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9745-os-command-injection-in-d-link-di-50-1f158ca3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9745%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-500WF&amp;severity=medium&amp;id=68b4b4ecad5a09ad00c1ab0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9744-sql-injection-in-campcodes-online-lo-81ddcffe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9744%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68b4ade4ad5a09ad00c106df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9743-sql-injection-in-code-projects-human-42195e9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9743%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b4a6e1ad5a09ad00c0de41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9742-sql-injection-in-code-projects-human-d7839641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9742%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b49fd4ad5a09ad00c096f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9741-sql-injection-in-code-projects-human-9178d783</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9741%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b498ccad5a09ad00c073d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9740-sql-injection-in-code-projects-human-6eaf17fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9740%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b491c5ad5a09ad00c04dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9739-sql-injection-in-campcodes-online-wa-0a248a1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9739%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=68b48abdad5a09ad00bff797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-fake-ids-marketplace-veriftoolsnet-oper-05a751a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20Fake%20IDs%20Marketplace%20VerifTools.Net%2C%20Operators%20Relaunch%20with%20VerifTools.com&amp;severity=medium&amp;id=68b483b4ad5a09ad00bfd5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9738-cross-site-scripting-in-portabilis-i-ba99ca56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9738%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b48030ad5a09ad00bfb367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9737-cross-site-scripting-in-o2oa-546392ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9737%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b47cb1ad5a09ad00bf5da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9736-cross-site-scripting-in-o2oa-65b1358c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9736%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b475a6ad5a09ad00bf347d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-0-day-exploited-in-attacks-on-targeted-io-000bf690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%200-Day%20Exploited%20in%20Attacks%20on%20Targeted%20iOS%20and%20macOS%20Users&amp;severity=high&amp;id=68b46e9dad5a09ad00be4302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9735-cross-site-scripting-in-o2oa-89331547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9735%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b46eaaad5a09ad00be4373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9734-cross-site-scripting-in-o2oa-d1802a0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9734%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b46795ad5a09ad00bd3d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9733-sql-injection-in-code-projects-human-1e181541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9733%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=68b4608fad5a09ad00bc6487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9732-memory-corruption-in-dcmtk-ff152ac2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9732%3A%20Memory%20Corruption%20in%20DCMTK&amp;severity=medium&amp;id=68b45987ad5a09ad00bbef96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9731-hard-coded-credentials-in-tenda-ac9-7b3ebd60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9731%3A%20Hard-coded%20Credentials%20in%20Tenda%20AC9&amp;severity=low&amp;id=68b45281ad5a09ad00bb2287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9730-sql-injection-in-itsourcecode-apartm-b2af2d7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9730%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b44b77ad5a09ad00bac57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9729-sql-injection-in-phpgurukul-online-c-24de45bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9729%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68b4446fad5a09ad00ba8b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9728-cross-site-scripting-in-givanz-vvveb-f45d6862</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9728%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68b43d68ad5a09ad00ba480e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9727-os-command-injection-in-d-link-dir-8-ec132fad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9727%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-816L&amp;severity=medium&amp;id=68b43660ad5a09ad00ba13d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9726-sql-injection-in-campcodes-farm-mana-63c5e248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9726%3A%20SQL%20Injection%20in%20Campcodes%20Farm%20Management%20System&amp;severity=medium&amp;id=68b42f58ad5a09ad00b9f021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9725-use-of-hard-coded-password-in-cudy-l-c90c170f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9725%3A%20Use%20of%20Hard-coded%20Password%20in%20Cudy%20LT500E&amp;severity=low&amp;id=68b42148ad5a09ad00b97195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9724-cross-site-scripting-in-portabilis-i-6d159de9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9724%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b41a40ad5a09ad00b7942d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9723-cross-site-scripting-in-portabilis-i-458620ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9723%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b41338ad5a09ad00b6ca01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9722-cross-site-scripting-in-portabilis-i-104c25c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9722%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b401a4ad5a09ad00b5e9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9721-cross-site-scripting-in-portabilis-i-4915737a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9721%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b3fe20ad5a09ad00b5c7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9720-cross-site-scripting-in-portabilis-i-d1dc2e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9720%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b3f718ad5a09ad00b59117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9719-cross-site-scripting-in-o2oa-0774d103</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9719%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3e908ad5a09ad00b532e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9718-cross-site-scripting-in-o2oa-5f341fd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9718%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3e200ad5a09ad00b46313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9717-cross-site-scripting-in-o2oa-78d33581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9717%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3daf8ad5a09ad00b10851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9716-cross-site-scripting-in-o2oa-e1342f61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9716%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b3d3f0ad5a09ad00b081ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5083-cwe-79-improper-neutralization-of-in-cfcabba2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20Amministrazione%20Trasparente&amp;severity=medium&amp;id=68b3d06cad5a09ad00aea88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31100-cwe-434-unrestricted-upload-of-file-ef4e975d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31100%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Mojoomla%20School%20Management&amp;severity=critical&amp;id=68b3c964ad5a09ad00a9a589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47696-cwe-98-improper-control-of-filename-3c491ef1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47696%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20solwin%20Blog%20Designer%20PRO&amp;severity=null&amp;id=68b3c964ad5a09ad00a9a58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32832-missing-authorization-in-hamid-alin-7b726551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32832%3A%20Missing%20Authorization%20in%20Hamid%20Alinia%20Login%20with%20phone%20number&amp;severity=null&amp;id=69cd7430e6bfc5ba1def629d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32589-missing-authorization-in-dmitry-v-c-61a4d53a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32589%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9715-cross-site-scripting-in-o2oa-8eda73ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9715%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b39839ad5a09ad0099ca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-31-ae814cae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-31&amp;severity=medium&amp;id=68b4e61ead5a09ad00c5774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9706-sql-injection-in-sourcecodester-wate-6216d22b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9706%3A%20SQL%20Injection%20in%20SourceCodester%20Water%20Billing%20System&amp;severity=medium&amp;id=68b37888ad5a09ad009494a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9705-sql-injection-in-sourcecodester-wate-1f6d877a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9705%3A%20SQL%20Injection%20in%20SourceCodester%20Water%20Billing%20System&amp;severity=medium&amp;id=68b36a78ad5a09ad009428d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9704-sql-injection-in-sourcecodester-wate-9a6d5753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9704%3A%20SQL%20Injection%20in%20SourceCodester%20Water%20Billing%20System&amp;severity=medium&amp;id=68b35c68ad5a09ad009348a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9702-sql-injection-in-sourcecodester-simp-78437fb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9702%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Cafe%20Billing%20System&amp;severity=medium&amp;id=68b34e58ad5a09ad0092af5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9701-sql-injection-in-sourcecodester-simp-18b98b47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9701%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Cafe%20Billing%20System&amp;severity=medium&amp;id=68b34048ad5a09ad0090ae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9700-sql-injection-in-sourcecodester-onli-ad28d08b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9700%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Book%20Store&amp;severity=medium&amp;id=68b33940ad5a09ad00905df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9699-sql-injection-in-sourcecodester-onli-f414fce2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9699%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Polling%20System%20Code&amp;severity=medium&amp;id=68b32b33ad5a09ad008baa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-abuse-velociraptor-forensic-tool-to-depl-a03f87c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Abuse%20Velociraptor%20Forensic%20Tool%20to%20Deploy%20Visual%20Studio%20Code%20for%20C2%20Tunneling&amp;severity=high&amp;id=68b31d20ad5a09ad008b2676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9695-improper-export-of-android-applicati-c0e6d4bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9695%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20GalleryVault%20Gallery%20Vault%20App&amp;severity=medium&amp;id=68b31d3dad5a09ad008b270e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9694-sql-injection-in-campcodes-advanced--fb5979ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9694%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=68b3161aad5a09ad008ae8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9692-sql-injection-in-campcodes-online-sh-823a4c79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9692%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20System&amp;severity=medium&amp;id=68b30f14ad5a09ad008aa391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9691-sql-injection-in-campcodes-online-sh-3e85bee4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9691%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20System&amp;severity=medium&amp;id=68b30488ad5a09ad008a3a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9690-sql-injection-in-sourcecodester-adva-19f81572</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9690%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=68b30104ad5a09ad008a167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9689-sql-injection-in-sourcecodester-adva-39964981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9689%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=68b2f9fcad5a09ad008706ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0165-cwe-89-improper-neutralization-of-sp-7137ff8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0165%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20watsonx%20Orchestrate%20Cartridge%20for%20IBM%20Cloud%20Pak%20for%20Data&amp;severity=high&amp;id=68b2f678ad5a09ad0086ecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9688-integer-overflow-in-mupen64plus-9c44ffb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9688%3A%20Integer%20Overflow%20in%20Mupen64Plus&amp;severity=low&amp;id=68b2f2f4ad5a09ad0086ce88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-crushftp-zero-day-to-take-over-ser-ff39bbd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20CrushFTP%20Zero-Day%20to%20Take%20Over%20Servers%20-%20Patch%20NOW!&amp;severity=critical&amp;id=68b2ef6ead5a09ad0086a458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9687-improper-authorization-in-portabilis-38120c8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9687%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2ebedad5a09ad00864acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lab-dookhtegan-hacking-group-disrupts-communicatio-930f5aa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lab%20Dookhtegan%20hacking%20group%20disrupts%20communications%20on%20dozens%20of%20Iranian%20ships&amp;severity=medium&amp;id=68b2e866ad5a09ad00862b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9686-sql-injection-in-portabilis-i-educar-603e05b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9686%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2e4e4ad5a09ad00860b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9685-sql-injection-in-portabilis-i-educar-62528635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9685%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2dddcad5a09ad008421a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9684-sql-injection-in-portabilis-i-educar-7d67740c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9684%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b2d6d5ad5a09ad0083e9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9683-cross-site-scripting-in-o2oa-9e2e7310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9683%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2cfccad5a09ad0083961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whatsapp-issues-emergency-update-for-zero-click-ex-05d0f765</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WhatsApp%20Issues%20Emergency%20Update%20for%20Zero-Click%20Exploit%20Targeting%20iOS%20and%20macOS%20Devices&amp;severity=critical&amp;id=68b2c8c2ad5a09ad0080ca95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9682-cross-site-scripting-in-o2oa-919d095f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9682%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2c8cead5a09ad0080cac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-a-fake-anydesk-installer-to-metastealer-258cfac4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20a%20Fake%20AnyDesk%20Installer%20to%20MetaStealer&amp;severity=medium&amp;id=68b556a2ad5a09ad00cb6363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9681-cross-site-scripting-in-o2oa-221af951</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9681%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2bab8ad5a09ad00807dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9680-cross-site-scripting-in-o2oa-96eab8d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9680%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b2a5a1ad5a09ad007ff3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9679-sql-injection-in-itsourcecode-studen-c22e4bd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9679%3A%20SQL%20Injection%20in%20itsourcecode%20Student%20Information%20System&amp;severity=medium&amp;id=68b28275ad5a09ad007eda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9500-cwe-79-improper-neutralization-of-in-ded3b741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=68b27ef0ad5a09ad007ec829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9499-cwe-79-improper-neutralization-of-in-f37f5365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=68b27ef0ad5a09ad007ec823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54946-cwe-89-improper-neutralization-of-s-a80e11a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54946%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b27b6cad5a09ad007eaf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54945-cwe-73-external-control-of-file-nam-3f98c016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54945%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b277e9ad5a09ad007e9acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54944-cwe-434-unrestricted-upload-of-file-3449a0a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54944%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=medium&amp;id=68b277e9ad5a09ad007e9ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54943-cwe-862-missing-authorization-in-su-6619f57e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54943%3A%20CWE-862%20Missing%20Authorization%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b27464ad5a09ad007e8450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54942-cwe-306-missing-authentication-for--8349be9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54942%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SUNNET%20Technology%20Co.%2C%20Ltd.%20Corporate%20Training%20Management%20System&amp;severity=critical&amp;id=68b27464ad5a09ad007e844d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4956-cwe-35-path-traversal-in-aa-team-pro-dbfc495f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4956%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20AA-Team%20Pro%20Bulk%20Watermark%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68b25f4cad5a09ad007de32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9618-cwe-352-cross-site-request-forgery-c-7bbd0d5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9618%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdreams%20Related%20Posts%20Lite&amp;severity=medium&amp;id=68b25f4cad5a09ad007de32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-30-f110d953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-30&amp;severity=medium&amp;id=68b394a6ad5a09ad0099a491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34165-cwe-121-stack-based-buffer-overflow-e4ea3e1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34165%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NetSupport%20Ltd.%20NetSupport%20Manager&amp;severity=high&amp;id=68b23c25ad5a09ad007c55ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34164-cwe-122-heap-based-buffer-overflow--7fdd6f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34164%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NetSupport%20Ltd.%20NetSupport%20Manager&amp;severity=critical&amp;id=68b238b6ad5a09ad007c4611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-of-sitecore-exploit-chain-linking-30a10de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20of%20Sitecore%20Exploit%20Chain%20Linking%20Cache%20Poisoning%20and%20Remote%20Code%20Execution&amp;severity=high&amp;id=68b2389fad5a09ad007c45cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-zero-click-exploit-allegedly-used-to-hack-what-337bc60b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20zero-click%20exploit%20allegedly%20used%20to%20hack%20WhatsApp%20users&amp;severity=high&amp;id=68b2389fad5a09ad007c45d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58159-cwe-434-unrestricted-upload-of-file-97920bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58159%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68b22a90ad5a09ad007bf759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57752-cwe-524-use-of-cache-containing-sen-9e9d915d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57752%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20vercel%20next.js&amp;severity=medium&amp;id=68b2270cad5a09ad007be08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55173-cwe-20-improper-input-validation-in-9360a81e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55173%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vercel%20next.js&amp;severity=medium&amp;id=68b22388ad5a09ad007bca25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58156-cwe-285-improper-authorization-in-n-9d3b8f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58156%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nofusscomputing%20centurion_erp&amp;severity=low&amp;id=68b22005ad5a09ad007bb540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57822-cwe-918-server-side-request-forgery-5280bee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57822%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vercel%20next.js&amp;severity=medium&amp;id=68b22005ad5a09ad007bb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9678-sql-injection-in-campcodes-online-lo-7df41940</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9678%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68b22005ad5a09ad007bb54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58160-cwe-150-improper-neutralization-of--6460e9c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58160%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20tokio-rs%20tracing&amp;severity=low&amp;id=68b21c80ad5a09ad007ba03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58157-cwe-400-uncontrolled-resource-consu-b64b9afc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58157%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Consensys%20gnark&amp;severity=high&amp;id=68b21c80ad5a09ad007ba040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58067-cwe-601-url-redirection-to-untruste-e1b2aa42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58067%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20basecamp%20google_sign_in&amp;severity=medium&amp;id=68b218fcad5a09ad007b7a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9677-improper-export-of-android-applicati-1fdc1607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9677%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Modo%20Legend%20of%20the%20Phoenix&amp;severity=medium&amp;id=68b218fcad5a09ad007b7a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9676-improper-export-of-android-applicati-dcb87d2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9676%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20NCSOFT%20Universe%20App&amp;severity=medium&amp;id=68b218fcad5a09ad007b7a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58066-cwe-406-insufficient-control-of-net-9f42777d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58066%3A%20CWE-406%3A%20Insufficient%20Control%20of%20Network%20Message%20Volume%20(Network%20Amplification)%20in%20pendulum-project%20ntpd-rs&amp;severity=medium&amp;id=68b21578ad5a09ad007b61b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9675-improper-export-of-android-applicati-4fb704e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9675%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Voice%20Changer%20App&amp;severity=medium&amp;id=68b211f4ad5a09ad007b4663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9674-improper-export-of-android-applicati-2b993b04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9674%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Transbyte%20Scooper%20News%20App&amp;severity=medium&amp;id=68b211f4ad5a09ad007b465c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-targeting-businesses-11dd121b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20Ransomware%20Targeting%20Businesses&amp;severity=medium&amp;id=68b55a26ad5a09ad00cb9af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-about-nightspire-ransomware-following-case-1adfbd8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%20About%20NightSpire%20Ransomware%20Following%20Cases%20of%20Damage%20in%20South%20Korea&amp;severity=medium&amp;id=68b55dabad5a09ad00cbc9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mac-malware-identified-that-evades-detection-t-0e2aa6f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mac%20malware%20identified%20that%20evades%20detection%20through%20fake%20PDF%20conversion%20tool&amp;severity=medium&amp;id=68b55dabad5a09ad00cbc9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/8-malicious-npm-packages-stole-chrome-user-data-on-d02e122b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=8%20Malicious%20NPM%20Packages%20Stole%20Chrome%20User%20Data%20on%20Windows&amp;severity=medium&amp;id=68b20aeaad5a09ad007addf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9673-improper-export-of-android-applicati-eabcce8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9673%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Kakao%20%ED%97%A4%EC%9D%B4%EC%B9%B4%EC%B9%B4%EC%98%A4%20Hey%20Kakao%20App&amp;severity=medium&amp;id=68b20afbad5a09ad007ade35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9672-improper-export-of-android-applicati-0c245e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9672%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Rejseplanen%20App&amp;severity=medium&amp;id=68b20afbad5a09ad007ade2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9671-improper-export-of-android-applicati-09cba634</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9671%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20UAB%20Paytend%20App&amp;severity=medium&amp;id=68b203e4ad5a09ad007a8a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9670-inefficient-regular-expression-compl-93c25326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9670%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20mixmark-io%20turndown&amp;severity=medium&amp;id=68b1fcdead5a09ad007a60e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9669-sql-injection-in-jinher-oa-7104b8d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9669%3A%20SQL%20Injection%20in%20Jinher%20OA&amp;severity=medium&amp;id=68b1fcdead5a09ad007a60e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43773-cwe-862-missing-authorization-in-li-93358cd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43773%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68b1f959ad5a09ad007a4b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9667-sql-injection-in-code-projects-simpl-abc2f54a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9667%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1f5d4ad5a09ad007a36e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9666-sql-injection-in-code-projects-simpl-87f52777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9666%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1eecfad5a09ad007a1e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9665-sql-injection-in-code-projects-simpl-62a6bdc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9665%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1eecfad5a09ad007a1e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9377-cwe-78-improper-neutralization-of-sp-19fc564e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9377%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20Archer%20C7(EU)%20V2&amp;severity=high&amp;id=68b1f255ad5a09ad007a2862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52861-cwe-22-in-qnap-systems-inc-viostor-b8f2b5c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52861%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20VioStor&amp;severity=high&amp;id=68b1e445ad5a09ad0079b814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52856-cwe-287-in-qnap-systems-inc-viostor-75d48a55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52856%3A%20CWE-287%20in%20QNAP%20Systems%20Inc.%20VioStor&amp;severity=critical&amp;id=68b1e445ad5a09ad0079b811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44015-cwe-77-in-qnap-systems-inc-hybridde-be88b987</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44015%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20HybridDesk%20Station&amp;severity=low&amp;id=68b1e445ad5a09ad0079b80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33038-cwe-22-in-qnap-systems-inc-qsync-ce-29823e5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33038%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e445ad5a09ad0079b808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33037-cwe-22-in-qnap-systems-inc-qsync-ce-678e3cff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33037%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e445ad5a09ad0079b805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33036-cwe-22-in-qnap-systems-inc-qsync-ce-2da53637</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33036%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33033-cwe-22-in-qnap-systems-inc-qsync-ce-8db628c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33033%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33032-cwe-22-in-qnap-systems-inc-qts-c926ee55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33032%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30278-cwe-295-in-qnap-systems-inc-qsync-c-b5b79e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30278%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30277-cwe-295-in-qnap-systems-inc-qsync-c-960fe2c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30277%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30275-cwe-476-in-qnap-systems-inc-qsync-c-fb888f5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30275%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30274-cwe-476-in-qnap-systems-inc-qts-51b7c844</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30274%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30273-cwe-787-in-qnap-systems-inc-qts-95f1efe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30273%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=68b1e444ad5a09ad0079b7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30272-cwe-476-in-qnap-systems-inc-qts-e65c4d48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30272%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30271-cwe-22-in-qnap-systems-inc-qts-8fa8ac0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30271%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e444ad5a09ad0079b7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30270-cwe-22-in-qnap-systems-inc-qts-c4ccb0ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30270%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30268-cwe-476-in-qnap-systems-inc-qts-eff8c3ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30268%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30267-cwe-476-in-qnap-systems-inc-qts-23079d2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30267%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30265-cwe-120-in-qnap-systems-inc-qts-41fb2baa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30265%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=low&amp;id=68b1e443ad5a09ad0079b7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30264-cwe-77-in-qnap-systems-inc-qts-25ff698b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30264%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30263-cwe-476-in-qnap-systems-inc-qsync-c-42dbee56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30263%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30262-cwe-476-in-qnap-systems-inc-qsync-c-ca41b617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30262%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30261-cwe-770-in-qnap-systems-inc-qsync-c-2db278ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30261%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30260-cwe-770-in-qnap-systems-inc-qsync-c-8ccb6900</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30260%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29900-cwe-770-in-qnap-systems-inc-file-st-72c36d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29900%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29899-cwe-770-in-qnap-systems-inc-file-st-e5f8aa97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29899%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29898-cwe-400-in-qnap-systems-inc-qsync-c-f7f254d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29898%3A%20CWE-400%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29894-cwe-89-in-qnap-systems-inc-qsync-ce-de0cde2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29894%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29893-cwe-89-in-qnap-systems-inc-qsync-ce-6a0a703a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29893%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=68b1e443ad5a09ad0079b79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29890-cwe-770-in-qnap-systems-inc-file-st-78862443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29890%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e443ad5a09ad0079b79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29889-cwe-476-in-qnap-systems-inc-file-st-cde82981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29889%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29888-cwe-476-in-qnap-systems-inc-file-st-abfabd9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29888%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29887-cwe-77-in-qnap-systems-inc-qurouter-00143603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29887%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=high&amp;id=68b1e443ad5a09ad0079b793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29886-cwe-476-in-qnap-systems-inc-file-st-dcebcdb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29886%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29882-cwe-476-in-qnap-systems-inc-qts-8f8bd81b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29882%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=68b1e443ad5a09ad0079b78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29879-cwe-476-in-qnap-systems-inc-file-st-8625af85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29879%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29878-cwe-476-in-qnap-systems-inc-file-st-2178eeba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29878%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29875-cwe-476-in-qnap-systems-inc-file-st-0d340c45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29875%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68b1e0bead5a09ad0079a9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29874-cwe-476-in-qnap-systems-inc-file-st-4cc9ede6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29874%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22483-cwe-79-in-qnap-systems-inc-license--38584edf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22483%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=high&amp;id=68b1e0bead5a09ad0079a9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9664-sql-injection-in-code-projects-simpl-e890dda4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9664%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9663-sql-injection-in-code-projects-simpl-c4608da0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9663%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1e0bead5a09ad0079a9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-in-plain-sight-a-misconfigured-upload-path--9f2e7f27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20in%20plain%20sight%3A%20a%20misconfigured%20upload%20path%20that%20invited%20trouble&amp;severity=medium&amp;id=68b1dd54ad5a09ad0079983d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abandoned-sogou-zhuyin-update-server-hijacked-weap-18b0dc03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abandoned%20Sogou%20Zhuyin%20Update%20Server%20Hijacked%2C%20Weaponized%20in%20Taiwan%20Espionage%20Campaign&amp;severity=high&amp;id=68b1dd37ad5a09ad00799799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-disrupts-apt29-watering-hole-campaign-abusi-cf41d0ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Disrupts%20APT29%20Watering%20Hole%20Campaign%20Abusing%20Microsoft%20Device%20Code%20Authentication&amp;severity=high&amp;id=68b1dd37ad5a09ad00799795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-facebook-ads-install-brokewell-spyware-to-and-8c1da1cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Facebook%20Ads%20Install%20Brokewell%20Spyware%20to%20Android%20Users&amp;severity=medium&amp;id=68b1d9b3ad5a09ad0079825b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9662-sql-injection-in-code-projects-simpl-bd82cfd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9662%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Grading%20System&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9660-sql-injection-in-sourcecodester-bake-fc857171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9660%3A%20SQL%20Injection%20in%20SourceCodester%20Bakeshop%20Online%20Ordering%20System&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9659-cross-site-scripting-in-o2oa-ca99dbe4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9659%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1d2aead5a09ad00795e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9658-cross-site-scripting-in-o2oa-5d64307a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9658%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1d2aead5a09ad00795e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55750-cwe-201-insertion-of-sensitive-info-98dc6343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55750%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20gitpod-io%20gitpod&amp;severity=medium&amp;id=68b1cf29ad5a09ad0079437f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55177-cwe-863-in-facebook-whatsapp-deskto-20b30827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55177%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Facebook%20WhatsApp%20Desktop%20for%20Mac&amp;severity=medium&amp;id=68b1cf29ad5a09ad00794384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5808-cwe-1284-improper-validation-of-spec-5d4f4911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5808%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20OpenText%20Self%20Service%20Password%20Reset&amp;severity=high&amp;id=68b1cba6ad5a09ad007921e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9657-cross-site-scripting-in-o2oa-e82063a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9657%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1cba6ad5a09ad007921ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9656-cross-site-scripting-in-phpgurukul-d-bb802259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9656%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=68b1cba6ad5a09ad007921e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-new-chaos-raas-group-attacks-20fa3357</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20new%20Chaos%20RaaS%20group%20attacks&amp;severity=medium&amp;id=68b1c49cad5a09ad0079006c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-waifu-rat-a-ring3-malware-like-rat-based-on-llm-fb9f11d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Waifu%20RAT%3A%20A%20Ring3%20malware-like%20RAT%20based%20on%20LLM%20manipulation%20is%20circulating%20in%20the%20wild.&amp;severity=medium&amp;id=68b1c4a0ad5a09ad007900a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54877-cwe-863-incorrect-authorization-in--f255f169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54877%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=68b1c49dad5a09ad0079008c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9655-cross-site-scripting-in-o2oa-d4e11a1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9655%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1c49dad5a09ad00790099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9654-command-injection-in-aiondadotcom-mc-82f2511c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9654%3A%20Command%20Injection%20in%20AiondaDotCom%20mcp-ssh&amp;severity=medium&amp;id=68b1c49dad5a09ad00790092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transunion-data-breach-44-million-us-consumers-dat-d69bcaf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransUnion%20Data%20Breach%3A%204.4%20Million%20US%20Consumers%E2%80%99%20Data%20Stolen&amp;severity=high&amp;id=68b1c116ad5a09ad0078da6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elastic-edr-0-day-part-2-technical-details-and-the-11ce8600</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elastic%20EDR%200-day%3A%20Part%202%20-%20Technical%20Details%20and%20the%20Trigger&amp;severity=medium&amp;id=68b1bd96ad5a09ad0078bca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9653-cross-site-scripting-in-portabilis-i-c7e2be7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9653%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b1bd93ad5a09ad0078bc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9652-cross-site-scripting-in-portabilis-i-79ac7bee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9652%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b1bd93ad5a09ad0078bc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9651-sql-injection-in-shafhasan-chatbox-93353ebd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9651%3A%20SQL%20Injection%20in%20shafhasan%20chatbox&amp;severity=medium&amp;id=68b1b68bad5a09ad00789c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9650-path-traversal-in-yeqifu-carrental-3392b3c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9650%3A%20Path%20Traversal%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=68b1b68bad5a09ad00789c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-hankook-phantom-spear-phishing-campaign-37eebad3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20HanKook%20Phantom%3A%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=68b1c820ad5a09ad007910c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-first-ai-powered-ransomware-how-it-works-9345876e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20First%20AI-Powered%20Ransomware%20%26%20How%20It%20Works&amp;severity=medium&amp;id=68b1c820ad5a09ad007910b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9649-divide-by-zero-in-appneta-tcpreplay-e4388a6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9649%3A%20Divide%20By%20Zero%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68b1af84ad5a09ad00780894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9647-cross-site-scripting-in-mtons-mblog-3e209a31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9647%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68b1a87cad5a09ad0077e768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9646-cross-site-scripting-in-o2oa-b38a1d82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9646%3A%20Cross%20Site%20Scripting%20in%20O2OA&amp;severity=medium&amp;id=68b1a87cad5a09ad0077e760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9645-sql-injection-in-itsourcecode-apartm-29ed17d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9645%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b1a4f8ad5a09ad0077dbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9644-sql-injection-in-itsourcecode-apartm-eba9b317</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9644%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b1a4f8ad5a09ad0077dbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunting-laundry-bear-infrastructure-analysis-guide-686cc603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunting%20Laundry%20Bear%3A%20Infrastructure%20Analysis%20Guide%20and%20Findings&amp;severity=medium&amp;id=68b1c49cad5a09ad00790032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tamperedchef-malware-disguised-as-fake-pdf-editors-e303e66b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TamperedChef%20Malware%20Disguised%20as%20Fake%20PDF%20Editors%20Steals%20Credentials%20and%20Cookies&amp;severity=high&amp;id=68b19a6bad5a09ad00779f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feds-seize-64m-veriftools-fake-id-marketplace-but--7c3d08c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feds%20Seize%20%246.4M%20VerifTools%20Fake-ID%20Marketplace%2C%20but%20Operators%20Relaunch%20on%20New%20Domain&amp;severity=high&amp;id=68b19a6bad5a09ad00779f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9643-sql-injection-in-itsourcecode-apartm-6e2417e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9643%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b19a82ad5a09ad0077a000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40709-cwe-79-improper-neutralization-of-i-ca45dc00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40708-cwe-79-improper-neutralization-of-i-d7f744f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40707-cwe-79-improper-neutralization-of-i-2a123566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40706-cwe-79-improper-neutralization-of-i-d958a865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b18fe0ad5a09ad00773ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40705-cwe-79-improper-neutralization-of-i-0a9c7ee4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad00775552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40704-cwe-79-improper-neutralization-of-i-9d668f04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad0077554e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40703-cwe-79-improper-neutralization-of-i-2cc9d619</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad0077554a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40702-cwe-79-improper-neutralization-of-i-7f827801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ACDH-CH%20OpenAtlas&amp;severity=medium&amp;id=68b19364ad5a09ad00775546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9217-cwe-22-improper-limitation-of-a-path-95d15fe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9217%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=68b188daad5a09ad00771278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13342-cwe-434-unrestricted-upload-of-file-d8afe7d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13342%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20for%20WooCommerce%20%E2%80%93%20PDF%20Invoices%2C%20Abandoned%20Cart%2C%20Variation%20Swatches%20%26%20100%2B%20Tools&amp;severity=high&amp;id=699f6e50b7ef31ef0b59cbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cache-me-if-you-can-sitecore-experience-platform-c-afcac649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cache%20Me%20If%20You%20Can%20(Sitecore%20Experience%20Platform%20Cache%20Poisoning%20to%20RCE)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=68b17e4fad5a09ad0076ad20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4644-cwe-384-session-fixation-in-payload--0fd4d1f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4644%3A%20CWE-384%20Session%20Fixation%20in%20Payload%20CMS%20Payload&amp;severity=medium&amp;id=68b17e4cad5a09ad0076acf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4643-cwe-613-insufficient-session-expirat-85608e9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4643%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Payload%20CMS%20Payload&amp;severity=medium&amp;id=68b17e4cad5a09ad0076acf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9071-cwe-780-use-of-rsa-algorithm-without-67b65483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9071%3A%20CWE-780%20Use%20of%20RSA%20Algorithm%20without%20OEAP%20in%20Oberon%20microsystems%20AG%20Oberon%20PSA%20Crypto&amp;severity=low&amp;id=68b173c0ad5a09ad00763f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7383-cwe-208-observable-timing-discrepanc-ebf3b021</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7383%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Oberon%20microsystems%20AG%20Oberon%20PSA%20Crypto&amp;severity=medium&amp;id=68b173c0ad5a09ad00763f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7071-cwe-208-observable-timing-discrepanc-b462e84c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7071%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Oberon%20microsystems%20AG%20ocrypto&amp;severity=medium&amp;id=68b173c0ad5a09ad00763f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8150-cwe-79-improper-neutralization-of-in-d708c58f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8150%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54777-uncaught-exception-in-konica-minolt-fda75d1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54777%3A%20Uncaught%20exception%20in%20Konica%20Minolta%2C%20Inc.%20Multiple%20products%20in%20bizhub%20series&amp;severity=medium&amp;id=68b14990ad5a09ad0074f10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9441-cwe-89-improper-neutralization-of-sp-de37540d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9441%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iatspaymentsdev%20iATS%20Online%20Forms&amp;severity=medium&amp;id=68b12d70ad5a09ad00741adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8290-cwe-79-improper-neutralization-of-in-2fd5c4db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weblineindia%20List%20Subpages&amp;severity=medium&amp;id=68b12d70ad5a09ad00741ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8619-cwe-79-improper-neutralization-of-in-ca33e804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garbowza%20OSM%20Map%20Widget%20for%20Elementor&amp;severity=medium&amp;id=68b12d70ad5a09ad00741ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9374-cwe-352-cross-site-request-forgery-c-f3068b31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9374%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20briancolinger%20Ultimate%20Tag%20Warrior%20Importer&amp;severity=medium&amp;id=68b12d70ad5a09ad00741adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8147-cwe-285-improper-authorization-in-au-6efa4acf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8147%3A%20CWE-285%20Improper%20Authorization%20in%20aurelienlws%20LWSCache&amp;severity=medium&amp;id=68b12d70ad5a09ad00741acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53508-improper-neutralization-of-special--5ac72e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53508%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20iND%20Co.%2CLtd%20HL330-DLS%20(for%20module%20MC7700)&amp;severity=high&amp;id=68b129ecad5a09ad00740d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53507-insecure-storage-of-sensitive-infor-fa1ba7ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53507%3A%20Insecure%20storage%20of%20sensitive%20information%20in%20iND%20Co.%2CLtd%20HL330-DLS%20(for%20module%20MC7700)&amp;severity=medium&amp;id=68b129ecad5a09ad00740d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9619-improper-control-of-resource-identif-75eb047d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9619%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20E4%20Sistemas%20Mercatus%20ERP&amp;severity=medium&amp;id=68b129ecad5a09ad00740d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9639-cwe-23-relative-path-traversal-in-ai-dfeeca8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9639%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Ai3%20QbiCRMGateway&amp;severity=high&amp;id=68b122e4ad5a09ad0073d178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8858-cwe-89-improper-neutralization-of-sp-663c80fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8858%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Changing%20Clinic%20Image%20System&amp;severity=high&amp;id=68b122e4ad5a09ad0073d162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8857-cwe-798-use-of-hard-coded-credential-c3802259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8857%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Changing%20Clinic%20Image%20System&amp;severity=critical&amp;id=68b122e4ad5a09ad0073d15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9610-sql-injection-in-code-projects-onlin-113d6e19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9610%3A%20SQL%20Injection%20in%20code-projects%20Online%20Event%20Judging%20System&amp;severity=medium&amp;id=68b122e4ad5a09ad0073d171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9609-improper-authorization-in-portabilis-adecb29a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9609%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b122e4ad5a09ad0073d16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8861-cwe-306-missing-authentication-for-c-abe337fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8861%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Changing%20TSA&amp;severity=critical&amp;id=68b122e4ad5a09ad0073d166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9608-sql-injection-in-portabilis-i-educar-f46d53e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9608%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b11bdcad5a09ad0073ad51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9607-sql-injection-in-portabilis-i-educar-4d65b2b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9607%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b11bdcad5a09ad0073ad4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9606-sql-injection-in-portabilis-i-educar-dcb34ab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9606%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68b114d4ad5a09ad00735f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9605-stack-based-buffer-overflow-in-tenda-a93c764b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9605%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC21&amp;severity=critical&amp;id=68b10dcdad5a09ad00732fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58323-cwe-266-incorrect-privilege-assignm-02e2a5ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58323%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NAVER%20NAVER%20MYBOX%20Explorer&amp;severity=high&amp;id=68b10dcdad5a09ad00732fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39247-vulnerability-in-hikvision-hikcentr-681b4337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39247%3A%20Vulnerability%20in%20Hikvision%20HikCentral%20Professional&amp;severity=high&amp;id=68b10dcdad5a09ad00732fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39246-vulnerability-in-hikvision-hikcentr-0fc464b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39246%3A%20Vulnerability%20in%20Hikvision%20HikCentral%20FocSign&amp;severity=medium&amp;id=68b10dcdad5a09ad00732fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39245-vulnerability-in-hikvision-hikcentr-3886f35e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39245%3A%20Vulnerability%20in%20Hikvision%20HikCentral%20Master%20Lite&amp;severity=medium&amp;id=68b10dcdad5a09ad00732fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9604-use-of-hard-coded-cryptographic-key--3b240c3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9604%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20coze-studio&amp;severity=medium&amp;id=68b106c4ad5a09ad007273f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9603-command-injection-in-telesquare-tlr--6e88a518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9603%3A%20Command%20Injection%20in%20Telesquare%20TLR-2005KSH&amp;severity=medium&amp;id=68b106c4ad5a09ad007273f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9602-improper-authorization-in-xinhu-rock-ce2f7e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9602%3A%20Improper%20Authorization%20in%20Xinhu%20RockOA&amp;severity=medium&amp;id=68b106c4ad5a09ad007273eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/loophole-allows-threat-actors-to-claim-vs-code-ext-744f0afc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Loophole%20allows%20threat%20actors%20to%20claim%20VS%20Code%20extension%20names&amp;severity=medium&amp;id=68b16cb9ad5a09ad00760ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9601-sql-injection-in-itsourcecode-apartm-dc843e2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9601%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b106c4ad5a09ad007273e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9600-sql-injection-in-itsourcecode-apartm-88c69031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9600%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f8baad5a09ad0071e455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9599-sql-injection-in-itsourcecode-apartm-8d3bcd05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9599%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f8baad5a09ad0071e44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54554-an-app-may-be-able-to-access-sensit-7f24cd74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54554%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43187-running-an-hdiutil-command-may-unex-a6a54dc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43187%3A%20Running%20an%20hdiutil%20command%20may%20unexpectedly%20execute%20arbitrary%20code%20in%20Apple%20macOS&amp;severity=high&amp;id=68b0f8baad5a09ad0071e43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43284-an-app-may-be-able-to-cause-unexpec-9adb57a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43284%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=68b0f8baad5a09ad0071e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54568-parsing-a-maliciously-crafted-file--7377bc01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54568%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44271-an-app-may-be-able-to-record-the-sc-5df79ff1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44271%3A%20An%20app%20may%20be%20able%20to%20record%20the%20screen%20without%20an%20indicator%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb82ee6bfc5ba1df6ed23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43268-a-malicious-app-may-be-able-to-gain-8c7a39c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43268%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68b0f8baad5a09ad0071e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43255-an-app-may-be-able-to-cause-unexpec-1e4e774d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43255%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=low&amp;id=68b0f8baad5a09ad0071e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40927-cwe-113-improper-neutralization-of--03295117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40927%3A%20CWE-113%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20MANWAR%20CGI%3A%3ASimple&amp;severity=high&amp;id=68b0f8baad5a09ad0071e434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9598-sql-injection-in-itsourcecode-apartm-02c328d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9598%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f1acad5a09ad0071979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9597-sql-injection-in-itsourcecode-apartm-f9216ea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9597%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0f1acad5a09ad00719793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41471-na-cb6ae44b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41471%3A%20n%2Fa&amp;severity=high&amp;id=690849c42e0de603d533db57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-29-e648ac9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-29&amp;severity=medium&amp;id=68b2431ead5a09ad007c87d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa25-239a-countering-chinese-state-sponsored-actor-f720d128</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA25-239A%3A%20Countering%20Chinese%20State-Sponsored%20Actors%20Compromise%20of%20Networks%20Worldwide%20to%20Feed%20Global%20Espionage%20System&amp;severity=medium&amp;id=68b218efad5a09ad007b78b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56577-na-427225b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56577%3A%20n%2Fa&amp;severity=high&amp;id=68b203e4ad5a09ad007a8a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44033-na-be51fc25</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44033%3A%20n%2Fa&amp;severity=critical&amp;id=68b1e445ad5a09ad0079b80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55763-na-a00b3405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55763%3A%20n%2Fa&amp;severity=high&amp;id=68b1dd51ad5a09ad00799834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55580-na-850407f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55580%3A%20n%2Fa&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55579-na-b951b3a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55579%3A%20n%2Fa&amp;severity=medium&amp;id=68b1d9c3ad5a09ad007982ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54142-cwe-444-inconsistent-interpretation-f1155168</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54142%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20AkamaiGhost&amp;severity=medium&amp;id=68b0fc3dad5a09ad0071fa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/link-up-lift-up-level-up-92c07918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Link%20up%2C%20lift%20up%2C%20level%20up&amp;severity=medium&amp;id=68b16cb9ad5a09ad00760aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9596-sql-injection-in-itsourcecode-sports-cd11b93e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9596%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68b0eaa5ad5a09ad0071776f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9595-cross-site-scripting-in-code-project-942840d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9595%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=68b0eaa5ad5a09ad00717768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48979-vulnerability-in-ubiquiti-inc-uisp--1eb31c56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48979%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=low&amp;id=68b0e39cad5a09ad0070a7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9594-sql-injection-in-itsourcecode-apartm-cefd0662</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9594%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0e39cad5a09ad0070a7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9593-sql-injection-in-itsourcecode-apartm-ad148afb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9593%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0d910ad5a09ad00702700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58062-cwe-78-improper-neutralization-of-s-ef31b754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58062%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LSTM-Kirigaya%20openmcp-client&amp;severity=high&amp;id=68b0d910ad5a09ad00702707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58061-cwe-200-exposure-of-sensitive-infor-596d7d4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58061%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20openebs%20rawfile-localpv&amp;severity=medium&amp;id=68b0d58dad5a09ad00700b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9592-sql-injection-in-itsourcecode-apartm-075db864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9592%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68b0d58dad5a09ad00700b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9591-cross-site-scripting-in-zrlog-84dbfedc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9591%3A%20Cross%20Site%20Scripting%20in%20ZrLog&amp;severity=medium&amp;id=68b0d58dad5a09ad00700b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58058-cwe-770-allocation-of-resources-wit-8e38df7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58058%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ulikunitz%20xz&amp;severity=medium&amp;id=68b0d208ad5a09ad006ff0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9590-cross-site-scripting-in-weaver-e-mob-4734a279</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9590%3A%20Cross%20Site%20Scripting%20in%20Weaver%20E-Mobile%20Mobile%20Management%20Platform&amp;severity=medium&amp;id=68b0ce89ad5a09ad006fe03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9589-use-of-default-password-in-cudy-wr12-2b5cb351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9589%3A%20Use%20of%20Default%20Password%20in%20Cudy%20WR1200EA&amp;severity=low&amp;id=68b0ce89ad5a09ad006fe038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9586-command-injection-in-comfast-cf-n1-6eaa47fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9586%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0c77dad5a09ad006fae93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9585-command-injection-in-comfast-cf-n1-02b518b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9585%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0c074ad5a09ad006f8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9584-command-injection-in-comfast-cf-n1-6f6779ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9584%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b96dad5a09ad006f4bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9583-command-injection-in-comfast-cf-n1-a2061ab3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9583%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b96dad5a09ad006f4bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6203-cwe-770-allocation-of-resources-with-2234cdbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6203%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=68b0b26aad5a09ad006f2b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9582-command-injection-in-comfast-cf-n1-1d1d65d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9582%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b26aad5a09ad006f2b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-citrix-and-git-flaws-to-kev-catalogue-am-aa8c6c0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Citrix%20and%20Git%20Flaws%20to%20KEV%20Catalogue%20Amid%20Active%20Exploitation&amp;severity=medium&amp;id=68b0aee4ad5a09ad006f1561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9581-command-injection-in-comfast-cf-n1-ae309721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9581%3A%20Command%20Injection%20in%20Comfast%20CF-N1&amp;severity=medium&amp;id=68b0b96dad5a09ad006f4bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9580-os-command-injection-in-lb-link-bl-x-c11b587e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9580%3A%20OS%20Command%20Injection%20in%20LB-LINK%20BL-X26&amp;severity=medium&amp;id=68b0b5e9ad5a09ad006f4136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9579-os-command-injection-in-lb-link-bl-x-f5eae0cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9579%3A%20OS%20Command%20Injection%20in%20LB-LINK%20BL-X26&amp;severity=medium&amp;id=68b0a454ad5a09ad006ef6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9577-use-of-default-credentials-in-totoli-caa4ab78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9577%3A%20Use%20of%20Default%20Credentials%20in%20TOTOLINK%20X2000R&amp;severity=low&amp;id=68b0a454ad5a09ad006ef6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/backdoor-in-appsuite-pdf-editor-a-detailed-technic-9aba761e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Backdoor%20in%20%22AppSuite%20PDF%20Editor%22%3A%20A%20Detailed%20Technical%20Analysis&amp;severity=medium&amp;id=68b0ab5bad5a09ad006f09a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31971-cwe-425-direct-request-forced-brows-4d715608</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31971%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20HCL%20Software%20AIML%20Solutions%20for%20SX&amp;severity=medium&amp;id=68b09d4cad5a09ad006ed78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9576-use-of-default-credentials-in-seeeds-d827c74a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9576%3A%20Use%20of%20Default%20Credentials%20in%20seeedstudio%20ReSpeaker&amp;severity=low&amp;id=68b09d4cad5a09ad006ed79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9575-os-command-injection-in-linksys-re62-bd851ab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9575%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68b09d4cad5a09ad006ed795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9195-cwe-20-improper-input-validation-in--1720da1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9195%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Solidigm%20D7-PS1010%2FD7-PS1030&amp;severity=medium&amp;id=68b09d4cad5a09ad006ed792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58059-cwe-78-improper-neutralization-of-s-50c741bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58059%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20valtimo-platform%20valtimo-backend-libraries&amp;severity=critical&amp;id=68b099c9ad5a09ad006eacd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58049-cwe-212-improper-removal-of-sensiti-dfff5727</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58049%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=68b099c9ad5a09ad006eacdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/200-swedish-municipalities-impacted-by-a-major-cyb-d677813a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=200%20Swedish%20municipalities%20impacted%20by%20a%20major%20cyberattack%20on%20IT%20provider&amp;severity=medium&amp;id=68b09643ad5a09ad006e9317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-exploits-cisco-ivanti-palo-alto-flaws-6a192de2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20Exploits%20Cisco%2C%20Ivanti%2C%20Palo%20Alto%20Flaws%20to%20Breach%20600%20Organizations%20Worldwide&amp;severity=high&amp;id=68b09643ad5a09ad006e930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matlab-dev-says-ransomware-gang-stole-data-of-1000-378b035f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MATLAB%20dev%20says%20ransomware%20gang%20stole%20data%20of%2010%2C000%20people&amp;severity=high&amp;id=68b09643ad5a09ad006e9313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/passwordstate-dev-urges-users-to-patch-auth-bypass-b150a207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Passwordstate%20dev%20urges%20users%20to%20patch%20auth%20bypass%20vulnerability&amp;severity=high&amp;id=68b092c0ad5a09ad006e76bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intercepting-ldap-with-interceptsuite-817b1ff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intercepting%20LDAP%20With%20InterceptSuite&amp;severity=medium&amp;id=68b092d1ad5a09ad006e779e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58047-cwe-755-improper-handling-of-except-f170ba2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58047%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20plone%20volto&amp;severity=high&amp;id=68b092cead5a09ad006e7750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31979-cwe-434-unrestricted-upload-of-file-1d07abb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31979%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=68b08f3cad5a09ad006e6370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31977-cwe-311-missing-encryption-of-sensi-6b9fce28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31977%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20HCL%20Software%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=68b08f3cad5a09ad006e636d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31972-cwe-319-cleartext-transmission-of-s-790791b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31972%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20BigFix%20Service%20Management%20(SM)&amp;severity=medium&amp;id=68b08bb7ad5a09ad006e532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58335-cwe-356-in-jetbrains-junie-93dda2a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58335%3A%20CWE-356%20in%20JetBrains%20Junie&amp;severity=medium&amp;id=68b08bb7ad5a09ad006e5334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58334-cwe-862-in-jetbrains-ide-services-ba653bfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58334%3A%20CWE-862%20in%20JetBrains%20IDE%20Services&amp;severity=high&amp;id=68b08bb7ad5a09ad006e5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57819-cwe-89-improper-neutralization-of-s-24d09599</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57819%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FreePBX%20endpoint&amp;severity=critical&amp;id=68b08834ad5a09ad006e497e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25010-cwe-863-incorrect-authorization-in--f4612209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25010%3A%20CWE-863%20Incorrect%20Authorization%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=68b07dadad5a09ad006e0f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13986-cwe-434-unrestricted-upload-of-file-153698f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13986%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Nagios%20Nagios%20XI&amp;severity=high&amp;id=690a323af0ba78a05059954b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thousands-of-developer-credentials-stolen-in-macos-6decc029</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Thousands%20of%20Developer%20Credentials%20Stolen%20in%20macOS%20%E2%80%9Cs1ngularity%E2%80%9D%20Attack&amp;severity=medium&amp;id=68b0769fad5a09ad006deef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sliding-into-your-dms-abusing-microsoft-teams-for--06d3a0da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sliding%20into%20your%20DMs%3A%20Abusing%20Microsoft%20Teams%20for%20Malware%20Delivery&amp;severity=medium&amp;id=68b076b5ad5a09ad006defa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-nx-packages-in-s1ngularity-attack-leaked-ecc47ee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Nx%20Packages%20in%20%E2%80%98s1ngularity%E2%80%99%20Attack%20Leaked%202%2C349%20GitHub%2C%20Cloud%2C%20and%20AI%20Credentials&amp;severity=high&amp;id=68b06f96ad5a09ad006dc036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netherlands-confirms-chinas-salt-typhoon-targeted--0d07c91e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Netherlands%20Confirms%20China%E2%80%99s%20Salt%20Typhoon%20Targeted%20Small%20Dutch%20Telcos&amp;severity=high&amp;id=68b06f96ad5a09ad006dc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transunion-suffers-data-breach-impacting-over-44-m-30a6548a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TransUnion%20suffers%20data%20breach%20impacting%20over%204.4%20million%20people&amp;severity=high&amp;id=68b06f96ad5a09ad006dc032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toath-campaign-exploits-end-of-support-software-to-ea07be08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TOATH%20Campaign%20Exploits%20End-of-Support%20Software%20to%20Target%20Traditional%20Chinese%20Users%20and%20Dissidents&amp;severity=medium&amp;id=68b0731aad5a09ad006dd3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8067-out-of-bounds-read-in-red-hat-red-ha-ff0f9003</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8067%3A%20Out-of-bounds%20Read%20in%20storaged-project%20udisks&amp;severity=high&amp;id=68b06fc4ad5a09ad006dc21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9578-cwe-732-in-acronis-acronis-cyber-pro-74e24b77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9578%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=68b0650dad5a09ad006d6920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-appsuite-pdf-editor-spreads-tamperedchef-f1400b2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Appsuite%20PDF%20Editor%20Spreads%20Tamperedchef%20Malware&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-us-and-allies-blame-three-chinese-tech-firms-fo-76ef53fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%2C%20US%20and%20Allies%20Blame%20Three%20Chinese%20Tech%20Firms%20for%20Global%20Cyberattacks&amp;severity=medium&amp;id=68b05a7ead5a09ad006d19c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-the-silver-fox-cat-mouse-in-kernel-shadows-eccc98e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20the%20Silver%20Fox%3A%20Cat%20%26%20Mouse%20in%20Kernel%20Shadows&amp;severity=medium&amp;id=68b05a98ad5a09ad006d1a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58127-cwe-295-improper-certificate-valida-a16ce938</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58127%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58126-cwe-295-improper-certificate-valida-0765a1fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58126%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58125-cwe-295-improper-certificate-valida-65360ef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58125%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58124-cwe-295-improper-certificate-valida-afd544d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58124%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58123-cwe-295-improper-certificate-valida-9de2f39b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58123%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=68b056fcad5a09ad006d0d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54742-cwe-502-deserialization-of-untruste-99ab55ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54742%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=68b05381ad5a09ad006cfd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54738-cwe-288-authentication-bypass-using-b3f0bb02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54738%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68b05381ad5a09ad006cfd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54734-cwe-862-missing-authorization-in-bp-2083a4e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54734%3A%20Missing%20Authorization%20in%20bPlugins%20B%20Slider&amp;severity=null&amp;id=68b05381ad5a09ad006cfd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54733-cwe-862-missing-authorization-in-mi-f2a359f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54733%3A%20Missing%20Authorization%20in%20all_bootstrap_blocks%20All%20Bootstrap%20Blocks&amp;severity=null&amp;id=68b05381ad5a09ad006cfd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54731-cwe-94-improper-control-of-generati-82f92611</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54731%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20emarket-design%20YouTube%20Showcase&amp;severity=null&amp;id=68b05381ad5a09ad006cfd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54725-cwe-288-authentication-bypass-using-0acbab1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54725%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Golo&amp;severity=null&amp;id=68b05381ad5a09ad006cfd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54724-cwe-79-improper-neutralization-of-i-68e9e57a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54724%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Golo&amp;severity=null&amp;id=68b05381ad5a09ad006cfd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54720-cwe-89-improper-neutralization-of-s-5f12e2ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54720%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SteelThemes%20Nest%20Addons&amp;severity=null&amp;id=68b05381ad5a09ad006cfd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54716-cwe-98-improper-control-of-filename-65dcb93d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54716%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Ireca&amp;severity=null&amp;id=68b05381ad5a09ad006cfd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54714-cwe-862-missing-authorization-in-dy-5a3dfc17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54714%3A%20Missing%20Authorization%20in%20Dylan%20James%20Zephyr%20Project%20Manager&amp;severity=null&amp;id=68b05381ad5a09ad006cfd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54710-cwe-862-missing-authorization-in-bp-732d9134</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54710%3A%20Missing%20Authorization%20in%20bPlugins%20Tiktok%20Feed&amp;severity=null&amp;id=68b05381ad5a09ad006cfd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54029-cwe-22-improper-limitation-of-a-pat-d6f86893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54029%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20extendons%20WooCommerce%20csv%20import%20export&amp;severity=null&amp;id=68b05381ad5a09ad006cfd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53588-cwe-22-improper-limitation-of-a-pat-80727f17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53588%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=null&amp;id=68b05381ad5a09ad006cfd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53584-cwe-502-deserialization-of-untruste-0eb76c32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53584%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20WP%20Ticket%20Customer%20Service%20Software%20%26%20Support%20Ticket%20System&amp;severity=null&amp;id=68b05381ad5a09ad006cfd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53583-cwe-502-deserialization-of-untruste-43a38a66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53583%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20Employee%20Spotlight&amp;severity=null&amp;id=68b05381ad5a09ad006cfd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53578-cwe-98-improper-control-of-filename-b1d21b45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53578%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kipso&amp;severity=null&amp;id=68b05381ad5a09ad006cfd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53576-cwe-98-improper-control-of-filename-7f527bda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53576%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20Ovatheme%20Events&amp;severity=null&amp;id=68b05381ad5a09ad006cfd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53572-cwe-502-deserialization-of-untruste-c93e7ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53572%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20WP%20Easy%20Contact&amp;severity=null&amp;id=68b05380ad5a09ad006cfd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53337-cwe-862-missing-authorization-in-as-9bdd9c22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53337%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20LifePress&amp;severity=null&amp;id=68b05380ad5a09ad006cfd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53334-cwe-98-improper-control-of-filename-7b91a752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53334%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20TieLabs%20Jannah&amp;severity=null&amp;id=68b05380ad5a09ad006cfd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53328-cwe-98-improper-control-of-filename-c9997941</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53328%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Opinion%20Stage%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=null&amp;id=68b05380ad5a09ad006cfd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53326-cwe-98-improper-control-of-filename-ad44f94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53326%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=null&amp;id=68b05380ad5a09ad006cfd39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53289-cwe-79-improper-neutralization-of-i-e9f631bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Theme%20Blvd%20Widget%20Areas&amp;severity=null&amp;id=68b05380ad5a09ad006cfd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53248-cwe-98-improper-control-of-filename-8a4f6683</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53248%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magazine&amp;severity=null&amp;id=68b05380ad5a09ad006cfd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53247-cwe-98-improper-control-of-filename-3a1c7a46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53247%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpinterface%20BlogMarks&amp;severity=null&amp;id=68b05380ad5a09ad006cfd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53244-cwe-98-improper-control-of-filename-128ef7a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53244%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magazine%20Elite&amp;severity=null&amp;id=68b05380ad5a09ad006cfd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53243-cwe-502-deserialization-of-untruste-2252a073</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53243%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emarket-design%20Employee%20Directory%20%E2%80%93%20Staff%20Listing%20%26amp%3B%20Team%20Directory%20Plugin%20for%20WordPress&amp;severity=null&amp;id=68b05380ad5a09ad006cfd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53230-cwe-862-missing-authorization-in-ho-84c6c778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53230%3A%20Missing%20Authorization%20in%20honzat%20Page%20Manager%20for%20Elementor&amp;severity=null&amp;id=68b05380ad5a09ad006cfd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53227-cwe-98-improper-control-of-filename-78dc10b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53227%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magazine%20Saga&amp;severity=null&amp;id=68b05380ad5a09ad006cfd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53225-cwe-79-improper-neutralization-of-i-b65b3378</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53225%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eboekhouden%20e-Boekhouden.nl&amp;severity=null&amp;id=68b05380ad5a09ad006cfd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53224-cwe-79-improper-neutralization-of-i-ca150c94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Koen%20Schuit%20NextGEN%20Gallery%20Search&amp;severity=null&amp;id=68b05380ad5a09ad006cfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53223-cwe-79-improper-neutralization-of-i-4e0e81f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53223%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undoIT%20Theme%20Switcher%20Reloaded&amp;severity=null&amp;id=68b05380ad5a09ad006cfd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53220-cwe-79-improper-neutralization-of-i-f0ff99d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20XmasB%20XmasB%20Quotes&amp;severity=null&amp;id=68b05380ad5a09ad006cfd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53216-cwe-98-improper-control-of-filename-56ee5e22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeuniver%20Glamer&amp;severity=null&amp;id=68b05380ad5a09ad006cfd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53215-cwe-79-improper-neutralization-of-i-3a59f642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53215%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%208bitkid%20Yahoo!%20WebPlayer&amp;severity=null&amp;id=68b05380ad5a09ad006cfd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52761-cwe-502-deserialization-of-untruste-698ac8a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52761%3A%20Deserialization%20of%20Untrusted%20Data%20in%20manfcarlo%20WP%20Funnel%20Manager&amp;severity=null&amp;id=68b05380ad5a09ad006cfd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49407-cwe-79-improper-neutralization-of-i-777de832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Houzez&amp;severity=high&amp;id=68b05380ad5a09ad006cfd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49405-cwe-98-improper-control-of-filename-ec0fcbaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49405%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Favethemes%20Houzez&amp;severity=high&amp;id=68b0537fad5a09ad006cfcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49404-cwe-89-improper-neutralization-of-s-967bcf6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49404%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20purethemes%20Listeo%20Core&amp;severity=null&amp;id=68b0537fad5a09ad006cfcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49402-cwe-862-missing-authorization-in-fa-66a67b65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49402%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scriptsbundle%20Exertio%20Framework&amp;severity=null&amp;id=68b0537fad5a09ad006cfcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49388-cwe-266-incorrect-privilege-assignm-5da84fdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49388%3A%20Incorrect%20Privilege%20Assignment%20in%20kamleshyadav%20Miraculous%20Core%20Plugin&amp;severity=null&amp;id=68b0537fad5a09ad006cfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49387-cwe-434-unrestricted-upload-of-file-1ff78201</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49387%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20add-ons.org%20Drag%20and%20Drop%20File%20Upload%20for%20Elementor%20Forms&amp;severity=null&amp;id=68b0537fad5a09ad006cfce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49383-cwe-98-improper-control-of-filename-c9bb2950</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CocoBasic%20Neresa&amp;severity=null&amp;id=68b0537fad5a09ad006cfce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48365-cwe-79-improper-neutralization-of-i-f6684c84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48365%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imaprogrammer%20Custom%20Comment&amp;severity=null&amp;id=68b0537fad5a09ad006cfce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48364-cwe-918-server-side-request-forgery-afaea58d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48364%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vEnCa-X%20rajce&amp;severity=null&amp;id=68b0537fad5a09ad006cfce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48363-cwe-352-cross-site-request-forgery--d1cccaf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48363%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metin%20Sara%C3%A7%20Popup%20for%20CF7%20with%20Sweet%20Alert&amp;severity=null&amp;id=68b0537fad5a09ad006cfcdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48362-cwe-352-cross-site-request-forgery--c51f8a0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48362%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=68b0537fad5a09ad006cfcda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48361-cwe-201-insertion-of-sensitive-info-7cf922e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48361%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=68b0537ead5a09ad006cfccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48360-cwe-79-improper-neutralization-of-i-3926717e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Razvan%20Stanga%20Varnish%2FNginx%20Proxy%20Caching&amp;severity=null&amp;id=68b0537ead5a09ad006cfcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48359-cwe-352-cross-site-request-forgery--1affb4f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thaihavnn07%20ATT%20YouTube%20Widget&amp;severity=null&amp;id=68b0537ead5a09ad006cfcc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48358-cwe-79-improper-neutralization-of-i-b1b07a42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20everythingwp%20Risk%20Free%20Cash%20On%20Delivery%20(COD)%20%26%238211%3B%20WooCommerce&amp;severity=null&amp;id=68b0537ead5a09ad006cfcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48357-cwe-352-cross-site-request-forgery--686a7e45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Theme%20Century%20Century%20ToolKit&amp;severity=null&amp;id=68b0537ead5a09ad006cfcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48356-cwe-79-improper-neutralization-of-i-ad10bed2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Isra%20Kanpress&amp;severity=null&amp;id=68b0537ead5a09ad006cfcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48354-cwe-79-improper-neutralization-of-i-519a4618</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Smart%20Widgets%20Better%20Post%20%26%20Filter%20Widgets%20for%20Elementor&amp;severity=null&amp;id=68b0537ead5a09ad006cfcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48353-cwe-352-cross-site-request-forgery--02dc221b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dactum%20Clickbank%20WordPress%20Plugin%20(Niche%20Storefront)&amp;severity=null&amp;id=68b0537ead5a09ad006cfcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48352-cwe-79-improper-neutralization-of-i-837bdc8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sitesearch-yandex%20Yandex%20Site%20search%20pinger&amp;severity=null&amp;id=68b0537ead5a09ad006cfcb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48351-cwe-352-cross-site-request-forgery--1825180c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginsPoint%20Kento%20Splash%20Screen&amp;severity=null&amp;id=68b0537ead5a09ad006cfcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48350-cwe-862-missing-authorization-in-ne-9ba95ece</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48350%3A%20Missing%20Authorization%20in%20Basar%20Ventures%20AutoWP&amp;severity=null&amp;id=68b0537ead5a09ad006cfca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48349-cwe-79-improper-neutralization-of-i-27fbc73f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20origincode%20Video%20Gallery%20%E2%80%93%20Vimeo%20and%20YouTube%20Gallery&amp;severity=null&amp;id=68b0537ead5a09ad006cfca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48348-cwe-266-incorrect-privilege-assignm-40ab0a73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48348%3A%20Incorrect%20Privilege%20Assignment%20in%20chandrashekharsahu%20Site%20Offline&amp;severity=null&amp;id=68b0537ead5a09ad006cfc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48347-cwe-79-improper-neutralization-of-i-94e0b54e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Mimoun-Prat%20bxSlider%20integration%20for%20WordPress&amp;severity=null&amp;id=68b0537ead5a09ad006cfc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48343-cwe-352-cross-site-request-forgery--f2f08004</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aaron%20Axelsen%20WPMU%20Ldap%20Authentication&amp;severity=null&amp;id=68b0537ead5a09ad006cfc99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48327-cwe-862-missing-authorization-in-in-c8fc5bd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48327%3A%20Missing%20Authorization%20in%20inkthemes%20WP%20Mailgun%20SMTP&amp;severity=null&amp;id=68b0537ead5a09ad006cfc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48325-cwe-352-cross-site-request-forgery--fe579598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48325%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shmish111%20WP%20Admin%20Theme&amp;severity=null&amp;id=68b0537ead5a09ad006cfc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48324-cwe-79-improper-neutralization-of-i-5efe689b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khashabawy%20tli.tl%20auto%20Twitter%20poster&amp;severity=null&amp;id=68b0537ead5a09ad006cfc90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48323-cwe-79-improper-neutralization-of-i-5ce08a7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md%20Abunaser%20Khan%20Advance%20Food%20Menu&amp;severity=null&amp;id=68b0537ead5a09ad006cfc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48322-cwe-79-improper-neutralization-of-i-afd2cbe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Finn%20Dohrn%20Statify%20Widget&amp;severity=null&amp;id=68b0537ead5a09ad006cfc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48321-cwe-352-cross-site-request-forgery--e844b2b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48321%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dyiosah%20Ultimate%20twitter%20profile%20widget&amp;severity=null&amp;id=68b0537dad5a09ad006cfc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48320-cwe-352-cross-site-request-forgery--8fdd9c82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48320%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=null&amp;id=68b0537dad5a09ad006cfc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48319-cwe-79-improper-neutralization-of-i-f05e43fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gslauraspeck%20Mesa%20Mesa%20Reservation%20Widget&amp;severity=null&amp;id=68b0537dad5a09ad006cfc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48318-cwe-352-cross-site-request-forgery--2831e7bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48318%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=null&amp;id=68b0537dad5a09ad006cfc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48316-cwe-79-improper-neutralization-of-i-ed3d2518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ItayXD%20Responsive%20Mobile-Friendly%20Tooltip&amp;severity=null&amp;id=68b0537dad5a09ad006cfc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48315-cwe-79-improper-neutralization-of-i-d821a697</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48315%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stanton119%20WordPress%20HTML&amp;severity=null&amp;id=68b0537dad5a09ad006cfc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48314-cwe-79-improper-neutralization-of-i-67503e95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salubrio%20Add%20Code%20To%20Head&amp;severity=null&amp;id=68b0537dad5a09ad006cfc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48313-cwe-79-improper-neutralization-of-i-3c93b780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevin%20heath%20Tripadvisor%20Shortcode&amp;severity=null&amp;id=68b0537dad5a09ad006cfc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48312-cwe-79-improper-neutralization-of-i-bdb965b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%E6%96%87%E6%B4%BE%E7%BF%BB%E8%AF%91%EF%BC%88WP%20Chinese%20Translation%EF%BC%89%20WPAvatar&amp;severity=null&amp;id=68b0537dad5a09ad006cfc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48311-cwe-352-cross-site-request-forgery--34fbdaa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48311%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OffClicks%20Invisible%20Optin&amp;severity=null&amp;id=68b0537dad5a09ad006cfc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48310-cwe-352-cross-site-request-forgery--a7886aef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48310%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptableeditor%20Table%20Editor&amp;severity=null&amp;id=68b0537dad5a09ad006cfc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48309-cwe-352-cross-site-request-forgery--e9558ad3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48309%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20web-able%20BetPress&amp;severity=null&amp;id=68b0537dad5a09ad006cfc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48308-cwe-352-cross-site-request-forgery--a68f4223</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48308%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nonletter%20Newsletter%20subscription%20optin%20module&amp;severity=null&amp;id=68b0537dad5a09ad006cfc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48307-cwe-352-cross-site-request-forgery--4f3b2437</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48307%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kasonzhao%20SEO%20For%20Images&amp;severity=null&amp;id=68b0537dad5a09ad006cfc4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48306-cwe-352-cross-site-request-forgery--887f7bf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48306%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20developers%20savyour%20Savyour%20Affiliate%20Partner&amp;severity=null&amp;id=68b0537dad5a09ad006cfc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48305-cwe-79-improper-neutralization-of-i-5506d4f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vikingjs%20Goal%20Tracker%20for%20Patreon&amp;severity=null&amp;id=68b0537dad5a09ad006cfc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48304-cwe-352-cross-site-request-forgery--11044422</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48304%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Gary%20Illyes%20Google%20XML%20News%20Sitemap%20plugin&amp;severity=null&amp;id=68b0537dad5a09ad006cfc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48110-cwe-79-improper-neutralization-of-i-6734f52c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48110%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mibuthu%20Link%20View&amp;severity=null&amp;id=68b0537dad5a09ad006cfc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48109-cwe-352-cross-site-request-forgery--3638d9ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48109%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Xavier%20Media%20XM-Backup&amp;severity=null&amp;id=68b0537dad5a09ad006cfc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48100-cwe-94-improper-control-of-generati-e7d75ff0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48100%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20extremeidea%20bidorbuy%20Store%20Integrator&amp;severity=null&amp;id=68b0537dad5a09ad006cfc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-big-sleep-ai-detection-tool-finds-critical--401c1f6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Big%20Sleep%20AI%20Detection%20Tool%20Finds%20Critical%209.8%20Chrome%20Vulnerability&amp;severity=critical&amp;id=68b04c6fad5a09ad006cda89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39496-cwe-89-improper-neutralization-of-s-fedcb194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WBW%20WooBeWoo%20Product%20Filter%20Pro&amp;severity=critical&amp;id=68b041e6ad5a09ad006c7cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9376-cwe-863-incorrect-authorization-in-s-f9528b97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9376%3A%20CWE-863%20Incorrect%20Authorization%20in%20sminozzi%20Block%20Bad%20Bots%20and%20Stop%20Bad%20Bots%20Crawlers%20and%20Spiders%20and%20Anti%20Spam%20Protection&amp;severity=medium&amp;id=68b03addad5a09ad006c4c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-covert-dual-mode-backdoor-threat-fa74959e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Covert%20Dual-Mode%20Backdoor%20Threat&amp;severity=medium&amp;id=68b05a98ad5a09ad006d1a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55175-cwe-79-improper-neutralization-of-i-2f3a98d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54544-cwe-79-improper-neutralization-of-i-15338fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54544%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54543-cwe-79-improper-neutralization-of-i-88460a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54543%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54542-cwe-598-use-of-get-request-method-w-49ea03fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54542%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54541-cwe-352-cross-site-request-forgery--0633ad35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54541%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54540-cwe-79-improper-neutralization-of-i-df814bb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20QuickCMS&amp;severity=medium&amp;id=68b02cccad5a09ad006bf572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48963-cwe-610-in-acronis-acronis-cyber-pr-ff1e201a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48963%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=68b02948ad5a09ad006bd635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freepbx-servers-hacked-via-zero-day-emergency-fix--8cdc98e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FreePBX%20servers%20hacked%20via%20zero-day%2C%20emergency%20fix%20released&amp;severity=critical&amp;id=68b0223fad5a09ad006b9782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-0501-hackers-shift-to-ransomware-attacks-in--0b3a2a79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-0501%20hackers%20shift%20to%20ransomware%20attacks%20in%20the%20cloud&amp;severity=high&amp;id=68b0223fad5a09ad006b9786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58081-use-of-hard-coded-password-in-dos-c-daa306b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58081%3A%20Use%20of%20hard-coded%20password%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58072-improper-limitation-of-a-pathname-t-f88a76e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58072%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54819-improper-limitation-of-a-pathname-t-2ddae70f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54819%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=medium&amp;id=68b017b8ad5a09ad006b3bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54762-unrestricted-upload-of-file-with-da-29f090e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54762%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=critical&amp;id=68b017b8ad5a09ad006b3bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53970-unrestricted-upload-of-file-with-da-d2bad5d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53970%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=critical&amp;id=68b017b8ad5a09ad006b3bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53396-incorrect-permission-assignment-for-4795482e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53396%3A%20Incorrect%20permission%20assignment%20for%20critical%20resource%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52460-files-or-directories-accessible-to--a5e984cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52460%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=medium&amp;id=68b017b8ad5a09ad006b3bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46409-inadequate-encryption-strength-in-d-a342d5d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46409%3A%20Inadequate%20encryption%20strength%20in%20DOS%20Co.%2C%20Ltd.%20SS1&amp;severity=high&amp;id=68b017b8ad5a09ad006b3be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58322-cwe-266-incorrect-privilege-assignm-4acb22f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58322%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20NAVER%20NAVER%20MYBOX%20Explorer&amp;severity=high&amp;id=68b010acad5a09ad006b00c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6255-cwe-79-improper-neutralization-of-in-8d9ab581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugincy%20Dynamic%20AJAX%20Product%20Filters%20for%20WooCommerce&amp;severity=medium&amp;id=68affb97ad5a09ad006a13c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8073-cwe-79-improper-neutralization-of-in-f0b3620f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugincy%20Dynamic%20AJAX%20Product%20Filters%20for%20WooCommerce&amp;severity=medium&amp;id=68affb97ad5a09ad006a13cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7956-cwe-862-missing-authorization-in-wpd-96d21041</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7956%3A%20CWE-862%20Missing%20Authorization%20in%20wpdreams%20Ajax%20Search%20Lite%20%E2%80%93%20Live%20Search%20%26%20Filter&amp;severity=medium&amp;id=68afea00ad5a09ad006937b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13807-cwe-200-exposure-of-sensitive-infor-93bb4d3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13807%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7955-cwe-287-improper-authentication-in-p-86d9cc73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7955%3A%20CWE-287%20Improper%20Authentication%20in%20pbmacintyre%20RingCentral%20Communications%20Plugin%20%E2%80%93%20FREE&amp;severity=critical&amp;id=68afea00ad5a09ad006937ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8977-cwe-89-improper-neutralization-of-sp-1a8f8d2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8977%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=medium&amp;id=68afdbf0ad5a09ad0068ddf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9345-cwe-22-improper-limitation-of-a-path-de2ad3b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9345%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softdiscover%20File%20Manager%2C%20Code%20Editor%2C%20and%20Backup%20by%20Managefy&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068abaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9346-cwe-79-improper-neutralization-of-in-67a09978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9346%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Booking%20Calendar&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068abb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9648-cwe-434-unrestricted-upload-of-file--56d04c57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9648%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Ulike%20WP%20ULike%20Pro&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8603-cwe-79-improper-neutralization-of-in-973d5d31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8603%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068abaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0951-cwe-862-missing-authorization-in-liq-79dacdd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0951%3A%20CWE-862%20Missing%20Authorization%20in%20LiquidThemes%20AI%20Hub%20-%20Startup%20%26%20Technology%20WordPress%20Theme&amp;severity=medium&amp;id=68afd4e9ad5a09ad0068aba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36003-cwe-209-generation-of-error-message-f10ee358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36003%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Security%20Verify%20Governance%20Identity%20Manager&amp;severity=high&amp;id=68afbc4cad5a09ad00682522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7812-cwe-352-cross-site-request-forgery-c-fef51e82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7812%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=high&amp;id=68afbc4cad5a09ad00682525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8897-cwe-79-improper-neutralization-of-in-fe2ad9c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=68afbc4cad5a09ad0068252b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9344-cwe-79-improper-neutralization-of-in-31067c92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9344%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WP&amp;severity=medium&amp;id=68afbc4cad5a09ad0068252f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9352-cwe-79-improper-neutralization-of-in-a132693e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pronamic%20Pronamic%20Google%20Maps&amp;severity=medium&amp;id=68afbc4cad5a09ad00682534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-28-1b652345</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-28&amp;severity=medium&amp;id=68b0f19ead5a09ad007192b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57219-na-b175077b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57219%3A%20n%2Fa&amp;severity=medium&amp;id=68b0a7d8ad5a09ad006f0175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57220-na-54645143</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57220%3A%20n%2Fa&amp;severity=medium&amp;id=68b0a7d8ad5a09ad006f0172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57215-na-9a26206a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57215%3A%20n%2Fa&amp;severity=high&amp;id=68b0a7d8ad5a09ad006f016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57218-na-6e9ad413</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57218%3A%20n%2Fa&amp;severity=medium&amp;id=68b09669ad5a09ad006e93e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57217-na-bade6ae7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57217%3A%20n%2Fa&amp;severity=medium&amp;id=68b092cead5a09ad006e774d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51643-na-b7b93f94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51643%3A%20n%2Fa&amp;severity=low&amp;id=68b07dadad5a09ad006e0f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29364-na-4cbba1f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29364%3A%20n%2Fa&amp;severity=medium&amp;id=68b076b2ad5a09ad006def9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56236-na-592aacc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56236%3A%20n%2Fa&amp;severity=medium&amp;id=68b0731bad5a09ad006dd424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55583-na-cc15e546</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55583%3A%20n%2Fa&amp;severity=critical&amp;id=68b06c1aad5a09ad006da24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52054-na-db5602c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52054%3A%20n%2Fa&amp;severity=medium&amp;id=68b06c1aad5a09ad006da248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51972-na-92f7c518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51972%3A%20n%2Fa&amp;severity=medium&amp;id=68b06187ad5a09ad006d54c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51971-na-0415e08c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51971%3A%20n%2Fa&amp;severity=medium&amp;id=68b06187ad5a09ad006d54c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51969-na-8edcf212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51969%3A%20n%2Fa&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51968-na-e9fea0f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51968%3A%20n%2Fa&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51967-na-84086301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51967%3A%20n%2Fa&amp;severity=medium&amp;id=68b05e04ad5a09ad006d2fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/first-ai-powered-ransomware-promptlock-targets-win-34d86c3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=First%20AI-Powered%20Ransomware%20PromptLock%20Targets%20Windows%2C%20Linux%20and%20macOS&amp;severity=medium&amp;id=68af840cad5a09ad00667d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13979-cwe-89-improper-neutralization-of-s-3248fd16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13979%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hangzhou%20Shengqiao%20Technology%20Co.%20Ltd.%20St.%20Joe%20ERP%20System%20(%22%E5%9C%A3%E4%B9%94ERP%E7%B3%BB%E7%BB%9F%22)&amp;severity=critical&amp;id=692a23934c03a75d3feb2747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13982-cwe-22-improper-limitation-of-a-pat-d1516b0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13982%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Changsha%20SPON%20Communication%20Technology%20Co.%20Ltd.%20SPON%20IP%20Network%20Broadcast%20System&amp;severity=high&amp;id=691f4e5838b88f02b519166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7308-cwe-306-missing-authentication-for-c-1296e864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7308%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NSFOCUS%20SecGate3600%20Firewall&amp;severity=high&amp;id=691f4e5838b88f02b5191665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13980-cwe-502-deserialization-of-untruste-b8dc7a82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13980%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20H3C%20Group%20Intelligent%20Management%20Center%20(iMC)&amp;severity=critical&amp;id=69a979570e5bba37cad8c287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34163-cwe-434-unrestricted-upload-of-file-aab9cd41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34163%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Qingdao%20Dongsheng%20Weiye%20Software%20Co.%2C%20Ltd.%20Dongsheng%20Logistics%20Software&amp;severity=critical&amp;id=68af7981ad5a09ad006645b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34162-cwe-89-improper-neutralization-of-s-83138d00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34162%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Feijiu%20Medical%20Technology%20Co.%2C%20Ltd.%20Bian%20Que%20Feijiu%20Intelligent%20Emergency%20and%20Quality%20Control%20System&amp;severity=critical&amp;id=68af7981ad5a09ad006645b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34160-cwe-78-improper-neutralization-of-s-a8442585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34160%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shanghai%20Aishu%20Information%20Technology%20Co.%2C%20Ltd.%20AnyShare&amp;severity=critical&amp;id=68af7981ad5a09ad006645aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34520-cwe-288-authentication-bypass-using-0b030376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34520%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=high&amp;id=68af7981ad5a09ad006645bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34521-cwe-79-improper-neutralization-of-i-fffb0b7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=medium&amp;id=68af7981ad5a09ad006645bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34522-cwe-122-heap-based-buffer-overflow--7c4c1f06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34522%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=critical&amp;id=68af7981ad5a09ad006645c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34523-cwe-122-heap-based-buffer-overflow--1f0a1ed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34523%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Arcserve%20Unified%20Data%20Protection%20(UDP)&amp;severity=critical&amp;id=68af7981ad5a09ad006645c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-28000-citrix-devices-vulnerable-to-new-exploi-43ebdf95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2028%2C000%20Citrix%20devices%20vulnerable%20to%20new%20exploited%20RCE%20flaw&amp;severity=high&amp;id=68af6ef4ad5a09ad00661659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-is-the-group-thats-been-swatting-us-universit-b8004a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20Is%20the%20Group%20That&apos;s%20Been%20Swatting%20US%20Universities&amp;severity=high&amp;id=68af6ef4ad5a09ad00661661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-salt-typhoon-hacking-campaigns-linked-to-ch-af32a32a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Salt%20Typhoon%20hacking%20campaigns%20linked%20to%20Chinese%20tech%20firms&amp;severity=high&amp;id=68af6ef4ad5a09ad0066165d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40779-cwe-476-null-pointer-dereference-in-bacb9bcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40779%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ISC%20Kea&amp;severity=high&amp;id=68af6b74ad5a09ad0065fbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-system-supplier-cyberattack-impacts-200-municip-08a2280d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IT%20system%20supplier%20cyberattack%20impacts%20200%20municipalities%20in%20Sweden&amp;severity=high&amp;id=68af6468ad5a09ad0065d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-steal-1-million-in-crypto-using-fake-delt-4884377a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Steal%20%241%20Million%20in%20Crypto%20Using%20Fake%20Delta%20and%20AMC%20Sites&amp;severity=medium&amp;id=68af6468ad5a09ad0065d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zipline-phishing-campaign-targets-us-manufacturing-a05ab842</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZipLine%20Phishing%20Campaign%20Targets%20U.S.%20Manufacturing&amp;severity=medium&amp;id=68af59dead5a09ad00657647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58050-cwe-125-out-of-bounds-read-in-pcre2-648cfd5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58050%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PCRE2Project%20pcre2&amp;severity=medium&amp;id=68af565cad5a09ad0065587f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-and-scattered-spider-linked-to-farmer-59019c2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20and%20Scattered%20Spider%20Linked%20to%20Farmers%20Insurance%20Data%20Breach&amp;severity=high&amp;id=68af44c4ad5a09ad0064ab65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58218-cwe-502-deserialization-of-untruste-7b8a11bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58218%3A%20Deserialization%20of%20Untrusted%20Data%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20USPS%20Edition&amp;severity=null&amp;id=68af44dead5a09ad0064ac5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58217-cwe-352-cross-site-request-forgery--87a618ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58217%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GeroNikolov%20Instant%20Breaking%20News&amp;severity=null&amp;id=68af44dead5a09ad0064ac5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58216-cwe-79-improper-neutralization-of-i-b3e47194</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58216%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgwhite33%20WP%20Thumbtack%20Review%20Slider&amp;severity=null&amp;id=68af44dead5a09ad0064ac58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58213-cwe-79-improper-neutralization-of-i-49771c56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58213%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ameliabooking%20Booking%20System%20Trafft&amp;severity=null&amp;id=68af44dead5a09ad0064ac55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58212-cwe-79-improper-neutralization-of-i-473c9975</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58212%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20epeken%20Epeken%20All%20Kurir&amp;severity=null&amp;id=68af44dead5a09ad0064ac52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58211-cwe-79-improper-neutralization-of-i-e6ad24e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58211%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexvtn%20Chatbox%20Manager&amp;severity=null&amp;id=68af44dead5a09ad0064ac4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58209-cwe-79-improper-neutralization-of-i-f514e16e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtCamp%20Transcoder&amp;severity=null&amp;id=68af44dead5a09ad0064ac4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58208-cwe-79-improper-neutralization-of-i-8cf06855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20PDF%20for%20Elementor%20Forms%20%2B%20Drag%20And%20Drop%20Template%20Builder&amp;severity=null&amp;id=68af44dead5a09ad0064ac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58205-cwe-79-improper-neutralization-of-i-27035ac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58205%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=68af44dead5a09ad0064ac46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58204-cwe-601-url-redirection-to-untruste-114ef517</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58204%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=null&amp;id=68af44dead5a09ad0064ac43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58203-cwe-918-server-side-request-forgery-a8ee377c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58203%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20solacewp%20Solace%20Extra&amp;severity=null&amp;id=68af44dead5a09ad0064ac36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58202-cwe-352-cross-site-request-forgery--7b6592c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58202%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Plugins%20and%20Snippets%20Simple%20Page%20Access%20Restriction&amp;severity=null&amp;id=68af44dead5a09ad0064ac33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58201-cwe-862-missing-authorization-in-af-63700163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58201%3A%20Missing%20Authorization%20in%20AfterShip%20%26amp%3B%20Automizely%20AfterShip%20Tracking&amp;severity=null&amp;id=68af44dead5a09ad0064ac30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58198-cwe-862-missing-authorization-in-xp-a0d38bc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58198%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Theme%20Builder&amp;severity=null&amp;id=68af44dead5a09ad0064ac2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58197-cwe-79-improper-neutralization-of-i-44b5ddd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=null&amp;id=68af44dead5a09ad0064ac2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58196-cwe-79-improper-neutralization-of-i-83c1f2a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements&amp;severity=null&amp;id=68af44dead5a09ad0064ac27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58195-cwe-79-improper-neutralization-of-i-5becd751</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58195%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=null&amp;id=68af44dead5a09ad0064ac24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58194-cwe-79-improper-neutralization-of-i-daac0560</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=68af44dead5a09ad0064ac21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58193-cwe-862-missing-authorization-in-un-25797bab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58193%3A%20Missing%20Authorization%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=null&amp;id=68af44dead5a09ad0064ac1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58192-cwe-862-missing-authorization-in-xy-037314fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58192%3A%20Missing%20Authorization%20in%20Xylus%20Themes%20WP%20Bulk%20Delete&amp;severity=null&amp;id=68af44dead5a09ad0064ac1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34157-cwe-79-improper-neutralization-of-i-1e21af67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34157%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20coolLabs%20Technologies%20Coolify&amp;severity=critical&amp;id=68af3a3bad5a09ad00642200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34159-cwe-94-improper-control-of-generati-9ed22bad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34159%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20coolLabs%20Technologies%20Coolify&amp;severity=critical&amp;id=68af3a3bad5a09ad0064220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34161-cwe-78-improper-neutralization-of-s-a37b5988</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34161%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20coolLabs%20Technologies%20Coolify&amp;severity=critical&amp;id=68af3a3bad5a09ad00642212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57821-cwe-601-url-redirection-to-untruste-acbfd752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57821%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20basecamp%20google_sign_in&amp;severity=medium&amp;id=68af36b6ad5a09ad0063f7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20241-compiler-optimization-removal-or-mo-b9687e15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20241%3A%20Compiler%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=68af3334ad5a09ad0063d8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20262-null-pointer-dereference-in-cisco-c-b6e91ef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20262%3A%20NULL%20Pointer%20Dereference%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20290-exposure-of-sensitive-information-t-428617d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20290%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20292-improper-neutralization-of-special--496b8d41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20292%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20295-improper-neutralization-of-special--49b8c98a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20295%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20294-improper-neutralization-of-special--bcaf5276</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20294%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20342-improper-neutralization-of-script-r-20abdf95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20342%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20317-url-redirection-to-untrusted-site-o-02288199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20317%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=high&amp;id=68af3334ad5a09ad0063d8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20296-improper-neutralization-of-input-du-c9c1598c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20348-exposure-of-sensitive-information-t-f2817546</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20348%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Sent%20Data%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20347-protection-mechanism-failure-in-cis-fc695fec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20347%3A%20Protection%20Mechanism%20Failure%20in%20Cisco%20Cisco%20Data%20Center%20Network%20Manager&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20344-improper-limitation-of-a-pathname-t-ab57cf26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20344%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Nexus%20Dashboard&amp;severity=medium&amp;id=68af3334ad5a09ad0063d8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc-cluster-targeting-south-asian-countries-57ccdec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC%20Cluster%20Targeting%20South%20Asian%20Countries&amp;severity=medium&amp;id=68af5d62ad5a09ad0065ab1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/virtual-infrastructure-abuse-leads-to-saas-hijacks-c807736f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Virtual%20Infrastructure%20Abuse%20leads%20to%20SaaS%20Hijacks&amp;severity=medium&amp;id=68af5d62ad5a09ad0065ab75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spynote-malware-analysis-9abcf718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SpyNote%20Malware%20Analysis&amp;severity=medium&amp;id=68af5d62ad5a09ad0065ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/underground-ransomware-being-distributed-worldwide-08bddc16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Underground%20Ransomware%20Being%20Distributed%20Worldwide&amp;severity=medium&amp;id=68af5d62ad5a09ad0065aba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/like-putty-in-admins-hands-bc966c4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Like%20PuTTY%20in%20Admin&apos;s%20Hands&amp;severity=medium&amp;id=68af5d62ad5a09ad0065abb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/belarus-linked-dslroot-proxy-network-deploys-hardw-e0db72a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Belarus-Linked%20DSLRoot%20Proxy%20Network%20Deploys%20Hardware%20in%20U.S.%20Residences%2C%20Including%20Military%20Homes&amp;severity=medium&amp;id=68af59dead5a09ad0065762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-price-of-trust-analyzing-the-malware-campaign--f82c9174</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Price%20of%20Trust%3A%20Analyzing%20the%20Malware%20Campaign%20Exploiting%20TASPEN&apos;s%20Legacy%20to%20Target%20Indonesian%20Senior%20Citizens&amp;severity=medium&amp;id=68af52d9ad5a09ad006538bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-services-group-data-breach-impacts-6240-ef61656b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20Services%20Group%20data%20breach%20impacts%20624%2C000%20people&amp;severity=high&amp;id=68af1e18ad5a09ad0062ffb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53105-cwe-269-improper-privilege-manageme-fecf299b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53105%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20glpi-project%20glpi&amp;severity=high&amp;id=68af1e37ad5a09ad00630d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-relying-on-llms-for-code-can-be-a-security-nig-c4fe8274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Relying%20on%20LLMs%20for%20Code%20Can%20Be%20a%20Security%20Nightmare&amp;severity=medium&amp;id=68af1a9aad5a09ad0062e754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9533-improper-authentication-in-totolink--71751a8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9533%3A%20Improper%20Authentication%20in%20TOTOLINK%20T10&amp;severity=medium&amp;id=68af1a96ad5a09ad0062e727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nx-compromised-to-check-for-claude-code-cli-and-ex-fb209ae4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NX%20Compromised%20to%20Check%20for%20Claude%20Code%20CLI%20and%20Explore%20Filesystem%20for%20Credentials&amp;severity=medium&amp;id=68af1717ad5a09ad0062d1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43729-cwe-732-incorrect-permission-assign-c40bf0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43729%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=68af139fad5a09ad0062b365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9532-sql-injection-in-portabilis-i-educar-225c4c7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9532%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68af139fad5a09ad0062b36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43730-cwe-88-improper-neutralization-of-a-ce0340e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43730%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=68af1018ad5a09ad006295c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43882-cwe-283-unverified-ownership-in-del-722fca08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43882%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20Dell%20ThinOS%2010&amp;severity=high&amp;id=68af1018ad5a09ad006295ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-desktop-vulnerability-allowed-host-takeover-25ae8726</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Desktop%20Vulnerability%20Allowed%20Host%20Takeover%20on%20Windows%20and%20macOS&amp;severity=medium&amp;id=68af1008ad5a09ad0062948b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43728-cwe-693-protection-mechanism-failur-59c0e26f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43728%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Dell%20ThinOS%2010&amp;severity=critical&amp;id=68af1018ad5a09ad006295c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9531-sql-injection-in-portabilis-i-educar-fb12e24c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9531%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68af0c87ad5a09ad00627bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9529-file-inclusion-in-campcodes-payroll--8f696365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9529%3A%20File%20Inclusion%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=68af0c87ad5a09ad00627bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-reveals-unc6395s-oauth-token-theft-in-sales-7300d4c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Reveals%20UNC6395%E2%80%99s%20OAuth%20Token%20Theft%20in%20Salesforce%20Breach&amp;severity=high&amp;id=68af01f8ad5a09ad006223c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9528-os-command-injection-in-linksys-e170-af264a87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9528%3A%20OS%20Command%20Injection%20in%20Linksys%20E1700&amp;severity=medium&amp;id=68af057ead5a09ad00623b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9527-stack-based-buffer-overflow-in-links-b714741d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9527%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20E1700&amp;severity=high&amp;id=68af057ead5a09ad00623b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-eagles-five-clusters-target-colombia-using-r-004e505f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Eagle%E2%80%99s%20Five%20Clusters%20Target%20Colombia%20Using%20RATs%2C%20Phishing%20Lures%2C%20and%20Dynamic%20DNS%20Infra&amp;severity=high&amp;id=68af01f8ad5a09ad006223c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesloft-oauth-breach-via-drift-ai-chat-agent-exp-fd24ea7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesloft%20OAuth%20Breach%20via%20Drift%20AI%20Chat%20Agent%20Exposes%20Salesforce%20Customer%20Data&amp;severity=high&amp;id=68af01f8ad5a09ad006223c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9526-stack-based-buffer-overflow-in-links-ed39b703</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9526%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20E1700&amp;severity=high&amp;id=68aefe76ad5a09ad006203df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9525-stack-based-buffer-overflow-in-links-69c9236a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9525%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20E1700&amp;severity=high&amp;id=68aefe76ad5a09ad006203d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9523-stack-based-buffer-overflow-in-tenda-2200559a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9523%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=critical&amp;id=68aee257ad5a09ad006124d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30064-cwe-912-hidden-functionality-in-cgm-75d01f5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30064%3A%20CWE-912%20Hidden%20Functionality%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded4ad5a09ad006111c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30063-cwe-732-incorrect-permission-assign-5645aef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30063%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded4ad5a09ad006111c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30061-cwe-89-improper-neutralization-of-s-60706989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30061%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30060-cwe-89-improper-neutralization-of-s-89900b68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30060%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30059-cwe-89-improper-neutralization-of-s-b067a47e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30059%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30058-cwe-89-improper-neutralization-of-s-6113e667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30058%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded4ad5a09ad006111b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30057-cwe-94-improper-control-of-generati-64f99650</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30057%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded4ad5a09ad006111b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30056-cwe-94-improper-control-of-generati-8e035474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30056%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad006111a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30055-cwe-94-improper-control-of-generati-1c1dadf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30055%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad006111a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30048-cwe-306-missing-authentication-for--20ed7952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30048%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=medium&amp;id=68aeded3ad5a09ad0061119f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30041-cwe-306-missing-authentication-for--4ae6cf16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30041%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad0061119c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30040-cwe-306-missing-authentication-for--c14e55c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30040%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad00611199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30039-cwe-306-missing-authentication-for--34d866d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30039%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad00611196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30038-cwe-1230-exposure-of-sensitive-info-29533a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30038%3A%20CWE-1230%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded3ad5a09ad00611193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30037-cwe-306-missing-authentication-for--9d5c5097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30037%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded3ad5a09ad00611190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30036-cwe-79-improper-neutralization-of-i-7510129c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30036%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=high&amp;id=68aeded3ad5a09ad0061118d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2313-cwe-94-improper-control-of-generatio-d0a7e1a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2313%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CGM%20CGM%20CLININET&amp;severity=critical&amp;id=68aeded3ad5a09ad0061118a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-sni5gect-attack-crashes-phones-and-downgrades--26c9b719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Sni5Gect%20Attack%20Crashes%20Phones%20and%20Downgrades%205G%20to%204G%20without%20Rogue%20Base%20Station&amp;severity=high&amp;id=68aed444ad5a09ad0060e226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-fixes-critical-netscaler-rce-flaw-exploited-d2d0276c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20fixes%20critical%20NetScaler%20RCE%20flaw%20exploited%20in%20zero-day%20attacks&amp;severity=critical&amp;id=68aed444ad5a09ad0060e222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-silk-typhoon-targeted-diplomats-by-hi-0649e0b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20linked%20Silk%20Typhoon%20targeted%20diplomats%20by%20hijacking%20web%20traffic&amp;severity=medium&amp;id=68aed0c0ad5a09ad0060b738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9514-weak-password-requirements-in-macroz-66d809fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9514%3A%20Weak%20Password%20Requirements%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68aea30fad5a09ad005fb773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57797-incorrect-privilege-assignment-in-p-93bba552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57797%3A%20Incorrect%20privilege%20assignment%20in%20PFU%20Limited%20ScanSnap%20Manager%20installers&amp;severity=high&amp;id=68ae9c05ad5a09ad005f7f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9513-inadequate-encryption-strength-in-ed-b0942407</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9513%3A%20Inadequate%20Encryption%20Strength%20in%20editso%20fuso&amp;severity=medium&amp;id=68ae9c05ad5a09ad005f7f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9511-sql-injection-in-itsourcecode-apartm-4bedf1b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9511%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae9c05ad5a09ad005f7f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57846-incorrect-default-permissions-in-di-fc5e241d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57846%3A%20Incorrect%20default%20permissions%20in%20Digital%20Arts%20Inc.%20i-%E3%83%95%E3%82%A3%E3%83%AB%E3%82%BF%E3%83%BC%206.0&amp;severity=high&amp;id=68ae9881ad5a09ad005f55cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48081-cwe-35-path-traversal-in-printeers--d22077e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48081%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Printeers%20Printeers%20Print%20%26%20Ship&amp;severity=medium&amp;id=68ae94fdad5a09ad005f4496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9510-sql-injection-in-itsourcecode-apartm-4f5f4980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9510%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae94fdad5a09ad005f4499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9509-sql-injection-in-itsourcecode-apartm-06eec087</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9509%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae8df5ad5a09ad005f2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9508-sql-injection-in-itsourcecode-apartm-c42d1e69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9508%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae8df5ad5a09ad005f2afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9507-sql-injection-in-itsourcecode-apartm-bae6bb91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9507%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ae86edad5a09ad005f0d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9506-sql-injection-in-campcodes-online-lo-fc353701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9506%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae86edad5a09ad005f0d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9505-sql-injection-in-campcodes-online-lo-fc3cd885</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9505%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae7fe5ad5a09ad005ee1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9504-sql-injection-in-campcodes-online-lo-53fc6d9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9504%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae7fe5ad5a09ad005ee1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49035-cwe-79-improper-neutralization-of-i-479e5539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chaimchaikin%20Admin%20Menu%20Groups&amp;severity=null&amp;id=68ae7c61ad5a09ad005ed10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49039-cwe-79-improper-neutralization-of-i-2ae8fc76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49039%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mibuthu%20Link%20View&amp;severity=null&amp;id=68ae7c61ad5a09ad005ed10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9503-sql-injection-in-campcodes-online-lo-dcc23359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9503%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae78ddad5a09ad005ec2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9502-sql-injection-in-campcodes-online-lo-929043c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9502%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Loan%20Management%20System&amp;severity=medium&amp;id=68ae71d5ad5a09ad005e80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7732-cwe-79-improper-neutralization-of-in-2f2bacb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevinweber%20Lazy%20Load%20for%20Videos&amp;severity=medium&amp;id=68ae6ae4ad5a09ad005e556a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-27-a1343ea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-27&amp;severity=medium&amp;id=68afa01ead5a09ad006743c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55618-na-afca144d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55618%3A%20n%2Fa&amp;severity=high&amp;id=68af67edad5a09ad0065ee54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55582-na-eda68f4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55582%3A%20n%2Fa&amp;severity=medium&amp;id=68af67edad5a09ad0065ee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55495-na-1baa7129</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55495%3A%20n%2Fa&amp;severity=medium&amp;id=68af59dead5a09ad0065767e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51667-na-f4fbba25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51667%3A%20n%2Fa&amp;severity=high&amp;id=68af484aad5a09ad0064cc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50979-na-9d196903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50979%3A%20n%2Fa&amp;severity=high&amp;id=68af484aad5a09ad0064cc99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55422-na-7ba000d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55422%3A%20n%2Fa&amp;severity=high&amp;id=68af44dfad5a09ad0064ac77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50428-na-a717d466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50428%3A%20n%2Fa&amp;severity=critical&amp;id=68af3dc0ad5a09ad00644f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50977-na-f4e8d185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50977%3A%20n%2Fa&amp;severity=medium&amp;id=68af3a3bad5a09ad00642217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54598-na-ecdf548b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54598%3A%20n%2Fa&amp;severity=medium&amp;id=68af2c2bad5a09ad00638d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50984-na-854a3c06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50984%3A%20n%2Fa&amp;severity=medium&amp;id=68af28a6ad5a09ad00637382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50983-na-45e418ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50983%3A%20n%2Fa&amp;severity=high&amp;id=68af2523ad5a09ad006353c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50978-na-92d4153b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50978%3A%20n%2Fa&amp;severity=medium&amp;id=68af2523ad5a09ad006353c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50972-na-10461dd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50972%3A%20n%2Fa&amp;severity=critical&amp;id=68af219ead5a09ad00633591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50986-na-20e2fd69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50986%3A%20n%2Fa&amp;severity=medium&amp;id=68af1e37ad5a09ad00630d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50985-na-93216db0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50985%3A%20n%2Fa&amp;severity=medium&amp;id=68af1e37ad5a09ad00630d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52122-na-8821d9a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52122%3A%20n%2Fa&amp;severity=critical&amp;id=68af1714ad5a09ad0062d1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50989-na-210fdb24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50989%3A%20n%2Fa&amp;severity=high&amp;id=68af1714ad5a09ad0062d1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56694-na-8a3c1ff0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56694%3A%20n%2Fa&amp;severity=medium&amp;id=68af139fad5a09ad0062b368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-exclusive-disclosure-of-the-attack-activitie-9a77dc9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Exclusive%20disclosure%20of%20the%20attack%20activities%20of%20the%20APT%20group%20%E2%80%9CNightEagle%E2%80%9D&amp;severity=medium&amp;id=68aec628ad5a09ad006074d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8490-cwe-79-improper-neutralization-of-in-5636098a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20servmask%20All-in-One%20WP%20Migration%20and%20Backup&amp;severity=medium&amp;id=68ae4421ad5a09ad005c699e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26417-information-disclosure-in-google-an-fed7c6a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26417%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22413-information-disclosure-in-google-an-fe2523b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22413%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22412-remote-code-execution-in-google-and-d28c51d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22412%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22411-remote-code-execution-in-google-and-a344e2b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22411%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22410-remote-code-execution-in-google-and-49397771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22410%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22409-elevation-of-privilege-in-google-an-843730d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22409%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22408-remote-code-execution-in-google-and-f58411ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22408%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1cad5a09ad005c3c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22407-information-disclosure-in-google-an-2e36ff91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22407%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22406-elevation-of-privilege-in-google-an-334b9a2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22406%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22405-elevation-of-privilege-in-google-an-ac422b8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22405%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22404-elevation-of-privilege-in-google-an-d415f41e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22404%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22403-remote-code-execution-in-google-and-7d9f3a70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22403%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1cad5a09ad005c3bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0093-information-disclosure-in-google-and-55b17661</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0093%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1cad5a09ad005c3bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0092-information-disclosure-in-google-and-e74c7e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0092%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1cad5a09ad005c3bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0086-information-disclosure-in-google-and-e7d94a8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0086%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1bad5a09ad005c3bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0084-remote-code-execution-in-google-andr-08f3913a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0084%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0083-information-disclosure-in-google-and-3ba9d5f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0083%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1bad5a09ad005c3bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0082-information-disclosure-in-google-and-393ea80c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0082%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68ae3d1bad5a09ad005c3bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0081-denial-of-service-in-google-android-0a46b414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0081%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0080-elevation-of-privilege-in-google-and-1eb51c51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0080%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0079-elevation-of-privilege-in-google-and-ae711840</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0079%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0078-elevation-of-privilege-in-google-and-0eb227b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0078%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68ae3d1bad5a09ad005c3bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0075-remote-code-execution-in-google-andr-60b446f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0075%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1bad5a09ad005c3bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0074-remote-code-execution-in-google-andr-0e76e85b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0074%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68ae3d1bad5a09ad005c3bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57820-cwe-1321-improperly-controlled-modi-e8b6febb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57820%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sveltejs%20devalue&amp;severity=high&amp;id=68ae3995ad5a09ad005c2c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9277-cwe-79-improper-neutralization-of-in-2156e9e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20SiteSEO%20%E2%80%93%20SEO%20Simplified&amp;severity=medium&amp;id=68ae3611ad5a09ad005c13e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9492-sql-injection-in-campcodes-online-wa-840b1292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9492%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=68ae328dad5a09ad005c02ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9478-use-after-free-in-google-chrome-483136be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9478%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68ae04daad5a09ad005ad9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23315-cwe-94-improper-control-of-generati-b4451cc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23315%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23314-cwe-94-improper-control-of-generati-6ed614e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23314%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23313-cwe-94-improper-control-of-generati-93206871</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23313%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23312-cwe-94-improper-control-of-generati-c4519f01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23312%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=68ae0155ad5a09ad005ac220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23307-cwe-94-improper-control-of-generati-b295d818</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23307%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20NeMo%20Curator&amp;severity=high&amp;id=68ae0155ad5a09ad005ac21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/77-malicious-android-apps-with-19-million-installs-8fd5354b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=77%20Malicious%20Android%20Apps%20With%2019%20Million%20Installs%20Targeted%20831%20Banks%20Worldwide&amp;severity=medium&amp;id=68ade8b7ad5a09ad0059e4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1994-cwe-242-use-of-inherently-dangerous--0131a592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1994%3A%20CWE-242%20Use%20of%20Inherently%20Dangerous%20Function%20in%20IBM%20Cognos%20Command%20Center&amp;severity=high&amp;id=68ade8cdad5a09ad0059e516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2697-cwe-601-url-redirection-to-untrusted-58ee8df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2697%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Cognos%20Command%20Center&amp;severity=high&amp;id=68ade8cdad5a09ad0059e519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1494-cwe-1021-improper-restriction-of-ren-711716a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1494%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20Cognos%20Command%20Center&amp;severity=medium&amp;id=68ade8cdad5a09ad0059e513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36729-cwe-269-improper-privilege-manageme-1aecff9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36729%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20RACOM%20M!DGE2&amp;severity=high&amp;id=68ade535ad5a09ad0059d7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9491-cwe-451-user-interface-ui-misreprese-d26dff76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9491%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Windows&amp;severity=high&amp;id=68ade535ad5a09ad0059d7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/boxing-clever-uncovering-a-1m-task-scam-cluster-ex-17a069da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Boxing%20Clever%3A%20Uncovering%20a%20%241M%20Task%20Scam%20Cluster%20Exploiting%20Major%20Brands&amp;severity=medium&amp;id=68ae0154ad5a09ad005ac1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-house-is-haunted-a-decade-old-rce-in-the-aion-99809261</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20House%20is%20Haunted%3A%20a%20decade%20old%20RCE%20in%20the%20AION%20client&amp;severity=high&amp;id=68adde6ead5a09ad00599c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-august-2025-cyber-attacks-7-stage-tycoon2fa--3676ba0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20August%202025%20Cyber%20Attacks%3A%207-Stage%20Tycoon2FA%20Phishing%2C%20New%20ClickFix%20Campaign%2C%20and%20Salty2FA&amp;severity=medium&amp;id=68ae0154ad5a09ad005ac1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57813-cwe-532-insertion-of-sensitive-info-60ca2d92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57813%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20traPtitech%20traQ&amp;severity=medium&amp;id=68adde6aad5a09ad00599c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shadowcaptcha-exploits-wordpress-sites-to-spread-r-b65bdf51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShadowCaptcha%20Exploits%20WordPress%20Sites%20to%20Spread%20Ransomware%2C%20Info%20Stealers%2C%20and%20Crypto%20Miners&amp;severity=low&amp;id=68adde2bad5a09ad00599b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mixshell-malware-delivered-via-contact-forms-targe-6ac8bdff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MixShell%20Malware%20Delivered%20via%20Contact%20Forms%20Targets%20U.S.%20Supply%20Chain%20Manufacturers&amp;severity=high&amp;id=68adde2bad5a09ad00599b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nissan-confirms-design-studio-data-breach-claimed--791758c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nissan%20confirms%20design%20studio%20data%20breach%20claimed%20by%20Qilin%20ransomware&amp;severity=high&amp;id=68adde2bad5a09ad00599b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dslroot-proxies-and-the-threat-of-legal-botnets-a7d2c2f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DSLRoot%2C%20Proxies%2C%20and%20the%20Threat%20of%20%E2%80%98Legal%20Botnets%E2%80%99&amp;severity=high&amp;id=68adde2bad5a09ad00599b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57810-cwe-20-improper-input-validation-in-fe58c0f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57810%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20parallax%20jsPDF&amp;severity=high&amp;id=68add723ad5a09ad005974f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tag-144s-persistent-grip-on-south-american-organiz-b81ee29b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TAG-144&apos;s%20Persistent%20Grip%20on%20South%20American%20Organizations&amp;severity=medium&amp;id=68ae085dad5a09ad005ae6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nevada-state-offices-halt-services-after-cyber-inc-a126ff9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nevada%20State%20Offices%20Halt%20Services%20After%20Cyber%20Incident&amp;severity=medium&amp;id=68adcc94ad5a09ad005925f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6366-cwe-269-improper-privilege-managemen-ecb5b4e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6366%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ovatheme.com%20Event%20List&amp;severity=high&amp;id=68adc913ad5a09ad0059083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9483-stack-based-buffer-overflow-in-links-6aeada95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9483%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68adc20cad5a09ad0058d255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9482-stack-based-buffer-overflow-in-links-e6ea8c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9482%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68adbb04ad5a09ad00589361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9481-stack-based-buffer-overflow-in-links-60c82fac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9481%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68adbb04ad5a09ad00589359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8424-cwe-1284-improper-validation-of-spec-33d3e4d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8424%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NetScaler%20ADC&amp;severity=high&amp;id=68adb77ead5a09ad0058755b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7776-cwe-119-improper-restriction-of-oper-87405e14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7776%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NetScaler%20ADC&amp;severity=high&amp;id=68adb3fdad5a09ad00585931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7775-cwe-119-improper-restriction-of-oper-e3aca3d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7775%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=68adb3fdad5a09ad0058592e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-hook-malware-variant-locks-devices-wit-eb41f662</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Hook%20Malware%20Variant%20Locks%20Devices%20With%20Ransomware&amp;severity=medium&amp;id=68ad9b5bad5a09ad005796ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44002-cwe-367-time-of-check-time-of-use-t-f171bb4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44002%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20TeamViewer%20Full%20Client&amp;severity=medium&amp;id=68ad97d9ad5a09ad00577251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tech-manufacturer-data-io-hit-by-ransomware-fd3de1f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tech%20Manufacturer%20Data%20I%2FO%20Hit%20by%20Ransomware&amp;severity=high&amp;id=68ad9453ad5a09ad00575e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hook-android-trojan-adds-ransomware-overlays-expan-7e3066dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HOOK%20Android%20Trojan%20Adds%20Ransomware%20Overlays%2C%20Expands%20to%20107%20Remote%20Commands&amp;severity=high&amp;id=68ad9453ad5a09ad00575e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1501-cwe-863-incorrect-authorization-in-n-b681e837</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1501%3A%20CWE-863%20Incorrect%20Authorization%20in%20Nozomi%20Networks%20CMC&amp;severity=medium&amp;id=68ad90d0ad5a09ad0057457f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/farmers-insurance-data-breach-impacts-11m-people-a-10c3041a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Farmers%20Insurance%20data%20breach%20impacts%201.1M%20people%20after%20Salesforce%20attack&amp;severity=high&amp;id=68ad82bead5a09ad0056d26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surge-in-coordinated-scans-targets-microsoft-rdp-a-92c89457</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Surge%20in%20coordinated%20scans%20targets%20Microsoft%20RDP%20auth%20servers&amp;severity=high&amp;id=68ad82bead5a09ad0056d273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-three-exploited-vulnerabilities-to-kev-c-fc39b4ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Three%20Exploited%20Vulnerabilities%20to%20KEV%20Catalog%20Affecting%20Citrix%20and%20Git&amp;severity=high&amp;id=68ad82bead5a09ad0056d26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48108-cwe-862-missing-authorization-in-mo-d6816277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48108%3A%20CWE-862%20Missing%20Authorization%20in%20Mojoomla%20School%20Management&amp;severity=medium&amp;id=68ad8645ad5a09ad0056e572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29901-cwe-476-in-qnap-systems-inc-file-st-ebb44214</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29901%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68ad82f6ad5a09ad0056d367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6247-cwe-80-improper-neutralization-of-sc-dec1fa34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6247%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ValvePress%20WordPress%20Automatic%20Plugin&amp;severity=medium&amp;id=68ad7bb7ad5a09ad0056a0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8860-cwe-862-missing-authorization-in-the-b15a917b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8860%3A%20CWE-862%20Missing%20Authorization%20in%20themefic%20Tourfic%20%E2%80%93%20Ultimate%20Travel%20Booking%2C%20Hotel%20Booking%20%26%20Car%20Rental%20WordPress%20Plugin%20%7C%20WooCommerce%20Booking&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53419-cwe-94-code-injection-in-delta-elec-76e91d75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53419%3A%20CWE-94%20Code%20Injection%20in%20Delta%20Electronics%20COMMGR&amp;severity=high&amp;id=68ad5f97ad5a09ad0055f0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53418-cwe-121-stack-based-buffer-overflow-ebfbdb28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53418%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20COMMGR&amp;severity=high&amp;id=68ad5c13ad5a09ad0055e0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57704-cwe-611-xxe-improper-restriction-of-64746485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57704%3A%20CWE-611%20XXE%20-%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Delta%20Electronics%20EIP%20Builder&amp;severity=medium&amp;id=68ad550bad5a09ad0055b903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41702-cwe-321-use-of-hard-coded-cryptogra-97111162</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41702%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Welotec%20EG400Mk2-D11001-000101&amp;severity=critical&amp;id=68ad5188ad5a09ad0055a20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9476-unrestricted-upload-in-sourcecodeste-a2cbb37e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9476%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Human%20Resource%20Information%20System&amp;severity=medium&amp;id=68ad5188ad5a09ad0055a20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9475-unrestricted-upload-in-sourcecodeste-e6af5a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9475%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Human%20Resource%20Information%20System&amp;severity=medium&amp;id=68ad4a7fad5a09ad005578f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5931-cwe-269-improper-privilege-managemen-3e7db2bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5931%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wedevs%20Dokan%20Pro&amp;severity=high&amp;id=68ad4377ad5a09ad00554c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9474-creation-of-temporary-file-with-inse-04f35d6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9474%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Mihomo%20Party&amp;severity=low&amp;id=68ad4377ad5a09ad00554c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9473-sql-injection-in-sourcecodester-onli-81a2de8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9473%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=68ad4377ad5a09ad00554c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9472-sql-injection-in-itsourcecode-apartm-37bca305</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9472%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad3c6fad5a09ad00552980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9471-sql-injection-in-itsourcecode-apartm-33787ebf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9471%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad3567ad5a09ad0054e300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9470-sql-injection-in-itsourcecode-apartm-4ee7cfa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9470%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad3567ad5a09ad0054e2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9469-sql-injection-in-itsourcecode-apartm-3ae843d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9469%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad2e5fad5a09ad0054b07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9468-sql-injection-in-itsourcecode-apartm-30860a58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9468%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad2e5fad5a09ad0054b074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9172-cwe-89-improper-neutralization-of-sp-239e8ce4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9172%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pierrelannoy%20Vibes&amp;severity=high&amp;id=68ad2e5fad5a09ad0054b06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9461-information-disclosure-in-diyhi-bbs-f0c498b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9461%3A%20Information%20Disclosure%20in%20diyhi%20bbs&amp;severity=medium&amp;id=68ad2757ad5a09ad00548441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9444-sql-injection-in-1000projects-online-63916fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9444%3A%20SQL%20Injection%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad2757ad5a09ad0054843b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9443-buffer-overflow-in-tenda-ch22-ab4b8193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9443%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68ad204fad5a09ad005446ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9440-cross-site-scripting-in-1000projects-52a5ed7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9440%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad1947ad5a09ad0054154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9439-cross-site-scripting-in-1000projects-8bfb1986</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9439%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad1947ad5a09ad00541548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8447-cwe-639-authorization-bypass-through-d660c1fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8447%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=68ad1947ad5a09ad0054153c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9438-cross-site-scripting-in-1000projects-febb4ae5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9438%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad1947ad5a09ad00541542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9434-cross-site-scripting-in-1000projects-bfab636e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9434%3A%20Cross%20Site%20Scripting%20in%201000projects%20Online%20Project%20Report%20Submission%20and%20Evaluation%20System&amp;severity=medium&amp;id=68ad0ebbad5a09ad0053b3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9433-cross-site-scripting-in-mtons-mblog-9e8ee01d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9433%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad0ebbad5a09ad0053b3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9432-cross-site-scripting-in-mtons-mblog-82c590cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9432%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad07b3ad5a09ad005309c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-targeting-companies-via-upcrypte-90ca3cf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Campaign%20Targeting%20Companies%20via%20UpCrypter&amp;severity=medium&amp;id=68ad669fad5a09ad00562d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prc-nexus-espionage-campaign-hijacks-web-traffic-t-e26761b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PRC-Nexus%20Espionage%20Campaign%20Hijacks%20Web%20Traffic%20to%20Target%20Diplomats&amp;severity=medium&amp;id=68ad669fad5a09ad00562d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9431-cross-site-scripting-in-mtons-mblog-2dc2f66e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9431%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad00b7ad5a09ad00529853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9430-cross-site-scripting-in-mtons-mblog-af3851fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9430%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ad00b7ad5a09ad0052984d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/birth-chart-compatibility-wordpress-plugin-20-full-6461ede5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Birth%20Chart%20Compatibility%20WordPress%20Plugin%202.0%20-%20Full%20Path%20Disclosure&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lingdang-crm-8647-sql-injection-8d063186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lingdang%20CRM%208.6.4.7%20-%20SQL%20Injection&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-endpoint-manager-mobile-12500-authenticatio-eec3fdfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Endpoint%20Manager%20Mobile%2012.5.0.0%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storychief-wordpress-plugin-1042-arbitrary-file-up-41a848ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StoryChief%20Wordpress%20Plugin%201.0.42%20-%20Arbitrary%20File%20Upload&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geovision-asmanager-windows-application-6120-crede-7e1c09c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeoVision%20ASManager%20Windows%20Application%206.1.2.0%20-%20Credentials%20Disclosure&amp;severity=medium&amp;id=68ae5e7aad5a09ad005d88b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geovision-asmanager-windows-application-6120-remot-ec25ae29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeoVision%20ASManager%20Windows%20Application%206.1.2.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68ae5e7aad5a09ad005d88b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50975-na-308afc15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50975%3A%20n%2Fa&amp;severity=medium&amp;id=68ae5292ad5a09ad005cef6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-26-73f8780c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-26&amp;severity=medium&amp;id=68ae4e9ead5a09ad005ca3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55443-na-abaf32bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55443%3A%20n%2Fa&amp;severity=critical&amp;id=68ae0f66ad5a09ad005b18ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52353-na-2fdb4a7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52353%3A%20n%2Fa&amp;severity=critical&amp;id=68ae0f66ad5a09ad005b18b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50971-na-ee13904d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50971%3A%20n%2Fa&amp;severity=high&amp;id=68ae0be1ad5a09ad005b0763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50976-na-da831c04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50976%3A%20n%2Fa&amp;severity=medium&amp;id=68adf346ad5a09ad005a44eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52184-na-ef84f26a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52184%3A%20n%2Fa&amp;severity=medium&amp;id=68ade8cdad5a09ad0059e51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50974-na-33a6929d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50974%3A%20n%2Fa&amp;severity=medium&amp;id=68ade8cdad5a09ad0059e510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57425-na-9e64f286</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57425%3A%20n%2Fa&amp;severity=medium&amp;id=68ade1b1ad5a09ad0059b92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56432-na-3a5f62a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56432%3A%20n%2Fa&amp;severity=medium&amp;id=68add39fad5a09ad0059626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25737-na-259c876e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25737%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25736-na-a0837a4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25736%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25735-na-4eb739fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25735%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25734-na-2c45db07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25734%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad005926a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25733-na-f9872efb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25733%3A%20n%2Fa&amp;severity=low&amp;id=68adcca5ad5a09ad00592698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25732-na-4f3d69c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25732%3A%20n%2Fa&amp;severity=medium&amp;id=68adcca5ad5a09ad00592690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52036-na-e9e6e3d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52036%3A%20n%2Fa&amp;severity=medium&amp;id=68adc913ad5a09ad00590838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52035-na-bce7c0a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52035%3A%20n%2Fa&amp;severity=medium&amp;id=68adc913ad5a09ad00590834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52037-na-8c9370da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52037%3A%20n%2Fa&amp;severity=medium&amp;id=68adc913ad5a09ad00590830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52219-na-40aa90c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52219%3A%20n%2Fa&amp;severity=medium&amp;id=68adc58ead5a09ad0058eb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52218-na-14e63dd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52218%3A%20n%2Fa&amp;severity=high&amp;id=68adc58ead5a09ad0058eb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52217-na-a97f0254</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52217%3A%20n%2Fa&amp;severity=medium&amp;id=68adc58ead5a09ad0058eb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29992-na-91479327</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29992%3A%20n%2Fa&amp;severity=high&amp;id=68adc20cad5a09ad0058d251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55526-na-032ca3f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55526%3A%20n%2Fa&amp;severity=critical&amp;id=68adbe86ad5a09ad0058a5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50753-na-46a1babf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50753%3A%20n%2Fa&amp;severity=high&amp;id=68adbb04ad5a09ad00589354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9429-cross-site-scripting-in-mtons-mblog-100f946c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9429%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68acf61fad5a09ad0051685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9426-sql-injection-in-itsourcecode-online-f68d3fee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9426%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68acef17ad5a09ad005126ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9425-sql-injection-in-itsourcecode-online-3833f97e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9425%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68acef17ad5a09ad005126c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9424-os-command-injection-in-ruijie-ws720-597e8bb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9424%3A%20OS%20Command%20Injection%20in%20Ruijie%20WS7204-A&amp;severity=medium&amp;id=68ace80fad5a09ad0050f005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9423-sql-injection-in-campcodes-online-wa-2cf33fd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9423%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=68ace80fad5a09ad0050effe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9422-cross-site-scripting-in-oitcode-sama-6176bbae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9422%3A%20Cross%20Site%20Scripting%20in%20oitcode%20samarium&amp;severity=medium&amp;id=68ace108ad5a09ad0050aa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9421-sql-injection-in-itsourcecode-apartm-950c9011</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9421%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ace108ad5a09ad0050aa03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57814-cwe-918-server-side-request-forgery-ba8667e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57814%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20azu%20request-filtering-agent&amp;severity=medium&amp;id=68acdd84ad5a09ad00509dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9420-sql-injection-in-itsourcecode-apartm-4a56d118</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9420%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68acda00ad5a09ad00507538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57809-cwe-674-uncontrolled-recursion-in-m-84a3312c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57809%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20mlc-ai%20xgrammar&amp;severity=high&amp;id=68acd67cad5a09ad004ff987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8627-vulnerability-in-tp-link-systems-inc-5670ca28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8627%3A%20Vulnerability%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20KP303%20(US)%20Smartplug&amp;severity=high&amp;id=68acd67cad5a09ad004ff98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57805-cwe-20-improper-input-validation-in-c654dff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57805%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20The-Scratch-Channel%20tsc-web-client&amp;severity=high&amp;id=68acd67cad5a09ad004ff98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57804-cwe-93-improper-neutralization-of-c-548d4f16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57804%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20python-hyper%20h2&amp;severity=medium&amp;id=68acd2f8ad5a09ad004feac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9419-sql-injection-in-itsourcecode-apartm-aa9e1e40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9419%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68acd2f8ad5a09ad004feac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-apps-with-19m-installs-removed-from-goog-b1a17799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20apps%20with%20%2B19M%20installs%20removed%20from%20Google%20Play%20because%20spreading%20Anatsa%20banking%20trojan%20and%20other%20malware&amp;severity=medium&amp;id=68accf71ad5a09ad004f8fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weak-keys-on-camaro-muscle-car-make-it-most-stolen-a80a42d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weak%20Keys%20on%20Camaro%20Muscle%20Car%20Make%20it%20Most%20Stolen%20Car%20in%20America&amp;severity=medium&amp;id=68accf71ad5a09ad004f8fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc6384-deploys-plugx-via-captive-portal-hijacks-a-6b66121e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC6384%20Deploys%20PlugX%20via%20Captive%20Portal%20Hijacks%20and%20Valid%20Certificates%20Targeting%20Diplomats&amp;severity=high&amp;id=68accf71ad5a09ad004f8fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/auchan-retailer-data-breach-impacts-hundreds-of-th-875e6106</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Auchan%20retailer%20data%20breach%20impacts%20hundreds%20of%20thousands%20of%20customers&amp;severity=high&amp;id=68accf71ad5a09ad004f8fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9418-sql-injection-in-itsourcecode-apartm-c7aee976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9418%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68ad0130ad5a09ad0052b038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6188-288-in-arista-networks-eos-0ee4e8cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6188%3A%20288%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=68acc868ad5a09ad004f4d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3456-cwe-532-insertion-of-sensitive-infor-0c08e0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3456%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Arista%20Networks%20EOS&amp;severity=low&amp;id=68acc4e4ad5a09ad004f2fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9417-sql-injection-in-itsourcecode-apartm-8adddca7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9417%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68acc4e4ad5a09ad004f2fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9416-cross-site-scripting-in-oitcode-sama-cfc5a346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9416%3A%20Cross%20Site%20Scripting%20in%20oitcode%20samarium&amp;severity=medium&amp;id=68acbddcad5a09ad004ef940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safeguarding-vs-code-against-prompt-injections-7b85849a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Safeguarding%20VS%20Code%20against%20prompt%20injections&amp;severity=medium&amp;id=68acb6d7ad5a09ad004eb2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9415-unrestricted-upload-in-greencms-9c8ec537</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9415%3A%20Unrestricted%20Upload%20in%20GreenCMS&amp;severity=medium&amp;id=68acb6d5ad5a09ad004eb2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9414-server-side-request-forgery-in-kalca-56b6c09a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9414%3A%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20kodbox&amp;severity=medium&amp;id=68acafccad5a09ad004e8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/build-a-new-kind-of-browser-security-care-to-try-i-fc635c8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Build%20a%20new%20kind%20of%20browser%20security%2C%20care%20to%20try%20it%3F%20You%20have%20access%20to%20control%20a%20private%20key%20but%20cannot%20take%20it.%20Looking%20for%20things%20that%20break.%20No%20security%20knowledge%20needed%20to%20try%20it%20if%20you%20can%20copy%20paste%20and%20type%20you%20can%20try%20to%20break%20the%20new%20algorithm.&amp;severity=medium&amp;id=68aca8c6ad5a09ad004e6092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9413-sql-injection-in-lostvip-com-ruoyi-g-0e8b50c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9413%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68aca8c4ad5a09ad004e6085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57811-cwe-1336-improper-neutralization-of-6a7721ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57811%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=medium&amp;id=68aca540ad5a09ad004e4a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57802-cwe-61-unix-symbolic-link-symlink-f-40d1e502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57802%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20airlinklabs%20daemon&amp;severity=high&amp;id=68aca1bcad5a09ad004e308c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-voicemail-emails-install-upcrypter-malware-on-3e181810</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Voicemail%20Emails%20Install%20UpCrypter%20Malware%20on%20Windows%20Devices&amp;severity=medium&amp;id=68ac9e37ad5a09ad004e0bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9412-sql-injection-in-lostvip-com-ruoyi-g-b46463f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9412%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68aca1bcad5a09ad004e3090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9411-sql-injection-in-lostvip-com-ruoyi-g-7da6b72c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9411%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68ac9ab3ad5a09ad004deceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9410-sql-injection-in-lostvip-com-ruoyi-g-a4485d0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9410%3A%20SQL%20Injection%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68ac93acad5a09ad004dbb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57760-cwe-269-improper-privilege-manageme-cde408ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57760%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20langflow-ai%20langflow&amp;severity=high&amp;id=68ac9028ad5a09ad004d3b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6737-cwe-1391-use-of-weak-credentials-in--79d42945</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6737%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Securden%20Unified%20PAM&amp;severity=high&amp;id=68ac9028ad5a09ad004d3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53120-cwe-22-improper-limitation-of-a-pat-3ebea95b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53120%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Securden%20Unified%20PAM&amp;severity=critical&amp;id=68ac9028ad5a09ad004d3b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53119-cwe-434-unrestricted-upload-of-file-bd2bb6b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53119%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Securden%20Unified%20PAM&amp;severity=high&amp;id=68ac8ca3ad5a09ad004d3029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53118-cwe-306-missing-authentication-for--8a0e2330</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53118%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Securden%20Unified%20PAM&amp;severity=critical&amp;id=68ac8ca3ad5a09ad004d3026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9409-path-traversal-in-lostvip-com-ruoyi--decb6b03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9409%3A%20Path%20Traversal%20in%20lostvip-com%20ruoyi-go&amp;severity=medium&amp;id=68ac8ca3ad5a09ad004d302c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3478-cwe-79-improper-neutralization-of-in-3d38b50c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20OpenText%20Enterprise%20Security%20Manager&amp;severity=high&amp;id=68ac893cad5a09ad004cf094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55301-cwe-20-improper-input-validation-in-6cc8c412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55301%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20The-Scratch-Channel%20the-scratch-channel.github.io&amp;severity=medium&amp;id=68ac859bad5a09ad004cdbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5302-cwe-674-uncontrolled-recursion-in-ru-1e9dcc0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5302%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ac7e93ad5a09ad004caabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54370-cwe-918-server-side-request-forgery-ab632c82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54370%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PHPOffice%20PhpSpreadsheet&amp;severity=high&amp;id=68ac70a0ad5a09ad004c3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/national-public-data-npd-relaunches-despite-29-bil-e39f8975</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=National%20Public%20Data%20(NPD)%20Relaunches%20Despite%202.9%20Billion%20SSNs%20Breach&amp;severity=high&amp;id=68ac7082ad5a09ad004c3af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26467-cwe-267-privilege-defined-with-unsa-936a7229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26467%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Apache%20Software%20Foundation%20Apache%20Cassandra&amp;severity=high&amp;id=68ac70a0ad5a09ad004c3b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53518-cwe-190-integer-overflow-or-wraparo-140f0004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53518%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53853-cwe-122-heap-based-buffer-overflow--6c135e11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53853%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52581-cwe-190-integer-overflow-or-wraparo-b1bcc355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52581%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54494-cwe-121-stack-based-buffer-overflow-385d433d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54494%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c2123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54493-cwe-121-stack-based-buffer-overflow-8e932621</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54493%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c2120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54492-cwe-121-stack-based-buffer-overflow-d5cbf9e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54492%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c211d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54491-cwe-121-stack-based-buffer-overflow-7a754495</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54491%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c211a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54490-cwe-121-stack-based-buffer-overflow-11436085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54490%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c210d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54489-cwe-121-stack-based-buffer-overflow-a27d3587</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54489%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c210a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54488-cwe-121-stack-based-buffer-overflow-30eef4c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54488%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c2107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54487-cwe-121-stack-based-buffer-overflow-7449be11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54487%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c2104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54486-cwe-121-stack-based-buffer-overflow-083d5814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54486%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c2101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54485-cwe-121-stack-based-buffer-overflow-958c6dfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54485%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54484-cwe-121-stack-based-buffer-overflow-2948eb66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54484%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54483-cwe-121-stack-based-buffer-overflow-676d0273</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54483%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54482-cwe-121-stack-based-buffer-overflow-e97ca8bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54482%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54481-cwe-121-stack-based-buffer-overflow-e09360ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54481%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d02ad5a09ad004c20f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54480-cwe-121-stack-based-buffer-overflow-d4656069</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54480%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53557-cwe-122-heap-based-buffer-overflow--0d6856cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53557%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46411-cwe-121-stack-based-buffer-overflow-b075c4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46411%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=68ac6d01ad5a09ad004c20c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53511-cwe-122-heap-based-buffer-overflow--892b2d95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53511%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52461-cwe-125-out-of-bounds-read-in-the-b-e6ea750f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52461%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=high&amp;id=68ac6d01ad5a09ad004c20ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54462-cwe-122-heap-based-buffer-overflow--736ece71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54462%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48005-cwe-122-heap-based-buffer-overflow--04bf3019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48005%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=68ac6d01ad5a09ad004c20c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/transparent-tribe-targets-indian-govt-with-weaponi-42ab4b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Transparent%20Tribe%20Targets%20Indian%20Govt%20With%20Weaponized%20Desktop%20Shortcuts%20via%20Phishing&amp;severity=high&amp;id=68ac57e6ad5a09ad004b8cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-exploit-cheap-vps-to-launch-saas-hi-a45a80f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Exploit%20Cheap%20VPS%20to%20Launch%20SaaS%20Hijacking%20Attacks&amp;severity=high&amp;id=68ac50dead5a09ad004b6bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-backdoor-spies-on-russian-business-employe-0e3d3d19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20backdoor%20spies%20on%20Russian%20business%20employees&amp;severity=medium&amp;id=68ac4652ad5a09ad004b19bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9407-cross-site-scripting-in-mtons-mblog-344abd7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9407%3A%20Cross%20Site%20Scripting%20in%20mtons%20mblog&amp;severity=medium&amp;id=68ac3f4aad5a09ad004aea55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vtenext-2502-a-three-way-path-to-rce-546ea8be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vtenext%2025.02%3A%20A%20three-way%20path%20to%20RCE&amp;severity=medium&amp;id=68ac3bc8ad5a09ad004ad3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48303-cwe-352-cross-site-request-forgery--21b07e24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48303%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kevin%20Langley%20Jr.%20Post%20Type%20Converter&amp;severity=null&amp;id=68ac3843ad5a09ad004aa554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androidbackdoor916origin-malware-targets-russian-b-00886808</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android.Backdoor.916.origin%20malware%20targets%20Russian%20business%20executives&amp;severity=medium&amp;id=68ac313aad5a09ad004a85b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistan-linked-apt36-abuses-linux-desktop-files-t-e15b0b55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan-linked%20APT36%20abuses%20Linux%20.desktop%20files%20to%20drop%20custom%20malware%20in%20new%20campaign&amp;severity=medium&amp;id=68ac313aad5a09ad004a85b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8562-cwe-22-improper-limitation-of-a-path-5054bc8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8562%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20peterhebert%20Custom%20Query%20Shortcode&amp;severity=medium&amp;id=68ac315cad5a09ad004a8675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7426-cwe-200-exposure-of-sensitive-inform-0a3c2549</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MINOVA%20Information%20Services%20GmbH%20TTA&amp;severity=critical&amp;id=68ac26afad5a09ad004a4498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5191-cwe-428-unquoted-search-path-or-elem-e7a6ea77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5191%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Moxa%20Utility%20for%20DRP-A100%20Series&amp;severity=high&amp;id=68ac1c23ad5a09ad0049f6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-malicious-code-execution-in-python-0a2492ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20malicious%20code%20execution%20in%20Python&amp;severity=medium&amp;id=68ac151dad5a09ad0049be9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9118-cwe-22-improper-limitation-of-a-path-ff8f06cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9118%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Google%20Cloud%20Dataform&amp;severity=critical&amp;id=68ac0e13ad5a09ad00496a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54300-cwe-79-improper-neutralization-of-i-87fc37ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54300%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norrnext.com%20Quantum%20Mamanger%20component%20for%20Joomla&amp;severity=high&amp;id=68ac0a8fad5a09ad00495487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54301-cwe-79-improper-neutralization-of-i-a6b7c8a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20norrnext.com%20Quantum%20Mamanger%20component%20for%20Joomla&amp;severity=high&amp;id=68ac0a8fad5a09ad0049548b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8997-cwe-598-use-of-get-request-method-wi-7dbbe279</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8997%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20OpenText%20OpenText%20Enterprise%20Security%20Manager&amp;severity=medium&amp;id=68ac070bad5a09ad00494509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5514-cwe-130-improper-handling-of-length--113d958f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5514%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=68abfc87ad5a09ad0048c208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9406-unrestricted-upload-in-xuhuisheng-le-33764b8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9406%3A%20Unrestricted%20Upload%20in%20xuhuisheng%20lemon&amp;severity=medium&amp;id=68abe05fad5a09ad0047e454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9405-reachable-assertion-in-open5gs-37433bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9405%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=68abd958ad5a09ad0047beb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9404-cross-site-scripting-in-scada-lts-b4209d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9404%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68abd250ad5a09ad00479d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9403-reachable-assertion-in-jqlang-jq-647b17b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9403%3A%20Reachable%20Assertion%20in%20jqlang%20jq&amp;severity=medium&amp;id=68abcb47ad5a09ad00477636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9402-server-side-request-forgery-in-huang-accb2f9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9402%3A%20Server-Side%20Request%20Forgery%20in%20HuangDou%20UTCMS&amp;severity=medium&amp;id=68abc43fad5a09ad00464f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9401-incorrect-comparison-in-huangdou-utc-15c0766f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9401%3A%20Incorrect%20Comparison%20in%20HuangDou%20UTCMS&amp;severity=medium&amp;id=68abba6fad5a09ad0044bd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9400-unrestricted-upload-in-yifang-cms-31669530</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9400%3A%20Unrestricted%20Upload%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68abb2abad5a09ad00448283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9399-sql-injection-in-yifang-cms-8fb5015c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9399%3A%20SQL%20Injection%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68abaf34ad5a09ad00444a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-25-bdf08838</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-25&amp;severity=medium&amp;id=68acfd1ead5a09ad00525184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52130-na-a8025972</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52130%3A%20n%2Fa&amp;severity=medium&amp;id=68acbddcad5a09ad004ef93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50383-na-0fc99d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50383%3A%20n%2Fa&amp;severity=high&amp;id=68aca540ad5a09ad004e4a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50722-na-8c0fdb1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50722%3A%20n%2Fa&amp;severity=critical&amp;id=68ac972fad5a09ad004ddc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29421-na-607fc03a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29421%3A%20n%2Fa&amp;severity=high&amp;id=68ac93acad5a09ad004dbb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29420-na-4d71261b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29420%3A%20n%2Fa&amp;severity=high&amp;id=68ac93acad5a09ad004dbb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55574-na-f6d34d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55574%3A%20n%2Fa&amp;severity=medium&amp;id=68ac893cad5a09ad004cf097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55575-na-3bf4883d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55575%3A%20n%2Fa&amp;severity=critical&amp;id=68ac859bad5a09ad004cdbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55409-na-3c871f49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55409%3A%20n%2Fa&amp;severity=high&amp;id=68ac8217ad5a09ad004cc9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29523-na-74648c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29523%3A%20n%2Fa&amp;severity=high&amp;id=68ac8217ad5a09ad004cc9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56214-na-f6795e89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56214%3A%20n%2Fa&amp;severity=critical&amp;id=68ac7e93ad5a09ad004caaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56212-na-566fcfb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56212%3A%20n%2Fa&amp;severity=critical&amp;id=68ac7e93ad5a09ad004caab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50900-na-26cf8e81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50900%3A%20n%2Fa&amp;severity=critical&amp;id=68ac7e93ad5a09ad004caab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56216-na-4c523fb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56216%3A%20n%2Fa&amp;severity=high&amp;id=68ac7b10ad5a09ad004c8fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-56215-na-b4bce054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-56215%3A%20n%2Fa&amp;severity=medium&amp;id=68ac7b10ad5a09ad004c8fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51281-na-916200a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51281%3A%20n%2Fa&amp;severity=high&amp;id=68ac778cad5a09ad004c785c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44178-na-adbac4e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44178%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29525-na-56f0fe74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29525%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29524-na-539ec538</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29524%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29522-na-ae0df6c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29522%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c784f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29521-na-169c4adc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29521%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c784b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29520-na-3c769968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29520%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44179-na-6d6afc7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44179%3A%20n%2Fa&amp;severity=medium&amp;id=68ac778cad5a09ad004c7844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29519-na-13f124e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29519%3A%20n%2Fa&amp;severity=medium&amp;id=68ac7407ad5a09ad004c5013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29517-na-e486c640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29517%3A%20n%2Fa&amp;severity=medium&amp;id=68ac70a0ad5a09ad004c3ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29516-na-0cd91a1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29516%3A%20n%2Fa&amp;severity=high&amp;id=68ac70a0ad5a09ad004c3ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29515-na-6ec5a54a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29515%3A%20n%2Fa&amp;severity=critical&amp;id=68ac70a0ad5a09ad004c3b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29514-na-0d07b753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29514%3A%20n%2Fa&amp;severity=critical&amp;id=68ac70a0ad5a09ad004c3b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45968-na-dcf05240</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45968%3A%20n%2Fa&amp;severity=critical&amp;id=68ac6d03ad5a09ad004c2126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43960-na-f167bdec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43960%3A%20n%2Fa&amp;severity=high&amp;id=68ac65f7ad5a09ad004bdee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9398-information-disclosure-in-yifang-cms-088e4fe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9398%3A%20Information%20Disclosure%20in%20YiFang%20CMS&amp;severity=medium&amp;id=68aba49bad5a09ad004306bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9397-unrestricted-upload-in-givanz-vvveb-be92badf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9397%3A%20Unrestricted%20Upload%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=68ab9d93ad5a09ad0042dfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9396-null-pointer-dereference-in-ckolivas-5e142c7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9396%3A%20NULL%20Pointer%20Dereference%20in%20ckolivas%20lrzip&amp;severity=medium&amp;id=68ab968cad5a09ad00425276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9395-server-side-request-forgery-in-wangs-f5f77fde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9395%3A%20Server-Side%20Request%20Forgery%20in%20wangsongyan%20wblog&amp;severity=medium&amp;id=68ab8f84ad5a09ad00415c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9394-use-after-free-in-podofo-ce43a1d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9394%3A%20Use%20After%20Free%20in%20PoDoFo&amp;severity=medium&amp;id=68ab3b25ad5a09ad0033d47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9393-stack-based-buffer-overflow-in-links-f35428e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9393%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68ab341dad5a09ad0033a4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9392-stack-based-buffer-overflow-in-links-70e8772d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9392%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68ab2d15ad5a09ad003387fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9391-sql-injection-in-bjskzy-zhiyou-erp-d2c82e99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9391%3A%20SQL%20Injection%20in%20Bjskzy%20Zhiyou%20ERP&amp;severity=medium&amp;id=68ab260dad5a09ad0030750f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9390-buffer-overflow-in-vim-15a9146c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9390%3A%20Buffer%20Overflow%20in%20vim&amp;severity=medium&amp;id=68ab1f05ad5a09ad00304e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9389-memory-corruption-in-vim-550547c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9389%3A%20Memory%20Corruption%20in%20vim&amp;severity=medium&amp;id=68ab10f5ad5a09ad002fee00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9388-cross-site-scripting-in-scada-lts-40d71d90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9388%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68ab09eead5a09ad002fd072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9387-os-command-injection-in-dcn-dcme-720-c5fa4504</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9387%3A%20OS%20Command%20Injection%20in%20DCN%20DCME-720&amp;severity=medium&amp;id=68ab02e6ad5a09ad002fac21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-lamehug-e812f4e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20LAMEHUG&amp;severity=medium&amp;id=68ac42cead5a09ad004b0639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9386-use-after-free-in-appneta-tcpreplay-b6282630</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9386%3A%20Use%20After%20Free%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68aaf4d6ad5a09ad002f6eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iot-under-siege-the-return-of-the-mirai-based-gayf-e734362c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoT%20under%20siege%3A%20The%20return%20of%20the%20Mirai-based%20Gayfemboy%20Botnet&amp;severity=medium&amp;id=68aaedcdad5a09ad002f5563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9385-use-after-free-in-appneta-tcpreplay-f71dabad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9385%3A%20Use%20After%20Free%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68aaedd9ad5a09ad002f5592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9384-null-pointer-dereference-in-appneta--be7655b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9384%3A%20NULL%20Pointer%20Dereference%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68aae6c5ad5a09ad002f297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9383-use-of-weak-hash-in-fnkvision-y215-c-b3a337a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9383%3A%20Use%20of%20Weak%20Hash%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=low&amp;id=68aadfbead5a09ad002f0251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9382-backdoor-in-fnkvision-y215-cctv-came-f9188e38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9382%3A%20Backdoor%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=medium&amp;id=68aacaa7ad5a09ad002e8f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9381-information-disclosure-in-fnkvision--699c47ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9381%3A%20Information%20Disclosure%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=low&amp;id=68aac39fad5a09ad002e732b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9380-hard-coded-credentials-in-fnkvision--7a67070e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9380%3A%20Hard-coded%20Credentials%20in%20FNKvision%20Y215%20CCTV%20Camera&amp;severity=high&amp;id=68aabc97ad5a09ad002e532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9379-insufficient-verification-of-data-au-082fc331</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9379%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Belkin%20AX1800&amp;severity=high&amp;id=68aab58fad5a09ad002e2ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8208-cwe-79-improper-neutralization-of-in-d7f4fa82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20templatescoderthemes%20Spexo%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Widgets%20and%20Templates&amp;severity=medium&amp;id=68aaa3fbad5a09ad002dfdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36174-cwe-434-unrestricted-upload-of-file-dbb1db28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36174%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Integrated%20Analytics%20System&amp;severity=high&amp;id=68aa6bbbad5a09ad002d0c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36157-cwe-863-incorrect-authorization-in--b716a77f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36157%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Engineering%20Lifecycle%20Management&amp;severity=critical&amp;id=68aa6bbbad5a09ad002d0c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-24-60de6f96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-24&amp;severity=medium&amp;id=68abab9ead5a09ad00432131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/davita-confirms-ransomware-attack-compromised-data-c466fc5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DaVita%20confirms%20ransomware%20attack%20compromised%20data%20of%202.7M%20people&amp;severity=high&amp;id=68aa450ead5a09ad002b58fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-gmail-phishing-scam-uses-ai-style-prompt-injec-b7e33173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Gmail%20Phishing%20Scam%20Uses%20AI-Style%20Prompt%20Injection%20to%20Evade%20Detection&amp;severity=medium&amp;id=68aa28f1ad5a09ad002ad752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-could-take-over-apple-devices-via-maliciou-51da2358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Could%20Take%20Over%20Apple%20Devices%20Via%20Malicious%20Images%20%E2%80%93%20Patch%20Now!&amp;severity=medium&amp;id=68a9cd88ad5a09ad0029849a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9363-stack-based-buffer-overflow-in-links-dfd500b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9363%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a9cd9bad5a09ad002984b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9362-stack-based-buffer-overflow-in-links-4e336459</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9362%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68a9c681ad5a09ad00296a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9361-stack-based-buffer-overflow-in-links-5d3d6a75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9361%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a9b16aad5a09ad0029278a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-coinmarketcap-journalists-targeting-crypto-ex-4441852b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20CoinMarketCap%20Journalists%20Targeting%20Crypto%20Executives%20in%20Spear-Phishing%20Campaign&amp;severity=medium&amp;id=68a99c52ad5a09ad0028d489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-targets-indian-boss-linux-systems-with-weapo-96cd135a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%3A%20Targets%20Indian%20BOSS%20Linux%20Systems%20with%20Weaponized%20AutoStart%20Files&amp;severity=medium&amp;id=68ac42cead5a09ad004b062c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9360-stack-based-buffer-overflow-in-links-006d144f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9360%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a99c5dad5a09ad0028d4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/geoserver-exploits-polaredge-and-gayfemboy-push-cy-b02a4205</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GeoServer%20Exploits%2C%20PolarEdge%2C%20and%20Gayfemboy%20Push%20Cybercrime%20Beyond%20Traditional%20Botnets&amp;severity=high&amp;id=68a998cfad5a09ad0028bda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/murky-panda-hackers-exploit-cloud-trust-to-hack-do-8c8a7a28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Murky%20Panda%20hackers%20exploit%20cloud%20trust%20to%20hack%20downstream%20customers&amp;severity=high&amp;id=68a98e41ad5a09ad00288a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-300-entities-hit-by-a-variant-of-atomic-macos-a0b51c1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20300%20entities%20hit%20by%20a%20variant%20of%20Atomic%20macOS%20Stealer%20in%20recent%20campaign&amp;severity=medium&amp;id=68a98e41ad5a09ad00288a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9359-stack-based-buffer-overflow-in-links-06afeb49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9359%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a98e5dad5a09ad00288aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/countering-edrs-with-the-backing-of-protected-proc-b2abb249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Countering%20EDRs%20With%20The%20Backing%20Of%20Protected%20Process%20Light%20(PPL)&amp;severity=medium&amp;id=68a983baad5a09ad00284c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9358-stack-based-buffer-overflow-in-links-2f2d605c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9358%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a97223ad5a09ad0027ff1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5352-cwe-79-improper-neutralization-of-in-7004d31f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68a96797ad5a09ad0027ba9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5060-cwe-288-authentication-bypass-using--ccd319f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5060%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Bravis-Themes%20Bravis%20User&amp;severity=high&amp;id=68aa5e2bad5a09ad002cc9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5821-cwe-288-authentication-bypass-using--f0163f32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5821%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Case-Themes%20Case%20Theme%20User&amp;severity=critical&amp;id=68aa5e2bad5a09ad002cc9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcp-hub-hackerone-mcp-37b5d619</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MCP%20Hub%20%3E%20hackerone-mcp&amp;severity=medium&amp;id=68a96092ad5a09ad00279c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9357-stack-based-buffer-overflow-in-links-ee993b24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9357%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a95d0cad5a09ad00278c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7813-cwe-918-server-side-request-forgery--31e5c723</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7813%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20arraytics%20Eventin%20%E2%80%93%20AI%20Powered%20Event%20Manager%2C%20Events%20Calendar%2C%20Booking%20and%20Tickets%20Plugin&amp;severity=high&amp;id=68a959b9ad5a09ad002780e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43764-cwe-1333-inefficient-regular-expres-6241b501</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43764%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a94b77ad5a09ad0026bc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43765-cwe-79-improper-neutralization-of-i-ce57438e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a947f3ad5a09ad0026a825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7957-cwe-79-improper-neutralization-of-in-ebf34618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7957%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surror%20ShortcodeHub%20%E2%80%93%20MultiPurpose%20Shortcode%20Builder&amp;severity=medium&amp;id=68a9446fad5a09ad00269547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7841-cwe-352-cross-site-request-forgery-c-6a6d7503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7841%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sertifier%20Sertifier%20Certificate%20%26%20Badge%20Maker%20for%20WordPress%20%E2%80%93%20Tutor%20LMS&amp;severity=medium&amp;id=68a9446fad5a09ad0026953f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7821-cwe-862-missing-authorization-in-wcp-7061c922</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7821%3A%20CWE-862%20Missing%20Authorization%20in%20wcplus%20WC%20Plus&amp;severity=medium&amp;id=68a9446fad5a09ad0026952f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7828-cwe-862-missing-authorization-in-evi-a9027329</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7828%3A%20CWE-862%20Missing%20Authorization%20in%20evigeo%20WP%20Filter%20%26%20Combine%20RSS%20Feeds&amp;severity=medium&amp;id=68a9446fad5a09ad00269537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7839-cwe-352-cross-site-request-forgery-c-609ebabe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7839%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pokornydavid%20Restore%20Permanently%20delete%20Post%20or%20Page%20Data&amp;severity=medium&amp;id=68a9446fad5a09ad0026953b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7842-cwe-352-cross-site-request-forgery-c-22ac42fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7842%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silence%20Silencesoft%20RSS%20Reader&amp;severity=medium&amp;id=68a9446fad5a09ad00269543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8062-cwe-79-improper-neutralization-of-in-bd967540</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wen-solutions%20WS%20Theme%20Addons&amp;severity=medium&amp;id=68a9446fad5a09ad0026954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9048-cwe-73-external-control-of-file-name-d02d6c61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9048%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wptobe%20Wptobe-memberships&amp;severity=high&amp;id=68a94470ad5a09ad0026955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7827-cwe-862-missing-authorization-in-anz-c38fb478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7827%3A%20CWE-862%20Missing%20Authorization%20in%20anzia%20Ni%20WooCommerce%20Customer%20Product%20Report&amp;severity=medium&amp;id=68a9446fad5a09ad00269533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9131-cwe-79-improper-neutralization-of-in-bc8dd20f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ogulo%20Ogulo%20%E2%80%93%20360%C2%B0%20Tour&amp;severity=medium&amp;id=68a94470ad5a09ad00269560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7642-cwe-288-authentication-bypass-using--0c31e6bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7642%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20simplercheckout%20Simpler%20Checkout&amp;severity=critical&amp;id=68a9446fad5a09ad0026952b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43766-cwe-434-unrestricted-upload-of-file-ed632658</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43766%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a9446fad5a09ad00269528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43767-cwe-601-url-redirection-to-untruste-db33790d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43767%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a939e3ad5a09ad00267457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43768-cwe-201-insertion-of-sensitive-info-65f73ab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43768%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a932dcad5a09ad00262a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43769-cwe-79-improper-neutralization-of-i-2c601b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a932dcad5a09ad00262a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43770-cwe-79-improper-neutralization-of-i-e3b7acd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a91dc3ad5a09ad00246005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-23-4e7e5761</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-23&amp;severity=medium&amp;id=68aa5a1ead5a09ad002c8e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-document-readers-and-deception-tracking-th-42226465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Document%20Readers%20and%20Deception%3A%20Tracking%20the%20Latest%20Updates%20to%20Anatsa&amp;severity=medium&amp;id=68ac42cead5a09ad004b061e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cookie-spiders-malvertising-attack-drops-new-shamo-61cc0e63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COOKIE%20SPIDER&apos;s%20Malvertising%20Attack%20Drops%20New%20SHAMOS%20macOS%20Malware&amp;severity=medium&amp;id=68a8fa9aad5a09ad002348b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9356-stack-based-buffer-overflow-in-links-8c0b201f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9356%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a8de7bad5a09ad00227c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9355-stack-based-buffer-overflow-in-links-f962dc9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9355%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a8de7bad5a09ad00227c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43761-cwe-79-improper-neutralization-of-i-6aa0ee69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8daf6ad5a09ad00226b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52451-cwe-20-improper-input-validation-in-c3e5c7f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52451%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=68a8d3f1ad5a09ad002249e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52450-cwe-22-improper-limitation-of-a-pat-afc10401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52450%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Salesforce%20Tableau%20Server&amp;severity=medium&amp;id=68a8d3f1ad5a09ad002249dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26498-cwe-434-unrestricted-upload-of-file-3c2e4b23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26498%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=68a8d3f1ad5a09ad002249da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26497-cwe-434-unrestricted-upload-of-file-2e26aa0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26497%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=68a8d3f1ad5a09ad002249d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26496-cwe-843-access-of-resource-using-in-ec4b26b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26496%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Salesforce%20Tableau%20Server%2C%20Tableau%20Desktop&amp;severity=critical&amp;id=68a8d3f1ad5a09ad002249d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57801-cwe-347-improper-verification-of-cr-d0df0518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57801%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Consensys%20gnark&amp;severity=high&amp;id=68a8cce7ad5a09ad0022289e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43759-cwe-732-incorrect-permission-assign-f4e13037</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43759%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8c25bad5a09ad00217696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6791-cwe-89-improper-neutralization-of-sp-d40c6d53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6791%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20web&amp;severity=high&amp;id=68a8bed7ad5a09ad0021645d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4650-cwe-89-improper-neutralization-of-sp-fa15c745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4650%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20web&amp;severity=high&amp;id=68a8bed7ad5a09ad00216461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54812-cwe-117-improper-output-neutralizat-de7d1d4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54812%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=low&amp;id=68a8bed7ad5a09ad00216468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54813-cwe-117-improper-output-neutralizat-88df2202</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54813%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Apache%20Software%20Foundation%20Apache%20Log4cxx&amp;severity=medium&amp;id=68a8bed7ad5a09ad0021646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43762-cwe-770-allocation-of-resources-wit-f43a2a80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43762%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8bed7ad5a09ad00216465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48988-cwe-564-sql-injection-in-apache-sof-5c00f079</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48988%3A%20CWE-564%20SQL%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20StreamPark&amp;severity=high&amp;id=690a6f059e609817bf702f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43758-cwe-552-files-or-directories-access-609c0da9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43758%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8b7cfad5a09ad00212d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-on-macos-applescript-stealer-terminal-phi-23813e64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clickfix%20on%20macOS%3A%20AppleScript%20Stealer%2C%20Terminal%20Phishing%2C%20and%20C2%20Infrastructure&amp;severity=medium&amp;id=68ac4652ad5a09ad004b19a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43760-cwe-79-cross-site-scripting-in-life-0087736d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43760%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8ad43ad5a09ad0020e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-mac-fixes-trick-users-into-installing-new-sha-69c01f05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Mac%20fixes%20trick%20users%20into%20installing%20new%20Shamos%20infostealer&amp;severity=high&amp;id=68a8a9bead5a09ad0020bcd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-harvest-extracting-windows-secrets-under-th-137cce61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Harvest%3A%20Extracting%20Windows%20Secrets%20Under%20the%20Radar&amp;severity=medium&amp;id=68a8a9d4ad5a09ad0020bd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57800-cwe-523-unprotected-transport-of-cr-94cd0422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57800%3A%20CWE-523%3A%20Unprotected%20Transport%20of%20Credentials%20in%20advplyr%20audiobookshelf&amp;severity=high&amp;id=68a8a63bad5a09ad0020a08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/high-boy-is-a-gadget-for-hackers-together-with-its-af07efbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=High%20Boy%20is%20a%20gadget%20for%20hackers%2C%20together%20with%20its%20friend%2C%20OctoBit&amp;severity=high&amp;id=68a8a2bcad5a09ad00208678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57771-cwe-78-improper-neutralization-of-s-375f7ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57771%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68a89f33ad5a09ad0020783a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43751-cwe-203-observable-discrepancy-in-l-d32e160d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43751%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a8982fad5a09ad00203a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53363-cwe-73-external-control-of-file-nam-b9bb1b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53363%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20donknap%20dpanel&amp;severity=medium&amp;id=68a88da0ad5a09ad001ff897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36042-cwe-79-improper-neutralization-of-i-303744d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=68a88698ad5a09ad001fd4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33120-cwe-250-in-ibm-qradar-siem-04e2a189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33120%3A%20CWE-250%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=68a88698ad5a09ad001fd4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/davita-says-ransomware-gang-stole-data-of-nearly-2-f8f48c31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DaVita%20says%20ransomware%20gang%20stole%20data%20of%20nearly%202.7%20million%20people&amp;severity=high&amp;id=68a8717fad5a09ad001f154c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57896-cwe-862-missing-authorization-in-an-31dd70b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57896%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=68a85feead5a09ad001ebe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57895-cwe-352-cross-site-request-forgery--f97cbf80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57895%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=null&amp;id=68a85feead5a09ad001ebe67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57894-cwe-862-missing-authorization-in-ol-724ef91d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57894%3A%20Missing%20Authorization%20in%20ollybach%20WPPizza&amp;severity=null&amp;id=68a85feead5a09ad001ebe5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57893-cwe-352-cross-site-request-forgery--f2ab17e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57893%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=68a85feead5a09ad001ebe57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57892-cwe-352-cross-site-request-forgery--915d34e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57892%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jeff%20Starr%20Simple%20Statistics%20for%20Feeds&amp;severity=null&amp;id=68a85feead5a09ad001ebe54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57891-cwe-79-improper-neutralization-of-i-927f3fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpecommerce%20Recurring%20PayPal%20Donations&amp;severity=null&amp;id=68a85feead5a09ad001ebe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57890-cwe-79-improper-neutralization-of-i-b4c6aafa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lannoy%20Sessions&amp;severity=null&amp;id=68a85feead5a09ad001ebe4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57888-cwe-497-exposure-of-sensitive-syste-cc482aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57888%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68a85feead5a09ad001ebe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57887-cwe-79-improper-neutralization-of-i-04be1f8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68a85feead5a09ad001ebe48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57886-cwe-639-authorization-bypass-throug-382a2a73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57886%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Equalize%20Digital%20Accessibility%20Checker%20by%20Equalize%20Digital&amp;severity=null&amp;id=68a85feead5a09ad001ebe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57885-cwe-352-cross-site-request-forgery--e1d54171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57885%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=null&amp;id=68a85feead5a09ad001ebe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57884-cwe-862-missing-authorization-in-wp-4f560cff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57884%3A%20Missing%20Authorization%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=68a85feead5a09ad001ebe3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9259-cwe-36-absolute-path-traversal-in-un-217ae169</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9259%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a85c68ad5a09ad001ead27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9258-cwe-36-absolute-path-traversal-in-un-a317e358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9258%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a87504ad5a09ad001f3cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9257-cwe-36-absolute-path-traversal-in-un-a1eb12c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9257%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a87504ad5a09ad001f3cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9256-cwe-36-absolute-path-traversal-in-un-0365f2c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9256%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a858e4ad5a09ad001e9c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9255-cwe-89-improper-neutralization-of-sp-5cebb8f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9255%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Uniong%20WebITR&amp;severity=high&amp;id=68a85560ad5a09ad001e8473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9254-cwe-306-missing-authentication-for-c-3ce2b295</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9254%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Uniong%20WebITR&amp;severity=critical&amp;id=68a85560ad5a09ad001e846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9331-cwe-862-missing-authorization-in-the-f4b97e18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9331%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20Spacious&amp;severity=medium&amp;id=68a85560ad5a09ad001e8477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proxyware-malware-being-distributed-on-youtube-vid-af108164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proxyware%20Malware%20Being%20Distributed%20on%20YouTube%20Video%20Download%20Site&amp;severity=medium&amp;id=68a8bed6ad5a09ad00216414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/after-sharepoint-attacks-microsoft-stops-sharing-p-0d837cb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=After%20SharePoint%20attacks%2C%20Microsoft%20stops%20sharing%20PoC%20exploit%20code%20with%20China&amp;severity=high&amp;id=68a843cbad5a09ad001e12ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-developer-jailed-four-years-for-sabotaging-ohio-3a62bc47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-Developer%20Jailed%20Four%20Years%20for%20Sabotaging%20Ohio%20Employer%20with%20Kill-Switch%20Malware&amp;severity=high&amp;id=68a84053ad5a09ad001df92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-apple-ios-ipados-and-macos-flaw-to-it-d12ff67a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Apple%20iOS%2C%20iPadOS%2C%20and%20macOS%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68a83cc3ad5a09ad001dec26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9341-cwe-400-uncontrolled-resource-consum-a3150bcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9341%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20FIPS&amp;severity=medium&amp;id=68a835bcad5a09ad001dc375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8678-cwe-918-server-side-request-forgery--3b8e4a1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8678%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20johnbillion%20WP%20Crontrol&amp;severity=medium&amp;id=68a81d21ad5a09ad001d27d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57699-unquoted-search-path-or-element-in--f8e5d6d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57699%3A%20Unquoted%20search%20path%20or%20element%20in%20Western%20Digital%20Corporation%20Western%20Digital%20Kitfox%20for%20Windows&amp;severity=medium&amp;id=68a8161aad5a09ad001d0446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8281-cwe-79-cross-site-scripting-xss-in-w-c6faadf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8281%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Talroo&amp;severity=high&amp;id=68a80b8ead5a09ad001cbcc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41452-cwe-15-external-control-of-system-o-ddcf84a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41452%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Danfoss%20AK-SM8xxA%20Series&amp;severity=medium&amp;id=68a7ddd8ad5a09ad001ac7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41451-cwe-77-improper-neutralization-of-s-96eedaa0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41451%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Danfoss%20AK-SM8xxA%20Series&amp;severity=high&amp;id=68a7ddd8ad5a09ad001ac7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43752-cwe-770-allocation-of-resources-wit-8059fa03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43752%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a7bab8ad5a09ad0019f01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55455-na-3f7f0148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55455%3A%20n%2Fa&amp;severity=low&amp;id=68a90cc7ad5a09ad0023d515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-22-6ab7fd87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-22&amp;severity=medium&amp;id=68a9089ead5a09ad00239eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50859-na-5af11d62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50859%3A%20n%2Fa&amp;severity=medium&amp;id=68a8c25bad5a09ad002176a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50858-na-e0a6e524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50858%3A%20n%2Fa&amp;severity=medium&amp;id=68a8c25bad5a09ad0021769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55454-na-a526aded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55454%3A%20n%2Fa&amp;severity=high&amp;id=68a8c25bad5a09ad0021769c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51092-na-9d5e08d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51092%3A%20n%2Fa&amp;severity=critical&amp;id=68a8c25bad5a09ad00217699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52287-na-560bc61f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52287%3A%20n%2Fa&amp;severity=high&amp;id=68a8b44bad5a09ad00210d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55581-na-e8ccba13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55581%3A%20n%2Fa&amp;severity=high&amp;id=68a8b0c7ad5a09ad0020f794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52085-na-e3e987c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52085%3A%20n%2Fa&amp;severity=high&amp;id=68a8b0c7ad5a09ad0020f790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55613-na-2566f488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55613%3A%20n%2Fa&amp;severity=critical&amp;id=68a8a9d0ad5a09ad0020bd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigation-report-apt36-malware-campaign-using--79facd6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigation%20Report%3A%20APT36%20Malware%20Campaign%20Using%20Desktop%20Entry%20Files%20and%20Google%20Drive%20Payload%20Delivery&amp;severity=medium&amp;id=68a8a9b3ad5a09ad0020bc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55637-na-ada085ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55637%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55634-na-858fb807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55634%3A%20n%2Fa&amp;severity=high&amp;id=68a8a2b8ad5a09ad00208652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55631-na-f240bf46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55631%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020864f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55630-na-0571ebe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55630%3A%20n%2Fa&amp;severity=high&amp;id=68a8a2b8ad5a09ad0020864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55629-na-7d4a7096</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55629%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020863f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55627-na-b12fb161</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55627%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55626-na-164a9d70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55626%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55625-na-9012dd7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55625%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55624-na-608400d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55624%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55623-na-e903d14c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55623%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55622-na-53453b2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55622%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad0020862c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55621-na-7e0b5d67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55621%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55620-na-07d3cb05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55620%3A%20n%2Fa&amp;severity=medium&amp;id=68a8a2b8ad5a09ad00208626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55619-na-947ae373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55619%3A%20n%2Fa&amp;severity=critical&amp;id=68a8a2b8ad5a09ad0020861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55398-na-7e39acb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55398%3A%20n%2Fa&amp;severity=critical&amp;id=68a89f33ad5a09ad00207837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57105-na-1bf05565</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57105%3A%20n%2Fa&amp;severity=critical&amp;id=68a89bafad5a09ad002059c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55611-na-9321fcd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55611%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55605-na-5b780b49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55605%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55606-na-a4d6892e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55606%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55603-na-f7419590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55603%3A%20n%2Fa&amp;severity=critical&amp;id=68a8982fad5a09ad00203a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55599-na-a01237c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55599%3A%20n%2Fa&amp;severity=critical&amp;id=68a894a7ad5a09ad00202838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52095-na-a96de7a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52095%3A%20n%2Fa&amp;severity=critical&amp;id=68a894a7ad5a09ad00202833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55602-na-44e9d075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55602%3A%20n%2Fa&amp;severity=critical&amp;id=68a894a7ad5a09ad0020282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29366-na-fa3667de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29366%3A%20n%2Fa&amp;severity=critical&amp;id=68a89124ad5a09ad0020033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52094-na-5ac46a7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52094%3A%20n%2Fa&amp;severity=high&amp;id=68a89124ad5a09ad00200337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50733-na-3e9555c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50733%3A%20n%2Fa&amp;severity=medium&amp;id=68a89124ad5a09ad00200333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51605-na-ac7db4fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51605%3A%20n%2Fa&amp;severity=high&amp;id=68a88da0ad5a09ad001ff894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50674-na-b54a0f53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50674%3A%20n%2Fa&amp;severity=high&amp;id=68a88da0ad5a09ad001ff890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29365-na-e6d49979</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29365%3A%20n%2Fa&amp;severity=critical&amp;id=68a88da0ad5a09ad001ff88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55573-na-4d3cc880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55573%3A%20n%2Fa&amp;severity=high&amp;id=68a88698ad5a09ad001fd4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50691-na-5f88cf49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50691%3A%20n%2Fa&amp;severity=medium&amp;id=68a87888ad5a09ad001f4bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51825-na-08ae3784</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51825%3A%20n%2Fa&amp;severity=medium&amp;id=68a87888ad5a09ad001f4bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/colt-confirms-customer-data-stolen-as-warlock-rans-f06110e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Colt%20confirms%20customer%20data%20stolen%20as%20Warlock%20ransomware%20auctions%20files&amp;severity=high&amp;id=68a7b023ad5a09ad00193a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43753-cwe-79-improper-neutralization-of-i-9ac1e291</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68a79e90ad5a09ad0018c661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/camel-security-demonstration-defending-against-mos-1d19037f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CaMeL%20Security%20Demonstration%20-%20Defending%20Against%20(most)%20Prompt%20Injections%20by%20Design&amp;severity=medium&amp;id=68a79b10ad5a09ad0018b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-hidden-risks-of-passkeys-in-ab-052dfb35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20uncover%20hidden%20risks%20of%20passkeys%20in%20abusive%20relationships&amp;severity=medium&amp;id=68a79787ad5a09ad0018a12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-malware-campaign-using-desktop-entry-files-a-7819bf28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36%20Malware%20Campaign%20Using%20Desktop%20Entry%20Files%20and%20Google%20Drive%20Payload%20Delivery&amp;severity=medium&amp;id=68a78cfbad5a09ad0018401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/think-before-you-clickfix-analyzing-the-clickfix-s-a542f636</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Think%20before%20you%20Click(Fix)%3A%20Analyzing%20the%20ClickFix%20social%20engineering%20technique&amp;severity=medium&amp;id=68a78cfbad5a09ad00184012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43747-cwe-918-server-side-request-forgery-6f239f68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43747%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20DXP&amp;severity=medium&amp;id=68a78270ad5a09ad0018061f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54460-cwe-434-in-aveva-pi-integrator-09cee76f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54460%3A%20CWE-434%20in%20AVEVA%20PI%20Integrator&amp;severity=high&amp;id=68a77b71ad5a09ad0017da64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41415-cwe-201-in-aveva-pi-integrator-9a8e10bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41415%3A%20CWE-201%20in%20AVEVA%20PI%20Integrator&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55231-cwe-362-concurrent-execution-using--acd02db7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55231%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68a77b71ad5a09ad0017da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55229-cwe-347-improper-verification-of-cr-84324734</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55229%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55230-cwe-822-untrusted-pointer-dereferen-5fd7d636</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55230%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68a77b71ad5a09ad0017da71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53795-cwe-285-improper-authorization-in-m-57ca0d75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53795%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=critical&amp;id=68a77b71ad5a09ad0017da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53763-cwe-284-improper-access-control-in--4a43aaed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53763%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Purview%20Data%20Governance&amp;severity=critical&amp;id=68a77b71ad5a09ad0017da68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24489-cwe-434-in-infinitt-healthcare-infi-489ffbbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24489%3A%20CWE-434%20in%20INFINITT%20Healthcare%20INFINITT%20PACS%20System%20Manager&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27714-cwe-434-in-infinitt-healthcare-infi-c013dad6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27714%3A%20CWE-434%20in%20INFINITT%20Healthcare%20INFINITT%20PACS%20System%20Manager&amp;severity=medium&amp;id=68a77b71ad5a09ad0017da7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3128-cwe-78-in-mitsubishi-electric-europe-2fe6d6fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3128%3A%20CWE-78%20in%20Mitsubishi%20Electric%20Europe%20smartRTU&amp;severity=critical&amp;id=68a777e4ad5a09ad0017b034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27721-cwe-497-in-infinitt-healthcare-infi-4f6674c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27721%3A%20CWE-497%20in%20INFINITT%20Healthcare%20INFINITT%20PACS%20System%20Manager&amp;severity=high&amp;id=68a777e4ad5a09ad0017b038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55107-cwe-79-improper-neutralization-of-i-32fa285c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55106-cwe-79-improper-neutralization-of-i-bd0dd185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55105-cwe-79-improper-neutralization-of-i-772df2e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55105%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Experience%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55104-cwe-79-improper-neutralization-of-i-eb2bd7da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55103-cwe-79-improper-neutralization-of-i-2f211022</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS%20Enterprise%20Sites&amp;severity=medium&amp;id=68a77460ad5a09ad00179dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38743-cwe-805-buffer-access-with-incorrec-584a4acd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38743%3A%20CWE-805%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Dell%20iDRAC%20Service%20Module%20(iSM)&amp;severity=high&amp;id=68a76d58ad5a09ad00177218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38742-cwe-732-incorrect-permission-assign-6bc05793</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38742%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20iDRAC%20Service%20Module%20(iSM)&amp;severity=medium&amp;id=68a76d58ad5a09ad0017721b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-gang-claims-4tb-data-breach-at-ni-9814751a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Gang%20Claims%204TB%20Data%20Breach%20at%20Nissan%20CBI&amp;severity=high&amp;id=68a7665aad5a09ad0017471f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-auth-exploit-chains-found-in-commvault-could-e-e118b56b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Auth%20Exploit%20Chains%20Found%20in%20Commvault%20Could%20Enable%20Remote%20Code%20Execution%20Attacks&amp;severity=high&amp;id=68a75f46ad5a09ad00171f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7051-cwe-284-in-n-able-n-central-673dc131</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7051%3A%20CWE-284%20in%20N-able%20N-central&amp;severity=high&amp;id=68a75bc5ad5a09ad00170307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57768-cwe-79-improper-neutralization-of-i-3d6fc18b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57768%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alanaktion%20phproject&amp;severity=medium&amp;id=68a75bc4ad5a09ad00170304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43754-cwe-208-observable-timing-discrepan-9023f9d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43754%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a75bc4ad5a09ad001702f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57765-cwe-79-improper-neutralization-of-i-6904feeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57765%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a754bbad5a09ad0016a78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57764-cwe-79-improper-neutralization-of-i-c451b39f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57764%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a754bbad5a09ad0016a786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9311-sql-injection-in-itsourcecode-apartm-282d8aab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9311%3A%20SQL%20Injection%20in%20itsourcecode%20Apartment%20Management%20System&amp;severity=medium&amp;id=68a754bbad5a09ad0016a78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57763-cwe-79-improper-neutralization-of-i-5b33e195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57763%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a75137ad5a09ad0012b6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57762-cwe-79-improper-neutralization-of-i-0f61e532</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57762%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68a75137ad5a09ad0012b6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43755-cwe-79-cross-site-scripting-in-life-11fcb566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43755%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a74dc4ad5a09ad0012a5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57761-cwe-89-improper-neutralization-of-s-8779f0c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57761%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68a74dc4ad5a09ad0012a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-browsers-can-be-tricked-into-paying-fake-stores-e53affdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Browsers%20Can%20Be%20Tricked%20Into%20Paying%20Fake%20Stores%20in%20PromptFix%20Attack&amp;severity=medium&amp;id=68a74db2ad5a09ad0012a58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9310-hard-coded-credentials-in-yeqifu-car-710bd1da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9310%3A%20Hard-coded%20Credentials%20in%20yeqifu%20carRental&amp;severity=medium&amp;id=68a74dc5ad5a09ad0012a5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9309-hard-coded-credentials-in-tenda-ac10-5209bc54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9309%3A%20Hard-coded%20Credentials%20in%20Tenda%20AC10&amp;severity=low&amp;id=68a74dc4ad5a09ad0012a5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57755-cwe-200-exposure-of-sensitive-infor-8f05e627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57755%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20musistudio%20claude-code-router&amp;severity=high&amp;id=68a74a30ad5a09ad00128c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43756-cwe-79-cross-site-scripting-in-life-4359bba7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43756%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a74a30ad5a09ad00128c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-can-be-used-to-create-working-exploits-for-publ-38d79ce9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20can%20be%20used%20to%20create%20working%20exploits%20for%20published%20CVEs%20in%20a%20few%20minutes%20and%20for%20a%20few%20dollars&amp;severity=medium&amp;id=68a74a34ad5a09ad00128c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-variant-of-acrstealer-actively-distributed-wit-053c8685</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Variant%20of%20ACRStealer%20Actively%20Distributed%20with%20Modifications&amp;severity=medium&amp;id=68a77b67ad5a09ad0017d760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywater-leveraging-dchspy-for-israel-iran-confl-a42d8ade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%20Leveraging%20DCHSpy%20For%20Israel-Iran%20Conflict&amp;severity=medium&amp;id=68a7745fad5a09ad00179d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57754-cwe-260-password-in-configuration-f-fb1d8ae1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57754%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20kristoferfannar%20eslint-ban-moment&amp;severity=critical&amp;id=68a74a30ad5a09ad00128c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57753-cwe-22-improper-limitation-of-a-pat-48524f7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57753%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sapphi-red%20vite-plugin-static-copy&amp;severity=medium&amp;id=68a746acad5a09ad00127771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9308-inefficient-regular-expression-compl-97173154</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9308%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20yarnpkg%20Yarn&amp;severity=medium&amp;id=68a746acad5a09ad0012777b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9307-sql-injection-in-phpgurukul-online-c-d025024b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9307%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=68a746acad5a09ad00127774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9162-cleartext-storage-of-sensitive-infor-a62457e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9162%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.0&amp;severity=medium&amp;id=68a73fa3ad5a09ad00124d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9306-cross-site-scripting-in-sourcecodest-7eb60f4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9306%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Advanced%20School%20Management%20System&amp;severity=medium&amp;id=68a73c20ad5a09ad00123248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55297-cwe-120-buffer-copy-without-checkin-632d26ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55297%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=68a7389bad5a09ad00121fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9305-sql-injection-in-sourcecodester-onli-71e7ec29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9305%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=68a7389bad5a09ad00121fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9304-sql-injection-in-sourcecodester-onli-14b56911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9304%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=68a7389bad5a09ad00121fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53251-cwe-434-unrestricted-upload-of-file-4b86a8a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53251%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20An-Themes%20Pin%20WP&amp;severity=null&amp;id=68a73519ad5a09ad0011fe4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48956-cwe-400-uncontrolled-resource-consu-78c7ee9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48956%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20vllm-project%20vllm&amp;severity=high&amp;id=68a73519ad5a09ad0011fe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9303-buffer-overflow-in-totolink-a720r-f79f2690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9303%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A720R&amp;severity=high&amp;id=68a73193ad5a09ad0011c053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9302-sql-injection-in-phpgurukul-user-man-0519d4f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9302%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Management%20System&amp;severity=medium&amp;id=68a72a8bad5a09ad00117f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/azures-weakest-link-full-cross-tenant-compromise-1edccdcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Azure&apos;s%20Weakest%20Link%20-%20Full%20Cross-Tenant%20Compromise&amp;severity=medium&amp;id=68a7271cad5a09ad0011286f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34158-cwe-20-improper-input-validation-in-cae7d54d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34158%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20Plex%20Media%20Server&amp;severity=high&amp;id=68a72384ad5a09ad00111837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9301-reachable-assertion-in-cmake-3cee0bfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9301%3A%20Reachable%20Assertion%20in%20cmake&amp;severity=medium&amp;id=68a72384ad5a09ad0011184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weak-passwords-and-compromised-accounts-key-findin-d08adfef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weak%20Passwords%20and%20Compromised%20Accounts%3A%20Key%20Findings%20from%20the%20Blue%20Report%202025&amp;severity=high&amp;id=68a71c7aad5a09ad001101c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-using-new-quirkyloader-malware-to-spread-a-e2f48b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Using%20New%20QuirkyLoader%20Malware%20to%20Spread%20Agent%20Tesla%2C%20AsyncRAT%20and%20Snake%20Keylogger&amp;severity=high&amp;id=68a71c7aad5a09ad001101cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9300-stack-based-buffer-overflow-in-saito-168036dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9300%3A%20Stack-based%20Buffer%20Overflow%20in%20saitoha%20libsixel&amp;severity=medium&amp;id=68a71c96ad5a09ad0011027c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9299-stack-based-buffer-overflow-in-tenda-523bc229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9299%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=68a718f8ad5a09ad0010f37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9298-stack-based-buffer-overflow-in-tenda-d593fbe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9298%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20M3&amp;severity=high&amp;id=68a718f8ad5a09ad0010f377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9297-stack-based-buffer-overflow-in-tenda-5a6b7fb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9297%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i22&amp;severity=high&amp;id=68a70e6cad5a09ad0010ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nearly-1-million-health-records-and-ssns-exposed-i-b340dc47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nearly%201%20Million%20Health%20Records%20and%20SSNs%20Exposed%20in%20Marijuana%20Patient%20Database&amp;severity=medium&amp;id=68a70762ad5a09ad00107d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9296-unrestricted-upload-in-emlog-pro-41ac2509</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9296%3A%20Unrestricted%20Upload%20in%20Emlog%20Pro&amp;severity=medium&amp;id=68a70775ad5a09ad00107d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sim-swapper-scattered-spider-hacker-gets-10-years-0fbfc579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SIM-Swapper%2C%20Scattered%20Spider%20Hacker%20Gets%2010%20Years&amp;severity=high&amp;id=68a6e7bfad5a09ad000f098e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-certcc-warns-of-flaws-in-workhorse-software-acc-bb678dea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20CERT%2FCC%20warns%20of%20flaws%20in%20Workhorse%20Software%20accounting%20software%20used%20by%20hundreds%20of%20municipalities%20in%20Wisconsin&amp;severity=medium&amp;id=68a6e7bfad5a09ad000f0996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/orange-belgium-discloses-data-breach-impacting-850-0bdb4c92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Orange%20Belgium%20discloses%20data%20breach%20impacting%20850%2C000%20customers&amp;severity=high&amp;id=68a6e7bfad5a09ad000f098a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8064-cwe-79-improper-neutralization-of-in-280cc084</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aicwebtech%20Bible%20SuperSearch&amp;severity=medium&amp;id=68a6e7f7ad5a09ad000f0a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-muddywater-targets-cfos-with-multi-stage-phish-70ce8a10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20MuddyWater%20Targets%20CFOs%20with%20Multi-Stage%20Phishing%20%26%20NetBird%20Abuse&amp;severity=medium&amp;id=68a70afaad5a09ad00108cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/we-put-agentic-ai-browsers-to-the-test-they-clicke-d501f37e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=We%20Put%20Agentic%20AI%20Browsers%20to%20the%20Test%20-%20They%20Clicked%2C%20They%20Paid%2C%20They%20Failed&amp;severity=medium&amp;id=68a6cf2bad5a09ad000c8b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8895-cwe-22-improper-limitation-of-a-path-a5339a91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8895%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cozmoslabs%20WP%20Webhooks%20%E2%80%93%20Automate%20repetitive%20tasks%20by%20creating%20powerful%20automation%20workflows%20directly%20within%20WordPress&amp;severity=critical&amp;id=68a6cf24ad5a09ad000c8b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7390-cwe-295-improper-certificate-validat-5e32fa3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7390%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Softing%20OPC%20UA%20C%2B%2B%20SDK&amp;severity=critical&amp;id=68a6ba0dad5a09ad000c04d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8607-cwe-79-improper-neutralization-of-in-cc825d4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20SlingBlocks%20%E2%80%93%20Gutenberg%20Blocks%20by%20FunnelKit%20(Formerly%20WooFunnels)&amp;severity=medium&amp;id=68a73519ad5a09ad0011fe42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7221-cwe-285-improper-authorization-in-gi-bbd18d15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7221%3A%20CWE-285%20Improper%20Authorization%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=68a7389bad5a09ad00121fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8592-cwe-352-cross-site-request-forgery-c-02683447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzoom%20Inspiro&amp;severity=high&amp;id=68a74327ad5a09ad00126373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53505-improper-limitation-of-a-pathname-t-afb911b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53505%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Intermesh%20BV%20Group-Office&amp;severity=medium&amp;id=68a6a170ad5a09ad000b7263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53504-cross-site-scripting-xss-in-interme-d00f1377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53504%3A%20Cross-site%20scripting%20(XSS)%20in%20Intermesh%20BV%20Group-Office&amp;severity=medium&amp;id=68a6a170ad5a09ad000b725f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48355-cwe-497-exposure-of-sensitive-syste-d8a2e8d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48355%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ProveSource%20LTD%20ProveSource%20Social%20Proof&amp;severity=null&amp;id=68a696e7ad5a09ad000b39cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-ai-website-creation-app-for-p-763fb8b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20AI%20Website%20Creation%20App%20For%20Phishing&amp;severity=medium&amp;id=68a70e6bad5a09ad0010ba4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43300-processing-a-malicious-image-file-m-e2bce306</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43300%3A%20Processing%20a%20malicious%20image%20file%20may%20result%20in%20memory%20corruption.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68a66cb4ad5a09ad000a234c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24285-vulnerability-in-ubiquiti-inc-unifi-13cdd6e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24285%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Lite&amp;severity=critical&amp;id=68a6693fad5a09ad0009f8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27213-vulnerability-in-ubiquiti-inc-unifi-d84e64f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27213%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Pro&amp;severity=medium&amp;id=68a6693fad5a09ad0009f902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48978-vulnerability-in-ubiquiti-inc-edgem-a8ea892b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48978%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20EdgeMAX%20EdgeSwitch&amp;severity=high&amp;id=68a6693fad5a09ad0009f911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27215-vulnerability-in-ubiquiti-inc-unifi-fca5f367</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27215%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20Display%20Cast&amp;severity=high&amp;id=68a6693fad5a09ad0009f908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27214-vulnerability-in-ubiquiti-inc-unifi-021a8bd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27214%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Connect%20EV%20Station%20Pro&amp;severity=critical&amp;id=68a6693fad5a09ad0009f905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27216-vulnerability-in-ubiquiti-inc-uisp--196fd1a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27216%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=high&amp;id=68a6693fad5a09ad0009f90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27217-vulnerability-in-ubiquiti-inc-uisp--ba689593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27217%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=critical&amp;id=68a6693fad5a09ad0009f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45438-na-d79cf0af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45438%3A%20n%2Fa&amp;severity=critical&amp;id=68e7a931ba0e608b4f997e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-21-f612a683</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-21&amp;severity=medium&amp;id=68a7b71ead5a09ad0019cc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51606-na-eb2b29df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51606%3A%20n%2Fa&amp;severity=high&amp;id=68a78270ad5a09ad00180622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51989-na-837bfec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51989%3A%20n%2Fa&amp;severity=high&amp;id=68a77b71ad5a09ad0017da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52351-na-22439906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52351%3A%20n%2Fa&amp;severity=high&amp;id=68a75f5bad5a09ad00171f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52352-na-f7eaa3d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52352%3A%20n%2Fa&amp;severity=critical&amp;id=68a75f5bad5a09ad00171f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55524-na-f91fda6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55524%3A%20n%2Fa&amp;severity=high&amp;id=68a75bc4ad5a09ad00170300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55523-na-16682d23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55523%3A%20n%2Fa&amp;severity=low&amp;id=68a75bc4ad5a09ad001702fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55522-na-ca416c9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55522%3A%20n%2Fa&amp;severity=medium&amp;id=68a754bbad5a09ad0016a782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55521-na-c74c437a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55521%3A%20n%2Fa&amp;severity=medium&amp;id=68a754bbad5a09ad0016a77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52395-na-08b27bc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52395%3A%20n%2Fa&amp;severity=critical&amp;id=68a74327ad5a09ad0012636f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55420-na-af949993</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55420%3A%20n%2Fa&amp;severity=high&amp;id=68a73c20ad5a09ad00123250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55383-na-cd96ac09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55383%3A%20n%2Fa&amp;severity=high&amp;id=68a73519ad5a09ad0011fe3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55371-na-bcf427b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55371%3A%20n%2Fa&amp;severity=medium&amp;id=68a72e10ad5a09ad0011a375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52194-na-7bf0cd19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52194%3A%20n%2Fa&amp;severity=high&amp;id=68a72e10ad5a09ad0011a370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50860-na-c16f915d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50860%3A%20n%2Fa&amp;severity=medium&amp;id=68a72e10ad5a09ad0011a367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55370-na-130e2f23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55370%3A%20n%2Fa&amp;severity=high&amp;id=68a72a8bad5a09ad00117f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55368-na-972f84ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55368%3A%20n%2Fa&amp;severity=high&amp;id=68a72708ad5a09ad0011276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51818-na-1b2fbf09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51818%3A%20n%2Fa&amp;severity=medium&amp;id=68a72384ad5a09ad00111848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55367-na-9721c49c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55367%3A%20n%2Fa&amp;severity=medium&amp;id=68a72384ad5a09ad00111843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55366-na-05005cde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55366%3A%20n%2Fa&amp;severity=medium&amp;id=68a72384ad5a09ad0011183e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55564-na-e1b15edf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55564%3A%20n%2Fa&amp;severity=high&amp;id=68a71fffad5a09ad00110cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47184-na-0d2b7cc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47184%3A%20n%2Fa&amp;severity=medium&amp;id=68a71c96ad5a09ad00110278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9264-improper-control-of-resource-identif-cab742f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9264%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=68a65ea4ad5a09ad0009b8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9263-improper-control-of-resource-identif-ac8f37c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9263%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=68a6579cad5a09ad000991cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9262-os-command-injection-in-wong2-mcp-cl-13d1ea57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9262%3A%20OS%20Command%20Injection%20in%20wong2%20mcp-cli&amp;severity=medium&amp;id=68a6579cad5a09ad000991c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9253-stack-based-buffer-overflow-in-links-e73c11da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9253%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a65094ad5a09ad00096d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9252-stack-based-buffer-overflow-in-links-70ccf1cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9252%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a64608ad5a09ad000943cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9251-stack-based-buffer-overflow-in-links-6cdc3841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9251%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a64608ad5a09ad000943c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9288-cwe-20-improper-input-validation-664ed48c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9288%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=68a64608ad5a09ad000943d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57749-cwe-59-improper-link-resolution-bef-47216104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57749%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=68a64608ad5a09ad000943db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9287-cwe-20-improper-input-validation-4252ad4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9287%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=68a64284ad5a09ad00093432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9250-stack-based-buffer-overflow-in-links-c6f5c9bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9250%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a64284ad5a09ad00093436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9249-stack-based-buffer-overflow-in-links-cb10b5b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9249%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a63b7cad5a09ad000917f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9248-stack-based-buffer-overflow-in-links-fe0908f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9248%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a63b7cad5a09ad000917f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9247-stack-based-buffer-overflow-in-links-baa717ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9247%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a63474ad5a09ad0008ea3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-state-hackers-exploit-7-year-old-cisco-rou-1e16e529</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20State%20Hackers%20Exploit%207-Year-Old%20Cisco%20Router%20Vulnerability&amp;severity=high&amp;id=68a630efad5a09ad0008d661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54988-cwe-611-improper-restriction-of-xml-fbcadab2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54988%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Tika%20PDF%20parser%20module&amp;severity=high&amp;id=68a62d6bad5a09ad0008befd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9246-stack-based-buffer-overflow-in-links-3e73f6ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9246%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a629e8ad5a09ad000895c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9245-stack-based-buffer-overflow-in-links-11347b4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9245%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68a629e8ad5a09ad000895be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-fixes-new-zero-day-flaw-exploited-in-targete-bd41aa7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20fixes%20new%20zero-day%20flaw%20exploited%20in%20targeted%20attacks&amp;severity=critical&amp;id=68a62662ad5a09ad00085209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9244-os-command-injection-in-linksys-re62-c9d32b67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9244%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68a6267aad5a09ad00085260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9241-csv-injection-in-elunez-eladmin-3db19e78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9241%3A%20CSV%20Injection%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68a6267aad5a09ad00085259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43757-cwe-79-cross-site-scripting-in-life-d33477c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43757%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a61f5bad5a09ad00082403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-the-curtain-how-lumma-affiliates-operate-caa23ec2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20the%20Curtain%3A%20How%20Lumma%20Affiliates%20Operate&amp;severity=medium&amp;id=68a63b7bad5a09ad000917d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43746-cwe-79-cross-site-scripting-in-life-aaf4face</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43746%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a61853ad5a09ad0007edce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9240-information-disclosure-in-elunez-ela-f26ac984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9240%3A%20Information%20Disclosure%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68a61853ad5a09ad0007edd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9239-inadequate-encryption-strength-in-el-bd721d00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9239%3A%20Inadequate%20Encryption%20Strength%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68a61154ad5a09ad0007a437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9238-sql-injection-in-swatadru-exam-seati-51c5735f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9238%3A%20SQL%20Injection%20in%20Swatadru%20Exam-Seating-Arrangement&amp;severity=medium&amp;id=68a61154ad5a09ad0007a430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/commvault-plugs-holes-in-backup-suite-that-allow-r-f7d01b95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Commvault%20plugs%20holes%20in%20backup%20suite%20that%20allow%20remote%20code%20executio&amp;severity=high&amp;id=68a60dcfad5a09ad000785b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9237-cross-site-scripting-in-codeastro-ec-1f6806b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9237%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Ecommerce%20Website&amp;severity=medium&amp;id=68a60a48ad5a09ad0007726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9236-sql-injection-in-portabilis-i-diario-813f959e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9236%3A%20SQL%20Injection%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68a60a48ad5a09ad00077267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47054-cross-site-scripting-dom-based-xss--399c0989</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47054%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46849-cross-site-scripting-stored-xss-cwe-e8ff635d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46849%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46852-cross-site-scripting-stored-xss-cwe-c30743b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46852%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9235-cross-site-scripting-in-scada-lts-58e08055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9235%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a6033dad5a09ad00074ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9234-cross-site-scripting-in-scada-lts-5f56f583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9234%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a6033dad5a09ad00074c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46856-cross-site-scripting-dom-based-xss--f7cb66cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46856%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a6033dad5a09ad00074c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46932-cross-site-scripting-stored-xss-cwe-b2bda316</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46932%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46936-cross-site-scripting-stored-xss-cwe-f6e20af2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46936%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8309-cwe-269-improper-privilege-managemen-f5120604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8309%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ManageEngine%20Asset%20Explorer&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-find-ai-browsers-can-be-tricked-by-promptf-0046cd42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Find%20AI%20Browsers%20Can%20Be%20Tricked%20by%20PromptFix%20Exploit%20to%20Run%20Malicious%20Hidden%20Prompts&amp;severity=high&amp;id=68a5ffb7ad5a09ad000735ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-password-managers-can-leak-logins-in-clickja-0ae62201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20password%20managers%20can%20leak%20logins%20in%20clickjacking%20attacks&amp;severity=high&amp;id=68a5ffb7ad5a09ad000735af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46962-cross-site-scripting-stored-xss-cwe-3270626f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46962%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6183-cwe-78-improper-neutralization-of-sp-5327c022</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6183%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20StrongDM%20sdm-cli&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6182-cwe-269-improper-privilege-managemen-cb1ccfe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6182%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20StrongDM%20sdm&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46998-cross-site-scripting-stored-xss-cwe-fd4fdf50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46998%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68a5ffd7ad5a09ad000736c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6181-cwe-78-improper-neutralization-of-sp-5ce8bb07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6181%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20StrongDM%20sdm-cli&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6180-cwe-319-cleartext-transmission-of-se-7c184df6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6180%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20StrongDM%20sdm-cli&amp;severity=high&amp;id=68a5fc57ad5a09ad00071a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-weaponize-qr-codes-in-new-quishing-attacks-810d8dfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Weaponize%20QR%20Codes%20in%20New%20%E2%80%98Quishing%E2%80%99%20Attacks&amp;severity=high&amp;id=68a5fc32ad5a09ad000719bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cereal-offender-analyzing-the-cornflakev3-backdo-af93bc56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Cereal%20Offender%3A%20Analyzing%20the%20CORNFLAKE.V3%20Backdoor&amp;severity=medium&amp;id=68a5fc32ad5a09ad000719c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8612-cwe-59-improper-link-resolution-befo-ff759fa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8612%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AOMEI%20Backupper%20Workstation&amp;severity=high&amp;id=68a5f8afad5a09ad0006e52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20345-exposure-of-sensitive-information-t-5fe1985f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20345%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20Duo%20Authentication%20Proxy&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20269-external-control-of-file-name-or-pa-be4cb2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20269%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20131-improper-access-control-in-cisco-ci-b80153a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20131%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8611-cwe-306-missing-authentication-for-c-051e7316</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8611%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20AOMEI%20Cyber%20Backup&amp;severity=critical&amp;id=68a5f8afad5a09ad0006e52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8610-cwe-306-missing-authentication-for-c-abbefb3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8610%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20AOMEI%20Cyber%20Backup&amp;severity=critical&amp;id=68a5f8afad5a09ad0006e529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8415-authentication-bypass-by-alternate-n-e1ba9965</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8415%3A%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20Red%20Hat%20Cryostat%204%20on%20RHEL%209&amp;severity=medium&amp;id=68a5f8afad5a09ad0006e532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9233-cross-site-scripting-in-scada-lts-a8f2fbae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9233%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a5ee24ad5a09ad0006b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55751-cwe-601-url-redirection-to-untruste-c17b8a44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55751%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HackUCF%20OnboardLite&amp;severity=medium&amp;id=68a5ee24ad5a09ad0006b3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-antivirus-app-spreads-android-malware-with-li-2abc7f09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Antivirus%20App%20Spreads%20Android%20Malware%20with%20Livestreaming%20Capability%20to%20Spy%20on%20Russian%20Users&amp;severity=medium&amp;id=68a5e71aad5a09ad00062608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1142-cwe-918-server-side-request-forgery--811352dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1142%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Edge%20Application%20Manager&amp;severity=medium&amp;id=68a5e015ad5a09ad00057746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1139-cwe-732-incorrect-permission-assignm-1dbc9940</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1139%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Edge%20Application%20Manager&amp;severity=medium&amp;id=68a5e015ad5a09ad00057743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36114-cwe-20-improper-input-validation-in-5c744a45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36114%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20QRadar%20SOAR%20Plugin%20App&amp;severity=medium&amp;id=68a5e015ad5a09ad00057749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43748-cwe-352-cross-site-request-forgery--a4955238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43748%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=high&amp;id=68a5e015ad5a09ad0005774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8448-cwe-200-exposure-of-sensitive-inform-bb84d304</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8448%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Schneider%20Eelctric%20EcoStruxure%20Building%20Operation%20Enterprise%20Server&amp;severity=low&amp;id=68a5d90cad5a09ad00052e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8449-cwe-400-uncontrolled-resource-consum-3e6707d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8449%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schnieder%20Electric%20EcoStruxure%20Building%20Operation%20Enterprise%20Server&amp;severity=medium&amp;id=68a5d58ead5a09ad000521fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54927-cwe-22-improper-limitation-of-a-pat-4181d6b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54927%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=medium&amp;id=68a5d58ead5a09ad000521fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54926-cwe-22-improper-limitation-of-a-pat-693091eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54926%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d58ead5a09ad00052203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54925-cwe-918-server-side-request-forgery-eff78b1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54925%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d58ead5a09ad00052200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-dripdropper-malware-exploits-linux-flaw-then-p-46ff652e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20DripDropper%20Malware%20Exploits%20Linux%20Flaw%20Then%20Patches%20It%20Lock%20Rivals%20Out&amp;severity=medium&amp;id=68a5d202ad5a09ad000515e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54924-cwe-918-server-side-request-forgery-0c247919</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54924%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d214ad5a09ad000516a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54923-cwe-502-deserialization-of-untruste-095cf48a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54923%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert%20(PME)&amp;severity=high&amp;id=68a5d214ad5a09ad0005169f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9074-cwe-668-exposure-of-resource-to-wron-45bf55bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9074%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Docker%20Docker%20Desktop&amp;severity=critical&amp;id=68a5d214ad5a09ad000516a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31355-cwe-494-download-of-code-without-in-3dc0a6d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31355%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24322-cwe-304-missing-critical-step-in-au-7bb448f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24322%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24496-cwe-288-authentication-bypass-using-20bcbd2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24496%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27129-cwe-288-authentication-bypass-using-42b5d874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27129%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Tenda%20AC6%20V5.0&amp;severity=critical&amp;id=68a5caffad5a09ad0004fc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30256-cwe-772-missing-release-of-resource-551fc82d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30256%3A%20CWE-772%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32010-cwe-121-stack-based-buffer-overflow-8026d242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32010%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6%20V5.0&amp;severity=high&amp;id=68a5caffad5a09ad0004fc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54175-cwe-79-improper-neutralization-of-i-f65961bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.CMS.EXT&amp;severity=medium&amp;id=68a5c777ad5a09ad0004e162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54174-cwe-352-cross-site-request-forgery--47fcd8bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54174%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OpenSolution%20Quick.CMS&amp;severity=medium&amp;id=68a5c777ad5a09ad0004e15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8453-cwe-269-improper-privilege-managemen-81612fb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8453%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Schneider%20Electric%20Saitel%20DR%20RTU&amp;severity=high&amp;id=68a5c777ad5a09ad0004e166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54172-cwe-79-improper-neutralization-of-i-e45b1916</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenSolution%20Quick.CMS&amp;severity=medium&amp;id=68a5c777ad5a09ad0004e15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-uses-github-in-diplomat-cyber-attacks--4e9ae797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea%20Uses%20GitHub%20in%20Diplomat%20Cyber%20Attacks%20as%20IT%20Worker%20Scheme%20Hits%20320%2B%20Firms&amp;severity=high&amp;id=68a5c3f2ad5a09ad0004d10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43749-cwe-552-files-or-directories-access-3f5ce78f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43749%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5c3ffad5a09ad0004d163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4877-out-of-bounds-write-45f15cc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4877%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=68a5c06fad5a09ad0004bff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4437-allocation-of-resources-without-limi-e6126d92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4437%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204&amp;severity=medium&amp;id=68a5c06fad5a09ad0004bfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43750-cwe-434-unrestricted-upload-of-file-f71429b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43750%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5c06fad5a09ad0004bfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43741-cwe-79-improper-neutralization-of-i-21e57105</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43741%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5b968ad5a09ad00049398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7777-vulnerability-in-red-hat-mirror-regi-fad14a2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7777%3A%20Vulnerability%20in%20Red%20Hat%20mirror%20registry%20for%20Red%20Hat%20OpenShift&amp;severity=medium&amp;id=68a5b5e3ad5a09ad0004573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43742-cwe-79-improper-neutralization-of-i-19a9fc15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a5b5e3ad5a09ad00045737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8102-cwe-352-cross-site-request-forgery-c-fcfadcfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8102%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=68a5b270ad5a09ad00043f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-website-builder-lovable-abused-for-global-phish-26977b0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20Website%20Builder%20Lovable%20Abused%20for%20Global%20Phishing%20and%20Malware%20Scams&amp;severity=medium&amp;id=68a5b25fad5a09ad00043ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9173-unrestricted-upload-in-emlog-pro-e72a9404</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9173&amp;severity=null&amp;id=68a5aedcad5a09ad00042bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptojacking-is-dead-long-live-cryptojacking-eda6b2b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CryptoJacking%20is%20dead%3A%20long%20live%20CryptoJacking&amp;severity=medium&amp;id=68a5b967ad5a09ad0004938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacks-targeting-linux-ssh-servers-to-install-svf-46e1bc9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacks%20Targeting%20Linux%20SSH%20Servers%20to%20Install%20SVF%20DDoS%20Bot&amp;severity=medium&amp;id=68a5c3fead5a09ad0004d15c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guess-who-would-be-stupid-enough-to-rob-the-same-v-16f81384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guess%20Who%20Would%20Be%20Stupid%20Enough%20To%20Rob%20The%20Same%20Vault%20Twice%3F%20Pre-Auth%20RCE%20Chains%20in%20Commvault%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=68a5a7d8ad5a09ad0003fed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploit-weaponizes-sap-netweaver-bugs-for-full-sys-52a521fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploit%20weaponizes%20SAP%20NetWeaver%20bugs%20for%20full%20system%20compromise&amp;severity=high&amp;id=68a59d46ad5a09ad0003bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doj-charges-22-year-old-for-running-rapperbot-botn-0230fae2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DOJ%20Charges%2022-Year-Old%20for%20Running%20RapperBot%20Botnet%20Behind%20370%2C000%20DDoS%20Attacks&amp;severity=high&amp;id=68a59d46ad5a09ad0003bf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57734-cwe-538-in-jetbrains-teamcity-47eb1b11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57734%3A%20CWE-538%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68a592bbad5a09ad0003701d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57733-cwe-77-in-jetbrains-teamcity-c5d48beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57733%3A%20CWE-77%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68a592bbad5a09ad0003701a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57732-cwe-282-in-jetbrains-teamcity-37d77e88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57732%3A%20CWE-282%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=68a592bbad5a09ad00037017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57731-cwe-79-in-jetbrains-youtrack-71094b82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57731%3A%20CWE-79%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=68a592bbad5a09ad00037014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57730-cwe-80-in-jetbrains-intellij-idea-d50c9481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57730%3A%20CWE-80%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad00037011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57729-cwe-829-in-jetbrains-intellij-idea-5063dd01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57729%3A%20CWE-829%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad0003700e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57728-cwe-863-in-jetbrains-intellij-idea-1a130a5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57728%3A%20CWE-863%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad0003700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57727-cwe-319-in-jetbrains-intellij-idea-13a77ef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57727%3A%20CWE-319%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=68a592bbad5a09ad00037008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copilot-broke-your-audit-log-but-microsoft-wont-te-463c91e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copilot%20Broke%20Your%20Audit%20Log%2C%20but%20Microsoft%20Won%E2%80%99t%20Tell%20You&amp;severity=medium&amp;id=68a58f3dad5a09ad00035e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9229-cwe-209-generation-of-error-message--cb4dbb61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9229%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=68a58bb3ad5a09ad00033816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5261-cwe-639-authorization-bypass-through-d21c70ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5261%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Pik%20Online%20Yaz%C4%B1l%C4%B1m%20%C3%87%C3%B6z%C3%BCmleri%20A.%C5%9E.%20Pik%20Online&amp;severity=high&amp;id=68a58bb3ad5a09ad00033813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9228-cwe-863-incorrect-authorization-in-m-29ce7570</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9228%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=68a5882fad5a09ad00032140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5260-cwe-918-server-side-request-forgery--0ce45145</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5260%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Pik%20Online%20Yaz%C4%B1l%C4%B1m%20%C3%87%C3%B6z%C3%BCmleri%20A.%C5%9E.%20Pik%20Online&amp;severity=high&amp;id=68a584b3ad5a09ad0002e282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49381-cwe-352-cross-site-request-forgery--281707f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49381%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ads.txt%20Guru%20ads.txt%20Guru%20Connect&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49382-cwe-352-cross-site-request-forgery--637f953c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DexignZone%20JobZilla%20-%20Job%20Board%20WordPress%20Theme&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49389-cwe-79-improper-neutralization-of-i-4a53b1ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WEN%20Solutions%20Notice%20Bar&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49391-cwe-352-cross-site-request-forgery--0f3fbeda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49391%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49392-cwe-79-improper-neutralization-of-i-888b8092</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Audio%20Dock&amp;severity=null&amp;id=68a584b5ad5a09ad0002e2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49395-cwe-79-improper-neutralization-of-i-a367bc82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49395%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Icons&amp;severity=null&amp;id=68a584b5ad5a09ad0002e2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49396-cwe-862-missing-authorization-in-th-cfe87ffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49396%3A%20Missing%20Authorization%20in%20themifyme%20Themify%20Builder&amp;severity=null&amp;id=68a584b5ad5a09ad0002e300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49397-cwe-79-improper-neutralization-of-i-79c8ab2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49397%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Colorbox%20Lightbox&amp;severity=null&amp;id=68a584b5ad5a09ad0002e303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49399-cwe-352-cross-site-request-forgery--f2e907a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49399%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Basix%20NEX-Forms&amp;severity=null&amp;id=68a584b5ad5a09ad0002e306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49400-cwe-79-improper-neutralization-of-i-1a317618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49406-cwe-862-missing-authorization-in-fa-05919a4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49406%3A%20CWE-862%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49408-cwe-201-insertion-of-sensitive-info-ea3971b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49408%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPDeveloper%20Templately&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28977-cwe-79-improper-neutralization-of-i-a80eaf98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68a584b3ad5a09ad0002e285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30975-cwe-94-improper-control-of-generati-9c4e064c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30975%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SaifuMak%20Add%20Custom%20Codes&amp;severity=null&amp;id=68a584b3ad5a09ad0002e288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47650-cwe-22-improper-limitation-of-a-pat-d33c1a48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47650%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=68a584b3ad5a09ad0002e28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49409-cwe-79-improper-neutralization-of-i-df7b43b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brewlabs%20SensorPress&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49410-cwe-79-improper-neutralization-of-i-5d337261</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Emu%20TC%20Testimonials&amp;severity=medium&amp;id=68a584b5ad5a09ad0002e315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49411-cwe-79-improper-neutralization-of-i-9d9b51d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Sharma%20iFrame%20Block&amp;severity=medium&amp;id=68a584b6ad5a09ad0002e322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49412-cwe-79-improper-neutralization-of-i-a5512f04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49412%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20numixtech%20Page%20Transition&amp;severity=null&amp;id=68a584b6ad5a09ad0002e325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49413-cwe-79-improper-neutralization-of-i-8257e265</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49413%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=68a584b6ad5a09ad0002e328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49420-cwe-79-improper-neutralization-of-i-efc6348a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Ultra%20Portfolio&amp;severity=null&amp;id=68a584b6ad5a09ad0002e32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49422-cwe-79-improper-neutralization-of-i-65de19cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49422%3A%20Incorrect%20Privilege%20Assignment%20in%20themepassion%20Support%20Ticket&amp;severity=null&amp;id=68a584b6ad5a09ad0002e32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49424-cwe-79-improper-neutralization-of-i-7ec294fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepassion%20Support%20Ticket&amp;severity=null&amp;id=68a584b6ad5a09ad0002e331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49426-cwe-352-cross-site-request-forgery--6331b469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49426%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dahz%20Kitring&amp;severity=null&amp;id=68a584b6ad5a09ad0002e334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49428-cwe-79-improper-neutralization-of-i-d3849e31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dourou%20Cookie%20Warning&amp;severity=medium&amp;id=68a584b6ad5a09ad0002e337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49434-cwe-79-improper-neutralization-of-i-8def67fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49434%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Cars4Rent&amp;severity=null&amp;id=68a584b6ad5a09ad0002e33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49436-cwe-79-improper-neutralization-of-i-dbe3cef7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CocoBasic%20Anotte&amp;severity=null&amp;id=68a584b6ad5a09ad0002e33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49438-cwe-502-deserialization-of-untruste-baefe48c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49438%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Max%20Chirkov%20Simple%20Login%20Log&amp;severity=high&amp;id=68a584b6ad5a09ad0002e34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49889-cwe-79-improper-neutralization-of-i-b3fefb6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Edge-Themes%20Edge%20CPT&amp;severity=null&amp;id=68a584b6ad5a09ad0002e34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49890-cwe-79-improper-neutralization-of-i-2ebae4f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49890%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Organic%20Beauty&amp;severity=null&amp;id=68a584b6ad5a09ad0002e350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49891-cwe-79-improper-neutralization-of-i-af85bd47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49891%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20uxper%20Uxper%20Booking&amp;severity=null&amp;id=68a584b6ad5a09ad0002e353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49892-cwe-79-improper-neutralization-of-i-23a25d5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49892%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Uxper%20Booking&amp;severity=null&amp;id=68a584b6ad5a09ad0002e356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49893-cwe-79-improper-neutralization-of-i-c912c060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxper%20Nuss&amp;severity=null&amp;id=68a584b6ad5a09ad0002e359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49894-cwe-79-improper-neutralization-of-i-d3600bef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20uxper%20Nuss&amp;severity=null&amp;id=68a584b6ad5a09ad0002e35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49896-cwe-352-cross-site-request-forgery--df3c7bf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49896%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptasker%20WP%20Discord%20Post%20Plus%20%26%238211%3B%20%20Supports%20Unlimited%20Channels&amp;severity=medium&amp;id=68a584b6ad5a09ad0002e35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48142-cwe-266-incorrect-privilege-assignm-e05ec915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48142%3A%20Incorrect%20Privilege%20Assignment%20in%20Saad%20Iqbal%20Bookify&amp;severity=null&amp;id=68a584b3ad5a09ad0002e28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48148-cwe-434-unrestricted-upload-of-file-75565ab9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48148%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StoreKeeper%20B.V.%20StoreKeeper%20for%20WooCommerce&amp;severity=null&amp;id=68a584b3ad5a09ad0002e291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48149-cwe-98-improper-control-of-filename-0bc9e9ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48149%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dedalx%20Cook%26Meal&amp;severity=null&amp;id=68a584b3ad5a09ad0002e294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48151-cwe-79-improper-neutralization-of-i-b0ed3c0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48151%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Map%20Locations&amp;severity=null&amp;id=68a584b3ad5a09ad0002e297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48152-cwe-79-improper-neutralization-of-i-a9edc767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48152%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dimafreund%20Rentsyst&amp;severity=null&amp;id=68a584b3ad5a09ad0002e29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48154-cwe-79-improper-neutralization-of-i-4277f410</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48154%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Multimedia%20Playlist%20Slider%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b3ad5a09ad0002e29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48157-cwe-98-improper-control-of-filename-5d61fec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48157%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Michele%20Giorgi%20Formality&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48158-cwe-22-improper-limitation-of-a-pat-ca1fde6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48158%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alex%20Githatu%20BuddyPress%20XProfile%20Custom%20Image%20Field&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48159-cwe-79-improper-neutralization-of-i-de50b3eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48159%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Youtube%20Vimeo%20Video%20Player%20and%20Slider%20WP%20Plugin&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48160-cwe-98-improper-control-of-filename-3c9169ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48160%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CocoBasic%20Caliris&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48162-cwe-79-improper-neutralization-of-i-ce2b6aa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48162%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20Simple%20Business%20Directory%20Pro&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48163-cwe-79-improper-neutralization-of-i-d9337f07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48163%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20SHOUT%20-%20HTML5%20Radio%20Player%20With%20Ads%20-%20ShoutCast%20and%20IceCast%20Support&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48164-cwe-266-incorrect-privilege-assignm-ba882936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48164%3A%20Incorrect%20Privilege%20Assignment%20in%20Brainstorm%20Force%20SureDash&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48165-cwe-266-incorrect-privilege-assignm-073033d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48165%3A%20Incorrect%20Privilege%20Assignment%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48168-cwe-79-improper-neutralization-of-i-2ad27012</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48168%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Apollo%20-%20Sticky%20Full%20Width%20HTML5%20Audio%20Player&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48169-cwe-94-improper-control-of-generati-5f5136eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48169%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jordy%20Meow%20Code%20Engine&amp;severity=null&amp;id=68a584b3ad5a09ad0002e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48170-cwe-79-improper-neutralization-of-i-b876c56f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48170%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player%20-%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48171-cwe-98-improper-control-of-filename-bced40c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48171%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Cena%20Store&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48296-cwe-79-improper-neutralization-of-i-70d3794c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20UpStore&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48297-cwe-79-improper-neutralization-of-i-7b9b95fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48298-cwe-98-improper-control-of-filename-7a1f59cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48298%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Benjamin%20Denis%20SEOPress%20for%20MainWP&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48302-cwe-98-improper-control-of-filename-94436861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48302%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Roxnor%20FundEngine&amp;severity=null&amp;id=68a584b4ad5a09ad0002e2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53194-cwe-1336-improper-neutralization-of-7fd0f38b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53194%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=68a584b6ad5a09ad0002e362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53195-cwe-79-improper-neutralization-of-i-252f66c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53195%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=68a584b6ad5a09ad0002e365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53196-cwe-201-insertion-of-sensitive-info-533f10d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53196%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=68a584b7ad5a09ad0002e372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53198-cwe-98-improper-control-of-filename-3cd6d1d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53198%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20favethemes%20Houzez&amp;severity=null&amp;id=68a584b7ad5a09ad0002e375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53201-cwe-79-improper-neutralization-of-i-779b9f0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53201%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=68a584b7ad5a09ad0002e378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53204-cwe-98-improper-control-of-filename-6edc9724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53204%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20eventlist&amp;severity=null&amp;id=68a584b7ad5a09ad0002e37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53205-cwe-79-improper-neutralization-of-i-f4f2ceb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53205%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Radio%20Player%20Shoutcast%20%26%20Icecast&amp;severity=null&amp;id=68a584b7ad5a09ad0002e37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53207-cwe-98-improper-control-of-filename-8f7713d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53207%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Travel%20WP%20Travel%20Gutenberg%20Blocks&amp;severity=null&amp;id=68a584b7ad5a09ad0002e381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53208-cwe-639-authorization-bypass-throug-72907cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53208%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20paymayapg%20Maya%20Business&amp;severity=null&amp;id=68a584b7ad5a09ad0002e384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53210-cwe-98-improper-control-of-filename-0563f5cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53210%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bdthemes%20ZoloBlocks&amp;severity=null&amp;id=68a584b7ad5a09ad0002e387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53212-cwe-79-improper-neutralization-of-i-d14248eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53212%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Revolution%20Video%20Player%20With%20Bottom%20Playlist&amp;severity=null&amp;id=68a584b7ad5a09ad0002e38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53213-cwe-434-unrestricted-upload-of-file-577045ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53213%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ELEXtensions%20ReachShip%20WooCommerce%20Multi-Carrier%20%26%20Conditional%20Shipping&amp;severity=null&amp;id=68a584b7ad5a09ad0002e38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53226-cwe-79-improper-neutralization-of-i-3fcb0d36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53226%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20Comments%20Capcha%20Box&amp;severity=null&amp;id=68a584b8ad5a09ad0002e39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53299-cwe-502-deserialization-of-untruste-375d29e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53299%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeMakers%20ThemeMakers%20Visual%20Content%20Composer&amp;severity=null&amp;id=68a584b8ad5a09ad0002e39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53319-cwe-79-improper-neutralization-of-i-8e8868d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Raptive%20Raptive%20Ads&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53559-cwe-79-improper-neutralization-of-i-d847c75b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player%20-%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53560-cwe-502-deserialization-of-untruste-55c94e0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53560%3A%20Deserialization%20of%20Untrusted%20Data%20in%20rascals%20Noisa&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53561-cwe-35-path-traversal-in-miniorange-20474bfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53561%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20miniOrange%20Prevent%20files%20%2F%20folders%20access&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53562-cwe-79-improper-neutralization-of-i-aef43500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player%20-%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53563-cwe-79-improper-neutralization-of-i-3aecf3a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Youtube%20Vimeo%20Video%20Player%20and%20Slider&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53564-cwe-79-improper-neutralization-of-i-bfee2ea3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20HTML5%20Radio%20Player%20-%20WPBakery%20Page%20Builder%20Addon&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53565-cwe-98-improper-control-of-filename-c6a5c495</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53565%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Widget%20for%20Google%20Reviews&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53567-cwe-98-improper-control-of-filename-8d45ee76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53567%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nK%20Ghost%20Kit&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53577-cwe-94-improper-control-of-generati-b9c785f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53577%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20thehp%20Global%20DNS&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53580-cwe-266-incorrect-privilege-assignm-b3779a9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53580%3A%20Incorrect%20Privilege%20Assignment%20in%20quantumcloud%20Simple%20Business%20Directory%20Pro&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53983-cwe-201-insertion-of-sensitive-info-48a68b16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53983%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53985-cwe-201-insertion-of-sensitive-info-ef17f3f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53985%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53987-cwe-201-insertion-of-sensitive-info-81d82e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53987%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetMenu&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53988-cwe-201-insertion-of-sensitive-info-3b59b5a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53988%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53992-cwe-201-insertion-of-sensitive-info-2a82cfc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53992%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetTricks&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53993-cwe-201-insertion-of-sensitive-info-eb2fa6d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53993%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53998-cwe-201-insertion-of-sensitive-info-a8171cf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53998%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetWooBuilder&amp;severity=null&amp;id=68a584b8ad5a09ad0002e3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54007-cwe-502-deserialization-of-untruste-1ba5b548</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54007%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54008-cwe-201-insertion-of-sensitive-info-8e8ab351</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54008%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Crocoblock%20JetSmartFilters&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54012-cwe-502-deserialization-of-untruste-ef712ac0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54012%3A%20Deserialization%20of%20Untrusted%20Data%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54014-cwe-502-deserialization-of-untruste-4ffe7323</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54014%3A%20Deserialization%20of%20Untrusted%20Data%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54017-cwe-98-improper-control-of-filename-eccb05e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54017%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54019-cwe-94-improper-control-of-generati-f265dcce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54019%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54021-cwe-22-improper-limitation-of-a-pat-7580bb20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54021%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54025-cwe-862-missing-authorization-in-el-41bdf055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54025%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=68a584b9ad5a09ad0002e3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54027-cwe-79-improper-neutralization-of-i-348cc15e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=null&amp;id=68a584b9ad5a09ad0002e402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54028-cwe-98-improper-control-of-filename-f9409617</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54028%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20CF7%20WOW%20Styler&amp;severity=null&amp;id=68a584b9ad5a09ad0002e405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54031-cwe-98-improper-control-of-filename-93ecef9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54031%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=null&amp;id=68a584baad5a09ad0002e412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54032-cwe-79-improper-neutralization-of-i-6af23a84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodingPlace%20Real%20Estate%20Manager%20Pro&amp;severity=null&amp;id=68a584baad5a09ad0002e415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54034-cwe-98-improper-control-of-filename-162f197e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54034%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=68a584baad5a09ad0002e418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54040-cwe-862-missing-authorization-in-we-622e7764</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54040%3A%20Missing%20Authorization%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=null&amp;id=68a584baad5a09ad0002e41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54044-cwe-79-improper-neutralization-of-i-0d92da05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20_CreativeMedia_%20Elite%20Video%20Player&amp;severity=null&amp;id=68a584baad5a09ad0002e41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54046-cwe-79-improper-neutralization-of-i-9286c06c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20Cost%20Calculator&amp;severity=null&amp;id=68a584baad5a09ad0002e421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54048-cwe-89-improper-neutralization-of-s-b1e3881b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54048%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20miniOrange%20Custom%20API%20for%20WP&amp;severity=null&amp;id=68a584baad5a09ad0002e424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54049-cwe-266-incorrect-privilege-assignm-99b967c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54049%3A%20Incorrect%20Privilege%20Assignment%20in%20miniOrange%20Custom%20API%20for%20WP&amp;severity=null&amp;id=68a584baad5a09ad0002e427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54052-cwe-352-cross-site-request-forgery--58f27a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54052%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Realtyna%20Realtyna%20Organic%20IDX%20plugin&amp;severity=null&amp;id=68a584baad5a09ad0002e42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54053-cwe-502-deserialization-of-untruste-6c276642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54053%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=68a584baad5a09ad0002e42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54055-cwe-79-improper-neutralization-of-i-1658974b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skygroup%20Druco&amp;severity=null&amp;id=68a584baad5a09ad0002e43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54056-cwe-79-improper-neutralization-of-i-a4c374e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Responsive%20HTML5%20Audio%20Player%20PRO%20With%20Playlist&amp;severity=null&amp;id=68a584baad5a09ad0002e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54670-cwe-79-improper-neutralization-of-i-b951e1ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=null&amp;id=68a584baad5a09ad0002e440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54677-cwe-434-unrestricted-upload-of-file-2e8b2669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54677%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=68a584baad5a09ad0002e443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54713-cwe-288-authentication-bypass-using-924bb8a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54713%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20magepeopleteam%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68a584baad5a09ad0002e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54726-cwe-89-improper-neutralization-of-s-ed8d567a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54726%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Miguel%20Useche%20JS%20Archive%20List&amp;severity=null&amp;id=68a584baad5a09ad0002e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54735-cwe-266-incorrect-privilege-assignm-137e9ce2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54735%3A%20Incorrect%20Privilege%20Assignment%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=68a584baad5a09ad0002e44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54750-cwe-98-improper-control-of-filename-5680da6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54750%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=null&amp;id=68a584baad5a09ad0002e44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55715-cwe-201-insertion-of-sensitive-info-62751339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55715%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Themeisle%20Otter%20-%20Gutenberg%20Block&amp;severity=null&amp;id=68a584baad5a09ad0002e452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9225-cwe-79-improper-neutralization-of-in-43f77a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=68a57a1fad5a09ad000280ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9202-cwe-862-missing-authorization-in-the-c575b052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9202%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20ColorMag&amp;severity=medium&amp;id=68a56f93ad5a09ad00020ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54551-external-control-of-assumed-immutab-44fd45ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54551%3A%20External%20control%20of%20assumed-Immutable%20web%20parameter%20in%20FUJIFILM%20Healthcare%20Americas%20Corporation%20Synapse%20Mobility&amp;severity=medium&amp;id=68a60a48ad5a09ad00077263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8618-cwe-79-improper-neutralization-of-in-2604565e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Quick%20View%20for%20WooCommerce&amp;severity=medium&amp;id=68a54fefad5a09ad0000e0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55706-url-redirection-to-untrusted-site-o-66290f27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55706%3A%20URL%20redirection%20to%20untrusted%20site%20(&apos;Open%20Redirect&apos;)%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68a54fefad5a09ad0000e0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53522-use-of-less-trusted-source-in-six-a-645f34ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53522%3A%20Use%20of%20less%20trusted%20source%20in%20Six%20Apart%20Ltd.%20Movable%20Type%20(Software%20Edition)&amp;severity=medium&amp;id=68a54fefad5a09ad0000e0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57791-cwe-88-improper-neutralization-of-a-e523433d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57791%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20in%20Commvault%20CommCell&amp;severity=medium&amp;id=68a54563ad5a09ad000085d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57790-cwe-36-absolute-path-traversal-in-c-4897ffc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57790%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Commvault%20CommCell&amp;severity=high&amp;id=68a54563ad5a09ad000085d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57789-cwe-257-storing-passwords-in-a-reco-cc793086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57789%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Commvault%20CommCell&amp;severity=medium&amp;id=68a54563ad5a09ad000085cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8141-cwe-22-improper-limitation-of-a-path-fd980da4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8141%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=68a533d0ad5a09ad00ff4062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8289-cwe-502-deserialization-of-untrusted-b15f4b3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8289%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=68a533d0ad5a09ad00ff406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8145-cwe-502-deserialization-of-untrusted-76a165a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8145%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeisle%20Redirection%20for%20Contact%20Form%207&amp;severity=high&amp;id=68a533d0ad5a09ad00ff4066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9132-out-of-bounds-write-in-google-chrome-a96fb6d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9132%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=68a5223bad5a09ad00fe0ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9193-open-redirect-in-totvs-portal-meu-rh-30d287a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9193%3A%20Open%20Redirect%20in%20TOTVS%20Portal%20Meu%20RH&amp;severity=medium&amp;id=68a5142bad5a09ad00fc988d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-20-1fe34a48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-20&amp;severity=medium&amp;id=68a6659ead5a09ad0009cd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50902-na-6b1cb2cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50902%3A%20n%2Fa&amp;severity=high&amp;id=68a61f5bad5a09ad00082406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55444-na-cd76c755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55444%3A%20n%2Fa&amp;severity=critical&amp;id=68a5ffd7ad5a09ad000736c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28041-na-f4f89031</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28041%3A%20n%2Fa&amp;severity=high&amp;id=68a5ffd7ad5a09ad000736bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50904-na-063ceeea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50904%3A%20n%2Fa&amp;severity=critical&amp;id=68a5ffd7ad5a09ad000736b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50901-na-bd561d2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50901%3A%20n%2Fa&amp;severity=critical&amp;id=68a5fc57ad5a09ad00071a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50864-na-2a938279</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50864%3A%20n%2Fa&amp;severity=medium&amp;id=68a5e397ad5a09ad0005f17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51991-na-83892187</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51991%3A%20n%2Fa&amp;severity=high&amp;id=68a5e397ad5a09ad0005f17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51990-na-5c940b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51990%3A%20n%2Fa&amp;severity=medium&amp;id=68a5e397ad5a09ad0005f178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55482-na-42aa8505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55482%3A%20n%2Fa&amp;severity=high&amp;id=68a5e015ad5a09ad00057752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55498-na-243bc61f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55498%3A%20n%2Fa&amp;severity=high&amp;id=68a5e015ad5a09ad0005774c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55499-na-401c6d6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55499%3A%20n%2Fa&amp;severity=medium&amp;id=68a5d90cad5a09ad00052e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55483-na-dbfc7623</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55483%3A%20n%2Fa&amp;severity=high&amp;id=68a5d58ead5a09ad00052206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55503-na-dad26c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55503%3A%20n%2Fa&amp;severity=high&amp;id=68a5d214ad5a09ad000516a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50503-na-75494447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50503%3A%20n%2Fa&amp;severity=high&amp;id=68a5ce7fad5a09ad00050951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57788-cwe-259-use-of-hard-coded-password--068d693f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57788%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Commvault%20CommCell&amp;severity=medium&amp;id=68a54563ad5a09ad000085d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54364-cwe-1333-inefficient-regular-expres-4ecfe59c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54364%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Microsoft%20Knack&amp;severity=medium&amp;id=68a53ad7ad5a09ad00ffc756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54363-cwe-1333-inefficient-regular-expres-973b6493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54363%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Microsoft%20Knack&amp;severity=medium&amp;id=68a53ad7ad5a09ad00ffc752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9176-os-command-injection-in-neurobin-shc-81ad5393</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9176%3A%20OS%20Command%20Injection%20in%20neurobin%20shc&amp;severity=medium&amp;id=68a50d23ad5a09ad00fc6c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9175-stack-based-buffer-overflow-in-neuro-3c84414c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9175%3A%20Stack-based%20Buffer%20Overflow%20in%20neurobin%20shc&amp;severity=medium&amp;id=68a5061bad5a09ad00fc4945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9174-os-command-injection-in-neurobin-shc-8becafc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9174%3A%20OS%20Command%20Injection%20in%20neurobin%20shc&amp;severity=medium&amp;id=68a4ff14ad5a09ad00fc17b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9171-cross-site-scripting-in-solidinvoice-2d2bee06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9171%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4ff14ad5a09ad00fc17ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-exposes-zero-day-clickjacking-vulnerabi-3832911f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Exposes%20Zero-Day%20Clickjacking%20Vulnerabilities%20in%20Major%20Password%20Managers&amp;severity=critical&amp;id=68a4fb95ad5a09ad00fc016a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9170-cross-site-scripting-in-solidinvoice-5259ea04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9170%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4f80bad5a09ad00fbeb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/noodlophile-stealer-evolves-targeted-copyright-phi-e83ea269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Noodlophile%20Stealer%20Evolves%3A%20Targeted%20Copyright%20Phishing%20Hits%20Enterprises%20with%20Social%20Media%20Footprints&amp;severity=medium&amp;id=68a4f487ad5a09ad00fbd6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9169-cross-site-scripting-in-solidinvoice-8408aeae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9169%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4f10ead5a09ad00fbbd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9168-cross-site-scripting-in-solidinvoice-ec8eca57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9168%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4e9fbad5a09ad00fb71ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55033-drag-and-drop-gestures-in-focus-for-9258d444</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55033%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55032-focus-incorrectly-ignores-content-d-06d57941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55032%3A%20Vulnerability%20in%20Mozilla%20Focus%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55029-malicious-scripts-could-spam-popups-d87223be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55029%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=high&amp;id=68a4e678ad5a09ad00fb5d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55031-passkey-phishing-within-bluetooth-r-c9ca8c63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55031%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=68a4e678ad5a09ad00fb5d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55028-javascript-alerts-could-impede-ui-i-3b744bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55028%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55030-content-disposition-headers-incorre-ca5c63e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55030%3A%20Vulnerability%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54145-scanning-a-malicious-url-utilizing--844e9562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54145%3A%20Scanning%20a%20malicious%20URL%20utilizing%20Firefox&apos;s%20open-text%20scheme%20with%20the%20QR%20code%20scanner%20could%20load%20arbitrary%20websites%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=68a4e678ad5a09ad00fb5d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54144-internal-firefox-open-text-url-sche-880faa28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54144%3A%20Internal%20Firefox%20open-text%20URL%20scheme%20allowed%20loading%20of%20arbitrary%20URLs%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54143-sandboxed-iframes-could-allow-local-c87c76be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54143%3A%20Sandboxed%20iframes%20could%20allow%20local%20downloads%20despite%20sandbox%20restrictions%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=critical&amp;id=68a4e678ad5a09ad00fb5d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8364-address-bar-spoofing-using-an-blob-u-7f74d063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8364%3A%20Address%20bar%20spoofing%20using%20an%20blob%20URI%20on%20Firefox%20for%20Android%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e679ad5a09ad00fb5db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8042-sandboxed-iframe-could-start-downloa-87166baa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8042%3A%20Sandboxed%20iframe%20could%20start%20downloads%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68a4e679ad5a09ad00fb5dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8041-incorrect-url-truncation-in-firefox--af8b74dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8041%3A%20Incorrect%20URL%20truncation%20in%20Firefox%20for%20Android%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e678ad5a09ad00fb5da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9184-memory-safety-bugs-fixed-in-firefox--1c41a3b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9184%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faecb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9187-memory-safety-bugs-fixed-in-firefox--f559e661</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9187%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68a4e2f4ad5a09ad00faecc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9183-spoofing-issue-in-the-address-bar-co-86f575f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9183%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9182-denial-of-service-due-to-out-of-memo-4f8d64fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9182%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faeca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9186-spoofing-issue-in-the-address-bar-co-1843d9fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9186%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9185-memory-safety-bugs-fixed-in-firefox--34ae1c2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9185%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faecb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9181-uninitialized-memory-in-the-javascri-7319d05c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9181%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9180-same-origin-policy-bypass-in-the-gra-c1f01ba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9180%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=68a4e2f4ad5a09ad00faec91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9179-sandbox-escape-due-to-invalid-pointe-b0aea5dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9179%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68a4e2f4ad5a09ad00faec87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9167-cross-site-scripting-in-solidinvoice-bd82c16e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9167%3A%20Cross%20Site%20Scripting%20in%20SolidInvoice&amp;severity=medium&amp;id=68a4e2f4ad5a09ad00faec80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9165-memory-leak-in-libtiff-c396b4f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9165%3A%20Memory%20Leak%20in%20LibTIFF&amp;severity=low&amp;id=68a4dbedad5a09ad00fac866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9157-use-after-free-in-appneta-tcpreplay-7b3dcdeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9157%3A%20Use%20After%20Free%20in%20appneta%20tcpreplay&amp;severity=medium&amp;id=68a4dbedad5a09ad00fac85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55740-cwe-1392-use-of-default-credentials-4781dfac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55740%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Anipaleja%20nginx-defender&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/noodlophile-stealer-evolution-security-affairs-d191dcb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Noodlophile%20Stealer%20evolution%20-%20Security%20Affairs&amp;severity=medium&amp;id=68a4d867ad5a09ad00fab11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43744-cwe-79-cross-site-scripting-in-life-ddfe7031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43744%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4d4e5ad5a09ad00fa972e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9156-sql-injection-in-itsourcecode-sports-5ed587ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9156%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=68a4d4e5ad5a09ad00fa9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9155-sql-injection-in-itsourcecode-online-236a5194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9155%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68a4d4e5ad5a09ad00fa9731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2988-cwe-497-exposure-of-sensitive-system-a568ebdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2988%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=low&amp;id=68a4d162ad5a09ad00fa857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43743-cwe-203-observable-discrepancy-in-l-c700842b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43743%3A%20CWE-203%20Observable%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55737-cwe-639-authorization-bypass-throug-18d3e876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55737%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20DogukanUrker%20FlaskBlog&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55736-cwe-425-direct-request-forced-brows-bc48bc69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55736%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20DogukanUrker%20FlaskBlog&amp;severity=critical&amp;id=68a4cddcad5a09ad00fa75f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33008-cwe-79-improper-neutralization-of-i-cb3ff364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9154-sql-injection-in-itsourcecode-online-013afd04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9154%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68a4cddcad5a09ad00fa75fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55735-cwe-79-improper-neutralization-of-i-608d9657</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55735%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DogukanUrker%20FlaskBlog&amp;severity=medium&amp;id=68a4ca58ad5a09ad00fa40f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elastic-rejects-claims-of-a-zero-day-rce-flaw-in-d-388bf4d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elastic%20rejects%20claims%20of%20a%20zero-day%20RCE%20flaw%20in%20Defend%20EDR&amp;severity=critical&amp;id=68a4c6d3ad5a09ad00fa2833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apache-activemq-flaw-exploited-to-deploy-dripdropp-eb3bef29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apache%20ActiveMQ%20Flaw%20Exploited%20to%20Deploy%20DripDropper%20Malware%20on%20Cloud%20Linux%20Systems&amp;severity=high&amp;id=68a4c6d3ad5a09ad00fa2837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43745-cwe-352-cross-site-request-forgery--7c1d8207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43745%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4c6efad5a09ad00fa2970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55734-cwe-862-missing-authorization-in-do-84e603fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55734%3A%20CWE-862%3A%20Missing%20Authorization%20in%20DogukanUrker%20FlaskBlog&amp;severity=medium&amp;id=68a4c6efad5a09ad00fa2973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9153-unrestricted-upload-in-itsourcecode--4f035ac0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9153%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=68a4c6efad5a09ad00fa2977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55733-cwe-94-improper-control-of-generati-9df783aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55733%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThinkInAIXYZ%20deepchat&amp;severity=critical&amp;id=68a4c34fad5a09ad00fa175d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55306-cwe-522-insufficiently-protected-cr-e9277d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55306%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Mouy-leng%20GenX_FX&amp;severity=critical&amp;id=68a4c34fad5a09ad00fa175a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43737-cwe-79-cross-site-scripting-in-life-6dd102e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43737%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa098e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31988-cwe-79-improper-neutralization-of-i-1d970810</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20Digital%20Experience&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa098b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55303-cwe-79-improper-neutralization-of-i-29747905</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55303%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa0991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-incidents-in-japan-during-the-first-hal-6aea147f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20incidents%20in%20Japan%20during%20the%20first%20half%20of%202025&amp;severity=medium&amp;id=68a4ed7fad5a09ad00fba94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9151-improper-authorization-in-liuyuyang0-6cf88dfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9151%3A%20Improper%20Authorization%20in%20LiuYuYang01%20ThriveX-Blog&amp;severity=medium&amp;id=68a4bfcbad5a09ad00fa0998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8450-cwe-434-unrestricted-upload-of-file--fce9e435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8450%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Fortra%20FileCatalyst&amp;severity=high&amp;id=68a4bfcbad5a09ad00fa0995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55295-cwe-22-improper-limitation-of-a-pat-128fdde5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55295%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20StuffAnThings%20qbit_manage&amp;severity=medium&amp;id=68a4bc48ad5a09ad00f9e49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55294-cwe-77-improper-neutralization-of-s-2a21a368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55294%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20bencevans%20screenshot-desktop&amp;severity=critical&amp;id=68a4b8c3ad5a09ad00f992b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9150-sql-injection-in-surbowl-dormitory-m-4c746761</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9150%3A%20SQL%20Injection%20in%20Surbowl%20dormitory-management-php&amp;severity=medium&amp;id=68a4b8c3ad5a09ad00f992c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9149-command-injection-in-wavlink-wl-nu51-6fed7dd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9149%3A%20Command%20Injection%20in%20Wavlink%20WL-NU516U1&amp;severity=medium&amp;id=68a4b8c3ad5a09ad00f992b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salty-2fa-undetected-phaas-hitting-us-and-eu-indus-71abc5fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salty%202FA%3A%20Undetected%20PhaaS%20Hitting%20US%20and%20EU%20Industries&amp;severity=medium&amp;id=68a4ed7fad5a09ad00fba95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legitimate-chrome-vpn-extension-turns-to-browser-s-55648dc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legitimate%20Chrome%20VPN%20Extension%20Turns%20to%20Browser%20Spyware&amp;severity=medium&amp;id=68a4e9fbad5a09ad00fb7145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54881-cwe-79-improper-neutralization-of-i-d6e48c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54881%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mermaid-js%20mermaid&amp;severity=medium&amp;id=68a4b1bfad5a09ad00f9671f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38611-ae7ba5b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38611&amp;severity=null&amp;id=68bb425f535f4a97730e4932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38603-dd4a4ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38603&amp;severity=null&amp;id=68ba9a023d5df491ae76f9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9148-sql-injection-in-codephiliax-chat2db-25608dd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9148%3A%20SQL%20Injection%20in%20CodePhiliaX%20Chat2DB&amp;severity=medium&amp;id=68a4b1bfad5a09ad00f96724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54880-cwe-79-improper-neutralization-of-i-4c4f286a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54880%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mermaid-js%20mermaid&amp;severity=medium&amp;id=68a4ae37ad5a09ad00f95597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pharma-firm-inotiv-says-ransomware-attack-impacted-8580439f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pharma%20firm%20Inotiv%20says%20ransomware%20attack%20impacted%20operations&amp;severity=high&amp;id=68a4aab2ad5a09ad00f93f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-godrat-trojan-targets-trading-firms-using-steg-15a8f841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GodRAT%20Trojan%20Targets%20Trading%20Firms%20Using%20Steganography%20and%20Gh0st%20RAT%20Code&amp;severity=high&amp;id=68a4aab2ad5a09ad00f93f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52478-cwe-79-improper-neutralization-of-i-636800fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52478%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=high&amp;id=68a4aacfad5a09ad00f93fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9147-cross-site-scripting-in-jasonclark-g-e20b89ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9147%3A%20Cross%20Site%20Scripting%20in%20jasonclark%20getsemantic&amp;severity=medium&amp;id=68a4aacfad5a09ad00f93fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/enumerating-aws-the-quiet-way-cloudtrail-free-disc-93308dcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Enumerating%20AWS%20the%20quiet%20way%3A%20CloudTrail-free%20discovery%20with%20Resource%20Explorer%20%7C%20Datadog%20Security%20Labs&amp;severity=medium&amp;id=68a4a3b0ad5a09ad00f91341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/july-2025-apt-attack-trends-report-south-korea-52710ecd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=July%202025%20APT%20Attack%20Trends%20Report%20(South%20Korea)&amp;severity=medium&amp;id=68a4e9fbad5a09ad00fb714a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9146-risky-cryptographic-algorithm-in-lin-b0356cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9146%3A%20Risky%20Cryptographic%20Algorithm%20in%20Linksys%20E5600&amp;severity=high&amp;id=68a4a3aaad5a09ad00f91320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-exploited-coderabbit-from-a-simple-pr-to-rc-eaab3a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20We%20Exploited%20CodeRabbit%3A%20From%20a%20Simple%20PR%20to%20RCE%20and%20Write%20Access%20on%201M%20Repositories&amp;severity=medium&amp;id=68a4a02cad5a09ad00f8f763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43738-cwe-79-cross-site-scripting-in-life-230e24e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43738%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a4a026ad5a09ad00f8f754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9145-cross-site-scripting-in-scada-lts-3b80067a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9145%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a4991ead5a09ad00f8cfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9144-cross-site-scripting-in-scada-lts-4bf00f24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9144%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a4959aad5a09ad00f8b3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9143-cross-site-scripting-in-scada-lts-42522452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9143%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a4959aad5a09ad00f8b3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-the-false-false-positive-how-to-distinguish-ffe41de5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20the%20false%20false-positive%3A%20how%20to%20distinguish%20HTTP%20pipelining%20from%20request%20smuggling&amp;severity=medium&amp;id=68a48eadad5a09ad00f88721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citizen-lab-reports-hidden-vpn-networks-sharing-ow-c1f2eb85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citizen%20Lab%20Reports%20Hidden%20VPN%20Networks%20Sharing%20Ownership%20and%20Security%20Flaws&amp;severity=medium&amp;id=68a48e91ad5a09ad00f886b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ny-business-council-discloses-data-breach-affectin-4c88dc77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NY%20Business%20Council%20discloses%20data%20breach%20affecting%2047%2C000%20people&amp;severity=high&amp;id=68a48e91ad5a09ad00f886ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43739-cwe-203-observable-discrepancy-in-l-3b724887</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43739%3A%20CWE-203%20Observable%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a48405ad5a09ad00f845d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45062-cwe-121-stack-based-buffer-overflow-fae4943d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45062%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OpenPrinting%20ippusbxd&amp;severity=medium&amp;id=6909084f7fff0e30cee2352a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9140-sql-injection-in-shanghai-lingdang-i-209264a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9140%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=68a48084ad5a09ad00f82386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4690-cwe-1333-inefficient-regular-express-f369ae6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4690%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Google%20AngularJS&amp;severity=medium&amp;id=68a47cffad5a09ad00f80eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4046-cwe-862-missing-authorization-in-lex-39c5dd7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4046%3A%20CWE-862%20Missing%20Authorization%20in%20Lexmark%20Lexmark%20Cloud%20Services&amp;severity=high&amp;id=68a47cffad5a09ad00f80eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4044-cwe-611-improper-restriction-of-xml--5e0df7d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4044%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lexmark%20Universal%20Print%20Driver&amp;severity=high&amp;id=68a47cffad5a09ad00f80eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43740-cwe-79-cross-site-scripting-in-life-64935ebc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43740%3A%20CWE-79%3A%20Cross-site%20Scripting%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a47979ad5a09ad00f7f09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9139-information-disclosure-in-scada-lts-d9335f6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9139%3A%20Information%20Disclosure%20in%20Scada-LTS&amp;severity=medium&amp;id=68a47979ad5a09ad00f7f0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/australian-isp-iinet-suffers-breach-of-280000-reco-29c25dcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Australian%20ISP%20iiNet%20Suffers%20Breach%20of%20280%2C000%2B%20Records&amp;severity=high&amp;id=68a475f4ad5a09ad00f7cd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9138-cross-site-scripting-in-scada-lts-6a86d8f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9138%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a47602ad5a09ad00f7ce7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9137-cross-site-scripting-in-scada-lts-2264e5cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9137%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68a46b68ad5a09ad00f76df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/96000-uk-police-bodycam-videos-lost-after-data-tra-472343d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=96%2C000%20UK%20Police%20Bodycam%20Videos%20Lost%20After%20Data%20Transfer%20Mishap&amp;severity=medium&amp;id=68a46460ad5a09ad00f6ea01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9136-out-of-bounds-read-in-libretro-retro-ab75af3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9136%3A%20Out-of-Bounds%20Read%20in%20libretro%20RetroArch&amp;severity=medium&amp;id=68a46468ad5a09ad00f6ea34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9135-improper-export-of-android-applicati-73a0b772</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9135%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Verkehrsauskunft%20%C3%96sterreich%20SmartRide&amp;severity=medium&amp;id=68a45d58ad5a09ad00f6b52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8783-cwe-79-improper-neutralization-of-in-a453d8f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kleor%20Contact%20Manager&amp;severity=medium&amp;id=68a45d58ad5a09ad00f6b529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trivial-c-random-exploitation-fa91c9ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trivial%20C%23%20Random%20Exploitation&amp;severity=high&amp;id=68a459d7ad5a09ad00f6a646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-evolution-of-the-pipemagic-malware-0949017e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20evolution%20of%20the%20PipeMagic%20malware&amp;severity=medium&amp;id=68a4564fad5a09ad00f67feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9134-improper-export-of-android-applicati-c7937028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9134%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20AfterShip%20Package%20Tracker%20App&amp;severity=medium&amp;id=68a47cffad5a09ad00f80ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-trend-micro-apex-one-flaw-to-its-know-16554c8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Trend%20Micro%20Apex%20One%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68a44137ad5a09ad00f4a548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-allianz-life-data-breach-impacts-11-millio-2292af5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Allianz%20Life%20data%20breach%20impacts%201.1%20million%20people&amp;severity=high&amp;id=68a44137ad5a09ad00f4a544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8567-cwe-79-improper-neutralization-of-in-c9b9d27c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20Nexter%20Blocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks%20%26%201000%2B%20Starter%20Templates&amp;severity=medium&amp;id=68a436abad5a09ad00f43fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41685-cwe-359-exposure-of-private-persona-12d327c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41685%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20SMA%20ennexos.sunnyportal.com&amp;severity=medium&amp;id=68a43327ad5a09ad00f42abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41689-cwe-306-missing-authentication-for--fd7241f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41689%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Wiesemann%20%26%20Theis%20Motherbox%203&amp;severity=high&amp;id=68a43327ad5a09ad00f42ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8622-cwe-79-improper-neutralization-of-in-363108d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webaware%20Flexible%20Map&amp;severity=medium&amp;id=68a4289bad5a09ad00f3caf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7654-cwe-200-exposure-of-sensitive-inform-45962b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7654%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=68a4289bad5a09ad00f3cae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7670-cwe-89-improper-neutralization-of-sp-52906876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7670%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20skatox%20JS%20Archive%20List&amp;severity=high&amp;id=68a4289bad5a09ad00f3caee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8723-cwe-94-improper-control-of-generatio-c6692009</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8723%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mecanik%20Cloudflare%20Image%20Resizing%20%E2%80%93%20Optimize%20%26%20Accelerate%20Your%20Images&amp;severity=critical&amp;id=68a4289bad5a09ad00f3cafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6758-cwe-269-improper-privilege-managemen-c6ba83fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6758%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20imithemes%20Real%20Spaces%20-%20WordPress%20Properties%20Directory%20Theme&amp;severity=critical&amp;id=68a48084ad5a09ad00f82390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8218-cwe-269-improper-privilege-managemen-25ab0284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8218%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20imithemes%20Real%20Spaces%20-%20WordPress%20Properties%20Directory%20Theme&amp;severity=high&amp;id=68a48084ad5a09ad00f82394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5417-incorrect-privilege-assignment-in-re-03dfc2ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5417%3A%20Incorrect%20Privilege%20Assignment%20in%20Red%20Hat%20Red%20Hat%20Developer%20Hub&amp;severity=medium&amp;id=68a401efad5a09ad00f237ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8357-cwe-862-missing-authorization-in-dgl-2dcbce08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8357%3A%20CWE-862%20Missing%20Authorization%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68a401efad5a09ad00f237be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7496-cwe-79-improper-neutralization-of-in-fc048c3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Compare%20for%20WooCommerce&amp;severity=medium&amp;id=68a3f3dfad5a09ad00f0c4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44373-na-63042a0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44373%3A%20n%2Fa&amp;severity=critical&amp;id=69306fa987f844e860799612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-19-b0bbbe9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-19&amp;severity=medium&amp;id=68a5141ead5a09ad00fc95d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51529-na-831940b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51529%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50579-na-751a237f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50579%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51543-na-6ec74ad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51543%3A%20n%2Fa&amp;severity=critical&amp;id=68a4d876ad5a09ad00fab180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50926-na-d72227ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50926%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d876ad5a09ad00fab17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52337-na-62519fe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52337%3A%20n%2Fa&amp;severity=medium&amp;id=68a4d162ad5a09ad00fa857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50891-na-002cd1f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Adform%20server-side%20backend%20for%20Site%20Tracking&amp;severity=high&amp;id=68a4cddcad5a09ad00fa75f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52338-na-e9105413</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52338%3A%20n%2Fa&amp;severity=medium&amp;id=68a4ca58ad5a09ad00fa40f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51506-na-2d638531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51506%3A%20n%2Fa&amp;severity=medium&amp;id=68a4ae37ad5a09ad00f9559c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51540-na-055c48d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51540%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a3aaad5a09ad00f9131d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50938-na-d0232520</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50938%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a3aaad5a09ad00f91319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50434-na-b127e48a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50434%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a3aaad5a09ad00f91316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51539-na-eee24fb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51539%3A%20n%2Fa&amp;severity=medium&amp;id=68a4a026ad5a09ad00f8f751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50897-na-2e169d98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50897%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51510-na-f58c8818</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51510%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51489-na-5bb0b6b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51489%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51488-na-d501d419</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51488%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51487-na-0daaa186</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51487%3A%20n%2Fa&amp;severity=medium&amp;id=68a49216ad5a09ad00f89bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54336-na-aa4e8513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54336%3A%20n%2Fa&amp;severity=critical&amp;id=68a48084ad5a09ad00f8238c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50567-na-228fbd0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50567%3A%20n%2Fa&amp;severity=critical&amp;id=68a48084ad5a09ad00f82380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50461-na-3ebb5e7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50461%3A%20n%2Fa&amp;severity=medium&amp;id=68a48084ad5a09ad00f82379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54759-cwe-79-improper-neutralization-of-i-0c18aa4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=medium&amp;id=68a39bfcad5a09ad00df5d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54862-cwe-79-improper-neutralization-of-i-045f3a09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=medium&amp;id=68a39bfcad5a09ad00df5d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54156-cwe-319-cleartext-transmission-of-s-4281d6f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54156%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=critical&amp;id=68a39bfcad5a09ad00df5d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53948-cwe-415-double-free-in-santesoft-sa-959ff154</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53948%3A%20CWE-415%20Double%20Free%20in%20Santesoft%20Sante%20PACS%20Server&amp;severity=high&amp;id=68a39bfcad5a09ad00df5d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46269-cwe-122-heap-based-buffer-overflow--22fc2983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46269%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39bfcad5a09ad00df5d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52584-cwe-122-heap-based-buffer-overflow--65198402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52584%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39bfcad5a09ad00df5d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41392-cwe-125-out-of-bounds-read-in-ashla-f89bdd57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41392%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39877ad5a09ad00cd7ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53705-cwe-787-out-of-bounds-write-in-ashl-95cbb432</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53705%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=68a39877ad5a09ad00cd7ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9119-cross-site-scripting-in-netis-wf2419-1594f093</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9119%3A%20Cross%20Site%20Scripting%20in%20Netis%20WF2419&amp;severity=medium&amp;id=68a3916fad5a09ad00b1ff21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53192-cwe-146-improper-neutralization-of--8305f858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53192%3A%20CWE-146%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20OGNL&amp;severity=high&amp;id=68a38a67ad5a09ad00b1d067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8098-cwe-276-incorrect-default-permission-47cd9f35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8098%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68a38a67ad5a09ad00b1d06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4371-cwe-347-improper-verification-of-cry-f8af577e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4371%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Lenovo%20510%20FHD%20Webcam&amp;severity=high&amp;id=68a38a67ad5a09ad00b1d064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-desktop-app-delivering-pipemagic-back-1b1f2cb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20Desktop%20App%20Delivering%20PipeMagic%20Backdoor%2C%20Microsoft&amp;severity=medium&amp;id=68a3754fad5a09ad00b138fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43731-cwe-79-improper-neutralization-of-i-f3e617c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a371dfad5a09ad00b11dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-800-n-able-servers-left-unpatched-against-cri-80ca94ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20800%20N-able%20servers%20left%20unpatched%20against%20critical%20flaws&amp;severity=critical&amp;id=68a36e46ad5a09ad00b104cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7693-cwe-20-improper-input-validation-in--8ecc573c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7693%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20PLC%20-%20Micro850%20L50E&amp;severity=critical&amp;id=68a36accad5a09ad00b0f424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55300-cwe-79-improper-neutralization-of-i-9955d8bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55300%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20komari-monitor%20komari&amp;severity=high&amp;id=68a3673ead5a09ad00b0dda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55299-cwe-521-weak-password-requirements--12fb59e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55299%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%207ritn%20VaulTLS&amp;severity=critical&amp;id=68a3673ead5a09ad00b0dd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55293-cwe-287-improper-authentication-in--153e7802</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55293%3A%20CWE-287%3A%20Improper%20Authentication%20in%20meshtastic%20firmware&amp;severity=critical&amp;id=68a3673ead5a09ad00b0dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-scam-with-fake-copyright-notices-drops-ne-22bf543e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Scam%20with%20Fake%20Copyright%20Notices%20Drops%20New%20Noodlophile%20Stealer%20Variant&amp;severity=medium&amp;id=68a36035ad5a09ad00b0c498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55288-cwe-79-improper-neutralization-of-i-65f2a52f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55288%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MGeurts%20genealogy&amp;severity=medium&amp;id=68a35cb2ad5a09ad00b0b5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55287-cwe-79-improper-neutralization-of-i-7a5e3781</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55287%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MGeurts%20genealogy&amp;severity=high&amp;id=68a35cb2ad5a09ad00b0b5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3639-cwe-288-authentication-bypass-using--c453136c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3639%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Liferay%20Portal&amp;severity=low&amp;id=68a35cb2ad5a09ad00b0b5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55283-cwe-77-improper-neutralization-of-s-860fa63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55283%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20aiven%20aiven-db-migrate&amp;severity=critical&amp;id=68a35cb2ad5a09ad00b0b5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55282-cwe-22-improper-limitation-of-a-pat-38e65d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55282%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aiven%20aiven-db-migrate&amp;severity=critical&amp;id=68a35cb2ad5a09ad00b0b5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54234-server-side-request-forgery-ssrf-cw-74aca427</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54234%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=68a35cb2ad5a09ad00b0b5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55214-cwe-22-improper-limitation-of-a-pat-50dbaa08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55214%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=medium&amp;id=68a3592dad5a09ad00b0a8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55205-cwe-863-incorrect-authorization-in--f1f85087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55205%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20projectcapsule%20capsule&amp;severity=critical&amp;id=68a355a9ad5a09ad00b09d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55201-cwe-22-improper-limitation-of-a-pat-91bc3c6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55201%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20copier-org%20copier&amp;severity=high&amp;id=68a355a9ad5a09ad00b09d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54117-cwe-80-improper-neutralization-of-s-833c826e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54117%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20NamelessMC%20Nameless&amp;severity=critical&amp;id=68a35225ad5a09ad00b084b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54421-cwe-79-improper-neutralization-of-i-50cde360</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54421%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NamelessMC%20Nameless&amp;severity=high&amp;id=68a35225ad5a09ad00b084b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54118-cwe-200-exposure-of-sensitive-infor-ff8946ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54118%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20NamelessMC%20Nameless&amp;severity=medium&amp;id=68a35225ad5a09ad00b084b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vibe-hacking-abusing-developer-trust-in-cursor-and-d1950aca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%E2%80%9CVibe%20Hacking%E2%80%9D%3A%20Abusing%20Developer%20Trust%20in%20Cursor%20and%20VS%20Code%20Remote%20Development&amp;severity=medium&amp;id=68a35cb4ad5a09ad00b0b604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/manpower-data-breach-hits-144000-users-workday-con-e9731d65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Manpower%20Data%20Breach%20Hits%20144%2C000%20users%2C%20Workday%20Confirms%203rd-Party%20CRM%20Breach&amp;severity=high&amp;id=68a34414ad5a09ad00b01d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/intel-outside-hacking-every-intel-employee-and-var-90331968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Intel%20Outside%3A%20Hacking%20every%20Intel%20employee%20and%20various%20internal%20websites&amp;severity=medium&amp;id=68a33d18ad5a09ad00afe707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-direct-send-abuse-phishing-risks-sec-a6f7c7a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20Direct%20Send%20Abuse%3A%20Phishing%20Risks%20%26%20Security%20Recommendations&amp;severity=medium&amp;id=68a33999ad5a09ad00af08fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33100-cwe-798-use-of-hard-coded-credentia-4d55f70c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33100%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68a33604ad5a09ad00aedd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33090-cwe-1333-inefficient-regular-expres-38b98eb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33090%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20IBM%20Concert%20Software&amp;severity=high&amp;id=68a33281ad5a09ad00aeb234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27909-cwe-942-permissive-cross-domain-pol-1bf4a362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27909%3A%20CWE-942%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68a33281ad5a09ad00aeb231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1759-cwe-244-improper-clearing-of-heap-me-cc252cc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1759%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68a33281ad5a09ad00aeb22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36120-cwe-863-incorrect-authorization-in--88063fea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36120%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Storage%20Virtualize&amp;severity=high&amp;id=68a32efdad5a09ad00ae96f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4962-cwe-284-improper-access-control-in-l-e8b29907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4962%3A%20CWE-284%20Improper%20Access%20Control%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68a32efdad5a09ad00ae96f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43732-cwe-639-authorization-bypass-throug-639a03ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43732%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68a32b79ad5a09ad00ae8695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-and-npm-packages-discovered-exploit-714c3518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20and%20npm%20Packages%20Discovered%20Exploiting%20Dependencies%20in%20Supply%20Chain%20Attacks&amp;severity=high&amp;id=68a32470ad5a09ad00ae40cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eavesdropping-on-phone-conversations-through-vibra-a2a11058</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eavesdropping%20on%20Phone%20Conversations%20Through%20Vibrations%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=68a32470ad5a09ad00ae40d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43733-cwe-79-improper-neutralization-of-i-388dc2cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=68a378d4ad5a09ad00b15321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warlock-ransomware-group-claims-breach-at-colt-tel-8128220a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WarLock%20Ransomware%20group%20Claims%20Breach%20at%20Colt%20Telecom%20and%20Hitachi&amp;severity=high&amp;id=68a312dbad5a09ad00ad3f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/workday-reveals-crm-breach-c202f37e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Workday%20Reveals%20CRM%20Breach&amp;severity=high&amp;id=68a2fa40ad5a09ad00ac7169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xerox-fixed-path-traversal-and-xxe-bugs-in-freeflo-90f0c240</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xerox%20fixed%20path%20traversal%20and%20XXE%20bugs%20in%20FreeFlow%20Core&amp;severity=medium&amp;id=68a2f6bbad5a09ad00ac4fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-attackers-can-execute-arbitrary-code-at-the-ke-4b7e9282</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20attackers%20can%20execute%20arbitrary%20code%20at%20the%20kernel%20level%3A%20A%20critical%20Linux%20Kernel%20netfilter%3A%20ipset%3A%20Missing%20Range%20Check%20LPE&amp;severity=critical&amp;id=68a2f339ad5a09ad00ac0d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41242-vulnerability-in-vmware-spring-fram-eb8d70d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41242%3A%20Vulnerability%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=68a2ec30ad5a09ad00abda5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47206-cwe-787-in-qnap-systems-inc-file-st-1cd14cca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47206%3A%20CWE-787%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=68a2e528ad5a09ad00ab8b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5296-cwe-59-improper-link-resolution-befo-f3106e63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5296%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Schneider%20Electric%20SESU&amp;severity=high&amp;id=68a2d718ad5a09ad00aa1588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6625-cwe-20-improper-input-validation-in--7f3e5a58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6625%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schneider%20Electric%20Modicon%20M340&amp;severity=high&amp;id=68a2d394ad5a09ad00a8e851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57703-cwe-79-improper-neutralization-of-i-51a8f9f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57703%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=medium&amp;id=68a2d012ad5a09ad00a8d153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57702-cwe-79-improper-neutralization-of-i-18390e76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57702%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=medium&amp;id=68a2d012ad5a09ad00a8d150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57701-cwe-79-improper-neutralization-of-i-e714757a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57701%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=medium&amp;id=68a2cc8cad5a09ad00a8b8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57700-cwe-79-improper-neutralization-of-i-823ef7fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57700%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=high&amp;id=68a2cc8cad5a09ad00a8b8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9109-observable-response-discrepancy-in-p-46cdf96a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9109%3A%20Observable%20Response%20Discrepancy%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2c584ad5a09ad00a83dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9108-improper-restriction-of-rendered-ui--2006687b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9108%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2be7cad5a09ad00a538e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9107-cross-site-scripting-in-portabilis-i-e63c247e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9107%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2b774ad5a09ad00a45e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9106-cross-site-scripting-in-portabilis-i-ce0a1d24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9106%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2b06cad5a09ad00a2881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9105-cross-site-scripting-in-portabilis-i-255cc7c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9105%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2a965ad5a09ad00a25315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9104-cross-site-scripting-in-portabilis-i-25c97be4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9104%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68a2a5e2ad5a09ad00a247e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9103-cross-site-scripting-in-zencart-40e8be1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9103%3A%20Cross%20Site%20Scripting%20in%20ZenCart&amp;severity=medium&amp;id=68a327f5ad5a09ad00ae5c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9102-improper-export-of-android-applicati-769d4310</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9102%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%201%261%20Mail%20%26%20Media%20mail.com%20App&amp;severity=medium&amp;id=68a2944dad5a09ad00a1c2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9101-cross-site-scripting-in-zhenfeng13-m-ccade076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9101%3A%20Cross%20Site%20Scripting%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=68a2944dad5a09ad00a1c2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9100-authentication-bypass-by-capture-rep-aa5bc96e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9100%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=68a289c1ad5a09ad00a00580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9099-unrestricted-upload-in-acrel-environ-b5a81b4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9099%3A%20Unrestricted%20Upload%20in%20Acrel%20Environmental%20Monitoring%20Cloud%20Platform&amp;severity=medium&amp;id=68a28050ad5a09ad009f3d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31715-cwe-77-improper-neutralization-of-s-277e7c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31715%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SL8521E%2FSL8521ET%2F%20SL8541E%2FUIS8141E%2FUWS6137%2FUWS6137E%2FUWS6151(E)%2FUWS6152&amp;severity=critical&amp;id=68a2782cad5a09ad009d9877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31714-cwe-20-improper-input-validation-in-86c9e83f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31714%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SL8521E%2FSL8521ET%2F%20SL8541E%2FUIS8141E%2FUWS6137%2FUWS6137E%2FUWS6151(E)%2FUWS6152&amp;severity=medium&amp;id=68a2782cad5a09ad009d9874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31713-cwe-77-improper-neutralization-of-s-39fb7dcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31713%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SL8521E%2FSL8521ET%2F%20SL8541E%2FUIS8141E%2FUWS6137%2FUWS6137E%2FUWS6151(E)%2FUWS6152&amp;severity=high&amp;id=68a2782cad5a09ad009d9871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9098-improper-export-of-android-applicati-faea0e02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9098%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Elseplus%20File%20Recovery%20App&amp;severity=medium&amp;id=68a2782cad5a09ad009d987a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9097-improper-export-of-android-applicati-8ddcabcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9097%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Euro%20Information%20CIC%20banque%20et%20compte%20en%20ligne%20App&amp;severity=medium&amp;id=68a27124ad5a09ad009d5bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bigant-office-messenger-5606-sql-injection-f9511796</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BigAnt%20Office%20Messenger%205.6.06%20-%20SQL%20Injection&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ritecms-300-reflected-cross-site-scripting-xss-da46a3e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RiteCMS%203.0.0%20-%20Reflected%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phpmyadmin-30-bruteforce-login-bypass-91b86cd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PHPMyAdmin%203.0%20-%20Bruteforce%20Login%20Bypass&amp;severity=critical&amp;id=68a3d92dad5a09ad00eed715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-10019045-ntlmv2-hash-disclosure-13280e11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2010.0.19045%20-%20NTLMv2%20Hash%20Disclosure&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soosyze-cms-20-brute-force-login-03b8f52a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Soosyze%20CMS%202.0%20-%20Brute%20Force%20Login&amp;severity=critical&amp;id=68a3d92dad5a09ad00eed706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lantronix-provisioning-manager-7103-xml-external-e-8590dc4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lantronix%20Provisioning%20Manager%207.10.3%20-%20XML%20External%20Entity%20Injection%20(XXE)&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tenda-ac20-16030812-command-injection-3554b2a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tenda%20AC20%2016.03.08.12%20-%20Command%20Injection&amp;severity=medium&amp;id=68a3d92dad5a09ad00eed6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-18-3f827c13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-18&amp;severity=medium&amp;id=68a3c29ead5a09ad00e1d2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32992-na-66a38f65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32992%3A%20n%2Fa&amp;severity=high&amp;id=68a386e4ad5a09ad00b1b7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55591-na-685f4118</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55591%3A%20n%2Fa&amp;severity=critical&amp;id=68a37fdbad5a09ad00b186fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55590-na-fb6afa33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55590%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55589-na-cb4260e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55589%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55588-na-5bd675b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55588%3A%20n%2Fa&amp;severity=high&amp;id=68a37fdbad5a09ad00b186f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55587-na-c1380b29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55587%3A%20n%2Fa&amp;severity=high&amp;id=68a37fdbad5a09ad00b186f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55586-na-819c3228</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55586%3A%20n%2Fa&amp;severity=high&amp;id=68a37fdbad5a09ad00b186ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55585-na-9218f688</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55585%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55584-na-e127b471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55584%3A%20n%2Fa&amp;severity=medium&amp;id=68a37fdbad5a09ad00b186e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/colt-technology-faces-multi-day-outage-after-warlo-46612432</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Colt%20Technology%20faces%20multi-day%20outage%20after%20WarLock%20ransomware%20attack&amp;severity=high&amp;id=68a26d9fad5a09ad009d4bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9096-cross-site-scripting-in-expressgatew-c59e43f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9096%3A%20Cross%20Site%20Scripting%20in%20ExpressGateway%20express-gateway&amp;severity=medium&amp;id=68a26a1cad5a09ad009d25c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-claims-to-sell-158-million-plain-text-47298107</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Claims%20to%20Sell%2015.8%20Million%20Plain-Text%20PayPal%20Credentials&amp;severity=medium&amp;id=68a26313ad5a09ad009cf8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7342-cwe-798-use-of-hard-coded-credential-e1399c12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7342%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Kubernetes%20Image%20Builder&amp;severity=high&amp;id=68a2631ead5a09ad009cf956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9095-cross-site-scripting-in-expressgatew-af3ca0ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9095%3A%20Cross%20Site%20Scripting%20in%20ExpressGateway%20express-gateway&amp;severity=medium&amp;id=68a2631ead5a09ad009cf95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9094-improper-neutralization-of-special-e-158dfa48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9094%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20ThingsBoard&amp;severity=medium&amp;id=68a25c0cad5a09ad009cb636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9093-improper-export-of-android-applicati-dc8b61c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9093%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20BuzzFeed%20App&amp;severity=medium&amp;id=68a25503ad5a09ad009c451e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-28-million-in-crypto-from-zeppelin-ranso-9fed395a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20seizes%20%242.8%20million%20in%20crypto%20from%20Zeppelin%20ransomware%20operator&amp;severity=high&amp;id=68a23c66ad5a09ad009b93bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-exposed-teslamate-instances-leak-sensitive-tes-3745b7ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Exposed%20TeslaMate%20Instances%20Leak%20Sensitive%20Tesla%20Data&amp;severity=medium&amp;id=68a1d9faad5a09ad008e735b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-to-release-exploit-for-full-auth-bypass-7de9c536</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20to%20release%20exploit%20for%20full%20auth%20bypass%20on%20FortiWeb&amp;severity=high&amp;id=68a1a1b9ad5a09ad008c5822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9091-hard-coded-credentials-in-tenda-ac20-8b634e93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9091%3A%20Hard-coded%20Credentials%20in%20Tenda%20AC20&amp;severity=low&amp;id=68a142cead5a09ad0088a3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9090-command-injection-in-tenda-ac20-d1ab2fe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9090%3A%20Command%20Injection%20in%20Tenda%20AC20&amp;severity=medium&amp;id=68a142cead5a09ad0088a39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-17-18106f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-17&amp;severity=medium&amp;id=68a2711ead5a09ad009d58e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9089-stack-based-buffer-overflow-in-tenda-a7d26227</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9089%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68a1189ead5a09ad0086d79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9088-stack-based-buffer-overflow-in-tenda-64ced0d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9088%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68a11196ad5a09ad0086b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9087-stack-based-buffer-overflow-in-tenda-8b885e42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9087%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68a10a8ead5a09ad008649a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/top-israeli-cybersecurity-director-arrested-in-us--214fc7d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Top%20Israeli%20Cybersecurity%20Director%20Arrested%20in%20US%20Child%20Exploitation%20Sting&amp;severity=high&amp;id=68a0d5d2ad5a09ad00822d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elastic-edr-0-day-microsoft-signed-driver-can-be-w-1e47514b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Elastic%20EDR%200-day%3A%20Microsoft-signed%20driver%20can%20be%20weaponized%20to%20attack%20its%20own%20host&amp;severity=medium&amp;id=68a0a49ead5a09ad00808fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ermac-v30-banking-trojan-source-code-leak-exposes--35b2add6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ERMAC%20V3.0%20Banking%20Trojan%20Source%20Code%20Leak%20Exposes%20Full%20Malware%20Infrastructure&amp;severity=high&amp;id=68a08174ad5a09ad007b2045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8143-cwe-79-improper-neutralization-of-in-52da72d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencidesign%20Soledad&amp;severity=medium&amp;id=68a068e4ad5a09ad0079fbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8105-cwe-94-improper-control-of-generatio-0c34fb77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8105%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pencidesign%20Soledad&amp;severity=high&amp;id=68a068e4ad5a09ad0079fbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8878-cwe-94-improper-control-of-generatio-40bd485f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8878%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20properfraction%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=68a068e4ad5a09ad0079fbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8142-cwe-98-improper-control-of-filename--ea31a626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8142%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pencidesign%20Soledad&amp;severity=high&amp;id=68a068e4ad5a09ad0079fbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-compromised-by-own-malware-expose-467m-op-6e7e27e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Compromised%20by%20Own%20Malware%2C%20Expose%20%244.67M%20Operation%20and%20Identities&amp;severity=medium&amp;id=68a068d8ad5a09ad0079fba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9092-cwe-400-uncontrolled-resource-consum-82c8423c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9092%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20Bouncy%20Castle%20for%20Java%20-%20BC-FJA%202.1.0&amp;severity=low&amp;id=68a12387ad5a09ad0087d688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/encrypthub-abuses-brave-support-in-new-campaign-ex-527e5902</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EncryptHub%20abuses%20Brave%20Support%20in%20new%20campaign%20exploiting%20MSC%20EvilTwin%20flaw&amp;severity=medium&amp;id=68a05e4bad5a09ad00799617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8719-cwe-79-improper-neutralization-of-in-f930f797</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reubenthiessen%20Translate%20This%20gTranslate%20Shortcode&amp;severity=medium&amp;id=68a045b3ad5a09ad0077bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gmail-phishing-campaign-analysis-new-voicemail-ema-8f7d0c28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gmail%20Phishing%20Campaign%20Analysis%20%E2%80%93%20%E2%80%9CNew%20Voicemail%E2%80%9D%20Email%20with%20Dynamics%20Redirect%20%2B%20Captcha&amp;severity=medium&amp;id=68a03b28ad5a09ad007715cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7499-cwe-862-missing-authorization-in-wpd-5cbe3d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7499%3A%20CWE-862%20Missing%20Authorization%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20Advanced%20AI-Driven%20Documentation%2C%20FAQ%20%26%20Knowledge%20Base%20Tool%20for%20Elementor%20%26%20Gutenberg%20with%20Encyclopedia%2C%20AI%20Support%2C%20Instant%20Answers&amp;severity=medium&amp;id=68a0341fad5a09ad007601cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8464-cwe-23-relative-path-traversal-in-gl-8b5bf7a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8464%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=68a0341fad5a09ad007601d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8898-cwe-862-missing-authorization-in-mag-65f74aaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8898%3A%20CWE-862%20Missing%20Authorization%20in%20magepeopleteam%20E-cab%20Taxi%20Booking%20Manager%20for%20Woocommerce&amp;severity=critical&amp;id=68a02993ad5a09ad0075aa19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8089-cwe-79-improper-neutralization-of-in-4faca3fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=68a02993ad5a09ad0075aa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8896-cwe-79-improper-neutralization-of-in-6a83937b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=68a02993ad5a09ad0075aa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8113-cwe-79-cross-site-scripting-xss-in-e-a6471689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8113%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ebook%20Store&amp;severity=medium&amp;id=68a0228bad5a09ad00754c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7686-cwe-352-cross-site-request-forgery-c-a1fed7e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7686%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lmyoaoa%20weichuncai(WP%E4%BC%AA%E6%98%A5%E8%8F%9C)&amp;severity=medium&amp;id=689fff64ad5a09ad007439b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8293-cwe-79-improper-neutralization-of-in-810bf444</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theerawat%20Patthawee%20Intl%20DateTime%20Calendar&amp;severity=medium&amp;id=689fff64ad5a09ad007439bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6079-cwe-434-unrestricted-upload-of-file--04f27251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6079%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=689fff64ad5a09ad0074397e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8393-cwe-98-improper-control-of-filename--668af9fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8393%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20delabon%20Woocommerce%20Blocks%20%E2%80%93%20Woolook&amp;severity=medium&amp;id=699f6c28b7ef31ef0b560925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7439-cwe-79-improper-neutralization-of-in-d8da324c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yeashir%20Anber%20Elementor%20Addon&amp;severity=medium&amp;id=689fff64ad5a09ad0074398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7683-cwe-352-cross-site-request-forgery-c-7ab94157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7683%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20janyksteenbeek%20LatestCheckins&amp;severity=medium&amp;id=689fff64ad5a09ad007439af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7668-cwe-352-cross-site-request-forgery-c-23018dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7668%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20timothyja%20Linux%20Promotional%20Plugin&amp;severity=medium&amp;id=689fff64ad5a09ad007439a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7664-cwe-862-missing-authorization-in-low-1e6350e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7664%3A%20CWE-862%20Missing%20Authorization%20in%20loword%20AL%20Pack&amp;severity=high&amp;id=689fff64ad5a09ad0074399b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6080-cwe-269-improper-privilege-managemen-c182c627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6080%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=689fff64ad5a09ad00743982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7440-cwe-79-improper-neutralization-of-in-8e843195</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yeashir%20Anber%20Elementor%20Addon&amp;severity=medium&amp;id=689fff64ad5a09ad0074398f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3671-cwe-22-improper-limitation-of-a-path-7558a663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3671%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=689fff64ad5a09ad0074397a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7649-cwe-79-improper-neutralization-of-in-c8b1e2f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20Recent%20Comments%20Shortcode&amp;severity=medium&amp;id=689fff64ad5a09ad00743993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7651-cwe-79-improper-neutralization-of-in-82fede10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20earnware%20Earnware%20Connect&amp;severity=medium&amp;id=689fff64ad5a09ad00743997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7684-cwe-352-cross-site-request-forgery-c-fd81d079</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20remysharp%20Last.fm%20Recent%20Album%20Artwork&amp;severity=medium&amp;id=689fff64ad5a09ad007439b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6221-cwe-79-improper-neutralization-of-in-851c606b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luuptek%20Embed%20Bokun&amp;severity=medium&amp;id=689fff64ad5a09ad00743986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12612-cwe-89-improper-neutralization-of-s-5f44e7b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12612%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49895-cwe-352-cross-site-request-forgery--fafd58ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49895%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iThemes%20ServerBuddy%20by%20PluginBuddy.com&amp;severity=high&amp;id=689ff4d7ad5a09ad0073dc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12575-cwe-200-exposure-of-sensitive-infor-be8e5df1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12575%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-risk-in-python-termcolor-and-colorama-2d1fe36f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20Chain%20Risk%20in%20Python%3A%20Termcolor%20and%20Colorama%20Explained&amp;severity=medium&amp;id=68a355a8ad5a09ad00b09cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55284-cwe-78-improper-neutralization-of-s-012ac235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55284%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=689fe343ad5a09ad00736e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55286-cwe-119-improper-restriction-of-ope-fd37ba27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55286%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20vancluever%20z2d&amp;severity=high&amp;id=689fdc40ad5a09ad0072e795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-16-149c3254</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-16&amp;severity=medium&amp;id=68a11f9ead5a09ad0086eb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52618-cwe-89-improper-neutralization-of-s-21740cf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52618%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52619-cwe-209-generation-of-error-message-5158a525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52619%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52620-cwe-20-improper-input-validation-in-22efaccc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52620%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52621-cwe-346-origin-validation-error-in--1a43a7bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52621%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HCL%20Software%20BigFix%20SaaS%20Remediate&amp;severity=medium&amp;id=689fbc9aad5a09ad00717f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43201-an-app-may-be-able-to-unexpectedly--e6bf9b5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43201%3A%20An%20app%20may%20be%20able%20to%20unexpectedly%20leak%20a%20user&apos;s%20credentials%20in%20Apple%20Apple%20Music%20Classical&amp;severity=medium&amp;id=689fae9ead5a09ad00710cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8959-cwe-59-improper-link-resolution-befo-6ae02c41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8959%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(Link%20Following)%20in%20HashiCorp%20Shared%20library&amp;severity=high&amp;id=689f9cf6ad5a09ad0070ac46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-profile-interlock-ransomware-4490aa64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Profile%3A%20Interlock%20Ransomware&amp;severity=medium&amp;id=689f9976ad5a09ad007098ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36088-cwe-79-improper-neutralization-of-i-55e875df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Storage%20TS4500%20Library&amp;severity=medium&amp;id=689f8b5fad5a09ad00701c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43490-cwe-59-improper-link-resolution-bef-ef28aea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43490%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HP%2C%20Inc.%20HP%20Hotkey%20Support%20Software&amp;severity=high&amp;id=689f8457ad5a09ad006fbd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/colt-telecom-attack-claimed-by-warlock-ransomware--7169c948</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Colt%20Telecom%20attack%20claimed%20by%20WarLock%20ransomware%2C%20data%20up%20for%20sale&amp;severity=high&amp;id=689f6f3ead5a09ad006ef4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/taiwan-web-servers-breached-by-uat-7237-using-cust-dba0d9b7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Taiwan%20Web%20Servers%20Breached%20by%20UAT-7237%20Using%20Customized%20Open-Source%20Hacking%20Tools&amp;severity=high&amp;id=689f6f3ead5a09ad006ef49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7961-cwe-94-improper-control-of-generatio-c4081e3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7961%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Wulkano%20KAP&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8996-cwe-862-missing-authorization-in-dru-2658ed3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8996%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Layout%20Builder%20Advanced%20Permissions&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8995-cwe-288-authentication-bypass-using--4712f99c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8995%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Authenticator%20Login&amp;severity=critical&amp;id=689f64b5ad5a09ad006eb47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8675-cwe-918-server-side-request-forgery--f2b84923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8675%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Drupal%20AI%20SEO%20Link%20Advisor&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8362-cwe-79-improper-neutralization-of-in-b986f8e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20GoogleTag%20Manager&amp;severity=medium&amp;id=689f64b5ad5a09ad006eb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8361-cwe-962-missing-authorization-in-dru-cccd6eaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8361%3A%20CWE-962%20Missing%20Authorization%20in%20Drupal%20Config%20Pages&amp;severity=high&amp;id=689f64b5ad5a09ad006eb486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8092-cwe-79-improper-neutralization-of-in-cab0cd55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=high&amp;id=689f64b5ad5a09ad006eb483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9060-cwe-20-improper-input-validation-in--f6967e59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9060%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MSoft%20MFlash&amp;severity=critical&amp;id=689f64b5ad5a09ad006eb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8066-cwe-601-url-redirection-to-untrusted-25c2ebfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8066%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Bunkerity%20Bunker%20Web&amp;severity=medium&amp;id=689f5dabad5a09ad006e89d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49898-cwe-79-improper-neutralization-of-i-b336b2fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xolluteon%20Dropshix&amp;severity=medium&amp;id=689f56a3ad5a09ad006e40fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-bust-crypto-money-laundering-group-nab-smis-1d46800e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20Bust%20Crypto%20Money%20Laundering%20Group%2C%20Nab%20Smishing%20SMS%20Blaster%20Operator&amp;severity=medium&amp;id=689f4f9aad5a09ad006e0694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49432-cwe-862-missing-authorization-in-fw-0aa86042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49432%3A%20Missing%20Authorization%20in%20FWDesign%20Ultimate%20Video%20Player&amp;severity=null&amp;id=689f531fad5a09ad006e210b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49897-cwe-89-improper-neutralization-of-s-c1bf62c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49897%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Vertical%20scroll%20slideshow%20gallery%20v2&amp;severity=high&amp;id=689f531fad5a09ad006e210e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55207-cwe-601-url-redirection-to-untruste-f06ad89e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55207%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=689f531fad5a09ad006e2111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24975-cwe-754-improper-check-for-unusual--2f733f48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24975%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20FirebirdSQL%20firebird&amp;severity=high&amp;id=689f4faaad5a09ad006e06d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55203-cwe-79-improper-neutralization-of-i-982abaa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55203%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makeplane%20plane&amp;severity=medium&amp;id=689f4faaad5a09ad006e06e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54989-cwe-476-null-pointer-dereference-in-2cda351f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54989%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20FirebirdSQL%20firebird&amp;severity=medium&amp;id=689f4faaad5a09ad006e06db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5048-cwe-120-buffer-copy-without-checking-add31143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5048%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=689f4893ad5a09ad006dc696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5047-cwe-457-use-of-uninitialized-variabl-7481f54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5047%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=689f4893ad5a09ad006dc692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5046-cwe-125-out-of-bounds-read-in-autode-a92a04b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5046%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=689f4893ad5a09ad006dc68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54466-cwe-94-improper-control-of-generati-62483186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54466%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=medium&amp;id=689f4512ad5a09ad006db9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9053-sql-injection-in-projectworlds-trave-3ef0cd58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9053%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f337fad5a09ad006d184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9052-sql-injection-in-projectworlds-trave-02446add</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9052%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-hidden-infrastructure-behind-vextrios-tds-432af0fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Hidden%20Infrastructure%20Behind%20VexTrio&apos;s%20TDS&amp;severity=medium&amp;id=689f2ff7ad5a09ad006cf1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blue-locker-analysis-ransomware-targeting-oil-gas--54513a69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Blue%20Locker&apos;%20Analysis%3A%20Ransomware%20Targeting%20Oil%20%26%20Gas%20Sector%20in%20Pakistan&amp;severity=medium&amp;id=689f2ff7ad5a09ad006cf1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trojans-embedded-in-svg-files-dd80531b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trojans%20Embedded%20in%20.svg%20Files&amp;severity=medium&amp;id=689f28eead5a09ad006c5ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/plex-warns-users-to-patch-security-vulnerability-i-fe4c3fea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Plex%20warns%20users%20to%20patch%20security%20vulnerability%20immediately&amp;severity=high&amp;id=689f28eead5a09ad006c5ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1929-cwe-89-improper-neutralization-of-sp-c89768c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1929%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Risk%20Yaz%C4%B1l%C4%B1m%20Teknolojileri%20Ltd.%20%C5%9Eti.%20Reel%20Sekt%C3%B6r%20Hazine%20ve%20Risk%20Y%C3%B6netimi%20Yaz%C4%B1l%C4%B1m%C4%B1&amp;severity=high&amp;id=689f2570ad5a09ad006c45ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9051-sql-injection-in-projectworlds-trave-0fc88ce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9051%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f2570ad5a09ad006c45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54475-cwe-89-improper-neutralization-of-s-991962d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54475%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomsky.com%20JS%20Jobs%20component%20for%20Joomla&amp;severity=high&amp;id=689f21e9ad5a09ad006c34a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54474-cwe-89-improper-neutralization-of-s-d3bf5fab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dj-extensions.com%20DJ-Classifieds%20component%20for%20Joomla&amp;severity=high&amp;id=689f21e9ad5a09ad006c34a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54473-cwe-434-unrestricted-upload-of-file-a9354e74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54473%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20phoca.cz%20phoca.cz%20-%20Phoca%20Commander%20for%20Joomla&amp;severity=critical&amp;id=689f21e9ad5a09ad006c34a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crossc2-expanding-cobalt-strike-beacon-to-cross-pl-12f2c9fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrossC2%20Expanding%20Cobalt%20Strike%20Beacon%20to%20Cross-Platform%20Attacks&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-sap-ariba-quote-isnt-what-it-seemsits-ransomw-14817b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20&apos;SAP%20Ariba%20Quote&apos;%20Isn&apos;t%20What%20It%20Seems%E2%80%94It&apos;s%20Ransomware&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-bulletin-fire-in-the-woods-a-new-variant-of-4a847a84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Bulletin%3A%20Fire%20in%20the%20Woods%20%E2%80%93%20A%20New%20Variant%20of%20FireWood&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9050-sql-injection-in-projectworlds-trave-86fe6f71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9050%3A%20SQL%20Injection%20in%20projectworlds%20Travel%20Management%20System&amp;severity=medium&amp;id=689f1e64ad5a09ad006bde58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9047-sql-injection-in-projectworlds-visit-620bff93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9047%3A%20SQL%20Injection%20in%20projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=689f175dad5a09ad006b9ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9046-stack-based-buffer-overflow-in-tenda-89a53113</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9046%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=689f175dad5a09ad006b9aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26709-cwe-200-exposure-of-sensitive-infor-cddf8147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26709%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZTE%20F50&amp;severity=medium&amp;id=689f1055ad5a09ad006b3940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9028-sql-injection-in-code-projects-onlin-15e77236</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9028%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689f1055ad5a09ad006b3943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-fixed-maximum-severity-security-flaw-in-secu-aae36da5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20fixed%20maximum-severity%20security%20flaw%20in%20Secure%20Firewall%20Management%20Center&amp;severity=medium&amp;id=689f094bad5a09ad006a8e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9027-sql-injection-in-code-projects-onlin-8596e9ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9027%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689f0960ad5a09ad006a8ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9026-os-command-injection-in-d-link-dir-8-f78d22e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9026%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-860L&amp;severity=medium&amp;id=689f0246ad5a09ad006a5212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9025-sql-injection-in-code-projects-simpl-fceb4dd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9025%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Cafe%20Ordering%20System&amp;severity=medium&amp;id=689efb3cad5a09ad00699b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9024-sql-injection-in-phpgurukul-beauty-p-b5531efa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9024%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=689efb3cad5a09ad00699b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9023-buffer-overflow-in-tenda-ac7-e99ae452</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9023%3A%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=689ef437ad5a09ad00697379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5844-cwe-79-improper-neutralization-of-in-5cdc8cd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5844%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techlabpro1%20Radius%20Blocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=689ef436ad5a09ad0069732b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7662-cwe-89-improper-neutralization-of-sp-770daac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7662%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20evigeo%20Gestion%20de%20tarifs&amp;severity=medium&amp;id=689ef436ad5a09ad0069733d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8905-cwe-94-improper-control-of-generatio-65545985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8905%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Inpersttion%20For%20Theme&amp;severity=medium&amp;id=689ef437ad5a09ad00697375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7507-cwe-20-improper-input-validation-in--c3504177</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7507%3A%20CWE-20%20Improper%20Input%20Validation%20in%20elinkcontent%20elink%20%E2%80%93%20Embed%20Content&amp;severity=medium&amp;id=689ef436ad5a09ad00697330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8720-cwe-79-improper-neutralization-of-in-b952bffb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20morehawes%20Plugin%20README%20Parser&amp;severity=medium&amp;id=689ef436ad5a09ad0069735a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8080-cwe-79-improper-neutralization-of-in-f10aae5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alobaidi%20Alobaidi%20Captcha&amp;severity=medium&amp;id=689ef436ad5a09ad0069734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8091-cwe-200-exposure-of-sensitive-inform-4db44b81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8091%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ashanjay%20EventON%20%E2%80%93%20Events%20Calendar&amp;severity=medium&amp;id=689ef436ad5a09ad00697352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7778-cwe-285-improper-authorization-in-ar-35305b0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7778%3A%20CWE-285%20Improper%20Authorization%20in%20artkrylov%20Icons%20Factory&amp;severity=critical&amp;id=689ef436ad5a09ad00697347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7688-cwe-352-cross-site-request-forgery-c-4dfc3255</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7688%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jason-lau%20Add%20User%20Meta&amp;severity=medium&amp;id=689ef436ad5a09ad00697342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7641-cwe-22-improper-limitation-of-a-path-6fc93624</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7641%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%2048hmorris%20Assistant%20for%20NextGEN%20Gallery&amp;severity=high&amp;id=689ef436ad5a09ad00697334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7650-cwe-98-improper-control-of-filename--53508e6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7650%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20setriosoft%20BizCalendar%20Web&amp;severity=high&amp;id=689ef436ad5a09ad00697339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9022-sql-injection-in-sourcecodester-onli-3b468677</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9022%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=689eed33ad5a09ad00682006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9021-sql-injection-in-sourcecodester-onli-1016dba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9021%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Bank%20Management%20System&amp;severity=medium&amp;id=689eed33ad5a09ad00682000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9020-use-after-free-in-px4-px4-autopilot-0a0318a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9020%3A%20Use%20After%20Free%20in%20PX4%20PX4-Autopilot&amp;severity=low&amp;id=689ee629ad5a09ad0063f0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8604-cwe-79-improper-neutralization-of-in-e4e98c69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptb%20WP%20Table%20Builder%20%E2%80%93%20WordPress%20Table%20Plugin&amp;severity=medium&amp;id=689ee2a1ad5a09ad0063d6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9019-heap-based-buffer-overflow-in-tcprep-8df2e96c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9019%3A%20Heap-based%20Buffer%20Overflow%20in%20tcpreplay&amp;severity=low&amp;id=689f2570ad5a09ad006c45fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9017-cross-site-scripting-in-phpgurukul-z-792e3556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9017%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=689f2570ad5a09ad006c45f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6679-cwe-434-unrestricted-upload-of-file--3ce90109</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6679%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20Bit%20Form%20%E2%80%93%20Custom%20Contact%20Form%2C%20Multi%20Step%2C%20Conversational%2C%20Payment%20%26%20Quiz%20Form%20builder&amp;severity=critical&amp;id=689ed815ad5a09ad00637456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8451-cwe-79-improper-neutralization-of-in-14900684</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=689ed815ad5a09ad00637461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8013-cwe-918-server-side-request-forgery--de6c4b53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8013%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20quttera%20Quttera%20Web%20Malware%20Scanner&amp;severity=low&amp;id=689ed815ad5a09ad0063745b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9016-uncontrolled-search-path-in-mechrevo-a8f9b901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9016%3A%20Uncontrolled%20Search%20Path%20in%20Mechrevo%20Control%20Center%20GX%20V2&amp;severity=high&amp;id=689ed815ad5a09ad00637466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9013-sql-injection-in-phpgurukul-online-s-3dc14e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9013%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=689ed10ead5a09ad006331d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9012-sql-injection-in-phpgurukul-online-s-91592911</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9012%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=689eca06ad5a09ad0062f190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ermac-v30-banking-trojan-full-source-code-leak-and-045f39a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ERMAC%20V3.0%20Banking%20Trojan%3A%20Full%20Source%20Code%20Leak%20and%20Infrastructure%20Analysis&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kawabunga-dude-youve-been-ransomed-d923eb8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kawabunga%2C%20Dude%2C%20You&apos;ve%20Been%20Ransomed!&amp;severity=medium&amp;id=689f2c73ad5a09ad006c9dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9011-sql-injection-in-phpgurukul-online-s-92a46c60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9011%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=689ec301ad5a09ad00627a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9010-sql-injection-in-itsourcecode-online-a3638f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9010%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689ebbf5ad5a09ad006246d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9009-sql-injection-in-itsourcecode-online-898a17e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9009%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689ebbf5ad5a09ad006246cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31961-cwe-1220-insufficient-granularity-o-794d3fce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31961%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20HCL%20Software%20Connections&amp;severity=low&amp;id=689ebbf5ad5a09ad006246c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9008-sql-injection-in-itsourcecode-online-2fd20e34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9008%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689eb4edad5a09ad00620d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9007-buffer-overflow-in-tenda-ch22-f1e982cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9007%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=689eade5ad5a09ad0061dec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9006-buffer-overflow-in-tenda-ch22-9102ed16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9006%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=689ea6e1ad5a09ad0061ab0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9005-information-exposure-through-error-m-48064a39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9005%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20mtons%20mblog&amp;severity=medium&amp;id=689ea6e1ad5a09ad0061ab04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9004-improper-restriction-of-excessive-au-9c088bf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9004%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20mtons%20mblog&amp;severity=medium&amp;id=689ea6e1ad5a09ad0061aafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9003-cross-site-scripting-in-d-link-dir-8-db0c2fc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9003%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DIR-818LW&amp;severity=medium&amp;id=689ea6e1ad5a09ad0061aaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8676-cwe-200-exposure-of-sensitive-inform-2329c67b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8676%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bplugins%20B%20Slider-%20Gutenberg%20Slider%20Block%20for%20WP&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8867-cwe-79-improper-neutralization-of-in-6ecf6d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20Graphina%20%E2%80%93%20Elementor%20Charts%20and%20Graphs&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8680-cwe-918-server-side-request-forgery--e81abcbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8680%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bplugins%20B%20Slider-%20Gutenberg%20Slider%20Block%20for%20WP&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6025-cwe-602-client-side-enforcement-of-s-65b19cb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6025%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20railmedia%20Order%20Tip%20for%20WooCommerce&amp;severity=high&amp;id=689e9c51ad5a09ad00615fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8342-cwe-862-missing-authorization-in-glb-10d3dd7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8342%3A%20CWE-862%20Missing%20Authorization%20in%20glboy%20WooCommerce%20OTP%20Login%20With%20Phone%20Number%2C%20OTP%20Verification&amp;severity=high&amp;id=689e9c51ad5a09ad00615fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9002-sql-injection-in-surbowl-dormitory-m-7b584350</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9002%3A%20SQL%20Injection%20in%20Surbowl%20dormitory-management-php&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9001-stack-based-buffer-overflow-in-lemon-94250a64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9001%3A%20Stack-based%20Buffer%20Overflow%20in%20LemonOS&amp;severity=medium&amp;id=689e9c51ad5a09ad00615fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9000-uncontrolled-search-path-in-mechrevo-e7fd9640</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9000%3A%20Uncontrolled%20Search%20Path%20in%20Mechrevo%20Control%20Center%20GX%20V2&amp;severity=high&amp;id=689e91c5ad5a09ad0060fec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8993-sql-injection-in-itsourcecode-online-69dd3b7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8993%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e91c5ad5a09ad0060feba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8992-cross-site-request-forgery-in-mtons--d6d73d1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8992%3A%20Cross-Site%20Request%20Forgery%20in%20mtons%20mblog&amp;severity=medium&amp;id=689e91c5ad5a09ad0060feb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8991-business-logic-errors-in-linlinjava--3cfec12d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8991%3A%20Business%20Logic%20Errors%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689e83b5ad5a09ad00604d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8990-sql-injection-in-code-projects-onlin-c3e7005e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8990%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689e83b5ad5a09ad00604d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-15-31dd537d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-15&amp;severity=medium&amp;id=689fce1ead5a09ad0071d919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8989-sql-injection-in-sourcecodester-covi-8fa0ae5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8989%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e75a7ad5a09ad005fc0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8988-sql-injection-in-sourcecodester-covi-6c51cc72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8988%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e6ea3ad5a09ad005fa116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8987-sql-injection-in-sourcecodester-covi-a07012ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8987%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e6795ad5a09ad005f7e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31987-cwe-405-asymmetric-resource-consump-f75cd706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31987%3A%20CWE-405%20Asymmetric%20Resource%20Consumption%20in%20HCL%20Software%20Connections%20Docs&amp;severity=medium&amp;id=689e608dad5a09ad005f45c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8986-sql-injection-in-sourcecodester-covi-be482508</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8986%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e608dad5a09ad005f45c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8985-sql-injection-in-sourcecodester-covi-811b72b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8985%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689e5985ad5a09ad005ef78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8984-sql-injection-in-itsourcecode-online-751292c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8984%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e5985ad5a09ad005ef783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/on-going-malvertising-attack-spreads-new-crypto-st-4624a0ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=On%20Going%20Malvertising%20Attack%20Spreads%20New%20Crypto%20Stealing%20PS1Bot%20Malware&amp;severity=medium&amp;id=689e527bad5a09ad005eafee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8983-sql-injection-in-itsourcecode-online-036105be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8983%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e5293ad5a09ad005eb049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8982-sql-injection-in-itsourcecode-online-db04d87a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8982%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e4b75ad5a09ad005e70c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8981-sql-injection-in-itsourcecode-online-dafaeea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8981%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e446ead5a09ad005e52cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8980-insufficient-verification-of-data-au-fc72a31f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8980%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Tenda%20G1&amp;severity=high&amp;id=689e3d67ad5a09ad005e2baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8979-insufficient-verification-of-data-au-5a3bba54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8979%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Tenda%20AC15&amp;severity=high&amp;id=689e3d67ad5a09ad005e2ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8978-insufficient-verification-of-data-au-11188fea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8978%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=689e40ebad5a09ad005e47c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8976-cross-site-scripting-in-givanz-vvveb-6bb5ef96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8976%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=689e3d67ad5a09ad005e2bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8975-cross-site-scripting-in-givanz-vvveb-19cf32c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8975%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=689e2f55ad5a09ad005de84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52765-cwe-352-cross-site-request-forgery--2e24ef9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52765%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lisensee%20NetInsight%20Analytics%20Implementation%20Plugin&amp;severity=null&amp;id=689e2bd4ad5a09ad005db2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52767-cwe-352-cross-site-request-forgery--78c3f826</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52767%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lisensee%20NetInsight%20Analytics%20Implementation%20Plugin&amp;severity=null&amp;id=689e2bd4ad5a09ad005db2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52769-cwe-352-cross-site-request-forgery--2fd35b68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flexostudio%20flexo-social-gallery&amp;severity=null&amp;id=689e2bd4ad5a09ad005db302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52771-cwe-79-improper-neutralization-of-i-c1544a5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bcupham%20Video%20Expander&amp;severity=null&amp;id=689e2bd4ad5a09ad005db305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52797-cwe-352-cross-site-request-forgery--e82b6a9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52797%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josepsitjar%20StoryMap&amp;severity=null&amp;id=689e2bd4ad5a09ad005db308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53219-cwe-352-cross-site-request-forgery--645fb782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53219%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pl4g4%20WP-Database-Optimizer-Tools&amp;severity=null&amp;id=689e2bd4ad5a09ad005db30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53241-cwe-918-server-side-request-forgery-2027ea10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53241%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kodeshpa%20Simplified&amp;severity=null&amp;id=689e2bd4ad5a09ad005db30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53249-cwe-352-cross-site-request-forgery--24932d85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53249%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=689e2bd4ad5a09ad005db311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53330-cwe-79-improper-neutralization-of-i-41832be2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WpEstate%20WP%20Rentals&amp;severity=null&amp;id=689e2bd4ad5a09ad005db314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53341-cwe-862-missing-authorization-in-th-72356786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53341%3A%20Missing%20Authorization%20in%20Themovation%20App%2C%20SaaS%20%26%20Software%20Startup%20Tech%20Theme%20-%20Stratus&amp;severity=null&amp;id=689e2bd4ad5a09ad005db317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53342-cwe-79-improper-neutralization-of-i-01559ba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Modernize&amp;severity=null&amp;id=689e2bd4ad5a09ad005db324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53343-cwe-862-missing-authorization-in-go-9fa86430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53343%3A%20Missing%20Authorization%20in%20GoodLayers%20Modernize&amp;severity=null&amp;id=689e2bd4ad5a09ad005db327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53347-cwe-352-cross-site-request-forgery--616fd5f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Laborator%20Kalium&amp;severity=null&amp;id=689e2bd4ad5a09ad005db32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53575-cwe-79-improper-neutralization-of-i-70e8684e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=null&amp;id=689e2bd4ad5a09ad005db32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53581-cwe-79-improper-neutralization-of-i-4ad1a0a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artiosmedia%20RSS%20Feed%20Pro&amp;severity=null&amp;id=689e2bd4ad5a09ad005db330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53587-cwe-352-cross-site-request-forgery--1b872e9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53587%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ApusTheme%20Findgo&amp;severity=null&amp;id=689e2bd4ad5a09ad005db333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54054-cwe-79-improper-neutralization-of-i-4cbd5d3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=689e2bd4ad5a09ad005db336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54708-cwe-79-improper-neutralization-of-i-d6b6f86c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Blocks&amp;severity=null&amp;id=689e2bd4ad5a09ad005db339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54712-cwe-862-missing-authorization-in-ha-f2432114</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54712%3A%20Missing%20Authorization%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=689e2bd4ad5a09ad005db33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54715-cwe-22-improper-limitation-of-a-pat-62aaaef0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54715%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=689e2bd4ad5a09ad005db33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54717-cwe-862-missing-authorization-in-e--fe2ef86f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54717%3A%20Missing%20Authorization%20in%20e-plugins%20WP%20Membership&amp;severity=null&amp;id=689e2bd5ad5a09ad005db34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54727-cwe-79-improper-neutralization-of-i-e16a0f36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=null&amp;id=689e2bd5ad5a09ad005db34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54728-cwe-352-cross-site-request-forgery--2bf27ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54728%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CreativeMindsSolutions%20CM%20On%20Demand%20Search%20And%20Replace&amp;severity=null&amp;id=689e2bd5ad5a09ad005db352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54729-cwe-79-improper-neutralization-of-i-2d9aed89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54729%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=null&amp;id=689e2bd5ad5a09ad005db355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54730-cwe-862-missing-authorization-in-pa-f4bb8512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54730%3A%20Missing%20Authorization%20in%20PARETO%20Digital%20Embedder%20for%20Google%20Reviews&amp;severity=null&amp;id=689e2bd5ad5a09ad005db358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54732-cwe-352-cross-site-request-forgery--9755bd2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54732%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=689e2bd5ad5a09ad005db35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54736-cwe-497-exposure-of-sensitive-syste-7cbcc961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54736%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20NordicMade%20Savoy&amp;severity=null&amp;id=689e2bd5ad5a09ad005db35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54739-cwe-862-missing-authorization-in-po-9f059324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54739%3A%20Missing%20Authorization%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=689e2bd5ad5a09ad005db361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54740-cwe-79-improper-neutralization-of-i-0bfdf5a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Nelson%20Print%20My%20Blog&amp;severity=null&amp;id=689e2bd5ad5a09ad005db364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54746-cwe-79-improper-neutralization-of-i-52ac35cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartpauj%20Shortcode%20Redirect&amp;severity=null&amp;id=689e2bd5ad5a09ad005db367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54747-cwe-79-improper-neutralization-of-i-85212523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20Templatera&amp;severity=null&amp;id=689e2bd5ad5a09ad005db374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54749-cwe-79-improper-neutralization-of-i-bdb036ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetProductGallery&amp;severity=null&amp;id=689e2bd5ad5a09ad005db377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55708-cwe-89-improper-neutralization-of-s-d24b3381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55708%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ExpressTech%20Systems%20Quiz%20And%20Survey%20Master&amp;severity=null&amp;id=689e2bd5ad5a09ad005db37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55709-cwe-79-improper-neutralization-of-i-b0756a43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=689e2bd5ad5a09ad005db37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55710-cwe-201-insertion-of-sensitive-info-34c3a595</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55710%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Steve%20Burge%20TaxoPress&amp;severity=null&amp;id=689e2bd5ad5a09ad005db380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55712-cwe-862-missing-authorization-in-po-7e73f67b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55712%3A%20Missing%20Authorization%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=689e2bd5ad5a09ad005db383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55713-cwe-79-improper-neutralization-of-i-5536efe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55713%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=689e2bd5ad5a09ad005db386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55714-cwe-79-improper-neutralization-of-i-5cc5dcbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=689e2bd5ad5a09ad005db389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55716-cwe-862-missing-authorization-in-ve-35fbc57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55716%3A%20Missing%20Authorization%20in%20VeronaLabs%20WP%20Statistics&amp;severity=null&amp;id=689e2bd5ad5a09ad005db38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21110-cwe-250-execution-with-unnecessary--a5ce277c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21110%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20Data%20Lakehouse&amp;severity=medium&amp;id=689e284ead5a09ad005d9e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8974-hard-coded-credentials-in-linlinjava-a94ccc52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8974%3A%20Hard-coded%20Credentials%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689e284ead5a09ad005d9e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8973-sql-injection-in-sourcecodester-cash-65dece05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8973%3A%20SQL%20Injection%20in%20SourceCodester%20Cashier%20Queuing%20System&amp;severity=medium&amp;id=689e284ead5a09ad005d9e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8972-sql-injection-in-itsourcecode-online-560b6bc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8972%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e2145ad5a09ad005d56cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-netflix-job-phishing-scam-steals-facebook-logi-7ec19921</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Netflix%20Job%20Phishing%20Scam%20Steals%20Facebook%20Login%20Data&amp;severity=medium&amp;id=689e1dc1ad5a09ad005d3c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-found-using-crossc2-to-expand-cobalt-strik-b4d22d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Found%20Using%20CrossC2%20to%20Expand%20Cobalt%20Strike%20Beacon%E2%80%99s%20Reach%20to%20Linux%20and%20macOS&amp;severity=high&amp;id=689e1dc1ad5a09ad005d3c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-theft-replaces-encryption-blue-report-2025-on-d3a76c52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Theft%20Replaces%20Encryption%3A%20Blue%20Report%202025%20on%20Ransomware%20%26%20Infostealers&amp;severity=high&amp;id=689e1dc0ad5a09ad005d3c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bookingcom-phishing-campaign-uses-sneaky-character-b3cc768d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Booking.com%20phishing%20campaign%20uses%20sneaky%20&apos;%E3%82%93&apos;%20character%20to%20trick%20you&amp;severity=high&amp;id=689e1dc0ad5a09ad005d3c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37945-improper-neutralization-of-input-du-bec70681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8971-sql-injection-in-itsourcecode-online-5d834168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8971%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8970-sql-injection-in-itsourcecode-online-64082e56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8970%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55192-cwe-94-improper-control-of-generati-1d3cdb84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55192%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20JurajNyiri%20HomeAssistant-Tapo-Control&amp;severity=high&amp;id=689e16b9ad5a09ad005d0c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20220-improper-neutralization-of-special--5b51466e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20220%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e16b9ad5a09ad005d0c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55195-cwe-1321-improperly-controlled-modi-4f2b73cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55195%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20denoland%20std&amp;severity=high&amp;id=689e16b9ad5a09ad005d0c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8969-sql-injection-in-itsourcecode-online-906fa8fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8969%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1338ad5a09ad005ce419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8968-sql-injection-in-itsourcecode-online-fb7873d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8968%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e1338ad5a09ad005ce412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20306-improper-neutralization-of-special--0aabac59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1338ad5a09ad005ce40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20302-missing-authorization-in-cisco-cisc-02b11c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20302%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1338ad5a09ad005ce40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20301-missing-authorization-in-cisco-cisc-02867278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20301%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1338ad5a09ad005ce409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20268-improper-handling-of-values-in-cisc-5fc69d52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20268%3A%20Improper%20Handling%20of%20Values%20in%20Cisco%20Cisco%20Firepower%20Threat%20Defense%20Software&amp;severity=medium&amp;id=689e1338ad5a09ad005ce406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20265-improper-neutralization-of-special--048ff4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20265%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=critical&amp;id=689e1338ad5a09ad005ce403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20254-missing-release-of-memory-after-eff-5dea20e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20254%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1338ad5a09ad005ce3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20263-integer-overflow-to-buffer-overflow-38ec3d55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20263%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1338ad5a09ad005ce400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20253-loop-with-unreachable-exit-conditio-c61c3af5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20253%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1338ad5a09ad005ce3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20252-missing-release-of-memory-after-eff-23e621ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20252%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20251-improper-validation-of-specified-ty-36cad1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20251%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20244-improper-validation-of-specified-ty-e43d94f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20244%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20243-loop-with-unreachable-exit-conditio-66a6f2ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20243%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20239-missing-release-of-memory-after-eff-361b3ed9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20239%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=high&amp;id=689e1337ad5a09ad005ce3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20237-improper-neutralization-of-expressi-d6281dd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20237%3A%20Improper%20Neutralization%20of%20Expression%2FCommand%20Delimiters%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20238-improper-authorization-on-physical--8ebae0f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20238%3A%20Improper%20Authorization%20on%20Physical%20Debug%20and%20Test%20Interfaces%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20225-missing-release-of-memory-after-eff-12be8d82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20225%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20IOS&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20235-improper-neutralization-of-input-du-5baf55f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20224-missing-release-of-memory-after-eff-98dec020</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20224%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20222-buffer-copy-without-checking-size-o-8d51b610</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20222%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Cisco%20Cisco%20Firepower%20Threat%20Defense%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20219-improper-access-control-in-cisco-ci-76be2ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20219%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20218-improper-neutralization-of-data-wit-e3686559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20218%3A%20Improper%20Neutralization%20of%20Data%20within%20XPath%20Expressions%20(&apos;XPath%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20217-loop-with-unreachable-exit-conditio-64233b80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20217%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Firepower%20Threat%20Defense%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20148-improper-input-validation-in-cisco--8ce1a3bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20148%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=high&amp;id=689e1337ad5a09ad005ce3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20136-loop-with-unreachable-exit-conditio-5be517e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20136%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20135-missing-release-of-memory-after-eff-9be16697</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20135%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=689e1337ad5a09ad005ce3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20127-improper-resource-shutdown-or-relea-3197624a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20127%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20133-missing-release-of-memory-after-eff-0be0c27e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20133%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20134-double-free-in-cisco-cisco-adaptive-5c941cf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20134%3A%20Double%20Free%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=689e1337ad5a09ad005ce3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9043-cwe-428-unquoted-search-path-or-elem-e8e5eada</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9043%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Seagate%20Toolkit&amp;severity=medium&amp;id=689e1338ad5a09ad005ce42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9039-cwe-277-insecure-inherited-permissio-169636fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9039%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%2C%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Amazon%20ECS&amp;severity=medium&amp;id=689e0fb1ad5a09ad005cb829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54867-cwe-61-unix-symbolic-link-symlink-f-c3a84a8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54867%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20youki-dev%20youki&amp;severity=high&amp;id=689e0c2dad5a09ad005ca280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8967-sql-injection-in-itsourcecode-online-46a42ff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8967%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e0c2dad5a09ad005ca285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33142-cwe-295-improper-certificate-valida-9ed2e275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33142%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=689e0567ad5a09ad005c27de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacked-law-enforcement-and-government-email-accoun-e1fa7593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacked%20Law%20Enforcement%20and%20Government%20Email%20Accounts%20Sold%20on%20Dark%20Web&amp;severity=high&amp;id=689e0523ad5a09ad005c2711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36047-cwe-770-allocation-of-resources-wit-da8e7874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36047%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=689e0567ad5a09ad005c27e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canadas-house-of-commons-investigating-data-breach-eb7e6695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%E2%80%99s%20House%20of%20Commons%20investigating%20data%20breach%20after%20cyberattack&amp;severity=high&amp;id=689e0523ad5a09ad005c270d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8966-sql-injection-in-itsourcecode-online-3ce4beed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8966%3A%20SQL%20Injection%20in%20itsourcecode%20Online%20Tour%20and%20Travel%20Management%20System&amp;severity=medium&amp;id=689e0567ad5a09ad005c27eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8965-unrestricted-upload-in-linlinjava-li-02be5ac5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8965%3A%20Unrestricted%20Upload%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689e0567ad5a09ad005c27e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53631-cwe-79-improper-neutralization-of-i-39b6d605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53631%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DogukanUrker%20flaskBlog&amp;severity=medium&amp;id=689e01a3ad5a09ad005c05b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phantomcard-new-nfc-driven-android-malware-emergin-1aaf79d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhantomCard%3A%20New%20NFC-driven%20Android%20malware%20emerging%20in%20Brazil&amp;severity=medium&amp;id=689e01a2ad5a09ad005c0596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norway-blames-pro-russian-hackers-for-dam-cyberatt-cbe53dfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norway%20Blames%20Pro-Russian%20Hackers%20for%20Dam%20Cyberattack&amp;severity=medium&amp;id=689dfe1bad5a09ad005beed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40758-cwe-347-improper-verification-of-cr-5564da53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40758%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20Mendix%20SAML%20(Mendix%2010.12%20compatible)&amp;severity=high&amp;id=689dfe47ad5a09ad005bef45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8964-improper-authentication-in-code-proj-692aa19a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8964%3A%20Improper%20Authentication%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=689dfe47ad5a09ad005bef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7971-cwe-20-improper-input-validation-in--15bf0975</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7971%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20Studio%205000%20Logix%20Designer%C2%AE&amp;severity=high&amp;id=689dfe47ad5a09ad005bef48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8875-cwe-502-deserialization-of-untrusted-9cf275ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8875%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20N-able%20N-central&amp;severity=critical&amp;id=689dfaa3ad5a09ad005bd06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8876-cwe-20-improper-input-validation-in--06fa81df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8876%3A%20CWE-20%20Improper%20Input%20Validation%20in%20N-able%20N-central&amp;severity=critical&amp;id=689dfaa3ad5a09ad005bd071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7972-cwe-286-incorrect-user-management-in-225b136b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7972%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Linx&amp;severity=high&amp;id=689dfaa3ad5a09ad005bd074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36613-cwe-266-incorrect-privilege-assignm-969a025d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36613%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=low&amp;id=689dfaa3ad5a09ad005bd07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36612-cwe-266-incorrect-privilege-assignm-1edf1a7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36612%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SupportAssist%20for%20Business%20PCs&amp;severity=medium&amp;id=689df717ad5a09ad005bb37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38738-cwe-266-incorrect-privilege-assignm-b47aae39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38738%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SupportAssist%20for%20Home%20PCs&amp;severity=medium&amp;id=689df717ad5a09ad005bb37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/home-office-phishing-scam-target-uk-visa-sponsorsh-07dfce60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Home%20Office%20Phishing%20Scam%20Target%20UK%20Visa%20Sponsorship%20System&amp;severity=medium&amp;id=689df39dad5a09ad005b90a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8962-stack-based-buffer-overflow-in-code--b7b82078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8962%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=689df3d9ad5a09ad005b9178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38745-cwe-532-insertion-of-sensitive-info-ce47aca3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38745%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20OpenManage%20Enterprise&amp;severity=medium&amp;id=689df3d9ad5a09ad005b9175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26484-cwe-611-improper-restriction-of-xml-632727d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26484%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20CloudLink&amp;severity=medium&amp;id=689df3d9ad5a09ad005b9172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9042-cwe-1287-improper-validation-of-spec-2763c9ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9042%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Rockwell%20Automation%20FLEX%205000%20I%2FO&amp;severity=high&amp;id=689df3d9ad5a09ad005b9180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9041-cwe-1287-improper-validation-of-spec-72584f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9041%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Rockwell%20Automation%20FLEX%205000%20I%2FO&amp;severity=high&amp;id=689df3d9ad5a09ad005b9188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-mega-malware-analysis-tutorial-featuring-donut-g-ac70d1a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Mega%20Malware%20Analysis%20Tutorial%20Featuring%20Donut-Generated%20Shellcode&amp;severity=medium&amp;id=689e01a2ad5a09ad005c059d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36581-cwe-788-access-of-memory-location-a-2c54dfc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36581%3A%20CWE-788%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20in%20Dell%20PowerEdge&amp;severity=low&amp;id=689dec89ad5a09ad005b6871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7973-cwe-268-privilege-chaining-in-rockwe-5459a1bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7973%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20ViewPoint&amp;severity=high&amp;id=689dec89ad5a09ad005b687e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7773-cwe-863-incorrect-authorization-in-r-48fb50b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7773%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Rockwell%20Automation%205032-CFGB16M12P5DR&amp;severity=high&amp;id=689dec89ad5a09ad005b687a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7774-cwe-306-missing-authentication-for-c-56076458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7774%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Rockwell%20Automation%205032-CFGB16M12P5DR&amp;severity=high&amp;id=689de906ad5a09ad005b49c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9036-cwe-200-exposure-of-sensitive-inform-539ff2ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9036%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Action%20Manager&amp;severity=high&amp;id=689de906ad5a09ad005b49cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7353-cwe-1188-initialization-of-a-resourc-477235fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7353%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Rockwell%20Automation%201756-EN2T%2FD&amp;severity=critical&amp;id=689de581ad5a09ad005b2ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55675-cwe-285-improper-authorization-in-a-04553742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55675%3A%20CWE-285%20Improper%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55674-cwe-89-improper-neutralization-of-s-521131a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55674%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55672-cwe-80-improper-neutralization-of-s-3b9d50a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55672%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55673-cwe-200-exposure-of-sensitive-infor-1ec97274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55673%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=689de581ad5a09ad005b2add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8963-deserialization-in-jeecgboot-jimurep-039e7e24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8963%3A%20Deserialization%20in%20jeecgboot%20JimuReport&amp;severity=medium&amp;id=689de1fdad5a09ad005b0bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8715-improper-neutralization-of-crlf-sequ-402b9f9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8715%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20PostgreSQL&amp;severity=high&amp;id=689de1fdad5a09ad005b0bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8714-inclusion-of-functionality-from-untr-e8ebe689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8714%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20PostgreSQL&amp;severity=high&amp;id=689de1fdad5a09ad005b0bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8713-exposure-of-sensitive-information-th-ab50a4c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8713%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20PostgreSQL&amp;severity=low&amp;id=689de1fdad5a09ad005b0bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8961-memory-corruption-in-libtiff-efbd14ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8961%3A%20Memory%20Corruption%20in%20LibTIFF&amp;severity=medium&amp;id=689dd3edad5a09ad005a922b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8960-sql-injection-in-campcodes-online-fl-9e56b168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8960%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Flight%20Booking%20Management%20System&amp;severity=medium&amp;id=689dccebad5a09ad005a4292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8958-stack-based-buffer-overflow-in-tenda-685496bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8958%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20TX3&amp;severity=high&amp;id=689dc5dcad5a09ad005a0b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54707-cwe-89-improper-neutralization-of-s-e107c2d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54707%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RealMag777%20MDTF&amp;severity=null&amp;id=689dbee7ad5a09ad0059e70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54706-cwe-79-improper-neutralization-of-i-12115993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54706%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Posts%20Display&amp;severity=null&amp;id=689dbee7ad5a09ad0059e707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54705-cwe-862-missing-authorization-in-ma-4b52b340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54705%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=689dbee7ad5a09ad0059e704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54704-cwe-79-improper-neutralization-of-i-64e638e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=689dbee7ad5a09ad0059e701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54703-cwe-352-cross-site-request-forgery--8c712aee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54703%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20princeahmed%20Integrate%20Google%20Drive&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54702-cwe-352-cross-site-request-forgery--6fa8c3ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54702%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20motov.net%20Ebook%20Store&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54701-cwe-98-improper-control-of-filename-f1391fe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54701%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Unicamp&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54700-cwe-98-improper-control-of-filename-ae1c62e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54700%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Makeaholic&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54699-cwe-79-improper-neutralization-of-i-ecc70cf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54699%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=689dbee7ad5a09ad0059e6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54698-cwe-80-improper-neutralization-of-s-eedf8ded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54698%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54697-cwe-266-incorrect-privilege-assignm-50be3682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54697%3A%20Incorrect%20Privilege%20Assignment%20in%20StellarWP%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54695-cwe-862-missing-authorization-in-ha-3bac507d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54695%3A%20Missing%20Authorization%20in%20DevItems%20HT%20Mega&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54694-cwe-352-cross-site-request-forgery--13b435a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54694%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bPlugins%20Button%20Block&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54693-cwe-434-unrestricted-upload-of-file-01dd0392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54693%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20epiphyt%20Form%20Block&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54692-cwe-862-missing-authorization-in-wp-5ebf0ab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54692%3A%20Missing%20Authorization%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54691-cwe-639-authorization-bypass-throug-e056ac29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54691%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Stylemix%20Motors&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54690-cwe-98-improper-control-of-filename-a8c39ec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54690%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themeStek%20Xinterio&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54689-cwe-98-improper-control-of-filename-c766adeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54689%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Urna&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54688-cwe-79-improper-neutralization-of-i-1b37e3c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54688%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54687-cwe-79-improper-neutralization-of-i-86d6c8c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54686-cwe-502-deserialization-of-untruste-0f05bdb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54686%3A%20Deserialization%20of%20Untrusted%20Data%20in%20scriptsbundle%20Exertio&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54685-cwe-201-insertion-of-sensitive-info-0dc5fa2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54685%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Brainstorm%20Force%20SureDash&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54684-cwe-79-improper-neutralization-of-i-4576ae90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20and%20Constant%20Contact&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54683-cwe-79-improper-neutralization-of-i-07ecdaa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20WP%20Modal%20Popup%20with%20Cookie%20Integration&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54682-cwe-352-cross-site-request-forgery--5035c9f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54682%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54681-cwe-601-url-redirection-to-untruste-093ddd5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54681%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20Connector%20for%20Gravity%20Forms%20and%20Google%20Sheets&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54680-cwe-79-improper-neutralization-of-i-2285d988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Blogger%20Buzz&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54679-cwe-862-missing-authorization-in-ve-4a4a296e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54679%3A%20Missing%20Authorization%20in%20vertim%20Neon%20Channel%20Product%20Customizer%20Free&amp;severity=null&amp;id=689dbee6ad5a09ad0059e6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54678-cwe-89-improper-neutralization-of-s-a987e0c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54678%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hassantafreshi%20Easy%20Form%20Builder&amp;severity=null&amp;id=689dbee5ad5a09ad0059e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54676-cwe-79-improper-neutralization-of-i-35ea2110</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=689dbee5ad5a09ad0059e695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54675-cwe-352-cross-site-request-forgery--4c2e9870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54675%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20YITHEMES%20YITH%20WooCommerce%20Popup&amp;severity=null&amp;id=689dbee5ad5a09ad0059e692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54674-cwe-352-cross-site-request-forgery--990cf1d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54674%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mklacroix%20Product%20Configurator%20for%20WooCommerce&amp;severity=null&amp;id=689dbee5ad5a09ad0059e68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54673-cwe-352-cross-site-request-forgery--f4ec9561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54673%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ays%20Pro%20Chartify&amp;severity=null&amp;id=689dbee5ad5a09ad0059e68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54672-cwe-352-cross-site-request-forgery--7f85294d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54672%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jordy%20Meow%20Photo%20Engine&amp;severity=null&amp;id=689dbee5ad5a09ad0059e689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54671-cwe-352-cross-site-request-forgery--1fb711db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54671%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bobbingwide%20oik&amp;severity=null&amp;id=689dbee5ad5a09ad0059e686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54669-cwe-89-improper-neutralization-of-s-398ba574</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54669%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=689dbee5ad5a09ad0059e683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54668-cwe-79-improper-neutralization-of-i-a7f00c52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=689dbee5ad5a09ad0059e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54667-cwe-367-time-of-check-time-of-use-t-ec1f2968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54667%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=689dbee5ad5a09ad0059e67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3703-cwe-98-improper-control-of-filename--2511cd74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3703%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wipeoutmedia%20CSS%20%26%20JavaScript%20Toolbox&amp;severity=null&amp;id=689dbee1ad5a09ad0059e599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24766-cwe-98-improper-control-of-filename-b6fd33bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24766%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wproyal%20News%20Magazine%20X&amp;severity=null&amp;id=689dbee0ad5a09ad0059e556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24775-cwe-434-unrestricted-upload-of-file-d60c2d16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24775%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Made%20I.T.%20Forms&amp;severity=null&amp;id=689dbee0ad5a09ad0059e559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25172-cwe-98-improper-control-of-filename-ff151be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25172%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20VidMov&amp;severity=null&amp;id=689dbee0ad5a09ad0059e55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25174-cwe-98-improper-control-of-filename-f086f0e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25174%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20beeteam368%20BeeTeam368%20Extensions&amp;severity=null&amp;id=689dbee0ad5a09ad0059e55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28962-cwe-862-missing-authorization-in-st-6550fe9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28962%3A%20Missing%20Authorization%20in%20stefanoai%20Advanced%20Google%20Universal%20Analytics&amp;severity=null&amp;id=689dbee0ad5a09ad0059e562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28975-cwe-79-improper-neutralization-of-i-8f7ee652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redqteam%20Alike%20-%20WordPress%20Custom%20Post%20Comparison&amp;severity=null&amp;id=689dbee0ad5a09ad0059e565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28979-cwe-98-improper-control-of-filename-8f1ea43d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28979%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=689dbee0ad5a09ad0059e568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28999-cwe-79-improper-neutralization-of-i-e3f628bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28999%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoomIt%20WooCommerce%20Shop%20Page%20Builder&amp;severity=high&amp;id=689dbee0ad5a09ad0059e56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29014-cwe-79-improper-neutralization-of-i-b192bcfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29014%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoomIt%20FoodMenu&amp;severity=high&amp;id=689dbee0ad5a09ad0059e56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30626-cwe-79-improper-neutralization-of-i-4220a040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Multimedia%20Playlist%20Slider%20Addon%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=689dbee0ad5a09ad0059e571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30635-cwe-98-improper-control-of-filename-3ab51976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30635%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeAtelier%20IDonatePro&amp;severity=null&amp;id=689dbee1ad5a09ad0059e57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30639-cwe-862-missing-authorization-in-th-37d530c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30639%3A%20Missing%20Authorization%20in%20ThemeAtelier%20IDonatePro&amp;severity=null&amp;id=689dbee1ad5a09ad0059e581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30993-cwe-862-missing-authorization-in-vi-f958b0d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30993%3A%20Missing%20Authorization%20in%20VillaTheme%20Thank%20You%20Page%20Customizer%20for%20WooCommerce&amp;severity=null&amp;id=689dbee1ad5a09ad0059e584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30998-cwe-89-improper-neutralization-of-s-772c773f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30998%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rico%20Macchi%20WP%20Links%20Page&amp;severity=null&amp;id=689dbee1ad5a09ad0059e587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31007-cwe-79-improper-neutralization-of-i-7b0d5fda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31007%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alvind%20Billplz%20Addon%20for%20Contact%20Form%207&amp;severity=null&amp;id=689dbee1ad5a09ad0059e58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31425-cwe-862-missing-authorization-in-ka-9fca7dba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31425%3A%20Missing%20Authorization%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=null&amp;id=689dbee1ad5a09ad0059e58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32288-cwe-98-improper-control-of-filename-74e6b4ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32288%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stmcan%20RT-Theme%2018%20%7C%20Extensions&amp;severity=null&amp;id=689dbee1ad5a09ad0059e590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39483-cwe-94-improper-control-of-generati-003cbca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39483%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20imithemes%20Eventer&amp;severity=null&amp;id=689dbee1ad5a09ad0059e593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39510-cwe-89-improper-neutralization-of-s-59f3b025</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39510%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ValvePress%20Pinterest%20Automatic%20Pin&amp;severity=null&amp;id=689dbee1ad5a09ad0059e596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47536-cwe-502-deserialization-of-untruste-78d9f228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47536%3A%20Deserialization%20of%20Untrusted%20Data%20in%20keywordrush%20Content%20Egg&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47610-cwe-79-improper-neutralization-of-i-d3be5e3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wetail%20WooCommerce%20Fortnox%20Integration&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47689-cwe-79-improper-neutralization-of-i-45994b71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47689%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnh10%20Video%20Blogster%20Lite&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48293-cwe-98-improper-control-of-filename-fea5b6f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48293%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Dylan%20Kuhn%20Geo%20Mashup&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48332-cwe-98-improper-control-of-filename-dd9ff1a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48332%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PublishPress%20Gutenberg%20Blocks&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49033-cwe-89-improper-neutralization-of-s-427d385e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49033%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49036-cwe-98-improper-control-of-filename-ec3f1ab1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49036%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20octagonwebstudio%20Premium%20Addons%20for%20KingComposer&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49037-cwe-79-improper-neutralization-of-i-c5a93849</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Federico%20Rota%20Authentication%20and%20xmlrpc%20log%20writer&amp;severity=null&amp;id=689dbee1ad5a09ad0059e5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49038-cwe-79-improper-neutralization-of-i-29714486</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20Dynamic%20Links&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49044-cwe-352-cross-site-request-forgery--a41021c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49044%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tosend.it%20Simple%20Poll&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49047-cwe-79-improper-neutralization-of-i-c587654a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49047%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keeross%20DigitalOcean%20Spaces%20Sync&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49048-cwe-79-improper-neutralization-of-i-bf3c7074</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inspectlet%20Inspectlet%20%26%238211%3B%20User%20Session%20Recording%20and%20Heatmaps&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49051-cwe-79-improper-neutralization-of-i-72774d74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biscia7%20Hide%20Text%20Shortcode&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49052-cwe-862-missing-authorization-in-da-9327e911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49052%3A%20Missing%20Authorization%20in%20Dariolee%20Netease%20Music&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49053-cwe-79-improper-neutralization-of-i-77d7bed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49053%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kadesthemes%20WP%20Airdrop%20Manager&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49054-cwe-79-improper-neutralization-of-i-39219b92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49054%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrdenny%20Time%20Sheets&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49056-cwe-79-improper-neutralization-of-i-0e897a11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49057-cwe-79-improper-neutralization-of-i-d4a837d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ko%20Min%20WP%20Voting&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49058-cwe-79-improper-neutralization-of-i-7c2704df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sound%20Strategies%20SoundSt%20SEO%20Search&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49059-cwe-89-improper-neutralization-of-s-e72246a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49059%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CleverReach%C2%AE%20CleverReach%C2%AE%20WP&amp;severity=null&amp;id=689dbee2ad5a09ad0059e5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49061-cwe-79-improper-neutralization-of-i-f32086cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20perteus%20Porn%20Videos%20Embed&amp;severity=null&amp;id=689dbee3ad5a09ad0059e602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49062-cwe-79-improper-neutralization-of-i-a34a2caa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49062%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cornfeed%20WP-jScrollPane&amp;severity=null&amp;id=689dbee3ad5a09ad0059e605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49063-cwe-79-improper-neutralization-of-i-19c0e431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20i3geek%20BaiduXZH%20Submit(%E7%99%BE%E5%BA%A6%E7%86%8A%E6%8E%8C%E5%8F%B7)&amp;severity=null&amp;id=689dbee3ad5a09ad0059e608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49064-cwe-79-improper-neutralization-of-i-7c9115c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49064%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webilop%20User%20Language%20Switch&amp;severity=null&amp;id=689dbee3ad5a09ad0059e60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49065-cwe-79-improper-neutralization-of-i-245febbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49065%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BestiaDurmiente%20Visit%20Counter&amp;severity=null&amp;id=689dbee3ad5a09ad0059e60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49264-cwe-98-improper-control-of-filename-d873df83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49264%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Cloud%20Infrastructure%20Services%20Cloud%20SAML%20SSO%20-%20Single%20Sign%20On%20Login&amp;severity=null&amp;id=689dbee3ad5a09ad0059e611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49267-cwe-89-improper-neutralization-of-s-12aa32db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49267%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shabti%20Kaplan%20Frontend%20Admin%20by%20DynamiApps&amp;severity=null&amp;id=689dbee3ad5a09ad0059e614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49271-cwe-98-improper-control-of-filename-223a9e77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49271%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20GravityWP%20GravityWP%20-%20Merge%20Tags&amp;severity=null&amp;id=689dbee3ad5a09ad0059e617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49433-cwe-79-improper-neutralization-of-i-298aa5c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThanhD%20Supermalink&amp;severity=null&amp;id=689dbee3ad5a09ad0059e61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49437-cwe-79-improper-neutralization-of-i-22218a83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20worstguy%20WP%20LOL%20Rotation&amp;severity=null&amp;id=689dbee3ad5a09ad0059e61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49869-cwe-502-deserialization-of-untruste-8861bae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49869%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=689dbee4ad5a09ad0059e62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49887-cwe-94-improper-control-of-generati-bd2a901f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49887%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPFactory%20Product%20XML%20Feed%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=689dbee4ad5a09ad0059e62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50029-cwe-862-missing-authorization-in-as-67417a76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50029%3A%20Missing%20Authorization%20in%20Ashish%20AI%20Tools&amp;severity=null&amp;id=689dbee4ad5a09ad0059e630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50031-cwe-862-missing-authorization-in-sy-20168f54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50031%3A%20Missing%20Authorization%20in%20syedamirhussain91%20DB%20Backup&amp;severity=null&amp;id=689dbee4ad5a09ad0059e633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50040-cwe-79-improper-neutralization-of-i-731ec74d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moshensky%20CF7%20Spreadsheets&amp;severity=null&amp;id=689dbee4ad5a09ad0059e636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52712-cwe-35-path-traversal-in-boldgrid-p-529a692e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52712%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=689dbee4ad5a09ad0059e639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52716-cwe-98-improper-control-of-filename-9e1c096b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52716%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Acato%20WP%20REST%20Cache&amp;severity=null&amp;id=689dbee4ad5a09ad0059e63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52720-cwe-89-improper-neutralization-of-s-61c2f380</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52720%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=689dbee4ad5a09ad0059e63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52721-cwe-862-missing-authorization-in-lc-339bd929</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52721%3A%20CWE-862%20Missing%20Authorization%20in%20LCweb%20Global%20Gallery&amp;severity=medium&amp;id=689dbee4ad5a09ad0059e642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52728-cwe-98-improper-control-of-filename-49a4275d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52728%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebCodingPlace%20Responsive%20Posts%20Carousel%20Pro&amp;severity=null&amp;id=689dbee4ad5a09ad0059e645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52730-cwe-79-improper-neutralization-of-i-595d4bb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefunction%20WordPress%20Event%20Manager%2C%20Event%20Calendar%20and%20Booking%20Plugin&amp;severity=null&amp;id=689dbee4ad5a09ad0059e652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52731-cwe-862-missing-authorization-in-th-26071131</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52731%3A%20Missing%20Authorization%20in%20themefunction%20WordPress%20Event%20Manager%2C%20Event%20Calendar%20and%20Booking%20Plugin&amp;severity=null&amp;id=689dbee4ad5a09ad0059e655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52732-cwe-98-improper-control-of-filename-a826283a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52732%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20GMap%20Targeting&amp;severity=null&amp;id=689dbee4ad5a09ad0059e658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52775-cwe-862-missing-authorization-in-ro-1c8c96d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52775%3A%20Missing%20Authorization%20in%20Ronik%40UnlimitedWP%20Project%20Cost%20Calculator&amp;severity=null&amp;id=689dbee4ad5a09ad0059e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52785-cwe-862-missing-authorization-in-so-426ab1cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52785%3A%20Missing%20Authorization%20in%20softnwords%20SMM%20API&amp;severity=null&amp;id=689dbee4ad5a09ad0059e65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52788-cwe-79-improper-neutralization-of-i-0be1e98a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Russell%20Jamieson%20CaptionPix&amp;severity=null&amp;id=689dbee4ad5a09ad0059e661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52800-cwe-862-missing-authorization-in-un-8eadddaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52800%3A%20Missing%20Authorization%20in%20Unity%20Business%20Technology%20Pty%20Ltd%20The%20E-Commerce%20ERP&amp;severity=null&amp;id=689dbee4ad5a09ad0059e664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52801-cwe-862-missing-authorization-in-vo-24781862</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52801%3A%20Missing%20Authorization%20in%20VonStroheim%20TheBooking&amp;severity=null&amp;id=689dbee4ad5a09ad0059e667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52806-cwe-98-improper-control-of-filename-ca586294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52806%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=689dbee4ad5a09ad0059e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52820-cwe-89-improper-neutralization-of-s-ebb86f6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52820%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20infosoftplugin%20WooCommerce%20Point%20Of%20Sale%20(POS)&amp;severity=null&amp;id=689dbee4ad5a09ad0059e66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52823-cwe-89-improper-neutralization-of-s-fe0ee4f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52823%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ovatheme%20Cube%20Portfolio&amp;severity=null&amp;id=689dbee5ad5a09ad0059e67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8957-sql-injection-in-campcodes-online-fl-90bfd733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8957%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Flight%20Booking%20Management%20System&amp;severity=medium&amp;id=689dbee7ad5a09ad0059e70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/august-news-and-resources-catch-up-french-72619718</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=August%20News%20and%20Resources%20Catch%20Up%20(French)&amp;severity=critical&amp;id=689db7d4ad5a09ad00599b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8956-command-injection-in-d-link-dir818l-05954769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8956%3A%20Command%20Injection%20in%20D-Link%20DIR%E2%80%91818L&amp;severity=medium&amp;id=689db7cfad5a09ad00599b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7761-cwe-79-improper-neutralization-of-in-70dc1858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Akcess-Net%20Lepszy%20BIP&amp;severity=medium&amp;id=689db7cfad5a09ad00599b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flaw-in-older-version-of-android-rooting-tool-kern-51e5d606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flaw%20in%20Older%20Version%20of%20Android%20Rooting%20Tool%20KernelSU%20Allows%20Full%20Device%20Takeover&amp;severity=medium&amp;id=689db446ad5a09ad00598253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8943-2a88bf99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8943&amp;severity=critical&amp;id=689db456ad5a09ad005982e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8047-cwe-829-inclusion-of-functionality-f-7a4499b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8047%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20disable-right-click-powered-by-pixterme&amp;severity=critical&amp;id=689db456ad5a09ad005982e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55346-cwe-94-improper-control-of-generati-6311aa40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55346%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=critical&amp;id=689db456ad5a09ad005982ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8955-sql-injection-in-phpgurukul-hospital-a22b6be7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8955%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=689db0cbad5a09ad00596b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-microsoft-internet-explorer-microsoft-e878c55a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Microsoft%20Internet%20Explorer%2C%20Microsoft%20Office%20Excel%2C%20and%20WinRAR%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=689dad3fad5a09ad005944b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-requires-crypto-app-licenses-in-15-regions--53139e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Requires%20Crypto%20App%20Licenses%20in%2015%20Regions%20as%20FBI%20Warns%20of%20%249.9M%20Scam%20Losses&amp;severity=high&amp;id=689dad3fad5a09ad005944ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/manpower-data-breach-impacted-144180-individuals-b120647c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Manpower%20data%20breach%20impacted%20144%2C180%20individuals&amp;severity=high&amp;id=689dad3fad5a09ad005944b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-n-able-n-central-flaws-to-its-known-e-3f0b0916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20N-able%20N-Central%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog%20-%20Security%20Affairs&amp;severity=medium&amp;id=689dad3fad5a09ad005944b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48862-cwe-1104-use-of-unmaintained-third--f441d1c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48862%3A%20CWE-1104%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Setup&amp;severity=high&amp;id=689da9bdad5a09ad00592739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48861-cwe-284-improper-access-control-in--09e70532</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48861%3A%20CWE-284%20Improper%20Access%20Control%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Setup&amp;severity=medium&amp;id=689da9bdad5a09ad00592736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48860-cwe-284-improper-access-control-in--ab855eec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48860%3A%20CWE-284%20Improper%20Access%20Control%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Setup&amp;severity=high&amp;id=689da9bdad5a09ad00592733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54472-cwe-400-uncontrolled-resource-consu-cb0d4f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54472%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=high&amp;id=689da9bdad5a09ad0059273c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8954-sql-injection-in-phpgurukul-hospital-ff924cda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8954%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=689da9bdad5a09ad00592746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8953-sql-injection-in-sourcecodester-covi-5bc3082a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8953%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689da9bdad5a09ad0059273f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5998-cwe-2280-improper-handling-of-insuff-fd1483d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5998%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20PPWP%20%E2%80%93%20Password%20Protect%20Pages&amp;severity=medium&amp;id=689da638ad5a09ad005906d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8952-sql-injection-in-campcodes-online-fl-f0d20b41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8952%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Flight%20Booking%20Management%20System&amp;severity=medium&amp;id=689da2b4ad5a09ad0058ed22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-javascript-injects-fullscreen-iframe-on--2168036c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20JavaScript%20Injects%20Fullscreen%20Iframe%20On%20a%20WordPress%20Website&amp;severity=medium&amp;id=689dc258ad5a09ad0059fea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8951-sql-injection-in-phpgurukul-teachers-122dc9db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8951%3A%20SQL%20Injection%20in%20PHPGurukul%20Teachers%20Record%20Management%20System&amp;severity=medium&amp;id=689d9bacad5a09ad0058bed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8950-sql-injection-in-campcodes-online-re-a48c77ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8950%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=689d94a4ad5a09ad00588f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-chrome-renderer-code-exec-to-kernel-with-msgo-d96fbb81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Chrome%20renderer%20code%20exec%20to%20kernel%20with%20MSG_OOB&amp;severity=medium&amp;id=689d9125ad5a09ad0058629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27388-cwe-20-improper-input-validation-in-63728ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27388%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OPPO%20OPPO%20HEALTH%20APP&amp;severity=high&amp;id=689d9120ad5a09ad00586272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8949-stack-based-buffer-overflow-in-d-lin-7a8c3d0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8949%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=689d8d9fad5a09ad005849f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8948-sql-injection-in-projectworlds-visit-e28db489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8948%3A%20SQL%20Injection%20in%20projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=689d8d9fad5a09ad005849f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8947-sql-injection-in-projectworlds-visit-05ce00cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8947%3A%20SQL%20Injection%20in%20projectworlds%20Visitor%20Management%20System&amp;severity=medium&amp;id=689d8694ad5a09ad00581090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8946-sql-injection-in-projectworlds-onlin-0a198cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8946%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Notes%20Sharing%20Platform&amp;severity=medium&amp;id=689e40ebad5a09ad005e47be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8046-cwe-79-cross-site-scripting-xss-in-i-ff8736bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8046%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Injection%20Guard&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7808-cwe-79-cross-site-scripting-xss-in-w-2bd4cd07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7808%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Shopify&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6790-cwe-352-cross-site-request-forgery-c-e5016e23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6790%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Quiz%20and%20Survey%20Master%20(QSM)&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3414-cwe-79-cross-site-scripting-xss-in-s-109d3ac2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3414%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Structured%20Content%20(JSON-LD)%20%23wpsc&amp;severity=medium&amp;id=689d7c3ead5a09ad0057c46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8940-buffer-overflow-in-tenda-ac20-b79e9ea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8940%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=689e80abad5a09ad00602947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8939-buffer-overflow-in-tenda-ac20-2d62fb61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8939%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=689e80abad5a09ad0060293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8938-backdoor-in-totolink-n350r-a582f357</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8938%3A%20Backdoor%20in%20TOTOLINK%20N350R&amp;severity=medium&amp;id=689d717ead5a09ad00576d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5942-cwe-122-heap-based-buffer-overflow-i-b2d36fe9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5942%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=689d6a74ad5a09ad005741be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0309-vulnerability-in-netskope-netskope-c-07441599</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0309%3A%20Vulnerability%20in%20Netskope%20Netskope%20Client&amp;severity=medium&amp;id=689d6a74ad5a09ad005741b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5941-cwe-125-out-of-bounds-read-in-netsko-589d819d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5941%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Netskope%20Netskope%20Client&amp;severity=low&amp;id=689d6a74ad5a09ad005741bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8937-command-injection-in-totolink-n350r-f7d0182a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8937%3A%20Command%20Injection%20in%20TOTOLINK%20N350R&amp;severity=medium&amp;id=689d6a74ad5a09ad005741c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8936-sql-injection-in-1000-projects-sales-05c1f59a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8936%3A%20SQL%20Injection%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d6a74ad5a09ad005741c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8935-sql-injection-in-1000-projects-sales-d5592e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8935%3A%20SQL%20Injection%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d636cad5a09ad005714a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8934-cross-site-scripting-in-1000-project-0ec7b4a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8934%3A%20Cross%20Site%20Scripting%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d636cad5a09ad0057149e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8933-cross-site-scripting-in-1000-project-83bc9607</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8933%3A%20Cross%20Site%20Scripting%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d5c65ad5a09ad0056eb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8932-sql-injection-in-1000-projects-sales-56c5de6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8932%3A%20SQL%20Injection%20in%201000%20Projects%20Sales%20Management%20System&amp;severity=medium&amp;id=689d555cad5a09ad00567a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8931-sql-injection-in-code-projects-medic-766432e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8931%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d555cad5a09ad00567a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8930-sql-injection-in-code-projects-medic-a2c2d7f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8930%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d555cad5a09ad00567a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50518-na-cfc724b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50518%3A%20n%2Fa&amp;severity=critical&amp;id=689e80abad5a09ad0060293b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-14-030161c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-14&amp;severity=medium&amp;id=689e7c9ead5a09ad005ff304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50862-na-4f2b8ef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50862%3A%20n%2Fa&amp;severity=medium&amp;id=689e446ead5a09ad005e52c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50861-na-ac3b8b33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50861%3A%20n%2Fa&amp;severity=medium&amp;id=689e446ead5a09ad005e52c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51965-na-e4b2740e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51965%3A%20n%2Fa&amp;severity=medium&amp;id=689e40ebad5a09ad005e47b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51986-na-4eb81cf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51986%3A%20n%2Fa&amp;severity=high&amp;id=689e2145ad5a09ad005d56cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52335-na-6725fbc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52335%3A%20n%2Fa&amp;severity=medium&amp;id=689e1e59ad5a09ad005d3d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50515-na-aa4cf636</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50515%3A%20n%2Fa&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50817-na-0dad8d6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50817%3A%20n%2Fa&amp;severity=medium&amp;id=689e1a3dad5a09ad005d25bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27845-na-a4f3e6a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27845%3A%20n%2Fa&amp;severity=critical&amp;id=689dfaa3ad5a09ad005bd077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27847-na-be1b1ea4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27847%3A%20n%2Fa&amp;severity=medium&amp;id=689dfaa3ad5a09ad005bd06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27846-na-29a2f3b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27846%3A%20n%2Fa&amp;severity=medium&amp;id=689dfaa3ad5a09ad005bd066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43983-na-a2a76949</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43983%3A%20n%2Fa&amp;severity=critical&amp;id=689df3d9ad5a09ad005b9183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43984-na-2b55f25d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43984%3A%20n%2Fa&amp;severity=critical&amp;id=689dec89ad5a09ad005b6874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55197-cwe-400-uncontrolled-resource-consu-afeaa7a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55197%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20py-pdf%20pypdf&amp;severity=medium&amp;id=689d1d1cad5a09ad0054d653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55194-cwe-248-uncaught-exception-in-part--9a4b08c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55194%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Part-DB%20Part-DB-server&amp;severity=medium&amp;id=689d2ef7ad5a09ad00555d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8929-sql-injection-in-code-projects-medic-54573fba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8929%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d0f0cad5a09ad005499d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8928-sql-injection-in-code-projects-medic-79cb31f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8928%3A%20SQL%20Injection%20in%20code-projects%20Medical%20Store%20Management%20System&amp;severity=medium&amp;id=689d0f0cad5a09ad005499cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34154-cwe-22-improper-limitation-of-a-pat-cc3a8585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34154%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synergetic%20Data%20Systems%20Inc.%20UnForm%20Server%20Manager&amp;severity=critical&amp;id=689d00fdad5a09ad0053f3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8927-improper-restriction-of-excessive-au-c6329f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8927%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20mtons%20mblog&amp;severity=medium&amp;id=689cf2f0ad5a09ad005233c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacking-video-surveillance-platforms-cc1fb9f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacking%20Video%20Surveillance%20Platforms&amp;severity=medium&amp;id=689cef6ead5a09ad0052269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8926-sql-injection-in-sourcecodester-covi-f6c93359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8926%3A%20SQL%20Injection%20in%20SourceCodester%20COVID%2019%20Testing%20Management%20System&amp;severity=medium&amp;id=689cebe6ad5a09ad0051ed12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8925-sql-injection-in-itsourcecode-sports-ef8fa353</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8925%3A%20SQL%20Injection%20in%20itsourcecode%20Sports%20Management%20System&amp;severity=medium&amp;id=689ce4dead5a09ad0051c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8924-sql-injection-in-campcodes-online-wa-d5883ae1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8924%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Water%20Billing%20System&amp;severity=medium&amp;id=689ce4dead5a09ad0051c025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8923-sql-injection-in-code-projects-job-d-2bccc7d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8923%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=689cddd6ad5a09ad00518747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8922-sql-injection-in-code-projects-job-d-c4085849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8922%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=689cddd6ad5a09ad00518740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/efimer-trojan-steals-crypto-hacks-wordpress-sites--1f54905d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Efimer%20Trojan%20Steals%20Crypto%2C%20Hacks%20WordPress%20Sites%20via%20Torrents%20and%20Phishing&amp;severity=medium&amp;id=689cd6caad5a09ad0050617f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8921-sql-injection-in-code-projects-job-d-ba86c510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8921%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=689cd6f1ad5a09ad0051017b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8920-cross-site-scripting-in-portabilis-i-1a549b19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8920%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=689cd6f1ad5a09ad00510175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoom-and-xerox-release-critical-security-updates-f-86d74e10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoom%20and%20Xerox%20Release%20Critical%20Security%20Updates%20Fixing%20Privilege%20Escalation%20and%20RCE%20Flaws&amp;severity=critical&amp;id=689ccfc4ad5a09ad004fb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8754-cwe-306-missing-authentication-for-c-8cf667a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8754%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20ABB%20AbilityTM%20zenon&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23306-cwe-94-improper-control-of-generati-f9a0b6cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23306%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23305-cwe-94-improper-control-of-generati-ed4ac8a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23305%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron-LM&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8919-cross-site-scripting-in-portabilis-i-5f7ac2b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8919%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=689ccfdaad5a09ad004fb50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23298-cwe-94-improper-control-of-generati-6c0d4749</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23298%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Merlin%20Transformers4Rec&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23296-cwe-94-improper-control-of-generati-8f058708</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23296%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Isaac-GR00T%20N1&amp;severity=high&amp;id=689ccfdaad5a09ad004fb4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23295-cwe-94-improper-control-of-generati-bd23c690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23295%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20Apex&amp;severity=high&amp;id=689ccc41ad5a09ad004f80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23304-cwe-22-improper-limitation-of-a-pat-7e9ad0d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23304%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=689ccc41ad5a09ad004f80ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23303-cwe-502-deserialization-of-untruste-8a831eb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23303%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=689ccc41ad5a09ad004f80e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23294-cwe-78-improper-neutralization-of-s-6d6323f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23294%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NVIDIA%20NVIDIA%20WebDataset&amp;severity=high&amp;id=689cc8bead5a09ad004f5c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8904-cwe-257-storing-passwords-in-a-recov-43468dee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8904%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Amazon%20EMR&amp;severity=critical&amp;id=689cc8bead5a09ad004f5c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2184-cwe-1392-use-of-default-credentials--0b59e6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2184%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=689cc8bead5a09ad004f5ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2183-cwe-295-improper-certificate-validat-fbf01346</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2183%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=689cc8bead5a09ad004f5ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2182-cwe-312-cleartext-storage-of-sensiti-9a433600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2182%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2181-cwe-312-cleartext-storage-of-sensiti-bf78efaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2181%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Checkov%20by%20Prisma%20Cloud&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2180-cwe-502-deserialization-of-untrusted-8ef59b9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2180%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Palo%20Alto%20Networks%20Checkov%20by%20Prisma%20Cloud&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coordinated-brute-force-campaign-targets-fortinet--a50c31f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coordinated%20Brute%20Force%20Campaign%20Targets%20Fortinet%20SSL%20VPN&amp;severity=medium&amp;id=689cc8bdad5a09ad004f5c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34153-cwe-502-deserialization-of-untruste-22045679</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34153%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hyland%20Software%20OnBase&amp;severity=critical&amp;id=689cc539ad5a09ad004e1a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-in-xerox-freeflow-core-d31069b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=689cc1b9ad5a09ad004d449a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/distribution-of-smartloader-malware-via-github-rep-82cf3176</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Distribution%20of%20SmartLoader%20Malware%20via%20Github%20Repository%20Disguised%20as%20a%20Legitimate%20Project&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8918-cross-site-scripting-in-portabilis-i-8548173e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8918%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=689cb3abad5a09ad00459e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-helpful-ai-assistants-are-accidentally-destroy-8d9fffa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20%22helpful%22%20AI%20assistants%20are%20accidentally%20destroying%20production%20systems%20-%20and%20what%20we&apos;re%20doing%20about%20it.&amp;severity=medium&amp;id=689cb028ad5a09ad00455e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53859-cwe-125-out-of-bounds-read-in-f5-ng-4de1db12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53859%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20NGINX%20Plus&amp;severity=low&amp;id=689ca919ad5a09ad004493fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54500-cwe-770-allocation-of-resources-wit-fe0677e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54500%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=689ca919ad5a09ad00449401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48500-cwe-353-missing-support-for-integri-0b1c9cb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48500%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20F5%20BIG-IP%20Edge%20Client&amp;severity=high&amp;id=689ca919ad5a09ad004493f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46405-cwe-121-stack-based-buffer-overflow-7022220a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46405%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20F5%20BIG-IP&amp;severity=high&amp;id=689ca919ad5a09ad004493f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52585-cwe-476-null-pointer-dereference-in-513875d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52585%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=689ca919ad5a09ad004493fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54809-cwe-295-improper-certificate-valida-1b2e1490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54809%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20F5%20F5%20Access&amp;severity=high&amp;id=689ca919ad5a09ad00449404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8941-improper-limitation-of-a-pathname-to-08065748</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8941%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=689ca59aad5a09ad00442ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-asks-users-to-ignore-certificate-enrollm-ff1bf6a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20asks%20users%20to%20ignore%20certificate%20enrollment%20errors&amp;severity=high&amp;id=689c9e8aad5a09ad00424868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-brute-force-campaign-hits-fortinet-ssl-vpn-in--2195a749</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Brute-Force%20Campaign%20Hits%20Fortinet%20SSL%20VPN%20in%20Coordinated%20Attack&amp;severity=medium&amp;id=689c9e8aad5a09ad0042486c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54791-cwe-209-generation-of-error-message-ef0333d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54791%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ome%20omero-web&amp;severity=medium&amp;id=689c9edbad5a09ad00424b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32451-cwe-824-access-of-uninitialized-poi-567d116c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32451%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=689c9784ad5a09ad00420ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54382-cwe-78-improper-neutralization-of-s-8c98ac63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=critical&amp;id=689c9784ad5a09ad00420caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54074-cwe-78-improper-neutralization-of-s-11a7ca34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54074%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=high&amp;id=689c9784ad5a09ad00420ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55668-cwe-384-session-fixation-in-apache--9dd5da2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55668%3A%20CWE-384%20Session%20Fixation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=689c9400ad5a09ad0041cfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8908-sql-injection-in-shanghai-lingdang-i-72d57eee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8908%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=689c907cad5a09ad0041bfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8907-execution-with-unnecessary-privilege-93244b1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8907%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20H3C%20M2%20NAS&amp;severity=high&amp;id=689c907cad5a09ad0041bfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48989-cwe-404-improper-resource-shutdown--3351873c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48989%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=689c826dad5a09ad00415599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8671-cwe-404-improper-resource-shutdown-o-5d85bfa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8671%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools&amp;severity=high&amp;id=689c826dad5a09ad0041559c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-watcher-dissecting-cmimai-stealers-vbs-payl-a2206915</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Watcher%3A%20Dissecting%20Cmimai%20Stealer&apos;s%20VBS%20Payload&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-analysis-dadf5238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Analysis&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-dark-side-of-parental-control-apps-28515be6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Dark%20Side%20of%20Parental%20Control%20Apps&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-a-web3-interview-scam-780e1417</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20a%20Web3%20Interview%20Scam&amp;severity=medium&amp;id=689cb3a4ad5a09ad00459d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55280-cwe-312-cleartext-storage-of-sensit-06e4e6c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55280%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=medium&amp;id=689c7b65ad5a09ad0040f1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-minecraft-installer-is-spreading-njrat-spywar-4ce404bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Minecraft%20Installer%20is%20Spreading%20NjRat%20Spyware%20to%20Steal%20Data&amp;severity=medium&amp;id=689c77e4ad5a09ad0040d3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55279-cwe-798-use-of-hard-coded-credentia-5b90fa5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55279%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=medium&amp;id=689c7805ad5a09ad0040d55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54465-cwe-798-use-of-hard-coded-credentia-a259790e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54465%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=medium&amp;id=689c7805ad5a09ad0040d55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54464-cwe-312-cleartext-storage-of-sensit-c136070e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54464%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20ZKTeco%20Co%20WL20%20Biometric%20Attendance%20System&amp;severity=high&amp;id=689c745dad5a09ad0040acab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-brings-back-real-trojan-horse-malware-fd8fec13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI%20brings%20back%20real%20trojan%20horse%20malware&amp;severity=medium&amp;id=689cac9cad5a09ad00451d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8916-cwe-770-allocation-of-resources-with-01383f04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8916%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC%20Java&amp;severity=medium&amp;id=689c5f46ad5a09ad00402965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8914-cwe-89-improper-neutralization-of-sp-16a4e72a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8914%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=high&amp;id=689c5bc4ad5a09ad0040166c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8913-cwe-98-improper-control-of-filename--20652322</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8913%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=critical&amp;id=689c5bc4ad5a09ad00401668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8912-cwe-36-absolute-path-traversal-in-we-fca36166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8912%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=high&amp;id=689c5bc4ad5a09ad00401664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8911-cwe-79-improper-neutralization-of-in-4d870eea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=medium&amp;id=689c583dad5a09ad004003da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8910-cwe-79-improper-neutralization-of-in-10b8a88a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=medium&amp;id=689c583dad5a09ad004003d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8909-cwe-36-absolute-path-traversal-in-we-f297bc79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8909%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WellChoose%20Organization%20Portal%20System&amp;severity=medium&amp;id=689c583dad5a09ad004003d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/docker-hub-still-hosts-dozens-of-linux-images-with-3913913a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Docker%20Hub%20still%20hosts%20dozens%20of%20Linux%20images%20with%20the%20XZ%20backdoor&amp;severity=high&amp;id=689c54b7ad5a09ad003fe967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/charon-ransomware-hits-middle-east-sectors-using-a-665ed829</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Charon%20Ransomware%20Hits%20Middle%20East%20Sectors%20Using%20APT-Level%20Evasion%20Tactics&amp;severity=high&amp;id=689c54b7ad5a09ad003fe963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-28m-sensitive-records-from-allianz-li-873f0e0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20leak%202.8M%20sensitive%20records%20from%20Allianz%20Life%20in%20Salesforce%20data%20breach&amp;severity=high&amp;id=689c54b7ad5a09ad003fe96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55345-cwe-61-unix-symbolic-link-symlink-f-e970b996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55345%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&amp;severity=high&amp;id=689c5514ad5a09ad003fea5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6184-cwe-89-improper-neutralization-of-sp-569bdd32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6184%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=689c3519ad5a09ad003f21b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8761-denial-of-service-in-instar-2k-dc79acd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8761%3A%20Denial%20of%20Service%20in%20INSTAR%202K%2B&amp;severity=high&amp;id=689c3192ad5a09ad003f0635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8762-improper-physical-access-control-in--c5ce7100</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8762%3A%20Improper%20Physical%20Access%20Control%20in%20INSTAR%202K%2B&amp;severity=high&amp;id=689c3192ad5a09ad003f063a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8760-buffer-overflow-in-instar-2k-137e2265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8760%3A%20Buffer%20Overflow%20in%20INSTAR%202K%2B&amp;severity=critical&amp;id=689c3192ad5a09ad003f0630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6715-cwe-22-improper-limitation-of-a-path-a43f5424</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6715%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LatePoint&amp;severity=critical&amp;id=689c2acaad5a09ad003ec5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7384-cwe-502-deserialization-of-untrusted-b1821a6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7384%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=critical&amp;id=689c18f7ad5a09ad003e6af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0818-cwe-22-improper-limitation-of-a-path-dcfb5cc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0818%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=medium&amp;id=689c0e6dad5a09ad003e38d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8491-cwe-352-cross-site-request-forgery-c-0c62a6e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8491%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nikelschubert%20Easy%20restaurant%20menu%20manager&amp;severity=medium&amp;id=689c0e6dad5a09ad003e38da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8882-use-after-free-in-google-chrome-dedaeb3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8882%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8881-inappropriate-implementation-in-goog-b8782bf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8881%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=689c03dead5a09ad003dddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8901-out-of-bounds-write-in-google-chrome-de3ead85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8901%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8880-race-in-google-chrome-b95d6f52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8880%3A%20Race%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8879-heap-buffer-overflow-in-google-chrom-7c4954b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8879%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=689c03dead5a09ad003dddc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4410-cwe-20-improper-input-validation-in--03f709d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4410%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=689bf952ad5a09ad003d402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4277-cwe-20-improper-input-validation-in--604f54ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4277%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=689bf24aad5a09ad003c84d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4276-cwe-20-improper-input-validation-in--97d8271f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4276%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=689bf24aad5a09ad003c84cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50610-na-17877a74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50610%3A%20n%2Fa&amp;severity=high&amp;id=689d2ef7ad5a09ad00555d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50609-na-287e820b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50609%3A%20n%2Fa&amp;severity=high&amp;id=689d2ef7ad5a09ad00555d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50608-na-1f46f03f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50608%3A%20n%2Fa&amp;severity=high&amp;id=689d2ef7ad5a09ad00555d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-13-1bb98a65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-13&amp;severity=medium&amp;id=689d2b1ead5a09ad00551b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43988-na-708ed391</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43988%3A%20n%2Fa&amp;severity=high&amp;id=689cef6aad5a09ad00522678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43986-na-77e26f1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43986%3A%20n%2Fa&amp;severity=critical&amp;id=689cebe6ad5a09ad0051ed0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43982-na-e21d7b77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43982%3A%20n%2Fa&amp;severity=critical&amp;id=689ce862ad5a09ad0051cfa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43989-na-a1e5dfd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43989%3A%20n%2Fa&amp;severity=medium&amp;id=689ce4dead5a09ad0051c01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45313-na-0eb6c1db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45313%3A%20n%2Fa&amp;severity=medium&amp;id=689cda51ad5a09ad00516017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45316-na-574f4fcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45316%3A%20n%2Fa&amp;severity=medium&amp;id=689cd6f1ad5a09ad0051016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45314-na-0451a8dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45314%3A%20n%2Fa&amp;severity=medium&amp;id=689cd6f1ad5a09ad00510169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45317-na-18d2ef3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45317%3A%20n%2Fa&amp;severity=medium&amp;id=689ccfdaad5a09ad004fb507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45315-na-0c6772f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45315%3A%20n%2Fa&amp;severity=medium&amp;id=689ccfdaad5a09ad004fb501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50617-na-467a4174</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50617%3A%20n%2Fa&amp;severity=high&amp;id=689ccc41ad5a09ad004f80ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50946-na-59d4bd8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50946%3A%20n%2Fa&amp;severity=medium&amp;id=689cc8bead5a09ad004f5c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50616-na-efbf36c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50616%3A%20n%2Fa&amp;severity=high&amp;id=689cc8bead5a09ad004f5c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50615-na-b165a170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50615%3A%20n%2Fa&amp;severity=high&amp;id=689cc8bead5a09ad004f5c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52385-na-505f70db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52385%3A%20n%2Fa&amp;severity=critical&amp;id=689cc539ad5a09ad004e1a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50594-na-e8ae90fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50594%3A%20n%2Fa&amp;severity=critical&amp;id=689cc1b5ad5a09ad004d447e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51451-na-e82f6822</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51451%3A%20n%2Fa&amp;severity=critical&amp;id=689cbe31ad5a09ad004cf66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50614-na-e43e1a0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50614%3A%20n%2Fa&amp;severity=high&amp;id=689cb72aad5a09ad0046ad6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50613-na-6cfae73b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50613%3A%20n%2Fa&amp;severity=high&amp;id=689cb3abad5a09ad00459e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50612-na-28510861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50612%3A%20n%2Fa&amp;severity=high&amp;id=689cb3abad5a09ad00459e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51452-na-2b3b87e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51452%3A%20n%2Fa&amp;severity=critical&amp;id=689cb024ad5a09ad00455e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50611-na-a51676bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50611%3A%20n%2Fa&amp;severity=high&amp;id=689cb024ad5a09ad00455e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50635-na-d1bde01c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50635%3A%20n%2Fa&amp;severity=high&amp;id=689caca5ad5a09ad00451eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50251-na-547923c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50251%3A%20n%2Fa&amp;severity=critical&amp;id=689caca5ad5a09ad00451eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50690-na-8436775b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50690%3A%20n%2Fa&amp;severity=medium&amp;id=689ca59aad5a09ad00442efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51691-na-26419e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51691%3A%20n%2Fa&amp;severity=medium&amp;id=689ca21ead5a09ad00426558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52392-na-a10a8c9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52392%3A%20n%2Fa&amp;severity=medium&amp;id=689c9edbad5a09ad00424b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52386-na-9c727a0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52386%3A%20n%2Fa&amp;severity=medium&amp;id=689c9edbad5a09ad00424b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-tuesday-microsoft-fixes-107-vulnerabilities--98c421f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%20Tuesday%3A%20Microsoft%20Fixes%20107%20Vulnerabilities%2C%20Including%2013%20Critical%20RCE%20Flaws&amp;severity=critical&amp;id=689bc817ad5a09ad00374935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49457-cwe-426-untrusted-search-path-in-zo-05f9882e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49457%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Zoom%20Communications%20Inc%20Zoom%20Clients%20for%20Windows&amp;severity=critical&amp;id=689bc82dad5a09ad00374a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49456-cwe-426-untrusted-search-path-in-zo-21cc3ed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49456%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Zoom%20Communications%20Inc%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=689bc82dad5a09ad00374a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54238-out-of-bounds-read-cwe-125-in-adobe-36da3cce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54238%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=689bc496ad5a09ad003740f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54233-out-of-bounds-read-cwe-125-in-adobe-3707c52f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54233%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=689bc112ad5a09ad00373603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54230-use-after-free-cwe-416-in-adobe-ado-652b1910</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54230%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad003735fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54232-use-after-free-cwe-416-in-adobe-ado-674b6da0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54232%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad00373600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54231-use-after-free-cwe-416-in-adobe-ado-03681cde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54231%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad003735fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54229-use-after-free-cwe-416-in-adobe-ado-927c7838</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54229%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=689bc112ad5a09ad003735f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54222-out-of-bounds-write-cwe-787-in-adob-3e5c2579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54222%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=689bdd96ad5a09ad0039b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malvertising-campaign-leads-to-ps1bot-a-multi-stag-1a526a17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malvertising%20campaign%20leads%20to%20PS1Bot%2C%20a%20multi-stage%20malware%20framework&amp;severity=medium&amp;id=689c69d2ad5a09ad00406958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/challenge-for-human-and-ai-reverse-engineers-15275ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Challenge%20for%20human%20and%20AI%20reverse%20engineers&amp;severity=medium&amp;id=689baf83ad5a09ad0036d786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54216-out-of-bounds-write-cwe-787-in-adob-58ec4e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54216%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54217-heap-based-buffer-overflow-cwe-122--20a4a1de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54217%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54215-out-of-bounds-write-cwe-787-in-adob-a09384e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54215%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54218-out-of-bounds-write-cwe-787-in-adob-71763fee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54218%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54223-use-after-free-cwe-416-in-adobe-inc-b2fa7143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54223%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54219-heap-based-buffer-overflow-cwe-122--316ac7d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54219%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54221-out-of-bounds-write-cwe-787-in-adob-411a6256</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54221%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54220-heap-based-buffer-overflow-cwe-122--8a17371e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54220%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=689bdd96ad5a09ad0039b309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54211-heap-based-buffer-overflow-cwe-122--b7197007</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54211%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54207-access-of-uninitialized-pointer-cwe-ad52ea06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54207%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54214-out-of-bounds-read-cwe-125-in-adobe-1d750332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54214%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=689bac14ad5a09ad0036c6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54224-use-after-free-cwe-416-in-adobe-ind-3f6ffa69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54224%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54213-out-of-bounds-write-cwe-787-in-adob-e84a9fab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54213%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54210-out-of-bounds-write-cwe-787-in-adob-5466e406</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54210%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54225-use-after-free-cwe-416-in-adobe-ind-83277aeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54225%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54209-heap-based-buffer-overflow-cwe-122--f9477503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54209%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54208-out-of-bounds-write-cwe-787-in-adob-c4bc0e64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54208%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54227-out-of-bounds-read-cwe-125-in-adobe-30f27a2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54227%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=689bac14ad5a09ad0036c6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54228-out-of-bounds-read-cwe-125-in-adobe-9fb5b60f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54228%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=689bac14ad5a09ad0036c6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54226-use-after-free-cwe-416-in-adobe-ind-3f6792d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54226%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54212-heap-based-buffer-overflow-cwe-122--631ea780</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54212%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54206-out-of-bounds-write-cwe-787-in-adob-a5f184b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54206%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=689bac14ad5a09ad0036c695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55165-cwe-200-exposure-of-sensitive-infor-221e1d26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55165%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gelbphoenix%20autocaliweb&amp;severity=high&amp;id=689bac14ad5a09ad0036c6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54205-out-of-bounds-read-cwe-125-in-adobe-a6124ee6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54205%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54188-out-of-bounds-read-cwe-125-in-adobe-8d1e009c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54188%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54193-out-of-bounds-read-cwe-125-in-adobe-89b5557e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54193%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54194-out-of-bounds-read-cwe-125-in-adobe-b1f373c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54194%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54187-out-of-bounds-write-cwe-787-in-adob-b3e94e4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54187%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=689bac15ad5a09ad0036c6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54190-out-of-bounds-read-cwe-125-in-adobe-41dce1ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54190%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54191-out-of-bounds-read-cwe-125-in-adobe-1a46c98c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54191%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54195-out-of-bounds-read-cwe-125-in-adobe-d0d0d1b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54195%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54189-out-of-bounds-read-cwe-125-in-adobe-e5d16c52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54189%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54192-out-of-bounds-read-cwe-125-in-adobe-5f4e6fb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54192%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=medium&amp;id=689bac15ad5a09ad0036c6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49573-out-of-bounds-write-cwe-787-in-adob-dcbe94b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49573%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=689ba87aad5a09ad00367c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49572-out-of-bounds-write-cwe-787-in-adob-78dc13cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49572%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=689ba87aad5a09ad00367c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54197-out-of-bounds-read-cwe-125-in-adobe-20bdff6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54197%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54186-out-of-bounds-read-cwe-125-in-adobe-eb0f173a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54186%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54235-out-of-bounds-read-cwe-125-in-adobe-41b7c906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54235%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87bad5a09ad00367c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54203-out-of-bounds-read-cwe-125-in-adobe-8983661a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54203%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87bad5a09ad00367c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54200-out-of-bounds-read-cwe-125-in-adobe-546b0b32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54200%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54204-out-of-bounds-read-cwe-125-in-adobe-4d2f653d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54204%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87bad5a09ad00367c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49571-uncontrolled-search-path-element-cw-a9aba36c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49571%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=689ba87aad5a09ad00367c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54202-out-of-bounds-read-cwe-125-in-adobe-11de5548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54202%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54199-out-of-bounds-read-cwe-125-in-adobe-23e848bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54199%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54201-out-of-bounds-read-cwe-125-in-adobe-106d1aab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54201%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54198-out-of-bounds-read-cwe-125-in-adobe-39fb3ae1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54198%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=medium&amp;id=689ba87aad5a09ad00367c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49570-out-of-bounds-write-cwe-787-in-adob-df627192</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49570%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=689ba87bad5a09ad00367c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49562-use-after-free-cwe-416-in-adobe-ani-a5e5d097</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49562%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=689ba87bad5a09ad00367c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49561-use-after-free-cwe-416-in-adobe-ani-b2d1660e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49561%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=689ba87bad5a09ad00367c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55171-cwe-287-improper-authentication-in--dff5552c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55171%3A%20CWE-287%3A%20Improper%20Authentication%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=689ba4f3ad5a09ad0036643d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55170-cwe-79-improper-neutralization-of-i-31a627a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55170%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=689ba4f3ad5a09ad00366438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49569-out-of-bounds-write-cwe-787-in-adob-7b5e1be9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49569%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=689ba16fad5a09ad0036580a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49560-heap-based-buffer-overflow-cwe-122--32b60b11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49560%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=689ba16fad5a09ad00365807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36000-cwe-79-improper-neutralization-of-i-2affcc32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=689b9a79ad5a09ad00360d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-govt-seizes-1-million-in-crypto-from-blacksuit--002f60c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20govt%20seizes%20%241%20million%20in%20crypto%20from%20BlackSuit%20ransomware%20gang&amp;severity=high&amp;id=689b9a67ad5a09ad00360ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connex-credit-union-data-breach-affects-172000-mem-a8ea725c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Connex%20Credit%20Union%20Data%20Breach%20Affects%20172%2C000%20Members&amp;severity=high&amp;id=689b96dfad5a09ad0035f8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55169-cwe-287-improper-authentication-in--273fe010</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55169%3A%20CWE-287%3A%20Improper%20Authentication%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=689b935ead5a09ad0035dc82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47857-execute-unauthorized-code-or-comman-50c9db25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47857%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32932-execute-unauthorized-code-or-comman-4a26cce5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32932%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSOAR&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27759-escalation-of-privilege-in-fortinet-55048f34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27759%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26009-execute-unauthorized-code-or-comman-267a9481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26009%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=69a0a1cc85912abc71d0bd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25248-denial-of-service-in-fortinet-forti-53242cf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25248%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52970-improper-access-control-in-fortinet-fdbbb4b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52970%3A%20Improper%20access%20control%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=689b8fe3ad5a09ad0035cd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53744-escalation-of-privilege-in-fortinet-0e621602</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53744%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49813-execute-unauthorized-code-or-comman-44c621ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49813%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32766-execute-unauthorized-code-or-comman-2b2c56c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32766%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25256-escalation-of-privilege-in-fortinet-e4ebd72a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25256%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=689b8fe3ad5a09ad0035cd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40588-improper-access-control-in-fortinet-69bb0791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40588%3A%20Improper%20access%20control%20in%20Fortinet%20FortiCamera&amp;severity=medium&amp;id=68f0c1e29f8a5dbaeac5cdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55168-cwe-89-improper-neutralization-of-s-39e8fadf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55168%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=689b8fe3ad5a09ad0035cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/click-to-allow-robot-exposes-online-fraud-empire-c99a78be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Click%20to%20Allow%22%20Robot%20Exposes%20Online%20Fraud%20Empire&amp;severity=medium&amp;id=689b96f2ad5a09ad0035fe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43734-cwe-79-improper-neutralization-of-i-bc5c7fd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36124-cwe-268-privilege-chaining-in-ibm-w-bdbe1ff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36124%3A%20CWE-268%20Privilege%20Chaining%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=689b8fe3ad5a09ad0035cdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49556-incorrect-authorization-cwe-863-in--33cb4ce1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49556%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad0035539f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49557-cross-site-scripting-stored-xss-cwe-25f8182c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49557%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad003553a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49558-time-of-check-time-of-use-toctou-ra-e10c7d90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49558%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20(CWE-367)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=689b81cbad5a09ad003553a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49554-improper-input-validation-cwe-20-in-83c46798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49554%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad00355399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49559-improper-limitation-of-a-pathname-t-a412ecc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49559%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=689b81cbad5a09ad003553a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49555-cross-site-request-forgery-csrf-cwe-a68584b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20(CWE-352)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=689b81cbad5a09ad0035539c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20044-escalation-of-privilege-in-intelr-t-8c503590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20044%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20TDX%20Module%20firmware&amp;severity=medium&amp;id=689b7e46ad5a09ad00354154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49736-cwe-449-the-ui-performs-the-wrong-a-b5bdaf06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49736%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=689b7749ad5a09ad003490fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49712-cwe-502-deserialization-of-untruste-78cb958e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49712%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=689b7749ad5a09ad003490fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49707-cwe-284-improper-access-control-in--2108c71c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49707%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20DCadsv5-series%20Azure%20VM&amp;severity=high&amp;id=689b7749ad5a09ad003490f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49755-cwe-451-user-interface-ui-misrepres-e7cb7c32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49755%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=689b774aad5a09ad00349113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48807-cwe-923-improper-restriction-of-com-c1c3a913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48807%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=689b7749ad5a09ad003490f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53793-cwe-287-improper-authentication-in--4914ec3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53793%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Azure%20Stack%20Hub%202406&amp;severity=high&amp;id=689b774fad5a09ad003492a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53789-cwe-306-missing-authentication-for--7a96917a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53789%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774fad5a09ad003492a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53788-cwe-367-time-of-check-time-of-use-t-8ea76a97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53788%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%20Subsystem%20for%20Linux%20(WSL2)&amp;severity=high&amp;id=689b774fad5a09ad0034929d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53784-cwe-416-use-after-free-in-microsoft-f9b29849</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53784%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774fad5a09ad0034929a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53783-cwe-122-heap-based-buffer-overflow--7cf9177e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53783%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Teams%20for%20Android&amp;severity=high&amp;id=689b774fad5a09ad00349297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53779-cwe-23-relative-path-traversal-in-m-d40c443a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53779%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=689b774ead5a09ad00349287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53778-cwe-287-improper-authentication-in--cf4cee80</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53778%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774ead5a09ad00349284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50155-cwe-843-access-of-resource-using-in-602f4127</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50155%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50157-cwe-908-use-of-uninitialized-resour-40affe9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50157%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774aad5a09ad0034913b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53769-cwe-73-external-control-of-file-nam-189e07ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53769%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Security%20App&amp;severity=medium&amp;id=689b774ead5a09ad0034927b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53766-cwe-122-heap-based-buffer-overflow--2403cc3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53766%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=critical&amp;id=689b774ead5a09ad00349278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53765-cwe-359-exposure-of-private-persona-aff58104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53765%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=medium&amp;id=689b774ead5a09ad00349275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53740-cwe-416-use-after-free-in-microsoft-09cf7b85</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53740%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034925c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53739-cwe-843-access-of-resource-using-in-813f2211</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53739%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53738-cwe-416-use-after-free-in-microsoft-12d7ba63</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53738%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53737-cwe-122-heap-based-buffer-overflow--f90cbedc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53737%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53736-cwe-126-buffer-over-read-in-microso-37b341bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53736%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=689b774ead5a09ad00349250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53735-cwe-416-use-after-free-in-microsoft-58543784</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034924d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53734-cwe-416-use-after-free-in-microsoft-c3139b6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53734%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034924a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53733-cwe-681-incorrect-conversion-betwee-40b2394f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53733%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53732-cwe-122-heap-based-buffer-overflow--951dcfee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53732%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=689b774ead5a09ad00349244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53731-cwe-416-use-after-free-in-microsoft-5f07bba3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53731%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774dad5a09ad00349221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47954-cwe-89-improper-neutralization-of-s-370ef31c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47954%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(CU%2020)&amp;severity=high&amp;id=689b7749ad5a09ad003490f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53728-cwe-200-exposure-of-sensitive-infor-7cf7c819</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53728%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=689b774dad5a09ad00349218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53726-cwe-843-access-of-resource-using-in-41ce18ea</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53726%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad00349212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53725-cwe-843-access-of-resource-using-in-3c9cb624</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53725%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad0034920f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53724-cwe-843-access-of-resource-using-in-5032c757</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53724%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad0034920c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53723-cwe-197-numeric-truncation-error-in-249d85a1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53723%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad00349209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53722-cwe-400-uncontrolled-resource-consu-e0301c36</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53722%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774dad5a09ad00349206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53721-cwe-416-use-after-free-in-microsoft-f25122a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53721%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774cad5a09ad003491f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53720-cwe-122-heap-based-buffer-overflow--8e900ff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53720%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774cad5a09ad003491f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53719-cwe-908-use-of-uninitialized-resour-c46f1bcb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53719%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774cad5a09ad003491f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53718-cwe-416-use-after-free-in-microsoft-9745be7f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53718%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53716-cwe-476-null-pointer-dereference-in-08328e51</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53716%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=689b774cad5a09ad003491ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53156-cwe-200-exposure-of-sensitive-infor-f0b026c7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53156%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=689b774cad5a09ad003491ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53155-cwe-122-heap-based-buffer-overflow--36f51fdc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53155%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53154-cwe-476-null-pointer-dereference-in-17e969a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53154%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53153-cwe-908-use-of-uninitialized-resour-5b1e072d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53153%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774cad5a09ad003491e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53152-cwe-416-use-after-free-in-microsoft-34654ac9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53152%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53151-cwe-416-use-after-free-in-microsoft-8640c5b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53151%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774cad5a09ad003491d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53149-cwe-122-heap-based-buffer-overflow--2a9ed5ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53149%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53148-cwe-908-use-of-uninitialized-resour-a7afba70</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53148%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774cad5a09ad003491cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53147-cwe-416-use-after-free-in-microsoft-d2e2921d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53147%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53145-cwe-843-access-of-resource-using-in-5d2d6947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53145%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53144-cwe-843-access-of-resource-using-in-afcd81b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53144%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53143-cwe-843-access-of-resource-using-in-cae240b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53143%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53142-cwe-416-use-after-free-in-microsoft-27c83330</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53142%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=689b774cad5a09ad003491bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53141-cwe-476-null-pointer-dereference-in-ab4a40dd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53141%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53140-cwe-416-use-after-free-in-microsoft-0b6032ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53140%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774cad5a09ad003491b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53138-cwe-908-use-of-uninitialized-resour-92bc176f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53138%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774bad5a09ad003491a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53137-cwe-416-use-after-free-in-microsoft-bee66659</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53137%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad003491a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53136-cwe-200-exposure-of-sensitive-infor-8c2aee8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53136%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774bad5a09ad003491a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53135-cwe-362-concurrent-execution-using--66b63ee5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53135%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad003491a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53134-cwe-367-time-of-check-time-of-use-t-8dd03f57</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53134%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad0034919d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53133-cwe-416-use-after-free-in-microsoft-61e6174a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53133%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=689b774bad5a09ad0034919a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53132-cwe-362-concurrent-execution-using--9e108f85</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53132%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad00349197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53131-cwe-122-heap-based-buffer-overflow--7507adf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53131%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774bad5a09ad00349194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50177-cwe-416-use-after-free-in-microsoft-375ce91d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50177%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad00349191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50176-cwe-843-access-of-resource-using-in-2c05facb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50176%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=689b774bad5a09ad0034918e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50173-cwe-1390-weak-authentication-in-mic-e14c97d0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50173%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Multimedia%20Redirection%20Installer&amp;severity=high&amp;id=689b774bad5a09ad00349181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50172-cwe-770-allocation-of-resources-wit-82cd671b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50172%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=689b774bad5a09ad0034917e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50171-cwe-862-missing-authorization-in-mi-52cb06a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50171%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=critical&amp;id=689b774bad5a09ad0034917b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50170-cwe-280-improper-handling-of-insuff-4edbdc99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50170%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=689b774bad5a09ad00349178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50169-cwe-362-concurrent-execution-using--d2d77814</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50169%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=689b774bad5a09ad00349175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50168-cwe-843-access-of-resource-using-in-4127baf0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50168%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=689b774bad5a09ad00349172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50167-cwe-362-concurrent-execution-using--170ca208</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50167%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774bad5a09ad0034916f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50166-cwe-190-integer-overflow-or-wraparo-32adb440</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50166%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774bad5a09ad0034916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50165-cwe-822-untrusted-pointer-dereferen-91ddcf3a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50165%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=critical&amp;id=689b774bad5a09ad00349169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50164-cwe-122-heap-based-buffer-overflow--d66dbf24</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50164%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774bad5a09ad00349166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50163-cwe-122-heap-based-buffer-overflow--3b330a3b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50163%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad0034914d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50162-cwe-122-heap-based-buffer-overflow--2af0d117</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50162%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad0034914a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50161-cwe-122-heap-based-buffer-overflow--144f0370</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50161%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50160-cwe-122-heap-based-buffer-overflow--b8e607d7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50160%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad00349144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50159-cwe-416-use-after-free-in-microsoft-622a3002</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50159%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50158-cwe-367-time-of-check-time-of-use-t-a2687bfd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50158%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad0034913e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50156-cwe-908-use-of-uninitialized-resour-214b14de</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50156%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=689b774aad5a09ad00349138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50154-cwe-200-exposure-of-sensitive-infor-ce2b4f73</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50154%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774aad5a09ad00349132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50153-cwe-416-use-after-free-in-microsoft-77fbbca5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50153%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49762-cwe-362-concurrent-execution-using--359e2da5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49762%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad00349122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49761-cwe-416-use-after-free-in-microsoft-24d29a97</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49761%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=689b774aad5a09ad0034911f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49759-cwe-89-improper-neutralization-of-s-0e51b6aa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49759%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b774aad5a09ad0034911c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49757-cwe-122-heap-based-buffer-overflow--ff162899</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49757%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=689b774aad5a09ad00349116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49743-cwe-362-concurrent-execution-using--2a201a68</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49743%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=689b774aad5a09ad0034910a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25007-cwe-1286-improper-validation-of-syn-5e355efb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25007%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=689b7749ad5a09ad003490eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25006-cwe-167-improper-handling-of-additi-ec4ab954</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25006%3A%20CWE-167%3A%20Improper%20Handling%20of%20Additional%20Special%20Element%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=689b7749ad5a09ad003490e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25005-cwe-20-improper-input-validation-in-6bca72dd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25005%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=689b7749ad5a09ad003490e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53781-cwe-200-exposure-of-sensitive-infor-8934641b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53781%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20DCadsv5-series%20Azure%20VM&amp;severity=high&amp;id=689b774fad5a09ad00349294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53773-cwe-77-improper-neutralization-of-s-57efa6b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53773%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.14&amp;severity=high&amp;id=689b774ead5a09ad00349281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53772-cwe-502-deserialization-of-untruste-80f7d624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53772%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Web%20Deploy%204.0&amp;severity=high&amp;id=689b774ead5a09ad0034927e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24999-cwe-284-improper-access-control-in--60ea7e26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24999%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b7749ad5a09ad003490e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53761-cwe-416-use-after-free-in-microsoft-dd5a138d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53761%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad00349272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53760-cwe-918-server-side-request-forgery-82af4e48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53760%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=689b774ead5a09ad0034926f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53759-cwe-908-use-of-uninitialized-resour-e45b53c4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53759%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034926c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53741-cwe-122-heap-based-buffer-overflow--9d6f0f2b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53741%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774ead5a09ad0034925f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53730-cwe-416-use-after-free-in-microsoft-7721a896</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=689b774dad5a09ad0034921e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33051-cwe-200-exposure-of-sensitive-infor-19c597f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33051%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=689b7749ad5a09ad003490ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53729-cwe-284-improper-access-control-in--5b72106e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53729%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20File%20Sync&amp;severity=high&amp;id=689b774dad5a09ad0034921b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53727-cwe-89-improper-neutralization-of-s-587c446a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53727%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b774dad5a09ad00349215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49758-cwe-269-improper-privilege-manageme-b99c718a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49758%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20Service%20Pack%203%20(GDR)&amp;severity=high&amp;id=689b774aad5a09ad00349119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49745-cwe-79-improper-neutralization-of-i-902734ca</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49745%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=689b774aad5a09ad0034910d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49751-cwe-820-missing-synchronization-in--1922540b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49751%3A%20CWE-820%3A%20Missing%20Synchronization%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=689b774aad5a09ad00349110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49563-out-of-bounds-write-cwe-787-in-adob-cf408496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49563%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=689b7752ad5a09ad00349393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49568-use-after-free-cwe-416-in-adobe-ill-815ab5c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49568%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=689b7752ad5a09ad0034939c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49564-stack-based-buffer-overflow-cwe-121-2b8eed68</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49564%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=689b7752ad5a09ad00349396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49567-null-pointer-dereference-cwe-476-in-ab8052f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49567%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=689b7752ad5a09ad00349399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32086-escalation-of-privilege-in-intelr-x-41773ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32086%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20Processors%20when%20using%20Intel(R)%20SGX%20or%20Intel(R)%20TDX&amp;severity=medium&amp;id=689b7752ad5a09ad00349390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32004-escalation-of-privilege-in-intelr-s-8efeb62a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32004%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20SGX%20SDK&amp;severity=low&amp;id=689b7752ad5a09ad0034938d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27717-escalation-of-privilege-in-intelr-g-afa86b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27717%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=689b7752ad5a09ad0034938a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27707-denial-of-service-in-edge-orchestra-7d0a6023</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27707%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=low&amp;id=689b7752ad5a09ad00349387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27576-denial-of-service-in-edge-orchestra-fee20531</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27576%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=low&amp;id=689b7752ad5a09ad00349384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27559-escalation-of-privilege-in-ai-playg-fb349eff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27559%3A%20Escalation%20of%20Privilege%20in%20AI%20Playground%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27537-escalation-of-privilege-in-edge-orc-173e6708</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27537%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27250-denial-of-service-in-edge-orchestra-6aa04e60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27250%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26863-denial-of-service-in-intelr-700-ser-f32e627b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26863%3A%20Denial%20of%20Service%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=medium&amp;id=689b7751ad5a09ad0034936e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26697-denial-of-service-in-intelr-700-ser-f2ee625c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26697%3A%20Denial%20of%20Service%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=medium&amp;id=689b7751ad5a09ad0034936b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26472-denial-of-service-in-edge-orchestra-c3337020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26472%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26470-escalation-of-privilege-in-intelr-d-ad6e978f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26470%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Distribution%20for%20Python%20software%20installers&amp;severity=medium&amp;id=689b7751ad5a09ad00349365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26404-escalation-of-privilege-in-intelr-d-9be16e41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26404%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20DSA%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26403-escalation-of-privilege-in-intelr-x-eeec4403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26403%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processors%20when%20using%20Intel(R)%20SGX%20or%20Intel(R)%20TDX&amp;severity=medium&amp;id=689b7751ad5a09ad0034935f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25273-escalation-of-privilege-in-intelr-7-0ac5f6fa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25273%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=high&amp;id=689b7751ad5a09ad0034935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24923-escalation-of-privilege-in-intelr-a-beeb36b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24923%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20AI%20for%20Enterprise%20Retrieval-augmented%20Generation%20software&amp;severity=medium&amp;id=689b7751ad5a09ad0034934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24921-information-disclosure-in-edge-orch-1621c739</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24921%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad0034934c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24840-escalation-of-privilege-in-edge-orc-710f4849</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24840%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software&amp;severity=low&amp;id=689b7751ad5a09ad00349349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24835-denial-of-service-in-intelr-arctm-b-c3d895f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24835%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc(TM)%20B-Series%20graphics&amp;severity=medium&amp;id=689b7751ad5a09ad00349346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24523-denial-of-service-in-edge-orchestra-70ff26d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24523%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24520-information-disclosure-in-intelr-lo-11521935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24520%3A%20Information%20Disclosure%20in%20Intel(R)%20Local%20Manageability%20Service%20software&amp;severity=medium&amp;id=689b7751ad5a09ad00349340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24515-denial-of-service-in-intelr-graphic-5888722a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24515%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=689b7751ad5a09ad0034933d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24511-information-disclosure-in-intelr-i3-7b3e2d5e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24511%3A%20Information%20Disclosure%20in%20Intel(R)%20I350%20Series%20Ethernet&amp;severity=low&amp;id=689b7751ad5a09ad0034933a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24486-escalation-of-privilege-in-intelr-7-6041b0c3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24486%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=high&amp;id=689b7751ad5a09ad00349337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24484-escalation-of-privilege-in-intelr-8-90414427</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24484%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7751ad5a09ad00349334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24325-escalation-of-privilege-in-intelr-8-25487632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24325%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=critical&amp;id=689b7750ad5a09ad00349327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24324-escalation-of-privilege-in-intelr-8-ef7bcb3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24324%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=low&amp;id=689b7750ad5a09ad00349324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24323-escalation-of-privilege-in-firmware-88be8f9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24323%3A%20Escalation%20of%20Privilege%20in%20firmware%20package%20and%20LED%20mode%20toggle%20tool%20for%20some%20Intel(R)%20PCIe%20Switch%20software&amp;severity=high&amp;id=689b7750ad5a09ad00349321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24313-denial-of-service-in-device-plugins-1211fae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24313%3A%20Denial%20of%20Service%20in%20Device%20Plugins%20for%20Kubernetes%20software%20maintained%20by%20Intel&amp;severity=medium&amp;id=689b7750ad5a09ad0034931e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24305-escalation-of-privilege-in-intelr-x-679d1c38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24305%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%20processors&amp;severity=high&amp;id=689b7750ad5a09ad0034931b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24303-escalation-of-privilege-in-intelr-8-915c2def</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24303%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad00349318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24302-escalation-of-privilege-in-tinycbor-412e3efc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24302%3A%20Escalation%20of%20Privilege%20in%20TinyCBOR%20libraries%20maintained%20by%20Intel(R)&amp;severity=medium&amp;id=689b7750ad5a09ad00349315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24296-denial-of-service-in-firmware-for-t-acd4603c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24296%3A%20Denial%20of%20Service%20in%20firmware%20for%20the%20Intel(R)%20E810%20Ethernet&amp;severity=medium&amp;id=689b7750ad5a09ad00349312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23241-denial-of-service-in-intelr-800-ser-5616f39a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23241%3A%20Denial%20of%20Service%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad0034930f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22893-escalation-of-privilege-in-intelr-8-d3a9be4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22893%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad0034930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22889-escalation-of-privilege-in-intelr-x-267d1af3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22889%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20with%20Intel(R)%20TDX&amp;severity=high&amp;id=689b7750ad5a09ad003492ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22853-escalation-of-privilege-in-intelr-t-03dee2dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22853%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20TDX&amp;severity=low&amp;id=689b7750ad5a09ad003492fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22840-escalation-of-privilege-in-intelr-x-37f66f66</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22840%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20Scalable%20processors&amp;severity=medium&amp;id=689b7750ad5a09ad003492f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22839-escalation-of-privilege-in-intelr-x-1443aa26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22839%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20Scalable%20processors&amp;severity=high&amp;id=689b7750ad5a09ad003492f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22838-escalation-of-privilege-in-intelr-r-ab841533</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22838%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20RealSense(TM)%20Dynamic%20Calibrator%20software&amp;severity=medium&amp;id=689b7750ad5a09ad003492f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22836-escalation-of-privilege-in-intelr-8-3364522a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22836%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b7750ad5a09ad003492f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22392-information-disclosure-in-intelr-am-c8263dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22392%3A%20Information%20Disclosure%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=medium&amp;id=689b7750ad5a09ad003492ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21096-escalation-of-privilege-in-intelr-t-14bafb73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21096%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20TDX&amp;severity=low&amp;id=689b7750ad5a09ad003492ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21093-escalation-of-privilege-in-intelr-d-a6318827</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21093%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Driver%20%26amp%3B%20Support%20Assistant%20Tool%20software&amp;severity=medium&amp;id=689b7750ad5a09ad003492e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21090-denial-of-service-in-intelr-xeonr-p-93956443</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21090%3A%20Denial%20of%20Service%20in%20Intel(R)%20Xeon(R)%20processors&amp;severity=medium&amp;id=689b7750ad5a09ad003492e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21086-escalation-of-privilege-in-intelr-7-e0940821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21086%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20700%20Series%20Ethernet&amp;severity=medium&amp;id=689b774fad5a09ad003492d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20627-escalation-of-privilege-in-intelr-o-1c00613a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20627%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20DPC%2B%2B%2FC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20625-denial-of-service-in-intelr-prosetw-d9229db3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20625%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=689b774fad5a09ad003492d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20613-information-disclosure-in-intelr-td-2330bd85</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20613%3A%20Information%20Disclosure%20in%20Intel(R)%20TDX&amp;severity=low&amp;id=689b774fad5a09ad003492ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20109-escalation-of-privilege-in-intelr-p-5008f710</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20109%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=689b774fad5a09ad003492cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20099-escalation-of-privilege-in-intelr-r-448cc363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20099%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Rapid%20Storage%20Technology%20installation%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20093-escalation-of-privilege-in-intelr-8-1cf7e358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20093%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20800%20Series%20Ethernet&amp;severity=high&amp;id=689b774fad5a09ad003492c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20092-escalation-of-privilege-in-clock-ji-c6229ab6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20092%3A%20Escalation%20of%20Privilege%20in%20Clock%20Jitter%20Tool%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20090-denial-of-service-in-intelr-quickas-b94a635b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20090%3A%20Denial%20of%20Service%20in%20Intel(R)%20QuickAssist%20Technology%20software&amp;severity=medium&amp;id=689b774fad5a09ad003492bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20087-escalation-of-privilege-in-intelr-o-4ee91dfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20087%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20DPC%2B%2B%2FC%2B%2B%20Compiler%20software%20installers&amp;severity=medium&amp;id=689b774fad5a09ad003492bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20077-denial-of-service-in-intelr-referen-b208c038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20077%3A%20Denial%20of%20Service%20in%20Intel(R)%20reference%20server%20platforms&amp;severity=medium&amp;id=689b774fad5a09ad003492af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20074-escalation-of-privilege-in-intelr-c-8695d014</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20074%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Connectivity%20Performance%20Suite%20software%20installers&amp;severity=high&amp;id=689b774fad5a09ad003492ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20067-information-disclosure-in-intelr-cs-46ea09e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20067%3A%20Information%20Disclosure%20in%20Intel(R)%20CSME%20and%20Intel(R)%20SPS&amp;severity=medium&amp;id=689b774fad5a09ad003492a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20053-escalation-of-privilege-in-intelr-x-b96e81a6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20053%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%20Processor%20firmware%20with%20SGX%20enabled&amp;severity=high&amp;id=689b774fad5a09ad003492a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20048-escalation-of-privilege-in-intelr-t-4bba1b8c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20048%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Trace%20Analyzer%20and%20Collector%20software&amp;severity=medium&amp;id=689b73baad5a09ad00347d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20037-escalation-of-privilege-in-intelr-c-28ecb85a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20037%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Converged%20Security%20and%20Management%20Engine&amp;severity=medium&amp;id=689b73baad5a09ad00347d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20025-denial-of-service-in-tinycbor-libra-04a577c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20025%3A%20Denial%20of%20Service%20in%20TinyCBOR%20libraries%20maintained%20by%20Intel(R)&amp;severity=medium&amp;id=689b73baad5a09ad00347d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20023-escalation-of-privilege-in-intelr-g-2c6efb6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20023%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software%20installers&amp;severity=medium&amp;id=689b73baad5a09ad00347d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20017-escalation-of-privilege-in-intelr-o-c030c336</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20017%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20Toolkit%20and%20component%20software%20installers&amp;severity=medium&amp;id=689b73baad5a09ad00347d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55167-cwe-89-improper-neutralization-of-s-c4de2c46</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55167%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=689b703bad5a09ad003460cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/home-office-phishing-scam-targets-uk-immigration-s-9afeea14</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Home%20Office%20Phishing%20Scam%20Targets%20UK%20Immigration%20Sponsors&amp;severity=high&amp;id=689b6cbcad5a09ad00345195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/curly-comrades-cyberspies-hit-govt-orgs-with-custo-537a272f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Curly%20COMrades%20cyberspies%20hit%20govt%20orgs%20with%20custom%20malware&amp;severity=high&amp;id=689b6cbcad5a09ad00345191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55166-cwe-79-improper-neutralization-of-i-cb239560</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55166%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darylldoyle%20svg-sanitizer&amp;severity=medium&amp;id=689b703bad5a09ad003460c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3089-cwe-639-authorization-bypass-through-03cfbfe0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3089%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ServiceNow%20ServiceNow%20AI%20Platform&amp;severity=medium&amp;id=689b692fad5a09ad00343d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55164-cwe-1321-improperly-controlled-modi-e87b6ad7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55164%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20helmetjs%20content-security-policy-parser&amp;severity=high&amp;id=689b692fad5a09ad00343d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54864-cwe-306-missing-authentication-for--c25cbce5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54864%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20NixOS%20hydra&amp;severity=medium&amp;id=689b65aaad5a09ad003430a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54800-cwe-79-improper-neutralization-of-i-c6ab73b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54800%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NixOS%20hydra&amp;severity=high&amp;id=689b65aaad5a09ad003430a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-linked-curly-comrades-deploy-new-mucoragen-2c7de057</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian-Linked%20Curly%20COMrades%20Deploy%20New%20MucorAgent%20Malware%20in%20Europe&amp;severity=medium&amp;id=689b5eafad5a09ad0033f59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8452-cwe-538-insertion-of-sensitive-infor-0c4d8e72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8452%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Brother%20Industries%2C%20Ltd%20DCP-L8410CDW&amp;severity=medium&amp;id=689b5eeead5a09ad0033f6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5468-cwe-61-unix-symbolic-link-in-ivanti--b5865eca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5468%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=689b5b1dad5a09ad0033e2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5466-cwe-776-improper-restriction-of-recu-423be894</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5466%3A%20CWE-776%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=689b5b1dad5a09ad0033e2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-threat-actor-targeting-geopolitical-hotbeds-8ca187d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Threat%20Actor%20Targeting%20Geopolitical%20Hotbeds&amp;severity=medium&amp;id=689b692cad5a09ad00343c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5462-cwe-122-heap-based-buffer-overflow-i-c30d386d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5462%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=689b5798ad5a09ad00337b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5456-cwe-125-out-of-bounds-read-in-ivanti-01d09e44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5456%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=689b5799ad5a09ad00337b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3831-cwe-200-exposure-of-sensitive-inform-33ab59d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3831%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor.%20in%20checkpoint%20Check%20Point%20Harmony%20SASE&amp;severity=high&amp;id=689b5799ad5a09ad00337b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8310-cwe-862-missing-authorization-in-iva-79fbceb4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8310%3A%20CWE-862%20Missing%20Authorization%20in%20Ivanti%20Virtual%20Application%20Delivery%20ControllerCWE-862&amp;severity=medium&amp;id=689b5415ad5a09ad00335157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8297-cwe-434-unrestricted-upload-of-file--180ce9c7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8297%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=689b5415ad5a09ad00335154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8296-cwe-89-improper-neutralization-of-sp-0b957505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8296%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=689b5415ad5a09ad00335151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-directory-enumeration-adws-43ce7221</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Directory%20Enumeration%20%E2%80%93%20ADWS&amp;severity=medium&amp;id=689b5099ad5a09ad00333fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-group-leaks-43gb-of-data-in-c-c2d90671</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20Ransomware%20Group%20Leaks%2043GB%20of%20Data%20in%20City%20of%20St.%20Paul%20Cyberattack&amp;severity=medium&amp;id=689b4d0fad5a09ad00331cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22830-cwe-362-concurrent-execution-using--e7476505</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22830%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20AMI%20AptioV&amp;severity=high&amp;id=689b4d3dad5a09ad00331dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22834-cwe-665-improper-initialization-in--27850308</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22834%3A%20CWE-665%20Improper%20Initialization%20in%20AMI%20AptioV&amp;severity=medium&amp;id=689b4d3dad5a09ad00331dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43735-cwe-79-improper-neutralization-of-i-9d5a94f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=689b3470ad5a09ad003199cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-charon-uses-earth-baxia-apt-techniq-44827b6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ransomware%20Charon%20Uses%20Earth%20Baxia%20APT%20Techniques%20to%20Target%20Enterprises&amp;severity=medium&amp;id=689b65a8ad5a09ad00343049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40770-cwe-300-channel-accessible-by-non-e-3c2f482b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40770%3A%20CWE-300%3A%20Channel%20Accessible%20by%20Non-Endpoint%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad0031330b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40769-cwe-1164-irrelevant-code-in-siemens-90527ae1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40769%3A%20CWE-1164%3A%20Irrelevant%20Code%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad00313308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40768-cwe-200-exposure-of-sensitive-infor-5cbeb192</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40768%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad00313305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40767-cwe-250-execution-with-unnecessary--b7aa0552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40767%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=high&amp;id=689b2662ad5a09ad00313302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40766-cwe-400-uncontrolled-resource-consu-bd313c38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40766%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SINEC%20Traffic%20Analyzer&amp;severity=medium&amp;id=689b2662ad5a09ad003132ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40764-cwe-125-out-of-bounds-read-in-sieme-c2dde0c9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40764%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap%20V2406&amp;severity=high&amp;id=689b2662ad5a09ad003132fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40762-cwe-787-out-of-bounds-write-in-siem-98c615d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40762%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap%20V2406&amp;severity=high&amp;id=689b2662ad5a09ad003132f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40761-cwe-288-authentication-bypass-using-b31b280e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40761%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=689b2662ad5a09ad003132f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40759-cwe-502-deserialization-of-untruste-0d047b24</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40759%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20S7-PLCSIM%20V17&amp;severity=high&amp;id=689b2662ad5a09ad003132f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40753-cwe-312-cleartext-storage-of-sensit-b2b2c3dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40753%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Siemens%20POWER%20METER%20SICAM%20Q100&amp;severity=medium&amp;id=689b2662ad5a09ad003132e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40752-cwe-312-cleartext-storage-of-sensit-c41ad7ad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40752%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Siemens%20POWER%20METER%20SICAM%20Q100&amp;severity=medium&amp;id=689b2662ad5a09ad003132df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40751-cwe-522-insufficiently-protected-cr-cf80d889</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40751%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Siemens%20SIMATIC%20RTLS%20Locating%20Manager&amp;severity=medium&amp;id=689b2662ad5a09ad003132dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40746-cwe-20-improper-input-validation-in-bdaf72e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40746%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20RTLS%20Locating%20Manager&amp;severity=critical&amp;id=689b2662ad5a09ad003132d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40743-cwe-288-authentication-bypass-using-c5ee2bc9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40743%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20SINUMERIK%20828D%20PPU.4&amp;severity=high&amp;id=689b2662ad5a09ad003132d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40584-cwe-611-improper-restriction-of-xml-ff9736b6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40584%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Siemens%20SIMOTION%20SCOUT%20TIA%20V5.4&amp;severity=medium&amp;id=689b2662ad5a09ad003132d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40570-cwe-770-allocation-of-resources-wit-0eb1d36e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40570%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=low&amp;id=689b2661ad5a09ad003132d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33023-cwe-434-unrestricted-upload-of-file-41d3c90d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33023%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=medium&amp;id=689b2661ad5a09ad003132cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30034-cwe-617-reachable-assertion-in-siem-cc1f6562</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30034%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Siemens%20SIMATIC%20RTLS%20Locating%20Manager&amp;severity=medium&amp;id=689b2661ad5a09ad003132ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30033-cwe-427-uncontrolled-search-path-el-25ca5171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30033%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20Automation%20License%20Manager%20V6.0&amp;severity=high&amp;id=689b2661ad5a09ad003132c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54678-cwe-502-deserialization-of-untruste-5a611e25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54678%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=68ee16327eab8b438c025da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43736-cwe-770-allocation-of-resources-wit-63175e87</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43736%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Liferay%20Portal&amp;severity=medium&amp;id=689b22e1ad5a09ad003125a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-raid-dutch-lab-stealing-data-on-500000-pat-ccb39d12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Raid%20Dutch%20Lab%2C%20Stealing%20Data%20on%20500%2C000%20Patients&amp;severity=high&amp;id=689b1bd2ad5a09ad0030e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-29000-unpatched-microsoft-exchange-servers-le-35bef72d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2029%2C000%20Unpatched%20Microsoft%20Exchange%20Servers%20Leaving%20Networks%20at%20Risk&amp;severity=medium&amp;id=689b1144ad5a09ad00309c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-oobe-breakout-revived-4f9f1706</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20OOBE%20Breakout%20Revived&amp;severity=medium&amp;id=689b0dc8ad5a09ad00305a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8885-cwe-770-allocation-of-resources-with-86a112e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8885%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Legion%20of%20the%20Bouncy%20Castle%20Inc.%20BC%20Java&amp;severity=medium&amp;id=689b0a3ead5a09ad00304844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26398-cwe-798-use-of-hard-coded-credentia-7d733148</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26398%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SolarWinds%20Database%20Performance%20Analyzer&amp;severity=medium&amp;id=689af8aaad5a09ad002f4ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41686-cwe-306-missing-authentication-for--89c7ec66</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41686%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20DaUM&amp;severity=high&amp;id=689af1a2ad5a09ad002f1695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8418-cwe-862-missing-authorization-in-bpl-be323e66</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8418%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20B%20Slider-%20Gutenberg%20Slider%20Block%20for%20WP&amp;severity=high&amp;id=689ae392ad5a09ad002e8174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8482-cwe-862-missing-authorization-in-10u-782ef81b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8482%3A%20CWE-862%20Missing%20Authorization%20in%2010up%20Simple%20Local%20Avatars&amp;severity=medium&amp;id=689ae392ad5a09ad002e8179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8874-cwe-79-improper-neutralization-of-in-622c9c23</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20White%20Label%2C%20Free%20Widgets%2C%20Hover%20Effects%2C%20Conditions%2C%20%26%20Animations&amp;severity=medium&amp;id=689ae392ad5a09ad002e8186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8767-cwe-1236-improper-neutralization-of--88c8cd25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8767%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20anwppro%20AnWP%20Football%20Leagues&amp;severity=medium&amp;id=689ae392ad5a09ad002e817f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47444-cwe-201-insertion-of-sensitive-info-7b29e1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47444%3A%20Missing%20Authorization%20in%20Damian%20G%C3%B3ra%20FiboSearch&amp;severity=null&amp;id=689ae392ad5a09ad002e8170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6253-cwe-862-missing-authorization-in-uic-9043b32c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6253%3A%20CWE-862%20Missing%20Authorization%20in%20uicore%20UiCore%20Elements%20%E2%80%93%20Free%20Elementor%20widgets%20and%20templates&amp;severity=high&amp;id=689ad582ad5a09ad002df1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8081-cwe-22-improper-limitation-of-a-path-4b23b8a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8081%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=689ad582ad5a09ad002df1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30027-cwe-1287-improper-validation-of-spe-e884b25a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30027%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=689ad1fead5a09ad002dcf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3892-cwe-250-execution-with-unnecessary-p-35160318</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3892%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=689ad1fead5a09ad002dcf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7622-cwe-918-server-side-request-forgery--616fb1ad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7622%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=689ace7fad5a09ad002d1130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8314-cwe-79-improper-neutralization-of-in-eee19127</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Project%20Management%2C%20Bug%20and%20Issue%20Tracking%20Plugin%20%E2%80%93%20Software%20Issue%20Manager&amp;severity=medium&amp;id=689ac3eead5a09ad002cc45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8059-cwe-862-missing-authorization-in-bpl-cb384285</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8059%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20B%20Blocks%20%E2%80%93%20The%20ultimate%20block%20collection&amp;severity=critical&amp;id=689ac3eead5a09ad002cc458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8568-cwe-79-improper-neutralization-of-in-03693c9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prabode%20GMap%20Generator&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8688-cwe-79-improper-neutralization-of-in-ff8b950a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ebernstein%20Inline%20Stock%20Quotes&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8621-cwe-80-improper-neutralization-of-sc-f9a7acd9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8621%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20odn%20Mosaic%20Generator&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8690-cwe-79-improper-neutralization-of-in-37f0a325</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addix%20Simple%20Responsive%20Slider&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4390-cwe-200-exposure-of-sensitive-inform-1964ef92</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4390%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nimeshrmr%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8685-cwe-79-improper-neutralization-of-in-8a768325</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emilien%20Wp%20chart%20generator&amp;severity=medium&amp;id=689aa7d3ad5a09ad002be7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8462-cwe-79-improper-neutralization-of-in-a0d36f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20risetheme%20RT%20Easy%20Builder%20%E2%80%93%20Advanced%20addons%20for%20Elementor&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be7aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5391-cwe-22-improper-limitation-of-a-path-9df51c52</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5391%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bbioon%20WooCommerce%20Purchase%20Orders&amp;severity=high&amp;id=689aa7d2ad5a09ad002be7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42976-cwe-125-out-of-bounds-read-in-sapse-53e6749b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42976%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20(BIC%20Document)&amp;severity=high&amp;id=689aa7d2ad5a09ad002be79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42975-cwe-79-improper-neutralization-of-i-50d4a3ab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42975%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20(BIC%20Document)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42957-cwe-94-improper-control-of-generati-0196112f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42957%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20or%20On-Premise)&amp;severity=critical&amp;id=689aa7d2ad5a09ad002be794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42955-cwe-862-missing-authorization-in-sa-b8924a33</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42955%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Cloud%20Connector&amp;severity=low&amp;id=689aa7d2ad5a09ad002be790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42951-cwe-863-incorrect-authorization-in--e58257bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42951%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20SAP_SE%20SAP%20Business%20One%20(SLD)&amp;severity=high&amp;id=689aa7d2ad5a09ad002be78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42950-cwe-94-improper-control-of-generati-10481c7d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42950%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20(Analysis%20Platform)&amp;severity=critical&amp;id=689aa7d2ad5a09ad002be788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42949-cwe-862-missing-authorization-in-sa-67f98534</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42949%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20ABAP%20Platform&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42948-cwe-79-improper-neutralization-of-i-d99f9fd0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42948%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Platform&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42946-cwe-22-improper-limitation-of-a-pat-18a9631f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42946%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Bank%20Communication%20Management)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42945-cwe-94-improper-control-of-generati-2a67bdc8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42945%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42943-cwe-250-execution-with-unnecessary--483a3546</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42943%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42942-cwe-79-improper-neutralization-of-i-aecdb9f0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42942%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42941-cwe-1022-use-of-web-link-to-untrust-5099e7d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42941%3A%20CWE-1022%3A%20Use%20of%20Web%20Link%20to%20Untrusted%20Target%20with%20window.opener%20Access%20in%20SAP_SE%20SAP%20Fiori%20(Launchpad)&amp;severity=low&amp;id=689aa7d2ad5a09ad002be762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42936-cwe-266-incorrect-privilege-assignm-bc14f965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42936%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42935-cwe-532-insertion-of-sensitive-info-dfede04a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42935%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20SAP_SE%20SAP%20NetWeaver%20AS%20for%20ABAP%20and%20ABAP%20Platform(Internet%20Communication%20Manager)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42934-cwe-113-improper-neutralization-of--20c69ba4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42934%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Supplier%20invoice)&amp;severity=medium&amp;id=689aa7d2ad5a09ad002be756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-12-b5bafbaf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-12&amp;severity=medium&amp;id=689bd99dad5a09ad0037d987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55159-cwe-119-improper-restriction-of-ope-932d4c45</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55159%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20tokio-rs%20slab&amp;severity=medium&amp;id=689a7a2ead5a09ad0029c879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55161-cwe-918-server-side-request-forgery-bf410a9f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55161%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=689a6f8ead5a09ad002982d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55150-cwe-918-server-side-request-forgery-f834aa82</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55150%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=689a6886ad5a09ad002967b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55151-cwe-918-server-side-request-forgery-40d843af</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55151%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=689a6886ad5a09ad002967bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25235-cwe-918-server-side-request-forgery-ddd5e2e1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25235%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Omnissa%20Secure%20Email%20Gateway&amp;severity=high&amp;id=689a6886ad5a09ad002967c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54992-cwe-611-improper-restriction-of-xml-3a5b9ece</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54992%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20telstra%20open-kilda&amp;severity=medium&amp;id=689a6502ad5a09ad00294e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55012-cwe-288-authentication-bypass-using-345a5947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55012%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20zed-industries%20zed&amp;severity=high&amp;id=689a617ead5a09ad00291d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54878-cwe-122-heap-based-buffer-overflow--d65af7bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54878%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nasa%20CryptoLib&amp;severity=high&amp;id=689a573bad5a09ad0028f07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muddywaters-darkbit-ransomware-cracked-for-free-da-12af63d1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MuddyWater%E2%80%99s%20DarkBit%20ransomware%20cracked%20for%20free%20data%20recovery&amp;severity=high&amp;id=689a56f3ad5a09ad0028eecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-spot-surge-in-erlangotp-ssh-rce-exploi-26b3cd74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Spot%20Surge%20in%20Erlang%2FOTP%20SSH%20RCE%20Exploits%2C%2070%25%20Target%20OT%20Firewalls&amp;severity=high&amp;id=689a56f3ad5a09ad0028eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-tetra-radio-encryption-flaws-expose-law-enforc-fc85a35d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TETRA%20Radio%20Encryption%20Flaws%20Expose%20Law%20Enforcement%20Communications&amp;severity=high&amp;id=689a56f3ad5a09ad0028eed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/details-emerge-on-winrar-zero-day-attacks-that-inf-5595aae9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Details%20emerge%20on%20WinRAR%20zero-day%20attacks%20that%20infected%20PCs%20with%20malware&amp;severity=critical&amp;id=689a536aad5a09ad0028c227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40920-cwe-340-generation-of-predictable-n-c77f0fed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40920%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20ETHER%20Catalyst%3A%3AAuthentication%3A%3ACredential%3A%3AHTTP&amp;severity=high&amp;id=689a5384ad5a09ad0028c285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/carmakers-portal-vulnerability-could-have-allowed--2e374b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Carmaker%E2%80%99s%20Portal%20Vulnerability%20Could%20Have%20Allowed%20Hackers%20to%20Unlock%20Vehicles%20and%20Access%20Data&amp;severity=medium&amp;id=689a4fe7ad5a09ad002899c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8285-cwe-862-missing-authorization-in-mat-9afa58c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8285%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54525-cwe-1287-improper-validation-of-spe-e4c10c06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54525%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54478-cwe-306-missing-authentication-for--d4652503</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54478%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54463-cwe-754-improper-check-for-unusual--adb17086</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54463%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54458-cwe-862-missing-authorization-in-ma-4e8c3f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54458%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53910-cwe-862-missing-authorization-in-ma-894aa51d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53910%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53857-cwe-862-missing-authorization-in-ma-89a8d3c9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53857%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=low&amp;id=689a41d9ad5a09ad00285b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53514-cwe-754-improper-check-for-unusual--813df849</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53514%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52931-cwe-754-improper-check-for-unusual--d80cedc7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52931%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49221-cwe-862-missing-authorization-in-ma-2f497697</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49221%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=low&amp;id=689a41d9ad5a09ad00285af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48731-cwe-862-missing-authorization-in-ma-c6d84f65</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48731%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44004-cwe-306-missing-authentication-for--5fdaca33</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44004%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=high&amp;id=689a41d9ad5a09ad00285af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44001-cwe-862-missing-authorization-in-ma-b48395c4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44001%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Mattermost%20Mattermost%20Confluence%20Plugin&amp;severity=medium&amp;id=689a41d9ad5a09ad00285aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7679-cwe-306-missing-authentication-for-c-e9d1e9aa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7679%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ABB%20Aspect&amp;severity=high&amp;id=689a3acfad5a09ad00283c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7677-cwe-306-missing-authentication-for-c-b56b1f2d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7677%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ABB%20Aspect&amp;severity=medium&amp;id=689a3acfad5a09ad00283c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53191-cwe-306-missing-authentication-for--07ccf3b9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53191&amp;severity=null&amp;id=689a3acfad5a09ad00283c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53190-cwe-286-in-abb-aspect-8c4a1e0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53190&amp;severity=null&amp;id=689a3acfad5a09ad00283c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53189-cwe-639-authorization-bypass-throug-92945590</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53189&amp;severity=null&amp;id=689a3acfad5a09ad00283c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53188-cwe-522-insufficiently-protected-cr-23d8c82b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53188&amp;severity=null&amp;id=689a3acfad5a09ad00283c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25229-vulnerability-in-omnissa-omnissa-wo-b8557300</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25229%3A%20Vulnerability%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=medium&amp;id=689a3750ad5a09ad0028300f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25231-vulnerability-in-omnissa-omnissa-wo-f60fae89</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25231%3A%20Vulnerability%20in%20Omnissa%20Omnissa%20Workspace%20ONE%20UEM&amp;severity=high&amp;id=689a33c7ad5a09ad00281cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54063-cwe-94-improper-control-of-generati-856006a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54063%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20CherryHQ%20cherry-studio&amp;severity=high&amp;id=689a3048ad5a09ad0027c678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53187-cwe-94-improper-control-of-generati-f36fca93</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53187%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ABB%20ASPECT&amp;severity=critical&amp;id=689a3048ad5a09ad0027c67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-drone-strike-to-file-recovery-outsmarting-a-n-9bd60cb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Drone%20Strike%20to%20File%20Recovery%3A%20Outsmarting%20a%20Nation%20State&amp;severity=medium&amp;id=689a2cc1ad5a09ad0027ad2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8866-cwe-200-exposure-of-sensitive-inform-c5921121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8866%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=medium&amp;id=689a1eafad5a09ad00272b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-clickfix-to-command-a-full-powershell-attack--b64ab077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20ClickFix%20to%20Command%3A%20A%20Full%20PowerShell%20Attack%20Chain&amp;severity=medium&amp;id=689a109fad5a09ad0026aa51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8859-unrestricted-upload-in-code-projects-6e445cc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8859%3A%20Unrestricted%20Upload%20in%20code-projects%20eBlog%20Site&amp;severity=medium&amp;id=689a028fad5a09ad002669bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chairmen-of-100-million-scam-operation-extradited--6deb97ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Chairmen&apos;%20of%20%24100%20million%20scam%20operation%20extradited%20to%20US&amp;severity=high&amp;id=6899ff09ad5a09ad00265344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8865-cwe-476-null-pointer-dereference-in--014c92cc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8865%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20YugabyteDB%20Inc%20YugabyteDB&amp;severity=medium&amp;id=6899ff25ad5a09ad002653c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8852-information-exposure-through-error-m-a98b5121</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8852%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=6899fb8aad5a09ad002616f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8851-stack-based-buffer-overflow-in-libti-f9d0ce1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8851%3A%20Stack-based%20Buffer%20Overflow%20in%20LibTIFF&amp;severity=medium&amp;id=6899f47fad5a09ad0025ec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8864-cwe-532-insertion-of-sensitive-infor-ecac62a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8864%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20YugabyteDB%20Inc%20YugabyteDB%20Anywhere&amp;severity=medium&amp;id=6899f47fad5a09ad0025ec1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-9gb-of-data-from-alleged-north-korean-32cd9b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%209GB%20of%20Data%20from%20Alleged%20North%20Korean%20Hacker%E2%80%99s%20Computer&amp;severity=medium&amp;id=6899f0f9ad5a09ad0025d345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8863-cwe-319-cleartext-transmission-of-se-64669ac4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8863%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20YugabyteDB%20Inc%20YugabyteDB&amp;severity=high&amp;id=6899ed76ad5a09ad0025a09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8847-cross-site-scripting-in-yangzongzhua-79c93238</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8847%3A%20Cross%20Site%20Scripting%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=6899ed76ad5a09ad0025a098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8862-cwe-201-insertion-of-sensitive-infor-b57f036f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8862%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20YugabyteDB%20Inc%20YugabyteDB&amp;severity=high&amp;id=6899e9f3ad5a09ad00258682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8846-stack-based-buffer-overflow-in-nasm--154680aa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8846%3A%20Stack-based%20Buffer%20Overflow%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899e9f3ad5a09ad0025867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-29000-exchange-servers-unpatched-against-high-c6bef72b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2029%2C000%20Exchange%20servers%20unpatched%20against%20high-severity%20flaw&amp;severity=high&amp;id=6899e2e8ad5a09ad00254b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8845-stack-based-buffer-overflow-in-nasm--6c06cbbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8845%3A%20Stack-based%20Buffer%20Overflow%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899df69ad5a09ad002528e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8844-null-pointer-dereference-in-nasm-net-09b8971b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8844%3A%20NULL%20Pointer%20Dereference%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899d85cad5a09ad0025097b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-group-scarcruft-expands-from-spying-t-ecbce21d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Group%20ScarCruft%20Expands%20From%20Spying%20to%20Ransomware%20Attacks&amp;severity=medium&amp;id=6899d153ad5a09ad00249911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8843-heap-based-buffer-overflow-in-nasm-n-0a8c3f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8843%3A%20Heap-based%20Buffer%20Overflow%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899d166ad5a09ad0024996f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-detail-windows-epm-poisoning-exploit-c-d8635e38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Detail%20Windows%20EPM%20Poisoning%20Exploit%20Chain%20Leading%20to%20Domain%20Privilege%20Escalation&amp;severity=high&amp;id=6899ca4aad5a09ad00247493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-win-ddos-flaws-let-attackers-turn-public-domai-04561c4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Win-DDoS%20Flaws%20Let%20Attackers%20Turn%20Public%20Domain%20Controllers%20into%20DDoS%20Botnet%20via%20RPC%2C%20LDAP&amp;severity=high&amp;id=6899ca4aad5a09ad0024749f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winrar-zero-day-under-active-exploitation-update-t-ecd984ee</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WinRAR%20Zero-Day%20Under%20Active%20Exploitation%20%E2%80%93%20Update%20to%20Latest%20Version%20Immediately&amp;severity=critical&amp;id=6899ca4aad5a09ad00247497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/medusalocker-ransomware-group-is-looking-for-pente-9612a8c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MedusaLocker%20ransomware%20group%20is%20looking%20for%20pentesters&amp;severity=medium&amp;id=6899ca4aad5a09ad002474a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connex-credit-union-data-breach-impacts-172000-mem-434bed78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Connex%20Credit%20Union%20data%20breach%20impacts%20172%2C000%20members&amp;severity=high&amp;id=6899ca4aad5a09ad0024749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8842-use-after-free-in-nasm-netwide-assem-e4f63872</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8842%3A%20Use%20After%20Free%20in%20NASM%20Netwide%20Assember&amp;severity=medium&amp;id=6899cab0ad5a09ad0024763d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8841-unrestricted-upload-in-zlt2000-micro-af9cfd46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8841%3A%20Unrestricted%20Upload%20in%20zlt2000%20microservices-platform&amp;severity=medium&amp;id=6899c341ad5a09ad00243311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8840-improper-authorization-in-jsherp-aa26b26b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8840%3A%20Improper%20Authorization%20in%20jshERP&amp;severity=medium&amp;id=6899bc39ad5a09ad00240529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8853-cwe-290-authentication-bypass-by-spo-d668c1ce</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8853%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%202100%20Technology%20Official%20Document%20Management%20System&amp;severity=critical&amp;id=6899b531ad5a09ad00238e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8839-improper-authorization-in-jsherp-3e640cc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8839%3A%20Improper%20Authorization%20in%20jshERP&amp;severity=medium&amp;id=6899e9f3ad5a09ad00258685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8838-improper-authentication-in-winterche-ebfed894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8838%3A%20Improper%20Authentication%20in%20WinterChenS%20my-site&amp;severity=medium&amp;id=6899ae29ad5a09ad0022b1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8837-use-after-free-in-jasper-2ef27b27</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8837%3A%20Use%20After%20Free%20in%20JasPer&amp;severity=medium&amp;id=6899a721ad5a09ad00227d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8661-vulnerability-in-broadcom-symantec-p-31cfa509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8661%3A%20Vulnerability%20in%20Broadcom%20Symantec%20PGP%20Encryption&amp;severity=medium&amp;id=6899a39dad5a09ad0022676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8836-reachable-assertion-in-jasper-65388514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8836%3A%20Reachable%20Assertion%20in%20JasPer&amp;severity=medium&amp;id=6899a019ad5a09ad0022583c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8747-cwe-502-deserialization-of-untrusted-6c22ad13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8747%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Google%20Keras&amp;severity=high&amp;id=68999c95ad5a09ad00224b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8660-vulnerability-in-broadcom-symantec-p-9b32421b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8660%3A%20Vulnerability%20in%20Broadcom%20Symantec%20PGP%20Encryption&amp;severity=medium&amp;id=68999c95ad5a09ad00224b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8835-null-pointer-dereference-in-jasper-69a07b45</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8835%3A%20NULL%20Pointer%20Dereference%20in%20JasPer&amp;severity=medium&amp;id=68999911ad5a09ad00221cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8834-cross-site-scripting-in-jcg-link-net-accd3bb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8834%3A%20Cross%20Site%20Scripting%20in%20JCG%20Link-net%20LW-N915R&amp;severity=medium&amp;id=689a8bf2ad5a09ad002aa9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8833-stack-based-buffer-overflow-in-links-1bd91c00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8833%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68998b02ad5a09ad0021531a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7965-cwe-352-cross-site-request-forgery-c-69a7e78b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7965%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CBX%20Restaurant%20Booking&amp;severity=medium&amp;id=6899878fad5a09ad0021344b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8832-stack-based-buffer-overflow-in-links-113b2e58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8832%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=689983f8ad5a09ad002105f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8831-stack-based-buffer-overflow-in-links-3d9466f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8831%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68997cf1ad5a09ad0020e3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8830-os-command-injection-in-linksys-re62-5670629e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8830%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=689a573bad5a09ad0028f082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8854-cwe-120-buffer-copy-without-checking-f92a7800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8854%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20bulletphysics%20bullet3&amp;severity=high&amp;id=689a573bad5a09ad0028f08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8829-os-command-injection-in-linksys-re62-f1aa6bef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8829%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68996ee1ad5a09ad00208e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8828-os-command-injection-in-linksys-re62-ca4e2b2a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8828%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68996b5dad5a09ad00207610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8827-os-command-injection-in-linksys-re62-a66bda33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8827%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=689960d1ad5a09ad002027f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8826-stack-based-buffer-overflow-in-links-259ef8e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8826%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=689959c9ad5a09ad001ff2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8825-os-command-injection-in-linksys-re62-906083eb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8825%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=689959c9ad5a09ad001ff2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8824-stack-based-buffer-overflow-in-links-30273934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8824%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68994bd2ad5a09ad001f678a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8823-os-command-injection-in-linksys-re62-dd32fd45</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8823%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68994bd2ad5a09ad001f6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8822-stack-based-buffer-overflow-in-links-72b290ab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8822%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68993da9ad5a09ad001d42b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8821-os-command-injection-in-linksys-re62-8e66c935</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8821%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=68993da9ad5a09ad001d42a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-30-remote-code-execution-rce-ca9bcedf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%203.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=689a95b8ad5a09ad002b09b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-ise-30-authorization-bypass-97d36db7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20ISE%203.0%20-%20Authorization%20Bypass&amp;severity=medium&amp;id=689a95b8ad5a09ad002b09ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/projectworlds-online-admission-system-10-sql-injec-994b4737</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=projectworlds%20Online%20Admission%20System%201.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=689a95b8ad5a09ad002b09a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-storage-qos-filter-driver-checke-afd9fa56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20-%20Storage%20QoS%20Filter%20Driver%20Checker&amp;severity=medium&amp;id=689a95b8ad5a09ad002b09a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atjiu-pybbs-600-cross-site-scripting-xss-e3f469e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=atjiu%20pybbs%206.0.0%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=689a95b8ad5a09ad002b099e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-netscaler-adcgateway-141-memory-disclosure-328b4039</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20NetScaler%20ADC%2FGateway%2014.1%20-%20Memory%20Disclosure&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grav-cms-1748-remote-code-execution-rce-4b23914b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grav%20CMS%201.7.48%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=689a95b8ad5a09ad002b098a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-edge-renderer-process-mojo-ipc-134069981-463302ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Edge%20Renderer%20Process%20(Mojo%20IPC)%20134.0.6998.177%20-%20Sandbox%20Escape&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tigo-energy-cloud-connect-advanced-cca-401-command-ee904677</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tigo%20Energy%20Cloud%20Connect%20Advanced%20(CCA)%204.0.1%20-%20Command%20Injection&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-sharepoint-server-2019-1601038320020-rem-c4a57493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20SharePoint%20Server%202019%20(16.0.10383.20020)%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=689a95b8ad5a09ad002b097b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-vsphere-client-8030-reflected-cross-site-sc-3a07ba07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20vSphere%20Client%208.0.3.0%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/belkin-f9k1009-f9k1010-2000420009-hard-coded-crede-b38d4748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Belkin%20F9K1009%20F9K1010%202.00.04%2F2.00.09%20-%20Hard%20Coded%20Credentials&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-cms-5421-path-traversal-4b1a8ac2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20CMS%205.42.1%20-%20Path%20Traversal&amp;severity=medium&amp;id=689a95b8ad5a09ad002b096c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-cms-5591-arbitrary-file-read-b4deb80e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20CMS%205.59.1%20-%20Arbitrary%20File%20Read&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servicenow-multiple-versions-input-validation-temp-3518d2a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServiceNow%20Multiple%20Versions%20-%20Input%20Validation%20%26%20Template%20Injection&amp;severity=medium&amp;id=689a95b8ad5a09ad002b0962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jetbrains-teamcity-2023114-authentication-bypass-3afd83bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JetBrains%20TeamCity%202023.11.4%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=689a95b8ad5a09ad002b095d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-11-972d4b1e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-11&amp;severity=medium&amp;id=689a881dad5a09ad002a6f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51824-na-78027238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51824%3A%20n%2Fa&amp;severity=medium&amp;id=689a41d9ad5a09ad00285aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51823-na-39db1da1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51823%3A%20n%2Fa&amp;severity=medium&amp;id=689a41d9ad5a09ad00285ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45146-na-80d948ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45146%3A%20n%2Fa&amp;severity=critical&amp;id=689a1424ad5a09ad0026c84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8820-stack-based-buffer-overflow-in-links-0784f930</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8820%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68992f9aad5a09ad001c9049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8819-stack-based-buffer-overflow-in-links-f5a50f19</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8819%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68992892ad5a09ad001c74c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8818-os-command-injection-in-linksys-re62-26eb694a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8818%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6250&amp;severity=medium&amp;id=6899218aad5a09ad001c4a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8817-stack-based-buffer-overflow-in-links-61bbdc33</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8817%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=68993a6cad5a09ad001cf0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-tesla-websites-scams-4083c4b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Tesla%20Websites%20Scams&amp;severity=medium&amp;id=6899f47ead5a09ad0025ebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8816-stack-based-buffer-overflow-in-links-b0b37d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8816%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20RE6250&amp;severity=high&amp;id=6898c2a5ad5a09ad00199b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8815-path-traversal-in-i-morning-4df01872</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8815%3A%20Path%20Traversal%20in%20%E7%8C%AB%E5%AE%81i%20Morning&amp;severity=medium&amp;id=6898bf1bad5a09ad0019792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8814-cross-site-request-forgery-in-atjiu--9d715d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8814%3A%20Cross-Site%20Request%20Forgery%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6898b814ad5a09ad001953d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8813-open-redirect-in-atjiu-pybbs-6c815128</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8813%3A%20Open%20Redirect%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6898b10bad5a09ad00191464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8812-cross-site-scripting-in-atjiu-pybbs-d66cde6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8812%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6898aa05ad5a09ad0018d126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8811-sql-injection-in-code-projects-simpl-6772ea90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8811%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Art%20Gallery&amp;severity=medium&amp;id=6898a2fcad5a09ad0018a33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8810-stack-based-buffer-overflow-in-tenda-70b04837</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68989bfaad5a09ad0018937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8809-sql-injection-in-code-projects-onlin-880f07cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8809%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=689894eead5a09ad001862d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8808-csv-injection-in-xujeff-tianti-b2a9cbc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8808%3A%20CSV%20Injection%20in%20xujeff%20tianti%20%E5%A4%A9%E6%A2%AF&amp;severity=medium&amp;id=68988de7ad5a09ad00183e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8807-missing-authorization-in-xujeff-tian-88985141</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8807%3A%20Missing%20Authorization%20in%20xujeff%20tianti%20%E5%A4%A9%E6%A2%AF&amp;severity=medium&amp;id=689886dfad5a09ad00181689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8806-sql-injection-in-zhilink-adp-applica-53dabe0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8806%3A%20SQL%20Injection%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=68987fdaad5a09ad0017dfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agentflayer-0-click-exploit-abuses-chatgpt-connect-fc9c2f29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AgentFlayer%200-click%20exploit%20abuses%20ChatGPT%20Connectors%20to%20Steal%203rd-party%20app%20data&amp;severity=high&amp;id=689878cdad5a09ad0017b47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8805-denial-of-service-in-open5gs-ac7390d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8805%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=689878dcad5a09ad0017b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8804-reachable-assertion-in-open5gs-6e2425f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8804%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=689871c7ad5a09ad0017a35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8803-denial-of-service-in-open5gs-1cad868b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8803%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68986ac2ad5a09ad00177d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8802-denial-of-service-in-open5gs-6e8efa2e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8802%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=689863b7ad5a09ad00176291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8801-denial-of-service-in-open5gs-fa4b37b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8801%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68985cafad5a09ad00173270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8800-denial-of-service-in-open5gs-8434833d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8800%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=689855a7ad5a09ad00137452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8799-denial-of-service-in-open5gs-74b32e75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8799%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68984e9fad5a09ad00135897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8798-unrestricted-upload-in-oitcode-samar-d5aba4ea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8798%3A%20Unrestricted%20Upload%20in%20oitcode%20samarium&amp;severity=medium&amp;id=68984797ad5a09ad001199c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8797-permission-issues-in-litmuschaos-lit-37ddd71d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8797%3A%20Permission%20Issues%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=68984090ad5a09ad0011787c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8796-missing-authorization-in-litmuschaos-1f8a41bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8796%3A%20Missing%20Authorization%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=68983989ad5a09ad0011631c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8795-improper-access-controls-in-litmusch-516c6371</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8795%3A%20Improper%20Access%20Controls%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898327fad5a09ad00114414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8794-authorization-bypass-in-litmuschaos--c39190e9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8794%3A%20Authorization%20Bypass%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898246fad5a09ad0011135b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8793-improper-control-of-resource-identif-85d2e0d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8793%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=68981d67ad5a09ad0010f9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8792-client-side-enforcement-of-server-si-e32c85f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8792%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898165fad5a09ad0010ec9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8791-improper-authorization-in-litmuschao-10f3416f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8791%3A%20Improper%20Authorization%20in%20LitmusChaos%20Litmus&amp;severity=medium&amp;id=6898165fad5a09ad0010ec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8790-improper-authorization-in-portabilis-9d17fae5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8790%3A%20Improper%20Authorization%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68980bd3ad5a09ad0010d8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pentest-trick-out-of-sight-out-of-mind-with-window-8a300c1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pentest%20Trick%3A%20Out%20of%20sight%2C%20out%20of%20mind%20with%20Windows%20Long%20File%20Names&amp;severity=medium&amp;id=689804ccad5a09ad0010c79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8789-authorization-bypass-in-portabilis-i-f7d1aa84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8789%3A%20Authorization%20Bypass%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68980147ad5a09ad0010c09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8788-cross-site-scripting-in-portabilis-i-f91bb890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8788%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=68980147ad5a09ad0010c093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8787-cross-site-scripting-in-portabilis-i-c8e9c8f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8787%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=6897f6bcad5a09ad00109f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8786-cross-site-scripting-in-portabilis-i-2bb8d915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8786%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=6897efb3ad5a09ad000f96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-10-8e56b84d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-10&amp;severity=medium&amp;id=6899369dad5a09ad001cc375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8785-cross-site-scripting-in-portabilis-i-e7dd1078</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8785%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6897de23ad5a09ad000f1481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8784-cross-site-scripting-in-portabilis-i-b4d8aad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8784%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6897d71fad5a09ad000f039a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/embargo-ransomware-nets-342m-in-crypto-since-april-f6b6af4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Embargo%20Ransomware%20nets%20%2434.2M%20in%20crypto%20since%20April%202024&amp;severity=medium&amp;id=6897baf7ad5a09ad000e94c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8775-unrestricted-upload-in-qiyuesuo-eele-0b4c7c44</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8775%3A%20Unrestricted%20Upload%20in%20Qiyuesuo%20Eelectronic%20Signature%20Platform&amp;severity=medium&amp;id=6897bb0dad5a09ad000e951b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8774-observable-timing-discrepancy-in-ris-97a0f51d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8774%3A%20Observable%20Timing%20Discrepancy%20in%20riscv-boom%20SonicBOOM&amp;severity=low&amp;id=6897e8eaad5a09ad000f48e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8773-sql-injection-in-dinstar-monitoring--63ffdf21</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8773%3A%20SQL%20Injection%20in%20Dinstar%20Monitoring%20Platform%20%E7%94%98%E8%82%83%E7%9C%81%E5%8D%B1%E9%99%A9%E5%93%81%E5%BA%93%E7%9B%91%E6%8E%A7%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=6897aceaad5a09ad000e61dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8772-server-side-request-forgery-in-vinad-7f6f2c6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8772%3A%20Server-Side%20Request%20Forgery%20in%20Vinades%20NukeViet&amp;severity=medium&amp;id=6897a5e7ad5a09ad000e3e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8765-cross-site-scripting-in-datacom-dm95-a3a25c47</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8765%3A%20Cross%20Site%20Scripting%20in%20Datacom%20DM955%205GT%201200&amp;severity=medium&amp;id=68979ee4ad5a09ad000e184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8764-unrestricted-upload-in-linlinjava-li-f5459e20</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8764%3A%20Unrestricted%20Upload%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=689797d2ad5a09ad000dec5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8763-missing-encryption-of-sensitive-data-7568cc2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8763%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Ruijie%20EG306MG&amp;severity=medium&amp;id=6897e8eaad5a09ad000f48e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8759-use-of-hard-coded-cryptographic-key--2338644c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8759%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20TRENDnet%20TN-200&amp;severity=medium&amp;id=689782c2ad5a09ad000d5f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8758-least-privilege-violation-in-trendne-068692fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8758%3A%20Least%20Privilege%20Violation%20in%20TRENDnet%20TEW-822DRE&amp;severity=high&amp;id=689774a9ad5a09ad000d1393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8757-least-privilege-violation-in-trendne-ea55cefc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8757%3A%20Least%20Privilege%20Violation%20in%20TRENDnet%20TV-IP110WN&amp;severity=high&amp;id=68976699ad5a09ad000cbdd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8756-improper-authorization-in-tduckcloud-64fe2862</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8756%3A%20Improper%20Authorization%20in%20TDuckCloud%20tduck-platform&amp;severity=medium&amp;id=68975f97ad5a09ad000c55f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8755-authorization-bypass-in-macrozheng-m-0c7fcf90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8755%3A%20Authorization%20Bypass%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6897e8eaad5a09ad000f48ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7726-cwe-79-improper-neutralization-of-in-022ffcf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7%20%E2%80%94%20Website%20and%20eCommerce%20Builder%20for%20WordPress&amp;severity=medium&amp;id=68975505ad5a09ad000c1f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8753-path-traversal-in-linlinjava-litemal-416060ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8753%3A%20Path%20Traversal%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=68975187ad5a09ad000c0c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7020-cwe-656-incorrect-encryption-impleme-7c3ad52a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7020%3A%20CWE-656%3A%20Incorrect%20Encryption%20Implementation%20in%20BYD%20DiLink%20OS&amp;severity=medium&amp;id=68974388ad5a09ad000bb4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8752-command-injection-in-wangzhixuan-spr-861e6b8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8752%3A%20Command%20Injection%20in%20wangzhixuan%20spring-shiro-training&amp;severity=medium&amp;id=68973c6aad5a09ad000b94f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8751-cross-site-scripting-in-protected-to-bd94c538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8751%3A%20Cross%20Site%20Scripting%20in%20Protected%20Total%20WebShield%20Extension&amp;severity=low&amp;id=6896fd23ad5a09ad0009fe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8750-cross-site-scripting-in-macrozheng-m-3e8f8b30</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8750%3A%20Cross%20Site%20Scripting%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6896f61bad5a09ad0009e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8746-memory-corruption-in-gnu-libopts-173215c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8746%3A%20Memory%20Corruption%20in%20GNU%20libopts&amp;severity=medium&amp;id=6896e80dad5a09ad00095c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8745-improper-export-of-android-applicati-70808f67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8745%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Weee%20RICEPO%20App&amp;severity=medium&amp;id=6896d9fbad5a09ad00091c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4655-cwe-918-server-side-request-forgery--92460be3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4655%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6896d67aad5a09ad00091384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4581-cwe-918-server-side-request-forgery--1dfcf827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4581%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=6896cf6fad5a09ad0008f3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55149-cwe-22-improper-limitation-of-a-pat-091d81ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55149%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ulab-uiuc%20tiny-scientist&amp;severity=medium&amp;id=6896b351ad5a09ad00087c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55013-cwe-23-relative-path-traversal-in-c-5263e20f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55013%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20CybercentreCanada%20assemblyline&amp;severity=medium&amp;id=6896b351ad5a09ad00087c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55008-cwe-200-exposure-of-sensitive-infor-74e96ecf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55008%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20workos%20authkit-react-router&amp;severity=high&amp;id=6896b351ad5a09ad00087c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55009-cwe-200-exposure-of-sensitive-infor-c325b69e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55009%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20workos%20authkit-remix&amp;severity=high&amp;id=6896b351ad5a09ad00087c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55006-cwe-20-improper-input-validation-in-118b9a4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55006%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20frappe%20lms&amp;severity=medium&amp;id=6896b351ad5a09ad00087c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54888-cwe-287-improper-authentication-in--7c8f93db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54888%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fedify-dev%20fedify&amp;severity=high&amp;id=6896a8c3ad5a09ad00085a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54417-cwe-94-improper-control-of-generati-41dcd796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54417%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=medium&amp;id=6896a8c3ad5a09ad00085a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55152-cwe-400-uncontrolled-resource-consu-85404952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55152%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20oakserver%20oak&amp;severity=medium&amp;id=6896a8c3ad5a09ad00085a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ftc-older-adults-lost-record-700-million-to-scamme-dd5b7fdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FTC%3A%20older%20adults%20lost%20record%20%24700%20million%20to%20scammers%20in%202024&amp;severity=high&amp;id=68969736ad5a09ad0007f19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/winrar-zero-day-exploited-to-plant-malware-on-arch-9775d166</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WinRAR%20zero-day%20exploited%20to%20plant%20malware%20on%20archive%20extraction&amp;severity=critical&amp;id=68969736ad5a09ad0007f191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-09-ea036af9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-09&amp;severity=medium&amp;id=6897e51dad5a09ad000f211b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8744-sql-injection-in-cesiumlab-web-98cdfd60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8744%3A%20SQL%20Injection%20in%20CesiumLab%20Web&amp;severity=medium&amp;id=68968ca3ad5a09ad0007a78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46709-cwe-416-use-after-free-in-imaginati-6f7de367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46709%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=68968ca3ad5a09ad0007a789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6573-cwe-cwe-280-improper-handling-of-ins-e2719d45</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6573%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.15)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=critical&amp;id=6896891fad5a09ad00078b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8743-cross-site-scripting-in-scada-lts-24fd0699</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8743%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=6896859bad5a09ad00076012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8742-improper-restriction-of-excessive-au-6391cda1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8742%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6896778bad5a09ad00071915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8741-cleartext-transmission-of-sensitive--6323dd6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8741%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20macrozheng%20mall&amp;severity=medium&amp;id=68967097ad5a09ad0006f262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8740-cross-site-scripting-in-zhenfeng13-m-178587ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8740%3A%20Cross%20Site%20Scripting%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=6896697cad5a09ad0006d241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/theori-aixcc-writeup-0day-in-sqlite-more-db7085ba</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Theori%20AIxCC%20writeup%20%2C%200day%20in%20sqlite%20%2B%20more&amp;severity=medium&amp;id=6896627aad5a09ad00069fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8739-cross-site-request-forgery-in-zhenfe-cf0e80ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8739%3A%20Cross-Site%20Request%20Forgery%20in%20zhenfeng13%20My-Blog&amp;severity=medium&amp;id=68966275ad5a09ad00069fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8738-information-disclosure-in-zlt2000-mi-6740f9bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8738%3A%20Information%20Disclosure%20in%20zlt2000%20microservices-platform&amp;severity=medium&amp;id=68965b6cad5a09ad00067141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8737-open-redirect-in-zlt2000-microservic-c0424075</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8737%3A%20Open%20Redirect%20in%20zlt2000%20microservices-platform&amp;severity=medium&amp;id=68965465ad5a09ad00064b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8736-buffer-overflow-in-gnu-cflow-587bf5d2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8736%3A%20Buffer%20Overflow%20in%20GNU%20cflow&amp;severity=medium&amp;id=68964d74ad5a09ad00061695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8735-null-pointer-dereference-in-gnu-cflo-4ff8a388</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8735%3A%20NULL%20Pointer%20Dereference%20in%20GNU%20cflow&amp;severity=medium&amp;id=68964654ad5a09ad0005efbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4796-cwe-639-authorization-bypass-through-75153690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4796%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arraytics%20Eventin%20%E2%80%93%20Event%20Manager%2C%20Events%20Calendar%2C%20Booking%2C%20Tickets%20and%20Registration&amp;severity=high&amp;id=68964654ad5a09ad0005efb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8734-double-free-in-gnu-bison-3b45408e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8734&amp;severity=null&amp;id=68963f4cad5a09ad0005cd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8733-reachable-assertion-in-gnu-bison-7fa5014c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8733&amp;severity=null&amp;id=68963844ad5a09ad00059cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5095-cwe-306-in-burk-technology-arc-solo-70be6c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5095%3A%20CWE-306%20in%20Burk%20Technology%20ARC%20Solo&amp;severity=critical&amp;id=689634c3ad5a09ad00058732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-jdwp-exploited-in-the-wild-what-happens-wh-fe427dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20JDWP%20Exploited%20in%20the%20Wild%3A%20What%20Happens%20When%20Debug%20Ports%20Are%20Left%20Open&amp;severity=medium&amp;id=6896697cad5a09ad0006d1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-attack-deploying-malware-on-indian-defens-8b2a6c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Attack%3A%20Deploying%20Malware%20on%20Indian%20Defense%20BOSS%20Linux&amp;severity=medium&amp;id=6896697cad5a09ad0006d1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-socgholish-the-malware-web-behind-the-pi-df354d46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20SocGholish%3A%20The%20Malware%20Web%20Behind%20the%20&apos;Pioneer%20of%20Fake%20Updates&apos;%20and%20Its%20Operator%2C%20TA569&amp;severity=medium&amp;id=689665faad5a09ad0006b434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/statistics-report-on-malware-targeting-windows-dat-6b9ade44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Statistics%20Report%20on%20Malware%20Targeting%20Windows%20Database%20Servers%20in%20Q2%202025&amp;severity=medium&amp;id=689665faad5a09ad0006b454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/statistics-report-on-malware-targeting-windows-web-559b6c7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Statistics%20Report%20on%20Malware%20Targeting%20Windows%20Web%20Servers%20in%20Q2%202025&amp;severity=medium&amp;id=689665faad5a09ad0006b467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/650-attack-tools-one-coordinated-campaign-f1790ab9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=650%20Attack%20Tools%2C%20One%20Coordinated%20Campaign&amp;severity=medium&amp;id=689665faad5a09ad0006b475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unclaimed-google-play-store-package-73621107</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unclaimed%20Google%20Play%20Store%20package&amp;severity=medium&amp;id=68962a3aad5a09ad00054f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/genai-used-to-impersonate-brazils-government-websi-42da9f8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GenAI%20Used%20to%20Impersonate%20Brazil&apos;s%20Government%20Websites&amp;severity=medium&amp;id=68966274ad5a09ad00069e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-homograph-illusion-not-everything-is-as-it-see-829f3c5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Homograph%20Illusion%3A%20Not%20Everything%20Is%20As%20It%20Seems&amp;severity=medium&amp;id=68965ef2ad5a09ad00068d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8732-uncontrolled-recursion-in-libxml2-48d14c9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8732%3A%20Uncontrolled%20Recursion%20in%20libxml2&amp;severity=medium&amp;id=68962a34ad5a09ad00054f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8284-cwe-306-in-packet-power-emx-8c8d31c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8284%3A%20CWE-306%20in%20Packet%20Power%20EMX&amp;severity=critical&amp;id=689626b0ad5a09ad00053371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8393-cwe-295-in-dreame-technology-dreameh-116ece46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8393%3A%20CWE-295%20in%20Dreame%20Technology%20Dreamehome%20iOS%20app&amp;severity=high&amp;id=689626b0ad5a09ad00053374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46414-cwe-307-in-eg4-electronics-eg4-12kp-f54e5740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46414%3A%20CWE-307%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=high&amp;id=689626b0ad5a09ad0005336d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47872-cwe-203-in-eg4-electronics-eg4-12kp-07b453c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47872%3A%20CWE-203%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=medium&amp;id=68964d74ad5a09ad0006168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53520-cwe-494-in-eg4-electronics-eg4-12kp-222403dd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53520%3A%20CWE-494%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=high&amp;id=68964d74ad5a09ad00061691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52586-cwe-319-in-eg4-electronics-eg4-12kp-aff10941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52586%3A%20CWE-319%20in%20EG4%20Electronics%20EG4%2012kPV&amp;severity=medium&amp;id=6896232cad5a09ad0005287f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4576-cwe-79-improper-neutralization-of-in-1d8f72ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68961fa9ad5a09ad00051cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8356-cwe-22-improper-limitation-of-a-path-c7213120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8356%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xerox%20FreeFlow%20Core&amp;severity=critical&amp;id=68961c24ad5a09ad00050559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8731-use-of-default-credentials-in-trendn-a133a382</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8731%3A%20Use%20of%20Default%20Credentials%20in%20TRENDnet%20TI-G160i&amp;severity=critical&amp;id=68961c24ad5a09ad0005055c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8355-cwe-611-improper-restriction-of-xml--82cc294f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8355%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Xerox%20FreeFlow%20Core&amp;severity=high&amp;id=68961c24ad5a09ad00050556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36023-cwe-639-authorization-bypass-throug-cec630b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=68961198ad5a09ad0004c7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8730-hard-coded-credentials-in-belkin-f9k-e6586f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8730%3A%20Hard-coded%20Credentials%20in%20Belkin%20F9K1009&amp;severity=critical&amp;id=68960e1dad5a09ad0004b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36119-cwe-290-authentication-bypass-by-sp-75f9e43b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36119%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing&amp;severity=high&amp;id=68960aacad5a09ad000490a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rubygems-pypi-hit-by-malicious-packages-stealing-c-51963e43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RubyGems%2C%20PyPI%20Hit%20by%20Malicious%20Packages%20Stealing%20Credentials%2C%20Crypto%2C%20Forcing%20Security%20Changes&amp;severity=high&amp;id=68960a8ead5a09ad00048f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaked-credentials-up-160-what-attackers-are-doing-a3961e0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaked%20Credentials%20Up%20160%25%3A%20What%20Attackers%20Are%20Doing%20With%20Them&amp;severity=high&amp;id=68960a8ead5a09ad00048f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/efimer-trojan-delivered-via-email-and-hacked-wordp-53ba6455</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Efimer%20Trojan%20delivered%20via%20email%20and%20hacked%20WordPress%20websites&amp;severity=medium&amp;id=68965b6bad5a09ad00067112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unveiling-a-new-variant-of-the-darkcloud-campaign-11fd6b35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unveiling%20a%20New%20Variant%20of%20the%20DarkCloud%20Campaign&amp;severity=medium&amp;id=68965ef2ad5a09ad00068d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8729-path-traversal-in-migoxlab-lmeterx-00e1c832</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8729%3A%20Path%20Traversal%20in%20MigoXLab%20LMeterX&amp;severity=medium&amp;id=68960004ad5a09ad000436e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flipper-zero-darkweb-firmware-bypasses-rolling-cod-bceb527d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flipper%20Zero%20&apos;DarkWeb&apos;%20Firmware%20Bypasses%20Rolling%20Code%20Security%20on%20Major%20Vehicle%20Brands&amp;severity=high&amp;id=6895ee6fad5a09ad000387a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/royal-and-blacksuit-ransomware-gangs-hit-over-450--eb2fc1b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Royal%20and%20BlackSuit%20ransomware%20gangs%20hit%20over%20450%20US%20companies&amp;severity=high&amp;id=6895ee6fad5a09ad000387a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/columbia-university-data-breach-impacts-nearly-870-c507de44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Columbia%20University%20data%20breach%20impacts%20nearly%20870%2C000%20individuals&amp;severity=high&amp;id=6895ee6fad5a09ad0003879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-365-apps-to-soon-block-file-access-via-f-2d632474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20365%20apps%20to%20soon%20block%20file%20access%20via%20FPRPC%20by%20default&amp;severity=high&amp;id=6895ee6fad5a09ad000387ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greedybear-40-fake-crypto-wallet-extensions-found--bea1935e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreedyBear%3A%2040%20Fake%20Crypto%20Wallet%20Extensions%20Found%20on%20Firefox%20Marketplace&amp;severity=medium&amp;id=6895e767ad5a09ad000312de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8749-cwe-22-improper-limitation-of-a-path-b49d99e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8749%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=medium&amp;id=6895e3f6ad5a09ad0002fd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greedybear-scam-150-fake-crypto-wallet-extensions--d1c9462b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GreedyBear%20Scam%3A%20150%20Fake%20Crypto%20Wallet%20Extensions%20Found%20on%20Firefox%20Marketplace&amp;severity=medium&amp;id=6895e3e2ad5a09ad0002fcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8088-cwe-35-path-traversal-in-winrar-gmbh-59118f52</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8088%3A%20CWE-35%20Path%20traversal%20in%20win.rar%20GmbH%20WinRAR&amp;severity=high&amp;id=6895e060ad5a09ad0002e7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8748-cwe-78-improper-neutralization-of-sp-0175aa01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8748%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mobile%20Industrial%20Robots%20MiR%20Robots&amp;severity=high&amp;id=6895dcdcad5a09ad0002c9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53606-cwe-502-deserialization-of-untruste-8a26a77d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53606%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Seata%20(incubating)&amp;severity=critical&amp;id=6895c441ad5a09ad0002032f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48913-cwe-20-improper-input-validation-in-386f6c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48913%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=critical&amp;id=6895c441ad5a09ad0002032c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/observed-malicious-driver-use-associated-with-akir-cf1336da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Observed%20Malicious%20Driver%20Use%20Associated%20with%20Akira%20SonicWall%20Campaign&amp;severity=medium&amp;id=6895b2abad5a09ad00019ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-socgholish-untangling-the-malware-web-be-3e19e572</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20SocGholish%3A%20Untangling%20the%20Malware%20Web%20Behind%20the%20&apos;Pioneer%20of%20Fake%20Updates&apos;%20and%20Its%20Operator&amp;severity=medium&amp;id=6895b62fad5a09ad0001b28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6572-cwe-79-cross-site-scripting-xss-in-o-c8312ba3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6572%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20OpenStreetMap%20for%20Gutenberg%20and%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=medium&amp;id=6895968dad5a09ad0000c784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54958-improper-neutralization-of-special--124d9705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54958%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Mubit%20co.%2Cltd.%20Powered%20BLUE%20870&amp;severity=medium&amp;id=689584f8ad5a09ad00005b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54959-improper-limitation-of-a-pathname-t-0f9e4d09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54959%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Mubit%20co.%2Cltd.%20Powered%20BLUE%20870&amp;severity=medium&amp;id=689584f8ad5a09ad00005b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54940-code-injection-in-wpengine-inc-adva-62045627</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54940%3A%20Code%20injection%20in%20WPEngine%2C%20Inc.%20Advanced%20Custom%20Fields&amp;severity=low&amp;id=68958174ad5a09ad00003b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8708-deserialization-in-antabot-white-jot-6175fb3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8708%3A%20Deserialization%20in%20Antabot%20White-Jotter&amp;severity=low&amp;id=68956554ad5a09ad00ff8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8707-improper-export-of-android-applicati-c4ac44e5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8707%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Huuge%20Box%20App&amp;severity=medium&amp;id=68956554ad5a09ad00ff815e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8706-sql-injection-in-wanzhou-woes-intell-b8f7fcf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8706%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=68955744ad5a09ad00ff05cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8705-sql-injection-in-wanzhou-woes-intell-d6ea10b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8705%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=6895503cad5a09ad00fed5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bouygues-telecom-confirms-data-breach-impacting-64-fe4342e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bouygues%20Telecom%20confirms%20data%20breach%20impacting%206.4%20million%20customers&amp;severity=high&amp;id=68954932ad5a09ad00fe87b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-edr-killer-tool-used-by-eight-different-ransom-29069f66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20EDR%20killer%20tool%20used%20by%20eight%20different%20ransomware%20groups&amp;severity=high&amp;id=68954932ad5a09ad00fe87b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/socgholish-malware-spread-via-ad-tools-delivers-ac-4b17bf5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SocGholish%20Malware%20Spread%20via%20Ad%20Tools%3B%20Delivers%20Access%20to%20LockBit%2C%20Evil%20Corp%2C%20and%20Others&amp;severity=high&amp;id=68954932ad5a09ad00fe87bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8704-sql-injection-in-wanzhou-woes-intell-5bb8dd05</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8704%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=6895495bad5a09ad00fe8c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-whatsapp-developer-libraries-hide-destructive-9c61a704</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20WhatsApp%20developer%20libraries%20hide%20destructive%20data-wiping%20code&amp;severity=high&amp;id=689545b2ad5a09ad00fe4dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54887-cwe-354-improper-validation-of-inte-95345ef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54887%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20jwt%20ruby-jwe&amp;severity=critical&amp;id=6895495bad5a09ad00fe8c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54886-cwe-502-deserialization-of-untruste-7fc53b73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54886%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20skops-dev%20skops&amp;severity=high&amp;id=6895495bad5a09ad00fe8c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54793-cwe-601-url-redirection-to-untruste-49925502</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54793%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20withastro%20astro&amp;severity=medium&amp;id=6895495bad5a09ad00fe8c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8703-sql-injection-in-wanzhou-woes-intell-b2f196ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8703%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=6895495bad5a09ad00fe8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54368-cwe-436-interpretation-conflict-in--db3ace55</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54368%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20astral-sh%20uv&amp;severity=medium&amp;id=68953ea5ad5a09ad00fe06ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-08-42e4e01a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-08&amp;severity=medium&amp;id=6896939dad5a09ad0007c1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52914-na-041324d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52914%3A%20n%2Fa&amp;severity=high&amp;id=68963844ad5a09ad00059cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52913-na-2afb61db</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52913%3A%20n%2Fa&amp;severity=critical&amp;id=68963844ad5a09ad00059ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50928-na-9d296bc6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50928%3A%20n%2Fa&amp;severity=medium&amp;id=689634c3ad5a09ad00058736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50927-na-39e4a7df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50927%3A%20n%2Fa&amp;severity=medium&amp;id=689634c3ad5a09ad0005872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50467-na-778a72e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50467%3A%20n%2Fa&amp;severity=medium&amp;id=68962db8ad5a09ad0005624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50466-na-750ef929</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50466%3A%20n%2Fa&amp;severity=high&amp;id=68962db8ad5a09ad0005624a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50465-na-2fe7e671</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50465%3A%20n%2Fa&amp;severity=high&amp;id=68962db8ad5a09ad00056245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50468-na-37ed3be4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50468%3A%20n%2Fa&amp;severity=medium&amp;id=68962a34ad5a09ad00054f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8702-sql-injection-in-wanzhou-woes-intell-cdd85c7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8702%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=68953b20ad5a09ad00fdf6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54952-integer-overflow-to-buffer-overflow-119da1ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54952%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20(CWE-680)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=6895379cad5a09ad00fde2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54951-heap-based-buffer-overflow-cwe-122--46e29251</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54951%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=6895342bad5a09ad00fdcd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54950-out-of-bounds-read-cwe-125-in-meta--029001ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54950%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=6895342bad5a09ad00fdcd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54949-heap-based-buffer-overflow-cwe-122--55f06c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54949%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=68953094ad5a09ad00fdbe54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30405-integer-overflow-or-wraparound-cwe--01c5e5bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30405%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=68953094ad5a09ad00fdbe50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30404-integer-overflow-or-wraparound-cwe--95f8cedb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30404%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=critical&amp;id=68953094ad5a09ad00fdbe58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blog-exploiting-retbleed-in-the-real-world-52c47e4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blog%3A%20Exploiting%20Retbleed%20in%20the%20real%20world&amp;severity=medium&amp;id=68951f05ad5a09ad00fd4141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/consent-compromise-abusing-entra-oauth-for-fun-and-a89846ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Consent%20%26%20Compromise%3A%20Abusing%20Entra%20OAuth%20for%20Fun%20and%20Access%20to%20Internal%20Microsoft%20Applications&amp;severity=medium&amp;id=68951b81ad5a09ad00fd3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-svg-threat-how-hackers-use-vector-gr-d5701c68</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20SVG%20Threat%3A%20How%20Hackers%20Use%20Vector%20Graphics%20for%20Phishing%20Attacks&amp;severity=medium&amp;id=68951f00ad5a09ad00fd411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-infection-chain-and-confuserex-based-obfuscati-b8d2e472</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Infection%20Chain%20and%20ConfuserEx-Based%20Obfuscation%20for%20DarkCloud%20Stealer&amp;severity=medium&amp;id=68951b7cad5a09ad00fd30cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odyssey-stealer-malware-attacks-macos-users-883e406d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Odyssey%20Stealer%20Malware%20Attacks%20macOS%20Users&amp;severity=medium&amp;id=68951b7cad5a09ad00fd30de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8701-sql-injection-in-wanzhou-woes-intell-d482c818</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8701%3A%20SQL%20Injection%20in%20Wanzhou%20WOES%20Intelligent%20Optimization%20Energy%20Saving%20System&amp;severity=medium&amp;id=689517f8ad5a09ad00fd1cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53787-cwe-77-improper-neutralization-of-s-42a1a210</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53787%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=high&amp;id=689517f8ad5a09ad00fd1cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53774-cwe-77-improper-neutralization-of-s-17c5b648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53774%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&apos;s%20Business%20Chat&amp;severity=medium&amp;id=689517f8ad5a09ad00fd1cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53767-cwe-918-server-side-request-forgery-dfee4d77</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53767%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Open%20AI&amp;severity=critical&amp;id=689517f8ad5a09ad00fd1cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53792-cwe-285-improper-authorization-in-m-470fa6a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53792%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Portal&amp;severity=critical&amp;id=689517f8ad5a09ad00fd1cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prompt-injection-engineering-for-attackers-exploit-f931dd61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prompt%20injection%20engineering%20for%20attackers%3A%20Exploiting%20GitHub%20Copilot&amp;severity=medium&amp;id=689510f4ad5a09ad00fcd0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8698-reachable-assertion-in-open5gs-4aafc063</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8698%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=689510f0ad5a09ad00fcd0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26513-267-in-netapp-san-host-utilities-fo-fe46d288</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26513%3A%20267%20in%20NetApp%20SAN%20Host%20Utilities%20for%20Windows&amp;severity=high&amp;id=689510f0ad5a09ad00fcd0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7195-incorrect-default-permissions-in-red-af0cccee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7195%3A%20Incorrect%20Default%20Permissions%20in%20operator-framework%20operator-sdk&amp;severity=medium&amp;id=6894fbd9ad5a09ad00fc400a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8697-os-command-injection-in-agentunivers-b810eed9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8697%3A%20OS%20Command%20Injection%20in%20agentUniverse&amp;severity=medium&amp;id=6894fbd9ad5a09ad00fc400e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shared-secret-edr-killer-in-the-kill-chain-2768358e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shared%20secret%3A%20EDR%20killer%20in%20the%20kill%20chain&amp;severity=medium&amp;id=68951f00ad5a09ad00fd40d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55077-cwe-250-execution-with-unnecessary--283ee7cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55077%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Tyler%20Technologies%20ERP%20Pro%209%20SaaS&amp;severity=medium&amp;id=6894f4d0ad5a09ad00fbae47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24000-cwe-288-authentication-bypass-using-bb0ee835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24000%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=null&amp;id=6894dfb8ad5a09ad00fb3dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34148-cwe-78-improper-neutralization-of-s-5720704b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34148%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34149-cwe-78-improper-neutralization-of-s-a995e69c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34149%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34150-cwe-78-improper-neutralization-of-s-bcde81f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34150%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34151-cwe-78-improper-neutralization-of-s-4040732f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34151%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34152-cwe-78-improper-neutralization-of-s-f6f4203a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34152%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6894d8b1ad5a09ad00fb13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47907-cwe-362-concurrent-execution-using--172f4e14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47907%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Go%20standard%20library%20database%2Fsql&amp;severity=high&amp;id=6894ce25ad5a09ad00fae4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/email-delivered-rmm-abusing-pdfs-for-silent-initia-9b3d19d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Email-Delivered%20RMM%3A%20Abusing%20PDFs%20for%20Silent%20Initial%20Access&amp;severity=medium&amp;id=68951f00ad5a09ad00fd409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7054-cwe-835-loop-with-unreachable-exit-c-3283aace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7054%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cloudflare%20quiche&amp;severity=high&amp;id=6894ce25ad5a09ad00fae4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-infection-chain-and-confuserex-based-obfuscati-1da7267c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Infection%20Chain%20and%20ConfuserEx-Based%20Obfuscation%20for%20DarkCloud%20Stealer&amp;severity=medium&amp;id=6894bc94ad5a09ad00fa7a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/greedy-bear-massive-crypto-wallet-attack-spans-acr-72e776d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Greedy%20Bear%20%E2%80%94Massive%20Crypto%20Wallet%20Attack%20Spans%20Across%20Multiple%20Vectors&amp;severity=medium&amp;id=6894b92aad5a09ad00fa65f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cracking-the-vault-how-we-found-zero-day-flaws-in--524a15f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cracking%20the%20Vault%3A%20how%20we%20found%20zero-day%20flaws%20in%20authentication%2C%20identity%2C%20and%20authorization%20in%20HashiCorp%20Vault&amp;severity=critical&amp;id=6894a77bad5a09ad00fa15ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/air-france-and-klm-disclose-data-breaches-impactin-5dce7ce9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Air%20France%20and%20KLM%20disclose%20data%20breaches%20impacting%20customers&amp;severity=high&amp;id=68949969ad5a09ad00f9ae00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-arsenal-lamehug-the-first-ai-powered-malware-e3562d75</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Arsenal%3A%20LAMEHUG%2C%20the%20First%20AI-Powered%20Malware&amp;severity=medium&amp;id=68951f00ad5a09ad00fd408e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rokrat-shellcode-and-steganographic-threats-analys-c4bb01c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RoKRAT%20Shellcode%20and%20Steganographic%20Threats%3A%20Analysis%20and%20EDR%20Response%20Strategies&amp;severity=medium&amp;id=6894c71cad5a09ad00fac0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playpraetors-evolving-threat-how-chinese-speaking--2f4f7b2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlayPraetor&apos;s%20evolving%20threat%3A%20How%20Chinese-speaking%20actors%20globally%20scale%20an%20Android%20RAT&amp;severity=medium&amp;id=6894c399ad5a09ad00faac85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-reconnaissance-to-control-the-operational-blu-c0611bd2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Reconnaissance%20to%20Control%3A%20The%20Operational%20Blueprint%20of%20Kimsuky%20APT%20for%20Cyber%20Espionage&amp;severity=medium&amp;id=6894c399ad5a09ad00faaca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-bing-search-to-ransomware-bumblebee-and-adapt-e5330496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Bing%20Search%20to%20Ransomware%3A%20Bumblebee%20and%20AdaptixC2%20Deliver%20Akira&amp;severity=medium&amp;id=6894c399ad5a09ad00faacb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-promptware-attack-hijacks-users-gemini-ai-via--2d0e4e1b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Promptware%20Attack%20Hijacks%20User&apos;s%20Gemini%20AI%20Via%20Google%20Calendar%20Invite&amp;severity=medium&amp;id=689487d6ad5a09ad00f93c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/slowtempest-cobalt-strike-loader-95cc7700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SLOW%23TEMPEST%20Cobalt%20Strike%20Loader&amp;severity=medium&amp;id=68948452ad5a09ad00f926e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8533-cwe-863-incorrect-authorization-in-f-c96ebd72</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8533%3A%20CWE-863%20Incorrect%20Authorization%20in%20Flexibits%20Fantastical&amp;severity=medium&amp;id=68947d4bad5a09ad00f8f78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-detec-d932a0de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20Detection&amp;severity=medium&amp;id=6895dcdbad5a09ad0002c7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-fastf-a3a56034</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20FastFlux&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-infos-4219f3ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20InfoStealer&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-comma-49ce9106</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20Command%20And%20Control&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-medium-confidence-phish-7913a375</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Medium%20Confidence%20Phishing&amp;severity=medium&amp;id=6895aba3ad5a09ad00016c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-44797350</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20Detection&amp;severity=medium&amp;id=6895a81fad5a09ad00013bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-fastflu-a78cf859</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20FastFlux&amp;severity=medium&amp;id=6895a81fad5a09ad00013d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-infoste-88c75f4d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20InfoStealer&amp;severity=medium&amp;id=6895a81fad5a09ad00013d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-command-98393de5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20Command%20And%20Control&amp;severity=medium&amp;id=6895a81fad5a09ad00013d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-high-confidence-phishin-66cd9e0e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20High%20Confidence%20Phishing&amp;severity=medium&amp;id=6895a81fad5a09ad00013d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35970-use-of-weak-credentials-in-seiko-ep-16c28c52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35970%3A%20Use%20of%20weak%20credentials%20in%20SEIKO%20EPSON%20Multiple%20EPSON%20product&amp;severity=high&amp;id=68943e03ad5a09ad00f73b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29866-cwe-73-external-control-of-file-nam-a0f37e3b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29866%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20TAGFREE%20X-Free%20Uploader&amp;severity=high&amp;id=68943a7fad5a09ad00f729d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8583-inappropriate-implementation-in-goog-b9ae4e15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8583%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8582-insufficient-validation-of-untrusted-1d0dc30f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8582%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8581-inappropriate-implementation-in-goog-4460eb3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8581%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8580-inappropriate-implementation-in-goog-848c30c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8580%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8579-inappropriate-implementation-in-goog-e04a826f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8579%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8578-use-after-free-in-google-chrome-e0587967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8578%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68940948ad5a09ad00f60f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8577-inappropriate-implementation-in-goog-aaf07dc2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8577%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68940948ad5a09ad00f60f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8576-use-after-free-in-google-chrome-d5eec489</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8576%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68940948ad5a09ad00f60f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29865-cwe-22-improper-limitation-of-a-pat-2bbc3d15</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29865%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TAGFREE%20X-Free%20Uploader&amp;severity=high&amp;id=68940948ad5a09ad00f60f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-abuses-cpu-tuning-tool-to-disable-60f24204</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20ransomware%20abuses%20CPU%20tuning%20tool%20to%20disable%20Microsoft%20Defender&amp;severity=high&amp;id=6893fb35ad5a09ad00f5ce8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-ecscape-flaw-in-amazon-ecs-ena-adf812e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20ECScape%20Flaw%20in%20Amazon%20ECS%20Enabling%20Cross-Task%20Credential%20Theft&amp;severity=high&amp;id=6893f7b1ad5a09ad00f58d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3770-cwe-693-protection-mechanism-failure-966bca45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3770%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20TianoCore%20EDK2&amp;severity=high&amp;id=6893febbad5a09ad00f5db87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54798-cwe-59-improper-link-resolution-bef-9287b6d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54798%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20raszi%20node-tmp&amp;severity=low&amp;id=6893f7c1ad5a09ad00f58d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54799-cwe-319-cleartext-transmission-of-s-7d1ce94e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54799%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20go-acme%20lego&amp;severity=low&amp;id=6893f7c1ad5a09ad00f58d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54885-cwe-331-insufficient-entropy-in-sim-13ec5f67</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54885%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20simbo1905%20thinbus-srp-npm&amp;severity=medium&amp;id=6893f7c1ad5a09ad00f58d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54882-cwe-522-insufficiently-protected-cr-ba911cf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54882%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20himmelblau-idm%20himmelblau&amp;severity=high&amp;id=6893f7c1ad5a09ad00f58d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-07-aa750a3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-07&amp;severity=medium&amp;id=6895421dad5a09ad00fe1ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45765-na-94b9ccb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45765%3A%20n%2Fa&amp;severity=critical&amp;id=689517f8ad5a09ad00fd1cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48709-na-5c8ba7ab</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48709%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20BMC%20Control-M%2FServer&amp;severity=medium&amp;id=689509e8ad5a09ad00fca7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47808-na-f31ad026</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47808%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc662b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47807-na-81c71baf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47807%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc6627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47806-na-df59c747</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47806%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc6623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47219-na-4f7307b0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47219%3A%20n%2Fa&amp;severity=high&amp;id=6894ff5cad5a09ad00fc661f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47183-na-c5bbf8f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47183%3A%20n%2Fa&amp;severity=medium&amp;id=6894ff5cad5a09ad00fc661b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50692-na-6a29e9be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50692%3A%20n%2Fa&amp;severity=critical&amp;id=6894f4d0ad5a09ad00fbae43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50675-na-29efc5b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50675%3A%20n%2Fa&amp;severity=high&amp;id=6894f4d0ad5a09ad00fbae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51533-na-8276b1ed</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51533%3A%20n%2Fa&amp;severity=medium&amp;id=6894f14cad5a09ad00fb9865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51629-na-617b5f0a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51629%3A%20n%2Fa&amp;severity=high&amp;id=6894ea44ad5a09ad00fb8278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55138-cwe-304-missing-critical-step-in-au-278af90e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55138%3A%20CWE-304%20Missing%20Critical%20Step%20in%20Authentication%20in%20Latkecrszy%20LinkJoin&amp;severity=high&amp;id=6894d8b2ad5a09ad00fb1414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55137-cwe-843-access-of-resource-using-in-a9115b86</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55137%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Latkecrszy%20LinkJoin&amp;severity=high&amp;id=6894d8b2ad5a09ad00fb1411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54397-na-5dc50f18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54397%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b2ad5a09ad00fb140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54396-na-880ffb19</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54396%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb1400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54395-na-74e794f4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54395%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54394-na-48c10732</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54394%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54393-na-206d0734</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54393%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54392-na-b16f681f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54392%3A%20n%2Fa&amp;severity=medium&amp;id=6894d8b1ad5a09ad00fb13f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55136-na-9efa91f2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55136%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20tae898%20ERC&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55135-cwe-434-unrestricted-upload-of-file-fb243228</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55135%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Agora%20Foundation%20Agora&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55134-cwe-79-improper-neutralization-of-i-64740d69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55134%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Agora%20Foundation%20Agora&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55133-cwe-79-improper-neutralization-of-i-fc1da20c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Agora%20Foundation%20Agora&amp;severity=medium&amp;id=6894d1a9ad5a09ad00faf393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44779-na-6c6e8919</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44779%3A%20n%2Fa&amp;severity=medium&amp;id=6894c71cad5a09ad00fac0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50952-na-f1db1bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50952%3A%20n%2Fa&amp;severity=medium&amp;id=6894c399ad5a09ad00faad0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47188-na-6f9b7bb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47188%3A%20n%2Fa&amp;severity=medium&amp;id=6894c01aad5a09ad00fa89f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32094-cwe-444-inconsistent-interpretation-acabfba9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32094%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Akamai%20AkamaiGhost&amp;severity=medium&amp;id=689428ebad5a09ad00f6b4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/http11-must-die-the-desync-endgame-whitepaper-82ed93f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTTP%2F1.1%20must%20die%3A%20the%20desync%20endgame%20(whitepaper)&amp;severity=medium&amp;id=6893ed26ad5a09ad00f5432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54786-cwe-200-exposure-of-sensitive-infor-b7ca2007</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54786%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SuiteCRM%20SuiteCRM-Core&amp;severity=medium&amp;id=6893e61ead5a09ad00f4ed38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-groups-stole-115-million-us-cards-in-16-mo-5adf347a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Groups%20Stole%20115%20Million%20US%20Cards%20in%2016-Month%20Smishing%20Campaign&amp;severity=medium&amp;id=6893d105ad5a09ad00f46f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agentic-misalignment-how-llms-could-be-insider-thr-3ee29d5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Agentic%20Misalignment%3A%20How%20LLMs%20could%20be%20insider%20threats&amp;severity=medium&amp;id=6893c679ad5a09ad00f41d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7770-cwe-337-predictable-seed-in-pseudo-r-abe09480</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7770%3A%20CWE-337%20Predictable%20Seed%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Tigo%20Energy%20Cloud%20Connect%20Advanced&amp;severity=high&amp;id=6893c2f5ad5a09ad00f41437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6634-cwe-120-buffer-copy-without-checking-6c762da3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6634%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6893bf74ad5a09ad00f4090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6633-cwe-787-out-of-bounds-write-in-autod-c8bed724</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6633%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%203ds%20Max&amp;severity=high&amp;id=6893bf74ad5a09ad00f4090b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7769-cwe-77-improper-neutralization-of-sp-eb07efa9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7769%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Tigo%20Energy%20Cloud%20Connect%20Advanced&amp;severity=high&amp;id=6893bf74ad5a09ad00f40911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6632-cwe-125-out-of-bounds-read-in-autode-0e3161d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6632%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%203ds%20Max&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7768-cwe-798-use-of-hard-coded-credential-604c635d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7768%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Tigo%20Energy%20Cloud%20Connect%20Advanced&amp;severity=critical&amp;id=6893bf74ad5a09ad00f40918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/revault-flaws-let-hackers-bypass-windows-login-on--c4ac4169</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ReVault%20flaws%20let%20hackers%20bypass%20Windows%20login%20on%20Dell%20laptops&amp;severity=high&amp;id=6893b868ad5a09ad00f3b601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-suffers-data-breach-in-ongoing-salesforce-d-88ad5867</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20suffers%20data%20breach%20in%20ongoing%20Salesforce%20data%20theft%20attacks&amp;severity=high&amp;id=6893b868ad5a09ad00f3b5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mfa-matters-but-it-isnt-enough-on-its-own-e83fc396</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MFA%20matters%E2%80%A6%20But%20it%20isn%E2%80%99t%20enough%20on%20its%20own&amp;severity=high&amp;id=6893b868ad5a09ad00f3b605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-fixes-two-actively-exploited-apex-one--1f53c9ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20fixes%20two%20actively%20exploited%20Apex%20One%20RCE%20flaws&amp;severity=medium&amp;id=6893b868ad5a09ad00f3b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ghost-calls-tactic-abuses-zoom-and-microsoft-t-3a241c3e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Ghost%20Calls%20tactic%20abuses%20Zoom%20and%20Microsoft%20Teams%20for%20C2%20operations&amp;severity=high&amp;id=6893b868ad5a09ad00f3b60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38746-cwe-200-exposure-of-sensitive-infor-61b5d8d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38746%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=low&amp;id=6893b4e7ad5a09ad00f3acb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38747-cwe-378-creation-of-temporary-file--88bb9f4b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38747%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Dell%20SupportAssist%20OS%20Recovery&amp;severity=high&amp;id=6893b4e7ad5a09ad00f3acbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8667-os-command-injection-in-skyworkai-de-fcde29d4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8667%3A%20OS%20Command%20Injection%20in%20SkyworkAI%20DeepResearchAgent&amp;severity=medium&amp;id=68939c47ad5a09ad00f31c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-accesses-millions-of-imdatacenter-records-f-cecc1b58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Accesses%20Millions%20of%20IMDataCenter%20Records%20from%20Exposed%20AWS%20Bucket&amp;severity=medium&amp;id=68939540ad5a09ad00f2f706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8419-improper-neutralization-of-crlf-sequ-7cb1d762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8419%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2026.0&amp;severity=medium&amp;id=68938e39ad5a09ad00f2dd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8665-os-command-injection-in-agno-agi-agn-0b575849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8665%3A%20OS%20Command%20Injection%20in%20agno-agi%20agno&amp;severity=medium&amp;id=68938e39ad5a09ad00f2dd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20215-improper-certificate-validation-in--307b081c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20215%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=689383b3ad5a09ad00f2896f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20332-incorrect-authorization-in-cisco-ci-a90f8028</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20332%3A%20Incorrect%20Authorization%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=689383b3ad5a09ad00f28975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20331-improper-neutralization-of-script-r-d734165e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20331%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=689383b3ad5a09ad00f28972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53786-cwe-287-improper-authentication-in--6e0d1575</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53786%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=68938029ad5a09ad00f27bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8244-cwe-367-time-of-check-time-of-use-to-e0f63742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8244%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Go%20standard%20library%20path%2Ffilepath&amp;severity=low&amp;id=69091538c28fd46ded7ba9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48394-cwe-22-improper-limitation-of-a-pat-95887e81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48394%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Eaton%20G4%20PDU&amp;severity=medium&amp;id=68937922ad5a09ad00f257af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48393-cwe-295-improper-certificate-valida-ad9161bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48393%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Eaton%20G4%20PDU&amp;severity=medium&amp;id=68937922ad5a09ad00f257ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2028-cwe-295-improper-certificate-validat-8d401122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2028%3A%20CWE-295%3A%20Improper%20Certificate%20Validation.%20in%20checkpoint%20Check%20Point%20Management%20Log%20Server&amp;severity=medium&amp;id=68936e98ad5a09ad00f216dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36020-cwe-319-in-ibm-guardium-data-protec-a5f7d054</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36020%3A%20CWE-319%20in%20IBM%20Guardium%20Data%20Protection&amp;severity=medium&amp;id=68936b11ad5a09ad00f1e91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8616-cwe-294-authentication-bypass-by-cap-89e3f59e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8616%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20OpenText%20Advanced%20Authentication&amp;severity=medium&amp;id=68936409ad5a09ad00f1c8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3354-cwe-122-heap-based-buffer-overflow-i-2a2833a9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3354%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6893608bad5a09ad00f1b804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3320-cwe-122-heap-based-buffer-overflow-i-c82f913a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3320%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Tivoli%20Monitoring&amp;severity=high&amp;id=6893608bad5a09ad00f1b801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23335-cwe-191-integer-underflow-wrap-or-w-c81f1760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23335%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=6893527aad5a09ad00f16588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23334-cwe-125-out-of-bounds-read-in-nvidi-82c33eb7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23334%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=6893527aad5a09ad00f16583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23333-cwe-125-out-of-bounds-read-in-nvidi-7b4577c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23333%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=medium&amp;id=6893527aad5a09ad00f1657e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pbs-confirms-data-breach-after-employee-info-leake-286e6493</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PBS%20confirms%20data%20breach%20after%20employee%20info%20leaked%20on%20Discord%20servers&amp;severity=high&amp;id=68934ef0ad5a09ad00f14e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23331-cwe-789-memory-allocation-with-exce-7a111b0e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23331%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=6893527aad5a09ad00f16579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23327-cwe-190-integer-overflow-or-wraparo-525e4dcf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23327%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=6893527aad5a09ad00f16574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23326-cwe-680-integer-overflow-to-buffer--3ad105af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23326%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=6893527aad5a09ad00f1656f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-fixed-two-qualcomm-bugs-that-were-actively--449d536a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20fixed%20two%20Qualcomm%20bugs%20that%20were%20actively%20exploited%20in%20the%20wild&amp;severity=medium&amp;id=68934ef0ad5a09ad00f14e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23325-cwe-674-uncontrolled-recursion-in-n-bba1a525</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23325%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-d-link-cameras-and-network-video-reco-a85d22a8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20D-Link%20cameras%20and%20Network%20Video%20Recorder%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68934ef0ad5a09ad00f14e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23324-cwe-190-integer-overflow-or-wraparo-f39f8e04</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23324%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23323-cwe-190-integer-overflow-or-wraparo-fa2adbc3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23323%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f1654e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23322-cwe-415-double-free-in-nvidia-trito-956b1327</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23322%3A%20CWE-415%20Double%20Free%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23321-cwe-369-divide-by-zero-in-nvidia-tr-15123ef7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23321%3A%20CWE-369%20Divide%20By%20Zero%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23320-cwe-209-generation-of-error-message-b82265b7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23320%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f1653f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23319-cwe-805-buffer-access-with-incorrec-2d147935</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23319%3A%20CWE-805%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f1653a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23318-cwe-805-buffer-access-with-incorrec-cc0cdfb8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23318%3A%20CWE-805%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=high&amp;id=68935279ad5a09ad00f16535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/klm-airlines-confirms-customer-data-breach-linked--089845f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KLM%20Airlines%20Confirms%20Customer%20Data%20Breach%20Linked%20to%20Third-Party%20System&amp;severity=high&amp;id=68934ef0ad5a09ad00f14e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23317-cwe-122-heap-based-buffer-overflow--80af4f76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23317%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68935279ad5a09ad00f16530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23311-cwe-121-stack-based-buffer-overflow-ae1e1740</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23311%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68935279ad5a09ad00f1652b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23310-cwe-121-stack-based-buffer-overflow-000c9406</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23310%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20Triton%20Inference%20Server&amp;severity=critical&amp;id=68934f36ad5a09ad00f14f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5197-cwe-1333-inefficient-regular-express-976fe9e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5197%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=68934465ad5a09ad00f11e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46391-cwe-284-improper-access-control-in--23332a3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46391%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Emby%20MediaBrowser&amp;severity=medium&amp;id=689339d9ad5a09ad00f0a492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46390-cwe-204-observable-response-discrep-3050d072</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46390%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Emby%20MediaBrowser&amp;severity=high&amp;id=68933655ad5a09ad00f09819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46389-cwe-620-unverified-password-change--8b2e89c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46389%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20Emby%20MediaBrowser&amp;severity=medium&amp;id=68933655ad5a09ad00f09816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46388-cwe-200-exposure-of-sensitive-infor-355e5377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46388%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Emby%20MediaBrowser&amp;severity=medium&amp;id=68933655ad5a09ad00f09813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46387-cwe-639-authorization-bypass-throug-e3e9a2cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46387%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Emby%20MediaBrowser&amp;severity=high&amp;id=6893f49cad5a09ad00f57e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46386-cwe-639-authorization-bypass-throug-55c5fa64</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46386%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Emby%20MediaBrowser&amp;severity=high&amp;id=68932f4fad5a09ad00f06d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6013-cwe-156-improper-neutralization-of-w-518b0128</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6013%3A%20CWE-156%3A%20Improper%20Neutralization%20of%20Whitespace%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=68932bc9ad5a09ad00f05f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22470-unrestricted-upload-of-file-with-da-07d4b7c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22470%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20SATO%20Corporation%20CL4%2F6NX%20Plus&amp;severity=critical&amp;id=68932845ad5a09ad00f04b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22469-improper-neutralization-of-special--712818f9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22469%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SATO%20Corporation%20CL4%2F6NX%20Plus&amp;severity=high&amp;id=68932845ad5a09ad00f04b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7771-cwe-782-exposed-ioctl-with-insuffici-c952e5ab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7771%3A%20CWE-782%3A%20Exposed%20IOCTL%20with%20Insufficient%20Access%20Control%20in%20TechPowerUp%20ThrottleStop&amp;severity=high&amp;id=689324c5ad5a09ad00f03d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8620-cwe-200-exposure-of-sensitive-inform-6df3003c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8620%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=6893213dad5a09ad00f0266e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8556-improper-verification-of-cryptograph-f659df6a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8556%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input&amp;severity=low&amp;id=68931a35ad5a09ad00efd766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7202-cwe-352-cross-site-request-forgery-c-303d9f17</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7202%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elgato%20Key%20Light&amp;severity=medium&amp;id=689316b1ad5a09ad00efb4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47324-cwe-1230-exposure-of-sensitive-info-86b038f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47324%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef020d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27076-cwe-367-time-of-check-time-of-use-t-62387aff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27076%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef020a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27075-cwe-129-improper-validation-of-arra-420a599e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27075%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef0207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27073-cwe-617-reachable-assertion-in-qual-64917195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27073%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a4ad5a09ad00ef0204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27072-cwe-120-buffer-copy-without-checkin-867bfd5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27072%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27071-cwe-120-buffer-copy-without-checkin-dfcc4c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27071%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27069-cwe-822-untrusted-pointer-dereferen-44c6213a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27069%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27068-cwe-126-buffer-over-read-in-qualcom-7ea8cef3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27068%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27067-cwe-129-improper-validation-of-arra-2cd05d44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27067%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27066-cwe-617-reachable-assertion-in-qual-b7d8d90f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27066%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27065-cwe-126-buffer-over-read-in-qualcom-3acd67de</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27065%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27062-cwe-284-improper-access-control-in--f7d9e76f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27062%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21477-cwe-20-improper-input-validation-in-78670fb6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21477%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21474-cwe-416-use-after-free-in-qualcomm--7ff120bb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21474%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21473-cwe-367-time-of-check-time-of-use-t-82001110</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21473%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21472-cwe-489-leftover-debug-code-in-qual-26e9909e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21472%3A%20CWE-489%20Leftover%20Debug%20Code%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21465-cwe-125-out-of-bounds-read-in-qualc-7bd21e2c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21465%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21464-cwe-125-out-of-bounds-read-in-qualc-94049b68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21464%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21461-cwe-787-out-of-bounds-write-in-qual-941e470b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21461%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21458-cwe-416-use-after-free-in-qualcomm--e575fd20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21458%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21457-cwe-126-buffer-over-read-in-qualcom-4eabb2b9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21457%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=689308a3ad5a09ad00ef01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21456-cwe-416-use-after-free-in-qualcomm--16e16224</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21456%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21455-cwe-367-time-of-check-time-of-use-t-4b5fb3dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21455%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a3ad5a09ad00ef01b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21452-cwe-617-reachable-assertion-in-qual-43966bd0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21452%3A%20CWE-617%20Reachable%20Assertion%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=689308a2ad5a09ad00ef01b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7727-cwe-79-improper-neutralization-of-in-1ac915d7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20Block%20Addons%20and%20Page%20Builder%20for%20Site%20Editor&amp;severity=medium&amp;id=6892fa91ad5a09ad00eea6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7376-cwe-64-windows-shortcut-following-ln-ad1884be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7376%3A%20CWE-64%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=medium&amp;id=6892fa91ad5a09ad00eea6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21024-cwe-927-use-of-implicit-intent-for--892ea7a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21024%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Smart%20View&amp;severity=low&amp;id=6892de73ad5a09ad00ee2074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21023-cwe-284-improper-access-control-in--c52160a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21023%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20WcsExtension%20for%20Galaxy%20Watch&amp;severity=low&amp;id=6892de73ad5a09ad00ee2071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21022-cwe-284-improper-access-control-in--01045b44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21022%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Galaxy%20Wearable&amp;severity=low&amp;id=6892de73ad5a09ad00ee206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21021-cwe-787-out-of-bounds-write-in-sams-4ae7cf6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21021%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de73ad5a09ad00ee206b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21020-cwe-787-out-of-bounds-write-in-sams-6699ece7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21020%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de73ad5a09ad00ee2068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21019-cwe-285-improper-authorization-in-s-ddffd9bf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21019%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Health&amp;severity=medium&amp;id=6892de73ad5a09ad00ee2065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21018-cwe-125-out-of-bounds-read-in-samsu-bec02970</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21018%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21017-cwe-787-out-of-bounds-write-in-sams-38e19fec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21017%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Blockchain%20Keystore&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21016-cwe-284-improper-access-control-in--cd52b4e1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21016%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21015-cwe-22-improper-limitation-of-a-pat-21c78d02</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21015%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21014-cwe-926-improper-export-of-android--dd73e575</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21014%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee204c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21013-cwe-284-improper-access-control-in--10fbd590</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21013%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21012-cwe-284-improper-access-control-in--cb1fd2e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21012%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21011-cwe-284-improper-access-control-in--9799458a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21011%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21010-cwe-269-improper-privilege-manageme-d9d54add</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21010%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee2040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20990-cwe-284-improper-access-control-in--6d8243d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20990%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=6892de72ad5a09ad00ee203d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6994-cwe-269-improper-privilege-managemen-41919379</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6994%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SmartDataSoft%20Reveal%20Listing&amp;severity=critical&amp;id=6892d3e8ad5a09ad00edee9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7399-cwe-79-improper-neutralization-of-in-f8c963e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=6892d3e8ad5a09ad00edee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7498-cwe-79-improper-neutralization-of-in-72262fad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6892d3e8ad5a09ad00edeea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8100-cwe-79-improper-neutralization-of-in-6663deff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor%20%E2%80%93%20Mega%20Menu%2C%20Header%20Footer%2C%20Dynamic%20Builder%20and%20Ready%20Templates&amp;severity=medium&amp;id=6892d3e8ad5a09ad00edeea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54651-cwe-362-concurrent-execution-using--e8bdea5e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54651%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54650-cwe-129-improper-validation-of-arra-4424498c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54650%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54649-cwe-843-access-of-resource-using-in-fe842863</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54649%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54648-cwe-125-out-of-bounds-read-in-huawe-5f792999</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54648%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54647-cwe-125-out-of-bounds-read-in-huawe-75efd518</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54647%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54646-cwe-130-improper-handling-of-length-8786f10f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54646%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54645-cwe-129-improper-validation-of-arra-0293a3db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54645%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54644-cwe-125-out-of-bounds-read-in-huawe-070a4d54</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54644%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54643-cwe-125-out-of-bounds-read-in-huawe-987f4c52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54643%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54642-cwe-20-improper-input-validation-in-faa1f0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54642%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54641-cwe-20-improper-input-validation-in-0bb0c56e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54641%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54640-cwe-502-deserialization-of-untruste-79d7e90c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54640%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54639-cwe-502-deserialization-of-untruste-497ddb86</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54639%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892ccdfad5a09ad00eddb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54638-cwe-502-deserialization-of-untruste-223884c9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54638%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54637-cwe-125-out-of-bounds-read-in-huawe-f9c907ed</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54637%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54636-cwe-20-improper-input-validation-in-7cd8cd52</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54636%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54635-cwe-416-use-after-free-in-huawei-ha-c4b4f8ca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54635%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8420-cwe-95-improper-neutralization-of-di-27368f94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8420%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20emarket-design%20Request%20a%20Quote%20Form%20Plugin%20%E2%80%93%20Price%20Quote%20Request%20Management%20Made%20Easy&amp;severity=high&amp;id=6892c252ad5a09ad00edba4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8595-cwe-862-missing-authorization-in-the-ff3f7681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8595%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20Zakra&amp;severity=medium&amp;id=6892c252ad5a09ad00edba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54634-cwe-755-improper-handling-of-except-d14a64e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54634%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892c252ad5a09ad00edba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54633-cwe-125-out-of-bounds-read-in-huawe-cd009357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54633%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54632-cwe-120-buffer-copy-without-checkin-a861c464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54632%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54631-cwe-190-integer-overflow-or-wraparo-2eceea5c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54631%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54630-cwe-122-heap-based-buffer-overflow--aa761926</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54630%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54629-cwe-362-concurrent-execution-using--1c46d1ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54629%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54628-cwe-118-incorrect-access-of-indexab-145e729f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54628%3A%20CWE-118%20Incorrect%20Access%20of%20Indexable%20Resource%20(&apos;Range%20Error&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54627-cwe-787-out-of-bounds-write-in-huaw-a51510ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54627%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892c252ad5a09ad00edba1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54625-cwe-414-missing-lock-check-in-huawe-bbdfef06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54625%3A%20CWE-414%20Missing%20Lock%20Check%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54626-cwe-416-use-after-free-in-huawei-ha-067294f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54626%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54624-cwe-275-permission-issues-in-huawei-e1d9dbe3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54624%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892c252ad5a09ad00edba11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7502-cwe-79-improper-neutralization-of-in-ab8e87fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Page%20Builder&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6986-cwe-89-improper-neutralization-of-sp-1e6fc228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6986%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6256-cwe-79-improper-neutralization-of-in-f5138f64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dragwp%20Flex%20Guten%20%E2%80%93%20A%20Multipurpose%20Gutenberg%20Blocks%20Plugin&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6690-cwe-79-improper-neutralization-of-in-c5d666b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20archaeopath%20WP%20Tournament%20Registration&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7036-cwe-89-improper-neutralization-of-sp-eca724f8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7036%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cleverreach43%20CleverReach%C2%AE%20WP&amp;severity=high&amp;id=6892b7caad5a09ad00ed7e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6259-cwe-79-improper-neutralization-of-in-fe07ea39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geoplay9%20esri-map-view&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54623-cwe-680-integer-overflow-to-buffer--607ccec5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54623%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54622-cwe-305-authentication-bypass-by-pr-17e64e35</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54622%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54621-cwe-664-improper-control-of-a-resou-7fc146d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54621%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54620-cwe-502-deserialization-of-untruste-9467d573</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54620%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54619-cwe-664-improper-control-of-a-resou-5a31fdeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54619%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54618-cwe-275-permission-issues-in-huawei-8b679e9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54618%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54617-cwe-121-stack-based-buffer-overflow-c8697d55</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54617%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54616-cwe-787-out-of-bounds-write-in-huaw-5953ee71</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54616%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54615-cwe-200-exposure-of-sensitive-infor-b9d0a887</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54615%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54614-cwe-20-improper-input-validation-in-17125b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54614%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54613-cwe-664-improper-control-of-a-resou-061e07cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54613%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54612-cwe-664-improper-control-of-a-resou-125c5aa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54612%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8656-cwe-693-protection-mechanism-failure-f9c48433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8656%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8655-cwe-78-improper-neutralization-of-sp-b249d23a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8655%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8654-cwe-78-improper-neutralization-of-sp-c64c597c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8654%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=high&amp;id=6892b7cbad5a09ad00ed7e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8653-cwe-121-stack-based-buffer-overflow--c2a21eb0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8653%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Kenwood%20DMX958XR&amp;severity=high&amp;id=6892b7cbad5a09ad00ed7e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8652-cwe-78-improper-neutralization-of-sp-d82c573e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8652%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8651-cwe-78-improper-neutralization-of-sp-9bf453cf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8651%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8650-cwe-78-improper-neutralization-of-sp-e6600214</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8650%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8649-cwe-78-improper-neutralization-of-sp-9c00b14f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8649%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54611-cwe-840-business-logic-errors-in-hu-3fa8bab9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54611%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8648-cwe-78-improper-neutralization-of-sp-71e7beea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8648%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8647-cwe-78-improper-neutralization-of-sp-0eb0965d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8647%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8646-cwe-78-improper-neutralization-of-sp-d4997cd8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8646%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8645-cwe-78-improper-neutralization-of-sp-0e583196</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8645%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8644-cwe-78-improper-neutralization-of-sp-7e4c48b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8644%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7cbad5a09ad00ed7e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8643-cwe-78-improper-neutralization-of-sp-67c5df54</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8643%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8642-cwe-78-improper-neutralization-of-sp-590f060d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8642%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8641-cwe-78-improper-neutralization-of-sp-cad994d2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8641%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8640-cwe-78-improper-neutralization-of-sp-a01117fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8640%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8639-cwe-78-improper-neutralization-of-sp-fc3baa20</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8639%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8638-cwe-78-improper-neutralization-of-sp-0d07bcfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8638%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8637-cwe-78-improper-neutralization-of-sp-32d2c1fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8637%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8636-cwe-78-improper-neutralization-of-sp-dae2adea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8636%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8635-cwe-78-improper-neutralization-of-sp-cd2015b7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8635%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8634-cwe-78-improper-neutralization-of-sp-7c6b0279</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8634%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8633-cwe-78-improper-neutralization-of-sp-a2dbaabf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8633%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8632-cwe-78-improper-neutralization-of-sp-c05f26ab</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8632%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8631-cwe-78-improper-neutralization-of-sp-53b1d9e2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8631%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8630-cwe-78-improper-neutralization-of-sp-a1d971d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8630%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8629-cwe-78-improper-neutralization-of-sp-f01f845b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8629%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8628-cwe-78-improper-neutralization-of-sp-42dd5ba1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8628%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Kenwood%20DMX958XR&amp;severity=medium&amp;id=6892b7caad5a09ad00ed7e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54610-cwe-129-improper-validation-of-arra-f113dada</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54610%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54609-cwe-125-out-of-bounds-read-in-huawe-f22c229d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54609%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54608-cwe-264-permissions-privileges-and--414cb133</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54608%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6892b7c9ad5a09ad00ed7dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54607-cwe-295-improper-certificate-valida-cfffb3aa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54607%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54606-cwe-840-business-logic-errors-in-hu-a8d55f7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54606%3A%20CWE-840%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892b7c9ad5a09ad00ed7da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54655-cwe-367-time-of-check-time-of-use-t-7ba5e2ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54655%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892ad39ad5a09ad00eceaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54653-cwe-22-improper-limitation-of-a-pat-78948cab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54653%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892ad39ad5a09ad00eceaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54652-cwe-22-improper-limitation-of-a-pat-4c452eb0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54652%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6892ad39ad5a09ad00eceaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51532-na-03976521</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51532%3A%20n%2Fa&amp;severity=high&amp;id=6893f49cad5a09ad00f57e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-06-65435d4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-06&amp;severity=medium&amp;id=6893f09dad5a09ad00f54837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51057-na-81d0481d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51057%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf75ad5a09ad00f4093d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51056-na-03fb2e28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51056%3A%20n%2Fa&amp;severity=high&amp;id=6893bf75ad5a09ad00f40939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51055-na-3dc7ce5e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51055%3A%20n%2Fa&amp;severity=high&amp;id=6893bf75ad5a09ad00f40935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51054-na-688d368b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51054%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51052-na-a278df8f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51052%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f4091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50740-na-6aabe586</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50740%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f4091b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51053-na-fb238e9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51053%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51058-na-70af963a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51058%3A%20n%2Fa&amp;severity=medium&amp;id=6893bf74ad5a09ad00f40904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46660-na-f33f7249</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46660%3A%20n%2Fa&amp;severity=medium&amp;id=6893bbeead5a09ad00f3eac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46659-na-75e25906</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46659%3A%20n%2Fa&amp;severity=high&amp;id=6893b8a7ad5a09ad00f3c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51624-na-c3cd3142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51624%3A%20n%2Fa&amp;severity=high&amp;id=6893b15fad5a09ad00f39dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45764-na-8f0fc216</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45764%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20jsrsasign%20project%20jsrsasign&amp;severity=low&amp;id=6893b15fad5a09ad00f39db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45766-na-f7090b25</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45766%3A%20n%2Fa&amp;severity=high&amp;id=6893adfcad5a09ad00f396a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30127-na-6706d9aa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30127%3A%20n%2Fa&amp;severity=critical&amp;id=68938ab5ad5a09ad00f29f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51531-na-af80981e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51531%3A%20n%2Fa&amp;severity=medium&amp;id=68937ca5ad5a09ad00f26742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50234-na-27c9fbbd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50234%3A%20n%2Fa&amp;severity=medium&amp;id=68937219ad5a09ad00f23539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51308-na-bd6d41fe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51308%3A%20n%2Fa&amp;severity=medium&amp;id=68936e98ad5a09ad00f216d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51306-na-9e741c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51306%3A%20n%2Fa&amp;severity=medium&amp;id=68936e98ad5a09ad00f216d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50233-na-b2631502</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50233%3A%20n%2Fa&amp;severity=medium&amp;id=68936e98ad5a09ad00f216ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50286-na-da3c9abe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50286%3A%20n%2Fa&amp;severity=high&amp;id=68936b11ad5a09ad00f1e91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51040-na-70395ffe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51040%3A%20n%2Fa&amp;severity=high&amp;id=6893678dad5a09ad00f1dae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54872-cwe-798-use-of-hard-coded-credentia-6a2ada64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54872%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Vessel9817%20onion-site-template&amp;severity=high&amp;id=68929ba5ad5a09ad00ec79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54571-cwe-252-unchecked-return-value-in-o-bfee7e94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54571%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20owasp-modsecurity%20ModSecurity&amp;severity=medium&amp;id=68929821ad5a09ad00ec5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54884-cwe-400-uncontrolled-resource-consu-b32a8ac7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54884%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20DavidOsipov%20Vision-ui&amp;severity=high&amp;id=68929821ad5a09ad00ec5aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54883-cwe-338-use-of-cryptographically-we-53edbc77</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54883%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20DavidOsipov%20Vision-ui&amp;severity=critical&amp;id=68929821ad5a09ad00ec5ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54876-cwe-522-insufficiently-protected-cr-977973c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54876%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20JanssenProject%20jans&amp;severity=medium&amp;id=68929821ad5a09ad00ec5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54869-cwe-770-allocation-of-resources-wit-e60f5d94</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54869%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Setasign%20FPDI&amp;severity=medium&amp;id=68929821ad5a09ad00ec5adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54801-cwe-789-memory-allocation-with-exce-a00aae97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54801%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gofiber%20fiber&amp;severity=high&amp;id=68929821ad5a09ad00ec5adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54594-cwe-269-improper-privilege-manageme-9aec1db3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54594%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20callstackincubator%20react-native-bottom-tabs&amp;severity=critical&amp;id=68929821ad5a09ad00ec5ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54125-cwe-359-exposure-of-private-persona-3b4e1873</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54125%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6892949dad5a09ad00ec4d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54124-cwe-359-exposure-of-private-persona-13bec42c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54124%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=6892949dad5a09ad00ec4d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32430-cwe-79-improper-neutralization-of-i-1a127c96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32430%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=6892949dad5a09ad00ec4d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53534-cwe-305-authentication-bypass-by-pr-0de6282c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53534%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20tnb-labs%20panel&amp;severity=high&amp;id=689274f9ad5a09ad00ebcf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8586-null-pointer-dereference-in-libav-c3935ef0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8586%3A%20NULL%20Pointer%20Dereference%20in%20libav&amp;severity=medium&amp;id=689243c1ad5a09ad00eabe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8585-double-free-in-libav-e17b98fc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8585%3A%20Double%20Free%20in%20libav&amp;severity=medium&amp;id=68923cb9ad5a09ad00ea9c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54253-misconfiguration-sub-domain-takeove-c5fe6fc4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54253%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=critical&amp;id=68923937ad5a09ad00ea8614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54254-improper-restriction-of-xml-externa-99118bce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54254%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=68923937ad5a09ad00ea8617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7674-cwe-20-improper-input-validation-in--af5f45f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7674%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Roche%20Diagnostics%20navify%20Monitoring&amp;severity=high&amp;id=68923937ad5a09ad00ea861a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-100-dell-laptop-models-plagued-by-vulnerabili-81f3877f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20100%20Dell%20Laptop%20Models%20Plagued%20by%20Vulnerabilities%20Impacting%20Millions&amp;severity=medium&amp;id=689235b0ad5a09ad00ea7511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8584-null-pointer-dereference-in-libav-35e2b02e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8584%3A%20NULL%20Pointer%20Dereference%20in%20libav&amp;severity=medium&amp;id=689235bbad5a09ad00ea7538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/odoomap-a-pentesting-tool-for-odoo-applications-d7bf6e04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OdooMap%20-%20A%20Pentesting%20Tool%20for%20Odoo%20Applications&amp;severity=high&amp;id=68922b26ad5a09ad00ea38f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-discloses-data-breach-impacting-ciscocom-use-06e8a4c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20discloses%20data%20breach%20impacting%20Cisco.com%20user%20accounts&amp;severity=high&amp;id=6892241cad5a09ad00ea1193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2611-cwe-20-improper-input-validation-in--684b7c60</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2611%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ICT%20Innovations%20ICTBroadcast&amp;severity=critical&amp;id=68921d1ead5a09ad00e9dd9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pandora-cyber-attack-exposes-customer-data-via-thi-b66a0bba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pandora%20Cyber%20Attack%20Exposes%20Customer%20Data%20Via%20Third-Party%20Vendor&amp;severity=medium&amp;id=68921d13ad5a09ad00e9dd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27931-cwe-125-out-of-bounds-read-in-pdf-x-37a85cdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27931%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=68921d1ead5a09ad00e9dd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47152-cwe-125-out-of-bounds-read-in-pdf-x-616dc610</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47152%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20Co.%20Ltd%20PDF-XChange%20Editor&amp;severity=medium&amp;id=68921d1ead5a09ad00e9dda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54874-cwe-457-use-of-uninitialized-variab-aa551e72</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54874%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20uclouvain%20openjpeg&amp;severity=medium&amp;id=68921990ad5a09ad00e9cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46958-cross-site-scripting-stored-xss-cwe-5e841f26</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46958%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68921990ad5a09ad00e9cbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7033-cwe-122-heap-based-buffer-overflow-i-12551399</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7033%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=68920f04ad5a09ad00e98d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7032-cwe-121-stack-based-buffer-overflow--5f298c62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7032%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=68920f04ad5a09ad00e98d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7025-cwe-122-heap-based-buffer-overflow-i-ce512681</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7025%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20Arena%C2%AE%20Simulation&amp;severity=high&amp;id=68920f04ad5a09ad00e98cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bumblebee-malware-seo-poisoning-campaign-leads-to--2021b0d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bumblebee%20Malware%20SEO%20Poisoning%20Campaign%20Leads%20to%20Akira%20Ransomware%20Deployment&amp;severity=medium&amp;id=68920b7fad5a09ad00e96eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smart-contract-scams-ethereum-drainers-pose-as-tra-edc7d78c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Smart%20Contract%20Scams%20%7C%20Ethereum%20Drainers%20Pose%20as%20Trading%20Bots%20to%20Steal%20Crypto&amp;severity=medium&amp;id=68920b7fad5a09ad00e96ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54987-cwe-78-os-command-injection-in-tren-c8afde18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54987%3A%20CWE-78%3A%20OS%20Command%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=critical&amp;id=68920478ad5a09ad00e931cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54948-cwe-78-os-command-injection-in-tren-77a5ba25</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54948%3A%20CWE-78%3A%20OS%20Command%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=critical&amp;id=68920478ad5a09ad00e931c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-investigating-potential-ssl-vpn-zero-day-e6390304</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Investigating%20Potential%20SSL%20VPN%20Zero-Day%20After%2020%2B%20Targeted%20Attacks%20Reported&amp;severity=critical&amp;id=6891f666ad5a09ad00e8e502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/15000-fake-tiktok-shop-domains-deliver-malware-ste-8c6fbc42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=15%2C000%20Fake%20TikTok%20Shop%20Domains%20Deliver%20Malware%2C%20Steal%20Crypto%20via%20AI-Driven%20Scam%20Campaign&amp;severity=high&amp;id=6891f667ad5a09ad00e8e50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-gets-patches-for-qualcomm-flaws-exploited--94fd5c6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20gets%20patches%20for%20Qualcomm%20flaws%20exploited%20in%20attacks&amp;severity=high&amp;id=6891f667ad5a09ad00e8e50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-cdn-link-abused-to-deliver-rat-disguised-a-1364b587</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20CDN%20Link%20Abused%20to%20Deliver%20RAT%20Disguised%20as%20OneDrive%20File&amp;severity=medium&amp;id=6891f2e0ad5a09ad00e8d12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8555-cross-site-scripting-in-atjiu-pybbs-7d1d957b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8555%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891d33dad5a09ad00e7f799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8554-cross-site-scripting-in-atjiu-pybbs-f31ddea6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8554%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891cc35ad5a09ad00e7c8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8553-cross-site-scripting-in-atjiu-pybbs-7353c96c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8553%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891c52dad5a09ad00e7a391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2810-cwe-321use-of-hard-coded-cryptograph-b1233ff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2810%3A%20CWE-321%3AUse%20of%20Hard-coded%20Cryptographic%20Key%20in%20Draeger%20Draeger%20ICMHelper&amp;severity=medium&amp;id=6891be25ad5a09ad00e76e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41698-cwe-862-missing-authorization-in-dr-3a81b3c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41698%3A%20CWE-862%20Missing%20Authorization%20in%20Draeger%20Draeger%20ICMHelper&amp;severity=high&amp;id=6891be25ad5a09ad00e76e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8552-cross-site-scripting-in-atjiu-pybbs-80b4e460</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8552%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891be25ad5a09ad00e76e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8551-cross-site-scripting-in-atjiu-pybbs-f4236500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8551%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891b71dad5a09ad00e73ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8294-cwe-79-improper-neutralization-of-in-c2e2125b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8294%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anatolyk%20Download%20Counter&amp;severity=medium&amp;id=6891b39aad5a09ad00e72779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8295-cwe-79-improper-neutralization-of-in-7969fb3d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Directory%20%E2%80%93%20Staff%20Listing%20%26%20Team%20Directory%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=6891b39aad5a09ad00e7277e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5061-cwe-434-unrestricted-upload-of-file--02e23663</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5061%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vjinfotech%20WP%20Import%20Export%20Lite&amp;severity=high&amp;id=6891b39aad5a09ad00e7276d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6207-cwe-434-unrestricted-upload-of-file--5586e469</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6207%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vjinfotech%20WP%20Import%20Export%20Lite&amp;severity=high&amp;id=6891b39aad5a09ad00e72774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8550-cross-site-scripting-in-atjiu-pybbs-ba13c8b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8550%3A%20Cross%20Site%20Scripting%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891b015ad5a09ad00e716d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8313-cwe-79-improper-neutralization-of-in-3f76d428</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Campus%20Directory%20%E2%80%93%20Faculty%2C%20Staff%20%26%20Student%20Directory%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=6891ac91ad5a09ad00e6f49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7050-cwe-79-improper-neutralization-of-in-a383147c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Cloud%20Plugins%2F_deleeuw_%20Use-your-Drive%20%7C%20Google%20Drive%20plugin%20for%20WordPress&amp;severity=high&amp;id=6891ac91ad5a09ad00e6f49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8315-cwe-79-improper-neutralization-of-in-8b5f374a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Simple%20Contact%20Form%20Plugin%20for%20WordPress%20%E2%80%93%20WP%20Easy%20Contact&amp;severity=medium&amp;id=6891ac91ad5a09ad00e6f4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8549-weak-password-requirements-in-atjiu--463eb24b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8549%3A%20Weak%20Password%20Requirements%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891ac91ad5a09ad00e6f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8548-information-exposure-through-error-m-c9bf3597</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8548%3A%20Information%20Exposure%20Through%20Error%20Message%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=6891a206ad5a09ad00e6b199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54982-cwe-347-improper-verification-of-cr-e9f16fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54982%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Zscaler%20Authentication%20Server&amp;severity=critical&amp;id=68919afdad5a09ad00e6183f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8547-improper-authorization-in-atjiu-pybb-a3bf3c6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8547%3A%20Improper%20Authorization%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=68919afdad5a09ad00e61842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8546-guessable-captcha-in-atjiu-pybbs-21f58e3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8546%3A%20Guessable%20CAPTCHA%20in%20atjiu%20pybbs&amp;severity=medium&amp;id=689193f5ad5a09ad00e5f194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54868-cwe-285-improper-authorization-in-d-f6918ba5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54868%3A%20CWE-285%3A%20Improper%20Authorization%20in%20danny-avila%20LibreChat&amp;severity=high&amp;id=68919071ad5a09ad00e5ca58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8545-cross-site-scripting-in-portabilis-i-cc163e6d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8545%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68918ceead5a09ad00e5be0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8544-cross-site-scripting-in-portabilis-i-911e334d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8544%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=6891896aad5a09ad00e5ae11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8543-cross-site-scripting-in-portabilis-i-1b0bc688</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8543%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68918261ad5a09ad00e581cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8542-cross-site-scripting-in-portabilis-i-7b91b2cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8542%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68917b59ad5a09ad00e5629d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8541-cross-site-scripting-in-portabilis-i-c02bc01a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8541%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=689170dcad5a09ad00e51c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53417-cwe-35-path-traversal-in-delta-elec-57577d11</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53417%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Delta%20Electronics%20DIAView&amp;severity=critical&amp;id=689170dcad5a09ad00e51c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8540-cross-site-scripting-in-portabilis-i-1fc9bd53</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8540%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=689170dcad5a09ad00e51c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8539-cross-site-scripting-in-portabilis-i-de9edaf2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8539%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68916641ad5a09ad00e4ef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8538-cross-site-scripting-in-portabilis-i-0afe6b8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8538%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=68915bd6ad5a09ad00e4ac2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8537-allocation-of-resources-in-axiomatic-8871ee14</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8537%3A%20Allocation%20of%20Resources%20in%20Axiomatic%20Bento4&amp;severity=medium&amp;id=689154afad5a09ad00e46829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53544-cwe-307-improper-restriction-of-exc-3f0ee582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53544%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20TriliumNext%20Trilium&amp;severity=high&amp;id=689154aead5a09ad00e467e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54387-cwe-22-improper-limitation-of-a-pat-4f7f0a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54387%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20unjs%20ipx&amp;severity=medium&amp;id=689154aead5a09ad00e467e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54780-cwe-73-external-control-of-file-nam-7e0296d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54780%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20cconard96%20glpi-screenshot-plugin&amp;severity=high&amp;id=689154aead5a09ad00e467ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54794-cwe-22-improper-limitation-of-a-pat-3ad6897f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54794%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=689154aead5a09ad00e467f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54795-cwe-78-improper-neutralization-of-s-17ad2928</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54795%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20anthropics%20claude-code&amp;severity=high&amp;id=689154aead5a09ad00e467f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54803-cwe-1321-improperly-controlled-modi-f1cbb767</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54803%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20sunnyadn%20js-toml&amp;severity=high&amp;id=689154aead5a09ad00e467f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54804-cwe-190-integer-overflow-or-wraparo-835b1103</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54804%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Eugeny%20russh&amp;severity=medium&amp;id=689154aead5a09ad00e467fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54865-cwe-89-improper-neutralization-of-s-d44b1bef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54865%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20FTB-Gamepedia%20Tilesheets&amp;severity=high&amp;id=689154aead5a09ad00e467ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54871-cwe-284-improper-access-control-in--1f7106ff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54871%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20steveseguin%20electroncapture&amp;severity=medium&amp;id=689154aead5a09ad00e46807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54870-cwe-636-not-failing-securely-failin-a0eb4541</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54870%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20leakingmemory%20vtun-ng&amp;severity=high&amp;id=689154aead5a09ad00e46803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8535-cross-site-scripting-in-cronoh-nanov-80fc072b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8535%3A%20Cross%20Site%20Scripting%20in%20cronoh%20NanoVault&amp;severity=medium&amp;id=689154afad5a09ad00e46822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-05-43f3e340</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-05&amp;severity=medium&amp;id=68929f1dad5a09ad00ec8c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52237-na-cbba3e80</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52237%3A%20n%2Fa&amp;severity=medium&amp;id=68926df2ad5a09ad00ebac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51541-na-3908e558</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51541%3A%20n%2Fa&amp;severity=medium&amp;id=68926366ad5a09ad00eb6978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50592-na-b9e18412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50592%3A%20n%2Fa&amp;severity=medium&amp;id=68926366ad5a09ad00eb6973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43979-na-0bd1258f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43979%3A%20n%2Fa&amp;severity=high&amp;id=68926366ad5a09ad00eb696f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52078-na-78b94004</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52078%3A%20n%2Fa&amp;severity=medium&amp;id=68925c5dad5a09ad00eb4bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45512-na-a33713ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45512%3A%20n%2Fa&amp;severity=medium&amp;id=689258dfad5a09ad00eb41f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51060-na-366a0373</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51060%3A%20n%2Fa&amp;severity=medium&amp;id=68924ac9ad5a09ad00eadd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51857-na-d5c1ba38</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51857%3A%20n%2Fa&amp;severity=medium&amp;id=68924745ad5a09ad00eacf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50454-na-0d5de574</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50454%3A%20n%2Fa&amp;severity=medium&amp;id=68924745ad5a09ad00eacf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51627-na-084e70e5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51627%3A%20n%2Fa&amp;severity=medium&amp;id=689243c1ad5a09ad00eabe3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50688-na-78c59d29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50688%3A%20n%2Fa&amp;severity=medium&amp;id=689243c1ad5a09ad00eabe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51628-na-5e902ca5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51628%3A%20n%2Fa&amp;severity=high&amp;id=6892403dad5a09ad00eaaea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43980-na-e1355a61</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43980%3A%20n%2Fa&amp;severity=medium&amp;id=68923cb9ad5a09ad00ea9c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43978-na-793a5cd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43978%3A%20n%2Fa&amp;severity=high&amp;id=68923cb9ad5a09ad00ea9bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46658-na-e90a2716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46658%3A%20n%2Fa&amp;severity=critical&amp;id=68922428ad5a09ad00ea11dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50707-na-f8c0a6a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50707%3A%20n%2Fa&amp;severity=critical&amp;id=68922098ad5a09ad00e9f6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50706-na-dd3cfc57</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50706%3A%20n%2Fa&amp;severity=critical&amp;id=68922098ad5a09ad00e9f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44964-na-5bf1e9e2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44964%3A%20n%2Fa&amp;severity=low&amp;id=68921990ad5a09ad00e9cbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29745-na-415e52d3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29745%3A%20n%2Fa&amp;severity=high&amp;id=68921990ad5a09ad00e9cbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8534-null-pointer-dereference-in-libtiff-5c425439</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8534%3A%20NULL%20Pointer%20Dereference%20in%20libtiff&amp;severity=low&amp;id=6891469dad5a09ad00e3d695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8530-use-of-default-credentials-in-elunez-3aeaa471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8530%3A%20Use%20of%20Default%20Credentials%20in%20elunez%20eladmin&amp;severity=medium&amp;id=68913f95ad5a09ad00e3bedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8529-server-side-request-forgery-in-cloud-f501958f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8529%3A%20Server-Side%20Request%20Forgery%20in%20cloudfavorites%20favorites-web&amp;severity=medium&amp;id=6891388dad5a09ad00e3a763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27211-vulnerability-in-ubiquiti-inc-edgem-f3a98f9b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27211%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20EdgeMAX%20EdgeSwitch&amp;severity=high&amp;id=68913509ad5a09ad00e397e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27212-vulnerability-in-ubiquiti-inc-unifi-80139596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27212%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Access%20Reader%20Pro&amp;severity=critical&amp;id=68913509ad5a09ad00e397ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4604-cwe-79-improper-neutralization-of-in-6d9cdc18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4604%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68913186ad5a09ad00e3622a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8528-cleartext-storage-of-sensitive-infor-691c7488</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8528%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20a%20Cookie%20in%20Exrick%20xboot&amp;severity=medium&amp;id=68913186ad5a09ad00e3622d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7844-cwe-121-in-wolfssl-inc-wolftpm-e19a92f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7844%3A%20CWE-121%20in%20wolfSSL%20Inc.%20wolfTPM&amp;severity=low&amp;id=68912a7dad5a09ad00e3496b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8527-server-side-request-forgery-in-exric-c764fce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8527%3A%20Server-Side%20Request%20Forgery%20in%20Exrick%20xboot&amp;severity=medium&amp;id=68912a7dad5a09ad00e3496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4599-cwe-79-improper-neutralization-of-in-ecf04db2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=low&amp;id=689126f9ad5a09ad00e339fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8526-unrestricted-upload-in-exrick-xboot-8f326641</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8526%3A%20Unrestricted%20Upload%20in%20Exrick%20xboot&amp;severity=medium&amp;id=6891237cad5a09ad00e331bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8525-information-disclosure-in-exrick-xbo-168d89a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8525%3A%20Information%20Disclosure%20in%20Exrick%20xboot&amp;severity=medium&amp;id=68911c6dad5a09ad00e31796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8524-improper-export-of-android-applicati-bbe6d703</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8524%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Boquan%20DotWallet%20App&amp;severity=medium&amp;id=68911568ad5a09ad00e300c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proton-fixes-authenticator-bug-leaking-totp-secret-711a40e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proton%20fixes%20Authenticator%20bug%20leaking%20TOTP%20secrets%20in%20logs&amp;severity=high&amp;id=689111e0ad5a09ad00e2f6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-microsoft-365-direct-send-to-send-in-3f57e857</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Abuse%20Microsoft%20365%20Direct%20Send%20to%20Send%20Internal%20Phishing%20Emails&amp;severity=medium&amp;id=68910ad8ad5a09ad00e2e430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8523-improper-export-of-android-applicati-dec0d781</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8523%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20RiderLike%20Fruit%20Crush-Brain%20App&amp;severity=medium&amp;id=68910e5dad5a09ad00e2ef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8522-path-traversal-in-givanz-vvvebjs-c97aba2e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8522%3A%20Path%20Traversal%20in%20givanz%20Vvvebjs&amp;severity=low&amp;id=68910754ad5a09ad00e2dae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26476-cwe-321-use-of-hard-coded-cryptogra-8eb9fd52</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26476%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dell%20ECS&amp;severity=high&amp;id=689103d1ad5a09ad00e2ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21120-cwe-650-trusting-http-permission-me-8fe6d94f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21120%3A%20CWE-650%3A%20Trusting%20HTTP%20Permission%20Methods%20on%20the%20Server%20Side%20in%20Dell%20Avamar%20Server&amp;severity=high&amp;id=6891004dad5a09ad00e2bbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8521-cross-site-scripting-in-givanz-vvveb-dd9f26a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8521%3A%20Cross%20Site%20Scripting%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6891004dad5a09ad00e2bbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38741-cwe-321-use-of-hard-coded-cryptogra-11800bac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38741%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Dell%20Enterprise%20SONiC%20OS&amp;severity=high&amp;id=6891004dad5a09ad00e2bbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8520-server-side-request-forgery-in-givan-1542c851</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8520%3A%20Server-Side%20Request%20Forgery%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890f945ad5a09ad00e2a005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vietnamese-hackers-use-pxa-stealer-hit-4000-ips-an-cb3f4257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vietnamese%20Hackers%20Use%20PXA%20Stealer%2C%20Hit%204%2C000%20IPs%20and%20Steal%20200%2C000%20Passwords%20Globally&amp;severity=high&amp;id=6890f5c0ad5a09ad00e29445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-plague-linux-malware-stealthily-maintains-ssh--f4da0495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Plague%20Linux%20malware%20stealthily%20maintains%20SSH%20access&amp;severity=high&amp;id=6890f5c0ad5a09ad00e29441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/northwest-radiologists-data-breach-hits-350000-in--3cba4b04</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Northwest%20Radiologists%20data%20breach%20hits%20350%2C000%20in%20Washington&amp;severity=high&amp;id=6890f5c0ad5a09ad00e2944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-triton-bugs-let-unauthenticated-attackers-e-3114b96f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NVIDIA%20Triton%20Bugs%20Let%20Unauthenticated%20Attackers%20Execute%20Code%20and%20Hijack%20AI%20Servers&amp;severity=high&amp;id=6890f5c0ad5a09ad00e29449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34147-cwe-78-improper-neutralization-of-s-e7013498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34147%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Aitemi%20E%20Commerce%20Co.%20Ltd.%20M300%20Wi-Fi%20Repeater&amp;severity=critical&amp;id=6890f23bad5a09ad00e27de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8519-information-disclosure-in-givanz-vvv-c4643539</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8519%3A%20Information%20Disclosure%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890f23bad5a09ad00e27df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8518-code-injection-in-givanz-vvveb-85d5d16d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8518%3A%20Code%20Injection%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890eb33ad5a09ad00e26aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-vulnerabilities-in-claude-code-a03b4019</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20vulnerabilities%20in%20Claude%20code&amp;severity=medium&amp;id=6890e7bead5a09ad00e2640a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghost-in-the-zip-new-pxa-stealer-and-its-telegram--49ccd191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ghost%20in%20the%20Zip%20%7C%20New%20PXA%20Stealer%20and%20Its%20Telegram-Powered%20Ecosystem&amp;severity=medium&amp;id=689118e8ad5a09ad00e30c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8517-session-fixiation-in-givanz-vvveb-9155eeb8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8517%3A%20Session%20Fixiation%20in%20givanz%20Vvveb&amp;severity=medium&amp;id=6890dd22ad5a09ad00e23633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-jsceal-malware-targets-millions-via-fake-crypt-c468aa9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20JSCEAL%20Malware%20Targets%20Millions%20via%20Fake%20Crypto%20App%20Ads&amp;severity=medium&amp;id=6890d99dad5a09ad00e22c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38739-cwe-522-insufficiently-protected-cr-a4c277ab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38739%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20Dell%20Digital%20Delivery&amp;severity=high&amp;id=6890d9a9ad5a09ad00e22cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8516-path-traversal-in-kingdee-cloud-star-2752e615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8516%3A%20Path%20Traversal%20in%20Kingdee%20Cloud-Starry-Sky%20Enterprise%20Edition&amp;severity=medium&amp;id=6890d61aad5a09ad00e21575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5988-cross-site-request-forgery-csrf-in-r-c54a06ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5988%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=6890d297ad5a09ad00e20787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-exploitation-of-sonicwall-vpns-a221b8a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Exploitation%20of%20SonicWall%20VPNs&amp;severity=medium&amp;id=6890cf11ad5a09ad00e1f986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30099-cwe-78-improper-neutralization-of-s-eca64a76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30099%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=high&amp;id=6890cb8ead5a09ad00e1ea11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30098-cwe-78-improper-neutralization-of-s-14e2fdc1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30098%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=medium&amp;id=6890cb8ead5a09ad00e1ea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30097-cwe-78-improper-neutralization-of-s-e1f691f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30097%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=medium&amp;id=6890c80aad5a09ad00e1d6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30096-cwe-78-improper-neutralization-of-s-28450fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30096%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=medium&amp;id=6890c80aad5a09ad00e1d6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36594-cwe-290-authentication-bypass-by-sp-7d287e67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36594%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Dell%20PowerProtect%20Data%20Domain%20Feature%20Release&amp;severity=critical&amp;id=6890c80aad5a09ad00e1d6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36607-cwe-78-improper-neutralization-of-s-7e264bf0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36607%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6890c103ad5a09ad00e1a780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36606-cwe-78-improper-neutralization-of-s-4452a6f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36606%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6890c103ad5a09ad00e1a77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36605-cwe-79-improper-neutralization-of-i-26534f38</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36605%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unity&amp;severity=medium&amp;id=6890c102ad5a09ad00e1a776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36604-cwe-78-improper-neutralization-of-s-5fe815b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36604%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=6890c103ad5a09ad00e1a783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legalpwn-attack-tricks-popular-genai-tools-into-mi-30fcb8ab</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LegalPwn%20Attack%20Tricks%20Popular%20GenAI%20Tools%20Into%20Misclassifying%20Malware%20as%20Safe%20Code&amp;severity=medium&amp;id=6890b675ad5a09ad00e0dab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8109-cwe-cwe-280-improper-handling-of-ins-6fe67e9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8109%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.15)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=6890b683ad5a09ad00e0db51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playpraetor-android-trojan-infects-11000-devices-v-d249c16d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlayPraetor%20Android%20Trojan%20Infects%2011%2C000%2B%20Devices%20via%20Fake%20Google%20Play%20Pages%20and%20Meta%20Ads&amp;severity=high&amp;id=6890a4e1ad5a09ad00e06a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovense-flaws-expose-emails-and-allow-account-take-f33b0c50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovense%20flaws%20expose%20emails%20and%20allow%20account%20takeover&amp;severity=medium&amp;id=6890a4e1ad5a09ad00e06a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pwn2own-offers-1m-for-zero-click-whatsapp-exploit-abd7a4ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pwn2Own%20Offers%20%241m%20for%20Zero-Click%20WhatsApp%20Exploit&amp;severity=high&amp;id=6890a4e0ad5a09ad00e06a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitdefender-warns-users-to-update-dahua-cameras-ov-d23e79b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitdefender%20Warns%20Users%20to%20Update%20Dahua%20Cameras%20Over%20Critical%20Flaws&amp;severity=critical&amp;id=689096d0ad5a09ad00e0414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8515-information-disclosure-in-intelbras--15c299b2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8515%3A%20Information%20Disclosure%20in%20Intelbras%20InControl&amp;severity=low&amp;id=68908fc8ad5a09ad00e01f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0932-cwe-416-use-after-free-in-arm-ltd-bi-dace4ed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0932%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Userspace%20Driver&amp;severity=medium&amp;id=689088c0ad5a09ad00dffba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lateral-movement-bitlocker-a4093e7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lateral%20Movement%20%E2%80%93%20BitLocker&amp;severity=medium&amp;id=68907e6fad5a09ad00dfb9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6205-cwe-862-missing-authorization-in-das-950d8659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6205%3A%20CWE-862%20Missing%20Authorization%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso&amp;severity=critical&amp;id=68907e6ead5a09ad00dfb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6204-cwe-94-improper-control-of-generatio-b3a2f1ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6204%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso&amp;severity=high&amp;id=68907e6ead5a09ad00dfb9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8341-cwe-918-server-side-request-forgery--02dc5b13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8341%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Grafana%20grafana-infinity-datasource&amp;severity=medium&amp;id=689073a8ad5a09ad00df7b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41691-cwe-476-null-pointer-dereference-in-0718aa3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41691%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=68906ca0ad5a09ad00df5902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41659-cwe-732-incorrect-permission-assign-ce79f548</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41659%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20CODESYS%20Control%20RTE%20(SL)&amp;severity=high&amp;id=68906ca0ad5a09ad00df58ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41658-cwe-276-incorrect-default-permissio-20e2951b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41658%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20CODESYS%20Runtime%20Toolkit&amp;severity=medium&amp;id=68906ca0ad5a09ad00df58fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20702-cwe-306-missing-authentication-for--315ed8d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20702%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Airoha%20Technology%20Corp.%20AB156x%2C%20AB157x%2C%20AB158x%2C%20AB159x%20series%2C%20AB1627&amp;severity=high&amp;id=68905789ad5a09ad00def642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20701-cwe-863-incorrect-authorization-in--3a7f33ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20701%3A%20CWE-863%20Incorrect%20Authorization%20in%20Airoha%20Technology%20Corp.%20AB156x%2C%20AB157x%2C%20AB158x%2C%20AB159x%20series&amp;severity=high&amp;id=68905789ad5a09ad00def63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20700-cwe-306-missing-authentication-for--7ff56722</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20700%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Airoha%20Technology%20Corp.%20AB156x%2C%20AB157x%2C%20AB158x%2C%20AB159x%20series%2C%20AB1627&amp;severity=high&amp;id=68905789ad5a09ad00def63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48499-out-of-bounds-write-in-fujifilm-bus-6d36228e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48499%3A%20Out-of-bounds%20Write%20in%20FUJIFILM%20Business%20Innovation%20Corp.%20DocuPrint%20CP225%20w&amp;severity=medium&amp;id=689045f5ad5a09ad00de9ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20698-cwe-787-out-of-bounds-write-in-medi-78f48d15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20698%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8196%2C%20MT8391%2C%20MT8676%2C%20MT8678%2C%20MT8775%2C%20MT8786%2C%20MT8788E%2C%20MT8792%2C%20MT8796%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68901843ad5a09ad00ddefbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20697-cwe-787-out-of-bounds-write-in-medi-dc4f83ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20697%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6897%2C%20MT6989%2C%20MT6991%2C%20MT8186%2C%20MT8196%2C%20MT8391%2C%20MT8678%2C%20MT8775%2C%20MT8786%2C%20MT8788E%2C%20MT8792%2C%20MT8796%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=68901843ad5a09ad00ddefbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20696-cwe-787-out-of-bounds-write-in-medi-7160e575</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20696%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6877%2C%20MT6878%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6897%2C%20MT6899%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT8188%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8676&amp;severity=medium&amp;id=68901843ad5a09ad00ddefb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54554-cwe-863-incorrect-authorization-in--92bd7dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54554%3A%20CWE-863%20Incorrect%20Authorization%20in%20Tera%20Insights%20tiCrypt&amp;severity=medium&amp;id=689151abad5a09ad00e45170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-04-ae19f5f6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-04&amp;severity=medium&amp;id=68914d9dad5a09ad00e3ee76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50754-na-defd2617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50754%3A%20n%2Fa&amp;severity=critical&amp;id=68911ff1ad5a09ad00e325ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51726-na-778a04bf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51726%3A%20n%2Fa&amp;severity=high&amp;id=68911ff1ad5a09ad00e325a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51387-na-78098647</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51387%3A%20n%2Fa&amp;severity=critical&amp;id=68911ff1ad5a09ad00e325a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50341-na-7fe657e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50341%3A%20n%2Fa&amp;severity=critical&amp;id=689118e9ad5a09ad00e30cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50340-na-9ba3b77a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50340%3A%20n%2Fa&amp;severity=medium&amp;id=68911568ad5a09ad00e300c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52239-na-5224809f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52239%3A%20n%2Fa&amp;severity=critical&amp;id=689103d1ad5a09ad00e2ca7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53395-na-24aa4631</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53395%3A%20n%2Fa&amp;severity=high&amp;id=6891004dad5a09ad00e2bbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53394-na-ea3b839e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53394%3A%20n%2Fa&amp;severity=high&amp;id=6891004dad5a09ad00e2bbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51390-na-7009f981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51390%3A%20n%2Fa&amp;severity=critical&amp;id=6890f23bad5a09ad00e27dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50420-na-1a96f18c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50420%3A%20n%2Fa&amp;severity=medium&amp;id=6890eb33ad5a09ad00e26aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46206-na-2b474bf1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46206%3A%20n%2Fa&amp;severity=medium&amp;id=6890eb33ad5a09ad00e26a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51535-na-5eb8e25e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51535%3A%20n%2Fa&amp;severity=critical&amp;id=6890e42bad5a09ad00e252e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51534-na-a867ec40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51534%3A%20n%2Fa&amp;severity=high&amp;id=6890e42bad5a09ad00e252e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50422-na-fc0013b8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50422%3A%20CWE-617%20Reachable%20Assertion%20in%20cairographics%20Cairo&amp;severity=low&amp;id=6890e42bad5a09ad00e252dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44960-cwe-78-improper-neutralization-of-s-47e5d3f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44960%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RUCKUS%20SmartZone&amp;severity=high&amp;id=6890e42bad5a09ad00e252d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44958-cwe-257-storing-passwords-in-a-reco-b3fa4388</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44958%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20RUCKUS%20Network%20Director&amp;severity=medium&amp;id=6890e42bad5a09ad00e252d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44957-cwe-288-authentication-bypass-using-d7d8c4e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44957%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20RUCKUS%20SmartZone&amp;severity=high&amp;id=6890e42bad5a09ad00e252ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44963-cwe-321-use-of-hard-coded-cryptogra-8d8dbf20</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44963%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20RUCKUS%20Network%20Director&amp;severity=critical&amp;id=6890e0a7ad5a09ad00e2476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44962-na-9c153d32</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44962%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20RUCKUS%20SmartZone&amp;severity=medium&amp;id=6890e0a7ad5a09ad00e24765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44961-cwe-78-improper-neutralization-of-s-2f9d7e64</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44961%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RUCKUS%20SmartZone&amp;severity=critical&amp;id=6890e0a7ad5a09ad00e24760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44954-cwe-1394-use-of-default-cryptograph-633fe352</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44954%3A%20CWE-1394%20Use%20of%20Default%20Cryptographic%20Key%20in%20RUCKUS%20SmartZone&amp;severity=critical&amp;id=6890e0a7ad5a09ad00e2475b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44955-cwe-259-use-of-hard-coded-password--c79191fa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44955%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20RUCKUS%20Network%20Director&amp;severity=high&amp;id=6890d9a9ad5a09ad00e22cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51536-na-08dc6049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51536%3A%20n%2Fa&amp;severity=critical&amp;id=6890c80aad5a09ad00e1d6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44643-na-04e02e2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44643%3A%20n%2Fa&amp;severity=high&amp;id=6890c80aad5a09ad00e1d6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26065-na-c520fb15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26065%3A%20n%2Fa&amp;severity=high&amp;id=6890c486ad5a09ad00e1c9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54962-cwe-434-unrestricted-upload-of-file-8a0603e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54962%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20thiagoralves%20OpenPLC_v3&amp;severity=medium&amp;id=68901843ad5a09ad00ddefc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8513-improper-export-of-android-applicati-e3875212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8513%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Caixin%20News%20App&amp;severity=medium&amp;id=688f768aad5a09ad00db0beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8512-improper-export-of-android-applicati-e05f493d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8512%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20TVB%20Big%20Big%20Shop%20App&amp;severity=medium&amp;id=688f6f81ad5a09ad00dae9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8511-cross-site-scripting-in-portabilis-i-e0c3df68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8511%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=688f687bad5a09ad00dac97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8510-cross-site-scripting-in-portabilis-i-a0a97682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8510%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f6174ad5a09ad00daa5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8509-cross-site-scripting-in-portabilis-i-4f403602</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8509%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f5deead5a09ad00da9715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8508-cross-site-scripting-in-portabilis-i-29eee1e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8508%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f3e4aad5a09ad00da0cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51775-cwe-1385-missing-origin-validation--e6df69ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51775%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=high&amp;id=690a6f059e609817bf702f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41177-cwe-79-improper-neutralization-of-i-d64a7f21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=medium&amp;id=690a6f039e609817bf702c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8507-cross-site-scripting-in-portabilis-i-44924aed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8507%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688f3742ad5a09ad00d9ed8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52279-cwe-20-improper-input-validation-in-4bab30b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52279%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=high&amp;id=690a6f059e609817bf702f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8506-cross-site-scripting-in-495300897-wx-07e7a502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8506%3A%20Cross%20Site%20Scripting%20in%20495300897%20wx-shop&amp;severity=medium&amp;id=688f2934ad5a09ad00d9b101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8505-cross-site-request-forgery-in-495300-82aef620</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8505%3A%20Cross-Site%20Request%20Forgery%20in%20495300897%20wx-shop&amp;severity=medium&amp;id=688f1b2aad5a09ad00d9761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8504-unrestricted-upload-in-code-projects-e667db96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8504%3A%20Unrestricted%20Upload%20in%20code-projects%20Kitchen%20Treasure&amp;severity=medium&amp;id=688f141fad5a09ad00d94bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8503-sql-injection-in-code-projects-onlin-52f2f64d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8503%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688f0d18ad5a09ad00d91d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8502-sql-injection-in-code-projects-onlin-b5fb77d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8502%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688f060cad5a09ad00d8f6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8501-cross-site-scripting-in-code-project-2ec02a1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8501%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=688eff05ad5a09ad00d8d07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8500-sql-injection-in-code-projects-human-95d711e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8500%3A%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=688ef0f4ad5a09ad00d8715a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8499-sql-injection-in-code-projects-onlin-a58eb574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8499%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688eed70ad5a09ad00d86514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-telegram-premium-site-distributes-new-lumma-s-3927dfcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FAKE%20TELEGRAM%20PREMIUM%20SITE%20DISTRIBUTES%20NEW%20LUMMA%20STEALER%20VARIANT&amp;severity=medium&amp;id=6890772bad5a09ad00df9c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-phishing-campaign-targeting-indian-government-en-0e4be951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Phishing%20Campaign%20Targeting%20Indian%20Government%20Entities&amp;severity=medium&amp;id=6890772bad5a09ad00df9c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8498-sql-injection-in-code-projects-onlin-abb9988f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8498%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688ee2e9ad5a09ad00d83803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8497-sql-injection-in-code-projects-onlin-8fa9f0a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8497%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8496-sql-injection-in-projectworlds-onlin-4af66aa9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8496%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8495-sql-injection-in-code-projects-inter-d36bf078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8495%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688ec340ad5a09ad00d7b3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gandia-integra-total-4422361-sql-injection-8d97734c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gandia%20Integra%20Total%204.4.2236.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=68900844ad5a09ad00dd9e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-edge-chromium-based-13507049114115-infor-83eb4eaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Edge%20(Chromium-based)%20135.0.7049.114%2F.115%20-%20Information%20Disclosure&amp;severity=medium&amp;id=68900844ad5a09ad00dd9e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyparty-1186-reflected-cross-site-scripting-xss-ecb812ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copyparty%201.18.6%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68900844ad5a09ad00dd9e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lpar2rrd-804-remote-code-execution-rce-18b2f6a3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LPAR2RRD%208.04%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68900844ad5a09ad00dd9dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/swagger-ui-103-cross-site-scripting-xss-f449eebe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Swagger%20UI%201.0.3%20-%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68900844ad5a09ad00dd9df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ultimate-member-wordpress-plugin-266-privilege-esc-88ee0ab3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ultimate%20Member%20WordPress%20Plugin%202.6.6%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68900844ad5a09ad00dd9df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-virtual-hard-disk-vhdx-11-remote-code-ex-954fc3db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Virtual%20Hard%20Disk%20(VHDX)%2011%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68900844ad5a09ad00dd9ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-03-5e673acf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-03&amp;severity=medium&amp;id=688ffc1dad5a09ad00dd214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54956-cwe-669-incorrect-resource-transfer-d617ef3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54956%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20r-lib%20gh&amp;severity=low&amp;id=688fa7c1ad5a09ad00dbdb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52133-cwe-79-improper-neutralization-of-i-3025363e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20Mocca%20Calendar&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52132-cwe-79-improper-neutralization-of-i-acd8a482</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20Mocca%20Calendar&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52131-cwe-79-improper-neutralization-of-i-b8fa55ba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20Mocca%20Calendar&amp;severity=medium&amp;id=688edbdcad5a09ad00d7fe33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54351-cwe-420-unprotected-alternate-chann-916a43de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54351%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20ES%20iperf3&amp;severity=high&amp;id=688eb8b5ad5a09ad00d780d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54350-cwe-617-reachable-assertion-in-es-i-4c8129ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54350%3A%20CWE-617%20Reachable%20Assertion%20in%20ES%20iperf3&amp;severity=low&amp;id=688eb8b5ad5a09ad00d780d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54349-cwe-193-off-by-one-error-in-es-iper-2b6a0b30</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54349%3A%20CWE-193%20Off-by-one%20Error%20in%20ES%20iperf3&amp;severity=medium&amp;id=688eb8b5ad5a09ad00d780d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8494-sql-injection-in-code-projects-inter-9394ab15</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8494%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688ea3b9ad5a09ad00d6a431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8493-sql-injection-in-code-projects-inter-36951b0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8493%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688e958cad5a09ad00d6698e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32253-improper-resource-locking-a1d8037b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32253%3A%20Improper%20Resource%20Locking&amp;severity=medium&amp;id=691f519438b88f02b51baaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32255-missing-release-of-resource-after-e-03a7e221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32255%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=691f519438b88f02b51baace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23290-cwe-200-exposure-of-sensitive-infor-c426bdac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=low&amp;id=688e9208ad5a09ad00d66087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23285-cwe-732-incorrect-permission-assign-a906110e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23285%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=medium&amp;id=688e9208ad5a09ad00d66084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23284-cwe-121-in-nvidia-gpu-display-drive-5d95ce4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23284%3A%20CWE-121%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e9208ad5a09ad00d66081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23283-cwe-121-in-nvidia-gpu-display-drive-af59bde9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23283%3A%20CWE-121%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23288-cwe-497-in-nvidia-gpu-display-drive-d9b18873</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23288%3A%20CWE-497%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=low&amp;id=688e8e84ad5a09ad00d658eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23287-cwe-497-in-nvidia-gpu-display-drive-b4cda767</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23287%3A%20CWE-497%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=low&amp;id=688e8e84ad5a09ad00d658e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23286-cwe-125-out-of-bounds-read-in-nvidi-6d3fcbde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23286%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=medium&amp;id=688e8e84ad5a09ad00d658e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23281-cwe-416-use-after-free-in-nvidia-gp-c28cffa4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23281%3A%20CWE-416%20Use%20After%20Free%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23279-cwe-367-time-of-check-time-of-use-t-b1615de7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23279%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23278-cwe-129-improper-validation-of-arra-52889e58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23278%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23277-cwe-284-in-nvidia-gpu-display-drive-0cf612ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23277%3A%20CWE-284%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23276-cwe-552-files-or-directories-access-9705c6e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23276%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20NVIDIA%20GPU%20Display%20Drivers&amp;severity=high&amp;id=688e8e84ad5a09ad00d658ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-uses-windows-shortcut-files-to-install--e9a012bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20Uses%20Windows%20Shortcut%20Files%20to%20Install%20REMCOS%20Backdoor&amp;severity=medium&amp;id=688e6454ad5a09ad00d5ea71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8471-sql-injection-in-projectworlds-onlin-07ee480d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8471%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688e5d4dad5a09ad00d5c886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8470-sql-injection-in-sourcecodester-onli-86b6db86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8470%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688e4f3dad5a09ad00d57be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8469-sql-injection-in-sourcecodester-onli-2a1d741f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8469%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8468-sql-injection-in-code-projects-wazif-04de4f6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8468%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688e250dad5a09ad00d4a072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7500-cwe-79-improper-neutralization-of-in-f24a4a09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Social%20Sharing&amp;severity=medium&amp;id=688df75aad5a09ad00d30f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7710-cwe-288-authentication-bypass-using--c1295b64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7710%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Brave%20Brave%20Conversion%20Engine%20(PRO)&amp;severity=critical&amp;id=688df75aad5a09ad00d30f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/forced-to-give-your-password-here-is-the-solution-df16a77d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Forced%20to%20give%20your%20password%3F%20Here%20is%20the%20solution.&amp;severity=critical&amp;id=688df055ad5a09ad00d2f25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8467-sql-injection-in-code-projects-wazif-ba746c28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8467%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688df3d6ad5a09ad00d300e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8488-cwe-862-missing-authorization-in-bra-e45f539a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8488%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20Ultimate%20Addons%20for%20Elementor%20(Formerly%20Elementor%20Header%20%26%20Footer%20Builder)&amp;severity=medium&amp;id=688ddec0ad5a09ad00d2a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6722-cwe-200-exposure-of-sensitive-inform-512bc97b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6722%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bitslip6%20BitFire%20Security%20%E2%80%93%20Firewall%2C%20WAF%2C%20Bot%2FSpam%20Blocker%2C%20Login%20Security&amp;severity=medium&amp;id=688ddec0ad5a09ad00d2a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8466-sql-injection-in-code-projects-onlin-9594fa50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8466%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8391-cwe-79-improper-neutralization-of-in-ffd3104c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awssoft%20Magic%20Edge%20%E2%80%93%20Lite&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8400-cwe-79-improper-neutralization-of-in-5f390b2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Image%20Gallery&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6832-cwe-79-improper-neutralization-of-in-97a048ce</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6832%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codebangers%20All%20in%20One%20Time%20Clock%20Lite%20%E2%80%93%20Tracking%20Employee%20Time%20Has%20Never%20Been%20Easier&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8399-cwe-79-improper-neutralization-of-in-b2ab96c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mmanifesto%20Mmm%20Unity%20Loader&amp;severity=medium&amp;id=688eae8dad5a09ad00d6f0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akira-ransomware-exploits-sonicwall-vpns-in-likely-4fa9cf85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akira%20Ransomware%20Exploits%20SonicWall%20VPNs%20in%20Likely%20Zero-Day%20Attack%20on%20Fully-Patched%20Devices&amp;severity=critical&amp;id=688dc29fad5a09ad00d2094d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8317-cwe-79-improper-neutralization-of-in-76c2779a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bnielsen%20Custom%20Word%20Cloud&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1fb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4588-cwe-79-improper-neutralization-of-in-4c4af6fd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrgoodfellow%20360%20Photo%20Spheres&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1faef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8212-cwe-79-improper-neutralization-of-in-9b386cf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Medical%20Addon%20for%20Elementor&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1fb06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8152-cwe-862-missing-authorization-in-ble-73d736f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8152%3A%20CWE-862%20Missing%20Authorization%20in%20blendmedia%20WP%20CTA&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1fb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6626-cwe-79-improper-neutralization-of-in-68812bf8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20ShortPixel%20Adaptive%20Images%20%E2%80%93%20WebP%2C%20AVIF%2C%20CDN%2C%20Image%20Optimization&amp;severity=medium&amp;id=688dbf27ad5a09ad00d1faf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6754-cwe-862-missing-authorization-in-seo-30e20c16</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6754%3A%20CWE-862%20Missing%20Authorization%20in%20seometricsplugin%20SEO%20Metrics&amp;severity=high&amp;id=688dbf27ad5a09ad00d1faf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-ai-generated-npm-package-hits-solana-use-fe12086e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20AI-generated%20npm%20package%20hits%20Solana%20users&amp;severity=medium&amp;id=688dbf1bad5a09ad00d1fabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8146-cwe-79-improper-neutralization-of-in-a02c327b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8146%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=688d9873ad5a09ad00d12695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-the-top-20-oss-vulnerabilities-reveal-about-t-d2efad57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20the%20Top%2020%20OSS%20Vulnerabilities%20Reveal%20About%20the%20Real%20Challenges%20in%20Security%20Governance&amp;severity=high&amp;id=688d9169ad5a09ad00d10a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7694-cwe-22-improper-limitation-of-a-path-b32b19a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7694%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=688d8a60ad5a09ad00d0f58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6078-cwe-79-improper-neutralization-of-in-4497b51f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Partner%20Software%20Partner%20Web&amp;severity=medium&amp;id=688d7c4fad5a09ad00d0c4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6077-cwe-1391-in-partner-software-partner-4347fd93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6077%3A%20CWE-1391%20in%20Partner%20Software%20Partner%20Web&amp;severity=critical&amp;id=688d7c4fad5a09ad00d0c4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6076-cwe-434-unrestricted-upload-of-file--b01bb60f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6076%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Partner%20Software%20Partner%20Web&amp;severity=high&amp;id=688d7c4fad5a09ad00d0c4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-02-c031c5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-02&amp;severity=medium&amp;id=688eaa9dad5a09ad00d6ba1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54796-cwe-400-uncontrolled-resource-consu-6660a03d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54796%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%209001%20copyparty&amp;severity=high&amp;id=688d5220ad5a09ad00cfe403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54790-cwe-89-improper-neutralization-of-s-ef3a9b5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54790%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20humhub%20cfiles&amp;severity=critical&amp;id=688d5220ad5a09ad00cfe3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54782-cwe-77-improper-neutralization-of-s-a0a00bb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54782%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20nestjs%20nest&amp;severity=critical&amp;id=688d5220ad5a09ad00cfe3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54781-cwe-532-insertion-of-sensitive-info-0812f0df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54781%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20himmelblau-idm%20himmelblau&amp;severity=low&amp;id=688d5220ad5a09ad00cfe408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54789-cwe-80-improper-neutralization-of-s-f926e0f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54789%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20humhub%20cfiles&amp;severity=medium&amp;id=688d4e9cad5a09ad00cfd476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54424-cwe-77-improper-neutralization-of-s-3ac93ef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54424%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%201Panel-dev%201Panel&amp;severity=high&amp;id=688d4b18ad5a09ad00cfcc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13978-null-pointer-dereference-in-libtiff-6e71fecc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13978%3A%20NULL%20Pointer%20Dereference%20in%20LibTIFF&amp;severity=low&amp;id=6908f50bf612d110fe9cbe73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-firewall-devices-hit-in-surge-of-akira-r-810688c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20firewall%20devices%20hit%20in%20surge%20of%20Akira%20ransomware%20attacks&amp;severity=high&amp;id=688d19dfad5a09ad00cede56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54595-cwe-78-improper-neutralization-of-s-379fae72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54595%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20alienator88%20Pearcleaner&amp;severity=high&amp;id=688d04c8ad5a09ad00cb1883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6015-cwe-307-improper-restriction-of-exce-d3b6ef55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6015%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d04c8ad5a09ad00cb188c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54590-cwe-918-server-side-request-forgery-0d6a36f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54590%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20silverbucket%20webfinger.js&amp;severity=medium&amp;id=688d04c8ad5a09ad00cb187e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54574-cwe-122-heap-based-buffer-overflow--9d813098</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54574%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20squid-cache%20squid&amp;severity=critical&amp;id=688d04c8ad5a09ad00cb1879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53012-cwe-400-uncontrolled-resource-consu-4a62b0d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53012%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=medium&amp;id=688d04c8ad5a09ad00cb1870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6011-cwe-203-observable-discrepancy-in-ha-74b096c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6011%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20HashiCorp%20Vault&amp;severity=low&amp;id=688d04c8ad5a09ad00cb1889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53011-cwe-476-null-pointer-dereference-in-3a4a4ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53011%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=low&amp;id=688d0144ad5a09ad00cb0c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53010-cwe-476-null-pointer-dereference-in-67527036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53010%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=low&amp;id=688d0144ad5a09ad00cb0c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53009-cwe-121-stack-based-buffer-overflow-3ca3c831</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53009%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20MaterialX&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6004-cwe-307-improper-restriction-of-exce-4058b818</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6004%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6037-cwe-295-improper-certificate-validat-a667de62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6037%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6014-cwe-156-improper-neutralization-of-w-44b899ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6014%3A%20CWE-156%3A%20Improper%20Neutralization%20of%20Whitespace%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=688d0144ad5a09ad00cb0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2824-cwe-601-url-redirection-to-untrusted-a6fadcdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2824%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Operational%20Decision%20Manager&amp;severity=high&amp;id=688d0144ad5a09ad00cb0c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6000-cwe-94-improper-control-of-generatio-1fe5a742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6000%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(Code%20Injection)%20in%20HashiCorp%20Vault&amp;severity=critical&amp;id=688cfdc0ad5a09ad00cae4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5999-cwe-266-incorrect-privilege-assignme-11a2abec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5999%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20HashiCorp%20Vault&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8477-cwe-121-stack-based-buffer-overflow--f0e66f6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8477%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8480-cwe-22-improper-limitation-of-a-path-9f984260</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8480%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8476-cwe-295-improper-certificate-validat-5832b62b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8476%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8475-cwe-121-stack-based-buffer-overflow--8ff6cae9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8475%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8474-cwe-121-stack-based-buffer-overflow--c933299b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8474%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8473-cwe-78-improper-neutralization-of-sp-890eebdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8473%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Alpine%20iLX-507&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8472-cwe-121-stack-based-buffer-overflow--b188e35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8472%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Alpine%20iLX-507&amp;severity=high&amp;id=688cfdc0ad5a09ad00cae4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32256-race-condition-during-access-to-alt-aac81690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32256%3A%20Race%20Condition%20During%20Access%20to%20Alternate%20Channel&amp;severity=high&amp;id=691ebfd29f5a9374a9cb41b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33118-cwe-79-improper-neutralization-of-i-8f02cec1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=688cfa3cad5a09ad00cac523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48074-cwe-770-allocation-of-resources-wit-b1eedc0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48074%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=688cefb0ad5a09ad00ca6abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-oauth-app-impersonation-campaign-leads-t-6e5ecc8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OAuth%20App%20Impersonation%20Campaign%20Leads%20to%20MFA%20Phishing&amp;severity=medium&amp;id=68908c43ad5a09ad00e00aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-random-words-doubletrouble-mobile-banking-t-96a6349f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20Random%20Words%3A%20DoubleTrouble%20Mobile%20Banking%20Trojan%20Revealed&amp;severity=medium&amp;id=688ccc87ad5a09ad00c9789d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2603-deploys-dns-controlled-backdoor-in-warl-ed06fe03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2603%20Deploys%20DNS-Controlled%20Backdoor%20in%20Warlock%20and%20LockBit%20Ransomware%20Attacks&amp;severity=high&amp;id=688cc903ad5a09ad00c95b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/toolshell-under-siege-check-point-analyzes-chinese-4385296d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ToolShell%20under%20siege%3A%20Check%20Point%20analyzes%20Chinese%20APT%20Storm-2603&amp;severity=medium&amp;id=688cc903ad5a09ad00c95b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/indian-infrastructure-targeted-with-desktop-lures--290f555f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Indian%20Infrastructure%20Targeted%20with%20Desktop%20Lures%20and%20Poseidon%20Backdoor&amp;severity=medium&amp;id=688cb3ecad5a09ad00c8cca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41376-cwe-89-improper-neutralization-of-s-94fdc607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41376%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41375-cwe-89-improper-neutralization-of-s-1829e829</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41375%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41374-cwe-89-improper-neutralization-of-s-c9db9c45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41374%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41373-cwe-89-improper-neutralization-of-s-3a115682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41373%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41372-cwe-89-improper-neutralization-of-s-c2988344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41372%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=688cb771ad5a09ad00c8e37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41371-cwe-89-improper-neutralization-of-s-775d8afb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41371%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=critical&amp;id=688cb771ad5a09ad00c8e377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41370-cwe-89-improper-neutralization-of-s-81e2427f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41370%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=critical&amp;id=688cb771ad5a09ad00c8e374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-lockbit-a-deep-dive-into-dll-sideloading-1dacd105</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20LockBit%3A%20A%20Deep%20Dive%20into%20DLL%20Sideloading%20and%20Masquerading%20Tactics&amp;severity=medium&amp;id=688ca960ad5a09ad00c88a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6228-cwe-79-improper-neutralization-of-in-5fbf630e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Header%20Builder%2C%20Footer%20Builter%2C%20Theme%20Builder%2C%20Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=688ca5e0ad5a09ad00c876e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4684-cwe-79-improper-neutralization-of-in-f0edfcb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blockspare%20BlockSpare%3A%20Gutenberg%20Blocks%20%26%20Patterns%20for%20Blogs%2C%20Magazines%2C%20Business%20Sites%20%E2%80%93%20Post%20Grids%2C%20Sliders%2C%20Carousels%2C%20Counters%2C%20Page%20Builder%20%26%20Starter%20Site%20Imports%2C%20No%20Coding%20Needed&amp;severity=medium&amp;id=688ca5e0ad5a09ad00c876dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experts-detect-multi-layer-redirect-tactic-used-to-35eb0967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experts%20Detect%20Multi-Layer%20Redirect%20Tactic%20Used%20to%20Steal%20Microsoft%20365%20Login%20Credentials&amp;severity=high&amp;id=688c89bdad5a09ad00c78e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-secret-blizzard-targets-foreign--d964feeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20Secret%20Blizzard%20targets%20foreign%20embassies%20in%20Moscow%20with%20ApolloShadow%20malware&amp;severity=medium&amp;id=688c89bdad5a09ad00c78e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6398-cwe-476-null-pointer-dereference-in--e2e3f3a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6398%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20ASUS%20AI%20Suite&amp;severity=medium&amp;id=688c82cdad5a09ad00c76f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/playpraetors-evolving-threat-how-chinese-speaking--89b88a63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PlayPraetor&apos;s%20evolving%20threat%3A%20How%20Chinese-speaking%20actors%20globally%20scale%20an%20Android%20RAT%20%7C%20Cleafy&amp;severity=medium&amp;id=688c7f32ad5a09ad00c75bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8443-sql-injection-in-code-projects-onlin-84d1669a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8443%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688c7f31ad5a09ad00c75bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8442-sql-injection-in-code-projects-onlin-c14dc564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8442%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688c7829ad5a09ad00c6f11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8441-sql-injection-in-code-projects-onlin-9d33b3c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8441%3A%20SQL%20Injection%20in%20code-projects%20Online%20Medicine%20Guide&amp;severity=medium&amp;id=688c7121ad5a09ad00c6ce47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8439-sql-injection-in-code-projects-wazif-a56b47f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8439%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688c6a19ad5a09ad00c69a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7646-cwe-79-improper-neutralization-of-in-2286092f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=688c6695ad5a09ad00c68506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8438-sql-injection-in-code-projects-wazif-93c42a16</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8438%3A%20SQL%20Injection%20in%20code-projects%20Wazifa%20System&amp;severity=medium&amp;id=688c6695ad5a09ad00c6850a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8437-sql-injection-in-code-projects-kitch-c19aa38f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8437%3A%20SQL%20Injection%20in%20code-projects%20Kitchen%20Treasure&amp;severity=medium&amp;id=688c5c0aad5a09ad00c612b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5921-cwe-79-cross-site-scripting-xss-in-s-f5bd287e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5921%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20SureForms&amp;severity=medium&amp;id=688c58c0ad5a09ad00c5e709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31716-cwe-121-stack-based-buffer-overflow-0b2da83f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31716%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=688c58c0ad5a09ad00c5e706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8454-vulnerability-in-debian-devscripts-af508af6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8454%3A%20Vulnerability%20in%20Debian%20devscripts&amp;severity=critical&amp;id=688c58c0ad5a09ad00c5e70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8436-sql-injection-in-projectworlds-onlin-570155a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8436%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688c5501ad5a09ad00c5d576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8435-missing-authorization-in-code-projec-c2d57f85</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8435%3A%20Missing%20Authorization%20in%20code-projects%20Online%20Movie%20Streaming&amp;severity=medium&amp;id=688c46f1ad5a09ad00c4fdb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7845-cwe-79-improper-neutralization-of-in-e5e6d983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Stratum%20%E2%80%93%20Elementor%20Widgets&amp;severity=medium&amp;id=688c46f1ad5a09ad00c4fdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4523-cwe-200-exposure-of-sensitive-inform-e0ab7de6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4523%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeatelier%20IDonate%20%E2%80%93%20Blood%20Donation%2C%20Request%20And%20Donor%20Management%20System&amp;severity=medium&amp;id=688c46f1ad5a09ad00c4fd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7443-cwe-434-unrestricted-upload-of-file--531c020a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7443%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20berqwp%20BerqWP%20%E2%80%93%20Automated%20All-In-One%20Page%20Speed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Cache%2C%20CDN%2C%20Images%2C%20CSS%2C%20and%20JavaScript&amp;severity=high&amp;id=688c46f1ad5a09ad00c4fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7725-cwe-79-improper-neutralization-of-in-8049f247</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Photos%2C%20Files%2C%20YouTube%2C%20Twitter%2C%20Instagram%2C%20TikTok%2C%20Ecommerce%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%2C%20Sell%20via%20PayPal%20or%20Stripe%2C%20Social%20Share%20Buttons%2C%20OpenAI&amp;severity=high&amp;id=688c46f1ad5a09ad00c4fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8434-missing-authorization-in-code-projec-d28696dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8434%3A%20Missing%20Authorization%20in%20code-projects%20Online%20Movie%20Streaming&amp;severity=medium&amp;id=688c3fe9ad5a09ad00bfe0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5947-cwe-639-authorization-bypass-through-3017b539</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5947%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=688c355ead5a09ad00bf5557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8433-path-traversal-in-code-projects-docu-4498c9e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8433%3A%20Path%20Traversal%20in%20code-projects%20Document%20Management%20System&amp;severity=medium&amp;id=688c355ead5a09ad00bf555b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5954-cwe-269-improper-privilege-managemen-36bba42d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5954%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20aonetheme%20Service%20Finder%20SMS%20System&amp;severity=critical&amp;id=688c2ad1ad5a09ad00bf0bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8431-sql-injection-in-phpgurukul-boat-boo-9a49b98e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8431%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=688c1cc1ad5a09ad00bec92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-08-01-0705db94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-08-01&amp;severity=medium&amp;id=688d591dad5a09ad00cffdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54564-na-e0dc64db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54564%3A%20n%2Fa&amp;severity=high&amp;id=688d04c8ad5a09ad00cb1876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50869-na-5c439c47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50869%3A%20n%2Fa&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50868-na-39546bf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50868%3A%20n%2Fa&amp;severity=medium&amp;id=688cfdc0ad5a09ad00cae4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50870-na-b62c557c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50870%3A%20n%2Fa&amp;severity=critical&amp;id=688cfa3cad5a09ad00cac526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45778-na-bb843d54</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45778%3A%20n%2Fa&amp;severity=medium&amp;id=688cf6b8ad5a09ad00cabb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45150-na-b79051cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45150%3A%20n%2Fa&amp;severity=critical&amp;id=688cf334ad5a09ad00caa6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51504-na-ff1a8ec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51504%3A%20n%2Fa&amp;severity=high&amp;id=688cefb0ad5a09ad00ca6ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51502-na-8eab2c30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51502%3A%20n%2Fa&amp;severity=medium&amp;id=688cefb0ad5a09ad00ca6acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51501-na-862d47ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51501%3A%20n%2Fa&amp;severity=medium&amp;id=688cefb0ad5a09ad00ca6ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52390-na-bc01c05f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52390%3A%20n%2Fa&amp;severity=critical&amp;id=688ce8a8ad5a09ad00ca4607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50472-na-036faa6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50472%3A%20n%2Fa&amp;severity=critical&amp;id=688ce8a8ad5a09ad00ca4603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52361-na-9c6f9431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52361%3A%20n%2Fa&amp;severity=high&amp;id=688ce524ad5a09ad00ca3848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50460-na-1a0c76d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50460%3A%20n%2Fa&amp;severity=critical&amp;id=688ce524ad5a09ad00ca3842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52327-na-d1c16275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52327%3A%20n%2Fa&amp;severity=high&amp;id=688ce1a0ad5a09ad00ca1334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44139-na-b9407977</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44139%3A%20n%2Fa&amp;severity=high&amp;id=688ce1a0ad5a09ad00ca1330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-frozen-in-transit-secret-blizzards-aitm-camp-438ddabe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Frozen%20in%20transit%3A%20Secret%20Blizzard%E2%80%99s%20AiTM%20campaign%20against%20diplomats&amp;severity=medium&amp;id=688ce196ad5a09ad00ca121e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45767-na-c9e25787</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45767%3A%20n%2Fa&amp;severity=high&amp;id=688cd390ad5a09ad00c9b3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46018-na-db5c96ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46018%3A%20n%2Fa&amp;severity=medium&amp;id=688cc57fad5a09ad00c944f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54939-cwe-770-allocation-of-resources-wit-9c1330cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54939%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20litespeedtech%20LSQUIC&amp;severity=medium&amp;id=688c517dad5a09ad00c54f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53399-cwe-346-origin-validation-error-in--fa851d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53399%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Sipwise%20rtpengine&amp;severity=medium&amp;id=688c355dad5a09ad00bf552d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32251-improper-restriction-of-excessive-a-9e0c1fa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32251%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=low&amp;id=6920022204dd2c5f998cacda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23289-cwe-532-insertion-of-sensitive-info-4a0cfe1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23289%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20NVIDIA%20NVIDIA%20Omniverse%20Launcher&amp;severity=medium&amp;id=688bd9f5ad5a09ad00bc37e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48073-cwe-476-null-pointer-dereference-in-e087db28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48073%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=688bd2edad5a09ad00bc1fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48072-cwe-125-out-of-bounds-read-in-acade-d2b19f55</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48072%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20AcademySoftwareFoundation%20openexr&amp;severity=medium&amp;id=688bd2edad5a09ad00bc1fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48071-cwe-122-heap-based-buffer-overflow--d89af4a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48071%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20AcademySoftwareFoundation%20openexr&amp;severity=high&amp;id=688bcf6aad5a09ad00bc13fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-appeal-an-infostealer-rises-from-the-ashes-3b9303f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaaS%20Appeal%3A%20An%20Infostealer%20Rises%20From%20The%20Ashes&amp;severity=medium&amp;id=688bcf68ad5a09ad00bc13ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-claims-mailchimp-as-new-victim--f6f56a70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Claims%20Mailchimp%20as%20New%20Victim%20in%20Relatively%20Small%20Breach&amp;severity=high&amp;id=688bcbe4ad5a09ad00bbfdbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37112-cwe-798-use-of-hard-coded-credentia-fd5478d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37112%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Telco%20Network%20Function%20Virtual%20Orchestrator&amp;severity=medium&amp;id=688bc861ad5a09ad00bbeacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37111-cwe-798-use-of-hard-coded-credentia-c9bb8ba5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37111%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Telco%20Network%20Function%20Virtual%20Orchestrator&amp;severity=medium&amp;id=688bc861ad5a09ad00bbeaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37110-cwe-922-insecure-storage-of-sensiti-e8178e16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37110%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Telco%20Network%20Function%20Virtual%20Orchestrator&amp;severity=medium&amp;id=688bc861ad5a09ad00bbeac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/redhook-a-new-android-banking-trojan-targeting-use-0a08abad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RedHook%3A%20A%20New%20Android%20Banking%20Trojan%20Targeting%20Users%20In%20Vietnam&amp;severity=medium&amp;id=688bc4dcad5a09ad00bbdc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8286-cwe-306-in-gralp-systems-gralp-fmus--6ff9b87d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8286%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20G%C3%BCralp%20Systems%20G%C3%BCralp%20FMUS%20Series&amp;severity=critical&amp;id=688bc4ddad5a09ad00bbdca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37109-vulnerability-in-hewlett-packard-en-7b044aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37109%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Telco%20Service%20Activator&amp;severity=low&amp;id=688bc4ddad5a09ad00bbdcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37108-vulnerability-in-hewlett-packard-en-c421ffd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37108%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Telco%20Service%20Activator&amp;severity=low&amp;id=688bc4ddad5a09ad00bbdca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8426-cwe-22-improper-limitation-of-a-path-434381e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8426%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=688bafc9ad5a09ad00bb510a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54833-cwe-307-improper-restriction-of-exc-2905397b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54833%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=medium&amp;id=688bac43ad5a09ad00bb354e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54834-cwe-204-observable-response-discrep-5bd6d320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54834%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=medium&amp;id=688bac43ad5a09ad00bb3553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54832-cwe-472-external-control-of-assumed-c75e489c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54832%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20OPEXUS%20FOIAXpress%20Public%20Access%20Link%20(PAL)&amp;severity=medium&amp;id=688bac43ad5a09ad00bb3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-onlyfans-discord-and-twitch-clickfix-themed-p-88c2e064</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20OnlyFans%2C%20Discord%20and%20Twitch%20ClickFix-Themed%20Pages%20Spread%20Epsilon%20Red%20Ransomware&amp;severity=medium&amp;id=688b9e32ad5a09ad00ba1b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8409-sql-injection-in-code-projects-vehic-a5467c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8409%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b9022ad5a09ad00b97573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46809-cwe-532-insertion-of-sensitive-info-415ecf64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46809%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20SUSE%20Container%20suse%2Fmanager%2F4.3%2Fproxy-httpd%3A4.3.16.9.67.1&amp;severity=medium&amp;id=688b8c9ead5a09ad00b92639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/materialx-and-openexr-security-audit-shielder-6e1d2a20</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaterialX%20and%20OpenEXR%20Security%20Audit%20-%20Shielder&amp;severity=medium&amp;id=688b891dad5a09ad00b919a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8408-sql-injection-in-code-projects-vehic-50a059be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8408%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b891aad5a09ad00b9198d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gold-blade-remote-dll-sideloading-attack-deploys-r-d262df98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GOLD%20BLADE%20remote%20DLL%20sideloading%20attack%20deploys%20RedLoader&amp;severity=medium&amp;id=688b891aad5a09ad00b9196e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34146-cwe-1321-improperly-controlled-modi-c20804a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34146%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nyariv%20sandboxjs&amp;severity=high&amp;id=688b891aad5a09ad00b91987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7738-cleartext-storage-of-sensitive-infor-ca134946</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7738%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Ansible%20django-ansible-base&amp;severity=medium&amp;id=688b7b1cad5a09ad00b8c2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-link-new-ss7-encoding-attack-to-survei-bfe9b307</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Link%20New%20SS7%20Encoding%20Attack%20to%20Surveillance%20Vendor%20Activity&amp;severity=medium&amp;id=688b7b0fad5a09ad00b8c269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8407-sql-injection-in-code-projects-vehic-86ecc042</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8407%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b7e8ead5a09ad00b8cc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54589-cwe-79-improper-neutralization-of-i-a9a263df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54589%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=688b7786ad5a09ad00b8a643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-and-the-hidden-dangers-of-byovd-e2dd9111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20and%20the%20Hidden%20Dangers%20of%20BYOVD&amp;severity=medium&amp;id=688b6cfaad5a09ad00b7e2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-200-malicious-open-source-packages-traced-to--2a1a378b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20200%20Malicious%20Open%20Source%20Packages%20Traced%20to%20Lazarus%20Campaign&amp;severity=high&amp;id=688b6271ad5a09ad00b7950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8213-cwe-36-absolute-path-traversal-in-ni-06e40731</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8213%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20nintechnet%20NinjaScanner%20%E2%80%93%20Virus%20%26%20Malware%20scan&amp;severity=high&amp;id=688b6281ad5a09ad00b7953f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/browser-extensions-can-exploit-chatgpt-gemini-in-m-0872df24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Browser%20Extensions%20Can%20Exploit%20ChatGPT%2C%20Gemini%20in%20%E2%80%98Man%20in%20the%20Prompt%E2%80%99%20Attack&amp;severity=high&amp;id=688b5eeaad5a09ad00b77f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8382-sql-injection-in-campcodes-online-ho-1dc0a3b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8382%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b5ef7ad5a09ad00b77f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8381-sql-injection-in-campcodes-online-ho-bb5a5193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8381%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b57e3ad5a09ad00b73fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8068-cwe-863-incorrect-authorization-in-d-77a23d05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8068%3A%20CWE-863%20Incorrect%20Authorization%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=688b545fad5a09ad00b721ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8401-cwe-285-improper-authorization-in-de-056dc956</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8401%3A%20CWE-285%20Improper%20Authorization%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=688b545fad5a09ad00b721b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8151-cwe-22-improper-limitation-of-a-path-506d24cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8151%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=688b545fad5a09ad00b721b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8380-cross-site-scripting-in-campcodes-on-771e7a86</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8380%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b50dbad5a09ad00b6e7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8379-unrestricted-upload-in-campcodes-onl-c3638243</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8379%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b49d3ad5a09ad00b66828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-facebook-ads-to-spread-jsceal-malware--e067d3ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Facebook%20Ads%20to%20Spread%20JSCEAL%20Malware%20via%20Fake%20Cryptocurrency%20Trading%20Apps&amp;severity=high&amp;id=688b42caad5a09ad00b61699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-plant-4g-raspberry-pi-on-bank-network-in-f-f9d4092a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20plant%204G%20Raspberry%20Pi%20on%20bank%20network%20in%20failed%20ATM%20heist&amp;severity=high&amp;id=688b42caad5a09ad00b616a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2813-cwe-770-allocation-of-resources-with-c941ba44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2813%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Phoenix%20Contact%20AXL%20F%20BK%20PN%20TPS&amp;severity=high&amp;id=688b4307ad5a09ad00b61a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/safepay-ransomware-threatens-to-leak-35tb-of-ingra-85bffdd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SafePay%20ransomware%20threatens%20to%20leak%203.5TB%20of%20Ingram%20Micro%20data&amp;severity=high&amp;id=688b42caad5a09ad00b6169d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shinyhunters-behind-salesforce-data-theft-attacks--8d62ab7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ShinyHunters%20behind%20Salesforce%20data%20theft%20attacks%20at%20Qantas%2C%20Allianz%20Life%2C%20and%20LVMH&amp;severity=high&amp;id=688b42caad5a09ad00b61695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-released-a-decryptor-for-the-funksec-r-7b70ba91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20released%20a%20decryptor%20for%20the%20FunkSec%20ransomware&amp;severity=medium&amp;id=688b42caad5a09ad00b616a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41688-cwe-653-improper-isolation-or-compa-f756f3ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41688%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20MB%20connect%20line%20mbNET%20HW1&amp;severity=high&amp;id=688b4307ad5a09ad00b61a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8378-sql-injection-in-campcodes-online-ho-70373801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8378%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=688b4307ad5a09ad00b61a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sealed-chain-of-deception-actors-leveraging-nodejs-0a0862aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sealed%20Chain%20of%20Deception%3A%20Actors%20leveraging%20Node.JS%20to%20Launch%20JSCeal&amp;severity=medium&amp;id=688b3f45ad5a09ad00b5ff86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40980-cwe-79-improper-neutralization-of-i-6fb8065f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40980%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20UltimateFosters%20UltimatePOS&amp;severity=medium&amp;id=688b3f45ad5a09ad00b600ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8376-sql-injection-in-code-projects-vehic-56c80bfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8376%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b3bc1ad5a09ad00b5e2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8375-sql-injection-in-code-projects-vehic-ae216882</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8375%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b34bbad5a09ad00b5bf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24854-cwe-79-improper-neutralization-of-i-cff8fafd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20JSPWiki&amp;severity=medium&amp;id=688b2db3ad5a09ad00b4fe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24853-cwe-79-improper-neutralization-of-i-a7ed8822</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20JSPWiki&amp;severity=high&amp;id=688b2db3ad5a09ad00b4fe1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8374-sql-injection-in-code-projects-vehic-8db4fdc7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8374%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b2db3ad5a09ad00b4fe23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8192-cwe-367-time-of-check-time-of-use-to-e81e9baa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8192%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Android%20TV&amp;severity=medium&amp;id=688b2a2fad5a09ad00b4e13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8373-sql-injection-in-code-projects-vehic-51917607</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8373%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688b26abad5a09ad00b4b85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8372-sql-injection-in-code-projects-exam--408bd818</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8372%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36563-cross-site-scripting-xss-in-alfasad-d2b422ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36563%3A%20Cross-site%20scripting%20(XSS)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b4899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41391-cross-site-scripting-xss-in-alfasad-4c90db80</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41391%3A%20Cross-site%20scripting%20(XSS)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b4899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7205-cwe-79-improper-neutralization-of-in-84646903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41396-improper-limitation-of-a-pathname-t-388d93e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41396%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46359-improper-limitation-of-a-pathname-t-9db0db3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46359%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=high&amp;id=688b1fa4ad5a09ad00b489a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54752-improper-neutralization-of-formula--af454649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54752%3A%20Improper%20neutralization%20of%20formula%20elements%20in%20a%20CSV%20file%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1fa4ad5a09ad00b489aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54757-unrestricted-upload-of-file-with-da-4312c0ac</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54757%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Alfasado%20Inc.%20PowerCMS&amp;severity=medium&amp;id=688b1c1fad5a09ad00b478e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8371-sql-injection-in-code-projects-exam--3194039e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8371%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688b189bad5a09ad00b460e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8370-cross-site-scripting-in-portabilis-i-111b7d9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8370%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b1196ad5a09ad00b4221a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8369-cross-site-scripting-in-portabilis-i-8070160f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8369%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b0a8bad5a09ad00b3b6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53558-use-of-weak-credentials-in-zte-japa-0ad8df79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53558%3A%20Use%20of%20weak%20credentials%20in%20ZTE%20Japan.%20K.K.%20ZXHN-F660T&amp;severity=high&amp;id=688b0383ad5a09ad00b38618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8368-cross-site-scripting-in-portabilis-i-6125e093</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8368%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b0383ad5a09ad00b3861b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8367-cross-site-scripting-in-portabilis-i-e797c2e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8367%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688afc7bad5a09ad00b319b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8366-cross-site-scripting-in-portabilis-i-4e20b2c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8366%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688af8f7ad5a09ad00b2f7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5720-cwe-79-improper-neutralization-of-in-cce09a1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=688af1f7ad5a09ad00b2c418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7847-cwe-434-unrestricted-upload-of-file--52ff1a37</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7847%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=688af1f7ad5a09ad00b2c41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8365-cross-site-scripting-in-portabilis-i-0f5cea76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8365%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688aee6ead5a09ad00b2b227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8348-improper-authentication-in-kehua-cha-6f93fc96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8348%3A%20Improper%20Authentication%20in%20Kehua%20Charging%20Pile%20Cloud%20Platform&amp;severity=medium&amp;id=688aeae7ad5a09ad00b29939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8347-sql-injection-in-kehua-charging-pile-59e0f53a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8347%3A%20SQL%20Injection%20in%20Kehua%20Charging%20Pile%20Cloud%20Platform&amp;severity=medium&amp;id=688ae05bad5a09ad00b25691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8346-cross-site-scripting-in-portabilis-i-ebd09f50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8346%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=688b821dad5a09ad00b8e78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8345-sql-injection-in-shanghai-lingdang-i-0c52a08d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8345%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=688b821dad5a09ad00b8e788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8344-unrestricted-upload-in-openviglet-sh-56a09ee3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8344%3A%20Unrestricted%20Upload%20in%20openviglet%20shio&amp;severity=medium&amp;id=688acb43ad5a09ad00b1dd1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8343-path-traversal-in-openviglet-shio-d36920a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8343%3A%20Path%20Traversal%20in%20openviglet%20shio&amp;severity=medium&amp;id=688ac43aad5a09ad00b1c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8340-cross-site-scripting-in-code-project-66f66d94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8340%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688abd36ad5a09ad00b1764e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8339-sql-injection-in-code-projects-inter-13909721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8339%3A%20SQL%20Injection%20in%20code-projects%20Intern%20Membership%20Management%20System&amp;severity=medium&amp;id=688abd36ad5a09ad00b17647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-31-8e3032c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-31&amp;severity=medium&amp;id=688c079dad5a09ad00bdb1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45768-na-b0a7ad4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45768%3A%20n%2Fa&amp;severity=high&amp;id=688bcf6aad5a09ad00bc13f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50847-na-b9b6d33b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50847%3A%20n%2Fa&amp;severity=medium&amp;id=688bcbf9ad5a09ad00bbffc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50850-na-375409a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50850%3A%20n%2Fa&amp;severity=high&amp;id=688bcbf9ad5a09ad00bbffc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45769-na-d23e3df2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45769%3A%20n%2Fa&amp;severity=medium&amp;id=688bcbf9ad5a09ad00bbffbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50572-na-401e099c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50572%3A%20n%2Fa&amp;severity=high&amp;id=688bc4ddad5a09ad00bbdca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45770-na-de3a0880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45770%3A%20n%2Fa&amp;severity=high&amp;id=688bc4dcad5a09ad00bbdc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26064-na-de161255</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26064%3A%20n%2Fa&amp;severity=high&amp;id=688bbde8ad5a09ad00bba87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26063-na-b50af3ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26063%3A%20n%2Fa&amp;severity=critical&amp;id=688bbde8ad5a09ad00bba878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26062-na-a2dd2561</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26062%3A%20n%2Fa&amp;severity=critical&amp;id=688bbde8ad5a09ad00bba873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51503-na-6f5017cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51503%3A%20n%2Fa&amp;severity=high&amp;id=688bb34bad5a09ad00bb71c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51385-na-d0609807</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51385%3A%20n%2Fa&amp;severity=low&amp;id=688bac43ad5a09ad00bb3545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51384-na-00570191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51384%3A%20n%2Fa&amp;severity=low&amp;id=688bac43ad5a09ad00bb3541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51383-na-8d31a716</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51383%3A%20n%2Fa&amp;severity=low&amp;id=688bac43ad5a09ad00bb353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50866-na-3bb6a2b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50866%3A%20n%2Fa&amp;severity=medium&amp;id=688ba1b7ad5a09ad00baaf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50867-na-677b0752</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50867%3A%20n%2Fa&amp;severity=medium&amp;id=688b972aad5a09ad00b9c2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29556-na-a1cc0750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29556%3A%20n%2Fa&amp;severity=high&amp;id=688b972aad5a09ad00b9c2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50848-na-b6ddc1d7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50848%3A%20n%2Fa&amp;severity=medium&amp;id=688b93bdad5a09ad00b99f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52203-na-6984f2bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52203%3A%20n%2Fa&amp;severity=high&amp;id=688b8c9ead5a09ad00b9263c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50849-na-4d7d6681</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50849%3A%20n%2Fa&amp;severity=high&amp;id=688b891aad5a09ad00b91983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50475-na-033991fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50475%3A%20n%2Fa&amp;severity=critical&amp;id=688b891aad5a09ad00b9197e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29557-na-d598bc83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29557%3A%20n%2Fa&amp;severity=medium&amp;id=688b8596ad5a09ad00b90298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51569-na-fd5bf26d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51569%3A%20n%2Fa&amp;severity=medium&amp;id=688b8596ad5a09ad00b90294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52289-na-899ab492</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52289%3A%20n%2Fa&amp;severity=high&amp;id=688b821dad5a09ad00b8e784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50270-na-6fbc0136</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50270%3A%20n%2Fa&amp;severity=medium&amp;id=688b821dad5a09ad00b8e780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36040-cwe-613-insufficient-session-expira-209b1a51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36040%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=688ab2a7ad5a09ad00b0cbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36039-cwe-602-client-side-enforcement-of--4bf672a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36039%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=688ab2a7ad5a09ad00b0cbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49082-vulnerability-in-absolute-security--8c2b44c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49082%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54085-vulnerability-in-absolute-security--30132b5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54085%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49084-vulnerability-in-absolutee-security-e40fdaa0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49084%3A%20Vulnerability%20in%20Absolutee%20Security%20Secure%20Access&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8338-sql-injection-in-projectworlds-onlin-8b7042bf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8338%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=688aaf24ad5a09ad00b0c3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49083-vulnerability-in-absolute-security--7abaf612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49083%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=high&amp;id=688aaf24ad5a09ad00b0c3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8337-cross-site-scripting-in-code-project-2095990a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8337%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=688aa81bad5a09ad00b08f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8336-sql-injection-in-campcodes-online-re-d5a675d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8336%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=688aba19ad5a09ad00b13b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-critical-crushftp-cve-2025-54309-rce-explained-c53e4968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Critical%20CrushFTP%20CVE-2025-54309%20RCE%20Explained%20%2B%20PoC&amp;severity=critical&amp;id=688a9a0ead5a09ad00afe594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8335-cross-site-request-forgery-in-code-p-a83d7bd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8335%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=688a9a0bad5a09ad00afe588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8334-sql-injection-in-campcodes-online-re-00bc4253</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8334%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=688a9304ad5a09ad00afbb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54586-cwe-200-exposure-of-sensitive-infor-7948a734</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54586%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a8f80ad5a09ad00afa685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8333-sql-injection-in-code-projects-onlin-cf6beffa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8333%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688a8bfcad5a09ad00af7e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8332-sql-injection-in-code-projects-onlin-665ea57c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8332%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688a84f4ad5a09ad00af448e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54585-cwe-285-improper-authorization-in-f-8d082a90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54585%3A%20CWE-285%3A%20Improper%20Authorization%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a8174ad5a09ad00af0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8331-sql-injection-in-code-projects-onlin-99182052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8331%3A%20SQL%20Injection%20in%20code-projects%20Online%20Farm%20System&amp;severity=medium&amp;id=688a7dedad5a09ad00aefbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54584-cwe-115-misinterpretation-of-input--f00a4e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54584%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a7dedad5a09ad00aefbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54583-cwe-863-incorrect-authorization-in--08589336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54583%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20finos%20git-proxy&amp;severity=high&amp;id=688a7dedad5a09ad00aefbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54581-cwe-369-divide-by-zero-in-0x676e67--150a777a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54581%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%200x676e67%20vproxy&amp;severity=high&amp;id=688a7dedad5a09ad00aefbed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54575-cwe-400-uncontrolled-resource-consu-592430f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54575%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SixLabors%20ImageSharp&amp;severity=medium&amp;id=688a7a68ad5a09ad00aeea8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8330-sql-injection-in-code-projects-vehic-8a2b3328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8330%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688a76e4ad5a09ad00ae7a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8329-sql-injection-in-code-projects-vehic-3a285370</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8329%3A%20SQL%20Injection%20in%20code-projects%20Vehicle%20Management&amp;severity=medium&amp;id=688a6fdcad5a09ad00ae31cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xworm-v6-advanced-evasion-and-amsi-bypass-capabili-498e74e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWorm%20V6%3A%20Advanced%20Evasion%20and%20AMSI%20Bypass%20Capabilities%20Revealed&amp;severity=medium&amp;id=688a6fdbad5a09ad00ae31b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30103-cwe-552-files-or-directories-access-91ceefed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30103%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=688a6550ad5a09ad00add7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36609-cwe-259-use-of-hard-coded-password--63c35841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36609%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=low&amp;id=688a6550ad5a09ad00add7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36608-cwe-611-improper-restriction-of-xml-4343cef3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36608%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=688a6550ad5a09ad00add7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8328-sql-injection-in-code-projects-exam--d63ea576</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8328%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688a61cdad5a09ad00adaf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30480-cwe-20-improper-input-validation-in-00093173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30480%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=688a61cdad5a09ad00adaf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26332-cwe-532-insertion-of-sensitive-info-bf579805</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26332%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20TechAdvisor&amp;severity=high&amp;id=688a5e4dad5a09ad00ad8920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30105-cwe-532-insertion-of-sensitive-info-f8754e92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30105%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20XtremIO&amp;severity=high&amp;id=688a5e4dad5a09ad00ad8923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-urges-patch-after-3-major-vpn-vulnerabil-fef78e17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20Urges%20Patch%20After%203%20Major%20VPN%20Vulnerabilities%20Disclosed&amp;severity=medium&amp;id=688a5ac3ad5a09ad00ad6423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8327-sql-injection-in-code-projects-exam--6327d678</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8327%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688a5acdad5a09ad00ad6450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36611-cwe-59-improper-link-resolution-bef-f5525a88</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36611%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Encryption&amp;severity=high&amp;id=688a4930ad5a09ad00ac938e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8312-cwe-833-deadlock-in-devolutions-serv-777c618c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8312%3A%20CWE-833%3A%20Deadlock%20in%20Devolutions%20Server&amp;severity=high&amp;id=688a45bdad5a09ad00aad1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8353-cwe-446-ui-discrepancy-for-security--9d7cc4db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8353%3A%20CWE-446%3A%20UI%20Discrepancy%20for%20Security%20Feature%20in%20Devolutions%20Server&amp;severity=medium&amp;id=688a45bdad5a09ad00aad1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54656-cwe-117-improper-output-neutralizat-75ade675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54656%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Apache%20Software%20Foundation%20Apache%20Struts%20Extras&amp;severity=medium&amp;id=688a4228ad5a09ad00a927f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2593-loop-with-unreachable-exit-condition-7e73c825</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2593%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)&amp;severity=medium&amp;id=691f519438b88f02b51baac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spear-phishing-campaign-delivers-vip-keylogger-via-a6189621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spear%20Phishing%20Campaign%20Delivers%20VIP%20Keylogger%20via%20Email%20Attachment&amp;severity=medium&amp;id=688a379bad5a09ad00a8807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lnk-trojan-delivers-remcos-d99c2944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LNK%20Trojan%20delivers%20REMCOS&amp;severity=medium&amp;id=688a3427ad5a09ad00a86d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-dahua-camera-flaws-enable-remote-hijack-v-7a5afc74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Dahua%20Camera%20Flaws%20Enable%20Remote%20Hijack%20via%20ONVIF%20and%20File%20Upload%20Exploits&amp;severity=critical&amp;id=688a3417ad5a09ad00a86d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-attacks-leverage-accounts-on-popular-onli-819130d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20attacks%20leverage%20accounts%20on%20popular%20online%20platforms%20as%20C2%20servers&amp;severity=medium&amp;id=688a3096ad5a09ad00a85234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunra-ransomware-group-unveils-efficient-linux-var-1ae2ff35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gunra%20Ransomware%20Group%20Unveils%20Efficient%20Linux%20Variant&amp;severity=medium&amp;id=688a3096ad5a09ad00a85247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54573-cwe-287-improper-authentication-in--3cc65262</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54573%3A%20CWE-287%3A%20Improper%20Authentication%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=688a3097ad5a09ad00a852b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43018-cwe-200-exposure-of-sensitive-infor-46d6470c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43018%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%2C%20Inc.%20Certain%20HP%20LaserJet%20Pro%20Printers&amp;severity=medium&amp;id=688a3097ad5a09ad00a852af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53944-cwe-285-improper-authorization-in-s-d9467dae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53944%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Significant-Gravitas%20AutoGPT&amp;severity=high&amp;id=688a3097ad5a09ad00a852b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46811-cwe-306-missing-authentication-for--99d6679a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46811%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SUSE%20Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.5.7.30.1&amp;severity=critical&amp;id=688a2d10ad5a09ad00a699a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53357-cwe-639-authorization-bypass-throug-d3d204d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53357%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2d10ad5a09ad00a699b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53113-cwe-284-improper-access-control-in--89680f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53113%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=low&amp;id=688a2d10ad5a09ad00a699b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53112-cwe-284-improper-access-control-in--f030ca41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53112%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2d10ad5a09ad00a699ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53111-cwe-284-improper-access-control-in--74d27c50</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53111%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2d10ad5a09ad00a699ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53008-cwe-522-insufficiently-protected-cr-7f270ce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53008%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2991ad5a09ad00a671b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52897-cwe-80-improper-neutralization-of-s-ba89882b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52897%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=688a2991ad5a09ad00a671af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52567-cwe-918-server-side-request-forgery-40132ea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52567%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=low&amp;id=688a2991ad5a09ad00a671ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54572-cwe-400-uncontrolled-resource-consu-bc79a718</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54572%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SAML-Toolkits%20ruby-saml&amp;severity=medium&amp;id=688a2991ad5a09ad00a671b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54430-cwe-78-improper-neutralization-of-s-d156be7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54430%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20dedupeio%20dedupe&amp;severity=critical&amp;id=688a2609ad5a09ad00a65510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54425-cwe-200-exposure-of-sensitive-infor-32acc31c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54425%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=688a2609ad5a09ad00a65514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inc-ransomware-claims-12tb-data-breach-at-dollar-t-488449ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inc%20Ransomware%20Claims%201.2TB%20Data%20Breach%20at%20Dollar%20Tree&amp;severity=high&amp;id=688a1f00ad5a09ad00a5da70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8326-sql-injection-in-code-projects-exam--46a19b5d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8326%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=688a1b7cad5a09ad00a5b343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47001-cross-site-scripting-stored-xss-cwe-8eb55880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47001%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=688a1b7cad5a09ad00a5b340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-patches-safari-vulnerability-also-exploited--986481a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Patches%20Safari%20Vulnerability%20Also%20Exploited%20as%20Zero-Day%20in%20Google%20Chrome&amp;severity=critical&amp;id=688a17f6ad5a09ad00a3f907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-firms-linked-to-silk-typhoon-filed-15-pate-d39b7b54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Firms%20Linked%20to%20Silk%20Typhoon%20Filed%2015%2B%20Patents%20for%20Cyber%20Espionage%20Tools&amp;severity=high&amp;id=688a17f6ad5a09ad00a3f90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-hacker-arrests-halt-attacks-but-c-e653e808</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Hacker%20Arrests%20Halt%20Attacks%2C%20But%20Copycat%20Threats%20Sustain%20Security%20Pressure&amp;severity=high&amp;id=688a0661ad5a09ad00a02a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-20-btc-from-chaos-ransomware-affiliate--c7d98765</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%2020%20BTC%20from%20Chaos%20Ransomware%20affiliate%20targeting%20Texas%20firms&amp;severity=medium&amp;id=688a0661ad5a09ad00a02a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-behind-more-than-724-million-in-crypto-th-2d5ca836</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrickBot%20Behind%20More%20Than%20%24724%20Million%20in%20Crypto%20Theft%20and%20Extortion%20to%20Date&amp;severity=medium&amp;id=688a02dcad5a09ad00a01630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-sap-flaw-exploited-to-launch-auto-color-m-84a6c946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20SAP%20flaw%20exploited%20to%20launch%20Auto-Color%20Malware%20attack%20on%20U.S.%20company&amp;severity=critical&amp;id=6889e6bdad5a09ad009ca12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6348-cwe-89-improper-neutralization-of-sp-0eacb27a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6348%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=6889d8aead5a09ad009c39cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1394-cwe-252-unchecked-return-value-in-si-1e944092</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1394%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20silabs.com%20Zigbee%20Stack&amp;severity=medium&amp;id=6889d52dad5a09ad009905ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1221-cwe-667-improper-locking-in-silabsco-fc01f957</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1221%3A%20CWE-667%20Improper%20Locking%20in%20silabs.com%20Zigbee&amp;severity=medium&amp;id=6889d52dad5a09ad009905e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-zero-days-in-abandoned-hardware-575a4f04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20zero%20days%20in%20abandoned%20hardware&amp;severity=medium&amp;id=6889caa2ad5a09ad0098b698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8323-cwe-434-unrestricted-upload-of-file--addedf32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8323%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ventem%20e-School&amp;severity=high&amp;id=688a2609ad5a09ad00a6551f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8322-cwe-862-missing-authorization-in-ven-c1e1b9bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8322%3A%20CWE-862%20Missing%20Authorization%20in%20Ventem%20e-School&amp;severity=high&amp;id=688a2609ad5a09ad00a6551b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8292-use-after-free-in-google-chrome-45af6460</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8292%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=688a3428ad5a09ad00a86dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8320-cwe-1284-improper-validation-of-spec-45201348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8320%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Tesla%20Wall%20Connector&amp;severity=high&amp;id=688972baad5a09ad00926b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8321-cwe-1328-security-version-number-mut-903274f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8321%3A%20CWE-1328%3A%20Security%20Version%20Number%20Mutable%20to%20Older%20Versions%20in%20Tesla%20Wall%20Connector&amp;severity=medium&amp;id=688972baad5a09ad00926b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4426-cwe-200-exposure-of-sensitive-inform-9799d807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Insyde%20Software%20InsydeH2O&amp;severity=medium&amp;id=688972baad5a09ad00926b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4425-cwe-121-stack-based-buffer-overflow--2916afbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4425%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=688972baad5a09ad00926b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4424-cwe-20-improper-input-validation-in--00d6289e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4424%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Insyde%20Software%20InsydeH2O&amp;severity=medium&amp;id=688972b9ad5a09ad00926b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4423-cwe-119-improper-restriction-of-oper-274fbcd0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4423%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=688972b9ad5a09ad00926b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4422-cwe-787-out-of-bounds-write-in-insyd-da7062cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4422%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=688972b9ad5a09ad00926b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4421-cwe-787-out-of-bounds-write-in-insyd-21627ac2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4421%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=68896bb2ad5a09ad00925209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8217-cwe-506-embedded-malicious-code-in-a-bf0e525f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8217%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Amazon%20Q%20Developer%20VS%20Code%20Extension&amp;severity=medium&amp;id=68896bb2ad5a09ad0092520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25011-cwe-427-uncontrolled-search-path-el-20337de2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25011%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Elastic%20Beats&amp;severity=high&amp;id=68896bb2ad5a09ad00925206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0712-cwe-427-uncontrolled-search-path-ele-4c1dac67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0712%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Elastic%20APM%20Server&amp;severity=high&amp;id=68896bb2ad5a09ad00925203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-30-44011901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-30&amp;severity=medium&amp;id=688ab61dad5a09ad00b0e353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52187-na-c4be656d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52187%3A%20n%2Fa&amp;severity=high&amp;id=688a7361ad5a09ad00ae4ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51954-na-3dbf599b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51954%3A%20n%2Fa&amp;severity=medium&amp;id=688a7361ad5a09ad00ae4ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53022-na-9efb6615</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53022%3A%20n%2Fa&amp;severity=high&amp;id=688a7361ad5a09ad00ae4c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51951-na-714c698a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51951%3A%20n%2Fa&amp;severity=medium&amp;id=688a6fdcad5a09ad00ae31c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50464-na-3618f34c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50464%3A%20n%2Fa&amp;severity=medium&amp;id=688a6fdcad5a09ad00ae31c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50777-na-908c6407</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50777%3A%20n%2Fa&amp;severity=high&amp;id=688a6c58ad5a09ad00ae17a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45619-na-bd002f37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45619%3A%20n%2Fa&amp;severity=medium&amp;id=688a53bcad5a09ad00ace387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25692-na-b1c2284f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25692%3A%20n%2Fa&amp;severity=medium&amp;id=688a5038ad5a09ad00acbbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45620-na-2d674d53</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45620%3A%20n%2Fa&amp;severity=high&amp;id=688a5038ad5a09ad00acbbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25691-na-17594aee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25691%3A%20n%2Fa&amp;severity=medium&amp;id=688a5038ad5a09ad00acbbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50578-na-5028025c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50578%3A%20n%2Fa&amp;severity=critical&amp;id=688a3b20ad5a09ad00a89d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-from-pyongyang-to-your-payroll-the-rise-of-n-658a3b2b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20From%20Pyongyang%20to%20Your%20Payroll%3A%20The%20Rise%20of%20North%20Korean%20Remote%20Workers%20in%20the%20West&amp;severity=medium&amp;id=688a1b6ead5a09ad00a5ad0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43191-an-app-may-be-able-to-cause-a-denia-747f081d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43191%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43237-an-app-may-be-able-to-cause-unexpec-9c09a1d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43237%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=68896129ad5a09ad0091c5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43197-an-app-may-be-able-to-access-sensit-837e7a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43197%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43206-an-app-may-be-able-to-access-protec-a97435e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43206%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43196-an-app-may-be-able-to-gain-root-pri-4fde9ecf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43196%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68896129ad5a09ad0091c5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43265-processing-maliciously-crafted-web--dc8c3442</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43265%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Safari&amp;severity=medium&amp;id=68896129ad5a09ad0091c5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43233-a-malicious-app-acting-as-a-https-p-b42ce75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43233%3A%20A%20malicious%20app%20acting%20as%20a%20HTTPS%20proxy%20could%20get%20access%20to%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=68896129ad5a09ad0091c5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43218-processing-a-maliciously-crafted-us-5e046a43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43218%3A%20Processing%20a%20maliciously%20crafted%20USD%20file%20may%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=medium&amp;id=68896129ad5a09ad0091c5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24188-processing-maliciously-crafted-web--0738935b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24188%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43216-processing-maliciously-crafted-web--a4422208</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43216%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43186-parsing-a-file-may-lead-to-an-unexp-e9fb125e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43186%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43217-privacy-indicators-for-microphone-o-bdc6b458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43217%3A%20Privacy%20Indicators%20for%20microphone%20or%20camera%20access%20may%20not%20be%20correctly%20displayed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43276-icloud-private-relay-may-not-activa-061079e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43276%3A%20iCloud%20Private%20Relay%20may%20not%20activate%20when%20more%20than%20one%20user%20is%20logged%20in%20at%20the%20same%20time%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da8ad5a09ad0091b95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31276-remote-content-may-be-loaded-even-w-295d3777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31276%3A%20Remote%20content%20may%20be%20loaded%20even%20when%20the%20&apos;Load%20Remote%20Images&apos;%20setting%20is%20turned%20off%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43260-an-app-may-be-able-to-hijack-entitl-dd53077b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43260%3A%20An%20app%20may%20be%20able%20to%20hijack%20entitlements%20granted%20to%20other%20privileged%20apps%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43247-a-malicious-app-with-root-privilege-8e42501e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43247%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20modify%20the%20contents%20of%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43230-an-app-may-be-able-to-access-user-s-53fa5ea9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43230%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43226-processing-a-maliciously-crafted-im-39d6e678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43226%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24224-a-remote-attacker-may-be-able-to-ca-4975635d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24224%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43227-processing-maliciously-crafted-web--e86216e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43227%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20sensitive%20user%20information%20in%20Apple%20Safari&amp;severity=high&amp;id=68895da7ad5a09ad0091b8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43270-an-app-may-gain-unauthorized-access-96b27e06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43270%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Local%20Network%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da7ad5a09ad0091b946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43266-an-app-may-be-able-to-break-out-of--1d3edfe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43266%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43211-processing-web-content-may-lead-to--6c0e6bc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43211%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43250-an-app-may-be-able-to-break-out-of--389f89a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43250%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43245-an-app-may-be-able-to-access-protec-db733ed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43245%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43212-processing-maliciously-crafted-web--f818492d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43212%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43253-a-malicious-app-may-be-able-to-laun-4599d9d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43253%3A%20A%20malicious%20app%20may%20be%20able%20to%20launch%20arbitrary%20binaries%20on%20a%20trusted%20device%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43195-an-app-may-be-able-to-access-sensit-03ce0be5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43195%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43228-visiting-a-malicious-website-may-le-5946948a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43228%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da7ad5a09ad0091b8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43249-an-app-may-be-able-to-gain-root-pri-834c927f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43249%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da7ad5a09ad0091b927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43199-a-malicious-app-may-be-able-to-gain-cba7297f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43199%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43224-processing-a-maliciously-crafted-me-bacdeeff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43224%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895da7ad5a09ad0091b8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43232-an-app-may-be-able-to-bypass-certai-c570c7a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43232%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43198-an-app-may-be-able-to-access-protec-2d915268</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43198%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43209-processing-maliciously-crafted-web--0f4d79d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43209%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24119-an-app-may-be-able-to-execute-arbit-72792c9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24119%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43194-an-app-may-be-able-to-modify-protec-362755ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43194%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da6ad5a09ad0091b890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43252-a-website-may-be-able-to-access-sen-911fceaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43252%3A%20A%20website%20may%20be%20able%20to%20access%20sensitive%20user%20data%20when%20resolving%20symlinks%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43244-an-app-may-be-able-to-cause-unexpec-45fb1611</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43244%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43259-an-attacker-with-physical-access-to-f73594b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43259%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da7ad5a09ad0091b938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43275-an-app-may-be-able-to-break-out-of--3503f704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43275%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43234-processing-a-maliciously-crafted-te-2b9422cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43234%3A%20Processing%20a%20maliciously%20crafted%20texture%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895da7ad5a09ad0091b905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43185-an-app-may-be-able-to-access-protec-e36c6484</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43185%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43214-processing-maliciously-crafted-web--89839f0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43214%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31243-an-app-may-be-able-to-gain-root-pri-70136162</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31243%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31280-processing-a-maliciously-crafted-fi-22ba7203</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31280%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31278-processing-maliciously-crafted-web--668e7e41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31278%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=68895da6ad5a09ad0091b86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43215-processing-a-maliciously-crafted-im-dcb155c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43215%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895da6ad5a09ad0091b8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43188-a-malicious-app-may-be-able-to-gain-4ac5bf02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43188%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895da6ad5a09ad0091b883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8319-cwe-79-improper-neutralization-of-in-28f62853</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20Barracuda%20Barracuda%20Message%20Archiver&amp;severity=medium&amp;id=68895da8ad5a09ad0091b95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43261-an-app-may-be-able-to-break-out-of--c2e57295</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43261%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31277-processing-maliciously-crafted-web--b9ad7c9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31277%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=68895a29ad5a09ad0091ade3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43277-processing-a-maliciously-crafted-au-f1276986</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43277%3A%20Processing%20a%20maliciously%20crafted%20audio%20file%20may%20lead%20to%20memory%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895a2bad5a09ad0091ae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43220-an-app-may-be-able-to-access-protec-f9782dd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43220%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43241-an-app-may-be-able-to-read-files-ou-6c53d37c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43241%3A%20An%20app%20may%20be%20able%20to%20read%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43240-a-downloads-origin-may-be-incorrect-5255373e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43240%3A%20A%20download&apos;s%20origin%20may%20be%20incorrectly%20associated%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43256-an-app-may-be-able-to-gain-root-pri-628376b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43256%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43221-processing-a-maliciously-crafted-me-2d8bd12a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43221%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43251-a-local-attacker-may-gain-access-to-3d5975c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43251%3A%20A%20local%20attacker%20may%20gain%20access%20to%20Keychain%20items%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43267-an-app-may-be-able-to-access-sensit-1a28271e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43267%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43246-an-app-may-be-able-to-access-sensit-d71dcd9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43246%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43273-a-sandboxed-process-may-be-able-to--8c4d82d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43273%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31273-processing-maliciously-crafted-web--1c214ef7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31273%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=68895a29ad5a09ad0091add9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43225-an-app-may-be-able-to-access-sensit-93e78dd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43225%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43248-a-malicious-app-may-be-able-to-gain-4f4873fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43248%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31229-passcode-may-be-read-aloud-by-voice-37c57d55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31229%3A%20Passcode%20may%20be%20read%20aloud%20by%20VoiceOver%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091add6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43229-processing-maliciously-crafted-web--b7656a59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43229%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20universal%20cross%20site%20scripting%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43213-processing-maliciously-crafted-web--e6a4e498</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43213%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43189-a-malicious-app-may-be-able-to-read-fcd0e934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43189%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43222-an-attacker-may-be-able-to-cause-un-86698b6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43222%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31275-a-sandboxed-process-may-be-able-to--2d49cc6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31275%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20launch%20any%20installed%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a29ad5a09ad0091ade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43243-an-app-may-be-able-to-modify-protec-2ac87e31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43243%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a2aad5a09ad0091ae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43193-an-app-may-be-able-to-cause-a-denia-e1b8b47a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43193%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091ae03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31279-an-app-may-be-able-to-fingerprint-t-1ae6dc2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31279%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43239-processing-a-maliciously-crafted-fi-8991fa55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43239%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31281-processing-a-maliciously-crafted-fi-6cbfec0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31281%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43192-account-driven-user-enrollment-may--42e6046b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43192%3A%20Account-driven%20User%20Enrollment%20may%20still%20be%20possible%20with%20Lockdown%20Mode%20turned%20on%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43254-processing-a-maliciously-crafted-fi-426b1409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43254%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43184-a-shortcut-may-be-able-to-bypass-se-77c43a75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43184%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sensitive%20Shortcuts%20app%20settings%20in%20Apple%20macOS&amp;severity=critical&amp;id=68895a29ad5a09ad0091adf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43235-an-app-may-be-able-to-cause-a-denia-b197acc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43235%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2aad5a09ad0091ae3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43274-a-sandboxed-process-may-be-able-to--dd3ef74e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43274%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=medium&amp;id=68895a2bad5a09ad0091ae86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43223-a-non-privileged-user-may-be-able-t-882b27ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43223%3A%20A%20non-privileged%20user%20may%20be%20able%20to%20modify%20restricted%20network%20settings%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68895a2aad5a09ad0091ae2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/minnesota-activates-national-guard-after-st-paul-c-6f1b3828</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Minnesota%20activates%20National%20Guard%20after%20St.%20Paul%20cyberattack&amp;severity=high&amp;id=68895a1cad5a09ad0091adbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54126-cwe-668-exposure-of-resource-to-wro-07c40f92</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54126%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=medium&amp;id=68894505ad5a09ad00916e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7849-cwe-1285-in-ni-labview-1ad89ef9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7849%3A%20CWE-1285%20in%20NI%20LabVIEW&amp;severity=high&amp;id=68893dfdad5a09ad00914ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7848-cwe-1285-improper-validation-of-spec-af09917a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7848%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20NI%20LabVIEW&amp;severity=high&amp;id=68893dfdad5a09ad00914ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7361-cwe-94-improper-control-of-generatio-f43cca86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7361%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NI%20LabVIEW&amp;severity=high&amp;id=68893dfdad5a09ad00914ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4674-cwe-73-external-control-of-file-name-ee3447bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4674%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Go%20toolchain%20cmd%2Fgo&amp;severity=high&amp;id=68893dfdad5a09ad00914ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amazon-q-now-with-helpful-ai-powered-self-destruct-3705db49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amazon%20Q%3A%20Now%20with%20Helpful%20AI-Powered%20Self-Destruct%20Capabilities&amp;severity=medium&amp;id=68893e01ad5a09ad00914ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40600-cwe-134-use-of-externally-controlle-f123dc6c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40600%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20SonicWall%20SonicOS&amp;severity=critical&amp;id=68893dfdad5a09ad00914ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5684-cwe-79-improper-neutralization-of-in-2007742b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=medium&amp;id=68892561ad5a09ad00908c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53902-cwe-863-incorrect-authorization-in--874fc1dc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53902%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=68892561ad5a09ad00908c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53541-cwe-79-improper-neutralization-of-i-5c19503c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53541%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=688921ddad5a09ad008fc735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52899-cwe-204-observable-response-discrep-59af2f86</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52899%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=688921ddad5a09ad008fc72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seizes-24m-in-bitcoin-from-new-chaos-ransomwar-4248acca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seizes%20%242.4M%20in%20Bitcoin%20from%20new%20Chaos%20ransomware%20operation&amp;severity=high&amp;id=68891750ad5a09ad008f93e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/french-telecom-giant-orange-discloses-cyberattack-b31a25e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=French%20telecom%20giant%20Orange%20discloses%20cyberattack&amp;severity=high&amp;id=68891750ad5a09ad008f93e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wiz-uncovers-critical-access-bypass-flaw-in-ai-pow-53db7f28</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wiz%20Uncovers%20Critical%20Access%20Bypass%20Flaw%20in%20AI-Powered%20Vibe%20Coding%20Platform%20Base44&amp;severity=critical&amp;id=68891750ad5a09ad008f93e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33114-cwe-943-improper-neutralization-of--b080b3f6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33114%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2&amp;severity=medium&amp;id=6889176ead5a09ad008f94ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33092-cwe-121-stack-based-buffer-overflow-e33c4e5a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33092%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2&amp;severity=high&amp;id=6889176ead5a09ad008f94aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36071-cwe-772-missing-release-of-resource-20858afc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36071%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20IBM%20IBM%20Db2&amp;severity=medium&amp;id=6889176ead5a09ad008f94b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36010-cwe-833-deadlock-in-ibm-db2-968d43d3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36010%3A%20CWE-833%20Deadlock%20in%20IBM%20Db2&amp;severity=medium&amp;id=68891048ad5a09ad008f649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53715-cwe-119-improper-restriction-of-ope-2de44f75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53715%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53714-cwe-119-improper-restriction-of-ope-19edc753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53714%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53713-cwe-120-buffer-copy-without-checkin-1b5ca5dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53713%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53712-cwe-120-buffer-copy-without-checkin-b129e199</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53712%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20V11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7675-cwe-787-out-of-bounds-write-in-autod-e700c2d9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7675%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53711-cwe-120-buffer-copy-without-checkin-e49a48c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53711%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR841N%20v11&amp;severity=medium&amp;id=68890cc5ad5a09ad008f5cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7497-cwe-787-out-of-bounds-write-in-autod-972be439</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7497%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6637-cwe-787-out-of-bounds-write-in-autod-bd8ab68e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6637%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6636-cwe-416-use-after-free-in-autodesk-s-f8179348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6636%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6635-cwe-125-out-of-bounds-read-in-autode-baa669f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6635%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6631-cwe-787-out-of-bounds-write-in-autod-54c11733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6631%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5043-cwe-122-heap-based-buffer-overflow-i-a85040aa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5043%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5038-cwe-120-buffer-copy-without-checking-8b45346b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5038%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Shared%20Components&amp;severity=high&amp;id=68890cc5ad5a09ad008f5d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2928-improper-neutralization-of-special-e-5745e8b9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Genetec%20Inc.%20Genetec%20Security%20Center&amp;severity=high&amp;id=68890941ad5a09ad008f4e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2533-cwe-789-uncontrolled-memory-allocati-1c83289f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2533%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%20Db2&amp;severity=medium&amp;id=68890940ad5a09ad008f4e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27514-cwe-80-improper-neutralization-of-s-38307965</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27514%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=68890940ad5a09ad008f4e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-choicejacking-attack-steals-data-from-phones-v-98ce7ed3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Choicejacking%20Attack%20Steals%20Data%20from%20Phones%20via%20Public%20Chargers&amp;severity=medium&amp;id=688905bbad5a09ad008f3a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2179-cwe-266-incorrect-privilege-assignme-7c6ae2fe</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2179%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=688905c6ad5a09ad008f3af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5922-cwe-522-insufficiently-protected-cre-fb68b0bb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5922%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20TSplus%20TSplus%20Remote%20Access&amp;severity=medium&amp;id=6888feb4ad5a09ad008eef18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31965-cwe-305-authentication-bypass-by-pr-81c6efa4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31965%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20HCL%20Software%20BigFix%20Remote%20Control&amp;severity=high&amp;id=6888feb4ad5a09ad008eef11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-react-didnt-kill-xss-the-new-javascript-inject-10d28079</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20React%20Didn&apos;t%20Kill%20XSS%3A%20The%20New%20JavaScript%20Injection%20Playbook&amp;severity=high&amp;id=6888e293ad5a09ad008e6efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-use-fake-apps-to-steal-data-and-bla-59ccd000</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Use%20Fake%20Apps%20to%20Steal%20Data%20and%20Blackmail%20Users%20Across%20Asia%E2%80%99s%20Mobile%20Networks&amp;severity=high&amp;id=6888e293ad5a09ad008e6f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sap-netweaver-vulnerability-used-in-first-auto-col-854c2568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SAP%20NetWeaver%20Vulnerability%20Used%20in%20First%20Auto-Color%20Malware%20Attack%20on%20US%20Firm&amp;severity=medium&amp;id=6888d0fdad5a09ad008e0de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6505-unauthorized-access-and-impersonatio-2498b9fd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6505%3A%20Unauthorized%20Access%20and%20Impersonation%20in%20Progress%20Software%20Hybrid%20Data%20Pipeline&amp;severity=high&amp;id=6888c9f6ad5a09ad008de59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6504-unauthorized-access-to-sensitive-res-5f4645d8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6504%3A%20Unauthorized%20Access%20to%20Sensitive%20resources%20in%20Progress%20Software%20Hybrid%20Data%20Pipeline&amp;severity=high&amp;id=6888c9f6ad5a09ad008de597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54422-cwe-312-cleartext-storage-of-sensit-95712eba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54422%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20sandboxie-plus%20Sandboxie&amp;severity=medium&amp;id=6888c9f6ad5a09ad008de592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-ukraine-hacktivists-claim-cyberattack-on-russi-7de26118</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Ukraine%20hacktivists%20claim%20cyberattack%20on%20Russian%20Airline%20Aeroflot%20that%20caused%20the%20cancellation%20of%20%2B100%20flights&amp;severity=medium&amp;id=6888c2edad5a09ad008dbfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aeroflot-hacked-schneier-on-security-793aee4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aeroflot%20Hacked%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6888c2edad5a09ad008dbfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attacking-genai-applications-and-llms-sometimes-al-614a6c14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attacking%20GenAI%20applications%20and%20LLMs%20-%20Sometimes%20all%20it%20takes%20is%20to%20ask%20nicely!&amp;severity=medium&amp;id=6888bf6cad5a09ad008dac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6060-cwe-79-improper-neutralization-of-in-95c39006</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DECE%20Software%20Geodi&amp;severity=medium&amp;id=6888c301ad5a09ad008dc307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41241-cwe-754-improper-check-for-unusual--dfa82d21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41241%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20VMware%20vCenter&amp;severity=medium&amp;id=6888c301ad5a09ad008dc304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6175-cwe-93-improper-neutralization-of-cr-0882199b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6175%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20DECE%20Software%20Geodi&amp;severity=high&amp;id=6888c301ad5a09ad008dc30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5587-cwe-79-improper-neutralization-of-in-e903466c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Appzend&amp;severity=medium&amp;id=6888b159ad5a09ad008d61d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lovense-sex-toy-app-flaw-leaks-private-user-email--ebc14a7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lovense%20sex%20toy%20app%20flaw%20leaks%20private%20user%20email%20addresses&amp;severity=high&amp;id=688898bfad5a09ad008cd7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-papercut-ngmf-csrf-vulnerability-to-kev--2e0722b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20PaperCut%20NG%2FMF%20CSRF%20Vulnerability%20to%20KEV%20Catalog%20Amid%20Active%20Exploitation&amp;severity=high&amp;id=688898bfad5a09ad008cd7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seychelles-commercial-bank-reported-cybersecurity--d37bb117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Seychelles%20Commercial%20Bank%20Reported%20Cybersecurity%20Incident&amp;severity=high&amp;id=688898bfad5a09ad008cd7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6692-cwe-79-improper-neutralization-of-in-a983146b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanucodes%20YouTube%20Embed%20%E2%80%93%20YouTube%20Gallery%2C%20Vimeo%20Gallery%20%E2%80%93%20WordPress%20Plugin&amp;severity=medium&amp;id=68889537ad5a09ad008cc7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7689-cwe-862-missing-authorization-in-the-21d79579</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7689%3A%20CWE-862%20Missing%20Authorization%20in%20themefic%20Hydra%20Booking%20%E2%80%93%20All%20in%20One%20Appointment%20Booking%20System%20%7C%20Appointment%20Scheduling%2C%20Booking%20Calendar%20%26%20WooCommerce%20Bookings&amp;severity=high&amp;id=68889537ad5a09ad008cc7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6681-cwe-79-improper-neutralization-of-in-eb9d26d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delower186%20Fan%20Page&amp;severity=medium&amp;id=68889537ad5a09ad008cc7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8196-cwe-79-improper-neutralization-of-in-84396929</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Addons%20For%20Elementor%20(%20Header%20Footer%20Builder%2C%20Free%20Elementor%20Widgets%2C%20Elementor%20Templates%20Library%20)&amp;severity=medium&amp;id=68889537ad5a09ad008cc7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6730-cwe-862-missing-authorization-in-ama-ae1749af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6730%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20Bonanza%20%E2%80%93%20WooCommerce%20Free%20Gifts%20Lite&amp;severity=medium&amp;id=68889537ad5a09ad008cc7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8216-cwe-79-improper-neutralization-of-in-abd194d3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowdevs%20Sky%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20Widgets%20%26%20Templates&amp;severity=medium&amp;id=68889537ad5a09ad008cc7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/struts-devmode-in-2025-critical-pre-auth-vulnerabi-e312fdfb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Struts%20Devmode%20in%202025%3F%20Critical%20Pre-Auth%20Vulnerabilities%20in%20Adobe%20Experience%20Manager%20Forms&amp;severity=critical&amp;id=6888872aad5a09ad008c704f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-gemini-ai-cli-hijack-code-execution-through-10658cfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Gemini%20AI%20CLI%20Hijack%20-%20Code%20Execution%20Through%20Deception&amp;severity=medium&amp;id=688883a5ad5a09ad008c45f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26400-cwe-611-improper-restriction-of-xml-ef4904a3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26400%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=medium&amp;id=688883a3ad5a09ad008c45e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53082-cwe-23-relative-path-traversal-in-s-22e03448</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53082%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=medium&amp;id=68885cf7ad5a09ad008b57f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53081-cwe-22-improper-limitation-of-a-pat-13c39280</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53081%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=medium&amp;id=68885cf7ad5a09ad008b57ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53080-cwe-22-improper-limitation-of-a-pat-1436dcf9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53080%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=high&amp;id=68885973ad5a09ad008b437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53079-cwe-36-absolute-path-traversal-in-s-77503fb5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53079%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=medium&amp;id=68885973ad5a09ad008b437a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53078-cwe-502-deserialization-of-untruste-5bb31e7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53078%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Samsung%20Electronics%20Data%20Management%20Server&amp;severity=high&amp;id=68885973ad5a09ad008b4377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53077-cwe-698-execution-after-redirect-ea-dc947bfd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53077%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20Samsung%20Electronics%20DMS(Data%20Management%20Server)&amp;severity=medium&amp;id=68885973ad5a09ad008b4374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8264-sql-injection-in-z-pushz-push-dev-7a3ed000</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8264%3A%20SQL%20Injection%20in%20z-push%2Fz-push-dev&amp;severity=critical&amp;id=68885973ad5a09ad008b4380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53649-insertion-of-sensitive-information--18e0bee5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53649%3A%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20SwitchBot%20SwitchBot%20App%20for%20iOS%2FAndroid&amp;severity=medium&amp;id=688855efad5a09ad008b38e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4370-cwe-862-missing-authorization-in-the-804ce41e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4370%3A%20CWE-862%20Missing%20Authorization%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=68884ee8ad5a09ad008b0616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4566-cwe-79-improper-neutralization-of-in-83f43ca7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4566%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=68884ee8ad5a09ad008b061b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3075-cwe-79-improper-neutralization-of-in-9327077a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3075%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=68884ee8ad5a09ad008b0612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6495-cwe-89-improper-neutralization-of-sp-228df740</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bricks%20Builder%20Bricks&amp;severity=high&amp;id=68884ee8ad5a09ad008b0621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7811-cwe-79-improper-neutralization-of-in-849352cc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20YouTube%20Integration&amp;severity=medium&amp;id=68884b63ad5a09ad008aed54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7809-cwe-79-improper-neutralization-of-in-fff365e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Twitch%20Integration&amp;severity=medium&amp;id=68884b63ad5a09ad008aed4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7810-cwe-79-improper-neutralization-of-in-f0718432</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=68884b63ad5a09ad008aed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-29-7321fe28</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-29&amp;severity=medium&amp;id=6889649cad5a09ad0091e9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52490-na-b58e5dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52490%3A%20n%2Fa&amp;severity=high&amp;id=68892c6fad5a09ad0090e08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45346-na-09d129a3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45346%3A%20n%2Fa&amp;severity=high&amp;id=68892561ad5a09ad00908c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51045-na-1f000cd2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51045%3A%20n%2Fa&amp;severity=medium&amp;id=6889176ead5a09ad008f94b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51044-na-e6982bb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51044%3A%20n%2Fa&amp;severity=medium&amp;id=6889176ead5a09ad008f94b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52284-na-dfcd0a77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52284%3A%20n%2Fa&amp;severity=medium&amp;id=68890941ad5a09ad008f4e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44137-na-fa26b2b8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44137%3A%20n%2Fa&amp;severity=high&amp;id=68890237ad5a09ad008ef5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44136-na-72fd0b58</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44136%3A%20n%2Fa&amp;severity=critical&amp;id=6888feb4ad5a09ad008eef14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28170-na-cfc0485d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28170%3A%20n%2Fa&amp;severity=high&amp;id=6888feb4ad5a09ad008eef0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28171-na-e144075e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28171%3A%20n%2Fa&amp;severity=medium&amp;id=6888ed23ad5a09ad008ea7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28172-na-7684e85c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28172%3A%20n%2Fa&amp;severity=medium&amp;id=6888e618ad5a09ad008e7cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51970-na-88c4791f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51970%3A%20n%2Fa&amp;severity=high&amp;id=6888e2aaad5a09ad008e6f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46059-na-21a19291</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46059%3A%20n%2Fa&amp;severity=critical&amp;id=6888df0ead5a09ad008e5f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50738-na-409cd627</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50738%3A%20n%2Fa&amp;severity=critical&amp;id=6888d806ad5a09ad008e3c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52358-na-5cb21334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52358%3A%20n%2Fa&amp;severity=medium&amp;id=6888d10fad5a09ad008e140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54769-cwe-24-path-traversal-filedir-in-xo-24e0f7f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54769%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Xorux%20LPAR2RRD&amp;severity=high&amp;id=68880c1bad5a09ad008855e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54768-cwe-648-incorrect-use-of-privileged-29472f3e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54768%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20LPAR2RRD&amp;severity=medium&amp;id=68880c1bad5a09ad008855f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54767-cwe-648-incorrect-use-of-privileged-8a3373bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54767%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20LPAR2RRD&amp;severity=medium&amp;id=68880c1bad5a09ad008855ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54765-cwe-648-incorrect-use-of-privileged-674561ac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54765%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20XorMon-NG&amp;severity=medium&amp;id=68880c1bad5a09ad008855ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54766-cwe-648-incorrect-use-of-privileged-dcb7815a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54766%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Xorux%20XorMon-NG&amp;severity=medium&amp;id=68880897ad5a09ad00884acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-group-ransomware-claims-breach-of-media-gia-362d328d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GLOBAL%20GROUP%20Ransomware%20Claims%20Breach%20of%20Media%20Giant%20Albavisi%C3%B3n&amp;severity=high&amp;id=6887f37ead5a09ad0087c10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54429-cwe-704-incorrect-type-conversion-o-19a45c63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54429%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20polkadot-evm%20frontier&amp;severity=medium&amp;id=6887e1ecad5a09ad0087279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54428-cwe-522-insufficiently-protected-cr-d4d89600</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54428%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20musombi123%20RevelaCode-Backend&amp;severity=critical&amp;id=6887de68ad5a09ad00871937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54427-cwe-682-incorrect-calculation-in-po-e5513153</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54427%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20polkadot-evm%20frontier&amp;severity=medium&amp;id=6887de68ad5a09ad00871932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54426-cwe-327-use-of-a-broken-or-risky-cr-3ff1c747</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54426%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20polkadot-evm%20frontier&amp;severity=critical&amp;id=6887de68ad5a09ad0087193b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54423-cwe-79-improper-neutralization-of-i-92c9550c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54423%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%209001%20copyparty&amp;severity=medium&amp;id=6887d760ad5a09ad0086e271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-launching-ransomware-on-hijacked--97255fc9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Launching%20Ransomware%20on%20Hijacked%20VMware%20Systems%2C%20Warns%20Google&amp;severity=medium&amp;id=6887c5caad5a09ad008660c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8194-cwe-835-loop-with-unreachable-exit-c-5566a6f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8194%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=6887c950ad5a09ad00867b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8283-external-control-of-system-or-config-f890fce3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8283%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting&amp;severity=low&amp;id=6887c247ad5a09ad00864a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-sploitlight-vulnerability-exposes-apple-inte-c3eff6a3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20Sploitlight%20Vulnerability%20Exposes%20Apple%20Intelligence-Cached%20Data%20to%20Attackers%2C%20Microsoft&amp;severity=medium&amp;id=6887bb43ad5a09ad00860905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43023-cwe-347-improper-verification-of-cr-39b213d1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43023%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20HP%2C%20Inc.%20HP%20Linux%20Imaging%20and%20Printing%20Software&amp;severity=medium&amp;id=6887bb4dad5a09ad0086092d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54299-cwe-79-improper-neutralization-of-i-28a0d8da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nobossextensions.com%20No%20Boss%20Testimonials%20component%20for%20Joomla&amp;severity=critical&amp;id=6887b7bcad5a09ad0085f541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54298-cwe-79-improper-neutralization-of-i-f4298df0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54298%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20firecoders.com%20CommentBox%20component%20for%20Joomla&amp;severity=critical&amp;id=6887b7bcad5a09ad0085f53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-purple-team-approach-on-badsuccessor-d65a5d10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20purple%20team%20approach%20on%20BadSuccessor&amp;severity=medium&amp;id=6887b439ad5a09ad0085e692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/post-smtp-plugin-flaw-allowed-subscribers-to-take--e4f938e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Post%20SMTP%20Plugin%20Flaw%20Allowed%20Subscribers%20to%20Take%20Over%20Admin%20Accounts&amp;severity=medium&amp;id=6887a9a9ad5a09ad00855425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7676-cwe-427-uncontrolled-search-path-ele-1d9d2064</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7676%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%2C%20Inc%20Windows%2011&amp;severity=medium&amp;id=6887a9b7ad5a09ad00855475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54538-cwe-312-in-jetbrains-teamcity-8c0c9f7a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54538%3A%20CWE-312%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54537-cwe-312-in-jetbrains-teamcity-d51a8808</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54537%3A%20CWE-312%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54536-cwe-352-in-jetbrains-teamcity-0af31a95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54536%3A%20CWE-352%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54535-cwe-328-in-jetbrains-teamcity-f2011e94</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54535%3A%20CWE-328%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54534-cwe-79-in-jetbrains-teamcity-bb4300ec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54534%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54533-cwe-863-in-jetbrains-teamcity-55eec73b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54533%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54532-cwe-863-in-jetbrains-teamcity-22b7c506</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54532%3A%20CWE-863%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54531-cwe-23-in-jetbrains-teamcity-37b087c6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54531%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=6887a62bad5a09ad008544d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54530-cwe-276-in-jetbrains-teamcity-e587944e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54530%3A%20CWE-276%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=6887a62bad5a09ad008544d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54529-cwe-352-in-jetbrains-teamcity-e07b0d17</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54529%3A%20CWE-352%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=6887a62bad5a09ad008544d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54528-cwe-352-in-jetbrains-teamcity-66851a37</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54528%3A%20CWE-352%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=6887a62bad5a09ad008544d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54527-cwe-1021-in-jetbrains-youtrack-6d0d6634</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54527%3A%20CWE-1021%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=6887a62bad5a09ad008544cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6250-cwe-424-in-beyondtrust-privilege-man-a5be9b0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6250%3A%20CWE-424%20in%20BeyondTrust%20Privilege%20Management%20for%20Windows&amp;severity=high&amp;id=68879b9aad5a09ad0084eb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2297-cwe-268-in-beyondtrust-privilege-man-0934ef3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2297%3A%20CWE-268%20in%20BeyondTrust%20Privilege%20Management%20for%20Windows&amp;severity=high&amp;id=68879b9aad5a09ad0084eb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53696-cwe-494-download-of-code-without-in-2b89df7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53696%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Johnson%20Controls%2C%20Inc%20iSTAR%20Ultra&amp;severity=critical&amp;id=68878d8aad5a09ad008474ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53695-cwe-78-improper-neutralization-of-s-bd4554a1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53695%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Johnson%20Controls%2C%20Inc%20iSTAR%20Ultra&amp;severity=critical&amp;id=68878682ad5a09ad00842ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8279-cwe-306-missing-authentication-for-c-2a8ee878</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8279%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20GitLab%20GitLab%20Language%20Server&amp;severity=high&amp;id=68878682ad5a09ad00842ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26469-cwe-732-incorrect-permission-assign-a31399c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26469%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=6887910fad5a09ad0084b289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27724-cwe-284-improper-access-control-in--f2d6da0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27724%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=critical&amp;id=6887910fad5a09ad0084b28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32731-cwe-79-improper-neutralization-of-i-f43df137</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32731%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=6887910fad5a09ad0084b28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24485-cwe-918-server-side-request-forgery-6f1e8896</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24485%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20MedDream%20MedDream%20PACS%20Premium&amp;severity=medium&amp;id=6887910fad5a09ad0084b286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4056-improper-control-of-generation-of-co-01f11039</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4056%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=688774f0ad5a09ad0083c0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badsuccessor-purple-team-3e0bfdcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadSuccessor%20%E2%80%93%20Purple%20Team&amp;severity=medium&amp;id=68876de7ad5a09ad008375e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8275-improper-export-of-android-applicati-cb1058a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8275%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20bsc%20Peru%20Cocktails%20App&amp;severity=medium&amp;id=68876a67ad5a09ad008330c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tea-app-breach-women-only-dating-platform-leaks-72-2a6670ef</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tea%20App%20Breach%3A%20Women%20Only%20Dating%20Platform%20Leaks%2072%2C000%20User%20Images&amp;severity=high&amp;id=6887635dad5a09ad0082e878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8274-sql-injection-in-campcodes-online-re-773a722f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8274%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=6887636aad5a09ad0082e8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5997-cwe-648-incorrect-use-of-privileged--d1827f23</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5997%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Beamsec%20PhishPro&amp;severity=high&amp;id=68875fd9ad5a09ad0082bcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6918-cwe-89-improper-neutralization-of-sp-d4c9540e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6918%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ncvav%20Virtual%20PBX%20Software&amp;severity=critical&amp;id=68875c52ad5a09ad008291a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8273-sql-injection-in-code-projects-exam--d28aca87</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8273%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68875c52ad5a09ad008291ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-group-fire-ant-exploits-vmware-and-f5-a0521bd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20group%20Fire%20Ant%20exploits%20VMware%20and%20F5%20flaws%20since%20early%202025&amp;severity=medium&amp;id=688758cdad5a09ad0082729d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8272-sql-injection-in-code-projects-exam--9bdaec08</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8272%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68875549ad5a09ad00825f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40730-cwe-79-improper-neutralization-of-i-9a59521e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vox%20Media%20Chorus%20CMS&amp;severity=medium&amp;id=68875549ad5a09ad00825f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-iso-file-used-in-romance-scam-targeting--3af3feec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20ISO%20File%20Used%20in%20Romance%20Scam%20Targeting%20German%20Speakers&amp;severity=medium&amp;id=688751c4ad5a09ad0082476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8271-sql-injection-in-code-projects-exam--929b597d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8271%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68874e41ad5a09ad00823ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-flaws-in-niagara-framework-threaten-smart-91cdf2c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Flaws%20in%20Niagara%20Framework%20Threaten%20Smart%20Buildings%20and%20Industrial%20Systems%20Worldwide&amp;severity=critical&amp;id=68874738ad5a09ad0082170a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-hijacks-vmware-esxi-to-deploy-ran-43db9797</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Hijacks%20VMware%20ESXi%20to%20Deploy%20Ransomware%20on%20Critical%20U.S.%20Infrastructure&amp;severity=critical&amp;id=68874738ad5a09ad00821705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8270-sql-injection-in-code-projects-exam--e7be6fc3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8270%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6887474fad5a09ad00821772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8269-sql-injection-in-code-projects-exam--4a4f6b26</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8269%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68874030ad5a09ad0081c5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27802-cwe-79-improper-neutralization-of-i-a18f96be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Optimizely%20Episerver%20Content%20Management%20System%20(CMS)&amp;severity=medium&amp;id=68873cacad5a09ad00819c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27801-cwe-79-improper-neutralization-of-i-184687f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Optimizely%20Episerver%20Content%20Management%20System%20(CMS)&amp;severity=medium&amp;id=68873928ad5a09ad008166a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27800-cwe-79-improper-neutralization-of-i-84cea1ac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Optimizely%20Episerver%20Content%20Management%20System%20(CMS)&amp;severity=medium&amp;id=68873928ad5a09ad008166a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8266-deserialization-in-yanyutao0402-chan-a8f1ca01</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8266%3A%20Deserialization%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68873928ad5a09ad008166ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8265-unrestricted-upload-in-299ko-cms-2df55a35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8265%3A%20Unrestricted%20Upload%20in%20299Ko%20CMS&amp;severity=medium&amp;id=68873220ad5a09ad008130c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8263-inefficient-regular-expression-compl-1f8d84dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8263&amp;severity=null&amp;id=68872b18ad5a09ad00810e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8262-inefficient-regular-expression-compl-da5173e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8262%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20yarnpkg%20Yarn&amp;severity=medium&amp;id=6887b438ad5a09ad0085e685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8261-improper-authorization-in-vaelsys-bb979a41</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8261%3A%20Improper%20Authorization%20in%20Vaelsys&amp;severity=medium&amp;id=68871d08ad5a09ad0080b9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8260-use-of-weak-hash-in-vaelsys-d879cc69</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8260%3A%20Use%20of%20Weak%20Hash%20in%20Vaelsys&amp;severity=low&amp;id=68871600ad5a09ad00808664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8259-os-command-injection-in-vaelsys-a7b0b602</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8259%3A%20OS%20Command%20Injection%20in%20Vaelsys&amp;severity=medium&amp;id=68870ef8ad5a09ad008008de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8258-improper-export-of-android-applicati-c27ff97c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8258%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Cool%20Mo%20Maigcal%20Number%20App&amp;severity=medium&amp;id=688707f0ad5a09ad007f3fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8267-server-side-request-forgery-ssrf-in--330d2ac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8267%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ssrfcheck&amp;severity=high&amp;id=688707f0ad5a09ad007f3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8257-improper-export-of-android-applicati-7eabcce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8257%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Lobby%20Universe%20Lobby%20App&amp;severity=medium&amp;id=688700f4ad5a09ad007ef7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8256-unrestricted-upload-in-code-projects-5fbe092c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8256%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886fd72ad5a09ad007ee002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8255-unrestricted-upload-in-code-projects-3717395c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8255%3A%20Unrestricted%20Upload%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886f65cad5a09ad007af1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8254-sql-injection-in-campcodes-courier-m-98009116</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8254%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6886ef54ad5a09ad0079e53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8253-sql-injection-in-code-projects-exam--f1361077</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8253%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886e4c8ad5a09ad00796c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8252-sql-injection-in-code-projects-exam--a27748c2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8252%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886e4c8ad5a09ad00796c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8251-sql-injection-in-code-projects-exam--5c1a32b9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8251%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886da3cad5a09ad0079428a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8250-sql-injection-in-code-projects-exam--3bbf0302</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8250%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886cfb0ad5a09ad00785a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8249-sql-injection-in-code-projects-exam--5209ffb4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8249%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886c8a8ad5a09ad00783424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8248-sql-injection-in-code-projects-onlin-5cf64fed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8248%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886c8a8ad5a09ad0078341d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xlight-ftp-11-denial-of-service-dos-59adebff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Xlight%20FTP%201.1%20-%20Denial%20Of%20Service%20(DOS)&amp;severity=medium&amp;id=688824f4ad5a09ad0089713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invision-community-4720-calendarviewphp-sql-inject-49938314</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invision%20Community%204.7.20%20-%20(calendar%2Fview.php)%20SQL%20Injection&amp;severity=medium&amp;id=688824f4ad5a09ad00897139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xwiki-14-sql-injection-via-getdeleteddocumentsvm-f9720dfb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XWiki%2014%20-%20SQL%20Injection%20via%20getdeleteddocuments.vm&amp;severity=medium&amp;id=688824f4ad5a09ad00897134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mezzanine-cms-610-stored-cross-site-scripting-xss-532254ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mezzanine%20CMS%206.1.0%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=688824f4ad5a09ad0089712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-pam-environment-variable-injection-local-pri-6641fce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20PAM%20Environment%20-%20Variable%20Injection%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=688824f4ad5a09ad0089712a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adobe-coldfusion-20236-remote-file-read-e0668c57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adobe%20ColdFusion%202023.6%20-%20Remote%20File%20Read&amp;severity=medium&amp;id=688824f4ad5a09ad00897125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30126-na-2fb794df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30126%3A%20n%2Fa&amp;severity=medium&amp;id=68881728ad5a09ad0088bcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-28-58cec029</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-28&amp;severity=medium&amp;id=6888131cad5a09ad00887c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50486-na-5ad85524</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50486%3A%20n%2Fa&amp;severity=high&amp;id=6887d3dcad5a09ad0086bd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50485-na-46aa98b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50485%3A%20n%2Fa&amp;severity=high&amp;id=6887d3dcad5a09ad0086bd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29534-na-d98aac99</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29534%3A%20n%2Fa&amp;severity=high&amp;id=6887d3dcad5a09ad0086bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50487-na-50eca2ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50487%3A%20n%2Fa&amp;severity=high&amp;id=6887ccd4ad5a09ad00868951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50484-na-0ee9b34b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50484%3A%20n%2Fa&amp;severity=high&amp;id=6887c950ad5a09ad00867b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50491-na-39959e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50491%3A%20n%2Fa&amp;severity=high&amp;id=6887bb4dad5a09ad00860928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50492-na-799b8380</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50492%3A%20n%2Fa&amp;severity=high&amp;id=6887b7bcad5a09ad0085f539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50489-na-50d22ca3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50489%3A%20n%2Fa&amp;severity=high&amp;id=6887b7bcad5a09ad0085f534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50488-na-c8fc4b27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50488%3A%20n%2Fa&amp;severity=high&amp;id=6887b438ad5a09ad0085e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50494-na-d5ab7360</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50494%3A%20n%2Fa&amp;severity=high&amp;id=6887b0b4ad5a09ad0085cd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50493-na-cb9d6dd7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50493%3A%20n%2Fa&amp;severity=high&amp;id=6887ad35ad5a09ad00856c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50490-na-283857a2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50490%3A%20n%2Fa&amp;severity=high&amp;id=6887ad35ad5a09ad00856c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30125-na-773773d5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30125%3A%20n%2Fa&amp;severity=critical&amp;id=68878a06ad5a09ad00846122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30124-na-c9c8e566</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30124%3A%20n%2Fa&amp;severity=critical&amp;id=68878682ad5a09ad00842ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30133-na-1e7c8c47</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30133%3A%20n%2Fa&amp;severity=critical&amp;id=688782fead5a09ad00842474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54569-cwe-863-incorrect-authorization-in--5aa12f8f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54569%3A%20CWE-863%20Incorrect%20Authorization%20in%20Malwarebytes%20Binisoft%20Windows%20Firewall%20Control&amp;severity=medium&amp;id=68876de5ad5a09ad008375d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8247-sql-injection-in-projectworlds-onlin-f1a89907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8247%3A%20SQL%20Injection%20in%20Projectworlds%20Online%20Admission%20System&amp;severity=medium&amp;id=6886c5adad5a09ad0077a59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8246-buffer-overflow-in-totolink-x15-2b81b20e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8246%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6886b391ad5a09ad00774356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8245-buffer-overflow-in-totolink-x15-1ce9aae9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8245%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6886ac89ad5a09ad007728bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8244-buffer-overflow-in-totolink-x15-6816c95b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8244%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6886a581ad5a09ad00770ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8243-buffer-overflow-in-totolink-x15-b5029715</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8243%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68869e7aad5a09ad0076f2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8242-buffer-overflow-in-totolink-x15-9322944f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8242%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68869771ad5a09ad0076d7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8241-sql-injection-in-1000-projects-abc-c-af929cfa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8241%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=68869070ad5a09ad0076b01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8240-sql-injection-in-code-projects-exam--84aabfc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8240%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886825bad5a09ad00768230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8239-sql-injection-in-code-projects-exam--0d84c2a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8239%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68867b55ad5a09ad00766ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8238-sql-injection-in-code-projects-exam--dcdedccb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8238%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=6886744bad5a09ad007636f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arizona-woman-jailed-for-helping-north-korea-in-17-f3e6fd4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arizona%20Woman%20Jailed%20for%20Helping%20North%20Korea%20in%20%2417%20Million%20IT%20Job%20Scam&amp;severity=medium&amp;id=68866d41ad5a09ad007613a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8237-sql-injection-in-code-projects-exam--02d532fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8237%3A%20SQL%20Injection%20in%20code-projects%20Exam%20Form%20Submission&amp;severity=medium&amp;id=68866d4aad5a09ad007613e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8236-sql-injection-in-code-projects-onlin-c5a84471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8236%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886663aad5a09ad0075c7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8235-sql-injection-in-code-projects-onlin-a7af8e3e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8235%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68865122ad5a09ad007564fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8234-sql-injection-in-code-projects-onlin-13fbe28e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8234%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=6886c5adad5a09ad0077a5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8233-sql-injection-in-code-projects-onlin-1fd436cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8233%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68863c0bad5a09ad0074d0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8232-sql-injection-in-code-projects-onlin-05b780bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8232%3A%20SQL%20Injection%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68863503ad5a09ad0074b58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8231-hard-coded-credentials-in-d-link-dir-63849a92</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8231%3A%20Hard-coded%20Credentials%20in%20D-Link%20DIR-890L&amp;severity=high&amp;id=68862dfbad5a09ad0074836c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8230-sql-injection-in-campcodes-courier-m-191a27c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8230%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=688618e4ad5a09ad00741fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8229-sql-injection-in-campcodes-courier-m-fc428f67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8229%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6885fcc4ad5a09ad007192c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8228-server-side-request-forgery-in-yanyu-e89a709e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8228%3A%20Server-Side%20Request%20Forgery%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=6885f5bcad5a09ad007160ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8227-deserialization-in-yanyutao0402-chan-086ac2fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8227%3A%20Deserialization%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=6885eeb4ad5a09ad007133a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8226-information-disclosure-in-yanyutao04-ca281421</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8226%3A%20Information%20Disclosure%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=6885e7adad5a09ad00711156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8225-memory-leak-in-gnu-binutils-acba7aec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8225%3A%20Memory%20Leak%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6885e0a9ad5a09ad0070e54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5120-cwe-94-improper-control-of-generatio-3ba9f785</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5120%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20huggingface%20huggingface%2Fsmolagents&amp;severity=high&amp;id=6885dd20ad5a09ad0070d476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8224-null-pointer-dereference-in-gnu-binu-47c51b7f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8224%3A%20NULL%20Pointer%20Dereference%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6885bd7dad5a09ad006edeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8223-cross-site-request-forgery-in-jerrys-20ccc986</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8223%3A%20Cross-Site%20Request%20Forgery%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=6885b675ad5a09ad006e760b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8222-cross-site-scripting-in-jerryshensjf-47c993fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8222%3A%20Cross%20Site%20Scripting%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=6885af6cad5a09ad006e571f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8104-cwe-352-cross-site-request-forgery-c-b1b82aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8104%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20Memory%20Usage%2C%20Memory%20Limit%2C%20PHP%20and%20Server%20Memory%20Health%20Check%20and%20Provide%20Suggestions&amp;severity=medium&amp;id=6885af6cad5a09ad006e5719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8221-cross-site-scripting-in-jerryshensjf-97821a06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8221%3A%20Cross%20Site%20Scripting%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=6885a864ad5a09ad006e3eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8220-sql-injection-in-engeman-web-0deadd83</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8220%3A%20SQL%20Injection%20in%20Engeman%20Web&amp;severity=medium&amp;id=68859dd9ad5a09ad006c8a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8219-sql-injection-in-shanghai-lingdang-i-c2e648f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8219%3A%20SQL%20Injection%20in%20Shanghai%20Lingdang%20Information%20Technology%20Lingdang%20CRM&amp;severity=medium&amp;id=6885934ead5a09ad006c6164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6241-cwe-427-uncontrolled-search-path-ele-fbc4c4e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6241%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Lakeside%20Software%20SysTrack&amp;severity=medium&amp;id=68857e34ad5a09ad006c030b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-27-708041ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-27&amp;severity=medium&amp;id=6886c19cad5a09ad00776ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54597-cwe-79-improper-neutralization-of-i-7f7fc1d5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54597%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LinuxServer%20Heimdall&amp;severity=high&amp;id=6885934ead5a09ad006c6160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/law-enforcement-operations-seized-blacksuit-ransom-44ff63f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Law%20enforcement%20operations%20seized%20BlackSuit%20ransomware%20gang%E2%80%99s%20darknet%20sites&amp;severity=medium&amp;id=68855082ad5a09ad0069c273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/allianz-life-confirms-data-breach-impacts-majority-01327bce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Allianz%20Life%20confirms%20data%20breach%20impacts%20majority%20of%201.4%20million%20customers&amp;severity=high&amp;id=68855082ad5a09ad0069c26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deepfakes-vishing-and-gpt-scams-phishing-just-leve-f3da35fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deepfakes%2C%20Vishing%2C%20and%20GPT%20Scams%3A%20Phishing%20Just%20Levelled%20Up&amp;severity=medium&amp;id=688545f8ad5a09ad00675b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8211-cross-site-scripting-in-roothub-05bb2d51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8211%3A%20Cross%20Site%20Scripting%20in%20Roothub&amp;severity=medium&amp;id=688545f6ad5a09ad00675b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8210-improper-export-of-android-applicati-3eb4f844</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8210%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Yeelink%20Yeelight%20App&amp;severity=medium&amp;id=68853eeead5a09ad0066f439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8207-improper-export-of-android-applicati-0fd72f33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8207%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Canara%20ai1%20Mobile%20Banking%20App&amp;severity=medium&amp;id=688537e6ad5a09ad00669f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8206-cross-site-scripting-in-comodo-drago-13786e6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8206%3A%20Cross%20Site%20Scripting%20in%20Comodo%20Dragon&amp;severity=low&amp;id=688529d6ad5a09ad006639ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8205-cleartext-transmission-of-sensitive--dbc71855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8205%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Comodo%20Dragon&amp;severity=medium&amp;id=688522d0ad5a09ad00660e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8204-security-check-for-standard-in-comod-659c5555</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8204%3A%20Security%20Check%20for%20Standard%20in%20Comodo%20Dragon&amp;severity=low&amp;id=6884f89ead5a09ad0064c043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/raven-stealer-unmasked-telegram-based-data-exfiltr-c17e9890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RAVEN%20STEALER%20UNMASKED%3A%20Telegram-Based%20Data%20Exfiltration&amp;severity=medium&amp;id=68873927ad5a09ad00816653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigate-phishing-emails-6154db5f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigate%20phishing%20emails&amp;severity=medium&amp;id=6884ee16ad5a09ad0060e94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8203-sql-injection-in-jingmen-zeyou-large-1ba55768</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8203%3A%20SQL%20Injection%20in%20Jingmen%20Zeyou%20Large%20File%20Upload%20Control&amp;severity=medium&amp;id=6884ea90ad5a09ad0060b511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8191-cross-site-scripting-in-macrozheng-m-508f39f0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8191%3A%20Cross%20Site%20Scripting%20in%20macrozheng%20mall&amp;severity=medium&amp;id=6884dc80ad5a09ad00605152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8190-sql-injection-in-campcodes-courier-m-2141c00e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8190%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884d578ad5a09ad005fe6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8189-sql-injection-in-campcodes-courier-m-2ac1c5f2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8189%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884d1f4ad5a09ad005f6a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8188-sql-injection-in-campcodes-courier-m-4a9b3c26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8188%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884c777ad5a09ad005ed39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-expose-massive-online-fake-currency-op-bbf3c0b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Expose%20Massive%20Online%20Fake%20Currency%20Operation%20in%20India&amp;severity=medium&amp;id=6884c05fad5a09ad005e7de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8187-sql-injection-in-campcodes-courier-m-7c7e9a11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8187%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884c06cad5a09ad005e7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8186-sql-injection-in-campcodes-courier-m-cb1d7107</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8186%3A%20SQL%20Injection%20in%20Campcodes%20Courier%20Management%20System&amp;severity=medium&amp;id=6884b958ad5a09ad005e4551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8185-sql-injection-in-1000-projects-abc-c-668811c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8185%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=6884a441ad5a09ad005d2f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8184-stack-based-buffer-overflow-in-d-lin-efb035cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8184%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=68849d3aad5a09ad005cdffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8182-weak-password-requirements-in-tenda--c6ba520f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8182%3A%20Weak%20Password%20Requirements%20in%20Tenda%20AC18&amp;severity=medium&amp;id=68849632ad5a09ad005ca8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6991-cwe-98-improper-control-of-filename--008fb089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6991%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6884849ead5a09ad005c4a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6989-cwe-22-improper-limitation-of-a-path-30d4ef44</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6989%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hogash%20KALLYAS%20-%20Creative%20eCommerce%20Multi-Purpose%20WordPress%20Theme&amp;severity=high&amp;id=6884849ead5a09ad005c4a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5529-cwe-79-improper-neutralization-of-in-53ec79c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Educenter&amp;severity=medium&amp;id=6884849ead5a09ad005c4a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8181-least-privilege-violation-in-totolin-5d325d2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8181%3A%20Least%20Privilege%20Violation%20in%20TOTOLINK%20N600R&amp;severity=high&amp;id=6884811bad5a09ad005c3a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8097-cwe-20-improper-input-validation-in--569401d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8097%3A%20CWE-20%20Improper%20Input%20Validation%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=68847d96ad5a09ad005c240e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6987-cwe-79-improper-neutralization-of-in-b1e7cd17</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=68847d96ad5a09ad005c2402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7501-cwe-79-improper-neutralization-of-in-95ca4dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wonderplugin%20Wonder%20Slider&amp;severity=medium&amp;id=68847d96ad5a09ad005c2409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8180-buffer-overflow-in-tenda-ch22-1b106c81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8180%3A%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=68847a12ad5a09ad005c050f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8198-cwe-472-external-control-of-assumed--22d981d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8198%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20ThemeMove%20MinimogWP%20%E2%80%93%20The%20High%20Converting%20eCommerce%20WordPress%20Theme&amp;severity=high&amp;id=688573fcad5a09ad006b9cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8179-sql-injection-in-phpgurukul-local-se-ff5b87eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8179%3A%20SQL%20Injection%20in%20PHPGurukul%20Local%20Services%20Search%20Engine%20Management%20System&amp;severity=medium&amp;id=688464faad5a09ad005b5da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8178-heap-based-buffer-overflow-in-tenda--ac5ec281</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8178%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=68845df1ad5a09ad005b282c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6895-cwe-288-authentication-bypass-using--c05db41d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6895%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20melapress%20Melapress%20Login%20Security&amp;severity=critical&amp;id=68845df1ad5a09ad005b2825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8177-buffer-overflow-in-libtiff-9b8c5410</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8177%3A%20Buffer%20Overflow%20in%20LibTIFF&amp;severity=medium&amp;id=688456e9ad5a09ad005ab272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8103-cwe-352-cross-site-request-forgery-c-6bb074d3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8103%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etruel%20WPeMatico%20RSS%20Feed%20Fetcher&amp;severity=medium&amp;id=68844fe2ad5a09ad005a5afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13507-cwe-89-improper-neutralization-of-s-b020f62d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13507%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=high&amp;id=699f6e5cb7ef31ef0b59eeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54366-cwe-502-deserialization-of-untruste-ac6d8256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54366%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68844fe2ad5a09ad005a5acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54416-cwe-77-improper-neutralization-of-s-7dcfb678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54416%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20tj-actions%20branch-names&amp;severity=critical&amp;id=68844fe2ad5a09ad005a5af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54415-cwe-78-improper-neutralization-of-s-181ff98a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54415%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20astronomer%20dag-factory&amp;severity=critical&amp;id=68844fe2ad5a09ad005a5aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8176-use-after-free-in-libtiff-5446ff94</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8176%3A%20Use%20After%20Free%20in%20LibTIFF&amp;severity=medium&amp;id=68844fe2ad5a09ad005a5b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54414-cwe-80-improper-neutralization-of-s-0adc653a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54414%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20TecharoHQ%20anubis&amp;severity=medium&amp;id=68844fe2ad5a09ad005a5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54413-cwe-351-insufficient-type-distincti-eb16c589</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54413%3A%20CWE-351%3A%20Insufficient%20Type%20Distinction%20in%20skops-dev%20skops&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54412-cwe-351-insufficient-type-distincti-f4b9edd6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54412%3A%20CWE-351%3A%20Insufficient%20Type%20Distinction%20in%20skops-dev%20skops&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54385-cwe-20-improper-input-validation-in-935cc2fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54385%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54378-cwe-285-improper-authorization-in-h-25c21010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54378%3A%20CWE-285%3A%20Improper%20Authorization%20in%20haxtheweb%20issues&amp;severity=high&amp;id=68844fe2ad5a09ad005a5ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8175-null-pointer-dereference-in-d-link-d-016064b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8175%3A%20NULL%20Pointer%20Dereference%20in%20D-Link%20DI-8400&amp;severity=high&amp;id=688448d9ad5a09ad0059e48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/admin-emails-passwords-exposed-via-http-method-cha-7919b6fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Admin%20Emails%20%26%20Passwords%20Exposed%20via%20HTTP%20Method%20Change&amp;severity=medium&amp;id=68843040ad5a09ad0058ffe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8174-unrestricted-upload-in-code-projects-09a94094</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8174%3A%20Unrestricted%20Upload%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68842cb9ad5a09ad0058f286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-26-cd80aee6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-26&amp;severity=medium&amp;id=6885701cad5a09ad006b64c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatched-flaw-in-eol-lg-lnv5110r-cameras-lets-hac-2b00ac97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatched%20flaw%20in%20EoL%20LG%20LNV5110R%20cameras%20lets%20hackers%20gain%20Admin%20access&amp;severity=medium&amp;id=68841b25ad5a09ad00587a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-cargotalon-targets-russias-aerospace-wit-1fdb4dbd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20CargoTalon%20targets%20Russia%E2%80%99s%20aerospace%20with%20EAGLET%20malware%2C&amp;severity=medium&amp;id=68841b25ad5a09ad00587a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8173-sql-injection-in-1000-projects-abc-c-190067aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8173%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=68841099ad5a09ad00585214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-resurfaces-on-original-dark-web-onion-06147cda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Resurfaces%20on%20Original%20Dark%20Web%20(.onion)%20Address&amp;severity=medium&amp;id=68840287ad5a09ad0057d71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8172-sql-injection-in-itsourcecode-employ-cd1a1dee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8172%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=68840292ad5a09ad0057d74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8171-unrestricted-upload-in-code-projects-8888c301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8171%3A%20Unrestricted%20Upload%20in%20code-projects%20Document%20Management%20System&amp;severity=medium&amp;id=68842287ad5a09ad0058b37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8170-buffer-overflow-in-totolink-t6-d23b94d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8170%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6883f478ad5a09ad0057361b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8169-buffer-overflow-in-d-link-dir-513-4c081d56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8169%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=6883ed70ad5a09ad00570055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-checkmate-blacksuit-ransomwares-dark-web-ceab9aa1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Checkmate%3A%20BlackSuit%20Ransomware%E2%80%99s%20Dark%20Web%20Domains%20Seized&amp;severity=medium&amp;id=6883e9ebad5a09ad0056e11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8168-buffer-overflow-in-d-link-dir-513-6bbd44e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8168%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=6883e667ad5a09ad0056cd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8167-cross-site-scripting-in-code-project-854977f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8167%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=6883df60ad5a09ad0056867f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8197-out-of-bounds-write-in-red-hat-red-h-3eef88f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8197&amp;severity=null&amp;id=6883dbdcad5a09ad00567202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52455-cwe-918-server-side-request-forgery-b149c2a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52455%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Salesforce%20Tableau%20Server&amp;severity=medium&amp;id=6883d858ad5a09ad00565a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52454-cwe-918-server-side-request-forgery-07cbcd6c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52454%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52453-cwe-918-server-side-request-forgery-3211cd79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52453%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8166-sql-injection-in-code-projects-churc-4081622b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8166%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=6883d858ad5a09ad00565a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52452-cwe-22-improper-limitation-of-a-pat-fae1fdbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52452%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52449-cwe-434-unrestricted-upload-of-file-39b7a18d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52449%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d858ad5a09ad00565a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52448-cwe-639-authorization-bypass-throug-5fbedb78</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52448%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d4d3ad5a09ad0056441f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52447-cwe-639-authorization-bypass-throug-769936d6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52447%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d4d3ad5a09ad0056441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52446-cwe-639-authorization-bypass-throug-41ab26ff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52446%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Salesforce%20Tableau%20Server&amp;severity=high&amp;id=6883d161ad5a09ad00561b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8165-sql-injection-in-code-projects-food--4b971ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8165%3A%20SQL%20Injection%20in%20code-projects%20Food%20Review%20System&amp;severity=medium&amp;id=6883d161ad5a09ad00561b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8164-sql-injection-in-code-projects-publi-762fbf91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8164%3A%20SQL%20Injection%20in%20code-projects%20Public%20Chat%20Room&amp;severity=medium&amp;id=6883ca47ad5a09ad0055b7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8163-sql-injection-in-deerwms-deer-wms-2-7ac91dd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8163%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6883c6c5ad5a09ad0055a67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5449-integer-overflow-or-wraparound-93e1aac3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5449%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6883bfbdad5a09ad00545182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8162-sql-injection-in-deerwms-deer-wms-2-9ef4edf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8162%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6883bc39ad5a09ad00539a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nascar-confirms-medusa-ransomware-breach-after-4m--0102c7de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NASCAR%20Confirms%20Medusa%20Ransomware%20Breach%20After%20%244M%20Demand&amp;severity=high&amp;id=6883b8b4ad5a09ad0053847a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8161-sql-injection-in-deerwms-deer-wms-2-3a9aa45a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8161%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6883b532ad5a09ad00533857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-added-prompt-to-amazon-q-to-erase-files-and-ba838721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Added%20Prompt%20to%20Amazon%20Q%20to%20Erase%20Files%20and%20Cloud%20Data&amp;severity=medium&amp;id=6883ae28ad5a09ad00530b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3508-cwe-200-exposure-of-sensitive-inform-4942e404</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3508%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HP%20Inc.%20Certain%20HP%20DesignJet%20products&amp;severity=medium&amp;id=6883ae32ad5a09ad00530b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34138-vulnerability-in-sitecore-experienc-e5c27741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34138&amp;severity=null&amp;id=6883aaa8ad5a09ad005300e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34139-vulnerability-in-sitecore-experienc-671b45bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34139%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Sitecore%20Experience%20Manager%20(XM)&amp;severity=high&amp;id=6883aaa8ad5a09ad005300ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34114-cwe-749-exposed-dangerous-method-or-71172af6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34114%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Laser%20Romae%E2%80%AFs.r.l.%20OpenBlow&amp;severity=high&amp;id=6883aaa8ad5a09ad005300e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13976-cwe-427-uncontrolled-search-path-el-8219545e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13976%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Commvault%20Commvault%20for%20Windows&amp;severity=high&amp;id=6921acbf8e780dcd644b6531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2329-cwe-908-use-of-uninitialized-resourc-a1383582</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2329%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20silabs.com%20OpenThread&amp;severity=medium&amp;id=6883aaa8ad5a09ad005300de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3873-cwe-787-out-of-bounds-write-in-silab-5be676e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3873%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20WiseConnect&amp;severity=medium&amp;id=6883aaa8ad5a09ad005300f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8160-buffer-overflow-in-tenda-ac20-ef7a7f82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8160%3A%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=6883a019ad5a09ad0052b93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8159-stack-based-buffer-overflow-in-d-lin-cef5cb91</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8159%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=68839914ad5a09ad00510d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-gained-full-access-to-a-100m-zero-trust-sta-0b9c0537</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20We%20Gained%20Full%20Access%20to%20a%20%24100M%20Zero-Trust%20Startup&amp;severity=medium&amp;id=6883920cad5a09ad0050aeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8158-sql-injection-in-phpgurukul-login-an-01a1754b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8158%3A%20SQL%20Injection%20in%20PHPGurukul%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=68838b02ad5a09ad00508065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8157-sql-injection-in-phpgurukul-user-reg-6b9fe4e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8157%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management&amp;severity=medium&amp;id=68838b02ad5a09ad0050806f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38380-8bcbde2b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38380&amp;severity=null&amp;id=68cb4e06e5fa2c8b1490b3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8156-sql-injection-in-phpgurukul-user-reg-8db0c699</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8156%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management&amp;severity=medium&amp;id=68837cf1ad5a09ad00501d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/koske-a-new-ai-generated-linux-malware-appears-in--46acadf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Koske%2C%20a%20new%20AI-Generated%20Linux%20malware%20appears%20in%20the%20threat%20landscape&amp;severity=medium&amp;id=6883796cad5a09ad005004ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soco404-and-koske-malware-target-cloud-services-wi-e88946fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Soco404%20and%20Koske%20Malware%20Target%20Cloud%20Services%20with%20Cross-Platform%20Cryptomining%20Attacks&amp;severity=high&amp;id=6883796cad5a09ad005004e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/woman-gets-8-years-for-aiding-north-koreans-infilt-acc6644f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Woman%20gets%208%20years%20for%20aiding%20North%20Koreans%20infiltrate%20300%20US%20firms&amp;severity=high&amp;id=6883796cad5a09ad005004e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8155-cross-site-scripting-in-d-link-dcs-6-244c658a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8155%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DCS-6010L&amp;severity=medium&amp;id=688375e7ad5a09ad004ff49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-rooted-copilot-d3e058ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20Rooted%20Copilot&amp;severity=high&amp;id=68836ee2ad5a09ad004fc7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5254-cwe-79-improper-neutralization-of-in-df0bd99a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kron%20Technologies%20Kron%20PAM&amp;severity=medium&amp;id=68836b5cad5a09ad004fb35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5253-cwe-770-allocation-of-resources-with-33d56b5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5253%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Kron%20Technologies%20Kron%20PAM&amp;severity=medium&amp;id=68836b5cad5a09ad004fb357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-posing-as-indian-bank-apps-b77858b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Malware%20Posing%20As%20Indian%20Bank%20Apps&amp;severity=medium&amp;id=68837986ad5a09ad00500ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-lure-victims-into-downloading-hta-fi-a0e285b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20Lure%20Victims%20Into%20Downloading%20.HTA%20Files%20Using%20ClickFix%20To%20Spread%20Epsilon%20Red%20Ransomware&amp;severity=medium&amp;id=68837986ad5a09ad00500ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8183-cwe-476-null-pointer-dereference-in--73dd0065</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8183%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20D3TN%20GmbH%20%C2%B5D3TN&amp;severity=high&amp;id=688352c0ad5a09ad004f228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitel-patches-critical-mivoice-mx-one-auth-bypass--2062652d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mitel%20patches%20critical%20MiVoice%20MX-ONE%20Auth%20bypass%20flaw&amp;severity=critical&amp;id=68834f3cad5a09ad004f08df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8140-buffer-overflow-in-totolink-a702r-899303bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8140%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68834bc0ad5a09ad004ef236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8139-buffer-overflow-in-totolink-a702r-28ed0d1f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8139%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=688344b2ad5a09ad004ecc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8138-buffer-overflow-in-totolink-a702r-3c8e4735</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8138%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68833da9ad5a09ad004e9e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8137-buffer-overflow-in-totolink-a702r-014b1b42</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8137%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=688336a1ad5a09ad004e842c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8136-buffer-overflow-in-totolink-a702r-64ab198e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8136%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68832f99ad5a09ad004e6283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8135-sql-injection-in-itsourcecode-insura-503f6fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8135%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=68832890ad5a09ad004e3ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8134-sql-injection-in-phpgurukul-bp-monit-5af2fb0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8134%3A%20SQL%20Injection%20in%20PHPGurukul%20BP%20Monitoring%20Management%20System&amp;severity=medium&amp;id=68832189ad5a09ad004e1c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7022-cwe-79-cross-site-scripting-xss-in-m-3a8ca36b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7022%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20My%20Reservation%20System&amp;severity=medium&amp;id=68832189ad5a09ad004e1c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8133-server-side-request-forgery-in-yanyu-2dbc9ebd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8133%3A%20Server-Side%20Request%20Forgery%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68831a81ad5a09ad004dee55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8132-path-traversal-in-yanyutao0402-chanc-22bacd75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8132%3A%20Path%20Traversal%20in%20yanyutao0402%20ChanCMS&amp;severity=medium&amp;id=68831378ad5a09ad004dc9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8131-stack-based-buffer-overflow-in-tenda-a8a6eb4b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8131%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC20&amp;severity=high&amp;id=68830c70ad5a09ad004db22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8129-open-redirect-in-koajs-koa-c70fc489</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8129%3A%20Open%20Redirect%20in%20KoaJS%20Koa&amp;severity=medium&amp;id=688308ecad5a09ad004da4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8128-unrestricted-upload-in-zhousg-letao-962bf949</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8128%3A%20Unrestricted%20Upload%20in%20zhousg%20letao&amp;severity=medium&amp;id=6882fe60ad5a09ad004d4c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8127-sql-injection-in-deerwms-deer-wms-2-1c3b0266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8127%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882fe60ad5a09ad004d4c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8126-sql-injection-in-deerwms-deer-wms-2-107b8b39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8126%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882ecccad5a09ad004d0c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8125-sql-injection-in-deerwms-deer-wms-2-cd100e5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8125%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882debdad5a09ad004c1e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0253-cwe-384-session-fixation-in-hcl-soft-23bcf733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0253%3A%20CWE-384%20Session%20Fixation%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882d0b3ad5a09ad004b7d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0252-cwe-319-cleartext-transmission-of-se-d21c94b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0252%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882d0b3ad5a09ad004b7d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0251-cwe-384-session-fixation-in-hcl-soft-d46582b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0251%3A%20CWE-384%20Session%20Fixation%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882d0b3ad5a09ad004b7d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-25-d4f8c65b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-25&amp;severity=medium&amp;id=68841e9cad5a09ad005883d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46198-na-5838793b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46198%3A%20n%2Fa&amp;severity=high&amp;id=6883df60ad5a09ad0056867b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30135-na-aaf9d69d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30135%3A%20n%2Fa&amp;severity=critical&amp;id=6883dbdcad5a09ad005671fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46199-na-4c605828</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46199%3A%20n%2Fa&amp;severity=critical&amp;id=6883ca47ad5a09ad0055b7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45893-na-19b598ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45893%3A%20n%2Fa&amp;severity=medium&amp;id=6883bc39ad5a09ad00539a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45960-na-ea485e81</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45960%3A%20n%2Fa&amp;severity=medium&amp;id=6883b8bfad5a09ad00538529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54596-cwe-863-incorrect-authorization-in--e719799c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54596%3A%20CWE-863%20Incorrect%20Authorization%20in%20Abnormal%20AI%20Abnormal%20Security&amp;severity=medium&amp;id=6883b8bfad5a09ad00538526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45892-na-4e053c76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45892%3A%20n%2Fa&amp;severity=medium&amp;id=6883b8bfad5a09ad00538522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45406-na-68f090e8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45406%3A%20n%2Fa&amp;severity=medium&amp;id=6883b8bfad5a09ad0053851c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29629-na-e3a568a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29629%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=critical&amp;id=6883b532ad5a09ad00533853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29631-na-a76c2293</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29631%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=critical&amp;id=6883b1adad5a09ad005320d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29630-na-ce892953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29630%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=medium&amp;id=6883b1adad5a09ad005320d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29628-na-6f354dc2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29628%3A%20CWE-924%20Improper%20Enforcement%20of%20Message%20Integrity%20During%20Transmission%20in%20a%20Communication%20Channel%20in%20Gardyn%20Home%20Kit%20Firmware&amp;severity=critical&amp;id=6883b1adad5a09ad005320cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45467-na-adb40122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45467%3A%20n%2Fa&amp;severity=high&amp;id=6883a019ad5a09ad0052b943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45466-na-7c9bd198</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45466%3A%20n%2Fa&amp;severity=high&amp;id=6883a019ad5a09ad0052b938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44608-na-d65df802</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44608%3A%20n%2Fa&amp;severity=medium&amp;id=68839c97ad5a09ad00516e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52360-na-e3d43ea3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52360%3A%20n%2Fa&amp;severity=high&amp;id=6883958dad5a09ad0050e728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30086-na-6fc3df70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30086%3A%20n%2Fa&amp;severity=medium&amp;id=6883958dad5a09ad0050e722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45777-na-fdf3df98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45777%3A%20n%2Fa&amp;severity=critical&amp;id=68839209ad5a09ad0050ae7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45939-na-3ab3236c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45939%3A%20n%2Fa&amp;severity=medium&amp;id=68838e84ad5a09ad005098da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51411-na-1fb2989b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51411%3A%20n%2Fa&amp;severity=medium&amp;id=68838b02ad5a09ad0050806c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43712-na-1635af3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43712%3A%20n%2Fa&amp;severity=high&amp;id=6883877ead5a09ad00505e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54568-cwe-684-incorrect-provision-of-spec-ad0a27ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54568%3A%20CWE-684%20Incorrect%20Provision%20of%20Specified%20Functionality%20in%20Akamai%20Rate%20Control&amp;severity=low&amp;id=6882fe60ad5a09ad004d4c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54558-cwe-829-inclusion-of-functionality--9a3b4c45</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54558%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20OpenAI%20Codex%20CLI&amp;severity=medium&amp;id=6882debdad5a09ad004c1e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8124-sql-injection-in-deerwms-deer-wms-2-abaa19cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8124%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882c620ad5a09ad00468601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7742-cwe-288-authentication-bypass-using--ebc1ee33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7742%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LG%20Innotek%20Camera%20Model%20LNV5110R&amp;severity=high&amp;id=6882c29cad5a09ad00467c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0250-cwe-319-cleartext-transmission-of-se-68025939</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0250%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882c29cad5a09ad00467c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0249-cwe-287-improper-authentication-in-h-bd3203f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0249%3A%20CWE-287%20Improper%20Authentication%20in%20HCL%20Software%20IEM&amp;severity=low&amp;id=6882c29cad5a09ad00467c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-sneaks-infostealer-malware-into-early-acces-16108fea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20sneaks%20infostealer%20malware%20into%20early%20access%20Steam%20game&amp;severity=high&amp;id=6882bf17ad5a09ad004667c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fire-ant-exploits-vmware-flaws-to-compromise-esxi--031e6557</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fire%20Ant%20Exploits%20VMware%20Flaws%20to%20Compromise%20ESXi%20Hosts%20and%20vCenter%20Environments&amp;severity=high&amp;id=6882bf17ad5a09ad004667bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-malware-is-first-ever-malware-abusing-windo-9c321330</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20malware%20is%20first-ever%20malware%20abusing%20Windows%20UI%20Automation&amp;severity=medium&amp;id=6882bf17ad5a09ad004667c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-koske-linux-malware-hides-in-cute-panda-images-4713485b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Koske%20Linux%20malware%20hides%20in%20cute%20panda%20images&amp;severity=high&amp;id=6882bf17ad5a09ad004667c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22165-security-misconfiguration-in-atlass-6b8fcdec</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22165%3A%20Security%20Misconfiguration%20in%20Atlassian%20Sourcetree%20for%20Mac&amp;severity=medium&amp;id=6882b80ead5a09ad004644fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54379-cwe-89-improper-neutralization-of-s-321b0644</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54379%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20lf-edge%20ekuiper&amp;severity=high&amp;id=6882b80fad5a09ad00464512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53940-cwe-208-observable-timing-discrepan-38bfe8f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53940%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20TryQuiet%20quiet&amp;severity=high&amp;id=6882b80ead5a09ad0046450b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3614-cwe-79-improper-neutralization-of-in-38c47338</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=6882b80ead5a09ad00464506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32429-cwe-89-improper-neutralization-of-s-39b97e45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32429%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=6882b80ead5a09ad00464500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scavenger-trojan-targets-crypto-wallets-via-game-m-b941fc94</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scavenger%20Trojan%20Targets%20Crypto%20Wallets%20via%20Game%20Mods%20and%20Browser%20Flaws&amp;severity=medium&amp;id=6882b105ad5a09ad0046265e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8123-sql-injection-in-deerwms-deer-wms-2-7d7ad8a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8123%3A%20SQL%20Injection%20in%20deerwms%20deer-wms-2&amp;severity=medium&amp;id=6882a2f7ad5a09ad0045efb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31952-cwe-613-insufficient-session-expira-4f428939</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31952%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HCL%20Software%20iAutomate&amp;severity=high&amp;id=6882a2f7ad5a09ad0045efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31955-cwe-200-exposure-of-sensitive-infor-9c01ee75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31955%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20iAutomate&amp;severity=high&amp;id=6882a2f7ad5a09ad0045efad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6260-cwe-306-missing-authentication-for-c-a375517e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6260%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Network%20Thermostat%20X-Series%20WiFi%20thermostats&amp;severity=critical&amp;id=68829f72ad5a09ad00443b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/castleloader-malware-fake-github-and-phishing-atta-c21b18dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CastleLoader%20Malware%3A%20Fake%20GitHub%20and%20Phishing%20Attack%20Hits%20469%20Devices&amp;severity=medium&amp;id=68829f76ad5a09ad00443b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31953-cwe-798-use-of-hard-coded-credentia-1ee9f269</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31953%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20HCL%20Software%20iAutomate&amp;severity=high&amp;id=68829beead5a09ad004432d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ai-generated-malware-in-panda-image-hides-persiste-3ccf8533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AI-Generated%20Malware%20in%20Panda%20Image%20Hides%20Persistent%20Linux%20Threat&amp;severity=medium&amp;id=6882986aad5a09ad0044293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8115-cross-site-scripting-in-phpgurukul-t-6daf3406</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8115%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=68827fd0ad5a09ad0041a727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5039-cwe-426-untrusted-search-path-in-aut-1efb3e2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5039%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=68826ab9ad5a09ad003f03a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/replit-ai-agent-deletes-sensitive-data-despite-exp-f4ce6ee0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Replit%20AI%20Agent%20Deletes%20Sensitive%20Data%20Despite%20Explicit%20Instructions&amp;severity=medium&amp;id=68826735ad5a09ad003ef7de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46993-cross-site-scripting-stored-xss-cwe-36ba82e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46993%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68825925ad5a09ad003a27b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46996-cross-site-scripting-stored-xss-cwe-89a8c31c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46996%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=68825925ad5a09ad003a27b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47061-cross-site-scripting-stored-xss-cwe-a27e0cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47061%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=688255a1ad5a09ad003a1ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/storm-2603-exploits-sharepoint-flaws-to-deploy-war-75eb0b8a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Storm-2603%20Exploits%20SharePoint%20Flaws%20to%20Deploy%20Warlock%20Ransomware%20on%20Unpatched%20Systems&amp;severity=high&amp;id=68824e98ad5a09ad0037aa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-urges-admins-to-patch-critical-rce-flaw--0aa77b33</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20urges%20admins%20to%20patch%20critical%20RCE%20flaw%20in%20SMA%20100%20devices&amp;severity=critical&amp;id=68824e98ad5a09ad0037aa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-breach-toptal-github-account-publish-malic-7546637b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20breach%20Toptal%20GitHub%20account%2C%20publish%20malicious%20npm%20packages&amp;severity=high&amp;id=68824e98ad5a09ad0037aa37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46410-cwe-79-improper-neutralization-of-i-cd96a359</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46410%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a1569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53084-cwe-79-improper-neutralization-of-i-1b34761c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53084%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a1572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50128-cwe-79-improper-neutralization-of-i-9a3eb22a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a156f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36548-cwe-79-improper-neutralization-of-i-b722cb6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36548%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=6882521dad5a09ad003a1563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41420-cwe-79-improper-neutralization-of-i-2450bc5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41420%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=6882521dad5a09ad003a1566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25214-cwe-362-concurrent-execution-using--a3498a3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25214%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=6882521dad5a09ad003a1560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48732-cwe-184-incomplete-blacklist-in-wwb-4be3bbfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48732%3A%20CWE-184%3A%20Incomplete%20Blacklist%20in%20WWBN%20AVideo&amp;severity=high&amp;id=6882521dad5a09ad003a156c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33109-cwe-250-execution-with-unnecessary--39ced187</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33109%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges&amp;severity=high&amp;id=68824ec4ad5a09ad0037ab17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33013-cwe-244-improper-clearing-of-heap-m-cc098738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33013%3A%20CWE-244%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20(&apos;Heap%20Inspection&apos;)%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36005-cwe-295-improper-certificate-valida-6fdef538</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36005%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8114-null-pointer-dereference-in-red-hat--f23576c3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8114%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=6882440cad5a09ad0036d5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-advanced-stealer-shuyal-targets-credentials-ac-e406f975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Advanced%20Stealer%20(SHUYAL)%20Targets%20Credentials%20Across%2019%20Popular%20Browsers&amp;severity=medium&amp;id=68838b04ad5a09ad005080a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercrime-forum-xss-returns-on-mirror-and-dark-we-2234025d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercrime%20Forum%20XSS%20Returns%20on%20Mirror%20and%20Dark%20Web%20Day%20After%20Seizure&amp;severity=medium&amp;id=6882397fad5a09ad0035a35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4784-cwe-89-improper-neutralization-of-sp-aead5b77</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4784%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Moderec%20Tourtella&amp;severity=critical&amp;id=6882398ead5a09ad0035a3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4822-cwe-89-improper-neutralization-of-sp-65e43d21</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4822%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bayraktar%20Solar%20Energies%20ScadaWatt%20Otopilot&amp;severity=critical&amp;id=68823278ad5a09ad003579f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5243-cwe-434-unrestricted-upload-of-file--9bc3b445</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5243%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SMG%20Software%20Information%20Portal&amp;severity=critical&amp;id=68823278ad5a09ad003579f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40680-cwe-311-missing-encryption-of-sensi-74d344c0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40680%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Capillary%20io%20CapillaryScope&amp;severity=medium&amp;id=688227ecad5a09ad00352b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sharepoint-toolshell-one-request-preauth-rce-chain-d77f9930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SharePoint%20ToolShell%20%E2%80%93%20One%20Request%20PreAuth%20RCE%20Chain&amp;severity=medium&amp;id=68821d64ad5a09ad0034ea11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gunra-ransomware-emerges-with-new-dls-77a68239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gunra%20Ransomware%20Emerges%20with%20New%20DLS&amp;severity=medium&amp;id=6882986aad5a09ad0044295a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/national-nuclear-security-administration-systems-b-20466bd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=National%20Nuclear%20Security%20Administration%20Systems%20Breached%20in%20SharePoint%20Cyberattack&amp;severity=medium&amp;id=68820f50ad5a09ad003485ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sophos-fixed-two-critical-sophos-firewall-vulnerab-1dd5f79e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sophos%20fixed%20two%20critical%20Sophos%20Firewall%20vulnerabilities&amp;severity=critical&amp;id=6881fdbdad5a09ad0033bd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brave-blocks-windows-recall-from-screenshotting-yo-64273c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brave%20blocks%20Windows%20Recall%20from%20screenshotting%20your%20browsing%20activity&amp;severity=high&amp;id=6881fdbdad5a09ad0033bd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7959-cwe-79-improper-neutralization-of-in-b0c8d505</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marviorocha%20Station%20Pro%20%E2%80%93%20Advanced%20Audio%20Streaming%20%26%20Player%20for%20WordPress&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7690-cwe-352-cross-site-request-forgery-c-4ec3f362</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7690%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mindnl%20Affiliate%20Plus&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033befd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7835-cwe-352-cross-site-request-forgery-c-1f65a49a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7835%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gerkin%20iThoughts%20Advanced%20Code%20Editor&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7695-cwe-862-missing-authorization-in-ale-7e0d07a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7695%3A%20CWE-862%20Missing%20Authorization%20in%20alexacrm%20Dataverse%20Integration&amp;severity=high&amp;id=6881fdd8ad5a09ad0033bf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4608-cwe-79-improper-neutralization-of-in-2eeccc45</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codemacher%20Structured%20Content%20(JSON-LD)%20%23wpsc&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6382-cwe-79-improper-neutralization-of-in-12aabd26</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6382%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taeggie%20Taeggie%20Feed&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6539-cwe-79-improper-neutralization-of-in-7920fd7d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minutemedia%20Voltax%20Video%20Player&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033beea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3669-cwe-79-improper-neutralization-of-in-be88e71e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3669%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ullakalim8%20Supreme%20Addons%20for%20Beaver%20Builder%20%E2%80%93&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6387-cwe-79-improper-neutralization-of-in-e018daa5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonsisk%20WP%20Get%20The%20Table&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6262-cwe-79-improper-neutralization-of-in-ec6e488b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20museai%20muse.ai%20video%20embedding&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033becc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6385-cwe-79-improper-neutralization-of-in-7b8c5181</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ejointjp%20WP%20Applink&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7822-cwe-862-missing-authorization-in-ale-3dbf5f0f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7822%3A%20CWE-862%20Missing%20Authorization%20in%20alexalouit%20WP%20Wallcreeper&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6380-cwe-862-missing-authorization-in-onl-b14c9d06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6380%3A%20CWE-862%20Missing%20Authorization%20in%20onlyoffice%20ONLYOFFICE%20Docs&amp;severity=critical&amp;id=6881fdd8ad5a09ad0033bed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8071-cwe-79-improper-neutralization-of-in-068118eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20995525477-1%20Video%20and%20Audio%20Player%20for%20WordPress%20%E2%80%93%20Mine%20CloudVod%20LMS&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7966-cwe-79-improper-neutralization-of-in-ac47341e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zohaib167%20Get%20Youtube%20Subs&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6441-cwe-862-missing-authorization-in-tob-8ec47cd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6441%3A%20CWE-862%20Missing%20Authorization%20in%20tobias_conrad%20Webinar%20Solution%3A%20Create%20live%2Fevergreen%2Fautomated%2Finstant%20webinars%2C%20stream%20%26%20Zoom%20Meetings%20%7C%20WebinarIgnition&amp;severity=critical&amp;id=6881fdd8ad5a09ad0033bee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7780-cwe-200-exposure-of-sensitive-inform-b482c26c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7780%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tigroumeow%20AI%20Engine&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7640-cwe-22-improper-limitation-of-a-path-dc3ae814</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7640%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20den-media%20hiWeb%20Export%20Posts&amp;severity=high&amp;id=6881fdd8ad5a09ad0033bef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5084-cwe-79-improper-neutralization-of-in-83414c5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdshuvo%20Post%20Grid%20Master%20%E2%80%93%20Custom%20Post%20Types%2C%20Taxonomies%20%26%20Ajax%20Filter%20Everything%20with%20Infinite%20Scroll%2C%20Load%20More%2C%20Pagination%20%26%20Shortcode%20Builder&amp;severity=medium&amp;id=6881fdd8ad5a09ad0033bec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26397-cwe-502-deserialization-of-untruste-abc1ee35</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26397%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=high&amp;id=6881e8a5ad5a09ad003161df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8009-cwe-36-absolute-path-traversal-in-cl-aa38bee6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8009%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20cleverplugins%20Security%20Ninja%20%E2%80%93%20WordPress%20Security%20Plugin%20%26%20Firewall&amp;severity=medium&amp;id=6881e521ad5a09ad003135fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8107-cwe-668-exposure-of-resource-to-wron-7f3e9522</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8107%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20OB%20OceanBase%20Server&amp;severity=medium&amp;id=6881e19dad5a09ad003124d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7745-cwe-126-buffer-over-read-in-abb-ac50-6480f63e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7745%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20ABB%20AC500%20V2&amp;severity=medium&amp;id=6881e19dad5a09ad003124d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41240-vulnerability-in-vmware-bitnamichar-f662b305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41240%3A%20Vulnerability%20in%20VMware%20bitnamicharts%2Fappsmith&amp;severity=critical&amp;id=6881d711ad5a09ad0030e375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-cargotalon-targeting-russian-aerospace-d-a425a732</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Cargotalon%3A%20Targeting%20Russian%20Aerospace%20Defense%20Using%20Eaglet%20Implant&amp;severity=medium&amp;id=6881f6b8ad5a09ad0031b694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7437-cwe-434-unrestricted-upload-of-file--e9168916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7437%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20motovnet%20Ebook%20Store&amp;severity=critical&amp;id=6881b76dad5a09ad00306acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7852-cwe-434-unrestricted-upload-of-file--0e4c1a95</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7852%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=6881b76dad5a09ad00306ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4968-cwe-79-improper-neutralization-of-in-45c63c58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4968%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4395-cwe-258-empty-password-in-configurat-e3d2cbed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4395%3A%20CWE-258%20Empty%20Password%20in%20Configuration%20File%20in%20Medtronic%20MyCareLink%20Patient%20Monitor%2024950&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4394-cwe-312-cleartext-storage-of-sensiti-1093ced1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4394%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Medtronic%20MyCareLink%20Patient%20Monitor%2024950&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4393-cwe-502-deserialization-of-untrusted-c1356da7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4393%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Medtronic%20MyCareLink%20Patient%20Monitor%2024950&amp;severity=medium&amp;id=6881b066ad5a09ad00303fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-24-6a73393f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-24&amp;severity=medium&amp;id=6882cd1cad5a09ad004b5a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45702-na-c56c3d66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45702%3A%20n%2Fa&amp;severity=medium&amp;id=688263b1ad5a09ad003c1633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51089-na-62d99ac7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51089%3A%20n%2Fa&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51088-na-0aa5fc6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51088%3A%20n%2Fa&amp;severity=medium&amp;id=68824b13ad5a09ad0036f0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51085-na-6098bdeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51085%3A%20n%2Fa&amp;severity=medium&amp;id=68824790ad5a09ad0036e8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51082-na-40a42c6d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51082%3A%20n%2Fa&amp;severity=medium&amp;id=68824790ad5a09ad0036e8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51087-na-472c35d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51087%3A%20n%2Fa&amp;severity=high&amp;id=68824790ad5a09ad0036e8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45731-na-5cdc06ae</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45731%3A%20n%2Fa&amp;severity=medium&amp;id=6882398ead5a09ad0035a3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-special-mission-to-nowhere-39fa40a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Special%20Mission%20to%20Nowhere&amp;severity=medium&amp;id=6881fa4fad5a09ad003390e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54365-cwe-20-improper-input-validation-in-e01dd906</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54365%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20rennf93%20fastapi-guard&amp;severity=high&amp;id=6881630dad5a09ad0028e316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32019-cwe-79-improper-neutralization-of-i-f0fd144d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32019%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goharbor%20harbor&amp;severity=medium&amp;id=68814a71ad5a09ad0027bdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54377-cwe-77-improper-neutralization-of-s-5a2252f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54377%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=68814a71ad5a09ad0027be01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53537-cwe-401-missing-release-of-memory-a-c837803d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53537%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20OISF%20libhtp&amp;severity=high&amp;id=68814a71ad5a09ad0027bdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53942-cwe-269-improper-privilege-manageme-8d342b40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53942%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20goauthentik%20authentik&amp;severity=high&amp;id=68814a71ad5a09ad0027bdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8058-cwe-415-double-free-in-the-gnu-c-lib-baff35c5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8058%3A%20CWE-415%20Double%20Free%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=68813fe5ad5a09ad00279216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-and-cisa-warn-of-interlock-ransomware-targetin-4058eb79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20and%20CISA%20Warn%20of%20Interlock%20Ransomware%20Targeting%20Critical%20Infrastructure&amp;severity=critical&amp;id=68812acdad5a09ad00274dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/npm-package-is-with-28m-weekly-downloads-infected--87dafba7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NPM%20package%20%E2%80%98is%E2%80%99%20with%202.8M%20weekly%20downloads%20infected%20devs%20with%20malware&amp;severity=high&amp;id=68812749ad5a09ad002741d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-fooled-cognizant-help-desk-says-clorox-in--dc37bd6a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20fooled%20Cognizant%20help%20desk%2C%20says%20Clorox%20in%20%24380M%20cyberattack%20lawsuit&amp;severity=high&amp;id=68812749ad5a09ad002741d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hijacking-cursors-agent-how-we-took-over-an-ec2-in-921ee837</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hijacking%20Cursor%E2%80%99s%20Agent%3A%20How%20We%20Took%20Over%20an%20EC2%20Instance&amp;severity=medium&amp;id=68810b2dad5a09ad0026c6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2634-cwe-1285-improper-validation-of-spec-03a911e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2634%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20NI%20LabVIEW&amp;severity=high&amp;id=688107a5ad5a09ad0026b3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2633-cwe-1285-improper-validation-of-spec-1820e7e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2633%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20NI%20LabVIEW&amp;severity=high&amp;id=688107a5ad5a09ad0026b3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illusory-wishes-china-nexus-apt-targets-the-tibeta-b2776143</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illusory%20Wishes%3A%20China-nexus%20APT%20Targets%20the%20Tibetan%20Community&amp;severity=medium&amp;id=68810eabad5a09ad0026d46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8069-cwe-276-incorrect-default-permission-eb0ef8d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8069%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AWS%20Client%20VPN&amp;severity=high&amp;id=688107a5ad5a09ad0026b3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6018-incorrect-authorization-e26bb440</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6018%3A%20Incorrect%20Authorization&amp;severity=high&amp;id=6880fd19ad5a09ad00269657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40598-cwe-79-improper-neutralization-of-i-57f27370</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SonicWall%20SMA%20100%20Series&amp;severity=medium&amp;id=6880f995ad5a09ad002679cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33077-cwe-119-improper-restriction-of-ope-f12a2ae5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33077%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Engineering%20Systems%20Design%20Rhapsody&amp;severity=high&amp;id=6880f995ad5a09ad002679c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33076-cwe-119-improper-restriction-of-ope-093278f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33076%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Engineering%20Systems%20Design%20Rhapsody&amp;severity=high&amp;id=6880f995ad5a09ad002679c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40597-cwe-122-heap-based-buffer-overflow--147e69fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40597%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SonicWall%20SMA%20100%20Series&amp;severity=high&amp;id=6880f995ad5a09ad002679ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33020-cwe-311-missing-encryption-of-sensi-2a4887f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33020%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20IBM%20Engineering%20Systems%20Design%20Rhapsody&amp;severity=medium&amp;id=6880f995ad5a09ad002679c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40596-cwe-121-stack-based-buffer-overflow-1ad54501</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40596%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20SonicWall%20SMA%20100%20Series&amp;severity=high&amp;id=6880f613ad5a09ad00266d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36117-cwe-384-session-fixation-in-ibm-db2-df000d7b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36117%3A%20CWE-384%20Session%20Fixation%20in%20IBM%20Db2%20Mirror%20for%20i&amp;severity=medium&amp;id=6880f613ad5a09ad00266d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36116-cwe-1385-missing-origin-validation--323d5fc8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36116%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20IBM%20Db2%20Mirror%20for%20i&amp;severity=medium&amp;id=6880f613ad5a09ad00266d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54090-cwe-253-incorrect-check-of-function-ce53af9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54090%3A%20CWE-253%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=medium&amp;id=6880e47ead5a09ad0026093b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40599-cwe-434-unrestricted-upload-of-file-7ea1f2df</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40599%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SonicWall%20SMA%20100%20Series&amp;severity=critical&amp;id=6880e47ead5a09ad00260938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4411-cwe-79-improper-neutralization-of-in-17d882ac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dataprom%20Informatics%20PACS-ACSS&amp;severity=medium&amp;id=6880d66cad5a09ad0025c7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-guest-who-could-exploiting-lpe-in-vmware-tools-82c1ec5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Guest%20Who%20Could%3A%20Exploiting%20LPE%20in%20VMWare%20Tools&amp;severity=medium&amp;id=6880cf69ad5a09ad0025b342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-craft-a-raw-tcp-socket-without-winsock-5f1dfb87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20craft%20a%20raw%20TCP%20socket%20without%20Winsock%3F&amp;severity=medium&amp;id=688429e0ad5a09ad0058e904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4296-cwe-601-url-redirection-to-untrusted-2e8873c2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4296%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20HotelRunner%20B2B&amp;severity=medium&amp;id=6880c85cad5a09ad002587b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54297-cwe-79-improper-neutralization-of-i-234b244d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54297%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20compojoom.com%20CComment%20component%20for%20Joomla&amp;severity=high&amp;id=6880c85cad5a09ad002587c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54294-cwe-89-improper-neutralization-of-s-da821b19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54294%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stackideas.com%20Komento%20component%20for%20Joomla&amp;severity=critical&amp;id=6880c85cad5a09ad002587b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54295-cwe-79-improper-neutralization-of-i-c6f4eabf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dj-extensions.com%20DJ-Reviews%20component%20for%20Joomla&amp;severity=medium&amp;id=6880c85cad5a09ad002587bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54296-cwe-79-improper-neutralization-of-i-1f697ad2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54296%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooj.org%20ProFiles%20component%20for%20Joomla&amp;severity=high&amp;id=6880c85cad5a09ad002587bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50127-cwe-89-improper-neutralization-of-s-2ed409bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50127%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dj-extensions.com%20DJ-Flyer%20component%20for%20Joomla&amp;severity=high&amp;id=6880c85cad5a09ad002587b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27930-cwe-79-improper-neutralization-of-i-20592a22</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20Applications%20Manager&amp;severity=medium&amp;id=6880ba4cad5a09ad002527b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48932-invision-community-4720-calendarvie-a975d7b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCVE-2025-48932%5D%20Invision%20Community%20%3C%3D%204.7.20%20(calendar%2Fview.php)%20SQL%20Injection%20Vulnerability&amp;severity=medium&amp;id=6880b6cead5a09ad00251338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48933-invision-community-507-oauthcallbac-3f41b538</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCVE-2025-48933%5D%20Invision%20Community%20%3C%3D%205.0.7%20(oauth%2Fcallback)%20Reflected%20Cross-Site%20Scripting%20Vulnerability&amp;severity=medium&amp;id=6880b6cead5a09ad0025133c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-infostealer-malware-returns-after-law-enforc-db04ee16</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20infostealer%20malware%20returns%20after%20law%20enforcement%20disruption&amp;severity=high&amp;id=6880afc0ad5a09ad0024cc7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53882-cwe-807-reliance-on-untrusted-input-65e06722</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53882%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=medium&amp;id=6880afcead5a09ad0024ccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/usurpation-didentits-manages-dans-azure-60eaa6e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Usurpation%20d%E2%80%99Identit%C3%A9s%20manag%C3%A9es%20dans%20Azure&amp;severity=medium&amp;id=6880a538ad5a09ad0022db0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41687-cwe-121-stack-based-buffer-overflow-73a34584</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41687%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=critical&amp;id=68809e2ead5a09ad000c5773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41684-cwe-78-improper-neutralization-of-s-a60f9af1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41684%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=high&amp;id=68809e2ead5a09ad000c5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41683-cwe-78-improper-neutralization-of-s-a2adf7a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41683%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=high&amp;id=68809e2ead5a09ad000c576d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/net-rfq-request-for-quote-scammers-casting-wide-ne-993b1d80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NET%20RFQ%3A%20Request%20for%20Quote%20Scammers%20Casting%20Wide%20Net%20to%20Steal%20Real%20Goods&amp;severity=medium&amp;id=6880a8b8ad5a09ad0023246d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/back-to-business-lumma-stealer-returns-with-stealt-25a9ecca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Back%20to%20Business%3A%20Lumma%20Stealer%20Returns%20with%20Stealthier%20Methods&amp;severity=medium&amp;id=6880a8b8ad5a09ad002324cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8070-cwe-428-unquoted-search-path-or-elem-4542a70d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8070%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20ASUSTOR%20ABP%20and%20AES&amp;severity=critical&amp;id=6880901cad5a09ad0008ab16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31701-vulnerability-in-dahua-ipc-10a925e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31701%3A%20Vulnerability%20in%20Dahua%20IPC&amp;severity=high&amp;id=68808914ad5a09ad000853d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31700-vulnerability-in-dahua-ipc-223227c0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31700%3A%20Vulnerability%20in%20Dahua%20IPC&amp;severity=high&amp;id=68808914ad5a09ad000853cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6174-cwe-79-cross-site-scripting-xss-in-q-073d9b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6174%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qwizcards%20%7C%20online%20quizzes%20and%20flashcards&amp;severity=medium&amp;id=68807b22ad5a09ad0007fe0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54439-cwe-434-unrestricted-upload-of-file-b5f31b0e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54439%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54438-cwe-22-improper-limitation-of-a-pat-7389ba32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54438%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54444-cwe-434-unrestricted-upload-of-file-8adb0ca3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54444%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54443-cwe-22-improper-limitation-of-a-pat-28f60554</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54443%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54442-cwe-434-unrestricted-upload-of-file-dfe7e3fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54442%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54441-cwe-434-unrestricted-upload-of-file-1f8348fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54441%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54440-cwe-434-unrestricted-upload-of-file-608079a0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54440%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54447-cwe-434-unrestricted-upload-of-file-f17881b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54447%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54446-cwe-22-improper-limitation-of-a-pat-c140d8c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54446%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807781ad5a09ad0007e8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54445-cwe-611-improper-restriction-of-xml-560c2e1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54445%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807781ad5a09ad0007e8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54448-cwe-434-unrestricted-upload-of-file-c6ab5f1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54448%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807782ad5a09ad0007e8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54453-cwe-22-improper-limitation-of-a-pat-e906039d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54453%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807782ad5a09ad0007e8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54452-cwe-287-improper-authentication-in--ddba588d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54452%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=68807782ad5a09ad0007e8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54451-cwe-94-improper-control-of-generati-8bd5adce</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54451%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=68807782ad5a09ad0007e8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54450-cwe-22-improper-limitation-of-a-pat-05cafe2e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54450%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=688073fcad5a09ad0007da6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54449-cwe-434-unrestricted-upload-of-file-d9d96c7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54449%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=688073fcad5a09ad0007da6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54455-cwe-798-use-of-hard-coded-credentia-385f53b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54455%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=688073fcad5a09ad0007da74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54454-cwe-798-use-of-hard-coded-credentia-42385b81</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54454%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=688073fcad5a09ad0007da71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-in-the-wild-first-ever-malware-that-abuses--4cf127d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20in%20the%20Wild%3A%20First-Ever%20Malware%20That%20Abuses%20UI%20Automation&amp;severity=medium&amp;id=6880707cad5a09ad0007d08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8022-improper-neutralization-of-special-e-d0da9b70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8022&amp;severity=null&amp;id=68806cf5ad5a09ad0007c8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8021-directory-traversal-in-files-bucket--287d46da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8021%3A%20Directory%20Traversal%20in%20files-bucket-server&amp;severity=high&amp;id=68806cf5ad5a09ad0007c8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8020-server-side-request-forgery-ssrf-in--f7f1dcfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8020%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20private-ip&amp;severity=high&amp;id=68806cf4ad5a09ad0007c8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43881-improper-validation-of-specified-qu-f06880f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43881%3A%20Improper%20validation%20of%20specified%20quantity%20in%20input%20in%20SYNCK%20GRAPHICA%20Real-time%20Bus%20Tracking%20System&amp;severity=medium&amp;id=6881009fad5a09ad00269f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42947-cwe-94-improper-control-of-generati-c863e409</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42947%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20FICA%20ODN%20framework&amp;severity=medium&amp;id=68805b60ad5a09ad0006b2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7722-cwe-272-least-privilege-violation-in-e214b6be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7722%3A%20CWE-272%20Least%20Privilege%20Violation%20in%20steverio%20Social%20Streams&amp;severity=high&amp;id=68804d51ad5a09ad00065fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5753-cwe-79-improper-neutralization-of-in-5ddf4578</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reallaunch%20Valuation%20Calculator&amp;severity=medium&amp;id=68804d50ad5a09ad00065fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6214-cwe-352-cross-site-request-forgery-c-75d98233</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6214%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20omnishop%20Omnishop%20%E2%80%93%20Mobile%20shop%20apps%20complementing%20your%20WooCommerce%20webshop&amp;severity=medium&amp;id=68804d50ad5a09ad00065fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6190-cwe-862-missing-authorization-in-noo-3631909b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6190%3A%20CWE-862%20Missing%20Authorization%20in%20nootheme%20Realty%20Portal%20%E2%80%93%20Agent&amp;severity=high&amp;id=68804d50ad5a09ad00065fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6261-cwe-79-improper-neutralization-of-in-7612d820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fleetwire%20Fleetwire%20Fleet%20Management&amp;severity=medium&amp;id=68804d51ad5a09ad00065fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5818-cwe-918-server-side-request-forgery--02072c06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5818%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20krasenslavov%20Featured%20Image%20Plus%20%E2%80%93%20Quick%20%26%20Bulk%20Edit%20with%20Unsplash&amp;severity=medium&amp;id=68804d50ad5a09ad00065fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6054-cwe-352-cross-site-request-forgery-c-6e47ca8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6054%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stratosg%20YANewsflash&amp;severity=medium&amp;id=68804d50ad5a09ad00065fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6215-cwe-862-missing-authorization-in-omn-79991d05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6215%3A%20CWE-862%20Missing%20Authorization%20in%20omnishop%20Omnishop%20%E2%80%93%20Mobile%20shop%20apps%20complementing%20your%20WooCommerce%20webshop&amp;severity=medium&amp;id=68804d50ad5a09ad00065fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8060-stack-based-buffer-overflow-in-tenda-be3beea9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8060%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC23&amp;severity=high&amp;id=68803f41ad5a09ad0005fa36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54120-cwe-532-insertion-of-sensitive-info-523dac1d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54120%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20PCL-Community%20PCL2-CE&amp;severity=critical&amp;id=68803137ad5a09ad0004bf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-23-58c673d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-23&amp;severity=medium&amp;id=68817b9cad5a09ad00294202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44109-na-e92fb807</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44109%3A%20n%2Fa&amp;severity=medium&amp;id=688138ddad5a09ad002778ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50477-na-db3eaa20</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50477%3A%20n%2Fa&amp;severity=medium&amp;id=68812e52ad5a09ad00275618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47187-na-8d777e03</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47187%3A%20n%2Fa&amp;severity=high&amp;id=68812aedad5a09ad00274dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46686-na-0002c27d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46686%3A%20n%2Fa&amp;severity=medium&amp;id=68812aedad5a09ad00274df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50481-na-9f102cc8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50481%3A%20n%2Fa&amp;severity=medium&amp;id=68810b29ad5a09ad0026c690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46171-na-3284229c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46171%3A%20n%2Fa&amp;severity=medium&amp;id=68810421ad5a09ad0026a6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46099-na-730ff9e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46099%3A%20n%2Fa&amp;severity=high&amp;id=6880e801ad5a09ad002613b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-disrupting-active-exploitation-of-on-premise-229e1525</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Disrupting%20active%20exploitation%20of%20on-premises%20SharePoint%20vulnerabilities&amp;severity=high&amp;id=6880a8adad5a09ad002321f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43489-cwe-502-deserialization-of-untruste-d23eb673</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43489%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=low&amp;id=68802406a915ff00f7fcc073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43488-cwe-79-improper-neutralization-of-i-bedd3d26</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=low&amp;id=6880207ca915ff00f7fc9719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43487-cwe-250-execution-with-unnecessary--b3b9dbc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43487%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54139-cwe-1021-improper-restriction-of-re-fc343624</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54139%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=6880207ca915ff00f7fc971c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43486-cwe-79-improper-neutralization-of-i-ff602d7b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43485-cwe-532-insertion-of-sensitive-info-3f0c7c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43485%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207da915ff00f7fc9727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43484-cwe-79-improper-neutralization-of-i-c241c559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43483-cwe-321-use-of-hard-coded-cryptogra-c4a6e6b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43483%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880207ca915ff00f7fc9721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43022-cwe-89-improper-neutralization-of-s-e1bf0ec2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43022%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=high&amp;id=68801cf1a915ff00f7fc5980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43021-cwe-1393-use-of-default-password-in-cd4665e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43021%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=68801cf1a915ff00f7fc597d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43020-cwe-78-improper-neutralization-of-s-91d8c7a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43020%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20HP%20Inc.%20Poly%20Clariti%20Manager&amp;severity=medium&amp;id=6880197fa915ff00f7fc2327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-banking-trojan-becomes-first-to-exploit-mic-3102490e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20Banking%20Trojan%20Becomes%20First%20to%20Exploit%20Microsoft%20UI%20Automation%20in%20Active%20Attacks%20on%20Banks%20and%20Crypto%20Platforms&amp;severity=high&amp;id=68800bdca915ff00f7fbead6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7766-cwe-611-improper-restriction-of-xml--979f19f8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7766%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lantronix%20Provisioning%20Manager&amp;severity=high&amp;id=688007daa915ff00f7fbc690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41425-cwe-79-improper-neutralization-of-i-6848e402</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20DuraComm%20Corporation%20SPM-500%20DP-10iN-100-MU&amp;severity=high&amp;id=688007d9a915ff00f7fbc68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53538-cwe-770-allocation-of-resources-wit-82a264cc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53538%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20suricata&amp;severity=high&amp;id=688007daa915ff00f7fbc698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48733-cwe-306-missing-authentication-for--53e51919</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48733%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20DuraComm%20Corporation%20SPM-500%20DP-10iN-100-MU&amp;severity=high&amp;id=688007daa915ff00f7fbc694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54137-cwe-1392-use-of-default-credentials-542fe677</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54137%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20haxtheweb%20issues&amp;severity=high&amp;id=688007daa915ff00f7fbc6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53703-cwe-319-cleartext-transmission-of-s-638293bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53703%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20DuraComm%20Corporation%20SPM-500%20DP-10iN-100-MU&amp;severity=high&amp;id=688007daa915ff00f7fbc69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8011-type-confusion-in-google-chrome-5625a215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8011%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=688000daa915ff00f7fb7275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8010-type-confusion-in-google-chrome-5ab67bf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8010%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=688000daa915ff00f7fb7271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8044-memory-safety-bugs-fixed-in-firefox--ac649862</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8044%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8043-incorrect-url-truncation-in-mozilla--9b38d670</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8043%3A%20Incorrect%20URL%20truncation%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8035-memory-safety-bugs-fixed-in-firefox--b28a8c4a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8035%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb599e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8040-memory-safety-bugs-fixed-in-firefox--40b7f45b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8040%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd51a915ff00f7fb59cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8034-memory-safety-bugs-fixed-in-firefox--f020645b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8034%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb5994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8033-incorrect-javascript-state-machine-f-368b8269</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8033%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=687ffd50a915ff00f7fb598a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8039-search-terms-persisted-in-url-bar-in-b8d56040</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8039%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd51a915ff00f7fb59c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8038-csp-frame-src-was-not-correctly-enfo-e782d592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8038%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8032-xslt-documents-could-bypass-csp-in-m-5a134119</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8032%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb5981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8031-incorrect-url-stripping-in-csp-repor-4791b609</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8031%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd50a915ff00f7fb5978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8030-potential-user-assisted-code-executi-059fa4d7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8030%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb596f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8037-nameless-cookies-shadow-secure-cooki-e7fe8ab5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8037%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd51a915ff00f7fb59b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8036-dns-rebinding-circumvents-cors-in-mo-71640ed3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8036%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb59a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8029-javascript-urls-executed-on-object-a-68bb59b1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8029%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=687ffd50a915ff00f7fb5966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8028-large-branch-table-could-lead-to-tru-6e352fc0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8028%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=687ffd50a915ff00f7fb595c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8027-javascript-engine-only-wrote-partial-f5f10304</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8027%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=687ffd50a915ff00f7fb5952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7724-cwe-78-improper-neutralization-of-sp-75368b26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7724%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20VIGI%20NVR1104H-4P%20V1&amp;severity=high&amp;id=687ff9c9a915ff00f7fb1811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7723-cwe-78-improper-neutralization-of-sp-d38a6e7d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7723%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Systems%20Inc.%20VIGI%20NVR1104H-4P%20V1&amp;severity=high&amp;id=687ff9c9a915ff00f7fb180b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/major-european-healthcare-network-discloses-securi-384ecb82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Major%20European%20healthcare%20network%20discloses%20security%20breach&amp;severity=high&amp;id=687fed54c25aab2414f977e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-and-fbi-warn-of-escalating-interlock-ransomwa-2ad5576b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20and%20FBI%20warn%20of%20escalating%20Interlock%20ransomware%20attacks&amp;severity=high&amp;id=687fed54c25aab2414f977f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coyote-malware-abuses-windows-accessibility-framew-bfc0c9f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coyote%20malware%20abuses%20Windows%20accessibility%20framework%20for%20data%20theft&amp;severity=high&amp;id=687fed54c25aab2414f977ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/credential-theft-and-remote-access-surge-as-allako-6025676f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Credential%20Theft%20and%20Remote%20Access%20Surge%20as%20AllaKore%2C%20PureRAT%2C%20and%20Hijack%20Loader%20Proliferate&amp;severity=high&amp;id=687fd8eca83201eaac1e9ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-confirms-active-exploits-targeting-ise-flaws-746e52e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Confirms%20Active%20Exploits%20Targeting%20ISE%20Flaws%20Enabling%20Unauthenticated%20Root%20Access&amp;severity=high&amp;id=687fd8eca83201eaac1e9ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-reveals-3-chinese-state-hacker-groups-ex-82e98572</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Reveals%203%20Chinese%20State%20Hacker%20Groups%20Exploiting%20SharePoint%20Flaws&amp;severity=high&amp;id=687fc756a83201eaac1e0087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6741-cwe-284-improper-access-control-in-d-16490293</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6741%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=high&amp;id=687fc762a83201eaac1e0104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6523-cwe-1391-use-of-weak-credentials-in--22e32b6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6523%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Devolutions%20Server&amp;severity=critical&amp;id=687fc762a83201eaac1e0101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5042-cwe-125-out-of-bounds-read-in-autode-f16e0172</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5042%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Revit&amp;severity=high&amp;id=687fb947a83201eaac1dc368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7371-cwe-532-insertion-of-sensitive-infor-2b4a576e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7371%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Okta%20Okta%20On-Premises%20Provisioning%20Agent&amp;severity=medium&amp;id=687fb5d2a83201eaac1da8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8019-buffer-overflow-in-shenzhen-libituo--5377682e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8019%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-T310&amp;severity=high&amp;id=687fb240a83201eaac1d91a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36520-cwe-476-null-pointer-dereference-in-1bca116c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36520%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d91a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46354-cwe-617-reachable-assertion-in-bloo-22dd86f9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46354%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d91a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48498-cwe-476-null-pointer-dereference-in-8e718a26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48498%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36512-cwe-617-reachable-assertion-in-bloo-5802e6cd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36512%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d919d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35966-cwe-476-null-pointer-dereference-in-06b770a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35966%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Bloomberg%20Comdb2&amp;severity=high&amp;id=687fb240a83201eaac1d919a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/autofill-phishing-the-silent-scam-that-nobody-warn-ff334441</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Autofill%20Phishing%3A%20The%20Silent%20Scam%20That%20Nobody%20Warned%20You%20About&amp;severity=medium&amp;id=687faec0a83201eaac1d3080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8015-cwe-79-improper-neutralization-of-in-e915941a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8015%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8018-sql-injection-in-code-projects-food--885ac37c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8018%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20Review%20System&amp;severity=medium&amp;id=687fa432a83201eaac1ce8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4878-use-after-free-in-red-hat-red-hat-en-ff288696</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4878%3A%20Use%20After%20Free&amp;severity=low&amp;id=687fa0aca83201eaac1ccc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4295-cwe-297-improper-validation-of-certi-bf07b754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4295%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20HotelRunner%20B2B&amp;severity=medium&amp;id=687f9d28a83201eaac1cb948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4294-cwe-79-improper-neutralization-of-in-19621681</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4294%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HotelRunner%20B2B&amp;severity=medium&amp;id=687f99a5a83201eaac1c9523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8017-stack-based-buffer-overflow-in-tenda-fec90417</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8017%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=687f9622a83201eaac1c861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-microsoft-sharepoint-flaws-in-glob-58e08a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Microsoft%20SharePoint%20Flaws%20in%20Global%20Breaches&amp;severity=high&amp;id=687f8f17a83201eaac1c4886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34141-cwe-79-improper-neutralization-of-i-73966b85</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=medium&amp;id=687f881fa83201eaac1c0ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34140-cwe-639-authorization-bypass-throug-bfa03e54</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34140%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=high&amp;id=687f881fa83201eaac1c0eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34142-cwe-611-improper-restriction-of-xml-101bb8ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34142%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=medium&amp;id=687f881fa83201eaac1c0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34143-cwe-288-authentication-bypass-using-fd92a361</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34143%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ETQ%20Reliance%20CG%20(legacy)&amp;severity=critical&amp;id=687f881fa83201eaac1c0ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-sharepoint-toolshell-attacks-linked-to-c-d18eda1d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Sharepoint%20ToolShell%20attacks%20linked%20to%20Chinese%20hackers&amp;severity=high&amp;id=687f880ea83201eaac1c0e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7705-cwe-489-active-debug-code-in-abb-swi-84cab53a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7705%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20ABB%20Switch%20Actuator%204%20DU-83330&amp;severity=medium&amp;id=687f7d82a83201eaac1bc9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4284-cwe-79-improper-neutralization-of-in-ecc24007</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4284%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=medium&amp;id=687f79fea83201eaac1bbd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4285-cwe-89-improper-neutralization-of-sp-4f85b4fe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4285%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rolantis%20Information%20Technologies%20Agentis&amp;severity=critical&amp;id=687f79fea83201eaac1bbd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-fashion-label-sabos-35-million-customer-rec-5cf37c47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20Fashion%20Label%20SABO%E2%80%99s%203.5%20Million%20Customer%20Records%20Exposed%20Online&amp;severity=medium&amp;id=687f6beda83201eaac1aff68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7900-cwe-639-authorization-bypass-through-b3a35e4b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7900%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TYPO3%20Extension%20%22femanager%22&amp;severity=medium&amp;id=687f686aa83201eaac1af337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7899-cwe-639-authorization-bypass-through-d07d3af0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7899%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20TYPO3%20Extension%20%22powermail%22&amp;severity=medium&amp;id=687f686aa83201eaac1af334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7427-cwe-427-uncontrolled-search-path-ele-52bcecfe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7427%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Arm%20Development%20Studio&amp;severity=medium&amp;id=687f6162a83201eaac1a6039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ring-denies-breach-after-users-report-suspicious-l-2893099d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ring%20denies%20breach%20after%20users%20report%20suspicious%20logins&amp;severity=high&amp;id=687f5ddda83201eaac1a4839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46267-hidden-functionality-in-elecom-colt-a4740220</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46267%3A%20Hidden%20functionality%20in%20ELECOM%20CO.%2CLTD.%20WRC-BE36QS-B&amp;severity=medium&amp;id=687f5defa83201eaac1a48d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53472-improper-neutralization-of-special--1d093052</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53472%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-BE36QS-B&amp;severity=high&amp;id=687f5defa83201eaac1a48da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6187-cwe-862-missing-authorization-in-bse-c537fdc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6187%3A%20CWE-862%20Missing%20Authorization%20in%20bsecuretech%20bSecure%20%E2%80%93%20Your%20Universal%20Checkout&amp;severity=critical&amp;id=687f5a59a83201eaac1a3a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6213-cwe-94-improper-control-of-generatio-192cb55a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6213%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20psauxit%20Nginx%20Cache%20Purge%20Preload&amp;severity=high&amp;id=687f5a59a83201eaac1a3a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7685-cwe-352-cross-site-request-forgery-c-09c2c024</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7685%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sflack%20Like%20%26%20Share%20My%20Site&amp;severity=medium&amp;id=687f5a59a83201eaac1a3a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6082-cwe-200-exposure-of-sensitive-inform-3e46f472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6082%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mia4%20Birth%20Chart%20Compatibility&amp;severity=medium&amp;id=687f5a59a83201eaac1a3a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7692-cwe-288-authentication-bypass-using--b02ff0b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7692%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20gsayed786%20Orion%20Login%20with%20SMS&amp;severity=high&amp;id=687f5a59a83201eaac1a3a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7687-cwe-352-cross-site-request-forgery-c-8ba47490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7687%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anop-goswami%20Latest%20Post%20Accordian%20Slider&amp;severity=medium&amp;id=687f5a59a83201eaac1a3a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-accidentally-discovered-a-remote-code-execu-c5c66589</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20We%20Accidentally%20Discovered%20a%20Remote%20Code%20Execution%20Vulnerability%20in%20ETQ%20Reliance&amp;severity=medium&amp;id=687f4c4ca83201eaac19867a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7645-cwe-22-improper-limitation-of-a-path-4a522fb3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7645%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20htplugins%20Extensions%20For%20CF7%20(Contact%20form%207%20Database%2C%20Conditional%20Fields%20and%20Redirection)&amp;severity=high&amp;id=687f33ada83201eaac18c00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52580-insertion-of-sensitive-information--f6412046</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52580%3A%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20Gift%20Pad%20Co.%2CLtd.%20%22region%20PAY%22%20App%20for%20Android&amp;severity=low&amp;id=687f1b12a83201eaac18426b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6585-cwe-20-improper-input-validation-in--99432f20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6585%3A%20CWE-20%20Improper%20Input%20Validation%20in%20WP%20JobHunt&amp;severity=high&amp;id=687f140aa83201eaac181667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7644-cwe-79-improper-neutralization-of-in-10524d04</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Pixel%20Gallery%20Addons%20for%20Elementor%20%E2%80%93%20Easy%20Grid%2C%20Creative%20Gallery%2C%20Drag%20and%20Drop%20Grid%2C%20Custom%20Grid%20Layout%2C%20Portfolio%20Gallery&amp;severity=medium&amp;id=687f140aa83201eaac181672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7495-cwe-79-improper-neutralization-of-in-f9caac8c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=687f140aa83201eaac18166b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7953-open-redirect-in-sanluan-publiccms-3b5ed5e3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7953%3A%20Open%20Redirect%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=687f097da83201eaac17c927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7952-command-injection-in-totolink-t6-062520ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7952%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=687f0276a83201eaac176971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7951-cross-site-scripting-in-code-project-e7460301</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7951%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Public%20Chat%20Room&amp;severity=medium&amp;id=687efb6ea83201eaac17238c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7950-sql-injection-in-code-projects-publi-24a45e36</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7950%3A%20SQL%20Injection%20in%20code-projects%20Public%20Chat%20Room&amp;severity=medium&amp;id=687efb6ea83201eaac172385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6831-cwe-79-improper-neutralization-of-in-69db3073</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6831%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%20Builder%2C%20Custom%20Login%20Form%2C%20User%20Profile%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=687ef0e1a83201eaac16c9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5240-cwe-79-improper-neutralization-of-in-b56ac038</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20CRM%20and%20Lead%20Management%20by%20vcita&amp;severity=medium&amp;id=687ef0e1a83201eaac16c9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7949-open-redirect-in-sanluan-publiccms-0cff2a74</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7949%3A%20Open%20Redirect%20in%20Sanluan%20PublicCMS&amp;severity=medium&amp;id=687ef0e1a83201eaac16c9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7948-weak-password-recovery-in-jsherp-8b74f0ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7948%3A%20Weak%20Password%20Recovery%20in%20jshERP&amp;severity=medium&amp;id=687ee656a83201eaac1662a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7947-improper-authorization-in-jsherp-01fa9726</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7947%3A%20Improper%20Authorization%20in%20jshERP&amp;severity=medium&amp;id=687edf4ea83201eaac161043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7946-cross-site-scripting-in-phpgurukul-a-7507f923</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7946%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687edf4da83201eaac16103c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-22-19d92fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-22&amp;severity=medium&amp;id=68802773a915ff00f7fcdb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pie-register-wordpress-plugin-3714-authentication--54001d49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pie%20Register%20WordPress%20Plugin%203.7.1.4%20-%20Authentication%20Bypass%20to%20RCE&amp;severity=critical&amp;id=687ffbf0a915ff00f7fb5333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/simple-file-list-wordpress-plugin-422-file-upload--0f6b1453</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Simple%20File%20List%20WordPress%20Plugin%204.2.2%20-%20File%20Upload%20to%20RCE&amp;severity=critical&amp;id=687ffbf0a915ff00f7fb532e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-edge-windows-10-version-1511-cross-site--f86d9880</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Edge%20Windows%2010%20Version%201511%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/joomla-js-jobs-plugin-142-sql-injection-8817e5c5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Joomla%20JS%20Jobs%20plugin%201.4.2%20-%20SQL%20injection&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tenda-fh451-1009-router-stack-based-buffer-overflo-4565834b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tenda%20FH451%201.0.0.9%20Router%20-%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discourse-311-unauthenticated-chat-message-access-87a4dd24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discourse%203.1.1%20-%20Unauthenticated%20Chat%20Message%20Access&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-9aac79c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Telegram%20Bot%20Username&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-667e120d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Operator%20Surname&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-06134dc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Facebook%20Integration%20Page%20Name%20Field&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-598124ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Personal%20Canned%20Messages&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb52a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-7bd62c45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20the%20Chat%20Transfer%20Function&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb529d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/livehelperchat-461-stored-cross-site-scripting-xss-ae320570</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LiveHelperChat%204.61%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)%20via%20Department%20Assignment%20Alias%20Nick%20Field&amp;severity=medium&amp;id=687ffbf0a915ff00f7fb5298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51472-na-31d16e2d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51472%3A%20n%2Fa&amp;severity=medium&amp;id=687ff645a915ff00f7fa9e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51462-na-1236f640</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51462%3A%20n%2Fa&amp;severity=medium&amp;id=687ff645a915ff00f7fa9e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51475-na-840bcd70</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51475%3A%20n%2Fa&amp;severity=medium&amp;id=687fe6fca83201eaac205b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51458-na-7aa88db0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51458%3A%20n%2Fa&amp;severity=medium&amp;id=687fe6fca83201eaac205b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31513-na-16c89da1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31513%3A%20n%2Fa&amp;severity=medium&amp;id=687fe6fca83201eaac205b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31512-na-a20738da</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31512%3A%20n%2Fa&amp;severity=high&amp;id=687fe6fca83201eaac205b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31511-na-81ba05da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31511%3A%20n%2Fa&amp;severity=high&amp;id=687fe6fca83201eaac205b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51479-na-9c21c5ec</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51479%3A%20n%2Fa&amp;severity=medium&amp;id=687fdff8a83201eaac1fae34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51459-na-0ffce093</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51459%3A%20n%2Fa&amp;severity=medium&amp;id=687fdff8a83201eaac1fae30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51471-na-9016d393</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51471%3A%20n%2Fa&amp;severity=medium&amp;id=687fdc70a83201eaac1f06b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48964-na-0dfd0f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48964%3A%20n%2Fa&amp;severity=medium&amp;id=687fce60a83201eaac1e16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51464-na-6e037226</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51464%3A%20n%2Fa&amp;severity=high&amp;id=687fcadba83201eaac1e0de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51481-na-fe0b90be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51481%3A%20n%2Fa&amp;severity=medium&amp;id=687fc762a83201eaac1e00fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51482-na-4165349e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51482%3A%20n%2Fa&amp;severity=high&amp;id=687fc3d2a83201eaac1dedec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51480-na-27d29173</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51480%3A%20n%2Fa&amp;severity=high&amp;id=687fb5d2a83201eaac1da8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51463-na-c78f3b58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51463%3A%20n%2Fa&amp;severity=high&amp;id=687faebba83201eaac1d2ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51863-na-9b08e17a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51863%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51862-na-b073e4a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51862%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51860-na-ccaaa707</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51860%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51859-na-e8da7585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51859%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51858-na-d2b6dbac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51858%3A%20n%2Fa&amp;severity=medium&amp;id=687fa7b7a83201eaac1cfe29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51865-na-a2690f9a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51865%3A%20n%2Fa&amp;severity=high&amp;id=687fa432a83201eaac1ce8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51864-na-d26e9b52</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51864%3A%20n%2Fa&amp;severity=medium&amp;id=687fa432a83201eaac1ce8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51867-na-ef5662a7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51867%3A%20n%2Fa&amp;severity=medium&amp;id=687f9d28a83201eaac1cb94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7945-buffer-overflow-in-d-link-dir-513-8ad04f21</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7945%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=687ed146a83201eaac158b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7944-cross-site-scripting-in-phpgurukul-t-35f78171</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7944%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=687eca36a83201eaac154f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7943-cross-site-scripting-in-phpgurukul-t-149e6266</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7943%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=687ec32da83201eaac151ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7486-cwe-79-improper-neutralization-of-in-1611802b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=687feeee723ca1aca2722c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7942-cross-site-scripting-in-phpgurukul-t-b284539e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7942%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=687ebc26a83201eaac14e010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7941-cross-site-scripting-in-phpgurukul-t-58545ece</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7941%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Time%20Table%20Generator%20System&amp;severity=medium&amp;id=687eb51ea83201eaac14b666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7940-improper-export-of-android-applicati-c38f2a19</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7940%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Genshin%20Albedo%20Cat%20House%20App&amp;severity=medium&amp;id=687eae17a83201eaac148f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54134-cwe-20-improper-input-validation-in-1ca30ba9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54134%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20haxtheweb%20issues&amp;severity=high&amp;id=687eaa92a83201eaac1449a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54129-cwe-204-observable-response-discrep-f409ed1b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54129%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=687eaa92a83201eaac1449a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54128-cwe-79-improper-neutralization-of-i-fa0a28a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=687eaa92a83201eaac1449ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54127-cwe-1188-insecure-default-initializ-8b31ad21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54127%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20haxtheweb%20issues&amp;severity=critical&amp;id=687ea70ea83201eaac142c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7939-unrestricted-upload-in-jerryshensjf--b8ccb5ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7939%3A%20Unrestricted%20Upload%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=687ea70ea83201eaac142c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54122-cwe-918-server-side-request-forgery-dc99c92f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54122%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Manager-io%20Manager&amp;severity=critical&amp;id=687ea70ea83201eaac142c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53832-cwe-77-improper-neutralization-of-s-5b507ad2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53832%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20translated%20lara-mcp&amp;severity=high&amp;id=687ea38ba83201eaac13dd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53528-cwe-79-improper-neutralization-of-i-6185280f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53528%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zmievsa%20cadwyn&amp;severity=high&amp;id=687ea38ba83201eaac13dd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54071-cwe-434-unrestricted-upload-of-file-c0a9c581</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54071%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rommapp%20romm&amp;severity=critical&amp;id=687ea00aa83201eaac13ae4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54121-cwe-770-allocation-of-resources-wit-8e348c9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54121%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20encode%20starlette&amp;severity=medium&amp;id=687ea00aa83201eaac13ae53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7938-authorization-bypass-in-jerryshensjf-422e4794</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7938%3A%20Authorization%20Bypass%20in%20jerryshensjf%20JPACookieShop%20%E8%9B%8B%E7%B3%95%E5%95%86%E5%9F%8EJPA%E7%89%88&amp;severity=medium&amp;id=687ea00aa83201eaac13ae59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7231-cwe-787-out-of-bounds-write-in-invt--3d86137e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7231%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7230-cwe-843-access-of-resource-using-inc-b55cc891</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7230%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7229-cwe-787-out-of-bounds-write-in-invt--e28c5de9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7229%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7228-cwe-787-out-of-bounds-write-in-invt--60e5d545</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7228%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7227-cwe-787-out-of-bounds-write-in-invt--4dbef2a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7227%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20VT-Designer&amp;severity=high&amp;id=687e9c85a83201eaac12fa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7226-cwe-787-out-of-bounds-write-in-invt--7b4fa9a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7226%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7225-cwe-787-out-of-bounds-write-in-invt--7bce161b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7225%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7224-cwe-787-out-of-bounds-write-in-invt--14abc6c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7224%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7223-cwe-787-out-of-bounds-write-in-invt--1be7a0d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7223%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20INVT%20HMITool&amp;severity=high&amp;id=687e9c85a83201eaac12fa82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7222-cwe-787-out-of-bounds-write-in-luxio-0d2eb044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7222%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=687e9c85a83201eaac12fa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7936-sql-injection-in-fuyanglipengjun-pla-373badc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7936%3A%20SQL%20Injection%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=687e9900a83201eaac12e785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7935-sql-injection-in-fuyanglipengjun-pla-e668f7db</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7935%3A%20SQL%20Injection%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=687e91f7a83201eaac12bea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-in-world-leaks-group-claims-dell-data-breach--650b13c3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20In%3A%20World%20Leaks%20Group%20Claims%20Dell%20Data%20Breach%2C%20Leaks%201.3%20TB%20of%20Files&amp;severity=high&amp;id=687e8aeda83201eaac128f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7934-sql-injection-in-fuyanglipengjun-pla-bc5bf149</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7934%3A%20SQL%20Injection%20in%20fuyang_lipengjun%20platform&amp;severity=medium&amp;id=687e8afda83201eaac128fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-dchspy-android-malware-masquerades-as--0121e677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20DCHSpy%20Android%20Malware%20Masquerades%20as%20VPN%20Apps%20to%20Spy%20on%20Dissidents&amp;severity=high&amp;id=687e8769a83201eaac127dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36057-cwe-299-authentication-bypass-using-fd97de1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36057%3A%20CWE-299%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e8777a83201eaac127e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36062-cwe-311-missing-encryption-of-sensi-d08df1eb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36062%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e8777a83201eaac127e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36106-cwe-326-inadequate-encryption-stren-d6856885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36106%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e8777a83201eaac127e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36107-cwe-319-cleartext-transmission-of-s-c0fc2787</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36107%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=medium&amp;id=687e83e6a83201eaac1260fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7933-sql-injection-in-campcodes-sales-and-bdd21a19</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7933%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=687e83e6a83201eaac1260ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7962-cwe-147-improper-neutralization-of-i-cf53bf4c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7962%3A%20CWE-147%20Improper%20Neutralization%20of%20Input%20Terminators%20in%20Eclipse%20Foundation%20Jakarta%20Mail&amp;severity=medium&amp;id=687e7cdfa83201eaac121637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7932-command-injection-in-d-link-dir817l-cec03930</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7932%3A%20Command%20Injection%20in%20D-Link%20DIR%E2%80%91817L&amp;severity=medium&amp;id=687e75daa83201eaac11de9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7717-cwe-862-missing-authorization-in-dru-90dd3097</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7717%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20File%20Download&amp;severity=high&amp;id=687e7252a83201eaac11c513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7716-cwe-79-improper-neutralization-of-in-94fc4d02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Real-time%20SEO%20for%20Drupal&amp;severity=medium&amp;id=687e7252a83201eaac11c510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7715-cwe-79-improper-neutralization-of-in-84ef4bdb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Block%20Attributes&amp;severity=medium&amp;id=687e7252a83201eaac11c50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7392-cwe-79-improper-neutralization-of-in-c74faa4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Cookies%20Addons&amp;severity=medium&amp;id=687e7252a83201eaac11c50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7393-cwe-307-improper-restriction-of-exce-fac20646</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7393%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Drupal%20Mail%20Login&amp;severity=critical&amp;id=687e6ecfa83201eaac11ade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30477-cwe-327-use-of-a-broken-or-risky-cr-5b806635</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30477%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=687e6ecfa83201eaac11addc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7931-unrestricted-upload-in-code-projects-16cebfe6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7931%3A%20Unrestricted%20Upload%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e6ecfa83201eaac11ade9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32744-cwe-434-unrestricted-upload-of-file-dd83108b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32744%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dell%20AppSync&amp;severity=medium&amp;id=687e6ecfa83201eaac11addf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54082-cwe-434-unrestricted-upload-of-file-aca992e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54082%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20marshmallow-packages%20nova-tiptap&amp;severity=high&amp;id=687e6ecfa83201eaac11ade2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-npm-website-used-to-push-malware-via-stolen-t-14e92b28</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20npm%20Website%20Used%20to%20Push%20Malware%20via%20Stolen%20Token%2C%20Multiple%20Packages%20Impacted&amp;severity=medium&amp;id=687e6b48a83201eaac1191d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36603-cwe-611-improper-restriction-of-xml-3eaf06be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36603%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20AppSync&amp;severity=medium&amp;id=687e6b55a83201eaac119236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7930-sql-injection-in-code-projects-churc-25cac622</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7930%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e67c6a83201eaac117515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7929-sql-injection-in-code-projects-churc-18518a37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7929%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e60bea83201eaac114e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7928-sql-injection-in-code-projects-churc-788faca5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7928%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687e59b5a83201eaac111004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7927-sql-injection-in-phpgurukul-online-b-40b2376f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7927%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e52aea83201eaac10603e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6235-cwe-79-improper-neutralization-of-in-59138807</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6235%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Extreme%20Networks%20ExtremeControl&amp;severity=medium&amp;id=687e4ba8a83201eaac10094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4130-cwe-798-use-of-hard-coded-credential-a4d9e865</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4130%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20PAVO%20Inc.%20PAVO%20Pay&amp;severity=high&amp;id=687e4ba8a83201eaac100947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4129-cwe-639-authorization-bypass-through-6cd59583</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4129%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PAVO%20Inc.%20PAVO%20Pay&amp;severity=high&amp;id=687e4ba8a83201eaac100944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7926-cross-site-scripting-in-phpgurukul-o-9e23c3f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7926%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e4822a83201eaac0ff584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7382-vulnerability-in-sophos-sophos-firew-261711b9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7382%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sophos%20Sophos%20Firewall&amp;severity=high&amp;id=687e4119a83201eaac0fbb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7624-cwe-89-improper-neutralization-of-sp-e8e66fff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7624%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sophos%20Sophos%20Firewall&amp;severity=critical&amp;id=687e4119a83201eaac0fbb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6704-cwe-78-improper-neutralization-of-sp-341ae876</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6704%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sophos%20Sophos%20Firewall&amp;severity=critical&amp;id=687e4119a83201eaac0fbb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30192-cwe-345-insufficient-verification-o-0768cd03</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30192%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20PowerDNS%20Recursor&amp;severity=high&amp;id=687e3a12a83201eaac0f8674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7925-cross-site-scripting-in-phpgurukul-o-5aa4d500</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7925%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e368da83201eaac0f54af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-supply-chain-vulnerability-513a53d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20Supply%20Chain%20Vulnerability&amp;severity=medium&amp;id=687e3307a83201eaac0f2f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4040-cwe-639-authorization-bypass-through-96d6b29c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Turpak%20Automatic%20Station%20Monitoring%20System&amp;severity=high&amp;id=687e368da83201eaac0f54ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wave-of-squidloader-malware-targeting-financia-626aef38</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Wave%20of%20SquidLoader%20Malware%20Targeting%20Financial%20Institutions&amp;severity=medium&amp;id=687e368da83201eaac0f547c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2301-cwe-639-authorization-bypass-through-7d296c12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2301%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Akbim%20Software%20Online%20Exam%20Registration&amp;severity=medium&amp;id=687e2889a83201eaac0edba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-confirms-active-exploits-of-sharepoint-f-92ddbf8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Confirms%20Active%20Exploits%20of%20SharePoint%20Flaws%2C%20Urges%20Immediate%20Patching%20for%20On-Prem%20Users&amp;severity=high&amp;id=687e287ba83201eaac0eda9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-internet-red-button-a-2016-bug-still-lets-anyo-9f96a1c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Internet%20Red%20Button%3A%20a%202016%20Bug%20Still%20Lets%20Anyone%20Kill%20Solar%20Farms%20in%203%20Clicks&amp;severity=medium&amp;id=687e2177a83201eaac0ea5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5681-cwe-639-authorization-bypass-through-f5c2bdc5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5681%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Turtek%20Software%20Eyotek&amp;severity=medium&amp;id=687e2174a83201eaac0ea5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7924-cross-site-scripting-in-phpgurukul-o-e0719b61</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7924%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Banquet%20Booking%20System&amp;severity=medium&amp;id=687e2174a83201eaac0ea5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41459-cwe-287-improper-authentication-in--2b44756d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41459%3A%20CWE-287%20Improper%20Authentication%20in%20Two%20App%20Studio%20Journey&amp;severity=high&amp;id=687e2174a83201eaac0ea5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41458-cwe-312-cleartext-storage-of-sensit-21250ef6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41458%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Two%20App%20Studio%20Journey&amp;severity=medium&amp;id=687e2174a83201eaac0ea5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deedrat-backdoor-enhanced-with-advanced-capabiliti-50d0bea8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeedRAT%20Backdoor%20Enhanced%20with%20Advanced%20Capabilities&amp;severity=medium&amp;id=687e1a6da83201eaac0b9e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nailaolocker-ransomwares-cheese-24f22c75</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NailaoLocker%20Ransomware&apos;s%20&apos;Cheese&apos;&amp;severity=medium&amp;id=687e1a6da83201eaac0b9ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ghostcontainer-malware-hits-high-value-ms-exch-9ed86ebf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20GhostContainer%20Malware%20Hits%20High-Value%20MS%20Exchange%20Servers%20in%20Asia&amp;severity=high&amp;id=687e16e7a83201eaac0b8537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soc-files-an-apt41-attack-on-government-it-service-a829853f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SOC%20files%3A%20an%20APT41%20attack%20on%20government%20IT%20services%20in%20Africa&amp;severity=medium&amp;id=687e24f8a83201eaac0ebeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-novel-technique-for-sql-injection-in-pdos-prepar-dce16944</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Novel%20Technique%20for%20SQL%20Injection%20in%20PDO%E2%80%99s%20Prepared%20Statements&amp;severity=medium&amp;id=687e0fe3a83201eaac0b477e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50151-cwe-20-in-apache-software-foundatio-656c3182</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50151%3A%20CWE-20%20in%20Apache%20Software%20Foundation%20Apache%20Jena&amp;severity=high&amp;id=687e0c60a83201eaac0b17aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41681-cwe-79-improper-neutralization-of-i-b4d8788c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b17a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41679-cwe-787-out-of-bounds-write-in-mb-c-badea641</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41679%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b17a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41678-cwe-89-improper-neutralization-of-s-66a904f0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41678%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b179e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49656-cwe-22-improper-limitation-of-a-pat-02ff9e03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49656%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Jena&amp;severity=high&amp;id=687e0c60a83201eaac0b17a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41677-cwe-400-uncontrolled-resource-consu-2a88be1a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41677%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b179b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41676-cwe-400-uncontrolled-resource-consu-39062adc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41676%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=medium&amp;id=687e0c60a83201eaac0b1798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41675-cwe-78-improper-neutralization-of-s-2a330b9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41675%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=high&amp;id=687e0c60a83201eaac0b1795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41674-cwe-78-improper-neutralization-of-s-cf00213a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41674%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=high&amp;id=687e0c60a83201eaac0b1792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41673-cwe-78-improper-neutralization-of-s-6c702528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41673%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=high&amp;id=687e0c5fa83201eaac0b178b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hard-coded-credentials-found-in-hpe-instant-on-dev-6537babd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hard-Coded%20Credentials%20Found%20in%20HPE%20Instant%20On%20Devices%20Allow%20Admin%20Access&amp;severity=high&amp;id=687e08d8a83201eaac0b013d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1469-cwe-639-authorization-bypass-through-ad2ed1bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1469%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Turtek%20Software%20Eyotek&amp;severity=high&amp;id=687e7cdfa83201eaac12163e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/getting-to-the-crux-ransomware-of-the-matter-c9724459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Getting%20to%20the%20Crux%20(Ransomware)%20of%20the%20Matter&amp;severity=medium&amp;id=687dfac9a83201eaac0a9634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4570-cwe-798-use-of-hard-coded-credential-a98c2291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4570%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20ASUS%20MyASUS&amp;severity=medium&amp;id=687df3eaa83201eaac0a51f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4569-cwe-798-use-of-hard-coded-credential-21e26e44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4569%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20ASUS%20MyASUS&amp;severity=high&amp;id=687df3eaa83201eaac0a51ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4049-cwe-798-use-of-hard-coded-credential-c463c968</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4049%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SIGNUM-NET%20FARA&amp;severity=high&amp;id=687df3eaa83201eaac0a51f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7354-cwe-79-improper-neutralization-of-in-77ec0928</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=687df03ea83201eaac0a3ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7369-cwe-352-cross-site-request-forgery-c-927127bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7369%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=687df03ea83201eaac0a3aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4685-cwe-79-improper-neutralization-of-in-d6527a34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gutentor%20Gutentor%20%E2%80%93%20Gutenberg%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=687df03ea83201eaac0a3ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0664-cwe-94-improper-control-of-generatio-384aec28</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0664%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Trellix%20Trellix%20Endpoint%20Security%20(HX)%20Agent&amp;severity=medium&amp;id=687de936a83201eaac0a1148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7920-cwe-79-improper-neutralization-of-in-f8098742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=medium&amp;id=687de936a83201eaac0a114b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7344-cwe-648-incorrect-use-of-privileged--508fad1a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7344%3A%20CWE-648%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Digiwin%20EAI&amp;severity=high&amp;id=687de5b2a83201eaac09f824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7343-cwe-89-improper-neutralization-of-sp-c15d63be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7343%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Digiwin%20SFT&amp;severity=critical&amp;id=687de5b2a83201eaac09f820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7921-cwe-121-stack-based-buffer-overflow--013ca7cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7921%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ASKEY%20RTF8207w&amp;severity=critical&amp;id=687e3a12a83201eaac0f867d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24938-vulnerability-in-nokia-wavesuite-no-f11f29c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24938%3A%20Vulnerability%20in%20Nokia%20WaveSuite%20NOC&amp;severity=high&amp;id=687ea3e3a83201eaac13fa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24937-vulnerability-in-nokia-wavesuite-no-31e2640b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24937%3A%20Vulnerability%20in%20Nokia%20WaveSuite%20NOC&amp;severity=critical&amp;id=687ea3e3a83201eaac13fa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24936-vulnerability-in-nokia-wavesuite-no-b5fb23f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24936%3A%20Vulnerability%20in%20Nokia%20WaveSuite%20NOC&amp;severity=critical&amp;id=687ddeaaa83201eaac09d0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7919-cwe-200-exposure-of-sensitive-inform-8eb3e492</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7919%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=high&amp;id=687ddeaaa83201eaac09d0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7918-cwe-89-improper-neutralization-of-sp-0d799cbf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7918%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=critical&amp;id=687ddb26a83201eaac09b82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7917-cwe-434-unrestricted-upload-of-file--7d6ea86b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7917%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Simopro%20Technology%20WinMatrix3%20Web%20package&amp;severity=high&amp;id=687ddb26a83201eaac09b827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7916-cwe-502-deserialization-of-untrusted-42175960</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7916%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Simopro%20Technology%20WinMatrix3&amp;severity=critical&amp;id=687ddb26a83201eaac09b82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7915-sql-injection-in-chanjet-crm-f0d58d03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7915%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=687d8dcea83201eaac05f84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7914-buffer-overflow-in-tenda-ac6-00ac202d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7914%3A%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=687d8dcea83201eaac05f843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-21-12ab2ba5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-21&amp;severity=medium&amp;id=687ed83da83201eaac15d6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51868-na-ad4b75f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51868%3A%20n%2Fa&amp;severity=high&amp;id=687ea00aa83201eaac13ae4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52362-na-515bc755</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52362%3A%20n%2Fa&amp;severity=critical&amp;id=687e957ba83201eaac12cf69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51869-na-fe89872d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51869%3A%20n%2Fa&amp;severity=high&amp;id=687e957ba83201eaac12cf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51403-na-79d6d921</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51403%3A%20n%2Fa&amp;severity=medium&amp;id=687e91f7a83201eaac12bea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51401-na-5c7e78b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51401%3A%20n%2Fa&amp;severity=medium&amp;id=687e91f7a83201eaac12be9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51400-na-fdd578e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51400%3A%20n%2Fa&amp;severity=medium&amp;id=687e91f7a83201eaac12be98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51398-na-8c52cec6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51398%3A%20n%2Fa&amp;severity=medium&amp;id=687e8e75a83201eaac12a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51397-na-04c99d20</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51397%3A%20n%2Fa&amp;severity=medium&amp;id=687e8e75a83201eaac12a8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51396-na-2bd721b2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51396%3A%20n%2Fa&amp;severity=medium&amp;id=687e8e75a83201eaac12a8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36846-na-8ac1f689</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36846%3A%20n%2Fa&amp;severity=critical&amp;id=687e8063a83201eaac1235dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36845-na-10a01973</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36845%3A%20n%2Fa&amp;severity=high&amp;id=687e8063a83201eaac1235d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44654-na-8a97698a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44654%3A%20n%2Fa&amp;severity=critical&amp;id=687e7cdfa83201eaac12163a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44652-na-6dad1efd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44652%3A%20n%2Fa&amp;severity=high&amp;id=687e795da83201eaac11f321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44653-na-35d49208</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44653%3A%20n%2Fa&amp;severity=high&amp;id=687e75daa83201eaac11de97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43720-na-6f0d7d89</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43720%3A%20n%2Fa&amp;severity=medium&amp;id=687e75daa83201eaac11de92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44649-na-681b55f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44649%3A%20n%2Fa&amp;severity=high&amp;id=687e7252a83201eaac11c506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52374-na-f4af7ff3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52374%3A%20n%2Fa&amp;severity=medium&amp;id=687e67c6a83201eaac117510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52373-na-e5505ca0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52373%3A%20n%2Fa&amp;severity=medium&amp;id=687e67c6a83201eaac11750b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52372-na-ef5a0eb4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52372%3A%20n%2Fa&amp;severity=medium&amp;id=687e67c6a83201eaac117506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44655-na-32db8bc1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44655%3A%20n%2Fa&amp;severity=critical&amp;id=687e6442a83201eaac116126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44657-na-d10a4abc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44657%3A%20n%2Fa&amp;severity=low&amp;id=687e60bea83201eaac114e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44651-na-550ce09a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44651%3A%20n%2Fa&amp;severity=high&amp;id=687e60bea83201eaac114e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44647-na-b2ad09de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44647%3A%20n%2Fa&amp;severity=high&amp;id=687e60bea83201eaac114e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44658-na-a86b4a3e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44658%3A%20n%2Fa&amp;severity=critical&amp;id=687e60bea83201eaac114e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44650-na-db18554a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44650%3A%20n%2Fa&amp;severity=high&amp;id=687e5d5aa83201eaac112432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43977-na-173e65c1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43977%3A%20n%2Fa&amp;severity=medium&amp;id=687e59b5a83201eaac110fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43976-na-c481b550</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43976%3A%20n%2Fa&amp;severity=medium&amp;id=687e59b5a83201eaac110ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46119-na-76e6d0cb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46119%3A%20n%2Fa&amp;severity=medium&amp;id=687e52aea83201eaac106039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46118-na-65a338d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46118%3A%20n%2Fa&amp;severity=medium&amp;id=687e52aea83201eaac106034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46117-na-8c279b1d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46117%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac10602f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46116-na-9ae758ca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46116%3A%20n%2Fa&amp;severity=high&amp;id=687e52aea83201eaac10602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46123-na-26b13838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46123%3A%20n%2Fa&amp;severity=high&amp;id=687e52aea83201eaac106025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46122-na-437d7aff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46122%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac106020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46121-na-76018490</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46121%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac10601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46120-na-b2b898e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46120%3A%20n%2Fa&amp;severity=critical&amp;id=687e52aea83201eaac106016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7913-buffer-overflow-in-totolink-t6-407083d4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7913%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=687d7fbea83201eaac054889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7912-buffer-overflow-in-totolink-t6-06a37e0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7912%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=687d78b6a83201eaac052fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7911-stack-based-buffer-overflow-in-d-lin-dee35d9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7911%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687d71aea83201eaac051b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53771-cwe-22-improper-limitation-of-a-pat-d5dfe54f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53771%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=687d6e36a83201eaac051192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7910-stack-based-buffer-overflow-in-d-lin-65d7ede2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7910%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=687d6aa6a83201eaac050721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7909-stack-based-buffer-overflow-in-d-lin-6ceb64c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7909%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=687d639ea83201eaac04f353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7908-stack-based-buffer-overflow-in-d-lin-9e9b1d9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7908%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687d5c96a83201eaac04e39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7907-use-of-default-credentials-in-yangzo-0ca397e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7907%3A%20Use%20of%20Default%20Credentials%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d558ea83201eaac0495d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-interpreter-open-ports-36cb9a8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20Interpreter%20Open%20Ports&amp;severity=medium&amp;id=687d4e88a83201eaac04527c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/path-traversal-in-vim-tar-archive-cve-2025-53905-d56a0a33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Path%20traversal%20in%20vim%20(tar%20archive)%20CVE-2025-53905&amp;severity=high&amp;id=687d4b04a83201eaac0440f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/path-traversal-in-vim-zip-archive-cve-2025-53906-66594d58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Path%20traversal%20in%20vim%20(zip%20archive)%20CVE-2025-53906&amp;severity=high&amp;id=687d4b04a83201eaac0440fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tips-on-detecting-suspicious-sign-in-activity-from-d1ce2c60</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tips%20on%20detecting%20suspicious%20sign%20in%20activity%20from%20phishing%20attack%20(AiTM)!%20(Using%20Entra%20ID%20%26%20M365%20as%20example)&amp;severity=low&amp;id=687d4780a83201eaac0438f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7906-unrestricted-upload-in-yangzongzhuan-1486dfb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7906%3A%20Unrestricted%20Upload%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d477ea83201eaac0438e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/your-loyalty-card-is-a-liability-lessons-from-the--ccd8cd75</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Your%20Loyalty%20Card%20is%20a%20Liability%3A%20Lessons%20from%20the%20Co-op%20Attack&amp;severity=medium&amp;id=687d4077a83201eaac0424f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7905-sql-injection-in-itsourcecode-insura-885eac68</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7905%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=687d4076a83201eaac0424db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7904-sql-injection-in-itsourcecode-insura-f0da2d13</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7904%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=687d2457a83201eaac03c8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squidloader-malware-campaign-hits-hong-kong-financ-992fd7a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquidLoader%20Malware%20Campaign%20Hits%20Hong%20Kong%20Financial%20Firms&amp;severity=medium&amp;id=687d1d4da83201eaac03a3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7903-improper-restriction-of-rendered-ui--83a2e539</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7903%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d1d5fa83201eaac03a422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7902-cross-site-scripting-in-yangzongzhua-094a73cd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7902%3A%20Cross%20Site%20Scripting%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d1647a83201eaac03681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7901-cross-site-scripting-in-yangzongzhua-a4ac7f02</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7901%3A%20Cross%20Site%20Scripting%20in%20yangzongzhuan%20RuoYi&amp;severity=medium&amp;id=687d0f3fa83201eaac034b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7898-unrestricted-upload-in-codecanyon-id-60472d8e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7898%3A%20Unrestricted%20Upload%20in%20Codecanyon%20iDentSoft&amp;severity=medium&amp;id=687d0bbba83201eaac03072c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-injected-into-5-npm-packages-after-maintai-b1f82177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Injected%20into%205%20npm%20Packages%20After%20Maintainer%20Tokens%20Stolen%20in%20Phishing%20Attack&amp;severity=high&amp;id=687d0835a83201eaac02fba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-unpatched-sharepoint-zero-day-actively-ex-504c98ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Unpatched%20SharePoint%20Zero-Day%20Actively%20Exploited%2C%20Breaches%2075%2B%20Company%20Servers&amp;severity=critical&amp;id=687d0835a83201eaac02fb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-fortinet-fortiweb-flaw-to-its-known-e-4b453b96</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Fortinet%20FortiWeb%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=687d0835a83201eaac02fbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7897-missing-authentication-in-harry0703--690bb272</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7897%3A%20Missing%20Authentication%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=687d085ca83201eaac02fc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7896-path-traversal-in-harry0703-moneypri-cf3ffc62</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7896%3A%20Path%20Traversal%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=687d04b1a83201eaac02eded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46385-cwe-918-server-side-request-forgery-2259e85c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46385%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Emby%20Windows&amp;severity=high&amp;id=687d04b1a83201eaac02edea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46384-cwe-434-unrestricted-upload-of-file-663fa995</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46384%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Emby%20Windows&amp;severity=high&amp;id=687d04b1a83201eaac02ede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46383-cwe-79-improper-neutralization-of-i-b2f8ac5b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Emby%20Windows&amp;severity=medium&amp;id=687d012da83201eaac02df46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7895-unrestricted-upload-in-harry0703-mon-3785f7fb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7895%3A%20Unrestricted%20Upload%20in%20harry0703%20MoneyPrinterTurbo&amp;severity=medium&amp;id=687d012da83201eaac02df49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46382-cwe-200-exposure-of-sensitive-infor-3c978e36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46382%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20CyberArk%20IDP&amp;severity=medium&amp;id=687d012da83201eaac02df43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7894-sql-injection-in-onyx-4534c243</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7894%3A%20SQL%20Injection%20in%20Onyx&amp;severity=medium&amp;id=687cfa26a83201eaac02c79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copy-paste-pitfalls-revealing-the-applocker-bypass-4e999d61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Copy-Paste%20Pitfalls%3A%20Revealing%20the%20AppLocker%20Bypass%20Risks%20in%20The%20Suggested%20Block-list%20Policy&amp;severity=medium&amp;id=687cf6a2a83201eaac02ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7893-improper-export-of-android-applicati-8341d6b2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7893%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Foresight%20News%20App&amp;severity=medium&amp;id=687cf6a1a83201eaac02ba78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-groups-launder-580m-in-india-using-fake-ap-f798b95f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Groups%20Launder%20%24580M%20in%20India%20Using%20Fake%20Apps%20and%20Mule%20Accounts&amp;severity=medium&amp;id=687cef97a83201eaac02937d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7892-improper-export-of-android-applicati-f7da4b34</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7892%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20IDnow%20App&amp;severity=medium&amp;id=687cefa2a83201eaac029405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7891-improper-export-of-android-applicati-5a8db4fb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7891%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20InstantBits%20Web%20Video%20Cast%20App&amp;severity=medium&amp;id=687cec15a83201eaac028ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7890-improper-export-of-android-applicati-1ddf52f1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7890%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Dunamu%20StockPlus%20App&amp;severity=medium&amp;id=687ce891a83201eaac0277de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7889-improper-export-of-android-applicati-519d1afc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7889%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20CallApp%20Caller%20ID%20App&amp;severity=medium&amp;id=687ce891a83201eaac0277d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7888-sql-injection-in-tduckcloud-tduck-pl-0f47e128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7888%3A%20SQL%20Injection%20in%20TDuckCloud%20tduck-platform&amp;severity=medium&amp;id=687cde05a83201eaac025eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7887-cross-site-scripting-in-zavy86-wikid-500ba14e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7887%3A%20Cross%20Site%20Scripting%20in%20Zavy86%20WikiDocs&amp;severity=medium&amp;id=687cd6fea83201eaac023924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7886-sql-injection-in-pmticket-project-ma-5177d1de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7886%3A%20SQL%20Injection%20in%20pmTicket%20Project-Management-Software&amp;severity=medium&amp;id=687cd6fea83201eaac02392c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7885-cross-site-scripting-in-huashengdun--6f19c25f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7885%3A%20Cross%20Site%20Scripting%20in%20Huashengdun%20WebSSH&amp;severity=medium&amp;id=687cd37aa83201eaac022c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7884-insufficient-verification-of-data-au-7e790c43</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7884%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Eluktronics%20Control%20Center&amp;severity=medium&amp;id=687ccffaa83201eaac0223e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7883-command-injection-in-eluktronics-con-8030c538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7883%3A%20Command%20Injection%20in%20Eluktronics%20Control%20Center&amp;severity=high&amp;id=687ccc72a83201eaac021a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7882-improper-restriction-of-excessive-au-e924f814</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7882%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Mercusys%20MW301R&amp;severity=low&amp;id=687cc56aa83201eaac01f2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7881-weak-password-recovery-in-mercusys-m-1cb5d413</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7881%3A%20Weak%20Password%20Recovery%20in%20Mercusys%20MW301R&amp;severity=medium&amp;id=687cbe62a83201eaac01e1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/radiology-associates-of-richmond-data-breach-impac-535db01f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Radiology%20Associates%20of%20Richmond%20data%20breach%20impacts%201.4M%20people&amp;severity=high&amp;id=687cbadca83201eaac01cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7880-unrestricted-upload-in-metasoft-meta-6d19fa8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7880%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687cb75aa83201eaac01c6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7879-unrestricted-upload-in-metasoft-meta-2dddc3f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7879%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687cb3d6a83201eaac01bf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7878-unrestricted-upload-in-metasoft-meta-f3e93479</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7878%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687cacd0a83201eaac01ab53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/legless-ipv6-penetration-testing-real-attacks-via--70771ad7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Legless%3A%20IPv6%20Penetration%20Testing%20%E2%80%93%20Real%20Attacks%20via%20RA%2C%20RDNSS%2C%20and%20DHCPv6%20Spoofing&amp;severity=medium&amp;id=687ca5c9a83201eaac018805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7877-unrestricted-upload-in-metasoft-meta-79ed3d95</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7877%3A%20Unrestricted%20Upload%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687ca5c8a83201eaac0187fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7876-deserialization-in-metasoft-metacrm-6283c364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7876%3A%20Deserialization%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687d5258a83201eaac048f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7875-improper-authentication-in-metasoft--7e2e6e84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7875%3A%20Improper%20Authentication%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687c9b3ca83201eaac016794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7874-information-disclosure-in-metasoft-m-9ab64bbf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7874%3A%20Information%20Disclosure%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687c97b8a83201eaac015f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7873-sql-injection-in-metasoft-metacrm-f0a18833</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7873%3A%20SQL%20Injection%20in%20Metasoft%20%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6%20MetaCRM&amp;severity=medium&amp;id=687c9435a83201eaac01545e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7872-cross-site-scripting-in-portabilis-i-d1ac9ae0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7872%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=687c90b1a83201eaac014c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7871-cross-site-scripting-in-portabilis-i-cc9c5eba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7871%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=687c89a8a83201eaac0133f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7870-cross-site-scripting-in-portabilis-i-4367f702</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7870%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Diario&amp;severity=medium&amp;id=687c82a0a83201eaac0120cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7869-cross-site-scripting-in-portabilis-i-0c2d0e3f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7869%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c7b98a83201eaac010a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7868-cross-site-scripting-in-portabilis-i-cae7d19c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7868%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c7490a83201eaac00f915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7867-cross-site-scripting-in-portabilis-i-a244967d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7867%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c7115a83201eaac00e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7866-cross-site-scripting-in-portabilis-i-480ac9ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7866%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=687c6a04a83201eaac00d1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7865-cross-site-scripting-in-thinkgem-jee-5b89fe82</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7865%3A%20Cross%20Site%20Scripting%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687c62fca83201eaac00bf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7864-unrestricted-upload-in-thinkgem-jees-8137d5f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7864%3A%20Unrestricted%20Upload%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687c5870a83201eaac007e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7863-open-redirect-in-thinkgem-jeesite-10e31af1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7863%3A%20Open%20Redirect%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687c5870a83201eaac007e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7862-missing-authentication-in-totolink-t-1cd94c9a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7862%3A%20Missing%20Authentication%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=687c5870a83201eaac007e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53770-cwe-502-deserialization-of-untruste-5926caaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53770%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=critical&amp;id=687c4361a83201eaac002e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7861-sql-injection-in-code-projects-churc-cb81167c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7861%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687c4361a83201eaac002e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7860-sql-injection-in-code-projects-churc-89009a73</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7860%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687c3c51a83201eaac0015b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7859-sql-injection-in-code-projects-churc-3c936e0d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7859%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687c3c51a83201eaac0015ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-20-80df855b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-20&amp;severity=medium&amp;id=687d86bda83201eaac055fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54319-cwe-532-insertion-of-sensitive-info-8aa43b93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54319%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Westermo%20WeOS&amp;severity=medium&amp;id=687d5912a83201eaac049d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47917-cwe-416-use-after-free-in-mbed-mbed-988e278c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47917%3A%20CWE-416%20Use%20After%20Free%20in%20Mbed%20mbedtls&amp;severity=high&amp;id=687d396ea83201eaac04070d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49087-cwe-385-covert-timing-channel-in-mb-cca547e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49087%3A%20CWE-385%20Covert%20Timing%20Channel%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=687d35eaa83201eaac03f7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48965-cwe-696-incorrect-behavior-order-in-64610afc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48965%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=687d2ee3a83201eaac03e1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54314-cwe-78-improper-neutralization-of-s-86da8d7b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54314%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20rubyonrails%20Thor&amp;severity=low&amp;id=687c5870a83201eaac007e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7858-cross-site-scripting-in-phpgurukul-a-661276ae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7858%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687c31c4a83201eaacfff306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7857-cross-site-scripting-in-phpgurukul-a-14242e4d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7857%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687c23b5a83201eaacffcf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7856-cross-site-scripting-in-phpgurukul-a-57199ab6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7856%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687c0e9da83201eaacff8e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7855-stack-based-buffer-overflow-in-tenda-018584a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7855%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687c0b19a83201eaacff80da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7854-stack-based-buffer-overflow-in-tenda-3003935a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7854%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687c0411a83201eaacff392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7853-stack-based-buffer-overflow-in-tenda-5744c250</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7853%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687bf983a83201eaacfeeb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7840-cross-site-scripting-in-campcodes-on-57d36577</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7840%3A%20Cross%20Site%20Scripting%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687be0e9a83201eaacfe8872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7838-sql-injection-in-campcodes-online-mo-7dd47f9c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7838%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687bd65da83201eaacfe5c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7837-buffer-overflow-in-totolink-t6-47ae9058</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7837%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=687bd2d9a83201eaacfe4b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7836-command-injection-in-d-link-dir-816l-aede67cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7836%3A%20Command%20Injection%20in%20D-Link%20DIR-816L&amp;severity=medium&amp;id=687bcf55a83201eaacfe3cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7834-cross-site-request-forgery-in-phpgur-2584cc85</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7834%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=687bc4caa83201eaacfe203e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7833-sql-injection-in-code-projects-churc-0adb6b4c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7833%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bc146a83201eaacfe0a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7832-sql-injection-in-code-projects-churc-1c75bc02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7832%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bba43a83201eaacfdeef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7831-sql-injection-in-code-projects-churc-efd498da</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7831%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bb6baa83201eaacfdb770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7830-sql-injection-in-code-projects-churc-b240fbad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7830%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687bafb2a83201eaacfd972f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7829-sql-injection-in-code-projects-churc-f20287bc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7829%3A%20SQL%20Injection%20in%20code-projects%20Church%20Donation%20System&amp;severity=medium&amp;id=687b9e1ea83201eaacfd2240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7824-xml-external-entity-reference-in-jin-45cea991</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7824%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=687b9a9aa83201eaacfd0ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7823-xml-external-entity-reference-in-jin-033b659c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7823%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=687b9719a83201eaacfd01ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7819-cross-site-scripting-in-phpgurukul-a-fa545cf5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7819%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b900ea83201eaacfcebd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7818-cross-site-scripting-in-phpgurukul-a-d33a386e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7818%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b8c8aa83201eaacfcde4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7817-cross-site-scripting-in-phpgurukul-a-61fdb8ef</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7817%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b8582a83201eaacfcbe2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7816-cross-site-scripting-in-phpgurukul-a-97933abb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7816%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b7773a83201eaacfc78c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-alcohol-retailer-winelab-closes-stores-aft-f3b6cd88</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20alcohol%20retailer%20WineLab%20closes%20stores%20after%20ransomware%20attack&amp;severity=high&amp;id=687b706aa83201eaacfc5369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ivanti-zero-days-exploited-to-drop-mdifyloader-and-adc5d978</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ivanti%20Zero-Days%20Exploited%20to%20Drop%20MDifyLoader%20and%20Launch%20In-Memory%20Cobalt%20Strike%20Attacks&amp;severity=high&amp;id=687b706aa83201eaacfc5365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authorities-released-free-decryptor-for-phobos-and-af644a69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authorities%20released%20free%20decryptor%20for%20Phobos%20and%208base%20ransomware&amp;severity=medium&amp;id=687b6ce5a83201eaacfc42e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/arch-linux-pulls-aur-packages-that-installed-chaos-8ef5ccd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Arch%20Linux%20pulls%20AUR%20packages%20that%20installed%20Chaos%20RAT%20malware&amp;severity=high&amp;id=687b6ce5a83201eaacfc42e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-crushftp-zero-day-exploited-in-attacks-to-hija-c8028696</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20CrushFTP%20zero-day%20exploited%20in%20attacks%20to%20hijack%20servers&amp;severity=critical&amp;id=687b6ce5a83201eaacfc42e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7815-cross-site-scripting-in-phpgurukul-a-b2aeef3a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7815%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=687b6962a83201eaacfc2802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6997-cwe-79-improper-neutralization-of-in-2933b6b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeREX%20ThemeREX%20Addons&amp;severity=medium&amp;id=687b5b52a83201eaacfba692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6720-cwe-862-missing-authorization-in-ban-dd34e35e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6720%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20MORKVA%20Vchasno%20Kasa%20Integration&amp;severity=medium&amp;id=687b3122a83201eaacfa3af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6721-cwe-862-missing-authorization-in-ban-396489c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6721%3A%20CWE-862%20Missing%20Authorization%20in%20bandido%20MORKVA%20Vchasno%20Kasa%20Integration&amp;severity=medium&amp;id=687b3122a83201eaacfa3af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29757-cwe-863-incorrect-authorization-in--2ccb76fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29757%3A%20CWE-863%20Incorrect%20Authorization%20in%20Growatt%20https%3A%2F%2Foss.growatt.com&amp;severity=critical&amp;id=687b2d9ea83201eaacfa23a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7697-cwe-502-deserialization-of-untrusted-0842daa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7697%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Integration%20for%20Google%20Sheets%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=critical&amp;id=687b1f8ea83201eaacf9c494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7696-cwe-502-deserialization-of-untrusted-1a8cade9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7696%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20crmperks%20Integration%20for%20Pipedrive%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=critical&amp;id=687b1f8ea83201eaacf9c48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7669-cwe-352-cross-site-request-forgery-c-e5ce98b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7669%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20avishika%20Avishi%20WP%20PayPal%20Payment%20Button&amp;severity=medium&amp;id=687b036ea83201eaacf8db4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7653-cwe-79-improper-neutralization-of-in-5977c0ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vloo%20EPay.bg%20Payments&amp;severity=medium&amp;id=687b036ea83201eaacf8db3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7658-cwe-79-improper-neutralization-of-in-acb9a82f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codents%20Temporarily%20Hidden%20Content&amp;severity=medium&amp;id=687b036ea83201eaacf8db43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7661-cwe-79-improper-neutralization-of-in-91da8e9e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxomatos%20Partnersk%C3%BD%20syst%C3%A9m%20Martinus&amp;severity=medium&amp;id=687b036ea83201eaacf8db48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7655-cwe-79-improper-neutralization-of-in-177ff9c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tkrivickas%20Live%20Stream%20Badger&amp;severity=medium&amp;id=687b036ea83201eaacf8db3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-19-c9a8c925</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-19&amp;severity=medium&amp;id=687c353da83201eaacfff7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54313-cwe-506-embedded-malicious-code-in--797dbbb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54313%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20prettier%20eslint-config-prettier&amp;severity=high&amp;id=687bcf55a83201eaacfe3cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52924-cwe-89-improper-neutralization-of-s-6be6d612</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52924%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20One%20Identity%20OneLogin&amp;severity=medium&amp;id=687b036ea83201eaacf8db36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27210-vulnerability-in-nodejs-node-098966ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27210%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=687ad236a83201eaacf76194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27209-vulnerability-in-nodejs-node-47bd4ec1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27209%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=687ad236a83201eaacf76191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7814-sql-injection-in-code-projects-food--2b6031a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7814%3A%20SQL%20Injection%20in%20code-projects%20Food%20Ordering%20Review%20System&amp;severity=medium&amp;id=687ac430a83201eaacf71464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7807-stack-based-buffer-overflow-in-tenda-0113a544</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7807%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687ab616a83201eaacf6a16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7806-stack-based-buffer-overflow-in-tenda-4e27971a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7806%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687ab292a83201eaacf699b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7805-stack-based-buffer-overflow-in-tenda-7558b43d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7805%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687aa483a83201eaacf5fc2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7803-cross-site-scripting-in-descreekert--dfc722ef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7803%3A%20Cross%20Site%20Scripting%20in%20descreekert%20wx-discuz&amp;severity=medium&amp;id=687aaf8da83201eaacf68f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7802-cross-site-scripting-in-phpgurukul-c-22049360</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7802%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=687a9d7ba83201eaacf5caaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33014-cwe-1022-use-of-web-link-to-untrust-e9586175</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33014%3A%20CWE-1022%20Use%20of%20Web%20Link%20to%20Untrusted%20Target%20with%20window.opener%20Access%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=687a99f8a83201eaacf59725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7801-sql-injection-in-bosssoft-crm-6d4387f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7801%3A%20SQL%20Injection%20in%20BossSoft%20CRM&amp;severity=medium&amp;id=687a99f8a83201eaacf5972d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7800-cross-site-scripting-in-cgpandey-hot-e70e49a3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7800%3A%20Cross%20Site%20Scripting%20in%20cgpandey%20hotelmis&amp;severity=medium&amp;id=687a9673a83201eaacf58eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anne-arundel-dermatology-data-breach-impacts-19-mi-b03cf8dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anne%20Arundel%20Dermatology%20data%20breach%20impacts%201.9%20million%20people&amp;severity=high&amp;id=687a92eea83201eaacf578ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-scanning-for-telemessage-signal-clone-flaw-f573c36a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20scanning%20for%20TeleMessage%20Signal%20clone%20flaw%20exposing%20passwords&amp;severity=high&amp;id=687a8f69a83201eaacf571b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7798-sql-injection-in-beijing-shenzhou-sh-8eb9ca48</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7798%3A%20SQL%20Injection%20in%20Beijing%20Shenzhou%20Shihan%20Technology%20Multimedia%20Integrated%20Business%20Display%20System&amp;severity=medium&amp;id=687a9308a83201eaacf57929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7797-null-pointer-dereference-in-gpac-f1082258</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7797%3A%20NULL%20Pointer%20Dereference%20in%20GPAC&amp;severity=medium&amp;id=687a8be6a83201eaacf563ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7796-stack-based-buffer-overflow-in-tenda-e64b498f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7796%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a8862a83201eaacf5597b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poisonseed-hackers-tricking-users-into-bypassing-f-aeeee882</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PoisonSeed%20Hackers%20Tricking%20Users%20Into%20Bypassing%20FIDO%20Keys%20With%20QR%20Codes&amp;severity=medium&amp;id=687a84dda83201eaacf54efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7795-stack-based-buffer-overflow-in-tenda-998da2c9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7795%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a84eba83201eaacf54f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53901-cwe-672-operation-on-a-resource-aft-bfefe74d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53901%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20bytecodealliance%20wasmtime&amp;severity=low&amp;id=687a84eba83201eaacf54f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53762-cwe-183-permissive-list-of-allowed--6e04e0a8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53762%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=687a8163a83201eaacf547bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47158-cwe-302-authentication-bypass-by-as-ebe1715f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47158%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Microsoft%20Azure%20DevOps&amp;severity=critical&amp;id=687a8163a83201eaacf547aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47995-cwe-1390-weak-authentication-in-mic-db9561ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47995%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=medium&amp;id=687a8163a83201eaacf547ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49746-cwe-285-improper-authorization-in-m-bb846408</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49746%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=critical&amp;id=687a8163a83201eaacf547b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49747-cwe-862-missing-authorization-in-mi-f7184950</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49747%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=critical&amp;id=687a8163a83201eaacf547b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7794-stack-based-buffer-overflow-in-tenda-07d91aab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7794%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a8163a83201eaacf547c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7783-cwe-330-use-of-insufficiently-random-ec36637b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7783%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values&amp;severity=critical&amp;id=687a7a52a83201eaacf52a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7793-stack-based-buffer-overflow-in-tenda-b109cbd5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7793%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a7a52a83201eaacf52a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7792-stack-based-buffer-overflow-in-tenda-075b040b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7792%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=687a76cea83201eaacf510fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54079-cwe-89-improper-neutralization-of-s-a548a286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54079%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=687a6fc6a83201eaacf4f8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54078-cwe-79-improper-neutralization-of-i-58d0f345</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54078%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54077-cwe-79-improper-neutralization-of-i-edf7c110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54077%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54076-cwe-79-improper-neutralization-of-i-109163be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54076%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54075-cwe-79-improper-neutralization-of-i-f53a4b0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54075%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nuxt-modules%20mdc&amp;severity=high&amp;id=687a6fc6a83201eaacf4f8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54073-cwe-77-improper-neutralization-of-s-f82ee6a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54073%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20sammcj%20mcp-package-docs&amp;severity=high&amp;id=687a6fc6a83201eaacf4f8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7791-cross-site-scripting-in-phpgurukul-o-cffb84f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7791%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Security%20Guards%20Hiring%20System&amp;severity=medium&amp;id=687a6fc6a83201eaacf4f8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54059-cwe-276-incorrect-default-permissio-7d358884</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54059%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20chainguard-dev%20melange&amp;severity=medium&amp;id=687a6c42a83201eaacf4a483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53945-cwe-276-incorrect-default-permissio-358fa737</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53945%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20chainguard-dev%20apko&amp;severity=high&amp;id=687a6c42a83201eaacf4a47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53888-cwe-120-buffer-copy-without-checkin-6446b3a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53888%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RIOT-OS%20RIOT&amp;severity=medium&amp;id=687a6c42a83201eaacf4a48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7790-stack-based-buffer-overflow-in-d-lin-6a24a689</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7790%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687a6c42a83201eaacf4a491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7789-password-hash-with-insufficient-comp-0f36e71e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7789%3A%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=687a68bea83201eaacf49364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46732-cwe-285-improper-authorization-in-o-6d363786</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46732%3A%20CWE-285%3A%20Improper%20Authorization%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=687a653aa83201eaacf48a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7788-os-command-injection-in-xuxueli-xxl--fb0fce04</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7788%3A%20OS%20Command%20Injection%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=687a653aa83201eaacf48a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7787-server-side-request-forgery-in-xuxue-3f862f4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7787%3A%20Server-Side%20Request%20Forgery%20in%20Xuxueli%20xxl-job&amp;severity=medium&amp;id=687a5aaea83201eaacf443e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7784-improper-privilege-management-in-red-c3c0b706</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7784%3A%20Improper%20Privilege%20Management&amp;severity=medium&amp;id=687a53a7a83201eaacf41efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7786-cross-site-scripting-in-gnuboard-g6-fac9a0f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7786%3A%20Cross%20Site%20Scripting%20in%20Gnuboard%20g6&amp;severity=medium&amp;id=687a4c9fa83201eaacf3eeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-cryptojacker-masquerades-as-banking-app-to-694a593e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20Cryptojacker%20Masquerades%20as%20Banking%20App%20to%20Mine%20Cryptocurrency%20on%20Locked%20Devices&amp;severity=medium&amp;id=687aaf02a83201eaacf67532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lamehug-first-ai-powered-malware-linked-to-russias-bca2b18b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LameHug%3A%20first%20AI-Powered%20malware%20linked%20to%20Russia%E2%80%99s%20APT28&amp;severity=medium&amp;id=687a3b0aa83201eaacf34635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7785-open-redirect-in-thinkgem-jeesite-cb7970cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7785%3A%20Open%20Redirect%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687a3787a83201eaacf33b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/years-long-linux-cryptominer-spotted-using-legit-s-1c764c11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Years%20Long%20Linux%20Cryptominer%20Spotted%20Using%20Legit%20Sites%20to%20Spread%20Malware&amp;severity=medium&amp;id=687a2cfaa83201eaacf2e768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49484-cwe-89-improper-neutralization-of-s-4e2ba8bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49484%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomsky.com%20JS%20Jobs%20component%20for%20Joomla&amp;severity=high&amp;id=687a1b67a83201eaacf1f460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50126-cwe-79-improper-neutralization-of-i-d49b9a91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSBlog!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50058-cwe-79-improper-neutralization-of-i-cf1917d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSDirectory!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50057-cwe-400-uncontrolled-resource-consu-0f973c61</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50057%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20rsjoomla.com%20RSFiles!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50056-cwe-79-improper-neutralization-of-i-a3c8b1d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSMail!%20component%20for%20Joomla&amp;severity=medium&amp;id=687a1b67a83201eaacf1f46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49485-cwe-89-improper-neutralization-of-s-9a8f4417</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49485%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20balbooa.com%20Balbooa%20Forms%20component%20for%20Joomla&amp;severity=high&amp;id=687a1b67a83201eaacf1f464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49486-cwe-79-improper-neutralization-of-i-7224e7b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20balbooa.com%20Balbooa%20Gallery%20component%20for%20Joomla&amp;severity=high&amp;id=687a1b67a83201eaacf1f467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2425-cwe-367-time-of-check-time-of-use-to-249321c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2425%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=687a17e3a83201eaacf1bf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-a-teams-call-to-a-ransomware-threat-matanbuch-e60b9b22</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20a%20Teams%20Call%20to%20a%20Ransomware%20Threat%3A%20Matanbuchus%203.0%20MaaS%20Levels%20Up&amp;severity=medium&amp;id=687a0dd5a83201eaacf1730e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-sues-to-disrupt-badbox-20-botnet-infecting--4e53b0f9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20sues%20to%20disrupt%20BadBox%202.0%20botnet%20infecting%2010%20million%20devices&amp;severity=high&amp;id=687a0d56a83201eaacf16a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-teams-voice-calls-abused-to-push-matanbu-4e4b5e76</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Teams%20voice%20calls%20abused%20to%20push%20Matanbuchus%20malware&amp;severity=high&amp;id=687a0d56a83201eaacf16a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmware-fixes-four-esxi-zero-day-bugs-exploited-at--07ce74ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMware%20fixes%20four%20ESXi%20zero-day%20bugs%20exploited%20at%20Pwn2Own%20Berlin&amp;severity=critical&amp;id=687a0d56a83201eaacf16a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-bleed-2-exploited-weeks-before-pocs-as-citr-5f5fdf14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20Bleed%202%20exploited%20weeks%20before%20PoCs%20as%20Citrix%20denied%20attacks&amp;severity=high&amp;id=687a0d56a83201eaacf16a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/poor-passwords-tattle-on-ai-hiring-bot-maker-parad-1db44acc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Poor%20Passwords%20Tattle%20on%20AI%20Hiring%20Bot%20Maker%20Paradox.ai&amp;severity=high&amp;id=687a0d56a83201eaacf16a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7444-cwe-288-authentication-bypass-using--4768c321</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7444%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20LoginPress%20LoginPress%20Pro&amp;severity=critical&amp;id=687a09d3a83201eaacf15579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27779-improper-access-control-in-fortinet-d15cb395</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27779%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a963d0ff220b9507e1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-githubs-security-crisis-39m-secret-leaks--1220fcb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BAnalysis%5D%20GitHub&apos;s%20Security%20Crisis%2039M%20Secret%20Leaks%2C%20Amadey%20MaaS%20Campaign%20Exploiting%20Repository%20Trust%2C%20and%20Supply%20Chain%20Attack%20Vectors&amp;severity=low&amp;id=6879ff4ba83201eaacf0dcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26855-cwe-89-improper-neutralization-of-s-734541a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26855%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomcar.net%20Articles%20Calendar%20extension%20for%20Joomla&amp;severity=critical&amp;id=6879fbc5a83201eaacf0bac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26854-cwe-89-improper-neutralization-of-s-1ab190ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26854%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20joomcar.net%20Articles%20Good%20Search%20extension%20for%20Joomla&amp;severity=critical&amp;id=6879fbc5a83201eaacf0babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kawa4096s-ransomware-tide-rising-threat-with-borro-02151326</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KAWA4096%E2%80%99s%20Ransomware%20Tide%3A%20Rising%20Threat%20With%20Borrowed%20Styles&amp;severity=medium&amp;id=687a0dd5a83201eaacf1733d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-mobile-forensic-tooling-discovered-bd35bbca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Mobile%20Forensic%20Tooling%20Discovered&amp;severity=medium&amp;id=687a09d2a83201eaacf15551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-malware-delivery-domains-part-iii-6ad88467</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Malware%20Delivery%20Domains%3A%20Part%20III&amp;severity=medium&amp;id=6879fbc4a83201eaacf0b62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-identified-in-attacks-exploiting-ivanti-co-7ef05b0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Identified%20in%20Attacks%20Exploiting%20Ivanti%20Connect%20Secure%20Vulnerabilities&amp;severity=medium&amp;id=687a0dd5a83201eaacf17323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7438-cwe-434-unrestricted-upload-of-file--5dc2a873</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7438%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6879f137a83201eaacf066fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7772-cwe-862-missing-authorization-in-mal-2dffc3b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7772%3A%20CWE-862%20Missing%20Authorization%20in%20malcure%20Malcure%20Malware%20Scanner%20%E2%80%94%20%231%20Toolset%20for%20Malware%20Removal&amp;severity=medium&amp;id=6879f137a83201eaacf06700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5811-cwe-862-missing-authorization-in-mil-e635eff7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5811%3A%20CWE-862%20Missing%20Authorization%20in%20milanmk%20Listly%3A%20Listicles%20For%20WordPress&amp;severity=medium&amp;id=6879dc20a83201eaacef69f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5800-cwe-79-improper-neutralization-of-in-bcfa51db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20juiiee8487%20Testimonial%20Post%20type&amp;severity=medium&amp;id=6879dc20a83201eaacef69f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5752-cwe-79-improper-neutralization-of-in-a855a4f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Vertical%20scroll%20image%20slideshow%20gallery&amp;severity=medium&amp;id=6879dc20a83201eaacef69e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6717-cwe-89-improper-neutralization-of-sp-dcb3bd0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6717%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20b1accounting%20B1.lt&amp;severity=medium&amp;id=6879dc20a83201eaacef6a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5767-cwe-79-improper-neutralization-of-in-106dc0d0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Crowdfunding%20for%20WooCommerce&amp;severity=medium&amp;id=6879dc20a83201eaacef69ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6719-cwe-79-improper-neutralization-of-in-7008e494</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vladimirs%20Terms%20descriptions&amp;severity=medium&amp;id=6879dc20a83201eaacef6a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6726-cwe-862-missing-authorization-in-kra-e793bad5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6726%3A%20CWE-862%20Missing%20Authorization%20in%20krasenslavov%20Block%20Editor%20Gallery%20Slider&amp;severity=medium&amp;id=6879dc21a83201eaacef6a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7643-cwe-22-improper-limitation-of-a-path-7ccc832e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7643%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aaroncampbell%20Attachment%20Manager&amp;severity=critical&amp;id=6879dc21a83201eaacef6a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5754-cwe-79-improper-neutralization-of-in-d095e966</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bbc000tommy%20Useful%20Tab%20Block%20%E2%80%93%20Responsive%20%26%20AMP-Compatible&amp;severity=medium&amp;id=6879dc20a83201eaacef69e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6718-cwe-862-missing-authorization-in-b1a-8d550da1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6718%3A%20CWE-862%20Missing%20Authorization%20in%20b1accounting%20B1.lt&amp;severity=high&amp;id=6879dc20a83201eaacef6a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6222-cwe-434-unrestricted-upload-of-file--11b37d1c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6222%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Swings%20WooCommerce%20Refund%20And%20Exchange%20with%20RMA%20-%20Warranty%20Management%2C%20Refund%20Policy%2C%20Manage%20User%20Wallet&amp;severity=critical&amp;id=6879dc20a83201eaacef69fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6781-cwe-352-cross-site-request-forgery-c-3314ceeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6781%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryanfaber%20Copymatic%20%E2%80%93%20AI%20Content%20Writer%20%26%20Generator&amp;severity=medium&amp;id=6879ce10a83201eaaceef2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6053-cwe-352-cross-site-request-forgery-c-dc73f68e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6053%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bogdansilivestru%20Zuppler%20Online%20Ordering&amp;severity=medium&amp;id=6879ce10a83201eaaceef29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7660-cwe-79-improper-neutralization-of-in-a0508dfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lewisking0072%20Map%20My%20Locations&amp;severity=medium&amp;id=6879ce10a83201eaaceef2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7638-cwe-89-improper-neutralization-of-sp-1230e11f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7638%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=6879ce10a83201eaaceef2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5816-cwe-862-missing-authorization-in-bit-3e132416</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5816%3A%20CWE-862%20Missing%20Authorization%20in%20biteship%20Plugin%20Pengiriman%20WooCommerce%20Kurir%20Reguler%2C%20Instan%2C%20Kargo%20%E2%80%93%20Biteship&amp;severity=medium&amp;id=6879ce10a83201eaaceef298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6813-cwe-862-missing-authorization-in-aap-0d371aab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6813%3A%20CWE-862%20Missing%20Authorization%20in%20aapanel%20aapanel%20WP%20Toolkit&amp;severity=high&amp;id=6879ce10a83201eaaceef2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3740-cwe-22-improper-limitation-of-a-path-6d7614c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3740%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=6879ce10a83201eaaceef294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7648-cwe-79-improper-neutralization-of-in-20412e09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruven-themes%20Ruven%20Themes%3A%20Shortcodes&amp;severity=medium&amp;id=6879ce10a83201eaaceef2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7431-cwe-79-improper-neutralization-of-in-435c3679</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Knowledge%20Base&amp;severity=medium&amp;id=6879aae8a83201eaacec206e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7767-cross-site-scripting-in-phpgurukul-a-5c843edb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7767%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=687995d6a83201eaaceb8306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-18-da24d527</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-18&amp;severity=medium&amp;id=687ae3bda83201eaacf7af56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50583-na-feb1e64d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50583%3A%20n%2Fa&amp;severity=medium&amp;id=687abd1ea83201eaacf70018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50582-na-e60b5bc0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50582%3A%20n%2Fa&amp;severity=medium&amp;id=687abd1ea83201eaacf70013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50581-na-a08879cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50581%3A%20n%2Fa&amp;severity=medium&amp;id=687abd1ea83201eaacf7000e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50584-na-e685785a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50584%3A%20n%2Fa&amp;severity=medium&amp;id=687aa483a83201eaacf5fc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50708-na-a847d51b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50708%3A%20n%2Fa&amp;severity=high&amp;id=687aa483a83201eaacf5fc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50585-na-33af7896</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50585%3A%20n%2Fa&amp;severity=high&amp;id=687a99f8a83201eaacf59728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52169-na-9db2ed0a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52169%3A%20n%2Fa&amp;severity=high&amp;id=687a9673a83201eaacf58eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52163-na-796f6da0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52163%3A%20n%2Fa&amp;severity=medium&amp;id=687a9673a83201eaacf58eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52164-na-b03fa0e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52164%3A%20n%2Fa&amp;severity=high&amp;id=687a8be6a83201eaacf563ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52166-na-95839c2f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52166%3A%20n%2Fa&amp;severity=medium&amp;id=687a8be6a83201eaacf563c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52168-na-8571dd25</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52168%3A%20n%2Fa&amp;severity=medium&amp;id=687a84eba83201eaacf54f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52162-na-3cd04db1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52162%3A%20n%2Fa&amp;severity=medium&amp;id=687a8163a83201eaacf547bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50586-na-eb947661</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50586%3A%20n%2Fa&amp;severity=medium&amp;id=687a8163a83201eaacf547b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45157-na-2982a838</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45157%3A%20n%2Fa&amp;severity=medium&amp;id=687a7dd6a83201eaacf53d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45156-na-47dc6433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45156%3A%20n%2Fa&amp;severity=medium&amp;id=687a7dd6a83201eaacf53d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46000-na-cd7021a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46000%3A%20n%2Fa&amp;severity=medium&amp;id=687a61b8a83201eaacf46d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46002-na-d8c9bc3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46002%3A%20n%2Fa&amp;severity=medium&amp;id=687a572ba83201eaacf4327d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46001-na-69f797f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46001%3A%20n%2Fa&amp;severity=critical&amp;id=687a53a7a83201eaacf41ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6185-cwe-79-in-leviton-acquisuite-ced1fdc1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6185%3A%20CWE-79%20in%20Leviton%20AcquiSuite&amp;severity=critical&amp;id=687a572ba83201eaacf43288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7765-sql-injection-in-code-projects-onlin-74aa8502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7765%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=687980b8a83201eaaceab04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7764-sql-injection-in-code-projects-onlin-7bb97b94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7764%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68797d33a83201eaacea9c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-telemessage-sgnl-vulnerability-is-actively-bei-7d8da462</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20TeleMessage%20SGNL%20Vulnerability%20Is%20Actively%20Being%20Exploited%20by%20Attackers&amp;severity=medium&amp;id=687979ada83201eaacea8e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7763-open-redirect-in-thinkgem-jeesite-73b914ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7763%3A%20Open%20Redirect%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=687979bfa83201eaacea8e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7397-cwe-312-cleartext-storage-of-sensiti-de077fdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7397%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Broadcom%20Brocade%20ASCG&amp;severity=medium&amp;id=687972a7a83201eaacea64d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6391-cwe-532-insertion-of-sensitive-infor-2f912525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6391%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Broadcom%20Brocade%20ASCG&amp;severity=high&amp;id=687972a7a83201eaacea64d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7762-stack-based-buffer-overflow-in-d-lin-a1cb040a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7762%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=687972a7a83201eaacea64dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7759-server-side-request-forgery-in-think-28eaff6b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7759%3A%20Server-Side%20Request%20Forgery%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=68796f23a83201eaacea4dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7398-cwe-326-inadequate-encryption-streng-f0e5253b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7398%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Broadcom%20Brocade%20ASCG&amp;severity=high&amp;id=68796f23a83201eaacea4de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7758-buffer-overflow-in-totolink-t6-fd60b4e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7758%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6879681ba83201eaace9f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7757-sql-injection-in-phpgurukul-land-rec-e12bd059</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7757%3A%20SQL%20Injection%20in%20PHPGurukul%20Land%20Record%20System&amp;severity=medium&amp;id=6879681ba83201eaace9f233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7756-cross-site-request-forgery-in-code-p-f04d3ab9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7756%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20E-Commerce%20Site&amp;severity=medium&amp;id=68796497a83201eaace9cd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7755-unrestricted-upload-in-code-projects-8b5be5c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7755%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Ordering%20System&amp;severity=medium&amp;id=68796115a83201eaace9b977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23269-cwe-1423-exposure-of-sensitive-info-b45b4c16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23269%3A%20CWE-1423%3A%20Exposure%20of%20Sensitive%20Information%20caused%20by%20Shared%20Microarchitectural%20Predictor%20State%20that%20Influences%20Transient%20Execution%20in%20NVIDIA%20Jetson%20Orin%20and%20Xavier%20Devices&amp;severity=medium&amp;id=68795de2a83201eaace94c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phish-and-chips-china-aligned-espionage-actors-ram-66ec37a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phish%20and%20Chips%3A%20China-Aligned%20Espionage%20Actors%20Ramp%20Up%20Taiwan%20Semiconductor%20Industry%20Targeting&amp;severity=medium&amp;id=68795a0aa83201eaace8b7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7754-sql-injection-in-code-projects-patie-7a89858d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7754%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=68795a0ca83201eaace8b8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23270-cwe-392-missing-report-of-error-con-c4cfbe75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23270%3A%20CWE-392%3A%20Missing%20Report%20of%20Error%20Condition%20in%20NVIDIA%20Jetson%20Orin%2C%20IGX%20Orin%20and%20Xavier%20Devices&amp;severity=high&amp;id=68795a0ca83201eaace8b89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-data-leak-at-texas-adoption-agency-exposes-44ded463</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Data%20Leak%20at%20Texas%20Adoption%20Agency%20Exposes%201.1%20Million%20Records&amp;severity=medium&amp;id=68795687a83201eaace88a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7753-sql-injection-in-code-projects-onlin-f055c4a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7753%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68795694a83201eaace88a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/powerful-maas-on-the-prowl-for-credentials-and-cry-eb616960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Powerful%20MaaS%20On%20the%20Prowl%20for%20Credentials%20and%20Crypto%20Assets&amp;severity=medium&amp;id=68795a0aa83201eaace8b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23267-cwe-59-improper-link-resolution-bef-f324c588</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23267%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20NVIDIA%20Container%20Toolkit&amp;severity=high&amp;id=68795303a83201eaace879b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7752-sql-injection-in-code-projects-onlin-c723d1ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7752%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68795303a83201eaace879bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4657-cwe-122-heap-based-buffer-overflow-i-aca6ad18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4657%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=68794f7fa83201eaace863f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6249-cwe-602-client-side-enforcement-of-s-8b15cdd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6249%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Lenovo%20FileZ%20Client&amp;severity=high&amp;id=68794f7fa83201eaace86403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6248-cwe-79-improper-neutralization-of-in-a1b2b9dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6248%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lenovo%20Browser&amp;severity=high&amp;id=68794f7fa83201eaace86400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6232-cwe-88-improper-neutralization-of-ar-58450b07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6232%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=high&amp;id=68794f7fa83201eaace863fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6231-cwe-88-improper-neutralization-of-ar-88232c74</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6231%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=high&amp;id=68794f7fa83201eaace863fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6230-cwe-89-improper-neutralization-of-sp-2e537cfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6230%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=68794f7fa83201eaace863f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2818-cwe-319-cleartext-transmission-of-se-2c937788</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2818%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Motorola%20Smart%20Connect%20Android%20Application&amp;severity=medium&amp;id=68794f7fa83201eaace863f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1700-cwe-427-uncontrolled-search-path-ele-5cd045f4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1700%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Motorola%20Software%20Fix&amp;severity=high&amp;id=68794f7fa83201eaace863e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0886-cwe-276-incorrect-default-permission-0eba0dfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0886%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20Elliptic%20Virtual%20Lock%20Sensor%20Service%20For%20ThinkPad%20P1%20Gen%206%20(Type%2021FV%2C%2021FW)&amp;severity=high&amp;id=68794f7fa83201eaace863e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3753-cwe-95-improper-neutralization-of-di-b0251859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3753%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Open%20Source%20Robotics%20Foundation%20Robot%20Operating%20System%20(ROS)&amp;severity=high&amp;id=68794c09a83201eaace85095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7751-sql-injection-in-code-projects-onlin-932ed83f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7751%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68794c09a83201eaace8509b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7433-cwe-502-deserialization-of-untrusted-67ac1fb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7433%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Sophos%20Sophos%20Intercept%20X%20for%20Windows&amp;severity=high&amp;id=68794c09a83201eaace85098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23266-cwe-426-untrusted-search-path-in-nv-65efbbdd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23266%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20NVIDIA%20Container%20Toolkit&amp;severity=critical&amp;id=68794c09a83201eaace85092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stormous-ransomware-gang-targets-north-country-hea-52de4764</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stormous%20Ransomware%20gang%20targets%20North%20Country%20HealthCare&amp;severity=high&amp;id=68794bf9a83201eaace84fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7750-sql-injection-in-code-projects-onlin-69500cfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7750%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68794c09a83201eaace850a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7472-vulnerability-in-sophos-intercept-x--c5beb746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7472%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Sophos%20Sophos%20Intercept%20X%20for%20Windows%20Installer&amp;severity=high&amp;id=68794876a83201eaace83485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54070-cwe-125-out-of-bounds-read-in-openz-19c45689</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54070%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=68794189a83201eaace81890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/max-severity-cisco-ise-bug-allows-pre-auth-command-e5633599</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Max%20severity%20Cisco%20ISE%20bug%20allows%20pre-auth%20command%20execution%2C%20patch%20now&amp;severity=high&amp;id=6879416ca83201eaace81778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-steals-27-million-in-bigone-exchange-crypto-71889f62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20steals%20%2427%20million%20in%20BigONE%20exchange%20crypto%20breach&amp;severity=high&amp;id=6879416ca83201eaace81774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53817-cwe-476-null-pointer-dereference-in-3e351a96</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53817%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20ipavlov%207-Zip&amp;severity=medium&amp;id=68794189a83201eaace81897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53816-cwe-122-heap-based-buffer-overflow--4bc38336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53816%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ipavlov%207-Zip&amp;severity=medium&amp;id=68794189a83201eaace81894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7749-sql-injection-in-code-projects-onlin-2c28d115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7749%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68793deba83201eaace7fc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53638-cwe-754-improper-check-for-unusual--00dce838</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53638%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Vectorized%20solady&amp;severity=medium&amp;id=68793a67a83201eaace7e22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/larva-208s-new-campaign-targets-web3-developers-ee0418b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LARVA-208&apos;s%20New%20Campaign%20Targets%20Web3%20Developers&amp;severity=medium&amp;id=68793a6ba83201eaace7e23f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7748-cross-site-scripting-in-zcms-55fcabd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7748%3A%20Cross%20Site%20Scripting%20in%20ZCMS&amp;severity=medium&amp;id=687936e6a83201eaace7c2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23263-cwe-279-incorrect-execution-assigne-6f799cf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23263%3A%20CWE-279%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20NVIDIA%20DOCA-Host%20and%20Mellanox%20OFED&amp;severity=high&amp;id=6879335fa83201eaace7af27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7747-buffer-overflow-in-tenda-fh451-dd4ae3b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7747%3A%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=6879335fa83201eaace7af2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolution-of-macos-odyssey-stealer-new-techniques--1bb0851d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolution%20of%20macOS%20Odyssey%20Stealer%3A%20New%20Techniques%20%26%20Signed%20Malware&amp;severity=medium&amp;id=68795693a83201eaace88a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-apache-http-server-flaw-to-deploy--0ced271c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Apache%20HTTP%20Server%20Flaw%20to%20Deploy%20Linuxsys%20Cryptocurrency%20Miner&amp;severity=high&amp;id=687921c9a83201eaace726c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7339-cwe-241-in-jshttp-on-headers-3b3a4c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7339%3A%20CWE-241%20in%20jshttp%20on-headers&amp;severity=low&amp;id=68791e47a83201eaace70a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7338-cwe-248-in-expressjs-multer-1c737640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7338%3A%20CWE-248%20in%20expressjs%20multer&amp;severity=high&amp;id=68792c57a83201eaace78070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ghostcontainer-backdoor-for-exchange-servers-22be8d5e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GhostContainer%20backdoor%20for%20Exchange%20servers&amp;severity=medium&amp;id=68795302a83201eaace87981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/maas-operation-using-emmenhtal-and-amadey-linked-t-f72d7455</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MaaS%20operation%20using%20Emmenhtal%20and%20Amadey%20linked%20to%20threats%20against%20Ukrainian%20entities&amp;severity=medium&amp;id=68795302a83201eaace87986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54066-cwe-601-url-redirection-to-untruste-ea3b6ca1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54066%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20DIRACGrid%20diracx-web&amp;severity=medium&amp;id=68791037a83201eaace69110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54064-cwe-532-insertion-of-sensitive-info-406888ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54064%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20rucio%20helm-charts&amp;severity=medium&amp;id=68790cb4a83201eaace66ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54062-cwe-89-improper-neutralization-of-s-ad57dd02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54062%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68790cb4a83201eaace66ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54061-cwe-89-improper-neutralization-of-s-da8fb5af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54061%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68790cb4a83201eaace66baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54060-cwe-89-improper-neutralization-of-s-ce9e9130</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54060%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6879092fa83201eaace65557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54058-cwe-89-improper-neutralization-of-s-6b0ba33e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54058%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6879092fa83201eaace65554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53946-cwe-89-improper-neutralization-of-s-e92d55a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53946%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=687905aba83201eaace63c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53941-cwe-79-improper-neutralization-of-i-06421deb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53941%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fedify-dev%20hollo&amp;severity=medium&amp;id=687905aba83201eaace63c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53928-cwe-94-improper-control-of-generati-4af94aef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53928%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=68790228a83201eaace61c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53927-cwe-94-improper-control-of-generati-8840c3a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53927%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=68790228a83201eaace61c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53909-cwe-1336-improper-neutralization-of-38246a7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53909%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20mailcow%20mailcow-dockerized&amp;severity=critical&amp;id=68790228a83201eaace61c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40924-cwe-340-generation-of-predictable-n-7fe67340</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40924%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20HAARG%20Catalyst%3A%3APlugin%3A%3ASession&amp;severity=medium&amp;id=6878fea3a83201eaace5f704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/svg-smuggling-image-embedded-javascript-redirect-a-e32795b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SVG%20Smuggling%20-%20Image%20Embedded%20JavaScript%20Redirect%20Attacks&amp;severity=medium&amp;id=68794f7ea83201eaace863c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dns-a-small-but-effective-c2-system-08e3f580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DNS%3A%20A%20Small%20but%20Effective%20C2%20system&amp;severity=medium&amp;id=68794f7ea83201eaace863ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5346-cwe-926-improper-export-of-android-a-66c0b95f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5346%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Bluebird%20kr.co.bluebird.android.bbsettings&amp;severity=medium&amp;id=6878f79ba83201eaace5cfab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5344-cwe-926-improper-export-of-android-a-ee03b7fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5344%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Bluebird%20com.bluebird.kiosk.launcher&amp;severity=high&amp;id=6878f79ba83201eaace5cfa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5345-cwe-926-improper-export-of-android-a-630d9ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5345%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Bluebird%20com.bluebird.filemanagers&amp;severity=medium&amp;id=6878f79ba83201eaace5cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bypassing-root-detection-and-rasp-in-sensitive-and-8455046b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bypassing%20root%20detection%20and%20RASP%20in%20sensitive%20Android%20apps&amp;severity=medium&amp;id=6878f0a8a83201eaace5814a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-abused-to-spread-amadey-lumma-and-redline-i-c70c9a16</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20Abused%20to%20Spread%20Amadey%2C%20Lumma%20and%20Redline%20InfoStealers%20in%20Ukraine&amp;severity=medium&amp;id=6878f092a83201eaace58082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-salt-typhoon-infiltrated-us-national-guard-afed24ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Salt%20Typhoon%20Infiltrated%20US%20National%20Guard%20Network%20for%20Months&amp;severity=medium&amp;id=6878d7f5a83201eaace4ba31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infrastructure-of-interest-suspicious-domains-165de963</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infrastructure%20of%20Interest%3A%20Suspicious%20Domains&amp;severity=medium&amp;id=6878d0efa83201eaace4467f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/co-op-confirms-data-of-65-million-members-stolen-i-35f8afe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Co-op%20confirms%20data%20of%206.5%20million%20members%20stolen%20in%20cyberattack&amp;severity=high&amp;id=6878c9e6a83201eaace414ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-critical-ise-flaw-allowing-unauthen-87c37b9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Warns%20of%20Critical%20ISE%20Flaw%20Allowing%20Unauthenticated%20Attackers%20to%20Execute%20Root%20Code&amp;severity=critical&amp;id=6878c9e6a83201eaace414e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-target-taiwans-semiconductor-secto-4cbb7527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Target%20Taiwan&apos;s%20Semiconductor%20Sector%20with%20Cobalt%20Strike%2C%20Custom%20Backdoors&amp;severity=high&amp;id=6878c9e6a83201eaace414f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4302-cwe-203-observable-discrepancy-in-st-ddd01889</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4302%3A%20CWE-203%20Observable%20Discrepancy%20in%20Stop%20User%20Enumeration&amp;severity=medium&amp;id=6878aa44a83201eaace33190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7735-cwe-89-improper-neutralization-of-sp-905efe74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20UNIMAX%20Hospital%20Information%20System&amp;severity=high&amp;id=68786e80a83201eaace14b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7712-cwe-22-improper-limitation-of-a-path-b57bab18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7712%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MangaBooth%20Madara%20-%20Core&amp;severity=critical&amp;id=68786778a83201eaace11810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7729-cross-site-scripting-in-scada-lts-1cbb0b15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7729%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68785ceca83201eaace0cbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5396-cwe-94-improper-control-of-generatio-78201b13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5396%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Bearsthemes%20Bears%20Backup&amp;severity=critical&amp;id=68785ceca83201eaace0cbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7728-cross-site-scripting-in-scada-lts-2c4e621b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7728%3A%20Cross%20Site%20Scripting%20in%20Scada-LTS&amp;severity=medium&amp;id=68785260a83201eaace0477c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-17-95b33d75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-17&amp;severity=medium&amp;id=6879923da83201eaaceb6c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50240-na-0ba450aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50240%3A%20n%2Fa&amp;severity=critical&amp;id=68795de2a83201eaace94c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46102-na-20584cb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46102%3A%20n%2Fa&amp;severity=medium&amp;id=68795694a83201eaace88a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53964-na-e27c9474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53964%3A%20n%2Fa&amp;severity=critical&amp;id=68795303a83201eaace879b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51497-na-83f1cc00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51497%3A%20n%2Fa&amp;severity=medium&amp;id=6879335fa83201eaace7af2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53867-na-26a38f5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53867%3A%20n%2Fa&amp;severity=critical&amp;id=687921d7a83201eaace72755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52046-na-775f95db</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52046%3A%20n%2Fa&amp;severity=critical&amp;id=687921d7a83201eaace72752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47189-na-05f20e97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47189%3A%20n%2Fa&amp;severity=medium&amp;id=687913bba83201eaace6a0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51630-na-9e62cc3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51630%3A%20n%2Fa&amp;severity=critical&amp;id=68790228a83201eaace61c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34132-cwe-78-improper-neutralization-of-s-6dab4678</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34132%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DVR%20Firmware&amp;severity=critical&amp;id=68781a21a83201eaacded290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34130-cwe-306-missing-authentication-for--d9b44d25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34130%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Merit%20LILIN%20DVR%20Firmware&amp;severity=high&amp;id=68781a21a83201eaacded28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34129-cwe-78-improper-neutralization-of-s-0bccef22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34129%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Merit%20LILIN%20DVR%20Firmware&amp;severity=high&amp;id=68781a21a83201eaacded286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34128-cwe-120-buffer-copy-without-checkin-c7879fa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34128%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20X360Soft%20X360%20VideoPlayer%20ActiveX%20Control&amp;severity=high&amp;id=68781a21a83201eaacded295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34127-cwe-121-stack-based-buffer-overflow-ac6cb7f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34127%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Achat%20Software%20Achat%20Chat%20Server&amp;severity=critical&amp;id=68791037a83201eaace6910b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34126-cwe-22-improper-limitation-of-a-pat-0c7562d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34126%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RIPS%20Technologies%20RIPS%20Scanner&amp;severity=high&amp;id=68791ac3a83201eaace6fab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34125-cwe-78-improper-neutralization-of-s-a11ac33d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34125%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20D-Link%20DSP-W110A1&amp;severity=critical&amp;id=68795303a83201eaace879c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34124-cwe-121-stack-based-buffer-overflow-b133f6af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34124%3A%20CWE-121%20%20Stack-based%20Buffer%20Overflow%20in%20The%203DO%20Company%20Heroes%20of%20Might%20and%20Magic%20III&amp;severity=high&amp;id=68795303a83201eaace879b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34123-cwe-121-stack-based-buffer-overflow-0415c016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34123%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20VideoCharge%20Software%20Studio&amp;severity=high&amp;id=6878174da83201eaacdec308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34121-cwe-434-unrestricted-upload-of-file-591e0efb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34121%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Idera%20Up.Time%20Monitoring%20Station&amp;severity=critical&amp;id=6878174da83201eaacdec302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34120-cwe-22-improper-limitation-of-a-pat-a18a0e48</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34120%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LimeSurvey%20GmbH%20LimeSurvey&amp;severity=high&amp;id=6878174da83201eaacdec2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34119-cwe-668-exposure-of-resource-to-wro-488bf293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34119%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Tinasoft%20EasyCafe%20Server&amp;severity=high&amp;id=6878174da83201eaacdec2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34118-cwe-22-improper-limitation-of-a-pat-815e9fa8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34118%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Linknat%20Technology%20VOS%20Manager&amp;severity=high&amp;id=6878174da83201eaacdec2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34117-cwe-912-hidden-functionality-in-net-5b56c392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34117%3A%20CWE-912%20Hidden%20Functionality%20in%20Netcore%20Technology%20Router%20firmware&amp;severity=critical&amp;id=6878174da83201eaacdec2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6983-cwe-1021-improper-restriction-of-ren-cef36937</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6983%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20TP-Link%20System%20Inc.%20Archer%20C1200&amp;severity=medium&amp;id=6878088ea83201eaacde2e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6982-cwe-798-use-of-hard-coded-credential-2e21db26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6982%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TP-Link%20System%20Inc.%20Archer%20C50%20V3&amp;severity=medium&amp;id=6878088ea83201eaacde2e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53908-cwe-26-path-traversal-dirfilename-i-cadfbe94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53908%3A%20CWE-26%3A%20Path%20Traversal%3A%20&apos;%2Fdir%2F..%2Ffilename&apos;%20in%20rommapp%20romm&amp;severity=high&amp;id=68780519a83201eaacde16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badbox-20-found-preinstalled-on-android-iot-device-9f19f23f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BADBOX%202.0%20Found%20Preinstalled%20on%20Android%20IoT%20Devices%20Worldwide&amp;severity=medium&amp;id=68780506a83201eaacde164e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37107-vulnerability-in-hewlett-packard-en-f3e96d4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37107%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37106-vulnerability-in-hewlett-packard-en-31928df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37106%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36097-cwe-121-stack-based-buffer-overflow-fc5a10ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36097%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37105-vulnerability-in-hewlett-packard-en-ef2e3b79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37105%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=6877e8eba83201eaacdd3e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40777-cwe-617-reachable-assertion-in-isc--2a859af3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40777%3A%20CWE-617%20Reachable%20Assertion%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6877e564a83201eaacdcef2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fortinet-fortiweb-hacks-likely-linked-to-publi-22c15580</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fortinet%20FortiWeb%20hacks%20likely%20linked%20to%20public%20RCE%20exploits&amp;severity=high&amp;id=6877e1dea83201eaacdcd737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-russian-cybercrime-network-demolished-in-opera-5b16823b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Russian%20Cybercrime%20Network%20Demolished%20in%20Operation%20Eastwood&amp;severity=high&amp;id=6877e1dea83201eaacdcd73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-sma-devices-hacked-with-overstep-rootkit-18163b58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20SMA%20devices%20hacked%20with%20OVERSTEP%20rootkit%20tied%20to%20ransomware&amp;severity=high&amp;id=6877de5aa83201eaacdcb0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/squidloader-malware-campaign-targets-hong-kong-fin-331f3285</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SquidLoader%20Malware%20Campaign%20Targets%20Hong%20Kong%20Financial%20Sector&amp;severity=high&amp;id=6877de5aa83201eaacdcb0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trail-of-bits-libafl-notes-c1c57ace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trail%20of%20Bits%20LibAFL%20Notes&amp;severity=medium&amp;id=6877de7da83201eaacdcb38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53904-cwe-79-improper-neutralization-of-i-4e182a76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53904%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The-Scratch-Channel%20the-scratch-channel.github.io&amp;severity=low&amp;id=6877de7aa83201eaacdcb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20337-improper-neutralization-of-special--8a999346</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20337%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=6877d3d0a83201eaacdc65de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20285-authentication-bypass-by-assumed-im-6523633a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20285%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20288-server-side-request-forgery-ssrf-in-3e3f3dc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20288%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20284-improper-neutralization-of-special--948725f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20284%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20283-improper-neutralization-of-special--21378f44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20283%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20272-improper-neutralization-of-special--d861b06c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20272%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Evolved%20Programmable%20Network%20Manager%20(EPNM)&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20274-unrestricted-upload-of-file-with-da-6143a9c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20274%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6877d3d0a83201eaacdc65cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-wallets-continue-to-be-drained-in-elaborate-4142c42d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Wallets%20Continue%20to%20be%20Drained%20in%20Elaborate%20Social%20Media%20Scam&amp;severity=medium&amp;id=6877fa7ba83201eaacddde9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-solidity-language-open-source-package-was-used-6ae81215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Solidity%20Language%20open-source%20package%20was%20used%20in%20a%20%24500%2C000%20crypto%20heist&amp;severity=medium&amp;id=6877fdffa83201eaacddecd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-apt-attack-trends-report-south-korea-c0b3bdf3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20APT%20Attack%20Trends%20Report%20(South%20Korea)&amp;severity=medium&amp;id=68780518a83201eaacde16b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-security-issues-in-korean-global-financi-b3ead841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=68780518a83201eaacde16af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-threat-trend-report-on-ransomware-5ab6c55b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Threat%20Trend%20Report%20on%20Ransomware&amp;severity=medium&amp;id=68780518a83201eaacde16a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-infostealer-trend-report-491cdade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=68780518a83201eaacde1699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emerging-ransomware-as-a-service-supporting-ai-dri-3980f9f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emerging%20Ransomware-as-a-Service%2C%20Supporting%20AI%20Driven%20Negotiation%20and%20Mobile%20Control%20Panel%20for%20Their%20Affiliates&amp;severity=medium&amp;id=6877fa7ba83201eaacdddecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53943-cwe-863-incorrect-authorization-in--8514f9c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53943%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Death1Clown%20VoidBot_open-source&amp;severity=high&amp;id=6877d04ca83201eaacdc5a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53938-cwe-306-missing-authentication-for--cf9f432f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53938%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877d04ca83201eaacdc5a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53937-cwe-89-improper-neutralization-of-s-329628cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53937%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=6877d04ca83201eaacdc5a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53936-cwe-79-improper-neutralization-of-i-3702f37b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53936%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877d04ca83201eaacdc5a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53935-cwe-79-improper-neutralization-of-i-33b243b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53935%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877d04ca83201eaacdc5a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53934-cwe-79-improper-neutralization-of-i-759de41f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53934%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47053-cross-site-scripting-dom-based-xss--dfa33705</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47053%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53933-cwe-79-improper-neutralization-of-i-2b109401</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53933%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc493d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7357-cwe-256-plaintext-storage-of-a-passw-ca6720b1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7357%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20LITEON%20IC48A%20EV%20Charger&amp;severity=high&amp;id=6877ccf3a83201eaacdc4943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53932-cwe-79-improper-neutralization-of-i-00f6bdd1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53932%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc493a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46959-cross-site-scripting-dom-based-xss--4d16a414</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46959%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53931-cwe-79-improper-neutralization-of-i-fe2ed335</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53931%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53930-cwe-79-improper-neutralization-of-i-f1da4f24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53930%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc494c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53929-cwe-79-improper-neutralization-of-i-b4990300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53929%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=6877ccf3a83201eaacdc4949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ung0002-unknown-group-0002-espionage-campaigns-unc-bcb765cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNG0002%20(Unknown%20Group%200002)%3A%20Espionage%20Campaigns%20Uncovered&amp;severity=medium&amp;id=6877fa7ba83201eaacdddedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5994-cwe-349-acceptance-of-extraneous-unt-744ce175</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5994%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20NLnet%20Labs%20Unbound&amp;severity=high&amp;id=6877bb51a83201eaacdbe12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-golden-dmsa-attack-in-windows-server-2025-049721c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Golden%20dMSA%20Attack%20in%20Windows%20Server%202025%20Enables%20Cross-Domain%20Attacks%20and%20Persistent%20Access&amp;severity=critical&amp;id=6877bb32a83201eaacdbdfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salt-typhoon-breach-chinese-apt-compromises-us-arm-1b649b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salt%20Typhoon%20breach%3A%20Chinese%20APT%20compromises%20U.S.%20Army%20National%20Guard%20network&amp;severity=high&amp;id=6877bb32a83201eaacdbdff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37104-vulnerability-in-hewlett-packard-en-74823c7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37104%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Telco%20Service%20Orchestrator&amp;severity=high&amp;id=6877b7b3a83201eaacdbc99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40913-cwe-1395-dependency-on-vulnerable-t-635a93ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40913%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ATRODO%20Net%3A%3ADropbear&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40919-cwe-340-generation-of-predictable-n-33f17ab8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40919%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20SALVA%20Authen%3A%3ADigestMD5&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3871-cwe-862-missing-authorization-in-for-d794b4f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3871%3A%20CWE-862%20Missing%20Authorization%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40918-cwe-340-generation-of-predictable-n-997d2ff8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40918%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20EHUELS%20Authen%3A%3ASASL%3A%3APerl%3A%3ADIGEST_MD5&amp;severity=medium&amp;id=6877b42ca83201eaacdbbfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53892-cwe-79-improper-neutralization-of-i-03136fc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53892%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intlify%20vue-i18n&amp;severity=medium&amp;id=6877ad45a83201eaacdb7e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40776-cwe-349-acceptance-of-extraneous-un-caa522ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40776%3A%20CWE-349%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20ISC%20BIND%209&amp;severity=high&amp;id=6877ad45a83201eaacdb7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unitedhealth-linked-health-tech-firm-episource-bre-7a142020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UnitedHealth-Linked%20Health%20Tech%20Firm%20Episource%20Breach%20Hits%205.4M%20Patients&amp;severity=high&amp;id=6877ad21a83201eaacdb7d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53840-cwe-200-exposure-of-sensitive-infor-d58967dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53840%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icingadb-web&amp;severity=low&amp;id=6877ad45a83201eaacdb7e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40923-cwe-340-generation-of-predictable-n-a67fb210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40923%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20MIYAGAWA%20Plack%3A%3AMiddleware%3A%3ASession&amp;severity=high&amp;id=6877a61aa83201eaacdb3fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34300-cwe-20-improper-input-validation-in-8b4a1c23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34300%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Sawtooth%20Software%20Lighthouse%20Studio&amp;severity=critical&amp;id=6877a61aa83201eaacdb3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53758-cwe-312-cleartext-storage-of-sensit-d25081f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53758%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=medium&amp;id=6877910aa83201eaacda58f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24759-cwe-89-improper-neutralization-of-s-e1b2d335</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24759%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=null&amp;id=68779108a83201eaacda582f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24777-cwe-502-deserialization-of-untruste-40381e13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24777%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awethemes%20Hillter&amp;severity=high&amp;id=68779108a83201eaacda5832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24779-cwe-502-deserialization-of-untruste-477dd34a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24779%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NooTheme%20Yogi&amp;severity=null&amp;id=68779108a83201eaacda5835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28955-cwe-22-improper-limitation-of-a-pat-e2464d94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28955%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FWDesign%20Easy%20Video%20Player%20Wordpress%20%26%20WooCommerce&amp;severity=null&amp;id=68779108a83201eaacda5838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28959-cwe-89-improper-neutralization-of-s-16f40249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28959%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=68779108a83201eaacda583b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28961-cwe-502-deserialization-of-untruste-35cc7524</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28961%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=68779108a83201eaacda583e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28965-cwe-862-missing-authorization-in-md-b8503672</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28965%3A%20Missing%20Authorization%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=68779108a83201eaacda5841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28982-cwe-89-improper-neutralization-of-s-582eebfe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28982%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=critical&amp;id=68779108a83201eaacda5844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29000-cwe-862-missing-authorization-in-au-69922291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29000%3A%20Missing%20Authorization%20in%20August%20Infotech%20Multi-language%20Responsive%20Contact%20Form&amp;severity=null&amp;id=68779108a83201eaacda5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29009-cwe-434-unrestricted-upload-of-file-7f25a583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29009%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Webkul%20Medical%20Prescription%20Attachment%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=68779108a83201eaacda584a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30936-cwe-89-improper-neutralization-of-s-a8a4efd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30936%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Torod%20Company%20for%20Information%20Technology%20Torod&amp;severity=null&amp;id=68779108a83201eaacda5861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30949-cwe-502-deserialization-of-untruste-5edec0d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30949%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Guru%20Team%20Site%20Chat%20on%20Telegram&amp;severity=null&amp;id=68779108a83201eaacda5864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30955-cwe-79-improper-neutralization-of-i-d08ca57f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30955%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GT3themes%20ListingEasy&amp;severity=null&amp;id=68779108a83201eaacda5867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30959-cwe-862-missing-authorization-in-wp-58a8f96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30959%3A%20Missing%20Authorization%20in%20WPFactory%20Product%20XML%20Feed%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68779108a83201eaacda586a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30973-cwe-502-deserialization-of-untruste-52276379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30973%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=null&amp;id=68779108a83201eaacda586d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31055-cwe-79-improper-neutralization-of-i-139bfdb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31055%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vergatheme%20Electrician%20-%20Electrical%20Service%20WordPress&amp;severity=null&amp;id=68779108a83201eaacda5870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31070-cwe-22-improper-limitation-of-a-pat-b18b717e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31070%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LambertGroup%20HTML5%20Radio%20Player%20-%20WPBakery%20Page%20Builder%20Addon&amp;severity=null&amp;id=68779108a83201eaacda5873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31072-cwe-79-improper-neutralization-of-i-d2762b11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31072%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Ofiz%20-%20WordPress%20Business%20Consulting%20Theme&amp;severity=null&amp;id=68779108a83201eaacda5876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31422-cwe-502-deserialization-of-untruste-564da00b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31422%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Visual%20Art%20%7C%20Gallery%20WordPress%20Theme&amp;severity=null&amp;id=68779108a83201eaacda5879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31427-cwe-79-improper-neutralization-of-i-0772b443</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20Invico%20-%20WordPress%20Consulting%20Business%20Theme&amp;severity=null&amp;id=68779108a83201eaacda587c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32574-cwe-89-improper-neutralization-of-s-4893fba9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32574%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPGYM&amp;severity=high&amp;id=68779109a83201eaacda588a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46500-cwe-79-improper-neutralization-of-i-ac1eb8d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ValvePress%20Wordpress%20Auto%20Spinner&amp;severity=null&amp;id=68779109a83201eaacda588d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47554-cwe-79-improper-neutralization-of-i-a66f2f5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20CSS3%20Compare%20Pricing%20Tables%20for%20WordPress&amp;severity=null&amp;id=68779109a83201eaacda5890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47645-cwe-89-improper-neutralization-of-s-109943da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47645%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ELEXtensions%20ELEX%20WooCommerce%20Advanced%20Bulk%20Edit%20Products%2C%20Prices%20%26%20Attributes&amp;severity=null&amp;id=68779109a83201eaacda5893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47652-cwe-79-improper-neutralization-of-i-a3ed94bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=68779109a83201eaacda5896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48291-cwe-79-improper-neutralization-of-i-38ebdbce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=68779109a83201eaacda5899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48300-cwe-434-unrestricted-upload-of-file-4f0cac80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48300%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=68779109a83201eaacda589c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48339-cwe-862-missing-authorization-in-ac-5f1ce30b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48339%3A%20CWE-862%20Missing%20Authorization%20in%20activity-log.com%20Profiler%20-%20What%20Slowing%20Down%20Your%20WP&amp;severity=medium&amp;id=68779109a83201eaacda589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48345-cwe-79-improper-neutralization-of-i-882a9b67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arisoft%20Contact%20Form%207%20Editor%20Button&amp;severity=null&amp;id=68779109a83201eaacda58a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49031-cwe-79-improper-neutralization-of-i-ab4fcaf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stefan%20M.%20SMu%20Manual%20DoFollow&amp;severity=null&amp;id=68779109a83201eaacda58a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49034-cwe-89-improper-neutralization-of-s-d0efd1a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49034%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=null&amp;id=68779109a83201eaacda58b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49319-cwe-862-missing-authorization-in-wp-4bb72e4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49319%3A%20Missing%20Authorization%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=68779109a83201eaacda58b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49876-cwe-89-improper-neutralization-of-s-8971f34d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49876%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68779109a83201eaacda58b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49884-cwe-862-missing-authorization-in-al-772c8267</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49884%3A%20Missing%20Authorization%20in%20alexvtn%20Internal%20Linking%20of%20Related%20Contents&amp;severity=null&amp;id=68779109a83201eaacda58bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49888-cwe-862-missing-authorization-in-pi-a914d261</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49888%3A%20Missing%20Authorization%20in%20pimwick%20PW%20WooCommerce%20On%20Sale!&amp;severity=null&amp;id=68779109a83201eaacda58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50028-cwe-862-missing-authorization-in-co-2a579219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50028%3A%20Missing%20Authorization%20in%20CodeSolz%20Ultimate%20Push%20Notifications&amp;severity=null&amp;id=68779109a83201eaacda58c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52714-cwe-89-improper-neutralization-of-s-f7e99790</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52714%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=68779109a83201eaacda58c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52777-cwe-79-improper-neutralization-of-i-e0c8ceab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52777%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmsMinds%20Pay%20with%20Contact%20Form%207&amp;severity=null&amp;id=68779109a83201eaacda58c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52779-cwe-79-improper-neutralization-of-i-ff9c8e65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52779%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karimmughal%20Dot%20html%2Cphp%2Cxml%20etc%20pages&amp;severity=null&amp;id=68779109a83201eaacda58ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52786-cwe-79-improper-neutralization-of-i-3f96734e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kingdom%20Creation%20Media%20Folder&amp;severity=null&amp;id=68779109a83201eaacda58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52787-cwe-79-improper-neutralization-of-i-8fd5e565</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EZiHosting%20Tennis%20Court%20Bookings&amp;severity=null&amp;id=6877910aa83201eaacda58e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52803-cwe-862-missing-authorization-in-ux-827154b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52803%3A%20CWE-862%20Missing%20Authorization%20in%20uxper%20Sala&amp;severity=high&amp;id=6877910aa83201eaacda58e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52804-cwe-862-missing-authorization-in-ux-da574267</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52804%3A%20Missing%20Authorization%20in%20uxper%20Nuss&amp;severity=null&amp;id=6877910aa83201eaacda58ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52819-cwe-89-improper-neutralization-of-s-d74a99d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52819%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pakkemx%20Pakke%20Env%C3%ADos&amp;severity=null&amp;id=6877910aa83201eaacda58ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52836-cwe-266-incorrect-privilege-assignm-b760e292</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52836%3A%20Incorrect%20Privilege%20Assignment%20in%20Unity%20Business%20Technology%20Pty%20Ltd%20The%20E-Commerce%20ERP&amp;severity=null&amp;id=6877910aa83201eaacda58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53757-cwe-614-sensitive-cookie-in-https-s-6aa81dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53757%3A%20CWE-614%3A%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=high&amp;id=6877910aa83201eaacda58f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53756-cwe-319-cleartext-transmission-of-s-1700cbc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53756%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=high&amp;id=68778d7fa83201eaacda060a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53755-cwe-312-cleartext-storage-of-sensit-19e7ba97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53755%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=medium&amp;id=68778d7fa83201eaacda0607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53754-cwe-798-use-of-hard-coded-credentia-48b5d29d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53754%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Digisol%20XPON%20ONU%20Wi-Fi%20Router%20(DG-GR6821AC)&amp;severity=medium&amp;id=68778d7fa83201eaacda0604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/psa-crystaldiskinfo-crystaldiskmark-now-embeds-adw-d9da8464</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PSA%3A%20CrystalDiskInfo%20%26%20CrystalDiskMark%20now%20embeds%20adwares%20%2F!%5C&amp;severity=medium&amp;id=68778679a83201eaacd9e78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48150-cwe-862-missing-authorization-in-bi-cb3f8197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48150%3A%20Missing%20Authorization%20in%20sminozzi%20Real%20Estate%20Property%202024%20Create%20Your%20Own%20Fields%20and%20Search%20Bar%20WP%20Plugin&amp;severity=null&amp;id=687782f9a83201eaacd978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48153-cwe-352-cross-site-request-forgery--0fbf3979</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48153%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Atakan%20Au%20Import%20CDN-Remote%20Images&amp;severity=null&amp;id=687782f9a83201eaacd978f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48155-cwe-862-missing-authorization-in-en-b57f02c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48155%3A%20Missing%20Authorization%20in%20enituretechnology%20Residential%20Address%20Detection&amp;severity=null&amp;id=687782f9a83201eaacd978f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48156-cwe-79-improper-neutralization-of-i-ab5326fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48156%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Parakoos%20Image%20Wall&amp;severity=null&amp;id=687782f9a83201eaacd978fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48161-cwe-89-improper-neutralization-of-s-bfbdcd2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48161%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YaySMTP&amp;severity=null&amp;id=687782f9a83201eaacd978ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48166-cwe-862-missing-authorization-in-bi-a943b041</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48166%3A%20Missing%20Authorization%20in%20sminozzi%20Stop%20and%20Block%20bots%20plugin%20Anti%20bots&amp;severity=null&amp;id=687782f9a83201eaacd97902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48167-cwe-862-missing-authorization-in-al-0202fefe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48167%3A%20Missing%20Authorization%20in%20alexvtn%20Chatbox%20Manager&amp;severity=null&amp;id=687782f9a83201eaacd97905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48294-cwe-918-server-side-request-forgery-6d5343db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48294%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kerfred%20FG%20Drupal%20to%20WordPress&amp;severity=null&amp;id=687782f9a83201eaacd97908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48295-cwe-79-improper-neutralization-of-i-7527722e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=687782f9a83201eaacd9790b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48299-cwe-89-improper-neutralization-of-s-51820541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48299%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YayExtra&amp;severity=null&amp;id=687782f9a83201eaacd9790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48301-cwe-89-improper-neutralization-of-s-4a8879dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48301%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20SMTP%20for%20SendGrid%20%E2%80%93%20YaySMTP&amp;severity=null&amp;id=687782faa83201eaacd9791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54051-cwe-79-improper-neutralization-of-i-ee5c62d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20LightBox%20Block&amp;severity=null&amp;id=687782fba83201eaacd9799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54050-cwe-79-improper-neutralization-of-i-925d86bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Addons%20for%20Elementor&amp;severity=null&amp;id=687782fba83201eaacd9799c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54047-cwe-862-missing-authorization-in-qu-db0197fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54047%3A%20Missing%20Authorization%20in%20QuanticaLabs%20Cost%20Calculator&amp;severity=null&amp;id=687782fba83201eaacd97999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54043-cwe-89-improper-neutralization-of-s-23fd8ec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54043%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20SMTP%20for%20Amazon%20SES&amp;severity=null&amp;id=687782fba83201eaacd97996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54042-cwe-352-cross-site-request-forgery--33c28fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54042%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Xfinitysoft%20WP%20Post%20Hide&amp;severity=null&amp;id=687782fba83201eaacd97993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54041-cwe-352-cross-site-request-forgery--ec1be161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54041%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=null&amp;id=687782fba83201eaacd97986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54039-cwe-352-cross-site-request-forgery--eaa70b2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54039%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Toast%20Plugins%20Animator&amp;severity=null&amp;id=687782fba83201eaacd97983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54038-cwe-352-cross-site-request-forgery--4f1848ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54038%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=null&amp;id=687782fba83201eaacd97980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54037-cwe-862-missing-authorization-in-bl-f45b4f32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54037%3A%20Missing%20Authorization%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=687782fba83201eaacd9797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54036-cwe-352-cross-site-request-forgery--c3664769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54036%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Webba%20Appointment%20Booking%20Webba%20Booking&amp;severity=null&amp;id=687782fba83201eaacd9797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54035-cwe-352-cross-site-request-forgery--331137d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54035%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=687782fba83201eaacd97977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54033-cwe-352-cross-site-request-forgery--07543f14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54033%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BlocksWP%20Theme%20Builder%20For%20Elementor&amp;severity=null&amp;id=687782fba83201eaacd97974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54030-cwe-352-cross-site-request-forgery--4156c724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54030%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WesternDeal%20WooCommerce%20Google%20Sheet%20Connector&amp;severity=null&amp;id=687782fba83201eaacd97971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54026-cwe-89-improper-neutralization-of-s-1319ee15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54026%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20QuanticaLabs%20GymBase%20Theme%20Classes&amp;severity=null&amp;id=687782fba83201eaacd9796e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54024-cwe-79-improper-neutralization-of-i-37f7953d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=687782fba83201eaacd9796b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54022-cwe-352-cross-site-request-forgery--9b8c8dec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54022%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=687782faa83201eaacd9795e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54020-cwe-352-cross-site-request-forgery--39b275f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54020%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Erik%20AntiSpam%20for%20Contact%20Form%207&amp;severity=null&amp;id=687782faa83201eaacd9795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54018-cwe-862-missing-authorization-in-cr-b4de0bd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54018%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20Pop-Up%20banners&amp;severity=null&amp;id=687782faa83201eaacd97958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54016-cwe-79-improper-neutralization-of-i-0e6a093f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54016%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Gilman%20Videopack&amp;severity=null&amp;id=687782faa83201eaacd97955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54015-cwe-98-improper-control-of-filename-4a1c66b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20HT%20Plugins%20HT%20Contact%20Form%207&amp;severity=null&amp;id=687782faa83201eaacd97952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54013-cwe-79-improper-neutralization-of-i-01e796f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=687782faa83201eaacd9794f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54010-cwe-352-cross-site-request-forgery--8e931d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54010%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20FluentSnippets&amp;severity=null&amp;id=687782faa83201eaacd9794c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54009-cwe-79-improper-neutralization-of-i-29766ebf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54009%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSmartFilters&amp;severity=null&amp;id=687782faa83201eaacd97949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54006-cwe-79-improper-neutralization-of-i-fad71a1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=687782faa83201eaacd97946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53997-cwe-862-missing-authorization-in-fa-50ee1550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53997%3A%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=null&amp;id=687782faa83201eaacd97943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53996-cwe-79-improper-neutralization-of-i-37735cdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53996%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=null&amp;id=687782faa83201eaacd97936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53995-cwe-79-improper-neutralization-of-i-b0aa2e66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53995%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=687782faa83201eaacd97933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53994-cwe-79-improper-neutralization-of-i-dfa446e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=687782faa83201eaacd97930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53991-cwe-79-improper-neutralization-of-i-c95442e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTricks&amp;severity=null&amp;id=687782faa83201eaacd9792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53990-cwe-502-deserialization-of-untruste-8e56c9f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53990%3A%20Deserialization%20of%20Untrusted%20Data%20in%20jetmonsters%20JetFormBuilder&amp;severity=null&amp;id=687782faa83201eaacd9792a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53989-cwe-79-improper-neutralization-of-i-50d432eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=687782faa83201eaacd97927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53986-cwe-862-missing-authorization-in-th-757d7ee6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53986%3A%20Missing%20Authorization%20in%20themeisle%20Hestia&amp;severity=null&amp;id=687782faa83201eaacd97924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53984-cwe-79-improper-neutralization-of-i-2ed9008d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=687782faa83201eaacd97921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53982-cwe-79-improper-neutralization-of-i-e1bafff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=687782faa83201eaacd9791e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-in-the-most-popular-survey-software-youve-neve-82d1c5b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20in%20the%20Most%20Popular%20Survey%20Software%20You%E2%80%99ve%20Never%20Heard%20Of&amp;severity=medium&amp;id=687a17e7a83201eaacf1bf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7699-cwe-287-improper-authentication-in-a-c86fe5d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7699%3A%20CWE-287%20Improper%20Authentication%20in%20ASUSTOR%20ADM&amp;severity=high&amp;id=68777867a83201eaacd9257c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22227-vulnerability-in-vmware-reactor-net-b533ea6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22227%3A%20Vulnerability%20in%20VMware%20Reactor%20Netty&amp;severity=medium&amp;id=687774e3a83201eaacd91706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40985-cwe-89-improper-neutralization-of-s-fd4607f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40985%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SCATI%20SCATI%20Vision%20Web&amp;severity=high&amp;id=687774e3a83201eaacd91709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7035-cwe-79-improper-neutralization-of-in-b128e7b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=68777169a83201eaacd8f4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6993-cwe-862-missing-authorization-in-rus-70993841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6993%3A%20CWE-862%20Missing%20Authorization%20in%20rustaurius%20Ultimate%20WP%20Mail&amp;severity=high&amp;id=68777169a83201eaacd8f4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5284-cwe-79-improper-neutralization-of-in-f51fabdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5284%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20White%20Label%2C%20Free%20Widgets%2C%20Hover%20Effects%2C%20Conditions%2C%20%26%20Animations&amp;severity=medium&amp;id=68777169a83201eaacd8f4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-ai-big-sleep-stops-exploitation-of-critical-50e99710</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20AI%20%22Big%20Sleep%22%20Stops%20Exploitation%20of%20Critical%20SQLite%20Vulnerability%20Before%20Hackers%20Act&amp;severity=critical&amp;id=6877715ea83201eaacd8f45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7703-cwe-287-improper-authentication-in-t-2d2db09a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7703%3A%20CWE-287%20Improper%20Authentication%20in%20TECNO%20tech.palm.id&amp;severity=low&amp;id=68776ddba83201eaacd8d5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-execution-through-email-how-i-used-claude-to--8ffd1d55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20Execution%20Through%20Email%3A%20How%20I%20Used%20Claude%20to%20Hack&amp;severity=medium&amp;id=68776352a83201eaacd84bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-secp0-ransomware-ea8f30b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Secp0%20Ransomware&amp;severity=medium&amp;id=68775fcaa83201eaacd81eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/octalyn-stealer-unmasked-fa2ecfc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OCTALYN%20STEALER%20UNMASKED&amp;severity=medium&amp;id=68775fcaa83201eaacd81ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/konfety-returns-classic-mobile-threat-with-new-eva-fbcfc2de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Konfety%20Returns%3A%20Classic%20Mobile%20Threat%20with%20New%20Evasion%20Techniques&amp;severity=medium&amp;id=68775c90a83201eaacd4c60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-asyncrat-navigating-the-labyrinth-of-for-22861dc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20AsyncRAT%3A%20Navigating%20the%20labyrinth%20of%20forks&amp;severity=medium&amp;id=68775c90a83201eaacd4c677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7673-cwe-120-buffer-copy-without-checking-add3c16d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7673%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zyxel%20VMG8825-T50K%20firmware&amp;severity=critical&amp;id=687751bba83201eaacd46d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6747-cwe-79-improper-neutralization-of-in-59b867a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=68774ab7a83201eaacd4380e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6043-cwe-862-missing-authorization-in-mal-06f85414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6043%3A%20CWE-862%20Missing%20Authorization%20in%20malcure%20Malcure%20Malware%20Scanner%20%E2%80%94%20%231%20Toolset%20for%20WordPress%20Malware%20Removal&amp;severity=high&amp;id=68774ab7a83201eaacd43808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5845-cwe-79-improper-neutralization-of-in-de4bf192</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchop%20Affiliate%20Reviews&amp;severity=medium&amp;id=68774ab7a83201eaacd43803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5843-cwe-79-improper-neutralization-of-in-88c8956f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5843%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandfolder%20Brandfolder%20%E2%80%93%20Digital%20Asset%20Management%20Simplified.&amp;severity=medium&amp;id=68774ab7a83201eaacd437fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7359-cwe-22-improper-limitation-of-a-path-7d04a4ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7359%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danielriera%20Counter%20live%20visitors%20for%20WooCommerce&amp;severity=high&amp;id=68774ab7a83201eaacd43812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52690-cwe-77-improper-neutralization-of-s-b1431ff3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52690%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Alcatel-Lucent%20OmniAccess%20Stellar%20Products&amp;severity=high&amp;id=68774ab7a83201eaacd437f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52689-cwe-384-session-fixation-in-alcatel-8cbfa686</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52689%3A%20CWE-384%20Session%20Fixation%20in%20Alcatel-Lucent%20OmniAccess%20Stellar%20Products&amp;severity=critical&amp;id=68774ab7a83201eaacd437f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52688-cwe-77-improper-neutralization-of-s-c90e905b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52688%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Alcatel-Lucent%20OmniAccess%20Stellar%20Products&amp;severity=critical&amp;id=6877472ea83201eaacd4048e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52687-vulnerability-in-alcatel-lucent-omn-e7568f05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52687%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Alcatel-Lucent%20OmniAccess%20Stellar&amp;severity=low&amp;id=6877472ea83201eaacd4048a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2799-cwe-79-improper-neutralization-of-in-210b21e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeventmanager%20WP%20Event%20Manager%20%E2%80%93%20Events%20Calendar%2C%20Registrations%2C%20Sell%20Tickets%20with%20WooCommerce&amp;severity=medium&amp;id=6877391fa83201eaacd3599a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2800-cwe-79-improper-neutralization-of-in-8c38831b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeventmanager%20WP%20Event%20Manager%20%E2%80%93%20Events%20Calendar%2C%20Registrations%2C%20Sell%20Tickets%20with%20WooCommerce&amp;severity=high&amp;id=6877391fa83201eaacd3599e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53842-use-of-hard-coded-credentials-in-ze-468a0867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53842%3A%20Use%20of%20hard-coded%20credentials%20in%20ZEXELON%20CO.%2C%20LTD.%20ZWX-2000CSW2-HN&amp;severity=medium&amp;id=68772e93a83201eaacd32c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6977-cwe-79-improper-neutralization-of-in-24fae73c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=68772b0ea83201eaacd31d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-16-77028c01</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-16&amp;severity=medium&amp;id=687840bda83201eaacdfd997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keras-215-remote-code-execution-rce-21aa0f41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keras%202.15%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=687816daa83201eaacdebcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-brokering-file-system-windows-11-version-bb2fbabd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Brokering%20File%20System%20Windows%2011%20Version%2022H2%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=687816daa83201eaacdebc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivotx-300-rc3-remote-code-execution-rce-9a112f96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PivotX%203.0.0%20RC3%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=687816daa83201eaacdebc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-graphics-component-windows-11-pro-build--a87846c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Graphics%20Component%20Windows%2011%20Pro%20(Build%2026100%2B)%20-%20Local%20Elevation%20of%20Privileges&amp;severity=high&amp;id=687816daa83201eaacdebc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/totolink-n300rb-854-command-execution-2ddc0616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TOTOLINK%20N300RB%208.54%20-%20Command%20Execution&amp;severity=medium&amp;id=687816daa83201eaacdebc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/langflow-12x-remote-code-execution-rce-2a40eedd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Langflow%201.2.x%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=687816daa83201eaacdebc88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sugarcrm-1400-ssrfcode-injection-a8e058a5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SugarCRM%2014.0.0%20-%20SSRF%2FCode%20Injection&amp;severity=medium&amp;id=687816daa83201eaacdebc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mikrotik-routeros-7191-reflected-xss-da830603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MikroTik%20RouterOS%207.19.1%20-%20Reflected%20XSS&amp;severity=medium&amp;id=687816daa83201eaacdebc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/white-star-software-protop-442-2024-11-27-local-fi-8ba4e472</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=White%20Star%20Software%20Protop%204.4.2-2024-11-27%20-%20Local%20File%20Inclusion%20(LFI)&amp;severity=medium&amp;id=687816daa83201eaacdebc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wp-publications-wordpress-plugin-12-stored-xss-0238b880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WP%20Publications%20WordPress%20Plugin%201.2%20-%20Stored%20XSS&amp;severity=medium&amp;id=687816daa83201eaacdebc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nodejs-24x-path-traversal-7f1f742a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NodeJS%2024.x%20-%20Path%20Traversal&amp;severity=medium&amp;id=687816daa83201eaacdebc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32353-na-61b49f66</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32353%3A%20n%2Fa&amp;severity=high&amp;id=6877bb51a83201eaacdbe12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32874-na-4946bfda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32874%3A%20n%2Fa&amp;severity=high&amp;id=6877bb51a83201eaacdbe125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-telegram-apps-spread-via-607-domains-in-new-a-25a4f652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Telegram%20Apps%20Spread%20via%20607%20Domains%20in%20New%20Android%20Malware%20Attack&amp;severity=medium&amp;id=6876c51aa83201eaacd0e079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30761-difficult-to-exploit-vulnerability--8ed55824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30761%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=6876c198a83201eaacd0caa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6981-cwe-863-incorrect-authorization-in-g-39c68371</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6981%3A%20CWE-863%20Incorrect%20Authorization%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=6876c198a83201eaacd0cab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49841-cwe-502-deserialization-of-untruste-35e76796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49841%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876c198a83201eaacd0caae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49840-cwe-502-deserialization-of-untruste-932dd2d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49840%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876c198a83201eaacd0caa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49839-cwe-502-deserialization-of-untruste-9572b18f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49839%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rainbow-hyena-strikes-again-new-backdoor-and-shift-7e1c6be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rainbow%20Hyena%20strikes%20again%3A%20new%20backdoor%20and%20shift%20in%20tactics&amp;severity=medium&amp;id=68775c90a83201eaacd4c651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49838-cwe-502-deserialization-of-untruste-641f73de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49838%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49837-cwe-502-deserialization-of-untruste-8c6a3714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49837%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49836-cwe-77-improper-neutralization-of-s-736439d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49836%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49835-cwe-77-improper-neutralization-of-s-692c762e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49835%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49834-cwe-77-improper-neutralization-of-s-3c75e161</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49834%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49833-cwe-77-improper-neutralization-of-s-b98a3cd2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49833%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Boss%20GPT-SoVITS&amp;severity=high&amp;id=6876be14a83201eaacd0bcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49831-cwe-287-improper-authentication-in--6d5b7789</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49831%3A%20CWE-287%3A%20Improper%20Authentication%20in%20cyberark%20conjur&amp;severity=critical&amp;id=6876bae4a83201eaacd0a1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49830-cwe-22-improper-limitation-of-a-pat-8eda23d5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49830%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20cyberark%20conjur&amp;severity=high&amp;id=6876b715a83201eaacd0668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49829-cwe-862-missing-authorization-in-cy-1dde8fef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49829%3A%20CWE-862%3A%20Missing%20Authorization%20in%20cyberark%20conjur&amp;severity=medium&amp;id=6876b38da83201eaacd057b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49828-cwe-1336-improper-neutralization-of-bcb7c7c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49828%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20cyberark%20conjur&amp;severity=high&amp;id=6876b008a83201eaacd043c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53032-easily-exploitable-vulnerability-al-48e0c985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53032%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53031-easily-exploitable-vulnerability-al-048d64cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53031%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Analytical%20Applications%20Infrastructure&amp;severity=medium&amp;id=6876b00ca83201eaacd044f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53030-easily-exploitable-vulnerability-al-fff3b996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53030%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=6876b00ca83201eaacd044f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53029-easily-exploitable-vulnerability-al-30c9fe3f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53029%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=low&amp;id=6876b00ca83201eaacd044ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53028-easily-exploitable-vulnerability-al-7e717858</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53028%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=6876b00ca83201eaacd044ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53027-easily-exploitable-vulnerability-al-d1dc7d99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53027%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=6876b00ca83201eaacd044e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53026-easily-exploitable-vulnerability-al-c762761c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53026%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=6876b00ca83201eaacd044e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53025-easily-exploitable-vulnerability-al-77d4068f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53025%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=medium&amp;id=6876b00ca83201eaacd044e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53024-easily-exploitable-vulnerability-al-f9a37606</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53024%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=6876b00ca83201eaacd044d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53023-easily-exploitable-vulnerability-al-32ccecfe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53023%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00ca83201eaacd044d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50108-easily-exploitable-vulnerability-al-e2c9e449</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50108%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Financial%20Reporting.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Hyperion%20Financial%20Reporting%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Hyperion%20Financial%20Reporting%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Hyperion%20Financial%20Reporting%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Financial%20Reporting&amp;severity=medium&amp;id=6876b00ca83201eaacd044ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50107-easily-exploitable-vulnerability-al-9eb2c6ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50107%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Universal%20Work%20Queue.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Universal%20Work%20Queue%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Universal%20Work%20Queue%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Universal%20Work%20Queue%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Universal%20Work%20Queue&amp;severity=medium&amp;id=6876b00ca83201eaacd044cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50106-difficult-to-exploit-vulnerability--5dbece0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50106%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b00ca83201eaacd044c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50105-easily-exploitable-vulnerability-al-51adf12d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50105%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Universal%20Work%20Queue.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Universal%20Work%20Queue%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Universal%20Work%20Queue%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Universal%20Work%20Queue&amp;severity=high&amp;id=6876b00ca83201eaacd044c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50104-easily-exploitable-vulnerability-al-5eeb7a8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50104%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6876b00ca83201eaacd044c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50103-difficult-to-exploit-vulnerability--04789bb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50103%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50102-easily-exploitable-vulnerability-al-64a447a1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50102%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50101-easily-exploitable-vulnerability-al-e3c9eae4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50101%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ca83201eaacd044b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50100-difficult-to-exploit-vulnerability--5306c560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50100%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6876b00ba83201eaacd044ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50099-easily-exploitable-vulnerability-al-d0907318</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50099%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd044a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50098-easily-exploitable-vulnerability-al-440b7d13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50098%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6876b00ba83201eaacd044a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50097-easily-exploitable-vulnerability-al-5d4f5da0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50097%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd044a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50096-easily-exploitable-vulnerability-al-f70f5aec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50096%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd044a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50095-easily-exploitable-vulnerability-al-67ce7e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50095%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0449d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50094-easily-exploitable-vulnerability-al-2e308913</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50094%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0449a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50093-easily-exploitable-vulnerability-al-705c96b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50093%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50092-easily-exploitable-vulnerability-al-aca1d251</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50092%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50091-easily-exploitable-vulnerability-al-de399de3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50091%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50090-easily-exploitable-vulnerability-al-3d012777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50090%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=6876b00ba83201eaacd04484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50089-easily-exploitable-vulnerability-al-3d0b87f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50089%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50088-easily-exploitable-vulnerability-al-41bc92ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50088%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0447e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50087-easily-exploitable-vulnerability-al-548cd537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50087%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00ba83201eaacd0447b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50086-easily-exploitable-vulnerability-al-233908f4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50086%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50085-easily-exploitable-vulnerability-al-785d5fd6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50085%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50084-easily-exploitable-vulnerability-al-6930c830</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50084%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd04472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50083-easily-exploitable-vulnerability-al-84f6518a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50083%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0446f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50082-easily-exploitable-vulnerability-al-616d9947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50082%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00ba83201eaacd0446c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50081-difficult-to-exploit-vulnerability--a6af2d74</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50081%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Cluster%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=low&amp;id=6876b00ba83201eaacd04469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50080-easily-exploitable-vulnerability-al-4d41d8b0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50080%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd0445c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50079-easily-exploitable-vulnerability-al-08b55534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50079%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50078-easily-exploitable-vulnerability-al-2e4b3850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50078%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50077-easily-exploitable-vulnerability-al-d504e601</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50077%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00aa83201eaacd04453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50076-easily-exploitable-vulnerability-al-10b3b823</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50076%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50073-easily-exploitable-vulnerability-al-535d091c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50073%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20WebLogic%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebLogic%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd0444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50072-easily-exploitable-vulnerability-al-c47de3e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50072%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20WebLogic%20Server%20executes%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd0444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50071-easily-exploitable-vulnerability-al-875387b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50071%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Applications%20Framework.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Applications%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Applications%20Framework%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Applications%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Applications%20Framework&amp;severity=medium&amp;id=6876b00aa83201eaacd04447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50070-difficult-to-exploit-vulnerability--fe62dd35</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50070%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Authenticated%20OS%20User%20privilege%20with%20logon%20to%20the%20infrastructure%20where%20JDBC%20executes%20to%20compromise%20JDBC.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20JDBC%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20JDBC%20accessible%20data.%20in%20Oracle%20Corporation%20JDBC&amp;severity=medium&amp;id=6876b00aa83201eaacd04444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50069-easily-exploitable-vulnerability-al-62b4847e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50069%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Create%20Session%2C%20Create%20Procedure%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Java%20VM.%20%20While%20the%20vulnerability%20is%20in%20Java%20VM%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=6876b00aa83201eaacd04441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50068-easily-exploitable-vulnerability-al-981e9297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50068%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Cluster%20executes%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6876b00aa83201eaacd04434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50067-easily-exploitable-vulnerability-al-22e8fdaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50067%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Application%20Express.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Application%20Express%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Application%20Express.%20in%20Oracle%20Corporation%20Oracle%20Application%20Express&amp;severity=critical&amp;id=6876b00aa83201eaacd04431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50066-easily-exploitable-vulnerability-al-f57734b1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50066%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Execute%20on%20DBMS_REDEFINITION%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Database%20Materialized%20View.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Database%20Materialized%20View%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=6876b00aa83201eaacd0442e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50065-difficult-to-exploit-vulnerability--2bd74565</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50065%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20GraalVM%20for%20JDK.%20in%20Oracle%20Corporation%20Oracle%20GraalVM%20for%20JDK&amp;severity=low&amp;id=6876b00aa83201eaacd0442b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50064-easily-exploitable-vulnerability-al-698f1ad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50064%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20WebLogic%20Server%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebLogic%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b00aa83201eaacd04428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50063-easily-exploitable-vulnerability-al-b1902ae3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50063%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%20executes%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Java%20SE.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b00aa83201eaacd04425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50062-easily-exploitable-vulnerability-al-19f5e675</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50062%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20HCM%20Global%20Payroll%20Core&amp;severity=high&amp;id=6876b00aa83201eaacd04422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50061-easily-exploitable-vulnerability-al-3806529d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50061%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Primavera%20P6%20Enterprise%20Project%20Portfolio%20Management&amp;severity=medium&amp;id=6876b00aa83201eaacd0441f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50060-easily-exploitable-vulnerability-al-0cffb4c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50060%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20BI%20Publisher%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20BI%20Publisher&amp;severity=high&amp;id=6876b00aa83201eaacd0441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50059-easily-exploitable-vulnerability-al-71570e81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50059%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b00aa83201eaacd04419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30762-easily-exploitable-vulnerability-al-6d688195</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30762%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20T3%2C%20IIOP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=high&amp;id=6876b009a83201eaacd04408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30760-easily-exploitable-vulnerability-al-821e4c5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30760%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20JD%20Edwards%20EnterpriseOne%20Tools%20accessible%20data.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=medium&amp;id=6876b009a83201eaacd04405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30759-easily-exploitable-vulnerability-al-1f08a18a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30759%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=medium&amp;id=6876b009a83201eaacd04402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30758-easily-exploitable-vulnerability-al-34f270cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30758%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Siebel%20CRM%20End%20User.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Siebel%20CRM%20End%20User%20accessible%20data.%20in%20Oracle%20Corporation%20Siebel%20CRM%20End%20User&amp;severity=medium&amp;id=6876b009a83201eaacd043ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30756-easily-exploitable-vulnerability-al-959a62b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30756%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20REST%20Data%20Services.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20REST%20Data%20Services%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20REST%20Data%20Services%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20REST%20Data%20Services%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20REST%20Data%20Services&amp;severity=medium&amp;id=6876b009a83201eaacd043fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30754-difficult-to-exploit-vulnerability--977eb099</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30754%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20TLS%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=6876b009a83201eaacd043f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30753-easily-exploitable-vulnerability-al-103f7a9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30753%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=medium&amp;id=6876b009a83201eaacd043f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30752-difficult-to-exploit-vulnerability--a5b49bf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30752%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=6876b009a83201eaacd043f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30751-easily-exploitable-vulnerability-al-9b35e4cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30751%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Create%20Session%2C%20Create%20Procedure%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Database.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Database.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=6876b009a83201eaacd043f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30750-easily-exploitable-vulnerability-al-7d176934</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30750%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20having%20Create%20User%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Unified%20Audit.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Unified%20Audit%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=low&amp;id=6876b008a83201eaacd043e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30749-difficult-to-exploit-vulnerability--59a318d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30749%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=6876b008a83201eaacd043e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30748-easily-exploitable-vulnerability-al-c1a75a3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30748%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20PeopleSoft%20Enterprise%20PeopleTools%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=6876b008a83201eaacd043dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30747-easily-exploitable-vulnerability-al-a49f7018</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30747%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20PeopleTools.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20PeopleSoft%20Enterprise%20PeopleTools%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20PeopleTools&amp;severity=medium&amp;id=6876b008a83201eaacd043da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30746-easily-exploitable-vulnerability-al-d624ba7b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30746%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iStore.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20iStore%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20iStore%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iStore%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20iStore&amp;severity=medium&amp;id=6876b008a83201eaacd043d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30745-easily-exploitable-vulnerability-al-73143425</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30745%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20MES%20for%20Process%20Manufacturing.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20MES%20for%20Process%20Manufacturing%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20MES%20for%20Process%20Manufacturing%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20MES%20for%20Process%20Manufacturing%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20MES%20for%20Process%20Manufacturing&amp;severity=medium&amp;id=6876b008a83201eaacd043d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30744-easily-exploitable-vulnerability-al-7a36b72e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30744%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Mobile%20Field%20Service.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Mobile%20Field%20Service%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Mobile%20Field%20Service%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Mobile%20Field%20Service&amp;severity=high&amp;id=6876b008a83201eaacd043d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30743-easily-exploitable-vulnerability-al-0fab26f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30743%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Lease%20and%20Finance%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Lease%20and%20Finance%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Lease%20and%20Finance%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Lease%20and%20Finance%20Management&amp;severity=high&amp;id=6876b008a83201eaacd043ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49827-cwe-807-reliance-on-untrusted-input-cd8c53fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49827%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20cyberark%20conjur&amp;severity=critical&amp;id=6876b009a83201eaacd0440b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30739-easily-exploitable-vulnerability-al-db524bd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30739%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20CRM%20Technical%20Foundation.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20CRM%20Technical%20Foundation%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20CRM%20Technical%20Foundation%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20CRM%20Technical%20Foundation%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20CRM%20Technical%20Foundation&amp;severity=medium&amp;id=6876b008a83201eaacd043cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41239-cwe-908-use-of-uninitialized-resour-d5f6d487</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41239%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20VMware%20ESXi&amp;severity=high&amp;id=6876a1f4a83201eaaccfe709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41238-cwe-787-out-of-bounds-write-in-vmwa-071ba4d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41238%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20ESXi&amp;severity=critical&amp;id=6876a1f4a83201eaaccfe706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41237-cwe-787-out-of-bounds-write-in-vmwa-6e1d4afe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41237%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20Cloud%20Foundation&amp;severity=critical&amp;id=6876a1f4a83201eaaccfe703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41236-cwe-787-out-of-bounds-write-in-vmwa-ea68248c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41236%3A%20CWE-787%20Out-of-bounds%20Write%20in%20VMware%20ESXi&amp;severity=critical&amp;id=6876a1f4a83201eaaccfe700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-emerged-global-group-raas-expands-operations-d8520e00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Emerged%20GLOBAL%20GROUP%20RaaS%20Expands%20Operations%20with%20AI-Driven%20Negotiation%20Tools&amp;severity=high&amp;id=68769e6ea83201eaaccfd98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hyper-volumetric-ddos-attacks-reach-record-73-tbps-e2aea9f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hyper-Volumetric%20DDoS%20Attacks%20Reach%20Record%207.3%20Tbps%2C%20Targeting%20Key%20Global%20Sectors&amp;severity=high&amp;id=68769e6ea83201eaaccfd991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-disrupt-diskstation-ransomware-gang-attacki-7ebf1777</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20disrupt%20%E2%80%9CDiskstation%E2%80%9D%20ransomware%20gang%20attacking%20NAS%20devices&amp;severity=high&amp;id=68769e6ea83201eaaccfd989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53903-cwe-79-improper-neutralization-of-i-79856e1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53903%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The-Scratch-Channel%20the-scratch-channel.github.io&amp;severity=low&amp;id=68769e9ca83201eaaccfda5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7657-use-after-free-in-google-chrome-b4653c1a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7657%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68769aeba83201eaaccfd390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6558-insufficient-validation-of-untrusted-60b1a264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6558%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=68769aeba83201eaaccfd388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7656-integer-overflow-in-google-chrome-8310d91c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7656%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68769aeba83201eaaccfd38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-hide-javascript-in-svg-images-to-lure-us-f5c305bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Hide%20JavaScript%20in%20SVG%20Images%20to%20Lure%20Users%20to%20Malicious%20Sites&amp;severity=medium&amp;id=687693e0a83201eaaccfa202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53959-cwe-862-in-jetbrains-youtrack-daba85dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53959%3A%20CWE-862%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=6876826ca83201eaaccf758f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/belk-hit-by-may-cyberattack-dragonforce-stole-150g-0b854907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Belk%20hit%20by%20May%20cyberattack%3A%20DragonForce%20stole%20150GB%20of%20data&amp;severity=high&amp;id=6876824ba83201eaaccf7537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-konfety-uses-malformed-apks-to-eva-aa694956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20malware%20Konfety%20uses%20malformed%20APKs%20to%20evade%20detection&amp;severity=high&amp;id=6876824ba83201eaaccf7533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7042-cwe-416-use-after-free-in-dassault-s-8931000f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7042%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6974-cwe-457-use-of-uninitialized-variabl-5b4c9f3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6974%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6973-cwe-416-use-after-free-in-dassault-s-e63718a6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6973%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6972-cwe-416-use-after-free-in-dassault-s-8516e859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6972%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6971-cwe-416-use-after-free-in-dassault-s-70432ac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6971%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0831-cwe-125-out-of-bounds-read-in-dassau-8c0b321b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0831%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=687670b9a83201eaaccf4d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30483-cwe-532-insertion-of-sensitive-info-eeb9ad56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30483%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20ECS&amp;severity=medium&amp;id=687669b1a83201eaaccf1d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33097-cwe-79-in-ibm-qradar-siem-b13a8e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33097%3A%20CWE-79%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=687669b1a83201eaaccf1d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48795-cwe-400-uncontrolled-resource-consu-5c54736b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48795%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=medium&amp;id=687669b1a83201eaaccf1d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/homebrew-malware-campaign-50170dd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Homebrew%20Malware%20Campaign&amp;severity=medium&amp;id=687669b6a83201eaaccf1d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34107-cwe-121-stack-based-buffer-overflow-074e71f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34107%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20LabF%20WinaXe%20FTP%20Client&amp;severity=high&amp;id=687654a5a83201eaaccea50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34103-cwe-78-improper-neutralization-of-s-a2b202ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34103%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20WePresent%20(Barco)%20WiPG-1000&amp;severity=critical&amp;id=687654a5a83201eaaccea4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34111-cwe-434-unrestricted-upload-of-file-9d22fca7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34111%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Tiki%20Software%20Community%20Association%20Wiki%20CMS%20Groupware&amp;severity=critical&amp;id=687654a5a83201eaaccea526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34113-cwe-306-missing-authentication-for--35dbba99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34113%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Tiki%20Software%20Community%20Association%20Wiki%20CMS%20Groupware&amp;severity=high&amp;id=687654a5a83201eaaccea53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34068-cwe-78-improper-neutralization-of-s-0c9c1475</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34068%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Samsung%20Electronics%20WLAN%20AP%20WEA453e&amp;severity=critical&amp;id=687654a5a83201eaaccea4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34112-cwe-89-improper-neutralization-of-s-66cce053</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34112%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Riverbed%20Technology%20SteelCentral%20NetExpress&amp;severity=critical&amp;id=687654a5a83201eaaccea536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34104-cwe-434-unrestricted-upload-of-file-fb2ed972</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34104%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Piwik%20(now%20Matomo)%20Web%20Analytics%20Platform&amp;severity=critical&amp;id=687654a5a83201eaaccea4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34106-cwe-119-improper-restriction-of-ope-5b06c5f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34106%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Burnaware%20PDF%20Shaper&amp;severity=high&amp;id=687654a5a83201eaaccea505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34109-cwe-427-uncontrolled-search-path-el-d01505a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34109%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Panda%20Security%20Panda%20Global%20Protection%202016&amp;severity=high&amp;id=687654a5a83201eaaccea519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34115-cwe-78-improper-neutralization-of-s-69938142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34115%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ITRS%20Group%20OP5%20Monitor&amp;severity=high&amp;id=687654a5a83201eaaccea543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34116-cwe-78-improper-neutralization-of-s-5d84418b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34116%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IPFire%20Project%20IPFire&amp;severity=high&amp;id=687654a5a83201eaaccea549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34105-cwe-20-improper-input-validation-in-919d542a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34105%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Flexense%20DiskBoss%20Enterprise&amp;severity=critical&amp;id=687654a5a83201eaaccea4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uk-pet-owners-targeted-by-fake-microchip-renewal-s-3e8e454b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UK%20Pet%20Owners%20Targeted%20by%20Fake%20Microchip%20Renewal%20Scams&amp;severity=medium&amp;id=68765497a83201eaaccea4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34108-cwe-121-stack-based-buffer-overflow-8331a3d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34108%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Falconstor%20Software%20Disk%20Pulse%20Enterprise&amp;severity=high&amp;id=687654a5a83201eaaccea512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34110-cwe-22-improper-limitation-of-a-pat-5e0fae7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34110%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ColoradoFTP%20Server&amp;severity=critical&amp;id=687654a5a83201eaaccea520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asyncrats-open-source-code-sparks-surge-in-dangero-7a844e06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AsyncRAT&apos;s%20Open-Source%20Code%20Sparks%20Surge%20in%20Dangerous%20Malware%20Variants%20Across%20the%20Globe&amp;severity=high&amp;id=68765112a83201eaacce93d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/state-backed-hazybeacon-malware-uses-aws-lambda-to-ff817ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=State-Backed%20HazyBeacon%20Malware%20Uses%20AWS%20Lambda%20to%20Steal%20Data%20from%20SE%20Asian%20Governments&amp;severity=high&amp;id=68765112a83201eaacce93de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7667-cwe-352-cross-site-request-forgery-c-5393875d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7667%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josxha%20Restrict%20File%20Access&amp;severity=high&amp;id=68763bfda83201eaacce4b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korean-hackers-flood-npm-registry-with-xorin-25d4973e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korean%20Hackers%20Flood%20npm%20Registry%20with%20XORIndex%20Malware%20in%20Ongoing%20Attack%20Campaign&amp;severity=high&amp;id=6876316da83201eaacce1e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/doge-denizen-marko-elez-leaked-api-key-for-xai-5e0b0302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DOGE%20Denizen%20Marko%20Elez%20Leaked%20API%20Key%20for%20xAI&amp;severity=high&amp;id=687626e1a83201eaaccdff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-seized-multiple-piracy-sites-distributing-pira-3a571ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20seized%20multiple%20piracy%20sites%20distributing%20pirated%20video%20games&amp;severity=medium&amp;id=687626e1a83201eaaccdff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4369-cwe-79-improper-neutralization-of-in-6c92bc1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20papin%20Companion%20Auto%20Update&amp;severity=medium&amp;id=68761fd9a83201eaaccdead4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24477-escalation-of-privilege-in-fortinet-528c83de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24477%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=687611c9a83201eaaccd94f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7672-cwe-79-improper-neutralization-of-in-68844ecb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20JiranSoft%20CrossEditor4&amp;severity=low&amp;id=687603bda83201eaaccd60fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3621-cwe-77-improper-neutralization-of-sp-2d40ff80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3621%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ProTNS%20ActADUR&amp;severity=critical&amp;id=687603bda83201eaaccd60fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7340-cwe-434-unrestricted-upload-of-file--e14c8bc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7340%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20htplugins%20HT%20Contact%20Form%20Widget%20For%20Elementor%20Page%20Builder%20%26%20Gutenberg%20Blocks%20%26%20Form%20Builder.&amp;severity=critical&amp;id=6875d989a83201eaacccacf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7360-cwe-22-improper-limitation-of-a-path-48960e48</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7360%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20htplugins%20HT%20Contact%20Form%20Widget%20For%20Elementor%20Page%20Builder%20%26%20Gutenberg%20Blocks%20%26%20Form%20Builder.&amp;severity=critical&amp;id=6875d989a83201eaacccacfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7367-cwe-79-improper-neutralization-of-in-940bad2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Strong%20Testimonials&amp;severity=medium&amp;id=6875d989a83201eaacccad02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7341-cwe-269-improper-privilege-managemen-04354ed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7341%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20htplugins%20HT%20Contact%20Form%20Widget%20For%20Elementor%20Page%20Builder%20%26%20Gutenberg%20Blocks%20%26%20Form%20Builder.&amp;severity=critical&amp;id=6875d989a83201eaacccacf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5394-cwe-862-missing-authorization-in-bea-ab3af619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5394%3A%20CWE-862%20Missing%20Authorization%20in%20Bearsthemes%20Alone%20%E2%80%93%20Charity%20Multipurpose%20Non-profit%20WordPress%20Theme&amp;severity=critical&amp;id=6875d2dfa83201eaaccc9375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5393-cwe-73-external-control-of-file-name-b45083e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5393%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Bearsthemes%20Alone%20%E2%80%93%20Charity%20Multipurpose%20Non-profit%20WordPress%20Theme&amp;severity=critical&amp;id=6875d2dfa83201eaaccc9371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6265-cwe-22-improper-limitation-of-a-path-8caabc1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6265%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zyxel%20NWA50AX%20PRO%20firmware&amp;severity=high&amp;id=6875b667a83201eaaccc25e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53891-cwe-434-unrestricted-upload-of-file-f93c18da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53891%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TimeLineOfficial%20Time-Line-&amp;severity=medium&amp;id=68759dc5a83201eaaccb4e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-15-4d87fda0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-15&amp;severity=medium&amp;id=6876ef3da83201eaacd1c7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26186-na-e96b626e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26186%3A%20n%2Fa&amp;severity=high&amp;id=68768cdda83201eaaccf939e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52082-na-c4831016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52082%3A%20n%2Fa&amp;severity=medium&amp;id=68767b45a83201eaaccf63f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52081-na-28a67128</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52081%3A%20n%2Fa&amp;severity=medium&amp;id=68767b45a83201eaaccf63ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52080-na-c7cf787a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52080%3A%20n%2Fa&amp;severity=medium&amp;id=68767b45a83201eaaccf63ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50819-na-728a4fc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50819%3A%20n%2Fa&amp;severity=high&amp;id=6876743da83201eaaccf5583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52377-na-613242f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52377%3A%20n%2Fa&amp;severity=medium&amp;id=68766d35a83201eaaccf34c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52379-na-46633e21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52379%3A%20n%2Fa&amp;severity=medium&amp;id=687669b1a83201eaaccf1d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52378-na-afcf0682</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52378%3A%20n%2Fa&amp;severity=medium&amp;id=6876662ca83201eaaccf13bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52376-na-cf52445c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52376%3A%20n%2Fa&amp;severity=critical&amp;id=687662afa83201eaaccf09bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53839-cwe-79-improper-neutralization-of-i-353db707</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53839%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dracoon%20security-advisories&amp;severity=medium&amp;id=6876b38da83201eaacd057bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53836-cwe-863-incorrect-authorization-in--d7118136</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53836%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-rendering&amp;severity=critical&amp;id=6876b38da83201eaacd057b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53835-cwe-79-improper-neutralization-of-i-71092183</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53835%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-rendering&amp;severity=critical&amp;id=68758fb5a83201eaaccb2975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53833-cwe-1336-improper-neutralization-of-a831857e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53833%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20saleem-hadad%20larecipe&amp;severity=critical&amp;id=68758c31a83201eaaccb1779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53824-cwe-79-improper-neutralization-of-i-91d75a27</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53824%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687588ada83201eaaccb1207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53823-cwe-89-improper-neutralization-of-s-b041eb53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53823%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=687588ada83201eaaccb120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53822-cwe-79-improper-neutralization-of-i-4c9a40ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53822%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=687588ada83201eaaccb120a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53821-cwe-601-url-redirection-to-untruste-7261d6a0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53821%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68758529a83201eaaccb0bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-basketball-star-daniil-kasatkin-arrested-i-5e98058e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Basketball%20Star%20Daniil%20Kasatkin%20Arrested%20in%20Ransomware%20Probe&amp;severity=medium&amp;id=68757e1fa83201eaaccafd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53820-cwe-79-improper-neutralization-of-i-4cf84087</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53820%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=68757011a83201eaaccacdc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53819-cwe-271-privilege-dropping-lowering-15b97ecb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53819%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20NixOS%20nix&amp;severity=high&amp;id=68756c8da83201eaaccac0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53818-cwe-78-improper-neutralization-of-s-e2286be8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53818%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sunwood-ai-labs%20github-kanban-mcp-server&amp;severity=high&amp;id=68756c8da83201eaaccac0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53643-cwe-444-inconsistent-interpretation-68f10362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53643%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=6875696ba83201eaaccaa8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53623-cwe-78-improper-neutralization-of-s-cfb16af6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53623%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20job-iteration&amp;severity=high&amp;id=68756214a83201eaacc9e211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-adopts-filefix-method-to-deli-d32ca324</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20adopts%20FileFix%20method%20to%20deliver%20malware&amp;severity=high&amp;id=687561ffa83201eaacc9e1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-jailbreak-grok-4-ai-within-48-hours-of-8551d24c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Jailbreak%20Grok-4%20AI%20Within%2048%20Hours%20of%20Launch&amp;severity=medium&amp;id=68755778a83201eaacc9ab1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gigabyte-motherboards-vulnerable-to-uefi-malware-b-510f7adf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gigabyte%20motherboards%20vulnerable%20to%20UEFI%20malware%20bypassing%20Secure%20Boot&amp;severity=high&amp;id=68754968a83201eaacc8ea9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louis-vuitton-uk-hit-by-cyberattack-third-lvmh-bre-c486f332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louis%20Vuitton%20UK%20Hit%20by%20Cyberattack%2C%20Third%20LVMH%20Breach%20in%203%20Months&amp;severity=high&amp;id=68754968a83201eaacc8ea9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7628-path-traversal-in-yijiusmile-kkfilev-d080c0be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7628%3A%20Path%20Traversal%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=68754984a83201eaacc8eaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7627-unrestricted-upload-in-yijiusmile-kk-7a7bf83e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7627%3A%20Unrestricted%20Upload%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=6875425ba83201eaacc8b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7626-path-traversal-in-yijiusmile-kkfilev-c7a419ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7626%3A%20Path%20Traversal%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=68753b53a83201eaacc84e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7625-path-traversal-in-yijiusmile-kkfilev-87c35334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7625%3A%20Path%20Traversal%20in%20YiJiuSmile%20kkFileViewOfficeEdit&amp;severity=medium&amp;id=687530c7a83201eaacc8223c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7616-memory-corruption-in-gmg137-snap7-rs-82be2028</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7616%3A%20Memory%20Corruption%20in%20gmg137%20snap7-rs&amp;severity=medium&amp;id=6875263ba83201eaacc7f113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7615-command-injection-in-totolink-t6-e3e50559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7615%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=687522b7a83201eaacc7ca81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7614-command-injection-in-totolink-t6-e739b542</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7614%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=68751f33a83201eaacc7c00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7613-command-injection-in-totolink-t6-f7b2f8a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7613%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=68751bafa83201eaacc7aa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-forensic-technique-uncovers-hidden-trails-left-1e083e77</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Forensic%20Technique%20Uncovers%20Hidden%20Trails%20Left%20by%20Hackers%20Exploiting%20Remote%20Desktop%20Protocol&amp;severity=high&amp;id=68751828a83201eaacc7859f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7612-sql-injection-in-code-projects-mobil-6a79fa05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7612%3A%20SQL%20Injection%20in%20code-projects%20Mobile%20Shop&amp;severity=medium&amp;id=68751835a83201eaacc785de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7611-sql-injection-in-code-projects-weddi-1dfcd0b0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7611%3A%20SQL%20Injection%20in%20code-projects%20Wedding%20Reservation&amp;severity=medium&amp;id=687514a8a83201eaacc75dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-the-clouds-attackers-targeting-governments--e7eb126e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20the%20Clouds%3A%20Attackers%20Targeting%20Governments%20in%20Southeast%20Asia%20Implement%20Novel%20Covert%20C2%20Communication&amp;severity=medium&amp;id=68761fd8a83201eaaccdeaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7610-sql-injection-in-code-projects-elect-0f59932d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7610%3A%20SQL%20Injection%20in%20code-projects%20Electricity%20Billing%20System&amp;severity=medium&amp;id=68751122a83201eaacc74adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-php-malware-uses-zip-archive-to-redirect--c2684475</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20PHP%20Malware%20Uses%20ZIP%20Archive%20to%20Redirect%20WordPress%20Visitors&amp;severity=medium&amp;id=68750da0a83201eaacc72b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norddragonscan-quiet-data-harvester-on-windows-b198a370</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NordDragonScan%3A%20Quiet%20Data-Harvester%20on%20Windows&amp;severity=medium&amp;id=68750da0a83201eaacc72b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7609-sql-injection-in-code-projects-simpl-7decc8dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7609%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=68751122a83201eaacc74ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7519-out-of-bounds-write-in-red-hat-red-h-f44bae2a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7519%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=68750da0a83201eaacc72b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7608-sql-injection-in-code-projects-simpl-524547f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7608%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=6875696ba83201eaaccaa8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7607-sql-injection-in-code-projects-simpl-154d7777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7607%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=68750696a83201eaacc6cd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7606-sql-injection-in-code-projects-avl-r-646aeb1d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7606%3A%20SQL%20Injection%20in%20code-projects%20AVL%20Rooms&amp;severity=medium&amp;id=68750312a83201eaacc6b38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/recruitment-themed-phishing-campaign-7e1fc6b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Recruitment%20Themed%20Phishing%20Campaign&amp;severity=medium&amp;id=6874ff92a83201eaacc68976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7605-sql-injection-in-code-projects-avl-r-8a2f99fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7605%3A%20SQL%20Injection%20in%20code-projects%20AVL%20Rooms&amp;severity=medium&amp;id=6874ff8ea83201eaacc68960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7604-sql-injection-in-phpgurukul-hospital-28072852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7604%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=6874fc0aa83201eaacc6625b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7603-stack-based-buffer-overflow-in-d-lin-8dfd2d70</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7603%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6874f886a83201eaacc63576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7602-stack-based-buffer-overflow-in-d-lin-5b3f0ab0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7602%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6874f502a83201eaacc5fb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/louis-vuitton-uk-latest-retailer-hit-by-data-breac-9f03655d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Louis%20Vuitton%20UK%20Latest%20Retailer%20Hit%20by%20Data%20Breach&amp;severity=high&amp;id=6874f17ba83201eaacc5e5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/likely-belarus-nexus-threat-actor-delivers-downloa-0e58802e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Likely%20Belarus-Nexus%20Threat%20Actor%20Delivers%20Downloader%20to%20Poland&amp;severity=medium&amp;id=68750a19a83201eaacc714d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7601-cross-site-scripting-in-phpgurukul-o-b7afc126</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7601%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=6874f886a83201eaacc6357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7600-sql-injection-in-phpgurukul-online-l-d3bc7777</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7600%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Library%20Management%20System&amp;severity=medium&amp;id=6874edf9a83201eaacc5d3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7599-sql-injection-in-phpgurukul-dairy-fa-d2dbf9d0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7599%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874ea75a83201eaacc5b162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7598-stack-based-buffer-overflow-in-tenda-225199db</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7598%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6874e6f4a83201eaacc53dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7597-stack-based-buffer-overflow-in-tenda-b4ddcf1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7597%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AX1803&amp;severity=high&amp;id=6874ff8ea83201eaacc68967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fooling-the-sandbox-a-chrome-atic-escape-1227b1c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fooling%20the%20Sandbox%3A%20A%20Chrome-atic%20Escape&amp;severity=medium&amp;id=6874dff1a83201eaacc50ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7596-stack-based-buffer-overflow-in-tenda-6cf6fd04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7596%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1205&amp;severity=high&amp;id=6874dfeba83201eaacc50aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51768-vulnerability-in-hewlett-packard-en-ac3fcea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51768%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20AutoPass%20License%20Server&amp;severity=high&amp;id=69a0a1ce85912abc71d0be8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7618-cwe-79-improper-neutralization-of-in-a2f14200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6874dc67a83201eaacc4eaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7595-sql-injection-in-code-projects-job-d-c27d7fcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7595%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6874dc67a83201eaacc4eaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7594-sql-injection-in-code-projects-job-d-f64305c3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7594%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6874d8eda83201eaacc4c86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7593-sql-injection-in-code-projects-job-d-f4dd7a09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7593%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6874d55fa83201eaacc4ba3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7592-sql-injection-in-phpgurukul-dairy-fa-e8c17f93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7592%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874d1dba83201eaacc4b152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cbi-shuts-down-390k-uk-tech-support-scam-arrests-k-848b99a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CBI%20Shuts%20Down%20%C2%A3390K%20U.K.%20Tech%20Support%20Scam%2C%20Arrests%20Key%20Operatives%20in%20Noida%20Call%20Center&amp;severity=high&amp;id=6874ce5ba83201eaacc48c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53689-cwe-611-improper-restriction-of-xml-ed4f574a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53689%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Apache%20Software%20Foundation%20Apache%20Jackrabbit&amp;severity=high&amp;id=6874ce68a83201eaacc48c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7591-sql-injection-in-phpgurukul-dairy-fa-cdeb0956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7591%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874cad8a83201eaacc466d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7590-sql-injection-in-phpgurukul-dairy-fa-487ac9ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7590%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874cad8a83201eaacc466d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7589-sql-injection-in-phpgurukul-dairy-fa-d9663f3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7589%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874c74fa83201eaacc45148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7588-sql-injection-in-phpgurukul-dairy-fa-7624dbba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7588%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6874c3cba83201eaacc432d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/revisiting-automating-ms-rpc-vulnerability-researc-e70e8929</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Revisiting%20automating%20MS-RPC%20vulnerability%20research%20and%20making%20the%20tool%20open%20source&amp;severity=medium&amp;id=6874c3cda83201eaacc432ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24391-cwe-203-observable-discrepancy-in-o-c6eb3030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24391%3A%20CWE-203%20Observable%20Discrepancy%20in%20OTRS%20AG%20OTRS&amp;severity=medium&amp;id=6874c046a83201eaacc38abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7587-sql-injection-in-code-projects-onlin-3654ae7c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7587%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6874c046a83201eaacc38ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7586-stack-based-buffer-overflow-in-tenda-45503775</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7586%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC500&amp;severity=high&amp;id=6874bcc3a83201eaacc37452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7585-sql-injection-in-phpgurukul-online-f-4d6f1269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7585%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6875263ba83201eaacc7f10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7584-sql-injection-in-phpgurukul-online-f-bf8dd7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7584%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6874b5bba83201eaacc33364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7583-sql-injection-in-phpgurukul-online-f-b3ebb4f5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7583%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6874b237a83201eaacc3035f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7582-sql-injection-in-phpgurukul-online-f-2184d2cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7582%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6874aeb3a83201eaacc2f68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7581-sql-injection-in-code-projects-votin-507fc097</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7581%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874ab2fa83201eaacc2c185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7580-sql-injection-in-code-projects-votin-956350c9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7580%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874a7aba83201eaacc2b885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7579-inefficient-regular-expression-compl-4b3a07e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7579%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20chinese-poetry&amp;severity=medium&amp;id=6874a428a83201eaacc29d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7578-command-injection-in-teledyne-flir-f-67893bac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7578%3A%20Command%20Injection%20in%20Teledyne%20FLIR%20FB-Series%20O&amp;severity=low&amp;id=6874a0a5a83201eaacc25f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7577-use-of-hard-coded-password-in-teledy-6da41522</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7577%3A%20Use%20of%20Hard-coded%20Password%20in%20Teledyne%20FLIR%20FB-Series%20O&amp;severity=medium&amp;id=68749d1fa83201eaacc242b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7380-cwe-79-improper-neutralization-of-in-28baa4b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=6874999ba83201eaacc2347a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7576-improper-access-controls-in-teledyne-7d3b33fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7576%3A%20Improper%20Access%20Controls%20in%20Teledyne%20FLIR%20FB-Series%20O&amp;severity=medium&amp;id=6874999ba83201eaacc2347d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7575-path-traversal-in-zavy86-wikidocs-fd1bc874</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7575%3A%20Path%20Traversal%20in%20Zavy86%20WikiDocs&amp;severity=medium&amp;id=68749293a83201eaacc2106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7574-improper-authentication-in-lb-link-b-84743308</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7574%3A%20Improper%20Authentication%20in%20LB-LINK%20BL-AC1900&amp;severity=critical&amp;id=68749293a83201eaacc21077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7573-information-disclosure-in-lb-link-bl-42c2648a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7573%3A%20Information%20Disclosure%20in%20LB-LINK%20BL-AC1900&amp;severity=medium&amp;id=68748f0fa83201eaacc1f7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7572-information-disclosure-in-lb-link-bl-af0dbb17</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7572%3A%20Information%20Disclosure%20in%20LB-LINK%20BL-AC1900&amp;severity=medium&amp;id=68748f0fa83201eaacc1f7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7571-buffer-overflow-in-utt-hiper-840g-97b04655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7571%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68748807a83201eaacc19cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7570-buffer-overflow-in-utt-hiper-840g-2826a053</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7570%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=68748483a83201eaacc193cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7569-cross-site-scripting-in-bigotry-oneb-69509501</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7569%3A%20Cross%20Site%20Scripting%20in%20Bigotry%20OneBase&amp;severity=medium&amp;id=687480ffa83201eaacc17f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7568-sql-injection-in-qianfox-foxcms-ee895133</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7568%3A%20SQL%20Injection%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=687480ffa83201eaacc17f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7620-cwe-494-download-of-code-without-int-6d5cbd1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7620%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20DSIC%20Cross-browser%20Components%20for%20Official%20Document%20Creation&amp;severity=high&amp;id=68747a01a83201eaacc15742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7567-cross-site-scripting-in-shopxo-51da94c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7567%3A%20Cross%20Site%20Scripting%20in%20ShopXO&amp;severity=medium&amp;id=68747a01a83201eaacc15737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7566-path-traversal-in-jsherp-91ef9df3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7566%3A%20Path%20Traversal%20in%20jshERP&amp;severity=medium&amp;id=68747a01a83201eaacc15730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7619-cwe-23-relative-path-traversal-in-we-24db45bb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7619%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20WellChoose%20BatchSignCS&amp;severity=high&amp;id=68747a01a83201eaacc1573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7565-information-disclosure-in-lb-link-bl-dbf5fe1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7565%3A%20Information%20Disclosure%20in%20LB-LINK%20BL-AC3600&amp;severity=medium&amp;id=68747a01a83201eaacc15729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7451-cwe-78-improper-neutralization-of-sp-fd0e6111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7451%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hgiga%20iSherlock-maillog-4.5&amp;severity=critical&amp;id=68746f6ba83201eaacc117ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7564-hard-coded-credentials-in-lb-link-bl-7b669254</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7564%3A%20Hard-coded%20Credentials%20in%20LB-LINK%20BL-AC3600&amp;severity=high&amp;id=68746f6ba83201eaacc117fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7563-sql-injection-in-phpgurukul-online-f-4c68a592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7563%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68746f6ba83201eaacc117f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7562-sql-injection-in-phpgurukul-online-f-e5ab800d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7562%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68746f6ba83201eaacc117f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7561-sql-injection-in-phpgurukul-online-f-830e32d2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7561%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=687464dfa83201eaacc09f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kongtuke-filefix-leads-to-new-interlock-rat-varian-e62b5cd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KongTuke%20FileFix%20Leads%20to%20New%20Interlock%20RAT%20Variant&amp;severity=medium&amp;id=6874616ea83201eaacc093da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25180-cwe-cwe-823-use-of-out-of-range-poi-c1330c90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25180%3A%20CWE%20-%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.17)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=687464dfa83201eaacc09f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7560-sql-injection-in-phpgurukul-online-f-2c11376c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7560%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=687464dfa83201eaacc09f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7559-sql-injection-in-phpgurukul-online-f-0faacd94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7559%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=687464dfa83201eaacc09f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7558-sql-injection-in-code-projects-votin-09e281f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7558%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68745a53a83201eaacc06e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7557-sql-injection-in-code-projects-votin-73dbdfdf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7557%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=68745a53a83201eaacc06e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7556-sql-injection-in-code-projects-votin-115c7644</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7556%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874534ba83201eaacc03a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7555-sql-injection-in-code-projects-votin-9e71af1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7555%3A%20SQL%20Injection%20in%20code-projects%20Voting%20System&amp;severity=medium&amp;id=6874534ba83201eaacc03a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7554-cross-site-scripting-in-sapido-rb-18-4518ba3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7554%3A%20Cross%20Site%20Scripting%20in%20Sapido%20RB-1802&amp;severity=medium&amp;id=6874534ba83201eaacc03a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-14-5ef69368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-14&amp;severity=medium&amp;id=68759dbda83201eaaccb4c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52363-na-b4dcc6e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52363%3A%20n%2Fa&amp;severity=medium&amp;id=68753ed7a83201eaacc86fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51660-na-5523efe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51660%3A%20n%2Fa&amp;severity=medium&amp;id=687537d0a83201eaacc846a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51659-na-5e2b25bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51659%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51658-na-c4bd0584</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51658%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51657-na-0e473666</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51657%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8468c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51656-na-5cc89ef6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51656%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51655-na-3f8a6b71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51655%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8467e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51654-na-59410943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51654%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51653-na-3f515b51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51653%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51652-na-9657f981</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51652%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8466f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51651-na-3704f3d5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51651%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc8466c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51650-na-9490436e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51650%3A%20n%2Fa&amp;severity=medium&amp;id=687537cfa83201eaacc84669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50756-na-a49e8b67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50756%3A%20n%2Fa&amp;severity=critical&amp;id=687514a8a83201eaacc75df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27582-cwe-829-inclusion-of-functionality--be4e6266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27582%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20One%20Identity%20Password%20Manager&amp;severity=high&amp;id=6874fc0aa83201eaacc66258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29606-cwe-770-allocation-of-resources-wit-ce467c27</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29606%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20libp2p%20py-libp2p&amp;severity=medium&amp;id=68748807a83201eaacc19ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7553-os-command-injection-in-d-link-dir-8-cfd51a0a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7553%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-818LW&amp;severity=medium&amp;id=687448bea83201eaacbf81c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1384-cwe-272-least-privilege-violation-in-c8c24f6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1384%3A%20CWE-272%20Least%20Privilege%20Violation%20in%20OMRON%20Corporation%20Machine%20Automation%20Controller%20NJ-series&amp;severity=high&amp;id=687448bea83201eaacbf81bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7552-improper-access-controls-in-dromara--c7919014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7552%3A%20Improper%20Access%20Controls%20in%20Dromara%20Northstar&amp;severity=medium&amp;id=68744540a83201eaacbf7a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7551-stack-based-buffer-overflow-in-tenda-cca151fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7551%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=687441b7a83201eaacbf67d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7550-stack-based-buffer-overflow-in-tenda-9020d358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7550%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=68743e33a83201eaacbf59d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7549-stack-based-buffer-overflow-in-tenda-842a5eb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7549%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=68743abba83201eaacbf4d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7548-stack-based-buffer-overflow-in-tenda-cd3451c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7548%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6874372ba83201eaacbf3d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1735-cwe-89-improper-neutralization-of-sp-9ae985f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=6874372ba83201eaacbf3d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1220-cwe-918-server-side-request-forgery--81d8b0a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1220%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PHP%20Group%20PHP&amp;severity=low&amp;id=687433a7a83201eaacbf2beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7547-unrestricted-upload-in-campcodes-onl-a5cd631b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7547%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687433a7a83201eaacbf2bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6491-cwe-476-null-pointer-dereference-in--f8fd310d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6491%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=68743023a83201eaacbf14dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7546-out-of-bounds-write-in-gnu-binutils-eb252c2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7546%3A%20Out-of-bounds%20Write%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68743023a83201eaacbf14e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7545-heap-based-buffer-overflow-in-gnu-bi-7156f763</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7545%3A%20Heap-based%20Buffer%20Overflow%20in%20GNU%20Binutils&amp;severity=medium&amp;id=68742ca0a83201eaacbf0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7544-stack-based-buffer-overflow-in-tenda-403ad417</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7544%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=high&amp;id=68742921a83201eaacbefc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7543-sql-injection-in-phpgurukul-user-reg-6e095910</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7543%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=68742598a83201eaacbea976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7542-sql-injection-in-phpgurukul-user-reg-efee4a4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7542%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=68742213a83201eaacbe9f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7541-sql-injection-in-code-projects-onlin-a85699e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7541%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68741b0ba83201eaacbe6f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7540-sql-injection-in-code-projects-onlin-1da5c10b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7540%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=6874140da83201eaacbe268c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hello-excuse-my-intrusion-but-i-need-help-surfing--8a3aa21e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hello%2C%20excuse%20my%20intrusion%2C%20but%20I%20need%20help%20surfing%20the%20Internet.%20I%20found%20an%20encrypted%20code%20and%20it%20seems%20to%20contain%20some%20kind%20of%20page.%20I%20suppose%20because%20they%20give%20a%20password%20below%2C%20but%20I%20don&apos;t%20know%20what%20it%20is%2C%20could%20you%20help%20me%20please%3F%20I&apos;ll%20give%20you%20the%20link%20to%20the%20post%20in%20case%20you%20can%20help%20me%20https&amp;severity=medium&amp;id=68741414a83201eaacbe2698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7539-sql-injection-in-code-projects-onlin-3a6fbc56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7539%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68740cfaa83201eaacbdf89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7538-unrestricted-upload-in-campcodes-sal-3473ec7e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7538%3A%20Unrestricted%20Upload%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=687405f7a83201eaacbdb1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7537-sql-injection-in-campcodes-sales-and-bd0569b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7537%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6873feeba83201eaacbd60cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7536-sql-injection-in-campcodes-sales-and-8bcf7bb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7536%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6873f7e2a83201eaacbd1f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7535-sql-injection-in-campcodes-sales-and-4747aedf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7535%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6873f0dda83201eaacbd00a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7534-sql-injection-in-phpgurukul-student--a6689886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7534%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6873e9d3a83201eaacbceb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7533-sql-injection-in-code-projects-job-d-240d1859</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7533%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=6873e2cca83201eaacbcc74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7532-stack-based-buffer-overflow-in-tenda-7d42e634</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7532%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873dbc4a83201eaacbcb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7531-stack-based-buffer-overflow-in-tenda-cc9c5b71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7531%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873d4bca83201eaacbc5426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7530-stack-based-buffer-overflow-in-tenda-4dd81849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7530%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873cdb3a83201eaacbc170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7529-stack-based-buffer-overflow-in-tenda-34d1c20c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7529%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6873a384a83201eaacba962d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7528-stack-based-buffer-overflow-in-tenda-2733503a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7528%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=68739c7ca83201eaacba27ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/historical-analysis-of-reflected-vulnerabilities-t-59f76fbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Historical%20Analysis%20of%20Reflected%20Vulnerabilities%3A%0AThe%20Evolution%20of%20Windows%20Defender%20Defenses&amp;severity=critical&amp;id=68738e6ea83201eaacb9b18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7527-stack-based-buffer-overflow-in-tenda-1ea2f1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7527%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=68738e6ca83201eaacb9b175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/llm-crawlers-continue-to-ddos-sourcehut-771e5701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LLM%20crawlers%20continue%20to%20DDoS%20SourceHut&amp;severity=medium&amp;id=6873805fa83201eaacb92ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7525-command-injection-in-totolink-t6-d26fe17f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7525%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=6873805da83201eaacb92a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7524-command-injection-in-totolink-t6-c841c328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7524%3A%20Command%20Injection%20in%20TOTOLINK%20T6&amp;severity=medium&amp;id=68737955a83201eaacb8fbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7012-cwe-59-improper-link-resolution-befo-0f4a5870</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7012%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Cato%20Networks%20Cato%20Client&amp;severity=high&amp;id=68736b45a83201eaacb8cc61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7523-xml-external-entity-reference-in-jin-887d5025</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7523%3A%20XML%20External%20Entity%20Reference%20in%20Jinher%20OA&amp;severity=medium&amp;id=68735d35a83201eaacb897ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7522-sql-injection-in-phpgurukul-vehicle--5a4f36dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7522%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6873562da83201eaacb7f09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7521-sql-injection-in-phpgurukul-vehicle--a6465155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7521%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68734f28a83201eaacb7da1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7520-sql-injection-in-phpgurukul-vehicle--06dec7de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7520%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68734115a83201eaacb7b2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7517-sql-injection-in-code-projects-onlin-6b224028</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7517%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68733a0da83201eaacb79a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7516-sql-injection-in-code-projects-onlin-122eab67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7516%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68733305a83201eaacb7864f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7515-sql-injection-in-code-projects-onlin-487450d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7515%3A%20SQL%20Injection%20in%20code-projects%20Online%20Appointment%20Booking%20System&amp;severity=medium&amp;id=68732f81a83201eaacb76eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7514-sql-injection-in-code-projects-moder-974254bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7514%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68732879a83201eaacb750d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7513-sql-injection-in-code-projects-moder-93bcec7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7513%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68731deda83201eaacb71c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7512-sql-injection-in-code-projects-moder-ec176a35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7512%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68731deda83201eaacb71c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7511-sql-injection-in-code-projects-chat--dd4fef29</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7511%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=68731361a83201eaacb706dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-blind-xss-to-rce-when-headers-became-my-termi-269aa85a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Blind%20XSS%20to%20RCE%3A%20When%20Headers%20Became%20My%20Terminal&amp;severity=medium&amp;id=687301cfa83201eaacb6c04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7510-sql-injection-in-code-projects-moder-c3b8167d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7510%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=687301cda83201eaacb6c03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7509-sql-injection-in-code-projects-moder-690cac75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7509%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=687301cda83201eaacb6c033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-13-aee621d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-13&amp;severity=medium&amp;id=68744c3da83201eaacbf98ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53865-cwe-79-improper-neutralization-of-i-bec72eda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20roundup-tracker%20Roundup&amp;severity=medium&amp;id=68740976a83201eaacbdea92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7508-sql-injection-in-code-projects-moder-29886e17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7508%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=6872f3bda83201eaacb65011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7506-stack-based-buffer-overflow-in-tenda-55584b1b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7506%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=6872ecb5a83201eaacb63bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7505-stack-based-buffer-overflow-in-tenda-07747386</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7505%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=6872e5ada83201eaacb6288f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7492-sql-injection-in-phpgurukul-vehicle--c2662512</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7492%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872d79da83201eaacb605f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7491-sql-injection-in-phpgurukul-vehicle--f824871c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7491%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872d095a83201eaacb5f0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7490-sql-injection-in-phpgurukul-vehicle--a1f56ec6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7490%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872c98da83201eaacb5e1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7489-sql-injection-in-phpgurukul-vehicle--43d4f0d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7489%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872c286a83201eaacb5c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7488-path-traversal-in-joeybling-springbo-14ad9fdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7488%3A%20Path%20Traversal%20in%20JoeyBling%20SpringBoot_MyBatisPlus&amp;severity=medium&amp;id=6872bb7da83201eaacb5aeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7487-unrestricted-upload-in-joeybling-spr-3c631f15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7487%3A%20Unrestricted%20Upload%20in%20JoeyBling%20SpringBoot_MyBatisPlus&amp;severity=medium&amp;id=6872b475a83201eaacb59961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7485-reachable-assertion-in-open5gs-b476d0f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7485%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=6872ad6ea83201eaacb58cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7484-sql-injection-in-phpgurukul-vehicle--a2658c44</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7484%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872a666a83201eaacb57860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7483-sql-injection-in-phpgurukul-vehicle--0ab68f96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7483%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68729f5ea83201eaacb55e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7482-sql-injection-in-phpgurukul-vehicle--f2711357</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7482%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68729856a83201eaacb543f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7481-sql-injection-in-phpgurukul-vehicle--99fa20b7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7481%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872914ea83201eaacb535c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41169-cwe-664-improper-control-of-a-resou-417e5d07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41169%3A%20CWE-664%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=high&amp;id=690a6f039e609817bf702c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7480-sql-injection-in-phpgurukul-vehicle--50da3b89</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7480%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=68728a46a83201eaacb51e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7479-sql-injection-in-phpgurukul-vehicle--cd8289d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7479%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=6872833ea83201eaacb50c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7478-sql-injection-in-code-projects-moder-277ca6c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7478%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68727c37a83201eaacb4f9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7477-unrestricted-upload-in-code-projects-df5b5761</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7477%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=6872752fa83201eaacb4e7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7476-sql-injection-in-code-projects-simpl-89607d2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7476%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=6872671fa83201eaacb4a115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7475-sql-injection-in-code-projects-simpl-c356375a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7475%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Car%20Rental%20System&amp;severity=medium&amp;id=6872590fa83201eaacb47511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7474-sql-injection-in-code-projects-job-d-317b1895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7474%3A%20SQL%20Injection%20in%20code-projects%20Job%20Diary&amp;severity=medium&amp;id=68725207a83201eaacb45cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7471-sql-injection-in-code-projects-moder-a712729a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7471%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=68724affa83201eaacb43c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36104-cwe-277-insecure-inherited-permissi-e7366b7d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36104%3A%20CWE-277%20Insecure%20Inherited%20Permissions%20in%20IBM%20Storage%20Scale&amp;severity=medium&amp;id=68724affa83201eaacb43c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7470-unrestricted-upload-in-campcodes-sal-a4336070</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7470%3A%20Unrestricted%20Upload%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=687243f7a83201eaacb419a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-zero-day-that-couldve-compromised-every-cursor-ef76afb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20zero-day%20that%20could&apos;ve%20compromised%20every%20Cursor%20and%20Windsurf%20user&amp;severity=critical&amp;id=68723ceda83201eaacb40002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-shares-guidance-to-defend-gddr6-gpus-agains-c238d517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NVIDIA%20shares%20guidance%20to%20defend%20GDDR6%20GPUs%20against%20Rowhammer%20attacks&amp;severity=high&amp;id=68723ceda83201eaacb4000a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploits-for-pre-auth-fortinet-fortiweb-rce-flaw-r-6e814894</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploits%20for%20pre-auth%20Fortinet%20FortiWeb%20RCE%20flaw%20released%2C%20patch%20now&amp;severity=high&amp;id=68723ceda83201eaacb40006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/athlete-or-hacker-russian-basketball-player-accuse-e988df59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Athlete%20or%20Hacker%3F%20Russian%20basketball%20player%20accused%20in%20U.S.%20ransomware%20case&amp;severity=medium&amp;id=68723ceda83201eaacb4000e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7469-sql-injection-in-campcodes-sales-and-54eb13c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7469%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68723d29a83201eaacb40172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7518-cwe-22-improper-limitation-of-a-path-861a72ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7518%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rsjoomla%20RSFirewall!&amp;severity=medium&amp;id=68722b5aa83201eaacb3aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7468-buffer-overflow-in-tenda-fh1201-9832c101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7468%3A%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=687227dba83201eaacb3a350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7467-sql-injection-in-code-projects-moder-b24cf2ea</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7467%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=687220cea83201eaacb38c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7504-cwe-502-deserialization-of-untrusted-b64cf3ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7504%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20akirk%20Friends&amp;severity=high&amp;id=6875696ba83201eaaccaa8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7466-sql-injection-in-1000projects-abc-co-117c582d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7466%3A%20SQL%20Injection%20in%201000projects%20ABC%20Courier%20Management&amp;severity=medium&amp;id=687219c6a83201eaacb37ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6423-cwe-434-unrestricted-upload-of-file--55cd4521</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6423%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20beeteam368%20BeeTeam368%20Extensions&amp;severity=high&amp;id=687212bea83201eaacb366ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7465-buffer-overflow-in-tenda-fh1201-7ad2cddb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7465%3A%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=68720bbaa83201eaacb354dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7464-out-of-bounds-read-in-osrg-gobgp-daaeaad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7464%3A%20Out-of-Bounds%20Read%20in%20osrg%20GoBGP&amp;severity=medium&amp;id=6875696ba83201eaaccaa8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7463-buffer-overflow-in-tenda-fh1201-edca9cbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7463%3A%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=6871fda7a83201eaacb32a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7462-null-pointer-dereference-in-artifex--7c82e2fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7462%3A%20NULL%20Pointer%20Dereference%20in%20Artifex%20GhostPDL&amp;severity=medium&amp;id=6871f69ea83201eaacb31097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1313-cwe-288-authentication-bypass-using--6c08dca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1313%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20Nokri%20%E2%80%93%20Job%20Board%20WordPress%20Theme&amp;severity=high&amp;id=6871f69ea83201eaacb31093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7461-sql-injection-in-code-projects-moder-4a161303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7461%3A%20SQL%20Injection%20in%20code-projects%20Modern%20Bag&amp;severity=medium&amp;id=6871e88ea83201eaacb2c951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6057-cwe-434-unrestricted-upload-of-file--e27415dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6057%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit&amp;severity=high&amp;id=6871e88ea83201eaacb2c946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6058-cwe-434-unrestricted-upload-of-file--85a2054d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6058%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=6871e88ea83201eaacb2c94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24294-vulnerability-in-ruby-resolv-7ca18671</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24294%3A%20Vulnerability%20in%20Ruby%20resolv&amp;severity=high&amp;id=6871da7ea83201eaacb28576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-12-3e836180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-12&amp;severity=medium&amp;id=6872fabda83201eaacb65ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5199-cwe-276-incorrect-default-permission-af57e17f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5199%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Canonical%20Multipass&amp;severity=high&amp;id=68719ecda83201eaacb1b8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/donot-apt-hits-european-ministry-with-fake-diploma-09fc7667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoNot%20APT%20Hits%20European%20Ministry%20with%20Fake%20Diplomacy%20Emails%20and%20LoptikMod%20Malware&amp;severity=medium&amp;id=68719eb7a83201eaacb1b841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leaked-shellter-elite-tool-for-red-teams-now-enabl-7b8e875e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leaked%20Shellter%20Elite%20Tool%20for%20Red%20Teams%20Now%20Enabling%20Infostealer%20Attacks%20Worldwide&amp;severity=medium&amp;id=6871942ca83201eaacb19c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7460-buffer-overflow-in-totolink-t6-d1432c8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7460%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6871861da83201eaacb17733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53636-cwe-400-uncontrolled-resource-consu-2027bf92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53636%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OSC%20ondemand&amp;severity=medium&amp;id=6871829aa83201eaacb16c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7459-sql-injection-in-code-projects-mobil-68470083</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7459%3A%20SQL%20Injection%20in%20code-projects%20Mobile%20Shop&amp;severity=medium&amp;id=68717f14a83201eaacb16504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7457-sql-injection-in-campcodes-online-mo-e6a0ef6c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7457%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=6871780ca83201eaacb147fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7456-sql-injection-in-campcodes-online-mo-84ca3a3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7456%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=68717105a83201eaacb06a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7455-sql-injection-in-campcodes-online-mo-a1386035</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7455%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687169fca83201eaacb040dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7454-sql-injection-in-campcodes-online-mo-5eb82ffd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7454%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Movie%20Theater%20Seat%20Reservation%20System&amp;severity=medium&amp;id=687162faa83201eaacb0190c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7503-cwe-798-use-of-hard-coded-credential-debb8405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7503%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Shenzhen%20Liandian%20Communication%20Technology%20LTD%20V380%20IP%20Camera%20%2F%20AppFHE1_V1.0.6.0&amp;severity=critical&amp;id=68715f74a83201eaacb00bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3631-cwe-416-use-after-free-in-ibm-mq-f023143b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3631%3A%20CWE-416%20Use%20After%20Free%20in%20IBM%20MQ&amp;severity=medium&amp;id=68715bf3a83201eaacb00416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7453-use-of-hard-coded-password-in-saltbo-37813469</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7453%3A%20Use%20of%20Hard-coded%20Password%20in%20saltbo%20zpan&amp;severity=medium&amp;id=68715bf3a83201eaacb0041a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30403-heap-based-buffer-overflow-cwe-122--a62c6ed4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30403%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Facebook%20mvfst&amp;severity=high&amp;id=68715bf3a83201eaacb00412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30402-heap-based-buffer-overflow-cwe-122--42175e44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30402%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Meta%20Platforms%2C%20Inc%20ExecuTorch&amp;severity=high&amp;id=68714ddea83201eaacafd49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53642-cwe-613-insufficient-session-expira-b74be674</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53642%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=68714ddea83201eaacafd4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7452-path-traversal-in-kone-net-go-chat-92791636</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7452%3A%20Path%20Traversal%20in%20kone-net%20go-chat&amp;severity=medium&amp;id=68714ddea83201eaacafd4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53641-cwe-918-server-side-request-forgery-937fc1a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53641%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gitroomhq%20postiz-app&amp;severity=high&amp;id=68714ddea83201eaacafd4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43856-cwe-303-incorrect-implementation-of-1a6429e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43856%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20immich-app%20immich&amp;severity=high&amp;id=687146d9a83201eaacafc3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7450-path-traversal-in-letseeqiji-gorobbs-12b76ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7450%3A%20Path%20Traversal%20in%20letseeqiji%20gorobbs&amp;severity=medium&amp;id=687146d9a83201eaacafc3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/14-arrested-in-romania-for-47-million-uk-tax-phish-9130a976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=14%20Arrested%20in%20Romania%20for%20%C2%A347%20Million%20UK%20Tax%20Phishing%20Scam&amp;severity=medium&amp;id=68714350a83201eaacafb680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47963-spoofing-in-microsoft-microsoft-edg-6d8bb779</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47963%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68713fd2a83201eaacaf9cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47964-spoofing-in-microsoft-microsoft-edg-012b6993</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47964%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68713fd2a83201eaacaf9cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47182-cwe-20-improper-input-validation-in-c298878d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47182%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68713fd2a83201eaacaf9cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7026-cwe-822-untrusted-pointer-dereferenc-d914ff6b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7026%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20GIGABYTE%20UEFI-GenericComponentSmmEntry&amp;severity=high&amp;id=687131bea83201eaacaf6612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7028-cwe-822-untrusted-pointer-dereferenc-6579825e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7028%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20GIGABYTE%20UEFI-SmiFlash&amp;severity=high&amp;id=687131bea83201eaacaf661c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7027-cwe-822-untrusted-pointer-dereferenc-d882eaad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7027%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20GIGABYTE%20UEFI-GenericComponentSmmEntry&amp;severity=high&amp;id=687131bea83201eaacaf6617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7029-cwe-822-uncontrolled-pointer-deferen-bec6d4a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7029%3A%20CWE-822%20uncontrolled%20pointer%20deference%20in%20GIGABYTE%20UEFI-OverClockSmiHandler&amp;severity=high&amp;id=687131bea83201eaacaf6621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52988-cwe-78-improper-neutralization-of-s-1fd156e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52988%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6549-cwe-863-incorrect-authorization-in-j-a3f7c71f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6549%3A%20CWE-863%20Incorrect%20Authorization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52989-cwe-140-improper-neutralization-of--4922d57d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52989%3A%20CWE-140%20Improper%20Neutralization%20of%20Delimiters%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52986-cwe-401-missing-release-of-memory-a-f8b0a91d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52986%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52985-cwe-480-use-of-incorrect-operator-i-a918510c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52985%3A%20CWE-480%20Use%20of%20Incorrect%20Operator%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52984-cwe-476-null-pointer-dereference-in-52058b2a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52984%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52983-cwe-446-ui-discrepancy-for-security-cdab3983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52983%3A%20CWE-446%20UI%20Discrepancy%20for%20Security%20Feature%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68712e3ba83201eaacaf5d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52982-cwe-404-improper-resource-shutdown--d65ea414</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52982%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712e3ba83201eaacaf5d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52981-cwe-754-improper-check-for-unusual--40ab6ea1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52981%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68712e3ba83201eaacaf5d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52980-cwe-198-use-of-incorrect-byte-order-6257fb55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52980%3A%20CWE-198%20Use%20of%20Incorrect%20Byte%20Ordering%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68712e3ba83201eaacaf5d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52964-cwe-617-reachable-assertion-in-juni-96c04852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52964%3A%20CWE-617%20Reachable%20Assertion%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52963-cwe-284-improper-access-control-in--6c97cf04</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52963%3A%20CWE-284%20Improper%20Access%20Control%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52953-cwe-440-expected-behavior-violation-e23114e8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52953%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52952-cwe-787-out-of-bounds-write-in-juni-747e4fdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52952%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48924-cwe-674-uncontrolled-recursion-in-a-ee5e547d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48924%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20Lang&amp;severity=medium&amp;id=68712732a83201eaacaf3f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52958-cwe-617-reachable-assertion-in-juni-9c88403e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52958%3A%20CWE-617%20Reachable%20Assertion%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712732a83201eaacaf3f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52955-cwe-131-incorrect-calculation-of-bu-7ad64200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52955%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68717105a83201eaacb06aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52954-cwe-862-missing-authorization-in-ju-0049b6e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52954%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=68712732a83201eaacaf3f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52951-cwe-693-protection-mechanism-failur-3ee2c760</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52951%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712732a83201eaacaf3f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52950-cwe-862-missing-authorization-in-ju-cd4c5f5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52950%3A%20CWE-862%20Missing%20Authorization%20in%20Juniper%20Networks%20Juniper%20Security%20Director&amp;severity=critical&amp;id=68712ab6a83201eaacaf4800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52949-cwe-130-improper-handling-of-length-d9d2f5d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52949%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52948-cwe-755-improper-handling-of-except-43ad4a27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52948%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68712ab6a83201eaacaf47f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52947-cwe-755-improper-handling-of-except-1fccd627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52947%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=687131bea83201eaacaf6629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52946-cwe-416-use-after-free-in-juniper-n-40f5e1d3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52946%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=687131bea83201eaacaf6626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30661-cwe-732-incorrect-permission-assign-695ad8f2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30661%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68717105a83201eaacb06aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolving-tactics-of-slowtempest-a-deep-dive-into-a-d4da4b0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolving%20Tactics%20of%20SLOW%23TEMPEST%3A%20A%20Deep%20Dive%20Into%20Advanced%20Malware%20Techniques&amp;severity=medium&amp;id=68717483a83201eaacb0b82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-backed-pay2key-ransomware-resurfaces-with--0b6d11f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian-Backed%20Pay2Key%20Ransomware%20Resurfaces%20with%2080%25%20Profit%20Share%20for%20Cybercriminals&amp;severity=high&amp;id=68712029a83201eaacaf288a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53861-cleartext-transmission-of-sensitive-d6c96546</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53861%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=low&amp;id=68710b14a83201eaacaed6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53862-exposure-of-sensitive-system-inform-0b1f713a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53862%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202&amp;severity=low&amp;id=68710b14a83201eaacaed6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6788-cwe-668-exposure-of-resource-to-wron-5f17de4e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6788%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Monitoring%20Expert&amp;severity=medium&amp;id=6870f5fea83201eaacae7227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50124-cwe-269-improper-privilege-manageme-99aebc1f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50124%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=high&amp;id=6870eef2a83201eaacae47d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50125-cwe-918-server-side-request-forgery-de374334</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50125%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=medium&amp;id=6870eef2a83201eaacae47d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-citrix-netscaler-adc-and-gateway-flaw-77a7ff91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Citrix%20NetScaler%20ADC%20and%20Gateway%20flaw%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=6870eb6ca83201eaacae2014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amd-warns-of-transient-scheduler-attacks-affecting-43fec996</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMD%20Warns%20of%20Transient%20Scheduler%20Attacks%20Affecting%20Wide%20Range%20of%20Chipsets&amp;severity=high&amp;id=6870e7e8a83201eaacae0d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fa-f9c1b485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pre-Auth%20SQL%20Injection%20to%20RCE%20-%20Fortinet%20FortiWeb%20Fabric%20Connector%20(CVE-2025-25257)%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=6870e46aa83201eaacadfe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50123-cwe-94-improper-control-of-generati-024bb0da</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50123%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=high&amp;id=6870e465a83201eaacadfdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3933-cwe-1333-inefficient-regular-express-1699f9d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3933%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=6870dd5da83201eaacadb457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50122-cwe-331-insufficient-entropy-in-sch-51ef082d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50122%3A%20CWE-331%20Insufficient%20Entropy%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=high&amp;id=6870d9daa83201eaacada66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50121-cwe-78-improper-neutralization-of-s-ca0d2b5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50121%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=critical&amp;id=6870d9daa83201eaacada66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6438-cwe-611-improper-restriction-of-xml--e801b8c1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6438%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20IT%20Data%20Center%20Expert&amp;severity=medium&amp;id=6870d656a83201eaacad8e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6838-cwe-1236-improper-neutralization-of--3cb3dfda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6838%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20apos37%20Broken%20Link%20Notifier&amp;severity=medium&amp;id=6870cbcaa83201eaacad5c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6851-cwe-918-server-side-request-forgery--9183feb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6851%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20apos37%20Broken%20Link%20Notifier&amp;severity=high&amp;id=6870cbcaa83201eaacad5c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7442-cwe-89-improper-neutralization-of-sp-7dd7a132</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7442%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=6870bdbba83201eaacacf705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6068-cwe-79-improper-neutralization-of-in-3bccefc7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20FooGallery%20%E2%80%93%20Responsive%20Photo%20Gallery%2C%20Image%20Viewer%2C%20Justified%2C%20Masonry%20%26%20Carousel&amp;severity=medium&amp;id=6870bdbba83201eaacacf6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5530-cwe-79-improper-neutralization-of-in-b0482b6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5530%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Smart%20Compare%20for%20WooCommerce&amp;severity=medium&amp;id=6870bdbba83201eaacacf6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6745-cwe-200-exposure-of-sensitive-inform-1d2d9f5a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6745%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=6870bdbba83201eaacacf701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4593-cwe-200-exposure-of-sensitive-inform-fadd5258</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4593%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20avimegladon%20WP%20Register%20Profile%20With%20Shortcode&amp;severity=medium&amp;id=6870bdbba83201eaacacf6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5992-cwe-20-improper-input-validation-in--5ea8bb74</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5992%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Qt%20Company%20Qt&amp;severity=low&amp;id=6870b6b3a83201eaacacdbda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5392-cwe-94-improper-control-of-generatio-e0471b14</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5392%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20gb-plugins%20GB%20Forms%20DB&amp;severity=critical&amp;id=6870b6b3a83201eaacacdbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6716-cwe-79-improper-neutralization-of-in-d334c3dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Photos%2C%20Files%2C%20YouTube%2C%20Twitter%2C%20Instagram%2C%20TikTok%2C%20Ecommerce%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%2C%20Sell%20via%20PayPal%20or%20Stripe%2C%20Social%20Share%20Buttons%2C%20OpenAI&amp;severity=medium&amp;id=6870b6b3a83201eaacacdbdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-inject-code-into-wordpress-theme-to-redi-0ed59157</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20Inject%20Code%20into%20WordPress%20Theme%20to%20Redirect%20Visitors&amp;severity=medium&amp;id=6870f276a83201eaacae6078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/patch-track-repeat-422f7cc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Patch%2C%20track%2C%20repeat&amp;severity=medium&amp;id=6870eb7ea83201eaacae206c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5028-cwe-269-improper-privilege-managemen-1629b08e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5028%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ESET%2C%20spol.%20s.r.o%20ESET%20NOD32%20Antivirus&amp;severity=medium&amp;id=6870b32fa83201eaacacce9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30026-cwe-288-authentication-bypass-using-050eb6e0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30026%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=6870ac27a83201eaacacabfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30025-cwe-502-deserialization-of-untruste-6df01793</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30025%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Axis%20Communications%20AB%20AXIS%20Device%20Manager&amp;severity=medium&amp;id=6870ac27a83201eaacacabf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30024-cwe-295-improper-certificate-valida-6714e8d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30024%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Axis%20Communications%20AB%20AXIS%20Device%20Manager&amp;severity=medium&amp;id=6870ac27a83201eaacacabf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30023-cwe-502-deserialization-of-untruste-0f79b87c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30023%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=critical&amp;id=6870ac27a83201eaacacabf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6200-cwe-79-cross-site-scripting-xss-in-g-050fc95a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6200%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20GeoDirectory&amp;severity=medium&amp;id=68712038a83201eaacaf28dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2942-cwe-200-information-exposure-in-orde-dce1bf79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2942%3A%20CWE-200%20Information%20Exposure%20in%20Order%20Delivery%20Date&amp;severity=medium&amp;id=6875696ba83201eaaccaa8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-critical-credential-vulnerabilities-have-been--09ffa5e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20critical%20credential%20vulnerabilities%20have%20been%20found%20in%20Kaseya&apos;s%20RapidFire%20Tools%20Network%20Detective&amp;severity=critical&amp;id=68709713a83201eaacabf7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7401-cwe-798-use-of-hard-coded-credential-7c3a445a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7401%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20aa-team%20Premium%20Age%20Verification%20%2F%20Restriction%20for%20WordPress&amp;severity=critical&amp;id=6870938ba83201eaacabee32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7436-sql-injection-in-campcodes-online-re-7f1f5c3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7436%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=687115a1a83201eaacaefd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7435-cross-site-scripting-in-livehelperch-744deb73</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7435%3A%20Cross%20Site%20Scripting%20in%20LiveHelperChat%20lhc-php-resque%20Extension&amp;severity=medium&amp;id=68707aefa83201eaacab62a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7434-stack-based-buffer-overflow-in-tenda-45c8bccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7434%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=68707063a83201eaacab403f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7423-stack-based-buffer-overflow-in-tenda-428a08f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7423%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687065d8a83201eaacaaf777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7422-stack-based-buffer-overflow-in-tenda-34bfc7de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7422%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=68705ed0a83201eaacaae382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5241-cwe-645-overly-restrictive-account-l-76203020</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5241%3A%20CWE-645%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=medium&amp;id=68705b4fa83201eaacaad88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7421-stack-based-buffer-overflow-in-tenda-e122907f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7421%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=68705b4fa83201eaacaad891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-11-51198ab2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-11&amp;severity=medium&amp;id=6871a93da83201eaacb1d0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52089-na-6f4a2a06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52089%3A%20n%2Fa&amp;severity=high&amp;id=68717105a83201eaacb06aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45582-cwe-24-path-traversal-filedir-in-gn-b562b11c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45582%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20GNU%20Tar&amp;severity=medium&amp;id=6871435da83201eaacafb6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52994-cwe-78-improper-neutralization-of-s-effa0262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52994%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20phpThumb%20project%20phpThumb&amp;severity=medium&amp;id=68712ab6a83201eaacaf4803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51591-na-f14e24d3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51591%3A%20n%2Fa&amp;severity=low&amp;id=687115a1a83201eaacaefd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53864-cwe-674-uncontrolled-recursion-in-c-46ad5b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53864%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Connect2id%20Nimbus%20JOSE%2BJWT&amp;severity=medium&amp;id=68707aefa83201eaacab62a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcdonalds-ai-hiring-tool-mchire-leaked-data-of-64--cf2b7750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=McDonald%E2%80%99s%20AI%20Hiring%20Tool%20McHire%20Leaked%20Data%20of%2064%20Million%20Job%20Seekers&amp;severity=medium&amp;id=68705441a83201eaacaabc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53471-cwe-20-in-emerson-valvelink-solo-79b09b6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53471%3A%20CWE-20%20in%20Emerson%20ValveLink%20SOLO&amp;severity=medium&amp;id=687115a1a83201eaacaefd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48496-cwe-427-in-emerson-valvelink-solo-12e4ba73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48496%3A%20CWE-427%20in%20Emerson%20ValveLink%20SOLO&amp;severity=medium&amp;id=68711928a83201eaacaf0f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46358-cwe-693-in-emerson-valvelink-solo-03a3ee25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46358%3A%20CWE-693%20in%20Emerson%20ValveLink%20SOLO&amp;severity=high&amp;id=68711928a83201eaacaf0f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50109-cwe-316-in-emerson-valvelink-solo-60adfeb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50109%3A%20CWE-316%20in%20Emerson%20ValveLink%20SOLO&amp;severity=high&amp;id=68711928a83201eaacaf0f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52579-cwe-316-in-emerson-valvelink-solo-cff8c147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52579%3A%20CWE-316%20in%20Emerson%20ValveLink%20SOLO&amp;severity=critical&amp;id=687050c0a83201eaacaab01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7420-stack-based-buffer-overflow-in-tenda-b5ab86f5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7420%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687050c0a83201eaacaab023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53509-cwe-88-in-advantech-iview-756d6219</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53509%3A%20CWE-88%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52459-cwe-88-in-advantech-iview-1f224737</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52459%3A%20CWE-88%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53515-cwe-89-in-advantech-iview-f569d2a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53515%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52577-cwe-89-in-advantech-iview-bb79e473</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52577%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53475-cwe-89-in-advantech-iview-eb1fe90e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53475%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46704-cwe-22-in-advantech-iview-7c49cee2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46704%3A%20CWE-22%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48891-cwe-89-in-advantech-iview-6fc14ade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48891%3A%20CWE-89%20in%20Advantech%20iView&amp;severity=high&amp;id=68704d3ca83201eaacaaa06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41442-cwe-79-in-advantech-iview-0924b626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41442%3A%20CWE-79%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53519-cwe-79-in-advantech-iview-623a132a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53519%3A%20CWE-79%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53397-cwe-79-in-advantech-iview-f03850f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53397%3A%20CWE-79%20in%20Advantech%20iView&amp;severity=medium&amp;id=68704d3ca83201eaacaaa073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcdonalds-mchire-vulnerability-leaked-data-of-64-m-0279b9be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=McDonald%E2%80%99s%20McHire%20Vulnerability%20Leaked%20Data%20of%2064%20Million%20Job%20Seekers&amp;severity=medium&amp;id=687049b5a83201eaacaa9019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7419-stack-based-buffer-overflow-in-tenda-8fb7e2bf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7419%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687049c1a83201eaacaa904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7418-stack-based-buffer-overflow-in-tenda-d6865c1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7418%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=687042aea83201eaacaa59de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31267-an-attacker-with-physical-access-to-097275ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31267%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20App%20Store%20Connect&amp;severity=medium&amp;id=68703f2ba83201eaacaa4fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7417-stack-based-buffer-overflow-in-tenda-10bd15f9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7417%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=68703ba7a83201eaacaa45ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deploying-netsupport-rat-via-wordpress-clickfix-38fd1292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deploying%20NetSupport%20RAT%20via%20WordPress%20%26%20ClickFix&amp;severity=medium&amp;id=68703822a83201eaacaa3b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7416-stack-based-buffer-overflow-in-tenda-c35bd30f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7416%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20O3V2&amp;severity=high&amp;id=6870349fa83201eaacaa23fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53637-cwe-78-improper-neutralization-of-s-b63f26ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53637%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=6870349fa83201eaacaa23f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24798-cwe-617-reachable-assertion-in-mesh-b2f9fc29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24798%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=6870311ba83201eaacaa0c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6392-cwe-532-insertion-of-sensitive-infor-4c0f69d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6392%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Broadcom%20Brocade%20SANnav&amp;severity=medium&amp;id=6870311ba83201eaacaa0c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6390-cwe-497-exposure-of-sensitive-system-7695f209</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6390%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Broadcom%20Brocade%20SANnav&amp;severity=medium&amp;id=68702d97a83201eaaca9fa85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7415-command-injection-in-tenda-o3v2-37235081</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7415%3A%20Command%20Injection%20in%20Tenda%20O3V2&amp;severity=medium&amp;id=68702d97a83201eaaca9fa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4662-cwe-497-exposure-of-sensitive-system-98f39405</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4662%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Broadcom%20Brocade%20SANnav&amp;severity=medium&amp;id=68702a13a83201eaaca9e506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7414-os-command-injection-in-tenda-o3v2-fb64a358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7414%3A%20OS%20Command%20Injection%20in%20Tenda%20O3V2&amp;severity=medium&amp;id=6870268fa83201eaaca9d2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3947-cwe-191-integer-underflow-wrap-or-wr-fa28d46a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3947%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=6870230ba83201eaaca9b884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3946-cwe-430-deployment-of-wrong-handler--f217b319</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3946%3A%20CWE-430%20Deployment%20of%20Wrong%20Handler%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=6870230ba83201eaaca9b881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2523-cwe-191-integer-underflow-wrap-or-wr-b65a0333</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2523%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Honeywell%20C300%20PCNT02&amp;severity=critical&amp;id=6870230ba83201eaaca9b87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2522-cwe-226-sensitive-information-in-res-f59116d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2522%3A%20CWE-226%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20Honeywell%20C300%20PCNT02&amp;severity=medium&amp;id=68701f8ba83201eaaca99fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2521-cwe-119-improper-restriction-of-oper-14113d99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2521%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=68701f8ba83201eaaca99fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7413-unrestricted-upload-in-code-projects-cab03725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7413%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=68701f8ba83201eaaca99fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2520-cwe-457-use-of-uninitialized-variabl-e509002a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2520%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20Honeywell%20C300%20PCNT02&amp;severity=high&amp;id=68701c03a83201eaaca9926a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53629-cwe-770-allocation-of-resources-wit-eb9ffa4a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53629%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=68701c03a83201eaaca99272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53628-cwe-835-loop-with-unreachable-exit--1e3a0512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53628%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20yhirose%20cpp-httplib&amp;severity=medium&amp;id=68701c03a83201eaaca9926d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53634-cwe-770-allocation-of-resources-wit-b609ce36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53634%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=6870230ba83201eaaca9b887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53633-cwe-405-asymmetric-resource-consump-dc1abdd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53633%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=6870187fa83201eaaca986cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53632-cwe-22-improper-limitation-of-a-pat-e4e972c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53632%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ctfer-io%20chall-manager&amp;severity=high&amp;id=6870187fa83201eaaca986c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53630-cwe-122-heap-based-buffer-overflow--820c47e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53630%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=6870187fa83201eaaca986d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7412-unrestricted-upload-in-code-projects-c17562e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7412%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=6870187fa83201eaaca986d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34100-cwe-434-unrestricted-upload-of-file-f6f116a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34100%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BuilderEngine%20CMS&amp;severity=critical&amp;id=687014fca83201eaaca979e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34102-cwe-89-improper-neutralization-of-s-7d380c2e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34102%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crypttech%20CryptoLog&amp;severity=critical&amp;id=687014fca83201eaaca979ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34096-cwe-119-improper-restriction-of-ope-350533c1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34096%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20EFS%20Software%20Inc.%20Easy%20File%20Sharing%20HTTP%20Server&amp;severity=critical&amp;id=687014fca83201eaaca979c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34095-cwe-78-improper-neutralization-of-s-f18da8a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34095%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Real%20Time%20Logic%20Mako%20Server&amp;severity=critical&amp;id=687014fca83201eaaca979c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53506-cwe-400-uncontrolled-resource-consu-83e80860</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53506%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=687014fca83201eaaca97a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34093-cwe-78-improper-neutralization-of-s-7743c35e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34093%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Polycom%20HDX%20Series&amp;severity=high&amp;id=687014fca83201eaaca979bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34097-cwe-434-unrestricted-upload-of-file-7cdc42b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34097%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ProcessMaker%20Inc.%20ProcessMaker&amp;severity=high&amp;id=687014fca83201eaaca979ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34098-cwe-200-exposure-of-sensitive-infor-815fc07a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Riverbed%20Technology%20SteelHead%20VCX&amp;severity=high&amp;id=687014fca83201eaaca979d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34101-cwe-78-improper-neutralization-of-s-98163af6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34101%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Serviio%20Media%20Server&amp;severity=critical&amp;id=687014fca83201eaaca979e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34099-cwe-78-improper-neutralization-of-s-2edd9d87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34099%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20VICIdial%20Group%20VICIdial&amp;severity=critical&amp;id=687014fca83201eaaca979db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7021-cwe-451-user-interface-ui-misreprese-f6f10707</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7021%3A%20CWE-451%20%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20OpenAI%20Operator&amp;severity=medium&amp;id=687014fca83201eaaca97a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52520-cwe-190-integer-overflow-or-wraparo-fefeef79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52520%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68701177a83201eaaca96453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52434-cwe-362-concurrent-execution-using--00c732d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52434%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68701177a83201eaaca96450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7411-sql-injection-in-code-projects-lifes-8fbbef37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7411%3A%20SQL%20Injection%20in%20code-projects%20LifeStyle%20Store&amp;severity=medium&amp;id=68701177a83201eaaca96456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53503-cwe-64-windows-shortcut-following-l-171d6193</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53503%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Cleaner%20One%20Pro&amp;severity=high&amp;id=68700df3a83201eaaca957ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53378-cwe-306-missing-authentication-for--12e32886</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53378%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Worry-Free%20Business%20Security%20Services&amp;severity=high&amp;id=68700df3a83201eaaca957c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52837-cwe-64-windows-shortcut-following-l-e8b81f68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52837%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Password%20Manager&amp;severity=high&amp;id=68700df3a83201eaaca957c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52521-cwe-64-windows-shortcut-following-l-3d6b5c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52521%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20(.LNK)%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Security%20(Consumer)&amp;severity=high&amp;id=68700df3a83201eaaca957bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52473-cwe-200-exposure-of-sensitive-infor-5ea37673</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52473%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20open-quantum-safe%20liboqs&amp;severity=medium&amp;id=68700df4a83201eaaca957d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt-c-55-kimsuky-organizations-happydo-550fb5ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT-C-55%20(Kimsuky)%20Organization&apos;s%20HappyDoor%20Backdoor%20Attack%20Based%20on%20VMP%20Strong%20Shell&amp;severity=medium&amp;id=68703822a83201eaacaa3b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atomic-macos-stealer-includes-a-backdoor-for-persi-29adbdc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atomic%20macOS%20Stealer%20includes%20a%20backdoor%20for%20persistent%20access&amp;severity=medium&amp;id=68703822a83201eaacaa3b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53709-the-product-does-not-perform-or-inc-3279d5df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53709%3A%20The%20product%20does%20not%20perform%20or%20incorrectly%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action.%20in%20Palantir%20com.palantir.secupload%3Asecure-upload&amp;severity=medium&amp;id=68700a6fa83201eaaca94483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53625-cwe-359-exposure-of-private-persona-41c78580</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53625%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Universal-Omega%20DynamicPageList3&amp;severity=high&amp;id=68700a6fa83201eaaca9447f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pay2keys-resurgence-iranian-cyber-warfare-targets--303f659b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pay2Key&apos;s%20Resurgence%3A%20Iranian%20Cyber%20Warfare%20Targets%20the%20West&amp;severity=medium&amp;id=68703822a83201eaacaa3af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-and-microsoft-trusted-them-23-million-users-d19d55b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20and%20Microsoft%20Trusted%20Them.%202.3%20Million%20Users%20Installed%20Them.%20They%20Were%20Malware.&amp;severity=medium&amp;id=68703822a83201eaacaa3aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53549-cwe-89-improper-neutralization-of-s-007420f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53549%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20matrix-org%20matrix-rust-sdk&amp;severity=medium&amp;id=68700a6fa83201eaaca9447a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53542-cwe-78-improper-neutralization-of-s-c97c3016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53542%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20kubernetes-sigs%20headlamp&amp;severity=high&amp;id=687006eba83201eaaca92a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/perfektblue-bluetooth-flaws-impact-mercedes-volksw-4638ca93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PerfektBlue%20Bluetooth%20flaws%20impact%20Mercedes%2C%20Volkswagen%2C%20Skoda%20cars&amp;severity=high&amp;id=68700366a83201eaaca917f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fix-the-click-preventing-the-clickfix-attack-vecto-21c21ddb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fix%20the%20Click%3A%20Preventing%20the%20ClickFix%20Attack%20Vector&amp;severity=medium&amp;id=687006eaa83201eaaca929eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macoszuru-resurfaces-modified-khepri-c2-hides-insi-257b117b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS.ZuRu%20Resurfaces%20%7C%20Modified%20Khepri%20C2%20Hides%20Inside%20Doctored%20Termius%20App&amp;severity=medium&amp;id=687006eaa83201eaaca92a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53371-cwe-400-uncontrolled-resource-consu-5cf841b9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53371%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20miraheze%20DiscordNotifications&amp;severity=critical&amp;id=686ff8dba83201eaaca8f4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7410-sql-injection-in-code-projects-lifes-0eb8ef66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7410%3A%20SQL%20Injection%20in%20code-projects%20LifeStyle%20Store&amp;severity=medium&amp;id=686ff55aa83201eaaca8e9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53020-cwe-401-missing-release-of-memory-a-007254f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53020%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=686ff55aa83201eaaca8e9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49812-cwe-287-improper-authentication-in--c3ecfc02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49812%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=686ff55aa83201eaaca8e9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49630-cwe-617-reachable-assertion-in-apac-3d5250cb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49630%3A%20CWE-617%20Reachable%20Assertion%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=686ff55aa83201eaaca8e9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23048-cwe-284-improper-access-control-in--f999dde7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23048%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=critical&amp;id=686ff1d3a83201eaaca8def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43394-cwe-918-server-side-request-forgery-5df5082e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43394%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6909084f7fff0e30cee23518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47252-cwe-150-improper-neutralization-of--eda656bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47252%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=690908517fff0e30cee2357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43204-cwe-918-server-side-request-forgery-b5bf4578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43204%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6909084f7fff0e30cee23514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42516-cwe-20-improper-input-validation-in-0a75bec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42516%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=6909084f7fff0e30cee23510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49464-cwe-287-improper-authentication-in--9e8ccc3d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49464%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=686fee50a83201eaaca8ca96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7409-sql-injection-in-code-projects-mobil-992bc0c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7409%3A%20SQL%20Injection%20in%20code-projects%20Mobile%20Shop&amp;severity=medium&amp;id=686fee50a83201eaaca8ca99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49463-cwe-691-insufficient-control-flow-m-e43f3335</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49463%3A%20CWE-691%3A%20Insufficient%20Control%20Flow%20Management%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20iOS&amp;severity=medium&amp;id=686fee50a83201eaaca8ca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49462-cwe-352-cross-site-request-forgery--557fc1c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49462%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients&amp;severity=low&amp;id=686fee50a83201eaaca8ca90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploring-delegated-admin-risks-in-aws-organizatio-026220a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploring%20Delegated%20Admin%20Risks%20in%20AWS%20Organizations&amp;severity=medium&amp;id=686fe3caa83201eaaca8a12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46789-cwe-120-buffer-copy-without-checkin-6462f5e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46789%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%20Inc.%20Zoom%20Clients%20for%20Windows&amp;severity=medium&amp;id=686fe3c5a83201eaaca8a110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46788-cwe-295-improper-certificate-valida-47470a28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46788%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20for%20Linux&amp;severity=high&amp;id=686fe3c5a83201eaaca8a10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6395-null-pointer-dereference-in-red-hat--6e6fcec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6395%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=686fdcbba83201eaaca87c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53364-cwe-497-exposure-of-sensitive-syste-111dda3e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53364%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=686fdcbba83201eaaca87c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46835-cwe-88-improper-neutralization-of-a-90976da3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46835%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20j6t%20git-gui&amp;severity=high&amp;id=686fd939a83201eaaca86b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46334-cwe-78-improper-neutralization-of-s-2854e76b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46334%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20j6t%20git-gui&amp;severity=high&amp;id=686fd939a83201eaaca86b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27614-cwe-78-improper-neutralization-of-s-40f9c845</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27614%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20j6t%20gitk&amp;severity=high&amp;id=686fd939a83201eaaca86b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27613-cwe-78-improper-neutralization-of-s-4a07b0bc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27613%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20j6t%20gitk&amp;severity=low&amp;id=686fd5b8a83201eaaca851ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploiting-public-appkey-leaks-to-achieve-rce-in-h-576da58a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploiting%20Public%20APP_KEY%20Leaks%20to%20Achieve%20RCE%20in%20Hundreds%20of%20Laravel%20Applications&amp;severity=medium&amp;id=686fd239a83201eaaca83e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7408-cross-site-scripting-in-sourcecodest-8bed5105</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7408%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Zoo%20Management%20System&amp;severity=medium&amp;id=686fd230a83201eaaca83e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7365-origin-validation-error-in-red-hat-r-67ee3b17</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7365%3A%20Origin%20Validation%20Error&amp;severity=high&amp;id=686fceada83201eaaca818f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36090-cwe-209-generation-of-error-message-9b1ee3b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36090%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Analytics%20Content%20Hub&amp;severity=medium&amp;id=686fceada83201eaaca818f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7370-null-pointer-dereference-in-red-hat--2843c711</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7370&amp;severity=null&amp;id=686fceada83201eaaca818fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7424-access-of-resource-using-incompatibl-31ed5aac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7424%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20GNOME%20libxslt&amp;severity=high&amp;id=686fcb28a83201eaaca80f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7425-use-after-free-in-red-hat-red-hat-en-3dcb7036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7425%3A%20Use%20After%20Free%20in%20GNOME%20libxml2&amp;severity=high&amp;id=686fc7a4a83201eaaca7ffbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/strengthening-microsoft-defender-understanding-log-81be85b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Strengthening%20Microsoft%20Defender%3A%20Understanding%20Logical%20Evasion%20Threats&amp;severity=high&amp;id=686fc424a83201eaaca7e7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7407-os-command-injection-in-netgear-d640-32fb555f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7407%3A%20OS%20Command%20Injection%20in%20Netgear%20D6400&amp;severity=medium&amp;id=686fc420a83201eaaca7e7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6211-cwe-440-expected-behavior-violation--9c1892d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6211%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686fbd17a83201eaaca7d1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5040-cwe-122-heap-based-buffer-overflow-i-3d54e0a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5040%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=686fa801a83201eaaca73eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5037-cwe-120-buffer-copy-without-checking-f8c091ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5037%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Revit&amp;severity=high&amp;id=686fa801a83201eaaca73eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32990-heap-based-buffer-overflow-in-red-h-3b85eafa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32990%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=686f8bdfa83201eaaca6d794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5023-cwe-798-use-of-hard-coded-credential-6e6d0fc4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5023%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Mitsubishi%20Electric%20Corporation%20PV-DR004J&amp;severity=high&amp;id=686f7dd1a83201eaaca69a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5022-cwe-521-weak-password-requirements-i-bb361a49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5022%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Mitsubishi%20Electric%20Corporation%20PV-DR004J&amp;severity=medium&amp;id=686f7dd1a83201eaaca69a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32989-improper-certificate-validation-in--ed015365</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32989%3A%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=686f76caa83201eaaca669d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32988-double-free-in-red-hat-red-hat-ente-22fdea7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32988%3A%20Double%20Free&amp;severity=medium&amp;id=686f76caa83201eaaca669ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6236-cwe-79-cross-site-scripting-xss-in-h-147454a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6236%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Hostel&amp;severity=medium&amp;id=686f5aaaa83201eaaca59a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6234-cwe-79-cross-site-scripting-xss-in-h-bfe50c90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6234%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Hostel&amp;severity=medium&amp;id=686f5aaaa83201eaaca59a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7387-cwe-79-improper-neutralization-of-in-93261b77</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lanacodes%20Lana%20Downloads%20Manager&amp;severity=medium&amp;id=686f53a1a83201eaaca567f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unpatchable-vulnerabilities-in-windows-1011-securi-ae7e32f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unpatchable%20Vulnerabilities%20in%20Windows%2010%2F11%3A%20Security%20Report%202025&amp;severity=critical&amp;id=686f4215a83201eaaca4eeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46406-cwe-270-privilege-context-switching-79cc574e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46406%3A%20CWE-270%20Privilege%20Context%20Switching%20Error%20in%20Gallagher%20Command%20Centre%20Server&amp;severity=medium&amp;id=686f307ca83201eaaca4840e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44003-cwe-772-missing-release-of-resource-0f3f69f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44003%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Gallagher%20T-Series%20Readers&amp;severity=medium&amp;id=686f307ba83201eaaca4840b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35983-cwe-295-improper-certificate-valida-fabd1294</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35983%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Gallagher%20Controller%207000&amp;severity=medium&amp;id=686f307aa83201eaaca48408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5807-cwe-79-improper-neutralization-of-in-ab801625</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpol%20Gwolle%20Guestbook&amp;severity=medium&amp;id=686f1ee6a83201eaaca42833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4406-cwe-79-improper-neutralization-of-in-358dcbda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=686f1ee6a83201eaaca4282e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-10-efc42793</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-10&amp;severity=medium&amp;id=687057bda83201eaacaac4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45662-na-cb95cffa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45662%3A%20n%2Fa&amp;severity=medium&amp;id=687014fca83201eaaca979b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28245-na-24dc49a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28245%3A%20n%2Fa&amp;severity=medium&amp;id=68700df4a83201eaaca957d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28244-na-c573cae6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28244%3A%20n%2Fa&amp;severity=high&amp;id=68700df3a83201eaaca957cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28243-na-887b4da2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28243%3A%20n%2Fa&amp;severity=high&amp;id=68700df3a83201eaaca957bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47813-cwe-209-generation-of-error-message-16d59a42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47813%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20wftpserver%20Wing%20FTP%20Server&amp;severity=medium&amp;id=686ff1d3a83201eaaca8df04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47811-cwe-267-privilege-defined-with-unsa-66e9f8e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47811%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20wftpserver%20Wing%20FTP%20Server&amp;severity=medium&amp;id=686ff1d3a83201eaaca8df00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27889-cwe-15-external-control-of-system-o-384687dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27889%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20wftpserver%20Wing%20FTP%20Server&amp;severity=low&amp;id=686ff1d3a83201eaaca8defb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44251-na-6e937638</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44251%3A%20n%2Fa&amp;severity=high&amp;id=686fd5b8a83201eaaca851b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0141-cwe-426-untrusted-search-path-in-pal-00700af7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0141%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=686ef4b5a83201eaaca35358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0140-cwe-266-incorrect-privilege-assignme-29d18ee0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0140%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=686ef4b5a83201eaaca35355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0139-cwe-266-incorrect-privilege-assignme-eecf7611</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0139%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20Autonomous%20Digital%20Experience%20Manager&amp;severity=medium&amp;id=686ef4b5a83201eaaca35352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6976-cwe-79-improper-neutralization-of-in-6b01aebc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=686eedb2a83201eaaca33f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6975-cwe-79-improper-neutralization-of-in-a7b631bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6975%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=686eedb2a83201eaaca33f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6970-cwe-89-improper-neutralization-of-sp-1b8323e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6970%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=high&amp;id=686eedb2a83201eaaca33f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53624-cwe-200-exposure-of-sensitive-infor-1622e9f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53624%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webbertakken%20docusaurus-plugin-content-gists&amp;severity=critical&amp;id=686edc19a83201eaac9fb811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/would-you-like-an-idor-with-that-leaking-64-millio-1fbf6ce8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Would%20you%20like%20an%20IDOR%20with%20that%3F%20Leaking%2064%20million%20McDonald%E2%80%99s%20job%20applications&amp;severity=medium&amp;id=686ed19fa83201eaac9f3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6376-cwe-20-improper-input-validation-in--829c3786</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6376%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20Arena%C2%AE&amp;severity=high&amp;id=686ed198a83201eaac9f3b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6377-cwe-20-improper-input-validation-in--c59b509d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6377%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20Arena%C2%AE&amp;severity=high&amp;id=686ed198a83201eaac9f3b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitcoin-depot-breach-exposes-data-of-nearly-27000--17bfc45f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitcoin%20Depot%20breach%20exposes%20data%20of%20nearly%2027%2C000%20crypto%20users&amp;severity=high&amp;id=686ec5736f40f0eb7205f620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nippon-steel-solutions-suffered-a-data-breach-foll-368a681e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nippon%20Steel%20Solutions%20suffered%20a%20data%20breach%20following%20a%20zero-day%20attack&amp;severity=critical&amp;id=686ec5736f40f0eb7205f624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53620-cwe-248-uncaught-exception-in-qwikd-19e2b88d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53620%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20QwikDev%20qwik&amp;severity=critical&amp;id=686ebaf16f40f0eb7205cb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36599-cwe-532-insertion-of-sensitive-info-67b81bdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36599%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20PowerFlex%20Manager%20VM&amp;severity=medium&amp;id=686ebaf16f40f0eb7205cb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/donot-apt-expands-operations-targets-european-fore-d14183de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DoNot%20APT%20Expands%20Operations%2C%20Targets%20European%20Foreign%20Ministries%20with%20LoptikMod%20Malware&amp;severity=high&amp;id=686eb05c6f40f0eb72059f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingram-micro-starts-restoring-systems-after-ransom-f8688f54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingram%20Micro%20starts%20restoring%20systems%20after%20ransomware%20attack&amp;severity=high&amp;id=686eb05c6f40f0eb72059f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ruckus-networks-leaves-severe-flaws-unpatched-in-m-fe037cde</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ruckus%20Networks%20leaves%20severe%20flaws%20unpatched%20in%20management%20devices&amp;severity=critical&amp;id=686eb05c6f40f0eb72059f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53548-cwe-345-insufficient-verification-o-76fe39d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53548%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20clerk%20javascript&amp;severity=high&amp;id=686ea5d06f40f0eb72054170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uncovering-privilege-escalation-bugs-in-lenovo-van-d85a61c3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Uncovering%20Privilege%20Escalation%20Bugs%20in%20Lenovo%20Vantage%20%E2%80%94%20Atredis%20Partners&amp;severity=medium&amp;id=686e94456f40f0eb7204cbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53743-vulnerability-in-jenkins-project-je-673b4fab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53743%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Applitools%20Eyes%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53742-vulnerability-in-jenkins-project-je-e360fa55</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53742%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Applitools%20Eyes%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53678-vulnerability-in-jenkins-project-je-3c9656eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53678%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20User1st%20uTester%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53677-vulnerability-in-jenkins-project-je-17b7ef92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53677%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Xooa%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53676-vulnerability-in-jenkins-project-je-4b37facc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53676%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Xooa%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53675-vulnerability-in-jenkins-project-je-8b4a54ca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53675%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Warrior%20Framework%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53674-vulnerability-in-jenkins-project-je-9a74a044</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53674%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Sensedia%20Api%20Platform%20tools%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53673-vulnerability-in-jenkins-project-je-30346923</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53673%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Sensedia%20Api%20Platform%20tools%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53672-vulnerability-in-jenkins-project-je-57d2150f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53672%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Kryptowire%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53671-vulnerability-in-jenkins-project-je-8e75e739</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53671%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nouvola%20DiveCloud%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53670-vulnerability-in-jenkins-project-je-14770a11</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53670%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nouvola%20DiveCloud%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53669-vulnerability-in-jenkins-project-je-226477d8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53669%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20VAddy%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53668-vulnerability-in-jenkins-project-je-102d63d2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53668%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20VAddy%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53667-vulnerability-in-jenkins-project-je-5eeaef52</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53667%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Dead%20Man&apos;s%20Snitch%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53666-vulnerability-in-jenkins-project-je-6acd8bab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53666%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Dead%20Man&apos;s%20Snitch%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53665-vulnerability-in-jenkins-project-je-22d9c5b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53665%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Apica%20Loadtest%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53664-vulnerability-in-jenkins-project-je-a79e767a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53664%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Apica%20Loadtest%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53663-vulnerability-in-jenkins-project-je-5b0a06ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53663%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20IBM%20Cloud%20DevOps%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53662-vulnerability-in-jenkins-project-je-f2d133db</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53662%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20IFTTT%20Build%20Notifier%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53661-vulnerability-in-jenkins-project-je-85a0bd1e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53661%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Testsigma%20Test%20Plan%20run%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53660-vulnerability-in-jenkins-project-je-6b964c65</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53660%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20QMetry%20Test%20Management%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53659-vulnerability-in-jenkins-project-je-635e1da6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53659%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20QMetry%20Test%20Management%20Plugin&amp;severity=medium&amp;id=686e90bb6f40f0eb7204bd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53658-vulnerability-in-jenkins-project-je-ded29742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53658%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Applitools%20Eyes%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53657-vulnerability-in-jenkins-project-je-d9f7dc21</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53657%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ReadyAPI%20Functional%20Testing%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53656-vulnerability-in-jenkins-project-je-5445dda7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53656%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20ReadyAPI%20Functional%20Testing%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53655-vulnerability-in-jenkins-project-je-682f6cff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53655%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Statistics%20Gatherer%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53654-vulnerability-in-jenkins-project-je-bfdc5f63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53654%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Statistics%20Gatherer%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53653-vulnerability-in-jenkins-project-je-d6dae703</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53653%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Aqua%20Security%20Scanner%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53652-vulnerability-in-jenkins-project-je-3d3722f3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53652%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20Parameter%20Plugin&amp;severity=high&amp;id=686e90ba6f40f0eb7204bd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53651-vulnerability-in-jenkins-project-je-67276466</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53651%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20HTML%20Publisher%20Plugin&amp;severity=medium&amp;id=686e90ba6f40f0eb7204bd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53650-vulnerability-in-jenkins-project-je-50565e39</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53650%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Credentials%20Binding%20Plugin&amp;severity=high&amp;id=686e90ba6f40f0eb7204bd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7381-cwe-497-in-mautic-docker-mautic-8d2ff969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7381%3A%20CWE-497%20in%20mautic%20Docker%20Mautic&amp;severity=medium&amp;id=686e943d6f40f0eb7204cbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7204-cwe-201-insertion-of-sensitive-infor-9d13896e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7204%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ConnectWise%20PSA&amp;severity=medium&amp;id=686e862c6f40f0eb72047eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-group-pay2keyi2p-ramps-up-ransomware-attac-135c2fad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20group%20Pay2Key.I2P%20ramps%20Up%20ransomware%20attacks%20against%20Israel%20and%20US%20with%20incentives%20for%20affiliates&amp;severity=medium&amp;id=686e82a76f40f0eb72045f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-attack-stops-nova-scotia-power-meter-re-27592a27</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Attack%20Stops%20Nova%20Scotia%20Power%20Meter%20Readings&amp;severity=high&amp;id=686e82a76f40f0eb72045f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1112-cwe-282-improper-ownership-managemen-e8af9a62</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1112%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=medium&amp;id=686e82c46f40f0eb72045fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2670-cwe-497-exposure-of-sensitive-system-fd07f2af</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2670%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages&amp;severity=medium&amp;id=686e7f236f40f0eb72045275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53546-cwe-829-inclusion-of-functionality--a383e92f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53546%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20RSSNext%20Folo&amp;severity=critical&amp;id=686e7f236f40f0eb72045278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pull-request-infects-vs-code-extension-838a52b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20pull%20request%20infects%20VS%20Code%20extension&amp;severity=medium&amp;id=686ec58d6f40f0eb7206fd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploitation-of-leaked-machine-keys-by-initial-acc-8ceed63a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploitation%20of%20Leaked%20Machine%20Keys%20by%20Initial%20Access%20Broker&amp;severity=medium&amp;id=686e71156f40f0eb7203f20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6514-cwe-78-improper-neutralization-of-sp-95e77237</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6514%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=critical&amp;id=686e66886f40f0eb7203a122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/server-with-rockerbox-tax-firm-data-exposed-286gb--df972f8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Server%20with%20Rockerbox%20Tax%20Firm%20Data%20Exposed%20286GB%20of%20PII%20Records&amp;severity=medium&amp;id=686e3c566f40f0eb72026c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-taptrap-attack-fools-users-with-invisi-ab6a05c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20TapTrap%20attack%20fools%20users%20with%20invisible%20UI%20trick&amp;severity=high&amp;id=686e31ca6f40f0eb72023a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ms-confirms-social-engineering-led-to-massive-rans-72d07b89</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M%26S%20confirms%20social%20engineering%20led%20to%20massive%20ransomware%20attack&amp;severity=high&amp;id=686e31ca6f40f0eb72023a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3499-cwe-78-improper-neutralization-of-sp-2cd73387</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3499%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(%E2%80%99OS%20Command%20Injection%E2%80%99)%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=critical&amp;id=686e31e96f40f0eb72023af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3498-cwe-306-missing-authentication-for-c-eaab1b25</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3498%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=critical&amp;id=686e31e96f40f0eb72023af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3497-cwe-1104-use-of-unmaintained-third-p-51517884</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3497%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=high&amp;id=686e2e466f40f0eb72022b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27028-vulnerability-in-radiflow-isap-smar-9404fde2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27028%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=medium&amp;id=686e2e466f40f0eb72022b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27027-vulnerability-in-radiflow-isap-smar-c1578886</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27027%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Radiflow%20iSAP%20Smart%20Collector&amp;severity=medium&amp;id=686e2e466f40f0eb72022b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7379-cwe-352-cross-site-request-forgery-c-a50bb7da</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7379%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=686e2e466f40f0eb72022b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7378-cwe-20-improper-input-validation-in--a573bb5e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7378%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ASUSTOR%20ADM&amp;severity=medium&amp;id=686e192f6f40f0eb720017c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7220-sql-injection-in-campcodes-payroll-m-2de60b49</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7220%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686e12276f40f0eb72fff4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7219-sql-injection-in-campcodes-payroll-m-731899f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7219%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686e0b1e6f40f0eb72ffdce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7218-sql-injection-in-campcodes-payroll-m-2d4e8df9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7218%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686e00926f40f0eb72ff9b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6691-cwe-73-external-control-of-file-name-c2d09e9c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6691%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=high&amp;id=686e00926f40f0eb72ff9b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6742-cwe-502-deserialization-of-untrusted-97395e83</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6742%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=high&amp;id=686e00926f40f0eb72ff9b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-announces-arresting-state-sponsored-chinese-hac-68b884f2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Announces%20Arresting%20State-Sponsored%20Chinese%20Hacker%20Linked%20to%20HAFNIUM%20(Silk%20Typhoon)%20Group&amp;severity=medium&amp;id=686df9896f40f0eb72ff79a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7217-sql-injection-in-campcodes-payroll-m-42f34743</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7217%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686dfd0e6f40f0eb72ff91ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7216-deserialization-in-lty628-aidigu-789c00f3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7216%3A%20Deserialization%20in%20lty628%20Aidigu&amp;severity=medium&amp;id=686df2826f40f0eb72fe4a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7215-cleartext-storage-of-sensitive-infor-ada03569</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7215%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20FNKvision%20FNK-GU2&amp;severity=low&amp;id=686def016f40f0eb72fe3779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7214-risky-cryptographic-algorithm-in-fnk-0f6c57ea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7214%3A%20Risky%20Cryptographic%20Algorithm%20in%20FNKvision%20FNK-GU2&amp;severity=low&amp;id=686de4726f40f0eb72fdff0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4606-cwe-620-unverified-password-change-i-6ac15fdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4606%3A%20CWE-620%20Unverified%20Password%20Change%20in%20uxper%20Sala%20-%20Startup%20%26%20SaaS%20WordPress%20Theme&amp;severity=critical&amp;id=686de4726f40f0eb72fdff05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7059-cwe-79-improper-neutralization-of-in-bee58a71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jdegayojr%20Simple%20Featured%20Image&amp;severity=medium&amp;id=686de4726f40f0eb72fdff09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bypassing-live-html-filtering-to-trigger-stored-xs-79ac0a46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bypassing%20Live%20HTML%20Filtering%20to%20Trigger%20Stored%20XSS%20%E2%80%93%20DOM-Based%20Exploitation&amp;severity=medium&amp;id=686de0f76f40f0eb72fded67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-targets-employees-via-weaponized-word-docu-f362758a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware%20Targets%20Employees%20via%20Weaponized%20Word%20Documents%20Delivering%20Malware%20Payloads&amp;severity=medium&amp;id=686e58776f40f0eb72032d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7213-on-chip-debug-and-test-interface-wit-7d415ea0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7213%3A%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20FNKvision%20FNK-GU2&amp;severity=medium&amp;id=686de0ee6f40f0eb72fded2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7212-sql-injection-in-itsourcecode-insura-bdb1e700</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7212%3A%20SQL%20Injection%20in%20itsourcecode%20Insurance%20Management%20System&amp;severity=medium&amp;id=686dd6626f40f0eb72fdaed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7211-sql-injection-in-code-projects-lifes-fbbd7235</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7211%3A%20SQL%20Injection%20in%20code-projects%20LifeStyle%20Store&amp;severity=medium&amp;id=686dd6626f40f0eb72fdaed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5678-cwe-79-improper-neutralization-of-in-ba6ab51f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=686dcbd66f40f0eb72fd7834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7210-unrestricted-upload-in-code-projects-e96a3293</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7210%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20Management%20System&amp;severity=medium&amp;id=686dcbd66f40f0eb72fd7839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7209-null-pointer-dereference-in-9fans-pl-822ed7f6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7209%3A%20NULL%20Pointer%20Dereference%20in%209fans%20plan9port&amp;severity=medium&amp;id=686dc4ce6f40f0eb72fd189a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34083-cwe-434-unrestricted-upload-of-file-817d0ba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34083&amp;severity=null&amp;id=686dc4ce6f40f0eb72fd187d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34084-cwe-200-exposure-of-sensitive-infor-16bd0df8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34084&amp;severity=null&amp;id=686dc4ce6f40f0eb72fd1887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34077-cwe-434-unrestricted-upload-of-file-a60a1fb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34077%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Genetech%20Solutions%20WordPress%20Pie%20Register%20Plugin&amp;severity=critical&amp;id=686dc4ce6f40f0eb72fd1875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34085-cwe-434-unrestricted-upload-of-file-7286e0e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34085&amp;severity=null&amp;id=686dc4ce6f40f0eb72fd188f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7208-heap-based-buffer-overflow-in-9fans--04d069d5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7208%3A%20Heap-based%20Buffer%20Overflow%20in%209fans%20plan9port&amp;severity=medium&amp;id=686dbdc66f40f0eb72fcf597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7207-heap-based-buffer-overflow-in-mruby-118a606d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7207%3A%20Heap-based%20Buffer%20Overflow%20in%20mruby&amp;severity=medium&amp;id=686db6c86f40f0eb72fcceb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-09-7c163c67</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-09&amp;severity=medium&amp;id=686f063da83201eaaca39fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52357-na-8fcdb30c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52357%3A%20n%2Fa&amp;severity=medium&amp;id=686ed198a83201eaac9f3b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53645-na-fea0454c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53645%3A%20n%2Fa&amp;severity=high&amp;id=686e9ec76f40f0eb720500db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44525-na-6a0e2c61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44525%3A%20n%2Fa&amp;severity=medium&amp;id=686e97c56f40f0eb7204eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49604-na-f89248e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49604%3A%20n%2Fa&amp;severity=medium&amp;id=686e943d6f40f0eb7204cbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44526-na-1897ed65</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44526%3A%20n%2Fa&amp;severity=medium&amp;id=686e943d6f40f0eb7204cbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44177-na-163ddbcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44177%3A%20n%2Fa&amp;severity=high&amp;id=686e90ba6f40f0eb7204bd16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52364-na-18199642</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52364%3A%20n%2Fa&amp;severity=high&amp;id=686e82c46f40f0eb72045fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7206-stack-based-buffer-overflow-in-d-lin-eb352869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7206%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=critical&amp;id=686dac326f40f0eb72fc67a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4855-cwe-639-authorization-bypass-through-df73ce54</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Schiocco%20Support%20Board&amp;severity=critical&amp;id=686dac326f40f0eb72fc67b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4828-cwe-22-improper-limitation-of-a-path-9a4ec86e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4828%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schiocco%20Support%20Board&amp;severity=critical&amp;id=686dac326f40f0eb72fc67b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3780-cwe-862-missing-authorization-in-wcl-4fc81a3d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3780%3A%20CWE-862%20Missing%20Authorization%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce%20along%20with%20Bookings%20Subscription%20Listings%20Compatible&amp;severity=medium&amp;id=686dac326f40f0eb72fc67ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7200-sql-injection-in-krishna9772-pharmac-935f1084</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7200%3A%20SQL%20Injection%20in%20krishna9772%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=686da52a6f40f0eb72fc4561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7199-sql-injection-in-code-projects-libra-a4580885</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7199%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d9e226f40f0eb72fc0f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47098-access-of-uninitialized-pointer-cwe-23580586</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47098%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=686d9e226f40f0eb72fc0f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47097-integer-underflow-wrap-or-wraparoun-e7d8d929</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47097%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=686d9e226f40f0eb72fc0f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47099-heap-based-buffer-overflow-cwe-122--959e0f09</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47099%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=686d9e226f40f0eb72fc0f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47120-stack-based-buffer-overflow-cwe-121-907af528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47120%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=686d9a9f6f40f0eb72fbf84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47126-out-of-bounds-write-cwe-787-in-adob-e2040c5b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47126%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47128-integer-underflow-wrap-or-wraparoun-624c529e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47128%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47131-heap-based-buffer-overflow-cwe-122--5db9b910</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47131%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47122-heap-based-buffer-overflow-cwe-122--319ab3fc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47122%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47130-integer-underflow-wrap-or-wraparoun-5dbe9916</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47130%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47133-out-of-bounds-write-cwe-787-in-adob-ea21f50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47133%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47121-access-of-uninitialized-pointer-cwe-28a57e9d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47121%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47124-out-of-bounds-write-cwe-787-in-adob-8de6f8b0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47124%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47127-out-of-bounds-write-cwe-787-in-adob-57ab2fdb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47127%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47129-out-of-bounds-write-cwe-787-in-adob-97bcdbd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47129%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47119-null-pointer-dereference-cwe-476-in-21b81382</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47119%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=medium&amp;id=686d9a9f6f40f0eb72fbf847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47125-heap-based-buffer-overflow-cwe-122--4bc1e5ee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47125%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47123-heap-based-buffer-overflow-cwe-122--b767b7df</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47123%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47132-out-of-bounds-write-cwe-787-in-adob-7247c56b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47132%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=686d9a9f6f40f0eb72fbf878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7198-sql-injection-in-code-projects-jonny-7dbd8776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7198%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=686d971c6f40f0eb72fbe6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49524-null-pointer-dereference-cwe-476-in-12f15644</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49524%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=686d971b6f40f0eb72fbe6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49528-stack-based-buffer-overflow-cwe-121-cd84b44c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49528%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49531-integer-overflow-or-wraparound-cwe--bfb27049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49531%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49527-stack-based-buffer-overflow-cwe-121-57061155</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49527%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49532-integer-underflow-wrap-or-wraparoun-f36f64e2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49532%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49525-out-of-bounds-read-cwe-125-in-adobe-4b887670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49525%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=686d971b6f40f0eb72fbe6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49529-access-of-uninitialized-pointer-cwe-d97dffc8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49529%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49530-out-of-bounds-write-cwe-787-in-adob-55beda48</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49530%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49526-out-of-bounds-write-cwe-787-in-adob-d1063ad6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49526%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=686d971b6f40f0eb72fbe6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30313-out-of-bounds-read-cwe-125-in-adobe-2ceb0aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30313%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=686d971b6f40f0eb72fbe6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43591-heap-based-buffer-overflow-cwe-122--7b320af1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43591%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93966f40f0eb72fbc807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43592-access-of-uninitialized-pointer-cwe-7b5fc2a3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43592%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43594-out-of-bounds-write-cwe-787-in-adob-22978a9b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43594%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47134-heap-based-buffer-overflow-cwe-122--325aa841</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47134%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47136-integer-underflow-wrap-or-wraparoun-927c1b22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47136%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47103-heap-based-buffer-overflow-cwe-122--3be5480b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47103%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=686d93976f40f0eb72fbc810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6759-cwe-269-improper-privilege-managemen-b8ed1693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6759%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Windows%20Virtual%20Delivery%20Agent%20for%20CVAD%20and%20Citrix%20DaaS&amp;severity=high&amp;id=686d93976f40f0eb72fbc81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49547-cross-site-scripting-stored-xss-cwe-b9d88d6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49547%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=686d93976f40f0eb72fbc81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49534-cross-site-scripting-stored-xss-cwe-c41ab3aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49534%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=686d93976f40f0eb72fbc819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49533-deserialization-of-untrusted-data-c-81de7990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49533%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Experience%20Manager%20(MS)&amp;severity=critical&amp;id=686d90126f40f0eb72fbad72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7197-sql-injection-in-code-projects-jonny-8236c498</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7197%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=686d90126f40f0eb72fbad75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27203-deserialization-of-untrusted-data-c-cfc5e3c2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27203%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=686d90126f40f0eb72fbad7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27165-out-of-bounds-read-cwe-125-in-adobe-66394c55</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27165%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=686d8cfe6f40f0eb72fb9fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43584-out-of-bounds-read-cwe-125-in-adobe-71366ed6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43584%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=686d8d0e6f40f0eb72fba021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43583-null-pointer-dereference-cwe-476-in-84f384a5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43583%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=medium&amp;id=686d8d036f40f0eb72fba00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43582-heap-based-buffer-overflow-cwe-122--0c474e1e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43582%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Viewer&amp;severity=high&amp;id=686d8d016f40f0eb72fb9ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7196-sql-injection-in-code-projects-jonny-ff52cf43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7196%3A%20SQL%20Injection%20in%20code-projects%20Jonnys%20Liquor&amp;severity=medium&amp;id=686d8d0e6f40f0eb72fba028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7031-cwe-306-missing-authentication-for-c-98af8a52</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7031%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Drupal%20Config%20Pages%20Viewer&amp;severity=medium&amp;id=686d862b6f40f0eb72fb67f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7030-cwe-267-privilege-defined-with-unsaf-657291df</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7030%3A%20CWE-267%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Drupal%20Two-factor%20Authentication%20(TFA)&amp;severity=medium&amp;id=686d862b6f40f0eb72fb67f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49542-cross-site-scripting-reflected-xss--437748b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49542%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49535-improper-restriction-of-xml-externa-153db7d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49535%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=686d86116f40f0eb72fb6751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49536-incorrect-authorization-cwe-863-in--c3c6fd97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49536%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d86126f40f0eb72fb6754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49539-improper-restriction-of-xml-externa-ab40c344</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49539%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb675d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49545-server-side-request-forgery-ssrf-cw-98f4692a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49545%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86296f40f0eb72fb67d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49541-cross-site-scripting-stored-xss-cwe-75db7033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49541%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49537-improper-neutralization-of-special--062b584a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49537%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d86126f40f0eb72fb6757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49551-use-of-hard-coded-credentials-cwe-7-6312ebab</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49551%3A%20Use%20of%20Hard-coded%20Credentials%20(CWE-798)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d862a6f40f0eb72fb67e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49546-improper-access-control-cwe-284-in--4fbe651b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49546%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=low&amp;id=686d862a6f40f0eb72fb67e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49544-improper-restriction-of-xml-externa-bb8fcbfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49544%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49543-cross-site-scripting-stored-xss-cwe-2ea22a0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49543%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49540-cross-site-scripting-stored-xss-cwe-70781077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49540%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=686d86126f40f0eb72fb6760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49538-xml-injection-aka-blind-xpath-injec-74c7b728</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49538%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20(CWE-91)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=686d86126f40f0eb72fb675a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7194-stack-based-buffer-overflow-in-d-lin-4fd463d5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7194%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-500WF&amp;severity=high&amp;id=686d862b6f40f0eb72fb6800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7193-sql-injection-in-itsourcecode-agri-t-2d038426</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7193%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=686d7afb6f40f0eb72fb3377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53355-cwe-77-improper-neutralization-of-s-f03f2a5e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53355%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Flux159%20mcp-server-kubernetes&amp;severity=high&amp;id=686d777b6f40f0eb72fa15a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7192-command-injection-in-d-link-dir-645-06b839f3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7192%3A%20Command%20Injection%20in%20D-Link%20DIR-645&amp;severity=medium&amp;id=686d73ff6f40f0eb72f9fce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37103-vulnerability-in-hewlett-packard-en-e4ec5fe1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37103%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Networking%20Instant%20On&amp;severity=critical&amp;id=686d707d6f40f0eb72f9dd06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37102-vulnerability-in-hewlett-packard-en-80289359</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37102%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Networking%20Instant%20On&amp;severity=high&amp;id=686d6d446f40f0eb72f9d117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7191-sql-injection-in-code-projects-stude-0efa2636</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7191%3A%20SQL%20Injection%20in%20code-projects%20Student%20Enrollment%20System&amp;severity=medium&amp;id=686d6d446f40f0eb72f9d11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/italian-police-arrested-a-chinese-national-suspect-9eb29496</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Italian%20police%20arrested%20a%20Chinese%20national%20suspected%20of%20cyberespionage%20on%20a%20U.S.%20warrant&amp;severity=medium&amp;id=686d6d256f40f0eb72f9d0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27369-cwe-497-exposure-of-sensitive-syste-8e18ea1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27369%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=medium&amp;id=686d6adf6f40f0eb72f9c54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27367-cwe-602-client-side-enforcement-of--9ae8de83</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27367%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=medium&amp;id=686d6adf6f40f0eb72f9c542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7190-unrestricted-upload-in-code-projects-819d4120</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7190%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20Management%20System&amp;severity=medium&amp;id=686d6ae06f40f0eb72f9c550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7189-sql-injection-in-code-projects-chat--720f86d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7189%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d5eda6f40f0eb72f987ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4663-cwe-754-improper-check-for-unusual-o-d19838aa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4663%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Broadcom%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=686d5eda6f40f0eb72f987f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7188-sql-injection-in-code-projects-chat--cd087a9e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7188%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d57da6f40f0eb72f94b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30312-out-of-bounds-write-cwe-787-in-adob-2490c605</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30312%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=686d57da6f40f0eb72f94b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47135-out-of-bounds-read-cwe-125-in-adobe-6610ce85</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47135%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=686d57da6f40f0eb72f94b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7363-cwe-79-improper-neutralization-of-in-8d0ff86a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20TitleIcon%20extension&amp;severity=medium&amp;id=686d57da6f40f0eb72f94b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7362-cwe-79-improper-neutralization-of-in-a4f00fc7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MsUpload%20extension&amp;severity=medium&amp;id=686d54576f40f0eb72f9310f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0928-cwe-285-improper-authorization-in-ca-33dc3e99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0928%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Canonical%20Juju&amp;severity=high&amp;id=686d54576f40f0eb72f93108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53479-cwe-79-improper-neutralization-of-i-6a8e1628</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CheckUser%20extension&amp;severity=medium&amp;id=686d54576f40f0eb72f9310b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7187-sql-injection-in-code-projects-chat--e568bc91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7187%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d50d86f40f0eb72f91cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36357-cwe-1421-exposure-of-sensitive-info-9a734776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36357%3A%20CWE-1421%20%20Exposure%20of%20Sensitive%20Information%20in%20Shared%20Microarchitectural%20Structures%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=medium&amp;id=6908ed741c2a0078ae510262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47988-cwe-94-improper-control-of-generati-aad0df58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47988%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=686d50d36f40f0eb72f91b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49744-cwe-122-heap-based-buffer-overflow--b3afd351</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49744%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d86f40f0eb72f91ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49742-cwe-190-integer-overflow-or-wraparo-61f88ec0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49742%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d86f40f0eb72f91ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49740-cwe-693-protection-mechanism-failur-b45f273b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49740%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d86f40f0eb72f91cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49739-cwe-59-improper-link-resolution-bef-56ae6c56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49739%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202015%20Update%203&amp;severity=high&amp;id=686d50d86f40f0eb72f91cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49738-cwe-59-improper-link-resolution-bef-881eab79</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49738%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=high&amp;id=686d50d86f40f0eb72f91cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49737-cwe-362-concurrent-execution-using--12a077fa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49737%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Microsoft%20Teams%20for%20Mac%2C%20New%20Edition&amp;severity=high&amp;id=686d50d76f40f0eb72f91cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47999-cwe-820-missing-synchronization-in--414de2d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47999%3A%20CWE-820%3A%20Missing%20Synchronization%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49733-cwe-416-use-after-free-in-microsoft-365fe658</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49733%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d76f40f0eb72f91cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49732-cwe-122-heap-based-buffer-overflow--1be712f7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49732%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49730-cwe-367-time-of-check-time-of-use-t-722f09e9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49730%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49729-cwe-122-heap-based-buffer-overflow--5dca7a3c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49729%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d76f40f0eb72f91ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49727-cwe-122-heap-based-buffer-overflow--d9839c3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49727%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49725-cwe-416-use-after-free-in-microsoft-800e5a31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49725%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d76f40f0eb72f91c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49724-cwe-416-use-after-free-in-microsoft-d95e55e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d76f40f0eb72f91c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49722-cwe-400-uncontrolled-resource-consu-7ee08ea5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49722%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d76f40f0eb72f91c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49718-cwe-908-use-of-uninitialized-resour-cd46aa12</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49718%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2032)&amp;severity=high&amp;id=686d50d76f40f0eb72f91c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49714-cwe-501-trust-boundary-violation-in-f744ba58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49714%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20Microsoft%20Python%20extension%20for%20Visual%20Studio%20Code&amp;severity=high&amp;id=686d50d76f40f0eb72f91c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49706-cwe-287-improper-authentication-in--912e5ab8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49706%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=686d50d66f40f0eb72f91c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49705-cwe-122-heap-based-buffer-overflow--50b716af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49705%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49704-cwe-94-improper-control-of-generati-0493c535</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49704%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=686d50d66f40f0eb72f91c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49703-cwe-416-use-after-free-in-microsoft-27d94042</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49703%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49702-cwe-843-access-of-resource-using-in-0e0f9fa2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49702%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49701-cwe-285-improper-authorization-in-m-a1f37791</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49701%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=686d50d66f40f0eb72f91c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49700-cwe-416-use-after-free-in-microsoft-79d25e27</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49700%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49699-cwe-416-use-after-free-in-microsoft-8fbf6a7e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49699%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49698-cwe-416-use-after-free-in-microsoft-a699458f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49698%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49697-cwe-122-heap-based-buffer-overflow--2948c499</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49696-cwe-125-out-of-bounds-read-in-micro-414e5503</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49696%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49695-cwe-416-use-after-free-in-microsoft-f6ac9837</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49695%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d66f40f0eb72f91c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49693-cwe-415-double-free-in-microsoft-wi-f334cdb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49693%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49685-cwe-416-use-after-free-in-microsoft-795d9115</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49685%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d66f40f0eb72f91c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49684-cwe-126-buffer-over-read-in-microso-c7abed1a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49684%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d66f40f0eb72f91c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49683-cwe-190-integer-overflow-or-wraparo-f8e64a94</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49683%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49682-cwe-416-use-after-free-in-microsoft-ebaa0802</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49682%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49681-cwe-125-out-of-bounds-read-in-micro-b37159b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49681%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=686d50d66f40f0eb72f91c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49680-cwe-59-improper-link-resolution-bef-9f251517</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49680%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49679-cwe-197-numeric-truncation-error-in-2a9ebfd2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49679%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49678-cwe-476-null-pointer-dereference-in-75854200</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49678%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49675-cwe-416-use-after-free-in-microsoft-1a371410</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49675%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49673-cwe-122-heap-based-buffer-overflow--89cc7362</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49673%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49669-cwe-122-heap-based-buffer-overflow--9cbf142f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49669%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49668-cwe-122-heap-based-buffer-overflow--fefbb465</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49668%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49667-cwe-415-double-free-in-microsoft-wi-5c9427f6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49667%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49666-cwe-122-heap-based-buffer-overflow--fab36769</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49666%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=686d50d56f40f0eb72f91bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49665-cwe-362-concurrent-execution-using--985065c5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49665%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49664-cwe-200-exposure-of-sensitive-infor-9a72311a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49664%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49663-cwe-122-heap-based-buffer-overflow--45b90f59</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49663%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49660-cwe-416-use-after-free-in-microsoft-eef5ccaf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49660%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49659-cwe-126-buffer-over-read-in-microso-3b284e93</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49659%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48823-information-disclosure-in-microsoft-d4ff6772</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48823%3A%20CWE-310%3A%20CWE%20CATEGORY%3A%20Cryptographic%20Issues%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48822-cwe-125-out-of-bounds-read-in-micro-8c201fa5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48821-cwe-416-use-after-free-in-microsoft-023535ed</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48821%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48820-cwe-59-improper-link-resolution-bef-913c146a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48820%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48819-cwe-591-sensitive-data-storage-in-i-2db08258</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48819%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48818-cwe-367-time-of-check-time-of-use-t-a9097669</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48818%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48817-cwe-23-relative-path-traversal-in-m-d26f6287</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48817%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=686d50d46f40f0eb72f91b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48816-cwe-190-integer-overflow-or-wraparo-f7836539</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48816%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48815-cwe-843-access-of-resource-using-in-c1448c7e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48815%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48814-cwe-306-missing-authentication-for--658bcb2b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48814%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48811-cwe-353-missing-support-for-integri-ccd28cde</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48811%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48810-cwe-1037-processor-optimization-rem-46167e85</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48810%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48809-cwe-1037-processor-optimization-rem-0167ab15</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48809%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48808-cwe-200-exposure-of-sensitive-infor-099be242</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48808%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48806-cwe-416-use-after-free-in-microsoft-8df8db53</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48806%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48805-cwe-122-heap-based-buffer-overflow--2dee5d1c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48805%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48804-cwe-349-acceptance-of-extraneous-un-25f70721</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48804%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48803-cwe-353-missing-support-for-integri-a18de237</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48803%3A%20CWE-353%3A%20Missing%20Support%20for%20Integrity%20Check%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48802-cwe-295-improper-certificate-valida-e525e3c1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48802%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48800-cwe-693-protection-mechanism-failur-09410087</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48800%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48799-cwe-59-improper-link-resolution-bef-2fb6583a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48799%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48003-cwe-693-protection-mechanism-failur-4c5180dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48003%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48002-cwe-190-integer-overflow-or-wraparo-5ca2d22b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48002%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48001-cwe-367-time-of-check-time-of-use-t-1507a11c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48001%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48000-cwe-416-use-after-free-in-microsoft-9d8c4b55</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48000%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d46f40f0eb72f91b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47998-cwe-122-heap-based-buffer-overflow--84e65615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47998%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d46f40f0eb72f91b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47996-cwe-191-integer-underflow-wrap-or-w-151192e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47996%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d46f40f0eb72f91b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47982-cwe-20-improper-input-validation-in-969b361a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47982%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d36f40f0eb72f91b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47981-cwe-122-heap-based-buffer-overflow--a0c0da81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47981%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=686d50d36f40f0eb72f91b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47980-cwe-200-exposure-of-sensitive-infor-f9bc52e7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47980%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d36f40f0eb72f91b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47978-cwe-125-out-of-bounds-read-in-micro-b83666ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47978%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=686d50d36f40f0eb72f91b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47975-cwe-415-double-free-in-microsoft-wi-d2789d6c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47975%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47973-cwe-126-buffer-over-read-in-microso-ae8b1b0f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47973%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49760-cwe-73-external-control-of-file-nam-25a576e8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49760%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=686d50d86f40f0eb72f91cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49756-cwe-327-use-of-a-broken-or-risky-cr-f6afbfb8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49756%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=low&amp;id=686d50d86f40f0eb72f91cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49753-cwe-122-heap-based-buffer-overflow--ef6fc8f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49753%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d86f40f0eb72f91cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47178-cwe-89-improper-neutralization-of-s-2e29280f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47178%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=high&amp;id=686d50d36f40f0eb72f91aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49735-cwe-416-use-after-free-in-microsoft-dc53467c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=686d50d76f40f0eb72f91cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49731-cwe-280-improper-handling-of-insuff-f2f74a84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49731%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Microsoft%20Teams%20for%20Android&amp;severity=low&amp;id=686d50d76f40f0eb72f91caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49726-cwe-416-use-after-free-in-microsoft-cc4bb3eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49726%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d76f40f0eb72f91c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49723-cwe-862-missing-authorization-in-mi-b12b72f6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49723%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d76f40f0eb72f91c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49721-cwe-122-heap-based-buffer-overflow--0a1d0cc3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49721%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d76f40f0eb72f91c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49719-cwe-20-improper-input-validation-in-09f65677</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49719%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SQL%20Server%202016%20for%20Service%20Pack%202%20(GDR)&amp;severity=high&amp;id=686d50d76f40f0eb72f91c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49717-cwe-122-heap-based-buffer-overflow--82012ebc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49717%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2032)&amp;severity=high&amp;id=686d50d76f40f0eb72f91c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49716-cwe-400-uncontrolled-resource-consu-f523a981</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49716%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d76f40f0eb72f91c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49711-cwe-416-use-after-free-in-microsoft-1260a61b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49711%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d76f40f0eb72f91c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48812-cwe-125-out-of-bounds-read-in-micro-04ca545b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=686d50d46f40f0eb72f91b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47994-cwe-502-deserialization-of-untruste-718ff89e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47994%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=686d50d46f40f0eb72f91b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47993-cwe-284-improper-access-control-in--88c6cc29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47993%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=686d50d46f40f0eb72f91b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47991-cwe-416-use-after-free-in-microsoft-ceb5507b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47991%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=686d50d36f40f0eb72f91b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49694-cwe-476-null-pointer-dereference-in-3ec38ad4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49694%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49691-cwe-122-heap-based-buffer-overflow--c424c637</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49691%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49690-cwe-362-concurrent-execution-using--64c2cc1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49690%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=686d50d66f40f0eb72f91c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49689-cwe-190-integer-overflow-or-wraparo-1af75000</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49689%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49688-cwe-415-double-free-in-microsoft-wi-10379cd3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49688%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=686d50d66f40f0eb72f91c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49687-cwe-125-out-of-bounds-read-in-micro-e4dcc613</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49687%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49686-cwe-476-null-pointer-dereference-in-1806e36b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49686%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d66f40f0eb72f91c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49677-cwe-416-use-after-free-in-microsoft-deafa7b5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49677%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=686d50d66f40f0eb72f91bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49676-cwe-122-heap-based-buffer-overflow--943f90af</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49676%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d66f40f0eb72f91bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49674-cwe-122-heap-based-buffer-overflow--c57cc473</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49674%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49672-cwe-122-heap-based-buffer-overflow--f2573d23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49672%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49671-cwe-200-exposure-of-sensitive-infor-60d58aba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49671%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=686d50d56f40f0eb72f91be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49670-cwe-122-heap-based-buffer-overflow--6ec7bbd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49670%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49661-cwe-822-untrusted-pointer-dereferen-c5df33fe</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49661%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d56f40f0eb72f91bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49658-cwe-125-out-of-bounds-read-in-micro-ddbac7ec</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49658%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=686d50d56f40f0eb72f91bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49657-cwe-122-heap-based-buffer-overflow--6d639acf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49657%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48824-cwe-122-heap-based-buffer-overflow--e136e176</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48824%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=686d50d56f40f0eb72f91bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47987-cwe-122-heap-based-buffer-overflow--8e371afb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47987%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53513-cwe-24-path-traversal-filedir-in-ca-6c8cf16b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53513%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Canonical%20Juju&amp;severity=high&amp;id=686d50d86f40f0eb72f91cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47986-cwe-416-use-after-free-in-microsoft-573a4ed7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47986%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47985-cwe-822-untrusted-pointer-dereferen-7de0ef05</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47985%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47984-cwe-693-protection-mechanism-failur-08bd15a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47984%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47976-cwe-416-use-after-free-in-microsoft-6e3a08e2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47976%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47972-cwe-362-concurrent-execution-using--8cfbd667</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47972%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47971-cwe-126-buffer-over-read-in-microso-07a6a0d3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47971%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21195-cwe-59-improper-link-resolution-bef-2ba204b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21195%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Service%20Fabric&amp;severity=medium&amp;id=686d50d36f40f0eb72f91ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47159-cwe-693-protection-mechanism-failur-be9c5f9b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47159%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=686d50d36f40f0eb72f91aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33054-cwe-357-insufficient-ui-warning-of--ae2f3360</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33054%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=686d50d36f40f0eb72f91ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26636-cwe-1037-processor-optimization-rem-dfea23f4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26636%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=686d50d36f40f0eb72f91ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36350-cwe-1421-exposure-of-sensitive-info-f2870ef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36350%3A%20CWE-1421%20%20Exposure%20of%20Sensitive%20Information%20in%20Shared%20Microarchitectural%20Structures%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Series%20Processors&amp;severity=medium&amp;id=6908ed741c2a0078ae51025d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/18-malicious-chrome-and-edge-extensions-disguise-a-9fe1380d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=18%20Malicious%20Chrome%20and%20Edge%20Extensions%20Disguise%20as%20Everyday%20Tools&amp;severity=high&amp;id=686d4d446f40f0eb72f90c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-malware-anatsa-infiltrates-google-play-to--acd13494</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20malware%20Anatsa%20infiltrates%20Google%20Play%20to%20target%20US%20banks&amp;severity=high&amp;id=686d4d446f40f0eb72f90c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53512-cwe-200-exposure-of-sensitive-infor-321030f3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53512%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Canonical%20Juju&amp;severity=medium&amp;id=686d50d86f40f0eb72f91cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36348-cwe-1420-exposure-of-sensitive-info-fffafc0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36348%3A%20CWE-1420%20%20Exposure%20of%20Sensitive%20Information%20during%20Transient%20Execution%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=low&amp;id=690a6f039e609817bf702c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21168-out-of-bounds-read-cwe-125-in-adobe-37359ed0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21168%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=686d4d676f40f0eb72f90cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21165-out-of-bounds-write-cwe-787-in-adob-53b345c0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21165%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=686d4d676f40f0eb72f90cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21166-out-of-bounds-write-cwe-787-in-adob-27110944</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21166%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=686d4d676f40f0eb72f90cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21167-out-of-bounds-read-cwe-125-in-adobe-6ffc8611</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21167%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=medium&amp;id=686d4d676f40f0eb72f90cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21164-out-of-bounds-write-cwe-787-in-adob-a14ea464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21164%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=686d4d676f40f0eb72f90cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7186-sql-injection-in-code-projects-chat--35d12e5d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7186%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=686d49c06f40f0eb72f89399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43580-access-of-memory-location-after-end-4e079706</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43580%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=686d49c06f40f0eb72f89390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43587-out-of-bounds-read-cwe-125-in-adobe-90228550</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43587%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=686d49c06f40f0eb72f89393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47109-null-pointer-dereference-cwe-476-in-b2b1391d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47109%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=686d49c06f40f0eb72f89396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/privilege-escalation-using-tpqmassistantexe-on-len-f976423b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Privilege%20Escalation%20Using%20TPQMAssistant.exe%20on%20Lenovo&amp;severity=medium&amp;id=686d46466f40f0eb72f868ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-for-post-quantum-cryptographic-support-abe0389b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20for%20Post-Quantum%20Cryptographic%20Support&amp;severity=medium&amp;id=686d46466f40f0eb72f868f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3648-cwe-1220-insufficient-granularity-of-a6002366</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3648%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20ServiceNow%20Now%20Platform&amp;severity=high&amp;id=686d42bf6f40f0eb72f85c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7185-sql-injection-in-code-projects-libra-5074240f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7185%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d42bf6f40f0eb72f85c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitchat-mitm-flaw-fc8d6f9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitchat%20MITM%20Flaw&amp;severity=medium&amp;id=686d3f446f40f0eb72f82b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6771-cwe-78-improper-neutralization-of-sp-3040ef58</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6771%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=686d3f3d6f40f0eb72f82b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0292-cwe-918-server-side-request-forgery--5e2b7932</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0292%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0293-cwe-93-improper-neutralization-of-cr-179872fa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0293%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5464-cwe-532-insertion-of-sensitive-infor-b2397e05</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5464%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7184-sql-injection-in-code-projects-libra-9ad4f277</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7184%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43019-cwe-269-improper-privilege-manageme-05cbd1a3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43019%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20HP%20Inc.%20HP%20Support%20Assistant&amp;severity=medium&amp;id=686d3bb16f40f0eb72f81bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6770-cwe-78-improper-neutralization-of-sp-cb3b4242</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6770%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=686d34a96f40f0eb72f7c5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5463-cwe-532-insertion-of-sensitive-infor-bdc5a44d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5463%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53545-cwe-287-improper-authentication-in--b9adabe5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53545%3A%20CWE-287%3A%20Improper%20Authentication%20in%20frappe%20press&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7183-sql-injection-in-campcodes-sales-and-68eb4d21</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7183%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5451-cwe-121-stack-based-buffer-overflow--ba647dbd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5451%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2827-cwe-548-exposure-of-information-thro-ff9c7b85</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2827%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20Sterling%20File%20Gateway&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5450-cwe-602-client-side-enforcement-of-s-df22cc33</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5450%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Ivanti%20Connect%20Secure&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2793-cwe-79-improper-neutralization-of-in-68104566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2793%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53480-cwe-79-improper-neutralization-of-i-8c3291db</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53480%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CheckUser%20extension&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7037-cwe-89-improper-neutralization-of-sp-c97319c5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7037%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=686d34a96f40f0eb72f7c5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53372-cwe-77-improper-neutralization-of-s-e6caf41c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53372%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20alfonsograziano%20node-code-sandbox-mcp&amp;severity=high&amp;id=686d34a96f40f0eb72f7c5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3630-cwe-79-improper-neutralization-of-in-5d57ce59</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3630%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=686d34a96f40f0eb72f7c5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6996-cwe-257-storing-passwords-in-a-recov-58484ae0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6996%3A%20CWE-257%20%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=686d31256f40f0eb72f633c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6995-cwe-257-storing-passwords-in-a-recov-c03fdbe6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6995%3A%20CWE-257%20%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=686d31256f40f0eb72f633c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24474-execute-unauthorized-code-or-comman-5281dbdd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24474%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=low&amp;id=686d31256f40f0eb72f633c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7182-cross-site-scripting-in-itsourcecode-06e2e4d5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7182%3A%20Cross%20Site%20Scripting%20in%20itsourcecode%20Student%20Transcript%20Processing%20System&amp;severity=medium&amp;id=686d2da46f40f0eb72f619dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7326-cwe-1390-weak-authentication-in-micr-b1044366</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7326%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20ASP.NET%20Core%206.0&amp;severity=high&amp;id=686d2da46f40f0eb72f619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36600-cwe-1257-improper-access-control-ap-4a9521e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36600%3A%20CWE-1257%3A%20Improper%20Access%20Control%20Applied%20to%20Mirrored%20or%20Aliased%20Memory%20Regions%20in%20Dell%20Client%20Platform%20BIOS&amp;severity=high&amp;id=686d2a1f6f40f0eb72f606b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7181-unrestricted-upload-in-code-projects-f2f360b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7181%3A%20Unrestricted%20Upload%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=686d2a1f6f40f0eb72f606b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7345-out-of-bounds-write-in-red-hat-red-h-699eb78f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7345%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=686d23166f40f0eb72f5d541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7180-sql-injection-in-code-projects-staff-52331607</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7180%3A%20SQL%20Injection%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=686d23166f40f0eb72f5d53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7179-sql-injection-in-code-projects-libra-7d7b0d88</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7179%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686d1c126f40f0eb72f54a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50130-heap-based-buffer-overflow-in-fuji--d6b12e6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50130%3A%20Heap-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20%2F%20Hakko%20Electronics%20Co.%2C%20Ltd.%20V-SFT-6&amp;severity=high&amp;id=686d1c126f40f0eb72f54a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27061-cwe-787-out-of-bounds-write-in-qual-83727a89</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27061%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27058-cwe-120-buffer-copy-without-checkin-00ff7b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27058%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27057-cwe-126-buffer-over-read-in-qualcom-c993401c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27057%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27056-cwe-416-use-after-free-in-qualcomm--db196d06</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27056%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27055-cwe-126-buffer-over-read-in-qualcom-3deb67d0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27055%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15076f40f0eb72f50fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27052-cwe-120-buffer-copy-without-checkin-b2fd8bdf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27052%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27051-cwe-415-double-free-in-qualcomm-inc-7920b32d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27051%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27050-cwe-416-use-after-free-in-qualcomm--1a6605cd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27050%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27047-cwe-416-use-after-free-in-qualcomm--7c0a9609</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27047%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27046-cwe-415-double-free-in-qualcomm-inc-308528f0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27046%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27044-cwe-787-out-of-bounds-write-in-qual-f8943491</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27044%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27043-cwe-120-buffer-copy-without-checkin-6a880f90</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27043%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27042-cwe-131-incorrect-calculation-of-bu-2c767c68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27042%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21466-cwe-416-use-after-free-in-qualcomm--bdafd895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21466%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21454-cwe-126-buffer-over-read-in-qualcom-8170b0da</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21454%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21450-cwe-287-improper-authentication-in--9d64fe37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21450%3A%20CWE-287%20Improper%20Authentication%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=686d15066f40f0eb72f50f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21449-cwe-126-buffer-over-read-in-qualcom-2f74f526</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21449%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21446-cwe-126-buffer-over-read-in-qualcom-843c1d91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21446%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21445-cwe-120-buffer-copy-without-checkin-db35ba05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21445%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21444-cwe-120-buffer-copy-without-checkin-737a90fa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21444%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21433-cwe-476-null-pointer-dereference-in-e7a07b8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21433%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=686d15066f40f0eb72f50f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21432-cwe-415-double-free-in-qualcomm-inc-ecfc8e35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21432%3A%20CWE-415%20Double%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21427-cwe-126-buffer-over-read-in-qualcom-01a2e7be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21427%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21426-cwe-120-buffer-copy-without-checkin-712c5230</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21426%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=686d15066f40f0eb72f50f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21422-cwe-310-cryptographic-issues-in-qua-539d8622</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21422%3A%20CWE-310%20Cryptographic%20Issues%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=686d15066f40f0eb72f50f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lateral-movement-with-code-execution-in-the-contex-5fc996de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lateral%20Movement%20with%20code%20execution%20in%20the%20context%20of%20active%20user%20sessions&amp;severity=medium&amp;id=686d150e6f40f0eb72f51013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-attack-on-tls-opossum-attack-86832479</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Attack%20on%20TLS%3A%20Opossum%20attack&amp;severity=medium&amp;id=686d150e6f40f0eb72f51017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7178-sql-injection-in-code-projects-food--4a8881c1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7178%3A%20SQL%20Injection%20in%20code-projects%20Food%20Distributor%20Site&amp;severity=medium&amp;id=686d11806f40f0eb72f5009d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kernel-double-free-to-lpe-b159d838</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20kernel%20double-free%20to%20LPE&amp;severity=critical&amp;id=686d0e026f40f0eb72f4da66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/infostealers-as-a-service-push-identity-hacks-to-r-10b796a5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Infostealers-as-a-Service%20Push%20Identity%20Hacks%20to%20Record%20Highs%2C%20Report&amp;severity=medium&amp;id=686d0a7d6f40f0eb72f4af2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-uncover-batavia-windows-spyware-steali-5b837b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Uncover%20Batavia%20Windows%20Spyware%20Stealing%20Documents%20from%20Russian%20Firms&amp;severity=high&amp;id=686d0a7c6f40f0eb72f4af11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7177-sql-injection-in-phpgurukul-car-wash-975f7abc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7177%3A%20SQL%20Injection%20in%20PHPGurukul%20Car%20Washing%20Management%20System&amp;severity=medium&amp;id=686d0abd6f40f0eb72f4bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40721-cwe-79-improper-neutralization-of-i-583a02b7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06c36f40f0eb72f44472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40720-cwe-79-improper-neutralization-of-i-257c7b72</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06b86f40f0eb72f4444b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40719-cwe-79-improper-neutralization-of-i-4218b154</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06b16f40f0eb72f44421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40718-cwe-209-generation-of-error-message-119060ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40718%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=medium&amp;id=686d06a06f40f0eb72f443f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40717-cwe-89-improper-neutralization-of-s-405a9bec</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40717%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d07b16f40f0eb72f4487c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40716-cwe-89-improper-neutralization-of-s-64257c05</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40716%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d071a6f40f0eb72f4458c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40715-cwe-89-improper-neutralization-of-s-1e23514c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40715%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d07116f40f0eb72f44551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40714-cwe-89-improper-neutralization-of-s-7d1b5f91</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d07016f40f0eb72f44513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40713-cwe-89-improper-neutralization-of-s-b08cc042</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40713%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d06ce6f40f0eb72f444db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40712-cwe-89-improper-neutralization-of-s-5f93061a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40712%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d06cc6f40f0eb72f444ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40711-cwe-89-improper-neutralization-of-s-74bafbc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40711%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quiter%20Quiter%20Gateway%20(Java%20WAR%20on%20Apache%20Tomcat)&amp;severity=critical&amp;id=686d06c86f40f0eb72f44499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7176-sql-injection-in-phpgurukul-hospital-642ecd31</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7176%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=686d07b46f40f0eb72f4489f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shellcode-execution-using-messagebox-dialog-076f8af0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shellcode%20execution%20using%20MessageBox%20Dialog&amp;severity=medium&amp;id=686cfff16f40f0eb72f42822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7175-unrestricted-upload-in-code-projects-3373f8de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7175%3A%20Unrestricted%20Upload%20in%20code-projects%20E-Commerce%20Site&amp;severity=medium&amp;id=686cffec6f40f0eb72f4280c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41224-cwe-693-protection-mechanism-failur-d07d3521</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41224%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Siemens%20RUGGEDCOM%20RMC8388%20V5.X&amp;severity=high&amp;id=686cf5646f40f0eb72f3f62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41223-cwe-327-use-of-a-broken-or-risky-cr-713bdc2d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41223%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41222-cwe-755-improper-handling-of-except-201b69eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41222%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40742-cwe-598-use-of-get-request-method-w-bdd37dff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40742%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40741-cwe-121-stack-based-buffer-overflow-1c9ded5e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40741%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=686cf5646f40f0eb72f3f61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40740-cwe-125-out-of-bounds-read-in-sieme-77583167</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40740%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=686cf5646f40f0eb72f3f61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40739-cwe-125-out-of-bounds-read-in-sieme-a551d2ab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40739%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2025&amp;severity=high&amp;id=686cf5646f40f0eb72f3f618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40738-cwe-22-improper-limitation-of-a-pat-b3097ced</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40738%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=686cf5646f40f0eb72f3f615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40737-cwe-22-improper-limitation-of-a-pat-623825a7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40737%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=686cf5646f40f0eb72f3f612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40736-cwe-306-missing-authentication-for--f904ba84</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40736%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20SINEC%20NMS&amp;severity=critical&amp;id=686cf5646f40f0eb72f3f60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40735-cwe-89-improper-neutralization-of-s-bae8e693</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40735%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=686cf5646f40f0eb72f3f602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40593-cwe-20-improper-input-validation-in-8d837881</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40593%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20CN%204100&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21009-cwe-125-out-of-bounds-read-in-samsu-78d6d256</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21009%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21008-cwe-125-out-of-bounds-read-in-samsu-20e95a3c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21008%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21007-cwe-787-out-of-bounds-write-in-sams-a48d6a91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21007%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21006-cwe-787-out-of-bounds-write-in-sams-d6dfacbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21006%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavsvc.so&amp;severity=high&amp;id=686cf5646f40f0eb72f3f5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21005-cwe-284-improper-access-control-in--c3ffe447</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21005%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20isemtelephony&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21004-cwe-284-improper-access-control-in--9d5ffb75</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21004%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21003-cwe-922-insecure-storage-of-sensiti-79bdbe5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21003%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21002-cwe-284-improper-access-control-in--495ddce8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21002%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27127-cwe-434-unrestricted-upload-of-file-c325491b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27127%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Siemens%20TIA%20Project-Server&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21001-cwe-284-improper-access-control-in--1adb4ad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21001%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23365-cwe-284-improper-access-control-in--f35b9d3b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23365%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20TIA%20Administrator&amp;severity=high&amp;id=686cf5646f40f0eb72f3f5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21000-cwe-269-improper-privilege-manageme-df05a5f7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21000%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20999-cwe-285-improper-authorization-in-s-3d80dbe8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20999%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23364-cwe-347-improper-verification-of-cr-559a05f2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23364%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20TIA%20Administrator&amp;severity=medium&amp;id=686cf5646f40f0eb72f3f5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20998-cwe-284-improper-access-control-in--9517c61a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20998%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20997-cwe-276-incorrect-default-permissio-ca02c93e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20997%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20983-cwe-787-out-of-bounds-write-in-sams-215176a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20983%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20982-cwe-787-out-of-bounds-write-in-sams-e5ec8948</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20982%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=686cf5636f40f0eb72f3f5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52236-cwe-327-use-of-a-broken-or-risky-cr-7de22062</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52236%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=high&amp;id=68ee16327eab8b438c025da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7174-sql-injection-in-code-projects-libra-4eb1c7f8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7174%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686cf5656f40f0eb72f3f637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32461-tiki-wiki-cms-groupware-283-two-sst-55e1a61c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCVE-2025-32461%5D%20Tiki%20Wiki%20CMS%20Groupware%20%3C%3D%2028.3%20Two%20SSTI%20Vulnerabilities&amp;severity=medium&amp;id=686cee5b6f40f0eb72f3c520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7173-sql-injection-in-code-projects-libra-6b4c5741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7173%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686cee576f40f0eb72f3c510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/alleged-chinese-hacker-tied-to-silk-typhoon-arrest-4c8df30b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Alleged%20Chinese%20hacker%20tied%20to%20Silk%20Typhoon%20arrested%20for%20cyberespionage&amp;severity=high&amp;id=686ce74e6f40f0eb72f2e5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7172-sql-injection-in-code-projects-crime-169db292</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7172%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686ce78b6f40f0eb72f2e6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tag-140-targets-indian-government-via-clickfix-sty-7502df3f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TAG-140%20Targets%20Indian%20Government%20Via%20&apos;ClickFix-Style&apos;%20Lure&amp;severity=high&amp;id=686ce74e6f40f0eb72f2e5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-adds-four-critical-vulnerabilities-to-kev-cat-b994b620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Adds%20Four%20Critical%20Vulnerabilities%20to%20KEV%20Catalog%20Due%20to%20Active%20Exploitation&amp;severity=critical&amp;id=686ce74e6f40f0eb72f2e5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-bert-ransomware-group-strikes-globally-with-mu-6ba3dc4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Bert%20Ransomware%20Group%20Strikes%20Globally%20with%20Multiple%20Variants&amp;severity=high&amp;id=686ce74e6f40f0eb72f2e5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6744-cwe-94-improper-control-of-generatio-03510591</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6744%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xTemos%20Woodmart&amp;severity=high&amp;id=686ce78b6f40f0eb72f2e6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistans-apt36-transparent-tribe-targets-indian-d-24611a7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan%E2%80%99s%20APT36%20Transparent%20Tribe%20Targets%20Indian%20Defense%20Sector%20with%20New%20Linux%20Malware&amp;severity=medium&amp;id=686ce3c86f40f0eb72f2db56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7171-sql-injection-in-code-projects-crime-0db8ae2e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7171%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686ce3d66f40f0eb72f2db74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7170-sql-injection-in-code-projects-crime-54997de6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7170%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686cdcc16f40f0eb72f2b65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-windows-net-quirks-and-unicode-normalizati-7257f710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Windows%2C%20.NET%20quirks%2C%20and%20Unicode%20Normalization%20to%20exploit%20DNN%20(DotNetNuke)&amp;severity=high&amp;id=686cd23a6f40f0eb72f28512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7169-sql-injection-in-code-projects-crime-f93a3d37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7169%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686cd5b96f40f0eb72f29673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7168-sql-injection-in-code-projects-crime-ec73b0e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7168%3A%20SQL%20Injection%20in%20code-projects%20Crime%20Reporting%20System&amp;severity=medium&amp;id=686ccb2c6f40f0eb72f266aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41668-cwe-59-improper-link-resolution-bef-f7f55d33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41668%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=high&amp;id=686cc7a96f40f0eb72f25244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41667-cwe-59-improper-link-resolution-bef-3210f2f4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41667%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=high&amp;id=686cc7a96f40f0eb72f25241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41666-cwe-59-improper-link-resolution-bef-fe2d4c48</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41666%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=high&amp;id=686cc7a96f40f0eb72f2523e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41665-cwe-276-incorrect-default-permissio-e0b55166</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41665%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20PHOENIX%20CONTACT%20AXC%20F%201152&amp;severity=medium&amp;id=686cc7a96f40f0eb72f2523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7167-sql-injection-in-code-projects-respo-1c6eb0e6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7167%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Blog%20Site&amp;severity=medium&amp;id=686cc7a96f40f0eb72f25247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25271-cwe-1188-insecure-default-initializ-79eb908b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25271%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc7a96f40f0eb72f25238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25270-cwe-913-improper-control-of-dynamic-8387fcd3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25270%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=critical&amp;id=686cc7a96f40f0eb72f25235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25269-cwe-78-improper-neutralization-of-s-85d9a574</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25269%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f2426d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25268-cwe-306-missing-authentication-for--504a7344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25268%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f2426a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24006-cwe-269-improper-privilege-manageme-31b54ca7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24006%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f24267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24005-cwe-20-improper-input-validation-in-fd968cda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24005%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f24264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24004-cwe-120-buffer-copy-without-checkin-f9269474</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24004%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=medium&amp;id=686cc4256f40f0eb72f24261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24003-cwe-120-buffer-copy-without-checkin-2c36e1ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24003%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=high&amp;id=686cc4256f40f0eb72f2425e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24002-cwe-20-improper-input-validation-in-c4c982f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24002%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Phoenix%20Contact%20CHARX%20SEC-3150&amp;severity=medium&amp;id=686cc4256f40f0eb72f2425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42956-cwe-79-improper-neutralization-of-i-9bc147d9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=686cc4256f40f0eb72f24270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6746-cwe-98-improper-control-of-filename--987d9f3c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6746%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xTemos%20Woodmart&amp;severity=high&amp;id=686cc0a16f40f0eb72f236e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6743-cwe-79-improper-neutralization-of-in-8123c289</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=686cc0a16f40f0eb72f236dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7166-sql-injection-in-code-projects-respo-a91b64ab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7166%3A%20SQL%20Injection%20in%20code-projects%20Responsive%20Blog%20Site&amp;severity=medium&amp;id=686cc0a16f40f0eb72f236e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7165-sql-injection-in-phpgurukul-cyber-ca-0e289db5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7165%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=686cb99b6f40f0eb72f1d739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7164-sql-injection-in-phpgurukul-cyber-ca-2be92a35</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7164%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=686caf0c6f40f0eb72f19af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7327-cwe-98-improper-control-of-filename--ee3278cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7327%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20techlabpro1%20Widget%20for%20Google%20Reviews&amp;severity=high&amp;id=686caf0d6f40f0eb72f19af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7163-sql-injection-in-phpgurukul-zoo-mana-08c84fc5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7163%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686ca8156f40f0eb72f17afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7162-sql-injection-in-phpgurukul-zoo-mana-0997355e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7162%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686ca0fc6f40f0eb72f14ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5957-cwe-862-missing-authorization-in-rca-6b1967cb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5957%3A%20CWE-862%20Missing%20Authorization%20in%20rcatheme%20Guest%20Support%20%E2%80%93%20Complete%20customer%20support%20ticket%20system%20for%20WordPress&amp;severity=medium&amp;id=686ca0fc6f40f0eb72f14b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5537-cwe-79-improper-neutralization-of-in-e6ee9f42</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20Lightbox%20%26%20Modal%20Popup%20WordPress%20Plugin%20%E2%80%93%20FooBox&amp;severity=medium&amp;id=686ca0fc6f40f0eb72f14b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7161-sql-injection-in-phpgurukul-zoo-mana-10b67bf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7161%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c99f56f40f0eb72f12340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7160-sql-injection-in-phpgurukul-zoo-mana-b63c6c78</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7160%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c92ec6f40f0eb72f0e554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7159-sql-injection-in-phpgurukul-zoo-mana-d7590e65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7159%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c8beb6f40f0eb72f05aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7158-sql-injection-in-phpgurukul-zoo-mana-cc8d6dbd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7158%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=686c8beb6f40f0eb72f05a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7157-sql-injection-in-code-projects-onlin-d1a0621e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7157%3A%20SQL%20Injection%20in%20code-projects%20Online%20Note%20Sharing&amp;severity=medium&amp;id=686c84de6f40f0eb72f00042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20695-cwe-124-buffer-underflow-in-mediate-4d0ee09d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20695%3A%20CWE-124%20Buffer%20Underflow%20in%20MediaTek%2C%20Inc.%20MT6639%2C%20MT6653%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT7925%2C%20MT7927%2C%20MT8196%2C%20MT8678%2C%20MT8796&amp;severity=medium&amp;id=686c84de6f40f0eb72f00037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20694-cwe-124-buffer-underflow-in-mediate-fa28ae5e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20694%3A%20CWE-124%20Buffer%20Underflow%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6639%2C%20MT6653%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT7925%2C%20MT7927%2C%20MT8113%2C%20MT8115%2C%20MT8127%2C%20MT8163%2C%20MT8168%2C%20MT8169%2C%20MT8173%2C%20MT8183%2C%20MT8186%2C%20MT8188%2C%20MT8195%2C%20MT8196%2C%20MT8370%2C%20MT8390%2C%20MT8391%2C%20MT8395%2C%20MT8512%2C%20MT8516%2C%20MT8519%2C%20MT8676%2C%20MT8678%2C%20MT8695%2C%20MT8696%2C%20MT8698%2C%20MT8786%2C%20MT8792%2C%20MT8796%2C%20MT8893&amp;severity=medium&amp;id=686c84de6f40f0eb72f00034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20693-cwe-125-out-of-bounds-read-in-media-6fdb833c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20693%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6899%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT6991%2C%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7923%2C%20MT7925%2C%20MT7927%2C%20MT7932%2C%20MT8196%2C%20MT8678%2C%20MT8796%2C%20MT8893&amp;severity=medium&amp;id=686c84de6f40f0eb72f00031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20692-cwe-125-out-of-bounds-read-in-media-5bf86188</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20692%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84de6f40f0eb72f0002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20691-cwe-125-out-of-bounds-read-in-media-cd1feace</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20691%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84de6f40f0eb72f0002b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20690-cwe-125-out-of-bounds-read-in-media-2bf2a370</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20690%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84de6f40f0eb72f00028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20689-cwe-125-out-of-bounds-read-in-media-25a24f39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20689%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84dd6f40f0eb72f0001b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20688-cwe-125-out-of-bounds-read-in-media-2deffd36</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20688%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=medium&amp;id=686c84dd6f40f0eb72f00018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20687-cwe-125-out-of-bounds-read-in-media-37f39694</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20687%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=686c84dd6f40f0eb72f00015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20686-cwe-122-heap-overflow-in-mediatek-i-2e97569f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20686%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=686c84dd6f40f0eb72f00012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20685-cwe-122-heap-overflow-in-mediatek-i-2da7fbce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20685%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=high&amp;id=686c84dd6f40f0eb72f0000f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20684-cwe-787-out-of-bounds-write-in-medi-a99bcc5d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20684%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT7615%2C%20MT7622%2C%20MT7663&amp;severity=critical&amp;id=686c84dd6f40f0eb72f0000c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20683-cwe-787-out-of-bounds-write-in-medi-5ea5b8ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20683%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20682-cwe-787-out-of-bounds-write-in-medi-8aaf7e12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20682%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20681-cwe-787-out-of-bounds-write-in-medi-7479fdea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20681%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7615%2C%20MT7622%2C%20MT7663%2C%20MT7915&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20680-cwe-122-heap-overflow-in-mediatek-i-b62878bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20680%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7920%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=critical&amp;id=686c84dd6f40f0eb72f00000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/offline-blockchain-governance-with-qrusb-sync-this-af59d1d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Offline%20blockchain%20governance%20with%20QR%2FUSB%20sync%3F%20This%20project%20seems%20like%20it%E2%80%99s%20thinking%20about%20failure%20modes%E2%80%A6&amp;severity=medium&amp;id=686c7dd86f40f0eb72efcdd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5570-cwe-79-improper-neutralization-of-in-c068b966</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigroumeow%20AI%20Engine&amp;severity=medium&amp;id=686c84de6f40f0eb72f0003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6244-cwe-79-improper-neutralization-of-in-47683e44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6244%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20%26%20Widgets&amp;severity=medium&amp;id=686c84de6f40f0eb72f0003e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7156-sql-injection-in-hitsz-ids-airda-6b6f1d16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7156%3A%20SQL%20Injection%20in%20hitsz-ids%20airda&amp;severity=medium&amp;id=686c7a506f40f0eb72efae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7146-cwe-23-relative-path-traversal-in-jh-e602d7bc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7146%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Jhenggao%20iPublish%20System&amp;severity=high&amp;id=686c7a506f40f0eb72efae60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7155-sql-injection-in-phpgurukul-online-n-048e0751</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7155%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Notes%20Sharing%20System&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-hardens-windows-11-against-file-junction-bc7563c0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20hardens%20Windows%2011%20against%20file%20junction%20attacks&amp;severity=medium&amp;id=686c6c436f40f0eb72eee3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43001-cwe-266-incorrect-privilege-assignm-14986fe6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43001%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42992-cwe-266-incorrect-privilege-assignm-1dbd7d6b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42992%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42986-cwe-862-missing-authorization-in-sa-7347819b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42986%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform&amp;severity=medium&amp;id=686c6fc56f40f0eb72ef2e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42985-cwe-601-url-redirection-to-untruste-2d4786f6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42985%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20BusinessObjects%20Content%20Administrator%20workbench&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42981-cwe-601-url-redirection-to-untruste-de323774</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42981%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42980-cwe-502-deserialization-of-untruste-7b67491f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42980%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Federated%20Portal%20Network&amp;severity=critical&amp;id=686c68cd6f40f0eb72eec68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42979-cwe-922-insecure-storage-of-sensiti-d2c67f1b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42979%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42978-cwe-940-improper-verification-of-so-3115fc6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42978%3A%20CWE-940%3A%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20Java&amp;severity=low&amp;id=686c68cd6f40f0eb72eec675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42974-cwe-862-missing-authorization-in-sa-2b67f6eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42974%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20and%20ABAP%20Platform%20(SDCCN)&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42973-cwe-79-improper-neutralization-of-i-4bc6a913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42973%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Data%20Services%20(DQ%20Report)&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42971-cwe-787-out-of-bounds-write-in-saps-8e54e664</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42971%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42970-cwe-22-improper-limitation-of-a-pat-0142f41d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42970%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAPCAR&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42969-cwe-79-improper-neutralization-of-i-6e5f5752</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42969%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42968-cwe-862-missing-authorization-in-sa-3fea0f59</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42968%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20(RFC%20enabled%20function%20module)&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42967-cwe-94-improper-control-of-generati-b43bcf57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42967%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20and%20SAP%20SCM%20(Characteristic%20Propagation)&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42966-cwe-502-deserialization-of-untruste-a89f121e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42966%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(XML%20Data%20Archiving%20Service)&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42965-cwe-918-server-side-request-forgery-8a1b0b5d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42965%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20BusinessObjects%20BI%20Platform%20Central%20Management%20Console%20Promotion%20Management%20Application&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42964-cwe-502-deserialization-of-untruste-e4f83d11</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42964%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Enterprise%20Portal%20Administration&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42963-cwe-502-deserialization-of-untruste-4d453177</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42963%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20Java%20(Log%20Viewer%20)&amp;severity=critical&amp;id=686c68cc6f40f0eb72eec63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42962-cwe-79-improper-neutralization-of-i-7693f519</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42962%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Business%20Warehouse%20(Business%20Explorer%20Web%203.5%20loading%20animation)&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42961-cwe-862-missing-authorization-in-sa-c638fb3f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42961%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42960-cwe-862-missing-authorization-in-sa-2247186b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42960%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20and%20SAP%20BW%2F4HANA%20BEx%20Tools&amp;severity=medium&amp;id=686c68cc6f40f0eb72eec633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42959-cwe-308-use-of-single-factor-authen-fe11f3ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42959%3A%20CWE-308%3A%20Use%20of%20Single-factor%20Authentication%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Server%20and%20ABAP%20Platform&amp;severity=high&amp;id=686c68cc6f40f0eb72eec62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42954-cwe-835-loop-with-unreachable-exit--b93d5bf9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42954%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20SAP_SE%20SAP%20NetWeaver%20Business%20Warehouse%20(CCAW%20application)&amp;severity=low&amp;id=686c68cc6f40f0eb72eec625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42953-cwe-862-missing-authorization-in-sa-8312b33c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42953%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=high&amp;id=686c68cc6f40f0eb72eec621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42952-cwe-862-missing-authorization-in-sa-2317786c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42952%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20and%20SAP%20Plug-In%20Basis&amp;severity=high&amp;id=686c68cc6f40f0eb72eec61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31326-cwe-80-improper-neutralization-of-s-5f09b634</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31326%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Web%20Intelligence)&amp;severity=medium&amp;id=686c68cb6f40f0eb72eec619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7154-os-command-injection-in-totolink-n20-dd398d17</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7154%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20N200RE&amp;severity=medium&amp;id=686c68cd6f40f0eb72eec699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7153-cross-site-scripting-in-codeastro-si-742832fe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7153%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Simple%20Hospital%20Management%20System&amp;severity=medium&amp;id=686c61b56f40f0eb72ee1e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-powerpoint-2019-remote-code-execution-rc-21dd435f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20PowerPoint%202019%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=686e74f66f40f0eb72042df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sudo-chroot-1917-local-privilege-escalation-2ee7524e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sudo%20chroot%201.9.17%20-%20Local%20Privilege%20Escalation&amp;severity=high&amp;id=686e74f66f40f0eb72042df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scriptcase-912006-23-remote-command-execution-rce-52c87dbf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ScriptCase%209.12.006%20(23)%20-%20Remote%20Command%20Execution%20(RCE)&amp;severity=critical&amp;id=686e74f66f40f0eb72042ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sudo-1917-host-option-elevation-of-privilege-04b7100c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sudo%201.9.17%20Host%20Option%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=686e74f66f40f0eb72042de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-defender-for-endpoint-mde-elevation-of-p-59f7eaba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Defender%20for%20Endpoint%20(MDE)%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=686e74f66f40f0eb72042de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-outlook-remote-code-execution-rce-3b5f875c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Outlook%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=686e74f66f40f0eb72042dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stacks-mobile-app-builder-523-authentication-bypas-abc4f43a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stacks%20Mobile%20App%20Builder%205.2.3%20-%20Authentication%20Bypass%20via%20Account%20Takeover&amp;severity=medium&amp;id=686e74f66f40f0eb72042dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discourse-32x-anonymous-cache-poisoning-0d46cc40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discourse%203.2.x%20-%20Anonymous%20Cache%20Poisoning&amp;severity=medium&amp;id=686e74f66f40f0eb72042dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-08-d2330d71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-08&amp;severity=medium&amp;id=686db32e6f40f0eb72fcbb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29267-na-77aca87d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29267%3A%20n%2Fa&amp;severity=medium&amp;id=686d2a1f6f40f0eb72f606b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47422-na-25d0cc98</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47422%3A%20n%2Fa&amp;severity=high&amp;id=686d269f6f40f0eb72f5f8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7152-unrestricted-upload-in-campcodes-adv-e54373b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7152%3A%20Unrestricted%20Upload%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c5aac6f40f0eb72edf72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7151-unrestricted-upload-in-campcodes-adv-0e091aa3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7151%3A%20Unrestricted%20Upload%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c53a56f40f0eb72edd2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7150-sql-injection-in-campcodes-advanced--0deba2a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7150%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c4c9d6f40f0eb72ed9790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7149-sql-injection-in-campcodes-advanced--5a16cd49</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7149%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=686c45946f40f0eb72ed5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7148-cross-site-scripting-in-codeastro-si-96f0d3d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7148%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Simple%20Hospital%20Management%20System&amp;severity=medium&amp;id=686c3e8c6f40f0eb72ed2e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7147-sql-injection-in-codeastro-patient-r-21cb71d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7147%3A%20SQL%20Injection%20in%20CodeAstro%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=686c37856f40f0eb72ecd32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7144-cross-site-scripting-in-sourcecodest-980585cf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7144%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c31236f40f0eb72ecba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/seo-poisoning-campaign-targets-8500-smb-users-with-359fbeb0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEO%20Poisoning%20Campaign%20Targets%208%2C500%2B%20SMB%20Users%20with%20Malware%20Disguised%20as%20AI%20Tools&amp;severity=high&amp;id=686c30e46f40f0eb72ecb72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atomic-macos-infostealer-adds-backdoor-for-persist-da485f84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atomic%20macOS%20infostealer%20adds%20backdoor%20for%20persistent%20attacks&amp;severity=high&amp;id=686c30e56f40f0eb72ecb733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/employee-gets-920-for-credentials-used-in-140-mill-66cbdd23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Employee%20gets%20%24920%20for%20credentials%20used%20in%20%24140%20million%20bank%20heist&amp;severity=high&amp;id=686c30e56f40f0eb72ecb738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7143-cross-site-scripting-in-sourcecodest-3aa5df9a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7143%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c2cfb6f40f0eb72eca334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53543-cwe-79-improper-neutralization-of-i-8262a034</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53543%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kestra-io%20kestra&amp;severity=medium&amp;id=686c29786f40f0eb72ec83d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7142-cross-site-scripting-in-sourcecodest-ef9a8198</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7142%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c227b6f40f0eb72ec6078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/att-reaches-177-million-deal-over-2019-and-2024-da-de9a0a98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AT%26T%20Reaches%20%24177%20Million%20Deal%20Over%202019%20and%202024%20Data%20Breaches&amp;severity=medium&amp;id=686c226a6f40f0eb72ec6053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53540-cwe-352-cross-site-request-forgery--07523d78</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53540%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=686c227b6f40f0eb72ec607f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53539-cwe-1333-inefficient-regular-expres-b8a78452</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53539%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20rennf93%20fastapi-guard&amp;severity=medium&amp;id=686c1ee76f40f0eb72ec3eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53496-cwe-79-improper-neutralization-of-i-72b5bf35</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MediaSearch%20Extension&amp;severity=medium&amp;id=686c1ee76f40f0eb72ec3eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7141-cross-site-scripting-in-sourcecodest-21cafb83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7141%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c1b656f40f0eb72ec2c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6044-files-or-directories-accessible-to-e-2c7928ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6044%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=686c1b656f40f0eb72ec2c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53488-cwe-79-improper-neutralization-of-i-e1a2d9d1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiHiero%20Extension&amp;severity=medium&amp;id=686c17de6f40f0eb72ec1765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batavia-windows-spyware-campaign-targets-dozens-of-4994919e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Batavia&apos;%20Windows%20spyware%20campaign%20targets%20dozens%20of%20Russian%20orgs&amp;severity=high&amp;id=686c145a6f40f0eb72eb8936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-is-being-extorted-in-recent-data-theft-cybe-480bb2cd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20is%20being%20extorted%20in%20recent%20data-theft%20cyberattack&amp;severity=high&amp;id=686c145a6f40f0eb72eb893a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53498-cwe-778-insufficient-logging-in-wik-9b700580</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53498%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20AbuseFilter%20Extension&amp;severity=medium&amp;id=686c17de6f40f0eb72ec176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53499-cwe-862-missing-authorization-in-wi-22dae8e1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53499%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20AbuseFilter%20Extension&amp;severity=critical&amp;id=686c17de6f40f0eb72ec1771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7140-cross-site-scripting-in-sourcecodest-cc841da2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7140%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c17de6f40f0eb72ec1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53495-cwe-862-missing-authorization-in-wi-ebf05c71</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53495%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20AbuseFilter%20Extension&amp;severity=critical&amp;id=686c17de6f40f0eb72ec1769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53478-cwe-79-improper-neutralization-of-i-a971b93d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CheckUser%20extension&amp;severity=medium&amp;id=686c14776f40f0eb72eb89c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7139-cross-site-scripting-in-sourcecodest-ff1d8e29</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7139%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c0d526f40f0eb72eb6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53536-cwe-552-files-or-directories-access-1bfed6cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53536%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=686c0d526f40f0eb72eb6690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20322-the-web-application-does-not-or-can-6c446b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20322%3A%20The%20web%20application%20does%20not%2C%20or%20can%20not%2C%20sufficiently%20verify%20whether%20a%20well-formed%2C%20valid%2C%20consistent%20request%20was%20intentionally%20provided%20by%20the%20user%20who%20submitted%20the%20request.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20323-the-software-does-not-restrict-or-i-80e44b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20323%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20321-the-web-application-does-not-or-can-330c1cc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20321%3A%20The%20web%20application%20does%20not%2C%20or%20can%20not%2C%20sufficiently%20verify%20whether%20a%20well-formed%2C%20valid%2C%20consistent%20request%20was%20intentionally%20provided%20by%20the%20user%20who%20submitted%20the%20request.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20325-the-product-exposes-sensitive-infor-6ae27fab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20325%3A%20The%20product%20exposes%20sensitive%20information%20to%20an%20actor%20that%20is%20not%20explicitly%20authorized%20to%20have%20access%20to%20that%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=686c09cf6f40f0eb72eb4a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20319-the-software-constructs-all-or-part-b373c0b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20319%3A%20The%20software%20constructs%20all%20or%20part%20of%20an%20OS%20command%20using%20externally-influenced%20input%20from%20an%20upstream%20component%2C%20but%20it%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20special%20elements%20that%20could%20modify%20the%20intended%20OS%20command%20when%20it%20is%20sent%20to%20a%20downstream%20component.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20324-the-software-does-not-restrict-or-i-a5bf69e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20324%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20320-the-software-uses-external-input-to-a545ade6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20320%3A%20The%20software%20uses%20external%20input%20to%20construct%20a%20pathname%20that%20should%20be%20within%20a%20restricted%20directory%2C%20but%20it%20does%20not%20properly%20neutralize%20&apos;...%2F...%2F%2F&apos;%20(doubled%20triple%20dot%20slash)%20sequences%20that%20can%20resolve%20to%20a%20location%20that%20is%20outside%20of%20that%20directory.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09cf6f40f0eb72eb4a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20300-the-software-performs-an-authorizat-f330815b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20300%3A%20The%20software%20performs%20an%20authorization%20check%20when%20an%20actor%20attempts%20to%20access%20a%20resource%20or%20perform%20an%20action%2C%20but%20it%20does%20not%20correctly%20perform%20the%20check.%20This%20allows%20attackers%20to%20bypass%20intended%20access%20restrictions.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=686c09ce6f40f0eb72eb4a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7138-sql-injection-in-sourcecodester-best-4af28a15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7138%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686c06496f40f0eb72eb3a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-gps-leak-no-one-talked-about-uffizios-silent-e-94a4ff82</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20GPS%20Leak%20No%20One%20Talked%20About%3A%20Uffizio%E2%80%99s%20Silent%20Exposure&amp;severity=medium&amp;id=686c02c96f40f0eb72eb3103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53531-cwe-770-allocation-of-resources-wit-bd481a37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53531%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=686bff426f40f0eb72eb25e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7137-sql-injection-in-sourcecodester-best-7e0b5f39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7137%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686bff426f40f0eb72eb25ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53530-cwe-770-allocation-of-resources-wit-08e8b0ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53530%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=686bff426f40f0eb72eb25e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53529-cwe-89-improper-neutralization-of-s-36601dab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53529%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=686bff426f40f0eb72eb25f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53527-cwe-89-improper-neutralization-of-s-fbd27b89</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53527%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=686bfbbe6f40f0eb72eaa80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1351-cwe-362-concurrent-execution-using-s-1d50adff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1351%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20IBM%20Storage%20Virtualize&amp;severity=medium&amp;id=686bfbbe6f40f0eb72eaa808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53526-cwe-79-improper-neutralization-of-i-55c797ec</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53526%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=686bf83b6f40f0eb72ea9d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7136-sql-injection-in-campcodes-online-re-f6588fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7136%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=686bf83b6f40f0eb72ea9d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53525-cwe-79-improper-neutralization-of-i-3c8eaee2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53525%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=686bf83b6f40f0eb72ea9d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53497-cwe-79-improper-neutralization-of-i-16ec03db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53497%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20RelatedArticles%20Extension&amp;severity=medium&amp;id=686bf83b6f40f0eb72ea9d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53377-cwe-79-improper-neutralization-of-i-c2178717</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53377%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=low&amp;id=686bf4b96f40f0eb72ea6aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53491-cwe-79-improper-neutralization-of-i-773ea350</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20FlaggedRevs%20Extension&amp;severity=medium&amp;id=686bf4b96f40f0eb72ea6abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36014-cwe-94-improper-control-of-generati-4d40d5ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36014%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20Integration%20Bus&amp;severity=high&amp;id=686bf4b96f40f0eb72ea6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-abuse-leaked-shellter-red-team-tool-to-dep-2d7d8bb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20abuse%20leaked%20Shellter%20red%20team%20tool%20to%20deploy%20infostealers&amp;severity=high&amp;id=686bf1306f40f0eb72ea5de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7135-sql-injection-in-campcodes-online-re-2dae394b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7135%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=686bf4b96f40f0eb72ea6aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7259-cwe-843-access-of-resource-using-inc-c226903f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7259%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=686bf1406f40f0eb72ea5fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53373-cwe-640-weak-password-recovery-mech-e51c6904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53373%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20ahmed-elgaml11%20Natours&amp;severity=high&amp;id=686bedae6f40f0eb72ea4e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7134-sql-injection-in-campcodes-online-re-4f79c102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7134%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=686bedae6f40f0eb72ea4e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53487-cwe-79-improper-neutralization-of-i-364115ab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53487%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20ApprovedRevs%20extension&amp;severity=medium&amp;id=686be6aa6f40f0eb72ea2e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7057-cwe-79-improper-neutralization-of-in-d6a20b11</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Quiz%20Extension&amp;severity=medium&amp;id=686be6aa6f40f0eb72ea2e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53486-cwe-79-improper-neutralization-of-i-9ca2bc7a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20WikiCategoryTagCloud%20extension&amp;severity=medium&amp;id=686be34b6f40f0eb72ea2065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7133-cross-site-request-forgery-in-codeas-47dd463b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7133%3A%20Cross-Site%20Request%20Forgery%20in%20CodeAstro%20Online%20Movie%20Ticket%20Booking%20System&amp;severity=medium&amp;id=686be34b6f40f0eb72ea2069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6811-cwe-502-deserialization-of-untrusted-5ecb1f96</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6811%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mescius%20ActiveReports.NET&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6810-cwe-502-deserialization-of-untrusted-9c779ff2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6810%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mescius%20ActiveReports.NET&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6802-cwe-434-unrestricted-upload-of-file--2864ec57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6802%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6806-cwe-22-improper-limitation-of-a-path-ee721f6f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6806%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6807-cwe-22-improper-limitation-of-a-path-41f9acf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6807%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=medium&amp;id=686bdfa06f40f0eb72ea12d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6795-cwe-22-improper-limitation-of-a-path-6c8b1d1f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6795%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=medium&amp;id=686bdfa06f40f0eb72ea12a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6794-cwe-22-improper-limitation-of-a-path-b1cd93ac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6794%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6801-cwe-22-improper-limitation-of-a-path-8bb97a90</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6801%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6800-cwe-22-improper-limitation-of-a-path-674070c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6800%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6799-cwe-22-improper-limitation-of-a-path-94d2ea1b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6799%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6798-cwe-22-improper-limitation-of-a-path-a4e1dbc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6798%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6797-cwe-22-improper-limitation-of-a-path-5e1284fa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6797%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6805-cwe-22-improper-limitation-of-a-path-372d9f4c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6805%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6796-cwe-22-improper-limitation-of-a-path-090dad0d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6796%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6793-cwe-22-improper-limitation-of-a-path-6bab51a7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6793%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=critical&amp;id=686bdfa06f40f0eb72ea12a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6804-cwe-22-improper-limitation-of-a-path-6e0c2224</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6804%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6803-cwe-22-improper-limitation-of-a-path-87b81ab0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6803%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marvell%20QConvergeConsole&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6714-cwe-834-excessive-iteration-in-mongo-70e02df4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6714%3A%20CWE-834%20Excessive%20Iteration%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=686bdfa06f40f0eb72ea12a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6713-cwe-285-improper-authorization-in-mo-af144f21</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6713%3A%20CWE-285%3A%20Improper%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=686bdfa06f40f0eb72ea129d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6712-cwe-400-uncontrolled-resource-consum-49341ce8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6712%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=686bdfa06f40f0eb72ea12e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6711-cwe-532-insertion-of-sensitive-infor-77913592</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6711%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=686bdfa16f40f0eb72ea12ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-i-discovered-a-libpng-vulnerability-11-years-a-2255ef2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20I%20Discovered%20a%20Libpng%20Vulnerability%2011%20Years%20After%20It%20Was%20Patched&amp;severity=medium&amp;id=686bdc1c6f40f0eb72e9f8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7132-sql-injection-in-campcodes-payroll-m-aa7b5a47</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7132%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bdc1a6f40f0eb72e9f8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5987-return-of-wrong-status-code-in-red-h-159e0366</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5987%3A%20Return%20of%20Wrong%20Status%20Code&amp;severity=high&amp;id=686bdc1a6f40f0eb72e9f8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7131-sql-injection-in-campcodes-payroll-m-e667663d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7131%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bd5126f40f0eb72e9c81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7056-cwe-79-improper-neutralization-of-in-c8cc28a3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20UrlShortener%20Extension&amp;severity=medium&amp;id=686bd5126f40f0eb72e9c81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/digging-gold-with-a-spoon-resurgence-of-monero-min-3f5d0810</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Digging%20Gold%20with%20a%20Spoon%20%E2%80%93%20Resurgence%20of%20Monero-mining%20Malware&amp;severity=medium&amp;id=686c37846f40f0eb72ecd2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batavia-spyware-steals-data-from-russian-organizat-494a5c9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Batavia%20spyware%20steals%20data%20from%20Russian%20organizations&amp;severity=medium&amp;id=686c3b086f40f0eb72ecf6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7130-sql-injection-in-campcodes-payroll-m-87622c83</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7130%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bce096f40f0eb72e9561c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/satanlock-ransomware-ends-operations-says-stolen-d-216ddfcf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SatanLock%20Ransomware%20Ends%20Operations%2C%20Says%20Stolen%20Data%20Will%20Be%20Leaked&amp;severity=medium&amp;id=686bca846f40f0eb72e8e778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7129-sql-injection-in-campcodes-payroll-m-782e63ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7129%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bc7006f40f0eb72e8cfc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7128-sql-injection-in-campcodes-payroll-m-c4a9280b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7128%3A%20SQL%20Injection%20in%20Campcodes%20Payroll%20Management%20System&amp;severity=medium&amp;id=686bc37c6f40f0eb72e8a67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6209-cwe-29-path-traversal-filename-in-ru-320877a3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6209%3A%20CWE-29%20Path%20Traversal%3A%20&apos;%5C..%5Cfilename&apos;%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=686bbff86f40f0eb72e88b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7127-sql-injection-in-itsourcecode-employ-5cd0b70e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7127%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=686bbc746f40f0eb72e59460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bert-ransomware-group-targets-asia-and-europe-on-m-c5c69b71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BERT%20Ransomware%20Group%20Targets%20Asia%20and%20Europe%20on%20Multiple%20Platforms&amp;severity=medium&amp;id=686bce096f40f0eb72e955f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7126-sql-injection-in-itsourcecode-employ-850ba3b5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7126%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=686bb1e96f40f0eb72e3c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7125-sql-injection-in-itsourcecode-employ-73322714</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7125%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=686baae16f40f0eb72e3a3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7124-unrestricted-upload-in-code-projects-a1963590</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7124%3A%20Unrestricted%20Upload%20in%20code-projects%20Online%20Note%20Sharing&amp;severity=medium&amp;id=686ba3d86f40f0eb72e38091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7123-sql-injection-in-campcodes-complaint-eac5a7d0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7123%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3467-cwe-79-improper-neutralization-of-in-bd43a1b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20langgenius%2Fdify&amp;severity=high&amp;id=686b9cd16f40f0eb72e2e249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5472-cwe-674-uncontrolled-recursion-in-ru-30f4b7b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5472%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686b9cd26f40f0eb72e2e26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6210-cwe-22-improper-limitation-of-a-path-39e1b220</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6210%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686b9cd26f40f0eb72e2e270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3777-cwe-20-improper-input-validation-in--319fa4fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3777%3A%20CWE-20%20Improper%20Input%20Validation%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=low&amp;id=686b9cd16f40f0eb72e2e24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3466-cwe-1100-insufficient-isolation-of-s-222f14a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3466%3A%20CWE-1100%20Insufficient%20Isolation%20of%20System-Dependent%20Functions%20in%20langgenius%20langgenius%2Fdify&amp;severity=critical&amp;id=686b9cd16f40f0eb72e2e245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6386-cwe-203-observable-discrepancy-in-pa-1b35c718</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6386%3A%20CWE-203%20Observable%20Discrepancy%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=686b9cd26f40f0eb72e2e274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3264-cwe-1333-inefficient-regular-express-402d36be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3264%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3263-cwe-1333-inefficient-regular-express-b975a99a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3263%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3046-cwe-22-improper-limitation-of-a-path-8a7517e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3046%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=686b9cd16f40f0eb72e2e231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3262-cwe-1333-inefficient-regular-express-cbd56a5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3262%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3044-cwe-440-expected-behavior-violation--3f08376a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3044%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686b9cd16f40f0eb72e2e22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3225-cwe-776-improper-restriction-of-recu-619ad06e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3225%3A%20CWE-776%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=686b9cd16f40f0eb72e2e235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43334-improper-neutralization-of-input-du-44740f14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gavias%20Zilom&amp;severity=null&amp;id=69cd746fe6bfc5ba1def789b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4779-cwe-79-improper-neutralization-of-in-889b23d4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=686b9cd26f40f0eb72e2e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7122-sql-injection-in-campcodes-complaint-eb6cb107</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7122%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b95c86f40f0eb72e2c082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3705-cwe-78-improper-neutralization-of-sp-031b7150</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3705%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Frauscher%20FDS102&amp;severity=medium&amp;id=686c06496f40f0eb72eb3a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3626-cwe-78-improper-neutralization-of-sp-bd3458f4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3626%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Frauscher%20FDS102&amp;severity=critical&amp;id=686c09cf6f40f0eb72eb4a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7121-sql-injection-in-campcodes-complaint-b9f9b21b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7121%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b92456f40f0eb72e2b501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7120-sql-injection-in-campcodes-complaint-4eb6000f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7120%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b8b3d6f40f0eb72e22433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-surge-hits-android-adware-trojans-and-cryp-bb562a28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Surge%20Hits%20Android%3A%20Adware%2C%20Trojans%20and%20Crypto%20Theft%20Lead%20Q2%20Threats&amp;severity=medium&amp;id=686b87b76f40f0eb72e1dad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7119-sql-injection-in-campcodes-complaint-e1f8ce1b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7119%3A%20SQL%20Injection%20in%20Campcodes%20Complaint%20Management%20System&amp;severity=medium&amp;id=686b84346f40f0eb72de8095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7118-buffer-overflow-in-utt-hiper-840g-fcf999ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7118%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=686b79a86f40f0eb72ddb59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7117-buffer-overflow-in-utt-hiper-840g-5d7fb2d4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7117%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=686b76246f40f0eb72dd78be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7116-buffer-overflow-in-utt-750w-b27b19c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7116%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=high&amp;id=686b6f1c6f40f0eb72dd3f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41672-cwe-1188-in-wago-wago-device-sphere-1c0a7fa8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41672%3A%20CWE-1188%20in%20WAGO%20Wago%20Device%20Sphere&amp;severity=critical&amp;id=686b6b986f40f0eb72dd2a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7115-missing-authentication-in-rowboatlab-8f663d3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7115%3A%20Missing%20Authentication%20in%20rowboatlabs%20rowboat&amp;severity=medium&amp;id=686b68146f40f0eb72dcbca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7114-missing-authentication-in-simstudioa-29ee1699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7114%3A%20Missing%20Authentication%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=686b5d886f40f0eb72db8a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7113-cross-site-scripting-in-portabilis-i-333c2a73</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7113%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b5a056f40f0eb72db6818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24508-vulnerability-in-broadcom-symantec--585890dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24508%3A%20Vulnerability%20in%20Broadcom%20Symantec%20IT%20Management%20Suite&amp;severity=medium&amp;id=686b56806f40f0eb72db5a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53473-server-side-request-forgery-ssrf-in-08c80233</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53473%3A%20Server-side%20request%20forgery%20(SSRF)%20in%20Nimesa%20Nimesa%20Backup%20and%20Recovery&amp;severity=high&amp;id=686b56806f40f0eb72db5a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48501-improper-neutralization-of-special--a2555ec3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48501%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nimesa%20Nimesa%20Backup%20and%20Recovery&amp;severity=critical&amp;id=686b56806f40f0eb72db5a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7112-cross-site-scripting-in-portabilis-i-2b2a9e72</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7112%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b4f796f40f0eb72db34cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7111-cross-site-scripting-in-portabilis-i-34ac076a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7111%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b4bf56f40f0eb72db2490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7110-cross-site-scripting-in-portabilis-i-482f15be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7110%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686b44ed6f40f0eb72db13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7109-cross-site-scripting-in-portabilis-i-462ac600</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7109%3A%20Cross%20Site%20Scripting%20in%20Portabilis%20i-Educar&amp;severity=medium&amp;id=686d862b6f40f0eb72fb6820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53186-cwe-264-permissions-privileges-and--93efcb1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53186%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686c0d526f40f0eb72eb669f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53185-cwe-416-use-after-free-in-huawei-ha-9a7682d1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53185%3A%20CWE-416%20Use%20After%20Free%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686c0d526f40f0eb72eb669c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53184-cwe-122-heap-based-buffer-overflow--63343353</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53184%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686c02c66f40f0eb72eb30d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7108-path-traversal-in-risesoft-y9-digita-88ea80c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7108%3A%20Path%20Traversal%20in%20risesoft-y9%20Digital-Infrastructure&amp;severity=medium&amp;id=686c02c66f40f0eb72eb30da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53183-cwe-122-heap-based-buffer-overflow--3ca9fabb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53183%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53182-cwe-122-heap-based-buffer-overflow--bd067b79</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53182%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53181-cwe-122-heap-based-buffer-overflow--42f35f33</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53181%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53180-cwe-122-heap-based-buffer-overflow--2e646c68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53180%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53179-cwe-122-heap-based-buffer-overflow--91c2a741</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53179%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53178-cwe-264-permissions-privileges-and--910f5ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53178%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7145-cwe-78-improper-neutralization-of-sp-cdb83c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7145%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=686b335a6f40f0eb72dac3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53177-cwe-264-permissions-privileges-and--5abc7f7d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53177%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=686b335a6f40f0eb72dac3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53176-cwe-121-stack-based-buffer-overflow-5e4c3093</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53176%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=686b335a6f40f0eb72dac393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53175-cwe-121-stack-based-buffer-overflow-69fd8c41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53175%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53174-cwe-121-stack-based-buffer-overflow-1bff26c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53174%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53173-cwe-121-stack-based-buffer-overflow-40a20f0c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53173%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53172-cwe-121-stack-based-buffer-overflow-c7080e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53172%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53171-cwe-121-stack-based-buffer-overflow-9a9acafa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53171%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7107-path-traversal-in-simstudioai-sim-6127d29d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7107%3A%20Path%20Traversal%20in%20SimStudioAI%20sim&amp;severity=medium&amp;id=686b335a6f40f0eb72dac3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53170-cwe-476-null-pointer-dereference-in-e28861a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53170%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53169-others-in-huawei-harmonyos-9bdce566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53169%3A%20Others%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=686b335a6f40f0eb72dac37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53168-cwe-275-permission-issues-in-huawei-59fa84b7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53168%3A%20CWE-275%20Permission%20Issues%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53167-cwe-305-authentication-bypass-by-pr-a0fe554a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53167%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=686b335a6f40f0eb72dac378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7103-server-side-request-forgery-in-boyun-c3b5d75e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7103%3A%20Server-Side%20Request%20Forgery%20in%20BoyunCMS&amp;severity=medium&amp;id=686b28cc6f40f0eb72da3f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7102-sql-injection-in-boyuncms-c3274ed3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7102%3A%20SQL%20Injection%20in%20BoyunCMS&amp;severity=medium&amp;id=686b1e416f40f0eb72da1297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7101-code-injection-in-boyuncms-685802eb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7101%3A%20Code%20Injection%20in%20BoyunCMS&amp;severity=medium&amp;id=686b17386f40f0eb72d9d21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7100-unrestricted-upload-in-boyuncms-033c21c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7100%3A%20Unrestricted%20Upload%20in%20BoyunCMS&amp;severity=medium&amp;id=686b17386f40f0eb72d9d217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25178-na-3215eef6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25178%3A%20n%2Fa&amp;severity=critical&amp;id=6908f50bf612d110fe9cbe93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25177-na-254bfe79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25177%3A%20n%2Fa&amp;severity=high&amp;id=6908f50bf612d110fe9cbe8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25176-na-96fd26bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25176%3A%20n%2Fa&amp;severity=critical&amp;id=6908f50bf612d110fe9cbe85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45479-na-2680e49f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45479%3A%20n%2Fa&amp;severity=critical&amp;id=686d5b606f40f0eb72f9758e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-07-2b8293ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-07&amp;severity=medium&amp;id=686c61ae6f40f0eb72ee1c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26780-na-f59e51a8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26780%3A%20n%2Fa&amp;severity=high&amp;id=686bf4b96f40f0eb72ea6ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47202-na-d20244dd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47202%3A%20n%2Fa&amp;severity=critical&amp;id=686bf1406f40f0eb72ea5fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45065-na-97a0688f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45065%3A%20n%2Fa&amp;severity=critical&amp;id=686bedae6f40f0eb72ea4e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52492-na-c3ab2a52</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52492%3A%20n%2Fa&amp;severity=high&amp;id=686bea346f40f0eb72ea4427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43933-na-8e598de0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43933%3A%20n%2Fa&amp;severity=critical&amp;id=686be6aa6f40f0eb72ea2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43932-na-130780d7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43932%3A%20n%2Fa&amp;severity=critical&amp;id=686be6aa6f40f0eb72ea2e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43931-na-2bb870c0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43931%3A%20n%2Fa&amp;severity=critical&amp;id=686be6aa6f40f0eb72ea2e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43930-na-3294909e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43930%3A%20n%2Fa&amp;severity=critical&amp;id=686be34b6f40f0eb72ea2061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7099-deserialization-in-boyuncms-426f5c30</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7099%3A%20Deserialization%20in%20BoyunCMS&amp;severity=medium&amp;id=686b0cac6f40f0eb72d968ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7098-path-traversal-in-comodo-internet-se-17276090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7098%3A%20Path%20Traversal%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=medium&amp;id=686b02206f40f0eb72d93dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3108-cwe-1112-incomplete-documentation-of-89b43994</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3108%3A%20CWE-1112%20Incomplete%20Documentation%20of%20Program%20Execution%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=686afe9c6f40f0eb72d914f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7097-os-command-injection-in-comodo-inter-b946d8d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7097%3A%20OS%20Command%20Injection%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=critical&amp;id=686afb196f40f0eb72d90787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7096-improper-validation-of-integrity-che-876c0d20</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7096%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=critical&amp;id=686af4106f40f0eb72d8e286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tat-de-lart-sur-le-phishing-azure-en-2025-partie-2-8d303959</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%C3%89tat%20de%20l%E2%80%99art%20sur%20le%20phishing%20Azure%20en%202025%20(partie%202)%20%E2%80%93%20%C3%89tendre%20l%E2%80%99acc%C3%A8s&amp;severity=medium&amp;id=686af08d6f40f0eb72d8d693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7095-improper-certificate-validation-in-c-8a92f057</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7095%3A%20Improper%20Certificate%20Validation%20in%20Comodo%20Internet%20Security%20Premium&amp;severity=medium&amp;id=686aed086f40f0eb72d74a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7094-stack-based-buffer-overflow-in-belki-d63fefc1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7094%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ae6006f40f0eb72d71766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7093-stack-based-buffer-overflow-in-belki-ad41f8a4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7093%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686adef86f40f0eb72d6dbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7092-stack-based-buffer-overflow-in-belki-081443c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7092%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ad7f06f40f0eb72d6caab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/this-linux-boot-flaw-bypasses-secure-boot-and-full-850b4716</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=This%20Linux%20boot%20flaw%20bypasses%20Secure%20Boot%20and%20full%20disk%20encryption%20but%20the%20fix%20is%20easy&amp;severity=medium&amp;id=686ad0ea6f40f0eb72d6b99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7091-stack-based-buffer-overflow-in-belki-6d49f176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7091%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ad0e96f40f0eb72d6b993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7090-stack-based-buffer-overflow-in-belki-368d8126</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7090%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ac9e26f40f0eb72d5d3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7089-stack-based-buffer-overflow-in-belki-efcd25fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7089%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ac2d86f40f0eb72d5a838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7088-stack-based-buffer-overflow-in-belki-b6bde1c6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7088%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686abbd16f40f0eb72d5700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7087-stack-based-buffer-overflow-in-belki-deff9a01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7087%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686ab4c96f40f0eb72d5620a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7086-stack-based-buffer-overflow-in-belki-006f3c0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7086%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686aadc16f40f0eb72d54927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7085-stack-based-buffer-overflow-in-belki-247ad5d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7085%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686aa6b96f40f0eb72d53244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7084-stack-based-buffer-overflow-in-belki-7c14b363</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7084%3A%20Stack-based%20Buffer%20Overflow%20in%20Belkin%20F9K1122&amp;severity=high&amp;id=686aa3356f40f0eb72d523a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/schizophrenic-zip-file-yet-another-zip-trick-write-0f8bfe33</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Schizophrenic%20ZIP%20file%20-%20Yet%20Another%20ZIP%20Trick%20Writeup&amp;severity=medium&amp;id=686a9c2f6f40f0eb72d50430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7083-os-command-injection-in-belkin-f9k11-7f94f7c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7083%3A%20OS%20Command%20Injection%20in%20Belkin%20F9K1122&amp;severity=medium&amp;id=686a98a96f40f0eb72d5003f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7082-os-command-injection-in-belkin-f9k11-2f73be51</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7082%3A%20OS%20Command%20Injection%20in%20Belkin%20F9K1122&amp;severity=medium&amp;id=686a83916f40f0eb72d4bf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5333-vulnerability-in-broadcom-symantec-i-f5a1b248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5333%3A%20Vulnerability%20in%20Broadcom%20Symantec%20IT%20Management%20Suite&amp;severity=critical&amp;id=686bd5126f40f0eb72e9c826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7081-os-command-injection-in-belkin-f9k11-83d60aea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7081%3A%20OS%20Command%20Injection%20in%20Belkin%20F9K1122&amp;severity=medium&amp;id=686a800d6f40f0eb72d49c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-spam-plugin-uses-victims-domain-name-to-evade-9a4e042b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Spam%20Plugin%20Uses%20Victim&apos;s%20Domain%20Name%20to%20Evade%20Detection&amp;severity=medium&amp;id=686b994c6f40f0eb72e2ca2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-message-from-the-mechanical-shark-f1a84a12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20message%20from%20the%20mechanical%20shark&amp;severity=medium&amp;id=686b994c6f40f0eb72e2ca1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7080-use-of-hard-coded-password-in-done-0-1059bbcb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7080%3A%20Use%20of%20Hard-coded%20Password%20in%20Done-0%20Jank&amp;severity=medium&amp;id=686a79066f40f0eb72d15a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7079-use-of-hard-coded-password-in-mao888-9f44829e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7079%3A%20Use%20of%20Hard-coded%20Password%20in%20mao888%20bluebell-plus&amp;severity=medium&amp;id=686a71fd6f40f0eb72d08af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7078-cross-site-request-forgery-in-07flyc-fbe2cd65</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7078%3A%20Cross-Site%20Request%20Forgery%20in%2007FLYCMS&amp;severity=medium&amp;id=686a363b6f40f0eb72cd6c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7077-buffer-overflow-in-shenzhen-libituo--9f728dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7077%3A%20Buffer%20Overflow%20in%20Shenzhen%20Libituo%20Technology%20LBT-T300-T310&amp;severity=high&amp;id=686a1a1b6f40f0eb72cc1c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27446-cwe-732-incorrect-permission-assign-287204e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27446%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20APISIX%20Java%20Plugin%20Runner&amp;severity=high&amp;id=686a16976f40f0eb72ca5570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7076-improper-access-controls-in-blackvue-356e45f1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7076%3A%20Improper%20Access%20Controls%20in%20BlackVue%20Dashcam%20590X&amp;severity=medium&amp;id=6869c93f6f40f0eb72b61239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-06-671c103d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-06&amp;severity=medium&amp;id=686b102e6f40f0eb72d99409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7075-unrestricted-upload-in-blackvue-dash-463b8b0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7075%3A%20Unrestricted%20Upload%20in%20BlackVue%20Dashcam%20590X&amp;severity=medium&amp;id=6869b7ab6f40f0eb72b3cd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7074-inefficient-regular-expression-compl-8e73f892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7074%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vercel%20hyper&amp;severity=medium&amp;id=6868ebc76f40f0eb72a8c933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53605-cwe-674-uncontrolled-recursion-in-s-fcb2ac04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53605%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20stepancheg%20protobuf&amp;severity=medium&amp;id=68687b486f40f0eb72a48a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53604-cwe-130-improper-handling-of-length-79cbee8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53604%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20pimeys%20web-push&amp;severity=medium&amp;id=686877c46f40f0eb72a47d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53603-cwe-476-null-pointer-dereference-in-cea1526a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53603%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Alinto%20SOPE&amp;severity=high&amp;id=686870c16f40f0eb72a422b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48952-cwe-697-incorrect-comparison-in-jok-5232e6b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48952%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20jokob-sk%20NetAlertX&amp;severity=critical&amp;id=6868549c6f40f0eb72a3d4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53366-cwe-248-uncaught-exception-in-model-bed56cf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53366%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=6868549c6f40f0eb72a3d4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53365-cwe-248-uncaught-exception-in-model-e3179b37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53365%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20modelcontextprotocol%20python-sdk&amp;severity=high&amp;id=6868549c6f40f0eb72a3d4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7070-allocation-of-resources-in-iroad-das-f885e3b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7070%3A%20Allocation%20of%20Resources%20in%20IROAD%20Dashcam%20Q9&amp;severity=medium&amp;id=68684a106f40f0eb72a3bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7069-heap-based-buffer-overflow-in-hdf5-61c27c51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7069%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=6868468c6f40f0eb72a3b265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7068-memory-leak-in-hdf5-e023b32f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7068%3A%20Memory%20Leak%20in%20HDF5&amp;severity=medium&amp;id=68683c026f40f0eb72a330d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingram-micro-suffers-global-outage-as-internal-sys-745f47c4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingram%20Micro%20suffers%20global%20outage%20as%20internal%20systems%20inaccessible&amp;severity=high&amp;id=68681c686f40f0eb72a215e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-leaks-telefnica-data-allegedly-stolen-in-a--fca2f4bb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20leaks%20Telef%C3%B3nica%20data%20allegedly%20stolen%20in%20a%20new%20breach&amp;severity=high&amp;id=68681c686f40f0eb72a215de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7067-heap-based-buffer-overflow-in-hdf5-2d09cdfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7067%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=686818d86f40f0eb72a20eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53485-cwe-862-missing-authorization-in-wi-0139304a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53485%3A%20CWE-862%20Missing%20Authorization%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20extension&amp;severity=high&amp;id=686815556f40f0eb72a1e957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53484-cwe-79-improper-neutralization-of-i-0291cc3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20extension&amp;severity=critical&amp;id=686811d36f40f0eb72a1e2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53483-cwe-352-cross-site-request-forgery--f1835eec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53483%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20SecurePoll%20extension&amp;severity=high&amp;id=686811d36f40f0eb72a1e2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53482-cwe-79-improper-neutralization-of-i-41c45579</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20IPInfo%20Extension&amp;severity=medium&amp;id=6868003c6f40f0eb72a175e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53481-cwe-400-uncontrolled-resource-consu-d4bf2af1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53481%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20IPInfo%20Extension&amp;severity=high&amp;id=6867f9346f40f0eb72a14159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nighteagle-apt-exploits-microsoft-exchange-flaw-to-1739d04a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NightEagle%20APT%20Exploits%20Microsoft%20Exchange%20Flaw%20to%20Target%20China&apos;s%20Military%20and%20Tech%20Sectors&amp;severity=high&amp;id=6867f5af6f40f0eb72a13690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38213-8d0ec891</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38213&amp;severity=null&amp;id=689a109fad5a09ad0026aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38178-428f1723</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38178&amp;severity=null&amp;id=688700f4ad5a09ad007ef7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46733-cwe-755-improper-handling-of-except-2634fa97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46733%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20OP-TEE%20optee_os&amp;severity=high&amp;id=686bf4b96f40f0eb72ea6ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7061-csv-injection-in-intelbras-incontrol-d0abe306</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7061%3A%20CSV%20Injection%20in%20Intelbras%20InControl&amp;severity=medium&amp;id=6867cb876f40f0eb72a0909d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7066-cwe-79-improper-neutralization-of-in-30a17923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7066%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jirafeau%20project%20Jirafeau&amp;severity=medium&amp;id=6867c4786f40f0eb72a08436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6056-cwe-203-observable-discrepancy-in-er-f7c3b097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6056%3A%20CWE-203%20Observable%20Discrepancy%20in%20Ergon%20Informatik%20AG%20Airlock%20IAM&amp;severity=medium&amp;id=6867b9f16f40f0eb72a04a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6740-cwe-79-improper-neutralization-of-in-867da488</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6740%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arshidkv12%20Contact%20Form%207%20Database%20Addon%20%E2%80%93%20CFDB7&amp;severity=medium&amp;id=6867b9f16f40f0eb72a04a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23970-cwe-266-incorrect-privilege-assignm-247631f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23970%3A%20Incorrect%20Privilege%20Assignment%20in%20aonetheme%20Service%20Finder%20Booking&amp;severity=null&amp;id=6867b9f06f40f0eb72a0496e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24771-cwe-79-improper-neutralization-of-i-375ed80b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Content%20Manager%20Light&amp;severity=null&amp;id=6867b9f06f40f0eb72a04971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24780-cwe-89-improper-neutralization-of-s-4aa43b20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24780%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=6867b9f06f40f0eb72a04974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28968-cwe-79-improper-neutralization-of-i-8d0ec932</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28968%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Prelovac%20WP%20Wall&amp;severity=null&amp;id=6867b9f06f40f0eb72a04977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28976-cwe-79-improper-neutralization-of-i-f55eceae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28976%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dsrodzin%20Email%20Address%20Security%20by%20WebEmailProtector&amp;severity=null&amp;id=6867b9f06f40f0eb72a0497a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28978-cwe-79-improper-neutralization-of-i-274d13d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28978%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hung%20Trang%20Si%20SB%20Breadcrumbs&amp;severity=null&amp;id=6867b9f06f40f0eb72a0497d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28980-cwe-22-improper-limitation-of-a-pat-b56a1809</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28980%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20machouinard%20Aviation%20Weather%20from%20NOAA&amp;severity=null&amp;id=6867b9f06f40f0eb72a04980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28983-cwe-89-improper-neutralization-of-s-bcae9037</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28983%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ClickandPledge%20Click%20%26%20Pledge%20Connect&amp;severity=critical&amp;id=6867b9f06f40f0eb72a04983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30933-cwe-434-unrestricted-upload-of-file-6d6f85e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30933%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LiquidThemes%20LogisticsHub&amp;severity=null&amp;id=6867b9f06f40f0eb72a04986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31037-cwe-79-improper-neutralization-of-i-aeee1fa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20favethemes%20Homey&amp;severity=null&amp;id=6867b9f06f40f0eb72a04989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32297-cwe-89-improper-neutralization-of-s-4bb83f24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32297%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=null&amp;id=6867b9f06f40f0eb72a04998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32311-cwe-79-improper-neutralization-of-i-1222b078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32311%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20Pressroom&amp;severity=null&amp;id=6867b9f06f40f0eb72a0499b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39487-cwe-79-improper-neutralization-of-i-cf2bef7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ValvePress%20Rankie&amp;severity=null&amp;id=6867b9f06f40f0eb72a0499e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47479-cwe-1390-weak-authentication-in-are-c1f89b34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47479%3A%20Weak%20Authentication%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=6867b9f06f40f0eb72a049a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47565-cwe-862-missing-authorization-in-as-56424f64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47565%3A%20Missing%20Authorization%20in%20ashanjay%20EventON&amp;severity=null&amp;id=6867b9f06f40f0eb72a049a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47627-cwe-98-improper-control-of-filename-193af7e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47627%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LCweb%20PrivateContent%20-%20Mail%20Actions&amp;severity=high&amp;id=6867b9f06f40f0eb72a049a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47634-cwe-862-missing-authorization-in-ke-eed4a2ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47634%3A%20Missing%20Authorization%20in%20Keylor%20Mendoza%20WC%20Pickup%20Store&amp;severity=null&amp;id=6867b9f06f40f0eb72a049aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48231-cwe-79-improper-neutralization-of-i-250b15a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=null&amp;id=6867b9f06f40f0eb72a049ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49245-cwe-79-improper-neutralization-of-i-9f4f16a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmoreira%20Testimonials%20Showcase&amp;severity=null&amp;id=6867b9f06f40f0eb72a049b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49247-cwe-79-improper-neutralization-of-i-0c42a8da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49247%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmoreira%20Team%20Showcase&amp;severity=null&amp;id=6867b9f16f40f0eb72a049c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49274-cwe-79-improper-neutralization-of-i-17e4a40b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49274%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awordpresslife%20Neom%20Blog&amp;severity=null&amp;id=6867b9f16f40f0eb72a049c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49302-cwe-94-improper-control-of-generati-57375efd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49302%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Scott%20Paterson%20Easy%20Stripe&amp;severity=null&amp;id=6867b9f16f40f0eb72a049c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49303-cwe-22-improper-limitation-of-a-pat-f345fe68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49303%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shabti%20Kaplan%20Frontend%20Admin%20by%20DynamiApps&amp;severity=null&amp;id=6867b9f16f40f0eb72a049cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49866-cwe-79-improper-neutralization-of-i-2ad49cb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nikel%20Beautiful%20Cookie%20Consent%20Banner&amp;severity=null&amp;id=6867b9f16f40f0eb72a049da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49867-cwe-266-incorrect-privilege-assignm-27f695bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49867%3A%20Incorrect%20Privilege%20Assignment%20in%20InspiryThemes%20RealHomes&amp;severity=null&amp;id=6867b9f16f40f0eb72a049dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49870-cwe-89-improper-neutralization-of-s-d799035a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49870%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=6867b9f16f40f0eb72a049ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50032-cwe-862-missing-authorization-in-pa-432ed219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50032%3A%20Missing%20Authorization%20in%20Paytiko%20-%20Payment%20Orchestration%20Platform%20Paytiko%20for%20WooCommerce&amp;severity=null&amp;id=6867b9f16f40f0eb72a049f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50039-cwe-862-missing-authorization-in-vg-8c348840</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50039%3A%20Missing%20Authorization%20in%20vgwort%20VG%20WORT%20METIS&amp;severity=null&amp;id=6867b9f16f40f0eb72a049f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52718-cwe-94-improper-control-of-generati-012d306a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52718%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Beplusthemes%20Alone&amp;severity=null&amp;id=6867b9f16f40f0eb72a049f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52776-cwe-79-improper-neutralization-of-i-a6aff65c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=6867b9f16f40f0eb72a049fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52796-cwe-79-improper-neutralization-of-i-0b73b6eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tggfref%20WP-Recall&amp;severity=high&amp;id=6867b9f16f40f0eb72a049fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52798-cwe-79-improper-neutralization-of-i-41663e96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52805-cwe-35-path-traversal-in-vaultdwell-5275ab77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52805%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52807-cwe-98-improper-control-of-filename-90055f7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52807%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusWP%20Kossy%20-%20Minimalist%20eCommerce%20WordPress%20Theme&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52813-cwe-862-missing-authorization-in-pi-705c5c04</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52813%3A%20CWE-862%20Missing%20Authorization%20in%20pietro%20MobiLoud&amp;severity=high&amp;id=6867b9f16f40f0eb72a04a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52828-cwe-502-deserialization-of-untruste-27f6ec8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52828%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Red%20Art&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52830-cwe-89-improper-neutralization-of-s-be7bf20a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52830%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bsecuretech%20bSecure%20%26%238211%3B%20Your%20Universal%20Checkout&amp;severity=critical&amp;id=6867b9f16f40f0eb72a04a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52831-cwe-89-improper-neutralization-of-s-08b04f8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52831%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52832-cwe-89-improper-neutralization-of-s-4745dfce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52832%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpo-HR%20NGG%20Smart%20Image%20Search&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52833-cwe-89-improper-neutralization-of-s-b2058fec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52833%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20designthemes%20LMS&amp;severity=null&amp;id=6867b9f16f40f0eb72a04a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4414-cwe-98-improper-control-of-filename--92b23333</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4414%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=null&amp;id=6867b9f16f40f0eb72a049ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49070-cwe-98-improper-control-of-filename-1da67f0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49070%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NasaTheme%20Elessi&amp;severity=null&amp;id=6867b9f06f40f0eb72a049b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49414-cwe-434-unrestricted-upload-of-file-2c9acc37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49414%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Fastw3b%20LLC%20FW%20Gallery&amp;severity=null&amp;id=6867b9f16f40f0eb72a049ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49417-cwe-502-deserialization-of-untruste-ebae4036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49417%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BestWpDeveloper%20WooCommerce%20Product%20Multi-Action&amp;severity=null&amp;id=6867b9f16f40f0eb72a049d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49418-cwe-918-server-side-request-forgery-c178be91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49418%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TeconceTheme%20Allmart&amp;severity=null&amp;id=6867b9f16f40f0eb72a049d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49431-cwe-862-missing-authorization-in-gn-49207aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49431%3A%20Missing%20Authorization%20in%20Gnuget%20MF%20Plus%20WPML&amp;severity=null&amp;id=6867b9f16f40f0eb72a049d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7060-improper-input-validation-in-monitor-9fa8951c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7060%3A%20Improper%20Input%20Validation%20in%20Monitorr&amp;severity=low&amp;id=6867b6696f40f0eb72a0436c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gamaredon-in-2024-cranking-out-spearphishing-campa-e5161eb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gamaredon%20in%202024%3A%20Cranking%20out%20spearphishing%20campaigns%20against%20Ukraine%20with%20an%20evolved%20toolset&amp;severity=medium&amp;id=6867b2e56f40f0eb72a03c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-issues-emergency-fix-for-critical-root-crede-4e4c664f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20Issues%20Emergency%20Fix%20for%20Critical%20Root%20Credential%20Flaw%20in%20Unified%20CM&amp;severity=critical&amp;id=6867af606f40f0eb72a00fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discovery-of-qwizzserial-a-new-android-sms-stealer-27d0e922</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discovery%20of%20Qwizzserial%3A%20A%20New%20Android%20SMS%20Stealer%20Family&amp;severity=medium&amp;id=6867abe26f40f0eb729fd0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-flaw-in-catwatchful-spyware-exposed-logins-of-62-5523c961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20flaw%20in%20Catwatchful%20spyware%20exposed%20logins%20of%20%2B62%2C000%20users&amp;severity=medium&amp;id=6867a8586f40f0eb729fcaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5920-cwe-201-insertion-of-sensitive-infor-0ec23b1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5920%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Sharable%20Password%20Protected%20Posts&amp;severity=high&amp;id=6867a4e56f40f0eb729fc16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunters-international-ransomware-gang-rebrands-as--0afa0696</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunters%20International%20Ransomware%20Gang%20Rebrands%20as%20World%20Leaks&amp;severity=medium&amp;id=6867a4d46f40f0eb729fc12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-nimdoor-north-korean-threat-actors-target-we-e909ef0a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20NimDoor%20%7C%20North%20Korean%20Threat%20Actors%20Target%20Web3%20and%20Crypto%20Platforms%20with%20Nim-Based%20Malware&amp;severity=medium&amp;id=6867a4e46f40f0eb729fc14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30983-cwe-79-improper-neutralization-of-i-dc585692</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30983%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Card%20flip%20image%20slideshow&amp;severity=null&amp;id=686796cc6f40f0eb729fa598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30979-cwe-89-improper-neutralization-of-s-e5618df9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30979%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Pixelating%20image%20slideshow%20gallery&amp;severity=null&amp;id=686796cc6f40f0eb729fa595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30969-cwe-89-improper-neutralization-of-s-4edea515</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20iFrame%20Images%20Gallery&amp;severity=null&amp;id=686796cb6f40f0eb729fa588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30947-cwe-89-improper-neutralization-of-s-5514bb3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30947%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Cool%20fade%20popup&amp;severity=null&amp;id=686796cb6f40f0eb729fa585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30943-cwe-79-improper-neutralization-of-i-f9484cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aakif%20Kadiwala%20Posts%20Slider%20Shortcode&amp;severity=null&amp;id=686796cb6f40f0eb729fa582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30929-cwe-862-missing-authorization-in-am-6433da92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30929%3A%20Missing%20Authorization%20in%20amazewp%20fluXtore&amp;severity=null&amp;id=686796cb6f40f0eb729fa57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29012-cwe-862-missing-authorization-in-ka-525e325a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29012%3A%20Missing%20Authorization%20in%20kamleshyadav%20CF7%207%20Mailchimp%20Add-on&amp;severity=null&amp;id=686796cb6f40f0eb729fa57c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29007-cwe-862-missing-authorization-in-lm-af3c20e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29007%3A%20Missing%20Authorization%20in%20LMSACE%20LMSACE%20Connect&amp;severity=null&amp;id=686796cb6f40f0eb729fa579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29001-cwe-862-missing-authorization-in-zo-1b3bdeed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29001%3A%20CWE-862%20Missing%20Authorization%20in%20ZoomIt%20WooCommerce%20Shop%20Page%20Builder&amp;severity=medium&amp;id=686796cb6f40f0eb729fa576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28971-cwe-79-improper-neutralization-of-i-618f3936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CWD%20Web%20Designer%20Easy%20Elements%20Hider&amp;severity=null&amp;id=686796cb6f40f0eb729fa573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28969-cwe-89-improper-neutralization-of-s-c568d72c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28969%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cybio%20Gallery%20Widget&amp;severity=null&amp;id=686796cb6f40f0eb729fa570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28967-cwe-89-improper-neutralization-of-s-66eb56d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28967%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Steve%20Truman%20Contact%20Us%20page%20-%20Contact%20people%20LITE&amp;severity=null&amp;id=686796cb6f40f0eb729fa56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28963-cwe-918-server-side-request-forgery-11590772</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28963%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Md%20Yeasin%20Ul%20Haider%20URL%20Shortener&amp;severity=null&amp;id=686796cb6f40f0eb729fa560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28957-improper-neutralization-of-input-du-798d270f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28957%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OwnerRez%20OwnerRez%20API&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28951-cwe-434-unrestricted-upload-of-file-4dd0578c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28951%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CreedAlly%20Bulk%20Featured%20Image&amp;severity=null&amp;id=686796cb6f40f0eb729fa55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27358-cwe-80-improper-neutralization-of-s-3104066a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27358%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20N-Media%20Frontend%20File%20Manager&amp;severity=null&amp;id=686796cb6f40f0eb729fa55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27326-cwe-79-improper-neutralization-of-i-3a1dc83f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Video%20Gallery%20Block&amp;severity=null&amp;id=686796cb6f40f0eb729fa557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26591-cwe-79-improper-neutralization-of-i-16764366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20WP%20fancybox&amp;severity=null&amp;id=686796cb6f40f0eb729fa554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24764-cwe-79-improper-neutralization-of-i-db8f559f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A.%20Jones%20(Simply)%20Guest%20Author%20Name&amp;severity=null&amp;id=686796cb6f40f0eb729fa551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24757-cwe-79-improper-neutralization-of-i-eba39d2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24757%3A%20Missing%20Authorization%20in%20AndonDesign%20uDesign&amp;severity=null&amp;id=686796cb6f40f0eb729fa54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24748-cwe-89-improper-neutralization-of-s-13f45ea7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24748%3A%20Missing%20Authorization%20in%20ThemeFusion%20Avada&amp;severity=null&amp;id=686796cb6f40f0eb729fa54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24735-cwe-79-improper-neutralization-of-i-6e457956</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chatra%20Chatra%20Live%20Chat%20%2B%20ChatBot%20%2B%20Cart%20Saver&amp;severity=medium&amp;id=686796cb6f40f0eb729fa548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23972-cwe-352-cross-site-request-forgery--d9937002</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23972%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brian%20S.%20Reed%20Contact%20Form%207%20reCAPTCHA&amp;severity=null&amp;id=686796cb6f40f0eb729fa545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53569-cwe-352-cross-site-request-forgery--8bb6e1c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Trust%20Payments%20Trust%20Payments%20Gateway%20for%20WooCommerce%20(JavaScript%20Library)&amp;severity=null&amp;id=686796cc6f40f0eb729fa5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53568-cwe-352-cross-site-request-forgery--ed095d1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tony%20Zeoli%20Radio%20Station&amp;severity=null&amp;id=686796cc6f40f0eb729fa59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53566-cwe-79-improper-neutralization-of-i-aa26f5c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=686796cc6f40f0eb729fa59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9453-insertion-of-sensitive-information-i-e4f31e2e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9453%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Jenkins%20openshift-sync-plugin&amp;severity=medium&amp;id=691f82024f1c50aa2eb5aeab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5351-double-free-in-red-hat-red-hat-enter-63a66338</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5351%3A%20Double%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=686793516f40f0eb729f9d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32918-cwe-140-improper-neutralization-of--b1e8a3cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32918%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=68678fbd6f40f0eb729f93e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6673-cwe-79-improper-neutralization-of-in-1506eafd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6673%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nikelschubert%20Easy%20restaurant%20menu%20manager&amp;severity=medium&amp;id=686781ad6f40f0eb729f7b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11937-cwe-79-improper-neutralization-of-i-07dd80bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53600-cwe-346-origin-validation-error-in--5d2fd104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53600%3A%20CWE-346%20Origin%20Validation%20Error%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=high&amp;id=686781ad6f40f0eb729f7b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53599-cwe-79-improper-neutralization-of-i-c6201c91</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NAVER%20NAVER%20Whale%20browser&amp;severity=critical&amp;id=686781ad6f40f0eb729f7b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5372-incorrect-calculation-in-red-hat-red-5a5611b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5372%3A%20Incorrect%20Calculation%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=686770196f40f0eb729f595d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6944-cwe-79-improper-neutralization-of-in-417a3c83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undsgn%20Uncode%20Core&amp;severity=medium&amp;id=686769146f40f0eb729f45ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5567-cwe-79-improper-neutralization-of-in-5969a20a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7053-cross-site-scripting-in-cockpit-1a28934f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7053%3A%20Cross%20Site%20Scripting%20in%20Cockpit&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6039-cwe-79-improper-neutralization-of-in-01c4b577</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cageehv%20ProcessingJS%20for%20WordPress&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6782-cwe-89-improper-neutralization-of-sp-e556141d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6782%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20optinlyhq%20GoZen%20Forms&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5924-cwe-352-cross-site-request-forgery-c-639bb62a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5924%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20skywaveinfo%20WP%20Firebase%20Push%20Notification&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6783-cwe-89-improper-neutralization-of-sp-92f77b07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6783%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20optinlyhq%20GoZen%20Forms&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6787-cwe-79-improper-neutralization-of-in-8e6c3f61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibachal%20Smart%20Docs&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6814-cwe-862-missing-authorization-in-dun-235220b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6814%3A%20CWE-862%20Missing%20Authorization%20in%20dunskii%20Booking%20X%20%E2%80%93%20Appointment%20and%20Reservation%20Availability%20Calendar&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5953-cwe-862-missing-authorization-in-asa-1786a1c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5953%3A%20CWE-862%20Missing%20Authorization%20in%20asaquzzaman%20WP%20Human%20Resource%20Management&amp;severity=high&amp;id=68673b5e6f40f0eb729e5f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6586-cwe-434-unrestricted-upload-of-file--b6c2ad7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6586%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20metagauss%20Download%20Plugin&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6729-cwe-918-server-side-request-forgery--d0eaef37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6729%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20qazomardok%20PayMaster%20for%20WooCommerce&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5956-cwe-862-missing-authorization-in-asa-8f2cfb06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5956%3A%20CWE-862%20Missing%20Authorization%20in%20asaquzzaman%20WP%20Human%20Resource%20Management&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6238-cwe-601-url-redirection-to-untrusted-98a8e013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6238%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=68673b5e6f40f0eb729e5fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6041-cwe-352-cross-site-request-forgery-c-5cdef3bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6041%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20yContributors&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6739-cwe-89-improper-neutralization-of-sp-b6b5b652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6739%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bauc%20WPQuiz&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7046-cwe-79-improper-neutralization-of-in-309fc0f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dotrex%20Portfolio%20for%20Elementor%20%26%20Image%20Gallery%20%7C%20PowerFolio&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5933-cwe-352-cross-site-request-forgery-c-e482e44e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5933%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richarddev7%20RD%20Contacto&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6786-cwe-284-improper-access-control-in-a-d9b326a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6786%3A%20CWE-284%20Improper%20Access%20Control%20in%20antwerpes%20DocCheck%20Login&amp;severity=medium&amp;id=68673b5e6f40f0eb729e5fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-group-houken-hit-french-organizations-76261648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20group%20Houken%20hit%20French%20organizations%20using%20zero-days&amp;severity=medium&amp;id=68671f446f40f0eb729e2b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-04-3185b367</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-04&amp;severity=medium&amp;id=68686d2e6f40f0eb72a41214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43711-cwe-459-incomplete-cleanup-in-tunne-e9371c8c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43711%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Tunnelblick%20Project%20Tunnelblick&amp;severity=high&amp;id=686869b46f40f0eb72a40bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26850-cwe-863-incorrect-authorization-in--7bb6ab75</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26850%3A%20CWE-863%20Incorrect%20Authorization%20in%20Quest%20KACE%20Systems%20Management%20Appliance&amp;severity=critical&amp;id=686862ac6f40f0eb72a3fa88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53602-cwe-1188-initialization-of-a-resour-ca5f8f3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53602%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Open%20Zipkin%20Zipkin&amp;severity=medium&amp;id=686843086f40f0eb72a39502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49600-cwe-325-missing-cryptographic-step--67177ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49600%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=6867eea86f40f0eb72a12684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49601-cwe-125-out-of-bounds-read-in-mbed--0eea0732</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49601%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=6867eea86f40f0eb72a12681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52497-cwe-193-off-by-one-error-in-mbed-mb-0e3bc984</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52497%3A%20CWE-193%20Off-by-one%20Error%20in%20Mbed%20mbedtls&amp;severity=medium&amp;id=6867eb246f40f0eb72a120bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52496-na-f24872aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52496%3A%20CWE-733%20Compiler%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Mbed%20mbedtls&amp;severity=high&amp;id=6867eb246f40f0eb72a120b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5322-cwe-434-unrestricted-upload-of-file--77989700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5322%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=6866f8926f40f0eb729c92bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53367-cwe-787-out-of-bounds-write-in-djvu-b11f10f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53367%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20DjvuNet%20DjVuLibre&amp;severity=high&amp;id=6866f50d6f40f0eb729c68ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49826-cwe-444-inconsistent-interpretation-f90ac4f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49826%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=high&amp;id=6866f50d6f40f0eb729c68b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49005-cwe-444-inconsistent-interpretation-7f9a1edb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49005%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20vercel%20next.js&amp;severity=low&amp;id=6866f1946f40f0eb729c3cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52554-cwe-862-missing-authorization-in-n8-200a18ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52554%3A%20CWE-862%3A%20Missing%20Authorization%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=6866e7016f40f0eb729bb598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53369-cwe-79-improper-neutralization-of-i-e8c25cc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53369%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-ShortDescription&amp;severity=high&amp;id=6866e37a6f40f0eb729b8c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34089-cwe-306-missing-authentication-for--92dbb79c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34089%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Aexol%20Studio%20Remote%20for%20Mac&amp;severity=critical&amp;id=6866dff66f40f0eb729b625a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34087-cwe-78-improper-neutralization-of-s-ff81cf6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34087%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Pi-hole%20LLC%20Web&amp;severity=critical&amp;id=6866dff66f40f0eb729b624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34088-cwe-78-improper-neutralization-of-s-83126801</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34088%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Artica%20ST%20Pandora%20FMS&amp;severity=high&amp;id=6866dff66f40f0eb729b6253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34082-cwe-78-improper-neutralization-of-s-aa2b5c46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34082%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IGEL%20Technology%20GmbH%20OS&amp;severity=critical&amp;id=6866dff66f40f0eb729b623e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34086-cwe-94-improper-control-of-generati-5c1a1644</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34086%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Bolt%20CMS&amp;severity=high&amp;id=6866dff66f40f0eb729b6244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34061-cwe-94-improper-control-of-generati-e2be5f6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34061%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Henan%20Xiaopi%20Security%20Technology%20Co.%2C%20Ltd.%20PHPStudy&amp;severity=critical&amp;id=6866dff66f40f0eb729b623a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53370-cwe-79-improper-neutralization-of-i-6dcd7274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53370%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=high&amp;id=6866dff66f40f0eb729b6261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53368-cwe-79-improper-neutralization-of-i-9f320a50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53368%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=high&amp;id=6866dc736f40f0eb729b38df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23968-cwe-434-unrestricted-upload-of-file-e1138ad6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23968%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WebFactory%20AiBud%20WP&amp;severity=null&amp;id=6866d1e86f40f0eb729ab73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/instagram-uses-expiring-certificates-as-single-day-5c5f6ed7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Instagram%20uses%20expiring%20certificates%20as%20single%20day%20TLS%20certificates&amp;severity=medium&amp;id=6866ce686f40f0eb729a8da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/idealab-confirms-data-stolen-in-ransomware-attack--d812a7ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IdeaLab%20confirms%20data%20stolen%20in%20ransomware%20attack%20last%20year&amp;severity=high&amp;id=6866cae06f40f0eb729a643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-android-fraud-operations-uncovered-iconads-e0f7a7ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Android%20Fraud%20Operations%20Uncovered%3A%20IconAds%2C%20Kaleidoscope%2C%20SMS%20Malware%2C%20NFC%20Scams&amp;severity=high&amp;id=6866cae06f40f0eb729a6440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fake-marketplace-from-china-mimics-top-retail--65e6d132</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Fake%20Marketplace%20From%20China%20Mimics%20Top%20Retail%20Brands%20for%20Phishing%20Scams&amp;severity=medium&amp;id=6866c3d66f40f0eb729a0f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6071-cwe-321-use-of-hard-coded-cryptograp-75590c18</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6071%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ABB%20RMC-100&amp;severity=medium&amp;id=6866b94b6f40f0eb7299875a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6072-cwe-121-stack-based-buffer-overflow--80efd0b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6072%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20RMC-100&amp;severity=high&amp;id=6866b5c76f40f0eb72995da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6073-cwe-121-stack-based-buffer-overflow--d695f371</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6073%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ABB%20RMC-100&amp;severity=high&amp;id=6866b5c76f40f0eb72995da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6074-cwe-321-use-of-hard-coded-cryptograp-4d9e4631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6074%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ABB%20RMC-100&amp;severity=medium&amp;id=6866b5c76f40f0eb72995daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49846-cwe-117-improper-output-neutralizat-8b4879d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49846%3A%20CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20wireapp%20wire-ios&amp;severity=medium&amp;id=6866b5c76f40f0eb72995dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48939-cwe-138-improper-neutralization-of--832990f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48939%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=6866b2446f40f0eb7299335a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6926-cwe-287-improper-authentication-in-w-b6055b33</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6926%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CentralAuth%20Extension&amp;severity=high&amp;id=6866b2446f40f0eb72993362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53500-cwe-79-improper-neutralization-of-i-24ef9dff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MassEditRegex%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53501-cwe-284-improper-access-control-in--f3be80f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53501%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20Scribunto%20Extension&amp;severity=high&amp;id=6866aebf6f40f0eb72990a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53502-cwe-20-improper-input-validation-in-2b1865c8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53502%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20FeaturedFeeds%20Extension&amp;severity=medium&amp;id=6866aebf6f40f0eb72990a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53489-cwe-79-improper-neutralization-of-i-279e34fb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20GoogleDocs4MW%20Extension&amp;severity=medium&amp;id=6866aebf6f40f0eb72990a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53490-cwe-79-improper-neutralization-of-i-fa933ca0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20CampaignEvents%20Extension&amp;severity=medium&amp;id=6866ab3b6f40f0eb7298e169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/applocker-bypass-on-lenovo-machines-the-curious-ca-8bab2451</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Applocker%20bypass%20on%20Lenovo%20machines%20%E2%80%93%20The%20curious%20case%20of%20MFGSTAT.zip&amp;severity=medium&amp;id=686692a56f40f0eb7297b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5961-cwe-434-unrestricted-upload-of-file--c9f02d01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5961%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid%20Backup%20%26%20Migration&amp;severity=high&amp;id=68668b996f40f0eb72975191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hunters-international-ransomware-shuts-down-releas-ac56a8c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hunters%20International%20ransomware%20shuts%20down%2C%20releases%20free%20decryptors&amp;severity=high&amp;id=6866810c6f40f0eb7296a558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surveillance-used-by-a-drug-cartel-schneier-on-sec-492a873f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Surveillance%20Used%20by%20a%20Drug%20Cartel%20-%20Schneier%20on%20Security&amp;severity=medium&amp;id=6866810c6f40f0eb7296a560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2932-cwe-22-improper-limitation-of-a-path-c71cb1dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2932%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jkdevstudio%20JKDEVKIT&amp;severity=high&amp;id=68667a046f40f0eb72967139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2537-cwe-79-improper-neutralization-of-in-3f50f812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20YouTube%20Embed%2C%20Playlist%20and%20Popup%20by%20WpDevArt&amp;severity=medium&amp;id=68667a046f40f0eb72967132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49595-cwe-400-uncontrolled-resource-consu-6777e835</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49595%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=68667a046f40f0eb7296713d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3702-cwe-862-missing-authorization-in-mel-37b26256</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3702%3A%20Missing%20Authorization%20in%20Melapress%20Melapress%20File%20Monitor&amp;severity=null&amp;id=6866767e6f40f0eb729669ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49032-cwe-79-improper-neutralization-of-i-debeb3ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PublishPress%20Gutenberg%20Blocks&amp;severity=null&amp;id=6866767e6f40f0eb729669f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40723-cwe-79-improper-neutralization-of-i-55d522d1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40723%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flatboard%20Pro%20Flatboard&amp;severity=medium&amp;id=68666f776f40f0eb729659d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40722-cwe-79-improper-neutralization-of-i-f2735a80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flatboard%20Pro%20Flatboard&amp;severity=medium&amp;id=68666f776f40f0eb729659d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27461-cwe-862-missing-authorization-in-en-a6d70f5c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27461%3A%20CWE-862%20Missing%20Authorization%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finnish-hacker-harri-hursti-hacks-us-voting-machin-97762f25</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finnish%20hacker%20Harri%20Hursti%20hacks%20U.S.%20voting%20machine%20on%20live%20podcast&amp;severity=medium&amp;id=68666bf86f40f0eb72964d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27460-cwe-312-cleartext-storage-of-sensit-7060e7f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27460%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27459-cwe-257-storing-passwords-in-a-reco-89292282</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27459%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27458-cwe-327-use-of-a-broken-or-risky-cr-d0fc2619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27458%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27457-cwe-319-cleartext-transmission-of-s-22f8a9d9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27457%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27456-cwe-307-improper-restriction-of-exc-3ea7f876</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27456%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27455-cwe-1021-improper-restriction-of-re-cce87d80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27455%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27454-cwe-352-cross-site-request-forgery--17e20962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27453-cwe-1004-sensitive-cookie-without-h-bc121616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27453%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27452-cwe-548-exposure-of-information-thr-14143bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27452%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27451-cwe-204-observable-response-discrep-ab1e3764</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27451%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27450-cwe-614-sensitive-cookie-in-https-s-599efd48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27450%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27449-cwe-307-improper-restriction-of-exc-37f36257</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27449%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27448-cwe-79-improper-neutralization-of-i-8bbb4534</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27447-cwe-79-improper-neutralization-of-i-024b5099</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1711-cwe-1392-use-of-default-credentials--0fffaa1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1711%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1710-cwe-307-improper-restriction-of-exce-51327d77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1710%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=68666bf36f40f0eb72964d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1709-cwe-256-plaintext-storage-of-a-passw-b74d93b8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1709%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=medium&amp;id=68666bf36f40f0eb72964d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2540-cwe-79-improper-neutralization-of-in-7aefe177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Awesome%20Wp%20Image%20Gallery&amp;severity=medium&amp;id=68666bf36f40f0eb72964d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6563-cwe-20-improper-input-validation-in--db1b6ac5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MikroTik%20RouterOS&amp;severity=medium&amp;id=6866686e6f40f0eb7296466b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1708-cwe-89-improper-neutralization-of-sp-e8067e47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Endress%2BHauser%20Endress%2BHauser%20MEAC300-FNADE4&amp;severity=high&amp;id=6866686e6f40f0eb72964663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-korean-hackers-drop-nimdoor-macos-malware-via-fa-b44e00e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N%20Korean%20Hackers%20Drop%20NimDoor%20macOS%20Malware%20Via%20Fake%20Zoom%20Updates&amp;severity=medium&amp;id=686664ea6f40f0eb72963ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6587-cwe-532-insertion-of-sensitive-infor-fd042892</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6587%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=686656db6f40f0eb7296200d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0885-cwe-863-incorrect-authorization-in-o-e02bd61f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0885%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%E2%84%A2%20GroupWise&amp;severity=low&amp;id=686656db6f40f0eb72962010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-users-urged-to-patch-critical-sudo-cve-91c9d25f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20Users%20Urged%20to%20Patch%20Critical%20Sudo%20CVE&amp;severity=critical&amp;id=68664fd26f40f0eb72960db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5647-cwe-79-improper-neutralization-of-in-c3296686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blossomthemes%20BlossomThemes%20Social%20Feed&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-houken-group-breaches-top-french-syst-4e11372d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China%20Linked%20Houken%20Group%20Breaches%20Top%20French%20Systems%20with%20Ivanti%20Zero%20Days&amp;severity=high&amp;id=686641c16f40f0eb7295ea25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-coinbases-400m-problem-started-in-an-indian-ca-6ecf0255</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Coinbase&apos;s%20%24400M%20Problem%20Started%20in%20an%20Indian%20Call%20Center&amp;severity=high&amp;id=68663e426f40f0eb7295bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9017-cwe-79-improper-neutralization-of-in-14912dfa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PeepSo%20PeepSo%20Core%3A%20Groups&amp;severity=high&amp;id=699f6b3cb7ef31ef0b54f97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5944-cwe-79-improper-neutralization-of-in-3f7c2899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=686609826f40f0eb7295299d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-03-6e779507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-03&amp;severity=medium&amp;id=68671bae6f40f0eb729e1a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45809-na-5867de01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45809%3A%20n%2Fa&amp;severity=medium&amp;id=6866d1e86f40f0eb729ab742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45938-na-5d0210d7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45938%3A%20n%2Fa&amp;severity=high&amp;id=686696236f40f0eb7297e394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43713-na-e9f0d502</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43713%3A%20n%2Fa&amp;severity=medium&amp;id=68668b996f40f0eb7297518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50263-na-6e991ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50263%3A%20n%2Fa&amp;severity=high&amp;id=686688156f40f0eb729702f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50262-na-bb3206df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50262%3A%20n%2Fa&amp;severity=high&amp;id=686688156f40f0eb729702f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50260-na-702121b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50260%3A%20n%2Fa&amp;severity=high&amp;id=686688156f40f0eb729702ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50258-na-02d98f93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50258%3A%20n%2Fa&amp;severity=high&amp;id=686684936f40f0eb7296d978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49618-na-fc17f159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49618%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20Plesk%20Obsidian&amp;severity=medium&amp;id=68667a046f40f0eb72967142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-that-unified-cm-has-hardcoded-root-ssh-75d179a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20that%20Unified%20CM%20has%20hardcoded%20root%20SSH%20credentials&amp;severity=high&amp;id=686599016f40f0eb7293d1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spain-arrests-hackers-who-targeted-politicians-and-e3f616e7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spain%20arrests%20hackers%20who%20targeted%20politicians%20and%20journalists&amp;severity=high&amp;id=6865957e6f40f0eb7293cafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43025-cwe-121-stack-based-buffer-overflow-cb3f8e3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43025%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20HP%20Inc.%20Universal%20Print%20Driver&amp;severity=medium&amp;id=68658e746f40f0eb7293c06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gitphish-automating-enterprise-github-device-code--aaa883cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitPhish%3A%20Automating%20Enterprise%20GitHub%20Device%20Code%20Phishing&amp;severity=medium&amp;id=68658af86f40f0eb7293bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34076-cwe-22-improper-limitation-of-a-pat-77ac7e06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34076%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microweber%20Ltd.%20CMS&amp;severity=medium&amp;id=68658af26f40f0eb7293bb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34074-cwe-94-improper-control-of-generati-67cb256b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34074%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Lucee%20Association%20Switzerland%20Lucee&amp;severity=critical&amp;id=68658af26f40f0eb7293bb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34075-cwe-276-incorrect-default-permissio-ac8634a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34075&amp;severity=null&amp;id=68658af26f40f0eb7293bb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34092-cwe-287-improper-authentication-in--033dccfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34092&amp;severity=null&amp;id=68658af26f40f0eb7293bb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34091-cwe-203-observable-discrepancy-in-g-c91d5921</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34091&amp;severity=null&amp;id=68658af26f40f0eb7293bb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34090-cwe-426-untrusted-search-path-in-go-a2cc4133</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34090&amp;severity=null&amp;id=68658af26f40f0eb7293bb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49713-cwe-843-access-of-resource-using-in-2268a784</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49713%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=6865b5226f40f0eb72940aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20309-use-of-hard-coded-credentials-in-ci-1eaa1647</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20309%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20Unified%20Communications%20Manager&amp;severity=critical&amp;id=686564476f40f0eb72933799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20307-improper-neutralization-of-input-du-75885c46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20BroadWorks&amp;severity=medium&amp;id=68655d3f6f40f0eb729329e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20310-improper-neutralization-of-input-du-d39f06aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Enterprise%20Chat%20and%20Email&amp;severity=medium&amp;id=68655d3f6f40f0eb729329ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20308-improper-neutralization-of-special--5e5f9075</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20308%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20DNA%20Spaces%20Connector&amp;severity=medium&amp;id=68655d3f6f40f0eb729329e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53359-cwe-754-improper-check-for-unusual--c252c774</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53359%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20rust-ethereum%20ethereum&amp;severity=medium&amp;id=686559bb6f40f0eb7293234a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6942-cwe-639-authorization-bypass-through-1daf1bb1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6942%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Delinea%20Secret%20Server&amp;severity=low&amp;id=686559bb6f40f0eb7293234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6943-cwe-269-improper-privilege-managemen-4be397ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6943%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Delinea%20Secret%20Server&amp;severity=low&amp;id=686556376f40f0eb72931bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53358-cwe-22-improper-limitation-of-a-pat-347219f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53358%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cinnamon%20kotaemon&amp;severity=medium&amp;id=686556376f40f0eb72931bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-confirms-major-data-breach-linked-to-third--6410db0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20Confirms%20Major%20Data%20Breach%20Linked%20to%20Third-Party%20Vendor&amp;severity=high&amp;id=686552b26f40f0eb72930f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dcrat-impersonating-the-colombian-government-3f409be2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DCRAT%20Impersonating%20the%20Colombian%20Government&amp;severity=medium&amp;id=68655d3e6f40f0eb729329c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52891-cwe-20-improper-input-validation-in-26cf4615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52891%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20owasp-modsecurity%20ModSecurity&amp;severity=medium&amp;id=68654baa6f40f0eb729301fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53108-cwe-862-missing-authorization-in-sy-f54aa66b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53108%3A%20CWE-862%3A%20Missing%20Authorization%20in%20sysadminsmedia%20homebox&amp;severity=medium&amp;id=686548286f40f0eb7292fbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53492-cwe-79-improper-neutralization-of-i-0aae481d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53492%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MintyDocs%20Extension&amp;severity=low&amp;id=686548286f40f0eb7292fbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6725-cwe-79-improper-neutralization-of-in-ff31e695</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Kendo%20UI%20for%20jQuery&amp;severity=medium&amp;id=686548286f40f0eb7292fbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53493-cwe-79-improper-neutralization-of-i-417d18c7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20MintyDocs%20Extension&amp;severity=medium&amp;id=686548286f40f0eb7292fbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53109-cwe-59-improper-link-resolution-bef-9d2ec939</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53109%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=high&amp;id=686544a26f40f0eb7292f606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53110-cwe-22-improper-limitation-of-a-pat-56a12e4f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53110%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelcontextprotocol%20servers&amp;severity=high&amp;id=686544a26f40f0eb7292f60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53494-cwe-79-improper-neutralization-of-i-873faefc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20TwoColConflict%20Extension&amp;severity=medium&amp;id=686544a26f40f0eb7292f60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/azure-api-vulnerability-and-built-in-roles-misconf-fd53c7ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Azure%20API%20vulnerability%20and%20built-in%20roles%20misconfiguration%20enable%20corporate%20network%20takeover&amp;severity=medium&amp;id=68653da06f40f0eb7292e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34073-cwe-78-improper-neutralization-of-s-a9bd4e39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34073%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Stamparm%20Maltrail&amp;severity=critical&amp;id=68653a166f40f0eb7292c95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34072-cwe-200-exposure-of-sensitive-infor-032fa7a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34072%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Anthropic%20Slack%20MCP%20Server&amp;severity=critical&amp;id=68653a166f40f0eb7292c959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34071-cwe-306-missing-authentication-for--6351caa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34071%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GFI%20Software%20Kerio%20Control&amp;severity=critical&amp;id=68653a166f40f0eb7292c955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34070-cwe-306-missing-authentication-for--0a8fd170</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34070%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GFI%20Software%20Kerio%20Control&amp;severity=critical&amp;id=68653a166f40f0eb7292c951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34069-cwe-306-missing-authentication-for--c5e2ad7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34069%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20GFI%20Software%20Kerio%20Control&amp;severity=critical&amp;id=68653a166f40f0eb7292c94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34067-cwe-502-deserialization-of-untruste-475dc43e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34067%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hikvision%20Integrated%20Security%20Management%20Platform&amp;severity=critical&amp;id=68653a166f40f0eb7292c948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34057-cwe-200-exposure-of-sensitive-infor-77de50a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34057%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Ruijie%20NBR%20Router&amp;severity=high&amp;id=68653a166f40f0eb7292c943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27026-cwe-1220-insufficient-granularity-o-c185744f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27026%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Infinera%20G42&amp;severity=medium&amp;id=68653a166f40f0eb7292c93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53106-cwe-285-improper-authorization-in-g-20c4b6ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53106%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Graylog2%20graylog2-server&amp;severity=high&amp;id=686536926f40f0eb7292bf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-eagle-linked-to-russian-host-proton66-in-lat-fe00a7d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Eagle%20Linked%20to%20Russian%20Host%20Proton66%20in%20Latin%20America%20Attacks&amp;severity=medium&amp;id=68652c066f40f0eb7292a8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/schizophrenic-zip-files-different-contents-dependi-68ad784e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22schizophrenic%22%20zip%20files.%20Different%20contents%20depending%20on%20your%20archive%20reader.&amp;severity=medium&amp;id=686528876f40f0eb7292a3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-russian-bulletproof-hosting-provider--06c9c1c3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%20Russian%20Bulletproof%20Hosting%20Provider%20for%20Supporting%20Cybercriminals%20Behind%20Ransomware&amp;severity=high&amp;id=686521796f40f0eb72928b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35164-cwe-129-improper-validation-of-arra-0de7912e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35164%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Apache%20Software%20Foundation%20Apache%20Guacamole&amp;severity=medium&amp;id=690a6f039e609817bf702c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46647-cwe-302-authentication-bypass-by-as-399ded76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46647%3A%20CWE-302%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Apache%20Software%20Foundation%20Apache%20APISIX&amp;severity=medium&amp;id=686516ee6f40f0eb72926ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/verizon-and-t-mobile-deny-data-breaches-as-million-32b95ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Verizon%20and%20T-Mobile%20Deny%20Data%20Breaches%20as%20Millions%20of%20User%20Records%20Sold%20Online&amp;severity=medium&amp;id=686513696f40f0eb729268b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39362-cwe-862-missing-authorization-in-mo-4cb172d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39362%3A%20Missing%20Authorization%20in%20Mollie%20Mollie%20Payments%20for%20WooCommerce&amp;severity=null&amp;id=686513796f40f0eb729268da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27025-cwe-280-improper-handling-of-insuff-585f5fc2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27025%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Infinera%20G42&amp;severity=high&amp;id=686505596f40f0eb72924fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27024-cwe-274-improper-handling-of-insuff-d69902b5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27024%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Infinera%20G42&amp;severity=medium&amp;id=686501d56f40f0eb7292445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2330-cwe-79-improper-neutralization-of-in-14c468f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2330%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesgrove%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=6864fe536f40f0eb72923f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4946-cwe-22-improper-limitation-of-a-path-c12c2799</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4946%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Odin_Design%20Vikinger&amp;severity=high&amp;id=6864fe536f40f0eb72923f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27023-cwe-20-improper-input-validation-in-80293b28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27023%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Infinera%20G42&amp;severity=medium&amp;id=6864fad36f40f0eb72923030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27022-vulnerability-in-infinera-g42-3c26284d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27022%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Infinera%20G42&amp;severity=high&amp;id=6864f74a6f40f0eb729229ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qantas-discloses-cyberattack-amid-scattered-spider-667a35e0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qantas%20discloses%20cyberattack%20amid%20Scattered%20Spider%20aviation%20breaches&amp;severity=high&amp;id=6864f3c56f40f0eb72921eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27021-vulnerability-in-infinera-g42-0bfbb11a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27021%3A%20Vulnerability%20in%20Infinera%20G42&amp;severity=high&amp;id=6864f3d76f40f0eb72921eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24335-vulnerability-in-nokia-nokia-single-47a28609</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24335%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=low&amp;id=6864f0416f40f0eb729218b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24334-vulnerability-in-nokia-nokia-single-01e00d81</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24334%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=low&amp;id=6864f0416f40f0eb729218b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24333-vulnerability-in-nokia-nokia-single-551633e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24333%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24332-vulnerability-in-nokia-nokia-single-a33105b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24332%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN%20AirScale%20(Flexi%20Multiradio%20is%20not%20affected)&amp;severity=high&amp;id=6864f0416f40f0eb729218af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24331-vulnerability-in-nokia-nokia-single-f1b366a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24331%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24330-vulnerability-in-nokia-nokia-single-cfc610ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24330%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24329-vulnerability-in-nokia-nokia-single-6c6517e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24329%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864f0416f40f0eb729218a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24328-vulnerability-in-nokia-nokia-single-9c62c669</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24328%3A%20Vulnerability%20in%20Nokia%20Nokia%20Single%20RAN&amp;severity=medium&amp;id=6864e5b56f40f0eb72920451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-warns-critical-chrome-flaw-letting-hackers--5332c6ac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Warns%3A%20Critical%20Chrome%20Flaw%20Letting%20Hackers%20Take%20Over%20PCs%20Is%20Already%20Being%20Exploited&amp;severity=critical&amp;id=6864deb76f40f0eb7291e925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-threat-case-of-kimsuky-group-using-ed55dcc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20threat%20case%20of%20kimsuky%20group%20using%20&apos;ClickFix&apos;%20tactic&amp;severity=medium&amp;id=6864e2316f40f0eb7291f913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-encrypted-an-excel-file-into-a-wav-no-aes-no-cip-e2f2f687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20encrypted%20an%20Excel%20file%20into%20a%20.wav%20%E2%80%94%20no%20AES%2C%20no%20ciphertext%2C%20no%20memory%20traces.&amp;severity=high&amp;id=6864deb76f40f0eb7291e929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/devman-ransomware-analysis-of-new-dragonforce-vari-fff3d9f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DEVMAN%20Ransomware%3A%20Analysis%20of%20New%20DragonForce%20Variant&amp;severity=medium&amp;id=6864deb26f40f0eb7291e877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistani-freelancers-building-cracking-websites-f-ab88008e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistani%20freelancers%20building%20cracking%20websites%20for%20stealer-delivery&amp;severity=medium&amp;id=6864deb26f40f0eb7291e87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dire-wolf-strikes-new-ransomware-group-targeting-g-3127f34b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dire%20Wolf%20Strikes%3A%20New%20Ransomware%20Group%20Targeting%20Global%20Sectors&amp;severity=medium&amp;id=6864deb26f40f0eb7291e90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13786-cwe-502-deserialization-of-untruste-33c4921d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13786%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Education%20Center%20%7C%20LMS%20%26%20Online%20Courses%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6017-exposure-of-private-personal-informa-d5b0c2cd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6017%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=6864d7a66f40f0eb7291c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13451-cwe-200-exposure-of-sensitive-infor-ac4f6206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13451%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59ea0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6464-cwe-502-deserialization-of-untrusted-0db8fda1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6464%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=6864c9966f40f0eb7291a3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52463-cross-site-request-forgery-csrf-in--43bc583b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52463%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20QUALITIA%20CO.%2C%20LTD.%20Active!%20mail%206&amp;severity=low&amp;id=6864bf186f40f0eb72918bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52462-cross-site-scripting-xss-in-qualiti-a46aff97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52462%3A%20Cross-site%20scripting%20(XSS)%20in%20QUALITIA%20CO.%2C%20LTD.%20Active!%20mail%206&amp;severity=medium&amp;id=6864bf186f40f0eb72918bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6463-cwe-73-external-control-of-file-name-ca627c71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6463%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=6864b8046f40f0eb72917e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11405-cwe-79-improper-neutralization-of-i-8e2faa78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hellomohsinkhan%20WP%20Front-end%20login%20and%20register&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5339-cwe-89-improper-neutralization-of-sp-9a6cc5db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5339%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3848-cwe-639-authorization-bypass-through-a4519531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3848&amp;severity=null&amp;id=6864b0fa6f40f0eb72917170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5014-cwe-22-improper-limitation-of-a-path-1d97d9a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5014%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chimp%20Group%20Home%20Villas%20%7C%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=6864b0fa6f40f0eb72917184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6437-cwe-89-improper-neutralization-of-sp-34507a75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5817-cwe-918-server-side-request-forgery--6d9186be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5817%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20suhailahmad64%20Amazon%20Products%20to%20WooCommerce&amp;severity=high&amp;id=6864b0fa6f40f0eb72917190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4654-cwe-285-improper-authorization-in-so-cd1c97ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4654%3A%20CWE-285%20Improper%20Authorization%20in%20soumettre%20Soumettre.fr&amp;severity=low&amp;id=6864b0fa6f40f0eb7291717c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6686-cwe-79-improper-neutralization-of-in-a7df0e3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rexdot%20Magic%20Buttons%20for%20Elementor&amp;severity=medium&amp;id=6864b0fa6f40f0eb729171a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5746-cwe-434-unrestricted-upload-of-file--3bf66bd0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5746%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeDropz%20Drag%20and%20Drop%20Multiple%20File%20Upload%20(Pro)%20-%20WooCommerce&amp;severity=critical&amp;id=6864b0fa6f40f0eb7291718c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4380-cwe-98-improper-control-of-filename--1386923b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4380%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6687-cwe-79-improper-neutralization-of-in-b75c0fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rexdot%20Magic%20Buttons%20for%20Elementor&amp;severity=medium&amp;id=6864b0fa6f40f0eb729171aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6459-cwe-352-cross-site-request-forgery-c-d3e72276</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6459%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb729171a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4381-cwe-89-improper-neutralization-of-sp-3520b6ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4381%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=6864b0fa6f40f0eb72917178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4689-cwe-98-improper-control-of-filename--9a41e4ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4689%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=critical&amp;id=6864b0fa6f40f0eb72917180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5692-cwe-862-missing-authorization-in-sma-b9a402aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5692%3A%20CWE-862%20Missing%20Authorization%20in%20smackcoders%20Lead%20Form%20Data%20Collection%20to%20CRM&amp;severity=medium&amp;id=68649be16f40f0eb729133b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-rce-in-anthropic-mcp-inspector-cve-2025-4-d319eeba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20RCE%20in%20Anthropic%20MCP%20Inspector%20(CVE-2025-49596)%20Enables%20Browser-Based%20Exploits%20%7C%20Oligo%20Security&amp;severity=critical&amp;id=68647c456f40f0eb7290f1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-02-a03910e6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-02&amp;severity=medium&amp;id=6865ca2e6f40f0eb7294436e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45813-na-4dd3d50a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45813%3A%20n%2Fa&amp;severity=critical&amp;id=68656b616f40f0eb72934467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45814-na-7ae9ef76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45814%3A%20n%2Fa&amp;severity=critical&amp;id=686567ca6f40f0eb72933c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45424-na-f5d241ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45424%3A%20n%2Fa&amp;severity=medium&amp;id=686560c36f40f0eb72932f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wing-ftp-server-743-unauthenticated-remote-code-ex-bd3169d1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wing%20FTP%20Server%207.4.3%20-%20Unauthenticated%20Remote%20Code%20Execution%20%20(RCE)&amp;severity=critical&amp;id=68653a7e6f40f0eb7292de06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gogs-0130-remote-code-execution-rce-3316daa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=gogs%200.13.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68653a7e6f40f0eb7292de01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-sharepoint-2019-ntlm-authentication-ccfa1318</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20SharePoint%202019%20-%20NTLM%20Authentication&amp;severity=medium&amp;id=68653a7e6f40f0eb7292ddfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moodle-440-authenticated-remote-code-execution-c7bf16f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Moodle%204.4.0%20-%20Authenticated%20Remote%20Code%20Execution&amp;severity=critical&amp;id=68653a7e6f40f0eb7292ddf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45029-na-acde60b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45029%3A%20n%2Fa&amp;severity=medium&amp;id=68653a166f40f0eb7292c964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52925-cwe-402-transmission-of-private-res-64c4d984</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52925%3A%20CWE-402%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20OneLogin%20Active%20Directory%20Connector&amp;severity=medium&amp;id=6864a9ff6f40f0eb729165b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36630-cwe-269-improper-privilege-manageme-915752f2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36630%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Nessus&amp;severity=high&amp;id=68646e2d6f40f0eb7290c91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49741-information-disclosure-in-microsoft-fa1ed6d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49741%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=686463a26f40f0eb7290b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kelly-benefits-says-2024-data-breach-impacts-55000-21f9a05b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kelly%20Benefits%20says%202024%20data%20breach%20impacts%20550%2C000%20customers&amp;severity=high&amp;id=686447806f40f0eb72907f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-vulnerability-in-anthropics-mcp-exposes-d-24443e78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20Vulnerability%20in%20Anthropic&apos;s%20MCP%20Exposes%20Developer%20Machines%20to%20Remote%20Exploits&amp;severity=critical&amp;id=686447806f40f0eb72907f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46259-cwe-862-missing-authorization-in-po-9cba0e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46259%3A%20CWE-862%20Missing%20Authorization%20in%20POSIMYTH%20Innovation%20The%20Plus%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=686435ee6f40f0eb72905e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-issues-emergency-patch-for-fourth-chrome-ze-6fba4b59</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Issues%20Emergency%20Patch%20for%20Fourth%20Chrome%20Zero-Day%20of%202025&amp;severity=critical&amp;id=686432696f40f0eb72905758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta829-and-unkgreensec-share-tactics-and-infrastruc-57fdc3cb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA829%20and%20UNK_GreenSec%20Share%20Tactics%20and%20Infrastructure%20in%20Ongoing%20Malware%20Campaigns&amp;severity=high&amp;id=686432696f40f0eb7290575c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-runs-jscript-while-bypassing-wi-d59bf21c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20runs%20JScript%20while%20bypassing%20Windows%20MoTW%20alerts&amp;severity=high&amp;id=686432696f40f0eb72905760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6600-cwe-200-exposure-of-sensitive-inform-1b0ce5b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6600%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=686432966f40f0eb72905816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48379-cwe-122-heap-based-buffer-overflow--03acfed7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48379%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20python-pillow%20Pillow&amp;severity=high&amp;id=68642b616f40f0eb72904a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27153-cwe-284-improper-access-control-in--54732b9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27153%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20pluginsGLPI%20escalade&amp;severity=medium&amp;id=68642b616f40f0eb72904a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53104-cwe-77-improper-neutralization-of-s-24128111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53104%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gluestack%20gluestack-ui&amp;severity=critical&amp;id=686427df6f40f0eb72904267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53103-cwe-312-cleartext-storage-of-sensit-443eca72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53103%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20junit-team%20junit-framework&amp;severity=medium&amp;id=686427df6f40f0eb7290427d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34081-cwe-215-insertion-of-sensitive-info-e29c9506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34081%3A%20CWE-215%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20Contec%20Co.%2CLtd.%20CONPROSYS%20HMI%20System%20(CHS)&amp;severity=medium&amp;id=686424586f40f0eb72903b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53107-cwe-77-improper-neutralization-of-s-91fb5c9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53107%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20cyanheads%20git-mcp-server&amp;severity=high&amp;id=686424586f40f0eb72903b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34080-cwe-79-improper-neutralization-of-i-58bc2207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Contec%20Co.%2CLtd.%20CONPROSYS%20HMI%20System%20(CHS)&amp;severity=medium&amp;id=68642ee56f40f0eb72905145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53100-cwe-78-improper-neutralization-of-s-9a50e6ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53100%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RestDB%20codehooks-mcp-server&amp;severity=high&amp;id=68642ee56f40f0eb72905148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37099-vulnerability-in-hewlett-packard-en-843dd151</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37099%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20Insight%20Remote%20Support&amp;severity=critical&amp;id=68641d506f40f0eb72902ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6297-vulnerability-in-debian-dpkg-772a11f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6297%3A%20Vulnerability%20in%20Debian%20dpkg&amp;severity=high&amp;id=68641d506f40f0eb72902caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6963-sql-injection-in-campcodes-employee--66199294</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6963%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=68640bbc6f40f0eb7290079f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-health-insurance-scam-stealing-person-39c96457</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Health%20Insurance%20Scam%20Stealing%20Personal%20and%20Medical%20Data&amp;severity=medium&amp;id=6864012f6f40f0eb728feb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6962-sql-injection-in-campcodes-employee--6637eafa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6962%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=686401476f40f0eb728feba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6961-sql-injection-in-campcodes-employee--3efba6cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6961%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=686401476f40f0eb728feb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-chrome-remote-desktop-on-red-team-operatio-001c646a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Chrome%20Remote%20Desktop%20on%20Red%20Team%20Operations&amp;severity=medium&amp;id=6863fa2c6f40f0eb728fdb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6960-sql-injection-in-campcodes-employee--e2a9bf0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6960%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863fdad6f40f0eb728fe34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6959-sql-injection-in-campcodes-employee--19a01ab1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6959%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863fdad6f40f0eb728fe345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53099-cwe-288-authentication-bypass-using-399d2a95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53099%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20getsentry%20sentry&amp;severity=medium&amp;id=6863fa286f40f0eb728fdb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34064-cwe-668-exposure-of-resource-to-wro-e1cdf2d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34064%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20One%20Identity%20OneLogin%20Active%20Directory%20Connector%20(ADC)&amp;severity=critical&amp;id=6863fa286f40f0eb728fdb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34063-cwe-290-authentication-bypass-by-sp-733a1652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34063%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20One%20Identity%20OneLogin%20Active%20Directory%20Connector%20(ADC)&amp;severity=critical&amp;id=6863fa286f40f0eb728fdb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34062-cwe-200-exposure-of-sensitive-infor-3639691e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34062%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20One%20Identity%20OneLogin%20Active%20Directory%20Connector%20(ADC)&amp;severity=medium&amp;id=6863fa286f40f0eb728fdb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34060-cwe-502-deserialization-of-untruste-c33c1ba1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34060%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Monero%20Project%20Forum&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34059-cwe-89-improper-neutralization-of-s-abda9564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34059%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Zhejiang%20Dahua%20Technology%20Co.%2C%20Ltd.%20Smart%20Cloud%20Gateway%20Registration%20Management%20Platform&amp;severity=high&amp;id=6863f6b26f40f0eb728fd277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34058-cwe-521-weak-password-requirements--e2cfa22e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34058%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Hangzhou%20Hikvision%20System%20Technology%20Streaming%20Media%20Management%20Server&amp;severity=high&amp;id=6863f6b26f40f0eb728fd271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34066-cwe-295-improper-certificate-valida-943f7438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34066%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20AVTECH%20IP%20cameras&amp;severity=high&amp;id=6863f6b26f40f0eb728fd295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34065-cwe-290-authentication-bypass-by-sp-c0e8f4bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34065%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34056-cwe-78-improper-neutralization-of-s-16a6e2da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34056%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34055-cwe-78-improper-neutralization-of-s-624e895d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34055%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34054-cwe-78-improper-neutralization-of-s-df4e5597</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34054%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20Devices&amp;severity=critical&amp;id=6863f6b26f40f0eb728fd25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34053-cwe-290-authentication-bypass-by-sp-6715cd2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34053%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20AVTECH%20IP%20camera%2C%20DVR%2C%20and%20NVR%20devices&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34052-cwe-200-exposure-of-sensitive-infor-fb5e6524</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34052&amp;severity=null&amp;id=6863f6b26f40f0eb728fd24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34051-cwe-918-server-side-request-forgery-36ecbbcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34051%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20AVTECH%20DVR%20devices&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34050-cwe-352-cross-site-request-forgery--7ad5b654</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34050%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AVTECH%20IP%20cameras&amp;severity=medium&amp;id=6863f6b26f40f0eb728fd240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/johnson-controls-starts-notifying-people-affected--3018451e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Johnson%20Controls%20starts%20notifying%20people%20affected%20by%202023%20breach&amp;severity=high&amp;id=6863f6a36f40f0eb728fd1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37098-vulnerability-in-hewlett-packard-en-b3168c0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37098%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20Insight%20Remote%20Support&amp;severity=high&amp;id=6863f6b36f40f0eb728fd29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/esse-health-says-recent-data-breach-affects-over-2-79accac1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Esse%20Health%20says%20recent%20data%20breach%20affects%20over%20263%2C000%20patients&amp;severity=high&amp;id=6863f3216f40f0eb728fc6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/international-criminal-court-hit-by-new-sophistica-e21c8a5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=International%20Criminal%20Court%20hit%20by%20new%20&apos;sophisticated&apos;%20cyberattack&amp;severity=high&amp;id=6863f3216f40f0eb728fc6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6958-sql-injection-in-campcodes-employee--93d80e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6958%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863f6b36f40f0eb728fd2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6957-sql-injection-in-campcodes-employee--b562e030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6957%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863f6b36f40f0eb728fd29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37097-vulnerability-in-hewlett-packard-en-9a4f6ee4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37097%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20Insight%20Remote%20Support&amp;severity=high&amp;id=6863ef9a6f40f0eb728fbc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6956-sql-injection-in-campcodes-employee--2e0f7a37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6956%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863ef9a6f40f0eb728fbc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6955-sql-injection-in-campcodes-employee--230c3e13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6955%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863ef9a6f40f0eb728fbc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6954-sql-injection-in-campcodes-employee--232d8a35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6954%3A%20SQL%20Injection%20in%20Campcodes%20Employee%20Management%20System&amp;severity=medium&amp;id=6863e8936f40f0eb728f960e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6953-buffer-overflow-in-totolink-a3002ru-c3a1a1b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6953%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=6863e8936f40f0eb728f9606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49029-cwe-94-improper-control-of-generati-49f2ecf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49029%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20bitto.kazi%20Custom%20Login%20And%20Signup%20Widget&amp;severity=null&amp;id=6863e50e6f40f0eb728f8e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6920-missing-authentication-for-critical--e3815abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6920%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Red%20Hat%20Red%20Hat%20AI%20Inference%20Server&amp;severity=medium&amp;id=6863e18a6f40f0eb728f87d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36582-cwe-757-selection-of-less-secure-al-cd7ff949</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36582%3A%20CWE-757%3A%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20Dell%20NetWorker&amp;severity=medium&amp;id=6863e18a6f40f0eb728f87d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6952-reachable-assertion-in-open5gs-c126f65b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6952%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6951-use-of-default-credentials-in-safeca-064a05f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6951%3A%20Use%20of%20Default%20Credentials%20in%20SAFECAM%20X300&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49483-cwe-404-improper-resource-shutdown--4bf83b7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49483%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49482-cwe-404-improper-resource-shutdown--a762c085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49482%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5314-cwe-79-improper-neutralization-of-in-707635bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=6863c9006f40f0eb728f0ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-use-microsoft-365-direct-send-to-spoof-em-b59b51a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Use%20Microsoft%20365%20Direct%20Send%20to%20Spoof%20Emails%20Targeting%20over%2070%20US%20Firms&amp;severity=medium&amp;id=6863c8ef6f40f0eb728f0ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49481-cwe-404-improper-resource-shutdown--07cef312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49481%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c56a6f40f0eb728f061c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49480-cwe-125-out-of-bounds-read-in-asr-f-267a2d7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49480%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=high&amp;id=6863c56a6f40f0eb728f0619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49488-cwe-404-improper-resource-shutdown--4b133afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49488%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863c1e66f40f0eb728efaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49492-cwe-787-out-of-bounds-write-in-asr--a5fff6b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49492%3A%20CWE-787%20Out-of-bounds%20Write%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=high&amp;id=6863c1e66f40f0eb728efaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6224-cwe-312-cleartext-storage-of-sensiti-a092c9f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6224%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Canonical%20Juju%20utils&amp;severity=medium&amp;id=6863be626f40f0eb728ef548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49491-cwe-404-improper-resource-shutdown--dc504d74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49491%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863be626f40f0eb728ef545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-arrests-facilitator-in-north-korean-it-worker-s-9a1e77d3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Arrests%20Facilitator%20in%20North%20Korean%20IT%20Worker%20Scheme%3B%20Seizes%2029%20Domains%20and%20Raids%2021%20Laptop%20Farms&amp;severity=high&amp;id=6863b7596f40f0eb728ee813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-patches-critical-zero-day-flaw-in-chromes-v-b84b5959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Patches%20Critical%20Zero-Day%20Flaw%20in%20Chrome%E2%80%99s%20V8%20Engine%20After%20Active%20Exploitation&amp;severity=critical&amp;id=6863b7596f40f0eb728ee80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49490-cwe-404-improper-resource-shutdown--24fd8c7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49490%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863b3da6f40f0eb728ee0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49489-cwe-404-improper-resource-shutdown--837fe796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49489%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863b0516f40f0eb728ed6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6756-cwe-79-improper-neutralization-of-in-a29aa7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=medium&amp;id=6863accd6f40f0eb728ecda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5072-cwe-404-improper-resource-shutdown-o-b7db4735</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5072%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20ASR%20Falcon_Linux%E3%80%81Kestrel%E3%80%81Lapwing_Linux&amp;severity=medium&amp;id=6863a5c56f40f0eb728ebeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41648-cwe-704-incorrect-type-conversion-o-ea121f93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41648%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20Pilz%20IndustrialPI%204%20with%20IndustrialPI%20webstatus&amp;severity=critical&amp;id=68639b396f40f0eb728ea645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41656-cwe-306-missing-authentication-for--3e183b9f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41656%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pilz%20IndustrialPI%204%20with%20Firmware%20Bullseye&amp;severity=critical&amp;id=68639b396f40f0eb728ea648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/10-things-i-hate-about-attribution-romcom-vs-trans-9cad9744</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=10%20Things%20I%20Hate%20About%20Attribution%3A%20RomCom%20vs.%20TransferLoader&amp;severity=medium&amp;id=68639b396f40f0eb728ea5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-we-got-persistent-xss-on-every-aem-cloud-site--5445cba1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20we%20got%20persistent%20XSS%20on%20every%20AEM%20cloud%20site%2C%20thrice&amp;severity=medium&amp;id=6863943b6f40f0eb728e96b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6934-cwe-269-improper-privilege-managemen-c1a44303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6934%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpopal%20Opal%20Estate%20Pro%20%E2%80%93%20Property%20Management%20and%20Submission&amp;severity=critical&amp;id=686386216f40f0eb728e62a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rce-through-path-traversal-e5998bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RCE%20through%20Path%20Traversal&amp;severity=medium&amp;id=68636d886f40f0eb728e3a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6081-cwe-522-insufficiently-protected-cre-9c2dfdab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6081%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Konica%20Minolta%20bizhub%20227%20Multifunction%20printers&amp;severity=medium&amp;id=68635bf26f40f0eb728e15ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5967-cwe-79-improper-neutralization-of-in-23645f05</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Trellix%20Endpoint%20Security%20HX&amp;severity=medium&amp;id=686354ef6f40f0eb728e0a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6940-buffer-overflow-in-totolink-a702r-3c4383d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6940%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68634de26f40f0eb728df7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6939-buffer-overflow-in-totolink-a3002ru-2ebf29d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6939%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=68634de26f40f0eb728df7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53095-cwe-352-cross-site-request-forgery--44568b1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53095%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LizardByte%20Sunshine&amp;severity=critical&amp;id=686343566f40f0eb728ddd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53096-cwe-1021-improper-restriction-of-re-e3d2d295</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53096%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20LizardByte%20Sunshine&amp;severity=medium&amp;id=686343566f40f0eb728ddd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6938-sql-injection-in-code-projects-simpl-4152240a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6938%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=686343566f40f0eb728ddd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53003-cwe-200-exposure-of-sensitive-infor-ba5c7b0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53003%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20JanssenProject%20jans&amp;severity=high&amp;id=686343566f40f0eb728ddd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2141-cwe-79-improper-neutralization-of-in-bbcd645b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20System%20Storage%20Virtualization%20Engine%20TS7700&amp;severity=medium&amp;id=686338ca6f40f0eb728dc231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36056-cwe-79-improper-neutralization-of-i-96eb1d70</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20System%20Storage%20Virtualization%20Engine%20TS7700&amp;severity=medium&amp;id=686338ca6f40f0eb728dc234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6937-sql-injection-in-code-projects-simpl-f1567775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6937%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=686331d96f40f0eb728db533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6936-sql-injection-in-code-projects-simpl-aebd10af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6936%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=686327386f40f0eb728d98d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-07-01-7b6b7cea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-07-01&amp;severity=medium&amp;id=686478ae6f40f0eb7290e14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45006-na-0af3d6cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45006%3A%20n%2Fa&amp;severity=critical&amp;id=686443fd6f40f0eb72907909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52101-na-6e023dbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52101%3A%20n%2Fa&amp;severity=critical&amp;id=686443fd6f40f0eb72907905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52294-na-a8b776b4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52294%3A%20n%2Fa&amp;severity=medium&amp;id=686427df6f40f0eb7290427a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45083-na-513a37da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45083%3A%20n%2Fa&amp;severity=medium&amp;id=686427df6f40f0eb72904277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45081-na-92201d0a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45081%3A%20n%2Fa&amp;severity=high&amp;id=686427df6f40f0eb72904274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45080-na-71ec5081</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45080&amp;severity=null&amp;id=686427df6f40f0eb72904271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50641-na-b5fc8168</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50641%3A%20n%2Fa&amp;severity=medium&amp;id=6863fdad6f40f0eb728fe342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50405-na-baadd943</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50405%3A%20n%2Fa&amp;severity=medium&amp;id=6863f33c6f40f0eb728fc775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50404-na-7e73f67e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50404%3A%20n%2Fa&amp;severity=medium&amp;id=6863f33c6f40f0eb728fc771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45872-na-afaf107a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45872%3A%20n%2Fa&amp;severity=critical&amp;id=6863ef9a6f40f0eb728fbc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6935-sql-injection-in-campcodes-sales-and-7d3e3e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6935%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=686320336f40f0eb728d8b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6932-use-of-hard-coded-password-in-d-link-d334a178</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6932%3A%20Use%20of%20Hard-coded%20Password%20in%20D-Link%20DCS-7517&amp;severity=medium&amp;id=686319266f40f0eb728d808e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6931-insufficient-entropy-in-d-link-dcs-6-60f4ce29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6931%3A%20Insufficient%20Entropy%20in%20D-Link%20DCS-6517&amp;severity=medium&amp;id=6863121e6f40f0eb728d7521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6930-sql-injection-in-phpgurukul-zoo-mana-a2e6a1ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6930%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=68630b166f40f0eb728d467a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6554-type-confusion-in-google-chrome-3352da1d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6554%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6863008a6f40f0eb728cf6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6929-sql-injection-in-phpgurukul-zoo-mana-8cf95c74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6929%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=6863008a6f40f0eb728cf6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49520-improper-neutralization-of-argument-eb21abb6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49520%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=6862f9826f40f0eb728cea5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49521-improper-control-of-generation-of-c-aad92b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49521%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.5%20for%20RHEL%208&amp;severity=high&amp;id=6862f9826f40f0eb728cea63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-the-null-wing-ftp-server-rce-cve-2025-47812-0ade04ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20the%20NULL%3F!%20Wing%20FTP%20Server%20RCE%20(CVE-2025-47812)&amp;severity=medium&amp;id=6862eb826f40f0eb728cc41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-agencies-warn-of-rising-iranian-cyberattacks-on-5fd53a26</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Agencies%20Warn%20of%20Rising%20Iranian%20Cyberattacks%20on%20Defense%2C%20OT%20Networks%2C%20and%20Critical%20Infrastructure&amp;severity=critical&amp;id=6862eb716f40f0eb728cc3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hide-your-rdp-password-spray-leads-to-ransomhub-de-e8682047</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hide%20Your%20RDP%3A%20Password%20Spray%20Leads%20to%20RansomHub%20Deployment&amp;severity=medium&amp;id=686397b46f40f0eb728e9e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36593-cwe-294-authentication-bypass-by-ca-e3a203af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36593%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Dell%20OpenManage%20Network%20Integration&amp;severity=high&amp;id=6862dd626f40f0eb728ca985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6925-path-traversal-in-dromara-ruoyi-vue--771e1f7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6925%3A%20Path%20Traversal%20in%20Dromara%20RuoYi-Vue-Plus&amp;severity=medium&amp;id=6862d65a6f40f0eb728c9b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6917-sql-injection-in-code-projects-onlin-794c1731</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6917%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Booking&amp;severity=medium&amp;id=6862cbce6f40f0eb728c82e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/c4-bomb-blowing-up-chromes-appbound-cookie-encrypt-5ae52fd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=C4%20Bomb%3A%20Blowing%20Up%20Chrome%E2%80%99s%20AppBound%20Cookie%20Encryption&amp;severity=medium&amp;id=6862c85d6f40f0eb728c7d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blind-eagle-uses-proton66-hosting-for-phishing-rat-c99a7c8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blind%20Eagle%20Uses%20Proton66%20Hosting%20for%20Phishing%2C%20RAT%20Deployment%20on%20Colombian%20Banks&amp;severity=high&amp;id=6862c4c46f40f0eb728c7589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/switzerland-says-government-data-stolen-in-ransomw-8b7d63d3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Switzerland%20says%20government%20data%20stolen%20in%20ransomware%20attack&amp;severity=high&amp;id=6862c4c46f40f0eb728c7585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6916-missing-authentication-in-totolink-t-4ade07db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6916%3A%20Missing%20Authentication%20in%20TOTOLINK%20T6&amp;severity=high&amp;id=6862c4e76f40f0eb728c75eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6915-sql-injection-in-phpgurukul-student--22a5104c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6915%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862bdbc6f40f0eb728c6b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snake-keylogger-in-geopolitical-affairs-abuse-of-t-176536a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Snake%20Keylogger%20in%20Geopolitical%20Affairs%3A%20Abuse%20of%20Trusted%20Java%20Utilities%20in%20Cybercrime%20Operations&amp;severity=medium&amp;id=6862bdbb6f40f0eb728c6aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6914-sql-injection-in-phpgurukul-student--83300127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6914%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862b6b56f40f0eb728c2b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chromes-appbound-cookie-encryption-bypassed-via-si-513fc001</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chrome%E2%80%99s%20AppBound%20Cookie%20Encryption%20Bypassed%20via%20Side-Channel%20Timing%20Attack&amp;severity=medium&amp;id=6862b3376f40f0eb728c1c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6913-sql-injection-in-phpgurukul-student--564a4c4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6913%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862afac6f40f0eb728c1551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6912-sql-injection-in-phpgurukul-student--fe2ae53d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6912%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862ac286f40f0eb728c07ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2895-cwe-80-improper-neutralization-of-sc-4e596712</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2895%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Cloud%20Pak%20System&amp;severity=medium&amp;id=6862a5206f40f0eb728bef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6911-sql-injection-in-phpgurukul-student--f10e6bae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6911%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6862a19c6f40f0eb728bea92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tat-de-lart-sur-le-phishing-azure-en-2025-partie-1-5e7aa41a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%C3%89tat%20de%20l%E2%80%99art%20sur%20le%20phishing%20Azure%20en%202025%20(partie%201)%20%E2%80%93%20Device%20code%20flow&amp;severity=medium&amp;id=68629e1a6f40f0eb728be276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6910-sql-injection-in-phpgurukul-student--e448adfe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6910%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=68629a946f40f0eb728bd836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-2-ransomware-attacks-on-2-hospitals-led-to-2-d-62b1f6a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%202%20Ransomware%20Attacks%20on%202%20Hospitals%20Led%20to%202%20Deaths%20in%20Europe&amp;severity=medium&amp;id=6862938b6f40f0eb728bb920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6909-sql-injection-in-phpgurukul-old-age--d91edb37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6909%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=686293986f40f0eb728bb960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6908-sql-injection-in-phpgurukul-old-age--83d50dd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6908%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=68628c836f40f0eb728ba6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6907-sql-injection-in-code-projects-car-r-c2cd9d1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6907%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=686289006f40f0eb728b9f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6906-sql-injection-in-code-projects-car-r-8fd04550</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6906%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=686281f76f40f0eb728b8dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6905-sql-injection-in-code-projects-car-r-b62c8bf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6905%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=6862776c6f40f0eb728b71d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4407-cwe-613-insufficient-session-expirat-b88e8a8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4407%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ABB%20Lite%20Panel%20Pro&amp;severity=medium&amp;id=686273e86f40f0eb728a85b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6904-sql-injection-in-code-projects-car-r-fc0c9c18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6904%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=686270646f40f0eb728a7fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40710-cwe-74-improper-neutralization-of-s-571e1fcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40710%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Hotspot%20Shield%20Hotspot%20Shield%20VPN%20client&amp;severity=low&amp;id=68626ce16f40f0eb728a7a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6903-sql-injection-in-code-projects-car-r-ea66095a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6903%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=6862695c6f40f0eb728a7373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6902-sql-injection-in-code-projects-inven-a7081703</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6902%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686265d86f40f0eb728a647e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/norwegian-dam-valve-forced-open-for-hours-in-cyber-9713ca00</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Norwegian%20Dam%20Valve%20Forced%20Open%20for%20Hours%20in%20Cyberattack&amp;severity=medium&amp;id=68625ecf6f40f0eb728a4a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8419-cwe-306-missing-authentication-for-c-2a031bf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8419%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ifm%20electronic%20GmbH%20ifm%20Smart%20PLC%20AC402s&amp;severity=high&amp;id=6994257080d747be207b7295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6901-sql-injection-in-code-projects-inven-bddd79d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6901%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=68625b4c6f40f0eb728a27ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41439-cross-site-scripting-xss-in-ricoh-c-54195313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41439%3A%20Cross-site%20scripting%20(XSS)%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX&amp;severity=medium&amp;id=68625b4c6f40f0eb728a27f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53416-793170fd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53416%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Delta%20Electronics%20DTN%20Soft&amp;severity=high&amp;id=68625b4c6f40f0eb728a27fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53415-cwe-502-deserialization-of-untruste-250f03c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53415%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Delta%20Electronics%20DTM%20Soft&amp;severity=high&amp;id=686257c86f40f0eb728a1f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6900-unrestricted-upload-in-code-projects-da5840fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6900%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686254446f40f0eb728a1987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6899-os-command-injection-in-d-link-di-73-f8e4828f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6899%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=68624d3c6f40f0eb728a0cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6898-os-command-injection-in-d-link-di-73-04304382</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6898%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=686246346f40f0eb7289fa42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ahold-delhaize-confirms-data-breach-of-22m-amid-in-e14e10db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ahold%20Delhaize%20Confirms%20Data%20Breach%20of%202.2M%20amid%20INC%20Ransomware%20Claims&amp;severity=high&amp;id=686242af6f40f0eb7289f521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6897-os-command-injection-in-d-link-di-73-8bb9c869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6897%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=68623f2c6f40f0eb7289ef61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6896-os-command-injection-in-d-link-di-73-6cfef37a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6896%3A%20OS%20Command%20Injection%20in%20D-Link%20DI-7300G%2B&amp;severity=medium&amp;id=686238236f40f0eb728960c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6891-sql-injection-in-code-projects-inven-816e959b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6891%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6862311b6f40f0eb728954ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6890-sql-injection-in-code-projects-movie-b50d79e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6890%3A%20SQL%20Injection%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=68622a136f40f0eb72893b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5730-cwe-79-cross-site-scripting-xss-in-c-624e7090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5730%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%20Plugin&amp;severity=medium&amp;id=68622a136f40f0eb72893b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3745-cwe-79-cross-site-scripting-xss-in-w-07fc3cb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3745%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Lightbox%202&amp;severity=medium&amp;id=68622a136f40f0eb72893b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6889-sql-injection-in-code-projects-movie-d82f6d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6889%3A%20SQL%20Injection%20in%20code-projects%20Movie%20Ticketing%20System&amp;severity=medium&amp;id=6862230b6f40f0eb7288ace3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6888-sql-injection-in-phpgurukul-teachers-ab213d79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6888%3A%20SQL%20Injection%20in%20PHPGurukul%20Teachers%20Record%20Management%20System&amp;severity=medium&amp;id=68621f8a6f40f0eb72889fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6887-stack-based-buffer-overflow-in-tenda-c30dce07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6887%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=686214fb6f40f0eb72888056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6886-stack-based-buffer-overflow-in-tenda-25c90c53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6886%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=686211776f40f0eb728878e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6885-sql-injection-in-phpgurukul-teachers-df8ed912</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6885%3A%20SQL%20Injection%20in%20PHPGurukul%20Teachers%20Record%20Management%20System&amp;severity=medium&amp;id=68620a6f6f40f0eb72886dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6884-sql-injection-in-code-projects-staff-fefa6af7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6884%3A%20SQL%20Injection%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=686203676f40f0eb72886067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6883-sql-injection-in-code-projects-staff-06f816ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6883%3A%20SQL%20Injection%20in%20code-projects%20Staff%20Audit%20System&amp;severity=medium&amp;id=6861f8dc6f40f0eb72881574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6882-buffer-overflow-in-d-link-dir-513-900121ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6882%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-513&amp;severity=high&amp;id=6861f8dc6f40f0eb7288156e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53074-cwe-125-out-of-bounds-read-in-samsu-1c90a561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53074%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861f8dc6f40f0eb72881568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53076-cwe-20-improper-input-validation-in-85112ed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53076%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861f8dc6f40f0eb7288156b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53075-cwe-20-improper-input-validation-in-8258f1f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53075%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861ee4f6f40f0eb7287e2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0634-cwe-416-use-after-free-in-samsung-op-bff90e8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0634%3A%20CWE-416%20Use%20After%20Free%20in%20Samsung%20Open%20Source%20rLottie&amp;severity=medium&amp;id=6861ee4f6f40f0eb7287e2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6881-buffer-overflow-in-d-link-di-8100-bf02f667</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6881%3A%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6861ee4f6f40f0eb7287e2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6880-sql-injection-in-sourcecodester-best-c61aa8da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6880%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861e3c46f40f0eb72876fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6879-sql-injection-in-sourcecodester-best-9093dde3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6879%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861e03f6f40f0eb728767ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6878-sql-injection-in-sourcecodester-best-50cdbd75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6878%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861e03f6f40f0eb728767e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-30-8d19c212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-30&amp;severity=medium&amp;id=6863272e6f40f0eb728d9662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32463-cwe-829-inclusion-of-functionality--c61a2c6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32463%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Sudo%20project%20Sudo&amp;severity=critical&amp;id=6862f6046f40f0eb728ce4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32462-cwe-863-incorrect-authorization-in--ecb908f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32462%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sudo%20project%20Sudo&amp;severity=low&amp;id=6862f6046f40f0eb728ce4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49493-cwe-611-improper-restriction-of-xml-dfb0ef88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49493%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Akamai%20CloudTest&amp;severity=medium&amp;id=6862eb7e6f40f0eb728cc403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52491-cwe-918-server-side-request-forgery-a49f9cd9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52491%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Akamai%20CloudTest&amp;severity=medium&amp;id=6862eb7e6f40f0eb728cc3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45931-na-4f99a444</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45931%3A%20n%2Fa&amp;severity=critical&amp;id=6862c85a6f40f0eb728c7d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45143-na-279237e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45143%3A%20n%2Fa&amp;severity=high&amp;id=6862c4e76f40f0eb728c75e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26074-na-20ff6f7e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26074%3A%20n%2Fa&amp;severity=critical&amp;id=6862c1406f40f0eb728c7085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46014-na-1349ab22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46014%3A%20n%2Fa&amp;severity=high&amp;id=6861ee4f6f40f0eb7287e2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6877-sql-injection-in-sourcecodester-best-511d1f8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6877%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861ceb06f40f0eb7286f96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6876-sql-injection-in-sourcecodester-best-bc5a26f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6876%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861c7a36f40f0eb7286e399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6875-sql-injection-in-sourcecodester-best-c598f8e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6875%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861c09b6f40f0eb7286cb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6874-sql-injection-in-sourcecodester-best-59744365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6874%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861b9936f40f0eb72860547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6873-unrestricted-upload-in-sourcecodeste-26f030d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6873%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861b28b6f40f0eb7285e80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6872-unrestricted-upload-in-sourcecodeste-48c09232</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6872%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861ab836f40f0eb7285d813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6871-sql-injection-in-sourcecodester-simp-89a8d717</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6871%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861a7ff6f40f0eb7285cfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6870-unrestricted-upload-in-sourcecodeste-328cc9ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6870%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861a0f86f40f0eb72858f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6869-sql-injection-in-sourcecodester-simp-158d91c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6869%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=6861967a6f40f0eb72851e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluetooth-flaws-could-let-hackers-spy-through-your-396cd353</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bluetooth%20flaws%20could%20let%20hackers%20spy%20through%20your%20microphone&amp;severity=high&amp;id=6861966a6f40f0eb72851e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24292-vulnerability-in-ubiquiti-inc-unifi-715899e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24292%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Network%20Application&amp;severity=medium&amp;id=6861967a6f40f0eb72851e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24290-vulnerability-in-ubiquiti-inc-uisp--741026aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24290%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UISP%20Application&amp;severity=critical&amp;id=6861967a6f40f0eb72851e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24289-vulnerability-in-ubiquiti-inc-ucrm--b24f2998</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24289%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UCRM%20Client%20Signup%20Plugin&amp;severity=high&amp;id=6861967a6f40f0eb72851e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6868-sql-injection-in-sourcecodester-simp-b32575ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6868%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=68618f626f40f0eb7284fc9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6867-sql-injection-in-sourcecodester-simp-908c9c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6867%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20Company%20Website&amp;severity=medium&amp;id=68618be46f40f0eb7284f404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6866-path-traversal-in-code-projects-simp-f060ecde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6866%3A%20Path%20Traversal%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=686181536f40f0eb7284d019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6865-cross-site-request-forgery-in-daicuo-bf838dac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6865%3A%20Cross-Site%20Request%20Forgery%20in%20DaiCuo&amp;severity=medium&amp;id=686173436f40f0eb7284a274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6864-cross-site-request-forgery-in-seacms-2faf02aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6864%3A%20Cross-Site%20Request%20Forgery%20in%20SeaCMS&amp;severity=medium&amp;id=686165336f40f0eb72846ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6863-sql-injection-in-phpgurukul-local-se-4cd67235</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6863%3A%20SQL%20Injection%20in%20PHPGurukul%20Local%20Services%20Search%20Engine%20Management%20System&amp;severity=medium&amp;id=686157426f40f0eb7280cb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6862-sql-injection-in-sourcecodester-best-a9cdee67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6862%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861501b6f40f0eb7280ba20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6861-sql-injection-in-sourcecodester-best-8f086bd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6861%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=686149136f40f0eb7280937a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6860-sql-injection-in-sourcecodester-best-6e0699b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6860%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=68613b036f40f0eb728048d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6859-sql-injection-in-sourcecodester-best-5844a481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6859%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=6861377f6f40f0eb72803b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5878-improper-neutralization-of-special-e-b6cce6ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5878%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20ESAPI%20esapi-java-legacy&amp;severity=medium&amp;id=686122686f40f0eb727febaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6858-null-pointer-dereference-in-hdf5-1da12055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6858%3A%20NULL%20Pointer%20Dereference%20in%20HDF5&amp;severity=medium&amp;id=68611ee46f40f0eb727fe287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6857-stack-based-buffer-overflow-in-hdf5-cf5f1191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6857%3A%20Stack-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=686110d66f40f0eb727c3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6856-use-after-free-in-hdf5-db4827a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6856%3A%20Use%20After%20Free%20in%20HDF5&amp;severity=medium&amp;id=686109ce6f40f0eb727c0c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6855-path-traversal-in-chatchat-space-lan-b3579312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6855%3A%20Path%20Traversal%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=686102d26f40f0eb727b899a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-fbi-warns-that-scattered-spider-is-now-targeti-ba83feb4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20FBI%20warns%20that%20Scattered%20Spider%20is%20now%20targeting%20the%20airline%20sector&amp;severity=medium&amp;id=686102c56f40f0eb727b8953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6854-path-traversal-in-chatchat-space-lan-93e0050c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6854%3A%20Path%20Traversal%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=6860ff426f40f0eb727b806a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6853-path-traversal-in-chatchat-space-lan-8d429151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6853%3A%20Path%20Traversal%20in%20chatchat-space%20Langchain-Chatchat&amp;severity=medium&amp;id=6860edae6f40f0eb727879bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6850-sql-injection-in-code-projects-simpl-4582c285</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6850%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860e6a66f40f0eb72785f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6849-cross-site-scripting-in-code-project-108e95ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6849%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6862b3346f40f0eb728c1c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6848-unrestricted-upload-in-code-projects-f01bdd85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6848%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860dc216f40f0eb727842b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6847-sql-injection-in-code-projects-simpl-3c6ca147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6847%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860d18d6f40f0eb727803c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6846-sql-injection-in-code-projects-simpl-c424a001</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6846%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860ca856f40f0eb7277cc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6845-sql-injection-in-code-projects-simpl-fb5cb991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6845%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860c37d6f40f0eb7277a9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6462-cwe-79-improper-neutralization-of-in-8b098da8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scheeeli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=medium&amp;id=6860c37d6f40f0eb7277a9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6844-sql-injection-in-code-projects-simpl-58da34c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6844%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Forum&amp;severity=medium&amp;id=6860bc7b6f40f0eb72778621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6843-unrestricted-upload-in-code-projects-8f48f541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6843%3A%20Unrestricted%20Upload%20in%20code-projects%20Simple%20Photo%20Gallery&amp;severity=medium&amp;id=6860b8f16f40f0eb72777cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6842-sql-injection-in-code-projects-produ-34408a54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6842%3A%20SQL%20Injection%20in%20code-projects%20Product%20Inventory%20System&amp;severity=medium&amp;id=6860b1ef6f40f0eb7277194a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6841-sql-injection-in-code-projects-produ-178fa463</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6841%3A%20SQL%20Injection%20in%20code-projects%20Product%20Inventory%20System&amp;severity=medium&amp;id=6860a75d6f40f0eb7276f0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6840-sql-injection-in-code-projects-produ-52c2db51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6840%3A%20SQL%20Injection%20in%20code-projects%20Product%20Inventory%20System&amp;severity=medium&amp;id=6860a75d6f40f0eb7276f0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6839-backdoor-in-conjure-position-departm-9989d892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6839%3A%20Backdoor%20in%20Conjure%20Position%20Department%20Service%20Quality%20Evaluation%20System&amp;severity=medium&amp;id=68609cd16f40f0eb7275dade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6837-unrestricted-upload-in-code-projects-bb2199eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6837%3A%20Unrestricted%20Upload%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686095c96f40f0eb7275a772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6836-sql-injection-in-code-projects-libra-5cb7f590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6836%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=68608ec16f40f0eb72754453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6835-sql-injection-in-code-projects-libra-c6b0ae08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6835%3A%20SQL%20Injection%20in%20code-projects%20Library%20System&amp;severity=medium&amp;id=686084356f40f0eb7274d142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-29-4f4db9ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-29&amp;severity=medium&amp;id=6861d5ae6f40f0eb72871999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6834-sql-injection-in-code-projects-inven-8d3d5bcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6834%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=68607d2e6f40f0eb7274b57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6829-sql-injection-in-aaluoxiang-oasystem-faaedfd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6829%3A%20SQL%20Injection%20in%20aaluoxiang%20oa_system&amp;severity=medium&amp;id=686076266f40f0eb727498c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6828-sql-injection-in-code-projects-inven-e884527c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6828%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686072a26f40f0eb72748bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6827-sql-injection-in-code-projects-inven-91d908e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6827%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686068156f40f0eb72746209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6826-sql-injection-in-code-projects-payro-a15918bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6826%3A%20SQL%20Injection%20in%20code-projects%20Payroll%20Management%20System&amp;severity=medium&amp;id=68605a0b6f40f0eb7273e3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6825-buffer-overflow-in-totolink-a702r-60eaf1b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6825%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=686052fd6f40f0eb7273cb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6824-buffer-overflow-in-totolink-x15-c70d1fee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6824%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68604bf66f40f0eb7273b0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6823-sql-injection-in-code-projects-inven-cb7b6cc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6823%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686044ee6f40f0eb727209d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6822-sql-injection-in-code-projects-inven-25549c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6822%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686036e06f40f0eb72718c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32897-cwe-502-deserialization-of-untruste-60abfe2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32897%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Seata%20(incubating)&amp;severity=critical&amp;id=686036e06f40f0eb72718c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6821-sql-injection-in-code-projects-inven-51429d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6821%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6860335d6f40f0eb727184fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6820-sql-injection-in-code-projects-inven-7a260086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6820%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=686028cf6f40f0eb727159e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6819-sql-injection-in-code-projects-inven-3430d0b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6819%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=68601abf6f40f0eb72712b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6818-heap-based-buffer-overflow-in-hdf5-5c2ed56d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6818%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=68600caf6f40f0eb7270712b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1991-cwe-191-integer-underflow-wrap-or-wr-1740054a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1991%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20IBM%20Informix%20Dynamic%20Server&amp;severity=high&amp;id=685fe9876f40f0eb726fd9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-attack-on-nhs-causes-patient-deat-a78dd6aa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Attack%20on%20NHS%20Causes%20Patient%20Death%20in%20the%20UK&amp;severity=medium&amp;id=685fdb776f40f0eb726dc1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6817-resource-consumption-in-hdf5-61e51732</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6817%3A%20Resource%20Consumption%20in%20HDF5&amp;severity=medium&amp;id=685fd46f6f40f0eb726d949f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/giftedcrook-malware-evolves-from-browser-stealer-t-fc7bac60</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GIFTEDCROOK%20Malware%20Evolves%3A%20From%20Browser%20Stealer%20to%20Intelligence-Gathering%20Tool&amp;severity=high&amp;id=685fc2da6f40f0eb726d50d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6816-heap-based-buffer-overflow-in-hdf5-6f8c89bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6816%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=685fa3406f40f0eb726b4291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5937-cwe-352-cross-site-request-forgery-c-fee4edaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5937%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20videowhisper%20MicroPayments%20%E2%80%93%20Fans%20Paysite%3A%20Paid%20Creator%20Subscriptions%2C%20Digital%20Assets%2C%20Wallet&amp;severity=medium&amp;id=685f9c306f40f0eb726b287e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6755-cwe-22-improper-limitation-of-a-path-58387b50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6755%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gameusers%20Game%20Users%20Share%20Buttons&amp;severity=high&amp;id=685f80106f40f0eb726abc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5304-cwe-862-missing-authorization-in-bla-a57ed333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5304%3A%20CWE-862%20Missing%20Authorization%20in%20blafoley%20PT%20Project%20Notebooks%20%E2%80%93%20Take%20Meeting%20minutes%2C%20create%20budgets%2C%20track%20task%20management%2C%20and%20more&amp;severity=critical&amp;id=685f80106f40f0eb726abc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6252-cwe-79-improper-neutralization-of-in-6e80f334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=685f72006f40f0eb726a8628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6350-cwe-79-improper-neutralization-of-in-9c3fc99c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rextheme%20WP%20VR%20%E2%80%93%20360%20Panorama%20and%20Free%20Virtual%20Tour%20Builder%20For%20WordPress&amp;severity=medium&amp;id=685f63f06f40f0eb726a575a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6381-cwe-36-absolute-path-traversal-in-be-9bed0c35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6381%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20beeteam368%20BeeTeam368%20Extensions&amp;severity=high&amp;id=685f63f06f40f0eb726a5763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6379-cwe-22-improper-limitation-of-a-path-be0bb357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6379%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20beeteam368%20BeeTeam368%20Extensions%20Pro&amp;severity=high&amp;id=685f63f06f40f0eb726a575f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36027-cwe-1021-improper-restriction-of-re-471fea96</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36027%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20IBM%20Datacap&amp;severity=medium&amp;id=685f40c86f40f0eb72695e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36026-cwe-614-sensitive-cookie-in-https-s-f374c243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36026%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Datacap&amp;severity=medium&amp;id=685f40c86f40f0eb72695e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-28-d69c000a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-28&amp;severity=medium&amp;id=6860842e6f40f0eb7274cd73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53392-cwe-36-absolute-path-traversal-in-n-de13ba5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53392%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Netgate%20pfSense&amp;severity=medium&amp;id=68606f1d6f40f0eb727478ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53391-na-b9863e0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53391%3A%20CWE-863%20Incorrect%20Authorization%20in%20Debian%20zulucrypt&amp;severity=critical&amp;id=686061126f40f0eb72744240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36347-cwe-347-improper-verification-of-cr-e1702516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36347%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20AMD%20AMD%20EPYC%E2%84%A2%207001%20Series&amp;severity=medium&amp;id=69a0a1cc85912abc71d0bd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53098-cwe-77-improper-neutralization-of-s-0d6382e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53098%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=high&amp;id=685f13136f40f0eb7266fd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53097-cwe-74-improper-neutralization-of-s-2d07d982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53097%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20RooCodeInc%20Roo-Code&amp;severity=medium&amp;id=685f13136f40f0eb7266fd06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6778-cross-site-scripting-in-code-project-4fe1b6b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6778%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Food%20Distributor%20Site&amp;severity=medium&amp;id=685f01806f40f0eb7266be80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6777-sql-injection-in-code-projects-food--3c51ce2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6777%3A%20SQL%20Injection%20in%20code-projects%20Food%20Distributor%20Site&amp;severity=medium&amp;id=685f01806f40f0eb7266be79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6776-path-traversal-in-xiaoyunjie-openvpn-34693dce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6776%3A%20Path%20Traversal%20in%20xiaoyunjie%20openvpn-cms-flask&amp;severity=medium&amp;id=685efa786f40f0eb72665539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6775-command-injection-in-xiaoyunjie-open-f32d7352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6775%3A%20Command%20Injection%20in%20xiaoyunjie%20openvpn-cms-flask&amp;severity=medium&amp;id=685efa786f40f0eb72665530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53094-cwe-93-improper-neutralization-of-c-607a8611</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53094%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20ESP32Async%20ESPAsyncWebServer&amp;severity=high&amp;id=685efa786f40f0eb7266552b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-backups-open-backdoors-accessing-sensitive-cl-1eb07241</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Backups%20Open%20Backdoors%3A%20Accessing%20Sensitive%20Cloud%20Data%20via%20%22Synology%20Active%20Backup%20for%20Microsoft%20365%22&amp;severity=medium&amp;id=685ef3736f40f0eb7266170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6774-path-traversal-in-gooaclok819-sublin-5469466d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6774%3A%20Path%20Traversal%20in%20gooaclok819%20sublinkX&amp;severity=medium&amp;id=685ef3706f40f0eb726616ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6773-path-traversal-in-hkuds-lightrag-56c70c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6773%3A%20Path%20Traversal%20in%20HKUDS%20LightRAG&amp;severity=medium&amp;id=685eec836f40f0eb726601af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-1000-soho-devices-hacked-in-china-linked-lapd-00497305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%201%2C000%20SOHO%20Devices%20Hacked%20in%20China-linked%20LapDogs%20Cyber%20Espionage%20Campaign&amp;severity=high&amp;id=685eec676f40f0eb72660148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-hackers-shift-focus-to-aviation-t-d6ad5d80</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20hackers%20shift%20focus%20to%20aviation%2C%20transportation%20firms&amp;severity=high&amp;id=685eec676f40f0eb7266014c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6772-path-traversal-in-eosphoros-ai-db-gp-b4345726</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6772%3A%20Path%20Traversal%20in%20eosphoros-ai%20db-gpt&amp;severity=medium&amp;id=685ee55f6f40f0eb7265dd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53093-cwe-79-improper-neutralization-of-i-c0e12056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53093%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-TabberNeue&amp;severity=high&amp;id=685edad36f40f0eb72658492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5310-cwe-306-in-dover-fueling-solutions-p-adae10a9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5310%3A%20CWE-306%20in%20Dover%20Fueling%20Solutions%20ProGauge%20MagLink%20LX%204&amp;severity=critical&amp;id=685ed7556f40f0eb7265731a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6522-cwe-77-in-trendmakers-sight-bulb-pro-d1acd94e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6522%3A%20CWE-77%20in%20TrendMakers%20Sight%20Bulb%20Pro%20Firmware%20ZJ_CG32-2201&amp;severity=medium&amp;id=685ed3cb6f40f0eb7265567d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6521-cwe-327-in-trendmakers-sight-bulb-pr-a04cf660</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6521%3A%20CWE-327%20in%20TrendMakers%20Sight%20Bulb%20Pro%20Firmware%20ZJ_CG32-2201&amp;severity=high&amp;id=685ed0476f40f0eb72654d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46708-cwe-cwe-280-improper-handling-of-in-22b0e624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46708%3A%20CWE%20-%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20(4.15)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=685ed0476f40f0eb72654d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46707-cwe-cwe-668-exposure-of-resource-to-47f1cb10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46707%3A%20CWE%20-%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=686544a26f40f0eb7292f616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealthy-remcos-malware-campaigns-target-busin-2a0c6661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealthy%20Remcos%20Malware%20Campaigns%20Target%20Businesses%20and%20Schools&amp;severity=medium&amp;id=685ec5ba6f40f0eb72651917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53091-cwe-89-improper-neutralization-of-s-ca59ad97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53091%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=685eb7aa6f40f0eb726448be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52553-cwe-287-improper-authentication-in--6c2260dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52553%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=685eb7aa6f40f0eb726448b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6705-cwe-913-improper-control-of-dynamica-5cc6979b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6705%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Eclipse%20Foundation%20Eclipse%20Open%20VSX%20Registry&amp;severity=high&amp;id=685eb4266f40f0eb7263ec9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36595-cwe-96-improper-neutralization-of-d-96968af1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36595%3A%20CWE-96%3A%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20Dell%20Unisphere%20for%20PowerMax%20vApp&amp;severity=high&amp;id=685ea2a26f40f0eb726349d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6768-sql-injection-in-sfturing-hosporder-36d156f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6768%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=685ea034f6cf9081996a7a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53339-cwe-98-improper-control-of-filename-827388bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53339%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20devnex%20Devnex%20Addons%20For%20Elementor&amp;severity=null&amp;id=685ea034f6cf9081996a7a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53338-cwe-352-cross-site-request-forgery--3b3cc4ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53338%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dor%20re.place&amp;severity=null&amp;id=685ea034f6cf9081996a7a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53336-cwe-79-improper-neutralization-of-i-40d34c26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53336%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abditsori%20My%20Resume%20Builder&amp;severity=null&amp;id=685ea034f6cf9081996a7a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53332-cwe-352-cross-site-request-forgery--42726785</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ethoseo%20Track%20Everything&amp;severity=null&amp;id=685ea034f6cf9081996a7a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53331-cwe-352-cross-site-request-forgery--7bfc33ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53331%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samcharrington%20RSS%20Digest&amp;severity=null&amp;id=685ea034f6cf9081996a7a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53329-cwe-352-cross-site-request-forgery--87139fed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53329%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20szajenw%20Spo%C5%82eczno%C5%9Bciowa%206%20PL%202013&amp;severity=null&amp;id=685ea034f6cf9081996a7a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53327-cwe-352-cross-site-request-forgery--305d3baf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53327%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rui_mashita%20Aioseo%20Multibyte%20Descriptions&amp;severity=null&amp;id=685ea034f6cf9081996a7a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53325-cwe-79-improper-neutralization-of-i-25b3e80f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53325%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dilip%20kumar%20Beauty%20Contact%20Popup%20Form&amp;severity=null&amp;id=685ea034f6cf9081996a7a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53323-cwe-862-missing-authorization-in-da-f225da1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53323%3A%20Missing%20Authorization%20in%20danbriapps%20Pre-Publish%20Post%20Checklist&amp;severity=null&amp;id=685ea034f6cf9081996a7a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53322-cwe-201-insertion-of-sensitive-info-b43d6fc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53322%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ZealousWeb%20Accept%20Authorize.NET%20Payments%20Using%20Contact%20Form%207&amp;severity=null&amp;id=685ea034f6cf9081996a7a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53320-cwe-79-improper-neutralization-of-i-1468443c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wp%20Enhanced%20Free%20Downloads%20EDD&amp;severity=medium&amp;id=685ea034f6cf9081996a7a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53318-cwe-862-missing-authorization-in-wp-e5cef7bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53318%3A%20Missing%20Authorization%20in%20WPManiax%20WP%20DB%20Booster&amp;severity=null&amp;id=685ea034f6cf9081996a7a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53317-cwe-352-cross-site-request-forgery--840cb435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53317%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AcmeeDesign%20WPShapere%20-%20WordPress%20admin%20theme&amp;severity=null&amp;id=685ea034f6cf9081996a7a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53315-cwe-352-cross-site-request-forgery--729956e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53315%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alanft%20Relocate%20Upload&amp;severity=null&amp;id=685ea034f6cf9081996a79ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53314-cwe-352-cross-site-request-forgery--750bfeb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53314%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sh1zen%20WP%20Optimizer&amp;severity=null&amp;id=685ea033f6cf9081996a79f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53313-cwe-352-cross-site-request-forgery--1b9ffb1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53313%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plumwd%20Twitch%20TV%20Embed%20Suite&amp;severity=null&amp;id=685ea033f6cf9081996a79ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53312-cwe-352-cross-site-request-forgery--a029248e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53312%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Looks%20Awesome%20OnionBuzz&amp;severity=null&amp;id=685ea033f6cf9081996a79ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53311-cwe-352-cross-site-request-forgery--6a4e6c36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53311%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Amol%20Nirmala%20Waman%20Navayan%20Subscribe&amp;severity=null&amp;id=685ea033f6cf9081996a79e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53310-cwe-352-cross-site-request-forgery--c11997ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53310%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Funnnny%20HidePost&amp;severity=null&amp;id=685ea033f6cf9081996a79e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53309-cwe-201-insertion-of-sensitive-info-1e89c174</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53309%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ZealousWeb%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=null&amp;id=685ea033f6cf9081996a79e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53308-cwe-352-cross-site-request-forgery--299d70bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53308%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gopi_plus%20Image%20Slider%20With%20Description&amp;severity=null&amp;id=685ea033f6cf9081996a79e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53306-cwe-89-improper-neutralization-of-s-4a82f755</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20lucidcrew%20WP%20Forum%20%20Server&amp;severity=null&amp;id=685ea033f6cf9081996a79dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53305-cwe-352-cross-site-request-forgery--bc25504d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53305%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lucidcrew%20WP%20Forum%20%20Server&amp;severity=null&amp;id=685ea033f6cf9081996a79da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53304-cwe-862-missing-authorization-in-ro-081e8cb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53304%3A%20Missing%20Authorization%20in%20Rohil%20Contact%20Form%20%26%238211%3B%207%20%3A%20Hide%20Success%20Message&amp;severity=null&amp;id=685ea033f6cf9081996a79d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53301-cwe-79-improper-neutralization-of-i-3c81775b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Theme%20Junkie%20Theme%20Junkie%20Team%20Content&amp;severity=null&amp;id=685ea033f6cf9081996a79ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53300-cwe-79-improper-neutralization-of-i-ccfeb11a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53300%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20douglaskarr%20Podcast%20Feed%20Player%20Widget%20and%20Shortcode&amp;severity=null&amp;id=685ea033f6cf9081996a79c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53298-cwe-22-improper-limitation-of-a-pat-f3ae68c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53298%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gioni%20Plugin%20Inspector&amp;severity=null&amp;id=685ea033f6cf9081996a79c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53296-cwe-79-improper-neutralization-of-i-4d1cb01d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ecoal95%20EC%20Stars%20Rating&amp;severity=null&amp;id=685ea033f6cf9081996a79c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53295-cwe-862-missing-authorization-in-ic-9b3e1cb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53295%3A%20Missing%20Authorization%20in%20iCount%20iCount%20Payment%20Gateway&amp;severity=null&amp;id=685ea033f6cf9081996a79be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53293-cwe-862-missing-authorization-in-mo-2c9a4d8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53293%3A%20Missing%20Authorization%20in%20Morten%20Dalgaard%20Johansen%20Dashboard%20Widget%20Sidebar&amp;severity=null&amp;id=685ea033f6cf9081996a79bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53292-cwe-79-improper-neutralization-of-i-bd904e2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samsk%20WP%20DataTable&amp;severity=null&amp;id=685ea033f6cf9081996a79b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53290-cwe-79-improper-neutralization-of-i-ea8476b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53290%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MS%20WP%20Visual%20Sitemap&amp;severity=null&amp;id=685ea033f6cf9081996a79b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53288-cwe-862-missing-authorization-in-ad-ed2a2e21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53288%3A%20Missing%20Authorization%20in%20Adrian%20Lad%C3%B3%20PlatiOnline%20Payments&amp;severity=null&amp;id=685ea033f6cf9081996a79b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53287-cwe-79-improper-neutralization-of-i-ce7fd788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53287%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Cummings%20Quick%20Favicon&amp;severity=null&amp;id=685ea033f6cf9081996a79af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53285-cwe-79-improper-neutralization-of-i-c7f055b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Website%20Flip%20Add%20%26amp%3B%20Replace%20Affiliate%20Links%20for%20Amazon&amp;severity=null&amp;id=685ea033f6cf9081996a79a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53284-cwe-862-missing-authorization-in-pa-21cb1f7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53284%3A%20Missing%20Authorization%20in%20pankaj.sakaria%20CMS%20Blocks&amp;severity=null&amp;id=685ea033f6cf9081996a799f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53282-cwe-79-improper-neutralization-of-i-6ab0555a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53282%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Thumbnail%20Editor&amp;severity=null&amp;id=685ea033f6cf9081996a799c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53281-cwe-98-improper-control-of-filename-a27cf888</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53281%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPBean%20WPB%20Category%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=685ea033f6cf9081996a7999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53280-cwe-79-improper-neutralization-of-i-4f3eb7cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AntoineH%20Football%20Pool&amp;severity=null&amp;id=685ea033f6cf9081996a7996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53279-cwe-79-improper-neutralization-of-i-4cab3c2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aman%20Popup%20addon%20for%20Ninja%20Forms&amp;severity=null&amp;id=685ea033f6cf9081996a7993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53278-cwe-79-improper-neutralization-of-i-236312df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53278%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=null&amp;id=685ea033f6cf9081996a7990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53277-cwe-352-cross-site-request-forgery--0a63cfea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53277%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Infigo%20Software%20IS-theme-companion&amp;severity=null&amp;id=685ea033f6cf9081996a798d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53276-cwe-79-improper-neutralization-of-i-6fc7201b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=null&amp;id=685ea033f6cf9081996a798a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53275-cwe-79-improper-neutralization-of-i-0c084716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=685ea033f6cf9081996a7987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53274-cwe-352-cross-site-request-forgery--51df8513</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossin%20Asaadi%20WP%20Permalink%20Translator&amp;severity=null&amp;id=685ea032f6cf9081996a7970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53272-cwe-352-cross-site-request-forgery--6770daf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opicron%20Image%20Cleanup&amp;severity=null&amp;id=685ea032f6cf9081996a796d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53271-cwe-352-cross-site-request-forgery--98673ec0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anton%20Bond%20Additional%20Order%20Filters%20for%20WooCommerce&amp;severity=null&amp;id=685ea032f6cf9081996a796a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53270-cwe-352-cross-site-request-forgery--321b7a19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53270%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blend%20Media%20WordPress%20CTA&amp;severity=null&amp;id=685ea032f6cf9081996a7967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53269-cwe-352-cross-site-request-forgery--4b2b801b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53269%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imw3%20My%20Wp%20Brand&amp;severity=null&amp;id=685ea032f6cf9081996a7964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53268-cwe-352-cross-site-request-forgery--4285e394</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53268%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryanpcmcquen%20Import%20external%20attachments&amp;severity=null&amp;id=685ea032f6cf9081996a7961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53267-cwe-352-cross-site-request-forgery--2169bda8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53267%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aftab%20Husain%20Hide%20Admin%20Bar%20From%20Front%20End&amp;severity=null&amp;id=685ea032f6cf9081996a795e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53266-cwe-862-missing-authorization-in-ed-5ac64eae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53266%3A%20Missing%20Authorization%20in%20EdwardBock%20Cron%20Logger&amp;severity=null&amp;id=685ea032f6cf9081996a795b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53265-cwe-352-cross-site-request-forgery--96744fb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53265%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elena%20Yamshikova%20Virusdie&amp;severity=medium&amp;id=685ea032f6cf9081996a7958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53264-cwe-352-cross-site-request-forgery--60b1e09f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53264%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Konr%C3%A1d%20Koller%20ONet%20Regenerate%20Thumbnails&amp;severity=null&amp;id=685ea032f6cf9081996a7955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53263-cwe-352-cross-site-request-forgery--75d5c15a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53263%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PluginsCafe%20Address%20Autocomplete%20via%20Google%20for%20Gravity%20Forms&amp;severity=null&amp;id=685ea032f6cf9081996a7948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53261-cwe-352-cross-site-request-forgery--13897892</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53261%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20macbookandrew%20WP%20YouTube%20Live&amp;severity=null&amp;id=685ea032f6cf9081996a7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53260-cwe-434-unrestricted-upload-of-file-4c660354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53260%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20getredhawkstudio%20File%20Manager%20Plugin%20For%20Wordpress&amp;severity=null&amp;id=685ea032f6cf9081996a7942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53259-cwe-98-improper-control-of-filename-ad2a9d9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53259%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=685ea032f6cf9081996a793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53258-cwe-89-improper-neutralization-of-s-fab22dc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53258%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Wow-Company%20Hover%20Effects&amp;severity=null&amp;id=685ea032f6cf9081996a793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53257-cwe-98-improper-control-of-filename-b03791e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53257%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Serhii%20Pasyuk%20Gmedia%20Photo%20Gallery&amp;severity=null&amp;id=685ea032f6cf9081996a7939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53256-cwe-89-improper-neutralization-of-s-0ab3574c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53256%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YaySMTP&amp;severity=null&amp;id=685ea032f6cf9081996a7936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53255-cwe-862-missing-authorization-in-na-5614da61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53255%3A%20Missing%20Authorization%20in%20Nabil%20Lemsieh%20HurryTimer&amp;severity=null&amp;id=685ea032f6cf9081996a7933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53254-cwe-352-cross-site-request-forgery--7e7bde82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53254%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themeisle%20Cyrlitera&amp;severity=null&amp;id=685ea032f6cf9081996a7930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53253-cwe-79-improper-neutralization-of-i-50a0edce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20WP%20Edit&amp;severity=null&amp;id=685ea032f6cf9081996a792d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53211-cwe-497-exposure-of-sensitive-syste-d666a87c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53211%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Roland%20Beaussant%20Audio%20Editor%20%26amp%3B%20Recorder&amp;severity=null&amp;id=685ea032f6cf9081996a7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53206-cwe-79-improper-neutralization-of-i-45c3e9a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53206%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=685ea032f6cf9081996a791d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53203-cwe-352-cross-site-request-forgery--1ffc0f24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53203%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EDGARROJAS%20WooCommerce%20PDF%20Invoice%20Builder&amp;severity=null&amp;id=685ea032f6cf9081996a791a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53202-cwe-79-improper-neutralization-of-i-52976222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53202%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=685ea032f6cf9081996a7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53200-cwe-862-missing-authorization-in-qu-abcdf374</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53200%3A%20Missing%20Authorization%20in%20QuantumCloud%20ChatBot&amp;severity=null&amp;id=685ea032f6cf9081996a7914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53199-cwe-79-improper-neutralization-of-i-c263c2ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53199%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Slider%20For%20Elementor&amp;severity=null&amp;id=685ea032f6cf9081996a7911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53193-cwe-352-cross-site-request-forgery--7fa20099</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53193%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Burst%20Statistics%20B.V.%20Burst%20Statistics&amp;severity=null&amp;id=685ea032f6cf9081996a790e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6767-sql-injection-in-sfturing-hosporder-0c2a4589</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6767%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=685e9924f6cf9081996a6060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53018-cwe-918-server-side-request-forgery-d46a97d9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53018%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20LycheeOrg%20Lychee&amp;severity=low&amp;id=685e9924f6cf9081996a605c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6766-sql-injection-in-sfturing-hosporder-fb34d23f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6766%3A%20SQL%20Injection%20in%20sfturing%20hosp_order&amp;severity=medium&amp;id=685e921cf6cf9081996887a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40910-cwe-1287-improper-validation-of-spe-0df7d0d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40910%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20TPODER%20Net%3A%3AIP%3A%3ALPM&amp;severity=medium&amp;id=685e8ea2f6cf908199682bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6765-permission-issues-in-intelbras-incon-31a9b7b7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6765%3A%20Permission%20Issues%20in%20Intelbras%20InControl&amp;severity=medium&amp;id=685e8c6cca1063fb875df1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24765-cwe-22-improper-limitation-of-a-pat-ed627665</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24765%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RobMarsh%20Image%20Shadow&amp;severity=null&amp;id=685e88edca1063fb875de472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24769-cwe-98-improper-control-of-filename-a89741bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24769%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Zenny&amp;severity=null&amp;id=685e88edca1063fb875de475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24774-cwe-79-improper-neutralization-of-i-d88a37e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20WPCRM%20-%20CRM%20for%20Contact%20form%20CF7%20%26%20WooCommerce&amp;severity=null&amp;id=685e88edca1063fb875de478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25171-cwe-288-authentication-bypass-using-60510568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25171%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Convers%20Lab%20WP%20SmartPay&amp;severity=null&amp;id=685e88edca1063fb875de47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25173-cwe-79-improper-neutralization-of-i-eb681ee3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25173%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FasterThemes%20FastBook&amp;severity=null&amp;id=685e88edca1063fb875de47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27361-cwe-79-improper-neutralization-of-i-0ea4b9ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thhake%20Photo%20Express%20for%20Google&amp;severity=null&amp;id=685e88edca1063fb875de481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28946-cwe-98-improper-control-of-filename-0af62d0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28946%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20PrintXtore&amp;severity=null&amp;id=685e88edca1063fb875de484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28947-cwe-98-improper-control-of-filename-f8273b63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28947%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20MBStore%20-%20Digital%20WooCommerce%20WordPress%20Theme&amp;severity=null&amp;id=685e88edca1063fb875de491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28956-cwe-79-improper-neutralization-of-i-ad002c09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphobby%20Backwp&amp;severity=null&amp;id=685e88edca1063fb875de494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28960-cwe-79-improper-neutralization-of-i-6463047b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20regibaer%20Evangelische%20Termine&amp;severity=null&amp;id=685e88edca1063fb875de497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28970-cwe-502-deserialization-of-untruste-bb4ef810</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28970%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pep.vn%20WP%20Optimize%20By%20xTraffic&amp;severity=null&amp;id=685e88edca1063fb875de49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28988-cwe-79-improper-neutralization-of-i-e2a34a80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aharonyan%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=null&amp;id=685e88edca1063fb875de49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28990-cwe-98-improper-control-of-filename-0930fe5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28990%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20SNS%20Vicky&amp;severity=null&amp;id=685e88edca1063fb875de4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28993-cwe-94-improper-control-of-generati-ff6caace</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28993%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jose%20Mortellaro%20Content%20No%20Cache&amp;severity=null&amp;id=685e88edca1063fb875de4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28998-cwe-98-improper-control-of-filename-ce2b5789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28998%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20serpednet%20SERPed.net&amp;severity=null&amp;id=685e88edca1063fb875de4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30972-cwe-79-improper-neutralization-of-i-31bc519b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30972%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamapinan%20Woocommerce%20Line%20Notify&amp;severity=null&amp;id=685e88edca1063fb875de4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30992-cwe-98-improper-control-of-filename-281dd446</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Puca&amp;severity=null&amp;id=685e88edca1063fb875de4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31067-cwe-79-improper-neutralization-of-i-b6d99782</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeton%20Seven%20Stars&amp;severity=high&amp;id=685e88eeca1063fb875de4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31428-cwe-79-improper-neutralization-of-i-214bd05e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BuddhaThemes%20HYDRO&amp;severity=null&amp;id=685e88eeca1063fb875de4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32281-cwe-862-missing-authorization-in-fo-14be01ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32281%3A%20CWE-862%20Missing%20Authorization%20in%20FocuxTheme%20WPKit%20For%20Elementor&amp;severity=critical&amp;id=685e88eeca1063fb875de4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32298-cwe-98-improper-control-of-filename-c674b72b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32298%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Case-Themes%20CTUsers&amp;severity=null&amp;id=685e88eeca1063fb875de4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39474-cwe-89-improper-neutralization-of-s-8bd2faf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39474%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThemeMove%20Amely&amp;severity=null&amp;id=685e88eeca1063fb875de4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39478-cwe-79-improper-neutralization-of-i-e43a52c5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartiolabs%20Smart%20Notification&amp;severity=high&amp;id=685e88eeca1063fb875de4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39488-cwe-79-improper-neutralization-of-i-a65251c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sneeit%20MagOne&amp;severity=null&amp;id=685e88eeca1063fb875de4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47574-cwe-79-improper-neutralization-of-i-c351d7f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=685e88eeca1063fb875de4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47654-cwe-79-improper-neutralization-of-i-ed0c04a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=null&amp;id=685e88eeca1063fb875de4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49290-cwe-79-improper-neutralization-of-i-f31c3378</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49290%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=null&amp;id=685e88eeca1063fb875de4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49321-cwe-79-improper-neutralization-of-i-ca70b248</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=685e88eeca1063fb875de4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49883-cwe-98-improper-control-of-filename-3447a23b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49883%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Greenmart&amp;severity=null&amp;id=685e88eeca1063fb875de4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49885-cwe-434-unrestricted-upload-of-file-4f0fd1e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49885%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HaruTheme%20Drag%20and%20Drop%20Multiple%20File%20Upload%20(Pro)%20-%20WooCommerce&amp;severity=null&amp;id=685e88eeca1063fb875de4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49886-cwe-98-improper-control-of-filename-cce18086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49886%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebGeniusLab%20Zikzag%20Core&amp;severity=null&amp;id=685e88eeca1063fb875de4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50052-cwe-79-improper-neutralization-of-i-05bf5c0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50052%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20Flexo%20Counter&amp;severity=null&amp;id=685e88eeca1063fb875de4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52709-cwe-502-deserialization-of-untruste-e168c6b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52709&amp;severity=null&amp;id=685e88eeca1063fb875de4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52717-cwe-89-improper-neutralization-of-s-dbfbb7f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52717%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS&amp;severity=null&amp;id=685e88eeca1063fb875de4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52722-cwe-89-improper-neutralization-of-s-0f19fd4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52722%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoinWebs%20Classiera&amp;severity=null&amp;id=685e88eeca1063fb875de509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52723-cwe-98-improper-control-of-filename-e95940c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52723%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codesupplyco%20Networker&amp;severity=null&amp;id=685e88eeca1063fb875de50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52724-cwe-502-deserialization-of-untruste-5372c816</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52724%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Amwerk&amp;severity=null&amp;id=685e88eeca1063fb875de50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52725-cwe-502-deserialization-of-untruste-2e87d00e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52725%3A%20Deserialization%20of%20Untrusted%20Data%20in%20pebas%20CouponXxL&amp;severity=null&amp;id=685e88eeca1063fb875de512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52726-cwe-266-incorrect-privilege-assignm-c7ac0032</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52726%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXxL%20Custom%20Post%20Types&amp;severity=null&amp;id=685e88eeca1063fb875de515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52727-cwe-79-improper-neutralization-of-i-fcde5783</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuanticaLabs%20CSS3%20Vertical%20Web%20Pricing%20Tables&amp;severity=null&amp;id=685e88eeca1063fb875de518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52729-cwe-98-improper-control-of-filename-8ebe96c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52729%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=null&amp;id=685e88eeca1063fb875de51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52774-cwe-79-improper-neutralization-of-i-c29874ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=685e88eeca1063fb875de51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52778-cwe-79-improper-neutralization-of-i-cdad83d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-dictionary&amp;severity=null&amp;id=685e88eeca1063fb875de521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52799-cwe-79-improper-neutralization-of-i-21f39d36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20LMS&amp;severity=null&amp;id=685e88eeca1063fb875de524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52808-cwe-98-improper-control-of-filename-a9cb89a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52808%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20real-web%20RealtyElite&amp;severity=null&amp;id=685e88efca1063fb875de533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52809-cwe-98-improper-control-of-filename-e2d82422</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52809%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20John%20Russell%20National%20Weather%20Service%20Alerts&amp;severity=null&amp;id=685e88efca1063fb875de536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52810-cwe-35-path-traversal-in-tmrw-studi-1b3a0d08</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52810%3A%20CWE-35%20Path%20Traversal%20in%20TMRW-studio%20Katerio%20-%20Magazine&amp;severity=high&amp;id=685e88efca1063fb875de539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52811-cwe-35-path-traversal-in-creanncy-d-47e17844</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52811%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Creanncy%20Davenport%20-%20Versatile%20Blog%20and%20Magazine%20WordPress%20Theme&amp;severity=null&amp;id=685e88efca1063fb875de53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52812-cwe-98-improper-control-of-filename-7baf7c34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52812%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusWP%20Domnoo&amp;severity=null&amp;id=685e88efca1063fb875de53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52814-cwe-98-improper-control-of-filename-6ccb6549</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52814%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20BRW&amp;severity=null&amp;id=685e88efca1063fb875de542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52815-cwe-98-improper-control-of-filename-660aea32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52815%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AncoraThemes%20CityGov&amp;severity=null&amp;id=685e88efca1063fb875de545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52816-cwe-98-improper-control-of-filename-b3b2f1df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52816%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themehunk%20Zita&amp;severity=null&amp;id=685e88efca1063fb875de548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52817-cwe-862-missing-authorization-in-ze-8a36124d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52817%3A%20Missing%20Authorization%20in%20ZealousWeb%20Abandoned%20Contact%20Form%207&amp;severity=null&amp;id=685e88efca1063fb875de54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52818-cwe-862-missing-authorization-in-de-519daf22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52818%3A%20Missing%20Authorization%20in%20Dejan%20Jasnic%20Trusty%20Whistleblowing&amp;severity=null&amp;id=685e88efca1063fb875de54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52824-cwe-862-missing-authorization-in-md-cc243691</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52824%3A%20Missing%20Authorization%20in%20MDJM%20Mobile%20DJ%20Manager&amp;severity=null&amp;id=685e88efca1063fb875de55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52826-cwe-502-deserialization-of-untruste-41d40406</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52826%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Sala&amp;severity=high&amp;id=685e88efca1063fb875de55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52827-cwe-502-deserialization-of-untruste-2edfce2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52827%3A%20Deserialization%20of%20Untrusted%20Data%20in%20uxper%20Nuss&amp;severity=null&amp;id=685e88efca1063fb875de561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52829-cwe-89-improper-neutralization-of-s-05776123</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52829%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DirectIQ%20DirectIQ%20Email%20Marketing&amp;severity=null&amp;id=685e88efca1063fb875de564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52834-cwe-89-improper-neutralization-of-s-c9b93313</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52834%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20favethemes%20Homey&amp;severity=null&amp;id=685e88efca1063fb875de567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23967-cwe-89-improper-neutralization-of-s-85024121</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23967%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpopal%20GG%20Bought%20Together%20for%20WooCommerce&amp;severity=null&amp;id=685e88edca1063fb875de469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23973-cwe-79-improper-neutralization-of-i-db6431bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dugudlabs%20SpecFit-Virtual%20Try%20On%20Woocommerce&amp;severity=null&amp;id=685e88edca1063fb875de46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24760-cwe-98-improper-control-of-filename-ae440632</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24760%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20goalthemes%20Sofass&amp;severity=null&amp;id=685e88edca1063fb875de46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49416-cwe-98-improper-control-of-filename-47170b33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49416%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Fastw3b%20LLC%20FW%20Gallery&amp;severity=null&amp;id=685e88eeca1063fb875de4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49423-cwe-79-improper-neutralization-of-i-d556aacf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49423%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Tahir%20Ali%20Jan%20Bulk%20YouTube%20Post%20Creator&amp;severity=null&amp;id=685e88eeca1063fb875de4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49448-cwe-22-improper-limitation-of-a-pat-e0f24c3a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Fastw3b%20LLC%20FW%20Food%20Menu&amp;severity=high&amp;id=685e88eeca1063fb875de4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/retail-giant-ahold-delhaize-says-data-breach-affec-406b35bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Retail%20giant%20Ahold%20Delhaize%20says%20data%20breach%20affects%202.2%20million%20people&amp;severity=high&amp;id=685e8563ca1063fb875a17e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6763-missing-authentication-in-comet-syst-ee113fb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6763%3A%20Missing%20Authentication%20in%20Comet%20System%20T0510&amp;severity=critical&amp;id=685e81e0ca1063fb8759fc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6762-server-side-request-forgery-in-diyhi-59faa74c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6762%3A%20Server-Side%20Request%20Forgery%20in%20diyhi%20bbs&amp;severity=medium&amp;id=685e81e0ca1063fb8759fbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hawaiian-airlines-discloses-cyberattack-flights-no-ed2f1460</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hawaiian%20Airlines%20discloses%20cyberattack%2C%20flights%20not%20affected&amp;severity=high&amp;id=685e7753ca1063fb87578a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whole-foods-supplier-unfi-restores-core-systems-af-fd2f1bc2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whole%20Foods%20supplier%20UNFI%20restores%20core%20systems%20after%20cyberattack&amp;severity=high&amp;id=685e7753ca1063fb87578a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oneclik-malware-targets-energy-sector-using-micros-fa50968a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneClik%20Malware%20Targets%20Energy%20Sector%20Using%20Microsoft%20ClickOnce%20and%20Golang%20Backdoors&amp;severity=high&amp;id=685e7753ca1063fb87578a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moveit-transfer-faces-increased-threats-as-scannin-e9ddbab1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MOVEit%20Transfer%20Faces%20Increased%20Threats%20as%20Scanning%20Surges%20and%20CVE%20Flaws%20Are%20Targeted&amp;severity=high&amp;id=685e7753ca1063fb87578a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-warn-free-vpn-apps-on-google-play-and--3066457b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Warn%20Free%20VPN%20Apps%20on%20Google%20Play%20and%20App%20Stores%20Could%20Leak%20US%20Data%20to%20China&amp;severity=medium&amp;id=685e7753ca1063fb87578a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6761-improper-neutralization-of-special-e-78b086ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6761%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Kingdee%20Cloud-Starry-Sky%20Enterprise%20Edition&amp;severity=medium&amp;id=685e73ceca1063fb8757515a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5398-cwe-79-improper-neutralization-of-in-2513ef40</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=685e65beca1063fb8756abf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/getting-a-career-in-cybersecurity-isnt-easy-but-th-cd91d8a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Getting%20a%20career%20in%20cybersecurity%20isn&apos;t%20easy%2C%20but%20this%20can%20help&amp;severity=medium&amp;id=685ec5ca6f40f0eb726521d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12827-cwe-620-unverified-password-change--7e594ed8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12827%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20DWT%20-%20Directory%20%26%20Listing%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e49b7ef31ef0b59c58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2940-cwe-918-server-side-request-forgery--8d4cc7cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2940%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20techjewel%20Ninja%20Tables%20%E2%80%93%20Easy%20Data%20Table%20Builder&amp;severity=high&amp;id=685e57aeca1063fb875649f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6688-cwe-288-authentication-bypass-using--d208e2ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6688%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20idokd%20Simple%20Payment&amp;severity=critical&amp;id=685e499eca1063fb87560142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5936-cwe-352-cross-site-request-forgery-c-ca6cb200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5936%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20innate-images-llc%20VR%20Calendar&amp;severity=medium&amp;id=685e499eca1063fb87560130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5940-cwe-79-improper-neutralization-of-in-6bbf5a3d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5940%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osompress%20Osom%20Blocks%20%E2%80%93%20Custom%20Post%20Type%20listing%20block&amp;severity=medium&amp;id=685e499eca1063fb87560134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6550-cwe-79-improper-neutralization-of-in-1a2d63c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addon&amp;severity=medium&amp;id=685e499eca1063fb87560139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4587-cwe-79-improper-neutralization-of-in-9cdb2510</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnjamesjacoby%20A%2FB%20Testing%20for%20WordPress&amp;severity=medium&amp;id=685e499eca1063fb8756012c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6689-cwe-79-improper-neutralization-of-in-b8303961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20armandofiore%20FL3R%20Accessibility%20Suite&amp;severity=medium&amp;id=685e499eca1063fb87560146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5526-cwe-639-authorization-bypass-through-1f765cfa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5526%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BuddyPress%20Docs&amp;severity=medium&amp;id=685e380cca1063fb8753f69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5194-cwe-79-cross-site-scripting-xss-in-w-44d87900</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5194%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WP%20Map%20Block&amp;severity=medium&amp;id=685e380cca1063fb8753f69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5093-cwe-79-cross-site-scripting-xss-in-r-151d1a66</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5093%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=685e380cca1063fb8753f698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5035-cwe-79-cross-site-scripting-xss-in-f-f3ff41e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5035%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Firelight%20Lightbox&amp;severity=medium&amp;id=685e380cca1063fb8753f695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41418-buffer-overflow-in-tb-eye-ltd-xrn-4-77939412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41418%3A%20Buffer%20overflow%20in%20TB-eye%20Ltd.%20XRN-410SN%2FTE&amp;severity=medium&amp;id=6862dd626f40f0eb728ca981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36529-improper-neutralization-of-special--81349574</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36529%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TB-eye%20Ltd.%20XRN-410SN%2FTE&amp;severity=high&amp;id=6862dd626f40f0eb728ca97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ongoing-campaign-abuses-microsoft-365s-direct-send-7708e912</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ongoing%20Campaign%20Abuses%20Microsoft%20365%E2%80%99s%20Direct%20Send%20to%20Deliver%20Phishing%20Emails&amp;severity=high&amp;id=685e22f5ca1063fb874f4897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6488-cwe-79-improper-neutralization-of-in-431edc69</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jairoochoa%20isMobile()%20Shortcode%20for%20WordPress&amp;severity=medium&amp;id=685e1f70ca1063fb874f3b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6753-sql-injection-in-huija-bicyclesharin-6a1f0b25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6753%3A%20SQL%20Injection%20in%20huija%20bicycleSharingServer&amp;severity=medium&amp;id=685e1bebca1063fb874f2cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6752-stack-based-buffer-overflow-in-links-310afaff</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6752%3A%20Stack-based%20Buffer%20Overflow%20in%20Linksys%20WRT1900ACS&amp;severity=high&amp;id=685e14e3ca1063fb874f17e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6751-buffer-overflow-in-linksys-e8450-8e4710f6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6751%3A%20Buffer%20Overflow%20in%20Linksys%20E8450&amp;severity=high&amp;id=685e117bca1063fb874f03a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6750-heap-based-buffer-overflow-in-hdf5-cfe75bf7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6750%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=685e0a57ca1063fb874ed12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6749-sql-injection-in-huija-bicyclesharin-6edc78ed</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6749%3A%20SQL%20Injection%20in%20huija%20bicycleSharingServer&amp;severity=medium&amp;id=685dffcbca1063fb874e0964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6748-cleartext-storage-in-a-file-or-on-di-fd542e19</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6748%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Bharti%20Airtel%20Thanks%20App&amp;severity=low&amp;id=685dffcbca1063fb874e095d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6738-sql-injection-in-huija-bicyclesharin-a1bd9986</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6738%3A%20SQL%20Injection%20in%20huija%20bicycleSharingServer&amp;severity=medium&amp;id=685de734ca1063fb874d8f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-27-564784fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-27&amp;severity=medium&amp;id=685f32ae6f40f0eb72691e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44559-na-d2e95e5a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44559%3A%20n%2Fa&amp;severity=medium&amp;id=685ed0476f40f0eb72654d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52207-cwe-23-relative-path-traversal-in-m-73dfcbdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52207%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20MIKO%20MikoPBX&amp;severity=critical&amp;id=685ed0476f40f0eb72654d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44557-na-bbfa25d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44557%3A%20n%2Fa&amp;severity=high&amp;id=685eccc36f40f0eb72653af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50367-na-163aa0da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50367%3A%20n%2Fa&amp;severity=medium&amp;id=685ebeb26f40f0eb7265080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50370-na-fee47f00</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50370%3A%20n%2Fa&amp;severity=medium&amp;id=685ebeb26f40f0eb72650807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50369-na-6cce9f23</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50369%3A%20n%2Fa&amp;severity=medium&amp;id=685ebeb26f40f0eb72650804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45729-na-f910ed4b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45729%3A%20n%2Fa&amp;severity=medium&amp;id=685ea6216f40f0eb7263a4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44163-na-656c887c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44163%3A%20n%2Fa&amp;severity=medium&amp;id=685ea6216f40f0eb7263a4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52993-cwe-362-concurrent-execution-using--6c3ce1e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52993%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20NixOS%20Nix&amp;severity=medium&amp;id=685ea2a26f40f0eb726349de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50528-na-775af79e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50528%3A%20n%2Fa&amp;severity=high&amp;id=685ea2a26f40f0eb726349db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52992-na-17fd70a9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52992%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NixOS%20Nix&amp;severity=low&amp;id=685ea032f6cf9081996a7906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52991-cwe-276-incorrect-default-permissio-241e11bb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52991%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20NixOS%20Nix&amp;severity=low&amp;id=685ea032f6cf9081996a78fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46416-cwe-282-improper-ownership-manageme-5118c122</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46416%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20NixOS%20Nix&amp;severity=low&amp;id=685ea032f6cf9081996a78f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46415-cwe-367-time-of-check-time-of-use-t-8af44bd3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46415%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20NixOS%20Nix&amp;severity=low&amp;id=685e9caaf6cf9081996a6c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45851-na-5cf1c480</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45851%3A%20n%2Fa&amp;severity=high&amp;id=685e8c6cca1063fb875df1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45737-na-fd96cb99</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45737%3A%20n%2Fa&amp;severity=medium&amp;id=685e1bebca1063fb874f2cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47824-cwe-312-cleartext-storage-of-sensit-7e1102d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47824%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Flock%20Safety%20License%20Plate%20Reader&amp;severity=low&amp;id=685e0a57ca1063fb874ed129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47823-cwe-259-use-of-hard-coded-password--62cf60be</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47823%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Flock%20Safety%20License%20Plate%20Reader&amp;severity=low&amp;id=685e0a57ca1063fb874ed126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47822-cwe-1191-on-chip-debug-and-test-int-de8e926e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47822%3A%20CWE-1191%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Flock%20Safety%20License%20Plate%20Reader&amp;severity=medium&amp;id=685e0a57ca1063fb874ed123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47821-cwe-259-use-of-hard-coded-password--4cb95b8f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47821%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=low&amp;id=685e0a57ca1063fb874ed120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47820-na-122123c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47820%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=low&amp;id=685dffcbca1063fb874e095a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47819-cwe-1191-on-chip-debug-and-test-int-9ab52485</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47819%3A%20CWE-1191%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=medium&amp;id=685dffcbca1063fb874e0957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47818-cwe-259-use-of-hard-coded-password--38692401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47818%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Flock%20Safety%20Gunshot%20Detection%20devices&amp;severity=low&amp;id=685dffcbca1063fb874e0954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-an-email-address-crypto-wallet-and-youtube-act-8e655f84</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20an%20Email%20Address%2C%20Crypto%20Wallet%20and%20YouTube%20Activity%20Led%20the%20FBI%20to%20IntelBroker&amp;severity=medium&amp;id=685ddca2ca1063fb874d51ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6736-improper-authorization-in-juzaweb-cm-0216ef9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6736%3A%20Improper%20Authorization%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=685dd920ca1063fb874d26f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6735-improper-authorization-in-juzaweb-cm-7f0e5032</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6735%3A%20Improper%20Authorization%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=685dd91fca1063fb874d26f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6734-buffer-overflow-in-utt-hiper-840g-7d68db41</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6734%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=685ea99c6f40f0eb7263bdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3699-cwe-306-missing-authentication-for-c-5fa3dc0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3699%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Corporation%20G-50&amp;severity=critical&amp;id=685dce93ca1063fb874c451e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6733-buffer-overflow-in-utt-hiper-840g-93519f64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6733%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=685dce93ca1063fb874c4522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6732-buffer-overflow-in-utt-hiper-840g-78c74ee2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6732%3A%20Buffer%20Overflow%20in%20UTT%20HiPER%20840G&amp;severity=high&amp;id=685dc084ca1063fb874a8274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6731-path-traversal-in-yzcheng90-x-spring-c461f82e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6731%3A%20Path%20Traversal%20in%20yzcheng90%20X-SpringBoot&amp;severity=medium&amp;id=685dc084ca1063fb874a826d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5731-generation-of-error-message-containi-8b658f4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5731%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20infinispan&amp;severity=medium&amp;id=685dbd00ca1063fb874916cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sadfuture-mapping-xdspy-latest-evolution-19ce76e4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SadFuture%3A%20Mapping%20XDSpy%20latest%20evolution&amp;severity=medium&amp;id=685dbcffca1063fb874915dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-kimsukys-attacks-on-south-korea-in-dept-66d7e4b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20Kimsuky&apos;s%20Attacks%20on%20South%20Korea%3A%20In-Depth%20Analysis%20of%20GitHub-Based%20Malicious%20Infrastructure&amp;severity=medium&amp;id=685dbcffca1063fb8749169d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-exploit-social-security-statement-theme-to--26df1441</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20Exploit%20Social%20Security%20Statement%20Theme%20to%20Target%20Over%202%2C000%20Victims%20with%20Malware&amp;severity=medium&amp;id=685db983ca1063fb87490362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shoe-rack-a-post-exploitation-tool-for-remote-shel-a1641051</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SHOE%20RACK%3A%20A%20post-exploitation%20tool%20for%20remote%20shell%20access%20%26%20TCP%20tunnelling%20through%20a%20victim%20device&amp;severity=medium&amp;id=685db983ca1063fb87490368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-educated-manticore-targets-leading-tech-ac-30b6185d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Educated%20Manticore%20Targets%20Leading%20Tech%20Academics&amp;severity=medium&amp;id=685db5f7ca1063fb8748f6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53122-cwe-89-improper-neutralization-of-s-2e223c61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53122%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20The%20OpenNMS%20Group%20Horizon&amp;severity=medium&amp;id=685da7e9ca1063fb8748af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49592-cwe-601-url-redirection-to-untruste-61c85965</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49592%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=685da483ca1063fb8744e14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/man-pleads-guilty-to-hacking-networks-to-pitch-sec-33ec9b13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Man%20pleads%20guilty%20to%20hacking%20networks%20to%20pitch%20security%20services&amp;severity=high&amp;id=685da464ca1063fb8744e0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisco-warns-of-max-severity-rce-flaws-in-identity--1cc0ad15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cisco%20warns%20of%20max%20severity%20RCE%20flaws%20in%20Identity%20Services%20Engine&amp;severity=high&amp;id=685da464ca1063fb8744e0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-student-charged-over-hacking-university-for-che-15146df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-student%20charged%20over%20hacking%20university%20for%20cheap%20parking%2C%20data%20breaches&amp;severity=high&amp;id=685da464ca1063fb8744e0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5995-cwe-732-incorrect-permission-assignm-1844fd88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5995%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Canon%20USA%20Inc.%20Canon%20EOS%20Webcam%20Utility%20Pro&amp;severity=medium&amp;id=685d9d5eca1063fb8744d17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53121-cwe-79-improper-neutralization-of-i-fd7bdf36</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20The%20OpenNMS%20Group%20Horizon&amp;severity=medium&amp;id=685d99d8ca1063fb8744adee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53013-cwe-287-improper-authentication-in--6728bb9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53013%3A%20CWE-287%3A%20Improper%20Authentication%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=685d8f4dca1063fb87448e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/black-hat-seo-poisoning-search-engine-results-for--06a1a93b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Black%20Hat%20SEO%20Poisoning%20Search%20Engine%20Results%20For%20AI%20to%20Distribute%20Malware&amp;severity=medium&amp;id=685db273ca1063fb8748d2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-open-source-tools-to-target-a-91909d0e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Open-Source%20Tools%20To%20Target%20Africa&apos;s%20Financial%20Sector&amp;severity=medium&amp;id=685db273ca1063fb8748d2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52477-cwe-918-server-side-request-forgery-429a8d6a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52477%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20octo-sts%20app&amp;severity=high&amp;id=685e9caaf6cf9081996a6c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/when-your-login-page-becomes-the-frontline-lessons-ff6e5def</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=When%20Your%20Login%20Page%20Becomes%20the%20Frontline%3A%20Lessons%20from%20a%20Real-World%20DDoS%20Attack&amp;severity=medium&amp;id=685d7a58ca1063fb8742ff89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34047-cwe-22-improper-limitation-of-a-pat-2b7d8032</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34047%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Beijing%20NetGuard%20Nebula%20Information%20Technology%20Co.%2C%20Ltd.%20Leadsec%20SSL%20VPN&amp;severity=high&amp;id=685d732dca1063fb8742c4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6702-improper-authorization-in-linlinjava-2b5b27bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6702%3A%20Improper%20Authorization%20in%20linlinjava%20litemall&amp;severity=medium&amp;id=685d6fabca1063fb8742bbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6701-open-redirect-in-xuxueli-xxl-sso-fb65af97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6701%3A%20Open%20Redirect%20in%20Xuxueli%20xxl-sso&amp;severity=medium&amp;id=685d6fabca1063fb8742bbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34049-cwe-78-improper-neutralization-of-s-410849dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34049%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20OptiLink%20ONT1GEW%20GPON&amp;severity=critical&amp;id=685d6fabca1063fb8742bc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34048-cwe-22-improper-limitation-of-a-pat-da453f9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34048%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20D-Link%20DSL-2730U&amp;severity=high&amp;id=685d6fabca1063fb8742bc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34046-cwe-434-unrestricted-upload-of-file-dae91445</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34046%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Shanghai%20Fanwei%20Network%20Technology%20E-Office&amp;severity=critical&amp;id=685d6fabca1063fb8742bc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34045-cwe-22-improper-limitation-of-a-pat-768a1591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34045%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Shenzhen%20Yuanmengyun%20Technology%20Co.%2C%20Ltd.%20WeiPHP&amp;severity=high&amp;id=685d6fabca1063fb8742bc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34044-cwe-78-improper-neutralization-of-s-b65d5c0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34044%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20Lingkong%20Technology%20WIFISKY%207-layer%20flow%20control%20router&amp;severity=critical&amp;id=685d6fabca1063fb8742bbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34043-cwe-78-improper-neutralization-of-s-3be769f2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34043%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Vacron%20Network%20Video%20Recorder%20(NVR)&amp;severity=critical&amp;id=685d6fabca1063fb8742bbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34042-cwe-78-improper-neutralization-of-s-90e717f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34042%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Beward%20N100%20IP%20Camera&amp;severity=critical&amp;id=685d6fabca1063fb8742bbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6700-cross-site-scripting-in-xuxueli-xxl--97856b1f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6700%3A%20Cross%20Site%20Scripting%20in%20Xuxueli%20xxl-sso&amp;severity=medium&amp;id=685d6c25ca1063fb8742933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6699-cross-site-scripting-in-labredescefe-adc4acda</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6699%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d6c25ca1063fb87429338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36034-cwe-319-cleartext-transmission-of-s-621c1640</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36034%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=685d651dca1063fb874274d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6698-cross-site-scripting-in-labredescefe-5dcf952f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6698%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d651dca1063fb874274df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6697-cross-site-scripting-in-labredescefe-7bfba8e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6697%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d651dca1063fb874274d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53007-cwe-113-improper-neutralization-of--e38a12c0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53007%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20espressif%20arduino-esp32&amp;severity=high&amp;id=685d5e15ca1063fb8742460b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53002-cwe-94-improper-control-of-generati-676f1b8a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53002%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hiyouga%20LLaMA-Factory&amp;severity=high&amp;id=685d5e15ca1063fb87424606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52887-cwe-400-uncontrolled-resource-consu-002cb24c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52887%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=685d5e16ca1063fb87424617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6696-cross-site-scripting-in-labredescefe-3014a32e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6696%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d5e15ca1063fb87424611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6710-cwe-674-uncontrolled-recursion-in-mo-b44d615d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6710%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=685d570dca1063fb8741f4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52573-cwe-78-improper-neutralization-of-s-6f9863eb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52573%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20joshuayoes%20ios-simulator-mcp&amp;severity=medium&amp;id=685d570dca1063fb8741f497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6709-cwe-20-improper-input-validation-in--ac753966</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6709%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=high&amp;id=685d570dca1063fb8741f4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6707-cwe-863-incorrect-authorization-in-m-57ca4429</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6707%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=685d570dca1063fb8741f49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6706-cwe-416-use-after-free-in-mongodb-in-0ead070d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6706%3A%20CWE-416%3A%20Use%20After%20Free%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=685d8844ca1063fb874372ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scanning-beyond-the-patch-a-public-interest-hunt-f-c8dbec36</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scanning%20Beyond%20the%20Patch%3A%20A%20Public-Interest%20Hunt%20for%20Hidden%20Shells&amp;severity=medium&amp;id=685d538eca1063fb8741e2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6677-cwe-79-improper-neutralization-of-in-eaaf647e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6677%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Paragraphs%20table&amp;severity=high&amp;id=685d5007ca1063fb8741d93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6676-cwe-79-improper-neutralization-of-in-147ac687</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6676%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Simple%20XML%20sitemap&amp;severity=high&amp;id=685d5007ca1063fb8741d93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6675-cwe-288-authentication-bypass-using--2a34fbd7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6675%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=medium&amp;id=685d5007ca1063fb8741d937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6674-cwe-79-improper-neutralization-of-in-97abd6ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20CKEditor5%20Youtube&amp;severity=medium&amp;id=685d5007ca1063fb8741d934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5682-cwe-79-improper-neutralization-of-in-d66edece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Klaro%20Cookie%20%26%20Consent%20Management&amp;severity=medium&amp;id=685d5007ca1063fb8741d931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48921-cwe-352-cross-site-request-forgery--81423e84</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48921%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Open%20Social&amp;severity=high&amp;id=685d5007ca1063fb8741d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48922-cwe-79-improper-neutralization-of-i-35b47c76</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20GLightbox&amp;severity=medium&amp;id=685d5007ca1063fb8741d92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48923-cwe-79-improper-neutralization-of-i-def346ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Toc.js&amp;severity=medium&amp;id=685d5007ca1063fb8741d92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6695-cross-site-scripting-in-labredescefe-347b3293</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6695%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d5007ca1063fb8741d946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6694-cross-site-scripting-in-labredescefe-5eb64924</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6694%3A%20Cross%20Site%20Scripting%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=medium&amp;id=685d5007ca1063fb8741d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6693-memory-corruption-in-rt-thread-752bc7a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6693%3A%20Memory%20Corruption%20in%20RT-Thread&amp;severity=high&amp;id=685d48feca1063fb8741c2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5966-cwe-79-improper-neutralization-of-in-ea25dce9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=685d3e71ca1063fb87418b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5366-cwe-79-improper-neutralization-of-in-4711de9a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=high&amp;id=685d3e71ca1063fb87418b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6562-cwe-78-improper-neutralization-of-sp-1eb379f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6562%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hunt%20Electronic%20Hybrid%20DVR&amp;severity=high&amp;id=685d3aedca1063fb87418066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6561-cwe-497-exposure-of-sensitive-system-b3ac79e7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6561%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Hunt%20Electronic%20HBF-09KD&amp;severity=critical&amp;id=685d376bca1063fb87417329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/marketplace-takeover-how-we-couldve-taken-over-eve-b63229dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Marketplace%20Takeover%3A%20How%20We%20Could%E2%80%99ve%20Taken%20Over%20Every%20Developer%20Using%20a%20VSCode%20Fork%20-%20Putting%20Millions%20at%20Risk&amp;severity=medium&amp;id=685d2ce3ca1063fb874146a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3771-cwe-59-improper-link-resolution-befo-c10e8f72</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3771%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Trellix%20System%20Information%20Reporter&amp;severity=high&amp;id=685d2cdeca1063fb8741469d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-turn-screenconnect-into-malware-using-auth-8e94e416</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20turn%20ScreenConnect%20into%20malware%20using%20Authenticode%20stuffing&amp;severity=high&amp;id=685d17c5ca1063fb8740885e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-intelbroker-charged-in-us-for-global-data-t-51c375cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20&apos;IntelBroker&apos;%20charged%20in%20US%20for%20global%20data%20theft%20breaches&amp;severity=high&amp;id=685d17c5ca1063fb8740885a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/breachforums-crackdown-4-shinyhunters-members-arre-2fa1a5f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BreachForums%20Crackdown%3A%204%20ShinyHunters%20Members%20Arrested%2C%20IntelBroker%20hacker%20Identified%20as%20British%20National%20Kai%20West&amp;severity=medium&amp;id=685d1440ca1063fb87407936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6703-cwe-20-improper-input-validation-in--6bff0924</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6703%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Mozilla%20neqo&amp;severity=low&amp;id=685d17e3ca1063fb87408893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6212-cwe-79-improper-neutralization-of-in-74d0ad8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=high&amp;id=685d144eca1063fb8740799a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5338-cwe-79-improper-neutralization-of-in-78e7f8c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=685d144eca1063fb8740798e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5842-cwe-79-improper-neutralization-of-in-e03fe6cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5842%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20butterflymedia%20Modern%20Design%20Library&amp;severity=medium&amp;id=685d144eca1063fb87407994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5459-cwe-78-improper-neutralization-of-sp-502a82e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5459%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Perforce%20Puppet%20Enterprise&amp;severity=high&amp;id=685ceee1be005fe9be6e0bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48497-cross-site-request-forgery-csrf-in--a4d04446</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48497%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20iroha%20Soft%20Co.%2C%20Ltd.%20iroha%20Board&amp;severity=medium&amp;id=685ce818e230f5b23489f5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41404-direct-request-forced-browsing-in-i-8159e336</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41404%3A%20Direct%20request%20(&apos;Forced%20Browsing&apos;)%20in%20iroha%20Soft%20Co.%2C%20Ltd.%20iroha%20Board&amp;severity=medium&amp;id=685ce818e230f5b23489f5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37101-cwe-269-improper-privilege-manageme-3756c441</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37101%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hewlett%20Packard%20Enterprise%20HPE%20OneView%20for%20VMware%20vCenter&amp;severity=high&amp;id=685cda08e230f5b23489c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6624-insertion-of-sensitive-information-i-2623de1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6624%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20snyk&amp;severity=low&amp;id=685cd684e230f5b234897c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/read-windows-registry-manipulation-by-onesithuatio-66ee35c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Read%20%E2%80%9CWindows%20Registry%20Manipulation%E2%80%9C%20by%20ONESithuation&amp;severity=critical&amp;id=685cdd90e230f5b23489cd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6540-cwe-79-improper-neutralization-of-in-64887c36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20murtuzamakda52%20web-cam&amp;severity=medium&amp;id=685cb6e0e230f5b234861d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5813-cwe-862-missing-authorization-in-suh-c430f0dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5813%3A%20CWE-862%20Missing%20Authorization%20in%20suhailahmad64%20Amazon%20Products%20to%20WooCommerce&amp;severity=medium&amp;id=685cb6e0e230f5b234861d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6546-cwe-79-improper-neutralization-of-in-b774266a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azumbro%20Drive%20Folder%20Embedder&amp;severity=medium&amp;id=685cb6e0e230f5b234861d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5275-cwe-79-improper-neutralization-of-in-a966e5f6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=685cb6e0e230f5b234861d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6537-cwe-79-improper-neutralization-of-in-2c6ca11b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdesignfa%20Namasha%20By%20Mdesign&amp;severity=medium&amp;id=685cb6e0e230f5b234861d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5932-cwe-352-cross-site-request-forgery-c-a7dcc665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5932%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20coolrunner%20Homerunner&amp;severity=medium&amp;id=685cb6e0e230f5b234861d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5929-cwe-79-improper-neutralization-of-in-d35b1e67</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5929%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zourbuth%20The%20Countdown%20%E2%80%93%20Block%20Countdown%20Timer&amp;severity=medium&amp;id=685cb6e0e230f5b234861d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5559-cwe-79-improper-neutralization-of-in-6899ee5d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neoxx%20TimeZoneCalculator&amp;severity=medium&amp;id=685cac96e230f5b2348611fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5540-cwe-79-improper-neutralization-of-in-e8728bf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5540%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Event%20RSVP%20and%20Simple%20Event%20Management%20Plugin&amp;severity=medium&amp;id=685cac96e230f5b2348611f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6258-cwe-79-improper-neutralization-of-in-c5e6909e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grosbouff%20WP%20SoundSystem&amp;severity=medium&amp;id=685cac9ee230f5b23486121c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5564-cwe-79-improper-neutralization-of-in-e0ad9138</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gurievcreative%20GC%20Social%20Wall&amp;severity=medium&amp;id=685cac97e230f5b2348611ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4334-cwe-269-improper-privilege-managemen-5b447c21</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4334%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20nmedia%20Simple%20User%20Registration&amp;severity=critical&amp;id=685cac95e230f5b2348611ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6383-cwe-79-improper-neutralization-of-in-89de9861</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fmos%20WP-PhotoNav&amp;severity=medium&amp;id=685cac9ee230f5b234861228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6290-cwe-79-improper-neutralization-of-in-79de8e58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blakelong%20Tournament%20Bracket%20Generator&amp;severity=medium&amp;id=685cac9ee230f5b234861220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5812-cwe-862-missing-authorization-in-vgw-7d62c643</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5812%3A%20CWE-862%20Missing%20Authorization%20in%20vgwort%20VG%20WORT%20METIS&amp;severity=medium&amp;id=685cac97e230f5b23486120e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6378-cwe-79-improper-neutralization-of-in-fcd224cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20corporatezen222%20Responsive%20Food%20and%20Drink%20Menu&amp;severity=medium&amp;id=685cac9ee230f5b234861224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6538-cwe-79-improper-neutralization-of-in-454c3cb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bourgesloic%20Post%20Rating%20and%20Review&amp;severity=medium&amp;id=685cac9ee230f5b23486122c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3863-cwe-862-missing-authorization-in-plu-90af2711</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3863%3A%20CWE-862%20Missing%20Authorization%20in%20plugindevs%20Post%20Carousel%20Slider%20for%20Elementor&amp;severity=medium&amp;id=685cac94e230f5b2348611e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5590-cwe-89-improper-neutralization-of-sp-938596fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5590%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopiplus%20Owl%20carousel%20responsive&amp;severity=high&amp;id=685cac97e230f5b234861209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5488-cwe-79-improper-neutralization-of-in-bcfcb693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaushik07%20WP%20Masonry%20%26%20Infinite%20Scroll&amp;severity=medium&amp;id=685cac96e230f5b2348611ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5535-cwe-79-improper-neutralization-of-in-1693db17</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chemiker%20e.nigma%20buttons&amp;severity=medium&amp;id=685cac96e230f5b2348611f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5588-cwe-79-improper-neutralization-of-in-d699c6e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ickata%20Image%20Editor%20by%20Pixo&amp;severity=medium&amp;id=685cac97e230f5b234861203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sitecore-104-remote-code-execution-rce-80476233</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sitecore%2010.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685e4315ca1063fb8755ec3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mcafee-agent-576-insecure-storage-of-sensitive-inf-9639d558</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=McAfee%20Agent%205.7.6%20-%20Insecure%20Storage%20of%20Sensitive%20Information&amp;severity=medium&amp;id=685e4315ca1063fb8755ec39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/social-warfare-wordpress-plugin-352-remote-code-ex-12449699</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Social%20Warfare%20WordPress%20Plugin%203.5.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685e4315ca1063fb8755ec34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-26-78bf251d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-26&amp;severity=medium&amp;id=685de3a4ca1063fb874d6fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49603-na-5cc2465e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49603%3A%20n%2Fa&amp;severity=critical&amp;id=685d813cca1063fb87434a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30131-na-a9e4aa27</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30131%3A%20n%2Fa&amp;severity=critical&amp;id=685d76b1ca1063fb8742d05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44141-na-1a9fa0b6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44141%3A%20n%2Fa&amp;severity=medium&amp;id=685d6fabca1063fb8742bc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50350-na-4a27fa76</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50350%3A%20n%2Fa&amp;severity=medium&amp;id=685d6c25ca1063fb87429335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51672-na-efece6cb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51672%3A%20n%2Fa&amp;severity=high&amp;id=685d651dca1063fb874274d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51671-na-1e928e6b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51671%3A%20n%2Fa&amp;severity=medium&amp;id=685d651dca1063fb874274d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29331-na-4e17c3ba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29331%3A%20n%2Fa&amp;severity=high&amp;id=685d6199ca1063fb87425a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/px4-military-uav-autopilot-1123-denial-of-service--4c19e4d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PX4%20Military%20UAV%20Autopilot%201.12.3%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=685cf039be005fe9be6e5a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/onetrust-sdk-6330-denial-of-service-dos-1fb291bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneTrust%20SDK%206.33.0%20-%20Denial%20Of%20Service%20(DoS)&amp;severity=medium&amp;id=685cf038be005fe9be6e5a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pterodactyl-panel-11111-remote-code-execution-rce-8a541928</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pterodactyl%20Panel%201.11.11%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685cf038be005fe9be6e5a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freesshd-109-denial-of-service-dos-69eb6a7a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=freeSSHd%201.0.9%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=685cf038be005fe9be6e5a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-excel-2024-use-after-free-remote-code-ex-400f48ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Excel%202024%20Use%20after%20free%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=685cf038be005fe9be6e5a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6669-use-of-hard-coded-cryptographic-key--6cad72de</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6669%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20gooaclok819%20sublinkX&amp;severity=medium&amp;id=685c7b1ce230f5b23485b964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6668-sql-injection-in-code-projects-inven-1893474f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6668%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c7537e230f5b23485b2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6667-unrestricted-upload-in-code-projects-f42abaa2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6667%3A%20Unrestricted%20Upload%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=685c7536e230f5b23485b2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6640-cwe-416-use-after-free-in-pdf-xchang-0d7c25f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6640%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6641-cwe-125-out-of-bounds-read-in-pdf-xc-d7035805</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6641%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6642-cwe-125-out-of-bounds-read-in-pdf-xc-00f10b6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6642%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6643-cwe-125-out-of-bounds-read-in-pdf-xc-350fc726</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6643%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6644-cwe-416-use-after-free-in-pdf-xchang-d6d7ebdc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6644%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6645-cwe-416-use-after-free-in-pdf-xchang-1cb48aef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6645%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6646-cwe-416-use-after-free-in-pdf-xchang-06e9e6ad</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6646%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6647-cwe-787-out-of-bounds-write-in-pdf-x-987b8e5a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6647%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c711fe230f5b23485ac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6648-cwe-125-out-of-bounds-read-in-pdf-xc-812011a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6648%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6649-cwe-125-out-of-bounds-read-in-pdf-xc-dd436168</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6649%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c711fe230f5b23485ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6650-cwe-125-out-of-bounds-read-in-pdf-xc-c2419207</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6650%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485ac9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6651-cwe-787-out-of-bounds-write-in-pdf-x-c365213a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6651%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7122e230f5b23485aca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6652-cwe-125-out-of-bounds-read-in-pdf-xc-627a565d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6652%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485aca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6653-cwe-125-out-of-bounds-read-in-pdf-xc-2cda1d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6653%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6654-cwe-787-out-of-bounds-write-in-pdf-x-34b78574</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6654%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7122e230f5b23485acae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6655-cwe-125-out-of-bounds-read-in-pdf-xc-6d28396b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6655%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6656-cwe-125-out-of-bounds-read-in-pdf-xc-192edc05</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6656%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6657-cwe-125-out-of-bounds-read-in-pdf-xc-35fbf47e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6657%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6658-cwe-125-out-of-bounds-read-in-pdf-xc-5d13f058</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6658%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7122e230f5b23485acbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6659-cwe-787-out-of-bounds-write-in-pdf-x-6d2aefb2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6659%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7122e230f5b23485acc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6660-cwe-122-heap-based-buffer-overflow-i-eabc3c0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6660%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7124e230f5b23485acd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6661-cwe-416-use-after-free-in-pdf-xchang-00cebe17</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6661%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=685c7124e230f5b23485acd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6662-cwe-125-out-of-bounds-read-in-pdf-xc-550345dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6662%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=685c7124e230f5b23485acd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6443-cwe-284-improper-access-control-in-m-970eed43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6443%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Mikrotik%20RouterOS&amp;severity=high&amp;id=685c6d0de230f5b23485a8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36038-cwe-502-deserialization-of-untruste-04667f61</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36038%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=critical&amp;id=685c6281e230f5b234859062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6665-sql-injection-in-code-projects-inven-1f3ecbff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6665%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c5efde230f5b2348587b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6664-cross-site-request-forgery-in-codeas-b5322a3d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6664%3A%20Cross-Site%20Request%20Forgery%20in%20CodeAstro%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=685c5efde230f5b2348587ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6627-buffer-overflow-in-totolink-a702r-0e959a08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6627%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=685c42dde230f5b234855d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5825-cwe-1328-security-version-number-mut-a6d95e9f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5825%3A%20CWE-1328%3A%20Security%20Version%20Number%20Mutable%20to%20Older%20Versions%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b23485596f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6678-cwe-306-missing-authentication-for-c-745b8358</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6678%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5be230f5b2348559a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5830-cwe-122-heap-based-buffer-overflow-i-66638fa9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5830%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b234855984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5829-cwe-121-stack-based-buffer-overflow--48c553e5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5829%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b234855981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5823-cwe-749-exposed-dangerous-method-or--6d9e062e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5823%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b234855975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5827-cwe-121-stack-based-buffer-overflow--969c166a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5827%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b23485597b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5822-cwe-863-incorrect-authorization-in-a-e985d2d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5822%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=high&amp;id=685c3f5ae230f5b234855972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5828-cwe-120-buffer-copy-without-checking-557045fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5828%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b23485597e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5826-cwe-115-misinterpretation-of-input-i-b9919645</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5826%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3f5ae230f5b234855978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6621-os-command-injection-in-totolink-ca3-fcebe138</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6621%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c3f5ae230f5b23485598f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6620-os-command-injection-in-totolink-ca3-e2fd2723</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6620%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c3f5ae230f5b234855987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5824-cwe-346-origin-validation-error-in-a-41b5f10e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5824%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Autel%20Autel%20MaxiCharger%20AC%20Wallbox%20Commercial&amp;severity=medium&amp;id=685c3bd7e230f5b234855609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5833-cwe-345-insufficient-verification-of-87076187</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5833%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Pioneer%20DMH-WT7600NEX&amp;severity=medium&amp;id=685c3bd7e230f5b23485560f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5834-cwe-1326-missing-immutable-root-of-t-c7959ac4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5834%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Pioneer%20DMH-WT7600NEX&amp;severity=medium&amp;id=685c3bd7e230f5b234855612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5832-cwe-345-insufficient-verification-of-171c49b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5832%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Pioneer%20DMH-WT7600NEX&amp;severity=medium&amp;id=685c3bd7e230f5b23485560c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49550-incorrect-authorization-cwe-863-in--4e9efe26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49550%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=685c3853e230f5b2348551ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49549-incorrect-authorization-cwe-863-in--b0c08deb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49549%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=low&amp;id=685c3853e230f5b2348551ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6619-os-command-injection-in-totolink-ca3-de6eef74</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6619%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c33b3f95e997babc44cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6618-os-command-injection-in-totolink-ca3-46f08228</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6618%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20CA300-PoE&amp;severity=medium&amp;id=685c33b3f95e997babc44cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52999-cwe-121-stack-based-buffer-overflow-735e56b8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52999%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20FasterXML%20jackson-core&amp;severity=high&amp;id=685c2fdef95e997babc447c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6617-stack-based-buffer-overflow-in-d-lin-386e3448</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6617%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c2fdef95e997babc447c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6442-cwe-444-inconsistent-interpretation--3ded5a96</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6442%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Ruby%20WEBrick&amp;severity=medium&amp;id=685c2b635eba5e446993156f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52890-cwe-863-incorrect-authorization-in--1aef94a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52890%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20lxc%20incus&amp;severity=high&amp;id=685c2b635eba5e446993157c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52889-cwe-770-allocation-of-resources-wit-6898e228</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52889%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20lxc%20incus&amp;severity=low&amp;id=685c2b635eba5e4469931577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52569-cwe-20-improper-input-validation-in-dc144136</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52569%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20JuliaWeb%20GitHub.jl&amp;severity=medium&amp;id=685c2b635eba5e4469931573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52483-cwe-77-improper-neutralization-of-s-27fbc22c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52483%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20JuliaRegistries%20Registrator.jl&amp;severity=high&amp;id=685c27e95eba5e446992c41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52480-cwe-88-improper-neutralization-of-a-1e629a47</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52480%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20JuliaRegistries%20Registrator.jl&amp;severity=high&amp;id=685c27e95eba5e446992c417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49153-cwe-22-in-microsens-nmp-web-339cfd7d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49153%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsens%20NMP%20Web%2B&amp;severity=critical&amp;id=685c27e95eba5e446992c413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49152-cwe-613-in-microsens-nmp-web-2b881af1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49152%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Microsens%20NMP%20Web%2B&amp;severity=high&amp;id=685c27e95eba5e446992c40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49151-cwe-547-in-microsens-nmp-web-86dd5f4c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49151%3A%20CWE-547%3A%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20Microsens%20NMP%20Web%2B&amp;severity=critical&amp;id=685c27e95eba5e446992c40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6616-stack-based-buffer-overflow-in-d-lin-ca1f557e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6616%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c27e95eba5e446992c41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20282-improper-privilege-management-in-ci-0760efa9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20282%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=685c27e95eba5e446992c408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5015-cwe-79-in-parsons-parsons-utility-en-9591678a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5015%3A%20CWE-79%20in%20Parsons%20Parsons%20Utility%20Enterprise%20Data%20Management&amp;severity=high&amp;id=685c25a8c6576a567aed85d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4656-cwe-1088-synchronous-access-of-remot-41496894</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4656%3A%20CWE-1088%3A%20Synchronous%20Access%20of%20Remote%20Resource%20without%20Timeout%20in%20HashiCorp%20Vault&amp;severity=low&amp;id=685c25a8c6576a567aed85d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20281-improper-neutralization-of-special--8517b3eb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=685c2224c6576a567aed81d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20264-improper-authorization-in-cisco-cis-9f8bb528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20264%3A%20Improper%20Authorization%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=685c2224c6576a567aed81d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52479-cwe-93-improper-neutralization-of-c-438c1867</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52479%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20JuliaWeb%20HTTP.jl&amp;severity=high&amp;id=685c2224c6576a567aed81d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6615-stack-based-buffer-overflow-in-d-lin-c3f50cb6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6615%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c1eaac6576a567aed30cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6614-stack-based-buffer-overflow-in-d-lin-e0ea9a53</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6614%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=685c1eaac6576a567aed30c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50179-cwe-352-cross-site-request-forgery--b133d1d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50179%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=685c1d03a1cfc9c6487ddcb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6612-sql-injection-in-code-projects-inven-19a0ed9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6612%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c197fa1cfc9c6487da229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6611-sql-injection-in-code-projects-inven-589f3d2f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6611%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=685c197fa1cfc9c6487da222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50178-cwe-20-improper-input-validation-in-1ac61cec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50178%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20JuliaWeb%20GitForge.jl&amp;severity=medium&amp;id=685c15fca1cfc9c6487d9ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49135-cwe-639-authorization-bypass-throug-d5e69b04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49135%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=685c1277a1cfc9c6487d9af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6610-sql-injection-in-itsourcecode-employ-0b0ba8f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6610%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Management%20System&amp;severity=medium&amp;id=685c1277a1cfc9c6487d9afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/citrix-bleed-2-flaw-enables-token-theft-sap-gui-fl-92d424e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Citrix%20Bleed%202%20Flaw%20Enables%20Token%20Theft%3B%20SAP%20GUI%20Flaws%20Risk%20Sensitive%20Data%20Exposure&amp;severity=high&amp;id=685c0b6ea1cfc9c6487d92bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6609-sql-injection-in-sourcecodester-best-ac731c79</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6609%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685c0b82a1cfc9c6487d9357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6608-sql-injection-in-sourcecodester-best-ecdef505</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6608%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685c0b82a1cfc9c6487d935e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48991-cwe-352-cross-site-request-forgery--96e2e7b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48991%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=685c0467a1cfc9c6487d811f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6607-sql-injection-in-sourcecodester-best-65b72971</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6607%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685c0467a1cfc9c6487d8125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6606-sql-injection-in-sourcecodester-best-4f3861ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6606%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685bfd5fa1cfc9c6487d7a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6605-sql-injection-in-sourcecodester-best-a5cdf7e0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6605%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685bfd5fa1cfc9c6487d7a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6604-sql-injection-in-sourcecodester-best-063dd228</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6604%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685bf657a1cfc9c6487d68fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6543-cwe-119-improper-restriction-of-oper-3fb98c7c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6543%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=685bf2d5a1cfc9c6487d64f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25012-cwe-601-url-redirection-to-untruste-7f683c44</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25012%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=685be4c4a1cfc9c6487d56bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6603-integer-overflow-in-coldfunction-qcu-634a83a2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6603%3A%20Integer%20Overflow%20in%20coldfunction%20qCUDA&amp;severity=medium&amp;id=685bd330a1cfc9c6487d1009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deleting-a-file-in-wire-doesnt-remove-it-from-serv-6f2a0754</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deleting%20a%20file%20in%20Wire%20doesn%E2%80%99t%20remove%20it%20from%20servers%20%E2%80%94%20and%20other%20findings&amp;severity=medium&amp;id=685bc8bea1cfc9c6487d00d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/north-korea-linked-supply-chain-attack-targets-dev-ff10aef2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=North%20Korea-linked%20Supply%20Chain%20Attack%20Targets%20Developers%20with%2035%20Malicious%20npm%20Packages&amp;severity=high&amp;id=685bc8a5a1cfc9c6487d00a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41647-cwe-312-cleartext-storage-of-sensit-ac1db903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41647%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Lenze%20PLC%20Designer%20V4&amp;severity=medium&amp;id=685bc521a1cfc9c6487cfb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49797-files-or-directories-accessible-to--bdae4494</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49797%3A%20Files%20or%20directories%20accessible%20to%20external%20parties%20in%20BROTHER%20INDUSTRIES%2C%20LTD.%20Multiple%20driver%20installers%20for%20Windows&amp;severity=high&amp;id=685bc521a1cfc9c6487cfb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6613-cross-site-scripting-in-phpgurukul-h-2d600a15</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6613%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=685bc521a1cfc9c6487cfb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5927-cwe-36-absolute-path-traversal-in-wp-3e9a4014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5927%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20WPEverest%20Everest%20Forms%20Pro&amp;severity=high&amp;id=685bc521a1cfc9c6487cfb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41255-cwe-266-incorrect-privilege-assignm-6a93ed45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41255%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20iterate%20GmbH%20Cyberduck&amp;severity=high&amp;id=685bc521a1cfc9c6487cfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41256-cwe-328-use-of-weak-hash-in-iterate-54536236</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41256%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20iterate%20GmbH%20Cyberduck&amp;severity=high&amp;id=685bc19da1cfc9c6487cf7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-benchmarking-authorization-policy-engines-83c4b4c2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Benchmarking%20Authorization%20Policy%20Engines&amp;severity=medium&amp;id=685bbe1ea1cfc9c6487cf10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51982-cwe-1286-improper-validation-of-syn-f60dc90c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51982%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=high&amp;id=69ce7bdce6bfc5ba1ddfe793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-wordpress-malware-hides-on-checkout-pages-and--f34814ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20WordPress%20Malware%20Hides%20on%20Checkout%20Pages%20and%20Imitates%20Cloudflare&amp;severity=medium&amp;id=685ba57ca1cfc9c6487cc97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51978-cwe-1391-use-of-weak-credentials-in-820eaf07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51978%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20Brother%20Industries%2C%20Ltd%20DCP-J928N-W%2FB&amp;severity=critical&amp;id=69cac31de6bfc5ba1d5bec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51977-cwe-538-insertion-of-sensitive-info-57daf776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51977%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Brother%20Industries%2C%20Ltd%20HL-L8260CDN&amp;severity=medium&amp;id=69caa378e6bfc5ba1d4bb8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43880-inefficient-regular-expression-comp-9b600e89</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43880%3A%20Inefficient%20regular%20expression%20complexity%20in%20GROWI%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=685b8ddc66faf0c1de3bc61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0966-cwe-89-improper-neutralization-of-sp-1a436ddc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0966%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=685b673066faf0c1de3b9867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36004-cwe-427-uncontrolled-search-path-el-519cc17d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36004%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element&amp;severity=high&amp;id=685b673066faf0c1de3b986a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5585-cwe-79-improper-neutralization-of-in-c3f06130</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5585%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=685b602b66faf0c1de3b8af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sonicwall-warns-of-trojanized-netextender-stealing-bceafe14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SonicWall%20warns%20of%20trojanized%20NetExtender%20stealing%20VPN%20logins&amp;severity=high&amp;id=685b440766faf0c1de3b6783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abuse-open-source-tools-to-target-a-1456b1f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abuse%20Open-Source%20Tools%20To%20Target%20Africa%E2%80%99s%20Financial%20Sector&amp;severity=medium&amp;id=685b440766faf0c1de3b6787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6583-sql-injection-in-sourcecodester-best-9c9f5b0d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6583%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b3cff66faf0c1de3b5bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-25-9f6ea9d8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-25&amp;severity=medium&amp;id=685c902fe230f5b23485ed64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45333-na-be58dda4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45333%3A%20n%2Fa&amp;severity=high&amp;id=685c50eee230f5b234857689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45332-na-6c846e04</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45332%3A%20n%2Fa&amp;severity=high&amp;id=685c3853e230f5b2348551a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44206-na-95c1f43b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44206%3A%20n%2Fa&amp;severity=medium&amp;id=685c1d03a1cfc9c6487ddcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25905-na-48474e13</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25905%3A%20n%2Fa&amp;severity=high&amp;id=685c15fca1cfc9c6487d9e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6582-sql-injection-in-sourcecodester-best-d05c10a2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6582%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b398066faf0c1de3b5994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6581-sql-injection-in-sourcecodester-best-2d9edb20</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6581%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b2b6c66faf0c1de3b4414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6580-sql-injection-in-sourcecodester-best-3f622ff5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6580%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Salon%20Management%20System&amp;severity=medium&amp;id=685b1d5b66faf0c1de3b2da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52884-cwe-159-improper-handling-of-invali-710211d2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52884%3A%20CWE-159%3A%20Improper%20Handling%20of%20Invalid%20Use%20of%20Special%20Elements%20in%20risc0%20risc0-ethereum&amp;severity=low&amp;id=685b0bc766faf0c1de3b130d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52883-cwe-1287-improper-validation-of-spe-f600bf3b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52883%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20meshtastic%20Meshtastic-Android&amp;severity=medium&amp;id=685b0bc766faf0c1de3b1309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52572-cwe-287-improper-authentication-in--fd2c43b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52572%3A%20CWE-287%3A%20Improper%20Authentication%20in%20hikariatama%20Hikka&amp;severity=critical&amp;id=685b0bc766faf0c1de3b1305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52571-cwe-287-improper-authentication-in--cd8f77df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52571%3A%20CWE-287%3A%20Improper%20Authentication%20in%20hikariatama%20Hikka&amp;severity=critical&amp;id=685b087866faf0c1de3b0f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-target-over-70-microsoft-exchange-servers--7f63d080</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Target%20Over%2070%20Microsoft%20Exchange%20Servers%20to%20Steal%20Credentials%20via%20Keyloggers&amp;severity=high&amp;id=685b084266faf0c1de3b0ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researchers-find-way-to-shut-down-cryptominer-camp-8297ac5b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researchers%20Find%20Way%20to%20Shut%20Down%20Cryptominer%20Campaigns%20Using%20Bad%20Shares%20and%20XMRogue&amp;severity=high&amp;id=685b084266faf0c1de3b0ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-filefix-attack-weaponizes-windows-file-explore-05c5a6bb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FileFix%20attack%20weaponizes%20Windows%20File%20Explorer%20for%20stealthy%20commands&amp;severity=high&amp;id=685b084266faf0c1de3b0ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trezors-support-platform-abused-in-crypto-theft-ph-21f2c3f2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trezor%E2%80%99s%20support%20platform%20abused%20in%20crypto%20theft%20phishing%20attacks&amp;severity=high&amp;id=685b084266faf0c1de3b0ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6557-insufficient-data-validation-in-goog-b6a75c3e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6557%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=medium&amp;id=685b087866faf0c1de3b0f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6556-insufficient-policy-enforcement-in-g-10bff199</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6556%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=685b087866faf0c1de3b0f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6555-use-after-free-in-google-chrome-c739a859</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6555%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=685b087866faf0c1de3b0f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52882-cwe-1385-missing-origin-validation--38687993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52882%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20anthropics%20claude-code&amp;severity=high&amp;id=685b087866faf0c1de3b0f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6579-sql-injection-in-code-projects-car-r-d96f9327</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6579%3A%20SQL%20Injection%20in%20code-projects%20Car%20Rental%20System&amp;severity=medium&amp;id=685b087866faf0c1de3b0f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6578-sql-injection-in-code-projects-simpl-c6c08941</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6578%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685b087866faf0c1de3b0f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sparkkitty-spyware-on-app-store-and-play-store-ste-d928e5e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SparkKitty%20Spyware%20on%20App%20Store%20and%20Play%20Store%2C%20Steals%20Photos%20for%20Crypto%20Data&amp;severity=medium&amp;id=685b04bc66faf0c1de3b0b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52880-cwe-799-improper-control-of-interac-81960906</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52880%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20gotson%20komga&amp;severity=medium&amp;id=685b04bf66faf0c1de3b0b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52471-cwe-191-integer-underflow-wrap-or-w-c2d7df6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52471%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20espressif%20esp-idf&amp;severity=high&amp;id=685b04bf66faf0c1de3b0b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52888-cwe-611-improper-restriction-of-xml-2d135995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52888%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20allure-framework%20allure2&amp;severity=high&amp;id=685b013966faf0c1de3b077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49853-cwe-89-improper-neutralization-of-s-f312fa03</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49853%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ControlID%20iDSecure%20On-premises&amp;severity=critical&amp;id=685afdb566faf0c1de3b039e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49852-cwe-918-server-side-request-forgery-e40e004f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49852%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ControlID%20iDSecure%20On-premises&amp;severity=high&amp;id=685afdb566faf0c1de3b03a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49851-cwe-287-improper-authentication-in--f3fc77ce</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49851%3A%20CWE-287%20Improper%20Authentication%20in%20ControlID%20iDSecure%20On-premises&amp;severity=high&amp;id=685afdb566faf0c1de3b03a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5087-cwe-319-cleartext-transmission-of-se-63aa0a5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5087%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Kaleris%20Navis%20N4&amp;severity=medium&amp;id=685aefaf66faf0c1de3aa176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2566-cwe-502-deserialization-of-untrusted-0181a86e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2566%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Kaleris%20Navis%20N4&amp;severity=critical&amp;id=685aefaf66faf0c1de3aa173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-kerio-control-advisory-f82e5687</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Kerio%20Control%20Advisory!&amp;severity=medium&amp;id=685ae8890e5630b102ff2e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trashtalkme-a-new-secure-way-to-chat-85eadb8a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrashTalk.me%20-%20A%20new%20secure%20way%20to%20chat&amp;severity=medium&amp;id=685ae55d77d44901f08d3290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptominers-anatomy-shutting-down-mining-botnets-48aa1629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptominers%E2%80%99%20Anatomy%3A%20Shutting%20Down%20Mining%20Botnets&amp;severity=medium&amp;id=685ae55d77d44901f08d328c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49147-cwe-497-exposure-of-sensitive-syste-3f9f46e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49147%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=685ae55477d44901f08d324a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/androxgh0st-botnet-expands-reach-exploiting-us-uni-e390910e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Androxgh0st%20Botnet%20Expands%20Reach%2C%20Exploiting%20US%20University%20Servers&amp;severity=high&amp;id=685ae1ce77d44901f08d2c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23260-cwe-266-incorrect-privilege-assignm-f6993246</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23260%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20NVIDIA%20AIStore&amp;severity=medium&amp;id=685ae55477d44901f08d324f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4378-cwe-319-cleartext-transmission-of-se-5b44e0d5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4378%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Ataturk%20University%20ATA-AOF%20Mobile%20Application&amp;severity=critical&amp;id=685ad74277d44901f08d1b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kali-linux-20251c-fixes-key-issue-adds-new-tools-a-0d2ce28d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kali%20Linux%202025.1c%20Fixes%20Key%20Issue%2C%20Adds%20New%20Tools%20and%20Interface%20Updates&amp;severity=medium&amp;id=685ad3bd77d44901f08d11ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6570-sql-injection-in-phpgurukul-hospital-9f725506</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6570%3A%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=685ac93d77d44901f08c63d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23265-cwe-94-improper-control-of-generati-512a686b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23265%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=685ac567eea9540c4f4840bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23264-cwe-94-improper-control-of-generati-715500c0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23264%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Megatron%20LM&amp;severity=high&amp;id=685ac567eea9540c4f4840ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4383-cwe-307-improper-restriction-of-exce-29d879ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4383%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Art-in%20Bili%C5%9Fim%20Teknolojileri%20ve%20Yaz%C4%B1l%C4%B1m%20Hizm.%20Tic.%20Ltd.%20%C5%9Eti.%20Wi-Fi%20Cloud%20Hotspot&amp;severity=critical&amp;id=685ac567eea9540c4f4840c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6569-cross-site-scripting-in-code-project-0d08e5a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6569%3A%20Cross%20Site%20Scripting%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=685ac1bbf899b1a8c38942d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/filefix-new-alternative-to-clickfix-attack-cf324a0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FileFix%20%E2%80%93%20New%20Alternative%20to%20ClickFix%20Attack&amp;severity=medium&amp;id=685abb2f3267a9227e572a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6568-buffer-overflow-in-totolink-ex1200t-242c04d3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6568%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=685ab877af41c610cd96167e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6567-sql-injection-in-campcodes-online-re-31546ba7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6567%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=685ab877af41c610cd961677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36537-incorrect-permission-assignment-for-246c8b20</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36537%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20TeamViewer%20Remote%20Management%20in%20TeamViewer%20Full%20Client&amp;severity=high&amp;id=685ab877af41c610cd961674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5318-out-of-bounds-read-in-red-hat-red-ha-551ec327</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5318%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=685ab29b8e5e669c7fb575fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-in-centos-web-panel-cve-2025-c3adb23c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20code%20execution%20in%20CentOS%20Web%20Panel%20-%20CVE-2025-48703&amp;severity=medium&amp;id=685ab1be4dc24046c1dc8c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6032-improper-certificate-validation-in-r-c96d6619</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6032%3A%20Improper%20Certificate%20Validation&amp;severity=high&amp;id=685ab1ba4dc24046c1dc8c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6566-stack-based-buffer-overflow-in-oatpp-72dbedb4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6566%3A%20Stack-based%20Buffer%20Overflow%20in%20oatpp%20Oat%2B%2B&amp;severity=medium&amp;id=685aa3aa4dc24046c1dc5db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6565-stack-based-buffer-overflow-in-netge-c2a9227a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6565%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20WNCE3001&amp;severity=high&amp;id=685aa3aa4dc24046c1dc5dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6436-memory-safety-bugs-fixed-in-firefox--e42ee8ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6436%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6435-save-as-in-devtools-could-download-f-ff089114</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6435%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6434-https-only-exception-screen-lacked-a-8368cd44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6434%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6433-webauthn-would-allow-a-user-to-sign--ddcfb2dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6433%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=685aa0274dc24046c1dc5ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6432-dns-requests-leaked-outside-of-a-con-c3cd2680</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6432%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6431-the-prompt-in-firefox-for-android-th-67501dd2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6431%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6428-firefox-for-android-opened-urls-spec-2d784f4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6428%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6427-connect-src-content-security-policy--7249856c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6427%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=685aa0274dc24046c1dc5a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6430-content-disposition-header-ignored-w-a9f3a759</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6430%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6429-incorrect-parsing-of-urls-could-have-86c89628</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6429%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6426-no-warning-when-opening-executable-t-6564ed0f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6426%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=685aa0274dc24046c1dc5a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6425-the-webcompat-webextension-shipped-w-90a90d6f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6425%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=685aa0274dc24046c1dc5a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6424-use-after-free-in-fontfaceset-in-moz-c6c7bf0a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6424%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=685aa0274dc24046c1dc5a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39205-cwe-295-improper-certificate-valida-04fb0aae</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39205%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=685a99584dc24046c1dc53e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt28-uses-signal-chat-to-deploy-beardshell-malwar-51209472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT28%20Uses%20Signal%20Chat%20to%20Deploy%20BEARDSHELL%20Malware%20and%20COVENANT%20in%20Ukraine&amp;severity=high&amp;id=685a991d4dc24046c1dc53b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-house-bans-whatsapp-on-official-devices-over-se-b935fb97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20House%20Bans%20WhatsApp%20on%20Official%20Devices%20Over%20Security%20and%20Data%20Protection%20Issues&amp;severity=high&amp;id=685a991d4dc24046c1dc53b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-exploit-misconfigured-docker-apis-to-mine--5f359481</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Exploit%20Misconfigured%20Docker%20APIs%20to%20Mine%20Cryptocurrency%20via%20Tor%20Network&amp;severity=high&amp;id=685a991d4dc24046c1dc53af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39204-cwe-200-exposure-of-sensitive-infor-86ebd6ce</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39204%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=685a99584dc24046c1dc53e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39203-cwe-354-improper-validation-of-inte-30046a19</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39203%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=685a9582dec26fc862d9807c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39202-cwe-269-improper-privilege-manageme-4bb98c1d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39202%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=685a91fedec26fc862d97be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39201-cwe-276-incorrect-default-permissio-14c2ed99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39201%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=685a91fedec26fc862d97beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2403-cwe-770-allocation-of-resources-with-70b77f4f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2403%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Hitachi%20Energy%20Relion%20670%2F650%20and%20SAM600-IO&amp;severity=high&amp;id=685a91fedec26fc862d97bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1718-cwe-754-improper-check-for-unusual-o-34863a36</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1718%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Hitachi%20Energy%20Relion%20670%2F650%20and%20SAM600-IO&amp;severity=medium&amp;id=685a8e7adec26fc862d97548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6206-cwe-434-unrestricted-upload-of-file--9337de5c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6206%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=high&amp;id=685a644adec26fc862d94a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3092-cwe-204observable-response-discrepan-aff11cb6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3092%3A%20CWE-204%3AObservable%20Response%20Discrepancy%20in%20Helmholz%20myREX24&amp;severity=high&amp;id=685a60c6dec26fc862d94732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3091-cwe-639-authorization-bypass-through-b09f88d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3091%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=685a60c6dec26fc862d9472e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3090-cwe-306-missing-authentication-for-c-e9c3457d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3090%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MB%20connect%20line%20mbCONNECT24&amp;severity=high&amp;id=685a5d42dec26fc862d9446e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5258-cwe-79-improper-neutralization-of-in-89de4c6d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swift%20Conference%20Scheduler&amp;severity=medium&amp;id=685a563adec26fc862d93d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50213-cwe-75-failure-to-sanitize-special--6461f05d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50213%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Providers%20Snowflake&amp;severity=critical&amp;id=685a52b6dec26fc862d936a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2962-loop-with-unreachable-exit-condition-8d5bc19d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2962%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20zephyrproject-rtos%20Zephyr&amp;severity=high&amp;id=685a3a1adec26fc862d91188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48890-improper-neutralization-of-special--f3b1244f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48890%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRH-733GBK&amp;severity=critical&amp;id=685a2f8edec26fc862d90957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43879-improper-neutralization-of-special--9c17ee40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43879%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRH-733GBK&amp;severity=critical&amp;id=685a2f8edec26fc862d90953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43877-cross-site-scripting-xss-in-elecom--a43b128b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43877%3A%20Cross-site%20scripting%20(XSS)%20in%20ELECOM%20CO.%2CLTD.%20WRC-1167GHBK2-S&amp;severity=medium&amp;id=685a2f8edec26fc862d9094f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41427-improper-neutralization-of-special--baaf8284</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41427%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ELECOM%20CO.%2CLTD.%20WRC-X3000GS&amp;severity=high&amp;id=685a2f8edec26fc862d9094b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36519-unrestricted-upload-of-file-with-da-cc7ff199</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36519%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20ELECOM%20CO.%2CLTD.%20WRC-2533GST2&amp;severity=medium&amp;id=685a2f8edec26fc862d90947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52566-cwe-119-improper-restriction-of-ope-77bbba00</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52566%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=685a1dfadec26fc862d8f682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52570-cwe-799-improper-control-of-interac-9cbdb2b1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52570%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20mbuesch%20letmein&amp;severity=low&amp;id=685a1dfadec26fc862d8f68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52568-cwe-20-improper-input-validation-in-48012ea1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52568%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nekernel-org%20nekernel&amp;severity=high&amp;id=685a1dfadec26fc862d8f686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52574-cwe-22-improper-limitation-of-a-pat-5e3fb246</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52574%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bocaletto-luca%20elixir-system-monitor&amp;severity=high&amp;id=685a16f4dec26fc862d8ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48470-vulnerability-in-advantech-advantec-bdb18adf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48470%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48469-vulnerability-in-advantech-advantec-02fc22a7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48469%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=critical&amp;id=685a0febdec26fc862d8d91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48468-vulnerability-in-advantech-advantec-9432ffed</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48468%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48467-vulnerability-in-advantech-advantec-8835bd67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48467%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48466-vulnerability-in-advantech-advantec-ef5af1f9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48466%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=high&amp;id=685a0febdec26fc862d8d910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48463-vulnerability-in-advantech-advantec-159232de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48463%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=low&amp;id=685a0febdec26fc862d8d90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48462-vulnerability-in-advantech-advantec-3f4432cc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48462%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48461-vulnerability-in-advantech-advantec-8171de73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48461%3A%20Vulnerability%20in%20Advantech%20Advantech%20Wireless%20Sensing%20and%20Equipment%20(WISE)&amp;severity=medium&amp;id=685a0febdec26fc862d8d907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6560-cwe-256-plaintext-storage-of-a-passw-842c9215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6560%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Sapido%20BR071n&amp;severity=critical&amp;id=685a0febdec26fc862d8d936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6552-open-redirect-in-java-aodeng-hope-bo-e0c3eaec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6552%3A%20Open%20Redirect%20in%20java-aodeng%20Hope-Boot&amp;severity=medium&amp;id=685a0febdec26fc862d8d921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6559-cwe-78-improper-neutralization-of-sp-a92f95d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6559%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sapido%20BR071n&amp;severity=critical&amp;id=685a0febdec26fc862d8d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34041-cwe-78-improper-neutralization-of-s-951a7e2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34041%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sangfor%20Technologies%20Co.%2C%20Ltd.%20Endpoint%20Detection%20and%20Response%20Platform&amp;severity=critical&amp;id=685a0560dec26fc862d8cf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6551-cross-site-scripting-in-java-aodeng--6befae1a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6551%3A%20Cross%20Site%20Scripting%20in%20java-aodeng%20Hope-Boot&amp;severity=medium&amp;id=685a0560dec26fc862d8cf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6536-reachable-assertion-in-tarantool-4cdf921b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6536%3A%20Reachable%20Assertion%20in%20Tarantool&amp;severity=medium&amp;id=685a0560dec26fc862d8cf7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34040-cwe-434-unrestricted-upload-of-file-17db9957</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34040%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Seeyon%20(Beijing%20Zhiyuan%20Internet%20Software%20Co.%2C%20Ltd.)%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=critical&amp;id=685a0560dec26fc862d8cf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34039-cwe-78-improper-neutralization-of-s-80ab3b15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34039%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Yonyou%20Co.%2C%20Ltd.%20UFIDA%20NC&amp;severity=critical&amp;id=685a0560dec26fc862d8cf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34038-cwe-89-improper-neutralization-of-s-3d5855c5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34038%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Weaver%20E-cology&amp;severity=high&amp;id=685a0560dec26fc862d8cf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34037-cwe-78-improper-neutralization-of-s-f3b7faee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34037%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Linksys%20E4200&amp;severity=critical&amp;id=6859fad3dec26fc862d8c385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34036-cwe-78-improper-neutralization-of-s-d182fc38</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34036%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shenzhen%20TVT%20CCTV-DVR&amp;severity=critical&amp;id=6859fad3dec26fc862d8c380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34035-cwe-78-improper-neutralization-of-s-8d31c385</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34035%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20EnGenius%20EnShare%20IoT%20Gigabit%20Cloud%20Service&amp;severity=critical&amp;id=6859fad3dec26fc862d8c379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6535-sql-injection-in-xxyopen-novel-plus-525ec8ca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6535%3A%20SQL%20Injection%20in%20xxyopen%20novel-plus&amp;severity=medium&amp;id=6859fad3dec26fc862d8c38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34034-cwe-798-use-of-hard-coded-credentia-a9683a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34034%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%205VTechnologies%20Blue%20Angel%20Software%20Suite&amp;severity=critical&amp;id=6859fad3dec26fc862d8c375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34033-cwe-78-improper-neutralization-of-s-f035acab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34033%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%205VTechnologies%20Blue%20Angel%20Software%20Suite&amp;severity=high&amp;id=6859fad3dec26fc862d8c371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34032-cwe-79-improper-neutralization-of-i-fc466788</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Moodle%20Jmol%20Plugin&amp;severity=medium&amp;id=6859fad3dec26fc862d8c36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34031-cwe-22-improper-limitation-of-a-pat-716f970e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34031%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Moodle%20Jmol%20Plugin&amp;severity=high&amp;id=6859fad3dec26fc862d8c367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6534-improper-control-of-resource-identif-99307920</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6534%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20xxyopen%20novel-plus&amp;severity=low&amp;id=6859f3d7dec26fc862d8bdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6533-authentication-bypass-by-capture-rep-5205e739</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6533%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20xxyopen%20novel-plus&amp;severity=medium&amp;id=6859ecc2dec26fc862d8b65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6532-improper-access-controls-in-noyafa-l-b2c8eff3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6532%3A%20Improper%20Access%20Controls%20in%20NOYAFA%20LF9%20Pro&amp;severity=medium&amp;id=6859ecc2dec26fc862d8b656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-24-2c3ba89c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-24&amp;severity=medium&amp;id=685b407766faf0c1de3b5e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44531-na-72719f0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44531%3A%20n%2Fa&amp;severity=high&amp;id=685accb677d44901f08ce539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50699-na-e42fec95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50699%3A%20n%2Fa&amp;severity=medium&amp;id=685ac93d77d44901f08c63d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50695-na-255cc5e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50695%3A%20n%2Fa&amp;severity=medium&amp;id=685ac93d77d44901f08c63d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50693-na-e5f92150</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50693%3A%20n%2Fa&amp;severity=medium&amp;id=685ac93d77d44901f08c63cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32977-na-1ee18aa4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32977%3A%20n%2Fa&amp;severity=critical&amp;id=685abb2a3267a9227e572a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32978-na-2d553241</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32978%3A%20n%2Fa&amp;severity=high&amp;id=685ab877af41c610cd96166f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32976-na-4163ae96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32976%3A%20n%2Fa&amp;severity=high&amp;id=685ab877af41c610cd96166a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32975-na-ef3de748</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32975%3A%20n%2Fa&amp;severity=critical&amp;id=685ab877af41c610cd961665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27828-na-e0174d93</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27828%3A%20n%2Fa&amp;severity=high&amp;id=685ab29b8e5e669c7fb575f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27827-na-4b25e016</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27827%3A%20n%2Fa&amp;severity=high&amp;id=685ab1ba4dc24046c1dc8c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6531-improper-access-controls-in-sifusm-b-570fefc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6531%3A%20Improper%20Access%20Controls%20in%20SIFUSM%20BD%20S1&amp;severity=medium&amp;id=6859e5badec26fc862d8b061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6530-denial-of-service-in-70mai-m300-4c8d34b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6530%3A%20Denial%20of%20Service%20in%2070mai%20M300&amp;severity=medium&amp;id=6859dec7dec26fc862d8abbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6529-use-of-default-credentials-in-70mai--e137dfb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6529%3A%20Use%20of%20Default%20Credentials%20in%2070mai%20M300&amp;severity=high&amp;id=6859dec7dec26fc862d8abb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6528-improper-authentication-in-70mai-m30-901ff740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6528%3A%20Improper%20Authentication%20in%2070mai%20M300&amp;severity=medium&amp;id=6859d7aadec26fc862d8a6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-salt-typhoon-targets-telecoms-via-rou-0d0c34ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-Linked%20Salt%20Typhoon%20Targets%20Telecoms%20via%20Router%20Flaws%2C%20Warn%20FBI%20and%20Canada&amp;severity=medium&amp;id=6859d425dec26fc862d8a4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6527-improper-access-controls-in-70mai-m3-aa2e3ca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6527%3A%20Improper%20Access%20Controls%20in%2070mai%20M300&amp;severity=low&amp;id=6859d0a2dec26fc862d8a2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6526-insufficiently-protected-credentials-a2019619</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6526%3A%20Insufficiently%20Protected%20Credentials%20in%2070mai%20M300&amp;severity=low&amp;id=6859d0a2dec26fc862d8a2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6525-improper-authorization-in-70mai-1s-6965d243</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6525%3A%20Improper%20Authorization%20in%2070mai%201S&amp;severity=medium&amp;id=6859c9a8dec26fc862d89b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-lapdogs-campaign-drops-shortleash-bac-054455e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20LapDogs%20Campaign%20Drops%20ShortLeash%20Backdoor%20with%20Fake%20Certs&amp;severity=medium&amp;id=6859c999dec26fc862d89b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52561-cwe-79-improper-neutralization-of-i-854a85b8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52561%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JuliaComputing%20HTMLSanitizer.jl&amp;severity=medium&amp;id=6859c3c943d9e1063349dbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6524-improper-authentication-in-70mai-1s-796f012a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6524%3A%20Improper%20Authentication%20in%2070mai%201S&amp;severity=low&amp;id=6859c3c943d9e1063349dc01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/irans-internet-a-censys-perspective-d7505f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran&apos;s%20Internet%3A%20A%20Censys%20Perspective&amp;severity=medium&amp;id=6859c06243d9e10633498807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52558-cwe-79-improper-neutralization-of-i-7690150f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgtlmoon%20changedetection.io&amp;severity=high&amp;id=6859c00fa220c77d4f671f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52562-cwe-22-improper-limitation-of-a-pat-1bdef3d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52562%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ConvoyPanel%20panel&amp;severity=critical&amp;id=6859c00fa220c77d4f671f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2828-cwe-918-server-side-request-forgery--f4d9cd43</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2828%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=high&amp;id=6859c00fa220c77d4f671f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-on-40000-wifi-alarm-clocks-f367ad10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20on%2040%2C000%20WiFi%20alarm%20clocks&amp;severity=medium&amp;id=6859bc8ea220c77d4f671b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49574-cwe-668-exposure-of-resource-to-wro-c6b013a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49574%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20quarkusio%20quarkus&amp;severity=medium&amp;id=6859b1fea220c77d4f670a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6547-cwe-20-improper-input-validation-369a7d8f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6547%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=6859a824e1fba96401e74ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6518-improper-neutralization-of-special-e-e071e14b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20PySpur-Dev%20pyspur&amp;severity=medium&amp;id=6859a824e1fba96401e74ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6545-cwe-20-improper-input-validation-9d40f19a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6545%3A%20CWE-20%20Improper%20Input%20Validation&amp;severity=critical&amp;id=6859a4a0e1fba96401e74798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/drat-v2-updated-drat-emerges-in-arsenal-6544c987</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DRAT%20V2%3A%20Updated%20DRAT%20Emerges%20in%20Arsenal&amp;severity=medium&amp;id=685ab4fdaf41c610cd95c1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/canada-says-salt-typhoon-hacked-telecom-firm-via-c-64fb91c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Canada%20says%20Salt%20Typhoon%20hacked%20telecom%20firm%20via%20Cisco%20flaw&amp;severity=high&amp;id=68599d97e1fba96401e74184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/echo-chamber-jailbreak-tricks-llms-like-openai-and-7bb41d6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Echo%20Chamber%20Jailbreak%20Tricks%20LLMs%20Like%20OpenAI%20and%20Google%20into%20Generating%20Harmful%20Content&amp;severity=high&amp;id=68599d97e1fba96401e7418c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-homeland-security-warns-of-escalating-iranian-c-bc99e06c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Homeland%20Security%20warns%20of%20escalating%20Iranian%20cyberattack%20risks&amp;severity=high&amp;id=68599d97e1fba96401e74188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6517-server-side-request-forgery-in-droma-f9b76c73</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6517%3A%20Server-Side%20Request%20Forgery%20in%20Dromara%20MaxKey&amp;severity=medium&amp;id=685aaab34dc24046c1dc83cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6516-heap-based-buffer-overflow-in-hdf5-6091edfd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6516%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=68598c03e1fba96401e725ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-hunting-introduction-cobalt-strike-e37e8708</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Hunting%20Introduction%3A%20Cobalt%20Strike&amp;severity=medium&amp;id=68598501e1fba96401e720b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6511-stack-based-buffer-overflow-in-netge-dfb7df99</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6511%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20EX6150&amp;severity=high&amp;id=685984fee1fba96401e720a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6510-stack-based-buffer-overflow-in-netge-fca1dcd3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6510%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20EX6100&amp;severity=high&amp;id=68597df3e1fba96401e71a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/haveibeenpwnedwatch-open-source-no-fluff-charts-sh-80af7638</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=haveibeenpwned.watch%20-%20Open-source%2C%20no-fluff%20charts%20showcasing%20haveibeenpwned.com&apos;s%20pwned%20account%20data&amp;severity=medium&amp;id=68597a71e1fba96401e71752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6509-cross-site-scripting-in-seaswalker-s-7609f313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6509%3A%20Cross%20Site%20Scripting%20in%20seaswalker%20spring-analysis&amp;severity=medium&amp;id=685976ebe1fba96401e714ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-secures-llms-calling-apis-via-mcp-a-stack-of--011281b2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20secures%20LLMs%20calling%20APIs%20via%20MCP%3F%20A%20stack%20of%20OAuth%20specs%E2%80%94here%E2%80%99s%20how%20they%20fit%20together&amp;severity=medium&amp;id=68596b45b023ea275d7dec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52879-cwe-79-in-jetbrains-teamcity-91fb2967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52879%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b69993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52878-cwe-862-in-jetbrains-teamcity-96b6e277</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52878%3A%20CWE-862%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b69990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52877-cwe-79-in-jetbrains-teamcity-07fcf7b0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52877%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b6998d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52876-cwe-79-in-jetbrains-teamcity-c9a9665f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52876%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b6998a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52875-cwe-79-in-jetbrains-teamcity-c62ac8ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52875%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=68596271179a4edd60b69987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2172-cwe-78-improper-neutralization-of-sp-82bb7546</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2172%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Aviatrix%20Controller&amp;severity=medium&amp;id=68596271179a4edd60b6999a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2171-cwe-307-improper-restriction-of-exce-11b60ba9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2171%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Aviatrix%20Controller&amp;severity=high&amp;id=68596271179a4edd60b69996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-dmv-texts-scam-hit-thousands-in-widespread-ph-abecafa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20DMV%20Texts%20Scam%20Hit%20Thousands%20in%20Widespread%20Phishing%20Campaign&amp;severity=medium&amp;id=685957e4179a4edd60b68e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52542-100bb2ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52542&amp;severity=low&amp;id=68595b69179a4edd60b69351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6512-cwe-94-improper-control-of-generatio-37e83441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6512%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Bizerba%20SE%20%26%20Co.%20KG%20BRAIN2&amp;severity=critical&amp;id=68595460179a4edd60b68c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6513-cwe-260-password-in-configuration-fi-369e3e4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6513%3A%20CWE-260%3A%20Password%20in%20Configuration%20File%20in%20Bizerba%20SE%20%26%20Co.%20KG%20BRAIN2&amp;severity=critical&amp;id=68594d59179a4edd60b68459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-minecraft-mods-on-github-found-stealing-playe-fddeb4cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Minecraft%20Mods%20on%20GitHub%20Found%20Stealing%20Player%20Data%20and%20Crypto%20Wallet%20Info&amp;severity=low&amp;id=685942cb179a4edd60b67c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-analysis-report-umbrella-stand-malware-tar-f662bc54</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Analysis%20Report%3A%20UMBRELLA%20STAND%20-%20Malware%20targeting%20Fortinet%20devices&amp;severity=medium&amp;id=685ab4fdaf41c610cd95c1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/novel-ssrf-technique-involving-http-redirect-loops-d49bf5ec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Novel%20SSRF%20Technique%20Involving%20HTTP%20Redirect%20Loops&amp;severity=medium&amp;id=68593842179a4edd60b6749c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oxford-city-council-suffers-breach-exposing-two-de-59393826</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Oxford%20City%20Council%20suffers%20breach%20exposing%20two%20decades%20of%20data&amp;severity=high&amp;id=68592a2f179a4edd60b66b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-linked-threat-actors-cyber-fattah-leak-visito-b75cf048</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran-Linked%20Threat%20Actors%20Cyber%20Fattah%20Leak%20Visitors%20and%20Athletes&apos;%20Data%20from%20Saudi%20Games&amp;severity=medium&amp;id=68592a2f179a4edd60b66b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-financial-impact-of-marks-spencer-and-co-op-cy-6c6f55be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20financial%20impact%20of%20Marks%20%26%20Spencer%20and%20Co-op%20cyberattacks%20could%20reach%20%C2%A3440M&amp;severity=medium&amp;id=68592a2f179a4edd60b66b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27387-cwe-200-exposure-of-sensitive-infor-7993a7ef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27387%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20OPPO%20ColorOS&amp;severity=high&amp;id=68592327179a4edd60b65f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52935-cwe-190-integer-overflow-or-wraparo-1f2118b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52935%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20dragonflydb%20dragonfly&amp;severity=critical&amp;id=68592327179a4edd60b65f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52939-cwe-787-out-of-bounds-write-in-dail-d9d5d358</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52939%3A%20CWE-787%20Out-of-bounds%20Write%20in%20dail8859%20NotepadNext&amp;severity=critical&amp;id=68592327179a4edd60b65f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52938-cwe-125-out-of-bounds-read-in-dail8-32cc9459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52938%3A%20CWE-125%20Out-of-bounds%20Read%20in%20dail8859%20NotepadNext&amp;severity=medium&amp;id=68592327179a4edd60b65f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52937-vulnerability-in-pointcloudlibrary--edfdcc69</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52937%3A%20Vulnerability%20in%20PointCloudLibrary%20pcl&amp;severity=low&amp;id=68592327179a4edd60b65f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52936-cwe-59-improper-link-resolution-bef-c41e3035</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52936%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20yrutschle%20sslh&amp;severity=critical&amp;id=68592327179a4edd60b65f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-new-sparkkitty-trojan-spy-in-the-app-store-and-2950de46</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20new%20SparkKitty%20Trojan%20spy%20in%20the%20App%20Store%20and%20Google%20Play&amp;severity=medium&amp;id=685ab3b48e5e669c7fb5ad1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6503-sql-injection-in-code-projects-inven-85e2cc5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6503%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858d24b179a4edd60b60306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6502-sql-injection-in-code-projects-inven-c3e4137f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6502%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858cece179a4edd60b600a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6501-sql-injection-in-code-projects-inven-2cd432d3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6501%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858c7be179a4edd60b5fb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6500-sql-injection-in-code-projects-inven-9cb498de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6500%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6858bd32179a4edd60b5f232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6499-heap-based-buffer-overflow-in-vstakh-e5ab10c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6499%3A%20Heap-based%20Buffer%20Overflow%20in%20vstakhov%20libucl&amp;severity=medium&amp;id=6858bd32179a4edd60b5f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6498-memory-leak-in-htacg-tidy-html5-457d49e7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6498%3A%20Memory%20Leak%20in%20HTACG%20tidy-html5&amp;severity=medium&amp;id=6858b2a7179a4edd60b5ebc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6497-reachable-assertion-in-htacg-tidy-ht-448125cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6497%3A%20Reachable%20Assertion%20in%20HTACG%20tidy-html5&amp;severity=medium&amp;id=6858a497179a4edd60b5e02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rawpa-hierarchical-methodology-comprehensive-toolk-36aee75f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RAWPA%20-%20hierarchical%20methodology%2C%20comprehensive%20toolkits%2C%20and%20guided%20workflows&amp;severity=medium&amp;id=68589d8f179a4edd60b5cab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6496-null-pointer-dereference-in-htacg-ti-f811f3b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6496%3A%20NULL%20Pointer%20Dereference%20in%20HTACG%20tidy-html5&amp;severity=medium&amp;id=68589a0a179a4edd60b5be75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52969-d6d95a6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52969&amp;severity=low&amp;id=6866a4326f40f0eb72988b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-23-1bf1ca2e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-23&amp;severity=medium&amp;id=6859ecbadec26fc862d8b4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23092-na-15dc60f4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23092%3A%20n%2Fa&amp;severity=high&amp;id=6859c00fa220c77d4f671f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44528-na-a97985b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44528%3A%20n%2Fa&amp;severity=high&amp;id=6859ad4f0112634db7041056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48026-na-ab92a9d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48026%3A%20n%2Fa&amp;severity=high&amp;id=6859aba8e1fba96401e7530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50349-na-59d13735</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50349%3A%20n%2Fa&amp;severity=high&amp;id=6859a11ce1fba96401e7445a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50348-na-f8766d0e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50348%3A%20n%2Fa&amp;severity=high&amp;id=6859a11ce1fba96401e74457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52968-cwe-420-unprotected-alternate-chann-6c44d47b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52968%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20freedesktop%20xdg-utils&amp;severity=low&amp;id=68596fe3e1fba96401e70db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46101-na-f784fb4e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46101%3A%20n%2Fa&amp;severity=critical&amp;id=68596b43b023ea275d7debf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52967-na-ce0f2ac3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52967%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20lfprojects%20MLflow&amp;severity=medium&amp;id=685967c5b023ea275d7de789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48700-na-414615f6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48700%3A%20n%2Fa&amp;severity=medium&amp;id=685967c5b023ea275d7de784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23049-cwe-78-improper-neutralization-of-s-080e03e2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23049%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Materialise%20OrthoView&amp;severity=high&amp;id=68593bc4179a4edd60b676fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52926-cwe-223-omission-of-security-releva-4345502c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52926%3A%20CWE-223%20Omission%20of%20Security-relevant%20Information%20in%20spytrap-org%20spytrap-adb&amp;severity=low&amp;id=6858a497179a4edd60b5e028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6494-heap-based-buffer-overflow-in-sparkl-32945e9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6494%3A%20Heap-based%20Buffer%20Overflow%20in%20sparklemotion%20nokogiri&amp;severity=medium&amp;id=68588876179a4edd60b5b272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6493-inefficient-regular-expression-compl-876f6130</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6493%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20CodeMirror&amp;severity=medium&amp;id=6858816f179a4edd60b5aa11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-use-inferno-drainer-to-steal-43000-of-cry-7d93eff4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Use%20Inferno%20Drainer%20to%20Steal%20%2443%2C000%20of%20Crypto%20from%20Over%20110%20Wallets%20on%20CoinMarketCap&amp;severity=medium&amp;id=685868d2179a4edd60b59872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6492-inefficient-regular-expression-compl-79d0e3e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6492%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20MarkText&amp;severity=medium&amp;id=685861cb179a4edd60b51c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6490-heap-based-buffer-overflow-in-sparkl-d7870982</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6490%3A%20Heap-based%20Buffer%20Overflow%20in%20sparklemotion%20nokogiri&amp;severity=medium&amp;id=6858573f179a4edd60b51445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6489-sql-injection-in-itsourcecode-agri-t-c8956535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6489%3A%20SQL%20Injection%20in%20itsourcecode%20Agri-Trading%20Online%20Shopping%20System&amp;severity=medium&amp;id=68584cba179a4edd60b50ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6487-stack-based-buffer-overflow-in-totol-014c8f00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6487%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=68584931179a4edd60b50915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6486-stack-based-buffer-overflow-in-totol-081b3258</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6486%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=68583ea5179a4edd60b4c0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6485-os-command-injection-in-totolink-a30-30d7a2c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6485%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20A3002R&amp;severity=medium&amp;id=6858379c179a4edd60b4b6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6484-sql-injection-in-code-projects-onlin-c27532a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6484%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shopping%20Store&amp;severity=medium&amp;id=68583417179a4edd60b4b3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6483-sql-injection-in-code-projects-simpl-be59f0ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6483%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68582993179a4edd60b4a951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6482-sql-injection-in-code-projects-simpl-196f5a5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6482%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=685826b8179a4edd60b4a588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6481-sql-injection-in-code-projects-simpl-47a4b996</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6481%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68581b7c179a4edd60b48057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6480-sql-injection-in-code-projects-simpl-437ea642</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6480%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=685817f9179a4edd60b47676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6479-sql-injection-in-code-projects-simpl-a76cedee</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6479%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=685810f1179a4edd60b47189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6478-cross-site-request-forgery-in-codeas-bdbba824</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6478%3A%20Cross-Site%20Request%20Forgery%20in%20CodeAstro%20Expense%20Management%20System&amp;severity=medium&amp;id=685809ea179a4edd60b46be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6477-cross-site-scripting-in-sourcecodest-5a2b01bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6477%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6857ff61179a4edd60b46408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6476-cross-site-request-forgery-in-source-22e6e75e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6476%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Gym%20Management%20System&amp;severity=medium&amp;id=6857fbd9179a4edd60b46188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6475-cross-site-scripting-in-sourcecodest-a2dcbcdd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6475%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6857f14d179a4edd60b459a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6474-sql-injection-in-code-projects-inven-ad128748</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6474%3A%20SQL%20Injection%20in%20code-projects%20Inventory%20Management%20System&amp;severity=medium&amp;id=6857edc9179a4edd60b456a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6473-cross-site-scripting-in-code-project-f0c2dfac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6473%3A%20Cross%20Site%20Scripting%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6857e340179a4edd60b3d1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6472-sql-injection-in-code-projects-onlin-1a850c0a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6472%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=68598c03e1fba96401e725f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6471-sql-injection-in-code-projects-onlin-f3f75854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6471%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857d1a9179a4edd60b3b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6470-sql-injection-in-code-projects-onlin-46692f86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6470%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857c71e179a4edd60b392ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6469-sql-injection-in-code-projects-onlin-332d21a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6469%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857bc9e179a4edd60b380a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6468-sql-injection-in-code-projects-onlin-798d82b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6468%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=6857b207179a4edd60b37894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6467-sql-injection-in-code-projects-onlin-5838bc0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6467%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bidding%20System&amp;severity=medium&amp;id=685795ea179a4edd60b35a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6466-unrestricted-upload-in-ageerle-ruoyi-b8062c27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6466%3A%20Unrestricted%20Upload%20in%20ageerle%20ruoyi-ai&amp;severity=medium&amp;id=68578ede179a4edd60b35626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6458-sql-injection-in-code-projects-onlin-3fffe02f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6458%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685787d7179a4edd60b3513f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6457-sql-injection-in-code-projects-onlin-6db95557</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6457%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685780ce179a4edd60b34bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6456-sql-injection-in-code-projects-onlin-627e244a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6456%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68577d52179a4edd60b3498b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6455-sql-injection-in-code-projects-onlin-7710a266</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6455%3A%20SQL%20Injection%20in%20code-projects%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857764d179a4edd60b33e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/just-casually-broke-bunqs-sandbox-with-0day-level--abb6f5ff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Just%20casually%20broke%20bunq%E2%80%99s%20sandbox%20with%200day-level%20spoofing%2C%20and%20nobody%20seems%20to%20care%20%F0%9F%87%B3%F0%9F%87%B1&amp;severity=critical&amp;id=68576f3d179a4edd60b33864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6453-path-traversal-in-diyhi-bbs-21cabe56</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6453%3A%20Path%20Traversal%20in%20diyhi%20bbs&amp;severity=medium&amp;id=68576f3b179a4edd60b33857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6452-cross-site-scripting-in-codeastro-pa-5198982f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6452%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=68576f3b179a4edd60b3384f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6451-sql-injection-in-code-projects-simpl-3415c0d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6451%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685764af179a4edd60b3312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6450-sql-injection-in-code-projects-simpl-a7b0e4dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6450%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68575a23179a4edd60b32961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6449-sql-injection-in-code-projects-simpl-0cc7e9d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6449%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857531b179a4edd60b31ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6448-sql-injection-in-code-projects-simpl-47993d89</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6448%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857492ad804313c2171b62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-22-5324ef38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-22&amp;severity=medium&amp;id=68589d8b179a4edd60b5bfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52923-cwe-732-incorrect-permission-assign-acf72cb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52923%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Sangfor%20aTrust&amp;severity=medium&amp;id=6857531b179a4edd60b31fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6447-sql-injection-in-code-projects-simpl-304546c7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6447%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685742578c71073d87a84aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/series-2-implementing-the-wpa-in-rawpa-part-2-b6a15f7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Series%202%3A%20Implementing%20the%20WPA%20in%20RAWPA%20-%20Part%202&amp;severity=medium&amp;id=6857402af20900b727cb4823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6446-sql-injection-in-code-projects-clien-55412f79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6446%3A%20SQL%20Injection%20in%20code-projects%20Client%20Details%20System&amp;severity=medium&amp;id=68573caff20900b727cae1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6422-unrestricted-upload-in-campcodes-onl-736d300d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6422%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=685734da56b83d086c5cf016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6421-sql-injection-in-code-projects-simpl-3f0f9906</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6421%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68572dd156b83d086c5ce13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1987-cwe-79-improper-neutralization-of-in-5b8ad67f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Psono%20Psono-client&amp;severity=critical&amp;id=685728ceb82cdf239d3c4be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6420-sql-injection-in-code-projects-simpl-03065827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6420%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685725be6504ee7903b69a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6419-sql-injection-in-code-projects-simpl-462b78ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6419%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=6857223e6504ee7903b69738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6418-sql-injection-in-code-projects-simpl-6a3535a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6418%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=685717b26504ee7903b68769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6417-sql-injection-in-phpgurukul-art-gall-9f9a3604</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6417%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=685710a76504ee7903b67dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6416-sql-injection-in-phpgurukul-art-gall-b677056f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6416%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6857099e6504ee7903b67139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6415-sql-injection-in-phpgurukul-art-gall-04f7adc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6415%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6857061b6504ee7903b6657b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6414-sql-injection-in-phpgurukul-art-gall-0dee9b59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6414%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=685967c5b023ea275d7de78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hack-our-smart-contract-keep-the-eth-500k-open-sou-ed5d1c05</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%A8%20Hack%20Our%20Smart%20Contract%2C%20Keep%20the%20ETH%20%E2%80%93%20%24500K%20Open-Source%20Heist%20Challenge%20Is%20Live&amp;severity=medium&amp;id=6856f80d6504ee7903b63291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6413-sql-injection-in-phpgurukul-art-gall-fcbb9bb2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6413%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856f4886504ee7903b62fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6412-sql-injection-in-phpgurukul-art-gall-3ecffd1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6412%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6859ad500112634db7041087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6411-sql-injection-in-phpgurukul-art-gall-39edea5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6411%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856e9fc6504ee7903b61f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6410-sql-injection-in-phpgurukul-art-gall-86d3623f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6410%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856df706504ee7903b5f030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6409-sql-injection-in-phpgurukul-art-gall-9e0205e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6409%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=6856d8686504ee7903b5ea39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6408-sql-injection-in-campcodes-online-ho-7b0f21a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6408%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6856ca626504ee7903b5d65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-targets-indian-defense-using-cre-d6c20c52</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Campaign%20Targets%20Indian%20Defense%20Using%20Credential-Stealing%20Malware&amp;severity=medium&amp;id=685ab3b48e5e669c7fb5ad00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6407-sql-injection-in-campcodes-online-ho-b2b0d967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6407%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6856c6db6504ee7903b5d2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/akamai-report-warns-of-sophisticated-ddos-campaign-9599075b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Akamai%20Report%20Warns%20of%20Sophisticated%20DDoS%20Campaigns%20Crippling%20Global%20Banks&amp;severity=medium&amp;id=6856bfcb6504ee7903b5cb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6406-sql-injection-in-campcodes-online-ho-0ce42de3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6406%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6856bfd66504ee7903b5cb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6405-sql-injection-in-campcodes-online-te-90b0fe4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6405%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6856b5406504ee7903b5c0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unexpected-security-footguns-in-gos-parsers-844e4a2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unexpected%20security%20footguns%20in%20Go&apos;s%20parsers&amp;severity=medium&amp;id=6856ae416504ee7903b5ba8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3629-cwe-282-improper-ownership-managemen-e1f0ffb0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3629%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=6856ae3f6504ee7903b5ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3221-cwe-770-allocation-of-resources-with-e588f7be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3221%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=6856ae3f6504ee7903b5ba7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36016-cwe-601-url-redirection-to-untruste-ea73a996</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36016%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20IBM%20Process%20Mining&amp;severity=medium&amp;id=6856ae3f6504ee7903b5ba7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/violence-as-a-service-encrypted-apps-used-in-recru-52d1687a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Violence-as-a-Service%3A%20Encrypted%20Apps%20Used%20in%20Recruiting%20Teens%20as%20Hitmen&amp;severity=medium&amp;id=6856a72f6504ee7903b5b40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6404-sql-injection-in-campcodes-online-te-ca0823a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6404%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6856a3ab6504ee7903b5af82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5289-cwe-79-improper-neutralization-of-in-3430ce7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Embedder%2C%20PDF%20Flipbook%20Viewer%2C%20Flipbook%20Image%20Gallery&amp;severity=medium&amp;id=6856959e6504ee7903b5a239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6403-sql-injection-in-code-projects-schoo-6faa26dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6403%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=68568e7faded773421b5a6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6402-buffer-overflow-in-totolink-x15-09a32a74</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6402%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68568e7faded773421b5a6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5143-cwe-79-improper-neutralization-of-in-a295e08e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20TableOn%20%E2%80%93%20WordPress%20Posts%20Table%20Filterable&amp;severity=medium&amp;id=68568e7faded773421b5a6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6401-denial-of-service-in-totolink-n300rh-a31a8440</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6401%3A%20Denial%20of%20Service%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=68568e7faded773421b5a6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5034-cwe-79-cross-site-scripting-xss-in-w-0a8d965c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5034%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20wp-file-download&amp;severity=high&amp;id=68568e7faded773421b5a6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6400-buffer-overflow-in-totolink-n300rh-df4bfeff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6400%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N300RH&amp;severity=high&amp;id=68568e7faded773421b5a6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6399-buffer-overflow-in-totolink-x15-8ac95873</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6399%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68568e7faded773421b5a6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52488-cwe-200-exposure-of-sensitive-infor-06d3279e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52488%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=68568e80aded773421b5a722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52487-cwe-863-incorrect-authorization-in--0ed579b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52487%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20dnnsoftware%20Dnn.Platform&amp;severity=high&amp;id=68568e7faded773421b5a704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52486-cwe-79-improper-neutralization-of-i-06d79b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68568e7faded773421b5a6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52485-cwe-79-improper-neutralization-of-i-8c0fe171</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=68568e7faded773421b5a6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52552-cwe-601-url-redirection-to-untruste-db1f8c6e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52552%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20labring%20FastGPT&amp;severity=medium&amp;id=68568e80aded773421b5a725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52557-cwe-1384-improper-handling-of-physi-6581edf9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52557%3A%20CWE-1384%3A%20Improper%20Handling%20of%20Physical%20or%20Environmental%20Conditions%20in%20Mail-0%20Zero&amp;severity=high&amp;id=68568e80aded773421b5a72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52556-cwe-347-improper-verification-of-cr-b3e22cc9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52556%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20trailofbits%20rfc3161-client&amp;severity=critical&amp;id=68568e80aded773421b5a729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6394-sql-injection-in-code-projects-simpl-e7bc66a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6394%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68568e80aded773421b5a732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6393-buffer-overflow-in-totolink-a702r-c689aab6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6393%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=68568e80aded773421b5a739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6375-null-pointer-dereference-in-poco-7a5fa74a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6375%3A%20NULL%20Pointer%20Dereference%20in%20poco&amp;severity=medium&amp;id=68568e80aded773421b5a744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5475-cwe-190-integer-overflow-or-wraparou-09832c98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5475%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5477-cwe-122-heap-based-buffer-overflow-i-b3f8983f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5477%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5478-cwe-190-integer-overflow-or-wraparou-fbca52ca</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5478%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5479-cwe-122-heap-based-buffer-overflow-i-418d2686</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5479%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sony%20XAV-AX8500&amp;severity=high&amp;id=68568e80aded773421b5a77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5476-cwe-653-improper-isolation-or-compar-2ca8dd12</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5476%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Sony%20XAV-AX8500&amp;severity=medium&amp;id=68568e80aded773421b5a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5820-cwe-288-authentication-bypass-using--5a5aee48</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5820%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Sony%20XAV-AX8500&amp;severity=medium&amp;id=68568e80aded773421b5a784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6218-cwe-22-improper-limitation-of-a-path-add70d9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6218%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RARLAB%20WinRAR&amp;severity=high&amp;id=68568e80aded773421b5a78b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6217-cwe-367-time-of-check-time-of-use-to-2333b6df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6217%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20PEAK-System%20Driver&amp;severity=low&amp;id=68568e80aded773421b5a788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6374-stack-based-buffer-overflow-in-d-lin-bfa65f19</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6374%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-21-96e2e66d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-21&amp;severity=medium&amp;id=68574922d804313c2171b4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52919-na-0e93014f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52919%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Yealink%20RPS&amp;severity=medium&amp;id=68573caff20900b727cae1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52918-na-2d39d1d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52918%3A%20CWE-863%20Incorrect%20Authorization%20in%20Yealink%20RPS&amp;severity=medium&amp;id=68573caff20900b727cae1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52917-na-42e2c78e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52917%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Yealink%20RPS&amp;severity=medium&amp;id=68573caff20900b727cae1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52916-cwe-307-improper-restriction-of-exc-38b281d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52916%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Yealink%20RPS&amp;severity=low&amp;id=68573caff20900b727cae1ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6373-stack-based-buffer-overflow-in-d-lin-91438102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6373%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6372-stack-based-buffer-overflow-in-d-lin-d6ca1f33</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6372%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6371-stack-based-buffer-overflow-in-d-lin-aa21dc26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6371%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anubis-ransomware-lists-disneyland-paris-as-new-vi-6cce7dba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anubis%20Ransomware%20Lists%20Disneyland%20Paris%20as%20New%20Victim&amp;severity=medium&amp;id=68568e39aded773421b54f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6370-stack-based-buffer-overflow-in-d-lin-fdca55d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6370%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e80aded773421b5a7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6369-stack-based-buffer-overflow-in-d-lin-03c0ec8f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6369%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e81aded773421b5a7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6368-stack-based-buffer-overflow-in-d-lin-caba986c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6368%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e81aded773421b5a7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-invite-hijacking-how-fake-links-are-delive-5ca0d2ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20Invite%20Hijacking%3A%20How%20Fake%20Links%20Are%20Delivering%20Infostealers&amp;severity=medium&amp;id=685ab3b48e5e669c7fb5acd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6367-stack-based-buffer-overflow-in-d-lin-a16de2b5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6367%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=68568e81aded773421b5a7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6365-resource-consumption-in-hobbesosr-ki-cbd71049</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6365%3A%20Resource%20Consumption%20in%20HobbesOSR%20Kitten&amp;severity=medium&amp;id=68568e81aded773421b5a7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6364-sql-injection-in-code-projects-simpl-d0904ffc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6364%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6363-sql-injection-in-code-projects-simpl-99be1175</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6363%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6362-sql-injection-in-code-projects-simpl-b03d49a4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6362%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6361-sql-injection-in-code-projects-simpl-42486109</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6361%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-abusing-vercel-to-deliver-remote-ac-d2e4a930</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Abusing%20Vercel%20to%20Deliver%20Remote%20Access%20Malware&amp;severity=medium&amp;id=68568e6baded773421b5987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-act-uncovering-spynote-in-unexpected-5a7ae6e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20Act%3A%20Uncovering%20SpyNote%20in%20Unexpected%20Places&amp;severity=medium&amp;id=68568e6baded773421b59a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dmv-themed-phishing-campaign-targeting-us-citizens-586680ed</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DMV-Themed%20Phishing%20Campaign%20Targeting%20U.S.%20Citizens&amp;severity=medium&amp;id=68568e6baded773421b59a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-loan-app-removed-from-ios-and-google-pla-929f53f6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Loan%20App%20Removed%20from%20iOS%20and%20Google%20Play%20App%20Store%20Posed%20Severe%20Risks%20to%20Users&amp;severity=medium&amp;id=68568e6baded773421b59a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypto-phishing-applications-on-the-play-store-ffabf327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypto%20Phishing%20Applications%20On%20The%20Play%20Store&amp;severity=medium&amp;id=68568e6baded773421b59aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bert-ransomware-the-raven-file-f2260bbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BERT%20RANSOMWARE%20-%20THE%20RAVEN%20FILE&amp;severity=medium&amp;id=68568e6baded773421b59a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hiding-in-github-bb40c595</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hiding%20in%20GitHub&amp;severity=medium&amp;id=68568e6baded773421b59ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48945-cwe-416-use-after-free-in-aio-libs--d01be0b7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48945%3A%20CWE-416%3A%20Use%20After%20Free%20in%20aio-libs%20aiodns&amp;severity=high&amp;id=68568e81aded773421b5a804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6360-sql-injection-in-code-projects-simpl-ddda134e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6360%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e81aded773421b5a7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/steam-phishing-popular-as-ever-582f10cd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Steam%20Phishing%3A%20Popular%20as%20Ever&amp;severity=medium&amp;id=68568e6caded773421b5a150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34029-cwe-78-improper-neutralization-of-s-1380e320</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34029%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Edimax%20Edimax%20EW-7438RPn%20Mini&amp;severity=critical&amp;id=68568e82aded773421b5a869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34024-cwe-78-improper-neutralization-of-s-0c9f76cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34024%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Edimax%20Edimax%20EW-7438RPn%20Mini&amp;severity=critical&amp;id=68568e82aded773421b5a863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34023-cwe-22-improper-limitation-of-a-pat-d65f09b5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34023%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Karel%20Karel%20IP%20Phone%20IP1211&amp;severity=high&amp;id=68568e82aded773421b5a85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34022-cwe-22-improper-limitation-of-a-pat-64e74f9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34022%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Selea%20Targa%20IP%20OCR-ANPR%20Camera&amp;severity=critical&amp;id=68568e82aded773421b5a855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34021-cwe-918-server-side-request-forgery-06f79cb7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34021%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Selea%20Targa%20IP%20OCR-ANPR%20Camera&amp;severity=high&amp;id=68568e82aded773421b5a84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25037-cwe-200-exposure-of-sensitive-infor-2afcaecd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25037%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Aquatronica%20Aquatronica%20Controller%20System&amp;severity=critical&amp;id=68568e82aded773421b5a846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6359-sql-injection-in-code-projects-simpl-18928e5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6359%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6358-sql-injection-in-code-projects-simpl-a818e71e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6358%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/qilin-ransomware-adds-call-lawyer-feature-to-press-abb4e71f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Qilin%20Ransomware%20Adds%20%22Call%20Lawyer%22%20Feature%20to%20Pressure%20Victims%20for%20Larger%20Ransoms&amp;severity=high&amp;id=68568e39aded773421b54f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6357-sql-injection-in-code-projects-simpl-623e12cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6357%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6356-sql-injection-in-code-projects-simpl-485bcf17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6356%3A%20SQL%20Injection%20in%20code-projects%20Simple%20Pizza%20Ordering%20System&amp;severity=medium&amp;id=68568e82aded773421b5a8bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-cyber-detection-method-uses-hackers-own-jitter-41e01ab2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Cyber%20Detection%20Method%20Uses%20Hackers%E2%80%99%20Own%20Jitter%20Patterns%20Against%20Them&amp;severity=medium&amp;id=68568e39aded773421b54f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6355-sql-injection-in-sourcecodester-onli-1d58203d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6355%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hotel%20Reservation%20System&amp;severity=medium&amp;id=68568e82aded773421b5a8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49132-cwe-94-improper-control-of-generati-c9a94acd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49132%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pterodactyl%20panel&amp;severity=critical&amp;id=68568e82aded773421b5a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48059-cwe-1333-inefficient-regular-expres-cfcbe971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48059%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20powsybl%20powsybl-core&amp;severity=low&amp;id=68568e82aded773421b5a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6354-sql-injection-in-code-projects-onlin-357b0210</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6354%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68568e83aded773421b5a914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6353-cross-site-scripting-in-code-project-af824c35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6353%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Responsive%20Blog&amp;severity=medium&amp;id=68568e82aded773421b5a8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aflac-discloses-breach-amidst-scattered-spider-ins-022580f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Aflac%20discloses%20breach%20amidst%20Scattered%20Spider%20insurance%20attacks&amp;severity=high&amp;id=68568e39aded773421b54f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-social-engineering-to-target-expert-on-8de17712</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Social%20Engineering%20to%20Target%20Expert%20on%20Russian%20Operations&amp;severity=medium&amp;id=68568e39aded773421b54f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5416-exposure-of-sensitive-system-informa-da07b6ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5416%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Build%20of%20Keycloak&amp;severity=low&amp;id=68568e82aded773421b5a8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6352-direct-request-in-code-projects-auto-c600449b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6352%3A%20Direct%20Request%20in%20code-projects%20Automated%20Voting%20System&amp;severity=medium&amp;id=68568e83aded773421b5a937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6351-sql-injection-in-itsourcecode-employ-d8d2268a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6351%3A%20SQL%20Injection%20in%20itsourcecode%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=68568e83aded773421b5a930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6193-improper-neutralization-of-special-e-279f3aad</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=medium&amp;id=68568e82aded773421b5a8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6347-cross-site-scripting-in-code-project-1034a35b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6347%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Responsive%20Blog&amp;severity=medium&amp;id=68568e83aded773421b5a96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49873-cwe-79-improper-neutralization-of-i-a3290f20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NasaTheme%20Elessi&amp;severity=null&amp;id=68568e83aded773421b5a93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49964-cwe-352-cross-site-request-forgery--26a26626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49964%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20indgeek%20ClipLink&amp;severity=null&amp;id=68568e83aded773421b5a92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49965-cwe-352-cross-site-request-forgery--556f3c9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49965%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oganro%20PixelBeds%20Channel%20Manager%20and%20Hotel%20Booking%20Engine&amp;severity=null&amp;id=68568e83aded773421b5a91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49966-cwe-352-cross-site-request-forgery--19376869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oganro%20Oganro%20Travel%20Portal%20Search%20Widget%20for%20HotelBeds%20APITUDE%20API&amp;severity=null&amp;id=68568e83aded773421b5a91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49967-cwe-352-cross-site-request-forgery--00c18e63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49967%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marcusjansen%20Live%20Sports%20Streamthunder&amp;severity=null&amp;id=68568e83aded773421b5a922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49968-cwe-352-cross-site-request-forgery--e25ef2b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49968%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oganro%20XML%20Travel%20Portal%20Widget&amp;severity=null&amp;id=68568e83aded773421b5a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49969-cwe-862-missing-authorization-in-za-e51f7274</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49969%3A%20Missing%20Authorization%20in%20Zara%204%20Zara%204%20Image%20Compression&amp;severity=null&amp;id=68568e83aded773421b5a985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49970-cwe-862-missing-authorization-in-sp-63b691f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49970%3A%20Missing%20Authorization%20in%20sparklewpthemes%20Hello%20FSE%20Blog&amp;severity=null&amp;id=68568e83aded773421b5a988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49971-cwe-862-missing-authorization-in-at-a83a6377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49971%3A%20Missing%20Authorization%20in%20aThemeArt%20Translations%20eDS%20Responsive%20Menu&amp;severity=null&amp;id=68568e83aded773421b5a98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49972-cwe-352-cross-site-request-forgery--c91dd2eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49972%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Wood%20TM%20Replace%20Howdy&amp;severity=null&amp;id=68568e83aded773421b5a98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49973-cwe-862-missing-authorization-in-gr-d7776dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49973%3A%20Missing%20Authorization%20in%20GrandPlugins%20Image%20Sizes%20Controller%2C%20Create%20Custom%20Image%20Sizes%2C%20Disable%20Image%20Sizes&amp;severity=null&amp;id=68568e83aded773421b5a991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49974-cwe-862-missing-authorization-in-up-98ec34c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49974%3A%20Missing%20Authorization%20in%20upstreamplugin%20UpStream%3A%20a%20Project%20Management%20Plugin%20for%20WordPress&amp;severity=null&amp;id=68568e84aded773421b5a9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49975-cwe-352-cross-site-request-forgery--8a196eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49975%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=null&amp;id=68568e84aded773421b5a9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49976-missing-authorization-in-wanotifier-a4b1fe83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49976%3A%20Missing%20Authorization%20in%20WANotifier%20Notifier&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49977-cwe-352-cross-site-request-forgery--dc7aac54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49977%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Inventory%20WP%20Inventory%20Manager&amp;severity=null&amp;id=68568e84aded773421b5a9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49978-cwe-639-authorization-bypass-throug-3eabac42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49978%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=68568e84aded773421b5a9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49979-cwe-862-missing-authorization-in-sl-04114167</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49979%3A%20Missing%20Authorization%20in%20slui%20Media%20Hygiene&amp;severity=null&amp;id=68568e84aded773421b5a9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49980-cwe-862-missing-authorization-in-wp-b699523c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49980%3A%20Missing%20Authorization%20in%20WP%20Event%20Manager%20WP%20User%20Profile%20Avatar&amp;severity=null&amp;id=68568e84aded773421b5a9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49981-cwe-862-missing-authorization-in-ma-56a3aafc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49981%3A%20Missing%20Authorization%20in%20mahabub81%20User%20Roles%20and%20Capabilities&amp;severity=null&amp;id=68568e84aded773421b5a9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49982-cwe-862-missing-authorization-in-ag-ab99d865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49982%3A%20Missing%20Authorization%20in%20aguilatechnologies%20WP%20Customer%20Area&amp;severity=null&amp;id=68568e82aded773421b5a8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49983-cwe-918-server-side-request-forgery-6c476e6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49983%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Joe%20Hoyle%20WPThumb&amp;severity=null&amp;id=68568e84aded773421b5a9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49984-cwe-918-server-side-request-forgery-b1fd4b72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49984%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=68568e84aded773421b5a9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49985-cwe-918-server-side-request-forgery-0cf180bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49985%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ali%20Irani%20Auto%20Upload%20Images&amp;severity=null&amp;id=68568e84aded773421b5a9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49986-cwe-862-missing-authorization-in-th-af0af4be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49986%3A%20Missing%20Authorization%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=68568e84aded773421b5aa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49987-cwe-862-missing-authorization-in-wp-a9dc369d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49987%3A%20Missing%20Authorization%20in%20WPFactory%20CRM%20ERP%20Business%20Solution&amp;severity=null&amp;id=68568e84aded773421b5aa0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49988-cwe-862-missing-authorization-in-re-01112c06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49988%3A%20Missing%20Authorization%20in%20Renzo%20Johnson%20Contact%20Form%207%20AWeber%20Extension&amp;severity=null&amp;id=68568e84aded773421b5aa0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49989-cwe-862-missing-authorization-in-ap-2a9f1df7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49989%3A%20Missing%20Authorization%20in%20App%20Cheap%20App%20Builder&amp;severity=null&amp;id=68568e84aded773421b5aa11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49991-cwe-862-missing-authorization-in-tg-6879efaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49991%3A%20CWE-862%20Missing%20Authorization%20in%20tggfref%20WP-Recall&amp;severity=medium&amp;id=68568e84aded773421b5aa17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49993-cwe-862-missing-authorization-in-co-02446d40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49993%3A%20Missing%20Authorization%20in%20csarturas%20Cookie-Script.com&amp;severity=null&amp;id=68568e84aded773421b5aa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49995-cwe-639-authorization-bypass-throug-584cfe13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49995%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dFactory%20Download%20Attachments&amp;severity=null&amp;id=68568e84aded773421b5aa20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49996-cwe-862-missing-authorization-in-os-090184b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49996%3A%20Missing%20Authorization%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=68568e84aded773421b5aa23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49997-cwe-862-missing-authorization-in-sy-b2efbf58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49997%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=null&amp;id=68568e84aded773421b5aa26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49998-cwe-862-missing-authorization-in-we-1e18efd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49998%3A%20Missing%20Authorization%20in%20Wetail%20WooCommerce%20Fortnox%20Integration&amp;severity=null&amp;id=68568e84aded773421b5aa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50008-cwe-862-missing-authorization-in-cs-09992d1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50008%3A%20Missing%20Authorization%20in%20cscode%20WooCommerce%20Manager%20%26%238211%3B%20Customize%20and%20Control%20Cart%20page%2C%20Add%20to%20Cart%20button%2C%20Checkout%20fields%20easily&amp;severity=null&amp;id=68568e85aded773421b5aa53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50009-cwe-862-missing-authorization-in-cl-866c50ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50009%3A%20Missing%20Authorization%20in%20Climax%20Themes%20Kata%20Plus&amp;severity=null&amp;id=68568e85aded773421b5aa56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50010-cwe-862-missing-authorization-in-za-25717061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50010%3A%20Missing%20Authorization%20in%20Zapier%20Zapier%20for%20WordPress&amp;severity=null&amp;id=68568e85aded773421b5aa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50011-cwe-79-improper-neutralization-of-i-4469f7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F%C3%A9lix%20Mart%C3%ADnez%20Recipes%20manager%20-%20WPH&amp;severity=medium&amp;id=68568e85aded773421b5aa5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50012-cwe-79-improper-neutralization-of-i-3b9ea90f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50012%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fridaysystems%20Inventory%20Presser&amp;severity=null&amp;id=68568e85aded773421b5aa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50013-cwe-79-improper-neutralization-of-i-ded9e39b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50013%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Judge%20CSV%20Importer%20Improved&amp;severity=null&amp;id=68568e85aded773421b5aa65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50014-cwe-79-improper-neutralization-of-i-6bb5b3da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50014%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamapinan%20PDPA%20Consent%20for%20Thailand&amp;severity=null&amp;id=68568e85aded773421b5aa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50015-cwe-79-improper-neutralization-of-i-2e565be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50015%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rodrigo%20Bastos%20Hand%20Talk&amp;severity=null&amp;id=68568e85aded773421b5aa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50016-cwe-79-improper-neutralization-of-i-3081fc38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50016%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brijeshk89%20IP%20Based%20Login&amp;severity=null&amp;id=68568e85aded773421b5aa6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50017-cwe-79-improper-neutralization-of-i-eb901fc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20WP%20Voting%20Contest&amp;severity=null&amp;id=68568e85aded773421b5aa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50019-cwe-79-improper-neutralization-of-i-f83dc2a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50019%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sandor%20Kovacs%20Simple%20Sticky%20Footer&amp;severity=null&amp;id=68568e85aded773421b5aa94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50020-cwe-79-improper-neutralization-of-i-80cd86c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nitin%20Yawalkar%20RDFa%20Breadcrumb&amp;severity=null&amp;id=68568e85aded773421b5aa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50021-cwe-79-improper-neutralization-of-i-b4fb4c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Peake%20Better%20Random%20Redirect&amp;severity=null&amp;id=68568e85aded773421b5aa9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50022-cwe-79-improper-neutralization-of-i-e275fa36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JK%20WP-FB-AutoConnect&amp;severity=null&amp;id=68568e85aded773421b5aa9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50023-cwe-79-improper-neutralization-of-i-24f72625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Coyier%20CodePen%20Embed%20Block&amp;severity=null&amp;id=68568e85aded773421b5aaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50024-cwe-79-improper-neutralization-of-i-6bb38052</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Truong%20Thanh%20ATP%20Call%20Now&amp;severity=null&amp;id=68568e85aded773421b5aaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50025-cwe-79-improper-neutralization-of-i-140c2728</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Polls&amp;severity=null&amp;id=68568e85aded773421b5aaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50027-cwe-79-improper-neutralization-of-i-60d6e294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xootix%20Login%2FSignup%20Popup&amp;severity=null&amp;id=68568e85aded773421b5aaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50030-cwe-79-improper-neutralization-of-i-d2af3a6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Spark%20Multipurpose&amp;severity=null&amp;id=68568e85aded773421b5aaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50033-cwe-79-improper-neutralization-of-i-1570158e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sparklewpthemes%20Fitness%20Park&amp;severity=null&amp;id=68568e85aded773421b5aab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50034-cwe-862-missing-authorization-in-ma-997b4f78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50034%3A%20Missing%20Authorization%20in%20Mahmudul%20Hasan%20Arif%20Enhanced%20Blocks%20%26%238211%3B%20Page%20Builder%20Blocks%20for%20Gutenberg&amp;severity=null&amp;id=68568e85aded773421b5aadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50035-cwe-79-improper-neutralization-of-i-61706710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyrilG%20Fyrebox%20Quizzes&amp;severity=null&amp;id=68568e85aded773421b5aae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50036-cwe-352-cross-site-request-forgery--440f5faa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50036%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=68568e85aded773421b5aae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50037-cwe-79-improper-neutralization-of-i-b907f992</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Buying%20Buddy%20Buying%20Buddy%20IDX%20CRM&amp;severity=null&amp;id=68568e85aded773421b5aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50038-cwe-79-improper-neutralization-of-i-dd1abf52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anantaddons%20Anant%20Addons%20for%20Elementor&amp;severity=null&amp;id=68568e85aded773421b5aaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50041-cwe-79-improper-neutralization-of-i-61b0641e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Engine%20Gutenberg%20Blocks%20%E2%80%93%20ACF%20Blocks%20Suite&amp;severity=null&amp;id=68568e85aded773421b5aaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50042-cwe-79-improper-neutralization-of-i-d518604f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20WP%20Register%20Profile%20With%20Shortcode&amp;severity=null&amp;id=68568e85aded773421b5aaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50043-cwe-79-improper-neutralization-of-i-8dc6bf6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Code%20Engine&amp;severity=null&amp;id=68568e85aded773421b5aaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50044-cwe-352-cross-site-request-forgery--067c7e01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50044%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=68568e85aded773421b5aaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50045-cwe-79-improper-neutralization-of-i-d8423604</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProWCPlugins%20Related%20Products%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68568e85aded773421b5aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50046-cwe-79-improper-neutralization-of-i-bf1a2ef4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20WPComplete&amp;severity=null&amp;id=68568e86aded773421b5ab26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50047-cwe-79-improper-neutralization-of-i-82764b41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50047%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Sitekit&amp;severity=null&amp;id=68568e86aded773421b5ab29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50048-cwe-79-improper-neutralization-of-i-31b0d3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50048%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atakan%20Au%20Automatically%20Hierarchic%20Categories%20in%20Menu&amp;severity=null&amp;id=68568e86aded773421b5ab2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50049-cwe-79-improper-neutralization-of-i-f3f9aee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50049%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prismtechstudios%20Modern%20Footnotes&amp;severity=null&amp;id=68568e86aded773421b5ab2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50050-cwe-79-improper-neutralization-of-i-2a6c7ef5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlueGlass%20Interactive%20AG%20Jobs%20for%20WordPress&amp;severity=null&amp;id=68568e86aded773421b5ab32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50051-cwe-79-improper-neutralization-of-i-84dabc8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chad%20Butler%20WP-Members&amp;severity=null&amp;id=68568e86aded773421b5ab35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52772-cwe-352-cross-site-request-forgery--d0dde249</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52772%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adnan%20Haque%20(a11n)%20Virtual%20Moderator&amp;severity=high&amp;id=68568e86aded773421b5ab7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52780-cwe-352-cross-site-request-forgery--906f9842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52780%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mohammad%20Parsa%20Logo%20Manager%20For%20Samandehi&amp;severity=null&amp;id=68568e86aded773421b5ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52781-cwe-352-cross-site-request-forgery--69866733</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52781%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Beee%20TinyNav&amp;severity=null&amp;id=68568e86aded773421b5ab82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52782-cwe-79-improper-neutralization-of-i-1629604a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52782%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20King%20Rayhan%20Scroll%20UP&amp;severity=null&amp;id=68568e86aded773421b5ab85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52783-cwe-352-cross-site-request-forgery--b3fdb48a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52783%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themelocation%20Change%20Cart%20button%20Colors%20WooCommerce&amp;severity=null&amp;id=68568e86aded773421b5ab89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52784-cwe-352-cross-site-request-forgery--403de506</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52784%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hideoguchi%20Bluff%20Post&amp;severity=null&amp;id=68568e86aded773421b5ab8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52789-cwe-352-cross-site-request-forgery--b4a21288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52789%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20George%20Lewe%20Lewe%20ChordPress&amp;severity=null&amp;id=68568e87aded773421b5abb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52790-cwe-352-cross-site-request-forgery--cdf67976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52790%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20r-win%20WP-DownloadCounter&amp;severity=null&amp;id=68568e87aded773421b5abbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52791-cwe-352-cross-site-request-forgery--a751e73e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52791%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20devfelixmoira%20Knowledge%20Base%20%26%238211%3B%20Knowledge%20Base%20Maker&amp;severity=null&amp;id=68568e87aded773421b5abbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52792-cwe-352-cross-site-request-forgery--49b74832</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52792%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vgstef%20WP%20User%20Stylesheet%20Switcher&amp;severity=null&amp;id=68568e87aded773421b5abc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52793-cwe-352-cross-site-request-forgery--311e57be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52793%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Esselink.nu%20Esselink.nu%20Settings&amp;severity=null&amp;id=68568e87aded773421b5abc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52794-cwe-352-cross-site-request-forgery--0b1108e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52794%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Creative-Solutions%20Creative%20Contact%20Form&amp;severity=null&amp;id=68568e87aded773421b5abc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52795-cwe-352-cross-site-request-forgery--086e4c0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52795%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aharonyan%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=null&amp;id=68568e87aded773421b5abcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52802-cwe-862-missing-authorization-in-en-e1df5c7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52802%3A%20Missing%20Authorization%20in%20enguerranws%20Import%20YouTube%20videos%20as%20WP%20Posts&amp;severity=null&amp;id=68568e87aded773421b5abce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52821-cwe-89-improper-neutralization-of-s-53808498</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52821%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thanhtungtnt%20Video%20List%20Manager&amp;severity=null&amp;id=68568e87aded773421b5abd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52822-cwe-89-improper-neutralization-of-s-23204694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52822%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20WP%20Roadmap&amp;severity=null&amp;id=68568e87aded773421b5abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52825-cwe-352-cross-site-request-forgery--ed7f33ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52825%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=68568e87aded773421b5abfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52733-cwe-79-improper-neutralization-of-i-29914336</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anonform%20Ab%20ANON%3A%3Aform%20embedded%20secure%20form&amp;severity=null&amp;id=68568e86aded773421b5ab79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52719-cwe-497-exposure-of-sensitive-syste-d3763eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52719%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68568e86aded773421b5ab76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52715-cwe-98-improper-control-of-filename-12145ca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52715%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=68568e86aded773421b5ab72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52713-cwe-918-server-side-request-forgery-d3855db3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52713%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=68568e86aded773421b5ab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52711-cwe-352-cross-site-request-forgery--4e6eb15f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52711%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=68568e86aded773421b5ab45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52710-cwe-79-improper-neutralization-of-i-1ddaed53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ninja%20Team%20File%20Manager%20Pro&amp;severity=null&amp;id=68568e86aded773421b5ab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52708-cwe-98-improper-control-of-filename-842c60da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52708%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20HUSKY&amp;severity=null&amp;id=68568e86aded773421b5ab3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52707-cwe-79-improper-neutralization-of-i-d1bbd0a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Firelight%20Firelight%20Lightbox&amp;severity=null&amp;id=68568e86aded773421b5ab38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6346-sql-injection-in-sourcecodester-adva-9d11dda5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6346%3A%20SQL%20Injection%20in%20SourceCodester%20Advance%20Charity%20Management%20System&amp;severity=medium&amp;id=68568e83aded773421b5a976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3319-cwe-306-missing-authentication-for-c-aaed22f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3319%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20IBM%20Spectrum%20Protect%20Server&amp;severity=high&amp;id=68568e87aded773421b5ac00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6345-cross-site-scripting-in-sourcecodest-286cf0ce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6345%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20My%20Food%20Recipe&amp;severity=medium&amp;id=68568e87aded773421b5ac07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6344-sql-injection-in-code-projects-onlin-1b244f9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6344%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68556d5d7ff74dad36a6694d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53298-cwe-862-missing-authorization-in-de-417dccfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53298%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Dell%20PowerScale%20OneFS&amp;severity=critical&amp;id=69a0a1ce85912abc71d0be90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32753-cwe-89-improper-neutralization-of-s-1d95e014</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32753%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=685569cf7ff74dad36a660ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6343-sql-injection-in-code-projects-onlin-cd703f35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6343%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=685566507ff74dad36a65758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/resurgence-of-the-prometei-botnet-31935097</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Resurgence%20of%20the%20Prometei%20Botnet&amp;severity=medium&amp;id=68568e6caded773421b5a171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6342-sql-injection-in-code-projects-onlin-742b37e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6342%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=685562cd7ff74dad36a649df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6341-cross-site-request-forgery-in-code-p-b8d431b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6341%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6855583a7ff74dad36a62e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6340-cross-site-scripting-in-code-project-893a9b39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6340%3A%20Cross%20Site%20Scripting%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6855583a7ff74dad36a62e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mocha-manakin-malware-deploys-nodeinitrat-via--66407687</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mocha%20Manakin%20Malware%20Deploys%20NodeInitRAT%20via%20Clickfix%20Attack&amp;severity=medium&amp;id=685551327ff74dad36a600f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6339-sql-injection-in-ponaravindb-hospita-941e4d23</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6339%3A%20SQL%20Injection%20in%20ponaravindb%20Hospital%20Management%20System&amp;severity=medium&amp;id=685551437ff74dad36a6010c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6337-buffer-overflow-in-totolink-a3002r-0cc796a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6337%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=685551437ff74dad36a60103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6336-buffer-overflow-in-totolink-ex1200t-6f240db7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6336%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68554a2f7ff74dad36a5f037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4102-cwe-434-unrestricted-upload-of-file--8dd8e099</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4102%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20The%20Beaver%20Builder%20Team%20Beaver%20Builder%20Plugin%20(Starter%20Version)&amp;severity=high&amp;id=685546a87ff74dad36a5e6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6335-command-injection-in-dedecms-96607c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6335%3A%20Command%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=685543287ff74dad36a5de79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6334-stack-based-buffer-overflow-in-d-lin-1d892d6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6334%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-867&amp;severity=high&amp;id=685543287ff74dad36a5de72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-expert-falls-prey-to-elite-hackers-disguise-f270443d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia%20Expert%20Falls%20Prey%20to%20Elite%20Hackers%20Disguised%20as%20US%20Officials&amp;severity=high&amp;id=68553c1b7ff74dad36a5cd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6333-sql-injection-in-phpgurukul-director-68a5c643</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6333%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=68553c267ff74dad36a5cd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6332-sql-injection-in-phpgurukul-director-b8f66e00</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6332%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=68553c267ff74dad36a5cd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5255-cwe-276-incorrect-default-permission-b1175aea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5255%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Core.ai%20Phoenix%20Code&amp;severity=medium&amp;id=685535137ff74dad36a5ba22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6331-sql-injection-in-phpgurukul-director-eea5559b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6331%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=685535137ff74dad36a5ba2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6330-sql-injection-in-phpgurukul-director-e0ee3c41</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6330%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=685535137ff74dad36a5ba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6329-authorization-bypass-in-scriptandtoo-78d084f9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6329%3A%20Authorization%20Bypass%20in%20ScriptAndTools%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=685569cf7ff74dad36a660ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6328-stack-based-buffer-overflow-in-d-lin-dd5da96b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6328%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-815&amp;severity=high&amp;id=68568e82aded773421b5a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-ransomware-attack-pushed-the-german-napkin-firm--cd1f9cfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20ransomware%20attack%20pushed%20the%20German%20napkin%20firm%20Fasana%20into%20insolvency&amp;severity=medium&amp;id=68552a8a7ff74dad36a2286c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/no-the-16-billion-credentials-leak-is-not-a-new-da-aa218246</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=No%2C%20the%2016%20billion%20credentials%20leak%20is%20not%20a%20new%20data%20breach&amp;severity=high&amp;id=68552a8a7ff74dad36a22868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/txtag-takedown-busting-phishing-email-schemes-368f21f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TxTag%20Takedown%3A%20Busting%20Phishing%20Email%20Schemes&amp;severity=medium&amp;id=685527017ff74dad36a21956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6323-sql-injection-in-phpgurukul-pre-scho-a2848d5c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6323%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685527027ff74dad36a21968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6322-sql-injection-in-phpgurukul-pre-scho-b15d3fb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6322%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685527027ff74dad36a21961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6321-sql-injection-in-phpgurukul-pre-scho-69a6f9d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6321%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=68551ffc7ff74dad36a1fbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6320-sql-injection-in-phpgurukul-pre-scho-25f3ff47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6320%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=68551ffc7ff74dad36a1fbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6257-cwe-79-improper-neutralization-of-in-0349ff2d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6257%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joostdekeijzer%20Euro%20FxRef%20Currency%20Converter&amp;severity=medium&amp;id=68551c787ff74dad36a1f0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6319-sql-injection-in-phpgurukul-pre-scho-34c7a7d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6319%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685518f47ff74dad36a1e1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6318-sql-injection-in-phpgurukul-pre-scho-7ead1ca0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6318%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=685511ee7ff74dad36a1d0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6317-sql-injection-in-code-projects-onlin-ee8de9c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6317%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=685511ee7ff74dad36a1d0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6316-sql-injection-in-code-projects-onlin-041d470b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6316%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68550ae57ff74dad36a1be9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6315-sql-injection-in-code-projects-onlin-6efa9025</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6315%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=68550ae57ff74dad36a1be93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6314-sql-injection-in-campcodes-sales-and-40da6e40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6314%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=685503dc7ff74dad36a1ad45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6313-sql-injection-in-campcodes-sales-and-41c3947f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6313%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=685503dc7ff74dad36a1ad3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50054-cwe-122-heap-based-buffer-overflow--c5bcca8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50054%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20OpenVPN%20ovpn-dco-win&amp;severity=medium&amp;id=685503dc7ff74dad36a1ad3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analyzing-serpentinecloud-threat-actors-abuse-clou-40498acb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analyzing%20SERPENTINE%23CLOUD%3A%20Threat%20Actors%20Abuse%20Cloudflare%20Tunnels%20to%20Infect%20Systems%20with%20Stealthy%20Python-Based%20Malware&amp;severity=medium&amp;id=68551c777ff74dad36a1efe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6312-sql-injection-in-campcodes-sales-and-3c03ec80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6312%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=68568e82aded773421b5a83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5125-cwe-79-cross-site-scripting-xss-in-c-781bca08</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5125%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Custom%20Post%20Carousels%20with%20Owl&amp;severity=medium&amp;id=6854f98a7ff74dad36a193e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6311-sql-injection-in-campcodes-sales-and-7857c419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6311%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=6854f5cc7ff74dad36a18b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6310-sql-injection-in-phpgurukul-emergenc-176a9317</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6310%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=6854eb407ff74dad36a1521c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6309-sql-injection-in-phpgurukul-emergenc-b549c1a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6309%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=6854eb407ff74dad36a15215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6308-sql-injection-in-phpgurukul-emergenc-983d4f4f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6308%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=6854e7bc7ff74dad36a14824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6307-sql-injection-in-code-projects-onlin-41eced01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6307%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6854e7bc7ff74dad36a1481d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6306-sql-injection-in-code-projects-onlin-a514f720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6306%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6854e0b47ff74dad36a1339d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6305-sql-injection-in-code-projects-onlin-ba66f739</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6305%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6859ad500112634db7041080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6304-sql-injection-in-code-projects-onlin-833e8188</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6304%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6859ad500112634db7041079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6303-sql-injection-in-code-projects-onlin-7485c74e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6303%3A%20SQL%20Injection%20in%20code-projects%20Online%20Shoe%20Store&amp;severity=medium&amp;id=6854d2a47ff74dad36a11447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6302-stack-based-buffer-overflow-in-totol-41f51869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6302%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6854d2a47ff74dad36a11440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6301-cross-site-scripting-in-phpgurukul-n-60315cab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6301%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=6854d2a47ff74dad36a1143a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6264-cwe-276-incorrect-default-permission-2f94b0b2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6264%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Rapid7%20Velociraptor&amp;severity=medium&amp;id=6854c8187ff74dad36a0ec82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6300-sql-injection-in-phpgurukul-employee-6c65baca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6300%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6854c8187ff74dad36a0ec8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6299-os-command-injection-in-totolink-n15-179f2ea9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6299%3A%20OS%20Command%20Injection%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=6854c8187ff74dad36a0ec85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6296-sql-injection-in-code-projects-hoste-770e27ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6296%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854c1117ff74dad36a0dd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6295-sql-injection-in-code-projects-hoste-6f53424f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6295%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854c1117ff74dad36a0dd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49715-cwe-359-exposure-of-private-persona-33914a2f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49715%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Dynamics%20365%20FastTrack%20Implementation&amp;severity=high&amp;id=6854b6887ff74dad36a0c1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6294-sql-injection-in-code-projects-hoste-1b6923df</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6294%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854b6887ff74dad36a0c1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48058-cwe-1333-inefficient-regular-expres-87a27850</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48058%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20powsybl%20powsybl-core&amp;severity=medium&amp;id=6854af7f7ff74dad36a0b066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6293-sql-injection-in-code-projects-hoste-39c1a7d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6293%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6854af7f7ff74dad36a0b073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6292-stack-based-buffer-overflow-in-d-lin-65470246</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6292%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=6854af7f7ff74dad36a0b06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6291-stack-based-buffer-overflow-in-d-lin-6d513f2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6291%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-825&amp;severity=high&amp;id=6854ac027ff74dad36a0a8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6288-cross-site-scripting-in-phpgurukul-b-cbf74a6d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6288%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Bus%20Pass%20Management%20System&amp;severity=medium&amp;id=6854ac027ff74dad36a0a8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortios-ssl-vpn-744-insufficient-session-expiratio-6d06a25d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FortiOS%20SSL-VPN%207.4.4%20-%20Insufficient%20Session%20Expiration%20%26%20Cookie%20Reuse&amp;severity=medium&amp;id=6856903f6504ee7903b59cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-excel-ltsc-2024-remote-code-execution-rc-726128fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Excel%20LTSC%202024%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6856903f6504ee7903b59ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ingress-nginx-4110-remote-code-execution-rce-9b9304d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ingress-NGINX%204.11.0%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=6856903f6504ee7903b59cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46179-na-a6e69e3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46179%3A%20n%2Fa&amp;severity=critical&amp;id=68568e87aded773421b5ac03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45331-na-61fc6904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45331%3A%20n%2Fa&amp;severity=high&amp;id=68568e83aded773421b5a97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44203-na-a837ec0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44203%3A%20n%2Fa&amp;severity=high&amp;id=68568e83aded773421b5a972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45890-na-72e8cde0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45890%3A%20n%2Fa&amp;severity=critical&amp;id=68568e83aded773421b5a92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44635-na-0eba1297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44635%3A%20n%2Fa&amp;severity=critical&amp;id=68568e83aded773421b5a926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46158-na-de587394</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46158%3A%20n%2Fa&amp;severity=medium&amp;id=68568e82aded773421b5a8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-20-f5ad52da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-20&amp;severity=medium&amp;id=68568e31aded773421b54db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32875-na-914126fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32875%3A%20n%2Fa&amp;severity=medium&amp;id=68556d5d7ff74dad36a66948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32880-na-c9409404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32880%3A%20n%2Fa&amp;severity=critical&amp;id=685569cf7ff74dad36a660e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32877-na-63303fb2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32877%3A%20n%2Fa&amp;severity=critical&amp;id=685569cf7ff74dad36a660e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48706-na-750915eb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48706%3A%20n%2Fa&amp;severity=critical&amp;id=685566507ff74dad36a65754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32879-na-88cb5065</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32879%3A%20n%2Fa&amp;severity=high&amp;id=685566507ff74dad36a6574f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32878-na-e06b0d87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32878%3A%20n%2Fa&amp;severity=critical&amp;id=685566507ff74dad36a6574a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48705-na-02d3306f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48705%3A%20n%2Fa&amp;severity=high&amp;id=685566507ff74dad36a65746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32876-na-06026477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32876%3A%20n%2Fa&amp;severity=medium&amp;id=685566507ff74dad36a65741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-file-creates-network-socket-and-contacts-62e84b9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20File%20Creates%20Network%20Socket%20and%20Contacts%20fdh32fsdfhs.shop%20-%20Kunai%20Analysis%20Report%20sample%20-%202d266ab2597c72424aa21bc00718f9a13e5836e8&amp;severity=low&amp;id=685538917ff74dad36a5c34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47771-cwe-502-deserialization-of-untruste-9bed96c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47771%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20powsybl%20powsybl-core&amp;severity=high&amp;id=6854a16d7ff74dad36a08d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6287-cross-site-scripting-in-phpgurukul-c-e00b5c18</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6287%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=6854a16d7ff74dad36a08d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6286-open-redirect-in-phpgurukul-covid19--a0d2f3f4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6286%3A%20Open%20Redirect%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=6859ad500112634db7041073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6285-cross-site-scripting-in-phpgurukul-c-e7c2ec31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6285%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=6859ad500112634db704106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6284-cross-site-request-forgery-in-phpgur-cfdcc979</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6284%3A%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20Car%20Rental%20Portal&amp;severity=medium&amp;id=6854935d7ff74dad36a08217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6283-path-traversal-in-xataio-xata-agent-c9809e5c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6283%3A%20Path%20Traversal%20in%20xataio%20Xata%20Agent&amp;severity=medium&amp;id=6854935d7ff74dad36a0820e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/part-2-tracking-lummac2-infrastructure-2f7e4cc8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Part%202%3A%20Tracking%20LummaC2%20Infrastructure&amp;severity=medium&amp;id=68551c777ff74dad36a1ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-github-malware-campaign-targets-devs-a3f32394</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20GitHub%20Malware%20Campaign%20Targets%20Devs&amp;severity=medium&amp;id=68551ffb7ff74dad36a1fbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/frida-1720-released-3ae9d444</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Frida%2017.2.0%20Released&amp;severity=medium&amp;id=68548fdb7ff74dad36a07f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6282-path-traversal-in-xlang-ai-openagent-695801f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6282%3A%20Path%20Traversal%20in%20xlang-ai%20OpenAgents&amp;severity=medium&amp;id=68548c5b7ff74dad36a07cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47293-cwe-611-improper-restriction-of-xml-7d234607</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47293%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20powsybl%20powsybl-core&amp;severity=low&amp;id=6854854d7ff74dad36a07533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6281-path-traversal-in-openbmb-xagent-49053841</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6281%3A%20Path%20Traversal%20in%20OpenBMB%20XAgent&amp;severity=medium&amp;id=6854854d7ff74dad36a07538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6280-path-traversal-in-transformeroptimus-8f93f2ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6280%3A%20Path%20Traversal%20in%20TransformerOptimus%20SuperAGI&amp;severity=medium&amp;id=685481c97ff74dad36a06f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6279-deserialization-in-upsonic-e185a3e9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6279%3A%20Deserialization%20in%20Upsonic&amp;severity=medium&amp;id=6859ad500112634db7041067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6278-path-traversal-in-upsonic-6bc6a6cf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6278%3A%20Path%20Traversal%20in%20Upsonic&amp;severity=medium&amp;id=6859ad500112634db7041061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6277-sql-injection-in-brilliance-golden-l-6625de82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6277%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=6859ad500112634db704105b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6276-sql-injection-in-brilliance-golden-l-c309ce5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6276%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=685470367ff74dad36a05d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/banana-squad-spotted-hiding-data-stealing-malware--7b6baf6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Banana%20Squad%20Spotted%20Hiding%20Data-Stealing%20Malware%20in%20Fake%20GitHub%20Repositories&amp;severity=medium&amp;id=685465b9cd4c45acbcc1d19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6275-use-after-free-in-webassembly-wabt-b093dbef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6275%3A%20Use%20After%20Free%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=68546823568348440d477460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-android-malware-surge-hits-devices-via-overlay-40dc1e3d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Android%20Malware%20Surge%20Hits%20Devices%20via%20Overlays%2C%20Virtualization%20Fraud%20and%20NFC%20Theft&amp;severity=high&amp;id=685465b9cd4c45acbcc1d18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-group-salt-typhoon-breached-satellite-074fcd9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20group%20Salt%20Typhoon%20breached%20satellite%20firm%20Viasat&amp;severity=medium&amp;id=685465b9cd4c45acbcc1d195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/antidot-android-malware-analysis-193c31b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AntiDot%20Android%20Malware%20Analysis&amp;severity=medium&amp;id=6854621b33c7acc0460e0d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6274-resource-consumption-in-webassembly--dbe81acc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6274%3A%20Resource%20Consumption%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=6854621833c7acc0460e0d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6273-reachable-assertion-in-webassembly-w-dcb3e516</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6273%3A%20Reachable%20Assertion%20in%20WebAssembly%20wabt&amp;severity=medium&amp;id=68545b1033c7acc0460e0713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6272-out-of-bounds-write-in-wasm3-ace429e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6272%3A%20Out-of-bounds%20Write%20in%20wasm3&amp;severity=medium&amp;id=6854540a33c7acc0460e005e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6271-out-of-bounds-read-in-swftools-886f0881</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6271%3A%20Out-of-Bounds%20Read%20in%20swftools&amp;severity=medium&amp;id=68544d0033c7acc0460ded47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33117-cwe-73-external-control-of-file-nam-d7345312</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33117%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IBM%20QRadar%20SIEM&amp;severity=critical&amp;id=6854498033c7acc0460de96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33121-cwe-611-improper-restriction-of-xml-33da9611</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33121%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20QRadar%20SIEM&amp;severity=high&amp;id=6854498033c7acc0460de96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36050-cwe-532-insertion-of-sensitive-info-2720fb8d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36050%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20QRadar%20SIEM&amp;severity=medium&amp;id=6854498033c7acc0460de970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-banana-squad-exploits-github-repos-in-ee4d9242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20actor%20Banana%20Squad%20exploits%20GitHub%20repos%20in%20new%20campaign&amp;severity=medium&amp;id=685465e2cd4c45acbcc20a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6270-heap-based-buffer-overflow-in-hdf5-928e6743</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6270%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=68543ef033c7acc0460dde8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50200-cwe-532-insertion-of-sensitive-info-d8be2983</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50200%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20rabbitmq%20rabbitmq-server&amp;severity=medium&amp;id=68543b7133c7acc0460d50da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6269-heap-based-buffer-overflow-in-hdf5-8b7cd05f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6269%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=685437e933c7acc0460cff73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scammers-insert-fake-support-numbers-on-real-apple-4650de02</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scammers%20Insert%20Fake%20Support%20Numbers%20on%20Real%20Apple%2C%20Netflix%2C%20PayPal%20Pages&amp;severity=medium&amp;id=6854346b33c7acc0460ccf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52464-cwe-331-insufficient-entropy-in-mes-46179923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52464%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20meshtastic%20firmware&amp;severity=critical&amp;id=68542d5c33c7acc0460c8093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49014-cwe-416-use-after-free-in-jqlang-jq-8cabedb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49014%3A%20CWE-416%3A%20Use%20After%20Free%20in%20jqlang%20jq&amp;severity=medium&amp;id=685429df33c7acc0460c31b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6268-cross-site-scripting-in-luna-imaging-cd4682d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6268%3A%20Cross%20Site%20Scripting%20in%20Luna%20Imaging&amp;severity=medium&amp;id=6854265433c7acc0460c0def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48886-cwe-755-improper-handling-of-except-119e1f51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48886%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20cardano-scaling%20hydra&amp;severity=medium&amp;id=68541f4c33c7acc0460adad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6267-sql-injection-in-zhilink-adp-applica-0cc1c002</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6267%3A%20SQL%20Injection%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=68541bce33c7acc0460ac8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4738-cwe-89-improper-neutralization-of-sp-d61f2a21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4738%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yirmibes%20Software%20MY%20ERP&amp;severity=critical&amp;id=685562cd7ff74dad36a649e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/n-korean-hackers-deploy-new-pylangghost-malware-in-f004b213</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=N.%20Korean%20Hackers%20Deploy%20New%20PylangGhost%20Malware%20in%20Fake%20Crypto%20and%20Blockchain%20Job%20Interviews&amp;severity=medium&amp;id=6853ffa533c7acc04609878a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6266-unrestricted-upload-in-flir-ax8-59ac1a88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6266%3A%20Unrestricted%20Upload%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=6853ffb833c7acc0460987d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/krispy-kreme-says-november-data-breach-impacts-ove-f4290d58</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Krispy%20Kreme%20says%20November%20data%20breach%20impacts%20over%20160%2C000%20people&amp;severity=high&amp;id=6853fc2033c7acc046098369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6019-execution-with-unnecessary-privilege-ac1420c6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6019%3A%20Execution%20with%20Unnecessary%20Privileges&amp;severity=high&amp;id=6853fc3233c7acc046098387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32896-cwe-306-missing-authentication-for--4fa64592</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32896%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Apache%20Software%20Foundation%20Apache%20SeaTunnel&amp;severity=medium&amp;id=6853ea8e33c7acc046092662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-apt29-exploits-gmail-app-passwords-to-bypa-4df8c115</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20APT29%20Exploits%20Gmail%20App%20Passwords%20to%20Bypass%202FA%20in%20Targeted%20Phishing%20Campaign&amp;severity=high&amp;id=6853e38433c7acc046092042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31698-cwe-284-improper-access-control-in--6be450d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31698%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=6853e39333c7acc046092090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49763-cwe-400-uncontrolled-resource-consu-8c157133</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49763%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=6853e39333c7acc046092093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5234-cwe-79-improper-neutralization-of-in-402e4ef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5234%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20News%20%E2%80%93%20%20Advanced%20News%20Magazine%20Blog%20Gutenberg%20Blocks%20Addons&amp;severity=medium&amp;id=6853dc7f33c7acc046090eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5071-cwe-863-incorrect-authorization-in-t-1d7ba375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5071%3A%20CWE-863%20Incorrect%20Authorization%20in%20tigroumeow%20AI%20Engine&amp;severity=high&amp;id=6853dc7f33c7acc046090eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pro-israel-hackers-hit-irans-nobitex-exchange-burn-cf1313f2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pro-Israel%20hackers%20hit%20Iran&apos;s%20Nobitex%20exchange%2C%20burn%20%2490M%20in%20crypto&amp;severity=high&amp;id=6853c76633c7acc04608de12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ryuk-ransomwares-initial-access-expert-extradited--29655678</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ryuk%20ransomware%E2%80%99s%20initial%20access%20expert%20extradited%20to%20the%20U.S.&amp;severity=high&amp;id=6853c76633c7acc04608de0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-bluenoroff-web3-macos-intrusion-analysi-d519d9ae</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20BlueNoroff%20Web3%20macOS%20Intrusion%20Analysis&amp;severity=medium&amp;id=685465e2cd4c45acbcc20b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4965-cwe-79-improper-neutralization-of-in-99166ac9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPBakery%20Page%20Builder%20for%20WordPress&amp;severity=medium&amp;id=6853b5d433c7acc04608c993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4571-cwe-862-missing-authorization-in-giv-05fa42a3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4571%3A%20CWE-862%20Missing%20Authorization%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=6853b5d433c7acc04608c988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sleepless-strings-template-injection-in-insomnia-90397598</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sleepless%20Strings%20-%20Template%20Injection%20in%20Insomnia&amp;severity=medium&amp;id=6853b25333c7acc04608c64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5490-cwe-79-improper-neutralization-of-in-8326dbc9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antoineh%20Football%20Pool&amp;severity=medium&amp;id=6853a44633c7acc046086d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52474-cwe-89-improper-neutralization-of-s-b6419cbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52474%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68538ba433c7acc0460837fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4479-cwe-79-improper-neutralization-of-in-be5c9d92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=68538ba433c7acc0460837f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4367-cwe-80-improper-neutralization-of-sc-ca50cba3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4367%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=68538ba433c7acc0460837eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50201-cwe-78-improper-neutralization-of-s-d4644ecc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50201%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68538ba433c7acc0460837f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52467-cwe-200-exposure-of-sensitive-infor-bf5a2f18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52467%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20timescale%20pgai&amp;severity=critical&amp;id=6853811e33c7acc046082f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4661-cwe-22-improper-limitation-of-a-path-35957482</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=6853768c33c7acc046081e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50183-cwe-79-improper-neutralization-of-i-aa13aad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenListTeam%20OpenList&amp;severity=medium&amp;id=6853768c33c7acc046081e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6201-cwe-79-improper-neutralization-of-in-497d2686</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alekv%20Pixel%20Manager%20for%20WooCommerce%20%E2%80%93%20Track%20Conversions%20and%20Analytics%2C%20Google%20Ads%2C%20TikTok%20and%20more&amp;severity=medium&amp;id=6853768c33c7acc046081e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-a-malicious-wordpress-plugin-the-cover-728d4075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20a%20Malicious%20WordPress%20Plugin%3A%20The%20Covert%20Redirector&amp;severity=medium&amp;id=6854621733c7acc0460e0d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-19-40e9b185</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-19&amp;severity=medium&amp;id=6854a8677ff74dad36a093fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whats-in-an-asp-creative-phishing-attack-on-promin-654aa8c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What&apos;s%20in%20an%20ASP%3F%20Creative%20Phishing%20Attack%20on%20Prominent%20Academics%20and%20Critics%20of%20Russia&amp;severity=medium&amp;id=6854621733c7acc0460e0d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24288-vulnerability-in-versa-director-5ce1cb7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24288%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=critical&amp;id=68534fe133c7acc04607dd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24291-vulnerability-in-versa-director-6316f288</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24291%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23171-vulnerability-in-versa-director-99f94689</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23171%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=high&amp;id=68534fe133c7acc04607dd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23168-vulnerability-in-versa-director-1d2c5b3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23168%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24286-vulnerability-in-veeam-backup-and-r-c3be02c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24286%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=high&amp;id=68534fe133c7acc04607dd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23172-vulnerability-in-versa-director-8e4c6627</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23172%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=high&amp;id=68534fe133c7acc04607dd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23173-vulnerability-in-versa-director-7f67aef3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23173%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=high&amp;id=68534fe133c7acc04607dd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23169-vulnerability-in-versa-director-3be428d5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23169%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23170-vulnerability-in-versa-director-ee62e9d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23170%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68534fe133c7acc04607dd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23121-vulnerability-in-veeam-backup-and-r-3bbfd184</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23121%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20Recovery&amp;severity=critical&amp;id=68534fe133c7acc04607dd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24287-vulnerability-in-veeam-backup-for-m-09e4f379</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24287%3A%20Vulnerability%20in%20Veeam%20Backup%20for%20Microsoft%20Windows&amp;severity=medium&amp;id=68534fe133c7acc04607dd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/godfather-android-malware-runs-real-apps-in-a-sand-75476f67</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GodFather%20Android%20Malware%20Runs%20Real%20Apps%20in%20a%20Sandbox%20to%20Steal%20Data&amp;severity=medium&amp;id=6853179f33c7acc046074e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-jitter-trap-how-randomness-betrays-the-evasive-69bfd4c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Jitter-Trap%3A%20How%20Randomness%20Betrays%20the%20Evasive&amp;severity=medium&amp;id=685317ad33c7acc046075019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6192-use-after-free-in-google-chrome-11e3289c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6192%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6853060c33c7acc0460697a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6191-integer-overflow-in-google-chrome-ed8a6559</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6191%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=6853060c33c7acc04606979e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/may-2025-infostealer-trend-report-c04855dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=May%202025%20Infostealer%20Trend%20Report&amp;severity=medium&amp;id=685317a933c7acc046074f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/may-2025-apt-group-trends-south-korea-3efa6352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=May%202025%20APT%20Group%20Trends%20(South%20Korea)&amp;severity=medium&amp;id=685317a933c7acc046074f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warning-against-distribution-of-malware-disguised--7e7fdf81</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warning%20Against%20Distribution%20of%20Malware%20Disguised%20as%20Research%20Papers&amp;severity=medium&amp;id=685317a933c7acc046074f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/masslogger-fileless-variant-spreads-via-vbe-hides--27bb3b38</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Masslogger%20Fileless%20Variant%20%E2%80%93%20Spreads%20via%20.VBE%2C%20Hides%20in%20Registry&amp;severity=medium&amp;id=685317a933c7acc046074f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/famous-chollima-deploying-python-version-of-golang-a4a57714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Famous%20Chollima%20deploying%20Python%20version%20of%20GolangGhost%20RAT&amp;severity=medium&amp;id=685317a933c7acc046074f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amatera-stealer-rebranded-acr-stealer-with-improve-e1b835e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Amatera%20Stealer%3A%20Rebranded%20ACR%20Stealer%20With%20Improved%20Evasion%2C%20Sophistication&amp;severity=medium&amp;id=685317a933c7acc046074fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20260-heap-based-buffer-overflow-in-cisco-d5e50408</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20260%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20ClamAV&amp;severity=critical&amp;id=6852f7fe33c7acc046eeac18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20271-use-of-uninitialized-variable-in-ci-1088b793</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20271%3A%20Use%20of%20Uninitialized%20Variable%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=high&amp;id=6852f0f433c7acc046ee349f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-minecraft-mods-distributed-by-the-stargazers--cfd0ba92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Minecraft%20mods%20distributed%20by%20the%20Stargazers%20Ghost%20Network%20to%20steal%20gamers%E2%80%99%20data&amp;severity=medium&amp;id=685317a933c7acc046074fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/healthcare-saas-firm-says-data-breach-impacts-54-m-a86dca60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Healthcare%20SaaS%20firm%20says%20data%20breach%20impacts%205.4%20million%20patients&amp;severity=high&amp;id=6852e9ea33c7acc046ee2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chainlink-phishing-how-trusted-domains-become-thre-0ed51b53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChainLink%20Phishing%3A%20How%20Trusted%20Domains%20Become%20Threat%20Vectors&amp;severity=high&amp;id=6852e9ea33c7acc046ee295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/agentsmith-flaw-in-langsmiths-prompt-hub-exposed-u-f57989a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AgentSmith%20Flaw%20in%20LangSmith&apos;s%20Prompt%20Hub%20Exposed%20User%20API%20Keys%2C%20Data&amp;severity=medium&amp;id=6852e9ea33c7acc046ee295f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/1500-minecraft-players-infected-by-java-malware-ma-5bd8f29d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=1%2C500%2B%20Minecraft%20Players%20Infected%20by%20Java%20Malware%20Masquerading%20as%20Game%20Mods%20on%20GitHub&amp;severity=high&amp;id=6852e9ea33c7acc046ee2957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1349-cwe-79-improper-neutralization-of-in-87def923</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6852ea2433c7acc046ee29cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20234-out-of-bounds-read-in-cisco-cisco-s-79f873d4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20234%3A%20Out-of-bounds%20Read%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=6852ea2433c7acc046ee29cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1348-cwe-525-information-exposure-through-65af6518</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1348%3A%20CWE-525%20Information%20Exposure%20Through%20Browser%20Caching%20in%20IBM%20Sterling%20B2B%20Integrator&amp;severity=medium&amp;id=6852ea2433c7acc046ee29c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36049-cwe-611-improper-restriction-of-xml-8f0a4089</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36049%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=high&amp;id=6852e66833c7acc046ee2427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36048-cwe-250-execution-with-unnecessary--1474de18</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36048%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20webMethods%20Integration%20Server&amp;severity=high&amp;id=6852e66833c7acc046ee2424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4821-cwe-770-allocation-of-resources-with-10328e5e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4821%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cloudflare%20quiche&amp;severity=high&amp;id=6852e2e433c7acc046ee1f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4820-cwe-770-allocation-of-resources-with-c95e1372</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4820%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Cloudflare%20quiche&amp;severity=medium&amp;id=6852e2e433c7acc046ee1f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/palo-alto-networks-cortex-xdr-agent-86-eol-details-3680c75a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Palo%20Alto%20Networks%20Cortex%20XDR%20Agent%208.6%20EOL%20Details%20and%20Dates&amp;severity=medium&amp;id=6852cdc933c7acc046ee04a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/she-won-they-didnt-just-change-the-machines-they-r-a31b9f24</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=She%20Won.%20They%20Didn&apos;t%20Just%20Change%20the%20Machines.%20They%20Rewired%20the%20Election.&amp;severity=low&amp;id=6852b964a8c9212743885d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/news-flodrix-botnet-targets-vulnerable-langflow-se-e529e989</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=News%20Flodrix%20botnet%20targets%20vulnerable%20Langflow%20servers&amp;severity=medium&amp;id=6852b5daa8c921274388552c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/githubs-dark-side-unveiling-malware-disguised-as-c-936dc5cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub&apos;s%20Dark%20Side%3A%20Unveiling%20Malware%20Disguised%20as%20Cracks%2C%20Hacks%2C%20and%20Crypto%20Tools&amp;severity=medium&amp;id=6852b5e8a8c92127438856e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-clickfix-deception-to-information-stealer-dep-05e2c27b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20ClickFix%20deception%20to%20information%20stealer%20deployment&amp;severity=medium&amp;id=6852b258a8c921274388513e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-linux-udisks-flaw-lets-attackers-get-root-on-m-050cce80</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Linux%20udisks%20flaw%20lets%20attackers%20get%20root%20on%20major%20Linux%20distros&amp;severity=high&amp;id=6852ab4fa8c92127438848b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-group-qilin-offers-legal-counsel-to-aff-e96b2230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Group%20Qilin%20Offers%20Legal%20Counsel%20to%20Affiliates&amp;severity=high&amp;id=6852ab4fa8c92127438848b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wormgpt-makes-a-comeback-using-jailbroken-grok-and-a66a24e4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WormGPT%20Makes%20a%20Comeback%20Using%20Jailbroken%20Grok%20and%20Mixtral%20Models&amp;severity=medium&amp;id=6852ab4fa8c92127438848ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6220-cwe-434-unrestricted-upload-of-file--5c65438a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6220%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themefic%20Ultra%20Addons%20for%20Contact%20Form%207&amp;severity=high&amp;id=6852a447a8c921274388360b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38073-f09947a3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38073&amp;severity=null&amp;id=695843a1db813ff03e04a568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38046-94f624cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38046&amp;severity=low&amp;id=6852a447a8c9212743883614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38030-604dc83a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38030&amp;severity=low&amp;id=685406af33c7acc04609901d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38026-2f6af660</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38026&amp;severity=low&amp;id=6852a447a8c9212743883612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23999-cwe-862-missing-authorization-in-cl-6a26002d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23999%3A%20Missing%20Authorization%20in%20Cloudways%20Breeze&amp;severity=null&amp;id=6852882da8c921274387fa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5237-cwe-79-improper-neutralization-of-in-ab6d362e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sovica%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=6852882da8c921274387fa37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6086-cwe-434-unrestricted-upload-of-file--380f492c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6086%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20scottyla%20CSV%20Me&amp;severity=high&amp;id=6852882da8c921274387fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iran-slows-internet-to-prevent-cyber-attacks-amid--45c7c8ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iran%20Slows%20Internet%20to%20Prevent%20Cyber%20Attacks%20Amid%20Escalating%20Regional%20Conflict&amp;severity=high&amp;id=68528120a8c921274387a474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ex-cia-analyst-sentenced-to-37-months-for-leaking--15899a50</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ex-CIA%20Analyst%20Sentenced%20to%2037%20Months%20for%20Leaking%20Top%20Secret%20National%20Defense%20Documents&amp;severity=high&amp;id=68528120a8c921274387a478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-active-exploitation-of-linux-kernel--b5956fbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20Warns%20of%20Active%20Exploitation%20of%20Linux%20Kernel%20Privilege%20Escalation%20Vulnerability&amp;severity=high&amp;id=68528120a8c921274387a46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asana-warns-mcp-ai-feature-exposed-customer-data-t-5d541488</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Asana%20warns%20MCP%20AI%20feature%20exposed%20customer%20data%20to%20other%20orgs&amp;severity=high&amp;id=68528120a8c921274387a470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5981-cwe-427-uncontrolled-search-path-ele-228e6582</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5981%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Google%20osv-scalibr&amp;severity=medium&amp;id=68527d9ba8c9212743879169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fault-injection-follow-the-white-rabbit-dce25888</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fault%20Injection%20-%20Follow%20the%20White%20Rabbit&amp;severity=medium&amp;id=68527a1aa8c9212743878746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1562-cwe-862-missing-authorization-in-ama-63f82cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1562%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=68526c07a8c92127438728d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4955-cwe-79-cross-site-scripting-xss-in-t-b89273f8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4955%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20tarteaucitron.io&amp;severity=medium&amp;id=685256f0a8c921274386f544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-51381-authentication-bypass-using-an-alte-fab2c209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-51381%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20KAON%20KCM3100&amp;severity=critical&amp;id=685241d9a8c921274386ca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50202-cwe-22-improper-limitation-of-a-pat-4d3ab3eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50202%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LycheeOrg%20Lychee&amp;severity=high&amp;id=68523e53a8c921274386c67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4413-cwe-434-unrestricted-upload-of-file--914197fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4413%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20byrev%20Pixabay%20Images&amp;severity=high&amp;id=685225b7a8c9212743869f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23252-cwe-1244-in-nvidia-nvdebug-tool-1594eb04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23252%3A%20CWE-1244%20in%20NVIDIA%20NVDebug%20tool&amp;severity=medium&amp;id=68520d1fa8c921274386646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-18-bf849e3a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-18&amp;severity=medium&amp;id=685356d833c7acc04607f195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26199-na-6f77c254</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26199%3A%20n%2Fa&amp;severity=critical&amp;id=6853141e33c7acc0460738e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29646-na-2c5d74d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29646%3A%20n%2Fa&amp;severity=high&amp;id=6852ff0433c7acc046ffa85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26198-na-6726a886</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26198%3A%20n%2Fa&amp;severity=critical&amp;id=6852ff0433c7acc046ffa859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44952-na-2dbae36c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44952%3A%20n%2Fa&amp;severity=high&amp;id=6852df6133c7acc046ee1a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44951-na-3636d1a0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44951%3A%20n%2Fa&amp;severity=high&amp;id=6852df6133c7acc046ee1a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46109-na-01d08cfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46109%3A%20n%2Fa&amp;severity=high&amp;id=6852d85c33c7acc046ee1194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45786-na-a9e014c3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45786%3A%20n%2Fa&amp;severity=high&amp;id=6852cddb33c7acc046ee04cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49015-na-3146d551</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49015%3A%20n%2Fa&amp;severity=medium&amp;id=6852ca4933c7acc046edf9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45784-na-a7f38720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45784%3A%20n%2Fa&amp;severity=critical&amp;id=6852ca4933c7acc046edf9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45661-na-f4edb76b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45661%3A%20n%2Fa&amp;severity=medium&amp;id=6852c638fc49f9a2b3311854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46157-na-433399d7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46157%3A%20n%2Fa&amp;severity=critical&amp;id=6852c3eea8c921274388802f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49149-cwe-79-improper-neutralization-of-i-7c2dcbd4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49149%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20langgenius%20dify&amp;severity=medium&amp;id=6851f0fba8c921274386456b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wallet-apps-arent-safe-either-heres-how-attackers--7a275cbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wallet%20apps%20aren%E2%80%99t%20safe%20either%20%E2%80%94%20here%E2%80%99s%20how%20attackers%20exploit%20their%20flawed%20security%20models&amp;severity=high&amp;id=6851e9f5a8c9212743863f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49825-cwe-863-incorrect-authorization-in--8c575009</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49825%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20gravitational%20teleport&amp;severity=critical&amp;id=6851e2eba8c92127438638f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scattered-spider-aims-at-us-insurers-after-uk-reta-99e4a1c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scattered%20Spider%20Aims%20at%20US%20Insurers%20After%20UK%20Retail%20Hit%2C%20Google%20Warns&amp;severity=medium&amp;id=6851d85da8c9212743862eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49385-cwe-64-windows-shortcut-following-i-fc25183a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49385%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Internet%20Security%20(Consumer)&amp;severity=high&amp;id=6851d4dea8c9212743862bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49384-cwe-64-windows-shortcut-following-i-62849730</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49384%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Internet%20Security%20(Consumer)&amp;severity=high&amp;id=6851d4dea8c9212743862bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49824-cwe-200-exposure-of-sensitive-infor-e56603df</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49824%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20conda-forge%20conda-smithy&amp;severity=low&amp;id=6851d4dea8c9212743862bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49843-cwe-276-incorrect-default-permissio-ff9680e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49843%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20conda-forge%20conda-smithy&amp;severity=low&amp;id=6851d4dea8c9212743862bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asyncrat-campaign-continues-to-evade-endpoint-dete-d871818c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AsyncRAT%20Campaign%20Continues%20to%20Evade%20Endpoint%20Detection&amp;severity=medium&amp;id=6852a447a8c92127438835da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48443-cwe-64-windows-shortcut-following-i-53922f54</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48443%3A%20CWE-64%3A%20Windows%20Shortcut%20Following%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Password%20Manager&amp;severity=medium&amp;id=6851d4dea8c9212743862bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/scania-confirms-insurance-claim-data-breach-in-ext-6809d0e3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Scania%20confirms%20insurance%20claim%20data%20breach%20in%20extortion%20attempt&amp;severity=high&amp;id=6851d154a8c9212743862812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49218-cwe-89-sql-injection-in-trend-micro-50cf7049</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49218%3A%20CWE-89%3A%20SQL%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851d172a8c9212743862867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49217-cwe-477-use-of-obsolete-function-in-c1d52bfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49217%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c9212743862863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49216-cwe-477-use-of-obsolete-function-in-e15d856f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49216%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c921274386285f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49215-cwe-242-use-of-inherently-dangerous-700c96e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49215%3A%20CWE-242%3A%20Use%20of%20Inherently%20Dangerous%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851d172a8c921274386285b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49214-cwe-477-use-of-obsolete-function-in-a0219b59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49214%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851d172a8c9212743862857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49213-cwe-477-use-of-obsolete-function-in-c4a1962a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49213%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c9212743862853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49212-cwe-477-use-of-obsolete-function-in-27026209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49212%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=critical&amp;id=6851d172a8c921274386284f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41388-cwe-121-stack-based-buffer-overflow-35eeccc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41388%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Smart%20Editor&amp;severity=high&amp;id=6851d172a8c9212743862849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41413-cwe-787-out-of-bounds-write-in-fuji-f7c0d797</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41413%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Smart%20Editor&amp;severity=high&amp;id=6851d172a8c921274386284c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32412-cwe-125-out-of-bounds-read-in-fuji--5993cce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32412%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Fuji%20Electric%20Smart%20Editor&amp;severity=high&amp;id=6851cdd1a8c9212743862506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49211-cwe-89-sql-injection-in-trend-micro-e7c82aff</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49211%3A%20CWE-89%3A%20SQL%20Injection%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Policy%20Server&amp;severity=high&amp;id=6851cdd1a8c9212743862509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30642-cwe-59-improper-link-resolution-bef-8f9aed8e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30642%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Deep%20Security&amp;severity=medium&amp;id=6851cdd1a8c9212743862502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30641-cwe-59-improper-link-resolution-bef-b4787ab2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30641%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Deep%20Security&amp;severity=high&amp;id=6851cdd1a8c92127438624fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30640-cwe-59-improper-link-resolution-bef-2ea005e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30640%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Deep%20Security&amp;severity=high&amp;id=6851cdd1a8c92127438624fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49847-cwe-119-improper-restriction-of-ope-5d0684f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49847%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ggml-org%20llama.cpp&amp;severity=high&amp;id=6851cdd1a8c921274386250d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30680-cwe-918-ssrf-in-trend-micro-inc-tre-44055e44</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30680%3A%20CWE-918%3A%20SSRF%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6851ca4da8c92127438621d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30679-cwe-918-ssrf-in-trend-micro-inc-tre-37b6f5ca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30679%3A%20CWE-918%3A%20SSRF%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6851ca4da8c92127438621cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30678-cwe-918-ssrf-in-trend-micro-inc-tre-2e73aab1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30678%3A%20CWE-918%3A%20SSRF%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6851ca4da8c92127438621c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5141-cwe-524-use-of-cache-containing-sens-f2252291</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5141%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20Fortra%20Core%20Privileged%20Access%20Manager%20(BoKS)&amp;severity=medium&amp;id=6851c6c9a8c9212743861d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34511-cwe-434-unrestricted-upload-of-file-f6108af7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34511%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sitecore%20Powershell%20Extension&amp;severity=high&amp;id=6851bfc2a8c9212743861748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34510-cwe-23-relative-path-traversal-in-s-9e99ca80</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34510%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Sitecore%20Experience%20Manager&amp;severity=high&amp;id=6851bc3da8c921274386138d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49487-cwe-427-uncontrolled-search-path-el-caae248e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49487%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Worry-Free%20Business%20Security%20Services&amp;severity=medium&amp;id=6851b8bca8c921274386108f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49158-cwe-427-uncontrolled-search-path-el-941f4e8d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49158%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=medium&amp;id=6851b8bca8c921274386108b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49157-cwe-269-improper-privilege-manageme-ba4c34dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49157%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c9212743861087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49156-cwe-269-improper-privilege-manageme-3f4bb568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49156%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c9212743861083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49155-cwe-427-uncontrolled-search-path-el-9a20e456</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49155%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c921274386107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49154-cwe-284-improper-access-control-in--f144b002</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49154%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6851b8bca8c921274386107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49850-cwe-122-heap-based-buffer-overflow--39b65947</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49850%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20LS%20Electric%20GMWin%204&amp;severity=high&amp;id=6851b8bca8c9212743861099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49849-cwe-125-out-of-bounds-read-in-ls-el-6169f64d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49849%3A%20CWE-125%20Out-of-bounds%20Read%20in%20LS%20Electric%20GMWin%204&amp;severity=high&amp;id=6851b8bca8c9212743861096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49848-cwe-787-out-of-bounds-write-in-ls-e-9917131c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49848%3A%20CWE-787%20Out-of-bounds%20Write%20in%20LS%20Electric%20GMWin%204&amp;severity=high&amp;id=6851b8bca8c9212743861093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34509-cwe-798-use-of-hard-coded-credentia-cdb3eb4c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34509%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Sitecore%20Experience%20Manager&amp;severity=high&amp;id=6851b53ba8c9212743860ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49220-cwe-477-use-of-obsolete-function-in-e3f981fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49220%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=6851aaa9a8c9212743860204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49219-cwe-477-use-of-obsolete-function-in-73110187</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49219%3A%20CWE-477%3A%20Use%20of%20Obsolete%20Function%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=critical&amp;id=6851aaa9a8c9212743860200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47867-cwe-74-improper-neutralization-of-s-019ff740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47867%3A%20CWE-74%3A%20%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6851aaa9a8c92127438601fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47866-cwe-475-undefined-behavior-for-inpu-fbd55328</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47866%3A%20CWE-475%3A%20Undefined%20Behavior%20for%20Input%20to%20API%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6851aaa9a8c92127438601f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47865-cwe-475-undefined-behavior-for-inpu-969b4d84</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47865%3A%20CWE-475%3A%20Undefined%20Behavior%20for%20Input%20to%20API%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6851aaa9a8c92127438601f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33122-cwe-427-uncontrolled-search-path-el-404d08a5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33122%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element&amp;severity=high&amp;id=6851a3a1a8c921274385fb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacklink-market-linked-to-seo-poisoning-attacks-in-8c2bf282</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacklink%20Market%20Linked%20to%20SEO%20Poisoning%20Attacks%20in%20Google%20Results&amp;severity=medium&amp;id=68519c97a8c921274385f548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34508-another-file-sharing-application-an-c89d6583</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34508%3A%20Another%20File%20Sharing%20Application%2C%20Another%20Path%20Traversal&amp;severity=medium&amp;id=6851878da8c921274385dfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48111-cwe-352-cross-site-request-forgery--a97f3f4f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48111%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20YITHEMES%20YITH%20PayPal%20Express%20Checkout%20for%20WooCommerce&amp;severity=medium&amp;id=68518788a8c921274385defb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48333-cwe-79-improper-neutralization-of-i-3e03207c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPQuark%20eForm%20-%20WordPress%20Form%20Builder&amp;severity=null&amp;id=68518789a8c921274385df11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49071-cwe-434-unrestricted-upload-of-file-ca0e2e98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49071%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NasaTheme%20Flozen&amp;severity=null&amp;id=68518789a8c921274385df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49451-cwe-35-path-traversal-in-yannisraft-f8cae88c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49451%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20yannisraft%20Aeroscroll%20Gallery%20%E2%80%93%20Infinite%20Scroll%20Image%20Gallery%20%26amp%3B%20Post%20Grid%20with%20Photo%20Gallery&amp;severity=null&amp;id=68518789a8c921274385df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49452-cwe-89-improper-neutralization-of-s-451bff9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49452%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Adrian%20Lad%C3%B3%20PostaPanduri&amp;severity=null&amp;id=68518789a8c921274385df6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49508-cwe-98-improper-control-of-filename-51c7cf0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20CozyStay&amp;severity=null&amp;id=68518789a8c921274385df71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24761-cwe-98-improper-control-of-filename-8d9385d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24761%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20DSK&amp;severity=null&amp;id=68518788a8c921274385debb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24773-cwe-89-improper-neutralization-of-s-20257c27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24773%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPCRM%20-%20CRM%20for%20Contact%20form%20CF7%20%26%20WooCommerce&amp;severity=null&amp;id=68518788a8c921274385debe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28972-cwe-89-improper-neutralization-of-s-e1ecd50e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Suhas%20Surse%20WP%20Employee%20Attendance%20System&amp;severity=null&amp;id=68518788a8c921274385dec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28991-cwe-98-improper-control-of-filename-75763142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28991%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Evon&amp;severity=null&amp;id=68518788a8c921274385dec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29002-cwe-98-improper-control-of-filename-1b779072</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29002%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Simen&amp;severity=null&amp;id=68518788a8c921274385dec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30562-cwe-89-improper-neutralization-of-s-4c04b2d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdistillery%20Navigation%20Tree%20Elementor&amp;severity=null&amp;id=68518788a8c921274385deca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30618-cwe-502-deserialization-of-untruste-4aa66cd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30618%3A%20Deserialization%20of%20Untrusted%20Data%20in%20yuliaz%20Rapyd%20Payment%20Extension%20for%20WooCommerce&amp;severity=null&amp;id=68518788a8c921274385decd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30988-cwe-79-improper-neutralization-of-i-9859c2c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30988%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20_CreativeMedia_%20Elite%20Video%20Player&amp;severity=null&amp;id=68518788a8c921274385ded0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31919-cwe-502-deserialization-of-untruste-aae09881</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31919%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Spare&amp;severity=critical&amp;id=68518788a8c921274385ded3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32510-cwe-434-unrestricted-upload-of-file-4b42e5df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32510%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ovatheme%20Ovatheme%20Events%20Manager&amp;severity=null&amp;id=68518788a8c921274385ded6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32549-cwe-98-improper-control-of-filename-f1f6a1d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32549%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mojoomla%20WPGYM&amp;severity=high&amp;id=68518788a8c921274385dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39479-cwe-89-improper-neutralization-of-s-58374bd3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartiolabs%20Smart%20Notification&amp;severity=critical&amp;id=68518788a8c921274385dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39486-cwe-89-improper-neutralization-of-s-293a94e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39486%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ValvePress%20Rankie&amp;severity=null&amp;id=68518788a8c921274385dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39508-cwe-79-improper-neutralization-of-i-6eac194d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=68518788a8c921274385deec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47452-cwe-434-unrestricted-upload-of-file-f03c4e81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47452%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RexTheme%20WP%20VR&amp;severity=null&amp;id=68518788a8c921274385deef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47559-cwe-434-unrestricted-upload-of-file-9848bfcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47559%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=68518788a8c921274385def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47572-cwe-98-improper-control-of-filename-f9c448ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47572%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=68518788a8c921274385def5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47573-cwe-89-improper-neutralization-of-s-3af61dcb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47573%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20School%20Management&amp;severity=critical&amp;id=68518788a8c921274385def8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48118-cwe-89-improper-neutralization-of-s-b09aa063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48118%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WpExperts%20Hub%20Woocommerce%20Partial%20Shipment&amp;severity=null&amp;id=68518788a8c921274385defe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48145-cwe-79-improper-neutralization-of-i-437b6441</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48145%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michal%20Jaworski%20Track%2C%20Analyze%20%26%20Optimize%20by%20WP%20Tao&amp;severity=null&amp;id=68518789a8c921274385df0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48274-cwe-89-improper-neutralization-of-s-6fefff62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48274%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=68518789a8c921274385df0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49234-cwe-862-missing-authorization-in-de-68a1154e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49234%3A%20Missing%20Authorization%20in%20Deepak%20anand%20WP%20Dummy%20Content%20Generator&amp;severity=null&amp;id=68518789a8c921274385df1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49251-cwe-98-improper-control-of-filename-5ecea245</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49251%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Fana&amp;severity=null&amp;id=68518789a8c921274385df1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49252-cwe-98-improper-control-of-filename-c812e516</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49252%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Besa&amp;severity=null&amp;id=68518789a8c921274385df21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49253-cwe-98-improper-control-of-filename-f2bf20ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49253%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Lasa&amp;severity=null&amp;id=68518789a8c921274385df24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49254-cwe-98-improper-control-of-filename-c2faae2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49254%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Nika&amp;severity=null&amp;id=68518789a8c921274385df27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49255-cwe-98-improper-control-of-filename-554711d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49255%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Ruza&amp;severity=null&amp;id=68518789a8c921274385df34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49256-cwe-98-improper-control-of-filename-5f9cd895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49256%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Sapa&amp;severity=null&amp;id=68518789a8c921274385df37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49257-cwe-98-improper-control-of-filename-f41d7799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49257%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Zota&amp;severity=null&amp;id=68518789a8c921274385df3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49258-cwe-98-improper-control-of-filename-a258bed0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49258%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Maia&amp;severity=null&amp;id=68518789a8c921274385df3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49259-cwe-98-improper-control-of-filename-4f632cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49259%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Hara&amp;severity=null&amp;id=68518789a8c921274385df40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49260-cwe-98-improper-control-of-filename-d7ae976c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49260%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Aora&amp;severity=null&amp;id=68518789a8c921274385df43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49261-cwe-98-improper-control-of-filename-ba8e9e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49261%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thembay%20Diza&amp;severity=null&amp;id=68518789a8c921274385df46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49266-cwe-79-improper-neutralization-of-i-d8db8715</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Ultimate%20Reviews&amp;severity=null&amp;id=68518789a8c921274385df49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49312-cwe-79-improper-neutralization-of-i-04565b1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeRevolution%20Echo%20RSS%20Feed%20Post%20Generator%20Plugin%20for%20WordPress&amp;severity=null&amp;id=68518789a8c921274385df4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49316-cwe-79-improper-neutralization-of-i-c1b0c32e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=68518789a8c921274385df4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49330-cwe-502-deserialization-of-untruste-84f7ff95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49330%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CRM%20Perks%20Integration%20for%20Contact%20Form%207%20and%20Zoho%20CRM%2C%20Bigin&amp;severity=null&amp;id=68518789a8c921274385df5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49331-cwe-502-deserialization-of-untruste-e4f0a3c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49331%3A%20Deserialization%20of%20Untrusted%20Data%20in%20impleCode%20eCommerce%20Product%20Catalog&amp;severity=null&amp;id=68518789a8c921274385df5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49854-cwe-89-improper-neutralization-of-s-777544ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49854%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Anh%20Tran%20Slim%20SEO&amp;severity=null&amp;id=68518789a8c921274385df74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49855-cwe-79-improper-neutralization-of-i-6d95f744</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meks%20Meks%20Flexible%20Shortcodes&amp;severity=null&amp;id=68518789a8c921274385df77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49856-cwe-352-cross-site-request-forgery--971e0e92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CyberChimps%20Responsive%20Plus&amp;severity=null&amp;id=6851878aa8c921274385df84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49857-cwe-862-missing-authorization-in-wp-e9a20936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49857%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=6851878aa8c921274385df87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49858-cwe-79-improper-neutralization-of-i-f866c793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=6851878aa8c921274385df8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49859-cwe-79-improper-neutralization-of-i-25aa8968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20etruel%20WP%20Views%20Counter&amp;severity=null&amp;id=6851878aa8c921274385df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49861-cwe-79-improper-neutralization-of-i-e30d33c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49861%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Timur%20Kamaev%20Kama%20Click%20Counter&amp;severity=null&amp;id=6851878aa8c921274385df90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49862-cwe-79-improper-neutralization-of-i-48378d89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49862%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motov.net%20Ebook%20Store&amp;severity=null&amp;id=6851878aa8c921274385df93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49863-cwe-79-improper-neutralization-of-i-71f2491a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20Advanced%20Sermons&amp;severity=null&amp;id=6851878aa8c921274385df96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49865-cwe-352-cross-site-request-forgery--23159cb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49865%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Helmut%20Wandl%20Advanced%20Settings&amp;severity=null&amp;id=6851878aa8c921274385df99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49868-cwe-601-url-redirection-to-untruste-371893a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49868%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Aman%20FunnelKit%20Automations&amp;severity=null&amp;id=6851878aa8c921274385df9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49871-cwe-79-improper-neutralization-of-i-3f42f198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noptin%20Newsletter%20Team%20Noptin&amp;severity=null&amp;id=6851878aa8c921274385df9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49872-cwe-862-missing-authorization-in-wp-6ffa707e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49872%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=6851878aa8c921274385dfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49874-cwe-862-missing-authorization-in-ty-746f8455</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49874%3A%20Missing%20Authorization%20in%20tychesoftwares%20Arconix%20FAQ&amp;severity=null&amp;id=6851878aa8c921274385dfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49875-cwe-79-improper-neutralization-of-i-4a5783d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20If-So%20Dynamic%20Content%20If-So%20Dynamic%20Content%20Personalization&amp;severity=null&amp;id=6851878aa8c921274385dfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49877-cwe-918-server-side-request-forgery-496818e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49877%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=6851878aa8c921274385dfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49878-cwe-79-improper-neutralization-of-i-d289347e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=6851878aa8c921274385dfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49879-cwe-22-improper-limitation-of-a-pat-0f76ab44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49879%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themezaa%20Litho&amp;severity=null&amp;id=6851878aa8c921274385dfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49880-cwe-862-missing-authorization-in-em-e8725e18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49880%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP%20Forms&amp;severity=null&amp;id=6851878aa8c921274385dfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49881-cwe-79-improper-neutralization-of-i-b23ca2b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=6851878aa8c921274385dfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49882-cwe-79-improper-neutralization-of-i-2d382e6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=6851878aa8c921274385dfc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49415-cwe-22-improper-limitation-of-a-pat-7047ccca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49415%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Fastw3b%20LLC%20FW%20Gallery&amp;severity=null&amp;id=68518789a8c921274385df62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49444-cwe-434-unrestricted-upload-of-file-bb8e8e55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49444%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20merkulove%20Reformer%20for%20Elementor&amp;severity=null&amp;id=68518789a8c921274385df65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49447-cwe-434-unrestricted-upload-of-file-8dac6a23</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49447%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Fastw3b%20LLC%20FW%20Food%20Menu&amp;severity=critical&amp;id=68518789a8c921274385df68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49180-integer-overflow-or-wraparound-in-r-4445a451</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49180%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20xwayland&amp;severity=high&amp;id=68518789a8c921274385df17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49179-integer-overflow-or-wraparound-in-r-0146a7bd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49179%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20xwayland&amp;severity=high&amp;id=685183fca8c921274385da59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49178-improper-locking-in-red-hat-red-hat-f5e32c02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49178%3A%20Improper%20Locking%20in%20X.Org%20xwayland&amp;severity=medium&amp;id=685183fca8c921274385da55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49177-exposure-of-sensitive-information-t-1552a321</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49177%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20X.Org%20xwayland&amp;severity=medium&amp;id=685183fca8c921274385da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49176-integer-overflow-or-wraparound-in-r-1c6d9c58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49176%3A%20Integer%20Overflow%20or%20Wraparound%20in%20X.Org%20xwayland&amp;severity=high&amp;id=685183fca8c921274385da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49175-out-of-bounds-read-in-red-hat-red-h-537731bf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49175%3A%20Out-of-bounds%20Read%20in%20X.Org%20xwayland&amp;severity=medium&amp;id=68518079a8c921274385d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4754-cwe-613-insufficient-session-expirat-a2cf8ec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4754%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ash-project%20ash_authentication_phoenix&amp;severity=low&amp;id=68517cf5a8c921274385d335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6199-exposure-of-sensitive-information-to-b9abc980</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6199%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=low&amp;id=68517cf5a8c921274385d33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6196-integer-overflow-or-wraparound-in-re-f02e7632</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6196%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=68517cf5a8c921274385d339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49842-cwe-276-incorrect-default-permissio-7ebe1290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49842%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20conda-forge%20conda-forge-webservices&amp;severity=low&amp;id=68517970a8c921274385cfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6069-cwe-1333-inefficient-regular-express-d6881876</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6069%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=68517269a8c921274385c3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4404-insufficient-granularity-of-access-c-91e743cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4404%3A%20Insufficient%20Granularity%20of%20Access%20Control&amp;severity=critical&amp;id=68517269a8c921274385c3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0320-cwe-269-improper-privilege-managemen-31d46445</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0320%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Secure%20Access%20Client%20for%20Windows&amp;severity=high&amp;id=68517269a8c921274385c3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4879-cwe-269-improper-privilege-managemen-b8bcbac3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4879%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Workspace%20App%20for%20Windows&amp;severity=high&amp;id=68516ee4a8c921274385befe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6020-improper-limitation-of-a-pathname-to-5c5da957</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6020%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=685167e3a8c921274385b7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4365-cwe-1284-improper-validation-of-spec-93e65ac2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4365%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NetScaler%20Console&amp;severity=medium&amp;id=68516458a8c921274385b4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploring-a-new-kimjongrat-stealer-variant-and-its-2ce7c5b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploring%20a%20New%20KimJongRAT%20Stealer%20Variant%20and%20Its%20PowerShell%20Implementation&amp;severity=medium&amp;id=685160d3a8c921274385b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5349-cwe-1284-improper-validation-of-spec-e17b6e52</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5349%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20NetScaler%20ADC&amp;severity=high&amp;id=68516458a8c921274385b4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hard-coded-b-password-in-sitecore-xp-sparks-major--9e8933c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hard-Coded%20&apos;b&apos;%20Password%20in%20Sitecore%20XP%20Sparks%20Major%20RCE%20Risk%20in%20Enterprise%20Deployments&amp;severity=high&amp;id=685160d3a8c921274385b112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5777-cwe-125-out-of-bounds-read-in-netsca-7cc36845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5777%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NetScaler%20ADC&amp;severity=critical&amp;id=68516458a8c921274385b4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zoomcar-data-breach-exposes-personal-info-of-84-mi-db705c49</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zoomcar%20Data%20Breach%20Exposes%20Personal%20Info%20of%208.4%20Million%20Users&amp;severity=high&amp;id=68515646a8c921274385a42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5291-cwe-79-improper-neutralization-of-in-f07c5577</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5291%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=685152c6a8c921274385a0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3880-cwe-863-incorrect-authorization-in-a-acdaf801</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3880%3A%20CWE-863%20Incorrect%20Authorization%20in%20assafp%20Poll%2C%20Survey%20%26%20Quiz%20Maker%20Plugin%20by%20Opinion%20Stage&amp;severity=medium&amp;id=685152c6a8c921274385a0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5700-cwe-79-improper-neutralization-of-in-7e5da287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tvledesign%20Simple%20Logo%20Carousel&amp;severity=medium&amp;id=685152c6a8c921274385a0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6050-cwe-79-improper-neutralization-of-in-62fb4771</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20jupo%20mezzanine&amp;severity=medium&amp;id=68514f3ea8c9212743859c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-b-for-backdoor-pre-auth-rce-chain-in-sitecore-e-5fac7d61</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20b%20For%20Backdoor%3F%20Pre-Auth%20RCE%20Chain%20In%20Sitecore%20Experience%20Platform%20-%20watchTowr%20Labs&amp;severity=medium&amp;id=68514131a8c9212743858d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3515-cwe-434-unrestricted-upload-of-file--8058e8df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3515%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=685136a2a8c92127438581c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-seizes-774m-in-crypto-tied-to-north-koreas-glob-ccaf73c8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Seizes%20%247.74M%20in%20Crypto%20Tied%20to%20North%20Korea%E2%80%99s%20Global%20Fake%20IT%20Worker%20Network&amp;severity=high&amp;id=6851331da8c9212743857d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-analysis-mcp-protocol-vulnerabilities-in--72e121e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Security%20Analysis%3A%20MCP%20Protocol%20Vulnerabilities%20in%20AI%20Toolchains&amp;severity=medium&amp;id=68513352a8c9212743857da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-switch-to-targeting-us-insurance-companies-8d25b4fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20switch%20to%20targeting%20U.S.%20insurance%20companies&amp;severity=high&amp;id=6851331da8c9212743857d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/india-based-car-sharing-company-zoomcar-suffered-a-493df453</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=India-based%20car-sharing%20company%20Zoomcar%20suffered%20a%20data%20breach%20impacting%208.4M%20users&amp;severity=high&amp;id=6851331da8c9212743857d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6173-sql-injection-in-webkul-qloapps-8d86dfc1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6173%3A%20SQL%20Injection%20in%20Webkul%20QloApps&amp;severity=medium&amp;id=68510ff4a8c921274385592b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6167-path-traversal-in-themanojdesai-pyth-108af54e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6167%3A%20Path%20Traversal%20in%20themanojdesai%20python-a2a&amp;severity=medium&amp;id=68510ff4a8c9212743855923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6166-path-traversal-in-frdel-agent-zero-dc735483</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6166%3A%20Path%20Traversal%20in%20frdel%20Agent-Zero&amp;severity=medium&amp;id=6851056aa8c9212743854dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6165-buffer-overflow-in-totolink-x15-0add1da2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6165%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6851056aa8c9212743854da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5209-cwe-79-cross-site-scripting-xss-in-i-5d70e0d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5209%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ivory%20Search&amp;severity=medium&amp;id=6851056aa8c9212743854da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6164-buffer-overflow-in-totolink-a3002r-39567fab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6164%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=6850fe60a8c921274385300d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6163-buffer-overflow-in-totolink-a3002ru-14898456</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6163%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=6850f758a8c9212743852369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6162-buffer-overflow-in-totolink-ex1200t-53e400cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6162%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850f758a8c9212743852361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6161-unrestricted-upload-in-sourcecodeste-f966302f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6161%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Simple%20Food%20Ordering%20System&amp;severity=medium&amp;id=68518b04a8c921274385e31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6160-sql-injection-in-sourcecodester-clie-54d7fa87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6160%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=6851bfc2a8c9212743861741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6159-sql-injection-in-code-projects-hoste-fe04c701</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6159%3A%20SQL%20Injection%20in%20code-projects%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850eccca8c921274385197f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6158-stack-based-buffer-overflow-in-d-lin-5b6923f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6158%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-665&amp;severity=high&amp;id=6850e5c4a8c92127438512d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6157-sql-injection-in-phpgurukul-nipah-vi-72fb588b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6157%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6850debda8c9212743850b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6156-sql-injection-in-phpgurukul-nipah-vi-afc450c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6156%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6850debda8c9212743850b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6155-sql-injection-in-phpgurukul-hostel-m-263d5f23</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6155%3A%20SQL%20Injection%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850d430a8c921274384f9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6154-sql-injection-in-phpgurukul-hostel-m-c95e6fb6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6154%3A%20SQL%20Injection%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850d430a8c921274384f9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6153-sql-injection-in-phpgurukul-hostel-m-d29bcdbc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6153%3A%20SQL%20Injection%20in%20PHPGurukul%20Hostel%20Management%20System&amp;severity=medium&amp;id=6850d430a8c921274384f9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5673-cwe-89-improper-neutralization-of-sp-4ebd0472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5673%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=6850cd28a8c921274384f3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4775-cwe-79-improper-neutralization-of-in-bd8d46c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dcooney%20WordPress%20Infinite%20Scroll%20%E2%80%93%20Ajax%20Load%20More&amp;severity=medium&amp;id=6850cd28a8c921274384f3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3774-cwe-79-improper-neutralization-of-in-6b22f829</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcinlawrowski%20Wise%20Chat&amp;severity=high&amp;id=6850cd28a8c921274384f3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6152-path-traversal-in-steel-browser-a4b8789a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6152%3A%20Path%20Traversal%20in%20Steel%20Browser&amp;severity=medium&amp;id=6850cd28a8c921274384f3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6151-buffer-overflow-in-tp-link-tl-wr940n-afc731c3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6151%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Systems%20INC.%20TL-WR940N%20V4&amp;severity=high&amp;id=6850c29ca8c921274384e88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48993-cwe-79-improper-neutralization-of-i-3f1c54a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48993%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=6850bb99a8c921274384e14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6150-buffer-overflow-in-totolink-x15-cf8c21c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6150%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6850bb99a8c921274384e158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6149-buffer-overflow-in-totolink-a3002r-c0bf006c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6149%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=6850bb99a8c921274384e150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6148-buffer-overflow-in-totolink-a3002ru-91ec2262</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6148%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002RU&amp;severity=high&amp;id=6850b811a8c921274384de09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6147-buffer-overflow-in-totolink-a702r-7d407f2b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6147%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=6850b811a8c921274384de01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-17-053248a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-17&amp;severity=medium&amp;id=68520606a8c921274386573b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45525-na-e4ae393d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45525%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20asvd%20microlight&amp;severity=low&amp;id=6851ca4da8c92127438621d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45526-na-c953a5bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45526%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20asvd%20microlight&amp;severity=low&amp;id=6851c6c9a8c9212743861d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45878-na-aaac5cfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45878%3A%20n%2Fa&amp;severity=medium&amp;id=6851a3a1a8c921274385fb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45880-na-169be551</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45880%3A%20n%2Fa&amp;severity=medium&amp;id=68519ca4a8c921274385f554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45879-na-38e79bf6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45879%3A%20n%2Fa&amp;severity=medium&amp;id=6851920ca8c921274385eb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6146-buffer-overflow-in-totolink-x15-00e4bfae</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6146%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6850aa03a8c921274384c65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6145-buffer-overflow-in-totolink-ex1200t-c20630aa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6145%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850a2f8a8c921274384c03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6144-buffer-overflow-in-totolink-ex1200t-906e8ff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6144%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850a2f8a8c921274384c037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6143-buffer-overflow-in-totolink-ex1200t-eb079389</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6143%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68509f77a8c921274384bcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48992-cwe-79-improper-neutralization-of-i-3dfbf7c8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48992%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=68509bf5a8c921274384ba39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6142-server-side-request-forgery-in-inter-76dee187</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6142%3A%20Server-Side%20Request%20Forgery%20in%20Intera%20InHire&amp;severity=medium&amp;id=6850986ea8c921274384b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6141-stack-based-buffer-overflow-in-gnu-n-6d357865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6141%3A%20Stack-based%20Buffer%20Overflow%20in%20GNU%20ncurses&amp;severity=medium&amp;id=6850986ea8c921274384b7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6140-resource-consumption-in-spdlog-bebf7bba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6140%3A%20Resource%20Consumption%20in%20spdlog&amp;severity=medium&amp;id=68509166a8c921274384b1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49134-cwe-359-exposure-of-private-persona-ffa5398f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49134%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20WeblateOrg%20weblate&amp;severity=low&amp;id=68508a5da8c921274384ab40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6139-use-of-hard-coded-password-in-totoli-22052dd6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6139%3A%20Use%20of%20Hard-coded%20Password%20in%20TOTOLINK%20T10&amp;severity=low&amp;id=685086dda8c921274384a891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47951-cwe-307-improper-restriction-of-exc-abbd4ff7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47951%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=685086dda8c921274384a88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32800-cwe-1357-reliance-on-insufficiently-677ad684</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32800%3A%20CWE-1357%3A%20Reliance%20on%20Insufficiently%20Trustworthy%20Component%20in%20conda%20conda-build&amp;severity=high&amp;id=68508357a8c921274384a30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6138-buffer-overflow-in-totolink-t10-1e55107c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6138%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68507fd4a8c921274384a08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32799-cwe-22-improper-limitation-of-a-pat-f3ad8e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32799%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20conda%20conda-build&amp;severity=medium&amp;id=68507fd3a8c921274384a086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32798-cwe-94-improper-control-of-generati-04d54420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32798%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20conda%20conda-build&amp;severity=high&amp;id=68507c50a8c9212743849b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6137-buffer-overflow-in-totolink-t10-ed439b73</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6137%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=685078cba8c921274384963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6136-sql-injection-in-projectworlds-life--96a12c12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6136%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=68507547a8c921274384933e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6135-sql-injection-in-projectworlds-life--ba96a122</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6135%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=68506acaa8c9212743848a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/asus-armoury-crate-bug-lets-attackers-get-windows--4e21470c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ASUS%20Armoury%20Crate%20bug%20lets%20attackers%20get%20Windows%20admin%20privileges&amp;severity=high&amp;id=68506ab9a8c9212743848a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32797-cwe-277-insecure-inherited-permissi-27a7f714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32797%3A%20CWE-277%3A%20Insecure%20Inherited%20Permissions%20in%20conda%20conda-build&amp;severity=medium&amp;id=68506737a8c9212743848754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6134-sql-injection-in-projectworlds-life--3a9477d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6134%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=68506737a8c921274384875d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6087-cwe-918-server-side-request-forgery--a3e54754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6087%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=high&amp;id=68506737a8c921274384875a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kali-linux-20252-released-with-13-new-tools-car-ha-062eb361</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kali%20Linux%202025.2%20released%20with%2013%20new%20tools%2C%20car%20hacking%20updates&amp;severity=high&amp;id=685063b1a8c92127438483ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/washington-posts-email-system-hacked-journalists-a-d4bf7c91</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Washington%20Post&apos;s%20email%20system%20hacked%2C%20journalists&apos;%20accounts%20compromised&amp;severity=high&amp;id=685063b1a8c92127438483a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6133-sql-injection-in-projectworlds-life--4416d5a4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6133%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=6850602fa8c9212743848056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/telegram-messengers-ties-to-russias-fsb-revealed-i-c79a08f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Telegram%20messenger&apos;s%20ties%20to%20Russia&apos;s%20FSB%20revealed%20in%20new%20report&amp;severity=medium&amp;id=68505928a8c9212743847792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6132-sql-injection-in-chanjet-crm-eea5b100</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6132%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=68505926a8c9212743847787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6131-cross-site-scripting-in-codeastro-fo-1ce4ef2e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6131%3A%20Cross%20Site%20Scripting%20in%20CodeAstro%20Food%20Ordering%20System&amp;severity=medium&amp;id=6850521da8c921274384675c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6179-permissions-bypass-privilege-escalat-fe127fa6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6179%3A%20Permissions%20Bypass%20%2F%20Privilege%20Escalation%20in%20Google%20ChromeOS&amp;severity=critical&amp;id=68504e99a8c921274384649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6177-privilege-escalation-in-google-chrom-b78cae76</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6177%3A%20Privilege%20Escalation%20in%20Google%20ChromeOS&amp;severity=high&amp;id=68504e99a8c92127438464a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6130-buffer-overflow-in-totolink-ex1200t-71e8b5da</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6130%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68504b16a8c92127438460e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2327-cwe-532-insertion-of-sensitive-infor-d8faf571</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2327%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Pure%20Storage%20FlashArray&amp;severity=medium&amp;id=68504791a8c9212743845d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5309-cwe-94-improper-control-of-generatio-396d4407</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5309%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20BeyondTrust%20Remote%20support%20%26%20Privileged%20Remote%20Access&amp;severity=high&amp;id=6850440da8c921274384591d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6129-buffer-overflow-in-totolink-ex1200t-3af481fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6129%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850440da8c9212743845924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6128-buffer-overflow-in-totolink-ex1200t-cd921c67</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6128%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6850408fa8c9212743845415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49794-expired-pointer-dereference-in-red--18de3c2a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49794%3A%20Expired%20Pointer%20Dereference&amp;severity=critical&amp;id=6850408fa8c9212743845411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6170-stack-based-buffer-overflow-in-red-h-e89eea12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6170%3A%20Stack-based%20Buffer%20Overflow&amp;severity=low&amp;id=6850440da8c9212743845920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49795-expired-pointer-dereference-in-red--71d0a7a3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49795%3A%20Expired%20Pointer%20Dereference&amp;severity=high&amp;id=68503980a8c9212743844972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tenable-fixes-three-high-severity-flaws-in-nessus-4466708a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tenable%20Fixes%20Three%20High-Severity%20Flaws%20in%20Nessus&amp;severity=high&amp;id=685035faa8c921274384421a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49796-out-of-bounds-read-in-red-hat-red-h-0dc6c777</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49796%3A%20Out-of-bounds%20Read&amp;severity=critical&amp;id=68503981a8c9212743844976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48976-allocation-of-resources-with-insuff-b19c03a8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48976%3A%20Allocation%20of%20resources%20with%20insufficient%20limits%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20FileUpload&amp;severity=high&amp;id=6850327da8c9212743843f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6127-cross-site-scripting-in-phpgurukul-n-a6d36a69</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6127%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6850327da8c9212743843f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4565-cwe-674-uncontrolled-recursion-in-pr-3c14d57c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4565%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20protocolbuffers%20Python-Protobuf&amp;severity=high&amp;id=6850327da8c9212743843f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6126-cross-site-scripting-in-phpgurukul-r-957c8f53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6126%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=68502ef4a8c9212743843bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49124-cwe-426-untrusted-search-path-in-ap-cb55d916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49124%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=68502b73a8c92127438438cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3526-cwe-400-uncontrolled-resource-consum-8bb97558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3526%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=685027eca8c9212743843599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49125-cwe-288-authentication-bypass-using-b702aef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49125%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=685027eca8c92127438435a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3594-cwe-22-improper-limitation-of-a-path-584287ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3594%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Liferay%20Portal&amp;severity=high&amp;id=685027eca8c921274384359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48988-cwe-770-allocation-of-resources-wit-d0193ac0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48988%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=685027eca8c921274384359f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/archetyp-dark-web-market-seized-admin-arrested-in--643f6357</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Archetyp%20Dark%20Web%20Market%20Seized%2C%20Admin%20Arrested%20in%20Spain&amp;severity=medium&amp;id=68502466a8c921274384321c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6125-cross-site-scripting-in-phpgurukul-r-522e5fce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6125%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=685027eca8c92127438435a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36632-cwe-276-incorrect-default-permissio-d69f9111</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36632%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Agent&amp;severity=high&amp;id=68502479a8c9212743843278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3602-cwe-400-uncontrolled-resource-consum-8fa41b84</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3602%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Liferay%20Portal&amp;severity=high&amp;id=68502479a8c921274384327b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6124-sql-injection-in-code-projects-resta-dca77286</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6124%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=685020e4a8c9212743842f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fileless-asyncrat-distributed-via-clickfix-techniq-aa1acac6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fileless%20AsyncRAT%20Distributed%20Via%20Clickfix%20Technique%20Targeting%20German%20Speaking%20Users&amp;severity=medium&amp;id=6850327ca8c9212743843eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clone-compile-compromise-open-source-malware-trap--8f0fe7e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clone%2C%20Compile%2C%20Compromise%3A%20Open-Source%20Malware%20Trap%20on%20GitHub&amp;severity=medium&amp;id=6850327ca8c9212743843eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6123-sql-injection-in-code-projects-resta-d6a40d25</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6123%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=685019e1a8c92127438427bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-a-third-of-grafana-instances-exposed-to-xss-f-5b430358</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20a%20Third%20of%20Grafana%20Instances%20Exposed%20to%20XSS%20Flaw&amp;severity=high&amp;id=68500f4ea8c92127438419bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6122-sql-injection-in-code-projects-resta-7b67aba0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6122%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=68501657a8c9212743842463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6121-stack-based-buffer-overflow-in-d-lin-1c97c4a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6121%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-632&amp;severity=critical&amp;id=68500846a8c9212743841044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5689-vulnerability-in-canonical-authd-d5f8de91</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5689%3A%20Vulnerability%20in%20Canonical%20authd&amp;severity=high&amp;id=685004c3a8c9212743840d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6120-heap-based-buffer-overflow-in-open-a-1e265216</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6120%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=685004c3a8c9212743840d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24388-cwe-184-incomplete-list-of-disallow-b67b4fa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24388%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20OTRS%20AG%20OTRS&amp;severity=low&amp;id=685004c3a8c9212743840d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46710-cwe-cwe-416-use-after-free-417-in-i-116d0234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46710%3A%20CWE%20-%20CWE-416%3A%20Use%20After%20Free%20(4.17)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=6850013ea8c9212743840a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40916-cwe-338-use-of-cryptographically-we-d8435282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40916%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20GRYPHON%20Mojolicious%3A%3APlugin%3A%3ACaptchaPNG&amp;severity=critical&amp;id=684ffa37a8c921274384023d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4748-cwe-22-improper-limitation-of-a-path-f13d5b13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4748%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Erlang%20OTP&amp;severity=medium&amp;id=684ffa37a8c921274384024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47869-cwe-119-improper-restriction-of-ope-65439f7c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47869%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=critical&amp;id=684ffa37a8c9212743840247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6119-use-after-free-in-open-asset-import--4d54ca38</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6119%3A%20Use%20After%20Free%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=684ffa37a8c9212743840250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47868-cwe-787-out-of-bounds-write-in-apac-8cc7a426</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47868%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS%3A%20tools%2Fbdf-converter.&amp;severity=critical&amp;id=684ffa37a8c9212743840243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6118-sql-injection-in-das-parking-managem-5f3e9dba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6118%3A%20SQL%20Injection%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=684ff6b8a8c921274383fdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-predator-spyware-infrastructure-revealed-activ-cc5c5269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Predator%20spyware%20infrastructure%20revealed%20activity%20in%20Mozambique%20for%20first%20time&amp;severity=medium&amp;id=684ff32da8c921274383fb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6117-sql-injection-in-das-parking-managem-278aa07e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6117%3A%20SQL%20Injection%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=684fefaaa8c921274383f680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25265-cwe-306-missing-authentication-for--a98a349d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25265%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WAGO%20WAGO%20CC100%200751-9x01&amp;severity=medium&amp;id=684fec2ca8c921274383f276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25264-cwe-942-permissive-cross-domain-pol-2f8eaf6f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25264%3A%20CWE-942%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20WAGO%20CC100%200751-9x01&amp;severity=medium&amp;id=684fec2ca8c921274383f273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6116-sql-injection-in-das-parking-managem-f367264e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6116%3A%20SQL%20Injection%20in%20Das%20Parking%20Management%20System%20%E5%81%9C%E8%BD%A6%E5%9C%BA%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=684fe8a2a8c921274383ef56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3464-cwe-367-time-of-check-time-of-use-to-939abb76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3464%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=684fe19aa8c921274383e7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6115-stack-based-buffer-overflow-in-d-lin-4d741ff5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6115%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=684fe19aa8c921274383e7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-package-masquerades-as-chimera-modu-fa506e99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20Package%20Masquerades%20as%20Chimera%20Module%20to%20Steal%20AWS%2C%20CI%2FCD%2C%20and%20macOS%20Data&amp;severity=high&amp;id=684fde15a8c921274383e43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6172-cwe-287-improper-authentication-in-t-8acc3494</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6172%3A%20CWE-287%20Improper%20Authentication%20in%20TECNO%20com.afmobi.boomplayer&amp;severity=critical&amp;id=684fde2ba8c921274383e459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6114-stack-based-buffer-overflow-in-d-lin-776616ed</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6114%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=684fda92a8c921274383e0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2091-cwe-601-url-redirection-to-untrusted-9ceab2a6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2091%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20M-Files%20Corporation%20M-Files%20Mobile&amp;severity=medium&amp;id=684fda92a8c921274383e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40727-cwe-79-improper-neutralization-of-i-cf985197</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Phoenix%20BV%20Phoenix%20CMS&amp;severity=medium&amp;id=684fd70ea8c921274383dca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6113-buffer-overflow-in-tenda-fh1203-216fe1ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6113%3A%20Buffer%20Overflow%20in%20Tenda%20FH1203&amp;severity=high&amp;id=684fd38ba8c921274383d979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6112-buffer-overflow-in-tenda-fh1205-86c709cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6112%3A%20Buffer%20Overflow%20in%20Tenda%20FH1205&amp;severity=high&amp;id=684fc8fea8c921274383ce93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4987-cwe-79-improper-neutralization-of-in-a58c2574</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Project%20Portfolio%20Manager&amp;severity=high&amp;id=684fc8fea8c921274383ce9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6111-stack-based-buffer-overflow-in-tenda-e1792b66</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6111%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1205&amp;severity=high&amp;id=684fc1f6a8c921274383c699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6110-stack-based-buffer-overflow-in-tenda-51b21c25</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6110%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1201&amp;severity=high&amp;id=684fbe72a8c921274383c379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6169-cwe-89-improper-neutralization-of-sp-8b104354</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6169%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HAMASTAR%20Technology%20WIMP&amp;severity=critical&amp;id=684fbaeea8c921274383c0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6109-path-traversal-in-javahongxi-whatsma-a3ccd07d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6109%3A%20Path%20Traversal%20in%20javahongxi%20whatsmars&amp;severity=medium&amp;id=684fb76ca8c921274383bb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6108-path-traversal-in-hansonwang99-sprin-19e2f8fb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6108%3A%20Path%20Traversal%20in%20hansonwang99%20Spring-Boot-In-Action&amp;severity=medium&amp;id=684fb061a8c921274383b3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6107-dynamically-determined-object-attrib-65fc3c89</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6107%3A%20Dynamically-Determined%20Object%20Attributes%20in%20comfyanonymous%20comfyui&amp;severity=low&amp;id=684fa5d5a8c9212743839699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6106-cross-site-request-forgery-in-wukong-d7784ab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6106%3A%20Cross-Site%20Request%20Forgery%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=684fa251a8c921274383935c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6105-cross-site-request-forgery-in-jflyfo-cb32fb58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6105%3A%20Cross-Site%20Request%20Forgery%20in%20jflyfox%20jfinal_cms&amp;severity=medium&amp;id=684f9b52a8c9212743838b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6104-os-command-injection-in-wifi-soft-un-f0c0f9c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6104%3A%20OS%20Command%20Injection%20in%20Wifi-soft%20UniBox%20Controller&amp;severity=high&amp;id=684f9442a8c9212743838553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6103-os-command-injection-in-wifi-soft-un-430620d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6103%3A%20OS%20Command%20Injection%20in%20Wifi-soft%20UniBox%20Controller&amp;severity=high&amp;id=684f8d3aa8c921274383800e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6102-os-command-injection-in-wifi-soft-un-13ae7248</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6102%3A%20OS%20Command%20Injection%20in%20Wifi-soft%20UniBox%20Controller&amp;severity=high&amp;id=684f8d3aa8c9212743838008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6101-improper-neutralization-of-directive-6fe1117a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6101%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20in%20letta-ai%20letta&amp;severity=medium&amp;id=684f82b7a8c921274383702b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6100-sql-injection-in-realguoshuai-open-v-1a88d6a6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6100%3A%20SQL%20Injection%20in%20realguoshuai%20open-video-cms&amp;severity=medium&amp;id=684f7825a8c9212743836893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6099-improper-authorization-in-szluyu99-g-f6f80821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6099%3A%20Improper%20Authorization%20in%20szluyu99%20gin-vue-blog&amp;severity=medium&amp;id=684f711aa8c92127438361a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6098-buffer-overflow-in-utt-750w-36fe7295</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6098%3A%20Buffer%20Overflow%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=critical&amp;id=684f6a11a8c9212743835a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6097-unverified-password-change-in-utt-75-432a7b9c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6097%3A%20Unverified%20Password%20Change%20in%20UTT%20%E8%BF%9B%E5%8F%96%20750W&amp;severity=medium&amp;id=684f630aa8c9212743834d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-16-310c6be8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-16&amp;severity=medium&amp;id=6850b485a8c921274384d5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27587-na-22829afe</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27587%3A%20n%2Fa&amp;severity=medium&amp;id=685094eda8c921274384b50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6096-sql-injection-in-codesiddhant-jasmin-c701173c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6096%3A%20SQL%20Injection%20in%20codesiddhant%20Jasmin%20Ransomware&amp;severity=medium&amp;id=684f5c01a8c92127438341d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6095-sql-injection-in-codesiddhant-jasmin-79704669</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6095%3A%20SQL%20Injection%20in%20codesiddhant%20Jasmin%20Ransomware&amp;severity=medium&amp;id=684f5176a8c9212743833710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6094-sql-injection-in-foxcms-0f669882</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6094%3A%20SQL%20Injection%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=684f4df4a8c921274383350d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6093-stack-based-buffer-overflow-in-uyank-be462c9d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6093%3A%20Stack-based%20Buffer%20Overflow%20in%20uYanki%20board-stm32f103rc-berial&amp;severity=medium&amp;id=684f46eaa8c9212743832ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-leak-data-of-10000-virtualmacosx-customers-155bd75a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Leak%20Data%20of%2010%2C000%20VirtualMacOSX%20Customers%20in%20Alleged%20Breach&amp;severity=high&amp;id=684f3fe3a8c92127438326fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hosting-images-inside-dns-records-using-txt-d1f902a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hosting%20images%20inside%20dns%20records%20using%20TXT.&amp;severity=medium&amp;id=684f2e59a8c92127438319da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5964-cwe-22-improper-limitation-of-a-path-ec409023</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5964%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=684f23c1a8c9212743830fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5990-cwe-79-improper-neutralization-of-in-7883d040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5990%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arcadia%20Technology%2C%20LLC%20Crafty%20Controller&amp;severity=high&amp;id=684f0eaaa8c921274383034b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6092-cross-site-scripting-in-comfyanonymo-378049da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6092%3A%20Cross%20Site%20Scripting%20in%20comfyanonymous%20comfyui&amp;severity=medium&amp;id=684f041ea8c921274382fccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6091-buffer-overflow-in-h3c-gr-3000ax-c7a20764</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6091%3A%20Buffer%20Overflow%20in%20H3C%20GR-3000AX&amp;severity=high&amp;id=684ef99aa8c921274382f6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22854-cwe-394-unexpected-status-code-or-r-fcfe53f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22854%3A%20CWE-394%20Unexpected%20Status%20Code%20or%20Return%20Value%20in%20Ping%20Identity%20PingFederate&amp;severity=medium&amp;id=684ee0f8a8c921274382e6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6090-buffer-overflow-in-h3c-gr-5400ax-29ea79aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6090%3A%20Buffer%20Overflow%20in%20H3C%20GR-5400AX&amp;severity=high&amp;id=684edd74a8c921274382e506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21085-cwe-462-duplicate-key-in-associativ-e8026147</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21085%3A%20CWE-462%20Duplicate%20Key%20in%20Associative%20List%20in%20Ping%20Identity%20PingFederate&amp;severity=low&amp;id=684edd74a8c921274382e502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6089-open-redirect-in-astun-technology-is-15a41b61</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6089%3A%20Open%20Redirect%20in%20Astun%20Technology%20iShare%20Maps&amp;severity=medium&amp;id=684ec4dda8c921274382d49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36041-cwe-295-improper-certificate-valida-60a59c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36041%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=684ec4dda8c921274382d497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1411-cwe-250-execution-with-unnecessary-p-f73a9185</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1411%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Directory&amp;severity=high&amp;id=684ec152a8c921274382d27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/goclipc2-clipboard-for-c2-on-windows-in-go-73d70264</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GoClipC2%20-%20Clipboard%20for%20C2%20on%20Windows%20in%20Go&amp;severity=medium&amp;id=684eac42a8c921274382c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/input-on-using-the-rot-and-network-connection-to-h-291f73d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Input%20on%20using%20the%20ROT%20and%20network%20connection%20to%20hack%20voting%20and%20tabulating%20software%20and%20hardware.&amp;severity=medium&amp;id=684e5ee8a8c92127438280e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pcman-ftp-server-207-buffer-overflow-8a8ba0c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PCMan%20FTP%20Server%202.0.7%20-%20Buffer%20Overflow&amp;severity=medium&amp;id=684fad5ba8c921274383b114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anchor-cms-0127-stored-cross-site-scripting-xss-4176e081</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anchor%20CMS%200.12.7%20-%20Stored%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=684fad5ba8c921274383b10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/litespeed-cache-wordpress-plugin-6301-privilege-es-2ab109f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Litespeed%20Cache%20WordPress%20Plugin%206.3.0.1%20-%20Privilege%20Escalation&amp;severity=high&amp;id=684fad5ba8c921274383b10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/parrot-and-dji-variants-drone-oses-kernel-panic-ex-0d4b2c9d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Parrot%20and%20DJI%20variants%20Drone%20OSes%20-%20Kernel%20Panic%20Exploit&amp;severity=medium&amp;id=684fad5ba8c921274383b105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-11-smb-client-privilege-escalation-remote--3d721b16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%2011%20SMB%20Client%20-%20Privilege%20Escalation%20%26%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684fad5ba8c921274383b100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/php-cgi-module-834-remote-code-execution-rce-33dd2d51</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PHP%20CGI%20Module%208.3.4%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684fad5ba8c921274383b0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-excel-use-after-free-local-code-executio-ec6f5f33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Excel%20Use%20After%20Free%20-%20Local%20Code%20Execution&amp;severity=medium&amp;id=684fad5ba8c921274383b0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/airkeyboard-ios-app-105-remote-input-injection-219ad705</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AirKeyboard%20iOS%20App%201.0.5%20-%20Remote%20Input%20Injection&amp;severity=medium&amp;id=684fad5ba8c921274383b0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/webdav-windows-10-remote-code-execution-rce-8fec652a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WebDAV%20Windows%2010%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684fad5ba8c921274383b0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/skyvern-0185-remote-code-execution-rce-via-ssti-f80ab3ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Skyvern%200.1.85%20-%20Remote%20Code%20Execution%20(RCE)%20via%20SSTI&amp;severity=critical&amp;id=684fad5ba8c921274383b0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-15-01e900b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-15&amp;severity=medium&amp;id=684f6304a8c9212743834b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anubis-ransomware-adds-wiper-to-destroy-files-beyo-7279f916</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anubis%20ransomware%20adds%20wiper%20to%20destroy%20files%20beyond%20recovery&amp;severity=high&amp;id=684de3d6a8c921274382088f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/westjet-investigates-cyberattack-disrupting-intern-e085e435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WestJet%20investigates%20cyberattack%20disrupting%20internal%20systems&amp;severity=high&amp;id=684de3d6a8c9212743820893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/more-steganography-e39b148d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=More%20Steganography!&amp;severity=medium&amp;id=6850327ca8c9212743843f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gimp-heap-overflow-re-discovery-and-exploitation-c-2550c34a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GIMP%20Heap%20Overflow%20Re-Discovery%20and%20Exploitation%20(CVE-2025%E2%80%936035)&amp;severity=medium&amp;id=684daf23a8c921274381e421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unusual-toolset-used-in-recent-fog-ransomware-atta-ae5bcb0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unusual%20toolset%20used%20in%20recent%20Fog%20Ransomware%20attack&amp;severity=medium&amp;id=684d4caaa8c9212743819e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5238-cwe-79-improper-neutralization-of-in-dfa86643</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20WooCommerce%20Wishlist&amp;severity=medium&amp;id=684d421fa8c9212743819608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4667-cwe-79-improper-neutralization-of-in-619ecf8e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=684d421fa8c9212743819600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5337-cwe-79-improper-neutralization-of-in-c0d7fb32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaslider%20Slider%2C%20Gallery%2C%20and%20Carousel%20by%20MetaSlider%20%E2%80%93%20Image%20Slider%2C%20Video%20Slider&amp;severity=medium&amp;id=684d421fa8c921274381960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/make-self-xss-great-again-5ad35bf4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Make%20Self-XSS%20Great%20Again&amp;severity=low&amp;id=684d3797a8c9212743818d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6063-cwe-352-cross-site-request-forgery-c-c382eac1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6063%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dmitry78%20XiSearch%20bar&amp;severity=medium&amp;id=684d3417a8c9212743818b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6061-cwe-79-improper-neutralization-of-in-18a75b32</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bhittani%20kk%20Youtube%20Video&amp;severity=medium&amp;id=684d3416a8c9212743818b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5336-cwe-79-improper-neutralization-of-in-fbf3cc70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5336%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20holithemes%20Click%20to%20Chat%20%E2%80%93%20HoliThemes&amp;severity=medium&amp;id=684d3416a8c9212743818af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6062-cwe-352-cross-site-request-forgery-c-dbe4428a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6062%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20netlatch%20Yougler%20Blogger%20Profile%20Page&amp;severity=medium&amp;id=684d3416a8c9212743818b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6070-cwe-22-improper-limitation-of-a-path-bd906c26</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6070%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20josxha%20Restrict%20File%20Access&amp;severity=medium&amp;id=684d3417a8c9212743818b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4592-cwe-352-cross-site-request-forgery-c-249606bf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aspengrovestudios%20AI%20Image%20Lab%20%E2%80%93%20Free%20AI%20Image%20Generator&amp;severity=medium&amp;id=684d3416a8c9212743818aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5589-cwe-79-improper-neutralization-of-in-4c333bd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=684d3416a8c9212743818afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6055-cwe-352-cross-site-request-forgery-c-1dd7d2ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6055%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bogdanding%20Zen%20Sticky%20Social&amp;severity=medium&amp;id=684d3416a8c9212743818b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4200-cwe-98-improper-control-of-filename--b12fc3c8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4200%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Zagg%20-%20Electronics%20%26%20Accessories%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=684d3416a8c9212743818ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4187-cwe-22-improper-limitation-of-a-path-8b556093</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4187%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20UserPro%20-%20Community%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=684d3416a8c9212743818ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6040-cwe-79-improper-neutralization-of-in-957d0a3d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6040%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sagesony%20Easy%20Flashcards&amp;severity=medium&amp;id=684d3416a8c9212743818b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4216-cwe-79-improper-neutralization-of-in-3a99d01f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4216%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scada%20DIOT%20SCADA%20with%20MQTT&amp;severity=medium&amp;id=684d3416a8c9212743818aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6064-cwe-352-cross-site-request-forgery-c-1d131a39</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6064%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20djerba%20WP%20URL%20Shortener&amp;severity=medium&amp;id=684d3417a8c9212743818b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6065-cwe-22-improper-limitation-of-a-path-bae1c8e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6065%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wework4web%20Image%20Resizer%20On%20The%20Fly&amp;severity=critical&amp;id=684d3417a8c9212743818b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5487-cwe-89-improper-neutralization-of-sp-7a8759de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5487%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rubengc%20AutomatorWP%20%E2%80%93%20Automator%20plugin%20for%20no-code%20automations%2C%20webhooks%20%26%20custom%20integrations%20in%20WordPress&amp;severity=high&amp;id=684d1b74a8c92127438178c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3234-cwe-434-unrestricted-upload-of-file--b988f875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3234%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=high&amp;id=684d0d64a8c9212743816dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6059-cwe-352-cross-site-request-forgery-c-1064f00d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6059%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=684cdfb1a8c9212743813269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33108-cwe-250-execution-with-unnecessary--4054a6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33108%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Backup%20Recovery%20and%20Media%20Services%20for%20i&amp;severity=high&amp;id=684cc715a8c9212743811df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-14-e0c3841f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-14&amp;severity=medium&amp;id=684e1184a8c9212743822b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/giving-an-llm-command-line-access-to-nmap-ca7c35a0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Giving%20an%20LLM%20Command%20Line%20Access%20to%20Nmap&amp;severity=medium&amp;id=684ca3f1a8c921274380fc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24919-cwe-502-deserialization-of-untruste-34b222eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24919%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684ca06aa8c921274380fa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25215-cwe-763-release-of-invalid-pointer--cf4ad7b5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25215%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c9966a8c921274380f5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6083-cwe-287-improper-authentication-in-e-6bb1a55a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6083%3A%20CWE-287%20Improper%20Authentication%20in%20Extreme%20Networks%20ExtremeCloud%20Universal%20ZTNA&amp;severity=medium&amp;id=684c95dda8c921274380f361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25050-cwe-787-out-of-bounds-write-in-broa-f3b81270</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25050%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c925aa8c921274380f112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-fin7-linked-infrastructure-powernet-loader-and-34033b3a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20FIN7-Linked%20Infrastructure%2C%20PowerNet%20Loader%2C%20and%20Fake%20Update%20Attacks&amp;severity=medium&amp;id=6852b5e8a8c9212743885547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24922-cwe-121-stack-based-buffer-overflow-1f67ce78</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24922%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c925aa8c921274380f115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24311-cwe-125-out-of-bounds-read-in-broad-b5d442b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24311%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Broadcom%20BCM5820X&amp;severity=high&amp;id=684c8ed5a8c921274380ee6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49598-cwe-95-improper-neutralization-of-d-05efd0a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49598%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20conda-forge%20conda-forge-ci-setup-feedstock&amp;severity=medium&amp;id=684c8b51a8c921274380ebd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49596-cwe-306-missing-authentication-for--cb78398d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49596%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20modelcontextprotocol%20inspector&amp;severity=critical&amp;id=684c87cda8c921274380e923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49597-cwe-915-improperly-controlled-modif-87f804cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49597%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20handcraftedinthealps%20goodby-csv&amp;severity=low&amp;id=684c8450a8c921274380e66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/private-contractor-linked-to-multiple-chinese-stat-00f22a1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Private%20Contractor%20Linked%20to%20Multiple%20Chinese%20State-Sponsored%20Groups&amp;severity=medium&amp;id=684c8b50a8c921274380eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/discord-flaw-lets-hackers-reuse-expired-invites-in-831c7158</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Discord%20flaw%20lets%20hackers%20reuse%20expired%20invites%20in%20malware%20campaign&amp;severity=high&amp;id=684c72b9a8c921274380d897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/paraguay-suffered-data-breach-74-million-citizen-r-5d9a7516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Paraguay%20Suffered%20Data%20Breach%3A%207.4%20Million%20Citizen%20Records%20Leaked%20on%20Dark%20Web&amp;severity=high&amp;id=684c72b9a8c921274380d89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49587-cwe-357-insufficient-ui-warning-of--d7d06c84</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49587%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=684c6829a8c921274380d111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49586-cwe-863-incorrect-authorization-in--6dcae437</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49586%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c6829a8c921274380d10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-269000-websites-infected-with-jsfiretruck-jav-39256a5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%20269%2C000%20Websites%20Infected%20with%20JSFireTruck%20JavaScript%20Malware%20in%20One%20Month&amp;severity=high&amp;id=684c64a3a8c921274380ce73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49585-cwe-357-insufficient-ui-warning-of--6bb4ff8c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49585%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c64b4a8c921274380cebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49584-cwe-201-insertion-of-sensitive-info-5bd8fee0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49584%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c6120a8c921274380b95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49583-cwe-270-privilege-context-switching-91e18166</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49583%3A%20CWE-270%3A%20Privilege%20Context%20Switching%20Error%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=684c5d9ca8c921274380b6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batteries-included-collaborative-knowledge-managem-3af56908</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Batteries%20included%20collaborative%20knowledge%20management%20solution%20for%20threat%20intelligence%20researchers&amp;severity=medium&amp;id=684c5a1ba8c921274380b49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49582-cwe-693-protection-mechanism-failur-747b2159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49582%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c5697a8c921274380b20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49581-cwe-94-improper-control-of-generati-c6dd390e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49581%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c4f8ca8c921274380ac94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49580-cwe-266-incorrect-privilege-assignm-843a1e82</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49580%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=684c4c0ba8c921274380a907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48915-cwe-79-improper-neutralization-of-i-3f394629</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=high&amp;id=684c4884a8c921274380a653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48914-cwe-79-improper-neutralization-of-i-1236305a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=high&amp;id=684c4884a8c921274380a650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6052-integer-overflow-or-wraparound-in-re-d5d24d93</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6052%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=low&amp;id=684c4884a8c921274380a665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48920-cwe-79-improper-neutralization-of-i-7e0ad51d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20etracker&amp;severity=high&amp;id=684c4884a8c921274380a662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48919-cwe-79-improper-neutralization-of-i-967e18c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Simple%20Klaro&amp;severity=medium&amp;id=684c4884a8c921274380a65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48917-cwe-79-improper-neutralization-of-i-1c73647a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20EU%20Cookie%20Compliance%20(GDPR%20Compliance)&amp;severity=medium&amp;id=684c4884a8c921274380a659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48918-cwe-79-improper-neutralization-of-i-8db3e7ec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Simple%20Klaro&amp;severity=high&amp;id=684c4884a8c921274380a65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48916-cwe-862-missing-authorization-in-dr-8b0ea9e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48916%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Bookable%20Calendar&amp;severity=medium&amp;id=684c4884a8c921274380a656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6035-out-of-bounds-write-in-red-hat-red-h-7c60e323</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6035%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=684c4501a8c921274380a39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/may-2025-security-issues-in-korean-global-financia-1e562d09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=May%202025%20Security%20Issues%20in%20Korean%20%26%20Global%20Financial%20Sector&amp;severity=medium&amp;id=684c8b50a8c921274380ebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-trust-to-threat-hijacked-discord-invites-used-e4461ff1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Trust%20to%20Threat%3A%20Hijacked%20Discord%20Invites%20Used%20for%20Multi-Stage%20Malware%20Delivery&amp;severity=medium&amp;id=684c8b50a8c921274380ebb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6030-cwe-307-improper-restriction-of-exce-6c797812</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6030%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Autoeastern%20Cyclone%20Matrix%20TRF&amp;severity=critical&amp;id=684c3a74a8c9212743809a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36631-cwe-269-improper-privilege-manageme-94ca5c11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36631%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Agent&amp;severity=high&amp;id=684c3a74a8c9212743809a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6029-cwe-307-improper-restriction-of-exce-26c7d0e0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6029%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20KIA%20Aftermarket%20Generic%20Smart%20Keyless%20Entry%20System&amp;severity=critical&amp;id=684c36f0a8c9212743809719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36633-cwe-269-improper-privilege-manageme-604447f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36633%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Tenable%20Agent&amp;severity=high&amp;id=684c36f0a8c9212743809716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serverless-tokens-in-the-cloud-exploitation-and-de-d4ec6481</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serverless%20Tokens%20in%20the%20Cloud%3A%20Exploitation%20and%20Detections&amp;severity=medium&amp;id=684c7638a8c921274380db72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/anubis-a-closer-look-at-an-emerging-ransomware-wit-58bb8c41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Anubis%3A%20A%20Closer%20Look%20at%20an%20Emerging%20Ransomware%20with%20Built-in%20Wiper&amp;severity=medium&amp;id=684c87cca8c921274380e914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/victorias-secret-restores-critical-systems-after-c-71d11440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Victoria%E2%80%99s%20Secret%20restores%20critical%20systems%20after%20cyberattack&amp;severity=critical&amp;id=684c28dfa8c9212743808654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-confirmed-that-messages-app-flaw-was-activel-e2527c9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20confirmed%20that%20Messages%20app%20flaw%20was%20actively%20exploited%20in%20the%20wild&amp;severity=medium&amp;id=684c1acfa8c92127438072f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-gang-exploits-simplehelp-rmm-to-comprom-54fc42ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Gang%20Exploits%20SimpleHelp%20RMM%20to%20Compromise%20Utility%20Billing&amp;severity=high&amp;id=684c05b8a8c9212743806086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49468-cwe-89-improper-neutralization-of-s-92f18a60</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49468%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nobossextensions.com%20No%20Boss%20Calendar%20component%20for%20Joomla&amp;severity=high&amp;id=684bf7a9a8c92127438053cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-dark-adtech-empire-fed-by-fake-captchas-f0123fed</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20Dark%20Adtech%20Empire%20Fed%20by%20Fake%20CAPTCHAs&amp;severity=high&amp;id=684bf423a8c92127438050a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-fixes-critical-bugs-in-apex-central-an-22634b80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20fixes%20critical%20bugs%20in%20Apex%20Central%20and%20TMEE%20PolicyServer&amp;severity=critical&amp;id=684bf423a8c92127438050a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29902-cwe-94-improper-control-of-generati-5151af3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29902%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Telex%20Remote%20Dispatch%20Console%20Server&amp;severity=critical&amp;id=684bf09fa8c9212743804e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48825-use-of-less-trusted-source-in-ricoh-24bb9ae0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48825%3A%20Use%20of%20less%20trusted%20source%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX%20V3%20PC%20Client&amp;severity=low&amp;id=684be28fa8c9212743803aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46783-improper-limitation-of-a-pathname-t-665948b5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46783%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX%20V3%20PC%20Client&amp;severity=critical&amp;id=684be28fa8c9212743803aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36506-external-control-of-file-name-or-pa-7eaf49e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36506%3A%20External%20control%20of%20file%20name%20or%20path%20in%20Ricoh%20Company%2C%20Ltd.%20RICOH%20Streamline%20NX%20V3%20PC%20Client&amp;severity=medium&amp;id=684be28fa8c9212743803aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-is-the-real-relationship-between-wordpress-ha-bb69077a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What%20is%20the%20Real%20Relationship%20between%20WordPress%20Hackers%20and%20Malicious%20Adtech%3F&amp;severity=medium&amp;id=684bdf0ca8c9212743803712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beware-of-ai-pickpockets-pickai-backdoor-spreading-2ac2ee30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beware%20of%20AI%20Pickpockets%3A%20Pickai%20Backdoor%20Spreading%20Through%20ComfyUI%20Vulnerability&amp;severity=medium&amp;id=684bdf0ca8c9212743803700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/understanding-cybereye-rat-builder-capabilities-an-fb56accd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Understanding%20CyberEYE%20RAT%20Builder%3A%20Capabilities%20and%20Implications&amp;severity=medium&amp;id=684bdf0ca8c92127438036f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6012-cwe-79-improper-neutralization-of-in-501f2c59</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6012%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaisercrazy%20Auto%20Attachments&amp;severity=medium&amp;id=684bd490a8c9212743802d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39240-vulnerability-in-hikvision-ds-3wap6-0b6d8489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39240%3A%20Vulnerability%20in%20Hikvision%20DS-3WAP622G-SI&amp;severity=high&amp;id=684bd491a8c9212743802da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38824-vulnerability-in-vmware-salt-c678efe9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38824%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=critical&amp;id=69a0a1cc85912abc71d0bd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22242-vulnerability-in-vmware-salt-8e3bec83</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22242%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bd0fda8c9212743802a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22241-vulnerability-in-vmware-salt-8e584f67</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22241%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bd0fda8c9212743802a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22240-vulnerability-in-vmware-salt-0abd6692</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22240%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bd0fda8c9212743802a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22239-vulnerability-in-vmware-salt-f2a57ef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22239%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=high&amp;id=684bd0fda8c9212743802a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22238-vulnerability-in-vmware-salt-65d0ba84</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22238%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bcd89a8c921274380274c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22237-vulnerability-in-vmware-salt-632fbfe9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22237%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=medium&amp;id=684bcd89a8c9212743802748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22236-vulnerability-in-vmware-salt-bde4c7a6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22236%3A%20Vulnerability%20in%20VMware%20SALT&amp;severity=high&amp;id=684bcd89a8c9212743802744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5923-cwe-79-improper-neutralization-of-in-3ad10efa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcdk%20Game%20Review%20Block&amp;severity=medium&amp;id=684bcd89a8c9212743802750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4227-cwe-319-cleartext-transmission-of-se-df972ea7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4227%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=low&amp;id=684bbf71a8c921274380180f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4229-cwe-497-exposure-of-sensitive-system-bc4e4942</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4229%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=684bbbe5a8c921274380152e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5282-cwe-862-missing-authorization-in-wpt-147c6b2c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5282%3A%20CWE-862%20Missing%20Authorization%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=high&amp;id=684ba0b6358c65714e6b6d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5815-cwe-862-missing-authorization-in-dmi-de977259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5815%3A%20CWE-862%20Missing%20Authorization%20in%20dmitriamartin%20Traffic%20Monitor&amp;severity=medium&amp;id=684ba0b6358c65714e6b6d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5491-cwe-269-improper-privilege-managemen-bc39c41d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5491%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Acer%20ControlCenter&amp;severity=high&amp;id=684b8f23358c65714e6b578d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5928-cwe-352-cross-site-request-forgery-c-0d1e8b07</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5928%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fay-1%20WP%20Sliding%20Login%2FDashboard%20Panel&amp;severity=medium&amp;id=684b8f23358c65714e6b579c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5938-cwe-352-cross-site-request-forgery-c-dafe8f75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5938%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themebon%20Digital%20Marketing%20and%20Agency%20Templates%20Addons%20for%20Elementor&amp;severity=medium&amp;id=684b8f24358c65714e6b57af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5123-cwe-79-improper-neutralization-of-in-350db0b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20Contact%20Us%20Page%20%E2%80%93%20Contact%20People&amp;severity=medium&amp;id=684b8f23358c65714e6b577e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5939-cwe-79-improper-neutralization-of-in-81ac2f29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amir-mousavi%20Telegram%20for%20WP&amp;severity=medium&amp;id=684b8f24358c65714e6b57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4586-cwe-79-improper-neutralization-of-in-0af1ed85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irmau%20IRM%20Newsroom&amp;severity=medium&amp;id=684b8f23358c65714e6b577a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5233-cwe-79-improper-neutralization-of-in-6ee07f04</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5233%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thatdevgirl%20Color%20Palette&amp;severity=medium&amp;id=684b8f23358c65714e6b5783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5930-cwe-352-cross-site-request-forgery-c-e26b751f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5930%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitalacornjp%20WP2HTML&amp;severity=medium&amp;id=684b8f24358c65714e6b57aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5841-cwe-79-improper-neutralization-of-in-c2c86878</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andremacola%20ACF%20Onyx%20Poll&amp;severity=medium&amp;id=684b8f23358c65714e6b5792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5926-cwe-352-cross-site-request-forgery-c-425041c1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5926%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jconti%20Link%20Shield&amp;severity=medium&amp;id=684b8f23358c65714e6b5798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5950-cwe-79-improper-neutralization-of-in-cb7236f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5950%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janboddez%20IndieBlocks&amp;severity=medium&amp;id=684b8f24358c65714e6b57b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4584-cwe-79-improper-neutralization-of-in-29b2bc01</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4584%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irmau%20IRM%20Newsroom&amp;severity=medium&amp;id=684b8f23358c65714e6b5772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5288-cwe-862-missing-authorization-in-web-66837af5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5288%3A%20CWE-862%20Missing%20Authorization%20in%20weboccults%20REST%20API%20%7C%20Custom%20API%20Generator%20For%20Cross%20Platform%20And%20Import%20Export%20In%20WP&amp;severity=critical&amp;id=684b8f23358c65714e6b5788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4585-cwe-79-improper-neutralization-of-in-26ee8cdb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4585%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irmau%20IRM%20Newsroom&amp;severity=medium&amp;id=684b8f23358c65714e6b5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47959-cwe-77-improper-neutralization-of-s-b93a32f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47959%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=high&amp;id=684b849b358c65714e6b4f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30399-cwe-426-untrusted-search-path-in-mi-889ff8e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30399%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=684b849b358c65714e6b4f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/freefloat-ftp-server-10-remote-buffer-overflow-008b8257</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Freefloat%20FTP%20Server%201.0%20-%20Remote%20Buffer%20Overflow&amp;severity=medium&amp;id=684d0a38a8c9212743816b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roundcube-1610-remote-code-execution-rce-1b510cae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Roundcube%201.6.10%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=684d0a38a8c9212743816b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-file-explorer-windows-10-pro-x64-tar-extra-def10946</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20File%20Explorer%20Windows%2010%20Pro%20x64%20-%20TAR%20Extraction&amp;severity=medium&amp;id=684d0a38a8c9212743816b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-13-d29d6021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-13&amp;severity=medium&amp;id=684cc003a8c9212743811543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28384-na-9e5fe034</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28384%3A%20n%2Fa&amp;severity=critical&amp;id=684c2c64a8c9212743808993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28382-na-b9b5bb39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28382%3A%20n%2Fa&amp;severity=high&amp;id=684c2c64a8c921274380898f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28381-na-594d0e21</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28381%3A%20n%2Fa&amp;severity=high&amp;id=684c2c64a8c921274380898b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28389-na-7bf777a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28389%3A%20n%2Fa&amp;severity=high&amp;id=684c2c64a8c9212743808987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28388-na-65e6c60f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28388%3A%20n%2Fa&amp;severity=critical&amp;id=684c2c64a8c9212743808983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28386-na-579bd194</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28386%3A%20n%2Fa&amp;severity=critical&amp;id=684c2c64a8c921274380897f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28380-na-00905d4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28380%3A%20n%2Fa&amp;severity=medium&amp;id=684c28eba8c9212743808660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46096-na-9085ff49</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46096%3A%20n%2Fa&amp;severity=medium&amp;id=684c21d8a8c921274380805e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46060-na-12844e2b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46060%3A%20n%2Fa&amp;severity=critical&amp;id=684c21d8a8c9212743808059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45988-na-5d99dec2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45988%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45987-na-d0cf5438</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45987%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45986-na-2222ef68</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45986%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45985-na-10af30f3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45985%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c9212743806650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45984-na-f316c569</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45984%3A%20n%2Fa&amp;severity=critical&amp;id=684c0cc0a8c921274380664d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4228-cwe-266-incorrect-privilege-assignme-a696422b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4228%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=684b6876358c65714e6b31da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4230-cwe-78-improper-neutralization-of-sp-7a406b05</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4230%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=684b64f2358c65714e6b22df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4231-cwe-77-improper-neutralization-of-sp-2f3197dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4231%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=684b64f2358c65714e6b22e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4232-cwe-155-improper-neutralization-of-w-080b37f8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4232%3A%20CWE-155%3A%20Improper%20Neutralization%20of%20Wildcards%20or%20Matching%20Symbols%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=684b64f2358c65714e6b22e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4233-cwe-524-use-of-cache-containing-sens-55d6b8d1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4233%3A%20CWE-524%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Prisma%20Access%20Browser&amp;severity=medium&amp;id=684b535f358c65714e6b0ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/graphite-caught-first-forensic-confirmation-of-par-01db231e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Graphite%20Caught%3A%20First%20Forensic%20Confirmation%20of%20Paragon&apos;s%20iOS%20Mercenary%20Spyware%20Finds%20Journalists%20Targeted&amp;severity=medium&amp;id=684be28ea8c9212743803a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/know-thyself-know-thy-environment-fe1cca75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Know%20thyself%2C%20know%20thy%20environment&amp;severity=medium&amp;id=684be28ea8c9212743803a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41233-cwe-89-improper-neutralization-of-s-90bbcbc4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41233%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VMware%20Avi%20Load%20Balancer&amp;severity=medium&amp;id=684b4c57358c65714e6b07b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41234-cwe-113-improper-neutralization-of--87aadec5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41234%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Response%20Splitting&apos;)%20in%20VMware%20Spring%20Framework&amp;severity=medium&amp;id=684b454f358c65714e6b0221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27689-cwe-284-improper-access-control-in--a18290de</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27689%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20iDRAC%20Tools&amp;severity=high&amp;id=684b3e47358c65714e6afd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5485-cwe-204-in-sinotrack-iot-pc-platform-5be9462b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5485%3A%20CWE-204%20in%20SinoTrack%20IOT%20PC%20Platform&amp;severity=high&amp;id=684b3748358c65714e6af79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5484-cwe-1390-in-sinotrack-iot-pc-platfor-da98d531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5484%3A%20CWE-1390%20in%20SinoTrack%20IOT%20PC%20Platform&amp;severity=high&amp;id=684b3748358c65714e6af799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36539-cwe-248-in-aveva-pi-data-archive-cdd31ff9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36539%3A%20CWE-248%20in%20AVEVA%20PI%20Data%20Archive&amp;severity=medium&amp;id=684b33bd358c65714e6af41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44019-cwe-248-in-aveva-pi-data-archive-2afbaf5e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44019%3A%20CWE-248%20in%20AVEVA%20PI%20Data%20Archive&amp;severity=high&amp;id=684b33bd358c65714e6af422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2745-cwe-79-in-aveva-pi-web-api-879101d4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2745%3A%20CWE-79%20in%20AVEVA%20PI%20Web%20API&amp;severity=medium&amp;id=684b303f358c65714e6af06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4418-cwe-354-in-aveva-pi-connector-for-cy-b20ce90d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4418%3A%20CWE-354%20in%20AVEVA%20PI%20Connector%20for%20CygNet&amp;severity=medium&amp;id=684b303f358c65714e6af070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4417-cwe-79-in-aveva-pi-connector-for-cyg-f2b3cf36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4417%3A%20CWE-79%20in%20AVEVA%20PI%20Connector%20for%20CygNet&amp;severity=medium&amp;id=684b2cba358c65714e6aede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6031-cwe-672-operation-on-a-resource-afte-a126cfc9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6031%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20Amazon%20Cloud%20Cam&amp;severity=high&amp;id=684b2cba358c65714e6aedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49576-cwe-79-improper-neutralization-of-i-5829eb03</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49576%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b25b2358c65714e6ae79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49578-cwe-79-improper-neutralization-of-i-df5a5e87</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49578%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b25b2358c65714e6ae79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49579-cwe-79-improper-neutralization-of-i-6465c108</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49579%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b25b2358c65714e6ae7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49575-cwe-79-improper-neutralization-of-i-31cc7b49</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49575%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b2228358c65714e6ae293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49577-cwe-79-improper-neutralization-of-i-7766b096</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49577%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-skins-Citizen&amp;severity=medium&amp;id=684b2228358c65714e6ae298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/influencing-llm-output-using-logprobs-and-token-di-092d7943</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Influencing%20LLM%20Output%20using%20logprobs%20and%20Token%20Distribution&amp;severity=medium&amp;id=684b1b27358c65714e6ac5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49081-vulnerability-in-absolute-security--2b2f7183</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49081%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=684b109e358c65714e6abd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49080-vulnerability-in-absolute-security--56ad0a7e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49080%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=high&amp;id=684b0d11358c65714e6aba7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/introducing-github-device-code-phishing-a6fd1365</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Introducing%3A%20GitHub%20Device%20Code%20Phishing&amp;severity=low&amp;id=684aff08358c65714e6aafa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/millions-of-vulnerabilities-one-checklist-to-kill--c64539c0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Millions%20of%20Vulnerabilities%3A%20One%20Checklist%20to%20Kill%20The%20Noise&amp;severity=medium&amp;id=684af47b358c65714e6a96f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49467-cwe-89-improper-neutralization-of-s-13928faa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49467%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jevents.net%20%2F%20GWE%20Systems%20Ltd%20JEvents%20component%20for%20Joomla&amp;severity=critical&amp;id=684af476358c65714e6a96e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36573-cwe-532-insertion-of-sensitive-info-14de938c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36573%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20Smart%20Dock&amp;severity=high&amp;id=684af476358c65714e6a96df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/visual-studio-178-goes-end-of-life-on-july-8th-68079ca8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Visual%20Studio%2017.8%20Goes%20End-of-Life%20on%20July%208th&amp;severity=medium&amp;id=684af0ef358c65714e6a9444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56158-cwe-89-improper-neutralization-of-s-89fdc85d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56158%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=69650e81da2266e838bdb817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49200-cwe-200-exposure-of-sensitive-infor-ac17c20e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49200%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae666358c65714e6a8a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49199-cwe-345-insufficient-verification-o-5df66ad4</loc>
    <lastmod>2026-03-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49199%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=high&amp;id=684ae666358c65714e6a8a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49198-cwe-330-use-of-insufficiently-rando-519121b1</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49198%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=low&amp;id=684ae666358c65714e6a8a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49197-cwe-328-use-of-weak-hash-in-sick-ag-bc757bb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49197%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=medium&amp;id=684ae666358c65714e6a8a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49196-cwe-327-use-of-a-broken-or-risky-cr-b3f69d27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49196%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae666358c65714e6a8a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49195-cwe-307-improper-restriction-of-exc-7cd17f2e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49195%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=medium&amp;id=684ae2e2358c65714e6a8720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49194-cwe-319-cleartext-transmission-of-s-fd03a3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49194%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ae2e2358c65714e6a8718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49193-cwe-693-protection-mechanism-failur-b479587e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49193%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20SICK%20AG%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49192-cwe-1021-improper-restriction-of-re-aae1b340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49192%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49191-cwe-1021-improper-restriction-of-re-5f5afed6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49191%3A%20CWE-1021%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49190-cwe-918-server-side-request-forgery-45d686ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49190%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49189-cwe-1004-sensitive-cookie-without-h-45b5231e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49189%3A%20CWE-1004%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=medium&amp;id=684ae2e2358c65714e6a8738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49188-cwe-598-use-of-get-request-method-w-50898db4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49188%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ae2e2358c65714e6a8730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-open-source-agent-hacked-mercado-libre-cd791846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20Open%20Source%20agent%20hacked%20Mercado%20libre&amp;severity=medium&amp;id=684adf63358c65714e6a8415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49187-cwe-204-observable-response-discrep-16c0f451</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49187%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ad856358c65714e6a7e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49186-cwe-79-improper-neutralization-of-i-3329594f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49186%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20SICK%20AG%20Field%20Analytics&amp;severity=medium&amp;id=684ad856358c65714e6a7e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49185-cwe-79-improper-neutralization-of-i-537079ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SICK%20AG%20SICK%20Field%20Analytics&amp;severity=medium&amp;id=684ad856358c65714e6a7e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49184-cwe-200-exposure-of-sensitive-infor-232df4ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49184%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SICK%20AG%20Field%20Analytics&amp;severity=high&amp;id=684ad856358c65714e6a7e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49183-cwe-319-cleartext-transmission-of-s-20e6f4e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49183%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ad856358c65714e6a7e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49182-cwe-862-missing-authorization-in-si-5903408c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49182%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ad4d2358c65714e6a7475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49181-cwe-862-missing-authorization-in-si-4753f541</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49181%3A%20CWE-862%20Missing%20Authorization%20in%20SICK%20AG%20SICK%20Media%20Server&amp;severity=high&amp;id=684ad4d2358c65714e6a746d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6021-stack-based-buffer-overflow-in-red-h-0a879e1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6021%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=684ad14d358c65714e6a717c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meta-is-able-to-track-its-users-via-webrtc-on-andr-748fb748</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meta%20is%20able%20to%20track%20it%E2%80%99s%20users%20via%20WebRTC%20on%20Android%20including%20private%20mode%20and%20behind%20VPN&amp;severity=medium&amp;id=684ac6c6358c65714e6a69c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fog-ransomware-attack-uses-unusual-mix-of-legitima-cf9db057</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fog%20ransomware%20attack%20uses%20unusual%20mix%20of%20legitimate%20and%20open-source%20tools&amp;severity=high&amp;id=684ab1a9358c65714e6a55c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-tops-list-of-unsecured-cameras-exposing-homes-a-b3ad817d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20Tops%20List%20of%20Unsecured%20Cameras%20Exposing%20Homes%20and%20Offices%2C%20BitSight%20Reveals&amp;severity=medium&amp;id=684ab1a9358c65714e6a55c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stryker-android-pentesting-app-with-premium-access-295ab760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stryker%20-%20Android%20pentesting%20app%20with%20premium%20access%20is%20now%20free%20until%202050&amp;severity=low&amp;id=684aa39e358c65714e6a4b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-80000-microsoft-entra-id-accounts-targeted-us-13e54cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2080%2C000%20Microsoft%20Entra%20ID%20Accounts%20Targeted%20Using%20Open-Source%20TeamFiltration%20Tool&amp;severity=high&amp;id=684aa019358c65714e6a47f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exposed-eyes-40000-security-cameras-vulnerable-to--21c989c6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exposed%20eyes%3A%2040%2C000%20security%20cameras%20vulnerable%20to%20remote%20hacking&amp;severity=medium&amp;id=684aa019358c65714e6a47fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4613-cwe-20-improper-input-validation-in--3a3420e4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4613%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20Web%20Designer%20App&amp;severity=high&amp;id=684a9c92358c65714e6a458b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6003-cwe-863-incorrect-authorization-in-c-98d3442e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6003%3A%20CWE-863%20Incorrect%20Authorization%20in%20cyberlord92%20WordPress%20Single%20Sign-On%20(SSO)%20-%20Single%20Site%20Standard&amp;severity=medium&amp;id=684a9206358c65714e6a3cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40592-cwe-22-improper-limitation-of-a-pat-a553fc8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40592%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20Mendix%20Studio%20Pro%2010&amp;severity=medium&amp;id=684a8e82358c65714e6a3a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5301-cwe-79-improper-neutralization-of-in-ce651dc2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OnlyOffice%20Docs%20(DocumentServer)&amp;severity=medium&amp;id=684a8afe358c65714e6a37eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35978-improper-restriction-of-communicati-4b24bcf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35978%3A%20Improper%20restriction%20of%20communication%20channel%20to%20intended%20endpoints%20in%20Fujitsu%20Client%20Computing%20Limited%20UpdateNavi&amp;severity=high&amp;id=684a7262358c65714e6a2530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4973-cwe-288-authentication-bypass-using--cb31097a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4973%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap&amp;severity=critical&amp;id=684a67d6358c65714e6a146b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5012-cwe-434-unrestricted-upload-of-file--46a41291</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5012%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AmentoTech%20Workreap&amp;severity=high&amp;id=684a67d6358c65714e6a146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erie-insurance-confirms-cyberattack-behind-busines-bdec66d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Erie%20Insurance%20confirms%20cyberattack%20behind%20business%20disruptions&amp;severity=high&amp;id=684a4f38358c65714e6a0369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smartattack-uses-smartwatches-to-steal-data-from-a-2cf23e6d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SmartAttack%20uses%20smartwatches%20to%20steal%20data%20from%20air-gapped%20systems&amp;severity=high&amp;id=684a4f38358c65714e6a0371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6009-sql-injection-in-kicode111-like-girl-dcd0185a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6009%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a412e358c65714e69f338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6008-sql-injection-in-kicode111-like-girl-35528307</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6008%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a369d358c65714e69eaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6007-sql-injection-in-kicode111-like-girl-8053991a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6007%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a369d358c65714e69ea9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6006-sql-injection-in-kicode111-like-girl-e70288d9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6006%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a2c11358c65714e69e35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6005-sql-injection-in-kicode111-like-girl-d8caeee1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6005%3A%20SQL%20Injection%20in%20kiCode111%20like-girl&amp;severity=medium&amp;id=684a2c11358c65714e69e357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-12-ccb296c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-12&amp;severity=medium&amp;id=684b6bf1358c65714e6b3296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44091-na-40642269</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44091%3A%20n%2Fa&amp;severity=high&amp;id=684b3ac9358c65714e6afa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46035-na-98ecd6de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46035%3A%20n%2Fa&amp;severity=high&amp;id=684af476358c65714e6a96e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29744-na-64d5efcd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29744%3A%20n%2Fa&amp;severity=medium&amp;id=684af476358c65714e6a96db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-the-triple-combo-threat-of-the-kimsuky-fda3d799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20the%20Triple%20Combo%20Threat%20of%20the%20Kimsuky%20Group&amp;severity=medium&amp;id=684a0009c06833077b26c2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zero-click-ai-data-leak-flaw-uncovered-in-microsof-71aff87b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zero-click%20AI%20data%20leak%20flaw%20uncovered%20in%20Microsoft%20365%20Copilot&amp;severity=high&amp;id=6849deb978307950bca180ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30085-cwe-94-improper-control-of-generati-4d78d077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30085%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rsjoomla.com%20RSform!Pro%20component%20for%20Joomla&amp;severity=critical&amp;id=6849d6100d5ebfc3fd66de4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32466-cwe-89-improper-neutralization-of-s-3a47a7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32466%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rsjoomla.com%20RSMediaGallery%20component%20for%20Joomla&amp;severity=medium&amp;id=6849d6100d5ebfc3fd66de55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32465-cwe-79-improper-neutralization-of-i-0fa2aeb6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSTickets!%20component%20for%20Joomla&amp;severity=high&amp;id=6849d6100d5ebfc3fd66de52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49150-cwe-200-exposure-of-sensitive-infor-55597135</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49150%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20getcursor%20cursor&amp;severity=medium&amp;id=6849c32c527d26c5b90ccd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40912-cwe-1395-dependency-on-vulnerable-t-b0ea859d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40912%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20MIK%20CryptX&amp;severity=critical&amp;id=6849c32c527d26c5b90ccd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0923-cwe-540-inclusion-of-sensitive-infor-ae0da7c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0923%3A%20CWE-540%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=6849bfa7527d26c5b90cca12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0917-cwe-79-improper-neutralization-of-in-6f63c2eb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=6849bfa7527d26c5b90cca0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25032-cwe-770-allocation-of-resources-wit-e7950dd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25032%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Cognos%20Analytics&amp;severity=high&amp;id=6849bfa7527d26c5b90cca15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0913-cwe-59-improper-link-resolution-befo-d27bf59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0913%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Go%20standard%20library%20syscall&amp;severity=medium&amp;id=6849bbac23110031d410557b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40915-cwe-338-use-of-cryptographically-we-cd53eed2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40915%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20in%20GRYPHON%20Mojolicious%3A%3APlugin%3A%3ACSRF&amp;severity=high&amp;id=6849bbac23110031d4105581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4673-cwe-201-insertion-of-sensitive-infor-b56af503</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4673%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=medium&amp;id=6849b4aa23110031d4104ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22874-cwe-295-improper-certificate-valida-b2e30c3a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22874%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Go%20standard%20library%20crypto%2Fx509&amp;severity=high&amp;id=6849b4aa23110031d4104ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1699-cwe-276-incorrect-default-permission-bc0f5ef3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1699%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Motorola%20g34&amp;severity=low&amp;id=6849ad9c23110031d4104321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1698-cwe-476-null-pointer-dereference-in--b39c0489</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1698%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Motorola%20Razr%2040%20Ultra&amp;severity=low&amp;id=6849ad9c23110031d410431e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26383-cwe-457-use-of-uninitialized-variab-566b26cb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26383%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=medium&amp;id=6849a69523110031d4103be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49148-cwe-427-uncontrolled-search-path-el-55e0cc74</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49148%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20thevindu-w%20clip_share_server&amp;severity=high&amp;id=68499c0e23110031d41030c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48447-cwe-79-improper-neutralization-of-i-4992b3a5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Lightgallery&amp;severity=high&amp;id=6849989023110031d4102824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48448-cwe-770-allocation-of-resources-wit-a22d0c5e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48448%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Drupal%20Admin%20Audit%20Trail&amp;severity=medium&amp;id=6849989023110031d4102827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48446-cwe-863-incorrect-authorization-in--035ff193</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48446%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Commerce%20Alphabank%20Redirect&amp;severity=high&amp;id=6849989023110031d4102821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48445-cwe-863-incorrect-authorization-in--e58aa0db</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48445%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Commerce%20Eurobank%20(Redirect)&amp;severity=high&amp;id=6849989023110031d410281e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3473-cwe-277-insecure-inherited-permissio-0ff8d8d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3473%3A%20CWE-277%20Insecure%20Inherited%20Permissions%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=6849950223110031d41023ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0163-cwe-204-response-discrepancy-informa-04ca9b57</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0163%3A%20CWE-204%20Response%20Discrepancy%20Information%20Exposure%20in%20IBM%20Security%20Verify%20Access&amp;severity=medium&amp;id=6849950223110031d41023cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48013-cwe-862-missing-authorization-in-dr-39c59d3a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48013%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Quick%20Node%20Block&amp;severity=medium&amp;id=6849950223110031d41023d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48444-cwe-862-missing-authorization-in-dr-12a5a10e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48444%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Quick%20Node%20Block&amp;severity=medium&amp;id=6849950223110031d41023d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40914-cwe-1395-dependency-on-vulnerable-t-64839f7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40914%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20MIK%20CryptX&amp;severity=critical&amp;id=6849989023110031d4102818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4605-cwe-789-memory-allocation-with-exces-e1bb095e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4605%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Autodesk%20USD%20for%20Maya&amp;severity=medium&amp;id=68498e0523110031d4101335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/weaponized-google-oauth-triggers-malicious-websock-16b17453</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Weaponized%20Google%20OAuth%20Triggers%20Malicious%20WebSocket&amp;severity=medium&amp;id=684986fc23110031d40ff910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4922-cwe-266-incorrect-privilege-assignme-83a46742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4922%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20HashiCorp%20Nomad&amp;severity=high&amp;id=684986f623110031d40ff6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-secure-interpol-disrupts-20000-infosteal-3b98b3d7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Secure%3A%20INTERPOL%20Disrupts%2020%2C000%20Infostealer%20Domains%2C%2032%20Arrested%20and%20%20216%2C000%20Victims%20Notified&amp;severity=medium&amp;id=6849836b23110031d40fec8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32711-cwe-77-improper-neutralization-of-s-944d08cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32711%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Microsoft%20Microsoft%20365%20Copilot&amp;severity=critical&amp;id=684986f623110031d40ff6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/getting-rce-on-monero-forums-with-wrapwrap-1cae4cc8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Getting%20RCE%20on%20Monero%20forums%20with%20wrapwrap&amp;severity=medium&amp;id=6849838223110031d40fece1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35941-vulnerability-in-myscada-mypro-7e26d1dc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35941%3A%20Vulnerability%20in%20mySCADA%20myPRO&amp;severity=medium&amp;id=6849837d23110031d40fecd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/les-comptes-machines-dans-active-directory-1b90d0b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Les%20comptes%20machines%20dans%20Active%20Directory&amp;severity=medium&amp;id=68497fed23110031d40fdddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-industry-cloud-hit-by-20-vulnerabilitie-51d08865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Industry%20Cloud%20Hit%20by%2020%20Vulnerabilities%20Including%20Several%200days&amp;severity=medium&amp;id=684978de23110031d40faf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sinotrack-gps-devices-vulnerable-to-remote-vehicle-01b2aa6c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SinoTrack%20GPS%20Devices%20Vulnerable%20to%20Remote%20Vehicle%20Control%20via%20Default%20Passwords&amp;severity=high&amp;id=684978de23110031d40faf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5144-cwe-79-improper-neutralization-of-in-1443df8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theeventscalendar%20The%20Events%20Calendar&amp;severity=medium&amp;id=684978f723110031d40faf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5986-unsolicited-file-download-disk-space-ccd61093</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5986%3A%20Unsolicited%20File%20Download%2C%20Disk%20Space%20Exhaustion%2C%20and%20Credential%20Leakage%20via%20mailbox%3A%2F%2F%2F%20Links%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=6849756223110031d40fa8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49710-integer-overflow-in-orderedhashtabl-29b58f70</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49710%3A%20Integer%20overflow%20in%20OrderedHashTable%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6849756223110031d40fa8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49709-memory-corruption-in-canvas-surface-7eeaa617</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49709%3A%20Memory%20corruption%20in%20canvas%20surfaces%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6849756223110031d40fa8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5687-local-privilege-escalation-vulnerabi-6f75b924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5687%3A%20Local%20privilege%20escalation%20vulnerability%20in%20Mozilla%20VPN%20clients%20for%20macOS%20v2.27.0%20and%20below.%20in%20Mozilla%20Mozilla%20VPN%202.28.0&amp;severity=high&amp;id=6849756223110031d40fa8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3302-cwe-79-improper-neutralization-of-in-95be26ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xagio%20Xagio%20SEO%20%E2%80%93%20AI%20Powered%20SEO&amp;severity=high&amp;id=684968f59ea7c3ca70af288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-infrastructure-of-a-spearphishing-ca-f029bd43</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20Infrastructure%20of%20a%20Spear%E2%80%91phishing%20Campaign&amp;severity=medium&amp;id=684953df9ea7c3ca70af04f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eggs-in-a-cloudy-basket-skeleton-spiders-trusted-c-ce2f8c22</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Eggs%20in%20a%20Cloudy%20Basket%3A%20Skeleton%20Spider&apos;s%20Trusted%20Cloud%20Malware%20Delivery&amp;severity=medium&amp;id=684953df9ea7c3ca70af04d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4315-cwe-269-improper-privilege-managemen-ad3ee204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4315%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20cubewp1211%20CubeWP%20%E2%80%93%20All-in-One%20Dynamic%20Content%20Framework&amp;severity=high&amp;id=684950599ea7c3ca70af0097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26412-cwe-912-hidden-functionality-in-sim-ba7b536f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26412%3A%20CWE-912%20Hidden%20Functionality%20in%20SIMCom%20SIM7600G%20Modem&amp;severity=medium&amp;id=6849402963853f603f4ba3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41663-cwe-78-improper-neutralization-of-s-b894f5ce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41663%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=critical&amp;id=68493ca3cacb3d99bea60348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41661-cwe-352-cross-site-request-forgery--30917437</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41661%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Weidmueller%20IE-SR-2TX-WL&amp;severity=high&amp;id=68493ca3cacb3d99bea60342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41662-cwe-352-cross-site-request-forgery--416abcba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41662&amp;severity=null&amp;id=68493ca3cacb3d99bea60345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29756-cwe-862-missing-authorization-in-su-518d8962</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29756%3A%20CWE-862%20Missing%20Authorization%20in%20SunGrow%20iSolarCloud&amp;severity=high&amp;id=6849397cb3117cc9568fa574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5991-cwe-416-use-after-free-in-the-qt-com-777449df</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5991%3A%20CWE-416%20Use%20After%20Free%20in%20The%20Qt%20Company%20Qt&amp;severity=low&amp;id=6849339d72c9cfbdf1192f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5395-cwe-434-unrestricted-upload-of-file--f14692b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5395%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ValvePress%20WordPress%20Automatic%20Plugin&amp;severity=high&amp;id=684929083cd93dcca832a588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4799-cwe-36-absolute-path-traversal-in-ga-4e331953</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4799%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20gamerz%20WP-DownloadManager&amp;severity=high&amp;id=6848fed43cd93dcca831b163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4798-cwe-200-exposure-of-sensitive-inform-a1ee2a06</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4798%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gamerz%20WP-DownloadManager&amp;severity=medium&amp;id=6848fed43cd93dcca831b15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4666-cwe-79-improper-neutralization-of-in-6dce439d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kseaborn%20Zotpress&amp;severity=medium&amp;id=6848fed43cd93dcca831b156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5959-type-confusion-in-google-chrome-a93942f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5959%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=6848d81a3cd93dcca8315ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5958-use-after-free-in-google-chrome-cddfc618</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5958%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6848d81a3cd93dcca8315ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4275-cwe-284-improper-access-control-in-i-93fc4867</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4275%3A%20cwe-284%3A%20Improper%20Access%20Control%20in%20Insyde%20Software%20InsydeH2O&amp;severity=high&amp;id=6848d1753cd93dcca8315821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-11-c8ef9bf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-11&amp;severity=medium&amp;id=684a1a71358c65714e69d43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1055-cwe-862-missing-authorization-in-k7--1a640357</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1055%3A%20CWE-862%20Missing%20Authorization%20in%20K7%20Security%20K7%20Security%20Anti-Malware&amp;severity=medium&amp;id=6848c2e63cd93dcca8312f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32717-cwe-122-heap-based-buffer-overflow--bd005210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32717%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=6848bf863cd93dcca8312d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30675-cwe-200-exposure-of-sensitive-infor-27b04ee8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30675%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=medium&amp;id=6848bf863cd93dcca8312d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22829-cwe-269-improper-privilege-manageme-97dd294a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22829%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=low&amp;id=6848bbe13cd93dcca831279f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26521-cwe-200-exposure-of-sensitive-infor-e9ab2d2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26521%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=high&amp;id=6848bbe13cd93dcca83127a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47849-cwe-269-improper-privilege-manageme-82c1d190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47849%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=high&amp;id=6848bbe13cd93dcca83127ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47713-cwe-269-improper-privilege-manageme-234d7084</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47713%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apache%20Software%20Foundation%20Apache%20CloudStack&amp;severity=high&amp;id=6848bbe13cd93dcca83127a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-secure-boot-flaw-lets-attackers-install-bootki-bce14ef7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Secure%20Boot%20flaw%20lets%20attackers%20install%20bootkit%20malware%2C%20patch%20now&amp;severity=high&amp;id=6848b86f3cd93dcca83126f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5985-improper-authentication-in-code-proj-29d98039</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5985%3A%20Improper%20Authentication%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6848b4e53cd93dcca831247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5984-cross-site-scripting-in-sourcecodest-4670b4f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5984%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=6848b4e53cd93dcca8312474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/june-2025-patch-tuesday-microsoft-fixes-66-bugs-in-3039dd89</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=June%202025%20Patch%20Tuesday%3A%20Microsoft%20Fixes%2066%20Bugs%2C%20Including%20Active%200-Day&amp;severity=medium&amp;id=6848b4ea3cd93dcca83124a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46995-cross-site-scripting-stored-xss-cwe-b6ff5c93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46995%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46917-cross-site-scripting-stored-xss-cwe-ba8f2f25</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46917%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46901-cross-site-scripting-stored-xss-cwe-b98f668b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46901%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47052-cross-site-scripting-dom-based-xss--d8861391</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47052%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831204f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46954-cross-site-scripting-dom-based-xss--6beb1e78</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46954%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47077-cross-site-scripting-stored-xss-cwe-12977352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47077%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47091-cross-site-scripting-stored-xss-cwe-386d13c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47091%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47065-cross-site-scripting-stored-xss-cwe-2a8983f7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47065%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47015-cross-site-scripting-stored-xss-cwe-12e7f36d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47015%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47029-cross-site-scripting-stored-xss-cwe-9d4ee650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47029%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8311ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47060-cross-site-scripting-stored-xss-cwe-c949b458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47060%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831205b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46951-cross-site-scripting-stored-xss-cwe-accbd6fa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46951%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46985-cross-site-scripting-stored-xss-cwe-5da9247d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46985%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46874-cross-site-scripting-reflected-xss--54ae67a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46874%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47075-cross-site-scripting-stored-xss-cwe-f1904403</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47075%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831208c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46971-cross-site-scripting-stored-xss-cwe-55be243c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46971%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46997-cross-site-scripting-stored-xss-cwe-797cc985</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46997%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46922-cross-site-scripting-stored-xss-cwe-5c4db05e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46922%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47102-cross-site-scripting-dom-based-xss--a1869c86</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47102&amp;severity=high&amp;id=6848b19c3cd93dcca83120ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46882-cross-site-scripting-stored-xss-cwe-853f6dc3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46882%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46991-cross-site-scripting-stored-xss-cwe-b58a2791</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46991%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47016-cross-site-scripting-stored-xss-cwe-066d0e1e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47016%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46978-cross-site-scripting-stored-xss-cwe-bfa4c738</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46978%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46878-cross-site-scripting-stored-xss-cwe-b94706fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46878%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47073-cross-site-scripting-stored-xss-cwe-6b63d2c1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47073%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47041-cross-site-scripting-dom-based-xss--7e7a8796</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47041%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831202a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46838-cross-site-scripting-dom-based-xss--c4935324</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46838%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46942-cross-site-scripting-stored-xss-cwe-71b0c5f0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46942%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46949-cross-site-scripting-stored-xss-cwe-60ce24df</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46949%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46989-cross-site-scripting-dom-based-xss--e246d928</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46989%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46981-cross-site-scripting-stored-xss-cwe-1a68c55f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46981%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46905-cross-site-scripting-stored-xss-cwe-2c06ee4f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46905%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47050-cross-site-scripting-dom-based-xss--bf2d7d09</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47050%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831203f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46918-cross-site-scripting-stored-xss-cwe-9f545d23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46918%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46976-cross-site-scripting-dom-based-xss--69cb87d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46976%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47085-cross-site-scripting-stored-xss-cwe-dba40c0d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47085%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47115-cross-site-scripting-stored-xss-cwe-5febf056</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47115%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47096-improper-input-validation-cwe-20-in-23514cf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47096%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=low&amp;id=6848b19c3cd93dcca83120df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47092-cross-site-scripting-stored-xss-cwe-ad016fac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47092%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47057-cross-site-scripting-dom-based-xss--d8ac3897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47057%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46910-cross-site-scripting-stored-xss-cwe-120787ab</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46910%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46903-cross-site-scripting-stored-xss-cwe-87d19bf0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46903%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46979-cross-site-scripting-stored-xss-cwe-4a7dbb09</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46979%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46845-cross-site-scripting-stored-xss-cwe-de870850</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46845%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46999-cross-site-scripting-stored-xss-cwe-480213b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46999%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47114-cross-site-scripting-stored-xss-cwe-1e9e8dfc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47114%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47040-cross-site-scripting-dom-based-xss--387b6497</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47040%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47074-cross-site-scripting-stored-xss-cwe-9f55b22b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47074%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47017-cross-site-scripting-stored-xss-cwe-688a7a41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47017%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47034-cross-site-scripting-dom-based-xss--c146d3cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47034%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831200b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47006-cross-site-scripting-stored-xss-cwe-876fc7be</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47006%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47027-cross-site-scripting-dom-based-xss--c4e57429</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47027%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47067-cross-site-scripting-stored-xss-cwe-f02f4d06</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47067%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46957-cross-site-scripting-stored-xss-cwe-01351d48</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46957%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46974-cross-site-scripting-dom-based-xss--5d35222e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46974%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46947-cross-site-scripting-stored-xss-cwe-12eae8b5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46947%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47080-cross-site-scripting-stored-xss-cwe-fc01c385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47080%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46887-cross-site-scripting-stored-xss-cwe-8e0a18f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46887%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47045-cross-site-scripting-dom-based-xss--99da9519</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47045%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47026-cross-site-scripting-stored-xss-cwe-6e70876e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47026%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46990-cross-site-scripting-stored-xss-cwe-002c2b51</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46990%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46895-cross-site-scripting-stored-xss-cwe-621a1fb6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46895%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46890-cross-site-scripting-dom-based-xss--cf308448</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46890%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46923-cross-site-scripting-stored-xss-cwe-7ba7e4a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46923%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46924-cross-site-scripting-stored-xss-cwe-b25efd0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46924%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46988-cross-site-scripting-dom-based-xss--ddd4a989</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46988%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46975-cross-site-scripting-dom-based-xss--12658c3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46975%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46956-cross-site-scripting-dom-based-xss--f85aa0f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46956%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46848-cross-site-scripting-dom-based-xss--15405fb8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46848%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46982-cross-site-scripting-stored-xss-cwe-3d3c0a1c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46982%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47071-cross-site-scripting-stored-xss-cwe-66a85286</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47071%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47039-cross-site-scripting-dom-based-xss--57e80992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47039%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46906-cross-site-scripting-stored-xss-cwe-741cf63a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46906%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46850-cross-site-scripting-stored-xss-cwe-683338b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46850%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46939-cross-site-scripting-stored-xss-cwe-6c8b663b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46939%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46871-cross-site-scripting-stored-xss-cwe-32600f04</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46871%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47036-cross-site-scripting-dom-based-xss--24e44cc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47036%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46915-cross-site-scripting-stored-xss-cwe-f65353dd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46915%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47056-cross-site-scripting-dom-based-xss--9f46b0ad</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47056%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46888-cross-site-scripting-stored-xss-cwe-35ddbc25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46888%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47066-cross-site-scripting-stored-xss-cwe-7e8aeb32</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47066%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46855-cross-site-scripting-stored-xss-cwe-39b6ead7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46855%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47004-cross-site-scripting-stored-xss-cwe-725e65db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47004%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46872-cross-site-scripting-dom-based-xss--ef56fb31</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46872%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47070-cross-site-scripting-stored-xss-cwe-9f0ddb10</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47070%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831207d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47079-cross-site-scripting-stored-xss-cwe-fffc4f49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47079%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46841-cross-site-scripting-stored-xss-cwe-dc6320e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46841%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46919-cross-site-scripting-stored-xss-cwe-6cd3f2fc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46919%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47019-cross-site-scripting-stored-xss-cwe-2c08bfcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47019%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47021-cross-site-scripting-stored-xss-cwe-99d3c333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47021%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47038-cross-site-scripting-dom-based-xss--0b579d9a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47038%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46880-cross-site-scripting-stored-xss-cwe-724f2aee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46880%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47012-cross-site-scripting-stored-xss-cwe-22d82bd8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47012%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46913-cross-site-scripting-stored-xss-cwe-be2dd1c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46913%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46854-cross-site-scripting-dom-based-xss--423bfe26</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46854%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46909-cross-site-scripting-stored-xss-cwe-a85740f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46909%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46927-cross-site-scripting-stored-xss-cwe-d0ada617</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46927%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47116-cross-site-scripting-stored-xss-cwe-c20d6df0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47116%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47062-cross-site-scripting-stored-xss-cwe-6ee54a49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47062%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831205e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46902-cross-site-scripting-stored-xss-cwe-7cdf3fb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46902%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46965-cross-site-scripting-stored-xss-cwe-8939d689</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46965%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46900-cross-site-scripting-stored-xss-cwe-abf959b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46900%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46952-cross-site-scripting-stored-xss-cwe-00640e2d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46952%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47082-cross-site-scripting-stored-xss-cwe-c05c79a2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47082%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46899-cross-site-scripting-stored-xss-cwe-8a4a4690</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46899%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47020-cross-site-scripting-stored-xss-cwe-77b26c47</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47020%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47005-cross-site-scripting-dom-based-xss--34481a11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47005%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46948-cross-site-scripting-stored-xss-cwe-ec76af32</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46948%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46876-cross-site-scripting-stored-xss-cwe-c90d730d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46876%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46931-cross-site-scripting-stored-xss-cwe-8f1268e6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46931%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47022-cross-site-scripting-dom-based-xss--5253bc60</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47022%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46945-cross-site-scripting-stored-xss-cwe-0ef26e5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46945%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46904-cross-site-scripting-stored-xss-cwe-66221ed8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46904%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46860-cross-site-scripting-stored-xss-cwe-39698da1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46860%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47048-cross-site-scripting-dom-based-xss--7848f58d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47048%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46879-cross-site-scripting-stored-xss-cwe-6da86361</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46879%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47069-cross-site-scripting-stored-xss-cwe-0c7f42c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47069%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831207a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47081-cross-site-scripting-stored-xss-cwe-e1cbdcb4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47081%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47033-cross-site-scripting-dom-based-xss--0fec6bee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47033%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46941-cross-site-scripting-stored-xss-cwe-1ebfec48</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46941%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46986-cross-site-scripting-stored-xss-cwe-f1e21842</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46986%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46898-cross-site-scripting-dom-based-xss--82f5c0f6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46898%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46893-cross-site-scripting-stored-xss-cwe-ba28c882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46893%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46929-cross-site-scripting-stored-xss-cwe-7156628f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46929%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46983-cross-site-scripting-stored-xss-cwe-bdf11baf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46983%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46916-cross-site-scripting-stored-xss-cwe-44fb0952</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46916%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46953-cross-site-scripting-stored-xss-cwe-dc637c1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46953%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47032-cross-site-scripting-dom-based-xss--e421948a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47032%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46861-cross-site-scripting-stored-xss-cwe-2d587f8b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46861%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46926-cross-site-scripting-stored-xss-cwe-595af46c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46926%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47008-cross-site-scripting-stored-xss-cwe-457ec13d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47008%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47044-cross-site-scripting-dom-based-xss--5da88c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47044%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47014-cross-site-scripting-stored-xss-cwe-0ea91e18</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47014%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46943-cross-site-scripting-stored-xss-cwe-e66ac336</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46943%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46889-improper-access-control-cwe-284-in--1dc3d540</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46889%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46946-cross-site-scripting-stored-xss-cwe-88c2f799</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46946%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47031-cross-site-scripting-stored-xss-cwe-086cb350</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47031%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47094-cross-site-scripting-reflected-xss--b7b58469</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47094%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47090-cross-site-scripting-stored-xss-cwe-df51e3ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47090%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47084-cross-site-scripting-stored-xss-cwe-35133ab7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47084%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47002-cross-site-scripting-stored-xss-cwe-eaebf865</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47002%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46857-cross-site-scripting-reflected-xss--d742e896</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46857%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47089-cross-site-scripting-stored-xss-cwe-4bc69f8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47089%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46967-cross-site-scripting-stored-xss-cwe-1a9877e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46967%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46873-cross-site-scripting-stored-xss-cwe-047beaac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46873%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46963-cross-site-scripting-dom-based-xss--5c39cee5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46963%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47068-cross-site-scripting-stored-xss-cwe-e56338cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47068%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46891-cross-site-scripting-stored-xss-cwe-e43626e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46891%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46840-improper-authorization-cwe-285-in-a-746ec14f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46840%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=6848b1923cd93dcca8311d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47000-cross-site-scripting-stored-xss-cwe-906d917b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47000%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47042-cross-site-scripting-dom-based-xss--02849f37</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47042%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831202d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47072-cross-site-scripting-stored-xss-cwe-8c9470af</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47072%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46859-cross-site-scripting-stored-xss-cwe-d1746684</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46859%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46987-cross-site-scripting-stored-xss-cwe-0643b63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46987%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47030-cross-site-scripting-stored-xss-cwe-19492f76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47030%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8311fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46970-cross-site-scripting-dom-based-xss--3f22d8b6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46970%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46884-cross-site-scripting-stored-xss-cwe-44ebb806</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46884%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46846-cross-site-scripting-stored-xss-cwe-8037de08</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46846%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46847-cross-site-scripting-stored-xss-cwe-843eebc0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46847%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46864-cross-site-scripting-stored-xss-cwe-7c379ff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46864%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46842-cross-site-scripting-stored-xss-cwe-591ef235</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46842%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46886-cross-site-scripting-stored-xss-cwe-52f590be</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46886%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46964-cross-site-scripting-dom-based-xss--86abb066</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46964%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46920-cross-site-scripting-stored-xss-cwe-73b012ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46920%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46870-cross-site-scripting-dom-based-xss--e3de44fe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46870%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46875-cross-site-scripting-reflected-xss--d73ac501</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46875%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47047-cross-site-scripting-dom-based-xss--b7de09d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47047%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47113-cross-site-scripting-stored-xss-cwe-02ba526b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47113%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46851-cross-site-scripting-stored-xss-cwe-eeedb36f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46851%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46863-cross-site-scripting-stored-xss-cwe-96ba0bc3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46863%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46858-cross-site-scripting-stored-xss-cwe-2a7dc8a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46858%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46977-cross-site-scripting-dom-based-xss--2a3b96e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46977%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46866-cross-site-scripting-dom-based-xss--ec974f71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46866%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46885-cross-site-scripting-stored-xss-cwe-36ad9e52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46885%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47087-cross-site-scripting-stored-xss-cwe-5299edbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47087%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47011-cross-site-scripting-stored-xss-cwe-c4318ea7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47011%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46935-cross-site-scripting-stored-xss-cwe-6484f181</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46935%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47055-cross-site-scripting-stored-xss-cwe-943a16a9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47055%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46940-cross-site-scripting-stored-xss-cwe-a59f0b87</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46940%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46992-cross-site-scripting-stored-xss-cwe-3991a115</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46992%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46944-cross-site-scripting-stored-xss-cwe-59ef5b74</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46944%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46955-cross-site-scripting-dom-based-xss--f52392b6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46955%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47037-cross-site-scripting-dom-based-xss--fa9511b7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47037%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca8312014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47063-cross-site-scripting-dom-based-xss--ee0d59cb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47063%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca8312061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46911-cross-site-scripting-stored-xss-cwe-662d3ba9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46911%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47013-cross-site-scripting-stored-xss-cwe-e7d3fdad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47013%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47007-cross-site-scripting-stored-xss-cwe-97cb3c5b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47007%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47083-cross-site-scripting-stored-xss-cwe-5a0716f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47083%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47076-cross-site-scripting-stored-xss-cwe-de0cbf6c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47076%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831208f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46843-cross-site-scripting-stored-xss-cwe-436398c6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46843%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46933-cross-site-scripting-stored-xss-cwe-a1e495be</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46933%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46914-cross-site-scripting-stored-xss-cwe-b9e65053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46914%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47025-cross-site-scripting-dom-based-xss--f371abbd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47025%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46894-cross-site-scripting-stored-xss-cwe-0b63c50c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46894%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47088-cross-site-scripting-stored-xss-cwe-ecc35cd2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47088%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46883-cross-site-scripting-stored-xss-cwe-ff569713</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46883%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47010-cross-site-scripting-stored-xss-cwe-4439eaa4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47010%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1993cd93dcca8311fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46968-cross-site-scripting-stored-xss-cwe-832f829f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46968%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46865-cross-site-scripting-dom-based-xss--19b44ecc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46865%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46844-cross-site-scripting-stored-xss-cwe-9b62d7fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46844%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1923cd93dcca8311d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46853-cross-site-scripting-stored-xss-cwe-8f81b8e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46853%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46907-cross-site-scripting-stored-xss-cwe-539bb757</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46907%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46930-cross-site-scripting-stored-xss-cwe-94b92008</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46930%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47078-cross-site-scripting-stored-xss-cwe-c82bd24f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47078%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca831209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46972-cross-site-scripting-dom-based-xss--d582bf2d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46972%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46984-cross-site-scripting-dom-based-xss--51402b15</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46984%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47051-cross-site-scripting-dom-based-xss--a0bea5e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47051%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831204c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46881-cross-site-scripting-stored-xss-cwe-d710205b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46881%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47086-cross-site-scripting-stored-xss-cwe-07e430c4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47086%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19b3cd93dcca83120b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46966-cross-site-scripting-dom-based-xss--df59fc9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46966%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47095-url-redirection-to-untrusted-site-o-df0e6d7b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47095&amp;severity=medium&amp;id=6848b19c3cd93dcca83120dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47117-cross-site-scripting-dom-based-xss--db83a406</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47117%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46950-cross-site-scripting-stored-xss-cwe-0bad315f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46950%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47049-cross-site-scripting-dom-based-xss--65220f67</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47049%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831203c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46908-cross-site-scripting-stored-xss-cwe-a54a9c93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46908%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46837-cross-site-scripting-stored-xss-cwe-69a58c26</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46837%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=high&amp;id=6848b1923cd93dcca8311d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46892-cross-site-scripting-stored-xss-cwe-86bb5e61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46892%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1943cd93dcca8311e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46877-cross-site-scripting-dom-based-xss--2e46608b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46877%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47093-cross-site-scripting-stored-xss-cwe-103d4993</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47093%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19c3cd93dcca83120d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47003-cross-site-scripting-stored-xss-cwe-e01603b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47003%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1983cd93dcca8311f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46973-cross-site-scripting-dom-based-xss--03eaf62e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46973%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46934-cross-site-scripting-stored-xss-cwe-91772534</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46934%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1963cd93dcca8311ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46960-cross-site-scripting-stored-xss-cwe-3201c66f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46960%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1973cd93dcca8311f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47035-cross-site-scripting-dom-based-xss--8b0fd97a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47035%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b19a3cd93dcca831200e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46912-cross-site-scripting-stored-xss-cwe-77ffdb3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46912%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1953cd93dcca8311e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46862-cross-site-scripting-stored-xss-cwe-af7339e9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46862%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=6848b1933cd93dcca8311dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5980-sql-injection-in-code-projects-resta-63a9785d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5980%3A%20SQL%20Injection%20in%20code-projects%20Restaurant%20Order%20System&amp;severity=medium&amp;id=6848a2383cd93dcca8310c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/two-mirai-botnets-lzrd-and-resgod-spotted-exploiti-19668f97</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Two%20Mirai%20Botnets%2C%20Lzrd%20and%20Resgod%20Spotted%20Exploiting%20Wazuh%20Vulnerability&amp;severity=medium&amp;id=68489a13d5c54782e1622696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/salesforce-industry-clouds-security-whitepaper-5-c-7d2bbab4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Salesforce%20Industry%20Cloud(s)%20Security%20Whitepaper%3A%205%20CVEs%2C%2015%2B%20Security%20Risks&amp;severity=high&amp;id=6848a3883cd93dcca8310f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5979-sql-injection-in-code-projects-schoo-09ae4176</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5979%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=6848a2383cd93dcca8310c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5978-stack-based-buffer-overflow-in-tenda-8a765660</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5978%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH1202&amp;severity=high&amp;id=6848a2383cd93dcca8310c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35940-cwe-798-use-of-hard-coded-credentia-42fb5bc3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35940%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20GFI%20Archiver&amp;severity=high&amp;id=6848a2383cd93dcca8310c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5977-sql-injection-in-code-projects-schoo-7c71e58f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5977%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=684891ea48de16fa2fcfc184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5976-cross-site-scripting-in-phpgurukul-r-b197c757</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5976%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=684891ea48de16fa2fcfc17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49133-cwe-125-out-of-bounds-read-in-stefa-67ef6ef9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49133%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20stefanberger%20libtpms&amp;severity=medium&amp;id=684891ea48de16fa2fcfc18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5975-cross-site-scripting-in-phpgurukul-r-2d5cc716</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5975%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=68488d63b74e04a9958dc73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5974-cross-site-scripting-in-phpgurukul-r-0a34ef23</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5974%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68488d63b74e04a9958dc738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36852-cwe-829-inclusion-of-functionality--e6d62e9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36852%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Niklas%20Portmann%20Azure%20Based%20Remote%20Cache%20Plugin%20for%20Nx&amp;severity=critical&amp;id=684888ea5669e5710431efa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3052-cwe-123-write-what-where-condition-i-1fe78e96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3052%3A%20CWE-123%3A%20Write-what-where%20Condition%20in%20DT%20Research%20BiosFlashShell&amp;severity=high&amp;id=684888ea5669e5710431efaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47111-null-pointer-dereference-cwe-476-in-0ac4ea82</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47111%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431f004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43579-information-exposure-cwe-200-in-ado-b9f6c6ec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43579%3A%20Information%20Exposure%20(CWE-200)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431efdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43573-use-after-free-cwe-416-in-adobe-acr-05df711e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43573%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43577-use-after-free-cwe-416-in-adobe-acr-1fe9f989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43577%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43550-use-after-free-cwe-416-in-adobe-acr-a62d616d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43550%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47112-out-of-bounds-read-cwe-125-in-adobe-f3b33e4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47112%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431f007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43575-out-of-bounds-write-cwe-787-in-adob-4581e57a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43575%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43578-out-of-bounds-read-cwe-125-in-adobe-ac10d678</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43578%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=684888ea5669e5710431efd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43574-use-after-free-cwe-416-in-adobe-acr-5df6d426</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43574%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43576-use-after-free-cwe-416-in-adobe-acr-4a4f91ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43576%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=684888ea5669e5710431efca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47107-heap-based-buffer-overflow-cwe-122--cf55e6d5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47107%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=684888ea5669e5710431f00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30327-integer-overflow-or-wraparound-cwe--de82f1b3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30327%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=684888ea5669e5710431f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rust-based-myth-stealer-malware-spread-via-fake-ga-af93368b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rust-based%20Myth%20Stealer%20Malware%20Spread%20via%20Fake%20Gaming%20Sites%20Targets%20Chrome%2C%20Firefox%20Users&amp;severity=high&amp;id=68487cc01b0bd07c392fa3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/texas-dept-of-transportation-breached-300k-crash-r-68072876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Texas%20Dept.%20of%20Transportation%20breached%2C%20300k%20crash%20records%20stolen&amp;severity=high&amp;id=68487cc01b0bd07c392fa3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fin6-uses-aws-hosted-fake-resumes-on-linkedin-to-d-48996647</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FIN6%20Uses%20AWS-Hosted%20Fake%20Resumes%20on%20LinkedIn%20to%20Deliver%20More_eggs%20Malware&amp;severity=high&amp;id=68487cc01b0bd07c392fa3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5973-cross-site-scripting-in-phpgurukul-r-8f10bdd8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5973%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68487f4f1b0bd07c393897c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5972-cross-site-scripting-in-phpgurukul-r-d626b3ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5972%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68487f4f1b0bd07c393897b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/whispering-in-the-dark-2e264175</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Whispering%20in%20the%20dark&amp;severity=medium&amp;id=684888e75669e5710431eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5971-sql-injection-in-code-projects-schoo-51359b61</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5971%3A%20SQL%20Injection%20in%20code-projects%20School%20Fees%20Payment%20System&amp;severity=medium&amp;id=68487f4f1b0bd07c393898ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36576-cwe-352-cross-site-request-forgery--f0f44a0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36576%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=low&amp;id=68487f4f1b0bd07c39389821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-execution-from-web-browser-using-url-schemes--655e498a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20execution%20from%20web%20browser%20using%20URL%20schemes%20handled%20by%20KDE&apos;s%20KTelnetService%20and%20Konsole%20(CVE-2025-49091)&amp;severity=low&amp;id=68487321813f166aeb7f4083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36577-cwe-79-improper-neutralization-of-i-79d7284f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36577%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=68487f501b0bd07c393899b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5943-cwe-787-out-of-bounds-write-in-micro-b08861d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5943%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MicroDicom%20DICOM%20Viewer&amp;severity=high&amp;id=68487f501b0bd07c393899b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0052-cwe-20-improper-input-validation-in--d9a35a3f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0052%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Pure%20Storage%20FlashBlade&amp;severity=high&amp;id=68486f71813f166aeb76f17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36580-cwe-79-improper-neutralization-of-i-49f058a0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36580%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=68486f71813f166aeb76f185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2474-cwe-787-out-of-bounds-write-in-black-17326b7c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2474%3A%20CWE-787%20Out-of-bounds%20Write%20in%20BlackBerry%20QNX%20Software%20Development%20Platform%20(SDP)&amp;severity=critical&amp;id=68486f71813f166aeb76f17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36578-cwe-863-incorrect-authorization-in--050d3f88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36578%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=68486f71813f166aeb76f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0051-cwe-20-improper-input-validation-in--1a5690dc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0051%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Pure%20Storage%20FlashArray&amp;severity=high&amp;id=68487f501b0bd07c393899bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2884-cwe-125-out-of-bounds-read-in-truste-534e1039</loc>
    <lastmod>2026-03-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2884%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Trusted%20Computing%20Group%20TPM2.0&amp;severity=medium&amp;id=68487f501b0bd07c393899c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36574-cwe-36-absolute-path-traversal-in-d-547e834c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36574%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=68487f501b0bd07c393899b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43581-out-of-bounds-write-cwe-787-in-adob-a1e4b34e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43581%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=68487f4f1b0bd07c393898d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43588-out-of-bounds-write-cwe-787-in-adob-9ea2086b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43588%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=68487f4f1b0bd07c393898e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36575-cwe-202-exposure-of-sensitive-infor-e871acad</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36575%3A%20CWE-202%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Data%20Queries%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=high&amp;id=68487f501b0bd07c3938996a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47977-cwe-79-improper-neutralization-of-i-1f4cd8e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47977%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Nuance%20Digital%20Engagement%20Platform&amp;severity=high&amp;id=68487f501b0bd07c3938995b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47968-cwe-20-improper-input-validation-in-9b65e7d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47968%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=68487f501b0bd07c393899c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47176-remote-code-execution-in-microsoft--75fadd09</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47176%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47175-cwe-416-use-after-free-in-microsoft-6f16a066</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47175%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47174-cwe-122-heap-based-buffer-overflow--f42f6a69</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47174%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47173-cwe-641-improper-restriction-of-nam-7f0ac30d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47173%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c39389964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47172-cwe-89-improper-neutralization-of-s-f0138547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47172%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68487f4f1b0bd07c393898c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47171-cwe-20-improper-input-validation-in-67b55f41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47171%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68487f4f1b0bd07c39389817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47170-cwe-416-use-after-free-in-microsoft-f0b95193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47170%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f501b0bd07c3938994f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47169-cwe-122-heap-based-buffer-overflow--181fd139</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47169%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f4f1b0bd07c3938980a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47168-cwe-416-use-after-free-in-microsoft-410138bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47168%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f4f1b0bd07c393897fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47167-cwe-843-access-of-resource-using-in-fbe258fa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47167%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f4f1b0bd07c393897f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47166-cwe-502-deserialization-of-untruste-4ae1074a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47166%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68487f4f1b0bd07c393897eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47165-cwe-416-use-after-free-in-microsoft-490e78a3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47165%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47164-cwe-416-use-after-free-in-microsoft-65e15dc2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47164%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47163-cwe-502-deserialization-of-untruste-b1d37953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47163%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68487f511b0bd07c39389c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33073-cwe-284-improper-access-control-in--df4eb99d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33073%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33070-cwe-908-use-of-uninitialized-resour-8d9c939c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33070%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33069-cwe-347-improper-verification-of-cr-26784409</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33069%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68487f511b0bd07c39389c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33068-cwe-400-uncontrolled-resource-consu-65698a93</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33068%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=68487f511b0bd07c39389c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33057-cwe-476-null-pointer-dereference-in-0f502ee8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33057%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33056-cwe-284-improper-access-control-in--19580e6b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33056%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33055-cwe-125-out-of-bounds-read-in-micro-2c2834ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33053-cwe-73-external-control-of-file-nam-e3b270e6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33053%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33052-cwe-908-use-of-uninitialized-resour-c0778d8c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33052%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68487f511b0bd07c39389b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33050-cwe-693-protection-mechanism-failur-246aaacd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33050%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=68487f511b0bd07c39389b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32725-cwe-693-protection-mechanism-failur-ccb876b2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32725%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=68487f511b0bd07c39389b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24065-cwe-125-out-of-bounds-read-in-micro-1f0eb960</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24065%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f501b0bd07c39389a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24069-cwe-125-out-of-bounds-read-in-micro-aa11b8ab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24069%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f501b0bd07c39389ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24068-cwe-126-buffer-over-read-in-microso-4f37042b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24068%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f501b0bd07c39389ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47969-cwe-200-exposure-of-sensitive-infor-a14eee35</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47969%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=68487f521b0bd07c39389c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47962-cwe-284-improper-access-control-in--844bed4e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47962%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20SDK&amp;severity=high&amp;id=68487f521b0bd07c39389c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33071-cwe-416-use-after-free-in-microsoft-e818436e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33071%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=68487f511b0bd07c39389c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47956-cwe-73-external-control-of-file-nam-bb1a5f29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47956%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Security%20App&amp;severity=medium&amp;id=68487f521b0bd07c39389c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47955-cwe-269-improper-privilege-manageme-0a974fef</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47955%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f521b0bd07c39389c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47953-cwe-641-improper-restriction-of-nam-ab0c8e21</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47953%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47162-cwe-122-heap-based-buffer-overflow--ff9e5477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47162%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f511b0bd07c39389c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47160-cwe-693-protection-mechanism-failur-244ff847</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47160%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33075-cwe-59-improper-link-resolution-bef-2831b4be</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33075%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33067-cwe-269-improper-privilege-manageme-f22c25c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33067%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33066-cwe-122-heap-based-buffer-overflow--8f6a139b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33066%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33065-cwe-125-out-of-bounds-read-in-micro-ec252924</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33065%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33064-cwe-122-heap-based-buffer-overflow--f72ba731</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33064%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33063-cwe-125-out-of-bounds-read-in-micro-772b7736</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33063%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68487f511b0bd07c39389bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33062-cwe-125-out-of-bounds-read-in-micro-d21378f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33062%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68487f511b0bd07c39389ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33061-cwe-125-out-of-bounds-read-in-micro-40707cce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33061%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68487f511b0bd07c39389ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33060-cwe-125-out-of-bounds-read-in-micro-f72e747b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33060%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33059-cwe-125-out-of-bounds-read-in-micro-c4f4cff3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33059%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33058-cwe-125-out-of-bounds-read-in-micro-0be95894</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33058%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32724-cwe-400-uncontrolled-resource-consu-45d02d69</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32724%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32722-cwe-284-improper-access-control-in--32cf91fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32722%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32721-cwe-59-improper-link-resolution-bef-f90aa93c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32721%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f511b0bd07c39389b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32720-cwe-125-out-of-bounds-read-in-micro-1be50ba6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32719-cwe-125-out-of-bounds-read-in-micro-20985908</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32719%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68487f511b0bd07c39389b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32718-cwe-190-integer-overflow-or-wraparo-a0f8116a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32718%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32716-cwe-125-out-of-bounds-read-in-micro-df601b2d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32715-cwe-125-out-of-bounds-read-in-micro-02b6f521</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32715%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=medium&amp;id=68487f501b0bd07c39389ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32714-cwe-284-improper-access-control-in--3da545c2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32714%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32713-cwe-122-heap-based-buffer-overflow--12f7767e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32713%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32712-cwe-416-use-after-free-in-microsoft-d5a082f4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32712%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68487f501b0bd07c39389ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32710-cwe-416-use-after-free-in-microsoft-ba09dd16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32710%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=68487f501b0bd07c39389acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29828-cwe-401-missing-release-of-memory-a-245a885e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29828%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68487f501b0bd07c39389aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47957-cwe-416-use-after-free-in-microsoft-17997330</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47957%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68487f521b0bd07c39389c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5970-cross-site-scripting-in-phpgurukul-r-48875863</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5970%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Restaurant%20Table%20Booking%20System&amp;severity=medium&amp;id=68487f501b0bd07c393899c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43706-cwe-285-improper-authorization-in-e-93e48bb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43706%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Elastic%20Kibana&amp;severity=high&amp;id=68486f71813f166aeb76f188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/openai-shuts-down-10-malicious-chatgpt-ai-ops-link-a9a1269d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OpenAI%20Shuts%20Down%2010%20Malicious%20ChatGPT%20AI%20Ops%20Linked%20to%20China%2C%20Russia%2C%20Iran%20and%20North%20Korea&amp;severity=medium&amp;id=684863a32b23ede18964824f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50568-execute-unauthorized-code-or-comman-94f51e86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50568%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f521b0bd07c39389d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25250-information-disclosure-in-fortinet--aa03031e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25250%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68487f531b0bd07c39389ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29184-improper-access-control-in-fortinet-ed6429a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29184%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=68487f521b0bd07c39389d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48786-execute-unauthorized-code-or-comman-384087a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48786%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=68487f521b0bd07c39389d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24471-improper-access-control-in-fortinet-d7b66954</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24471%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f531b0bd07c39389dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22254-escalation-of-privilege-in-fortinet-b56b283e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22254%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f4f1b0bd07c393897d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22256-improper-access-control-in-fortinet-9650eb5a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22256%3A%20Improper%20access%20control%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=68487f521b0bd07c39389d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32119-execute-unauthorized-code-or-comman-58d67e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32119%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=68487f521b0bd07c39389d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31104-execute-unauthorized-code-or-comman-0576ec5a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31104%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiADC&amp;severity=high&amp;id=68487f4f1b0bd07c393897e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22251-improper-access-control-in-fortinet-21e2c2bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22251%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=68487f521b0bd07c39389d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50562-improper-access-control-in-fortinet-6ddb53ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50562%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=68487f521b0bd07c39389d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54019-improper-access-control-in-fortinet-db5df984</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54019%3A%20Improper%20access%20control%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=68487f521b0bd07c39389d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45329-improper-access-control-in-fortinet-9c418c43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45329%3A%20Improper%20access%20control%20in%20Fortinet%20FortiPortal&amp;severity=low&amp;id=68487f521b0bd07c39389d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/feedback-new-secure-doc-sharing-platform-getsafedo-9528afce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Feedback%20-%20new%20secure%20doc%20sharing%20platform%20GetSafeDocs.com&amp;severity=medium&amp;id=6848601d2b23ede18963d450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5969-stack-based-buffer-overflow-in-d-lin-aed70e38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5969%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-632&amp;severity=high&amp;id=68487f531b0bd07c39389de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33112-cwe-23-relative-path-traversal-in-i-1299fbae</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33112%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IBM%20AIX&amp;severity=high&amp;id=68487f501b0bd07c39389967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47108-out-of-bounds-write-cwe-787-in-adob-53045b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47108%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=68487f531b0bd07c39389dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30321-null-pointer-dereference-cwe-476-in-2f1700c8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30321%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43589-use-after-free-cwe-416-in-adobe-ind-20c9ca4d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43589%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30317-heap-based-buffer-overflow-cwe-122--2f1f5377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30317%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43558-out-of-bounds-write-cwe-787-in-adob-4fa1353a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43558%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47105-out-of-bounds-read-cwe-125-in-adobe-9bb8781b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47105%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47104-out-of-bounds-read-cwe-125-in-adobe-52866d94</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47104%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43593-out-of-bounds-write-cwe-787-in-adob-44437c91</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43593%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47106-use-after-free-cwe-416-in-adobe-ind-39ca3f18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47106%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=68487f531b0bd07c39389e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43590-out-of-bounds-write-cwe-787-in-adob-e69fd6b6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43590%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=68487f531b0bd07c39389e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20599-cwe-1262-register-interface-allows--8615c8fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20599%3A%20CWE-1262%20%20Register%20Interface%20Allows%20Software%20Access%20to%20Sensitive%20Data%20or%20Security%20Settings%20in%20AMD%20AMD%20EPYC%E2%84%A2%207002%20Series%20Processors&amp;severity=high&amp;id=68487f531b0bd07c39389df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27206-improper-access-control-cwe-284-in--002b1dd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27206%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68487f4f1b0bd07c393898d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43586-improper-access-control-cwe-284-in--46b6dca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43586%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68487f4f1b0bd07c393898df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47110-cross-site-scripting-stored-xss-cwe-ba70161e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47110%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68487f4f1b0bd07c393898e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27207-improper-access-control-cwe-284-in--439d9717</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27207%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=68487f4f1b0bd07c393898d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43585-improper-authorization-cwe-285-in-a-f82aef66</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43585%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=68487f4f1b0bd07c393898dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4678-cwe-77-improper-neutralization-of-sp-f29dc8b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4678%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pandora%20FMS%20Pandora%20ITSM&amp;severity=high&amp;id=68487f501b0bd07c39389961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4653-cwe-77-improper-neutralization-of-sp-1d8e6121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4653%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pandora%20FMS%20Pandora%20ITSM&amp;severity=high&amp;id=68487f501b0bd07c3938995e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49143-cwe-200-exposure-of-sensitive-infor-2d21b691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49143%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nautobot%20nautobot&amp;severity=medium&amp;id=68487f4f1b0bd07c393898c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49142-cwe-1336-improper-neutralization-of-3b07fb92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49142%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20nautobot%20nautobot&amp;severity=medium&amp;id=68487f501b0bd07c39389a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48937-cwe-290-authentication-bypass-by-sp-1af6801a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48937%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20matrix-org%20matrix-rust-sdk&amp;severity=medium&amp;id=68487f531b0bd07c39389f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48879-cwe-140-improper-neutralization-of--5043d553</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48879%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20OctoPrint%20OctoPrint&amp;severity=medium&amp;id=68487f531b0bd07c39389f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48067-cwe-73-external-control-of-file-nam-82f31f4f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48067%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20OctoPrint%20OctoPrint&amp;severity=medium&amp;id=68487f531b0bd07c39389fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40591-cwe-602-client-side-enforcement-of--0628c552</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40591%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=high&amp;id=68487f531b0bd07c39389f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40585-cwe-276-incorrect-default-permissio-d160481e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40585%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Siemens%20Energy%20Services&amp;severity=critical&amp;id=68487f501b0bd07c39389a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40569-cwe-362-concurrent-execution-using--80090a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40569%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40568-cwe-863-incorrect-authorization-in--0c7e1f33</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40568%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40567-cwe-863-incorrect-authorization-in--ef5509e5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40567%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41797-cwe-269-improper-privilege-manageme-b65a6e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41797%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Siemens%20RUGGEDCOM%20RST2428P&amp;severity=medium&amp;id=68487f501b0bd07c39389a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30220-cwe-611-improper-restriction-of-xml-b0d12b2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30220%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20geoserver%20geoserver&amp;severity=critical&amp;id=68487f501b0bd07c39389a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37100-vulnerability-in-hewlett-packard-en-35a42066</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37100%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20Private%205G%20Core&amp;severity=high&amp;id=68487f551b0bd07c3938a25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30145-cwe-835-loop-with-unreachable-exit--6da1f736</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30145%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20geoserver%20geoserver&amp;severity=high&amp;id=68487f551b0bd07c3938a253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27505-cwe-862-missing-authorization-in-ge-16713e87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27505%3A%20CWE-862%3A%20Missing%20Authorization%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=68487f551b0bd07c3938a3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5335-cwe-426-untrusted-search-path-in-aut-7c3f81cd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5335%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Autodesk%20Installer&amp;severity=high&amp;id=68487f551b0bd07c3938a3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40625-cwe-918-server-side-request-forgery-baa062ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40625%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=68487f551b0bd07c3938a3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38524-cwe-200-exposure-of-sensitive-infor-454cb9ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38524%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=68487f551b0bd07c3938a368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26395-cwe-79-improper-neutralization-of-i-1a78968c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26395%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=high&amp;id=68487f551b0bd07c3938a3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26394-cwe-601-url-redirection-to-untruste-ce5d88bc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26394%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SolarWinds%20SolarWinds%20Observability%20Self-Hosted&amp;severity=medium&amp;id=68487f551b0bd07c3938a3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5353-cwe-321-use-of-hard-coded-cryptograp-85e26925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5353%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ivanti%20Workspace%20Control&amp;severity=high&amp;id=68487f561b0bd07c3938a3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22463-cwe-321-use-of-hard-coded-cryptogra-dcf4cbe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22463%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ivanti%20Workspace%20Control&amp;severity=high&amp;id=68487f551b0bd07c3938a36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22455-cwe-321-use-of-hard-coded-cryptogra-7ba66732</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22455%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Ivanti%20Workspace%20Control&amp;severity=high&amp;id=68487f551b0bd07c3938a365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34711-cwe-200-exposure-of-sensitive-infor-8fd70ca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34711%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20geoserver%20geoserver&amp;severity=critical&amp;id=68487f551b0bd07c3938a361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29198-cwe-918-server-side-request-forgery-13ec8672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29198%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20geoserver%20geoserver&amp;severity=high&amp;id=68487f561b0bd07c3938a482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49454-cwe-98-improper-control-of-filename-de986030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49454%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20LoftOcean%20TinySalt&amp;severity=null&amp;id=68487f591b0bd07c3938a9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49455-cwe-502-deserialization-of-untruste-13826ad2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49455%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ClickandPledge%20WordPress-WPJobBoard&amp;severity=null&amp;id=68487f581b0bd07c3938a8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49507-cwe-502-deserialization-of-untruste-fc6592d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20CozyStay&amp;severity=null&amp;id=68487f581b0bd07c3938a8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49509-cwe-862-missing-authorization-in-ro-eb81ed0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49509%3A%20Missing%20Authorization%20in%20Roland%20Beaussant%20Audio%20Editor%20%26amp%3B%20Recorder&amp;severity=null&amp;id=68487f581b0bd07c3938a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49510-cwe-352-cross-site-request-forgery--8e873d17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49510%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPFactory%20Min%20Max%20Step%20Quantity%20Limits%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=68487f591b0bd07c3938a9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49511-cwe-352-cross-site-request-forgery--1c97530b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49511%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20uxper%20Civi%20Framework&amp;severity=null&amp;id=68487f571b0bd07c3938a70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rare-werewolf-apt-uses-legitimate-software-in-atta-d0325b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rare%20Werewolf%20APT%20Uses%20Legitimate%20Software%20in%20Attacks%20on%20Hundreds%20of%20Russian%20Enterprises&amp;severity=high&amp;id=684820eb2b23ede189578180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/researcher-found-flaw-to-discover-phone-numbers-li-b37e1c47</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Researcher%20Found%20Flaw%20to%20Discover%20Phone%20Numbers%20Linked%20to%20Any%20Google%20Account&amp;severity=high&amp;id=684820eb2b23ede189578184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43699-cwe-281-improper-preservation-of-pe-2222cbb3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43699%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Salesforce%20OmniStudio&amp;severity=medium&amp;id=68487f551b0bd07c3938a2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43698-cwe-281-improper-preservation-of-pe-e3cb94c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43698%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=critical&amp;id=68487f591b0bd07c3938aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43697-cwe-281-improper-preservation-of-pe-f24d07f2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43697%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=high&amp;id=68487f591b0bd07c3938aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4577-cwe-79-improper-neutralization-of-in-fd7f69da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Smash%20Balloon%20Social%20Post%20Feed%20%E2%80%93%20Simple%20Social%20Feeds%20for%20WordPress&amp;severity=medium&amp;id=68487f571b0bd07c3938a690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2918-cwe-79-improper-neutralization-of-in-1e331359</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%20WordPress%20Blocks%20Plugin&amp;severity=medium&amp;id=68487f561b0bd07c3938a566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4774-cwe-79-improper-neutralization-of-in-a41ac77d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68487f561b0bd07c3938a577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43701-cwe-281-improper-preservation-of-pe-ce038989</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43701%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=high&amp;id=68487f551b0bd07c3938a340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43700-cwe-281-improper-preservation-of-pe-c56504df</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43700%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Salesforce%20OmniStudio&amp;severity=high&amp;id=68487f551b0bd07c3938a2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ispconfig-authenticated-remote-code-execution--d8aba9d2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ISPConfig%20Authenticated%20Remote%20Code%20Execution%20Vulnerability&amp;severity=medium&amp;id=684811e717e89880603e43bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-41-threat-intelligence-report-and-malware-anal-1f942631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%2041%3A%20Threat%20Intelligence%20Report%20and%20Malware%20Analysis&amp;severity=medium&amp;id=684811df17e89880603e42e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41657-cwe-207-observable-behavioral-discr-864b717e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41657%3A%20CWE-207%20Observable%20Behavioral%20Discrepancy%20With%20Equivalent%20Products%20in%20Auma%20AC1.2&amp;severity=medium&amp;id=68487f561b0bd07c3938a4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13090-cwe-250-execution-with-unnecessary--fb45f612</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13090%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68487f561b0bd07c3938a48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13089-cwe-78-improper-neutralization-of-s-64f7d554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13089%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Nozomi%20Networks%20Guardian&amp;severity=high&amp;id=68487f561b0bd07c3938a487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40662-cwe-200-exposure-of-sensitive-infor-238ac5c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40662%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40661-cwe-639-authorization-bypass-throug-dba179fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40661%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40660-cwe-639-authorization-bypass-throug-54b15ac2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40660%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40659-cwe-639-authorization-bypass-throug-fcb8478f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40659%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f561b0bd07c3938a56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40658-cwe-639-authorization-bypass-throug-58ee8a5a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40658%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=medium&amp;id=68487f591b0bd07c3938a9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40657-cwe-89-improper-neutralization-of-s-49bc95a6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40657%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f591b0bd07c3938aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40656-cwe-89-improper-neutralization-of-s-13e1c97f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40656%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f591b0bd07c3938a9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40655-cwe-89-improper-neutralization-of-s-39523634</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40655%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f561b0bd07c3938a4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40654-cwe-89-improper-neutralization-of-s-c72ec907</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40654%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmacroweb%20DM%20Corporative%20CMS&amp;severity=critical&amp;id=68487f561b0bd07c3938a4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/why-open-source-secure-code-f6db112b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Why%20Open%20Source%20%E2%89%A0%20Secure%20Code&amp;severity=medium&amp;id=6848041c5a4bad0d1cbe1de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stolen-ticketmaster-data-from-snowflake-attacks-br-f447fad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stolen%20Ticketmaster%20data%20from%20Snowflake%20attacks%20briefly%20for%20sale%20again&amp;severity=high&amp;id=684800cac220e718de2409f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/china-linked-threat-actor-targeted-70-orgs-worldwi-8fd188c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=China-linked%20threat%20actor%20targeted%20%2B70%20orgs%20worldwide%2C%20SentinelOne%20warns&amp;severity=medium&amp;id=684800cac220e718de2409fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detecting-purelogs-traffic-with-caploader-8a3564cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detecting%20PureLogs%20traffic%20with%20CapLoader&amp;severity=medium&amp;id=684811df17e89880603e42dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4681-cwe-269-improper-privilege-managemen-9816e4a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4681%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=68487f561b0bd07c3938a502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3117-cwe-79-improper-neutralization-of-in-413d4112</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=68487f561b0bd07c3938a493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4680-cwe-20-improper-input-validation-in--fa99b155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4680%3A%20CWE-20%20Improper%20Input%20Validation%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=high&amp;id=68487f561b0bd07c3938a4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3116-cwe-20-improper-input-validation-in--b8d6f328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3116%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=high&amp;id=68487f561b0bd07c3938a490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3905-cwe-79-improper-neutralization-of-in-0c81f255</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=68487f561b0bd07c3938a496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3112-cwe-400-uncontrolled-resource-consum-5a6c0e90</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3112%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=high&amp;id=68487f561b0bd07c3938a48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3899-cwe-79-improper-neutralization-of-in-981781b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=medium&amp;id=68487f561b0bd07c3938a47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3898-cwe-20-improper-input-validation-in--d29cd74b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3898%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%2FM251&amp;severity=high&amp;id=68487f561b0bd07c3938a411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5743-cwe-78-improper-neutralization-of-sp-9e81b7f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5743%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=high&amp;id=68487f591b0bd07c3938aa42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5742-cwe-79-improper-neutralization-of-in-9c6b41e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=medium&amp;id=68487f591b0bd07c3938a9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5741-cwe-22-improper-limitation-of-a-path-ec109ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5741%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=medium&amp;id=68487f591b0bd07c3938a9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5740-cwe-22-improper-limitation-of-a-path-8967bd20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5740%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EVLink%20WallBox&amp;severity=high&amp;id=68487f591b0bd07c3938a9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27817-arbitrary-file-read-and-ssrf-vulner-400f8e5d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27817%3A%20Arbitrary%20file%20read%20and%20SSRF%20vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20Kafka%20Client&amp;severity=high&amp;id=68487f551b0bd07c3938a248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27819-cwe-502-deserialization-of-untruste-fad73d43</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27819%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=high&amp;id=68487f551b0bd07c3938a250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27818-cwe-502-deserialization-of-untruste-caaba881</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27818%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=high&amp;id=68487f551b0bd07c3938a24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5945-3822317b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5945&amp;severity=low&amp;id=6847ebafc220e718de1ff0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1041-cwe-20-improper-input-validation-in--0bca81d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1041%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Avaya%20Avaya%20Call%20Management%20System&amp;severity=critical&amp;id=68487f591b0bd07c3938aaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4954-cwe-434-unrestricted-upload-of-file--095a54f4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4954%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Axle%20Demo%20Importer&amp;severity=low&amp;id=68487f591b0bd07c3938aaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4840-cwe-89-sql-injection-in-unknown-inpr-48413201</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4840%3A%20CWE-89%20SQL%20Injection%20in%20inprosysmedia-likes-dislikes-post&amp;severity=high&amp;id=68487f591b0bd07c3938aaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danabot-c2-server-memory-leak-bug-c39da384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DanaBot%20C2%20Server%20Memory%20Leak%20Bug&amp;severity=medium&amp;id=6847f650c220e718de21fe36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5952-os-command-injection-in-zendto-59055165</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5952%3A%20OS%20Command%20Injection%20in%20Zend.To&amp;severity=medium&amp;id=68487f551b0bd07c3938a35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5935-denial-of-service-in-open5gs-b5032752</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5935%3A%20Denial%20of%20Service%20in%20Open5GS&amp;severity=medium&amp;id=68487f561b0bd07c3938a408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3076-cwe-79-improper-neutralization-of-in-a15cd1b0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=68487f561b0bd07c3938a400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4601-cwe-269-improper-privilege-managemen-336c62aa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4601%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20InspiryThemes%20RH%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=high&amp;id=68487f561b0bd07c3938a4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4387-cwe-434-unrestricted-upload-of-file--ae3e1e5c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4387%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Tyche%20Softwares%20Abandoned%20Cart%20Pro%20for%20WooCommerce&amp;severity=high&amp;id=68487f561b0bd07c3938a4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5925-cwe-352-cross-site-request-forgery-c-f54d7b87</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5925%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20steph%20Bunny%E2%80%99s%20Print%20CSS&amp;severity=medium&amp;id=68487f591b0bd07c3938aa54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5934-stack-based-buffer-overflow-in-netge-9048a9d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5934%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20EX3700&amp;severity=high&amp;id=68487f591b0bd07c3938aa58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5913-sql-injection-in-phpgurukul-vehicle--61a2b2c6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5913%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Record%20Management%20System&amp;severity=medium&amp;id=68487f591b0bd07c3938aa4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5912-stack-based-buffer-overflow-in-d-lin-2929e753</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5912%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-632&amp;severity=high&amp;id=68487f591b0bd07c3938aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5911-buffer-overflow-in-totolink-ex1200t-376ce93f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5911%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f591b0bd07c3938a9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5910-buffer-overflow-in-totolink-ex1200t-065ecc3b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5910%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f551b0bd07c3938a354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5909-buffer-overflow-in-totolink-ex1200t-2f40b2fd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5909%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f551b0bd07c3938a34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5908-buffer-overflow-in-totolink-ex1200t-67b12a48</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5908%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f541b0bd07c3938a19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5907-buffer-overflow-in-totolink-ex1200t-008d6861</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5907%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=68487f541b0bd07c3938a196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5906-missing-authentication-in-code-proje-b9aceb58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5906%3A%20Missing%20Authentication%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=68487f551b0bd07c3938a346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42998-cwe-346-origin-validation-error-in--49f08481</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42998%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20SAP_SE%20SAP%20Business%20One%20Integration%20Framework&amp;severity=medium&amp;id=68487f551b0bd07c3938a2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42996-cwe-590-free-of-memory-not-on-the-h-067783dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42996%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20SAP_SE%20SAP%20MDM%20Server&amp;severity=medium&amp;id=68487f551b0bd07c3938a2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42995-cwe-590-free-of-memory-not-on-the-h-9ed8e7e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42995%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20SAP_SE%20SAP%20MDM%20Server&amp;severity=high&amp;id=68487f551b0bd07c3938a2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42994-cwe-590-free-of-memory-not-on-the-h-779683b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42994%3A%20CWE-590%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20SAP_SE%20SAP%20MDM%20Server&amp;severity=high&amp;id=68487f551b0bd07c3938a2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42993-cwe-862-missing-authorization-in-sa-c376969c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42993%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Enterprise%20Event%20Enablement)&amp;severity=medium&amp;id=68487f551b0bd07c3938a2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42991-cwe-862-missing-authorization-in-sa-9cfc778a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42991%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Bank%20Account%20Application)&amp;severity=medium&amp;id=68487f551b0bd07c3938a2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42990-cwe-79-improper-neutralization-of-i-033094dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42990%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAPUI5%20applications&amp;severity=low&amp;id=68487f551b0bd07c3938a2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42989-cwe-862-missing-authorization-in-sa-08edf1f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42989%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20for%20ABAP&amp;severity=critical&amp;id=68487f541b0bd07c3938a037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42988-cwe-918-server-side-request-forgery-e2d4ef80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42988%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20in%20SAP_SE%20SAP%20Business%20Objects%20Business%20Intelligence%20Platform&amp;severity=low&amp;id=68487f541b0bd07c3938a033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42987-cwe-862-missing-authorization-in-sa-35a0fdc7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42987%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Processing%20Rules%20-%20For%20Bank%20Statement)&amp;severity=medium&amp;id=68487f551b0bd07c3938a2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42984-cwe-862-missing-authorization-in-sa-45604d3c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42984%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Manage%20Central%20Purchase%20Contract%20application)&amp;severity=medium&amp;id=68487f551b0bd07c3938a262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42983-cwe-862-missing-authorization-in-sa-0181a440</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42983%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Warehouse%20and%20SAP%20Plug-In%20Basis&amp;severity=high&amp;id=68487f551b0bd07c3938a25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42982-cwe-862-missing-authorization-in-sa-adbd0b76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42982%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20GRC%20(AC%20Plugin)&amp;severity=high&amp;id=68487f541b0bd07c3938a02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42977-cwe-22-improper-limitation-of-a-pat-bca96640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42977%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SAP_SE%20SAP%20NetWeaver%20Visual%20Composer&amp;severity=high&amp;id=68487f541b0bd07c3938a02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31325-cwe-79-improper-neutralization-of-i-3cfc733e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20NetWeaver%20(ABAP%20Keyword%20Documentation)&amp;severity=medium&amp;id=68487f541b0bd07c3938a027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23192-cwe-79-improper-neutralization-of-i-780cfa39</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23192%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20(BI%20Workspace)&amp;severity=high&amp;id=68487f531b0bd07c39389fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5905-buffer-overflow-in-totolink-t10-3c78f645</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5905%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5904-buffer-overflow-in-totolink-t10-9b43b154</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5904%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-10-3e890b0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-10&amp;severity=medium&amp;id=6848c9f93cd93dcca8313cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46612-na-in-na-210d1627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46612%3A%20n%2Fa&amp;severity=high&amp;id=68487f561b0bd07c3938a405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44044-na-in-na-d197b6af</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44044%3A%20n%2Fa&amp;severity=high&amp;id=68487f541b0bd07c3938a1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44043-na-in-na-1842188a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44043%3A%20n%2Fa&amp;severity=medium&amp;id=68487f541b0bd07c3938a1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57189-na-in-na-24842ae0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f521b0bd07c39389d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57186-na-in-na-324b926d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57186%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f521b0bd07c39389cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57190-na-in-na-d8a5112f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57190%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f521b0bd07c39389c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37396-na-in-na-dd7d2d09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37396%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f501b0bd07c393899d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37395-na-in-na-c8fdfc7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37395%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f501b0bd07c393899d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37394-na-in-na-4a9fcf43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f501b0bd07c393899ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0036-cwe-682-incorrect-calculation-in-amd-3a07c4ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0036%3A%20CWE-682%20Incorrect%20Calculation%20in%20AMD%20Platform%20Loader%20and%20Manager%20(PLM)&amp;severity=low&amp;id=68487f531b0bd07c39389fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0037-cwe-20-improper-input-validation-in--b5233f3b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0037%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20Platform%20Loader%20and%20Manager%20(PLM)&amp;severity=medium&amp;id=68487f531b0bd07c39389fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5903-buffer-overflow-in-totolink-t10-7441c3a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5903%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5902-buffer-overflow-in-totolink-t10-b7ec4625</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5902%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30515-cwe-35-in-cyberdata-011209-sip-emer-22f99516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30515%3A%20CWE-35%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=critical&amp;id=68487f541b0bd07c3938a024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5901-buffer-overflow-in-totolink-t10-4807d60a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5901%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=68487f541b0bd07c3938a0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30183-cwe-522-in-cyberdata-011209-sip-eme-4cda44e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30183%3A%20CWE-522%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=high&amp;id=68487f531b0bd07c39389fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30507-cwe-89-in-cyberdata-011209-sip-emer-07253d59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30507%3A%20CWE-89%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=medium&amp;id=68487f541b0bd07c3938a021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26468-cwe-306-in-cyberdata-011209-sip-eme-584acec2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26468%3A%20CWE-306%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=high&amp;id=68487f531b0bd07c39389fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30184-cwe-288-in-cyberdata-011209-sip-eme-95fd4743</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30184%3A%20CWE-288%20in%20CyberData%20011209%20SIP%20Emergency%20Intercom&amp;severity=critical&amp;id=68487f531b0bd07c39389fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5900-cross-site-request-forgery-in-tenda--0128934f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5900%3A%20Cross-Site%20Request%20Forgery%20in%20Tenda%20AC9&amp;severity=medium&amp;id=68487f541b0bd07c3938a0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5899-free-of-memory-not-on-the-heap-in-gn-8149f13f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5899%3A%20Free%20of%20Memory%20not%20on%20the%20Heap%20in%20GNU%20PSPP&amp;severity=medium&amp;id=68487f541b0bd07c3938a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5898-out-of-bounds-write-in-gnu-pspp-1b34f316</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5898%3A%20Out-of-bounds%20Write%20in%20GNU%20PSPP&amp;severity=medium&amp;id=68487f541b0bd07c3938a0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49140-cwe-770-allocation-of-resources-wit-47f473d2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49140%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20pion%20interceptor&amp;severity=high&amp;id=68487f591b0bd07c3938aaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49141-cwe-78-improper-neutralization-of-s-9e242fe0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49141%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=68487f541b0bd07c3938a0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49139-cwe-1021-improper-restriction-of-re-8c4858d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49139%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=68487f541b0bd07c3938a0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49138-cwe-22-improper-limitation-of-a-pat-c164c450</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49138%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=68487f541b0bd07c3938a042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5897-inefficient-regular-expression-compl-79594e7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5897%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vuejs%20vue-cli&amp;severity=medium&amp;id=68487f541b0bd07c3938a0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49137-cwe-79-improper-neutralization-of-i-f2691373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49137%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haxtheweb%20issues&amp;severity=high&amp;id=68487f541b0bd07c3938a03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5896-inefficient-regular-expression-compl-80338f19</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5896%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20tarojs%20taro&amp;severity=medium&amp;id=68487f541b0bd07c3938a0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49004-cwe-290-authentication-bypass-by-sp-3502988d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49004%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20caido%20caido&amp;severity=high&amp;id=68487f541b0bd07c3938a03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sensata-technologies-says-personal-data-stolen-by--44ff364a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sensata%20Technologies%20says%20personal%20data%20stolen%20by%20ransomware%20gang&amp;severity=high&amp;id=684742a41164aab0bfda195a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5895-inefficient-regular-expression-compl-f7a47b10</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5895%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Metabase&amp;severity=medium&amp;id=68487f541b0bd07c3938a0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5914-double-free-in-red-hat-red-hat-enter-321b0090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5914%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=68487f541b0bd07c3938a1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5918-out-of-bounds-read-in-red-hat-red-ha-75903fe6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5918%3A%20Out-of-bounds%20Read&amp;severity=low&amp;id=68487f561b0bd07c3938a58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5917-out-of-bounds-write-in-red-hat-red-h-a5860ddd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5917%3A%20Out-of-bounds%20Write&amp;severity=low&amp;id=68487f561b0bd07c3938a587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5916-integer-overflow-or-wraparound-in-re-081668f4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5916%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=low&amp;id=68487f561b0bd07c3938a581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5915-heap-based-buffer-overflow-in-red-ha-4f828323</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5915%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=68487f561b0bd07c3938a57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bruteforcing-the-phone-number-of-any-google-user-98b0dc9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bruteforcing%20the%20phone%20number%20of%20any%20Google%20user&amp;severity=medium&amp;id=68473bac1164aab0bf21a395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5892-inefficient-regular-expression-compl-7aafab82</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5892%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20RocketChat&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-backdoors-in-npm-packages-let-attackers-wip-89e16c1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Backdoors%20in%20npm%20Packages%20Let%20Attackers%20Wipe%20Entire%20Systems&amp;severity=medium&amp;id=68473654ce8a0143f8308d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt-carries-out-attacks-with-data-theft-and-crypto-a346b054</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT%20carries%20out%20attacks%20with%20data%20theft%20and%20crypto%20miner%20deployment&amp;severity=medium&amp;id=684738f31164aab0bf20b611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5891-inefficient-regular-expression-compl-6664148f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5891%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Unitech%20pm2&amp;severity=medium&amp;id=68487f5a1b0bd07c3938b48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5890-inefficient-regular-expression-compl-eb2f9317</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5890%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20actions%20toolkit&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5889-inefficient-regular-expression-compl-924f8bf1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5889%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20juliangruber%20brace-expansion&amp;severity=low&amp;id=68487f5b1b0bd07c3938c192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47081-cwe-522-insufficiently-protected-cr-16e1c087</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47081%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20psf%20requests&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/limited-canva-creator-data-exposed-via-russia-ai-c-50d442cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Limited%20Canva%20Creator%20Data%20Exposed%20Via%20Russia%20AI%20Chatbot%20Database&amp;severity=medium&amp;id=68473654ce8a0143f8308d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5888-cross-site-request-forgery-in-jsnjfz-abcb02b0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5888%3A%20Cross-Site%20Request%20Forgery%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49653-cwe-200-exposure-of-sensitive-infor-2737a8a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49653%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Lablup%20BackendAI&amp;severity=high&amp;id=68487f5b1b0bd07c3938c1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49652-cwe-306-missing-authentication-for--e3142da9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49652%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Lablup%20BackendAI&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49651-cwe-862-missing-authorization-in-la-25165be7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49651%3A%20CWE-862%20Missing%20Authorization%20in%20Lablup%20BackendAI&amp;severity=high&amp;id=68487f5b1b0bd07c3938bd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5887-cross-site-scripting-in-jsnjfz-webst-bcba822e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5887%3A%20Cross%20Site%20Scripting%20in%20jsnjfz%20WebStack-Guns&amp;severity=medium&amp;id=68487f5a1b0bd07c3938b482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49136-cwe-1336-improper-neutralization-of-f26efd43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49136%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20knadh%20listmonk&amp;severity=critical&amp;id=68487f591b0bd07c3938a9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-linked-hackers-targeted-70-global-organiza-6b838e19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese-Linked%20Hackers%20Targeted%2070%2B%20Global%20Organizations%2C%20SentinelLABS&amp;severity=medium&amp;id=68473654ce8a0143f8308d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grocery-wholesale-giant-united-natural-foods-hit-b-0a61ef99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grocery%20wholesale%20giant%20United%20Natural%20Foods%20hit%20by%20cyberattack&amp;severity=high&amp;id=68473654ce8a0143f8308d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5886-cross-site-scripting-in-emlog-507f5180</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5886%3A%20Cross%20Site%20Scripting%20in%20Emlog&amp;severity=medium&amp;id=68487f591b0bd07c3938a9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25999-cwe-98-improper-control-of-filename-32927576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25999%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20BodyCenter%20-%20Gym%2C%20Fitness%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=68487f571b0bd07c3938a70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26005-cwe-98-improper-control-of-filename-bb0e2a6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26005%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Fitrush&amp;severity=high&amp;id=68487f571b0bd07c3938a712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23974-cwe-266-incorrect-privilege-assignm-836b7670</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23974%3A%20Incorrect%20Privilege%20Assignment%20in%20ifkooo%20One-Login&amp;severity=null&amp;id=68487f581b0bd07c3938a791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24767-cwe-89-improper-neutralization-of-s-41e9d6cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24767%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20facturaone%20TicketBAI%20Facturas%20para%20WooCommerce&amp;severity=null&amp;id=68487f581b0bd07c3938a7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24768-cwe-98-improper-control-of-filename-648e87a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24768%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Nitan&amp;severity=null&amp;id=68487f581b0bd07c3938a91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24770-cwe-98-improper-control-of-filename-fd00dcd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24770%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20CraftXtore&amp;severity=null&amp;id=68487f581b0bd07c3938a801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26592-cwe-98-improper-control-of-filename-34c5e7db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26592%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20axiomthemes%20Lab&amp;severity=null&amp;id=68487f581b0bd07c3938a804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27362-cwe-98-improper-control-of-filename-fe5a43e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27362%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20Petito&amp;severity=null&amp;id=68487f581b0bd07c3938a807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28888-cwe-98-improper-control-of-filename-9671b587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28888%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20BZOTheme%20GiftXtore&amp;severity=null&amp;id=68487f5b1b0bd07c3938c8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28944-cwe-98-improper-control-of-filename-3453bd19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28944%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Avaz&amp;severity=null&amp;id=68487f5b1b0bd07c3938c8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28945-cwe-98-improper-control-of-filename-29cab1f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20Valen%20-%20Sport%2C%20Fashion%20WooCommerce%20WordPress%20Theme&amp;severity=null&amp;id=68487f5b1b0bd07c3938c8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28992-cwe-98-improper-control-of-filename-00f23fef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28992%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20snstheme%20SNS%20Anton&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31019-cwe-288-authentication-bypass-using-12b02dc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31019%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20miniOrange%20Password%20Policy%20Manager&amp;severity=null&amp;id=68487f571b0bd07c3938a69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31022-cwe-288-authentication-bypass-using-6a0bc5a9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31022%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20PayU%20PayU%20India&amp;severity=critical&amp;id=68487f571b0bd07c3938a69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31039-cwe-611-improper-restriction-of-xml-74b7b6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31039%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20pixelgrade%20Category%20Icon&amp;severity=null&amp;id=68487f571b0bd07c3938a6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31045-cwe-497-exposure-of-sensitive-syste-59642834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31045%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20elfsight%20elfsight%20Contact%20Form%20widget&amp;severity=null&amp;id=68487f571b0bd07c3938a6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31050-cwe-22-improper-limitation-of-a-pat-822e7d04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31050%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20appthaplugins%20Apptha%20Slider%20Gallery&amp;severity=null&amp;id=68487f571b0bd07c3938a6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31052-cwe-502-deserialization-of-untruste-3fc8bef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31052%3A%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20The%20Fashion%20-%20Model%20Agency%20One%20Page%20Beauty%20Theme&amp;severity=null&amp;id=68487f571b0bd07c3938a6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31057-cwe-79-improper-neutralization-of-i-54383725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31057%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=null&amp;id=68487f571b0bd07c3938a6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31058-cwe-79-improper-neutralization-of-i-ff3bcfce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31058%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Revolution%20Video%20Player&amp;severity=null&amp;id=68487f571b0bd07c3938a700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31059-cwe-89-improper-neutralization-of-s-9c79e16d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31059%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20WBW%20Product%20Table%20PRO&amp;severity=null&amp;id=68487f571b0bd07c3938a703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31061-cwe-79-improper-neutralization-of-i-f7ea75a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redqteam%20Wishlist&amp;severity=null&amp;id=68487f581b0bd07c3938a80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31396-cwe-502-deserialization-of-untruste-3980df49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31396%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20FLAP%20-%20Business%20WordPress%20Theme&amp;severity=critical&amp;id=68487f5c1b0bd07c3938cd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31398-cwe-502-deserialization-of-untruste-e777e4e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31398%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20PIMP%20-%20Creative%20MultiPurpose&amp;severity=critical&amp;id=68487f5c1b0bd07c3938cd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31424-cwe-89-improper-neutralization-of-s-ff13678b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31424%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20WP%20Lead%20Capturing%20Pages&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31426-cwe-79-improper-neutralization-of-i-984d9b05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Sticky%20Radio%20Player&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31429-cwe-502-deserialization-of-untruste-f8fe1c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31429%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20PressGrid%20-%20Frontend%20Publish%20Reaction%20%26%20Multimedia%20Theme&amp;severity=critical&amp;id=68487f5c1b0bd07c3938cd35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31635-cwe-22-improper-limitation-of-a-pat-e247aa8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31635%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LambertGroup%20CLEVER&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31638-cwe-79-improper-neutralization-of-i-dacc437f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeton%20Spare&amp;severity=high&amp;id=68487f581b0bd07c3938a80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31917-cwe-79-improper-neutralization-of-i-00b4aca3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20Universal%20Video%20Player&amp;severity=null&amp;id=68487f581b0bd07c3938a811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31920-cwe-89-improper-neutralization-of-s-9380c8f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31920%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20WP%20Guppy&amp;severity=null&amp;id=68487f581b0bd07c3938a814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31925-cwe-79-improper-neutralization-of-i-f3e5f869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LambertGroup%20SHOUT&amp;severity=null&amp;id=68487f581b0bd07c3938a817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32291-cwe-434-unrestricted-upload-of-file-20faf142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32291%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FantasticPlugins%20SUMO%20Affiliates%20Pro&amp;severity=null&amp;id=68487f5c1b0bd07c3938d8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32305-cwe-79-improper-neutralization-of-i-bb65a924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sneeit%20WordPress%20FlatNews%20Theme&amp;severity=null&amp;id=68487f5c1b0bd07c3938d4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32308-cwe-862-missing-authorization-in-lo-ce097abf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32308%3A%20Missing%20Authorization%20in%20looks_awesome%20Team%20Builder&amp;severity=null&amp;id=68487f581b0bd07c3938a81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32595-cwe-98-improper-control-of-filename-da4ecd05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32595%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Krowd&amp;severity=null&amp;id=68487f581b0bd07c3938a874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39473-cwe-22-improper-limitation-of-a-pat-c09aa529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39473%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WebGeniusLab%20Seofy%20Core&amp;severity=null&amp;id=68487f581b0bd07c3938a877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39475-cwe-35-path-traversal-in-frenify-ar-defeb933</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39475%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Frenify%20Arlo&amp;severity=null&amp;id=68487f581b0bd07c3938a87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39476-cwe-98-improper-control-of-filename-9ed5b3e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39476%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magentech%20Revo&amp;severity=null&amp;id=68487f581b0bd07c3938a87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39539-cwe-79-improper-neutralization-of-i-328c102a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brewlabs%20WP%20Email%20Delivery&amp;severity=null&amp;id=68487f571b0bd07c3938a706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47463-cwe-862-missing-authorization-in-fa-cc3488d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47463%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20Stock%20Locations%20for%20WooCommerce&amp;severity=null&amp;id=68487f571b0bd07c3938a61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47477-cwe-79-improper-neutralization-of-i-fd5e1c6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47477%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revmakx%20Backup%20and%20Staging%20by%20WP%20Time%20Capsule&amp;severity=null&amp;id=68487f571b0bd07c3938a622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47487-cwe-79-improper-neutralization-of-i-44271803</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moreconvert%20Team%20MC%20Woocommerce%20Wishlist&amp;severity=null&amp;id=68487f571b0bd07c3938a625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47511-cwe-22-improper-limitation-of-a-pat-f8eaa0ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47511%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20info%40welcart%20Welcart%20e-Commerce&amp;severity=null&amp;id=68487f571b0bd07c3938a628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47527-cwe-862-missing-authorization-in-ic-f7927112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47527%3A%20Missing%20Authorization%20in%20Icegram%20Icegram%20Collect&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47561-cwe-266-incorrect-privilege-assignm-95908681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47561%3A%20Incorrect%20Privilege%20Assignment%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47598-cwe-79-improper-neutralization-of-i-145325fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20click5%20History%20Log%20by%20click5&amp;severity=null&amp;id=68487f5c1b0bd07c3938cd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47608-cwe-89-improper-neutralization-of-s-0206cd31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47608%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sonalsinha21%20Recover%20abandoned%20cart%20for%20WooCommerce&amp;severity=null&amp;id=68487f5c1b0bd07c3938d473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47651-cwe-89-improper-neutralization-of-s-a49f851e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47651%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Infility%20Infility%20Global&amp;severity=null&amp;id=68487f5c1b0bd07c3938d47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48122-cwe-89-improper-neutralization-of-s-f4560880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48122%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48123-cwe-94-improper-control-of-generati-d3b52931</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48123%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48124-cwe-22-improper-limitation-of-a-pat-f28ddcef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48124%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48125-cwe-98-improper-control-of-filename-603151b3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48125%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Event%20Manager%20WP%20Event%20Manager&amp;severity=high&amp;id=68487f581b0bd07c3938a889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48126-cwe-98-improper-control-of-filename-a4adf6b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48126%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=null&amp;id=68487f581b0bd07c3938a88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48129-cwe-266-incorrect-privilege-assignm-c79349be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48129%3A%20Incorrect%20Privilege%20Assignment%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=68487f581b0bd07c3938a890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48130-cwe-22-improper-limitation-of-a-pat-b8bde759</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48130%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20spicethemes%20Spice%20Blocks&amp;severity=null&amp;id=68487f581b0bd07c3938a8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48139-cwe-862-missing-authorization-in-re-1834c859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48139%3A%20Missing%20Authorization%20in%20relentlo%20StyleAI&amp;severity=null&amp;id=68487f581b0bd07c3938a8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48140-cwe-94-improper-control-of-generati-7e88a822</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48140%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20metalpriceapi%20MetalpriceAPI&amp;severity=critical&amp;id=68487f581b0bd07c3938a8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48141-cwe-89-improper-neutralization-of-s-f907eac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48141%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alex%20Zaytseff%20Multi%20CryptoCurrency%20Payments&amp;severity=null&amp;id=68487f571b0bd07c3938a689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48143-cwe-79-improper-neutralization-of-i-74005c82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48143%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salesup2019%20Formulario%20de%20contacto%20SalesUp!&amp;severity=null&amp;id=68487f571b0bd07c3938a68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48147-cwe-862-missing-authorization-in-cr-e5def533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48147%3A%20Missing%20Authorization%20in%20Crypto%20Cloud%20CryptoCloud%20-%20Crypto%20Payment%20Gateway&amp;severity=null&amp;id=68487f561b0bd07c3938a574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48261-cwe-201-insertion-of-sensitive-info-cc7cdbd6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48261%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20MultiVendorX%20MultiVendorX&amp;severity=high&amp;id=68487f571b0bd07c3938a709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48267-cwe-22-improper-limitation-of-a-pat-277505c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48267%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThimPress%20WP%20Pipes&amp;severity=high&amp;id=68487f5a1b0bd07c3938af36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48279-cwe-79-improper-neutralization-of-i-667fca78</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Richard%20Perdaan%20WC%20MyParcel%20Belgium&amp;severity=high&amp;id=68487f5a1b0bd07c3938af3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48281-cwe-89-improper-neutralization-of-s-2fcbebe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mystyleplatform%20MyStyle%20Custom%20Product%20Designer&amp;severity=null&amp;id=68487f5c1b0bd07c3938d485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49265-cwe-862-missing-authorization-in-wp-02610f74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49265%3A%20Missing%20Authorization%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=null&amp;id=68487f5a1b0bd07c3938af42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49275-cwe-98-improper-control-of-filename-56e8b4d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49275%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogbyte&amp;severity=null&amp;id=68487f5a1b0bd07c3938af4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49276-cwe-98-improper-control-of-filename-adfec383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49276%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogmine&amp;severity=null&amp;id=68487f5a1b0bd07c3938af57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49277-cwe-98-improper-control-of-filename-27089430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49277%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogprise&amp;severity=null&amp;id=68487f5a1b0bd07c3938af5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49278-cwe-98-improper-control-of-filename-80713bb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49278%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogty&amp;severity=null&amp;id=68487f5a1b0bd07c3938b446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49279-cwe-98-improper-control-of-filename-cd09a64c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49279%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Blogvy&amp;severity=null&amp;id=68487f5a1b0bd07c3938b44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49280-cwe-98-improper-control-of-filename-2dc3f785</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49280%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magty&amp;severity=null&amp;id=68487f5a1b0bd07c3938b455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49281-cwe-98-improper-control-of-filename-3ffe67c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49281%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magways&amp;severity=null&amp;id=68487f5a1b0bd07c3938b45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49282-cwe-98-improper-control-of-filename-37d1a572</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49282%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20unfoldwp%20Magze&amp;severity=null&amp;id=68487f5a1b0bd07c3938b46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49295-cwe-35-path-traversal-in-mikado-the-7d19bd02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49295%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20MediClinic&amp;severity=null&amp;id=68487f5a1b0bd07c3938b476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49296-cwe-35-path-traversal-in-mikado-the-f654b769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49296%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20GrandPrix&amp;severity=null&amp;id=68487f5a1b0bd07c3938b47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49297-cwe-35-path-traversal-in-mikado-the-4f23cb8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49297%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Mikado-Themes%20Grill%20and%20Chow&amp;severity=null&amp;id=68487f5c1b0bd07c3938d48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5885-cross-site-request-forgery-in-konica-1a2b7156</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5885%3A%20Cross-Site%20Request%20Forgery%20in%20Konica%20Minolta%20bizhub&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5884-cross-site-scripting-in-konica-minol-19ad54c5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5884%3A%20Cross%20Site%20Scripting%20in%20Konica%20Minolta%20bizhub&amp;severity=medium&amp;id=68487f5e1b0bd07c3938fef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5881-sql-injection-in-code-projects-chat--dea39760</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5881%3A%20SQL%20Injection%20in%20code-projects%20Chat%20System&amp;severity=medium&amp;id=68487f5e1b0bd07c3938ff43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5880-path-traversal-in-whistle-27d1cb01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5880%3A%20Path%20Traversal%20in%20Whistle&amp;severity=medium&amp;id=68487f5e1b0bd07c3938ff36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5879-cross-site-scripting-in-wukongopenso-5b8df2b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5879%3A%20Cross%20Site%20Scripting%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=6846e0147b622a9fdf246e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49130-cwe-79-improper-neutralization-of-i-dadd0e52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49130%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20barryvdh%20laravel-translation-manager&amp;severity=medium&amp;id=6846dc927b622a9fdf23bfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49013-cwe-94-improper-control-of-generati-1b49ed68</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49013%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WilderForge%20WilderForge&amp;severity=critical&amp;id=6846dc927b622a9fdf23bfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49131-cwe-732-incorrect-permission-assign-91056c66</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49131%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20labring%20FastGPT&amp;severity=medium&amp;id=6846dc927b622a9fdf23bfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49006-cwe-276-incorrect-default-permissio-89188c0b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49006%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20wasp-lang%20wasp&amp;severity=high&amp;id=6846dc927b622a9fdf23bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48877-cwe-1038-insecure-automated-optimiz-45765300</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48877%3A%20CWE-1038%3A%20Insecure%20Automated%20Optimizations%20in%20discourse%20discourse&amp;severity=high&amp;id=6846dc927b622a9fdf23bfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48062-cwe-116-improper-encoding-or-escapi-bd24a0b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48062%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20discourse%20discourse&amp;severity=high&amp;id=6846d5937b622a9fdf225522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5877-xml-external-entity-reference-in-fen-b484921a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5877%3A%20XML%20External%20Entity%20Reference%20in%20Fengoffice%20Feng%20Office&amp;severity=medium&amp;id=6846d5937b622a9fdf225524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48053-cwe-400-uncontrolled-resource-consu-8190de81</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48053%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20discourse%20discourse&amp;severity=high&amp;id=6846d5937b622a9fdf225520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40670-cwe-863-incorrect-authorization-in--2766b52b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40670%3A%20CWE-863%20Incorrect%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=6846d5937b622a9fdf22551e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40669-cwe-863-incorrect-authorization-in--5d528229</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40669%3A%20CWE-863%20Incorrect%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=6846d5937b622a9fdf22551c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40668-cwe-863-incorrect-authorization-in--19e912ea</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40668%3A%20CWE-863%20Incorrect%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=6846d5937b622a9fdf22551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5876-missing-authentication-in-lucky-lm-5-950ea86f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5876%3A%20Missing%20Authentication%20in%20Lucky%20LM-520-SC&amp;severity=medium&amp;id=6846d2137b622a9fdf219091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5875-buffer-overflow-in-tp-link-tl-ipc544-03336053</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5875%3A%20Buffer%20Overflow%20in%20TP-LINK%20Technologies%20TL-IPC544EP-W4&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41444-cwe-89-improper-neutralization-of-s-77207af1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41444%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36528-cwe-89-improper-neutralization-of-s-c3774430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36528%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27709-cwe-89-improper-neutralization-of-s-638cfcf9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27709%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=6846c7637b622a9fdf1f2a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5874-sandbox-issue-in-redash-efb055a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5874%3A%20Sandbox%20Issue%20in%20Redash&amp;severity=low&amp;id=6846c7637b622a9fdf1f2a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pathwiper-malware-strikes-ukraines-critical-in-22427b35</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PathWiper%20Malware%20Strikes%20Ukraine&apos;s%20Critical%20Infrastructure&amp;severity=critical&amp;id=6846bb8171f4d251b58e9e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41437-cwe-79-improper-neutralization-of-i-b64b7a08</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20OpManager&amp;severity=medium&amp;id=6846bcdd7b622a9fdf5f5e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5873-unrestricted-upload-in-echarge-hardy-f3cdadd9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5873%3A%20Unrestricted%20Upload%20in%20eCharge%20Hardy%20Barth%20Salia%20PLCC&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3835-cwe-434-unrestricted-upload-of-file--a360cb2a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3835%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ManageEngine%20Exchange%20Reporter%20Plus&amp;severity=critical&amp;id=6846b80d71f4d251b58dd63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5872-missing-authentication-in-egauge-eg3-e1aab255</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5872%3A%20Missing%20Authentication%20in%20eGauge%20EG3000%20Energy%20Monitor&amp;severity=medium&amp;id=6846b47c71f4d251b58d142a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40675-cwe-79-improper-neutralization-of-i-93aca3b8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bagisto%20Bagisto&amp;severity=medium&amp;id=6846b14d71f4d251b58c4ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5871-missing-authentication-in-papendorf--22a41558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5871%3A%20Missing%20Authentication%20in%20Papendorf%20SOL%20Connect%20Center&amp;severity=medium&amp;id=6846ad6171f4d251b58b89c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5870-improper-authentication-in-trendnet--0ea2a5f7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5870%3A%20Improper%20Authentication%20in%20TRENDnet%20TV-IP121W&amp;severity=medium&amp;id=6846a66571f4d251b58a14d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5869-memory-corruption-in-rt-thread-3e28c27c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5869%3A%20Memory%20Corruption%20in%20RT-Thread&amp;severity=high&amp;id=68469f4371f4d251b5889ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5868-improper-validation-of-array-index-i-d61ac4e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5868%3A%20Improper%20Validation%20of%20Array%20Index%20in%20RT-Thread&amp;severity=high&amp;id=6846985671f4d251b58731f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5894-cwe-862-missing-authorization-in-hon-f9195c8f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5894%3A%20CWE-862%20Missing%20Authorization%20in%20Honding%20Technology%20Smart%20Parking%20Management%20System&amp;severity=high&amp;id=6846914371f4d251b585ccd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5867-null-pointer-dereference-in-rt-threa-b71df60b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5867%3A%20NULL%20Pointer%20Dereference%20in%20RT-Thread&amp;severity=high&amp;id=6846c60d7b622a9fdf1e7917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5866-improper-validation-of-array-index-i-04ba0c1e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5866%3A%20Improper%20Validation%20of%20Array%20Index%20in%20RT-Thread&amp;severity=high&amp;id=68468a2671f4d251b58461cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5893-cwe-497-exposure-of-sensitive-system-7888aa6e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5893%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Honding%20Technology%20Smart%20Parking%20Management%20System&amp;severity=critical&amp;id=684686c771f4d251b583a857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5865-memory-corruption-in-rt-thread-c4418e82</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5865%3A%20Memory%20Corruption%20in%20RT-Thread&amp;severity=high&amp;id=6846c60d7b622a9fdf1e7919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25209-exposure-of-sensitive-information-t-bda37384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25209%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e791f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25208-uncontrolled-resource-consumption-4d51afb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25208%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e791d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25207-uncontrolled-resource-consumption-f0d83745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25207%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=68467c3671f4d251b5818859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47711-off-by-one-error-in-red-hat-red-hat-6109522f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47711%3A%20Off-by-one%20Error&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5864-improper-restriction-of-excessive-au-2dc83f2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5864%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Tenda%20TDSEE%20App&amp;severity=medium&amp;id=6846c60e7b622a9fdf1e7933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4652-cwe-79-cross-site-scripting-xss-in-u-4e36643b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4652%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Broadstreet&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3582-cwe-79-cross-site-scripting-xss-in-u-5175594e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3582%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Newsletter&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3581-cwe-79-cross-site-scripting-xss-in-u-545d54ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3581%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Newsletter&amp;severity=medium&amp;id=684679e871f4d251b580cf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47712-integer-overflow-or-wraparound-in-r-87221d5d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47712%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e7925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5863-stack-based-buffer-overflow-in-tenda-6f3a63a7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5863%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=6846751e71f4d251b580111c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5862-buffer-overflow-in-tenda-ac7-1182acfc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5862%3A%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=68466dfd71f4d251b57ea555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5861-buffer-overflow-in-tenda-ac7-a828375d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5861%3A%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=6846672371f4d251b57d288e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5860-sql-injection-in-phpgurukul-maid-hir-f82e3822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5860%3A%20SQL%20Injection%20in%20PHPGurukul%20Maid%20Hiring%20Management%20System&amp;severity=medium&amp;id=6846600c71f4d251b57bc255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5859-sql-injection-in-phpgurukul-nipah-vi-73a342bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5859%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=684658fc71f4d251b57a5b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5858-sql-injection-in-phpgurukul-nipah-vi-12e4a160</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5858%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=6846c60e7b622a9fdf1e7953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5857-sql-injection-in-code-projects-patie-50f092c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5857%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=684651f271f4d251b578ef08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5856-sql-injection-in-phpgurukul-bp-monit-d2cb8d70</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5856%3A%20SQL%20Injection%20in%20PHPGurukul%20BP%20Monitoring%20Management%20System&amp;severity=medium&amp;id=684647d171f4d251b576b19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5855-stack-based-buffer-overflow-in-tenda-640540f8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5855%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68463cc871f4d251b57496db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5854-buffer-overflow-in-tenda-ac6-c203c548</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5854%3A%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=684635e171f4d251b5732ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5853-stack-based-buffer-overflow-in-tenda-2c9333d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5853%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5852-buffer-overflow-in-tenda-ac6-77c87192</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5852%3A%20Buffer%20Overflow%20in%20Tenda%20AC6&amp;severity=high&amp;id=68462eda71f4d251b571c596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/laravel-pulse-131-arbitrary-code-injection-ef7448b1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Laravel%20Pulse%201.3.1%20-%20Arbitrary%20Code%20Injection&amp;severity=medium&amp;id=68489c7b82cbcead92620aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-version-24h2-cross-device-ser-8a607775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%20Version%2024H2%20Cross%20Device%20Service%20-%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68489c7682cbcead92620a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prosshd-12-20090726-denial-of-service-dos-5722ae52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ProSSHD%201.2%2020090726%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=68489c7082cbcead92620a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tightvnc-2883-control-pipe-manipulation-b5ef2947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TightVNC%202.8.83%20-%20Control%20Pipe%20Manipulation&amp;severity=medium&amp;id=68489c6b82cbcead92620a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-09-bf21d0b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-09&amp;severity=medium&amp;id=68488af8b74e04a9958ce241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46041-na-in-na-95c3d77f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46041%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938af2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45055-na-in-na-16aba638</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45055%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938af27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45002-na-in-na-96d813aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45002%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938af20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45001-na-in-na-307b7c61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45001%3A%20n%2Fa&amp;severity=high&amp;id=68487f5a1b0bd07c3938af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29627-na-in-na-ec942257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29627%3A%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46452-na-in-na-4e291cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46452%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46178-na-in-na-4ce4d788</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46178%3A%20n%2Fa&amp;severity=medium&amp;id=68487f551b0bd07c3938a343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5851-buffer-overflow-in-tenda-ac15-1eebf17e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5851%3A%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=684620b471f4d251b56efc90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5850-buffer-overflow-in-tenda-ac15-16d3ee32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5850%3A%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=684619c371f4d251b56d95e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hmas-canberra-accidentally-blocks-wireless-interne-c6399ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HMAS%20Canberra%20accidentally%20blocks%20wireless%20internet%20and%20radio%20services%20in%20New%20Zealand&amp;severity=medium&amp;id=6846164471f4d251b56ce886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5849-stack-based-buffer-overflow-in-tenda-521befd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5849%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=684612a671f4d251b56c2f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5848-buffer-overflow-in-tenda-ac15-3044201a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5848%3A%20Buffer%20Overflow%20in%20Tenda%20AC15&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-using-fake-it-support-calls-to-breach-corp-1c981d51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Using%20Fake%20IT%20Support%20Calls%20to%20Breach%20Corporate%20Systems%2C%20Google&amp;severity=high&amp;id=6846048c71f4d251b5696901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-supply-chain-malware-operation-hits-npm-and-py-cf9af3cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Supply%20Chain%20Malware%20Operation%20Hits%20npm%20and%20PyPI%20Ecosystems%2C%20Targeting%20Millions%20Globally&amp;severity=high&amp;id=6846011671f4d251b568b3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-mirai-botnet-infect-tbk-dvr-devices-via-comman-68dc3f6f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Mirai%20botnet%20infect%20TBK%20DVR%20devices%20via%20command%20injection%20flaw&amp;severity=high&amp;id=6846011671f4d251b568b3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35010-cwe-88-improper-neutralization-of-a-07bf7b2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35010%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35009-cwe-88-improper-neutralization-of-a-7516e709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35009%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35008-cwe-88-improper-neutralization-of-a-48ce6f4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35008%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35007-cwe-88-improper-neutralization-of-a-94043a92</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35007%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35006-cwe-88-improper-neutralization-of-a-79a58ae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35006%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35005-cwe-88-improper-neutralization-of-a-77afea1b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35005%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6846c60e7b622a9fdf1e793b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35004-cwe-88-improper-neutralization-of-a-3de0e6e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35004%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Microhard%20IPn4Gii%20%2F%20Bullet-LTE%20Firmware&amp;severity=high&amp;id=6845fd8e71f4d251b567fadc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32459-cwe-88-improper-neutralization-of-a-7e897fc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32459%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32458-cwe-88-improper-neutralization-of-a-aa07caac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32458%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32457-cwe-88-improper-neutralization-of-a-1e7c453d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32457%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32456-cwe-88-improper-neutralization-of-a-81f394a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32456%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32455-cwe-88-improper-neutralization-of-a-1a25643f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32455%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3461-cwe-306-missing-authentication-for-c-411d29f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3461%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=critical&amp;id=6845fd8f71f4d251b567fafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3460-cwe-88-improper-neutralization-of-ar-570c1841</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3460%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3459-cwe-88-improper-neutralization-of-ar-6fe2b349</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3459%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20ON%20Semiconductor%20Quantenna%20Wi-Fi%20chipset&amp;severity=high&amp;id=6845fd8f71f4d251b567faf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5847-stack-based-buffer-overflow-in-tenda-ecf19417</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5847%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=6845942271f4d251b5528aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27247-cwe-281-improper-preservation-of-pe-c54c8236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27247%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b5510445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27242-cwe-20-improper-input-validation-in-a5bfd693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27242%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b551043c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27563-cwe-281-improper-preservation-of-pe-29126088</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27563%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68457be371f4d251b54d387c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26693-cwe-281-improper-preservation-of-pe-ba0e1c85</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26693%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26691-cwe-281-improper-preservation-of-pe-0496675f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26691%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b55103e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27131-cwe-20-improper-input-validation-in-a9df9514</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27131%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b5510424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24493-cwe-362-concurrent-execution-using--dc066632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24493%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=68458da771f4d251b55103d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25217-cwe-476-null-pointer-dereference-in-0454cb8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25217%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23235-cwe-125-out-of-bounds-read-in-openh-1d818854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23235%3A%20CWE-125%20Out-of-bounds%20Read%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21082-cwe-843-access-of-resource-using-in-bb42a855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21082%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68458da771f4d251b55103aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20063-cwe-843-access-of-resource-using-in-86444830</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20063%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=68457be371f4d251b54d386e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38004-vulnerability-in-linux-linux-c3f967e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68458da771f4d251b551044e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38003-vulnerability-in-linux-linux-2e8c9083</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=684569fb71f4d251b549bb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-08-0625aa2f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-08&amp;severity=medium&amp;id=68490f133cd93dcca831c5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-npm-packages-posing-as-utilities-delete--7da8b479</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20npm%20packages%20posing%20as%20utilities%20delete%20project%20directories&amp;severity=high&amp;id=6844c4c371f4d251b5292b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attack-hits-gluestack-npm-packages-wi-1386e90f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Supply%20chain%20attack%20hits%20Gluestack%20NPM%20packages%20with%20960K%20weekly%20downloads&amp;severity=high&amp;id=6844c12171f4d251b5287bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-20-malicious-apps-on-google-play-spotted-targ-0630623c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%2020%20Malicious%20Apps%20on%20Google%20Play%20Spotted%20Targeting%20Users%20for%20Seed%20Phrases&amp;severity=medium&amp;id=6844890771f4d251b51d6fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5840-unrestricted-upload-in-sourcecodeste-b6b6f3f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5840%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=684481f671f4d251b51b5975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5839-buffer-overflow-in-tenda-ac9-88c753c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5839%3A%20Buffer%20Overflow%20in%20Tenda%20AC9&amp;severity=high&amp;id=68447ad371f4d251b519f1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5838-sql-injection-in-phpgurukul-employee-4c0dd7d2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5838%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6844626671f4d251b515113c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/riding-the-time-machine-journey-through-an-old-vbu-41eeef34</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Riding%20The%20Time%20Machine%3A%20Journey%20Through%20An%20Old%20vBulletin%20PHP%20Object%20Injection&amp;severity=medium&amp;id=6844465171f4d251b50f756f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5837-sql-injection-in-phpgurukul-employee-c8a01a4e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5837%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=684449ab71f4d251b5102ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5836-command-injection-in-tenda-ac9-0a490ad8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5836%3A%20Command%20Injection%20in%20Tenda%20AC9&amp;severity=medium&amp;id=6844429271f4d251b50e99a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9993-cwe-79-improper-neutralization-of-in-7e44a5a2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9993%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20and%20Widgets&amp;severity=medium&amp;id=684422fc71f4d251b507bfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5568-cwe-79-improper-neutralization-of-in-052683a0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Event%20Manager%20and%20Tickets%20Selling%20Plugin%20for%20WooCommerce%20%E2%80%93%20WpEvently%20%E2%80%93%20WordPress%20Plugin&amp;severity=medium&amp;id=68443c7f71f4d251b50d005d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5528-cwe-79-improper-neutralization-of-in-ad2b57ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Social%20Sharing%20Plugin%20%E2%80%93%20Sassy%20Social%20Share&amp;severity=medium&amp;id=68443c7f71f4d251b50d0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9994-cwe-79-improper-neutralization-of-in-8055ff92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Popular%20Elementor%20Templates%20and%20Widgets&amp;severity=medium&amp;id=68443c7f71f4d251b50d0029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tax-resolution-firm-optima-tax-relief-hit-by-ranso-09c6c652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tax%20resolution%20firm%20Optima%20Tax%20Relief%20hit%20by%20ransomware%2C%20data%20leaked&amp;severity=high&amp;id=684414ff71f4d251b50506fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/attackers-exploit-fortinet-flaws-to-deploy-qilin-r-06c952bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Attackers%20exploit%20Fortinet%20flaws%20to%20deploy%20Qilin%20ransomware&amp;severity=high&amp;id=6844187d71f4d251b505b520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-dragonclone-chinese-telecom-targeted-by--1798aec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20DRAGONCLONE%3A%20Chinese%20Telecom%20Targeted%20by%20Malware&amp;severity=medium&amp;id=68433b1b71f4d251b5d94948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5303-cwe-79-improper-neutralization-of-in-76f98331</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5303%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Freightview%20Edition&amp;severity=high&amp;id=6843f8df71f4d251b5ff87b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5399-cwe-835-loop-with-unreachable-exit-c-993ee7d8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5399%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20curl%20curl&amp;severity=high&amp;id=6843f20a71f4d251b5fe2076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47601-cwe-862-missing-authorization-in-ch-0ad2ed31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47601%3A%20Missing%20Authorization%20in%20Christiaan%20Pieterse%20MaxiBlocks&amp;severity=null&amp;id=6843c3f571f4d251b5f51a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5814-cwe-862-missing-authorization-in-swi-cec40fa4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5814%3A%20CWE-862%20Missing%20Authorization%20in%20switcorp%20Profiler%20%E2%80%93%20What%20Slowing%20Down%20Your%20WP&amp;severity=medium&amp;id=6843c08b71f4d251b5f46162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-07-66939e0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-07&amp;severity=medium&amp;id=68490f133cd93dcca831dc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55585-na-in-na-1eb71281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55585%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MOPS%20moPS&amp;severity=critical&amp;id=68448cb171f4d251b51e1fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49619-cwe-1336-improper-neutralization-of-8c15811f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49619%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Skyvern%20Skyvern&amp;severity=high&amp;id=6844464f71f4d251b50f7568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49128-cwe-209-generation-of-error-message-2b6f946b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49128%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20FasterXML%20jackson-core&amp;severity=medium&amp;id=68435e1971f4d251b5e1083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/possible-malware-in-official-microdicom-installer--7dd526a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Possible%20Malware%20in%20Official%20MicroDicom%20Installer%20(PDF%20%2B%20Hashes%20%2B%20Scan%20Results%20Included)&amp;severity=high&amp;id=684368b171f4d251b5e31d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49127-cwe-502-deserialization-of-untruste-6f7a2845</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49127%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20kafbat%20kafka-ui&amp;severity=high&amp;id=6843538571f4d251b5def98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-intelligence-disruption-badbox-20-targets-c-5b6eba3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Intelligence%20Disruption%3A%20BADBOX%202.0%20Targets%20Consumer%20Devices%20with%20Multiple%20Fraud%20Schemes&amp;severity=medium&amp;id=68434ffe71f4d251b5de3cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5799-stack-based-buffer-overflow-in-tenda-1df7a7f9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5799%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=68443c7f71f4d251b50d006f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5798-stack-based-buffer-overflow-in-tenda-a2337b87</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5798%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=684345db71f4d251b5dc11d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kettering-health-confirms-interlock-ransomware-beh-242a20f8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kettering%20Health%20confirms%20Interlock%20ransomware%20behind%20cyberattack&amp;severity=high&amp;id=68433e7671f4d251b5da038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5797-cross-site-scripting-in-laundry-laun-b6c0340e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5797%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=68433e8671f4d251b5da03a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5796-cross-site-scripting-in-code-project-30612400</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5796%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=68433e8671f4d251b5da039d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2766-cwe-1393-use-of-default-password-in--9917d32a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2766%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%2070mai%20A510&amp;severity=high&amp;id=68433b2271f4d251b5d94a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3485-cwe-22-improper-limitation-of-a-path-6d37d65c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3485%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Allegra%20Allegra&amp;severity=high&amp;id=68433b2271f4d251b5d94a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5481-cwe-787-out-of-bounds-write-in-sante-f08db1e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5481%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=68433b2271f4d251b5d94a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5480-cwe-427-uncontrolled-search-path-ele-14ebe5c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5480%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Action1%20Action1&amp;severity=high&amp;id=68433b2271f4d251b5d94a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5474-cwe-59-improper-link-resolution-befo-5ac68783</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5474%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%202BrightSparks%20SyncBackFree&amp;severity=high&amp;id=68433b2271f4d251b5d94a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5473-cwe-190-integer-overflow-or-wraparou-3cef0756</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5473%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GIMP%20GIMP&amp;severity=high&amp;id=68433b2271f4d251b5d94a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5795-buffer-overflow-in-tenda-ac5-e2c15282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5795%3A%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=6843377571f4d251b5d89015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5794-buffer-overflow-in-tenda-ac5-a2b5e3ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5794%3A%20Buffer%20Overflow%20in%20Tenda%20AC5&amp;severity=high&amp;id=6843377571f4d251b5d89012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5793-buffer-overflow-in-totolink-ex1200t-b65252a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5793%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6843377571f4d251b5d8901e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5792-buffer-overflow-in-totolink-ex1200t-b35c8fc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5792%3A%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=high&amp;id=6843377571f4d251b5d8901b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/popular-chrome-extensions-found-leaking-data-via-u-f84d0f98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Popular%20Chrome%20Extensions%20Found%20Leaking%20Data%20via%20Unencrypted%20Connections&amp;severity=medium&amp;id=68432d1f71f4d251b5d66f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49011-cwe-358-improperly-implemented-secu-a6a2995b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49011%3A%20CWE-358%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20authzed%20spicedb&amp;severity=low&amp;id=6843377571f4d251b5d89018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47950-cwe-770-allocation-of-resources-wit-334a8ded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47950%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20coredns%20coredns&amp;severity=high&amp;id=6843296371f4d251b5d5b4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5790-buffer-overflow-in-totolink-x15-ac1fd634</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5790%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68443c7f71f4d251b50d005a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5789-buffer-overflow-in-totolink-x15-bde7575a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5789%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68433b2271f4d251b5d94a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5788-buffer-overflow-in-totolink-x15-4d654047</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5788%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6843225a71f4d251b5d448aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/meet-nickname-zero-click-imessage-exploit-targeted-e17252c5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Meet%20NICKNAME%3A%20Zero-Click%20iMessage%20Exploit%20Targeted%20Key%20Figures%20in%20US%2C%20EU&amp;severity=high&amp;id=68431efa71f4d251b5d38d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5787-buffer-overflow-in-totolink-x15-82132bca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5787%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68431b5671f4d251b5d2d3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5786-buffer-overflow-in-totolink-x15-1b8d621f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5786%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68431b5671f4d251b5d2d3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5785-buffer-overflow-in-totolink-x15-84d7028b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5785%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6843146e71f4d251b5d16016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5784-sql-injection-in-phpgurukul-employee-9e07996d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5784%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6843146e71f4d251b5d16013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29885-cwe-295-in-qnap-systems-inc-file-st-e096af56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29885%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29884-cwe-295-in-qnap-systems-inc-file-st-4463270f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29884%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29883-cwe-295-in-qnap-systems-inc-file-st-bbc1d2ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29883%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22486-cwe-295-in-qnap-systems-inc-file-st-00975e1d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22486%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110571f4d251b5d0a5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29892-cwe-89-in-qnap-systems-inc-qsync-ce-949d577d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29892%3A%20CWE-89%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=high&amp;id=6843110671f4d251b5d0a5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22482-cwe-134-in-qnap-systems-inc-qsync-c-810a5b57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22482%3A%20CWE-134%20in%20QNAP%20Systems%20Inc.%20Qsync%20Central&amp;severity=low&amp;id=6843110571f4d251b5d0a5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50406-cwe-79-in-qnap-systems-inc-license--d733d913</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50406%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20License%20Center&amp;severity=low&amp;id=6843110571f4d251b5d0a5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22481-cwe-77-in-qnap-systems-inc-qts-07eae78c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22481%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=6843110571f4d251b5d0a5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56805-cwe-120-in-qnap-systems-inc-qts-67f961b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56805%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6843110571f4d251b5d0a5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13088-cwe-287-in-qnap-systems-inc-quroute-79a82164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13088%3A%20CWE-287%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=medium&amp;id=6843110571f4d251b5d0a5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13087-cwe-78-in-qnap-systems-inc-qurouter-3297facd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13087%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QuRouter&amp;severity=low&amp;id=6843110571f4d251b5d0a5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22484-cwe-770-in-qnap-systems-inc-file-st-b1e51d33</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22484%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110571f4d251b5d0a5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22490-cwe-476-in-qnap-systems-inc-file-st-e0689492</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22490%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110571f4d251b5d0a5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29871-cwe-125-in-qnap-systems-inc-file-st-5e78bb9c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29871%3A%20CWE-125%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=low&amp;id=6843110571f4d251b5d0a5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29872-cwe-770-in-qnap-systems-inc-file-st-a25ff476</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29872%3A%20CWE-770%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29873-cwe-476-in-qnap-systems-inc-file-st-71309a37</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29873%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110671f4d251b5d0a5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29876-cwe-476-in-qnap-systems-inc-file-st-415ad519</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29876%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110671f4d251b5d0a5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29877-cwe-476-in-qnap-systems-inc-file-st-0bedcf82</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29877%3A%20CWE-476%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=medium&amp;id=6843110671f4d251b5d0a5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30279-cwe-295-in-qnap-systems-inc-file-st-b1356300</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30279%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33031-cwe-295-in-qnap-systems-inc-file-st-641346a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33031%3A%20CWE-295%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33035-cwe-22-in-qnap-systems-inc-file-sta-23e4204f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33035%3A%20CWE-22%20in%20QNAP%20Systems%20Inc.%20File%20Station%205&amp;severity=high&amp;id=6843110671f4d251b5d0a602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5783-sql-injection-in-phpgurukul-employee-2d85a5e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5783%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=68430d3871f4d251b5cfea8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5747-cwe-115-misinterpretation-of-input-i-c13975ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5747%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=high&amp;id=68430d3871f4d251b5cfea7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5748-cwe-749-exposed-dangerous-method-or--72ad8962</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5748%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=high&amp;id=68430d3871f4d251b5cfea7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5749-cwe-457-use-of-uninitialized-variabl-a96f9541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5749%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=medium&amp;id=68430d3871f4d251b5cfea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5750-cwe-122-heap-based-buffer-overflow-i-3019041e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5750%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=high&amp;id=68430d3871f4d251b5cfea84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5751-cwe-798-use-of-hard-coded-credential-e37a8546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5751%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20WOLFBOX%20Level%202%20EV%20Charger&amp;severity=medium&amp;id=68430d3871f4d251b5cfea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5782-sql-injection-in-phpgurukul-employee-f5d42cbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5782%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6843062b71f4d251b5ce778b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5780-sql-injection-in-code-projects-patie-c46c37e4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5780%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6843062b71f4d251b5ce7788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27531-cwe-502-deserialization-of-untruste-e0a0e467</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27531%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=critical&amp;id=6843030371f4d251b5cdbdeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41646-cwe-704-incorrect-type-conversion-o-280cfa46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41646%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20Kunbus%20Revolution%20Pi%20webstatus&amp;severity=critical&amp;id=6843030371f4d251b5cdbdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5779-sql-injection-in-code-projects-patie-967aa0ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5779%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6842ff2071f4d251b5cd032f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5778-sql-injection-in-1000-projects-abc-c-f765b558</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5778%3A%20SQL%20Injection%20in%201000%20Projects%20ABC%20Courier%20Management%20System&amp;severity=medium&amp;id=6842f51971f4d251b5ca3e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38002-vulnerability-in-linux-linux-c2654820</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=6842f51971f4d251b5ca3e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38001-vulnerability-in-linux-linux-fe1233a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=6842f51971f4d251b5ca3e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5806-vulnerability-in-jenkins-project-jen-0d48dd4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5806%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Gatling%20Plugin&amp;severity=high&amp;id=6842f14871f4d251b5c95e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5791-incorrect-privilege-assignment-in-re-7870fd3f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5791%3A%20Incorrect%20Privilege%20Assignment&amp;severity=high&amp;id=6842f14871f4d251b5c95e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0620-files-or-directories-accessible-to-e-a9a32d7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0620%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&amp;severity=medium&amp;id=6842edd971f4d251b5c87eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38000-vulnerability-in-linux-linux-51dc61ff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=6842edde71f4d251b5c88055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5766-cross-site-request-forgery-in-code-p-b4853cd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5766%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=6842eddf71f4d251b5c8809e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49419-cwe-497-exposure-of-sensitive-syste-27579900</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49419%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20esigngenie%20Foxit%20eSign%20for%20WordPress&amp;severity=null&amp;id=6842edde71f4d251b5c88058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49421-cwe-89-improper-neutralization-of-s-a7fc3f28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49421%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Andrei%20Filonov%20WP%20Text%20Expander&amp;severity=null&amp;id=6842edde71f4d251b5c8805b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49425-cwe-352-cross-site-request-forgery--ed1ae2bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49425%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adrian%20Hanft%20Konami%20Easter%20Egg&amp;severity=null&amp;id=6842edde71f4d251b5c8805e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49427-cwe-79-improper-neutralization-of-i-7fe5c145</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Burnette%20Abbie%20Expander&amp;severity=null&amp;id=6842edde71f4d251b5c88061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49429-cwe-79-improper-neutralization-of-i-ca0d43d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryan%20Burnette%20Video%20Embeds&amp;severity=null&amp;id=6842edde71f4d251b5c88064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49435-cwe-352-cross-site-request-forgery--83a625d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hasina77%20Wp%20Easy%20Allopass&amp;severity=null&amp;id=6842edde71f4d251b5c88067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49439-cwe-352-cross-site-request-forgery--300993e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49439%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mariusz88atelierweb%20Atelier%20Create%20CV&amp;severity=null&amp;id=6842edde71f4d251b5c88075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49440-cwe-352-cross-site-request-forgery--26a577a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vuong%20Nguyen%20WP%20Security%20Master&amp;severity=null&amp;id=6842edde71f4d251b5c88078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49441-cwe-862-missing-authorization-in-wp-97c68512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49441%3A%20Missing%20Authorization%20in%20WP%20Map%20Plugins%20Interactive%20Regional%20Map%20of%20Florida&amp;severity=null&amp;id=6842edde71f4d251b5c8807b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49442-cwe-79-improper-neutralization-of-i-87920623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mostafa%20Shahiri%20Simple%20Nested%20Menu&amp;severity=null&amp;id=6842edde71f4d251b5c8807e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49443-cwe-79-improper-neutralization-of-i-43cb03d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20McCoy%20Bacon%20Ipsum&amp;severity=null&amp;id=6842edde71f4d251b5c88081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49445-cwe-352-cross-site-request-forgery--d1c48972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49445%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Interactive%20UK%20Regional%20Map&amp;severity=null&amp;id=6842edde71f4d251b5c88084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49446-cwe-352-cross-site-request-forgery--48d956e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49446%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20minhlaobao%20Admin%20Notes&amp;severity=null&amp;id=6842edde71f4d251b5c88087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49449-cwe-352-cross-site-request-forgery--af0ad0cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49449%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Interactive%20Regional%20Map%20of%20Africa&amp;severity=null&amp;id=6842edde71f4d251b5c8808a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49450-cwe-79-improper-neutralization-of-i-0f54b9a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mhallmann%20SEPA%20Girocode&amp;severity=null&amp;id=6842edde71f4d251b5c8808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49453-cwe-352-cross-site-request-forgery--89f49b48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49453%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jatinder%20Pal%20Singh%20BP%20Profile%20as%20Homepage&amp;severity=null&amp;id=6842eddf71f4d251b5c88090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25995-cwe-98-improper-control-of-filename-be3d9e2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25995%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20choicehomemortgage%20AI%20Mortgage%20Calculator&amp;severity=high&amp;id=6842f14871f4d251b5c95e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25997-cwe-862-missing-authorization-in-so-c7044072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25997%3A%20CWE-862%20Missing%20Authorization%20in%20SolaPlugins%20Sola%20Support%20Ticket&amp;severity=medium&amp;id=6842f14871f4d251b5c95e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26000-cwe-79-improper-neutralization-of-i-c5e2cf97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanhdo205%20Bang%20tinh%20vay&amp;severity=medium&amp;id=6842f14871f4d251b5c95e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26001-cwe-79-improper-neutralization-of-i-65fc04f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marchetti%20Design%20Next%20Event%20Calendar&amp;severity=medium&amp;id=6842f14871f4d251b5c95e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26002-cwe-862-missing-authorization-in-6s-2b5e36dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26002%3A%20CWE-862%20Missing%20Authorization%20in%206Storage%206Storage%20Rentals&amp;severity=medium&amp;id=6842f14871f4d251b5c95e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26003-cwe-89-improper-neutralization-of-s-cf10ad88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26003%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vipul%20Jariwala%20WP%20Post%20Corrector&amp;severity=high&amp;id=6842f14871f4d251b5c95e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23969-cwe-497-exposure-of-sensitive-syste-273574be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23969%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20whassan%20KI%20Live%20Video%20Conferences&amp;severity=null&amp;id=6842f14971f4d251b5c95e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23971-cwe-862-missing-authorization-in-wh-a712fbe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23971%3A%20Missing%20Authorization%20in%20whassan%20KI%20Live%20Video%20Conferences&amp;severity=null&amp;id=6842f14971f4d251b5c95e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24762-cwe-862-missing-authorization-in-fa-a8918a10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24762%3A%20Missing%20Authorization%20in%20facturaone%20TicketBAI%20Facturas%20para%20WooCommerce&amp;severity=null&amp;id=6842edd971f4d251b5c87f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24763-cwe-862-missing-authorization-in-pa-ff1cb103</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24763%3A%20Missing%20Authorization%20in%20Pascal%20Casier%20bbPress%20API&amp;severity=null&amp;id=6842edd971f4d251b5c87f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24772-cwe-352-cross-site-request-forgery--2d9c9b05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24772%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cmsMinds%20Pay%20with%20Contact%20Form%207&amp;severity=null&amp;id=6842edd971f4d251b5c87f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24776-cwe-862-missing-authorization-in-co-4bdd5eb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24776%3A%20Missing%20Authorization%20in%20codelobster%20Responsive%20Flipbooks&amp;severity=null&amp;id=6842edd971f4d251b5c87f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24778-cwe-862-missing-authorization-in-de-6edfa39e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24778%3A%20Missing%20Authorization%20in%20De%20paragon%20No%20Spam%20At%20All&amp;severity=null&amp;id=6842edd971f4d251b5c87f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26590-cwe-89-improper-neutralization-of-s-d091ccc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nir%20Complete%20Google%20Seo%20Scan&amp;severity=null&amp;id=6842edd971f4d251b5c87f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26593-cwe-352-cross-site-request-forgery--62906279</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FasterThemes%20FastBook&amp;severity=null&amp;id=6842edd971f4d251b5c87f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27334-cwe-79-improper-neutralization-of-i-c168ffbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%C3%81ngel%20C.%20Simple%20Google%20Static%20Map&amp;severity=null&amp;id=6842edd971f4d251b5c87f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27359-cwe-352-cross-site-request-forgery--56aec5a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Seerox%20WP%20Media%20File%20Type%20Manager&amp;severity=null&amp;id=6842edd971f4d251b5c87f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27360-cwe-352-cross-site-request-forgery--adfb2b3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27360%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Corner%20Quick%20Event%20Calendar&amp;severity=null&amp;id=6842edd971f4d251b5c87f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28948-cwe-352-cross-site-request-forgery--f7626077</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28948%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codedraft%20Mediabay%20-%20WordPress%20Media%20Library%20Folders&amp;severity=high&amp;id=6842edda71f4d251b5c87f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28950-cwe-352-cross-site-request-forgery--0324ff7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28950%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Shabtai%20Post%20Author&amp;severity=null&amp;id=6842edda71f4d251b5c87f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28952-cwe-352-cross-site-request-forgery--8381f8f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28952%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jonathan%20Lau%20CubePoints&amp;severity=null&amp;id=6842edda71f4d251b5c87f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28954-cwe-352-cross-site-request-forgery--e0b80c2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28954%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphobby%20Backwp&amp;severity=null&amp;id=6842edda71f4d251b5c87f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28958-cwe-352-cross-site-request-forgery--03e83e63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28958%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vadim%20Bogaiskov%20Bg%20Orthodox%20Calendar&amp;severity=null&amp;id=6842edda71f4d251b5c87f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28964-cwe-352-cross-site-request-forgery--63e4142e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28964%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mangup%20Personal%20Favicon&amp;severity=null&amp;id=6842edda71f4d251b5c87f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28966-cwe-352-cross-site-request-forgery--882fbb63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28966%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dilemma123%20Recent%20Posts%20Slider%20Responsive&amp;severity=null&amp;id=6842edda71f4d251b5c87f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28974-cwe-352-cross-site-request-forgery--ad14eb9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28974%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mail250%20Free%20WP%20Mail%20SMTP&amp;severity=null&amp;id=6842edda71f4d251b5c87f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28981-cwe-352-cross-site-request-forgery--30290dca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28981%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soli%20WP%20Mail%20Options&amp;severity=null&amp;id=6842edda71f4d251b5c87f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28984-cwe-352-cross-site-request-forgery--797c9e1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28984%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20storepro%20Subscription%20Renewal%20Reminders%20for%20WooCommerce&amp;severity=null&amp;id=6842edda71f4d251b5c87f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28985-cwe-862-missing-authorization-in-el-7a31205e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28985%3A%20Missing%20Authorization%20in%20Elastic%20Email%20Elastic%20Email%20Subscribe%20Form&amp;severity=null&amp;id=6842edda71f4d251b5c87f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28986-cwe-352-cross-site-request-forgery--865c4d9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Webaholicson%20Epicwin%20Plugin&amp;severity=null&amp;id=6842edda71f4d251b5c87f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28989-cwe-79-improper-neutralization-of-i-69170dea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arildur%20Read%20More%20Login&amp;severity=null&amp;id=6842edda71f4d251b5c87f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28994-cwe-862-missing-authorization-in-vi-793969c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28994%3A%20Missing%20Authorization%20in%20viralloops%20Viral%20Loops%20WP%20Integration&amp;severity=null&amp;id=6842edda71f4d251b5c87f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28995-cwe-862-missing-authorization-in-vi-a0f0d3e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28995%3A%20Missing%20Authorization%20in%20viralloops%20Viral%20Loops%20WP%20Integration&amp;severity=null&amp;id=6842edda71f4d251b5c87f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28996-cwe-862-missing-authorization-in-th-6bc0df08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28996%3A%20Missing%20Authorization%20in%20Thad%20Allender%20GPP%20Slideshow&amp;severity=null&amp;id=6842edda71f4d251b5c87f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28997-cwe-862-missing-authorization-in-ex-ebd571e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28997%3A%20Missing%20Authorization%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=6842edda71f4d251b5c87f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29003-cwe-79-improper-neutralization-of-i-ff74a108</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29003%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mva7%20The%20Holiday%20Calendar&amp;severity=null&amp;id=6842edda71f4d251b5c87f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29005-cwe-352-cross-site-request-forgery--4e6081fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20HR%20Management%20Lite&amp;severity=null&amp;id=6842eddb71f4d251b5c87f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29006-cwe-862-missing-authorization-in-ce-947a5918</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29006%3A%20Missing%20Authorization%20in%20centangle%20Direct%20Checkout%20for%20WooCommerce%20Lite&amp;severity=null&amp;id=6842eddb71f4d251b5c87f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29008-cwe-918-server-side-request-forgery-bfef1341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29008%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ShawonPro%20SocialMark&amp;severity=null&amp;id=6842eddb71f4d251b5c87f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29010-cwe-862-missing-authorization-in-el-fefa28c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29010%3A%20Missing%20Authorization%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=6842eddb71f4d251b5c87f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29011-cwe-79-improper-neutralization-of-i-194ec73c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CHR%20Designer%20YouTube%20Simple%20Gallery&amp;severity=null&amp;id=6842eddb71f4d251b5c87f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29013-cwe-862-missing-authorization-in-fa-fc10791e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29013%3A%20Missing%20Authorization%20in%20faaiq%20Custom%20Category%2FPost%20Type%20Post%20order&amp;severity=null&amp;id=6842eddb71f4d251b5c87f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30624-cwe-862-missing-authorization-in-wo-ddc42a32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30624%3A%20CWE-862%20Missing%20Authorization%20in%20WordLift%20WordLift&amp;severity=medium&amp;id=6842eddb71f4d251b5c87f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30625-cwe-79-improper-neutralization-of-i-9fecaa9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20Pramschufer%20AppBanners&amp;severity=null&amp;id=6842eddb71f4d251b5c87f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30627-cwe-79-improper-neutralization-of-i-4721e9cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20regolithsjk%20Elegant%20Visitor%20Counter&amp;severity=null&amp;id=6842eddb71f4d251b5c87f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30629-cwe-352-cross-site-request-forgery--472dcfa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30629%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Codehaveli%20Bitly%20URL%20Shortener&amp;severity=null&amp;id=6842eddb71f4d251b5c87f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30630-cwe-79-improper-neutralization-of-i-5a9c3f75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pozzad%20Global%20Translator&amp;severity=null&amp;id=6842eddb71f4d251b5c87f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30632-cwe-352-cross-site-request-forgery--2375100b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30632%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pozzad%20Global%20Translator&amp;severity=null&amp;id=6842eddb71f4d251b5c87f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30634-cwe-79-improper-neutralization-of-i-35d39df8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IWEBIX%20WP%20Featured%20Content%20Slider&amp;severity=null&amp;id=6842eddb71f4d251b5c87fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30636-cwe-862-missing-authorization-in-ab-3b1a40e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30636%3A%20Missing%20Authorization%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=6842eddb71f4d251b5c87fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30637-cwe-79-improper-neutralization-of-i-22de7a8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=null&amp;id=6842eddb71f4d251b5c87fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30638-cwe-79-improper-neutralization-of-i-d5a543d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PowieT%20Powie&apos;s%20Uptime%20Robot&amp;severity=null&amp;id=6842eddb71f4d251b5c87fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30927-cwe-862-missing-authorization-in-wo-a33ffb24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30927%3A%20Missing%20Authorization%20in%20Wordapp%20Team%20Wordapp&amp;severity=null&amp;id=6842eddb71f4d251b5c87fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30928-cwe-79-improper-neutralization-of-i-861a28d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vicchi%20WP%20Biographia&amp;severity=null&amp;id=6842eddc71f4d251b5c87fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30930-cwe-79-improper-neutralization-of-i-6879e462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Unreal%20Themes%20ACF%3A%20Yandex%20Maps%20Field&amp;severity=null&amp;id=6842eddc71f4d251b5c87fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30931-cwe-79-improper-neutralization-of-i-5252cfbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30931%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamil%20Shafeev%20%C2%AB%D0%9F%D0%BE%D0%B4%D1%81%D0%BA%D0%B0%D0%B7%D0%BA%D0%B8%C2%BB%20%D0%BE%D1%82%20DaData.ru&amp;severity=null&amp;id=6842eddc71f4d251b5c87fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30932-cwe-862-missing-authorization-in-wp-cc2b1280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30932%3A%20Missing%20Authorization%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=null&amp;id=6842eddc71f4d251b5c87fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30934-cwe-862-missing-authorization-in-ol-cef1cf89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30934%3A%20Missing%20Authorization&amp;severity=null&amp;id=6842eddc71f4d251b5c87fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30935-cwe-79-improper-neutralization-of-i-3104f3c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NickDuncan%20Contact%20Form&amp;severity=null&amp;id=6842eddc71f4d251b5c87fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30937-cwe-79-improper-neutralization-of-i-5df56929</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stefanledin%20Responsify%20WP&amp;severity=null&amp;id=6842eddc71f4d251b5c87fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30938-cwe-79-improper-neutralization-of-i-7b0fe41d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20broadly%20Broadly%20for%20WordPress&amp;severity=null&amp;id=6842eddc71f4d251b5c87fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30939-cwe-79-improper-neutralization-of-i-dae3f35d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debashish%20IFrame%20Widget&amp;severity=null&amp;id=6842eddc71f4d251b5c87fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30940-cwe-79-improper-neutralization-of-i-25150c6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30940%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20melipayamak%20Melipayamak&amp;severity=medium&amp;id=6842eddc71f4d251b5c87fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30941-cwe-79-improper-neutralization-of-i-70541ac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marvie%20Pons%20Pinterest%20Verify%20Meta%20Tag&amp;severity=null&amp;id=6842eddc71f4d251b5c87fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30942-cwe-79-improper-neutralization-of-i-eabd9e89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30942%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Post%20Custom%20Templates%20Lite&amp;severity=null&amp;id=6842eddc71f4d251b5c87fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30945-cwe-862-missing-authorization-in-ta-d6964388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30945%3A%20CWE-862%20Missing%20Authorization%20in%20taskbuilder%20Taskbuilder&amp;severity=medium&amp;id=6842eddc71f4d251b5c87fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30946-cwe-352-cross-site-request-forgery--56b90809</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30946%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Cannon%20Custom%20Bulk%2FQuick%20Edit&amp;severity=null&amp;id=6842eddc71f4d251b5c87fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30948-cwe-352-cross-site-request-forgery--01dd5947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30948%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Giraphix%20Creative%20Layouts%20for%20Elementor&amp;severity=null&amp;id=6842eddc71f4d251b5c87fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30950-cwe-79-improper-neutralization-of-i-086203de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20All%20Currencies%20for%20WooCommerce&amp;severity=null&amp;id=6842eddc71f4d251b5c87ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30951-cwe-79-improper-neutralization-of-i-9bfca4e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stiofan%20BlockStrap%20Page%20Builder%20-%20Bootstrap%20Blocks&amp;severity=null&amp;id=6842eddc71f4d251b5c87ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30952-cwe-79-improper-neutralization-of-i-d65e9aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdive%20Nexa%20Blocks&amp;severity=null&amp;id=6842eddd71f4d251b5c88000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30953-cwe-601-url-redirection-to-untruste-ab6628c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30953%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Salesforce&amp;severity=null&amp;id=6842eddd71f4d251b5c88003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30954-cwe-601-url-redirection-to-untruste-6a27478a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30954%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Constant%20Contact%20Plugin&amp;severity=null&amp;id=6842eddd71f4d251b5c88006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30956-cwe-352-cross-site-request-forgery--5ea021a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30956%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Booqable%20Rental%20Software%20Booqable%20Rental&amp;severity=null&amp;id=6842eddd71f4d251b5c88009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30957-cwe-862-missing-authorization-in-bu-ecad86e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30957%3A%20Missing%20Authorization%20in%20BuddyDev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=null&amp;id=6842eddd71f4d251b5c8800c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30958-cwe-862-missing-authorization-in-on-34fb390e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30958%3A%20Missing%20Authorization%20in%20onOffice%20GmbH%20onOffice%20for%20WP-Websites&amp;severity=null&amp;id=6842eddd71f4d251b5c8800f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30968-cwe-352-cross-site-request-forgery--23fb8c36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30968%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jokerbr313%20Advanced%20Post%20List&amp;severity=null&amp;id=6842eddd71f4d251b5c88012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30974-cwe-862-missing-authorization-in-ak-98fa3545</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30974%3A%20Missing%20Authorization%20in%20Akhtarujjaman%20Shuvo%20Post%20Grid%20Master&amp;severity=null&amp;id=6842eddd71f4d251b5c88015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30976-cwe-918-server-side-request-forgery-da92a4e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30976%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpdive%20Nexa%20Blocks&amp;severity=null&amp;id=6842eddd71f4d251b5c88023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30977-cwe-79-improper-neutralization-of-i-f98424fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chaport%20Live%20Chat%20Chaport&amp;severity=null&amp;id=6842eddd71f4d251b5c88026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30978-cwe-862-missing-authorization-in-do-ac2f2eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30978%3A%20Missing%20Authorization%20in%20Dor%20Zuberi%20Slack%20Notifications%20by%20dorzki&amp;severity=null&amp;id=6842eddd71f4d251b5c88029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30980-cwe-352-cross-site-request-forgery--35d2b1a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30980%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Simple%20Keyword%20to%20Link&amp;severity=null&amp;id=6842eddd71f4d251b5c8802c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30981-cwe-352-cross-site-request-forgery--ac43704e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30981%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tggfref%20WP-Recall&amp;severity=medium&amp;id=6842eddd71f4d251b5c8802f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30986-cwe-352-cross-site-request-forgery--b1f6c737</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30986%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20_CreativeMedia_%20Elite%20Video%20Player&amp;severity=null&amp;id=6842eddd71f4d251b5c88032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30989-cwe-89-improper-neutralization-of-s-5f67db9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30989%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Renzo%20Tejada%20Libro%20de%20Reclamaciones%20y%20Quejas&amp;severity=null&amp;id=6842eddd71f4d251b5c88035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30990-cwe-862-missing-authorization-in-th-2ebb93fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30990%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeHunk%20ThemeHunk&amp;severity=medium&amp;id=6842eddd71f4d251b5c88038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30991-cwe-79-improper-neutralization-of-i-f50b1487</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=6842eddd71f4d251b5c8803b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30994-cwe-352-cross-site-request-forgery--59dcccd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30994%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=6842eddd71f4d251b5c8803e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30995-cwe-352-cross-site-request-forgery--5c0b0953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30995%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=6842edde71f4d251b5c8804c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30997-cwe-918-server-side-request-forgery-bc2e54b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30997%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SmartDataSoft%20Car%20Repair%20Services&amp;severity=null&amp;id=6842edde71f4d251b5c8804f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30999-cwe-98-improper-control-of-filename-8c3a0934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30999%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Fahad%20Mahmood%20External%20Store%20for%20Shopify&amp;severity=null&amp;id=6842edde71f4d251b5c88052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31000-cwe-862-missing-authorization-in-mi-c53f37b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31000%3A%20Missing%20Authorization%20in%20Miguel%20Fuentes%20Payment%20QR%20WooCommerce&amp;severity=null&amp;id=6842eddf71f4d251b5c880a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31025-cwe-79-improper-neutralization-of-i-36d5ee28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blocksera%20Image%20Hover%20Effects%20Block&amp;severity=null&amp;id=6842eddf71f4d251b5c880a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49333-cwe-79-improper-neutralization-of-i-73534712</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp.insider%20Simple%20Membership&amp;severity=null&amp;id=6842ede271f4d251b5c8818f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49332-cwe-352-cross-site-request-forgery--d4a309a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20WP%20Time%20Slots%20Booking%20Form&amp;severity=null&amp;id=6842ede271f4d251b5c88186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49329-cwe-434-unrestricted-upload-of-file-db688820</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49329%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=null&amp;id=6842ede271f4d251b5c88183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49328-cwe-89-improper-neutralization-of-s-46ba74e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49328%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Agile%20Logix%20Store%20Locator%20WordPress&amp;severity=null&amp;id=6842ede271f4d251b5c88180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49327-cwe-89-improper-neutralization-of-s-4f47644f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49327%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20ShortLinks%20Pro&amp;severity=null&amp;id=6842ede271f4d251b5c8817d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49326-cwe-89-improper-neutralization-of-s-bac80193</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49326%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=null&amp;id=6842ede271f4d251b5c8817a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49325-cwe-601-url-redirection-to-untruste-3d66a322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49325%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Automattic%20Newspack%20Newsletters&amp;severity=null&amp;id=6842ede271f4d251b5c88177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49324-cwe-862-missing-authorization-in-pi-5bb6dca1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49324%3A%20Missing%20Authorization%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=6842ede271f4d251b5c88174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49323-cwe-89-improper-neutralization-of-s-df6c2ca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49323%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themefic%20Hydra%20Booking&amp;severity=null&amp;id=6842ede271f4d251b5c88171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49322-cwe-79-improper-neutralization-of-i-27a41b80</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeedProd%20404%20Page%20by%20SeedProd&amp;severity=medium&amp;id=6842ede271f4d251b5c8816e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49320-cwe-862-missing-authorization-in-fr-6c0b0601</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49320%3A%20Missing%20Authorization%20in%20fraudlabspro%20FraudLabs%20Pro%20for%20WooCommerce&amp;severity=null&amp;id=6842ede171f4d251b5c8816b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49318-cwe-79-improper-neutralization-of-i-ce7a8adb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPtouch%20WPtouch&amp;severity=medium&amp;id=6842ede171f4d251b5c8815d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49317-cwe-352-cross-site-request-forgery--649885af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49317%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NTC%20WP%20Page%20Loading&amp;severity=null&amp;id=6842ede171f4d251b5c8815a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49315-cwe-89-improper-neutralization-of-s-eb38f02b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49315%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=null&amp;id=6842ede171f4d251b5c88157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49314-cwe-79-improper-neutralization-of-i-62deb837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ovatheme%20BRW&amp;severity=null&amp;id=6842ede171f4d251b5c88154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49313-cwe-98-improper-control-of-filename-031794d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49313%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ovatheme%20BRW&amp;severity=null&amp;id=6842ede171f4d251b5c88151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49311-cwe-79-improper-neutralization-of-i-40a03b3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49311%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolHappy%20The%20Events%20Calendar%20Countdown%20Addon&amp;severity=null&amp;id=6842ede171f4d251b5c8814e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49310-cwe-79-improper-neutralization-of-i-135ac36e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Frontend%20Dashboard&amp;severity=null&amp;id=6842ede171f4d251b5c8814b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49309-cwe-79-improper-neutralization-of-i-645340c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Team%20Member&amp;severity=null&amp;id=6842ede171f4d251b5c88148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49308-cwe-98-improper-control-of-filename-276509f0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49308%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Travel%20Engine%20WP%20Travel%20Engine&amp;severity=high&amp;id=6842ede171f4d251b5c88145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49307-cwe-98-improper-control-of-filename-c4f66c43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49307%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Magazine3%20WP%20Multilang&amp;severity=null&amp;id=6842ede171f4d251b5c88142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49306-cwe-79-improper-neutralization-of-i-c7a758ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchsquare%20WP%20Social%20Widget&amp;severity=null&amp;id=6842ede171f4d251b5c88134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49305-cwe-79-improper-neutralization-of-i-d5ce274f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20impleCode%20Product%20Catalog%20Simple&amp;severity=null&amp;id=6842ede171f4d251b5c88131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49304-cwe-79-improper-neutralization-of-i-e6aa6df3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeManas%20Search%20with%20Typesense&amp;severity=null&amp;id=6842ede171f4d251b5c8812e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49301-cwe-79-improper-neutralization-of-i-cebc9397</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=6842ede171f4d251b5c8812b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49299-cwe-79-improper-neutralization-of-i-98dbee77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPlugged.com%20WebHotelier&amp;severity=null&amp;id=6842ede171f4d251b5c88128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49298-cwe-79-improper-neutralization-of-i-ea55febc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49298%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=6842ede171f4d251b5c88125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49294-cwe-201-insertion-of-sensitive-info-50889768</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49294%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20CodeRevolution%20Crawlomatic%20Multisite%20Scraper%20Post%20Generator&amp;severity=null&amp;id=6842ede071f4d251b5c88122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49293-cwe-862-missing-authorization-in-co-3adb7ad7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49293%3A%20Missing%20Authorization%20in%20CodeRevolution%20Crawlomatic%20Multisite%20Scraper%20Post%20Generator&amp;severity=null&amp;id=6842ede071f4d251b5c8811f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49292-cwe-1284-improper-validation-of-spe-74f49694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49292%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Cozmoslabs%20Profile%20Builder&amp;severity=null&amp;id=6842ede071f4d251b5c8811c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49291-cwe-352-cross-site-request-forgery--dbc84971</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49291%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=null&amp;id=6842ede071f4d251b5c88119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49289-cwe-862-missing-authorization-in-ad-f38a15a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49289%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=null&amp;id=6842ede071f4d251b5c8810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49288-cwe-862-missing-authorization-in-ru-da3bcf2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49288%3A%20Missing%20Authorization%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=6842ede071f4d251b5c88108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49287-cwe-862-missing-authorization-in-we-aa1bc219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49287%3A%20Missing%20Authorization%20in%20WebToffee%20Product%20Feed%20for%20WooCommerce&amp;severity=null&amp;id=6842ede071f4d251b5c88105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49286-cwe-352-cross-site-request-forgery--e122fd96</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49286%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Table%20Builder%20WP%20Table%20Builder&amp;severity=medium&amp;id=6842ede071f4d251b5c88102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49285-cwe-352-cross-site-request-forgery--cabaf598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49285%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Legal%20Pages%20WP%20Cookie%20Notice%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20Consent&amp;severity=null&amp;id=6842ede071f4d251b5c880ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49284-cwe-352-cross-site-request-forgery--05fbc034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49284%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20WP%20Maintenance%20Mode%20%26%20Site%20Under%20Construction&amp;severity=null&amp;id=6842ede071f4d251b5c880fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49283-cwe-352-cross-site-request-forgery--7679fda1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49283%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matthias%20Nordwig%20Anti-spam%2C%20Spam%20protection%2C%20ReCaptcha%20for%20all%20forms%20and%20GDPR-compliant&amp;severity=null&amp;id=6842ede071f4d251b5c880f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49273-cwe-352-cross-site-request-forgery--f9dd02eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49273%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20WP%20Tools&amp;severity=null&amp;id=6842ede071f4d251b5c880f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49272-cwe-862-missing-authorization-in-se-69d9055e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49272%3A%20Missing%20Authorization%20in%20sergiotrinity%20Trinity%20Audio&amp;severity=null&amp;id=6842ede071f4d251b5c880f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49270-cwe-862-missing-authorization-in-ma-624d57f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49270%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=null&amp;id=6842ede071f4d251b5c880f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49269-cwe-352-cross-site-request-forgery--78af0ee0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49269%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anton%20Vanyukov%20Market%20Exporter&amp;severity=null&amp;id=6842ede071f4d251b5c880e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49268-cwe-862-missing-authorization-in-so-df96b667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49268%3A%20Missing%20Authorization%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=6842ede071f4d251b5c880df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49263-cwe-89-improper-neutralization-of-s-33eed615</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49263%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WCVendors%20WC%20Vendors%20Marketplace&amp;severity=null&amp;id=6842ede071f4d251b5c880dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49262-cwe-79-improper-neutralization-of-i-ef38343a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor&amp;severity=null&amp;id=6842ede071f4d251b5c880d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49250-cwe-94-improper-control-of-generati-d274ba63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49250%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20cmoreira%20Team%20Showcase&amp;severity=null&amp;id=6842eddf71f4d251b5c880d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49248-cwe-862-missing-authorization-in-cm-4a5a8ca3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49248%3A%20Missing%20Authorization%20in%20cmoreira%20Team%20Showcase&amp;severity=null&amp;id=6842eddf71f4d251b5c880d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49246-cwe-862-missing-authorization-in-cm-82c7b457</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49246%3A%20Missing%20Authorization%20in%20cmoreira%20Testimonials%20Showcase&amp;severity=null&amp;id=6842eddf71f4d251b5c880d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49244-cwe-79-improper-neutralization-of-i-567f33c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49244%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vova%20Shortcodes%20Ultimate&amp;severity=null&amp;id=6842eddf71f4d251b5c880cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49243-cwe-79-improper-neutralization-of-i-4f3afb54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49243%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sevenspark%20ShiftNav%20%E2%80%93%20Responsive%20Mobile%20Menu&amp;severity=null&amp;id=6842eddf71f4d251b5c880ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49242-cwe-79-improper-neutralization-of-i-284ad555</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49242%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sevenspark%20Bellows%20Accordion%20Menu&amp;severity=null&amp;id=6842eddf71f4d251b5c880c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49241-cwe-862-missing-authorization-in-bo-a43e6161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49241%3A%20Missing%20Authorization%20in%20bobbingwide%20oik&amp;severity=null&amp;id=6842eddf71f4d251b5c880b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49240-cwe-862-missing-authorization-in-nk-f8e346a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49240%3A%20Missing%20Authorization%20in%20nK%20DocsPress&amp;severity=null&amp;id=6842eddf71f4d251b5c880b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49239-cwe-352-cross-site-request-forgery--2f3b1a0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49239%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=null&amp;id=6842eddf71f4d251b5c880b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49238-cwe-352-cross-site-request-forgery--d3ef4ac0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49238%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20everestthemes%20Everest%20Backup&amp;severity=null&amp;id=6842eddf71f4d251b5c880b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49237-cwe-352-cross-site-request-forgery--54efcf76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49237%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20POEditor%20POEditor&amp;severity=high&amp;id=6842eddf71f4d251b5c880ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49236-cwe-862-missing-authorization-in-ra-5cc69320</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49236%3A%20CWE-862%20Missing%20Authorization%20in%20raychat%20Raychat&amp;severity=medium&amp;id=6842eddf71f4d251b5c880aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49235-cwe-79-improper-neutralization-of-i-ee1a36ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=6842eddf71f4d251b5c880a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blitz-malware-a-tale-of-game-cheats-and-code-repos-84d98ae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blitz%20Malware%3A%20A%20Tale%20of%20Game%20Cheats%20and%20Code%20Repositories&amp;severity=medium&amp;id=6844344671f4d251b50adf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5765-cross-site-scripting-in-code-project-bc4caf79</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5765%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=6842e15f1a426642debd4c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5764-cross-site-scripting-in-code-project-391d65b4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5764%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Laundry%20System&amp;severity=medium&amp;id=6842e15f1a426642debd4c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49072-cwe-502-deserialization-of-untruste-35c5c180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49072%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Mr.%20Murphy&amp;severity=null&amp;id=6842e15f1a426642debd4c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49073-cwe-502-deserialization-of-untruste-9bc7d095</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49073%3A%20Deserialization%20of%20Untrusted%20Data%20in%20axiomthemes%20Sweet%20Dessert&amp;severity=null&amp;id=6842e15f1a426642debd4c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5763-command-injection-in-tenda-cp3-ff92e051</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5763%3A%20Command%20Injection%20in%20Tenda%20CP3&amp;severity=medium&amp;id=6842e15f1a426642debd4c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5762-sql-injection-in-code-projects-patie-774a55f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5762%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6842e15f1a426642debd4c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41361-cwe-400-uncontrolled-resource-consu-eb31fd97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41361%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=high&amp;id=6842e15f1a426642debd4ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41367-cwe-79-improper-neutralization-of-i-86928329</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842e15f1a426642debd4ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41366-cwe-942-permissive-cross-domain-pol-3cf89f0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41366%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41365-cwe-94-improper-control-of-generati-be0aae07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41365%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41364-cwe-79-improper-neutralization-of-i-6387eed3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48329-cwe-79-improper-neutralization-of-i-711261d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=null&amp;id=6842df081a426642debcb51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41363-cwe-942-permissive-cross-domain-pol-171355bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41363%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39358-cwe-502-deserialization-of-untruste-158428cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39358%3A%20Deserialization%20of%20Untrusted%20Data%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=6842df081a426642debcb50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41362-cwe-94-improper-control-of-generati-ddd8f2a7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41362%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=medium&amp;id=6842df081a426642debcb50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47584-cwe-502-deserialization-of-untruste-87c26e3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47584%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Photography&amp;severity=high&amp;id=6842df081a426642debcb518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41360-cwe-400-uncontrolled-resource-consu-4dbbec96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41360%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20ZIV%20IDF%20and%20ZLF&amp;severity=high&amp;id=6842df031a426642debc9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47586-cwe-98-improper-control-of-filename-fb1a6eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47586%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Motors%20-%20Events&amp;severity=null&amp;id=6842df081a426642debcb4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48335-cwe-862-missing-authorization-in-cy-0e1385a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48335%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Plus&amp;severity=null&amp;id=6842df081a426642debcb4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48328-cwe-352-cross-site-request-forgery--16c8bd89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Daman%20Jeet%20Real%20Time%20Validation%20for%20Gravity%20Forms&amp;severity=null&amp;id=6842df081a426642debcb4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49076-cwe-79-improper-neutralization-of-i-98a83e48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=6842df081a426642debcb4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49075-cwe-79-improper-neutralization-of-i-da4e38bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49075%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=6842df081a426642debcb4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49074-cwe-79-improper-neutralization-of-i-1368e3b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49074%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abu%20Huraira%20Bin%20Aman%20WidgetKit&amp;severity=null&amp;id=6842df081a426642debcb4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49068-cwe-79-improper-neutralization-of-i-fddbce76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49068%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=null&amp;id=6842df081a426642debcb4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49067-cwe-79-improper-neutralization-of-i-3ae770b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49067%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=6842df081a426642debcb4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5761-sql-injection-in-phpgurukul-bp-monit-27d5356a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5761%3A%20SQL%20Injection%20in%20PHPGurukul%20BP%20Monitoring%20Management%20System&amp;severity=medium&amp;id=6842df081a426642debcb4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49077-cwe-352-cross-site-request-forgery--219eaf43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49077%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeHigh%20Dynamic%20Pricing%20and%20Discount%20Rules&amp;severity=null&amp;id=6842df031a426642debc93ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48337-cwe-862-missing-authorization-in-qu-95c985e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48337%3A%20CWE-862%20Missing%20Authorization%20in%20QuickcabWP%20QuickCab&amp;severity=medium&amp;id=6842df031a426642debc93a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5239-cwe-79-improper-neutralization-of-in-edf13c9b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeatelier%20Domain%20For%20Sale%2C%20Domain%20appraisal%2C%20Domain%20auction%2C%20Domain%20marketplace%20%E2%80%93%20Best%20Domain%20For%20sale%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=6842df031a426642debc93b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5760-cwe-256-plaintext-storage-of-a-passw-6555c413</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5760%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20eskapism%20Simple%20History%20%E2%80%93%20Track%2C%20Log%2C%20and%20Audit%20WordPress%20Changes&amp;severity=medium&amp;id=6842df031a426642debc93b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-open-source-to-open-threat-tracking-chaos-rat-7843c7f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20open-source%20to%20open%20threat%3A%20Tracking%20Chaos%20RAT%E2%80%99s%20evolution&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-apt37-attack-case-disguised-as-a-think-999bea35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20APT37%20Attack%20Case%20Disguised%20as%20a%20Think%20Tank%20for%20National%20Security%20Strategy%20in%20South%20Korea%20(Operation%20ToyBox%20Story)&amp;severity=medium&amp;id=6843376d71f4d251b5d88f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-analysis-dcrat-presence-growing-in-latin-am-1567894b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Analysis%3A%20DCRat%20presence%20growing%20in%20Latin%20America&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bladedfeline-whispering-in-the-dark-b294c74b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BladedFeline%3A%20Whispering%20in%20the%20dark&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abusing-pasteee-to-deploy-xworm-and-asyncrat-acros-2ca7caff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Abusing%20Paste.ee%20to%20Deploy%20XWorm%20and%20AsyncRAT%20Across%20Global%20C2%20Infrastructure&amp;severity=medium&amp;id=6846bdb07b622a9fdf66b740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5759-sql-injection-in-phpgurukul-local-se-1d3d886f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5759%3A%20SQL%20Injection%20in%20PHPGurukul%20Local%20Services%20Search%20Engine%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc93bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5758-sql-injection-in-sourcecodester-open-7eda2887</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5758%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc93ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5757-cross-site-scripting-in-code-project-346516d2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5757%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=6842c652182aa0cae20c28c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pathwiper-data-wiper-malware-disrupts-ukrainia-f61db96e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PathWiper%20Data%20Wiper%20Malware%20Disrupts%20Ukrainian%20Critical%20Infrastructure%20in%202025%20Attack&amp;severity=critical&amp;id=6842c2d5182aa0cae20baa17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5756-sql-injection-in-code-projects-real--3358a8c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5756%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=6842bf69182aa0cae20b29e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5755-sql-injection-in-sourcecodester-open-e3f46f88</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5755%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc93d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48784-cwe-862-missing-authorization-in-so-5b4bf53e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48784%3A%20CWE-862%20Missing%20Authorization%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=high&amp;id=6842df031a426642debc93ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48783-cwe-73-external-control-of-file-nam-74017ac4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48783%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=high&amp;id=6842df031a426642debc93c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48782-cwe-434-unrestricted-upload-of-file-77acfb25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48782%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=critical&amp;id=6842df031a426642debc93c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48781-cwe-73-external-control-of-file-nam-e59cd5ff</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48781%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=high&amp;id=6842b857182aa0cae20a247f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48780-cwe-502-deserialization-of-untruste-b05f7a39</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48780%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=critical&amp;id=6842b4bf182aa0cae209a476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5192-cwe-306-missing-authentication-for-c-e8ed1d4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5192%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Soar%20Cloud%20System%20CO.%2C%20LTD.%20HRD%20Human%20Resource%20Management%20System&amp;severity=critical&amp;id=6842df031a426642debc947f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5739-buffer-overflow-in-totolink-x15-b0ca0a14</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5739%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842df031a426642debc9484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5738-buffer-overflow-in-totolink-x15-fbc371db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5738%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842b14e182aa0cae20925c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5737-buffer-overflow-in-totolink-x15-5b894260</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5737%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842aa46182aa0cae2082638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3365-cwe-23-relative-path-traversal-in-b--e57b3055</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3365%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20B.%20Braun%20Melsungen%20AG%20OnlineSuite&amp;severity=critical&amp;id=6842df031a426642debc9489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3322-cwe-917-improper-neutralization-of-s-4705a052</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3322%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20B.%20Braun%20Melsungen%20AG%20OnlineSuite&amp;severity=critical&amp;id=6842a6a5182aa0cae207a77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3321-cwe-798-use-of-hard-coded-credential-fed00787</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3321%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20B.%20Braun%20Melsungen%20AG%20OnlineSuite&amp;severity=critical&amp;id=6842a32b182aa0cae2072843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5736-buffer-overflow-in-totolink-x15-25e55623</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5736%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842df031a426642debc9493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5735-buffer-overflow-in-totolink-x15-0e9e26d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5735%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=6842df031a426642debc948e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5734-buffer-overflow-in-totolink-x15-10d16bec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5734%3A%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=68429c2d182aa0cae2061714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5732-cross-site-request-forgery-in-code-p-c263763d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5732%3A%20Cross-Site%20Request%20Forgery%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=68429c2d182aa0cae2061712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5729-sql-injection-in-code-projects-healt-393ad6b4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5729%3A%20SQL%20Injection%20in%20code-projects%20Health%20Center%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5728-unrestricted-upload-in-sourcecodeste-d5aa31df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5728%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=68429530182aa0cae20512fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48908-cwe-567-unsynchronized-access-to-sh-3871fef2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48908%3A%20CWE-567%20Unsynchronized%20Access%20to%20Shared%20Data%20in%20a%20Multithreaded%20Context%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68429199182aa0cae20492c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48911-cwe-266-incorrect-privilege-assignm-1e361ad3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48911%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68429199182aa0cae20492cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48910-cwe-122-heap-based-buffer-overflow--4c037146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48910%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68429199182aa0cae20492ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48909-cwe-287-improper-authentication-in--a216a009</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48909%3A%20CWE-287%20Improper%20Authentication%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=68429199182aa0cae20492c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5686-cwe-80-improper-neutralization-of-sc-7197afdf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5686%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20andreyk%20Paged%20Gallery&amp;severity=medium&amp;id=68429199182aa0cae20492f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5563-cwe-89-improper-neutralization-of-sp-37c2e439</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5563%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberscorp%20WP-Addpub&amp;severity=medium&amp;id=68429199182aa0cae20492ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5486-cwe-862-missing-authorization-in-drs-a7a4e46f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5486%3A%20CWE-862%20Missing%20Authorization%20in%20dr_scythe%20WP%20Email%20Debug&amp;severity=critical&amp;id=68429199182aa0cae20492e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5541-cwe-79-improper-neutralization-of-in-d37b8d19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5541%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frold%20Runners%20Log&amp;severity=medium&amp;id=68429199182aa0cae20492eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5565-cwe-79-improper-neutralization-of-in-210927aa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jason-lau%20Hide%20It&amp;severity=medium&amp;id=68429199182aa0cae20492ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2935-cwe-352-cross-site-request-forgery-c-7a105b72</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2935%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mcitar%20Anti-Spam%3A%20Spam%20Protection%20%7C%20Block%20Spam%20Users%2C%20Comments%2C%20Forms&amp;severity=medium&amp;id=68429199182aa0cae20492c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5538-cwe-79-improper-neutralization-of-in-1d3e7adf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cais%20BNS%20Featured%20Category&amp;severity=medium&amp;id=68429199182aa0cae20492e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4964-cwe-89-improper-neutralization-of-sp-bd349b10</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4964%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hk1993%20WP%20Online%20Users%20Stats&amp;severity=medium&amp;id=68429199182aa0cae20492ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4966-cwe-352-cross-site-request-forgery-c-97abecbe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4966%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hk1993%20WP%20Online%20Users%20Stats&amp;severity=medium&amp;id=68429199182aa0cae20492d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5018-cwe-862-missing-authorization-in-hiv-eaa772f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5018%3A%20CWE-862%20Missing%20Authorization%20in%20hivesupport%20Hive%20Support%20%7C%20AI-Powered%20Help%20Desk%2C%20Live%20Chat%20%26%20AI%20Chat%20Bot%20Plugin%20for%20WordPress&amp;severity=high&amp;id=68429199182aa0cae20492d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5536-cwe-79-improper-neutralization-of-in-8ed3584e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5536%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsemeteys%20Freemind%20Viewer&amp;severity=medium&amp;id=68429199182aa0cae20492e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5703-cwe-79-improper-neutralization-of-in-145650de</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20malcolm-oph%20StageShow&amp;severity=medium&amp;id=68429199182aa0cae20492fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5699-cwe-79-improper-neutralization-of-in-8211e761</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gsaraiva%20Developer%20Formatter&amp;severity=medium&amp;id=68429199182aa0cae20492f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5586-cwe-79-improper-neutralization-of-in-75ca2abd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tushargohel%20WordPress%20Ajax%20Load%20More%20and%20Infinite%20Scroll&amp;severity=medium&amp;id=68429199182aa0cae20492f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5019-cwe-352-cross-site-request-forgery-c-e4fc9d57</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5019%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hivesupport%20Hive%20Support%20%7C%20AI-Powered%20Help%20Desk%2C%20Live%20Chat%20%26%20AI%20Chat%20Bot%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=68429199182aa0cae20492d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5534-cwe-79-improper-neutralization-of-in-dd661d22</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calebzahnd%20ESV%20Bible%20Shortcode%20for%20WordPress&amp;severity=medium&amp;id=68429199182aa0cae20492e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5533-cwe-79-improper-neutralization-of-in-7d8ce918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5533%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20Knowledge%20Base&amp;severity=medium&amp;id=68429199182aa0cae20492e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58114-cwe-770-allocation-of-resources-wit-e74a13b1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58114%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68429199182aa0cae20492c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48907-cwe-248-uncaught-exception-in-huawe-922e0545</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48907%3A%20CWE-248%20Uncaught%20Exception%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6842df031a426642debc955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48906-cwe-290-authentication-bypass-by-sp-8719f8ec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48906%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6842df031a426642debc9556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48905-cwe-1068-inconsistency-between-impl-5d6f4534</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48905%3A%20CWE-1068%20Inconsistency%20Between%20Implementation%20and%20Documented%20Design%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6842df031a426642debc94a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48904-cwe-288-authentication-bypass-using-c16218ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48904%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6842df031a426642debc94a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48903-cwe-264-permissions-privileges-and--5bb9a65a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48903%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=6842df031a426642debc94a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48902-cwe-118-incorrect-access-of-indexab-895939c3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48902%3A%20CWE-118%20Incorrect%20Access%20of%20Indexable%20Resource%20(&apos;Range%20Error&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68428e13182aa0cae204134a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5727-cross-site-scripting-in-sourcecodest-e2561674</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5727%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5726-cross-site-scripting-in-sourcecodest-2eb86641</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5726%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2921-cwe-89-sql-injection-in-unknown-shor-dbba38d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2921%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Short%20URL&amp;severity=high&amp;id=6842871a182aa0cae2031526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5725-cross-site-scripting-in-sourcecodest-6de50921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5725%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc956a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5724-cross-site-scripting-in-sourcecodest-65554161</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5724%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=68427fed182aa0cae20216a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1777-cwe-862-missing-authorization-in-sea-966dd036</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1777%3A%20CWE-862%20Missing%20Authorization%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=medium&amp;id=6842df031a426642debc956f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1778-cwe-862-missing-authorization-in-sea-5bab4eb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1778%3A%20CWE-862%20Missing%20Authorization%20in%20SeaTheme%20Art%20Theme&amp;severity=medium&amp;id=6842df031a426642debc9574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5723-cross-site-scripting-in-sourcecodest-07453b7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5723%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842790a182aa0cae201169b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5722-cross-site-scripting-in-sourcecodest-b048a41a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5722%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36513-cross-site-request-forgery-csrf-in--0f6bcacd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36513%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20i-PRO%20Co.%2C%20Ltd.%20Surveillance%20cameras%20provided%20by%20i-PRO%20Co.%2C%20Ltd.&amp;severity=medium&amp;id=684271ea182aa0cae2001472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5721-cross-site-scripting-in-sourcecodest-a90b5da0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5721%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=68426aef182aa0cae2ff170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5733-cwe-201-insertion-of-sensitive-infor-81e828dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5733%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20webnus%2F%20Modern%20Events%20Calendar%20Lite&amp;severity=medium&amp;id=6842df031a426642debc9583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5719-cwe-306-missing-authentication-for-c-7a23e015</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5719%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20vivo%20Wallet&amp;severity=medium&amp;id=6842df031a426642debc957e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5716-sql-injection-in-sourcecodester-open-0922611c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5716%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=68426758182aa0cae2fe9807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46941-cwe-281-improper-preservation-of-pe-5ef4341b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46941%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20vivo%20SystemUI&amp;severity=medium&amp;id=684263cf182aa0cae2fe1948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5715-missing-critical-step-in-authenticat-669579bf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5715%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Signal%20App&amp;severity=low&amp;id=6842df031a426642debc9635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5714-path-traversal-in-soluescoop-isolues-5c6d4c9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5714%3A%20Path%20Traversal%20in%20Solu%C3%A7%C3%B5esCoop%20iSolu%C3%A7%C3%B5esWEB&amp;severity=medium&amp;id=6842df031a426642debc9630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5713-cross-site-scripting-in-soluescoop-i-d6356650</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5713%3A%20Cross%20Site%20Scripting%20in%20Solu%C3%A7%C3%B5esCoop%20iSolu%C3%A7%C3%B5esWEB&amp;severity=medium&amp;id=6842df031a426642debc963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5712-sql-injection-in-sourcecodester-open-9cb34bf5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5712%3A%20SQL%20Injection%20in%20SourceCodester%20Open%20Source%20Clinic%20Management%20System&amp;severity=medium&amp;id=68425ce5182aa0cae2fd1a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5711-sql-injection-in-code-projects-real--ed1dfc2a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5711%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=68425246182aa0cae2fb8eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5710-sql-injection-in-code-projects-real--3093d0ab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5710%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc964e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5709-sql-injection-in-code-projects-real--84d1f621</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5709%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc9649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56343-cwe-771-missing-reference-to-active-c0c116c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56343%3A%20CWE-771%20Missing%20Reference%20to%20Active%20Allocated%20Resource%20in%20IBM%20Verify%20Identity%20Access%20Digital%20Credentials&amp;severity=medium&amp;id=6842df031a426642debc9644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56342-cwe-209-generation-of-error-message-a3dee845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56342%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Verify%20Identity%20Access%20Digital%20Credentials&amp;severity=medium&amp;id=6842df031a426642debc963f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22330-cwe-521-weak-password-requirements--554afd4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22330%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20Security%20Verify%20Governance&amp;severity=medium&amp;id=68424b45182aa0cae2fa91cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5708-sql-injection-in-code-projects-real--8e2a3127</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5708%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=684240e2182aa0cae2f9148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5707-sql-injection-in-phpgurukul-human-me-dbb344ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5707%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=684239bc182aa0cae2f81689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5706-sql-injection-in-phpgurukul-human-me-2342a214</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5706%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=684236c0182aa0cae2f79812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-06-854f15ea</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-06&amp;severity=medium&amp;id=68490f133cd93dcca831da51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49599-cwe-863-incorrect-authorization-in--37b43352</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49599%3A%20CWE-863%20Incorrect%20Authorization%20in%20Huawei%20EG8141A5&amp;severity=medium&amp;id=68431b5671f4d251b5d2d3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5705-sql-injection-in-code-projects-real--1fccd210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5705%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=68422ba0182aa0cae2f6179a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5704-sql-injection-in-code-projects-real--ffcaad62</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5704%3A%20SQL%20Injection%20in%20code-projects%20Real%20Estate%20Property%20Management%20System&amp;severity=medium&amp;id=684224a3182aa0cae2f51a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc1151-exploiting-roundcube-to-steal-user-credent-a6f122c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UNC1151%20exploiting%20Roundcube%20to%20steal%20user%20credentials%20in%20a%20spearphishing%20campaign&amp;severity=medium&amp;id=684298b5182aa0cae2059206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49012-cwe-287-improper-authentication-in--1dba70bc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49012%3A%20CWE-287%3A%20Improper%20Authentication%20in%20himmelblau-idm%20himmelblau&amp;severity=medium&amp;id=68421d96182aa0cae2f41d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5698-sql-injection-in-brilliance-golden-l-39772c27</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5698%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=68421696182aa0cae2f320a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cards-are-still-the-weakest-link-ef662bae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cards%20Are%20Still%20the%20Weakest%20Link&amp;severity=medium&amp;id=68421312182aa0cae2f2a256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5697-sql-injection-in-brilliance-golden-l-56b2680b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5697%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=68420f89182aa0cae2f2232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5696-sql-injection-in-brilliance-golden-l-4884cf5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5696%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=68420f89182aa0cae2f22329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-threat-actors-exploit-human-trust-a-breakdown--7d69d9f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Threat%20Actors%20Exploit%20Human%20Trust%3A%20A%20Breakdown%20of%20the%20&apos;Prove%20You%20Are%20Human&apos;%20Malware%20Scheme&amp;severity=medium&amp;id=68420f7f182aa0cae2f222cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5695-command-injection-in-flir-ax8-65098767</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5695%3A%20Command%20Injection%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=684208c0182aa0cae2f126f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47966-cwe-200-exposure-of-sensitive-infor-89cfa1e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47966%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=critical&amp;id=68420613182aa0cae2f0a905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48133-cwe-862-missing-authorization-in-un-ab87539c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48133%3A%20Missing%20Authorization%20in%20Uncanny%20Owl%20Uncanny%20Automator&amp;severity=null&amp;id=684204e8182aa0cae2f0a5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5694-sql-injection-in-phpgurukul-human-me-d2fb8030</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5694%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=68420061182aa0cae2ef99cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/old-atampt-data-leak-repackaged-to-link-ssns-dobs--0da8628b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Old%20AT%26amp%3BT%20data%20leak%20repackaged%20to%20link%20SSNs%2C%20DOBs%20to%2049M%20phone%20numbers&amp;severity=medium&amp;id=6842004e182aa0cae2ef99c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5693-sql-injection-in-phpgurukul-human-me-7e04cb03</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5693%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=6842df031a426642debc96fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5685-stack-based-buffer-overflow-in-tenda-c2add8af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5685%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=6841fb73182aa0cae2ef1b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43026-cwe-281-improper-preservation-of-pe-501cb2cd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43026%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20HP%2C%20Inc.%20HP%20Support%20Assistant&amp;severity=high&amp;id=6841f369182aa0cae2ee1e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5680-deserialization-in-shenzhen-dashi-to-5df6ec20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5680%3A%20Deserialization%20in%20Shenzhen%20Dashi%20Tongzhou%20Information%20Technology%20AgileBPM&amp;severity=medium&amp;id=6841f6f6182aa0cae2ee9c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5745-vulnerability-in-the-gnu-c-library-g-7e49ef3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5745%3A%20Vulnerability%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=6841efec182aa0cae2ed9f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5679-deserialization-in-shenzhen-dashi-to-47b56bdf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5679%3A%20Deserialization%20in%20Shenzhen%20Dashi%20Tongzhou%20Information%20Technology%20AgileBPM&amp;severity=medium&amp;id=6841ec61182aa0cae2ed1f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5677-sql-injection-in-campcodes-online-re-90f72aec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5677%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=6841ec61182aa0cae2ed1efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5676-sql-injection-in-campcodes-online-re-9fdf56b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5676%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Recruitment%20Management%20System&amp;severity=medium&amp;id=6841ec61182aa0cae2ed1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5675-sql-injection-in-campcodes-online-te-64ce7848</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5675%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6841efec182aa0cae2ed9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5702-vulnerability-in-the-gnu-c-library-g-c1d3dae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5702%3A%20Vulnerability%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=6842df031a426642debc965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5674-sql-injection-in-code-projects-patie-3e28c21c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5674%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6841e8e0182aa0cae2eca02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46258-cwe-862-missing-authorization-in-bd-fedaa421</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46258%3A%20CWE-862%20Missing%20Authorization%20in%20BdThemes%20Element%20Pack%20Pro&amp;severity=medium&amp;id=6841d76c182aa0cae2e986cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46257-cwe-352-cross-site-request-forgery--cf7a7653</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46257%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BdThemes%20Element%20Pack%20Pro&amp;severity=medium&amp;id=6841d76c182aa0cae2e986cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unsecured-database-exposes-data-of-36-million-pass-2c4b4f8f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unsecured%20Database%20Exposes%20Data%20of%203.6%20Million%20Passion.io%20Creators&amp;severity=medium&amp;id=6841d75c182aa0cae2e986ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5672-buffer-overflow-in-totolink-n302r-pl-100e7dde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5672%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N302R%20Plus&amp;severity=high&amp;id=6841d76c182aa0cae2e986d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5671-buffer-overflow-in-totolink-n302r-pl-58e30380</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5671%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N302R%20Plus&amp;severity=high&amp;id=6841d76c182aa0cae2e986d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5670-sql-injection-in-phpgurukul-medical--deec173a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5670%3A%20SQL%20Injection%20in%20PHPGurukul%20Medical%20Card%20Generation%20System&amp;severity=medium&amp;id=6841d069182aa0cae2e88601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-phantom-enigma-280fd35e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Phantom%20Enigma&amp;severity=medium&amp;id=6841d3cd182aa0cae2e9066b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49009-cwe-532-insertion-of-sensitive-info-b6262809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49009%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Erudika%20para&amp;severity=medium&amp;id=6841cccd182aa0cae2e789a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48493-cwe-532-insertion-of-sensitive-info-2c438c0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48493%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20yiisoft%20yii2-redis&amp;severity=medium&amp;id=6841c953182aa0cae2e70b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5669-sql-injection-in-phpgurukul-medical--dceeeb14</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5669%3A%20SQL%20Injection%20in%20PHPGurukul%20Medical%20Card%20Generation%20System&amp;severity=medium&amp;id=6841d76c182aa0cae2e986d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5668-sql-injection-in-phpgurukul-medical--c1696eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5668%3A%20SQL%20Injection%20in%20PHPGurukul%20Medical%20Card%20Generation%20System&amp;severity=medium&amp;id=6841d76c182aa0cae2e986d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-in-anthropics-mcp-full-schema-pois-070ed197</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20in%20Anthropic%E2%80%99s%20MCP%3A%20Full-Schema%20Poisoning%20%2B%20Secret-Leaking%20Tool%20Attacks%20(PoC%20Inside)&amp;severity=critical&amp;id=6841c5b3182aa0cae2e68ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5667-buffer-overflow-in-freefloat-ftp-ser-2451a293</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5667%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841d069182aa0cae2e88629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-identified-wiper-malware-pathwiper-targets-c-334010a7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20identified%20wiper%20malware%20&apos;PathWiper&apos;%20targets%20critical%20infrastructure%20in%20Ukraine&amp;severity=medium&amp;id=6841d3cd182aa0cae2e9072d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/be-careful-with-fake-zoom-client-downloads-f613387b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Be%20Careful%20With%20Fake%20Zoom%20Client%20Downloads&amp;severity=medium&amp;id=6841d3cd182aa0cae2e90730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5666-buffer-overflow-in-freefloat-ftp-ser-e206343e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5666%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841bb1f182aa0cae2e51159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5665-buffer-overflow-in-freefloat-ftp-ser-ad03aa4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5665%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841b441182aa0cae2e41445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5664-buffer-overflow-in-freefloat-ftp-ser-ae617a31</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5664%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6841ad2e182aa0cae2e31725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5663-sql-injection-in-phpgurukul-auto-tax-97835466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5663%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=6841a64c182aa0cae2e21746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0691-cwe-284-improper-access-control-in-d-5e63c6f2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0691%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=6841a29c182aa0cae2e196c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5382-cwe-284-improper-access-control-in-d-42aa8ab4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5382%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68419f11182aa0cae2e11689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3768-cwe-284-improper-access-control-in-d-2cd47842</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3768%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=68419f11182aa0cae2e11687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5661-cross-site-scripting-in-code-project-0b05fd7d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5661%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=68419f11182aa0cae2e1168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stopransomware-play-ransomware-2fd0f321</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StopRansomware%3A%20Play%20Ransomware&amp;severity=medium&amp;id=68419f00182aa0cae2e115ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27754-cwe-79-improper-neutralization-of-i-513ab45b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSBlog%20component%20for%20Joomla&amp;severity=medium&amp;id=6841a29c182aa0cae2e196d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27753-cwe-89-improper-neutralization-of-s-0dd27303</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27753%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rsjoomla.com%20RSMediaGallery%20component%20for%20Joomla&amp;severity=medium&amp;id=6841d069182aa0cae2e8865f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27445-cwe-35-path-traversal-in-rsjoomlaco-7a096a29</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27445%3A%20CWE-35%3A%20Path%20Traversal%20in%20rsjoomla.com%20RSFirewall%20component%20for%20Joomla&amp;severity=medium&amp;id=68419b86182aa0cae2e09759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30084-cwe-79-improper-neutralization-of-i-6f72feef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSMail!%20component%20for%20Joomla&amp;severity=medium&amp;id=6841d069182aa0cae2e88661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5660-sql-injection-in-phpgurukul-complain-accd368c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5660%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=6841d069182aa0cae2e88655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5659-sql-injection-in-phpgurukul-complain-dab77b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5659%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=684197f2182aa0cae2e016e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5658-sql-injection-in-phpgurukul-complain-e8640636</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5658%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=6841911a182aa0cae2df17b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clickfix-email-scam-alert-fake-bookingcom-emails-d-4412d5c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ClickFix%20Email%20Scam%20Alert%3A%20Fake%20Booking.com%20Emails%20Deliver%20Malware%20in%20New%20Attack&amp;severity=medium&amp;id=68418a1c182aa0cae2ddeec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5657-sql-injection-in-phpgurukul-complain-ec1438e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5657%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418d7c182aa0cae2de91bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2011-10007-cwe-78-improper-neutralization-of-s-3230ce14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2011-10007%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20RCLAMP%20File%3A%3AFind%3A%3ARule&amp;severity=high&amp;id=68418a24182aa0cae2ddeec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5656-sql-injection-in-phpgurukul-complain-d5037d6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5656%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418666182aa0cae2dd4bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5341-cwe-79-improper-neutralization-of-in-70662812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=68418666182aa0cae2dd4bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5701-cwe-862-missing-authorization-in-sit-8ee62042</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5701%3A%20CWE-862%20Missing%20Authorization%20in%20siteheart%20HyperComments&amp;severity=critical&amp;id=68418666182aa0cae2dd4bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5655-sql-injection-in-phpgurukul-complain-8a202f5e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5655%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5654-sql-injection-in-phpgurukul-complain-2e7797e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5654%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5653-sql-injection-in-phpgurukul-complain-9aebd1fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5653%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4568-cwe-89-improper-neutralization-of-sp-537cc914</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4568%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Trol%20InterMedia%202ClickPortal&amp;severity=critical&amp;id=68416e1d182aa0cae2d97f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5652-sql-injection-in-phpgurukul-complain-dbf46620</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5652%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=68416e1d182aa0cae2d97f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5651-cross-site-scripting-in-code-project-0bf2ba89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5651%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Traffic%20Offense%20Reporting%20System&amp;severity=medium&amp;id=68416e1d182aa0cae2d97f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5650-sql-injection-in-1000projects-online-8aa28835</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5650%3A%20SQL%20Injection%20in%201000projects%20Online%20Notice%20Board&amp;severity=medium&amp;id=684166d5182aa0cae2d879ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hacker-arrested-for-breaching-5000-hosting-account-1f5c1cf9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hacker%20arrested%20for%20breaching%205%2C000%20hosting%20accounts%20to%20mine%20crypto&amp;severity=medium&amp;id=6841633c182aa0cae2d7fa00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ukraines-military-intelligence-agency-stole-44gb-o-7bb8f27e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ukraine%E2%80%99s%20military%20intelligence%20agency%20stole%204.4GB%20of%20highly%20classified%20internal%20data%20from%20Tupolev&amp;severity=medium&amp;id=684166cb182aa0cae2d879e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-offers-10m-for-tips-on-state-hackers-tied-to-re-b21b174f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US%20offers%20%2410M%20for%20tips%20on%20state%20hackers%20tied%20to%20RedLine%20malware&amp;severity=medium&amp;id=68416a5d182aa0cae2d8f9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-claims-kettering-health-breac-5873fabc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20claims%20Kettering%20Health%20breach%2C%20leaks%20stolen%20data&amp;severity=medium&amp;id=68416e01182aa0cae2d97f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5649-improper-access-controls-in-sourceco-bab8d824</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5649%3A%20Improper%20Access%20Controls%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5648-memory-corruption-in-radare2-689c422a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5648%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68415fd9182aa0cae2d772c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5647-memory-corruption-in-radare2-4d184fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5647%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=684158b1182aa0cae2d67439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-spyware-that-helped-to-compromise-a-sy-c1177956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20Spyware%20That%20Helped%20to%20Compromise%20a%20Syrian%20Army%20from%20Within&amp;severity=medium&amp;id=684151b4182aa0cae2d57264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5646-memory-corruption-in-radare2-3aaa88fa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5646%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=684151b1182aa0cae2d5725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5645-memory-corruption-in-radare2-c5a27eb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5645%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68414aaa182aa0cae2d47303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5644-use-after-free-in-radare2-12763e70</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5644%3A%20Use%20After%20Free%20in%20Radare2&amp;severity=low&amp;id=68418437182aa0cae2dccca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5643-memory-corruption-in-radare2-e9ac1fed</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5643%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=684143a1182aa0cae2d37153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5642-memory-corruption-in-radare2-f3322b31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5642%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68418437182aa0cae2dcccad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5641-memory-corruption-in-radare2-c6be342d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5641%3A%20Memory%20Corruption%20in%20Radare2&amp;severity=low&amp;id=68413c9b182aa0cae2d27232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5640-stack-based-buffer-overflow-in-px4-a-cf41731a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5640%3A%20Stack-based%20Buffer%20Overflow%20in%20PX4-Autopilot&amp;severity=medium&amp;id=6841359d182aa0cae2d17542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5683-vulnerability-in-the-qt-company-qt-88add8f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5683%3A%20Vulnerability%20in%20The%20Qt%20Company%20Qt&amp;severity=medium&amp;id=68418437182aa0cae2dcccb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5639-sql-injection-in-phpgurukul-notice-b-5eb64f4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5639%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=68418437182aa0cae2dcccb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3055-cwe-22-improper-limitation-of-a-path-14027aeb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3055%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wedevs%20WP%20User%20Frontend%20Pro&amp;severity=high&amp;id=68418437182aa0cae2dcccb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3054-cwe-434-unrestricted-upload-of-file--f49070ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3054%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wedevs%20WP%20User%20Frontend%20Pro&amp;severity=high&amp;id=68412e7c182aa0cae2d07494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5638-sql-injection-in-phpgurukul-notice-b-51eccab6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5638%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=6841277c182aa0cae2cf73b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1793-cwe-89-improper-neutralization-of-sp-e5cb6292</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=critical&amp;id=68418437182aa0cae2dcccbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5637-buffer-overflow-in-pcman-ftp-server-f71ebab5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5637%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=68418437182aa0cae2dccc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5636-buffer-overflow-in-pcman-ftp-server-ee26d54c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5636%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=68418437182aa0cae2dccc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5635-buffer-overflow-in-pcman-ftp-server-cb4610d3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5635%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=68418437182aa0cae2dccca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5634-buffer-overflow-in-pcman-ftp-server-98bb59fc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5634%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=6841198f182aa0cae2cd745c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5633-sql-injection-in-code-projects-conte-22b92407</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5633%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=684115e3182aa0cae2ccf0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5632-sql-injection-in-code-projects-conte-527e52f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5632%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=68410ee8182aa0cae2cbe1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5631-sql-injection-in-code-projects-conte-d267ac83</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5631%3A%20SQL%20Injection%20in%20code-projects%20Content%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/detailed-research-for-roundcube-1610-post-auth-rce-cd9e1b70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Detailed%20research%20for%20Roundcube%20%E2%89%A4%201.6.10%20Post-Auth%20RCE%20is%20out&amp;severity=medium&amp;id=684100cc182aa0cae2c9db22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5630-stack-based-buffer-overflow-in-d-lin-7a7f2921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5630%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=68418437182aa0cae2dcccaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5629-buffer-overflow-in-tenda-ac10-18152d82</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5629%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=68418437182aa0cae2dcccab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5628-cross-site-scripting-in-sourcecodest-5ba3d270</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5628%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Food%20Menu%20Manager&amp;severity=medium&amp;id=6840f64d182aa0cae2c85ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5627-sql-injection-in-code-projects-patie-057f517b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5627%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=6840ef52182aa0cae2c76100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5626-sql-injection-in-campcodes-online-te-134e8b22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5626%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6840ef52182aa0cae2c760fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5625-sql-injection-in-campcodes-online-te-867df9a2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5625%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Teacher%20Record%20Management%20System&amp;severity=medium&amp;id=6840e83a182aa0cae2c66228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5624-stack-based-buffer-overflow-in-d-lin-5d9337eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5624%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=6840e83a182aa0cae2c66226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49008-cwe-78-improper-neutralization-of-s-d79ea871</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49008%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Atheos%20Atheos&amp;severity=critical&amp;id=6840e83a182aa0cae2c66224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5623-stack-based-buffer-overflow-in-d-lin-917c9507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5623%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=68418437182aa0cae2dcccb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5622-stack-based-buffer-overflow-in-d-lin-8cab38f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5622%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-816&amp;severity=critical&amp;id=6840e152182aa0cae2c5652d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-05-f76fbfbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-05&amp;severity=medium&amp;id=68490f133cd93dcca832046b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandstream-gsd3710-101113-stack-overflow-c000c559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandstream%20GSD3710%201.0.11.13%20-%20Stack%20Overflow&amp;severity=medium&amp;id=68489d6c7e6d765d51d520a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudclassroom-php-project-10-sql-injection-21012147</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CloudClassroom%20PHP%20Project%201.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=68489c9c82cbcead92622827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-server-2025-jscript-engine-remot-2aee9b0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20Server%202025%20JScript%20Engine%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489c9682cbcead92621398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/macos-launchdaemon-ios-172-privilege-escalation-47a8dfd7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=macOS%20LaunchDaemon%20iOS%2017.2%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489c9182cbcead92621253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abb-cylon-aspect-30804-deploysource-remote-code-ex-ad0eabd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ABB%20Cylon%20Aspect%203.08.04%20DeploySource%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489c8b82cbcead926210e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apache-tomcat-10139-denial-of-service-dos-d63051e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apache%20Tomcat%2010.1.39%20-%20Denial%20of%20Service%20(DoS)&amp;severity=medium&amp;id=68489c8082cbcead92620d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47827-na-in-na-8cb1533b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47827%3A%20n%2Fa&amp;severity=medium&amp;id=6841a29c182aa0cae2e196bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49466-cwe-23-relative-path-traversal-in-r-64ce5c06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49466%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20rjarry%20aerc&amp;severity=medium&amp;id=684107ee182aa0cae2cade2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48432-cwe-117-improper-output-neutralizat-8a169a4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48432%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20djangoproject%20Django&amp;severity=medium&amp;id=684100ca182aa0cae2c9db1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5621-os-command-injection-in-d-link-dir-8-7dbb8342</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5621%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=68418437182aa0cae2dcccb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5620-os-command-injection-in-d-link-dir-8-63d91bf1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5620%3A%20OS%20Command%20Injection%20in%20D-Link%20DIR-816&amp;severity=medium&amp;id=6840da1d182aa0cae2c463a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5619-stack-based-buffer-overflow-in-tenda-0fc8e603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5619%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20CH22&amp;severity=high&amp;id=6840d336182aa0cae2c366fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5618-sql-injection-in-phpgurukul-online-f-7bbadaf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5618%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840d336182aa0cae2c366f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49007-cwe-770-allocation-of-resources-wit-63770299</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49007%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20rack%20rack&amp;severity=medium&amp;id=6840cfa0182aa0cae2c2e7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5617-sql-injection-in-phpgurukul-online-f-68152aef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5617%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840cc16182aa0cae2c26838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5616-sql-injection-in-phpgurukul-online-f-d17adf4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5616%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840cc16182aa0cae2c26836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5615-sql-injection-in-phpgurukul-online-f-9113dfb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5615%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68418437182aa0cae2dcccbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5614-sql-injection-in-phpgurukul-online-f-6e96ef4c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5614%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840c579182aa0cae2c16ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5690-exposure-of-sensitive-information-to-51c29cb0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5690%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20DALIBO%20PostgreSQL%20Anonymizer&amp;severity=medium&amp;id=68418437182aa0cae2dcccdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5613-sql-injection-in-phpgurukul-online-f-a9b3eab8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5613%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=68418437182aa0cae2dcccdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5612-sql-injection-in-phpgurukul-online-f-71daebff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5612%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Fire%20Reporting%20System&amp;severity=medium&amp;id=6840c579182aa0cae2c16b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-gamer-to-malware-developer-exploring-silverra-d0582c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Gamer%20to%20Malware%20Developer%3A%20Exploring%20SilverRat%20and%20Its%20Syrian%20Roots&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-sindoor-anatomy-of-a-digital-siege-88938cda</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Sindoor%20%E2%80%93%20Anatomy%20of%20a%20Digital%20Siege&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pumabot-novel-botnet-targeting-iot-surveillance-de-6ef13d39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PumaBot%3A%20Novel%20Botnet%20Targeting%20IoT%20Surveillance%20Devices&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/behind-the-script-unmasking-phishing-attacks-using-bdc99944</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Behind%20the%20Script%3A%20Unmasking%20Phishing%20Attacks%20Using%20Google%20Apps%20Script&amp;severity=medium&amp;id=6840eba9182aa0cae2c6e1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-t-rex-coinminer-attacks-targeting-inte-69bc4d2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20T-Rex%20CoinMiner%20Attacks%20Targeting%20Internet%20Caf%C3%A9s%20in%20Korea&amp;severity=medium&amp;id=6840e82a182aa0cae2c66207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5611-sql-injection-in-codeastro-real-esta-e6c84228</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5611%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840aff6182aa0cae2bdf337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5610-sql-injection-in-codeastro-real-esta-0e57f73b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5610%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840aff6182aa0cae2bdf335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48947-cwe-525-use-of-web-browser-cache-co-5767cf73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48947%3A%20CWE-525%3A%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20auth0%20nextjs-auth0&amp;severity=high&amp;id=6840ac7f182aa0cae2bd73a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46341-cwe-918-server-side-request-forgery-ff52345a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46341%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20FreshRSS%20FreshRSS&amp;severity=high&amp;id=6840ac7f182aa0cae2bd73a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46339-cwe-349-acceptance-of-extraneous-un-c517539b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46339%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840c579182aa0cae2c16b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5609-buffer-overflow-in-tenda-ac18-51ce10f0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5609%3A%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=6840c579182aa0cae2c16b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5608-buffer-overflow-in-tenda-ac18-b3c3f70e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5608%3A%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=6840c579182aa0cae2c16b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32015-cwe-79-improper-neutralization-of-i-647b023d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32015%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840a8e8182aa0cae2bcf3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31482-cwe-352-cross-site-request-forgery--3f894a6b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31482%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840a57a182aa0cae2bc751b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31136-cwe-79-improper-neutralization-of-i-0b95d75c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840ac7f182aa0cae2bd73a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31134-cwe-201-insertion-of-sensitive-info-fd83e722</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31134%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=6840a1e1182aa0cae2bbf440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22245-stored-cross-site-scripting-xss-vul-df2bec5d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22245%3A%20Stored%20Cross-Site%20Scripting%20(XSS)%20vulnerability%20in%20router%20port%20in%20VMware%20VMware%20NSX&amp;severity=medium&amp;id=6840c579182aa0cae2c16b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22244-stored-cross-site-scripting-xss-vul-ab7a6a88</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22244%3A%20Stored%20Cross-Site%20Scripting%20(XSS)%20vulnerability%20in%20gateway%20firewall%20in%20VMware%20VMware%20NSX&amp;severity=medium&amp;id=6840c579182aa0cae2c16b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22243-stored-cross-site-scripting-xss-vul-55bce768</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22243%3A%20Stored%20Cross-Site%20Scripting%20(XSS)%20vulnerability%20in%20Manager-UI%20in%20VMware%20VMware%20NSX&amp;severity=high&amp;id=6840c579182aa0cae2c16b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48935-cwe-863-incorrect-authorization-in--ba036a33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48935%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20denoland%20deno&amp;severity=medium&amp;id=6840c579182aa0cae2c16b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5607-buffer-overflow-in-tenda-ac18-48e0d7b2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5607%3A%20Buffer%20Overflow%20in%20Tenda%20AC18&amp;severity=high&amp;id=6840c579182aa0cae2c16b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-strange-tale-of-ischhfd83-when-cybercriminals--94ce7daa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20strange%20tale%20of%20ischhfd83%3A%20When%20cybercriminals%20eat%20their%20own&amp;severity=medium&amp;id=6840afe6182aa0cae2bdf2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/amos-variant-distributed-via-clickfix-in-spectrum--b6f0f381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AMOS%20Variant%20Distributed%20Via%20Clickfix%20In%20Spectrum-Themed%20Dynamic%20Delivery%20Campaign%20By%20Russian%20Speaking%20Hackers&amp;severity=medium&amp;id=6840ac70182aa0cae2bd7373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cyber-attacks-on-government-agencies-detect-and-in-0c65f458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cyber%20Attacks%20on%20Government%20Agencies%3A%20Detect%20and%20Investigate&amp;severity=medium&amp;id=68417b9b182aa0cae2db06eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48934-cwe-201-insertion-of-sensitive-info-0032e66c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48934%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20denoland%20deno&amp;severity=medium&amp;id=6840c579182aa0cae2c16b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48888-cwe-863-incorrect-authorization-in--cf77a0d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48888%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20denoland%20deno&amp;severity=medium&amp;id=68409e60182aa0cae2bb74fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5606-command-injection-in-tenda-ac18-cf9fe034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5606%3A%20Command%20Injection%20in%20Tenda%20AC18&amp;severity=medium&amp;id=68409aec182aa0cae2baf4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exclusive-hackers-leak-86-million-att-customer-rec-3edf6124</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exclusive%3A%20Hackers%20Leak%2086%20Million%20AT%26T%20Customer%20Records%20with%20Decrypted%20SSNs&amp;severity=medium&amp;id=684093f0182aa0cae2b9f7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5604-sql-injection-in-campcodes-hospital--e97074fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5604%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68409408182aa0cae2b9f7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5603-sql-injection-in-campcodes-hospital--ad09f931</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5603%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=6840c579182aa0cae2c16b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5602-sql-injection-in-campcodes-hospital--56e2ed6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5602%3A%20SQL%20Injection%20in%20Campcodes%20Hospital%20Management%20System&amp;severity=medium&amp;id=68408ce4182aa0cae2b8f903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5600-stack-based-buffer-overflow-in-totol-ec20f889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5600%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20EX1200T&amp;severity=critical&amp;id=6840c579182aa0cae2c16b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5599-sql-injection-in-phpgurukul-student--38ad8de1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5599%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=684085c3182aa0cae2b7f9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5688-cwe-787-out-of-bounds-write-in-amazo-ae890137</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5688%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Amazon%20FreeRTOS&amp;severity=high&amp;id=68407ee8182aa0cae2b6fadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5596-buffer-overflow-in-freefloat-ftp-ser-192c1277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5596%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840c579182aa0cae2c16b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2336-cwe-791-incomplete-filtering-of-spec-17d0a35d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2336%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Google%20AngularJS&amp;severity=medium&amp;id=684077df182aa0cae2b5fa4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5595-buffer-overflow-in-freefloat-ftp-ser-bfb76e5a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5595%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840904c182aa0cae2b978f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/roundcube-webmail-under-fire-critical-exploit-foun-9a880b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Roundcube%20Webmail%20under%20fire%3A%20critical%20exploit%20found%20after%20a%20decade&amp;severity=critical&amp;id=684077cc182aa0cae2b5fa43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chaos-rat-malware-targets-windows-and-linux-via-fa-eaec992d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chaos%20RAT%20Malware%20Targets%20Windows%20and%20Linux%20via%20Fake%20Network%20Tool%20Downloads&amp;severity=medium&amp;id=68407b4a182aa0cae2b679cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kerberos-as-rep-roasting-attacks-what-you-need-to--cf933d7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kerberos%20AS-REP%20roasting%20attacks%3A%20What%20you%20need%20to%20know&amp;severity=medium&amp;id=68407448182aa0cae2b579d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-hackers-target-salesforce-accounts-in-data--940f73cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%3A%20Hackers%20target%20Salesforce%20accounts%20in%20data%20extortion%20attacks&amp;severity=medium&amp;id=68407edd182aa0cae2b6fad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20259-improper-limitation-of-a-pathname-t-295d8da0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20259%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20ThousandEyes%20Endpoint%20Agent&amp;severity=medium&amp;id=6840745c182aa0cae2b579f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/multiple-cves-in-infoblox-netmri-rce-auth-bypass-s-36fcb4a3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Multiple%20CVEs%20in%20Infoblox%20NetMRI%3A%20RCE%2C%20Auth%20Bypass%2C%20SQLi%2C%20and%20File%20Read%20Vulnerabilities&amp;severity=medium&amp;id=6840745c182aa0cae2b579e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20286-use-of-hard-coded-password-in-cisco-9a4cd62f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20286%3A%20Use%20of%20Hard-coded%20Password%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=6840745c182aa0cae2b57a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20278-improper-neutralization-of-special--3f0b1308</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20278%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Finesse&amp;severity=medium&amp;id=6840745c182aa0cae2b57a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20279-improper-neutralization-of-input-du-cbd589a7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6840745c182aa0cae2b57a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20277-improper-limitation-of-a-pathname-t-595e5125</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20277%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=low&amp;id=6840745c182aa0cae2b57a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20276-deserialization-of-untrusted-data-i-69f7c319</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20276%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=low&amp;id=6840745c182aa0cae2b57a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20275-deserialization-of-untrusted-data-i-1be2e136</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20275%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=6840745c182aa0cae2b579ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20273-improper-neutralization-of-input-du-44cff521</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20273%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unified%20Intelligent%20Contact%20Management%20Enterprise&amp;severity=medium&amp;id=6840745c182aa0cae2b579fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20261-improper-restriction-of-communicati-884f9767</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20261%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Cisco%20Cisco%20Unified%20Computing%20System%20(Managed)&amp;severity=high&amp;id=6840745c182aa0cae2b579fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20163-key-exchange-without-entity-authent-ae073c90</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20163%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20Cisco%20Cisco%20Data%20Center%20Network%20Manager&amp;severity=high&amp;id=6840745c182aa0cae2b579f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20129-exposure-of-sensitive-information-t-eb49ca89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20129%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20SocialMiner&amp;severity=medium&amp;id=6840745c182aa0cae2b579f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20130-improper-access-control-in-cisco-ci-c12caf56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20130%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=6840745c182aa0cae2b579f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5594-buffer-overflow-in-freefloat-ftp-ser-55f95929</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5594%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=684070c6182aa0cae2b4fab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5593-buffer-overflow-in-freefloat-ftp-ser-d76cf919</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5593%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840c579182aa0cae2c16b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5592-buffer-overflow-in-freefloat-ftp-ser-c1fc1bd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5592%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6840c579182aa0cae2c16b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48962-cwe-918-in-acronis-acronis-cyber-pr-af209145</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48962%3A%20CWE-918%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=medium&amp;id=6840c579182aa0cae2c16b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48961-cwe-732-in-acronis-acronis-cyber-pr-8122e893</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48961%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=high&amp;id=6840511e182aa0cae2b0823a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48960-cwe-326-in-acronis-acronis-cyber-pr-99b3bbd3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48960%3A%20CWE-326%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=medium&amp;id=68404d87182aa0cae2b003ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1701-cwe-20-improper-input-validation-in--c7e70de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1701%3A%20CWE-20%20Improper%20Input%20Validation%20in%20MIM%20Software%20MIM%20Admin%20Service&amp;severity=high&amp;id=68404a07182aa0cae2af8410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48959-cwe-276-in-acronis-acronis-cyber-pr-d46af132</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48959%3A%20CWE-276%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=68403c03182aa0cae2ad7e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30415-cwe-1286-in-acronis-acronis-cyber-p-c07e0ef2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30415%3A%20CWE-1286%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=6840388a182aa0cae2acdb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5597-cwe-287-improper-authentication-in-w-3269af4b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5597%3A%20CWE-287%20Improper%20Authentication%20in%20WF%20Steuerungstechnik%20GmbH%20airleader%20MASTER&amp;severity=critical&amp;id=68403504182aa0cae2ac37d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5598-cwe-35-path-traversal-in-wf-steuerun-db084dde</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5598%3A%20CWE-35%20Path%20Traversal%20in%20WF%20Steuerungstechnik%20GmbH%20airleader%20MASTER&amp;severity=critical&amp;id=68403727182aa0cae2ac5d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hpe-issues-security-patch-for-storeonce-bug-allowi-72a4be83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HPE%20Issues%20Security%20Patch%20for%20StoreOnce%20Bug%20Allowing%20Remote%20Authentication%20Bypass&amp;severity=medium&amp;id=6840238a182aa0cae2a97199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cisa-adds-multiple-qualcomm-chipsets-flaws-to-i-596fa77f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20CISA%20adds%20Multiple%20Qualcomm%20chipsets%20flaws%20to%20its%20Known%20Exploited%20Vulnerabilities%20catalog&amp;severity=medium&amp;id=68402706182aa0cae2a9f0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5601-cwe-120-buffer-copy-without-checking-73ce4ca9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5601%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=684023a2182aa0cae2a971c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5584-cross-site-scripting-in-phpgurukul-h-e627d01f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5584%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=68401c5a182aa0cae2a8735a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25112-cwe-770-allocation-of-resources-wit-f93ab66f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25112%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PHOENIX%20CONTACT%20ILC%20131&amp;severity=high&amp;id=68401554182aa0cae2a7706b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5583-sql-injection-in-codeastro-real-esta-3fe5c7c5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5583%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840335a182aa0cae2abb99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stormwall-reveals-india-china-and-us-faced-most-dd-323c1481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=StormWall%20Reveals%20India%2C%20China%20and%20US%20Faced%20Most%20DDoS%20Attacks%20in%20Q1%202025&amp;severity=medium&amp;id=684011d0182aa0cae2a6f09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5582-sql-injection-in-codeastro-real-esta-64290493</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5582%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840335a182aa0cae2abb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5581-sql-injection-in-codeastro-real-esta-94c5d98b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5581%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=68400e59182aa0cae2a6714b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5580-sql-injection-in-codeastro-real-esta-8e4482d4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5580%3A%20SQL%20Injection%20in%20CodeAstro%20Real%20Estate%20Management%20System&amp;severity=medium&amp;id=6840073c182aa0cae2a5368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47728-cwe-787-out-of-bounds-write-in-delt-087dcf3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47728%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=6840003b182aa0cae2a406bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13967-cwe-384-session-fixation-in-abb-eib-6ec3a0b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13967%3A%20CWE-384%20Session%20Fixation%20in%20ABB%20EIBPORT%20V3%20KNX&amp;severity=critical&amp;id=6840003b182aa0cae2a406b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5579-sql-injection-in-phpgurukul-dairy-fa-9e71e571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5579%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6840003b182aa0cae2a406bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5578-sql-injection-in-phpgurukul-dairy-fa-8f969a8a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5578%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=6840003b182aa0cae2a406bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5577-sql-injection-in-phpgurukul-dairy-fa-cfa9c436</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5577%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5576-sql-injection-in-phpgurukul-dairy-fa-b167bc45</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5576%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683ff92a182aa0cae2a287d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47727-cwe-787-out-of-bounds-write-in-delt-06d09e6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47727%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27444-cwe-79-improper-neutralization-of-i-a9686496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rsjoomla.com%20RSform!Pro%20component%20for%20Joomla&amp;severity=medium&amp;id=683ff59c182aa0cae2a204b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47726-cwe-787-out-of-bounds-write-in-delt-892453a8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47726%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47725-cwe-787-out-of-bounds-write-in-delt-49e1d554</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47725%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47724-cwe-787-out-of-bounds-write-in-delt-35125aec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47724%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft&amp;severity=high&amp;id=6840335a182aa0cae2abb9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5482-cwe-620-unverified-password-change-i-aa8d84a3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5482%3A%20CWE-620%20Unverified%20Password%20Change%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart%3A%20Free%20Client%20Photo%20Galleries%20for%20Photographers&amp;severity=high&amp;id=6840335a182aa0cae2abb9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5575-sql-injection-in-phpgurukul-dairy-fa-2106d77a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5575%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683ff236182aa0cae2a183f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5574-sql-injection-in-phpgurukul-dairy-fa-340fb3bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5574%3A%20SQL%20Injection%20in%20PHPGurukul%20Dairy%20Farm%20Shop%20Management%20System&amp;severity=medium&amp;id=683feb1c182aa0cae2a085e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5573-os-command-injection-in-d-link-dcs-9-54c294ab</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5573%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-932L&amp;severity=medium&amp;id=6840335a182aa0cae2abb9d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5572-stack-based-buffer-overflow-in-d-lin-25e003ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5572%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=6840335a182aa0cae2abb9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4580-cwe-352-cross-site-request-forgery-c-ba08721f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4580%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20File%20Provider&amp;severity=medium&amp;id=6840335a182aa0cae2abb9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4578-cwe-89-sql-injection-in-unknown-file-120a00b7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4578%3A%20CWE-89%20SQL%20Injection%20in%20File%20Provider&amp;severity=critical&amp;id=683fe42e182aa0cae29f8802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48710-cwe-441-unintended-proxy-or-interme-20f3e2aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48710%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20kro.run%20kro&amp;severity=medium&amp;id=683fe089182aa0cae29f094d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5571-os-command-injection-in-d-link-dcs-9-654f930b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5571%3A%20OS%20Command%20Injection%20in%20D-Link%20DCS-932L&amp;severity=medium&amp;id=6840335a182aa0cae2abb9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5569-sql-injection-in-ideacms-cd832d6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5569%3A%20SQL%20Injection%20in%20IdeaCMS&amp;severity=medium&amp;id=683fdd0d182aa0cae29e89ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5566-sql-injection-in-phpgurukul-notice-b-d6c0769f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5566%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5562-sql-injection-in-phpgurukul-curfew-e-593e141e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5562%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=683fd5f4182aa0cae29d2a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20996-cwe-285-improper-authorization-in-s-db2a8384</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20996%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Smart%20Switch&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20995-cwe-280-improper-handling-of-insuff-4e9166d6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20995%3A%20CWE-280%3A%20Improper%20handling%20of%20insufficient%20permission%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20994-cwe-276-incorrect-default-permissio-9e642654</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20994%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Internet&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20993-cwe-122-heap-based-buffer-overflow--621d1e48</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20993%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20992-cwe-122-heap-based-buffer-overflow--0b411766</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20992%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20991-cwe-926-improper-export-of-android--af228835</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20991%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20989-cwe-200-exposure-of-sensitive-infor-9f967dc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20989%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20988-cwe-125-out-of-bounds-read-in-samsu-4b9888ad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20988%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20987-cwe-200-exposure-of-sensitive-infor-55da835d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20987%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20986-cwe-284-improper-access-control-in--9cec28dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20986%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20985-cwe-269-improper-privilege-manageme-a1b48b20</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20985%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20984-cwe-276-incorrect-default-permissio-24090562</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20984%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20981-cwe-284-improper-access-control-in--9ce0cef4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20981%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=683ffd67182aa0cae2a387c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31127-cwe-346-origin-validation-error-in--55ebecf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31127%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Zscaler%20Client%20Connector&amp;severity=high&amp;id=683fd273182aa0cae29ca5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5561-sql-injection-in-phpgurukul-curfew-e-17bb82a1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5561%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=683fcf0a182aa0cae29c261c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5539-cwe-79-improper-neutralization-of-in-eb5428d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Simple%20Contact%20Form%20Plugin%20for%20WordPress%20%E2%80%93%20WP%20Easy%20Contact&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5560-sql-injection-in-phpgurukul-curfew-e-bf8ed217</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5560%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5558-sql-injection-in-phpgurukul-teacher--416302d7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5558%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=683fc7ff182aa0cae29b2712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5532-cwe-79-improper-neutralization-of-in-914c7d2f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5532%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Campus%20Directory%20%E2%80%93%20Faculty%2C%20Staff%20%26%20Student%20Directory%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5531-cwe-79-improper-neutralization-of-in-89662c4b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5531%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emarket-design%20Employee%20Directory%20%E2%80%93%20Staff%20Listing%20%26%20Team%20Directory%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=683fc46a182aa0cae29aa3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5557-sql-injection-in-phpgurukul-teacher--f6e49d44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5557%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a387ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5556-sql-injection-in-phpgurukul-teacher--2d1d8fbc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5556%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=683fc0e0182aa0cae29a1e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5554-sql-injection-in-phpgurukul-rail-pas-c3b74611</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5554%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a3880c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5553-sql-injection-in-phpgurukul-rail-pas-85b84f7b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5553%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a38810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5552-deserialization-in-chestnutcms-db9d70d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5552%3A%20Deserialization%20in%20ChestnutCMS&amp;severity=medium&amp;id=683ffd67182aa0cae2a3880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49223-cwe-1321-improperly-controlled-modi-ebcac40f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49223%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20NAVER%20billboard.js&amp;severity=critical&amp;id=683faf5c182aa0cae297926e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5551-buffer-overflow-in-freefloat-ftp-ser-a0407149</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5551%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683fa4ee182aa0cae2961204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5550-buffer-overflow-in-freefloat-ftp-ser-4a2b964f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5550%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683ffd67182aa0cae2a3881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5549-buffer-overflow-in-freefloat-ftp-ser-6961d3e9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5549%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683f9dcf182aa0cae295101f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5548-buffer-overflow-in-freefloat-ftp-ser-361d0733</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5548%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683f9715182aa0cae2941023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5547-buffer-overflow-in-freefloat-ftp-ser-61a1d58a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5547%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683f8fcb182aa0cae2931125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-06-04-e8d853c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-06-04&amp;severity=medium&amp;id=68490f133cd93dcca83205b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46203-na-in-na-cb8a3f31</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46203%3A%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46204-na-in-na-5ea67384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46204%3A%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46011-na-in-na-0f87b9bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46011%3A%20n%2Fa&amp;severity=medium&amp;id=6840b36c182aa0cae2be720e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29093-na-in-na-67f55da4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29093%3A%20n%2Fa&amp;severity=high&amp;id=6840aff6182aa0cae2bdf333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23096-na-in-na-ec630b43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23096%3A%20n%2Fa&amp;severity=medium&amp;id=6840aff6182aa0cae2bdf331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29094-na-in-na-6c5f68af</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29094%3A%20n%2Fa&amp;severity=medium&amp;id=6840745c182aa0cae2b57a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-russia-affiliated-actor-void-blizzard-ta-fc2cb2c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Russia-affiliated%20actor%20Void%20Blizzard%20targets%20critical%20sectors%20for%20espionage&amp;severity=low&amp;id=68406971182aa0cae2b3fad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23106-na-in-na-95272bb0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23106%3A%20n%2Fa&amp;severity=medium&amp;id=68406659182aa0cae2b37aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23095-na-in-na-346653b4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23095%3A%20n%2Fa&amp;severity=medium&amp;id=684062a5182aa0cae2b2faf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23101-na-in-na-3800da46</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23101%3A%20n%2Fa&amp;severity=medium&amp;id=68405f1a182aa0cae2b27c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27811-na-in-na-15e96f20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27811%3A%20n%2Fa&amp;severity=high&amp;id=68405482182aa0cae2b100b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5546-sql-injection-in-phpgurukul-daily-ex-72d0c802</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5546%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a3881f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5545-path-traversal-in-aaluoxiang-oasyste-067c41de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5545%3A%20Path%20Traversal%20in%20aaluoxiang%20oa_system&amp;severity=medium&amp;id=683f8896182aa0cae2920d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5544-path-traversal-in-aaluoxiang-oasyste-916b6959</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5544%3A%20Path%20Traversal%20in%20aaluoxiang%20oa_system&amp;severity=medium&amp;id=683f81a2182aa0cae291105a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24015-cwe-347-improper-verification-of-cr-f46d2db6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24015%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20denoland%20deno&amp;severity=high&amp;id=683f7e1a182aa0cae29091f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5543-cross-site-scripting-in-totolink-x20-a870db73</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5543%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f7a98182aa0cae29012da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5542-cross-site-scripting-in-totolink-x20-39fa77c6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5542%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f73bf182aa0cae28f146a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49000-cwe-400-uncontrolled-resource-consu-eb1ecea1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49000%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20inventree%20InvenTree&amp;severity=low&amp;id=683f61ea182aa0cae28c99c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48951-cwe-502-deserialization-of-untruste-45b274a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48951%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20auth0%20auth0-PHP&amp;severity=critical&amp;id=683f61ea182aa0cae28c99c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rfc-draft-built-mathematical-solution-for-pkis-imp-24e445ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BRFC%20Draft%5D%20Built%20mathematical%20solution%20for%20PKI&apos;s%20&apos;impossible&apos;%20problem.%20Response%20time%3A%20months%E2%86%922%20hours.%20IETF%20interest%20level%3A%20%C2%AF%5C(%E3%83%84)%2F%C2%AF&amp;severity=critical&amp;id=683f5e64182aa0cae28c1a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49002-cwe-290-authentication-bypass-by-sp-f913e20e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49002%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20dataease%20dataease&amp;severity=high&amp;id=683f5e63182aa0cae28c1a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49001-cwe-287-improper-authentication-in--585d9b4c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49001%3A%20CWE-287%3A%20Improper%20Authentication%20in%20dataease%20dataease&amp;severity=high&amp;id=683f5e63182aa0cae28c1a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48999-cwe-923-improper-restriction-of-com-c71f1ebb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48999%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20dataease%20dataease&amp;severity=medium&amp;id=683f5e63182aa0cae28c1a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5527-stack-based-buffer-overflow-in-tenda-af08d1f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5527%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20RX3&amp;severity=high&amp;id=683f5e63182aa0cae28c1a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5525-os-command-injection-in-jrohy-trojan-dd5f6b39</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5525%3A%20OS%20Command%20Injection%20in%20Jrohy%20trojan&amp;severity=medium&amp;id=683f575d182aa0cae28b1ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coinbase-breach-tied-to-bribed-taskus-support-agen-1a2bdc48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coinbase%20breach%20tied%20to%20bribed%20TaskUs%20support%20agents%20in%20India&amp;severity=medium&amp;id=683f53e6182aa0cae28a9c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5523-cross-site-scripting-in-enilu-web-fl-38076984</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5523%3A%20Cross%20Site%20Scripting%20in%20enilu%20web-flash&amp;severity=medium&amp;id=683f5057182aa0cae28a1d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35036-cwe-94-improper-control-of-generati-a26c5d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35036%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hibernate%20Hibernate%20Validator&amp;severity=high&amp;id=683f5057182aa0cae28a1d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crocodilus-mobile-malware-evolving-fast-going-glob-c101ab48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crocodilus%20Mobile%20Malware%3A%20Evolving%20Fast%2C%20Going%20Global&amp;severity=medium&amp;id=683f6564182aa0cae28d1a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/victims-risk-asyncrat-infection-after-being-redire-c39b5f28</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Victims%20risk%20AsyncRAT%20infection%20after%20being%20redirected%20to%20fake%20Booking.com%20sites&amp;severity=medium&amp;id=683f6564182aa0cae28d1a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5522-improper-authorization-in-jack0240-b-7c9990ce</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5522%3A%20Improper%20Authorization%20in%20jack0240%20%E9%AD%8F%20bskms%20%E8%93%9D%E5%A4%A9%E5%B9%BC%E5%84%BF%E5%9B%AD%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=683f4959182aa0cae2891646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5521-cross-site-request-forgery-in-wukong-89b29e83</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5521%3A%20Cross-Site%20Request%20Forgery%20in%20WuKongOpenSource%20WukongCRM&amp;severity=medium&amp;id=683f4260182aa0cae2881831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48998-cwe-89-improper-neutralization-of-s-e157e6e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48998%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dataease%20dataease&amp;severity=high&amp;id=683f4260182aa0cae288182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/illuminating-transparent-tribe-78d14e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Illuminating%20Transparent%20Tribe&amp;severity=medium&amp;id=683f6564182aa0cae28d1a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-transparent-tribe-vibe-apt36-returns-with-capr-559e9743</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Transparent%20Tribe%20Vibe%3A%20APT36%20Returns%20With%20CapraRAT%20Impersonating%20Viber&amp;severity=medium&amp;id=683f6564182aa0cae28d1a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48997-cwe-248-uncaught-exception-in-expre-fc886d41</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48997%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20expressjs%20multer&amp;severity=high&amp;id=683f3ee7182aa0cae28796ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48953-cwe-434-unrestricted-upload-of-file-95733957</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48953%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=683f3ee7182aa0cae28796b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48950-cwe-276-incorrect-default-permissio-6ef977c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48950%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=683f3ee7182aa0cae28796b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5520-reachable-assertion-in-open5gs-9d7cf7ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5520%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=683f3b5c182aa0cae287156a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5516-cross-site-scripting-in-totolink-x20-4652da56</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5516%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f3b5c182aa0cae2871568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30360-cwe-346-origin-validation-error-in--f24f7d20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30360%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20webpack%20webpack-dev-server&amp;severity=medium&amp;id=683f37c9182aa0cae28696c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30359-cwe-749-exposed-dangerous-method-or-d4ade928</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30359%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20webpack%20webpack-dev-server&amp;severity=medium&amp;id=683f3437182aa0cae286172a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5515-command-injection-in-totolink-x2000r-2dbc9920</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5515%3A%20Command%20Injection%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f3437182aa0cae286172e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5513-cross-site-scripting-in-quequnlong-s-561116a0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5513%3A%20Cross%20Site%20Scripting%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f3437182aa0cae286172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-bug-at-compliance-firm-vanta-leaks-customer-d-fb75bcb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Code%20Bug%20at%20Compliance%20Firm%20Vanta%20Leaks%20Customer%20Data%20to%20Other%20Clients&amp;severity=medium&amp;id=683f30b8182aa0cae2859884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-rubygems-pose-as-fastlane-to-steal-teleg-ebbbff07</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20RubyGems%20pose%20as%20Fastlane%20to%20steal%20Telegram%20API%20data&amp;severity=medium&amp;id=683f2d3a182aa0cae285196d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5512-improper-authentication-in-quequnlon-39be9316</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5512%3A%20Improper%20Authentication%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f2d48182aa0cae285197e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5511-improper-authorization-in-quequnlong-c94bb433</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5511%3A%20Improper%20Authorization%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f2d48182aa0cae285197c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30167-cwe-427-uncontrolled-search-path-el-0f72e488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30167%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20jupyter%20jupyter_core&amp;severity=high&amp;id=683f29c4182aa0cae2849a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5510-server-side-request-forgery-in-quequ-b251f634</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5510%3A%20Server-Side%20Request%20Forgery%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f262f182aa0cae2841b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5509-path-traversal-in-quequnlong-shiyi-b-876f6f66</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5509%3A%20Path%20Traversal%20in%20quequnlong%20shiyi-blog&amp;severity=medium&amp;id=683f1f41182aa0cae2831b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5508-cross-site-scripting-in-totolink-a30-63ec22d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5508%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f1f41182aa0cae2831b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-banking-trojan-crocodilus-rapidly-evolves--3fb96657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20banking%20trojan%20Crocodilus%20rapidly%20evolves%20and%20goes%20global&amp;severity=medium&amp;id=683f1baf182aa0cae2829bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-warns-of-connectwise-screenconnect-bug-exploi-afcc9f21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20warns%20of%20ConnectWise%20ScreenConnect%20bug%20exploited%20in%20attacks&amp;severity=medium&amp;id=683f1baf182aa0cae2829bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5507-cross-site-scripting-in-totolink-a30-f431b0b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5507%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f1834182aa0cae2821d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25020-cwe-1287-improper-validation-of-spe-78ab8c59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25020%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=medium&amp;id=683f1834182aa0cae2821d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1334-cwe-525-information-exposure-through-761b7d74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1334%3A%20CWE-525%20Information%20Exposure%20Through%20Browser%20Caching%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=medium&amp;id=683f14ab182aa0cae2819e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25021-cwe-94-improper-control-of-generati-c4106335</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25021%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=high&amp;id=683f14ab182aa0cae2819e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25022-cwe-260-password-in-configuration-f-15d5de34</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25022%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=critical&amp;id=683f14ab182aa0cae2819e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25019-cwe-613-insufficient-session-expira-7e93af59</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25019%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20QRadar%20Suite%20Software&amp;severity=medium&amp;id=683f14ab182aa0cae2819e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bypassing-tamper-protection-and-getting-root-shell-c6b02f1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bypassing%20tamper%20protection%20and%20getting%20root%20shell%20access%20on%20a%20Worldline%20Yomani%20XR%20credit%20card%20terminal&amp;severity=medium&amp;id=683f1129182aa0cae2811ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5506-cross-site-scripting-in-totolink-a30-a68311e7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5506%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f112a182aa0cae2811bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5505-cross-site-scripting-in-totolink-a30-3061c363</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5505%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002RU&amp;severity=medium&amp;id=683f112a182aa0cae2811bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45655-cwe-732-incorrect-permission-assign-d0e9d293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45655%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46548-cwe-287-improper-authentication-in--0de5ebe1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46548%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Pekko%20Management&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36564-cwe-61-unix-symbolic-link-symlink-f-14d6dd48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36564%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20Dell%20Encryption%20Admin%20Utilities&amp;severity=high&amp;id=683f0dc1182aa0cae27ff340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5504-command-injection-in-totolink-x2000r-0bd866ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5504%3A%20Command%20Injection%20in%20TOTOLINK%20X2000R&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5503-stack-based-buffer-overflow-in-totol-fa9120c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5503%3A%20Stack-based%20Buffer%20Overflow%20in%20TOTOLINK%20X15&amp;severity=high&amp;id=683f0a31182aa0cae27f6e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5502-command-injection-in-totolink-x15-587764a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5502%3A%20Command%20Injection%20in%20TOTOLINK%20X15&amp;severity=medium&amp;id=683f034b182aa0cae27e66e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5501-reachable-assertion-in-open5gs-d30ca3e9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5501%3A%20Reachable%20Assertion%20in%20Open5GS&amp;severity=medium&amp;id=683f034b182aa0cae27e66e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5499-deserialization-in-slackero-phpwcms-319b885f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5499%3A%20Deserialization%20in%20slackero%20phpwcms&amp;severity=medium&amp;id=683eff8d182aa0cae27db846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5498-deserialization-in-slackero-phpwcms-171fc635</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5498%3A%20Deserialization%20in%20slackero%20phpwcms&amp;severity=medium&amp;id=683efc06182aa0cae27d3674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5497-deserialization-in-slackero-phpwcms-4c8ff217</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5497%3A%20Deserialization%20in%20slackero%20phpwcms&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12718-cwe-22-improper-limitation-of-a-pat-88a08eda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12718%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=683ef51d182aa0cae27c315d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4435-vulnerability-in-python-software-fou-42b98ea4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4435%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=683f0dc3182aa0cae27ff441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4138-cwe-22-improper-limitation-of-a-path-75f77a24</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4138%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=683ef89a182aa0cae27cb26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4330-cwe-22-improper-limitation-of-a-path-7f129b87</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4330%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=683eff8d182aa0cae27db842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4517-cwe-22-improper-limitation-of-a-path-dc08cfa8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4517%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=critical&amp;id=683eff8d182aa0cae27db844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5495-improper-authentication-in-netgear-w-3e4911b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5495%3A%20Improper%20Authentication%20in%20Netgear%20WNR614&amp;severity=medium&amp;id=683eedf4182aa0cae27b309b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-fixes-high-severity-zero-day-vulnera-f4b5bffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20Fixes%20High-Severity%20Zero-Day%20Vulnerability%20in%20Out-of-Band%20Update&amp;severity=high&amp;id=683ee6fa182aa0cae27923e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4205-cwe-79-improper-neutralization-of-in-d02f2ece</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popups%20Builder&amp;severity=medium&amp;id=683ee361182aa0cae274169e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4671-cwe-79-improper-neutralization-of-in-1629d94f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=683ee361182aa0cae27416a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5340-cwe-79-improper-neutralization-of-in-e27f7d0c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartwpress%20Music%20Player%20for%20Elementor%20%E2%80%93%20Audio%20Player%20%26%20Podcast%20Player&amp;severity=medium&amp;id=683ee361182aa0cae27416a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5493-sql-injection-in-baison-channel-midd-aa990bc4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5493%3A%20SQL%20Injection%20in%20Baison%20Channel%20Middleware%20Product&amp;severity=medium&amp;id=683ee1eb182aa0cae273963c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5492-command-injection-in-d-link-di-500wf-fa25e589</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5492%3A%20Command%20Injection%20in%20D-Link%20DI-500WF-WT&amp;severity=medium&amp;id=683ed1c6182aa0cae27139d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52561-cwe-708-incorrect-ownership-assignm-29f8cc21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52561%3A%20CWE-708%3A%20Incorrect%20Ownership%20Assignment%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ee1eb182aa0cae27395f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54189-cwe-62-unix-hard-link-in-parallels--5e7743b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54189%3A%20CWE-62%3A%20UNIX%20Hard%20Link%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ee1eb182aa0cae2739638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36486-cwe-62-unix-hard-link-in-parallels--7b08acf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36486%3A%20CWE-62%3A%20UNIX%20Hard%20Link%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ec755182aa0cae26fb3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31359-cwe-22-improper-limitation-of-a-pat-b48604e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31359%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Parallels%20Parallels%20Desktop%20for%20Mac&amp;severity=high&amp;id=683ee1eb182aa0cae273963a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4392-cwe-79-improper-neutralization-of-in-0f7ef9d3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Shared%20Files%20%E2%80%93%20Frontend%20File%20Upload%20Form%20%26%20Secure%20File%20Sharing&amp;severity=high&amp;id=683ec3d3182aa0cae26f31ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-north-face-warns-customers-of-april-credential-9f6157ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20North%20Face%20warns%20customers%20of%20April%20credential%20stuffing%20attack&amp;severity=medium&amp;id=683ec3c6182aa0cae26f31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cartier-discloses-data-breach-amid-fashion-brand-c-301d06b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cartier%20discloses%20data%20breach%20amid%20fashion%20brand%20cyberattacks&amp;severity=medium&amp;id=683ec748182aa0cae26fb3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptojacking-campaign-relies-on-devops-tools-007e6806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cryptojacking%20campaign%20relies%20on%20DevOps%20tools&amp;severity=medium&amp;id=683ecac3182aa0cae27037f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/google-chrome-to-distrust-two-certificate-authorit-26110c1c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Google%20Chrome%20to%20Distrust%20Two%20Certificate%20Authorities%20Over%20Compliance%20and%20Conduct%20Issues&amp;severity=medium&amp;id=683ece4c182aa0cae270b94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5103-cwe-89-improper-neutralization-of-sp-c5fee038</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5103%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpswings%20Ultimate%20Gift%20Cards%20for%20WooCommerce&amp;severity=medium&amp;id=683ee1eb182aa0cae2739640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5116-cwe-79-improper-neutralization-of-in-5139c626</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brikou%20WP%20Plugin%20Info%20Card&amp;severity=medium&amp;id=683ee1eb182aa0cae2739642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4420-cwe-79-improper-neutralization-of-in-45532c5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=683ee1eb182aa0cae273963e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1725-cwe-434-unrestricted-upload-of-file--0a9fd12f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1725%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20Bit%20File%20Manager%20%E2%80%93%20100%25%20Free%20%26%20Open%20Source%20File%20Manager%20and%20Code%20Editor%20for%20WordPress&amp;severity=medium&amp;id=683eb229182aa0cae26c7bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46355-incorrect-default-permissions-in-ke-95aad16c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46355%3A%20Incorrect%20default%20permissions%20in%20Keiyo%20System%20Co.%2C%20LTD%20PC%20Time%20Tracer&amp;severity=high&amp;id=683ee1eb182aa0cae2739646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41428-improper-limitation-of-a-pathname-t-d5bb02a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41428%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Keiyo%20System%20Co.%2C%20LTD%20TimeWorks&amp;severity=medium&amp;id=683eaec1182aa0cae26bf6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21479-cwe-863-incorrect-authorization-in--c7b86d94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21479%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e9d25182aa0cae2697072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4567-cwe-79-cross-site-scripting-xss-in-u-3a7e1456</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4567%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Post%20Slider%20and%20Post%20Carousel%20with%20Post%20Vertical%20Scrolling%20Widget&amp;severity=medium&amp;id=683ee1eb182aa0cae2739610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3662-cwe-79-cross-site-scripting-xss-in-u-71f17853</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3662%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20FancyBox%20for%20WordPress&amp;severity=medium&amp;id=683ee1eb182aa0cae2739648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3584-cwe-79-cross-site-scripting-xss-in-u-9c30f613</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3584%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Newsletter&amp;severity=medium&amp;id=683e92b3182aa0cae267ec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27038-cwe-416-use-after-free-in-qualcomm--cf256d12</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27038%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27031-cwe-416-use-after-free-in-qualcomm--8323b10b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27031%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27029-cwe-126-buffer-over-read-in-qualcom-984a2cac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27029%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21486-cwe-822-untrusted-pointer-dereferen-3220390e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21486%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21485-cwe-367-time-of-check-time-of-use-t-83707019</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21485%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21480-cwe-863-incorrect-authorization-in--a5183244</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21480%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21463-cwe-126-buffer-over-read-in-qualcom-ec23ac28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21463%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53026-cwe-126-buffer-over-read-in-qualcom-d2533f0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53026%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53021-cwe-126-buffer-over-read-in-qualcom-871994ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53021%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53020-cwe-126-buffer-over-read-in-qualcom-9759752d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53020%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683e92b3182aa0cae267eca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53019-cwe-126-buffer-over-read-in-qualcom-2d5416bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53019%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683ee1eb182aa0cae2739625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53018-cwe-367-time-of-check-time-of-use-t-ce3c5b8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53018%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae2739622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53017-cwe-823-use-of-out-of-range-pointer-e98f8158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53017%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae273961f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53016-cwe-367-time-of-check-time-of-use-t-fa8afb75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53016%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae273961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53015-cwe-416-use-after-free-in-qualcomm--c9217da1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53015%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae2739619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53013-cwe-120-buffer-copy-without-checkin-6c36f2a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53013%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683ee1eb182aa0cae2739616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53010-cwe-284-improper-access-control-in--12842816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53010%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683ee1eb182aa0cae2739613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31712-cwe-120-buffer-copy-without-checkin-b1b0495b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31712%3A%20cwe-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=683ee1eb182aa0cae2739636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31711-cwe-476-null-pointer-dereference-in-02c5f903</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31711%3A%20cwe-476%20NULL%20Pointer%20Dereference%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=683ee1eb182aa0cae2739632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31710-cwe-77-improper-neutralization-of-s-60590290</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31710%3A%20cwe-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FT606%2FT612%2FT616%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=683e8efd182aa0cae2676dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4797-cwe-288-authentication-bypass-using--0fdcbd9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4797%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Golo%20-%20City%20Travel%20Guide%20WordPress%20Theme&amp;severity=critical&amp;id=683ee1eb182aa0cae2739655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4224-cwe-79-improper-neutralization-of-in-1749960f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4224%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gVectors%20wpForo%20%2B%20wpForo%20Advanced%20Attachments&amp;severity=high&amp;id=683ee1eb182aa0cae2739664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2939-cwe-502-deserialization-of-untrusted-3f8c42c1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2939%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20techjewel%20Ninja%20Tables%20%E2%80%93%20Easy%20Data%20Table%20Builder&amp;severity=medium&amp;id=683e685b182aa0cae261efe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4047-cwe-862-missing-authorization-in-wpm-3b4a3ccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4047%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Broken%20Link%20Checker&amp;severity=medium&amp;id=683ee1eb182aa0cae2739657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23097-na-in-na-2da5fae0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23097%3A%20n%2Fa&amp;severity=critical&amp;id=683f53f9182aa0cae28a9c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23100-na-in-na-b7b8baf5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23100%3A%20n%2Fa&amp;severity=high&amp;id=683f5057182aa0cae28a1d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23098-na-in-na-4fbfe96a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23098%3A%20n%2Fa&amp;severity=high&amp;id=683f4ce2182aa0cae2899665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23102-na-in-na-4d010e22</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23102%3A%20n%2Fa&amp;severity=high&amp;id=683f45d9182aa0cae28897e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23107-na-in-na-7ee53446</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23107%3A%20n%2Fa&amp;severity=high&amp;id=683f2d48182aa0cae2851980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32106-na-in-na-b80af17a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32106%3A%20n%2Fa&amp;severity=critical&amp;id=683f22b8182aa0cae2839b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32105-na-in-na-dce76ee0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32105%3A%20n%2Fa&amp;severity=critical&amp;id=683f22b8182aa0cae2839b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23103-na-in-na-6d946119</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23103%3A%20n%2Fa&amp;severity=high&amp;id=683f1be9182aa0cae2829c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44148-na-in-na-bef9da02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44148%3A%20n%2Fa&amp;severity=critical&amp;id=683f1834182aa0cae2821d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45854-na-in-na-c30f7f76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45854%3A%20CWE-862%20Missing%20Authorization%20in%20JEHc%20JEHC-BPM&amp;severity=critical&amp;id=683f14ab182aa0cae2819e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43925-na-in-na-b608be51</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43925%3A%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43924-na-in-na-f55399d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43924%3A%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43923-na-in-na-3e6626a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43923%3A%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45855-na-in-na-fce4e517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45855%3A%20n%2Fa&amp;severity=medium&amp;id=683f034a182aa0cae27e65d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46154-na-in-na-9ff5e9ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46154%3A%20n%2Fa&amp;severity=high&amp;id=683eff8d182aa0cae27db82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5068-use-after-free-in-google-chrome-fdfa58aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5068%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=683e5dc4182aa0cae2606b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5419-out-of-bounds-read-and-write-in-goog-18c2fa35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5419%3A%20Out%20of%20bounds%20read%20and%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=683e5dc4182aa0cae2606b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/critical-ios-activation-infrastructure-vulnerabili-91ae5a58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Critical%20iOS%20Activation%20Infrastructure%20Vulnerability%3A%20Unauthenticated%20Provisioning%20Injection%20at%20Apple%E2%80%99s%20SIM%20Activation%20Endpoint&amp;severity=critical&amp;id=683e338e182aa0cae25a622f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3919-cwe-79-improper-neutralization-of-in-1a0d3eac</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtoffee%20WordPress%20Comments%20Import%20%26%20Export&amp;severity=medium&amp;id=683ee1eb182aa0cae27396a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pypi-supply-chain-attack-uncovered-colorama-and-co-77f61290</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyPI%20Supply%20Chain%20Attack%20Uncovered%3A%20Colorama%20and%20Colorizr%20Name%20Confusion&amp;severity=medium&amp;id=683e2204182aa0cae257e951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47585-cwe-862-missing-authorization-in-ma-05059cfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47585%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=683ee1eb182aa0cae27396aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48996-cwe-201-insertion-of-sensitive-info-9780e8e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48996%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20haxtheweb%20issues&amp;severity=medium&amp;id=683ee1eb182aa0cae27396ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48387-cwe-22-improper-limitation-of-a-pat-dc3c504f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48387%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mafintosh%20tar-fs&amp;severity=high&amp;id=683dfb4f182aa0cae252782f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1051-cwe-122-heap-based-buffer-overflow-i-d52f9f85</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sonos%20Era%20300&amp;severity=high&amp;id=683df7d6182aa0cae251f9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49069-cwe-352-cross-site-request-forgery--fb2bc6b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49069%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cimatti%20Contact%20Forms%20by%20Cimatti&amp;severity=null&amp;id=683df463182aa0cae2517ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5086-cwe-502-deserialization-of-untrusted-72e175c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5086%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Dassault%20Syst%C3%A8mes%20DELMIA%20Apriso&amp;severity=critical&amp;id=683de64b182aa0cae24f7c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20298-the-product-specifies-permissions-f-cbf7659b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20298%3A%20The%20product%20specifies%20permissions%20for%20a%20security-critical%20resource%20in%20a%20way%20that%20allows%20that%20resource%20to%20be%20read%20or%20modified%20by%20unintended%20actors.%20in%20Splunk%20Splunk%2FUniversalForwarder%20for%20Windows&amp;severity=high&amp;id=683ddf3a182aa0cae24e7e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20297-the-software-does-not-neutralize-or-b50d8d08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20297%3A%20The%20software%20does%20not%20neutralize%20or%20incorrectly%20neutralizes%20user-controllable%20input%20before%20it%20is%20placed%20in%20output%20that%20is%20used%20as%20a%20web%20page%20that%20is%20served%20to%20other%20users.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=683ddf3a182aa0cae24e7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5036-cwe-416-use-after-free-in-autodesk-r-187e5450</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5036%3A%20CWE-416%20Use-After-Free%20in%20Autodesk%20Revit&amp;severity=high&amp;id=683ddbb0182aa0cae24dff85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1440-cwe-601-url-redirection-to-untrusted-63666ce7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1440%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=683ddbb0182aa0cae24dff83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8008-cwe-79-improper-neutralization-of-in-08272c93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=683dd85d182aa0cae24d814d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3509-cwe-79-improper-neutralization-of-in-6c26d155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=683dd85d182aa0cae24d8147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7074-cwe-434-unrestricted-upload-of-file--b91c5a3c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7074%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WSO2%20WSO2%20Enterprise%20Integrator&amp;severity=medium&amp;id=683dd85d182aa0cae24d814b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7073-cwe-918-server-side-request-forgery--4892a3c0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7073%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WSO2%20WSO2%20Identity%20Server%20as%20Key%20Manager&amp;severity=medium&amp;id=683dd85d182aa0cae24d8149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48995-cwe-208-observable-timing-discrepan-a83a5ccb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48995%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20XML-Security%20signxml&amp;severity=medium&amp;id=683dd4a1182aa0cae24c8319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48994-cwe-303-incorrect-implementation-of-2a8ee760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48994%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20XML-Security%20signxml&amp;severity=medium&amp;id=683dd12a182aa0cae24c049d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48941-cwe-1230-exposure-of-sensitive-info-512a9e1f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48941%3A%20CWE-1230%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20mybb%20mybb&amp;severity=medium&amp;id=683dcda1182aa0cae24b862f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48940-cwe-22-improper-limitation-of-a-pat-70da709a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48940%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mybb%20mybb&amp;severity=high&amp;id=683dca2c182aa0cae24b06a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48866-cwe-1050-excessive-platform-resourc-865d3525</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48866%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20owasp-modsecurity%20ModSecurity&amp;severity=high&amp;id=683dca2c182aa0cae24b06a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48877-cwe-680-integer-overflow-to-buffer--c03e6ecc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48877%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20xls2csv%20xls2csv&amp;severity=high&amp;id=683dbfa6182aa0cae249835c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52035-cwe-190-integer-overflow-or-wraparo-f2045f3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52035%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20catdoc%20catdoc&amp;severity=high&amp;id=683dbfa6182aa0cae249835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54028-cwe-191-integer-underflow-wrap-or-w-5994fa1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54028%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20catdoc%20catdoc&amp;severity=high&amp;id=683dbfa6182aa0cae2498360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20001-cwe-125-out-of-bounds-read-in-high--e8ed6ece</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20001%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20High-Logic%20FontCreator&amp;severity=medium&amp;id=683dbc14182aa0cae2490294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37096-vulnerability-in-hewlett-packard-en-c9f21051</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37096%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683db512182aa0cae2480401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37095-vulnerability-in-hewlett-packard-en-a6dd9a1f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37095%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=medium&amp;id=683dca2c182aa0cae24b06af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37094-vulnerability-in-hewlett-packard-en-daeae001</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37094%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=medium&amp;id=683db18d182aa0cae2478417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37093-vulnerability-in-hewlett-packard-en-815ac93d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37093%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=critical&amp;id=683dca2c182aa0cae24b06a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37092-vulnerability-in-hewlett-packard-en-6ba6bba2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37092%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683dadf9182aa0cae2470455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37091-vulnerability-in-hewlett-packard-en-6348e900</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37091%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683daa76182aa0cae2468219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5447-os-command-injection-in-linksys-re65-57dba825</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5447%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683dd85d182aa0cae24d816a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37090-vulnerability-in-hewlett-packard-en-223fd190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37090%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=medium&amp;id=683dca2c182aa0cae24b06ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37089-vulnerability-in-hewlett-packard-en-7f5de9ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37089%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20StoreOnce%20Software&amp;severity=high&amp;id=683dca2c182aa0cae24b06ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-robbinhood-ransomware-operator-pleads-guil-13a24c5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Robbinhood%20Ransomware%20Operator%20Pleads%20Guilty%20in%20US%20City%20Attacks&amp;severity=medium&amp;id=683da37a182aa0cae2457b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26396-cwe-269-improper-privilege-manageme-7ce772ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26396%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SolarWinds%20Dameware%20Mini%20Remote%20Control%20Service&amp;severity=high&amp;id=683da38f182aa0cae2457b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5446-os-command-injection-in-linksys-re65-af7bf79b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5446%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683dd85d182aa0cae24d816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12168-cwe-426-untrusted-search-path-in-ya-9f9af4a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12168%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Yandex%20Telemost&amp;severity=high&amp;id=683d9ffd182aa0cae244c3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5445-os-command-injection-in-linksys-re65-470d4ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5445%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683dd12a182aa0cae24c049f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46806-cwe-823-use-of-out-of-range-pointer-a993d2cd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46806%3A%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20https%3A%2F%2Fgithub.com%2Fyrutschle%2Fsslh%2Freleases%2Ftag%2Fv2.2.4%20sslh&amp;severity=medium&amp;id=683d9907182aa0cae2439cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5444-os-command-injection-in-linksys-re65-b13e1abc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5444%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d9584182aa0cae242f8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5443-os-command-injection-in-linksys-re65-12776e22</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5443%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d9584182aa0cae242f8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46807-cwe-770-allocation-of-resources-wit-f4692654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46807%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20https%3A%2F%2Fgithub.com%2Fyrutschle%2Fsslh%2Freleases%2Ftag%2Fv2.2.4%20sslh&amp;severity=high&amp;id=683d9584182aa0cae242f8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vulnerabilities-found-in-preinstalled-apps-on-andr-bde7f563</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vulnerabilities%20Found%20in%20Preinstalled%20apps%20on%20Android%20Smartphones%20could%20perform%20factory%20reset%20of%20device%2C%20exfiltrate%20PIN%20code%20or%20inject%20an%20arbitrary%20intent%20with%20system-level%20privileges&amp;severity=medium&amp;id=683d8aea182aa0cae2412e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48990-cwe-122-heap-based-buffer-overflow--845ae16a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48990%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20nekernel-org%20nekernel&amp;severity=high&amp;id=683d9584182aa0cae242f8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48958-cwe-79-improper-neutralization-of-i-d2606a19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48958%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20froxlor%20Froxlor&amp;severity=medium&amp;id=683d9584182aa0cae242f8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48957-cwe-23-relative-path-traversal-in-a-a931fae5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48957%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20AstrBotDevs%20AstrBot&amp;severity=high&amp;id=683d9584182aa0cae242f8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48955-cwe-532-insertion-of-sensitive-info-a2a61473</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48955%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Erudika%20para&amp;severity=medium&amp;id=683d9584182aa0cae242f8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48495-cwe-79-improper-neutralization-of-i-741774ee</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48495%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=683d9584182aa0cae242f8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1246-cwe-119-improper-restriction-of-oper-1e39fb9c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1246%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Arm%20Ltd%20Bifrost%20GPU%20Userspace%20Driver&amp;severity=high&amp;id=683d94ca182aa0cae24279e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0819-cwe-416-use-after-free-in-arm-ltd-bi-7aa7d51f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0819%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=683d94ca182aa0cae24279e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0073-cwe-416-use-after-free-in-arm-ltd-va-56ca9432</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0073%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=683d94ca182aa0cae242798b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48494-cwe-79-improper-neutralization-of-i-05da17f7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48494%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Forceu%20Gokapi&amp;severity=medium&amp;id=683d94ca182aa0cae24279eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47289-cwe-1004-sensitive-cookie-without-h-32c58c11</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47289%3A%20CWE-1004%3A%20Sensitive%20Cookie%20Without%20&apos;HttpOnly&apos;%20Flag%20in%20CE-PhoenixCart%20PhoenixCart&amp;severity=medium&amp;id=683d94ca182aa0cae24279e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5442-os-command-injection-in-linksys-re65-8edf0e10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5442%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d94ca182aa0cae24279ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47272-cwe-306-missing-authentication-for--9a468408</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47272%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20CE-PhoenixCart%20PhoenixCart&amp;severity=medium&amp;id=683d83e8182aa0cae2402a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29785-cwe-248-uncaught-exception-in-quic--12f7622e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29785%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20quic-go%20quic-go&amp;severity=high&amp;id=683d94ca182aa0cae24279ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3454-cwe-285-in-grafana-grafana-513a6526</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3454%3A%20CWE-285%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=683d806b182aa0cae23faafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5441-os-command-injection-in-linksys-re65-63033c30</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5441%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d94ca182aa0cae24279f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-recruiter-emails-target-cfos-using-legit-netb-d6924a33</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Recruiter%20Emails%20Target%20CFOs%20Using%20Legit%20NetBird%20Tool%20Across%206%20Global%20Regions&amp;severity=medium&amp;id=683d805a182aa0cae23faaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-cyberattack-hit-hospitals-operated-by-covenant-h-ef946af5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20cyberattack%20hit%20hospitals%20operated%20by%20Covenant%20Health&amp;severity=medium&amp;id=683d875f182aa0cae240aea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3260-cwe-863-in-grafana-grafana-b9138155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3260%3A%20CWE-863%20in%20Grafana%20Grafana&amp;severity=high&amp;id=683d94ca182aa0cae24279f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1750-cwe-89-improper-neutralization-of-sp-2e5cf172</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=critical&amp;id=683d795f182aa0cae23eac2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5440-os-command-injection-in-linksys-re65-3d34da3e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5440%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d94ca182aa0cae24279f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/backdoors-in-python-and-npm-packages-spotted-targe-5c6f0cad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Backdoors%20in%20Python%20and%20NPM%20Packages%20Spotted%20Targeting%20Windows%20and%20Linux%20Systems&amp;severity=medium&amp;id=683d75dd182aa0cae23e2bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5439-os-command-injection-in-linksys-re65-570df564</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5439%3A%20OS%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d723c182aa0cae23dac5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5438-command-injection-in-linksys-re6500-20b94095</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5438%3A%20Command%20Injection%20in%20Linksys%20RE6500&amp;severity=medium&amp;id=683d6b34182aa0cae23cac68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5455-cwe-20-improper-input-validation-in--df203ad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5455%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=683d67c1182aa0cae23c2b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5437-improper-authentication-in-multilase-82a6fa24</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5437%3A%20Improper%20Authentication%20in%20Multilaser%20Sirius%20RE016&amp;severity=medium&amp;id=683d644c182aa0cae23bab55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5436-information-disclosure-in-multilaser-c4a43896</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5436%3A%20Information%20Disclosure%20in%20Multilaser%20Sirius%20RE016&amp;severity=medium&amp;id=683d5d4a182aa0cae23aa79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0358-cwe-269-improper-privilege-managemen-ee3a78f9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0358%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=high&amp;id=683d59b7182aa0cae23a2778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0325-cwe-1287-improper-validation-of-spec-1acfdc38</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0325%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=683d94ca182aa0cae24279a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0324-cwe-791-incomplete-filtering-of-spec-76828af4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0324%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=critical&amp;id=683d562a182aa0cae239a589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5435-sql-injection-in-marwal-infotech-cms-c64800e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5435%3A%20SQL%20Injection%20in%20Marwal%20Infotech%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5113-cwe-77-improper-neutralization-of-sp-20aacc97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5113%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Diviotec%20nbr222p&amp;severity=high&amp;id=683d528d182aa0cae239267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4010-cwe-77-improper-neutralization-of-sp-86cadf51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4010%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Netcomm%20NTC%206200&amp;severity=high&amp;id=683d4f22182aa0cae238a6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5434-sql-injection-in-aem-solutions-cms-ba10af9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5434%3A%20SQL%20Injection%20in%20Aem%20Solutions%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5433-sql-injection-in-fengoffice-feng-off-cfeea14b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5433%3A%20SQL%20Injection%20in%20Fengoffice%20Feng%20Office&amp;severity=medium&amp;id=683d47f3182aa0cae237a96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1235-cwe-190-integer-overflow-or-wraparou-0b725d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1235%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20WAGO%20Fully%20Managed%20Switches%200852-0303&amp;severity=medium&amp;id=683d4476182aa0cae237287d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5432-sql-injection-in-assamlook-cms-5e48a1fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5432%3A%20SQL%20Injection%20in%20AssamLook%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3951-cwe-89-sql-injection-in-unknown-wp-o-f5982aa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3951%3A%20CWE-89%20SQL%20Injection%20in%20WP-Optimize&amp;severity=medium&amp;id=683d94ca182aa0cae24279aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1485-cwe-79-cross-site-scripting-xss-in-u-d5028dbf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1485%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Real%20Cookie%20Banner%3A%20GDPR%20%26%20ePrivacy%20Cookie%20Consent&amp;severity=medium&amp;id=683d4125182aa0cae236aa24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5431-sql-injection-in-assamlook-cms-811613ff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5431%3A%20SQL%20Injection%20in%20AssamLook%20CMS&amp;severity=medium&amp;id=683d39f8182aa0cae235aa1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5430-sql-injection-in-assamlook-cms-342ef505</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5430%3A%20SQL%20Injection%20in%20AssamLook%20CMS&amp;severity=medium&amp;id=683d32fd182aa0cae234acbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5429-improper-access-controls-in-juzaweb--35af3e4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5429%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d94ca182aa0cae24279b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25179-cwe-280-improper-handling-of-insuff-08693b99</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25179%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=683d2853182aa0cae23331c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5428-improper-access-controls-in-juzaweb--f5ad58e1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5428%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d24dd182aa0cae232b354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5427-improper-access-controls-in-juzaweb--b63189b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5427%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d2157182aa0cae2322f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11857-cwe-59-improper-link-resolution-bef-54212dea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11857%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Realtek%20Bluetooth%20HCI%20Adaptor&amp;severity=high&amp;id=683d1df1182aa0cae231b0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5426-improper-access-controls-in-juzaweb--1b96323d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5426%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d16f6182aa0cae230af10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5425-improper-access-controls-in-juzaweb--d4c78a8e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5425%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d16f6182aa0cae230af0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20678-cwe-674-uncontrolled-recursion-in-m-1b8759bc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20678%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8766R%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8863%2C%20MT8873%2C%20MT8883%2C%20MT8893&amp;severity=medium&amp;id=683d16f6182aa0cae230af0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20677-cwe-476-null-pointer-dereference-in-4af5c108</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20677%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20676-cwe-476-null-pointer-dereference-in-bcb4292e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20676%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20675-cwe-476-null-pointer-dereference-in-b3e46e72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20675%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20674-cwe-863-incorrect-authorization-in--55098e9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20674%3A%20CWE-863%20Incorrect%20Authorization%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT6990%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986%2C%20MT7990%2C%20MT7992%2C%20MT7993&amp;severity=critical&amp;id=683d16f6182aa0cae230af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20673-cwe-476-null-pointer-dereference-in-a3fe943a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20673%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=medium&amp;id=683d16f6182aa0cae230af02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20672-cwe-122-heap-overflow-in-mediatek-i-43208305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20672%3A%20CWE-122%20Heap%20Overflow%20in%20MediaTek%2C%20Inc.%20MT7902%2C%20MT7921%2C%20MT7922%2C%20MT7925%2C%20MT7927&amp;severity=critical&amp;id=683d16f6182aa0cae230af00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5424-improper-access-controls-in-juzaweb--0990e4d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5424%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d0fd8182aa0cae22fb20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5423-improper-access-controls-in-juzaweb--37edb9c0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5423%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683d0534182aa0cae22e37c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5422-improper-access-controls-in-juzaweb--d3d0a4f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5422%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683cfaf4182aa0cae22cbd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5421-improper-access-controls-in-juzaweb--bf7cee7d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5421%3A%20Improper%20Access%20Controls%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683cf3bf182aa0cae22bc11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5420-cross-site-scripting-in-juzaweb-cms-76e39d3b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5420%3A%20Cross%20Site%20Scripting%20in%20juzaweb%20CMS&amp;severity=medium&amp;id=683cecc9182aa0cae22ac3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49164-cwe-321-use-of-hard-coded-cryptogra-5fc58b15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49164%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Arris%20VIP1113&amp;severity=medium&amp;id=683e5dc4182aa0cae2606b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49163-cwe-424-improper-protection-of-alte-12c3f626</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49163%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20Arris%20VIP1113&amp;severity=medium&amp;id=683e5dc4182aa0cae2606b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49162-cwe-424-improper-protection-of-alte-77806c1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49162%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20Arris%20VIP1113&amp;severity=medium&amp;id=683e3aa0182aa0cae25b608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23104-na-in-na-9c2ebb3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23104%3A%20n%2Fa&amp;severity=medium&amp;id=683e0ce3182aa0cae254f0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23099-na-in-na-9fe410b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23099%3A%20n%2Fa&amp;severity=critical&amp;id=683df0d1182aa0cae250fc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23105-na-in-na-b8dc2ff2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23105%3A%20n%2Fa&amp;severity=high&amp;id=683ded3e182aa0cae2507d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27953-na-in-na-114f061e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27953%3A%20n%2Fa&amp;severity=medium&amp;id=683de64b182aa0cae24f7c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27955-na-in-na-68ab77cc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27955%3A%20n%2Fa&amp;severity=medium&amp;id=683de64b182aa0cae24f7c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27954-na-in-na-a953933d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27954%3A%20n%2Fa&amp;severity=medium&amp;id=683de64b182aa0cae24f7c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27956-na-in-na-5ec7daaa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27956%3A%20n%2Fa&amp;severity=high&amp;id=683de2b3182aa0cae24efd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45387-na-in-na-982e3574</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45387%3A%20n%2Fa&amp;severity=medium&amp;id=683ddf3a182aa0cae24e7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57783-cwe-79-improper-neutralization-of-i-90f58d53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20alexpinel%20Dot&amp;severity=high&amp;id=683dd85d182aa0cae24d8168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45542-na-in-na-cd919715</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45542%3A%20n%2Fa&amp;severity=high&amp;id=683dcda1182aa0cae24b8633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57459-na-in-na-d6d8ca6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57459%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dcda1182aa0cae24b8631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44115-na-in-na-6f38151b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44115%3A%20n%2Fa&amp;severity=medium&amp;id=683dc685182aa0cae24a84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40114-na-in-na-54cdacd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40114%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40113-na-in-na-f0fd175f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40113%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40112-na-in-na-29c1e58c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40112%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44172-na-in-na-4f06a411</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44172%3A%20n%2Fa&amp;severity=medium&amp;id=683dbfa5182aa0cae249828d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49112-cwe-191-integer-underflow-wrap-or-w-88bc876e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49112%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Valkey%20Valkey&amp;severity=low&amp;id=683d94ca182aa0cae24279b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49113-cwe-502-deserialization-of-untruste-d0180bc6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49113%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Roundcube%20Webmail&amp;severity=critical&amp;id=683d2bda182aa0cae233b0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5412-cross-site-scripting-in-mist-communi-2dab0ddb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5412%3A%20Cross%20Site%20Scripting%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683ce5b1182aa0cae229c28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5411-cross-site-scripting-in-mist-communi-641c790e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5411%3A%20Cross%20Site%20Scripting%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683cde92182aa0cae228c6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5410-cross-site-request-forgery-in-mist-c-f0b60695</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5410%3A%20Cross-Site%20Request%20Forgery%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683cd785182aa0cae227c951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5409-improper-access-controls-in-mist-com-2a548bdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5409%3A%20Improper%20Access%20Controls%20in%20Mist%20Community%20Edition&amp;severity=medium&amp;id=683cd084182aa0cae226c66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5408-buffer-overflow-in-wavlink-quantum-d-eb4cee74</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5408%3A%20Buffer%20Overflow%20in%20WAVLINK%20QUANTUM%20D2G&amp;severity=critical&amp;id=683cc96a182aa0cae225ca16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5407-cross-site-scripting-in-chaitak-gora-e4f2f058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5407%3A%20Cross%20Site%20Scripting%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683cc26c182aa0cae224cdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5406-unrestricted-upload-in-chaitak-gorai-46225afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5406%3A%20Unrestricted%20Upload%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c9f34182aa0cae21f5020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5405-cross-site-scripting-in-chaitak-gora-26810a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5405%3A%20Cross%20Site%20Scripting%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c9846182aa0cae21e53c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5404-denial-of-service-in-chaitak-gorai-b-5392f910</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5404%3A%20Denial%20of%20Service%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c831b182aa0cae21b5ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5403-sql-injection-in-chaitak-gorai-blogb-e8782057</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5403%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c7c3a182aa0cae21a6263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5402-sql-injection-in-chaitak-gorai-blogb-5f5114bb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5402%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c600b182aa0cae2166b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40908-cwe-552-files-or-directories-access-8db4a7c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40908%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20TINITA%20YAML%3A%3ALibYAML&amp;severity=critical&amp;id=683c58f0182aa0cae2156967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5401-sql-injection-in-chaitak-gorai-blogb-7e7e72b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5401%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c51f5182aa0cae2143187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33005-cwe-613-insufficient-session-expira-85b2b0bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33005%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c4b86182aa0cae212f9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33004-cwe-22-improper-limitation-of-a-pat-24844126</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33004%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c4b86182aa0cae212f9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2896-cwe-79-improper-neutralization-of-in-9df281ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c4afe182aa0cae212be0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25044-cwe-79-improper-neutralization-of-i-bce3575e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25044%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Planning%20Analytics%20Local&amp;severity=medium&amp;id=683c475c182aa0cae212045c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1499-cwe-312-cleartext-storage-of-sensiti-576e88c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1499%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=683c4b86182aa0cae212f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5400-sql-injection-in-chaitak-gorai-blogb-535a69aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5400%3A%20SQL%20Injection%20in%20chaitak-gorai%20Blogbook&amp;severity=medium&amp;id=683c129f182aa0cae20a1aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reverse-engineer-android-apps-for-api-key-e10043d9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reverse%20Engineer%20Android%20Apps%20for%20API%20Key&amp;severity=medium&amp;id=683b898b182aa0cae2f6cd5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5390-improper-access-controls-in-jeewms-2221e380</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5390%3A%20Improper%20Access%20Controls%20in%20JeeWMS&amp;severity=medium&amp;id=683b54e3182aa0cae2eede5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5389-improper-access-controls-in-jeewms-32c31307</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5389%3A%20Improper%20Access%20Controls%20in%20JeeWMS&amp;severity=medium&amp;id=683b4dca182aa0cae2ede215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5388-sql-injection-in-jeewms-ff26520d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5388%3A%20SQL%20Injection%20in%20JeeWMS&amp;severity=medium&amp;id=683b46cf182aa0cae2ece5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5387-improper-access-controls-in-jeewms-4c8da34a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5387%3A%20Improper%20Access%20Controls%20in%20JeeWMS&amp;severity=medium&amp;id=683b3fb0182aa0cae2ebe9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/beyond-http-interceptsuite-for-tcptls-traffic-inte-4c935c54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Beyond%20HTTP%3A%20InterceptSuite%20for%20TCP%2FTLS%20Traffic%20Interception%20in%20Windows&amp;severity=medium&amp;id=683b3c40182aa0cae2eb6b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/experimenting-with-usb-based-attacks-can-a-standar-42aad223</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Experimenting%20with%20USB-Based%20Attacks%3A%20Can%20a%20Standard%20USB%20Become%20a%20Bad%20USB%3F%20(Write-up)&amp;severity=medium&amp;id=683b3c40182aa0cae2eb6b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5386-sql-injection-in-jeewms-b7b957a8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5386%3A%20SQL%20Injection%20in%20JeeWMS&amp;severity=medium&amp;id=683b38a5182aa0cae2eaed31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5385-path-traversal-in-jeewms-7f381571</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5385%3A%20Path%20Traversal%20in%20JeeWMS&amp;severity=medium&amp;id=683b31a0182aa0cae2e9f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/case-study-real-world-wordpress-vulnerability-chai-537a8371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Case%20Study%3A%20Real-world%20WordPress%20Vulnerability%20Chain%20(Found%20During%20Passive%20Testing)&amp;severity=medium&amp;id=683b31a2182aa0cae2e9f0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5384-sql-injection-in-jeewms-94da2dd7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5384%3A%20SQL%20Injection%20in%20JeeWMS&amp;severity=medium&amp;id=683b2a9b182aa0cae2e8f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5383-cross-site-scripting-in-yifang-cms-214b27c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5383%3A%20Cross%20Site%20Scripting%20in%20Yifang%20CMS&amp;severity=medium&amp;id=683b1c85182aa0cae2e6fa90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-deploys-new-nodesnake-rat-in--628ff110</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20Ransomware%20Deploys%20New%20NodeSnake%20RAT%20in%20UK%20Attacks&amp;severity=medium&amp;id=683b1582182aa0cae2e5fe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5381-path-traversal-in-yifang-cms-301c16e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5381%3A%20Path%20Traversal%20in%20Yifang%20CMS&amp;severity=medium&amp;id=683b1598182aa0cae2e5fe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5380-path-traversal-in-ashinigit-xuesheng-cb2244fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5380%3A%20Path%20Traversal%20in%20ashinigit%20%E5%A4%A9%E9%9D%92%E4%B8%80%E7%99%BD%20XueShengZhuSu%20%E5%AD%A6%E7%94%9F%E4%BD%8F%E5%AE%BF%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=683b0e91182aa0cae2e5002c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5379-hard-coded-credentials-in-nucom-nc-w-785262d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5379%3A%20Hard-coded%20Credentials%20in%20NuCom%20NC-WR744G&amp;severity=medium&amp;id=683b076b182aa0cae2e401e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5378-cross-site-scripting-in-astun-techno-7f142b85</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5378%3A%20Cross%20Site%20Scripting%20in%20Astun%20Technology%20iShare%20Maps&amp;severity=medium&amp;id=683b03fd182aa0cae2e382a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5377-cross-site-scripting-in-astun-techno-8dc54a43</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5377%3A%20Cross%20Site%20Scripting%20in%20Astun%20Technology%20iShare%20Maps&amp;severity=medium&amp;id=683afcfc182aa0cae2e20c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5376-sql-injection-in-sourcecodester-heal-3144ff35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5376%3A%20SQL%20Injection%20in%20SourceCodester%20Health%20Center%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=683af5e1182aa0cae2e055b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4691-cwe-639-authorization-bypass-through-d339a0ad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4691%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20syntactics%20Free%20Booking%20Plugin%20for%20Hotels%2C%20Restaurants%20and%20Car%20Rentals%20%E2%80%93%20eaSYNC%20Booking&amp;severity=medium&amp;id=683af5e1182aa0cae2e055b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4857-cwe-22-improper-limitation-of-a-path-84afca11</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4857%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20contrid%20Newsletters&amp;severity=high&amp;id=683af5e1182aa0cae2e055b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-linux-flaws-allow-password-hash-theft-via-core-24309d42</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Linux%20Flaws%20Allow%20Password%20Hash%20Theft%20via%20Core%20Dumps%20in%20Ubuntu%2C%20RHEL%2C%20Fedora&amp;severity=medium&amp;id=683ae0c9182aa0cae2dce654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5375-sql-injection-in-phpgurukul-hpguruku-0724f6e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5375%3A%20SQL%20Injection%20in%20PHPGurukul%20HPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=683add41182aa0cae2dc680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wireless-pivots-how-trusted-networks-become-invisi-f4b53f60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wireless%20Pivots%3A%20How%20Trusted%20Networks%20Become%20Invisible%20Threat%20Vectors&amp;severity=medium&amp;id=683ad9cc182aa0cae2dbe9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5374-sql-injection-in-phpgurukul-online-b-d76a2f11</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5374%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=683ad652182aa0cae2db6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5373-sql-injection-in-phpgurukul-online-b-0dec92ee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5373%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=683ac129182aa0cae2d87357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5371-sql-injection-in-sourcecodester-heal-6847d3e7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5371%3A%20SQL%20Injection%20in%20SourceCodester%20Health%20Center%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=683aba2c182aa0cae2d7774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3813-cwe-79-improper-neutralization-of-in-50eb5dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=683ab30e182aa0cae2d67b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5290-cwe-79-improper-neutralization-of-in-373a861c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=683ab30e182aa0cae2d67b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4595-cwe-79-improper-neutralization-of-in-92cd32e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtewes%20FastSpring&amp;severity=medium&amp;id=683aa517182aa0cae2d47e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4631-cwe-285-improper-authorization-in-un-69c567db</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4631%3A%20CWE-285%20Improper%20Authorization%20in%20unitybusinesstechnology%20The%20E-Commerce%20ERP%3A%20Purchasing%2C%20Inventory%2C%20Fulfillment%2C%20Manufacturing%2C%20BOM%2C%20Accounting%2C%20Sales%20Analysis&amp;severity=critical&amp;id=683aa517182aa0cae2d47e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5285-cwe-79-improper-neutralization-of-in-93a8c9e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5285%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spiderwares%20Product%20Subtitle%20for%20WooCommerce&amp;severity=medium&amp;id=683aa517182aa0cae2d47e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5292-cwe-79-improper-neutralization-of-in-7c544388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20addons%20with%20Ready%20Templates%2C%20Blocks%2C%20Widgets%20and%20WooCommerce%20Builder&amp;severity=medium&amp;id=683aa517182aa0cae2d47e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4607-cwe-330-use-of-insufficiently-random-d00dc492</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4607%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20empoweringprowebsite%20PSW%20Front-end%20Login%20%26%20Registration&amp;severity=critical&amp;id=683aa517182aa0cae2d47e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4672-cwe-285-improper-authorization-in-of-6dbd109f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4672%3A%20CWE-285%20Improper%20Authorization%20in%20offsprout%20Offsprout%20Page%20Builder&amp;severity=high&amp;id=683aa517182aa0cae2d47e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4590-cwe-79-improper-neutralization-of-in-5448edc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daisycon%20Daisycon%20prijsvergelijkers&amp;severity=medium&amp;id=683aa517182aa0cae2d47e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4103-cwe-285-improper-authorization-in-lu-46aa1f20</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4103%3A%20CWE-285%20Improper%20Authorization%20in%20luminfire%20WP-GeoMeta&amp;severity=high&amp;id=683aa517182aa0cae2d47e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5370-sql-injection-in-phpgurukul-news-por-cc7d9a33</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5370%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=683a96f7182aa0cae2d28576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5369-sql-injection-in-sourcecodester-php--e8c30cec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5369%3A%20SQL%20Injection%20in%20SourceCodester%20PHP%20Display%20Username%20After%20Login&amp;severity=medium&amp;id=683a8feb182aa0cae2d188d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5368-sql-injection-in-phpgurukul-daily-ex-dd989d80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5368%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=683a81f2182aa0cae2cf8beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5016-cwe-79-improper-neutralization-of-in-d660ef45</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5016%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Relevanssi%20Relevanssi%20%E2%80%93%20A%20Better%20Search%20(Pro)&amp;severity=medium&amp;id=683a7ada182aa0cae2ce8ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5367-sql-injection-in-phpgurukul-online-s-15feac18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5367%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal%20Project&amp;severity=medium&amp;id=683a5ecb182aa0cae2ca9873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5365-sql-injection-in-campcodes-online-ho-13d7fe46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5365%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a50aa182aa0cae2c8a053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25111-cwe-277-insecure-inherited-permissi-712b516a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25111%3A%20CWE-277%20Insecure%20Inherited%20Permissions%20in%20django-helpdesk%20Project%20django-helpdesk&amp;severity=medium&amp;id=683a50aa182aa0cae2c8a051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5364-sql-injection-in-campcodes-online-ho-4611a2fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5364%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a267c182aa0cae2c28cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/azure-arc-c2aas-e59ea6da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Azure%20Arc%20-%20C2aaS&amp;severity=medium&amp;id=683a22f4182aa0cae2c20e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5363-sql-injection-in-campcodes-online-ho-71753b88</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5363%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a1f77182aa0cae2c19033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5362-sql-injection-in-campcodes-online-ho-43d1a907</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5362%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a1865182aa0cae2c0131b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-are-exploiting-critical-flaw-in-vbulletin--6d915791</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20are%20exploiting%20critical%20flaw%20in%20vBulletin%20forum%20software&amp;severity=critical&amp;id=683a1169182aa0cae2bf163e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5361-sql-injection-in-campcodes-online-ho-22ed28cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5361%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a1182182aa0cae2bf164b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48882-cwe-611-improper-restriction-of-xml-780311e3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48882%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20PHPOffice%20Math&amp;severity=high&amp;id=683a0def182aa0cae2be9814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48949-cwe-89-improper-neutralization-of-s-b5dcaa62</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48949%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20navidrome%20navidrome&amp;severity=high&amp;id=683a0a8d182aa0cae2be195f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5360-sql-injection-in-campcodes-online-ho-de68f486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5360%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=683a0a8d182aa0cae2be1965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48948-cwe-863-incorrect-authorization-in--5a8c4ff5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48948%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20navidrome%20navidrome&amp;severity=high&amp;id=683a0a8d182aa0cae2be196d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48946-cwe-327-use-of-a-broken-or-risky-cr-4447fbfd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48946%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20open-quantum-safe%20liboqs&amp;severity=low&amp;id=683a06f1182aa0cae2bd9a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2503-cwe-280-improper-handling-of-insuffi-1619b5df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2503%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Lenovo%20PC%20Manager&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2502-cwe-276-incorrect-default-permission-39a01477</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2502%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2501-cwe-426-untrusted-search-path-in-len-1bf3082c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2501%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Lenovo%20PC%20Manager&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1479-cwe-489-active-debug-code-in-lenovo--caf52495</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1479%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Lenovo%20Legion%20Space%20for%20Legion%20Go&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/germany-doxxes-conti-ransomware-and-trickbot-ring--fb69684d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Germany%20doxxes%20Conti%20ransomware%20and%20TrickBot%20ring%20leader&amp;severity=medium&amp;id=6839ffc9182aa0cae2bc9d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-takes-down-avcheck-site-used-by-cybercrimin-31da7014</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police%20takes%20down%20AVCheck%20site%20used%20by%20cybercriminals%20to%20scan%20malware&amp;severity=medium&amp;id=6839ffc9182aa0cae2bc9d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48883-cwe-79-improper-neutralization-of-i-3e6f9c23</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48883%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrome-php%20chrome&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48938-cwe-501-trust-boundary-violation-in-f4ffcdc3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48938%3A%20CWE-501%3A%20Trust%20Boundary%20Violation%20in%20cli%20go-gh&amp;severity=low&amp;id=6839ffe7182aa0cae2bc9d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48885-cwe-352-cross-site-request-forgery--e4f68140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48885%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xwikisas%20application-urlshortener&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48944-cwe-20-improper-input-validation-in-38395eb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48944%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48943-cwe-248-uncaught-exception-in-vllm--fea943b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48943%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48942-cwe-248-uncaught-exception-in-vllm--bda01e77</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48942%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5359-sql-injection-in-campcodes-online-ho-003659dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5359%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5358-sql-injection-in-phpgurukul-cyber-ca-d41dbbc6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5358%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=6839f561182aa0cae2bb2301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5054-cwe-362-concurrent-execution-using-s-e03908c7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5054%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Canonical%20Apport&amp;severity=medium&amp;id=6839ee3e182aa0cae2ba261f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48887-cwe-1333-inefficient-regular-expres-1a4b37f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48887%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=6839ee3e182aa0cae2ba261d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5357-buffer-overflow-in-freefloat-ftp-ser-35c92b73</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5357%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6839ee3e182aa0cae2ba2621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26226-cwe-416-use-after-free-in-yandex-br-8054b99f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26226%3A%20CWE-416%20Use%20After%20Free%20in%20Yandex%20Browser&amp;severity=high&amp;id=6839ee3e182aa0cae2ba2623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5356-buffer-overflow-in-freefloat-ftp-ser-00b4b7aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5356%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6839e03d182aa0cae2b82c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42191-cwe-427-uncontrolled-search-path-el-60c33ba2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42191%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HCL%20Software%20HCL%20Traveler%20for%20Microsoft%20Outlook%20(HTMO)&amp;severity=medium&amp;id=6839d93f182aa0cae2b7304c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42190-cwe-427-uncontrolled-search-path-el-a408600c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42190%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20HCL%20Software%20HCL%20Traveler%20for%20Microsoft%20Outlook%20(HTMO)&amp;severity=medium&amp;id=6839d5aa182aa0cae2b6b0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23589-cwe-328-use-of-weak-hash-in-hcl-sof-ec15007f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23589%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20HCL%20Software%20HCL%20Glovius%20Cloud&amp;severity=medium&amp;id=6839d221182aa0cae2b630f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13917-cwe-926-improper-export-of-android--9a6d9aa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13917%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Kruger%26Matz%20com.pri.applock&amp;severity=high&amp;id=6839ce93182aa0cae2b5b188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13916-cwe-497-exposure-of-sensitive-syste-54e04235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13916%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Kruger%26Matz%20com.pri.applock&amp;severity=medium&amp;id=6839ce93182aa0cae2b5b186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13915-cwe-926-improper-export-of-android--27648c91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13915%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Ulefone%20com.pri.factorytest&amp;severity=medium&amp;id=6839ce93182aa0cae2b5b184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7097-vulnerability-in-wso2-wso2-open-bank-c33b59f7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7097%3A%20Vulnerability%20in%20WSO2%20WSO2%20Open%20Banking%20AM&amp;severity=medium&amp;id=6839cb1d182aa0cae2b532ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7096-cwe-863-incorrect-authorization-in-w-6e2b9741</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7096%3A%20CWE-863%20Incorrect%20Authorization%20in%20WSO2%20WSO2%20Open%20Banking%20IAM&amp;severity=medium&amp;id=6839c7a1182aa0cae2b4b479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3611-cwe-863-incorrect-authorization-in-m-d059e91a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3611%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=6839c41d182aa0cae2b43552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3230-cwe-303-incorrect-implementation-of--117701f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3230%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=6839c41d182aa0cae2b43558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2571-cwe-303-incorrect-implementation-of--088afa6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2571%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=6839c41d182aa0cae2b43556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1792-cwe-863-incorrect-authorization-in-m-741e287a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1792%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=6839c41d182aa0cae2b43554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0602-cwe-79-improper-neutralization-of-in-d032e6af</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0602%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4983-cwe-79-improper-neutralization-of-in-cceacba0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20City%20Referential%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4984-cwe-79-improper-neutralization-of-in-634474e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20City%20Referential%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4985-cwe-79-improper-neutralization-of-in-ea4320da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Project%20Portfolio%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4986-cwe-79-improper-neutralization-of-in-c08c0eca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Product%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4988-cwe-79-improper-neutralization-of-in-33457036</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Multidisciplinary%20Optimization%20Engineer&amp;severity=high&amp;id=6839c097182aa0cae2b3b6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4989-cwe-79-improper-neutralization-of-in-c4bd2f42</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Product%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4990-cwe-79-improper-neutralization-of-in-cb75f5d7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Product%20Manager&amp;severity=high&amp;id=6839c097182aa0cae2b3b6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4991-cwe-79-improper-neutralization-of-in-9dc4acfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Collaborative%20Industry%20Innovator&amp;severity=high&amp;id=6839c097182aa0cae2b3b6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4992-cwe-79-improper-neutralization-of-in-a616a7a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4992%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Dassault%20Syst%C3%A8mes%20Service%20Process%20Engineer&amp;severity=high&amp;id=6839c097182aa0cae2b3b6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48331-cwe-201-insertion-of-sensitive-info-a984e92e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48331%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20vanquish%20WooCommerce%20Orders%20%26%20Customers%20Exporter&amp;severity=null&amp;id=6839bd14182aa0cae2b33819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actor-claims-tiktok-breach-puts-428-million-a79cbb0f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actor%20Claims%20TikTok%20Breach%2C%20Puts%20428%20Million%20Records%20Up%20for%20Sale&amp;severity=medium&amp;id=6839b281182aa0cae2b1bcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4598-signal-handler-race-condition-in-red-617f7a39</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4598%3A%20Signal%20Handler%20Race%20Condition&amp;severity=medium&amp;id=6839b29a182aa0cae2b1bcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2500-cwe-256-in-hitachi-energy-asset-suit-a4987bfc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2500%3A%20CWE-256%20in%20Hitachi%20Energy%20Asset%20Suite&amp;severity=critical&amp;id=6839a82d182aa0cae2af8892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1484-cwe-184-in-hitachi-energy-asset-suit-3b0cd901</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1484%3A%20CWE-184%20in%20Hitachi%20Energy%20Asset%20Suite&amp;severity=medium&amp;id=6839a82d182aa0cae2af8890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40909-cwe-362-concurrent-execution-using--3d86e44c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40909%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20perl%20perl&amp;severity=medium&amp;id=6839a82d182aa0cae2af8894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4433-cwe-284-improper-access-control-in-d-5b853df0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4433%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=high&amp;id=6839a468182aa0cae2aec752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5190-cwe-288-authentication-bypass-using--fadac962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5190%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20sorich87%20Browse%20As&amp;severity=high&amp;id=6839a468182aa0cae2aec754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4944-cwe-79-improper-neutralization-of-in-c796be23</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=6839a468182aa0cae2aec75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4597-cwe-862-missing-authorization-in-bc2-d24be6d1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4597%3A%20CWE-862%20Missing%20Authorization%20in%20bc2018%20Woo%20Slider%20Pro%20%E2%80%93%20Drag%20Drop%20Slider%20Builder%20For%20WooCommerce&amp;severity=medium&amp;id=6839a468182aa0cae2aec758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1763-cwe-79-improper-neutralization-of-in-860c820c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1763%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=6839a206182aa0cae2ae48fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-phishing-service-haozi-resurfaces-fueling--e2ec0cb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Phishing%20Service%20Haozi%20Resurfaces%2C%20Fueling%20Criminal%20Profits%20Even%20for%20Script%20Kiddies&amp;severity=medium&amp;id=68398bee182aa0cae2aad549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-ssrfs-in-azure-devops-part-2-3a894564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20SSRFs%20in%20Azure%20DevOps%20-%20Part%202&amp;severity=medium&amp;id=68398854182aa0cae2aa5704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-detailed-guide-to-stealth-syscall-and-edr-bypass-3898200e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20detailed%20guide%20to%20Stealth%20syscall%20and%20EDR%20Bypass&amp;severity=medium&amp;id=6839814c182aa0cae2a95289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-funnull-for-200m-romance-baiting-scam-4fa1fc9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%20Funnull%20for%20%24200M%20Romance%20Baiting%20Scams%20Tied%20to%20Crypto%20Fraud&amp;severity=medium&amp;id=6839813a182aa0cae2a9527c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-sanctions-cloud-provider-funnull-as-top-source--dcc4512e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=U.S.%20Sanctions%20Cloud%20Provider%20%E2%80%98Funnull%E2%80%99%20as%20Top%20Source%20of%20%E2%80%98Pig%20Butchering%E2%80%99%20Scams&amp;severity=medium&amp;id=68397dbd182aa0cae2a8d3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-hit-by-cyberattack-nation-state-actor--9544a1f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20Hit%20by%20Cyberattack%3B%20Nation-State%20Actor%20Suspected%20in%20Targeted%20Breach&amp;severity=medium&amp;id=68397dbd182aa0cae2a8d3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5235-cwe-79-improper-neutralization-of-in-222ba9b2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5235%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opensheetmusicdisplay%20OpenSheetMusicDisplay&amp;severity=medium&amp;id=68397e09182aa0cae2a8d42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5142-cwe-352-cross-site-request-forgery-c-5b6ef455</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pluginsandsnippets%20Simple%20Page%20Access%20Restriction&amp;severity=medium&amp;id=68397e09182aa0cae2a8d42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48334-cwe-862-missing-authorization-in-bi-6fe76022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48334%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Woo%20Slider%20Pro&amp;severity=null&amp;id=68397383182aa0cae2a75764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48912-cwe-89-improper-neutralization-of-s-e994426c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48912%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=68396faf182aa0cae2a6d7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4636-cwe-269-improper-privilege-managemen-5e7335c0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4636%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20JCT%20Airpointer&amp;severity=high&amp;id=68396faf182aa0cae2a6d800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4635-cwe-20-improper-input-validation-in--72fbf094</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4635%3A%20CWE-20%20Improper%20Input%20Validation%20in%20JCT%20Airpointer&amp;severity=medium&amp;id=68396c31182aa0cae2a65785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4634-cwe-552-files-or-directories-accessi-c59f269a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4634%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20JCT%20Airpointer&amp;severity=medium&amp;id=68396c31182aa0cae2a65783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4633-cwe-798-use-of-hard-coded-credential-6fdb16ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4633%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20JCT%20Airpointer&amp;severity=medium&amp;id=68396c31182aa0cae2a65781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5236-cwe-79-improper-neutralization-of-in-de4fee2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20NinjaTeam%20Chat%20for%20Telegram&amp;severity=medium&amp;id=68395e2e182aa0cae2a45844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4431-cwe-284-improper-access-control-in-k-9d5cf247</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4431%3A%20CWE-284%20Improper%20Access%20Control%20in%20krasenslavov%20Featured%20Image%20Plus%20%E2%80%93%20Quick%20%26%20Bulk%20Edit%20with%20Unsplash&amp;severity=medium&amp;id=68395e2e182aa0cae2a45842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4943-cwe-79-improper-neutralization-of-in-6e83867f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=6839571e182aa0cae2a35b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47697-client-side-enforcement-of-server-s-d0795ca0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47697%3A%20Client-side%20enforcement%20of%20server-side%20security%20in%20UCHIDA%20YOKO%20CO.%2C%20LTD.%20wivia%205&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41406-cross-site-scripting-xss-in-uchida--ab8c5304</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41406%3A%20Cross-site%20scripting%20(XSS)%20in%20UCHIDA%20YOKO%20CO.%2C%20LTD.%20wivia%205&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41385-improper-neutralization-of-special--274f4539</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41385%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20UCHIDA%20YOKO%20CO.%2C%20LTD.%20wivia%205&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48936-cwe-601-url-redirection-to-untruste-4085625a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48936%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20zitadel%20zitadel&amp;severity=high&amp;id=683953b3182aa0cae2a2dd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48488-cwe-79-improper-neutralization-of-i-4054bfd3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48488%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48880-cwe-362-concurrent-execution-using--919da431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48880%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48875-cwe-79-improper-neutralization-of-i-b68a6915</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683953b3182aa0cae2a2dd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48489-cwe-79-improper-neutralization-of-i-c4bd8bb3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48489%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48487-cwe-79-improper-neutralization-of-i-71da7429</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48487%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48486-cwe-79-improper-neutralization-of-i-b6b23fd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48486%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48485-cwe-79-improper-neutralization-of-i-06257bd9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48485%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68395033182aa0cae2a25ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48865-cwe-345-insufficient-verification-o-433caeef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48865%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20fabiolb%20fabio&amp;severity=critical&amp;id=68395033182aa0cae2a25eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48492-cwe-77-improper-neutralization-of-s-4a3a266a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48492%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20GetSimpleCMS-CE%20GetSimpleCMS-CE&amp;severity=high&amp;id=68395033182aa0cae2a25eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48889-cwe-434-unrestricted-upload-of-file-3f726810</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48889%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=68394cb3182aa0cae2a1e0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4429-cwe-79-cross-site-scripting-xss-in-u-f93d22f1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4429%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Gearside%20Developer%20Dashboard&amp;severity=medium&amp;id=68394cb3182aa0cae2a1e0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41235-vulnerability-in-vmware-spring-clou-6e2814ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41235%3A%20Vulnerability%20in%20VMware%20Spring%20cloud%20Gateway&amp;severity=high&amp;id=68394cb3182aa0cae2a1e0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48490-cwe-20-improper-input-validation-in-01083054</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48490%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Lomkit%20laravel-rest-api&amp;severity=medium&amp;id=6839459a182aa0cae2a0e215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4659-cwe-200-exposure-of-sensitive-inform-dc82eb38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4659%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20crmperks%20Integration%20for%20Salesforce%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%2C%20Ninja%20Forms&amp;severity=medium&amp;id=6839459a182aa0cae2a0e219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5259-cwe-79-improper-neutralization-of-in-2b3a21fa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gonzomir%20Minimal%20Share%20Buttons&amp;severity=medium&amp;id=6839459a182aa0cae2a0e21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48881-cwe-863-incorrect-authorization-in--2160b61e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48881%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20valtimo-platform%20valtimo-backend-libraries&amp;severity=high&amp;id=6839459a182aa0cae2a0e217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48484-cwe-79-improper-neutralization-of-i-479c6111</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48484%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68393ecb182aa0cae29f615a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48483-cwe-79-improper-neutralization-of-i-2a016f8b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48483%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68393ecb182aa0cae29f6158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48482-cwe-841-improper-enforcement-of-beh-7608a250</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48482%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683937b2182aa0cae29e5f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48481-cwe-841-improper-enforcement-of-beh-68cd139f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48481%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683937b2182aa0cae29e5f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48480-cwe-841-improper-enforcement-of-beh-723df32a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48480%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48479-cwe-841-improper-enforcement-of-beh-43a4f006</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48479%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48478-cwe-841-improper-enforcement-of-beh-71c3b2af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48478%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48477-cwe-841-improper-enforcement-of-beh-c9aa6fa4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48477%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48476-cwe-841-improper-enforcement-of-beh-75855ce9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48476%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683937b2182aa0cae29e5f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48491-cwe-798-use-of-hard-coded-credentia-6ffa08b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48491%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20aryan6673%20project-ai&amp;severity=low&amp;id=68392cfa182aa0cae29ce4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48381-cwe-201-insertion-of-sensitive-info-a8ac7ac7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48381%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=68392cfa182aa0cae29ce4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48068-cwe-1385-missing-origin-validation--c30e50c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48068%3A%20CWE-1385%3A%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20vercel%20next.js&amp;severity=low&amp;id=68392cfa182aa0cae29ce4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47952-cwe-22-improper-limitation-of-a-pat-8a08fc9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47952%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20traefik%20traefik&amp;severity=low&amp;id=68392967182aa0cae29c6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12224-cwe-1289-in-servo-rust-url-073d32a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12224%3A%20CWE-1289%20in%20servo%20rust-url&amp;severity=medium&amp;id=683910e3182aa0cae298edcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36846-cwe-1395-dependency-on-vulnerable-t-9807f96d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36846%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20TIMLEGGE%20IO%3A%3ACompress%3A%3ABrotli&amp;severity=critical&amp;id=6839066b182aa0cae2977368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-lummac2-infrastructure-with-cats-c063cf94</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20LummaC2%20Infrastructure%20with%20Cats&amp;severity=medium&amp;id=68396fa3182aa0cae2a6d760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44906-na-in-na-5dd27b7f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44906%3A%20n%2Fa&amp;severity=high&amp;id=683925f1182aa0cae29be886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44905-na-in-na-801753aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44905%3A%20n%2Fa&amp;severity=high&amp;id=683925f1182aa0cae29be884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44904-na-in-na-8627adbf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44904%3A%20n%2Fa&amp;severity=high&amp;id=683925f1182aa0cae29be882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48757-cwe-863-incorrect-authorization-in--436e0ca2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48757%3A%20CWE-863%20Incorrect%20Authorization%20in%20Lovable%20Lovable&amp;severity=critical&amp;id=683917fc182aa0cae299e9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44619-na-in-na-8b68259f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44619%3A%20n%2Fa&amp;severity=critical&amp;id=683917fc182aa0cae299e9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44614-na-in-na-78c87af4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44614%3A%20n%2Fa&amp;severity=high&amp;id=683917fc182aa0cae299e9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44612-na-in-na-779d37bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44612%3A%20n%2Fa&amp;severity=medium&amp;id=683917fc182aa0cae299e9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/introducing-xattacker-v50-pro-automated-web-exploi-bc9e6568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%F0%9F%9A%80%20Introducing%20XAttacker%20V50%20Pro%20%E2%80%93%20Automated%20Web%20Exploitation%20Tool%20for%20Penetration%20Testers&amp;severity=low&amp;id=6838f154182aa0cae293f9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46352-cwe-798-in-consilium-safety-cs5000--6e733d9c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46352%3A%20CWE-798%20in%20Consilium%20Safety%20CS5000%20Fire%20Panel&amp;severity=critical&amp;id=6838edb3182aa0cae2937bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41438-cwe-1188-in-consilium-safety-cs5000-82234352</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41438%3A%20CWE-1188%20in%20Consilium%20Safety%20CS5000%20Fire%20Panel&amp;severity=critical&amp;id=6838edb3182aa0cae2937bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1907-cwe-306-missing-authentication-for-c-20516d0f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1907%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Instantel%20Micromate&amp;severity=critical&amp;id=6838edb3182aa0cae2937bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5332-sql-injection-in-1000-projects-onlin-8c1777c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5332%3A%20SQL%20Injection%20in%201000%20Projects%20Online%20Notice%20Board&amp;severity=medium&amp;id=6838e31c182aa0cae2920088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5307-cwe-125-out-of-bounds-read-in-santes-c0f7bfb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5307%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Santesoft%20Sante%20DICOM%20Viewer%20Pro&amp;severity=high&amp;id=6838dc05182aa0cae29102fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5331-buffer-overflow-in-pcman-ftp-server-48498777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5331%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=6838dc05182aa0cae29102fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30466-a-website-may-be-able-to-bypass-sam-63c283b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30466%3A%20A%20website%20may%20be%20able%20to%20bypass%20Same%20Origin%20Policy%20in%20Apple%20Safari&amp;severity=critical&amp;id=6838d4ef182aa0cae2900517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31261-an-app-may-be-able-to-access-protec-52972c51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31261%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae2900521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31231-an-app-may-be-able-to-read-sensitiv-b60aacb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31231%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae290051f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31199-an-app-may-be-able-to-access-sensit-00df6d78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31199%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6838d4ef182aa0cae290051d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31264-an-attacker-with-physical-access-to-1791e516</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31264%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae2900525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31198-a-path-handling-issue-was-addressed-f3cbe692</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31198%3A%20A%20path%20handling%20issue%20was%20addressed%20with%20improved%20validation%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838d4ef182aa0cae290051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31189-an-app-may-be-able-to-break-out-of--b168bee6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31189%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=6838d4ef182aa0cae2900519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31263-an-app-may-be-able-to-corrupt-copro-a825d89f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31263%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=6838d4ef182aa0cae2900523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5330-buffer-overflow-in-freefloat-ftp-ser-3e68e3c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5330%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6838d4ef182aa0cae2900527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5328-path-traversal-in-chshcms-mccms-f8f0d288</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5328%3A%20Path%20Traversal%20in%20chshcms%20mccms&amp;severity=medium&amp;id=6838ce1b182aa0cae28f06cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5327-server-side-request-forgery-in-chshc-dbe5a10f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5327%3A%20Server-Side%20Request%20Forgery%20in%20chshcms%20mccms&amp;severity=medium&amp;id=6838c719182aa0cae28d8814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5326-deserialization-in-zhilink-adp-appli-c0cdb559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5326%3A%20Deserialization%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=6838c00b182aa0cae28c8a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4967-cwe-918-server-side-request-forgery--c1d48849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4967%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)SSRF%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=6838c00b182aa0cae28c8a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5325-improper-neutralization-of-special-e-042cab2f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5325%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20zhilink%20%E6%99%BA%E4%BA%92%E8%81%94(%E6%B7%B1%E5%9C%B3)%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20ADP%20Application%20Developer%20Platform%20%E5%BA%94%E7%94%A8%E5%BC%80%E5%8F%91%E8%80%85%E5%B9%B3%E5%8F%B0&amp;severity=medium&amp;id=6838b90d182aa0cae28b8c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47933-cwe-79-improper-neutralization-of-i-f7a52242</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47933%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-cd&amp;severity=critical&amp;id=6838b90d182aa0cae28b8c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47288-cwe-200-exposure-of-sensitive-infor-52ff3258</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47288%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse-policy&amp;severity=low&amp;id=6838b59f182aa0cae28b0cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chasing-eddies-new-rust-based-infostealer-used-in--8307134a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chasing%20Eddies%3A%20New%20Rust-based%20InfoStealer%20used%20in%20CAPTCHA%20campaigns&amp;severity=medium&amp;id=6838b591182aa0cae28b0cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49350-cwe-121-stack-based-buffer-overflow-24508402</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49350%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6838b59f182aa0cae28b0cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2518-cwe-789-uncontrolled-memory-allocati-998dd24f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2518%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6838b59f182aa0cae28b0d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3050-cwe-770-allocation-of-resources-with-acb505ff</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3050%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6838b59f182aa0cae28b0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46701-cwe-178-improper-handling-of-case-s-856d000a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46701%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=6838b200182aa0cae28a8c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48336-cwe-502-deserialization-of-untruste-662f738a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48336%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThimPress%20Course%20Builder&amp;severity=null&amp;id=6838aece182aa0cae28a0d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32752-cwe-312-cleartext-storage-of-sensit-c9fd219f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32752%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Dell%20ThinOS&amp;severity=medium&amp;id=6838aece182aa0cae28a0d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-target-ai-users-with-malware-loaded-0c459324</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20Target%20AI%20Users%20with%20Malware-Loaded%20Installers%20Posing%20as%20Popular%20Tools&amp;severity=medium&amp;id=6838aea5182aa0cae28a0ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apple-safari-exposes-users-to-fullscreen-browser-i-b0e06360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apple%20Safari%20exposes%20users%20to%20fullscreen%20browser-in-the-middle%20attacks&amp;severity=medium&amp;id=6838aea5182aa0cae28a0ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-abuse-google-apps-script-in-evasive--a2254fe7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20actors%20abuse%20Google%20Apps%20Script%20in%20evasive%20phishing%20attacks&amp;severity=medium&amp;id=6838aea5182aa0cae28a0ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5324-memory-leak-in-techpowerup-gpu-z-93e2ff26</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5324%3A%20Memory%20Leak%20in%20TechPowerUp%20GPU-Z&amp;severity=medium&amp;id=6838ab0d182aa0cae2898e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5323-reliance-on-obfuscation-or-encryptio-bf9fab79</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5323%3A%20Reliance%20on%20Obfuscation%20or%20Encryption%20of%20Security-Relevant%20Inputs%20without%20Integrity%20Checking%20in%20fossasia%20open-event-server&amp;severity=medium&amp;id=6838a40f182aa0cae2888dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46823-cwe-862-missing-authorization-in-op-f345dd9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46823%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openmrs%20openmrs-module-fhir2&amp;severity=high&amp;id=6838ab0d182aa0cae2898e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46722-cwe-1288-improper-validation-of-con-f253e4ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46722%3A%20CWE-1288%3A%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=68389281182aa0cae2860f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46570-cwe-208-observable-timing-discrepan-ae00ed07</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46570%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20vllm-project%20vllm&amp;severity=low&amp;id=68388f0b182aa0cae285909c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-chatgpt-and-invideo-ai-downloads-deliver-rans-e8902e4e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20ChatGPT%20and%20InVideo%20AI%20Downloads%20Deliver%20Ransomware%2C%20warns%20Cisco%20Talos&amp;severity=medium&amp;id=68388efb182aa0cae285908b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48475-cwe-863-incorrect-authorization-in--6660d28b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48475%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68388f0b182aa0cae285909e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phaas-the-secrets-the-hidden-ties-between-tycoon2f-d1555f07</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PhaaS%20the%20Secrets%3A%20The%20Hidden%20Ties%20Between%20Tycoon2FA%20and%20Dadsec&apos;s%20Operations&amp;severity=medium&amp;id=6838b591182aa0cae28b0cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-analysis-reveals-sophisticated-rat-with-co-1aeb74c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Analysis%20Reveals%20Sophisticated%20RAT%20With%20Corrupted%20Headers&amp;severity=medium&amp;id=6838b1f1182aa0cae28a8c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48474-cwe-863-incorrect-authorization-in--7d77def4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48474%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=6838cb41182aa0cae28e884f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48473-cwe-863-incorrect-authorization-in--9ecf59aa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48473%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=683880c6182aa0cae2839697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48472-cwe-863-incorrect-authorization-in--f46698a4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48472%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20freescout-help-desk%20freescout&amp;severity=medium&amp;id=68387d4e182aa0cae2831691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48471-cwe-434-unrestricted-upload-of-file-904b8905</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48471%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68387d4e182aa0cae283168f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48390-cwe-94-improper-control-of-generati-dbda6ff0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48390%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68387d4e182aa0cae283168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48389-cwe-502-deserialization-of-untruste-940f43d5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48389%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=68387d4e182aa0cae283168b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3913-cwe-863-incorrect-authorization-in-m-7dd3a159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3913%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=68387d4e182aa0cae2831687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercriminals-camouflaging-threats-as-ai-tool-ins-5c94f556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cybercriminals%20camouflaging%20threats%20as%20AI%20tool%20installers&amp;severity=medium&amp;id=68387d2b182aa0cae28315f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5321-sandbox-issue-in-aimhubio-aim-0fa21e8d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5321%3A%20Sandbox%20Issue%20in%20aimhubio%20aim&amp;severity=medium&amp;id=683879c7182aa0cae2829645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5334-cwe-359-exposure-of-private-personal-861643e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5334%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=high&amp;id=68387633182aa0cae28217b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dragonforce-exploits-simplehelp-flaws-to-deploy-ra-a8814b4b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DragonForce%20Exploits%20SimpleHelp%20Flaws%20to%20Deploy%20Ransomware%20Across%20Customer%20Endpoints&amp;severity=medium&amp;id=68386f39182aa0cae2811a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/victorias-secret-takes-down-website-after-security-f7d52693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Victoria%E2%80%99s%20Secret%20takes%20down%20website%20after%20security%20incident&amp;severity=medium&amp;id=68386f39182aa0cae2811a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4081-cwe-276-incorrect-default-permission-58d68bd7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4081%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Blackmagic%20Design%20DaVinci%20Resolve&amp;severity=medium&amp;id=68386f5b182aa0cae2811a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33043-cwe-20-improper-input-validation-in-3614fea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33043%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMI%20AptioV&amp;severity=medium&amp;id=68386ba5182aa0cae2809bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5320-origin-validation-error-in-gradio-ap-af7cd7df</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5320%3A%20Origin%20Validation%20Error%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=683864b2182aa0cae27f9cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37999-vulnerability-in-linux-linux-160a22c9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37998-vulnerability-in-linux-linux-e557be0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37997-vulnerability-in-linux-linux-f4566ec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37996-vulnerability-in-linux-linux-fba7a31e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37995-vulnerability-in-linux-linux-92a9dd65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37994-vulnerability-in-linux-linux-e19a9d89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=68386122182aa0cae27f1d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37993-vulnerability-in-linux-linux-41277f13</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=68386122182aa0cae27f1d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-malware-spotted-corrupts-its-own-headers-to-bl-537a7a79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Malware%20Spotted%20Corrupts%20Its%20Own%20Headers%20to%20Block%20Analysis&amp;severity=medium&amp;id=68385dbc182aa0cae27e6175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48047-cwe-78-improper-neutralization-of-s-93f6da9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48047%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MICI%20Network%20Co.%20Ltd.%20NetFax%20Server&amp;severity=critical&amp;id=68385a2e182aa0cae27da588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48046-cwe-260-password-in-configuration-f-843c5b15</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48046%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20MICI%20Network%20Co.%20Ltd.%20NetFax%20Server&amp;severity=medium&amp;id=68385a2e182aa0cae27da586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48045-cwe-201-insertion-of-sensitive-info-0db907d5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48045%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20MICI%20Network%20Co.%20Ltd.%20NetFax%20Server&amp;severity=high&amp;id=68385671182aa0cae27ce98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/deguard-turning-a-t480-into-a-coreboot-laptop-10-m-67798617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Deguard%3A%20turning%20a%20T480%20into%20a%20coreboot%20laptop%20(10-min%20talk%20%2B%20live%20demo)&amp;severity=low&amp;id=683836fc182aa0cae277b995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistan-arrests-21-in-heartsender-malware-service-9e2cad5a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan%20Arrests%2021%20in%20%E2%80%98Heartsender%E2%80%99%20Malware%20Service&amp;severity=medium&amp;id=68382ff1182aa0cae276b89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-gang-deploys-new-nodesnake-ra-23828b07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20gang%20deploys%20new%20NodeSnake%20RAT%20on%20universities&amp;severity=medium&amp;id=68382ff1182aa0cae276b89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-apt41-exploits-google-calendar-for-malware-e21e2deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20APT41%20Exploits%20Google%20Calendar%20for%20Malware%20Command-and-Control%20Operations&amp;severity=medium&amp;id=68382ff1182aa0cae276b8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ayysshush-botnet-compromised-over-9000-asus-ro-ddc13401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20AyySSHush%20botnet%20compromised%20over%209%2C000%20ASUS%20routers%2C%20adding%20a%20persistent%20SSH%20backdoor.&amp;severity=medium&amp;id=68382ff1182aa0cae276b8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-broker-lexisnexis-discloses-data-breach-affec-6b8c2e10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data%20broker%20LexisNexis%20discloses%20data%20breach%20affecting%20364%2C000%20people&amp;severity=medium&amp;id=68382ff1182aa0cae276b8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48388-cwe-134-use-of-externally-controlle-6a695c95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48388%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20freescout-help-desk%20freescout&amp;severity=high&amp;id=683828ea182aa0cae275bc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27151-cwe-20-improper-input-validation-in-a1cb5bd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27151%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20redis%20redis&amp;severity=medium&amp;id=6838254f182aa0cae2753d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52588-cwe-918-server-side-request-forgery-bab174d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52588%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20strapi%20strapi&amp;severity=medium&amp;id=6838254f182aa0cae2753d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4687-vulnerability-in-teltonika-networks--77ababf4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4687%3A%20Vulnerability%20in%20Teltonika%20Networks%20RMS&amp;severity=high&amp;id=6838254f182aa0cae2753d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5286-cwe-79-improper-neutralization-of-in-da87cb35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5286%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=68381aae182aa0cae273c2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4670-cwe-79-improper-neutralization-of-in-3d71cc83</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=68381aae182aa0cae273c2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5122-cwe-79-improper-neutralization-of-in-5c00d596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goiblas%20Map%20Block%20Leaflet&amp;severity=medium&amp;id=68381aae182aa0cae273c2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5276-server-side-request-forgery-ssrf-in--1fc9c358</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5276%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mcp-markdownify-server&amp;severity=high&amp;id=6837ecfc182aa0cae26d541e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5273-files-or-directories-accessible-to-e-f2b1f50d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5273%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20mcp-markdownify-server&amp;severity=high&amp;id=6837ecfc182aa0cae26d541c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3755-cwe-1285-improper-validation-of-spec-2b301dd0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3755%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5U-32MT%2FES&amp;severity=critical&amp;id=6837e96e182aa0cae26cd081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4583-cwe-79-improper-neutralization-of-in-32f6637f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Smash%20Balloon%20Social%20Photo%20Feed%20%E2%80%93%20Easy%20Social%20Feeds%20Plugin&amp;severity=medium&amp;id=6837e2a2182aa0cae26bcd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-a-venomrat-malware-campaign-216d30d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20a%20VenomRAT%20Malware%20Campaign&amp;severity=medium&amp;id=6838058f182aa0cae270c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-digits-plugin-8461-authentication-bypass-a1741efd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Digits%20Plugin%208.4.6.1%20-%20Authentication%20Bypass%20via%20OTP%20Bruteforcing&amp;severity=medium&amp;id=68489d917e6d765d51d52a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fortra-goanywhere-mft-741-authentication-bypass-0cbcd619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fortra%20GoAnywhere%20MFT%207.4.1%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68489d8b7e6d765d51d52927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/automic-agent-2430-hf4-privilege-escalation-ec31d0a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Automic%20Agent%2024.3.0%20HF4%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489d847e6d765d51d52748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-file-explorer-windows-11-23h2-ntlm-hash-di-c460fc17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%20File%20Explorer%20Windows%2011%20(23H2)%20-%20NTLM%20Hash%20Disclosure&amp;severity=medium&amp;id=68489d7e7e6d765d51d525a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/solarwinds-serv-u-1542-hf1-directory-traversal-37899b25</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SolarWinds%20Serv-U%2015.4.2%20HF1%20-%20Directory%20Traversal&amp;severity=medium&amp;id=68489d787e6d765d51d523ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/campcodes-online-hospital-management-system-10-sql-83147fa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Campcodes%20Online%20Hospital%20Management%20System%201.0%20-%20SQL%20Injection&amp;severity=medium&amp;id=68489d727e6d765d51d5225b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54952-na-in-na-725310d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6838bc8c182aa0cae28c0b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53423-na-in-na-06b73a41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53423%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6838ab0d182aa0cae2898e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41591-na-in-na-ac68eae7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41591%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6838a78c182aa0cae2890f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29632-na-in-na-c35a83db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29632%3A%20n%2Fa&amp;severity=medium&amp;id=6838998d182aa0cae2870d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51392-na-in-na-1dd249e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51392%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68389616182aa0cae2868e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45474-na-in-na-fc7a1797</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45474%3A%20n%2Fa&amp;severity=high&amp;id=68387d4e182aa0cae2831689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48748-na-in-na-5dd9b741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48748%3A%20n%2Fa&amp;severity=critical&amp;id=683879c7182aa0cae2829643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22654-na-in-na-2e5a32dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22654%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68386f5b182aa0cae2811a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22653-na-in-na-4b9bd3de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22653%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68386f5b182aa0cae2811a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46078-na-in-na-3e6607e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46078%3A%20n%2Fa&amp;severity=medium&amp;id=68386826182aa0cae2801b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46080-na-in-na-9fbb1221</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46080%3A%20n%2Fa&amp;severity=medium&amp;id=68386826182aa0cae2801b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/onedrive-file-picker-flaw-gives-apps-full-access-t-3879bf74</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OneDrive%20File%20Picker%20Flaw%20Gives%20Apps%20Full%20Access%20to%20User%20Drives%20-%20Millions%20At%20Risk&amp;severity=medium&amp;id=683791c6182aa0cae2605ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27706-vulnerability-in-absolute-security--cdc9f7ad</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27706%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68377c97182aa0cae25d64fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27703-vulnerability-in-absolute-security--debf4e4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27703%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=high&amp;id=68377c97182aa0cae25d64fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27702-vulnerability-in-absolute-security--817a8b67</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27702%3A%20Vulnerability%20in%20Absolute%20Security%20Secure%20Access&amp;severity=medium&amp;id=68377906182aa0cae25ce3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-entra-design-lets-guest-users-gain-azure-0adaecab</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Entra%20Design%20Lets%20Guest%20Users%20Gain%20Azure%20Control%2C%20Researchers%20Say&amp;severity=medium&amp;id=68377590182aa0cae25c658a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mark-your-calendar-apt41-innovative-tactics-1c7317be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mark%20Your%20Calendar%3A%20APT41%20Innovative%20Tactics&amp;severity=medium&amp;id=68377588182aa0cae25c657b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evolution-of-zanubis-a-banking-trojan-for-android-869295a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evolution%20of%20Zanubis%2C%20a%20banking%20Trojan%20for%20Android&amp;severity=medium&amp;id=683771fd182aa0cae25be6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vietnam-nexus-hackers-distribute-malware-via-fake--62128500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vietnam-Nexus%20Hackers%20Distribute%20Malware%20Via%20Fake%20AI%20Video%20Generators&amp;severity=medium&amp;id=68377588182aa0cae25c6578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-bitdefender-site-spreads-trio-of-malware-tool-d87fc42c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Bitdefender%20Site%20Spreads%20Trio%20of%20Malware%20Tools&amp;severity=medium&amp;id=68377588182aa0cae25c6571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-post-you-couldnt-scan-for-is-back-b76e693a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20post%20you%20couldn%E2%80%99t%20scan%20for%20is%20back.&amp;severity=medium&amp;id=68374eda182aa0cae256f64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pakistan-telecommunication-company-ptcl-targeted-b-3861ecdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pakistan%20Telecommunication%20Company%20(PTCL)%20Targeted%20by%20Bitter%20APT%20During%20Heightened%20Regional%20Conflict&amp;severity=medium&amp;id=6837759f182aa0cae25c659a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5256-cwe-601-url-redirection-to-untrusted-e72e8c9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5256%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68374ee1182aa0cae256f67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47055-cwe-862-missing-authorization-in-ma-3aa759e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47055%3A%20CWE-862%20Missing%20Authorization%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68374b89182aa0cae2567814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-ai-video-tool-ads-on-facebook-and-linkedin-sp-bceaa11b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20AI%20Video%20Tool%20Ads%20on%20Facebook%20and%20LinkedIn%20Spread%20Infostealers&amp;severity=medium&amp;id=68374b6e182aa0cae25677cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1461-cwe-79-improper-neutralization-of-in-1f430bc2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vuetify&amp;severity=medium&amp;id=68374b89182aa0cae2567843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47057-cwe-203-observable-discrepancy-in-m-dfa95962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47057%3A%20CWE-203%20Observable%20Discrepancy%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68374b89182aa0cae2567816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32803-cwe-276-incorrect-default-permissio-cfb73a38</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32803%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ISC%20Kea&amp;severity=medium&amp;id=683747bb182aa0cae255f97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32802-cwe-73-external-control-of-file-nam-ba8fee6a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32802%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ISC%20Kea&amp;severity=medium&amp;id=6837447f182aa0cae2557b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32801-cwe-94-improper-control-of-generati-6e1a2dfd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32801%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ISC%20Kea&amp;severity=high&amp;id=6837447f182aa0cae2557b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/from-infection-to-access-a-24-hour-timeline-of-a-m-983c19d2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=From%20Infection%20to%20Access%3A%20A%2024-Hour%20Timeline%20of%20a%20Modern%20Stealer%20Campaign&amp;severity=medium&amp;id=68374430182aa0cae2557af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-onedrive-file-picker-flaw-grants-apps-fu-07fda1b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20OneDrive%20File%20Picker%20Flaw%20Grants%20Apps%20Full%20Cloud%20Access%20%E2%80%94%20Even%20When%20Uploading%20Just%20One%20File&amp;severity=medium&amp;id=68374430182aa0cae2557af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-pumabot-targets-linux-iot-surveillance-devices-62eebae4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20PumaBot%20targets%20Linux%20IoT%20surveillance%20devices&amp;severity=medium&amp;id=68374430182aa0cae2557afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/czechia-blames-china-for-ministry-of-foreign-affai-32e4928b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Czechia%20blames%20China%20for%20Ministry%20of%20Foreign%20Affairs%20cyberattack&amp;severity=medium&amp;id=68374430182aa0cae2557afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47056-cwe-312-cleartext-storage-of-sensit-3a82edd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47056%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68373d46182aa0cae2547e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5257-cwe-1284-improper-validation-of-spec-99498c8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5257%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mautic%20Mautic&amp;severity=medium&amp;id=68373d46182aa0cae2547e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36572-cwe-798-use-of-hard-coded-credentia-b4c5581d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36572%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Dell%20PowerStore&amp;severity=medium&amp;id=683739c3182aa0cae253ffb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-hidden-in-ai-models-on-pypi-targets-alibab-49478f94</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Hidden%20in%20AI%20Models%20on%20PyPI%20Targets%20Alibaba%20AI%20Labs%20Users&amp;severity=medium&amp;id=683732c2182aa0cae25301b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51453-cwe-22-improper-limitation-of-a-pat-d97fff31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51453%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Sterling%20Secure%20Proxy&amp;severity=medium&amp;id=68372bbe182aa0cae252024e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38341-cwe-328-use-of-weak-hash-in-ibm-ste-7a174b21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38341%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20IBM%20Sterling%20Secure%20Proxy&amp;severity=medium&amp;id=68372bbe182aa0cae252024c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3357-cwe-1285-improper-validation-of-spec-23850123</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3357%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20IBM%20Tivoli%20Monitoring&amp;severity=critical&amp;id=68372487182aa0cae2510592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4134-cwe-552-files-or-directories-accessi-f99b7514</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4134%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Avast%20Avast%20Business%20Antivirus&amp;severity=high&amp;id=68371692182aa0cae24f0c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48734-cwe-284-improper-access-control-in--c9bc92cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48734%3A%20CWE-284%20Improper%20Access%20Control%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20BeanUtils%201.x&amp;severity=high&amp;id=68371302182aa0cae24e8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40651-cwe-79-improper-neutralization-of-i-c80574b8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40651%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Real%20Easy%20Store%20Real%20Easy%20Store&amp;severity=medium&amp;id=68371302182aa0cae24e8dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5277-os-command-injection-in-alexei-led-a-5410f5a8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5277%3A%20OS%20Command%20Injection%20in%20alexei-led%20aws-mcp-server&amp;severity=critical&amp;id=68370f8b182aa0cae24e0c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4493-cwe-266-incorrect-privilege-assignme-bb2c666b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4493%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Devolutions%20Server&amp;severity=medium&amp;id=683704ed182aa0cae249feee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5299-unrestricted-upload-in-sourcecodeste-7a176e88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5299%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=6837017a182aa0cae247946b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5298-sql-injection-in-campcodes-online-ho-8731c6ab</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5298%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6837017a182aa0cae247946f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5297-stack-based-buffer-overflow-in-sourc-1a27b5c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5297%3A%20Stack-based%20Buffer%20Overflow%20in%20SourceCodester%20Computer%20Store%20System&amp;severity=medium&amp;id=6837017a182aa0cae247946d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3864-cwe-772-missing-release-of-resource--4dab682a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3864%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20hackney%20hackney&amp;severity=low&amp;id=6837017a182aa0cae2479471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5295-buffer-overflow-in-freefloat-ftp-ser-79d84868</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5295%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6836fef4182aa0cae247165a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40673-cwe-862-missing-authorization-in-di-76e16346</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40673%3A%20CWE-862%20Missing%20Authorization%20in%20DinoRANK%20DinoRANK&amp;severity=medium&amp;id=6836fef4182aa0cae247165f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1753-cwe-78-improper-neutralization-of-sp-19dcb33e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1753%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=6836dadc182aa0cae240f29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4963-cwe-79-improper-neutralization-of-in-d087bbaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=6836d743182aa0cae2406da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-code-execution-on-evertz-sdvn-cve-2025-4009-99d7cc88</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Code%20Execution%20on%20Evertz%20SDVN%20(CVE-2025-4009%20-%20Full%20Disclosure)&amp;severity=medium&amp;id=6836d3d2182aa0cae23fef73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5287-cwe-89-improper-neutralization-of-sp-2e2576ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5287%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20erumfaham%20Likes%20and%20Dislikes%20Plugin&amp;severity=high&amp;id=6836c933182aa0cae23e68ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27528-cwe-502-deserialization-of-untruste-8e3b8e91</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27528%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=critical&amp;id=6836c5ad182aa0cae23deab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27526-cwe-502-deserialization-of-untruste-add4e099</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27526%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=medium&amp;id=6836c5ad182aa0cae23deab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27522-cwe-502-deserialization-of-untruste-b24bf3ed</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27522%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=medium&amp;id=6836c5ad182aa0cae23deab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46777-information-disclosure-in-fortinet--857f8afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46777%3A%20Information%20disclosure%20in%20Fortinet%20FortiPortal&amp;severity=low&amp;id=6836c5ad182aa0cae23deabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24473-information-disclosure-in-fortinet--a7a38fd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24473%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientWindows&amp;severity=medium&amp;id=6836c5ad182aa0cae23deabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22252-escalation-of-privilege-in-fortinet-bbaab393</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22252%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=critical&amp;id=6836c5ad182aa0cae23deab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47294-denial-of-service-in-fortinet-forti-5a8815c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47294%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=6836c5ad182aa0cae23deabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54020-improper-access-control-in-fortinet-40f3317e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54020%3A%20Improper%20access%20control%20in%20Fortinet%20FortiManager&amp;severity=low&amp;id=6836c26c182aa0cae23d6c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47295-denial-of-service-in-fortinet-forti-b2280063</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47295%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=6836c26c182aa0cae23d6c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25251-escalation-of-privilege-in-fortinet-ecd506da</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25251%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientMac&amp;severity=high&amp;id=6836c26c182aa0cae23d6c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5082-cwe-79-improper-neutralization-of-in-5409029c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20WP%20Attachments&amp;severity=medium&amp;id=6836be9b182aa0cae23cee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5025-cwe-295-improper-certificate-validat-7bfd125c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5025%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20curl%20curl&amp;severity=medium&amp;id=6836b081182aa0cae23af5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4947-cwe-295-improper-certificate-validat-663b40bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4947%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20curl%20curl&amp;severity=medium&amp;id=6836b081182aa0cae23af5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4800-cwe-434-unrestricted-upload-of-file--dade8c1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4800%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StylemixThemes%20MasterStudy%20LMS%20Pro&amp;severity=high&amp;id=6836a280182aa0cae238f9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25029-cwe-116-improper-encoding-or-escapi-c37eab93</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25029%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68366a30182aa0cae22e6b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25026-cwe-863-incorrect-authorization-in--d9f779ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25026%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68366a30182aa0cae22e6b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25025-cwe-209-generation-of-error-message-c63ace9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25025%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68366a30182aa0cae22e6b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31501-cwe-79-improper-neutralization-of-i-51367af7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bestpractical%20RT&amp;severity=high&amp;id=68374ee1182aa0cae256f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31500-cwe-79-improper-neutralization-of-i-196fda38</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bestpractical%20RT&amp;severity=high&amp;id=68374ee1182aa0cae256f679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30087-cwe-79-improper-neutralization-of-i-52a7f1e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bestpractical%20RT&amp;severity=high&amp;id=68374ee1182aa0cae256f677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48749-na-in-na-6e74e057</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48749%3A%20n%2Fa&amp;severity=critical&amp;id=68374b89182aa0cae2567847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57338-na-in-na-b392b7f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57338%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68374b89182aa0cae2567841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57337-na-in-na-243206b4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57337%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68374b89182aa0cae256783f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57336-na-in-na-289581b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57336%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68374b89182aa0cae256783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48747-na-in-na-6c666cb2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48747%3A%20n%2Fa&amp;severity=medium&amp;id=683747bb182aa0cae255f97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47748-na-in-na-618f3857</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47748%3A%20n%2Fa&amp;severity=medium&amp;id=683747bb182aa0cae255f97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48927-cwe-1188-initialization-of-a-resour-05120e67</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48927%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20TeleMessage%20service&amp;severity=medium&amp;id=6837447f182aa0cae2557b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48928-cwe-528-exposure-of-core-dump-file--5f7ad3bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48928%3A%20CWE-528%20Exposure%20of%20Core%20Dump%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20TeleMessage%20service&amp;severity=medium&amp;id=6837447f182aa0cae2557b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48931-cwe-328-use-of-weak-hash-in-telemes-5a050077</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48931%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20TeleMessage%20service&amp;severity=low&amp;id=6837447f182aa0cae2557b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48930-cwe-316-cleartext-storage-of-sensit-765e5dd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48930%3A%20CWE-316%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20TeleMessage%20service&amp;severity=low&amp;id=6837447f182aa0cae2557b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48929-cwe-922-insecure-storage-of-sensiti-5229d1f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48929%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20TeleMessage%20service&amp;severity=medium&amp;id=6837447f182aa0cae2557b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48746-na-in-na-2aa346d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48746%3A%20n%2Fa&amp;severity=medium&amp;id=6837447f182aa0cae2557b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48926-na-in-na-59eac169</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48926%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20TeleMessage%20service&amp;severity=medium&amp;id=683740ca182aa0cae254fcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48925-cwe-836-use-of-password-hash-instea-69e6cb9a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48925%3A%20CWE-836%20Use%20of%20Password%20Hash%20Instead%20of%20Password%20for%20Authentication%20in%20TeleMessage%20service&amp;severity=medium&amp;id=683740ca182aa0cae254fcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45343-na-in-na-f67dbb31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45343%3A%20n%2Fa&amp;severity=critical&amp;id=68372f36182aa0cae2528325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45997-na-in-na-fa24eee2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45997%3A%20n%2Fa&amp;severity=high&amp;id=68371a22182aa0cae24f8aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nsis-abuse-and-srdi-shellcode-anatomy-of-the-winos-c2099fb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NSIS%20Abuse%20and%20sRDI%20Shellcode%3A%20Anatomy%20of%20the%20Winos%204.0%20Campaign&amp;severity=medium&amp;id=6836d04b182aa0cae23f6946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-unit-26165-targets-western-logistics-and-t-346e1b0e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Unit%2026165%20Targets%20Western%20Logistics%20and%20Technology%20Companies&amp;severity=medium&amp;id=6836d04b182aa0cae23f6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta-shadowcricket-emerging-malware-trends-and-irc-s-297b83a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA-ShadowCricket%3A%20Emerging%20Malware%20Trends%20and%20IRC%20Server%20Tracking&amp;severity=medium&amp;id=6836d3c9182aa0cae23fef4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45094-cwe-79-improper-neutralization-of-i-f0439252</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45094%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Hardware%20Management%20Console&amp;severity=medium&amp;id=68364398182aa0cae228fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2826-cwe-1284-improper-validation-of-spec-8e9bd058</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2826%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Arista%20Networks%20EOS&amp;severity=low&amp;id=6836400e182aa0cae2287fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2796-cwe-284-in-arista-networks-eos-67df2b11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2796%3A%20cwe-284%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=68363c92182aa0cae227ff9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11185-cwe-1189-in-arista-networks-eos-7e3c000c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11185%3A%20cwe-1189%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=68363c92182aa0cae227ff9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32440-cwe-306-missing-authentication-for--ecdca621</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32440%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20jokob-sk%20NetAlertX&amp;severity=critical&amp;id=6836390e182aa0cae227819f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chatgpt-o3-resists-shutdown-despite-instructions-s-295d101c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ChatGPT%20o3%20Resists%20Shutdown%20Despite%20Instructions%2C%20Study%20Claims&amp;severity=medium&amp;id=6836320d182aa0cae22685a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40911-cwe-1287-improper-validation-of-spe-f0004c4f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40911%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20RRWO%20Net%3A%3ACIDR%3A%3ASet&amp;severity=medium&amp;id=68362e69182aa0cae22607ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5278-stack-based-buffer-overflow-in-red-h-089be548</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5278%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=68362775182aa0cae2250913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5222-buffer-copy-without-checking-size-of-512cbad9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5222%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=68362775182aa0cae2250911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5198-improper-neutralization-of-input-dur-4fa4c565</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=68362775182aa0cae225090f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5067-inappropriate-implementation-in-goog-95f84a26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5067%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae225091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5283-use-after-free-in-google-chrome-470e480c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5283%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362776182aa0cae2250926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5281-inappropriate-implementation-in-goog-566caac5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5281%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae2250921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5066-inappropriate-implementation-in-goog-fd067acd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5066%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae225091b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5065-inappropriate-implementation-in-goog-6cf544e7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5065%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae2250919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5064-inappropriate-implementation-in-goog-81c7dabe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5064%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=68362775182aa0cae2250917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5280-out-of-bounds-write-in-google-chrome-b7139663</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5280%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=68362775182aa0cae225091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5063-use-after-free-in-google-chrome-3ad929ec</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5063%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=68362775182aa0cae2250915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5279-cwe-295-improper-certificate-validat-5eae8922</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5279%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Amazon%20Redshift&amp;severity=high&amp;id=6836206f182aa0cae223c47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-sharp-taste-of-mimolette-analyzing-mimos-lates-243ecc59</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Sharp%20Taste%20of%20Mimo&apos;lette%3A%20Analyzing%20Mimo&apos;s%20Latest%20Campaign%20targeting%20Craft%20CMS&amp;severity=medium&amp;id=68360ed7182aa0cae2207281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13966-cwe-1393-use-of-default-password-in-14ada46b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13966%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20ZKTeco%20BioTime&amp;severity=high&amp;id=683607d4182aa0cae21f75ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-hackers-breach-20-ngos-using-evilginx-phis-3c50e248</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Hackers%20Breach%2020%2B%20NGOs%20Using%20Evilginx%20Phishing%20via%20Fake%20Microsoft%20Entra%20Pages&amp;severity=medium&amp;id=6835f9c3182aa0cae21ceae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/matlab-dev-confirms-ransomware-attack-behind-servi-e9ff0626</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MATLAB%20dev%20confirms%20ransomware%20attack%20behind%20service%20outage&amp;severity=medium&amp;id=6835f9c3182aa0cae21ceae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-apt-laundry-bear-linked-to-2024-dutc-90eff741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-linked%20APT%20Laundry%20Bear%20linked%20to%202024%20Dutch%20Police%20attack&amp;severity=medium&amp;id=6835f9c3182aa0cae21ceae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5252-sql-injection-in-phpgurukul-news-por-67779c5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5252%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835f9e9182aa0cae21d0f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5251-sql-injection-in-phpgurukul-news-por-23bdfba7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5251%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835f2d0182aa0cae21bc9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5250-sql-injection-in-phpgurukul-news-por-b3599f29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5250%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835f2d0182aa0cae21bc9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-or-llm-silent-werewolf-employs-new-loaders-e65119bb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20or%20LLM%3F%20Silent%20Werewolf%20employs%20new%20loaders%20to%20attack%20Russian%20and%20Moldovan%20organizations&amp;severity=medium&amp;id=6835ef34182aa0cae21b26e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23247-cwe-130-in-nvidia-nvidia-cuda-toolk-630722e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23247%3A%20CWE-130%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=6835ef3f182aa0cae21b274e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48057-cwe-296-improper-following-of-a-cer-8b899e94</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48057%3A%20CWE-296%3A%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20in%20Icinga%20icinga2&amp;severity=critical&amp;id=6835ebbb182aa0cae21a8436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5249-sql-injection-in-phpgurukul-news-por-5b023d17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5249%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=6835ebbb182aa0cae21a8438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5248-sql-injection-in-phpgurukul-company--c482638c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5248%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=6835e4b9182aa0cae2196356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adidas-confirms-cyber-attack-customer-data-stolen-2d34f573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adidas%20Confirms%20Cyber%20Attack%2C%20Customer%20Data%20Stolen&amp;severity=medium&amp;id=6835e142182aa0cae218e4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27701-information-disclosure-in-google-an-870a2d6c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27701%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6835e152182aa0cae218e508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27700-elevation-of-privilege-in-google-an-97a1c158</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27700%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6835e152182aa0cae218e506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56193-information-disclosure-in-google-an-9edc0fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56193%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=6835e152182aa0cae218e504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48370-cwe-287-improper-authentication-in--5b61b211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48370%3A%20CWE-287%3A%20Improper%20Authentication%20in%20supabase%20auth-js&amp;severity=low&amp;id=6835dda5182aa0cae2186689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48383-cwe-402-transmission-of-private-res-f86d4038</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48383%3A%20CWE-402%3A%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)%20in%20codingjoe%20django-select2&amp;severity=high&amp;id=6835d69f182aa0cae2176716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2236-cwe-497-exposure-of-sensitive-system-5e80e3dc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2236%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20OpenText%20Advanced%20Authentication&amp;severity=low&amp;id=6835d69f182aa0cae2176714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5247-improper-authentication-in-gowabby-h-fefb72de</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5247%3A%20Improper%20Authentication%20in%20Gowabby%20HFish&amp;severity=medium&amp;id=6835d69f182aa0cae2176718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3704-cwe-79-improper-neutralization-of-in-f6988af3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DBAR%20Productions%20Volunteer%20Sign%20Up%20Sheets&amp;severity=null&amp;id=6835d30c182aa0cae216c46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5246-sql-injection-in-campcodes-online-ho-d7a15142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5246%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835cf87182aa0cae21621ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5245-memory-corruption-in-gnu-binutils-a32704a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5245%3A%20Memory%20Corruption%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6835cf87182aa0cae21621aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48798-use-after-free-in-red-hat-red-hat-e-a9158f06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48798%3A%20Use%20After%20Free&amp;severity=high&amp;id=6835c887182aa0cae214dc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48797-heap-based-buffer-overflow-in-red-h-1aa9c0d2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48797%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=6835c887182aa0cae214dc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48796-stack-based-buffer-overflow-in-red--37ec551b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48796%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=6835c887182aa0cae214dc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5244-memory-corruption-in-gnu-binutils-cbac9388</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5244%3A%20Memory%20Corruption%20in%20GNU%20Binutils&amp;severity=medium&amp;id=6835ba7c182aa0cae2128088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-single-packet-shovel-digging-for-desync-powere-9bc2e3d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Single-Packet%20Shovel%3A%20Digging%20for%20Desync-Powered%20Request%20Tunnelling&amp;severity=medium&amp;id=6835b382182aa0cae2110ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5272-memory-safety-bugs-fixed-in-firefox--3466196a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5272%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5271-devtools-preview-ignored-csp-headers-0a4cdfb8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5271%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5270-sni-was-sometimes-unencrypted-in-moz-b284f5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5270%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5269-memory-safety-bug-fixed-in-firefox-e-5dafbc2d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5269%3A%20Vulnerability%20in%20Mozilla%20Firefox%20ESR&amp;severity=high&amp;id=6835b383182aa0cae2110afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5268-memory-safety-bugs-fixed-in-firefox--4be69d2e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5268%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835b383182aa0cae2110afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5267-clickjacking-vulnerability-could-hav-fdcd2cc2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5267%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5266-script-element-events-leaked-cross-o-b11f31fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5266%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5265-potential-local-code-execution-in-co-0eef65ca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5265%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5264-potential-local-code-execution-in-co-ead44164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5264%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5263-error-handling-for-script-execution--9be5a8bc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5263%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835b383182aa0cae2110af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5262-double-free-in-libvpx-encoder-in-moz-1a010bfa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5262%3A%20Double-free%20in%20libvpx%20encoder%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=6835b383182aa0cae2110aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5117-cwe-862-missing-authorization-in-the-d0b2a659</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5117%3A%20CWE-862%20Missing%20Authorization%20in%20themeglow%20Property%20%E2%80%93%20Real%20Estate%20Directory%20Listing&amp;severity=high&amp;id=6835afe5182aa0cae2104bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/custom-arsenal-developed-to-target-multiple-indust-bb1a0859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Custom%20Arsenal%20Developed%20to%20Target%20Multiple%20Industries&amp;severity=medium&amp;id=6835bdf7182aa0cae2133c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russia-linked-hackers-target-tajikistan-government-572fd3ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russia-Linked%20Hackers%20Target%20Tajikistan%20Government%20with%20Weaponized%20Word%20Documents&amp;severity=medium&amp;id=68359cde5d5f0974d01fda4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nova-scotia-power-confirms-it-was-hit-by-ransomwar-9e5e0219</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nova%20Scotia%20Power%20confirms%20it%20was%20hit%20by%20ransomware&amp;severity=medium&amp;id=68359cde5d5f0974d01fda4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/adidas-warns-of-data-breach-after-customer-service-f27e81b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Adidas%20warns%20of%20data%20breach%20after%20customer%20service%20provider%20hack&amp;severity=medium&amp;id=68359cde5d5f0974d01fda51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4412-cwe-276-incorrect-default-permission-0a1857de</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4412%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20SparkLabs%20Viscosity&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/everest-ransomware-leaks-coca-cola-employee-data-o-0cc8678e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Everest%20Ransomware%20Leaks%20Coca-Cola%20Employee%20Data%20Online&amp;severity=medium&amp;id=68359cde5d5f0974d01fda49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41653-cwe-410-insufficient-resource-pool--8e665b6a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41653%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=high&amp;id=6835ae13182aa0cae20f9ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41652-cwe-656-reliance-on-security-throug-69490277</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41652%3A%20CWE-328%20Use%20of%20Weak%20Hash%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=critical&amp;id=6835ae13182aa0cae20f9ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41651-cwe-306-missing-authentication-for--8dcbb5fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41651%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=critical&amp;id=6835ae13182aa0cae20f9cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41650-cwe-1287-improper-validation-of-spe-ed5c8adc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41650%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=high&amp;id=6835ae13182aa0cae20f9cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41649-cwe-787-out-of-bounds-write-in-weid-9a7686f2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41649%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Weidmueller%20IE-SW-VL05M-5TX&amp;severity=high&amp;id=6835ae13182aa0cae20f9cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-prompt-injection-in-gitlab-duo-leads-to-sou-3ed46e7c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Prompt%20Injection%20in%20GitLab%20Duo%20Leads%20to%20Source%20Code%20Theft&amp;severity=medium&amp;id=6835d306182aa0cae216c431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2407-cwe-306-missing-authentication-for-c-559f4bb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2407%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mobatime%20AMX%20MTAPI&amp;severity=critical&amp;id=6835ae13182aa0cae20f9ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-mcp-exploited-accessing-private-repositorie-8f3f7a6e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=GitHub%20MCP%20Exploited%3A%20Accessing%20private%20repositories%20via%20MCP&amp;severity=medium&amp;id=68359ce75d5f0974d01fda7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23393-cwe-80-improper-neutralization-of-s-39674bc3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23393%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.4.7.19.1&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47090-cwe-79-improper-neutralization-of-i-51e61b05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47090%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nagvis%20Nagvis&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38866-cwe-140-improper-neutralization-of--fdf7e800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38866%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20Nagvis%20Nagvis&amp;severity=medium&amp;id=6835ae13182aa0cae20f9cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5232-sql-injection-in-phpgurukul-student--c20226d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5232%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Study%20Center%20Management%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48382-cwe-732-incorrect-permission-assign-9b53f492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48382%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20codelibs%20fess&amp;severity=low&amp;id=6835ae13182aa0cae20f9d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5231-sql-injection-in-phpgurukul-company--aa06999b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5231%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48054-cwe-1321-improperly-controlled-modi-7b70a16b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48054%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20radashi-org%20radashi&amp;severity=medium&amp;id=6835ae13182aa0cae20f9d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5230-sql-injection-in-phpgurukul-online-n-92fc32a2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5230%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Nurse%20Hiring%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5229-sql-injection-in-campcodes-online-ho-ead0ab88</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5229%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835ae13182aa0cae20f9db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5228-stack-based-buffer-overflow-in-d-lin-4c5680bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5228%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=6835ae14182aa0cae20f9f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5227-sql-injection-in-phpgurukul-small-cr-22d14f85</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5227%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5226-sql-injection-in-phpgurukul-small-cr-3667e9d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5226%3A%20SQL%20Injection%20in%20PHPGurukul%20Small%20CRM&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5225-sql-injection-in-campcodes-advanced--3e42d734</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5225%3A%20SQL%20Injection%20in%20Campcodes%20Advanced%20Online%20Voting%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5224-sql-injection-in-campcodes-online-ho-634f4cb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5224%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5221-buffer-overflow-in-freefloat-ftp-ser-f79c3aed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5221%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4682-cwe-79-improper-neutralization-of-in-30887a78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20AI-Powered%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4683-cwe-862-missing-authorization-in-ins-c6830d33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4683%3A%20CWE-862%20Missing%20Authorization%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5220-buffer-overflow-in-freefloat-ftp-ser-f707ec8a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5220%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33079-cwe-256-plaintext-storage-of-a-pass-ca765e28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33079%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20Controller&amp;severity=medium&amp;id=6835ae14182aa0cae20fa013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5219-buffer-overflow-in-freefloat-ftp-ser-2d271080</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5219%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5218-buffer-overflow-in-freefloat-ftp-ser-08d29195</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5218%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5217-buffer-overflow-in-freefloat-ftp-ser-d6c771d9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5217%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6835ae14182aa0cae20fa022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5216-sql-injection-in-phpgurukul-student--35f36b43</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5216%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5215-stack-based-buffer-overflow-in-d-lin-85c20201</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5215%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-5020L&amp;severity=high&amp;id=6835ae14182aa0cae20fa025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46173-na-in-na-97e15ba9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46173%3A%20n%2Fa&amp;severity=medium&amp;id=68361951182aa0cae2227fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45529-na-in-na-9f89e186</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45529%3A%20n%2Fa&amp;severity=high&amp;id=68360ee1182aa0cae22072a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45475-na-in-na-bda1eec7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45475%3A%20n%2Fa&amp;severity=medium&amp;id=6835fd37182aa0cae21d8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49197-na-in-na-21bcfd2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835f633182aa0cae21c4824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22377-na-in-na-b243a582</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22377%3A%20n%2Fa&amp;severity=medium&amp;id=6835f2d0182aa0cae21bc9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49196-na-in-na-9d6ba5e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835f2d0182aa0cae21bc9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48744-cwe-22-improper-limitation-of-a-pat-b081d5d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48744%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SIGB%20PMB&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48743-cwe-89-improper-neutralization-of-s-dd8f8d30</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SIGB%20PMB&amp;severity=medium&amp;id=6835ae14182aa0cae20f9f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26211-cwe-352-cross-site-request-forgery--d6cbf8ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26211%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GibbonEdu%20Gibbon&amp;severity=low&amp;id=6835ae14182aa0cae20f9e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48742-cwe-306-missing-authentication-for--c755b4e2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48742%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20SIGB%20PMB&amp;severity=medium&amp;id=6835ae13182aa0cae20f9dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48828-cwe-424-improper-protection-of-alte-d6a6ca0b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48828%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20vBulletin%20vBulletin&amp;severity=critical&amp;id=6835ae13182aa0cae20f9da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48827-cwe-424-improper-protection-of-alte-75df182d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48827%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20vBulletin%20vBulletin&amp;severity=critical&amp;id=6835ae13182aa0cae20f9d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5214-sql-injection-in-kashipara-responsiv-689beb06</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5214%3A%20SQL%20Injection%20in%20Kashipara%20Responsive%20Online%20Learing%20Platform&amp;severity=medium&amp;id=6835ae14182aa0cae20fa02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5213-sql-injection-in-projectworlds-respo-e198bad2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5213%3A%20SQL%20Injection%20in%20projectworlds%20Responsive%20E-Learning%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4783-cwe-79-improper-neutralization-of-in-db02b67c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=6835ae14182aa0cae20fa02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/katz-stealer-threat-analysis-8fac4b6b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Katz%20Stealer%20Threat%20Analysis&amp;severity=medium&amp;id=68359dbe5d5f0974d01fe933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5212-sql-injection-in-phpgurukul-employee-47718aac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5212%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5211-sql-injection-in-phpgurukul-employee-2820573f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5211%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5210-sql-injection-in-phpgurukul-employee-1852617f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5210%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5208-sql-injection-in-sourcecodester-onli-5b2bf4e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5208%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Hospital%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5207-sql-injection-in-sourcecodester-clie-7516a658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5207%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5206-sql-injection-in-pixelimity-ebc71026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5206%3A%20SQL%20Injection%20in%20Pixelimity&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5205-sql-injection-in-1000-projects-daily-722d8700</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5205%3A%20SQL%20Injection%20in%201000%20Projects%20Daily%20College%20Class%20Work%20Report%20Book&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5204-out-of-bounds-read-in-open-asset-imp-79fb3022</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5204%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5203-out-of-bounds-read-in-open-asset-imp-9054658c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5203%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silverrat-source-code-leaked-online-heres-what-you-7456b223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SilverRAT%20Source%20Code%20Leaked%20Online%3A%20Here%E2%80%99s%20What%20You%20Need%20to%20Know&amp;severity=medium&amp;id=68359cde5d5f0974d01fda47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5202-out-of-bounds-read-in-open-asset-imp-22f46024</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5202%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5201-out-of-bounds-read-in-open-asset-imp-30d652ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5201%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5200-out-of-bounds-read-in-open-asset-imp-4018ce88</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5200%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6835ae14182aa0cae20fa19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23392-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-suse-container-suse-manager-5-0-x86-64-server-5-0-4-7-19-1-2888bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23392%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20SUSE%20Container%20suse%2Fmanager%2F5.0%2Fx86_64%2Fserver%3A5.0.4.7.19.1&amp;severity=medium&amp;id=6834925b0acd01a2492888bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23394-cwe-61-unix-symbolic-link-symlink-following-in-suse-opensuse-tumbleweed-288851</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23394%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20SUSE%20openSUSE%20Tumbleweed&amp;severity=critical&amp;id=68348e960acd01a249288851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-hackers-exploit-cityworks-0-day-to-hit-us--06deb7d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Hackers%20Exploit%20Cityworks%200-Day%20to%20Hit%20US%20Local%20Govt%20Agencies&amp;severity=medium&amp;id=68359cde5d5f0974d01fda41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23395-cwe-271-privilege-dropping-lowering-errors-288781</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23395%3A%20CWE-271%3A%20Privilege%20Dropping%20%2F%20Lowering%20Errors&amp;severity=high&amp;id=683487800acd01a249288781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46802-vulnerability-in-suse-suse-linux-enterprise-micro-5-3-288783</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46802%3A%20Vulnerability%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Micro%205.3&amp;severity=medium&amp;id=683487800acd01a249288783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46803-cwe-276-incorrect-default-permissions-288785</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46803%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions&amp;severity=medium&amp;id=683487800acd01a249288785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37992-vulnerability-in-linux-linux-28870c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=6834841b0acd01a24928870c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39498-cwe-201-insertion-of-sensitive-information-into-sent-data-in-spotlight-spotlight-social-media-feeds-premium-2877e7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39498%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Spotlight%20Spotlight%20-%20Social%20Media%20Feeds%20(Premium)&amp;severity=low&amp;id=6834797f0acd01a2492877e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46804-cwe-203-observable-discrepancy-2876ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46804%3A%20CWE-203%3A%20Observable%20Discrepancy&amp;severity=low&amp;id=683471f80acd01a2492876ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5196-execution-with-unnecessary-privileges-in-wing-ftp-server-2876d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5196%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Wing%20FTP%20Server&amp;severity=high&amp;id=683471f80acd01a2492876d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46805-cwe-367-time-of-check-time-of-use-toctou-race-condition-28752b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46805%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition&amp;severity=medium&amp;id=68346e7e0acd01a24928752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5186-server-side-request-forgery-in-thinkgem-jeesite-2874c1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5186%3A%20Server-Side%20Request%20Forgery%20in%20thinkgem%20JeeSite&amp;severity=medium&amp;id=68346b000acd01a2492874c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/reborn-in-rust-attempt-to-thwart-malware-analysis-288700</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Reborn%20in%20Rust%3A%20Attempt%20to%20thwart%20malware%20analysis&amp;severity=medium&amp;id=6834841a0acd01a249288700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40663-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-i2a-cronos-28744f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20i2A%20Cronos&amp;severity=medium&amp;id=683467830acd01a24928744f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40653-cwe-209-generation-of-error-message-containing-sensitive-information-in-m3m-m3m-printer-server-web-28744d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40653%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20M3M%20M3M%20Printer%20Server%20Web&amp;severity=medium&amp;id=683467830acd01a24928744d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40652-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-covermanager-covermanager-28744b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20CoverManager%20CoverManager&amp;severity=medium&amp;id=683467830acd01a24928744b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40650-cwe-639-authorization-bypass-through-user-controlled-key-in-clickedu-clickedu-287449</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40650%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Clickedu%20Clickedu&amp;severity=high&amp;id=683467830acd01a249287449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40667-cwe-862-missing-authorization-in-tcman-gim-287457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40667%3A%20CWE-862%20Missing%20Authorization%20in%20TCMAN%20GIM&amp;severity=high&amp;id=683467830acd01a249287457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40666-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-287455</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40666%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=683467830acd01a249287455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40665-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-287453</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40665%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=high&amp;id=683467830acd01a249287453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40664-cwe-306-missing-authentication-for-critical-function-in-tcman-gim-287451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40664%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=683467830acd01a249287451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5185-cross-site-request-forgery-in-summer-pearl-group-vacation-rental-management-platform-2873d8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5185%3A%20Cross-Site%20Request%20Forgery%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=683464010acd01a2492873d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5184-information-disclosure-in-summer-pearl-group-vacation-rental-management-platform-2871d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5184%3A%20Information%20Disclosure%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=68345d020acd01a2492871d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5183-open-redirect-in-summer-pearl-group-vacation-rental-management-platform-28599a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5183%3A%20Open%20Redirect%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=6834526c0acd01a24928599a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5182-authorization-bypass-in-summer-pearl-group-vacation-rental-management-platform-2858cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5182%3A%20Authorization%20Bypass%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=68344b560acd01a2492858cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5181-cross-site-scripting-in-summer-pearl-group-vacation-rental-management-platform-285861</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5181%3A%20Cross%20Site%20Scripting%20in%20Summer%20Pearl%20Group%20Vacation%20Rental%20Management%20Platform&amp;severity=medium&amp;id=683447ce0acd01a249285861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-of-tcc-bypasses-on-macos-c70b472e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20of%20TCC%20Bypasses%20on%20macOS&amp;severity=medium&amp;id=68359ce75d5f0974d01fda76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4053-cwe-312-cleartext-storage-of-sensitive-information-in-be-tech-mifare-classic-cards-285565</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4053%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Be-Tech%20Mifare%20Classic%20cards&amp;severity=medium&amp;id=683440d80acd01a249285565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35003-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-apache-software-foundation-apache-nuttx-rtos-285563</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35003%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Apache%20Software%20Foundation%20Apache%20NuttX%20RTOS&amp;severity=critical&amp;id=683440d80acd01a249285563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5180-uncontrolled-search-path-in-wondershare-filmora-285458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5180%3A%20Uncontrolled%20Search%20Path%20in%20Wondershare%20Filmora&amp;severity=high&amp;id=68343d700acd01a249285458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5179-cross-site-scripting-in-realce-tecnologia-queue-ticket-kiosk-2853ab</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5179%3A%20Cross%20Site%20Scripting%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=683439c50acd01a2492853ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-attack-method-on-hosted-ml-models-now-targets-pypi-284968</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20attack%20method%20on%20hosted%20ML%20models%20now%20targets%20PyPI&amp;severity=medium&amp;id=683432cd0acd01a249284968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/global-operation-disrupts-lumma-stealer-28497e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Global%20operation%20disrupts%20Lumma%20Stealer&amp;severity=medium&amp;id=683432cd0acd01a24928497e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40671-cwe-93-improper-neutralization-of-crlf-sequences-crlf-injection-in-aes-multimedia-gestnet-28523f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40671%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20AES%20Multimedia%20Gestnet&amp;severity=critical&amp;id=6834363e0acd01a24928523f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40672-cwe-732-incorrect-permission-assignment-for-critical-resource-in-grupo-espiral-ms-proactivanet-285241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40672%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Grupo%20Espiral%20MS%20Panloader.exe&amp;severity=high&amp;id=6834363e0acd01a249285241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5178-unrestricted-upload-in-realce-tecnologia-queue-ticket-kiosk-285247</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5178%3A%20Unrestricted%20Upload%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=6834363e0acd01a249285247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4057-use-of-weak-credentials-in-red-hat-red-hat-amq-broker-7-285243</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4057%3A%20Use%20of%20Weak%20Credentials&amp;severity=medium&amp;id=6834363e0acd01a249285243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5177-cross-site-scripting-in-realce-tecnologia-queue-ticket-kiosk-285245</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5177%3A%20Cross%20Site%20Scripting%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=6834363e0acd01a249285245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41655-cwe-306-missing-authentication-for-critical-function-in-pepperl-fuchs-profinet-gateway-fb8122a-1-el-28472d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41655%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pepperl%2BFuchs%20Profinet%20Gateway%20FB8122A.1.EL&amp;severity=high&amp;id=683428360acd01a24928472d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41654-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-pepperl-fuchs-profinet-gateway-fb8122a-1-el-28472b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41654%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Pepperl%2BFuchs%20Profinet%20Gateway%20FB8122A.1.EL&amp;severity=high&amp;id=683428360acd01a24928472b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1985-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pepperl-fuchs-profinet-gateway-fb8122a-1-el-284729</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepperl%2BFuchs%20Profinet%20Gateway%20FB8122A.1.EL&amp;severity=medium&amp;id=683428360acd01a249284729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5176-sql-injection-in-realce-tecnologia-queue-ticket-kiosk-2846a3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5176%3A%20SQL%20Injection%20in%20Realce%20Tecnologia%20Queue%20Ticket%20Kiosk&amp;severity=medium&amp;id=683424ac0acd01a2492846a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5175-improper-authorization-in-erdogant-pypickle-284520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5175%3A%20Improper%20Authorization%20in%20erdogant%20pypickle&amp;severity=medium&amp;id=68341da10acd01a249284520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5174-deserialization-in-erdogant-pypickle-28417a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5174%3A%20Deserialization%20in%20erdogant%20pypickle&amp;severity=medium&amp;id=683413410acd01a24928417a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5173-deserialization-in-humansignal-label-studio-ml-backend-28410e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5173%3A%20Deserialization%20in%20HumanSignal%20label-studio-ml-backend&amp;severity=medium&amp;id=68340f960acd01a24928410e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41441-generation-of-error-message-containing-sensitive-information-in-synck-graphica-mailform-pro-cgi-284070</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41441%3A%20Generation%20of%20error%20message%20containing%20sensitive%20information%20in%20SYNCK%20GRAPHICA%20Mailform%20Pro%20CGI&amp;severity=low&amp;id=68340c190acd01a249284070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5172-sql-injection-in-econtrata-283f73</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5172%3A%20SQL%20Injection%20in%20Econtrata&amp;severity=medium&amp;id=683405400acd01a249283f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5171-unrestricted-upload-in-llisoft-mta-maita-training-system-283eb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5171%3A%20Unrestricted%20Upload%20in%20llisoft%20MTA%20Maita%20Training%20System&amp;severity=medium&amp;id=6833fe6b0acd01a249283eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5170-sql-injection-in-llisoft-mta-maita-training-system-283d96</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5170%3A%20SQL%20Injection%20in%20llisoft%20MTA%20Maita%20Training%20System&amp;severity=medium&amp;id=6833f6f70acd01a249283d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5169-out-of-bounds-read-in-open-asset-import-library-assimp-283cfa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5169%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833f3760acd01a249283cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5168-out-of-bounds-read-in-open-asset-import-library-assimp-283b9a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5168%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833e9090acd01a249283b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5167-out-of-bounds-read-in-open-asset-import-library-assimp-283b2a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5167%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833e5630acd01a249283b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5166-out-of-bounds-read-in-open-asset-import-library-assimp-283ac8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5166%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833e2070acd01a249283ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5165-out-of-bounds-read-in-open-asset-import-library-assimp-283990</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5165%3A%20Out-of-Bounds%20Read%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6833daf10acd01a249283990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5164-use-of-hard-coded-cryptographic-key-in-perfreeblog-2837d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5164%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20PerfreeBlog&amp;severity=medium&amp;id=6833d3e00acd01a2492837d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5163-improper-access-controls-in-yangshare-warehousemanager-2835ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5163%3A%20Improper%20Access%20Controls%20in%20yangshare%20%E6%8A%80%E6%9C%AF%E6%9D%A8%E5%B7%A5%20warehouseManager%20%E4%BB%93%E5%BA%93%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=6833c9430acd01a2492835ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5162-unrestricted-upload-in-h3c-seccenter-smp-e1114p02-283431</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5162%3A%20Unrestricted%20Upload%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833bece0acd01a249283431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5161-path-traversal-in-h3c-seccenter-smp-e1114p02-283283</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5161%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833b8270acd01a249283283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5160-path-traversal-in-h3c-seccenter-smp-e1114p02-2830ec</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5160%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833b0e40acd01a2492830ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2146-cwe-787-out-of-bounds-write-in-canon-3bfdf75e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2146%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Satera%20MF656Cdw&amp;severity=critical&amp;id=6835ae14182aa0cae20fa1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5159-path-traversal-in-h3c-seccenter-smp--baef3511</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5159%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6835ae14182aa0cae20fa1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5158-path-traversal-in-h3c-seccenter-smp-e1114p02-282f1f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5158%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=6833a2b50acd01a249282f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5157-path-traversal-in-h3c-seccenter-smp-e1114p02-282e4e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5157%3A%20Path%20Traversal%20in%20H3C%20SecCenter%20SMP-E1114P02&amp;severity=medium&amp;id=68339b8c0acd01a249282e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5156-buffer-overflow-in-h3c-gr-5400ax-282db0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5156%3A%20Buffer%20Overflow%20in%20H3C%20GR-5400AX&amp;severity=high&amp;id=6833980e0acd01a249282db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-warns-of-silent-ransom-group-targeting-law-fir-6290b14d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Warns%20of%20Silent%20Ransom%20Group%20Targeting%20Law%20Firms%20via%20Scam%20Calls&amp;severity=medium&amp;id=68359cde5d5f0974d01fda43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/silent-ransom-group-targeting-law-firms-the-fbi-wa-7065945d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Silent%20Ransom%20Group%20targeting%20law%20firms%2C%20the%20FBI%20warns&amp;severity=medium&amp;id=68359cde5d5f0974d01fda55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bumblebee-malware-distributed-via-zenmap-winmrt-se-68ddc20e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bumblebee%20malware%20distributed%20via%20Zenmap%2C%20WinMRT%20SEO%20poisoning&amp;severity=medium&amp;id=68359cde5d5f0974d01fda53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-disrupted-global-ransomware-infr-45d10df3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20ENDGAME%20disrupted%20global%20ransomware%20infrastructure&amp;severity=medium&amp;id=68359cde5d5f0974d01fda5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackers-use-fake-vpn-and-browser-nsis-installers-t-63c9fdd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hackers%20Use%20Fake%20VPN%20and%20Browser%20NSIS%20Installers%20to%20Deliver%20Winos%204.0%20Malware&amp;severity=medium&amp;id=68359cde5d5f0974d01fda5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5155-sql-injection-in-qianfox-foxcms-282589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5155%3A%20SQL%20Injection%20in%20qianfox%20FoxCMS&amp;severity=medium&amp;id=6833715c0acd01a249282589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5154-cleartext-storage-in-a-file-or-on-disk-in-phonepe-app-282258</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5154%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20PhonePe%20App&amp;severity=medium&amp;id=683363650acd01a249282258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5153-cross-site-scripting-in-cms-made-simple-281f89</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5153%3A%20Cross%20Site%20Scripting%20in%20CMS%20Made%20Simple&amp;severity=medium&amp;id=6833553e0acd01a249281f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5152-sql-injection-in-chanjet-crm-281cf8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5152%3A%20SQL%20Injection%20in%20Chanjet%20CRM&amp;severity=medium&amp;id=68334e470acd01a249281cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5151-code-injection-in-defog-ai-introspect-281bc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5151%3A%20Code%20Injection%20in%20defog-ai%20introspect&amp;severity=medium&amp;id=683347550acd01a249281bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5150-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-docarray-281766</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5150%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20docarray&amp;severity=medium&amp;id=683332320acd01a249281766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5149-improper-authentication-in-wcms-281283</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5149%3A%20Improper%20Authentication%20in%20WCMS&amp;severity=medium&amp;id=683319800acd01a249281283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5148-deserialization-in-funaudiollm-inspiremusic-280de2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5148%3A%20Deserialization%20in%20FunAudioLLM%20InspireMusic&amp;severity=medium&amp;id=683307eb0acd01a249280de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5147-command-injection-in-netcore-nbr1005gpev2-28293a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5147%3A%20Command%20Injection%20in%20Netcore%20NBR1005GPEV2&amp;severity=medium&amp;id=683387310acd01a24928293a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5146-command-injection-in-netcore-nbr1005gpev2-27fbf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5146%3A%20Command%20Injection%20in%20Netcore%20NBR1005GPEV2&amp;severity=medium&amp;id=6832c1b90acd01a24927fbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5145-command-injection-in-netcore-nbr1005gpev2-27f709</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5145%3A%20Command%20Injection%20in%20Netcore%20NBR1005GPEV2&amp;severity=medium&amp;id=6832ac820acd01a24927f709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badusb-attack-explained-from-principles-to-practic-51dd1a5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadUSB%20Attack%20Explained%3A%20From%20Principles%20to%20Practice%20and%20Defense&amp;severity=medium&amp;id=68367d92182aa0cae23259b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5140-server-side-request-forgery-in-seeyon-zhiyuan-oa-web-application-system-27eddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5140%3A%20Server-Side%20Request%20Forgery%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=683277bd0acd01a24927eddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5139-command-injection-in-qualitor-27ecca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5139%3A%20Command%20Injection%20in%20Qualitor&amp;severity=medium&amp;id=683270c20acd01a24927ecca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5138-cross-site-scripting-in-bitwarden-27eb8f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5138%3A%20Cross%20Site%20Scripting%20in%20Bitwarden&amp;severity=medium&amp;id=683269b10acd01a24927eb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5137-code-injection-in-dedecms-27e8fb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5137%3A%20Code%20Injection%20in%20DedeCMS&amp;severity=medium&amp;id=68325f620acd01a24927e8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/windows-202415-unauthenticated-desktop-screenshot--88013390</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Windows%202024.15%20-%20Unauthenticated%20Desktop%20Screenshot%20Capture&amp;severity=medium&amp;id=68489dc07e6d765d51d531e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-server-2016-win32k-elevation-of--ebf2484c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20Server%202016%20-%20Win32k%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68489db97e6d765d51d530f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-user-registration-membership-plugin-412--744eab9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20User%20Registration%20%26%20Membership%20Plugin%204.1.2%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68489daf7e6d765d51d52f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grandstream-gsd3710-101113-stack-buffer-overflow-bc9dc2ab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grandstream%20GSD3710%201.0.11.13%20-%20Stack%20Buffer%20Overflow&amp;severity=medium&amp;id=68489da97e6d765d51d52e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/java-springboot-codebase-11-arbitrary-file-read-db0cdc9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Java-springboot-codebase%201.1%20-%20Arbitrary%20File%20Read&amp;severity=medium&amp;id=68489da37e6d765d51d52dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abb-cylon-aspect-30803-guest2root-privilege-escala-78d1976d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ABB%20Cylon%20Aspect%203.08.03%20-%20Guest2Root%20Privilege%20Escalation&amp;severity=high&amp;id=68489d9d7e6d765d51d52cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/abb-cylon-aspect-studio-30803-binary-planting-3a972e0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ABB%20Cylon%20Aspect%20Studio%203.08.03%20-%20Binary%20Planting&amp;severity=medium&amp;id=68489d977e6d765d51d52bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5136-insufficiently-random-values-in-tmall-demo-27e7fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5136%3A%20Insufficiently%20Random%20Values%20in%20Tmall%20Demo&amp;severity=low&amp;id=683258450acd01a24927e7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5135-cross-site-scripting-in-tmall-demo-28293f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5135%3A%20Cross%20Site%20Scripting%20in%20Tmall%20Demo&amp;severity=low&amp;id=683387310acd01a24928293f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5134-cross-site-scripting-in-tmall-demo-27e3e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5134%3A%20Cross%20Site%20Scripting%20in%20Tmall%20Demo&amp;severity=low&amp;id=683243390acd01a24927e3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5133-cross-site-scripting-in-tmall-demo-27e2d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5133%3A%20Cross%20Site%20Scripting%20in%20Tmall%20Demo&amp;severity=low&amp;id=68323bf80acd01a24927e2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5132-cross-site-request-forgery-in-tmall-demo-27e1c8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5132%3A%20Cross-Site%20Request%20Forgery%20in%20Tmall%20Demo&amp;severity=low&amp;id=683238790acd01a24927e1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5131-unrestricted-upload-in-tmall-demo-27e1ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5131%3A%20Unrestricted%20Upload%20in%20Tmall%20Demo&amp;severity=low&amp;id=683238790acd01a24927e1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5130-unrestricted-upload-in-tmall-demo-27e1cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5130%3A%20Unrestricted%20Upload%20in%20Tmall%20Demo&amp;severity=low&amp;id=683238790acd01a24927e1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5129-uncontrolled-search-path-in-sangfor-atrust-27d521</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5129%3A%20Uncontrolled%20Search%20Path%20in%20Sangfor%20%E9%9B%B6%E4%BF%A1%E4%BB%BB%E8%AE%BF%E9%97%AE%E6%8E%A7%E5%88%B6%E7%B3%BB%E7%BB%9F%20aTrust&amp;severity=high&amp;id=6831f5b00acd01a24927d521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5128-sql-injection-in-scriptandtools-real-estate-website-in-php-27d458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5128%3A%20SQL%20Injection%20in%20ScriptAndTools%20Real-Estate-website-in-PHP&amp;severity=medium&amp;id=6831eec40acd01a24927d458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5127-cross-site-scripting-in-flir-ax8-27d322</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5127%3A%20Cross%20Site%20Scripting%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=6831eb200acd01a24927d322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5126-command-injection-in-flir-ax8-27cffa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5126%3A%20Command%20Injection%20in%20Teledyne%20FLIR%20AX8&amp;severity=high&amp;id=6831e0a60acd01a24927cffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xss-flaw-actively-exploited-in-zimbra-collaboratio-26fb3615</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XSS%20Flaw%20Actively%20Exploited%20in%20Zimbra%20Collaboration%20Suite%2C%20Over%20129%2C000%20Servers%20at%20Risk&amp;severity=medium&amp;id=68367d52182aa0cae232598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5124-use-of-default-credentials-in-sony-snc-m1-27cd2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5124%3A%20Use%20of%20Default%20Credentials%20in%20Sony%20SNC-M1&amp;severity=critical&amp;id=6831c8040acd01a24927cd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4223-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-softaculous-page-builder-pagelayer-drag-and-drop-website-builder-279f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4223%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=68314cf70acd01a249279f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/creating-custom-upi-vpa-by-bypassing-protecttai-in-ffd1a391</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Creating%20Custom%20UPI%20VPA%20by%20bypassing%20Protectt.AI%20in%20ICICI&apos;s%20banking%20app&amp;severity=medium&amp;id=68367d93182aa0cae23259ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5058-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-emagicone-emagicone-store-manager-for-woocommerce-277dc4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5058%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=critical&amp;id=683142850acd01a249277dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4336-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-emagicone-emagicone-store-manager-for-woocommerce-277dbe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4336%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=683142850acd01a249277dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4603-cwe-73-external-control-of-file-name-or-path-in-emagicone-emagicone-store-manager-for-woocommerce-277dc2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4603%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=critical&amp;id=683142850acd01a249277dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4602-cwe-73-external-control-of-file-name-or-path-in-emagicone-emagicone-store-manager-for-woocommerce-277dc0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4602%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20emagicone%20eMagicOne%20Store%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=683142850acd01a249277dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5055-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-edgarrojas-smart-forms-when-you-need-more-than-just-a-contact-form-277b5a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edgarrojas%20Smart%20Forms%20%E2%80%93%20when%20you%20need%20more%20than%20just%20a%20contact%20form&amp;severity=medium&amp;id=6831346e0acd01a249277b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3869-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-4stats-4stats-277b4c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%204stats%204stats&amp;severity=medium&amp;id=6831346e0acd01a249277b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13427-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-softaculous-page-builder-pagelayer-drag-and-drop-website-builder-277a28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=68312d5d0acd01a249277a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48756-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-maboroshinokiseki-scsir-277b58</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48756%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20maboroshinokiseki%20scsir&amp;severity=low&amp;id=6831346e0acd01a249277b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48755-cwe-762-mismatched-memory-management-routines-in-blyssprivacy-sdk-277b56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48755%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20blyssprivacy%20sdk&amp;severity=low&amp;id=6831346e0acd01a249277b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48754-cwe-369-divide-by-zero-in-fractalfir-memory-pages-277b54</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48754%3A%20CWE-369%20Divide%20By%20Zero%20in%20FractalFir%20memory_pages&amp;severity=low&amp;id=6831346e0acd01a249277b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48753-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-obsidiandynamics-anode-277b52</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48753%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20obsidiandynamics%20anode&amp;severity=low&amp;id=6831346e0acd01a249277b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48752-cwe-416-use-after-free-in-forestryks-process-sync-rs-277b50</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48752%3A%20CWE-416%20Use%20After%20Free%20in%20Forestryks%20process-sync-rs&amp;severity=low&amp;id=6831346e0acd01a249277b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48751-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-tickbh-processlock-277b4e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48751%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20tickbh%20ProcessLock&amp;severity=low&amp;id=6831346e0acd01a249277b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-badsuccessor-attack-exploits-windows-server-20-9ff1312d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20BadSuccessor%20Attack%20Exploits%20Windows%20Server%202025%20Flaw%20for%20Full%20Active%20Directory%20Takeover&amp;severity=medium&amp;id=68367d52182aa0cae232598f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5119-sql-injection-in-emlog-pro-275741</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5119%3A%20SQL%20Injection%20in%20Emlog%20Pro&amp;severity=medium&amp;id=6830e3930acd01a249275741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/case-of-larva-25004-group-related-to-kimsuky-exploiting-additional-certificate-malware-signed-with-nexaweb-certificate-2758c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Case%20of%20Larva-25004%20Group%20(Related%20to%20Kimsuky)%20Exploiting%20Additional%20Certificate%20-%20Malware%20Signed%20with%20Nexaweb%20Certificate&amp;severity=medium&amp;id=6830ee060acd01a2492758c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/danabot-analyzing-a-fallen-empire-2758ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Danabot%3A%20Analyzing%20a%20fallen%20empire&amp;severity=medium&amp;id=6830ee060acd01a2492758ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/connectwise-screenconnect-tops-list-of-abused-rats-c50c97b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ConnectWise%20ScreenConnect%20Tops%20List%20of%20Abused%20RATs%20in%202025%20Attacks&amp;severity=medium&amp;id=68367d52182aa0cae2325991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-danabot-s-infrastructure-in-support-of-operation-endgame-ii-27526c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20DanaBot&apos;s%20Infrastructure%3A%20In%20Support%20of%20Operation%20Endgame%20II&amp;severity=medium&amp;id=6830c74b0acd01a24927526c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse-275258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ViciousTrap%20-%20Infiltrate%2C%20Control%2C%20Lure%3A%20Turning%20edge%20devices%20into%20honeypots%20en%20masse.&amp;severity=medium&amp;id=6830c74b0acd01a249275258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-takes-down-danabot-malware-neutr-ee8734cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%20Takes%20Down%20DanaBot%20Malware%2C%20Neutralizes%20300%20Servers&amp;severity=medium&amp;id=68367d52182aa0cae2325995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24917-cwe-284-improper-access-control-in-tenable-network-monitor-2740ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24917%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tenable%20Network%20Monitor&amp;severity=high&amp;id=68309d5f0acd01a2492740ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24916-cwe-284-improper-access-control-in-tenable-network-monitor-274022</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24916%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Tenable%20Network%20Monitor&amp;severity=high&amp;id=683099ad0acd01a249274022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48375-cwe-770-allocation-of-resources-without-limits-or-throttling-in-schule111-schule-274024</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48375%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20schule111%20Schule&amp;severity=medium&amp;id=683099ad0acd01a249274024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48377-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dnnsoftware-dnn-platform-27402a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48377%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=683099ad0acd01a24927402a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48378-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dnnsoftware-dnn-platform-27402c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48378%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dnnsoftware%20Dnn.Platform&amp;severity=medium&amp;id=683099ad0acd01a24927402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48376-cwe-841-improper-enforcement-of-behavioral-workflow-in-dnnsoftware-dnn-platform-274028</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48376%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20dnnsoftware%20Dnn.Platform&amp;severity=low&amp;id=683099ad0acd01a249274028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43860-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-openemr-openemr-274026</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43860%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openemr%20openemr&amp;severity=high&amp;id=683099ad0acd01a249274026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32967-cwe-778-insufficient-logging-in-openemr-openemr-273fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32967%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20openemr%20openemr&amp;severity=medium&amp;id=6830962c0acd01a249273fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32794-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-openemr-openemr-273fb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32794%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openemr%20openemr&amp;severity=high&amp;id=6830962c0acd01a249273fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31812-cwe-125-out-of-bounds-read-in-siemens-sipass-integrated-273f3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SiPass%20integrated&amp;severity=high&amp;id=683092a10acd01a249273f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31807-cwe-347-improper-verification-of-cryptographic-signature-in-siemens-sipass-integrated-ac5102-acc-g2-273f39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31807%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Siemens%20SiPass%20integrated%20AC5102%20(ACC-G2)&amp;severity=medium&amp;id=683092a10acd01a249273f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25110-cwe-1333-inefficient-regular-expression-complexity-273ca0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25110%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=medium&amp;id=68308f330acd01a249273ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5114-deserialization-in-easysoft-zentaopms-273bae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5114%3A%20Deserialization%20in%20easysoft%20zentaopms&amp;severity=medium&amp;id=683088120acd01a249273bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5112-buffer-overflow-in-freefloat-ftp-server-2738de</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5112%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6830811c0acd01a2492738de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5111-buffer-overflow-in-freefloat-ftp-server-2738dc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5111%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=6830811c0acd01a2492738dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3580-cwe-284-in-grafana-grafana-2726cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3580%3A%20CWE-284%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=68307d900acd01a2492726cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-campaign-dbatloader-delivers-remcos-via-u-0d0967be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Campaign%3A%20DBatLoader%20Delivers%20Remcos%20via%20UAC%20Bypass&amp;severity=medium&amp;id=68367d52182aa0cae2325997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dont-call-that-protected-method-dissecting-an-n-da-a9679385</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Don&apos;t%20Call%20That%20%22Protected%22%20Method%3A%20Dissecting%20an%20N-Day%20vBulletin%20RCE&amp;severity=medium&amp;id=68367d92182aa0cae23259ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5110-buffer-overflow-in-freefloat-ftp-server-272663</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5110%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=68307a070acd01a249272663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5109-buffer-overflow-in-freefloat-ftp-server-272558</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5109%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=683072f40acd01a249272558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31049-cwe-502-deserialization-of-untrusted-data-in-themeton-dash-27231c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31049%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Dash&amp;severity=critical&amp;id=68306f8d0acd01a24927231c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31053-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-quantumcloud-kbx-pro-ultimate-27231e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31053%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20quantumcloud%20KBx%20Pro%20Ultimate&amp;severity=null&amp;id=68306f8d0acd01a24927231e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31056-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-techspawn-whatscart-whatsapp-abandoned-cart-recovery-order-notifications-chat-box-otp-for-woocommerce-272320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31056%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Techspawn%20WhatsCart%20-%20Whatsapp%20Abandoned%20Cart%20Recovery%2C%20Order%20Notifications%2C%20Chat%20Box%2C%20OTP%20for%20WooCommerce&amp;severity=null&amp;id=68306f8d0acd01a249272320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31060-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-capie-272322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31060%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Capie&amp;severity=null&amp;id=68306f8d0acd01a249272322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31064-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-vizeon-business-consulting-272324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31064%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Vizeon%20-%20Business%20Consulting&amp;severity=null&amp;id=68306f8d0acd01a249272324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31069-cwe-502-deserialization-of-untrusted-data-in-themeton-hotstar-multi-purpose-business-theme-272326</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31069%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20HotStar%20%E2%80%93%20Multi-Purpose%20Business%20Theme&amp;severity=critical&amp;id=68306f8d0acd01a249272326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31397-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-smartcms-bus-ticket-booking-with-seat-reservation-for-woocommerce-272328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31397%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31423-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-umberto-27232a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31423%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Umberto&amp;severity=null&amp;id=68306f8e0acd01a24927232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31430-cwe-502-deserialization-of-untrusted-data-in-themeton-the-business-272337</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31430%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20The%20Business&amp;severity=critical&amp;id=68306f8e0acd01a249272337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31631-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-fish-house-272339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31631%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Fish%20House&amp;severity=null&amp;id=68306f8e0acd01a249272339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31632-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-spyropress-la-boom-27233b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31632%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SpyroPress%20La%20Boom&amp;severity=high&amp;id=68306f8e0acd01a24927233b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31633-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-kiamo-responsive-business-service-wordpress-theme-27233d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31633%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Kiamo%20-%20Responsive%20Business%20Service%20WordPress%20Theme&amp;severity=high&amp;id=68306f8e0acd01a24927233d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31636-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-saurabhsharma-wp-post-modules-for-elementor-27233f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SaurabhSharma%20WP%20Post%20Modules%20for%20Elementor&amp;severity=null&amp;id=68306f8e0acd01a24927233f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31912-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-enzio-responsive-business-wordpress-theme-272341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31912%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Enzio%20-%20Responsive%20Business%20WordPress%20Theme&amp;severity=null&amp;id=68306f8e0acd01a249272341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31913-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-ogami-272343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31913%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Ogami&amp;severity=null&amp;id=68306f8e0acd01a249272343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31914-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kamleshyadav-pixel-wordpress-form-builderplugin-autoresponder-272345</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31914%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kamleshyadav%20Pixel%20WordPress%20Form%20BuilderPlugin%20%26%20Autoresponder&amp;severity=null&amp;id=68306f8e0acd01a249272345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31916-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-joy2012bd-jp-students-result-management-system-premium-272347</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31916%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20joy2012bd%20JP%20Students%20Result%20Management%20System%20Premium&amp;severity=low&amp;id=68306f8e0acd01a249272347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31918-cwe-266-incorrect-privilege-assignment-in-quantumcloud-simple-business-directory-pro-272349</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31918%3A%20Incorrect%20Privilege%20Assignment%20in%20quantumcloud%20Simple%20Business%20Directory%20Pro&amp;severity=null&amp;id=68306f8e0acd01a249272349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31924-cwe-502-deserialization-of-untrusted-data-in-designthemes-crafts-arts-272356</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31924%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Crafts%20%26%20Arts&amp;severity=null&amp;id=68306f8e0acd01a249272356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31927-cwe-502-deserialization-of-untrusted-data-in-themeton-acerola-272358</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31927%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeton%20Acerola&amp;severity=critical&amp;id=68306f8e0acd01a249272358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32284-cwe-502-deserialization-of-untrusted-data-in-designthemes-pet-world-27235a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32284%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Pet%20World&amp;severity=null&amp;id=68306f8e0acd01a24927235a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32285-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apustheme-butcher-27235c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ApusTheme%20Butcher&amp;severity=null&amp;id=68306f8e0acd01a24927235c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32286-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-butcher-27235e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32286%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Butcher&amp;severity=null&amp;id=68306f8e0acd01a24927235e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32289-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-apustheme-yozi-272360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32289%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ApusTheme%20Yozi&amp;severity=null&amp;id=68306f8e0acd01a249272360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32292-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-jarvis-night-club-concert-festival-wordpress-272362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32292%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Jarvis%20%E2%80%93%20Night%20Club%2C%20Concert%2C%20Festival%20WordPress&amp;severity=null&amp;id=68306f8e0acd01a249272362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32293-cwe-502-deserialization-of-untrusted-data-in-designthemes-finance-consultant-272364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32293%3A%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20Finance%20Consultant&amp;severity=null&amp;id=68306f8e0acd01a249272364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32294-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-oxpitan-272366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32294%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Oxpitan&amp;severity=null&amp;id=68306f8e0acd01a249272366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32302-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-gavias-winnex-272368</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32302%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20gavias%20Winnex&amp;severity=null&amp;id=68306f8e0acd01a249272368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32309-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-thememove-healsoul-272375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32309%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20Healsoul&amp;severity=null&amp;id=68306f8e0acd01a249272375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39480-cwe-502-deserialization-of-untrusted-data-in-thememakers-car-dealer-272377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39480%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeMakers%20Car%20Dealer&amp;severity=null&amp;id=68306f8e0acd01a249272377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39485-cwe-502-deserialization-of-untrusted-data-in-themegoods-grand-tour-travel-agency-wordpress-272379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39485%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Tour&amp;severity=null&amp;id=68306f8e0acd01a249272379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39489-cwe-266-incorrect-privilege-assignment-in-pebas-couponxl-27237b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39489%3A%20Incorrect%20Privilege%20Assignment%20in%20pebas%20CouponXL&amp;severity=null&amp;id=68306f8e0acd01a24927237b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39490-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mikado-themes-backpack-traveler-27237d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39490%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Backpack%20Traveler&amp;severity=null&amp;id=68306f8e0acd01a24927237d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39494-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mikado-themes-wilm-r-27237f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Wilm%C3%ABr&amp;severity=null&amp;id=68306f8e0acd01a24927237f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39495-cwe-502-deserialization-of-untrusted-data-in-boldthemes-avantage-272381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39495%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Avantage&amp;severity=null&amp;id=68306f8e0acd01a249272381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39499-cwe-502-deserialization-of-untrusted-data-in-boldthemes-medicare-272383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39499%3A%20Deserialization%20of%20Untrusted%20Data%20in%20BoldThemes%20Medicare&amp;severity=null&amp;id=68306f8e0acd01a249272383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39500-cwe-502-deserialization-of-untrusted-data-in-goodlayers-goodlayers-hostel-272385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39500%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GoodLayers%20Goodlayers%20Hostel&amp;severity=null&amp;id=68306f8e0acd01a249272385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39501-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-goodlayers-goodlayers-hostel-272387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39501%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GoodLayers%20Goodlayers%20Hostel&amp;severity=null&amp;id=68306f8e0acd01a249272387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39502-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-goodlayers-goodlayers-hostel-272394</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Hostel&amp;severity=null&amp;id=68306f8e0acd01a249272394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39503-cwe-502-deserialization-of-untrusted-data-in-goodlayers-goodlayers-hotel-272396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39503%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GoodLayers%20Goodlayers%20Hotel&amp;severity=null&amp;id=68306f8e0acd01a249272396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39504-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-goodlayers-goodlayers-hotel-272398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39504%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GoodLayers%20Goodlayers%20Hotel&amp;severity=null&amp;id=68306f8e0acd01a249272398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-goodlayers-goodlayers-hotel-27239a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Hotel&amp;severity=null&amp;id=68306f8e0acd01a24927239a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39506-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-nasatheme-nasa-core-27239c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39506%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=68306f8e0acd01a24927239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39536-cwe-862-missing-authorization-in-chimpstudio-jobhunt-job-alerts-27239e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39536%3A%20CWE-862%20Missing%20Authorization%20in%20Chimpstudio%20JobHunt%20Job%20Alerts&amp;severity=high&amp;id=68306f8e0acd01a24927239e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46437-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tayoricom-tayori-form-2723b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tayoricom%20Tayori%20Form&amp;severity=null&amp;id=68306f8e0acd01a2492723b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46440-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mark-kstats-reloaded-2723b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20kStats%20Reloaded&amp;severity=null&amp;id=68306f8e0acd01a2492723b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46444-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-scripteo-ads-pro-plugin-2723b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46444%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20scripteo%20Ads%20Pro&amp;severity=null&amp;id=68306f8e0acd01a2492723b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46446-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ivanrojas-libro-de-reclamaciones-2723b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46446%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivanrojas%20Libro%20de%20Reclamaciones&amp;severity=null&amp;id=68306f8e0acd01a2492723b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46448-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-reifsnyderb-document-management-system-2723bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reifsnyderb%20Document%20Management%20System&amp;severity=null&amp;id=68306f8e0acd01a2492723bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46454-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-svil4ok-meta-keywords-amp-description-2723bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46454%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20svil4ok%20Meta%20Keywords%20%26amp%3B%20Description&amp;severity=null&amp;id=68306f8e0acd01a2492723bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46455-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-indigothemes-wp-hrm-lite-2723bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46455%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20IndigoThemes%20WP%20HRM%20LITE&amp;severity=null&amp;id=68306f8e0acd01a2492723bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46456-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jason-theme-blvd-sliders-2723c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46456%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Theme%20Blvd%20Sliders&amp;severity=null&amp;id=68306f8e0acd01a2492723c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46458-cwe-352-cross-site-request-forgery-csrf-in-x000x-occupancyplan-2723c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46458%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20x000x%20occupancyplan&amp;severity=null&amp;id=68306f8e0acd01a2492723c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46460-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-detheme-easy-guide-2723c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46460%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Detheme%20Easy%20Guide&amp;severity=null&amp;id=68306f8e0acd01a2492723c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46463-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-yamna-khawaja-mailing-group-listserv-2723d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46463%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=68306f8e0acd01a2492723d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46468-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpfable-fable-extra-2723d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46468%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WPFable%20Fable%20Extra&amp;severity=null&amp;id=68306f8e0acd01a2492723d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46474-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-seur-oficial-seur-oficial-2723d6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46474%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SEUR%20OFICIAL%20SEUR%20Oficial&amp;severity=high&amp;id=68306f8e0acd01a2492723d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46486-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-totalprocessing-nomupay-payment-processing-gateway-2723d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46486%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20totalprocessing%20Nomupay%20Payment%20Processing%20Gateway&amp;severity=null&amp;id=68306f8e0acd01a2492723d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46487-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sftranna-ec-authorize-net-2723da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sftranna%20EC%20Authorize.net&amp;severity=null&amp;id=68306f8e0acd01a2492723da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46488-cwe-862-missing-authorization-in-dastan800-visual-builder-2723dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46488%3A%20Missing%20Authorization%20in%20dastan800%20Visual%20Builder&amp;severity=null&amp;id=68306f8e0acd01a2492723dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46490-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-wordwebsoftware-crossword-compiler-puzzles-2723de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46490%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wordwebsoftware%20Crossword%20Compiler%20Puzzles&amp;severity=null&amp;id=68306f8e0acd01a2492723de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46493-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wordwebsoftware-crossword-compiler-puzzles-2723e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordwebsoftware%20Crossword%20Compiler%20Puzzles&amp;severity=null&amp;id=68306f8e0acd01a2492723e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46515-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-m-a-vinoth-kumar-category-widget-2723e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Category%20Widget&amp;severity=null&amp;id=68306f8e0acd01a2492723e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46518-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-phpaddicted-igit-related-posts-with-thumb-image-after-posts-2723e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phpaddicted%20IGIT%20Related%20Posts%20With%20Thumb%20Image%20After%20Posts&amp;severity=null&amp;id=68306f8e0acd01a2492723e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46526-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-janekniefeldt-my-custom-widgets-2723f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20janekniefeldt%20My%20Custom%20Widgets&amp;severity=null&amp;id=68306f8e0acd01a2492723f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46527-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-likecoin-web3press-2723f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46527%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LikeCoin%20Web3Press&amp;severity=null&amp;id=68306f8e0acd01a2492723f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46537-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ctltwp-section-widget-2723f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ctltwp%20Section%20Widget&amp;severity=null&amp;id=68306f8e0acd01a2492723f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46539-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wpfable-fable-extra-2723f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFable%20Fable%20Extra&amp;severity=null&amp;id=68306f8e0acd01a2492723f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47438-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpjobportal-wp-job-portal-2723f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47438%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=68306f8e0acd01a2492723f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47453-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-xylus-themes-wp-smart-import-2723fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47453%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Xylus%20Themes%20WP%20Smart%20Import&amp;severity=null&amp;id=68306f8e0acd01a2492723fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47458-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-b2itech-b2i-investor-tools-2723fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20B2itech%20B2i%20Investor%20Tools&amp;severity=null&amp;id=68306f8e0acd01a2492723fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47461-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-mediaticus-subaccounts-for-woocommerce-2723ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47461%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20mediaticus%20Subaccounts%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a2492723ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47478-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-metagauss-profilegrid-272401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47478%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=68306f8e0acd01a249272401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47492-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-add-ons-org-drag-and-drop-file-upload-for-elementor-forms-272403</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47492%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20add-ons.org%20Drag%20and%20Drop%20File%20Upload%20for%20Elementor%20Forms&amp;severity=null&amp;id=68306f8e0acd01a249272403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47512-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-tainacan-tainacan-272410</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47512%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tainacan%20Tainacan&amp;severity=high&amp;id=68306f8e0acd01a249272410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47513-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-james-laforge-infocob-crm-forms-272412</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47513%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20James%20Laforge%20Infocob%20CRM%20Forms&amp;severity=null&amp;id=68306f8e0acd01a249272412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47529-cwe-862-missing-authorization-in-ux-design-experts-experto-cta-widget-8211-call-to-action-sticky-cta-floating-button-plugin-272414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47529%3A%20Missing%20Authorization%20in%20UX%20Design%20Experts%20Experto%20CTA%20Widget%20%26%238211%3B%20Call%20To%20Action%2C%20Sticky%20CTA%2C%20Floating%20Button%20Plugin&amp;severity=null&amp;id=68306f8e0acd01a249272414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47530-cwe-502-deserialization-of-untrusted-data-in-wpfunnels-wpfunnels-272416</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47530%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WPFunnels%20WPFunnels&amp;severity=critical&amp;id=68306f8e0acd01a249272416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47532-cwe-502-deserialization-of-untrusted-data-in-coinpayments-coinpayments-net-payment-gateway-for-woocommerce-272418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47532%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CoinPayments%20CoinPayments.net%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47535-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wpopal-opal-woo-custom-product-variation-27241a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47535%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpopal%20Opal%20Woo%20Custom%20Product%20Variation&amp;severity=null&amp;id=68306f8e0acd01a24927241a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47539-cwe-266-incorrect-privilege-assignment-in-themewinter-eventin-27241c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47539%3A%20Incorrect%20Privilege%20Assignment%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=68306f8e0acd01a24927241c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47541-cwe-201-insertion-of-sensitive-information-into-sent-data-in-wpfunnels-mail-mint-27241e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47541%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPFunnels%20Mail%20Mint&amp;severity=null&amp;id=68306f8e0acd01a24927241e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47558-cwe-862-missing-authorization-in-romancode-mapsvg-272420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47558%3A%20Missing%20Authorization%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=68306f8e0acd01a249272420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47568-cwe-502-deserialization-of-untrusted-data-in-zoomit-zoomsounds-272422</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47568%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ZoomIt%20ZoomSounds&amp;severity=null&amp;id=68306f8e0acd01a249272422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47575-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-school-management-27242f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47575%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=68306f8e0acd01a24927242f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47599-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-facturante-facturante-272431</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47599%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20facturante%20Facturante&amp;severity=critical&amp;id=68306f8e0acd01a249272431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47603-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-belingo-belingogeo-272433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47603%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Belingo%20belingoGeo&amp;severity=null&amp;id=68306f8e0acd01a249272433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47611-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-khaled-user-meta-272435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Khaled%20User%20Meta&amp;severity=null&amp;id=68306f8e0acd01a249272435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47613-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mojoomla-school-management-272437</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20School%20Management&amp;severity=high&amp;id=68306f8e0acd01a249272437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47618-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mortgage-calculator-bmi-adult-kid-calculator-272439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47618%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mortgage%20Calculator%20BMI%20Adult%20%26%20Kid%20Calculator&amp;severity=null&amp;id=68306f8e0acd01a249272439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47619-cwe-862-missing-authorization-in-6storage-6storage-rentals-27243b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47619%3A%20Missing%20Authorization%20in%206Storage%206Storage%20Rentals&amp;severity=null&amp;id=68306f8e0acd01a24927243b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47631-cwe-266-incorrect-privilege-assignment-in-mojoomla-hospital-management-system-27243d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47631%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=high&amp;id=68306f8e0acd01a24927243d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47637-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-staggs-staggs-27243f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47637%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20STAGGS%20STAGGS&amp;severity=critical&amp;id=68306f8e0acd01a24927243f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47640-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-printcart-printcart-web-to-print-product-designer-for-woocommerce-272441</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47640%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47641-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-printcart-printcart-web-to-print-product-designer-for-woocommerce-27244e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47641%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20printcart%20Printcart%20Web%20to%20Print%20Product%20Designer%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a24927244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47642-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-ajar-productions-ajar-in5-embed-272450</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47642%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajar%20Productions%20Ajar%20in5%20Embed&amp;severity=null&amp;id=68306f8e0acd01a249272450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47646-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-gilblas-ngunte-possi-psw-front-end-login-amp-registration-272452</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47646%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Gilblas%20Ngunte%20Possi%20PSW%20Front-end%20Login%20%26amp%3B%20Registration&amp;severity=null&amp;id=68306f8e0acd01a249272452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47658-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-elextensions-elex-wordpress-helpdesk-customer-ticketing-system-272454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47658%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ELEXtensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=null&amp;id=68306f8e0acd01a249272454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47660-cwe-502-deserialization-of-untrusted-data-in-codexpert-inc-wc-affiliate-272456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47660%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Codexpert%2C%20Inc%20WC%20Affiliate&amp;severity=null&amp;id=68306f8e0acd01a249272456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47663-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-hospital-management-system-272458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47663%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=critical&amp;id=68306f8e0acd01a249272458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47670-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-miniorange-wordpress-social-login-and-register-27245a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47670%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20WordPress%20Social%20Login%20and%20Register&amp;severity=null&amp;id=68306f8e0acd01a24927245a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47671-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-letscms-mlm-software-binary-mlm-plan-27245c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47671%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LETSCMS%20MLM%20Software%20Binary%20MLM%20Plan&amp;severity=null&amp;id=68306f8e0acd01a24927245c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47672-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-miniorange-miniorange-discord-integration-27245e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47672%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20miniOrange%20miniOrange%20Discord%20Integration&amp;severity=null&amp;id=68306f8e0acd01a24927245e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47673-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tychesoftwares-arconix-shortcodes-272460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47673%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=68306f8e0acd01a249272460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47678-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-funnelcockpit-funnelcockpit-27246d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FunnelCockpit%20FunnelCockpit&amp;severity=high&amp;id=68306f8e0acd01a24927246d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47680-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-michel-xiligroup-dev-xili-tidy-tags-27246f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-tidy-tags&amp;severity=null&amp;id=68306f8e0acd01a24927246f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47687-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-storekeeper-b-v-storekeeper-for-woocommerce-272471</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47687%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StoreKeeper%20B.V.%20StoreKeeper%20for%20WooCommerce&amp;severity=null&amp;id=68306f8e0acd01a249272471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47690-cwe-862-missing-authorization-in-smackcoders-lead-form-data-collection-to-crm-272473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47690%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20Lead%20Form%20Data%20Collection%20to%20CRM&amp;severity=null&amp;id=68306f8e0acd01a249272473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48241-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-soft8soft-llc-verge3d-272475</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=68306f8e0acd01a249272475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48245-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-fullworks-quick-contact-form-272477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20Quick%20Contact%20Form&amp;severity=null&amp;id=68306f8e0acd01a249272477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48271-cwe-862-missing-authorization-in-leadinfo-leadinfo-272479</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48271%3A%20CWE-862%20Missing%20Authorization%20in%20Leadinfo%20Leadinfo&amp;severity=medium&amp;id=68306f8e0acd01a249272479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48273-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wpjobportal-wp-job-portal-27247b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48273%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=68306f8e0acd01a24927247b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48275-cwe-862-missing-authorization-in-dastan800-visual-header-27247d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48275%3A%20Missing%20Authorization%20in%20dastan800%20Visual%20Header&amp;severity=null&amp;id=68306f8e0acd01a24927247d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48283-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-majestic-support-majestic-support-27247f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48283%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Majestic%20Support%20Majestic%20Support&amp;severity=critical&amp;id=68306f8e0acd01a24927247f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48286-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-catkin-redi-restaurant-reservation-272489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catkin%20ReDi%20Restaurant%20Reservation&amp;severity=null&amp;id=68306f8e0acd01a249272489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48287-cwe-502-deserialization-of-untrusted-data-in-pagaleve-pix-4x-sem-juros-8211-pagaleve-27248b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48287%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Pagaleve%20Pix%204x%20sem%20juros%20-%20Pagaleve&amp;severity=null&amp;id=68306f8e0acd01a24927248b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48289-cwe-502-deserialization-of-untrusted-data-in-ancorathemes-kids-planet-27248d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48289%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AncoraThemes%20Kids%20Planet&amp;severity=null&amp;id=68306f8e0acd01a24927248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48292-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-goodlayers-tourmaster-27248f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48292%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20GoodLayers%20Tourmaster&amp;severity=null&amp;id=68306f8e0acd01a24927248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41380-cwe-798-use-of-hard-coded-credentials-in-intellian-technologies-iridium-certus-700-2723a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41380%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Intellian%20Technologies%20Iridium%20Certus%20700&amp;severity=medium&amp;id=68306f8e0acd01a2492723a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41379-cwe-20-improper-input-validation-in-intellian-technologies-iridium-certus-700-2723a4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41379%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Intellian%20Technologies%20Iridium%20Certus%20700&amp;severity=medium&amp;id=68306f8e0acd01a2492723a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41378-cwe-20-improper-input-validation-in-intellian-technologies-iridium-certus-700-2723a2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41378%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Intellian%20Technologies%20Iridium%20Certus%20700&amp;severity=medium&amp;id=68306f8e0acd01a2492723a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41377-cwe-20-improper-input-validation-in-intellian-technologies-iridium-certus-700-2723a0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41377%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TESI%20Gandia%20Integra%20Total&amp;severity=high&amp;id=68306f8e0acd01a2492723a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7803-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-272318</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7803%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=68306f8d0acd01a249272318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9163-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-gitlab-gitlab-27231a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9163%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20GitLab%20GitLab&amp;severity=low&amp;id=68306f8d0acd01a24927231a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5108-unrestricted-upload-in-zongzhige-shopxo-272493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5108%3A%20Unrestricted%20Upload%20in%20zongzhige%20ShopXO&amp;severity=medium&amp;id=68306f8e0acd01a249272493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5107-sql-injection-in-fujian-kelixun-272491</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5107%3A%20SQL%20Injection%20in%20Fujian%20Kelixun&amp;severity=medium&amp;id=68306f8e0acd01a249272491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1123-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-solidwp-solid-mail-smtp-email-and-logging-made-by-solidwp-2722a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solidwp%20Solid%20Mail%20%E2%80%93%20SMTP%20email%20and%20logging%20made%20by%20SolidWP&amp;severity=high&amp;id=68306c090acd01a2492722a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5106-os-command-injection-in-fujian-kelixun-2721d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5106%3A%20OS%20Command%20Injection%20in%20Fujian%20Kelixun&amp;severity=medium&amp;id=683065190acd01a2492721d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5105-improper-clearing-of-heap-memory-before-release-in-tozed-zlt-w51-2721d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5105%3A%20Improper%20Clearing%20of%20Heap%20Memory%20Before%20Release%20in%20TOZED%20ZLT%20W51&amp;severity=medium&amp;id=683065190acd01a2492721d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41407-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-271ebb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41407%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=68304fd60acd01a249271ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36527-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-271eb9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36527%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=68304fd60acd01a249271eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3895-cwe-334-small-space-of-random-values-in-jan-syski-megabip-271e4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3895%3A%20CWE-334%20Small%20Space%20of%20Random%20Values%20in%20Jan%20Syski%20MegaBIP&amp;severity=critical&amp;id=68304c460acd01a249271e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3894-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-jan-syski-megabip-271e4a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Jan%20Syski%20MegaBIP&amp;severity=medium&amp;id=68304c460acd01a249271e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3893-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-jan-syski-megabip-271e48</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jan%20Syski%20MegaBIP&amp;severity=high&amp;id=68304c460acd01a249271e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4379-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-studio-fabryka-dobrycms-271e4e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Studio%20Fabryka%20DobryCMS&amp;severity=medium&amp;id=68304c460acd01a249271e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-sindoor-anatomy-of-a-high-stakes-cyber-siege-272548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Sindoor%3A%20Anatomy%20of%20a%20High-Stakes%20Cyber%20Siege&amp;severity=medium&amp;id=683072f20acd01a249272548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-endgame-2-0-272539</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Endgame%202.0&amp;severity=medium&amp;id=683072f20acd01a249272539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13945-cwe-36-absolute-path-traversal-in-abb-aspect-enterprise-271d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13945%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=683041ba0acd01a249271d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47149-use-of-less-trusted-source-in-digital-arts-inc-i-filter-271cad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47149%3A%20Use%20of%20less%20trusted%20source%20in%20Digital%20Arts%20Inc.%20i-FILTER&amp;severity=medium&amp;id=68303e420acd01a249271cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5096-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tobiasbg-tablepress-tables-in-wordpress-made-easy-271b7f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5096%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=683033c10acd01a249271b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4594-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tournamatch-tournamatch-270c95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4594%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tournamatch%20Tournamatch&amp;severity=medium&amp;id=682ff0f10acd01a249270c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5100-cwe-415-double-free-in-mobile-dynamix-printershare-mobile-print-27094c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5100%3A%20CWE-415%20Double%20Free%20in%20Mobile%20Dynamix%20PrinterShare%20Mobile%20Print&amp;severity=high&amp;id=682fd4b90acd01a24927094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5098-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-mobile-dynamix-printershare-mobile-print-270948</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5098%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mobile%20Dynamix%20PrinterShare%20Mobile%20Print&amp;severity=critical&amp;id=682fd4b90acd01a249270948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5099-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-mobile-dynamix-printershare-mobile-print-27094a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5099%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Mobile%20Dynamix%20PrinterShare%20Mobile%20Print&amp;severity=critical&amp;id=682fd4b90acd01a24927094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2394-cwe-798-use-of-hard-coded-credentials-in-ecovacs-ecovacs-mobile-and-android-application-270760</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2394%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Ecovacs%20Ecovacs%20Mobile%20and%20Android%20Application&amp;severity=medium&amp;id=682fc3a90acd01a249270760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48739-cwe-918-server-side-request-forgery-ssrf-in-strangebee-thehive-2755ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48739%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d8f30acd01a2492755ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48738-cwe-770-allocation-of-resources-without-limits-or-throttling-in-strangebee-thehive-2755ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48738%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d8f30acd01a2492755ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48741-cwe-266-incorrect-privilege-assignment-in-strangebee-thehive-2754fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48741%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d58c0acd01a2492754fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48740-cwe-352-cross-site-request-forgery-csrf-in-strangebee-thehive-2754fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48740%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StrangeBee%20TheHive&amp;severity=medium&amp;id=6830d58c0acd01a2492754fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48735-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bos-ip-camera-27531d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48735%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BOS%20IP%20camera&amp;severity=medium&amp;id=6830cad90acd01a24927531d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46176-n-a-in-n-a-27512d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46176%3A%20n%2Fa&amp;severity=medium&amp;id=6830c04f0acd01a24927512d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44998-n-a-in-n-a-27512b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44998%3A%20n%2Fa&amp;severity=medium&amp;id=6830c04f0acd01a24927512b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51102-n-a-in-n-a-2750c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830bcc50acd01a2492750c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34873-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-mobotix-p3-2743ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34873%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MOBOTIX%20P3&amp;severity=high&amp;id=6830b23b0acd01a2492743ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51099-n-a-in-n-a-273fb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51099%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830962c0acd01a249273fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48704-n-a-in-n-a-273fb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48704%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830962c0acd01a249273fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53154-cwe-125-out-of-bounds-read-in-cjson-project-cjson-273faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53154%3A%20CWE-125%20Out-of-bounds%20Read%20in%20cJSON%20project%20cJSON&amp;severity=low&amp;id=6830962c0acd01a249273faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51103-n-a-in-n-a-273fab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51103%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6830962c0acd01a249273fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48702-n-a-in-n-a-273f3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48702%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683092a10acd01a249273f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51101-n-a-in-n-a-273c9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68308f330acd01a249273c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51360-n-a-in-n-a-273c2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51360%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68308bb60acd01a249273c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51108-n-a-in-n-a-273c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51108%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308bb60acd01a249273c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51107-n-a-in-n-a-273c2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51107%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308bb60acd01a249273c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48695-cwe-266-incorrect-privilege-assignment-in-cyberdava-cyberdava-271012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48695%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20CyberDAVA%20CyberDAVA&amp;severity=medium&amp;id=682fff1b0acd01a249271012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48708-cwe-212-improper-removal-of-sensitive-information-before-storage-or-transfer-in-artifex-ghostscript-270dc0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48708%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=682ff7ee0acd01a249270dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48701-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-opendcim-opendcim-270c2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48701%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20openDCIM%20openDCIM&amp;severity=medium&amp;id=682fed6f0acd01a249270c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4692-cwe-266-in-abup-abup-iot-cloud-platform-270540</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4692%3A%20CWE-266%20in%20ABUP%20ABUP%20IoT%20Cloud%20Platform&amp;severity=medium&amp;id=682fb19c0acd01a249270540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4338-cwe-611-improper-restriction-of-xml-external-entity-reference-in-lantronix-device-installer-270542</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4338%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Lantronix%20Device%20Installer&amp;severity=medium&amp;id=682fb19c0acd01a249270542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48371-cwe-285-improper-authorization-in-openfga-openfga-27040e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48371%3A%20CWE-285%3A%20Improper%20Authorization%20in%20openfga%20openfga&amp;severity=medium&amp;id=682fa72d0acd01a24927040e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coca-cola-and-bottling-partner-named-in-separate-r-f35f1518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Coca-Cola%20and%20Bottling%20Partner%20Named%20in%20Separate%20Ransomware%20and%20Data%20Breach%20Claims&amp;severity=medium&amp;id=68367d52182aa0cae2325993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47181-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-edge-chromium-based-updater-270269</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47181%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)%20Updater&amp;severity=high&amp;id=682fa3a90acd01a249270269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targets-tajikistan-new-macro-word-documents-phishing-tactics-272525</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targets%20Tajikistan%3A%20New%20Macro%20Word%20Documents%20Phishing%20Tactics&amp;severity=medium&amp;id=683072f20acd01a249272525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/caught-in-the-captcha-how-clickfix-is-weaponizing-verification-fatigue-to-deliver-rats-infostealers-27252d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Caught%20in%20the%20CAPTCHA%3A%20How%20ClickFix%20is%20Weaponizing%20Verification%20Fatigue%20to%20Deliver%20RATs%20%26%20Infostealers&amp;severity=medium&amp;id=683072f20acd01a24927252d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4975-cwe-269-improper-privilege-management-in-tp-link-systems-inc-tp-link-tapo-app-27002e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4975%3A%20CWE-863%20Incorrect%20Authorization%20in%20TP-Link%20Systems%20Inc.%20TP-Link%20Tapo%20app&amp;severity=medium&amp;id=682f99000acd01a24927002e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48374-cwe-532-insertion-of-sensitive-information-into-log-file-in-project-zot-zot-270034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48374%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20project-zot%20zot&amp;severity=medium&amp;id=682f99000acd01a249270034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48373-cwe-863-incorrect-authorization-in-schule111-schule-27003c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48373%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20schule111%20Schule&amp;severity=medium&amp;id=682f99000acd01a24927003c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48372-cwe-521-weak-password-requirements-in-schule111-schule-27003a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48372%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20schule111%20Schule&amp;severity=medium&amp;id=682f99000acd01a24927003a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5962-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-wso2-wso2-api-manager-264b38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=medium&amp;id=682f80630acd01a249264b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7487-cwe-287-improper-authentication-in-wso2-wso2-identity-server-264ac4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7487%3A%20CWE-287%20Improper%20Authentication%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=682f7ce40acd01a249264ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7103-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-wso2-wso2-identity-server-26479f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WSO2%20WSO2%20Identity%20Server&amp;severity=medium&amp;id=682f725b0acd01a24926479f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51552-cwe-257-storing-passwords-in-a-recoverable-format-in-abb-aspect-enterprise-26479d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51552%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f725b0acd01a24926479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13958-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-abb-aspect-enterprise-26479b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13958%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f725b0acd01a24926479b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13957-cwe-918-server-side-request-forgery-ssrf-in-abb-aspect-enterprise-264799</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13957%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f725b0acd01a249264799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13956-cwe-295-improper-certificate-validation-in-abb-aspect-enterprise-264797</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13956%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f725b0acd01a249264797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13955-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-abb-aspect-enterprise-264795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13955%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=critical&amp;id=682f725b0acd01a249264795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13954-cwe-922-insecure-storage-of-sensitive-information-in-abb-aspect-enterprise-2646d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13954%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13953-cwe-359-exposure-of-private-information-privacy-violation-in-abb-aspect-enterprise-2646d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13953%3A%20CWE-359%20Exposure%20of%20Private%20Information%20(&apos;Privacy%20Violation&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13952-cwe-94-improper-control-of-generation-of-code-in-abb-aspect-enterprise-2646d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13952%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6ee00acd01a2492646d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6914-cwe-863-incorrect-authorization-in-wso2-wso2-api-manager-2646dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6914%3A%20CWE-863%20Incorrect%20Authorization%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=682f6ee00acd01a2492646dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51553-cwe-73-external-control-of-file-name-or-path-in-abb-aspect-enterprise-2646da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51553%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6ee00acd01a2492646da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13951-cwe-760-use-of-a-one-way-hash-with-a-predictable-salt-in-abb-aspect-enterprise-2646d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13951%3A%20CWE-760%20Use%20of%20a%20One-Way%20Hash%20with%20a%20Predictable%20Salt%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13950-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-abb-aspect-enterprise-2646ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13950%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13949-cwe-117-improper-output-neutralization-for-logs-in-abb-aspect-enterprise-2646cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13949%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6ee00acd01a2492646cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48848-cwe-774-allocation-of-file-descriptors-or-handles-without-limits-or-throttling-in-abb-aspect-enterprise-2646d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48848%3A%20CWE-774%20Allocation%20of%20File%20Descriptors%20or%20Handles%20Without%20Limits%20or%20Throttling%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6ee00acd01a2492646d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13948-cwe-276-incorrect-default-permissions-in-abb-aspect-enterprise-264616</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13948%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f6b520acd01a249264616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13947-cwe-863-incorrect-authorization-in-abb-aspect-enterprise-264614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13947%3A%20CWE-863%20Incorrect%20Authorization%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6b520acd01a249264614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13946-cwe-427-uncontrolled-search-path-element-in-abb-aspect-enterprise-264612</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13946%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f6b520acd01a249264612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13931-cwe-606-unchecked-input-for-loop-condition-in-abb-aspect-enterprise-264586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13931%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f67ff0acd01a249264586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13930-cwe-606-unchecked-input-for-loop-condition-in-abb-aspect-enterprise-264584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13930%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f67ff0acd01a249264584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13929-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-264582</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13929%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f67ff0acd01a249264582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13928-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-2645a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13928%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f67ff0acd01a2492645a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30169-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-abb-aspect-enterprise-264580</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30169%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f67ff0acd01a249264580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30173-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-abb-aspect-enterprise-2644b6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30173%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f64490acd01a2492644b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30172-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-2644b4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30172%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30171-cwe-863-incorrect-authorization-in-abb-aspect-enterprise-2644b2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30171%3A%20CWE-863%20Incorrect%20Authorization%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30170-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-abb-aspect-enterprise-2644d7</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30170%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ABB%20ASPECT-Enterprise&amp;severity=medium&amp;id=682f64490acd01a2492644d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2409-cwe-73-external-control-of-file-name-or-path-in-abb-aspect-enterprise-2644d3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2409%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48369-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-intermesh-groupoffice-2644d9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48369%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=682f64490acd01a2492644d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2410-cwe-36-absolute-path-traversal-in-abb-aspect-enterprise-2644d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2410%3A%20CWE-99%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f64490acd01a2492644d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48368-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-intermesh-groupoffice-264436</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48368%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=682f60d40acd01a249264436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48366-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-intermesh-groupoffice-264434</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48366%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Intermesh%20groupoffice&amp;severity=medium&amp;id=682f60d40acd01a249264434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9639-cwe-94-improper-control-of-generation-of-code-code-injection-in-abb-aspect-enterprise-26442e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9639%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f60d40acd01a24926442e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48075-cwe-129-improper-validation-of-array-index-in-gofiber-fiber-264432</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48075%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20gofiber%20fiber&amp;severity=high&amp;id=682f60d40acd01a249264432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48066-cwe-226-sensitive-information-in-resource-not-removed-before-reuse-in-wireapp-wire-webapp-264430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48066%3A%20CWE-226%3A%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682f60d40acd01a249264430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48061-cwe-613-insufficient-session-expiration-in-wireapp-wire-webapp-264046</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48061%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682f5d2a0acd01a249264046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47780-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-asterisk-asterisk-263fd2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47780%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20asterisk%20asterisk&amp;severity=medium&amp;id=682f59b40acd01a249263fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47779-cwe-140-improper-neutralization-of-delimiters-in-asterisk-asterisk-263fda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47779%3A%20CWE-140%3A%20Improper%20Neutralization%20of%20Delimiters%20in%20asterisk%20asterisk&amp;severity=high&amp;id=682f59b40acd01a249263fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46716-cwe-125-out-of-bounds-read-in-sandboxie-plus-sandboxie-263fd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46716%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20sandboxie-plus%20Sandboxie&amp;severity=medium&amp;id=682f59b40acd01a249263fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43596-cwe-276-incorrect-default-permissions-in-msp360-backup-263fd4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43596%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MSP360%20Backup&amp;severity=high&amp;id=682f59b40acd01a249263fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46715-cwe-787-out-of-bounds-write-in-sandboxie-plus-sandboxie-263f60</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46715%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=682f56360acd01a249263f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48850-cwe-36-absolute-path-traversal-in-abb-aspect-enterprise-263f5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48850%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20ABB%20ASPECT-Enterprise&amp;severity=high&amp;id=682f56360acd01a249263f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48853-cwe-286-incorrect-user-management-in-abb-aspect-enterprise-263f5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48853%3A%20CWE-286%20Incorrect%20User%20Management%20in%20ABB%20ASPECT-Enterprise&amp;severity=critical&amp;id=682f56360acd01a249263f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33138-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-ibm-aspera-faspex-263f5e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33138%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=682f56360acd01a249263f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33137-cwe-602-client-side-enforcement-of-server-side-security-in-ibm-aspera-faspex-263f64</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33137%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Aspera%20Faspex&amp;severity=high&amp;id=682f56360acd01a249263f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33136-cwe-471-modification-of-assumed-immutable-data-maid-in-ibm-aspera-faspex-263d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33136%3A%20CWE-471%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20IBM%20Aspera%20Faspex&amp;severity=high&amp;id=682f52a60acd01a249263d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4366-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-2622ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4366%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=high&amp;id=682f4bbb0acd01a2492622ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23183-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-ubtech-freepass-262081</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23183%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20UBtech%20Freepass&amp;severity=medium&amp;id=682f44a50acd01a249262081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5081-sql-injection-in-campcodes-cybercafe-management-system-262083</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5081%3A%20SQL%20Injection%20in%20Campcodes%20Cybercafe%20Management%20System&amp;severity=medium&amp;id=682f44a50acd01a249262083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23182-cwe-203-observable-discrepancy-in-ubtech-freepass-26207f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23182%3A%20CWE-203%20Observable%20Discrepancy%20in%20UBtech%20Freepass&amp;severity=medium&amp;id=682f44a50acd01a24926207f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2506-cwe-862-missing-authorization-in-enterprisedb-pglogical-262087</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2506%3A%20CWE-862%20Missing%20Authorization%20in%20EnterpriseDB%20pglogical&amp;severity=medium&amp;id=682f44a50acd01a249262087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5080-stack-based-buffer-overflow-in-tenda-fh451-261df8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5080%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20FH451&amp;severity=high&amp;id=682f3d940acd01a249261df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5024-uncontrolled-resource-consumption-in-red-hat-red-hat-enterprise-linux-10-261e04</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5024%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=high&amp;id=682f3d940acd01a249261e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/exploits-cityworks-zero-day-vulnerability-to-deliver-malware-2611c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Exploits%20Cityworks%20zero-day%20vulnerability%20to%20deliver%20malware&amp;severity=medium&amp;id=682f3a100acd01a2492611c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12093-cwe-1288-improper-validation-of-consistency-within-input-in-gitlab-gitlab-261108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12093%3A%20CWE-1288%3A%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f368b0acd01a249261108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0605-cwe-1390-weak-authentication-in-gitlab-gitlab-26110a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0605%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f368b0acd01a24926110a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0679-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-gitlab-gitlab-26110c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0679%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f368b0acd01a24926110c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0993-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-26110e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0993%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682f368b0acd01a24926110e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5079-sql-injection-in-campcodes-online-shopping-portal-261110</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5079%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682f368b0acd01a249261110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32915-cwe-732-incorrect-permission-assignment-for-critical-resource-in-checkmk-gmbh-checkmk-260fa2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32915%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682f33050acd01a249260fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1110-cwe-1220-insufficient-granularity-of-access-control-in-gitlab-gitlab-260fac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1110%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682f33050acd01a249260fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5078-sql-injection-in-campcodes-online-shopping-portal-25c8cb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5078%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682f2fb50acd01a24925c8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5077-sql-injection-in-campcodes-online-shopping-portal-25c8c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5077%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682f2fb50acd01a24925c8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4575-cwe-295-improper-certificate-validation-in-openssl-openssl-25c223</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4575%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682f2c0b0acd01a24925c223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5076-buffer-overflow-in-freefloat-ftp-server-25c227</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5076%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f2c0b0acd01a24925c227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2853-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-25c21f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2853%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f2c0b0acd01a24925c21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3111-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-25c221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3111%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f2c0b0acd01a24925c221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4979-cwe-1220-insufficient-granularity-of-access-control-in-gitlab-gitlab-25c225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4979%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682f2c0b0acd01a24925c225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pupkinstealer-net-infostealer-using-telegram-for-data-theft-2610f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PupkinStealer%20.NET%20Infostealer%20Using%20Telegram%20for%20Data%20Theft&amp;severity=medium&amp;id=682f36850acd01a2492610f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-adult-content-scam-targets-mobile-users-through-pwa-injection-2611e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Adult%20Content%20Scam%20Targets%20Mobile%20Users%20Through%20PWA%20Injection&amp;severity=medium&amp;id=682f3a100acd01a2492611e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3945-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-tridium-niagara-framework-25b868</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3945%3A%20CWE-88%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Tridium%20Niagara%20Framework&amp;severity=high&amp;id=682f1e0e0acd01a24925b868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3944-cwe-732-incorrect-permission-assignment-for-critical-resource-in-tridium-niagara-framework-25b866</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3944%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tridium%20Niagara%20Framework&amp;severity=high&amp;id=682f1e0e0acd01a24925b866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3943-cwe-598-use-of-get-request-method-with-sensitive-query-strings-in-tridium-niagara-framework-25b864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3943%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3942-cwe-117-improper-output-neutralization-for-logs-in-tridium-niagara-framework-25b862</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3942%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3941-cwe-69-improper-handling-of-windows-data-alternate-data-stream-in-tridium-niagara-framework-25b860</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3941%3A%20CWE-69%20Improper%20Handling%20of%20Windows%20%3A%3ADATA%20Alternate%20Data%20Stream%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3940-cwe-1173-improper-use-of-validation-framework-in-tridium-niagara-framework-25b85e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3940%3A%20CWE-1173%20Improper%20Use%20of%20Validation%20Framework%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3939-cwe-204-observable-response-discrepancy-in-tridium-niagara-framework-25b85c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3939%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3938-cwe-325-missing-cryptographic-step-in-tridium-niagara-framework-25b85a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3938%3A%20CWE-325%20Missing%20Cryptographic%20Step%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1e0e0acd01a24925b85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5075-buffer-overflow-in-freefloat-ftp-server-25b86a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5075%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f1e0e0acd01a24925b86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46714-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-sandboxie-plus-sandboxie-25abd6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46714%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=682f1a9a0acd01a24925abd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3937-cwe-916-use-of-password-hash-with-insufficient-computational-effort-in-tridium-niagara-framework-25abd2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3937%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Tridium%20Niagara%20Framework&amp;severity=high&amp;id=682f1a9a0acd01a24925abd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46713-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-sandboxie-plus-sandboxie-25abd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46713%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20sandboxie-plus%20Sandboxie&amp;severity=high&amp;id=682f1a9a0acd01a24925abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2272-cwe-427-uncontrolled-search-path-element-in-forcepoint-fie-endpoint-25abce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2272%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Forcepoint%20FIE%20Endpoint&amp;severity=high&amp;id=682f1a9a0acd01a24925abce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3936-cwe-732-incorrect-permission-assignment-for-critical-resource-in-tridium-niagara-framework-25abd0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3936%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Tridium%20Niagara%20Framework&amp;severity=medium&amp;id=682f1a9a0acd01a24925abd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5074-buffer-overflow-in-freefloat-ftp-server-25a7e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5074%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f13970acd01a24925a7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/data-stealing-chrome-extensions-impersonate-fortinet-youtube-vpns-258e9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Data-stealing%20Chrome%20extensions%20impersonate%20Fortinet%2C%20YouTube%2C%20VPNs&amp;severity=medium&amp;id=682f08eb0acd01a249258e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5073-buffer-overflow-in-freefloat-ftp-server-258d24</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5073%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682f05630acd01a249258d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41403-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-258cbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41403%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=682f01f40acd01a249258cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3836-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-258cbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3836%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=682f01f40acd01a249258cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3444-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-manageengine-servicedesk-plus-msp-258a0f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3444%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ManageEngine%20ServiceDesk%20Plus%20MSP&amp;severity=medium&amp;id=682efe550acd01a249258a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25010-cwe-20-improper-input-validation-in-ericsson-ericsson-ran-compute-basebands-all-bb-variants-257e23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25010%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ericsson%20Ericsson%20RAN%20Compute%20Basebands%20(all%20BB%20variants)&amp;severity=high&amp;id=682eface0acd01a249257e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4280-cwe-276-incorrect-default-permissions-in-poedit-poedit-257db6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4280%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Poedit%20Poedit&amp;severity=medium&amp;id=682ef76d0acd01a249257db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4419-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-hotwptemplates-hot-random-image-257c56</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4419%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20hotwptemplates%20Hot%20Random%20Image&amp;severity=medium&amp;id=682ef04c0acd01a249257c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4405-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hotwptemplates-hot-random-image-257c54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hotwptemplates%20Hot%20Random%20Image&amp;severity=medium&amp;id=682ef04c0acd01a249257c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9544-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mapsvg-mapsvg-257c52</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9544%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20MapSVG%20MapSVG&amp;severity=medium&amp;id=682ef04c0acd01a249257c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/authenticated-remote-code-execution-in-netwrix-pas-ea1ff9af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Authenticated%20Remote%20Code%20Execution%20in%20Netwrix%20Password%20Secure%20(CVE-2025-26817)&amp;severity=medium&amp;id=68367d92182aa0cae23259ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4123-cwe-79-in-grafana-grafana-256ff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4123%3A%20CWE-79%20in%20Grafana%20Grafana&amp;severity=high&amp;id=682edeb90acd01a249256ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-to-enumerate-and-exploit-cefsharp-thick-client-082da1b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20to%20Enumerate%20and%20Exploit%20CefSharp%20Thick%20Clients%20Using%20CefEnum&amp;severity=medium&amp;id=68367d93182aa0cae23259c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4133-cwe-79-cross-site-scripting-xss-in-unknown-blog2social-social-media-auto-post-scheduler-254f4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4133%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=682ec2890acd01a249254f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5062-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-automattic-woocommerce-253bf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20automattic%20WooCommerce&amp;severity=medium&amp;id=682e9f7d0acd01a249253bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2759-cwe-732-incorrect-permission-assignment-for-critical-resource-in-gstreamer-gstreamer-253206</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2759%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20GStreamer%20GStreamer&amp;severity=high&amp;id=682e78df0acd01a249253206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3486-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-allegra-allegra-253212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3486%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Allegra%20Allegra&amp;severity=high&amp;id=682e78df0acd01a249253212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3480-cwe-522-insufficiently-protected-credentials-in-meddream-web-dicom-viewer-253208</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3480%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20MedDream%20WEB%20DICOM%20Viewer&amp;severity=medium&amp;id=682e78df0acd01a249253208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3481-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-25320a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3481%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a24925320a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3482-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-25320c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3482%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a24925320c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3483-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-25320e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3483%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a24925320e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3484-cwe-121-stack-based-buffer-overflow-in-meddream-pacs-server-253210</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3484%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20MedDream%20PACS%20Server&amp;severity=critical&amp;id=682e78df0acd01a249253210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3885-cwe-20-improper-input-validation-in-harman-becker-mgu21-253220</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3885%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Harman%20Becker%20MGU21&amp;severity=medium&amp;id=682e78df0acd01a249253220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3884-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-cloudera-hue-25321e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3884%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cloudera%20Hue&amp;severity=high&amp;id=682e78df0acd01a24925321e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3883-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-253218</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3883%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2&amp;severity=high&amp;id=682e78df0acd01a249253218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3882-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-253216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3882%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2&amp;severity=high&amp;id=682e78df0acd01a249253216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3881-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-253214</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3881%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2&amp;severity=high&amp;id=682e78df0acd01a249253214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3887-cwe-121-stack-based-buffer-overflow-in-gstreamer-gstreamer-253222</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3887%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20GStreamer%20GStreamer&amp;severity=high&amp;id=682e78df0acd01a249253222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41198-n-a-in-n-a-266e5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41198%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41197-n-a-in-n-a-266e5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41196-n-a-in-n-a-266e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41195-n-a-in-n-a-266e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41195%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f866a0acd01a249266e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40462-n-a-in-n-a-266e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40462%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40461-n-a-in-n-a-266e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40461%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40460-n-a-in-n-a-266e51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40460%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40459-n-a-in-n-a-266e4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40459%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40458-n-a-in-n-a-266e4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40458%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f866a0acd01a249266e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41199-n-a-in-n-a-264b44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41199%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f80630acd01a249264b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52874-n-a-in-n-a-264044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f5d2a0acd01a249264044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45472-n-a-in-n-a-263fd6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45472%3A%20n%2Fa&amp;severity=high&amp;id=682f59b40acd01a249263fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45468-n-a-in-n-a-26288d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45468%3A%20n%2Fa&amp;severity=high&amp;id=682f4f480acd01a24926288d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45471-n-a-in-n-a-261df6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45471%3A%20n%2Fa&amp;severity=high&amp;id=682f3d940acd01a249261df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32815-n-a-in-n-a-26122a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32815%3A%20n%2Fa&amp;severity=medium&amp;id=682f3a190acd01a24926122a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32813-n-a-in-n-a-261228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32813%3A%20n%2Fa&amp;severity=high&amp;id=682f3a190acd01a249261228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54188-n-a-in-n-a-261226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f3a190acd01a249261226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32814-n-a-in-n-a-261207</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32814%3A%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a249261207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47466-cwe-476-null-pointer-dereference-in-taglib-taglib-260fae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47466%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20TagLib%20TagLib&amp;severity=low&amp;id=682f33050acd01a249260fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dero-miner-spreads-inside-containerized-linux-environments-25636b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dero%20miner%20spreads%20inside%20containerized%20Linux%20environments&amp;severity=medium&amp;id=682ed0bd0acd01a24925636b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-is-out-of-business-25638b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20is%20Out...%20of%20business!&amp;severity=medium&amp;id=682ed0bd0acd01a24925638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5059-unrestricted-upload-in-campcodes-online-shopping-portal-24f2ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5059%3A%20Unrestricted%20Upload%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e559b0acd01a24924f2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34025-cwe-732-incorrect-permission-assignment-for-critical-resource-in-versa-concerto-24f2ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34025%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Versa%20Concerto&amp;severity=high&amp;id=682e559b0acd01a24924f2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48070-cwe-276-incorrect-default-permissions-in-makeplane-plane-24f1a4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48070%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20makeplane%20plane&amp;severity=low&amp;id=682e521b0acd01a24924f1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47947-cwe-1050-excessive-platform-resource-consumption-within-a-loop-in-owasp-modsecurity-modsecurity-24f1a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47947%3A%20CWE-1050%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop%20in%20owasp-modsecurity%20ModSecurity&amp;severity=high&amp;id=682e521b0acd01a24924f1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34026-cwe-287-improper-authentication-in-versa-concerto-24f1a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34026%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Versa%20Concerto&amp;severity=critical&amp;id=682e521b0acd01a24924f1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5057-sql-injection-in-campcodes-online-shopping-portal-24f0d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5057%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e4eb10acd01a24924f0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5056-sql-injection-in-campcodes-online-shopping-portal-24f0d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5056%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e4eb10acd01a24924f0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34027-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-versa-concerto-24f0d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34027%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Versa%20Concerto&amp;severity=critical&amp;id=682e4eb10acd01a24924f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47942-cwe-862-missing-authorization-in-openedx-edx-platform-24f008</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47942%3A%20CWE-862%3A%20Missing%20Authorization%20in%20openedx%20edx-platform&amp;severity=medium&amp;id=682e4b280acd01a24924f008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5053-buffer-overflow-in-freefloat-ftp-server-24f00c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5053%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e4b280acd01a24924f00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5052-buffer-overflow-in-freefloat-ftp-server-24f00a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5052%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e4b280acd01a24924f00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5051-buffer-overflow-in-freefloat-ftp-server-24ee89</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5051%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e44190acd01a24924ee89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36535-cwe-306-missing-authentication-for-critical-function-in-automationdirect-mb-gateway-24ee8d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36535%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20AutomationDirect%20MB-Gateway&amp;severity=critical&amp;id=682e44190acd01a24924ee8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41426-cwe-121-stack-based-buffer-overflow-in-vertiv-liebert-rdu101-2eda86</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41426%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Vertiv%20Liebert%20RDU101&amp;severity=critical&amp;id=682e2a713750f1bc872eda86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46412-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-vertiv-liebert-rdu101-2eda88</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46412%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Vertiv%20Liebert%20RDU101&amp;severity=critical&amp;id=682e2a713750f1bc872eda88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5050-buffer-overflow-in-freefloat-ftp-server-c6a545</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5050%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5049-buffer-overflow-in-freefloat-ftp-server-c6a543</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5049%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2261-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-tibco-software-inc-tibco-bpm-enterprise-c6a53f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TIBCO%20Software%20Inc%20TIBCO%20BPM%20Enterprise&amp;severity=high&amp;id=682e1d8dc4522896dcc6a53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3751-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tibco-software-inc-tibco-activematrix-businessworks-c69c19</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3751%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TIBCO%20Software%20Inc%20TIBCO%20ActiveMatrix%20BusinessWorks&amp;severity=high&amp;id=682e1a01c4522896dcc69c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48069-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-shopify-ejson2env-c69345</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48069%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Shopify%20ejson2env&amp;severity=medium&amp;id=682e12f6c4522896dcc69345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48064-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-desktop-desktop-c6934f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48064%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20desktop%20desktop&amp;severity=low&amp;id=682e12f6c4522896dcc6934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48063-cwe-285-improper-authorization-in-xwiki-xwiki-platform-c6934d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48063%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682e12f6c4522896dcc6934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48060-cwe-121-stack-based-buffer-overflow-in-jqlang-jq-c513dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48060%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20jqlang%20jq&amp;severity=high&amp;id=682e0f74c4522896dcc513dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5033-cross-site-request-forgery-in-xiaobingby-teacms-c513de</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5033%3A%20Cross-Site%20Request%20Forgery%20in%20XiaoBingby%20TeaCMS&amp;severity=medium&amp;id=682e0f74c4522896dcc513de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47291-cwe-266-incorrect-privilege-assignment-in-containerd-containerd-c513da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47291%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20containerd%20containerd&amp;severity=medium&amp;id=682e0f74c4522896dcc513da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26147-authenticated-rce-in-denodo-schedul-138004f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26147%3A%20Authenticated%20RCE%20In%20Denodo%20Scheduler&amp;severity=medium&amp;id=68367d93182aa0cae23259c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46822-cwe-36-absolute-path-traversal-in-osamataher-java-springboot-codebase-c513d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46822%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20OsamaTaher%20Java-springboot-codebase&amp;severity=high&amp;id=682e0f74c4522896dcc513d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2102-cwe-59-improper-link-resolution-before-file-access-link-following-in-hypr-passwordless-c513e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2102%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HYPR%20Passwordless&amp;severity=medium&amp;id=682e0f74c4522896dcc513e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5020-links-using-non-http-schemes-opened-from-other-apps-such-as-safari-could-have-allowed-spoofing-of-website-addresses-in-mozilla-firefox-for-ios-c513e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5020%3A%20Links%20using%20non-HTTP%20schemes%20opened%20from%20other%20apps%20such%20as%20Safari%20could%20have%20allowed%20spoofing%20of%20website%20addresses%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=682e0f74c4522896dcc513e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0372-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-hypr-passwordless-c43f67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0372%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20HYPR%20Passwordless&amp;severity=medium&amp;id=682e0bf8c4522896dcc43f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5032-sql-injection-in-campcodes-online-shopping-portal-c37277</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5032%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682e087cc4522896dcc37277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5031-resource-consumption-in-ackites-killwxapkg-c3725b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5031%3A%20Resource%20Consumption%20in%20Ackites%20KillWxapkg&amp;severity=low&amp;id=682e087cc4522896dcc3725b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-adversary-telegram-bots-help-to-reveal-threats-case-study-c32dcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Adversary%20Telegram%20Bots%20Help%20to%20Reveal%20Threats%3A%20Case%20Study&amp;severity=medium&amp;id=682e0875c4522896dcc32dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20250-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-webex-meetings-c246c7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20247-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-webex-meetings-c246c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20247%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20246-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-webex-meetings-c246c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20258-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-cisco-cisco-duo-c246cb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20258%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Duo&amp;severity=medium&amp;id=682e04ecc4522896dcc246cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20255-acceptance-of-extraneous-untrusted-data-with-trusted-data-in-cisco-cisco-webex-meetings-c246c9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20255%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Cisco%20Cisco%20Webex%20Meetings&amp;severity=medium&amp;id=682e04ecc4522896dcc246c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20242-improper-access-control-in-cisco-cisco-unified-contact-center-enterprise-c246cd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20242%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Enterprise&amp;severity=medium&amp;id=682e04ecc4522896dcc246cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5030-os-command-injection-in-ackites-killwxapkg-c246cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5030%3A%20OS%20Command%20Injection%20in%20Ackites%20KillWxapkg&amp;severity=low&amp;id=682e04ecc4522896dcc246cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48012-cwe-294-authentication-bypass-by-capture-replay-in-drupal-one-time-password-c0f080</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48012%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Drupal%20One%20Time%20Password&amp;severity=medium&amp;id=682e0169c4522896dcc0f080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48011-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-one-time-password-c0f078</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48011%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20One%20Time%20Password&amp;severity=medium&amp;id=682e0169c4522896dcc0f078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48010-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-one-time-password-c0f076</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48010%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20One%20Time%20Password&amp;severity=medium&amp;id=682e0169c4522896dcc0f076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48009-cwe-862-missing-authorization-in-drupal-single-content-sync-c0f074</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48009%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Single%20Content%20Sync&amp;severity=low&amp;id=682e0169c4522896dcc0f074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4416-cwe-770-allocation-of-resources-without-limits-or-throttling-in-drupal-events-log-track-c0f084</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4416%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Drupal%20Events%20Log%20Track&amp;severity=high&amp;id=682e0169c4522896dcc0f084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4415-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-piwik-pro-c0f082</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4415%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Piwik%20PRO&amp;severity=medium&amp;id=682e0169c4522896dcc0f082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20267-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-cisco-cisco-identity-services-engine-software-c0f072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20267%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=682e0169c4522896dcc0f072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20257-incorrect-authorization-in-cisco-cisco-secure-network-analytics-c0f070</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20257%3A%20Incorrect%20Authorization%20in%20Cisco%20Cisco%20Secure%20Network%20Analytics&amp;severity=medium&amp;id=682e0169c4522896dcc0f070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20256-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cisco-cisco-secure-network-analytics-c0f06e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20256%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Network%20Analytics&amp;severity=medium&amp;id=682e0169c4522896dcc0f06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20113-client-side-enforcement-of-server-side-security-in-cisco-cisco-unified-contact-center-express-c0f068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20113%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=high&amp;id=682e0169c4522896dcc0f068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20114-authorization-bypass-through-user-controlled-key-in-cisco-cisco-unified-contact-center-express-c0f06a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20114%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Express&amp;severity=medium&amp;id=682e0169c4522896dcc0f06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20152-out-of-bounds-read-in-cisco-cisco-identity-services-engine-software-c0f06c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20152%3A%20Out-of-bounds%20Read%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=high&amp;id=682e0169c4522896dcc0f06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20112-privilege-chaining-in-cisco-cisco-emergency-responder-c0f066</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20112%3A%20Privilege%20Chaining%20in%20Cisco%20Cisco%20Emergency%20Responder&amp;severity=medium&amp;id=682e0169c4522896dcc0f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor-c435d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cloudy%20with%20a%20Chance%20of%20Hijacking%20Forgotten%20DNS%20Records%20Enable%20Scam%20Actor&amp;severity=medium&amp;id=682e0bf6c4522896dcc435d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-threats-of-dual-function-malware-found-in-chrome-extensions-c4356c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hidden%20Threats%20of%20Dual-Function%20Malware%20Found%20in%20Chrome%20Extensions&amp;severity=medium&amp;id=682e0bf6c4522896dcc4356c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badsuccessor-abusing-dmsa-to-escalate-privileges-i-3e0de8fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadSuccessor%3A%20Abusing%20dMSA%20to%20Escalate%20Privileges%20in%20Active%20Directory&amp;severity=medium&amp;id=68367d92182aa0cae23259af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-sting-of-fake-kling-facebook-malvertising-lures-victims-to-fake-ai-generation-website-c0ad64</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Sting%20of%20Fake%20Kling%3A%20Facebook%20Malvertising%20Lures%20Victims%20to%20Fake%20AI%20Generation%20Website&amp;severity=medium&amp;id=682df6d6c4522896dcc0ad64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4008-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-smartbedded-meteobridge-c0655d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4008%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Smartbedded%20MeteoBridge&amp;severity=high&amp;id=682df35bc4522896dcc0655d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23337-cwe-190-integer-overflow-or-wraparound-in-jqlang-jq-c0041f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23337%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20jqlang%20jq&amp;severity=medium&amp;id=682de8d1c4522896dcc0041f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5029-path-traversal-in-kingdee-cloud-galaxy-private-cloud-bbc-system-bfff82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5029%3A%20Path%20Traversal%20in%20Kingdee%20Cloud%20Galaxy%20Private%20Cloud%20BBC%20System&amp;severity=medium&amp;id=682de546c4522896dcbfff82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dero-miner-zombies-biting-through-docker-apis-to-build-a-cryptojacking-horde-c32dc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dero%20miner%20zombies%20biting%20through%20Docker%20APIs%20to%20build%20a%20cryptojacking%20horde&amp;severity=medium&amp;id=682e0875c4522896dcc32dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1421-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-proget-konsola-proget-bfd720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1421%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Proget%20Proget&amp;severity=low&amp;id=682dd047c4522896dcbfd720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1420-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-proget-konsola-proget-bfd71e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proget%20Proget&amp;severity=low&amp;id=682dd047c4522896dcbfd71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1419-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-proget-konsola-proget-bfd71c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Proget%20Proget&amp;severity=low&amp;id=682dd047c4522896dcbfd71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1418-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfd71a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1418%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=medium&amp;id=682dd047c4522896dcbfd71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1417-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfd718</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1417%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=medium&amp;id=682dd047c4522896dcbfd718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1416-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfd716</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1416%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=high&amp;id=682dd047c4522896dcbfd716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40775-cwe-232-improper-handling-of-undefined-values-in-isc-bind-9-bfd2bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40775%3A%20CWE-232%20Improper%20Handling%20of%20Undefined%20Values%20in%20ISC%20BIND%209&amp;severity=high&amp;id=682dcca2c4522896dcbfd2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48417-cwe-321-use-of-hard-coded-cryptographic-key-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfcdcb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48417%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dc923c4522896dcbfcdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48416-cwe-912-hidden-functionality-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48416%3A%20CWE-912%20Hidden%20Functionality%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=high&amp;id=682dc591c4522896dcbfc975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48415-cwe-749-exposed-dangerous-method-or-function-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc973</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48415%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dc591c4522896dcbfc973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48414-cwe-798-use-of-hard-coded-credentials-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc038</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48414%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dbe9bc4522896dcbfc038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48413-cwe-798-use-of-hard-coded-credentials-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc036</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48413%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=high&amp;id=682dbe9bc4522896dcbfc036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27804-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfc03a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27804%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dbe9bc4522896dcbfc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27803-cwe-306-missing-authentication-for-critical-function-in-echarge-hardy-barth-cph2-cpp2-charging-stations-bfbbd3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27803%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20eCharge%20Hardy%20Barth%20cPH2%20%2F%20cPP2%20charging%20stations&amp;severity=medium&amp;id=682dbb0ac4522896dcbfbbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1415-cwe-863-incorrect-authorization-in-proget-konsola-proget-bfaee0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1415%3A%20CWE-863%20Incorrect%20Authorization%20in%20Proget%20Proget&amp;severity=medium&amp;id=682db07dc4522896dcbfaee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41232-vulnerability-in-spring-spring-security-bfaa8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41232%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=critical&amp;id=682dad13c4522896dcbfaa8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evilworker-a-new-aitm-attack-framework-leveraging--a96383bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=EvilWorker%3A%20a%20new%20AiTM%20attack%20framework%20leveraging%20service%20workers%20%E2%80%94%20much%20more%20effective%2C%20autonomous%2C%20and%20adaptable%20than%20Evilginx2%3F%20%F0%9F%8E%A3&amp;severity=medium&amp;id=68367d92182aa0cae23259b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4221-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-baswaniyash-animated-buttons-bf994e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baswaniyash%20Animated%20Buttons&amp;severity=medium&amp;id=682d9f07c4522896dcbf994e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4219-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darkyudex-dpepress-bf994c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4219%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darkyudex%20DPEPress&amp;severity=medium&amp;id=682d9f07c4522896dcbf994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12561-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-wecantrack-affiliate-sales-in-google-analytics-and-other-tools-bf9942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12561%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wecantrack%20Affiliate%20Sales%20in%20Google%20Analytics%20and%20other%20tools&amp;severity=medium&amp;id=682d9f07c4522896dcbf9942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4217-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-measuremarketing-wp-youtube-video-optimizer-bf994a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20measuremarketing%20WP%20YouTube%20Video%20Optimizer&amp;severity=medium&amp;id=682d9f07c4522896dcbf994a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3750-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-johnzenausa-network-posts-extended-bf9944</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnzenausa%20Network%20Posts%20Extended&amp;severity=medium&amp;id=682d9f07c4522896dcbf9944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4105-cwe-862-missing-authorization-in-splitit-splitit-bf9948</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4105%3A%20CWE-862%20Missing%20Authorization%20in%20splitit%20Splitit&amp;severity=medium&amp;id=682d9f07c4522896dcbf9948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4611-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rilwis-slim-seo-fast-automated-wordpress-seo-plugin-bf9950</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rilwis%20Slim%20SEO%20%E2%80%93%20Fast%20%26%20Automated%20WordPress%20SEO%20Plugin&amp;severity=medium&amp;id=682d9f07c4522896dcbf9950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4803-cwe-502-deserialization-of-untrusted-data-in-steinrein-glossary-by-wppedia-best-glossary-plugin-for-wordpress-bf9952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4803%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20steinrein%20Glossary%20by%20WPPedia%20%E2%80%93%20Best%20Glossary%20plugin%20for%20WordPress&amp;severity=high&amp;id=682d9f07c4522896dcbf9952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3781-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-creativefreedomau-raisely-donation-form-bf9946</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativefreedomau%20Raisely%20Donation%20Form&amp;severity=medium&amp;id=682d9f07c4522896dcbf9946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1712-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-checkmk-gmbh-checkmk-bf9954</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1712%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=682d9f07c4522896dcbf9954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-16536-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-clickhouse-db-59d36f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-16536%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Clickhouse%20DB&amp;severity=high&amp;id=682d8121c631aa761259d36f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25262-cwe-116-improper-encoding-or-escaping-of-output-in-yandex-browser-59d373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25262%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Yandex%20Browser&amp;severity=medium&amp;id=682d8121c631aa761259d373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25255-cwe-20-improper-input-validation-in-yandex-browser-lite-59d371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25255%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Yandex%20Browser%20Lite&amp;severity=high&amp;id=682d8121c631aa761259d371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25254-cwe-116-improper-encoding-or-escaping-of-output-in-yandex-browser-lite-59c0de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25254%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Yandex%20Browser%20Lite&amp;severity=high&amp;id=682d7b32c631aa761259c0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4949-cwe-611-improper-restriction-of-xml-external-entity-reference-in-eclipse-jgit-eclipse-jgit-59c0e0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4949%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Eclipse%20JGit%20Eclipse%20JGit&amp;severity=medium&amp;id=682d7b32c631aa761259c0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4524-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wpstylish-madara-responsive-and-modern-wordpress-theme-for-manga-sites-244ecb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4524%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WPStylish%20Madara%20%E2%80%93%20Responsive%20and%20modern%20WordPress%20theme%20for%20manga%20sites&amp;severity=critical&amp;id=682d76fed4f2164cc9244ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4094-cwe-287-improper-authentication-in-unknown-digits-wordpress-mobile-number-signup-and-login-243b17</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4094%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20DIGITS%3A%20WordPress%20Mobile%20Number%20Signup%20and%20Login&amp;severity=critical&amp;id=682d700cd4f2164cc9243b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4969-out-of-bounds-read-in-red-hat-red-hat-enterprise-linux-6-b3fabd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4969%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=682d38bc4d7c5ea9f4b3fabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5013-cross-site-scripting-in-hkcms-2430c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5013%3A%20Cross%20Site%20Scripting%20in%20HkCms&amp;severity=medium&amp;id=682d6c76d4f2164cc92430c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5011-cross-site-scripting-in-moonlightl-hexo-boot-b3d6b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5011%3A%20Cross%20Site%20Scripting%20in%20moonlightL%20hexo-boot&amp;severity=medium&amp;id=682d18f64d7c5ea9f4b3d6b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remote-keyboard-desktop-101-remote-code-execution--8aec2a12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remote%20Keyboard%20Desktop%201.0.1%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489dc67e6d765d51d532bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-21-5e6e6a4a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-21&amp;severity=medium&amp;id=68367c98182aa0cae2320576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-21-250aa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-21&amp;severity=medium&amp;id=682e6a7b0acd01a249250aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45753-n-a-in-n-a-24f010</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45753%3A%20n%2Fa&amp;severity=high&amp;id=682e4b280acd01a24924f010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44040-n-a-in-n-a-24f00e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44040%3A%20n%2Fa&amp;severity=high&amp;id=682e4b280acd01a24924f00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45755-n-a-in-n-a-24ee8b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45755%3A%20n%2Fa&amp;severity=medium&amp;id=682e44190acd01a24924ee8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27558-n-a-in-n-a-c6bb05</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27558%3A%20n%2Fa&amp;severity=critical&amp;id=682e248fc4522896dcc6bb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44083-n-a-in-n-a-c6bafd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44083%3A%20n%2Fa&amp;severity=critical&amp;id=682e248fc4522896dcc6bafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45752-n-a-in-n-a-c6a541</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45752%3A%20n%2Fa&amp;severity=high&amp;id=682e1d8dc4522896dcc6a541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57529-n-a-in-n-a-c6a53d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45754-n-a-in-n-a-c43f80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45754%3A%20n%2Fa&amp;severity=medium&amp;id=682e0bf8c4522896dcc43f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25539-n-a-in-n-a-c37240</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25539%3A%20n%2Fa&amp;severity=medium&amp;id=682e087cc4522896dcc37240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56428-n-a-in-n-a-c37224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e087cc4522896dcc37224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27997-n-a-in-n-a-c0ced6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27997%3A%20n%2Fa&amp;severity=high&amp;id=682dfdf5c4522896dcc0ced6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48207-cwe-425-direct-request-forced-browsing-in-typo3-reint-downloadmanager-extension-c0bbc0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48207%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20reint%20downloadmanager%20extension&amp;severity=high&amp;id=682dfa70c4522896dcc0bbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27998-n-a-in-n-a-c0bbbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27998%3A%20n%2Fa&amp;severity=high&amp;id=682dfa70c4522896dcc0bbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48206-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-typo3-ns-backup-extension-c0b1a8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20ns%20backup%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48204-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-typo3-ns-backup-extension-c0b1a6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48204%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TYPO3%20ns%20backup%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48202-cwe-425-direct-request-forced-browsing-in-typo3-femanager-extension-c0b1a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48202%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20femanager%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48203-n-a-in-n-a-c0b19a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20cs%20seo%20extension&amp;severity=medium&amp;id=682df6dbc4522896dcc0b19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48200-cwe-502-deserialization-of-untrusted-data-in-typo3-sr-feuser-register-extension-c0657a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48200%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20TYPO3%20sr%20feuser%20register%20extension&amp;severity=low&amp;id=682df35bc4522896dcc0657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48205-cwe-425-direct-request-forced-browsing-in-typo3-sr-feuser-register-extension-c0655b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48205%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20sr%20feuser%20register%20extension&amp;severity=low&amp;id=682df35bc4522896dcc0655b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48201-cwe-425-direct-request-forced-browsing-in-typo3-ns-backup-extension-c06557</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48201%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20TYPO3%20ns%20backup%20extension&amp;severity=high&amp;id=682df35bc4522896dcc06557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42922-n-a-in-n-a-bff6a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42922%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682dde53c4522896dcbff6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44895-n-a-in-n-a-bff6a5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44895%3A%20n%2Fa&amp;severity=medium&amp;id=682dde53c4522896dcbff6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44892-n-a-in-n-a-bff6a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44892%3A%20n%2Fa&amp;severity=medium&amp;id=682dde53c4522896dcbff6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56429-cwe-321-use-of-hard-coded-cryptographic-key-in-itech-ilabclient-bfe632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56429%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20itech%20iLabClient&amp;severity=high&amp;id=682dd745c4522896dcbfe632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5010-cross-site-scripting-in-moonlightl-hexo-boot-b3d2bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5010%3A%20Cross%20Site%20Scripting%20in%20moonlightL%20hexo-boot&amp;severity=medium&amp;id=682d153e4d7c5ea9f4b3d2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5008-sql-injection-in-projectworlds-online-time-table-generator-b3c5c7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5008%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Time%20Table%20Generator&amp;severity=medium&amp;id=682d0acf4d7c5ea9f4b3c5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5007-cross-site-scripting-in-part-db-b3c5c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5007%3A%20Cross%20Site%20Scripting%20in%20Part-DB&amp;severity=medium&amp;id=682d0acf4d7c5ea9f4b3c5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5006-sql-injection-in-campcodes-online-shopping-portal-b3bd17</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5006%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682d03994d7c5ea9f4b3bd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5004-sql-injection-in-projectworlds-online-time-table-generator-b3bd15</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5004%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Time%20Table%20Generator&amp;severity=medium&amp;id=682d03994d7c5ea9f4b3bd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5003-sql-injection-in-projectworlds-online-time-table-generator-b3b47a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5003%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Time%20Table%20Generator&amp;severity=medium&amp;id=682cfcc94d7c5ea9f4b3b47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5002-sql-injection-in-sourcecodester-client-database-management-system-b3b478</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5002%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cfcc94d7c5ea9f4b3b478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5001-integer-overflow-in-gnu-pspp-b3afd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5001%3A%20Integer%20Overflow%20in%20GNU%20PSPP&amp;severity=medium&amp;id=682cf9154d7c5ea9f4b3afd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brand-impersonation-online-ads-and-malicious-merchants-help-purchase-scam-network-prey-on-victims-b3a74b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brand%20impersonation%2C%20online%20ads%2C%20and%20malicious%20merchants%20help%20purchase%20scam%20network%20prey%20on%20victims&amp;severity=medium&amp;id=682cf5ae4d7c5ea9f4b3a74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malvertisings-new-threat-exploiting-trusted-google-ad736ce1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malvertising&apos;s%20New%20Threat%3A%20Exploiting%20Trusted%20Google%20Domains&amp;severity=medium&amp;id=68367d92182aa0cae23259bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5000-command-injection-in-linksys-fgw3000-ah-b3a1c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5000%3A%20Command%20Injection%20in%20Linksys%20FGW3000-AH&amp;severity=medium&amp;id=682cee834d7c5ea9f4b3a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4999-command-injection-in-linksys-fgw3000-ah-b3a1c5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4999%3A%20Command%20Injection%20in%20Linksys%20FGW3000-AH&amp;severity=medium&amp;id=682cee834d7c5ea9f4b3a1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4998-denial-of-service-in-h3c-magic-r200g-2430d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4998%3A%20Denial%20of%20Service%20in%20H3C%20Magic%20R200G&amp;severity=high&amp;id=682d6c76d4f2164cc92430d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48056-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cilium-hubble-b38a03</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48056%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20cilium%20hubble&amp;severity=medium&amp;id=682ce08d4d7c5ea9f4b38a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4997-denial-of-service-in-h3c-r2-prog-b37689</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4997%3A%20Denial%20of%20Service%20in%20H3C%20R2%2BProG&amp;severity=high&amp;id=682cd9834d7c5ea9f4b37689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-nitrogen-ransomware-targets-financial-firms-in-the-us-uk-and-canada-b37284</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Nitrogen%20Ransomware%20Targets%20Financial%20Firms%20in%20the%20US%2C%20UK%20and%20Canada&amp;severity=medium&amp;id=682cd9724d7c5ea9f4b37284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sarcoma-ransomware-unveiled-anatomy-of-a-double-extortion-gang-b3728a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sarcoma%20Ransomware%20Unveiled%3A%20Anatomy%20of%20a%20Double%20Extortion%20Gang&amp;severity=medium&amp;id=682cd9724d7c5ea9f4b3728a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4996-cross-site-scripting-in-intelbras-rf-301k-b364d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4996%3A%20Cross%20Site%20Scripting%20in%20Intelbras%20RF%20301K&amp;severity=medium&amp;id=682cd5f64d7c5ea9f4b364d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47290-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-containerd-containerd-aeac70</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47290%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20containerd%20containerd&amp;severity=high&amp;id=682cd0f71484d88663aeac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22157-privesc-privilege-escalation-in-atlassian-jira-core-data-center-aeac8f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22157%3A%20PrivEsc%20(Privilege%20Escalation)%20in%20Atlassian%20Jira%20Core%20Data%20Center&amp;severity=high&amp;id=682cd0f71484d88663aeac8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4364-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-assured-telematics-inc-fleet-management-system-aeac91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4364%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Assured%20Telematics%20Inc.%20Fleet%20Management%20System&amp;severity=high&amp;id=682cd0f71484d88663aeac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47854-cwe-601-in-jetbrains-teamcity-aeadde</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47854%3A%20CWE-601%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeadde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47853-cwe-79-in-jetbrains-teamcity-aeaddc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47853%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeaddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47852-cwe-79-in-jetbrains-teamcity-aeadcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47852%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeadcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47851-cwe-79-in-jetbrains-teamcity-aeadcd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47851%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682cd0f71484d88663aeadcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47850-cwe-306-in-jetbrains-youtrack-aeadcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47850%3A%20CWE-306%20in%20JetBrains%20YouTrack&amp;severity=medium&amp;id=682cd0f71484d88663aeadcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48391-cwe-306-in-jetbrains-youtrack-aeade0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48391%3A%20CWE-306%20in%20JetBrains%20YouTrack&amp;severity=high&amp;id=682cd0f71484d88663aeade0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47277-cwe-502-deserialization-of-untrusted-data-in-vllm-project-vllm-aeacae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47277%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=682cd0f71484d88663aeacae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46725-cwe-94-improper-control-of-generation-of-code-code-injection-in-langroid-langroid-aeacac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46725%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langroid%20langroid&amp;severity=high&amp;id=682cd0f71484d88663aeacac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46724-cwe-94-improper-control-of-generation-of-code-code-injection-in-langroid-langroid-aeacaa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46724%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20langroid%20langroid&amp;severity=critical&amp;id=682cd0f71484d88663aeacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37991-vulnerability-in-linux-linux-aeae01</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37990-vulnerability-in-linux-linux-aeadff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeadff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37989-vulnerability-in-linux-linux-aeadfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeadfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37988-vulnerability-in-linux-linux-aeadfb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37987-vulnerability-in-linux-linux-aeadee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37986-vulnerability-in-linux-linux-aeadec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37985-vulnerability-in-linux-linux-aeadea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeadea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37984-vulnerability-in-linux-linux-aeade8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeade8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37983-vulnerability-in-linux-linux-aeade6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37982-vulnerability-in-linux-linux-aeae1e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37981-vulnerability-in-linux-linux-aeae1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37980-vulnerability-in-linux-linux-aeae1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37979-vulnerability-in-linux-linux-aeae0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37978-vulnerability-in-linux-linux-aeae0b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37977-vulnerability-in-linux-linux-aeae09</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37976-vulnerability-in-linux-linux-aeae07</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37976&amp;severity=high&amp;id=682cd0f71484d88663aeae07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37975-vulnerability-in-linux-linux-aeae05</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37974-vulnerability-in-linux-linux-aeae3d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37973-vulnerability-in-linux-linux-aeae3b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37972-vulnerability-in-linux-linux-aeae39</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37971-vulnerability-in-linux-linux-aeae2c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37970-vulnerability-in-linux-linux-aeae2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37969-vulnerability-in-linux-linux-aeae28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37968-vulnerability-in-linux-linux-aeae26</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37967-vulnerability-in-linux-linux-aeae24</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37966-vulnerability-in-linux-linux-aeae22</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37965-vulnerability-in-linux-linux-aeae20</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37964-vulnerability-in-linux-linux-aeae9e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37963-vulnerability-in-linux-linux-aeae9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37962-vulnerability-in-linux-linux-aeae9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37961-vulnerability-in-linux-linux-aeae98</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37960-vulnerability-in-linux-linux-aeae96</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37959-vulnerability-in-linux-linux-aeae89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37958-vulnerability-in-linux-linux-aeae87</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37957-vulnerability-in-linux-linux-aeae85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37956-vulnerability-in-linux-linux-aeae83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37955-vulnerability-in-linux-linux-aeae81</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37954-vulnerability-in-linux-linux-aeae7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37953-vulnerability-in-linux-linux-aeae7d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37952-vulnerability-in-linux-linux-aeae7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37951-vulnerability-in-linux-linux-aeae79</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeae79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37950-vulnerability-in-linux-linux-aeae77</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37949-vulnerability-in-linux-linux-aeae6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37948-vulnerability-in-linux-linux-aeae68</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37947-vulnerability-in-linux-linux-aeae66</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37946-vulnerability-in-linux-linux-aeae64</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeae64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37945-vulnerability-in-linux-linux-aeaedc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37944-vulnerability-in-linux-linux-aeaeda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37943-vulnerability-in-linux-linux-aeaed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37942-vulnerability-in-linux-linux-aeaed6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37942&amp;severity=null&amp;id=682cd0f71484d88663aeaed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37941-vulnerability-in-linux-linux-aeaed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37940-vulnerability-in-linux-linux-aeaec7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37939-vulnerability-in-linux-linux-aeaf1e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37938-vulnerability-in-linux-linux-aeaf1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37937-vulnerability-in-linux-linux-aeaf1a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45641-cwe-295-improper-certificate-validation-in-ibm-security-reaqta-edr-aeaef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45641%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20ReaQta%20EDR&amp;severity=medium&amp;id=682cd0f71484d88663aeaef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37936-vulnerability-in-linux-linux-aeafb3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeafb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37935-vulnerability-in-linux-linux-aeafb1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeafb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37934-vulnerability-in-linux-linux-aeafaf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeafaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37933-vulnerability-in-linux-linux-aeafad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeafad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37932-vulnerability-in-linux-linux-aeafa0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeafa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37931-vulnerability-in-linux-linux-aeaf9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37930-vulnerability-in-linux-linux-aeaf9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37929-vulnerability-in-linux-linux-aeaf9a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37928-vulnerability-in-linux-linux-aeaf98</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37927-vulnerability-in-linux-linux-aeaf96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37926-vulnerability-in-linux-linux-aeaf94</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37924-vulnerability-in-linux-linux-aeaf92</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37923-vulnerability-in-linux-linux-aeaf90</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37922-vulnerability-in-linux-linux-aeaf8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37921-vulnerability-in-linux-linux-aeaf81</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37920-vulnerability-in-linux-linux-aeaf7f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37919-vulnerability-in-linux-linux-aeaf7d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37918-vulnerability-in-linux-linux-aeaf7b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37917-vulnerability-in-linux-linux-aeaf79</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37916-vulnerability-in-linux-linux-aeaf77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37915-vulnerability-in-linux-linux-aeaf75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37914-vulnerability-in-linux-linux-aeaf73</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37913-vulnerability-in-linux-linux-aeaf71</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37912-vulnerability-in-linux-linux-aeaf6f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37911-vulnerability-in-linux-linux-aeaf62</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37910-vulnerability-in-linux-linux-aeaf60</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37909-vulnerability-in-linux-linux-aeaf5e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37908-vulnerability-in-linux-linux-aeaf5c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37907-vulnerability-in-linux-linux-aeaf5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37906-vulnerability-in-linux-linux-aeaf58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37905-vulnerability-in-linux-linux-aeaf56</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37904-vulnerability-in-linux-linux-aeaf54</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37903-vulnerability-in-linux-linux-aeaf52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37901-vulnerability-in-linux-linux-aeaf43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37900-vulnerability-in-linux-linux-aeaf41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37899-vulnerability-in-linux-linux-aeaf3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37898-vulnerability-in-linux-linux-aeaf3d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37897-vulnerability-in-linux-linux-aeaf3b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37896-vulnerability-in-linux-linux-aeaf39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37895-vulnerability-in-linux-linux-aeaf37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37894-vulnerability-in-linux-linux-aeaf35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeaf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48018-cwe-502-deserialization-of-untrusted-data-in-schweitzer-engineering-laboratories-sel-5030-acselerator-quickset-software-aeaf18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48018%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5030%20acSELerator%20QuickSet%20Software&amp;severity=high&amp;id=682cd0f71484d88663aeaf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48017-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaefd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48017%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=critical&amp;id=682cd0f71484d88663aeaefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48016-cwe-799-improper-control-of-interaction-frequency-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaefb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48016%3A%20CWE-799%20Improper%20Control%20of%20Interaction%20Frequency%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=medium&amp;id=682cd0f71484d88663aeaefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48015-cwe-204-observable-response-discrepancy-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaef9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48015%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=low&amp;id=682cd0f71484d88663aeaef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48014-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-schweitzer-engineering-laboratories-sel-5056-software-defined-network-flow-controller-aeaef7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48014%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5056%20Software-Defined%20Network%20Flow%20Controller&amp;severity=high&amp;id=682cd0f71484d88663aeaef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33861-cwe-295-improper-certificate-validation-in-ibm-security-reaqta-edr-aeafd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33861%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20ReaQta%20EDR&amp;severity=medium&amp;id=682cd0f71484d88663aeafd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41228-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-vmware-vcenter-server-aeaf33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20VMware%20vCenter%20Server&amp;severity=medium&amp;id=682cd0f71484d88663aeaf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41227-cwe-400-uncontrolled-resource-consumption-in-vmware-esxi-aeaec5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41227%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20ESXi&amp;severity=medium&amp;id=682cd0f71484d88663aeaec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41226-cwe-400-uncontrolled-resource-consumption-in-vmware-esxi-aeaec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41226%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20VMware%20ESXi&amp;severity=medium&amp;id=682cd0f71484d88663aeaec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41225-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-vmware-vcenter-server-aeaf14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41225%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20VMware%20vCenter%20Server&amp;severity=high&amp;id=682cd0f71484d88663aeaf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47941-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-typo3-typo3-aeb088</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47941%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20TYPO3%20typo3&amp;severity=high&amp;id=682cd0f71484d88663aeb088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47940-cwe-283-unverified-ownership-in-typo3-typo3-aeb02b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47940%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20TYPO3%20typo3&amp;severity=high&amp;id=682cd0f71484d88663aeb02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47939-cwe-351-insufficient-type-distinction-in-typo3-typo3-aeb0ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47939%3A%20CWE-351%3A%20Insufficient%20Type%20Distinction%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682cd0f71484d88663aeb0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4980-information-disclosure-in-netgear-dgnd3700-aeb0e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4980%3A%20Information%20Disclosure%20in%20Netgear%20DGND3700&amp;severity=medium&amp;id=682cd0f71484d88663aeb0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47938-cwe-620-unverified-password-change-in-typo3-typo3-aeb0a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47938%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20TYPO3%20typo3&amp;severity=low&amp;id=682cd0f71484d88663aeb0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47937-cwe-863-incorrect-authorization-in-typo3-typo3-aeb0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47937%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20TYPO3%20typo3&amp;severity=low&amp;id=682cd0f71484d88663aeb0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47936-cwe-918-server-side-request-forgery-ssrf-in-typo3-typo3-aeb0ed</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47936%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TYPO3%20typo3&amp;severity=low&amp;id=682cd0f71484d88663aeb0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4978-improper-authentication-in-netgear-dgnd3700-aeafef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4978%3A%20Improper%20Authentication%20in%20Netgear%20DGND3700&amp;severity=critical&amp;id=682cd0f71484d88663aeafef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4977-information-disclosure-in-netgear-dgnd3700-aeafed</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4977%3A%20Information%20Disclosure%20in%20Netgear%20DGND3700&amp;severity=medium&amp;id=682cd0f71484d88663aeafed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41231-missing-authorisation-in-vmware-cloud-foundation-aeb15f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41231%3A%20Missing%20Authorisation%20in%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682cd0f71484d88663aeb15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41230-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-vmware-cloud-foundation-aeb152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41230%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682cd0f71484d88663aeb152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41229-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-vmware-cloud-foundation-aeb150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41229%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682cd0f71484d88663aeb150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40635-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-comerzzia-comerzzia-backoffice-sales-orchestrator-aeafda</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40635%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Comerzzia%20Comerzzia%20Backoffice%3A%20Sales%20Orchestrator&amp;severity=critical&amp;id=682cd0f71484d88663aeafda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30193-cwe-674-uncontrolled-recursion-in-powerdns-dnsdist-aeb142</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30193%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=682cd0f71484d88663aeb142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37892-vulnerability-in-linux-linux-aeb184</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40633-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-koibox-koibox-aeb14e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Koibox%20Koibox&amp;severity=medium&amp;id=682cd0f71484d88663aeb14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40634-cwe-121-stack-based-buffer-overflow-in-tp-link-link-archer-ax50-aeb131</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40634%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Link%20Archer%20AX50&amp;severity=critical&amp;id=682cd0f71484d88663aeb131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4951-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-rapid7-appspider-pro-aeb133</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4951%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Rapid7%20AppSpider%20Pro&amp;severity=medium&amp;id=682cd0f71484d88663aeb133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5878-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aknieriem-simplelightbox-aeb123</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aknieriem%20Simplelightbox&amp;severity=medium&amp;id=682cd0f71484d88663aeb123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2929-cwe-79-cross-site-scripting-xss-in-unknown-order-delivery-date-aeb0eb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2929%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Order%20Delivery%20Date&amp;severity=high&amp;id=682cd0f71484d88663aeb0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4322-cwe-620-unverified-password-change-in-stylemixthemes-motors-car-dealer-rental-listing-wordpress-theme-aeb0d0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4322%3A%20CWE-620%20Unverified%20Password%20Change%20in%20StylemixThemes%20Motors%20-%20Car%20Dealer%2C%20Rental%20%26%20Listing%20WordPress%20theme&amp;severity=critical&amp;id=682cd0f71484d88663aeb0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44898-n-a-in-n-a-2430d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44898%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44897-n-a-in-n-a-2430d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44897%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44896-n-a-in-n-a-2430cf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44896%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44894-n-a-in-n-a-2430cd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44894%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44891-n-a-in-n-a-2430cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44891%3A%20n%2Fa&amp;severity=critical&amp;id=682d6c76d4f2164cc92430cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44883-n-a-in-n-a-b397b3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44883%3A%20n%2Fa&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44882-n-a-in-n-a-b397b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44882%3A%20n%2Fa&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44880-n-a-in-n-a-b397af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44880%3A%20n%2Fa&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44888-n-a-in-n-a-b3934d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44888%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b3934d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44887-n-a-in-n-a-b3934b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44887%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b3934b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44886-n-a-in-n-a-b39349</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44886%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b39349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44884-n-a-in-n-a-b39347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44884%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b39347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44881-n-a-in-n-a-b39345</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44881%3A%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b39345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44893-n-a-in-n-a-b389ef</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44893%3A%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44890-n-a-in-n-a-b389ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44890%3A%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44885-n-a-in-n-a-b389eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44885%3A%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26086-n-a-in-n-a-aeaf31</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26086%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeaf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44084-n-a-in-n-a-aeae03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44084%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeae03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45862-n-a-in-n-a-aeaca6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45862%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeaca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53359-n-a-in-n-a-aeac95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53359%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3079-cwe-522-insufficiently-protected-credentials-in-canon-inc-imagerunner-series-aeb0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3079%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Canon%20Inc.%20imageRUNNER%20Series&amp;severity=medium&amp;id=682cd0f71484d88663aeb0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3078-cwe-522-insufficiently-protected-credentials-in-canon-inc-imagerunner-advance-series-aeb0c6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3078%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Canon%20Inc.%20imageRUNNER%20ADVANCE%20Series&amp;severity=medium&amp;id=682cd0f71484d88663aeb0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4971-cwe-426-untrusted-search-path-in-broadcom-automic-automation-aeb0d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4971%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Broadcom%20Automic%20Automation&amp;severity=high&amp;id=682cd0f71484d88663aeb0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1308-cwe-116-improper-encoding-or-escaping-of-output-in-pure-storage-px-backup-aeb098</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1308%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Pure%20Storage%20PX%20Backup&amp;severity=high&amp;id=682cd0f71484d88663aeb098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3223-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-ge-vernova-workstationst-aeb16f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3223%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GE%20Vernova%20WorkstationST&amp;severity=medium&amp;id=682cd0f71484d88663aeb16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48340-cwe-352-cross-site-request-forgery-csrf-in-danny-vink-user-profile-meta-manager-aeb44f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48340%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Danny%20Vink%20User%20Profile%20Meta%20Manager&amp;severity=null&amp;id=682cd0f81484d88663aeb44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31027-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jocoxdesign-tiger-aeb3be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jocoxdesign%20Tiger&amp;severity=high&amp;id=682cd0f81484d88663aeb3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32924-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-roninwp-revy-aeb3cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32924%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roninwp%20Revy&amp;severity=null&amp;id=682cd0f81484d88663aeb3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32925-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-fantasticplugins-sumo-reward-points-aeb3cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32925%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20FantasticPlugins%20SUMO%20Reward%20Points&amp;severity=null&amp;id=682cd0f81484d88663aeb3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32926-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-themegoods-grand-restaurant-wordpress-aeb3cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32926%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32927-cwe-502-deserialization-of-untrusted-data-in-chimpstudio-foodbakery-aeb3d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32927%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chimpstudio%20FoodBakery&amp;severity=null&amp;id=682cd0f81484d88663aeb3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32928-cwe-502-deserialization-of-untrusted-data-in-themegoods-altair-aeb3d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32928%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Altair&amp;severity=null&amp;id=682cd0f81484d88663aeb3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39348-cwe-502-deserialization-of-untrusted-data-in-themegoods-grand-restaurant-wordpress-aeb3d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39348%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39349-cwe-502-deserialization-of-untrusted-data-in-potenzaglobalsolutions-ciyashop-aeb3d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39349%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Potenzaglobalsolutions%20CiyaShop&amp;severity=null&amp;id=682cd0f81484d88663aeb3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39350-cwe-862-missing-authorization-in-rocket-apps-wproject-aeb3d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39350%3A%20CWE-862%20Missing%20Authorization%20in%20Rocket%20Apps%20wProject&amp;severity=high&amp;id=682cd0f81484d88663aeb3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39352-cwe-862-missing-authorization-in-themegoods-grand-restaurant-wordpress-aeb3db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39352%3A%20Missing%20Authorization%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39354-cwe-502-deserialization-of-untrusted-data-in-themegoods-grand-conference-aeb3dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeGoods%20Grand%20Conference&amp;severity=null&amp;id=682cd0f81484d88663aeb3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39355-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-roninwp-fat-services-booking-aeb3ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39355%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roninwp%20FAT%20Services%20Booking&amp;severity=null&amp;id=682cd0f81484d88663aeb3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39356-cwe-502-deserialization-of-untrusted-data-in-chimpstudio-foodbakery-sticky-cart-aeb3ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39356%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Chimpstudio%20Foodbakery%20Sticky%20Cart&amp;severity=null&amp;id=682cd0f81484d88663aeb3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39357-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-hospital-management-system-aeb3ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39357%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46441-cwe-35-path-traversal-in-ctltwp-section-widget-aeb44d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46441%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20ctltwp%20Section%20Widget&amp;severity=null&amp;id=682cd0f81484d88663aeb44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39365-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rocket-apps-wproject-aeb3f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rocket%20Apps%20wProject&amp;severity=high&amp;id=682cd0f81484d88663aeb3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39366-cwe-266-incorrect-privilege-assignment-in-rocket-apps-wproject-aeb3f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39366%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Rocket%20Apps%20wProject&amp;severity=high&amp;id=682cd0f81484d88663aeb3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39372-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-elbisnero-wordpress-events-calendar-registration-tickets-aeb3f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39372%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elbisnero%20WordPress%20Events%20Calendar%20Registration%20%26%20Tickets&amp;severity=null&amp;id=682cd0f81484d88663aeb3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39380-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-hospital-management-system-aeb3fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39380%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39386-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-hospital-management-system-aeb409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39386%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39389-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-solid-plugins-analyticswp-aeb40b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39389%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=critical&amp;id=682cd0f81484d88663aeb40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39392-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mojoomla-wpams-aeb40d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47949-cwe-347-improper-verification-of-cryptographic-signature-in-tngan-samlify-aeb182</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47949%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20tngan%20samlify&amp;severity=critical&amp;id=682cd0f71484d88663aeb182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39393-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mojoomla-hospital-management-system-aeb40f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39393%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojoomla%20Hospital%20Management%20System&amp;severity=null&amp;id=682cd0f81484d88663aeb40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39395-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-wpams-aeb411</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39395%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39401-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-wpams-aeb417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39401%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47946-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-symfony-ux-aeb180</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47946%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20symfony%20ux&amp;severity=medium&amp;id=682cd0f71484d88663aeb180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39402-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-mojoomla-wpams-aeb419</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39402%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47944-cwe-248-uncaught-exception-in-expressjs-multer-aeb16d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47944%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20expressjs%20multer&amp;severity=high&amp;id=682cd0f71484d88663aeb16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47935-cwe-401-missing-release-of-memory-after-effective-lifetime-in-expressjs-multer-aeb4a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47935%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20expressjs%20multer&amp;severity=high&amp;id=682cd0f81484d88663aeb4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39403-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-wpams-aeb41b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39403%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39405-cwe-266-incorrect-privilege-assignment-in-mojoomla-wpams-aeb428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39405%3A%20Incorrect%20Privilege%20Assignment%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39406-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mojoomla-wpams-aeb42a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39406%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mojoomla%20WPAMS&amp;severity=null&amp;id=682cd0f81484d88663aeb42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39407-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-caseproof-llc-memberpress-aeb42c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Caseproof%2C%20LLC%20Memberpress&amp;severity=high&amp;id=682cd0f81484d88663aeb42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39409-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pressaholic-wordpress-video-robot-the-ultimate-video-importer-aeb42e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressaholic%20WordPress%20Video%20Robot%20-%20The%20Ultimate%20Video%20Importer&amp;severity=high&amp;id=682cd0f81484d88663aeb42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39410-cwe-502-deserialization-of-untrusted-data-in-themegusta-smart-sections-theme-builder-wpbakery-page-builder-addon-aeb430</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39410%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themegusta%20Smart%20Sections%20Theme%20Builder%20-%20WPBakery%20Page%20Builder%20Addon&amp;severity=critical&amp;id=682cd0f81484d88663aeb430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39411-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-indie-plugins-whatsapp-click-to-chat-plugin-for-wordpress-aeb432</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39411%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Indie_Plugins%20WhatsApp%20Click%20to%20Chat%20Plugin%20for%20WordPress&amp;severity=null&amp;id=682cd0f81484d88663aeb432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47934-cwe-347-improper-verification-of-cryptographic-signature-in-openpgpjs-openpgpjs-aeb17e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47934%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20openpgpjs%20openpgpjs&amp;severity=high&amp;id=682cd0f71484d88663aeb17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39445-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-highwarden-super-store-finder-aeb434</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39445%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=682cd0f81484d88663aeb434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39446-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pluggabl-llc-booster-plus-for-woocommerce-aeb436</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluggabl%20LLC%20Booster%20Plus%20for%20WooCommerce&amp;severity=high&amp;id=682cd0f81484d88663aeb436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47284-cwe-150-improper-neutralization-of-escape-meta-or-control-sequences-in-gardener-gardener-aeb171</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47284%3A%20CWE-150%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20gardener%20gardener&amp;severity=critical&amp;id=682cd0f71484d88663aeb171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39447-cwe-862-missing-authorization-in-crocoblock-jetelements-for-elementor-aeb438</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39447%3A%20Missing%20Authorization%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39449-cwe-862-missing-authorization-in-crocoblock-jetwoobuilder-aeb43a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39449%3A%20Missing%20Authorization%20in%20Crocoblock%20JetWooBuilder&amp;severity=null&amp;id=682cd0f81484d88663aeb43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39451-cwe-862-missing-authorization-in-crocoblock-jetblocks-for-elementor-aeb495</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39451%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39458-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-mikado-themes-foton-aeb497</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39458%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mikado-Themes%20Foton&amp;severity=null&amp;id=682cd0f81484d88663aeb497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39459-cwe-266-incorrect-privilege-assignment-in-contempo-themes-real-estate-7-aeb4a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39459%3A%20Incorrect%20Privilege%20Assignment%20in%20contempoinc%20Real%20Estate%207&amp;severity=null&amp;id=682cd0f81484d88663aeb4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47283-cwe-20-improper-input-validation-in-gardener-gardener-aeb16b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47283%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20gardener%20gardener&amp;severity=critical&amp;id=682cd0f71484d88663aeb16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43832-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andreyk-remote-images-grabber-aeb447</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43832%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreyk%20Remote%20Images%20Grabber&amp;severity=null&amp;id=682cd0f81484d88663aeb447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43836-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-confuzzledduck-syndicate-out-aeb4c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20confuzzledduck%20Syndicate%20Out&amp;severity=null&amp;id=682cd0f81484d88663aeb4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43837-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-binti76-total-donations-aeb4c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binti76%20Total%20Donations&amp;severity=null&amp;id=682cd0f81484d88663aeb4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43838-cwe-862-missing-authorization-in-choplugins-custom-pc-builder-lite-for-woocommerce-aeb4cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43838%3A%20Missing%20Authorization%20in%20ChoPlugins.com%20Custom%20PC%20Builder%20Lite%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43839-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shanebp-bp-messages-tool-aeb4b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Messages%20Tool&amp;severity=null&amp;id=682cd0f81484d88663aeb4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47577-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-templateinvaders-ti-woocommerce-wishlist-aeb4b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47577%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=null&amp;id=682cd0f81484d88663aeb4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47581-cwe-502-deserialization-of-untrusted-data-in-elbisnero-wordpress-events-calendar-registration-tickets-aeb4b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47581%3A%20Deserialization%20of%20Untrusted%20Data%20in%20elbisnero%20WordPress%20Events%20Calendar%20Registration%20%26%20Tickets&amp;severity=null&amp;id=682cd0f81484d88663aeb4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47582-cwe-502-deserialization-of-untrusted-data-in-quantumcloud-wpbot-pro-wordpress-chatbot-aeb503</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47582%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=critical&amp;id=682cd0f81484d88663aeb503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27010-cwe-35-path-traversal-in-bslthemes-tastyc-aeb4aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27010%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20bslthemes%20Tastyc&amp;severity=null&amp;id=682cd0f81484d88663aeb4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26997-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-validas-wireless-butler-aeb4f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26997%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20validas%20Wireless%20Butler&amp;severity=null&amp;id=682cd0f81484d88663aeb4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26892-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-dkszone-celestial-aura-aeb4ee</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26892%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dkszone%20Celestial%20Aura&amp;severity=critical&amp;id=682cd0f81484d88663aeb4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26872-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-dkszone-eximius-aeb3bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26872%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dkszone%20Eximius&amp;severity=critical&amp;id=682cd0f81484d88663aeb3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26735-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-candid-themes-grip-aeb3ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26735%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Candid%20themes%20Grip&amp;severity=high&amp;id=682cd0f81484d88663aeb3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22287-cwe-862-missing-authorization-in-eniture-technology-ltl-freight-quotes-freightquote-edition-aeb140</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22287%3A%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20FreightQuote%20Edition&amp;severity=null&amp;id=682cd0f71484d88663aeb140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47282-cwe-20-improper-input-validation-in-gardener-external-dns-management-aeb169</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47282%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20gardener%20external-dns-management&amp;severity=critical&amp;id=682cd0f71484d88663aeb169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39448-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-crocoblock-jetelements-for-elementor-aeb146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements%20For%20Elementor&amp;severity=null&amp;id=682cd0f71484d88663aeb146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39450-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-crocoblock-jettabs-aeb148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetTabs&amp;severity=null&amp;id=682cd0f71484d88663aeb148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39454-cwe-862-missing-authorization-in-jeroen-peters-name-directory-aeb14a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39454%3A%20Missing%20Authorization%20in%20Jeroen%20Peters%20Name%20Directory&amp;severity=null&amp;id=682cd0f71484d88663aeb14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39460-cwe-862-missing-authorization-in-thimpress-eduma-aeb14c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39460%3A%20Missing%20Authorization%20in%20ThimPress%20Eduma&amp;severity=null&amp;id=682cd0f71484d88663aeb14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43833-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-amir-helzer-absolute-links-aeb0ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43833%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amir%20Helzer%20Absolute%20Links&amp;severity=null&amp;id=682cd0f71484d88663aeb0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43834-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tox82-cookiebar-aeb161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tox82%20cookieBAR&amp;severity=null&amp;id=682cd0f71484d88663aeb161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43835-cwe-352-cross-site-request-forgery-csrf-in-ktsvetkov-wp-cyr-cho-aeb163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43835%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ktsvetkov%20wp-cyr-cho&amp;severity=null&amp;id=682cd0f71484d88663aeb163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39412-cwe-862-missing-authorization-in-averta-master-slider-aeb144</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39412%3A%20Missing%20Authorization%20in%20averta%20Master%20Slider&amp;severity=null&amp;id=682cd0f71484d88663aeb144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39398-cwe-862-missing-authorization-in-themovation-hotel-bed-and-breakfast-booking-calendar-theme-bellevue-aeb415</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39398%3A%20Missing%20Authorization%20in%20Themovation%20Bellevue&amp;severity=null&amp;id=682cd0f81484d88663aeb415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39396-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-crocoblock-jetreviews-aeb413</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39396%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetReviews&amp;severity=null&amp;id=682cd0f81484d88663aeb413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43841-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jamesdbruner-wp-vegas-aeb44b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43841%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jamesdbruner%20WP%20Vegas&amp;severity=null&amp;id=682cd0f81484d88663aeb44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43840-cwe-352-cross-site-request-forgery-csrf-in-ref-checkbot-aeb449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43840%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ref%20CheckBot&amp;severity=null&amp;id=682cd0f81484d88663aeb449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46262-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zack-katz-mad-mimi-for-wordpress-aeb165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20Mad%20Mimi%20for%20WordPress&amp;severity=null&amp;id=682cd0f71484d88663aeb165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46263-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lloyd-saunders-author-box-after-posts-aeb167</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lloyd%20Saunders%20Author%20Box%20After%20Posts&amp;severity=null&amp;id=682cd0f71484d88663aeb167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46543-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-charly-leetham-enhanced-paypal-shortcodes-aeb0cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CharlyLeetham%20Enhanced%20Paypal%20Shortcodes&amp;severity=null&amp;id=682cd0f71484d88663aeb0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4945-integer-overflow-or-wraparound-in-red-hat-red-hat-enterprise-linux-6-aeb0d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4945%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=low&amp;id=682cd0f71484d88663aeb0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4941-sql-injection-in-phpgurukul-credit-card-application-management-system-aeb0d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4941%3A%20SQL%20Injection%20in%20PHPGurukul%20Credit%20Card%20Application%20Management%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39394-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-solid-plugins-analyticswp-aeb0c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39394%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=medium&amp;id=682cd0f71484d88663aeb0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26920-cwe-862-missing-authorization-in-pressmaximum-customify-aeb0b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26920%3A%20Missing%20Authorization%20in%20pressmaximum%20Customify&amp;severity=null&amp;id=682cd0f71484d88663aeb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26867-cwe-862-missing-authorization-in-themes4wp-bulk-aeb0b1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26867%3A%20CWE-862%20Missing%20Authorization%20in%20Themes4WP%20Bulk&amp;severity=medium&amp;id=682cd0f71484d88663aeb0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39388-cwe-862-missing-authorization-in-solid-plugins-analyticswp-aeb0b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39388%3A%20CWE-862%20Missing%20Authorization%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=medium&amp;id=682cd0f71484d88663aeb0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39376-cwe-862-missing-authorization-in-quanticalabs-car-park-booking-system-for-wordpress-aeb0b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39376%3A%20Missing%20Authorization%20in%20QuanticaLabs%20Car%20Park%20Booking%20System%20for%20WordPress&amp;severity=null&amp;id=682cd0f71484d88663aeb0b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39375-cwe-352-cross-site-request-forgery-csrf-in-ashok-g-easy-child-theme-creator-aeb3fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39375%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashok%20G%20Easy%20Child%20Theme%20Creator&amp;severity=null&amp;id=682cd0f81484d88663aeb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39374-cwe-352-cross-site-request-forgery-csrf-in-aseem1234-best-posts-summary-aeb3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39374%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aseem1234%20Best%20Posts%20Summary&amp;severity=null&amp;id=682cd0f81484d88663aeb3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39373-cwe-862-missing-authorization-in-jegtheme-jnews-aeb3f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39373%3A%20Missing%20Authorization%20in%20jegtheme%20JNews&amp;severity=null&amp;id=682cd0f81484d88663aeb3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39371-cwe-352-cross-site-request-forgery-csrf-in-sanjeev-mohindra-author-box-plugin-with-different-description-aeb55e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39371%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sanjeev%20Mohindra%20Author%20Box%20Plugin%20With%20Different%20Description&amp;severity=null&amp;id=682cd0f81484d88663aeb55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39370-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-cnilsson-icafe-library-aeb551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39370%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cnilsson%20iCafe%20Library&amp;severity=null&amp;id=682cd0f81484d88663aeb551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39369-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sihibbs-posts-for-page-aeb54f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sihibbs%20Posts%20for%20Page&amp;severity=null&amp;id=682cd0f81484d88663aeb54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39368-cwe-862-missing-authorization-in-ed4becky-rootspersona-aeb54d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39368%3A%20Missing%20Authorization%20in%20ed4becky%20Rootspersona&amp;severity=null&amp;id=682cd0f81484d88663aeb54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4940-sql-injection-in-1000-projects-daily-college-class-work-report-book-aeb562</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4940%3A%20SQL%20Injection%20in%201000%20Projects%20Daily%20College%20Class%20Work%20Report%20Book&amp;severity=medium&amp;id=682cd0f81484d88663aeb562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39353-cwe-862-missing-authorization-in-themegoods-grand-restaurant-wordpress-aeb54b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39353%3A%20Missing%20Authorization%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39351-cwe-352-cross-site-request-forgery-csrf-in-themegoods-grand-restaurant-wordpress-aeb549</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeGoods%20Grand%20Restaurant&amp;severity=null&amp;id=682cd0f81484d88663aeb549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39364-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-pluginever-product-category-slider-for-woocommerce-aeb56e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PluginEver%20Product%20Category%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47576-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-bringthepixel-bimber-viral-magazine-wordpress-theme-aeb570</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47576%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Bringthepixel%20Bimber%20-%20Viral%20Magazine%20WordPress%20Theme&amp;severity=high&amp;id=682cd0f81484d88663aeb570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47583-cwe-352-cross-site-request-forgery-csrf-in-dimitri-grassi-salon-booking-system-aeb583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=682cd0f81484d88663aeb583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32920-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-templateinvaders-ti-woocommerce-wishlist-aeb56c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=null&amp;id=682cd0f81484d88663aeb56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4876-cwe-798-use-of-hard-coded-credentials-in-connectwise-risk-assessment-aeb57d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4876%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ConnectWise%20Risk%20Assessment&amp;severity=medium&amp;id=682cd0f81484d88663aeb57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23988-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bruno-cavalcante-ghostwriter-aeb526</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bruno%20Cavalcante%20Ghostwriter&amp;severity=high&amp;id=682cd0f81484d88663aeb526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23986-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-fyrewurks-tiki-time-aeb524</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fyrewurks%20Tiki%20Time&amp;severity=high&amp;id=682cd0f81484d88663aeb524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23983-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tijaji-tijaji-aeb520</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tijaji%20Tijaji&amp;severity=high&amp;id=682cd0f81484d88663aeb520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26621-cwe-94-improper-control-of-generation-of-code-code-injection-in-opencti-platform-opencti-aeb511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26621%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=high&amp;id=682cd0f81484d88663aeb511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23981-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-takimi-themes-carzine-aeb50b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23981%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takimi%20Themes%20CarZine&amp;severity=high&amp;id=682cd0f81484d88663aeb50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23979-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-duwasai-flashy-aeb509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23979%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duwasai%20Flashy&amp;severity=high&amp;id=682cd0f81484d88663aeb509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22792-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jinwen-js-o3-lite-aeb507</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jinwen%20Js%20O3%20Lite&amp;severity=high&amp;id=682cd0f81484d88663aeb507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22791-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-twh-offset-writing-aeb545</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twh%20offset%20writing&amp;severity=high&amp;id=682cd0f81484d88663aeb545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24184-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-visionos-aeb547</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24184%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24189-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-visionos-aeb1a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24189%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0f71484d88663aeb1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24183-a-local-user-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-aeb566</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24183%3A%20A%20local%20user%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31185-photos-in-the-hidden-photos-album-may-be-viewed-without-authentication-in-apple-ios-and-ipados-aeb568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31185%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=682cd0f81484d88663aeb568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31262-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-visionos-aeb56a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31262%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4939-cross-site-scripting-in-phpgurukul-credit-card-application-management-system-aeb560</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4939%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Credit%20Card%20Application%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22790-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-asmedia-moseter-aeb4ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20asmedia%20moseter&amp;severity=high&amp;id=682cd0f81484d88663aeb4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22789-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-fyrewurks-polka-dots-aeb4ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22789%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fyrewurks%20polka%20dots&amp;severity=high&amp;id=682cd0f81484d88663aeb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22687-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-asmedia-tuaug4-aeb4e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asmedia%20Tuaug4&amp;severity=high&amp;id=682cd0f81484d88663aeb4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22678-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mythemes-my-white-aeb4e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22678%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mythemes%20my%20white&amp;severity=high&amp;id=682cd0f81484d88663aeb4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4948-integer-underflow-wrap-or-wraparound-in-red-hat-red-hat-enterprise-linux-6-aeb564</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4948%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)&amp;severity=high&amp;id=682cd0f81484d88663aeb564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33939-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-masteriyo-masteriyo-lms-aeb543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33939%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=682cd0f81484d88663aeb543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4938-sql-injection-in-phpgurukul-employee-record-management-system-aeb5a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4938%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4937-sql-injection-in-sourcecodester-apartment-visitor-management-system-aeb6dc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4937%3A%20SQL%20Injection%20in%20SourceCodester%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3908-cwe-59-improper-link-resolution-before-file-access-link-following-in-openvpn-openvpn-3-linux-aeac99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3908%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20OpenVPN%20OpenVPN%203%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeac99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48346-cwe-862-missing-authorization-in-etsy360-embed-and-integrate-etsy-shop-aeb6e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48346%3A%20Missing%20Authorization%20in%20Embed360%20Embed%20and%20Integrate%20Etsy%20Shop&amp;severity=null&amp;id=682cd0f81484d88663aeb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48344-cwe-352-cross-site-request-forgery-csrf-in-ed4becky-rootspersona-aeb683</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ed4becky%20Rootspersona&amp;severity=null&amp;id=682cd0f81484d88663aeb683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48342-cwe-352-cross-site-request-forgery-csrf-in-redefiningtheweb-dynamic-pricing-amp-discounts-lite-for-woocommerce-aeb681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RedefiningTheWeb%20Dynamic%20Pricing%20%26amp%3B%20Discounts%20Lite%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48341-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-10web-form-maker-by-10web-aeb67f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Form%20Maker%20by%2010Web&amp;severity=null&amp;id=682cd0f81484d88663aeb67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48288-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-element-invader-elementinvader-addons-for-elementor-aeb67d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48285-cwe-352-cross-site-request-forgery-csrf-in-sbouey-falang-multilanguage-aeb67b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48285%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sbouey%20Falang%20multilanguage&amp;severity=null&amp;id=682cd0f81484d88663aeb67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48284-cwe-352-cross-site-request-forgery-csrf-in-shohei-tanaka-japanized-for-woocommerce-aeb679</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48284%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shohei.tanaka%20Japanized%20For%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48282-cwe-862-missing-authorization-in-majestic-support-majestic-support-aeb677</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48282%3A%20CWE-862%20Missing%20Authorization%20in%20Majestic%20Support%20Majestic%20Support&amp;severity=medium&amp;id=682cd0f81484d88663aeb677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48280-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-ruben-garcia-automatorwp-aeb675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48280%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ruben%20Garcia%20AutomatorWP&amp;severity=null&amp;id=682cd0f81484d88663aeb675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48278-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-davidfcarr-rsvpmarker-aeb668</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48278%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20davidfcarr%20RSVPMarker&amp;severity=null&amp;id=682cd0f81484d88663aeb668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48277-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stylemix-cost-calculator-builder-aeb666</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48277%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=null&amp;id=682cd0f81484d88663aeb666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48276-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-visual-composer-visual-composer-website-builder-aeb664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=682cd0f81484d88663aeb664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48272-cwe-862-missing-authorization-in-wpjobportal-wp-job-portal-aeb662</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48272%3A%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=682cd0f81484d88663aeb662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48270-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sonalsinha21-skt-blocks-aeb660</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48270%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=682cd0f81484d88663aeb660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48269-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-greg-winiarski-wpadverts-aeb65e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48269%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=682cd0f81484d88663aeb65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48268-cwe-862-missing-authorization-in-guru-team-bot-for-telegram-on-woocommerce-aeb65c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48268%3A%20Missing%20Authorization%20in%20Guru%20Team%20Bot%20for%20Telegram%20on%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48266-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-realmag777-active-products-tables-for-woocommerce-aeb65a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20Active%20Products%20Tables%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48265-cwe-352-cross-site-request-forgery-csrf-in-pektsekye-year-make-model-search-for-woocommerce-aeb658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48265%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pektsekye%20Year%20Make%20Model%20Search%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48264-cwe-352-cross-site-request-forgery-csrf-in-artiosmedia-product-code-for-woocommerce-aeb656</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48264%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20artiosmedia%20Product%20Code%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48263-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-multivendorx-multivendorx-aeb649</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MultiVendorX%20MultiVendorX&amp;severity=medium&amp;id=682cd0f81484d88663aeb649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48262-cwe-862-missing-authorization-in-michael-revellin-clerc-url-rewrite-analyzer-aeb647</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48262%3A%20Missing%20Authorization%20in%20M.Code%20Url%20Rewrite%20Analyzer&amp;severity=null&amp;id=682cd0f81484d88663aeb647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48260-cwe-862-missing-authorization-in-ninja-team-gdpr-ccpa-compliance-support-aeb645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48260%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=null&amp;id=682cd0f81484d88663aeb645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48259-cwe-352-cross-site-request-forgery-csrf-in-juan-carlos-wp-mapa-politico-espa-a-aeb643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48259%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Juan%20Carlos%20WP%20Mapa%20Politico%20Espa%C3%B1a&amp;severity=null&amp;id=682cd0f81484d88663aeb643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48258-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jetmonsters-mega-menu-block-aeb641</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48258%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Mega%20Menu%20Block&amp;severity=null&amp;id=682cd0f81484d88663aeb641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48257-cwe-862-missing-authorization-in-projectopia-projectopia-aeb63f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48257%3A%20CWE-862%20Missing%20Authorization%20in%20Projectopia%20Projectopia&amp;severity=medium&amp;id=682cd0f81484d88663aeb63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48256-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xylus-themes-import-social-events-aeb63d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48256%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xylus%20Themes%20Import%20Social%20Events&amp;severity=null&amp;id=682cd0f81484d88663aeb63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48255-cwe-352-cross-site-request-forgery-csrf-in-videowhisper-broadcast-live-video-live-streaming-webrtc-hls-rtsp-rtmp-aeb63b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48255%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20videowhisper%20Broadcast%20Live%20Video&amp;severity=null&amp;id=682cd0f81484d88663aeb63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48254-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-change-add-to-cart-button-text-for-woocommerce-aeb639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Change%20Add%20to%20Cart%20Button%20Text%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48253-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-free-shipping-bar-amount-left-for-free-shipping-for-woocommerce-aeb637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Free%20Shipping%20Bar%3A%20Amount%20Left%20for%20Free%20Shipping%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48252-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-back-button-widget-aeb62a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48252%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Back%20Button%20Widget&amp;severity=null&amp;id=682cd0f81484d88663aeb62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48251-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-additional-custom-emails-amp-recipients-for-woocommerce-aeb628</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48251%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Additional%20Custom%20Emails%20%26amp%3B%20Recipients%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48250-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-coupons-amp-add-to-cart-by-url-links-for-woocommerce-aeb626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Coupons%20%26amp%3B%20Add%20to%20Cart%20by%20URL%20Links%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48249-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-ean-for-woocommerce-aeb624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48249%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20EAN%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48248-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-sitewide-discount-for-woocommerce-apply-discount-to-all-products-aeb622</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48248%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Sitewide%20Discount%20for%20WooCommerce%3A%20Apply%20Discount%20to%20All%20Products&amp;severity=null&amp;id=682cd0f81484d88663aeb622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48247-cwe-862-missing-authorization-in-blair-williams-shortlinks-by-pretty-links-aeb620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48247%3A%20Missing%20Authorization%20in%20Blair%20Williams%20Shortlinks%20by%20Pretty%20Links&amp;severity=null&amp;id=682cd0f81484d88663aeb620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48246-cwe-862-missing-authorization-in-the-events-calendar-the-events-calendar-aeb61e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48246%3A%20Missing%20Authorization%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=682cd0f81484d88663aeb61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48244-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tim-strifler-exclusive-addons-elementor-aeb61c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48244%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20Strifler%20Exclusive%20Addons%20Elementor&amp;severity=null&amp;id=682cd0f81484d88663aeb61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48243-cwe-352-cross-site-request-forgery-csrf-in-bill-minozzi-recaptcha-for-all-aeb61a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48243%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20reCAPTCHA%20for%20all&amp;severity=null&amp;id=682cd0f81484d88663aeb61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48242-cwe-862-missing-authorization-in-wpwax-legal-pages-aeb618</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48242%3A%20Missing%20Authorization%20in%20wpWax%20Legal%20Pages&amp;severity=null&amp;id=682cd0f81484d88663aeb618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48240-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-cost-of-goods-for-woocommerce-aeb60b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Cost%20of%20Goods%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48239-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-product-notes-tab-private-admin-notes-for-woocommerce-aeb609</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Product%20Notes%20Tab%20%26%20Private%20Admin%20Notes%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48238-cwe-352-cross-site-request-forgery-csrf-in-awcode-awcode-toolkit-aeb607</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48238%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awcode%20AWcode%20Toolkit&amp;severity=null&amp;id=682cd0f81484d88663aeb607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48237-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-wishlist-for-woocommerce-aeb605</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48236-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bunny-net-bunny-net-aeb603</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bunny.net%20bunny.net&amp;severity=high&amp;id=682cd0f81484d88663aeb603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48235-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bogdan-bendziukov-wp-image-mask-aeb601</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bogdan%20Bendziukov%20WP%20Image%20Mask&amp;severity=null&amp;id=682cd0f81484d88663aeb601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48234-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ultimate-blocks-ultimate-blocks-aeb5ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48234%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ultimate%20Blocks%20Ultimate%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48233-cwe-352-cross-site-request-forgery-csrf-in-affmngr-affiliates-manager-google-recaptcha-integration-aeb5fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48233%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20affmngr%20Affiliates%20Manager%20Google%20reCAPTCHA%20Integration&amp;severity=null&amp;id=682cd0f81484d88663aeb5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48232-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xpro-xpro-addons-for-beaver-builder-8211-lite-aeb5fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Addons%20For%20Beaver%20Builder%20%26%238211%3B%20Lite&amp;severity=null&amp;id=682cd0f81484d88663aeb5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4936-sql-injection-in-projectworlds-online-food-ordering-system-aeb6da</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4936%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4935-sql-injection-in-sourcecodester-stock-management-system-aeb6d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4935%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4934-sql-injection-in-phpgurukul-user-registration-login-and-user-management-system-aeb6d6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4934%3A%20SQL%20Injection%20in%20PHPGurukul%20User%20Registration%20%26%20Login%20and%20User%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4933-sql-injection-in-ponaravindb-hospital-management-system-aeb858</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4933%3A%20SQL%20Injection%20in%20ponaravindb%20Hospital-Management-System&amp;severity=medium&amp;id=682cd0f81484d88663aeb858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4932-sql-injection-in-projectworlds-online-lawyer-management-system-aeb867</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4932%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4931-sql-injection-in-projectworlds-online-lawyer-management-system-aeb856</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4931%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4930-sql-injection-in-campcodes-online-shopping-portal-aeb854</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4930%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2099-cwe-1333-inefficient-regular-expression-complexity-in-huggingface-huggingface-transformers-aeb82f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2099%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=682cd0f81484d88663aeb82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4929-sql-injection-in-campcodes-online-shopping-portal-aeb7f7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4929%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4928-sql-injection-in-projectworlds-online-lawyer-management-system-aeb7f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4928%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4927-sql-injection-in-phpgurukul-online-marriage-registration-system-aeb7cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4927%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Marriage%20Registration%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rat-dropped-by-two-layers-of-autoit-code-16a09c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code&amp;severity=medium&amp;id=682c992c7960f6956616a09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4926-unrestricted-upload-in-phpgurukul-car-rental-project-aeb7ad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4926%3A%20Unrestricted%20Upload%20in%20PHPGurukul%20Car%20Rental%20Project&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4925-sql-injection-in-phpgurukul-daily-expense-tracker-system-aeb760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4925%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware-16a0c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Another%20Confluence%20Bites%20the%20Dust%3A%20Falling%20to%20ELPACO-team%20Ransomware&amp;severity=medium&amp;id=682c992c7960f6956616a0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4924-sql-injection-in-sourcecodester-client-database-management-system-aeb75e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4924%3A%20SQL%20Injection%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27566-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-appleple-inc-a-blog-cms-aeb737</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27566%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=low&amp;id=682cd0f81484d88663aeb737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32999-cross-site-scripting-xss-in-appleple-inc-a-blog-cms-aeb5de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32999%3A%20Cross-site%20scripting%20(XSS)%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=medium&amp;id=682cd0f81484d88663aeb5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36560-server-side-request-forgery-ssrf-in-appleple-inc-a-blog-cms-aeb5ac</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36560%3A%20Server-side%20request%20forgery%20(SSRF)%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=high&amp;id=682cd0f81484d88663aeb5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41429-improper-output-neutralization-for-logs-in-appleple-inc-a-blog-cms-aeb5ae</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41429%3A%20Improper%20output%20neutralization%20for%20logs%20in%20appleple%20inc.%20a-blog%20cms&amp;severity=medium&amp;id=682cd0f81484d88663aeb5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4923-unrestricted-upload-in-sourcecodester-client-database-management-system-aeb5bf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4923%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47760-stack-based-buffer-overflow-in-fuji-electric-co-ltd-v-sft-aeb5bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47760%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47759-stack-based-buffer-overflow-in-fuji-electric-co-ltd-s-sft-aeb58f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47759%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20S-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47758-stack-based-buffer-overflow-in-fuji-electric-co-ltd-v-sft-aeb58d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47758%3A%20Stack-based%20buffer%20overflow%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47757-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb71e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47757%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47756-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb71c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47756%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47755-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb6f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47755%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47754-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb6e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47754%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47753-out-of-bounds-read-in-fuji-electric-co-ltd-v-sft-aeb5ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47753%3A%20Out-of-bounds%20Read%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47752-out-of-bounds-write-in-fuji-electric-co-ltd-v-sft-aeb5ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47752%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47751-out-of-bounds-write-in-fuji-electric-co-ltd-v-sft-aeb5e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47751%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47750-out-of-bounds-write-in-fuji-electric-co-ltd-v-sft-aeb5e6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47750%3A%20Out-of-bounds%20Write%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47749-free-of-pointer-not-at-start-of-buffer-in-fuji-electric-co-ltd-v-sft-aeb5e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47749%3A%20Free%20of%20pointer%20not%20at%20start%20of%20buffer%20in%20FUJI%20ELECTRIC%20CO.%2C%20LTD.%20V-SFT&amp;severity=high&amp;id=682cd0f81484d88663aeb5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4917-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb59e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4917%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37891-vulnerability-in-linux-linux-aeb86f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f81484d88663aeb86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46801-authentication-bypass-by-primary-weakness-in-pgpool-global-development-group-pgpool-ii-aeb58b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46801%3A%20Authentication%20bypass%20by%20primary%20weakness%20in%20PgPool%20Global%20Development%20Group%20Pgpool-II&amp;severity=critical&amp;id=682cd0f81484d88663aeb58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4916-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb59c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4916%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4915-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb871</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4915%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4914-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb585</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4914%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2561-cwe-79-cross-site-scripting-xss-in-unknown-ninja-forms-aeb833</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2561%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Forms&amp;severity=medium&amp;id=682cd0f81484d88663aeb833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2560-cwe-79-cross-site-scripting-xss-in-unknown-ninja-forms-aeb831</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2560%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Forms&amp;severity=medium&amp;id=682cd0f81484d88663aeb831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2524-cwe-79-cross-site-scripting-xss-in-unknown-ninja-forms-aeb81a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2524%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Forms&amp;severity=medium&amp;id=682cd0f81484d88663aeb81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1627-cwe-79-cross-site-scripting-xss-in-unknown-qi-blocks-aeb814</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1627%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qi%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1626-cwe-79-cross-site-scripting-xss-in-unknown-qi-blocks-aeb7af</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1626%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qi%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1625-cwe-79-cross-site-scripting-xss-in-unknown-qi-blocks-aeb76f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1625%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Qi%20Blocks&amp;severity=medium&amp;id=682cd0f81484d88663aeb76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4477-cwe-862-missing-authorization-in-teamt5-threatsonar-anti-ransomware-aeb852</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4477%3A%20CWE-862%20Missing%20Authorization%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=682cd0f81484d88663aeb852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4913-sql-injection-in-phpgurukul-auto-taxi-stand-management-system-aeb848</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4913%3A%20SQL%20Injection%20in%20PHPGurukul%20Auto%20Taxi%20Stand%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4912-path-traversal-in-sourcecodester-student-result-management-system-aeb846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4912%3A%20Path%20Traversal%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4911-sql-injection-in-phpgurukul-zoo-management-system-aeb7f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4911%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2892-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-smub-all-in-one-seo-powerful-seo-plugin-to-boost-seo-rankings-increase-traffic-aeb835</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Powerful%20SEO%20Plugin%20to%20Boost%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=682cd0f81484d88663aeb835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4910-sql-injection-in-phpgurukul-zoo-management-system-aeb839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4910%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4909-exposure-of-information-through-directory-listing-in-sourcecodester-client-database-management-system-aeb837</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4909%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Client%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4908-sql-injection-in-phpgurukul-daily-expense-tracker-system-aeb82d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4908%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4907-sql-injection-in-phpgurukul-daily-expense-tracker-system-aeb82b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4907%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4906-sql-injection-in-phpgurukul-notice-board-system-aeb829</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4906%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4905-deserialization-in-iop-apl-uw-basestation3-aeb827</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4905%3A%20Deserialization%20in%20iop-apl-uw%20basestation3&amp;severity=medium&amp;id=682cd0f81484d88663aeb827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23122-vulnerability-in-nodejs-node-aeb816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23122&amp;severity=low&amp;id=682cd0f81484d88663aeb816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23165-vulnerability-in-nodejs-node-aeb818</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23165%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=low&amp;id=682cd0f81484d88663aeb818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23123-vulnerability-in-ubiquiti-inc-unifi-protect-cameras-aeb7fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23123%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Cameras&amp;severity=critical&amp;id=682cd0f81484d88663aeb7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23166-vulnerability-in-nodejs-node-aeb7b1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23166%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=high&amp;id=682cd0f81484d88663aeb7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23164-vulnerability-in-ubiquiti-inc-unifi-protect-application-aeb718</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23164%3A%20Vulnerability%20in%20Ubiquiti%20Inc%20UniFi%20Protect%20Application&amp;severity=medium&amp;id=682cd0f81484d88663aeb718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23167-vulnerability-in-nodejs-node-aeb6de</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23167%3A%20Vulnerability%20in%20nodejs%20node&amp;severity=medium&amp;id=682cd0f81484d88663aeb6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4904-information-disclosure-in-d-link-di-7003gv2-aeb6d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4904%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4903-unverified-password-change-in-d-link-di-7003gv2-aeb6d2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4903%3A%20Unverified%20Password%20Change%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4902-information-disclosure-in-d-link-di-7003gv2-aeb810</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4902%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43714-n-a-in-n-a-aeb5bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43714%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55063-n-a-in-n-a-aeb5a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55063%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30072-n-a-in-n-a-aeb5a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30072%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51106-n-a-in-n-a-aeb5a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51106%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28371-n-a-in-n-a-aeb589</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28371%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44108-n-a-in-n-a-aeb4f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44108%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-19-29d8f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-19&amp;severity=medium&amp;id=682c7db0e8347ec82d29d8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-19-73d1a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-19&amp;severity=medium&amp;id=682c7ab6e3e6de8ceb73d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4901-information-disclosure-in-d-link-di-7003gv2-aeb80e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4901%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f81484d88663aeb80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4900-sql-injection-in-campcodes-sales-and-inventory-system-aeb80c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4900%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4899-sql-injection-in-campcodes-sales-and-inventory-system-aeb80a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4899%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4898-path-traversal-in-sourcecodester-student-result-management-system-aeb808</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4898%3A%20Path%20Traversal%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4897-buffer-overflow-in-tenda-a15-aeb7f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4897%3A%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=682cd0f81484d88663aeb7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4896-buffer-overflow-in-tenda-ac10-aeb7ef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4896%3A%20Buffer%20Overflow%20in%20Tenda%20AC10&amp;severity=high&amp;id=682cd0f81484d88663aeb7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4895-sql-injection-in-sourcecodester-doctors-appointment-system-aeb7ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4895%3A%20SQL%20Injection%20in%20SourceCodester%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4894-inadequate-encryption-strength-in-calmkart-django-sso-server-aeb7eb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4894%3A%20Inadequate%20Encryption%20Strength%20in%20calmkart%20Django-sso-server&amp;severity=medium&amp;id=682cd0f81484d88663aeb7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4893-path-traversal-in-jammy928-coinexchange-cryptoexchange-java-aeb7e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4893%3A%20Path%20Traversal%20in%20jammy928%20CoinExchange_CryptoExchange_Java&amp;severity=medium&amp;id=682cd0f81484d88663aeb7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4892-stack-based-buffer-overflow-in-code-projects-police-station-management-system-aeb6c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4892%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Police%20Station%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4891-buffer-overflow-in-code-projects-police-station-management-system-aeb735</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4891%3A%20Buffer%20Overflow%20in%20code-projects%20Police%20Station%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4890-stack-based-buffer-overflow-in-code-projects-tourism-management-system-aeb4d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4890%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Tourism%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4889-buffer-overflow-in-code-projects-tourism-management-system-aeb6c3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4889%3A%20Buffer%20Overflow%20in%20code-projects%20Tourism%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4888-buffer-overflow-in-code-projects-pharmacy-management-system-aeb6c1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4888%3A%20Buffer%20Overflow%20in%20code-projects%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4887-cross-site-request-forgery-in-sourcecodester-online-student-clearance-system-aeb6bf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4887%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4886-sql-injection-in-itsourcecode-sales-and-inventory-system-aeb6bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4886%3A%20SQL%20Injection%20in%20itsourcecode%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4885-sql-injection-in-itsourcecode-sales-and-inventory-system-aeb6bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4885%3A%20SQL%20Injection%20in%20itsourcecode%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4884-sql-injection-in-itsourcecode-restaurant-management-system-aeb6b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4884%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4883-stack-based-buffer-overflow-in-d-link-di-8100-aeb7dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4883%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=682cd0f81484d88663aeb7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4882-sql-injection-in-itsourcecode-restaurant-management-system-aeb7ca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4882%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4881-sql-injection-in-itsourcecode-restaurant-management-system-aeb7bd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4881%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4880-sql-injection-in-phpgurukul-news-portal-aeb7bb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4880%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4875-sql-injection-in-campcodes-online-shopping-portal-aeb7b9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4875%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4874-sql-injection-in-phpgurukul-news-portal-project-aeb7b7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4874%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal%20Project&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4873-sql-injection-in-phpgurukul-news-portal-aeb7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4873%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4872-buffer-overflow-in-freefloat-ftp-server-aeb7b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4872%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4871-buffer-overflow-in-pcman-ftp-server-aeb7ab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4871%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4870-sql-injection-in-itsourcecode-restaurant-management-system-aeb79e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4870%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4869-sql-injection-in-itsourcecode-restaurant-management-system-aeb6b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4869%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4868-path-traversal-in-merikbest-ecommerce-spring-reactjs-aeb6b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4868%3A%20Path%20Traversal%20in%20merikbest%20ecommerce-spring-reactjs&amp;severity=medium&amp;id=682cd0f81484d88663aeb6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4867-denial-of-service-in-tenda-a15-aeb6b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4867%3A%20Denial%20of%20Service%20in%20Tenda%20A15&amp;severity=high&amp;id=682cd0f81484d88663aeb6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4866-code-injection-in-weibocom-rill-flow-aeb4d1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4866%3A%20Code%20Injection%20in%20weibocom%20rill-flow&amp;severity=medium&amp;id=682cd0f81484d88663aeb4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4865-sql-injection-in-itsourcecode-restaurant-management-system-aeb4cf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4865%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4864-sql-injection-in-itsourcecode-restaurant-management-system-aeb4cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4864%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4863-sql-injection-in-advaya-softech-gems-erp-portal-aeb125</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4863%3A%20SQL%20Injection%20in%20Advaya%20Softech%20GEMS%20ERP%20Portal&amp;severity=medium&amp;id=682cd0f71484d88663aeb125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4862-cross-site-scripting-in-phpgurukul-directory-management-system-aeb0ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4862%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-roundpress-targeting-high-value-webmail-servers-16a06e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20RoundPress%20targeting%20high-value%20webmail%20servers&amp;severity=medium&amp;id=682c992c7960f6956616a06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4861-sql-injection-in-phpgurukul-beauty-parlour-management-system-aeb79c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4861%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3715-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boldthemes-bold-page-builder-aeb771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=682cd0f81484d88663aeb771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4860-cross-site-scripting-in-d-link-dap-2695-aeb79a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4860%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=682cd0f81484d88663aeb79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4859-cross-site-scripting-in-d-link-dap-2695-aeb798</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4859%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=682cd0f81484d88663aeb798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4858-cross-site-scripting-in-d-link-dap-2695-aeb796</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4858%3A%20Cross%20Site%20Scripting%20in%20D-Link%20DAP-2695&amp;severity=medium&amp;id=682cd0f81484d88663aeb796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4852-cross-site-scripting-in-totolink-a3002r-aeb794</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4852%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20A3002R&amp;severity=medium&amp;id=682cd0f81484d88663aeb794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4851-command-injection-in-totolink-n300rh-aeb792</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4851%3A%20Command%20Injection%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=682cd0f81484d88663aeb792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4850-command-injection-in-totolink-n300rh-aeb790</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4850%3A%20Command%20Injection%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=682cd0f81484d88663aeb790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4849-command-injection-in-totolink-n300rh-aeb78e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4849%3A%20Command%20Injection%20in%20TOTOLINK%20N300RH&amp;severity=medium&amp;id=682cd0f81484d88663aeb78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4848-buffer-overflow-in-freefloat-ftp-server-aeb78c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4848%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4847-buffer-overflow-in-freefloat-ftp-server-aeb6a6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4847%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4846-buffer-overflow-in-freefloat-ftp-server-aeb6a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4846%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4845-buffer-overflow-in-freefloat-ftp-server-aeafeb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4845%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f71484d88663aeafeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4844-buffer-overflow-in-freefloat-ftp-server-aeb6a2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4844%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zyxel-usg-flex-h-series-uos-131-privilege-escalati-2977b57a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Zyxel%20USG%20FLEX%20H%20series%20uOS%201.31%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489dd87e6d765d51d5353f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invision-community-506-remote-code-execution-rce-9f6b4431</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invision%20Community%205.0.6%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489dd27e6d765d51d53467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crushftp-1131-authentication-bypass-a8a19094</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CrushFTP%2011.3.1%20-%20Authentication%20Bypass&amp;severity=medium&amp;id=68489dcc7e6d765d51d53394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48219-cwe-201-insertion-of-sensitive-information-into-sent-data-in-o2-uk-o2-aeb491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48219%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20O2%20UK%20O2&amp;severity=low&amp;id=682cd0f81484d88663aeb491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-18-29d2aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-18&amp;severity=medium&amp;id=682c7db0e8347ec82d29d2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-18-f12841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4843-stack-based-buffer-overflow-in-d-link-dcs-932l-aeb6a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4843%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=682cd0f81484d88663aeb6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4842-stack-based-buffer-overflow-in-d-link-dcs-932l-aeb69e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4842%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=682cd0f81484d88663aeb69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4841-stack-based-buffer-overflow-in-d-link-dcs-932l-aeb69c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4841%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DCS-932L&amp;severity=high&amp;id=682cd0f81484d88663aeb69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4839-permissive-cross-domain-policy-with-untrusted-domains-in-itwanger-paicoding-aeb77f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4839%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20itwanger%20paicoding&amp;severity=low&amp;id=682cd0f81484d88663aeb77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4838-open-redirect-in-kanwangzjm-funiture-aeb75c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4838%3A%20Open%20Redirect%20in%20kanwangzjm%20Funiture&amp;severity=medium&amp;id=682cd0f81484d88663aeb75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4919-out-of-bounds-access-when-optimizing-linear-sums-in-mozilla-firefox-aeb1ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4919%3A%20Out-of-bounds%20access%20when%20optimizing%20linear%20sums%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682cd0f71484d88663aeb1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4918-out-of-bounds-access-when-resolving-promise-objects-in-mozilla-firefox-aeb1a9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4918%3A%20Out-of-bounds%20access%20when%20resolving%20Promise%20objects%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682cd0f71484d88663aeb1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4921-aeb884</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4921&amp;severity=low&amp;id=682cd0f81484d88663aeb884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4920-aeb877</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4920&amp;severity=low&amp;id=682cd0f81484d88663aeb877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4837-sql-injection-in-projectworlds-student-project-allocation-system-aeb75a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4837%3A%20SQL%20Injection%20in%20projectworlds%20Student%20Project%20Allocation%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4836-sql-injection-in-projectworlds-life-insurance-management-system-aeb758</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4836%3A%20SQL%20Injection%20in%20Projectworlds%20Life%20Insurance%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4835-buffer-overflow-in-totolink-a702r-aeb756</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4835%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4834-buffer-overflow-in-totolink-a702r-aeb754</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4834%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47948-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cocotais-cocotais-bot-aeb74e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47948%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20cocotais%20cocotais-bot&amp;severity=high&amp;id=682cd0f81484d88663aeb74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47945-cwe-453-insecure-default-variable-initialization-in-donetick-donetick-aeb720</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47945%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20donetick%20donetick&amp;severity=critical&amp;id=682cd0f81484d88663aeb720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4833-buffer-overflow-in-totolink-a702r-aeb69a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4833%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4832-buffer-overflow-in-totolink-a702r-aeb698</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4832%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4831-buffer-overflow-in-totolink-a702r-aeafde</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4831%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f71484d88663aeafde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33103-cwe-250-execution-with-unnecessary-privileges-in-ibm-i-aeb1a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33103%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges&amp;severity=high&amp;id=682cd0f71484d88663aeb1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47931-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-aeb489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47931%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms&amp;severity=low&amp;id=682cd0f81484d88663aeb489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47273-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-pypa-setuptools-aeb71a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47273%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pypa%20setuptools&amp;severity=high&amp;id=682cd0f81484d88663aeb71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4830-buffer-overflow-in-totolink-a702r-aeb733</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4830%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4829-buffer-overflow-in-totolink-a702r-aeb731</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4829%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4827-buffer-overflow-in-totolink-a702r-aeb72f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4827%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4101-cwe-863-incorrect-authorization-in-wcmp-multivendorx-woocommerce-multivendor-marketplace-solutions-aeb722</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4101%3A%20CWE-863%20Incorrect%20Authorization%20in%20wcmp%20MultiVendorX%20%E2%80%93%20WooCommerce%20Multivendor%20Marketplace%20Solutions&amp;severity=medium&amp;id=682cd0f81484d88663aeb722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13613-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-marcinlawrowski-wise-chat-aeb6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13613%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20marcinlawrowski%20Wise%20Chat&amp;severity=high&amp;id=682cd0f81484d88663aeb6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4669-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdevelop-wp-booking-calendar-aeb6ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4669%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=medium&amp;id=682cd0f81484d88663aeb6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3888-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-artbees-jupiter-x-core-aeb6fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=682cd0f81484d88663aeb6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3527-cwe-862-missing-authorization-in-eventon-eventon-pro-wordpress-virtual-event-calendar-plugin-aeb6fb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3527%3A%20CWE-862%20Missing%20Authorization%20in%20EventON%20EventON%20(Pro)%20-%20WordPress%20Virtual%20Event%20Calendar%20Plugin&amp;severity=medium&amp;id=682cd0f81484d88663aeb6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4826-buffer-overflow-in-totolink-a702r-aeb6f5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4826%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4825-buffer-overflow-in-totolink-a702r-aeb696</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4825%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4824-buffer-overflow-in-totolink-a702r-aeafdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4824%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f71484d88663aeafdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4823-buffer-overflow-in-totolink-a702r-aeb694</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4823%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A702R&amp;severity=high&amp;id=682cd0f81484d88663aeb694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4610-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cbutlerjr-wp-members-membership-plugin-aeb48b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=682cd0f81484d88663aeb48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4819-improper-authorization-in-y-project-ruoyi-aeb687</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4819%3A%20Improper%20Authorization%20in%20y_project%20RuoYi&amp;severity=low&amp;id=682cd0f81484d88663aeb687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4190-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-csv-mass-importer-aeb685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4190%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CSV%20Mass%20Importer&amp;severity=high&amp;id=682cd0f81484d88663aeb685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3812-cwe-73-external-control-of-file-name-or-path-in-quantumcloud-wpbot-pro-wordpress-chatbot-aeb5c1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3812%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=high&amp;id=682cd0f81484d88663aeb5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4391-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-coderevolution-echo-rss-feed-post-generator-aeb5c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4391%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Echo%20RSS%20Feed%20Post%20Generator&amp;severity=critical&amp;id=682cd0f81484d88663aeb5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4389-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-coderevolution-crawlomatic-multipage-scraper-post-generator-aeb52a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4389%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Crawlomatic%20Multipage%20Scraper%20Post%20Generator&amp;severity=critical&amp;id=682cd0f81484d88663aeb52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4818-sql-injection-in-sourcecodester-doctor-s-appointment-system-aeb5dc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4818%3A%20SQL%20Injection%20in%20SourceCodester%20Doctor&apos;s%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4817-sql-injection-in-sourcecodester-doctor-s-appointment-system-aeb5da</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4817%3A%20SQL%20Injection%20in%20Sourcecodester%20Doctor&apos;s%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4194-cwe-352-cross-site-request-forgery-csrf-in-alti5-alt-monitoring-aeb5c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4194%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alti5%20AlT%20Monitoring&amp;severity=medium&amp;id=682cd0f81484d88663aeb5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4189-cwe-352-cross-site-request-forgery-csrf-in-naicuoctavian-audio-comments-plugin-aeb5c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4189%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20naicuoctavian%20Audio%20Comments%20Plugin&amp;severity=medium&amp;id=682cd0f81484d88663aeb5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4816-sql-injection-in-sourcecodester-doctor-s-appointment-system-aeb5cd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4816%3A%20SQL%20Injection%20in%20SourceCodester%20Doctor&apos;s%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4815-sql-injection-in-campcodes-sales-and-inventory-system-aeb5cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4815%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4814-sql-injection-in-campcodes-sales-and-inventory-system-aeb5c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4814%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47893-cwe-cwe-823-use-of-out-of-range-pointer-offset-4-16-in-imagination-technologies-graphics-ddk-aeb485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47893%3A%20CWE%20-%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20(4.16)%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=medium&amp;id=682cd0f81484d88663aeb485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1706-cwe-416-use-after-free-in-imagination-technologies-graphics-ddk-aeb487</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1706%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=682cd0f81484d88663aeb487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48187-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-infiniflow-ragflow-aeb5a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48187%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20infiniflow%20RAGFlow&amp;severity=critical&amp;id=682cd0f81484d88663aeb5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-17-29e7b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-17&amp;severity=medium&amp;id=682c7db0e8347ec82d29e7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-17-f12aca</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4813-sql-injection-in-phpgurukul-human-metapneumovirus-testing-management-system-aeba48</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4813%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4812-sql-injection-in-phpgurukul-human-metapneumovirus-testing-management-system-aeba46</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4812%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4811-sql-injection-in-codeastro-pharmacy-management-system-aeba44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4811%3A%20SQL%20Injection%20in%20CodeAstro%20Pharmacy%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4363-cwe-352-cross-site-request-forgery-csrf-in-unknown-wholesale-market-aeb92b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4363%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Wholesale%20Market&amp;severity=medium&amp;id=682cd0f91484d88663aeb92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4810-stack-based-buffer-overflow-in-tenda-ac7-aeba42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4810%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=682cd0f91484d88663aeba42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4805-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-watchguard-fireware-os-aeba3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=682cd0f91484d88663aeba3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4804-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-watchguard-fireware-os-aeba3a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20WatchGuard%20Fireware%20OS&amp;severity=medium&amp;id=682cd0f91484d88663aeba3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4809-stack-based-buffer-overflow-in-tenda-ac7-aeba40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4809%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC7&amp;severity=high&amp;id=682cd0f91484d88663aeba40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4808-sql-injection-in-phpgurukul-park-ticketing-management-system-aeb08c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4808%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4802-cwe-426-untrusted-search-path-in-the-gnu-c-library-glibc-aeb108</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4802%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=682cd0f71484d88663aeb108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4807-exposure-of-information-through-directory-listing-in-sourcecodester-online-student-clearance-system-aeba3e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4807%3A%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22233-cwe-20-improper-input-validation-in-spring-spring-framework-aeb93e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22233%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Spring%20Spring%20Framework&amp;severity=low&amp;id=682cd0f91484d88663aeb93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4806-sql-injection-in-sourcecodester-stock-management-system-aeba9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4806%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aeba9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4795-sql-injection-in-gongfuxiang-schoolcms-aeba9f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4795%3A%20SQL%20Injection%20in%20gongfuxiang%20schoolcms&amp;severity=medium&amp;id=682cd0f91484d88663aeba9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4794-sql-injection-in-phpgurukul-online-course-registration-aebac2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4794%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0f91484d88663aebac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4793-sql-injection-in-phpgurukul-online-course-registration-aeba9d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4793%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0f91484d88663aeba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4476-null-pointer-dereference-in-red-hat-red-hat-enterprise-linux-6-aebad3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4476%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0f91484d88663aebad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4792-buffer-overflow-in-freefloat-ftp-server-aebc76</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4792%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/how-interlock-ransomware-affects-the-defense-industrial-base-supply-chain-16a37f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=How%20Interlock%20Ransomware%20Affects%20the%20Defense%20Industrial%20Base%20Supply%20Chain&amp;severity=medium&amp;id=682c992c7960f6956616a37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4791-buffer-overflow-in-freefloat-ftp-server-aebadb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4791%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4790-buffer-overflow-in-freefloat-ftp-server-aebad9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4790%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-good-the-bad-and-the-ugly-in-cybersecurity-week-20-16a37b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Good%2C%20the%20Bad%20and%20the%20Ugly%20in%20Cybersecurity%20%E2%80%93%20Week%2020&amp;severity=medium&amp;id=682c992c7960f6956616a37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shared-ssh-keys-expose-phishing-infrastructure-targeting-kuwait-16a32c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shared%20SSH%20Keys%20Expose%20Phishing%20Infrastructure%20Targeting%20Kuwait&amp;severity=medium&amp;id=682c992c7960f6956616a32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4789-buffer-overflow-in-freefloat-ftp-server-aebad7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4789%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4788-buffer-overflow-in-freefloat-ftp-server-aebad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4788%3A%20Buffer%20Overflow%20in%20FreeFloat%20FTP%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4787-sql-injection-in-sourcecodester-stock-management-system-aebd87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4787%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31062-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-redqteam-wishlist-aebd89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31062%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20redqteam%20Wishlist&amp;severity=null&amp;id=682cd0f91484d88663aebd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31063-cwe-862-missing-authorization-in-redqteam-wishlist-aebd8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31063%3A%20Missing%20Authorization%20in%20redqteam%20Wishlist&amp;severity=null&amp;id=682cd0f91484d88663aebd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31065-cwe-862-missing-authorization-in-themeton-rozario-aebd8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31065%3A%20CWE-862%20Missing%20Authorization%20in%20themeton%20Rozario&amp;severity=medium&amp;id=682cd0f91484d88663aebd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31066-cwe-862-missing-authorization-in-themeton-acerola-aebd9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31066%3A%20Missing%20Authorization%20in%20themeton%20Acerola&amp;severity=null&amp;id=682cd0f91484d88663aebd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31068-cwe-352-cross-site-request-forgery-csrf-in-themeton-seven-stars-aebd9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31068%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeton%20Seven%20Stars&amp;severity=medium&amp;id=682cd0f91484d88663aebd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31071-cwe-862-missing-authorization-in-themeton-hotstar-multi-purpose-business-theme-aebd9e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31071%3A%20CWE-862%20Missing%20Authorization%20in%20themeton%20HotStar%20%E2%80%93%20Multi-Purpose%20Business%20Theme&amp;severity=medium&amp;id=682cd0f91484d88663aebd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31630-cwe-862-missing-authorization-in-themeton-the-business-aebcd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31630%3A%20CWE-862%20Missing%20Authorization%20in%20themeton%20The%20Business&amp;severity=medium&amp;id=682cd0f91484d88663aebcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31637-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-shout-aebcd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31637%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20SHOUT&amp;severity=null&amp;id=682cd0f91484d88663aebcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31639-cwe-352-cross-site-request-forgery-csrf-in-themeton-spare-aebce0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31639%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeton%20Spare&amp;severity=medium&amp;id=682cd0f91484d88663aebce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31640-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-magic-responsive-slider-and-carousel-wordpress-aebce2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31640%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Magic%20Responsive%20Slider%20and%20Carousel%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31641-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-uberslider-aebce4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31641%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20UberSlider&amp;severity=null&amp;id=682cd0f91484d88663aebce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31915-cwe-352-cross-site-request-forgery-csrf-in-kamleshyadav-pixel-wordpress-form-builderplugin-autoresponder-aebce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31915%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kamleshyadav%20Pixel%20WordPress%20Form%20BuilderPlugin%20%26%20Autoresponder&amp;severity=null&amp;id=682cd0f91484d88663aebce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31921-cwe-352-cross-site-request-forgery-csrf-in-loopus-wp-ultimate-tours-builder-aebce8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31921%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20loopus%20WP%20Ultimate%20Tours%20Builder&amp;severity=null&amp;id=682cd0f91484d88663aebce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31922-cwe-352-cross-site-request-forgery-csrf-in-quanticalabs-css3-accordions-for-wordpress-aebcea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20QuanticaLabs%20CSS3%20Accordions%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31923-cwe-862-missing-authorization-in-quanticalabs-css3-accordions-for-wordpress-aebcec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31923%3A%20Missing%20Authorization%20in%20QuanticaLabs%20CSS3%20Accordions%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31926-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-sticky-radio-player-aebcee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31926%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Sticky%20Radio%20Player&amp;severity=null&amp;id=682cd0f91484d88663aebcee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31928-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-multimedia-responsive-carousel-with-image-video-audio-support-aebd30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31928%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Multimedia%20Responsive%20Carousel%20with%20Image%20Video%20Audio%20Support&amp;severity=null&amp;id=682cd0f91484d88663aebd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32180-cwe-862-missing-authorization-in-quanticalabs-css3-tooltips-for-wordpress-aebd3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32180%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojofywp%20Product%20Carousel%20For%20WooCommerce%20%E2%80%93%20WoorouSell&amp;severity=null&amp;id=682cd0f91484d88663aebd3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32245-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-apollo-aebcf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32245%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chaser324%20Featured%20Posts%20Scroll&amp;severity=null&amp;id=682cd0f91484d88663aebcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32287-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-responsive-html5-audio-player-pro-with-playlist-aebcf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32287%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Responsive%20HTML5%20Audio%20Player%20PRO%20With%20Playlist&amp;severity=null&amp;id=682cd0f91484d88663aebcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32290-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-sticky-html5-music-player-aebcff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32290%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Sticky%20HTML5%20Music%20Player&amp;severity=null&amp;id=682cd0f91484d88663aebcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32295-cwe-862-missing-authorization-in-wordpresschef-salon-booking-pro-aebd01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32295%3A%20Missing%20Authorization%20in%20wordpresschef%20Salon%20Booking%20Pro&amp;severity=null&amp;id=682cd0f91484d88663aebd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32296-cwe-862-missing-authorization-in-quantumcloud-simple-link-directory-pro-aebd03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32296%3A%20Missing%20Authorization%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=null&amp;id=682cd0f91484d88663aebd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32299-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-themovation-quickcal-aebd05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32299%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Themovation%20QuickCal%20-%20Appointment%20Booking%20Calendar%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32301-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-countdown-pro-wp-plugin-aebd07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32301%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20CountDown%20Pro%20WP%20Plugin&amp;severity=null&amp;id=682cd0f91484d88663aebd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32306-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-radio-player-shoutcast-icecast-wordpress-plugin-aebd09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32306%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Radio%20Player%20Shoutcast%20%26%20Icecast%20WordPress%20Plugin&amp;severity=null&amp;id=682cd0f91484d88663aebd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32307-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-chameleon-html5-audio-player-with-without-playlist-aebd0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32307%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Chameleon%20HTML5%20Audio%20Player%20With%2FWithout%20Playlist&amp;severity=null&amp;id=682cd0f91484d88663aebd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32310-cwe-352-cross-site-request-forgery-csrf-in-thememove-quickcal-aebd0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32310%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeMove%20QuickCal%20-%20Appointment%20Booking%20Calendar%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32643-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mojoomla-wpgym-aebd3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32643%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mojoomla%20WPGYM&amp;severity=critical&amp;id=682cd0f91484d88663aebd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39481-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-imithemes-eventer-aebd41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39481%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imithemes%20Eventer&amp;severity=null&amp;id=682cd0f91484d88663aebd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39482-cwe-862-missing-authorization-in-imithemes-eventer-aebd43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39482%3A%20Missing%20Authorization%20in%20imithemes%20Eventer&amp;severity=null&amp;id=682cd0f91484d88663aebd43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39491-cwe-35-path-traversal-in-whmpress-whmpress-aebd45</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39491%3A%20CWE-35%20Path%20Traversal%20in%20WHMPress%20WHMpress&amp;severity=high&amp;id=682cd0f91484d88663aebd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39492-cwe-35-path-traversal-in-whmpress-whmpress-aebd47</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39492%3A%20CWE-35%20Path%20Traversal%20in%20WHMPress%20WHMpress&amp;severity=high&amp;id=682cd0f91484d88663aebd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39493-cwe-862-missing-authorization-in-valvepress-rankie-aebd49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39493%3A%20Missing%20Authorization%20in%20ValvePress%20Rankie&amp;severity=null&amp;id=682cd0f91484d88663aebd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39507-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-nasatheme-nasa-core-aebd4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39507%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20NasaTheme%20Nasa%20Core&amp;severity=null&amp;id=682cd0f91484d88663aebd4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39509-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themencode-tnc-flipbook-aebd0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNcode%20TNC%20FlipBook&amp;severity=null&amp;id=682cd0f91484d88663aebd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39511-cwe-862-missing-authorization-in-valvepress-pinterest-automatic-pin-aebd11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39511%3A%20Missing%20Authorization%20in%20ValvePress%20Pinterest%20Automatic%20Pin&amp;severity=null&amp;id=682cd0f91484d88663aebd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39537-cwe-639-authorization-bypass-through-user-controlled-key-in-chimpstudio-wp-jobhunt-aebd1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blaze%20Concepts%20Better%20Customer%20List%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f91484d88663aebd1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46464-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scripteo-ads-pro-plugin-aebd20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scripteo%20Ads%20Pro&amp;severity=null&amp;id=682cd0f91484d88663aebd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47534-cwe-862-missing-authorization-in-valvepress-wordpress-auto-spinner-aebd22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47534%3A%20Missing%20Authorization%20in%20ValvePress%20Wordpress%20Auto%20Spinner&amp;severity=null&amp;id=682cd0f91484d88663aebd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47556-cwe-862-missing-authorization-in-quanticalabs-css3-compare-pricing-tables-for-wordpress-aebca4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47556%3A%20Missing%20Authorization%20in%20QuanticaLabs%20CSS3%20Compare%20Pricing%20Tables%20for%20WordPress&amp;severity=null&amp;id=682cd0f91484d88663aebca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47557-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-romancode-mapsvg-aebad1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47560-cwe-862-missing-authorization-in-romancode-mapsvg-aebca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47560%3A%20Missing%20Authorization%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47562-cwe-94-improper-control-of-generation-of-code-code-injection-in-romancode-mapsvg-aebca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47562%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47563-cwe-862-missing-authorization-in-villatheme-curcy-aebcaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47563%3A%20Missing%20Authorization%20in%20villatheme%20CURCY&amp;severity=null&amp;id=682cd0f91484d88663aebcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47564-cwe-862-missing-authorization-in-ashanjay-eventon-aebd4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47564%3A%20Missing%20Authorization%20in%20ashanjay%20EventON&amp;severity=null&amp;id=682cd0f91484d88663aebd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47567-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-lambertgroup-video-player-fullscreen-video-background-aebd4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47567%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LambertGroup%20Video%20Player%20%26%20FullScreen%20Video%20Background&amp;severity=null&amp;id=682cd0f91484d88663aebd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47693-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-roninwp-fat-services-booking-aebd5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47693%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Services%20Booking&amp;severity=null&amp;id=682cd0f91484d88663aebd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48146-cwe-352-cross-site-request-forgery-csrf-in-michael-lups-seo-flow-by-lupsonline-aebd83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48146%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Lups%20SEO%20Flow%20by%20LupsOnline&amp;severity=null&amp;id=682cd0f91484d88663aebd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48144-cwe-352-cross-site-request-forgery-csrf-in-sidngr-import-export-for-woocommerce-aebd81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48144%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=null&amp;id=682cd0f91484d88663aebd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48138-cwe-862-missing-authorization-in-berthaai-bertha-ai-aebd7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48138%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%26%238211%3B%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=null&amp;id=682cd0f91484d88663aebd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48137-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-proxymis-interview-aebd7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48137%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20proxymis%20Interview&amp;severity=null&amp;id=682cd0f91484d88663aebd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48136-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-estatik-mortgage-calculator-estatik-aebd7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48136%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Estatik%20Mortgage%20Calculator%20Estatik&amp;severity=null&amp;id=682cd0f91484d88663aebd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48135-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aptivadadev-aptivada-for-wp-aebd6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aptivadadev%20Aptivada%20for%20WP&amp;severity=null&amp;id=682cd0f91484d88663aebd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48134-cwe-502-deserialization-of-untrusted-data-in-shapedplugin-llc-wp-tabs-aebd6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48134%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ShapedPlugin%20LLC%20WP%20Tabs&amp;severity=null&amp;id=682cd0f91484d88663aebd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48132-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pencilwp-x-addons-for-elementor-aebcc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pencilwp%20X%20Addons%20for%20Elementor&amp;severity=null&amp;id=682cd0f91484d88663aebcc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48131-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-saiful-islam-ultraaddons-elementor-lite-aebcc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saiful%20Islam%20UltraAddons%20Elementor%20Lite&amp;severity=null&amp;id=682cd0f91484d88663aebcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48128-cwe-862-missing-authorization-in-sharespine-sharespine-woocommerce-connector-aebcc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48128%3A%20Missing%20Authorization%20in%20Sharespine%20Sharespine%20Woocommerce%20Connector&amp;severity=null&amp;id=682cd0f91484d88663aebcc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48127-cwe-862-missing-authorization-in-app-cheap-push-notification-for-mobile-and-web-app-aebcc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48127%3A%20Missing%20Authorization%20in%20App%20Cheap%20Push%20notification%20for%20Mobile%20and%20Web%20app&amp;severity=null&amp;id=682cd0f91484d88663aebcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48121-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-steve-puddick-wp-notes-widget-aebcb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48121%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Puddick%20WP%20Notes%20Widget&amp;severity=null&amp;id=682cd0f91484d88663aebcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48120-cwe-94-improper-control-of-generation-of-code-code-injection-in-romancode-mapsvg-lite-aebcb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48120%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=682cd0f91484d88663aebcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48119-cwe-94-improper-control-of-generation-of-code-code-injection-in-rs-wp-themes-rs-wp-book-showcase-aebcb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48119%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RS%20WP%20THEMES%20RS%20WP%20Book%20Showcase&amp;severity=null&amp;id=682cd0f91484d88663aebcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48117-cwe-862-missing-authorization-in-kilbot-woocommerce-pos-aebcae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48117%3A%20Missing%20Authorization%20in%20kilbot%20WooCommerce%20POS&amp;severity=null&amp;id=682cd0f91484d88663aebcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48116-cwe-862-missing-authorization-in-ashan-perera-eventon-aebcac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48116%3A%20Missing%20Authorization%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=682cd0f91484d88663aebcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48115-cwe-352-cross-site-request-forgery-csrf-in-javier-revilla-validatecertify-aebd6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48115%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Javier%20Revilla%20ValidateCertify&amp;severity=null&amp;id=682cd0f91484d88663aebd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48114-cwe-352-cross-site-request-forgery-csrf-in-shayan-farhang-pazhooh-shayanweb-admin-fontchanger-aebd68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48114%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shayan%20Farhang%20Pazhooh%20ShayanWeb%20Admin%20FontChanger&amp;severity=null&amp;id=682cd0f91484d88663aebd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48113-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-broadstreet-broadstreet-aebd66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=null&amp;id=682cd0f91484d88663aebd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48112-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-karimmughal-dot-html-php-xml-etc-pages-aebd64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48112%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karimmughal%20Dot%20html%2Cphp%2Cxml%20etc%20pages&amp;severity=null&amp;id=682cd0f91484d88663aebd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48080-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-uncanny-owl-uncanny-toolkit-for-learndash-aebd62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uncanny%20Owl%20Uncanny%20Toolkit%20for%20LearnDash&amp;severity=null&amp;id=682cd0f91484d88663aebd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48079-cwe-862-missing-authorization-in-metagauss-profilegrid-aebd60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48079%3A%20Missing%20Authorization%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=682cd0f91484d88663aebd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4786-sql-injection-in-sourcecodester-stock-management-system-aebd85</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4786%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40906-cwe-1395-dependency-on-vulnerable-third-party-component-in-mongodb-bson-xs-aeba25</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40906%3A%20CWE-1395%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20MONGODB%20BSON%3A%3AXS&amp;severity=critical&amp;id=682cd0f91484d88663aeba25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4785-sql-injection-in-phpgurukul-daily-expense-tracker-system-aebd2e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4785%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47794-cwe-284-improper-access-control-in-nextcloud-security-advisories-aebe43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47794%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=low&amp;id=682cd0f91484d88663aebe43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47793-cwe-770-allocation-of-resources-without-limits-or-throttling-in-nextcloud-security-advisories-aebe41</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47793%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4782-sql-injection-in-sourcecodester-stock-management-system-aebe47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4782%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4781-sql-injection-in-phpgurukul-park-ticketing-management-system-aebe45</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4781%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4478-null-pointer-dereference-in-red-hat-red-hat-enterprise-linux-8-aebe54</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4478%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0f91484d88663aebe54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47792-cwe-284-improper-access-control-in-nextcloud-security-advisories-aebe56</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47792%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47791-cwe-918-server-side-request-forgery-ssrf-in-nextcloud-security-advisories-aebe3f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47791%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47790-cwe-287-improper-authentication-in-nextcloud-security-advisories-aebe3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47790%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682cd0f91484d88663aebe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4780-sql-injection-in-phpgurukul-park-ticketing-management-system-aebe5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4780%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32962-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-dpgaspar-flask-appbuilder-aebe37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32962%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20dpgaspar%20Flask-AppBuilder&amp;severity=medium&amp;id=682cd0f91484d88663aebe37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4600-cwe-20-improper-input-validation-in-google-cloud-classic-application-load-balancer-aebe39</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4600%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Google%20Cloud%20Classic%20Application%20Load%20Balancer&amp;severity=high&amp;id=682cd0f91484d88663aebe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4778-sql-injection-in-phpgurukul-park-ticketing-management-system-aebe75</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4778%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4211-cwe-59-improper-link-resolution-before-file-access-link-following-in-the-qt-company-qt-aebe73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4211%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20The%20Qt%20Company%20Qt&amp;severity=high&amp;id=682cd0f91484d88663aebe73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40907-cwe-1395-dependency-on-vulnerable-third-party-component-in-ether-fcgi-aebe22</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40907%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20ETHER%20FCGI&amp;severity=medium&amp;id=682cd0f91484d88663aebe22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37890-vulnerability-in-linux-linux-aebf16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4777-sql-injection-in-phpgurukul-park-ticketing-management-system-aebee2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4777%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40629-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-pnetlab-pnetlab-aebf1c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40629%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PNETLab%20PNETLab&amp;severity=high&amp;id=682cd0fa1484d88663aebf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4773-sql-injection-in-phpgurukul-online-course-registration-aebf20</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4773%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0fa1484d88663aebf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2306-cwe-284-improper-access-control-in-syncpilot-live-contract-aebf1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2306%3A%20CWE-284%20Improper%20Access%20Control%20in%20SYNCPILOT%20LIVE%20CONTRACT&amp;severity=medium&amp;id=682cd0fa1484d88663aebf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2305-cwe-20-improper-input-validation-in-syncpilot-live-contract-aebf18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2305%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SYNCPILOT%20LIVE%20CONTRACT&amp;severity=high&amp;id=682cd0fa1484d88663aebf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4772-sql-injection-in-phpgurukul-online-course-registration-aebf1e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4772%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0fa1484d88663aebf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4771-sql-injection-in-phpgurukul-online-course-registration-aebf2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4771%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Course%20Registration&amp;severity=medium&amp;id=682cd0fa1484d88663aebf2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40632-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-icewarp-icewarp-mail-server-aebe96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Icewarp%20Icewarp%20Mail%20Server&amp;severity=low&amp;id=682cd0f91484d88663aebe96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40631-cwe-644-improper-neutralization-of-http-headers-for-scripting-syntax-in-icewarp-icewarp-mail-server-aebe94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40631%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20Icewarp%20Icewarp%20Mail%20Server&amp;severity=low&amp;id=682cd0f91484d88663aebe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40630-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-icewarp-icewarp-mail-server-aebe92</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40630%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Icewarp%20Icewarp%20Mail%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebe92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4770-sql-injection-in-phpgurukul-park-ticketing-management-system-aebf14</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4770%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4769-uncontrolled-search-path-in-cbewin-anytxt-searcher-aebe28</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4769%3A%20Uncontrolled%20Search%20Path%20in%20CBEWIN%20Anytxt%20Searcher&amp;severity=high&amp;id=682cd0f91484d88663aebe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4768-unrestricted-upload-in-feng-ha-ha-ssm-erp-aebe26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4768%3A%20Unrestricted%20Upload%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=682cd0f91484d88663aebe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4767-code-injection-in-defog-ai-introspect-aebe09</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4767%3A%20Code%20Injection%20in%20defog-ai%20introspect&amp;severity=medium&amp;id=682cd0f91484d88663aebe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4766-sql-injection-in-phpgurukul-zoo-management-system-aebe07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4766%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebe07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pixel-perfect-trap-the-surge-of-svg-borne-phishing-attacks-16a2fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pixel-Perfect%20Trap%3A%20The%20Surge%20of%20SVG-Borne%20Phishing%20Attacks&amp;severity=medium&amp;id=682c992c7960f6956616a2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mass-scanning-and-exploit-campaigns-16a302</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mass%20Scanning%20and%20Exploit%20Campaigns&amp;severity=critical&amp;id=682c992c7960f6956616a302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/part-2-compromised-wordpress-pages-and-malware-campaigns-16a2b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Part%202%3A%20Compromised%20WordPress%20Pages%20and%20Malware%20Campaigns&amp;severity=medium&amp;id=682c992c7960f6956616a2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yet-another-nodejs-backdoor-yanb-a-modern-challenge-16a31f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yet%20Another%20NodeJS%20Backdoor%20(YaNB)%3A%20A%20Modern%20Challenge&amp;severity=medium&amp;id=682c992c7960f6956616a31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4679-insufficiently-protected-credentials-in-synology-active-backup-for-microsoft-365-aeb894</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4679%3A%20Insufficiently%20Protected%20Credentials%20in%20Synology%20Active%20Backup%20for%20Microsoft%20365&amp;severity=medium&amp;id=682cd0f81484d88663aeb894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4765-sql-injection-in-phpgurukul-zoo-management-system-aebdda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4765%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1975-cwe-129-improper-validation-of-array-index-in-ollama-ollama-ollama-aebdc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1975%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20ollama%20ollama%2Follama&amp;severity=high&amp;id=682cd0f91484d88663aebdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/actionable-threat-hunting-with-threat-intelligence-i-hunting-malicious-desktop-files-16a5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Actionable%20threat%20hunting%20with%20Threat%20Intelligence%20(I)%20-%20Hunting%20malicious%20desktop%20files&amp;severity=medium&amp;id=682c992c7960f6956616a5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4761-sql-injection-in-phpgurukul-complaint-management-system-aebdd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4761%3A%20SQL%20Injection%20in%20PHPGurukul%20Complaint%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4758-sql-injection-in-phpgurukul-beauty-parlour-management-system-aebdc1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4758%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4757-sql-injection-in-phpgurukul-beauty-parlour-management-system-aebdbf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4757%3A%20SQL%20Injection%20in%20PHPGurukul%20Beauty%20Parlour%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4756-denial-of-service-in-d-link-di-7003gv2-aebdbd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4756%3A%20Denial%20of%20Service%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53827-cwe-20-improper-input-validation-in-ericsson-packet-core-controller-aebdfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53827%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Ericsson%20Packet%20Core%20Controller&amp;severity=high&amp;id=682cd0f91484d88663aebdfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4755-improper-authentication-in-d-link-di-7003gv2-aebe03</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4755%3A%20Improper%20Authentication%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebe03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3624-cwe-862-missing-authorization-in-hitachi-hitachi-ops-center-analyzer-aebdff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3624%3A%20CWE-862%20Missing%20Authorization%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer&amp;severity=medium&amp;id=682cd0f91484d88663aebdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8201-cwe-1385-missing-origin-validation-in-websockets-in-hitachi-hitachi-ops-center-analyzer-aebdfd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8201%3A%20CWE-1385%20Missing%20Origin%20Validation%20in%20WebSockets%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer&amp;severity=medium&amp;id=682cd0f91484d88663aebdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4753-information-disclosure-in-d-link-di-7003gv2-aebe01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4753%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebe01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1531-cwe-1392-use-of-default-credentials-in-hitachi-hitachi-ops-center-analyzer-viewpoint-aebde0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1531%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer%20viewpoint&amp;severity=medium&amp;id=682cd0f91484d88663aebde0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1245-cwe-348-use-of-less-trusted-source-in-hitachi-hitachi-infrastructure-analytics-advisor-aebdde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1245%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=medium&amp;id=682cd0f91484d88663aebdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4752-information-disclosure-in-d-link-di-7003gv2-aebdea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4752%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4751-information-disclosure-in-d-link-di-7003gv2-aebf12</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4751%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0fa1484d88663aebf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3516-cwe-79-cross-site-scripting-xss-in-unknown-simple-lightbox-aebc8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3516%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Simple%20Lightbox&amp;severity=medium&amp;id=682cd0f91484d88663aebc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3201-cwe-79-cross-site-scripting-xss-in-unknown-contact-form-builder-with-drag-drop-for-wordpress-aebc8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3201%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%20builder%20with%20drag%20%26%20drop%20for%20WordPress&amp;severity=medium&amp;id=682cd0f91484d88663aebc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4750-information-disclosure-in-d-link-di-7003gv2-aebdbb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4750%3A%20Information%20Disclosure%20in%20D-Link%20DI-7003GV2&amp;severity=medium&amp;id=682cd0f91484d88663aebdbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4749-denial-of-service-in-d-link-di-7003gv2-aebdb9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4749%3A%20Denial%20of%20Service%20in%20D-Link%20DI-7003GV2&amp;severity=high&amp;id=682cd0f91484d88663aebdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4747-command-injection-in-bohua-netdragon-firewall-aebdaa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4747%3A%20Command%20Injection%20in%20Bohua%20NetDragon%20Firewall&amp;severity=medium&amp;id=682cd0f91484d88663aebdaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4759-incorrect-behavior-order-early-validation-in-lockfile-lint-api-aebc87</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4759%3A%20Incorrect%20Behavior%20Order%3A%20Early%20Validation%20in%20lockfile-lint-api&amp;severity=medium&amp;id=682cd0f91484d88663aebc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4746-sql-injection-in-campcodes-sales-and-inventory-system-aebda8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4746%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4745-cross-site-scripting-in-code-projects-employee-record-system-aebda6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4745%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Record%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4744-cross-site-scripting-in-code-projects-employee-record-system-aebda4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4744%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Employee%20Record%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4743-sql-injection-in-code-projects-employee-record-system-aebda2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4743%3A%20SQL%20Injection%20in%20code-projects%20Employee%20Record%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4742-deserialization-in-xu-yijie-grpo-flat-aebde8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4742%3A%20Deserialization%20in%20XU-YIJIE%20grpo-flat&amp;severity=medium&amp;id=682cd0f91484d88663aebde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4741-sql-injection-in-campcodes-sales-and-inventory-system-aebde6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4741%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebde6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4740-deserialization-in-beamctrl-airiana-aebde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4740%3A%20Deserialization%20in%20BeamCtrl%20Airiana&amp;severity=medium&amp;id=682cd0f91484d88663aebde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4169-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-urkekg-posts-per-cat-aebde2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Posts%20per%20Cat&amp;severity=medium&amp;id=682cd0f91484d88663aebde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4739-sql-injection-in-projectworlds-hospital-database-management-system-aebdcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4739%3A%20SQL%20Injection%20in%20projectworlds%20Hospital%20Database%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4736-sql-injection-in-phpgurukul-daily-expense-tracker-aebdc9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4736%3A%20SQL%20Injection%20in%20PHPGurukul%20Daily%20Expense%20Tracker&amp;severity=medium&amp;id=682cd0f91484d88663aebdc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4735-unrestricted-upload-in-campcodes-sales-and-inventory-system-aebdc7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4735%3A%20Unrestricted%20Upload%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4734-sql-injection-in-campcodes-sales-and-inventory-system-aebf10</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4734%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebf10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51475-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-ibm-content-navigator-aebeef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51475%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=682cd0fa1484d88663aebeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4733-buffer-overflow-in-totolink-a3002r-aebf0e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4733%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0fa1484d88663aebf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4732-buffer-overflow-in-totolink-a3002r-aebf01</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4732%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0fa1484d88663aebf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4731-buffer-overflow-in-totolink-a3002r-aebe24</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4731%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0f91484d88663aebe24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4730-buffer-overflow-in-totolink-a3002r-aebee0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4730%3A%20Buffer%20Overflow%20in%20TOTOLINK%20A3002R&amp;severity=high&amp;id=682cd0fa1484d88663aebee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48175-cwe-190-integer-overflow-or-wraparound-in-aomedia-libavif-aebed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48175%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20aomedia%20libavif&amp;severity=medium&amp;id=682cd0fa1484d88663aebed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48174-cwe-190-integer-overflow-or-wraparound-in-aomedia-libavif-aebed6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48174%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20aomedia%20libavif&amp;severity=medium&amp;id=682cd0fa1484d88663aebed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47809-cwe-272-least-privilege-violation-in-wibu-codemeter-aebebd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47809%3A%20CWE-272%20Least%20Privilege%20Violation%20in%20Wibu%20CodeMeter&amp;severity=high&amp;id=682cd0f91484d88663aebebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40120-n-a-in-n-a-aebe16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aebe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48188-cwe-125-out-of-bounds-read-in-gnu-pspp-aeba38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48188%3A%20CWE-125%20Out-of-bounds%20Read%20in%20GNU%20PSPP&amp;severity=low&amp;id=682cd0f91484d88663aeba38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32407-n-a-in-n-a-aeba06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32407%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aeba06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47916-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-invisioncommunity-invision-power-board-aeb8a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47916%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20invisioncommunity%20Invision%20Power%20Board&amp;severity=critical&amp;id=682cd0f81484d88663aeb8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-16-29dfe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-16&amp;severity=medium&amp;id=682c7db0e8347ec82d29dfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-16-f12803</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4729-command-injection-in-totolink-a3002r-aebeff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4729%3A%20Command%20Injection%20in%20TOTOLINK%20A3002R&amp;severity=medium&amp;id=682cd0fa1484d88663aebeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47930-cwe-863-incorrect-authorization-in-zulip-zulip-aebef1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47930%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20zulip%20zulip&amp;severity=medium&amp;id=682cd0fa1484d88663aebef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4728-sql-injection-in-sourcecodester-best-online-news-portal-aebefd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4728%3A%20SQL%20Injection%20in%20SourceCodester%20Best%20Online%20News%20Portal&amp;severity=medium&amp;id=682cd0fa1484d88663aebefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4727-inefficient-regular-expression-complexity-in-meteor-aebede</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4727%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Meteor&amp;severity=medium&amp;id=682cd0fa1484d88663aebede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unfiltered-look-into-lockbit-s-operations-16a5e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unfiltered%20look%20into%20LockBit%E2%80%99s%20operations&amp;severity=medium&amp;id=682c992c7960f6956616a5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0921-cwe-250-execution-with-unnecessary-privileges-in-mitsubishi-electric-corporation-genesis64-aebed2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0921%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=medium&amp;id=682cd0f91484d88663aebed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4726-sql-injection-in-itsourcecode-placement-management-system-aebefb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4726%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4725-sql-injection-in-itsourcecode-placement-management-system-aebef9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4725%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4724-sql-injection-in-itsourcecode-placement-management-system-aebef7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4724%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4723-sql-injection-in-itsourcecode-placement-management-system-aebef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4723%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4722-sql-injection-in-itsourcecode-placement-management-system-aebedc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4722%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47287-cwe-770-allocation-of-resources-without-limits-or-throttling-in-tornadoweb-tornado-aebebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47287%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=682cd0f91484d88663aebebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47275-cwe-287-improper-authentication-in-auth0-auth0-php-aebeb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47275%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20auth0-PHP&amp;severity=critical&amp;id=682cd0f91484d88663aebeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4721-sql-injection-in-itsourcecode-placement-management-system-aebec1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4721%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4720-path-traversal-in-sourcecodester-student-result-management-system-aebebf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4720%3A%20Path%20Traversal%20in%20SourceCodester%20Student%20Result%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4719-sql-injection-in-campcodes-sales-and-inventory-system-aec17e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4719%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4718-sql-injection-in-campcodes-sales-and-inventory-system-aec17c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4718%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat-16a631</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fileless%20Execution%3A%20PowerShell%20Based%20Shellcode%20Loader%20Executes%20Remcos%20RAT&amp;severity=low&amp;id=682c992c7960f6956616a631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/backdoor-implant-discovered-on-pypi-posing-as-debugging-utility-16a61f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Backdoor%20implant%20discovered%20on%20PyPI%20posing%20as%20debugging%20utility&amp;severity=medium&amp;id=682c992c7960f6956616a61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47929-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dumbwareio-dumbdrop-aec182</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47929%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DumbWareio%20DumbDrop&amp;severity=low&amp;id=682cd0fa1484d88663aec182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1138-cwe-548-exposure-of-information-through-directory-listing-in-ibm-infosphere-information-server-aebed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1138%3A%20CWE-548%20Exposure%20of%20Information%20Through%20Directory%20Listing%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47928-cwe-488-exposure-of-data-element-to-wrong-session-in-spotipy-dev-spotipy-aec184</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47928%3A%20CWE-488%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20spotipy-dev%20spotipy&amp;severity=critical&amp;id=682cd0fa1484d88663aec184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8009-cwe-863-incorrect-authorization-in-unknown-sensei-lms-aebe20</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8009%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sensei%20LMS&amp;severity=medium&amp;id=682cd0f91484d88663aebe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6711-cwe-79-cross-site-scripting-xss-in-unknown-event-tickets-with-ticket-scanner-aebe1e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6711%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=low&amp;id=682cd0f91484d88663aebe1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4665-cwe-284-improper-access-control-in-unknown-eventprime-aebe1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4665%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20EventPrime&amp;severity=medium&amp;id=682cd0f91484d88663aebe1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4091-cwe-79-cross-site-scripting-xss-in-unknown-responsive-gallery-grid-aebe1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4091%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Gallery%20Grid&amp;severity=low&amp;id=682cd0f91484d88663aebe1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4004-cwe-79-cross-site-scripting-xss-in-unknown-advanced-cron-manager-aebe18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4004%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advanced%20Cron%20Manager&amp;severity=low&amp;id=682cd0f91484d88663aebe18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4002-cwe-79-cross-site-scripting-xss-in-unknown-carousel-slider-gallery-by-wp-carousel-aebd2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4002%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Carousel%2C%20Slider%2C%20Gallery%20by%20WP%20Carousel&amp;severity=low&amp;id=682cd0f91484d88663aebd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3996-cwe-79-cross-site-scripting-xss-in-unknown-smart-post-show-aebd2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3996%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Smart%20Post%20Show&amp;severity=low&amp;id=682cd0f91484d88663aebd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3901-cwe-79-cross-site-scripting-xss-in-unknown-genesis-blocks-aebd28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3901%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Genesis%20Blocks&amp;severity=medium&amp;id=682cd0f91484d88663aebd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3062-cwe-79-cross-site-scripting-xss-in-unknown-save-as-image-plugin-by-pdfcrowd-aeb716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3062%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Save%20as%20Image%20Plugin%20by%20Pdfcrowd&amp;severity=medium&amp;id=682cd0f81484d88663aeb716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2869-cwe-79-cross-site-scripting-xss-in-unknown-easy-property-listings-aeb714</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2869%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Easy%20Property%20Listings&amp;severity=medium&amp;id=682cd0f81484d88663aeb714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2643-cwe-79-cross-site-scripting-xss-in-unknown-floating-notification-bar-sticky-menu-on-scroll-announcement-banner-and-sticky-header-for-any-theme-aeb092</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2643%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Floating%20Notification%20Bar%2C%20Sticky%20Menu%20on%20Scroll%2C%20Announcement%20Banner%2C%20and%20Sticky%20Header%20for%20Any%20Theme&amp;severity=low&amp;id=682cd0f71484d88663aeb092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1663-cwe-79-cross-site-scripting-xss-in-unknown-ultimate-noindex-nofollow-tool-ii-aeb04c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1663%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ultimate%20Noindex%20Nofollow%20Tool%20II&amp;severity=medium&amp;id=682cd0f71484d88663aeb04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12767-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-buddyboss-platform-aebd26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12767%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20buddyboss-platform&amp;severity=low&amp;id=682cd0f91484d88663aebd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0970-cwe-290-authentication-bypass-by-spoofing-in-unknown-user-activity-tracking-and-log-aebd24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0970%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20User%20Activity%20Tracking%20and%20Log&amp;severity=medium&amp;id=682cd0f91484d88663aebd24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0852-cwe-79-cross-site-scripting-xss-in-unknown-coreactivity-activity-logging-for-wordpress-aebccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0852%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20coreActivity%3A%20Activity%20Logging%20for%20WordPress&amp;severity=high&amp;id=682cd0f91484d88663aebccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0249-cwe-79-cross-site-scripting-xss-in-unknown-advanced-schedule-posts-aebccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0249%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Advanced%20Schedule%20Posts&amp;severity=high&amp;id=682cd0f91484d88663aebccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7297-cwe-352-cross-site-request-forgery-csrf-in-unknown-twitterposts-aebccb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7297%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TwitterPosts&amp;severity=low&amp;id=682cd0f91484d88663aebccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7239-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-wp-dashboard-notes-aebcc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7239%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20WP%20Dashboard%20Notes&amp;severity=high&amp;id=682cd0f91484d88663aebcc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7231-cwe-284-improper-access-control-in-unknown-illi-link-party-aebca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7231%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20illi%20Link%20Party!&amp;severity=high&amp;id=682cd0f91484d88663aebca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7230-cwe-79-cross-site-scripting-xss-in-unknown-illi-link-party-aebc95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7230%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20illi%20Link%20Party!&amp;severity=medium&amp;id=682cd0f91484d88663aebc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7229-cwe-352-cross-site-request-forgery-csrf-in-unknown-illi-link-party-aebc93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7229%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20illi%20Link%20Party!&amp;severity=medium&amp;id=682cd0f91484d88663aebc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7228-cwe-79-cross-site-scripting-xss-in-unknown-illi-link-party-aebc91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7228%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20illi%20Link%20Party!&amp;severity=medium&amp;id=682cd0f91484d88663aebc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7197-cwe-352-cross-site-request-forgery-csrf-in-unknown-marketing-twitter-bot-aeb03b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7197%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Marketing%20Twitter%20Bot&amp;severity=high&amp;id=682cd0f71484d88663aeb03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7196-cwe-352-cross-site-request-forgery-csrf-in-unknown-ultimate-noindex-nofollow-tool-aeafd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7196%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Ultimate%20Noindex%20Nofollow%20Tool&amp;severity=medium&amp;id=682cd0f71484d88663aeafd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7195-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-reply-notify-aeafd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7195%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WP-Reply%20Notify&amp;severity=medium&amp;id=682cd0f71484d88663aeafd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7174-cwe-352-cross-site-request-forgery-csrf-in-unknown-abitgone-commentsafe-aeafd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7174%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20aBitGone%20CommentSafe&amp;severity=high&amp;id=682cd0f71484d88663aeafd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7168-cwe-79-cross-site-scripting-xss-in-unknown-better-follow-button-for-jetpack-aeafce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7168%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Better%20Follow%20Button%20for%20Jetpack&amp;severity=medium&amp;id=682cd0f71484d88663aeafce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7088-cwe-79-cross-site-scripting-xss-in-unknown-add-svg-support-for-media-uploader-inventivo-aeb92f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7088%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Add%20SVG%20Support%20for%20Media%20Uploader%20%7C%20inventivo&amp;severity=medium&amp;id=682cd0f91484d88663aeb92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7086-cwe-79-cross-site-scripting-xss-in-unknown-svg-uploads-support-aeb92d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7086%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SVG%20Uploads%20Support&amp;severity=medium&amp;id=682cd0f91484d88663aeb92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6786-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-unknown-payment-gateway-for-telcell-aeb900</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6786%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Unknown%20Payment%20Gateway%20for%20Telcell&amp;severity=medium&amp;id=682cd0f91484d88663aeb900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6783-cwe-79-cross-site-scripting-xss-in-unknown-wolfnet-idx-for-wordpress-aeb3b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6783%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WolfNet%20IDX%20for%20WordPress&amp;severity=medium&amp;id=682cd0f81484d88663aeb3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6541-cwe-79-cross-site-scripting-xss-in-unknown-allow-svg-aebaba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6541%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Allow%20SVG&amp;severity=medium&amp;id=682cd0f91484d88663aebaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6030-cwe-89-sql-injection-in-unknown-logdash-activity-log-aebab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6030%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20LogDash%20Activity%20Log&amp;severity=medium&amp;id=682cd0f91484d88663aebab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5934-cwe-352-cross-site-request-forgery-csrf-in-unknown-travelpayouts-all-travel-brands-in-one-place-aebab2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5934%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Travelpayouts%3A%20All%20Travel%20Brands%20in%20One%20Place&amp;severity=high&amp;id=682cd0f91484d88663aebab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5932-cwe-79-cross-site-scripting-xss-in-unknown-travelpayouts-all-travel-brands-in-one-place-aebaa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5932%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Travelpayouts%3A%20All%20Travel%20Brands%20in%20One%20Place&amp;severity=medium&amp;id=682cd0f91484d88663aebaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5529-cwe-79-cross-site-scripting-xss-in-unknown-advanced-page-visit-counter-aebaa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5529%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advanced%20Page%20Visit%20Counter&amp;severity=medium&amp;id=682cd0f91484d88663aebaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2334-cwe-79-cross-site-scripting-xss-in-unknown-edd-google-sheet-connector-pro-aebaa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2334%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20edd-google-sheet-connector-pro&amp;severity=medium&amp;id=682cd0f91484d88663aebaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2248-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-pmanager-aeba99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2248%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP-PManager&amp;severity=medium&amp;id=682cd0f91484d88663aeba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2247-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-pmanager-aeba97</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2247%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP-PManager&amp;severity=medium&amp;id=682cd0f91484d88663aeba97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2203-cwe-89-sql-injection-in-unknown-funnelkit-aebab6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2203%3A%20CWE-89%20SQL%20Injection%20in%20FunnelKit&amp;severity=medium&amp;id=682cd0f91484d88663aebab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1454-cwe-79-cross-site-scripting-xss-in-unknown-ninja-pages-aeba95</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1454%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Ninja%20Pages&amp;severity=medium&amp;id=682cd0f91484d88663aeba95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1303-cwe-79-cross-site-scripting-xss-in-unknown-plugin-oficial-aeade4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1303%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Plugin%20Oficial&amp;severity=medium&amp;id=682cd0f71484d88663aeade4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1289-cwe-79-cross-site-scripting-xss-in-unknown-plugin-oficial-aeac6e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1289%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Plugin%20Oficial&amp;severity=medium&amp;id=682cd0f71484d88663aeac6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1288-cwe-79-cross-site-scripting-xss-in-unknown-wooexim-aeac6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1288%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WOOEXIM&amp;severity=medium&amp;id=682cd0f71484d88663aeac6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1286-cwe-79-cross-site-scripting-xss-in-unknown-download-html-tinymce-button-aec2b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1286%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Download%20HTML%20TinyMCE%20Button&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1033-cwe-79-cross-site-scripting-xss-in-unknown-badgearoo-aec2b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1033%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Badgearoo&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0688-cwe-79-cross-site-scripting-xss-in-unknown-spiritual-gifts-survey-and-optional-s-h-a-p-e-survey-aec2b2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0688%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Spiritual%20Gifts%20Survey%20(and%20optional%20S.H.A.P.E%20survey)&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0687-cwe-79-cross-site-scripting-xss-in-unknown-spiritual-gifts-survey-and-optional-s-h-a-p-e-survey-aec2b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Spiritual%20Gifts%20Survey%20(and%20optional%20S.H.A.P.E%20survey)&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0329-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-for-wordpress-aec2a3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0329%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20AI%20ChatBot%20for%20WordPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9882-cwe-79-cross-site-scripting-xss-in-unknown-salon-booking-system-appointment-scheduling-for-salons-spas-small-businesses-aeb929</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9882%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Salon%20Booking%20System%2C%20Appointment%20Scheduling%20for%20Salons%2C%20Spas%20%26%20Small%20Businesses&amp;severity=medium&amp;id=682cd0f91484d88663aeb929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9879-cwe-89-sql-injection-in-unknown-melapress-file-monitor-aeba93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9879%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Melapress%20File%20Monitor&amp;severity=medium&amp;id=682cd0f91484d88663aeba93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9838-cwe-89-sql-injection-in-unknown-auto-affiliate-links-aeba86</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9838%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Auto%20Affiliate%20Links&amp;severity=medium&amp;id=682cd0f91484d88663aeba86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9831-cwe-89-sql-injection-in-unknown-taskbuilder-aebe64</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9831%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Taskbuilder&amp;severity=high&amp;id=682cd0f91484d88663aebe64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9765-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-ekc-tournament-manager-aeba84</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9765%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20EKC%20Tournament%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9711-cwe-352-cross-site-request-forgery-csrf-in-unknown-ekc-tournament-manager-aeba82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9711%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20EKC%20Tournament%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeba82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9709-cwe-352-cross-site-request-forgery-csrf-in-unknown-ekc-tournament-manager-aeba80</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9709%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20EKC%20Tournament%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeba80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9663-cwe-79-cross-site-scripting-xss-in-unknown-cyan-backup-aeba7e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9663%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CYAN%20Backup&amp;severity=medium&amp;id=682cd0f91484d88663aeba7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9662-cwe-79-cross-site-scripting-xss-in-unknown-cyan-backup-aeba7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9662%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CYAN%20Backup&amp;severity=medium&amp;id=682cd0f91484d88663aeba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9645-cwe-79-cross-site-scripting-xss-in-unknown-post-grid-posts-slider-posts-carousel-post-filter-post-masonry-aeba7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9645%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Post%20Grid%2C%20Posts%20Slider%2C%20Posts%20Carousel%2C%20Post%20Filter%2C%20Post%20Masonry&amp;severity=medium&amp;id=682cd0f91484d88663aeba7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9599-cwe-79-cross-site-scripting-xss-in-unknown-popup-box-aeba78</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9599%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Popup%20Box&amp;severity=medium&amp;id=682cd0f91484d88663aeba78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9450-cwe-352-cross-site-request-forgery-csrf-in-unknown-free-booking-plugin-for-hotels-restaurants-and-car-rentals-aeba76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9450%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Free%20Booking%20Plugin%20for%20Hotels%2C%20Restaurants%20and%20Car%20Rentals&amp;severity=medium&amp;id=682cd0f91484d88663aeba76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9390-cwe-79-cross-site-scripting-xss-in-unknown-registrationmagic-aeb927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9390%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20RegistrationMagic&amp;severity=medium&amp;id=682cd0f91484d88663aeb927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9238-cwe-79-cross-site-scripting-xss-in-unknown-avif-uploader-aeb925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9238%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AVIF%20Uploader&amp;severity=medium&amp;id=682cd0f91484d88663aeb925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9236-cwe-79-cross-site-scripting-xss-in-unknown-team-aeb923</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9236%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Team&amp;severity=medium&amp;id=682cd0f91484d88663aeb923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9233-cwe-352-cross-site-request-forgery-csrf-in-unknown-logo-slider-aeb921</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9233%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Logo%20Slider&amp;severity=medium&amp;id=682cd0f91484d88663aeb921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9227-cwe-79-cross-site-scripting-xss-in-unknown-powerpress-podcasting-plugin-by-blubrry-aeb91f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9227%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=682cd0f91484d88663aeb91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9182-cwe-79-cross-site-scripting-xss-in-unknown-maspik-aeb912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9182%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Maspik&amp;severity=medium&amp;id=682cd0f91484d88663aeb912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8854-cwe-79-cross-site-scripting-xss-in-unknown-polls-cp-aeba74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8854%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Polls%20CP&amp;severity=medium&amp;id=682cd0f91484d88663aeba74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8851-cwe-79-cross-site-scripting-xss-in-unknown-polls-cp-aeba67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8851%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Polls%20CP&amp;severity=medium&amp;id=682cd0f91484d88663aeba67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8759-cwe-79-cross-site-scripting-xss-in-unknown-nested-pages-aeb910</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8759%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Nested%20Pages&amp;severity=medium&amp;id=682cd0f91484d88663aeb910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8703-cwe-79-cross-site-scripting-xss-in-unknown-z-downloads-aeb90e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8703%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Z-Downloads&amp;severity=medium&amp;id=682cd0f91484d88663aeb90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8702-cwe-79-cross-site-scripting-xss-in-unknown-backup-database-aeb90c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8702%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Backup%20Database&amp;severity=medium&amp;id=682cd0f91484d88663aeb90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8701-cwe-79-cross-site-scripting-xss-in-unknown-events-calendar-aec2a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8701%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20events-calendar&amp;severity=medium&amp;id=682cd0fa1484d88663aec2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8700-cwe-284-improper-access-control-in-unknown-event-calendar-aec29f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8700%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20Event%20Calendar&amp;severity=high&amp;id=682cd0fa1484d88663aec29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8699-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-z-downloads-aec29d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8699%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Z-Downloads&amp;severity=high&amp;id=682cd0fa1484d88663aec29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8673-cwe-79-cross-site-scripting-xss-in-unknown-z-downloads-aec29b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8673%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Z-Downloads&amp;severity=critical&amp;id=682cd0fa1484d88663aec29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8670-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-by-10web-aeac6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8670%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%20by%2010Web&amp;severity=medium&amp;id=682cd0f71484d88663aeac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8620-cwe-79-cross-site-scripting-xss-in-unknown-mappress-maps-for-wordpress-aec299</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8620%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MapPress%20Maps%20for%20WordPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8619-cwe-79-cross-site-scripting-xss-in-unknown-ajax-search-lite-aec297</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8619%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ajax%20Search%20Lite&amp;severity=medium&amp;id=682cd0fa1484d88663aec297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8618-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-aec295</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8618%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682cd0fa1484d88663aec295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8617-cwe-79-cross-site-scripting-xss-in-unknown-quiz-maker-aeb90a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8617%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Quiz%20Maker&amp;severity=medium&amp;id=682cd0f91484d88663aeb90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8542-cwe-79-cross-site-scripting-xss-in-unknown-everest-forms-aeb908</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8542%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Everest%20Forms&amp;severity=medium&amp;id=682cd0f91484d88663aeb908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8493-cwe-79-cross-site-scripting-xss-in-unknown-the-events-calendar-aeb906</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8493%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20The%20Events%20Calendar&amp;severity=medium&amp;id=682cd0f91484d88663aeb906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8492-cwe-79-cross-site-scripting-xss-in-unknown-hustle-aeb904</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8492%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Hustle&amp;severity=medium&amp;id=682cd0f91484d88663aeb904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8426-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-aeb902</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8426%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682cd0f91484d88663aeb902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8398-cwe-352-cross-site-request-forgery-csrf-in-unknown-simple-nav-archives-aeb8f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8398%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Simple%20Nav%20Archives&amp;severity=medium&amp;id=682cd0f91484d88663aeb8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8397-cwe-79-cross-site-scripting-xss-in-unknown-webtoffee-gdpr-cookie-consent-aeb8f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8397%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20webtoffee-gdpr-cookie-consent&amp;severity=medium&amp;id=682cd0f91484d88663aeb8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8286-cwe-352-cross-site-request-forgery-csrf-in-unknown-webtoffee-gdpr-cookie-consent-aeb8ef</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8286%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20webtoffee-gdpr-cookie-consent&amp;severity=medium&amp;id=682cd0f91484d88663aeb8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8284-cwe-79-cross-site-scripting-xss-in-unknown-download-manager-aeb8ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8284%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Download%20Manager&amp;severity=medium&amp;id=682cd0f91484d88663aeb8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8245-cwe-352-cross-site-request-forgery-csrf-in-unknown-gamipress-aeb8eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8245%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20GamiPress&amp;severity=medium&amp;id=682cd0f91484d88663aeb8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8187-cwe-79-cross-site-scripting-xss-in-unknown-smart-post-show-aec293</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8187%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Smart%20Post%20Show&amp;severity=medium&amp;id=682cd0fa1484d88663aec293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8095-cwe-79-cross-site-scripting-xss-in-unknown-babelz-aec291</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8095%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20BabelZ&amp;severity=medium&amp;id=682cd0fa1484d88663aec291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8094-cwe-352-cross-site-request-forgery-csrf-in-unknown-ntz-antispam-aec284</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8094%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Ntz%20Antispam&amp;severity=medium&amp;id=682cd0fa1484d88663aec284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8090-cwe-79-cross-site-scripting-xss-in-unknown-javascript-logic-aec282</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8090%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20JavaScript%20Logic&amp;severity=medium&amp;id=682cd0fa1484d88663aec282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8085-cwe-79-cross-site-scripting-xss-in-unknown-peoplepond-aec280</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8085%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PeoplePond&amp;severity=medium&amp;id=682cd0fa1484d88663aec280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8082-cwe-352-cross-site-request-forgery-csrf-in-unknown-widgets-reset-aec27e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8082%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Widgets%20Reset&amp;severity=medium&amp;id=682cd0fa1484d88663aec27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8050-cwe-352-cross-site-request-forgery-csrf-in-unknown-custom-author-base-aec27c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8050%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Custom%20Author%20Base&amp;severity=medium&amp;id=682cd0fa1484d88663aec27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8032-cwe-79-cross-site-scripting-xss-in-unknown-smooth-gallery-replacement-aec27a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8032%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Smooth%20Gallery%20Replacement&amp;severity=medium&amp;id=682cd0fa1484d88663aec27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8031-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-secure-downloads-aeb8e9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8031%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20Secure%20Downloads&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7984-cwe-352-cross-site-request-forgery-csrf-in-unknown-joy-of-text-lite-aeb8e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7984%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Joy%20Of%20Text%20Lite&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7769-cwe-79-cross-site-scripting-xss-in-unknown-clicksold-idx-aeb8e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7769%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ClickSold%20IDX&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7762-cwe-200-information-exposure-in-unknown-simple-job-board-aeb8e3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7762%3A%20CWE-200%20Information%20Exposure%20in%20Unknown%20Simple%20Job%20Board&amp;severity=high&amp;id=682cd0f91484d88663aeb8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7761-cwe-79-cross-site-scripting-xss-in-unknown-simple-job-board-aeb8e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7761%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Job%20Board&amp;severity=medium&amp;id=682cd0f91484d88663aeb8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7759-cwe-79-cross-site-scripting-xss-in-unknown-pwa-for-wp-aeb8d4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7759%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PWA%20for%20WP&amp;severity=medium&amp;id=682cd0f91484d88663aeb8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7758-cwe-79-cross-site-scripting-xss-in-unknown-stylish-price-list-aeb8d2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7758%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Stylish%20Price%20List&amp;severity=medium&amp;id=682cd0f91484d88663aeb8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7556-cwe-79-cross-site-scripting-xss-in-unknown-simple-share-aeb8d0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7556%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Share&amp;severity=medium&amp;id=682cd0f91484d88663aeb8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6809-cwe-89-sql-injection-in-unknown-simple-video-directory-aeb8ce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6809%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Simple%20Video%20Directory&amp;severity=critical&amp;id=682cd0f91484d88663aeb8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6798-cwe-79-cross-site-scripting-xss-in-unknown-dl-verification-aeb8cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6798%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20DL%20Verification&amp;severity=medium&amp;id=682cd0f91484d88663aeb8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6797-cwe-79-cross-site-scripting-xss-in-unknown-dl-robots-txt-aec278</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6797%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20DL%20Robots.txt&amp;severity=medium&amp;id=682cd0fa1484d88663aec278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6719-cwe-352-cross-site-request-forgery-csrf-in-unknown-offload-videos-aec276</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6719%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Offload%20Videos&amp;severity=high&amp;id=682cd0fa1484d88663aec276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6718-cwe-79-cross-site-scripting-xss-in-unknown-pvn-auth-popup-aec274</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6718%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PVN%20Auth%20Popup&amp;severity=medium&amp;id=682cd0fa1484d88663aec274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6713-cwe-79-cross-site-scripting-xss-in-unknown-pvn-auth-popup-aec272</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6713%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PVN%20Auth%20Popup&amp;severity=medium&amp;id=682cd0fa1484d88663aec272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6712-cwe-79-cross-site-scripting-xss-in-unknown-mapfig-studio-aec265</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6712%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MapFig%20Studio&amp;severity=medium&amp;id=682cd0fa1484d88663aec265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6708-cwe-79-cross-site-scripting-xss-in-unknown-user-profile-builder-aec263</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6708%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20User%20Profile%20Builder&amp;severity=medium&amp;id=682cd0fa1484d88663aec263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6693-cwe-79-cross-site-scripting-xss-in-unknown-wccp-pro-aec261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6693%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20wccp-pro&amp;severity=medium&amp;id=682cd0fa1484d88663aec261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6690-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-unknown-wccp-pro-aec25f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6690%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Unknown%20wccp-pro&amp;severity=medium&amp;id=682cd0fa1484d88663aec25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6668-cwe-79-cross-site-scripting-xss-in-unknown-profilepro-aec25d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6668%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ProfilePro&amp;severity=medium&amp;id=682cd0fa1484d88663aec25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6667-cwe-79-cross-site-scripting-xss-in-unknown-kbucket-your-curated-content-in-wordpress-aeb8ca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6667%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20KBucket%3A%20Your%20Curated%20Content%20in%20WordPress&amp;severity=medium&amp;id=682cd0f91484d88663aeb8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6665-cwe-79-cross-site-scripting-xss-in-unknown-kbucket-your-curated-content-in-wordpress-aeb8c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6665%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20KBucket%3A%20Your%20Curated%20Content%20in%20WordPress&amp;severity=medium&amp;id=682cd0f91484d88663aeb8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6584-cwe-918-server-side-request-forgery-ssrf-in-unknown-jetpack-boost-aeb8c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6584%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Jetpack%20Boost&amp;severity=critical&amp;id=682cd0f91484d88663aeb8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6486-cwe-78-os-command-injection-in-unknown-imagemagick-engine-aec25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6486%3A%20CWE-78%20OS%20Command%20Injection%20in%20Unknown%20ImageMagick%20Engine&amp;severity=high&amp;id=682cd0fa1484d88663aec25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6478-cwe-79-cross-site-scripting-xss-in-unknown-ctt-expresso-para-woocommerce-aec259</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6478%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CTT%20Expresso%20para%20WooCommerce&amp;severity=medium&amp;id=682cd0fa1484d88663aec259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6462-cwe-79-cross-site-scripting-xss-in-unknown-dl-yandex-metrika-aec257</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6462%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20DL%20Yandex%20Metrika&amp;severity=medium&amp;id=682cd0fa1484d88663aec257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6335-cwe-79-cross-site-scripting-xss-in-unknown-tracking-code-manager-aec255</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6335%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Tracking%20Code%20Manager&amp;severity=medium&amp;id=682cd0fa1484d88663aec255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6159-cwe-89-sql-injection-in-unknown-push-notification-for-post-and-buddypress-aec253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6159%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Push%20Notification%20for%20Post%20and%20BuddyPress&amp;severity=critical&amp;id=682cd0fa1484d88663aec253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5440-cwe-79-cross-site-scripting-xss-in-unknown-if-so-dynamic-content-personalization-aec246</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5440%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20If-So%20Dynamic%20Content%20Personalization&amp;severity=medium&amp;id=682cd0fa1484d88663aec246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5026-cwe-79-cross-site-scripting-xss-in-unknown-cm-tooltip-glossary-aec244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5026%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20CM%20Tooltip%20Glossary&amp;severity=medium&amp;id=682cd0fa1484d88663aec244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13865-cwe-79-cross-site-scripting-xss-in-unknown-s3player-aec242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13865%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20S3Player&amp;severity=medium&amp;id=682cd0fa1484d88663aec242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13828-cwe-79-cross-site-scripting-xss-in-unknown-badgearoo-aec240</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13828%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Badgearoo&amp;severity=medium&amp;id=682cd0fa1484d88663aec240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13823-cwe-79-cross-site-scripting-xss-in-unknown-360-product-rotation-aec23e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13823%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20360%20Product%20Rotation&amp;severity=medium&amp;id=682cd0fa1484d88663aec23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13730-cwe-79-cross-site-scripting-xss-in-unknown-podlove-podcast-publisher-aec23c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13730%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=682cd0fa1484d88663aec23c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13729-cwe-79-cross-site-scripting-xss-in-unknown-podlove-podcast-publisher-aec23a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13729%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=682cd0fa1484d88663aec23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13727-cwe-79-cross-site-scripting-xss-in-unknown-memberspace-aec238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13727%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MemberSpace&amp;severity=medium&amp;id=682cd0fa1484d88663aec238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13621-cwe-79-cross-site-scripting-xss-in-unknown-the-gdpr-framework-by-data443-aec236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13621%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20The%20GDPR%20Framework%20By%20Data443&amp;severity=medium&amp;id=682cd0fa1484d88663aec236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13619-cwe-79-cross-site-scripting-xss-in-unknown-lifterlms-aec234</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13619%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20LifterLMS&amp;severity=medium&amp;id=682cd0fa1484d88663aec234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13616-cwe-79-cross-site-scripting-xss-in-unknown-vikbooking-hotel-booking-engine-pms-aec227</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13616%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=medium&amp;id=682cd0fa1484d88663aec227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13486-cwe-79-cross-site-scripting-xss-in-unknown-icegram-engage-aec225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13486%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Icegram%20Engage&amp;severity=medium&amp;id=682cd0fa1484d88663aec225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13482-cwe-287-improper-authentication-in-unknown-icegram-engage-aec223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13482%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Icegram%20Engage&amp;severity=medium&amp;id=682cd0fa1484d88663aec223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13384-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-images-slider-in-rbs-image-gallery-aec221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13384%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=682cd0fa1484d88663aec221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13383-cwe-79-cross-site-scripting-xss-in-unknown-hd-quiz-aec21f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13383%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20HD%20Quiz&amp;severity=medium&amp;id=682cd0fa1484d88663aec21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13382-cwe-79-cross-site-scripting-xss-in-unknown-calculated-fields-form-aec21d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13382%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=682cd0fa1484d88663aec21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13357-cwe-79-cross-site-scripting-xss-in-unknown-ditty-aec21b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13357%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ditty&amp;severity=medium&amp;id=682cd0fa1484d88663aec21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13313-cwe-79-cross-site-scripting-xss-in-unknown-aweber-aec219</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13313%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AWeber&amp;severity=medium&amp;id=682cd0fa1484d88663aec219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13128-cwe-79-cross-site-scripting-xss-in-unknown-learnpress-aec217</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13128%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20LearnPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13127-cwe-79-cross-site-scripting-xss-in-unknown-learnpress-aec215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13127%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20LearnPress&amp;severity=medium&amp;id=682cd0fa1484d88663aec215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13053-cwe-79-cross-site-scripting-xss-in-unknown-form-maker-by-10web-aec208</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13053%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Form%20Maker%20by%2010Web&amp;severity=medium&amp;id=682cd0fa1484d88663aec208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12874-cwe-79-cross-site-scripting-xss-in-unknown-top-comments-aec206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12874%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Top%20Comments&amp;severity=medium&amp;id=682cd0fa1484d88663aec206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12873-cwe-79-cross-site-scripting-xss-in-unknown-custom-field-manager-aec204</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12873%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Custom%20Field%20Manager&amp;severity=medium&amp;id=682cd0fa1484d88663aec204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12812-cwe-284-improper-access-control-in-unknown-wp-erp-complete-hr-solution-with-recruitment-job-listings-woocommerce-crm-accounting-aec202</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12812%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=682cd0fa1484d88663aec202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12808-cwe-79-cross-site-scripting-xss-in-unknown-wp-erp-complete-hr-solution-with-recruitment-job-listings-woocommerce-crm-accounting-aec200</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12808%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=medium&amp;id=682cd0fa1484d88663aec200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12800-cwe-79-cross-site-scripting-xss-in-unknown-ip-based-login-aec1fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12800%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20IP%20Based%20Login&amp;severity=medium&amp;id=682cd0fa1484d88663aec1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12770-cwe-79-cross-site-scripting-xss-in-unknown-wp-ulike-aec1fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12770%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20ULike&amp;severity=medium&amp;id=682cd0fa1484d88663aec1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12750-cwe-352-cross-site-request-forgery-csrf-in-unknown-competition-form-aec1fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12750%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Competition%20Form&amp;severity=medium&amp;id=682cd0fa1484d88663aec1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12743-cwe-79-cross-site-scripting-xss-in-unknown-mailpoet-aec1f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12743%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MailPoet&amp;severity=medium&amp;id=682cd0fa1484d88663aec1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12739-cwe-79-cross-site-scripting-xss-in-unknown-mobile-contact-bar-aec1f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12739%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Mobile%20Contact%20Bar&amp;severity=medium&amp;id=682cd0fa1484d88663aec1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12735-cwe-79-cross-site-scripting-xss-in-unknown-advance-post-prefix-aec1e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12735%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advance%20Post%20Prefix&amp;severity=high&amp;id=682cd0fa1484d88663aec1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12734-cwe-79-cross-site-scripting-xss-in-unknown-advance-post-prefix-aec1e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12734%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advance%20Post%20Prefix&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12733-cwe-79-cross-site-scripting-xss-in-unknown-affiliateimportereb-aec1e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12733%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AffiliateImporterEb&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12732-cwe-79-cross-site-scripting-xss-in-unknown-affiliateimportereb-aec1e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12732%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AffiliateImporterEb&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12726-cwe-79-cross-site-scripting-xss-in-unknown-clipart-aec1e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12726%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ClipArt&amp;severity=medium&amp;id=682cd0fa1484d88663aec1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12725-cwe-79-cross-site-scripting-xss-in-unknown-clasify-classified-listing-aec1df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12725%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Clasify%20Classified%20Listing&amp;severity=medium&amp;id=682cd0fa1484d88663aec1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12724-cwe-79-cross-site-scripting-xss-in-unknown-wp-desklite-aec1dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12724%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20DeskLite&amp;severity=medium&amp;id=682cd0fa1484d88663aec1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12722-cwe-79-cross-site-scripting-xss-in-unknown-twitter-bootstrap-collapse-aka-accordian-shortcode-aec1db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12722%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Twitter%20Bootstrap%20Collapse%20aka%20Accordian%20Shortcode&amp;severity=medium&amp;id=682cd0fa1484d88663aec1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12716-cwe-79-cross-site-scripting-xss-in-unknown-simple-basic-contact-form-aec1d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12716%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Basic%20Contact%20Form&amp;severity=medium&amp;id=682cd0fa1484d88663aec1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12680-cwe-79-cross-site-scripting-xss-in-unknown-prisna-gwt-aec1d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12680%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Prisna%20GWT&amp;severity=medium&amp;id=682cd0fa1484d88663aec1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12679-cwe-79-cross-site-scripting-xss-in-unknown-prisna-gwt-aec1ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12679%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Prisna%20GWT&amp;severity=medium&amp;id=682cd0fa1484d88663aec1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12301-cwe-352-cross-site-request-forgery-csrf-in-unknown-jsp-store-locator-aec1c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12301%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20JSP%20Store%20Locator&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12282-cwe-79-cross-site-scripting-xss-in-unknown-wordpress-aec1c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12282%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WordPress%E8%BF%9E%E6%8E%A5%E5%BE%AE%E5%8D%9A&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11843-cwe-79-cross-site-scripting-xss-in-unknown-panorama-aec1c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11843%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Panorama&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11719-cwe-79-cross-site-scripting-xss-in-unknown-tarteaucitron-wp-aec1c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11719%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20tarteaucitron-wp&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11718-cwe-79-cross-site-scripting-xss-in-unknown-tarteaucitron-wp-aec1c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11718%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20tarteaucitron-wp&amp;severity=medium&amp;id=682cd0fa1484d88663aec1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11502-cwe-79-cross-site-scripting-xss-in-unknown-planning-center-online-giving-aec1be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11502%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Planning%20Center%20Online%20Giving&amp;severity=medium&amp;id=682cd0fa1484d88663aec1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11373-cwe-352-cross-site-request-forgery-csrf-in-unknown-connexion-logs-aec1bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11373%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Connexion%20Logs&amp;severity=medium&amp;id=682cd0fa1484d88663aec1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11372-cwe-89-sql-injection-in-unknown-connexion-logs-aec1ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11372%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Connexion%20Logs&amp;severity=high&amp;id=682cd0fa1484d88663aec1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11269-cwe-89-sql-injection-in-unknown-ahathat-plugin-aec1b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11269%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20AHAthat%20Plugin&amp;severity=high&amp;id=682cd0fa1484d88663aec1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11267-cwe-89-sql-injection-in-unknown-jsp-store-locator-aec1ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11267%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20JSP%20Store%20Locator&amp;severity=high&amp;id=682cd0fa1484d88663aec1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11266-cwe-79-cross-site-scripting-xss-in-unknown-geocache-stat-bar-widget-aec1a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11266%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Geocache%20Stat%20Bar%20Widget&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11221-cwe-79-cross-site-scripting-xss-in-unknown-full-screen-page-background-image-slideshow-aec1a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11221%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Full%20Screen%20(Page)%20Background%20Image%20Slideshow&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11190-cwe-79-cross-site-scripting-xss-in-unknown-jwp-a11y-aec1a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11190%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20jwp-a11y&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11189-cwe-79-cross-site-scripting-xss-in-unknown-social-share-and-social-locker-aec1a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11189%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Social%20Share%20And%20Social%20Locker&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11141-cwe-79-cross-site-scripting-xss-in-unknown-sailthru-triggermail-aec1a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11141%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Sailthru%20Triggermail&amp;severity=medium&amp;id=682cd0fa1484d88663aec1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11140-cwe-79-cross-site-scripting-xss-in-unknown-real-wp-shop-lite-ajax-ecommerce-shopping-cart-aeafbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11140%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Real%20WP%20Shop%20Lite%20Ajax%20eCommerce%20Shopping%20Cart&amp;severity=low&amp;id=682cd0f71484d88663aeafbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11109-cwe-79-cross-site-scripting-xss-in-unknown-wp-google-review-slider-aeafb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11109%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Google%20Review%20Slider&amp;severity=medium&amp;id=682cd0f71484d88663aeafb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10818-cwe-79-cross-site-scripting-xss-in-unknown-jsfiddle-shortcode-aec19f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10818%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20JSFiddle%20Shortcode&amp;severity=medium&amp;id=682cd0fa1484d88663aec19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10677-cwe-352-cross-site-request-forgery-csrf-in-unknown-btev-aec19d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10677%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20BTEV&amp;severity=medium&amp;id=682cd0fa1484d88663aec19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10639-cwe-79-cross-site-scripting-xss-in-unknown-auto-prune-posts-aec19b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10639%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Auto%20Prune%20Posts&amp;severity=medium&amp;id=682cd0fa1484d88663aec19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10634-cwe-79-cross-site-scripting-xss-in-unknown-nokaut-offers-box-aec199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10634%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Nokaut%20Offers%20Box&amp;severity=medium&amp;id=682cd0fa1484d88663aec199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10632-cwe-79-cross-site-scripting-xss-in-unknown-nokaut-offers-box-aec18c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10632%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Nokaut%20Offers%20Box&amp;severity=medium&amp;id=682cd0fa1484d88663aec18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10631-cwe-79-cross-site-scripting-xss-in-unknown-countdown-timer-for-wordpress-block-editor-aeafb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10631%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Countdown%20Timer%20for%20WordPress%20Block%20Editor&amp;severity=medium&amp;id=682cd0f71484d88663aeafb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10504-cwe-79-cross-site-scripting-xss-in-unknown-contact-form-survey-quiz-popup-form-builder-aeaf24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10504%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Contact%20Form%2C%20Survey%2C%20Quiz%20%26%20Popup%20Form%20Builder&amp;severity=medium&amp;id=682cd0f71484d88663aeaf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10475-cwe-79-cross-site-scripting-xss-in-unknown-responsive-contact-form-builder-lead-generation-plugin-aec18a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10475%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Responsive%20Contact%20Form%20Builder%20%26%20Lead%20Generation%20Plugin&amp;severity=medium&amp;id=682cd0fa1484d88663aec18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10362-cwe-79-cross-site-scripting-xss-in-unknown-social-media-share-buttons-social-sharing-icons-aec188</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10362%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Social%20Media%20Share%20Buttons%20%26%20Social%20Sharing%20Icons&amp;severity=medium&amp;id=682cd0fa1484d88663aec188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10149-cwe-79-cross-site-scripting-xss-in-unknown-social-slider-feed-aeaf16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10149%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Social%20Slider%20Feed&amp;severity=medium&amp;id=682cd0f71484d88663aeaf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10145-cwe-79-cross-site-scripting-xss-in-unknown-hubbub-lite-aeaf12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10145%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Hubbub%20Lite&amp;severity=medium&amp;id=682cd0f71484d88663aeaf12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10144-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-images-slider-in-rbs-image-gallery-aeaf05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10144%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=682cd0f71484d88663aeaf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10143-cwe-79-cross-site-scripting-xss-in-unknown-mb-custom-post-types-custom-taxonomies-aeaf03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10143%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MB%20Custom%20Post%20Types%20%26%20Custom%20Taxonomies&amp;severity=medium&amp;id=682cd0f71484d88663aeaf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10107-cwe-79-cross-site-scripting-xss-in-unknown-giveaways-and-contests-by-rafflepress-aeaef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10107%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Giveaways%20and%20Contests%20by%20RafflePress&amp;severity=medium&amp;id=682cd0f71484d88663aeaef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10098-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-applyonline-aeaec1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10098%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20ApplyOnline&amp;severity=low&amp;id=682cd0f71484d88663aeaec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10076-cwe-79-cross-site-scripting-xss-in-unknown-jetpack-aeaebf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10076%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Jetpack&amp;severity=medium&amp;id=682cd0f71484d88663aeaebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10075-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-jetpack-aeae58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10075%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Jetpack&amp;severity=medium&amp;id=682cd0f71484d88663aeae58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10054-cwe-79-cross-site-scripting-xss-in-unknown-happyforms-aeaebd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10054%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Happyforms&amp;severity=medium&amp;id=682cd0f71484d88663aeaebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10009-cwe-89-sql-injection-in-unknown-melapress-file-monitor-aeae4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10009%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Melapress%20File%20Monitor&amp;severity=medium&amp;id=682cd0f71484d88663aeae4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4717-sql-injection-in-phpgurukul-company-visitor-management-system-aebeda</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4717%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47789-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-horilla-opensource-horilla-aebe3b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47789%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20horilla-opensource%20horilla&amp;severity=medium&amp;id=682cd0f91484d88663aebe3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47788-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-atheos-atheos-aeb741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47788%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Atheos%20Atheos&amp;severity=critical&amp;id=682cd0f81484d88663aeb741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46834-cwe-863-incorrect-authorization-in-alchemyplatform-modular-account-aeb739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46834%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20alchemyplatform%20modular-account&amp;severity=medium&amp;id=682cd0f81484d88663aeb739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47786-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-emlog-emlog-aeb73d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47786%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emlog%20emlog&amp;severity=low&amp;id=682cd0f81484d88663aeb73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4716-sql-injection-in-campcodes-sales-and-inventory-system-aeb752</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4716%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4715-sql-injection-in-campcodes-sales-and-inventory-system-aeb750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4715%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47785-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-emlog-emlog-aeb73b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47785%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20emlog%20emlog&amp;severity=high&amp;id=682cd0f81484d88663aeb73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47787-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-emlog-emlog-aeb73f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47787%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20emlog%20emlog&amp;severity=high&amp;id=682cd0f81484d88663aeb73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47161-cwe-284-improper-access-control-in-microsoft-microsoft-defender-for-endpoint-for-linux-aeba27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47161%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=high&amp;id=682cd0f91484d88663aeba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47784-cwe-502-deserialization-of-untrusted-data-in-emlog-emlog-aebd5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47784%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20emlog%20emlog&amp;severity=medium&amp;id=682cd0f91484d88663aebd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26481-cwe-400-uncontrolled-resource-consumption-in-dell-powerscale-onefs-aebabc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26481%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=682cd0f91484d88663aebabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4714-sql-injection-in-campcodes-sales-and-inventory-system-aeb77d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4714%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30476-cwe-400-uncontrolled-resource-consumption-in-dell-powerscale-insightiq-aebac0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30476%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Dell%20PowerScale%20InsightIQ&amp;severity=medium&amp;id=682cd0f91484d88663aebac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30475-cwe-269-improper-privilege-management-in-dell-powerscale-insightiq-aebabe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30475%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Dell%20PowerScale%20InsightIQ&amp;severity=high&amp;id=682cd0f91484d88663aebabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4713-sql-injection-in-campcodes-sales-and-inventory-system-aeb77b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4713%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4712-sql-injection-in-campcodes-sales-and-inventory-system-aeb779</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4712%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51666-cwe-862-missing-authorization-in-automattic-tours-aec430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51666%3A%20Missing%20Authorization%20in%20Tosin%20Oguntuyi%20Tours&amp;severity=null&amp;id=682cd0fa1484d88663aec430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56006-cwe-862-missing-authorization-in-automattic-jetpack-debug-tools-aec432</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56006%3A%20CWE-862%20Missing%20Authorization%20in%20Automattic%20Jetpack%20Debug%20Tools&amp;severity=medium&amp;id=682cd0fa1484d88663aec432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32922-cwe-352-cross-site-request-forgery-csrf-in-tobias-wp2leads-aec455</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=682cd0fa1484d88663aec455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4711-sql-injection-in-campcodes-sales-and-inventory-system-aec46c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4711%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47774-cwe-691-insufficient-control-flow-management-in-vyperlang-vyper-aec464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47774%3A%20CWE-691%3A%20Insufficient%20Control%20Flow%20Management%20in%20vyperlang%20vyper&amp;severity=low&amp;id=682cd0fa1484d88663aec464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4710-sql-injection-in-campcodes-sales-and-inventory-system-aec46a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4710%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4709-sql-injection-in-campcodes-sales-and-inventory-system-aec468</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4709%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47285-cwe-691-insufficient-control-flow-management-in-vyperlang-vyper-aec462</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47285%3A%20CWE-691%3A%20Insufficient%20Control%20Flow%20Management%20in%20vyperlang%20vyper&amp;severity=low&amp;id=682cd0fa1484d88663aec462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47279-cwe-401-missing-release-of-memory-after-effective-lifetime-in-nodejs-undici-aebeb9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47279%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20nodejs%20undici&amp;severity=low&amp;id=682cd0f91484d88663aebeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43853-cwe-61-unix-symbolic-link-symlink-following-in-bytecodealliance-wasm-micro-runtime-aec48b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43853%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20bytecodealliance%20wasm-micro-runtime&amp;severity=high&amp;id=682cd0fa1484d88663aec48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47580-cwe-862-missing-authorization-in-rustaurius-front-end-users-aec483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47580%3A%20Missing%20Authorization%20in%20Rustaurius%20Front%20End%20Users&amp;severity=null&amp;id=682cd0fa1484d88663aec483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4708-sql-injection-in-campcodes-sales-and-inventory-system-aec436</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4708%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4707-sql-injection-in-campcodes-sales-and-inventory-system-aec42c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4707%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30421-cwe-121-stack-based-buffer-overflow-in-ni-circuit-design-suite-aec407</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30421%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4706-sql-injection-in-projectworlds-online-examination-system-aec391</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4706%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Examination%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30420-cwe-125-out-of-bounds-read-in-ni-circuit-design-suite-aec2bc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30420%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30419-cwe-125-in-ni-circuit-design-suite-aec2ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30419%3A%20CWE-125%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1647-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-bootstrap-bootstrap-aec2b8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bootstrap%20Bootstrap&amp;severity=medium&amp;id=682cd0fa1484d88663aec2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30418-cwe-787-out-of-bounds-write-in-ni-circuit-design-suite-aec453</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30418%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30417-cwe-787-out-of-bounds-write-in-ni-circuit-design-suite-aec451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30417%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20Circuit%20Design%20Suite&amp;severity=high&amp;id=682cd0fa1484d88663aec451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4705-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec466</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4705%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3440-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-security-guardium-aeb6f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=682cd0f81484d88663aeb6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4704-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4704%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4703-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec520</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4703%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2570-cwe-863-incorrect-authorization-in-mattermost-mattermost-aec51c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2570%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=682cd0fa1484d88663aec51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2527-cwe-863-incorrect-authorization-in-mattermost-mattermost-aec509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2527%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682cd0fa1484d88663aec509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4702-sql-injection-in-phpgurukul-vehicle-parking-management-system-aec5fb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4702%3A%20SQL%20Injection%20in%20PHPGurukul%20Vehicle%20Parking%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4701-deserialization-in-vita-mllm-freeze-omni-aec5f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4701%3A%20Deserialization%20in%20VITA-MLLM%20Freeze-Omni&amp;severity=medium&amp;id=682cd0fb1484d88663aec5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/excel-ent-obfuscation-regex-gone-rogue-16a64a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Excel(ent)%20Obfuscation%3A%20Regex%20Gone%20Rogue&amp;severity=medium&amp;id=682c992c7960f6956616a64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4699-sql-injection-in-phpgurukul-apartment-visitors-management-system-aec415</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4699%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4698-sql-injection-in-phpgurukul-directory-management-system-aec413</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4698%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aec413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4516-cwe-416-use-after-free-in-python-software-foundation-cpython-aeb86b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4516%3A%20CWE-416%20Use%20After%20Free%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=682cd0f81484d88663aeb86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-the-dprk-spotting-malicious-remote-it-applicants-16a8cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20the%20DPRK%3A%20Spotting%20Malicious%20Remote%20IT%20Applicants&amp;severity=medium&amp;id=682c992c7960f6956616a8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4697-sql-injection-in-phpgurukul-directory-management-system-aec6d0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4697%3A%20SQL%20Injection%20in%20PHPGurukul%20Directory%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4696-sql-injection-in-phpgurukul-cyber-cafe-management-system-aec6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4696%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4695-sql-injection-in-phpgurukul-cyber-cafe-management-system-aec769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4695%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/web-scanning-sonicwall-for-cve-2021-20016-update-16a848</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update&amp;severity=medium&amp;id=682c992c7960f6956616a848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4762-cwe-20-improper-input-validation-in-lleidanet-pki-esigna-aec76b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Lleidanet%20PKI%20eSigna&amp;severity=low&amp;id=682cd0fb1484d88663aec76b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4564-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-facturaone-ticketbai-facturas-para-woocommerce-aec75c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4564%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20facturaone%20TicketBAI%20Facturas%20para%20WooCommerce&amp;severity=critical&amp;id=682cd0fb1484d88663aec75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3446-cwe-863-incorrect-authorization-in-mattermost-mattermost-aec74c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3446%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682cd0fb1484d88663aec74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31947-cwe-645-overly-restrictive-account-lockout-mechanism-in-mattermost-mattermost-aec72d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31947%3A%20CWE-645%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682cd0fb1484d88663aec72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32738-missing-authentication-for-critical-function-in-i-o-data-device-inc-hdl-tc1-aec718</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32738%3A%20Missing%20authentication%20for%20critical%20function%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20HDL-TC1&amp;severity=medium&amp;id=682cd0fb1484d88663aec718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32002-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-i-o-data-device-inc-hdl-tc1-aec710</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32002%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20OS%20command%20(&apos;OS%20Command%20Injection&apos;)%20in%20I-O%20DATA%20DEVICE%2C%20INC.%20HDL-TC1&amp;severity=critical&amp;id=682cd0fb1484d88663aec710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4737-cwe-312-cleartext-storage-of-sensitive-information-in-tecno-com-transsion-aivoiceassistant-aec4e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4737%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20TECNO%20com.transsion.aivoiceassistant&amp;severity=medium&amp;id=682cd0fa1484d88663aec4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27525-cwe-525-use-of-web-browser-cache-containing-sensitive-information-in-hitachi-jp1-it-desktop-management-2-smart-device-manager-aec6ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27525%3A%20CWE-525%20Use%20of%20Web%20Browser%20Cache%20Containing%20Sensitive%20Information%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Smart%20Device%20Manager&amp;severity=low&amp;id=682cd0fb1484d88663aec6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27524-cwe-326-inadequate-encryption-strength-in-hitachi-jp1-it-desktop-management-2-smart-device-manager-aec6dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27524%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Smart%20Device%20Manager&amp;severity=medium&amp;id=682cd0fb1484d88663aec6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27523-cwe-611-improper-restriction-of-xml-external-entity-reference-in-hitachi-jp1-it-desktop-management-2-smart-device-manager-aec4ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27523%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Hitachi%20JP1%2FIT%20Desktop%20Management%202%20-%20Smart%20Device%20Manager&amp;severity=high&amp;id=682cd0fa1484d88663aec4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3742-cwe-79-cross-site-scripting-xss-in-unknown-responsive-lightbox-gallery-aec501</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3742%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=682cd0fa1484d88663aec501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13914-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wp-experts-file-manager-advanced-shortcode-aec5bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13914%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Experts%20File%20Manager%20Advanced%20Shortcode&amp;severity=high&amp;id=682cd0fb1484d88663aec5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3053-cwe-94-improper-control-of-generation-of-code-code-injection-in-admintwentytwenty-uipress-lite-effortless-custom-dashboards-admin-themes-and-pages-aec5c1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3053%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=high&amp;id=682cd0fb1484d88663aec5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4591-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-welukame-weluka-lite-aec589</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20welukame%20Weluka%20Lite&amp;severity=medium&amp;id=682cd0fb1484d88663aec589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4126-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-emmanuelg-eg-series-aec6f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4126%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20emmanuelg%20EG-Series&amp;severity=medium&amp;id=682cd0fb1484d88663aec6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3917-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-kelerkgibo-seo-bing-aec6bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3917%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kelerkgibo%20%E7%99%BE%E5%BA%A6%E7%AB%99%E9%95%BFSEO%E5%90%88%E9%9B%86(%E6%94%AF%E6%8C%81%E7%99%BE%E5%BA%A6%2F%E7%A5%9E%E9%A9%AC%2FBing%2F%E5%A4%B4%E6%9D%A1%E6%8E%A8%E9%80%81)&amp;severity=critical&amp;id=682cd0fb1484d88663aec6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4589-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nackle2k10-bon-toolkit-aec6bf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nackle2k10%20Bon%20Toolkit&amp;severity=medium&amp;id=682cd0fb1484d88663aec6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4579-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dyland-wp-content-security-plugin-aec698</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4579%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dyland%20WP%20Content%20Security%20Plugin&amp;severity=high&amp;id=682cd0fb1484d88663aec698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/technical-analysis-of-transferloader-16a852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Technical%20Analysis%20of%20TransferLoader&amp;severity=medium&amp;id=682c992c7960f6956616a852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-15-68f28e80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-15&amp;severity=medium&amp;id=68367c97182aa0cae231d120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44182-n-a-in-n-a-aec6ef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44182%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44181-n-a-in-n-a-aec6ed</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44181%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48027-cwe-290-authentication-bypass-by-spoofing-in-mutonufoai-pgina-fork-aec63d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48027%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20MutonUfoAI%20pGina.Fork&amp;severity=medium&amp;id=682cd0fb1484d88663aec63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48024-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-bluewave-checkmate-aec587</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48024%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20BlueWave%20Checkmate&amp;severity=medium&amp;id=682cd0fb1484d88663aec587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44180-n-a-in-n-a-aec4c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44180%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48051-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-lichess-lila-aec42e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48051%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lichess%20Lila&amp;severity=medium&amp;id=682cd0fa1484d88663aec42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46052-n-a-in-n-a-aec42a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46052%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec42a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44183-n-a-in-n-a-aec426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44183%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44110-n-a-in-n-a-aebeb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44110%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aebeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52880-n-a-in-n-a-aebe5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52880%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f91484d88663aebe5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48050-cwe-24-path-traversal-filedir-in-cure53-dompurify-aebe58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48050%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Cure53%20DOMPurify&amp;severity=high&amp;id=682cd0f91484d88663aebe58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46053-n-a-in-n-a-aeb501</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46053%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44185-n-a-in-n-a-aeb4f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44185%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52878-n-a-in-n-a-aeb493</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52878%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52879-n-a-in-n-a-aeb48f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52879%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52877-n-a-in-n-a-aeb48d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-15-73f782</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-15&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb73f782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-15-f127f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47783-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-humansignal-label-studio-aec562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47783%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HumanSignal%20label-studio&amp;severity=high&amp;id=682cd0fb1484d88663aec562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46836-cwe-20-improper-input-validation-in-ecki-net-tools-aec560</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46836%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ecki%20net-tools&amp;severity=medium&amp;id=682cd0fb1484d88663aec560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32421-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-vercel-next-js-aec51e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32421%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20vercel%20next.js&amp;severity=low&amp;id=682cd0fa1484d88663aec51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45067-escalation-of-privilege-in-intel-r-gaudi-r-software-installers-aeb8ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45067%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Gaudi(R)%20software%20installers&amp;severity=medium&amp;id=682cd0f81484d88663aeb8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47889-vulnerability-in-jenkins-project-jenkins-wso2-oauth-plugin-aeb5f9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47889%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20WSO2%20Oauth%20Plugin&amp;severity=critical&amp;id=682cd0f81484d88663aeb5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47888-vulnerability-in-jenkins-project-jenkins-dingtalk-plugin-aec75a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47888%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20DingTalk%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47887-vulnerability-in-jenkins-project-jenkins-cadence-vmanager-plugin-aec758</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47887%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Cadence%20vManager%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47886-vulnerability-in-jenkins-project-jenkins-cadence-vmanager-plugin-aec756</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47886%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Cadence%20vManager%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47885-vulnerability-in-jenkins-project-jenkins-health-advisor-by-cloudbees-plugin-aeb086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47885%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Health%20Advisor%20by%20CloudBees%20Plugin&amp;severity=high&amp;id=682cd0f71484d88663aeb086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47884-vulnerability-in-jenkins-project-jenkins-openid-connect-provider-plugin-aec754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47884%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20OpenID%20Connect%20Provider%20Plugin&amp;severity=critical&amp;id=682cd0fb1484d88663aec754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33104-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-websphere-application-server-aec88a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682cd0fb1484d88663aec88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/april-2025-threat-trend-report-on-apt-attacks-south-korea-16a85b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=April%202025%20Threat%20Trend%20Report%20on%20APT%20Attacks%20(South%20Korea)&amp;severity=medium&amp;id=682c992c7960f6956616a85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/april-2025-threat-trend-report-on-ransomware-16a865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=April%202025%20Threat%20Trend%20Report%20on%20Ransomware&amp;severity=medium&amp;id=682c992c7960f6956616a865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2900-cwe-122-heap-based-buffer-overflow-in-ibm-semeru-runtime-aec888</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2900%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Semeru%20Runtime&amp;severity=high&amp;id=682cd0fb1484d88663aec888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0136-cwe-319-cleartext-transmission-of-sensitive-information-in-palo-alto-networks-cloud-ngfw-aec882</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0136%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=682cd0fb1484d88663aec882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0138-cwe-613-insufficient-session-expiration-in-palo-alto-networks-prisma-cloud-compute-edition-aec884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0138%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Palo%20Alto%20Networks%20Prisma%20Cloud%20Compute%20Edition&amp;severity=low&amp;id=682cd0fb1484d88663aec884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0137-cwe-83-improper-neutralization-of-script-in-attributes-in-a-web-page-in-palo-alto-networks-cloud-ngfw-aec827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0137%3A%20CWE-83%3A%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=682cd0fb1484d88663aec827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4641-cwe-611-improper-restriction-of-xml-external-entity-reference-in-bonigarcia-webdrivermanager-aec829</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4641%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20bonigarcia%20webdrivermanager&amp;severity=critical&amp;id=682cd0fb1484d88663aec829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0135-cwe-266-incorrect-privilege-assignment-in-palo-alto-networks-globalprotect-app-aec825</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0135%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=682cd0fb1484d88663aec825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0134-cwe-94-improper-control-of-generation-of-code-code-injection-in-palo-alto-networks-cortex-xdr-broker-vm-aec79a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0134%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=682cd0fb1484d88663aec79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0133-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-palo-alto-networks-pan-os-aec823</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0133%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=low&amp;id=682cd0fb1484d88663aec823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0132-cwe-306-missing-authentication-for-critical-function-in-palo-alto-networks-cortex-xdr-broker-vm-aec816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0132%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Broker%20VM&amp;severity=medium&amp;id=682cd0fb1484d88663aec816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4640-cwe-787-out-of-bounds-write-in-pointcloudlibrary-pcl-aec735</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4640%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PointCloudLibrary%20pcl&amp;severity=high&amp;id=682cd0fb1484d88663aec735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0131-cwe-266-incorrect-privilege-assignment-in-opswat-metadefender-endpoint-security-sdk-aeb8af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0131%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20OPSWAT%20MetaDefender%20Endpoint%20Security%20SDK&amp;severity=high&amp;id=682cd0f81484d88663aeb8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4639-cwe-611-improper-restriction-of-xml-external-entity-reference-in-peergos-peergos-aec80c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4639%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Peergos%20Peergos&amp;severity=high&amp;id=682cd0fb1484d88663aec80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4638-vulnerability-in-pointcloudlibrary-pcl-aec733</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4638%3A%20Vulnerability%20in%20PointCloudLibrary%20pcl&amp;severity=critical&amp;id=682cd0fb1484d88663aec733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4637-cwe-369-divide-by-zero-in-davisking-dlib-aec6c1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4637%3A%20CWE-369%20Divide%20By%20Zero%20in%20davisking%20dlib&amp;severity=high&amp;id=682cd0fb1484d88663aec6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46786-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-zoom-communications-inc-zoom-workplace-apps-aec8b1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4664-insufficient-policy-enforcement-in-google-chrome-aeb8c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4664%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682cd0f91484d88663aeb8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46785-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-zoom-communications-inc-zoom-workplace-apps-aec8af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46785%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30668-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-aec8ad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30668%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0130-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-palo-alto-networks-cloud-ngfw-aec72b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0130%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=682cd0fb1484d88663aec72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30667-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-aec8ab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30667%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30666-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-for-windows-aec8a9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30666%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20for%20Windows&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30665-cwe-476-null-pointer-dereference-in-zoom-communications-inc-zoom-workplace-apps-for-windows-aec8a7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30665%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20for%20Windows&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30664-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-zoom-communications-inc-zoom-workplace-apps-aeb8b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=medium&amp;id=682cd0f81484d88663aeb8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30663-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-zoom-communications-inc-zoom-workplace-apps-aeb8b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30663%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps&amp;severity=high&amp;id=682cd0f81484d88663aeb8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47710-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-enterprise-mfa-tfa-for-drupal-aeb777</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47710%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=high&amp;id=682cd0f81484d88663aeb777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47709-cwe-862-missing-authorization-in-drupal-enterprise-mfa-tfa-for-drupal-aeb775</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47709%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=medium&amp;id=682cd0f81484d88663aeb775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47708-cwe-352-cross-site-request-forgery-csrf-in-drupal-enterprise-mfa-tfa-for-drupal-aeae62</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47708%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=high&amp;id=682cd0f71484d88663aeae62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47707-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-enterprise-mfa-tfa-for-drupal-aec6bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47707%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=high&amp;id=682cd0fb1484d88663aec6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47706-cwe-294-authentication-bypass-by-capture-replay-in-drupal-enterprise-mfa-tfa-for-drupal-aeb773</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47706%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Drupal%20Enterprise%20MFA%20-%20TFA%20for%20Drupal&amp;severity=medium&amp;id=682cd0f81484d88663aeb773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47705-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-iframe-remove-filter-aec696</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20IFrame%20Remove%20Filter&amp;severity=medium&amp;id=682cd0fb1484d88663aec696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47704-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-klaro-cookie-consent-management-aeae60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Klaro%20Cookie%20%26%20Consent%20Management&amp;severity=medium&amp;id=682cd0f71484d88663aeae60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47703-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-cookies-consent-management-aeae5e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20COOKiES%20Consent%20Management&amp;severity=medium&amp;id=682cd0f71484d88663aeae5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47702-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-oembed-providers-aec694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20oEmbed%20Providers&amp;severity=medium&amp;id=682cd0fb1484d88663aec694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47701-cwe-352-cross-site-request-forgery-csrf-in-drupal-restrict-route-by-ip-aeae5c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47701%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Restrict%20route%20by%20IP&amp;severity=high&amp;id=682cd0f71484d88663aeae5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3932-tracking-links-in-attachments-bypassed-remote-content-blocking-in-mozilla-thunderbird-aec50b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3932%3A%20Tracking%20Links%20in%20Attachments%20Bypassed%20Remote%20Content%20Blocking%20in%20Mozilla%20Thunderbird&amp;severity=medium&amp;id=682cd0fa1484d88663aec50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3909-javascript-execution-via-spoofed-pdf-attachment-and-file-link-in-mozilla-thunderbird-aec0b3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3909%3A%20JavaScript%20Execution%20via%20Spoofed%20PDF%20Attachment%20and%20file%3A%2F%2F%2F%20Link%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=682cd0fa1484d88663aec0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3877-unsolicited-file-download-disk-space-exhaustion-and-credential-leakage-via-mailbox-links-in-mozilla-thunderbird-aec4c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3877&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3875-sender-spoofing-via-malformed-from-header-in-thunderbird-in-mozilla-thunderbird-aec63b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3875%3A%20Sender%20Spoofing%20via%20Malformed%20From%20Header%20in%20Thunderbird%20in%20Mozilla%20Thunderbird&amp;severity=high&amp;id=682cd0fb1484d88663aec63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40595-cwe-918-server-side-request-forgery-ssrf-in-sonicwall-sma1000-aec86f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40595%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=682cd0fb1484d88663aec86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47782-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-motioneye-project-motioneye-aec8e7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47782%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20motioneye-project%20motioneye&amp;severity=high&amp;id=682cd0fb1484d88663aec8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47781-cwe-331-insufficient-entropy-in-lukevella-rallly-aec8e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47781%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20lukevella%20rallly&amp;severity=critical&amp;id=682cd0fb1484d88663aec8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47778-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sulu-sulu-aec8dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47778%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20sulu%20sulu&amp;severity=medium&amp;id=682cd0fb1484d88663aec8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47777-cwe-20-improper-input-validation-in-nanbingxyz-5ire-aec965</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47777%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nanbingxyz%205ire&amp;severity=critical&amp;id=682cd0fb1484d88663aec965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47775-cwe-201-insertion-of-sensitive-information-into-sent-data-in-bullfrogsec-bullfrog-aec948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47775%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20bullfrogsec%20bullfrog&amp;severity=medium&amp;id=682cd0fb1484d88663aec948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24969-cwe-639-authorization-bypass-through-user-controlled-key-in-combodo-itop-aec944</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24969%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24785-cwe-20-improper-input-validation-in-combodo-itop-aec999</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24785%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24026-cwe-1333-inefficient-regular-expression-complexity-in-combodo-itop-aec9d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24026%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24022-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-combodo-itop-aec9c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24022%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Combodo%20iTop&amp;severity=high&amp;id=682cd0fb1484d88663aec9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24021-cwe-862-missing-authorization-in-combodo-itop-aec9c6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24021%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56157-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-combodo-itop-aec9c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56157%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aec9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52601-cwe-639-authorization-bypass-through-user-controlled-key-in-combodo-itop-aeca17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52601%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682cd0fb1484d88663aeca17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10865-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-opentext-advance-authentication-aeb04a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20Advance%20Authentication&amp;severity=critical&amp;id=682cd0f71484d88663aeb04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10864-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-opentext-advance-authentication-aeb048</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10864%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenText%20Advance%20Authentication&amp;severity=high&amp;id=682cd0f71484d88663aeb048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/modern-incident-response-tackling-malicious-ml-artifacts-16ab56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Modern%20Incident%20Response%3A%20Tackling%20Malicious%20ML%20Artifacts&amp;severity=medium&amp;id=682c992c7960f6956616ab56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/security-incident-response-team-16a63c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32756%3A%20FortiVoice%20Zero-Day%20Exploit%20Alert&amp;severity=medium&amp;id=682c992c7960f6956616a63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-chihuahua-stealer-targets-browser-data-and-crypto-wallets-16ab5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20&apos;Chihuahua%20Stealer&apos;%20Targets%20Browser%20Data%20and%20Crypto%20Wallets&amp;severity=medium&amp;id=682c992c7960f6956616ab5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3600-use-of-externally-controlled-input-to-select-classes-or-code-unsafe-reflection-in-progress-software-telerik-ui-for-asp-net-ajax-aeca7e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3600%3A%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Progress%20Software%20Telerik%20UI%20for%20ASP.NET%20AJAX&amp;severity=high&amp;id=682cd0fb1484d88663aeca7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47436-cwe-122-heap-based-buffer-overflow-in-apache-software-foundation-apache-orc-aec808</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47436%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Apache%20Software%20Foundation%20Apache%20ORC&amp;severity=medium&amp;id=682cd0fb1484d88663aec808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53146-vulnerability-in-linux-linux-aecb4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fc1484d88663aecb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3931-improper-handling-of-insufficient-permissions-or-privileges-in-red-hat-red-hat-enterprise-linux-10-aecb17</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3931%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&amp;severity=high&amp;id=682cd0fc1484d88663aecb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47445-cwe-23-relative-path-traversal-in-themewinter-eventin-aecb2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47445%3A%20Relative%20Path%20Traversal%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=682cd0fc1484d88663aecb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3769-cwe-639-authorization-bypass-through-user-controlled-key-in-latepoint-latepoint-calendar-booking-plugin-for-appointments-and-events-aecb11</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3769%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20%E2%80%93%20Calendar%20Booking%20Plugin%20for%20Appointments%20and%20Events&amp;severity=medium&amp;id=682cd0fc1484d88663aecb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3834-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adaudit-plus-aecb15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3834%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADAudit%20Plus&amp;severity=high&amp;id=682cd0fc1484d88663aecb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3833-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-manageengine-adselfservice-plus-aecb13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3833%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ManageEngine%20ADSelfService%20Plus&amp;severity=high&amp;id=682cd0fc1484d88663aecb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47292-cwe-502-deserialization-of-untrusted-data-in-cap-collectif-cap-collectif-aecb2a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47292%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20cap-collectif%20cap-collectif&amp;severity=critical&amp;id=682cd0fc1484d88663aecb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26864-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-iotdb-aeb4ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26864%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=high&amp;id=682cd0f81484d88663aeb4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26795-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-iotdb-jdbc-driver-aeb4ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26795%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB%20JDBC%20driver&amp;severity=high&amp;id=682cd0f81484d88663aeb4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24780-remote-code-execution-with-untrusted-uri-of-user-defined-function-in-apache-software-foundation-apache-iotdb-aec78a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24780%3A%20Remote%20Code%20Execution%20with%20untrusted%20URI%20of%20User-defined%20function%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=critical&amp;id=682cd0fb1484d88663aec78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4430-cwe-862-missing-authorization-in-naukowa-i-akademicka-sie-komputerowa-pa-stwowy-instytut-badawczy-ezd-rp-aecaf2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4430%3A%20CWE-862%20Missing%20Authorization%20in%20Naukowa%20i%20Akademicka%20Sie%C4%87%20Komputerowa%20-%20Pa%C5%84stwowy%20Instytut%20Badawczy%20EZD%20RP&amp;severity=high&amp;id=682cd0fc1484d88663aecaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2875-cwe-610-externally-controlled-reference-to-a-resource-in-another-sphere-in-schneider-electric-modicon-controllers-m241-m251-aecadf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2875%3A%20CWE-610%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20Schneider%20Electric%20Modicon%20Controllers%20M241%20%2F%20M251&amp;severity=high&amp;id=682cd0fc1484d88663aecadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8988-cwe-639-authorization-bypass-through-user-controlled-key-in-peepso-peepso-core-file-uploads-aecb32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8988%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20PeepSo%20PeepSo%20Core%3A%20File%20Uploads&amp;severity=medium&amp;id=682cd0fc1484d88663aecb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13940-cwe-918-server-side-request-forgery-ssrf-in-ninja-forms-ninja-forms-webhooks-aecb30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13940%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ninja%20Forms%20Ninja%20Forms%20Webhooks&amp;severity=medium&amp;id=682cd0fc1484d88663aecb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0020-aeb4a8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0020&amp;severity=low&amp;id=682cd0f81484d88663aeb4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52290-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lf-edge-ekuiper-aecaf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52290%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lf-edge%20ekuiper&amp;severity=medium&amp;id=682cd0fc1484d88663aecaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4520-cwe-862-missing-authorization-in-uncannyowl-uncanny-automator-easy-automation-integration-webhooks-workflow-builder-plugin-aecb2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4520%3A%20CWE-862%20Missing%20Authorization%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=682cd0fc1484d88663aecb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3623-cwe-502-deserialization-of-untrusted-data-in-uncannyowl-uncanny-automator-easy-automation-integration-webhooks-workflow-builder-plugin-aecb0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3623%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=critical&amp;id=682cd0fc1484d88663aecb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29691-n-a-in-n-a-aec750</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29691%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44879-n-a-in-n-a-aec74e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44879%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25370-n-a-in-n-a-aec73d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25370%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57096-n-a-in-n-a-aec73b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57096%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec73b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55569-n-a-in-n-a-aec739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55569%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44184-n-a-in-n-a-aec731</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44184%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32363-n-a-in-n-a-aec72f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32363%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44024-n-a-in-n-a-aec71a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44024%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29690-n-a-in-n-a-aec70e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29690%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29688-n-a-in-n-a-aec70c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29688%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58101-n-a-in-n-a-aec6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29689-n-a-in-n-a-aec6de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29689%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26783-n-a-in-n-a-aec61c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26783%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29686-n-a-in-n-a-aec4c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29686%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45516-n-a-in-n-a-aeb76d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45516%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26785-n-a-in-n-a-aeb5aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26785%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44186-n-a-in-n-a-aeb513</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44186%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26784-n-a-in-n-a-aeb50d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26784%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56427-n-a-in-n-a-aeb505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27891-n-a-in-n-a-aeb075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27891%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57273-n-a-in-n-a-aeb06d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57273%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeb06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54780-n-a-in-n-a-aeb06b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54780%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54779-n-a-in-n-a-aeb069</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54779%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeb069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-14-29f1bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-14&amp;severity=medium&amp;id=682c7db1e8347ec82d29f1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-14-f12de0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4574-double-free-aec771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4574%3A%20Double%20Free&amp;severity=medium&amp;id=682cd0fb1484d88663aec771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26646-cwe-73-external-control-of-file-name-or-path-in-microsoft-net-8-0-aeb942</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26646%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682cd0f91484d88663aeb942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48869-escalation-of-privilege-in-intel-r-xeon-r-6-processor-with-e-cores-when-using-intel-r-trust-domain-extensions-intel-r-tdx-or-intel-r-software-guard-extensions-intel-r-sgx-aec798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48869%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20with%20E-cores%20when%20using%20Intel(R)%20Trust%20Domain%20Extensions%20(Intel(R)%20TDX)%20or%20Intel(R)%20Software%20Guard%20Extensions%20(Intel(R)%20SGX)&amp;severity=medium&amp;id=682cd0fb1484d88663aec798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47800-escalation-of-privilege-in-intel-r-graphics-driver-software-aec796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47800%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47795-escalation-of-privilege-in-intel-r-oneapi-dpc-c-compiler-software-aec794</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47795%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20DPC%2B%2B%2FC%2B%2B%20Compiler%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47550-escalation-of-privilege-in-endurance-gaming-mode-software-installers-aec8ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47550%3A%20Escalation%20of%20Privilege%20in%20Endurance%20Gaming%20Mode%20software%20installers&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46895-escalation-of-privilege-in-intel-r-arc-amp-iris-r-xe-graphics-software-aec792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46895%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Arc%E2%84%A2%20%26amp%3B%20Iris(R)%20Xe%20graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45371-denial-of-service-in-intel-r-arc-amp-iris-r-xe-graphics-software-aecad7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45371%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc%E2%84%A2%20%26amp%3B%20Iris(R)%20Xe%20graphics%20software&amp;severity=medium&amp;id=682cd0fc1484d88663aecad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45333-denial-of-service-in-intel-r-data-center-gpu-flex-series-for-windows-driver-aecacf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45333%3A%20Denial%20of%20Service%20in%20Intel(R)%20Data%20Center%20GPU%20Flex%20Series%20for%20Windows%20driver&amp;severity=medium&amp;id=682cd0fb1484d88663aecacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45332-information-disclosure-in-intel-r-processors-aecab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45332%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aecab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43420-information-disclosure-in-intel-atom-r-processors-aeca91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43420%3A%20Information%20Disclosure%20in%20Intel%20Atom(R)%20processors&amp;severity=medium&amp;id=682cd0fb1484d88663aeca91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43101-denial-of-service-in-intel-r-data-center-gpu-flex-series-for-windows-driver-software-aecaf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43101%3A%20Denial%20of%20Service%20in%20Intel(R)%20Data%20Center%20GPU%20Flex%20Series%20for%20Windows%20driver%20software&amp;severity=medium&amp;id=682cd0fc1484d88663aecaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39833-escalation-of-privilege-in-intel-r-qat-software-aec790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39833%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QAT%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39758-denial-of-service-in-intel-r-arc-amp-iris-r-xe-graphics-software-aeca72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39758%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc%E2%84%A2%20%26amp%3B%20Iris(R)%20Xe%20graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aeca72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36292-denial-of-service-in-intel-r-data-center-gpu-flex-series-for-windows-driver-aeca70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36292%3A%20Denial%20of%20Service%20in%20Intel(R)%20Data%20Center%20GPU%20Flex%20Series%20for%20Windows%20driver&amp;severity=high&amp;id=682cd0fb1484d88663aeca70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31150-information-disclosure-in-intel-r-graphics-driver-software-aeca34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31150%3A%20Information%20Disclosure%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aeca34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31073-escalation-of-privilege-in-intel-r-oneapi-level-zero-software-aec78e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31073%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20oneAPI%20Level%20Zero%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29222-denial-of-service-in-intel-r-graphics-driver-software-aeca32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29222%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Driver%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aeca32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28956-information-disclosure-in-intel-r-processors-aeca25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28956%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aeca25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28954-escalation-of-privilege-in-intel-r-graphics-driver-installers-aec78c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28954%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20installers&amp;severity=medium&amp;id=682cd0fb1484d88663aec78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28036-denial-of-service-in-intel-r-arc-gpu-aec8eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28036%3A%20Denial%20of%20Service%20in%20Intel(R)%20Arc%E2%84%A2%20GPU&amp;severity=medium&amp;id=682cd0fb1484d88663aec8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24495-information-disclosure-in-intel-r-core-ultra-processors-aec8ef</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24495%3A%20Information%20Disclosure%20in%20Intel(R)%20Core%E2%84%A2%20Ultra%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aec8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24308-escalation-of-privilege-in-intel-r-server-d50dnp-and-m50fcp-aec0b1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24308%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP&amp;severity=high&amp;id=682cd0fa1484d88663aec0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23233-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23233%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22895-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecacd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22895%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22892-denial-of-service-in-openvino-model-server-software-maintained-by-intel-r-aecac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22892%3A%20Denial%20of%20Service%20in%20OpenVINO%E2%84%A2%20model%20server%20software%20maintained%20by%20Intel(R)&amp;severity=high&amp;id=682cd0fb1484d88663aecac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22848-denial-of-service-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecabe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22848%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22844-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecabc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22844%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22843-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22843%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=high&amp;id=682cd0fb1484d88663aec7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22448-denial-of-service-in-intel-r-simics-r-package-manager-software-aecaba</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22448%3A%20Denial%20of%20Service%20in%20Intel(R)%20Simics(R)%20Package%20Manager%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aecaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22446-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22446%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21100-information-disclosure-in-intel-r-server-d50dnp-and-m50fcp-boards-aecadd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21100%3A%20Information%20Disclosure%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=medium&amp;id=682cd0fc1484d88663aecadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21099-escalation-of-privilege-in-intel-r-graphics-software-aec7b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21099%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21094-escalation-of-privilege-in-intel-r-server-d50dnp-and-m50fcp-boards-aec0af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21094%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=high&amp;id=682cd0fa1484d88663aec0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21081-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21081%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aec7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20629-escalation-of-privilege-in-intel-r-ethernet-network-adapter-e810-series-aec7af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20629%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Ethernet%20Network%20Adapter%20E810%20Series&amp;severity=medium&amp;id=682cd0fb1484d88663aec7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20624-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20624%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20623-information-disclosure-in-intel-r-core-processors-10th-generation-aec9c4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20623%3A%20Information%20Disclosure%20in%20Intel(R)%20Core%E2%84%A2%20processors%20(10th%20Generation)&amp;severity=medium&amp;id=682cd0fb1484d88663aec9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20618-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aec997</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20618%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aec997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20616-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20616%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aec7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20612-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec7ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20612%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20611-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecadb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20611%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fc1484d88663aecadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20108-escalation-of-privilege-in-intel-r-network-adapter-driver-installers-for-windows-11-aec7a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20108%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Network%20Adapter%20Driver%20installers%20for%20Windows%2011&amp;severity=medium&amp;id=682cd0fb1484d88663aec7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20104-escalation-of-privilege-in-administrative-tools-for-some-intel-r-network-adapters-package-aecad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20104%3A%20Escalation%20of%20Privilege%20in%20Administrative%20Tools%20for%20some%20Intel(R)%20Network%20Adapters%20package&amp;severity=medium&amp;id=682cd0fc1484d88663aecad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20103-denial-of-service-in-intel-r-processors-aecad3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20103%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aecad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20101-information-disclosure-denial-of-service-in-intel-r-graphics-drivers-aecad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20101%3A%20Information%20Disclosure%2C%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fb1484d88663aecad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20100-escalation-of-privilege-in-intel-r-xeon-r-6-processor-with-e-cores-aec7f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20100%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20with%20E-cores&amp;severity=high&amp;id=682cd0fb1484d88663aec7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20095-escalation-of-privilege-in-intel-r-realsense-sdk-software-aec0ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20095%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20RealSense%E2%84%A2%20SDK%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20084-denial-of-service-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aecaae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20084%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aecaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20083-escalation-of-privilege-in-intel-r-slim-bootloader-aec0ab</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20083%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Slim%20Bootloader&amp;severity=high&amp;id=682cd0fa1484d88663aec0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20082-escalation-of-privilege-in-intel-r-server-d50dnp-and-m50fcp-boards-aec0a9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20082%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=high&amp;id=682cd0fa1484d88663aec0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20079-escalation-of-privilege-in-intel-r-advisor-software-aec0a7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20079%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Advisor%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20076-escalation-of-privilege-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec98a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20076%3A%20Escalation%20of%20Privilege%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aec98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20071-denial-of-service-in-intel-r-graphics-drivers-aec988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20071%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fb1484d88663aec988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20062-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aec963</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20062%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aec963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20057-denial-of-service-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec942</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20057%3A%20Denial%20of%20Service%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20054-denial-of-service-in-intel-r-processors-aec925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20054%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aec925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20052-denial-of-service-in-intel-r-graphics-software-aec8e9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20052%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20047-escalation-of-privilege-in-intel-r-core-ultra-processors-aecaa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20047%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Core%E2%84%A2%20Ultra%20Processors&amp;severity=medium&amp;id=682cd0fb1484d88663aecaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20046-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca9f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20046%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20043-escalation-of-privilege-in-intel-r-realsense-sdk-software-aec0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20043%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20RealSense%E2%84%A2%20SDK%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20041-escalation-of-privilege-in-intel-r-graphics-software-for-intel-r-arc-graphics-and-intel-r-iris-r-xe-graphics-aeca9d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20041%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20software%20for%20Intel(R)%20Arc%E2%84%A2%20graphics%20and%20Intel(R)%20Iris(R)%20Xe%20graphics&amp;severity=medium&amp;id=682cd0fb1484d88663aeca9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20039-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20039%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=medium&amp;id=682cd0fb1484d88663aeca9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20034-information-disclosure-in-intel-r-server-d50dnp-and-m50fcp-boards-aeca99</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20034%3A%20Information%20Disclosure%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=medium&amp;id=682cd0fb1484d88663aeca99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20032-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20032%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20031-denial-of-service-in-intel-r-graphics-drivers-aeca95</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20031%3A%20Denial%20of%20Service%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fb1484d88663aeca95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20030-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aeca78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20030%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=low&amp;id=682cd0fb1484d88663aeca78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20026-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20026%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20022-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec411</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20022%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fa1484d88663aec411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20018-escalation-of-privilege-in-intel-r-graphics-drivers-aec40f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20018%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Drivers&amp;severity=medium&amp;id=682cd0fa1484d88663aec40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20015-escalation-of-privilege-in-intel-r-ethernet-connection-software-aec0a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20015%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Ethernet%20Connection%20software&amp;severity=medium&amp;id=682cd0fa1484d88663aec0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tales-from-the-cloud-trenches-the-attacker-doth-persist-too-much-methinks-16ac4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tales%20from%20the%20cloud%20trenches%3A%20The%20Attacker%20doth%20persist%20too%20much%2C%20methinks&amp;severity=medium&amp;id=682c99307960f6956616ac4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ta406-pivots-to-the-front-16abe3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TA406%20Pivots%20to%20the%20Front&amp;severity=medium&amp;id=682c992c7960f6956616abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pypi-package-targets-solana-developers-16ac52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PyPI%20package%20targets%20Solana%20developers&amp;severity=medium&amp;id=682c99307960f6956616ac52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20013-information-disclosure-in-edge-orchestrator-software-for-intel-r-tiber-edge-platform-aec91b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20013%3A%20Information%20Disclosure%20in%20Edge%20Orchestrator%20software%20for%20Intel(R)%20Tiber%E2%84%A2%20Edge%20Platform&amp;severity=medium&amp;id=682cd0fb1484d88663aec91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20012-information-disclosure-in-intel-r-core-ultra-processors-aec40d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20012%3A%20Information%20Disclosure%20in%20Intel(R)%20Core%E2%84%A2%20Ultra%20Processors&amp;severity=medium&amp;id=682cd0fa1484d88663aec40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20009-information-disclosure-in-intel-r-server-d50dnp-and-m50fcp-boards-aec8e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20009%3A%20Information%20Disclosure%20in%20Intel(R)%20Server%20D50DNP%20and%20M50FCP%20boards&amp;severity=medium&amp;id=682cd0fb1484d88663aec8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20008-escalation-of-privilege-in-intel-r-simics-r-package-manager-software-aec8d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20008%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Simics(R)%20Package%20Manager%20software&amp;severity=medium&amp;id=682cd0fb1484d88663aec8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20006-denial-of-service-in-intel-r-proset-wireless-wifi-software-for-windows-aeca74</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20006%3A%20Denial%20of%20Service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20Software%20for%20Windows&amp;severity=high&amp;id=682cd0fb1484d88663aeca74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20004-escalation-of-privilege-in-intel-r-xeon-r-6-processor-e-cores-firmware-aec7f3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20004%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Xeon(R)%206%20processor%20E-Cores%20firmware&amp;severity=high&amp;id=682cd0fb1484d88663aec7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20003-escalation-of-privilege-in-intel-r-graphics-driver-software-installers-aec7a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20003%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20Driver%20software%20installers&amp;severity=high&amp;id=682cd0fb1484d88663aec7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43565-incorrect-authorization-cwe-863-in-adobe-coldfusion-aec7e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43565%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682cd0fb1484d88663aec7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43559-improper-input-validation-cwe-20-in-adobe-coldfusion-aec7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43559%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43562-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-cwe-78-in-adobe-coldfusion-aec7d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43562%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43566-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-aeca80</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43566%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682cd0fb1484d88663aeca80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43564-incorrect-authorization-cwe-863-in-adobe-coldfusion-aec7d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43564%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43560-improper-input-validation-cwe-20-in-adobe-coldfusion-aec7d0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43560%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43563-improper-access-control-cwe-284-in-adobe-coldfusion-aec7d6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43563%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43561-incorrect-authorization-cwe-863-in-adobe-coldfusion-aec7d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43561%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682cd0fb1484d88663aec7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30315-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-connect-aecbc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30315%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=682cd0fc1484d88663aecbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30316-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-connect-aec8a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30316%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30314-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-connect-aec8a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30314%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43567-cross-site-scripting-reflected-xss-cwe-79-in-adobe-adobe-connect-aec7e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43567%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Connect&amp;severity=critical&amp;id=682cd0fb1484d88663aec7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43554-out-of-bounds-write-cwe-787-in-adobe-substance3d-modeler-aecbb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43554%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=682cd0fc1484d88663aecbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43553-uncontrolled-search-path-element-cwe-427-in-adobe-substance3d-modeler-aecbb2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43553%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Substance3D%20-%20Modeler&amp;severity=high&amp;id=682cd0fc1484d88663aecbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43569-out-of-bounds-write-cwe-787-in-adobe-substance3d-stager-aec7eb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43569%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43571-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43571%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43570-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43570%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43551-out-of-bounds-read-cwe-125-in-adobe-substance3d-stager-aec91f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43551%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=682cd0fb1484d88663aec91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43568-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7e9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43568%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43549-use-after-free-cwe-416-in-adobe-substance3d-stager-aec7cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43549%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=high&amp;id=682cd0fb1484d88663aec7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43572-out-of-bounds-write-cwe-787-in-adobe-dimension-aec7f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43572%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=682cd0fb1484d88663aec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43548-out-of-bounds-write-cwe-787-in-adobe-dimension-aec7ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43548%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=high&amp;id=682cd0fb1484d88663aec7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disruption-of-drone-supply-chains-through-coordinated-multi-wave-attacks-in-taiwan-16ac7c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disruption%20of%20Drone%20Supply%20Chains%20Through%20Coordinated%20Multi-Wave%20Attacks%20in%20Taiwan&amp;severity=medium&amp;id=682c99307960f6956616ac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3744-cwe-266-incorrect-privilege-assignment-in-hashicorp-nomad-enterprise-aecc72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3744%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20HashiCorp%20Nomad%20Enterprise&amp;severity=high&amp;id=682cd0fc1484d88663aecc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43547-integer-overflow-or-wraparound-cwe-190-in-adobe-bridge-bd5f53</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43547%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=682d9815c4522896dcbd5f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43546-integer-underflow-wrap-or-wraparound-cwe-191-in-adobe-bridge-bd5f4d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43546%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=682d9815c4522896dcbd5f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43545-access-of-uninitialized-pointer-cwe-824-in-adobe-bridge-bd5f4b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43545%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=682d9815c4522896dcbd5f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30330-heap-based-buffer-overflow-cwe-122-in-adobe-illustrator-bd5ef2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30330%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=682d9815c4522896dcbd5ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30329-null-pointer-dereference-cwe-476-in-adobe-animate-bd5f7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30329%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9815c4522896dcbd5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43557-access-of-uninitialized-pointer-cwe-824-in-adobe-animate-bd5f7a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43557%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43556-integer-overflow-or-wraparound-cwe-190-in-adobe-animate-bd5f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43556%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43555-integer-underflow-wrap-or-wraparound-cwe-191-in-adobe-animate-bd5f63</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43555%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30328-out-of-bounds-write-cwe-787-in-adobe-animate-bd5f57</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30328%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=high&amp;id=682d9815c4522896dcbd5f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4660-cwe-276-incorrect-default-permissions-in-forescout-secureconnector-bd5f0e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4660%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Forescout%20SecureConnector&amp;severity=high&amp;id=682d9815c4522896dcbd5f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30325-integer-overflow-or-wraparound-cwe-190-in-adobe-photoshop-desktop-bd5f82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30325%3A%20Integer%20Overflow%20or%20Wraparound%20(CWE-190)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30326-access-of-uninitialized-pointer-cwe-824-in-adobe-photoshop-desktop-bd5f3c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30326%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30324-integer-underflow-wrap-or-wraparound-cwe-191-in-adobe-photoshop-desktop-bd5f34</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30324%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30322-out-of-bounds-write-cwe-787-in-adobe-substance3d-painter-bd5f23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30322%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=682d9815c4522896dcbd5f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31359-cwe-276-incorrect-default-permissions-in-amd-aim-t-manageability-api-aec08e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31359%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AIM-T%20Manageability%20API&amp;severity=high&amp;id=682cd0fa1484d88663aec08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31358-cwe-276-incorrect-default-permissions-in-amd-aim-t-manageability-api-aec08c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31358%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AIM-T%20Manageability%20API&amp;severity=high&amp;id=682cd0fa1484d88663aec08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27197-out-of-bounds-write-cwe-787-in-adobe-lightroom-desktop-bd5fa3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27197%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Lightroom%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30320-null-pointer-dereference-cwe-476-in-adobe-indesign-desktop-bd5fd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30320%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=682d9815c4522896dcbd5fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30318-out-of-bounds-write-cwe-787-in-adobe-indesign-desktop-aecc11</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30318%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=682cd0fc1484d88663aecc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30319-null-pointer-dereference-cwe-476-in-adobe-indesign-desktop-bd5fcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30319%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InDesign%20Desktop&amp;severity=medium&amp;id=682d9815c4522896dcbd5fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0035-cwe-428-unquoted-search-path-or-element-in-amd-amd-cloud-manageability-service-aec0a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0035%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20AMD%20AMD%20Cloud%20Manageability%20Service&amp;severity=high&amp;id=682cd0fa1484d88663aec0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47280-cwe-116-improper-encoding-or-escaping-of-output-in-umbraco-umbraco-forms-issues-bd5fc1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47280%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20umbraco%20Umbraco.Forms.Issues&amp;severity=low&amp;id=682d9815c4522896dcbd5fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36321-cwe-428-unquoted-search-path-or-element-in-amd-aim-t-manageability-service-aec092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36321%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20AMD%20AIM-T%20Manageability%20Service&amp;severity=high&amp;id=682cd0fa1484d88663aec092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6364-vulnerability-in-absolute-security-absolute-persistence-bd5f96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6364%3A%20Vulnerability%20in%20Absolute%20Security%20Absolute%20Persistence&amp;severity=medium&amp;id=682d9815c4522896dcbd5f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24063-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb940</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24063%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32707-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeba1f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32707%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32705-cwe-125-out-of-bounds-read-in-microsoft-microsoft-365-apps-for-enterprise-aeba1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32705%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeba1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32704-cwe-126-buffer-over-read-in-microsoft-microsoft-office-2019-aeba19</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32704%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeba19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32702-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-microsoft-visual-studio-2019-version-16-11-includes-16-0-16-10-aeba0a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32702%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202019%20version%2016.11%20(includes%2016.0%20-%2016.10)&amp;severity=high&amp;id=682cd0f91484d88663aeba0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30397-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-aeba02</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30397%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30388-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-ltsc-for-mac-2021-aeb9fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30388%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=682cd0f91484d88663aeb9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30385-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb9eb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30385%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29974-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-aeb9c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29974%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29963-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb9a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29963%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aeb9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29962-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb9a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29962%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29961-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb99f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29961%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29958-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb98e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29958%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29957-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aeb98c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29957%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29956-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aeb98a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29956%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29955-cwe-20-improper-input-validation-in-microsoft-windows-server-2025-server-core-installation-aeb988</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29955%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=682cd0f91484d88663aeb988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29954-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aeb986</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29954%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29842-cwe-349-acceptance-of-extraneous-untrusted-data-with-trusted-data-in-microsoft-windows-10-version-22h2-aeb984</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29842%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29841-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-server-2022-aeb982</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29841%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aeb982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29840-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb980</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29840%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29839-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb97e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29839%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29838-cwe-476-null-pointer-dereference-in-microsoft-windows-server-2025-server-core-installation-aeb97c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29838%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f91484d88663aeb97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29837-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aeb96f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29837%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29836-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb96d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29836%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29835-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb96b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29835%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29833-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aeb969</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29833%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29832-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29832%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29831-cwe-416-use-after-free-in-microsoft-windows-server-2019-aeb965</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29831%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aeb965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29830-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb963</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29830%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29829-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb961</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29829%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26685-cwe-287-improper-authentication-in-microsoft-microsoft-defender-for-identity-aeb948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26685%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Defender%20for%20Identity&amp;severity=medium&amp;id=682cd0f91484d88663aeb948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27488-cwe-798-use-of-hard-coded-credentials-in-microsoft-windows-hlk-for-windows-server-2025-aeb94c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27488%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microsoft%20Windows%2010%20HLK%20version%2020H2&amp;severity=medium&amp;id=682cd0f91484d88663aeb94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26677-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aeb944</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26677%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32709-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeba21</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32709%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21264-cwe-552-files-or-directories-accessible-to-external-parties-in-microsoft-visual-studio-code-aeb931</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21264%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Microsoft%20Microsoft%20Visual%20Studio%20Code%20CoPilot%20Chat%20Extension&amp;severity=high&amp;id=682cd0f91484d88663aeb931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32706-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aeba1d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32706%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32703-cwe-1220-insufficient-granularity-of-access-control-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-aeba17</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32703%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=medium&amp;id=682cd0f91484d88663aeba17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32701-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeba08</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32701%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeba08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30400-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeba04</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30400%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aeba04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30394-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-aeba00</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30394%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202012&amp;severity=medium&amp;id=682cd0f91484d88663aeba00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29826-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-microsoft-microsoft-dataverse-aeb95d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29826%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f91484d88663aeb95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30393-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb9fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30393%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27468-cwe-269-improper-privilege-management-in-microsoft-windows-10-version-1809-aeb94a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27468%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30387-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-microsoft-azure-ai-document-intelligence-studio-aeb9fa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30387%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Azure%20AI%20Document%20Intelligence%20Studio&amp;severity=critical&amp;id=682cd0f91484d88663aeb9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30386-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb9f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30386%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30384-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30384%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30383-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-office-online-server-aeb9e7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30383%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30382-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9e5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30382%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30381-cwe-125-out-of-bounds-read-in-microsoft-office-online-server-aeb9e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30381%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30379-cwe-763-release-of-invalid-pointer-or-reference-in-microsoft-office-online-server-aeb9e1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30379%3A%20CWE-763%3A%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30378-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30378%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30377-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb9dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30377%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30376-cwe-122-heap-based-buffer-overflow-in-microsoft-office-online-server-aeb9db</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30376%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30375-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-office-online-server-aeb9d9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30375%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29979-cwe-122-heap-based-buffer-overflow-in-microsoft-office-online-server-aeb9cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29979%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29978-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb9ca</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29978%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29977-cwe-416-use-after-free-in-microsoft-office-online-server-aeb9c8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29977%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aeb9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29976-cwe-269-improper-privilege-management-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aeb9c6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29976%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aeb9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29975-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-pc-manager-aeb9c4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29975%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=high&amp;id=682cd0f91484d88663aeb9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29973-cwe-284-improper-access-control-in-microsoft-azure-file-sync-aeb9c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29973%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20File%20Sync&amp;severity=high&amp;id=682cd0f91484d88663aeb9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29971-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-22h2-aeb9bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29971%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aeb9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29970-cwe-416-use-after-free-in-microsoft-windows-server-2025-server-core-installation-aeb9ba</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29970%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f91484d88663aeb9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29969-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aeb9ad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29969%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aeb9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29968-cwe-20-improper-input-validation-in-microsoft-windows-server-2019-aeb9ab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29968%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aeb9ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29967-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-app-client-for-windows-desktop-aeb9a9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29967%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aeb9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29966-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-app-client-for-windows-desktop-aeb9a7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29966%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aeb9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29964-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb9a5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29964%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aeb9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29960-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb99d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29960%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29959-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb99b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29959%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aeb99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26684-cwe-73-external-control-of-file-name-or-path-in-microsoft-microsoft-defender-for-endpoint-for-linux-aeb946</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26684%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Linux&amp;severity=medium&amp;id=682cd0f91484d88663aeb946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36339-cwe-276-incorrect-default-permissions-in-amd-amd-optimizing-cpu-libraries-aocl-aec094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36339%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AMD%20Optimizing%20CPU%20Libraries%20(AOCL)&amp;severity=high&amp;id=682cd0fa1484d88663aec094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21960-cwe-276-incorrect-default-permissions-in-amd-amd-optimizing-cpu-libraries-aocl-aec090</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21960%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AMD%20Optimizing%20CPU%20Libraries%20(AOCL)&amp;severity=high&amp;id=682cd0fa1484d88663aec090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30310-access-of-resource-using-incompatible-type-type-confusion-cwe-843-in-adobe-dreamweaver-desktop-bd5fcb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30310%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20(CWE-843)%20in%20Adobe%20Dreamweaver%20Desktop&amp;severity=high&amp;id=682d9815c4522896dcbd5fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4658-cwe-305-authentication-bypass-by-primary-weakness-in-opkssh-opkssh-aecbe6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4658%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OPKSSH%20OPKSSH&amp;severity=critical&amp;id=682cd0fc1484d88663aecbe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3757-cwe-305-authentication-bypass-by-primary-weakness-in-opkssh-opkssh-aecbd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3757%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OPKSSH%20OPKSSH&amp;severity=critical&amp;id=682cd0fc1484d88663aecbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47278-cwe-683-function-call-with-incorrect-order-of-arguments-in-pallets-flask-aecbe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47278%3A%20CWE-683%3A%20Function%20Call%20With%20Incorrect%20Order%20of%20Arguments%20in%20pallets%20flask&amp;severity=low&amp;id=682cd0fc1484d88663aecbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4428-cwe-94-improper-control-of-generation-of-code-code-injection-in-ivanti-endpoint-manager-mobile-aeb2f2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4428%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=high&amp;id=682cd0f81484d88663aeb2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4427-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-ivanti-endpoint-manager-mobile-aeb2e5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4427%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=medium&amp;id=682cd0f81484d88663aeb2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47276-cwe-328-use-of-weak-hash-in-chewkeanho-actualizer-aecc43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47276%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20ChewKeanHo%20Actualizer&amp;severity=high&amp;id=682cd0fc1484d88663aecc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46721-cwe-352-cross-site-request-forgery-csrf-in-justinas-nosurf-aecca0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46721%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justinas%20nosurf&amp;severity=medium&amp;id=682cd0fc1484d88663aecca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31493-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-getkirby-kirby-aecc91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31493%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682cd0fc1484d88663aecc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30207-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-getkirby-kirby-aecc34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30207%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getkirby%20kirby&amp;severity=low&amp;id=682cd0fc1484d88663aecc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22462-cwe-288-in-ivanti-neurons-for-itsm-on-prem-aecc2a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22462%3A%20CWE-288%20in%20Ivanti%20Neurons%20for%20ITSM%20(on-prem)&amp;severity=critical&amp;id=682cd0fc1484d88663aecc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22460-cwe-1392-use-of-default-credentials-in-ivanti-csa-cloud-services-appliance-aecc28</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22460%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Ivanti%20CSA%20(Cloud%20Services%20Appliance)&amp;severity=high&amp;id=682cd0fc1484d88663aecc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30159-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-getkirby-kirby-aecc24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30159%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682cd0fc1484d88663aecc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12533-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-phoenix-securecore-technology-4-bd633f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12533%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Phoenix%20SecureCore%20Technology%204&amp;severity=low&amp;id=682d9815c4522896dcbd633f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22859-execute-unauthorized-code-or-commands-in-fortinet-forticlientems-bd635c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22859%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=medium&amp;id=682d9815c4522896dcbd635c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35281-execute-unauthorized-code-or-commands-in-fortinet-forticlientmac-bd6347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35281%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientMac&amp;severity=low&amp;id=682d9815c4522896dcbd6347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36340-cwe-1386-insecure-operation-on-windows-junction-mount-point-in-amd-amd-prof-bd5fdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36340%3A%20CWE-1386%20-%20Insecure%20Operation%20on%20Windows%20Junction%20%2F%20Mount%20Point%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=medium&amp;id=682d9815c4522896dcbd5fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42446-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-ami-aptiov-bd6358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42446%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20AMI%20AptioV&amp;severity=high&amp;id=682d9815c4522896dcbd6358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-breed-of-infostealer-16ac70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20New%20Breed%20of%20Infostealer&amp;severity=medium&amp;id=682c99307960f6956616ac70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4649-cwe-269-improper-privilege-management-in-centreon-web-bd667e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4649%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Centreon%20web&amp;severity=medium&amp;id=682d9816c4522896dcbd667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32917-cwe-427-uncontrolled-search-path-element-in-checkmk-gmbh-checkmk-bd6638</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32917%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682d9816c4522896dcbd6638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4648-cwe-494-download-of-code-without-integrity-check-in-centreon-web-bd666d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4648%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Centreon%20web&amp;severity=high&amp;id=682d9816c4522896dcbd666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40583-cwe-319-cleartext-transmission-of-sensitive-information-in-siemens-scalance-lpe9403-bd6655</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40583%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd6655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40582-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-siemens-scalance-lpe9403-bd65fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=high&amp;id=682d9816c4522896dcbd65fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40581-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-siemens-scalance-lpe9403-bd65f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40581%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=high&amp;id=682d9816c4522896dcbd65f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40580-cwe-121-stack-based-buffer-overflow-in-siemens-scalance-lpe9403-bd65f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40580%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40579-cwe-121-stack-based-buffer-overflow-in-siemens-scalance-lpe9403-bd65cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40579%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40578-cwe-125-out-of-bounds-read-in-siemens-scalance-lpe9403-bd65c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40578%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40577-cwe-125-out-of-bounds-read-in-siemens-scalance-lpe9403-bd65bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40577%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9816c4522896dcbd65bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40576-cwe-476-null-pointer-dereference-in-siemens-scalance-lpe9403-bd5f86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40576%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40575-cwe-457-use-of-uninitialized-variable-in-siemens-scalance-lpe9403-bd5f5f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40575%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40574-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-scalance-lpe9403-bd5f5b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40574%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=high&amp;id=682d9815c4522896dcbd5f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40573-cwe-35-path-traversal-in-siemens-scalance-lpe9403-bd5f06</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40573%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40572-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-scalance-lpe9403-bd5f00</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40572%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SCALANCE%20LPE9403&amp;severity=medium&amp;id=682d9815c4522896dcbd5f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40571-cwe-266-incorrect-privilege-assignment-in-siemens-mendix-oidc-sso-mendix-10-compatible-bd5edf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40571%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20Mendix%20OIDC%20SSO%20(Mendix%2010%20compatible)&amp;severity=low&amp;id=682d9815c4522896dcbd5edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40566-cwe-613-insufficient-session-expiration-in-siemens-simatic-pcs-neo-v4-1-bd5edb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40566%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd5edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40556-cwe-20-improper-input-validation-in-siemens-bacnet-atec-550-440-bd5ece</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40556%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20BACnet%20ATEC%20550-440&amp;severity=medium&amp;id=682d9815c4522896dcbd5ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40555-cwe-440-expected-behavior-violation-in-siemens-apogee-pxc-talon-tc-series-bacnet-bd65a3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40555%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20Siemens%20APOGEE%20PXC%2BTALON%20TC%20Series%20(BACnet)&amp;severity=medium&amp;id=682d9816c4522896dcbd65a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33025-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-ruggedcom-rox-mx5000-bd659f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33025%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=critical&amp;id=682d9816c4522896dcbd659f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33024-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-ruggedcom-rox-mx5000-bd6586</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33024%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=critical&amp;id=682d9816c4522896dcbd6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32469-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-ruggedcom-rox-mx5000-bd6515</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32469%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20RUGGEDCOM%20ROX%20MX5000&amp;severity=critical&amp;id=682d9815c4522896dcbd6515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32454-cwe-125-out-of-bounds-read-in-siemens-teamcenter-visualization-v14-3-bd64c0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32454%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Teamcenter%20Visualization%20V14.3&amp;severity=high&amp;id=682d9815c4522896dcbd64c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31930-cwe-1188-initialization-of-a-resource-with-an-insecure-default-in-siemens-iec-1ph-7-4kw-child-socket-bd640e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31930%3A%20CWE-1188%3A%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20Siemens%20IEC%201Ph%207.4kW%20Child%20socket&amp;severity=high&amp;id=682d9815c4522896dcbd640e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31929-cwe-1326-missing-immutable-root-of-trust-in-hardware-in-siemens-iec-1ph-7-4kw-child-socket-bd6373</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31929%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Siemens%20IEC%201Ph%207.4kW%20Child%20socket&amp;severity=medium&amp;id=682d9815c4522896dcbd6373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30176-cwe-125-out-of-bounds-read-in-siemens-simatic-pcs-neo-v4-1-bd608d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30176%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd608d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30175-cwe-787-out-of-bounds-write-in-siemens-simatic-pcs-neo-v4-1-bd6089</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30175%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd6089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30174-cwe-125-out-of-bounds-read-in-siemens-simatic-pcs-neo-v4-1-bd6085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.1&amp;severity=high&amp;id=682d9815c4522896dcbd6085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26390-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-siemens-ozw672-aeccb8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26390%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20OZW672&amp;severity=critical&amp;id=682cd0fc1484d88663aeccb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26389-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-siemens-ozw672-aeccb6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26389%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Siemens%20OZW672&amp;severity=critical&amp;id=682cd0fc1484d88663aeccb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24510-cwe-20-improper-input-validation-in-siemens-ms-tp-point-pickup-module-aeccac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24510%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20MS%2FTP%20Point%20Pickup%20Module&amp;severity=medium&amp;id=682cd0fc1484d88663aeccac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24009-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-sirius-3rk3-modular-safety-system-mss-aeccaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24009%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SIRIUS%203RK3%20Modular%20Safety%20System%20(MSS)&amp;severity=medium&amp;id=682cd0fc1484d88663aeccaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24008-cwe-311-missing-encryption-of-sensitive-data-in-siemens-sirius-3rk3-modular-safety-system-mss-aecca8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24008%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Siemens%20SIRIUS%203RK3%20Modular%20Safety%20System%20(MSS)&amp;severity=medium&amp;id=682cd0fc1484d88663aecca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24007-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-siemens-sirius-3rk3-modular-safety-system-mss-bd605b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24007%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20SIRIUS%203RK3%20Modular%20Safety%20System%20(MSS)&amp;severity=high&amp;id=682d9815c4522896dcbd605b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51447-cwe-204-observable-response-discrepancy-in-siemens-polarion-v2310-bd601d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51447%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682d9815c4522896dcbd601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51446-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-siemens-polarion-v2310-bd6006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51446%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682d9815c4522896dcbd6006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51445-cwe-611-improper-restriction-of-xml-external-entity-reference-in-siemens-polarion-v2310-aecca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51445%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682cd0fc1484d88663aecca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51444-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-siemens-polarion-v2310-aecca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51444%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20Polarion%20V2310&amp;severity=medium&amp;id=682cd0fc1484d88663aecca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23815-cwe-306-missing-authentication-for-critical-function-in-siemens-desigo-cc-aecca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23815%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20Desigo%20CC&amp;severity=high&amp;id=682cd0fc1484d88663aecca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40628-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-domainspro-domainspro-aeccae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DomainsPRO%20DomainsPRO&amp;severity=critical&amp;id=682cd0fc1484d88663aeccae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4647-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-centreon-web-bd6665</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Centreon%20web&amp;severity=high&amp;id=682d9816c4522896dcbd6665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4646-cwe-269-improper-privilege-management-in-centreon-web-bd665d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4646%3A%20CWE-863%20Incorrect%20Authorization%20in%20Centreon%20web&amp;severity=high&amp;id=682d9816c4522896dcbd665d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22248-vulnerability-in-vmware-bitnami-bd662b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22248%3A%20Vulnerability%20in%20VMware%20Bitnami&amp;severity=critical&amp;id=682d9816c4522896dcbd662b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41645-cwe-669-incorrect-resource-transfer-between-spheres-in-sma-www-sunnyportal-com-bd6602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41645%3A%20CWE-669%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20SMA%20www.sunnyportal.com&amp;severity=high&amp;id=682d9816c4522896dcbd6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3916-cwe-121-stack-based-buffer-overflow-in-schneider-electric-ecostruxure-power-build-rapsody-software-bd65b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3916%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Schneider%20Electric%20EcoStruxure%E2%84%A2%20Power%20Build%20Rapsody%20software&amp;severity=medium&amp;id=682d9816c4522896dcbd65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27696-cwe-285-improper-authorization-in-apache-software-foundation-apache-superset-bd65a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27696%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=682d9816c4522896dcbd65a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4474-cwe-285-improper-authorization-in-vinoth06-frontend-dashboard-bd6612</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4474%3A%20CWE-285%20Improper%20Authorization%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=high&amp;id=682d9816c4522896dcbd6612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4339-cwe-862-missing-authorization-in-codexthemes-thegem-aeccb0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4339%3A%20CWE-862%20Missing%20Authorization%20in%20CodexThemes%20TheGem&amp;severity=medium&amp;id=682cd0fc1484d88663aeccb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4317-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-codexthemes-thegem-bd660a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4317%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodexThemes%20TheGem&amp;severity=high&amp;id=682d9816c4522896dcbd660a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3107-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-contrid-newsletters-bd65b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3107%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contrid%20Newsletters&amp;severity=medium&amp;id=682d9816c4522896dcbd65b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4473-cwe-285-improper-authorization-in-vinoth06-frontend-dashboard-bd6569</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4473%3A%20CWE-285%20Improper%20Authorization%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=high&amp;id=682d9816c4522896dcbd6569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4632-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-samsung-electronics-magicinfo-9-server-bd661a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4632%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=critical&amp;id=682d9816c4522896dcbd661a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22246-vulnerability-in-cloud-foundry-uaa-bd6571</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22246%3A%20Vulnerability%20in%20Cloud%20Foundry%20UAA&amp;severity=low&amp;id=682d9816c4522896dcbd6571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22249-vulnerability-in-vmware-vmware-aria-automation-bd6575</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22249%3A%20Vulnerability%20in%20VMware%20Vmware%20Aria%20Automation&amp;severity=high&amp;id=682d9816c4522896dcbd6575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4396-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-relevanssi-relevanssi-a-better-search-pro-bd6565</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4396%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Relevanssi%20Relevanssi%20%E2%80%93%20A%20Better%20Search%20(Pro)&amp;severity=high&amp;id=682d9816c4522896dcbd6565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35471-cwe-427-uncontrolled-search-path-element-in-conda-forge-openssl-feedstock-bd663c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35471%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20conda-forge%20openssl-feedstock&amp;severity=high&amp;id=682d9816c4522896dcbd663c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43011-cwe-862-missing-authorization-in-sap-se-sap-landscape-transformation-pcl-basis-bd64da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43011%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20(PCL%20Basis)&amp;severity=high&amp;id=682d9815c4522896dcbd64da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43010-cwe-94-improper-control-of-generation-of-code-in-sap-se-sap-s-4hana-cloud-private-edition-or-on-premise-scm-master-data-layer-mdl-bd64d2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43010%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20S%2F4HANA%20Cloud%20Private%20Edition%20or%20on%20Premise%20(SCM%20Master%20Data%20Layer%20(MDL))&amp;severity=high&amp;id=682d9815c4522896dcbd64d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43009-cwe-862-missing-authorization-in-sap-se-sap-service-parts-management-spm-bd64ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43009%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Service%20Parts%20Management%20(SPM)&amp;severity=medium&amp;id=682d9815c4522896dcbd64ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43008-cwe-862-missing-authorization-in-sap-se-sap-s-4hana-hcm-portugal-and-sap-erp-hcm-portugal-bd6563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43008%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20S%2F4HANA%20HCM%20Portugal%20and%20SAP%20ERP%20HCM%20Portugal&amp;severity=medium&amp;id=682d9816c4522896dcbd6563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43007-cwe-862-missing-authorization-in-sap-se-sap-service-parts-management-spm-bd652d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43007%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Service%20Parts%20Management%20(SPM)&amp;severity=medium&amp;id=682d9815c4522896dcbd652d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43006-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-sap-se-sap-supplier-relationship-management-master-data-management-catalog-bd6529</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43006%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Master%20Data%20Management%20Catalog)&amp;severity=medium&amp;id=682d9815c4522896dcbd6529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43005-cwe-256-plaintext-storage-of-a-password-in-sap-se-sap-gui-for-windows-bd6525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43005%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20SAP_SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=682d9815c4522896dcbd6525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43004-cwe-862-missing-authorization-in-sap-se-sap-digital-manufacturing-production-operator-dashboard-bd6521</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43004%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Digital%20Manufacturing%20(Production%20Operator%20Dashboard)&amp;severity=medium&amp;id=682d9815c4522896dcbd6521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43003-cwe-749-exposed-dangerous-method-or-function-in-sap-se-sap-s-4hana-private-cloud-on-premise-bd651d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43003%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud%20%26%20On-Premise)&amp;severity=medium&amp;id=682d9815c4522896dcbd651d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43002-cwe-472-external-control-of-assumed-immutable-web-parameter-in-sap-se-sap-s4-hana-odata-meta-data-property-bd6519</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43002%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20SAP_SE%20SAP%20S4%2FHANA%20(OData%20meta-data%20property)&amp;severity=medium&amp;id=682d9815c4522896dcbd6519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43000-cwe-862-missing-authorization-in-sap-se-sap-business-objects-business-intelligence-platform-pmw-bd64c4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43000%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20Business%20Objects%20Business%20Intelligence%20Platform%20(PMW)&amp;severity=high&amp;id=682d9815c4522896dcbd64c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42999-cwe-502-deserialization-of-untrusted-data-in-sap-se-sap-netweaver-visual-composer-development-server-aeb8c2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42999%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20NetWeaver%20(Visual%20Composer%20development%20server)&amp;severity=critical&amp;id=682cd0f81484d88663aeb8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42997-cwe-732-incorrect-permission-assignment-for-critical-resource-in-sap-se-sap-gateway-client-bd6554</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42997%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20SAP_SE%20SAP%20Gateway%20Client&amp;severity=medium&amp;id=682d9816c4522896dcbd6554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31329-cwe-141-improper-neutralization-of-parameter-argument-delimiters-in-sap-se-sap-netweaver-application-server-abap-and-abap-platform-bd654c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31329%3A%20CWE-141%3A%20Improper%20Neutralization%20of%20Parameter%2FArgument%20Delimiters%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=682d9815c4522896dcbd654c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30018-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd64b1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30018%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=high&amp;id=682d9815c4522896dcbd64b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30012-cwe-502-deserialization-of-untrusted-data-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd64ad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30012%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=critical&amp;id=682d9815c4522896dcbd64ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30011-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd5eee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30011%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=medium&amp;id=682d9815c4522896dcbd5eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30010-cwe-601-url-redirection-to-untrusted-site-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd6463</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30010%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=medium&amp;id=682d9815c4522896dcbd6463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30009-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-sap-se-sap-supplier-relationship-management-live-auction-cockpit-bd64a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30009%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Supplier%20Relationship%20Management%20(Live%20Auction%20Cockpit)&amp;severity=medium&amp;id=682d9815c4522896dcbd64a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26662-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-sap-se-sap-data-services-management-console-bd6498</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26662%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20Data%20Services%20Management%20Console&amp;severity=medium&amp;id=682d9815c4522896dcbd6498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rdpguard-999-privilege-escalation-3a85e6dc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RDPGuard%209.9.9%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489df07e6d765d51d5386f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kentico-xperience-130178-cross-site-scripting-xss-4d379797</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kentico%20Xperience%2013.0.178%20-%20Cross%20Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68489dea7e6d765d51d5379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-frontend-login-and-registration-blocks-p-5141b3c8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Frontend%20Login%20and%20Registration%20Blocks%20Plugin%201.0.7%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489de47e6d765d51d536e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tp-link-vn020-f3vt-ttv621021-dhcp-stack-buffer-ove-94954b0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TP-Link%20VN020%20F3v(T)%20TT_V6.2.1021)%20-%20DHCP%20Stack%20Buffer%20Overflow&amp;severity=medium&amp;id=68489dde7e6d765d51d53612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44039-n-a-in-n-a-bd6097</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44039%3A%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd6097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45858-n-a-in-n-a-bd5f0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45858%3A%20n%2Fa&amp;severity=critical&amp;id=682d9815c4522896dcbd5f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46506-cwe-306-missing-authentication-for-critical-function-in-netalertx-netalertx-aecc89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46506%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20NetAlertX%20NetAlertX&amp;severity=critical&amp;id=682cd0fc1484d88663aecc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48766-cwe-698-execution-after-redirect-ear-in-netalertx-netalertx-aecc15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48766%3A%20CWE-698%20Execution%20After%20Redirect%20(EAR)%20in%20NetAlertX%20NetAlertX&amp;severity=high&amp;id=682cd0fc1484d88663aecc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45865-n-a-in-n-a-aecb1d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45865%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45863-n-a-in-n-a-aecb1b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45863%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45746-n-a-in-n-a-aecb19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45746%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20ZKTeco%20ZKBio%20CVSecurity&amp;severity=medium&amp;id=682cd0fc1484d88663aecb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47204-n-a-in-n-a-aecaf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47204%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45861-n-a-in-n-a-aecaee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45861%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45857-n-a-in-n-a-aecaec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45857%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fc1484d88663aecaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28056-n-a-in-n-a-aecab2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28056%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aecab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28055-n-a-in-n-a-aecab0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28055%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aecab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56526-n-a-in-n-a-aeca93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56526%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aeca93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44831-n-a-in-n-a-aeca82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44831%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aeca82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28057-n-a-in-n-a-aeca7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28057%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aeca7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45867-n-a-in-n-a-aeca02</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45867%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45866-n-a-in-n-a-aeca00</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45866%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45864-n-a-in-n-a-aec9fe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45864%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45859-n-a-in-n-a-aec9fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45859%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47905-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-in-varnish-software-varnish-cache-aec434</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47905%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20varnish-software%20Varnish%20Cache&amp;severity=medium&amp;id=682cd0fa1484d88663aec434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-13-2a0298</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-13&amp;severity=medium&amp;id=682c7db1e8347ec82d2a0298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-13-f127c1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f127c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49641-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kashipara-group-billing-software-bd6490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49641%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Billing%20Software&amp;severity=critical&amp;id=682d9815c4522896dcbd6490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46825-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kanboard-kanboard-bd6508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46825%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kanboard%20kanboard&amp;severity=low&amp;id=682d9815c4522896dcbd6508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31220-a-malicious-app-may-be-able-to-read-sensitive-location-information-in-apple-macos-bd6320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31220%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=682d9815c4522896dcbd6320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24258-an-app-may-be-able-to-gain-root-privileges-in-apple-macos-bd6318</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24258%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9815c4522896dcbd6318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31236-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aec9f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31236%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24223-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-bd63fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24223%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682d9815c4522896dcbd63fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24274-a-malicious-app-may-be-able-to-gain-root-privileges-in-apple-macos-aecbb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24274%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31241-a-remote-attacker-may-cause-an-unexpected-app-termination-in-apple-tvos-bd632f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31241%3A%20A%20remote%20attacker%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9815c4522896dcbd632f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31257-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-safari-crash-in-apple-tvos-bd6337</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31257%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682d9815c4522896dcbd6337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31256-hot-corner-may-unexpectedly-reveal-a-user-s-deleted-notes-in-apple-macos-aec9fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31256%3A%20Hot%20corner%20may%20unexpectedly%20reveal%20a%20user%E2%80%99s%20deleted%20notes%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24111-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-visionos-aec9e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24111%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31217-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-safari-crash-in-apple-tvos-aec9f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31217%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fb1484d88663aec9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31240-mounting-a-maliciously-crafted-afp-network-share-may-lead-to-system-termination-in-apple-macos-aecbd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31240%3A%20Mounting%20a%20maliciously%20crafted%20AFP%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24222-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-process-crash-in-apple-macos-aec9f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24222%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31237-mounting-a-maliciously-crafted-afp-network-share-may-lead-to-system-termination-in-apple-macos-aecc0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31237%3A%20Mounting%20a%20maliciously%20crafted%20AFP%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31260-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aec9df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31260%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31221-a-remote-attacker-may-be-able-to-leak-memory-in-apple-tvos-aec9db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31221%3A%20A%20remote%20attacker%20may%20be%20able%20to%20leak%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31247-an-attacker-may-gain-access-to-protected-parts-of-the-file-system-in-apple-macos-aecc13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31247%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31210-processing-web-content-may-lead-to-a-denial-of-service-in-apple-ipados-aec9d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31210%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31206-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-safari-crash-in-apple-tvos-aecc0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31206%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fc1484d88663aecc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30440-an-app-may-be-able-to-bypass-aslr-in-apple-macos-aeca7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30440%3A%20An%20app%20may%20be%20able%20to%20bypass%20ASLR%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31251-processing-a-maliciously-crafted-media-file-may-lead-to-unexpected-app-termination-or-corrupt-process-memory-in-apple-tvos-aeca61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31251%3A%20Processing%20a%20maliciously%20crafted%20media%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31226-processing-a-maliciously-crafted-image-may-lead-to-a-denial-of-service-in-apple-tvos-aeca5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31226%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24225-processing-an-email-may-lead-to-user-interface-spoofing-in-apple-ipados-aeca5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24225%3A%20Processing%20an%20email%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31227-an-attacker-with-physical-access-to-a-device-may-be-able-to-access-a-deleted-call-recording-in-apple-ios-and-ipados-aeca5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31227%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20access%20a%20deleted%20call%20recording%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aeca5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30436-an-attacker-may-be-able-to-use-siri-to-enable-auto-answer-calls-in-apple-ios-and-ipados-aec90a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30436%3A%20An%20attacker%20may%20be%20able%20to%20use%20Siri%20to%20enable%20Auto-Answer%20Calls%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31196-processing-a-maliciously-crafted-file-may-lead-to-a-denial-of-service-or-potentially-disclose-memory-contents-in-apple-ipados-aecc09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31196%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31250-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecb0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31250%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31207-an-app-may-be-able-to-enumerate-a-user-s-installed-apps-in-apple-ios-and-ipados-aec99b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31207%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31246-connecting-to-a-malicious-afp-server-may-corrupt-kernel-memory-in-apple-macos-aecb70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31246%3A%20Connecting%20to%20a%20malicious%20AFP%20server%20may%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31195-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-aecafe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31195%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31253-muting-the-microphone-during-a-facetime-call-may-not-result-in-audio-being-silenced-in-apple-ios-and-ipados-aec946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31253%3A%20Muting%20the%20microphone%20during%20a%20FaceTime%20call%20may%20not%20result%20in%20audio%20being%20silenced%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30442-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-aecb53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30442%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31204-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-aecbd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31204%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0fc1484d88663aecbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24155-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-aecafa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24155%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31212-an-app-may-be-able-to-access-sensitive-user-data-in-apple-tvos-aec9d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31212%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31245-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-tvos-aec9dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31245%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31228-an-attacker-with-physical-access-to-a-device-may-be-able-to-access-notes-from-the-lock-screen-in-apple-ipados-aecc2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31228%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20access%20notes%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31208-parsing-a-file-may-lead-to-an-unexpected-app-termination-in-apple-tvos-aecc41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31208%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31249-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecc66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31249%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31232-a-sandboxed-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecc8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31232%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31224-an-app-may-be-able-to-bypass-certain-privacy-preferences-in-apple-macos-aecb5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31224%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31225-call-history-from-deleted-apps-may-still-appear-in-spotlight-search-results-in-apple-ios-and-ipados-aecc8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31225%3A%20Call%20history%20from%20deleted%20apps%20may%20still%20appear%20in%20spotlight%20search%20results%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fc1484d88663aecc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31233-processing-a-maliciously-crafted-video-file-may-lead-to-unexpected-app-termination-or-corrupt-process-memory-in-apple-tvos-aeccba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31233%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aeccba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31209-parsing-a-file-may-lead-to-disclosure-of-user-information-in-apple-tvos-bd5ef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31209%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9815c4522896dcbd5ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31244-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-aecb68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31244%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31213-an-app-may-be-able-to-access-associated-usernames-and-websites-in-a-user-s-icloud-keychain-in-apple-macos-bd5f8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31213%3A%20An%20app%20may%20be%20able%20to%20access%20associated%20usernames%20and%20websites%20in%20a%20user&apos;s%20iCloud%20Keychain%20in%20Apple%20iPadOS&amp;severity=high&amp;id=682d9815c4522896dcbd5f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24142-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aec908</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24142%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31205-a-malicious-website-may-exfiltrate-data-cross-origin-in-apple-tvos-bd6091</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31205%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=682d9815c4522896dcbd6091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31259-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-aecb6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31259%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20screenshot%20of%20an%20app%20entering%20or%20exiting%20full%20screen%20mode%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30448-an-attacker-may-be-able-to-turn-on-sharing-of-an-icloud-folder-without-authentication-in-apple-ipados-aec902</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30448%3A%20An%20attacker%20may%20be%20able%20to%20turn%20on%20sharing%20of%20an%20iCloud%20folder%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31218-an-app-may-be-able-to-observe-the-hostnames-of-new-network-connections-in-apple-macos-aec873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31218%3A%20An%20app%20may%20be%20able%20to%20observe%20the%20hostnames%20of%20new%20network%20connections%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31234-an-attacker-may-be-able-to-cause-unexpected-system-termination-or-corrupt-kernel-memory-in-apple-tvos-aec74a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31234%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31222-a-user-may-be-able-to-elevate-privileges-in-apple-tvos-aecb57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31222%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31214-an-attacker-in-a-privileged-network-position-may-be-able-to-intercept-network-traffic-in-apple-ios-and-ipados-aec752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31214%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fb1484d88663aec752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31238-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-aeca19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31238%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0fb1484d88663aeca19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31239-parsing-a-file-may-lead-to-an-unexpected-app-termination-in-apple-tvos-bd65af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31239%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9816c4522896dcbd65af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31242-an-app-may-be-able-to-access-sensitive-user-data-in-apple-macos-aecb0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31242%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30453-a-malicious-app-may-be-able-to-gain-root-privileges-in-apple-macos-aecb55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30453%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682cd0fc1484d88663aecb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31215-processing-maliciously-crafted-web-content-may-lead-to-an-unexpected-process-crash-in-apple-tvos-aec76f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31215%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fb1484d88663aec76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24144-an-app-may-be-able-to-leak-sensitive-kernel-state-in-apple-visionos-aec76d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24144%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31223-processing-maliciously-crafted-web-content-may-lead-to-memory-corruption-in-apple-tvos-aecb59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31223%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682cd0fc1484d88663aecb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31235-an-app-may-be-able-to-cause-unexpected-system-termination-in-apple-macos-bd65ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31235%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=682d9816c4522896dcbd65ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24220-an-app-may-be-able-to-read-a-persistent-device-identifier-in-apple-ios-and-ipados-aeae5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24220%3A%20An%20app%20may%20be%20able%20to%20read%20a%20persistent%20device%20identifier%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682cd0f71484d88663aeae5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31219-an-attacker-may-be-able-to-cause-unexpected-system-termination-or-corrupt-kernel-memory-in-apple-tvos-bd5f92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31219%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d9815c4522896dcbd5f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31258-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-aecb6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31258%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3659-cwe-287-improper-authentication-in-digi-international-digi-portserver-ts-bd67d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3659%3A%20CWE-287%20Improper%20Authentication%20in%20Digi%20International%20Digi%20PortServer%20TS&amp;severity=critical&amp;id=682d9816c4522896dcbd67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1079-cwe-61-in-google-web-designer-bd683a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1079%3A%20CWE-61%20in%20Google%20Web%20Designer&amp;severity=high&amp;id=682d9816c4522896dcbd683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4982-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-bd68d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4982%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=682d9816c4522896dcbd68d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4981-files-or-directories-accessible-to-external-parties-bd68dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4981%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties&amp;severity=high&amp;id=682d9816c4522896dcbd68dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeting-taiwan-japan-with-dll-implants-16ac58</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeting%20Taiwan%20%26%20Japan%20with%20DLL%20Implants&amp;severity=medium&amp;id=682c99307960f6956616ac58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47682-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-cozy-vision-technologies-pvt-ltd-sms-alert-order-notifications-woocommerce-bd69d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47682%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=null&amp;id=682d9816c4522896dcbd69d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-noodlophile-stealer-distributes-via-fake-ai-vi-aa04d953</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Noodlophile%20Stealer%20Distributes%20Via%20Fake%20AI%20Video%20Generation%20Platforms&amp;severity=medium&amp;id=6849b82723110031d4104fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3632-cwe-789-uncontrolled-memory-allocation-in-ibm-4769-developers-toolkit-bd6b58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3632%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%204769%20Developers%20Toolkit&amp;severity=high&amp;id=682d9816c4522896dcbd6b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46743-cwe-352-cross-site-request-forgery-csrf-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6b3b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46743%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46750-cwe-305-in-schweitzer-engineering-laboratories-sel-3350-1-bd6b3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46750%3A%20CWE-305%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-3350-1&amp;severity=medium&amp;id=682d9816c4522896dcbd6b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46749-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6b1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46748-cwe-620-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6b12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46748%3A%20CWE-620%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=low&amp;id=682d9816c4522896dcbd6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46747-cwe-497-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6ad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46747%3A%20CWE-497%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46746-cwe-209-generation-of-error-message-containing-sensitive-information-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46746%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46745-cwe-269-improper-privilege-management-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6ab5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46745%3A%20CWE-862%20Missing%20Authorization%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46744-cwe-269-improper-privilege-management-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6aa6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46744%3A%20CWE-863%20Incorrect%20Authorization%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=low&amp;id=682d9816c4522896dcbd6aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46742-cwe-284-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46742%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46741-cwe-269-improper-privilege-management-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a81</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46741%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46740-cwe-280-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46740%3A%20CWE-280%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=high&amp;id=682d9816c4522896dcbd6a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46739-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-schweitzer-engineering-laboratories-sel-blueframe-os-bd6a60</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46739%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Schweitzer%20Engineering%20Laboratories%20SEL%20Blueframe%20OS&amp;severity=high&amp;id=682d9816c4522896dcbd6a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46738-cwe-502-in-schweitzer-engineering-laboratories-sel-5033-acselerator-rtac-software-bd6a5c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46738%3A%20CWE-502%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5033%20acSELerator%20RTAC%20Software&amp;severity=medium&amp;id=682d9816c4522896dcbd6a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46737-cwe-346-origin-validation-error-in-schweitzer-engineering-laboratories-sel-5037-grid-configurator-bd6a58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46737%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-5037%20Grid%20Configurator&amp;severity=high&amp;id=682d9816c4522896dcbd6a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47578-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-edward-caissie-bns-twitter-follow-button-bd6a6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Edward%20Caissie%20BNS%20Twitter%20Follow%20Button&amp;severity=null&amp;id=682d9816c4522896dcbd6a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47274-cwe-311-missing-encryption-of-sensitive-data-in-stacklok-toolhive-bd681d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47274%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20stacklok%20toolhive&amp;severity=low&amp;id=682d9816c4522896dcbd681d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46718-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-trifectatechfoundation-sudo-rs-bd6819</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46718%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=682d9816c4522896dcbd6819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46717-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-trifectatechfoundation-sudo-rs-bd6815</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46717%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20trifectatechfoundation%20sudo-rs&amp;severity=low&amp;id=682d9816c4522896dcbd6815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40627-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-abantecart-abantecart-bd6966</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AbanteCart%20AbanteCart&amp;severity=medium&amp;id=682d9816c4522896dcbd6966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40626-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-abantecart-abantecart-bd7121</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20AbanteCart%20AbanteCart&amp;severity=medium&amp;id=682d9817c4522896dcbd7121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47271-cwe-94-improper-control-of-generation-of-code-code-injection-in-ozi-project-publish-bd7166</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47271%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OZI-Project%20publish&amp;severity=medium&amp;id=682d9817c4522896dcbd7166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47270-cwe-400-uncontrolled-resource-consumption-in-nimiq-core-rs-albatross-bd7162</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47270%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nimiq%20core-rs-albatross&amp;severity=high&amp;id=682d9817c4522896dcbd7162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22247-cwe-59-improper-link-resolution-before-file-access-link-following-in-vmware-tools-aec8fc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22247%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20VMware%20Tools&amp;severity=medium&amp;id=682cd0fb1484d88663aec8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46729-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-julmud-phpdvdprofiler-bd7145</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46729%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20julmud%20phpDVDProfiler&amp;severity=low&amp;id=682d9817c4522896dcbd7145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32390-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-espocrm-espocrm-bd711d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32390%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20espocrm%20espocrm&amp;severity=high&amp;id=682d9817c4522896dcbd711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1533-cwe-121-stack-based-buffer-overflow-in-asus-armoury-crate-bd6fee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1533%3A%20CWE-121%20-%20Stack-based%20Buffer%20Overflow%20in%20ASUS%20Armoury%20Crate&amp;severity=high&amp;id=682d9817c4522896dcbd6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41393-cross-site-scripting-xss-in-ricoh-company-ltd-the-specific-versions-of-laser-printers-and-mfps-which-implement-web-image-monitor-bd700b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41393%3A%20Cross-site%20scripting%20(XSS)%20in%20Ricoh%20Company%2C%20Ltd.%20Multiple%20laser%20printers%20and%20MFPs%20which%20implement%20Web%20Image%20Monitor&amp;severity=medium&amp;id=682d9817c4522896dcbd700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3496-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-auma-riester-ac1-2-aebf2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3496%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Auma%20Riester%20AC1.2&amp;severity=high&amp;id=682cd0fa1484d88663aebf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4561-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-kinfor-kfox-bd6fc9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4561%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Kinfor%20KFOX&amp;severity=high&amp;id=682d9817c4522896dcbd6fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4560-cwe-306-missing-authentication-for-critical-function-in-netvision-isoinsight-bd6fba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4560%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Netvision%20ISOinsight&amp;severity=medium&amp;id=682d9817c4522896dcbd6fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4559-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-netvision-isoinsight-bd6e4f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4559%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Netvision%20ISOinsight&amp;severity=critical&amp;id=682d9816c4522896dcbd6e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3649-cwe-79-cross-site-scripting-xss-in-unknown-lightpress-lightbox-bd6b6b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3649%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20LightPress%20Lightbox&amp;severity=medium&amp;id=682d9816c4522896dcbd6b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3597-cwe-79-cross-site-scripting-xss-in-unknown-firelight-lightbox-bd6b37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3597%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Firelight%20Lightbox&amp;severity=medium&amp;id=682d9816c4522896dcbd6b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4558-cwe-620-unverified-password-change-in-wormhole-tech-gpm-bd6b33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4558%3A%20CWE-620%20Unverified%20Password%20Change%20in%20WormHole%20Tech%20GPM&amp;severity=critical&amp;id=682d9816c4522896dcbd6b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4557-cwe-306-missing-authentication-for-critical-function-in-zong-yu-parking-management-system-bd6b0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4557%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZONG%20YU%20Parking%20Management%20System&amp;severity=critical&amp;id=682d9816c4522896dcbd6b0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4556-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-zong-yu-okcat-parking-management-platform-bd6b0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4556%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ZONG%20YU%20Okcat%20Parking%20Management%20Platform&amp;severity=critical&amp;id=682d9816c4522896dcbd6b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4555-cwe-306-missing-authentication-for-critical-function-in-zong-yu-okcat-parking-management-platform-bd6f4b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4555%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ZONG%20YU%20Okcat%20Parking%20Management%20Platform&amp;severity=critical&amp;id=682d9816c4522896dcbd6f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4554-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6f47</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4554%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4553-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6ea9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4553%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46611-n-a-in-n-a-bd6811</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46611%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46610-n-a-in-n-a-bd67f6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46610%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd67f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45835-n-a-in-n-a-bd67ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45835%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd67ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45779-n-a-in-n-a-bd67ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45779%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44830-n-a-in-n-a-bd67e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44830%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44022-n-a-in-n-a-bd67d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44022%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26846-n-a-in-n-a-bd67bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26846%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26841-n-a-in-n-a-bd67b4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26841%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd67b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56524-n-a-in-n-a-bd6799</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56524%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56523-n-a-in-n-a-bd6795</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56523%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55466-n-a-in-n-a-bd601f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55466%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd601f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44175-n-a-in-n-a-bd5fd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44175%3A%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd5fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34732-n-a-in-n-a-bd5fc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34732%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd5fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44176-n-a-in-n-a-bd5fb4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44176%3A%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd5fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-12-29f867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-12&amp;severity=medium&amp;id=682c7db1e8347ec82d29f867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-12-f12dc5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-brief-cve-2025-31324-f0c546</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Brief%3A%20CVE-2025-31324&amp;severity=low&amp;id=682acdbebbaf20d303f0c546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4552-unverified-password-change-in-continew-admin-bd6e40</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4552%3A%20Unverified%20Password%20Change%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=682d9816c4522896dcbd6e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4551-cross-site-scripting-in-continew-admin-bd6e3a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4551%3A%20Cross%20Site%20Scripting%20in%20ContiNew%20Admin&amp;severity=medium&amp;id=682d9816c4522896dcbd6e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4550-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6e36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4550%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4549-sql-injection-in-campcodes-online-food-ordering-system-bd694f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4549%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4548-sql-injection-in-campcodes-online-food-ordering-system-bd694b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4548%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd694b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4547-cross-site-scripting-in-sourcecodester-web-based-pharmacy-product-management-system-bd6947</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4547%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4546-csv-injection-in-1panel-dev-maxkb-bd6936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4546%3A%20CSV%20Injection%20in%201Panel-dev%20MaxKB&amp;severity=medium&amp;id=682d9816c4522896dcbd6936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4545-path-traversal-in-ctcms-content-management-system-bd692e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4545%3A%20Path%20Traversal%20in%20CTCMS%20Content%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd692e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4544-stack-based-buffer-overflow-in-d-link-di-8100-bd691e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4544%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DI-8100&amp;severity=high&amp;id=682d9816c4522896dcbd691e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brief-disruptions-bold-claims-the-tactical-reality-a4278ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brief%20Disruptions%2C%20Bold%20Claims%3A%20The%20Tactical%20Reality%20Behind%20the%20India-Pakistan%20Hacktivist%20Surge&amp;severity=medium&amp;id=6848765e813f166aeb362442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4543-sql-injection-in-lylme-spage-bd715e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4543%3A%20SQL%20Injection%20in%20LyLme%20Spage&amp;severity=medium&amp;id=682d9817c4522896dcbd715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4542-permissive-cross-domain-policy-with-untrusted-domains-in-freeebird-hotel-api-bd7151</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4542%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Freeebird%20Hotel%20%E9%85%92%E5%BA%97%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20API&amp;severity=low&amp;id=682d9817c4522896dcbd7151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4541-sql-injection-in-lmxcms-bd714d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4541%3A%20SQL%20Injection%20in%20LmxCMS&amp;severity=medium&amp;id=682d9817c4522896dcbd714d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4540-unquoted-search-path-in-mtsoftware-c-lodop-bd7149</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4540%3A%20Unquoted%20Search%20Path%20in%20MTSoftware%20C-Lodop&amp;severity=high&amp;id=682d9817c4522896dcbd7149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4539-uncontrolled-search-path-in-hainan-todesk-bd70c3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4539%3A%20Uncontrolled%20Search%20Path%20in%20Hainan%20ToDesk&amp;severity=high&amp;id=682d9817c4522896dcbd70c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4538-unrestricted-upload-in-kkfileview-bd70bf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4538%3A%20Unrestricted%20Upload%20in%20kkFileView&amp;severity=medium&amp;id=682d9817c4522896dcbd70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4537-cleartext-storage-of-sensitive-information-in-a-cookie-in-yangzongzhuan-ruoyi-vue-bd70bb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4537%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20a%20Cookie%20in%20yangzongzhuan%20RuoYi-Vue&amp;severity=low&amp;id=682d9817c4522896dcbd70bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4536-information-disclosure-in-gosuncn-technology-group-audio-visual-integrated-management-platform-bd7034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4536%3A%20Information%20Disclosure%20in%20Gosuncn%20Technology%20Group%20Audio-Visual%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4535-information-disclosure-in-gosuncn-technology-group-audio-visual-integrated-management-platform-bd7030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4535%3A%20Information%20Disclosure%20in%20Gosuncn%20Technology%20Group%20Audio-Visual%20Integrated%20Management%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4534-weak-password-requirements-in-sungrow-logger1000-bd7105</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4534%3A%20Weak%20Password%20Requirements%20in%20SunGrow%20Logger1000&amp;severity=medium&amp;id=682d9817c4522896dcbd7105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4533-resource-consumption-in-jeecgboot-bd7101</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4533%3A%20Resource%20Consumption%20in%20JeecgBoot&amp;severity=medium&amp;id=682d9817c4522896dcbd7101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4532-uncontrolled-search-path-in-shanghai-bairui-information-technology-sunloginclient-bd70fd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4532%3A%20Uncontrolled%20Search%20Path%20in%20Shanghai%20Bairui%20Information%20Technology%20SunloginClient&amp;severity=high&amp;id=682d9817c4522896dcbd70fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4531-code-injection-in-seeyon-zhiyuan-oa-web-application-system-bd70e8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4531%3A%20Code%20Injection%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd70e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/additional-features-of-ottercookie-malware-used-by-f9e7fd97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Additional%20Features%20of%20OtterCookie%20Malware%20Used%20by%20WaterPlum&amp;severity=medium&amp;id=6847be78bab8eb36fc32ecf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4530-path-traversal-in-feng-ha-ha-ssm-erp-bd70db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4530%3A%20Path%20Traversal%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=682d9817c4522896dcbd70db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4529-path-traversal-in-seeyon-zhiyuan-oa-web-application-system-bd70d7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4529%3A%20Path%20Traversal%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd70d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4528-session-expiration-in-d-gitro-ngc-explorer-bd6fb6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4528%3A%20Session%20Expiration%20in%20D%C3%ADgitro%20NGC%20Explorer&amp;severity=medium&amp;id=682d9817c4522896dcbd6fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4527-client-side-enforcement-of-server-side-security-in-d-gitro-ngc-explorer-bd6fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4527%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20D%C3%ADgitro%20NGC%20Explorer&amp;severity=medium&amp;id=682d9817c4522896dcbd6fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4526-missing-password-field-masking-in-d-gitro-ngc-explorer-bd6f80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4526%3A%20Missing%20Password%20Field%20Masking%20in%20D%C3%ADgitro%20NGC%20Explorer&amp;severity=medium&amp;id=682d9817c4522896dcbd6f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47828-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-lumi-h5p-nodejs-library-bd6f63</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47828%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Lumi%20H5P-Nodejs-library&amp;severity=medium&amp;id=682d9817c4522896dcbd6f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-11-29ed51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-11&amp;severity=medium&amp;id=682c7db1e8347ec82d29ed51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-11-f12bf0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4525-uncontrolled-search-path-in-discord-bd6f7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4525%3A%20Uncontrolled%20Search%20Path%20in%20Discord&amp;severity=high&amp;id=682d9817c4522896dcbd6f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4515-permissive-cross-domain-policy-with-untrusted-domains-in-zylon-privategpt-bd6f78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4515%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Zylon%20PrivateGPT&amp;severity=medium&amp;id=682d9817c4522896dcbd6f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4514-sql-injection-in-zhengzhou-jiuhua-electronic-technology-mayicms-bd6f74</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4514%3A%20SQL%20Injection%20in%20Zhengzhou%20Jiuhua%20Electronic%20Technology%20mayicms&amp;severity=medium&amp;id=682d9817c4522896dcbd6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4513-open-redirect-in-catalyst-user-key-authentication-plugin-bd702e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4513%3A%20Open%20Redirect%20in%20Catalyst%20User%20Key%20Authentication%20Plugin&amp;severity=medium&amp;id=682d9817c4522896dcbd702e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4512-cross-site-scripting-in-inetum-iodas-bd702a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4512%3A%20Cross%20Site%20Scripting%20in%20Inetum%20IODAS&amp;severity=medium&amp;id=682d9817c4522896dcbd702a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4511-path-traversal-in-vector4wang-spring-boot-quick-bd701b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4511%3A%20Path%20Traversal%20in%20vector4wang%20spring-boot-quick&amp;severity=medium&amp;id=682d9817c4522896dcbd701b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4510-sql-injection-in-changjietong-ufida-crm-bd70d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4510%3A%20SQL%20Injection%20in%20Changjietong%20UFIDA%20CRM&amp;severity=medium&amp;id=682d9817c4522896dcbd70d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4509-sql-injection-in-phpgurukul-e-diary-management-system-bd6ea3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4509%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4508-sql-injection-in-phpgurukul-e-diary-management-system-bd6e9f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4508%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4507-sql-injection-in-campcodes-online-food-ordering-system-bd6e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4507%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4506-sql-injection-in-campcodes-online-food-ordering-system-bd6b2f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4506%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4505-sql-injection-in-phpgurukul-apartment-visitors-management-system-bd6b2b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4505%3A%20SQL%20Injection%20in%20PHPGurukul%20Apartment%20Visitors%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4504-sql-injection-in-sourcecodester-online-college-library-system-bd6ae6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4504%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20College%20Library%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53145-vulnerability-in-linux-linux-bd7191</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4503-sql-injection-in-campcodes-sales-and-inventory-system-bd7013</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4503%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4502-sql-injection-in-campcodes-sales-and-inventory-system-bd6adc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4502%3A%20SQL%20Injection%20in%20Campcodes%20Sales%20and%20Inventory%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1752-cwe-400-uncontrolled-resource-consumption-in-run-llama-run-llama-llama-index-bd6abd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1752%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=682d9816c4522896dcbd6abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4501-stack-based-buffer-overflow-in-code-projects-album-management-system-bd6832</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4501%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Album%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4500-stack-based-buffer-overflow-in-code-projects-hotel-management-system-bd6825</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4500%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Hotel%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4499-stack-based-buffer-overflow-in-code-projects-simple-hospital-management-system-bd6821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4499%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20Hospital%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3878-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cozyvision1-sms-alert-order-notifications-woocommerce-bd7119</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozyvision1%20SMS%20Alert%20Order%20Notifications%20%E2%80%93%20WooCommerce&amp;severity=medium&amp;id=682d9817c4522896dcbd7119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3876-cwe-862-missing-authorization-in-cozyvision1-sms-alert-order-notifications-woocommerce-bd7115</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3876%3A%20CWE-862%20Missing%20Authorization%20in%20cozyvision1%20SMS%20Alert%20Order%20Notifications%20%E2%80%93%20WooCommerce&amp;severity=high&amp;id=682d9817c4522896dcbd7115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4498-stack-based-buffer-overflow-in-code-projects-simple-bus-reservation-system-bd6ab9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4498%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20Bus%20Reservation%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2158-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-mythemeshop-wordpress-review-plugin-the-ultimate-solution-for-building-a-review-website-bd710d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2158%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mythemeshop%20WordPress%20Review%20Plugin%3A%20The%20Ultimate%20Solution%20for%20Building%20a%20Review%20Website&amp;severity=high&amp;id=682d9817c4522896dcbd710d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4497-buffer-overflow-in-code-projects-simple-banking-system-bd6a71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4497%3A%20Buffer%20Overflow%20in%20code-projects%20Simple%20Banking%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2944-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jegtheme-jeg-elementor-kit-bd7111</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=682d9817c4522896dcbd7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4496-buffer-overflow-in-totolink-t10-bd68c7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4496%3A%20Buffer%20Overflow%20in%20TOTOLINK%20T10&amp;severity=high&amp;id=682d9816c4522896dcbd68c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1137-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-ibm-storage-scale-bd66fc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1137%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Storage%20Scale&amp;severity=high&amp;id=682d9816c4522896dcbd66fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4495-cross-site-scripting-in-jadmin-java-jadmin-bd731a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4495%3A%20Cross%20Site%20Scripting%20in%20JAdmin-JAVA%20JAdmin&amp;severity=medium&amp;id=682d9817c4522896dcbd731a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47817-cwe-472-external-control-of-assumed-immutable-web-parameter-in-bluewave-checkmate-bd68f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47817%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20BlueWave%20Checkmate&amp;severity=high&amp;id=682d9816c4522896dcbd68f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47816-cwe-125-out-of-bounds-read-in-gnu-pspp-bd68f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47816%3A%20CWE-125%20Out-of-bounds%20Read%20in%20GNU%20PSPP&amp;severity=low&amp;id=682d9816c4522896dcbd68f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47815-cwe-122-heap-based-buffer-overflow-in-gnu-pspp-bd68ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47815%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20GNU%20PSPP&amp;severity=medium&amp;id=682d9816c4522896dcbd68ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47814-cwe-122-heap-based-buffer-overflow-in-gnu-pspp-bd6412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47814%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20GNU%20PSPP&amp;severity=medium&amp;id=682d9815c4522896dcbd6412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-10-2a1169</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-10&amp;severity=medium&amp;id=682c7db2e8347ec82d2a1169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-10-f12b1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3794-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-smub-wpforms-easy-form-builder-for-wordpress-contact-forms-payment-forms-surveys-more-bd7316</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20WPForms%20%E2%80%93%20Easy%20Form%20Builder%20for%20WordPress%20%E2%80%93%20Contact%20Forms%2C%20Payment%20Forms%2C%20Surveys%2C%20%26%20More&amp;severity=medium&amp;id=682d9817c4522896dcbd7316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4494-improper-authentication-in-jadmin-java-jadmin-bd7312</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4494%3A%20Improper%20Authentication%20in%20JAdmin-JAVA%20JAdmin&amp;severity=medium&amp;id=682d9817c4522896dcbd7312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4492-sql-injection-in-campcodes-online-food-ordering-system-bd7305</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4492%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4491-sql-injection-in-campcodes-online-food-ordering-system-bd7301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4491%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4490-sql-injection-in-campcodes-online-food-ordering-system-bd72ee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4490%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd72ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47269-cwe-441-unintended-proxy-or-intermediary-confused-deputy-in-coder-code-server-bd72de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47269%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20coder%20code-server&amp;severity=high&amp;id=682d9817c4522896dcbd72de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4447-cwe-121-stack-based-buffer-overflow-in-eclipse-foundation-openj9-bd72e2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4447%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Eclipse%20Foundation%20OpenJ9&amp;severity=high&amp;id=682d9817c4522896dcbd72e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4489-sql-injection-in-campcodes-online-food-ordering-system-bd72ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4489%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Food%20Ordering%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd72ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4488-sql-injection-in-itsourcecode-gym-management-system-bd72e6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4488%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd72e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4487-sql-injection-in-itsourcecode-gym-management-system-bd68c3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4487%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd68c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4486-sql-injection-in-itsourcecode-gym-management-system-bd68bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4486%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd68bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4485-sql-injection-in-itsourcecode-gym-management-system-bd74af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4485%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd74af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4484-sql-injection-in-itsourcecode-gym-management-system-bd74ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4484%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd74ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4483-sql-injection-in-itsourcecode-gym-management-system-bd7454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4483%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4482-sql-injection-in-project-worlds-student-project-allocation-system-bd7433</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4482%3A%20SQL%20Injection%20in%20Project%20Worlds%20Student%20Project%20Allocation%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1993-cwe-521-weak-password-requirements-in-ibm-app-connect-enterprise-certified-container-bd7412</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1993%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20App%20Connect%20Enterprise%20Certified%20Container&amp;severity=medium&amp;id=682d9817c4522896dcbd7412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4481-sql-injection-in-sourcecodester-apartment-visitor-management-system-bd73f3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4481%3A%20SQL%20Injection%20in%20SourceCodester%20Apartment%20Visitor%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd73f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4480-stack-based-buffer-overflow-in-code-projects-simple-college-management-system-bd73e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4480%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20College%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd73e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8973-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-bd73da</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8973%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9817c4522896dcbd73da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0549-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-gitlab-gitlab-bd73ca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0549%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9817c4522896dcbd73ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1278-cwe-1220-insufficient-granularity-of-access-control-in-gitlab-gitlab-bd739a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1278%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9817c4522896dcbd739a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4432-allocation-of-resources-without-limits-or-throttling-in-red-hat-red-hat-enterprise-linux-6-bd773e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4432%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=682d9817c4522896dcbd773e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9524-cwe-59-improper-link-resolution-before-file-access-link-following-in-aira-prime-bd76e3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9524%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Aira%20Prime&amp;severity=high&amp;id=682d9817c4522896dcbd76e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13962-cwe-59-improper-link-resolution-before-file-access-link-following-in-avast-cleanup-premium-bd76d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13962%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20CleanUp%20Premium&amp;severity=low&amp;id=682d9817c4522896dcbd76d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13961-cwe-59-improper-link-resolution-before-file-access-link-following-in-avast-cleanup-premium-bd769f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13961%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20CleanUp%20Premium&amp;severity=low&amp;id=682d9817c4522896dcbd769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13960-cwe-59-improper-link-resolution-before-file-access-link-following-in-avg-tuneup-bd7508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13960%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20TuneUp&amp;severity=high&amp;id=682d9817c4522896dcbd7508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13959-cwe-59-improper-link-resolution-before-file-access-link-following-in-avg-tuneup-bd74e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13959%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20TuneUp&amp;severity=high&amp;id=682d9817c4522896dcbd74e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13759-cwe-59-improper-link-resolution-before-file-access-link-following-in-avira-prime-bd74e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13759%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avira%20Prime&amp;severity=high&amp;id=682d9817c4522896dcbd74e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13944-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-norton-norton-utilities-ultimate-bd74a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13944%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Norton%20Norton%20Utilities%20Ultimate&amp;severity=high&amp;id=682d9817c4522896dcbd74a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stealthy-net-malware-hiding-malicious-payloads-as--732edecc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stealthy%20.NET%20Malware%3A%20Hiding%20Malicious%20Payloads%20as%20Bitmap%20Resources&amp;severity=medium&amp;id=684597ec71f4d251b55363c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12442-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-enersys-ampa-bd6439</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12442%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20EnerSys%20AMPA&amp;severity=critical&amp;id=682d9815c4522896dcbd6439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11861-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-enersys-ampa-bd6786</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11861%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20EnerSys%20AMPA&amp;severity=critical&amp;id=682d9816c4522896dcbd6786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4382-missing-authentication-for-critical-function-in-red-hat-red-hat-enterprise-linux-7-bd7b14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4382%3A%20Missing%20Authentication%20for%20Critical%20Function&amp;severity=medium&amp;id=682d9818c4522896dcbd7b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thewizards-apt-group-uses-slaac-spoofing-to-perfor-132403a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TheWizards%20APT%20group%20uses%20SLAAC%20spoofing%20to%20perform%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=684570fc71f4d251b54b20e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3528-incorrect-default-permissions-in-red-hat-mirror-registry-for-red-hat-openshift-bd7a5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3528%3A%20Incorrect%20Default%20Permissions&amp;severity=high&amp;id=682d9818c4522896dcbd7a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1087-cwe-20-improper-input-validation-in-kong-inc-insomnia-bd7a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1087%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Kong%20Inc.%20Insomnia&amp;severity=critical&amp;id=682d9817c4522896dcbd7a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3897-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-diego-la-monica-eucookielaw-bd79bd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20diego-la-monica%20EUCookieLaw&amp;severity=medium&amp;id=682d9817c4522896dcbd79bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4206-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-trainingbusinesspros-wordpress-crm-email-marketing-automation-for-wordpress-award-winner-groundhogg-bd779b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4206%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20trainingbusinesspros%20WordPress%20CRM%2C%20Email%20%26%20Marketing%20Automation%20for%20WordPress%20%7C%20Award%20Winner%20%E2%80%94%20Groundhogg&amp;severity=high&amp;id=682d9817c4522896dcbd779b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46392-cwe-400-uncontrolled-resource-consumption-in-apache-software-foundation-apache-commons-configuration-aecc7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46392%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20Configuration&amp;severity=medium&amp;id=682cd0fc1484d88663aecc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4403-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-glenwpcoder-drag-and-drop-multiple-file-upload-for-woocommerce-bd79ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4403%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20WooCommerce&amp;severity=critical&amp;id=682d9817c4522896dcbd79ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3949-cwe-862-missing-authorization-in-seedprod-website-builder-by-seedprod-theme-builder-landing-page-builder-coming-soon-page-maintenance-mode-bd789a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3949%3A%20CWE-862%20Missing%20Authorization%20in%20seedprod%20Website%20Builder%20by%20SeedProd%20%E2%80%94%20Theme%20Builder%2C%20Landing%20Page%20Builder%2C%20Coming%20Soon%20Page%2C%20Maintenance%20Mode&amp;severity=medium&amp;id=682d9817c4522896dcbd789a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4472-stack-based-buffer-overflow-in-code-projects-departmental-store-management-system-bd785b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4472%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Departmental%20Store%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd785b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4471-stack-based-buffer-overflow-in-code-projects-jewelery-store-management-system-bd71d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4471%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Jewelery%20Store%20Management%20system&amp;severity=medium&amp;id=682d9817c4522896dcbd71d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4470-cross-site-scripting-in-sourcecodester-online-student-clearance-system-bd7772</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4470%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd7772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4469-cross-site-scripting-in-sourcecodester-online-student-clearance-system-aebef3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4469%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0fa1484d88663aebef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37889-vulnerability-in-linux-linux-bd71aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd71aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37888-vulnerability-in-linux-linux-bd7c08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37887-vulnerability-in-linux-linux-bd7c04</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37886-vulnerability-in-linux-linux-bd7c00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37885-vulnerability-in-linux-linux-bd7bf1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37884-vulnerability-in-linux-linux-bd7be9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37883-vulnerability-in-linux-linux-bd7bd2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37882-vulnerability-in-linux-linux-bd7bce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37881-vulnerability-in-linux-linux-bd7bca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37880-vulnerability-in-linux-linux-aeb88a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f81484d88663aeb88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37879-vulnerability-in-linux-linux-bd7bc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37878-vulnerability-in-linux-linux-bd7bb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37877-vulnerability-in-linux-linux-bd7bad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37876-vulnerability-in-linux-linux-bd7097</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37875-vulnerability-in-linux-linux-bd7d6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37874-vulnerability-in-linux-linux-bd7d50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37873-vulnerability-in-linux-linux-bd7d4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37872-vulnerability-in-linux-linux-bd7d48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37871-vulnerability-in-linux-linux-bd7d44</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37870-vulnerability-in-linux-linux-bd7d40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37869-vulnerability-in-linux-linux-bd7d3c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37868-vulnerability-in-linux-linux-bd7d38</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37867-vulnerability-in-linux-linux-bd7d34</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37866-vulnerability-in-linux-linux-bd7d30</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37865-vulnerability-in-linux-linux-bd7d2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37864-vulnerability-in-linux-linux-bd7d10</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37863-vulnerability-in-linux-linux-bd7cff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3455-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-1clickmigration-1-click-wordpress-migration-plugin-100-free-for-a-limited-time-bd7766</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3455%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%201clickmigration%201%20Click%20WordPress%20Migration%20Plugin%20%E2%80%93%20100%25%20FREE%20for%20a%20limited%20time&amp;severity=high&amp;id=682d9817c4522896dcbd7766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11617-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-themekalia-envolve-plugin-bd7742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11617%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeKalia%20Envolve%20Plugin&amp;severity=critical&amp;id=682d9817c4522896dcbd7742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2253-cwe-620-unverified-password-change-in-imithemes-imithemes-listing-bd783d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2253%3A%20CWE-620%20Unverified%20Password%20Change%20in%20imithemes%20IMITHEMES%20Listing&amp;severity=critical&amp;id=682d9817c4522896dcbd783d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3605-cwe-639-authorization-bypass-through-user-controlled-key-in-arkenon-frontend-login-and-registration-blocks-bd7843</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3605%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arkenon%20Frontend%20Login%20and%20Registration%20Blocks&amp;severity=critical&amp;id=682d9817c4522896dcbd7843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37862-vulnerability-in-linux-linux-bd7cf7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37861-vulnerability-in-linux-linux-bd7093</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37859-vulnerability-in-linux-linux-bd7cef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37858-vulnerability-in-linux-linux-bd7ce7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37857-vulnerability-in-linux-linux-bd7ce1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37856-vulnerability-in-linux-linux-bd7cdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37855-vulnerability-in-linux-linux-bd7cd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37854-vulnerability-in-linux-linux-bd7cc8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37853-vulnerability-in-linux-linux-bd7cc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37852-vulnerability-in-linux-linux-bd7ca5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37851-vulnerability-in-linux-linux-bd708f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd708f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37850-vulnerability-in-linux-linux-bd7c96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9818c4522896dcbd7c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37849-vulnerability-in-linux-linux-bd7c90</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37848-vulnerability-in-linux-linux-bd7c8a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37847-vulnerability-in-linux-linux-bd7c86</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37846-vulnerability-in-linux-linux-bd7c82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37845-vulnerability-in-linux-linux-bd7c71</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37844-vulnerability-in-linux-linux-bd7c69</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37843-vulnerability-in-linux-linux-bd7c61</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37842-vulnerability-in-linux-linux-bd7c59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37841-vulnerability-in-linux-linux-bd7c39</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37840-vulnerability-in-linux-linux-bd7c28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37839-vulnerability-in-linux-linux-bd7c20</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37837-vulnerability-in-linux-linux-bd7c18</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37836-vulnerability-in-linux-linux-bd7c10</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37835-bd71c5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37835&amp;severity=low&amp;id=682d9817c4522896dcbd71c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4468-unrestricted-upload-in-sourcecodester-online-student-clearance-system-bd77ee</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4468%3A%20Unrestricted%20Upload%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd77ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4467-sql-injection-in-sourcecodester-online-student-clearance-system-aec779</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4467%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4466-sql-injection-in-itsourcecode-gym-management-system-bd77e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4466%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd77e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3463-cwe-295-improper-certificate-validation-in-asus-driverhub-aeb873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3463%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20ASUS%20DriverHub&amp;severity=critical&amp;id=682cd0f81484d88663aeb873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3462-cwe-346-origin-validation-error-in-asus-driverhub-aeb875</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3462%3A%20CWE-346%20Origin%20Validation%20Error%20in%20ASUS%20DriverHub&amp;severity=high&amp;id=682cd0f81484d88663aeb875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4465-sql-injection-in-itsourcecode-gym-management-system-bd7b3b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4465%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4464-sql-injection-in-itsourcecode-gym-management-system-bd7b37</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4464%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4377-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sparx-systems-pro-cloud-server-bd7b10</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4377%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sparx%20Systems%20Pro%20Cloud%20Server&amp;severity=high&amp;id=682d9818c4522896dcbd7b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4376-cwe-20-improper-input-validation-in-sparx-systems-pro-cloud-server-bd7b01</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4376%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Sparx%20Systems%20Pro%20Cloud%20Server&amp;severity=medium&amp;id=682d9818c4522896dcbd7b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4375-cwe-352-cross-site-request-forgery-csrf-in-sparx-systems-pro-cloud-server-bd7afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sparx%20Systems%20Pro%20Cloud%20Server&amp;severity=medium&amp;id=682d9818c4522896dcbd7afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4463-sql-injection-in-itsourcecode-gym-management-system-bd7b33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4463%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4462-buffer-overflow-in-totolink-n150rt-bd77de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4462%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d9817c4522896dcbd77de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4461-cross-site-scripting-in-totolink-n150rt-bd77cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4461%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d9817c4522896dcbd77cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3714-cwe-121-stack-based-buffer-overflow-in-aten-cl5708im-bd7793</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3714%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=critical&amp;id=682d9817c4522896dcbd7793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3713-cwe-122-heap-based-buffer-overflow-in-aten-cl5708im-bd778d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3713%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=high&amp;id=682d9817c4522896dcbd778d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3712-cwe-122-heap-based-buffer-overflow-in-aten-cl5708im-bd7789</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3712%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=high&amp;id=682d9817c4522896dcbd7789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4460-cross-site-scripting-in-totolink-n150rt-bd776a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4460%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d9817c4522896dcbd776a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4459-sql-injection-in-code-projects-patient-record-management-system-bd7b1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4459%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3711-cwe-121-stack-based-buffer-overflow-in-aten-cl5708im-bd7af1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3711%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=critical&amp;id=682d9818c4522896dcbd7af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3710-cwe-121-stack-based-buffer-overflow-in-aten-cl5708im-bd7abf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3710%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20ATEN%20CL5708IM&amp;severity=critical&amp;id=682d9818c4522896dcbd7abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4458-sql-injection-in-code-projects-patient-record-management-system-bd7a9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4458%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9818c4522896dcbd7a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4457-sql-injection-in-project-worlds-car-rental-project-bd7e00</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4457%3A%20SQL%20Injection%20in%20Project%20Worlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=682d9818c4522896dcbd7e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4456-sql-injection-in-project-worlds-car-rental-project-bd7dfa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4456%3A%20SQL%20Injection%20in%20Project%20Worlds%20Car%20Rental%20Project&amp;severity=medium&amp;id=682d9818c4522896dcbd7dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4455-uncontrolled-search-path-in-patch-my-pc-home-updater-bd7df6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4455%3A%20Uncontrolled%20Search%20Path%20in%20Patch%20My%20PC%20Home%20Updater&amp;severity=high&amp;id=682d9818c4522896dcbd7df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4454-command-injection-in-d-link-dir-619l-bd7df2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4454%3A%20Command%20Injection%20in%20D-Link%20DIR-619L&amp;severity=medium&amp;id=682d9818c4522896dcbd7df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4453-command-injection-in-d-link-dir-619l-bd7dee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4453%3A%20Command%20Injection%20in%20D-Link%20DIR-619L&amp;severity=medium&amp;id=682d9818c4522896dcbd7dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4434-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andreyk-remote-images-grabber-bd7dc4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4434&amp;severity=high&amp;id=682d9818c4522896dcbd7dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3811-cwe-639-authorization-bypass-through-user-controlled-key-in-iqonicdesign-wpbookit-bd7da7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3811%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=682d9818c4522896dcbd7da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3810-cwe-639-authorization-bypass-through-user-controlled-key-in-iqonicdesign-wpbookit-bd7da3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3810%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20iqonicdesign%20WPBookit&amp;severity=critical&amp;id=682d9818c4522896dcbd7da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4452-buffer-overflow-in-d-link-dir-619l-bd7dea</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4452%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4451-buffer-overflow-in-d-link-dir-619l-bd7ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4451%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4450-buffer-overflow-in-d-link-dir-619l-bd7853</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4450%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9817c4522896dcbd7853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4451-buffer-overflow-in-d-link-dir-619l-bd7ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4451%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4450-buffer-overflow-in-d-link-dir-619l-bd7853</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4450%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9817c4522896dcbd7853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4449-buffer-overflow-in-d-link-dir-619l-bd784b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4449%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9817c4522896dcbd784b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4448-buffer-overflow-in-d-link-dir-619l-bd7dcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4448%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-619L&amp;severity=high&amp;id=682d9818c4522896dcbd7dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4446-buffer-overflow-in-h3c-gr-5400ax-bd7d9f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4446%3A%20Buffer%20Overflow%20in%20H3C%20GR-5400AX&amp;severity=high&amp;id=682d9818c4522896dcbd7d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4445-command-injection-in-d-link-dir-605l-bd7d9b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4445%3A%20Command%20Injection%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=682d9818c4522896dcbd7d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-pro-23h2-ancillary-function-d-8c9f77bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%20Pro%2023H2%20-%20Ancillary%20Function%20Driver%20for%20WinSock%20Privilege%20Escalation&amp;severity=high&amp;id=68489e0f7e6d765d51d53d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-depicter-plugin-361-sql-injection-cf3763ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Depicter%20Plugin%203.6.1%20-%20SQL%20Injection&amp;severity=medium&amp;id=68489e097e6d765d51d53c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suretriggers-ottokit-plugin-1082-privilege-escalat-46caf5a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SureTriggers%20OttoKit%20Plugin%201.0.82%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489e037e6d765d51d53ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/virtualbox-7016-privilege-escalation-3d130275</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VirtualBox%207.0.16%20-%20Privilege%20Escalation&amp;severity=high&amp;id=68489dfc7e6d765d51d539fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apache-activemq-616-denial-of-service-dos-c07ec420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Apache%20ActiveMQ%206.1.6%20-%20Denial%20of%20Service%20(DOS)&amp;severity=medium&amp;id=68489df67e6d765d51d53943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47736-cwe-228-improper-handling-of-syntactically-invalid-structure-in-gwenn-libsql-sqlite3-parser-bd7af9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47736%3A%20CWE-228%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20gwenn%20libsql-sqlite3-parser&amp;severity=low&amp;id=682d9818c4522896dcbd7af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47735-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-nugine-wgp-bd77e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47735%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Nugine%20wgp&amp;severity=low&amp;id=682d9817c4522896dcbd77e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47737-cwe-762-mismatched-memory-management-routines-in-geal-trailer-bd77da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47737%3A%20CWE-762%20Mismatched%20Memory%20Management%20Routines%20in%20Geal%20trailer&amp;severity=low&amp;id=682d9817c4522896dcbd77da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46192-n-a-in-n-a-bd72da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46192%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46191-n-a-in-n-a-bd72d6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46191%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46190-n-a-in-n-a-bd72d2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46190%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46189-n-a-in-n-a-bd72ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46188-n-a-in-n-a-bd72ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45513-n-a-in-n-a-bd72b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45513%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd72b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29509-n-a-in-n-a-bd6e97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29509%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28202-n-a-in-n-a-bd6b86</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28202%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28201-n-a-in-n-a-bd6b77</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28201%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28203-n-a-in-n-a-bd6b71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28203%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47424-cwe-348-use-of-less-trusted-source-in-retool-retool-bd68bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47424%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20Retool%20Retool&amp;severity=high&amp;id=682d9816c4522896dcbd68bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45885-n-a-in-n-a-bd67f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45885%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd67f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46193-n-a-in-n-a-bd677e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46193%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd677e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45887-n-a-in-n-a-bd677a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45887%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd677a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28200-n-a-in-n-a-bd6776</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28200%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-09-2a135a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-09&amp;severity=medium&amp;id=682c7db2e8347ec82d2a135a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-09-f1220c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1220c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4443-command-injection-in-d-link-dir-605l-bd7d97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4443%3A%20Command%20Injection%20in%20D-Link%20DIR-605L&amp;severity=medium&amp;id=682d9818c4522896dcbd7d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4442-buffer-overflow-in-d-link-dir-605l-bd7d93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4442%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=682d9818c4522896dcbd7d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4441-buffer-overflow-in-d-link-dir-605l-bd7d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4441%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-605L&amp;severity=high&amp;id=682d9818c4522896dcbd7d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4440-buffer-overflow-in-h3c-gr-1800ax-bd7d8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4440%3A%20Buffer%20Overflow%20in%20H3C%20GR-1800AX&amp;severity=high&amp;id=682d9818c4522896dcbd7d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27720-cwe-319-cleartext-transmission-of-sensitive-information-in-pixmeo-osirix-md-bd7d73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27720%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Pixmeo%20OsiriX%20MD&amp;severity=critical&amp;id=682d9818c4522896dcbd7d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31946-cwe-416-use-after-free-in-pixmeo-osirix-md-bd7aed</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31946%3A%20CWE-416%20Use%20After%20Free%20in%20Pixmeo%20OsiriX%20MD&amp;severity=medium&amp;id=682d9818c4522896dcbd7aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27578-cwe-416-use-after-free-in-pixmeo-osirix-md-bd7ae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27578%3A%20CWE-416%20Use%20After%20Free%20in%20Pixmeo%20OsiriX%20MD&amp;severity=high&amp;id=682d9818c4522896dcbd7ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47732-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-dataverse-aeba29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47732%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f91484d88663aeba29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47733-cwe-918-server-side-request-forgery-ssrf-in-microsoft-microsoft-power-apps-aeba36</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47733%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Power%20Pages&amp;severity=critical&amp;id=682cd0f91484d88663aeba36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29813-cwe-302-authentication-bypass-by-assumed-immutable-data-in-microsoft-azure-devops-aeb94e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29813%3A%20CWE-302%3A%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Microsoft%20Azure%20DevOps&amp;severity=critical&amp;id=682cd0f91484d88663aeb94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29827-cwe-285-improper-authorization-in-microsoft-azure-automation-aeb95f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29827%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Automation&amp;severity=critical&amp;id=682cd0f91484d88663aeb95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29972-cwe-918-server-side-request-forgery-ssrf-in-microsoft-azure-storage-resource-provider-srp-aeb9be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29972%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Storage%20Resource%20Provider%20(SRP)&amp;severity=critical&amp;id=682cd0f91484d88663aeb9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33072-cwe-284-improper-access-control-in-microsoft-microsoft-msagsfeedback-azurewebsites-net-aeba23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33072%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20msagsfeedback.azurewebsites.net&amp;severity=high&amp;id=682cd0f91484d88663aeba23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1331-cwe-242-use-of-inherently-dangerous-function-in-ibm-cics-tx-standard-bd71e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1331%3A%20CWE-242%20Use%20of%20Inherently%20Dangerous%20Function%20in%20IBM%20CICS%20TX%20Standard&amp;severity=high&amp;id=682d9817c4522896dcbd71e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1330-cwe-787-out-of-bounds-write-in-ibm-cics-tx-standard-bd71de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1330%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20CICS%20TX%20Standard&amp;severity=high&amp;id=682d9817c4522896dcbd71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1329-cwe-787-out-of-bounds-write-in-ibm-cics-tx-standard-bd71da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1329%3A%20CWE-787%20Out-of-bounds%20Write%20in%20IBM%20CICS%20TX%20Standard&amp;severity=high&amp;id=682d9817c4522896dcbd71da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4475-bd7e23</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4475&amp;severity=low&amp;id=682d9818c4522896dcbd7e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46833-cwe-326-inadequate-encryption-strength-in-shashikantsingh09-python-progrrames-bd7ed4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46833%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20ShashikantSingh09%20python-progrrames&amp;severity=medium&amp;id=682d9818c4522896dcbd7ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46812-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-basecamp-trix-bd7eac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46812%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basecamp%20trix&amp;severity=low&amp;id=682d9818c4522896dcbd7eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46712-cwe-440-expected-behavior-violation-in-erlang-otp-bd7ea8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46712%3A%20CWE-440%3A%20Expected%20Behavior%20Violation%20in%20erlang%20otp&amp;severity=low&amp;id=682d9818c4522896dcbd7ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46336-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-rack-rack-session-bd7e5b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46336%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rack%20rack-session&amp;severity=medium&amp;id=682d9818c4522896dcbd7e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9448-cwe-1284-improper-validation-of-specified-quantity-in-input-in-arista-networks-eos-bd7fe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9448%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Arista%20Networks%20EOS&amp;severity=high&amp;id=682d9818c4522896dcbd7fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27695-cwe-290-authentication-bypass-by-spoofing-in-dell-wyse-management-suite-bd807d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27695%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Dell%20Wyse%20Management%20Suite&amp;severity=medium&amp;id=682d9818c4522896dcbd807d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12378-cwe-319-cleartext-transmission-of-sensitive-information-in-arista-networks-cloudvision-portal-bd8030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12378%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Arista%20Networks%20CloudVision%20Portal&amp;severity=critical&amp;id=682d9818c4522896dcbd8030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11186-cwe-287-improper-authentication-in-arista-networks-cloudvision-portal-bd80ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11186%3A%20CWE-287%20Improper%20Authentication%20in%20Arista%20Networks%20CloudVision%20Portal&amp;severity=critical&amp;id=682d9818c4522896dcbd80ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0505-cwe-269-improper-privilege-management-in-arista-networks-cloudvision-portal-bd8140</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0505%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Arista%20Networks%20CloudVision%20Portal&amp;severity=critical&amp;id=682d9818c4522896dcbd8140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8100-cwe-269-improper-privilege-management-in-arista-networks-cloudvision-bd813c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8100%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Arista%20Networks%20CloudVision&amp;severity=high&amp;id=682d9818c4522896dcbd813c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1948-cwe-400-uncontrolled-resource-consumption-in-eclipse-foundation-jetty-bd8228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1948%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Jetty&amp;severity=high&amp;id=682d9818c4522896dcbd8228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4098-cwe-125-out-of-bounds-read-in-horner-automation-cscape-bd731e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4098%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Horner%20Automation%20Cscape&amp;severity=high&amp;id=682d9817c4522896dcbd731e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30101-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-dell-powerscale-onefs-bd81e9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30101%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d9818c4522896dcbd81e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30102-cwe-787-out-of-bounds-write-in-dell-powerscale-onefs-bd8179</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30102%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d9818c4522896dcbd8179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13009-cwe-404-improper-resource-shutdown-or-release-in-eclipse-foundation-jetty-bd812c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13009%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20Eclipse%20Foundation%20Jetty&amp;severity=high&amp;id=682d9818c4522896dcbd812c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-campaign-targeting-brazil-abuses-remote-monit-e632dc89</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20campaign%20targeting%20Brazil%20abuses%20Remote%20Monitoring%20and%20Management%20tools&amp;severity=medium&amp;id=6844546471f4d251b51245cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4132-bd716a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4132&amp;severity=low&amp;id=682d9817c4522896dcbd716a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4207-buffer-over-read-in-postgresql-bd767a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4207%3A%20Buffer%20Over-read%20in%20PostgreSQL&amp;severity=medium&amp;id=682d9817c4522896dcbd767a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6648-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apollo-theme-ap-page-builder-bd86b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6648%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apollo%20Theme%20AP%20Page%20Builder&amp;severity=high&amp;id=682d9819c4522896dcbd86b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3506-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-checkmk-gmbh-checkmk-bd8695</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3506%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682d9819c4522896dcbd8695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2806-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tagdiv-tagdiv-composer-bd8674</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=682d9819c4522896dcbd8674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3468-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webaways-nex-forms-ultimate-forms-plugin-for-wordpress-bd868d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=682d9819c4522896dcbd868d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3862-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-contest-gallery-photos-files-youtube-twitter-instagram-tiktok-ecommerce-contest-gallery-upload-vote-sell-via-paypal-or-stripe-social-share-buttons-bd8634</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Photos%2C%20Files%2C%20YouTube%2C%20Twitter%2C%20Instagram%2C%20TikTok%2C%20Ecommerce%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%2C%20Sell%20via%20PayPal%20or%20Stripe%2C%20Social%20Share%20Buttons&amp;severity=medium&amp;id=682d9819c4522896dcbd8634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4208-cwe-94-improper-control-of-generation-of-code-code-injection-in-webaways-nex-forms-ultimate-forms-plugin-for-wordpress-bd864c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4208%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Forms%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=682d9819c4522896dcbd864c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3759-cwe-306-missing-authentication-for-critical-function-in-netis-systems-wf2220-bd8625</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3759%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Netis%20Systems%20WF2220&amp;severity=high&amp;id=682d9819c4522896dcbd8625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3758-cwe-306-missing-authentication-for-critical-function-in-netis-systems-wf2220-bd8615</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3758%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Netis%20Systems%20WF2220&amp;severity=high&amp;id=682d9819c4522896dcbd8615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41450-cwe-287-improper-authentication-in-danfoss-ak-sm-8xxa-series-aecb51</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41450%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Danfoss%20AK-SM%208xxA%20Series&amp;severity=high&amp;id=682cd0fc1484d88663aecb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1254-cwe-125-out-of-bounds-read-in-rti-connext-professional-bd85f4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1254%3A%20CWE-125%20Out-of-bounds%20Read%20in%20RTI%20Connext%20Professional&amp;severity=high&amp;id=682d9819c4522896dcbd85f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1253-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-rti-connext-professional-bd85be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1253%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=682d9819c4522896dcbd85be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1252-cwe-122-heap-based-buffer-overflow-in-rti-connext-professional-bd85a9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1252%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=682d9819c4522896dcbd85a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40846-cwe-20-improper-input-validation-in-haloitsm-itsm-bd85dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40846%3A%20CWE-20%20Improper%20Input%20Validation%20in%20HaloITSM%20ITSM&amp;severity=high&amp;id=682d9819c4522896dcbd85dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4127-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kcseopro-wp-seo-structured-data-schema-bd85ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kcseopro%20WP%20SEO%20Structured%20Data%20Schema&amp;severity=medium&amp;id=682d9819c4522896dcbd85ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37834-vulnerability-in-linux-linux-bd88d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd88d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37833-vulnerability-in-linux-linux-bd88d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd88d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37832-vulnerability-in-linux-linux-bd88ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37832&amp;severity=high&amp;id=682d9819c4522896dcbd88ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37831-vulnerability-in-linux-linux-bd88a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd88a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37830-vulnerability-in-linux-linux-bd88a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37829-vulnerability-in-linux-linux-bd889e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37828-vulnerability-in-linux-linux-bd888d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd888d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37827-vulnerability-in-linux-linux-bd8885</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37826-vulnerability-in-linux-linux-bd887d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd887d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37825-vulnerability-in-linux-linux-bd8879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37824-vulnerability-in-linux-linux-bd8875</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37823-vulnerability-in-linux-linux-bd8866</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37822-vulnerability-in-linux-linux-bd8849</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37821-vulnerability-in-linux-linux-aeb888</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f81484d88663aeb888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37820-vulnerability-in-linux-linux-bd8836</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37819-vulnerability-in-linux-linux-bd7ba9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37818-vulnerability-in-linux-linux-aeb029</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37817-vulnerability-in-linux-linux-bd882e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd882e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37816-vulnerability-in-linux-linux-bd8826</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37815-vulnerability-in-linux-linux-bd8822</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37814-vulnerability-in-linux-linux-bd881e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd881e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37813-vulnerability-in-linux-linux-bd880d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd880d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37812-vulnerability-in-linux-linux-bd8805</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37811-vulnerability-in-linux-linux-bd87fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd87fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37810-vulnerability-in-linux-linux-bd87f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37809-vulnerability-in-linux-linux-bd87db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37808-vulnerability-in-linux-linux-bd87d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37807-vulnerability-in-linux-linux-bd87d3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9819c4522896dcbd87d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37806-vulnerability-in-linux-linux-bd708b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd708b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37805-vulnerability-in-linux-linux-bd7087</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd7087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37804-aeb106</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37804&amp;severity=low&amp;id=682cd0f71484d88663aeb106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37803-vulnerability-in-linux-linux-bd7085</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37802-vulnerability-in-linux-linux-bd7081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd7081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37801-vulnerability-in-linux-linux-bd87cd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd87cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37800-vulnerability-in-linux-linux-bd87cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd87cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3419-cwe-73-external-control-of-file-name-or-path-in-themewinter-event-manager-events-calendar-tickets-registrations-eventin-bd8595</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3419%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20themewinter%20Event%20Manager%2C%20Events%20Calendar%2C%20Tickets%2C%20Registrations%20%E2%80%93%20Eventin&amp;severity=high&amp;id=682d9819c4522896dcbd8595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13793-cwe-94-improper-control-of-generation-of-code-code-injection-in-don-themes-wolmart-multi-vendor-marketplace-woocommerce-theme-bd858d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13793%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20don-themes%20Wolmart%20%7C%20Multi-Vendor%20Marketplace%20WooCommerce%20Theme&amp;severity=high&amp;id=682d9819c4522896dcbd858d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32873-cwe-770-allocation-of-resources-without-limits-or-throttling-in-djangoproject-django-bd8589</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32873%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20djangoproject%20Django&amp;severity=medium&amp;id=682d9819c4522896dcbd8589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47730-cwe-798-use-of-hard-coded-credentials-in-telemessage-archiving-backend-bd845a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47730%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20TeleMessage%20archiving%20backend&amp;severity=medium&amp;id=682d9819c4522896dcbd845a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26845-n-a-in-n-a-bd81e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26845%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd81e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26844-n-a-in-n-a-bd8171</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd8171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26842-n-a-in-n-a-bd8160</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26847-n-a-in-n-a-bd8120</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd8120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44021-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-openstack-ironic-bd7e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44021%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenStack%20Ironic&amp;severity=low&amp;id=682d9818c4522896dcbd7e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45843-n-a-in-n-a-bd7141</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45843%3A%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45842-n-a-in-n-a-bd713b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45842%3A%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd713b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51328-n-a-in-n-a-bd7109</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51328%3A%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45798-n-a-in-n-a-bd6a47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45798%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45797-n-a-in-n-a-bd6a22</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45797%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45790-n-a-in-n-a-bd6a1e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45790%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45789-n-a-in-n-a-bd6a1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45789%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45788-n-a-in-n-a-bd6a0e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45788%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45787-n-a-in-n-a-bd6a0a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45787%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44023-n-a-in-n-a-bd69fd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44023%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45847-n-a-in-n-a-bd69cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45847%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45841-n-a-in-n-a-bd69c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45841%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45820-n-a-in-n-a-bd69c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45820%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45819-n-a-in-n-a-bd69bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45819%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45818-n-a-in-n-a-bd69b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45818%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43926-n-a-in-n-a-bd69a2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43926%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28073-n-a-in-n-a-bd6996</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28073%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51295-n-a-in-n-a-bd689b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51295%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd689b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28074-n-a-in-n-a-bd67cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28074%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd67cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31585-n-a-in-n-a-bd6782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31585%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47729-cwe-912-hidden-functionality-in-telemessage-archiving-backend-bd6772</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47729%3A%20CWE-912%20Hidden%20Functionality%20in%20TeleMessage%20archiving%20backend&amp;severity=low&amp;id=682d9816c4522896dcbd6772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45844-n-a-in-n-a-bd6504</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45844%3A%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45846-n-a-in-n-a-bd646b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45846%3A%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd646b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45845-n-a-in-n-a-bd6467</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45845%3A%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-08-2a0b30</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-08&amp;severity=medium&amp;id=682c7db2e8347ec82d2a0b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-08-f12344</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55651-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-portabilis-i-educar-bd85f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55651%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20portabilis%20i-educar&amp;severity=low&amp;id=682d9819c4522896dcbd85f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46727-cwe-400-uncontrolled-resource-consumption-in-rack-rack-bd85f8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46727%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rack%20rack&amp;severity=high&amp;id=682d9819c4522896dcbd85f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32441-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-rack-rack-bd85c6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32441%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20rack%20rack&amp;severity=medium&amp;id=682d9819c4522896dcbd85c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0936-cwe-256-in-arista-networks-eos-bd86db</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0936%3A%20CWE-256%20in%20Arista%20Networks%20EOS&amp;severity=medium&amp;id=682d9819c4522896dcbd86db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35939-cwe-472-external-control-of-assumed-immutable-web-parameter-in-craft-cms-aecb6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35939%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20Craft%20CMS&amp;severity=medium&amp;id=682cd0fc1484d88663aecb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41431-cwe-787-out-of-bounds-write-in-f5-big-ip-bd86f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41431%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31644-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-f5-big-ip-aec7c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31644%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682cd0fb1484d88663aec7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35995-cwe-125-out-of-bounds-read-in-f5-big-ip-bd86ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35995%3A%20CWE-125%20Out-of-bounds%20Read%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36525-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-f5-big-ip-bd86c2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36525%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36504-cwe-770-allocation-of-resources-without-limits-or-throttling-in-f5-big-ip-bd86be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36504%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41414-cwe-476-null-pointer-dereference-in-f5-big-ip-bd86c6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41414%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41433-cwe-476-null-pointer-dereference-in-f5-big-ip-bd86ac</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41433%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd86ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46265-cwe-863-incorrect-authorization-in-f5-f5os-appliance-bd8707</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46265%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=682d9819c4522896dcbd8707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43878-cwe-149-improper-neutralization-of-quoting-syntax-in-f5-f5os-appliance-bd8703</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43878%3A%20CWE-149%3A%20Improper%20Neutralization%20of%20Quoting%20Syntax%20in%20F5%20F5OS%20-%20Appliance&amp;severity=medium&amp;id=682d9819c4522896dcbd8703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36546-cwe-863-incorrect-authorization-in-f5-f5os-appliance-bd86ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36546%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20F5OS%20-%20Appliance&amp;severity=high&amp;id=682d9819c4522896dcbd86ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36557-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-f5-big-ip-aeb2db</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36557%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682cd0f81484d88663aeb2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41399-cwe-404-improper-resource-shutdown-or-release-in-f5-big-ip-bd869d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41399%3A%20CWE-404%20Improper%20Resource%20Shutdown%20or%20Release%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd869d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7303-cross-site-scripting-in-q2apro-q2apro-on-site-notifications-bd8665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7303%3A%20Cross%20Site%20Scripting%20in%20q2apro%20q2apro-on-site-notifications&amp;severity=medium&amp;id=682d9819c4522896dcbd8665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46826-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-insagenda-insa-auth-bd8644</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46826%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20INSAgenda%20insa-auth&amp;severity=low&amp;id=682d9819c4522896dcbd8644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46821-cwe-186-overly-restrictive-regular-expression-in-envoyproxy-envoy-bd8599</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46821%3A%20CWE-186%3A%20Overly%20Restrictive%20Regular%20Expression%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9819c4522896dcbd8599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31177-heap-based-buffer-overflow-bd857c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31177%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d9819c4522896dcbd857c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4043-cwe-1274-in-milesight-ug65-868m-ea-bd855a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4043%3A%20CWE-1274%20in%20Milesight%20UG65-868M-EA&amp;severity=medium&amp;id=682d9819c4522896dcbd855a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3925-cwe-250-in-brightsign-brightsign-os-series-4-players-bd85ce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3925%3A%20CWE-250%20in%20BrightSign%20BrightSign%20OS%20series%204%20players&amp;severity=high&amp;id=682d9819c4522896dcbd85ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3272-cwe-863-incorrect-authorization-in-opentext-operations-bridge-manager-bd8dac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3272%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%E2%84%A2%20Operations%20Bridge%20Manager&amp;severity=medium&amp;id=682d9819c4522896dcbd8dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3476-cwe-863-incorrect-authorization-in-opentext-operations-bridge-manager-bd8e0b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3476%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%E2%84%A2%20Operations%20Bridge%20Manager&amp;severity=critical&amp;id=682d9819c4522896dcbd8e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30147-cwe-325-missing-cryptographic-step-in-hyperledger-besu-native-bd8e07</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30147%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20hyperledger%20besu-native&amp;severity=high&amp;id=682d9819c4522896dcbd8e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/coldriver-using-new-malware-to-steal-documents-fro-168aa226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COLDRIVER%20Using%20New%20Malware%20To%20Steal%20Documents%20From%20Western%20Targets%20and%20NGOs&amp;severity=medium&amp;id=68421305182aa0cae2f2a22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20195-cross-site-request-forgery-csrf-in-cisco-cisco-ios-xe-software-bd8f8d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20195%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20194-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-ios-xe-software-bd890f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20194%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd890f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20193-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-ios-xe-software-bd93f7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20193%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd93f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20201-improper-check-for-unusual-or-exceptional-conditions-in-cisco-cisco-ios-xe-software-bd8952</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20201%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20200-improper-check-for-unusual-or-exceptional-conditions-in-cisco-cisco-ios-xe-software-bd8943</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20200%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20199-vulnerability-in-cisco-cisco-ios-xe-software-bd893b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20199%3A%20Vulnerability%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20198-improper-check-for-unusual-or-exceptional-conditions-in-cisco-cisco-ios-xe-software-bd8935</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20198%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20197-improper-input-validation-in-cisco-cisco-ios-xe-software-bd8931</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20197%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd8931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20221-exposure-of-sensitive-information-to-an-unauthorized-actor-in-cisco-cisco-ios-xe-software-bd8f30</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20221%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20162-uncontrolled-resource-consumption-in-cisco-cisco-ios-xe-software-bd8ee4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20162%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20196-improper-restriction-of-excessive-authentication-attempts-in-cisco-ios-bd8f24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20196%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Cisco%20IOS&amp;severity=medium&amp;id=682d981ac4522896dcbd8f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46824-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-discourse-discourse-code-review-bd90cb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46824%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20discourse%20discourse-code-review&amp;severity=low&amp;id=682d981ac4522896dcbd90cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20186-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-ios-xe-software-bd8907</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20186%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d9819c4522896dcbd8907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20223-improper-access-control-in-cisco-cisco-digital-network-architecture-center-dna-center-bd8f34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20223%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=medium&amp;id=682d981ac4522896dcbd8f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20155-improper-validation-of-specified-type-of-input-in-cisco-cisco-ios-xe-software-bd88ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20155%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d9819c4522896dcbd88ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20140-uncontrolled-memory-allocation-in-cisco-cisco-ios-xe-software-bd9406</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20140%3A%20Uncontrolled%20Memory%20Allocation%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd9406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20164-missing-authorization-in-cisco-ios-bd8903</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20164%3A%20Missing%20Authorization%20in%20Cisco%20IOS&amp;severity=high&amp;id=682d9819c4522896dcbd8903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20192-improper-handling-of-undefined-values-in-cisco-cisco-ios-xe-software-bd8f13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20192%3A%20Improper%20Handling%20of%20Undefined%20Values%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20189-mismatched-memory-management-routines-in-cisco-cisco-ios-xe-software-bd8ef2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20189%3A%20Mismatched%20Memory%20Management%20Routines%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20181-improper-verification-of-cryptographic-signature-in-cisco-ios-bd8eea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20181%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20IOS&amp;severity=medium&amp;id=682d981ac4522896dcbd8eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20202-buffer-access-with-incorrect-length-value-in-cisco-cisco-ios-xe-software-bd8f28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20202%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20190-improper-access-control-in-cisco-cisco-ios-xe-software-bd8efa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20190%3A%20Improper%20Access%20Control%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46828-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-labredescefetrj-wegia-bd8e0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46828%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=682d9819c4522896dcbd8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20188-use-of-hard-coded-credentials-in-cisco-cisco-ios-xe-software-bd890b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20188%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=critical&amp;id=682d9819c4522896dcbd890b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20214-authorization-bypass-through-user-controlled-key-in-cisco-cisco-ios-xe-software-bd8f2c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20214%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=medium&amp;id=682d981ac4522896dcbd8f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20137-improper-access-control-in-cisco-ios-bd8e83</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20137%3A%20Improper%20Access%20Control%20in%20Cisco%20IOS&amp;severity=medium&amp;id=682d981ac4522896dcbd8e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32821-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-sonicwall-sma100-bd89a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32821%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d9819c4522896dcbd89a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32820-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sonicwall-sma100-bd8ffa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32820%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d981ac4522896dcbd8ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20147-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cisco-cisco-catalyst-sd-wan-manager-bd940e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20147%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd940e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20216-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-cisco-cisco-catalyst-sd-wan-manager-bd9416</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20216%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd9416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20154-improper-input-validation-in-cisco-cisco-ios-xr-software-bd8e87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20154%3A%20Improper%20Input%20Validation%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20151-configuration-in-cisco-cisco-ios-xe-catalyst-sd-wan-bd8e85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20151%3A%20Configuration%20in%20Cisco%20Cisco%20IOS%20XE%20Catalyst%20SD-WAN&amp;severity=medium&amp;id=682d981ac4522896dcbd8e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20191-buffer-access-with-incorrect-length-value-in-cisco-cisco-nx-os-software-bd8eae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20191%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20187-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-cisco-cisco-catalyst-sd-wan-manager-bd8e93</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20187%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd8e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20122-channel-accessible-by-non-endpoint-in-cisco-cisco-catalyst-sd-wan-manager-bd88f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20122%3A%20Channel%20Accessible%20by%20Non-Endpoint%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd88f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32819-cwe-552-files-or-directories-accessible-to-external-parties-in-sonicwall-sma100-bd6704</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32819%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d9816c4522896dcbd6704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20213-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-cisco-cisco-catalyst-sd-wan-manager-bd8956</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20213%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d9819c4522896dcbd8956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20182-out-of-bounds-write-in-cisco-cisco-adaptive-security-appliance-asa-software-bd8e8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20182%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=682d981ac4522896dcbd8e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20157-improper-certificate-validation-in-cisco-cisco-catalyst-sd-wan-manager-bd8e8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20157%3A%20Improper%20Certificate%20Validation%20in%20Cisco%20Cisco%20Catalyst%20SD-WAN%20Manager&amp;severity=medium&amp;id=682d981ac4522896dcbd8e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20210-missing-authentication-for-critical-function-in-cisco-cisco-digital-network-architecture-center-dna-center-bd8eb6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20210%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Cisco%20Cisco%20Digital%20Network%20Architecture%20Center%20(DNA%20Center)&amp;severity=high&amp;id=682d981ac4522896dcbd8eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46551-cwe-295-improper-certificate-validation-in-jruby-jruby-openssl-bd8cd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46551%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20jruby%20jruby-openssl&amp;severity=medium&amp;id=682d9819c4522896dcbd8cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46827-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-graylog2-graylog2-server-bd96d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46827%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Graylog2%20graylog2-server&amp;severity=high&amp;id=682d981ac4522896dcbd96d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47619-cwe-295-improper-certificate-validation-in-syslog-ng-syslog-ng-bd945a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47619%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20syslog-ng%20syslog-ng&amp;severity=high&amp;id=682d981ac4522896dcbd945a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2777-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sysaid-sysaid-on-prem-bd899e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2777%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SysAid%20SysAid%20On-Prem&amp;severity=critical&amp;id=682d9819c4522896dcbd899e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2776-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sysaid-sysaid-on-prem-bd8996</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2776%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SysAid%20SysAid%20On-Prem&amp;severity=critical&amp;id=682d9819c4522896dcbd8996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2775-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sysaid-sysaid-on-prem-bd8992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2775%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SysAid%20SysAid%20On-Prem&amp;severity=critical&amp;id=682d9819c4522896dcbd8992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47692-cwe-862-missing-authorization-in-contentstudio-contentstudio-bd9452</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47692%3A%20CWE-862%20Missing%20Authorization%20in%20contentstudio%20ContentStudio&amp;severity=medium&amp;id=682d981ac4522896dcbd9452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47691-cwe-94-improper-control-of-generation-of-code-code-injection-in-ultimate-member-ultimate-member-bd944a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47691%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ultimate%20Member%20Ultimate%20Member&amp;severity=medium&amp;id=682d981ac4522896dcbd944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47688-cwe-862-missing-authorization-in-saad-iqbal-advanced-file-manager-bd93e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47688%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Advanced%20File%20Manager&amp;severity=null&amp;id=682d981ac4522896dcbd93e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47686-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-delucks-delucks-seo-bd93df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47686%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=682d981ac4522896dcbd93df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47685-cwe-352-cross-site-request-forgery-csrf-in-moloni-contribuinte-checkout-bd93d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47685%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Moloni%20Contribuinte%20Checkout&amp;severity=null&amp;id=682d981ac4522896dcbd93d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47684-cwe-352-cross-site-request-forgery-csrf-in-smaily-smaily-for-wp-bd93c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47684%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Smaily%20Smaily%20for%20WP&amp;severity=null&amp;id=682d981ac4522896dcbd93c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47683-cwe-502-deserialization-of-untrusted-data-in-florent-maillefaud-wp-maintenance-bd93c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47683%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Florent%20Maillefaud%20WP%20Maintenance&amp;severity=null&amp;id=682d981ac4522896dcbd93c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47681-cwe-352-cross-site-request-forgery-csrf-in-ability-inc-web-accessibility-with-max-access-bd93a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47681%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ability%2C%20Inc%20Web%20Accessibility%20with%20Max%20Access&amp;severity=null&amp;id=682d981ac4522896dcbd93a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47679-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rs-wp-themes-rs-wp-book-showcase-bd9398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RS%20WP%20THEMES%20RS%20WP%20Book%20Showcase&amp;severity=null&amp;id=682d981ac4522896dcbd9398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47677-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gt3themes-photo-gallery-gt3-image-gallery-gutenberg-block-gallery-bd9390</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47677%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=null&amp;id=682d981ac4522896dcbd9390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47676-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-faiyaz-alam-user-login-history-bd9388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Faiyaz%20Alam%20User%20Login%20History&amp;severity=null&amp;id=682d981ac4522896dcbd9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47675-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-woobox-woobox-bd9380</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woobox%20Woobox&amp;severity=medium&amp;id=682d981ac4522896dcbd9380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47674-cwe-352-cross-site-request-forgery-csrf-in-credova-financial-credova-financial-bd9371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47674%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Credova%20Financial%20Credova_Financial&amp;severity=null&amp;id=682d981ac4522896dcbd9371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47669-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sabuj-kundu-cbx-map-for-google-map-openstreetmap-bd9369</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47669%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sabuj%20Kundu%20CBX%20Map%20for%20Google%20Map%20%26%20OpenStreetMap&amp;severity=null&amp;id=682d981ac4522896dcbd9369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47668-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cookiecode-cookiecode-bd935a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cookiecode%20CookieCode&amp;severity=medium&amp;id=682d981ac4522896dcbd935a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47667-cwe-352-cross-site-request-forgery-csrf-in-qusupport-liveagent-bd9354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47667%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20qusupport%20LiveAgent&amp;severity=null&amp;id=682d981ac4522896dcbd9354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47665-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bistromatic-n360-splash-screen-bd934a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47665%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bistromatic%20N360%20%7C%20Splash%20Screen&amp;severity=null&amp;id=682d981ac4522896dcbd934a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47664-cwe-918-server-side-request-forgery-ssrf-in-thimpress-wp-pipes-bd9333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47664%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThimPress%20WP%20Pipes&amp;severity=medium&amp;id=682d981ac4522896dcbd9333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47662-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-woobox-woobox-bd932f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woobox%20Woobox&amp;severity=medium&amp;id=682d981ac4522896dcbd932f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47661-cwe-352-cross-site-request-forgery-csrf-in-codemstory-bd932b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47661%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=null&amp;id=682d981ac4522896dcbd932b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47659-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-voidcoders-wpbakery-visual-composer-whmcs-elements-bd9327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47659%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidcoders%20WPBakery%20Visual%20Composer%20WHMCS%20Elements&amp;severity=null&amp;id=682d981ac4522896dcbd9327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47657-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-productive-minds-productive-commerce-bd9323</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47657%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Productive%20Minds%20Productive%20Commerce&amp;severity=null&amp;id=682d981ac4522896dcbd9323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47656-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-spiraclethemes-spiraclethemes-site-library-bd8cdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47656%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiracle%20Themes%20Spiraclethemes%20Site%20Library&amp;severity=null&amp;id=682d9819c4522896dcbd8cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47655-cwe-352-cross-site-request-forgery-csrf-in-themarketer2023-themarketer-bd8c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47655%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themarketer2023%20theMarketer&amp;severity=null&amp;id=682d9819c4522896dcbd8c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47653-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-tggfref-wp-recall-bd8bd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47653%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20tggfref%20WP-Recall&amp;severity=high&amp;id=682d9819c4522896dcbd8bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47649-cwe-35-path-traversal-in-ilmosys-open-close-woocommerce-store-bd8bd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47649%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20StackWC%20Open%20Close%20WooCommerce%20Store&amp;severity=null&amp;id=682d9819c4522896dcbd8bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47648-cwe-352-cross-site-request-forgery-csrf-in-axima-pays-woocommerce-payment-gateway-bd9312</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47648%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20axima%20Pays%20%E2%80%93%20WooCommerce%20Payment%20Gateway&amp;severity=null&amp;id=682d981ac4522896dcbd9312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47647-cwe-352-cross-site-request-forgery-csrf-in-otwthemes-sidebar-manager-light-bd930a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47647%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Sidebar%20Manager%20Light&amp;severity=null&amp;id=682d981ac4522896dcbd930a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47644-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-formsintegrations-integrations-of-zoho-crm-with-elementor-form-bd92fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47644%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20formsintegrations%20Integrations%20of%20Zoho%20CRM%20with%20Elementor%20form&amp;severity=null&amp;id=682d981ac4522896dcbd92fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47643-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-elextensions-elex-product-feed-for-woocommerce-bd8bce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47643%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ELEXtensions%20ELEX%20Product%20Feed%20for%20WooCommerce&amp;severity=high&amp;id=682d9819c4522896dcbd8bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47639-cwe-352-cross-site-request-forgery-csrf-in-supertext-supertext-translation-and-proofreading-bd92f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47639%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Supertext%20Supertext%20Translation%20and%20Proofreading&amp;severity=null&amp;id=682d981ac4522896dcbd92f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47638-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sarvesh-m-rao-wp-discord-invite-bd8bca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarvesh%20M%20Rao%20WP%20Discord%20Invite&amp;severity=null&amp;id=682d9819c4522896dcbd8bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47636-cwe-35-path-traversal-in-fernando-briano-list-category-posts-bd8bc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47636%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Fernando%20Briano%20List%20category%20posts&amp;severity=null&amp;id=682d9819c4522896dcbd8bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47635-cwe-918-server-side-request-forgery-ssrf-in-wpwebinarsystem-webinarpress-bd92eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47635%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=682d981ac4522896dcbd92eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47633-cwe-352-cross-site-request-forgery-csrf-in-awin-awin-advertiser-tracking-for-woocommerce-bd8556</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47633%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Awin%20Awin%20%E2%80%93%20Advertiser%20Tracking%20for%20WooCommerce&amp;severity=null&amp;id=682d9819c4522896dcbd8556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47632-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-raihanul-islam-awesome-gallery-bd8552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Raihanul%20Islam%20Awesome%20Gallery&amp;severity=null&amp;id=682d9819c4522896dcbd8552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47630-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darren-cooney-ajax-load-more-bd854c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Darren%20Cooney%20Ajax%20Load%20More&amp;severity=null&amp;id=682d9819c4522896dcbd854c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47629-cwe-502-deserialization-of-untrusted-data-in-mario-peshev-wp-crm-system-bd92d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47629%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=null&amp;id=682d981ac4522896dcbd92d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47628-cwe-862-missing-authorization-in-quomodosoft-qs-dark-mode-bd8523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47628%3A%20Missing%20Authorization%20in%20quomodosoft%20QS%20Dark%20Mode&amp;severity=null&amp;id=682d9819c4522896dcbd8523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47626-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apasionados-submission-dom-tracking-for-contact-form-7-bd851f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apasionados%20Submission%20DOM%20tracking%20for%20Contact%20Form%207&amp;severity=null&amp;id=682d9819c4522896dcbd851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47625-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apasionados-dofollow-case-by-case-bd851b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=null&amp;id=682d9819c4522896dcbd851b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47624-cwe-352-cross-site-request-forgery-csrf-in-apasionados-dofollow-case-by-case-bd850e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47624%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apasionados%20DoFollow%20Case%20by%20Case&amp;severity=null&amp;id=682d9819c4522896dcbd850e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47623-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scott-paterson-easy-paypal-buy-now-button-bd84f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Easy%20PayPal%20Buy%20Now%20Button&amp;severity=null&amp;id=682d9819c4522896dcbd84f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47622-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apasionados-email-notification-on-login-bd84de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apasionados%20Email%20Notification%20on%20Login&amp;severity=null&amp;id=682d9819c4522896dcbd84de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47621-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-meks-meks-flexible-shortcodes-bd84da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meks%20Meks%20Flexible%20Shortcodes&amp;severity=null&amp;id=682d9819c4522896dcbd84da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47620-cwe-352-cross-site-request-forgery-csrf-in-bundgaard-martins-free-monetized-ad-exchange-network-bd92d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bundgaard%20Martins%20Free%20Monetized%20Ad%20Exchange%20Network&amp;severity=null&amp;id=682d981ac4522896dcbd92d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47617-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aharonyan-wp-front-user-submit-front-editor-bd92cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aharonyan%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=null&amp;id=682d981ac4522896dcbd92cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47616-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tushar-imran-ablocks-bd92c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kodezen%20LLC%20aBlocks&amp;severity=null&amp;id=682d981ac4522896dcbd92c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47615-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-flowdee-amazon-product-in-a-post-bd92c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flowdee%20Amazon%20Product%20in%20a%20Post&amp;severity=null&amp;id=682d981ac4522896dcbd92c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47614-cwe-352-cross-site-request-forgery-csrf-in-chris-clark-lessbuttons-social-sharing-and-statistics-bd83c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47614%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chris%20Clark%20LessButtons%20Social%20Sharing%20and%20Statistics&amp;severity=null&amp;id=682d9818c4522896dcbd83c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47612-cwe-862-missing-authorization-in-flowdee-clickwhale-bd83c4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47612%3A%20CWE-862%20Missing%20Authorization%20in%20flowdee%20ClickWhale&amp;severity=medium&amp;id=682d9818c4522896dcbd83c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47609-cwe-352-cross-site-request-forgery-csrf-in-easymebiz-easyme-connect-bd83b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47609%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20easymebiz%20EasyMe%20Connect&amp;severity=null&amp;id=682d9818c4522896dcbd83b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47607-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-appjetty-show-all-comments-bd83ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AppJetty%20Show%20All%20Comments&amp;severity=null&amp;id=682d9818c4522896dcbd83ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47606-cwe-352-cross-site-request-forgery-csrf-in-igor-benic-simple-giveaways-bd92b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47606%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Benic%20Simple%20Giveaways&amp;severity=null&amp;id=682d981ac4522896dcbd92b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47605-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-appjetty-wp-jquery-datatable-bd92a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AppJetty%20WP%20jQuery%20DataTable&amp;severity=null&amp;id=682d981ac4522896dcbd92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47604-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-data443-risk-migitation-inc-inline-related-posts-bd929c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Inline%20Related%20Posts&amp;severity=null&amp;id=682d981ac4522896dcbd929c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47602-cwe-862-missing-authorization-in-ammarahmad786-calculate-prices-based-on-distance-for-woocommerce-bd9294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47602%3A%20Missing%20Authorization%20in%20ammarahmad786%20Calculate%20Prices%20based%20on%20Distance%20For%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd9294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47597-cwe-352-cross-site-request-forgery-csrf-in-maulik-vora-wp-podcasts-manager-bd928c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47597%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Maulik%20Vora%20WP%20Podcasts%20Manager&amp;severity=null&amp;id=682d981ac4522896dcbd928c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47596-cwe-352-cross-site-request-forgery-csrf-in-syed-balkhi-beacon-lead-magnets-and-lead-capture-bd9275</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47596%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Beacon%20Lead%20Magnets%20and%20Lead%20Capture&amp;severity=null&amp;id=682d981ac4522896dcbd9275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47595-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darshan-saroya-color-your-bar-bd9271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Darshan%20Saroya%20Color%20Your%20Bar&amp;severity=null&amp;id=682d981ac4522896dcbd9271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47594-cwe-352-cross-site-request-forgery-csrf-in-daext-soccer-live-scores-bd926d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47594%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DAEXT%20Soccer%20Live%20Scores&amp;severity=medium&amp;id=682d981ac4522896dcbd926d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47593-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jonas-hjalmarsson-really-simple-under-construction-page-bd9269</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonas%20Hjalmarsson%20Really%20Simple%20Under%20Construction%20Page&amp;severity=null&amp;id=682d981ac4522896dcbd9269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47592-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lehel-m-tyus-legal-terms-and-conditions-popup-for-user-login-and-woocommerce-checkout-tpul-bd9265</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%C3%81rp%C3%A1d%20Lehel%20M%C3%A1tyus%20Terms%20Popup%20On%20User%20Login&amp;severity=null&amp;id=682d981ac4522896dcbd9265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47591-cwe-862-missing-authorization-in-creedally-bulk-featured-image-bd9258</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47591%3A%20Missing%20Authorization%20in%20CreedAlly%20Bulk%20Featured%20Image&amp;severity=null&amp;id=682d981ac4522896dcbd9258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47590-cwe-352-cross-site-request-forgery-csrf-in-john-dagelmore-wpspeed-bd9247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JExtensions%20Store%20WPSpeed&amp;severity=null&amp;id=682d981ac4522896dcbd9247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47589-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-motov-net-ebook-store-bd923f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motov.net%20Ebook%20Store&amp;severity=null&amp;id=682d981ac4522896dcbd923f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47587-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-yaycommerce-yaysmtp-bd9237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47587%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YayCommerce%20YaySMTP&amp;severity=null&amp;id=682d981ac4522896dcbd9237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47551-cwe-352-cross-site-request-forgery-csrf-in-ctltwp-wiki-embed-bd922f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47551%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ctltwp%20Wiki%20Embed&amp;severity=null&amp;id=682d981ac4522896dcbd922f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47550-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-themefic-instantio-bd7b50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47550%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20Instantio&amp;severity=null&amp;id=682d9818c4522896dcbd7b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47549-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-themefic-beaf-bd7b43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47549%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20BEAF&amp;severity=null&amp;id=682d9818c4522896dcbd7b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47548-cwe-918-server-side-request-forgery-ssrf-in-varun-dubey-wbcom-designs-activity-link-preview-for-buddypress-bd9218</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47548%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Varun%20Dubey%20Wbcom%20Designs%20-%20Activity%20Link%20Preview%20For%20BuddyPress&amp;severity=null&amp;id=682d981ac4522896dcbd9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47547-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sendpulse-sendpulse-email-marketing-newsletter-bd920b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=null&amp;id=682d981ac4522896dcbd920b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47546-cwe-352-cross-site-request-forgery-csrf-in-aresit-wp-compress-bd9203</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=682d981ac4522896dcbd9203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47545-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-ays-pro-poll-maker-bd91fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47545%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=682d981ac4522896dcbd91fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47544-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-acowebs-dynamic-pricing-with-discount-rules-for-woocommerce-bd91f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47544%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20acowebs%20Dynamic%20Pricing%20With%20Discount%20Rules%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd91f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47543-cwe-352-cross-site-request-forgery-csrf-in-themetechmount-truebooker-bd91eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themetechmount%20TrueBooker&amp;severity=null&amp;id=682d981ac4522896dcbd91eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47542-cwe-352-cross-site-request-forgery-csrf-in-michael-simple-calendar-for-elementor-bd91dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Simple%20calendar%20for%20Elementor&amp;severity=null&amp;id=682d981ac4522896dcbd91dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47540-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-wedevs-wemail-bd91d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47540%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20weDevs%20weMail&amp;severity=null&amp;id=682d981ac4522896dcbd91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47538-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wpdever-cart-tracking-for-woocommerce-bd91d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47538%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdever%20Cart%20tracking%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd91d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47537-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-add-ons-org-pdf-invoices-for-woocommerce-drag-and-drop-template-builder-bd91c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47537%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd91c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47533-cwe-352-cross-site-request-forgery-csrf-in-iqonic-design-graphina-bd91ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Iqonic%20Design%20Graphina&amp;severity=null&amp;id=682d981ac4522896dcbd91ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47531-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-xylus-themes-xt-event-widget-for-social-events-bd91a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47531%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Xylus%20Themes%20XT%20Event%20Widget%20for%20Social%20Events&amp;severity=null&amp;id=682d981ac4522896dcbd91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47528-cwe-862-missing-authorization-in-pewilliams-ovation-elements-bd91a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47528%3A%20Missing%20Authorization%20in%20pewilliams%20Ovation%20Elements&amp;severity=null&amp;id=682d981ac4522896dcbd91a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47526-cwe-862-missing-authorization-in-gs-plugins-gs-variation-swatches-for-woocommerce-bd919c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47526%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Variation%20Swatches%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd919c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47525-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boldthemes-bold-page-builder-bd9194</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=682d981ac4522896dcbd9194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47524-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-karim42-quran-multilanguage-text-audio-bd918c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karim42%20Quran%20multilanguage%20Text%20%26%20Audio&amp;severity=null&amp;id=682d981ac4522896dcbd918c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47523-cwe-352-cross-site-request-forgery-csrf-in-luk-hartmann-seznam-webmaster-bd917d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47523%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Luk%C3%A1%C5%A1%20Hartmann%20Seznam%20Webmaster&amp;severity=null&amp;id=682d981ac4522896dcbd917d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47522-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aweos-gmbh-aweos-wp-lock-bd917b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AWEOS%20GmbH%20AWEOS%20WP%20Lock&amp;severity=null&amp;id=682d981ac4522896dcbd917b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47521-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-robosoft-robo-gallery-bd916c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=null&amp;id=682d981ac4522896dcbd916c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47520-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-syed-balkhi-charitable-bd9164</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Charitable&amp;severity=null&amp;id=682d981ac4522896dcbd9164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47519-cwe-352-cross-site-request-forgery-csrf-in-scott-paterson-easy-paypal-events-bd9149</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47519%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Paterson%20Easy%20PayPal%20Events&amp;severity=null&amp;id=682d981ac4522896dcbd9149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47518-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scott-paterson-contact-form-7-paypal-stripe-add-on-bd9141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Contact%20Form%207%20%E2%80%93%20PayPal%20%26%20Stripe%20Add-on&amp;severity=null&amp;id=682d981ac4522896dcbd9141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47517-cwe-352-cross-site-request-forgery-csrf-in-scott-paterson-accept-donations-with-paypal-bd9139</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47517%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Paterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=null&amp;id=682d981ac4522896dcbd9139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47516-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-scott-paterson-time-clock-bd9128</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Time%20Clock&amp;severity=null&amp;id=682d981ac4522896dcbd9128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47515-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-seb-wp-dpe-ges-bd9120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Seb%20WP%20DPE-GES&amp;severity=null&amp;id=682d981ac4522896dcbd9120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47514-cwe-352-cross-site-request-forgery-csrf-in-eli-eli-s-related-posts-footer-links-and-widget-bd9118</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47514%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eli%20ELI&apos;s%20Related%20Posts%20Footer%20Links%20and%20Widget&amp;severity=null&amp;id=682d981ac4522896dcbd9118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47510-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-fullworks-display-eventbrite-events-bd9109</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47510%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20fullworks%20Display%20Eventbrite%20Events&amp;severity=null&amp;id=682d981ac4522896dcbd9109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47509-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-top-10-bd84d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Top%2010&amp;severity=null&amp;id=682d9819c4522896dcbd84d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47508-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ruben-garcia-gamipress-bd84d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ruben%20Garcia%20GamiPress&amp;severity=null&amp;id=682d9819c4522896dcbd84d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47507-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-better-search-bd8456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47507%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Better%20Search&amp;severity=null&amp;id=682d9819c4522896dcbd8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47506-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-contextual-related-posts-bd8452</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47506%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Contextual%20Related%20Posts&amp;severity=null&amp;id=682d9819c4522896dcbd8452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-prowcplugins-product-time-countdown-for-woocommerce-bd8410</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ProWCPlugins%20Product%20Time%20Countdown%20for%20WooCommerce&amp;severity=null&amp;id=682d9819c4522896dcbd8410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47504-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfactory-custom-checkout-fields-for-woocommerce-bd840c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Custom%20Checkout%20Fields%20for%20WooCommerce&amp;severity=null&amp;id=682d9819c4522896dcbd840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47503-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpo-hr-ngg-smart-image-search-bd8408</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo-HR%20NGG%20Smart%20Image%20Search&amp;severity=null&amp;id=682d9818c4522896dcbd8408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47502-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nick-mollie-forms-bd8404</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20van%20Wobbie%20Mollie%20Forms&amp;severity=null&amp;id=682d9818c4522896dcbd8404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47501-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-code-atlantic-content-control-bd83fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Content%20Control&amp;severity=null&amp;id=682d9818c4522896dcbd83fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47499-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeff-starr-simple-blog-stats-bd83fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Simple%20Blog%20Stats&amp;severity=null&amp;id=682d9818c4522896dcbd83fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47498-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-nicdark-hotel-booking-bd9544</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47498%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=682d981ac4522896dcbd9544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47497-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themepoints-logo-showcase-bd953c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Logo%20Showcase&amp;severity=null&amp;id=682d981ac4522896dcbd953c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47496-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-publishpress-publishpress-authors-bd9534</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PublishPress%20PublishPress%20Authors&amp;severity=null&amp;id=682d981ac4522896dcbd9534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47495-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-blockspare-blockspare-bd952e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blockspare%20Blockspare&amp;severity=medium&amp;id=682d981ac4522896dcbd952e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47494-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ashan-perera-eventon-bd952a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47494%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=682d981ac4522896dcbd952a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47493-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ultimate-blocks-ultimate-blocks-bd9510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ultimate%20Blocks%20Ultimate%20Blocks&amp;severity=medium&amp;id=682d981ac4522896dcbd9510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47491-cwe-352-cross-site-request-forgery-csrf-in-a-wp-life-contact-form-widget-bd8396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47491%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Contact%20Form%20Widget&amp;severity=null&amp;id=682d9818c4522896dcbd8396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47490-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-rustaurius-ultimate-wp-mail-bd8392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47490%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=682d9818c4522896dcbd8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47489-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-markkinchin-beds24-online-booking-bd838c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=682d9818c4522896dcbd838c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47488-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boldthemes-bold-page-builder-bd8388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=682d9818c4522896dcbd8388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47486-cwe-862-missing-authorization-in-cyberchimps-gutenberg-elementor-templates-importer-for-responsive-bd8384</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47486%3A%20Missing%20Authorization%20in%20CyberChimps%20Responsive%20Plus&amp;severity=null&amp;id=682d9818c4522896dcbd8384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47485-cwe-862-missing-authorization-in-cozythemes-cozy-blocks-bd8380</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47485%3A%20Missing%20Authorization%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=682d9818c4522896dcbd8380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47484-cwe-918-server-side-request-forgery-ssrf-in-oliver-campion-display-remote-posts-block-bd836f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47484%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Oliver%20Campion%20Display%20Remote%20Posts%20Block&amp;severity=null&amp;id=682d9818c4522896dcbd836f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47483-cwe-918-server-side-request-forgery-ssrf-in-iulia-cazan-easy-replace-image-bd83e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47483%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Iulia%20Cazan%20Easy%20Replace%20Image&amp;severity=null&amp;id=682d9818c4522896dcbd83e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47482-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sonalsinha21-skt-skill-bar-bd8360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=null&amp;id=682d9818c4522896dcbd8360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47481-cwe-94-improper-control-of-generation-of-code-code-injection-in-gs-plugins-gs-testimonial-slider-bd835a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47481%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GS%20Plugins%20GS%20Testimonial%20Slider&amp;severity=null&amp;id=682d9818c4522896dcbd835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47480-cwe-862-missing-authorization-in-iqonic-design-graphina-bd9508</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47480%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20Graphina&amp;severity=null&amp;id=682d981ac4522896dcbd9508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47476-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-add-ons-org-cost-calculator-for-elementor-bd94e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47476%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20Cost%20Calculator%20for%20Elementor&amp;severity=null&amp;id=682d981ac4522896dcbd94e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47475-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-artbees-jupiterx-core-bd94e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47475%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20JupiterX%20Core&amp;severity=null&amp;id=682d981ac4522896dcbd94e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47473-cwe-352-cross-site-request-forgery-csrf-in-pimwick-pw-woocommerce-bulk-edit-bd94e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pimwick%20PW%20WooCommerce%20Bulk%20Edit&amp;severity=null&amp;id=682d981ac4522896dcbd94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47472-cwe-862-missing-authorization-in-codepeople-music-player-for-woocommerce-bd94dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47472%3A%20Missing%20Authorization%20in%20codepeople%20Music%20Player%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd94dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47471-cwe-862-missing-authorization-in-envothemes-envo-extra-bd94c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47471%3A%20Missing%20Authorization%20in%20EnvoThemes%20Envo%20Extra&amp;severity=null&amp;id=682d981ac4522896dcbd94c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47470-cwe-352-cross-site-request-forgery-csrf-in-senols-gpt3-ai-content-writer-bd94ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47470%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20senols%20GPT3%20AI%20Content%20Writer&amp;severity=null&amp;id=682d981ac4522896dcbd94ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47469-cwe-862-missing-authorization-in-slui-media-hygiene-bd94b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47469%3A%20Missing%20Authorization%20in%20slui%20Media%20Hygiene&amp;severity=null&amp;id=682d981ac4522896dcbd94b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47468-cwe-352-cross-site-request-forgery-csrf-in-hashthemes-hash-form-bd8356</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47468%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hashthemes%20Hash%20Form&amp;severity=null&amp;id=682d9818c4522896dcbd8356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47467-cwe-862-missing-authorization-in-gs-plugins-gs-testimonial-slider-bd9101</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47467%3A%20Missing%20Authorization%20in%20GS%20Plugins%20GS%20Testimonial%20Slider&amp;severity=null&amp;id=682d981ac4522896dcbd9101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47466-cwe-352-cross-site-request-forgery-csrf-in-rustaurius-ultimate-wp-mail-bd90f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47466%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=682d981ac4522896dcbd90f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47465-cwe-862-missing-authorization-in-creativethemes-blocksy-bd90f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47465%3A%20Missing%20Authorization%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=682d981ac4522896dcbd90f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47464-cwe-918-server-side-request-forgery-ssrf-in-solacewp-solace-extra-bd90d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47464%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20solacewp%20Solace%20Extra&amp;severity=null&amp;id=682d981ac4522896dcbd90d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47462-cwe-352-cross-site-request-forgery-csrf-in-ohidul-islam-challan-bd90cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WebAppick%20Challan&amp;severity=null&amp;id=682d981ac4522896dcbd90cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47460-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-trackship-trackship-for-woocommerce-bd90c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47460%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TrackShip%20TrackShip%20for%20WooCommerce&amp;severity=null&amp;id=682d981ac4522896dcbd90c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47459-cwe-352-cross-site-request-forgery-csrf-in-xpeedstudio-wp-fundraising-donation-and-crowdfunding-platform-bd90b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47459%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Roxnor%20FundEngine&amp;severity=null&amp;id=682d981ac4522896dcbd90b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47457-cwe-862-missing-authorization-in-dgamoni-locateandfilter-bd9855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47457%3A%20Missing%20Authorization%20in%20dgamoni%20LocateAndFilter&amp;severity=null&amp;id=682d981bc4522896dcbd9855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47456-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-crm-perks-wp-gravity-forms-zendesk-bd90ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47456%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Zendesk&amp;severity=null&amp;id=682d981ac4522896dcbd90ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47455-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-crm-perks-integration-for-woocommerce-and-salesforce-bd9490</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47455%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20Integration%20for%20WooCommerce%20and%20Salesforce&amp;severity=null&amp;id=682d981ac4522896dcbd9490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47454-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-crm-perks-wp-gravity-forms-dynamics-crm-bd9488</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47454%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20CRM%20Perks%20WP%20Gravity%20Forms%20Dynamics%20CRM&amp;severity=null&amp;id=682d981ac4522896dcbd9488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47451-cwe-352-cross-site-request-forgery-csrf-in-silverplugins217-product-quantity-dropdown-for-woocommerce-bd9480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silverplugins217%20Product%20Quantity%20Dropdown%20For%20Woocommerce&amp;severity=null&amp;id=682d981ac4522896dcbd9480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47450-cwe-862-missing-authorization-in-mitchell-bennis-simple-file-list-bd9478</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47450%3A%20Missing%20Authorization%20in%20Mitchell%20Bennis%20Simple%20File%20List&amp;severity=null&amp;id=682d981ac4522896dcbd9478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47449-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jordy-meow-meow-gallery-bd90a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Meow%20Gallery&amp;severity=null&amp;id=682d981ac4522896dcbd90a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47448-cwe-352-cross-site-request-forgery-csrf-in-thimpress-wp-hotel-booking-bd909c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47448%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=null&amp;id=682d981ac4522896dcbd909c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47447-cwe-352-cross-site-request-forgery-csrf-in-hossni-mubarak-cool-author-box-bd9094</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47447%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20Cool%20Author%20Box&amp;severity=null&amp;id=682d981ac4522896dcbd9094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47446-cwe-352-cross-site-request-forgery-csrf-in-listamester-listamester-bd907f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47446%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20listamester%20Listamester&amp;severity=medium&amp;id=682d981ac4522896dcbd907f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47443-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdevart-widget-countdown-bd906e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Widget%20Countdown&amp;severity=null&amp;id=682d981ac4522896dcbd906e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47442-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cc-cc-bmi-calculator-bd905f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CC%20CC%20BMI%20Calculator&amp;severity=null&amp;id=682d981ac4522896dcbd905f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47441-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-chris-reynolds-progress-bar-bd9057</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Reynolds%20Progress%20Bar&amp;severity=null&amp;id=682d981ac4522896dcbd9057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47440-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-greg-winiarski-wpadverts-bd9051</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47440%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=682d981ac4522896dcbd9051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47439-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wp-chill-download-monitor-bd904d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47439%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Chill%20Download%20Monitor&amp;severity=null&amp;id=682d981ac4522896dcbd904d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36791-vulnerability-in-linux-linux-bd988c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d981bc4522896dcbd988c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33093-cwe-260-password-in-configuration-file-in-ibm-sterling-partner-engagement-manager-bd9bb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33093%3A%20CWE-260%20Password%20in%20Configuration%20File%20in%20IBM%20Sterling%20Partner%20Engagement%20Manager&amp;severity=high&amp;id=682d981bc4522896dcbd9bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-cyber-actors-impersonate-model-agency-in-s-85b0a71a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20Cyber%20Actors%20Impersonate%20Model%20Agency%20in%20Suspected%20Espionage%20Operation&amp;severity=medium&amp;id=6842bf60182aa0cae20b29d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4104-cwe-285-improper-authorization-in-vinoth06-frontend-dashboard-bd9bfc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4104%3A%20CWE-285%20Improper%20Authorization%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=critical&amp;id=682d981bc4522896dcbd9bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39361-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wproyal-royal-elementor-addons-bd9ac4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=682d981bc4522896dcbd9ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27533-cwe-789-memory-allocation-with-excessive-size-value-in-apache-software-foundation-apache-activemq-bd995f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27533%3A%20CWE-789%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ&amp;severity=medium&amp;id=682d981bc4522896dcbd995f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20980-cwe-787-out-of-bounds-write-in-samsung-mobile-libsavscmn-bd8962</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20980%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavscmn&amp;severity=medium&amp;id=682d9819c4522896dcbd8962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20979-cwe-787-out-of-bounds-write-in-samsung-mobile-libsavscmn-bd895e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20979%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20libsavscmn&amp;severity=high&amp;id=682d9819c4522896dcbd895e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20978-cwe-284-improper-access-control-in-samsung-mobile-penup-bd9957</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20978%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20PENUP&amp;severity=medium&amp;id=682d981bc4522896dcbd9957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20977-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-samsung-notes-bd9951</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20977%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=low&amp;id=682d981bc4522896dcbd9951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20976-cwe-125-out-of-bounds-read-in-samsung-mobile-samsung-notes-bd98a5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20976%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=medium&amp;id=682d981bc4522896dcbd98a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20975-cwe-926-improper-export-of-android-application-components-in-samsung-mobile-aodservice-bd9851</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20975%3A%20CWE-926%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20AODService&amp;severity=medium&amp;id=682d981bc4522896dcbd9851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20974-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-packageinstallercn-bd984d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20974%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20PackageInstallerCN&amp;severity=medium&amp;id=682d981bc4522896dcbd984d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20973-cwe-287-improper-authentication-in-samsung-mobile-secure-folder-bd97f6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20973%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Secure%20Folder&amp;severity=medium&amp;id=682d981ac4522896dcbd97f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20972-cwe-925-improper-verification-of-intent-by-broadcast-receiver-in-samsung-mobile-samsung-flow-bd9771</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20972%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Flow&amp;severity=medium&amp;id=682d981ac4522896dcbd9771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20971-cwe-20-improper-input-validation-in-samsung-mobile-samsung-flow-bd9750</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20971%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Flow&amp;severity=medium&amp;id=682d981ac4522896dcbd9750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20970-cwe-284-improper-access-control-in-samsung-mobile-bixby-vision-bd96ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20970%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Bixby%20Vision&amp;severity=medium&amp;id=682d981ac4522896dcbd96ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20969-cwe-20-improper-input-validation-in-samsung-mobile-samsung-gallery-bd96c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20969%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=medium&amp;id=682d981ac4522896dcbd96c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20968-cwe-284-improper-access-control-in-samsung-mobile-samsung-gallery-bd9607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20968%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=high&amp;id=682d981ac4522896dcbd9607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20967-cwe-284-improper-access-control-in-samsung-mobile-samsung-gallery-bd9603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20967%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=medium&amp;id=682d981ac4522896dcbd9603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20966-cwe-284-improper-access-control-in-samsung-mobile-samsung-gallery-bd95ff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20966%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Gallery&amp;severity=medium&amp;id=682d981ac4522896dcbd95ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20965-cwe-280-improper-handling-of-insufficient-permissions-in-samsung-mobile-voice-wake-up-bd9469</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20965%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20in%20Samsung%20Mobile%20Voice%20wake-up&amp;severity=medium&amp;id=682d981ac4522896dcbd9469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20964-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-aecc70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20964%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682cd0fc1484d88663aecc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20963-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-bd9442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20963%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd9442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20962-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bd943a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20962%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd943a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20961-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-samsung-mobile-devices-bd90c5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20961%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd90c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20960-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bd9045</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20960%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd9045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20959-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd9013</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20959%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd9013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20958-cwe-925-improper-verification-of-intent-by-broadcast-receiver-in-samsung-mobile-samsung-mobile-devices-bd900f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20958%3A%20CWE-925%3A%20Improper%20Verification%20of%20Intent%20by%20Broadcast%20Receiver%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd900f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20957-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd8fa7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20957%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=682d981ac4522896dcbd8fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20956-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd8f38</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20956%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20955-cwe-926-improper-export-of-android-application-components-in-samsung-mobile-samsung-mobile-devices-bd8ec6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20955%3A%20CWE-926%20%3A%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20954-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-samsung-mobile-devices-bd8ebe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20954%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20953-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd8e2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20953%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d981ac4522896dcbd8e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20949-cwe-35-path-traversal-39-39-in-samsung-mobile-samsung-members-bd8e27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20949%3A%20CWE-35%3A%20Path%20Traversal%3A%20%26%2339%3B...%2F...%2F%2F%26%2339%3B%20in%20Samsung%20Mobile%20Samsung%20Members&amp;severity=medium&amp;id=682d981ac4522896dcbd8e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20937-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-bd895a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20937%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9819c4522896dcbd895a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0669-cwe-352-cross-site-request-forgery-csrf-in-boinc-boinc-server-bd9927</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0669%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BOINC%20BOINC%20Server&amp;severity=high&amp;id=682d981bc4522896dcbd9927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0668-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-boinc-boinc-server-bd991f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0668%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BOINC%20BOINC%20Server&amp;severity=critical&amp;id=682d981bc4522896dcbd991f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0667-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-boinc-boinc-server-bd9917</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20BOINC%20BOINC%20Server&amp;severity=high&amp;id=682d981bc4522896dcbd9917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0666-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-boinc-boinc-server-bd9911</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20BOINC%20BOINC%20Server&amp;severity=high&amp;id=682d981bc4522896dcbd9911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12120-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wproyal-royal-elementor-addons-and-templates-bd990d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=682d981bc4522896dcbd990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4171-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ajay-wz-followed-posts-display-what-visitors-are-reading-bd9a15</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4171%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajay%20WZ%20Followed%20Posts%20%E2%80%93%20Display%20what%20visitors%20are%20reading&amp;severity=medium&amp;id=682d981bc4522896dcbd9a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32405-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32405%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd99be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32404-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32404%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd99ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32403-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32403%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd99b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32402-cwe-787-out-of-bounds-write-in-rt-labs-p-net-bd99b2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32402%3A%20CWE-787%20Out-of-bounds%20Write%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd99b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32401-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd99ae</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32401%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd99ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32400-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd99aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32400%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd99aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32399-cwe-606-unchecked-input-for-loop-condition-in-rt-labs-p-net-bd9995</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32399%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20RT-Labs%20P-Net&amp;severity=medium&amp;id=682d981bc4522896dcbd9995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32398-cwe-476-null-pointer-dereference-in-rt-labs-p-net-bd9991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32398%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd9991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32397-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd9984</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32397%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd9984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32396-cwe-122-heap-based-buffer-overflow-in-rt-labs-p-net-bd9980</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32396%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20RT-Labs%20P-Net&amp;severity=high&amp;id=682d981bc4522896dcbd9980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1400-cwe-125-out-of-bounds-read-in-libplctag-libplctag-bd994d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1400%3A%20CWE-125%20Out-of-bounds%20Read%20in%20libplctag%20libplctag&amp;severity=low&amp;id=682d981bc4522896dcbd994d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1399-cwe-125-out-of-bounds-read-in-libplctag-libplctag-bd992f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1399%3A%20CWE-125%20Out-of-bounds%20Read%20in%20libplctag%20libplctag&amp;severity=low&amp;id=682d981bc4522896dcbd992f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3766-cwe-862-missing-authorization-in-webfactory-login-lockdown-protection-bd9be3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3766%3A%20CWE-862%20Missing%20Authorization%20in%20webfactory%20Login%20Lockdown%20%26%20Protection&amp;severity=medium&amp;id=682d981bc4522896dcbd9be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4054-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-msaari-relevanssi-a-better-search-bd9bf8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20msaari%20Relevanssi%20%E2%80%93%20A%20Better%20Search&amp;severity=medium&amp;id=682d981bc4522896dcbd9bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4220-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xavinnydek-xavin-039-s-list-subpages-bd9c00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xavinnydek%20Xavin%26%23039%3Bs%20List%20Subpages&amp;severity=medium&amp;id=682d981bc4522896dcbd9c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3860-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dealertrend-cardealerpress-bd99f0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dealertrend%20CarDealerPress&amp;severity=medium&amp;id=682d981bc4522896dcbd99f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4055-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-josj404-multiple-post-type-order-bd9a11</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20josj404%20Multiple%20Post%20Type%20Order&amp;severity=medium&amp;id=682d981bc4522896dcbd9a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3921-cwe-285-improper-authorization-in-peprodev-peprodev-ultimate-profile-solutions-bd99f4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3921%3A%20CWE-285%20Improper%20Authorization%20in%20peprodev%20PeproDev%20Ultimate%20Profile%20Solutions&amp;severity=high&amp;id=682d981bc4522896dcbd99f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3852-cwe-269-improper-privilege-management-in-eoxia-wpshop-2-e-commerce-bd99ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3852%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20eoxia%20WPshop%202%20%E2%80%93%20E-Commerce&amp;severity=high&amp;id=682d981bc4522896dcbd99ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4335-cwe-269-improper-privilege-management-in-n3wnormal-woocommerce-multiple-addresses-bd9a19</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4335%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20n3wnormal%20Woocommerce%20Multiple%20Addresses&amp;severity=high&amp;id=682d981bc4522896dcbd9a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3924-cwe-285-improper-authorization-in-peprodev-peprodev-ultimate-profile-solutions-bd9a01</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3924%3A%20CWE-285%20Improper%20Authorization%20in%20peprodev%20PeproDev%20Ultimate%20Profile%20Solutions&amp;severity=medium&amp;id=682d981bc4522896dcbd9a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3844-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-peprodev-peprodev-ultimate-profile-solutions-bd99c2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3844%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20peprodev%20PeproDev%20Ultimate%20Profile%20Solutions&amp;severity=critical&amp;id=682d981bc4522896dcbd99c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3851-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-themesgrove-download-manager-and-payment-form-wordpress-plugin-wp-smartpay-bd99c6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3851%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themesgrove%20Download%20Manager%20and%20Payment%20Form%20WordPress%20Plugin%20%E2%80%93%20WP%20SmartPay&amp;severity=medium&amp;id=682d981bc4522896dcbd99c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2821-cwe-862-missing-authorization-in-quadlayers-search-exclude-bd996f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2821%3A%20CWE-862%20Missing%20Authorization%20in%20quadlayers%20Search%20Exclude&amp;severity=medium&amp;id=682d981bc4522896dcbd996f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3853-cwe-639-authorization-bypass-through-user-controlled-key-in-eoxia-wpshop-2-e-commerce-bd99ce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3853%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20eoxia%20WPshop%202%20%E2%80%93%20E-Commerce&amp;severity=medium&amp;id=682d981bc4522896dcbd99ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3218-cwe-295-improper-certificate-validation-in-ibm-i-bd9bdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3218%3A%20CWE-295%20Improper%20Certificate%20Validation&amp;severity=medium&amp;id=682d981bc4522896dcbd9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29152-n-a-in-n-a-bd9ab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29152%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29153-n-a-in-n-a-bd9967</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29153%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47423-cwe-24-path-traversal-filedir-in-pwsdashboard-personal-weather-station-dashboard-bd8cdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47423%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20pwsdashboard%20Personal%20Weather%20Station%20Dashboard&amp;severity=medium&amp;id=682d9819c4522896dcbd8cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26169-cwe-732-incorrect-permission-assignment-for-critical-resource-in-ixon-vpn-client-bd8cca</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26169%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IXON%20VPN%20Client&amp;severity=high&amp;id=682d9819c4522896dcbd8cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26168-cwe-732-incorrect-permission-assignment-for-critical-resource-in-ixon-vpn-client-bd8cc6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26168%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20IXON%20VPN%20Client&amp;severity=high&amp;id=682d9819c4522896dcbd8cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29746-n-a-in-n-a-bd8548</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29746%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29602-n-a-in-n-a-bd8230</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29602%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd8230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29154-n-a-in-n-a-bd822c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29154%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd822c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45388-n-a-in-n-a-bd7af5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45388%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45514-n-a-in-n-a-bd69aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45514%3A%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29448-n-a-in-n-a-bd699a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29448%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd699a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47203-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dropbear-ssh-project-dropbear-ssh-aeb88e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47203%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dropbear%20SSH%20Project%20Dropbear%20SSH&amp;severity=medium&amp;id=682cd0f81484d88663aeb88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-07-2a1889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-07&amp;severity=medium&amp;id=682c7db2e8347ec82d2a1889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-07-f12bb6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0856-cwe-862-missing-authorization-in-potenza-global-solutions-pgs-core-bd9bb5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0856%3A%20CWE-862%20Missing%20Authorization%20in%20Potenza%20Global%20Solutions%20PGS%20Core&amp;severity=high&amp;id=682d981bc4522896dcbd9bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0855-cwe-502-deserialization-of-untrusted-data-in-potenza-global-solutions-pgs-core-bd9bb1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0855%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Potenza%20Global%20Solutions%20PGS%20Core&amp;severity=critical&amp;id=682d981bc4522896dcbd9bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4372-use-after-free-in-google-chrome-bd89a8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4372%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9819c4522896dcbd89a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47420-cwe-269-improper-privilege-management-in-crestron-automate-vx-bd9a0b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47420%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Crestron%20Automate%20VX&amp;severity=high&amp;id=682d981bc4522896dcbd9a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0853-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-potenza-global-solutions-pgs-core-bd9bad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0853%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Potenza%20Global%20Solutions%20PGS%20Core&amp;severity=high&amp;id=682d981bc4522896dcbd9bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47419-cwe-319-cleartext-transmission-of-sensitive-information-in-crestron-automate-vx-bd9a09</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47419%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Crestron%20Automate%20VX&amp;severity=critical&amp;id=682d981bc4522896dcbd9a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cogui-phish-kit-targets-japan-with-millions-of-messages-16a085</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CoGUI%20Phish%20Kit%20Targets%20Japan%20with%20Millions%20of%20Messages&amp;severity=medium&amp;id=682c992c7960f6956616a085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46573-cwe-287-improper-authentication-in-auth0-passport-wsfed-saml2-bd9758</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46573%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20passport-wsfed-saml2&amp;severity=high&amp;id=682d981ac4522896dcbd9758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0649-cwe-121-in-google-tensorflow-bd9db0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0649%3A%20CWE-121%20in%20Google%20Tensorflow&amp;severity=high&amp;id=682d981bc4522896dcbd9db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46572-cwe-287-improper-authentication-in-auth0-passport-wsfed-saml2-aecc81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46572%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20passport-wsfed-saml2&amp;severity=critical&amp;id=682cd0fc1484d88663aecc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47418-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-crestron-automate-vx-bd9a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47418%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Crestron%20Automate%20VX&amp;severity=medium&amp;id=682d981bc4522896dcbd9a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12225-authentication-bypass-using-an-alternate-path-or-channel-bd81fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12225%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&amp;severity=critical&amp;id=682d9818c4522896dcbd81fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47417-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-crestron-automate-vx-bd8234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47417%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Crestron%20Automate%20VX&amp;severity=medium&amp;id=682d9818c4522896dcbd8234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt36-style-clickfix-attack-spoofs-indian-ministry-7b8a5642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT36-Style%20ClickFix%20Attack%20Spoofs%20Indian%20Ministry%20to%20Target%20Windows%20%26%20Linux&amp;severity=medium&amp;id=6841ec57182aa0cae2ed1ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46820-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-phpgt-dom-bda0b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46820%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20phpgt%20Dom&amp;severity=high&amp;id=682d981bc4522896dcbda0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46816-cwe-284-improper-access-control-in-patrickhener-goshs-bd9f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46816%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20patrickhener%20goshs&amp;severity=critical&amp;id=682d981bc4522896dcbd9f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4388-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-liferay-portal-bd9f22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682d981bc4522896dcbd9f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25014-cwe-1321-in-elastic-kibana-bd9d27</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25014%3A%20CWE-1321%20in%20Elastic%20Kibana&amp;severity=critical&amp;id=682d981bc4522896dcbd9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37730-cwe-295-in-elastic-logstash-bda2ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37730%3A%20CWE-295%20in%20Elastic%20Logstash&amp;severity=medium&amp;id=682d981cc4522896dcbda2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46815-cwe-613-insufficient-session-expiration-in-zitadel-zitadel-bda280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46815%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20zitadel%20zitadel&amp;severity=high&amp;id=682d981cc4522896dcbda280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46736-cwe-204-observable-response-discrepancy-in-umbraco-umbraco-cms-bd9f1c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46736%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20umbraco%20Umbraco-CMS&amp;severity=medium&amp;id=682d981bc4522896dcbd9f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46735-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-nrkno-terraform-provider-windns-bd9edd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46735%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20nrkno%20terraform-provider-windns&amp;severity=low&amp;id=682d981bc4522896dcbd9edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32022-cwe-787-out-of-bounds-write-in-troglobit-finit-bda31c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32022%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20troglobit%20finit&amp;severity=medium&amp;id=682d981cc4522896dcbda31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30165-cwe-502-deserialization-of-untrusted-data-in-vllm-project-vllm-bda304</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30165%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm&amp;severity=high&amp;id=682d981cc4522896dcbda304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4041-cwe-798-use-of-hard-coded-credentials-in-optigo-networks-ons-nc600-bda30c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4041%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Optigo%20Networks%20ONS%20NC600&amp;severity=critical&amp;id=682d981cc4522896dcbda30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22476-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-dell-dell-storage-center-dell-storage-manager-bda2da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22476%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=medium&amp;id=682d981cc4522896dcbda2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22477-cwe-287-improper-authentication-in-dell-dell-storage-center-dell-storage-manager-bd8966</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22477%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd8966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4384-cwe-298-improper-validation-of-certificate-expiration-in-arcinfo-pcvue-aec186</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4384%3A%20CWE-298%20Improper%20Validation%20of%20Certificate%20Expiration%20in%20arcinfo%20PcVue&amp;severity=medium&amp;id=682cd0fa1484d88663aec186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22478-cwe-611-improper-restriction-of-xml-external-entity-reference-in-dell-dell-storage-center-dell-storage-manager-bd8983</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22478%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd8983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22479-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-dell-dell-storage-center-dell-storage-manager-bda0f3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22479%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=low&amp;id=682d981bc4522896dcbda0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4368-buffer-overflow-in-tenda-ac8-bda4c2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4368%3A%20Buffer%20Overflow%20in%20Tenda%20AC8&amp;severity=high&amp;id=682d981cc4522896dcbda4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4363-sql-injection-in-itsourcecode-gym-management-system-bda3d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4363%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23379-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dell-dell-storage-center-dell-storage-manager-bda442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23379%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Dell%20Storage%20Center%20-%20Dell%20Storage%20Manager&amp;severity=low&amp;id=682d981cc4522896dcbda442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4362-sql-injection-in-itsourcecode-gym-management-system-bd9ec1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4362%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981bc4522896dcbd9ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46814-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-rennf93-fastapi-guard-bd9e99</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46814%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20rennf93%20fastapi-guard&amp;severity=low&amp;id=682d981bc4522896dcbd9e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4374-incorrect-privilege-assignment-in-red-hat-red-hat-quay-3-bd9ec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4374%3A%20Incorrect%20Privilege%20Assignment%20in%20Project%20Quay%20quay&amp;severity=medium&amp;id=682d981bc4522896dcbd9ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4373-buffer-underwrite-buffer-underflow-in-red-hat-red-hat-enterprise-linux-6-bda591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4373%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)&amp;severity=medium&amp;id=682d981cc4522896dcbda591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2898-cwe-266-incorrect-privilege-assignment-in-ibm-maximo-application-suite-bd9d4b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2898%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=high&amp;id=682d981bc4522896dcbd9d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4361-sql-injection-in-phpgurukul-company-visitor-management-system-bda61d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4361%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4360-sql-injection-in-itsourcecode-gym-management-system-bda619</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4360%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4359-sql-injection-in-itsourcecode-gym-management-system-bda79e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4359%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4358-sql-injection-in-phpgurukul-company-visitor-management-system-aec77b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4358%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4357-command-injection-in-tenda-rx3-bda730</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4357%3A%20Command%20Injection%20in%20Tenda%20RX3&amp;severity=medium&amp;id=682d981cc4522896dcbda730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4356-stack-based-buffer-overflow-in-tenda-dap-1520-bdaa71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4356%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20DAP-1520&amp;severity=high&amp;id=682d981cc4522896dcbdaa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4355-heap-based-buffer-overflow-in-tenda-dap-1520-bdaaf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4355%3A%20Heap-based%20Buffer%20Overflow%20in%20Tenda%20DAP-1520&amp;severity=high&amp;id=682d981cc4522896dcbdaaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4354-stack-based-buffer-overflow-in-tenda-dap-1520-bdaac6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4354%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20DAP-1520&amp;severity=high&amp;id=682d981cc4522896dcbdaac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4353-sql-injection-in-golden-link-secondary-system-bdaac0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4353%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4352-sql-injection-in-golden-link-secondary-system-bdaaa0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4352%3A%20SQL%20Injection%20in%20Brilliance%20Golden%20Link%20Secondary%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4350-command-injection-in-d-link-dir-600l-bdaa96</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4350%3A%20Command%20Injection%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbdaa96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4349-command-injection-in-d-link-dir-600l-bdaa6d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4349%3A%20Command%20Injection%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbdaa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0984-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-netoloji-software-e-flow-bda9fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0984%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Netoloji%20Software%20E-Flow&amp;severity=high&amp;id=682d981cc4522896dcbda9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4348-buffer-overflow-in-d-link-dir-600l-bdaa5c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4348%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbdaa5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lampion-is-back-with-clickfix-lures-6d7266e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lampion%20Is%20Back%20With%20ClickFix%20Lures&amp;severity=medium&amp;id=68416df7182aa0cae2d97f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40625-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-tcman-gim-bd9c0c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40625%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981bc4522896dcbd9c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40624-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda80b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40624%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40623-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda611</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40623%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40622-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda60d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40622%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40621-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda550</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40621%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40620-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tcman-gim-bda54c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40620%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TCMAN%20GIM&amp;severity=critical&amp;id=682d981cc4522896dcbda54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4347-buffer-overflow-in-d-link-dir-600l-bda58d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4347%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4346-buffer-overflow-in-d-link-dir-600l-bda587</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4346%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4345-buffer-overflow-in-d-link-dir-600l-bda530</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4345%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4344-buffer-overflow-in-d-link-dir-600l-bda88f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4344%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3782-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cyclonecode-cision-block-bda803</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3782%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyclonecode%20Cision%20Block&amp;severity=medium&amp;id=682d981cc4522896dcbda803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2011-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-averta-popup-and-slider-builder-by-depicter-add-email-collecting-popup-popup-modal-coupon-popup-image-slider-carousel-slider-post-slider-carousel-bd9b48</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2011%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20averta%20Popup%20and%20Slider%20Builder%20by%20Depicter%20%E2%80%93%20Add%20Email%20collecting%20Popup%2C%20Popup%20Modal%2C%20Coupon%20Popup%2C%20Image%20Slider%2C%20Carousel%20Slider%2C%20Post%20Slider%20Carousel&amp;severity=high&amp;id=682d981bc4522896dcbd9b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46762-cwe-73-external-control-of-file-name-or-path-in-apache-software-foundation-apache-parquet-java-bd9d4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46762%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Apache%20Software%20Foundation%20Apache%20Parquet%20Java&amp;severity=high&amp;id=682d981bc4522896dcbd9d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25052-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-openharmony-openharmony-bda68f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25052%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27241-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bda653</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27241%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27248-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bda5f6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27248%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22886-cwe-401-missing-release-of-memory-after-effective-lifetime-in-openharmony-openharmony-bda5e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22886%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27132-cwe-787-out-of-bounds-write-in-openharmony-openharmony-bda5e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27132%3A%20CWE-787%20Out-of-bounds%20Write%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4343-buffer-overflow-in-d-link-dir-600l-bda615</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4343%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25218-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bda4e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25218%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=low&amp;id=682d981cc4522896dcbda4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21475-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bd9d16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21475%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21470-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-bd9d0e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21470%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21469-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-bd9d06</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21469%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21468-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9cfe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21468%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21467-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9cfa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21467%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21462-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9cf6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21462%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21460-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9ce5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21460%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21459-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bda49f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21459%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981cc4522896dcbda49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21453-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9cdd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21453%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49847-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bda337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49847%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981cc4522896dcbda337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49846-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bda40c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49846%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981cc4522896dcbda40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49845-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9cd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49845%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49844-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9caf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49844%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49842-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-bd9cab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49842%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49841-cwe-390-detection-of-error-condition-without-action-in-qualcomm-inc-snapdragon-bd8ff2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49841%3A%20CWE-390%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981ac4522896dcbd8ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49835-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9c9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49835%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49830-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-qualcomm-inc-snapdragon-bd9c9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49830%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49829-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-qualcomm-inc-snapdragon-bd9c96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49829%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45583-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45583%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45581-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bd9c8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45581%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45579-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9c8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45579%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45578-cwe-129-improper-validation-of-array-index-in-qualcomm-inc-snapdragon-bd9c86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45578%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45577-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd9c82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45577%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45576-cwe-129-improper-validation-of-array-index-in-qualcomm-inc-snapdragon-bd9c65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45576%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45575-cwe-190-integer-overflow-or-wraparound-in-qualcomm-inc-snapdragon-bd9c61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45575%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45574-cwe-129-improper-validation-of-array-index-in-qualcomm-inc-snapdragon-bd9c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45574%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45570-cwe-823-use-of-out-of-range-pointer-offset-in-qualcomm-inc-snapdragon-bdaa7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45570%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981cc4522896dcbdaa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45568-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-bd9c59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45568%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981bc4522896dcbd9c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45567-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45567%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45566-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45566%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45565-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-qualcomm-inc-snapdragon-bd9c44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45565%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45564-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45564%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45563-cwe-787-out-of-bounds-write-in-qualcomm-inc-snapdragon-bda9a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45563%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981cc4522896dcbda9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45562-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bda99c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45562%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d981cc4522896dcbda99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45554-cwe-416-use-after-free-in-qualcomm-inc-snapdragon-bd9c2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45554%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d981bc4522896dcbd9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4342-buffer-overflow-in-d-link-dir-600l-bda9f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4342%3A%20Buffer%20Overflow%20in%20D-Link%20DIR-600L&amp;severity=high&amp;id=682d981cc4522896dcbda9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4341-command-injection-in-d-link-dir-880l-bda9ed</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4341%3A%20Command%20Injection%20in%20D-Link%20DIR-880L&amp;severity=medium&amp;id=682d981cc4522896dcbda9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3020-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wiesemann-theis-erp-gateway-12x-digital-input-6x-digital-relais-bda923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wiesemann%20%26%20Theis%20ERP-Gateway%2012x%20Digital%20Input%2C%206x%20Digital%20Relais&amp;severity=medium&amp;id=682d981cc4522896dcbda923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4340-command-injection-in-d-link-dir-890l-bda994</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4340%3A%20Command%20Injection%20in%20D-Link%20DIR-890L&amp;severity=medium&amp;id=682d981cc4522896dcbda994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4333-unrestricted-upload-in-feng-ha-ha-ssm-erp-bda98c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4333%3A%20Unrestricted%20Upload%20in%20feng_ha_ha%20ssm-erp&amp;severity=medium&amp;id=682d981cc4522896dcbda98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4332-sql-injection-in-phpgurukul-company-visitor-management-system-bda964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4332%3A%20SQL%20Injection%20in%20PHPGurukul%20Company%20Visitor%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4331-sql-injection-in-sourcecodester-online-student-clearance-system-aeb08a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4331%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Student%20Clearance%20System&amp;severity=medium&amp;id=682cd0f71484d88663aeb08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3281-cwe-639-authorization-bypass-through-user-controlled-key-in-wpeverest-user-registration-membership-custom-registration-form-login-form-and-user-profile-bdaa82</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3281%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile&amp;severity=medium&amp;id=682d981cc4522896dcbdaa82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46593-cwe-264-permissions-privileges-and-access-controls-in-huawei-harmonyos-bdaa8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46593%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46592-cwe-476-null-pointer-dereference-in-huawei-harmonyos-bdaa86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46592%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46591-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-huawei-harmonyos-bdaa18</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46591%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46590-cwe-287-improper-authentication-in-huawei-harmonyos-bdaa14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46590%3A%20CWE-287%20Improper%20Authentication%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbdaa14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46589-cwe-199-information-management-errors-in-huawei-harmonyos-bda943</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46589%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46588-cwe-199-information-management-errors-in-huawei-harmonyos-bda914</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46588%3A%20CWE-284%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58252-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-huawei-harmonyos-bda8e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58252%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46587-cwe-264-permissions-privileges-and-access-controls-in-huawei-harmonyos-bda8f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46587%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46586-cwe-264-permissions-privileges-and-access-controls-in-huawei-harmonyos-bda8d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46586%3A%20CWE-862%20Missing%20Authorization%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d981cc4522896dcbda8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46585-cwe-787-out-of-bounds-write-in-huawei-harmonyos-bda8cc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46585%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d981cc4522896dcbda8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46584-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-huawei-harmonyos-bda8ac</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46584%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d981cc4522896dcbda8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4329-path-traversal-in-74cms-bda8dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4329%3A%20Path%20Traversal%20in%2074CMS&amp;severity=medium&amp;id=682d981cc4522896dcbda8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4328-open-redirect-in-fp2952-spring-cloud-base-bda885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4328%3A%20Open%20Redirect%20in%20fp2952%20spring-cloud-base&amp;severity=medium&amp;id=682d981cc4522896dcbda885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4327-cross-site-request-forgery-in-mrcms-bda881</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4327%3A%20Cross-Site%20Request%20Forgery%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4326-cross-site-scripting-in-mrcms-bda9d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4326%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda9d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4325-cross-site-scripting-in-mrcms-bda9ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4325%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4324-cross-site-scripting-in-mrcms-bda953</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4324%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4323-cross-site-scripting-in-mrcms-bda94b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4323%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbda94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4314-sql-injection-in-sourcecodester-advanced-web-store-bda8d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4314%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20Web%20Store&amp;severity=medium&amp;id=682d981cc4522896dcbda8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4313-sql-injection-in-sourcecodester-advanced-web-store-bda728</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4313%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20Web%20Store&amp;severity=medium&amp;id=682d981cc4522896dcbda728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2802-cwe-94-improper-control-of-generation-of-code-code-injection-in-layoutboxx-layoutboxx-bda7fd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2802%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20layoutboxx%20LayoutBoxx&amp;severity=high&amp;id=682d981cc4522896dcbda7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4337-cwe-352-cross-site-request-forgery-csrf-in-mitchelllevy-ahathat-plugin-bda88b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4337%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mitchelllevy%20AHAthat%20Plugin&amp;severity=medium&amp;id=682d981cc4522896dcbda88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4312-sql-injection-in-sourcecodester-advanced-web-store-bda87d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4312%3A%20SQL%20Injection%20in%20SourceCodester%20Advanced%20Web%20Store&amp;severity=medium&amp;id=682d981cc4522896dcbda87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4311-sql-injection-in-itsourcecode-content-management-system-bda864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4311%3A%20SQL%20Injection%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4310-unrestricted-upload-in-itsourcecode-content-management-system-bda860</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4310%3A%20Unrestricted%20Upload%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4309-sql-injection-in-phpgurukul-art-gallery-management-system-bda6a4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4309%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4308-sql-injection-in-phpgurukul-art-gallery-management-system-bdaa54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4308%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaa54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4307-sql-injection-in-phpgurukul-art-gallery-management-system-bdacdd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4307%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4306-sql-injection-in-phpgurukul-nipah-virus-testing-management-system-bdacd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4306%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3609-cwe-863-incorrect-authorization-in-pixel-prime-reales-wp-stpt-bdac7c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3609%3A%20CWE-863%20Incorrect%20Authorization%20in%20pixel_prime%20Reales%20WP%20STPT&amp;severity=medium&amp;id=682d981cc4522896dcbdac7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3610-cwe-639-authorization-bypass-through-user-controlled-key-in-pixel-prime-reales-wp-stpt-bdac84</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3610%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20pixel_prime%20Reales%20WP%20STPT&amp;severity=high&amp;id=682d981cc4522896dcbdac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4305-unrestricted-upload-in-kefaming-mayi-bdacd5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4305%3A%20Unrestricted%20Upload%20in%20kefaming%20mayi&amp;severity=medium&amp;id=682d981cc4522896dcbdacd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4304-sql-injection-in-phpgurukul-cyber-cafe-management-system-bdaccf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4304%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39442-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc7731e-sc9832e-sc9863a-t310-t606-t612-t616-t610-t618-t750-t765-t760-t770-t820-s8000-t8300-t9300-bdac6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39442%3A%20cwe-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT750%2FT765%2FT760%2FT770%2FT820%2FS8000%2FT8300%2FT9300&amp;severity=medium&amp;id=682d981cc4522896dcbdac6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4303-sql-injection-in-phpgurukul-human-metapneumovirus-testing-management-system-bdacc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4303%3A%20SQL%20Injection%20in%20PHPGurukul%20Human%20Metapneumovirus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2509-memory-corruption-in-google-chromeos-bd8085</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2509%3A%20Memory%20Corruption%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46728-cwe-400-uncontrolled-resource-consumption-in-yhirose-cpp-httplib-bdac8c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46728%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20yhirose%20cpp-httplib&amp;severity=high&amp;id=682d981cc4522896dcbdac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4301-sql-injection-in-itsourcecode-content-management-system-bdaa33</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4301%3A%20SQL%20Injection%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4300-sql-injection-in-itsourcecode-content-management-system-bdaa2d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4300%3A%20SQL%20Injection%20in%20itsourcecode%20Content%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdaa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4299-buffer-overflow-in-tenda-ac1206-bdaa29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4299%3A%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=high&amp;id=682d981cc4522896dcbdaa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/casdoor-19010-cross-site-request-forgery-csrf-3f563af4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Casdoor%201.901.0%20-%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=68489e217e6d765d51d53fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grokability-snipe-it-804-insecure-direct-object-re-5b4347f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grokability%20Snipe-IT%208.0.4%20-%20Insecure%20Direct%20Object%20Reference%20(IDOR)&amp;severity=medium&amp;id=68489e1b7e6d765d51d53eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erpnext-14821-account-takeover-via-cross-site-requ-3abf1c3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ERPNext%2014.82.1%20-%20Account%20Takeover%20via%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=68489e157e6d765d51d53e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-06-ccbbd8f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-06&amp;severity=medium&amp;id=68367c97182aa0cae231c77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45487-n-a-in-n-a-bd9e7a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45487%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45492-n-a-in-n-a-bd9e5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45492%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45490-n-a-in-n-a-bd9e2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45490%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45489-n-a-in-n-a-bd9e2b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45489%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45488-n-a-in-n-a-bd9e25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45488%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47256-cwe-191-integer-underflow-wrap-or-wraparound-in-libxmp-libxmp-bd9dd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47256%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Libxmp%20Libxmp&amp;severity=medium&amp;id=682d981bc4522896dcbd9dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45250-n-a-in-n-a-bd9dd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45250%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44900-n-a-in-n-a-bd9dce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44900%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26262-n-a-in-n-a-bd9dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26262%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44073-n-a-in-n-a-bd9c04</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45491-n-a-in-n-a-bd9bf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45491%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44899-n-a-in-n-a-bd9be7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44899%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33770-n-a-in-n-a-bd81f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33770%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd81f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-06-73db44</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-06&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73db44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-06-f12ebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4298-buffer-overflow-in-tenda-ac1206-bdacb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4298%3A%20Buffer%20Overflow%20in%20Tenda%20AC1206&amp;severity=high&amp;id=682d981cc4522896dcbdacb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4297-sql-injection-in-phpgurukul-men-salon-management-system-bdacb1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4297%3A%20SQL%20Injection%20in%20PHPGurukul%20Men%20Salon%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbdacb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4293-cross-site-scripting-in-mrcms-bdacad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4293%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbdacad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4292-cross-site-scripting-in-mrcms-bdaca9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4292%3A%20Cross%20Site%20Scripting%20in%20MRCMS&amp;severity=medium&amp;id=682d981cc4522896dcbdaca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4291-unrestricted-upload-in-ideacms-bdaca5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4291%3A%20Unrestricted%20Upload%20in%20IdeaCMS&amp;severity=medium&amp;id=682d981cc4522896dcbdaca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4290-buffer-overflow-in-pcman-ftp-server-bdac65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4290%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbdac65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4289-buffer-overflow-in-pcman-ftp-server-bdac5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4289%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbdac5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1493-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-ibm-db2-for-linux-unix-and-windows-aeba5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1493%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682cd0f91484d88663aeba5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0915-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ibm-db2-for-linux-unix-and-windows-bdabdb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0915%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d981cc4522896dcbdabdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1000-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ibm-db2-for-linux-unix-and-windows-bdabe5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1000%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d981cc4522896dcbdabe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4288-buffer-overflow-in-pcman-ftp-server-bdaa25</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4288%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbdaa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46813-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bda9b9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46813%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d981cc4522896dcbda9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4287-denial-of-service-in-pytorch-bda9cc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4287%3A%20Denial%20of%20Service%20in%20PyTorch&amp;severity=medium&amp;id=682d981cc4522896dcbda9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46734-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thephpleague-commonmark-bda9b5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46734%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thephpleague%20commonmark&amp;severity=medium&amp;id=682d981cc4522896dcbda9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1909-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-buddyboss-buddyboss-platform-pro-bdadae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1909%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BuddyBoss%20BuddyBoss%20Platform%20Pro&amp;severity=critical&amp;id=682d981dc4522896dcbdadae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46731-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-craftcms-cms-bdadd5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46731%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20craftcms%20cms&amp;severity=high&amp;id=682d981dc4522896dcbdadd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46730-cwe-409-improper-handling-of-highly-compressed-data-data-amplification-in-mobsf-mobile-security-framework-mobsf-bdadcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46730%3A%20CWE-409%3A%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=medium&amp;id=682d981dc4522896dcbdadcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4286-unprotected-storage-of-credentials-in-intelbras-incontrol-bdaddd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4286%3A%20Unprotected%20Storage%20of%20Credentials%20in%20Intelbras%20InControl&amp;severity=medium&amp;id=682d981dc4522896dcbdaddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46726-cwe-611-improper-restriction-of-xml-external-entity-reference-in-langroid-langroid-bdadb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46726%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20langroid%20langroid&amp;severity=high&amp;id=682d981dc4522896dcbdadb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42213-cwe-531-inclusion-of-sensitive-information-in-test-code-in-hcl-software-hcl-bigfix-compliance-bdae55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42213%3A%20CWE-531%20Inclusion%20of%20Sensitive%20Information%20in%20Test%20Code%20in%20HCL%20Software%20HCL%20BigFix%20Compliance&amp;severity=medium&amp;id=682d981dc4522896dcbdae55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46720-cwe-203-observable-discrepancy-in-keystonejs-keystone-bdae83</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46720%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20keystonejs%20keystone&amp;severity=low&amp;id=682d981dc4522896dcbdae83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46719-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-open-webui-open-webui-bdae5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46719%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20open-webui%20open-webui&amp;severity=medium&amp;id=682d981dc4522896dcbdae5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46571-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-open-webui-open-webui-bdae76</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46571%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20open-webui%20open-webui&amp;severity=medium&amp;id=682d981dc4522896dcbdae76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42212-cwe-1275-sensitive-cookie-with-improper-samesite-attribute-in-hcl-software-hcl-bigfix-compliance-bdae4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42212%3A%20CWE-1275%20%20Sensitive%20Cookie%20with%20Improper%20SameSite%20Attribute%20in%20HCL%20Software%20HCL%20BigFix%20Compliance&amp;severity=medium&amp;id=682d981dc4522896dcbdae4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46559-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-misskey-dev-misskey-bdaf20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46559%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20misskey-dev%20misskey&amp;severity=medium&amp;id=682d981dc4522896dcbdaf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46340-cwe-20-improper-input-validation-in-misskey-dev-misskey-bdaf1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46340%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20misskey-dev%20misskey&amp;severity=high&amp;id=682d981dc4522896dcbdaf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4283-sql-injection-in-sourcecodester-stock-management-system-bdaedd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4283%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682d981dc4522896dcbdaedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46553-cwe-693-protection-mechanism-failure-in-misskey-dev-summaly-bdaed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46553%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20misskey-dev%20summaly&amp;severity=low&amp;id=682d981dc4522896dcbdaed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46335-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mobsf-mobile-security-framework-mobsf-bdaf30</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46335%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MobSF%20Mobile-Security-Framework-MobSF&amp;severity=high&amp;id=682d981dc4522896dcbdaf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4279-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-muromuro-external-image-replace-bdaf34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4279%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20muromuro%20External%20image%20replace&amp;severity=high&amp;id=682d981dc4522896dcbdaf34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43852-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43852%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43851-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaed1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43851%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43850-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaecd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43850%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43849-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaec9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43849%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4318-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-amazon-amplify-studio-bdae87</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4318%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Amazon%20Amplify%20Studio&amp;severity=critical&amp;id=682d981dc4522896dcbdae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4052-inappropriate-implementation-in-google-chrome-bda9bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4052%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=critical&amp;id=682d981cc4522896dcbda9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4051-insufficient-data-validation-in-google-chrome-bda0f7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4051%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981bc4522896dcbda0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4050-out-of-bounds-memory-access-in-google-chrome-bdac44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4050%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbdac44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4096-heap-buffer-overflow-in-google-chrome-bdac55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4096%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbdac55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4282-cross-site-request-forgery-in-sourcecodester-stock-management-system-bdae65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4282%3A%20Cross-Site%20Request%20Forgery%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682d981dc4522896dcbdae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43848-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdafd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43848%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdafd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43847-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaf2c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43847%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaf2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43846-cwe-502-deserialization-of-untrusted-data-in-rvc-project-retrieval-based-voice-conversion-webui-bdaf28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43846%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43845-cwe-94-improper-control-of-generation-of-code-code-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bdaf24</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43845%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdaf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43844-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bda753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43844%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981cc4522896dcbda753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43843-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bdb09e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43843%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdb09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43842-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-rvc-project-retrieval-based-voice-conversion-webui-bdb09a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43842%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20RVC-Project%20Retrieval-based-Voice-Conversion-WebUI&amp;severity=high&amp;id=682d981dc4522896dcbdb09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24977-cwe-94-improper-control-of-generation-of-code-code-injection-in-opencti-platform-opencti-bdb028</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24977%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OpenCTI-Platform%20opencti&amp;severity=critical&amp;id=682d981dc4522896dcbdb028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51991-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-octobercms-october-bdb00b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51991%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20octobercms%20october&amp;severity=low&amp;id=682d981dc4522896dcbdb00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0217-cwe-287-improper-authentication-in-beyondtrust-privileged-remote-access-bdb0de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0217%3A%20CWE-287%20Improper%20Authentication%20in%20BeyondTrust%20Privileged%20Remote%20Access&amp;severity=high&amp;id=682d981dc4522896dcbdb0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1992-cwe-401-missing-release-of-memory-after-effective-lifetime-in-ibm-db2-for-linux-unix-and-windows-bdb0e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1992%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d981dc4522896dcbdb0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11615-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-themekalia-envolve-plugin-bdbd55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11615%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThemeKalia%20Envolve%20Plugin&amp;severity=medium&amp;id=682d981ec4522896dcbdbd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4281-information-disclosure-in-shenzhen-sixun-software-sixun-shanghui-group-business-management-system-bdc032</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4281%3A%20Information%20Disclosure%20in%20Shenzhen%20Sixun%20Software%20Sixun%20Shanghui%20Group%20Business%20Management%20System&amp;severity=medium&amp;id=682d981ec4522896dcbdc032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58237-vulnerability-in-linux-linux-bd7b94</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58100-vulnerability-in-linux-linux-bd7b8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58098-vulnerability-in-linux-linux-bd7b71</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4316-cwe-284-improper-access-control-in-devolutions-server-aecb4f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4316%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Devolutions%20Server&amp;severity=medium&amp;id=682cd0fc1484d88663aecb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2545-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-best-practical-solutions-request-tracker-bdcc78</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2545%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Best%20Practical%20Solutions%20Request%20Tracker&amp;severity=low&amp;id=682d981fc4522896dcbdcc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4272-uncontrolled-search-path-in-mechrevo-control-console-bdcc74</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4272%3A%20Uncontrolled%20Search%20Path%20in%20Mechrevo%20Control%20Console&amp;severity=high&amp;id=682d981fc4522896dcbdcc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2905-cwe-611-improper-restriction-of-xml-external-entity-reference-in-wso2-wso2-api-manager-bdcc5d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2905%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=critical&amp;id=682d981fc4522896dcbdcc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4271-information-disclosure-in-totolink-a720r-bdcbe5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4271%3A%20Information%20Disclosure%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4270-information-disclosure-in-totolink-a720r-bdcbba</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4270%3A%20Information%20Disclosure%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4269-improper-access-controls-in-totolink-a720r-bdcbb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4269%3A%20Improper%20Access%20Controls%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4268-missing-authentication-in-totolink-a720r-bdcafd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4268%3A%20Missing%20Authentication%20in%20TOTOLINK%20A720R&amp;severity=medium&amp;id=682d981fc4522896dcbdcafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39363-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-alphaefficiencyteam-custom-login-and-registration-bdcaf5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlphaEfficiencyTeam%20Custom%20Login%20and%20Registration&amp;severity=medium&amp;id=682d981fc4522896dcbdcaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4267-sql-injection-in-sourcecodester-stock-management-system-bdcaf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4267%3A%20SQL%20Injection%20in%20SourceCodester%20Stock%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdcaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3583-cwe-79-cross-site-scripting-xss-in-unknown-newsletter-bdca3b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3583%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Newsletter&amp;severity=low&amp;id=682d981fc4522896dcbdca3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4266-sql-injection-in-phpgurukul-notice-board-system-bdca59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4266%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdca59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4265-sql-injection-in-phpgurukul-emergency-ambulance-hiring-portal-bdca55</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4265%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=682d981fc4522896dcbdca55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4264-sql-injection-in-phpgurukul-emergency-ambulance-hiring-portal-bdc980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4264%3A%20SQL%20Injection%20in%20PHPGurukul%20Emergency%20Ambulance%20Hiring%20Portal&amp;severity=medium&amp;id=682d981fc4522896dcbdc980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4263-sql-injection-in-phpgurukul-online-dj-booking-management-system-bdc877</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4263%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20DJ%20Booking%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4262-sql-injection-in-phpgurukul-online-dj-booking-management-system-bdc847</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4262%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20DJ%20Booking%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4261-code-injection-in-gair-nlp-factool-bdc7cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4261%3A%20Code%20Injection%20in%20GAIR-NLP%20factool&amp;severity=medium&amp;id=682d981fc4522896dcbdc7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20665-cwe-538-file-and-directory-information-exposure-in-mediatek-inc-mt6580-mt6761-mt6765-mt6768-mt6779-mt6781-mt6785-mt6789-mt6833-mt6835-mt6853-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6886-mt6889-mt6893-mt6895-mt6983-mt6985-mt8175-mt8195-mt8196-mt8321-mt8365-mt8370-mt8385-mt8390-mt8395-mt8666-mt8667-mt8673-mt8678-mt8765-mt8766-mt8768-mt8771-mt8775-mt8781-mt8786-mt8788-mt8788e-mt8789-mt8791t-mt8795t-mt8796-mt8797-mt8798-mt8893-bd6a2a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20665%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8175%2C%20MT8195%2C%20MT8196%2C%20MT8321%2C%20MT8365%2C%20MT8370%2C%20MT8385%2C%20MT8390%2C%20MT8395%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791T%2C%20MT8795T%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8893&amp;severity=medium&amp;id=682d9816c4522896dcbd6a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20670-cwe-295-improper-certificate-validation-in-mediatek-inc-mt2737-mt6813-mt6835-mt6835t-mt6878-mt6878m-mt6879-mt6886-mt6895-mt6895tt-mt6896-mt6897-mt6899-mt6980-mt6980d-mt6983-mt6983t-mt6985-mt6985t-mt6989-mt6989t-mt6990-mt6991-mt8666-mt8667-mt8673-mt8675-mt8676-mt8678-mt8765-mt8766-mt8768-mt8771-mt8781-mt8786-mt8788-mt8788e-mt8789-mt8791-mt8791t-mt8795t-mt8797-mt8798-bd6a79</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20670%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6813%2C%20MT6835%2C%20MT6835T%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6886%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9816c4522896dcbd6a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20668-cwe-787-out-of-bounds-write-in-mediatek-inc-mt6878-mt6897-mt6899-mt6989-mt6991-mt8775-mt8796-bd97e1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20668%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6878%2C%20MT6897%2C%20MT6899%2C%20MT6989%2C%20MT6991%2C%20MT8775%2C%20MT8796&amp;severity=medium&amp;id=682d981ac4522896dcbd97e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20671-cwe-787-out-of-bounds-write-in-mediatek-inc-mt2718-mt6878-mt6897-mt6899-mt6989-mt6991-mt8196-mt8391-mt8676-mt8678-bd97a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20671%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2718%2C%20MT6878%2C%20MT6897%2C%20MT6899%2C%20MT6989%2C%20MT6991%2C%20MT8196%2C%20MT8391%2C%20MT8676%2C%20MT8678&amp;severity=medium&amp;id=682d981ac4522896dcbd97a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20667-cwe-326-inadequate-encryption-strength-in-mediatek-inc-mt2735-mt2737-mt6739-mt6761-mt6762-mt6762d-mt6762m-mt6763-mt6765-mt6765t-mt6767-mt6768-mt6769-mt6769k-mt6769s-mt6769t-mt6769z-mt6771-mt6779-mt6781-mt6783-mt6785-mt6785t-mt6785u-mt6789-mt6813-mt6833-mt6833p-mt6835-mt6835t-mt6853-mt6853t-mt6855-mt6855t-mt6873-mt6875-mt6875t-mt6877-mt6877t-mt6877tt-mt6878-mt6878m-mt6879-mt6880-mt6883-mt6885-mt6886-mt6889-mt6890-mt6891-mt6893-mt6895-mt6895tt-mt6896-mt6897-mt6899-mt6980-mt6980d-mt6983-mt6983t-mt6985-mt6985t-mt6989-mt6989t-mt6990-mt6991-mt8666-mt8667-mt8675-mt8676-mt8765-mt8766-mt8768-mt8771-mt8781-mt8786-mt8788-mt8788e-mt8789-mt8791-mt8791t-mt8797-bd6ac3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20667%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8676%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=682d9816c4522896dcbd6ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20666-cwe-617-reachable-assertion-in-mediatek-inc-mt2735-mt6833-mt6833p-mt6853-mt6853t-mt6855-mt6855t-mt6873-mt6875-mt6875t-mt6877-mt6877t-mt6877tt-mt6880-mt6883-mt6885-mt6889-mt6890-mt6891-mt6893-mt8666-mt8667-mt8673-mt8675-mt8771-mt8791-mt8791t-mt8795t-mt8797-mt8798-bd6a75</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20666%3A%20CWE-617%20Reachable%20Assertion%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8771%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9816c4522896dcbd6a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4260-deserialization-in-zhangyanbo2007-youkefu-bdcae3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4260%3A%20Deserialization%20in%20zhangyanbo2007%20youkefu&amp;severity=medium&amp;id=682d981fc4522896dcbdcae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4259-unrestricted-upload-in-newbee-mall-bdcadf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4259%3A%20Unrestricted%20Upload%20in%20newbee-mall&amp;severity=medium&amp;id=682d981fc4522896dcbdcadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4258-unrestricted-upload-in-zhangyanbo2007-youkefu-bdcabb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4258%3A%20Unrestricted%20Upload%20in%20zhangyanbo2007%20youkefu&amp;severity=medium&amp;id=682d981fc4522896dcbdcabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4273-bdcc97</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4273&amp;severity=low&amp;id=682d9820c4522896dcbdcc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4257-cross-site-scripting-in-seacms-bd870f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4257%3A%20Cross%20Site%20Scripting%20in%20SeaCMS&amp;severity=medium&amp;id=682d9819c4522896dcbd870f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4256-cross-site-scripting-in-seacms-bdca0a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4256%3A%20Cross%20Site%20Scripting%20in%20SeaCMS&amp;severity=medium&amp;id=682d981fc4522896dcbdca0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4255-buffer-overflow-in-pcman-ftp-server-bda85c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4255%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45042-n-a-in-n-a-bdc78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45042%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27921-n-a-in-n-a-bdc685</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27921%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45322-n-a-in-n-a-bdc4ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45322%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45321-n-a-in-n-a-bdc4e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45321%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57232-n-a-in-n-a-bdb0da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57232%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57231-n-a-in-n-a-bdb0bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57231%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57229-n-a-in-n-a-bdb0b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57229%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45242-n-a-in-n-a-bdb0b3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45242%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45240-n-a-in-n-a-bdb0a4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45240%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57235-n-a-in-n-a-bdb089</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26241-n-a-in-n-a-bdb085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26241%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25504-n-a-in-n-a-bdb081</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25504%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57234-n-a-in-n-a-bdb06a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57234%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57233-n-a-in-n-a-bdb066</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57230-n-a-in-n-a-bdb062</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57230%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47268-cwe-190-integer-overflow-or-wraparound-in-iputils-iputils-bdacf2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47268%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20iputils%20iputils&amp;severity=medium&amp;id=682d981cc4522896dcbdacf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45618-n-a-in-n-a-bdac3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45618%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbdac3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45617-n-a-in-n-a-bdac34</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45617%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45616-n-a-in-n-a-bdac16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45616%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdac16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45615-n-a-in-n-a-bdac12</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45615%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdac12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45614-n-a-in-n-a-bdac0e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45614%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdac0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45237-n-a-in-n-a-bdac0a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45237%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdac0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45236-n-a-in-n-a-bdac06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbdac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44074-n-a-in-n-a-bdac02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44074%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdac02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44072-n-a-in-n-a-bdabfe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdabfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44071-n-a-in-n-a-bdabed</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbdabed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45613-n-a-in-n-a-bdaa05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45613%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbdaa05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45612-n-a-in-n-a-bda93b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45612%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45611-n-a-in-n-a-bda933</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45611%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45610-n-a-in-n-a-bda92b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45610%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45609-n-a-in-n-a-bda927</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45609%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45608-n-a-in-n-a-bda8ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45608%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45607-n-a-in-n-a-bda8e8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45607%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29573-n-a-in-n-a-bda8e4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29573%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45238-n-a-in-n-a-bda8aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45238%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45320-n-a-in-n-a-bd9b4c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45751-n-a-in-n-a-bd8fda</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45751%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd8fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28168-cwe-602-client-side-enforcement-of-server-side-security-in-multi-uploaders-multiple-file-upload-bd8331</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28168%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Multi%20Uploaders%20Multiple%20File%20Upload&amp;severity=medium&amp;id=682d9818c4522896dcbd8331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45239-n-a-in-n-a-aecc9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45239%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28062-n-a-in-n-a-aecc8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28062%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fc1484d88663aecc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43915-n-a-in-n-a-aeb6e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43915%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-05-2a20de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-05&amp;severity=medium&amp;id=682c7db2e8347ec82d2a20de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-05-f11fc7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4254-buffer-overflow-in-pcman-ftp-server-bda858</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4254%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4253-buffer-overflow-in-pcman-ftp-server-bda854</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4253%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4252-buffer-overflow-in-pcman-ftp-server-bda850</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4252%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4251-buffer-overflow-in-pcman-ftp-server-bda843</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4251%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4250-sql-injection-in-code-projects-nero-social-networking-site-bda8d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4250%3A%20SQL%20Injection%20in%20code-projects%20Nero%20Social%20Networking%20Site&amp;severity=medium&amp;id=682d981cc4522896dcbda8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4249-sql-injection-in-phpgurukul-e-diary-management-system-bda83f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4249%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4248-sql-injection-in-sourcecodester-simple-to-do-list-system-bdc9f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4248%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20To-Do%20List%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4247-sql-injection-in-sourcecodester-simple-to-do-list-system-bdc9eb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4247%3A%20SQL%20Injection%20in%20SourceCodester%20Simple%20To-Do%20List%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-04-ea6d35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-04&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea6d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-04-f12c76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4244-sql-injection-in-code-projects-online-bus-reservation-system-bdc9e7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4244%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bus%20Reservation%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4243-sql-injection-in-code-projects-online-bus-reservation-system-bdc96f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4243%3A%20SQL%20Injection%20in%20code-projects%20Online%20Bus%20Reservation%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdc96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4242-sql-injection-in-phpgurukul-online-birth-certificate-system-bda82e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4242%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1838-cwe-602-client-side-enforcement-of-server-side-security-in-ibm-cloud-pak-for-business-automation-bdc931</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1838%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=682d981fc4522896dcbdc931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4241-sql-injection-in-phpgurukul-teacher-subject-allocation-management-system-bda826</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4241%3A%20SQL%20Injection%20in%20PHPGurukul%20Teacher%20Subject%20Allocation%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4240-buffer-overflow-in-pcman-ftp-server-bda79a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4240%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4239-buffer-overflow-in-pcman-ftp-server-bda796</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4239%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1495-cwe-306-missing-authentication-for-critical-function-in-ibm-ibm-business-automation-workflow-bdc92d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1495%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20IBM%20IBM%20Business%20Automation%20Workflow&amp;severity=medium&amp;id=682d981fc4522896dcbdc92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4238-buffer-overflow-in-pcman-ftp-server-bda792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4238%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58134-cwe-321-use-of-hard-coded-cryptographic-key-in-sri-mojolicious-bd6a12</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58134%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20SRI%20Mojolicious&amp;severity=high&amp;id=682d9816c4522896dcbd6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41753-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-cloud-pak-for-business-automation-bdc929</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Business%20Automation&amp;severity=medium&amp;id=682d981fc4522896dcbdc929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4237-buffer-overflow-in-pcman-ftp-server-bda78e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4237%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4236-buffer-overflow-in-pcman-ftp-server-bda763</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4236%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37799-vulnerability-in-linux-linux-bdcc93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4226-sql-injection-in-phpgurukul-cyber-cafe-management-system-bda75b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4226%3A%20SQL%20Injection%20in%20PHPGurukul%20Cyber%20Cafe%20Management%20System&amp;severity=medium&amp;id=682d981cc4522896dcbda75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58135-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-sri-mojolicious-bd6a16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58135%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20SRI%20Mojolicious&amp;severity=medium&amp;id=682d9816c4522896dcbd6a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3815-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-devsoftbaltic-surveyjs-drag-drop-wordpress-form-builder-to-create-style-and-embed-multiple-forms-of-any-complexity-bdc939</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20WordPress%20Form%20Builder%20to%20create%2C%20style%20and%20embed%20multiple%20forms%20of%20any%20complexity&amp;severity=medium&amp;id=682d981fc4522896dcbdc939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/venom-spider-uses-server-side-polymorphism-to-weav-81ce9eda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Venom%20Spider%20Uses%20Server-Side%20Polymorphism%20to%20Weave%20a%20Web%20Around%20Victims&amp;severity=medium&amp;id=683d16f3182aa0cae230aeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13738-cwe-94-improper-control-of-generation-of-code-code-injection-in-stylemixthemes-motors-car-dealer-rental-listing-wordpress-theme-bda745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13738%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20StylemixThemes%20Motors%20-%20Car%20Dealer%2C%20Rental%20%26%20Listing%20WordPress%20theme&amp;severity=high&amp;id=682d981cc4522896dcbda745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4222-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-neoslab-database-toolset-bd5f8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4222%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20neoslab%20Database%20Toolset&amp;severity=medium&amp;id=682d9815c4522896dcbd5f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3779-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-personizely-a-b-testing-popups-website-personalization-email-popup-exit-intent-pop-up-upsell-pop-up-personizely-bdc935</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20personizely%20A%2FB%20Testing%2C%20Popups%2C%20Website%20Personalization%2C%20Email%20Popup%2C%20Exit%20Intent%20Pop%20Up%2C%20Upsell%20Pop%20Up%20%E2%80%93%20Personizely&amp;severity=medium&amp;id=682d981fc4522896dcbdc935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4199-cwe-352-cross-site-request-forgery-csrf-in-withinboredom-abundatrade-plugin-bdc941</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4199%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20withinboredom%20Abundatrade%20Plugin&amp;severity=medium&amp;id=682d981fc4522896dcbdc941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3918-cwe-285-improper-authorization-in-nootheme-job-listings-bda609</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3918%3A%20CWE-285%20Improper%20Authorization%20in%20nootheme%20Job%20Listings&amp;severity=critical&amp;id=682d981cc4522896dcbda609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4198-cwe-352-cross-site-request-forgery-csrf-in-todoapuestas-alink-tap-bdc93d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4198%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20todoapuestas%20Alink%20Tap&amp;severity=medium&amp;id=682d981fc4522896dcbdc93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4168-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-codework-subpage-list-bdc8ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4168%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20codework%20Subpage%20List&amp;severity=medium&amp;id=682d981fc4522896dcbdc8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4188-cwe-352-cross-site-request-forgery-csrf-in-balasahebbhise-advanced-reorder-image-text-slider-bdc91d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4188%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20balasahebbhise%20Advanced%20Reorder%20Image%20Text%20Slider&amp;severity=medium&amp;id=682d981fc4522896dcbdc91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4170-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xavinnydek-xavin-039-s-review-ratings-bdc8fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xavinnydek%20Xavin%26%23039%3Bs%20Review%20Ratings&amp;severity=medium&amp;id=682d981fc4522896dcbdc8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4172-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-katzwebdesign-verticalresponse-newsletter-widget-bdc8ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20katzwebdesign%20VerticalResponse%20Newsletter%20Widget&amp;severity=medium&amp;id=682d981fc4522896dcbdc8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47245-cwe-472-external-control-of-assumed-immutable-web-parameter-in-bluewave-checkmate-bdca75</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47245%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20BlueWave%20Checkmate&amp;severity=high&amp;id=682d981fc4522896dcbdca75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47244-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-inedo-proget-bdca71</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47244%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Inedo%20ProGet&amp;severity=high&amp;id=682d981fc4522896dcbdca71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47241-cwe-647-use-of-non-canonical-url-paths-for-authorization-decisions-in-browser-use-browser-use-bdc79c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47241%3A%20CWE-647%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20browser-use%20browser-use&amp;severity=medium&amp;id=682d981fc4522896dcbdc79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47229-cwe-617-reachable-assertion-in-gnu-pspp-bdc4f0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47229%3A%20CWE-617%20Reachable%20Assertion%20in%20GNU%20PSPP&amp;severity=low&amp;id=682d981fc4522896dcbdc4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-03-2a1d00</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-03&amp;severity=medium&amp;id=682c7db2e8347ec82d2a1d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-03-f1290c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f1290c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46723-cwe-131-incorrect-calculation-of-buffer-size-in-openvm-org-openvm-bda720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46723%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20openvm-org%20openvm&amp;severity=high&amp;id=682d981cc4522896dcbda720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21546-vulnerability-in-linux-linux-bd7b54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21572-opengrok-1-13-25-has-a-reflected-cross-site-scripting-xss-issue-when-producing-the-history-view-page-this-happens-through-improper-handling-of-path-segments-the-application-reflects-unsanitized-user-input-into-the-html-output-in-oracle-corporation-opengrok-bda5df</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21572%3A%20OpenGrok%201.13.25%20has%20a%20reflected%20Cross-Site%20Scripting%20(XSS)%20issue%20when%20producing%20the%20history%20view%20page.%20This%20happens%20through%20improper%20handling%20of%20path%20segments.%20The%20application%20reflects%20unsanitized%20user%20input%20into%20the%20HTML%20output.%20in%20Oracle%20Corporation%20OpenGrok&amp;severity=medium&amp;id=682d981cc4522896dcbda5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4218-code-injection-in-handrew-browserpilot-bdc967</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4218%3A%20Code%20Injection%20in%20handrew%20browserpilot&amp;severity=medium&amp;id=682d981fc4522896dcbdc967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4215-inefficient-regular-expression-complexity-in-gorhill-ublock-origin-bdc958</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4215%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20gorhill%20uBlock%20Origin&amp;severity=low&amp;id=682d981fc4522896dcbdc958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wget-to-wipeout-malicious-go-modules-fetch-destruc-31c87917</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=wget%20to%20Wipeout%3A%20Malicious%20Go%20Modules%20Fetch%20Destructive%20Payload&amp;severity=medium&amp;id=683cb462182aa0cae222541c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0782-aeb186</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0782&amp;severity=low&amp;id=682cd0f71484d88663aeb186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4214-sql-injection-in-phpguruku-online-dj-booking-management-system-beb989</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4214%3A%20SQL%20Injection%20in%20PHPGuruku%20Online%20DJ%20Booking%20Management%20System&amp;severity=medium&amp;id=682d9837c4522896dcbeb989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4213-sql-injection-in-phpgurukul-online-birth-certificate-system-bebd5f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4213%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46332-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-vercel-flags-bebdbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46332%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vercel%20flags&amp;severity=medium&amp;id=682d9838c4522896dcbebdbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3879-cwe-863-incorrect-authorization-in-hashicorp-vault-bebe91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3879%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=682d9838c4522896dcbebe91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53144-vulnerability-in-linux-linux-be711c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe711c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53143-vulnerability-in-linux-linux-be7116</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53142-vulnerability-in-linux-linux-be70f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53141-vulnerability-in-linux-linux-be70ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53140-vulnerability-in-linux-linux-be70dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53139-vulnerability-in-linux-linux-be70d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53138-vulnerability-in-linux-linux-be70cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53137-vulnerability-in-linux-linux-be70cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53136-vulnerability-in-linux-linux-be70c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53135-vulnerability-in-linux-linux-be70bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53134-vulnerability-in-linux-linux-be70ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe70ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53133-vulnerability-in-linux-linux-be70a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe70a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53132-vulnerability-in-linux-linux-be7086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53131-vulnerability-in-linux-linux-bdd9c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53130-bd8766</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53130&amp;severity=low&amp;id=682d9819c4522896dcbd8766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53129-bd8762</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53129&amp;severity=low&amp;id=682d9819c4522896dcbd8762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53128-vulnerability-in-linux-linux-be7082</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53127-vulnerability-in-linux-linux-be707e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe707e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53126-vulnerability-in-linux-linux-be707a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe707a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53125-vulnerability-in-linux-linux-be7076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53124-vulnerability-in-linux-linux-bdd9ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd9ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53123-vulnerability-in-linux-linux-be7072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53122-bd875e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53122&amp;severity=low&amp;id=682d9819c4522896dcbd875e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53121-vulnerability-in-linux-linux-be706e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe706e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53120-vulnerability-in-linux-linux-be706a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe706a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53119-vulnerability-in-linux-linux-be7066</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53118-vulnerability-in-linux-linux-bdd9a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53117-vulnerability-in-linux-linux-be7060</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53116-vulnerability-in-linux-linux-be704d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe704d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53115-vulnerability-in-linux-linux-be704b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53114-vulnerability-in-linux-linux-be703c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe703c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53113-vulnerability-in-linux-linux-bdd99a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53112-vulnerability-in-linux-linux-be7034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53111-vulnerability-in-linux-linux-be7023</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53110-vulnerability-in-linux-linux-be701b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe701b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53109-vulnerability-in-linux-linux-be7013</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53108-vulnerability-in-linux-linux-be700b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe700b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53107-vulnerability-in-linux-linux-be6ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53106-vulnerability-in-linux-linux-be6ff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53105-vulnerability-in-linux-linux-be6fdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53104-bd875a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53104&amp;severity=low&amp;id=682d9819c4522896dcbd875a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53103-vulnerability-in-linux-linux-be6fd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53102-vulnerability-in-linux-linux-be6fcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53101-vulnerability-in-linux-linux-be6fb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53100-vulnerability-in-linux-linux-be6fa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53099-vulnerability-in-linux-linux-bdd996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53098-vulnerability-in-linux-linux-be6fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53097-vulnerability-in-linux-linux-be6f99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53096-vulnerability-in-linux-linux-be6f91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53095-vulnerability-in-linux-linux-be6f87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53094-vulnerability-in-linux-linux-bdd992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53093-vulnerability-in-linux-linux-be6f74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53092-vulnerability-in-linux-linux-be6f52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53091-vulnerability-in-linux-linux-be6f4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53090-vulnerability-in-linux-linux-be6f42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53089-vulnerability-in-linux-linux-be6f38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53088-vulnerability-in-linux-linux-bdd98e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53087-vulnerability-in-linux-linux-be6f30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53086-vulnerability-in-linux-linux-be6f2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53085-vulnerability-in-linux-linux-be6f26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53084-vulnerability-in-linux-linux-bdd98a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53083-vulnerability-in-linux-linux-be6f0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53082-vulnerability-in-linux-linux-be6f04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53081-vulnerability-in-linux-linux-bdd986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53080-vulnerability-in-linux-linux-be6efc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53079-vulnerability-in-linux-linux-be6ee7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53078-vulnerability-in-linux-linux-bdd982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53077-vulnerability-in-linux-linux-be6ee3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53076-bdc9d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53076&amp;severity=low&amp;id=682d981fc4522896dcbdc9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53075-vulnerability-in-linux-linux-be6edf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53074-vulnerability-in-linux-linux-be6edb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53073-vulnerability-in-linux-linux-be6ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53072-vulnerability-in-linux-linux-be6ed3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53071-vulnerability-in-linux-linux-be6ecf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53070-vulnerability-in-linux-linux-bdd971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53069-vulnerability-in-linux-linux-be6ebe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53068-vulnerability-in-linux-linux-be6eb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53067-vulnerability-in-linux-linux-bd8486</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53066-vulnerability-in-linux-linux-be6eae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53065-vulnerability-in-linux-linux-be6e8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53064-vulnerability-in-linux-linux-bdd958</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53063-bd7195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53063&amp;severity=low&amp;id=682d9817c4522896dcbd7195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53062-vulnerability-in-linux-linux-be6e84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53061-vulnerability-in-linux-linux-be6e7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53060-vulnerability-in-linux-linux-bdd954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53059-vulnerability-in-linux-linux-be6e74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53058-vulnerability-in-linux-linux-be6e5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53057-vulnerability-in-linux-linux-be6e52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53056-vulnerability-in-linux-linux-be6e4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53055-vulnerability-in-linux-linux-bdd950</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53054-vulnerability-in-linux-linux-bdd94c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53053-vulnerability-in-linux-linux-be6e42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53052-vulnerability-in-linux-linux-be6e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53051-vulnerability-in-linux-linux-be6e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53050-vulnerability-in-linux-linux-be6e12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53049-vulnerability-in-linux-linux-be6e0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53048-vulnerability-in-linux-linux-be6e02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53047-vulnerability-in-linux-linux-be6dfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53046-vulnerability-in-linux-linux-be6de9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53045-vulnerability-in-linux-linux-be6dda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53044-vulnerability-in-linux-linux-be6dd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53043-vulnerability-in-linux-linux-be6dd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53042-vulnerability-in-linux-linux-be6dc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53041-vulnerability-in-linux-linux-be6dc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53040-vulnerability-in-linux-linux-be6dab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53039-vulnerability-in-linux-linux-be6da7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53038-vulnerability-in-linux-linux-be6da3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53037-vulnerability-in-linux-linux-bd704b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd704b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53036-vulnerability-in-linux-linux-be6d9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53035-vulnerability-in-linux-linux-be6d9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49933-aeb0e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49933&amp;severity=low&amp;id=682cd0f71484d88663aeb0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49932-vulnerability-in-linux-linux-be409d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe409d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4210-authorization-bypass-in-casdoor-bebe9f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4210%3A%20Authorization%20Bypass%20in%20Casdoor&amp;severity=medium&amp;id=682d9838c4522896dcbebe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1884-cwe-416-use-after-free-in-dassault-syst-mes-solidworks-edrawings-bebf9e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1884%3A%20CWE-416%20Use%20After%20Free%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=682d9838c4522896dcbebf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1883-cwe-787-out-of-bounds-write-in-dassault-syst-mes-solidworks-edrawings-bebf9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1883%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Dassault%20Syst%C3%A8mes%20SOLIDWORKS%20eDrawings&amp;severity=high&amp;id=682d9838c4522896dcbebf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4166-cwe-209-generation-of-error-message-containing-sensitive-information-in-hashicorp-vault-bd870b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4166%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20HashiCorp%20Vault&amp;severity=medium&amp;id=682d9819c4522896dcbd870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3927-cwe-1391-use-of-weak-credentials-in-digigram-pyko-out-bd6b8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3927%3A%20CWE-1391%3A%20Use%20of%20Weak%20Credentials%20in%20Digigram%20PYKO-OUT&amp;severity=critical&amp;id=682d9816c4522896dcbd6b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37798-vulnerability-in-linux-linux-be8484</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37797-vulnerability-in-linux-linux-be8477</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2605-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-honeywell-mb-secure-aeb8a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2605%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Honeywell%20MB-Secure&amp;severity=critical&amp;id=682cd0f81484d88663aeb8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4204-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-inception-software-llp-ultimate-auction-pro-bec156</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4204%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Inception%20Software%20LLP%20Ultimate%20Auction%20Pro&amp;severity=high&amp;id=682d9838c4522896dcbec156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2488-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-profelis-informatics-sambabox-bec22f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Profelis%20Informatics%20SambaBox&amp;severity=medium&amp;id=682d9838c4522896dcbec22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2421-cwe-94-improper-control-of-generation-of-code-code-injection-in-profelis-informatics-sambabox-bec22b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2421%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Profelis%20Informatics%20SambaBox&amp;severity=critical&amp;id=682d9838c4522896dcbec22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1301-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-yordam-informatics-library-automation-system-bec218</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Yordam%20Informatics%20Library%20Automation%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0427-cwe-416-use-after-free-in-arm-ltd-bifrost-gpu-kernel-driver-bd6ba8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0427%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=682d9816c4522896dcbd6ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0072-cwe-416-use-after-free-in-arm-ltd-valhall-gpu-kernel-driver-bd6ba0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0072%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=682d9816c4522896dcbd6ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2812-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mydata-informatics-ticket-sales-automation-bec20a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2812%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mydata%20Informatics%20Ticket%20Sales%20Automation&amp;severity=critical&amp;id=682d9838c4522896dcbec20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11142-cwe-352-cross-site-request-forgery-csrf-in-gosoft-software-proticaret-e-commerce-bec1d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11142%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Gosoft%20Software%20Proticaret%20E-Commerce&amp;severity=high&amp;id=682d9838c4522896dcbec1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13859-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boss-media-buddyboss-platform-bd7682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20Buddyboss%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13860-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boss-media-buddyboss-platform-bd7686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20Buddyboss%20Platform&amp;severity=medium&amp;id=682d9817c4522896dcbd7686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13858-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-boss-media-buddyboss-platform-bd7661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20BuddyBoss%20Theme&amp;severity=medium&amp;id=682d9817c4522896dcbd7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-stealc-you-tracking-the-rapid-changes-to-steal-e8a2025f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I%20StealC%20You%3A%20Tracking%20the%20Rapid%20Changes%20To%20Steal&amp;severity=medium&amp;id=683bef79182aa0cae2052660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3514-cwe-79-cross-site-scripting-xss-in-unknown-sureforms-bec0d8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3514%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SureForms&amp;severity=low&amp;id=682d9838c4522896dcbec0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3513-cwe-79-cross-site-scripting-xss-in-unknown-sureforms-bebf51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3513%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SureForms&amp;severity=low&amp;id=682d9838c4522896dcbebf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3438-cwe-269-improper-privilege-management-in-inspireui-mstore-api-create-native-android-ios-apps-on-the-cloud-bebf4d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3438%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=682d9838c4522896dcbebf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3488-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpml-wpml-bebf30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPML%20WPML&amp;severity=medium&amp;id=682d9838c4522896dcbebf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3858-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-michelegiorgi-formality-bebf1c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michelegiorgi%20Formality&amp;severity=medium&amp;id=682d9838c4522896dcbebf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1326-cwe-862-missing-authorization-in-fave-themes-homey-bebede</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1326%3A%20CWE-862%20Missing%20Authorization%20in%20Fave%20Themes%20Homey&amp;severity=medium&amp;id=682d9838c4522896dcbebede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13418-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-g5theme-benaa-framework-bec0c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13418%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20G5Theme%20Benaa%20Framework&amp;severity=high&amp;id=682d9838c4522896dcbec0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12023-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-fullservices-full-cliente-bec09a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12023%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fullservices%20FULL%20%E2%80%93%20Cliente&amp;severity=medium&amp;id=682d9838c4522896dcbec09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13420-cwe-94-improper-control-of-generation-of-code-code-injection-in-g5theme-benaa-framework-bec0bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13420%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20G5Theme%20Benaa%20Framework&amp;severity=medium&amp;id=682d9838c4522896dcbec0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13322-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-scripteo-ads-pro-plugin-multi-purpose-wordpress-advertising-manager-bec0b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13322%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scripteo%20Ads%20Pro%20Plugin%20-%20Multi-Purpose%20WordPress%20Advertising%20Manager&amp;severity=high&amp;id=682d9838c4522896dcbec0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1327-cwe-639-authorization-bypass-through-user-controlled-key-in-fave-themes-homey-bec08a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1327%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Fave%20Themes%20Homey&amp;severity=medium&amp;id=682d9838c4522896dcbec08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13344-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-smartcms-advance-seat-reservation-management-for-woocommerce-bec079</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13344%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20smartcms%20Advance%20Seat%20Reservation%20Management%20for%20WooCommerce&amp;severity=high&amp;id=682d9838c4522896dcbec079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3510-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tagdiv-tagdiv-composer-bec08e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=682d9838c4522896dcbec08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3748-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-realmag777-taxonomy-chain-menu-bec041</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20Taxonomy%20Chain%20Menu&amp;severity=medium&amp;id=682d9838c4522896dcbec041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13419-cwe-862-missing-authorization-in-g5theme-benaa-framework-bec039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13419%3A%20CWE-862%20Missing%20Authorization%20in%20G5Theme%20Benaa%20Framework&amp;severity=medium&amp;id=682d9838c4522896dcbec039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3709-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-flowring-technology-agentflow-bec03d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3709%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Flowring%20Technology%20Agentflow&amp;severity=critical&amp;id=682d9838c4522896dcbec03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3708-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-le-yan-le-show-bebee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3708%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Le-yan%20Le-show&amp;severity=critical&amp;id=682d9838c4522896dcbebee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3707-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sunnet-ehrd-ctms-bebeb0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3707%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sunnet%20eHRD%20CTMS&amp;severity=medium&amp;id=682d9838c4522896dcbebeb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3670-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kiwichat-kiwichat-nextclient-bebdfe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiwichat%20KiwiChat%20NextClient&amp;severity=medium&amp;id=682d9838c4522896dcbebdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4177-cwe-862-missing-authorization-in-v1rustyle-flynax-bridge-bebe28</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4177%3A%20CWE-862%20Missing%20Authorization%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=medium&amp;id=682d9838c4522896dcbebe28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2880-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-yame-yame-link-in-bio-bebdf2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2880%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yame%20Yame%20%7C%20Link%20In%20Bio&amp;severity=medium&amp;id=682d9838c4522896dcbebdf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4179-cwe-862-missing-authorization-in-v1rustyle-flynax-bridge-bebdfa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4179%3A%20CWE-862%20Missing%20Authorization%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=high&amp;id=682d9838c4522896dcbebdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3746-cwe-862-missing-authorization-in-thedrifted-otp-less-one-tap-sign-in-bd6b8a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3746%3A%20CWE-862%20Missing%20Authorization%20in%20thedrifted%20OTP-less%20one%20tap%20Sign%20in&amp;severity=critical&amp;id=682d9816c4522896dcbd6b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4131-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-garubi-gmapsmania-bebec1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garubi%20GmapsMania&amp;severity=medium&amp;id=682d9838c4522896dcbebec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4197-sql-injection-in-code-projects-patient-record-management-system-bebec5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4197%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4196-sql-injection-in-sourcecodester-patient-record-management-system-bebe79</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4196%3A%20SQL%20Injection%20in%20SourceCodester%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebe79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29825-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-chromium-based-aeb950</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29825%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f91484d88663aeb950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4195-sql-injection-in-itsourcecode-gym-management-system-bec248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4195%3A%20SQL%20Injection%20in%20itsourcecode%20Gym%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4193-sql-injection-in-itsourcecode-restaurant-management-system-bec21c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4193%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55910-cwe-918-server-side-request-forgery-ssrf-in-ibm-concert-software-bec1ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55910%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec1ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55913-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-ibm-concert-software-bec206</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55913%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55912-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-concert-software-bec1f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55912%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec1f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55909-cwe-409-improper-handling-of-highly-compressed-data-data-amplification-in-ibm-concert-software-bec1d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55909%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=682d9838c4522896dcbec1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4192-sql-injection-in-itsourcecode-restaurant-management-system-bec1c1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4192%3A%20SQL%20Injection%20in%20itsourcecode%20Restaurant%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4191-sql-injection-in-phpgurukul-employee-record-management-system-bec1b9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4191%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4186-path-traversal-in-wangshen-secgate-3600-bec1b1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4186%3A%20Path%20Traversal%20in%20Wangshen%20SecGate%203600&amp;severity=medium&amp;id=682d9838c4522896dcbec1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47201-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-intrexx-portal-server-bec148</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Intrexx%20Portal%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58253-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-casualx-obfstr-bdc8e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58253%3A%20CWE-843%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20CasualX%20obfstr&amp;severity=low&amp;id=682d981fc4522896dcbdc8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47226-cwe-425-direct-request-forced-browsing-in-snipeitapp-snipe-it-bdc7bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47226%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20snipeitapp%20Snipe-IT&amp;severity=medium&amp;id=682d981fc4522896dcbdc7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44877-n-a-in-n-a-bda583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44872-n-a-in-n-a-bda576</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44872%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44868-n-a-in-n-a-bda565</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44868%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55069-n-a-in-n-a-bd70cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55069%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd70cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45800-n-a-in-n-a-bd6b98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45800%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-02-2a2c04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-02&amp;severity=medium&amp;id=682c7db2e8347ec82d2a2c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-02-f1208e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f1208e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4185-path-traversal-in-wangshen-secgate-3600-bec14e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4185%3A%20Path%20Traversal%20in%20Wangshen%20SecGate%203600&amp;severity=medium&amp;id=682d9838c4522896dcbec14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4184-buffer-overflow-in-pcman-ftp-server-bec0f5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4184%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4183-buffer-overflow-in-pcman-ftp-server-bec0f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4183%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4182-buffer-overflow-in-pcman-ftp-server-bec122</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4182%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4181-buffer-overflow-in-pcman-ftp-server-bebe3a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4181%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbebe3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52903-cwe-20-improper-input-validation-in-ibm-db2-for-linux-unix-and-windows-bec0e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52903%3A%20CWE-248%20Uncaught%20Exception%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=682d9838c4522896dcbec0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1333-cwe-214-invocation-of-process-using-visible-sensitive-information-in-ibm-mq-operator-bec0ed</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1333%3A%20CWE-214%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=682d9838c4522896dcbec0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4180-buffer-overflow-in-pcman-ftp-server-bebe34</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4180%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbebe34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4178-path-traversal-in-xiaowei1118-java-server-bebe30</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4178%3A%20Path%20Traversal%20in%20xiaowei1118%20java_server&amp;severity=medium&amp;id=682d9838c4522896dcbebe30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4176-sql-injection-in-phpgurukul-blood-bank-donor-management-system-bebe20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4176%3A%20SQL%20Injection%20in%20PHPGurukul%20Blood%20Bank%20%26%20Donor%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbebe20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27365-cwe-416-use-after-free-in-ibm-mq-operator-bec19d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27365%3A%20CWE-416%20Use%20After%20Free%20in%20IBM%20MQ%20Operator&amp;severity=medium&amp;id=682d9838c4522896dcbec19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43595-cwe-276-incorrect-default-permissions-in-msp360-backup-bd863c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43595%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20MSP360%20Backup&amp;severity=high&amp;id=682d9819c4522896dcbd863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/earth-kurma-apt-campaign-targets-southeast-asian-g-c9bcecf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Earth%20Kurma%20APT%20Campaign%20Targets%20Southeast%20Asian%20Government%2C%20Telecom%20Sectors&amp;severity=medium&amp;id=683b62e6182aa0cae2f0d715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/earth-kasha-updates-ttps-in-latest-campaign-target-ecaf3ccc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Earth%20Kasha%20Updates%20TTPs%20in%20Latest%20Campaign%20Targeting%20Taiwan%20and%20Japan&amp;severity=medium&amp;id=683b62e6182aa0cae2f0d752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4175-path-traversal-in-alanbinu007-spring-boot-advanced-projects-bd71d6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4175%3A%20Path%20Traversal%20in%20AlanBinu007%20Spring-Boot-Advanced-Projects&amp;severity=medium&amp;id=682d9817c4522896dcbd71d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46569-cwe-863-incorrect-authorization-in-open-policy-agent-opa-bebd9e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46569%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20open-policy-agent%20opa&amp;severity=high&amp;id=682d9838c4522896dcbebd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4174-sql-injection-in-phpgurukul-covid19-testing-management-system-bec1a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4174%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36558-cwe-97-in-kunbus-gmbh-revolution-pi-pictory-bec1a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36558%3A%20CWE-97%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20PiCtory&amp;severity=medium&amp;id=682d9838c4522896dcbec1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35996-cwe-97-in-kunbus-gmbh-revolution-pi-pictory-bec19b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35996%3A%20CWE-97%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20PiCtory&amp;severity=critical&amp;id=682d9838c4522896dcbec19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32011-cwe-305-in-kunbus-gmbh-revolution-pi-pictory-bec15e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32011%3A%20CWE-305%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20PiCtory&amp;severity=critical&amp;id=682d9838c4522896dcbec15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24522-cwe-305-in-kunbus-gmbh-revolution-pi-os-bookworm-bec5ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24522%3A%20CWE-305%20in%20KUNBUS%20GmbH%20Revolution%20Pi%20OS%20Bookworm&amp;severity=critical&amp;id=682d9838c4522896dcbec5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36521-cwe-125-out-of-bounds-read-in-microdicom-dicom-viewer-bec6d1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36521%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MicroDicom%20DICOM%20Viewer&amp;severity=high&amp;id=682d9839c4522896dcbec6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3517-cwe-266-incorrect-privilege-assignment-in-devolutions-devolutions-server-bec20e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3517%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Devolutions%20Devolutions%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbec20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35975-cwe-787-out-of-bounds-write-in-microdicom-dicom-viewer-bec6c9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35975%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MicroDicom%20DICOM%20Viewer&amp;severity=high&amp;id=682d9839c4522896dcbec6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46568-cwe-918-server-side-request-forgery-ssrf-in-stirling-tools-stirling-pdf-bec144</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46568%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Stirling-Tools%20Stirling-PDF&amp;severity=high&amp;id=682d9838c4522896dcbec144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46567-cwe-502-deserialization-of-untrusted-data-in-hiyouga-llama-factory-bebe0b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46567%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20hiyouga%20LLaMA-Factory&amp;severity=medium&amp;id=682d9838c4522896dcbebe0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46566-cwe-923-improper-restriction-of-communication-channel-to-intended-endpoints-in-dataease-dataease-bebdf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46566%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20dataease%20dataease&amp;severity=medium&amp;id=682d9838c4522896dcbebdf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46565-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-vitejs-vite-bebdee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46565%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=682d9838c4522896dcbebdee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46345-cwe-290-authentication-bypass-by-spoofing-in-auth0-extensions-auth0-account-link-extension-bebde1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46345%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20auth0-extensions%20auth0-account-link-extension&amp;severity=medium&amp;id=682d9838c4522896dcbebde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46337-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-adodb-adodb-bdcc6c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46337%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ADOdb%20ADOdb&amp;severity=critical&amp;id=682d981fc4522896dcbdcc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4173-sql-injection-in-sourcecodester-online-eyewear-shop-bebdae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4173%3A%20SQL%20Injection%20in%20SourceCodester%20Online%20Eyewear%20Shop&amp;severity=medium&amp;id=682d9838c4522896dcbebdae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-minhook-in-a-sideloading-attack-and-sweden-20237c8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Minhook%20in%20a%20sideloading%20attack%20%E2%80%93%20and%20Sweden%20too&amp;severity=medium&amp;id=69399ca086adcdec9b1a61b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23246-cwe-400-uncontrolled-resource-consumption-in-nvidia-vgpu-software-cloud-gaming-becbcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23246%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20NVIDIA%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=medium&amp;id=682d9839c4522896dcbecbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49931-vulnerability-in-linux-linux-bdd79e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49930-vulnerability-in-linux-linux-be4098</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49929-vulnerability-in-linux-linux-be4092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49928-vulnerability-in-linux-linux-be408e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe408e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49927-vulnerability-in-linux-linux-be4074</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49926-vulnerability-in-linux-linux-be4070</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49925-vulnerability-in-linux-linux-be406c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe406c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49924-vulnerability-in-linux-linux-be4068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49923-vulnerability-in-linux-linux-be4064</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49922-vulnerability-in-linux-linux-be4060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49921-vulnerability-in-linux-linux-bdd79a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49920-vulnerability-in-linux-linux-be405c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe405c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49919-vulnerability-in-linux-linux-bdd796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49918-vulnerability-in-linux-linux-be4058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49917-vulnerability-in-linux-linux-be4054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49916-vulnerability-in-linux-linux-bdd785</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49915-vulnerability-in-linux-linux-be4050</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49914-vulnerability-in-linux-linux-be4030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49913-vulnerability-in-linux-linux-be402c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe402c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49912-vulnerability-in-linux-linux-be4028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982bc4522896dcbe4028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49911-vulnerability-in-linux-linux-be4022</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49910-vulnerability-in-linux-linux-be401e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe401e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49909-vulnerability-in-linux-linux-bdd781</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49908-vulnerability-in-linux-linux-be401a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe401a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49907-vulnerability-in-linux-linux-be4016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49906-vulnerability-in-linux-linux-be4005</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49905-vulnerability-in-linux-linux-be3ffd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49904-vulnerability-in-linux-linux-bdd77d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49903-vulnerability-in-linux-linux-be3ff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49902-vulnerability-in-linux-linux-be3fe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49901-vulnerability-in-linux-linux-be3fdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49900-vulnerability-in-linux-linux-be3fd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49899-vulnerability-in-linux-linux-be3fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49898-vulnerability-in-linux-linux-be3fc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49897-bd874d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49897&amp;severity=low&amp;id=682d9819c4522896dcbd874d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49896-vulnerability-in-linux-linux-be3fb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49895-vulnerability-in-linux-linux-be3faa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49894-vulnerability-in-linux-linux-be3fa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49893-vulnerability-in-linux-linux-be3f9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49892-vulnerability-in-linux-linux-bdd779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49891-vulnerability-in-linux-linux-be3f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49890-vulnerability-in-linux-linux-be3f72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49889-vulnerability-in-linux-linux-bdd775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49888-vulnerability-in-linux-linux-be3f6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49887-vulnerability-in-linux-linux-aeb010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49886-vulnerability-in-linux-linux-be3f62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49885-vulnerability-in-linux-linux-be3f5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49884-vulnerability-in-linux-linux-be3f54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49883-vulnerability-in-linux-linux-be3f47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49882-vulnerability-in-linux-linux-be3f36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49881-vulnerability-in-linux-linux-be4f20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49880-vulnerability-in-linux-linux-be4f18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49879-vulnerability-in-linux-linux-be4f10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49878-vulnerability-in-linux-linux-be4f08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49877-vulnerability-in-linux-linux-bdd771</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49876-vulnerability-in-linux-linux-be4f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49875-vulnerability-in-linux-linux-be4efe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49874-vulnerability-in-linux-linux-be4ef6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49873-vulnerability-in-linux-linux-be4ee7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49872-vulnerability-in-linux-linux-bdd76d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49871-vulnerability-in-linux-linux-be4edf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49870-vulnerability-in-linux-linux-be4eca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49869-vulnerability-in-linux-linux-be4ec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49868-vulnerability-in-linux-linux-be4eb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49867-vulnerability-in-linux-linux-be4ead</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49866-vulnerability-in-linux-linux-be4ea5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49865-vulnerability-in-linux-linux-be4e9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49864-vulnerability-in-linux-linux-be4e97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49863-vulnerability-in-linux-linux-bdd769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49862-vulnerability-in-linux-linux-bdd765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49861-vulnerability-in-linux-linux-be4e93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49860-vulnerability-in-linux-linux-be4e79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49859-vulnerability-in-linux-linux-be4e71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49858-vulnerability-in-linux-linux-be4e5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49857-vulnerability-in-linux-linux-be4e58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49856-bd8749</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49856&amp;severity=low&amp;id=682d9819c4522896dcbd8749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49855-vulnerability-in-linux-linux-be4e54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49854-vulnerability-in-linux-linux-be4e50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49853-vulnerability-in-linux-linux-be4e4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49852-vulnerability-in-linux-linux-be4e48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49851-vulnerability-in-linux-linux-bdd758</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49850-vulnerability-in-linux-linux-be4e44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49849-vulnerability-in-linux-linux-be4e40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49848-vulnerability-in-linux-linux-be4e3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49847-vulnerability-in-linux-linux-be4e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49846-vulnerability-in-linux-linux-be4e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49845-vulnerability-in-linux-linux-be4e09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49844-vulnerability-in-linux-linux-be4e01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49843-bd8723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49843&amp;severity=low&amp;id=682d9819c4522896dcbd8723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49842-vulnerability-in-linux-linux-be4df9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49841-vulnerability-in-linux-linux-be4df1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49840-vulnerability-in-linux-linux-be4de9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49839-vulnerability-in-linux-linux-be4de1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49838-vulnerability-in-linux-linux-be4dd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49837-vulnerability-in-linux-linux-be4dca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49836-vulnerability-in-linux-linux-be4dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49835-vulnerability-in-linux-linux-be4da2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49834-vulnerability-in-linux-linux-be4d9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49833-vulnerability-in-linux-linux-aeb00e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49832-vulnerability-in-linux-linux-be4d92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49831-vulnerability-in-linux-linux-be4d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49830-vulnerability-in-linux-linux-be4d7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49829-vulnerability-in-linux-linux-be4d73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49828-vulnerability-in-linux-linux-be4d6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49827-vulnerability-in-linux-linux-be4d65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49826-vulnerability-in-linux-linux-be4d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49825-vulnerability-in-linux-linux-be4d50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49824-vulnerability-in-linux-linux-be4d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49823-vulnerability-in-linux-linux-be4d35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49822-vulnerability-in-linux-linux-be4d24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49821-vulnerability-in-linux-linux-be4d1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49820-vulnerability-in-linux-linux-be4d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49819-vulnerability-in-linux-linux-be4d03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49818-vulnerability-in-linux-linux-be4cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49817-vulnerability-in-linux-linux-be4cf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49816-bec25f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49816&amp;severity=low&amp;id=682d9838c4522896dcbec25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49815-vulnerability-in-linux-linux-be4ceb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49814-vulnerability-in-linux-linux-be4ce3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49813-vulnerability-in-linux-linux-be4cc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49812-vulnerability-in-linux-linux-be4cb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49811-vulnerability-in-linux-linux-be4ca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49810-vulnerability-in-linux-linux-be4ca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49809-vulnerability-in-linux-linux-bdd73a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49808-vulnerability-in-linux-linux-be4c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49807-vulnerability-in-linux-linux-be4c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49806-vulnerability-in-linux-linux-be4c7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49805-vulnerability-in-linux-linux-be4c75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49804-vulnerability-in-linux-linux-be4c6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49803-vulnerability-in-linux-linux-be4c65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49802-vulnerability-in-linux-linux-be4c3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49801-vulnerability-in-linux-linux-bdd736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49800-vulnerability-in-linux-linux-be4c32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49799-vulnerability-in-linux-linux-be4c2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49798-vulnerability-in-linux-linux-be4c22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49797-vulnerability-in-linux-linux-be4c1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49796-vulnerability-in-linux-linux-be4c12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49795-vulnerability-in-linux-linux-be4c03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49794-vulnerability-in-linux-linux-be4bfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49793-vulnerability-in-linux-linux-be4bf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49792-vulnerability-in-linux-linux-be4beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49791-vulnerability-in-linux-linux-be4bcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49790-vulnerability-in-linux-linux-be4bcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49789-vulnerability-in-linux-linux-be4bc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49788-vulnerability-in-linux-linux-be4bc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49787-vulnerability-in-linux-linux-be4bbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49786-vulnerability-in-linux-linux-be4bbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49785-vulnerability-in-linux-linux-be4bb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49784-vulnerability-in-linux-linux-be4ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49783-vulnerability-in-linux-linux-be4b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49782-vulnerability-in-linux-linux-be4b96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49781-vulnerability-in-linux-linux-be4b79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49780-vulnerability-in-linux-linux-be4b6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49779-vulnerability-in-linux-linux-be4b5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49778-vulnerability-in-linux-linux-be4b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49777-vulnerability-in-linux-linux-be4b4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49776-vulnerability-in-linux-linux-be4b43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49775-vulnerability-in-linux-linux-be4b3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49774-vulnerability-in-linux-linux-be4b35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49773-vulnerability-in-linux-linux-be4b31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982cc4522896dcbe4b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49772-vulnerability-in-linux-linux-be4b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982cc4522896dcbe4b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49771-vulnerability-in-linux-linux-be4afe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49770-vulnerability-in-linux-linux-be4af6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49769-vulnerability-in-linux-linux-be4aec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49768-vulnerability-in-linux-linux-be4ae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49767-vulnerability-in-linux-linux-be4ae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49766-vulnerability-in-linux-linux-be4adc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49765-vulnerability-in-linux-linux-be4ad8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49764-vulnerability-in-linux-linux-be4acb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49763-vulnerability-in-linux-linux-be4ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49762-vulnerability-in-linux-linux-be4abb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36790-vulnerability-in-linux-linux-bea634</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23254-cwe-502-deserialization-of-untrusted-data-in-nvidia-tensorrt-llm-becbdc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23254%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20TensorRT-LLM&amp;severity=high&amp;id=682d9839c4522896dcbecbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23244-cwe-863-incorrect-authorization-in-nvidia-gpu-display-driver-vgpu-software-cloud-gaming-becbc3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23244%3A%20CWE-863%20Incorrect%20Authorization%20in%20NVIDIA%20GPU%20Display%20Driver%2C%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=high&amp;id=682d9839c4522896dcbecbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23245-cwe-732-incorrect-permission-assignment-for-critical-resource-in-nvidia-vgpu-software-cloud-gaming-becbc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23245%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20NVIDIA%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=medium&amp;id=682d9839c4522896dcbecbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52979-cwe-400-uncontrolled-resource-consumption-in-elastic-elasticsearch-becf57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52979%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Elastic%20Elasticsearch&amp;severity=medium&amp;id=682d9839c4522896dcbecf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11390-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-elastic-kibana-becf3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11390%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=682d9839c4522896dcbecf3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25016-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-elastic-kibana-bda233</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25016%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=682d981bc4522896dcbda233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37796-vulnerability-in-linux-linux-be8473</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37795-bd71c1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37795&amp;severity=low&amp;id=682d9817c4522896dcbd71c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37794-vulnerability-in-linux-linux-be846f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37793-vulnerability-in-linux-linux-be845e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe845e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37792-vulnerability-in-linux-linux-be8456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37791-vulnerability-in-linux-linux-be844e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe844e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37790-vulnerability-in-linux-linux-be8446</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37789-vulnerability-in-linux-linux-be843e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37788-vulnerability-in-linux-linux-be842d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe842d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37787-vulnerability-in-linux-linux-be8414</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37786-vulnerability-in-linux-linux-be840c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe840c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37784-vulnerability-in-linux-linux-be83f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37783-vulnerability-in-linux-linux-be83ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37782-vulnerability-in-linux-linux-be83eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37782&amp;severity=high&amp;id=682d9832c4522896dcbe83eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37781-vulnerability-in-linux-linux-be83e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37780-vulnerability-in-linux-linux-be83e1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37779-vulnerability-in-linux-linux-be83dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37778-vulnerability-in-linux-linux-bd84ce</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37777-vulnerability-in-linux-linux-bd84ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37776-vulnerability-in-linux-linux-bd84c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37775-vulnerability-in-linux-linux-bd84c2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd84c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37774-vulnerability-in-linux-linux-be83ce</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37773-vulnerability-in-linux-linux-be83b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37772-vulnerability-in-linux-linux-be83aa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37771-vulnerability-in-linux-linux-be83a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37770-vulnerability-in-linux-linux-be83a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe83a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37769-vulnerability-in-linux-linux-be839e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe839e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37768-vulnerability-in-linux-linux-be839a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37767-vulnerability-in-linux-linux-be8396</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37766-vulnerability-in-linux-linux-be8392</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37765-vulnerability-in-linux-linux-be838e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe838e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37764-vulnerability-in-linux-linux-be838a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe838a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37763-vulnerability-in-linux-linux-be8377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37762-vulnerability-in-linux-linux-be8373</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37761-vulnerability-in-linux-linux-be836f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe836f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37760-vulnerability-in-linux-linux-bdd480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11994-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-elastic-apm-server-beca46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11994%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Elastic%20APM%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbeca46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52976-cwe-829-inclusion-of-functionality-from-untrusted-control-sphere-in-elastic-elastic-agent-beca6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52976%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Elastic%20Elastic%20Agent&amp;severity=medium&amp;id=682d9839c4522896dcbeca6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46669-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-elastic-elastic-agent-and-elastic-defend-beca3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46669%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Elastic%20Elastic%20Agent%20and%20Elastic%20Defend&amp;severity=medium&amp;id=682d9839c4522896dcbeca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37759-vulnerability-in-linux-linux-be836b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37758-vulnerability-in-linux-linux-be835a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37757-vulnerability-in-linux-linux-be8347</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37756-vulnerability-in-linux-linux-be833f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe833f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37755-vulnerability-in-linux-linux-be8337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37754-vulnerability-in-linux-linux-be832f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37753-vulnerability-in-linux-linux-be8327</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37753&amp;severity=low&amp;id=682d9832c4522896dcbe8327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37752-vulnerability-in-linux-linux-be8305</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37751-vulnerability-in-linux-linux-be82fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37750-vulnerability-in-linux-linux-bdd47c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37749-vulnerability-in-linux-linux-be82f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37748-vulnerability-in-linux-linux-be82f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37747-vulnerability-in-linux-linux-bdd478</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37746-vulnerability-in-linux-linux-bd84be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd84be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37745-vulnerability-in-linux-linux-be82e0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37744-vulnerability-in-linux-linux-bd84ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd84ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37743-vulnerability-in-linux-linux-bd84a7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd84a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37742-vulnerability-in-linux-linux-be82d8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37741-vulnerability-in-linux-linux-be82d0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37740-vulnerability-in-linux-linux-be82c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe82c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37739-vulnerability-in-linux-linux-be82c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37738-vulnerability-in-linux-linux-be82b3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe82b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23163-vulnerability-in-linux-linux-be829e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe829e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23162-vulnerability-in-linux-linux-bd849a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd849a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23161-vulnerability-in-linux-linux-be8291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23160-vulnerability-in-linux-linux-bdd474</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23159-vulnerability-in-linux-linux-be828d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe828d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23158-vulnerability-in-linux-linux-be8289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23157-vulnerability-in-linux-linux-be8285</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23156-vulnerability-in-linux-linux-be8281</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23155-vulnerability-in-linux-linux-be827b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe827b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23154-vulnerability-in-linux-linux-be8277</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23153-vulnerability-in-linux-linux-be8273</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23152-vulnerability-in-linux-linux-be826f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe826f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23151-vulnerability-in-linux-linux-bdd470</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23150-vulnerability-in-linux-linux-bdd453</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23149-vulnerability-in-linux-linux-bdd451</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23148-vulnerability-in-linux-linux-be825c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe825c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23147-vulnerability-in-linux-linux-be8258</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23146-vulnerability-in-linux-linux-be8249</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23145-vulnerability-in-linux-linux-be8241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23144-vulnerability-in-linux-linux-be8239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23143-vulnerability-in-linux-linux-be8235</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23142-vulnerability-in-linux-linux-bdd44d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23141-vulnerability-in-linux-linux-be8228</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23140-vulnerability-in-linux-linux-be8224</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23139-bd8776</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23139&amp;severity=low&amp;id=682d9819c4522896dcbd8776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4164-sql-injection-in-phpgurukul-employee-record-management-system-becfb8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4164%3A%20SQL%20Injection%20in%20PHPGurukul%20Employee%20Record%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4163-sql-injection-in-phpgurukul-land-record-system-becf06</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4163%3A%20SQL%20Injection%20in%20PHPGurukul%20Land%20Record%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecf06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3890-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mra13-wordpress-simple-shopping-cart-becf00</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20WordPress%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=682d9839c4522896dcbecf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3874-cwe-639-authorization-bypass-through-user-controlled-key-in-mra13-wordpress-simple-shopping-cart-bece80</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3874%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mra13%20WordPress%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=682d9839c4522896dcbece80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3889-cwe-639-authorization-bypass-through-user-controlled-key-in-mra13-wordpress-simple-shopping-cart-bece31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3889%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mra13%20WordPress%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=682d9839c4522896dcbece31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1529-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-johanaarstein-am-lottieplayer-becdc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johanaarstein%20AM%20LottiePlayer&amp;severity=medium&amp;id=682d9839c4522896dcbecdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4162-buffer-overflow-in-pcman-ftp-server-becd83</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4162%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27007-cwe-266-incorrect-privilege-assignment-in-brainstorm-force-suretriggers-bdb33e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27007%3A%20Incorrect%20Privilege%20Assignment%20in%20Brainstorm%20Force%20OttoKit&amp;severity=null&amp;id=682d981dc4522896dcbdb33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4161-buffer-overflow-in-pcman-ftp-server-becd44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4161%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4160-buffer-overflow-in-pcman-ftp-server-becc68</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4160%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4159-buffer-overflow-in-pcman-ftp-server-becaa3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4159%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4158-buffer-overflow-in-pcman-ftp-server-bec9e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4158%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbec9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4157-sql-injection-in-phpgurukul-boat-booking-system-bec982</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4157%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4156-sql-injection-in-phpgurukul-boat-booking-system-bec980</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4156%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4155-sql-injection-in-phpgurukul-boat-booking-system-bec939</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4155%3A%20SQL%20Injection%20in%20PHPGurukul%20Boat%20Booking%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4154-sql-injection-in-phpgurukul-pre-school-enrollment-system-bec927</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4154%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3521-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-wpspeedo-team-members-best-wordpress-team-plugin-with-team-slider-team-showcase-team-builder-bec91f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3521%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpspeedo%20Team%20Members%20%E2%80%93%20Best%20WordPress%20Team%20Plugin%20with%20Team%20Slider%2C%20Team%20Showcase%20%26%20Team%20Builder&amp;severity=medium&amp;id=682d9839c4522896dcbec91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4100-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stur-nautic-pages-becc29</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stur%20Nautic%20Pages&amp;severity=medium&amp;id=682d9839c4522896dcbecc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4153-sql-injection-in-phpgurukul-park-ticketing-management-system-becc31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4153%3A%20SQL%20Injection%20in%20PHPGurukul%20Park%20Ticketing%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4152-sql-injection-in-phpgurukul-online-birth-certificate-system-becc2d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4152%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Birth%20Certificate%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3504-cwe-79-cross-site-scripting-xss-in-unknown-wp-maps-becc03</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3504%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Maps&amp;severity=low&amp;id=682d9839c4522896dcbecc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3503-cwe-79-cross-site-scripting-xss-in-unknown-wp-maps-bebff0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3503%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Maps&amp;severity=medium&amp;id=682d9838c4522896dcbebff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3502-cwe-79-cross-site-scripting-xss-in-unknown-wp-maps-becbb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3502%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Maps&amp;severity=low&amp;id=682d9839c4522896dcbecbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13381-cwe-79-cross-site-scripting-xss-in-unknown-calculated-fields-form-bec81c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13381%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Calculated%20Fields%20Form&amp;severity=low&amp;id=682d9839c4522896dcbec81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4151-sql-injection-in-phpgurukul-curfew-e-pass-management-system-bec801</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4151%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbec801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4150-buffer-overflow-in-netgear-ex6200-bec7f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4150%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbec7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3952-cwe-862-missing-authorization-in-projectopia-projectopia-wordpress-project-management-becff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3952%3A%20CWE-862%20Missing%20Authorization%20in%20projectopia%20Projectopia%20%E2%80%93%20WordPress%20Project%20Management&amp;severity=high&amp;id=682d9839c4522896dcbecff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13845-cwe-918-server-side-request-forgery-ssrf-in-gravity-forms-gravity-forms-webhooks-becf4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13845%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gravity%20Forms%20Gravity%20Forms%20WebHooks&amp;severity=medium&amp;id=682d9839c4522896dcbecf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4099-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-theandystratton-list-children-becf80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4099%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theandystratton%20List%20Children&amp;severity=medium&amp;id=682d9839c4522896dcbecf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4149-buffer-overflow-in-netgear-ex6200-becfb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4149%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbecfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2168-cwe-352-cross-site-request-forgery-csrf-in-bdthemes-ultimate-store-kit-elementor-powered-woocommerce-builder-80-widgets-and-template-builder-becf6b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2168%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdthemes%20Ultimate%20Store%20Kit%20%E2%80%93%20Elementor%20powered%20WooCommerce%20Builder%2C%2080%2B%20Widgets%20and%20Template%20Builder&amp;severity=medium&amp;id=682d9839c4522896dcbecf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1304-cwe-862-missing-authorization-in-spicethemes-newsblogger-becf5f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1304%3A%20CWE-862%20Missing%20Authorization%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=682d9839c4522896dcbecf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1305-cwe-352-cross-site-request-forgery-csrf-in-spicethemes-newsblogger-becf67</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1305%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20NewsBlogger&amp;severity=high&amp;id=682d9839c4522896dcbecf67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4148-buffer-overflow-in-netgear-ex6200-becfaa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4148%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbecfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2816-cwe-862-missing-authorization-in-a3rev-page-view-count-becf71</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2816%3A%20CWE-862%20Missing%20Authorization%20in%20a3rev%20Page%20View%20Count&amp;severity=high&amp;id=682d9839c4522896dcbecf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4147-buffer-overflow-in-netgear-ex6200-becf88</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4147%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbecf88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4146-buffer-overflow-in-netgear-ex6200-beca9f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4146%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbeca9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4144-cwe-287-improper-authentication-beca97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4144%3A%20CWE-287%20Improper%20Authentication&amp;severity=medium&amp;id=682d9839c4522896dcbeca97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4143-cwe-601-url-redirection-to-untrusted-site-open-redirect-beca8a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4143%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=medium&amp;id=682d9839c4522896dcbeca8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4145-buffer-overflow-in-netgear-ex6200-beca9b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4145%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbeca9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-xrm-ms-file-ntlm-information-dis-6ebcaaf4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%20-%20XRM-MS%20File%20NTLM%20Information%20Disclosure%20Spoofing&amp;severity=medium&amp;id=68489e437e6d765d51d54352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/daikin-security-gateway-14-remote-password-reset-2d78c35f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Daikin%20Security%20Gateway%20%2014%20-%20Remote%20Password%20Reset&amp;severity=medium&amp;id=68489e3b7e6d765d51d542c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zte-zxv10-h201l-rce-via-authentication-bypass-5f397053</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ZTE%20ZXV10%20H201L%20-%20RCE%20via%20authentication%20bypass&amp;severity=critical&amp;id=68489e307e6d765d51d5418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-ntlm-hash-disclosure-spoofing-library-ms-c9116782</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20-%20NTLM%20Hash%20Disclosure%20Spoofing%20(library-ms)&amp;severity=medium&amp;id=68489e2b7e6d765d51d540b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47154-cwe-820-missing-synchronization-in-ladybird-ladybird-beca77</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47154%3A%20CWE-820%20Missing%20Synchronization%20in%20Ladybird%20Ladybird&amp;severity=critical&amp;id=682d9839c4522896dcbeca77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32890-n-a-in-n-a-bec658</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32890%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32889-n-a-in-n-a-bec656</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32889%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32888-n-a-in-n-a-bec54d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32888%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32887-n-a-in-n-a-bec513</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32887%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32886-n-a-in-n-a-bec478</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32886%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32885-n-a-in-n-a-bec474</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32885%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32884-n-a-in-n-a-bec3f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32884%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32882-n-a-in-n-a-bec398</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32882%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32881-n-a-in-n-a-bec390</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32881%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44867-n-a-in-n-a-bec333</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44867%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44866-n-a-in-n-a-bec32b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44866%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44865-n-a-in-n-a-bec323</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44865%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44864-n-a-in-n-a-bec31b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44864%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44862-n-a-in-n-a-bec313</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44862%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44861-n-a-in-n-a-bec30f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44861%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44847-n-a-in-n-a-bec30b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44846-n-a-in-n-a-bec2e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44846%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44836-n-a-in-n-a-bec2e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44836%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44854-n-a-in-n-a-bec2d0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44854%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44838-n-a-in-n-a-bec2cc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44838%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44837-n-a-in-n-a-bec2c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44837%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44835-n-a-in-n-a-bec2c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44835%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46625-n-a-in-n-a-bec166</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46625%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46635-n-a-in-n-a-bec0dc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46635%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46634-n-a-in-n-a-bec096</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46634%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46633-n-a-in-n-a-bec092</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46633%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48907-n-a-in-n-a-bec07d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48907%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46632-n-a-in-n-a-bec075</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46632%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46631-n-a-in-n-a-bec066</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46631%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46630-n-a-in-n-a-bec05e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46630%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46629-n-a-in-n-a-bec02d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46629%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46628-n-a-in-n-a-bec02b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46628%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46627-n-a-in-n-a-bec01a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46627%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec01a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46626-n-a-in-n-a-bec016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46626%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44860-n-a-in-n-a-bec012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44860%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44863-n-a-in-n-a-bebfe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44863%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44845-n-a-in-n-a-bebfdc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44845%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44844-n-a-in-n-a-bebfd8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44843-n-a-in-n-a-bebfd4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44843%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44842-n-a-in-n-a-bebfd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44840-n-a-in-n-a-bebfcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44840%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44839-n-a-in-n-a-bebfae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44839%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44841-n-a-in-n-a-bebf75</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44841%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44848-n-a-in-n-a-bebd7c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44848%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbebd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47153-cwe-1102-reliance-on-machine-dependent-data-representation-in-debian-trixie-bebb04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47153%3A%20CWE-1102%20Reliance%20on%20Machine-Dependent%20Data%20Representation%20in%20Debian%20trixie&amp;severity=medium&amp;id=682d9837c4522896dcbebb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48906-n-a-in-n-a-bda548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48906%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48905-n-a-in-n-a-bda4df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32883-bd73de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32883&amp;severity=low&amp;id=682d9817c4522896dcbd73de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-01-2a2605</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-01&amp;severity=medium&amp;id=682c7db2e8347ec82d2a2605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-05-01-f1241d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-05-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f1241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4142-buffer-overflow-in-netgear-ex6200-bece84</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4142%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbece84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4141-buffer-overflow-in-netgear-ex6200-beca86</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4141%3A%20Buffer%20Overflow%20in%20Netgear%20EX6200&amp;severity=high&amp;id=682d9839c4522896dcbeca86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4140-buffer-overflow-in-netgear-ex6120-bebe9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4140%3A%20Buffer%20Overflow%20in%20Netgear%20EX6120&amp;severity=high&amp;id=682d9838c4522896dcbebe9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/advisory-pahalgam-attack-themed-decoys-used-by-apt-58f65376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Advisory%3A%20Pahalgam%20Attack%20themed%20decoys%20used%20by%20APT36%20to%20target%20the%20Indian%20Government&amp;severity=medium&amp;id=683a1f6a182aa0cae2c19003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30146-cwe-284-improper-access-control-in-hcl-software-hcl-domino-leap-beca67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30146%3A%20CWE-284%20%20Improper%20access%20control%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbeca67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30145-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-leap-beca4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30145%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbeca4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30115-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-leap-bec9e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbec9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45721-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-hcl-software-hcl-domino-leap-bec9dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45721%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=medium&amp;id=682d9839c4522896dcbec9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37535-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-leap-bec9d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=high&amp;id=682d9839c4522896dcbec9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37517-cwe-524-use-of-cache-containing-sensitive-information-in-hcl-software-hcl-domino-leap-bec9cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37517%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20HCL%20Domino%20Leap&amp;severity=low&amp;id=682d9839c4522896dcbec9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42450-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-domino-volt-bec9bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Domino%20Volt&amp;severity=medium&amp;id=682d9839c4522896dcbec9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42449-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-hcl-software-hcl-domino-volt-bec9b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42449%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20HCL%20Domino%20Volt&amp;severity=medium&amp;id=682d9839c4522896dcbec9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27562-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-hcl-software-hcl-domino-volt-bec98e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27562%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20HCL%20Domino%20Volt&amp;severity=medium&amp;id=682d9839c4522896dcbec98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30422-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-airplay-audio-sdk-becfc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30422%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20AirPlay%20audio%20SDK&amp;severity=medium&amp;id=682d9839c4522896dcbecfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24132-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-airplay-audio-sdk-becfc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24132%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20AirPlay%20audio%20SDK&amp;severity=medium&amp;id=682d9839c4522896dcbecfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4139-buffer-overflow-in-netgear-ex6120-bed658</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4139%3A%20Buffer%20Overflow%20in%20Netgear%20EX6120&amp;severity=high&amp;id=682d983ac4522896dcbed658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2082-cwe-190-integer-overflow-or-wraparound-in-tesla-model-3-bed739</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2082%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Tesla%20Model%203&amp;severity=high&amp;id=682d983ac4522896dcbed739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6032-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tesla-model-s-bed735</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6032%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6030-cwe-250-execution-with-unnecessary-privileges-in-tesla-model-s-bed72d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6030%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13943-cwe-20-improper-input-validation-in-tesla-model-s-bed6f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13943%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6031-cwe-122-heap-based-buffer-overflow-in-tesla-model-s-bed731</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6031%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Tesla%20Model%20S&amp;severity=high&amp;id=682d983ac4522896dcbed731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6029-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-tesla-model-s-bed709</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6029%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Tesla%20Model%20S&amp;severity=medium&amp;id=682d983ac4522896dcbed709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27611-cwe-1007-insufficient-visual-distinction-of-homoglyphs-presented-to-user-in-cryptocoinjs-base-x-bec652</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27611%3A%20CWE-1007%3A%20Insufficient%20Visual%20Distinction%20of%20Homoglyphs%20Presented%20to%20User%20in%20cryptocoinjs%20base-x&amp;severity=high&amp;id=682d9838c4522896dcbec652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4136-improper-authorization-in-weitong-mall-bec66e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4136%3A%20Improper%20Authorization%20in%20Weitong%20Mall&amp;severity=medium&amp;id=682d9838c4522896dcbec66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2170-cwe-918-server-side-request-forgery-ssrf-in-sonicwall-sma1000-aec900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2170%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SonicWall%20SMA1000&amp;severity=high&amp;id=682cd0fb1484d88663aec900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9877-cwe-598-use-of-get-request-method-with-sensitive-query-strings-in-abb-anc-bed91a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9877%3A%20CWE-598%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings%20in%20ABB%20ANC&amp;severity=medium&amp;id=682d983ac4522896dcbed91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9876-cwe-471-modification-of-assumed-immutable-data-maid-in-abb-anc-bed8bd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9876%3A%20CWE-471%3A%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20ABB%20ANC&amp;severity=high&amp;id=682d983ac4522896dcbed8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46554-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bed8c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46554%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d983ac4522896dcbed8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46557-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bed8cd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46557%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=682d983ac4522896dcbed8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46558-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-contrib-syntax-markdown-bed885</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46558%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki-contrib%20syntax-markdown&amp;severity=critical&amp;id=682d983ac4522896dcbed885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24887-cwe-284-improper-access-control-in-opencti-platform-opencti-bed87d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24887%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20OpenCTI-Platform%20opencti&amp;severity=medium&amp;id=682d983ac4522896dcbed87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32777-cwe-770-allocation-of-resources-without-limits-or-throttling-in-volcano-sh-volcano-bec654</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32777%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20volcano-sh%20volcano&amp;severity=high&amp;id=682d9838c4522896dcbec654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46331-cwe-284-improper-access-control-in-openfga-openfga-bec65e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46331%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20openfga%20openfga&amp;severity=medium&amp;id=682d9838c4522896dcbec65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47784-cwe-620-unverified-password-change-in-abb-anc-bed745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47784%3A%20CWE-620%3A%20Unverified%20Password%20Change%20in%20ABB%20ANC&amp;severity=low&amp;id=682d983ac4522896dcbed745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4135-command-injection-in-netgear-wg302v2-bed9af</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4135%3A%20Command%20Injection%20in%20Netgear%20WG302v2&amp;severity=medium&amp;id=682d983ac4522896dcbed9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-are-targeting-us-tax-session-with-ne-f0225f8d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Actors%20are%20Targeting%20US%20Tax-Session%20with%20new%20Tactics%20of%20Stealerium-infostealer&amp;severity=medium&amp;id=6839e730182aa0cae2b929df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24091-an-app-may-be-able-to-cause-a-denial-of-service-in-apple-ipados-bed6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24091%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983ac4522896dcbed6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39413-cwe-862-missing-authorization-in-david-gwyer-simple-sitemap-create-a-responsive-html-sitemap-beda63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39413%3A%20Missing%20Authorization%20in%20David%20Gwyer%20Simple%20Sitemap%20%E2%80%93%20Create%20a%20Responsive%20HTML%20Sitemap&amp;severity=null&amp;id=682d983ac4522896dcbeda63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21416-cwe-862-missing-authorization-in-microsoft-azure-virtual-desktop-aebaf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21416%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Azure%20Virtual%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aebaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30392-cwe-285-improper-authorization-in-microsoft-azure-ai-bot-service-aebc70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30392%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Bot%20Service&amp;severity=critical&amp;id=682cd0f91484d88663aebc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30390-cwe-285-improper-authorization-in-microsoft-azure-machine-learning-aebc6c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30390%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Machine%20Learning&amp;severity=critical&amp;id=682cd0f91484d88663aebc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33074-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-azure-functions-aebc74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33074%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Azure%20Functions&amp;severity=high&amp;id=682cd0f91484d88663aebc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30389-cwe-285-improper-authorization-in-microsoft-azure-ai-bot-service-aebc6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30389%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20AI%20Bot%20Service&amp;severity=high&amp;id=682cd0f91484d88663aebc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30391-cwe-20-improper-input-validation-in-microsoft-dynamics-365-customer-service-aebc6e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30391%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Dynamics%20365%20Customer%20Service&amp;severity=high&amp;id=682cd0f91484d88663aebc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3599-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-symantec-symantec-endpoint-protection-bedae5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3599%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Symantec%20Symantec%20Endpoint%20Protection&amp;severity=medium&amp;id=682d983ac4522896dcbedae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3859-firefox-focus-elide-url-allows-address-bar-spoofing-in-mozilla-focus-bd6be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3859%3A%20Firefox%20Focus%20elide%20URL%20allows%20address%20bar%20spoofing%20in%20Mozilla%20Focus&amp;severity=medium&amp;id=682d9816c4522896dcbd6be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/thewizards-apt-group-uses-slaac-spoofing-to-perfor-3bf21c25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TheWizards%20APT%20group%20uses%20SLAAC%20spoofing%20to%20perform%20adversary-in-the-middle%20attacks&amp;severity=medium&amp;id=6839cb0b182aa0cae2b532cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32376-cwe-284-improper-access-control-in-discourse-discourse-bedff7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32376%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d983bc4522896dcbedff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46342-cwe-1287-improper-validation-of-specified-type-of-input-in-kyverno-kyverno-bedf5a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46342%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20kyverno%20kyverno&amp;severity=high&amp;id=682d983bc4522896dcbedf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27134-cwe-284-improper-access-control-in-laurent22-joplin-bedf0d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27134%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20laurent22%20joplin&amp;severity=high&amp;id=682d983bc4522896dcbedf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27409-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-laurent22-joplin-bedf1a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27409%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20laurent22%20joplin&amp;severity=high&amp;id=682d983bc4522896dcbedf1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32973-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bedf52</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32973%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=682d983bc4522896dcbedf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32974-cwe-116-improper-encoding-or-escaping-of-output-in-xwiki-xwiki-platform-bedf56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32974%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=682d983bc4522896dcbedf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32972-cwe-285-improper-authorization-in-xwiki-xwiki-platform-bedf43</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32972%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=low&amp;id=682d983bc4522896dcbedf43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32971-cwe-863-incorrect-authorization-in-xwiki-xwiki-platform-bedf3b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32971%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=low&amp;id=682d983bc4522896dcbedf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32970-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-xwiki-xwiki-platform-bedf1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32970%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d983bc4522896dcbedf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4122-command-injection-in-netgear-jwnr2000v2-bedffb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4122%3A%20Command%20Injection%20in%20Netgear%20JWNR2000v2&amp;severity=medium&amp;id=682d983bc4522896dcbedffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4121-command-injection-in-netgear-jwnr2000v2-beddc7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4121%3A%20Command%20Injection%20in%20Netgear%20JWNR2000v2&amp;severity=medium&amp;id=682d983bc4522896dcbeddc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4120-buffer-overflow-in-netgear-jwnr2000v2-beddc3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4120%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbeddc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4119-improper-access-controls-in-weitong-mall-bee282</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4119%3A%20Improper%20Access%20Controls%20in%20Weitong%20Mall&amp;severity=medium&amp;id=682d983bc4522896dcbee282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4118-improper-access-controls-in-weitong-mall-bee265</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4118%3A%20Improper%20Access%20Controls%20in%20Weitong%20Mall&amp;severity=medium&amp;id=682d983bc4522896dcbee265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4117-buffer-overflow-in-netgear-jwnr2000v2-bee33a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4117%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=medium&amp;id=682d983bc4522896dcbee33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3395-cwe-732-incorrect-permission-assignment-for-critical-resource-in-abb-automation-builder-bee300</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3395%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ABB%20Automation%20Builder&amp;severity=high&amp;id=682d983bc4522896dcbee300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3394-cwe-732-incorrect-permission-assignment-for-critical-resource-in-abb-automation-builder-bee2ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3394%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20ABB%20Automation%20Builder&amp;severity=high&amp;id=682d983bc4522896dcbee2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4116-buffer-overflow-in-netgear-jwnr2000v2-bee2db</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4116%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbee2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4115-buffer-overflow-in-netgear-jwnr2000v2-bee292</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4115%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbee292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4114-buffer-overflow-in-netgear-jwnr2000v2-bee28e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4114%3A%20Buffer%20Overflow%20in%20Netgear%20JWNR2000v2&amp;severity=high&amp;id=682d983bc4522896dcbee28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27532-cwe-312-cleartext-storage-of-sensitive-information-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee218</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27532%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24351-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-bosch-rexroth-ag-ctrlx-os-device-admin-bed36d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24351%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983ac4522896dcbed36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24350-cwe-23-relative-path-traversal-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee19e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24350%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983bc4522896dcbee19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24349-cwe-183-permissive-list-of-allowed-inputs-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee196</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24349%3A%20CWE-183%20Permissive%20List%20of%20Allowed%20Inputs%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983bc4522896dcbee196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24348-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24348%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24347-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee131</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24347%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24346-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bed365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24346%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=high&amp;id=682d983ac4522896dcbed365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24345-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-bosch-rexroth-ag-ctrlx-os-device-admin-bee0c4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24345%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbee0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24344-cwe-81-improper-neutralization-of-script-in-an-error-message-web-page-in-bosch-rexroth-ag-ctrlx-os-solutions-bee05e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24344%3A%20CWE-81%20Improper%20Neutralization%20of%20Script%20in%20an%20Error%20Message%20Web%20Page%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Solutions&amp;severity=medium&amp;id=682d983bc4522896dcbee05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24343-cwe-23-relative-path-traversal-in-bosch-rexroth-ag-ctrlx-os-solutions-bedfd6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24343%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Solutions&amp;severity=medium&amp;id=682d983bc4522896dcbedfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24342-cwe-204-observable-response-discrepancy-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedfd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24342%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24341-cwe-770-allocation-of-resources-without-limits-or-throttling-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedf09</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24341%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4113-sql-injection-in-phpgurukul-curfew-e-pass-management-system-bedecd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4113%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4112-sql-injection-in-phpgurukul-student-record-system-bede55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4112%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=682d983bc4522896dcbede55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24340-cwe-916-use-of-password-hash-with-insufficient-computational-effort-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedd82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24340%3A%20CWE-916%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24339-cwe-644-improper-neutralization-of-http-headers-for-scripting-syntax-in-bosch-rexroth-ag-ctrlx-os-device-admin-bedd7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24339%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Device%20Admin&amp;severity=medium&amp;id=682d983bc4522896dcbedd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24338-cwe-116-improper-encoding-or-escaping-of-output-in-bosch-rexroth-ag-ctrlx-os-solutions-bed35d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24338%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Bosch%20Rexroth%20AG%20ctrlX%20OS%20-%20Solutions&amp;severity=high&amp;id=682d983ac4522896dcbed35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4111-sql-injection-in-phpgurukul-pre-school-enrollment-system-bedcb2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4111%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4110-sql-injection-in-phpgurukul-pre-school-enrollment-system-bedbfc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4110%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4109-sql-injection-in-phpgurukul-pre-school-enrollment-system-bedb57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4109%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4108-sql-injection-in-phpgurukul-student-record-system-bedb53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4108%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=682d983bc4522896dcbedb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2890-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tagdiv-tagdiv-opt-in-builder-bedb42</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2890%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TagDiv%20tagDiv%20Opt-In%20Builder&amp;severity=medium&amp;id=682d983bc4522896dcbedb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4125-cwe-787-out-of-bounds-write-in-delta-electronics-ispsoft-bee357</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4125%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4124-cwe-787-out-of-bounds-write-in-delta-electronics-ispsoft-bee353</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4124%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22884-cwe-121-stack-based-buffer-overflow-in-delta-electronics-ispsoft-bee342</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22884%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22883-cwe-787-out-of-bounds-write-in-delta-electronics-ispsoft-bee2eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22883%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22882-cwe-121-stack-based-buffer-overflow-in-delta-electronics-ispsoft-bee2e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22882%3A%20cwe-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20ISPSoft&amp;severity=high&amp;id=682d983bc4522896dcbee2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3471-cwe-863-incorrect-authorization-in-unknown-sureforms-bedad4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3471%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20SureForms&amp;severity=medium&amp;id=682d983ac4522896dcbedad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3953-cwe-862-missing-authorization-in-veronalabs-wp-statistics-the-most-popular-privacy-friendly-analytics-plugin-bee302</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3953%3A%20CWE-862%20Missing%20Authorization%20in%20veronalabs%20WP%20Statistics%20%E2%80%93%20The%20Most%20Popular%20Privacy-Friendly%20Analytics%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbee302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32444-cwe-502-deserialization-of-untrusted-data-in-vllm-project-vllm-bee2fc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32444%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm&amp;severity=critical&amp;id=682d983bc4522896dcbee2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46560-cwe-1333-inefficient-regular-expression-complexity-in-vllm-project-vllm-bee332</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46560%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20vllm-project%20vllm&amp;severity=medium&amp;id=682d983bc4522896dcbee332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30202-cwe-770-allocation-of-resources-without-limits-or-throttling-in-vllm-project-vllm-bee2fa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30202%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20vllm-project%20vllm&amp;severity=high&amp;id=682d983bc4522896dcbee2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unzip-stream-031-arbitrary-file-write-65dd9e89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=unzip-stream%200.3.1%20-%20Arbitrary%20File%20Write&amp;severity=medium&amp;id=68489e497e6d765d51d543a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45020-n-a-in-n-a-bee150</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45007-n-a-in-n-a-bee14a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45007%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45011-n-a-in-n-a-bede51</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45011%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbede51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45021-n-a-in-n-a-beddbd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeddbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45010-n-a-in-n-a-beddbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45010%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeddbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45009-n-a-in-n-a-beddb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45009%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeddb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46619-n-a-in-n-a-bec666</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46619%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44194-n-a-in-n-a-bec609</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44194%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44193-n-a-in-n-a-bec603</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44193%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44192-n-a-in-n-a-bebe95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44192%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9838c4522896dcbebe95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45019-n-a-in-n-a-bda528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45018-n-a-in-n-a-bda517</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45017-n-a-in-n-a-bda508</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45015-n-a-in-n-a-bda4f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45015%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-30-2a3593</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-30&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-30-f12a69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29906-cwe-287-improper-authentication-in-troglobit-finit-bedace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29906%3A%20CWE-287%3A%20Improper%20Authentication%20in%20troglobit%20finit&amp;severity=high&amp;id=682d983ac4522896dcbedace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46552-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-krypto-hashers-community-khc-invitation-automation-beda6b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46552%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Krypto-Hashers-Community%20KHC-INVITATION-AUTOMATION&amp;severity=medium&amp;id=682d983ac4522896dcbeda6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3910-improper-authentication-in-red-hat-red-hat-build-of-keycloak-bedc53</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3910%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d983bc4522896dcbedc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3501-improper-validation-of-certificate-with-host-mismatch-in-red-hat-red-hat-build-of-keycloak-bedc4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3501%3A%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch&amp;severity=high&amp;id=682d983bc4522896dcbedc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46344-cwe-613-insufficient-session-expiration-in-auth0-nextjs-auth0-bee306</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46344%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20auth0%20nextjs-auth0&amp;severity=medium&amp;id=682d983bc4522896dcbee306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46550-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee30a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46550%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983bc4522896dcbee30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46549-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee2d3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46549%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983bc4522896dcbee2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46348-cwe-287-improper-authentication-in-yeswiki-yeswiki-bee2af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46348%3A%20CWE-287%3A%20Improper%20Authentication%20in%20YesWiki%20yeswiki&amp;severity=critical&amp;id=682d983bc4522896dcbee2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4078-path-traversal-in-wangshen-secgate-3600-bee6fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4078%3A%20Path%20Traversal%20in%20Wangshen%20SecGate%203600&amp;severity=medium&amp;id=682d983cc4522896dcbee6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0520-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-showdoc-showdoc-bee668</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0520%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ShowDoc%20ShowDoc&amp;severity=critical&amp;id=682d983cc4522896dcbee668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4080-sql-injection-in-phpgurukul-online-nurse-hiring-system-bee828</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4080%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Nurse%20Hiring%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4079-buffer-overflow-in-pcman-ftp-server-bee900</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4079%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d983cc4522896dcbee900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mintsloader-malware-analysis-multi-stage-loader-us-aa561143</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MintsLoader%20Malware%20Analysis%3A%20Multi-Stage%20Loader%20Used%20in%20Cyber%20Attacks&amp;severity=medium&amp;id=6838a3fe182aa0cae2888b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4077-stack-based-buffer-overflow-in-code-projects-school-billing-system-bee948</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4077%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20School%20Billing%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4076-command-injection-in-lb-link-bl-ac3600-bee91a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4076%3A%20Command%20Injection%20in%20LB-LINK%20BL-AC3600&amp;severity=medium&amp;id=682d983cc4522896dcbee91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4075-cross-site-scripting-in-vmsman-bee9c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4075%3A%20Cross%20Site%20Scripting%20in%20VMSMan&amp;severity=medium&amp;id=682d983cc4522896dcbee9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4074-sql-injection-in-phpgurukul-curfew-e-pass-management-system-bee99c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4074%3A%20SQL%20Injection%20in%20PHPGurukul%20Curfew%20e-Pass%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3911-cwe-532-insertion-of-sensitive-information-into-log-file-in-docker-docker-desktop-bee954</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3911%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=682d983cc4522896dcbee954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4095-cwe-862-missing-authorization-in-docker-docker-desktop-bee97e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4095%3A%20CWE-862%20Missing%20Authorization%20in%20Docker%20Docker%20Desktop&amp;severity=medium&amp;id=682d983cc4522896dcbee97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46350-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee95c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46350%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=low&amp;id=682d983cc4522896dcbee95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46349-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee958</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46349%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=high&amp;id=682d983cc4522896dcbee958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46347-cwe-116-improper-encoding-or-escaping-of-output-in-yeswiki-yeswiki-bee950</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46347%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983cc4522896dcbee950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4073-sql-injection-in-phpgurukul-student-record-system-bee944</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4073%3A%20SQL%20Injection%20in%20PHPGurukul%20Student%20Record%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4072-sql-injection-in-phpgurukul-online-nurse-hiring-system-bee940</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4072%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Nurse%20Hiring%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/outlaw-cybergang-attacking-targets-worldwide-c02e3191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Outlaw%20cybergang%20attacking%20targets%20worldwide&amp;severity=medium&amp;id=68388802182aa0cae2849376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gremlin-stealer-new-stealer-on-sale-in-underground-399fed21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gremlin%20Stealer%3A%20New%20Stealer%20on%20Sale%20in%20Underground%20Forum&amp;severity=medium&amp;id=68388802182aa0cae2849385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0716-cwe-791-incomplete-filtering-of-special-elements-in-google-angularjs-aeb850</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0716%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Google%20AngularJS&amp;severity=medium&amp;id=682cd0f81484d88663aeb850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23181-cwe-250-execution-with-unnecessary-privileges-in-ribbon-communications-apollo-9608-bee9c0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23181%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23180-cwe-250-execution-with-unnecessary-privileges-in-ribbon-communications-apollo-9608-bee9a9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23180%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23179-cwe-798-use-of-hard-coded-credentials-in-ribbon-communications-apollo-9608-bee98c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23179%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=medium&amp;id=682d983cc4522896dcbee98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23178-cwe-923-improper-restriction-of-communication-channel-to-intended-endpoints-in-ribbon-communications-apollo-9608-bee988</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23178%3A%20CWE-923%3A%20Improper%20Restriction%20of%20Communication%20Channel%20to%20Intended%20Endpoints%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23177-cwe-427-uncontrolled-search-path-element-in-ribbon-communications-apollo-9608-bee984</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23177%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Ribbon%20Communications%20Apollo%209608&amp;severity=high&amp;id=682d983cc4522896dcbee984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4071-sql-injection-in-phpgurukul-covid19-testing-management-system-bee97a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4071%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4070-sql-injection-in-phpgurukul-rail-pass-management-system-bee960</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4070%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40619-cwe-863-incorrect-authorization-in-bookgy-bookgy-beea4e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40619%3A%20CWE-863%20Incorrect%20Authorization%20in%20Bookgy%20Bookgy&amp;severity=critical&amp;id=682d983cc4522896dcbeea4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40618-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bookgy-bookgy-beeac0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40618%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bookgy%20Bookgy&amp;severity=critical&amp;id=682d983cc4522896dcbeeac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40617-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bookgy-bookgy-beea27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40617%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bookgy%20Bookgy&amp;severity=critical&amp;id=682d983cc4522896dcbeea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1551-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-operational-decision-manager-beea17</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Operational%20Decision%20Manager&amp;severity=medium&amp;id=682d983cc4522896dcbeea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40616-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-bookgy-bookgy-beea1f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bookgy%20Bookgy&amp;severity=medium&amp;id=682d983cc4522896dcbeea1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40615-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-bookgy-bookgy-bee990</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Bookgy%20Bookgy&amp;severity=medium&amp;id=682d983cc4522896dcbee990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46346-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yeswiki-yeswiki-bee994</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46346%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YesWiki%20yeswiki&amp;severity=medium&amp;id=682d983cc4522896dcbee994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4069-stack-based-buffer-overflow-in-code-projects-product-management-system-bee998</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4069%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Product%20Management%20System&amp;severity=medium&amp;id=682d983cc4522896dcbee998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4068-stack-based-buffer-overflow-in-code-projects-simple-movie-ticket-booking-system-beeaac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4068%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Simple%20Movie%20Ticket%20Booking%20System&amp;severity=medium&amp;id=682d983cc4522896dcbeeaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4067-improper-access-controls-in-scriptandtools-online-travling-system-beebc0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4067%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4066-improper-access-controls-in-scriptandtools-online-travling-system-beedc1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4066%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeedc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4065-improper-access-controls-in-scriptandtools-online-travling-system-beedaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4065%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeedaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4064-improper-access-controls-in-scriptandtools-online-travling-system-beeeff</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4064%3A%20Improper%20Access%20Controls%20in%20ScriptAndTools%20Online-Travling-System&amp;severity=medium&amp;id=682d983cc4522896dcbeeeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3301-cwe-1255-comparison-logic-is-vulnerable-to-power-side-channel-attacks-in-silabs-com-series-2-socs-and-associated-modules-beef9a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3301%3A%20CWE-1255%20Comparison%20Logic%20is%20Vulnerable%20to%20Power%20Side-Channel%20Attacks%20in%20silabs.com%20Series%202%20SoCs%20and%20associated%20modules&amp;severity=low&amp;id=682d983dc4522896dcbeef9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4063-stack-based-buffer-overflow-in-code-projects-student-information-management-system-bd70cf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4063%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Student%20Information%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd70cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4062-stack-based-buffer-overflow-in-code-projects-theater-seat-booking-system-beed3b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4062%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Theater%20Seat%20Booking%20System&amp;severity=medium&amp;id=682d983cc4522896dcbeed3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4093-memory-safety-bug-fixed-in-firefox-esr-128-10-and-thunderbird-128-10-in-mozilla-firefox-esr-beccf5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4093%3A%20Memory%20safety%20bug%20fixed%20in%20Firefox%20ESR%20128.10%20and%20Thunderbird%20128.10%20in%20Mozilla%20Firefox%20ESR&amp;severity=high&amp;id=682d9839c4522896dcbeccf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4092-memory-safety-bugs-fixed-in-firefox-138-and-thunderbird-138-in-mozilla-firefox-beebc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4092%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20138%20and%20Thunderbird%20138%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d983cc4522896dcbeebc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4091-memory-safety-bugs-fixed-in-firefox-138-thunderbird-138-firefox-esr-128-10-and-thunderbird-128-10-in-mozilla-firefox-beccf1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4091%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20138%2C%20Thunderbird%20138%2C%20Firefox%20ESR%20128.10%2C%20and%20Thunderbird%20128.10%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9839c4522896dcbeccf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4090-leaked-library-paths-in-thunderbird-for-android-in-mozilla-firefox-becced</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4090%3A%20Leaked%20library%20paths%20in%20Thunderbird%20for%20Android%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4089-potential-local-code-execution-in-copy-as-curl-command-in-mozilla-firefox-bee3d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4089%3A%20Potential%20local%20code%20execution%20in%20%22copy%20as%20cURL%22%20command%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d983bc4522896dcbee3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4088-cross-site-request-forgery-via-storage-access-api-redirects-in-mozilla-firefox-becce7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4088%3A%20Cross-site%20request%20forgery%20via%20storage%20access%20API%20redirects%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbecce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4087-unsafe-attribute-access-during-xpath-parsing-in-mozilla-firefox-becce3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4087%3A%20Unsafe%20attribute%20access%20during%20XPath%20parsing%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbecce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4086-specially-crafted-filename-could-be-used-to-obscure-download-type-in-mozilla-firefox-beccd6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4086%3A%20Specially%20crafted%20filename%20could%20be%20used%20to%20obscure%20download%20type%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9839c4522896dcbeccd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4085-potential-information-leakage-and-privilege-escalation-in-uitour-actor-in-mozilla-firefox-bebfec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4085%3A%20Potential%20information%20leakage%20and%20privilege%20escalation%20in%20UITour%20actor%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9838c4522896dcbebfec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4084-potential-local-code-execution-in-copy-as-curl-command-in-mozilla-firefox-esr-bebfe8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4084%3A%20Potential%20local%20code%20execution%20in%20%22copy%20as%20cURL%22%20command%20in%20Mozilla%20Firefox%20ESR&amp;severity=medium&amp;id=682d9838c4522896dcbebfe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4083-process-isolation-bypass-using-javascript-uri-links-in-cross-origin-frames-in-mozilla-firefox-bd8f40</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4083%3A%20Process%20isolation%20bypass%20using%20%22javascript%3A%22%20URI%20links%20in%20cross-origin%20frames%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d981ac4522896dcbd8f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4082-webgl-shader-attribute-memory-corruption-in-thunderbird-for-macos-in-mozilla-firefox-bebfe4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4082%3A%20WebGL%20shader%20attribute%20memory%20corruption%20in%20Thunderbird%20for%20macOS%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9838c4522896dcbebfe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2817-privilege-escalation-in-thunderbird-updater-in-mozilla-firefox-beccc3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2817%3A%20Privilege%20escalation%20in%20Thunderbird%20Updater%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d9839c4522896dcbeccc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4061-stack-based-buffer-overflow-in-code-projects-clothing-store-management-system-bef11f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4061%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Clothing%20Store%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4035-improper-handling-of-case-sensitivity-in-red-hat-red-hat-enterprise-linux-6-bef0ef</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4035%3A%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%2010&amp;severity=medium&amp;id=682d983dc4522896dcbef0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4060-sql-injection-in-phpgurukul-notice-board-system-bef11b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4060%3A%20SQL%20Injection%20in%20PHPGurukul%20Notice%20Board%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4059-stack-based-buffer-overflow-in-code-projects-prison-management-system-bef0cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4059%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Prison%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3891-uncaught-exception-in-red-hat-red-hat-enterprise-linux-8-bd6858</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3891%3A%20Uncaught%20Exception&amp;severity=high&amp;id=682d9816c4522896dcbd6858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58099-vulnerability-in-linux-linux-bde395</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3929-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-mdaemon-email-server-bef0de</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3929%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MDaemon%20Email%20Server&amp;severity=medium&amp;id=682d983dc4522896dcbef0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4058-sql-injection-in-projectworlds-online-examination-system-bef0f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4058%3A%20SQL%20Injection%20in%20Projectworlds%20Online%20Examination%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1194-cwe-1333-inefficient-regular-expression-complexity-in-huggingface-huggingface-transformers-bef0d4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1194%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20huggingface%20huggingface%2Ftransformers&amp;severity=medium&amp;id=682d983dc4522896dcbef0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30194-cwe-416-user-after-free-in-powerdns-dnsdist-bef0a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30194%3A%20CWE-416%20User%20After%20Free%20in%20PowerDNS%20DNSdist&amp;severity=high&amp;id=682d983dc4522896dcbef0a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3452-cwe-862-missing-authorization-in-secupress-secupress-free-wordpress-security-bef0ab</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3452%3A%20CWE-862%20Missing%20Authorization%20in%20secupress%20SecuPress%20Free%20%E2%80%94%20WordPress%20Security&amp;severity=medium&amp;id=682d983dc4522896dcbef0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2893-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jegstudio-gutenverse-ultimate-block-addons-and-page-builder-for-site-editor-bef07f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegstudio%20Gutenverse%20%E2%80%93%20Ultimate%20Block%20Addons%20and%20Page%20Builder%20for%20Site%20Editor&amp;severity=medium&amp;id=682d983dc4522896dcbef07f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12273-cwe-79-cross-site-scripting-xss-in-unknown-calculated-fields-form-bef07b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12273%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Calculated%20Fields%20Form&amp;severity=low&amp;id=682d983dc4522896dcbef07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46329-cwe-532-insertion-of-sensitive-information-into-log-file-in-snowflakedb-libsnowflakeclient-bef0bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46329%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20snowflakedb%20libsnowflakeclient&amp;severity=low&amp;id=682d983dc4522896dcbef0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46343-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-n8n-io-n8n-bef0c4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46343%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20n8n-io%20n8n&amp;severity=medium&amp;id=682d983dc4522896dcbef0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46338-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-advplyr-audiobookshelf-bef0c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46338%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advplyr%20audiobookshelf&amp;severity=medium&amp;id=682d983dc4522896dcbef0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46330-cwe-573-improper-following-of-specification-by-caller-in-snowflakedb-libsnowflakeclient-bef056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46330%3A%20CWE-573%3A%20Improper%20Following%20of%20Specification%20by%20Caller%20in%20snowflakedb%20libsnowflakeclient&amp;severity=low&amp;id=682d983dc4522896dcbef056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24252-an-attacker-on-the-local-network-may-be-able-to-corrupt-process-memory-in-apple-tvos-bed355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24252%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d983ac4522896dcbed355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31197-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-tvos-bedd97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31197%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbedd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24179-an-attacker-on-the-local-network-may-be-able-to-cause-a-denial-of-service-in-apple-visionos-bede26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24179%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24270-an-attacker-on-the-local-network-may-be-able-to-leak-sensitive-user-information-in-apple-tvos-bede49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24270%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24271-an-unauthenticated-user-on-the-same-network-as-a-signed-in-mac-could-send-it-airplay-commands-without-pairing-in-apple-tvos-bede4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24271%3A%20An%20unauthenticated%20user%20on%20the%20same%20network%20as%20a%20signed-in%20Mac%20could%20send%20it%20AirPlay%20commands%20without%20pairing%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24206-an-attacker-on-the-local-network-may-be-able-to-bypass-authentication-policy-in-apple-tvos-bed34f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24206%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20bypass%20authentication%20policy%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d983ac4522896dcbed34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24251-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-watchos-bede2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24251%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbede2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31202-an-attacker-on-the-local-network-may-be-able-to-cause-a-denial-of-service-in-apple-tvos-beec25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31202%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983cc4522896dcbeec25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31203-an-attacker-on-the-local-network-may-be-able-to-cause-a-denial-of-service-in-apple-watchos-beddb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31203%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbeddb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30445-an-attacker-on-the-local-network-may-cause-an-unexpected-app-termination-in-apple-tvos-bedd93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30445%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d983bc4522896dcbedd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57698-n-a-in-n-a-bee129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57698%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45956-n-a-in-n-a-bda52c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25403-n-a-in-n-a-bda4ef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25403%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32354-n-a-in-n-a-bda4ba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25962-n-a-in-n-a-bda4a3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25962%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-29-2a3124</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-29&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-29-f1291a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f1291a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46328-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-snowflakedb-snowflake-connector-nodejs-bef04e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46328%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20snowflakedb%20snowflake-connector-nodejs&amp;severity=low&amp;id=682d983dc4522896dcbef04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46327-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-snowflakedb-gosnowflake-bef046</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46327%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20snowflakedb%20gosnowflake&amp;severity=low&amp;id=682d983dc4522896dcbef046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46326-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-snowflakedb-snowflake-connector-net-bef02d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46326%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20snowflakedb%20snowflake-connector-net&amp;severity=low&amp;id=682d983dc4522896dcbef02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4039-sql-injection-in-phpgurukul-rail-pass-management-system-bef307</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4039%3A%20SQL%20Injection%20in%20PHPGurukul%20Rail%20Pass%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4038-stack-based-buffer-overflow-in-code-projects-train-ticket-reservation-system-bef2e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4038%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Train%20Ticket%20Reservation%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11922-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-fortra-goanywhere-mft-bef2ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=medium&amp;id=682d983dc4522896dcbef2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0049-cwe-209-generation-of-error-message-containing-sensitive-information-in-fortra-goanywhere-bef2d2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0049%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Fortra%20GoAnywhere&amp;severity=low&amp;id=682d983dc4522896dcbef2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10635-cwe-20-improper-input-validation-in-proofpoint-enterprise-protection-bef2ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10635%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Proofpoint%20Enterprise%20Protection&amp;severity=medium&amp;id=682d983dc4522896dcbef2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4037-business-logic-errors-in-code-projects-atm-banking-bef2d6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4037%3A%20Business%20Logic%20Errors%20in%20code-projects%20ATM%20Banking&amp;severity=medium&amp;id=682d983dc4522896dcbef2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4036-improper-access-controls-in-201206030-novel-bef36c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4036%3A%20Improper%20Access%20Controls%20in%20201206030%20Novel&amp;severity=medium&amp;id=682d983dc4522896dcbef36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4034-sql-injection-in-projectworlds-online-examination-system-bef368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4034%3A%20SQL%20Injection%20in%20projectworlds%20Online%20Examination%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3224-cwe-269-improper-privilege-management-in-docker-docker-desktop-bef420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3224%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Docker%20Docker%20Desktop&amp;severity=high&amp;id=682d983dc4522896dcbef420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34491-cwe-502-deserialization-of-untrusted-data-in-gfi-mailessentials-bef41c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34491%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20MailEssentials&amp;severity=high&amp;id=682d983dc4522896dcbef41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31651-cwe-116-improper-encoding-or-escaping-of-output-in-apache-software-foundation-apache-tomcat-bd9e21</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31651%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=682d981bc4522896dcbd9e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31650-cwe-459-incomplete-cleanup-in-apache-software-foundation-apache-tomcat-bd9e72</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31650%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=682d981bc4522896dcbd9e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34490-cwe-611-improper-restriction-of-xml-external-entity-reference-in-gfi-mailessentials-bef3e1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34490%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20GFI%20MailEssentials&amp;severity=medium&amp;id=682d983dc4522896dcbef3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4033-sql-injection-in-phpgurukul-nipah-virus-testing-management-system-bef3c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4033%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34489-cwe-502-deserialization-of-untrusted-data-in-gfi-mailessentials-bef428</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34489%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20MailEssentials&amp;severity=high&amp;id=682d983dc4522896dcbef428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4032-os-command-injection-in-inclusionai-aworld-bef466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4032%3A%20OS%20Command%20Injection%20in%20inclusionAI%20AWorld&amp;severity=low&amp;id=682d983dc4522896dcbef466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4031-sql-injection-in-phpgurukul-pre-school-enrollment-system-bef43c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4031%3A%20SQL%20Injection%20in%20PHPGurukul%20Pre-School%20Enrollment%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12706-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-opentext-digital-asset-management-bef438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12706%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenText%E2%84%A2%20Digital%20Asset%20Management.&amp;severity=low&amp;id=682d983dc4522896dcbef438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4030-sql-injection-in-phpgurukul-covid19-testing-management-system-bef5bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4030%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4029-stack-based-buffer-overflow-in-code-projects-personal-diary-management-system-bef5f5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4029%3A%20Stack-based%20Buffer%20Overflow%20in%20code-projects%20Personal%20Diary%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4028-sql-injection-in-phpgurukul-covid19-testing-management-system-bef5b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4028%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pick-your-poison-a-double-edged-email-attack-08b99aea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pick%20your%20Poison%20-%20A%20Double-Edged%20Email%20Attack&amp;severity=medium&amp;id=6837364b182aa0cae25380fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43857-cwe-400-uncontrolled-resource-consumption-in-ruby-net-imap-bef596</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43857%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20net-imap&amp;severity=medium&amp;id=682d983dc4522896dcbef596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4027-sql-injection-in-phpgurukul-old-age-home-management-system-bef5ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4027%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43854-cwe-1021-improper-restriction-of-rendered-ui-layers-or-frames-in-langgenius-dify-bef585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43854%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20langgenius%20dify&amp;severity=low&amp;id=682d983dc4522896dcbef585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4026-sql-injection-in-phpgurukul-nipah-virus-testing-management-system-bdcc6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4026%3A%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=682d981fc4522896dcbdcc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4025-sql-injection-in-itsourcecode-placement-management-system-bef63f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4025%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23377-cwe-116-improper-encoding-or-escaping-of-output-in-dell-powerprotect-data-manager-bef888</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23377%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=medium&amp;id=682d983dc4522896dcbef888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23376-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-dell-powerprotect-data-manager-reporting-bef622</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23376%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Dell%20PowerProtect%20Data%20Manager%20Reporting&amp;severity=low&amp;id=682d983dc4522896dcbef622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4024-sql-injection-in-itsourcecode-placement-management-system-bef630</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4024%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23375-cwe-648-incorrect-use-of-privileged-apis-in-dell-powerprotect-data-manager-bee3d1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23375%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=682d983bc4522896dcbee3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4023-sql-injection-in-itsourcecode-placement-management-system-bef97a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4023%3A%20SQL%20Injection%20in%20itsourcecode%20Placement%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4022-code-injection-in-web-arena-x-webarena-bef317</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4022%3A%20Code%20Injection%20in%20web-arena-x%20webarena&amp;severity=medium&amp;id=682d983dc4522896dcbef317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4021-sql-injection-in-code-projects-patient-record-management-system-bef5aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4021%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4020-sql-injection-in-phpgurukul-old-age-home-management-system-bef5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4020%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32472-cwe-400-uncontrolled-resource-consumption-in-sick-ag-sick-multiscan1xx-bef69a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32472%3A%20CWE-400%20(Uncontrolled%20Resource%20Consumption)%20in%20SICK%20AG%20SICK%20multiScan1XX&amp;severity=medium&amp;id=682d983dc4522896dcbef69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4019-missing-authentication-in-20120630-novel-plus-bef59e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4019%3A%20Missing%20Authentication%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983dc4522896dcbef59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4018-missing-authentication-in-20120630-novel-plus-befa59</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4018%3A%20Missing%20Authentication%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4017-improper-authorization-in-20120630-novel-plus-befa51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4017%3A%20Improper%20Authorization%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4016-improper-authorization-in-20120630-novel-plus-befa3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4016%3A%20Improper%20Authorization%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4015-missing-authentication-in-20120630-novel-plus-befa38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4015%3A%20Missing%20Authentication%20in%2020120630%20Novel-Plus&amp;severity=medium&amp;id=682d983ec4522896dcbefa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3200-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-wiesemann-theis-com-server-befa34</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3200%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Wiesemann%20%26%20Theis%20Com-Server%2B%2B&amp;severity=critical&amp;id=682d983ec4522896dcbefa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4014-sql-injection-in-phpgurukul-art-gallery-management-system-befa1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4014%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbefa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32471-cwe-1391-use-of-weak-credentials-in-sick-ag-sick-flx3-cpuc200-bef75e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32471%3A%20CWE-1391%20(Use%20of%20Weak%20Credentials)%20in%20SICK%20AG%20SICK%20FLX3-CPUC200&amp;severity=low&amp;id=682d983dc4522896dcbef75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39367-cwe-862-missing-authorization-in-seventhqueen-kleo-befa18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39367%3A%20Missing%20Authorization%20in%20SeventhQueen%20Kleo&amp;severity=null&amp;id=682d983ec4522896dcbefa18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32470-cwe-284-improper-access-control-in-sick-ag-sick-flx0-gpnt100-bef756</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32470%3A%20CWE-284%20(Improper%20Access%20Control)%20in%20SICK%20AG%20SICK%20FLX0-GPNT100&amp;severity=high&amp;id=682d983dc4522896dcbef756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4013-sql-injection-in-phpgurukul-art-gallery-management-system-befa10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4013%3A%20SQL%20Injection%20in%20PHPGurukul%20Art%20Gallery%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbefa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4012-server-side-request-forgery-in-playeduxyz-playedu-bef712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4012%3A%20Server-Side%20Request%20Forgery%20in%20playeduxyz%20PlayEdu%20%E5%BC%80%E6%BA%90%E5%9F%B9%E8%AE%AD%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=682d983dc4522896dcbef712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42598-incorrect-default-permissions-in-seiko-epson-corporation-seiko-epson-printer-drivers-for-windows-os-bef6da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42598%3A%20Incorrect%20default%20permissions%20in%20SEIKO%20EPSON%20CORPORATION%20SEIKO%20EPSON%20printer%20drivers%20for%20Windows%20OS&amp;severity=high&amp;id=682d983dc4522896dcbef6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4011-cross-site-scripting-in-redmine-bef701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4011%3A%20Cross%20Site%20Scripting%20in%20Redmine&amp;severity=medium&amp;id=682d983dc4522896dcbef701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4007-stack-based-buffer-overflow-in-tenda-w12-bef6ea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4007%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=high&amp;id=682d983dc4522896dcbef6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22235-cwe-20-improper-input-validation-in-spring-spring-boot-aeba5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22235%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Spring%20Spring%20Boot&amp;severity=high&amp;id=682cd0f91484d88663aeba5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4006-unrestricted-upload-in-youyiio-beyongcms-bef963</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4006%3A%20Unrestricted%20Upload%20in%20youyiio%20BeyongCms&amp;severity=medium&amp;id=682d983ec4522896dcbef963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4005-sql-injection-in-phpgurukul-covid19-testing-management-system-bef956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4005%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4004-sql-injection-in-phpgurukul-covid19-testing-management-system-bec259</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4004%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0627-cwe-79-cross-site-scripting-xss-in-unknown-wordpress-tag-category-and-taxonomy-manager-bef687</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0627%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WordPress%20Tag%2C%20Category%2C%20and%20Taxonomy%20Manager&amp;severity=low&amp;id=682d983dc4522896dcbef687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9771-cwe-89-sql-injection-in-unknown-wp-recall-bef658</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9771%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP-Recall&amp;severity=low&amp;id=682d983dc4522896dcbef658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13688-cwe-287-improper-authentication-in-unknown-admin-and-site-enhancements-ase-bef60d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13688%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=682d983dc4522896dcbef60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4003-null-pointer-dereference-in-refindplusrepo-refindplus-bef94e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4003%3A%20NULL%20Pointer%20Dereference%20in%20RefindPlusRepo%20RefindPlus&amp;severity=medium&amp;id=682d983ec4522896dcbef94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4002-null-pointer-dereference-in-refindplusrepo-refindplus-bef94a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4002%3A%20NULL%20Pointer%20Dereference%20in%20RefindPlusRepo%20RefindPlus&amp;severity=medium&amp;id=682d983ec4522896dcbef94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4001-uncontrolled-file-descriptor-consumption-in-scipopt-scip-bef946</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4001%3A%20Uncontrolled%20File%20Descriptor%20Consumption%20in%20scipopt%20scip&amp;severity=medium&amp;id=682d983ec4522896dcbef946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4000-cross-site-scripting-in-seeyon-zhiyuan-oa-web-application-system-bef59a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4000%3A%20Cross%20Site%20Scripting%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3999-cross-site-scripting-in-seeyon-zhiyuan-oa-web-application-system-bd6be7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3999%3A%20Cross%20Site%20Scripting%20in%20Seeyon%20Zhiyuan%20OA%20Web%20Application%20System&amp;severity=medium&amp;id=682d9816c4522896dcbd6be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3998-sql-injection-in-codeastro-membership-management-system-bef568</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3998%3A%20SQL%20Injection%20in%20CodeAstro%20Membership%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3706-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-104-corporation-ehrms-bef53f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20104%20Corporation%20eHRMS&amp;severity=medium&amp;id=682d983dc4522896dcbef53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3997-cross-site-request-forgery-in-dazhouda-lecms-bef4cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3997%3A%20Cross-Site%20Request%20Forgery%20in%20dazhouda%20lecms&amp;severity=medium&amp;id=682d983dc4522896dcbef4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3996-cross-site-scripting-in-totolink-n150rt-bef4c7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3996%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3995-cross-site-scripting-in-totolink-n150rt-bef462</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3995%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3994-cross-site-scripting-in-totolink-n150rt-bef92f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3994%3A%20Cross%20Site%20Scripting%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3993-buffer-overflow-in-totolink-n150rt-bef8dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3993%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3992-buffer-overflow-in-totolink-n150rt-bef8d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3992%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-2079-cwe-96-improper-neutralization-of-directives-in-statically-saved-code-static-code-injection-in-usermin-usermin-bef837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-2079%3A%20CWE-96%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20Usermin%20Usermin&amp;severity=critical&amp;id=682d983dc4522896dcbef837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46614-cwe-532-insertion-of-sensitive-information-into-log-file-in-snowflake-snowflake-odbc-bef739</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46614%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Snowflake%20Snowflake%20ODBC&amp;severity=low&amp;id=682d983dc4522896dcbef739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35814-cwe-502-deserialization-of-untrusted-data-in-devexpress-devexpress-bef731</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35814%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DevExpress%20DevExpress&amp;severity=low&amp;id=682d983dc4522896dcbef731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41871-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-seppmail-seppmail-bef720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41871%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SEPPmail%20SEPPmail&amp;severity=medium&amp;id=682d983dc4522896dcbef720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46661-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-ipw-metazo-bef6c1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46661%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20IPW%20Metazo&amp;severity=critical&amp;id=682d983dc4522896dcbef6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25776-n-a-in-n-a-bef601</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25776%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-4582-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thecartpress-boot-store-bef5f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-4582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TheCartPress%20boot-store&amp;severity=high&amp;id=682d983dc4522896dcbef5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32499-cwe-94-improper-control-of-generation-of-code-code-injection-in-newforma-project-center-server-bef5ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32499%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Newforma%20Project%20Center%20Server&amp;severity=medium&amp;id=682d983dc4522896dcbef5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42404-cwe-94-improper-control-of-generation-of-code-code-injection-in-onevision-workspace-bef5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42404%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20OneVision%20Workspace&amp;severity=medium&amp;id=682d983dc4522896dcbef5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35817-cwe-918-server-side-request-forgery-ssrf-in-devexpress-devexpress-bef522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35817%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20DevExpress%20DevExpress&amp;severity=medium&amp;id=682d983dc4522896dcbef522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35816-cwe-23-relative-path-traversal-in-devexpress-devexpress-bef51e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35816%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20DevExpress%20DevExpress&amp;severity=low&amp;id=682d983dc4522896dcbef51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35815-cwe-502-deserialization-of-untrusted-data-in-devexpress-devexpress-bef4f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35815%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20DevExpress%20DevExpress&amp;severity=low&amp;id=682d983dc4522896dcbef4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45953-n-a-in-n-a-bef020</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45953%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45949-n-a-in-n-a-bef01c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45949%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45947-n-a-in-n-a-bef018</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45947%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-28-2a3d1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-28&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-28-f12421</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31144-improper-restriction-of-communication-channel-to-intended-endpoints-in-sios-technology-inc-quick-agent-v3-bef884</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31144%3A%20Improper%20restriction%20of%20communication%20channel%20to%20intended%20endpoints%20in%20SIOS%20Technology%2C%20Inc.%20Quick%20Agent%20V3&amp;severity=medium&amp;id=682d983dc4522896dcbef884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27937-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sios-technology-inc-quick-agent-v3-bef873</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27937%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20SIOS%20Technology%2C%20Inc.%20Quick%20Agent%20V3&amp;severity=medium&amp;id=682d983dc4522896dcbef873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26692-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sios-technology-inc-quick-agent-v3-bef84e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26692%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20SIOS%20Technology%2C%20Inc.%20Quick%20Agent%20V3&amp;severity=high&amp;id=682d983dc4522896dcbef84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3991-buffer-overflow-in-totolink-n150rt-bef86b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3991%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3990-buffer-overflow-in-totolink-n150rt-bef863</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3990%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3989-buffer-overflow-in-totolink-n150rt-bef7fa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3989%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3988-buffer-overflow-in-totolink-n150rt-bef7e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3988%3A%20Buffer%20Overflow%20in%20TOTOLINK%20N150RT&amp;severity=high&amp;id=682d983dc4522896dcbef7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3987-command-injection-in-totolink-n150rt-bef628</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3987%3A%20Command%20Injection%20in%20TOTOLINK%20N150RT&amp;severity=medium&amp;id=682d983dc4522896dcbef628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3986-inefficient-regular-expression-complexity-in-apereo-cas-bef609</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3986%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apereo%20CAS&amp;severity=medium&amp;id=682d983dc4522896dcbef609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3985-inefficient-regular-expression-complexity-in-apereo-cas-bef564</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3985%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Apereo%20CAS&amp;severity=medium&amp;id=682d983dc4522896dcbef564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3984-code-injection-in-apereo-cas-bef553</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3984%3A%20Code%20Injection%20in%20Apereo%20CAS&amp;severity=low&amp;id=682d983dc4522896dcbef553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3983-command-injection-in-amtt-hotel-broadband-operation-system-bec267</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3983%3A%20Command%20Injection%20in%20AMTT%20Hotel%20Broadband%20Operation%20System&amp;severity=medium&amp;id=682d9838c4522896dcbec267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2866-cwe-347-improper-verification-of-cryptographic-signature-in-the-document-foundation-libreoffice-bef9af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2866%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=682d983ec4522896dcbef9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3982-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-nortikin-sverchok-bef54b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3982%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20nortikin%20Sverchok&amp;severity=medium&amp;id=682d983dc4522896dcbef54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3981-improper-authorization-in-wowjoy-internet-doctor-workstation-system-bef9f0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3981%3A%20Improper%20Authorization%20in%20wowjoy%20%E6%B5%99%E6%B1%9F%E6%B9%96%E5%B7%9E%E5%8D%8E%E5%8D%93%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Internet%20Doctor%20Workstation%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3980-improper-authorization-in-wowjoy-internet-doctor-workstation-system-bef9ce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3980%3A%20Improper%20Authorization%20in%20wowjoy%20%E6%B5%99%E6%B1%9F%E6%B9%96%E5%B7%9E%E5%8D%8E%E5%8D%93%E4%BF%A1%E6%81%AF%E7%A7%91%E6%8A%80%E6%9C%89%E9%99%90%E5%85%AC%E5%8F%B8%20Internet%20Doctor%20Workstation%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3979-cross-site-request-forgery-in-dazhouda-lecms-bef9c6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3979%3A%20Cross-Site%20Request%20Forgery%20in%20dazhouda%20lecms&amp;severity=medium&amp;id=682d983ec4522896dcbef9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3978-information-disclosure-in-dazhouda-lecms-bef9be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3978%3A%20Information%20Disclosure%20in%20dazhouda%20lecms&amp;severity=medium&amp;id=682d983ec4522896dcbef9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3977-improper-authorization-in-iteachyou-dreamer-cms-bef9a7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3977%3A%20Improper%20Authorization%20in%20iteachyou%20Dreamer%20CMS&amp;severity=medium&amp;id=682d983ec4522896dcbef9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3976-sql-injection-in-phpgurukul-covid19-testing-management-system-bef9a1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3976%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbef9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3975-information-disclosure-in-scriptandtools-ecommerce-website-in-php-bef952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3975%3A%20Information%20Disclosure%20in%20ScriptAndTools%20eCommerce-website-in-PHP&amp;severity=medium&amp;id=682d983ec4522896dcbef952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3974-sql-injection-in-phpgurukul-covid19-testing-management-system-bef925</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3974%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3973-sql-injection-in-phpgurukul-covid19-testing-management-system-bef91d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3973%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3972-sql-injection-in-phpgurukul-covid19-testing-management-system-bef313</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3972%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3971-sql-injection-in-phpgurukul-covid19-testing-management-system-bef30f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3971%3A%20SQL%20Injection%20in%20PHPGurukul%20COVID19%20Testing%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3970-cross-site-scripting-in-baseweb-jsite-bef30b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3970%3A%20Cross%20Site%20Scripting%20in%20baseweb%20JSite&amp;severity=medium&amp;id=682d983dc4522896dcbef30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3969-unrestricted-upload-in-codeprojects-news-publishing-site-dashboard-bef357</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3969%3A%20Unrestricted%20Upload%20in%20codeprojects%20News%20Publishing%20Site%20Dashboard&amp;severity=medium&amp;id=682d983dc4522896dcbef357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3968-sql-injection-in-codeprojects-news-publishing-site-dashboard-bef894</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3968%3A%20SQL%20Injection%20in%20codeprojects%20News%20Publishing%20Site%20Dashboard&amp;severity=medium&amp;id=682d983dc4522896dcbef894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3886-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-cato-networks-sdp-client-bef6aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3886%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Cato%20Networks%20SDP%20Client&amp;severity=medium&amp;id=682d983dc4522896dcbef6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3967-improper-authorization-in-itwanger-paicoding-bef890</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3967%3A%20Improper%20Authorization%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=682d983dc4522896dcbef890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3966-information-disclosure-in-itwanger-paicoding-bef88c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3966%3A%20Information%20Disclosure%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=682d983dc4522896dcbef88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3965-cross-site-scripting-in-itwanger-paicoding-bef85f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3965%3A%20Cross%20Site%20Scripting%20in%20itwanger%20paicoding&amp;severity=medium&amp;id=682d983dc4522896dcbef85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3964-cross-site-request-forgery-in-withstars-books-management-system-bef7c5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3964%3A%20Cross-Site%20Request%20Forgery%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52888-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-checkpoint-check-point-mobile-access-bef683</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52888%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;).%20in%20checkpoint%20Check%20Point%20Mobile%20Access&amp;severity=medium&amp;id=682d983dc4522896dcbef683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52887-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-checkpoint-check-point-mobile-access-bef67f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52887%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;).%20in%20checkpoint%20Check%20Point%20Mobile%20Access&amp;severity=low&amp;id=682d983dc4522896dcbef67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3963-missing-authorization-in-withstars-books-management-system-bef906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3963%3A%20Missing%20Authorization%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3962-cross-site-scripting-in-withstars-books-management-system-bef902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3962%3A%20Cross%20Site%20Scripting%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3961-cross-site-scripting-in-withstars-books-management-system-bef8cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3961%3A%20Cross%20Site%20Scripting%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3960-missing-authorization-in-withstars-books-management-system-bef8c4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3960%3A%20Missing%20Authorization%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3959-cross-site-request-forgery-in-withstars-books-management-system-bef7bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3959%3A%20Cross-Site%20Request%20Forgery%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3958-cross-site-scripting-in-withstars-books-management-system-bef353</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3958%3A%20Cross%20Site%20Scripting%20in%20withstars%20Books-Management-System&amp;severity=medium&amp;id=682d983dc4522896dcbef353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3957-sql-injection-in-opplus-springboot-admin-bef34f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3957%3A%20SQL%20Injection%20in%20opplus%20springboot-admin&amp;severity=medium&amp;id=682d983dc4522896dcbef34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3956-sql-injection-in-201206030-novel-cloud-bef34b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3956%3A%20SQL%20Injection%20in%20201206030%20novel-cloud&amp;severity=medium&amp;id=682d983dc4522896dcbef34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46580-cwe-400-uncontrolled-resource-consumption-in-zte-goldendb-bef833</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46580%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20ZTE%20GoldenDB&amp;severity=high&amp;id=682d983dc4522896dcbef833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46579-cwe-94-improper-control-of-generation-of-code-code-injection-in-zte-goldendb-bef82f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46579%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ZTE%20GoldenDB&amp;severity=high&amp;id=682d983dc4522896dcbef82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46578-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-zte-goldendb-bef81e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46578%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46577-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-zte-goldendb-bef816</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46577%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46576-cwe-269-improper-privilege-management-in-zte-goldendb-bef80e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46576%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46575-cwe-209-generation-of-error-message-containing-sensitive-information-in-zte-goldendb-bef806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46575%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46574-cwe-20-improper-input-validation-in-zte-goldendb-bef7fe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46574%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ZTE%20GoldenDB&amp;severity=medium&amp;id=682d983dc4522896dcbef7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3955-sql-injection-in-codeprojects-patient-record-management-system-bef543</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3955%3A%20SQL%20Injection%20in%20codeprojects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d983dc4522896dcbef543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-27-17955e9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-27&amp;severity=medium&amp;id=68367c97182aa0cae231c263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46690-cwe-425-direct-request-forced-browsing-in-ververica-ververica-platform-bef6e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46690%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Ververica%20Ververica%20Platform&amp;severity=medium&amp;id=682d983dc4522896dcbef6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46689-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ververica-ververica-platform-bef6e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Ververica%20Ververica%20Platform&amp;severity=medium&amp;id=682d983dc4522896dcbef6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46688-cwe-131-incorrect-calculation-of-buffer-size-in-quickjs-project-quickjs-bef6de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46688%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20QuickJS%20Project%20QuickJS&amp;severity=medium&amp;id=682d983dc4522896dcbef6de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46687-cwe-770-allocation-of-resources-without-limits-or-throttling-in-quickjs-project-quickjs-bef6d6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46687%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20QuickJS%20Project%20QuickJS&amp;severity=medium&amp;id=682d983dc4522896dcbef6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46675-cwe-913-improper-control-of-dynamically-managed-code-resources-in-nasa-cryptolib-bef6d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46675%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20NASA%20CryptoLib&amp;severity=low&amp;id=682d983dc4522896dcbef6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46674-cwe-489-active-debug-code-in-nasa-cryptolib-bef6ce</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46674%3A%20CWE-489%20Active%20Debug%20Code%20in%20NASA%20CryptoLib&amp;severity=low&amp;id=682d983dc4522896dcbef6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46657-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-karaz-karazal-bef6bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Karaz%20Karazal&amp;severity=high&amp;id=682d983dc4522896dcbef6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46673-cwe-913-improper-control-of-dynamically-managed-code-resources-in-nasa-cryptolib-beecb2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46673%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20NASA%20CryptoLib&amp;severity=medium&amp;id=682d983cc4522896dcbeecb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46672-cwe-252-unchecked-return-value-in-nasa-cryptolib-beecaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46672%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20NASA%20CryptoLib&amp;severity=low&amp;id=682d983cc4522896dcbeecaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-27-73f0dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-27&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73f0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-27-f12dff</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3954-server-side-request-forgery-in-churchcrm-bef32d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3954%3A%20Server-Side%20Request%20Forgery%20in%20ChurchCRM&amp;severity=medium&amp;id=682d983dc4522896dcbef32d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hannibal-stealer-a-rebranded-threat-born-from-sharp-and-tx-lineage-28544e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HANNIBAL%20Stealer%3A%20A%20Rebranded%20Threat%20Born%20from%20Sharp%20and%20TX%20Lineage&amp;severity=medium&amp;id=68343d6f0acd01a24928544e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2101-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-thememove-edumall-professional-lms-education-center-wordpress-theme-bef790</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2101%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20EduMall%20-%20Professional%20LMS%20Education%20Center%20WordPress%20Theme&amp;severity=high&amp;id=682d983dc4522896dcbef790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13812-cwe-94-improper-control-of-generation-of-code-code-injection-in-anps-anps-theme-plugin-bef788</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13812%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Anps%20Anps%20Theme%20plugin&amp;severity=medium&amp;id=682d983dc4522896dcbef788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2851-buffer-overflow-in-gl-inet-gl-a1300-slate-plus-bef52e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2851%3A%20Buffer%20Overflow%20in%20GL.iNet%20GL-A1300%20Slate%20Plus&amp;severity=high&amp;id=682d983dc4522896dcbef52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2850-improper-authorization-in-gl-inet-gl-a1300-slate-plus-bef526</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2850%3A%20Improper%20Authorization%20in%20GL.iNet%20GL-A1300%20Slate%20Plus&amp;severity=medium&amp;id=682d983dc4522896dcbef526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2811-inefficient-regular-expression-complexity-in-gl-inet-gl-a1300-slate-plus-bef4bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2811%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GL.iNet%20GL-A1300%20Slate%20Plus&amp;severity=medium&amp;id=682d983dc4522896dcbef4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2907-cwe-862-missing-authorization-in-unknown-order-delivery-date-beec1d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2907%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Order%20Delivery%20Date&amp;severity=critical&amp;id=682d983cc4522896dcbeec1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3915-cwe-862-missing-authorization-in-aeropage-aeropage-sync-for-airtable-bef7b5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3915%3A%20CWE-862%20Missing%20Authorization%20in%20aeropage%20Aeropage%20Sync%20for%20Airtable&amp;severity=medium&amp;id=682d983dc4522896dcbef7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3906-cwe-862-missing-authorization-in-felipe152-integra-o-entre-eduzz-e-woocommerce-bef7a0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3906%3A%20CWE-862%20Missing%20Authorization%20in%20felipe152%20Integra%C3%A7%C3%A3o%20entre%20Eduzz%20e%20Woocommerce&amp;severity=high&amp;id=682d983dc4522896dcbef7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3914-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-aeropage-aeropage-sync-for-airtable-bef7af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3914%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aeropage%20Aeropage%20Sync%20for%20Airtable&amp;severity=high&amp;id=682d983dc4522896dcbef7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3491-cwe-94-improper-control-of-generation-of-code-code-injection-in-kiranpatil353-add-custom-page-template-bef798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3491%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kiranpatil353%20Add%20custom%20page%20template&amp;severity=high&amp;id=682d983dc4522896dcbef798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1458-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bdthemes-element-pack-addons-for-elementor-best-elementor-addons-with-ready-templates-blocks-widgets-and-woocommerce-builder-bef31f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20addons%20with%20Ready%20Templates%2C%20Blocks%2C%20Widgets%20and%20WooCommerce%20Builder&amp;severity=medium&amp;id=682d983dc4522896dcbef31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2105-cwe-502-deserialization-of-untrusted-data-in-artbees-jupiter-x-core-bef325</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2105%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=682d983dc4522896dcbef325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13808-cwe-94-improper-control-of-generation-of-code-code-injection-in-wpxpro-xpro-elementor-addons-pro-bef31b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13808%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WPXpro%20Xpro%20Elementor%20Addons%20-%20Pro&amp;severity=high&amp;id=682d983dc4522896dcbef31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-gif-leveraged-in-multi-stage-reverse-proxy-card-skimming-attack-283989</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20GIF%20Leveraged%20in%20Multi-Stage%20Reverse-Proxy%20Card%20Skimming%20Attack&amp;severity=medium&amp;id=6833daf00acd01a249283989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2801-cwe-94-improper-control-of-generation-of-code-code-injection-in-dorinabc-create-custom-forms-for-wordpress-with-a-smart-form-plugin-for-smart-businesses-form-builder-for-wordpress-bef329</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2801%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20dorinabc%20Create%20custom%20forms%20for%20WordPress%20with%20a%20smart%20form%20plugin%20for%20smart%20businesses%20%E2%80%93%20Form%20builder%20for%20WordPress&amp;severity=high&amp;id=682d983dc4522896dcbef329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-persistent-threat-of-salt-typhoon-tracking-exposures-of-potentially-targeted-devices-283424</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Persistent%20Threat%20of%20Salt%20Typhoon%3A%20Tracking%20Exposures%20of%20Potentially%20Targeted%20Devices&amp;severity=medium&amp;id=6833becd0acd01a249283424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46652-cwe-830-inclusion-of-web-functionality-from-an-untrusted-source-in-izarc-izarc-bef752</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46652%3A%20CWE-830%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20IZArc%20IZArc&amp;severity=medium&amp;id=682d983dc4522896dcbef752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46656-cwe-1284-improper-validation-of-specified-quantity-in-input-in-python-markdownify-python-markdownify-beeca6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46656%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20python-markdownify%20python-markdownify&amp;severity=low&amp;id=682d983cc4522896dcbeeca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46655-cwe-424-improper-protection-of-alternate-path-in-hackmd-codimd-beec97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46655%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20HackMD%20CodiMD&amp;severity=medium&amp;id=682d983cc4522896dcbeec97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46654-cwe-424-improper-protection-of-alternate-path-in-hackmd-codimd-beec80</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46654%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20HackMD%20CodiMD&amp;severity=medium&amp;id=682d983cc4522896dcbeec80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46653-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-node-formidable-formidable-beec7c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46653%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20node-formidable%20Formidable&amp;severity=low&amp;id=682d983cc4522896dcbeec7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46646-cwe-24-path-traversal-filedir-in-artifex-ghostscript-beec78</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46646%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Artifex%20Ghostscript&amp;severity=medium&amp;id=682d983cc4522896dcbeec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53636-cwe-24-path-traversal-filedir-in-serosoft-academia-student-information-system-beec15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53636%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Serosoft%20Academia%20Student%20Information%20System&amp;severity=medium&amp;id=682d983cc4522896dcbeec15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-26-2a3b76</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-26&amp;severity=medium&amp;id=682c7db2e8347ec82d2a3b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-26-f130b9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f130b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46333-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-vancluever-z2d-bef937</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46333%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20vancluever%20z2d&amp;severity=high&amp;id=682d983dc4522896dcbef937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3935-cwe-287-improper-authentication-in-connectwise-screenconnect-beff58</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3935%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ConnectWise%20ScreenConnect&amp;severity=high&amp;id=682d983ec4522896dcbeff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30152-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-hcl-software-hcl-sx-beffc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30152%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20HCL%20Software%20HCL%20SX&amp;severity=medium&amp;id=682d983ec4522896dcbeffc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-new-version-of-triada-spreads-embedded-in-the-firmware-of-android-devices-2819c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20new%20version%20of%20Triada%20spreads%20embedded%20in%20the%20firmware%20of%20Android%20devices&amp;severity=medium&amp;id=6833406d0acd01a2492819c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3928-cwe-noinfo-not-enough-information-in-commvault-web-server-bdcb59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3928%3A%20CWE-noinfo%20Not%20enough%20information%20in%20Commvault%20Web%20Server&amp;severity=high&amp;id=682d981fc4522896dcbdcb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2070-cwe-611-improper-restriction-of-xml-external-entity-reference-xxe-in-filez-client-bf013e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2070%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20in%20FileZ%20Client&amp;severity=medium&amp;id=682d983ec4522896dcbf013e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2069-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-filez-client-bf0136</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2069%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FileZ%20Client&amp;severity=medium&amp;id=682d983ec4522896dcbf0136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2068-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-filez-client-bf0132</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2068%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20FileZ%20Client&amp;severity=medium&amp;id=682d983ec4522896dcbf0132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56156-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-halo-dev-halo-befcc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20halo-dev%20halo&amp;severity=medium&amp;id=682d983ec4522896dcbefcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43862-cwe-284-improper-access-control-in-langgenius-dify-bf0244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43862%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20langgenius%20dify&amp;severity=medium&amp;id=682d983ec4522896dcbf0244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32432-cwe-94-improper-control-of-generation-of-code-code-injection-in-craftcms-cms-bef27c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32432%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=682d983dc4522896dcbef27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32045-missing-authorization-bf0227</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32045%3A%20Missing%20Authorization&amp;severity=medium&amp;id=682d983ec4522896dcbf0227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32044-exposure-of-sensitive-information-to-an-unauthorized-actor-bf021f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32044%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=high&amp;id=682d983ec4522896dcbf021f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3647-incorrect-authorization-bef6a6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3647%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682d983dc4522896dcbef6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3645-incorrect-authorization-bef6a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3645%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682d983dc4522896dcbef6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3644-incorrect-authorization-bef69e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3644%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682d983dc4522896dcbef69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3643-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-bef67b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=682d983dc4522896dcbef67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3642-improper-control-of-generation-of-code-code-injection-bef668</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3642%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=682d983dc4522896dcbef668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3641-improper-control-of-generation-of-code-code-injection-bef664</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3641%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=682d983dc4522896dcbef664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3640-authorization-bypass-through-user-controlled-key-bef660</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3640%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=682d983dc4522896dcbef660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3638-cross-site-request-forgery-csrf-bef65c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3638%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=high&amp;id=682d983dc4522896dcbef65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3637-use-of-get-request-method-with-sensitive-query-strings-bf0240</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3637%3A%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=low&amp;id=682d983ec4522896dcbf0240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3636-authorization-bypass-through-user-controlled-key-bf022f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3636%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=medium&amp;id=682d983ec4522896dcbf022f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3635-cross-site-request-forgery-csrf-bf01db</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=low&amp;id=682d983ec4522896dcbf01db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3628-exposure-of-sensitive-information-to-an-unauthorized-actor-bf01d7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3628%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682d983ec4522896dcbf01d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3627-improper-authentication-bf01d3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3627%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d983ec4522896dcbf01d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3625-authorization-bypass-through-user-controlled-key-bf01c2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3625%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=high&amp;id=682d983ec4522896dcbf01c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46618-cwe-79-in-jetbrains-teamcity-bf0309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46618%3A%20CWE-79%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ec4522896dcbf0309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46433-cwe-23-in-jetbrains-teamcity-bf02d5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46433%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ec4522896dcbf02d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46432-cwe-532-in-jetbrains-teamcity-bf02c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46432%3A%20CWE-532%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ec4522896dcbf02c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43016-cwe-23-in-jetbrains-rider-bf02b4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43016%3A%20CWE-23%20in%20JetBrains%20Rider&amp;severity=medium&amp;id=682d983ec4522896dcbf02b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3634-improper-authentication-bf04a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3634%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d983fc4522896dcbf04a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6199-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-viasat-rm5110-bf04f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6199%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ViaSat%20RM5110&amp;severity=medium&amp;id=682d983fc4522896dcbf04f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6198-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-viasat-rm4100-bd88de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6198%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20ViaSat%20RM4100&amp;severity=high&amp;id=682d9819c4522896dcbd88de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2470-cwe-266-incorrect-privilege-assignment-in-aonetheme-service-finder-bookings-bf079c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2470%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=682d983fc4522896dcbf079c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11917-cwe-287-improper-authentication-in-eyecix-jobsearch-wp-job-board-bf0649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11917%3A%20CWE-287%20Improper%20Authentication%20in%20eyecix%20JobSearch%20WP%20Job%20Board&amp;severity=high&amp;id=682d983fc4522896dcbf0649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3912-cwe-862-missing-authorization-in-westguard-ws-form-lite-drag-drop-contact-form-builder-for-wordpress-bf0651</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3912%3A%20CWE-862%20Missing%20Authorization%20in%20westguard%20WS%20Form%20LITE%20%E2%80%93%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=682d983fc4522896dcbf0651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2986-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-ibm-maximo-asset-management-bf064d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2986%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Maximo%20Asset%20Management&amp;severity=medium&amp;id=682d983fc4522896dcbf064d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1565-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-teconcetheme-mayosis-core-bf04ff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1565%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20TeconceTheme%20Mayosis%20Core&amp;severity=high&amp;id=682d983fc4522896dcbf04ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1279-cwe-862-missing-authorization-in-seatheme-bm-content-builder-bf0180</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1279%3A%20CWE-862%20Missing%20Authorization%20in%20SeaTheme%20BM%20Content%20Builder&amp;severity=high&amp;id=682d983ec4522896dcbf0180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3870-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-olarmarius-1-decembrie-1918-bf051c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20olarmarius%201%20Decembrie%201918&amp;severity=medium&amp;id=682d983fc4522896dcbf051c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46535-cwe-862-missing-authorization-in-alphaefficiencyteam-custom-login-and-registration-bf052c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46535%3A%20CWE-862%20Missing%20Authorization%20in%20AlphaEfficiencyTeam%20Custom%20Login%20and%20Registration&amp;severity=medium&amp;id=682d983fc4522896dcbf052c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46482-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mythemeshop-wp-quiz-bf0524</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MyThemeShop%20WP%20Quiz&amp;severity=null&amp;id=682d983fc4522896dcbf0524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3743-cwe-472-external-control-of-assumed-immutable-web-parameter-in-wpswings-upsell-funnel-builder-for-woocommerce-bf0514</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3743%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20wpswings%20Upsell%20Funnel%20Builder%20for%20WooCommerce&amp;severity=medium&amp;id=682d983fc4522896dcbf0514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2238-cwe-269-improper-privilege-management-in-odin-design-vikinger-bf0188</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2238%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Odin_Design%20Vikinger&amp;severity=high&amp;id=682d983ec4522896dcbf0188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3868-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-codeandreload-custom-admin-bar-favorites-bf01e7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeandreload%20Custom%20Admin-Bar%20Favorites&amp;severity=medium&amp;id=682d983ec4522896dcbf01e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3867-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rafe007-ajax-comment-form-cst-bf01e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafe007%20Ajax%20Comment%20Form%20CST&amp;severity=medium&amp;id=682d983ec4522896dcbf01e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3866-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rohanpawale-add-google-1-plus-one-social-share-button-bf01df</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rohanpawale%20Add%20Google%20%2B1%20(Plus%20one)%20social%20share%20Button&amp;severity=medium&amp;id=682d983ec4522896dcbf01df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0671-cwe-79-cross-site-scripting-xss-in-unknown-icegram-express-befd6c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0671%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Icegram%20Express&amp;severity=medium&amp;id=682d983ec4522896dcbefd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3923-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-buildwps-prevent-direct-access-protect-wordpress-files-bf0353</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3923%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20buildwps%20Prevent%20Direct%20Access%20%E2%80%93%20Protect%20WordPress%20Files&amp;severity=medium&amp;id=682d983ec4522896dcbf0353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3861-cwe-863-incorrect-authorization-in-buildwps-prevent-direct-access-protect-wordpress-files-beff54</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3861%3A%20CWE-863%20Incorrect%20Authorization%20in%20buildwps%20Prevent%20Direct%20Access%20%E2%80%93%20Protect%20WordPress%20Files&amp;severity=medium&amp;id=682d983ec4522896dcbeff54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2580-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bitpressadmin-contact-form-by-bit-form-multi-step-form-calculation-contact-form-payment-contact-form-custom-contact-form-builder-beff45</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=medium&amp;id=682d983ec4522896dcbeff45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3511-cwe-1284-improper-validation-of-specified-quantity-in-input-in-mitsubishi-electric-corporation-cc-link-ie-tsn-remote-i-o-module-nz2gn2s1-32d-beff0b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3511%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20CC-Link%20IE%20TSN%20Remote%20I%2FO%20module%20NZ2GN2S1-32D&amp;severity=high&amp;id=682d983ec4522896dcbeff0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3752-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-terrillthompson-able-player-accessible-html5-media-player-befeef</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terrillthompson%20Able%20Player%2C%20accessible%20HTML5%20media%20player&amp;severity=medium&amp;id=682d983ec4522896dcbefeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3775-cwe-918-server-side-request-forgery-ssrf-in-devitemsllc-shoplentor-woocommerce-builder-for-elementor-gutenberg-20-modules-all-in-one-solution-formerly-woolentor-bf034b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3775%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B20%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=682d983ec4522896dcbf034b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43865-cwe-345-insufficient-verification-of-data-authenticity-in-remix-run-react-router-bf035b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43865%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20remix-run%20react-router&amp;severity=medium&amp;id=682d983ec4522896dcbf035b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43864-cwe-755-improper-handling-of-exceptional-conditions-in-remix-run-react-router-bf02b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43864%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20remix-run%20react-router&amp;severity=medium&amp;id=682d983ec4522896dcbf02b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46613-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-openplcproject-openplc-bf0549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46613%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20openplcproject%20OpenPLC&amp;severity=medium&amp;id=682d983fc4522896dcbf0549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46599-cwe-1188-initialization-of-a-resource-with-an-insecure-default-in-k3s-k3s-bf0545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46599%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20K3s%20K3s&amp;severity=medium&amp;id=682d983fc4522896dcbf0545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46595-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-backdropcms-flag-bf0541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20backdropcms%20Flag&amp;severity=medium&amp;id=682d983fc4522896dcbf0541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46546-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sherpa-orchestrator-bf053d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46546%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983fc4522896dcbf053d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57375-cwe-1419-incorrect-initialization-of-resource-in-andamiro-pump-it-up-bf04ee</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57375%3A%20CWE-1419%20Incorrect%20Initialization%20of%20Resource%20in%20Andamiro%20Pump%20It%20Up&amp;severity=medium&amp;id=682d983fc4522896dcbf04ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46617-cwe-798-use-of-hard-coded-credentials-in-quantum-stornext-bf02ef</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46617%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Quantum%20StorNext&amp;severity=medium&amp;id=682d983ec4522896dcbf02ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46616-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-quantum-stornext-bf02e9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46616%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Quantum%20StorNext&amp;severity=medium&amp;id=682d983ec4522896dcbf02e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46545-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-sherpa-orchestrator-bf02e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46545%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983ec4522896dcbf02e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46544-cwe-863-incorrect-authorization-in-sherpa-orchestrator-bf02dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46544%3A%20CWE-863%20Incorrect%20Authorization%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983ec4522896dcbf02dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28076-n-a-in-n-a-bf0125</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28076%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf0125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46547-cwe-352-cross-site-request-forgery-csrf-in-sherpa-orchestrator-bf00f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46547%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sherpa%20Orchestrator&amp;severity=medium&amp;id=682d983ec4522896dcbf00f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28354-n-a-in-n-a-bf00f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf00f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25775-n-a-in-n-a-bf006d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25775%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf006d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28128-n-a-in-n-a-befd01</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28128%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32984-n-a-in-n-a-befb15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32984%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32983-n-a-in-n-a-befb0d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32983%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32979-n-a-in-n-a-beebbc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32979%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeebbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32981-n-a-in-n-a-beeb6b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32981%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32986-n-a-in-n-a-beeb13</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32986%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32985-n-a-in-n-a-beeb0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32985%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32982-n-a-in-n-a-beeaf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32980-bd7762</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32980%3A%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd7762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-25-2a4e99</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-25&amp;severity=medium&amp;id=682c7db2e8347ec82d2a4e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-25-f12c3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2185-cwe-613-insufficient-session-expiration-in-albedo-telecom-net-time-ptp-ntp-clock-serial-no-nbc0081p-bf0184</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2185%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ALBEDO%20Telecom%20Net.Time%20-%20PTP%2FNTP%20clock%20(Serial%20No.%20NBC0081P)&amp;severity=medium&amp;id=682d983ec4522896dcbf0184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3606-cwe-497-in-vestel-ac-charger-evc04-bf01bc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3606%3A%20CWE-497%20in%20Vestel%20AC%20Charger%20EVC04&amp;severity=medium&amp;id=682d983ec4522896dcbf01bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46275-cwe-306-missing-authentication-for-critical-function-in-planet-technology-wgs-804hpt-v2-bf0217</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46275%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Planet%20Technology%20WGS-804HPT-V2&amp;severity=medium&amp;id=682d983ec4522896dcbf0217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46274-cwe-798-use-of-hard-coded-credentials-in-planet-technology-uni-nms-lite-bf02bc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46274%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Planet%20Technology%20UNI-NMS-Lite&amp;severity=medium&amp;id=682d983ec4522896dcbf02bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46273-cwe-798-use-of-hard-coded-credentials-in-planet-technology-uni-nms-lite-bf0204</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46273%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Planet%20Technology%20UNI-NMS-Lite&amp;severity=medium&amp;id=682d983ec4522896dcbf0204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46272-cwe-78-os-command-injection-in-planet-technology-wgs-804hpt-v2-bf01ef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46272%3A%20CWE-78%20OS%20Command%20Injection%20in%20Planet%20Technology%20WGS-804HPT-V2&amp;severity=medium&amp;id=682d983ec4522896dcbf01ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46271-cwe-78-os-command-injection-in-planet-technology-uni-nms-lite-bf01eb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46271%3A%20CWE-78%20OS%20Command%20Injection%20in%20Planet%20Technology%20UNI-NMS-Lite&amp;severity=medium&amp;id=682d983ec4522896dcbf01eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1294-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpquark-eform-wordpress-form-builder-bf0148</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1294%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPQuark%20eForm%20-%20WordPress%20Form%20Builder&amp;severity=high&amp;id=682d983ec4522896dcbf0148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3749-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mgyura-breeze-display-befeed</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mgyura%20Breeze%20Display&amp;severity=medium&amp;id=682d983ec4522896dcbefeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43861-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-miraheze-managewiki-befe81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miraheze%20ManageWiki&amp;severity=medium&amp;id=682d983ec4522896dcbefe81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44759-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-befe2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefe2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44760-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-hcl-software-hcl-leap-befe3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44760%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefe3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37516-cwe-524-use-of-cache-containing-sensitive-information-in-hcl-software-hcl-leap-befe47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37516%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefe47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30127-cwe-524-use-of-cache-containing-sensitive-information-in-hcl-software-hcl-leap-befcc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30127%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983ec4522896dcbefcc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26382-cwe-121-stack-based-buffer-overflow-in-johnson-controls-istar-configuration-utility-icu-bf08fb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26382%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=medium&amp;id=682d983fc4522896dcbf08fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43859-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-in-python-hyper-h11-bf0b21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43859%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20python-hyper%20h11&amp;severity=medium&amp;id=682d983fc4522896dcbf0b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43858-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-bluegrams-youtubedlsharp-bf0b1d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43858%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Bluegrams%20YoutubeDLSharp&amp;severity=medium&amp;id=682d983fc4522896dcbf0b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/russian-infrastructure-plays-crucial-role-in-north-korean-cybercrime-operations-27d709</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Russian%20Infrastructure%20Plays%20Crucial%20Role%20in%20North%20Korean%20Cybercrime%20Operations&amp;severity=medium&amp;id=6831fcba0acd01a24927d709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37534-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0c6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37534%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45720-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-hcl-software-hcl-leap-bf0c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45720%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30113-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0c26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30114-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0c2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30114%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30147-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-hcl-software-hcl-leap-bf0bee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30148-cwe-284-improper-access-control-in-hcl-software-hcl-leap-bf0c7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30148%3A%20CWE-284%20%20Improper%20access%20control%20in%20HCL%20Software%20HCL%20Leap&amp;severity=medium&amp;id=682d983fc4522896dcbf0c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46498-cwe-352-cross-site-request-forgery-csrf-in-nghialuu-zalo-official-live-chat-bf0990</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46498%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nghialuu%20Zalo%20Official%20Live%20Chat&amp;severity=null&amp;id=682d983fc4522896dcbf0990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46473-cwe-502-deserialization-of-untrusted-data-in-djjmz-social-counter-bf094c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46473%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Prisna%20Social%20Counter&amp;severity=null&amp;id=682d983fc4522896dcbf094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46523-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-devignstudiosltd-covid-19-coronavirus-update-your-customers-bf0a23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devignstudiosltd%20COVID-19%20(Coronavirus)%20Update%20Your%20Customers&amp;severity=null&amp;id=682d983fc4522896dcbf0a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46507-cwe-352-cross-site-request-forgery-csrf-in-ldrumm-unsafe-mimetypes-bf09ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46507%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ldrumm%20Unsafe%20Mimetypes&amp;severity=null&amp;id=682d983fc4522896dcbf09ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46481-cwe-502-deserialization-of-untrusted-data-in-michael-cannon-flickr-shortcode-importer-bf096b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46481%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Michael%20Cannon%20Flickr%20Shortcode%20Importer&amp;severity=null&amp;id=682d983fc4522896dcbf096b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46447-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpfable-fable-extra-bf0931</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46447%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFable%20Fable%20Extra&amp;severity=null&amp;id=682d983fc4522896dcbf0931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46531-cwe-918-server-side-request-forgery-ssrf-in-ankur-vishwakarma-wp-avcl-automation-helper-formerly-wpflyleads-bf0a45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46531%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ankur%20Vishwakarma%20WP%20AVCL%20Automation%20Helper%20(formerly%20WPFlyLeads)&amp;severity=null&amp;id=682d983fc4522896dcbf0a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46519-cwe-862-missing-authorization-in-michael-revellin-clerc-media-library-downloader-bf0a00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46519%3A%20Missing%20Authorization%20in%20M.Code%20Media%20Library%20Downloader&amp;severity=null&amp;id=682d983fc4522896dcbf0a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46511-cwe-918-server-side-request-forgery-ssrf-in-derek-springer-beerxml-shortcode-bf09e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46511%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Derek%20Springer%20BeerXML%20Shortcode&amp;severity=null&amp;id=682d983fc4522896dcbf09e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46503-cwe-918-server-side-request-forgery-ssrf-in-josheli-simple-google-photos-grid-bf09b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46503%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20josheli%20Simple%20Google%20Photos%20Grid&amp;severity=null&amp;id=682d983fc4522896dcbf09b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46489-cwe-862-missing-authorization-in-vinodvaswani9-bulk-assign-linked-products-for-woocommerce-bf0977</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46489%3A%20Missing%20Authorization%20in%20vinodvaswani9%20Bulk%20Assign%20Linked%20Products%20For%20WooCommerce&amp;severity=null&amp;id=682d983fc4522896dcbf0977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46485-cwe-862-missing-authorization-in-carlo-la-pera-wp-customize-login-page-bf0973</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46485%3A%20Missing%20Authorization%20in%20Carlo%20La%20Pera%20WP%20Customize%20Login%20Page&amp;severity=null&amp;id=682d983fc4522896dcbf0973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46477-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-carlo-la-pera-wp-customize-login-page-bf0963</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46477%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Carlo%20La%20Pera%20WP%20Customize%20Login%20Page&amp;severity=null&amp;id=682d983fc4522896dcbf0963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46469-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-benjamin-buddle-send-from-bf0946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Buddle%20Send%20From&amp;severity=null&amp;id=682d983fc4522896dcbf0946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46459-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ralf-hortt-confirm-user-registration-bf0942</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46459%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ralf%20Hortt%20Confirm%20User%20Registration&amp;severity=null&amp;id=682d983fc4522896dcbf0942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46451-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-syed-balkhi-floating-social-bar-bf093e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Floating%20Social%20Bar&amp;severity=null&amp;id=682d983fc4522896dcbf093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46442-cwe-352-cross-site-request-forgery-csrf-in-casey-johnson-loan-calculator-bf092d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46442%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Casey%20Johnson%20Loan%20Calculator&amp;severity=null&amp;id=682d983fc4522896dcbf092d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46541-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-elrata-wp-recaptcha-bp-bf0c13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elrata_%20WP-reCAPTCHA-bp&amp;severity=null&amp;id=682d983fc4522896dcbf0c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46533-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdrift-no-landing-pages-and-domain-aliases-for-wordpress-bf0a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdrift.no%20Landing%20pages%20and%20Domain%20aliases%20for%20WordPress&amp;severity=null&amp;id=682d983fc4522896dcbf0a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46529-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stressfree-sites-business-contact-widget-bf0a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StressFree%20Sites%20Business%20Contact%20Widget&amp;severity=null&amp;id=682d983fc4522896dcbf0a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46525-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-msmitley-wp-cookie-consent-bf0c07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20msmitley%20WP%20Cookie%20Consent&amp;severity=null&amp;id=682d983fc4522896dcbf0c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46521-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-silver-muru-ws-force-login-page-bf0a08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Silver%20Muru%20WS%20Force%20Login%20Page&amp;severity=null&amp;id=682d983fc4522896dcbf0a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46517-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpdiscover-blog-manager-wp-bf09fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Blog%20Manager%20WP&amp;severity=null&amp;id=682d983fc4522896dcbf09fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46513-cwe-352-cross-site-request-forgery-csrf-in-codebangers-all-in-one-time-clock-lite-bf09e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46513%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Codebangers%20All%20in%20One%20Time%20Clock%20Lite&amp;severity=null&amp;id=682d983fc4522896dcbf09e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46509-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andrey-mikhalchuk-360-view-bf09d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrey%20Mikhalchuk%20360%20View&amp;severity=null&amp;id=682d983fc4522896dcbf09d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-farinspace-peekaboo-bf09c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farinspace%20Peekaboo&amp;severity=null&amp;id=682d983fc4522896dcbf09c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46501-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-biancardi-mixcloud-embed-bf09b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biancardi%20Mixcloud%20Embed&amp;severity=null&amp;id=682d983fc4522896dcbf09b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46496-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oniswap-mini-twitter-feed-bf0988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46496%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oniswap%20Mini%20twitter%20feed&amp;severity=null&amp;id=682d983fc4522896dcbf0988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46491-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-matthew-muro-multi-column-taxonomy-list-bf0984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matthew%20Muro%20Multi-Column%20Taxonomy%20List&amp;severity=null&amp;id=682d983fc4522896dcbf0984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46483-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-alex-moss-peadig-s-google-1-button-bf096f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Moss%20Peadig%E2%80%99s%20Google%20%2B1%20Button&amp;severity=null&amp;id=682d983fc4522896dcbf096f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46479-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-devyncjohnson-bbcode-deluxe-bf0967</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46479%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevynCJohnson%20BBCode%20Deluxe&amp;severity=null&amp;id=682d983fc4522896dcbf0967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46475-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-terrillthompson-able-player-bf095f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46475%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Dolson%20Able%20Player&amp;severity=null&amp;id=682d983fc4522896dcbf095f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46471-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gnanavelshenll-wp-custom-post-popup-bf0794</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46471%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gnanavelshenll%20WP%20Custom%20Post%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf0794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46467-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rahendra-putra-k-raphicon-bf0790</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rahendra%20Putra%20K%E2%84%A2%20RAphicon&amp;severity=null&amp;id=682d983fc4522896dcbf0790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46461-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-relentless-apps-rrssb-bf06b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Relentless%20Apps%20RRSSB&amp;severity=null&amp;id=682d983fc4522896dcbf06b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46457-cwe-352-cross-site-request-forgery-csrf-in-digontoahsan-wp-custom-cms-block-bf06a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46457%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ahsanullah%20Akanda%20Wp%20Custom%20CMS%20Block&amp;severity=null&amp;id=682d983fc4522896dcbf06a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46453-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-creatorteam-zoho-creator-forms-bd727f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreatorTeam%20Zoho%20Creator%20Forms&amp;severity=medium&amp;id=682d9817c4522896dcbd727f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46449-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-novium-wowhead-tooltips-bf068c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Novium%20WoWHead%20Tooltips&amp;severity=null&amp;id=682d983fc4522896dcbf068c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46445-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-preya-external-markdown-bf0688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46445%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pReya%20External%20Markdown&amp;severity=null&amp;id=682d983fc4522896dcbf0688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46438-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-warmwhisky-gtdb-guitar-tuners-bf0662</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20warmwhisky%20GTDB%20Guitar%20Tuners&amp;severity=null&amp;id=682d983fc4522896dcbf0662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46542-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themexpert-xpert-tab-bf0c22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeXpert%20Xpert%20Tab&amp;severity=null&amp;id=682d983fc4522896dcbf0c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46540-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-chris-mok-gna-search-shortcode-bf0c0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Mok%20GNA%20Search%20Shortcode&amp;severity=null&amp;id=682d983fc4522896dcbf0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46538-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webplanetsoft-inline-text-popup-bf0bc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webplanetsoft%20Inline%20Text%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf0bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46536-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-richardharrison-carousel-of-post-images-bf078c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RichardHarrison%20Carousel-of-post-images&amp;severity=null&amp;id=682d983fc4522896dcbf078c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46534-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-danielriera-image-style-hover-bf0788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DanielRiera%20Image%20Style%20Hover&amp;severity=null&amp;id=682d983fc4522896dcbf0788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46532-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-haris-zulfiqar-tooltip-bf0784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Haris%20Zulfiqar%20Tooltip&amp;severity=null&amp;id=682d983fc4522896dcbf0784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46530-cwe-352-cross-site-request-forgery-csrf-in-huangye-wudeng-hacklog-remote-attachment-bf0780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46530%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HuangYe%20WuDeng%20Hacklog%20Remote%20Attachment&amp;severity=null&amp;id=682d983fc4522896dcbf0780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46528-cwe-352-cross-site-request-forgery-csrf-in-steve-availability-calendar-bf0bba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46528%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Steve%20Availability%20Calendar&amp;severity=null&amp;id=682d983fc4522896dcbf0bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46524-cwe-352-cross-site-request-forgery-csrf-in-stesvis-wp-filter-post-category-bf0bb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46524%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stesvis%20WP%20Filter%20Post%20Category&amp;severity=null&amp;id=682d983fc4522896dcbf0bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46522-cwe-352-cross-site-request-forgery-csrf-in-billy-bryant-tabs-bf075a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46522%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Billy%20Bryant%20Tabs&amp;severity=null&amp;id=682d983fc4522896dcbf075a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46520-cwe-352-cross-site-request-forgery-csrf-in-alphasis-related-posts-via-taxonomies-bf0756</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46520%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alphasis%20Related%20Posts%20via%20Taxonomies&amp;severity=null&amp;id=682d983fc4522896dcbf0756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46516-cwe-352-cross-site-request-forgery-csrf-in-silencecm-twitter-card-generator-bf0752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46516%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silencecm%20Twitter%20Card%20Generator&amp;severity=null&amp;id=682d983fc4522896dcbf0752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46514-cwe-352-cross-site-request-forgery-csrf-in-milat-milat-jquery-automatic-popup-bf0745</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46514%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20milat%20Milat%20jQuery%20Automatic%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf0745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46512-cwe-352-cross-site-request-forgery-csrf-in-shamim-hasan-custom-functions-plugin-bf0741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46512%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shamim%20Hasan%20Custom%20Functions%20Plugin&amp;severity=null&amp;id=682d983fc4522896dcbf0741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46510-cwe-352-cross-site-request-forgery-csrf-in-harrysudana-contact-form-7-calendar-bf073d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46510%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20harrysudana%20Contact%20Form%207%20Calendar&amp;severity=null&amp;id=682d983fc4522896dcbf073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46508-cwe-352-cross-site-request-forgery-csrf-in-kasonzhao-advanced-lazy-load-bf0739</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46508%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kasonzhao%20Advanced%20lazy%20load&amp;severity=null&amp;id=682d983fc4522896dcbf0739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46506-cwe-352-cross-site-request-forgery-csrf-in-lora77-wpzon-amazon-affiliate-plugin-bf0735</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46506%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Lora77%20WpZon%20%E2%80%93%20Amazon%20Affiliate%20Plugin&amp;severity=null&amp;id=682d983fc4522896dcbf0735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46504-cwe-352-cross-site-request-forgery-csrf-in-olar-marius-vasaio-qr-code-bf0731</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46504%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Olar%20Marius%20Vasaio%20QR%20Code&amp;severity=null&amp;id=682d983fc4522896dcbf0731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46502-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bas-matthee-lsd-custom-taxonomy-and-category-meta-bf072d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bas%20Matthee%20LSD%20Custom%20taxonomy%20and%20category%20meta&amp;severity=null&amp;id=682d983fc4522896dcbf072d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46499-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hccoder-paypal-express-checkout-bf0714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hccoder%20PayPal%20Express%20Checkout&amp;severity=null&amp;id=682d983fc4522896dcbf0714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46497-cwe-352-cross-site-request-forgery-csrf-in-navegg-navegg-analytics-bf0707</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46497%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Navegg%20Navegg%20Analytics&amp;severity=null&amp;id=682d983fc4522896dcbf0707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46495-cwe-352-cross-site-request-forgery-csrf-in-tomontoast-drop-caps-bf0703</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46495%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tomontoast%20Drop%20Caps&amp;severity=null&amp;id=682d983fc4522896dcbf0703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46492-cwe-352-cross-site-request-forgery-csrf-in-pham-thanh-call-now-pht-blog-bf06ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46492%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pham%20Thanh%20Call%20Now%20PHT%20Blog&amp;severity=null&amp;id=682d983fc4522896dcbf06ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46484-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nasir179125-image-hover-effects-for-wpbakery-page-builder-bf06fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46484%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nasir179125%20Image%20Hover%20Effects%20For%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=682d983fc4522896dcbf06fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46480-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-padam-shankhadev-nepali-post-date-bf06f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46480%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Padam%20Shankhadev%20Nepali%20Post%20Date&amp;severity=null&amp;id=682d983fc4522896dcbf06f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46478-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-metaloha-dropdown-content-bf06f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46478%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaloha%20Dropdown%20Content&amp;severity=null&amp;id=682d983fc4522896dcbf06f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46476-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nayon46-awesome-wp-image-gallery-bf06ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46476%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Awesome%20Wp%20Image%20Gallery&amp;severity=null&amp;id=682d983fc4522896dcbf06ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46472-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webangon-the-pack-elementor-addons-bf06eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=682d983fc4522896dcbf06eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46470-cwe-862-missing-authorization-in-peter-raschendorfer-smart-hashtags-hashtagger-bf06da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46470%3A%20Missing%20Authorization%20in%20Peter%20Raschendorfer%20Smart%20Hashtags%20%5B%23hashtagger%5D&amp;severity=null&amp;id=682d983fc4522896dcbf06da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46466-cwe-352-cross-site-request-forgery-csrf-in-felixtz-modern-polls-bf06bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46466%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20felixtz%20Modern%20Polls&amp;severity=null&amp;id=682d983fc4522896dcbf06bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46465-cwe-352-cross-site-request-forgery-csrf-in-john-weissberg-print-science-designer-bf06bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46465%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20John%20Weissberg%20Print%20Science%20Designer&amp;severity=null&amp;id=682d983fc4522896dcbf06bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46462-cwe-352-cross-site-request-forgery-csrf-in-tr-n-minh-qu-n-wpvn-bf06b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46462%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tr%C3%A2n%20Minh-Qu%C3%A2n%20WPVN&amp;severity=null&amp;id=682d983fc4522896dcbf06b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46452-cwe-352-cross-site-request-forgery-csrf-in-olav-kolbu-google-news-bf069c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46452%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Olav%20Kolbu%20Google%20News&amp;severity=medium&amp;id=682d983fc4522896dcbf069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46450-cwe-352-cross-site-request-forgery-csrf-in-x000x-occupancyplan-bf0694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46450%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20x000x%20occupancyplan&amp;severity=null&amp;id=682d983fc4522896dcbf0694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46443-cwe-918-server-side-request-forgery-ssrf-in-adam-pery-animate-bf0684</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46443%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Adam%20Pery%20Animate&amp;severity=null&amp;id=682d983fc4522896dcbf0684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46436-cwe-352-cross-site-request-forgery-csrf-in-sebastian-echeverry-scss-library-bf065e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46436%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sebastian%20Echeverry%20SCSS-Library&amp;severity=null&amp;id=682d983fc4522896dcbf065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46439-cwe-352-cross-site-request-forgery-csrf-in-vladimir-prelovac-plugin-central-bf0645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46439%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vladimir%20Prelovac%20Plugin%20Central&amp;severity=null&amp;id=682d983fc4522896dcbf0645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46435-cwe-352-cross-site-request-forgery-csrf-in-yash-binani-time-based-greeting-bf0641</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yash%20Binani%20Time%20Based%20Greeting&amp;severity=null&amp;id=682d983fc4522896dcbf0641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32921-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpoperation-arrival-bf0573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32921%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpoperations%20Arrival&amp;severity=null&amp;id=682d983fc4522896dcbf0573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39359-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-code-work-web-cww-portfolio-bf057b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39359%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codeworkweb%20CWW%20Portfolio&amp;severity=null&amp;id=682d983fc4522896dcbf057b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39360-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-everestthemes-grace-mag-bf0583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39360%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20everestthemes%20Grace%20Mag&amp;severity=null&amp;id=682d983fc4522896dcbf0583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39377-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wedevs-appsero-helper-bf058b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39377%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20weDevs%20Appsero%20Helper&amp;severity=null&amp;id=682d983fc4522896dcbf058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39378-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-holest-engineering-spreadsheet-price-changer-for-woocommerce-and-wp-e-commerce-light-bf059a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39378%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Holest%20Engineering%20Spreadsheet%20Price%20Changer%20for%20WooCommerce%20and%20WP%20E-commerce%20%E2%80%93%20Light&amp;severity=null&amp;id=682d983fc4522896dcbf059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39379-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-capturly-capturly-bf059e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39379%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Capturly%20Capturly&amp;severity=medium&amp;id=682d983fc4522896dcbf059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39381-cwe-352-cross-site-request-forgery-csrf-in-kiotviet-kiotviet-sync-bf05a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39381%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kiotviet%20KiotViet%20Sync&amp;severity=medium&amp;id=682d983fc4522896dcbf05a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39382-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-danielpataki-acf-google-font-selector-bf05a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danielpataki%20ACF%3A%20Google%20Font%20Selector&amp;severity=null&amp;id=682d983fc4522896dcbf05a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39383-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-code-work-web-xews-lite-bf05ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39383%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codeworkweb%20Xews%20Lite&amp;severity=null&amp;id=682d983fc4522896dcbf05ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39384-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-cedcommerce-product-lister-for-ebay-bf05d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39384%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cedcommerce%20Product%20Lister%20for%20eBay&amp;severity=null&amp;id=682d983fc4522896dcbf05d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39385-cwe-862-missing-authorization-in-vw-themes-sirat-bf05dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39385%3A%20Missing%20Authorization%20in%20vowelweb%20Sirat&amp;severity=null&amp;id=682d983fc4522896dcbf05dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39387-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-wpoperation-opstore-bf05e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpoperations%20Opstore&amp;severity=null&amp;id=682d983fc4522896dcbf05e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39390-cwe-862-missing-authorization-in-magepeopleteam-booking-and-rental-manager-bf05e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39390%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=682d983fc4522896dcbf05e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39391-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-zamartz-checkout-field-visibility-for-woocommerce-bf05f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39391%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zamartz%20Checkout%20Field%20Visibility%20for%20WooCommerce&amp;severity=null&amp;id=682d983fc4522896dcbf05f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39397-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gopiplus-hotmail-com-anything-popup-bf05fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39397%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%40hotmail.com%20Anything%20Popup&amp;severity=null&amp;id=682d983fc4522896dcbf05fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39399-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ashraful-sarkar-naiem-license-for-envato-bf05ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39399%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashraful%20Sarkar%20Naiem%20License%20For%20Envato&amp;severity=null&amp;id=682d983fc4522896dcbf05ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39400-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wpeverest-user-registration-bf0603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39400%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=null&amp;id=682d983fc4522896dcbf0603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39404-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-heateor-support-sassy-social-share-bf0607</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39404%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Heateor%20Support%20Sassy%20Social%20Share&amp;severity=null&amp;id=682d983fc4522896dcbf0607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39408-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-everpress-bruteguard-brute-force-login-protection-bf060f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39408%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20BruteGuard%20%E2%80%93%20Brute%20Force%20Login%20Protection&amp;severity=null&amp;id=682d983fc4522896dcbf060f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46264-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-angelo-mandato-powerpress-podcasting-bf063d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46264%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=682d983fc4522896dcbf063d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46230-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-ghozylab-popup-builder-bf0635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46230%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20GhozyLab%20Popup%20Builder&amp;severity=null&amp;id=682d983fc4522896dcbf0635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46234-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-habibur-rahman-razib-control-listings-bf0639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Habibur%20Rahman%20Razib%20Control%20Listings&amp;severity=null&amp;id=682d983fc4522896dcbf0639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46248-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-m-a-vinoth-kumar-frontend-dashboard-bf054d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46248%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Frontend%20Dashboard&amp;severity=null&amp;id=682d983fc4522896dcbf054d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46260-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wowdevs-sky-addons-for-elementor-bf0551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowDevs%20Sky%20Addons%20for%20Elementor&amp;severity=null&amp;id=682d983fc4522896dcbf0551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46261-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-craig-hewitt-seriously-simple-podcasting-bf056f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=null&amp;id=682d983fc4522896dcbf056f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43855-cwe-248-uncaught-exception-in-trpc-trpc-aec871</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43855%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20trpc%20trpc&amp;severity=high&amp;id=682cd0fb1484d88663aec871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snakekeylogger-a-multistage-info-stealer-malware-campaign-27ccb4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SnakeKeylogger%20%E2%80%93%20A%20Multistage%20Info%20Stealer%20Malware%20Campaign&amp;severity=medium&amp;id=6831c4770acd01a24927ccb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30409-cwe-770-in-acronis-acronis-cyber-protect-cloud-agent-bf1487</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30409%3A%20CWE-770%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30408-cwe-732-in-acronis-acronis-cyber-protect-cloud-agent-bf0806</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30408%3A%20CWE-732%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d983fc4522896dcbf0806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46421-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-red-hat-red-hat-enterprise-linux-10-aeb079</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46421%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere&amp;severity=medium&amp;id=682cd0f71484d88663aeb079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46420-missing-release-of-memory-after-effective-lifetime-in-red-hat-red-hat-enterprise-linux-8-aeb077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46420%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=682cd0f71484d88663aeb077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27820-psl-validation-bypass-in-apache-httpclient-5-4-x-in-apache-software-foundation-apache-httpcomponents-aeba65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27820%3A%20PSL%20Validation%20Bypass%20in%20Apache%20HttpClient%205.4.x%20in%20Apache%20Software%20Foundation%20Apache%20HttpComponents&amp;severity=high&amp;id=682cd0f91484d88663aeba65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47664-cwe-203-observable-discrepancy-in-franka-robotics-franka-emika-robot-bf0ed8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47664%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Franka%20Robotics%20Franka%20Emika%20Robot&amp;severity=medium&amp;id=682d9840c4522896dcbf0ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47663-cwe-613-insufficient-session-expiration-in-franka-robotics-franka-emika-robot-bf0ed4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47663%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Franka%20Robotics%20Franka%20Emika%20Robot&amp;severity=medium&amp;id=682d9840c4522896dcbf0ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47662-cwe-862-missing-authorization-in-franka-robotics-franka-emika-robot-bf0ed0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47662%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Franka%20Robotics%20Franka%20Emika%20Robot&amp;severity=medium&amp;id=682d9840c4522896dcbf0ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3872-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-centreon-centreon-bf0fca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3872%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Centreon&amp;severity=medium&amp;id=682d9840c4522896dcbf0fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3603-cwe-620-unverified-password-change-in-v1rustyle-flynax-bridge-bf158f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3603%3A%20CWE-620%20Unverified%20Password%20Change%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=critical&amp;id=682d9840c4522896dcbf158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3776-cwe-94-improper-control-of-generation-of-code-code-injection-in-cajka-verification-sms-with-targetsms-bf1597</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3776%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20cajka%20Verification%20SMS%20with%20TargetSMS&amp;severity=high&amp;id=682d9840c4522896dcbf1597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3793-cwe-620-unverified-password-change-in-lamarant-buddypress-force-password-change-bf15a4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3793%3A%20CWE-620%20Unverified%20Password%20Change%20in%20lamarant%20Buddypress%20Force%20Password%20Change&amp;severity=medium&amp;id=682d9840c4522896dcbf15a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3280-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-elextensions-elex-woocommerce-advanced-bulk-edit-products-prices-attributes-bf1589</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3280%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elextensions%20ELEX%20WooCommerce%20Advanced%20Bulk%20Edit%20Products%2C%20Prices%20%26%20Attributes&amp;severity=medium&amp;id=682d9840c4522896dcbf1589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13307-cwe-862-missing-authorization-in-pixel-prime-reales-wp-real-estate-wordpress-theme-bf1566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13307%3A%20CWE-862%20Missing%20Authorization%20in%20pixel_prime%20Reales%20WP%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=medium&amp;id=682d9840c4522896dcbf1566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3300-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-ludwigyou-wpmastertoolkit-wpmtk-all-in-one-plugin-bf1409</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3300%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ludwigyou%20WPMasterToolKit%20(WPMTK)%20%E2%80%93%20All%20in%20one%20plugin&amp;severity=high&amp;id=682d9840c4522896dcbf1409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3832-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeremyshapiro-fusedesk-bf1430</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3832%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=682d9840c4522896dcbf1430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2579-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bplugins-lottie-player-great-lottie-player-solution-bf13f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2579%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Lottie%20Player-%20Great%20Lottie%20Player%20Solution&amp;severity=medium&amp;id=682d9840c4522896dcbf13f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3607-cwe-620-unverified-password-change-in-arkenon-frontend-login-and-registration-blocks-bf1428</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3607%3A%20CWE-620%20Unverified%20Password%20Change%20in%20arkenon%20Frontend%20Login%20and%20Registration%20Blocks&amp;severity=high&amp;id=682d9840c4522896dcbf1428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3604-cwe-862-missing-authorization-in-v1rustyle-flynax-bridge-bf1420</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3604%3A%20CWE-862%20Missing%20Authorization%20in%20v1rustyle%20Flynax%20Bridge&amp;severity=critical&amp;id=682d9840c4522896dcbf1420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2543-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-spiderdevs-advanced-accordion-gutenberg-block-bf1391</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2543%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spiderdevs%20Advanced%20Accordion%20Gutenberg%20Block&amp;severity=medium&amp;id=682d9840c4522896dcbf1391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1284-cwe-639-authorization-bypass-through-user-controlled-key-in-xpertsclub-woocommerce-automatic-order-printing-formerly-woocommerce-google-cloud-print-bf0f8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1284%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xpertsclub%20Woocommerce%20Automatic%20Order%20Printing%20%7C%20(%20Formerly%20WooCommerce%20Google%20Cloud%20Print)&amp;severity=medium&amp;id=682d9840c4522896dcbf0f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3101-cwe-269-improper-privilege-management-in-wp-configurator-configurator-theme-core-bf0fc6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3101%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wp-configurator%20Configurator%20Theme%20Core&amp;severity=high&amp;id=682d9840c4522896dcbf0fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3058-cwe-862-missing-authorization-in-jauharixelion-xelion-webchat-bf0f9a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3058%3A%20CWE-862%20Missing%20Authorization%20in%20jauharixelion%20Xelion%20Webchat&amp;severity=high&amp;id=682d9840c4522896dcbf0f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3065-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-neoslab-database-toolset-bf0fb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3065%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20neoslab%20Database%20Toolset&amp;severity=critical&amp;id=682d9840c4522896dcbf0fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12244-cwe-862-missing-authorization-in-gitlab-gitlab-bf0f7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12244%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9840c4522896dcbf0f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0639-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-bf0f8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0639%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9840c4522896dcbf0f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1908-cwe-840-business-logic-errors-in-gitlab-gitlab-bf0f92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1908%3A%20CWE-840%3A%20Business%20Logic%20Errors%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9840c4522896dcbf0f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3761-cwe-269-improper-privilege-management-in-joedolson-my-tickets-accessible-event-ticketing-bf1593</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3761%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20joedolson%20My%20Tickets%20%E2%80%93%20Accessible%20Event%20Ticketing&amp;severity=high&amp;id=682d9840c4522896dcbf1593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41423-cwe-863-incorrect-authorization-in-mattermost-mattermost-bf15a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41423%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d9840c4522896dcbf15a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35965-cwe-770-allocation-of-resources-without-limits-or-throttling-in-mattermost-mattermost-bf1585</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35965%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d9840c4522896dcbf1585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-41395-cwe-1287-improper-validation-of-specified-type-of-input-in-mattermost-mattermost-bf13ae</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-41395%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d9840c4522896dcbf13ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32730-use-of-hard-coded-cryptographic-key-in-i-pro-co-ltd-i-pro-configuration-tool-bf1395</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32730%3A%20Use%20of%20hard-coded%20cryptographic%20key%20in%20i-PRO%20Co.%2C%20Ltd.%20i-PRO%20Configuration%20Tool&amp;severity=medium&amp;id=682d9840c4522896dcbf1395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2558-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-the-wound-bf1219</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2558%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20the-wound&amp;severity=high&amp;id=682d9840c4522896dcbf1219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1453-cwe-79-cross-site-scripting-xss-in-unknown-category-posts-widget-bf1204</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1453%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Category%20Posts%20Widget&amp;severity=medium&amp;id=682d9840c4522896dcbf1204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3435-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kitae-park-mang-board-wp-bf1399</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3435%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitae-park%20Mang%20Board%20WP&amp;severity=medium&amp;id=682d9840c4522896dcbf1399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1976-cwe-94-improper-control-of-generation-of-code-code-injection-in-brocade-fabric-os-bee3cd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1976%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d983bc4522896dcbee3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-86f07cca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=68359c9a5d5f0974d01e32c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46419-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-westermo-weos-bf11a9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46419%3A%20CWE-1286%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Westermo%20WeOS&amp;severity=medium&amp;id=682d9840c4522896dcbf11a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46417-cwe-184-incomplete-list-of-disallowed-inputs-in-picklescan-picklescan-bf1135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46417%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Picklescan%20Picklescan&amp;severity=medium&amp;id=682d9840c4522896dcbf1135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29568-n-a-in-n-a-bf0f96</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29568%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44135-n-a-in-n-a-bf0df9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44135%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44134-n-a-in-n-a-bf0df1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44134%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29529-n-a-in-n-a-bf00f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf00f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25777-n-a-in-n-a-bf00ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25777%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbf00ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-f181bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=682acdc2bbaf20d303f181bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-f12014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-24-6e2f1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-24&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e2f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25046-cwe-319-cleartext-transmission-of-sensitive-information-in-ibm-infosphere-information-server-bf1129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25046%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=low&amp;id=682d9840c4522896dcbf1129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25045-cwe-209-generation-of-error-message-containing-sensitive-information-in-ibm-infosphere-information-server-bf157d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25045%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9840c4522896dcbf157d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22351-cwe-613-insufficient-session-expiration-in-ibm-infosphere-information-server-bf156a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22351%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9840c4522896dcbf156a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/introducing-toymaker-2761e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Introducing%20ToyMaker&amp;severity=low&amp;id=6830f1b00acd01a2492761e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46400-null-pointer-dereference-aec804</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46400%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0fb1484d88663aec804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46399-null-pointer-dereference-aec4ac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46399%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0fa1484d88663aec4ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46398-stack-based-buffer-overflow-aec775</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46398%3A%20Stack-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682cd0fb1484d88663aec775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46397-stack-based-buffer-overflow-aec773</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46397%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=682cd0fb1484d88663aec773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32818-cwe-476-null-pointer-dereference-in-sonicwall-sonicos-bf16dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32818%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=682d9840c4522896dcbf16dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3907-cwe-352-cross-site-request-forgery-csrf-in-drupal-search-api-solr-bf3a89</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3907%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Search%20API%20Solr&amp;severity=medium&amp;id=682d9844c4522896dcbf3a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3904-vulnerability-in-drupal-sportsleague-bf29c5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3904%3A%20Vulnerability%20in%20Drupal%20Sportsleague&amp;severity=high&amp;id=682d9842c4522896dcbf29c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3903-vulnerability-in-drupal-ueditor-bf29c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3903%3A%20Vulnerability%20in%20Drupal%20UEditor%20-%20%E7%99%BE%E5%BA%A6%E7%BC%96%E8%BE%91%E5%99%A8&amp;severity=high&amp;id=682d9842c4522896dcbf29c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3902-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-block-class-bf2cde</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Block%20Class&amp;severity=medium&amp;id=682d9843c4522896dcbf2cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3901-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-bootstrap-site-alert-bf2cd1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Bootstrap%20Site%20Alert&amp;severity=medium&amp;id=682d9843c4522896dcbf2cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3900-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-colorbox-bf080a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Colorbox&amp;severity=medium&amp;id=682d983fc4522896dcbf080a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2773-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-bec-technologies-multiple-routers-bf3c16</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2773%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2772-cwe-522-insufficiently-protected-credentials-in-bec-technologies-multiple-routers-bf3c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2772%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2771-cwe-287-improper-authentication-in-bec-technologies-multiple-routers-bf3bf6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2771%3A%20CWE-287%3A%20Improper%20Authentication%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2770-cwe-256-unprotected-storage-of-credentials-in-bec-technologies-multiple-routers-bf3859</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2770%3A%20CWE-256%3A%20Unprotected%20Storage%20of%20Credentials%20in%20BEC%20Technologies%20Multiple%20Routers&amp;severity=medium&amp;id=682d9844c4522896dcbf3859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2769-cwe-427-uncontrolled-search-path-element-in-bdrive-netdrive-bf3855</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2769%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Bdrive%20NetDrive&amp;severity=medium&amp;id=682d9844c4522896dcbf3855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2768-cwe-427-uncontrolled-search-path-element-in-bdrive-netdrive-bf3846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2768%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Bdrive%20NetDrive&amp;severity=medium&amp;id=682d9844c4522896dcbf3846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2767-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-arista-ng-firewall-bf383e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2767%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=medium&amp;id=682d9844c4522896dcbf383e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2765-cwe-798-use-of-hard-coded-credentials-in-carlinkit-cpc200-ccpa-bf381f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2765%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9844c4522896dcbf381f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2764-cwe-347-improper-verification-of-cryptographic-signature-in-carlinkit-cpc200-ccpa-bf3549</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2764%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9844c4522896dcbf3549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2763-cwe-347-improper-verification-of-cryptographic-signature-in-carlinkit-cpc200-ccpa-bf3541</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2763%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9844c4522896dcbf3541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2762-cwe-1326-missing-immutable-root-of-trust-in-hardware-in-carlinkit-cpc200-ccpa-bf319b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2762%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20CarlinKit%20CPC200-CCPA&amp;severity=medium&amp;id=682d9843c4522896dcbf319b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2761-cwe-787-out-of-bounds-write-in-gimp-gimp-bf3193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2761%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GIMP%20GIMP&amp;severity=medium&amp;id=682d9843c4522896dcbf3193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2760-cwe-190-integer-overflow-or-wraparound-in-gimp-gimp-bf318b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2760%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GIMP%20GIMP&amp;severity=medium&amp;id=682d9843c4522896dcbf318b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1522-cwe-918-server-side-request-forgery-ssrf-in-posthog-posthog-bf3187</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1522%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PostHog%20PostHog&amp;severity=medium&amp;id=682d9843c4522896dcbf3187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1521-cwe-918-server-side-request-forgery-ssrf-in-posthog-posthog-bf3539</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1521%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PostHog%20PostHog&amp;severity=medium&amp;id=682d9844c4522896dcbf3539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1520-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-posthog-posthog-bf3531</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1520%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PostHog%20PostHog&amp;severity=medium&amp;id=682d9844c4522896dcbf3531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1050-cwe-787-out-of-bounds-write-in-sonos-era-300-bf351a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1050%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Sonos%20Era%20300&amp;severity=medium&amp;id=682d9844c4522896dcbf351a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1049-cwe-122-heap-based-buffer-overflow-in-sonos-era-300-bf316d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1049%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Sonos%20Era%20300&amp;severity=medium&amp;id=682d9843c4522896dcbf316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1048-cwe-416-use-after-free-in-sonos-era-300-bf3169</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1048%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Sonos%20Era%20300&amp;severity=medium&amp;id=682d9843c4522896dcbf3169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1047-cwe-824-access-of-uninitialized-pointer-in-luxion-keyshot-bf3165</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1047%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Luxion%20KeyShot&amp;severity=medium&amp;id=682d9843c4522896dcbf3165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1046-cwe-416-use-after-free-in-luxion-keyshot-bf3161</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1046%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Luxion%20KeyShot&amp;severity=medium&amp;id=682d9843c4522896dcbf3161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1045-cwe-122-heap-based-buffer-overflow-in-luxion-keyshot-viewer-bf2ccd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1045%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Luxion%20KeyShot%20Viewer&amp;severity=medium&amp;id=682d9843c4522896dcbf2ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-stealer-on-the-horizon-2740a0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Stealer%20on%20the%20Horizon&amp;severity=medium&amp;id=68309d5c0acd01a2492740a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47829-cwe-328-use-of-weak-hash-in-pnpm-pnpm-bf5450</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47829%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20pnpm%20pnpm&amp;severity=medium&amp;id=682d9847c4522896dcbf5450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21605-cwe-770-allocation-of-resources-without-limits-or-throttling-in-redis-redis-bd6e93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21605%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20redis%20redis&amp;severity=high&amp;id=682d9816c4522896dcbd6e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32969-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-xwiki-xwiki-platform-bf5456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32969%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9847c4522896dcbf5456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32968-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-xwiki-xwiki-platform-bf5452</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32968%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9847c4522896dcbf5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32966-cwe-290-authentication-bypass-by-spoofing-in-dataease-dataease-bf509f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32966%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20dataease%20dataease&amp;severity=medium&amp;id=682d9846c4522896dcbf509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2703-cwe-79-in-grafana-grafana-bf5ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2703%3A%20CWE-79%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=682d9847c4522896dcbf5ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42605-cwe-639-authorization-bypass-through-user-controlled-key-in-meon-bidding-solutions-bf59f2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42605%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Meon%20Bidding%20Solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf59f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42604-cwe-1295-debug-messages-revealing-unnecessary-information-in-meon-kyc-solutions-bf593e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42604%3A%20CWE-1295%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf593e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42603-cwe-319-cleartext-transmission-of-sensitive-information-in-meon-kyc-solutions-bf57b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42603%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf57b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42602-cwe-613-insufficient-session-expiration-in-meon-kyc-solutions-bf5729</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42602%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf5729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42601-cwe-602-client-side-enforcement-of-server-side-security-in-meon-kyc-solutions-bf5725</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42601%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf5725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42600-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-meon-kyc-solutions-bf56c6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42600%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Meon%20KYC%20solutions&amp;severity=medium&amp;id=682d9847c4522896dcbf56c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10306-incorrect-authorization-aec8fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10306%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=682cd0fb1484d88663aec8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1054-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-uicore-uicore-elements-free-elementor-widgets-and-templates-bf562d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uicore%20UiCore%20Elements%20%E2%80%93%20Free%20Elementor%20widgets%20and%20templates&amp;severity=medium&amp;id=682d9847c4522896dcbf562d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2595-cwe-425-direct-request-forced-browsing-in-codesys-codesys-visualization-bf5097</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2595%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20CODESYS%20CODESYS%20Visualization&amp;severity=medium&amp;id=682d9846c4522896dcbf5097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3530-cwe-472-external-control-of-assumed-immutable-web-parameter-in-mra13-wordpress-simple-shopping-cart-bf50b0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3530%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20mra13%20WordPress%20Simple%20Shopping%20Cart&amp;severity=high&amp;id=682d9846c4522896dcbf50b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3529-cwe-201-insertion-of-sensitive-information-into-sent-data-in-mra13-wordpress-simple-shopping-cart-bf31aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3529%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20mra13%20WordPress%20Simple%20Shopping%20Cart&amp;severity=high&amp;id=682d9843c4522896dcbf31aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0618-cwe-94-improper-control-of-generation-of-code-code-injection-in-trellix-fireeye-edr-hx-bf5c8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0618%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Trellix%20FireEye%20EDR%20HX&amp;severity=medium&amp;id=682d9848c4522896dcbf5c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0926-cwe-732-incorrect-permission-assignment-for-critical-resource-in-axis-communications-ab-axis-camera-station-pro-bf5c45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0926%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=682d9848c4522896dcbf5c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1056-cwe-73-external-control-of-file-name-or-path-in-axis-communications-ab-axis-camera-station-pro-bf5c6f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1056%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Axis%20Communications%20AB%20AXIS%20Camera%20Station%20Pro&amp;severity=medium&amp;id=682d9848c4522896dcbf5c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1021-missing-authorization-in-synology-diskstation-manager-dsm-bf5c5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1021%3A%20Missing%20Authorization%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=682d9848c4522896dcbf5c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43716-cwe-180-incorrect-behavior-order-validate-before-canonicalize-in-ivanti-landesk-management-suite-bf5bff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43716%3A%20CWE-180%20Incorrect%20Behavior%20Order%3A%20Validate%20Before%20Canonicalize%20in%20Ivanti%20LANDesk%20Management%20Suite&amp;severity=medium&amp;id=682d9847c4522896dcbf5bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46393-cwe-131-incorrect-calculation-of-buffer-size-in-imagemagick-imagemagick-bf5735</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46393%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20ImageMagick%20ImageMagick&amp;severity=medium&amp;id=682d9847c4522896dcbf5735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45428-n-a-in-n-a-bf5731</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45427-n-a-in-n-a-bf572d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf572d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45429-n-a-in-n-a-bf56ce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45429%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf56ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29526-n-a-in-n-a-bf29bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29526%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9842c4522896dcbf29bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58251-cwe-150-improper-neutralization-of-escape-meta-or-control-sequences-in-busybox-busybox-bf169a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58251%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20BusyBox%20BusyBox&amp;severity=medium&amp;id=682d9840c4522896dcbf169a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28169-n-a-in-n-a-bf1581</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28169%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf1581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27581-cwe-425-direct-request-forced-browsing-in-nih-brics-bf1131</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27581%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20NIH%20BRICS&amp;severity=medium&amp;id=682d9840c4522896dcbf1131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27580-cwe-335-incorrect-usage-of-seeds-in-pseudo-random-number-generator-prng-in-nih-brics-bf112d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27580%3A%20CWE-335%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20NIH%20BRICS&amp;severity=medium&amp;id=682d9840c4522896dcbf112d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28028-n-a-in-n-a-bf0d7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28025-n-a-in-n-a-bf0d77</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28025%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28022-n-a-in-n-a-bf0d73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28022%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28021-n-a-in-n-a-bf0d66</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28020-n-a-in-n-a-bf0d62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28019-n-a-in-n-a-bf0d5e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28018-n-a-in-n-a-bf0d4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28017-n-a-in-n-a-bf0d47</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46394-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-busybox-busybox-bf0929</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46394%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20BusyBox%20BusyBox&amp;severity=medium&amp;id=682d983fc4522896dcbf0929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43965-cwe-131-incorrect-calculation-of-buffer-size-in-imagemagick-imagemagick-befa80</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43965%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20ImageMagick%20ImageMagick&amp;severity=low&amp;id=682d983ec4522896dcbefa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-23-2a48d0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-23&amp;severity=medium&amp;id=682c7db2e8347ec82d2a48d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-23-f1239d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f1239d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37088-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-cray-data-virtualization-service-dvs-bf04e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37088%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Cray%20Data%20Virtualization%20Service%20(DVS)&amp;severity=medium&amp;id=682d983fc4522896dcbf04e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27087-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-cray-operating-system-cos-bf5c75</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27087%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Cray%20Operating%20System%20(COS)&amp;severity=medium&amp;id=682d9848c4522896dcbf5c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37087-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-performance-cluster-manager-hpcm-bd8f3c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37087%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Performance%20Cluster%20Manager%20(HPCM)&amp;severity=critical&amp;id=682d981ac4522896dcbd8f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32965-cwe-506-embedded-malicious-code-in-xrplf-xrpl-js-bf5c2b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32965%3A%20CWE-506%3A%20Embedded%20Malicious%20Code%20in%20XRPLF%20xrpl.js&amp;severity=medium&amp;id=682d9847c4522896dcbf5c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23253-cwe-547-use-of-hard-coded-security-relevant-constants-in-nvidia-nvidia-app-bf6042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23253%3A%20CWE-547%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20NVIDIA%20NVIDIA%20App&amp;severity=medium&amp;id=682d9848c4522896dcbf6042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31328-cwe-352-cross-site-request-forgery-csrf-in-sap-se-sap-s-4-hana-learning-solution-bf54f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31328%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SAP_SE%20SAP%20S%2F4%20HANA%20(Learning%20Solution)&amp;severity=medium&amp;id=682d9847c4522896dcbf54f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31327-cwe-472-external-control-of-assumed-immutable-web-parameter-in-sap-se-sap-field-logistics-bf54f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31327%3A%20CWE-472%3A%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20SAP_SE%20SAP%20Field%20Logistics&amp;severity=medium&amp;id=682d9847c4522896dcbf54f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32961-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cuba-platform-jpawebapi-bf5518</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32961%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuba-platform%20jpawebapi&amp;severity=medium&amp;id=682d9847c4522896dcbf5518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32960-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-cuba-platform-restapi-bf5514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32960%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cuba-platform%20restapi&amp;severity=medium&amp;id=682d9847c4522896dcbf5514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32959-cwe-770-allocation-of-resources-without-limits-or-throttling-in-cuba-platform-cuba-bf6084</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32959%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20cuba-platform%20cuba&amp;severity=medium&amp;id=682d9848c4522896dcbf6084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32951-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jmix-framework-jmix-bf019d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32951%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmix-framework%20jmix&amp;severity=medium&amp;id=682d983ec4522896dcbf019d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32952-cwe-770-allocation-of-resources-without-limits-or-throttling-in-jmix-framework-jmix-bf01a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32952%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20jmix-framework%20jmix&amp;severity=medium&amp;id=682d983ec4522896dcbf01a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32964-cwe-285-improper-authorization-in-miraheze-managewiki-bf683a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32964%3A%20CWE-285%3A%20Improper%20Authorization%20in%20miraheze%20ManageWiki&amp;severity=medium&amp;id=682d9849c4522896dcbf683a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32963-cwe-522-insufficiently-protected-credentials-in-minio-operator-bf01a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32963%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20minio%20operator&amp;severity=medium&amp;id=682d983ec4522896dcbf01a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32950-cwe-35-path-traversal-in-jmix-framework-jmix-bf0190</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32950%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20jmix-framework%20jmix&amp;severity=medium&amp;id=682d983ec4522896dcbf0190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32788-cwe-290-authentication-bypass-by-spoofing-in-octoprint-octoprint-bf018c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32788%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20OctoPrint%20OctoPrint&amp;severity=medium&amp;id=682d983ec4522896dcbf018c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/case-of-attacks-targeting-ms-sql-servers-to-install-ammyy-admin-2622b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Case%20of%20Attacks%20Targeting%20MS-SQL%20Servers%20to%20Install%20Ammyy%20Admin&amp;severity=medium&amp;id=682f4bb70acd01a2492622b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34028-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-commvault-command-center-innovation-release-bd89e3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34028%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Commvault%20Command%20Center%20Innovation%20Release&amp;severity=critical&amp;id=682d9819c4522896dcbd89e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27907-cwe-918-server-side-request-forgery-ssrf-in-ibm-websphere-application-server-bf6836</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27907%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682d9849c4522896dcbf6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23251-cwe-94-improper-control-of-generation-of-code-code-injection-in-nvidia-nemo-framework-bf54e3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23251%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=682d9847c4522896dcbf54e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23250-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-nvidia-nemo-framework-bf54df</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23250%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=682d9847c4522896dcbf54df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23249-cwe-502-deserialization-of-untrusted-data-in-nvidia-nemo-framework-bf54b9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23249%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NVIDIA%20NeMo%20Framework&amp;severity=high&amp;id=682d9847c4522896dcbf54b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3767-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-centreon-centreon-bam-bf6de5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3767%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Centreon%20Centreon%20BAM&amp;severity=medium&amp;id=682d9849c4522896dcbf6de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1951-cwe-250-execution-with-unnecessary-privileges-in-ibm-hardware-management-console-power-systems-bf5cdc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1951%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Hardware%20Management%20Console%20-%20Power%20Systems&amp;severity=high&amp;id=682d9848c4522896dcbf5cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1950-cwe-114-process-control-in-ibm-hardware-management-console-power-systems-bf5cd4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1950%3A%20CWE-114%20Process%20Control%20in%20IBM%20Hardware%20Management%20Console%20-%20Power%20Systems&amp;severity=critical&amp;id=682d9848c4522896dcbf5cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23176-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-tecnick-tcexam-bf6de1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23176%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=682d9849c4522896dcbf6de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23175-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-tecnick-tcexam-bf7739</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Tecnick%20TCExam&amp;severity=medium&amp;id=682d984ac4522896dcbf7739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2092-cwe-532-insertion-of-sensitive-information-into-log-file-in-checkmk-gmbh-checkmk-bf7711</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2092%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=682d984ac4522896dcbf7711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11299-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-memberpress-memberpress-bf768e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11299%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20MemberPress%20Memberpress&amp;severity=medium&amp;id=682d984ac4522896dcbf768e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3458-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oceanwp-ocean-extra-bf76d3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=682d984ac4522896dcbf76d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3472-cwe-94-improper-control-of-generation-of-code-code-injection-in-oceanwp-ocean-extra-bf76db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3472%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=682d984ac4522896dcbf76db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3457-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oceanwp-ocean-extra-bf76cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=682d984ac4522896dcbf76cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46254-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-visual-composer-visual-composer-website-builder-bf76f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=682d984ac4522896dcbf76f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46253-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ataur-r-gutenkit-bf76eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ataur%20R%20GutenKit&amp;severity=null&amp;id=682d984ac4522896dcbf76eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46252-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kofimokome-message-filter-for-contact-form-7-bf7686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46252%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kofi%20Mokome%20Message%20Filter%20for%20Contact%20Form%207&amp;severity=null&amp;id=682d984ac4522896dcbf7686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46251-cwe-352-cross-site-request-forgery-csrf-in-e4jvikwp-vikrestaurants-table-reservations-and-take-away-bf767e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46251%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20e4jvikwp%20VikRestaurants&amp;severity=null&amp;id=682d984ac4522896dcbf767e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46250-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-vikas-ratudi-vform-bf7676</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=682d984ac4522896dcbf7676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46249-cwe-352-cross-site-request-forgery-csrf-in-michael-simple-calendar-for-elementor-bf7657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46249%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Simple%20calendar%20for%20Elementor&amp;severity=null&amp;id=682d984ac4522896dcbf7657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46247-cwe-862-missing-authorization-in-codepeople-appointment-booking-calendar-bf6dfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46247%3A%20Missing%20Authorization%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=null&amp;id=682d9849c4522896dcbf6dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46246-cwe-352-cross-site-request-forgery-csrf-in-creativemindssolutions-cm-answers-bf6de9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46246%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CreativeMindsSolutions%20CM%20Answers&amp;severity=null&amp;id=682d9849c4522896dcbf6de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46245-cwe-352-cross-site-request-forgery-csrf-in-creativemindssolutions-cm-ad-changer-bf6b6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46245%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CreativeMindsSolutions%20CM%20Ad%20Changer&amp;severity=null&amp;id=682d9849c4522896dcbf6b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46244-cwe-862-missing-authorization-in-dotstore-advanced-linked-variations-for-woocommerce-bf6b69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46244%3A%20Missing%20Authorization%20in%20Dotstore%20Advanced%20Linked%20Variations%20for%20Woocommerce&amp;severity=null&amp;id=682d9849c4522896dcbf6b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46243-cwe-352-cross-site-request-forgery-csrf-in-sonalsinha21-recover-abandoned-cart-for-woocommerce-bf6ad4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46243%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sonalsinha21%20Recover%20abandoned%20cart%20for%20WooCommerce&amp;severity=null&amp;id=682d9849c4522896dcbf6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46242-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bob-watu-quiz-bf6ad0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46242%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bob%20Watu%20Quiz&amp;severity=null&amp;id=682d9849c4522896dcbf6ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46241-cwe-352-cross-site-request-forgery-csrf-in-codepeople-appointment-booking-calendar-bf6acc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46241%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20Appointment%20Booking%20Calendar&amp;severity=null&amp;id=682d9849c4522896dcbf6acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46240-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeff-starr-simple-download-counter-bf762f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Simple%20Download%20Counter&amp;severity=null&amp;id=682d984ac4522896dcbf762f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46239-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jeff-starr-theme-switcha-bf762b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeff%20Starr%20Theme%20Switcha&amp;severity=null&amp;id=682d984ac4522896dcbf762b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46238-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rbaer-list-last-changes-bf75ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rbaer%20List%20Last%20Changes&amp;severity=null&amp;id=682d984ac4522896dcbf75ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46237-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yannick-lefebvre-link-library-bf75e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yannick%20Lefebvre%20Link%20Library&amp;severity=null&amp;id=682d984ac4522896dcbf75e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46236-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-link-software-llc-html-forms-bf75b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46236%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Link%20Software%20LLC%20HTML%20Forms&amp;severity=null&amp;id=682d984ac4522896dcbf75b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46235-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sonalsinha21-skt-blocks-gutenberg-based-page-builder-bf7542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=682d984ac4522896dcbf7542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46233-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sirv-cdn-and-image-hosting-sirv-bf753e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sirv%20CDN%20and%20Image%20Hosting%20Sirv&amp;severity=null&amp;id=682d984ac4522896dcbf753e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46232-cwe-862-missing-authorization-in-alttextai-download-alt-text-ai-bf7486</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46232%3A%20Missing%20Authorization%20in%20alttextai%20Download%20Alt%20Text%20AI&amp;severity=null&amp;id=682d984ac4522896dcbf7486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46231-cwe-352-cross-site-request-forgery-csrf-in-servit-software-solutions-affiliate-toolkit-bf7427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46231%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SERVIT%20Software%20Solutions%20affiliate-toolkit&amp;severity=null&amp;id=682d984ac4522896dcbf7427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46229-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-israpil-textmetrics-bf7423</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Israpil%20Textmetrics&amp;severity=null&amp;id=682d984ac4522896dcbf7423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46228-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bastien-ho-event-post-bf6abf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=682d9849c4522896dcbf6abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46227-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-brecht-custom-related-posts-bf6abb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46227%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brecht%20Custom%20Related%20Posts&amp;severity=null&amp;id=682d9849c4522896dcbf6abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46226-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ferranfg-mpl-publisher-bf6ab7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46226%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ferranfg%20MPL-Publisher&amp;severity=null&amp;id=682d9849c4522896dcbf6ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46225-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-michael-post-in-page-for-elementor-bf6aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Post%20in%20page%20for%20Elementor&amp;severity=medium&amp;id=682d9849c4522896dcbf6aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3519-cwe-639-authorization-bypass-through-user-controlled-key-in-unblu-inc-unblu-spark-bf604a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3519%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unblu%20inc.%20Unblu%20Spark&amp;severity=medium&amp;id=682d9848c4522896dcbf604a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3518-vulnerability-in-unblu-inc-unblu-spark-bf10ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3518%3A%20Vulnerability%20in%20Unblu%20inc.%20Unblu%20Spark&amp;severity=medium&amp;id=682d9840c4522896dcbf10ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26413-cwe-20-improper-input-validation-in-apache-software-foundation-apache-kvrocks-bd6bce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26413%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Kvrocks&amp;severity=high&amp;id=682d9816c4522896dcbd6bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2594-cwe-287-improper-authentication-in-unknown-user-registration-membership-bf741f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2594%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Registration%20%26%20Membership&amp;severity=high&amp;id=682d984ac4522896dcbf741f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13569-cwe-79-cross-site-scripting-xss-in-unknown-front-end-users-bf73fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13569%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Front%20End%20Users&amp;severity=high&amp;id=682d984ac4522896dcbf73fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3814-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wijnbergdevelopments-tax-switch-for-woocommerce-bf6059</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wijnbergdevelopments%20Tax%20Switch%20for%20WooCommerce&amp;severity=medium&amp;id=682d9848c4522896dcbf6059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2839-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-vjinfotech-wp-import-export-lite-bf7727</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vjinfotech%20WP%20Import%20Export%20Lite&amp;severity=medium&amp;id=682d984ac4522896dcbf7727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3616-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-wpsoul-greenshift-animation-and-page-builder-blocks-bf7731</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3616%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=high&amp;id=682d984ac4522896dcbf7731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46899-cwe-1392-use-of-default-credentials-in-hitachi-hitachi-ops-center-common-services-bf7696</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46899%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Hitachi%20Hitachi%20Ops%20Center%20Common%20Services&amp;severity=medium&amp;id=682d984ac4522896dcbf7696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2300-cwe-532-insertion-of-sensitive-information-into-log-file-in-hitachi-hitachi-ops-center-common-services-bf76ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2300%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20Common%20Services&amp;severity=medium&amp;id=682d984ac4522896dcbf76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3577-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-zyxel-amg1302-t10b-firmware-bf76e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3577%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zyxel%20AMG1302-T10B%20firmware&amp;severity=medium&amp;id=682d984ac4522896dcbf76e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1732-cwe-269-improper-privilege-management-in-zyxel-usg-flex-h-series-uos-firmware-bf5ccc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1732%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Zyxel%20USG%20FLEX%20H%20series%20uOS%20firmware&amp;severity=medium&amp;id=682d9848c4522896dcbf5ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1731-cwe-732-incorrect-permission-assignment-for-critical-resource-in-zyxel-usg-flex-h-series-uos-firmware-bec284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1731%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Zyxel%20USG%20FLEX%20H%20series%20uOS%20firmware&amp;severity=high&amp;id=682d9838c4522896dcbec284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3856-sql-injection-in-xxyopen-novel-plus-bf78ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3856%3A%20SQL%20Injection%20in%20xxyopen%20Novel-Plus&amp;severity=medium&amp;id=682d984ac4522896dcbf78ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3855-improper-control-of-resource-identifiers-in-codecanyon-rise-ultimate-project-manager-bf78e9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3855%3A%20Improper%20Control%20of%20Resource%20Identifiers%20in%20CodeCanyon%20RISE%20Ultimate%20Project%20Manager&amp;severity=medium&amp;id=682d984ac4522896dcbf78e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3854-buffer-overflow-in-h3c-gr-3000ax-bf78e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3854%3A%20Buffer%20Overflow%20in%20H3C%20GR-3000AX&amp;severity=medium&amp;id=682d984ac4522896dcbf78e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3850-improper-authentication-in-yxj2018-springboot-vue-onlineexam-bf78e1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3850%3A%20Improper%20Authentication%20in%20YXJ2018%20SpringBoot-Vue-OnlineExam&amp;severity=medium&amp;id=682d984ac4522896dcbf78e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-23h2-clfssys-elevation-of-pri-44c16481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%2023h2%20-%20CLFS.sys%20Elevation%20of%20Privilege&amp;severity=high&amp;id=68489e837e6d765d51d546c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wondercms-342-remote-code-execution-rce-34314eed</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WonderCMS%203.4.2%20-%20Remote%20Code%20Execution%20(RCE)&amp;severity=critical&amp;id=68489e7d7e6d765d51d546bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/code-projects-online-exam-mastering-system-10-refl-d8906b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=code-projects%20Online%20Exam%20Mastering%20System%201.0%20-%20Reflected%20Cross-Site%20Scripting%20(XSS)&amp;severity=medium&amp;id=68489e777e6d765d51d546af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/firefox-esr-11511-pdfjs-arbitrary-javascript-execu-01e40610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Firefox%20ESR%20115.11%20-%20PDF.js%20Arbitrary%20JavaScript%20execution&amp;severity=medium&amp;id=68489e6e7e6d765d51d546a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wordpress-core-62-directory-traversal-935994a1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=WordPress%20Core%206.2%20-%20Directory%20Traversal&amp;severity=medium&amp;id=68489e5c7e6d765d51d54674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-windows-11-kernel-privilege-escalation-cae94a9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Windows%2011%20-%20Kernel%20Privilege%20Escalation&amp;severity=high&amp;id=68489e527e6d765d51d543b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58250-cwe-426-untrusted-search-path-in-samba-ppp-bf78a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58250%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Samba%20ppp&amp;severity=medium&amp;id=682d984ac4522896dcbf78a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46546-n-a-in-n-a-bf7228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46546%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28039-n-a-in-n-a-bf6032</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28038-n-a-in-n-a-bf602a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf602a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28031-n-a-in-n-a-bf6004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf6004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29547-n-a-in-n-a-bf5fb8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29547%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33452-n-a-in-n-a-bf5fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33452%3A%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53569-n-a-in-n-a-bf5e9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53569%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43952-n-a-in-n-a-bf5e4a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29743-n-a-in-n-a-bf5df5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29743%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43948-n-a-in-n-a-bf5dd4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43948%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43947-n-a-in-n-a-bf5dcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43947%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29621-n-a-in-n-a-bf5dc4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29621%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26159-n-a-in-n-a-bf5dbe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26159%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43951-n-a-in-n-a-bf5c3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43951%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf5c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43950-n-a-in-n-a-bf5c35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43950%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43949-n-a-in-n-a-bf5c2f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43949%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9848c4522896dcbf5c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44755-n-a-in-n-a-bf5c27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44755%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44752-n-a-in-n-a-bf5c18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44752%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29339-n-a-in-n-a-bf5be0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29339%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28030-n-a-in-n-a-bf5bdc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28024-n-a-in-n-a-bf5bd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28024%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43958-n-a-in-n-a-bf5bd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43958%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53568-n-a-in-n-a-bf5b7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53568%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28026-n-a-in-n-a-bf5b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28036-n-a-in-n-a-bf5abf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28036%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28035-n-a-in-n-a-bf5936</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28035%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28029-n-a-in-n-a-bf592e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28029%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf592e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28033-n-a-in-n-a-bf58b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28033%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf58b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40446-n-a-in-n-a-bf58ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf58ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44753-n-a-in-n-a-bf5893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44753%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43378-n-a-in-n-a-bf588f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43378%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf588f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28034-n-a-in-n-a-bf5822</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28034%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28032-n-a-in-n-a-bf581e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28032%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28037-n-a-in-n-a-bf54eb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf54eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28027-n-a-in-n-a-bf479d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9845c4522896dcbf479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43946-n-a-in-n-a-bf0436</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43946%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40445-n-a-in-n-a-bede22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40445%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbede22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-22-2a43f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-22&amp;severity=medium&amp;id=682c7db2e8347ec82d2a43f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-22-f1216f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f1216f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3849-unverified-password-change-in-yxj2018-springboot-vue-onlineexam-bf78dd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3849%3A%20Unverified%20Password%20Change%20in%20YXJ2018%20SpringBoot-Vue-OnlineExam&amp;severity=medium&amp;id=682d984ac4522896dcbf78dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2987-cwe-918-server-side-request-forgery-ssrf-in-ibm-maximo-asset-management-bf78ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2987%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20IBM%20Maximo%20Asset%20Management&amp;severity=low&amp;id=682d984ac4522896dcbf78ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3847-sql-injection-in-markparticle-webserver-bf78bf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3847%3A%20SQL%20Injection%20in%20markparticle%20WebServer&amp;severity=medium&amp;id=682d984ac4522896dcbf78bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3846-sql-injection-in-markparticle-webserver-bf78bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3846%3A%20SQL%20Injection%20in%20markparticle%20WebServer&amp;severity=medium&amp;id=682d984ac4522896dcbf78bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3845-buffer-overflow-in-markparticle-webserver-bf78b7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3845%3A%20Buffer%20Overflow%20in%20markparticle%20WebServer&amp;severity=medium&amp;id=682d984ac4522896dcbf78b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3843-cross-site-request-forgery-in-panhainan-ds-java-bf78b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3843%3A%20Cross-Site%20Request%20Forgery%20in%20panhainan%20DS-Java&amp;severity=medium&amp;id=682d984ac4522896dcbf78b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32955-cwe-268-privilege-chaining-in-step-security-harden-runner-bf78af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32955%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20step-security%20harden-runner&amp;severity=medium&amp;id=682d984ac4522896dcbf78af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32956-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-miraheze-managewiki-bd6c48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32956%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20miraheze%20ManageWiki&amp;severity=high&amp;id=682d9816c4522896dcbd6c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32958-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-adeptlanguage-adept-bf789f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32958%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AdeptLanguage%20Adept&amp;severity=medium&amp;id=682d984ac4522896dcbf789f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3842-code-injection-in-panhainan-ds-java-bf78a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3842%3A%20Code%20Injection%20in%20panhainan%20DS-Java&amp;severity=medium&amp;id=682d984ac4522896dcbf78a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3841-improper-neutralization-of-special-elements-used-in-a-template-engine-in-wix-incubator-jam-bf15bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3841%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20wix-incubator%20jam&amp;severity=medium&amp;id=682d9840c4522896dcbf15bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27086-vulnerability-in-hewlett-packard-enterprise-hpe-performance-cluster-manager-hpcm-bf7704</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27086%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20Performance%20Cluster%20Manager%20(HPCM)&amp;severity=high&amp;id=682d984ac4522896dcbf7704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23174-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-yoel-geva-android-app-bf7b1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23174%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Yoel%20Geva%20Android%20App&amp;severity=medium&amp;id=682d984bc4522896dcbf7b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32793-cwe-319-cleartext-transmission-of-sensitive-information-in-cilium-cilium-bf7bd7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32793%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20cilium%20cilium&amp;severity=medium&amp;id=682d984bc4522896dcbf7bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32431-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-traefik-traefik-bf7bcf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32431%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20traefik%20traefik&amp;severity=medium&amp;id=682d984bc4522896dcbf7bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12543-cwe-841-improper-enforcement-of-behavioral-workflow-in-opentext-opentext-content-management-bf7bfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12543%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20OpenText%20OpenText%20Content%20Management&amp;severity=medium&amp;id=682d984bc4522896dcbf7bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3857-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-amazon-amazon-ion-dotnet-bf7c1e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3857%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Amazon%20Amazon%20Ion%20Dotnet&amp;severity=high&amp;id=682d984bc4522896dcbf7c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12863-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-opentext-opentext-content-management-bf7cb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20OpenText%20Content%20Management&amp;severity=medium&amp;id=682d984bc4522896dcbf7cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2298-cwe-862-missing-authorization-in-dremio-corporation-dremio-software-bf7bc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2298%3A%20CWE-862%20Missing%20Authorization%20in%20Dremio%20Corporation%20Dremio%20Software&amp;severity=medium&amp;id=682d984bc4522896dcbf7bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2517-cwe-672-operation-on-a-resource-after-expiration-or-release-in-opentext-arcsight-enterprise-security-manager-bf7da7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2517%3A%20CWE-672%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20OpenText%20ArcSight%20Enterprise%20Security%20Manager&amp;severity=medium&amp;id=682d984bc4522896dcbf7da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12862-cwe-863-incorrect-authorization-in-opentext-content-server-bf7cad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12862%3A%20CWE-863%20Incorrect%20Authorization%20in%20OpenText%20Content%20Server&amp;severity=medium&amp;id=682d984bc4522896dcbf7cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3840-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-saviynt-ova-based-connect-bf84a5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Saviynt%20OVA%20based%20Connect&amp;severity=medium&amp;id=682d984bc4522896dcbf84a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3838-cwe-863-incorrect-authorization-in-saviynt-ova-based-connect-bf8477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3838%3A%20CWE-863%20Incorrect%20Authorization%20in%20Saviynt%20OVA%20based%20Connect&amp;severity=medium&amp;id=682d984bc4522896dcbf8477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3837-cwe-20-improper-input-validation-in-saviynt-ova-based-connect-bf8467</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3837%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Saviynt%20OVA%20based%20Connect&amp;severity=medium&amp;id=682d984bc4522896dcbf8467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25228-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-in-virtuemart-net-virtuemart-component-for-joomla-bd9c27</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25228%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20virtuemart.net%20Virtuemart%20component%20for%20Joomla&amp;severity=low&amp;id=682d981bc4522896dcbd9c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0632-cwe-98-improper-control-of-filename-for-include-in-formulatrix-rock-maker-web-befa61</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0632%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%20in%20Formulatrix%20Rock%20Maker%20Web&amp;severity=critical&amp;id=682d983ec4522896dcbefa61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43916-cwe-647-use-of-non-canonical-url-paths-for-authorization-decisions-in-sonos-api-sonos-com-bf7edb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43916%3A%20CWE-647%20Use%20of%20Non-Canonical%20URL%20Paths%20for%20Authorization%20Decisions%20in%20Sonos%20api.sonos.com&amp;severity=medium&amp;id=682d984bc4522896dcbf7edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41446-n-a-in-n-a-bf7da1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29659-n-a-in-n-a-bf7d69</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29659%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29287-n-a-in-n-a-bf7d65</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29287%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29660-n-a-in-n-a-bf7d2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29660%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28121-n-a-in-n-a-bf7d27</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28121%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28367-n-a-in-n-a-bf7bb8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28367%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42699-n-a-in-n-a-bf7bb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42699%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43922-cwe-863-incorrect-authorization-in-filewave-filewave-bf7b78</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43922%3A%20CWE-863%20Incorrect%20Authorization%20in%20FileWave%20FileWave&amp;severity=medium&amp;id=682d984bc4522896dcbf7b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28102-n-a-in-n-a-bf7abe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32408-cwe-863-incorrect-authorization-in-soffid-iam-bf5503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32408%3A%20CWE-863%20Incorrect%20Authorization%20in%20Soffid%20IAM&amp;severity=medium&amp;id=682d9847c4522896dcbf5503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29446-n-a-in-n-a-bd707f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29446%3A%20n%2Fa&amp;severity=low&amp;id=682d9817c4522896dcbd707f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28103-n-a-in-n-a-bd7070</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28103%3A%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28099-n-a-in-n-a-bd7068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28099%3A%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57394-n-a-in-n-a-bd704f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd704f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28104-n-a-in-n-a-bd6bdf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28104%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-21-2a4052</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-21&amp;severity=medium&amp;id=682c7db2e8347ec82d2a4052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-21-f12ea4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3824-cross-site-scripting-in-sourcecodester-web-based-pharmacy-product-management-system-bf8463</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3824%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=682d984bc4522896dcbf8463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3823-cross-site-scripting-in-sourcecodester-web-based-pharmacy-product-management-system-bf83f9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3823%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Web-based%20Pharmacy%20Product%20Management%20System&amp;severity=medium&amp;id=682d984bc4522896dcbf83f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43955-cwe-749-exposed-dangerous-method-or-function-in-convertigo-convertigo-bf8392</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43955%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Convertigo%20Convertigo&amp;severity=medium&amp;id=682d984bc4522896dcbf8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43954-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-quasar-qmarkdown-bf8339</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43954%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Quasar%20QMarkdown&amp;severity=medium&amp;id=682d984bc4522896dcbf8339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43929-cwe-346-origin-validation-error-in-kitty-project-kitty-bf81c5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43929%3A%20CWE-346%20Origin%20Validation%20Error%20in%20kitty%20project%20kitty&amp;severity=medium&amp;id=682d984bc4522896dcbf81c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43928-cwe-24-path-traversal-filedir-in-infodraw-media-relay-service-bf7e19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43928%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Infodraw%20Media%20Relay%20Service&amp;severity=medium&amp;id=682d984bc4522896dcbf7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43921-cwe-863-incorrect-authorization-in-gnu-mailman-befa06</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43921%3A%20CWE-863%20Incorrect%20Authorization%20in%20GNU%20Mailman&amp;severity=medium&amp;id=682d983ec4522896dcbefa06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43920-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-gnu-mailman-bef9fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43920%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20GNU%20Mailman&amp;severity=medium&amp;id=682d983ec4522896dcbef9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43919-cwe-24-path-traversal-filedir-in-gnu-mailman-bef9f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43919%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20GNU%20Mailman&amp;severity=medium&amp;id=682d983ec4522896dcbef9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-20-2a5423</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-20&amp;severity=medium&amp;id=682c7db3e8347ec82d2a5423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-20-f12816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3820-stack-based-buffer-overflow-in-tenda-w12-bf7de5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3820%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=medium&amp;id=682d984bc4522896dcbf7de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3818-sql-injection-in-webpy-webpy-e91e0184</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3818%3A%20SQL%20Injection%20in%20webpy%20web.py&amp;severity=medium&amp;id=68386122182aa0cae27f1da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3805-injection-in-sarrionandia-tournatrack-bf84f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3805%3A%20Injection%20in%20sarrionandia%20tournatrack&amp;severity=medium&amp;id=682d984bc4522896dcbf84f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3804-injection-in-thautwarm-vscode-diana-bf84e7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3804%3A%20Injection%20in%20thautwarm%20vscode-diana&amp;severity=medium&amp;id=682d984bc4522896dcbf84e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3802-stack-based-buffer-overflow-in-tenda-w12-bf7d88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3802%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W12&amp;severity=medium&amp;id=682d984bc4522896dcbf7d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3801-cross-site-scripting-in-songquanpeng-one-api-bf800d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3801%3A%20Cross%20Site%20Scripting%20in%20songquanpeng%20one-api&amp;severity=medium&amp;id=682d984bc4522896dcbf800d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3800-sql-injection-in-wcms-bf7eca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3800%3A%20SQL%20Injection%20in%20WCMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3799-sql-injection-in-wcms-bf7ec2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3799%3A%20SQL%20Injection%20in%20WCMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3798-unrestricted-upload-in-wcms-bf7eb2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3798%3A%20Unrestricted%20Upload%20in%20WCMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3661-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bobbingwide-sb-chart-block-bf7d80</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20SB%20Chart%20block&amp;severity=medium&amp;id=682d984bc4522896dcbf7d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3404-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-codename065-download-manager-bf7e9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3404%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=682d984bc4522896dcbf7e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4455-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-codeflist-wordpress-plugin-smart-product-review-bf7e65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4455%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Codeflist%20Wordpress%20Plugin%20Smart%20Product%20Review&amp;severity=medium&amp;id=682d984bc4522896dcbf7e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3809-cwe-79-improper-neutralization-of-in-f6fd01dd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qriouslad%20Debug%20Log%20Manager&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54ef86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2111-cwe-352-cross-site-request-forgery-c-8d67c42a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2111%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hiddenpearls%20Insert%20Headers%20And%20Footers&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3103-cwe-73-external-control-of-file-name-a99dbf92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3103%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20LambertGroup%20CLEVER%20-%20HTML5%20Radio%20Player%20With%20History%20-%20Shoutcast%20and%20Icecast%20-%20Elementor%20Widget%20Addon&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1457-cwe-79-improper-neutralization-of-in-18ecd1ac</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20addons%20with%20Ready%20Templates%2C%20Blocks%2C%20Widgets%20and%20WooCommerce%20Builder&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3275-cwe-79-improper-neutralization-of-in-b209d946</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1093-cwe-434-unrestricted-upload-of-file--3c72ce7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1093%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LiquidThemes%20AI%20Hub%20-%20Startup%20%26%20Technology%20WordPress%20Theme&amp;severity=critical&amp;id=699f6b0eb7ef31ef0b54da46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2010-cwe-89-improper-neutralization-of-sp-65239a1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2010%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mhmrajib%20JobWP%20%E2%80%93%20Job%20Board%2C%20Job%20Listing%2C%20Career%20Page%20and%20Recruitment%20Plugin&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3278-cwe-269-improper-privilege-managemen-d0d1babe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3278%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Edge-Themes%20UrbanGo%20Membership&amp;severity=critical&amp;id=699f6b29b7ef31ef0b54ed8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3284-cwe-352-cross-site-request-forgery-csrf-in-wpeverest-user-registration-pro-custom-registration-form-login-form-and-user-profile-wordpress-plugin-bf7e97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3284%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPEverest%20User%20Registration%20PRO%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=682d984bc4522896dcbf7e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-19-f9e573aa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-19&amp;severity=medium&amp;id=68367c96182aa0cae23195a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43918-cwe-348-use-of-less-trusted-source-in-ssl-com-ssl-com-bf7e4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43918%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20SSL.com%20SSL.com&amp;severity=medium&amp;id=682d984bc4522896dcbf7e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30421-cwe-407-inefficient-algorithmic-complexity-in-mjson-project-mjson-bf7e44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30421%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity%20in%20mjson%20project%20mjson&amp;severity=medium&amp;id=682d984bc4522896dcbf7e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26819-cwe-440-expected-behavior-violation-in-cjson-project-cjson-bf7d12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26819%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20cJSON%20Project%20cJSON&amp;severity=low&amp;id=682d984bc4522896dcbf7d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47112-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-7-zip-7-zip-bf7d0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47112%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%207-Zip%207-Zip&amp;severity=medium&amp;id=682d984bc4522896dcbf7d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47111-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-7-zip-7-zip-bf7d0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47111%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%207-Zip%207-Zip&amp;severity=medium&amp;id=682d984bc4522896dcbf7d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43917-cwe-863-incorrect-authorization-in-pritunl-pritunl-client-bf7cb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43917%3A%20CWE-863%20Incorrect%20Authorization%20in%20Pritunl%20Pritunl-Client&amp;severity=medium&amp;id=682d984bc4522896dcbf7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-19-f21367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-19&amp;severity=medium&amp;id=682acdc4bbaf20d303f21367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-19-f121b3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f121b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3796-sql-injection-in-phpgurukul-men-salon-management-system-bf7e48</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3796%3A%20SQL%20Injection%20in%20PHPGurukul%20Men%20Salon%20Management%20System&amp;severity=medium&amp;id=682d984bc4522896dcbf7e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24914-cwe-276-incorrect-default-permissions-in-tenable-nessus-bf7782</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24914%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Tenable%20Nessus&amp;severity=high&amp;id=682d984ac4522896dcbf7782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1697-cwe-59-improper-link-resolution-before-file-access-link-following-in-hp-inc-hp-touchpoint-analytics-service-bf7766</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1697%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HP%2C%20Inc.%20HP%20Touchpoint%20Analytics%20Service&amp;severity=medium&amp;id=682d984ac4522896dcbf7766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32792-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-endojs-endo-bf83f3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32792%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20endojs%20endo&amp;severity=medium&amp;id=682d984bc4522896dcbf83f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32442-cwe-1287-improper-validation-of-specified-type-of-input-in-fastify-fastify-bef605</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32442%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20fastify%20fastify&amp;severity=high&amp;id=682d983dc4522896dcbef605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29953-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-activemq-nms-openwire-client-bf5631</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29953%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20ActiveMQ%20NMS%20OpenWire%20Client&amp;severity=critical&amp;id=682d9847c4522896dcbf5631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2950-cwe-644-improper-neutralization-of-h-c85eae04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2950%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax&amp;severity=medium&amp;id=68b08834ad5a09ad006e4982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37838-vulnerability-in-linux-linux-be8499</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40364-vulnerability-in-linux-linux-be853c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40364%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe853c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3106-cwe-79-improper-neutralization-of-in-04ed80e3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3106%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2492-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-asus-router-aeb19f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2492%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ASUS%20Router&amp;severity=critical&amp;id=682cd0f71484d88663aeb19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3056-cwe-79-improper-neutralization-of-in-7d45feac</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6b27b7ef31ef0b54ebc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/proton66-compromised-wordpress-pages-and-malware-campaigns-16a125</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Proton66%3A%20Compromised%20WordPress%20Pages%20and%20Malware%20Campaigns&amp;severity=medium&amp;id=682c992c7960f6956616a125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40325-vulnerability-in-linux-linux-bdd49d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40325%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40114-vulnerability-in-linux-linux-be852b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe852b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-40014-vulnerability-in-linux-linux-be8523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-40014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39989-vulnerability-in-linux-linux-bdd490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39930-vulnerability-in-linux-linux-be851f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe851f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39778-vulnerability-in-linux-linux-be850e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe850e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39755-vulnerability-in-linux-linux-be8504</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39735-vulnerability-in-linux-linux-bdd48c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39728-vulnerability-in-linux-linux-be84fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39688-vulnerability-in-linux-linux-bdd488</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38637-vulnerability-in-linux-linux-be84e7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38575-vulnerability-in-linux-linux-be84e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38479-vulnerability-in-linux-linux-be84df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38240-vulnerability-in-linux-linux-be84db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38152-vulnerability-in-linux-linux-be84ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe84ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38104-vulnerability-in-linux-linux-bdd484</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-38049-vulnerability-in-linux-linux-be84bb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-38049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37925-vulnerability-in-linux-linux-be84b3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37893-vulnerability-in-linux-linux-be84ab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37860-vulnerability-in-linux-linux-be84a3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe84a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-37785-vulnerability-in-linux-linux-be83fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-37785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe83fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3598-cwe-79-improper-neutralization-of-in-1942377e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elliotvs%20Coupon%20Affiliates%20%E2%80%93%20Affiliate%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39469-improper-neutralization-of-input-du-3ab2b606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39470-path-traversal-in-thimpress-ivy-sch-13acfd8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39470%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20ThimPress%20Ivy%20School&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39471-improper-neutralization-of-special--77b05dd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39471%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pantherius%20Modal%20Survey&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-42599-stack-based-buffer-overflow-in-qualitia-co-ltd-active-mail-6-bee3d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-42599%3A%20Stack-based%20buffer%20overflow%20in%20QUALITIA%20CO.%2C%20LTD.%20Active!%20mail%206&amp;severity=critical&amp;id=682d983bc4522896dcbee3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2613-cwe-79-improper-neutralization-of-in-7b7a5e99</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mehrazmorshed%20Login%20Manager%20%E2%80%93%20Design%20Login%20Page%2C%20View%20Login%20Activity%2C%20Limit%20Login%20Attempts&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13650-cwe-79-improper-neutralization-of-i-3e527532</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fe02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3520-cwe-22-improper-limitation-of-a-path-3a15541e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3520%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wonderboymusic%20Avatar&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54ef77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0467-cwe-cwe-823-use-of-out-of-range-pointer-offset-in-imagination-technologies-graphics-ddk-bf838e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0467%3A%20CWE%20-%20CWE-823%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Imagination%20Technologies%20Graphics%20DDK&amp;severity=high&amp;id=682d984bc4522896dcbf838e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25427-cwe-79-improper-neutralization-of-i-530811e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20TP-Link%20Systems%20Inc.%20TL-WR841N%20v14%2Fv14.6%2Fv14.8&amp;severity=high&amp;id=686427df6f40f0eb7290426b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28242-n-a-in-n-a-bf75e5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28242%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf75e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28197-n-a-in-n-a-bf75e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf75e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57493-n-a-in-n-a-bf75d4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57493%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf75d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28238-n-a-in-n-a-bf7594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28238%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28237-n-a-in-n-a-bf7590</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28237%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28236-n-a-in-n-a-bf753a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf753a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28235-n-a-in-n-a-bf7536</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28233-n-a-in-n-a-bf751c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf751c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28231-n-a-in-n-a-bf7482</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28231%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28059-n-a-in-n-a-bf747e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf747e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29209-n-a-in-n-a-bf734b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29209%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf734b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28232-n-a-in-n-a-bf72fd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28232%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf72fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28228-n-a-in-n-a-bf72f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28228%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf72f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28230-n-a-in-n-a-bf729e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28230%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf729e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28229-n-a-in-n-a-bf7230</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28229%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29643-n-a-in-n-a-bf7220</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29643%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-18-2a9f7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-18&amp;severity=medium&amp;id=682c7db3e8347ec82d2a9f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-18-f124db</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f124db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3509-cwe-94-improper-control-of-generatio-aec4cfb1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=68532cb833c7acc04607adfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keyplug-linked-server-exposes-fortinet-exploits-webshell-activity-targeting-a-major-japanese-company-16a159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KeyPlug-Linked%20Server%20Exposes%20Fortinet%20Exploits%20%26%20Webshell%20Activity%20Targeting%20a%20Major%20Japanese%20Company&amp;severity=medium&amp;id=682c992c7960f6956616a159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47671-vulnerability-in-linux-linux-be96e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9834c4522896dcbe96e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47670-vulnerability-in-linux-linux-be96dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47669-vulnerability-in-linux-linux-be96c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47668-vulnerability-in-linux-linux-be96bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36789-vulnerability-in-linux-linux-bea62c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2947-cwe-278-insecure-preserved-inherited-permissions-in-ibm-i-bf778a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2947%3A%20CWE-278%20Insecure%20Preserved%20Inherited%20Permissions&amp;severity=high&amp;id=682d984ac4522896dcbf778a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-hwp-document-disguised-as-reunification-education-support-application-16a16e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20HWP%20Document%20Disguised%20as%20Reunification%20Education%20Support%20Application&amp;severity=medium&amp;id=682c992c7960f6956616a16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/downloader-malware-written-in-jphp-interpreter-16a179</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Downloader%20Malware%20Written%20in%20JPHP%20Interpreter&amp;severity=medium&amp;id=682c992c7960f6956616a179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-43012-cwe-77-in-jetbrains-toolbox-app-7a7c9baa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-43012%3A%20CWE-77%20in%20JetBrains%20Toolbox%20App&amp;severity=high&amp;id=69a0a1c885912abc71d0baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23443-improper-neutralization-of-input-du-43359e56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Claire%20Ryan%20Author%20Showcase&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23448-improper-neutralization-of-input-du-2e1141a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dastan800%20visualslider%20Sldier&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23773-missing-authorization-in-mingocomme-2ed1aa57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23773%3A%20Missing%20Authorization%20in%20mingocommerce%20Delete%20All%20Posts&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23782-improper-neutralization-of-input-du-a42211e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23782%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TotalSuite%20TotalContest%20Lite&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee867c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23855-improper-neutralization-of-input-du-4aae0233</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fyljp%20SpiderDisplay&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23858-improper-neutralization-of-input-du-28fd28e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hiren%20Patel%20Custom%20Users%20Order&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23958-missing-authorization-in-fadi-med-e-98fcc467</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23958%3A%20Missing%20Authorization%20in%20FADI%20MED%20Editor%20Wysiwyg%20Background%20Color&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24539-improper-neutralization-of-input-du-29ae33d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee919d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24548-improper-neutralization-of-input-du-c470713c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Autoglot%20Autoglot%20%E2%80%93%20Automatic%20WordPress%20Translation&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24550-improper-neutralization-of-input-du-25a53873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JobScore%20Job%20Manager&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24553-improper-neutralization-of-input-du-038dfce3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Akadrama%20Shipping%20with%20Venipak%20for%20WooCommerce&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24577-missing-authorization-in-ays-pro-po-e5770879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24577%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24581-missing-authorization-in-themefic-i-a116d026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24581%3A%20Missing%20Authorization%20in%20Themefic%20Instantio&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24583-missing-authorization-in-aa-web-ser-c1ca5803</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24583%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24586-improper-neutralization-of-input-du-c17016a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitsstech%20Shipment%20Tracker%20for%20Woocommerce&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24619-improper-neutralization-of-input-du-2ff68e94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24619%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webheadcoder%20WP%20Log%20Action&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24621-improper-neutralization-of-input-du-82877d13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24624-improper-neutralization-of-input-du-5a81b8e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20HT%20Event&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24637-improper-neutralization-of-input-du-9cb3840d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Beacon%20Lead%20Magnets%20and%20Lead%20Capture&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24640-improper-neutralization-of-input-du-9293cfd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dan-Lucian%20Stefancu%20Empty%20Tags%20Remover&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24645-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-rob-scott-eazy-under-construction-aecafc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rob%20Scott%20Eazy%20Under%20Construction&amp;severity=null&amp;id=682cd0fc1484d88663aecafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24651-insertion-of-sensitive-information--cd57af33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24651%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20WebToffee%20WordPress%20Backup%20%26%20Migration&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24655-improper-neutralization-of-input-du-87dcd9d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24655%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24670-improper-neutralization-of-input-du-5cf96181</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dhanendran%20Rajagopal%20Term%20Taxonomy%20Converter&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24737-missing-authorization-in-mat-bao-co-9595143b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24737%3A%20Missing%20Authorization%20in%20Mat%20Bao%20Corporation%20WP%20Helper%20Premium&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24745-improper-neutralization-of-input-du-f52add9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24752-improper-neutralization-of-input-du-a4be1934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27282-unrestricted-upload-of-file-with-da-1357f86f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27282%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rockgod100%20Theme%20File%20Duplicator&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27283-improper-limitation-of-a-pathname-t-45aba022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27283%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rockgod100%20Theme%20File%20Duplicator&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27284-improper-neutralization-of-input-du-e0dc5c1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27284%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20divspark%20Flagged%20Content&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27285-improper-neutralization-of-input-du-25085311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Easy%20Form&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27286-deserialization-of-untrusted-data-i-158332a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27286%3A%20Deserialization%20of%20Untrusted%20Data%20in%20saoshyant1994%20Saoshyant%20Slider&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27287-deserialization-of-untrusted-data-i-0228ff43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27287%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ssvadim%20SS%20Quiz&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27288-improper-neutralization-of-input-du-daf4e5ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BjornW%20File%20Icons&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27289-improper-neutralization-of-input-du-3adb08be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Antoine%20Guillien%20Restrict%20Taxonomies&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27291-improper-neutralization-of-input-du-c2e10186</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27291%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uxgallery%20WordPress%20Photo%20Gallery%20%E2%80%93%20Image%20Gallery&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27292-improper-neutralization-of-input-du-eb3922be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PoppinsDigital.com%20WPYog%20Documents&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27293-improper-neutralization-of-input-du-d660f7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27293%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webparexapp%20Shipmozo%20Courier%20Tracking&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27295-improper-neutralization-of-input-du-6eff949a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpion%20Live%20css&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deecea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27299-improper-limitation-of-a-pathname-t-8449c14c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27299%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WP%20Asia%20MyTicket%20Events&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27302-improper-neutralization-of-special--8daec795</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27302%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Claudio%20Adrian%20Marrero%20CHATLIVE&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27308-improper-neutralization-of-input-du-efb2c092</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmstactics%20WP%20Video%20Posts&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27309-improper-neutralization-of-input-du-9476737f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeannot%20Muller%20flickr-slideshow-wrapper&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27310-missing-authorization-in-radius-of--031d1dba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27310%3A%20Missing%20Authorization%20in%20Radius%20of%20Thought%20Page%20and%20Post%20Lister&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27313-improper-neutralization-of-input-du-bd14b7d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bernd%20Altmeier%20Google%20Maps%20GPX%20Viewer&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27314-improper-neutralization-of-input-du-ca80a92c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kush%20Sharma%20Kush%20Micro%20News&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27319-improper-neutralization-of-input-du-46067187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivan82%20User%20List&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27322-improper-neutralization-of-input-du-e5a4ce59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bappa%20Mal%20QR%20Code%20for%20WooCommerce&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27324-improper-neutralization-of-input-du-aab7e720</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2017track%2017TRACK%20for%20WooCommerce&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27333-improper-neutralization-of-input-du-f78e41d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alvego%20Protected%20wp-login&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27337-improper-neutralization-of-input-du-589931b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kontur%20Fontsampler&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27338-improper-neutralization-of-input-du-92c94949</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27338%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20graphems%20List%20Urls&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27343-improper-neutralization-of-input-du-b81d1365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webilop%20WooCommerce%20HTML5%20Video&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27345-improper-neutralization-of-input-du-8edf3841</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Deetronix%20Booking%20Ultra%20Pro&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27346-improper-neutralization-of-input-du-1b2c6b73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gerrygooner%20Rebuild%20Permalinks&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27354-improper-neutralization-of-input-du-3ea20c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phil88530%20Simple%20Email%20Subscriber&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31006-improper-neutralization-of-input-du-9fcac60c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31006%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arete-it%20Activity%20Reactions%20For%20Buddypress&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31018-improper-neutralization-of-input-du-9b0b0058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FireDrum%20FireDrum%20Email%20Marketing&amp;severity=null&amp;id=69cd733be6bfc5ba1def0ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31030-improper-control-of-filename-for-in-b02b000a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31030%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jiro%20Sasamoto%20Ray%20Enterprise%20Translation&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31380-weak-password-recovery-mechanism-fo-44f6d9f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31380%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32490-improper-neutralization-of-input-du-97db92e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebsiteDefender%20wp%20secure&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32504-improper-neutralization-of-input-du-9edb6c5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32504%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silvasoft%20Silvasoft%20boekhouden&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32506-improper-neutralization-of-input-du-8c163142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32506%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BenDlz%20AT%20Internet%20SmartTag&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32507-improper-neutralization-of-input-du-66de7037</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32507%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aakif%20Kadiwala%20Event%20Espresso%20%E2%80%93%20Custom%20Email%20Template%20Shortcode&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32508-improper-neutralization-of-input-du-ec3be354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32508%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ComMotion%20Course%20Booking%20System&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32511-improper-neutralization-of-input-du-3e12532a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32511%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Excellent%20Dynamics%20Make%20Email%20Customizer%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32512-improper-neutralization-of-input-du-c674c915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32512%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revampcrm%20Revamp%20CRM%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32513-improper-neutralization-of-input-du-01b69467</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalprocessing%20Nomupay%20Payment%20Processing%20Gateway&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32514-improper-neutralization-of-input-du-dbd6f367</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cscode%20WooCommerce%20Estimate%20and%20Quote&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32515-improper-neutralization-of-input-du-306405f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20terminalafrica%20Terminal%20Africa&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32516-improper-neutralization-of-input-du-48b92647</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ilGhera%20Related%20Videos%20for%20JW%20Player&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32520-improper-neutralization-of-input-du-4c611a32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M.%20Ali%20Saleem%20WordPress%20Health%20and%20Server%20Condition%20%E2%80%93%20Integrated%20with%20Google%20Page%20Speed&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32521-improper-neutralization-of-input-du-76faee6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolHappy%20Cool%20Flipbox%20%E2%80%93%20Shortcode%20%26%20Gutenberg%20Block&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32522-improper-neutralization-of-input-du-4e980224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20License%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32526-improper-neutralization-of-input-du-98659764</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dylan%20James%20Zephyr%20Project%20Manager&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32527-improper-neutralization-of-input-du-bad781df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pey22%20T%26P%20Gallery%20Slider&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32528-improper-neutralization-of-input-du-0905691d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maximevalette%20iCal%20Feeds&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32529-improper-neutralization-of-input-du-f75adc2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iONE360%20iONE360%20configurator&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32530-improper-neutralization-of-input-du-f256fa13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32530%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Swings%20Wallet%20System%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32531-improper-neutralization-of-input-du-a1b0432e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32531%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20FAQ&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32532-improper-neutralization-of-input-du-5b398c36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pei%20Yong%20Goh%20UXsniff&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32533-improper-neutralization-of-input-du-bddab9ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matat%20Technologies%20Deliver%20via%20Shipos%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32535-improper-neutralization-of-input-du-307038af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digireturn%20DN%20Shipping%20by%20Weight%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32540-improper-neutralization-of-input-du-62587d23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20feedify%20Feedify%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32544-missing-authorization-in-the-right--01022e79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32544%3A%20Missing%20Authorization%20in%20The%20Right%20Software%20WooCommerce%20Loyal%20Customers&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32545-cross-site-request-forgery-csrf-in--08b9d8ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32545%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SOFTAGON%20WooCommerce%20Products%20without%20featured%20images&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32546-cross-site-request-forgery-csrf-in--c7d7c33e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32552-improper-neutralization-of-input-du-c3f8d93d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20MSRP%20(RRP)%20Pricing%20for%20WooCommerce&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32554-improper-neutralization-of-input-du-9196e232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Raptive%20Raptive%20Ads&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32557-improper-neutralization-of-input-du-289b9f7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rico%20Macchi%20WP%20Featured%20Screenshot&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32560-improper-neutralization-of-input-du-3b17990a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohammad%20I.%20Okfie%20WP-Hijri&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32561-improper-neutralization-of-input-du-22e59b31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins.club%20WP_DEBUG%20Toggle&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32562-improper-neutralization-of-input-du-e5ef73cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20WP%20Easy%20Poll&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32566-improper-neutralization-of-input-du-6fa23f7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashraful%20Sarkar%20Naiem%20License%20For%20Envato&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32571-deserialization-of-untrusted-data-i-72f9c8a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32571%3A%20Deserialization%20of%20Untrusted%20Data%20in%20TuriTop%20TuriTop%20Booking%20System&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32572-deserialization-of-untrusted-data-i-5670b7c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32572%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Climax%20Themes%20Kata%20Plus&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32578-improper-neutralization-of-input-du-acbdda83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mapro%20Collins%20Coming%20Soon%20Countdown&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32582-improper-neutralization-of-input-du-30ffc50f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32583-improper-control-of-generation-of-c-e2712dff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32583%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20termel%20PDF%202%20Post&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32588-improper-neutralization-of-input-du-e48d689d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Credova%20Financial%20Credova_Financial&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32590-improper-neutralization-of-input-du-4cee4fcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tzin111%20Web2application&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32592-improper-neutralization-of-input-du-6b898e07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20TableOn&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32593-missing-authorization-in-bytes-tech-02bc28d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32593%3A%20Missing%20Authorization%20in%20Bytes%20Technolab%20Add%20Product%20Frontend%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32594-insertion-of-sensitive-information--78db6f71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32594%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WPMinds%20Simple%20WP%20Events&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32596-improper-control-of-generation-of-c-bc27b524</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32596%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32602-improper-neutralization-of-input-du-6812fe28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcraft%20WooMS&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32604-improper-neutralization-of-input-du-433f1148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sajjad%20Aslani%20AWSA%20Shipping&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32605-improper-neutralization-of-input-du-9fc6e531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20expresstechsoftware%20MemberPress%20Discord%20Addon&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32606-cross-site-request-forgery-csrf-in--39dca69a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32606%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Deepak%20Khokhar%20Listings%20for%20Buildium&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32608-improper-neutralization-of-input-du-0b14c001</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Movylo%20Movylo%20Marketing%20Automation&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32609-improper-neutralization-of-input-du-6809bdb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Picture-Planet%20GmbH%20Verowa%20Connect&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32611-improper-neutralization-of-input-du-a0d4499a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20We%20Are%20De%20WooCommerce%20TBC%20Credit%20Card%20Payment%20Gateway%20(Free)&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32613-improper-neutralization-of-input-du-6b4a1f38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32613%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bowo%20Debug%20Log%20Manager&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32615-improper-neutralization-of-input-du-6c3d24f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Clinked%20Clinked%20Client%20Portal&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32620-missing-authorization-in-fromdopple-c75982d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32620%3A%20Missing%20Authorization%20in%20fromdoppler%20Doppler%20Forms&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32622-improper-neutralization-of-input-du-b544937c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTP-less%20OTP-less%20one%20tap%20Sign%20in&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32625-improper-neutralization-of-input-du-60497038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pootlepress%20Mobile%20Pages&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32626-improper-neutralization-of-special--977b20fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32626%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32628-improper-neutralization-of-input-du-fc6b0d42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20Crowdfunding%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32630-improper-neutralization-of-input-du-df116d6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def4002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32634-improper-neutralization-of-input-du-c705f43d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdedev%20Run%20Contests%2C%20Raffles%2C%20and%20Giveaways%20with%20ContestsWP&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def402a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32636-improper-neutralization-of-special--1fb026bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32636%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20matthewrubin%20Local%20Magic&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def402d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32637-improper-neutralization-of-input-du-14c3c4fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ketanajani%20WP%20Donate&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32638-improper-neutralization-of-input-du-19a42eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weptile%20Mobile%20App%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32639-improper-neutralization-of-input-du-63eb55eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32639%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wecantrack%20Affiliate%20Links%20Lite&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32646-improper-neutralization-of-input-du-18b7bc44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Question%20Answer&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32647-deserialization-of-untrusted-data-i-f721c407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32647%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Question%20Answer&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32649-improper-neutralization-of-input-du-74c74295</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32649%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gb-plugins%20GB%20Gallery%20Slideshow&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32651-improper-neutralization-of-input-du-0ece3b4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20serpednet%20SERPed.net&amp;severity=null&amp;id=69cd73eae6bfc5ba1def407c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32652-unrestricted-upload-of-file-with-da-c737ffdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32652%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20solacewp%20Solace%20Extra&amp;severity=null&amp;id=69cd73eae6bfc5ba1def407f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32653-improper-neutralization-of-input-du-b876a586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lee%20Blue%20Cart66%20Cloud&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32655-cross-site-request-forgery-csrf-in--c5c29415</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32655%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DevriX%20Restrict%20User%20Registration&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32658-deserialization-of-untrusted-data-i-697bb58f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32658%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpWax%20HelpGent&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32660-unrestricted-upload-of-file-with-da-2ba09f08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32660%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32662-deserialization-of-untrusted-data-i-9940ce6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32662%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32665-improper-neutralization-of-special--17b6c388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32665%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WebbyTemplate%20Office%20Locator&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32670-improper-neutralization-of-input-du-ec9667a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20Parnell%20Spark%20GF%20Failed%20Submissions&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32674-improper-neutralization-of-input-du-cc193e83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Product%20Excel%20Import%20Export%20%26%20Bulk%20Edit%20for%20WooCommerce&amp;severity=null&amp;id=69cd73ede6bfc5ba1def417f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32682-unrestricted-upload-of-file-with-da-b52f99ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32682%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=69cd73efe6bfc5ba1def423e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32686-deserialization-of-untrusted-data-i-e3d797a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32686%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WPSpeedo%20Team%20Members&amp;severity=null&amp;id=69cd73efe6bfc5ba1def424a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39519-improper-neutralization-of-input-du-7d5a2939</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20runthings.dev%20Bulk%20Page%20Stub%20Creator&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39521-improper-neutralization-of-input-du-ad1f564e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20Contact%20Form%20vCard%20Generator&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39526-improper-control-of-filename-for-in-ed8f2d06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39526%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Hotel%20Booking&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39527-deserialization-of-untrusted-data-i-c0172d72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39527%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bestweblayout%20Rating%20by%20BestWebSoft&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39532-missing-authorization-in-spicetheme-755cf2ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39532%3A%20Missing%20Authorization%20in%20spicethemes%20Spice%20Blocks&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39533-missing-authorization-in-starfish-r-09e15d2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39533%3A%20Missing%20Authorization%20in%20Starfish%20Reviews%20Starfish%20Review%20Generation%20%26%20Marketing&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39535-authentication-bypass-using-an-alte-fe33c135</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39535%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20appsbd%20Vitepos&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39542-incorrect-privilege-assignment-in-j-44c92d31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39542%3A%20Incorrect%20Privilege%20Assignment%20in%20Jauhari%20Xelion%20Xelion%20Webchat&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39550-deserialization-of-untrusted-data-i-fe768c83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39550%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Shahjahan%20Jewel%20FluentCommunity&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0123c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39551-deserialization-of-untrusted-data-i-426ca232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39551%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mahmudul%20Hasan%20Arif%20FluentBoards&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39554-missing-authorization-in-elliot-sow-2427fcf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39554%3A%20Missing%20Authorization%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20AI%20Text%20to%20Speech&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39559-missing-authorization-in-eivin-land-59a3c969</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39559%3A%20Missing%20Authorization%20in%20Eivin%20Landa%20Bring%20Fraktguiden%20for%20WooCommerce&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0124b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39562-improper-neutralization-of-input-du-ed6cc2ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Payment%20Form%20for%20PayPal%20Pro&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39567-improper-neutralization-of-input-du-3ed1b7b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39568-improper-limitation-of-a-pathname-t-9ca2e7b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39568%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arture%20B.V.%20StoreContrl%20Woocommerce&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39580-missing-authorization-in-jidaikobo--ef92b4b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39580%3A%20Missing%20Authorization%20in%20jidaikobo%20Dashi&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39583-missing-authorization-in-bertha-ai--b68946b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39583%3A%20Missing%20Authorization%20in%20Bertha%20AI%20%26%238211%3B%20Andrew%20Palmer%20BERTHA%20AI&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39586-improper-neutralization-of-special--1372fdd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39586%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39587-improper-neutralization-of-special--0866f0a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39587%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df01405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39588-deserialization-of-untrusted-data-i-f1221583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39588%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39594-improper-neutralization-of-input-du-9f025cc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Arigato%20Autoresponder%20and%20Newsletter&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39595-improper-neutralization-of-special--4878025a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39595%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Quentn.com%20GmbH%20Quentn%20WP&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39596-weak-authentication-in-quentncom-gm-854c1c2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39596%3A%20Weak%20Authentication%20in%20Quentn.com%20GmbH%20Quentn%20WP&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22340-improper-neutralization-of-input-du-39df5aa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22340%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Data%20Dash&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22565-improper-neutralization-of-input-du-8d7610dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bill%20Zimmerman%20vooPlayer%20v4&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0894b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22636-improper-neutralization-of-input-du-0851c140</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vicente%20Ruiz%20G%C3%A1lvez%20VR-Frases&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22651-improper-neutralization-of-input-du-2a6714ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wppluginboxdev%20Stylish%20Google%20Sheet%20Reader&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22655-improper-neutralization-of-special--e83db0d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22655%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Caio%20Web%20Dev%20CWD%20%E2%80%93%20Stealth%20Links&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22692-improper-neutralization-of-input-du-50da594d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rachanaS%20Sponsered%20Link&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22771-improper-neutralization-of-input-du-f0a51985</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Studio%20Hyperset%20The%20Great%20Firewords%20of%20China&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22774-improper-neutralization-of-input-du-8ecae08e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRUDLab%20CRUDLab%20Scroll%20to%20Top&amp;severity=null&amp;id=69cd760be6bfc5ba1df091cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22796-improper-neutralization-of-input-du-1d5aa0f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20platcom%20WP-Asambleas&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0939b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39414-cross-site-request-forgery-csrf-in--5e77e028</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39414%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mike%20spam-stopper&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39415-cross-site-request-forgery-csrf-in--d2bb0fa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39415%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jayesh%20Parejiya%20Social%20Media%20Links&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39416-cross-site-request-forgery-csrf-in--f6b57d74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39416%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ichi%20translit%20it!&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39417-cross-site-request-forgery-csrf-in--fbae37e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39417%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eslam%20Mahmoud%20Redirect%20wordpress%20to%20welcome%20or%20landing%20page&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39418-cross-site-request-forgery-csrf-in--d407f602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39418%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ajayver%20RSS%20Manager&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39419-cross-site-request-forgery-csrf-in--8405c75f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39419%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Miller%20Revision%20Diet&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def434c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39420-improper-neutralization-of-input-du-963a9b47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39420%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ruudkok%20WP%20Twitter%20Button&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def434f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39421-cross-site-request-forgery-csrf-in--845ea827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mustafa%20KUCUK%20WP%20Sticky%20Side%20Buttons&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39422-cross-site-request-forgery-csrf-in--4d0fed3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39422%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PResponsive%20WP%20Social%20Bookmarking&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39423-cross-site-request-forgery-csrf-in--64b11fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39423%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jenst%20Add%20to%20Header&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39424-cross-site-request-forgery-csrf-in--ef49f2ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39424%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20simplemaps%20Simple%20Maps&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def435b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39425-cross-site-request-forgery-csrf-in--9033fdc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39425%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixelgrade%20Style%20Manager&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def435e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39426-cross-site-request-forgery-csrf-in--0d2b7eb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20illow%20illow%20%E2%80%93%20Cookies%20Consent&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39427-improper-neutralization-of-input-du-9d82fa56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beth%20Tucker%20Long%20WP%20Post%20to%20PDF%20Enhanced&amp;severity=null&amp;id=69cd73f4e6bfc5ba1def4364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39428-improper-neutralization-of-input-du-78f6a019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maros%20Pristas%20Gravity%20Forms%20CSS%20Themes%20with%20Fontawesome%20and%20Placeholders&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39429-improper-control-of-filename-for-in-00ca6025</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39429%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20F%C3%B6ldesi%2C%20Mih%C3%A1ly%20Sz%C3%A9chenyi%202020%20Logo&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39430-cross-site-request-forgery-csrf-in--02d867eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39430%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alexander%20Rauscha%20mLanguage&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39431-cross-site-request-forgery-csrf-in--d24f5a38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39431%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aaron%20Forgue%20Amazon%20Showcase%20WordPress%20Plugin&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39432-improper-neutralization-of-input-du-03f72f4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antonchanning%20bbPress2%20shortcode%20whitelist&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39433-cross-site-request-forgery-csrf-in--a53f2b91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39433%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20beke_ro%20Bknewsticker&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39434-authorization-bypass-through-user-c-40cdbfae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39434%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Scott%20Taylor%20Avatar&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39435-cross-site-request-forgery-csrf-in--5d131c07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20davidfcarr%20My%20Marginalia&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39436-unrestricted-upload-of-file-with-da-5021b3c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39436%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aidraw%20I%20Draw&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39437-cross-site-request-forgery-csrf-in--f64df32d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39437%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Boone%20Gorges%20Anthologize&amp;severity=null&amp;id=69cd73f6e6bfc5ba1def43c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39438-cross-site-request-forgery-csrf-in--7d7b4914</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39438%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20momen2009%20Theme%20Changer&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39439-exposure-of-sensitive-system-inform-d739e4c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39439%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Markus%20Drubba%20wpLike2Get&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39440-cross-site-request-forgery-csrf-in--8923e5c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rajesh%20Broken%20Links%20Remover&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39441-cross-site-request-forgery-csrf-in--f1bae355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39441%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swedish%20boy%20Dashboard%20Notepads&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39442-cross-site-request-forgery-csrf-in--df9fe836</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39442%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MessageMetric%20Review%20Wave%20%E2%80%93%20Google%20Places%20Reviews&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def43fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39444-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-maxfoundry-maxbuttons-aecb4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39444%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxfoundry%20MaxButtons&amp;severity=null&amp;id=682cd0fc1484d88663aecb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39443-cross-site-request-forgery-csrf-in--30df225e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39452-improper-control-of-filename-for-in-047695d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39452%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20WPCafe&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39453-cross-site-request-forgery-csrf-in--eed89bf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39453%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20algol.plus%20Advanced%20Dynamic%20Pricing%20for%20WooCommerce&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39455-cross-site-request-forgery-csrf-in--626b8417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39455%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IP2Location%20IP2Location%20Variables&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def4409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39456-missing-authorization-in-itron-wp-l-82040be7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39456%3A%20Missing%20Authorization%20in%20iTRON%20WP%20Logger&amp;severity=null&amp;id=69cd73f7e6bfc5ba1def440c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39457-missing-authorization-in-magepeople-5ae79fe6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39457%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39461-improper-control-of-filename-for-in-215ce0c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39461%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nawawi%20Jamili%20Docket%20Cache&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39462-improper-control-of-filename-for-in-df4ec927</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39462%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20teamzt%20Smart%20Agreements&amp;severity=null&amp;id=69cd73fae6bfc5ba1def444d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39464-improper-neutralization-of-input-du-5c7724fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtowebsites%20AdminQuickbar&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/around-the-world-in-90-days-state-sponsored-actors-try-clickfix-16a0a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Around%20the%20World%20in%2090%20Days%3A%20State-Sponsored%20Actors%20Try%20ClickFix&amp;severity=medium&amp;id=682c992c7960f6956616a0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unmasking-the-new-xorddos-controller-and-infrastructure-16a186</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Unmasking%20the%20new%20XorDDoS%20controller%20and%20infrastructure&amp;severity=medium&amp;id=682c992c7960f6956616a186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3760-cwe-79-improper-neutralization-of-in-27d1b2a3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=68b9b0b1a333cd2f6cabe191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26477-cwe-20-improper-input-validation-in-dell-ecs-bf7786</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26477%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20ECS&amp;severity=medium&amp;id=682d984ac4522896dcbf7786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3479-cwe-354-improper-validation-of-integ-78e953df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3479%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3487-cwe-79-improper-neutralization-of-in-657edfce</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3487%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3453-cwe-863-incorrect-authorization-in-s-524e5d85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3453%3A%20CWE-863%20Incorrect%20Authorization%20in%20saadiqbal%20Password%20Protected%20%E2%80%93%20Password%20Protect%20your%20WordPress%20Site%2C%20Pages%2C%20%26%20WooCommerce%20Products%20%E2%80%93%20Restrict%20Content%2C%20Protect%20WooCommerce%20Category%20and%20more&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3615-cwe-79-improper-neutralization-of-in-af0f01bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3294-cwe-22-improper-limitation-of-a-path-0ee34974</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3294%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20benjaminprojas%20WP%20Editor&amp;severity=high&amp;id=699f6b29b7ef31ef0b54ed9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3295-cwe-22-improper-limitation-of-a-path-581743e1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3295%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20benjaminprojas%20WP%20Editor&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1290-use-after-free-uaf-in-google-chromeos-bd8049</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1290%3A%20Use-After-Free%20(UAF)%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32415-cwe-1284-improper-validation-of-spe-4aab186d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32415%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20xmlsoft%20libxml2&amp;severity=low&amp;id=690909fb7fff0e30cee434c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29456-n-a-in-n-a-bf7afa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29456%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29455-n-a-in-n-a-bf7af2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29455%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29453-n-a-in-n-a-bf7aea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29453%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29454-n-a-in-n-a-bf7ace</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29454%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29450-n-a-in-n-a-bf79a9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29450%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29449-n-a-in-n-a-bf79a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29449%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56518-n-a-in-n-a-bf7471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56518%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53924-n-a-in-n-a-bf746d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53924%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf746d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29460-n-a-in-n-a-bf5cb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29460%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29459-n-a-in-n-a-bf5caf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29459%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29458-n-a-in-n-a-bf5c9e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29458%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29457-n-a-in-n-a-bf5c96</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29457%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26269-cwe-191-integer-underflow-wrap-or-wraparound-in-dragonflydb-dragonfly-bf54e7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26269%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20DragonflyDB%20Dragonfly&amp;severity=medium&amp;id=682d9847c4522896dcbf54e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29041-n-a-in-n-a-bec7f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29041%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29040-n-a-in-n-a-bec7f1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29316-n-a-in-n-a-bdb08d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29316%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-17-2a5ace</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-17&amp;severity=medium&amp;id=682c7db3e8347ec82d2a5ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-17-f12fc1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1568-code-execution-in-google-chromeos-aeb071</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1568%3A%20Code%20execution%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682cd0f71484d88663aeb071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2073-out-of-bounds-read-in-google-chromeos-bd8081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2073%3A%20Out-of-Bounds%20Read%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1704-use-after-free-uaf-in-google-chromeos-bd8079</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1704%3A%20Use-After-Free%20(UAF)%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=682d9818c4522896dcbd8079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1566-network-security-isolation-nsi-in-google-chromeos-bd8051</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1566%3A%20Network%20Security%20Isolation%20(NSI)%20in%20Google%20ChromeOS&amp;severity=high&amp;id=682d9818c4522896dcbd8051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24054-ntlm-exploit-in-the-wild-16a2ab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24054%2C%20NTLM%20Exploit%20in%20the%20Wild&amp;severity=medium&amp;id=682c992c7960f6956616a2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32433-cwe-306-missing-authentication-for-critical-function-in-erlang-otp-befaef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32433%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20erlang%20otp&amp;severity=critical&amp;id=682d983ec4522896dcbefaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3730-denial-of-service-in-pytorch-2700bb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3730%3A%20Denial%20of%20Service%20in%20PyTorch&amp;severity=medium&amp;id=682f9c790acd01a2492700bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/latest-mustang-panda-arsenal-toneshell-starproxy-paklog-corklog-and-splatcloak-16a38c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Latest%20Mustang%20Panda%20Arsenal%3A%20Toneshell%2C%20StarProxy%2C%20PAKLOG%2C%20CorKLOG%2C%20and%20SplatCloak&amp;severity=medium&amp;id=682c992c7960f6956616a38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31200-processing-an-audio-stream-in-a-mal-3a401fdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31200%3A%20Processing%20an%20audio%20stream%20in%20a%20maliciously%20crafted%20media%20file%20may%20result%20in%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20released%20before%20iOS%2018.4.1.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=683e0257182aa0cae25374e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31201-an-attacker-with-arbitrary-read-and-32232a7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31201%3A%20An%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20iOS.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68430d3871f4d251b5cfea8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2291-use-of-a-key-past-its-expiration-dat-8641dbb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2291%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20PgBouncer&amp;severity=high&amp;id=690906907fff0e30cedefbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39472-cwe-352-cross-site-request-forgery--08d0f8e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39472%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpweb%20WooCommerce%20Social%20Login&amp;severity=null&amp;id=6846dc927b622a9fdf23bfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22872-cwe-79-in-golang-org-x-net-golang-org-x-net-html-aeba5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22872%3A%20CWE-79%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhtml&amp;severity=medium&amp;id=682cd0f91484d88663aeba5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20236-inclusion-of-functionality-from-unt-c502cf36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20236%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Cisco%20Cisco%20Webex%20Teams&amp;severity=high&amp;id=69a0a1b985912abc71d0a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20178-improper-verification-of-cryptograp-95e5963e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20178%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20Secure%20Network%20Analytics&amp;severity=medium&amp;id=69a0a1b985912abc71d0a0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/inside-bruted-black-basta-raas-used-automated-brute-forcing-framework-to-target-edge-network-devices-16a3c4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Inside%20BRUTED%3A%20Black%20Basta%20(RaaS)%20Used%20Automated%20Brute%20Forcing%20Framework%20to%20Target%20Edge%20Network%20Devices&amp;severity=medium&amp;id=682c992c7960f6956616a3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brickstorm-backdoor-analysis-a-persistent-espionage-threat-to-european-industries-16a5ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BRICKSTORM%20Backdoor%20Analysis%3A%20A%20Persistent%20Espionage%20Threat%20to%20European%20Industries&amp;severity=medium&amp;id=682c992c7960f6956616a5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23138-vulnerability-in-linux-linux-bdd449</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23137-vulnerability-in-linux-linux-be8220</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23136-vulnerability-in-linux-linux-be821c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe821c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23135-vulnerability-in-linux-linux-be8209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23134-vulnerability-in-linux-linux-be8201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23133-vulnerability-in-linux-linux-bdd43c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23132-vulnerability-in-linux-linux-be81f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe81f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23131-vulnerability-in-linux-linux-be81f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23130-vulnerability-in-linux-linux-be81e4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23129-vulnerability-in-linux-linux-bdd438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22128-vulnerability-in-linux-linux-be81dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe81dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22127-vulnerability-in-linux-linux-be81d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22126-vulnerability-in-linux-linux-be81cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22125-vulnerability-in-linux-linux-be81c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe81c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22124-vulnerability-in-linux-linux-bdd434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22123-vulnerability-in-linux-linux-be81c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22122-vulnerability-in-linux-linux-be81b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22121-vulnerability-in-linux-linux-be81ac</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22120-vulnerability-in-linux-linux-be81a8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22119-vulnerability-in-linux-linux-bdd425</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22118-vulnerability-in-linux-linux-be81a4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe81a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22117-vulnerability-in-linux-linux-be819e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe819e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22116-vulnerability-in-linux-linux-be819a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe819a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22115-vulnerability-in-linux-linux-bdd41d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22114-vulnerability-in-linux-linux-be8196</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22113-vulnerability-in-linux-linux-be8192</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22112-vulnerability-in-linux-linux-bdd415</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22111-vulnerability-in-linux-linux-be8183</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22110-vulnerability-in-linux-linux-be817b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe817b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22109-vulnerability-in-linux-linux-be8166</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22108-vulnerability-in-linux-linux-be8155</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22107-vulnerability-in-linux-linux-be814d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe814d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22106-vulnerability-in-linux-linux-be8145</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22105-vulnerability-in-linux-linux-be813d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22104-vulnerability-in-linux-linux-be8137</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22103-vulnerability-in-linux-linux-be8133</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22102-vulnerability-in-linux-linux-be8124</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22101-vulnerability-in-linux-linux-be8113</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22100-vulnerability-in-linux-linux-be810b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22099-vulnerability-in-linux-linux-be80f0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22098-vulnerability-in-linux-linux-be80e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22097-vulnerability-in-linux-linux-be80e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22096-vulnerability-in-linux-linux-be80dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22095-vulnerability-in-linux-linux-be80cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe80cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22094-vulnerability-in-linux-linux-be80c9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22093-vulnerability-in-linux-linux-be80c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22092-vulnerability-in-linux-linux-be80b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe80b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22091-vulnerability-in-linux-linux-be80b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe80b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22090-vulnerability-in-linux-linux-be80b0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe80b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22089-vulnerability-in-linux-linux-be8097</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22088-vulnerability-in-linux-linux-be808f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe808f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22087-vulnerability-in-linux-linux-be8089</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22086-vulnerability-in-linux-linux-be807a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe807a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22085-vulnerability-in-linux-linux-be8072</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22084-vulnerability-in-linux-linux-be806a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe806a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22083-vulnerability-in-linux-linux-be8062</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22082-vulnerability-in-linux-linux-be805a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe805a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22081-vulnerability-in-linux-linux-be8049</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22080-vulnerability-in-linux-linux-be8045</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22079-vulnerability-in-linux-linux-be8021</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22078-vulnerability-in-linux-linux-be8019</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe8019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22077-vulnerability-in-linux-linux-be8011</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22076-vulnerability-in-linux-linux-be8007</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe8007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22075-vulnerability-in-linux-linux-be7ff4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22074-vulnerability-in-linux-linux-be7fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22073-vulnerability-in-linux-linux-be7fea</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22072-vulnerability-in-linux-linux-be7fe6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22071-vulnerability-in-linux-linux-be7fe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22070-vulnerability-in-linux-linux-be7fde</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22069-vulnerability-in-linux-linux-be7fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22068-vulnerability-in-linux-linux-be7fbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22067-vulnerability-in-linux-linux-be7fb8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22066-vulnerability-in-linux-linux-be7fb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22065-vulnerability-in-linux-linux-be7fb0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22064-vulnerability-in-linux-linux-bdd3fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22063-vulnerability-in-linux-linux-be7fac</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22062-vulnerability-in-linux-linux-be7fa8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22061-vulnerability-in-linux-linux-be7fa4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22060-vulnerability-in-linux-linux-be7fa0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22059-vulnerability-in-linux-linux-be7f8f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22058-vulnerability-in-linux-linux-be7f67</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22057-vulnerability-in-linux-linux-be7f63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22056-vulnerability-in-linux-linux-be7f5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22055-vulnerability-in-linux-linux-be7f5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22054-vulnerability-in-linux-linux-bdd3f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22053-vulnerability-in-linux-linux-be7f57</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22052-vulnerability-in-linux-linux-be7f53</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22051-vulnerability-in-linux-linux-be7f4f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22050-vulnerability-in-linux-linux-bdd3f2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22049-vulnerability-in-linux-linux-be7f4b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22048-vulnerability-in-linux-linux-bdd3ee</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22047-vulnerability-in-linux-linux-be7f47</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22046-vulnerability-in-linux-linux-be7f43</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22045-vulnerability-in-linux-linux-be7f1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22044-vulnerability-in-linux-linux-be7f19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22043-vulnerability-in-linux-linux-be7f15</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22042-vulnerability-in-linux-linux-be7f11</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22041-vulnerability-in-linux-linux-be7f04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22040-vulnerability-in-linux-linux-be7f00</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22039-vulnerability-in-linux-linux-be7efc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22038-vulnerability-in-linux-linux-be7ef8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22037-vulnerability-in-linux-linux-be7ef4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22036-vulnerability-in-linux-linux-be7ef0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22035-vulnerability-in-linux-linux-bdd3ea</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22034-vulnerability-in-linux-linux-be7ecc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22033-vulnerability-in-linux-linux-be7ec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22032-vulnerability-in-linux-linux-be7ec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22031-vulnerability-in-linux-linux-be7ec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22030-vulnerability-in-linux-linux-be7ebc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22029-becd40</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22029&amp;severity=low&amp;id=682d9839c4522896dcbecd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22028-vulnerability-in-linux-linux-bdd3e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22027-vulnerability-in-linux-linux-be7eb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22026-vulnerability-in-linux-linux-be7eb4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22025-vulnerability-in-linux-linux-be7eb0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22024-vulnerability-in-linux-linux-be7eac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58097-vulnerability-in-linux-linux-bde37a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58096-vulnerability-in-linux-linux-bde376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58095-vulnerability-in-linux-linux-bde369</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58094-vulnerability-in-linux-linux-bde365</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58093-vulnerability-in-linux-linux-bdd271</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53034-vulnerability-in-linux-linux-be6d8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interlock-ransomware-evolving-under-the-radar-16a50b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interlock%20ransomware%20evolving%20under%20the%20radar&amp;severity=medium&amp;id=682c992c7960f6956616a50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39512-cross-site-request-forgery-csrf-in--d0646be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39512%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yuya%20Hoshino%20Bulk%20Term%20Editor&amp;severity=null&amp;id=69cd73fae6bfc5ba1def445c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39513-missing-authorization-in-activedema-fa50aa34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39513%3A%20Missing%20Authorization%20in%20ActiveDEMAND%20Online%20Agency%20Marketing%20Automation%20ActiveDEMAND&amp;severity=null&amp;id=69cd73fae6bfc5ba1def445f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39514-improper-neutralization-of-input-du-f56d998b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asgaros%20Asgaros%20Forum&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39515-improper-neutralization-of-input-du-fc7be66b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tnomi%20Attendance%20Manager&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39516-improper-neutralization-of-input-du-95b10219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alan%20Petersen%20Author%20WIP%20Progress%20Bar&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39517-cross-site-request-forgery-csrf-in--b8a3d038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39517%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Basic%20Interactive%20World%20Map&amp;severity=null&amp;id=69cd73fae6bfc5ba1def4465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39518-improper-neutralization-of-special--7b20e917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39518%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20RedefiningTheWeb%20BMA%20Lite&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39520-improper-neutralization-of-input-du-142cec96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20Checkout%20Files%20Upload%20for%20WooCommerce&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39522-missing-authorization-in-service2cl-6ee5bbc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39522%3A%20Missing%20Authorization%20in%20Service2Client%20LLC%20Dynamic%20Post&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39524-improper-neutralization-of-script-r-f2b3fc36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39524%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20bPlugins%20Html5%20Audio%20Player&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39525-improper-neutralization-of-input-du-e929c28a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWax%20Logo%20Carousel%20Slider&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39528-improper-neutralization-of-input-du-df64419b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rescue%20Themes%20Rescue%20Shortcodes&amp;severity=null&amp;id=69cd73fde6bfc5ba1def4bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39529-improper-neutralization-of-input-du-03841eab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robin%20Cornett%20Scriptless%20Social%20Sharing&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0119e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39530-cross-site-request-forgery-csrf-in--b6ef4984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39530%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dsky%20Site%20Search%20360&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39531-missing-authorization-in-slazzercom-86b90653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39531%3A%20Missing%20Authorization%20in%20slazzercom%20Slazzer%20Background%20Changer&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39538-unrestricted-upload-of-file-with-da-5e14b5ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39538%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Mathieu%20Chartier%20WP-Advanced-Search&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39540-improper-neutralization-of-input-du-f837f97f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhys%20Wynne%20WP%20Flipclock&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39543-improper-neutralization-of-input-du-a1e9da9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39544-cross-site-request-forgery-csrf-in--463ac2e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39544%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20WP%20Tools&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39545-missing-authorization-in-miniorange-e1ee5bf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39545%3A%20Missing%20Authorization%20in%20miniOrange%20WordPress%20REST%20API%20Authentication&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39546-cross-site-request-forgery-csrf-in--278df5dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39547-cross-site-request-forgery-csrf-in--c39a928d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39547%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Toast%20Plugins%20Internal%20Link%20Optimiser&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39548-cross-site-request-forgery-csrf-in--02406bcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39548%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Right%20Click%20Disable%20OR%20Ban&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39549-improper-neutralization-of-input-du-43da08a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20whiletrue%20Most%20And%20Least%20Read%20Posts%20Widget&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39552-missing-authorization-in-dylan-jame-e79d2597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39552%3A%20Missing%20Authorization%20in%20Dylan%20James%20Zephyr%20Project%20Manager&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0123f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39555-improper-neutralization-of-input-du-5b434bcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39556-exposure-of-sensitive-system-inform-c618b784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39556%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20mediavine%20Mediavine%20Control%20Panel&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39557-unrestricted-upload-of-file-with-da-f2c611e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39557%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20StellarWP%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=null&amp;id=69cd7402e6bfc5ba1def4cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39560-missing-authorization-in-shahjada-l-06f650e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39560%3A%20Missing%20Authorization%20in%20Shahjada%20Live%20Forms&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39563-cross-site-request-forgery-csrf-in--b26bf426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39563%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Trio%20Conditional%20Payments%20for%20WooCommerce&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0124e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39564-cross-site-request-forgery-csrf-in--02b0357a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39564%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Trio%20Conditional%20Shipping%20for%20WooCommerce&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0131b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39565-deserialization-of-untrusted-data-i-d84e7fb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39565%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Melapress%20MelaPress%20Login%20Security&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0131e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39566-improper-neutralization-of-special--99bcaed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39566%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bob%20Hostel&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39570-improper-control-of-filename-for-in-32bf0577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39570%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Lomu%20WPCOM%20Member&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39571-missing-authorization-in-wpxpo-wows-be5695e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39571%3A%20Missing%20Authorization%20in%20WPXPO%20WowStore&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0132a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39572-improper-neutralization-of-input-du-7b63fa16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39572%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Checkout%20for%20PayPal&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39573-improper-neutralization-of-input-du-a788c907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39574-improper-neutralization-of-input-du-dcce08cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UIUX%20Lab%20Uix%20Shortcodes&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0132d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39575-improper-neutralization-of-input-du-c687ed98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPSight%20WPCasa&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39576-improper-neutralization-of-input-du-2c954d1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39577-improper-neutralization-of-input-du-e7506567</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39577%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Property%20Hive%20PropertyHive&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39578-improper-neutralization-of-input-du-0eac3f9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39579-improper-neutralization-of-input-du-347ffc23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Swings%20Membership%20For%20WooCommerce&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39581-improper-neutralization-of-input-du-dc3e51e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Shortcodes&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39582-improper-neutralization-of-input-du-f9883650</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Passionate%20Programmer%20Peter%20WP%20Data%20Access&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39584-improper-control-of-filename-for-in-dc5f1e83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39584%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df013ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39585-improper-neutralization-of-input-du-dde7c8be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Travelfic%20Toolkit&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df01402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39589-exposure-of-sensitive-system-inform-dbb6bab7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39589%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd740ae6bfc5ba1def4f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39590-improper-neutralization-of-input-du-d3dff6d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df01408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39591-missing-authorization-in-wp-shuffle-fa0eca4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39591%3A%20Missing%20Authorization%20in%20WP%20Shuffle%20WP%20Subscription%20Forms&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df0140b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39592-improper-control-of-filename-for-in-5edf23e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39592%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Unlock%20Lite&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39593-cross-site-request-forgery-csrf-in--39fcb476</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39593%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EverAccounting%20Ever%20Accounting&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39597-url-redirection-to-untrusted-site-o-019476f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39597%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Arthur%20Yarwood%20Fast%20eBay%20Listings&amp;severity=null&amp;id=69cd740de6bfc5ba1def4f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39598-path-traversal-in-qu-l-91-administr-7a82b47f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39598%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39599-url-redirection-to-untrusted-site-o-ec2769e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39599%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Webilia%20Inc.%20Listdom&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39600-cross-site-request-forgery-csrf-in--dec37291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39600%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20Integration%20for%20WooCommerce%20and%20QuickBooks&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39601-cross-site-request-forgery-csrf-in--5824c645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPFactory%20Custom%20CSS%2C%20JS%20%26%20PHP&amp;severity=null&amp;id=69cd740de6bfc5ba1def4fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-39602-missing-authorization-in-wc-product-a3388775</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-39602%3A%20Missing%20Authorization%20in%20WC%20Product%20Table%20WooCommerce%20Product%20Table%20Lite&amp;severity=null&amp;id=69cd7410e6bfc5ba1def5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58092-vulnerability-in-linux-linux-bde361</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30960-missing-authorization-in-fs-code-fs-dd05cb16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30960%3A%20Missing%20Authorization%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22023-vulnerability-in-linux-linux-be7ea8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22022-vulnerability-in-linux-linux-be7e8a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22021-vulnerability-in-linux-linux-be7e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22020-vulnerability-in-linux-linux-be7e82</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22019-vulnerability-in-linux-linux-be7e7e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22036-cwe-269-improper-privilege-manageme-1da7ebff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22036%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20SUSE%20rancher&amp;severity=critical&amp;id=69a0a1b885912abc71d0a0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52281-cwe-79-improper-neutralization-of-i-bb6ca204</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52281%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(%26%2339%3BCross-site%20Scripting%26%2339%3B)%20in%20SUSE%20rancher&amp;severity=high&amp;id=69a0a1b985912abc71d0a0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3677-deserialization-in-lm-sys-fastchat-bf84e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3677%3A%20Deserialization%20in%20lm-sys%20fastchat&amp;severity=medium&amp;id=682d984bc4522896dcbf84e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3104-cwe-200-exposure-of-sensitive-inform-a9b45532</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3104%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WPStaging%20WP%20STAGING%20Pro%20WordPress%20Backup%20Plugin&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3077-cwe-79-improper-neutralization-of-in-3133137f</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=699f6b27b7ef31ef0b54ebd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jscript-to-powershell-breaking-down-a-loader-delivering-xworm-and-rhadamanthys-16a5f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=JScript%20to%20PowerShell%3A%20Breaking%20Down%20a%20Loader%20Delivering%20XWorm%20and%20Rhadamanthys&amp;severity=medium&amp;id=682c992c7960f6956616a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3247-cwe-354-improper-validation-of-integ-fdc1eee9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3247%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20takayukister%20Contact%20Form%207&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ecb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22018-vulnerability-in-linux-linux-be7e7a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3495-cwe-338-use-of-cryptographically-wea-0e9ad224</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3495%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20Delta%20Electronics%20COMMGR&amp;severity=critical&amp;id=68a3c696ad5a09ad00e23102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3698-cwe-749-exposed-dangerous-method-or--b2de3588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3698%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20TECNO%20com.transsion.carlcare&amp;severity=high&amp;id=68ba82f2791f3b772df65950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13452-cwe-79-improper-neutralization-of-i-64e14b4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsysticcom%20Contact%20Form%20by%20Supsystic&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59ea10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2314-cwe-79-improper-neutralization-of-in-1f9492bf</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozmoslabs%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30100-cwe-284-improper-access-control-in--8ab73772</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30100%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Alienware%20Command%20Center%20(AWCC)&amp;severity=medium&amp;id=69a0a1c585912abc71d0b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29653-b42569c6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29653&amp;severity=low&amp;id=6850986ea8c921274384b7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40073-n-a-in-n-a-bf741d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf741d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40072-n-a-in-n-a-bf741b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf741b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40071-n-a-in-n-a-bf7403</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29650-n-a-in-n-a-bf168d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29650&amp;severity=medium&amp;id=682d9840c4522896dcbf168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29649-n-a-in-n-a-bf1689</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29649&amp;severity=medium&amp;id=682d9840c4522896dcbf1689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29648-n-a-in-n-a-bf1685</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29648&amp;severity=medium&amp;id=682d9840c4522896dcbf1685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29652-n-a-in-n-a-bf10c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29652&amp;severity=critical&amp;id=682d9840c4522896dcbf10c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29651-n-a-in-n-a-bf10ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29651&amp;severity=critical&amp;id=682d9840c4522896dcbf10ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-16-2a6182</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-16&amp;severity=medium&amp;id=682c7db3e8347ec82d2a6182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-16-f13098</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-16&amp;severity=medium&amp;id=682acdc2bbaf20d303f13098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32923-improper-neutralization-of-input-du-fef6e231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Tourmaster&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30984-improper-neutralization-of-input-du-e7e85644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dzynit%20SEO%20Tools&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30982-improper-neutralization-of-input-du-d502c5d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookProgress%20by%20Stormhill%20Media&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30970-improper-neutralization-of-input-du-47247ef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30970%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottwallick%20Easy%20Contact&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27011-improper-control-of-filename-for-in-f78ebea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27011%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26998-improper-neutralization-of-input-du-51ce8e92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26996-improper-control-of-generation-of-c-1b348cba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26996%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26953-missing-authorization-in-crocoblock-da85044e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26953%3A%20Missing%20Authorization%20in%20Crocoblock%20JetMenu&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26951-improper-neutralization-of-input-du-55c0e363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20covertnine%20C9%20Blocks&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26950-improper-neutralization-of-input-du-2ef580ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AddonsPress%20Nepali%20Date%20Converter&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26934-improper-neutralization-of-input-du-2a9704f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20graphthemes%20Glossy%20Blog&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26930-improper-neutralization-of-input-du-2937d6d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alleythemes%20Home%20Services&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26927-unrestricted-upload-of-file-with-da-2482c719</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26927%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LiquidThemes%20AI%20Hub&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26919-improper-neutralization-of-input-du-e599e076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26919%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tainacan%20Tain%C3%A1&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26908-improper-neutralization-of-special--6b6a4f1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26908%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Gurmehub%20Kargo%20Entegrat%C3%B6r&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26906-improper-neutralization-of-input-du-d759d9e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ren%20Ventura%20WP%20Delete%20User%20Accounts&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26903-cross-site-request-forgery-csrf-in--dc0044e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26903%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RealMag777%20InPost%20Gallery&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26880-improper-neutralization-of-input-du-cc2c40a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Skill%20Bar&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26870-improper-neutralization-of-input-du-1b7eedf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26749-improper-neutralization-of-input-du-0a48ab1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Additional%20Custom%20Product%20Tabs%20for%20WooCommerce&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26748-cross-site-request-forgery-csrf-in--9a671dcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26748%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20looswebstudio%20Arkhe&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26746-improper-neutralization-of-input-du-4f1e632f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20caalami%20Advanced%20Custom%20Fields%3A%20Link%20Picker%20Field&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26740-improper-neutralization-of-input-du-92c29144</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burgersoftware%20SpaBiz&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22269-improper-neutralization-of-input-du-6a71e1e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22269%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShapedPlugin%20LLC%20Real%20Testimonials&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22268-improper-neutralization-of-input-du-159e3d84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22268%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uncanny%20Owl%20Uncanny%20Toolkit%20for%20LearnDash&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1274-cwe-787-out-of-bounds-write-in-autodesk-revit-bf0489</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1274%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf0489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1277-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-revit-bf049a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1277%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf049a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1656-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf04dd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1656%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf04dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1273-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf0485</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1273%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf0485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2497-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf0ec1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2497%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d9840c4522896dcbf0ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1276-cwe-787-out-of-bounds-write-in-autodesk-autocad-aec8ce</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1276%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fb1484d88663aec8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1275-cwe-122-heap-based-buffer-overflow-in-autodesk-revit-bf0496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1275%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20Revit&amp;severity=high&amp;id=682d983fc4522896dcbf0496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/server-side-phishing-how-credential-theft-campaigns-are-hiding-in-plain-sight-16a876</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Server-Side%20Phishing%3A%20How%20Credential%20Theft%20Campaigns%20Are%20Hiding%20in%20Plain%20Sight&amp;severity=medium&amp;id=682c992c7960f6956616a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/byte-bandits-how-fake-pdf-converters-are-stealing-more-than-just-your-documents-16a887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Byte%20Bandits%3A%20How%20Fake%20PDF%20Converters%20Are%20Stealing%20More%20Than%20Just%20Your%20Documents&amp;severity=medium&amp;id=682c992c7960f6956616a887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads-16a891</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20actors%20misuse%20Node.js%20to%20deliver%20malware%20and%20other%20malicious%20payloads&amp;severity=medium&amp;id=682c992c7960f6956616a891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30737-difficult-to-exploit-vulnerability--32d9ac36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30737%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Smart%20View%20for%20Office.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Smart%20View%20for%20Office%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Smart%20View%20for%20Office%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Smart%20View%20for%20Office&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30736-difficult-to-exploit-vulnerability--d3ab3446</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30736%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20VM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Java%20VM%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Java%20VM%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69a0a1c685912abc71d0ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30735-easily-exploitable-vulnerability-al-c8993b50</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30735%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects%20accessible%20data.%20in%20Oracle%20Corporation%20PeopleSoft%20Enterprise%20CC%20Common%20Application%20Objects&amp;severity=high&amp;id=69a0a1c685912abc71d0ba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30733-easily-exploitable-vulnerability-allows-unauthenticated-attacker-with-network-access-via-oracle-net-to-compromise-rdbms-listener-successful-attacks-require-human-interaction-from-a-person-other-than-the-attacker-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-access-to-critical-data-or-complete-access-to-all-rdbms-listener-accessible-data-in-oracle-corporation-oracle-database-server-aeb865</loc>
    <lastmod>2026-03-18</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30733%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RDBMS%20Listener.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20RDBMS%20Listener%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30727-easily-exploitable-vulnerability-al-8c5d99e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30727%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Scripting.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Scripting.%20in%20Oracle%20Corporation%20Oracle%20Scripting&amp;severity=critical&amp;id=69a0a1c685912abc71d0ba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30722-difficult-to-exploit-vulnerability--590f7b98</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30722%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091549c28fd46ded7bb749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30721-difficult-to-exploit-vulnerability--169e6b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30721%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30715-easily-exploitable-vulnerability-al-ea218e03</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30715%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30712-easily-exploitable-vulnerability-allows-high-privileged-attacker-with-logon-to-the-infrastructure-where-oracle-vm-virtualbox-executes-to-compromise-oracle-vm-virtualbox-while-the-vulnerability-is-in-oracle-vm-virtualbox-attacks-may-significantly-impact-additional-products-scope-change-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-creation-deletion-or-modification-access-to-critical-data-or-all-oracle-vm-virtualbox-accessible-data-as-well-as-unauthorized-access-to-critical-data-or-complete-access-to-all-oracle-vm-virtualbox-accessible-data-and-unauthorized-ability-to-cause-a-partial-denial-of-service-partial-dos-of-oracle-vm-virtualbox-in-oracle-corporation-oracle-vm-virtualbox-aeb8b5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30712%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20VM%20VirtualBox%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20VM%20VirtualBox%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20Oracle%20VM%20VirtualBox&amp;severity=high&amp;id=682cd0f81484d88663aeb8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30706-difficult-to-exploit-vulnerability--88c6c670</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30706%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Connectors.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20MySQL%20Connectors.%20in%20Oracle%20Corporation%20MySQL%20Connectors&amp;severity=high&amp;id=69a0a1c685912abc71d0ba37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30705-easily-exploitable-vulnerability-al-74689c4d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30705%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30704-difficult-to-exploit-vulnerability--8d507316</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30704%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30703-easily-exploitable-vulnerability-al-d9a7b670</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30703%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69091549c28fd46ded7bb735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30701-easily-exploitable-vulnerability-al-7f0598e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30701%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20User%20Account%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20RAS%20Security.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20RAS%20Security%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20RAS%20Security%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Database%20Server&amp;severity=high&amp;id=69a0a1c585912abc71d0b715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30699-easily-exploitable-vulnerability-al-202de228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30699%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091549c28fd46ded7bb731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30698-difficult-to-exploit-vulnerability--dac06e2f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30698%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69091547c28fd46ded7bb641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30696-easily-exploitable-vulnerability-al-f8325393</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30696%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30695-easily-exploitable-vulnerability-al-3b83a1a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30695%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30693-easily-exploitable-vulnerability-al-de4b8160</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30693%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091547c28fd46ded7bb634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30691-difficult-to-exploit-vulnerability--21fd18a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30691%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=69091547c28fd46ded7bb62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30690-difficult-to-exploit-vulnerability--64e3fe49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30690%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Solaris%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Oracle%20Solaris&amp;severity=high&amp;id=69a0a1c585912abc71d0b712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30689-easily-exploitable-vulnerability-al-27c26ed7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30689%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30688-easily-exploitable-vulnerability-al-8c8de056</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30688%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30687-easily-exploitable-vulnerability-al-e5ec97a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30687%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30685-easily-exploitable-vulnerability-al-345e85e7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30685%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30684-easily-exploitable-vulnerability-al-45b1dba7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30684%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091547c28fd46ded7bb61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30683-easily-exploitable-vulnerability-al-449cc79b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30683%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091545c28fd46ded7bb60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30682-easily-exploitable-vulnerability-al-0de29e9c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30682%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091545c28fd46ded7bb607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30681-easily-exploitable-vulnerability-al-977b69a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30681%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=low&amp;id=69091545c28fd46ded7bb603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21587-difficult-to-exploit-vulnerability--5b0a6b97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21587%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=high&amp;id=690908597fff0e30cee23aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21585-easily-exploitable-vulnerability-al-b4e8725c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21585%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21584-easily-exploitable-vulnerability-al-eb4ecd90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21584%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21581-easily-exploitable-vulnerability-al-fd6fceca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21581%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21580-easily-exploitable-vulnerability-al-577a7cdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21580%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21579-easily-exploitable-vulnerability-al-d8780338</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21579%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21578-easily-exploitable-vulnerability-al-7b91bf08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21578%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Secure%20Backup%20executes%20to%20compromise%20Oracle%20Secure%20Backup.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Secure%20Backup.%20in%20Oracle%20Corporation%20Oracle%20Secure%20Backup&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21577-easily-exploitable-vulnerability-al-182c6652</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21577%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690908597fff0e30cee23a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21575-easily-exploitable-vulnerability-al-bfdac0d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21575%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=690908597fff0e30cee23a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21574-easily-exploitable-vulnerability-al-7a43e4a5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21574%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=690908597fff0e30cee23a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21573-difficult-to-exploit-vulnerability--573d822d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21573%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing.%20in%20Oracle%20Corporation%20Oracle%20Financial%20Services%20Revenue%20Management%20and%20Billing&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1122-out-of-bounds-write-in-google-chromeos-bd8045</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1122%3A%20Out-of-bounds%20Write%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=682d9818c4522896dcbd8045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/newly-registered-domains-distributing-spynote-malware-16a899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Newly%20Registered%20Domains%20Distributing%20SpyNote%20Malware&amp;severity=low&amp;id=682c992c7960f6956616a899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24358-cwe-352-cross-site-request-forgery-csrf-in-gorilla-csrf-becffc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24358%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gorilla%20csrf&amp;severity=medium&amp;id=682d9839c4522896dcbecffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32779-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-labsai-eddi-bf76cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32779%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labsai%20EDDI&amp;severity=medium&amp;id=682d984ac4522896dcbf76cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29817-cwe-427-uncontrolled-search-path-element-in-microsoft-power-automate-for-desktop-aebc4f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29817%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=medium&amp;id=682cd0f91484d88663aebc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32911-free-of-memory-not-on-the-heap-bd6441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32911%3A%20Free%20of%20Memory%20not%20on%20the%20Heap&amp;severity=critical&amp;id=682d9815c4522896dcbd6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32947-cwe-835-loop-with-unreachable-exit--e2ef1fc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32947%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)&amp;severity=high&amp;id=68a592bbad5a09ad00037020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3608-race-condition-in-nshttptransaction--f9cbc950</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3608%3A%20Race%20condition%20in%20nsHttpTransaction%20could%20lead%20to%20memory%20corruption%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69a0a1c885912abc71d0baa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31011-improper-neutralization-of-input-du-287103c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ReichertBrothers%20SimplyRETS%20Real%20Estate%20IDX&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30985-deserialization-of-untrusted-data-i-19429695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30985%3A%20Deserialization%20of%20Untrusted%20Data%20in%20kagla%20GNUCommerce&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30964-server-side-request-forgery-ssrf-in-9624f172</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30964%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeGoods%20Photography&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30962-improper-neutralization-of-input-du-a6a802b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26990-server-side-request-forgery-ssrf-in-028d3c75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26990%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecd05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26982-improper-neutralization-of-input-du-95abc7ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26982%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eric-Oliver%20M%C3%A4chler%20DSGVO%20Youtube&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26959-missing-authorization-in-qu-l-91-ad-16d3700c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26959%3A%20Missing%20Authorization%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26958-missing-authorization-in-crocoblock-4b97debc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26958%3A%20Missing%20Authorization%20in%20Crocoblock%20JetBlog&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26955-missing-authorization-in-vowelweb-i-1f46c606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26955%3A%20Missing%20Authorization%20in%20vowelweb%20Industrial%20Lite&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26954-improper-neutralization-of-input-du-c5e0a998</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26954%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%201pluginjquery%20ZooEffect&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26944-missing-authorization-in-crocoblock-53504d9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26944%3A%20Missing%20Authorization%20in%20Crocoblock%20JetPopup&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26942-missing-authorization-in-crocoblock-33d459d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26942%3A%20Missing%20Authorization%20in%20Crocoblock%20JetTricks&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26894-improper-control-of-filename-for-in-c1ad80ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26894%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Mobeen%20Abdullah%20Coming%20Soon%2C%20Maintenance%20Mode&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26889-improper-control-of-filename-for-in-3e8ff1b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26889%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hockeydata%20hockeydata%20LOS&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26745-improper-neutralization-of-input-du-3dd078dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RSTheme%20RS%20Elements%20Elementor%20Addon&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26744-improper-neutralization-of-input-du-b8a23b5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlog&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26743-improper-neutralization-of-input-du-c85ebbce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TC.K%20Advance%20WP%20Query%20Search%20Filter&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26741-missing-authorization-in-aweos-gmbh-81ead4c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26741%3A%20Missing%20Authorization%20in%20AWEOS%20GmbH%20Email%20Notifications%20for%20Updates&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32929-missing-authorization-in-dmitry-v-c-62796b50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32929%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26992-improper-neutralization-of-input-du-2c76a1db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Landing%20Page%20Cat&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1688-cwe-1394-use-of-default-cryptographi-b46c6e44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1688%3A%20CWE-1394%3A%20Use%20of%20Default%20Cryptographic%20Key%20in%20Milestone%20Systems%20XProtect%20VMS&amp;severity=medium&amp;id=68c0983d9ed239a66bacc12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2083-cwe-79-improper-neutralization-of-in-43c5f3ee</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2083%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binsaifullah%20Logo%20Carousel%20Gutenberg%20Block&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3576-use-of-weak-hash-in-red-hat-red-hat-ansible-automation-platform-2-25c8e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3576%3A%20Use%20of%20Weak%20Hash&amp;severity=medium&amp;id=682f2fb50acd01a24925c8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3622-deserialization-in-xorbits-inference-bf84d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3622%3A%20Deserialization%20in%20Xorbits%20Inference&amp;severity=medium&amp;id=682d984bc4522896dcbf84d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2225-cwe-79-improper-neutralization-of-in-2c6c5836</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%20Plugin%20and%20Elementor%20Templates&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29984-cwe-284-improper-access-control-in--05900f45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29984%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Dell%20Trusted%20Device%20Client&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29983-cwe-59-improper-link-resolution-bef-d10cc95a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29983%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Dell%20Dell%20Trusted%20Device%20Client&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3470-cwe-89-improper-neutralization-of-sp-12b63286</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3470%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20totalsoft%20TS%20Poll%20%E2%80%93%20Survey%2C%20Versus%20Poll%2C%20Image%20Poll%2C%20Video%20Poll&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54ef68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33027-cwe-830-inclusion-of-web-functional-dfbe06ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33027%3A%20CWE-830%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20Bandisoft%20Bandizip&amp;severity=medium&amp;id=68fbd506f816635ddaec8851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-15-33b150c2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-15&amp;severity=medium&amp;id=68367c98182aa0cae231f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32102-cwe-918-server-side-request-forgery-ssrf-in-crushftp-crushftp-bf7b02</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32102%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20CrushFTP%20CrushFTP&amp;severity=medium&amp;id=682d984bc4522896dcbf7b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33028-cwe-830-inclusion-of-web-functionality-from-an-untrusted-source-in-winzip-winzip-bdacfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33028%3A%20CWE-830%20Inclusion%20of%20Web%20Functionality%20from%20an%20Untrusted%20Source%20in%20WinZip%20WinZip&amp;severity=medium&amp;id=682d981cc4522896dcbdacfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-15-751f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-15&amp;severity=medium&amp;id=682c7abce3e6de8ceb751f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-15-f1305a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f1305a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24797-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-meshtastic-firmware-bf7e86</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24797%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20meshtastic%20firmware&amp;severity=medium&amp;id=682d984bc4522896dcbf7e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/slow-pisces-targets-developers-with-coding-challenges-and-introduces-new-customized-python-malware-16ab19</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Slow%20Pisces%20Targets%20Developers%20With%20Coding%20Challenges%20and%20Introduces%20New%20Customized%20Python%20Malware&amp;severity=medium&amp;id=682c992c7960f6956616ab19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1782-bedafc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1782&amp;severity=low&amp;id=682d983bc4522896dcbedafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign-16abaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Atomic%20and%20Exodus%20crypto%20wallets%20targeted%20in%20malicious%20npm%20campaign&amp;severity=medium&amp;id=682c992c7960f6956616abaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3277-cwe-122-heap-based-buffer-overflow-i-ebaa27f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3277%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SQLite%20sqlite&amp;severity=medium&amp;id=6835d30c182aa0cae216c480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22371-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sicommnet-basec-bf84ad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22371%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SicommNet%20BASEC&amp;severity=medium&amp;id=682d984bc4522896dcbf84ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32914-out-of-bounds-read-aecbaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32914%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=682cd0fc1484d88663aecbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32912-null-pointer-dereference-aecba8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32912%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682cd0fc1484d88663aecba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32910-null-pointer-dereference-bd89c7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32910%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32909-null-pointer-dereference-bd89c3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32909%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32908-misinterpretation-of-input-aecbcf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32908%3A%20Misinterpretation%20of%20Input&amp;severity=high&amp;id=682cd0fc1484d88663aecbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32907-excessive-platform-resource-consumption-within-a-loop-aecb99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32907%3A%20Excessive%20Platform%20Resource%20Consumption%20within%20a%20Loop&amp;severity=medium&amp;id=682cd0fc1484d88663aecb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32906-out-of-bounds-read-aecbcd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32906%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=682cd0fc1484d88663aecbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32913-null-pointer-dereference-bd6452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32913%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=682d9815c4522896dcbd6452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3566-unrestricted-upload-in-veal98-echo-c43b9939</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3566%3A%20Unrestricted%20Upload%20in%20veal98%20%E5%B0%8F%E7%89%9B%E8%82%89%20Echo%20%E5%BC%80%E6%BA%90%E7%A4%BE%E5%8C%BA%E7%B3%BB%E7%BB%9F&amp;severity=medium&amp;id=68ae0be1ad5a09ad005b075d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27009-cross-site-request-forgery-csrf-in--72a03a7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27009%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24859-cwe-613-insufficient-session-expira-be932498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24859%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Apache%20Software%20Foundation%20Apache%20Roller&amp;severity=low&amp;id=69a0a1bf85912abc71d0ac3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2563-cwe-639-authorization-bypass-through-2e4a8f83</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2563%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20User%20Registration%20%26%20Membership&amp;severity=high&amp;id=68aef76ead5a09ad0061da18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3552-bdcc8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3552&amp;severity=low&amp;id=682d9820c4522896dcbdcc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3551-bdcc8b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3551&amp;severity=low&amp;id=682d9820c4522896dcbdcc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3549-heap-based-buffer-overflow-in-open-a-f4e437f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3549%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6880a8b9ad5a09ad00232539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3548-heap-based-buffer-overflow-in-open-a-ddb77c2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3548%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6880a8b9ad5a09ad00232531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-14-2ae977</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-14&amp;severity=medium&amp;id=682c7db4e8347ec82d2ae977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-14-f123f4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f123f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3423-cwe-79-improper-neutralization-of-in-77fffc2c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3423%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Aspera%20Faspex&amp;severity=medium&amp;id=68b63b8cad5a09ad00d5d476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-13-0e95aacb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-13&amp;severity=medium&amp;id=68367c99182aa0cae2323387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2814-cwe-338-use-of-cryptographically-wea-f96fae41</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2814%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20LDS%20Crypt%3A%3ACBC&amp;severity=medium&amp;id=684dd951a8c9212743820151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1456-cwe-79-improper-neutralization-of-in-b728138f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1455-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wproyal-royal-elementor-addons-and-templates-bd6c10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=682d9816c4522896dcbd6c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13338-cwe-352-cross-site-request-forgery-csrf-in-creativemotion-clearfy-cache-wordpress-optimization-plugin-minify-html-css-js-defer-bd6bfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13338%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=682d9816c4522896dcbd6bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3276-cwe-79-improper-neutralization-of-in-38453842</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks%20%E2%80%93%20Gutenberg%20based%20Page%20Builder&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13337-cwe-352-cross-site-request-forgery--29e29c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13337%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemotion%20Clearfy%20Cache%20%E2%80%93%20WordPress%20optimization%20plugin%2C%20Minify%20HTML%2C%20CSS%20%26%20JS%2C%20Defer&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3282-cwe-639-authorization-bypass-through-c3d441c6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3282%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3418-cwe-269-improper-privilege-managemen-4fee7a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3418%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20wpclever%20WPC%20Admin%20Columns&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3292-cwe-639-authorization-bypass-through-49f6e97f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3292%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ed96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2871-cwe-352-cross-site-request-forgery-c-f107cebe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2871%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20quadlayers%20WordPress%20Mega%20Menu%20%E2%80%93%20QuadMenu&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2881-cwe-200-exposure-of-sensitive-inform-2e56ab5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2881%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bap22%20Developer%20Toolbar&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2841-cwe-200-exposure-of-sensitive-inform-92070c5a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2841%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20reality66%20Cart66%20Cloud%20%3A%3A%20WordPress%20Ecommerce%20The%20Easy%20Way&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29834-cwe-125-out-of-bounds-read-in-microsoft-microsoft-edge-chromium-based-aebc68</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29834%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f91484d88663aebc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32726-cwe-284-improper-access-control-in-microsoft-visual-studio-code-aebc72</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32726%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=medium&amp;id=682cd0f91484d88663aebc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29803-cwe-427-uncontrolled-search-path-element-in-microsoft-visual-studio-tools-for-applications-vsta-aebc30</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29803%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20SQL%20Server%20Management%20Studio%2020.2&amp;severity=high&amp;id=682cd0f91484d88663aebc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-12-2ae020</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-12&amp;severity=medium&amp;id=682c7db4e8347ec82d2ae020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-12-f1209a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1209a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2269-cwe-79-improper-neutralization-of-in-a64d3f59</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0129-allowed-with-review-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-palo-alto-networks-prisma-access-browser-b3d2ba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0129%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Prisma%20Access%20Browser&amp;severity=critical&amp;id=682d153e4d7c5ea9f4b3d2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32079-cwe-20-improper-input-validation-in-0584ac58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32079%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20GrowthExperiments&amp;severity=medium&amp;id=6866b2446f40f0eb7299338c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32072-cwe-116-improper-encoding-or-escapi-fdaea10d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32072%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20Core%20-%20Feed%20Utils&amp;severity=medium&amp;id=690909fb7fff0e30cee434b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32073-cwe-20-improper-input-validation-in-f597d1e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32073%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20HTML%20Tags&amp;severity=medium&amp;id=6866b2446f40f0eb7299337a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32074-cwe-116-improper-encoding-or-escapi-f46fb375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32074%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Confirm%20Account%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299337e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32067-cwe-20-improper-input-validation-in-9063dbaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32067%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Growth%20Experiments%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb72993366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32068-cwe-863-incorrect-authorization-in--f4f93cf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32068%3A%20CWE-863%20Incorrect%20Authorization%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20OAuth%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299336a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32069-cwe-20-improper-input-validation-in-ae8b8bc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32069%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikibase%20Media%20Info%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb7299336e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32070-cwe-20-improper-input-validation-in-dac92d2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32070%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20AJAX%20Poll%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb72993372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32071-cwe-20-improper-input-validation-in-86cb2e6a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32071%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Wikimedia%20Foundation%20Mediawiki%20-%20Wikidata%20Extension&amp;severity=medium&amp;id=6866b2446f40f0eb72993376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3421-cwe-79-improper-neutralization-of-in-5db041fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Quiz%2C%20Survey%2C%20Newsletter%20%26%20Payment%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54edab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3422-cwe-94-improper-control-of-generatio-b0b28f64</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3422%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Quiz%2C%20Survey%2C%20Newsletter%20%26%20Payment%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54edaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3439-cwe-502-deserialization-of-untrusted-101e3bec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3439%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Form%2C%20Quiz%2C%20Survey%2C%20Newsletter%20%26%20Payment%20Form%20Builder%20for%20WordPress&amp;severity=critical&amp;id=699f6b2bb7ef31ef0b54ef5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13861-cwe-732-incorrect-permission-assign-80eaaafd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13861%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Sophos%20Taegis%20Endpoint%20Agent%20(Linux)&amp;severity=high&amp;id=69a0a1b885912abc71d0a0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2575-cwe-79-improper-neutralization-of-in-679dc9c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzita%20Z%20Companion&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2541-cwe-79-improper-neutralization-of-in-c67d4149</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2541%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23389-cwe-284-improper-access-control-in--b2125768</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23389%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20SUSE%20rancher&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23391-cwe-266-incorrect-privilege-assignm-6b8dfb86</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23391%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20SUSE%20rancher&amp;severity=critical&amp;id=69a0a1bf85912abc71d0ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2128-cwe-89-improper-neutralization-of-sp-23928b86</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2128%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32681-improper-neutralization-of-special--1d8f7956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32681%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Guru%20Error%20Log%20Viewer&amp;severity=null&amp;id=69cd73efe6bfc5ba1def423b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32672-improper-control-of-filename-for-in-93a305bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32672%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20g5theme%20Ultimate%20Bootstrap%20Elements%20for%20Elementor&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32671-improper-limitation-of-a-pathname-t-cbc9ab6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32671%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20John%20Weissberg%20Print%20Science%20Designer&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32663-improper-control-of-filename-for-in-e9bcca0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32663%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Cooming%20Soon&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32656-improper-control-of-filename-for-in-62f70b21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32656%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Testimonial%20Slider%20And%20Showcase%20Pro&amp;severity=null&amp;id=69cd73eae6bfc5ba1def408b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32654-improper-control-of-filename-for-in-da207035</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32654%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Stylemix%20Motors&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32650-improper-neutralization-of-special--39790e3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32650%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=69cd73eae6bfc5ba1def4079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32633-improper-limitation-of-a-pathname-t-59391158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32633%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20neoslab%20Database%20Toolset&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def400b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32632-improper-neutralization-of-input-du-1ae2840d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KaizenCoders%20Automatic%20Ban%20IP&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def4008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32631-improper-limitation-of-a-pathname-t-db471e7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32631%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20oxygensuite%20Oxygen%20MyData%20for%20WooCommerce&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def4005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32629-improper-limitation-of-a-pathname-t-99558844</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32629%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CMSJunkie%20-%20WordPress%20Business%20Directory%20Plugins%20WP-BusinessDirectory&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32627-improper-control-of-filename-for-in-94bebe1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32627%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32618-improper-neutralization-of-special--23491b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32618%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32614-improper-control-of-filename-for-in-72821cf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32614%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32607-deserialization-of-untrusted-data-i-ce8efbad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32607%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpBookingly&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32603-improper-neutralization-of-special--e347f859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32603%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HK%20WP%20Online%20Users%20Stats&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32601-improper-neutralization-of-input-du-a849b520</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twispay%20Twispay%20Credit%20Card%20Payments&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32599-improper-neutralization-of-input-du-c49a87ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miunosoft%20Task%20Scheduler&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32589-improper-control-of-filename-for-in-b2bb6486</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32589%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20odude%20Flexi%20%E2%80%93%20Guest%20Submit&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32587-improper-limitation-of-a-pathname-t-e8981a18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32587%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pickupp%20WooCommerce%20Pickupp&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32586-improper-neutralization-of-input-du-487425ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ABA%20Bank%20ABA%20PayWay%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32585-path-traversal-in-trusty-plugins-sh-08687598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32585%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Trusty%20Plugins%20Shop%20Products%20Filter&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32579-unrestricted-upload-of-file-with-da-829e7a6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32579%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SoftClever%20Limited%20Sync%20Posts&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32577-improper-control-of-filename-for-in-75497160</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32577%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32569-deserialization-of-untrusted-data-i-a7012541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32569%3A%20Deserialization%20of%20Untrusted%20Data%20in%20RealMag777%20TableOn&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32568-deserialization-of-untrusted-data-i-90fc723d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32568%3A%20Deserialization%20of%20Untrusted%20Data%20in%20empik%20EmpikPlace%20for%20Woocommerce&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32567-improper-neutralization-of-special--20b9353e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32567%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dev02ali%20Easy%20Post%20Duplicator&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32565-improper-neutralization-of-special--1affbf1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32565%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vertim%20Neon%20Product%20Designer&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32558-improper-neutralization-of-special--eba8865f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32558%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ketanajani%20Duplicate%20Title%20Checker&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32553-improper-neutralization-of-input-du-28f2426f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magnigenie%20RestroPress&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32551-improper-neutralization-of-input-du-d525a145</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jaap%20Jansma%20Connector%20to%20CiviCRM%20with%20CiviMcRestFace&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32542-missing-authorization-in-eazyplugin-31bb91bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32542%3A%20Missing%20Authorization%20in%20EazyPlugins%20Eazy%20Plugin%20Manager&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32541-improper-neutralization-of-input-du-565db44b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosoftplugin%20WooCommerce%20Sales%20MIS%20Report&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32539-improper-neutralization-of-input-du-f51e8bb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Kohlbach%20Store%20Exporter&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32538-improper-neutralization-of-input-du-23d5890e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dev02ali%20Easy%20Post%20Duplicator&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32537-improper-neutralization-of-input-du-3627e79b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rachel%20Cherry%20Lock%20Your%20Updates&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32536-improper-neutralization-of-input-du-b4cc4ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sandeep%20Verma%20HTML5%20Video%20Player%20with%20Playlist&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32534-improper-neutralization-of-input-du-35d4974f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Workbox%20Workbox%20Video%20from%20Vimeo%20%26%20Youtube&amp;severity=null&amp;id=69cd73d6e6bfc5ba1def3ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32525-improper-neutralization-of-input-du-b32507da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MapGeo%20Interactive%20Geo%20Maps&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32524-improper-neutralization-of-input-du-612a9de3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MyWorks%20MyWorks%20WooCommerce%20Sync%20for%20QuickBooks%20Online&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32523-improper-neutralization-of-input-du-b94f361a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20payphone%20WooCommerce%20%E2%80%93%20Payphone%20Gateway&amp;severity=null&amp;id=69cd73d4e6bfc5ba1def3c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32519-improper-control-of-filename-for-in-1e15452e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32519%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Foysal%20Imran%20IDonate&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32517-improper-neutralization-of-input-du-68099408</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SCAND%20MultiMailer&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32509-improper-limitation-of-a-pathname-t-586a0f6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32509%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WPMinds%20Simple%20WP%20Events&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32491-incorrect-privilege-assignment-in-r-c6043489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32491%3A%20Incorrect%20Privilege%20Assignment%20in%20Rankology%20Rankology%20SEO%20%E2%80%93%20On-site%20SEO&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32144-deserialization-of-untrusted-data-i-ed9bfa19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32144%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def324c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32143-deserialization-of-untrusted-data-i-c52aa579</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32143%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Accordion&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31599-improper-neutralization-of-special--c5318838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31599%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20N-Media%20Bulk%20Product%20Sync&amp;severity=null&amp;id=69cd736ee6bfc5ba1def218f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31565-improper-neutralization-of-special--225c186c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31565%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Lisandro%20Martinez%20WPSmartContracts&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31379-improper-neutralization-of-input-du-2c177cef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31379%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20programphases%20Insert%20HTML%20Here&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31378-improper-neutralization-of-input-du-34a46f64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31378%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danbwb%20Oppso%20Unit%20Converter&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31041-missing-authorization-in-anytrack-a-fa4c5483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31041%3A%20Missing%20Authorization%20in%20AnyTrack%20AnyTrack%20Affiliate%20Link%20Manager&amp;severity=null&amp;id=69cd7340e6bfc5ba1def146c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31040-improper-control-of-filename-for-in-eea57f64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31040%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Exthemes%20WP%20Food%20ordering%20and%20Restaurant%20Menu&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31028-improper-neutralization-of-input-du-8aaca73d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31028%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Huseyin%20Berberoglu%20WP%20Hide%20Categories&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31021-improper-neutralization-of-input-du-2ad47fc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dolby_uk%20Mobile%20Smart&amp;severity=null&amp;id=69cd733be6bfc5ba1def0eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31015-improper-control-of-filename-for-in-4b82b800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Adrian%20Tobey%20WordPress%20SMTP%20Service%2C%20Email%20Delivery%20Solved!%20%E2%80%94%20MailHawk&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31014-improper-control-of-filename-for-in-cb099717</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31014%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3434-cwe-79-improper-neutralization-of-in-1d3df565</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20Amazon%20SES%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54eec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3512-cwe-122-heap-based-buffer-overflow-in-the-qt-company-qt-befffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3512%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20The%20Qt%20Company%20Qt&amp;severity=medium&amp;id=682d983ec4522896dcbefffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2636-cwe-22-improper-limitation-of-a-path-65fad1b0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2636%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=critical&amp;id=699f6b25b7ef31ef0b54e9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0120-cwe-250-execution-with-unnecessary-privileges-in-palo-alto-networks-globalprotect-app-bebafe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0120%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=682d9837c4522896dcbebafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-11-2adc6a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-11&amp;severity=medium&amp;id=682c7db4e8347ec82d2adc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-11-f12fd8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29918-cwe-835-loop-with-unreachable-exit--dd04711b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29918%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20OISF%20suricata&amp;severity=medium&amp;id=69091542c28fd46ded7bb2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32699-cwe-79-improper-neutralization-of-i-f27aab98</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=690909fb7fff0e30cee434ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32698-cwe-200-exposure-of-sensitive-infor-fae80722</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32698%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20MediaWiki&amp;severity=low&amp;id=690909fb7fff0e30cee434ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27350-improper-neutralization-of-input-du-213cf6f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hugh%20Mungus%20Vice%20Versa&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31411-improper-limitation-of-a-pathname-t-5bbd1ff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31411%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aribhour%20Linet%20ERP-Woocommerce%20Integration&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22279-improper-control-of-filename-for-in-4137db8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22279%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetCompareWishlist&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32282-cross-site-request-forgery-csrf-in--b6ec7f68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32282%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ShareThis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32275-authentication-bypass-by-spoofing-i-897d98c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32275%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=null&amp;id=69cd73bfe6bfc5ba1def37c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32260-missing-authorization-in-detheme-de-08f557fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32260%3A%20Missing%20Authorization%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=69cd73bce6bfc5ba1def366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32259-missing-authorization-in-alimir-wp--f72f23f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32259%3A%20Missing%20Authorization%20in%20Alimir%20WP%20ULike&amp;severity=null&amp;id=69cd73bce6bfc5ba1def366b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32244-missing-authorization-in-quantumclo-9a67d70e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32244%3A%20Missing%20Authorization%20in%20QuantumCloud%20SEO%20Help&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32243-missing-authorization-in-toast-plug-427bd0fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32243%3A%20Missing%20Authorization%20in%20Toast%20Plugins%20Internal%20Link%20Optimiser&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32240-missing-authorization-in-wpvsingh-s-8d05550a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32240%3A%20Missing%20Authorization%20in%20wpvsingh%20Site%20Notify&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32236-missing-authorization-in-vagonic-wo-dcb8afec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32236%3A%20Missing%20Authorization%20in%20Vagonic%20Woocommerce%20Products%20Reorder%20Drag%20Drop%20Multiple%20Sort%20%E2%80%93%20Sortable%2C%20Rearrange%20Products%20Vagonic&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32230-improper-neutralization-of-script-r-678363a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32230%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Themeum%20Tutor%20LMS&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32228-exposure-of-sensitive-system-inform-fb24fd13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32228%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32227-authentication-bypass-by-spoofing-i-eb70fd75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32227%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Asgaros%20Asgaros%20Forum&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32221-missing-authorization-in-spider-the-63f24fb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32221%3A%20Missing%20Authorization%20in%20Spider%20Themes%20EazyDocs&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32216-missing-authorization-in-spider-the-c984a3bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32216%3A%20Missing%20Authorization%20in%20Spider%20Themes%20Spider%20Elements&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def344a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32215-unrestricted-upload-of-file-with-da-1c6e5184</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32215%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32213-missing-authorization-in-flothemesp-1dcfe039</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32213%3A%20Missing%20Authorization%20in%20flothemesplugins%20Flo%20Forms&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32212-missing-authorization-in-specia-the-6644189c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32212%3A%20Missing%20Authorization%20in%20Specia%20Theme%20Specia%20Companion&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32210-missing-authorization-in-creativemi-28c4e375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32210%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20Registration%20and%20Invitation%20Codes&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32209-improper-limitation-of-a-pathname-t-ada73927</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32209%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20totalprocessing%20Nomupay%20Payment%20Processing%20Gateway&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32206-unrestricted-upload-of-file-with-da-2696662a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32206%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20LABCAT%20Processing%20Projects&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32205-improper-limitation-of-a-pathname-t-f552cf18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32205%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32202-unrestricted-upload-of-file-with-da-0d21ea30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32202%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Brian%20Batt%20-%20elearningfreak.com%20Insert%20or%20Embed%20Articulate%20Content%20into%20WordPress&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32199-improper-neutralization-of-input-du-5ce3b55a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32199%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyale-vc%20Contact%20Form%20Builder%20by%20vcita&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32198-improper-neutralization-of-input-du-912d85ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32198%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32160-improper-control-of-filename-for-in-d74854c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32160%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ashan%20Perera%20EventON&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32158-improper-control-of-filename-for-in-cba499c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32158%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32145-deserialization-of-untrusted-data-i-6c401e55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32145%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def324f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32140-unrestricted-upload-of-file-with-da-e19894dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32140%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Nirmal%20Kumar%20Ram%20WP%20Remote%20Thumbnail&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32139-improper-neutralization-of-input-du-8b588ace</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32139%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FooPlugins%20FooBox%20Image%20Lightbox&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32128-improper-neutralization-of-special--bf610bac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32128%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aaronfrey%20Nearby%20Locations&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32119-improper-neutralization-of-special--68571fa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32119%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CardGate%20CardGate%20Payments%20for%20WooCommerce&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def319f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32116-improper-neutralization-of-input-du-c1028e27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32116%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Studi7%20QR%20Master&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32115-improper-neutralization-of-input-du-6114d2dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32115%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Popping%20Content%20Light&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32114-improper-neutralization-of-input-du-a6034af7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32114%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%205sterrenspecialist%20WordPress%205sterrenspecialist%20Plugin&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def316a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31524-incorrect-privilege-assignment-in-j-4b8a05b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31524%3A%20Incorrect%20Privilege%20Assignment%20in%20John%20James%20Jacoby%20WP%20User%20Profiles&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30582-improper-limitation-of-a-pathname-t-1eec1c48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30582%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aytechnet%20DyaPress%20ERP%2FCRM&amp;severity=null&amp;id=69cd72fee6bfc5ba1deefff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32687-improper-neutralization-of-special--57464b71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32687%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Magnigenie%20Review%20Stars%20Count%20For%20WooCommerce&amp;severity=null&amp;id=69cd73efe6bfc5ba1def424d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32668-improper-control-of-filename-for-in-6b0bd154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32668%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3417-cwe-862-missing-authorization-in-str-c9026665</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3417%3A%20CWE-862%20Missing%20Authorization%20in%20stringfold%20Embedder&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13909-cwe-89-improper-neutralization-of-s-e1916140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13909%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20accredible%20Accredible%20Certificates%20%26%20Open%20Badges&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2805-cwe-94-improper-control-of-generatio-4a7ed39e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2805%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vikashsrivastava1111989%20ORDER%20POST&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2719-cwe-862-missing-authorization-in-has-577996b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2719%3A%20CWE-862%20Missing%20Authorization%20in%20hasthemes%20Swatchly%20%E2%80%93%20WooCommerce%20Variation%20Swatches%20for%20Products%20(product%20attributes%3A%20Image%20swatch%2C%20Color%20swatches%2C%20Label%20swatches)&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2809-cwe-94-improper-control-of-generatio-94decae4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2809%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20azurecurve%20azurecurve%20Shortcodes%20in%20Comments&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10894-cwe-79-improper-neutralization-of-i-288316db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kendysond%20Payment%20Forms%20for%20Paystack&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3102-cwe-697-incorrect-comparison-in-brai-d7064982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3102%3A%20CWE-697%20Incorrect%20Comparison%20in%20brainstormforce%20OttoKit%3A%20All-in-One%20Automation%20Platform%20(Formerly%20SureTriggers)&amp;severity=high&amp;id=699f6b29b7ef31ef0b54eca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26330-cwe-863-incorrect-authorization-in--ace36425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26330%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Dell%20PowerScale%20OneFS&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27690-cwe-1393-use-of-default-password-in-0080b7a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27690%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Dell%20PowerScale%20OneFS&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58136-cwe-424-improper-protection-of-alternate-path-in-yiiframework-yii-beb7da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58136%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20yiiframework%20Yii&amp;severity=critical&amp;id=682d9837c4522896dcbeb7da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32728-cwe-440-expected-behavior-violation-in-openbsd-openssh-bd86b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32728%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20OpenBSD%20OpenSSH&amp;severity=medium&amp;id=682d9819c4522896dcbd86b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-10-2afea6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-10&amp;severity=medium&amp;id=682c7db4e8347ec82d2afea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-10-f12225</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f12225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30645-cwe-476-null-pointer-dereference-in-juniper-networks-junos-os-bf0925</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30645%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d983fc4522896dcbf0925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30644-cwe-122-heap-based-buffer-overflow-in-juniper-networks-junos-os-bd8fd4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30644%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d981ac4522896dcbd8fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21591-cwe-805-buffer-access-with-incorrect-length-value-in-juniper-networks-junos-os-bef68b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21591%3A%20CWE-805%3A%20Buffer%20Access%20with%20Incorrect%20Length%20Value%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d983dc4522896dcbef68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26888-missing-authorization-in-amir-helze-b2b825d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26888%3A%20Missing%20Authorization%20in%20Amir%20Helzer%20WooCommerce%20Multilingual%20%26%20Multicurrency&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3115-vulnerability-in-spotfire-spotfire-s-b74aed6c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3115%3A%20Vulnerability%20in%20Spotfire%20Spotfire%20Statistics%20Services&amp;severity=critical&amp;id=69132437f1a0d9a2f12d6760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32695-incorrect-privilege-assignment-in-m-f3ec84d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32695%3A%20Incorrect%20Privilege%20Assignment%20in%20Mestres%20do%20WP%20Checkout%20Mestres%20WP&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31383-cross-site-request-forgery-csrf-in--35c0a2cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31383%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sodena%20FrescoChat%20Live%20Chat&amp;severity=null&amp;id=69cd7345e6bfc5ba1def1701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31385-cross-site-request-forgery-csrf-in--33ec8ee0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31385%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20intelcaprep%20Site%20Table%20of%20Contents&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31002-unrestricted-upload-of-file-with-da-4c070d88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31002%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31003-exposure-of-sensitive-system-inform-90380d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31003%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Bogdan%20Bendziukov%20Squeeze&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31004-missing-authorization-in-crooverinc-44370c5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31004%3A%20Missing%20Authorization%20in%20Croover.inc%20Rich%20Table%20of%20Contents&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31005-cross-site-request-forgery-csrf-in--2ab7ed57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Uzair%20Easyfonts&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31008-improper-neutralization-of-input-du-3ea437d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Embeds%20For%20YouTube%20Plugin%20Support%20YouTube%20Embed&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31009-server-side-request-forgery-ssrf-in-4b576d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31009%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Jan%20Boddez%20IndieBlocks&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31012-missing-authorization-in-phil-age-g-a3b21e20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31012%3A%20Missing%20Authorization%20in%20Phil%20Age%20Gate&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31017-improper-neutralization-of-input-du-cd8f0b6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31017%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Noakes%20Nav%20Menu%20Manager&amp;severity=null&amp;id=69cd733be6bfc5ba1def0ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31020-improper-neutralization-of-input-du-b66bd2d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webliberty%20Simple%20Spoiler&amp;severity=null&amp;id=69cd733be6bfc5ba1def0ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31023-cross-site-request-forgery-csrf-in--9293d5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31023%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Purab%20Seo%20Meta%20Tags&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31026-cross-site-request-forgery-csrf-in--48eebe24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31026%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Austin%20Comment%20Validation%20Reloaded&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31032-cross-site-request-forgery-csrf-in--486c86b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31032%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pagopar%20-%20Grupo%20M%20S.A.%20Pagopar%20%E2%80%93%20WooCommerce%20Gateway&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31033-cross-site-request-forgery-csrf-in--ed3492ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31033%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adam%20Nowak%20Buddypress%20Humanity&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31034-cross-site-request-forgery-csrf-in--cb464ed4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31034%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AboZain%20Albanna%20Customize%20Login%20Page&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31035-improper-neutralization-of-input-du-6ec72693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benjamin%20Chris%20WP%20Editor.md%20%E2%80%93%20The%20Perfect%20WordPress%20Markdown%20Editor&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31038-cross-site-request-forgery-csrf-in--8e38483a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31038%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Essential%20Marketer%20Essential%20Breadcrumbs&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31042-missing-authorization-in-rtakao-san-86807fcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31042%3A%20Missing%20Authorization%20in%20rtakao%20Sandwich%20Adsense&amp;severity=null&amp;id=69cd7340e6bfc5ba1def146f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31375-cross-site-request-forgery-csrf-in--2a729ad2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31375%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bhoogterp%20Scheduled&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31377-missing-authorization-in-asaquzzama-e068854c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31377%3A%20Missing%20Authorization%20in%20Asaquzzaman%20mishu%20Woo%20Product%20Feed%20For%20Marketing%20Channels&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31382-cross-site-request-forgery-csrf-in--3aecd0a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theode%20Language%20Field&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31388-cross-site-request-forgery-csrf-in--4d17d8c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31388%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doa%20The%20World&amp;severity=null&amp;id=69cd7347e6bfc5ba1def173e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31390-cross-site-request-forgery-csrf-in--7463d8c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31390%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bdoga%20Social%20Crowd&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31391-cross-site-request-forgery-csrf-in--da29f73d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31391%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20regen%20Script%20Compressor&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31392-cross-site-request-forgery-csrf-in--57e177ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31392%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shameem%20Reza%20Smart%20Product%20Gallery%20Slider&amp;severity=null&amp;id=69cd7347e6bfc5ba1def174a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31393-cross-site-request-forgery-csrf-in--142abe7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31393%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vfvalent%20Social%20Bookmarking%20RELOADED&amp;severity=null&amp;id=69cd7347e6bfc5ba1def174d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31394-improper-neutralization-of-input-du-3a69ab3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31394%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kailey%20(trepmal)%20More%20Mime%20Type%20Filters&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31395-cross-site-request-forgery-csrf-in--b0967393</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31395%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a.ankit%20Easy%20Custom%20CSS&amp;severity=null&amp;id=69cd734ae6bfc5ba1def1896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31399-cross-site-request-forgery-csrf-in--c3387b57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31399%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chandan%20Garg%20CG%20Scroll%20To%20Top&amp;severity=null&amp;id=69cd734ae6bfc5ba1def1899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31400-cross-site-request-forgery-csrf-in--5ef93a3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31400%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20icyleaf%20WS%20Audio%20Player&amp;severity=null&amp;id=69cd734ae6bfc5ba1def189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31401-cross-site-request-forgery-csrf-in--93a3af8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31401%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mmetrodw%20MMX%20%E2%80%93%20Make%20Me%20Christmas&amp;severity=null&amp;id=69cd734ae6bfc5ba1def189f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31402-cross-site-request-forgery-csrf-in--0fd8acb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31402%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NewsBoard%20Plugin%20NewsBoard%20Post%20and%20RSS%20Scroller&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31404-cross-site-request-forgery-csrf-in--42cab642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31404%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wladyslaw%20Madejczyk%20AF%20Tell%20a%20Friend&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32476-cross-site-request-forgery-csrf-in--11f29421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32476%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blueinstyle%20Advanced%20Tag%20Lists&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32477-cross-site-request-forgery-csrf-in--0144cc79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32477%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jordi%20Salord%20WP-Easy%20Menu&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32478-cross-site-request-forgery-csrf-in--65584d2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32478%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mario%20Aguiar%20WP%20SexyLightBox&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32479-cross-site-request-forgery-csrf-in--c7dcaa58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32479%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ab-tools%20Flags%20Widget&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32480-cross-site-request-forgery-csrf-in--82760879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32480%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dalziel%20Windows%20Live%20Writer&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32481-cross-site-request-forgery-csrf-in--90f1ddcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32481%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ninotheme%20Nino%20Social%20Connect&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32482-cross-site-request-forgery-csrf-in--4f0870fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32482%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20quanganhdo%20Custom%20Smilies&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32483-improper-neutralization-of-input-du-fc87e0aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Salisbury%20Request%20Call%20Back&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32484-cross-site-request-forgery-csrf-in--310c6f53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32484%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mathieu%20Chartier%20WP-Planification&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32485-cross-site-request-forgery-csrf-in--c45d6ad7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32485%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bjoern%20WP%20Performance%20Pack&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32487-server-side-request-forgery-ssrf-in-72429d1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32487%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Joe%20Waymark&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32488-improper-neutralization-of-input-du-76906503</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aria%20Font&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32489-improper-neutralization-of-input-du-e27b7d50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20Wetterwarner&amp;severity=null&amp;id=69cd73c3e6bfc5ba1def38bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32492-improper-neutralization-of-input-du-ac639276</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32492%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eliot%20Akira%20Admin%20Menu%20Post%20List&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32493-improper-neutralization-of-input-du-96ed7aaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VibeThemes%20BP%20Social%20Connect&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32494-cross-site-request-forgery-csrf-in--e1e750e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32494%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bozdoz%20reCAPTCHA%20Jetpack&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32495-improper-neutralization-of-input-du-0e3a8215</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Waymark&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32496-cross-site-request-forgery-csrf-in--96bd9d3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32496%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Uncodethemes%20Ultra%20Demo%20Importer&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32497-cross-site-request-forgery-csrf-in--2cd6f43f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32497%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20squiter%20Spoiler%20Block&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32498-cross-site-request-forgery-csrf-in--98319390</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32498%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20oleglark%20VKontakte%20Cross-Post&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32499-improper-control-of-filename-for-in-ffbdced6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpWax%20Logo%20Showcase%20Ultimate&amp;severity=null&amp;id=69cd73cbe6bfc5ba1def3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32500-cross-site-request-forgery-csrf-in--d91f94cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32500%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sudavar%20Codescar%20Radio%20Widget&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32501-cwe-352-cross-site-request-forgery--7e0b07c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32501%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dimafreund%20Rentsyst&amp;severity=null&amp;id=6849b12023110031d41045f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32502-cross-site-request-forgery-csrf-in--b74138c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32502%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lemmentwickler%20ePaper%20Lister%20for%20Yumpu&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32503-improper-neutralization-of-input-du-bce6fca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jose%20Conti%20Link%20Shield&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32505-cross-site-request-forgery-csrf-in--4dbf66b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32505%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SCAND%20MultiMailer&amp;severity=null&amp;id=69cd73d0e6bfc5ba1def3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32518-cross-site-request-forgery-csrf-in--50f79190</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32518%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hossainawlad%20ALD%20Login%20Page&amp;severity=null&amp;id=69cd73d1e6bfc5ba1def3bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32543-improper-neutralization-of-input-du-63fa2770</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hivedigital%20Canonical%20Attachments&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32547-cross-site-request-forgery-csrf-in--1476117e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32547%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=null&amp;id=69cd73d8e6bfc5ba1def3d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32555-cross-site-request-forgery-csrf-in--22ac582d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Edamam%20SEO%2C%20Nutrition%20and%20Print%20for%20Recipes%20by%20Edamam&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32556-cross-site-request-forgery-csrf-in--073520f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32556%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sandor%20Kovacs%20Simple%20Post%20Meta%20Manager&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32563-cross-site-request-forgery-csrf-in--4b7da938</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32563%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dangrossman%20WP%20Calais%20Auto%20Tagger&amp;severity=null&amp;id=69cd73dae6bfc5ba1def3db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32570-improper-neutralization-of-input-du-80b601ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ChillPay%20ChillPay%20WooCommerce&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32575-cross-site-request-forgery-csrf-in--8094df52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32575%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20axew3%20WP%20w3all%20phpBB&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32576-cross-site-request-forgery-csrf-in--24878f00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32576%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Agence%20web%20Eoxia%20-%20Montpellier%20WP%20shop&amp;severity=null&amp;id=69cd73dde6bfc5ba1def3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32580-improper-neutralization-of-input-du-058be339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32581-improper-neutralization-of-input-du-d97897d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ankit%20Singla%20WordPress%20Spam%20Blocker&amp;severity=null&amp;id=69cd73dfe6bfc5ba1def3ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32591-cross-site-request-forgery-csrf-in--404dd34e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32591%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32597-cross-site-request-forgery-csrf-in--bae6d512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32597%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20George%20Sexton%20WordPress%20Events%20Calendar%20Plugin%20%E2%80%93%20connectDaily&amp;severity=null&amp;id=69cd73e1e6bfc5ba1def3f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32610-cross-site-request-forgery-csrf-in--318b613d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32610%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FolioVision%20Foliopress%20WYSIWYG&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32612-cross-site-request-forgery-csrf-in--cb2d84ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32612%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rafasashi%20User%20Session%20Synchronizer&amp;severity=null&amp;id=69cd73e2e6bfc5ba1def3f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32616-cross-site-request-forgery-csrf-in--f73be834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32616%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nimbata%20Nimbata%20Call%20Tracking&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32617-cross-site-request-forgery-csrf-in--ca9bba04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ydesignservices%20Multiple%20Location%20Google%20Map&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32621-cross-site-request-forgery-csrf-in--f41fc6e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vsourz%20Digital%20WP%20Map%20Route%20Planner&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32623-cross-site-request-forgery-csrf-in--d01ad260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plainware%20PlainInventory&amp;severity=null&amp;id=69cd73e4e6bfc5ba1def3fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32624-missing-authorization-in-czater-cza-82d3ae87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32624%3A%20Missing%20Authorization%20in%20czater%20Czater.pl%20%E2%80%93%20live%20chat%20i%20telefon&amp;severity=null&amp;id=69cd73e6e6bfc5ba1def3ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32640-improper-neutralization-of-input-du-83738bf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Ally&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32641-cross-site-request-forgery-csrf-in--9af31d11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32641%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anantaddons%20Anant%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def403c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32642-cross-site-request-forgery-csrf-in--67e2f4cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32642%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20appsbd%20Vite%20Coupon&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def403f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32644-cross-site-request-forgery-csrf-in--624bbedd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32644%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IP2Location%20IP2Location%20World%20Clock&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32645-cross-site-request-forgery-csrf-in--6b941f29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32645%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hiren%20Patel%20Custom%20Posts%20Order&amp;severity=null&amp;id=69cd73e8e6bfc5ba1def4045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32659-cross-site-request-forgery-csrf-in--d02e72fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32659%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fraudlabspro%20FraudLabs%20Pro%20for%20WooCommerce&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32661-cross-site-request-forgery-csrf-in--4b33f09f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32661%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Map%20Plugins%20Interactive%20US%20Map&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32664-cross-site-request-forgery-csrf-in--59202252</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32664%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashokbasnet%20Nepali%20Date%20Utilities&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32667-cross-site-request-forgery-csrf-in--8f94e13d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32667%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fromdoppler%20Doppler%20Forms&amp;severity=null&amp;id=69cd73ebe6bfc5ba1def40ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32669-cross-site-request-forgery-csrf-in--08c8c24c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32669%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MERGADO%20Mergado%20Pack&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32673-cross-site-request-forgery-csrf-in--6027171e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32673%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20epeken%20Epeken%20All%20Kurir&amp;severity=null&amp;id=69cd73ede6bfc5ba1def417c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32675-server-side-request-forgery-ssrf-in-9e4cd45f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32675%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20QuantumCloud%20SEO%20Help&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32676-improper-neutralization-of-special--729abe5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32676%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Picture-Planet%20GmbH%20Verowa%20Connect&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32677-improper-neutralization-of-special--0e7e8c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32677%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20solwininfotech%20WP%20Social%20Stream%20Designer&amp;severity=null&amp;id=69cd73ede6bfc5ba1def4188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32678-cross-site-request-forgery-csrf-in--c9d53979</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32678%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashish%20Ajani%20WP%20Show%20Stats&amp;severity=null&amp;id=69cd73ede6bfc5ba1def418b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32679-cross-site-request-forgery-csrf-in--a9e6da51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32679%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZealousWeb%20User%20Registration%20Using%20Contact%20Form%207&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32680-improper-neutralization-of-input-du-3e972f84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Grade%20Us%2C%20Inc.%20Review%20Stream&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32683-improper-neutralization-of-input-du-3fe03bb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32684-missing-authorization-in-romancode--29211d0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32684%3A%20Missing%20Authorization%20in%20RomanCode%20MapSVG&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32685-improper-neutralization-of-special--b18456d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32685%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aristo%20Rinjuang%20WP%20Inquiries&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32690-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-angelo-mandato-powerpress-podcasting-bdb342</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32690%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=682d981dc4522896dcbdb342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32691-server-side-request-forgery-ssrf-in-c44a5a40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32691%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20blubrry%20PowerPress%20Podcasting&amp;severity=null&amp;id=69cd73efe6bfc5ba1def4250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32692-improper-control-of-filename-for-in-831f1057</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32692%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20WP%20Subscription%20Forms&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32693-url-redirection-to-untrusted-site-o-a4d1e7d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32693%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32694-url-redirection-to-untrusted-site-o-c76a9ad1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32694%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Rustaurius%20Ultimate%20WP%20Mail&amp;severity=null&amp;id=69cd73f1e6bfc5ba1def42c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25023-cwe-266-incorrect-privilege-assignm-1e77f656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25023%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1968-cwe-613-insufficient-session-expiration-in-progress-software-corporation-sitefinity-bebfa2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1968%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Progress%20Software%20Corporation%20Sitefinity&amp;severity=high&amp;id=682d9838c4522896dcbebfa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31672-cwe-20-improper-input-validation-in-apache-software-foundation-apache-poi-2725d3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31672%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20POI&amp;severity=medium&amp;id=683076940acd01a2492725d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3100-cwe-79-improper-neutralization-of-in-1acb5657</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ec9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29988-cwe-121-stack-based-buffer-overflow-0e5cefec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29988%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20Dell%20Client%20Platform%20BIOS&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29394-n-a-in-n-a-bf5d94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32464-cwe-1025-comparison-using-wrong-factors-in-haproxy-haproxy-bf16a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32464%3A%20CWE-1025%20Comparison%20Using%20Wrong%20Factors%20in%20HAProxy%20HAProxy&amp;severity=medium&amp;id=682d9840c4522896dcbf16a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-09-2af85b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-09&amp;severity=medium&amp;id=682c7db4e8347ec82d2af85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-09-f12bfe</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27188-incorrect-authorization-cwe-863-in-adobe-adobe-commerce-bec923</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27188%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=medium&amp;id=682d9839c4522896dcbec923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12556-cwe-1321-in-elastic-kibana-3611eab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12556%3A%20CWE-1321%20in%20Elastic%20Kibana&amp;severity=high&amp;id=69a0a1b885912abc71d0a0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30290-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bd773a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30290%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682d9817c4522896dcbd773a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30282-improper-authentication-cwe-287-in-adobe-coldfusion-bf5d60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30282%3A%20Improper%20Authentication%20(CWE-287)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9848c4522896dcbf5d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30284-deserialization-of-untrusted-data-c-74e31853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30284%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68ba60380415b92ecddd1bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30294-improper-input-validation-cwe-20-in-adobe-coldfusion-bf5d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30294%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9848c4522896dcbf5d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30289-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-cwe-78-in-adobe-coldfusion-bf16c4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30289%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682d9840c4522896dcbf16c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30288-improper-access-control-cwe-284-in--6e8e11e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30288%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68ba60380415b92ecddd1bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24447-deserialization-of-untrusted-data-cwe-502-in-adobe-coldfusion-bf5d58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24447%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9848c4522896dcbf5d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30281-improper-access-control-cwe-284-in--c94e2999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30281%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=685ae8830e5630b102ff2e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3416-use-after-free-in-red-hat-red-hat-directory-server-11-25c231</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3416%3A%20Use%20After%20Free&amp;severity=low&amp;id=682f2c0b0acd01a24925c231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30295-heap-based-buffer-overflow-cwe-122--d76c0eb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30295%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30297-out-of-bounds-write-cwe-787-in-adob-18cb3231</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30297%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30304-out-of-bounds-write-cwe-787-in-adob-6949e348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30304%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30299-heap-based-buffer-overflow-cwe-122--566b2f97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30299%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30296-integer-underflow-wrap-or-wraparoun-784ac73b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30296%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30298-stack-based-buffer-overflow-cwe-121-4fc500fa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30298%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Adobe%20Framemaker&amp;severity=high&amp;id=69a0a1c585912abc71d0b701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27200-use-after-free-cwe-416-in-adobe-ani-4e95c46b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27200%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=high&amp;id=69a0a1c385912abc71d0b6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27199-heap-based-buffer-overflow-cwe-122--e02349f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27199%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=high&amp;id=69a0a1c185912abc71d0ac90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27198-heap-based-buffer-overflow-cwe-122--37e4de42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27198%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69a0a1c185912abc71d0ac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27196-heap-based-buffer-overflow-cwe-122--4a774f5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27196%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Premiere%20Pro&amp;severity=high&amp;id=69a0a1c185912abc71d0ac8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27193-heap-based-buffer-overflow-cwe-122--9a123a44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27193%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=high&amp;id=69a0a1c185912abc71d0ac81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27195-heap-based-buffer-overflow-cwe-122--48c0e5ba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27195%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Media%20Encoder&amp;severity=high&amp;id=69a0a1c185912abc71d0ac87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27194-out-of-bounds-write-cwe-787-in-adob-7874d9de</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27194%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Media%20Encoder&amp;severity=high&amp;id=69a0a1c185912abc71d0ac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27182-out-of-bounds-write-cwe-787-in-adob-6ca3e4ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27182%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=69a0a1c185912abc71d0ac7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27183-out-of-bounds-write-cwe-787-in-adobe-after-effects-bebfa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27183%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=high&amp;id=682d9838c4522896dcbebfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26682-cwe-770-allocation-of-resources-without-limits-or-throttling-in-microsoft-asp-net-core-8-0-aebb74</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26682%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Microsoft%20ASP.NET%20Core%208.0&amp;severity=high&amp;id=682cd0f91484d88663aebb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24062-cwe-20-improper-input-validation-in-microsoft-windows-server-2022-aebafe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24062%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24060-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebafc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24060%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29811-cwe-20-improper-input-validation-in-microsoft-windows-11-version-22h2-aebc47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29811%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29819-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-admin-center-in-azure-portal-aebc51</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29819%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Admin%20Center&amp;severity=medium&amp;id=682cd0f91484d88663aebc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29816-cwe-349-acceptance-of-extraneous-untrusted-data-with-trusted-data-in-microsoft-microsoft-office-2019-aebc4d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29816%3A%20CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29812-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-server-2022-aebc49</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29812%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29810-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aebc45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29810%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29805-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-microsoft-outlook-for-android-aebc34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29805%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Outlook%20for%20Android&amp;severity=high&amp;id=682cd0f91484d88663aebc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29808-cwe-1240-use-of-a-cryptographic-primitive-with-a-risky-implementation-in-microsoft-windows-server-2022-aebc36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29808%3A%20CWE-1240%3A%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=682cd0f91484d88663aebc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29809-cwe-922-insecure-storage-of-sensitive-information-in-microsoft-windows-10-version-1809-aebc38</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29809%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29804-cwe-284-improper-access-control-in-microsoft-microsoft-visual-studio-2022-version-17-13-aebc32</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29804%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=high&amp;id=682cd0f91484d88663aebc32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29801-cwe-276-incorrect-default-permissions-in-microsoft-microsoft-autoupdate-for-mac-aebc2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29801%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=682cd0f91484d88663aebc2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29802-cwe-427-uncontrolled-search-path-element-in-microsoft-microsoft-visual-studio-2022-version-17-8-aebc2e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29802%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=high&amp;id=682cd0f91484d88663aebc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29800-cwe-269-improper-privilege-management-in-microsoft-microsoft-autoupdate-for-mac-aebc2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29800%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=682cd0f91484d88663aebc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27739-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-aebbee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27739%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27738-cwe-284-improper-access-control-in-microsoft-windows-10-version-21h2-aebbec</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27738%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27737-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebbea</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27737%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27736-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-aebbe8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27736%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=682cd0f91484d88663aebbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27735-cwe-345-insufficient-verification-of-data-authenticity-in-microsoft-windows-10-version-1809-aebbdb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27735%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27733-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27733%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27732-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebbd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27732%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27730-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebbd3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27730%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27731-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebbd5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27731%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27728-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2025-server-core-installation-aebbcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27728%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f91484d88663aebbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27729-cwe-416-use-after-free-in-microsoft-windows-10-version-21h2-aebbd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27729%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27727-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aebbcd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27727%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27490-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2022-aebbbc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27490%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27491-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebbc9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27491%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27492-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-server-2022-aebbcb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27492%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27486-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebbb6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27486%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27489-cwe-20-improper-input-validation-in-microsoft-azure-stack-os-hci-aebbba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Stack%20HCI%20OS&amp;severity=high&amp;id=682cd0f91484d88663aebbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27487-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-app-client-for-windows-desktop-aebbb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27487%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f91484d88663aebbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27483-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbb0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27483%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27482-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-aebbae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27482%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aebbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27481-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebbac</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27481%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27480-cwe-416-use-after-free-in-microsoft-windows-server-2019-aebbaa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27480%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682cd0f91484d88663aebbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27484-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebbb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27484%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27485-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebbb4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27485%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27469-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb7e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27469%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27467-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb7c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27467%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26679-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb6e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26679%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26678-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aebb6c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26678%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26676-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-aebb5f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26676%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26675-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2022-aebb5d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26675%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26673-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26673%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26672-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aebb57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26672%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26674-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26674%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26671-cwe-416-use-after-free-in-microsoft-windows-server-2019-aebb55</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26671%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aebb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26670-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26670%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26652-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebb38</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26652%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26651-cwe-749-exposed-dangerous-method-or-function-in-microsoft-windows-server-2022-aebb36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26651%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682cd0f91484d88663aebb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26647-cwe-20-improper-input-validation-in-microsoft-windows-server-2019-aebb30</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26647%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aebb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26649-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-server-2022-aebb34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26649%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26648-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26648%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26644-cwe-1039-automated-recognition-mechanism-with-inadequate-detection-or-handling-of-adversarial-input-perturbations-in-microsoft-windows-10-version-1809-aebb2e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26644%3A%20CWE-1039%3A%20Automated%20Recognition%20Mechanism%20with%20Inadequate%20Detection%20or%20Handling%20of%20Adversarial%20Input%20Perturbations%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f91484d88663aebb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26641-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb1f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26641%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26640-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb1d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26640%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26642-cwe-125-out-of-bounds-read-in-microsoft-office-online-server-aebb21</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26642%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26637-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-aebb19</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26637%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26635-cwe-1390-weak-authentication-in-microsoft-windows-10-version-1809-aebb17</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26635%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f91484d88663aebb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26639-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2022-aebb1b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26639%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682cd0f91484d88663aebb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26628-cwe-522-insufficiently-protected-credentials-in-microsoft-azure-local-cluster-aebb15</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26628%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Local%20Cluster&amp;severity=high&amp;id=682cd0f91484d88663aebb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25002-cwe-532-insertion-of-sensitive-information-into-log-file-in-microsoft-azure-local-cluster-aebb13</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25002%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Azure%20Local%20Cluster&amp;severity=medium&amp;id=682cd0f91484d88663aebb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24058-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebafa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24058%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21222-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebaf6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21222%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21221-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebaf4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21221%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21204-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2025-aebaf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21204%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21203-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-aebae3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21203%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21205-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebaf2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21205%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21191-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-server-2025-aebadf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21191%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21197-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aebae1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21197%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21174-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebadd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21174%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24073-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebb00</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24073%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24074-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aebb02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24074%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29824-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebc66</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29824%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebc66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29823-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aebc64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29823%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29822-cwe-184-incomplete-list-of-disallowed-inputs-in-microsoft-microsoft-office-2019-aebc57</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29822%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29820-cwe-416-use-after-free-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29820%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29821-cwe-20-improper-input-validation-in-microsoft-microsoft-dynamics-365-business-central-2024-wave-1-2024-aebc55</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29821%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Business%20Central%202023%20Wave%202&amp;severity=medium&amp;id=682cd0f91484d88663aebc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29794-cwe-285-improper-authorization-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc26</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29794%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aebc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29792-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29792%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29793-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29793%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f91484d88663aebc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29791-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-office-2019-aebc15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29791%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27750-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc0f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27750%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27752-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-2019-aebc13</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27752%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27751-cwe-416-use-after-free-in-microsoft-office-online-server-aebc11</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27751%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27743-cwe-426-untrusted-search-path-in-microsoft-system-center-virtual-machine-manager-2022-aebbf6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27743%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20System%20Center%20Data%20Protection%20Manager%202019&amp;severity=high&amp;id=682cd0f91484d88663aebbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27749-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc0d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27749%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27747-cwe-822-untrusted-pointer-dereference-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aebc09</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27747%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27748-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebc0b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27748%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27746-cwe-416-use-after-free-in-microsoft-office-online-server-aebc07</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27746%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27745-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aebbfa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27745%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f91484d88663aebbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27742-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbf4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27742%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27744-cwe-284-improper-access-control-in-microsoft-microsoft-office-2016-aebbf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27744%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Office%202016&amp;severity=high&amp;id=682cd0f91484d88663aebbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27741-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebbf2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27741%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27740-cwe-1390-weak-authentication-in-microsoft-windows-server-2019-aebbf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27740%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f91484d88663aebbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27479-cwe-410-insufficient-resource-pool-in-microsoft-windows-server-2019-aebb9d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27479%3A%20CWE-410%3A%20Insufficient%20Resource%20Pool%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682cd0f91484d88663aebb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27478-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb9b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27478%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27477-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb99</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27477%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27475-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-11-version-22h2-aebb95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27475%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f91484d88663aebb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27476-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb97</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27476%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27474-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-server-2019-aebb93</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27474%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27472-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1507-aebb8f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27472%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27473-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-aebb91</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27473%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27470-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebb8b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27470%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27471-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb8d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27471%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f91484d88663aebb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26688-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb7a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26688%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26687-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb78</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26687%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=682cd0f91484d88663aebb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26686-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb76</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26686%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26680-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-aebb70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26680%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012%20R2&amp;severity=high&amp;id=682cd0f91484d88663aebb70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26681-cwe-416-use-after-free-in-microsoft-windows-server-2022-aebb72</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26681%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=682cd0f91484d88663aebb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26668-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb4f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26668%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26667-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-server-2019-aebb4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26667%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26669-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aebb51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26669%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26666-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aebb40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26666%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f91484d88663aebb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26665-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aebb3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26665%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26664-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-aebb3c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26664%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=medium&amp;id=682cd0f91484d88663aebb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26663-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aebb3a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26663%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f91484d88663aebb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32279-missing-authorization-in-shahjada-l-06cd180d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32279%3A%20Missing%20Authorization%20in%20Shahjada%20Live%20Forms&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32211-improper-neutralization-of-input-du-b5916d75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32211%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def343e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32164-exposure-of-sensitive-system-inform-619fd008</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32164%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20maennchen1.de%20m1.DownloadList&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32117-improper-neutralization-of-input-du-9948aa0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48887-escalation-of-privilege-in-fortinet-8ec37622</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48887%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSwitch&amp;severity=critical&amp;id=69a0a1b985912abc71d0a0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27082-vulnerability-in-hewlett-packard-en-5f7027ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27082%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Aruba%20Networking%20AOS&amp;severity=high&amp;id=69a0a1c185912abc71d0ac7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27079-vulnerability-in-hewlett-packard-en-624c69ab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27079%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-10%20AP&amp;severity=medium&amp;id=69a0a1c185912abc71d0ac78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27078-vulnerability-in-hewlett-packard-en-97264b91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27078%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20AOS-10%20AP&amp;severity=medium&amp;id=69a0a1c185912abc71d0ac75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1095-cwe-119-improper-restriction-of-oper-17cb7d3d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1095%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20IBM%20Personal%20Communications&amp;severity=high&amp;id=68b4f7b8ad5a09ad00c726f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22461-cwe-89-improper-neutralization-of-s-0386ef99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22461%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22458-cwe-427-uncontrolled-search-path-element-in-ivanti-endpoint-manager-aeb8a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22458%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=682cd0f81484d88663aeb8a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26013-improper-access-control-in-fortinet-fdcd1e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26013%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=69a0a1b885912abc71d0a0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32122-information-disclosure-in-fortinet--dd96f6f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32122%3A%20Information%20disclosure%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=691ca899209f2030fa01698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54024-escalation-of-privilege-in-fortinet-ac85ea7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54024%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiIsolator&amp;severity=high&amp;id=69a0a1b985912abc71d0a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54025-escalation-of-privilege-in-fortinet-c0da5a11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54025%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiIsolator&amp;severity=medium&amp;id=69a0a1b985912abc71d0a0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25254-execute-unauthorized-code-or-comman-1f2718fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25254%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2876-cwe-862-missing-authorization-in-mel-557c6b5e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2876%3A%20CWE-862%20Missing%20Authorization%20in%20melapress%20MelaPress%20Login%20Security%20Premium&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2568-cwe-862-missing-authorization-in-the-b5bc7544</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2568%3A%20CWE-862%20Missing%20Authorization%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2883-cwe-200-exposure-of-sensitive-inform-489f6272</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2883%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zealopensource%20Accept%20SagePay%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3437-cwe-862-missing-authorization-in-sty-57f67e00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3437%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2808-cwe-79-improper-neutralization-of-in-c111a714</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2807-cwe-862-missing-authorization-in-sty-18cee495</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2807%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30280-cwe-204-observable-response-discrep-f1bc2996</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30280%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Siemens%20Mendix%20Runtime%20V10&amp;severity=medium&amp;id=68487f551b0bd07c3938a258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3064-cwe-352-cross-site-request-forgery-c-e4c479a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3064%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20syammohanm%20WPFront%20User%20Role%20Editor&amp;severity=high&amp;id=699f6b27b7ef31ef0b54ebca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3436-cwe-89-improper-neutralization-of-sp-d33f6228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3436%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gdragon%20coreActivity%3A%20Activity%20Logging%20for%20WordPress&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3433-cwe-601-url-redirection-to-untrusted-697276ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3433%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20smartdevth%20Advanced%20Advertising%20System&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3432-cwe-79-improper-neutralization-of-in-7140f103</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elpix%20AAWP%20Obfuscator&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eeb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22017-vulnerability-in-linux-linux-be7e76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22016-vulnerability-in-linux-linux-be7e72</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22015-vulnerability-in-linux-linux-be7e6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22014-vulnerability-in-linux-linux-be7e5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22013-vulnerability-in-linux-linux-be8f1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22012-vulnerability-in-linux-linux-be8f0f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22011-vulnerability-in-linux-linux-be8f02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22010-vulnerability-in-linux-linux-be8eeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22009-vulnerability-in-linux-linux-be8ee7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22008-vulnerability-in-linux-linux-be8ee3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2882-cwe-200-exposure-of-sensitive-inform-9d467943</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2882%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20greenmoney%20GreenPay(tm)%20by%20Green.Money&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3431-cwe-73-external-control-of-file-name-1dd8ebb9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3431%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=699f6b2bb7ef31ef0b54eeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31330-cwe-94-improper-control-of-generati-252470df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31330%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20Landscape%20Transformation%20(Analysis%20Platform)&amp;severity=critical&amp;id=69a0a1c685912abc71d0ba58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30016-cwe-921-storage-of-sensitive-data-i-b87cfaed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30016%3A%20CWE-921%3A%20Storage%20of%20Sensitive%20Data%20in%20a%20Mechanism%20without%20Access%20Control%20in%20SAP_SE%20SAP%20Financial%20Consolidation&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30013-cwe-94-improper-control-of-generati-fccabf84</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30013%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20in%20SAP_SE%20SAP%20ERP%20BW%20Business%20Content&amp;severity=medium&amp;id=69a0a1c385912abc71d0b6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27429-cwe-94-improper-control-of-generati-da6b29a2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27429%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20S%2F4HANA%20(Private%20Cloud)&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26654-cwe-319-cleartext-transmission-of-s-c4dc5876</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26654%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SAP_SE%20SAP%20Commerce%20Cloud%20(Public%20Cloud)&amp;severity=medium&amp;id=69a0a1bf85912abc71d0ac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23186-cwe-94-improper-control-of-generati-0c23bc35</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23186%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP&amp;severity=high&amp;id=69a0a1bf85912abc71d0ac32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3428-cwe-89-improper-neutralization-of-sp-cb9584c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3430-cwe-89-improper-neutralization-of-sp-a0a7f9a1</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3430%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eeb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3429-cwe-89-improper-neutralization-of-sp-634f63e9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3429%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3427-cwe-89-improper-neutralization-of-sp-8c36dfa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3427%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=medium&amp;id=699f6b2bb7ef31ef0b54eea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20946-cwe-269-improper-privilege-manageme-9dd56e37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20946%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69a0a1bb85912abc71d0a14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20936-cwe-285-improper-authorization-in-s-8ac21f7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20936%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69a0a1bb85912abc71d0a14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2004-cwe-73-external-control-of-file-name-2239d279</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2004%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpminds%20Simple%20WP%20Events&amp;severity=critical&amp;id=699f6b1db7ef31ef0b54e3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13820-cwe-200-exposure-of-sensitive-infor-bdca3d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13820%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20melhorenvio%20Melhor%20Envio&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2519-cwe-22-improper-limitation-of-a-path-8b094e6e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2519%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iqonicdesign%20Streamit&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2525-cwe-434-unrestricted-upload-of-file--8ea73fa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2525%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20iqonicdesign%20Streamit&amp;severity=high&amp;id=699f6b23b7ef31ef0b54e8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2526-cwe-639-authorization-bypass-through-2fa32afe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2526%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20iqonicdesign%20Streamit&amp;severity=high&amp;id=699f6b23b7ef31ef0b54e8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32414-cwe-393-return-of-wrong-status-code-e67ce8c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32414%3A%20CWE-393%20Return%20of%20Wrong%20Status%20Code%20in%20xmlsoft%20libxml2&amp;severity=medium&amp;id=690909fb7fff0e30cee434bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-08-2b00e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-08&amp;severity=medium&amp;id=682c7db4e8347ec82d2b00e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-08-f123be</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f123be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0942-cwe-89-improper-neutralization-of-sp-bb8e78c8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0942%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jalios%20JPlatform&amp;severity=high&amp;id=690a7f07327a9365e24ec81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29769-cwe-122-heap-based-buffer-overflow-in-libvips-libvips-bed630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29769%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20libvips%20libvips&amp;severity=high&amp;id=682d983ac4522896dcbed630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3377-buffer-overflow-in-pcman-ftp-server-bd6c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3377%3A%20Buffer%20Overflow%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9816c4522896dcbd6c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31476-cwe-79-improper-neutralization-of-i-742ed962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AmauriC%20tarteaucitron.js&amp;severity=medium&amp;id=684b454f358c65714e6b022b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3248-cwe-306-missing-authentication-for-critical-function-in-langflow-ai-langflow-bdad02</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3248%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20langflow-ai%20langflow&amp;severity=critical&amp;id=682d981cc4522896dcbdad02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2251-deserialization-of-untrusted-data-in-red-hat-red-hat-jboss-enterprise-application-platform-7-bf15d2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2251%3A%20Deserialization%20of%20Untrusted%20Data&amp;severity=medium&amp;id=682d9840c4522896dcbf15d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3360-integer-overflow-or-wraparound-in-re-5bdc6ff3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3360%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=low&amp;id=686904636f40f0eb72a92976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3359-improper-check-for-unusual-or-exceptional-conditions-272495</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3359%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&amp;severity=medium&amp;id=68306f8e0acd01a249272495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21447-cwe-129-improper-validation-of-arra-18c4d54f</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21447%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21443-cwe-120-buffer-copy-without-checkin-d5928475</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21443%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21442-cwe-680-integer-overflow-to-buffer--1ba0ac14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21442%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21441-cwe-787-out-of-bounds-write-in-qual-8f87e1ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21441%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21440-cwe-787-out-of-bounds-write-in-qual-a08a5bcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21440%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21439-cwe-787-out-of-bounds-write-in-qual-07823965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21439%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21438-cwe-125-out-of-bounds-read-in-qualc-520d80bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21438%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21437-cwe-416-use-after-free-in-qualcomm--7ae9715b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21437%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21436-cwe-416-use-after-free-in-qualcomm--1173ac7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21436%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21429-cwe-126-buffer-over-read-in-qualcom-1b0343d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21429%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bd85912abc71d0a190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21428-cwe-126-buffer-over-read-in-qualcom-051364e9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21428%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21425-cwe-284-improper-access-control-in--0d88b54b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21425%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21423-cwe-129-improper-validation-of-arra-012944f3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21423%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21421-cwe-126-buffer-over-read-in-qualcom-6bef18ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21421%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1bb85912abc71d0a150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49848-cwe-416-use-after-free-in-qualcomm--e277662f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49848%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=69a0a1b985912abc71d0a0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45557-cwe-823-use-of-out-of-range-pointer-ae0009e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45557%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1b885912abc71d0a0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43067-cwe-367-time-of-check-time-of-use-t-0a442af6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43067%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a1b885912abc71d0a0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30473-cwe-89-improper-neutralization-of-s-6eb79eca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Common%20SQL%20Provider&amp;severity=high&amp;id=69a0a1c585912abc71d0b70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31174-cwe-22-improper-limitation-of-a-pat-7164520d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31174%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31171-cwe-200-exposure-of-sensitive-infor-dd99d603</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31171%3A%20CWE-862%20Missing%20Authorization%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=6842df031a426642debc949d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20662-cwe-125-out-of-bounds-read-in-media-9e1e7dee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20662%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT9972&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20661-cwe-125-out-of-bounds-read-in-media-a24240ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20661%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT9972&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20660-cwe-125-out-of-bounds-read-in-media-98d1bb20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20660%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT9972&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20659-cwe-125-out-of-bounds-read-in-media-32c2cf62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20659%3A%20CWE-125%20Out-of-bounds%20Read%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6835T%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8678%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8791T%2C%20MT8796%2C%20MT8797%2C%20MT8798%2C%20MT8863&amp;severity=medium&amp;id=6994829080d747be20bad13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20657-cwe-787-out-of-bounds-write-in-medi-0c7fbd66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20657%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6885%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8791T&amp;severity=medium&amp;id=69a0a1bb85912abc71d0a13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20654-cwe-787-out-of-bounds-write-in-medi-e6338fdf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20654%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7622%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=69a0a1b985912abc71d0a0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29481-na-b8d515f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29481%3A%20n%2Fa&amp;severity=medium&amp;id=699eab2eb7ef31ef0be8930a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29480-na-032c807f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29480%3A%20n%2Fa&amp;severity=medium&amp;id=6880f613ad5a09ad00266d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-07-2af512</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-07&amp;severity=medium&amp;id=682c7db4e8347ec82d2af512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-07-f12726</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-trademark-related-invoice-f0c544</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20trademark-related%20invoice&amp;severity=low&amp;id=682acdbebbaf20d303f0c544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3323-sql-injection-in-godcheese-nimrod-43f5c52e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3323%3A%20SQL%20Injection%20in%20godcheese%20Nimrod&amp;severity=medium&amp;id=687936e6a83201eaace7c2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1264-cwe-89-improper-neutralization-of-sp-e19a56f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1264%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aioseo%20Broken%20Link%20Checker%20by%20AIOSEO%20%E2%80%93%20Easily%20Fix%2FMonitor%20Internal%20and%20External%20links&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-06-2af207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-06&amp;severity=medium&amp;id=682c7db4e8347ec82d2af207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-06-f122c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2941-cwe-22-improper-limitation-of-a-path-b3e9f8b5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2941%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20WooCommerce&amp;severity=critical&amp;id=699f6b27b7ef31ef0b54ebab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2789-cwe-862-missing-authorization-in-wcm-df557683</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2789%3A%20CWE-862%20Missing%20Authorization%20in%20wcmp%20MultiVendorX%20%E2%80%93%20Empower%20Your%20WooCommerce%20Store%20with%20a%20Dynamic%20Multivendor%20Marketplace%20%E2%80%93%20Build%20the%20Next%20Amazon%2C%20eBay%2C%20Etsy&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1233-cwe-862-missing-authorization-in-alt-e727ebdb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1233%3A%20CWE-862%20Missing%20Authorization%20in%20AlThemist%20Lafka%20Plugin&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0839-cwe-79-improper-neutralization-of-in-6d6ae2ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55542d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13776-cwe-862-missing-authorization-in-zo-e0138653</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13776%3A%20CWE-862%20Missing%20Authorization%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a0734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2933-cwe-862-missing-authorization-in-awe-3c509c1f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2933%3A%20CWE-862%20Missing%20Authorization%20in%20aweos%20Email%20Notifications%20for%20Updates&amp;severity=high&amp;id=699f6b27b7ef31ef0b54eba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2544-cwe-79-improper-neutralization-of-in-47a93a37</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2544%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamwillhoeft%20AI%20Content%20Pipelines%3A%20Content%20Engine%20%2B%20Analytics&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13604-cwe-200-exposure-of-sensitive-infor-df5b36c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13604%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20logoninc%20KB%20Support%20%E2%80%93%20Customer%20Support%20Ticket%20%26%20Helpdesk%20Plugin%2C%20Knowledge%20Base%20Plugin&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0810-cwe-352-cross-site-request-forgery-c-cb90f77d</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0810%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edmonparker%20Read%20More%20%26%20Accordion&amp;severity=high&amp;id=699f6b6bb7ef31ef0b555412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1500-cwe-434-unrestricted-upload-of-file--755db737</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1500%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20IBM%20Maximo%20Application%20Suite&amp;severity=medium&amp;id=689a2234ad5a09ad00274f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32365-cwe-125-out-of-bounds-read-in-freed-daeb72b6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32365%3A%20CWE-125%20Out-of-bounds%20Read%20in%20freedesktop%20Poppler&amp;severity=medium&amp;id=690909fb7fff0e30cee434ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32364-cwe-190-integer-overflow-or-wraparo-5d6d3e9e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32364%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20freedesktop%20Poppler&amp;severity=medium&amp;id=690909fb7fff0e30cee434b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-05-2b070a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-05&amp;severity=medium&amp;id=682c7db5e8347ec82d2b070a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-05-f12b9d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2889-cwe-79-improper-neutralization-of-in-214661c1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11235-cwe-416-use-after-free-in-php-group-1d275969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11235%3A%20CWE-416%20Use%20After%20Free%20in%20PHP%20Group%20PHP&amp;severity=critical&amp;id=69a0a1b885912abc71d0a0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32178-missing-authorization-in-6storage-6-590e121c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32178%3A%20Missing%20Authorization%20in%206Storage%206Storage%20Rentals&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32239-missing-authorization-in-joao-romao-5a6aa644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32239%3A%20Missing%20Authorization%20in%20Joao%20Romao%20Social%20Share%20Buttons%20%26%20Analytics%20Plugin%20%E2%80%93%20GetSocial.io&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32224-missing-authorization-in-shivam-man-a2765d75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32224%3A%20Missing%20Authorization%20in%20Shivam%20Mani%20Tripathi%20Privyr%20CRM%20Integration&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def351a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32280-cross-site-request-forgery-csrf-in--19362668</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32280%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32278-cross-site-request-forgery-csrf-in--d5731849</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32278%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wprio%20Table%20Block%20by%20RioVizual&amp;severity=null&amp;id=69cd73c0e6bfc5ba1def37d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32277-missing-authorization-in-ateeq-rafe-7b13e83f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32277%3A%20Missing%20Authorization%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=null&amp;id=69cd73bfe6bfc5ba1def37cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32276-cross-site-request-forgery-csrf-in--a79ef3d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32276%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd73bfe6bfc5ba1def37ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32274-cross-site-request-forgery-csrf-in--4f333153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20axew3%20WP%20w3all%20phpBB&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32273-cross-site-request-forgery-csrf-in--1f57ec36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32273%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20freetobook%20Freetobook%20Responsive%20Widget&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32272-cross-site-request-forgery-csrf-in--e31300b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32271-cross-site-request-forgery-csrf-in--19c4d5b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32271%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ablancodev%20Woocommerce%20Role%20Pricing&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32270-cross-site-request-forgery-csrf-in--6f8aec31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32270%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Broadstreet%20Broadstreet%20Ads&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32269-cross-site-request-forgery-csrf-in--b836f4c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32269%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20WP%20Zendesk%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32268-cross-site-request-forgery-csrf-in--992c18e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32268%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20www.15.to%20QR%20Code%20Tag%20for%20WC&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32267-cross-site-request-forgery-csrf-in--39abec0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32267%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpzinc%20Post%20to%20Social%20Media%20%E2%80%93%20WordPress%20to%20Hootsuite&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32266-cross-site-request-forgery-csrf-in--173735d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32266%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20404%20Image%20Redirection%20(Replace%20Broken%20Images)&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32265-cross-site-request-forgery-csrf-in--e9d0b693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32265%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hossni%20Mubarak%20JobWP&amp;severity=null&amp;id=69cd73bde6bfc5ba1def36a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32264-cross-site-request-forgery-csrf-in--97f74f58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32264%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saiful%20Islam%20UltraAddons%20Elementor%20Lite&amp;severity=null&amp;id=69cd73bce6bfc5ba1def367a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32263-cross-site-request-forgery-csrf-in--578cc9d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32263%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BeRocket%20Sequential%20Order%20Numbers%20for%20WooCommerce&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32262-cross-site-request-forgery-csrf-in--ba5445d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32262%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Robert%20D%20Payne%20RDP%20Wiki%20Embed&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32261-cross-site-request-forgery-csrf-in--d32a08bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32261%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kuppuraj%20Advanced%20All%20in%20One%20Admin%20Search%20by%20WP%20Spotlight&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32258-missing-authorization-in-infogiants-27f96800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32258%3A%20Missing%20Authorization%20in%20InfoGiants%20Simple%20Website%20Logo&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32257-exposure-of-sensitive-system-inform-5b9c8fad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32257%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%201clickmigration%201%20Click%20WordPress%20Migration&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32256-missing-authorization-in-devsoftbal-66278343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32256%3A%20Missing%20Authorization%20in%20devsoftbaltic%20SurveyJS&amp;severity=null&amp;id=69cd73bce6bfc5ba1def3662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32255-exposure-of-sensitive-system-inform-8ec78427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32255%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ERA404%20StaffList&amp;severity=null&amp;id=69cd73bce6bfc5ba1def365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32254-missing-authorization-in-iqonic-des-fac61385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32254%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20WPBookit&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32253-missing-authorization-in-commotion--7971ef3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32253%3A%20Missing%20Authorization%20in%20ComMotion%20Course%20Booking%20System&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32252-missing-authorization-in-black-and--8e17540b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32252%3A%20Missing%20Authorization%20in%20Black%20and%20White%20WP%20Genealogy%20%E2%80%93%20Your%20Family%20History%20Website&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32251-exposure-of-sensitive-system-inform-5151fbb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32251%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20J.%20Tyler%20Wiest%20Jetpack%20Feedback%20Exporter&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32249-cross-site-request-forgery-csrf-in--06ff4fc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32249%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Designinvento%20DirectoryPress&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32248-cross-site-request-forgery-csrf-in--0fd8a288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32248%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SwiftXR%20SwiftXR%20(3D%2FAR%2FVR)%20Viewer&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32247-cross-site-request-forgery-csrf-in--357854e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32247%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ABCdatos%20AI%20Content%20Creator&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32246-missing-authorization-in-tim-nguyen-a5652c09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32246%3A%20Missing%20Authorization%20in%20Tim%20Nguyen%201-Click%20Backup%20%26amp%3B%20Restore%20Database&amp;severity=null&amp;id=69cd73b9e6bfc5ba1def35b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32241-cross-site-request-forgery-csrf-in--fc2d8eef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32241%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CleverReach%C2%AE%20Official%20CleverReach%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32238-generation-of-error-message-contain-502f3bb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32238%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def357c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32237-missing-authorization-in-stylemix-m-a508cfce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32237%3A%20Missing%20Authorization%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32235-missing-authorization-in-sonaar-mp3-09a4e5f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32235%3A%20Missing%20Authorization%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32234-missing-authorization-in-aleswebs-a-7de8657e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32234%3A%20Missing%20Authorization%20in%20aleswebs%20AdMail%20%E2%80%93%20Multilingual%20Back%20in-Stock%20Notifier%20for%20WooCommerce&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def3570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32233-missing-authorization-in-wp-chill-r-36e780ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32233%3A%20Missing%20Authorization%20in%20WP%20Chill%20Revive.so&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def356d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32232-missing-authorization-in-era404-sta-239ff881</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32232%3A%20Missing%20Authorization%20in%20ERA404%20StaffList&amp;severity=null&amp;id=69cd73b6e6bfc5ba1def356a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32229-missing-authorization-in-bowo-varia-a9aeb94c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32229%3A%20Missing%20Authorization%20in%20Bowo%20Variable%20Inspector&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32226-missing-authorization-in-anzar-ahme-d8841da7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32226%3A%20Missing%20Authorization%20in%20Anzar%20Ahmed%20Display%20product%20variations%20dropdown%20on%20shop%20page&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def351d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32220-missing-authorization-in-dimitri-gr-4bba03e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32220%3A%20Missing%20Authorization%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32219-missing-authorization-in-syntactics-1fb59d43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32219%3A%20Missing%20Authorization%20in%20Syntactics%2C%20Inc.%20eaSYNC&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def3511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32218-missing-authorization-in-realmag777-c161c17e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32218%3A%20Missing%20Authorization%20in%20RealMag777%20TableOn&amp;severity=null&amp;id=69cd73b4e6bfc5ba1def350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32217-missing-authorization-in-wp-messiah-ce40f2b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32217%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def344d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32207-improper-neutralization-of-input-du-e331e813</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32207%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Cost%20Of%20Goods&amp;severity=null&amp;id=69cd73b2e6bfc5ba1def3435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32204-improper-neutralization-of-special--a42e2946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32204%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rocketelements%20Split%20Test%20For%20Elementor&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32203-improper-neutralization-of-special--91d0ad75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32203%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20manu225%20Falling%20things&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32201-missing-authorization-in-xpro-xpro--df97af22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32201%3A%20Missing%20Authorization%20in%20Xpro%20Xpro%20Theme%20Builder&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32197-improper-neutralization-of-input-du-8a5581f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32196-improper-neutralization-of-input-du-5d46d20b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32196%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32195-improper-neutralization-of-input-du-8cdc7ed0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32195%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart%20Ecwid%20Shopping%20Cart&amp;severity=null&amp;id=69cd73b0e6bfc5ba1def33dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32194-improper-neutralization-of-input-du-9b7a0ddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LA-Studio%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32193-improper-neutralization-of-input-du-09359a01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32193%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPMinds%20Simple%20WP%20Events&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32192-improper-neutralization-of-input-du-f66c4c3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32192%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UltraPress%20Ultra%20Addons%20Lite%20for%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32191-improper-neutralization-of-input-du-56bcbd6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32191%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20News%20Element%20Elementor%20Blog%20Magazine&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32190-improper-neutralization-of-input-du-72419077</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartwpress%20Musician&apos;s%20Pack%20For%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32189-improper-neutralization-of-input-du-0c4eed7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32189%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Best%20WP%20Developer%20BWD%20Elementor%20Addons&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32188-improper-neutralization-of-input-du-257ac5a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32188%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=null&amp;id=69cd73afe6bfc5ba1def33a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32187-improper-neutralization-of-input-du-7ecb0552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32187%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd73afe6bfc5ba1def339f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32186-improper-neutralization-of-input-du-45a422c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32186%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Turbo%20Addons%20Turbo%20Addons%20Elementor&amp;severity=null&amp;id=69cd73afe6bfc5ba1def339c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32185-improper-neutralization-of-input-du-0af0a234</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32185%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Extend%20Themes%20Colibri%20Page%20Builder&amp;severity=null&amp;id=69cd73afe6bfc5ba1def3399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32184-improper-neutralization-of-input-du-144e0dd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32184%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32183-improper-neutralization-of-input-du-3b733c25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32183%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Galaxy%20Weblinks%20Video%20Playlist%20For%20YouTube&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32182-improper-neutralization-of-input-du-1ef2e4ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32182%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spider%20Themes%20Spider%20Elements&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32181-improper-neutralization-of-input-du-5c11e463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32181%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fast%20Simon%20Search%2C%20Filters%20%26%20Merchandising%20for%20WooCommerce&amp;severity=null&amp;id=69cd73ade6bfc5ba1def334f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32179-improper-neutralization-of-input-du-e70184ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32179%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Maps%20for%20WP&amp;severity=null&amp;id=69cd73ade6bfc5ba1def334c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32177-improper-neutralization-of-input-du-ffba9934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32177%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pgn4web%20Embed%20Chessboard&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32176-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gallerycreator-gallery-blocks-with-lightbox-bf7762</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32176%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GalleryCreator%20SimpLy%20Gallery&amp;severity=null&amp;id=682d984ac4522896dcbf7762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32175-improper-neutralization-of-input-du-ae354623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32175%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vektor%2CInc.%20VK%20Filter%20Search&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32174-improper-neutralization-of-input-du-e3e79fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32174%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tockify%20Tockify%20Events%20Calendar&amp;severity=null&amp;id=69cd73ade6bfc5ba1def3340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32173-improper-neutralization-of-input-du-4c7c07aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32173%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20B%20Blocks&amp;severity=null&amp;id=69cd73ade6bfc5ba1def333d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32172-improper-neutralization-of-input-du-e159808b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32172%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yuri%20Baranov%20YaMaps%20for%20WordPress&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32171-improper-neutralization-of-input-du-74da4111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32171%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imtiaz%20Rayhan%20Table%20Block%20by%20Tableberg&amp;severity=null&amp;id=69cd73abe6bfc5ba1def332d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32170-improper-neutralization-of-input-du-fb9d0ffc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32170%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stylemix%20Motors&amp;severity=null&amp;id=69cd73abe6bfc5ba1def332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32169-improper-neutralization-of-input-du-926e4117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32169%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Suresh%20Prasad%20Showeblogin%20Social&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32168-improper-neutralization-of-input-du-a9ca0060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32168%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeYatri%20Gutenify&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32167-improper-neutralization-of-input-du-4153185c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32167%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devsoftbaltic%20SurveyJS&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32166-improper-neutralization-of-input-du-08682f98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32166%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20John%20Housholder%20Emma%20for%20WordPress&amp;severity=null&amp;id=69cd73abe6bfc5ba1def331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32165-improper-neutralization-of-input-du-dee4e540</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32165%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fromdoppler%20Doppler%20Forms&amp;severity=null&amp;id=69cd73abe6bfc5ba1def331b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32163-improper-neutralization-of-input-du-9168a1b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32163%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=null&amp;id=69cd73abe6bfc5ba1def3315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32161-improper-neutralization-of-input-du-2cac0749</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32161%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryo%20Arkhe%20Blocks&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32159-improper-control-of-filename-for-in-780fe993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32159%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32157-improper-control-of-filename-for-in-e352f44c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32157%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Jakub%20Glos%20Sparkle%20Elementor%20Kit&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def32a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32156-improper-control-of-filename-for-in-382a8600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32156%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20Post%20Preview%20Widget&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def329d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32155-improper-control-of-filename-for-in-9947d01d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32155%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def329a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32154-improper-control-of-filename-for-in-4107dbc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32154%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Catch%20Themes%20Catch%20Dark%20Mode&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def3297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32153-improper-control-of-filename-for-in-256a34ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32153%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vinagecko%20VG%20WooCarousel&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def3294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32152-cwe-98-improper-control-of-filename-for-include-require-statement-in-php-program-php-remote-file-inclusion-in-essential-plugins-by-wp-onlinesupport-slider-a-sliderspack-bd672c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32152%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Essential%20Plugin%20Slider%20a%20SlidersPack&amp;severity=null&amp;id=682d9816c4522896dcbd672c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32151-improper-control-of-filename-for-in-15100116</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32151%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Themekraft%20BuddyForms&amp;severity=null&amp;id=69cd73a9e6bfc5ba1def3291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32150-improper-control-of-filename-for-in-882b8aba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32150%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def325e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32149-improper-neutralization-of-special--91b535f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32149%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20winkm89%20teachPress&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def325b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32148-improper-neutralization-of-special--25d747ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32148%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Daisycon%20Daisycon%20prijsvergelijkers&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32147-missing-authorization-in-coothemes--de4f594f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32147%3A%20Missing%20Authorization%20in%20coothemes%20Easy%20WP%20Optimizer&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32146-improper-control-of-filename-for-in-1400bf2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32146%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32142-improper-control-of-filename-for-in-56ad54ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32142%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Stylemix%20Motors&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32141-improper-control-of-filename-for-in-1794f27f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32141%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=69cd73a7e6bfc5ba1def3243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32138-improper-restriction-of-xml-externa-c7836597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32138%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20supsystic%20Easy%20Google%20Maps&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32137-relative-path-traversal-in-cristin--aba394d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32137%3A%20Relative%20Path%20Traversal%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32135-improper-neutralization-of-input-du-c44f0d80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32135%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rocketelements%20Split%20Test%20For%20Elementor&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32134-improper-neutralization-of-input-du-d56ea341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32134%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KaizenCoders%20URL%20Shortify&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32133-improper-neutralization-of-input-du-8a49916b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32133%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32131-improper-neutralization-of-input-du-c991420e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialintents%20Social%20Intents&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32130-improper-neutralization-of-input-du-1fbba044</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32130%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Posts%20Footer%20Manager&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32129-improper-neutralization-of-input-du-96ebc09b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32129%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Welcome%20Bar&amp;severity=null&amp;id=69cd73a6e6bfc5ba1def31de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32127-improper-neutralization-of-special--3d12530d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32127%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20onOffice%20GmbH%20onOffice%20for%20WP-Websites&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32126-improper-neutralization-of-special--27892640</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32126%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cmsMinds%20Pay%20with%20Contact%20Form%207&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32125-improper-neutralization-of-special--7ecd3cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32125%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silvasoft%20Silvasoft%20boekhouden&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32124-improper-neutralization-of-special--6941ff6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32124%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32122-improper-neutralization-of-special--2e8c20bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32122%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32121-improper-neutralization-of-special--7ce10150</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32121%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SuitePlugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32120-improper-neutralization-of-special--713adc04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32120%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20edanzer%20Easy%20Query%20%E2%80%93%20WP%20Query%20Builder&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def31a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32118-unrestricted-upload-of-file-with-da-f262a36d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32118%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NiteoThemes%20CMP%20%E2%80%93%20Coming%20Soon%20%26%20Maintenance&amp;severity=null&amp;id=69cd73a4e6bfc5ba1def319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32113-cross-site-request-forgery-csrf-in--fb3f3f83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32113%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Renzo%20Tejada%20Libro%20de%20Reclamaciones%20y%20Quejas&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32112-cross-site-request-forgery-csrf-in--7a73903a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32112%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Sidebar%20Manager%20Light&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31130-cwe-328-use-of-weak-hash-in-gitoxid-383b1d89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31130%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20GitoxideLabs%20gitoxide&amp;severity=medium&amp;id=6973adf94623b1157c52be9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22285-missing-authorization-in-enituretec-80e68509</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22285%3A%20Missing%20Authorization%20in%20enituretechnology%20Pallet%20Packaging%20for%20WooCommerce&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22281-improper-neutralization-of-input-du-435ace55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22281%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joshix%20Simplish&amp;severity=null&amp;id=69cd75d5e6bfc5ba1df07fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31381-missing-authorization-in-shiptrack--772f160f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31381%3A%20Missing%20Authorization%20in%20shiptrack%20Booking%20Calendar%20and%20Notification&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2798-cwe-269-improper-privilege-managemen-f75c0f94</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2798%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20XTENDIFY%20Woffice%20CRM&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31389-improper-neutralization-of-input-du-2f4e9606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Introvoke%20Inc.%20dba%20Sequel.io%20Sequel&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31403-improper-neutralization-of-special--c93d9cc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31403%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shiptrack%20Booking%20Calendar%20and%20Notification&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31405-improper-control-of-filename-for-in-e6281cf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31405%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zankover%20Fami%20WooCommerce%20Compare&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31416-improper-neutralization-of-input-du-80eedd72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31416%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31420-incorrect-privilege-assignment-in-t-0f5df71c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31420%3A%20Incorrect%20Privilege%20Assignment%20in%20Tomdever%20wpForo%20Forum&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31421-insertion-of-sensitive-information--f9c0971e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31421%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Oblak%20Studio%20Srbtranslatin&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3243-sql-injection-in-code-projects-patient-record-management-system-becfe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3243%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3242-sql-injection-in-phpgurukul-e-diary-management-system-aec6e0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3242%3A%20SQL%20Injection%20in%20PHPGurukul%20e-Diary%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22282-improper-neutralization-of-input-du-91c1c050</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22282%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keksdieb%20ez%20Form%20Calculator%20Premium&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1865-cwe-284-in-elaborate-bytes-ag-virtua-edb9f1e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1865%3A%20CWE-284%20in%20Elaborate%20Bytes%20AG%20Virtual%20CloneDrive&amp;severity=high&amp;id=686c340d6f40f0eb72ecc5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3235-sql-injection-in-phpgurukul-old-age-home-management-system-befa7a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3235%3A%20SQL%20Injection%20in%20PHPGurukul%20Old%20Age%20Home%20Management%20System&amp;severity=medium&amp;id=682d983ec4522896dcbefa7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3231-sql-injection-in-phpgurukul-zoo-mana-fa55a08f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3231%3A%20SQL%20Injection%20in%20PHPGurukul%20Zoo%20Management%20System&amp;severity=medium&amp;id=68418437182aa0cae2dccc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3105-cwe-269-improper-privilege-managemen-e6dd21aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3105%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20TangibleWP%20Vehica%20Core&amp;severity=high&amp;id=699f6b29b7ef31ef0b54ecaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2780-cwe-434-unrestricted-upload-of-file--4b8997a0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2780%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WofficeIO%20Woffice%20Core&amp;severity=high&amp;id=68487f5a1b0bd07c3938b49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2797-cwe-352-cross-site-request-forgery-c-e484dffe</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2797%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WofficeIO%20Woffice%20Core&amp;severity=medium&amp;id=68487f5b1b0bd07c3938bc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3087-cwe-79-improper-neutralization-of-in-5ea86fdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20M-Files%20Web&amp;severity=medium&amp;id=699c3036be58cf853b75f149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3086-cwe-653-in-m-files-corporation-m-fil-91afd790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3086%3A%20CWE-653%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3036be58cf853b75f145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2159-cwe-79-improper-neutralization-of-in-7a1682f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20M-Files%20Admin&amp;severity=medium&amp;id=699c3036be58cf853b75f141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3211-sql-injection-in-code-projects-patient-record-management-system-becfd0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3211%3A%20SQL%20Injection%20in%20code-projects%20Patient%20Record%20Management%20System&amp;severity=medium&amp;id=682d9839c4522896dcbecfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13708-cwe-434-unrestricted-upload-of-file-b19565d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13708%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=699f6e6ab7ef31ef0b5a03be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2270-cwe-22-improper-limitation-of-a-path-c5c11d4d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2270%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adamskaat%20Countdown%2C%20Coming%20Soon%2C%20Maintenance%20%E2%80%93%20Countdown%20%26%20Clock&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2836-cwe-79-improper-neutralization-of-in-af470651</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13898-cwe-79-improper-neutralization-of-i-6263ef8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rpetersen29%20Simple%20Banner%20%E2%80%93%20Easily%20add%20multiple%20Banners%2FBars%2FNotifications%2FAnnouncements%20to%20the%20top%20or%20bottom%20of%20your%20website&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13645-cwe-94-improper-control-of-generati-9efb10d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13645%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=critical&amp;id=699f6e64b7ef31ef0b59fdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2317-cwe-89-improper-neutralization-of-sp-a4d38e60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Filter%20by%20WBW&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3192-server-side-request-forgery-ssrf-in--91681d31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3192%3A%20Server-side%20Request%20Forgery%20(SSRF)%20in%20spatie%2Fbrowsershot&amp;severity=high&amp;id=68460b9671f4d251b56ac5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13744-cwe-434-unrestricted-upload-of-file-163f6ee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13744%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=699f6e6cb7ef31ef0b5a05f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2075-cwe-862-missing-authorization-in-unc-9f9417dc</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2075%3A%20CWE-862%20Missing%20Authorization%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3196-stack-based-buffer-overflow-in-open--39e4882d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3196%3A%20Stack-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=6880a8b9ad5a09ad00232529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29796-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-for-ios-aebc28</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29796%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20iOS&amp;severity=medium&amp;id=682cd0f91484d88663aebc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29815-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-aebc4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29815%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f91484d88663aebc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25001-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-edge-for-ios-aebb11</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25001%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Edge%20for%20iOS&amp;severity=medium&amp;id=682cd0f91484d88663aebb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-04-2b049f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-04&amp;severity=medium&amp;id=682c7db5e8347ec82d2b049f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-04-f11fd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25000-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aebb0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25000%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f91484d88663aebb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3173-sql-injection-in-project-worlds-online-lawyer-management-system-aeb88c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3173%3A%20SQL%20Injection%20in%20Project%20Worlds%20Online%20Lawyer%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3165-deserialization-in-thu-pacman-chitu-bf84cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3165%3A%20Deserialization%20in%20thu-pacman%20chitu&amp;severity=medium&amp;id=682d984bc4522896dcbf84cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3163-code-injection-in-internlm-lmdeploy-bf84c6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3163%3A%20Code%20Injection%20in%20InternLM%20LMDeploy&amp;severity=medium&amp;id=682d984bc4522896dcbf84c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22457-cwe-121-stack-based-buffer-overflow-in-ivanti-connect-secure-bf161e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22457%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=critical&amp;id=682d9840c4522896dcbf161e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29987-cwe-1220-insufficient-granularity-o-c19b9159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29987%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Dell%20DD%20OS%208.3&amp;severity=high&amp;id=69a0a1c385912abc71d0b6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3162-deserialization-in-internlm-lmdeploy-bf84b5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3162%3A%20Deserialization%20in%20InternLM%20LMDeploy&amp;severity=medium&amp;id=682d984bc4522896dcbf84b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32053-buffer-over-read-aecb97</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32053%3A%20Buffer%20Over-read&amp;severity=medium&amp;id=682cd0fc1484d88663aecb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32052-buffer-over-read-aecb95</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32052%3A%20Buffer%20Over-read&amp;severity=medium&amp;id=682cd0fc1484d88663aecb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32051-improper-check-for-unusual-or-exceptional-conditions-bd7333</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32051%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions&amp;severity=medium&amp;id=682d9817c4522896dcbd7333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32050-buffer-under-read-aecb93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32050%3A%20Buffer%20Under-read&amp;severity=medium&amp;id=682cd0fc1484d88663aecb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32049-allocation-of-resources-without-limits-or-throttling-bd732f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32049%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=high&amp;id=682d9817c4522896dcbd732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3155-inclusion-of-functionality-from-untrusted-control-sphere-in-red-hat-red-hat-enterprise-linux-8-aec927</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3155%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=high&amp;id=682cd0fb1484d88663aec927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31911-improper-neutralization-of-special--153d3706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31911%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20Social%20Share%20And%20Social%20Locker&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31909-missing-authorization-in-apptivo-ap-0bd7da7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31909%3A%20Missing%20Authorization%20in%20Apptivo%20Apptivo%20Business%20Site%20CRM&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def315b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31907-improper-neutralization-of-input-du-50bf732a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Labib%20Ahmed%20Team%20Builder&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31905-improper-neutralization-of-input-du-1f111146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20O&apos;Donnell%20Team%20Rosters&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31903-improper-neutralization-of-input-du-b8ffe1bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xavi%20Ivars%20XV%20Random%20Quotes&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def310b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31902-improper-neutralization-of-input-du-4ea41d39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31902%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20Social%20Share%20And%20Social%20Locker&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31901-improper-neutralization-of-input-du-261d9a27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31901%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Digihood%20Digihood%20HTML%20Sitemap&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31899-improper-neutralization-of-input-du-0a256895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpshopee%20Awesome%20Logos&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31898-improper-neutralization-of-input-du-5e81f355</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dustinscarberry%20MediaView&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def30ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31896-missing-authorization-in-istmoplugi-3c73f95f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31896%3A%20Missing%20Authorization%20in%20istmoplugins%20GetBookingsWP&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31893-improper-neutralization-of-input-du-43942076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cheesefather%20Botnet%20Attack%20Blocker&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31876-missing-authorization-in-gunnarpayd-5496ebf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31876%3A%20Missing%20Authorization%20in%20gunnarpayday%20Payday&amp;severity=null&amp;id=69cd739ce6bfc5ba1def302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31858-missing-authorization-in-matthewrub-681f202f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31858%3A%20Missing%20Authorization%20in%20matthewrubin%20Local%20Magic&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31841-missing-authorization-in-frank-p-wa-17a54a2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31841%3A%20Missing%20Authorization%20in%20Frank%20P.%20Walentynowicz%20FPW%20Category%20Thumbnails&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31827-improper-limitation-of-a-pathname-t-666891b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31827%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vlad.olaru%20Fonto&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31825-improper-limitation-of-a-pathname-t-6ae6c3af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31825%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pixelgrade%20Category%20Icon&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31795-missing-authorization-in-plugin-dev-e00ad6e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31795%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20Shopify%20to%20WooCommerce%20Migration&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31794-missing-authorization-in-web-ready--a1d09327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31794%3A%20Missing%20Authorization%20in%20Web%20Ready%20Now%20WR%20Price%20List%20Manager%20For%20Woocommerce&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31789-cwe-862-missing-authorization-in-matat-technologies-textme-sms-bd672a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31789%3A%20Missing%20Authorization%20in%20Matat%20Technologies%20TextMe%20SMS&amp;severity=null&amp;id=682d9816c4522896dcbd672a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31768-missing-authorization-in-otwthemes--ebba8187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31768%3A%20Missing%20Authorization%20in%20OTWthemes%20Widget%20Manager%20Light&amp;severity=null&amp;id=69cd737de6bfc5ba1def2575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31758-missing-authorization-in-binarycarp-e969ffca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31758%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Free%20Woocommerce%20Product%20Table%20View&amp;severity=null&amp;id=69cd737be6bfc5ba1def2509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31746-missing-authorization-in-think201-c-ced1ad0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31746%3A%20Missing%20Authorization%20in%20Think201%20Clients&amp;severity=null&amp;id=69cd7375e6bfc5ba1def23a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31739-missing-authorization-in-manuel-sch-f436913d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31739%3A%20Missing%20Authorization%20in%20Manuel%20Schmalstieg%20Minimalistic%20Event%20Manager&amp;severity=null&amp;id=69cd7375e6bfc5ba1def238d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31736-missing-authorization-in-richtexted-f9584f10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31736%3A%20Missing%20Authorization%20in%20richtexteditor%20Rich%20Text%20Editor&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31729-missing-authorization-in-jeffikus-w-fd8f7308</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31729%3A%20Missing%20Authorization%20in%20jeffikus%20WooTumblog&amp;severity=null&amp;id=69cd7373e6bfc5ba1def230e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31626-improper-neutralization-of-input-du-93facc40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M.%20Ali%20Saleem%20Support%20Helpdesk%20Ticket%20System%20Lite&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31622-improper-neutralization-of-input-du-1d4874dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Utkarsh%20Kukreti%20Advanced%20Typekit&amp;severity=null&amp;id=69cd7371e6bfc5ba1def220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31582-improper-neutralization-of-input-du-81d936f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashish%20Ajani%20Contact%20Form%20vCard%20Generator&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31581-missing-authorization-in-sandeep-ku-a3260314</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31581%3A%20Missing%20Authorization%20in%20Sandeep%20Kumar%20WP%20Video%20Playlist&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31573-improper-neutralization-of-input-du-fb531cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepro%20Dev.%20Group%20PeproDev%20CF7%20Database&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31558-insertion-of-sensitive-information--a93ebaca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31558%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Greg%20TailPress&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31541-missing-authorization-in-turitop-tu-53ecb8c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31541%3A%20Missing%20Authorization%20in%20TuriTop%20TuriTop%20Booking%20System&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31536-improper-neutralization-of-input-du-de1d69a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moshensky%20CF7%20Spreadsheets&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31468-improper-neutralization-of-input-du-6840e0ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31468%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottsm%20WP_Identicon&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31467-improper-neutralization-of-input-du-efba1259</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miro.mannino%20Flickr%20Photostream&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31442-improper-neutralization-of-input-du-9bf832e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e1tekoap42%20Search%20engine%20keywords%20highlighter&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31436-improper-neutralization-of-input-du-add11fc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31436%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Angelo%20Mandato%20Blubrry%20PowerPress%20Podcasting%20plugin%20MultiSite%20add-on&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31098-improper-control-of-filename-for-in-72538a6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31098%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=null&amp;id=69cd7344e6bfc5ba1def154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31091-improper-neutralization-of-input-du-63ceaa7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Header%20and%20Footer&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30916-missing-authorization-in-enituretec-ad618873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30916%3A%20Missing%20Authorization%20in%20enituretechnology%20Residential%20Address%20Detection&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30915-missing-authorization-in-enituretec-28fa9767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30915%3A%20Missing%20Authorization%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30908-cross-site-request-forgery-csrf-in--099cd264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30908%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30889-deserialization-of-untrusted-data-i-04002a09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30889%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Testimonial%20Slider&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30858-improper-neutralization-of-input-du-345cbb86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Snow%20Storm&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30616-improper-neutralization-of-input-du-81713664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Wood%20Latest%20Custom%20Post%20Type%20Updates&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30611-improper-neutralization-of-input-du-2071ec88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptobe%20Wptobe-signinup&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30596-improper-limitation-of-a-pathname-t-1c130acc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30596%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tstafford%20include-file&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2945-vulnerability-in-pgadminorg-pgadmin--e1efede0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2945%3A%20Vulnerability%20in%20pgadmin.org%20pgAdmin%204&amp;severity=critical&amp;id=69a0a1c385912abc71d0b6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9416-cwe-79-improper-neutralization-of-in-56b7fd91</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9416%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Modula%20Image%20Gallery&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2299-cwe-79-improper-neutralization-of-in-329c616b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theluckywp%20LuckyWP%20Table%20of%20Contents&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1663-cwe-79-improper-neutralization-of-in-71873357</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2874-cwe-79-improper-neutralization-of-in-11f7daef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20User%20Submitted%20Posts%20%E2%80%93%20Enable%20Users%20to%20Submit%20Posts%20from%20the%20Front%20End&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13673-cwe-79-improper-neutralization-of-i-8862a629</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13673%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bigboomdesign%20Big%20Boom%20Directory&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22007-vulnerability-in-linux-linux-be8edf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22006-vulnerability-in-linux-linux-be8edb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22005-vulnerability-in-linux-linux-be8ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22004-vulnerability-in-linux-linux-be8ed3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22003-vulnerability-in-linux-linux-be8ecf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22002-vulnerability-in-linux-linux-be8ecb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22001-vulnerability-in-linux-linux-be8ec7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22000-vulnerability-in-linux-linux-be8eb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21999-vulnerability-in-linux-linux-be8eb0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21998-vulnerability-in-linux-linux-be8eac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21997-vulnerability-in-linux-linux-be8e9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21996-vulnerability-in-linux-linux-be8e8c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21995-vulnerability-in-linux-linux-be8e84</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3146-sql-injection-in-phpgurukul-bus-pass-48b7ab70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3146%3A%20SQL%20Injection%20in%20PHPGurukul%20Bus%20Pass%20Management%20System&amp;severity=medium&amp;id=69137fc747ab359031a1e1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2784-out-of-bounds-read-in-red-hat-red-hat-enterprise-linux-10-aecba6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2784%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=682cd0fc1484d88663aecba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31161-cwe-305-authentication-bypass-by-primary-weakness-in-crushftp-crushftp-bf7d37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31161%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20CrushFTP%20CrushFTP&amp;severity=critical&amp;id=682d984bc4522896dcbf7d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22931-n-a-in-n-a-bf7aa5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984bc4522896dcbf7aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22930-n-a-in-n-a-bf7a9d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22930%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22929-n-a-in-n-a-bf7a8c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22929%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22928-n-a-in-n-a-bf7a84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22928%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22927-n-a-in-n-a-bf7a7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22927%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-03-2b2b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-03&amp;severity=medium&amp;id=682c7db5e8347ec82d2b2b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-03-f1212b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30218-cwe-200-exposure-of-sensitive-infor-ff277068</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30218%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vercel%20next.js&amp;severity=low&amp;id=68ed1ec2e2beed89262b47a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31285-cwe-269-improper-privilege-mangemen-ce7b6b5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31285%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31284-cwe-269-improper-privilege-mangemen-ff51657e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31284%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31283-cwe-269-improper-privilege-mangemen-d948852a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31283%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=69a0a1c685912abc71d0ba47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31282-cwe-269-improper-privilege-mangement-in-trend-micro-inc-trend-vision-one-bebfaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31282%3A%20CWE-269%3A%20Improper%20Privilege%20Mangement%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Vision%20One&amp;severity=medium&amp;id=682d9838c4522896dcbebfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0014-cwe-276-incorrect-default-permissions-in-amd-amd-ryzen-ai-software-bf161a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0014%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20AI%20Software&amp;severity=high&amp;id=682d9840c4522896dcbf161a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0154-cwe-644-improper-neutralization-of-h-35282908</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0154%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20TXSeries%20for%20Multiplatforms&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31722-vulnerability-in-jenkins-project-je-99adaf81</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31722%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Templating%20Engine%20Plugin&amp;severity=high&amp;id=69a0a1c885912abc71d0ba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25051-cwe-613-insufficient-session-expira-963767b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25051%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20Jazz%20Reporting%20Service&amp;severity=medium&amp;id=69a0a1b885912abc71d0a0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21994-vulnerability-in-linux-linux-be8e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50385-cwe-459-incomplete-cleanup-in-stmic-1ad45490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50385%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee23598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50384-cwe-459-incomplete-cleanup-in-stmic-cc9b7e67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50384%3A%20CWE-459%3A%20Incomplete%20Cleanup%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee23594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50595-cwe-191-integer-underflow-wrap-or-w-12344ef4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50595%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee235a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50594-cwe-191-integer-underflow-wrap-or-w-4a00ea59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50594%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908517fff0e30cee2359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50597-cwe-191-integer-underflow-wrap-or-w-c7f47a9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50597%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908537fff0e30cee23900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50596-cwe-191-integer-underflow-wrap-or-w-e96700b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50596%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20STMicroelectronics%20X-CUBE-AZRT-H7RS&amp;severity=medium&amp;id=690908537fff0e30cee238fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21993-vulnerability-in-linux-linux-be8e72</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21992-vulnerability-in-linux-linux-be8e6a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21991-vulnerability-in-linux-linux-bdd3db</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21990-vulnerability-in-linux-linux-be8e62</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21989-vulnerability-in-linux-linux-be8e40</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21988-vulnerability-in-linux-linux-be8e3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21987-vulnerability-in-linux-linux-be8e2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2842-exposure-of-sensitive-information-to-an-unauthorized-actor-270038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2842%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682f99000acd01a249270038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2786-exposure-of-sensitive-information-to-an-unauthorized-actor-270036</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2786%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682f99000acd01a249270036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3097-cwe-79-improper-neutralization-of-in-2b20d3d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3097%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulgpetty%20wp%20Time%20Machine&amp;severity=medium&amp;id=699f6b27b7ef31ef0b54ebd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3063-cwe-862-missing-authorization-in-sho-66624cc2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3063%3A%20CWE-862%20Missing%20Authorization%20in%20shopperapprovedapp%20Shopper%20Approved%20Reviews&amp;severity=high&amp;id=699f6b27b7ef31ef0b54ebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2483-cwe-79-improper-neutralization-of-in-c96fe8e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2483%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobcares_plugins%20Gift%20Certificate%20Creator&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13637-cwe-862-missing-authorization-in-ro-7350ed1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13637%3A%20CWE-862%20Missing%20Authorization%20in%20romik84%20Demo%20Awesome&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12410-cwe-89-improper-neutralization-of-s-bca1b334</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12410%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2513-cwe-79-improper-neutralization-of-in-643a77b0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartpixels%20Smart%20Icons%20For%20WordPress&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3098-cwe-79-improper-neutralization-of-in-2159ed19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ulshamim%20Video%20Url&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ec90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3099-cwe-352-cross-site-request-forgery-c-39e49c6a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3099%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dbejean%20Advanced%20Search%20by%20My%20Solr%20Server&amp;severity=medium&amp;id=699f6b29b7ef31ef0b54ec96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2005-cwe-434-unrestricted-upload-of-file--fc7fd52d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2005%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rustaurius%20Front%20End%20Users&amp;severity=critical&amp;id=699f6b1db7ef31ef0b54e3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2779-cwe-862-missing-authorization-in-htp-51672a7d</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2779%3A%20CWE-862%20Missing%20Authorization%20in%20htplugins%20Insert%20Headers%20and%20Footers%20Code%20%E2%80%93%20HT%20Script&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3069-inappropriate-implementation-in-goog-eb18c37e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3069%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a1c885912abc71d0ba9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3068-inappropriate-implementation-in-goog-fd4abe53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3068%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a1c885912abc71d0ba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3067-inappropriate-implementation-in-goog-a56973f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3067%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68be1ecce3f0bafba8aa56b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3066-use-after-free-in-google-chrome-940d057b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3066%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a1c885912abc71d0ba95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-02-2b831b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-02&amp;severity=medium&amp;id=682c7db6e8347ec82d2b831b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-02-f12bc2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31135-cwe-20-improper-input-validation-in-49442506</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31135%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20phires%20go-guerrilla&amp;severity=medium&amp;id=697a92d04623b1157cf6c713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31819-improper-neutralization-of-input-du-2d7565cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31819%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Nova%20Blocks&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31628-missing-authorization-in-slicedinvo-28c2a20d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31628%3A%20Missing%20Authorization%20in%20SlicedInvoices%20Sliced%20Invoices&amp;severity=null&amp;id=69cd7371e6bfc5ba1def221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31619-improper-neutralization-of-special--d4c0d238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31619%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31612-deserialization-of-untrusted-data-i-db53c29d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31612%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Sabuj%20Kundu%20CBX%20Poll&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31594-improper-neutralization-of-input-du-26d3c28e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPglob%20Auto%20scroll%20for%20reading&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31580-missing-authorization-in-anzar-ahme-ac4a39b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31580%3A%20Missing%20Authorization%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Product%20Enquiry&amp;severity=null&amp;id=69cd736ae6bfc5ba1def206d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31579-improper-neutralization-of-special--d4f73523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31579%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=69cd736ae6bfc5ba1def206a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31578-improper-neutralization-of-input-du-96afdeb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wisdomlogix%20Solutions%20Pvt.%20Ltd.%20Fonts%20Manager%20%7C%20Custom%20Fonts&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31571-improper-neutralization-of-input-du-8c80528c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cynob%20IT%20Consultancy%20The%20Logo%20Slider&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31568-improper-neutralization-of-input-du-b11301f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wiredmindshelp%20LeadLab%20by%20wiredminds&amp;severity=null&amp;id=69cd7368e6bfc5ba1def201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31564-improper-neutralization-of-special--4bdce61c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31564%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31563-improper-neutralization-of-input-du-92da161a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vimal%20Kava%20AI%20Search%20Bar&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31561-improper-neutralization-of-special--d67d7858</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31561%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeSolz%20Ultimate%20Push%20Notifications&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31560-incorrect-privilege-assignment-in-d-0295482b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31560%3A%20Incorrect%20Privilege%20Assignment%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31553-improper-neutralization-of-special--bad8ea80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31553%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Advanced%20WooCommerce%20Product%20Sales%20Reporting&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31552-improper-neutralization-of-special--51a3e404</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31552%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20davidfcarr%20RSVPMarker&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31551-improper-neutralization-of-special--6080a0d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31551%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Salesmate.io%20Salesmate%20Add-On%20for%20Gravity%20Forms&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31548-improper-neutralization-of-input-du-80e4351b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeSolz%20Ultimate%20Push%20Notifications&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31537-improper-neutralization-of-input-du-be783a46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madfishdigital%20Bulk%20NoIndex%20%26%20NoFollow%20Toolkit&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31534-improper-neutralization-of-special--dfbda298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31534%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shopperdotcom%20Shopper&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31531-improper-neutralization-of-special--741c3d3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31531%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20click5%20History%20Log%20by%20click5&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31525-missing-authorization-in-wp-messiah-0621f9c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31525%3A%20Missing%20Authorization%20in%20WP%20Messiah%20WP%20Mobile%20Bottom%20Menu&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31462-improper-neutralization-of-input-du-eb2f20d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rzfarrell%20CGM%20Event%20Calendar&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31461-improper-neutralization-of-input-du-57d4b464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mayeenul%20Islam%20NanoSupport&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31455-improper-neutralization-of-input-du-aa76680c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ralxz%20Limit%20Max%20IPs%20Per%20User&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31454-improper-neutralization-of-input-du-6f198610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arefly%20Delete%20Post%20Revision&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31446-improper-neutralization-of-input-du-e1b29fe3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31446%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jiangmiao%20WP%20Cleaner&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31445-improper-neutralization-of-input-du-37c05994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31445%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sed%20Lex%20Pages%20Order&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31441-improper-neutralization-of-input-du-91d54756</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20Galleria&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31431-improper-neutralization-of-input-du-551b7e05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20conlabz%20GmbH%20WP%20Bookmarks&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31097-improper-control-of-filename-for-in-1d102a88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31097%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=69cd7344e6bfc5ba1def154b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31089-improper-neutralization-of-special--6ea4bf1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31089%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Fahad%20Mahmood%20Order%20Splitter%20for%20WooCommerce&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31086-improper-neutralization-of-input-du-b537f499</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31086%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WBW%20Plugins%20Product%20Table%20by%20WBW&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31085-improper-neutralization-of-input-du-3880b65f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-language&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31082-improper-control-of-filename-for-in-982704f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31082%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20InfornWeb%20News%20%26%20Blog%20Designer%20Pack&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31081-improper-neutralization-of-input-du-70943e87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31081%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShortPixel%20Enable%20Media%20Replace&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31080-improper-neutralization-of-input-du-fc35f741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Link%20Software%20LLC%20HTML%20Forms&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31078-improper-neutralization-of-input-du-49b20d67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30913-improper-neutralization-of-input-du-ae167550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20podpirate%20Access%20Areas&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30906-improper-neutralization-of-input-du-e1f9a128</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lisandragetnet%20Plugin%20Oficial%20%E2%80%93%20Getnet%20para%20WooCommerce&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30905-improper-neutralization-of-input-du-cda394a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30892-deserialization-of-untrusted-data-i-4952c5c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30892%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20WpTravelly&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30853-missing-authorization-in-shortpixel-12dcc82b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30853%3A%20Missing%20Authorization%20in%20ShortPixel%20ShortPixel%20Adaptive%20Images&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30852-improper-neutralization-of-input-du-05835d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emotionalonlinestorytelling%20Oracle%20Cards%20Lite&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30844-improper-neutralization-of-input-du-f9fa2ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Watu%20Quiz&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30841-improper-limitation-of-a-pathname-t-e6900ef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30841%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20adamskaat%20Countdown%20%26%20Clock&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30825-missing-authorization-in-wpclever-w-a58f15fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30825%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Linked%20Products%20-%20Upsells%20%26%20Cross-sells%20for%20WooCommerce&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30807-improper-neutralization-of-special--8af20a1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30807%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Martin%20Nguyen%20Next-Cart%20Store%20to%20WooCommerce%20Migration&amp;severity=null&amp;id=69cd731ee6bfc5ba1def082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30778-improper-neutralization-of-input-du-faddb192</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30580-improper-control-of-generation-of-c-185e3ed8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30580%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kellydiek%20DigiWidgets%20Image%20Editor&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30554-improper-neutralization-of-input-du-f5a7c94b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abhishek%20Kumar%20Frizzly&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31753-cross-site-request-forgery-csrf-in--97f53969</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31753%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Animesh%20Kumar%20Advanced%20Speed%20Increaser&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21986-vulnerability-in-linux-linux-bdd3ca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21985-vulnerability-in-linux-linux-be8e2b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21984-vulnerability-in-linux-linux-be8e27</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21983-vulnerability-in-linux-linux-be8e23</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21982-vulnerability-in-linux-linux-be8e1f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21981-vulnerability-in-linux-linux-be8e1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21980-vulnerability-in-linux-linux-be8e15</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21979-vulnerability-in-linux-linux-be8e0f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21978-vulnerability-in-linux-linux-be8dfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21977-vulnerability-in-linux-linux-be8def</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21976-vulnerability-in-linux-linux-be8de7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21975-vulnerability-in-linux-linux-be8ddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21974-vulnerability-in-linux-linux-be8dd7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21973-vulnerability-in-linux-linux-be8dcf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21972-vulnerability-in-linux-linux-be8dcb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21971-vulnerability-in-linux-linux-be8dba</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21970-vulnerability-in-linux-linux-be8db6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21969-vulnerability-in-linux-linux-be8da5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21968-vulnerability-in-linux-linux-be8d8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21967-vulnerability-in-linux-linux-be8d82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21966-vulnerability-in-linux-linux-be8d7a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21965-vulnerability-in-linux-linux-be8d74</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21964-vulnerability-in-linux-linux-be8d5a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21963-vulnerability-in-linux-linux-be8d52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21962-vulnerability-in-linux-linux-be8d4a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21961-vulnerability-in-linux-linux-be8d42</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21960-vulnerability-in-linux-linux-be8d3a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21959-vulnerability-in-linux-linux-bdd3c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21958-vulnerability-in-linux-linux-be8d32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21957-vulnerability-in-linux-linux-be8d0e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21956-vulnerability-in-linux-linux-be8d06</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21955-vulnerability-in-linux-linux-be8cfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21954-vulnerability-in-linux-linux-be8ced</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21953-vulnerability-in-linux-linux-be8ce7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21952-vulnerability-in-linux-linux-be8cd4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21951-vulnerability-in-linux-linux-be8cce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21950-vulnerability-in-linux-linux-be8cc4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21949-vulnerability-in-linux-linux-be8cba</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21948-vulnerability-in-linux-linux-be8cb2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21947-vulnerability-in-linux-linux-be8c92</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21946-vulnerability-in-linux-linux-be8c8e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21945-vulnerability-in-linux-linux-be8c8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21944-vulnerability-in-linux-linux-be8c7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21943-vulnerability-in-linux-linux-be8c79</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21942-vulnerability-in-linux-linux-be8c75</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21941-vulnerability-in-linux-linux-be8c71</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21940-vulnerability-in-linux-linux-be8c6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21939-vulnerability-in-linux-linux-be8c69</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21938-vulnerability-in-linux-linux-be8c65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21937-vulnerability-in-linux-linux-bdd3ba</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21936-vulnerability-in-linux-linux-be8c46</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21935-vulnerability-in-linux-linux-be8c42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21934-vulnerability-in-linux-linux-be8c3e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21933-vulnerability-in-linux-linux-be8c31</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21932-vulnerability-in-linux-linux-be8c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21931-vulnerability-in-linux-linux-bdd39b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21930-vulnerability-in-linux-linux-be8c29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21929-vulnerability-in-linux-linux-be8c1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21928-vulnerability-in-linux-linux-be8c18</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21927-vulnerability-in-linux-linux-be8c14</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21926-vulnerability-in-linux-linux-be8c10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21925-vulnerability-in-linux-linux-be8bf7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21924-vulnerability-in-linux-linux-be8bf3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21923-vulnerability-in-linux-linux-be8bef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21922-vulnerability-in-linux-linux-be8beb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21921-vulnerability-in-linux-linux-be8be5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21920-vulnerability-in-linux-linux-be8be1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21919-vulnerability-in-linux-linux-be8bdd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21918-vulnerability-in-linux-linux-be8bd9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21917-vulnerability-in-linux-linux-be8bd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21916-vulnerability-in-linux-linux-bdd397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21915-vulnerability-in-linux-linux-be8bc8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21914-vulnerability-in-linux-linux-be8ba2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21913-vulnerability-in-linux-linux-be8b9e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21912-vulnerability-in-linux-linux-be8b9a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21911-vulnerability-in-linux-linux-be8b96</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21910-vulnerability-in-linux-linux-be8b92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21909-vulnerability-in-linux-linux-be8b8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21908-vulnerability-in-linux-linux-be8b8a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21907-vulnerability-in-linux-linux-bdd393</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21906-vulnerability-in-linux-linux-be8b86</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21905-vulnerability-in-linux-linux-be8b82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21904-vulnerability-in-linux-linux-be8b7e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21903-vulnerability-in-linux-linux-be8b69</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21902-vulnerability-in-linux-linux-be8b5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21901-vulnerability-in-linux-linux-be8b58</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21900-vulnerability-in-linux-linux-be8b4b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21899-vulnerability-in-linux-linux-be8b47</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21898-vulnerability-in-linux-linux-bdd382</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21897-vulnerability-in-linux-linux-be8b43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21896-vulnerability-in-linux-linux-be8b3f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21895-vulnerability-in-linux-linux-be8b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21894-vulnerability-in-linux-linux-be8b37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31910-improper-neutralization-of-special--9f8387f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31910%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20BookingPress&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def315e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31908-cross-site-request-forgery-csrf-in--04bb24be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31908%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sami%20Ahmed%20Siddiqui%20JSON%20Structuring%20Markup&amp;severity=null&amp;id=69cd73a2e6bfc5ba1def3158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31906-cross-site-request-forgery-csrf-in--77f06317</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31906%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProfitShare.ro%20WP%20Profitshare&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def3114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31904-cross-site-request-forgery-csrf-in--6cf50fdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31904%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Infoway%20LLC%20Ebook%20Downloader&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def310e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31897-improper-neutralization-of-input-du-92e881e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arrow%20Plugins%20Arrow%20Custom%20Feed%20for%20Twitter&amp;severity=null&amp;id=69cd73a0e6bfc5ba1def30fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31895-improper-neutralization-of-input-du-53848b57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulrosen%20ABC%20Notation&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31894-improper-neutralization-of-input-du-af4f6582</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infoway%20LLC%20Ebook%20Downloader&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31892-improper-neutralization-of-input-du-bb61b73a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20WP%20Crowdfunding&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31891-improper-neutralization-of-input-du-b36944b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gosign%20Gosign%20%E2%80%93%20Posts%20Slider%20Block&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31890-improper-neutralization-of-input-du-aa6f675b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mashi%20Simple%20Map%20No%20Api&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31888-cross-site-request-forgery-csrf-in--ee24da6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31888%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31887-missing-authorization-in-zookatron--c6eb994a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31887%3A%20Missing%20Authorization%20in%20zookatron%20MyBookProgress%20by%20Stormhill%20Media&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31886-missing-authorization-in-repuso-soc-e1d87f8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31886%3A%20Missing%20Authorization%20in%20Repuso%20Social%20proof%20testimonials%20and%20reviews%20by%20Repuso&amp;severity=null&amp;id=69cd739ee6bfc5ba1def30aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31885-improper-neutralization-of-input-du-f2bcf812</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Floeter%20Hyperlink%20Group%20Block&amp;severity=null&amp;id=69cd739ce6bfc5ba1def304b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31884-improper-neutralization-of-input-du-1fbaae97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CMS%20Ninja%20Norse%20Rune%20Oracle%20Plugin&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31883-improper-neutralization-of-input-du-dad6f871</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31882-missing-authorization-in-wpwebinars-a6021f38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31882%3A%20Missing%20Authorization%20in%20WPWebinarSystem%20WebinarPress&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31881-missing-authorization-in-stylemix-p-9e665167</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31881%3A%20Missing%20Authorization%20in%20Stylemix%20Pearl&amp;severity=null&amp;id=69cd739ce6bfc5ba1def303f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31880-cross-site-request-forgery-csrf-in--58a99163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stylemix%20Pearl&amp;severity=null&amp;id=69cd739ce6bfc5ba1def303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31879-missing-authorization-in-dmitry-v-c-4ee6cbbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31879%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31878-missing-authorization-in-dmitry-v-c-ac3108bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31878%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20UPC%2FEAN%2FGTIN%20Code%20Generator&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31877-missing-authorization-in-magnigenie-7543c366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31877%3A%20Missing%20Authorization%20in%20Magnigenie%20RestroPress&amp;severity=null&amp;id=69cd739ce6bfc5ba1def3032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31875-improper-neutralization-of-input-du-2d40813b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pluginic%20FancyPost&amp;severity=null&amp;id=69cd739ae6bfc5ba1def3004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31874-improper-neutralization-of-input-du-06a9ae6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20WebberZone%20Snippetz&amp;severity=null&amp;id=69cd739ae6bfc5ba1def3001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31872-missing-authorization-in-galaxy-web-22be6594</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31872%3A%20Missing%20Authorization%20in%20Galaxy%20Weblinks%20WP%20Clone%20any%20post%20type&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31871-url-redirection-to-untrusted-site-o-b0a71fc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31871%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Galaxy%20Weblinks%20WP%20Clone%20any%20post%20type&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31870-missing-authorization-in-exeideas-i-b6cdb01e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31870%3A%20Missing%20Authorization%20in%20EXEIdeas%20International%20WP%20AutoKeyword&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31869-improper-neutralization-of-input-du-c09fa038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modernaweb%20Studio%20Black%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31868-missing-authorization-in-joomsky-js-591353f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31868%3A%20Missing%20Authorization%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31867-authorization-bypass-through-user-c-3d110784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31867%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20JoomSky%20JS%20Job%20Manager&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31866-missing-authorization-in-ship-depot-e3b4d78b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31866%3A%20Missing%20Authorization%20in%20Ship%20Depot%20ShipDepot%20for%20WooCommerce&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31864-improper-neutralization-of-input-du-b9655daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Out%20the%20Box%20Beam%20me%20up%20Scotty&amp;severity=null&amp;id=69cd739ae6bfc5ba1def2fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31863-missing-authorization-in-inspry-age-110eaa7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31863%3A%20Missing%20Authorization%20in%20inspry%20Agency%20Toolkit&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31862-missing-authorization-in-pickplugin-3623b861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31862%3A%20Missing%20Authorization%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31861-improper-neutralization-of-input-du-2edb144d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31861%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPOrbit%20Support%20Perfect%20Font%20Awesome%20Integration&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31860-improper-neutralization-of-input-du-663ce4da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPeka%20WP%20AdCenter&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31859-cross-site-request-forgery-csrf-in--db19d7b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31859%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Feedbucket%20Feedbucket%20%E2%80%93%20Website%20Feedback%20Tool&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31857-improper-neutralization-of-input-du-a344d0ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWax%20Directorist%20AddonsKit%20for%20Elementor&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31856-missing-authorization-in-brainvirei-d37cbc2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31856%3A%20Missing%20Authorization%20in%20brainvireinfo%20Export%20All%20Post%20Meta&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31855-improper-neutralization-of-input-du-27926ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softnwords%20SMM%20API&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31854-missing-authorization-in-sharaz-sha-f23d2ac5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31854%3A%20Missing%20Authorization%20in%20Sharaz%20Shahid%20Simple%20Sticky%20Add%20To%20Cart%20For%20WooCommerce&amp;severity=null&amp;id=69cd7398e6bfc5ba1def2f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31853-improper-neutralization-of-input-du-aedf36eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31853%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Erez%20Hadas-Sonnenschein%20Smartarget%20Popup&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31852-cross-site-request-forgery-csrf-in--f75a4a72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31852%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20N-Media%20Bulk%20Product%20Sync&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31851-improper-neutralization-of-input-du-51dd7af7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31850-improper-neutralization-of-input-du-ec03fd58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RedefiningTheWeb%20PDF%20Generator%20Addon%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31849-improper-neutralization-of-input-du-cc9072a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fbtemplates%20Nemesis%20All-in-One&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31848-missing-authorization-in-wpfactory--fa9c25b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31848%3A%20Missing%20Authorization%20in%20WPFactory%20Adverts&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31847-improper-neutralization-of-input-du-08bb07ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20mFolio%20Lite&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31846-missing-authorization-in-jeroen-sch-08846538</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31846%3A%20Missing%20Authorization%20in%20Jeroen%20Schmit%20Theater%20for%20WordPress&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31845-cross-site-request-forgery-csrf-in--66eea60b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31845%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rohit%20Choudhary%20Theme%20Duplicator&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31844-improper-neutralization-of-input-du-6bbb46df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Blocks&amp;severity=null&amp;id=69cd7396e6bfc5ba1def2ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31843-missing-authorization-in-wilson-ope-79ba86ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31843%3A%20Missing%20Authorization%20in%20Wilson%20OpenAI%20Tools%20for%20WordPress%20%26%20WooCommerce&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31842-insertion-of-sensitive-information--bd42c03b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31842%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20viralloops%20Viral%20Loops%20WP%20Integration&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31840-cross-site-request-forgery-csrf-in--70654b15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31840%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digireturn%20Simple%20Fixed%20Notice&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31839-cross-site-request-forgery-csrf-in--320163e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31839%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digireturn%20DN%20Footer%20Contacts&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31838-improper-neutralization-of-input-du-00f4dd34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eventbee%20Eventbee%20RSVP%20Widget&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31836-missing-authorization-in-matthewrub-da213fa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31836%3A%20Missing%20Authorization%20in%20matthewrubin%20Review%20Manager&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31835-improper-neutralization-of-input-du-72ef7ab4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brice%20Capobianco%20WP%20Plugin%20Info%20Card&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31834-missing-authorization-in-themeglow--046fbaa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31834%3A%20Missing%20Authorization%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31833-authorization-bypass-through-user-c-79fe731a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31833%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=null&amp;id=69cd7393e6bfc5ba1def2e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31832-exposure-of-sensitive-system-inform-a388192c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31832%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Beee%20ACF%20City%20Selector&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31831-missing-authorization-in-team-atomc-cfc7aa3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31831%3A%20Missing%20Authorization%20in%20Team%20AtomChat%20AtomChat&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31830-missing-authorization-in-uriahs-vic-c00d2262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31830%3A%20Missing%20Authorization%20in%20Uriahs%20Victor%20Printus&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31829-improper-neutralization-of-input-du-ad57390f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31829%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devscred%20ShopCred&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31828-cross-site-request-forgery-csrf-in--243d820f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31828%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alextselegidis%20Easy!Appointments&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31826-missing-authorization-in-anzar-ahme-12a3de33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31826%3A%20Missing%20Authorization%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Cost%20Of%20Goods&amp;severity=null&amp;id=69cd738be6bfc5ba1def2d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31824-server-side-request-forgery-ssrf-in-58103cde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31824%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Wombat%20Plugins%20WP%20Optin%20Wheel&amp;severity=null&amp;id=69cd738be6bfc5ba1def2cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31823-improper-neutralization-of-input-du-60bd667c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpoperations%20WPoperation%20Elementor%20Addons&amp;severity=null&amp;id=69cd738be6bfc5ba1def2cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31822-missing-authorization-in-ashish-aja-d94ed91d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31822%3A%20Missing%20Authorization%20in%20Ashish%20Ajani%20WP%20Simple%20HTML%20Sitemap&amp;severity=null&amp;id=69cd7386e6bfc5ba1def276f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31821-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-formsintegrations-integration-of-zoho-crm-and-contact-form-7-bd726c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31821%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20formsintegrations%20Integration%20of%20Zoho%20CRM%20and%20Contact%20Form%207&amp;severity=medium&amp;id=682d9817c4522896dcbd726c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31820-missing-authorization-in-webdevstud-dde0839a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31820%3A%20Missing%20Authorization%20in%20webdevstudios%20Automatic%20Featured%20Images%20from%20Videos&amp;severity=null&amp;id=69cd7386e6bfc5ba1def276c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31818-improper-neutralization-of-input-du-8b28fa9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ContentBot.ai%20ContentBot%20AI%20Writer&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31817-improper-neutralization-of-input-du-7bbce83a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31817%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPWheels%20BlockWheels&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31816-missing-authorization-in-pietro-mob-50689108</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31816%3A%20Missing%20Authorization%20in%20pietro%20Mobile%20App%20Canvas&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31815-improper-neutralization-of-input-du-04a23417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31815%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devscred%20Design%20Blocks&amp;severity=null&amp;id=69cd7386e6bfc5ba1def275d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31814-cross-site-request-forgery-csrf-in--b63bd6c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31814%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OwnerRez%20OwnerRez%20API&amp;severity=null&amp;id=69cd7386e6bfc5ba1def275a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31813-improper-neutralization-of-input-du-e1eb5b30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Website366.com%20WPSHARE247%20Elementor%20Addons&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31812-improper-neutralization-of-input-du-5f77fa50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tomas%20BuddyPress%20Members%20Only&amp;severity=null&amp;id=69cd7386e6bfc5ba1def2754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31811-improper-neutralization-of-input-du-71615f95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xtreeme%20Planyo%20online%20reservation%20system&amp;severity=null&amp;id=69cd7383e6bfc5ba1def269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31810-missing-authorization-in-pickplugin-9b2d7fce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31810%3A%20Missing%20Authorization%20in%20PickPlugins%20Question%20Answer&amp;severity=null&amp;id=69cd7383e6bfc5ba1def269a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31809-cross-site-request-forgery-csrf-in--2c7f9812</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31809%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Labinator%20Labinator%20Content%20Types%20Duplicator&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31808-cross-site-request-forgery-csrf-in--383eb7ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31808%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IT%20Path%20Solutions%20SCSS%20WP%20Editor&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31807-cross-site-request-forgery-csrf-in--155c18f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31807%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CloudRedux%20Product%20Notices%20for%20WooCommerce&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31806-improper-neutralization-of-input-du-16ca3196</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31806%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uSystems%20Webling&amp;severity=null&amp;id=69cd7383e6bfc5ba1def268e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31805-improper-neutralization-of-input-du-6d61a3d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20Gutena%20Kit%20%E2%80%93%20Gutenberg%20Blocks%20and%20Templates&amp;severity=null&amp;id=69cd7383e6bfc5ba1def268b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31804-improper-neutralization-of-input-du-f9304aa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31804%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DraftPress%20Team%20Follow%20Us%20Badges&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31803-improper-neutralization-of-input-du-c9a86f59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31803%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Neteuro%20Turisbook%20Booking%20System&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31802-missing-authorization-in-shiptimize-1f73e38a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31802%3A%20Missing%20Authorization%20in%20Shiptimize%20Shiptimize%20for%20WooCommerce&amp;severity=null&amp;id=69cd7383e6bfc5ba1def2682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31801-improper-neutralization-of-input-du-64dd3f9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maksym%20Marko%20MX%20Time%20Zone%20Clocks&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31797-improper-neutralization-of-input-du-60791acc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31797%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Sprout%20Clients&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31796-server-side-request-forgery-ssrf-in-9ef8eb14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31796%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TheInnovs%20ElementsCSS%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7380e6bfc5ba1def260d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31793-improper-neutralization-of-input-du-4168b718</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31793%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=69cd7380e6bfc5ba1def2603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31792-improper-neutralization-of-input-du-57e74525</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31791-missing-authorization-in-oliver-boy-b441590c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31791%3A%20Missing%20Authorization%20in%20Oliver%20Boyers%20Pin%20Generator&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31790-improper-neutralization-of-input-du-9630dd3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31790%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Binsaifullah%20Posten&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31788-insertion-of-sensitive-information--f804521e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31788%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Smackcoders%20Inc.%2C%20AIO%20Performance%20Profiler%2C%20Monitor%2C%20Optimize%2C%20Compress%20%26%20Debug&amp;severity=null&amp;id=69cd7380e6bfc5ba1def25f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31787-missing-authorization-in-audiotheme-75aeefab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31787%3A%20Missing%20Authorization%20in%20AudioTheme%20Cue&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31786-missing-authorization-in-travis-sim-2343337d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31786%3A%20Missing%20Authorization%20in%20Travis%20Simple%20Icons&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31785-cross-site-request-forgery-csrf-in--3ab7a006</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31785%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Clearbit%20Clearbit%20Reveal&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31784-cross-site-request-forgery-csrf-in--d8262033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31784%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rudy%20Susanto%20Embed%20Extended&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31783-improper-neutralization-of-input-du-e2996989</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31783%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leartes.NET%20Leartes%20TRY%20Exchange%20Rates&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31782-missing-authorization-in-pupunzi-mb-d3e77a8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31782%3A%20Missing%20Authorization%20in%20pupunzi%20mb.YTPlayer&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31781-missing-authorization-in-ahmadshyk--cdbc9c0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31781%3A%20Missing%20Authorization%20in%20ahmadshyk%20Gift%20Cards%20for%20WooCommerce&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31780-missing-authorization-in-andy-strat-e097962a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31780%3A%20Missing%20Authorization%20in%20Andy%20Stratton%20Append%20Content&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31779-cross-site-request-forgery-csrf-in--37421fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31779%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jonathan%20Daggerhart%20Query%20Wrangler&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31778-improper-neutralization-of-input-du-35bf0377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raphaelheide%20Donate%20Me&amp;severity=null&amp;id=69cd737fe6bfc5ba1def25b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31777-missing-authorization-in-beasttheme-887878ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31777%3A%20Missing%20Authorization%20in%20BeastThemes%20Clockinator%20Lite&amp;severity=null&amp;id=69cd737de6bfc5ba1def2590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31776-cross-site-request-forgery-csrf-in--ade09a19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31776%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aphotrax%20Uptime%20Robot%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd737de6bfc5ba1def258d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31775-cross-site-request-forgery-csrf-in--39809868</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31775%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Smackcoders%20Inc.%2C%20Google%20SEO%20Pressor%20Snippet&amp;severity=null&amp;id=69cd737de6bfc5ba1def258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31774-missing-authorization-in-webprotect-e9bacfd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31774%3A%20Missing%20Authorization%20in%20WebProtect.ai%20Astra%20Security%20Suite&amp;severity=null&amp;id=69cd737de6bfc5ba1def2587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31773-missing-authorization-in-cedcommerc-1ccf733e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31773%3A%20Missing%20Authorization%20in%20cedcommerce%20Ship%20Per%20Product&amp;severity=null&amp;id=69cd737de6bfc5ba1def2584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31772-improper-neutralization-of-input-du-01d9eb1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20WP%20Modal%20Popup%20with%20Cookie%20Integration&amp;severity=null&amp;id=69cd737de6bfc5ba1def2581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31771-improper-neutralization-of-input-du-b8ca03d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sultan%20Nasir%20Uddin%20Team%20Members%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd737de6bfc5ba1def257e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31770-improper-neutralization-of-input-du-89441cc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Content%20Manager%20Light&amp;severity=null&amp;id=69cd737de6bfc5ba1def257b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31769-cross-site-request-forgery-csrf-in--ae9b37e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NiteoThemes%20CLP%20%E2%80%93%20Custom%20Login%20Page%20by%20NiteoThemes&amp;severity=null&amp;id=69cd737de6bfc5ba1def2578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31767-improper-neutralization-of-input-du-f9aae4c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Post%20Custom%20Templates%20Lite&amp;severity=null&amp;id=69cd737be6bfc5ba1def2524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31766-improper-neutralization-of-input-du-00da9b82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PhotoShelter%20PhotoShelter%20for%20Photographers%20Blog%20Feed%20Plugin&amp;severity=null&amp;id=69cd737be6bfc5ba1def2521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31765-missing-authorization-in-themeqx-gd-755f5250</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31765%3A%20Missing%20Authorization%20in%20themeqx%20GDPR%20Cookie%20Notice&amp;severity=null&amp;id=69cd737be6bfc5ba1def251e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31764-improper-neutralization-of-input-du-7b1dabdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Preliot%20Cache%20control%20by%20Cacholong&amp;severity=null&amp;id=69cd737be6bfc5ba1def251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31763-cross-site-request-forgery-csrf-in--68c0adf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31763%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Preliot%20Cache%20control%20by%20Cacholong&amp;severity=null&amp;id=69cd737be6bfc5ba1def2518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31762-improper-neutralization-of-input-du-3771b2f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andreyazimov%20Sheet2Site&amp;severity=null&amp;id=69cd737be6bfc5ba1def2515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31761-improper-neutralization-of-input-du-30e503c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DEJAN%20Hypotext&amp;severity=null&amp;id=69cd737be6bfc5ba1def2512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31760-improper-neutralization-of-input-du-fac9e30e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snapwidget%20SnapWidget%20Social%20Photo%20Feed%20Widget&amp;severity=null&amp;id=69cd737be6bfc5ba1def250f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31759-improper-neutralization-of-input-du-d7f8be5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BooSpot%20Boo%20Recipes&amp;severity=null&amp;id=69cd737be6bfc5ba1def250c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31757-missing-authorization-in-binarycarp-b918a690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31757%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Free%20Woocommerce%20Product%20Table%20View&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31756-cross-site-request-forgery-csrf-in--d8203969</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31756%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tuyennv%20TZ%20PlusGallery&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31755-missing-authorization-in-josselynj--0dbe84d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31755%3A%20Missing%20Authorization%20in%20josselynj%20pCloud%20Backup&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31754-improper-neutralization-of-input-du-75d8f8fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DobsonDev%20DobsonDev%20Shortcodes&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31752-missing-authorization-in-termel-bul-369ec2cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31752%3A%20Missing%20Authorization%20in%20termel%20Bulk%20Fields%20Editor&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31751-cross-site-request-forgery-csrf-in--ea832fe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31751%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20doit%20Breaking%20News%20WP&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31750-improper-neutralization-of-input-du-784be994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20doit%20Breaking%20News%20WP&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31749-improper-neutralization-of-input-du-1b915e6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPelite%20HMH%20Footer%20Builder%20For%20Elementor&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31748-improper-neutralization-of-input-du-f869b802</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20Opal%20Portfolio&amp;severity=null&amp;id=69cd7378e6bfc5ba1def23da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31747-improper-neutralization-of-input-du-ee53b806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milan.latinovic%20WP%20Chrono&amp;severity=null&amp;id=69cd7375e6bfc5ba1def23a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31745-improper-neutralization-of-input-du-2c842a5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arni%20Cinco%20Subscription%20Form%20for%20Feedblitz&amp;severity=null&amp;id=69cd7375e6bfc5ba1def239f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31744-improper-neutralization-of-input-du-6e180596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpszaki%20Lightweight%20and%20Responsive%20Youtube%20Embed&amp;severity=null&amp;id=69cd7375e6bfc5ba1def239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31743-improper-neutralization-of-input-du-3f6e7f9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpszaki%20Lightweight%20and%20Responsive%20Youtube%20Embed&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31742-improper-neutralization-of-input-du-16bbb71d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PixelDima%20Dima%20Take%20Action&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31741-improper-neutralization-of-input-du-53dc4e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Filtr8%20Easy%20Magazine&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31740-improper-neutralization-of-input-du-7676f2a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aThemeArt%20News%2C%20Magazine%20and%20Blog%20Elements&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31738-improper-neutralization-of-input-du-6008b76e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yazamodeveloper%20LeadQuizzes&amp;severity=null&amp;id=69cd7375e6bfc5ba1def2389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31737-improper-neutralization-of-input-du-3a18513f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dxladner%20Client%20Showcase&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31735-improper-neutralization-of-input-du-0feba02f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20C.%20Johnson%20Footnotes%20for%20WordPress&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31734-improper-neutralization-of-input-du-f6c00ad3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Simple%20Post%20Expiration&amp;severity=null&amp;id=69cd7373e6bfc5ba1def231d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31733-improper-neutralization-of-input-du-8fdae0f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boot%20Div%20WP%20Sitemap&amp;severity=null&amp;id=69cd7373e6bfc5ba1def231a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31732-missing-authorization-in-gb-plugins-4bfbbeb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31732%3A%20Missing%20Authorization%20in%20gb-plugins%20GB%20Gallery%20Slideshow&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31731-improper-neutralization-of-input-du-22fce52f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Philip%20John%20Author%20Bio%20Shortcode&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31730-improper-neutralization-of-input-du-52735306</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DigitalCourt%20Marketer%20Addons&amp;severity=null&amp;id=69cd7373e6bfc5ba1def2311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30224-cwe-200-exposure-of-sensitive-infor-7c915496</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30224%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mydumper%20mydumper&amp;severity=medium&amp;id=6838dc05182aa0cae2910300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1660-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-navisworks-freedom-bef99b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1660%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=682d983ec4522896dcbef99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3034-memory-safety-bugs-fixed-in-firefox--e356ca5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3034%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20137%20and%20Thunderbird%20137%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69a0a1c885912abc71d0ba90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3032-leaking-file-descriptors-from-the-fo-3df47502</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3032%3A%20Leaking%20file%20descriptors%20from%20the%20fork%20server%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69a0a1c885912abc71d0ba8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3030-memory-safety-bugs-fixed-in-firefox--65b02c7f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3030%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20137%2C%20Thunderbird%20137%2C%20Firefox%20ESR%20128.9%2C%20and%20Thunderbird%20128.9%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909154cc28fd46ded7bb7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3029-url-bar-spoofing-via-non-bmp-unicode-bbdc1e6d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3029%3A%20URL%20Bar%20Spoofing%20via%20non-BMP%20Unicode%20characters%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909154cc28fd46ded7bb7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3028-use-after-free-triggered-by-xsltproc-5b69f1fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3028%3A%20Use-after-free%20triggered%20by%20XSLTProcessor%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909154cc28fd46ded7bb797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1659-cwe-125-out-of-bounds-read-in-autodesk-navisworks-freedom-bef98a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1659%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=682d983ec4522896dcbef98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1658-cwe-125-out-of-bounds-read-in-autodesk-navisworks-freedom-bef982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1658%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=682d983ec4522896dcbef982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2237-cwe-269-improper-privilege-managemen-6bbdde9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2237%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ApusThemes%20WP%20RealEstate&amp;severity=critical&amp;id=699f6b1fb7ef31ef0b54e5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13553-cwe-288-authentication-bypass-using-4caa8ea6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13553%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cozyvision1%20SMS%20Alert%20Order%20Notifications%20%E2%80%93%20WooCommerce&amp;severity=critical&amp;id=699f6e5fb7ef31ef0b59f201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2906-cwe-79-improper-neutralization-of-in-21738c04</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contempoinc%20Contempo%20Real%20Estate%20Core&amp;severity=medium&amp;id=699f6b26b7ef31ef0b54eb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56325-cwe-288-authentication-bypass-using-adbcb906</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56325%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Apache%20Software%20Foundation%20Apache%20Pinot&amp;severity=critical&amp;id=68ffaa64ba6dffc5e2042189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30065-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-parquet-java-bd9c08</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30065%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Parquet%20Java&amp;severity=critical&amp;id=682d981bc4522896dcbd9c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2891-cwe-434-unrestricted-upload-of-file--36eae6ba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2891%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20contempoinc%20Real%20Estate%207%20WordPress&amp;severity=high&amp;id=699f6b26b7ef31ef0b54eb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1512-cwe-79-improper-neutralization-of-in-d9d3692f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Elementor%20Addons%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1267-cwe-79-improper-neutralization-of-in-01db749c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trainingbusinesspros%20WordPress%20CRM%2C%20Email%20%26%20Marketing%20Automation%20for%20WordPress%20%7C%20Award%20Winner%20%E2%80%94%20Groundhogg&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12189-cwe-79-improper-neutralization-of-i-d168438e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20WDesignKit%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Starter%20Templates%2C%20Patterns%2C%20Cloud%20Workspace%20%26%20Widget%20Builder&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12278-cwe-79-improper-neutralization-of-i-29037bb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31024-improper-neutralization-of-special--d2276c04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31024%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20randyjensen%20RJ%20Quickcharts&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31001-debug-messages-revealing-unnecessar-0009e385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31001%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information%20in%20TLA%20Media%20GTM%20Kit&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30971-improper-neutralization-of-special--76e42c6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30971%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Xavi%20Ivars%20XV%20Random%20Quotes&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22277-authentication-bypass-using-an-alte-1245835a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22277%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20appsbd%20Vitepos&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31415-missing-authorization-in-yaycommerc-52be9888</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31415%3A%20Missing%20Authorization%20in%20YayCommerce%20YayExtra&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31095-authentication-bypass-using-an-alte-b7e7ad9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31095%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Hossein%20Material%20Dashboard&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31087-deserialization-of-untrusted-data-i-7fcc336a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31087%3A%20Deserialization%20of%20Untrusted%20Data%20in%20silverplugins217%20Multiple%20Shipping%20And%20Billing%20Address%20For%20Woocommerce&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31084-deserialization-of-untrusted-data-i-2785f736</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31084%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31074-deserialization-of-untrusted-data-i-10ee7f67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31074%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MDJM%20Mobile%20DJ%20Manager&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30926-missing-authorization-in-kingaddons-3f2223cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30926%3A%20Missing%20Authorization%20in%20KingAddons.com%20King%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30924-improper-neutralization-of-input-du-6f34f17a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30917-improper-neutralization-of-input-du-f095a6d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Wham%20SKU%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30911-improper-control-of-generation-of-c-81a7177e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30911%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30910-improper-limitation-of-a-pathname-t-ca64dda4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30910%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CreativeMindsSolutions%20CM%20Download%20Manager&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30902-improper-neutralization-of-input-du-1787b2b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30902%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ATL%20Software%20SRL%20AEC%20Kiosque&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30901-improper-control-of-filename-for-in-fa7985d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30901%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30886-improper-neutralization-of-special--1db2f7c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30886%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30882-improper-limitation-of-a-pathname-t-d9d71618</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30882%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732de6bfc5ba1def0be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30880-missing-authorization-in-joomsky-js-07906c3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30880%3A%20Missing%20Authorization%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30878-improper-limitation-of-a-pathname-t-c39e9733</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30878%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30869-improper-neutralization-of-input-du-d87087cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Parakoos%20Image%20Wall&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30849-improper-control-of-filename-for-in-5d51bfa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30849%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30848-improper-neutralization-of-input-du-0fb35719</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30840-improper-neutralization-of-input-du-1c4d3de0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michel%20-%20xiligroup%20dev%20xili-dictionary&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30837-improper-neutralization-of-input-du-ce77092b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristiano%20Zanca%20WooCommerce%20Fattureincloud&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30834-path-traversal-in-bit-apps-bit-assi-821448b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30834%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Bit%20Apps%20Bit%20Assist&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30827-improper-neutralization-of-input-du-0de1a340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30808-improper-neutralization-of-input-du-e8bcc595</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20About%20Author&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30802-exposure-of-sensitive-system-inform-b9a3a683</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30802%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20WPBean%20Our%20Team%20Members&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30798-improper-neutralization-of-input-du-d32330e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rickonline_nl%20Better%20WishList%20API&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30797-missing-authorization-in-bigdropgr--f3d0acf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30797%3A%20Missing%20Authorization%20in%20bigdrop.gr%20Greek%20Multi%20Tool%20%E2%80%93%20Fix%20peralinks%2C%20accents%2C%20auto%20create%20menus%20and%20more&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30796-improper-neutralization-of-input-du-76ed21d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Extended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30794-improper-neutralization-of-input-du-c842fcd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20Event%20Tickets&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30793-improper-limitation-of-a-pathname-t-6b77972e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30793%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Property%20Hive%20Houzez%20Property%20Feed&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30782-improper-control-of-filename-for-in-61bfacbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30782%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Download%20Lite&amp;severity=null&amp;id=69cd730be6bfc5ba1def04d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30774-improper-neutralization-of-special--50cd01ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30774%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Quiz%20Maker&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30622-improper-neutralization-of-special--1a98fa9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30622%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20torsteino%20PostMash&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30614-improper-neutralization-of-input-du-c50fae67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Haozhe%20Xie%20Google%20Font%20Fix&amp;severity=null&amp;id=69cd7307e6bfc5ba1def01fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30613-improper-neutralization-of-input-du-3670c3c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30613%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20N-Media%20Nmedia%20MailChimp&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30607-improper-neutralization-of-input-du-7050599b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Name.ly%20Quick%20Localization&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30594-improper-limitation-of-a-pathname-t-a16fec08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30594%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20samsk%20Include%20URL&amp;severity=null&amp;id=69cd7303e6bfc5ba1def012e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30589-improper-neutralization-of-special--73b2af69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30589%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dourou%20Flickr%20set%20slideshows&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30579-improper-neutralization-of-input-du-7748790d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakeii%20Pesapal%20Gateway%20for%20Woocommerce&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30563-improper-neutralization-of-input-du-3ae4e30a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makong%20Tidekey&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30559-improper-neutralization-of-input-du-9347dfe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Kento%20WordPress%20Stats&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30548-improper-neutralization-of-input-du-549bb52b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VarDump%20s.r.l.%20Advanced%20Post%20Search&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30547-improper-neutralization-of-input-du-060ce8f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Tufts%20WP%20Cards&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30544-improper-neutralization-of-input-du-e1cb32b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svmidi%20OK%20Poster%20Group&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30520-improper-neutralization-of-input-du-ec03c4ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crosstec%20Breezing%20Forms&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1665-cwe-79-improper-neutralization-of-in-862f3778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13567-cwe-200-exposure-of-sensitive-infor-2237a86c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13567%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=high&amp;id=699f6e61b7ef31ef0b59f411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2008-cwe-434-unrestricted-upload-of-file--4b3414d9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2008%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20smackcoders%20Import%20Export%20Suite%20for%20CSV%20and%20XML%20Datafeed&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2007-cwe-23-relative-path-traversal-in-sm-8832a31c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2007%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20smackcoders%20Import%20Export%20Suite%20for%20CSV%20and%20XML%20Datafeed&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21384-cwe-693-protection-mechanism-failure-in-microsoft-azure-health-bot-aeb2fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21384%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Azure%20Health%20Bot&amp;severity=high&amp;id=682cd0f81484d88663aeb2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-01-2b0a53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-01&amp;severity=medium&amp;id=682c7db5e8347ec82d2b0a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-04-01-f12480</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-04-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24167-a-downloads-origin-may-be-incorrect-a82cac35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24167%3A%20A%20download&apos;s%20origin%20may%20be%20incorrectly%20associated%20in%20Apple%20Safari&amp;severity=critical&amp;id=69091538c28fd46ded7baa10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30470-an-app-may-be-able-to-read-sensitiv-7d5af27e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30470%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30427-processing-maliciously-crafted-web--a7b2a511</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30427%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091543c28fd46ded7bb322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24262-a-sandboxed-app-may-be-able-to-acce-80e41871</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24262%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20system%20logs%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e14c28fd46ded86967f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40864-an-attacker-in-a-privileged-network-a9a79855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40864%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20track%20a%20user&apos;s%20activity%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6909214efe7723195e054580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24235-a-remote-attacker-may-be-able-to-ca-a2b525d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24235%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20heap%20corruption%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092142fe7723195e053e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24242-an-app-with-root-privileges-may-be--73fe6a8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24242%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24215-a-malicious-app-may-be-able-to-acce-263796a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24215%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24203-an-app-may-be-able-to-modify-protec-120de62d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24203%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24192-visiting-a-website-may-leak-sensiti-92a91d12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24192%3A%20Visiting%20a%20website%20may%20leak%20sensitive%20data%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213efe7723195e053a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24254-a-user-may-be-able-to-elevate-privi-15e75c5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24254%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e14c28fd46ded869657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30450-an-app-may-be-able-to-access-sensit-739f2f61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30450%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1ac28fd46ded869931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31187-an-app-may-be-able-to-modify-protec-3d833083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31187%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1dc28fd46ded869b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24278-an-app-may-be-able-to-access-protec-bde07eb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24278%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24281-an-app-may-be-able-to-access-sensit-b6dd4e31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24281%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e18c28fd46ded869861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30446-a-malicious-app-with-root-privilege-5e1d4f2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30446%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20modify%20the%20contents%20of%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1ac28fd46ded869921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24239-an-app-may-be-able-to-access-protec-b7c2d0ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24239%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31191-an-app-may-be-able-to-access-sensitive-user-data-in-apple-tvos-bd7181</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31191%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d9817c4522896dcbd7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24238-an-app-may-be-able-to-gain-elevated-cd22c68e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24238%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30447-an-app-may-be-able-to-access-sensit-4de92c4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30447%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24280-an-app-may-be-able-to-access-user-s-31a2f2f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24280%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24279-an-app-may-be-able-to-access-contac-21d6bf2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24279%3A%20An%20app%20may%20be%20able%20to%20access%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30451-an-app-may-be-able-to-access-sensit-9dcc4641</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30451%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1bc28fd46ded869a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24255-an-app-may-be-able-to-break-out-of--22518c42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24255%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e14c28fd46ded86965f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24193-an-attacker-with-a-usb-c-connection-f5c5d8d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24193%3A%20An%20attacker%20with%20a%20USB-C%20connection%20to%20an%20unlocked%20device%20may%20be%20able%20to%20programmatically%20access%20photos%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6909213efe7723195e053a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24202-an-app-may-be-able-to-access-sensit-273dd378</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24202%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24214-an-app-may-be-able-to-access-sensit-d963dfbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24214%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24097-an-app-may-be-able-to-read-arbitrar-8682d8ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24097%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20file%20metadata%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091538c28fd46ded7ba9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24243-processing-a-maliciously-crafted-fi-8436a2ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24243%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909153bc28fd46ded7bac64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24234-a-malicious-app-may-be-able-to-gain-94c4457d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24234%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092142fe7723195e053e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24263-an-app-may-be-able-to-observe-unpro-ee30534f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24263%3A%20An%20app%20may%20be%20able%20to%20observe%20unprotected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded869683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24170-an-app-may-be-able-to-gain-root-pri-3cf246e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24170%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213cfe7723195e05394a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30426-an-app-may-be-able-to-enumerate-a-u-80ea5484</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30426%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091543c28fd46ded7bb31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24259-an-app-may-be-able-to-retrieve-safa-e32afa0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24259%3A%20An%20app%20may%20be%20able%20to%20retrieve%20Safari%20bookmarks%20without%20an%20entitlement%20check%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30471-a-remote-user-may-be-able-to-cause--892741c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30471%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091545c28fd46ded7bb5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30467-visiting-a-malicious-website-may-le-f733527d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30467%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091545c28fd46ded7bb5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24218-an-app-may-be-able-to-access-inform-cf42f093</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24218%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092140fe7723195e053ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30430-password-autofill-may-fill-in-passw-05226177</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30430%3A%20Password%20autofill%20may%20fill%20in%20passwords%20after%20failing%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091543c28fd46ded7bb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24182-processing-a-maliciously-crafted-fo-d8aac991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24182%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7babe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24244-processing-a-maliciously-crafted-fo-a3c5165c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24244%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909153bc28fd46ded7bac6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24213-a-type-confusion-issue-could-lead-to-memory-corruption-in-apple-tvos-bd5fe3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24213%3A%20A%20type%20confusion%20issue%20could%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=682d9815c4522896dcbd5fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24205-an-app-may-be-able-to-access-user-s-5a91cecb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24205%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092140fe7723195e053a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24194-processing-maliciously-crafted-web--342d6a39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24194%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7babfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30456-an-app-may-be-able-to-gain-root-pri-aad8d5f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30456%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091e1bc28fd46ded869aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24229-a-sandboxed-app-may-be-able-to-acce-6ca30ad8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24229%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69092142fe7723195e053de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24157-an-app-may-be-able-to-cause-unexpec-fa79712c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24157%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213cfe7723195e0538ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24248-an-app-may-be-able-to-enumerate-dev-fcdb554d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24248%3A%20An%20app%20may%20be%20able%20to%20enumerate%20devices%20that%20have%20signed%20into%20the%20user&apos;s%20Apple%20Account%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded86960f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30437-an-app-may-be-able-to-corrupt-copro-3564b855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30437%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e19c28fd46ded869911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30460-an-app-may-be-able-to-access-protec-8e670d51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30460%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1bc28fd46ded869abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24209-processing-maliciously-crafted-web--2e0ce990</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24209%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=high&amp;id=69091539c28fd46ded7bac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24198-an-attacker-with-physical-access-ma-81a98925</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24198%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213efe7723195e053a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54533-an-app-may-be-able-to-access-sensit-f054e522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54533%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690916cac28fd46ded7ccfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24272-an-app-may-be-able-to-modify-protec-78178c24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24272%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24264-processing-maliciously-crafted-web--9f552870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24264%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=6909153bc28fd46ded7bac83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24233-a-malicious-app-may-be-able-to-read-3f762d76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24233%3A%20A%20malicious%20app%20may%20be%20able%20to%20read%20or%20write%20to%20protected%20files%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092142fe7723195e053dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24232-a-malicious-app-may-be-able-to-acce-5fa8894a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24232%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092142fe7723195e053df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24265-an-app-may-be-able-to-cause-unexpec-7ed98799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24265%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e16c28fd46ded8696ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24273-an-app-may-be-able-to-cause-unexpec-e3e5efcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24273%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=688a5e4dad5a09ad00ad892a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24199-an-app-may-be-able-to-cause-a-denia-37c127e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24199%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092140fe7723195e053a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24208-loading-a-malicious-iframe-may-lead-44dd12ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24208%3A%20Loading%20a%20malicious%20iframe%20may%20lead%20to%20a%20cross-site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091539c28fd46ded7bac01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30461-an-app-may-be-able-to-access-protec-8ca76c27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30461%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24249-an-app-may-be-able-to-check-the-exi-d3bd45f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24249%3A%20An%20app%20may%20be%20able%20to%20check%20the%20existence%20of%20an%20arbitrary%20path%20on%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded86963f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30441-an-app-may-be-able-to-overwrite-arb-dfea9882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30441%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69091e19c28fd46ded869915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24269-an-app-may-be-able-to-cause-unexpec-f4ccbb74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24269%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e16c28fd46ded869705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24228-an-app-may-be-able-to-execute-arbit-fb9bb365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24228%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092142fe7723195e053ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30457-a-malicious-app-may-be-able-to-crea-2af8c225</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30457%3A%20A%20malicious%20app%20may%20be%20able%20to%20create%20symlinks%20to%20protected%20regions%20of%20the%20disk%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24253-an-app-may-be-able-to-access-protec-aa1ec670</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24253%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded86964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24195-a-user-may-be-able-to-elevate-privi-ccb1761f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24195%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213efe7723195e053a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24204-an-app-may-be-able-to-access-protec-ac858e09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24204%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092140fe7723195e053a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24212-an-app-may-be-able-to-break-out-of--e0651077</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24212%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24245-a-malicious-app-may-be-able-to-acce-2c861ebb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24245%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20saved%20passwords%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded8695fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31183-an-app-may-be-able-to-access-sensit-52101558</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31183%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909154cc28fd46ded7bb790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30454-a-malicious-app-may-be-able-to-acce-47dd71de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30454%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24250-a-malicious-app-acting-as-a-https-p-1bd31d57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24250%3A%20A%20malicious%20app%20acting%20as%20a%20HTTPS%20proxy%20could%20get%20access%20to%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded869647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24196-an-attacker-with-user-privileges-ma-8aabfbd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24196%3A%20An%20attacker%20with%20user%20privileges%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=688a5e4dad5a09ad00ad8926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24207-an-app-may-be-able-to-enable-icloud-e6fb6c87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24207%3A%20An%20app%20may%20be%20able%20to%20enable%20iCloud%20storage%20features%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092140fe7723195e053a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24211-processing-a-maliciously-crafted-vi-87b933b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24211%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69092140fe7723195e053a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24246-an-app-may-be-able-to-access-user-s-e8290301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24246%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded8695ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30439-an-attacker-with-physical-access-to-9ab9ae48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30439%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24180-a-malicious-website-may-be-able-to--5d3e2d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24180%3A%20A%20malicious%20website%20may%20be%20able%20to%20claim%20WebAuthn%20credentials%20from%20another%20website%20that%20shares%20a%20registrable%20suffix%20in%20Apple%20Safari&amp;severity=high&amp;id=69091538c28fd46ded7baa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24231-an-app-may-be-able-to-modify-protec-d95d5858</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24231%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092142fe7723195e053def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24266-an-app-may-be-able-to-cause-unexpec-bb969c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24266%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e16c28fd46ded8696f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30458-an-app-may-be-able-to-read-files-ou-698e4c6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30458%3A%20An%20app%20may%20be%20able%20to%20read%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30462-apps-that-appear-to-use-app-sandbox-0f6fdfce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30462%3A%20Apps%20that%20appear%20to%20use%20App%20Sandbox%20may%20be%20able%20to%20launch%20without%20restrictions%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30435-a-sandboxed-app-may-be-able-to-acce-4ee03e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30435%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20system%20logs%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e19c28fd46ded86990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30434-processing-a-maliciously-crafted-fi-3f97e036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30434%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20cross%20site%20scripting%20attack%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091e19c28fd46ded869909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30463-an-app-may-be-able-to-access-sensit-d490632c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30463%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091e1bc28fd46ded869ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24226-a-malicious-app-may-be-able-to-acce-93bc302a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24226%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20Xcode&amp;severity=medium&amp;id=69092142fe7723195e053ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24267-an-app-may-be-able-to-gain-root-pri-4551b1c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24267%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e16c28fd46ded8696fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24230-playing-a-malicious-audio-file-may--fc9cb789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24230%3A%20Playing%20a%20malicious%20audio%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30438-a-malicious-app-may-be-able-to-dism-82f2b139</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30438%3A%20A%20malicious%20app%20may%20be%20able%20to%20dismiss%20the%20system%20notification%20on%20the%20Lock%20Screen%20that%20a%20recording%20was%20started%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68b092cead5a09ad006e7758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24181-an-app-may-be-able-to-access-protec-74d4502b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24181%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213efe7723195e053a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24247-an-attacker-may-be-able-to-cause-un-f44d5835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24247%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded869607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24210-parsing-an-image-may-lead-to-disclo-e35a35bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24210%3A%20Parsing%20an%20image%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24178-an-app-may-be-able-to-break-out-of--4f84363d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24178%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091538c28fd46ded7baa20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30455-a-malicious-app-may-be-able-to-acce-be6cce81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30455%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e1bc28fd46ded869aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31182-an-app-may-be-able-to-delete-files--68643fa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31182%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909154cc28fd46ded7bb787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30443-an-app-may-be-able-to-access-user-s-90988b7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30443%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091545c28fd46ded7bb5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31194-a-shortcut-may-run-with-admin-privi-54711662</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31194%3A%20A%20Shortcut%20may%20run%20with%20admin%20privileges%20without%20authentication%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1dc28fd46ded869b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24237-an-app-may-be-able-to-cause-unexpec-f590157a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24237%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909153bc28fd46ded7bac53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24260-an-attacker-in-a-privileged-positio-45c06361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24260%3A%20An%20attacker%20in%20a%20privileged%20position%20may%20be%20able%20to%20perform%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded86966f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24276-a-malicious-app-may-be-able-to-acce-cfef3340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24276%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e16c28fd46ded869711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24221-sensitive-keychain-data-may-be-acce-52ea0181</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24221%3A%20Sensitive%20keychain%20data%20may%20be%20accessible%20from%20an%20iOS%20backup%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092140fe7723195e053abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30425-a-malicious-website-may-be-able-to--6d38eae6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30425%3A%20A%20malicious%20website%20may%20be%20able%20to%20track%20users%20in%20Safari%20private%20browsing%20mode%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091543c28fd46ded7bb312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24173-an-app-may-be-able-to-break-out-of--14fc68c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24173%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091538c28fd46ded7baa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30464-an-app-may-be-able-to-cause-unexpec-5b4182cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30464%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1dc28fd46ded869b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30433-a-shortcut-may-be-able-to-access-fi-2c87fa8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30433%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091543c28fd46ded7bb345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30444-mounting-a-maliciously-crafted-smb--e406029f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30444%3A%20Mounting%20a%20maliciously%20crafted%20SMB%20network%20share%20may%20lead%20to%20system%20termination%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1ac28fd46ded869919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24283-an-app-may-be-able-to-access-sensit-05ceec51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24283%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909153bc28fd46ded7bac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30452-an-input-validation-issue-was-addre-569a84c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30452%3A%20An%20input%20validation%20issue%20was%20addressed%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e1bc28fd46ded869a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24256-an-app-may-be-able-to-disclose-kern-de2b792a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24256%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e14c28fd46ded869667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24190-processing-a-maliciously-crafted-vi-f324faf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24190%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69091539c28fd46ded7babf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30429-an-app-may-be-able-to-break-out-of--06f9fe3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30429%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091543c28fd46ded7bb32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24217-an-app-may-be-able-to-access-sensit-13597cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24217%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091539c28fd46ded7bac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24240-an-app-may-be-able-to-access-user-s-9837096b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24240%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24241-an-app-may-be-able-to-trick-a-user--70adaf17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24241%3A%20An%20app%20may%20be%20able%20to%20trick%20a%20user%20into%20copying%20sensitive%20data%20to%20the%20pasteboard%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e13c28fd46ded8695ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30469-a-person-with-physical-access-to-an-3d0cbd28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30469%3A%20A%20person%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20access%20photos%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69091e1dc28fd46ded869b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24095-an-app-may-be-able-to-bypass-privac-2b992213</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24095%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69091a50c28fd46ded81d1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24216-processing-maliciously-crafted-web--ed320aa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24216%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20Safari%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091539c28fd46ded7bac2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24191-an-app-may-be-able-to-modify-protec-d88a721a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24191%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213efe7723195e053a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30428-photos-in-the-hidden-photos-album-m-565ac100</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30428%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091e19c28fd46ded869903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24257-an-app-may-be-able-to-cause-unexpec-41227ad2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24257%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909153bc28fd46ded7bac77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31184-an-app-may-gain-unauthorized-access-5f8126bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31184%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Local%20Network%20in%20Apple%20Safari&amp;severity=high&amp;id=69091e1dc28fd46ded869b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24282-an-app-may-be-able-to-modify-protec-ae594235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24282%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e18c28fd46ded869865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31192-a-website-may-be-able-to-access-sen-f814756e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31192%3A%20A%20website%20may%20be%20able%20to%20access%20sensor%20information%20without%20user%20consent%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091e1dc28fd46ded869b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30432-a-malicious-app-may-be-able-to-atte-5d89196c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30432%3A%20A%20malicious%20app%20may%20be%20able%20to%20attempt%20passcode%20entries%20on%20a%20locked%20device%20and%20thereby%20cause%20escalating%20time%20delays%20after%204%20failures%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091543c28fd46ded7bb33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24164-an-app-may-be-able-to-modify-protec-b7f26797</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24164%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213cfe7723195e05393c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30465-a-shortcut-may-be-able-to-access-fi-b5772062</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30465%3A%20A%20shortcut%20may%20be%20able%20to%20access%20files%20that%20are%20normally%20inaccessible%20to%20the%20Shortcuts%20app%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=69091e1dc28fd46ded869b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30424-deleting-a-conversation-in-messages-285f40b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30424%3A%20Deleting%20a%20conversation%20in%20Messages%20may%20expose%20user%20contact%20information%20in%20system%20logging%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091e19c28fd46ded8698fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24172-block-all-remote-content-may-not-ap-fa4ca12e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24172%3A%20%22Block%20All%20Remote%20Content%22%20may%20not%20apply%20for%20all%20mail%20previews%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213efe7723195e053a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31188-an-app-may-be-able-to-bypass-privac-f9c9b998</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31188%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1dc28fd46ded869b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24277-an-app-may-be-able-to-gain-root-pri-2941fdd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24277%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e16c28fd46ded869719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24261-an-app-may-be-able-to-modify-protec-1a1a3da6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24261%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e14c28fd46ded869677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24148-a-malicious-jar-file-may-bypass-gat-1f07178a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24148%3A%20A%20malicious%20JAR%20file%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e05381c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24236-an-app-may-be-able-to-access-sensit-43788f14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24236%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091e13c28fd46ded8695dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30449-an-app-may-be-able-to-gain-root-pri-966b7ede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30449%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69091e1ac28fd46ded869929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3059-vulnerability-in-drupal-profile-private-beed2e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3059%3A%20Vulnerability%20in%20Drupal%20Profile%20Private&amp;severity=medium&amp;id=682d983cc4522896dcbeed2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31697-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-formatter-suite-beec72</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Formatter%20Suite&amp;severity=medium&amp;id=682d983cc4522896dcbeec72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31696-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-rapidoc-oas-field-formatter-beec6e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20RapiDoc%20OAS%20Field%20Formatter&amp;severity=medium&amp;id=682d983cc4522896dcbeec6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31695-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-link-field-display-mode-formatter-beec6a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Link%20field%20display%20mode%20formatter&amp;severity=medium&amp;id=682d983cc4522896dcbeec6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31694-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-drupal-two-factor-authentication-tfa-beec66</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31694%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Drupal%20Two-factor%20Authentication%20(TFA)&amp;severity=high&amp;id=682d983cc4522896dcbeec66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26683-cwe-285-improper-authorization-in-microsoft-azure-playwright-aeb3ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26683%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Playwright&amp;severity=high&amp;id=682cd0f81484d88663aeb3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31691-cwe-862-missing-authorization-in-drupal-oauth2-server-beec62</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31691%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20OAuth2%20Server&amp;severity=critical&amp;id=682d983cc4522896dcbeec62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31690-cwe-352-cross-site-request-forgery-csrf-in-drupal-cache-utility-beec5e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31690%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Cache%20Utility&amp;severity=high&amp;id=682d983cc4522896dcbeec5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31689-cwe-352-cross-site-request-forgery-csrf-in-drupal-general-data-protection-regulation-beec4d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31689%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20General%20Data%20Protection%20Regulation&amp;severity=high&amp;id=682d983cc4522896dcbeec4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31688-cwe-352-cross-site-request-forgery-csrf-in-drupal-configuration-split-beebb8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31688%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Configuration%20Split&amp;severity=medium&amp;id=682d983cc4522896dcbeebb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31687-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-spamspan-filter-beec2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20SpamSpan%20filter&amp;severity=medium&amp;id=682d983cc4522896dcbeec2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31686-cwe-862-missing-authorization-in-drupal-open-social-beebb4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31686%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Open%20Social&amp;severity=high&amp;id=682d983cc4522896dcbeebb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31685-cwe-862-missing-authorization-in-drupal-open-social-beebb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31685%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Open%20Social&amp;severity=critical&amp;id=682d983cc4522896dcbeebb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31684-cwe-352-cross-site-request-forgery-csrf-in-drupal-oauth2-client-beebac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20OAuth2%20Client&amp;severity=medium&amp;id=682d983cc4522896dcbeebac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31683-cwe-352-cross-site-request-forgery-csrf-in-drupal-google-tag-beeb9f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31683%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Google%20Tag&amp;severity=medium&amp;id=682d983cc4522896dcbeeb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31682-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-google-tag-beeb99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Google%20Tag&amp;severity=medium&amp;id=682d983cc4522896dcbeeb99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31681-cwe-862-missing-authorization-in-drupal-authenticator-login-beeb67</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31681%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20Authenticator%20Login&amp;severity=critical&amp;id=682d983cc4522896dcbeeb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31680-cwe-352-cross-site-request-forgery-csrf-in-drupal-matomo-analytics-beeb63</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31680%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20Matomo%20Analytics&amp;severity=medium&amp;id=682d983cc4522896dcbeeb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31679-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-ignition-error-pages-beeb5f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Ignition%20Error%20Pages&amp;severity=medium&amp;id=682d983cc4522896dcbeeb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31678-cwe-862-missing-authorization-in-drupal-ai-artificial-intelligence-beeb5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31678%3A%20CWE-862%20Missing%20Authorization%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=682d983cc4522896dcbeeb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31677-cwe-352-cross-site-request-forgery-csrf-in-drupal-ai-artificial-intelligence-beeb57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31677%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Drupal%20AI%20(Artificial%20Intelligence)&amp;severity=high&amp;id=682d983cc4522896dcbeeb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31676-cwe-1390-weak-authentication-in-drupal-email-tfa-beeb53</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31676%3A%20CWE-1390%20Weak%20Authentication%20in%20Drupal%20Email%20TFA&amp;severity=high&amp;id=682d983cc4522896dcbeeb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31675-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drupal-drupal-core-beeae9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=682d983cc4522896dcbeeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31673-cwe-863-incorrect-authorization-in-drupal-drupal-core-beeae1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31673%3A%20CWE-863%20Incorrect%20Authorization%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=682d983cc4522896dcbeeae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21893-vulnerability-in-linux-linux-be8b33</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31128-cwe-79-improper-neutralization-of-i-f7b0ecde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rubentd%20gifplayer&amp;severity=medium&amp;id=684b454f358c65714e6b0226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31125-cwe-200-exposure-of-sensitive-infor-fa40c483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31125%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vitejs%20vite&amp;severity=medium&amp;id=697271914623b1157c8544af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30006-cwe-79-improper-neutralization-of-i-3a3cb609</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=medium&amp;id=6929c5924121026312b3ca60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30005-cwe-22-improper-limitation-of-a-pat-9fe882a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30005%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=high&amp;id=6929c5924121026312b3ca5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30004-cwe-78-improper-neutralization-of-s-82f0e846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30004%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=high&amp;id=6929c5924121026312b3ca58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2292-cwe-22-improper-limitation-of-a-path-b4a71292</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2292%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Xorcom%20CompletePBX&amp;severity=medium&amp;id=6929c5924121026312b3ca54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2794-cwe-470-use-of-externally-controlled-83f72599</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2794%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Kentico%20Xperience&amp;severity=high&amp;id=690a3b69ff58c9332ff0a5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3048-cwe-22-improper-limitation-of-a-path-355ec559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3048%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20AWS%20Serverless%20Application%20Model%20Command%20Line%20Interface&amp;severity=medium&amp;id=68ee9812d8f994a66ec3232f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3047-cwe-22-improper-limitation-of-a-path-7c50b0fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3047%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20AWS%20AWS%20Serverless%20Application%20Model%20Command%20Line%20Interface&amp;severity=medium&amp;id=68ee9812d8f994a66ec3232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31629-improper-neutralization-of-input-du-57e40db5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacob%20Allred%20Infusionsoft%20Web%20Form%20JavaScript&amp;severity=null&amp;id=69cd7373e6bfc5ba1def230b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31627-improper-neutralization-of-input-du-aa5b2430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=null&amp;id=69cd7371e6bfc5ba1def221c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31625-improper-neutralization-of-input-du-a7bf7239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ramanparashar%20Useinfluence&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31624-improper-neutralization-of-input-du-b8fa3ac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LABCAT%20Processing%20Projects&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31623-cross-site-request-forgery-csrf-in--cfabc7d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20richtexteditor%20Rich%20Text%20Editor&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31621-improper-neutralization-of-input-du-2f4ea6d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidpaulsson%20byBrick%20Accordion&amp;severity=null&amp;id=69cd7371e6bfc5ba1def220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31620-improper-neutralization-of-input-du-ed6f6302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carperfer%20CoverManager&amp;severity=null&amp;id=69cd7371e6bfc5ba1def2207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31618-missing-authorization-in-jaap-jansm-ce634aa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31618%3A%20Missing%20Authorization%20in%20Jaap%20Jansma%20Connector%20to%20CiviCRM%20with%20CiviMcRestFace&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31617-cross-site-request-forgery-csrf-in--ac80daf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Gagan%20Deep%20Singh%20PostmarkApp%20Email%20Integrator&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31616-cross-site-request-forgery-csrf-in--6759a0e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31616%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AdminGeekZ%20Varnish%20WordPress&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31615-improper-neutralization-of-input-du-b9ad90bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20owenr88%20Simple%20Contact%20Forms&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31614-improper-neutralization-of-input-du-e6156864</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hiroprot%20Terms%20Before%20Download&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31613-cross-site-request-forgery-csrf-in--9336a20f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31613%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aboobacker.%20AB%20Google%20Map%20Travel&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31611-missing-authorization-in-shaharia-a-dab6c252</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31611%3A%20Missing%20Authorization%20in%20Shaharia%20Azam%20Auto%20Post%20After%20Image%20Upload&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31610-improper-neutralization-of-input-du-435592f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gingerplugins%20Notification%20Bar%2C%20Sticky%20Notification%20Bar%2C%20Sticky%20Welcome%20Bar%20for%20any%20theme&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31609-missing-authorization-in-arni-cinco-252afc48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31609%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=null&amp;id=69cd7370e6bfc5ba1def21d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31608-improper-neutralization-of-input-du-5ff4dc5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reDim%20GmbH%20CookieHint%20WP&amp;severity=null&amp;id=69cd736ee6bfc5ba1def21a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31607-improper-neutralization-of-input-du-736236fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flomei%20Simple-Audioplayer&amp;severity=null&amp;id=69cd736ee6bfc5ba1def21a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31606-missing-authorization-in-softpulsei-7305e327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31606%3A%20Missing%20Authorization%20in%20softpulseinfotech%20SP%20Blog%20Designer&amp;severity=null&amp;id=69cd736ee6bfc5ba1def21a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31605-improper-neutralization-of-input-du-02d3f0a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WeblineIndia%20Welcome%20Popup&amp;severity=null&amp;id=69cd736ee6bfc5ba1def219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31603-missing-authorization-in-moshensky--c35aa104</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31603%3A%20Missing%20Authorization%20in%20moshensky%20CF7%20Spreadsheets&amp;severity=null&amp;id=69cd736ee6bfc5ba1def219b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31602-cross-site-request-forgery-csrf-in--9bc15655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31602%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Proptech%20Plugin%20Apimo%20Connector&amp;severity=null&amp;id=69cd736ee6bfc5ba1def2198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31601-cross-site-request-forgery-csrf-in--2abf03bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20appointy%20Appointy%20Appointment%20Scheduler&amp;severity=null&amp;id=69cd736ee6bfc5ba1def2195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31600-cross-site-request-forgery-csrf-in--441ec8d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31600%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20designnbuy%20DesignO&amp;severity=null&amp;id=69cd736ee6bfc5ba1def2192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31598-improper-neutralization-of-input-du-d7697d76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Quantity%20Dynamic%20Pricing%20%26%20Bulk%20Discounts%20for%20WooCommerce&amp;severity=null&amp;id=69cd736ee6bfc5ba1def218c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31597-improper-neutralization-of-input-du-c44cefb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crazycric%20Ultimate%20Live%20Cricket%20WordPress%20Lite&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31596-missing-authorization-in-chatwee-ch-841738a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31596%3A%20Missing%20Authorization%20in%20Chatwee%20Chat%20by%20Chatwee&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31595-improper-neutralization-of-input-du-6355428e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31592-improper-neutralization-of-input-du-c1f2b96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paolo%20Melchiorre%20Send%20E-mail&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31591-improper-neutralization-of-input-du-26ab59e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20promoz73%20Exit%20Popup%20Free&amp;severity=null&amp;id=69cd736ce6bfc5ba1def20a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31590-improper-neutralization-of-input-du-3414b657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Denra.com%20WP%20Date%20and%20Time%20Shortcode&amp;severity=null&amp;id=69cd736ce6bfc5ba1def209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31589-improper-neutralization-of-input-du-99370171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kibru%20Demeke%20Ethiopian%20Calendar&amp;severity=null&amp;id=69cd736ce6bfc5ba1def209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31588-cross-site-request-forgery-csrf-in--7253e9c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31588%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elfsight%20Elfsight%20Testimonials%20Slider&amp;severity=null&amp;id=69cd736ce6bfc5ba1def2099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31587-improper-neutralization-of-input-du-90428b82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elfsight%20Elfsight%20Testimonials%20Slider&amp;severity=null&amp;id=69cd736ce6bfc5ba1def2096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31586-improper-neutralization-of-input-du-c79d2bc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20%E2%80%93%20Photo%20Albums%20Plugin&amp;severity=null&amp;id=69cd736ae6bfc5ba1def207f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31585-cross-site-request-forgery-csrf-in--cab43f09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31585%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20leadfox%20Leadfox%20for%20WordPress&amp;severity=null&amp;id=69cd736ae6bfc5ba1def207c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31584-missing-authorization-in-elfsight-e-97f0a8c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31584%3A%20Missing%20Authorization%20in%20elfsight%20Elfsight%20Testimonials%20Slider&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31583-cross-site-request-forgery-csrf-in--9e94d5a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashish%20Ajani%20WP%20Copy%20Media%20URL&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31576-missing-authorization-in-gagan-deep-65b2505e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31576%3A%20Missing%20Authorization%20in%20Gagan%20Deep%20Singh%20PostmarkApp%20Email%20Integrator&amp;severity=null&amp;id=69cd736ae6bfc5ba1def2064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31575-improper-neutralization-of-script-r-09990d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31575%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Vasilis%20Triantafyllou%20Flag%20Icons&amp;severity=null&amp;id=69cd7368e6bfc5ba1def202f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31574-improper-neutralization-of-input-du-d5af3cc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SoftHopper%20Custom%20Content%20Scrollbar&amp;severity=null&amp;id=69cd7368e6bfc5ba1def202c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31572-cross-site-request-forgery-csrf-in--776ebed0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20v20202020%20Multi%20Days%20Events%20and%20Multi%20Events%20in%20One%20Day%20Calendar&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31570-cross-site-request-forgery-csrf-in--d967783b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31570%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20Related%20Posts%20Widget%20with%20Thumbnails&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31569-cross-site-request-forgery-csrf-in--405d6afd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20wordpress%20related%20Posts%20with%20thumbnails&amp;severity=null&amp;id=69cd7368e6bfc5ba1def201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31567-improper-neutralization-of-input-du-4e609710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31566-cross-site-request-forgery-csrf-in--19e5b561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31566%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20riosisgroup%20Rio%20Video%20Gallery&amp;severity=null&amp;id=69cd7368e6bfc5ba1def2014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31562-improper-neutralization-of-input-du-64657998</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31562%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aphotrax%20Uptime%20Robot%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31559-improper-neutralization-of-input-du-a0dc1974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Caspio%20Bridge%20Custom%20Database%20Applications%20by%20Caspio&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31557-improper-neutralization-of-input-du-fe88e12e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MiKa%20OSM&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31556-improper-neutralization-of-input-du-8b4f5142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IDX%20Broker%20IMPress%20for%20IDX%20Broker&amp;severity=null&amp;id=69cd7367e6bfc5ba1def1fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31555-missing-authorization-in-contentmx--ab3ae7d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31555%3A%20Missing%20Authorization%20in%20ContentMX%20ContentMX%20Content%20Publisher&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31549-improper-neutralization-of-input-du-607f7539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agency%20Dominion%20Inc.%20Fusion&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31547-improper-neutralization-of-special--16655373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31547%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aphotrax%20Uptime%20Robot%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31546-missing-authorization-in-wp-messiah-718476a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31546%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Swiss%20Toolkit%20For%20WP&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31545-missing-authorization-in-wp-messiah-3ee49481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31545%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Safe%20Ai%20Malware%20Protection%20for%20WP&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31544-missing-authorization-in-wp-messiah-dd893eb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31544%3A%20Missing%20Authorization%20in%20WP%20Messiah%20Swiss%20Toolkit%20For%20WP&amp;severity=null&amp;id=69cd7365e6bfc5ba1def1f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31542-improper-neutralization-of-special--0a012f13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31542%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31540-missing-authorization-in-acmemediak-556120aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31540%3A%20Missing%20Authorization%20in%20acmemediakits%20ACME%20Divi%20Modules&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31539-missing-authorization-in-blocksera--f1f01772</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31539%3A%20Missing%20Authorization%20in%20Blocksera%20Cryptocurrency%20Widgets%20Pack&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31538-improper-neutralization-of-input-du-b05b8a51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20checklistcom%20Checklist&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31535-improper-neutralization-of-input-du-aca9505f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PressTigers%20Simple%20Owl%20Carousel&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31533-missing-authorization-in-salesmatei-cd217334</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31533%3A%20Missing%20Authorization%20in%20Salesmate.io%20Salesmate%20Add-On%20for%20Gravity%20Forms&amp;severity=null&amp;id=69cd7363e6bfc5ba1def1ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31532-improper-neutralization-of-input-du-3c179714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Team%20AtomChat%20AtomChat&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31530-missing-authorization-in-smackcoder-cc3a9218</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31530%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20Google%20SEO%20Pressor%20Snippet&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31529-missing-authorization-in-rashid-sli-3cc04775</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31529%3A%20Missing%20Authorization%20in%20Rashid%20Slider%20Path%20for%20Elementor&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31528-missing-authorization-in-wokamoto-s-69740b7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31528%3A%20Missing%20Authorization%20in%20wokamoto%20StaticPress&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31527-server-side-request-forgery-ssrf-in-d00321c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31527%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kishan%20WP%20Link%20Preview&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31526-improper-neutralization-of-special--70ca8514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31526%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20eleopard%20Behance%20Portfolio%20Manager&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2586-uncontrolled-resource-consumption-24f2ee</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2586%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=682e559b0acd01a24924f2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30963-improper-neutralization-of-input-du-37ac1526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30963%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSmartFilters&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31376-missing-authorization-in-mayeenul-i-b6b4357c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31376%3A%20Missing%20Authorization%20in%20Mayeenul%20Islam%20NanoSupport&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31386-missing-authorization-in-simplepres-4d7ca417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31386%3A%20Missing%20Authorization%20in%20simplepress%20Simple%3APress&amp;severity=null&amp;id=69cd7347e6bfc5ba1def1738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30961-improper-neutralization-of-input-du-983289d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30961%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tinuzz%20Trackserver&amp;severity=null&amp;id=69cd7336e6bfc5ba1def0d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31406-missing-authorization-in-elextensio-f32fee1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31406%3A%20Missing%20Authorization%20in%20ELEXtensions%20ELEX%20WooCommerce%20Request%20a%20Quote&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31410-cross-site-request-forgery-csrf-in--c6d41b8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31410%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ashish%20Ajani%20WP%20Church%20Donation&amp;severity=null&amp;id=69cd734ae6bfc5ba1def18b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31414-improper-neutralization-of-input-du-32216edf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31414%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stylemix%20Cost%20Calculator%20Builder&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31412-improper-neutralization-of-input-du-cf1b279a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31412%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetProductGallery&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31387-improper-control-of-filename-for-in-bc2fe210</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31387%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd7347e6bfc5ba1def173b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31016-improper-control-of-filename-for-in-70b86b3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31016%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Crocoblock%20JetWooBuilder&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30987-improper-neutralization-of-input-du-80deb3c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20For%20Elementor&amp;severity=null&amp;id=69cd7338e6bfc5ba1def0daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30835-improper-control-of-filename-for-in-be6a880d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30835%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Bastien%20Ho%20Accounting%20for%20WooCommerce&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31417-missing-authorization-in-fahad-mahm-877670df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31417%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31043-improper-neutralization-of-input-du-6bc85872</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1268-cwe-787-out-of-bounds-write-in-canon-inc-generic-plus-pcl6-printer-driver-bd7e04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1268%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Canon%20Inc.%20Generic%20Plus%20PCL6%20Printer%20Driver&amp;severity=critical&amp;id=682d9818c4522896dcbd7e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22941-na-3128d890</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22941%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22940-na-3ceae0e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22940%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22939-na-b29ce44c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22939%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22938-na-8561f32f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22938%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22937-na-8fbeb99c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22937%3A%20n%2Fa&amp;severity=critical&amp;id=68a3592dad5a09ad00b0a8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30095-cwe-321-use-of-hard-coded-cryptographic-key-in-vyos-vyos-bf7a13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30095%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20VyOS%20VyOS&amp;severity=medium&amp;id=682d984ac4522896dcbf7a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-31-2bcaad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-31&amp;severity=medium&amp;id=682c7db7e8347ec82d2bcaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-31-f1220a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f1220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2953-denial-of-service-in-pytorch-bf775e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2953%3A%20Denial%20of%20Service%20in%20PyTorch&amp;severity=medium&amp;id=682d984ac4522896dcbf775e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1861-cwe-131-incorrect-calculation-of-buffer-size-in-php-group-php-2725d1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1861%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1736-cwe-20-improper-input-validation-in-php-group-php-2725cf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1736%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1734-cwe-20-improper-input-validation-in-php-group-php-2725cd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1734%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1219-vulnerability-in-php-group-php-2725cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1219%3A%20Vulnerability%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-30-2bce1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-30&amp;severity=medium&amp;id=682c7db7e8347ec82d2bce1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-30-f12b99</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11180-cwe-79-improper-neutralization-of-i-62e37830</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11180%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2249-cwe-434-unrestricted-upload-of-file--24ebf589</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2249%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sojweb%20SoJ%20SoundSlides&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13557-cwe-94-improper-control-of-generati-5036160d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13557%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20United%20Themes%20Shortcodes%20by%20United%20Themes&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2006-cwe-434-unrestricted-upload-of-file--6acee76a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2006%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aspengrovestudios%20Inline%20Image%20Upload%20for%20BBPress&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2266-cwe-862-missing-authorization-in-mes-e6e1a953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2266%3A%20CWE-862%20Missing%20Authorization%20in%20mestresdowp%20Checkout%20Mestres%20do%20WP%20for%20WooCommerce&amp;severity=critical&amp;id=699f6b21b7ef31ef0b54e688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2803-cwe-94-improper-control-of-generatio-b8ac4b2f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2803%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20davemacd%20So-Called%20Air%20Quotes&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2840-cwe-200-exposure-of-sensitive-inform-a9d2bf9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2840%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bhuvnesh%20DAP%20to%20Autoresponders%20Email%20Syncing&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1217-cwe-20-improper-input-validation-in-php-group-php-2725c9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1217%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=683076940acd01a2492725c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-29-2bd550</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-29&amp;severity=medium&amp;id=682c7db7e8347ec82d2bd550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-29-f12092</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6875-missing-release-of-memory-after-effective-lifetime-bda3c6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6875%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=682d981cc4522896dcbda3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2926-null-pointer-dereference-in-hdf5-683f941e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2926%3A%20NULL%20Pointer%20Dereference%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2925-double-free-in-hdf5-db3961cb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2925%3A%20Double%20Free%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2924-heap-based-buffer-overflow-in-hdf5-b91e1f60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2924%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad0034564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2923-heap-based-buffer-overflow-in-hdf5-625ee768</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2923%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31162-cwe-369-in-xfig-fig2dev-36a28682</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31162%3A%20CWE-369%20in%20xfig%20fig2dev&amp;severity=medium&amp;id=69091549c28fd46ded7bb74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31163-cwe-476-in-xfig-fig2dev-059b350f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31163%3A%20CWE-476%20in%20xfig%20fig2dev&amp;severity=medium&amp;id=69091549c28fd46ded7bb752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31164-cwe-122-heap-based-buffer-overflow--e4517f3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31164%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20xfig%20fig2dev&amp;severity=medium&amp;id=69091549c28fd46ded7bb756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2915-heap-based-buffer-overflow-in-hdf5-872dbf49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2915%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2914-heap-based-buffer-overflow-in-hdf5-5099c79f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2914%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad0034563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2913-use-after-free-in-hdf5-8a7798b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2913%3A%20Use%20After%20Free%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad00345634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2912-heap-based-buffer-overflow-in-hdf5-933a1d95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2912%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=688204c6ad5a09ad0034562e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2713-cwe-269-improper-privilege-managemen-4efab665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2713%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20Google%20gVisor&amp;severity=medium&amp;id=689c5f46ad5a09ad00402968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31010-cross-site-request-forgery-csrf-in--8b5034db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31010%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ReichertBrothers%20SimplyRETS%20Real%20Estate%20IDX&amp;severity=null&amp;id=69cd733be6bfc5ba1def0e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22767-improper-neutralization-of-input-du-fc9da759</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Global%20Payments%20GlobalPayments%20WooCommerce&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22575-improper-neutralization-of-input-du-d3843d91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendyourweb%20SUPER%20RESPONSIVE%20SLIDER&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22566-improper-neutralization-of-input-du-c4c09843</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendyourweb%20ULTIMATE%20VIDEO%20GALLERY&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0894e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22526-deserialization-of-untrusted-data-i-88f66e10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22526%3A%20Deserialization%20of%20Untrusted%20Data%20in%20mywebtonet%20PHP%2FMySQL%20CPU%20performance%20statistics&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22523-improper-neutralization-of-special--7103909c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22523%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20scheduler%20Schedule&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22360-improper-neutralization-of-input-du-48393200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20promact%20WP%20Azure%20offload&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54362-path-traversal-in-boggibill-getshop-6aca9c56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54362%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20boggibill%20GetShop%20ecommerce&amp;severity=null&amp;id=69cd7599e6bfc5ba1df0679f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54291-improper-limitation-of-a-pathname-t-8b6ccc72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54291%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labs64%20PluginPass&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51624-improper-neutralization-of-input-du-ace14464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jajapagamentos%20J%C3%A1-J%C3%A1%20Pagamentos%20for%20WooCommerce&amp;severity=null&amp;id=69cd750be6bfc5ba1df026c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30211-cwe-789-memory-allocation-with-exce-dd8bf3e2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30211%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20erlang%20otp&amp;severity=high&amp;id=69091543c28fd46ded7bb30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2901-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-bee35b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2901&amp;severity=medium&amp;id=682d983bc4522896dcbee35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2877-debug-messages-revealing-unnecessary-information-270030</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2877%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information&amp;severity=medium&amp;id=682f99000acd01a249270030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0986-cwe-409-improper-handling-of-highly--619167aa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0986%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20IBM%20PowerVM%20Hypervisor&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31432-improper-control-of-filename-for-in-42e24643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31432%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Chop%20Chop%20Pop-Up%20Chop%20Chop&amp;severity=null&amp;id=69cd7350e6bfc5ba1def19bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31433-improper-neutralization-of-input-du-22f06f92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Miguel%20Sirvent%20Magic%20Embeds&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31434-improper-neutralization-of-input-du-0a90364d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31434%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20FormLift%20for%20Infusionsoft%20Web%20Forms&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31435-cross-site-request-forgery-csrf-in--c0284492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Efficient%20Scripts%20Microblog%20Poster&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31437-improper-neutralization-of-input-du-87f44c21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Miller%20WP-OGP&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31438-cross-site-request-forgery-csrf-in--d5347df1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31438%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Benoit%20De%20Boeck%20WP%20Supersized&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31440-cross-site-request-forgery-csrf-in--8a43a803</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Strategy11%20Team%20Terms%20of%20Use&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31443-cross-site-request-forgery-csrf-in--47832f66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31443%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Krzysztof%20Furtak%20KK%20I%20Like%20It&amp;severity=null&amp;id=69cd7357e6bfc5ba1def1b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31444-cross-site-request-forgery-csrf-in--462f909e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31444%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20youtag%20ShowTime%20Slideshow&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31447-cross-site-request-forgery-csrf-in--7c9a365b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31447%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nertworks%20NertWorks%20All%20in%20One%20Social%20Share%20Tools&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31448-cross-site-request-forgery-csrf-in--3de2cd5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31448%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20misteraon%20Simple%20Trackback%20Disabler&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31449-cross-site-request-forgery-csrf-in--00a5c9f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31449%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EricH%20The%20Visitor%20Counter&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31450-improper-neutralization-of-input-du-57f1e690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phantom.omaga%20Toggle%20Box&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31451-improper-neutralization-of-input-du-68e8386c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevinweber%20wBounce&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31452-improper-neutralization-of-input-du-21425aa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mindshare%20Labs%2C%20Inc.%20WP%20Ultimate%20Search&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31453-improper-neutralization-of-input-du-d512ba87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stian%20Andreassen%20YouTube%20SimpleGallery&amp;severity=null&amp;id=69cd735be6bfc5ba1def1c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31456-cross-site-request-forgery-csrf-in--940a9024</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bsndev%20Ultimate%20Security%20Checker&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31457-cross-site-request-forgery-csrf-in--1bab65b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31457%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aur%C3%A9lien%20LWS%20LWS%20SMS&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31458-cross-site-request-forgery-csrf-in--f678910c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31458%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20forsgren%20Video%20Embedder&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31459-cross-site-request-forgery-csrf-in--e94fc9b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31459%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PasqualePuzio%20Login%20Alert&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31460-cross-site-request-forgery-csrf-in--27061b23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31460%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20danielmuldernl%20OmniLeads%20Scripts%20and%20Tags%20Manager&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31463-improper-neutralization-of-input-du-df61b8ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20preetindersodhi%20TGG%20WP%20Optimizer&amp;severity=null&amp;id=69cd735ce6bfc5ba1def1cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31464-improper-neutralization-of-input-du-20b07296</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nazmur%20Rahman%20Text%20Selection%20Color&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31465-improper-neutralization-of-input-du-508925fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cornershop%20Better%20Section%20Navigation%20Widget&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31466-improper-neutralization-of-special--9b4758e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31466%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Falcon%20Solutions%20Duplicate%20Page%20and%20Post&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31469-missing-authorization-in-webrangers-92f8b83f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31469%3A%20Missing%20Authorization%20in%20webrangers%20Clear%20Sucuri%20Cache&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31470-improper-neutralization-of-input-du-1f2c647d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31470%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FancyThemes%20Page%20Takeover&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31471-improper-neutralization-of-input-du-76404d3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31471%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Falcon%20Solutions%20Duplicate%20Page%20and%20Post&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31472-improper-neutralization-of-input-du-4643f3e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michele%20Marri%20Flatty&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31473-improper-neutralization-of-input-du-749eba43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31473%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthewprice1178%20WP%20Database%20Optimizer&amp;severity=null&amp;id=69cd735fe6bfc5ba1def1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31474-cross-site-request-forgery-csrf-in--b0bb3b70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31474%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20matthewprice1178%20WP%20Database%20Optimizer&amp;severity=null&amp;id=69cd7361e6bfc5ba1def1e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2815-cwe-862-missing-authorization-in-quy-6c7eeed9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2815%3A%20CWE-862%20Missing%20Authorization%20in%20quyle91%20Administrator%20Z&amp;severity=high&amp;id=699f6b25b7ef31ef0b54ea46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31073-improper-neutralization-of-input-du-cbb99a4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bensibley%20Unlimited&amp;severity=null&amp;id=69cd7340e6bfc5ba1def1475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31075-improper-neutralization-of-script-r-d1836f0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31075%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20videowhisper%20MicroPayments&amp;severity=null&amp;id=69cd7340e6bfc5ba1def147b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31076-server-side-request-forgery-ssrf-in-8860ff1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31076%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WP%20Compress%20WP%20Compress%20for%20MainWP&amp;severity=null&amp;id=69cd7340e6bfc5ba1def147e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31083-improper-neutralization-of-input-du-dcd12c88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31088-improper-neutralization-of-input-du-0dc324ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31088%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cozmoslabs%20Paid%20Member%20Subscriptions&amp;severity=null&amp;id=69cd7342e6bfc5ba1def14fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31090-improper-neutralization-of-input-du-723a85d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alordiel%20Dropdown%20Multisite%20selector&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31093-improper-neutralization-of-input-du-feaf246f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31093%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redpixelstudios%20RPS%20Include%20Content&amp;severity=null&amp;id=69cd7344e6bfc5ba1def153f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31094-improper-neutralization-of-input-du-d3158a4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31096-improper-neutralization-of-input-du-172f9ca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPXPO%20PostX&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31099-improper-neutralization-of-special--845a85b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31099%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bestweblayout%20Slider%20by%20BestWebSoft&amp;severity=null&amp;id=69cd7344e6bfc5ba1def1551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31102-improper-neutralization-of-input-du-de75a26b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Hostel&amp;severity=null&amp;id=69cd7345e6bfc5ba1def16e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27001-insertion-of-sensitive-information--c82cfc30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27001%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Shipmondo%20Shipmondo%20%E2%80%93%20A%20complete%20shipping%20solution%20for%20WooCommerce&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1705-cwe-79-improper-neutralization-of-in-b9bf4ad8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2074-cwe-89-improper-neutralization-of-sp-ece96c71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2074%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webfactory%20Advanced%20Google%20reCAPTCHA&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2578-cwe-200-exposure-of-sensitive-inform-cf8e1f24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2578%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%26%238211%3B%20Amelia&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2485-cwe-502-deserialization-of-untrusted-data-in-glenwpcoder-drag-and-drop-multiple-file-upload-for-contact-form-7-bd9727</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2485%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=682d981ac4522896dcbd9727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2328-cwe-22-improper-limitation-of-a-path-4aa4881a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2328%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2804-cwe-79-improper-neutralization-of-in-854135bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54ea30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2294-cwe-22-improper-limitation-of-a-path-a88c8791</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2294%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=critical&amp;id=699f6b21b7ef31ef0b54e6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24381-cwe-601-url-redirection-to-untruste-7115aa9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24381%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24386-cwe-78-improper-neutralization-of-s-71e02524</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24386%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24377-cwe-78-improper-neutralization-of-s-b6646cbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24377%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45385912abc71d656bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24378-cwe-78-improper-neutralization-of-s-e59d3ff4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24378%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45385912abc71d656c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24379-cwe-78-improper-neutralization-of-s-b90f87ba</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24379%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24380-cwe-78-improper-neutralization-of-s-097ef765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24380%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23383-cwe-78-improper-neutralization-of-s-13d82179</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23383%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45385912abc71d656b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24385-cwe-78-improper-neutralization-of-s-8b6c3791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24385%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49601-cwe-78-improper-neutralization-of-s-b130fd13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49601%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24382-cwe-78-improper-neutralization-of-s-dd58bb24</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a45585912abc71d65d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22398-cwe-78-improper-neutralization-of-s-cc656eab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22398%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=critical&amp;id=69a0a45385912abc71d656a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49563-cwe-78-improper-neutralization-of-s-5435dfc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49563%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49564-cwe-78-improper-neutralization-of-s-deb583d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49564%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49565-cwe-78-improper-neutralization-of-s-9c69b83e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49565%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=69a0a44285912abc71d630f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24383-cwe-78-improper-neutralization-of-s-cbb2ab58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24383%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=critical&amp;id=69a0a45585912abc71d65d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1860-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-zefram-data-entropy-bd6c14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1860%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20ZEFRAM%20Data%3A%3AEntropy&amp;severity=high&amp;id=682d9816c4522896dcbd6c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28221-n-a-in-n-a-bf7a0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28220-n-a-in-n-a-bf79fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28220%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf79fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28219-n-a-in-n-a-bf79e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28219%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf79e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-28-2bc2a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-28&amp;severity=medium&amp;id=682c7db7e8347ec82d2bc2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-28-f12430</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31092-improper-neutralization-of-input-du-b91e8e81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ninja%20Team%20Click%20to%20Chat%20%E2%80%93%20WP%20Support%20All-in-One%20Floating%20Widget&amp;severity=null&amp;id=69cd7344e6bfc5ba1def153c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2888-cwe-1025-comparison-using-wrong-fact-ce3a9617</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2888%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec32325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2887-cwe-1025-comparison-using-wrong-fact-d91168cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2887%3A%20CWE-1025%3A%20Comparison%20Using%20Wrong%20Factors%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec32320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2886-cwe-670-always-incorrect-control-flo-12b155f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2886%3A%20CWE-670%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec3231b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2885-cwe-1288-improper-validation-of-cons-318e43c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2885%3A%20CWE-1288%3A%20Improper%20Validation%20of%20Consistency%20within%20Input%20in%20AWS%20tough&amp;severity=medium&amp;id=68ee9812d8f994a66ec32316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31031-improper-neutralization-of-input-du-be480412</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31031%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Job%20Colors%20for%20WP%20Job%20Manager&amp;severity=null&amp;id=69cd733de6bfc5ba1def0f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26733-missing-authorization-in-shinetheme-5a62a8e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26733%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26873-cwe-502-deserialization-of-untruste-250bfb90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26873%3A%20Deserialization%20of%20Untrusted%20Data%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=6846a2fd71f4d251b5895756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26890-improper-control-of-filename-for-in-afc3cd2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RealMag777%20HUSKY&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26898-improper-neutralization-of-special--d377a05b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26898%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26956-missing-authorization-in-shinetheme-8ab41751</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26956%3A%20Missing%20Authorization%20in%20shinetheme%20Traveler&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecbff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22739-missing-authorization-in-thimpress--1252cf35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22739%3A%20Missing%20Authorization%20in%20ThimPress%20LearnPress&amp;severity=null&amp;id=69cd7607e6bfc5ba1df09014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22740-missing-authorization-in-automattic-6dd03c8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22740%3A%20Missing%20Authorization%20in%20Automattic%20Sensei%20LMS&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53033-vulnerability-in-linux-linux-be6d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53032-vulnerability-in-linux-linux-be6d75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53031-vulnerability-in-linux-linux-be6d6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53030-vulnerability-in-linux-linux-bdd948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53029-vulnerability-in-linux-linux-bdd944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53028-vulnerability-in-linux-linux-bdd940</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53026-vulnerability-in-linux-linux-be6d67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53025-vulnerability-in-linux-linux-be6d52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53025&amp;severity=critical&amp;id=682d9830c4522896dcbe6d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53024-vulnerability-in-linux-linux-bdd92f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53023-vulnerability-in-linux-linux-be6d4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53022-vulnerability-in-linux-linux-be6d4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53021-vulnerability-in-linux-linux-be6d46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53020-vulnerability-in-linux-linux-be6d42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53019-vulnerability-in-linux-linux-be6d3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53018-vulnerability-in-linux-linux-be6d38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53017-vulnerability-in-linux-linux-be6d34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53016-vulnerability-in-linux-linux-be6d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53015-vulnerability-in-linux-linux-be6d12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53014-vulnerability-in-linux-linux-be6cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53013-vulnerability-in-linux-linux-be6cf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53012-vulnerability-in-linux-linux-bdd927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53011-vulnerability-in-linux-linux-be6cf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53010-vulnerability-in-linux-linux-be6cef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe6cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53009-vulnerability-in-linux-linux-be6ceb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53008-vulnerability-in-linux-linux-be6ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53007-vulnerability-in-linux-linux-be6ce3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe6ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53006-vulnerability-in-linux-linux-be6cdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53005-vulnerability-in-linux-linux-be6cdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53004-vulnerability-in-linux-linux-be6cce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53003-vulnerability-in-linux-linux-be6cbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53002-vulnerability-in-linux-linux-be6cb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53001-vulnerability-in-linux-linux-be6cb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-53000-vulnerability-in-linux-linux-be6caf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-53000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52999-vulnerability-in-linux-linux-bdd91f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52998-vulnerability-in-linux-linux-be6ca0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52997-vulnerability-in-linux-linux-be6c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52996-vulnerability-in-linux-linux-be6c92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52995-vulnerability-in-linux-linux-be6c8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52994-vulnerability-in-linux-linux-bdd8fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52993-vulnerability-in-linux-linux-be6c86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52992-vulnerability-in-linux-linux-be6c7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52991-vulnerability-in-linux-linux-be6c69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52989-vulnerability-in-linux-linux-be6c5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52988-vulnerability-in-linux-linux-be6c4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52987-vulnerability-in-linux-linux-be6c4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52986-vulnerability-in-linux-linux-be6c47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52985-vulnerability-in-linux-linux-be6c43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52984-vulnerability-in-linux-linux-be6c3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52983-vulnerability-in-linux-linux-bdd8f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52982-vulnerability-in-linux-linux-be6c3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52981-vulnerability-in-linux-linux-be6c37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52980-vulnerability-in-linux-linux-be6c33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52979-vulnerability-in-linux-linux-bdd8ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52979&amp;severity=null&amp;id=682d9821c4522896dcbdd8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52978-vulnerability-in-linux-linux-be6c20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52977-vulnerability-in-linux-linux-bdd8e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52976-vulnerability-in-linux-linux-bdd8d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52975-vulnerability-in-linux-linux-be6c1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52974-vulnerability-in-linux-linux-be6c18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52973-vulnerability-in-linux-linux-be6c14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49761-vulnerability-in-linux-linux-be4a93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49760-vulnerability-in-linux-linux-be4a8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49759-vulnerability-in-linux-linux-be4a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49758-vulnerability-in-linux-linux-be4a87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49757-vulnerability-in-linux-linux-be4a7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49756-vulnerability-in-linux-linux-be4a76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49755-vulnerability-in-linux-linux-be4a72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49754-vulnerability-in-linux-linux-be4a6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49753-vulnerability-in-linux-linux-be4a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49752-vulnerability-in-linux-linux-be4a66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49751-vulnerability-in-linux-linux-be4a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49750-vulnerability-in-linux-linux-be4a45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49749-vulnerability-in-linux-linux-be4a36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49748-vulnerability-in-linux-linux-bdd732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49747-vulnerability-in-linux-linux-be4a2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49746-vulnerability-in-linux-linux-be4a28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49745-vulnerability-in-linux-linux-be4a17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49744-vulnerability-in-linux-linux-be4a0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49743-vulnerability-in-linux-linux-be4a07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49742-vulnerability-in-linux-linux-be4a03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49741-vulnerability-in-linux-linux-be49ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49740-vulnerability-in-linux-linux-be49db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49739-vulnerability-in-linux-linux-be49d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49738-vulnerability-in-linux-linux-be49cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52942-vulnerability-in-linux-linux-be6c10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52941-vulnerability-in-linux-linux-bdd8ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52940-vulnerability-in-linux-linux-be6c0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52939-vulnerability-in-linux-linux-be6c08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52938-vulnerability-in-linux-linux-bdd8bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52937-vulnerability-in-linux-linux-be6c04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52936-vulnerability-in-linux-linux-be6c00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52935-vulnerability-in-linux-linux-be6bfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52934-vulnerability-in-linux-linux-be6be0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52933-vulnerability-in-linux-linux-bdd8b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52932-vulnerability-in-linux-linux-be6bdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52931-vulnerability-in-linux-linux-be6bcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52930-vulnerability-in-linux-linux-be6bc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52929-vulnerability-in-linux-linux-be6bc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52928-vulnerability-in-linux-linux-be6bc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4454-vulnerability-in-linux-linux-bde1c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4454%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12905-cwe-59-improper-link-resolution-bef-9b7db923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12905%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)&amp;severity=high&amp;id=690904b000ff46172d4a0e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22783-improper-neutralization-of-special--b3fbbc82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22783%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SEO%20Squirrly%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26762-improper-neutralization-of-input-du-82109d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20WooCommerce&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26909-improper-control-of-filename-for-in-3c930a87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26909%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20John%20Darrel%20Hide%20My%20WP%20Ghost&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22496-improper-neutralization-of-input-du-987650fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22496%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MarMar8x%20Notif%20Bell&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22497-improper-neutralization-of-input-du-ef0e5c13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22497%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bramwaas%20Simple%20Google%20Calendar%20Outlook%20Events%20Block%20Widget&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22628-improper-neutralization-of-input-du-a0516c3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20Filled%20In&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22629-missing-authorization-in-inet-inet--167b5359</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22629%3A%20Missing%20Authorization%20in%20iNET%20iNET%20Webkit&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22634-cross-site-request-forgery-csrf-in--4a89baf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MD%20Abu%20Jubayer%20Hossain%20Easy%20Booked%20%E2%80%93%20Appointment%20Booking%20and%20Scheduling%20Management%20System%20for%20WordPress&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22637-cross-site-request-forgery-csrf-in--bb838ebb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22637%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20verkkovaraani%20Print%20PDF%20Generator%20and%20Publisher&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22638-improper-neutralization-of-input-du-84319f0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20acowebs%20Product%20Table%20For%20WooCommerce&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22640-improper-neutralization-of-input-du-06417e70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationdevpaytm%20Paytm%20Payment%20Donation&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22644-improper-neutralization-of-input-du-07cdf10f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Vayu%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress%20%26%20WooCommerce&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31181-null-pointer-dereference-270032</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31181%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682f99000acd01a249270032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31180-null-pointer-dereference-bd89f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31180%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31179-null-pointer-dereference-bd89f3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31179%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22646-improper-neutralization-of-input-du-4bf48951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22647-missing-authorization-in-smackcoder-fc83b59e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22647%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20AIO%20Performance%20Profiler%2C%20Monitor%2C%20Optimize%2C%20Compress%20%26%20Debug&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31178-null-pointer-dereference-bd89e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31178%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22648-improper-neutralization-of-input-du-410f1c4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Plugin%20Devs%20Blog%2C%20Posts%20and%20Category%20Filter%20for%20Elementor&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31176-null-pointer-dereference-bd89ef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31176%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9819c4522896dcbd89ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48944-cwe-918-server-side-request-forgery-ssrf-in-apache-software-foundation-apache-kylin-bd876e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48944%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=medium&amp;id=682d9819c4522896dcbd876e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22649-improper-neutralization-of-input-du-c4903e68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22649%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weDevs%20WP%20Project%20Manager&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22652-improper-neutralization-of-special--6e29116a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22652%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kendysond%20Payment%20Forms%20for%20Paystack&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22659-improper-neutralization-of-input-du-9d9c4314</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22659%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21892-vulnerability-in-linux-linux-bdd37e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21891-vulnerability-in-linux-linux-be8b18</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21890-vulnerability-in-linux-linux-be8b14</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21889-vulnerability-in-linux-linux-be8b10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21888-vulnerability-in-linux-linux-be8b0c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21887-vulnerability-in-linux-linux-bdd378</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21886-vulnerability-in-linux-linux-be8b06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21885-vulnerability-in-linux-linux-be8b04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21884-vulnerability-in-linux-linux-be8b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21883-vulnerability-in-linux-linux-be8af3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21882-vulnerability-in-linux-linux-be8aef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21881-vulnerability-in-linux-linux-be8ade</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21880-vulnerability-in-linux-linux-be8ac3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21879-vulnerability-in-linux-linux-be8abf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21878-vulnerability-in-linux-linux-be8abb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21877-vulnerability-in-linux-linux-be8ab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21876-vulnerability-in-linux-linux-be8ab1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21875-vulnerability-in-linux-linux-be8aad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21874-vulnerability-in-linux-linux-be8aa9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21873-vulnerability-in-linux-linux-be8aa5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21872-vulnerability-in-linux-linux-bd718d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58091-vulnerability-in-linux-linux-bde35d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58090-vulnerability-in-linux-linux-bde359</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1998-cwe-532-insertion-of-sensitive-infor-dea049b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1998%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1997-cwe-80-improper-neutralization-of-sc-70e3cff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1997%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=68b4f7b8ad5a09ad00c726f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22660-improper-neutralization-of-input-du-a2f9ae7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22660%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wolfgang%20Include%20Mastodon%20Feed&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22665-missing-authorization-in-shakeeb-sa-7be907d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22665%3A%20Missing%20Authorization%20in%20Shakeeb%20Sadikeen%20RapidLoad&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22667-missing-authorization-in-creative-w-b8af9246</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22667%3A%20Missing%20Authorization%20in%20Creative%20Werk%20Designs%20Export%20Order%2C%20Product%2C%20Customer%20%26%20Coupon%20for%20WooCommerce%20to%20Google%20Sheets&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22668-missing-authorization-in-awesometog-39b408e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22668%3A%20Missing%20Authorization%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22669-cross-site-request-forgery-csrf-in--95811053</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22669%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22670-missing-authorization-in-e4jvikwp-v-359875b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22670%3A%20Missing%20Authorization%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22671-missing-authorization-in-leap13-dis-8a98c4d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22671%3A%20Missing%20Authorization%20in%20Leap13%20Disable%20Elementor%20Editor%20Translation&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22673-missing-authorization-in-wpfactory--d4ada678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22673%3A%20Missing%20Authorization%20in%20WPFactory%20EAN%20for%20WooCommerce&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22672-server-side-request-forgery-ssrf-in-bd112223</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22672%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20SuitePlugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25086-cross-site-request-forgery-csrf-in--6efb62ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25086%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPDeveloper%20Secret%20Meta&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22816-improper-neutralization-of-input-du-c04f628e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22816%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetrendy%20Power%20Mag&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0946a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25100-cross-site-request-forgery-csrf-in--16f6dae7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25100%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20victoracano%20Cazamba&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26731-improper-neutralization-of-input-du-d9dd4bc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26732-improper-neutralization-of-input-du-4308a678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burgersoftware%20StoreBiz&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26734-improper-neutralization-of-input-du-1a72aa3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peregrinethemes%20Hester&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26736-improper-neutralization-of-input-du-f9c195f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20victortihai%20MorningTime%20Lite&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26738-improper-neutralization-of-input-du-adf2a546</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Graham%20Quick%20Interest%20Slider&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21871-vulnerability-in-linux-linux-be8aa1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21870-vulnerability-in-linux-linux-be8a9d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21869-vulnerability-in-linux-linux-be8a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21868-vulnerability-in-linux-linux-be8a66</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21867-vulnerability-in-linux-linux-be8a5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2857-incorrect-handle-could-lead-to-sandb-a9e48fc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2857%3A%20Incorrect%20handle%20could%20lead%20to%20sandbox%20escapes%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6904bd22f54b4a89977ab6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30925-improper-neutralization-of-input-du-e0ba06a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30923-cross-site-request-forgery-csrf-in--49e18ac4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30923%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20powerfulwp%20Gift%20Message%20for%20WooCommerce&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30922-improper-neutralization-of-input-du-c792a504</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simplebooklet%20Simplebooklet%20PDF%20Viewer%20and%20Embedder&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30921-improper-neutralization-of-special--01787542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30921%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30920-improper-neutralization-of-input-du-00c227e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudio.pl%20WP%20Posts%20Carousel&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30919-cross-site-request-forgery-csrf-in--030f11f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30919%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Store%20Locator%20Widgets%20Store%20Locator%20Widget&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30918-improper-neutralization-of-input-du-a9f87b7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gordon%20B%C3%B6hme%20Structured%20Content&amp;severity=null&amp;id=69cd7334e6bfc5ba1def0cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30914-server-side-request-forgery-ssrf-in-224cabe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30914%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Roxnor%20Metform&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30912-cross-site-request-forgery-csrf-in--13ca6ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30912%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Float%20menu&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30909-missing-authorization-in-conversios-88a8af30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30909%3A%20Missing%20Authorization%20in%20Conversios%20Conversios.io&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30907-improper-neutralization-of-input-du-a569281f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SecuPress%20SecuPress%20Free&amp;severity=null&amp;id=69cd7332e6bfc5ba1def0c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30904-improper-neutralization-of-input-du-7ebe4d4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Chartify&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30903-improper-neutralization-of-input-du-9507745a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Mills%20SyntaxHighlighter%20Evolved&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30900-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zoho-subscriptions-zoho-billing-embed-payment-form-bd7268</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zoho%20Subscriptions%20Zoho%20Billing%20%E2%80%93%20Embed%20Payment%20Form&amp;severity=low&amp;id=682d9817c4522896dcbd7268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30899-improper-neutralization-of-input-du-57e445bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30898-improper-neutralization-of-input-du-24928c81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30897-missing-authorization-in-adnan-anal-9808e1eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30897%3A%20Missing%20Authorization%20in%20Adnan%20Analytify&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30896-missing-authorization-in-wedevs-wp--34bc3cca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30896%3A%20Missing%20Authorization%20in%20weDevs%20WP%20ERP&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30895-improper-limitation-of-a-pathname-t-140fa6fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30895%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd7330e6bfc5ba1def0c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30894-missing-authorization-in-epsiloncoo-8d013e18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30894%3A%20Missing%20Authorization%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30891-improper-control-of-filename-for-in-e8e143f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30891%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20magepeopleteam%20WpTravelly&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30890-improper-control-of-filename-for-in-daf8f133</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30890%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20SuitePlugins%20Login%20Widget%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30888-cross-site-request-forgery-csrf-in--4da39398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30888%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silverplugins217%20Custom%20Fields%20Account%20Registration%20For%20Woocommerce&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30887-missing-authorization-in-magepeople-9eb9fe1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30887%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30885-url-redirection-to-untrusted-site-o-4c14b416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30885%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30884-url-redirection-to-untrusted-site-o-ef281f6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30884%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Bit%20Apps%20Bit%20Integrations&amp;severity=null&amp;id=69cd732fe6bfc5ba1def0c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30883-missing-authorization-in-richplugin-b6fe4732</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30883%3A%20Missing%20Authorization%20in%20richplugins%20Trust.Reviews&amp;severity=null&amp;id=69cd732de6bfc5ba1def0be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30881-missing-authorization-in-themehunk--28358514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30881%3A%20Missing%20Authorization%20in%20themehunk%20Big%20Store&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30879-improper-neutralization-of-special--c811f861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30879%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Moreconvert%20Team%20MC%20Woocommerce%20Wishlist&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30877-missing-authorization-in-fatcatapps-9763e0b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30877%3A%20Missing%20Authorization%20in%20fatcatapps%20Quiz%20Cat&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30874-missing-authorization-in-jose-morte-accc023e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30874%3A%20Missing%20Authorization%20in%20Jose%20Mortellaro%20Specific%20Content%20For%20Mobile&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30873-improper-neutralization-of-input-du-a3a9c7e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30872-cross-site-request-forgery-csrf-in--f13c1fc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30872%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nitin%20Prakash%20Product%20Author%20for%20WooCommerce&amp;severity=null&amp;id=69cd732de6bfc5ba1def0bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30868-improper-control-of-filename-for-in-9852d726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30868%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Maidul%20Team%20Manager&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30866-missing-authorization-in-giannis-ki-934b67b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30866%3A%20Missing%20Authorization%20in%20Giannis%20Kipouros%20Terms%20%26%20Conditions%20Per%20Product&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30865-cross-site-request-forgery-csrf-in--275e6c07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30865%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fuzzoid%203DPrint%20Lite&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30864-missing-authorization-in-falselight-1405711c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30864%3A%20Missing%20Authorization%20in%20falselight%20Exchange%20Rates&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30863-cross-site-request-forgery-csrf-in--9d8881c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30863%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRM%20Perks%20Integration%20for%20Google%20Sheets%20and%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Ninja%20Forms&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30862-cross-site-request-forgery-csrf-in--d2f10f74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30862%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sminozzi%20reCAPTCHA%20for%20all&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30861-missing-authorization-in-rustaurius-246be91d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30861%3A%20Missing%20Authorization%20in%20Rustaurius%20Five%20Star%20Restaurant%20Reservations&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30860-improper-neutralization-of-input-du-1e45bfd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jory%20Hogeveen%20Off-Canvas%20Sidebars%20%26%20Menus%20(Slidebars)&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30859-url-redirection-to-untrusted-site-o-f0f2852b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30859%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20guru-aliexpress%20AliNext&amp;severity=null&amp;id=69cd732be6bfc5ba1def0b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30857-cross-site-request-forgery-csrf-in--72a6e3f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30857%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressMaximum%20Currency%20Switcher%20for%20WooCommerce&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30856-cross-site-request-forgery-csrf-in--b65b4726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theme%20funda%20Custom%20Field%20For%20WP%20Job%20Manager&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30854-cross-site-request-forgery-csrf-in--01e8f1d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30854%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vollstart%20Serial%20Codes%20Generator%20and%20Validator%20with%20WooCommerce%20Support&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30850-improper-neutralization-of-input-du-8f1e2a8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sfaerber%20Dr.%20Flex&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30847-improper-neutralization-of-input-du-3c8afe4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashley%20Novelist&amp;severity=null&amp;id=69cd7329e6bfc5ba1def0b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30846-improper-control-of-filename-for-in-8cd8193d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30846%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20jetmonsters%20Restaurant%20Menu%20by%20MotoPress&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30845-improper-control-of-filename-for-in-d5a052f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30845%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30843-improper-neutralization-of-special--1e18b01c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30843%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20setriosoft%20bizcalendar-web&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30842-cross-site-request-forgery-csrf-in--a94041e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30842%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pixolette%20Christmas%20Panda&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30839-missing-authorization-in-magepeople-a5245ae7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30839%3A%20Missing%20Authorization%20in%20magepeopleteam%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30838-improper-neutralization-of-input-du-1647ad1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=69cd7327e6bfc5ba1def0aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30833-cross-site-request-forgery-csrf-in--4459c917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30833%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30832-improper-neutralization-of-input-du-f7d1a259</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30832%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30831-improper-control-of-filename-for-in-85f47541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30831%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themifyme%20Themify%20Event%20Post&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30830-missing-authorization-in-hossni-mub-07610506</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30830%3A%20Missing%20Authorization%20in%20Hossni%20Mubarak%20Cool%20Author%20Box&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30829-improper-control-of-filename-for-in-53c79e61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30829%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20WPCafe&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30828-missing-authorization-in-arraytics--fdc4ecbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30828%3A%20Missing%20Authorization%20in%20Arraytics%20Timetics&amp;severity=null&amp;id=69cd7324e6bfc5ba1def0a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30826-improper-neutralization-of-input-du-2d222979</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lannoy%20IP%20Locator&amp;severity=null&amp;id=69cd7324e6bfc5ba1def09fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30824-missing-authorization-in-israpil-te-b2f3a2ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30824%3A%20Missing%20Authorization%20in%20Israpil%20Textmetrics&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30823-cross-site-request-forgery-csrf-in--f8a7453c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30823%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Boone%20Gorges%20Anthologize&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30822-cross-site-request-forgery-csrf-in--e1759880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30822%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hakik%20Zaman%20Custom%20Login%20Logo&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30821-missing-authorization-in-otacke-sno-342b5846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30821%3A%20Missing%20Authorization%20in%20otacke%20SNORDIAN&apos;s%20H5PxAPIkatchu&amp;severity=null&amp;id=69cd7322e6bfc5ba1def091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30820-improper-control-of-filename-for-in-6ab8a010</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30820%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20HT%20Plugins%20WishSuite&amp;severity=null&amp;id=69cd7322e6bfc5ba1def091a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30819-improper-neutralization-of-special--21013ce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30819%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Igor%20Benic%20Simple%20Giveaways&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30818-improper-neutralization-of-input-du-5dabbfdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlaza%20jAlbum%20Bridge&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30817-missing-authorization-in-wpzita-z-c-bc866f75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30817%3A%20Missing%20Authorization%20in%20wpzita%20Z%20Companion&amp;severity=null&amp;id=69cd7322e6bfc5ba1def0911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30816-cross-site-request-forgery-csrf-in--26a45eb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30816%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nks%20publish%20post%20email%20notification&amp;severity=null&amp;id=69cd7322e6bfc5ba1def090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30815-cross-site-request-forgery-csrf-in--6d143bdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30815%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30814-improper-control-of-filename-for-in-a6159c06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30814%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20The%20Post%20Grid&amp;severity=null&amp;id=69cd731ee6bfc5ba1def083f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30812-improper-neutralization-of-input-du-efbabab2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd731ee6bfc5ba1def083c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30811-cross-site-request-forgery-csrf-in--1c41431c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30811%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Javier%20Revilla%20ValidateCertify&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30810-improper-neutralization-of-special--93f4535a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30810%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Smackcoders%20Inc.%2C%20Lead%20Form%20Data%20Collection%20to%20CRM&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30809-missing-authorization-in-shahjada-l-17ee0b7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30809%3A%20Missing%20Authorization%20in%20Shahjada%20Live%20Forms&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30806-improper-neutralization-of-special--9216ae7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30806%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Constantin%20Boiangiu%20Vimeotheque&amp;severity=null&amp;id=69cd731ee6bfc5ba1def082a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30805-cross-site-request-forgery-csrf-in--438a0dea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30805%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdesk%20Flexible%20Cookies&amp;severity=null&amp;id=69cd731ee6bfc5ba1def0827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30804-cross-site-request-forgery-csrf-in--8b63bb1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30804%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maennchen1.de%20wpShopGermany%20IT-RECHT%20KANZLEI&amp;severity=null&amp;id=69cd7318e6bfc5ba1def077a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30803-missing-authorization-in-greg-ross--1b0660a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30803%3A%20Missing%20Authorization%20in%20Greg%20Ross%20Just%20Writing%20Statistics&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30801-cross-site-request-forgery-csrf-in--a62c7bd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30801%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Abu%20Bakar%20TWB%20Woocommerce%20Reviews&amp;severity=null&amp;id=69cd7318e6bfc5ba1def0771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30800-improper-neutralization-of-input-du-4cb82aa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30800%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atawai%20Gum%20Elementor%20Addon&amp;severity=null&amp;id=69cd7318e6bfc5ba1def076d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30799-improper-neutralization-of-input-du-45f8aed6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pagup%20WP%20Google%20Street%20View&amp;severity=null&amp;id=69cd7318e6bfc5ba1def076a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30795-url-redirection-to-untrusted-site-o-e8aa9d7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30795%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Aman%20FunnelKit%20Automations&amp;severity=null&amp;id=69cd7318e6bfc5ba1def075e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30792-improper-neutralization-of-input-du-efaace5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ufukart%20Comment%20Approved%20Notifier%20Extended&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30791-improper-neutralization-of-special--e5813bb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30791%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdever%20Cart%20tracking%20for%20WooCommerce&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30790-missing-authorization-in-alexvtn-ch-8635adb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30790%3A%20Missing%20Authorization%20in%20alexvtn%20Chatbox%20Manager&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30789-improper-neutralization-of-input-du-0a8cb2fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30789%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clearoutio%20Clearout%20Email%20Validator&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30788-cross-site-request-forgery-csrf-in--b21dab45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30788%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30787-cross-site-request-forgery-csrf-in--c572096a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30787%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30786-improper-neutralization-of-input-du-a58e0dad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oooorgle%20Quotes%20llama&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30785-improper-control-of-filename-for-in-548996bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30785%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Shuffle%20Subscribe%20to%20Download%20Lite&amp;severity=null&amp;id=69cd7310e6bfc5ba1def05ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30784-improper-neutralization-of-special--35321717</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30784%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Shuffle%20WP%20Subscription%20Forms&amp;severity=null&amp;id=69cd730be6bfc5ba1def04db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30783-cross-site-request-forgery-csrf-in--65dff798</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30783%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jgwhite33%20WP%20Google%20Review%20Slider&amp;severity=null&amp;id=69cd730be6bfc5ba1def04d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30781-url-redirection-to-untrusted-site-o-660d6ca0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30781%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20WPFactory%20Scheduled%20%26amp%3B%20Automatic%20Order%20Status%20Controller%20for%20WooCommerce&amp;severity=null&amp;id=69cd730be6bfc5ba1def04d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30780-improper-neutralization-of-input-du-c52f7fde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30780%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cubecolour%20Audio%20Album&amp;severity=null&amp;id=69cd730be6bfc5ba1def04cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30779-improper-neutralization-of-input-du-23ff140f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30779%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nick%20van%20Wobbie%20Doneren%20met%20Mollie&amp;severity=null&amp;id=69cd730be6bfc5ba1def04cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30777-authorization-bypass-through-user-c-f2ab9bfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30777%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20DevItems%20Support%20Genix&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30776-improper-neutralization-of-input-du-804b21ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Sitekit&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30775-improper-neutralization-of-special--925e0ad0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30775%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd730be6bfc5ba1def04c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30773-deserialization-of-untrusted-data-i-8bb929f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30773%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cozmoslabs%20TranslatePress&amp;severity=null&amp;id=69cd7309e6bfc5ba1def025d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30771-improper-neutralization-of-input-du-4ac296f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alain-Aymerick%20FRANCOIS%20WP%20Cassify&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30770-improper-neutralization-of-input-du-c586c9ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20Charitable&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30769-cross-site-request-forgery-csrf-in--193394ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexvtn%20WIP%20WooCarousel%20Lite&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30772-missing-authorization-in-wpclever-w-7c45ad98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30772%3A%20Missing%20Authorization%20in%20WPClever%20WPC%20Smart%20Upsell%20Funnel%20for%20WooCommerce&amp;severity=null&amp;id=69cd7309e6bfc5ba1def025a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30768-improper-neutralization-of-input-du-8a319588</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30768%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlaza%20jAlbum%20Bridge&amp;severity=null&amp;id=69cd7309e6bfc5ba1def024e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30767-missing-authorization-in-add-onsorg-9c2a9750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30767%3A%20Missing%20Authorization%20in%20add-ons.org%20PDF%20for%20WPForms&amp;severity=null&amp;id=69cd7309e6bfc5ba1def024a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30766-improper-neutralization-of-input-du-42d14faf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30765-improper-neutralization-of-special--87746c45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30765%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPPOOL%20FlexStock&amp;severity=null&amp;id=69cd7309e6bfc5ba1def0244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30764-cross-site-request-forgery-csrf-in--80de349c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30764%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AntoineH%20Football%20Pool&amp;severity=null&amp;id=69cd7307e6bfc5ba1def021a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30763-improper-neutralization-of-input-du-6177659b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30763%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Olaf%20Lederer%20EO4WP&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2685-cwe-79-improper-neutralization-of-in-2148734f</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2332-cwe-502-deserialization-of-untrusted-510b8b6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2332%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=critical&amp;id=699f6b21b7ef31ef0b54e740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2481-cwe-79-improper-neutralization-of-in-3b2e81db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dman25560%20MediaView&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-27-2bd387</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-27&amp;severity=medium&amp;id=682c7db7e8347ec82d2bd387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-27-f121d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f121d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20229-the-software-does-not-restrict-or-i-98428fd9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20229%3A%20The%20software%20does%20not%20restrict%20or%20incorrectly%20restricts%20access%20to%20a%20resource%20from%20an%20unauthorized%20actor.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69a0a44d85912abc71d6524e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20231-information-written-to-log-files-ca-d66fff74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20231%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69a0a44d85912abc71d65251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30407-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf1652</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30407%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2600-cwe-285-improper-authorization-in-de-36d660fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2600%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=medium&amp;id=68adf6caad5a09ad005a54d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30351-cwe-672-operation-on-a-resource-aft-58f91212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30351%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20directus%20directus&amp;severity=low&amp;id=68487f5b1b0bd07c3938c87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30164-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-icinga-icingaweb2-bd6c44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30164%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Icinga%20icingaweb2&amp;severity=medium&amp;id=682d9816c4522896dcbd6c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2783-incorrect-handle-provided-in-unspeci-c347279f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2783%3A%20Incorrect%20handle%20provided%20in%20unspecified%20circumstances%20in%20Google%20Chrome&amp;severity=high&amp;id=6843110671f4d251b5d0a605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2098-cwe-732-incorrect-permission-assignm-699ad7d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2098%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Beijing%20Honghu%20Yuntu%20Technology%20Fast%20CAD%20Reader&amp;severity=high&amp;id=68dffc4fb7ee07964d95f635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26922-improper-neutralization-of-input-du-1a94b3d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techthemes%20AuraMart&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26923-improper-neutralization-of-input-du-c11b8d41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26929-improper-neutralization-of-input-du-a90b2e3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Accounting%20for%20WooCommerce&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26941-improper-neutralization-of-special--1680b825</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26941%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26986-improper-control-of-filename-for-in-84fd3d0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26986%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20StylemixThemes%20Pearl%20-%20Corporate%20Business&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27014-improper-neutralization-of-input-du-996f4d96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27014%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designingmedia%20Hostiko&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27015-improper-control-of-filename-for-in-62deff00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27015%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20designingmedia%20Hostiko&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30524-improper-neutralization-of-special--18d52d89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30524%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20origincode%20Product%20Catalog&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28942-improper-neutralization-of-special--e94fc664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28942%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Trust%20Payments%20Trust%20Payments%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28939-improper-neutralization-of-special--e0fcca4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28939%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20EuroCizia%20WP%20Google%20Calendar%20Manager&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28935-improper-neutralization-of-input-du-36808454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20puzich%20Fancybox%20Plus&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28934-improper-neutralization-of-input-du-720b4414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chaozh%20Simple%20Post%20Series&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28928-improper-neutralization-of-input-du-77373e9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sureshdsk%20Are%20you%20robot%20google%20recaptcha%20for%20wordpress&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28924-improper-neutralization-of-input-du-0b2b31a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simbul%20ZenphotoPress&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28921-improper-neutralization-of-input-du-68c32a6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homejunction%20SpatialMatch%20IDX&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28917-improper-neutralization-of-input-du-2e6ca1a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crazyloong%20Custom%20Smilies&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28916-improper-control-of-filename-for-in-56e49b5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28916%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Rashid%20Docpro&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28911-improper-neutralization-of-input-du-e1bbe034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gravity2pdf%20Gravity%202%20PDF&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28903-improper-neutralization-of-input-du-1ac64137</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hectorgarrofe%20Driving%20Directions&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28899-improper-neutralization-of-input-du-2bdfd7ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toddhuish%20WP%20Event%20Ticketing&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28898-improper-neutralization-of-special--2bc10788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28898%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28893-improper-control-of-generation-of-c-de276741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28893%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Govind%20Visual%20Text%20Editor&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28890-improper-neutralization-of-input-du-7203fd19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20puzich%20Lightview%20Plus&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28889-improper-neutralization-of-input-du-62d56e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28889%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20starblank%20Custom%20Product%20Stickers%20for%20Woocommerce&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28885-improper-neutralization-of-input-du-994e9da8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fiverraffiliates%20Fiverr.com%20Official%20Search%20Box&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28882-improper-neutralization-of-input-du-3992e868</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Omnify%2C%20Inc.%20Omnify&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28880-improper-neutralization-of-input-du-cec15eff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jotis%20Blue%20Captcha&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28877-improper-neutralization-of-input-du-8d316841</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20m.tiggelaar%20Key4ce%20osTicket%20Bridge&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28873-improper-neutralization-of-special--43fc2974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28873%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Scott%20Taylor%20Shuffle&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28869-improper-neutralization-of-input-du-40c57f59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shauno%20NextGEN%20Gallery%20Voting&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28865-improper-neutralization-of-input-du-9447744e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28865%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lionelroux%20WP%20Colorful%20Tag%20Cloud&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28858-improper-neutralization-of-input-du-f5f0b603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arrow%20Plugins%20Arrow%20Maps&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28855-improper-neutralization-of-input-du-661905ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20srcoley%20Teleport&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27267-improper-neutralization-of-input-du-8ba7e2c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20srcoley%20Random%20Quotes&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26584-improper-neutralization-of-input-du-3eb64a64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Travis%20Ballard%20TBTestimonials&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26583-improper-neutralization-of-input-du-87331571</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26581-improper-neutralization-of-input-du-8b593920</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Picture%20Gallery&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26579-improper-neutralization-of-input-du-3c8964fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20MicroPayments&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26576-improper-neutralization-of-input-du-906a87f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20takumin%20WP%20Simple%20Slideshow&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26575-improper-neutralization-of-input-du-1f5b830a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Maurer%20Display%20Post%20Meta&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26573-improper-neutralization-of-input-du-1b6988dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JamRizzi%20Technologies%20Rizzi%20Guestbook&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26566-improper-neutralization-of-input-du-d5f4f587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Frank%20In%20Stock%20Mailer%20for%20WooCommerce&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26565-improper-neutralization-of-input-du-be777b30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kagla%20GNUPress&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26564-improper-neutralization-of-input-du-2b11eb12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kagla%20GNUCommerce&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26560-improper-neutralization-of-input-du-49ed7730</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KKWangen%20WP%20Contact%20Form%20III&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26559-improper-neutralization-of-input-du-f6c1aa99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Secure%20Invites&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26546-improper-neutralization-of-input-du-648cb5ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pixelpro%20Cookies%20Pro&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26544-improper-neutralization-of-input-du-333b5552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Max%20K%20UTM%20tags%20tracking%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd729de6bfc5ba1deec665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26542-improper-neutralization-of-input-du-d8bef843</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dang%20Ngoc%20Binh%20Zalo%20Live%20Chat&amp;severity=null&amp;id=69cd729de6bfc5ba1deec65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26541-improper-neutralization-of-input-du-c76bb0e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeSolz%20Bitcoin%20%2F%20AltCoin%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd729de6bfc5ba1deec65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26537-improper-neutralization-of-input-du-c4648ffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rolomak%20GDPR%20Tools&amp;severity=null&amp;id=69cd729de6bfc5ba1deec653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26536-improper-neutralization-of-input-du-3e78ae6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yendif%20Player%20Another%20Events%20Calendar&amp;severity=null&amp;id=69cd729de6bfc5ba1deec650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25134-improper-neutralization-of-input-du-547c5555</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25134%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zenverse%20Theme%20Demo%20Bar&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24690-improper-control-of-filename-for-in-dc5c4872</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24690%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Michele%20Giorgi%20Formality&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23964-improper-neutralization-of-input-du-7edb64bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23964%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajitae%20Google%20Plus&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23952-improper-control-of-filename-for-in-08b06227</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23952%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ntm%20custom-field-list-widget&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23937-improper-control-of-filename-for-in-c3768b4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23937%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Alex%20Furr%20LinkedIn%20Lite&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee903f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23735-improper-neutralization-of-input-du-3c9376e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cosmin%20Schiopu%20Infugrator&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23728-improper-neutralization-of-input-du-99f2af03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23728%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20atelierhyper%20AuMenu&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee844a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23714-improper-neutralization-of-input-du-5f476590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20podspod%20AppReview&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23704-improper-neutralization-of-input-du-5ab181f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Reuven%20Karasik%20Your%20Lightbox&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23680-improper-neutralization-of-input-du-90085776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Narnoo%20Narnoo%20Operator&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23666-improper-neutralization-of-input-du-99f61903</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cxc-sawa%20Management-screen-droptiles&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0aec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23638-improper-neutralization-of-input-du-4e2409ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Umesh%20Ghimire%20Frontend%20Post%20Submission&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23633-improper-neutralization-of-input-du-403c31b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khanhtruong%20WP%20Database%20Audit&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23632-improper-neutralization-of-input-du-614590ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rhizome%20Networks%20CG%20Button&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0aca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23612-improper-neutralization-of-input-du-bc56a6f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23612%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pixobe%20Pixobe%20Cartography&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23546-improper-neutralization-of-input-du-3c27e711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20D%20Payne%20RDP%20inGroups%2B&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23543-improper-neutralization-of-input-du-ef50a129</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fomopay%20FOMO%20Pay%20Chinese%20Payment%20Solution&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23542-improper-neutralization-of-input-du-26eeb2e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20D%20Payne%20RDP%20Linkedin%20Login&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23466-improper-neutralization-of-input-du-755a57d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23466%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsiteeditor%20Site%20Editor%20Google%20Map&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23460-improper-neutralization-of-input-du-c439f795</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rhizomaticweb%20RWS%20Enquiry%20And%20Lead%20Follow-up&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23459-improper-neutralization-of-input-du-9acc5549</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23459%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NsThemes%20NS%20Simple%20Intro%20Loader&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22283-improper-neutralization-of-input-du-cc860b82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22283%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Riyaz%20GetSocial&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23203-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-icinga-icingaweb2-module-director-bebf0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23203%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Icinga%20icingaweb2-module-director&amp;severity=medium&amp;id=682d9838c4522896dcbebf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2228-cwe-200-exposure-of-sensitive-inform-70d37769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2228%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%20Plugin%20and%20Elementor%20Templates&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1913-cwe-502-deserialization-of-untrusted-de1d69ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1913%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=high&amp;id=69330fa6f88dbe026cfb4084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1911-cwe-73-external-control-of-file-name-00692fec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1911%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=low&amp;id=699f6b19b7ef31ef0b54e234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1912-cwe-918-server-side-request-forgery--3f57f599</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1312-cwe-79-improper-neutralization-of-in-01bcf44d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1312%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%20WordPress%20Blocks%20Plugin&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54db33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13411-cwe-918-server-side-request-forgery-79326742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13411%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20zapier%20Zapier%20for%20WordPress&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13889-cwe-502-deserialization-of-untruste-216c35ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13889%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wordpressdotorg%20WordPress%20Importer&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1769-cwe-22-improper-limitation-of-a-path-36d0490b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1769%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20Product%20Import%20Export%20for%20WooCommerce%20%E2%80%93%20Import%20Export%20Product%20CSV%20Suite&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2110-cwe-862-missing-authorization-in-sma-cc6987f4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2110%3A%20CWE-862%20Missing%20Authorization%20in%20smartersite%20WP%20Compress%20%E2%80%93%20Instant%20Performance%20%26%20Speed%20Optimization&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27552-cwe-338-use-of-cryptographically-we-88eb1a25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27552%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WREIS%20DBIx%3A%3AClass%3A%3AEncodedColumn&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27551-cwe-338-use-of-cryptographically-we-2b0ed43d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27551%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20WREIS%20DBIx%3A%3AClass%3A%3AEncodedColumn&amp;severity=medium&amp;id=68bae6eb9bc4cbad54150dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1542-cwe-425-direct-request-forced-browsi-967fc2d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1542%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Infonet%20Projekt%20SA%20OXARI%20ServiceDesk&amp;severity=critical&amp;id=68dffc4fb7ee07964d95f631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1440-cwe-20-improper-input-validation-in--c44f29ee</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1440%3A%20CWE-20%20Improper%20Input%20Validation%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1703-cwe-79-improper-neutralization-of-in-f30dee24</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%20WordPress%20Blocks%20Plugin&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1437-cwe-79-improper-neutralization-of-in-c9d48311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1439-cwe-79-improper-neutralization-of-in-e7facd64</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1310-cwe-22-improper-limitation-of-a-path-4f161d90</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1310%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20blueglassch%20Job%20Postings&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54db20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13702-cwe-79-improper-neutralization-of-i-09df8dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20CRM%20and%20Lead%20Management%20by%20vcita&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13801-cwe-862-missing-authorization-in-xe-eefa25af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13801%3A%20CWE-862%20Missing%20Authorization%20in%20xenioushk%20BWL%20Advanced%20FAQ%20Manager&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dc28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1514-cwe-20-improper-input-validation-in--b44708ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1514%3A%20CWE-20%20Improper%20Input%20Validation%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Use%20constructor%20to%20create%20tables&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2009-cwe-79-improper-neutralization-of-in-0ea0d9cd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2009%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contrid%20Newsletters&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2167-cwe-79-improper-neutralization-of-in-7c14cb91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bastho%20Event%20post&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2257-cwe-78-improper-neutralization-of-sp-e8c7e8e8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2257%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1784-cwe-79-improper-neutralization-of-in-532b0168</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1490-cwe-79-improper-neutralization-of-in-aaead73b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brijeshk89%20Smart%20Maintenance%20Mode&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2165-cwe-79-improper-neutralization-of-in-e161c151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2165%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samhoamt%20SH%20Email%20Alert&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2573-cwe-79-improper-neutralization-of-in-95e93a5f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zia420%20Amazing%20service%20box%20Addons%20For%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2576-cwe-79-improper-neutralization-of-in-aa76d8a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themerox%20Ayyash%20Studio%20%E2%80%94%20The%20kick-start%20kit&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-26-2bdd71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-26&amp;severity=medium&amp;id=682c7db7e8347ec82d2bdd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2025-03-26-84a43d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202025-03-26&amp;severity=medium&amp;id=682b68edd14de609c884a43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-26-f12fde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2276-cwe-862-missing-authorization-in-dav-7e12d517</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2276%3A%20CWE-862%20Missing%20Authorization%20in%20davidvongries%20Ultimate%20Dashboard%20%E2%80%93%20Custom%20WordPress%20Dashboard&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2302-cwe-79-improper-neutralization-of-in-7a8f1c1e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mihail-barinov%20Advanced%20Woo%20Search&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47516-improper-neutralization-of-argument-08082617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47516%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)&amp;severity=critical&amp;id=699f6d08b7ef31ef0b56d5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28904-improper-neutralization-of-special--e5d4e759</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28904%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58105-vulnerability-in-trend-micro-inc-tr-9aa9a538</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58105%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=69a0a44985912abc71d64ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58104-vulnerability-in-trend-micro-inc-tr-de2a293a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58104%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=69a0a44985912abc71d64abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26742-improper-neutralization-of-input-du-dda73318</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20for%20Social%20Photo&amp;severity=null&amp;id=69cd72ace6bfc5ba1deec915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27632-cwe-644-improper-neutralization-of--445c5cb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27632%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20Hitachi%20Energy%20TRMTracker&amp;severity=medium&amp;id=68fb6f3e65a68e41108fc15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2109-cwe-918-server-side-request-forgery--6089c3de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2109%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20smartersite%20WP%20Compress%20%E2%80%93%20Instant%20Performance%20%26%20Speed%20Optimization&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2635-cwe-79-improper-neutralization-of-in-bc808392</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeverve%20Digital%20License%20Manager&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e99c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2542-cwe-79-improper-neutralization-of-in-3fac5729</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2542%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20obbdpu%20Your%20Simple%20SVG%20Support&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e8bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2319-cwe-352-cross-site-request-forgery-c-d7552cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2319%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scheeeli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13690-cwe-79-improper-neutralization-of-i-7da04d83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ashishajani%20WP%20Church%20Donation&amp;severity=high&amp;id=699f6e68b7ef31ef0b5a0180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13731-cwe-79-improper-neutralization-of-i-188a5493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20Alert%20Box%20Block%20%E2%80%93%20Display%20notice%2Falerts%20in%20the%20front%20end.&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a045d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13710-cwe-352-cross-site-request-forgery--4c7a4100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13710%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20estatebud%20Estatebud%20%E2%80%93%20Properties%20%26%20Listings&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2510-cwe-79-improper-neutralization-of-in-9ea9eae9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bittokazi%20Frndzk%20Expandable%20Bottom%20Bar&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2559-allocation-of-resources-without-limits-or-throttling-in-red-hat-red-hat-build-of-keycloak-bee413</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2559%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=682d983bc4522896dcbee413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12623-cwe-79-improper-neutralization-of-i-22ff8765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivmartel%20DICOM%20Support&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1320-cwe-352-cross-site-request-forgery-c-5e334fa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1320%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2252-cwe-200-exposure-of-sensitive-inform-f351f243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2252%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2224-cwe-862-missing-authorization-in-wpw-180708fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2224%3A%20CWE-862%20Missing%20Authorization%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%20Plugin%20with%20Classified%20Ads%20Listings&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0845-cwe-79-improper-neutralization-of-in-164634b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2724-bf775a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2724&amp;severity=medium&amp;id=682d984ac4522896dcbf775a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2723-bf7756</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2723&amp;severity=medium&amp;id=682d984ac4522896dcbf7756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2722-bf7752</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2722&amp;severity=medium&amp;id=682d984ac4522896dcbf7752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2721-bf7741</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2721&amp;severity=medium&amp;id=682d984ac4522896dcbf7741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27836-na-1426de51</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27836%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27835-na-0a1f9a49</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27835%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27832-na-b36c4448</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27832%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27831-na-75c52992</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27831%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27830-na-db6de96b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27830%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-10434e67</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=68359c9e5d5f0974d01f8f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-f1fef2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=682acdc3bbaf20d303f1fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-f12b1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-25-07ad5c91</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-25&amp;severity=medium&amp;id=6829b2d4c469c0a05b456c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24514-cwe-20-improper-input-validation-in-124084ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24514%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=high&amp;id=69091e18c28fd46ded86986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24513-cwe-20-improper-input-validation-in-767b7116</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24513%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=medium&amp;id=69091e18c28fd46ded869869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1098-cwe-20-improper-input-validation-in--6c77fd13</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1098%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=high&amp;id=69091a49c28fd46ded81d033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1097-cwe-20-improper-input-validation-in--b24403e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1097%3A%20CWE-20%20Improper%20Input%20Validation%20in%20kubernetes%20ingress-nginx&amp;severity=high&amp;id=69091a49c28fd46ded81d02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1974-cwe-653-improper-isolation-or-compar-d63877a9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1974%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20kubernetes%20ingress-nginx&amp;severity=critical&amp;id=69091a4ac28fd46ded81d089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26512-cwe-266-in-netapp-snapcenter-a2e40abf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26512%3A%20CWE-266%20in%20NetApp%20SnapCenter&amp;severity=critical&amp;id=69a0a45985912abc71d662bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2748-cwe-79-improper-neutralization-of-in-582489fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kentico%20Xperience&amp;severity=medium&amp;id=691dd88c52987e43f71b4d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2749-cwe-22-improper-limitation-of-a-path-ac8956b9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2749%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Kentico%20Xperience&amp;severity=high&amp;id=690a6f059e609817bf702f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2747-cwe-288-authentication-bypass-using--3424e606</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2747%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Kentico%20Xperience&amp;severity=critical&amp;id=68d2c21e1b7eb49f20a06622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2746-cwe-288-authentication-bypass-using--d7975bdb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2746%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Kentico%20Xperience&amp;severity=critical&amp;id=68d2c21e1b7eb49f20a0661d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30623-improper-neutralization-of-input-du-8f1ab00a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rachel%20Cherry%20wA11y%20%E2%80%93%20The%20Web%20Accessibility%20Toolbox&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30621-cross-site-request-forgery-csrf-in--475301b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kornelly%20Translator&amp;severity=null&amp;id=69cd7307e6bfc5ba1def020d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30620-cross-site-request-forgery-csrf-in--6de5179b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30620%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20coderscom%20WP%20Odoo%20Form%20Integrator&amp;severity=null&amp;id=69cd7307e6bfc5ba1def020a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30617-cross-site-request-forgery-csrf-in--31ea2f1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20takien%20Rewrite&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30615-cross-site-request-forgery-csrf-in--4938b66a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30615%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jacob%20Schwartz%20WP%20e-Commerce%20Style%20Email&amp;severity=null&amp;id=69cd7307e6bfc5ba1def0201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30612-cross-site-request-forgery-csrf-in--dc9ea00c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30612%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mandegarweb%20Replace%20Default%20Words&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30610-improper-neutralization-of-input-du-de6bcf59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchsquare%20WP%20Social%20Widget&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30609-insertion-of-sensitive-information--d4f81eb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30609%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Saad%20Iqbal%20AppExperts&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30608-cross-site-request-forgery-csrf-in--9a07635b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30608%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Anthony%20WordPress%20SQL%20Backup&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30606-improper-neutralization-of-input-du-6825778c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30606%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Logan%20Carlile%20Easy%20Page%20Transition&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30605-missing-authorization-in-ldwin79-so-33e22787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30605%3A%20Missing%20Authorization%20in%20ldwin79%20sourceplay-navermap&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30604-improper-neutralization-of-special--acc1e0bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30604%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jiangqie%20JiangQie%20Official%20Website%20Mini%20Program&amp;severity=null&amp;id=69cd7305e6bfc5ba1def01bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30603-cross-site-request-forgery-csrf-in--227b0cf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30603%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DEJAN%20CopyLink&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30602-improper-neutralization-of-input-du-057c7939</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alphasis%20Related%20Posts%20via%20Categories&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30601-cross-site-request-forgery-csrf-in--2df7c574</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30601%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flipdish%20Flipdish%20Ordering%20System&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30600-improper-neutralization-of-input-du-25160620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thiagogsrwp%20WP%20Hotjar&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30599-improper-neutralization-of-input-du-eff5158c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp-maverick%20WP%20Parallax%20Content%20Slider&amp;severity=null&amp;id=69cd7303e6bfc5ba1def013d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30598-cross-site-request-forgery-csrf-in--807adf17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30598%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Link%20OSS%20Upload&amp;severity=null&amp;id=69cd7303e6bfc5ba1def013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30597-improper-neutralization-of-input-du-2c992c25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iografica%20IG%20Shortcodes&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30595-improper-neutralization-of-input-du-455bb7d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tstafford%20include-file&amp;severity=null&amp;id=69cd7303e6bfc5ba1def0131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30593-improper-neutralization-of-input-du-29a4b2c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samsk%20Include%20URL&amp;severity=null&amp;id=69cd7300e6bfc5ba1def005e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30592-missing-authorization-in-westerndea-0e4730b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30592%3A%20Missing%20Authorization%20in%20WesternDeal%20Advanced%20Dewplayer&amp;severity=null&amp;id=69cd7300e6bfc5ba1def005b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30591-missing-authorization-in-tuyennv-mu-4a5e71ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30591%3A%20Missing%20Authorization%20in%20tuyennv%20Music%20Press%20Pro&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30590-improper-neutralization-of-special--00eca2c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30590%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dourou%20Flickr%20set%20slideshows&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30588-cross-site-request-forgery-csrf-in--dbe516d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30588%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryan_xantoo%20Map%20Contact&amp;severity=null&amp;id=69cd7300e6bfc5ba1def004f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30587-cross-site-request-forgery-csrf-in--0307c5c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30587%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shawfactor%20LH%20OGP%20Meta&amp;severity=null&amp;id=69cd7300e6bfc5ba1def004c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30586-cross-site-request-forgery-csrf-in--07118faf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30586%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bbodine1%20cTabs&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30585-cross-site-request-forgery-csrf-in--fc7dd7f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30585%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marynixie%20Generate%20Post%20Thumbnails&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30584-cross-site-request-forgery-csrf-in--fc83ceaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30584%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alphaomegaplugins%20AlphaOmega%20Captcha%20%26amp%3B%20Anti-Spam%20Filter&amp;severity=null&amp;id=69cd7300e6bfc5ba1def0043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30583-cross-site-request-forgery-csrf-in--c917ba5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30583%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ProRankTracker%20Pro%20Rank%20Tracker&amp;severity=null&amp;id=69cd72fee6bfc5ba1deefff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30581-missing-authorization-in-pluginops--0fe9cffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30581%3A%20Missing%20Authorization%20in%20PluginOps%20Top%20Bar&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30578-cross-site-request-forgery-csrf-in--1debe53f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30578%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hotvanrod%20AdSense%20Privacy%20Policy&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30577-cross-site-request-forgery-csrf-in--ea4c91f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30577%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mendibass%20Browser%20Address%20Bar%20Color&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30576-cross-site-request-forgery-csrf-in--75504311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30576%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HuangYe%20WuDeng%20Hacklog%20Remote%20Image%20Autosave&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30575-improper-neutralization-of-input-du-aca89b07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arefly%20Login%20Redirect&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30574-improper-neutralization-of-input-du-fb42ed15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jenst%20Mobile%20Navigation&amp;severity=null&amp;id=69cd72fee6bfc5ba1deeffda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30573-improper-neutralization-of-input-du-db88eadb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrdenny%20My%20Default%20Post%20Content&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30572-cross-site-request-forgery-csrf-in--9b524ce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Yavych%20Simple%20Rating&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30571-improper-neutralization-of-special--9d49212a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30571%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20STEdb%20Corp.%20STEdb%20Forms&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30570-improper-neutralization-of-special--7cd2e3ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30569-improper-neutralization-of-special--2964b980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30569%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jahertor%20WP%20Featured%20Entries&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30568-cross-site-request-forgery-csrf-in--6b9b5aa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hitoy%20Super%20Static%20Cache&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30566-improper-neutralization-of-input-du-ec48bbe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aryan%20Themes%20Clink&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30565-cross-site-request-forgery-csrf-in--f8c6071b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30565%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20karrikas%20banner-manager&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30564-cross-site-request-forgery-csrf-in--ae2b62cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30564%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpwox%20Custom%20Script%20Integration&amp;severity=null&amp;id=69cd72fce6bfc5ba1deeff47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30561-cross-site-request-forgery-csrf-in--0edd3e88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30561%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Henrique%20Mouta%20CAS%20Maestro&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30560-cross-site-request-forgery-csrf-in--5918745c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30560%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sana%20Ullah%20jQuery%20Dropdown%20Menu&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30558-cross-site-request-forgery-csrf-in--b6f79e45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30558%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EnzoCostantini55%20ANAC%20XML%20Render&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30557-cross-site-request-forgery-csrf-in--9c280ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20odihost%20Easy%20301%20Redirects&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30556-cross-site-request-forgery-csrf-in--72b50f76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30556%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20flyaga%20Fix%20Rss%20Feeds&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30555-cross-site-request-forgery-csrf-in--28471f7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iiiryan%20WordPres%20%E5%90%8C%E6%AD%A5%E5%BE%AE%E5%8D%9A&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30553-improper-neutralization-of-input-du-f0cc278a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Z.com%20byGMO%20GMO%20Font%20Agent&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefeb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30552-cross-site-request-forgery-csrf-in--7a3c8014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30552%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Donald%20Gilbert%20WordPress%20Admin%20Bar%20Improved&amp;severity=null&amp;id=69cd72fae6bfc5ba1deefead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30551-improper-neutralization-of-input-du-b2a72ba7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartredfox%20Pretty%20file%20links&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30550-cross-site-request-forgery-csrf-in--b1a79127</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPShop.ru%20CallPhone&apos;r&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30549-cross-site-request-forgery-csrf-in--7a0d06f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Yummly%20Yummly%20Rich%20Recipes&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefde7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30546-cross-site-request-forgery-csrf-in--766ecddf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20boroV%20Cackle&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30545-improper-neutralization-of-input-du-d8d05e8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixeline%20issuuPress&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30543-missing-authorization-in-swayamtejw-c7a0cde8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30543%3A%20Missing%20Authorization%20in%20swayam.tejwani%20Menu%20Duplicator&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30542-cross-site-request-forgery-csrf-in--38d42aa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30542%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpsolutions%20SoundCloud%20Ultimate&amp;severity=null&amp;id=69cd72f7e6bfc5ba1deefdd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30541-cross-site-request-forgery-csrf-in--b74eaa7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30541%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OTWthemes%20Info%20Boxes%20Shortcode%20and%20Widget&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30539-improper-neutralization-of-input-du-83c1ac2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Benedikt%20Mo%20BMo%20Expo&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30538-cross-site-request-forgery-csrf-in--e93adb2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ChrisHurst%20Simple%20Optimizer&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30537-improper-neutralization-of-input-du-908a4b24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristian%20Sarov%20Upload%20Quota%20per%20User&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30536-improper-neutralization-of-input-du-ded0ef6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zeitwesentech%20Beautiful%20Link%20Preview&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30535-cross-site-request-forgery-csrf-in--a22519e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30535%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20muro%20External%20image%20replace&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30534-cross-site-request-forgery-csrf-in--bb9164f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30534%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20captcha.soft%20Image%20Captcha&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30533-improper-neutralization-of-input-du-3bfa8bbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30533%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Message%20ticker&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0117a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30532-improper-neutralization-of-input-du-cbc9c27a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MorganF%20Weather%20Layer&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30531-cross-site-request-forgery-csrf-in--2d3f6fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30531%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GBS%20Developer%20WP%20Ride%20Booking&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df01081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30530-improper-neutralization-of-input-du-70f58703</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30530%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atikul%20AI%20Preloader&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df0107e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30529-cross-site-request-forgery-csrf-in--70672bc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30529%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20S%C3%A9bastien%20Dumont%20Auto%20Load%20Next%20Post&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30528-cross-site-request-forgery-csrf-in--99d1ff5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30528%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpshopee%20Awesome%20Logos&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30527-improper-neutralization-of-input-du-dc3f69c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30527%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codetoolbox%20My%20Bootstrap%20Menu&amp;severity=null&amp;id=69cd72f4e6bfc5ba1deefcde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30526-cross-site-request-forgery-csrf-in--76506083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30526%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lucksy%20Typekit%20plugin%20for%20WordPress&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30525-improper-neutralization-of-special--83eb3831</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30525%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ProfitShare.ro%20WP%20Profitshare&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30523-improper-neutralization-of-special--cbc5ae9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30523%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Marcel-NL%20Super%20Simple%20Subscriptions&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30522-cross-site-request-forgery-csrf-in--f43518f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30522%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Damian%20Orzol%20Contact%20Form%207%20Material%20Design&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30521-cross-site-request-forgery-csrf-in--95ac9ee0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30521%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20giangmd93%20GP%20Back%20To%20Top&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-24-2be417</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-24&amp;severity=medium&amp;id=682c7db7e8347ec82d2be417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-24-f122cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f122cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2655-sql-injection-in-sourcecodester-ac-r-8404aa77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2655%3A%20SQL%20Injection%20in%20SourceCodester%20AC%20Repair%20and%20Services%20System&amp;severity=medium&amp;id=6921edc532b9fb10dcd3d962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29795-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-edge-update-setup-aeb3b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29795%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Edge%20Update%20Setup&amp;severity=high&amp;id=682cd0f81484d88663aeb3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29806-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aeb3b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29806%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0927-1f5fe559</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0927&amp;severity=null&amp;id=69725c7b4623b1157c8074af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-23-2bf065</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-23&amp;severity=medium&amp;id=682c7db7e8347ec82d2bf065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-23-f12dee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2186-cwe-89-improper-neutralization-of-sp-ca2684a1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2186%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20amans2k%20FunnelKit%20Automations%20%E2%80%93%20Email%20Marketing%20Automation%20and%20CRM%20for%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1973-cwe-22-improper-limitation-of-a-path-958b5a81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1973%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2331-cwe-200-exposure-of-sensitive-inform-5cedf7c7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2331%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1970-cwe-918-server-side-request-forgery--6720eb2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1970%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1971-cwe-502-deserialization-of-untrusted-5b8deb3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1971%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1972-cwe-73-external-control-of-file-name-0d5b93b3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1972%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=low&amp;id=699f6b19b7ef31ef0b54e251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2577-cwe-79-improper-neutralization-of-in-95a5332d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitspecter%20Bitspecter%20Suite&amp;severity=medium&amp;id=699f6b25b7ef31ef0b54e98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13666-cwe-20-improper-input-validation-in-ebf66827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13666%3A%20CWE-20%20Improper%20Input%20Validation%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13768-cwe-352-cross-site-request-forgery--b93c05b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13768%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashikcse%20CITS%20Support%20svg%2C%20webp%20Media%20and%20TTF%2COTF%20File%20Upload%2C%20Use%20Custom%20Fonts&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2478-cwe-89-improper-neutralization-of-sp-7fcef9f7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20allhart%20Code%20Clone&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13856-cwe-918-server-side-request-forgery-6f3bd158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13856%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20thethemefoundry%20Your%20Friendly%20Drag%20and%20Drop%20Page%20Builder%20%E2%80%94%20Make%20Builder&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1311-cwe-89-improper-neutralization-of-sp-7ee31bc6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1311%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wclovers%20WooCommerce%20Multivendor%20Marketplace%20%E2%80%93%20REST%20API&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54db29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2482-cwe-79-improper-neutralization-of-in-31ef65fd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pienaro%20Gotcha%20%7C%20Gesture-based%20Captcha&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2303-cwe-94-improper-control-of-generatio-9b9ce573</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2303%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20landwire%20Block%20Logic%20%E2%80%93%20Full%20Gutenberg%20Block%20Display%20Control&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2484-cwe-79-improper-neutralization-of-in-c39db133</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skustes%20Multi%20Video%20Box&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0807-cwe-352-cross-site-request-forgery-c-eee55fe8</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0807%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashikcse%20CITS%20Support%20svg%2C%20webp%20Media%20and%20TTF%2COTF%20File%20Upload%2C%20Use%20Custom%20Fonts&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2479-cwe-79-improper-neutralization-of-in-efe68bd4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duogeek%20Easy%20Custom%20Admin%20Bar&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0724-cwe-502-deserialization-of-untrusted-8564c7ca</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0724%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=high&amp;id=699f6b6bb7ef31ef0b55538c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1408-cwe-862-missing-authorization-in-met-5c95562c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1408%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13739-cwe-79-improper-neutralization-of-i-9e3fa0d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contrid%20Newsletters&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0723-cwe-89-improper-neutralization-of-sp-fb361ca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0723%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13737-cwe-862-missing-authorization-in-st-dc836bfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13737%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealership%20%26%20Classified%20Listings%20Plugin&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a055d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-22-2bd94f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-22&amp;severity=medium&amp;id=682c7db7e8347ec82d2bd94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-22-f123c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f123c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2609-cwe-79-improper-neutralization-of-in-92feb597</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MagnusSolution%20MagnusBilling&amp;severity=high&amp;id=692136eec842cd8eff5f2704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2610-cwe-79-improper-neutralization-of-in-e4836a34</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MagnusSolution%20MagnusBilling&amp;severity=high&amp;id=691dd88c52987e43f71b4d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25036-cwe-611-improper-restriction-of-xml-3051729b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25036%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Jalios%20JPlatform&amp;severity=medium&amp;id=691e29f04d0ffcb40bb6a620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25035-cwe-79-improper-neutralization-of-i-d14e0820</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Jalios%20JPlatform&amp;severity=high&amp;id=691e29f04d0ffcb40bb6a619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2598-cwe-497-exposure-of-sensitive-system-98db85f1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2598%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20AWS%20Cloud%20Development%20Kit%20Command%20Line%20Interface&amp;severity=medium&amp;id=68ee9ba2d8f994a66eca6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24915-cwe-276-incorrect-default-permissio-b478c642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24915%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Tenable%20Nessus%20Agent&amp;severity=high&amp;id=69a0a45985912abc71d662b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2583-cross-site-scripting-in-simplemachines-smf-bf84a1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2583%3A%20Cross%20Site%20Scripting%20in%20SimpleMachines%20SMF&amp;severity=medium&amp;id=682d984bc4522896dcbf84a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2582-cross-site-scripting-in-simplemachines-smf-bf849d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2582%3A%20Cross%20Site%20Scripting%20in%20SimpleMachines%20SMF&amp;severity=medium&amp;id=682d984bc4522896dcbf849d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50053-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-manageengine-servicedesk-plus-bdcba3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ManageEngine%20ServiceDesk%20Plus&amp;severity=medium&amp;id=682d981fc4522896dcbdcba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2581-integer-underflow-in-xmedcon-8653e73c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2581%3A%20Integer%20Underflow%20in%20xmedcon&amp;severity=medium&amp;id=69091543c28fd46ded7bb307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29814-cwe-20-improper-input-validation-in-microsoft-microsoft-partner-center-aeb3b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29814%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=critical&amp;id=682cd0f81484d88663aeb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29807-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-dataverse-aeb3b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29807%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f81484d88663aeb3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-21-2c16d4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-21&amp;severity=medium&amp;id=682c7db8e8347ec82d2c16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-21-f12e6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44305-an-app-may-be-able-to-gain-root-pri-79c947f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44305%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69a0a43f85912abc71d6302a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54564-a-file-received-from-airdrop-may-no-6a8b0c1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54564%3A%20A%20file%20received%20from%20AirDrop%20may%20not%20have%20the%20quarantine%20flag%20applied%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44199-an-app-may-be-able-to-cause-unexpec-de6b97f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44199%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb82ce6bfc5ba1df6ea63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54551-processing-web-content-may-lead-to--cc7e7d80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54551%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=high&amp;id=690908537fff0e30cee23913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2538-cwe-798-use-of-hard-coded-credential-961a8935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2538%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=critical&amp;id=686e82c46f40f0eb72045fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13920-cwe-22-improper-limitation-of-a-pat-ec054d4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13920%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13921-cwe-502-deserialization-of-untruste-07fe231a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13921%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1802-cwe-79-improper-neutralization-of-in-4857310e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2539-cwe-327-use-of-a-broken-or-risky-cry-fbf9ee30</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2539%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20thomstark%20File%20Away&amp;severity=high&amp;id=699f6b23b7ef31ef0b54e8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13558-cwe-639-authorization-bypass-throug-ef420e3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13558%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gplsaver%20NP%20Quote%20Request%20for%20WooCommerce&amp;severity=high&amp;id=699f6e60b7ef31ef0b59f2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13922-cwe-73-external-control-of-file-nam-722a539e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13922%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=low&amp;id=699f6d1cb7ef31ef0b56e068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13923-cwe-918-server-side-request-forgery-b4c6e0aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13923%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20webtoffee%20Order%20Export%20%26%20Order%20Import%20for%20WooCommerce&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12215-cwe-94-improper-control-of-generati-ef3007f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12215%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20kedro-org%20kedro-org%2Fkedro&amp;severity=high&amp;id=68ef9b24178f764e1f470ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8613-cwe-639-authorization-bypass-through-036726a1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8613%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b2d178f764e1f470e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6825-cwe-94-improper-control-of-generatio-f3427894</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6825%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20berriai%20berriai%2Flitellm&amp;severity=high&amp;id=68ef9b2a178f764e1f470d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10549-cwe-1333-inefficient-regular-expres-a82ede4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10549%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b22178f764e1f4709f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0508-cwe-328-reversible-one-way-hash-in-a-c804c7d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0508%3A%20CWE-328%20Reversible%20One-Way%20Hash%20in%20aws%20aws%2Fsagemaker-python-sdk&amp;severity=medium&amp;id=68ef9b30178f764e1f470f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10650-cwe-770-allocation-of-resources-wit-3a8d73e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10650%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b22178f764e1f470a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8769-cwe-22-improper-limitation-of-a-path-59a05456</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8769%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aimhubio%20aimhubio%2Faim&amp;severity=critical&amp;id=68ef9b2e178f764e1f470e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12387-cwe-409-improper-handling-of-highly-28cdcb25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12387%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=medium&amp;id=68ef9b24178f764e1f470ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7767-cwe-862-missing-authorization-in-dan-a03b66e6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7767%3A%20CWE-862%20Missing%20Authorization%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=medium&amp;id=68ef9b2c178f764e1f470dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12869-cwe-306-missing-authentication-for--9c91373b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12869%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20infiniflow%20infiniflow%2Fragflow&amp;severity=medium&amp;id=68ef9b25178f764e1f470b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11300-cwe-639-authorization-bypass-throug-b1b8dfd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11300%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b24178f764e1f470ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8524-cwe-22-improper-limitation-of-a-path-933d9e36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8524%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modelscope%20modelscope%2Fagentscope&amp;severity=high&amp;id=68ef9b2d178f764e1f470e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8238-cwe-1336-improper-neutralization-of--5c5caddc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8238%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20aimhubio%20aimhubio%2Faim&amp;severity=medium&amp;id=68ef9b2d178f764e1f470e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10272-cwe-862-missing-authorization-in-lu-96292b0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10272%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b22178f764e1f4709d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1040-cwe-1336-improper-neutralization-of--64537a1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1040%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20significant-gravitas%20significant-gravitas%2Fautogpt&amp;severity=high&amp;id=68ef9b30178f764e1f470f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8966-cwe-770-allocation-of-resources-with-2bde0631</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8966%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b2e178f764e1f470e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0453-cwe-410-insufficient-resource-pool-i-51a061cf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0453%3A%20CWE-410%20Insufficient%20Resource%20Pool%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=medium&amp;id=68ef9b30178f764e1f470f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7039-cwe-863-incorrect-authorization-in-o-6fb71eaf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7039%3A%20CWE-863%20Incorrect%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2a178f764e1f470d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10955-cwe-1333-inefficient-regular-expres-0b57aa04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10955%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b23178f764e1f470a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6866-cwe-178-improper-handling-of-case-se-2482cd4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6866%3A%20CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=690908577fff0e30cee23a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10986-cwe-59-improper-link-resolution-bef-5d209d94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10986%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b23178f764e1f470a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0189-cwe-770-allocation-of-resources-with-ce04a760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0189%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aimhubio%20aimhubio%2Faim&amp;severity=high&amp;id=68ef9b30178f764e1f470f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10051-cwe-770-allocation-of-resources-wit-35f68ed8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10051%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20shaunwei%20shaunwei%2Frealchar&amp;severity=high&amp;id=68ef9b21178f764e1f4709a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6844-cwe-346-origin-validation-error-in-c-68d0fea7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6844%3A%20CWE-346%20Origin%20Validation%20Error%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1451-cwe-770-allocation-of-resources-with-83c3e4bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1451%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b30178f764e1f470f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7768-cwe-770-allocation-of-resources-with-a29e1b7b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7768%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b2c178f764e1f470ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8057-cwe-306-missing-authentication-for-c-3865271b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8057%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=medium&amp;id=68ef9b2c178f764e1f470df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10954-cwe-94-improper-control-of-generati-5e08681d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10954%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b23178f764e1f470a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0628-cwe-266-incorrect-privilege-assignme-6ebe4a2c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0628%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20berriai%20berriai%2Flitellm&amp;severity=high&amp;id=68ef9b30178f764e1f470f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10624-cwe-1333-inefficient-regular-expres-41f599c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10624%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b22178f764e1f470a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9229-cwe-770-allocation-of-resources-with-61df720a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9229%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20stangirard%20stangirard%2Fquivr&amp;severity=high&amp;id=68ef9b2f178f764e1f470edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10252-cwe-94-improper-control-of-generati-09e0cd1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10252%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20langgenius%20langgenius%2Fdify&amp;severity=high&amp;id=68ef9b21178f764e1f4709b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9437-cwe-770-allocation-of-resources-with-1b19eaf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9437%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20transformeroptimus%20transformeroptimus%2Fsuperagi&amp;severity=high&amp;id=68ef9b2f178f764e1f470ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7043-cwe-862-missing-authorization-in-ope-63e54127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7043%3A%20CWE-862%20Missing%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2b178f764e1f470d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10950-cwe-94-improper-control-of-generati-23a62dbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10950%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b23178f764e1f470a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12390-cwe-59-improper-link-resolution-bef-8d0d8f51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12390%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b24178f764e1f470aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7983-cwe-770-allocation-of-resources-with-c8926224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7983%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2c178f764e1f470de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10714-cwe-770-allocation-of-resources-wit-862bcf3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10714%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b22178f764e1f470a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12391-cwe-1333-inefficient-regular-expres-125c7c13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12391%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=medium&amp;id=68ef9b24178f764e1f470af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8018-cwe-770-allocation-of-resources-with-a75ef66c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8018%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20imartinez%20imartinez%2Fprivategpt&amp;severity=high&amp;id=68ef9b2c178f764e1f470de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6863-cwe-749-exposed-dangerous-method-or--6fb15eaf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6863%3A%20CWE-749%20Exposed%20Dangerous%20Method%20or%20Function%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10330-cwe-862-missing-authorization-in-lu-6cd3a467</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10330%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b22178f764e1f4709e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8789-cwe-1333-inefficient-regular-express-c3479777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8789%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2e178f764e1f470e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12886-cwe-409-improper-handling-of-highly-556e2072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12886%3A%20CWE-409%20Improper%20Handling%20of%20Highly%20Compressed%20Data%20(Data%20Amplification)%20in%20ollama%20ollama%2Follama&amp;severity=high&amp;id=68ef9b25178f764e1f470b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6842-cwe-306-missing-authentication-for-c-7b270cf7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6842%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=high&amp;id=68ef9b2a178f764e1f470d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10819-cwe-352-cross-site-request-forgery--3d701485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10819%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=high&amp;id=68ef9b22178f764e1f470a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9617-cwe-639-authorization-bypass-through-1bf9054a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9617%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=medium&amp;id=68ef9b30178f764e1f470f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9311-cwe-352-cross-site-request-forgery-c-f7f48fa3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9311%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20haotian-liu%20haotian-liu%2Fllava&amp;severity=medium&amp;id=68ef9b2f178f764e1f470edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8551-cwe-23-relative-path-traversal-in-mo-df909623</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8551%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20modelscope%20modelscope%2Fagentscope&amp;severity=critical&amp;id=68ef9b2d178f764e1f470e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8055-cwe-89-improper-neutralization-of-sp-d5325048</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8055%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20vanna-ai%20vanna-ai%2Fvanna&amp;severity=high&amp;id=68ef9b2c178f764e1f470dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10363-cwe-862-missing-authorization-in-da-d4555947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10363%3A%20CWE-862%20Missing%20Authorization%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=medium&amp;id=68ef9b22178f764e1f4709ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11171-cwe-770-allocation-of-resources-wit-64c2972f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11171%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=high&amp;id=68ef9b23178f764e1f470a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7045-cwe-862-missing-authorization-in-ope-a76d040f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7045%3A%20CWE-862%20Missing%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0245-cwe-276-incorrect-default-permission-ada75b58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0245%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20hamza417%20hamza417%2Finure&amp;severity=medium&amp;id=68ef9b21178f764e1f47099e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10833-cwe-36-absolute-path-traversal-in-e-1965ef79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10833%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20eosphoros-ai%20eosphoros-ai%2Fdb-gpt&amp;severity=critical&amp;id=68ef9b22178f764e1f470a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8954-cwe-304-missing-critical-step-in-aut-89788429</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8954%3A%20CWE-304%20Missing%20Critical%20Step%20in%20Authentication%20in%20composiohq%20composiohq%2Fcomposio&amp;severity=critical&amp;id=68ef9b2e178f764e1f470e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10019-cwe-78-improper-neutralization-of-s-5ce18c4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10019%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=medium&amp;id=68ef9b21178f764e1f4709a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9070-cwe-502-deserialization-of-untrusted-cf947bce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9070%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20bentoml%20bentoml%2Fbentoml&amp;severity=critical&amp;id=68ef9b2f178f764e1f470ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10907-cwe-835-loop-with-unreachable-exit--b1ac2e5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10907%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20lm-sys%20lm-sys%2Ffastchat&amp;severity=high&amp;id=68ef9b23178f764e1f470a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9056-cwe-770-allocation-of-resources-with-7a52c783</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9056%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20bentoml%20bentoml%2Fbentoml&amp;severity=high&amp;id=68ef9b2f178f764e1f470eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12778-cwe-770-allocation-of-resources-wit-e8f8e10d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12778%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20aimhubio%20aimhubio%2Faim&amp;severity=high&amp;id=68ef9b25178f764e1f470b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8061-cwe-1088-synchronous-access-of-remot-bf2ba835</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8061%3A%20CWE-1088%20Synchronous%20Access%20of%20Remote%20Resource%20without%20Timeout%20in%20aimhubio%20aimhubio%2Faim&amp;severity=high&amp;id=68ef9b2d178f764e1f470e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11172-cwe-248-uncaught-exception-in-danny-52941414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11172%3A%20CWE-248%20Uncaught%20Exception%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=high&amp;id=68ef9b24178f764e1f470ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12388-cwe-1333-inefficient-regular-expres-d3f0abb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12388%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20binary-husky%20binary-husky%2Fgpt_academic&amp;severity=medium&amp;id=68ef9b24178f764e1f470aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0182-cwe-770-allocation-of-resources-with-346baa33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0182%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=high&amp;id=68ef9b30178f764e1f470f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7476-cwe-639-authorization-bypass-through-2e25401f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7476%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10707-cwe-22-improper-limitation-of-a-pat-682a3314</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10707%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b22178f764e1f470a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9919-cwe-306-missing-authentication-for-c-1c5ee92a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9919%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b30178f764e1f470f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6827-cwe-444-inconsistent-interpretation--0ef6c7ae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6827%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20in%20benoitc%20benoitc%2Fgunicorn&amp;severity=high&amp;id=68ef9b2a178f764e1f470d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10190-cwe-502-deserialization-of-untruste-205224d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10190%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20horovod%20horovod%2Fhorovod&amp;severity=critical&amp;id=68ef9b21178f764e1f4709af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8028-cwe-770-allocation-of-resources-with-470a537e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8028%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=high&amp;id=68ef9b2c178f764e1f470deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10935-cwe-770-allocation-of-resources-wit-5a9d0a9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10935%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20automatic1111%20automatic1111%2Fstable-diffusion-webui&amp;severity=high&amp;id=68ef9b23178f764e1f470a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10829-cwe-835-loop-with-unreachable-exit--094c5294</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10829%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20eosphoros-ai%20eosphoros-ai%2Fdb-gpt&amp;severity=high&amp;id=68ef9b22178f764e1f470a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12065-cwe-22-improper-limitation-of-a-pat-69eb64b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12065%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20haotian-liu%20haotian-liu%2Fllava&amp;severity=high&amp;id=68ef9b24178f764e1f470ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8060-cwe-22-improper-limitation-of-a-path-b485c45f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8060%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=high&amp;id=68ef9b2c178f764e1f470df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9431-cwe-620-unverified-password-change-i-a27f60f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9431%3A%20CWE-620%20Unverified%20Password%20Change%20in%20transformeroptimus%20transformeroptimus%2Fsuperagi&amp;severity=medium&amp;id=68ef9b2f178f764e1f470ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7040-cwe-639-authorization-bypass-through-e13a9417</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7040%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12911-cwe-89-improper-neutralization-of-s-2835efaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12911%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ef9b25178f764e1f470b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6839-cwe-41-improper-resolution-of-path-e-a61fcf21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6839%3A%20CWE-41%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=690908577fff0e30cee23a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9096-cwe-862-missing-authorization-in-lun-07b6bee3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9096%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2f178f764e1f470ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9098-cwe-863-incorrect-authorization-in-l-0b3251c6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9098%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2f178f764e1f470ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7046-cwe-862-missing-authorization-in-ope-58a78243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7046%3A%20CWE-862%20Missing%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12880-cwe-639-authorization-bypass-throug-6c4f3471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12880%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20infiniflow%20infiniflow%2Fragflow&amp;severity=high&amp;id=68ef9b25178f764e1f470b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8764-cwe-1333-inefficient-regular-express-7b72557b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8764%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2e178f764e1f470e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9053-cwe-502-deserialization-of-untrusted-9161f013</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9053%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20vllm-project%20vllm-project%2Fvllm&amp;severity=critical&amp;id=68ef9b2e178f764e1f470ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12216-cwe-59-improper-link-resolution-bef-aca29ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12216%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20dmlc%20dmlc%2Fgluon-cv&amp;severity=high&amp;id=68ef9b24178f764e1f470ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10572-cwe-94-improper-control-of-generati-342ada0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10572%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b22178f764e1f4709f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8955-cwe-918-server-side-request-forgery--b82e50da</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8955%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20composiohq%20composiohq%2Fcomposio&amp;severity=medium&amp;id=68ef9b2e178f764e1f470e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8020-cwe-248-uncaught-exception-in-lightn-2790df5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8020%3A%20CWE-248%20Uncaught%20Exception%20in%20lightning-ai%20lightning-ai%2Fpytorch-lightning&amp;severity=high&amp;id=68ef9b2c178f764e1f470de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9000-cwe-862-missing-authorization-in-lun-104ad3e8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9000%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2e178f764e1f470e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8581-cwe-22-improper-limitation-of-a-path-b106e34d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8581%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=critical&amp;id=68ef9b2d178f764e1f470e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9418-cwe-256-unprotected-storage-of-crede-fea982a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9418%3A%20CWE-256%20Unprotected%20Storage%20of%20Credentials%20in%20transformeroptimus%20transformeroptimus%2Fsuperagi&amp;severity=medium&amp;id=68ef9b2f178f764e1f470ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8984-cwe-770-allocation-of-resources-with-aa5c4065</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8984%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20berriai%20berriai%2Flitellm&amp;severity=high&amp;id=68ef9b2e178f764e1f470e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10902-cwe-22-improper-limitation-of-a-pat-fe6161c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10902%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eosphoros-ai%20eosphoros-ai%2Fdb-gpt&amp;severity=critical&amp;id=68ef9b23178f764e1f470a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10821-cwe-835-loop-with-unreachable-exit--8f9e1250</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10821%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20invoke-ai%20invoke-ai%2Finvokeai&amp;severity=high&amp;id=68ef9b22178f764e1f470a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10275-cwe-863-incorrect-authorization-in--bb9f6638</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10275%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b22178f764e1f4709e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8156-cwe-77-improper-neutralization-of-sp-20026134</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8156%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20significant-gravitas%20significant-gravitas%2Fautogpt&amp;severity=high&amp;id=68ef9b2d178f764e1f470e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12910-cwe-674-uncontrolled-recursion-in-r-920ab6f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12910%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=medium&amp;id=68ef9b25178f764e1f470b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10361-cwe-22-improper-limitation-of-a-pat-91ad47c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10361%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20danny-avila%20danny-avila%2Flibrechat&amp;severity=high&amp;id=68ef9b22178f764e1f4709ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0188-cwe-918-server-side-request-forgery--159b1558</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0188%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b30178f764e1f470f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2292-cwe-862-missing-authorization-in-cha-2f0f1d83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2292%3A%20CWE-862%20Missing%20Authorization%20in%20changeweb%20changeweb%2Funifiedtransform&amp;severity=high&amp;id=68ef9b26178f764e1f470b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12704-cwe-835-loop-with-unreachable-exit--7237e645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12704%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20run-llama%20run-llama%2Fllama_index&amp;severity=high&amp;id=68ef9b24178f764e1f470af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10274-cwe-862-missing-authorization-in-lu-fffb3359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10274%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b22178f764e1f4709de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10481-cwe-352-cross-site-request-forgery--95661be4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10481%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20comfyanonymous%20comfyanonymous%2Fcomfyui&amp;severity=medium&amp;id=68ef9b22178f764e1f4709f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11137-cwe-639-authorization-bypass-throug-68011124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11137%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b23178f764e1f470a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8763-cwe-1333-inefficient-regular-express-c64c351b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8763%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b2d178f764e1f470e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10225-cwe-770-allocation-of-resources-wit-460c9825</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10225%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20haotian-liu%20haotian-liu%2Fllava&amp;severity=high&amp;id=68ef9b21178f764e1f4709b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7779-cwe-1333-inefficient-regular-express-d74b0d43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7779%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20danswer-ai%20danswer-ai%2Fdanswer&amp;severity=high&amp;id=68ef9b2c178f764e1f470ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11042-cwe-73-external-control-of-file-nam-1e51e0c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11042%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20invoke-ai%20invoke-ai%2Finvokeai&amp;severity=critical&amp;id=68ef9b23178f764e1f470a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8999-cwe-862-missing-authorization-in-lun-bcc785d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8999%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b2e178f764e1f470e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8251-cwe-89-improper-neutralization-of-sp-2fb1891f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8251%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=68ef9b2d178f764e1f470e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10273-cwe-863-incorrect-authorization-in--f712b0df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10273%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b22178f764e1f4709da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9095-cwe-862-missing-authorization-in-lun-4ec16bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9095%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b2f178f764e1f470ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10713-cwe-770-allocation-of-resources-wit-f80e4134</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10713%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20szad670401%20szad670401%2Fhyperlpr&amp;severity=high&amp;id=68ef9b22178f764e1f470a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1796-cwe-338-use-of-cryptographically-wea-335e4ec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1796%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20langgenius%20langgenius%2Fdify&amp;severity=high&amp;id=68ef9b30178f764e1f470f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13060-cwe-862-missing-authorization-in-mi-0119e80e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13060%3A%20CWE-862%20Missing%20Authorization%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=68ef9b25178f764e1f470b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47552-cwe-502-deserialization-of-untruste-c97f900f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47552%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Seata%20(incubating)&amp;severity=critical&amp;id=69c2bc3ff4197a8e3b4e78c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2505-cwe-22-improper-limitation-of-a-path-215ac041</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2505%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20philsbury%20Age%20Gate&amp;severity=critical&amp;id=699f6b23b7ef31ef0b54e822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2108-cwe-79-improper-neutralization-of-in-f0c84f6c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2108%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20140%2B%20Widgets%20%7C%20Xpro%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22228-vulnerability-in-spring-spring-security-befae9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22228%3A%20Vulnerability%20in%20Spring%20Spring%20Security&amp;severity=high&amp;id=682d983ec4522896dcbefae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1766-cwe-862-missing-authorization-in-the-faa15c18</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1766%3A%20CWE-862%20Missing%20Authorization%20in%20themewinter%20Eventin%20%E2%80%93%20Event%20Manager%2C%20Events%20Calendar%2C%20Event%20Tickets%20and%20Registrations&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1770-cwe-22-improper-limitation-of-a-path-c26689e3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1770%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themewinter%20Eventin%20%E2%80%93%20Event%20Manager%2C%20Events%20Calendar%2C%20Event%20Tickets%20and%20Registrations&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1314-cwe-352-cross-site-request-forgery-c-f98b2e02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1314%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20Custom%20Twitter%20Feeds%20%E2%80%93%20A%20Tweets%20Widget%20or%20X%20Feed%20Widget&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57440-na-7e8f7901</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57440%3A%20n%2Fa&amp;severity=high&amp;id=696fe03c4623b1157c4c7685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-20-2bff06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-20&amp;severity=medium&amp;id=682c7db8e8347ec82d2bff06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-20-f12af8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7631-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-bda3cc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7631%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d981cc4522896dcbda3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51459-cwe-280-improper-handling-of-insuff-d8c2f62c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51459%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=69a0a44485912abc71d6313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25132-uncontrolled-resource-consumption-263fdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25132%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=682f59b40acd01a249263fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26486-cwe-327-use-of-a-broken-or-risky-cr-7030be73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26486%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Beta80%20Life%201st&amp;severity=medium&amp;id=686544a26f40f0eb7292f612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26485-cwe-200-exposure-of-sensitive-infor-13fef3d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26485%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Beta80%20Life%201st&amp;severity=medium&amp;id=6865411f6f40f0eb7292ee11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2512-cwe-434-unrestricted-upload-of-file--efc58aaf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2512%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20thomstark%20File%20Away&amp;severity=critical&amp;id=699f6b23b7ef31ef0b54e82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2511-cwe-89-improper-neutralization-of-sp-8e64a6f9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2511%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mitchelllevy%20AHAthat%20Plugin&amp;severity=medium&amp;id=699f6b23b7ef31ef0b54e82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12920-cwe-862-missing-authorization-in-ch-4e0184ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12920%3A%20CWE-862%20Missing%20Authorization%20in%20Chimpstudio%20FoodBakery%20%7C%20Delivery%20Restaurant%20Directory%20WordPress%20Theme&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13442-cwe-288-authentication-bypass-using-6bfc3022</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13442%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20aonetheme%20Service%20Finder%20Bookings&amp;severity=critical&amp;id=699f6e57b7ef31ef0b59e90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13933-cwe-352-cross-site-request-forgery--6c9c5631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13933%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chimpstudio%20FoodBakery%20%7C%20Delivery%20Restaurant%20Directory%20WordPress%20Theme&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13790-cwe-98-improper-control-of-filename-c0dd7c5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13790%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeMove%20MinimogWP%20%E2%80%93%20The%20High%20Converting%20eCommerce%20WordPress%20Theme&amp;severity=critical&amp;id=699f6d14b7ef31ef0b56db84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13412-cwe-862-missing-authorization-in-lo-524b209b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13412%3A%20CWE-862%20Missing%20Authorization%20in%20LoftOcean%20CozyStay%20-%20Hotel%20Booking%20WordPress%20Theme&amp;severity=high&amp;id=699f6e55b7ef31ef0b59e69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13410-cwe-502-deserialization-of-untruste-2839d461</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13410%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20LoftOcean%20CozyStay%20-%20Hotel%20Booking%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e55b7ef31ef0b59e68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12922-cwe-862-missing-authorization-in-th-cc2c1882</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12922%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeGoods%20Altair&amp;severity=critical&amp;id=699f6e4cb7ef31ef0b59c7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12295-cwe-640-weak-password-recovery-mech-c3c04c74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12295%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20PX-lab%20BoomBox%20Theme%20Extensions&amp;severity=high&amp;id=699f6e35b7ef31ef0b597ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2290-cwe-862-missing-authorization-in-chr-690c925d</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2290%3A%20CWE-862%20Missing%20Authorization%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-19-2bf9fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-19&amp;severity=medium&amp;id=682c7db8e8347ec82d2bf9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-19-f12338</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f12338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12563-cwe-98-improper-control-of-filename-4fd1252b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12563%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WP%20Sharks%20s2Member%20Pro&amp;severity=high&amp;id=699f6e43b7ef31ef0b59bef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22514-rce-remote-code-execution-in-atlassian-sourcetree-for-mac-bd6bf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22514%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Sourcetree%20for%20Mac&amp;severity=high&amp;id=682d9816c4522896dcbd6bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2487-null-pointer-dereference-in-red-hat-red-hat-directory-server-12-4-eus-for-rhel-9-bd6582</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2487%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d9816c4522896dcbd6582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56347-cwe-114-process-control-in-ibm-aix-b7a330f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56347%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69a0a44985912abc71d64abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56346-cwe-114-process-control-in-ibm-aix-61e4ce7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56346%3A%20CWE-114%20Process%20Control%20in%20IBM%20AIX&amp;severity=critical&amp;id=69a0a44985912abc71d64ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27688-cwe-732-incorrect-permission-assign-c782207d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27688%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Dell%20Wyse%20Proprietary%20OS%20(Modern%20ThinOS)&amp;severity=high&amp;id=69a0a45d85912abc71d66aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0755-cwe-122-heap-based-buffer-overflow-in-mongodb-inc-libbson-bf15da</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0755%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MongoDB%20Inc%20libbson&amp;severity=high&amp;id=682d9840c4522896dcbf15da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2262-cwe-862-missing-authorization-in-sam-44555beb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2262%3A%20CWE-862%20Missing%20Authorization%20in%20samdani%20Logo%20Slider%20%E2%80%93%20Logo%20Showcase%2C%20Logo%20Carousel%2C%20Logo%20Gallery%20and%20Client%20Logo%20Presentation&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-18-2c2209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-18&amp;severity=medium&amp;id=682c7db8e8347ec82d2c2209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-18-f12d51</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22512-dos-denial-of-service-in-atlassian-confluence-data-center-bd6beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22512%3A%20DoS%20(Denial%20of%20Service)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=682d9816c4522896dcbd6beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40635-cwe-190-integer-overflow-or-wraparound-in-containerd-containerd-bdcc9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40635%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20containerd%20containerd&amp;severity=medium&amp;id=682d9820c4522896dcbdcc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44276-a-user-in-a-privileged-network-posi-7809eea5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44276%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20leak%20sensitive%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82ee6bfc5ba1df6ed26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24185-parsing-a-maliciously-crafted-file--de57f663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24185%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54559-an-app-may-be-able-to-access-sensit-2c7e2e33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54559%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54525-restoring-a-maliciously-crafted-bac-b3470755</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54525%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54565-an-app-may-be-able-to-access-sensit-9c35095f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54565%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22472-cwe-77-improper-neutralization-of-s-08dcf352</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22472%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a45385912abc71d656ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22473-cwe-77-improper-neutralization-of-s-c9ff2632</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22473%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a45385912abc71d656b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49561-cwe-266-incorrect-privilege-assignm-924fe6e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49561%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49559-cwe-1393-use-of-default-password-in-1916b9f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49559%3A%20CWE-1393%3A%20Use%20of%20Default%20Password%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48017-cwe-77-improper-neutralization-of-s-efe2d4fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48017%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69a0a44285912abc71d630d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48015-cwe-77-improper-neutralization-of-s-2a9e4c19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48015%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=medium&amp;id=69a0a44285912abc71d630cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48830-cwe-77-improper-neutralization-of-s-09456b50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48830%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48013-cwe-250-execution-with-unnecessary--b9c6f516</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48013%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20Dell%20SmartFabric%20OS10%20Software&amp;severity=high&amp;id=69a0a44285912abc71d630c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2241-insecure-storage-of-sensitive-information-24efad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2241%3A%20Insecure%20Storage%20of%20Sensitive%20Information&amp;severity=high&amp;id=682e4ad00acd01a24924efad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29786-cwe-770-allocation-of-resources-wit-71ff70c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29786%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20expr-lang%20expr&amp;severity=high&amp;id=6973a6f24623b1157c4f2e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54027-improper-access-control-in-fortinet-1bcdeb87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54027%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a2148330e0671671d0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2357-memory-corruption-in-dcmtk-3d3dff52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2357%3A%20Memory%20Corruption%20in%20DCMTK&amp;severity=medium&amp;id=69091543c28fd46ded7bb2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26042-na-ed9e331a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26042%3A%20n%2Fa&amp;severity=medium&amp;id=697790e84623b1157ca22c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-17-2c0959</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-17&amp;severity=medium&amp;id=682c7db8e8347ec82d2c0959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-17-f12720</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2338-heap-based-buffer-overflow-in-tbeu-m-88f48fd2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2338%3A%20Heap-based%20Buffer%20Overflow%20in%20tbeu%20matio&amp;severity=medium&amp;id=688204c6ad5a09ad00345627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2337-heap-based-buffer-overflow-in-tbeu-m-55d9f5d0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2337%3A%20Heap-based%20Buffer%20Overflow%20in%20tbeu%20matio&amp;severity=medium&amp;id=688204c6ad5a09ad0034561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-16-2c3350</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-16&amp;severity=medium&amp;id=682c7db8e8347ec82d2c3350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-16-f123f8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f123f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27281-improper-neutralization-of-special--bf989d33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cookforweb%20All%20In%20Menu&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deece02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26978-improper-neutralization-of-special--3db40094</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26978%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26961-missing-authorization-in-freshface--ef0349da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26961%3A%20Missing%20Authorization%20in%20FRESHFACE%20Fresh%20Framework&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26924-improper-control-of-generation-of-c-24186739</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26924%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20colabrio%20Ohio%20Extra&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26921-deserialization-of-untrusted-data-i-61dac7b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26921%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26899-cross-site-request-forgery-csrf-in--5908f7da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26899%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Recapture%20Cart%20Recovery%20and%20Email%20Marketing%20Recapture%20for%20WooCommerce&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26895-improper-neutralization-of-input-du-3a861e87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maennchen1.de%20m1.DownloadList&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26886-improper-neutralization-of-special--f5bc619c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26886%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PublishPress%20PublishPress%20Authors&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26875-improper-neutralization-of-special--315ef8fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26875%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silverplugins217%20Multiple%20Shipping%20And%20Billing%20Address%20For%20Woocommerce&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26556-improper-neutralization-of-input-du-6d84f8b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zzmaster%20WP%20AntiDDOS&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26555-improper-neutralization-of-input-du-2c036c34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thorsten%20Ott%20Debug-Bar-Extender&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26554-improper-neutralization-of-input-du-36a3d8fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nicola%20Mustone%20WP%20Discord%20Post&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26553-improper-neutralization-of-input-du-bf8e7d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spring%20Devs%20Pre%20Order%20Addon%20for%20WooCommerce%20%E2%80%93%20Advance%20Order%2FBackorder%20Plugin&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26548-improper-neutralization-of-input-du-eea5ca2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kdmurray%20Random%20Image%20Selector&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23744-improper-neutralization-of-input-du-1945a373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dvs11%20Random%20Posts%2C%20Mp3%20Player%20%2B%20ShareButton&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1530-cwe-352-cross-site-request-forgery-c-cfdedc9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1530%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2025-cwe-862-missing-authorization-in-giv-76c835c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2025%3A%20CWE-862%20Missing%20Authorization%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1057-incorrect-type-conversion-or-cast-919e86c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1057%3A%20Incorrect%20Type%20Conversion%20or%20Cast&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2325-cwe-79-improper-neutralization-of-in-6a60ee78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2325%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boopathi0001%20WP%20Test%20Email&amp;severity=high&amp;id=699f6b21b7ef31ef0b54e730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2157-insecure-storage-of-sensitive-information-in-red-hat-satellite-server-24ee8f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2157%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Red%20Hat%20Satellite%20Server&amp;severity=low&amp;id=682e44190acd01a24924ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13497-cwe-80-improper-neutralization-of-s-a1b5e7ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13497%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1771-cwe-98-improper-control-of-filename--a9bc9890</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1771%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=critical&amp;id=699f6b19b7ef31ef0b54e175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1773-cwe-79-improper-neutralization-of-in-336737be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1773%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1668-cwe-862-missing-authorization-in-jds-5c8ee50e</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1668%3A%20CWE-862%20Missing%20Authorization%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1670-cwe-89-improper-neutralization-of-sp-3ab28bb2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1670%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1667-cwe-639-authorization-bypass-through-2ccf1737</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1667%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e01a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12336-cwe-862-missing-authorization-in-co-3a588f07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12336%3A%20CWE-862%20Missing%20Authorization%20in%20codexpert%20WC%20Affiliate%20%E2%80%93%20A%20Complete%20WooCommerce%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1669-cwe-89-improper-neutralization-of-sp-1a09ac98</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1669%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2267-cwe-862-missing-authorization-in-wp0-a41f827b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2267%3A%20CWE-862%20Missing%20Authorization%20in%20wp01ru%20WP01%20%E2%80%93%20Speed%2C%20Security%2C%20SEO%20consultant&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2163-cwe-79-improper-neutralization-of-in-95c9c034</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zoorum%20Zoorum%20Comments&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13847-bd76cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13847&amp;severity=low&amp;id=682d9817c4522896dcbd76cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1653-cwe-266-incorrect-privilege-assignme-020550b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1653%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20stylemix%20Directory%20Listings%20WordPress%20plugin%20%E2%80%93%20uListing&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1657-cwe-862-missing-authorization-in-sty-7a503db3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1657%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Directory%20Listings%20WordPress%20plugin%20%E2%80%93%20uListing&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30066-cwe-506-embedded-malicious-code-in--f10c6f03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30066%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20tj-actions%20changed-files&amp;severity=high&amp;id=68881728ad5a09ad0088bc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-15-2c2c0e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-15&amp;severity=medium&amp;id=682c7db8e8347ec82d2c2c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-15-f1298a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f1298a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2310-heap-based-buffer-overflow-in-hdf5-bd87c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2310%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=682d9819c4522896dcbd87c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2309-heap-based-buffer-overflow-in-hdf5-bd87ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2309%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=682d9819c4522896dcbd87ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2308-heap-based-buffer-overflow-in-hdf5-bd87b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2308%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=medium&amp;id=682d9819c4522896dcbd87b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46662-escalation-of-privilege-in-fortinet-228d926e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46662%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=69a0a43f85912abc71d6303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45643-cwe-327-use-of-a-broken-or-risky-cr-9b615e4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45643%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20QRadar%20EDR&amp;severity=medium&amp;id=69a0a43f85912abc71d63039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52927-vulnerability-in-linux-linux-be6bbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2000-cwe-502-deserialization-of-untrusted-3fb58616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2000%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Qiskit%20SDK&amp;severity=critical&amp;id=6883ae32ad5a09ad00530b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13773-cwe-321-use-of-hard-coded-cryptogra-6e57283b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13773%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20uxper%20Civi%20-%20Job%20Board%20%26%20Freelance%20Marketplace%20WordPress%20Theme&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a0727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13772-cwe-288-authentication-bypass-using-74565836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13772%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Civi%20-%20Job%20Board%20%26%20Freelance%20Marketplace%20WordPress%20Theme&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2232-cwe-269-improper-privilege-managemen-db353f61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2232%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20PureThemes%20Realteo&amp;severity=critical&amp;id=699f6b1fb7ef31ef0b54e5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13771-cwe-288-authentication-bypass-using-b7b6ad2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13771%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20uxper%20Civi%20-%20Job%20Board%20%26%20Freelance%20Marketplace%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e6db7ef31ef0b5a071f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12810-cwe-862-missing-authorization-in-jo-e3efdf46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12810%3A%20CWE-862%20Missing%20Authorization%20in%20JobCareer%20%7C%20Job%20Board%20Responsive%20WordPress%20Theme&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26006-execute-unauthorized-code-or-comman-543505c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26006%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiProxy&amp;severity=medium&amp;id=69a0a43c85912abc71d620db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1507-cwe-862-missing-authorization-in-sha-845c0b8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1507%3A%20CWE-862%20Missing%20Authorization%20in%20sharethis%20ShareThis%20Dashboard%20for%20Google%20Analytics&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8176-uncontrolled-recursion-aecbac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8176%3A%20Uncontrolled%20Recursion&amp;severity=high&amp;id=682cd0fc1484d88663aecbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13407-cwe-639-authorization-bypass-throug-20139901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13407%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20omnipressteam%20Omnipress&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13321-cwe-89-improper-neutralization-of-s-c9db8a4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13321%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Solid%20Plugins%20AnalyticsWP&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1526-cwe-79-improper-neutralization-of-in-1b14ce26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1526%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20for%20Elementor&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54ded3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13824-cwe-502-deserialization-of-untruste-2e9e8238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13824%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Potenzaglobalsolutions%20CiyaShop%20-%20Multipurpose%20WooCommerce%20Theme&amp;severity=critical&amp;id=699f6d17b7ef31ef0b56dd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2221-cwe-89-improper-neutralization-of-sp-d065d22a</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2221%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20whyun%20WPCOM%20Member&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13913-cwe-352-cross-site-request-forgery--3aae37d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13913%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=high&amp;id=699f6d1cb7ef31ef0b56e055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2103-cwe-862-missing-authorization-in-iro-56ddf246</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2103%3A%20CWE-862%20Missing%20Authorization%20in%20IronTemplates%20SoundRise%20Music&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13376-cwe-269-improper-privilege-manageme-008b606a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13376%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Anps%20Industrial&amp;severity=high&amp;id=699f6e52b7ef31ef0b59e3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0952-cwe-862-missing-authorization-in-cms-bc980a33</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0952%3A%20CWE-862%20Missing%20Authorization%20in%20cmsmasters%20Eco%20Nature%20-%20Environment%20%26%20Ecology%20WordPress%20Theme&amp;severity=high&amp;id=699f6b6db7ef31ef0b55557e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2289-cwe-862-missing-authorization-in-zoz-18e2822b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2289%3A%20CWE-862%20Missing%20Authorization%20in%20zozothemes%20Zegen%20-%20Church%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b21b7ef31ef0b54e69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1764-cwe-352-cross-site-request-forgery-c-f34768d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1764%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hiddenpearls%20LoginPress%20%7C%20wp-login%20Custom%20Login%20Page%20Customizer&amp;severity=high&amp;id=699f6b19b7ef31ef0b54e150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2056-cwe-23-relative-path-traversal-in-jo-bb3818c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2056%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20johndarrel%20WP%20Ghost%20(Hide%20My%20WP%20Ghost)%20%E2%80%93%20Security%20%26%20Firewall&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0955-cwe-862-missing-authorization-in-bee-cce10301</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0955%3A%20CWE-862%20Missing%20Authorization%20in%20beeteam368%20VidoRev%20Extensions&amp;severity=medium&amp;id=699f6b6db7ef31ef0b55558e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11283-cwe-289-authentication-bypass-by-al-2f0807ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11283%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20WP%20JobHunt&amp;severity=high&amp;id=699f6e0bb7ef31ef0b59430f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11286-cwe-288-authentication-bypass-using-37d75175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11286%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WP%20JobHunt&amp;severity=critical&amp;id=699f6e0cb7ef31ef0b5943e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2166-cwe-79-improper-neutralization-of-in-0b35bc4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2166%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20FAQ%20%20%E2%80%93%20Simplify%20support%20with%20an%20intuitive%20FAQ%20management%20tool&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11284-cwe-639-authorization-bypass-throug-c2c30735</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11284%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=critical&amp;id=699f6e0bb7ef31ef0b594313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1528-cwe-862-missing-authorization-in-sea-8251c7ea</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1528%3A%20CWE-862%20Missing%20Authorization%20in%20Search%20%26%20Filter%20Search%20%26%20Filter%20Pro&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54dedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1285-cwe-862-missing-authorization-in-sma-701cccfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1285%3A%20CWE-862%20Missing%20Authorization%20in%20SmartDataSoft%20Resido%20-%20Real%20Estate%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54daed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11285-cwe-639-authorization-bypass-throug-361fb5dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11285%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WP%20JobHunt&amp;severity=critical&amp;id=699f6e0cb7ef31ef0b5943d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55549-cwe-416-use-after-free-in-xmlsoft-l-a1ff218f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55549%3A%20CWE-416%20Use%20After%20Free%20in%20xmlsoft%20libxslt&amp;severity=high&amp;id=690916cac28fd46ded7ccfdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24855-cwe-416-use-after-free-in-xmlsoft-l-4102076a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24855%3A%20CWE-416%20Use%20After%20Free%20in%20xmlsoft%20libxslt&amp;severity=high&amp;id=688d9167ad5a09ad00d109f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-14-86485bf0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-14&amp;severity=medium&amp;id=68367c98182aa0cae231e707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-14-750c12</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-14&amp;severity=medium&amp;id=682c7abce3e6de8ceb750c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-14-f12d30</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24053-cwe-285-improper-authorization-in-microsoft-microsoft-dataverse-aeb319</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24053%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Dataverse&amp;severity=high&amp;id=682cd0f81484d88663aeb319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29768-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-vim-vim-beb7cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29768%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20vim%20vim&amp;severity=medium&amp;id=682d9837c4522896dcbeb7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1652-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf0804</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1652%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf0804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1651-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-bf07f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1651%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1650-cwe-457-use-of-uninitialized-variable-in-autodesk-autocad-bf07ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1650%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1649-cwe-457-use-of-uninitialized-variable-in-autodesk-autocad-bf07eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1649%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1433-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf0829</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1433%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf0829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1432-cwe-416-use-after-free-in-autodesk-autocad-bf07e7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1432%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1431-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf07e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1431%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1430-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-autocad-bf07d2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1430%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1429-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-bf07ca</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1429%3A%20CWE-122%20Heap-Based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1428-cwe-125-out-of-bounds-read-in-autodesk-autocad-bf07a4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1428%3A%20CWE-125%20Out-of-Bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1427-cwe-457-use-of-uninitialized-variable-in-autodesk-autocad-bf07a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1427%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682d983fc4522896dcbf07a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10942-cwe-502-deserialization-of-untruste-f3de830a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10942%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20yaniiliev%20All-in-One%20WP%20Migration%20and%20Backup&amp;severity=high&amp;id=699f6e03b7ef31ef0b593925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21104-cwe-601-url-redirection-to-untruste-23845375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21104%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Dell%20NetWorker&amp;severity=medium&amp;id=69901848c9e1ff5ad867f2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1785-cwe-22-improper-limitation-of-a-path-861abb90</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1785%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1119-cwe-94-improper-control-of-generatio-982643dd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1119%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=699f6b0eb7ef31ef0b54da4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1503-cwe-79-improper-neutralization-of-in-0cd51336</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1503%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1561-cwe-79-improper-neutralization-of-in-8f717590</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=high&amp;id=699f6b15b7ef31ef0b54def2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2104-cwe-862-missing-authorization-in-sof-68d35137</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2104%3A%20CWE-862%20Missing%20Authorization%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2250-cwe-89-improper-neutralization-of-sp-68dda5d6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2250%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sminozzi%20WordPress%20Report%20Brute%20Force%20Attacks%20and%20Login%20Protection%20ReportAttacks%20Plugins&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13887-cwe-639-authorization-bypass-throug-f1671023</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13887%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2107-cwe-89-improper-neutralization-of-sp-63e5222f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2107%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arielbrailovsky%20ArielBrailovsky-ViralAd&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13703-cwe-862-missing-authorization-in-vc-5c2284fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13703%3A%20CWE-862%20Missing%20Authorization%20in%20vcita%20CRM%20and%20Lead%20Management%20by%20vcita&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1559-cwe-79-improper-neutralization-of-in-0100d1df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clearcodehq%20CC-IMG-Shortcode&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54dee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2106-cwe-89-improper-neutralization-of-sp-0d4e617c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2106%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arielbrailovsky%20ArielBrailovsky-ViralAd&amp;severity=high&amp;id=699f6b1db7ef31ef0b54e4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-13-2c3771</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-13&amp;severity=medium&amp;id=682c7db8e8347ec82d2c3771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-13-f13144</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f13144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25292-cwe-347-improper-verification-of-cr-73c270e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25292%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=68c4a9e26da8ad0abf36f295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25291-cwe-347-improper-verification-of-cr-f6125a3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25291%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20SAML-Toolkits%20ruby-saml&amp;severity=critical&amp;id=68c4a9e26da8ad0abf36f287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25293-cwe-400-uncontrolled-resource-consu-b6be3dc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25293%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20SAML-Toolkits%20ruby-saml&amp;severity=high&amp;id=68c4a9e26da8ad0abf36f2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0117-cwe-807-reliance-on-untrusted-inputs-5606ec22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0117%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=high&amp;id=69a0a44985912abc71d64ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22870-cwe-115-misinterpretation-of-input-in-golang-org-x-net-golang-org-x-net-http-httpproxy-bd73a2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22870%3A%20CWE-115%20Misinterpretation%20of%20Input%20in%20golang.org%2Fx%2Fnet%20golang.org%2Fx%2Fnet%2Fhttp%2Fhttpproxy&amp;severity=medium&amp;id=682d9817c4522896dcbd73a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27407-cwe-94-improper-control-of-generati-a808e7ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27407%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rmosolgo%20graphql-ruby&amp;severity=critical&amp;id=6909153cc28fd46ded7bacba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20177-improper-handling-of-insufficient-p-be40fc74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20177%3A%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69a0a44d85912abc71d65247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20143-improper-verification-of-cryptograp-1275a033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20143%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=69a0a44b85912abc71d64b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20138-improper-neutralization-of-special--737c6918</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=high&amp;id=69a0a44b85912abc71d64b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1984-cwe-428-unquoted-search-path-or-element-in-xerox-xerox-desktop-print-experience-bd6cb6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1984%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Xerox%20Xerox%C2%AE%20Desktop%20Print%20Experience&amp;severity=medium&amp;id=682d9816c4522896dcbd6cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1683-cwe-59-improper-link-resolution-before-file-access-link-following-in-1e-1e-client-aec639</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1683%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%201E%201E%20Client&amp;severity=high&amp;id=682cd0fb1484d88663aec639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2002-cwe-532-insertion-of-sensitive-information-into-log-file-in-schneider-electric-ecostruxure-panel-server-bd6cce</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2002%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Schneider%20Electric%20EcoStruxure%20Panel%20Server&amp;severity=medium&amp;id=682d9816c4522896dcbd6cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0883-cwe-81-improper-neutralization-of-script-in-an-error-message-web-page-in-opentext-service-manager-bd6c79</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0883%3A%20CWE-81%20Improper%20Neutralization%20of%20Script%20in%20an%20Error%20Message%20Web%20Page%20in%20OpenText%E2%84%A2%20Service%20Manager&amp;severity=low&amp;id=682d9816c4522896dcbd6c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0884-cwe-428-unquoted-search-path-or-element-in-opentext-service-manager-bd6c9a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0884%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20OpenText%E2%84%A2%20Service%20Manager&amp;severity=high&amp;id=682d9816c4522896dcbd6c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2240-improperly-controlled-sequential-memory-allocation-in-red-hat-red-hat-build-of-apache-camel-4-8-for-quarkus-3-15-bd6c33</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2240%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation&amp;severity=high&amp;id=682d9816c4522896dcbd6c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21590-cwe-653-improper-isolation-or-compartmentalization-in-juniper-networks-junos-os-bdab10</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21590%3A%20CWE-653%20Improper%20Isolation%20or%20Compartmentalization%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d981cc4522896dcbdab10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1527-cwe-79-improper-neutralization-of-in-280fbd1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B20%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54ded8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21866-vulnerability-in-linux-linux-be8a56</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21865-vulnerability-in-linux-linux-be8a52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21864-vulnerability-in-linux-linux-be8a4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21863-vulnerability-in-linux-linux-be8a3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21862-vulnerability-in-linux-linux-be8a37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21861-vulnerability-in-linux-linux-be8a2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21860-vulnerability-in-linux-linux-be8a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21859-vulnerability-in-linux-linux-be8a0f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21858-vulnerability-in-linux-linux-be8a0b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21857-vulnerability-in-linux-linux-be8a07</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21856-vulnerability-in-linux-linux-be8a03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21855-vulnerability-in-linux-linux-be89ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21854-vulnerability-in-linux-linux-be89fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21853-vulnerability-in-linux-linux-be89f7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21852-vulnerability-in-linux-linux-be89f3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21851-vulnerability-in-linux-linux-be89ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21850-vulnerability-in-linux-linux-be89de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21849-vulnerability-in-linux-linux-be89b4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21848-vulnerability-in-linux-linux-be89b0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21847-vulnerability-in-linux-linux-be89ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21846-vulnerability-in-linux-linux-be89a8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21845-vulnerability-in-linux-linux-be89a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe89a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21844-vulnerability-in-linux-linux-be89a0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe89a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58089-vulnerability-in-linux-linux-bdd26d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58088-vulnerability-in-linux-linux-bde355</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13446-cwe-288-authentication-bypass-using-f48fa035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13446%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20AmentoTech%20Workreap&amp;severity=critical&amp;id=699f6e57b7ef31ef0b59e9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13430-cwe-284-improper-access-control-in--e1a3fdd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13430%3A%20CWE-284%20Improper%20Access%20Control%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58087-vulnerability-in-linux-linux-bde351</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12589-cwe-79-improper-neutralization-of-i-2eb3c40e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20djeet%20Finale%20Lite%20%E2%80%93%20Sales%20Countdown%20Timer%20%26%20Discount%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13838-cwe-918-server-side-request-forgery-6a3884b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13838%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20uncannyowl%20Uncanny%20Automator%20%E2%80%93%20Easy%20Automation%2C%20Integration%2C%20Webhooks%20%26%20Workflow%20Builder%20Plugin&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56dddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13498-cwe-200-exposure-of-sensitive-infor-326d6eb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13498%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Form%20Builder%20%E2%80%93%20Contact%20forms%20and%20much%20more&amp;severity=medium&amp;id=699f6e5bb7ef31ef0b59ed7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2077-cwe-79-improper-neutralization-of-in-f573cd56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duogeek%20Simple%20Amazon%20Affiliate&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2078-cwe-79-improper-neutralization-of-in-40627ca3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2078%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpenverne%20BlogBuzzTime%20for%20WP&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1508-cwe-862-missing-authorization-in-the-dec0e542</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1508%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2076-cwe-79-improper-neutralization-of-in-1b589bdb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gnarf%20binlayerpress&amp;severity=medium&amp;id=699f6b1db7ef31ef0b54e48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2205-cwe-79-improper-neutralization-of-in-157d58a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mooveagency%20GDPR%20Cookie%20Compliance%20%E2%80%93%20Cookie%20Banner%2C%20Cookie%20Consent%2C%20Cookie%20Notice%20%E2%80%93%20CCPA%2C%20DSGVO%2C%20RGPD&amp;severity=medium&amp;id=699f6b1fb7ef31ef0b54e5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27915-na-ccc41c7e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27915%3A%20n%2Fa&amp;severity=medium&amp;id=68e490596ce96be75a027aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25568-na-bb73b969</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25568%3A%20n%2Fa&amp;severity=critical&amp;id=687c00d4a83201eaacff312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25567-na-6511b0e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25567%3A%20n%2Fa&amp;severity=critical&amp;id=687c00d4a83201eaacff311f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25566-na-e0dffd9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25566%3A%20n%2Fa&amp;severity=medium&amp;id=687c00d4a83201eaacff3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25565-na-a0c8b552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25565%3A%20n%2Fa&amp;severity=critical&amp;id=687c00d4a83201eaacff3108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-12-2c2ecb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-12&amp;severity=medium&amp;id=682c7db8e8347ec82d2c2ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-12-f11ff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2233-cwe-347-improper-verification-of-cry-f17ffa48</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2233%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Samsung%20SmartThings&amp;severity=high&amp;id=69a0a45f85912abc71d66bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1707-cwe-98-improper-control-of-filename--b68683d5</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1707%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20techlabpro1%20Review%20Schema%20%E2%80%93%20Review%20%26%20Structure%20Data%20Schema%20Plugin&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28868-cross-site-request-forgery-csrf-in--24715a62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28868%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZipList%20ZipList%20Recipe&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28943-improper-neutralization-of-input-du-bbd5a6ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mylo2h2s%20DP%20ALTerminator%20-%20Missing%20ALT%20manager&amp;severity=null&amp;id=69cd72f1e6bfc5ba1deef99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28941-cross-site-request-forgery-csrf-in--f59f7867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28941%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ohtan%20Spam%20Byebye&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28940-cross-site-request-forgery-csrf-in--5041c561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28940%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arkapravamajumder%20Back%20To%20Top&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee83f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28938-missing-authorization-in-bjoern-wp--0584118a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28938%3A%20Missing%20Authorization%20in%20Bjoern%20WP%20Performance%20Pack&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28937-improper-neutralization-of-input-du-d042a1b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lavacode%20Lava%20Ajax%20Search&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28936-improper-neutralization-of-input-du-f8aa61e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sakurapixel%20Lunar&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28933-cross-site-request-forgery-csrf-in--b37fe810</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28933%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20maxfoundry%20MaxA%2FB&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28932-cross-site-request-forgery-csrf-in--12e3cff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28932%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BCS%20Website%20Solutions%20Insert%20Code&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28931-cross-site-request-forgery-csrf-in--0527288b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DevriX%20Hashtags&amp;severity=null&amp;id=69cd72f0e6bfc5ba1deef61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28930-improper-neutralization-of-input-du-cf3e83c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rodolphe%20MOULIN%20List%20Mixcloud&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28929-improper-neutralization-of-input-du-7c2b746a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vivek%20Marakana%20Tabbed%20Login%20Widget&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28927-cross-site-request-forgery-csrf-in--52025383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28927%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A.%20Chappard%20Display%20Template%20Name&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28926-improper-neutralization-of-input-du-9d4b1896</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20popeating%20Post%20Read%20Time&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28925-cross-site-request-forgery-csrf-in--2ee586b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28925%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hieu%20Nguyen%20WATI%20Chat%20and%20Notification&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28923-cross-site-request-forgery-csrf-in--2efdb1d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28923%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20philippe%20No%20Disposable%20Email&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28922-cross-site-request-forgery-csrf-in--c06aa924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Terence%20D.%20Go%20To%20Top&amp;severity=null&amp;id=69cd72eee6bfc5ba1deef55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28920-missing-authorization-in-jogesh-res-e35caf52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28920%3A%20Missing%20Authorization%20in%20Jogesh%20Responsive%20Google%20Map&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28919-improper-neutralization-of-input-du-88a14815</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28919%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shellbot%20Easy%20Image%20Display&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28918-improper-neutralization-of-input-du-07597452</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20A.%20Jones%20Featured%20Image%20Thumbnail%20Grid&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28915-unrestricted-upload-of-file-with-da-57ae8327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28915%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Theme%20Egg%20ThemeEgg%20ToolKit&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28914-improper-neutralization-of-input-du-df5ba351</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Sharma%20wordpress%20login%20form%20to%20anywhere&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28913-cross-site-request-forgery-csrf-in--a87f95db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28913%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aftab%20Ali%20Muni%20WP%20Add%20Active%20Class%20To%20Menu%20Item&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28912-cross-site-request-forgery-csrf-in--a05f7b4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28912%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Muntasir%20Rahman%20Custom%20Dashboard%20Page&amp;severity=null&amp;id=69cd72ece6bfc5ba1deef51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28910-cross-site-request-forgery-csrf-in--e8ae81fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28910%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ravinder%20Khurana%20WP%20Hide%20Admin%20Bar&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28909-cross-site-request-forgery-csrf-in--88397544</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28909%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edwardw%20WP%20No-Bot%20Question&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28908-improper-neutralization-of-input-du-a3cb6c3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pipdig%20pipDisqus&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28907-improper-neutralization-of-input-du-ca7b572b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rahul%20Arora%20WP%20Last%20Modified&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28906-improper-neutralization-of-input-du-ae1724df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thiago%20S.F.%20Skitter%20Slideshow&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28905-improper-neutralization-of-input-du-72e86d15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chaser324%20Featured%20Posts%20Grid&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28902-cross-site-request-forgery-csrf-in--2f2f59d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28902%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Benjamin%20Pick%20Contact%20Form%207%20Select%20Box%20Editor%20Button&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28901-cross-site-request-forgery-csrf-in--be7a3473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28901%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Naren%20Members%20page%20only%20for%20logged%20in%20users&amp;severity=null&amp;id=69cd72eae6bfc5ba1deef4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28900-cross-site-request-forgery-csrf-in--b491c800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28900%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webgarb%20TabGarb%20Pro&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28897-cross-site-request-forgery-csrf-in--90209fcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28897%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Steveorevo%20Domain%20Theme&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28896-url-redirection-to-untrusted-site-o-8bad1af9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28896%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Akshar%20Soft%20Solutions%20AS%20English%20Admin&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28895-improper-neutralization-of-input-du-388b55f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Suman%20Biswas%20Custom%20top%20bar&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28894-cross-site-request-forgery-csrf-in--feae34a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28894%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frucomerci%20List%20of%20Posts%20from%20each%20Category%20plugin%20for%20WordPress&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28892-cross-site-request-forgery-csrf-in--55062db7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28892%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a2rocklobster%20FTP%20Sync&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28891-cross-site-request-forgery-csrf-in--7ada3a99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28891%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jazzigor%20price-calc&amp;severity=null&amp;id=69cd72e9e6bfc5ba1deef4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28887-cross-site-request-forgery-csrf-in--92151ab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28887%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fastmover%20Plugins%20Last%20Updated%20Column&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28886-cross-site-request-forgery-csrf-in--07b65d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28886%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28884-cross-site-request-forgery-csrf-in--1955987f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28884%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rajesh%20Kumar%20WP%20Bulk%20Post%20Duplicator&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28883-cross-site-request-forgery-csrf-in--91a33427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28883%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Martin%20WP%20Compare%20Tables&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28881-cross-site-request-forgery-csrf-in--017994f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28881%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mg12%20Mobile%20Themes&amp;severity=null&amp;id=69cd72e7e6bfc5ba1deef44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28879-improper-neutralization-of-input-du-a2ba9361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aumsrini%20Bee%20Layer%20Slider&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28878-improper-neutralization-of-input-du-fdfb0821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Will%20Brubaker%20Awesome%20Surveys&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28876-cross-site-request-forgery-csrf-in--36c6fb78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28876%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Skrill_Team%20Skrill%20Official&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28875-improper-neutralization-of-input-du-318ac0bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28874-authorization-bypass-through-user-c-7b348348</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28874%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28872-missing-authorization-in-jwpegram-b-ec42ed54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28872%3A%20Missing%20Authorization%20in%20jwpegram%20Block%20Spam%20By%20Math%20Reloaded&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28871-improper-neutralization-of-input-du-04d273f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jwpegram%20Block%20Spam%20By%20Math%20Reloaded&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28870-improper-neutralization-of-input-du-70993d2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amocrm%20amoCRM%20WebForm&amp;severity=null&amp;id=69cd72e6e6bfc5ba1deef3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28867-cross-site-request-forgery-csrf-in--a12537ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28867%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stesvis%20Frontpage%20category%20filter&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28866-cross-site-request-forgery-csrf-in--51da95d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28866%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smerriman%20Login%20Logger&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28864-cross-site-request-forgery-csrf-in--6117cc18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28864%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20planetstudio%20Builder%20for%20Contact%20Form%207%20by%20Webconstruct&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28863-cross-site-request-forgery-csrf-in--8b7715e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28863%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Carlos%20Minatti%20Delete%20Original%20Image&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28862-cross-site-request-forgery-csrf-in--c818352d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28862%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Venugopal%20Comment%20Date%20and%20Gravatar%20remover&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28861-cross-site-request-forgery-csrf-in--33d8d410</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28861%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bhzad%20WP%20jQuery%20Persian%20Datepicker&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28860-cross-site-request-forgery-csrf-in--cd1be293</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28860%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PPDPurveyor%20Google%20News%20Editors%20Picks%20Feed%20Generator&amp;severity=null&amp;id=69cd72e4e6bfc5ba1deef3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28859-cross-site-request-forgery-csrf-in--c0dc8125</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28859%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CodeVibrant%20Maintenance%20Notice&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28857-cross-site-request-forgery-csrf-in--0c93f33d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28857%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rankchecker%20Rankchecker.io%20Integration&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-28856-cross-site-request-forgery-csrf-in--626f6f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-28856%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dangrossman%20W3Counter%20Free%20Real-Time%20Web%20Stats&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27773-cwe-347-improper-verification-of-cryptographic-signature-in-simplesamlphp-saml2-bd73c4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27773%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20simplesamlphp%20saml2&amp;severity=high&amp;id=682d9817c4522896dcbd73c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24431-out-of-bounds-read-cwe-125-in-adobe-fee1bb63</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24431%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69a0a45785912abc71d66286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27158-access-of-uninitialized-pointer-cwe-aa5b0f7f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27158%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d66875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27161-out-of-bounds-read-cwe-125-in-adobe-595f35ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27161%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d6687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27164-out-of-bounds-read-cwe-125-in-adobe-936d29fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27164%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69a0a45b85912abc71d66889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27174-use-after-free-cwe-416-in-adobe-acr-e511140a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27174%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45d85912abc71d66a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27162-access-of-uninitialized-pointer-cwe-c0eaaaf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27162%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d66882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27160-use-after-free-cwe-416-in-adobe-acr-5bc56c57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27160%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d6687c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27159-use-after-free-cwe-416-in-adobe-acr-cb244d4d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27159%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=69a0a45b85912abc71d66879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27163-out-of-bounds-read-cwe-125-in-adobe-ef54cb03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27163%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=69a0a45b85912abc71d66885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24201-maliciously-crafted-web-content-may-63557ddb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24201%3A%20Maliciously%20crafted%20web%20content%20may%20be%20able%20to%20break%20out%20of%20Web%20Content%20sandbox.%20This%20is%20a%20supplementary%20fix%20for%20an%20attack%20that%20was%20blocked%20in%20iOS%2017.2.%20(Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals%20on%20versions%20of%20iOS%20before%20iOS%2017.2.)%20in%20Apple%20Safari&amp;severity=critical&amp;id=68881727ad5a09ad0088bc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27169-out-of-bounds-write-cwe-787-in-adob-22fac314</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27169%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a45b85912abc71d66890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27166-out-of-bounds-write-cwe-787-in-adob-ea7cfab3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27166%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45b85912abc71d6688d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27175-out-of-bounds-write-cwe-787-in-adob-d5f00cfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27175%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45d85912abc71d66aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27177-heap-based-buffer-overflow-cwe-122--a04eae6c</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27177%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45d85912abc71d66aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27178-out-of-bounds-write-cwe-787-in-adob-c020170f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27178%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45d85912abc71d66aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24453-heap-based-buffer-overflow-cwe-122--fa34d12c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24453%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45985912abc71d662ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24452-out-of-bounds-write-cwe-787-in-adob-59e8a49b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24452%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a45985912abc71d662aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24440-out-of-bounds-write-cwe-787-in-adob-cf2fc4d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24440%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=69a0a45785912abc71d6628f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24451-out-of-bounds-write-cwe-787-in-adob-0a9cce8b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24451%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69a0a45985912abc71d662a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24450-out-of-bounds-write-cwe-787-in-adob-0a3b7454</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24450%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69a0a45985912abc71d662a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26645-cwe-23-relative-path-traversal-in-microsoft-windows-app-client-for-windows-desktop-aeb3ac</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26645%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Remote%20Desktop%20client%20for%20Windows%20Desktop&amp;severity=high&amp;id=682cd0f81484d88663aeb3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26633-cwe-707-improper-neutralization-in-microsoft-windows-10-version-1809-aeb39b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26633%3A%20CWE-707%3A%20Improper%20Neutralization%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26631-cwe-427-uncontrolled-search-path-element-in-microsoft-visual-studio-code-aeb399</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26631%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=682cd0f81484d88663aeb399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26630-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26630%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26629-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb395</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26629%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26627-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-azure-arc-aeb393</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26627%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20ARC&amp;severity=high&amp;id=682cd0f81484d88663aeb393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24049-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-azure-cli-aeb313</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24049%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20CLI&amp;severity=high&amp;id=682cd0f81484d88663aeb313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24994-cwe-284-improper-access-control-in-microsoft-windows-11-version-22h2-aeb37a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24994%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f81484d88663aeb37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24993-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb378</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24993%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24992-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aeb376</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24992%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24991-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb374</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24991%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24985-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-aeb361</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24985%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24984-cwe-532-insertion-of-sensitive-information-into-log-file-in-microsoft-windows-10-version-1809-aeb35f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24984%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24983-cwe-416-use-after-free-in-microsoft-windows-10-version-1507-aeb35d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24983%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24084-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-server-2022-aeb35b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24084%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f81484d88663aeb35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24076-cwe-284-improper-access-control-in-microsoft-windows-11-version-22h2-aeb340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24076%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0f81484d88663aeb340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24075-cwe-121-stack-based-buffer-overflow-in-microsoft-office-online-server-aeb33e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24075%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24072-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb33c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24072%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24067-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb336</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24067%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24066-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb334</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24066%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24064-cwe-416-use-after-free-in-microsoft-windows-server-2019-aeb332</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24064%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=682cd0f81484d88663aeb332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24061-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-aeb330</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24061%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24059-cwe-681-incorrect-conversion-between-numeric-types-in-microsoft-windows-10-version-1809-aeb323</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24059%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24056-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb31f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24056%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24055-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb31d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24054-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-10-version-1809-aeb31b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24054%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24051-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb317</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24050-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb315</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24050%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=682cd0f81484d88663aeb315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24048-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb311</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24048%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=682cd0f81484d88663aeb311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24046-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb304</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24046%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24045-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-aeb302</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24045%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682cd0f81484d88663aeb302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21199-cwe-269-improper-privilege-management-in-microsoft-azure-agent-for-site-recovery-aeb2f6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21199%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Azure%20Agent%20for%20Backup&amp;severity=medium&amp;id=682cd0f81484d88663aeb2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21247-cwe-41-improper-resolution-of-path-equivalence-in-microsoft-windows-server-2025-aeb2f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21247%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25008-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2019-aeb391</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25008%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=682cd0f81484d88663aeb391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25003-cwe-427-uncontrolled-search-path-element-in-microsoft-microsoft-visual-studio-2019-version-16-11-includes-16-0-16-10-aeb38f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25003%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202019%20version%2016.11%20(includes%2016.0%20-%2016.10)&amp;severity=high&amp;id=682cd0f81484d88663aeb38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24998-cwe-427-uncontrolled-search-path-element-in-microsoft-microsoft-visual-studio-2022-version-17-13-aeb38d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24998%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=682cd0f81484d88663aeb38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24997-cwe-476-null-pointer-dereference-in-microsoft-windows-server-2022-aeb380</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24997%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=682cd0f81484d88663aeb380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24996-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-10-version-1809-aeb37e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24996%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24995-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb37c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24995%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21180-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb2f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21180%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24988-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb372</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24988%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24987-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb370</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24987%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=682cd0f81484d88663aeb370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24986-cwe-653-improper-isolation-or-compartmentalization-in-microsoft-azure-promptflow-core-aeb36e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24986%3A%20CWE-653%3A%20Improper%20Isolation%20or%20Compartmentalization%20in%20Microsoft%20Azure%20promptflow-core&amp;severity=medium&amp;id=682cd0f81484d88663aeb36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24083-cwe-822-untrusted-pointer-dereference-in-microsoft-microsoft-office-2019-aeb359</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24083%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24082-cwe-416-use-after-free-in-microsoft-office-online-server-aeb357</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24082%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24081-cwe-416-use-after-free-in-microsoft-office-online-server-aeb355</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24081%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24080-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb353</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24079-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24079%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24078-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb34f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24077-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aeb342</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24077%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24070-cwe-1390-weak-authentication-in-microsoft-asp-net-core-8-0-aeb338</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24070%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20ASP.NET%20Core%208.0&amp;severity=high&amp;id=682cd0f81484d88663aeb338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24057-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-2019-aeb321</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24057%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f81484d88663aeb321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24043-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-windbg-aeb2fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24043%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20WinDbg&amp;severity=high&amp;id=682cd0f81484d88663aeb2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24044-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb300</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24044%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24035-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aeb2fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24035%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26634-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb39d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26634%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682cd0f81484d88663aeb39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21169-heap-based-buffer-overflow-cwe-122--ff776894</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21169%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=69a0a45185912abc71d6564a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27172-out-of-bounds-write-cwe-787-in-adob-562033cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27172%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Designer&amp;severity=high&amp;id=69a0a45d85912abc71d66a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54026-execute-unauthorized-code-or-comman-d04e7780</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54026%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a963d0ff220b9507e1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32123-execute-unauthorized-code-or-comman-021a36e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32123%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=medium&amp;id=69a0a43d85912abc71d6248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54018-execute-unauthorized-code-or-comman-212afffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54018%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a2148330e0671671d0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52960-improper-access-control-in-fortinet-199a8b1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52960%3A%20Improper%20access%20control%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a963d0ff220b9507e1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45324-execute-unauthorized-code-or-comman-d23164fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45324%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=high&amp;id=68f0c1e29f8a5dbaeac5cdaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46663-escalation-of-privilege-in-fortinet-74ee00b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46663%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiMail&amp;severity=medium&amp;id=69a0a43f85912abc71d6303f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52961-execute-unauthorized-code-or-comman-e1c79375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52961%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a963d0ff220b9507e1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45328-escalation-of-privilege-in-fortinet-5c769758</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45328%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=69a0a43f85912abc71d6302d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22454-cwe-732-incorrect-permission-assign-c477622f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22454%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Ivanti%20Secure%20Access%20Client&amp;severity=high&amp;id=69a0a45385912abc71d656a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54085-cwe-290-authentication-bypass-by-sp-a060c498</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54085%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20AMI%20MegaRAC-SPx&amp;severity=critical&amp;id=68f7d9b6247d717aace26c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27363-out-of-bounds-write-cwe-787-in-freetype-freetype-bd9d47</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27363%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20FreeType%20FreeType&amp;severity=high&amp;id=682d981bc4522896dcbd9d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56182-cwe-693-protection-mechanism-failur-c7010e5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56182%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Siemens%20SIMATIC%20Field%20PG%20M5&amp;severity=high&amp;id=68487f551b0bd07c3938a242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56181-cwe-693-protection-mechanism-failur-c683d847</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56181%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Siemens%20SIMATIC%20Field%20PG%20M5&amp;severity=high&amp;id=68487f541b0bd07c3938a1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1550-cwe-94-improper-control-of-generatio-b993c60a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1550%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Google%20Keras&amp;severity=high&amp;id=687fb240a83201eaac1d91b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2190-cwe-297-improper-validation-of-certi-37811817</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2190%3A%20CWE-297%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch%20in%20TECNO%20com.transsnet.store&amp;severity=high&amp;id=68bb425f535f4a97730e494b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13228-cwe-359-exposure-of-private-persona-7cb71ab9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13228%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20themeum%20Qubely%20%E2%80%93%20Advanced%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13413-cwe-79-improper-neutralization-of-i-0a9e2002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frazahmed%20ProductDyno&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13436-cwe-352-cross-site-request-forgery--236cd57d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13436%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wedevs%20Appsero%20Helper&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2169-cwe-94-improper-control-of-generatio-545072be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2169%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20WPCS%20%E2%80%93%20WordPress%20Currency%20Switcher%20Professional&amp;severity=high&amp;id=699f6b1fb7ef31ef0b54e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1661-cwe-22-improper-limitation-of-a-path-16e39c8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1661%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=critical&amp;id=699f6b16b7ef31ef0b54df8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12010-cwe-78-improper-neutralization-of-s-4d946627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12010%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20AX7501-B1%20firmware&amp;severity=high&amp;id=69a0a43a85912abc71d62099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12009-cwe-78-improper-neutralization-of-s-6dad8e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12009%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20EX5601-T1%20firmware&amp;severity=high&amp;id=69a0a43a85912abc71d62096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11253-cwe-78-improper-neutralization-of-s-2b5d1140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11253%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG8825-T50K%20firmware&amp;severity=high&amp;id=69a0a43a85912abc71d62093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27434-cwe-79-improper-neutralization-of-i-3d527bf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27434%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP_SE%20SAP%20Commerce%20(Swagger%20UI)&amp;severity=high&amp;id=69a0a45d85912abc71d66aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26661-cwe-862-missing-authorization-in-sa-1172b3a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26661%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20NetWeaver%20(ABAP%20Class%20Builder)&amp;severity=high&amp;id=69a0a45b85912abc71d66871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26658-cwe-384-session-fixation-in-sapse-s-3b79290d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26658%3A%20CWE-384%3A%20Session%20Fixation%20in%20SAP_SE%20SAP%20Business%20One%20(Service%20Layer)&amp;severity=medium&amp;id=69a0a45985912abc71d662c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-11-9f79f3b9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-11&amp;severity=medium&amp;id=68367c98182aa0cae231dc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-11-74d6b1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-11&amp;severity=medium&amp;id=682c7abbe3e6de8ceb74d6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-11-f12e68</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/over-2-400-ip-addresses-linked-to-astrill-vpn-often-used-by-north-korean-fake-it-workers-f0c540</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Over%202%2C400%20IP%20addresses%20linked%20to%20Astrill%20VPN%2C%20often%20used%20by%20North%20Korean%20fake%20IT%20workers.&amp;severity=low&amp;id=682acdbebbaf20d303f0c540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1828-cwe-338-use-of-cryptographically-wea-0925d30f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1828%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20perl%20Crypt%3A%3ARandom&amp;severity=high&amp;id=68bae6eb9bc4cbad54150db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2137-out-of-bounds-read-in-google-chrome-d7056896</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2137%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a45d85912abc71d66aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2136-use-after-free-in-google-chrome-58101e5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2136%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a45d85912abc71d66ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2135-type-confusion-in-google-chrome-eaae171e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2135%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a45d85912abc71d66ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1920-type-confusion-in-google-chrome-05066c7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1920%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54558-an-app-may-be-able-to-trick-a-user--11941d72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54558%3A%20An%20app%20may%20be%20able%20to%20trick%20a%20user%20into%20granting%20access%20to%20photos%20from%20the%20user&apos;s%20photo%20library%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb834e6bfc5ba1df6eed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54467-a-malicious-website-may-exfiltrate--5a9fa4de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54467%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=690908537fff0e30cee2390a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44179-an-attacker-with-physical-access-to-32a00677</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44179%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20read%20contact%20numbers%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb82ce6bfc5ba1df6ea5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44227-an-app-may-be-able-to-cause-unexpec-a0bae5a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44227%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82ee6bfc5ba1df6ecf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54546-an-app-may-be-able-to-cause-unexpec-39de47b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54546%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb834e6bfc5ba1df6eebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54463-an-app-may-be-able-to-access-remova-833e4d36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54463%3A%20An%20app%20may%20be%20able%20to%20access%20removable%20volumes%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54560-a-malicious-app-may-be-able-to-modi-688ff931</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54560%3A%20A%20malicious%20app%20may%20be%20able%20to%20modify%20other%20apps%20without%20having%20App%20Management%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44192-processing-maliciously-crafted-web--8f132ffb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44192%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909084f7fff0e30cee23521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54469-a-local-user-may-be-able-to-leak-se-6b52dde4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54469%3A%20A%20local%20user%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54473-an-app-may-be-able-to-access-user-s-7acff8c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54473%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24813-cwe-44-path-equivalence-filename-in-0acbd49b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24813%3A%20CWE-44%20Path%20Equivalence%3A%20&apos;file.name&apos;%20(Internal%20Dot)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=687e795da83201eaac11f328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26916-improper-control-of-filename-for-in-4a8e855a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26916%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Pixflow%20Massive%20Dynamic&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26910-cross-site-request-forgery-csrf-in--3114caec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26910%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Iqonic%20Design%20WPBookit&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26936-improper-control-of-generation-of-c-753d8b95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26936%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FRESHFACE%20Fresh%20Framework&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26933-improper-control-of-filename-for-in-f45c33f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26933%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Nitin%20Prakash%20WC%20Place%20Order%20Without%20Payment&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2153-heap-based-buffer-overflow-in-hdf5-bd6d08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2153%3A%20Heap-based%20Buffer%20Overflow%20in%20HDF5&amp;severity=low&amp;id=682d9816c4522896dcbd6d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1497-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-mljar-plotai-bd6cb4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1497%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20MLJAR%20PlotAI&amp;severity=critical&amp;id=682d9816c4522896dcbd6cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2152-heap-based-buffer-overflow-in-open-asset-import-library-assimp-bd6d06</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2152%3A%20Heap-based%20Buffer%20Overflow%20in%20Open%20Asset%20Import%20Library%20Assimp&amp;severity=medium&amp;id=682d9816c4522896dcbd6d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1945-cwe-345-insufficient-verification-of-6cdd6c0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1945%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1944-cwe-345-insufficient-verification-of-cb4b0626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1944%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27254-cwe-282-improper-ownership-manageme-9a119de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27254%3A%20CWE-282%20Improper%20Ownership%20Management%20in%20GE%20Vernova%20EnerVista%20UR%20Setup&amp;severity=high&amp;id=68e52419a677756fc9926607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27253-cwe-15-external-control-of-system-o-4fbd11aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27253%3A%20CWE-15%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20GE%20Vernova%20N60%20multilin&amp;severity=medium&amp;id=68e52419a677756fc9926603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1926-cwe-352-cross-site-request-forgery-c-4cc92928</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1926%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-10-2c4253</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-10&amp;severity=medium&amp;id=682c7dbce8347ec82d2c4253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-10-f12f22</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27636-bypassinjection-in-apache-software--7223bc04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27636%3A%20Bypass%2FInjection%20in%20Apache%20Software%20Foundation%20Apache%20Camel&amp;severity=medium&amp;id=68f86065b6f30825d64afcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2119-use-of-default-credentials-in-thinkware-car-dashcam-f800-pro-bd6cf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2119%3A%20Use%20of%20Default%20Credentials%20in%20Thinkware%20Car%20Dashcam%20F800%20Pro&amp;severity=low&amp;id=682d9816c4522896dcbd6cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2118-sql-injection-in-quantico-tecnologia-prmv-bd6cef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2118%3A%20SQL%20Injection%20in%20Quantico%20Tecnologia%20PRMV&amp;severity=medium&amp;id=682d9816c4522896dcbd6cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1382-cwe-79-cross-site-scripting-xss-in-c-53238db4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1382%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Us%20By%20Lord%20Linus&amp;severity=medium&amp;id=696166b3047de42cfc9dfbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-09-2c3c06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-09&amp;severity=medium&amp;id=682c7dbce8347ec82d2c3c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-09-f12cea</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13924-cwe-918-server-side-request-forgery-3a6af0b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13924%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20fancywp%20Starter%20Templates%20by%20FancyWP&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10326-cwe-862-missing-authorization-in-ro-9282c475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10326%3A%20CWE-862%20Missing%20Authorization%20in%20rometheme%20RomethemeKit%20For%20Elementor&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13675-cwe-79-improper-neutralization-of-i-4673ce55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20SlingBlocks%20%E2%80%93%20Gutenberg%20Blocks%20by%20FunnelKit%20(Formerly%20WooFunnels)&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a0096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1664-cwe-79-improper-neutralization-of-in-a44b3674</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11640-cwe-352-cross-site-request-forgery--2bc3afb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11640%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20e4jvikwp%20VikRentCar%20Car%20Rental%20Management%20System&amp;severity=high&amp;id=699f6e18b7ef31ef0b59514e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13649-cwe-79-improper-neutralization-of-i-4e3f8953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20140%2B%20Widgets%20%7C%20Xpro%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1783-cwe-79-improper-neutralization-of-in-82f8fd74</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kometschuh%20Gallery%20Styles&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1322-cwe-200-exposure-of-sensitive-inform-d1f31a12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1322%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1323-cwe-89-improper-neutralization-of-sp-cc94e8a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1323%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=high&amp;id=699f6b10b7ef31ef0b54dba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1325-cwe-862-missing-authorization-in-wpp-80580c32</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1325%3A%20CWE-862%20Missing%20Authorization%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54dbaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13359-cwe-434-unrestricted-upload-of-file-4067d877</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13359%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tychesoftwares%20Product%20Input%20Fields%20for%20WooCommerce&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1324-cwe-79-improper-neutralization-of-in-e6ce7bdf</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54dba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1287-cwe-79-improper-neutralization-of-in-b3b0be69</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1287%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54daf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0177-cwe-269-improper-privilege-managemen-a8f4bfed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0177%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20javothemes%20Javo%20Core&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13882-cwe-434-unrestricted-upload-of-file-4a9f9b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13882%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=high&amp;id=699f6d19b7ef31ef0b56def9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13816-cwe-862-missing-authorization-in-co-00b0d012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13816%3A%20CWE-862%20Missing%20Authorization%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10321-cwe-200-exposure-of-sensitive-infor-8134b578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10321%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themesgrove%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11087-cwe-287-improper-authentication-in--c018760d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11087%3A%20CWE-287%20Improper%20Authentication%20in%20cyberlord92%20miniOrange%20Social%20Login%20and%20Register%20(Discord%2C%20Google%2C%20Twitter%2C%20LinkedIn)%20Pro%20Addon&amp;severity=high&amp;id=699f6e06b7ef31ef0b593c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13908-cwe-434-unrestricted-upload-of-file-ed0000d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13908%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bestwebsoft%20SMTP%20by%20BestWebSoft&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12114-cwe-639-authorization-bypass-throug-c50c1bd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12114%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bradvin%20FooGallery%20%E2%80%93%20Responsive%20Photo%20Gallery%2C%20Image%20Viewer%2C%20Justified%2C%20Masonry%20%26%20Carousel&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12119-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bradvin-foogallery-responsive-photo-gallery-image-viewer-justified-masonry-carousel-bd6c67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20FooGallery%20%E2%80%93%20Responsive%20Photo%20Gallery%2C%20Image%20Viewer%2C%20Justified%2C%20Masonry%20%26%20Carousel&amp;severity=medium&amp;id=682d9816c4522896dcbd6c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13844-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-saadiqbal-post-smtp-wp-smtp-plugin-with-email-logs-and-mobile-app-for-failure-notifications-gmail-smtp-office-365-brevo-mailgun-amazon-ses-and-more-bd6c71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13844%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20WP%20SMTP%20Plugin%20with%20Email%20Logs%20and%20Mobile%20App%20for%20Failure%20Notifications%20%E2%80%93%20Gmail%20SMTP%2C%20Office%20365%2C%20Brevo%2C%20Mailgun%2C%20Amazon%20SES%20and%20more&amp;severity=medium&amp;id=682d9816c4522896dcbd6c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13640-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-tychesoftwares-print-invoice-delivery-notes-for-woocommerce-bd6c6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13640%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=682d9816c4522896dcbd6c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13774-cwe-352-cross-site-request-forgery--070de3a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13774%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcodefactory%20Wishlist%20for%20WooCommerce%3A%20Multi%20Wishlists%20Per%20Customer&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13895-cwe-94-improper-control-of-generati-3dd24071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13895%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20jtsternberg%20Code%20Snippets%20CPT&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13835-cwe-269-improper-privilege-manageme-3e45c397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13835%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20gandhihitesh9%20Post%20Meta%20Data%20Manager&amp;severity=high&amp;id=699f6d18b7ef31ef0b56dddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1504-cwe-862-missing-authorization-in-and-24bb0322</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1504%3A%20CWE-862%20Missing%20Authorization%20in%20andyexeter%20Post%20Lockdown&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13890-cwe-94-improper-control-of-generati-2bd4c750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13890%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sksdev%20Allow%20PHP%20Execute&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12460-cwe-79-improper-neutralization-of-i-58535485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20laurencebahiirwa%20Years%20Since%20%E2%80%93%20Timeless%20Texts&amp;severity=medium&amp;id=699f6e3db7ef31ef0b59b772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1481-cwe-862-missing-authorization-in-man-0ba10657</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1481%3A%20CWE-862%20Missing%20Authorization%20in%20mandooox%20Shortcode%20Cleaner%20Lite&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1261-cwe-79-improper-neutralization-of-in-3f722d8e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27840-cwe-912-hidden-functionality-in-espressif-esp32-bd6cca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27840%3A%20CWE-912%20Hidden%20Functionality%20in%20Espressif%20ESP32&amp;severity=medium&amp;id=682d9816c4522896dcbd6cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52971-cwe-1038-insecure-automated-optimizations-in-mariadb-mariadb-bd6c63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52971%3A%20CWE-1038%20Insecure%20Automated%20Optimizations%20in%20MariaDB%20MariaDB&amp;severity=medium&amp;id=682d9816c4522896dcbd6c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52970-cwe-1038-insecure-automated-optimizations-in-mariadb-mariadb-bd6c54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52970%3A%20CWE-1038%20Insecure%20Automated%20Optimizations%20in%20MariaDB%20MariaDB&amp;severity=medium&amp;id=682d9816c4522896dcbd6c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-08-2c4c1e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-08&amp;severity=medium&amp;id=682c7dbce8347ec82d2c4c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-08-f12593</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26643-cwe-449-the-ui-performs-the-wrong-action-in-microsoft-microsoft-edge-chromium-based-aeb39f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26643%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0162-cwe-611-improper-restriction-of-xml--e09bb403</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0162%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Aspera%20Shares&amp;severity=high&amp;id=68b4f7b8ad5a09ad00c726e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12634-cwe-352-cross-site-request-forgery--72b6c6d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12634%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pickplugins%20Related%20Posts%2C%20Inline%20Related%20Posts%2C%20Contextual%20Related%20Posts%2C%20Related%20Content%20By%20PickPlugins&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1768-cwe-89-improper-neutralization-of-sp-9c3e33ed</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1768%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9458-cwe-79-cross-site-scripting-xss-in-r-60c39974</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9458%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Reservit%20Hotel&amp;severity=medium&amp;id=696166b3047de42cfc9dfbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13857-cwe-918-server-side-request-forgery-728d88c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13857%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20davidanderson%20WPGet%20API%20%E2%80%93%20Connect%20to%20any%20external%20REST%20API&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13635-cwe-284-improper-access-control-in--8d65415f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13635%3A%20CWE-284%20Improper%20Access%20Control%20in%20vektor-inc%20VK%20Blocks&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13552-cwe-285-improper-authorization-in-s-626e0621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13552%3A%20CWE-285%20Improper%20Authorization%20in%20supportcandy%20SupportCandy%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13805-cwe-79-improper-neutralization-of-i-4069330d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Advanced%20File%20Manager%20%E2%80%94%20Ultimate%20WordPress%20File%20Manager%20and%20Document%20Library%20Plugin&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21843-vulnerability-in-linux-linux-be899c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe899c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21842-vulnerability-in-linux-linux-be8998</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21841-vulnerability-in-linux-linux-be8994</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21840-vulnerability-in-linux-linux-be8990</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21839-vulnerability-in-linux-linux-bd7ba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21838-vulnerability-in-linux-linux-be8968</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21837-aeb104</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21837&amp;severity=low&amp;id=682cd0f71484d88663aeb104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21836-vulnerability-in-linux-linux-be8960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21835-vulnerability-in-linux-linux-be895c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe895c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13431-cwe-79-improper-neutralization-of-i-ee0df6ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12876-cwe-862-missing-authorization-in-ux-22e40209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12876%3A%20CWE-862%20Missing%20Authorization%20in%20uxper%20Golo%20-%20City%20Travel%20Guide%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1315-cwe-288-authentication-bypass-using--0b499471</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1315%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20sfwebservice%20InWave%20Jobs&amp;severity=critical&amp;id=699f6b10b7ef31ef0b54db8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0959-cwe-564-sql-injection-hibernate-in-i-438c2496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0959%3A%20CWE-564%20SQL%20Injection%3A%20Hibernate%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9658-cwe-288-authentication-bypass-using--5dc3fe6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9658%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=699f6b56b7ef31ef0b553133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12609-cwe-89-improper-neutralization-of-s-07038443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12609%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12610-cwe-862-missing-authorization-in-da-04b783c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12610%3A%20CWE-862%20Missing%20Authorization%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13904-cwe-918-server-side-request-forgery-dcc3dcc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13904%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20platformlycom%20Platform.ly%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13781-cwe-89-improper-neutralization-of-s-13146ebd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13781%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Hero%20Plugins%20Hero%20Maps%20Premium&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a093a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12036-cwe-73-external-control-of-file-nam-db85ba81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12036%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Chimpstudio%20CS%20Framework&amp;severity=high&amp;id=699f6e2bb7ef31ef0b5971c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10804-cwe-22-improper-limitation-of-a-pat-b4aec1fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10804%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FWDesign%20Ultimate%20Video%20Player%20WordPress%20%26%20WooCommerce%20Plugin&amp;severity=high&amp;id=699f6dfeb7ef31ef0b5926ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12611-cwe-862-missing-authorization-in-da-016203c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12611%3A%20CWE-862%20Missing%20Authorization%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12035-cwe-22-improper-limitation-of-a-pat-cf78b3c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12035%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chimpstudio%20CS%20Framework&amp;severity=high&amp;id=699f6e2bb7ef31ef0b5971be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12607-cwe-89-improper-neutralization-of-s-f1f4a5d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12607%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26331-cwe-77-improper-neutralization-of-s-68385dab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26331%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20Wyse%20Proprietary%20OS%20(Modern%20ThinOS)&amp;severity=high&amp;id=69a0a45985912abc71d662bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13906-cwe-502-deserialization-of-untruste-a1820da4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13906%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20bestwebsoft%20Gallery%20by%20BestWebSoft%20%E2%80%93%20Customizable%20Image%20and%20Photo%20Galleries%20for%20WordPress&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1309-cwe-862-missing-authorization-in-adm-018996f2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1309%3A%20CWE-862%20Missing%20Authorization%20in%20admintwentytwenty%20UiPress%20lite%20%7C%20Effortless%20custom%20dashboards%2C%20admin%20themes%20and%20pages&amp;severity=high&amp;id=699f6b0fb7ef31ef0b54db16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0863-cwe-79-improper-neutralization-of-in-42734676</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX%20Plugin&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13320-cwe-89-improper-neutralization-of-s-e24d8cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13320%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20villatheme%20CURCY%20-%20WooCommerce%20Multi%20Currency%20-%20Currency%20Switcher&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13655-cwe-862-missing-authorization-in-mv-42717f4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13655%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Flex%20Mag%20-%20Responsive%20WordPress%20News%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59feee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12809-cwe-79-improper-neutralization-of-i-819cd85e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Wishlist&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1475-cwe-287-improper-authentication-in-w-8dfb0c0b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1475%3A%20CWE-287%20Improper%20Authentication%20in%20whyun%20WPCOM%20Member&amp;severity=critical&amp;id=699f6b12b7ef31ef0b54dcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0748-cwe-352-cross-site-request-forgery-c-e21b0db3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0748%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fave%20Themes%20Homey&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13526-cwe-862-missing-authorization-in-me-7515cf24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13526%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59efe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0749-cwe-288-authentication-bypass-using--3ce631f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0749%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Fave%20Themes%20Homey&amp;severity=high&amp;id=699f6b6bb7ef31ef0b555394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-07-2c4d94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-07&amp;severity=medium&amp;id=682c7dbce8347ec82d2c4d94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-07-f12271</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1121-code-execution-and-privilege-escalation-in-google-chromeos-bd8041</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1121%3A%20Code%20execution%20and%20%0APrivilege%20Escalation%20in%20Google%20ChromeOS&amp;severity=medium&amp;id=682d9818c4522896dcbd8041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58086-vulnerability-in-linux-linux-bde34d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21834-vulnerability-in-linux-linux-be8958</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21833-vulnerability-in-linux-linux-bd7189</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd7189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21832-vulnerability-in-linux-linux-bd7185</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9817c4522896dcbd7185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21831-vulnerability-in-linux-linux-be894b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe894b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58085-vulnerability-in-linux-linux-bde325</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58084-vulnerability-in-linux-linux-bde31d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58083-vulnerability-in-linux-linux-bdd269</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58082-vulnerability-in-linux-linux-bde315</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58081-vulnerability-in-linux-linux-bdd265</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58080-vulnerability-in-linux-linux-bde311</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58079-vulnerability-in-linux-linux-bde30d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58078-vulnerability-in-linux-linux-bde300</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58077-vulnerability-in-linux-linux-bde2fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58076-vulnerability-in-linux-linux-bde2f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21830-vulnerability-in-linux-linux-be8947</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21829-vulnerability-in-linux-linux-be8943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21828-vulnerability-in-linux-linux-be893f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21827-vulnerability-in-linux-linux-be893b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21826-vulnerability-in-linux-linux-bdd367</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21825-vulnerability-in-linux-linux-be8937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58075-vulnerability-in-linux-linux-bde2e9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58074-vulnerability-in-linux-linux-bde2e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58073-vulnerability-in-linux-linux-bde2c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58072-vulnerability-in-linux-linux-bde2c0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58071-vulnerability-in-linux-linux-bde2bc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58070-vulnerability-in-linux-linux-bde2b8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58069-vulnerability-in-linux-linux-bde2b4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58068-vulnerability-in-linux-linux-bde2b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58067-vulnerability-in-linux-linux-bde2ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58066-vulnerability-in-linux-linux-bde2aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58065-vulnerability-in-linux-linux-bde29d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58064-vulnerability-in-linux-linux-bde299</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58063-vulnerability-in-linux-linux-bde275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58062-vulnerability-in-linux-linux-bde26d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58061-vulnerability-in-linux-linux-bde265</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58060-vulnerability-in-linux-linux-bde25d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58059-vulnerability-in-linux-linux-bde255</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58058-vulnerability-in-linux-linux-bde251</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58057-vulnerability-in-linux-linux-bde244</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58056-vulnerability-in-linux-linux-bde240</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58055-vulnerability-in-linux-linux-bde22f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58054-vulnerability-in-linux-linux-bde227</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58053-vulnerability-in-linux-linux-bde206</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58052-vulnerability-in-linux-linux-bde202</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58051-vulnerability-in-linux-linux-bde1fe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12146-cwe-89-improper-neutralization-of-s-fc6f3512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12146%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Finder%20Fire%20Safety%20Finder%20ERP%2FCRM%20(New%20System)&amp;severity=high&amp;id=68ee4921509368ccaa72489e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13892-cwe-78-improper-neutralization-of-s-828e91a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13892%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Smartwares%20CIP-37210AT&amp;severity=high&amp;id=68e0f3beb66c7f7acdd3cbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1666-cwe-862-missing-authorization-in-coo-e477885d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1666%3A%20CWE-862%20Missing%20Authorization%20in%20cookiebot%20Cookie%20banner%20plugin%20for%20WordPress%20%E2%80%93%20Cookiebot%20CMP%20by%20Usercentrics&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1383-cwe-352-cross-site-request-forgery-c-c8719fd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1672-cwe-79-improper-neutralization-of-in-bad5cfcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20Notibar%20%E2%80%93%20Notification%20Bar%20for%20WordPress&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13897-cwe-22-improper-limitation-of-a-pat-8739f0a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13897%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20katsushi-kawamori%20Moving%20Media%20Library&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56df21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20931-cwe-122-heap-based-buffer-overflow--119909f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20931%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=high&amp;id=69a0a44f85912abc71d652b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20929-cwe-122-heap-based-buffer-overflow--3b006085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20929%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Samsung%20Mobile%20Samsung%20Notes&amp;severity=high&amp;id=69a0a44d85912abc71d65260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20903-cwe-284-improper-access-control-in--4decc9f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20903%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=69a0a44d85912abc71d6525d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-greynoise-observes-active-exploitation-of-cisco-vulnerabilities-tied-to-salt-typhoon-attacks-2d85d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GreyNoise%20Observes%20Active%20Exploitation%20of%20Cisco%20Vulnerabilities%20Tied%20to%20Salt%20Typhoon%20Attacks&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d85d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-06-2c6900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-06&amp;severity=medium&amp;id=682c7dbde8347ec82d2c6900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-06-f12342</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27516-cwe-1336-improper-neutralization-of-special-elements-used-in-a-template-engine-in-pallets-jinja-bed375</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27516%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20pallets%20jinja&amp;severity=medium&amp;id=682d983ac4522896dcbed375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20206-improper-verification-of-cryptograp-cf44e080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20206%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20Secure%20Client&amp;severity=high&amp;id=69a0a44d85912abc71d6524b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11153-cwe-200-exposure-of-sensitive-infor-49abfc31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11153%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20codeatlantic%20Content%20Control%20%E2%80%93%20The%20Ultimate%20Content%20Restriction%20Plugin!%20Restrict%20Content%2C%20Create%20Conditional%20Blocks%20%26%20More&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11951-cwe-269-improper-privilege-manageme-44a0027f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11951%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Fave%20Themes%20Homey%20Login%20Register&amp;severity=critical&amp;id=699f6e29b7ef31ef0b596fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12281-cwe-269-improper-privilege-manageme-77e9a138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12281%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Fave%20Themes%20Homey&amp;severity=critical&amp;id=699f6e35b7ef31ef0b597c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1702-cwe-89-improper-neutralization-of-sp-e85e1531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1702%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13423-cwe-862-missing-authorization-in-si-d86009c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13423%3A%20CWE-862%20Missing%20Authorization%20in%20silkalns%20Sparkling&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13471-cwe-22-improper-limitation-of-a-pat-aed8a257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13471%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20designthemes%20DesignThemes%20Core%20Features&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1463-cwe-352-cross-site-request-forgery-c-975eb462</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1463%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20javmah%20Spreadsheet%20Integration%20%E2%80%93%20Automate%20Google%20Sheets%20With%20WordPress%2C%20WooCommerce%20%26%20Most%20Popular%20Form%20Plugins.%20Also%2C%20Display%20Google%20sheet%20as%20a%20Table.&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25015-cwe-1321-improperly-controlled-modi-5fa4cc89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25015%3A%20CWE-1321%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Elastic%20Kibana&amp;severity=critical&amp;id=69a0a45985912abc71d662b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13232-cwe-862-missing-authorization-in-dd-8dbc5352</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13232%3A%20CWE-862%20Missing%20Authorization%20in%20ddeveloper%20WordPress%20Awesome%20Import%20%26%20Export%20Plugin%20-%20Import%20%26%20Export%20WordPress%20Data&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59c9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11731-cwe-79-improper-neutralization-of-i-82769296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13747-cwe-862-missing-authorization-in-ci-efceac74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13747%3A%20CWE-862%20Missing%20Authorization%20in%20CidCode%20WooMail%20-%20WooCommerce%20Email%20Customizer&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13815-cwe-94-improper-control-of-generati-722298fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13815%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Themographics%20Listingo&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13810-cwe-862-missing-authorization-in-al-d61fc50c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13810%3A%20CWE-862%20Missing%20Authorization%20in%20AlThemist%20Zass%20-%20WooCommerce%20Theme%20for%20Handmade%20Artists%20and%20Artisans&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13787-cwe-502-deserialization-of-untruste-8b4507bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13787%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20designthemes%20VEDA%20-%20MultiPurpose%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a0942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12815-cwe-79-improper-neutralization-of-i-6e3daadd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zipang%20Point%20Maker&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13809-cwe-89-improper-neutralization-of-s-e28c2b50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13809%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20heroplugins%20Hero%20Slider%20-%20WordPress%20Slider%20Plugin&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1515-cwe-288-authentication-bypass-using--ad45f631</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1515%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Real%20Estate%20Manager&amp;severity=critical&amp;id=699f6b14b7ef31ef0b54de5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13839-cwe-79-improper-neutralization-of-i-ffca881b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richardgabriel%20Staff%20Directory%20Plugin%3A%20Company%20Directory&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56dde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0954-cwe-862-missing-authorization-in-fut-960a5d47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0954%3A%20CWE-862%20Missing%20Authorization%20in%20futuredesigngrp%20WP%20Online%20Contract&amp;severity=medium&amp;id=699f6b6db7ef31ef0b55558a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13778-cwe-89-improper-neutralization-of-s-9ade44e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13778%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20heroplugins%20Hero%20Mega%20Menu%20-%20Responsive%20WordPress%20Menu%20Plugin&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a092e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13811-cwe-862-missing-authorization-in-al-7e6bfdd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13811%3A%20CWE-862%20Missing%20Authorization%20in%20AlThemist%20Lafka%20-%20Multi%20Store%20Burger%20-%20Pizza%20%26%20Food%20Delivery%20WooCommerce%20Theme&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5667-cwe-79-improper-neutralization-of-in-f2a48bd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cipherdevgroup%20WP%20Featherlight%20%E2%80%93%20A%20Simple%20jQuery%20Lightbox&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13757-cwe-79-improper-neutralization-of-i-e4c60a05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a06c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13777-cwe-502-deserialization-of-untruste-2cb3e9ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13777%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=699f6e6fb7ef31ef0b5a092a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13779-cwe-79-improper-neutralization-of-i-10fad7e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heroplugins%20Hero%20Mega%20Menu%20-%20Responsive%20WordPress%20Menu%20Plugin&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a0932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13780-cwe-862-missing-authorization-in-he-0c5fbf57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13780%3A%20CWE-862%20Missing%20Authorization%20in%20heroplugins%20Hero%20Mega%20Menu%20-%20Responsive%20WordPress%20Menu%20Plugin&amp;severity=medium&amp;id=699f6e6fb7ef31ef0b5a0936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0956-cwe-20-improper-input-validation-in--17fd6f3c</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0956%3A%20CWE-20%20Improper%20Input%20Validation%20in%20FantasticPlugins%20WooCommerce%20Recover%20Abandoned%20Cart&amp;severity=high&amp;id=699f6b6db7ef31ef0b555592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13866-cwe-79-improper-neutralization-of-i-109d90e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appsbd%20Simple%20Notification&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1008-cwe-79-improper-neutralization-of-in-a9283caa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1008%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20worldweb%20Recently%20Purchased%20Products%20For%20Woo&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13827-cwe-79-improper-neutralization-of-i-4e341b83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razorpay%20Razorpay%20Subscription%20Button%20Elementor%20Plugin&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13350-cwe-79-improper-neutralization-of-i-b5da2223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20searchiq%20SearchIQ%20%E2%80%93%20The%20Search%20Solution&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8682-cwe-862-missing-authorization-in-htt-7efcc82c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8682%3A%20CWE-862%20Missing%20Authorization%20in%20https%3A%2F%2Fthemeforest.net%2Fitem%2Fjnews-one-stop-solution-for-web-publishing%2F20566392%20JNews%20-%20WordPress%20Newspaper%20Magazine%20Blog%20AMP%20Theme&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0990-cwe-352-cross-site-request-forgery-c-a4a57d18</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webtroniclabs%20I%20Am%20Gloria&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b55562d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1435-cwe-352-cross-site-request-forgery-c-5d20daee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1435%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20johnjamesjacoby%20bbPress&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1919-out-of-bounds-read-in-google-chrome-9685ec21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1919%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1918-out-of-bounds-read-in-google-chrome-4edb04ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1918%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1916-use-after-free-in-google-chrome-547b7da9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1916%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1915-improper-limitation-of-a-pathname-to-a7fdab29</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1915%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44b85912abc71d64b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1914-out-of-bounds-read-in-google-chrome-c7b45108</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1914%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=69a0a44985912abc71d64acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0114-cwe-1244-in-nvidia-nvidia-hopper-hgx-99d9ee02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0114%3A%20CWE-1244%20in%20NVIDIA%20NVIDIA%20Hopper%20HGX%208-GPU&amp;severity=high&amp;id=69a0a43885912abc71d61ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27685-na-19baf12a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27685%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27684-na-cd303ef4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27684%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27683-na-47bbb323</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27683%3A%20n%2Fa&amp;severity=high&amp;id=69091542c28fd46ded7bb2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27682-na-d15ff643</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27682%3A%20n%2Fa&amp;severity=critical&amp;id=69091542c28fd46ded7bb2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27681-na-f002bbbf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27681%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27680-na-d01bdda8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27680%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27679-na-da12a6ff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27679%3A%20n%2Fa&amp;severity=medium&amp;id=69091540c28fd46ded7bb2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27678-na-e6247672</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27678%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27677-na-f0a55e7d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27677%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27675-na-2d3efd41</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27675%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27674-na-83fccdc1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27674%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27657-na-3e50d0af</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27657%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27656-na-4931b0c6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27656%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27655-na-0891e835</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27655%3A%20n%2Fa&amp;severity=critical&amp;id=69091540c28fd46ded7bb28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27652-na-0184774c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27652%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27651-na-bec24f5d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27651%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27650-na-353ef471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27650%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27649-na-727132f0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27649%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27648-na-7348d830</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27648%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27647-na-60b389e0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27647%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27646-na-9e7c0307</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27646%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27645-na-f6561a43</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27645%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bacef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27644-na-bcdf20d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27644%3A%20n%2Fa&amp;severity=high&amp;id=6909153ec28fd46ded7bacea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27643-na-ca422e38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27643%3A%20n%2Fa&amp;severity=critical&amp;id=6909153ec28fd46ded7bace5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27642-na-be15e4b3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27642%3A%20n%2Fa&amp;severity=critical&amp;id=6909153dc28fd46ded7bacd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27641-na-6402c947</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27641%3A%20n%2Fa&amp;severity=critical&amp;id=6909153dc28fd46ded7bacd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27639-na-3212ca4e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27639%3A%20n%2Fa&amp;severity=high&amp;id=6909153dc28fd46ded7baccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27638-na-1d2efea4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27638%3A%20n%2Fa&amp;severity=critical&amp;id=6909153cc28fd46ded7bacc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51144-na-35e015fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51144%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27676-n-a-in-n-a-bf55d8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27676%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27654-n-a-in-n-a-bf55d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27654%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27653-n-a-in-n-a-bf55ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27653%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27637-n-a-in-n-a-bf55c6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27637%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-05-2c5407</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-05&amp;severity=medium&amp;id=682c7dbce8347ec82d2c5407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-05-f12b00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1316-cwe-78-improper-neutralization-of-sp-14f94dfe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1316%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Edimax%20IC-7100%20IP%20Camera&amp;severity=critical&amp;id=68881726ad5a09ad0088bbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1080-cwe-20-improper-input-validation-in--069e723a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1080%3A%20CWE-20%20Improper%20Input%20Validation%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=high&amp;id=690908577fff0e30cee23a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1969-cwe-346-origin-validation-error-in-a-ffccd564</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1969%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20AWS%20Temporary%20Elevated%20Access%20Management%20(TEAM)%20for%20AWS%20IAM%20Identity%20Center&amp;severity=medium&amp;id=68ee9ba2d8f994a66eca601c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23368-improper-restriction-of-excessive-authentication-attempts-bef3d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23368%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts&amp;severity=high&amp;id=682d983dc4522896dcbef3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1943-memory-safety-bugs-fixed-in-firefox--19b5966e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1943%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20136%20and%20Thunderbird%20136%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69a0a44b85912abc71d64b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1938-memory-safety-bugs-fixed-in-firefox--1c753600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1938%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20136%2C%20Thunderbird%20136%2C%20Firefox%20ESR%20128.8%2C%20and%20Thunderbird%20128.8%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a4ac28fd46ded81d081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1937-memory-safety-bugs-fixed-in-firefox--d21749ac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1937%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20136%2C%20Thunderbird%20136%2C%20Firefox%20ESR%20115.21%2C%20Firefox%20ESR%20128.8%2C%20and%20Thunderbird%20128.8%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a4ac28fd46ded81d077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1936-adding-00-and-a-fake-extension-to-a--2df68ca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1936%3A%20Adding%20%2500%20and%20a%20fake%20extension%20to%20a%20jar%3A%20URL%20%20changed%20the%20interpretation%20of%20the%20contents%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a4ac28fd46ded81d06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1935-clickjacking-the-registerprotocolhan-8762297a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1935%3A%20Clickjacking%20the%20registerProtocolHandler%20info-bar%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a4ac28fd46ded81d067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1934-unexpected-gc-during-regexp-bailout--81242f94</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1934%3A%20Unexpected%20GC%20during%20RegExp%20bailout%20processing%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a49c28fd46ded81d051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1933-jit-corruption-of-wasm-i32-return-va-dffe0f6d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1933%3A%20JIT%20corruption%20of%20WASM%20i32%20return%20values%20on%2064-bit%20CPUs%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1932-inconsistent-comparator-in-xslt-sort-e302e30a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1932%3A%20Inconsistent%20comparator%20in%20XSLT%20sorting%20led%20to%20out-of-bounds%20access%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1931-use-after-free-in-webtransportchild--dc85e905</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1931%3A%20Use-after-free%20in%20WebTransportChild%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1939-tapjacking-in-android-custom-tabs-us-c5cf591f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1939%3A%20Tapjacking%20in%20Android%20Custom%20Tabs%20using%20transition%20animations%20in%20Mozilla%20Firefox&amp;severity=low&amp;id=68be1ecce3f0bafba8aa56b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22226-information-disclosure-vulnerabilit-e519b5ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22226%3A%20Information%20disclosure%20vulnerability%20in%20ESXi&amp;severity=high&amp;id=68881727ad5a09ad0088bc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22225-arbitrary-write-vulnerability-in-vm-7f910012</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22225%3A%20Arbitrary%20write%20vulnerability%20in%20VMware%20ESXi&amp;severity=high&amp;id=68881727ad5a09ad0088bc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22224-heap-overflow-vulnerability-in-vmwa-af1dd0c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22224%3A%20Heap-overflow%20vulnerability%20in%20VMware%20ESXi&amp;severity=critical&amp;id=68881727ad5a09ad0088bc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0370-cwe-79-improper-neutralization-of-in-1bd9665d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55524c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0958-cwe-20-improper-input-validation-in--99f5f465</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0958%3A%20CWE-20%20Improper%20Input%20Validation%20in%20nitesh_singh%20Ultimate%20WordPress%20Auction%20Plugin&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b55561c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0433-cwe-79-improper-neutralization-of-in-f890218c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20White%20Label%2C%20Free%20Widgets%2C%20Hover%20Effects%2C%20Conditions%2C%20%26%20Animations&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55526f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13724-cwe-285-improper-authorization-in-w-a2c8fafd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13724%3A%20CWE-285%20Improper%20Authorization%20in%20wpswings%20Wallet%20System%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9618-cwe-79-improper-neutralization-of-in-31afa767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20White%20Label%2C%20Free%20Widgets%2C%20Hover%20Effects%2C%20Conditions%2C%20%26%20Animations&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0512-cwe-79-improper-neutralization-of-in-aefab2ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codemacher%20Structured%20Content%20(JSON-LD)%20%23wpsc&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13682-cwe-352-cross-site-request-forgery--1a310193</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13682%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpswings%20Wallet%20System%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27521-cwe-280-improper-handling-of-insuff-74b80d37</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27521%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=68cc9f1bca83b36a9f700a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1307-cwe-862-missing-authorization-in-spi-605c600e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1307%3A%20CWE-862%20Missing%20Authorization%20in%20spicethemes%20Newscrunch&amp;severity=critical&amp;id=699f6b0fb7ef31ef0b54db0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1306-cwe-352-cross-site-request-forgery-c-4e3c1706</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1306%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20spicethemes%20Newscrunch&amp;severity=high&amp;id=699f6b0fb7ef31ef0b54db01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1639-cwe-862-missing-authorization-in-cro-de62c26a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1639%3A%20CWE-862%20Missing%20Authorization%20in%20crowdyTheme%20Animation%20Addons%20for%20Elementor%20Pro&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1321-cwe-89-improper-neutralization-of-sp-2443a0fa</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1321%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20winkm89%20teachPress&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0912-cwe-502-deserialization-of-untrusted-9f230cbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0912%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20givewp%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6b6cb7ef31ef0b5554da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13686-cwe-862-missing-authorization-in-vo-09fcd7b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13686%3A%20CWE-862%20Missing%20Authorization%20in%20vowelweb%20VW%20Storefront&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26318-cwe-201-insertion-of-sensitive-info-b0a264ee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26318%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20TSplus%20TSplus%20Remote%20Access&amp;severity=medium&amp;id=68ae0f66ad5a09ad005b18c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48248-cwe-36-absolute-path-traversal-in-n-de78952a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48248%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20NAKIVO%20Backup%20%26%20Replication%20Director&amp;severity=high&amp;id=6835fd37182aa0cae21d8deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50706-n-a-in-n-a-bf711f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50706%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf711f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-04-2c58de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-04&amp;severity=medium&amp;id=682c7dbce8347ec82d2c58de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-04-f12b1d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1891-cross-site-request-forgery-in-shishu-62217cbf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1891%3A%20Cross-Site%20Request%20Forgery%20in%20shishuocms&amp;severity=medium&amp;id=68ae12eaad5a09ad005b31a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51962-cwe-89-improper-neutralization-of-s-bc4cdd99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51962%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Esri%20ArcGIS%20Server&amp;severity=high&amp;id=69858a71f9fa50a62fe12649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51954-cwe-284-improper-access-control-in--fc0dde7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51954%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Esri%20ArcGIS%20Server&amp;severity=high&amp;id=69858a71f9fa50a62fe12646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1889-cwe-646-reliance-on-file-name-or-ext-7d2432d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1889%3A%20CWE-646%20Reliance%20on%20File%20Name%20or%20Extension%20of%20Externally-Supplied%20File%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0686-out-of-bounds-write-caa6f37a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0686%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0685-out-of-bounds-write-d02fc793</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0685%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0684-out-of-bounds-write-34043ac1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0684%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=6868be146f40f0eb72a6ac80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0678-integer-overflow-or-wraparound-64958b94</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0678%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=high&amp;id=6868be146f40f0eb72a6ac7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45782-out-of-bounds-write-85cc6e0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45782%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=6916966eb9f11918f9c6af21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45778-integer-overflow-or-wraparound-08345dbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45778%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6916966eb9f11918f9c6af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27423-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-vim-vim-beb7c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27423%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20vim%20vim&amp;severity=high&amp;id=682d9837c4522896dcbeb7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0285-cwe-1287-improper-validation-of-spec-a9be0278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0285%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=high&amp;id=68bad2de5490eb7ab31ac7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0286-cwe-787-out-of-bounds-write-in-parag-8a9244fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0286%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Paragon%20Software%20Partition%20Manager&amp;severity=high&amp;id=68bb425f535f4a97730e4934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0287-cwe-476-null-pointer-dereference-in--20ca53d7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0287%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=medium&amp;id=68bb425f535f4a97730e4939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0288-cwe-131-incorrect-calculation-of-buf-e5bf3850</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0288%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=high&amp;id=68bb425f535f4a97730e493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0289-cwe-1287-improper-validation-of-spec-4ab03247</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0289%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Paragon%20Software%20Migrate%20OS%20to%20SSD&amp;severity=high&amp;id=68bb425f535f4a97730e4943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43169-cwe-494-download-of-code-without-in-c57f5b33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43169%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20IBM%20Engineering%20Requirements%20Management%20DOORS%20Next&amp;severity=high&amp;id=69a0a43d85912abc71d624a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1801-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-c6c685</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1801%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=high&amp;id=682e280cc4522896dcc6c685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45779-integer-overflow-or-wraparound-6ee0c43b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45779%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=6916966eb9f11918f9c6af1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45780-out-of-bounds-write-cbd58763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45780%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=68e0f3bdb66c7f7acdd3cbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0689-buffer-copy-without-checking-size-of-0099afbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0689%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=6868be146f40f0eb72a6ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1125-out-of-bounds-write-53b13c45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1125%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=6868be146f40f0eb72a6ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26994-improper-neutralization-of-input-du-3504e2e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26989-improper-neutralization-of-input-du-6092d4ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26989%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26988-improper-neutralization-of-special--bea987a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26988%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26984-improper-neutralization-of-input-du-9a07d1fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cozy%20Vision%20SMS%20Alert%20Order%20Notifications&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26970-improper-control-of-generation-of-c-26e4504e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26970%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20FRESHFACE%20Ark%20Theme%20Core&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26967-deserialization-of-untrusted-data-i-6a853726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26967%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Stiofan%20Events%20Calendar%20for%20GeoDirectory&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26918-improper-neutralization-of-input-du-6145eb7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26917-improper-neutralization-of-input-du-08ab3d40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20WP%20Templata&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26914-improper-neutralization-of-input-du-0773f284</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bowo%20Variable%20Inspector&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26885-deserialization-of-untrusted-data-i-e50beab7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26885%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Beaver%20Builder%20WordPress%20Assistant&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26879-improper-neutralization-of-input-du-3985698a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27279-improper-neutralization-of-input-du-faeb0f38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lynk%20Flashfader&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deecdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27278-improper-neutralization-of-input-du-f1e0b18e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27278%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Ghedini%20AcuGIS%20Leaflet%20Maps&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deecdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27275-improper-neutralization-of-input-du-d79c7589</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andrew_fisher%20WOO%20Codice%20Fiscale&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecde2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27274-path-traversal-in-axelkeller-gpx-vi-c0b77a95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27274%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20axelkeller%20GPX%20Viewer&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27273-improper-neutralization-of-input-du-9519644b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27273%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20winking%20Affiliate%20Links%20Manager&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27271-improper-neutralization-of-input-du-a9171631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27271%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alberto%20Cocchiara%20DB%20Tables%20Import%2FExport&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27270-missing-authorization-in-enituretec-5485819c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27270%3A%20Missing%20Authorization%20in%20enituretechnology%20Residential%20Address%20Detection&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27269-improper-neutralization-of-input-du-fcc4d076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27269%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anton%20Aleksandrov%20.htaccess%20Login%20block&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27268-improper-neutralization-of-special--64c5d392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27268%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27264-improper-control-of-filename-for-in-ff30d910</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27264%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Creativeitem%20Doctor%20Appointment%20Booking&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27263-improper-neutralization-of-special--6b3e2d58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27263%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Creativeitem%20Doctor%20Appointment%20Booking&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26589-improper-neutralization-of-input-du-8cd1bb0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristopher%20Dino%20IE%20CSS3%20Support&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26588-improper-neutralization-of-input-du-4efcea5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gabrielperezs%20TTT%20Crop&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26587-improper-neutralization-of-input-du-04f01d50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nghorta%20sidebarTabs&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26586-improper-neutralization-of-input-du-4b7758f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abelony%20Events%20Planner&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26585-improper-neutralization-of-input-du-79ad563b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DyadyaLesha%20DL%20Leadback&amp;severity=null&amp;id=69cd72abe6bfc5ba1deec8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26563-improper-neutralization-of-input-du-f46a30a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Muneeb%20Mobile&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26557-improper-neutralization-of-input-du-6142e903</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viperchill%20ViperBar&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26535-improper-neutralization-of-special--94870af4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26535%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeSolz%20Bitcoin%20%2F%20AltCoin%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd729de6bfc5ba1deec64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25170-improper-neutralization-of-input-du-883d27d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25170%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DotsquaresLtd%20Migrate%20Posts&amp;severity=null&amp;id=69cd729de6bfc5ba1deec64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25169-improper-neutralization-of-input-du-a96ad141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25169%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rachel%20Cherry%20Authors%20Autocomplete%20Meta%20Box&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25165-improper-neutralization-of-input-du-5ce649ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25165%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richardgabriel%20Staff%20Directory%20Plugin%3A%20Company%20Directory&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25164-improper-neutralization-of-input-du-9f036337</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25164%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yuichiro%20ABE%20Meta%20Accelerator&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25162-improper-limitation-of-a-pathname-t-fe912d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25162%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kutu62%20Sports%20Rankings%20and%20Lists&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25161-improper-neutralization-of-input-du-df435c75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25161%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SocialEvolution%20WP%20Find%20Your%20Nearest&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25158-improper-neutralization-of-input-du-c893cca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25158%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Antonio%20Sanchez%20Uncomplicated%20SEO&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25157-improper-neutralization-of-input-du-654adc67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25157%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchurchteam%20WP%20Church%20Center&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25150-improper-neutralization-of-special--3433a406</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25150%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25142-improper-neutralization-of-input-du-2ccbc3e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25142%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Jake%20Group%20WP%20Less%20Compiler&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25137-cross-site-request-forgery-csrf-in--95ef8275</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25137%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kareemsultan%20Social%20Links&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25133-improper-neutralization-of-input-du-69bdde5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25133%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20newbiesup%20WP%20Frontend%20Submit&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25132-improper-neutralization-of-input-du-b402ed58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25132%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ravi%20Singh%20Visitor%20Details&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeaced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25131-improper-neutralization-of-input-du-f398b985</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25131%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20randyjensen%20RJ%20Quickcharts&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25130-relative-path-traversal-in-shah-alo-794418d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25130%3A%20Relative%20Path%20Traversal%20in%20Shah%20Alom%20Delete%20Comments%20By%20Status&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeace7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25127-improper-neutralization-of-input-du-9fbb5bbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25127%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rohitashv%20Singhal%20Contact%20Us%20By%20Lord%20Linus&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25124-improper-neutralization-of-input-du-836f32fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25124%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devu%20Status%20Updater&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25122-path-traversal-in-hashshop-wizshop-a0cd9b33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25122%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20hashshop%20WizShop&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25121-cross-site-request-forgery-csrf-in--af578e4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25121%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shyammakwana%20Theme%20Options%20Z&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25119-improper-neutralization-of-input-du-57b21fc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25119%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alejandro%20Aranda%20Woocommerce%20osCommerce%20Sync&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25118-improper-neutralization-of-input-du-9dd94921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25118%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Danish%20Ali%20Malik%20Top%20Bar%20%E2%80%93%20PopUps%20%E2%80%93%20by%20WPOptin&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25115-improper-neutralization-of-input-du-6e6c60bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25115%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zeshan%20Abdullah%20Like%20dislike%20plus%20counter&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25114-improper-neutralization-of-input-du-fc50f92d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25114%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ehabstar%20User%20Role&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25113-improper-neutralization-of-input-du-a8368aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25113%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Senktec%20Implied%20Cookie%20Consent&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25112-improper-neutralization-of-special--2a181919</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25112%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kareemsultan%20Social%20Links&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25109-improper-control-of-filename-for-in-7846a48e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25109%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20JoomSky%20WP%20Vehicle%20Manager&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25108-improper-neutralization-of-input-du-f0e5fd79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25108%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shalomworld%20SW%20Plus&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25102-improper-neutralization-of-input-du-d7e75616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25102%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Harrison%20Yahoo%20BOSS&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25099-improper-neutralization-of-input-du-77fca706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25099%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20accreteinfosolution%20Appointment%20Buddy%20Widget&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeaba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25092-improper-neutralization-of-input-du-28111209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25092%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtlwpdev%20All%20push%20notification%20for%20WP&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25090-cwe-79-improper-neutralization-of-i-d3834b24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25090%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dreamstime%20Dreamstime%20Stock%20Photos&amp;severity=null&amp;id=683ee1ec182aa0cae27396ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25089-improper-neutralization-of-input-du-7b3a5637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25089%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appten%20Image%20Rotator&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25087-improper-neutralization-of-input-du-b0df7952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25087%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20seekXL%20Snapr&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25084-improper-neutralization-of-input-du-9881ef91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25084%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antrouss%20UniTimetable&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25083-improper-neutralization-of-input-du-6e05405a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25083%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dave%20Lavoie%20EP4%20More%20Embeds&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25070-improper-neutralization-of-input-du-444da394</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25070%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ed%20atrero%20Album%20Reviewer&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24758-improper-neutralization-of-input-du-73716060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Map%20Locations&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24694-improper-neutralization-of-input-du-620affff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24694%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Pop-Up%20banners&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23956-improper-neutralization-of-input-du-9a18d15b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Richard%20Leishman%20WP%20Easy%20Post%20Mailer&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23945-improper-control-of-filename-for-in-9008f03d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23945%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Webliup%20Popliup&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23904-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-rebrand-fluent-forms-bd6cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rebrandpress%20Rebrand%20Fluent%20Forms&amp;severity=null&amp;id=682d9816c4522896dcbd6cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23903-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-local-shipping-labels-for-woocommerce-bd6cc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woofx%20Local%20Shipping%20Labels%20for%20WooCommerce&amp;severity=null&amp;id=682d9816c4522896dcbd6cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23883-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-stray-random-quotes-bd6cbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unalignedcoder%20Stray%20Random%20Quotes&amp;severity=null&amp;id=682d9816c4522896dcbd6cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23881-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-lj-custom-menu-links-bd6cba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20littlejon%20LJ%20Custom%20Menu%20Links&amp;severity=null&amp;id=682d9816c4522896dcbd6cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23879-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pillardev-easy-automatic-newsletter-lite-bd6cb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PillarDev%20Easy%20Automatic%20Newsletter%20Lite&amp;severity=null&amp;id=682d9816c4522896dcbd6cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23852-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-first-comment-redirect-bd6d86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robin90%20First%20Comment%20Redirect&amp;severity=null&amp;id=682d9816c4522896dcbd6d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23850-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-mojo-under-construction-bd6d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mojowill%20Mojo%20Under%20Construction&amp;severity=null&amp;id=682d9816c4522896dcbd6d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23847-improper-neutralization-of-input-du-b29fbb51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saill%20Site%20Launcher&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23843-improper-neutralization-of-input-du-63dcbc0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23843%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphrmanager%20WP-HR%20Manager%3A%20The%20Human%20Resources%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23829-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-woo-update-variations-in-cart-bd6d74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23829%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codingkart%20Woo%20Update%20Variations%20In%20Cart&amp;severity=null&amp;id=682d9816c4522896dcbd6d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23814-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-notfound-crudlab-like-box-bd6d70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23814%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRUDLab%20CRUDLab%20Like%20Box&amp;severity=null&amp;id=682d9816c4522896dcbd6d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23813-improper-neutralization-of-input-du-942a0f09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tony%20Hayes%20Guten%20Free%20Options&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23762-improper-neutralization-of-input-du-58544e14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Sternberg%20DsgnWrks%20Twitter%20Importer&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23753-improper-neutralization-of-input-du-6c7c8cba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23753%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digireturn%20DN%20Sitemap%20Control&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23741-improper-neutralization-of-input-du-61b28f4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Florian%20Chaillou%20Notifications%20Center&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23740-improper-neutralization-of-input-du-a8dce8b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zbynek%20Nedoma%20Easy%20School%20Registration&amp;severity=null&amp;id=69cd722be6bfc5ba1dee850d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23739-improper-neutralization-of-input-du-9bcb76fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23739%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtibbles%20WP%20Ultimate%20Reviews%20FREE&amp;severity=null&amp;id=69cd722be6bfc5ba1dee850a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23738-improper-neutralization-of-input-du-06492c6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Padam%20Shankhadev%20Ps%20Ads%20Pro&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23736-improper-neutralization-of-input-du-63bbb48f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23736%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webgdawg%20Form%20To%20JSON&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23731-improper-neutralization-of-input-du-360441cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosoftplugin%20Tax%20Report%20for%20WooCommerce&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23726-improper-neutralization-of-input-du-097cb2c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23726%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thebloghouse%20ComparePress&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23721-improper-neutralization-of-input-du-0ab2e5e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cloudvn%20Mobigate&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee8403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23718-improper-neutralization-of-input-du-1f843f4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mancx%20Mancx%20AskMe%20Widget&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee83fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23716-improper-neutralization-of-input-du-897e2f11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23716%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JkmAS%20Login%20Watchdog&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23688-improper-neutralization-of-input-du-4a44ad5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23688%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20editionskezzal%20Cobwebo%20URL%20Plugin&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23670-improper-neutralization-of-input-du-d460664b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20montashov%204%20author%20cheer%20up%20donate&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23668-improper-neutralization-of-input-du-7d188761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mauricio%20Urrego%20ChatGPT%20Open%20AI%20Images%20%26%20Content%20for%20WooCommerce&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23663-improper-neutralization-of-input-du-6a67f5d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23663%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Vaquez%20Contexto&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0aebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23637-improper-neutralization-of-input-du-04cac78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fxy060608%20%E6%96%B0%E6%B7%98%E5%AE%A2WordPress%E6%8F%92%E4%BB%B6&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23635-improper-neutralization-of-input-du-6f1ee8e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mobde3net%20ePermissions&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23619-improper-neutralization-of-input-du-a1c122b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23619%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Catch%20Themes%20Catch%20Duplicate%20Switcher&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23616-improper-neutralization-of-input-du-474f8f0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Canalplan&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23615-missing-authorization-in-gtekelis-i-06d33255</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23615%3A%20Missing%20Authorization%20in%20gtekelis%20Interactive%20Page%20Hierarchy&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23613-missing-authorization-in-mediabeta--7fe50bff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23613%3A%20Missing%20Authorization%20in%20mediabeta%20WP%20Journal&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0abdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23600-improper-neutralization-of-input-du-563134d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23600%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pinal.shah%20Send%20to%20a%20Friend%20Addon&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23595-improper-neutralization-of-input-du-60021f92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainpulse%20Page%20Health-O-Meter&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23587-improper-neutralization-of-input-du-652643ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ashek%20Al%20Mahmud%20all-in-one-box-login&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23586-improper-neutralization-of-input-du-a7c0c429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MAL73049%20WP%20Post%20Category%20Notifications&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23585-improper-neutralization-of-input-du-66457e0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CantonBolo%20Goo.gl%20Url%20Shorter&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23584-improper-neutralization-of-input-du-6cc8599c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arsh91%20Pin%20Locations%20on%20Map&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23579-improper-neutralization-of-input-du-c3446b6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20DZS%20Ajaxer%20Lite&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23576-improper-neutralization-of-input-du-de8ad9e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cfuze%20WP%20Intro.JS&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23575-improper-neutralization-of-input-du-136a9b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevriX%20DX%20Sales%20CRM&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23570-improper-neutralization-of-input-du-27eca3a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mitchell%20Bundy%20WP%20Social%20Links&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23565-improper-neutralization-of-input-du-4fc2d13b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Taylor%20Wibstats&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23564-improper-neutralization-of-input-du-913513a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohsenshahbazi%20WP%20FixTag&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23563-improper-neutralization-of-input-du-623c0d2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mbyte%20Explore%20pages&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23556-improper-neutralization-of-input-du-43bed377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netbitsolutions%20Push%20Envoy%20Notifications&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23555-improper-neutralization-of-input-du-a41ab539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23555%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chenyenming%20Ui%20Slider%20Filter%20By%20Price&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23553-improper-neutralization-of-input-du-7f3c89fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Cramer%20Userbase%20Access%20Control&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23552-improper-neutralization-of-input-du-215e98f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yashar%20Texteller&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23549-improper-neutralization-of-input-du-b3e49716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agora32%20Maniac%20SEO&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23539-improper-neutralization-of-input-du-9683836a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surror%20Awesome%20Hooks&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23538-improper-neutralization-of-input-du-644ca994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sophia%20M%20Williams%20WP%20Contest&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23536-improper-neutralization-of-input-du-a930500c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mndpsingh287%20Track%20Page%20Scroll&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23526-improper-neutralization-of-input-du-06949b9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23526%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SwiftCloud%20Swift%20Calendar%20Online%20Appointment%20Scheduling&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23524-improper-neutralization-of-input-du-ce6a00bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dactum%20ClickBank%20Storefront&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23521-improper-neutralization-of-input-du-b86e23f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Blocks&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23519-improper-neutralization-of-input-du-3f723950</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jas%20Saran%20G%20Web%20Pro%20Store%20Locator&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23518-improper-neutralization-of-input-du-79f9c3dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrsaucier%20GoogleMapper&amp;severity=null&amp;id=69cd7633e6bfc5ba1df0a6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23517-improper-neutralization-of-input-du-b9352817</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sunil%20chaulagain%20Google%20Map%20on%20Post%2FPage&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23516-improper-neutralization-of-input-du-8c550884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Sale%20with%20Razorpay&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23515-missing-authorization-in-tsecher-ts-92c95331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23515%3A%20Missing%20Authorization%20in%20tsecher%20ts-tree&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23505-improper-neutralization-of-input-du-aa5e9d28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pantho%20Bihosh%20Pit%20Login%20Welcome&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23502-cross-site-request-forgery-csrf-in--0f25400b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23502%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ned%20Curated%20Search&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23496-improper-neutralization-of-input-du-07aebc23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23496%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husani%20WP%20FPO&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23494-improper-neutralization-of-input-du-00b23121</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23494%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binnyva%20Quizzin&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23493-improper-neutralization-of-input-du-c839ffa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moallemi%20Google%20Transliteration&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23490-improper-neutralization-of-input-du-ef0a735b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23490%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Stursberg%20Browser-Update-Notify&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23488-improper-neutralization-of-input-du-fab41a84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23488%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abolfazl%20Sabagh%20rng-refresh&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23487-improper-neutralization-of-input-du-e2a39dfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20odihost%20Easy%20Gallery&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23485-improper-neutralization-of-input-du-d7a1bc9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23485%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richestsoft%20RS%20Survey&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23484-improper-neutralization-of-input-du-42781e12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23484%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cojecto%20Predict%20When&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23482-improper-neutralization-of-input-du-00f3d261</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azurecurve%20azurecurve%20Floating%20Featured%20Image&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23481-improper-neutralization-of-input-du-a20aa18c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23481%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Sales%20Report%20Email&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23480-improper-neutralization-of-input-du-77177837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23480%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MicahBlu%20RSVP%20ME&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23478-improper-neutralization-of-input-du-7ef809d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23478%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmsaccount%20Photo%20Video%20Store&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23473-improper-neutralization-of-input-du-9be7f38c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23473%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Punit%20Bhalodiya%20Killer%20Theme%20Options&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23472-improper-neutralization-of-input-du-9509115d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexostudio%20Flexo%20Slider&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23468-improper-neutralization-of-input-du-78f24841</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23468%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wrenchpilot%20Essay%20Wizard%20(wpCRES)&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0987f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23465-improper-neutralization-of-input-du-9326395e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magent%20Vampire%20Character%20Manager&amp;severity=null&amp;id=69cd761ae6bfc5ba1df097af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23464-improper-neutralization-of-input-du-e125caaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Keir%20Whitaker%20Twitter%20News%20Feed&amp;severity=null&amp;id=69cd761ae6bfc5ba1df097ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23451-improper-neutralization-of-input-du-5884ed35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20titodevera%20Awesome%20Twitter%20Feeds&amp;severity=null&amp;id=69cd7619e6bfc5ba1df09700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23450-improper-neutralization-of-input-du-3ec66deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23450%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20agenwebsite%20AW%20WooCommerce%20Kode%20Pembayaran&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23447-improper-neutralization-of-input-du-8816508f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23447%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kundan%20Yevale%20Smooth%20Dynamic%20Slider&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23446-cross-site-request-forgery-csrf-in--a88f0c7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23446%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20KokoenDE%20WP%20SpaceContent&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23441-improper-neutralization-of-input-du-afac91bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dkukral%20Attach%20Gallery%20Posts&amp;severity=null&amp;id=69cd7616e6bfc5ba1df0962f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23440-missing-authorization-in-radicaldes-7b483d68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23440%3A%20Missing%20Authorization%20in%20radicaldesigns%20radSLIDE&amp;severity=null&amp;id=69cd7616e6bfc5ba1df0962c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23439-improper-neutralization-of-input-du-f09cdf19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23439%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20willshouse%20TinyMCE%20Extended%20Config&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23437-improper-neutralization-of-input-du-ee3c6820</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nord_tramper%20ntp-header-images&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23433-improper-neutralization-of-input-du-2fc03fe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jnwry%20vcOS&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23425-improper-neutralization-of-input-du-9b86c3ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23425%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marekki%20Marekkis%20Watermark&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26999-deserialization-of-untrusted-data-i-ad4d9174</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26999%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21424-cwe-416-use-after-free-in-qualcomm--f660a8cf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21424%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a45185912abc71d6564d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53034-cwe-822-untrusted-pointer-dereferen-14c9b5b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53034%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53033-cwe-822-untrusted-pointer-dereferen-b04e521e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53033%3A%20CWE-822%20Untrusted%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d6437d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53032-cwe-367-time-of-check-time-of-use-t-8a833278</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53032%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53031-cwe-20-improper-input-validation-in-ab529f39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53031%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53030-cwe-20-improper-input-validation-in-76a354dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53030%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d64371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53029-cwe-20-improper-input-validation-in-2cb3d5a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53029%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53028-cwe-367-time-of-check-time-of-use-t-5293fe1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53028%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53024-cwe-476-null-pointer-dereference-in-71e31243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53024%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53023-cwe-416-use-after-free-in-qualcomm--cff7df8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53023%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53022-cwe-20-improper-input-validation-in-05f07db9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53022%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44685912abc71d642c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53014-cwe-129-improper-validation-of-arra-efa3d5af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53014%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53012-cwe-20-improper-input-validation-in-4d01e572</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53012%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53011-cwe-264-permissions-privileges-and--42d38051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53011%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49836-cwe-129-improper-validation-of-arra-26552a53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49836%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d6312e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45580-cwe-416-use-after-free-in-qualcomm--bfc4a6c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45580%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a43f85912abc71d63036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24654-missing-authorization-in-seo-squirr-a22d7118</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24654%3A%20Missing%20Authorization%20in%20SEO%20Squirrly%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20650-cwe-787-out-of-bounds-write-in-medi-036660ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20650%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6781%2C%20MT6789%2C%20MT6835%2C%20MT6855%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6886%2C%20MT6890%2C%20MT6895%2C%20MT6897%2C%20MT6980%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990%2C%20MT8370%2C%20MT8390%2C%20MT8676%2C%20MT8678&amp;severity=medium&amp;id=69a0a44d85912abc71d6525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20647-cwe-476-null-pointer-dereference-in-7a13ced4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20647%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=6994829080d747be20bad139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20646-cwe-787-out-of-bounds-write-in-medi-8ca6b954</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20646%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6890%2C%20MT7915%2C%20MT7916%2C%20MT7981%2C%20MT7986&amp;severity=critical&amp;id=69a0a44d85912abc71d65257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20645-cwe-787-out-of-bounds-write-in-medi-15057bf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20645%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6765%2C%20MT6768%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6879%2C%20MT6886%2C%20MT6893%2C%20MT6897%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT8796&amp;severity=high&amp;id=69a0a44d85912abc71d65254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20644-cwe-1286-syntactic-correctness-in-m-b84d2e46</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20644%3A%20CWE-1286%20Syntactic%20Correctness%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6833%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT8673%2C%20MT8791T%2C%20MT8795T%2C%20MT8798&amp;severity=medium&amp;id=6994829080d747be20bad136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25952-na-bcfc49d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25952%3A%20n%2Fa&amp;severity=medium&amp;id=693c347d2e981ee9614b5bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25951-na-562aff23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25951%3A%20n%2Fa&amp;severity=high&amp;id=693c347d2e981ee9614b5baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25950-na-77c454a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25950%3A%20n%2Fa&amp;severity=high&amp;id=693c347d2e981ee9614b5baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25949-na-d2e08919</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25949%3A%20n%2Fa&amp;severity=medium&amp;id=693c347d2e981ee9614b5ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25948-na-91c26d32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25948%3A%20n%2Fa&amp;severity=critical&amp;id=693c347d2e981ee9614b5ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27220-cwe-1333-inefficient-regular-expres-e947e271</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27220%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20ruby-lang%20CGI&amp;severity=medium&amp;id=69091e18c28fd46ded86988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27219-cwe-770-allocation-of-resources-wit-a1c4600e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27219%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ruby-lang%20CGI&amp;severity=medium&amp;id=69091e18c28fd46ded869889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27221-cwe-212-improper-removal-of-sensiti-767844f8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27221%3A%20CWE-212%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20ruby-lang%20URI&amp;severity=low&amp;id=6909153cc28fd46ded7bacb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25953-n-a-in-n-a-bf5565</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25953%3A%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27371-cwe-305-authentication-bypass-by-primary-weakness-in-ietf-rfc-7523-bf04a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27371%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20IETF%20RFC%207523&amp;severity=medium&amp;id=682d983fc4522896dcbf04a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27370-cwe-305-authentication-bypass-by-primary-weakness-in-openid-openid-connect-bf04a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27370%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OpenID%20OpenID%20Connect&amp;severity=medium&amp;id=682d983fc4522896dcbf04a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-03-2c6d33</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-03&amp;severity=medium&amp;id=682c7dbde8347ec82d2c6d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-03-f12956</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa25-071a-stop-ransomware-medusa-ransomware-f0c542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA25-071A%20Stop%20Ransomware%3A%20Medusa%20Ransomware&amp;severity=low&amp;id=682acdbebbaf20d303f0c542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36353-cwe-459-incomplete-cleanup-in-amd-a-7cc7f3cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36353%3A%20CWE-459%20%20Incomplete%20Cleanup%20in%20AMD%20AMD%20Ryzen%E2%84%A2%204000%20Series%20Mobile%20Processors%20with%20Radeon%E2%84%A2%20Graphics&amp;severity=medium&amp;id=68ee8c743dd1bfb0b7f039ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0895-cwe-215-insertion-of-sensitive-infor-78f79487</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0895%3A%20CWE-215%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20IBM%20Cognos%20Analytics%20Mobile&amp;severity=low&amp;id=68b4f7b8ad5a09ad00c726ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49733-vulnerability-in-linux-linux-be49c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-02-2c61c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-02&amp;severity=medium&amp;id=682c7dbde8347ec82d2c61c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-02-f1224a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f1224a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1491-cwe-79-improper-neutralization-of-in-48ef3fad</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teastudiopl%20WP%20Posts%20Carousel&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13833-cwe-502-deserialization-of-untruste-2586027e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13833%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Album%20Gallery%20%E2%80%93%20WordPress%20Gallery&amp;severity=high&amp;id=699f6d17b7ef31ef0b56dd79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1404-cwe-862-missing-authorization-in-ays-fc2ee6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1404%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13546-cwe-200-exposure-of-sensitive-infor-0be33cb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13546%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13910-cwe-22-improper-limitation-of-a-pat-e924c193</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13910%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sminozzi%20Database%20Backup%20and%20check%20Tables%20Automated%20With%20Scheduler%202024&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13697-cwe-918-server-side-request-forgery-6136dd96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13697%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%20for%20WordPress%2C%20BuddyPress%2C%20PeepSo%2C%20Ultimate%20Member%2C%20BuddyBoss&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a0270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1291-cwe-79-improper-neutralization-of-in-4c286301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1291%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6b0fb7ef31ef0b54daf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13611-cwe-200-exposure-of-sensitive-infor-b97257d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13611%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%20for%20WordPress%2C%20BuddyPress%2C%20PeepSo%2C%20Ultimate%20Member%2C%20BuddyBoss&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fcc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12544-cwe-862-missing-authorization-in-de-897d18a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12544%3A%20CWE-862%20Missing%20Authorization%20in%20devsoftbaltic%20SurveyJS%3A%20Drag%20%26%20Drop%20WordPress%20Form%20Builder%20to%20create%2C%20style%20and%20embed%20multiple%20forms%20of%20any%20complexity&amp;severity=high&amp;id=699f6e41b7ef31ef0b59bc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13806-cwe-94-improper-control-of-generati-5bc976bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13806%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpkube%20Authors%20List&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13911-cwe-200-exposure-of-sensitive-infor-12bfed0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13911%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sminozzi%20Database%20Backup%20and%20check%20Tables%20Automated%20With%20Scheduler%202024&amp;severity=high&amp;id=699f6d1bb7ef31ef0b56dfdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1564-cwe-288-authentication-bypass-using--275c3222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1564%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Select-Themes%20SetSail%20Membership&amp;severity=critical&amp;id=699f6b15b7ef31ef0b54def7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1671-cwe-288-authentication-bypass-using--4c4e81c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1671%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Elated-Themes%20Academist%20Membership&amp;severity=critical&amp;id=699f6b17b7ef31ef0b54e02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1638-cwe-288-authentication-bypass-using--f4d59d17</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1638%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Edge-Themes%20Alloggio%20Membership&amp;severity=critical&amp;id=699f6b16b7ef31ef0b54df78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1459-cwe-79-improper-neutralization-of-in-0126df48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1730-cwe-73-external-control-of-file-name-8a0240e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1730%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20specialk%20Simple%20Download%20Counter&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1502-cwe-862-missing-authorization-in-ip2-3154ca82</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1502%3A%20CWE-862%20Missing%20Authorization%20in%20ip2location%20IP2Location%20Redirection&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13373-cwe-620-unverified-password-change--cac17f42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13373%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20Exertio%20Framework&amp;severity=high&amp;id=699f6e52b7ef31ef0b59e3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12824-cwe-620-unverified-password-change--d3090196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12824%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20Nokri%20%E2%80%93%20Job%20Board%20WordPress%20Theme&amp;severity=critical&amp;id=699f6e48b7ef31ef0b59c4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13901-cwe-79-improper-neutralization-of-i-f7fc94b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcalc%20Counter%20Box%3A%20Add%20Engaging%20Countdowns%2C%20Timers%20%26%20Counters%20to%20Your%20WordPress%20Site&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9212-cwe-79-improper-neutralization-of-in-eadb91d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20SKU%20Generator%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13559-cwe-79-improper-neutralization-of-i-082d854b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marsian%20TemplatesNext%20ToolKit&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13518-cwe-352-cross-site-request-forgery--42cd0b9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20simplepress%20Simple%3APress%20Forum&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13750-cwe-89-improper-neutralization-of-s-c9aaf672</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13750%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20prismitsystems%20Multilevel%20Referral%20Affiliate%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13746-cwe-862-missing-authorization-in-im-1748795a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13746%3A%20CWE-862%20Missing%20Authorization%20in%20imznarf%20Booking%20Calendar%20and%20Notification&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9217-cwe-79-improper-neutralization-of-in-be469367</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9217%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwham%20Currency%20Switcher%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0820-cwe-79-improper-neutralization-of-in-8c4d5488</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clicface%20Clicface%20Trombi&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13568-cwe-200-exposure-of-sensitive-infor-b3fe4a84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13568%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20techjewel%20Fluent%20Support%20%E2%80%93%20Helpdesk%20%26%20Customer%20Support%20Ticket%20System&amp;severity=high&amp;id=699f6e61b7ef31ef0b59f417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1780-cwe-862-missing-authorization-in-sve-f04c7fc3</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1780%3A%20CWE-862%20Missing%20Authorization%20in%20svenl77%20BuddyPress%20WooCommerce%20My%20Account%20Integration.%20Create%20WooCommerce%20Member%20Pages&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13358-cwe-862-missing-authorization-in-sv-cc2173c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13358%3A%20CWE-862%20Missing%20Authorization%20in%20svenl77%20BuddyPress%20WooCommerce%20My%20Account%20Integration.%20Create%20WooCommerce%20Member%20Pages&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-01-2c7936</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-01&amp;severity=medium&amp;id=682c7dbde8347ec82d2c7936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-03-01-f12461</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-03-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26466-allocation-of-resources-without-lim-1c6a4ace</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26466%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=6835dda5182aa0cae2186687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0159-cwe-288-authentication-bypass-using--b5703286</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0159%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20IBM%20Storage%20Virtualize&amp;severity=critical&amp;id=69a0a1b985912abc71d0a0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1795-vulnerability-in-python-software-fou-c4694068</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1795%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=low&amp;id=6908cdd1bdcf00867c4fc65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0985-cwe-526-cleartext-storage-of-sensiti-0f7bd1ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0985%3A%20CWE-526%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable%20in%20IBM%20MQ&amp;severity=medium&amp;id=68ae12eaad5a09ad005b3199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27400-cwe-79-improper-neutralization-of-i-e300f188</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27400%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OpenMage%20magento-lts&amp;severity=low&amp;id=68502ef4a8c9212743843bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1319-cwe-79-improper-neutralization-of-in-7dcfda90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Site%20Mailer%20%E2%80%93%20SMTP%20Replacement%2C%20Email%20API%20Deliverability%20%26%20Email%20Log&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54db90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10860-cwe-862-missing-authorization-in-xl-56b12e74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10860%3A%20CWE-862%20Missing%20Authorization%20in%20xlplugins%20NextMove%20Lite%20%E2%80%93%20Thank%20You%20Page%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1413-cwe-732-incorrect-permission-assignm-b01dc190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1413%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Blackmagic%20Design%20Inc%20DaVinci%20Resolve&amp;severity=high&amp;id=68dffc4fb7ee07964d95f62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22491-cwe-79-improper-neutralization-of-i-30e92a5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Eaton%20Foreseer%20Reporting%20Software%20(FRS)&amp;severity=medium&amp;id=68ad8d4dad5a09ad005730d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8420-cwe-266-incorrect-privilege-assignme-6c992a83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8420%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20SiteSao%20DHVC%20Form&amp;severity=critical&amp;id=699f6c28b7ef31ef0b560929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13851-cwe-79-improper-neutralization-of-i-b86ac635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20evigeo%20Modal%20Portfolio&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9195-cwe-862-missing-authorization-in-cre-1c398882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9195%3A%20CWE-862%20Missing%20Authorization%20in%20creativeon%20WHMCS%20Client%20Area%20for%20WordPress%20by%20WHMpress&amp;severity=high&amp;id=699f6b43b7ef31ef0b550989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1662-cwe-918-server-side-request-forgery--fef90f2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1662%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20apprhyme%20URL%20Media%20Uploader&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1570-cwe-640-weak-password-recovery-mecha-e4877170</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1570%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%20Plugin%20with%20Classified%20Ads%20Listings&amp;severity=high&amp;id=699f6b15b7ef31ef0b54defb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13638-cwe-200-exposure-of-sensitive-infor-59e5651f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13638%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sldesignpl%20Order%20Attachments%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13831-cwe-502-deserialization-of-untruste-e33d4a2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13831%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpbranch%20Tabs%20for%20WooCommerce&amp;severity=high&amp;id=699f6d17b7ef31ef0b56dd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8425-cwe-434-unrestricted-upload-of-file--04a12499</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8425%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Swings%20WooCommerce%20Ultimate%20Gift%20Card&amp;severity=critical&amp;id=699f6c28b7ef31ef0b56092d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9193-cwe-98-improper-control-of-filename--b29728f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9193%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20creativeon%20WHMpress%20-%20WHMCS%20WordPress%20Integration%20Plugin&amp;severity=critical&amp;id=699f6b43b7ef31ef0b550985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9019-cwe-79-improper-neutralization-of-in-764b794f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9019%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20secupress%20SecuPress%20Free%20%E2%80%94%20WordPress%20Security&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13469-cwe-79-improper-neutralization-of-i-926cfd9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Pricing%20Table%20by%20PickPlugins&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ec16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13716-cwe-862-missing-authorization-in-ta-a9a0ed77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13716%3A%20CWE-862%20Missing%20Authorization%20in%20tarborali%20Forex%20Calculators&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13832-cwe-639-authorization-bypass-throug-8bdf7871</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13832%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20uncodethemes%20Ultra%20Addons%20Lite%20for%20Elementor&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1560-cwe-79-improper-neutralization-of-in-e0abebe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darkosxrc%20WOW%20Entrance%20Effects%20(WEE!)&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54deed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1572-cwe-89-improper-neutralization-of-sp-620f984f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1572%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1571-cwe-79-improper-neutralization-of-in-a4df7e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1571%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b16b7ef31ef0b54df6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1405-cwe-79-improper-neutralization-of-in-d108d972</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20implecode%20Product%20Catalog%20Simple&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0764-cwe-20-improper-input-validation-in--f2b0b84c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0764%3A%20CWE-20%20Improper%20Input%20Validation%20in%20tomdever%20wpForo%20Forum&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1506-cwe-352-cross-site-request-forgery-c-d13c8379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1506%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xpeedstudio%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12820-cwe-79-improper-neutralization-of-i-5470439e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12820%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manoj_rana91986%20MK%20Google%20Directions&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1513-cwe-79-improper-neutralization-of-in-ebaeb295</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contest-gallery%20Photos%2C%20Files%2C%20YouTube%2C%20Twitter%2C%20Instagram%2C%20TikTok%2C%20Ecommerce%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%2C%20Sell%20via%20PayPal%20or%20Stripe%2C%20Social%20Share%20Buttons&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1511-cwe-79-improper-neutralization-of-in-913cc173</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%26%20Membership%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54de4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0801-cwe-352-cross-site-request-forgery-c-6a4d356b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0801%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ratemyagent%20RateMyAgent%20Official&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b5553a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1505-cwe-79-improper-neutralization-of-in-18cba8e5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20berocket%20Advanced%20AJAX%20Product%20Filters&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1757-cwe-79-improper-neutralization-of-in-de626bd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20portfoliohub%20WordPress%20Portfolio%20Builder%20%E2%80%93%20Portfolio%20Gallery&amp;severity=medium&amp;id=699f6b19b7ef31ef0b54e14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13796-cwe-200-exposure-of-sensitive-infor-93f616c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13796%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pickplugins%20Post%20Grid%20and%20Gutenberg%20Blocks%20%E2%80%93%20ComboBlocks&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56340-cwe-23-relative-path-traversal-in-i-12db0fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56340%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=68f2616f9c34d0947f2ce855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0975-cwe-150-improper-neutralization-of-e-144ed766</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0975%3A%20CWE-150%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences%20in%20IBM%20MQ&amp;severity=high&amp;id=69a0a1b985912abc71d0a0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25635-na-6fc862c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25635%3A%20n%2Fa&amp;severity=high&amp;id=68b71529ad5a09ad00e372a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-28-2c7318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-28&amp;severity=medium&amp;id=682c7dbde8347ec82d2c7318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-28-f12645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12811-cwe-98-improper-control-of-filename-a5e72783</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12811%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1687-cwe-352-cross-site-request-forgery-c-dc00a823</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1687%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1682-cwe-862-missing-authorization-in-the-323e3112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1682%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1681-cwe-862-missing-authorization-in-the-aa0da4b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1681%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21824-vulnerability-in-linux-linux-be8915</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21823-vulnerability-in-linux-linux-be8911</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21822-vulnerability-in-linux-linux-be890d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe890d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21821-vulnerability-in-linux-linux-be8909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21820-vulnerability-in-linux-linux-be8905</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21819-vulnerability-in-linux-linux-be8901</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21817-vulnerability-in-linux-linux-be88fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21816-vulnerability-in-linux-linux-bdd35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21815-vulnerability-in-linux-linux-be88f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21814-vulnerability-in-linux-linux-be88f5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21813-vulnerability-in-linux-linux-be88f3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21812-vulnerability-in-linux-linux-bdd357</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21811-vulnerability-in-linux-linux-be88d3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21810-vulnerability-in-linux-linux-be88cb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21809-vulnerability-in-linux-linux-bdd34f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21808-vulnerability-in-linux-linux-be88c3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21807-vulnerability-in-linux-linux-be88bf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21806-vulnerability-in-linux-linux-be88bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21805-vulnerability-in-linux-linux-be88aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe88aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21804-vulnerability-in-linux-linux-be88a2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe88a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21803-vulnerability-in-linux-linux-be889e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe889e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21802-vulnerability-in-linux-linux-bdd338</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21801-vulnerability-in-linux-linux-be889a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe889a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21800-vulnerability-in-linux-linux-be8889</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21799-vulnerability-in-linux-linux-be886e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe886e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21798-vulnerability-in-linux-linux-be8866</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58042-vulnerability-in-linux-linux-bde1ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58034-vulnerability-in-linux-linux-bde1e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58022-vulnerability-in-linux-linux-bde1df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22624-cwe-79-improper-neutralization-of-i-d382ebe1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20FooGallery%20-%20Responsive%20Photo%20Gallery%2C%20Image%20Viewer%2C%20Justified%2C%20Masonry%20%26%20Carousel&amp;severity=medium&amp;id=6863cffd6f40f0eb728f46a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23687-improper-neutralization-of-input-du-a8cbb75f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simonhunter%20Woo%20Store%20Mode&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22280-missing-authorization-in-revmakx-de-7606ed9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22280%3A%20Missing%20Authorization%20in%20revmakx%20DefendWP%20Firewall&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13402-cwe-79-improper-neutralization-of-i-9a4454ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13402%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Boss%20Media%20Buddyboss%20Platform&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13217-cwe-359-exposure-of-private-persona-432dae5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13217%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1450-cwe-79-improper-neutralization-of-in-f2ab801a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20galdub%20Floating%20Chat%20Widget%3A%20Contact%20Chat%20Icons%2C%20Telegram%20Chat%2C%20Line%20Messenger%2C%20WeChat%2C%20Email%2C%20SMS%2C%20Call%20Button%2C%20WhatsApp%20%E2%80%93%20Chaty&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13734-cwe-79-improper-neutralization-of-i-1f537515</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techeshta%20Card%20Elements%20for%20Elementor&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a053b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1282-cwe-22-improper-limitation-of-a-path-8b66bfe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1282%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ThemeMakers%20Car%20Dealer%20Automotive%20WordPress%20Theme%20%E2%80%93%20Responsive&amp;severity=high&amp;id=699f6b0eb7ef31ef0b54da71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1690-cwe-79-improper-neutralization-of-in-da379dd8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20ThemeMakers%20Stripe%20Checkout&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1717-cwe-288-authentication-bypass-using--dc2fd08a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1717%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20pluginly%201%20click%20passwordless%20login%2C%20temporary%20login%2C%20social%20login%20%26%20user%20switching%20%E2%80%93%20Login%20Me%20Now&amp;severity=high&amp;id=699f6b17b7ef31ef0b54e0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1689-cwe-79-improper-neutralization-of-in-7d6dc477</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1689%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeMakers%20ThemeMakers%20PayPal%20Express%20Checkout&amp;severity=medium&amp;id=699f6b17b7ef31ef0b54e09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13907-cwe-918-server-side-request-forgery-f76b99a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13907%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2297-cwe-269-improper-privilege-managemen-394c381e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2297%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Bricks%20Builder%20Bricks&amp;severity=high&amp;id=699f6dacb7ef31ef0b58a81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6261-cwe-79-improper-neutralization-of-in-29217e9b</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpchill%20Image%20Photo%20Gallery%20Final%20Tiles%20Grid&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1295-cwe-269-improper-privilege-managemen-75b36694</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1295%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Templines%20Templines%20Elementor%20Helper%20Core&amp;severity=high&amp;id=699f6b0fb7ef31ef0b54dafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1686-external-control-of-file-name-or-pat-d4bb9b2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1686%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20io.pebbletemplates%3Apebble&amp;severity=medium&amp;id=694579a3133fda1465c274c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13905-cwe-918-server-side-request-forgery-5d9ffd7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13905%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20sainwp%20OneStore%20Sites&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13647-cwe-352-cross-site-request-forgery--f3575f74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13647%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themesawesome%20School%20Management%20System%20%E2%80%93%20SakolaWP&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fdf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0469-cwe-79-improper-neutralization-of-in-d7754650</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55527a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21797-vulnerability-in-linux-linux-be8862</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21796-vulnerability-in-linux-linux-be885e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe885e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21795-vulnerability-in-linux-linux-be884d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe884d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21794-vulnerability-in-linux-linux-be8849</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21793-vulnerability-in-linux-linux-be8845</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21792-vulnerability-in-linux-linux-bdd336</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21791-vulnerability-in-linux-linux-be8834</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21790-vulnerability-in-linux-linux-be882c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe882c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21789-vulnerability-in-linux-linux-be8824</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21788-vulnerability-in-linux-linux-be8809</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21787-vulnerability-in-linux-linux-be8805</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21786-vulnerability-in-linux-linux-be8801</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21785-vulnerability-in-linux-linux-be87e7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21784-vulnerability-in-linux-linux-be87df</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21783-vulnerability-in-linux-linux-be87d5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe87d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21782-vulnerability-in-linux-linux-be87cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21781-vulnerability-in-linux-linux-be87c5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe87c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21780-vulnerability-in-linux-linux-be87bf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21779-vulnerability-in-linux-linux-be87bb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe87bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21778-vulnerability-in-linux-linux-be879d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21777-vulnerability-in-linux-linux-be8799</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21776-vulnerability-in-linux-linux-be8791</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21775-vulnerability-in-linux-linux-be878d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21774-vulnerability-in-linux-linux-be8789</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21773-vulnerability-in-linux-linux-be8778</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21772-vulnerability-in-linux-linux-be8770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21771-vulnerability-in-linux-linux-be8768</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21770-vulnerability-in-linux-linux-be8760</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21769-vulnerability-in-linux-linux-be875c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe875c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21768-vulnerability-in-linux-linux-be8731</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21767-vulnerability-in-linux-linux-bdd334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21766-vulnerability-in-linux-linux-bdd31a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21765-vulnerability-in-linux-linux-be8729</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21764-vulnerability-in-linux-linux-be8721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21763-vulnerability-in-linux-linux-be8719</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21762-vulnerability-in-linux-linux-be8711</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21761-vulnerability-in-linux-linux-be870b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe870b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21760-vulnerability-in-linux-linux-be8707</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21759-vulnerability-in-linux-linux-be86f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21758-vulnerability-in-linux-linux-be86f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21756-vulnerability-in-linux-linux-be86ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58021-vulnerability-in-linux-linux-bde1ce</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58020-vulnerability-in-linux-linux-bdd256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57852-vulnerability-in-linux-linux-bde8eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57834-vulnerability-in-linux-linux-bde8b3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54458-vulnerability-in-linux-linux-bdf0e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54458%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54456-vulnerability-in-linux-linux-bdf0e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54456%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52560-vulnerability-in-linux-linux-bdf7d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52559-vulnerability-in-linux-linux-bdf7c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52557-vulnerability-in-linux-linux-bdf7b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49570-vulnerability-in-linux-linux-be0741</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21754-vulnerability-in-linux-linux-be86c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21753-vulnerability-in-linux-linux-be86c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21752-vulnerability-in-linux-linux-be86bc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21751-vulnerability-in-linux-linux-be86b4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21750-vulnerability-in-linux-linux-be86ac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21749-vulnerability-in-linux-linux-be86a8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe86a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21748-vulnerability-in-linux-linux-be86a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe86a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21747-vulnerability-in-linux-linux-be8697</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9832c4522896dcbe8697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21746-vulnerability-in-linux-linux-be8686</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21745-vulnerability-in-linux-linux-be867e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe867e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21744-vulnerability-in-linux-linux-be865d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe865d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21743-vulnerability-in-linux-linux-be8657</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21742-vulnerability-in-linux-linux-be8655</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21741-vulnerability-in-linux-linux-be8651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21739-vulnerability-in-linux-linux-be8644</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21738-vulnerability-in-linux-linux-be8640</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21737-vulnerability-in-linux-linux-be863c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21737%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21736-vulnerability-in-linux-linux-be8638</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21736%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21735-vulnerability-in-linux-linux-be8634</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21734-vulnerability-in-linux-linux-be8630</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21734%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21733-vulnerability-in-linux-linux-be8610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21732-vulnerability-in-linux-linux-be860c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe860c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58019-vulnerability-in-linux-linux-bde1c6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58018-vulnerability-in-linux-linux-bded0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58017-vulnerability-in-linux-linux-bded09</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58016-vulnerability-in-linux-linux-bded05</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58015-vulnerability-in-linux-linux-bded01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58014-vulnerability-in-linux-linux-aec08a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58013-vulnerability-in-linux-linux-bdecfd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdecfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58012-vulnerability-in-linux-linux-bdecf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58011-vulnerability-in-linux-linux-bdecea</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58010-vulnerability-in-linux-linux-bdecc6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdecc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58009-vulnerability-in-linux-linux-bdecbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58008-vulnerability-in-linux-linux-bdd24e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58007-vulnerability-in-linux-linux-bdecb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdecb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58006-vulnerability-in-linux-linux-bdecae</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdecae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58005-vulnerability-in-linux-linux-bdeca6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58004-vulnerability-in-linux-linux-bdec93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58003-vulnerability-in-linux-linux-bdec8b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58002-vulnerability-in-linux-linux-bdec7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58001-vulnerability-in-linux-linux-bdec72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21731-vulnerability-in-linux-linux-be8608</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21730-vulnerability-in-linux-linux-be8604</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21729-vulnerability-in-linux-linux-be8600</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21728-vulnerability-in-linux-linux-bdd312</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21727-vulnerability-in-linux-linux-be85fc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21726-vulnerability-in-linux-linux-bdd30a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21725-vulnerability-in-linux-linux-be85f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe85f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21724-vulnerability-in-linux-linux-be85f4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe85f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21723-vulnerability-in-linux-linux-be85ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21722-vulnerability-in-linux-linux-be85ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21721-vulnerability-in-linux-linux-be85c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21720-vulnerability-in-linux-linux-be85c4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21719-vulnerability-in-linux-linux-be85b3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21718-vulnerability-in-linux-linux-be85ab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21717-vulnerability-in-linux-linux-be85a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe85a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21716-vulnerability-in-linux-linux-be859d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21715-vulnerability-in-linux-linux-bdd300</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21714-vulnerability-in-linux-linux-be8599</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21713-vulnerability-in-linux-linux-be8588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21712-vulnerability-in-linux-linux-be8580</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21711-vulnerability-in-linux-linux-be8576</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21710-vulnerability-in-linux-linux-be8554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe8554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21709-vulnerability-in-linux-linux-be854c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9832c4522896dcbe854c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21708-vulnerability-in-linux-linux-be8544</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9832c4522896dcbe8544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21707-vulnerability-in-linux-linux-be988b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe988b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21706-vulnerability-in-linux-linux-be9883</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21705-vulnerability-in-linux-linux-bdd2f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58000-vulnerability-in-linux-linux-bdec68</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57999-vulnerability-in-linux-linux-bdec53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57998-vulnerability-in-linux-linux-bdec42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57997-vulnerability-in-linux-linux-bdec3a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57996-vulnerability-in-linux-linux-bdec32</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57995-vulnerability-in-linux-linux-bdec2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57994-vulnerability-in-linux-linux-bdec22</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57993-vulnerability-in-linux-linux-bdec08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdec08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57992-vulnerability-in-linux-linux-bdec00</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdec00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57991-vulnerability-in-linux-linux-bdebf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57990-vulnerability-in-linux-linux-bdd246</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57989-vulnerability-in-linux-linux-bdebf0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57988-vulnerability-in-linux-linux-bdebdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57987-vulnerability-in-linux-linux-bdebd7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57986-vulnerability-in-linux-linux-bdebd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57985-vulnerability-in-linux-linux-bdebcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57984-vulnerability-in-linux-linux-bdebcb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdebcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57983-vulnerability-in-linux-linux-bdebba</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57982-vulnerability-in-linux-linux-bdebb2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdebb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57981-vulnerability-in-linux-linux-bdebaa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdebaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57980-vulnerability-in-linux-linux-bdeb9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57979-vulnerability-in-linux-linux-bdd23e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57978-vulnerability-in-linux-linux-bdeb91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57977-vulnerability-in-linux-linux-bdeb7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57976-vulnerability-in-linux-linux-bdeb78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57975-vulnerability-in-linux-linux-bdeb6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57974-vulnerability-in-linux-linux-bdeb67</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57973-vulnerability-in-linux-linux-bdeb63</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57953-vulnerability-in-linux-linux-bdeb5f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-27-815adcb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-27&amp;severity=medium&amp;id=68367c99182aa0cae2324b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41339-n-a-in-n-a-bda2d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41339%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41334-n-a-in-n-a-bda2ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41334%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2025-02-27-87e65b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202025-02-27&amp;severity=medium&amp;id=682b68f7d14de609c887e65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1634-missing-release-of-memory-after-effe-c98235e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1634%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=high&amp;id=68629a946f40f0eb728bd83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49732-vulnerability-in-linux-linux-be49bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1716-cwe-184-incomplete-list-of-disallowe-3daf4515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1716%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20mmaitre314%20picklescan&amp;severity=medium&amp;id=695450bedb813ff03e2bf8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1249-missing-authorization-in-marcus-aka--fccd5c1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1249%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20Events%20Manager&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6810-cwe-79-improper-neutralization-of-in-f21ac7ff</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quizorganizer%20Quiz%20Organizer&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1517-cwe-79-improper-neutralization-of-in-f25a7883</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6b15b7ef31ef0b54deca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13560-cwe-352-cross-site-request-forgery--359bed92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13560%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottpaterson%20Subscriptions%20%26%20Memberships%20for%20PayPal&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13803-cwe-79-improper-neutralization-of-i-44eb1e59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13669-cwe-79-cross-site-scripting-xss-in--6b18e3a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13669%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20CalendApp&amp;severity=medium&amp;id=696166b3047de42cfc9dfbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12434-cwe-200-exposure-of-sensitive-infor-10868051</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12434%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SureCart%20SureMembers&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59898d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49731-vulnerability-in-linux-linux-be49bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe49bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49730-vulnerability-in-linux-linux-be49b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe49b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49729-vulnerability-in-linux-linux-be499f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe499f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49728-vulnerability-in-linux-linux-be4997</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49727-vulnerability-in-linux-linux-be498f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe498f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49726-vulnerability-in-linux-linux-be4970</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49725-vulnerability-in-linux-linux-be496c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe496c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49724-vulnerability-in-linux-linux-be4968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49723-vulnerability-in-linux-linux-be4964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49722-vulnerability-in-linux-linux-be4957</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49721-vulnerability-in-linux-linux-be4955</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49720-vulnerability-in-linux-linux-be4946</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49719-vulnerability-in-linux-linux-be493e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe493e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49718-vulnerability-in-linux-linux-be4936</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49717-vulnerability-in-linux-linux-be492e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe492e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49716-vulnerability-in-linux-linux-be4911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49715-vulnerability-in-linux-linux-be490d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe490d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49714-vulnerability-in-linux-linux-be4909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49713-vulnerability-in-linux-linux-bdd72c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49712-vulnerability-in-linux-linux-be48fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49711-vulnerability-in-linux-linux-be48f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe48f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49710-vulnerability-in-linux-linux-be48f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49709-vulnerability-in-linux-linux-be48e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49708-vulnerability-in-linux-linux-bdd728</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49707-vulnerability-in-linux-linux-be48e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49706-vulnerability-in-linux-linux-be48db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49705-vulnerability-in-linux-linux-be48d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49704-vulnerability-in-linux-linux-be48ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49703-vulnerability-in-linux-linux-be48b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe48b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49702-vulnerability-in-linux-linux-be48b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe48b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49701-vulnerability-in-linux-linux-be48ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe48ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49700-vulnerability-in-linux-linux-be489f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe489f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49699-vulnerability-in-linux-linux-be4897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49698-vulnerability-in-linux-linux-be4893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49697-vulnerability-in-linux-linux-be488f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe488f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49696-vulnerability-in-linux-linux-bdd722</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49695-vulnerability-in-linux-linux-be488b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe488b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49694-vulnerability-in-linux-linux-be487a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe487a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49693-vulnerability-in-linux-linux-be485b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe485b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49692-vulnerability-in-linux-linux-be4857</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49691-vulnerability-in-linux-linux-be4853</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49688-vulnerability-in-linux-linux-bdd71e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49687-vulnerability-in-linux-linux-be4844</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49686-vulnerability-in-linux-linux-be483c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe483c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49685-vulnerability-in-linux-linux-be4838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49684-vulnerability-in-linux-linux-be4834</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49683-vulnerability-in-linux-linux-be4830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49682-vulnerability-in-linux-linux-be481f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe481f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49681-vulnerability-in-linux-linux-be4817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49680-vulnerability-in-linux-linux-be47fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49679-vulnerability-in-linux-linux-be47f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49678-vulnerability-in-linux-linux-be47f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49677-vulnerability-in-linux-linux-be47f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49676-vulnerability-in-linux-linux-be47e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49675-vulnerability-in-linux-linux-be47df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49674-vulnerability-in-linux-linux-be47db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49673-vulnerability-in-linux-linux-be47ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49672-vulnerability-in-linux-linux-be47ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49671-vulnerability-in-linux-linux-be47c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49670-vulnerability-in-linux-linux-be47a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49669-vulnerability-in-linux-linux-be47a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe47a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49668-vulnerability-in-linux-linux-be47a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe47a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49667-vulnerability-in-linux-linux-be479d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49666-vulnerability-in-linux-linux-bdd71a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49665-vulnerability-in-linux-linux-be4799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49664-vulnerability-in-linux-linux-bdd716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49663-vulnerability-in-linux-linux-be4795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49662-vulnerability-in-linux-linux-be4791</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49661-vulnerability-in-linux-linux-be478d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe478d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49659-vulnerability-in-linux-linux-be4789</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49658-vulnerability-in-linux-linux-be477c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe477c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49657-vulnerability-in-linux-linux-be475c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe475c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49656-vulnerability-in-linux-linux-be4758</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49655-vulnerability-in-linux-linux-be4754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49654-vulnerability-in-linux-linux-be4750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49653-vulnerability-in-linux-linux-bdd712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49652-vulnerability-in-linux-linux-be474c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe474c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49651-vulnerability-in-linux-linux-be4748</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49650-vulnerability-in-linux-linux-be4744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49649-vulnerability-in-linux-linux-be4740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49648-vulnerability-in-linux-linux-bdd701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49647-vulnerability-in-linux-linux-be473a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe473a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49646-vulnerability-in-linux-linux-be4736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49645-vulnerability-in-linux-linux-be471d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe471d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49644-vulnerability-in-linux-linux-be471b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe471b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49643-vulnerability-in-linux-linux-be4719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49642-vulnerability-in-linux-linux-be4701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49641-vulnerability-in-linux-linux-bdd6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49640-vulnerability-in-linux-linux-be46f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49639-vulnerability-in-linux-linux-be46f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49638-vulnerability-in-linux-linux-be46e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49637-vulnerability-in-linux-linux-be46df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49636-vulnerability-in-linux-linux-be46d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49635-vulnerability-in-linux-linux-be46d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49634-vulnerability-in-linux-linux-be46b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49633-vulnerability-in-linux-linux-be46ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49632-vulnerability-in-linux-linux-be46a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe46a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49631-vulnerability-in-linux-linux-be4696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49630-vulnerability-in-linux-linux-be468e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe468e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49629-vulnerability-in-linux-linux-be4688</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49628-vulnerability-in-linux-linux-be4684</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49627-vulnerability-in-linux-linux-be4680</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49626-vulnerability-in-linux-linux-be4671</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49625-vulnerability-in-linux-linux-be4667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49624-vulnerability-in-linux-linux-bdd6f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49623-vulnerability-in-linux-linux-be464c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe464c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49622-vulnerability-in-linux-linux-be4648</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49621-vulnerability-in-linux-linux-be463b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe463b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49620-vulnerability-in-linux-linux-be4637</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49619-vulnerability-in-linux-linux-be4633</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49618-vulnerability-in-linux-linux-be462f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe462f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49617-vulnerability-in-linux-linux-be462b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe462b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49616-vulnerability-in-linux-linux-be4627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49615-vulnerability-in-linux-linux-be4623</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49613-vulnerability-in-linux-linux-be461f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe461f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49612-vulnerability-in-linux-linux-be45fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49611-vulnerability-in-linux-linux-be45f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe45f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49610-vulnerability-in-linux-linux-be45f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe45f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49609-vulnerability-in-linux-linux-be45f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49608-vulnerability-in-linux-linux-be45ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49607-vulnerability-in-linux-linux-bdd6e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49606-vulnerability-in-linux-linux-be45e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe45e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49605-vulnerability-in-linux-linux-be45e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49604-vulnerability-in-linux-linux-be45e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49603-vulnerability-in-linux-linux-be45d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49602-vulnerability-in-linux-linux-be45c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe45c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49601-vulnerability-in-linux-linux-be45af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe45af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49600-vulnerability-in-linux-linux-be45a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe45a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49599-vulnerability-in-linux-linux-be459e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe459e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49598-vulnerability-in-linux-linux-be459a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe459a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49597-vulnerability-in-linux-linux-be4594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49596-vulnerability-in-linux-linux-bdd6e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49595-vulnerability-in-linux-linux-be4590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49594-vulnerability-in-linux-linux-be458c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe458c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49593-vulnerability-in-linux-linux-be4588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49592-vulnerability-in-linux-linux-be4584</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49591-vulnerability-in-linux-linux-be4575</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49590-vulnerability-in-linux-linux-be4558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49589-vulnerability-in-linux-linux-be4554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49588-vulnerability-in-linux-linux-bdd6dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49587-vulnerability-in-linux-linux-be4550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49586-vulnerability-in-linux-linux-be454c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe454c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49585-vulnerability-in-linux-linux-be453d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe453d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49584-vulnerability-in-linux-linux-be4535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49583-vulnerability-in-linux-linux-bdd6cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49582-vulnerability-in-linux-linux-be452f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe452f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49581-vulnerability-in-linux-linux-be4529</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49580-vulnerability-in-linux-linux-be451a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe451a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49579-vulnerability-in-linux-linux-be4512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49579%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49578-vulnerability-in-linux-linux-be44f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe44f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49577-vulnerability-in-linux-linux-be44f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49576-vulnerability-in-linux-linux-be44ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe44ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49575-vulnerability-in-linux-linux-be44de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49574-vulnerability-in-linux-linux-be44d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49574%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49573-vulnerability-in-linux-linux-be44d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49572-vulnerability-in-linux-linux-be44c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49571-vulnerability-in-linux-linux-be44b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49570-vulnerability-in-linux-linux-be44b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49569-vulnerability-in-linux-linux-be44a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe44a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49568-vulnerability-in-linux-linux-be4492</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49567-vulnerability-in-linux-linux-be4490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49566-vulnerability-in-linux-linux-be448e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe448e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49565-vulnerability-in-linux-linux-be4474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49564-vulnerability-in-linux-linux-be446c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe446c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49563-vulnerability-in-linux-linux-aebf96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4453-vulnerability-in-linux-linux-bea82f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4453%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9836c4522896dcbea82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49562-vulnerability-in-linux-linux-be4464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49561-vulnerability-in-linux-linux-be445c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe445c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49560-vulnerability-in-linux-linux-be4454</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49559-vulnerability-in-linux-linux-be444e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe444e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49558-vulnerability-in-linux-linux-be444a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49558%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe444a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49557-vulnerability-in-linux-linux-be442c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe442c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49556-vulnerability-in-linux-linux-be4428</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49556%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49555-vulnerability-in-linux-linux-be4424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49555%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49554-vulnerability-in-linux-linux-be4420</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49554%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49553-vulnerability-in-linux-linux-be441c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49553%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe441c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49552-vulnerability-in-linux-linux-be4418</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49552%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49551-vulnerability-in-linux-linux-be4414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49551%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49550-vulnerability-in-linux-linux-be4410</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49550%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49549-vulnerability-in-linux-linux-be43ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49549%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49548-vulnerability-in-linux-linux-be43f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49548%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe43f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49547-vulnerability-in-linux-linux-bdd6c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49547%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49546-vulnerability-in-linux-linux-be43de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49545-vulnerability-in-linux-linux-be43da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49545%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49544-vulnerability-in-linux-linux-be43cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49544%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49543-vulnerability-in-linux-linux-be43c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49543%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49542-vulnerability-in-linux-linux-be43c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49542%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe43c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49541-vulnerability-in-linux-linux-be43c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49541%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe43c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49540-vulnerability-in-linux-linux-be43bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49540%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49539-vulnerability-in-linux-linux-be43b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49539%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49538-vulnerability-in-linux-linux-be43b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49538%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49537-vulnerability-in-linux-linux-be43b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49537%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe43b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49536-vulnerability-in-linux-linux-be4387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49536%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49535-vulnerability-in-linux-linux-be437f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49535%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe437f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49534-vulnerability-in-linux-linux-be437b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49534%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe437b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49533-vulnerability-in-linux-linux-be4377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49533%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49532-vulnerability-in-linux-linux-be436a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49532%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49531-vulnerability-in-linux-linux-be4366</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49531%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49530-vulnerability-in-linux-linux-be4362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49530%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49529-vulnerability-in-linux-linux-be435e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49529%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe435e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49528-vulnerability-in-linux-linux-be435a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49528%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe435a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49527-vulnerability-in-linux-linux-be4356</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49527%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49526-vulnerability-in-linux-linux-be4332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49526%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49525-vulnerability-in-linux-linux-be432e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49525%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe432e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49524-vulnerability-in-linux-linux-be432a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49524%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe432a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49523-vulnerability-in-linux-linux-be4326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49523%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49522-vulnerability-in-linux-linux-be4322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49522%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49521-vulnerability-in-linux-linux-be5cce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49521%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49520-vulnerability-in-linux-linux-be5cc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49520%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982ec4522896dcbe5cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49519-vulnerability-in-linux-linux-be5cbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49519%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49518-vulnerability-in-linux-linux-be5cba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49518%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49517-vulnerability-in-linux-linux-be5cad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49517%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49516-vulnerability-in-linux-linux-be5c91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49516%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49515-vulnerability-in-linux-linux-be5c8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49515%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49514-vulnerability-in-linux-linux-be5c89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49514%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49513-vulnerability-in-linux-linux-be5c83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49513%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49512-vulnerability-in-linux-linux-be5c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49512%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49511-vulnerability-in-linux-linux-be5c7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49511%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49510-vulnerability-in-linux-linux-be5c77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49510%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49509-vulnerability-in-linux-linux-be5c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49509%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49508-vulnerability-in-linux-linux-be5c6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49508%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49507-vulnerability-in-linux-linux-be5c6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49507%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49506-vulnerability-in-linux-linux-be5c58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49506%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49505-vulnerability-in-linux-linux-bdd6c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49505%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49504-vulnerability-in-linux-linux-be5c54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49504%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49503-vulnerability-in-linux-linux-be5c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49503%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49502-vulnerability-in-linux-linux-be5c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49502%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49501-vulnerability-in-linux-linux-be5c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49501%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49500-vulnerability-in-linux-linux-be5c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49500%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49499-vulnerability-in-linux-linux-be5c37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49499%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49498-vulnerability-in-linux-linux-be5c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49498%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49497-vulnerability-in-linux-linux-be5c1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49497%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49496-vulnerability-in-linux-linux-be5c18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49496%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49495-vulnerability-in-linux-linux-be5c03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49495%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49494-vulnerability-in-linux-linux-be5bff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49494%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49493-vulnerability-in-linux-linux-be5bfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49493%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49492-vulnerability-in-linux-linux-be5bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49492%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49491-vulnerability-in-linux-linux-be5bf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49491%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49490-vulnerability-in-linux-linux-be5bef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49490%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49489-vulnerability-in-linux-linux-be5beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49489%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49488-vulnerability-in-linux-linux-be5be7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49488%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49487-vulnerability-in-linux-linux-be5bd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49487%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49486-vulnerability-in-linux-linux-be5bd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49486%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49485-vulnerability-in-linux-linux-be5bb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49485%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49484-vulnerability-in-linux-linux-be5bac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49484%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49483-vulnerability-in-linux-linux-be5ba8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49483%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49482-vulnerability-in-linux-linux-be5ba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49482%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49481-vulnerability-in-linux-linux-be5b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49481%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49480-vulnerability-in-linux-linux-be5b9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49480%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49479-vulnerability-in-linux-linux-be5b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49478-vulnerability-in-linux-linux-be5b90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49478%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49477-vulnerability-in-linux-linux-be5b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49477%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49476-vulnerability-in-linux-linux-be5b7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49475-vulnerability-in-linux-linux-be5b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49475%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49474-vulnerability-in-linux-linux-bdd6b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49474%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49473-vulnerability-in-linux-linux-be5b5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49473%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49472-vulnerability-in-linux-linux-be5b4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49472%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49471-vulnerability-in-linux-linux-be5b43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49471%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49470-vulnerability-in-linux-linux-be5b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49470%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49469-vulnerability-in-linux-linux-be5b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49469%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49468-vulnerability-in-linux-linux-be5b24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49468%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49467-vulnerability-in-linux-linux-be5b1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49467%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49466-vulnerability-in-linux-linux-be5b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49466%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49465-vulnerability-in-linux-linux-aebf94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49465%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49464-vulnerability-in-linux-linux-be5b0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49464%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49463-vulnerability-in-linux-linux-be5ae1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49463%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49462-vulnerability-in-linux-linux-be5ad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49462%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49461-vulnerability-in-linux-linux-be5ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49461%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49460-vulnerability-in-linux-linux-be5ac9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49460%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49459-vulnerability-in-linux-linux-be5ac1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49459%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49458-vulnerability-in-linux-linux-be5abb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49458%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49457-vulnerability-in-linux-linux-be5aac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49457%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49456-vulnerability-in-linux-linux-be5aa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49456%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49455-vulnerability-in-linux-linux-be5a9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49455%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49454-vulnerability-in-linux-linux-be5a94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49454%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49453-vulnerability-in-linux-linux-be5a76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49453%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49452-vulnerability-in-linux-linux-be5a72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49452%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49451-vulnerability-in-linux-linux-be5a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49451%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49450-vulnerability-in-linux-linux-be5a68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49450%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49449-vulnerability-in-linux-linux-be5a64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49449%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49448-vulnerability-in-linux-linux-be5a57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49448%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49447-vulnerability-in-linux-linux-be5a53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49447%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49446-vulnerability-in-linux-linux-be5a4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49446%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49445-vulnerability-in-linux-linux-be5a4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49445%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49444-vulnerability-in-linux-linux-bdd6a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49444%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49443-vulnerability-in-linux-linux-be5a47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49443%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49442-vulnerability-in-linux-linux-be5a32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49442%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49441-vulnerability-in-linux-linux-bdd693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49441%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49440-vulnerability-in-linux-linux-be5a2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49440%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49439-vulnerability-in-linux-linux-be5a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49439%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49438-vulnerability-in-linux-linux-be5a26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49438%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49437-vulnerability-in-linux-linux-be5a22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49437%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49436-vulnerability-in-linux-linux-be5a1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49436%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49435-vulnerability-in-linux-linux-be5a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49435%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49434-vulnerability-in-linux-linux-be5a09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49434%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49433-vulnerability-in-linux-linux-be5a01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49433%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49432-vulnerability-in-linux-linux-be59fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49432%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49431-vulnerability-in-linux-linux-be59d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49431%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49430-vulnerability-in-linux-linux-be59d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49430%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49429-vulnerability-in-linux-linux-be59c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49429%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49428-vulnerability-in-linux-linux-be59c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49428%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49427-vulnerability-in-linux-linux-bdd68f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49427%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49426-vulnerability-in-linux-linux-be59bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49426%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49425-vulnerability-in-linux-linux-be59ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49425%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe59ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49424-vulnerability-in-linux-linux-bdd68b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49424%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49423-vulnerability-in-linux-linux-be59aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49423%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49422-vulnerability-in-linux-linux-be59a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49422%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe59a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49421-vulnerability-in-linux-linux-be5995</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49421%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49420-vulnerability-in-linux-linux-be598b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49420%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49419-vulnerability-in-linux-linux-be5972</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49419%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49418-vulnerability-in-linux-linux-be596e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49418%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe596e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49417-vulnerability-in-linux-linux-be5968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49417%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49416-vulnerability-in-linux-linux-be5964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49416%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49415-vulnerability-in-linux-linux-be5960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49415%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49414-vulnerability-in-linux-linux-be594f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49414%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe594f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49413-vulnerability-in-linux-linux-be594b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49413%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe594b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49412-vulnerability-in-linux-linux-be593a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49412%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe593a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49411-vulnerability-in-linux-linux-be5932</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49411%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49410-vulnerability-in-linux-linux-be592a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49410%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe592a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49409-vulnerability-in-linux-linux-bdd687</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49409%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49408-vulnerability-in-linux-linux-be5913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49408%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49407-vulnerability-in-linux-linux-be590f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49407%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe590f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49406-vulnerability-in-linux-linux-be590b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49406%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe590b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49405-vulnerability-in-linux-linux-be5907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49405%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49404-vulnerability-in-linux-linux-be5903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49404%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49403-vulnerability-in-linux-linux-be58ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49403%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49402-vulnerability-in-linux-linux-be58f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49402%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49401-vulnerability-in-linux-linux-be58e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49401%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49400-vulnerability-in-linux-linux-bdd683</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49400%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49399-vulnerability-in-linux-linux-be58d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49399%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49398-vulnerability-in-linux-linux-bdd681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49398%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49397-vulnerability-in-linux-linux-be58d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49397%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49396-vulnerability-in-linux-linux-be58ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49396%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49395-vulnerability-in-linux-linux-be58b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49395%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49394-vulnerability-in-linux-linux-bdd672</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49394%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49393-vulnerability-in-linux-linux-be58b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49393%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe58b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49392-vulnerability-in-linux-linux-be58a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49392%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe58a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49391-vulnerability-in-linux-linux-be589f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49391%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe589f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49390-vulnerability-in-linux-linux-bdd66a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49390%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49389-vulnerability-in-linux-linux-bdd660</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49389%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49388-vulnerability-in-linux-linux-be589b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49388%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe589b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49387-vulnerability-in-linux-linux-be5897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49387%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49386-vulnerability-in-linux-linux-be5893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49386%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49385-vulnerability-in-linux-linux-be588d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49385%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe588d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49384-vulnerability-in-linux-linux-bdd64b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49384%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49383-vulnerability-in-linux-linux-be5889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49383%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49382-vulnerability-in-linux-linux-be5878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49382%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49381-vulnerability-in-linux-linux-be5869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49381%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49380-vulnerability-in-linux-linux-be5861</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49380%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49379-vulnerability-in-linux-linux-be5859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49379%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49378-vulnerability-in-linux-linux-be5851</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49378%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49377-vulnerability-in-linux-linux-be584b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49377%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe584b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49376-vulnerability-in-linux-linux-be5847</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49376%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49375-vulnerability-in-linux-linux-be5836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49375%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49374-vulnerability-in-linux-linux-be5832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49374%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49373-vulnerability-in-linux-linux-be5821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49373%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49372-vulnerability-in-linux-linux-be5808</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49372%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49371-vulnerability-in-linux-linux-be5800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49371%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49370-vulnerability-in-linux-linux-be57fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49370%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49369-vulnerability-in-linux-linux-be57f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49369%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49368-vulnerability-in-linux-linux-be57f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49368%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49367-vulnerability-in-linux-linux-be57e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49367%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49366-vulnerability-in-linux-linux-be57db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49366%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49365-vulnerability-in-linux-linux-be57d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49365%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49364-vulnerability-in-linux-linux-be57d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49364%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49363-vulnerability-in-linux-linux-be57c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49363%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49362-vulnerability-in-linux-linux-be57a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49362%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe57a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49361-vulnerability-in-linux-linux-be57a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49361%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe57a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49360-vulnerability-in-linux-linux-be5799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49360%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49359-vulnerability-in-linux-linux-bdd647</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49359%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49358-vulnerability-in-linux-linux-be5795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49358%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49357-vulnerability-in-linux-linux-be5784</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49357%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49356-vulnerability-in-linux-linux-be577c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49356%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe577c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49354-vulnerability-in-linux-linux-be5776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49354%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49353-vulnerability-in-linux-linux-be5770</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49353%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49352-vulnerability-in-linux-linux-be575f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49352%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe575f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49351-vulnerability-in-linux-linux-be5757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49351%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49350-vulnerability-in-linux-linux-be573e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49350%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe573e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49349-vulnerability-in-linux-linux-be573a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49349%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe573a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49348-vulnerability-in-linux-linux-be5729</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49348%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49347-vulnerability-in-linux-linux-be5721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49347%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49346-vulnerability-in-linux-linux-be571d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49346%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49345-vulnerability-in-linux-linux-be5710</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49345%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49344-vulnerability-in-linux-linux-bdd643</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49344%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49343-vulnerability-in-linux-linux-be570c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49343%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe570c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49342-vulnerability-in-linux-linux-be5708</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49342%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49341-vulnerability-in-linux-linux-be5702</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49341%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49340-vulnerability-in-linux-linux-bdd63f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49340%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49339-vulnerability-in-linux-linux-be56fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49339%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49338-vulnerability-in-linux-linux-be56eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49338%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49337-vulnerability-in-linux-linux-be56e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49337%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49336-vulnerability-in-linux-linux-be56e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49336%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49335-vulnerability-in-linux-linux-be56df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49335%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49334-vulnerability-in-linux-linux-be56db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49334%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49333-vulnerability-in-linux-linux-bdd63b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49333%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd63b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49332-vulnerability-in-linux-linux-be56d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49332%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49331-vulnerability-in-linux-linux-be56ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49331%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49330-vulnerability-in-linux-linux-be56c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49330%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49329-vulnerability-in-linux-linux-be56c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49329%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49328-vulnerability-in-linux-linux-be56be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49328%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe56be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49327-vulnerability-in-linux-linux-be56a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49327%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe56a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49326-vulnerability-in-linux-linux-be5698</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49326%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49325-vulnerability-in-linux-linux-be5690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49325%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49324-vulnerability-in-linux-linux-be5686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49324%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49323-vulnerability-in-linux-linux-be567e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49323%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe567e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49322-vulnerability-in-linux-linux-be5676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49322%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49321-vulnerability-in-linux-linux-be565c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49321%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe565c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49320-vulnerability-in-linux-linux-be5654</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49320%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49319-vulnerability-in-linux-linux-be564c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49319%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe564c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49318-vulnerability-in-linux-linux-be5644</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49318%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49317-vulnerability-in-linux-linux-be5629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49317%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49316-vulnerability-in-linux-linux-be5623</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49316%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49315-vulnerability-in-linux-linux-be561f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49315%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe561f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49314-vulnerability-in-linux-linux-be5605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49314%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49313-vulnerability-in-linux-linux-be55fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49313%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49312-vulnerability-in-linux-linux-be55f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49312%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49311-vulnerability-in-linux-linux-be55ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49311%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49310-vulnerability-in-linux-linux-be55e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49310%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49309-vulnerability-in-linux-linux-be55dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49309%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49308-vulnerability-in-linux-linux-be55d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49308%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49307-vulnerability-in-linux-linux-be55b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49307%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49306-vulnerability-in-linux-linux-be55a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49306%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49305-vulnerability-in-linux-linux-be55a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49305%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49304-vulnerability-in-linux-linux-be55a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49304%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe55a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49303-vulnerability-in-linux-linux-be559c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49303%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe559c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49302-vulnerability-in-linux-linux-be5598</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49302%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49301-vulnerability-in-linux-linux-be5594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49301%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49300-vulnerability-in-linux-linux-be5590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49300%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49299-vulnerability-in-linux-linux-aebf92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49299%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47660-vulnerability-in-linux-linux-be96b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47659-vulnerability-in-linux-linux-aebf5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49298-vulnerability-in-linux-linux-be558c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49298%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe558c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49297-vulnerability-in-linux-linux-be5588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49297%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49296-vulnerability-in-linux-linux-be5573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49296%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49295-vulnerability-in-linux-linux-be556f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49295%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe556f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49294-vulnerability-in-linux-linux-be556b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49294%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe556b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47658-vulnerability-in-linux-linux-be96ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49293-vulnerability-in-linux-linux-be5567</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49293%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49292-vulnerability-in-linux-linux-be5563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49292%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49291-vulnerability-in-linux-linux-be5554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49291%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49290-vulnerability-in-linux-linux-bdd637</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49290%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49289-vulnerability-in-linux-linux-be554c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49289%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe554c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49288-vulnerability-in-linux-linux-be5548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49288%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49287-vulnerability-in-linux-linux-be553b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49287%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe553b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49286-vulnerability-in-linux-linux-be5537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49286%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49285-vulnerability-in-linux-linux-be5522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49285%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49284-vulnerability-in-linux-linux-be551e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49284%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe551e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49283-vulnerability-in-linux-linux-be551a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49283%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe551a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49282-vulnerability-in-linux-linux-bdd62a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49281-vulnerability-in-linux-linux-be5516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49281%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49280-vulnerability-in-linux-linux-be5512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49280%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49279-vulnerability-in-linux-linux-be550e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49279%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe550e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49278-vulnerability-in-linux-linux-be550a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49278%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe550a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49277-vulnerability-in-linux-linux-be5506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49277%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49276-vulnerability-in-linux-linux-be5502</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49276%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49275-vulnerability-in-linux-linux-be54fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49275%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49274-vulnerability-in-linux-linux-be54e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49274%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49273-vulnerability-in-linux-linux-be54e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49273%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49272-vulnerability-in-linux-linux-be54dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49272%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49271-vulnerability-in-linux-linux-be54d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49271%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49270-vulnerability-in-linux-linux-be54d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49270%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49269-vulnerability-in-linux-linux-be54ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49269%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49268-vulnerability-in-linux-linux-be54c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49268%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49267-vulnerability-in-linux-linux-be54bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49267%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49266-vulnerability-in-linux-linux-bdd626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49266%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49265-vulnerability-in-linux-linux-be54b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49265%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe54b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49264-vulnerability-in-linux-linux-be54b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49264%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe54b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49263-vulnerability-in-linux-linux-be549c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49263%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe549c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49262-vulnerability-in-linux-linux-be5494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49262%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49261-vulnerability-in-linux-linux-be548c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49261%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe548c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49260-vulnerability-in-linux-linux-be547d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49260%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe547d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49259-vulnerability-in-linux-linux-be546c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49259%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe546c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49258-vulnerability-in-linux-linux-be5466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49258%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49257-vulnerability-in-linux-linux-be5462</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49257%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49256-vulnerability-in-linux-linux-be545a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49256%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49255-vulnerability-in-linux-linux-be5452</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49255%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49254-vulnerability-in-linux-linux-be544a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49254%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49253-vulnerability-in-linux-linux-be542a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49253%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe542a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49252-vulnerability-in-linux-linux-be5426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49252%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49251-vulnerability-in-linux-linux-be5422</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49251%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49250-vulnerability-in-linux-linux-be541e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49250%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe541e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49249-vulnerability-in-linux-linux-be541a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49249%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe541a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49248-vulnerability-in-linux-linux-be5416</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49248%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49247-vulnerability-in-linux-linux-be5412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49247%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49246-vulnerability-in-linux-linux-be540e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49246%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe540e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49245-vulnerability-in-linux-linux-be540a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49245%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe540a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49244-vulnerability-in-linux-linux-be53f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49244%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49243-vulnerability-in-linux-linux-be53e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49243%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49242-vulnerability-in-linux-linux-be53d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49242%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49241-vulnerability-in-linux-linux-be53c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49240-vulnerability-in-linux-linux-be53c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49239-vulnerability-in-linux-linux-be53b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49238-vulnerability-in-linux-linux-be53aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe53aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49237-vulnerability-in-linux-linux-be53a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe53a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49236-vulnerability-in-linux-linux-be539a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe539a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49235-vulnerability-in-linux-linux-be5392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49234-vulnerability-in-linux-linux-be538a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe538a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49233-vulnerability-in-linux-linux-be5377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49232-vulnerability-in-linux-linux-be536a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe536a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49231-vulnerability-in-linux-linux-be535d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe535d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49230-vulnerability-in-linux-linux-be5355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49229-vulnerability-in-linux-linux-be534d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe534d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49228-vulnerability-in-linux-linux-be5343</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49228%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49227-vulnerability-in-linux-linux-be533d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe533d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49226-vulnerability-in-linux-linux-be5339</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49226%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49225-vulnerability-in-linux-linux-be5331</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49224-vulnerability-in-linux-linux-be532d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe532d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49223-vulnerability-in-linux-linux-be5309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49222-vulnerability-in-linux-linux-be5303</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49222%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49221-vulnerability-in-linux-linux-bdd622</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49221%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49220-vulnerability-in-linux-linux-be52f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49220%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe52f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49219-vulnerability-in-linux-linux-be52ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49219%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe52ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49218-vulnerability-in-linux-linux-be52e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49218%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49217-vulnerability-in-linux-linux-be52dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49217%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49216-vulnerability-in-linux-linux-be52d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49216%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49215-vulnerability-in-linux-linux-be52d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49215%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe52d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49214-vulnerability-in-linux-linux-be52c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49214%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49213-vulnerability-in-linux-linux-be52bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49213%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe52bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49212-vulnerability-in-linux-linux-be529b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49212%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe529b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49211-vulnerability-in-linux-linux-be5293</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49211%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49210-vulnerability-in-linux-linux-be528b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49210%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe528b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49209-vulnerability-in-linux-linux-be5285</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49209%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49208-vulnerability-in-linux-linux-be5281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49208%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49207-vulnerability-in-linux-linux-be5272</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49207%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49206-vulnerability-in-linux-linux-be526a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49206%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe526a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49205-vulnerability-in-linux-linux-be5262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49205%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49204-vulnerability-in-linux-linux-be525a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49204%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49203-vulnerability-in-linux-linux-be5252</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49203%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49202-vulnerability-in-linux-linux-be5229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49202%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49201-vulnerability-in-linux-linux-be5225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49201%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49200-vulnerability-in-linux-linux-be5221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49200%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49199-vulnerability-in-linux-linux-be521d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49199%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe521d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49198-vulnerability-in-linux-linux-be5219</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49198%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49197-vulnerability-in-linux-linux-be5215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49197%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49196-vulnerability-in-linux-linux-bdd613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49196%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49195-vulnerability-in-linux-linux-be5211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49195%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49194-vulnerability-in-linux-linux-be520d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49194%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe520d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49193-vulnerability-in-linux-linux-be5209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49192-vulnerability-in-linux-linux-be5205</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49192%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49191-vulnerability-in-linux-linux-be51ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49190-vulnerability-in-linux-linux-be51e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49190%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49189-vulnerability-in-linux-linux-be51e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49189%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49188-vulnerability-in-linux-linux-be51e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49188%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49187-vulnerability-in-linux-linux-be51dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49187%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49186-vulnerability-in-linux-linux-be51cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49186%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe51cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49185-vulnerability-in-linux-linux-be51be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49185%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49184-vulnerability-in-linux-linux-be51b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49184%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49183-vulnerability-in-linux-linux-bdd5f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49183%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49182-vulnerability-in-linux-linux-be51ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49182%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe51ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49180-vulnerability-in-linux-linux-be51a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49180%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe51a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49179-vulnerability-in-linux-linux-be5180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49179%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49178-vulnerability-in-linux-linux-be517a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49178%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe517a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49177-vulnerability-in-linux-linux-aeb031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49177%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49176-vulnerability-in-linux-linux-be5176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49176%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49175-vulnerability-in-linux-linux-be516e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49175%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe516e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49174-vulnerability-in-linux-linux-be5166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49174%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49173-vulnerability-in-linux-linux-be5157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49173%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49172-vulnerability-in-linux-linux-be514f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49172%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49171-vulnerability-in-linux-linux-be5147</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49171%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49170-vulnerability-in-linux-linux-be5138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49170%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49169-vulnerability-in-linux-linux-be5132</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49169%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49168-vulnerability-in-linux-linux-be511f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49168%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49167-vulnerability-in-linux-linux-be5117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49167%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49166-vulnerability-in-linux-linux-be5111</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49166%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49165-vulnerability-in-linux-linux-be510d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49165%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe510d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49164-vulnerability-in-linux-linux-be5105</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49164%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49163-vulnerability-in-linux-linux-be50f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49162-vulnerability-in-linux-linux-be50e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49161-vulnerability-in-linux-linux-be50dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49160-vulnerability-in-linux-linux-be50d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe50d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49159-vulnerability-in-linux-linux-be50cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe50cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49158-vulnerability-in-linux-linux-be50b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe50b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49157-vulnerability-in-linux-linux-be50a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe50a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49156-vulnerability-in-linux-linux-be509f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe509f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49155-vulnerability-in-linux-linux-be5097</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49154-vulnerability-in-linux-linux-be508f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe508f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49153-vulnerability-in-linux-linux-be5087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49152-vulnerability-in-linux-linux-be506d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe506d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49151-vulnerability-in-linux-linux-be5065</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49150-vulnerability-in-linux-linux-be505d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe505d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49149-vulnerability-in-linux-linux-be5055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49148-vulnerability-in-linux-linux-be5040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49147-vulnerability-in-linux-linux-be503a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe503a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49146-vulnerability-in-linux-linux-be5036</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49145-vulnerability-in-linux-linux-be5032</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe5032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49144-vulnerability-in-linux-linux-be502e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe502e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49142-vulnerability-in-linux-linux-bdd5f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49141-vulnerability-in-linux-linux-be501d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe501d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49139-vulnerability-in-linux-linux-be5015</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49138-vulnerability-in-linux-linux-be5004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe5004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49137-vulnerability-in-linux-linux-be4ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49136-vulnerability-in-linux-linux-be4ff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe4ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49135-vulnerability-in-linux-linux-be4fd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49134-vulnerability-in-linux-linux-be4fd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49133-vulnerability-in-linux-linux-be4fce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982dc4522896dcbe4fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49132-vulnerability-in-linux-linux-be4fca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982dc4522896dcbe4fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49131-vulnerability-in-linux-linux-be4fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49130-vulnerability-in-linux-linux-be4fc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49129-vulnerability-in-linux-linux-be4fbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49128-vulnerability-in-linux-linux-be4fba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49127-vulnerability-in-linux-linux-be4fb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49126-vulnerability-in-linux-linux-be4fb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49125-vulnerability-in-linux-linux-be4f9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49124-vulnerability-in-linux-linux-be4f99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49123-vulnerability-in-linux-linux-be4f97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49122-vulnerability-in-linux-linux-be4f88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982cc4522896dcbe4f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49121-vulnerability-in-linux-linux-be4f80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49120-vulnerability-in-linux-linux-be4f71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49119-vulnerability-in-linux-linux-be4f67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49118-vulnerability-in-linux-linux-be4f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49117-vulnerability-in-linux-linux-be4f57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49116-vulnerability-in-linux-linux-be4f4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49115-vulnerability-in-linux-linux-be4f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982cc4522896dcbe4f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49114-vulnerability-in-linux-linux-aebf90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49113-vulnerability-in-linux-linux-be6bb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49112-vulnerability-in-linux-linux-be6bb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49111-vulnerability-in-linux-linux-be6b92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49110-vulnerability-in-linux-linux-be6b8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49109-vulnerability-in-linux-linux-be6b81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49108-vulnerability-in-linux-linux-be6b7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49107-vulnerability-in-linux-linux-be6b79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49106-vulnerability-in-linux-linux-be6b75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49105-vulnerability-in-linux-linux-be6b66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49104-vulnerability-in-linux-linux-be6b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49103-vulnerability-in-linux-linux-be6b5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49102-vulnerability-in-linux-linux-be6b54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49100-vulnerability-in-linux-linux-be6b30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49099-vulnerability-in-linux-linux-be6b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49098-vulnerability-in-linux-linux-bdd5e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49097-vulnerability-in-linux-linux-be6b28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49096-vulnerability-in-linux-linux-be6b24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49095-vulnerability-in-linux-linux-be6b20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49094-vulnerability-in-linux-linux-be6b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49093-vulnerability-in-linux-linux-be6b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49092-vulnerability-in-linux-linux-be6b14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49091-vulnerability-in-linux-linux-be6b10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49090-vulnerability-in-linux-linux-be6b0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49089-vulnerability-in-linux-linux-bdd5e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49088-vulnerability-in-linux-linux-be6af2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49087-vulnerability-in-linux-linux-be6aec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49086-vulnerability-in-linux-linux-be6ae8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49085-vulnerability-in-linux-linux-be6ae4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49084-vulnerability-in-linux-linux-be6ae0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49083-vulnerability-in-linux-linux-be6adc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49082-vulnerability-in-linux-linux-be6ad8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49081-vulnerability-in-linux-linux-be6ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49080-vulnerability-in-linux-linux-be6ad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49079-vulnerability-in-linux-linux-be6acc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49078-vulnerability-in-linux-linux-be6aa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49077-vulnerability-in-linux-linux-be6a9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982fc4522896dcbe6a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49076-vulnerability-in-linux-linux-bdd5dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49075-vulnerability-in-linux-linux-be6a9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49074-vulnerability-in-linux-linux-be6a96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49073-vulnerability-in-linux-linux-be6a87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49072-vulnerability-in-linux-linux-be6a81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49071-vulnerability-in-linux-linux-be6a7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49070-vulnerability-in-linux-linux-be6a77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49069-vulnerability-in-linux-linux-be6a68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49068-vulnerability-in-linux-linux-bdd5cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49067-vulnerability-in-linux-linux-be6a64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49066-vulnerability-in-linux-linux-be6a47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49065-vulnerability-in-linux-linux-be6a43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49064-vulnerability-in-linux-linux-be6a3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49063-vulnerability-in-linux-linux-be6a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49062-vulnerability-in-linux-linux-be6a37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49061-vulnerability-in-linux-linux-be6a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49060-vulnerability-in-linux-linux-be6a22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49059-vulnerability-in-linux-linux-be6a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49058-vulnerability-in-linux-linux-be6a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49057-vulnerability-in-linux-linux-be6a10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49056-aeb0f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49056&amp;severity=low&amp;id=682cd0f71484d88663aeb0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49055-vulnerability-in-linux-linux-aebf8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49054-vulnerability-in-linux-linux-be69ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49053-vulnerability-in-linux-linux-aebf8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49052-vulnerability-in-linux-linux-be69e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49051-vulnerability-in-linux-linux-be69e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49050-vulnerability-in-linux-linux-be69e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49049-vulnerability-in-linux-linux-be69cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49048-vulnerability-in-linux-linux-bdd5c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49047-vulnerability-in-linux-linux-be69c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49046-vulnerability-in-linux-linux-bdd5c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49044-vulnerability-in-linux-linux-be69bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47657-vulnerability-in-linux-linux-bde1bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47656-vulnerability-in-linux-linux-be96a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47655-vulnerability-in-linux-linux-be96a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47654-vulnerability-in-linux-linux-be969f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe969f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47653-vulnerability-in-linux-linux-be969b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe969b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47652-vulnerability-in-linux-linux-be9695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47651-vulnerability-in-linux-linux-be968f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe968f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47650-vulnerability-in-linux-linux-be967a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe967a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47649-vulnerability-in-linux-linux-be9674</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47648-vulnerability-in-linux-linux-be966e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47647-vulnerability-in-linux-linux-be966a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe966a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47646-vulnerability-in-linux-linux-be965d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47645-vulnerability-in-linux-linux-be9659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47644-vulnerability-in-linux-linux-be9655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47643-vulnerability-in-linux-linux-be9648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47642-vulnerability-in-linux-linux-be9644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47641-vulnerability-in-linux-linux-be9640</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47640-vulnerability-in-linux-linux-bde19c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47639-vulnerability-in-linux-linux-be962d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe962d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47638-vulnerability-in-linux-linux-be9629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47637-vulnerability-in-linux-linux-be9625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47636-vulnerability-in-linux-linux-be9621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47635-vulnerability-in-linux-linux-be961d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe961d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47634-vulnerability-in-linux-linux-bde194</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47633-vulnerability-in-linux-linux-aebf5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47632-vulnerability-in-linux-linux-be9619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47631-vulnerability-in-linux-linux-be9615</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-26-2c9cf9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-26&amp;severity=medium&amp;id=682c7dbde8347ec82d2c9cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-26-f12df0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27239-cwe-416-use-after-free-in-zoom-comm-e9c4a7c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27239%3A%20CWE-416%20Use%20After%20Free%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20and%20SDKs&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26601-use-after-free-aeba63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26601%3A%20Use%20After%20Free&amp;severity=high&amp;id=682cd0f91484d88663aeba63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26600-use-after-free-aeba61</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26600%3A%20Use%20After%20Free&amp;severity=high&amp;id=682cd0f91484d88663aeba61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26599-access-of-uninitialized-pointer-aecc07</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26599%3A%20Access%20of%20Uninitialized%20Pointer&amp;severity=high&amp;id=682cd0fc1484d88663aecc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26598-out-of-bounds-write-aecc05</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26598%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682cd0fc1484d88663aecc05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26597-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-aecc03</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26597%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer&amp;severity=high&amp;id=682cd0fc1484d88663aecc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26596-out-of-bounds-write-aecbf6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26596%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682cd0fc1484d88663aecbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26595-stack-based-buffer-overflow-aecbf4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26595%3A%20Stack-based%20Buffer%20Overflow&amp;severity=high&amp;id=682cd0fc1484d88663aecbf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26594-use-after-free-aecbf2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26594%3A%20Use%20After%20Free&amp;severity=high&amp;id=682cd0fc1484d88663aecbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26995-missing-authorization-in-anton-vany-0fe26bce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26995%3A%20Missing%20Authorization%20in%20Anton%20Vanyukov%20Market%20Exporter&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26993-improper-neutralization-of-input-du-ad1f20ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26993%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26991-improper-neutralization-of-input-du-c9f783ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26991%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ollybach%20WPPizza&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26983-missing-authorization-in-wpzoom-rec-0e08d5c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26983%3A%20Missing%20Authorization%20in%20WPZOOM%20Recipe%20Card%20Blocks%20for%20Gutenberg%20%26%20Elementor&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26981-improper-neutralization-of-input-du-8e01af06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26981%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20accessiBe%20Web%20Accessibility%20By%20accessiBe&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deecced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26980-improper-neutralization-of-input-du-b30ccf1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26980%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wired%20Impact%20Wired%20Impact%20Volunteer%20Management&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26979-improper-control-of-filename-for-in-f84ead65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26979%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Aman%20Funnel%20Builder%20by%20FunnelKit&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26977-authorization-bypass-through-user-c-3b6d8991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26977%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Ninja%20Team%20Filebird&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26975-missing-authorization-in-wp-chill-s-56c34ae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26975%3A%20Missing%20Authorization%20in%20WP%20Chill%20Strong%20Testimonials&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26974-improper-neutralization-of-special--143a01f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26974%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26971-improper-neutralization-of-special--7c095a3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26971%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26965-authorization-bypass-through-user-c-d415dc05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26965%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ameliabooking%20Amelia&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26964-improper-control-of-filename-for-in-6b2b1553</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26964%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26962-improper-neutralization-of-input-du-579ea141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Easy%20Contact%20Form%20Lite&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26960-missing-authorization-in-enituretec-35b20d19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26960%3A%20Missing%20Authorization%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26957-improper-control-of-filename-for-in-023ca19b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26957%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Deetronix%20Affiliate%20Coupons&amp;severity=null&amp;id=69cd72bee6bfc5ba1deecc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26952-improper-neutralization-of-input-du-cd25925d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26952%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Business%20Card%20Block&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26949-improper-neutralization-of-input-du-56c645de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26949%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Team%20Section%20Block&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26947-improper-neutralization-of-input-du-8e7697ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Services%20Section%20block&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26946-improper-neutralization-of-special--32448643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26946%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jgwhite33%20WP%20Yelp%20Review%20Slider&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26945-improper-neutralization-of-input-du-408d9307</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26945%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Info%20Cards&amp;severity=null&amp;id=69cd72bce6bfc5ba1deecbcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26943-improper-neutralization-of-special--f6372142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20J%C3%BCrgen%20M%C3%BCller%20Easy%20Quotes&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26939-improper-neutralization-of-input-du-63158c13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Counters%20Block&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26938-improper-neutralization-of-input-du-cf4be813</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Countdown%20Timer&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26937-improper-neutralization-of-input-du-a969e2c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Icon%20List%20Block&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26935-path-traversal-in-wpjobportal-wp-jo-3b3679e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26935%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=69cd72bbe6bfc5ba1deecba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26932-improper-control-of-filename-for-in-d47ba9f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26932%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20QuantumCloud%20ChatBot&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26931-cross-site-request-forgery-csrf-in--16ff186f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26931%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tribulant%20Software%20Tribulant%20Gallery%20Voting&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26928-missing-authorization-in-xfinitysof-e6218407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26928%3A%20Missing%20Authorization%20in%20Xfinitysoft%20Order%20Limit%20for%20WooCommerce&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26926-cross-site-request-forgery-csrf-in--28017976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26926%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fs-code%20Booknetic&amp;severity=null&amp;id=69cd72bae6bfc5ba1deecb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26915-improper-neutralization-of-special--9b852ed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26915%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PickPlugins%20Wishlist&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26913-improper-neutralization-of-input-du-656e9b87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26913%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webandprint%20AR%20For%20WordPress&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26912-improper-neutralization-of-input-du-08d6f619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26911-exposure-of-sensitive-system-inform-bbf03953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26911%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Bowo%20System%20Dashboard&amp;severity=null&amp;id=69cd72b8e6bfc5ba1deecb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26907-improper-neutralization-of-input-du-202d1cc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Estatik%20Mortgage%20Calculator%20Estatik&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26904-improper-neutralization-of-input-du-4ffd59cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gal_op%20WP%20Responsive%20Auto%20Fit%20Text&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26900-deserialization-of-untrusted-data-i-f00c8fff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26900%3A%20Deserialization%20of%20Untrusted%20Data%20in%20flexmls%20Flexmls%C2%AE%20IDX&amp;severity=null&amp;id=69cd72b5e6bfc5ba1deecabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26897-improper-neutralization-of-input-du-b3d0cb9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Baden%20List%20Related%20Attachments&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26896-improper-neutralization-of-input-du-94cf23b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26896%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vpiwigo%20PiwigoPress&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26893-improper-neutralization-of-input-du-bd979f0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kiran%20Potphode%20Easy%20Charts&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26891-improper-neutralization-of-input-du-afcd9d0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VW%20THEMES%20Ibtana&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26887-improper-neutralization-of-input-du-26a40ab3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eli%20EZ%20SQL%20Reports%20Shortcode%20Widget%20and%20DB%20Backup&amp;severity=null&amp;id=69cd72b3e6bfc5ba1deeca4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26884-improper-neutralization-of-input-du-b4e09bd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26882-improper-neutralization-of-input-du-ac92bdaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Popup%20Builder&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26881-improper-neutralization-of-input-du-e679ece9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Sticky%20Content&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26878-improper-neutralization-of-input-du-f0ea2324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patternsinthecloud%20Autoship%20Cloud%20for%20WooCommerce%20Subscription%20Products&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26877-cwe-79-improper-neutralization-of-i-f1135102</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rustaurius%20Front%20End%20Users&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26876-cwe-35-path-traversal-in-codemanas--7d838297</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26876%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20CodeManas%20Search%20with%20Typesense&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26871-missing-authorization-in-wpdevelope-0c4874c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26871%3A%20Missing%20Authorization%20in%20WPDeveloper%20Essential%20Blocks%20for%20Gutenberg&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deeca01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26868-improper-neutralization-of-input-du-f6ab933c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fastflow%20Fast%20Flow&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26753-improper-limitation-of-a-pathname-t-1d40d75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26753%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20videowhisper%20Broadcast%20Live%20Video&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26752-improper-limitation-of-a-pathname-t-66a4779e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26752%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20videowhisper%20Broadcast%20Live%20Video&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26751-improper-neutralization-of-input-du-b951f857</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20Alphabetic%20Pagination&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54444-improper-neutralization-of-input-du-23ee484d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54444%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27000-missing-authorization-in-george-pat-e2cc7a72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27000%3A%20Missing%20Authorization%20in%20George%20Pattichis%20Simple%20Photo%20Feed&amp;severity=null&amp;id=69cd72c3e6bfc5ba1deecd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26987-improper-neutralization-of-input-du-df715736</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shabti%20Kaplan%20Frontend%20Admin%20by%20DynamiApps&amp;severity=null&amp;id=69cd72c1e6bfc5ba1deeccfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1262-cwe-804-guessable-captcha-in-webfact-ff452271</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1262%3A%20CWE-804%20Guessable%20CAPTCHA%20in%20webfactory%20Advanced%20Google%20reCAPTCHA&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13695-cwe-918-server-side-request-forgery-083bd005</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13695%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Kriesi%20Enfold%20-%20Responsive%20Multi-Purpose%20Theme&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a019d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13693-cwe-284-improper-access-control-in--84b2aec0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13693%3A%20CWE-284%20Improper%20Access%20Control%20in%20Kriesi%20Enfold%20-%20Responsive%20Multi-Purpose%20Theme&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a0192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13494-cwe-352-cross-site-request-forgery--24935456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13494%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=medium&amp;id=699f6e5bb7ef31ef0b59ed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1063-cwe-200-exposure-of-sensitive-inform-ec380da6</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1063%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1128-cwe-434-unrestricted-upload-of-file--53140187</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1128%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Contact%20Forms%2C%20Quiz%2C%20Survey%2C%20Newsletter%20%26%20Payment%20Form%20Builder%20for%20WordPress&amp;severity=critical&amp;id=699f6b0eb7ef31ef0b54da4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1648-cwe-89-improper-neutralization-of-sp-bdf29de5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1648%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20yawaveadmin%20Yawave&amp;severity=high&amp;id=699f6b16b7ef31ef0b54df80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-25-2c8141</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-25&amp;severity=medium&amp;id=682c7dbde8347ec82d2c8141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-25-f1287f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f1287f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22495-cwe-78-improper-neutralization-of-s-af752dfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22495%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Eaton%20Network%20M2&amp;severity=high&amp;id=68ad8d4dad5a09ad005730d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27357-cross-site-request-forgery-csrf-in--de1e87a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Musa%20AVCI%20%C3%96nceki%20Yaz%C4%B1%20Link&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27356-missing-authorization-in-hardik-sti-b27fef93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27356%3A%20Missing%20Authorization%20in%20Hardik%20Sticky%20Header%20On%20Scroll&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27355-cross-site-request-forgery-csrf-in--e5754f2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nicolas%20GRILLET%20Woocommerce%20%E2%80%93%20Loi%20Hamon&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27353-cross-site-request-forgery-csrf-in--4b8189e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd72e2e6bfc5ba1deee940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27352-improper-neutralization-of-input-du-ef2b9bc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27351-improper-neutralization-of-input-du-36a94c99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ExpertBusinessSearch%20Local%20Search%20SEO%20Contact%20Page&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27349-cwe-79-improper-neutralization-of-i-a77ec3d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nurelm%20Get%20Posts&amp;severity=null&amp;id=688301e5ad5a09ad004d878c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27348-improper-neutralization-of-input-du-4fed8351</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20WP%20Social%20SEO%20Booster%20%E2%80%93%20Knowledge%20Graph%20Social%20Signals%20SEO&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27347-improper-neutralization-of-input-du-1d3475e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techmix%20Direct%20Checkout%20Button%20for%20WooCommerce&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27344-cross-site-request-forgery-csrf-in--8d99af7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27344%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20filipstepanov%20Phee&apos;s%20LinkPreview&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27342-cross-site-request-forgery-csrf-in--24cbe05e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20josesan%20WooCommerce%20Recargo%20de%20Equivalencia&amp;severity=null&amp;id=69cd72e0e6bfc5ba1deed2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27341-improper-neutralization-of-input-du-9ac99b68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20afzal_du%20Reactive%20Mortgage%20Calculator&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27340-cross-site-request-forgery-csrf-in--44616bff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27340%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Forge12%20Interactive%20GmbH%20F12-Profiler&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27339-cross-site-request-forgery-csrf-in--3f2c321b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27339%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Will%20Anderson%20Minimum%20Password%20Strength&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27336-cross-site-request-forgery-csrf-in--b4aab369</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27336%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Prokopenko%20%2F%20JustCoded%20Just%20Variables&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27335-cross-site-request-forgery-csrf-in--970e8d0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27335%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Free%20plug%20in%20by%20SEO%20Roma%20Auto%20Tag%20Links&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27332-cross-site-request-forgery-csrf-in--eb67da9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gmnazmul%20Smart%20Maintenance%20%26%20Countdown&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27331-improper-neutralization-of-input-du-193e41cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20S%C3%A9bastien%20Dumont%20WooCommerce%20Display%20Products%20by%20Tags&amp;severity=null&amp;id=69cd72d9e6bfc5ba1deed21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27329-improper-neutralization-of-input-du-8d241961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inlinkz%20EZ%20InLinkz%20linkup&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27328-cross-site-request-forgery-csrf-in--6041ddcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20queeez%20WP-PostRatings%20Cheater&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27327-improper-neutralization-of-input-du-fedd6acf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27327%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Winlin%20Live%20Streaming%20Video%20Player%20%E2%80%93%20by%20SRS%20Player&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26883-missing-authorization-in-bplugins-a-7c669b46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26883%3A%20Missing%20Authorization%20in%20bPlugins%20Animated%20Text%20Block&amp;severity=null&amp;id=69cd72b2e6bfc5ba1deeca20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27325-improper-neutralization-of-input-du-0147e66e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27325%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bruce%20Video.js%20HLS%20Player&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27323-improper-neutralization-of-input-du-fedfded6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jon%20Bishop%20WP%20About%20Author&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27321-cross-site-request-forgery-csrf-in--2740c4c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27321%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blighty%20Blightly%20Explorer&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27320-improper-neutralization-of-input-du-c2d21f87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pankaj%20Mondal%20Profile%20Widget%20Ninja&amp;severity=null&amp;id=69cd72d2e6bfc5ba1deed0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27318-cross-site-request-forgery-csrf-in--177753ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27318%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ixiter%20Simple%20Google%20Sitemap&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27317-cross-site-request-forgery-csrf-in--94023f25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27317%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IT-RAYS%20RAYS%20Grid&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27316-cross-site-request-forgery-csrf-in--4dedad36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27316%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hosting.io%20JPG%2C%20PNG%20Compression%20and%20Optimization&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27315-cross-site-request-forgery-csrf-in--3694382e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27315%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptom%20All-In-One%20Cufon&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27312-improper-neutralization-of-special--874539db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27312%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jenst%20WP%20Sitemap&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27311-cross-site-request-forgery-csrf-in--b9841ffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27311%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20luk3thomas%20Bulk%20Content%20Creator&amp;severity=null&amp;id=69cd72cee6bfc5ba1deecfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27307-improper-neutralization-of-input-du-561f7fb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oooorgle%20Quotes%20llama&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27305-improper-neutralization-of-input-du-60dd8d53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Achal%20Jain%20Table%20of%20Contents%20Block&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27304-improper-neutralization-of-input-du-7fcff742</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27304%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelogger%20Contact%20Form%207%20Star%20Rating%20with%20font%20Awesome&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27303-improper-neutralization-of-input-du-0736b231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelogger%20Contact%20Form%207%20Star%20Rating&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27301-deserialization-of-untrusted-data-i-e968ac91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27301%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Nazmul%20Hasan%20Robin%20NHR%20Options%20Table%20Manager&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27300-deserialization-of-untrusted-data-i-d3492319</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27300%3A%20Deserialization%20of%20Untrusted%20Data%20in%20giuliopanda%20ADFO&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27298-cross-site-request-forgery-csrf-in--66bb4f7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27298%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cmstactics%20WP%20Video%20Posts&amp;severity=null&amp;id=69cd72cce6bfc5ba1deecefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27297-improper-neutralization-of-special--da144653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27297%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20guelben%20Bravo%20Search%20%26%20Replace&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deecea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27296-missing-authorization-in-revenuefle-d8d30e1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27296%3A%20Missing%20Authorization%20in%20revenueflex%20Auto%20Ad%20Inserter%20%E2%80%93%20Increase%20Google%20Adsense%20and%20Ad%20Manager%20Revenue&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deecea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27294-missing-authorization-in-platcom-wp-ef51e753</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27294%3A%20Missing%20Authorization%20in%20platcom%20WP-Asambleas&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27290-cross-site-request-forgery-csrf-in--72ee9f62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27290%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20seyyed-amir%20Erima%20Zarinpal%20Donate&amp;severity=null&amp;id=69cd72c9e6bfc5ba1deece93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27280-improper-neutralization-of-input-du-c3773c53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alobaidi%20Archive%20Page&amp;severity=null&amp;id=69cd72c7e6bfc5ba1deecdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27277-cross-site-request-forgery-csrf-in--9312269c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27277%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tiefpunkt%20Add%20Linked%20Images%20To%20Gallery&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27276-cross-site-request-forgery-csrf-in--d5aef198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27276%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lizeipe%20Photo%20Gallery%20(%20Responsive%20)&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27272-improper-control-of-filename-for-in-99895489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27272%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vinagecko%20VG%20PostCarousel&amp;severity=null&amp;id=69cd72c6e6bfc5ba1deecdd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27266-improper-neutralization-of-input-du-e167dc12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ignacio%20Perez%20Hover%20Image%20Button&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27265-improper-neutralization-of-input-du-d692dc7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aaron%20D.%20Campbell%20Google%20Maps%20for%20WordPress&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1488-cwe-601-url-redirection-to-untrusted-4562a768</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1488%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wpo365%20WPO365%20%7C%20MICROSOFT%20365%20GRAPH%20MAILER&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52926-vulnerability-in-linux-linux-be6bb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0690-out-of-bounds-write-aeb06f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0690%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0f71484d88663aeb06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-24-2cb616</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-24&amp;severity=medium&amp;id=682c7dbee8347ec82d2cb616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-24-f12131</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22635-improper-neutralization-of-input-du-fd095d21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Eventer&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22633-insertion-of-sensitive-information--6d399710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22633%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20StellarWP%20Give%20%E2%80%93%20Divi%20Donation%20Modules&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22632-improper-neutralization-of-input-du-334cba9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalsoft%20WooCommerce%20Pricing%20%E2%80%93%20Product%20Pricing&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22631-improper-neutralization-of-input-du-d472ef7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vbout%20Marketing%20Automation&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1578-sql-injection-in-phpgurukul-online-shopping-portal-aeb073</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1578%3A%20SQL%20Injection%20in%20PHPGurukul%20Online%20Shopping%20Portal&amp;severity=medium&amp;id=682cd0f71484d88663aeb073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13728-cwe-79-improper-neutralization-of-i-a6c7f3b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Accept%20Donations%20with%20PayPal%20%26%20Stripe&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-23-2cc12e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-23&amp;severity=medium&amp;id=682c7dbee8347ec82d2cc12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-23-f12eac</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26774-improper-neutralization-of-input-du-c1e8a2d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rock%20Solid%20Responsive%20Modal%20Builder%20for%20High%20Conversion%20%E2%80%93%20Easy%20Popups&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26764-missing-authorization-in-enituretec-64fcba5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26764%3A%20Missing%20Authorization%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26763-deserialization-of-untrusted-data-i-1506e6e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26763%3A%20Deserialization%20of%20Untrusted%20Data%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26760-improper-control-of-filename-for-in-496b96c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26760%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Wow-Company%20Calculator%20Builder&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27012-cross-site-request-forgery-csrf-in--43962413</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a1post%20A1POST.BG%20Shipping%20for%20Woo&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26973-improper-neutralization-of-input-du-27958563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26973%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WarfarePlugins%20Social%20Warfare&amp;severity=null&amp;id=69cd72bfe6bfc5ba1deecc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26756-improper-neutralization-of-input-du-7ac208b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grimdonkey%20Magic%20the%20Gathering%20Card%20Tooltips&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26750-missing-authorization-in-appsbd-vit-0757ba09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26750%3A%20Missing%20Authorization%20in%20appsbd%20Vitepos&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0957-cwe-79-improper-neutralization-of-in-0d767f77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0957%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20Amazon%20SES%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b6eb7ef31ef0b555615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0953-cwe-79-improper-neutralization-of-in-94c0b43f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0953%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20Sendinblue%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b6db7ef31ef0b555582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0918-cwe-79-improper-neutralization-of-in-c259b0f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0918%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20SMTP%20for%20SendGrid%20%E2%80%93%20YaySMTP&amp;severity=high&amp;id=699f6b6db7ef31ef0b555565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13869-cwe-434-unrestricted-upload-of-file-c47836d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13869%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid%20Backup%20%26%20Migration&amp;severity=high&amp;id=699f6d19b7ef31ef0b56de8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21704-vulnerability-in-linux-linux-be987b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe987b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1361-cwe-285-improper-authorization-in-ip-e6b5ca09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1361%3A%20CWE-285%20Improper%20Authorization%20in%20ip2location%20IP2Location%20Country%20Blocker&amp;severity=high&amp;id=699f6b11b7ef31ef0b54dc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13564-cwe-79-improper-neutralization-of-i-fb1d9358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Rife%20Elementor%20Extensions%20%26%20Templates&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12038-cwe-79-improper-neutralization-of-i-0ff50b95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12038%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12467-cwe-79-improper-neutralization-of-i-7ca42bf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grafreak%20Pago%20por%20Redsys&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13798-cwe-20-improper-input-validation-in-46782ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13798%3A%20CWE-20%20Improper%20Input%20Validation%20in%20pickplugins%20Post%20Grid%20and%20Gutenberg%20Blocks%20%E2%80%93%20ComboBlocks&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13474-cwe-89-improper-neutralization-of-s-0d4f801a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13474%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Purolator%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13899-cwe-502-deserialization-of-untruste-148580cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13899%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20misterpah%20Mambo%20Importer&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1510-cwe-94-improper-control-of-generatio-966a62eb</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1510%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20keesiemeijer%20Custom%20Post%20Type%20Date%20Archives&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1509-cwe-94-improper-control-of-generatio-8dca1a5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1509%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20versluis%20Show%20Me%20The%20Cookies&amp;severity=high&amp;id=699f6b14b7ef31ef0b54de44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13873-cwe-639-authorization-bypass-throug-fb7c1d50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13873%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22341-cwe-73-external-control-of-file-nam-5a9d4283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22341%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20IBM%20Watson%20Query%20on%20Cloud%20Pak%20for%20Data&amp;severity=medium&amp;id=68e0f3c4b66c7f7acdd3ea1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-22-c415fcfb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-22&amp;severity=medium&amp;id=68367c99182aa0cae2321fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-22-761935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-22&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb761935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-22-f12d8d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1403-cwe-502-deserialization-of-untrusted-3248fa64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1403%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Qiskit%20SDK&amp;severity=high&amp;id=689a2234ad5a09ad00274f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1546-os-command-injection-in-bdcom-behavi-c7dddd1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1546%3A%20OS%20Command%20Injection%20in%20BDCOM%20Behavior%20Management%20and%20Auditing%20System&amp;severity=medium&amp;id=68ae12eaad5a09ad005b31a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10222-cwe-79-improper-neutralization-of-i-6b9a9325</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10222%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benbodhi%20SVG%20Support&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13846-cwe-89-improper-neutralization-of-s-5637c0bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13846%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20azzaroco%20Indeed%20Ultimate%20Learning%20Pro&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1402-cwe-862-missing-authorization-in-the-8c1dd514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1402%3A%20CWE-862%20Missing%20Authorization%20in%20theeventscalendar%20Event%20Tickets%20and%20Registration&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13455-cwe-79-improper-neutralization-of-i-f8548149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smtm%20igumbi%20Online%20Booking&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13713-cwe-89-improper-neutralization-of-s-afc42801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13713%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpexpertsio%20WPExperts%20Square%20For%20GiveWP&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1489-cwe-79-improper-neutralization-of-in-bf0f4d58</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcelismus%20WP-Appbox&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13900-cwe-94-improper-control-of-generati-3ddf0801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13900%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20satollo%20Head%2C%20Footer%20and%20Post%20Injections&amp;severity=medium&amp;id=699f6d1bb7ef31ef0b56dfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12452-cwe-79-improper-neutralization-of-i-c4fb09e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oliverfriedmann%20Ziggeo&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13648-cwe-79-improper-neutralization-of-i-d647a886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13648%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20Maps%20for%20WP&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13353-cwe-98-improper-control-of-filename-a30907eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13353%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%20Plugin%20and%20Elementor%20Templates&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12276-cwe-89-improper-neutralization-of-s-ffd472b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12276%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13461-cwe-79-improper-neutralization-of-i-36819c30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patternsinthecloud%20Autoship%20Cloud%20for%20WooCommerce%20Subscription%20Products&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1410-cwe-79-improper-neutralization-of-in-6b6e3414</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apexws%20Events%20Calendar%20Made%20Simple%20%E2%80%93%20Pie%20Calendar&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11260-cwe-89-improper-neutralization-of-s-35bbcfee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11260%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=high&amp;id=699f6e0ab7ef31ef0b5941d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13751-cwe-79-improper-neutralization-of-i-eef9c693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%203D%20Photo%20Gallery&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a069c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13537-cwe-209-generation-of-error-message-51927db3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13537%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20ttoomey%20C9%20Blocks&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1406-cwe-79-improper-neutralization-of-in-4bbfbd8b</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20s56bouya%20Newpost%20Catch&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1407-cwe-79-improper-neutralization-of-in-b6a67844</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amothemo%20AMO%20Team%20Showcase&amp;severity=medium&amp;id=699f6b11b7ef31ef0b54dc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13672-cwe-79-improper-neutralization-of-i-299e0dc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20minicoursegenerator%20Mini%20Course%20Generator%20%7C%20Embed%20mini-courses%20and%20interactive%20content&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13379-cwe-79-improper-neutralization-of-i-f1f0e10c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ttoomey%20C9%20Admin%20Dashboard&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13818-cwe-532-insertion-of-sensitive-info-46b5d618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13818%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20genetechproducts%20Registration%20Forms%20%E2%80%93%20User%20Registration%20Forms%2C%20Invitation-Based%20Registrations%2C%20Front-end%20User%20Profile%2C%20Login%20Form%20%26%20Content%20Restriction&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13883-cwe-352-cross-site-request-forgery--4adf13b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13883%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20victorfreitas%20WPUpper%20Share%20Buttons&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56defd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13235-cwe-89-improper-neutralization-of-s-7cf26faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13235%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dotonpaper%20Pinpoint%20Booking%20System%20%E2%80%93%20%231%20WordPress%20Booking%20Plugin&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13388-cwe-79-improper-neutralization-of-i-06e1c99f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tcoder%20TCBD%20Tooltip&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-21-2cba99</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-21&amp;severity=medium&amp;id=682c7dbee8347ec82d2cba99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-21-f1318c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f1318c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24893-cwe-95-improper-neutralization-of-d-d0bf6576</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24893%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=6902eea9a7d593c9933c3428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26618-cwe-789-memory-allocation-with-exce-2a12ac8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26618%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20erlang%20otp&amp;severity=high&amp;id=6909153cc28fd46ded7bacaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0161-cwe-94-improper-control-of-generatio-5b7ce931</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0161%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20IBM%20Security%20Verify%20Access&amp;severity=high&amp;id=689a2234ad5a09ad00274f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1039-cwe-79-improper-neutralization-of-in-bf5c1b80</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonifre%20Lenix%20Leads%20Collector&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0868-cwe-95-improper-neutralization-of-di-4b4f1f36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0868%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Arc53%20DocsGPT&amp;severity=critical&amp;id=68df90890c40395553ed987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1043-cwe-918-server-side-request-forgery--b67743ae</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1043%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20awsmin%20Embed%20Any%20Document%20%E2%80%93%20Embed%20PDF%2C%20Word%2C%20PowerPoint%20and%20Excel%20Files&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1328-cwe-79-improper-neutralization-of-in-adb0434f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mrlegend1235%20Typed%20JS%3A%20A%20typewriter%20style%20animation&amp;severity=medium&amp;id=699f6b10b7ef31ef0b54dbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13792-cwe-94-improper-control-of-generati-ccf07869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13792%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ex-Themes%20WooCommerce%20Food%20-%20Restaurant%20Menu%20%26%20Food%20ordering&amp;severity=high&amp;id=699f6d15b7ef31ef0b56dc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13802-cwe-79-improper-neutralization-of-i-62a32dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwestion505%20Bandsintown%20Events&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13855-cwe-284-improper-access-control-in--990fd127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13855%3A%20CWE-284%20Improper%20Access%20Control%20in%20rabmalin%20Prime%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13476-cwe-89-improper-neutralization-of-s-4621225a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13476%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20GlobalTranz%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13753-cwe-352-cross-site-request-forgery--ed9d1d99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13753%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a06b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0866-cwe-89-improper-neutralization-of-sp-95bdd93f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0866%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20torviswesley%20Legoeso%20PDF%20Manager&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13789-cwe-502-deserialization-of-untruste-d39e0b4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13789%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20matiskiba%20ravpage&amp;severity=critical&amp;id=699f6e6fb7ef31ef0b5a0946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13748-cwe-79-improper-neutralization-of-i-a6540eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13849-cwe-79-improper-neutralization-of-i-2d5a8cbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dcurasi%20Cookie%20Notice%20Bar&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6432-cwe-79-improper-neutralization-of-in-65285307</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=medium&amp;id=699f6c03b7ef31ef0b55ef51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13520-cwe-862-missing-authorization-in-co-e0aae49a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13520%3A%20CWE-862%20Missing%20Authorization%20in%20codemenschen%20Gift%20Cards%20(Gift%20Vouchers%20and%20Packages)%20(WooCommerce%20Supported)&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1483-cwe-862-missing-authorization-in-eni-ea5e7f49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1483%3A%20CWE-862%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20GlobalTranz%20Edition&amp;severity=medium&amp;id=699f6b14b7ef31ef0b54ddb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0897-cwe-79-improper-neutralization-of-in-6b90e165</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcalc%20Modal%20Window%20%E2%80%93%20create%20popup%20modal%20window&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1064-cwe-79-improper-neutralization-of-in-1f3e4a59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xootix%20Login%2FSignup%20Popup%20(%20Inline%20Form%20%2B%20Woocommerce%20)&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13888-cwe-601-url-redirection-to-untruste-9f5bbe88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13888%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20amauric%20WPMobile.App&amp;severity=high&amp;id=699f6d19b7ef31ef0b56df05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13155-cwe-79-improper-neutralization-of-i-7e3fc677</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13155%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13445-cwe-79-improper-neutralization-of-i-2456e32a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1492-cwe-674-uncontrolled-recursion-in-wi-e2b8ec1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1492%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949d3c064ed76fb5b80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51339-na-1983732f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51339%3A%20n%2Fa&amp;severity=medium&amp;id=690a47446d939959c802221a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51338-na-be0ffb7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51338%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c802201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51337-na-74476cd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51337%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8022018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51336-na-926fc4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51336%3A%20n%2Fa&amp;severity=high&amp;id=690a47436d939959c8022013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51335-na-113ef1ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51335%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c802200e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51334-na-b60b16c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51334%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8022009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51333-na-d15b5f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51333%3A%20n%2Fa&amp;severity=high&amp;id=690a47436d939959c8022004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51332-na-c3472c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51332%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51331-na-a9ce7648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51331%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51330-na-ddd306f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51330%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51327-na-db169e1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51327%3A%20n%2Fa&amp;severity=medium&amp;id=690a47436d939959c8021ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51326-na-6f181400</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51326%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51325-na-1228f1a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51325%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51324-na-0d2a0534</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51324%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51323-na-88e66d6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51323%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51321-na-1eb971ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51321%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51320-na-565a1d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51320%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51319-na-9935cbab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51319%3A%20n%2Fa&amp;severity=high&amp;id=690a47416d939959c8021fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51318-na-a98183af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51318%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51317-na-0105b371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51317%3A%20n%2Fa&amp;severity=medium&amp;id=690a47416d939959c8021fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51316-na-d6613959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51316%3A%20n%2Fa&amp;severity=high&amp;id=690a47416d939959c8021fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51315-na-aeb225ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51315%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51314-na-d9f626db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51314%3A%20n%2Fa&amp;severity=high&amp;id=690a47406d939959c8021fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51312-na-021e14ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51312%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51311-na-25035e98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51311%3A%20n%2Fa&amp;severity=high&amp;id=690a47406d939959c8021f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51310-na-c596de9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51310%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51309-na-3665bf95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51309%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51308-na-ac74b357</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51308%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51306-na-f2bd588a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51306%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-20-2cd6ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-20&amp;severity=medium&amp;id=682c7dbee8347ec82d2cd6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-20-f12f24</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12284-cwe-269-improper-privilege-manageme-94179494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12284%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NetScaler%20Console&amp;severity=high&amp;id=69a0a43a85912abc71d6209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24989-cwe-284-improper-access-control-in--6f8364a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24989%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Power%20Pages&amp;severity=high&amp;id=68881727ad5a09ad0088bc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21355-cwe-306-missing-authentication-for--38ad52ee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21355%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20Bing&amp;severity=high&amp;id=69432f00058703ef3fc98020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0677-out-of-bounds-write-aebe5e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0677%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0f91484d88663aebe5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0624-out-of-bounds-write-aeba59</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0624%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682cd0f91484d88663aeba59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1118-trust-boundary-violation-aebe60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1118%3A%20Trust%20Boundary%20Violation&amp;severity=medium&amp;id=682cd0f91484d88663aebe60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45777-out-of-bounds-write-bda2eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45777%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682d981cc4522896dcbda2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45084-cwe-1236-improper-neutralization-of-5ea079a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45084%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20IBM%20Cognos%20Controller&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13534-cwe-89-improper-neutralization-of-s-aa308fab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13534%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f0f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13533-cwe-89-improper-neutralization-of-s-362f8fdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13533%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20USPS%20Edition&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13483-cwe-89-improper-neutralization-of-s-806613d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13483%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20SAIA%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13491-cwe-89-improper-neutralization-of-s-1afaa660</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13491%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20For%20Customers%20of%20FedEx&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13481-cwe-89-improper-neutralization-of-s-3e585702</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13481%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20R%2BL%20Carriers%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13485-cwe-89-improper-neutralization-of-s-709ea3ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13485%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20ABF%20Freight%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13479-cwe-89-improper-neutralization-of-s-75b5a8b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20SEFL%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0968-cwe-284-improper-access-control-in-x-777cea85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0968%3A%20CWE-284%20Improper%20Access%20Control%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6b6eb7ef31ef0b555627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13478-cwe-89-improper-neutralization-of-s-ac210ad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13478%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20TForce%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0916-cwe-79-improper-neutralization-of-in-44677395</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20YaySMTP%20and%20Email%20Logs%3A%20Amazon%20SES%2C%20SendGrid%2C%20Outlook%2C%20Mailgun%2C%20Brevo%2C%20Google%20and%20Any%20SMTP%20Service&amp;severity=high&amp;id=699f6b6db7ef31ef0b55555e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1075-cwe-532-insertion-of-sensitive-infor-99aaaa51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1075%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=medium&amp;id=6915d923f0c8e942cdf2749b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13489-cwe-89-improper-neutralization-of-s-b3c5acd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13489%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Old%20Dominion%20Edition&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13363-cwe-79-improper-neutralization-of-i-25867bd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adthrive%20Raptive%20Ads&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13339-cwe-352-cross-site-request-forgery--372d5bfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13339%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13364-cwe-862-missing-authorization-in-ad-38d8122e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13364%3A%20CWE-862%20Missing%20Authorization%20in%20adthrive%20Raptive%20Ads&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13336-cwe-352-cross-site-request-forgery--ff1f85f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13336%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20exeebit%20Disable%20Auto%20Updates&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13231-cwe-862-missing-authorization-in-po-122a704a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13231%3A%20CWE-862%20Missing%20Authorization%20in%20portfoliohub%20WordPress%20Portfolio%20Builder%20%E2%80%93%20Portfolio%20Gallery&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13679-cwe-79-improper-neutralization-of-i-2ae45996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13679%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simply4net%20Widget%20BUY.BOX&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13405-cwe-352-cross-site-request-forgery--933da71b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13405%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apptivo%20Apptivo%20Business%20Site%20CRM&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13592-cwe-98-improper-control-of-filename-7e30bba0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13592%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20labibahmed42%20Team%20Builder%20For%20WPBakery%20Page%20Builder(Formerly%20Visual%20Composer)&amp;severity=high&amp;id=699f6e61b7ef31ef0b59f4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13468-cwe-862-missing-authorization-in-so-825f5e1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13468%3A%20CWE-862%20Missing%20Authorization%20in%20solwininfotech%20Trash%20Duplicate%20and%20301%20Redirect&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13591-cwe-79-improper-neutralization-of-i-2f3e9256</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%20Team%20Builder%20For%20WPBakery%20Page%20Builder(Formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13736-cwe-79-improper-neutralization-of-i-ed9c07df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pure-chat%20Pure%20Chat%20%E2%80%93%20Live%20Chat%20%26%20More!&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13657-cwe-79-improper-neutralization-of-i-e1d762d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20store-locator-pro%20Store%20Locator%20Widget&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13676-cwe-89-improper-neutralization-of-s-82d9458f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13676%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wamasoftware%20Categorized%20Gallery%20Plugin&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a009a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11753-cwe-79-improper-neutralization-of-i-3f302275</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umichitswebhosting%20UMich%20OIDC%20Login&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11778-cwe-79-improper-neutralization-of-i-3394785e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11778%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20canadahelps%20CanadaHelps%20Embedded%20Donation%20Form&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11335-cwe-79-improper-neutralization-of-i-d8f0a84e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultradevs%20UltraEmbed%20%E2%80%93%20Advanced%20Iframe%20Plugin%20For%20WordPress%20with%20Gutenberg%20Block%20Included&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13462-cwe-79-improper-neutralization-of-i-85e6091c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nida78%20WP%20Wiki%20Tooltip&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12339-cwe-79-improper-neutralization-of-i-95374b90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12339%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digihood%20Digihood%20HTML%20Sitemap&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13660-cwe-79-improper-neutralization-of-i-e3122d73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13660%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robertmsiaorg%20Responsive%20Flickr%20Slideshow&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13674-cwe-79-improper-neutralization-of-i-e8c527c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20berginformatik%20Cosmic%20Blocks%20(40%2B)%20Content%20Editor%20Blocks%20Collection&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13854-cwe-284-improper-access-control-in--5ab916a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13854%3A%20CWE-284%20Improper%20Access%20Control%20in%20nicheaddons%20Education%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13711-cwe-79-improper-neutralization-of-i-73d885b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20binnyva%20Pollin&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12522-cwe-79-improper-neutralization-of-i-d612acf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yayforms%20Yay!%20Forms%20%7C%20Embed%20Custom%20Forms%2C%20Surveys%2C%20and%20Quizzes%20Easily&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13719-cwe-862-missing-authorization-in-pe-3b9d27c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13719%3A%20CWE-862%20Missing%20Authorization%20in%20peprodev%20PeproDev%20Ultimate%20Invoice&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13390-cwe-79-improper-neutralization-of-i-aeb14232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13390%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20giuliopanda%20ADFO%20%E2%80%93%20Custom%20data%20in%20admin%20dashboard&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13712-cwe-89-improper-neutralization-of-s-3c86b5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13712%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20binnyva%20Pollin&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13589-cwe-79-improper-neutralization-of-i-ae018def</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnnya23%20YouTube%20Playlists%20with%20Schema&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0865-cwe-352-cross-site-request-forgery-c-17bef11e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0865%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20debaat%20WP%20Media%20Category%20Management&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13663-cwe-79-improper-neutralization-of-i-775eea34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markodonnell%20Coaching%20Staffs&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13799-cwe-79-improper-neutralization-of-i-f96d3855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deepakkite%20User%20Private%20Files%20%E2%80%93%20File%20Upload%20%26%20Download%20Manager%20with%20Secure%20File%20Sharing&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1065-cwe-79-improper-neutralization-of-in-d76253aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=medium&amp;id=699f6b0eb7ef31ef0b54da42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1441-cwe-352-cross-site-request-forgery-c-6398b326</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1441%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b12b7ef31ef0b54dcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13443-cwe-79-improper-neutralization-of-i-28223baf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13443%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20easypromosapp%20Easypromos%20Plugin&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11582-cwe-79-improper-neutralization-of-i-4c5643c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20Subscribe2%20%E2%80%93%20Form%2C%20Email%20Subscribers%20%26%20Newsletters&amp;severity=high&amp;id=699f6e18b7ef31ef0b595126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51305-na-2ed3944d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51305%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51303-na-a388e5d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51303%3A%20n%2Fa&amp;severity=medium&amp;id=690a47406d939959c8021f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51301-na-3f979335</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51301%3A%20n%2Fa&amp;severity=high&amp;id=690a473e6d939959c8021f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51300-na-c30950f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51300%3A%20n%2Fa&amp;severity=medium&amp;id=690a473e6d939959c8021f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51299-na-6b52b31e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51299%3A%20n%2Fa&amp;severity=medium&amp;id=690a473e6d939959c8021f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51296-na-a67c8a10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51296%3A%20n%2Fa&amp;severity=medium&amp;id=690a473e6d939959c8021f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51293-n-a-in-n-a-aeb012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51293%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-19-2d18a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-19&amp;severity=medium&amp;id=682c7dbfe8347ec82d2d18a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-19-f12f45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-19&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-signals-of-trouble-multiple-russia-aligned-threat-actors-actively-targeting-signal-messenger-f0c53c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Signals%20of%20Trouble%3A%20Multiple%20Russia-Aligned%20Threat%20Actors%20Actively%20Targeting%20Signal%20Messenger&amp;severity=low&amp;id=682acdbebbaf20d303f0c53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13508-cwe-79-improper-neutralization-of-i-905b4551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masaakitanaka%20Booking%20Package&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13743-cwe-79-improper-neutralization-of-i-497f4564</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wonderplugin%20Wonder%20Video%20Embed&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22663-improper-limitation-of-a-pathname-t-3e71f21c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22663%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20videowhisper%20Paid%20Videochat%20Turnkey%20Site&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22657-missing-authorization-in-vito-peleg-17bc65de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22657%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22656-improper-control-of-filename-for-in-82581ed1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22656%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Oscar%20Alvarez%20Cookie%20Monster&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22654-unrestricted-upload-of-file-with-da-225701dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22654%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kodeshpa%20Simplified&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22650-improper-neutralization-of-input-du-64135d26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22650%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Erez%20Hadas-Sonnenschein%20Smartarget&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22645-improper-restriction-of-excessive-a-5524bb8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22645%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Rameez%20Iqbal%20Real%20Estate%20Manager&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22639-improper-neutralization-of-special--38f5450a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22639%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Techspawn%20Distance%20Rate%20Shipping%20for%20WooCommerce&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56000-incorrect-privilege-assignment-in-s-e6889e09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56000%3A%20Incorrect%20Privilege%20Assignment%20in%20SeventhQueen%20K%20Elements&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27013-missing-authorization-in-quanticala-bc3e0fb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27013%3A%20Missing%20Authorization%20in%20QuanticaLabs%20MediCenter%20-%20Health%20Medical%20Clinic&amp;severity=null&amp;id=69cd72c4e6bfc5ba1deecd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0622-use-after-free-aebe66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0622%3A%20Use%20After%20Free&amp;severity=medium&amp;id=682cd0f91484d88663aebe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45783-improper-update-of-reference-count-aecc64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45783%3A%20Improper%20Update%20of%20Reference%20Count&amp;severity=medium&amp;id=682cd0fc1484d88663aecc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45781-out-of-bounds-write-aecc62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45781%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0fc1484d88663aecc62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45776-out-of-bounds-write-aecc60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45776%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0fc1484d88663aecc60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45775-unchecked-return-value-aecc53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45775%3A%20Unchecked%20Return%20Value&amp;severity=medium&amp;id=682cd0fc1484d88663aecc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26465-detection-of-error-condition-without-action-aebe62</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26465%3A%20Detection%20of%20Error%20Condition%20Without%20Action&amp;severity=medium&amp;id=682cd0f91484d88663aebe62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45774-out-of-bounds-write-aecc51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45774%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682cd0fc1484d88663aecc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4028-improper-input-validation-f8203fd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4028%3A%20Improper%20Input%20Validation&amp;severity=low&amp;id=692013a1ce2640f942c6ad4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21703-vulnerability-in-linux-linux-be9866</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21702-vulnerability-in-linux-linux-be9862</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9834c4522896dcbe9862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13689-cwe-94-improper-control-of-generati-98b2a567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13689%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20undsgn%20Uncode%20Core&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a017c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13691-cwe-20-improper-input-validation-in-967d5f98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13691%3A%20CWE-20%20Improper%20Input%20Validation%20in%20undsgn%20Uncode&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a0186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13667-cwe-79-improper-neutralization-of-i-2dec712e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20undsgn%20Uncode&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13681-cwe-20-improper-input-validation-in-707de67c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13681%3A%20CWE-20%20Improper%20Input%20Validation%20in%20undsgn%20Uncode&amp;severity=high&amp;id=699f6e67b7ef31ef0b5a00ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0521-cwe-79-improper-neutralization-of-in-0958e20f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saadiqbal%20Post%20SMTP%20%E2%80%93%20WordPress%20SMTP%20Plugin%20with%20Email%20Logs%20and%20Mobile%20App%20for%20Failure%20Notifications%20%E2%80%93%20Gmail%20SMTP%2C%20Office%20365%2C%20Brevo%2C%20Mailgun%2C%20Amazon%20SES%20and%20more&amp;severity=high&amp;id=699f6b69b7ef31ef0b555307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13797-cwe-94-improper-control-of-generati-17d6f9b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13797%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PressLayouts%20PressMart%20-%20Modern%20Elementor%20WooCommerce%20WordPress%20Theme&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13369-cwe-89-improper-neutralization-of-s-d0affe59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13369%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20GoodLayers%20Tour%20Master%20-%20Tour%20Booking%2C%20Travel%2C%20Hotel&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13395-cwe-79-improper-neutralization-of-i-ef013590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13395%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kerryoco%20Threepress&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12860-cwe-620-unverified-password-change--86cc1e2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12860%3A%20CWE-620%20Unverified%20Password%20Change%20in%20scriptsbundle%20CarSpot%20%E2%80%93%20Dealership%20Wordpress%20Classified%20Theme&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13316-cwe-862-missing-authorization-in-ak-8ece6233</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13316%3A%20CWE-862%20Missing%20Authorization%20in%20akashmalik%20Scratch%20%26%20Win%20%E2%80%93%20Giveaways%20and%20Contests.%20Boost%20subscribers%2C%20traffic%2C%20repeat%20visits%2C%20%20referrals%2C%20sales%20and%20more&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13718-cwe-352-cross-site-request-forgery--931073c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13718%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpdesk%20Flexible%20Wishlist%20for%20WooCommerce%20%E2%80%93%20Ecommerce%20Wishlist%20%26%20Save%20for%20later&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13575-cwe-79-improper-neutralization-of-i-5cb87946</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Web%20Stories%20Enhancer%20%E2%80%93%20Level%20Up%20Your%20Web%20Stories&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0864-cwe-79-improper-neutralization-of-in-d26cde5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0864%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Use%20constructor%20to%20create%20tables&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13795-cwe-352-cross-site-request-forgery--3cfa2129</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13795%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ecwid%20Ecwid%20by%20Lightspeed%20Ecommerce%20Shopping%20Cart&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13465-cwe-79-improper-neutralization-of-i-62686dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tusharimran%20aBlocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11895-cwe-79-improper-neutralization-of-i-9b7f2e64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Payments%20%E2%80%93%20Get%20Paid%20with%20PayPal%2C%20Square%20%26%20Stripe&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13704-cwe-80-improper-neutralization-of-s-86940488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13704%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themepoints%20Super%20Testimonials&amp;severity=high&amp;id=699f6e69b7ef31ef0b5a02fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11376-cwe-79-improper-neutralization-of-i-40acf8c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59483c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13523-cwe-352-cross-site-request-forgery--7bd31ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13523%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shenyanzhi%20MemorialDay&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13315-cwe-352-cross-site-request-forgery--c99cfe6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shopwarden%20Shopwarden%20%E2%80%93%20Automated%20WooCommerce%20monitoring%20%26%20testing&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13556-cwe-862-missing-authorization-in-we-ec34cfa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13556%3A%20CWE-862%20Missing%20Authorization%20in%20wecantrack%20Affiliate%20Links%3A%20WordPress%20Plugin%20for%20Link%20Cloaking%20and%20Link%20Management&amp;severity=high&amp;id=699f6e5fb7ef31ef0b59f20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13438-cwe-352-cross-site-request-forgery--d18f8412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13438%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20speedsize%20SpeedSize%20Image%20%26%20Video%20AI-Optimizer&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13582-cwe-79-improper-neutralization-of-i-4abb9384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%20Simple%20Pricing%20Tables%20For%20WPBakery%20Page%20Builder(Formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13609-cwe-200-exposure-of-sensitive-infor-df7d9423</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13609%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%201clickmigration%201%20Click%20WordPress%20Migration%20Plugin%20%E2%80%93%20100%25%20FREE%20for%20a%20limited%20time&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13464-cwe-79-improper-neutralization-of-i-977a596f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13464%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13565-cwe-79-improper-neutralization-of-i-9e81b58a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonback2%20Simple%20Map%20No%20Api&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13677-cwe-862-missing-authorization-in-is-cc5b55b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13677%3A%20CWE-862%20Missing%20Authorization%20in%20istmoplugins%20GetBookingsWP%20%E2%80%93%20Appointments%20Booking%20Calendar%20Plugin%20For%20WordPress&amp;severity=high&amp;id=699f6e67b7ef31ef0b5a009e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13555-cwe-352-cross-site-request-forgery--e9cdac46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13555%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%201clickmigration%201%20Click%20WordPress%20Migration%20Plugin%20%E2%80%93%20100%25%20FREE%20for%20a%20limited%20time&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13622-cwe-200-exposure-of-sensitive-infor-19137d2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13622%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20imagisol%20File%20Uploads%20Addon%20for%20WooCommerce&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13848-cwe-79-improper-neutralization-of-i-f91419fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jakob42%20Reaction%20Buttons&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13687-cwe-862-missing-authorization-in-la-cca1c355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13687%3A%20CWE-862%20Missing%20Authorization%20in%20labibahmed42%20Team%20Builder%20%E2%80%93%20Meet%20the%20Team&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a0178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13573-cwe-79-improper-neutralization-of-i-23571cb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13573%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform%20%E2%80%93%20Form%20Builder%20Lite&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12314-cwe-524-use-of-cache-containing-sen-db9ff696</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12314%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20megaoptim%20Rapid%20Cache&amp;severity=high&amp;id=699f6e36b7ef31ef0b597db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13535-cwe-209-generation-of-error-message-847ccab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13535%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20marcoingraiti%20Actionwear%20products%20sync&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13576-cwe-79-improper-neutralization-of-i-ca3c3de0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adityapatadia%20Gumlet%20Video&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13725-cwe-22-improper-limitation-of-a-pat-f2ec91a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13725%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20infusionsoft%20Keap%20Official%20Opt-in%20Forms&amp;severity=critical&amp;id=699f6e6ab7ef31ef0b5a0454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12525-cwe-79-improper-neutralization-of-i-d976dfb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12525%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeasap%20Easy%20MLS%20Listings%20Import&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13588-cwe-79-improper-neutralization-of-i-fa0bdb83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kenkwasnicki%20Simplebooklet%20PDF%20Viewer%20and%20Embedder&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13852-cwe-352-cross-site-request-forgery--d1f588d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13852%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20backie%20Option%20Editor&amp;severity=high&amp;id=699f6d19b7ef31ef0b56de6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13577-cwe-79-improper-neutralization-of-i-639472ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catssoft%20CATS%20Job%20Listings&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13540-cwe-209-generation-of-error-message-ae0f52c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13540%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20mdalabar%20WooODT%20Lite%20%E2%80%93%20Delivery%20%26%20pickup%20date%20time%20location%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12813-cwe-79-improper-neutralization-of-i-1a6203d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12813%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Open%20Hours%20%E2%80%93%20%20Easy%20Opening%20Hours&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0796-cwe-352-cross-site-request-forgery-c-8bfe695b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0796%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevin-brent%20Mortgage%20Lead%20Capture%20System&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55539c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13579-cwe-79-improper-neutralization-of-i-a5f13fa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13579%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20platcom%20WP-Asambleas&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13595-cwe-89-improper-neutralization-of-s-4cb0f229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13595%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pantherius%20Simple%20Signup%20Form&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13501-cwe-79-improper-neutralization-of-i-0c995711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20veerwest%20WP-FormAssembly&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13684-cwe-352-cross-site-request-forgery--490bd880</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13684%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shubhamgrover7256%20Reset&amp;severity=high&amp;id=699f6e67b7ef31ef0b5a00b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13578-cwe-79-improper-neutralization-of-i-e9b644db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13578%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zjhzxhz%20WP-BibTeX&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0805-cwe-79-improper-neutralization-of-in-b32afd15</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlcalc%20Mortgage%20Calculator%20%2F%20Loan%20Calculator&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b5553a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13538-cwe-209-generation-of-error-message-55ee76e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13538%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20devsmip%20BigBuy%20Dropshipping%20Connector%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13581-cwe-79-improper-neutralization-of-i-9cb4f0d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supporthost%20Simple%20Charts&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13587-cwe-79-improper-neutralization-of-i-b45c01d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softdiscover%20Zigaform%20%E2%80%93%20Price%20Calculator%20%26%20Cost%20Estimation%20Form%20Builder%20Lite&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13522-cwe-352-cross-site-request-forgery--6d7bcb6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13522%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magayo%20magayo%20Lottery%20Results&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13740-cwe-639-authorization-bypass-throug-957fd7e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13740%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13741-cwe-918-server-side-request-forgery-88ef03e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13741%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57049-na-e23ed985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57049%3A%20n%2Fa&amp;severity=critical&amp;id=698d69274b57a58fa1db4948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25473-na-46439387</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25473%3A%20n%2Fa&amp;severity=medium&amp;id=6941ae5b0d5f6f4391b0c39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22921-na-2c7c625f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22921%3A%20n%2Fa&amp;severity=medium&amp;id=69091a4fc28fd46ded81d15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22919-na-67acf0ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22919%3A%20n%2Fa&amp;severity=medium&amp;id=69091a4fc28fd46ded81d157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27113-cwe-476-null-pointer-dereference-in-75a4b032</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27113%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20xmlsoft%20libxml2&amp;severity=low&amp;id=6909153cc28fd46ded7bacb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25475-na-94c1de95</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25475%3A%20n%2Fa&amp;severity=high&amp;id=6909153cc28fd46ded7baca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25474-na-e5c68781</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25474%3A%20n%2Fa&amp;severity=medium&amp;id=6909153cc28fd46ded7baca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25472-na-fe5f9d99</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25472%3A%20n%2Fa&amp;severity=medium&amp;id=6909153bc28fd46ded7bac93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57259-cwe-193-off-by-one-error-in-denx-u--9179adaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57259%3A%20CWE-193%20Off-by-one%20Error%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57258-cwe-190-integer-overflow-or-wraparo-82363f1a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57258%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57257-cwe-674-uncontrolled-recursion-in-d-9f870cf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57257%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20denx%20U-Boot&amp;severity=low&amp;id=690908557fff0e30cee23973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57256-cwe-190-integer-overflow-or-wraparo-c218a953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57256%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee2396e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57255-cwe-190-integer-overflow-or-wraparo-d81f6306</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57255%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57254-cwe-190-integer-overflow-or-wraparo-3c1396fd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57254%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20denx%20U-Boot&amp;severity=high&amp;id=690908557fff0e30cee23964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56171-cwe-416-use-after-free-in-xmlsoft-l-51875da0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56171%3A%20CWE-416%20Use%20After%20Free%20in%20xmlsoft%20libxml2&amp;severity=high&amp;id=690908537fff0e30cee23922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24928-cwe-121-stack-based-buffer-overflow-cce572d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24928%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20xmlsoft%20libxml2&amp;severity=high&amp;id=68806268ad5a09ad0006f89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-18-a9bf971d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-18&amp;severity=medium&amp;id=68367c98182aa0cae231e1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-18-7503ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-18&amp;severity=medium&amp;id=682c7abce3e6de8ceb7503ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-18-f129a9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f129a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13879-cwe-918-server-side-request-forgery-044313e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13879%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20xwp%20Stream&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1391-improper-access-control-2dfb31a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1391%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=68b36dfcad5a09ad00944d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23845-improper-neutralization-of-input-du-424eb0e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23845%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ERA404%20ImageMeta&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23840-improper-neutralization-of-input-du-ff25b4db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webjema%20WP-NOTCAPTCHA&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26778-improper-neutralization-of-input-du-19c2d726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jordy%20Meow%20Gallery&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26775-improper-neutralization-of-input-du-d5e0be8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26775%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20BEAR&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26773-missing-authorization-in-adnan-anal-e54c98bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26773%3A%20Missing%20Authorization%20in%20Adnan%20Analytify&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26772-improper-neutralization-of-input-du-a263b15a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26771-improper-neutralization-of-input-du-0649c42a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26770-improper-neutralization-of-input-du-8055292f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Waymark&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26769-improper-neutralization-of-input-du-0c78d7d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26769%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webilia%20Inc.%20Vertex%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26758-exposure-of-sensitive-system-inform-27fe90eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26758%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20RebelCode%20Spotlight%20Social%20Media%20Feeds&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26754-improper-neutralization-of-input-du-9aab8df4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Timeline%20Block&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0924-cwe-79-improper-neutralization-of-in-1ce7aa7f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20melapress%20WP%20Activity%20Log&amp;severity=high&amp;id=699f6b6db7ef31ef0b55556c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-17-2cf031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-17&amp;severity=medium&amp;id=682c7dbee8347ec82d2cf031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-17-f130f5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26779-improper-limitation-of-a-pathname-t-7c41b6c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26779%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Fahad%20Mahmood%20Keep%20Backup%20Daily&amp;severity=null&amp;id=69cd72b0e6bfc5ba1deec9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26768-cross-site-request-forgery-csrf-in--5d8a0bbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26768%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20what3words%20what3words%20Address%20Field&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26767-improper-neutralization-of-input-du-5cd54f54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeum%20Qubely&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26766-improper-neutralization-of-input-du-5596464a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26765-missing-authorization-in-enituretec-b6a1b9ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26765%3A%20Missing%20Authorization%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26761-improper-neutralization-of-input-du-d0e7632e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Easy%20Elementor%20Addons&amp;severity=null&amp;id=69cd72afe6bfc5ba1deec9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26759-cross-site-request-forgery-csrf-in--9b73a6d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26759%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexvtn%20Content%20Snippet%20Manager&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26755-improper-neutralization-of-special--7547153c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26755%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jgwhite33%20WP%20Airbnb%20Review%20Slider&amp;severity=null&amp;id=69cd72ade6bfc5ba1deec992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23975-improper-neutralization-of-input-du-1cd6726e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cheesefather%20Botnet%20Attack%20Blocker&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee912d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22689-improper-neutralization-of-input-du-ae297f40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22689%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Levan%20Tarbor%20Forex%20Calculators&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22676-improper-neutralization-of-input-du-c5b63350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upcasted%20AWS%20S3%20for%20WordPress%20Plugin%20%E2%80%93%20Upcasted&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22291-missing-authorization-in-enituretec-6362ef1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22291%3A%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22290-improper-neutralization-of-special--88fbc0d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22290%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20FreightQuote%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22289-missing-authorization-in-enituretec-7766c6a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22289%3A%20Missing%20Authorization%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22286-improper-neutralization-of-input-du-0329b97f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22284-improper-neutralization-of-input-du-bfb6e338</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22284%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44044-improper-neutralization-of-input-du-583b1c39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44044%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandexponents%20Oshine%20Modules&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-16-42080994</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-16&amp;severity=medium&amp;id=68359c9e5d5f0974d01f9ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-16-f20062</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-16&amp;severity=medium&amp;id=682acdc3bbaf20d303f20062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-16-f12dec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13834-cwe-918-server-side-request-forgery-69a09588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13834%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20cyberchimps%20Responsive%20Plus%20%E2%80%93%20Starter%20Templates%2C%20Advanced%20Features%20and%20Customizer%20Settings%20for%20Responsive%20Theme.&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0822-cwe-23-relative-path-traversal-in-bi-e9d0d73b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0822%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20bitpressadmin%20Chat%20Widget%3A%20Customer%20Support%20Button%20with%20SMS%20Call%20Button%2C%20Click%20to%20Chat%20Messenger%2C%20Live%20Chat%20Support%20Chat%20Button%20%E2%80%93%20Bit%20Assist&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13488-cwe-89-improper-neutralization-of-s-d4f743d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13488%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Estes%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13500-cwe-89-improper-neutralization-of-s-4831b1a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13500%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6e5bb7ef31ef0b59ed8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13439-cwe-862-missing-authorization-in-te-f7e3ad27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13439%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Team%20%E2%80%93%20Team%20Members%20Showcase%20Plugin&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10581-cwe-352-cross-site-request-forgery--14752895</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10581%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20designinvento%20DirectoryPress%20Frontend&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13752-cwe-862-missing-authorization-in-we-43761d98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13752%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a06a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12562-cwe-502-deserialization-of-untruste-acc97f5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12562%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WP%20Sharks%20s2Member%20Pro&amp;severity=critical&amp;id=699f6e43b7ef31ef0b59beef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1005-cwe-79-improper-neutralization-of-in-1e273f32</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6b0db7ef31ef0b54d93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13525-cwe-200-exposure-of-sensitive-infor-61c4a041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13525%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20algoritmika%20Customer%20Email%20Verification%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59efdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0935-cwe-862-missing-authorization-in-max-37508874</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0935%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=699f6b6db7ef31ef0b555573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13563-cwe-79-improper-neutralization-of-i-6dfc5348</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13563%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13513-cwe-862-missing-authorization-in-ol-bdb1b0e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13513%3A%20CWE-862%20Missing%20Authorization%20in%20oliverpos%20Oliver%20POS%20%E2%80%93%20A%20WooCommerce%20Point%20of%20Sale%20(POS)&amp;severity=critical&amp;id=699f6e5cb7ef31ef0b59ef12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-15-2cedfe</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-15&amp;severity=medium&amp;id=682c7dbee8347ec82d2cedfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-15-f12649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21401-cwe-601-url-redirection-to-untruste-0b40a0f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21401%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432f03058703ef3fc9859c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31144-vulnerability-in-xen-project-xen-befaa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31144%3A%20Vulnerability%20in%20Xen%20Project%20Xen&amp;severity=low&amp;id=682d983ec4522896dcbefaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25290-cwe-1333-inefficient-regular-expres-2caeb344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25290%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20octokit%20request.js&amp;severity=medium&amp;id=696a7aa9b22c7ad868c5764f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13152-cwe-89-improper-neutralization-of-s-0fdc0e8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13152%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BSS%20Software%20Mobuy%20Online%20Machinery%20Monitoring%20Panel&amp;severity=critical&amp;id=68ee4921509368ccaa7248ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23905-improper-neutralization-of-input-du-944be09a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johannes%20van%20Poelgeest%20Admin%20Options%20Pages&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22705-cross-site-request-forgery-csrf-in--ba368f12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22705%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20godthor%20Disqus%20Popular%20Posts&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22702-missing-authorization-in-themegoods-a3a1ffa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22702%3A%20Missing%20Authorization%20in%20ThemeGoods%20Photography&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22698-missing-authorization-in-ability-in-88d840bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22698%3A%20Missing%20Authorization%20in%20Ability%2C%20Inc%20Accessibility%20Suite&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52500-missing-authorization-in-monetagwp--a3352553</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52500%3A%20Missing%20Authorization%20in%20monetagwp%20Monetag%20Official%20Plugin&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24692-missing-authorization-in-mcode-bulk-1e839b1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24692%3A%20Missing%20Authorization%20in%20M.Code%20Bulk%20Menu%20Edit&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24688-improper-neutralization-of-input-du-d8833de8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24688%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24700-improper-neutralization-of-input-du-be97e2fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xylus%20Themes%20WP%20Event%20Aggregator&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24699-cross-site-request-forgery-csrf-in--964aca51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24699%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20WP%20Coder&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24641-improper-neutralization-of-input-du-6338fb5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rickonline_nl%20Better%20WishList%20API&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24617-improper-neutralization-of-input-du-be0a255b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24617%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AcyMailing%20Newsletter%20Team%20AcyMailing%20SMTP%20Newsletter&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24616-improper-neutralization-of-input-du-6869cd02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UIUX%20Lab%20Uix%20Page%20Builder&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24615-improper-neutralization-of-input-du-499288b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24615%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Analytics%20Cat&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24614-improper-neutralization-of-input-du-1f7a17c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agile%20Logix%20Post%20Timeline&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24607-missing-authorization-in-northern-b-72ba51ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24607%3A%20Missing%20Authorization%20in%20Northern%20Beaches%20Websites%20IdeaPush&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24592-improper-neutralization-of-input-du-c2abe301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SysBasics%20Customize%20My%20Account%20for%20WooCommerce&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee952d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24567-insertion-of-sensitive-information--12e436b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24567%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24566-improper-neutralization-of-input-du-8836ca03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24566%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tom%C3%A1%C5%A1%20Groul%C3%ADk%20Intro%20Tour%20Tutorial%20DeepPresentation&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24565-improper-neutralization-of-input-du-3e09db55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24565%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24564-improper-neutralization-of-input-du-86c3f75a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aviplugins.com%20Contact%20Form%20With%20Shortcode&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24554-improper-neutralization-of-input-du-25541c92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awcode%20AWcode%20Toolkit&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23857-improper-neutralization-of-input-du-acd609da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SmartDataSoft%20Essential%20WP%20Real%20Estate&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23853-improper-neutralization-of-input-du-df65e38d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23853%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michelem%20NoFollow%20Free&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23851-improper-neutralization-of-input-du-7f1ca2ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Khushwant%20Singh%20Coronavirus%20(COVID-19)%20Outbreak%20Data%20Widgets&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23789-improper-neutralization-of-input-du-2b90b836</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23789%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tahminajannat%20URL%20Shortener%20%7C%20Conversion%20Tracking%20%20%7C%20AB%20Testing%20%20%7C%20WooCommerce&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee871c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23788-improper-neutralization-of-input-du-b2b0fb17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roni%20Saha%20Easy%20Filter&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23787-improper-neutralization-of-input-du-58cd6122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Foxskav%20Easy%20Bet&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23786-improper-neutralization-of-input-du-336d782c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20Email%20to%20Download&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23771-missing-authorization-in-murali-pus-f3303780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23771%3A%20Missing%20Authorization%20in%20Murali%20Push%20Notification%20for%20Post%20and%20BuddyPress&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23766-missing-authorization-in-ashamil-op-bccb8139</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23766%3A%20Missing%20Authorization%20in%20ashamil%20OPSI%20Israel%20Domestic%20Shipments&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23751-improper-neutralization-of-input-du-5d234921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Data%20Dash&amp;severity=null&amp;id=69cd722de6bfc5ba1dee856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23750-improper-neutralization-of-input-du-d145595d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devbunchuk%20Custom%20Widget%20Creator&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23748-improper-neutralization-of-input-du-550109c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Singsys%20Singsys%20-Awesome%20Gallery&amp;severity=null&amp;id=69cd722de6bfc5ba1dee855f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23742-improper-neutralization-of-input-du-40e1b977</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Podamibe%20Nepal%20Podamibe%20Twilio%20Private%20Call&amp;severity=null&amp;id=69cd722de6bfc5ba1dee854a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23658-improper-neutralization-of-input-du-90a8ec6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23658%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tauhidul%20Alam%20Advanced%20Angular%20Contact%20Form&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23657-improper-neutralization-of-input-du-29957367</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23657%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RusAlex%20WordPress-to-candidate%20for%20Salesforce%20CRM&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23655-improper-neutralization-of-input-du-98f17f96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23655%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crystalwebpro%20Contact%20Form%207%20%E2%80%93%20Paystack%20Add-on&amp;severity=null&amp;id=69cd7646e6bfc5ba1df0ae45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23653-improper-neutralization-of-input-du-60cf80b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nabeel%20Tahir%20Form%20To%20Online%20Booking&amp;severity=null&amp;id=69cd7646e6bfc5ba1df0ae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23652-improper-neutralization-of-input-du-1d108754</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23652%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fabio%20Zuanon%20Add%20custom%20content%20after%20post&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0addc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23651-improper-neutralization-of-input-du-0c395a73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamskaat%20Scroll%20Top&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23650-improper-neutralization-of-input-du-52ef1b06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23650%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razvypp%20Tidy.ro&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23648-improper-neutralization-of-input-du-6ec53fa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wjharil%20AdsMiddle&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23647-improper-neutralization-of-input-du-50f1e548</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ariagle%20WP-Clap&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0adcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23646-improper-neutralization-of-input-du-10514033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20Brooks%20Library%20Instruction%20Recorder&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0adca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23598-improper-neutralization-of-input-du-52d6f4c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20craig.edmunds%40gmail.com%20Recip.ly&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23571-improper-neutralization-of-input-du-6d56ef7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20makong%20Internal%20Links%20Generator&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23568-improper-neutralization-of-input-du-a03d34b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fredsted%20WP%20Login%20Attempt%20Log&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23534-missing-authorization-in-mark-winia-0cd81b7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23534%3A%20Missing%20Authorization%20in%20Mark%20Winiarski%20WPLingo&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23525-improper-neutralization-of-input-du-3000349f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kvvaradha%20Kv%20Compose%20Email%20From%20Dashboard&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23523-improper-neutralization-of-input-du-96139f37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23523%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoststreamsell%20HSS%20Embed%20Streaming%20Video&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23492-improper-neutralization-of-input-du-eb957a5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23492%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CantonBolo%20WordPress%20%E6%B7%98%E5%AE%9D%E5%AE%A2%E6%8F%92%E4%BB%B6&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23474-improper-neutralization-of-input-du-98983753</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23474%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mike%20Martel%20Live%20Dashboard&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0988e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23431-improper-neutralization-of-input-du-be209dde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khaninejad%20Envato%20Affiliater&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23428-improper-neutralization-of-input-du-f0588008</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arash%20Safari%20QMean%20%E2%80%93%20WordPress%20Did%20You%20Mean&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0821-cwe-89-improper-neutralization-of-sp-5164d7dd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0821%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bitpressadmin%20Chat%20Widget%3A%20Customer%20Support%20Button%20with%20SMS%20Call%20Button%2C%20Click%20to%20Chat%20Messenger%2C%20Live%20Chat%20Support%20Chat%20Button%20%E2%80%93%20Bit%20Assist&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55541d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13791-cwe-23-relative-path-traversal-in-b-cffc71c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13791%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20bitpressadmin%20Chat%20Widget%3A%20Customer%20Support%20Button%20with%20SMS%20Call%20Button%2C%20Click%20to%20Chat%20Messenger%2C%20Live%20Chat%20Support%20Chat%20Button%20%E2%80%93%20Bit%20Assist&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13735-cwe-79-improper-neutralization-of-i-1a0a7b59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nlemsieh%20HurryTimer%20%E2%80%93%20An%20Scarcity%20and%20Urgency%20Countdown%20Timer%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1298-cwe-290-authentication-bypass-by-spo-63ef08b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1298%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20TECNO%20com.transsion.carlcare&amp;severity=critical&amp;id=68ba82f2791f3b772df6594c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22630-improper-neutralization-of-special--b2e60aea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22630%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9601-cwe-79-improper-neutralization-of-in-f30bc9c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9601%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20Qubely%20%E2%80%93%20Advanced%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13692-cwe-285-improper-authorization-in-w-aeab5c09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13692%3A%20CWE-285%20Improper%20Authorization%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce%20%E2%80%93%20Return%20Management%20System%2C%20RMA%20Exchange%2C%20Wallet%20And%20Cancel%20Order%20Features&amp;severity=medium&amp;id=699f6e68b7ef31ef0b5a018a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13641-cwe-200-exposure-of-sensitive-infor-1c52b0a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13641%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpswings%20Return%20Refund%20and%20Exchange%20For%20WooCommerce%20%E2%80%93%20Return%20Management%20System%2C%20RMA%20Exchange%2C%20Wallet%20And%20Cancel%20Order%20Features&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1053-cwe-532-insertion-of-sensitive-infor-0edf72eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1053%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Brocade%20Brocade%20SANnav&amp;severity=high&amp;id=68c07ba9b6075907d2127cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-14-2d4fb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-14&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d4fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-14-f129b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f129b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26511-cwe-863-in-netapp-instaclustr-fork--d1793807</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26511%3A%20CWE-863%20in%20NetApp%20Instaclustr%20fork%20of%20Stratio&apos;s%20Cassandra-Lucene-Index%20plugin&amp;severity=high&amp;id=69727fa14623b1157c88acd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25287-cwe-79-improper-neutralization-of-i-34387eb0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25287%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lakejason0%20mediawiki-skins-Lakeus&amp;severity=medium&amp;id=687e3a12a83201eaac0f8677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21701-vulnerability-in-linux-linux-bdd2f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26539-improper-neutralization-of-input-du-886eb9bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20petkivim%20Embed%20Google%20Map&amp;severity=null&amp;id=69cd729de6bfc5ba1deec659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26538-improper-neutralization-of-input-du-cfc1207c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dan%20Rossiter%20Prezi%20Embedder&amp;severity=null&amp;id=69cd729de6bfc5ba1deec656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26582-cross-site-request-forgery-csrf-in--c127c38d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26582%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blackbam%20TinyMCE%20Advanced%20qTranslate%20fix%20editor%20problems&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26580-cross-site-request-forgery-csrf-in--a8ad5a7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26580%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Complete%20SEO%20Page%2FPost%20Specific%20Social%20Share%20Buttons&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26578-cross-site-request-forgery-csrf-in--8734ddaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26578%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mathieuhays%20Simple%20Documentation&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26577-cross-site-request-forgery-csrf-in--40565375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26577%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20daxiawp%20DX-auto-publish&amp;severity=null&amp;id=69cd72a9e6bfc5ba1deec87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26574-improper-neutralization-of-input-du-923c28c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moch%20Amir%20Google%20Drive%20WP%20Media&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26572-cross-site-request-forgery-csrf-in--bac562fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jesseheap%20WP%20PHPList&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26571-cross-site-request-forgery-csrf-in--a6fcea60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26571%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wibiya%20Wibiya%20Toolbar&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26570-cross-site-request-forgery-csrf-in--fb44709f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26570%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20uamv%20Glance%20That&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26569-cross-site-request-forgery-csrf-in--e660544e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20callmeforsox%20Post%20Thumbs&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26568-cross-site-request-forgery-csrf-in--29b1426f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jensmueller%20Easy%20Amazon%20Product%20Information&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26567-improper-neutralization-of-input-du-3cd22cdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farjana55%20Font%20Awesome%20WP&amp;severity=null&amp;id=69cd72a7e6bfc5ba1deec84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26562-cross-site-request-forgery-csrf-in--1531d8b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26562%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shambhu%20Patnaik%20RSS%20Filter&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26561-improper-neutralization-of-input-du-9f622fbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elfsight%20Elfsight%20Yottie%20Lite&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26558-improper-neutralization-of-input-du-bf06d311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mkkmail%20Aparat%20Responsive&amp;severity=null&amp;id=69cd72a5e6bfc5ba1deec77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26552-improper-neutralization-of-input-du-cec09da8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badrHan%20Naver%20Syndication%20V2&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26551-improper-neutralization-of-input-du-86cbba33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sureshdsk%20Bootstrap%20collapse&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26550-cross-site-request-forgery-csrf-in--d694db88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26550%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kunal%20Shivale%20Global%20Meta%20Keyword%20%26%20Description&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26549-cross-site-request-forgery-csrf-in--07facaca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pa1%20WP%20Html%20Page%20Sitemap&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26547-cross-site-request-forgery-csrf-in--3379ecad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26547%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nagarjunsonti%20My%20Login%20Logout%20Plugin&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26545-cross-site-request-forgery-csrf-in--c9866d36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26545%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shisuh%20Related%20Posts%20Line-up-Exactly%20by%20Milliard&amp;severity=null&amp;id=69cd72a3e6bfc5ba1deec6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26543-cross-site-request-forgery-csrf-in--433806a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pukhraj%20Suthar%20Simple%20Responsive%20Menu&amp;severity=null&amp;id=69cd729de6bfc5ba1deec662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1247-exposure-of-data-element-to-wrong-se-622f2b34</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1247%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session&amp;severity=high&amp;id=68af0c87ad5a09ad00627bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13182-cwe-288-authentication-bypass-using-336c9d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13182%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Directorybox%20Manager&amp;severity=critical&amp;id=699f6e4db7ef31ef0b59c8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21700-vulnerability-in-linux-linux-be985e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe985e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13606-cwe-200-exposure-of-sensitive-infor-d9587167</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13606%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20The%20Ultimate%20Help%20Desk%20%26%20Support%20Plugin&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13867-cwe-79-improper-neutralization-of-i-29172f79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TangibleWP%20Listivo%20-%20Classified%20Ads%20WordPress%20Theme&amp;severity=medium&amp;id=699f6d19b7ef31ef0b56de86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46910-cwe-80-improper-neutralization-of-s-88f51fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46910%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Apache%20Software%20Foundation%20Apache%20Atlas&amp;severity=high&amp;id=68f268709c34d0947f2fc052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13639-cwe-862-missing-authorization-in-ed-85fa665d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13639%3A%20CWE-862%20Missing%20Authorization%20in%20edmonparker%20Read%20More%20%26%20Accordion&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13345-cwe-94-improper-control-of-generati-3e7a56e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13345%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13346-cwe-94-improper-control-of-generati-11c5281f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13346%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0661-cwe-639-authorization-bypass-through-1a867fb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0661%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20detheme%20DethemeKit%20for%20Elementor&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55530f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10763-cwe-22-improper-limitation-of-a-pat-86590ec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10763%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ApusTheme%20Campress&amp;severity=critical&amp;id=699f6dfcb7ef31ef0b59245d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13770-cwe-502-deserialization-of-untruste-c19c3755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13770%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ThemeREX%20Puzzles%20%7C%20WP%20Magazine%20%2F%20Review%20with%20Store%20WordPress%20Theme%20%2B%20RTL&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a071b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0837-cwe-79-improper-neutralization-of-in-9a84fb3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeREX%20Puzzles%20%7C%20WP%20Magazine%20%2F%20Review%20with%20Store%20WordPress%20Theme%20%2B%20RTL&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b555429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13229-cwe-284-improper-access-control-in--236d6cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13229%3A%20CWE-284%20Improper%20Access%20Control%20in%20rankmath%20Rank%20Math%20SEO%20%E2%80%93%20AI%20SEO%20Tools%20to%20Dominate%20SEO%20Rankings&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13227-cwe-79-improper-neutralization-of-i-c3bec664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rankmath%20Rank%20Math%20SEO%20%E2%80%93%20AI%20SEO%20Tools%20to%20Dominate%20SEO%20Rankings&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13644-cwe-79-improper-neutralization-of-i-7aecce87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13644%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20for%20Elementor&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-13-2d460b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-13&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d460b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-13-f121ca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31068-denial-of-service-in-intelr-process-cd437fa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31068%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909214afe7723195e0544de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36293-denial-of-service-in-intelr-process-eedc763b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36293%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors%20with%20Intel(R)%20SGX&amp;severity=medium&amp;id=6909214afe7723195e05450a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37020-denial-of-service-in-intelr-xeonr-p-38ea3b93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37020%3A%20Denial%20of%20Service%20in%20Intel(R)%20Xeon(R)%20Processors&amp;severity=medium&amp;id=6909214cfe7723195e05453a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39805-escalation-of-privilege-in-intelr-d-390ce571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39805%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20DSA%20software&amp;severity=high&amp;id=69a0a43d85912abc71d62498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39355-denial-of-service-in-intelr-process-549c9e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39355%3A%20Denial%20of%20Service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909214cfe7723195e054552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28047-information-disclosure-in-intelr-pr-dcaca9c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28047%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=69092149fe7723195e054412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31157-information-disclosure-in-intelr-pr-1ed928f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31157%3A%20Information%20Disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909214afe7723195e0544e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39279-denial-of-service-in-intelr-process-afcdf6e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39279%3A%20Denial%20of%20Service%20in%20Intel(R)%20processors&amp;severity=medium&amp;id=6909214cfe7723195e05454e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28127-escalation-of-privilege-in-intelr-p-4a6118ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28127%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69092149fe7723195e054416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29214-escalation-of-privilege-in-intelr-p-16dd3766</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29214%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69092149fe7723195e05441f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24582-escalation-of-privilege-in-intelr-p-410a9060</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24582%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20processors&amp;severity=high&amp;id=69092148fe7723195e0543f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34440-escalation-of-privilege-in-intelr-p-d672db8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34440%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69092143fe7723195e053f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43758-escalation-of-privilege-in-intelr-p-649e59a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43758%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20processors&amp;severity=high&amp;id=69092145fe7723195e053fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31155-escalation-of-privilege-in-intelr-p-edb5ea81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31155%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=69a0a43c85912abc71d620e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37355-escalation-of-privilege-in-intelr-g-02b8c991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37355%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20Graphics%20software&amp;severity=high&amp;id=69a0a43d85912abc71d62495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31858-escalation-of-privilege-in-intelr-q-e63c7ae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31858%3A%20Escalation%20of%20Privilege%20in%20Intel(R)%20QuickAssist%20Technology%20software&amp;severity=high&amp;id=69a0a43d85912abc71d62489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0110-cwe-78-improper-neutralization-of-sp-06b7b9bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0110%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20PAN-OS%20OpenConfig%20Plugin&amp;severity=high&amp;id=69a0a44985912abc71d64ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0111-cwe-73-external-control-of-file-name-23aa1f5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0111%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=68881726ad5a09ad0088bbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0108-cwe-306-missing-authentication-for-c-ac1ae732</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0108%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=68881726ad5a09ad0088bba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1244-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-bef741</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1244%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=682d983dc4522896dcbef741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21699-vulnerability-in-linux-linux-be985a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe985a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57952-vulnerability-in-linux-linux-bdd236</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26358-cwe-20-improper-input-validation-in-fb21569e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26358%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Q-Free%20MaxTime&amp;severity=medium&amp;id=68e52419a677756fc9926600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21697-vulnerability-in-linux-linux-be9856</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21696-vulnerability-in-linux-linux-be983e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe983e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21695-vulnerability-in-linux-linux-be983a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe983a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21694-vulnerability-in-linux-linux-bdd2ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57951-vulnerability-in-linux-linux-bdd216</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10322-cwe-79-improper-neutralization-of-i-7305fa14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10322%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12386-cwe-352-cross-site-request-forgery--58a2554d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12386%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevonadonis%20WP%20Abstracts&amp;severity=high&amp;id=699f6e38b7ef31ef0b5980bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13480-cwe-89-improper-neutralization-of-s-703acaca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13480%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20For%20Customers%20of%20FedEx%20Freight&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13532-cwe-89-improper-neutralization-of-s-1ef8de37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13532%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Purolator%20Edition&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13477-cwe-89-improper-neutralization-of-s-c90db2fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13477%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0511-cwe-79-improper-neutralization-of-in-7708dd8a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0511%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uscnanbu%20Welcart%20e-Commerce&amp;severity=high&amp;id=699f6b69b7ef31ef0b5552f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10960-cwe-434-unrestricted-upload-of-file-67f4bc6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10960%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=critical&amp;id=699f6e04b7ef31ef0b5939b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12296-cwe-862-missing-authorization-in-ap-f400d6c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12296%3A%20CWE-862%20Missing%20Authorization%20in%20ApusTheme%20Apus%20Framework&amp;severity=high&amp;id=699f6e35b7ef31ef0b597cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13531-cwe-89-improper-neutralization-of-s-a6a211ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13531%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20ShipEngine%20Shipping%20Quotes&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59f013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13475-cwe-89-improper-neutralization-of-s-b8305f43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13475%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20UPS%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13437-cwe-352-cross-site-request-forgery--f0bcb428</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13437%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chuhpl%20Book%20a%20Room&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13459-cwe-79-improper-neutralization-of-i-a61d3bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeremyshapiro%20FuseDesk&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13365-cwe-434-unrestricted-upload-of-file-464e688e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13365%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20cleantalk%20Security%20%26%20Malware%20scan%20by%20CleanTalk&amp;severity=critical&amp;id=699f6e51b7ef31ef0b59e2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13490-cwe-89-improper-neutralization-of-s-634f1ec2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13490%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20XPO%20Edition&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12213-cwe-266-incorrect-privilege-assignm-55a00651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12213%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20http%3A%2F%2Fapusthemes.com%2F%20WP%20Job%20Board%20Pro&amp;severity=critical&amp;id=699f6e32b7ef31ef0b597982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13456-cwe-79-improper-neutralization-of-i-d8077e49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nmedia%20Easy%20Quiz%20Maker&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13435-cwe-89-improper-neutralization-of-s-fc808e3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13435%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iwcontribution%20Ebook%20Downloader&amp;severity=high&amp;id=699f6e57b7ef31ef0b59e8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13473-cwe-89-improper-neutralization-of-s-30fdf130</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0506-cwe-79-improper-neutralization-of-in-1354f835</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eaglethemes%20Rise%20Blocks%20%E2%80%93%20A%20Complete%20Gutenberg%20Page%20Builder&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13528-cwe-287-improper-authentication-in--55fd2791</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13528%3A%20CWE-287%20Improper%20Authentication%20in%20algoritmika%20Customer%20Email%20Verification%20for%20WooCommerce&amp;severity=high&amp;id=699f6e5eb7ef31ef0b59eff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13814-cwe-94-improper-control-of-generati-d624a8a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13814%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20LCweb%20Global%20Gallery%20-%20WordPress%20Responsive%20Gallery&amp;severity=medium&amp;id=699f6d16b7ef31ef0b56dcbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12315-cwe-922-insecure-storage-of-sensiti-2ef9e563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12315%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20smackcoders%20Export%20All%20Posts%2C%20Products%2C%20Orders%2C%20Refunds%20%26%20Users&amp;severity=high&amp;id=699f6e36b7ef31ef0b597db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13794-cwe-693-protection-mechanism-failur-3b0ca1c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13794%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20johndarrel%20WP%20Ghost%20(Hide%20My%20WP%20Ghost)%20%E2%80%93%20Security%20%26%20Firewall&amp;severity=medium&amp;id=699f6d15b7ef31ef0b56dc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13821-cwe-285-improper-authorization-in-w-045cbfcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13821%3A%20CWE-285%20Improper%20Authorization%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13601-cwe-639-authorization-bypass-throug-46f2c89a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13601%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ahmadmj%20Majestic%20Support%20%E2%80%93%20The%20Leading-Edge%20Help%20Desk%20%26%20Customer%20Support%20Plugin&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13600-cwe-200-exposure-of-sensitive-infor-978af408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13600%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ahmadmj%20Majestic%20Support%20%E2%80%93%20The%20Leading-Edge%20Help%20Desk%20%26%20Customer%20Support%20Plugin&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13714-cwe-434-unrestricted-upload-of-file-d6ca8dab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13714%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20allimages%20All-Images.ai%20%E2%80%93%20IA%20Image%20Bank%20and%20Custom%20Image%20creation&amp;severity=high&amp;id=699f6e6ab7ef31ef0b5a03d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13374-cwe-862-missing-authorization-in-jo-e01f1fc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13374%3A%20CWE-862%20Missing%20Authorization%20in%20JoomUnited%20WP%20Table%20Manager&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13654-cwe-862-missing-authorization-in-mv-93293189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13654%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20ZoxPress%20-%20The%20All-In-One%20WordPress%20News%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59feea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13656-cwe-862-missing-authorization-in-mv-4abb0757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13656%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Click%20Mag%20-%20Viral%20WordPress%20News%20Magazine%2FBlog%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59fef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13658-cwe-79-improper-neutralization-of-i-3703bf7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo-hr%20NGG%20Smart%20Image%20Search&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13665-cwe-79-improper-neutralization-of-i-7de25545</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20Admire%20Extra&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13653-cwe-862-missing-authorization-in-mv-63cb7c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13653%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20ZoxPress%20-%20The%20All-In-One%20WordPress%20News%20Theme&amp;severity=high&amp;id=699f6e65b7ef31ef0b59fee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13421-cwe-266-incorrect-privilege-assignm-a0c2229c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13421%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20contempoinc%20Real%20Estate%207%20WordPress&amp;severity=critical&amp;id=699f6e55b7ef31ef0b59e6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12164-cwe-862-missing-authorization-in-cr-81c8d080</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12164%3A%20CWE-862%20Missing%20Authorization%20in%20creativewerkdesigns%20WPSyncSheets%20Lite%20For%20WPForms%20%E2%80%93%20WPForms%20Google%20Spreadsheet%20Addon&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5976ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13800-cwe-862-missing-authorization-in-br-82a9464a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13800%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20ConvertPlus&amp;severity=high&amp;id=699f6d16b7ef31ef0b56dc24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11746-cwe-79-improper-neutralization-of-i-ca0d89dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11746%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20Discover%20the%20Best%20Woocommerce%20Product%20Brands%20Plugin%20for%20WordPress%20%E2%80%93%20Woocommerce%20Brands%20Plugin&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b5955a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13769-cwe-862-missing-authorization-in-th-2e38997b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13769%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeREX%20Puzzles%20%7C%20WP%20Magazine%20%2F%20Review%20with%20Store%20WordPress%20Theme%20%2B%20RTL&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13541-cwe-862-missing-authorization-in-ad-ab226c66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13541%3A%20CWE-862%20Missing%20Authorization%20in%20adirectory%20aDirectory%20%E2%80%93%20WordPress%20Directory%20Listing%20Plugin&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13701-cwe-79-improper-neutralization-of-i-c7088bfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stklcode%20Liveticker%20(by%20stklcode)&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13749-cwe-79-improper-neutralization-of-i-197678a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20era404%20StaffList&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0808-cwe-352-cross-site-request-forgery-c-a15f2cf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0808%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20propertyhive%20Houzez%20Property%20Feed&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b55540a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13539-cwe-209-generation-of-error-message-b321bcc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13539%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20vividcolorsjp%20AForms%20Eats&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13554-cwe-862-missing-authorization-in-wp-80854d58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13554%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0145-cwe-122-heap-based-buffer-overflow-i-8b9311de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0145%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0144-cwe-120-buffer-copy-without-checking-e57acbfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0144%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0143-cwe-787-out-of-bounds-write-in-nvidi-78164104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0143%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0142-cwe-787-out-of-bounds-write-in-nvidi-a209bfac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0142%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20nvJPEG2000&amp;severity=medium&amp;id=69a0a43885912abc71d61ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25351-n-a-in-n-a-bd6d8e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25351%3A%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-12-2d3fad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-12&amp;severity=medium&amp;id=682c7dbfe8347ec82d2d3fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-12-f12969</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31345-cwe-20-improper-input-validation-in-amd-amd-epyc-7003-processors-bf15f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31345%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Processors&amp;severity=medium&amp;id=682d9840c4522896dcbf15f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31342-cwe-20-improper-input-validation-in-amd-amd-epyc-7003-processors-bf15ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31342%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20AMD%20EPYC%E2%84%A2%207003%20Processors&amp;severity=medium&amp;id=682d9840c4522896dcbf15ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0179-cwe-20-improper-input-validation-in-amd-amd-ryzen-3000-series-desktop-processors-bf1601</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0179%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMD%20AMD%20Ryzen%E2%84%A2%203000%20Series%20Desktop%20Processors&amp;severity=high&amp;id=682d9840c4522896dcbf1601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24042-cwe-284-improper-access-control-in--1795961f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24042%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Visual%20Studio%20Code%20-%20JS%20Debug%20Extension&amp;severity=high&amp;id=69432f05058703ef3fc985ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21373-cwe-59-improper-link-resolution-bef-eaa66e24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21373%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc9855f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21414-cwe-122-heap-based-buffer-overflow--29bb435e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21414%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f05058703ef3fc985dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21322-cwe-59-improper-link-resolution-bef-bf49f17a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21322%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20PC%20Manager&amp;severity=high&amp;id=69432efe058703ef3fc97fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21254-cwe-125-out-of-bounds-read-in-micro-6fa78491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21254%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69432efe058703ef3fc97fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21216-cwe-125-out-of-bounds-read-in-micro-063cfda9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21216%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69432efe058703ef3fc97fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21212-cwe-125-out-of-bounds-read-in-micro-4aefa2c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21212%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=69432efc058703ef3fc97fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21184-cwe-122-heap-based-buffer-overflow--a7d15b6f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21184%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21181-cwe-400-uncontrolled-resource-consu-a9594891</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21181%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efa058703ef3fc97f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21179-cwe-125-out-of-bounds-read-in-micro-a3e437ee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21179%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=69432efa058703ef3fc97f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21400-cwe-285-improper-authorization-in-m-78a0360b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21400%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=69432f03058703ef3fc98599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21397-cwe-416-use-after-free-in-microsoft-0aba3281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21397%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc98596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21394-cwe-416-use-after-free-in-microsoft-252ca093</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21394%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc98593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21392-cwe-416-use-after-free-in-microsoft-32763dbc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21392%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc98590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21390-cwe-122-heap-based-buffer-overflow--6b1a3060</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21390%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc9858d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21387-cwe-416-use-after-free-in-microsoft-7d59178a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21387%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f03058703ef3fc9858a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21386-cwe-416-use-after-free-in-microsoft-fbea614a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21386%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f02058703ef3fc98574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21381-cwe-822-untrusted-pointer-dereferen-aeb93ef6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21381%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f02058703ef3fc9856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21377-cwe-73-external-control-of-file-nam-b029a0b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21377%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f02058703ef3fc98568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21371-cwe-122-heap-based-buffer-overflow--050724a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21371%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc9855a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21367-cwe-416-use-after-free-in-microsoft-d0a43e14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21367%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=69432f00058703ef3fc98029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21359-cwe-284-improper-access-control-in--1d73ef3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21359%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f00058703ef3fc98026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21358-cwe-822-untrusted-pointer-dereferen-1d95dceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21358%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f00058703ef3fc98023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21350-cwe-20-improper-input-validation-in-b183e6e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21350%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc98017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21349-cwe-287-improper-authentication-in--34ce0ed8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21349%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc98014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21347-cwe-59-improper-link-resolution-bef-cf7d3f7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21347%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc98011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21337-cwe-284-improper-access-control-in--e77a457d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21337%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=69432efe058703ef3fc97ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21198-cwe-306-missing-authentication-for--2e9b2473</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21198%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Microsoft%20HPC%20Pack%202016&amp;severity=critical&amp;id=69432efc058703ef3fc97f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21201-cwe-415-double-free-in-microsoft-wi-0343c1a9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21201%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21200-cwe-122-heap-based-buffer-overflow--5abc135d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21190-cwe-122-heap-based-buffer-overflow--947bbeef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21190%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432efc058703ef3fc97f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21410-cwe-122-heap-based-buffer-overflow--e125a748</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21410%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69432f05058703ef3fc985da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21407-cwe-122-heap-based-buffer-overflow--c6b0c3a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21407%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f03058703ef3fc985a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21406-cwe-416-use-after-free-in-microsoft-d25a7f30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21406%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f03058703ef3fc985a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21208-cwe-122-heap-based-buffer-overflow--2822546c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21208%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=69432efc058703ef3fc97fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21194-cwe-20-improper-input-validation-in-ff7e442e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21194%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Surface%20Go&amp;severity=high&amp;id=69432efc058703ef3fc97f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21259-cwe-451-user-interface-ui-misrepres-5fd02126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21259%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Outlook%20for%20Android&amp;severity=medium&amp;id=69432efe058703ef3fc97fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24039-cwe-427-uncontrolled-search-path-el-888c8ec8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24039%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=69432f05058703ef3fc985e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24036-cwe-367-time-of-check-time-of-use-t-90d27972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24036%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=69432f05058703ef3fc985e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21420-cwe-59-improper-link-resolution-bef-5c20ee61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21420%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f05058703ef3fc985e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21419-cwe-59-improper-link-resolution-bef-1b6db11d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21419%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f05058703ef3fc985e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21418-cwe-122-heap-based-buffer-overflow--544f43cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21418%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68881726ad5a09ad0088bbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21391-cwe-59-improper-link-resolution-bef-6744ec94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21391%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68881726ad5a09ad0088bbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21183-cwe-415-double-free-in-microsoft-wi-a0d24234</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21183%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69432efa058703ef3fc97f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21182-cwe-415-double-free-in-microsoft-wi-751a9027</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21182%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69432efa058703ef3fc97f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21383-cwe-125-out-of-bounds-read-in-micro-afdb624b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21383%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=69432f02058703ef3fc98571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21379-cwe-416-use-after-free-in-microsoft-438b6af3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21379%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=69432f02058703ef3fc9856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21376-cwe-362-concurrent-execution-using--d159869a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21376%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc98565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21375-cwe-20-improper-input-validation-in-04f05043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21375%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc98562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21369-cwe-122-heap-based-buffer-overflow--e73a8d9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21369%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f02058703ef3fc98557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21368-cwe-122-heap-based-buffer-overflow--9a835bb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21368%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=69432f00058703ef3fc9802c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21352-cwe-400-uncontrolled-resource-consu-3b8fe767</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21352%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=69432f00058703ef3fc9801d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21351-cwe-400-uncontrolled-resource-consu-cfa72f53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=69432f00058703ef3fc9801a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21206-cwe-427-uncontrolled-search-path-el-2b34bbb4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21206%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=69432efc058703ef3fc97fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21188-cwe-59-improper-link-resolution-bef-1164187a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21188%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Network%20Watcher%20VM%20Extension&amp;severity=medium&amp;id=69432efc058703ef3fc97f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24414-cross-site-scripting-stored-xss-cwe-aa5ac732</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24414%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24434-incorrect-authorization-cwe-863-in--5cc72c55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24434%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Adobe%20Commerce&amp;severity=critical&amp;id=69a0a45785912abc71d66289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24415-cross-site-scripting-stored-xss-cwe-2f733d3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24415%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d6627a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24411-improper-access-control-cwe-284-in--a87c1be2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24411%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45585912abc71d65d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24416-cross-site-scripting-stored-xss-cwe-6bf9348d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24416%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d6627d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24413-cross-site-scripting-stored-xss-cwe-e7ccf5ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24413%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24438-cross-site-scripting-stored-xss-cwe-7c3be1eb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24438%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d6628c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24418-improper-authorization-cwe-285-in-a-70c558a3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24418%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24417-cross-site-scripting-stored-xss-cwe-cdf1f1d6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24417%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45785912abc71d66280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24412-cross-site-scripting-stored-xss-cwe-15783af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24412%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45585912abc71d65d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24410-cross-site-scripting-stored-xss-cwe-2c8c9e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24410%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Commerce&amp;severity=high&amp;id=69a0a45585912abc71d65d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21160-integer-underflow-wrap-or-wraparoun-aed5dde0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21160%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a44f85912abc71d652cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21163-stack-based-buffer-overflow-cwe-121-3305ea07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21163%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a45185912abc71d65647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21159-use-after-free-cwe-416-in-adobe-ill-ed1c99dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21159%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=69a0a44f85912abc71d652cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21156-integer-underflow-wrap-or-wraparoun-6bf77e6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21156%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InCopy&amp;severity=high&amp;id=69a0a44f85912abc71d652c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21158-integer-underflow-wrap-or-wraparoun-a37b26b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21158%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21157-out-of-bounds-write-cwe-787-in-adob-c44f1baf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21157%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12756-cwe-1287-in-avaya-avaya-spaces-04bd0339</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12756%3A%20CWE-1287%20in%20Avaya%20Avaya%20Spaces&amp;severity=high&amp;id=68e0f3c3b66c7f7acdd3e9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24472-execute-unauthorized-code-or-comman-cf355135</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24472%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=68881727ad5a09ad0088bc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27781-execute-unauthorized-code-or-comman-9275f537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27781%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a2148330e0671671d0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50567-execute-unauthorized-code-or-comman-132490ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50567%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69a0a44485912abc71d63134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35279-execute-unauthorized-code-or-comman-1443be00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35279%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=69a0a43d85912abc71d62492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40591-escalation-of-privilege-in-fortinet-73216677</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40591%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=69a0a43d85912abc71d6249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50569-execute-unauthorized-code-or-comman-474d8058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50569%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=medium&amp;id=69a0a44485912abc71d63137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10644-cwe-94-improper-control-of-generati-ae87405d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10644%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ivanti%20Connect%20Secure&amp;severity=critical&amp;id=69a0a43885912abc71d61ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22467-cwe-121-stack-based-buffer-overflow-0707e2c4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22467%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=critical&amp;id=69a0a45385912abc71d656aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47908-cwe-78-improper-neutralization-of-s-18444143</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47908%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20Cloud%20Services%20Application&amp;severity=critical&amp;id=69a0a44085912abc71d63042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13506-cwe-79-improper-neutralization-of-i-83dfa0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WP%20Business%20Directory%20Plugin%20and%20Classified%20Listings%20Directory&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0862-cwe-79-improper-neutralization-of-in-7048e759</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supersaas%20SuperSaaS%20%E2%80%93%20online%20appointment%20scheduling&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23363-cwe-601-url-redirection-to-untruste-666945b9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23363%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Siemens%20Teamcenter%20V14.1&amp;severity=high&amp;id=68487f551b0bd07c3938a245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54015-cwe-1392-use-of-default-credentials-in-siemens-siprotec-5-6md84-cp300-bd66df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54015%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=high&amp;id=682d9816c4522896dcbd66df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53648-cwe-489-active-debug-code-in-siemen-77e77ea5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53648%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26411-cwe-434-unrestricted-upload-of-file-957c52f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26411%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=high&amp;id=69091e18c28fd46ded869883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26410-cwe-798-use-of-hard-coded-credentia-224292d8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26410%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=critical&amp;id=69091e18c28fd46ded86987d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26409-cwe-1299-missing-protection-mechani-e88bd6c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26409%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=medium&amp;id=69091e18c28fd46ded869877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26408-cwe-1191-on-chip-debug-and-test-int-2d6f5740</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26408%3A%20CWE-1191%20On-Chip%20Debug%20and%20Test%20Interface%20With%20Improper%20Access%20Control%20in%20Wattsense%20Wattsense%20Bridge&amp;severity=medium&amp;id=69091e18c28fd46ded869871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1181-memory-corruption-in-gnu-binutils-befae5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1181%3A%20Memory%20Corruption%20in%20GNU%20Binutils&amp;severity=medium&amp;id=682d983ec4522896dcbefae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13643-cwe-862-missing-authorization-in-mv-ff62438b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13643%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Zox%20News%20-%20Professional%20WordPress%20News%20%26%20Magazine%20Theme&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52612-cwe-79-improper-neutralization-of-i-f2a001bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=medium&amp;id=69a0a44485912abc71d6313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0181-cwe-288-authentication-bypass-using--ea901b43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0181%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0180-cwe-269-improper-privilege-managemen-d52f1364</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0180%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12599-cwe-79-improper-neutralization-of-i-727cad8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=high&amp;id=699f6e44b7ef31ef0b59c01d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1144-cwe-497-exposure-of-sensitive-system-76dac808</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1144%3A%20CWE-497%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Quanxun%20School%20Affairs%20System&amp;severity=critical&amp;id=68ae12eaad5a09ad005b319c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57000-b0b20448</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57000&amp;severity=null&amp;id=699f6bd4b7ef31ef0b55b492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-11-2d5a1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-11&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d5a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-11-f12a0e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24016-cwe-502-deserialization-of-untruste-c86cccb8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24016%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wazuh%20wazuh&amp;severity=critical&amp;id=68487f501b0bd07c39389a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24200-a-physical-attack-may-disable-usb-r-122136a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24200%3A%20A%20physical%20attack%20may%20disable%20USB%20Restricted%20Mode%20on%20a%20locked%20device.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20in%20an%20extremely%20sophisticated%20attack%20against%20specific%20targeted%20individuals.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68881727ad5a09ad0088bc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10649-cwe-306-missing-authentication-for--74ee2ac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10649%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20wandb%20wandb%2Fopenui&amp;severity=medium&amp;id=68ef9b22178f764e1f470a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13010-cwe-79-improper-neutralization-of-i-fa1983fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=medium&amp;id=699f6e4cb7ef31ef0b59c7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13011-cwe-434-unrestricted-upload-of-file-83e87d0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13011%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Chimpstudio%20WP%20Foodbakery&amp;severity=critical&amp;id=699f6e4cb7ef31ef0b59c7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27859-processing-web-content-may-lead-to--8c55e413</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27859%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb827e6bfc5ba1df6e8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54658-processing-web-content-may-lead-to--459159e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54658%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21693-vulnerability-in-linux-linux-be9832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21692-vulnerability-in-linux-linux-be982a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe982a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21691-vulnerability-in-linux-linux-be9822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21690-vulnerability-in-linux-linux-be980d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe980d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21689-vulnerability-in-linux-linux-be9809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21688-vulnerability-in-linux-linux-be9805</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21687-vulnerability-in-linux-linux-be97f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21686-aeb102</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21686&amp;severity=low&amp;id=682cd0f71484d88663aeb102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57950-vulnerability-in-linux-linux-bdeb5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24032-cwe-287-improper-authentication-in-opensc-pam-pkcs11-c0b1a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24032%3A%20CWE-287%3A%20Improper%20Authentication%20in%20OpenSC%20pam_pkcs11&amp;severity=critical&amp;id=682df6dbc4522896dcc0b1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12243-inefficient-algorithmic-complexity-aecbc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12243%3A%20Inefficient%20Algorithmic%20Complexity&amp;severity=medium&amp;id=682cd0fc1484d88663aecbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12133-inefficient-algorithmic-complexity-b3ca1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12133%3A%20Inefficient%20Algorithmic%20Complexity&amp;severity=medium&amp;id=682d0e424d7c5ea9f4b3ca1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11831-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-24150d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11831%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=682d68e7d4f2164cc924150d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57177-na-f9951c5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57177%3A%20n%2Fa&amp;severity=high&amp;id=6942d536b2cbfb3efaa86df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-10-71c2de23</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-10&amp;severity=medium&amp;id=68359c9d5d5f0974d01f5470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-10-f1d29d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-10&amp;severity=medium&amp;id=682acdc3bbaf20d303f1d29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-10-f1234a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f1234a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21685-vulnerability-in-linux-linux-be97f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21684-vulnerability-in-linux-linux-be97f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57949-vulnerability-in-linux-linux-bdd212</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-09-2d7529</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-09&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d7529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-09-f13156</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f13156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0169-cwe-79-improper-neutralization-of-in-02f0f2a3</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20DWT%20-%20Directory%20%26%20Listing%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55506c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0316-cwe-288-authentication-bypass-using--6f7a5472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0316%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Chimpstudio%20WP%20Directorybox%20Manager&amp;severity=critical&amp;id=699f6b67b7ef31ef0b55511b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13850-cwe-79-improper-neutralization-of-i-b3ceea96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ramon-fincken%20Simple%20add%20pages%20or%20posts&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56ddf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-08-2d6782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-08&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-08-f1314e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f1314e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24980-cwe-204-observable-response-discrep-4290d5d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24980%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20pimcore%20admin-ui-classic-bundle&amp;severity=medium&amp;id=696a7724b22c7ad868c428a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7425-cwe-94-improper-control-of-generatio-1a194f4d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7425%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WP%20All%20Import%20WP%20All%20Export%20Pro&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9661-cwe-352-cross-site-request-forgery-c-3691799f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9661%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55313f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7419-cwe-94-improper-control-of-generatio-fdc81f56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7419%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20WP%20All%20Import%20WP%20All%20Export%20Pro&amp;severity=high&amp;id=699f6c16b7ef31ef0b55fcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9664-cwe-502-deserialization-of-untrusted-ee4b0acd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9664%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=high&amp;id=699f6b59b7ef31ef0b554792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25167-missing-authorization-in-black-and--9f8044a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25167%3A%20Missing%20Authorization%20in%20Black%20and%20White%20BookPress%20%E2%80%93%20For%20Book%20Authors&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25168-cross-site-request-forgery-csrf-in--0cc2b977</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25168%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Black%20and%20White%20BookPress%20%E2%80%93%20For%20Book%20Authors&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25166-cross-site-request-forgery-csrf-in--7bd2b0d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25166%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gabrieldarezzo%20InLocation&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25163-improper-limitation-of-a-pathname-t-70b171e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25163%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zach%20Swetz%20Plugin%20A%2FB%20Image%20Optimizer&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25155-improper-limitation-of-a-pathname-t-a823cf94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25155%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20efreja%20Music%20Sheet%20Viewer&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25154-cross-site-request-forgery-csrf-in--4a21d4bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25154%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scweber%20Custom%20Comment%20Notifications&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25159-improper-neutralization-of-input-du-854bc23b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25159%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robert_kolatzek%20WP%20doodlez&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeaea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25160-cross-site-request-forgery-csrf-in--4c89e24f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25160%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mark%20Barnes%20Style%20Tweaker&amp;severity=null&amp;id=69cd7296e6bfc5ba1deeaf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25152-cross-site-request-forgery-csrf-in--367441fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25152%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LukaszWiecek%20Smart%20DoFollow&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25156-cross-site-request-forgery-csrf-in--7b74f30f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25156%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stanko%20Metodiev%20Quote%20Comments&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25153-cross-site-request-forgery-csrf-in--696d63eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25153%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20djjmz%20Simple%20Auto%20Tag&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25151-improper-neutralization-of-special--ee2ad124</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25151%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd7293e6bfc5ba1deeae8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25149-cross-site-request-forgery-csrf-in--2c05095f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25149%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Danillo%20Nunes%20Login-box&amp;severity=null&amp;id=69cd7291e6bfc5ba1deeada7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25141-improper-control-of-filename-for-in-49e86af6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25141%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20zankover%20Fami%20Sales%20Popup&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25143-cross-site-request-forgery-csrf-in--0b74f16e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25143%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ibasit%20GlobalQuran&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25147-cross-site-request-forgery-csrf-in--fe53a74b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25147%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phillip.Gooch%20Auto%20SEO&amp;severity=null&amp;id=69cd7291e6bfc5ba1deeada1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25138-cross-site-request-forgery-csrf-in--3969a96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25138%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rishi%20On%20Page%20SEO%20%2B%20Whatsapp%20Chat%20Button&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25135-cross-site-request-forgery-csrf-in--c2e0fa4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25135%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Victor%20Barkalov%20Custom%20Links%20On%20Admin%20Dashboard%20Toolbar&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25148-cross-site-request-forgery-csrf-in--ecbc0e98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25148%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ElbowRobo%20Read%20More%20Copy%20Link&amp;severity=null&amp;id=69cd7291e6bfc5ba1deeada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25140-cross-site-request-forgery-csrf-in--0f1ebfd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25140%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scriptonite%20Simple%20User%20Profile&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25139-cross-site-request-forgery-csrf-in--b94187a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25139%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cynob%20IT%20Consultancy%20WP%20Custom%20Post%20RSS%20Feed&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25145-cross-site-request-forgery-csrf-in--5a46b55a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25145%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jordan.hatch%20Infusionsoft%20Analytics&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25136-improper-neutralization-of-input-du-08f3ce1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25136%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shujahat21%20Optimate%20Ads&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeacf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25146-cross-site-request-forgery-csrf-in--1bd9c1d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25146%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20saleandro%20Songkick%20Concerts%20and%20Festivals&amp;severity=null&amp;id=69cd7291e6bfc5ba1deead9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25128-cross-site-request-forgery-csrf-in--b4cb2be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25128%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20orlandolac%20Facilita%20Form%20Tracker&amp;severity=null&amp;id=69cd728ee6bfc5ba1deeace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25123-cross-site-request-forgery-csrf-in--342a7ba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25123%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xdark%20Easy%20Related%20Posts&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25125-cross-site-request-forgery-csrf-in--14c4e2f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25125%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CyrilG%20Fyrebox%20Quizzes&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25116-improper-neutralization-of-special--c4c027e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25116%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sudipto%20Link%20to%20URL%20%2F%20Post&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25117-improper-neutralization-of-input-du-ef3af354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25117%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Polonski%20Smart%20Countdown%20FX&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25120-missing-authorization-in-melodic-me-b5875843</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25120%3A%20Missing%20Authorization%20in%20Melodic%20Media%20Slide%20Banners&amp;severity=null&amp;id=69cd728ce6bfc5ba1deeac51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25103-cross-site-request-forgery-csrf-in--184a3a8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bnielsen%20Indeed%20API&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25105-improper-neutralization-of-input-du-04387dcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25105%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coffeestudios%20Pop%20Up&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25101-cross-site-request-forgery-csrf-in--f4b783f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25101%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MetricThemes%20Munk%20Sites&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25107-cross-site-request-forgery-csrf-in--cbc5106b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25107%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sainwp%20OneStore%20Sites&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25106-cross-site-request-forgery-csrf-in--de73248e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25106%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FancyWP%20Starter%20Templates%20by%20FancyWP&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25097-improper-neutralization-of-input-du-6c87caf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25097%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kwiliarty%20External%20Video%20For%20Everybody&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeaba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25088-cross-site-request-forgery-csrf-in--494b1708</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25088%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blackus3r%20WP%20Keyword%20Monitor&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25110-missing-authorization-in-metagauss--f74916a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25110%3A%20Missing%20Authorization%20in%20Metagauss%20Event%20Kikfyre&amp;severity=null&amp;id=69cd728be6bfc5ba1deeabd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25081-missing-authorization-in-deannas-em-89d18005</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25081%3A%20Missing%20Authorization%20in%20DeannaS%20Embed%20RSS&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25104-cross-site-request-forgery-csrf-in--78bb1893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25104%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mraliende%20URL-Preview-Box&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeabb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25093-cross-site-request-forgery-csrf-in--9a656e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20paulswarthout%20Child%20Themes%20Helper&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25095-improper-neutralization-of-input-du-538639be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reverbnationdev%20ReverbNation%20Widgets&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25096-improper-neutralization-of-input-du-0982439d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25096%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20titusbicknell%20RSS%20in%20Page&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeab9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25085-improper-neutralization-of-input-du-9098889b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25085%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matt_mcbrien%20WP%20SimpleWeather&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25071-cross-site-request-forgery-csrf-in--2f0c7738</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25071%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20topplugins%20Vignette%20Ads&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25094-improper-neutralization-of-input-du-5c8e6e57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25094%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amitythemes.com%20Breaking%20News%20Ticker&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25080-improper-neutralization-of-input-du-f459f1b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25080%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gubbigubbi%20Kona%20Gallery%20Block&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25077-improper-neutralization-of-input-du-1b96321a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25077%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dugbug%20Easy%20Chart%20Builder%20for%20WordPress&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25075-cross-site-request-forgery-csrf-in--e0aa9a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25075%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Venugopal%20Show%20notice%20or%20message%20on%20admin%20area&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25078-improper-neutralization-of-input-du-b206f83c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25078%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrew%20Norcross%20Google%20Earth%20Embed&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25074-cross-site-request-forgery-csrf-in--6f2dc822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25074%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nirmal%20Kumar%20Ram%20WP%20Social%20Stream&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25079-improper-neutralization-of-input-du-42f5e38f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25079%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Garrett%20Grimm%20Simple%20Select%20All%20Text%20Box&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25098-improper-neutralization-of-input-du-e7cb0bf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25098%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zack%20Katz%20Links%20in%20Captions&amp;severity=null&amp;id=69cd7289e6bfc5ba1deeaba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25073-improper-neutralization-of-input-du-f74edbcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25073%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vasilis%20Triantafyllou%20Easy%20WP%20Tiles&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25082-improper-neutralization-of-input-du-f3edf623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25082%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Max%20Chirkov%20FlexIDX%20Home%20Search&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25072-cross-site-request-forgery-csrf-in--7f2bc69a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25072%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thunderbax%20WP%20Admin%20Custom%20Page&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25091-improper-neutralization-of-input-du-e39cfa15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25091%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zackdesign%20NextGen%20Cooliris%20Gallery&amp;severity=null&amp;id=69cd7288e6bfc5ba1deeab6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25076-improper-neutralization-of-input-du-c1671777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25076%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicholaswilson%20Graceful%20Email%20Obfuscation&amp;severity=null&amp;id=69cd7286e6bfc5ba1deeab39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23085-vulnerability-in-nodejs-node-bed62c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23085%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13841-cwe-639-authorization-bypass-throug-851d7273</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13841%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20daveshine%20Builder%20Shortcode%20Extras%20%E2%80%93%20WordPress%20Shortcodes%20Collection%20to%20Save%20You%20Time&amp;severity=medium&amp;id=699f6d18b7ef31ef0b56dde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13352-cwe-79-cross-site-scripting-xss-in--188bd700</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13352%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Legull&amp;severity=high&amp;id=696166b3047de42cfc9dfbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1061-cwe-288-authentication-bypass-using--cab36140</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1061%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20nextendweb%20Nextend%20Social%20Login%20Pro&amp;severity=critical&amp;id=699f6b0db7ef31ef0b54d967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-07-2d6c5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-07&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d6c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-07-f12413</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21342-cwe-843-access-of-resource-using-in-05f10f39</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21342%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=69432efe058703ef3fc97ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21408-cwe-843-access-of-resource-using-in-34cda5e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21408%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=69432f05058703ef3fc985d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21283-cwe-1222-insufficient-granularity-o-13dba3cd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21283%3A%20CWE-1222%3A%20Insufficient%20Granularity%20of%20Address%20Regions%20Protected%20by%20Register%20Locks%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432efe058703ef3fc97feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21253-cwe-451-user-interface-ui-misrepres-c0f4df47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21253%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=69432efe058703ef3fc97fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21177-cwe-918-server-side-request-forgery-96676cd6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21177%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Dynamics%20365%20Sales&amp;severity=high&amp;id=69432efa058703ef3fc97f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21279-cwe-843-access-of-resource-using-in-a07310b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21279%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432efe058703ef3fc97fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21267-cwe-358-improperly-implemented-secu-6fd9e2c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21267%3A%20CWE-358%3A%20Improperly%20Implemented%20Security%20Check%20for%20Standard%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432efe058703ef3fc97fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21404-cwe-449-the-ui-performs-the-wrong-a-67635379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21404%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=69432f03058703ef3fc9859f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47258-cwe-295-improper-certificate-valida-a44a5089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47258%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%202N%202N%20Access%20Commander&amp;severity=high&amp;id=696109bd7a8fb5c58f6e7c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47256-cwe-321-use-of-hard-coded-cryptogra-5ae24490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47256%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%202N%202N%20Access%20Commander&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13417-cwe-248-uncaught-exception-in-2n-2n-22efba1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13417%3A%20CWE-248%3A%20Uncaught%20Exception%20in%202N%202N%20OS&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13416-cwe-532-insertion-of-sensitive-info-46b157a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13416%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%202N%202N%20OS&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0994-cwe-502-deserialization-of-untrusted-a9c9a49b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0994%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Trimble%20Cityworks&amp;severity=high&amp;id=68881726ad5a09ad0088bbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0859-cwe-22-improper-limitation-of-a-path-58287c71</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0859%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20boldgrid%20Post%20and%20Page%20Builder%20by%20BoldGrid%20%E2%80%93%20Visual%20Drag%20and%20Drop%20Editor&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13487-cwe-94-improper-control-of-generati-b4bd5d2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13487%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20CURCY%20%E2%80%93%20Multi%20Currency%20for%20WooCommerce%20%E2%80%93%20The%20best%20free%20currency%20exchange%20plugin%20%E2%80%93%20Run%20smoothly%20on%20WooCommerce%209.x&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51547-cwe-312-cleartext-storage-of-sensitive-information-in-abb-aspect-enterprise-264656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51547%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20ABB%20ASPECT-Enterprise&amp;severity=critical&amp;id=682f6b520acd01a249264656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-16a69c03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=68359c9a5d5f0974d01e1095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-f13aa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f13aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-f12509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-06-6e27d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-06&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e27d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7596-cwe-290-authentication-bypass-by-spo-b8adbdbe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7596%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20IETF%20draft-ietf-intarea-gue-09&amp;severity=medium&amp;id=69091a47c28fd46ded81cf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7595-cwe-290-authentication-bypass-by-spo-be0cb818</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7595%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20IETF%20RFC2784%20-%20Generic%20Routing%20Encapsulation%20(GRE)&amp;severity=medium&amp;id=69091a47c28fd46ded81cf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23419-cwe-287-improper-authentication-in--0343618b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23419%3A%20CWE-863%20Incorrect%20Authorization%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69091a4fc28fd46ded81d16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20029-cwe-78-improper-neutralization-of-s-a67261e9</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20029%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=69a0a44b85912abc71d64b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24320-cwe-79-improper-neutralization-of-i-4d607a38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=69a0a45385912abc71d656bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23239-cwe-77-improper-neutralization-of-s-a7a6a008</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23239%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=69814899f9fa50a62f6fcdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20124-deserialization-of-untrusted-data-i-e9726ca0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20124%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=critical&amp;id=69a0a44b85912abc71d64b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-malicious-hwp-cases-of-apt37-group-dis-0b26c084</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20malicious%20HWP%20cases%20of%20&apos;APT37&apos;%20group%20distributed%20through%20K%20messenger&amp;severity=medium&amp;id=68a866f3ad5a09ad001ee057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52925-vulnerability-in-linux-linux-bdd8ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52924-vulnerability-in-linux-linux-be792c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13829-cwe-200-exposure-of-sensitive-infor-c520e4dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13829%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=medium&amp;id=699f6d17b7ef31ef0b56dd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1028-cwe-434-unrestricted-upload-of-file--d31ffdf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1028%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kleor%20Contact%20Manager&amp;severity=high&amp;id=699f6b0db7ef31ef0b54d950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57520-na-30df39bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57520%3A%20n%2Fa&amp;severity=critical&amp;id=690ca00948bc5002b401c23c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-05-2d69ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-05&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d69ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-05-f11fbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13722-cwe-79-improper-neutralization-of-i-cefe327a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Checkmk%20NagVis&amp;severity=medium&amp;id=690904b000ff46172d4a0e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13723-cwe-434-unrestricted-upload-of-file-b8166dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13723%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Checkmk%20NagVis&amp;severity=high&amp;id=690904b000ff46172d4a0e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0364-cwe-288-authentication-bypass-using--111b8f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0364%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20BigAntSoft%20BigAnt%20Server&amp;severity=critical&amp;id=691e29f04d0ffcb40bb6a615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9644-cwe-489-active-debug-code-in-four-fa-221d610c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9644%3A%20CWE-489%20Active%20Debug%20Code%20in%20Four-Faith%20F3x36&amp;severity=critical&amp;id=691e29f04d0ffcb40bb6a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9643-cwe-489-active-debug-code-in-four-fa-63472ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9643%3A%20CWE-489%20Active%20Debug%20Code%20in%20Four-Faith%20F3x36&amp;severity=critical&amp;id=692136eec842cd8eff5f2700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23690-cwe-78-improper-neutralization-of-s-b8aab35d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23690%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Netgear%20FVS336Gv3&amp;severity=high&amp;id=6921acbf8e780dcd644b6535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22794-improper-neutralization-of-input-du-b03edf99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ianhaycox%20World%20Cup%20Predictor&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22730-missing-authorization-in-ksher-thai-a2b997c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22730%3A%20Missing%20Authorization%20in%20ksher%20thailand%20Ksher&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22675-improper-neutralization-of-input-du-3cb5ec0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22675%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Alert%20Box%20Block%20%E2%80%93%20Display%20notice%2Falerts%20in%20the%20front%20end&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22674-improper-neutralization-of-input-du-c7e5f32a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Get%20Bowtied%20Product%20Blocks%20for%20WooCommerce&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22664-improper-neutralization-of-input-du-d10f0bfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22664%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=null&amp;id=69cd75ffe6bfc5ba1df08d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22662-improper-neutralization-of-input-du-4041235f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22662%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SendPulse%20SendPulse%20Email%20Marketing%20Newsletter&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22653-improper-neutralization-of-input-du-3abb3139</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tuyennv%20Music%20Press%20Pro&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22643-missing-authorization-in-famethemes-43e3771d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22643%3A%20Missing%20Authorization%20in%20famethemes%20OnePress&amp;severity=null&amp;id=69cd75fce6bfc5ba1df08bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22642-improper-neutralization-of-input-du-06770b5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22642%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rtowebsites%20Dynamic%20Conditions&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22641-improper-neutralization-of-input-du-0f95e891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Prem%20Tiwari%20FM%20Notification%20Bar&amp;severity=null&amp;id=69cd75fbe6bfc5ba1df08ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24677-improper-control-of-generation-of-c-2eca4784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24677%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpspin%20Post%2FPage%20Copying%20Tool&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24648-incorrect-privilege-assignment-in-b-92fa2bed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24648%3A%20Incorrect%20Privilege%20Assignment%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24602-improper-neutralization-of-input-du-d3a1ddd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP24%20WP24%20Domain%20Check&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24599-improper-neutralization-of-input-du-0016ae96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24598-improper-neutralization-of-input-du-33d29ebd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee953f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23645-improper-neutralization-of-input-du-a186c75a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Optimize%20Worldwide%20Find%20Content%20IDs&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22700-improper-neutralization-of-special--589f784a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22700%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler%20Code&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22699-improper-neutralization-of-special--1a22d4d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22699%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shinetheme%20Traveler%20Code&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22697-improper-neutralization-of-input-du-1c3478b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22697%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Blocks&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22696-missing-authorization-in-wpdevelope-b0196978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22696%3A%20Missing%20Authorization%20in%20WPDeveloper%20Document%20Block%20%E2%80%93%20Upload%20%26%20Embed%20Docs&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0825-cwe-113-improper-neutralization-of-crlf-sequences-in-http-headers-http-request-response-splitting-27255a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0825%3A%20CWE-113%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)&amp;severity=medium&amp;id=683072f40acd01a24927255a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1017-memory-safety-bugs-fixed-in-firefox--0e92a2a3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1017%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20135%2C%20Thunderbird%20135%2C%20Firefox%20ESR%20128.7%2C%20and%20Thunderbird%20128.7%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a49c28fd46ded81d027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1016-memory-safety-bugs-fixed-in-firefox--0cc67c68</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1016%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20135%2C%20Thunderbird%20135%2C%20Firefox%20ESR%20115.20%2C%20Firefox%20ESR%20128.7%2C%20Thunderbird%20115.20%2C%20and%20Thunderbird%20128.7%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a49c28fd46ded81d01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1014-certificate-length-was-not-properly--a7819098</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1014%3A%20Certificate%20length%20was%20not%20properly%20checked%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69091a49c28fd46ded81d016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1013-potential-opening-of-private-browsin-cc49c29c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1013%3A%20Potential%20opening%20of%20private%20browsing%20tabs%20in%20normal%20browsing%20windows%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69091a49c28fd46ded81d00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1012-use-after-free-during-concurrent-del-2885bed9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1012%3A%20Use-after-free%20during%20concurrent%20delazification%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1011-a-bug-in-webassembly-code-generation-52ca3cdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1011%3A%20A%20bug%20in%20WebAssembly%20code%20generation%20could%20result%20in%20a%20crash%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1010-use-after-free-in-custom-highlight-i-09bf6e6c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1010%3A%20Use-after-free%20in%20Custom%20Highlight%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1009-use-after-free-in-xslt-in-mozilla-fi-eb53e0bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1009%3A%20Use-after-free%20in%20XSLT%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69091a47c28fd46ded81cf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13699-cwe-79-improper-neutralization-of-i-93dd777e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40891-cwe-78-improper-neutralization-of-s-3dd50ba3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40891%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG4325-B10A%20firmware&amp;severity=high&amp;id=68f7d9b4247d717aace26a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40890-cwe-78-improper-neutralization-of-s-4af17e14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40890%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20VMG4325-B10A%20firmware&amp;severity=high&amp;id=68f7d9b4247d717aace26a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13529-cwe-862-missing-authorization-in-iq-c6c1ec65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13529%3A%20CWE-862%20Missing%20Authorization%20in%20iqonicdesign%20SocialV%20-%20Social%20Network%20and%20Community%20BuddyPress%20Theme&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59effd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13733-cwe-79-improper-neutralization-of-i-9033342b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks%20%E2%80%93%20Gutenberg%20based%20Page%20Builder&amp;severity=medium&amp;id=699f6e6cb7ef31ef0b5a0529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13356-cwe-352-cross-site-request-forgery--89a227cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13356%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mlfactory%20DSGVO%20All%20in%20one%20for%20WP&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13403-cwe-79-improper-neutralization-of-i-96d65205</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13403%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20WPForms%20%E2%80%93%20Easy%20Form%20Builder%20for%20WordPress%20%E2%80%93%20Contact%20Forms%2C%20Payment%20Forms%2C%20Surveys%2C%20%26%20More&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12046-cwe-639-authorization-bypass-throug-1e299578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12046%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Medical%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13514-cwe-284-improper-access-control-in--a12273dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13514%3A%20CWE-284%20Improper%20Access%20Control%20in%20bplugins%20B%20Slider-%20Gutenberg%20Slider%20Block%20for%20WP&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13607-cwe-639-authorization-bypass-throug-aa5a0528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13607%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20The%20Ultimate%20Help%20Desk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59f5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12597-cwe-79-improper-neutralization-of-i-a5df7df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12597%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0466-cwe-862-missing-authorization-in-sen-06796aad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0466%3A%20CWE-862%20Missing%20Authorization%20in%20Sensei%20LMS&amp;severity=medium&amp;id=68aef76ead5a09ad0061da15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-04-2d804d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-04&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d804d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-04-f12954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24902-cwe-89-improper-neutralization-of-s-c60ce45e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24902%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=critical&amp;id=68a8d773ad5a09ad00225db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12859-cwe-98-improper-control-of-filename-3ae0fad7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12859%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20PX-lab%20BoomBox%20Theme%20Extensions&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11134-cwe-862-missing-authorization-in-im-29116d6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11134%3A%20CWE-862%20Missing%20Authorization%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11132-cwe-79-improper-neutralization-of-i-5b49ef80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11133-cwe-862-missing-authorization-in-im-630dc971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11133%3A%20CWE-862%20Missing%20Authorization%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49837-cwe-129-improper-validation-of-arra-3abcb295</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49837%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a44485912abc71d63131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45569-cwe-129-improper-validation-of-arra-af7367e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45569%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=69a0a43f85912abc71d63033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24661-cwe-502-deserialization-of-untrusted-data-in-magepeople-team-taxi-booking-manager-for-woocommerce-aeb587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24661%3A%20Deserialization%20of%20Untrusted%20Data%20in%20magepeopleteam%20Taxi%20Booking%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=682cd0f81484d88663aeb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23984-improper-neutralization-of-input-du-21da8f4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23984%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Dynamic%20URL%20SEO&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee913f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22775-improper-neutralization-of-input-du-7ea78c3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22775%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20idiatech%20Catalog%20Importer%2C%20Scraper%20%26%20Crawler&amp;severity=null&amp;id=69cd760be6bfc5ba1df091d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22704-improper-neutralization-of-input-du-6068c9a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abinav%20Thakuri%20WordPress%20Signature&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22703-cross-site-request-forgery-csrf-in--c3d7765d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22703%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20manuelvicedo%20Forge%20%E2%80%93%20Front-End%20Page%20Builder&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22701-server-side-request-forgery-ssrf-in-63e31a50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22701%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20shinetheme%20Traveler%20Layout%20Essential%20For%20Elementor&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22695-authorization-bypass-through-user-c-80e5c8fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22695%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20NirWp%20Team%20Nirweb%20support&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22694-missing-authorization-in-dotstore-h-22a904b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22694%3A%20Missing%20Authorization%20in%20Dotstore%20Hide%20Shipping%20Method%20For%20WooCommerce&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22693-improper-neutralization-of-special--54cb26fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22693%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22690-cross-site-request-forgery-csrf-in--93a6722f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22690%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DigiTimber%20DigiTimber%20cPanel%20Integration&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22688-cross-site-request-forgery-csrf-in--4e368496</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22688%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ederson%20Peka%20Unlimited%20Page%20Sidebars&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22686-missing-authorization-in-westerndea-72b18279</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22686%3A%20Missing%20Authorization%20in%20WesternDeal%20CF7%20Google%20Sheets%20Connector&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22685-cross-site-request-forgery-csrf-in--70960885</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22685%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CheGevara29%20Tags%20to%20Keywords&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22684-improper-neutralization-of-input-du-84c5c8b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hakan%20Ozevin%20WP%20BASE%20Booking&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22683-improper-neutralization-of-input-du-e9db2eb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20NotificationX&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22682-improper-neutralization-of-input-du-89590c2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saeed%20Sattar%20Beglou%20Hesabfa%20Accounting&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22681-missing-authorization-in-xfinitysof-a1ff4c52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22681%3A%20Missing%20Authorization%20in%20Xfinitysoft%20Content%20Cloner&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22679-improper-neutralization-of-input-du-0d9fd6c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22677-missing-authorization-in-uiux-lab-u-acc88fc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22677%3A%20Missing%20Authorization%20in%20UIUX%20Lab%20Uix%20Shortcodes&amp;severity=null&amp;id=69cd7601e6bfc5ba1df08de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22292-improper-neutralization-of-input-du-684cb56e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Felipe%20Peixoto%20Powerful%20Auto%20Chat&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22260-missing-authorization-in-marcus-aka-17aaf447</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22260%3A%20Missing%20Authorization%20in%20Marcus%20(aka%20%40msykes)%20Meta%20Tag%20Manager&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07eac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50500-missing-authorization-in-averta-sho-e3c6e868</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50500%3A%20Missing%20Authorization%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24707-improper-neutralization-of-input-du-5c98c131</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24697-missing-authorization-in-realwebcar-bffb7aa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24697%3A%20Missing%20Authorization%20in%20Realwebcare%20Image%20Gallery%20%E2%80%93%20Responsive%20Photo%20Gallery&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24684-improper-neutralization-of-input-du-33b34c99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24684%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ederson%20Peka%20Media%20Downloader&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24676-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-umangmetatagg-custom-wp-store-locator-aeb522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20umangmetatagg%20Custom%20WP%20Store%20Locator&amp;severity=null&amp;id=682cd0f81484d88663aeb522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24660-improper-neutralization-of-input-du-6fec856a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24660%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wp.insider%20Simple%20Membership%20Custom%20Messages&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24656-improper-neutralization-of-input-du-a0307dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24656%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Realtyna%20Realtyna%20Provisioning&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24646-improper-neutralization-of-input-du-80003c4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20XML%20for%20Avito&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24643-missing-authorization-in-amentotech-48a374a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24643%3A%20Missing%20Authorization%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd7273e6bfc5ba1dee9ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24642-missing-authorization-in-theme-fund-4c497649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24642%3A%20Missing%20Authorization%20in%20theme%20funda%20Setup%20Default%20Featured%20Image&amp;severity=null&amp;id=69cd7273e6bfc5ba1dee9ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24639-insertion-of-sensitive-information--eabb7258</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24639%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Greys%20Korea%20for%20WooCommerce&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24631-improper-neutralization-of-input-du-dc9c15f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24630-improper-neutralization-of-input-du-e9047ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MantraBrain%20Sikshya%20LMS&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24629-improper-neutralization-of-input-du-69ff90de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgear%20Import%20Excel%20to%20Gravity%20Forms&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24620-improper-neutralization-of-input-du-77f0badd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hkharpreetkumar1%20AIO%20Shortcodes&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24605-improper-limitation-of-a-pathname-t-be58ac93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24605%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RealMag777%20WOLF&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24576-improper-neutralization-of-input-du-e28e3f63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Landing%20Page%20Cat&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24574-improper-neutralization-of-input-du-af8729bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepro%20Dev.%20Group%20PeproDev%20WooCommerce%20Receipt%20Uploader&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24569-improper-limitation-of-a-pathname-t-6a29b1b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24569%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RedefiningTheWeb%20PDF%20Generator%20Addon%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24559-improper-neutralization-of-input-du-359051dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24559%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24557-improper-neutralization-of-input-du-bdf81b23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24557%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20PlainInventory&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24556-insertion-of-sensitive-information--aeb164c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24556%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20DualCube%20MooWoodle&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee920e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24545-improper-neutralization-of-input-du-f5f8d117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bannersky%20BSK%20Forms%20Validation&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24544-improper-neutralization-of-input-du-a45cc10c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dashed-slug.net%20Bitcoin%20and%20Altcoin%20Wallets&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24541-improper-neutralization-of-input-du-39ef36d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dinamiko%20DK%20White%20Label&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23923-improper-neutralization-of-input-du-94fd7055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wackey%20Lockets&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23920-improper-neutralization-of-input-du-81353b88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sourcing%20Team%20ApplicantPro&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23819-improper-limitation-of-a-pathname-t-f32d65f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23819%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Marco%20Milesi%20WP%20Cloud&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23799-improper-neutralization-of-input-du-fb186c62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tubegtld%20.TUBE%20Video%20Curator&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee879e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23755-improper-neutralization-of-input-du-6970f462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tosend.it%20PAFacile&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23747-improper-neutralization-of-input-du-b3d6cac8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nitesh%20Awesome%20Timeline&amp;severity=null&amp;id=69cd722de6bfc5ba1dee855c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23685-improper-neutralization-of-input-du-50825eb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23685%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebTechGlobal%20RomanCart&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23614-improper-neutralization-of-input-du-4a3c7c98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20niksudan%20WordPress%20Additional%20Logins&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0abfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23599-improper-neutralization-of-input-du-b57cfe98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aarvansh%20Infotech%20eMarksheet&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23594-improper-neutralization-of-input-du-f842d050</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uzzal%20Mondal%20Google%20Map%20With%20Fancybox&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23593-improper-neutralization-of-input-du-ac47c1ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kvvaradha%20EmailPress&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23591-improper-neutralization-of-input-du-cfecbd8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blulogistics1%20blu%20Logistics&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23590-improper-neutralization-of-input-du-d0b2fc46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dezdy.com%20Dezdy&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23588-improper-neutralization-of-input-du-6c236e0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baonguyenyam%20WOW%20Best%20CSS%20Compiler&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23582-improper-neutralization-of-input-du-0ccbd36c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Haider%20Ali%20Bulk%20Categories%20Assign&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23581-improper-neutralization-of-input-du-94f4cdb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20Demo%20User%20DZS&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23561-improper-neutralization-of-input-du-c0f6d8f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23561%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robertkay%20MLL%20Audio%20Player%20MP3%20Ajax&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23527-missing-authorization-in-hemnathmou-32f0d8b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23527%3A%20Missing%20Authorization%20in%20hemnathmouli%20WC%20Wallet&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23491-improper-neutralization-of-input-du-bcba5eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikash%20Srivastava%20VSTEMPLATE%20Creator&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20634-cwe-787-out-of-bounds-write-in-medi-24cf9e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20634%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT6813%2C%20MT6835%2C%20MT6835T%2C%20MT6878%2C%20MT6878M%2C%20MT6879%2C%20MT6886%2C%20MT6895%2C%20MT6895TT%2C%20MT6896%2C%20MT6897%2C%20MT6899%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6983T%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6989T%2C%20MT6990%2C%20MT6991%2C%20MT8673%2C%20MT8676%2C%20MT8678%2C%20MT8795T%2C%20MT8798%2C%20MT8863&amp;severity=high&amp;id=6994829080d747be20bad133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25064-na-e27076cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25064%3A%20n%2Fa&amp;severity=high&amp;id=69a0a45985912abc71d662b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22978-na-0108ace2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22978%3A%20n%2Fa&amp;severity=critical&amp;id=696feab04623b1157c4e3b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52163-na-7d1d089f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52163%3A%20n%2Fa&amp;severity=high&amp;id=6949c5ae66e722bb4ce934e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57968-cwe-434-unrestricted-upload-of-file-cf309efa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57968%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Advantive%20VeraCore&amp;severity=critical&amp;id=68f7d9b6247d717aace26c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25181-cwe-89-improper-neutralization-of-s-0125e05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25181%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Advantive%20VeraCore&amp;severity=medium&amp;id=68881728ad5a09ad0088bc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25062-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-backdropcms-backdrop-bd7b3f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25062%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20backdropcms%20backdrop&amp;severity=medium&amp;id=682d9818c4522896dcbd7b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-03-2d8337</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-03&amp;severity=medium&amp;id=682c7dc0e8347ec82d2d8337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-03-f13aa5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f13aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-02-7646c5e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-02&amp;severity=medium&amp;id=68367c99182aa0cae232460f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13775-cwe-862-missing-authorization-in-va-63296ab9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13775%3A%20CWE-862%20Missing%20Authorization%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a0730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13612-cwe-79-improper-neutralization-of-i-9a7704fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordplus%20Better%20Messages%20%E2%80%93%20Live%20Chat%20for%20WordPress%2C%20BuddyPress%2C%20PeepSo%2C%20Ultimate%20Member%2C%20BuddyBoss&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13372-cwe-639-authorization-bypass-throug-d5465626</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13372%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13371-cwe-862-missing-authorization-in-wp-7c9023e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13371%3A%20CWE-862%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13428-cwe-639-authorization-bypass-throug-291d2b46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13428%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13425-cwe-639-authorization-bypass-throug-044e06cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13425%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13429-cwe-639-authorization-bypass-throug-5bc075ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13429%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12825-cwe-862-missing-authorization-in-br-6dbbe302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12825%3A%20CWE-862%20Missing%20Authorization%20in%20brechtvds%20Custom%20Related%20Posts&amp;severity=medium&amp;id=699f6e49b7ef31ef0b59c583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11829-cwe-79-improper-neutralization-of-i-d00c6b55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11829%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0939-cwe-862-missing-authorization-in-dco-147c0da0</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0939%3A%20CWE-862%20Missing%20Authorization%20in%20dcooperman%20MagicForm&amp;severity=medium&amp;id=699f6b6db7ef31ef0b55557a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13341-cwe-89-improper-neutralization-of-s-fec3a3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Techspawn%20MultiLoca%20-%20WooCommerce%20Multi%20Locations%20Inventory%20Management&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0365-cwe-22-improper-limitation-of-a-path-415550f4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0365%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0366-cwe-98-improper-control-of-filename--595006c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0366%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=699f6b67b7ef31ef0b555148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12041-cwe-359-exposure-of-private-persona-41b0aed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12041%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpwax%20Directorist%3A%20AI-Powered%20Business%20Directory%20Plugin%20with%20Classified%20Ads%20Listings&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12171-cwe-862-missing-authorization-in-el-11b03ad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12171%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WordPress%20HelpDesk%20%26%20Customer%20Ticketing%20System&amp;severity=high&amp;id=699f6e30b7ef31ef0b597787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13651-cwe-862-missing-authorization-in-sh-14062114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13651%3A%20CWE-862%20Missing%20Authorization%20in%20shakee93%20RapidLoad%20%E2%80%93%20Optimize%20Web%20Vitals%20Automatically&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fe06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12620-cwe-862-missing-authorization-in-cr-eaf48345</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12620%3A%20CWE-862%20Missing%20Authorization%20in%20creativeinteractivemedia%20AnimateGL%20Animations%20for%20WordPress%20%E2%80%93%20Elementor%20%26%20Gutenberg%20Blocks%20Animations&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12184-cwe-862-missing-authorization-in-ci-2fc6beed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12184%3A%20CWE-862%20Missing%20Authorization%20in%20cimatti%20WordPress%20Contact%20Forms%20by%20Cimatti&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5977a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11780-cwe-79-improper-neutralization-of-i-9be815a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dsky%20Site%20Search%20360&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b59646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13547-cwe-79-improper-neutralization-of-i-42faf125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20aThemes%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13343-cwe-269-improper-privilege-manageme-3108a832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13343%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Vanquish%20WooCommerce%20Customers%20Manager&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-01-f3fbb901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-01&amp;severity=medium&amp;id=68359c9b5d5f0974d01e66e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-01-f1884b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f1884b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-02-01-f12280</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-02-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0938-cwe-20-improper-input-validation-in-python-software-foundation-cpython-bf00a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0938%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=682d983ec4522896dcbf00a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11741-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-bd7384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11741%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Grafana%20Grafana&amp;severity=medium&amp;id=682d9817c4522896dcbd7384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24828-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf1639</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24828%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24827-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf1635</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24827%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf1635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24829-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf163d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24829%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf163d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24830-cwe-426-in-acronis-acronis-cyber-protect-cloud-agent-bf164a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24830%3A%20CWE-426%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf164a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24831-cwe-428-in-acronis-acronis-cyber-protect-cloud-agent-bf164e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24831%3A%20CWE-428%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=medium&amp;id=682d9840c4522896dcbf164e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21683-vulnerability-in-linux-linux-be97ec</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21682-vulnerability-in-linux-linux-be97e8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21681-vulnerability-in-linux-linux-bdd2d2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21680-vulnerability-in-linux-linux-be97e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21679-vulnerability-in-linux-linux-be97e0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21678-vulnerability-in-linux-linux-be97cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21677-vulnerability-in-linux-linux-be97c0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21676-vulnerability-in-linux-linux-be97bc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21675-vulnerability-in-linux-linux-be97b8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21674-vulnerability-in-linux-linux-be97b4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21673-vulnerability-in-linux-linux-bdd2ce</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21672-vulnerability-in-linux-linux-be97b0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe97b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21671-vulnerability-in-linux-linux-be97ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21670-vulnerability-in-linux-linux-be97a8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21669-vulnerability-in-linux-linux-be97a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21668-vulnerability-in-linux-linux-be97a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe97a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21667-vulnerability-in-linux-linux-be9784</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21666-vulnerability-in-linux-linux-be9780</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21665-vulnerability-in-linux-linux-be977c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe977c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57948-vulnerability-in-linux-linux-bdeb57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12037-cwe-79-improper-neutralization-of-i-2b153d74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13662-cwe-79-improper-neutralization-of-i-30512c8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vernonsystems%20eHive%20Objects%20Image%20Grid&amp;severity=medium&amp;id=699f6e66b7ef31ef0b59ffa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12415-cwe-94-improper-control-of-generati-22c74bde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12415%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20quantumcloud%20AI%20Infographic%20Maker&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b59821e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12267-cwe-73-external-control-of-file-nam-31dec27f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12267%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13472-cwe-94-improper-control-of-generati-ee2897f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13472%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wcproducttable%20WooCommerce%20Product%20Table%20Lite&amp;severity=high&amp;id=699f6e59b7ef31ef0b59ec34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24718-improper-neutralization-of-input-du-40626449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24710-improper-neutralization-of-input-du-ca92aaa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcel%20Pol%20Gwolle%20Guestbook&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24686-improper-neutralization-of-input-du-2976798b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24686%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metagauss%20RegistrationMagic&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24635-improper-neutralization-of-input-du-c49324d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20integrationdevpaytm%20Paytm%20Payment%20Donation&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24632-improper-neutralization-of-input-du-15aa74f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algol.plus%20Advanced%20Dynamic%20Pricing%20for%20WooCommerce&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24609-improper-neutralization-of-input-du-b0c15d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PORTONE%20PORTONE%20%EC%9A%B0%EC%BB%A4%EB%A8%B8%EC%8A%A4%20%EA%B2%B0%EC%A0%9C&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24608-improper-neutralization-of-input-du-2f029b5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24608%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Milan%20Petrovic%20GD%20Mail%20Queue&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24597-insertion-of-sensitive-information--193d0e83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24597%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Generator%20for%20WooCommerce&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee953c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24563-improper-neutralization-of-input-du-0b783615</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24563%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeglow%20Cleanup%20%E2%80%93%20Directory%20Listing%20%26%20Classifieds%20WordPress%20Plugin&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24560-improper-neutralization-of-input-du-bbd4e66e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24560%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AwesomeTOGI%20Awesome%20Event%20Booking&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24551-improper-neutralization-of-input-du-9e7233a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oneteamsoftware%20Radio%20Buttons%20and%20Swatches%20for%20WooCommerce&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24549-cross-site-request-forgery-csrf-in--3f953f8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24549%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mahbubur%20Rahman%20Post%20Meta&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee91f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24535-improper-neutralization-of-input-du-c20cde04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Donation&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24534-improper-neutralization-of-input-du-12768558</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24534%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dinamiko%20DPortfolio&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23759-improper-neutralization-of-input-du-19466b0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gavin%20Affiliate%20Tools%20Vi%E1%BB%87t%20Nam&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23671-improper-neutralization-of-input-du-2dd2e5e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23671%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sav%20WP%20OpenSearch&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23596-improper-neutralization-of-input-du-2884991e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23596%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grafeon%20Notifik%C3%A1cie.sk&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23990-cross-site-request-forgery-csrf-in--4ef4d5fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23990%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jablonczay%20Scroll%20Styler&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23989-cross-site-request-forgery-csrf-in--1847822c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23989%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alessandro%20Piconi%20Internal%20Link%20Builder&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23987-improper-neutralization-of-input-du-87a37466</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codegearthemes%20Designer&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23985-cross-site-request-forgery-csrf-in--dd220de9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23985%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brainvireinfo%20Dynamic%20URL%20SEO&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23980-cross-site-request-forgery-csrf-in--3bd18e90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23980%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20James%20Andrews%20Full%20Circle&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23978-cross-site-request-forgery-csrf-in--514e11cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23978%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ninos%20FlashCounter&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23977-cross-site-request-forgery-csrf-in--a9ccc832</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23977%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bhaskar%20Dhote%20Post%20Carousel%20Slider&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23976-cross-site-request-forgery-csrf-in--545fa48d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23976%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20operationsissuu%20Issuu%20Panel&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee9130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22757-improper-neutralization-of-input-du-d99081f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeBard%20CodeBard%20Help%20Desk&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22720-missing-authorization-in-magepeople-cb3cda8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22720%3A%20Missing%20Authorization%20in%20magepeopleteam%20Booking%20and%20Rental%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22564-improper-neutralization-of-input-du-a9d04d00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faaiq%20Pretty%20Url&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22341-improper-neutralization-of-input-du-1e055996</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parswp%20Hide%20Login%2B&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22332-improper-neutralization-of-input-du-08eb86c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanaver%20CloudFlare(R)%20Cache%20Purge&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22265-missing-authorization-in-mgplugin-e-2efd080c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22265%3A%20Missing%20Authorization%20in%20mgplugin%20EMI%20Calculator&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44055-server-side-request-forgery-ssrf-in-42497867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44055%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20brandexponents%20Oshine%20Modules&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13566-cwe-79-improper-neutralization-of-i-3f39e515</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13566%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samsk%20WP%20DataTable&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13157-cwe-79-improper-neutralization-of-i-ee4de638</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13157%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13530-cwe-862-missing-authorization-in-zi-65a92d48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13530%3A%20CWE-862%20Missing%20Authorization%20in%20zia-imtiaz%20Custom%20Login%20Page%20Styler%20%E2%80%93%20Limit%20Login%20Attempts%20%E2%80%93%20Restrict%20Content%20With%20Login%20%E2%80%93%20Redirect%20After%20Login%20%E2%80%93%20Change%20Login%20URL%20%E2%80%93%20Sign%20in%20%2C%20Sign%20out&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59f007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13623-cwe-200-exposure-of-sensitive-infor-75ee781b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13623%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webfactory%20Order%20Export%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13219-cwe-79-cross-site-scripting-xss-in--5f331641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13219%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Privacy%20Policy%20Genius&amp;severity=medium&amp;id=696166b3047de42cfc9dfbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13424-cwe-862-missing-authorization-in-an-cbd20bd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13424%3A%20CWE-862%20Missing%20Authorization%20in%20anzia%20Ni%20Sales%20Commission%20For%20WooCommerce&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13415-cwe-862-missing-authorization-in-te-6fce5d76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13415%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Food%20Menu%20%E2%80%93%20Restaurant%20Menu%20%26%20Online%20Ordering%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e55b7ef31ef0b59e6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13504-cwe-79-improper-neutralization-of-i-52274300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anssilaitila%20Shared%20Files%20%E2%80%93%20Frontend%20File%20Upload%20Form%20%26%20Secure%20File%20Sharing&amp;severity=high&amp;id=699f6e5cb7ef31ef0b59ee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13717-cwe-862-missing-authorization-in-vc-76144bd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13717%3A%20CWE-862%20Missing%20Authorization%20in%20vcita%20Contact%20Form%20and%20Calls%20To%20Action%20by%20vcita&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11886-cwe-79-improper-neutralization-of-i-a48e904e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Contact%20Form%20and%20Calls%20To%20Action%20by%20vcita&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0809-cwe-79-improper-neutralization-of-in-5c481b64</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kpgraham%20Link%20Fixer&amp;severity=high&amp;id=699f6b6bb7ef31ef0b55540e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13216-cwe-359-exposure-of-private-persona-22833b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13216%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20devitemsllc%20HT%20Event%20%E2%80%93%20WordPress%20Event%20Manager%20Plugin%20for%20Elementor&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10867-cwe-79-improper-neutralization-of-i-f77ec638</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Widgets%2C%20Elements%2C%20Templates%20and%20Toolkit%20for%20Elementor%20%26%20Gutenberg&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0493-cwe-22-improper-limitation-of-a-path-45cb8593</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0493%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wcmp%20MultiVendorX%20%E2%80%93%20The%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=critical&amp;id=699f6b69b7ef31ef0b5552e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0507-cwe-79-improper-neutralization-of-in-60efe148</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0507%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snexed%20Ticketmeo%20%E2%80%93%20Sell%20Tickets%20%E2%80%93%20Event%20Ticketing&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0470-cwe-79-improper-neutralization-of-in-a3dc5e0e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0470%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b69b7ef31ef0b5552e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13463-cwe-79-improper-neutralization-of-i-9023817e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thesiim%20SeatReg&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13397-cwe-79-improper-neutralization-of-i-0322dd54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20casterfm%20WPRadio%20%E2%80%93%20WordPress%20Radio%20Streaming%20Plugin&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13396-cwe-79-improper-neutralization-of-i-cb47a568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spgajjar%20Frictionless&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13767-cwe-862-missing-authorization-in-ji-e4919d00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13767%3A%20CWE-862%20Missing%20Authorization%20in%20jiangweifang%20Live2DWebCanvas&amp;severity=high&amp;id=699f6e6db7ef31ef0b5a070f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13399-cwe-79-improper-neutralization-of-i-942d8b09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gosign%20Gosign%20%E2%80%93%20Posts%20Slider%20Block&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-31-45b1b053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-31&amp;severity=medium&amp;id=68367c9a182aa0cae23257b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44142-processing-a-maliciously-crafted-im-8e658499</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44142%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20GarageBand&amp;severity=high&amp;id=69ceb82ae6bfc5ba1df6e9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24099-a-local-attacker-may-be-able-to-ele-83ff497e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24099%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb836e6bfc5ba1df6ef4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22220-vulnerability-in-vmware-vmware-aria-c09ecf5c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22220%3A%20Vulnerability%20in%20VMware%20VMware%20Aria%20Operations%20for%20Logs&amp;severity=medium&amp;id=69a0a45385912abc71d656a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23367-improper-access-control-bd9e1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23367%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=682d981bc4522896dcbd9e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13349-cwe-79-improper-neutralization-of-i-fa4d9cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stockdio%20Stockdio%20Historical%20Chart&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13400-cwe-79-improper-neutralization-of-i-00f49c84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gubbigubbi%20Kona%20Gallery%20Block&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12102-cwe-639-authorization-bypass-throug-eef914ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12102%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20seventhqueen%20Typer%20Core&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10591-cwe-862-missing-authorization-in-ma-feefbdf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10591%3A%20CWE-862%20Missing%20Authorization%20in%20makewebbetter%20MWB%20HubSpot%20for%20WooCommerce%20%E2%80%93%20CRM%2C%20Abandoned%20Cart%2C%20Email%20Marketing%2C%20Marketing%20Automation%20%26%20Analytics&amp;severity=high&amp;id=699f6df8b7ef31ef0b591903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10847-cwe-79-improper-neutralization-of-i-3c9922b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10847%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sellerthemes%20Storely&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13664-cwe-79-improper-neutralization-of-i-60095b09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbean%20WP%20Post%20List%20Table&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12129-cwe-862-missing-authorization-in-ro-c365a02e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12129%3A%20CWE-862%20Missing%20Authorization%20in%20Royal-Flush%20Royal%20Core&amp;severity=high&amp;id=699f6e2eb7ef31ef0b59759e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12822-cwe-862-missing-authorization-in-de-7b3777fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12822%3A%20CWE-862%20Missing%20Authorization%20in%20DeluxeThemes%20Media%20Manager%20for%20UserPro&amp;severity=critical&amp;id=699f6e48b7ef31ef0b59c4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13596-cwe-89-improper-neutralization-of-s-6f6ac3d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13596%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pantherius%20WordPress%20Survey%20%26%20Poll%20%E2%80%93%20Quiz%2C%20Survey%20and%20Poll%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12299-cwe-79-improper-neutralization-of-i-77cfb9bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qriouslad%20System%20Dashboard&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12451-cwe-79-improper-neutralization-of-i-905171a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20proxymis%20HTML5%20chat&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13715-cwe-862-missing-authorization-in-il-9c77bf16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13715%3A%20CWE-862%20Missing%20Authorization%20in%20ilenejohnson%20zStore%20Manager%20Basic&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8494-cwe-200-exposure-of-sensitive-inform-e0b38c48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8494%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12177-cwe-79-improper-neutralization-of-i-d4175f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boomdevs%20Ai%20Image%20Alt%20Text%20Generator%20for%20WP&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5977a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13670-cwe-79-improper-neutralization-of-i-d5c18d2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20efreja%20Music%20Sheet%20Viewer&amp;severity=medium&amp;id=699f6e67b7ef31ef0b59ffd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12861-cwe-73-external-control-of-file-nam-26ae5e1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12861%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20villatheme%20W2S%20%E2%80%93%20Migrate%20WooCommerce%20to%20Shopify&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13646-cwe-285-improper-authorization-in-a-9f88fe84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13646%3A%20CWE-285%20Improper%20Authorization%20in%20aakashbhagat23%20Single-user-chat&amp;severity=high&amp;id=699f6e64b7ef31ef0b59fdf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12821-cwe-862-missing-authorization-in-de-62ab3ae8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12821%3A%20CWE-862%20Missing%20Authorization%20in%20DeluxeThemes%20Media%20Manager%20for%20UserPro&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12320-cwe-79-improper-neutralization-of-i-ae4605ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markodonnell%20Team%20Rosters&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13549-cwe-79-improper-neutralization-of-i-2a65fe13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20areoimiles%20All%20Bootstrap%20Blocks&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13460-cwe-79-improper-neutralization-of-i-b0d1d4cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordpresteem%20WE%20%E2%80%93%20Testimonial%20Slider&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13742-cwe-502-deserialization-of-untruste-b72198c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13742%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20paultgoodchild%20iControlWP%20%E2%80%93%20Multiple%20WordPress%20Site%20Manager&amp;severity=critical&amp;id=699f6e6cb7ef31ef0b5a0581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13707-cwe-352-cross-site-request-forgery--59392b05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13707%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20filipmedia%20WP%20Image%20Uploader&amp;severity=high&amp;id=699f6e69b7ef31ef0b5a0308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11600-cwe-94-improper-control-of-generati-86bb4d60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11600%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Widgets%2C%20Elements%2C%20Templates%20and%20Toolkit%20for%20Elementor%20%26%20Gutenberg&amp;severity=high&amp;id=699f6e18b7ef31ef0b595139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13652-cwe-862-missing-authorization-in-ec-e6638038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13652%3A%20CWE-862%20Missing%20Authorization%20in%20ecpaytechsupport%20ECPay%20Ecommerce%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59fee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13671-cwe-22-improper-limitation-of-a-pat-ff3bfea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13671%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20efreja%20Music%20Sheet%20Viewer&amp;severity=high&amp;id=699f6e67b7ef31ef0b59ffd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12269-cwe-862-missing-authorization-in-en-8fe57e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12269%3A%20CWE-862%20Missing%20Authorization%20in%20enamulwp%20Safe%20Ai%20Malware%20Protection%20for%20WP&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13705-cwe-79-improper-neutralization-of-i-c6837284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20malcolm-oph%20StageShow&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a0300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13720-cwe-352-cross-site-request-forgery--0552d2aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13720%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20filipmedia%20WP%20Image%20Uploader&amp;severity=high&amp;id=699f6e6ab7ef31ef0b5a0448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13512-cwe-352-cross-site-request-forgery--6451198f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13512%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20edigermatthew%20Wonder%20FontAwesome&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13661-cwe-79-improper-neutralization-of-i-056c703f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptableeditor%20Table%20Editor&amp;severity=medium&amp;id=699f6e65b7ef31ef0b59ff02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13700-cwe-79-improper-neutralization-of-i-34e9db50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spanrig%20Embed%20Swagger%20UI&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12444-cwe-79-improper-neutralization-of-i-95445e05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deviodigital%20WP%20Dispensary&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11583-cwe-862-missing-authorization-in-vi-1c15c8a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11583%3A%20CWE-862%20Missing%20Authorization%20in%20visualmodo%20Borderless%20%E2%80%93%20Widgets%2C%20Elements%2C%20Templates%20and%20Toolkit%20for%20Elementor%20%26%20Gutenberg&amp;severity=medium&amp;id=699f6e18b7ef31ef0b595131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13466-cwe-79-improper-neutralization-of-i-1399280c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20atakanau%20Automatically%20Hierarchic%20Categories%20in%20Menu&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ebfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13380-cwe-79-improper-neutralization-of-i-8d538cb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexreservations%20Alex%20Reservations%3A%20Smart%20Restaurant%20Booking&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13706-cwe-79-improper-neutralization-of-i-b5d0d2ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filipmedia%20WP%20Image%20Uploader&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a0304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12409-cwe-79-improper-neutralization-of-i-b75ac82f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simplepress%20Simple%3APress%20Forum&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13453-cwe-94-improper-control-of-generati-6910cc95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13453%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20smub%20Contact%20Form%20%26%20SMTP%20Plugin%20for%20WordPress%20by%20PirateForms&amp;severity=high&amp;id=699f6e57b7ef31ef0b59ea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12524-cwe-79-improper-neutralization-of-i-9660ee81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12524%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clinked%20Clinked%20Client%20Portal&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0860-cwe-79-improper-neutralization-of-in-9b1b9cf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vruizg%20VR-Frases%20(collect%20%26%20share%20quotes)&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0861-cwe-89-improper-neutralization-of-sp-284c8c06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0861%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vruizg%20VR-Frases%20(collect%20%26%20share%20quotes)&amp;severity=medium&amp;id=699f6b6cb7ef31ef0b5554b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13694-cwe-285-improper-authorization-in-m-7f3894fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13694%3A%20CWE-285%20Improper%20Authorization%20in%20moreconvert%20WooCommerce%20Wishlist%20(High%20customization%2C%20fast%20setup%2CFree%20Elementor%20Wishlist%2C%20most%20features)&amp;severity=high&amp;id=699f6e68b7ef31ef0b5a0196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13758-cwe-352-cross-site-request-forgery--ab3ac5ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13758%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codepeople%20CP%20Contact%20Form%20with%20PayPal&amp;severity=medium&amp;id=699f6e6db7ef31ef0b5a06ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13732-cwe-79-improper-neutralization-of-i-5a4a126c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a0461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13470-cwe-79-improper-neutralization-of-i-384b6de6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13470%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ec1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13642-cwe-79-improper-neutralization-of-i-49a69a79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Stratum%20%E2%80%93%20Elementor%20Widgets&amp;severity=medium&amp;id=699f6e64b7ef31ef0b59fddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13457-cwe-284-improper-access-control-in--8ee18775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13457%3A%20CWE-284%20Improper%20Access%20Control%20in%20theeventscalendar%20Event%20Tickets%20and%20Registration&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12921-cwe-79-improper-neutralization-of-i-f797c8d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12921%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ethereumicoio%20EthereumICO&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55417-na-271a68af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55417%3A%20n%2Fa&amp;severity=medium&amp;id=69a0a44985912abc71d64ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-30-43bd44e8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-30&amp;severity=medium&amp;id=68367c99182aa0cae2325136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21396-cwe-862-missing-authorization-in-mi-db15147f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21396%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Microsoft%20Account&amp;severity=high&amp;id=68c0bd549ed239a66badec66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21415-cwe-290-authentication-bypass-by-sp-52245d31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21415%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Microsoft%20Azure%20AI%20Face%20Service&amp;severity=critical&amp;id=68c0bd549ed239a66badec78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0851-cwe-36-absolute-path-traversal-in-aw-ab72db48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0851%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20AWS%20DeepJavaLibrary&amp;severity=critical&amp;id=68ee9ba2d8f994a66eca6017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0353-cwe-79-improper-neutralization-of-in-94e756cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badhonrocks%20Divi%20Torque%20Lite&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55512f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13561-cwe-79-improper-neutralization-of-i-f6965d72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sovica%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=699f6e60b7ef31ef0b59f304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13696-cwe-79-improper-neutralization-of-i-1a73ee08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdesk%20Flexible%20Wishlist%20for%20WooCommerce%20%E2%80%93%20Ecommerce%20Wishlist%20%26%20Save%20for%20later&amp;severity=high&amp;id=699f6e68b7ef31ef0b5a01a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0804-cwe-79-improper-neutralization-of-in-79600720</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flowdee%20ClickWhale%20%E2%80%93%20Link%20Manager%2C%20Link%20Shortener%20and%20Click%20Tracker%20for%20Affiliate%20Links%20%26%20Link%20Pages&amp;severity=medium&amp;id=699f6b6bb7ef31ef0b5553a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-29-2d90cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-29&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d90cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-29-f12a42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24826-cwe-276-in-acronis-acronis-snap-deploy-bf1622</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24826%3A%20CWE-276%20in%20Acronis%20Acronis%20Snap%20Deploy&amp;severity=medium&amp;id=682d9840c4522896dcbf1622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22217-cwe-89-improper-neutralization-of-s-2aeca39b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22217%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VMware%20AVI%20Load%20Balancer&amp;severity=high&amp;id=69a0a45185912abc71d65662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13484-exposure-of-resource-to-wrong-sphere-aec165</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13484%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere&amp;severity=high&amp;id=682cd0fa1484d88663aec165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7881-cwe-1422-exposure-of-sensitive-infor-030203cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7881%3A%20CWE-1422%3A%20Exposure%20of%20Sensitive%20Information%20caused%20by%20Incorrect%20Data%20Forwarding%20during%20Transient%20Execution%20in%20Arm%20Neoverse%20V2&amp;severity=medium&amp;id=691c7a583fd37bbc3955e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0754-improper-output-neutralization-for-l-4e919937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0754%3A%20Improper%20Output%20Neutralization%20for%20Logs&amp;severity=medium&amp;id=68a87f90ad5a09ad001f8195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0752-inconsistent-interpretation-of-http--9ec95201</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0752%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=high&amp;id=68a87f90ad5a09ad001f8191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0750-improper-limitation-of-a-pathname-to-583e0dfd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0750%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=68b36a78ad5a09ad009428ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0736-insertion-of-sensitive-information-i-0cffb8f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0736%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&amp;severity=medium&amp;id=68b36a78ad5a09ad009428c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13527-cwe-79-improper-neutralization-of-i-b33f54b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20philantro%20Philantro%20%E2%80%93%20Donations%20and%20Donor%20Management&amp;severity=medium&amp;id=699f6e5eb7ef31ef0b59efef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13521-cwe-352-cross-site-request-forgery--80940517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13521%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ghera74%20MailUp%20Auto%20Subscription&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0321-cwe-79-improper-neutralization-of-in-8a85084d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0321%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13509-cwe-79-improper-neutralization-of-i-fa8afbb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20westguard%20WS%20Form%20LITE%20%E2%80%93%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20for%20WordPress&amp;severity=high&amp;id=699f6e5cb7ef31ef0b59eecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13448-cwe-434-unrestricted-upload-of-file-ab235a50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13448%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ThemeREX%20Addons&amp;severity=critical&amp;id=699f6e57b7ef31ef0b59e9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23084-vulnerability-in-nodejs-node-bed628</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23084%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11135-cwe-89-improper-neutralization-of-s-669fc1ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11135%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=high&amp;id=699f6e07b7ef31ef0b593e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-28-2d93e6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-28&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d93e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-28-f11f87</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24130-an-app-may-be-able-to-modify-protec-59e133b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24130%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092139fe7723195e053730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54519-an-app-may-be-able-to-read-sensitiv-a8c4e4ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54519%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6edaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24126-an-attacker-on-the-local-network-ma-1462966c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24126%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69092137fe7723195e053615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54523-an-app-may-be-able-to-corrupt-copro-6f6e3d5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54523%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb833e6bfc5ba1df6ee2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24096-a-malicious-app-may-be-able-to-acce-90356a69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24096%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54542-private-browsing-tabs-may-be-access-656ce44b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54542%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20Safari&amp;severity=critical&amp;id=69ceb834e6bfc5ba1df6eeb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24106-parsing-a-file-may-lead-to-an-unexp-9e06eb6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24106%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54539-an-app-may-be-able-to-capture-keybo-92dd857f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54539%3A%20An%20app%20may%20be%20able%20to%20capture%20keyboard%20events%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24151-an-app-may-be-able-to-cause-unexpec-98d1abcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24151%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e05383e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24146-deleting-a-conversation-in-messages-f3b63730</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24146%3A%20Deleting%20a%20conversation%20in%20Messages%20may%20expose%20user%20contact%20information%20in%20system%20logging%20in%20Apple%20macOS&amp;severity=critical&amp;id=6909213afe7723195e053814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24150-copying-a-url-from-web-inspector-ma-d0bcc7d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24150%3A%20Copying%20a%20URL%20from%20Web%20Inspector%20may%20lead%20to%20command%20injection%20in%20Apple%20Safari&amp;severity=high&amp;id=6909213afe7723195e053835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24107-a-malicious-app-may-be-able-to-gain-bf84062b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24107%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092135fe7723195e0534c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54543-processing-maliciously-crafted-web--311ceb90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54543%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=690916cac28fd46ded7ccfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54522-an-app-may-be-able-to-corrupt-copro-ab7e9a56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54522%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54488-photos-in-the-hidden-photos-album-m-dba11758</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54488%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6ed89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44172-an-app-may-be-able-to-access-contac-5d4ca0aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44172%3A%20An%20app%20may%20be%20able%20to%20access%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=6909214efe7723195e0545a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24127-parsing-a-file-may-lead-to-an-unexp-dbe49dd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24127%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092137fe7723195e053620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54518-an-app-may-be-able-to-corrupt-copro-8c2df4a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54518%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6eda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24131-an-attacker-in-a-privileged-positio-e429fe6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24131%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092139fe7723195e053738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24086-processing-an-image-may-lead-to-a-d-338f885c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24086%3A%20Processing%20an%20image%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091a4fc28fd46ded81d170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24100-an-app-may-be-able-to-access-inform-30466448</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24100%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=low&amp;id=69091a50c28fd46ded81d1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24141-an-attacker-with-physical-access-to-5919ca92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24141%3A%20An%20attacker%20with%20physical%20access%20to%20an%20unlocked%20device%20may%20be%20able%20to%20access%20Photos%20while%20the%20app%20is%20locked%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69092139fe7723195e053777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24116-an-app-may-be-able-to-bypass-privac-63c30ad9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24116%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24161-parsing-a-file-may-lead-to-an-unexp-531f1294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24161%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213cfe7723195e053920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54509-an-app-may-be-able-to-cause-unexpec-153ef37e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54509%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=690916cac28fd46ded7ccfbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24136-a-malicious-app-may-be-able-to-crea-e3797e59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24136%3A%20A%20malicious%20app%20may%20be%20able%20to%20create%20symlinks%20to%20protected%20regions%20of%20the%20disk%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e05374b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24120-an-attacker-may-be-able-to-cause-un-54b897d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24120%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69092137fe7723195e0535dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24177-a-remote-attacker-may-be-able-to-ca-815fcd70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24177%3A%20An%20attacker%20on%20the%20local%20network%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909213efe7723195e053a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54499-processing-a-maliciously-crafted-im-670f8fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54499%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb831e6bfc5ba1df6ed90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24176-a-local-attacker-may-be-able-to-ele-ca39765c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24176%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213efe7723195e053a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54549-an-app-may-be-able-to-access-user-s-dc58028e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54549%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24121-an-app-may-be-able-to-modify-protec-938af271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24121%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=low&amp;id=69092137fe7723195e0535e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24137-a-remote-attacker-may-cause-an-unex-3267ed02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24137%3A%20An%20attacker%20on%20the%20local%20network%20may%20corrupt%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092139fe7723195e053753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24160-parsing-a-file-may-lead-to-an-unexp-b8347f93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24160%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213cfe7723195e053911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24117-an-app-may-be-able-to-fingerprint-t-3cf0d6ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24117%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092135fe7723195e0534f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24140-files-downloaded-from-the-internet--9c3eb203</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24140%3A%20Files%20downloaded%20from%20the%20internet%20may%20not%20have%20the%20quarantine%20flag%20applied%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e053773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24156-an-app-may-be-able-to-elevate-privi-0c525bc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24156%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213cfe7723195e0538e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24101-an-app-may-be-able-to-access-user-s-84fea33d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24101%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54512-a-system-binary-could-be-used-to-fi-0d372e5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54512%3A%20A%20system%20binary%20could%20be%20used%20to%20fingerprint%20a%20user&apos;s%20Apple%20Account%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb831e6bfc5ba1df6ed9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24087-an-app-may-be-able-to-access-protec-6dfab1e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24087%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24114-an-app-may-be-able-to-modify-protec-d551c3ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24114%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24143-a-maliciously-crafted-webpage-may-b-e0cf450a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24143%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213afe7723195e053804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54497-processing-web-content-may-lead-to--06560aa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54497%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690916c8c28fd46ded7ccf94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54478-processing-maliciously-crafted-web--416121d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54478%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690916c8c28fd46ded7ccf8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24102-an-app-may-be-able-to-determine-a-u-24a47a04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24102%3A%20An%20app%20may%20be%20able%20to%20determine%20a%20user%E2%80%99s%20current%20location%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=69091a50c28fd46ded81d1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54507-an-attacker-with-user-privileges-ma-aa01d866</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54507%3A%20An%20attacker%20with%20user%20privileges%20may%20be%20able%20to%20read%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb831e6bfc5ba1df6ed97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24092-an-app-may-be-able-to-read-sensitiv-b3d30e68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24092%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24138-a-malicious-application-may-be-able-f0964ff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24138%3A%20A%20malicious%20application%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e053762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54550-an-app-may-be-able-to-view-autocomp-cf2c81bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54550%3A%20An%20app%20may%20be%20able%20to%20view%20autocompleted%20contact%20information%20from%20Messages%20and%20Mail%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24118-an-app-may-be-able-to-cause-unexpec-b7e9f226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24118%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iPadOS&amp;severity=critical&amp;id=69092137fe7723195e0535d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24159-an-app-may-be-able-to-execute-arbit-66403b8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24159%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6909213cfe7723195e053902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24122-an-app-may-be-able-to-modify-protec-00072293</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24122%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092137fe7723195e0535ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24134-an-app-may-be-able-to-access-user-s-784a792e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24134%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092139fe7723195e053743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24163-parsing-a-file-may-lead-to-an-unexp-19a527bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24163%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091538c28fd46ded7baa06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24162-processing-maliciously-crafted-web--929281cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24162%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213cfe7723195e05392f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24135-an-app-may-be-able-to-gain-elevated-5789d9db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24135%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092139fe7723195e053747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24123-parsing-a-file-may-lead-to-an-unexp-723a2caa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24123%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092137fe7723195e0535f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24174-an-app-may-be-able-to-bypass-privac-c66e26c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24174%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=6909213efe7723195e053a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54530-password-autofill-may-fill-in-passw-6bf8d211</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54530%3A%20Password%20autofill%20may%20fill%20in%20passwords%20after%20failing%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb833e6bfc5ba1df6ee37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54475-an-app-may-be-able-to-determine-a-u-bb69a21d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54475%3A%20An%20app%20may%20be%20able%20to%20determine%20a%20user%E2%80%99s%20current%20location%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb831e6bfc5ba1df6ed84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24158-processing-web-content-may-lead-to--96e1fded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24158%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20Safari&amp;severity=medium&amp;id=6909213cfe7723195e0538f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24093-an-app-may-be-able-to-access-remova-6d5153bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24093%3A%20An%20app%20may%20be%20able%20to%20access%20removable%20volumes%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091a50c28fd46ded81d198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24139-parsing-a-maliciously-crafted-file--cb1c8b8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24139%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=69092139fe7723195e05376a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24085-a-malicious-application-may-be-able-3886796d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24085%3A%20A%20malicious%20application%20may%20be%20able%20to%20elevate%20privileges.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2017.2.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=68881727ad5a09ad0088bc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54547-an-app-may-be-able-to-access-protec-8ef481f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54547%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24103-an-app-may-be-able-to-access-protec-086d86e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24103%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69091a50c28fd46ded81d1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24154-an-attacker-may-be-able-to-cause-un-b1ec69c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24154%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=6909213afe7723195e05384e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24115-an-app-may-be-able-to-read-files-ou-8282524e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24115%3A%20An%20app%20may%20be%20able%20to%20read%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24149-parsing-a-file-may-lead-to-disclosu-f094239b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24149%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6909213afe7723195e053824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24108-an-app-may-be-able-to-access-protec-67808aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24108%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54537-an-app-may-be-able-to-read-and-writ-1ce069d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54537%3A%20An%20app%20may%20be%20able%20to%20read%20and%20write%20files%20outside%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24124-parsing-a-file-may-lead-to-an-unexp-88557f6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24124%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092137fe7723195e053605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54468-an-app-may-be-able-to-break-out-of--ea8d400d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54468%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82fe6bfc5ba1df6ed5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24112-parsing-a-file-may-lead-to-an-unexp-fcc1fbe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24112%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092135fe7723195e0534db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24145-an-app-may-be-able-to-view-a-contac-b576eff6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24145%3A%20An%20app%20may%20be%20able%20to%20view%20a%20contact&apos;s%20phone%20number%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=6909213afe7723195e05380e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24153-an-app-with-root-privileges-may-be--b4e9be0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24153%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e05384a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24104-restoring-a-maliciously-crafted-bac-1adf4ecb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24104%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69091a52c28fd46ded81d20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54517-an-app-may-be-able-to-corrupt-copro-0c94d4de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54517%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb831e6bfc5ba1df6eda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24128-visiting-a-malicious-website-may-le-0038a9ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24128%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69092137fe7723195e05362f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24094-an-app-may-be-able-to-access-user-s-0585a312</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24094%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69091a50c28fd46ded81d19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24169-a-malicious-app-may-be-able-to-bypa-8ad87a21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24169%3A%20A%20malicious%20app%20may%20be%20able%20to%20bypass%20browser%20extension%20authentication%20in%20Apple%20Safari&amp;severity=high&amp;id=6909213cfe7723195e053944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54557-an-attacker-may-gain-access-to-prot-a815559d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54557%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb834e6bfc5ba1df6eece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24129-a-remote-attacker-may-cause-an-unex-93bafde8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24129%3A%20An%20attacker%20on%20the%20local%20network%20may%20cause%20an%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092137fe7723195e053637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54516-an-app-may-be-able-to-approve-a-lau-756c7c78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54516%3A%20An%20app%20may%20be%20able%20to%20approve%20a%20launch%20daemon%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb831e6bfc5ba1df6ed9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54541-an-app-may-be-able-to-access-user-s-5cbde8c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54541%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb834e6bfc5ba1df6eead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24152-an-app-may-be-able-to-cause-unexpec-cc2e93f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24152%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909213afe7723195e053846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24113-visiting-a-malicious-website-may-le-d2100b59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24113%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=69091538c28fd46ded7ba9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54536-an-app-may-be-able-to-edit-nvram-va-8d598301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54536%3A%20An%20app%20may%20be%20able%20to%20edit%20NVRAM%20variables%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24109-an-app-may-be-able-to-access-sensit-3d0c56f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24109%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092135fe7723195e0534d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54520-an-app-may-be-able-to-overwrite-arb-01af93fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54520%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb831e6bfc5ba1df6edb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22316-cwe-863-incorrect-authorization-in--e1040505</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22316%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Sterling%20File%20Gateway&amp;severity=medium&amp;id=68e0f3c6b66c7f7acdd3ea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24782-improper-control-of-filename-for-in-bc091983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24782%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpWax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23982-missing-authorization-in-gopi-krish-6c50cac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23982%3A%20Missing%20Authorization%20in%20Gopi%20krishnan%20Fare%20Calculator&amp;severity=null&amp;id=69cd7253e6bfc5ba1dee913c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24747-missing-authorization-in-favethemes-9aaa27d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24747%3A%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24743-missing-authorization-in-rometheme--e4c3fd82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24743%3A%20Missing%20Authorization%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24742-cross-site-request-forgery-csrf-in--9f379f0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24742%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPGMaps%20WP%20Go%20Maps&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24741-url-redirection-to-untrusted-site-o-43cf6851</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24741%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20LOGON%20KB%20Support&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24740-url-redirection-to-untrusted-site-o-dc861b95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24740%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20ThimPress%20LearnPress&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24734-missing-authorization-in-codesolz-b-ec976904</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24734%3A%20Missing%20Authorization%20in%20CodeSolz%20Better%20Find%20and%20Replace&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24708-improper-neutralization-of-input-du-d41e7c0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CRM%20Perks%20WP%20Dynamics%20CRM%20for%20Contact%20Form%207%2C%20WPForms%2C%20Elementor%2C%20Formidable%20and%20Ninja%20Forms&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24689-insertion-of-sensitive-information--042ca9f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24689%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Javier%20Carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24680-improper-neutralization-of-script-r-6ed0f358</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24680%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20WPExperts.io%20WP%20Multistore%20Locator&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24671-deserialization-of-untrusted-data-i-ad25b0ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24671%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Pdfcrowd%20Dev%20Team%20Save%20as%20PDF&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24667-improper-neutralization-of-special--6954b9a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24667%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24665-improper-neutralization-of-special--14438fa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24665%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Small%20Package%20Quotes%20%E2%80%93%20Unishippers%20Edition&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24628-authentication-bypass-by-spoofing-i-07995e99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24628%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20bestwebsoft%20Google%20Captcha&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24626-improper-neutralization-of-input-du-ff55f626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Music%20Store&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24606-missing-authorization-in-boldgrid-c-cb9212de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24606%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24603-missing-authorization-in-dmitry-v-c-fdd6d62f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24603%3A%20Missing%20Authorization%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Print%20Barcode%20Labels%20for%20your%20WooCommerce%20products%2Forders&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24600-missing-authorization-in-davidfcarr-dcfdbb3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24600%3A%20Missing%20Authorization%20in%20davidfcarr%20RSVPMarker&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24593-improper-neutralization-of-input-du-6fe4d957</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24540-cross-site-request-forgery-csrf-in--05ec4cc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24540%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24538-cross-site-request-forgery-csrf-in--ee324d6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Slava%20Abakumov%20BuddyPress%20Groups%20Extras&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee919a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24537-cross-site-request-forgery-csrf-in--ce842fef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24537%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee9197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23849-missing-authorization-in-bpiwowar-p-d65df2e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23849%3A%20Missing%20Authorization%20in%20bpiwowar%20PAPERCITE&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23756-improper-neutralization-of-input-du-030aef87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivanchernyakov%20LawPress%20%E2%80%93%20Law%20Firm%20Website%20Management&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23754-improper-neutralization-of-input-du-43d4e043</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ulrich%20Sossou%20The%20Loops&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23752-improper-neutralization-of-input-du-eec0a6d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Clifton%20Griffin%20CGD%20Arrange%20Terms&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23669-improper-neutralization-of-input-du-52b1c05c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23669%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nurul%20Amin%20WP%20Smart%20Tooltip&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23656-missing-authorization-in-saul-moral-fe371268</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23656%3A%20Missing%20Authorization%20in%20Saul%20Morales%20Pacheco%20Donate%20visa&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23574-improper-neutralization-of-input-du-809594d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jonathan%20Lau%20CubePM&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23531-improper-neutralization-of-input-du-46e86d3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23531%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidfcarr%20RSVPMaker%20Volunteer%20Roles&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23529-missing-authorization-in-blokhauswp-c83baeb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23529%3A%20Missing%20Authorization%20in%20blokhauswp%20Minterpress&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22513-improper-neutralization-of-input-du-2f04b9ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Phillips%20Simple%20Locator&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24754-missing-authorization-in-favethemes-37742750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24754%3A%20Missing%20Authorization%20in%20favethemes%20Houzez&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24685-path-traversal-in-ihor-kit-morkva-u-5e1e0fa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24685%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Ihor%20Kit%20Morkva%20UA%20Shipping&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24664-improper-neutralization-of-special--19365b5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24664%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20LTL%20Freight%20Quotes%20%E2%80%93%20Worldwide%20Express%20Edition&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24612-improper-neutralization-of-special--e06e5317</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24612%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ihor%20Kit%20Shipping%20for%20Nova%20Poshta&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24601-deserialization-of-untrusted-data-i-89c1848c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24601%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ThimPress%20FundPress&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24584-missing-authorization-in-bdthemes-u-4c709edc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24584%3A%20Missing%20Authorization%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24533-cross-site-request-forgery-csrf-in--1f34c52a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MetaSlider%20Responsive%20Slider%20by%20MetaSlider&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee916e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23792-improper-neutralization-of-input-du-a0d1aa04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Busters%20Passwordless%20WP%20%E2%80%93%20Login%20with%20your%20glance%20or%20fingerprint&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23457-improper-neutralization-of-input-du-98487204</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23457%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shipdeoplugin%20Shipdeo&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12774-cwe-352-cross-site-request-forgery--9a61f245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12774%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Altra%20Side%20Menu&amp;severity=medium&amp;id=696166b3047de42cfc9dfbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-27-2d8907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-27&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d8907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-27-f12196</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13505-cwe-79-improper-neutralization-of-i-c7e55171</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12334-cwe-79-improper-neutralization-of-i-ffc614d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12334%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codexpert%20WC%20Affiliate%20%E2%80%93%20A%20Complete%20WooCommerce%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11641-cwe-352-cross-site-request-forgery--fbd48e0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11641%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20e4jvikwp%20VikBooking%20Hotel%20Booking%20Engine%20%26%20PMS&amp;severity=high&amp;id=699f6e18b7ef31ef0b595152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11936-cwe-862-missing-authorization-in-mv-58ad0398</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11936%3A%20CWE-862%20Missing%20Authorization%20in%20MVPThemes%20Zox%20News&amp;severity=high&amp;id=699f6e27b7ef31ef0b596e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10705-cwe-918-server-side-request-forgery-cf13dd74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10705%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themeisle%20Multiple%20Page%20Generator%20Plugin%20%E2%80%93%20MPG&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b5923a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11090-cwe-200-exposure-of-sensitive-infor-0b8310c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11090%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20stellarwp%20Membership%20Plugin%20%E2%80%93%20Restrict%20Content&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10633-cwe-95-improper-neutralization-of-d-2a40bccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10633%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Developer&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10574-cwe-862-missing-authorization-in-ay-2bee49f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10574%3A%20CWE-862%20Missing%20Authorization%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Developer&amp;severity=high&amp;id=699f6df6b7ef31ef0b59179d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10628-cwe-89-improper-neutralization-of-s-2f14de68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10628%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Business&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10636-cwe-79-improper-neutralization-of-i-474acbf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10636%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AYS%20Pro%20Plugins%20Quiz%20Maker%20Developer&amp;severity=medium&amp;id=699f6df9b7ef31ef0b5919bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-26-2d98b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-26&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d98b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-26-f1250f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f1250f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39750-cwe-120-buffer-copy-without-checkin-c971eb01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39750%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20IBM%20Analytics%20Content%20Hub&amp;severity=high&amp;id=68e0f3c6b66c7f7acdd3ea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13562-cwe-200-exposure-of-sensitive-infor-cc983c3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13562%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jcollings%20Import%20WP%20%E2%80%93%20Export%20and%20Import%20CSV%20and%20XML%20files%20to%20WordPress&amp;severity=high&amp;id=699f6e60b7ef31ef0b59f30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0350-cwe-79-improper-neutralization-of-in-990e6a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badhonrocks%20Carousel%20Maker%20for%20Divi&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13450-cwe-918-server-side-request-forgery-54548659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13450%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=low&amp;id=699f6e57b7ef31ef0b59ea02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13449-cwe-862-missing-authorization-in-ib-ace207b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13449%3A%20CWE-862%20Missing%20Authorization%20in%20ibsofts%20Boom%20Fest&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12826-cwe-862-missing-authorization-in-nm-4085b074</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12826%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%20GoHero%20Store%20Customizer%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e49b7ef31ef0b59c589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13370-cwe-862-missing-authorization-in-yo-7b6ff5c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13370%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e52b7ef31ef0b59e3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13550-cwe-22-improper-limitation-of-a-pat-4cd1be1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13550%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20paulrosen%20ABC%20Notation&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13551-cwe-79-improper-neutralization-of-i-ec8732e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13551%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulrosen%20ABC%20Notation&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13441-cwe-79-improper-neutralization-of-i-702690e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Bilingual%20Linker&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12817-cwe-79-improper-neutralization-of-i-c2f52030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12817%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20coreymcollins%20Etsy%20Importer&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13586-cwe-79-improper-neutralization-of-i-e12e893c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imdr%20Masy%20Gallery&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13467-cwe-79-improper-neutralization-of-i-cc0fcac3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13467%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hk1993%20WP%20Contact%20Form7%20Email%20Spam%20Blocker&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59ec06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11825-cwe-79-improper-neutralization-of-i-a2a10bea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20broadstreetads%20Broadstreet&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59675b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13368-cwe-862-missing-authorization-in-yo-97a68325</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13368%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12113-cwe-862-missing-authorization-in-yo-32a6b62e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12113%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13458-cwe-79-improper-neutralization-of-i-aae9b628</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qchantelnotice%20WordPress%20SEO%20Friendly%20Accordion%20FAQ%20with%20AI%20assisted%20content%20generation&amp;severity=medium&amp;id=699f6e59b7ef31ef0b59eb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13599-cwe-79-improper-neutralization-of-i-8528d590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13548-cwe-79-improper-neutralization-of-i-b581f336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13548%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dotrex%20Power%20Ups%20for%20Elementor&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12885-cwe-22-improper-limitation-of-a-pat-59c4f859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12885%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20shazahm1hotmailcom%20Connections%20Business%20Directory&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12529-cwe-79-improper-neutralization-of-i-f65bca1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12529%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brodosnet%20brodos.net%20Onlineshop%20Plugin&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12076-cwe-79-improper-neutralization-of-i-d9302be2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12076%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sovica%20Target%20Video%20Easy%20Publish&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59738e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12512-cwe-79-improper-neutralization-of-i-96f5b953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12512%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arunbasillal%20Ask%20Me%20Anything%20(Anonymously)&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12816-cwe-79-improper-neutralization-of-i-5f507381</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12816%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mastowkir%20NOTICE%20BOARD%20BY%20TOWKIR&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12600-cwe-502-deserialization-of-untruste-5da5f798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12600%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20skyverge%20Custom%20Product%20Tabs%20Lite%20for%20WooCommerce&amp;severity=high&amp;id=699f6e44b7ef31ef0b59c021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10552-cwe-79-improper-neutralization-of-i-ae543440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10552%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX%20Plugin&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59178b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13721-cwe-85-doubled-character-xss-manipu-f45a7859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13721%3A%20CWE-85%20Doubled%20Character%20XSS%20Manipulations%20in%20plethoraplugins%20Plethora%20Plugins%20Tabs%20%2B%20Accordions&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a044c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0682-cwe-98-improper-control-of-filename--cc6cfd6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0682%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeREX%20Addons&amp;severity=high&amp;id=699f6b6bb7ef31ef0b555383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13709-cwe-352-cross-site-request-forgery--47bf6536</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13709%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20linearoy%20Linear&amp;severity=medium&amp;id=699f6e6ab7ef31ef0b5a03c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0357-cwe-434-unrestricted-upload-of-file--2b5544fc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0357%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Iqonic%20Design%20WPBookit&amp;severity=critical&amp;id=699f6b67b7ef31ef0b555140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-25-2db12d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-25&amp;severity=medium&amp;id=682c7dc1e8347ec82d2db12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-25-f12a40</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21262-cwe-451-user-interface-ui-misrepres-3914402b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21262%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68c0c0d09ed239a66badfcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52807-cwe-611-improper-restriction-of-xml-13d88698</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52807%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20HL7%20fhir-ig-publisher&amp;severity=high&amp;id=697a9d5c4623b1157cfb7df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24587-improper-neutralization-of-special--9df40b10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24587%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nks%20Email%20Subscription%20Popup&amp;severity=null&amp;id=69cd7650e6bfc5ba1df0b2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35122-cwe-266-incorrect-privilege-assignm-d75fbcd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35122%3A%20CWE-266%20Incorrect%20Privilege%20Assignment&amp;severity=low&amp;id=68e0f3c5b66c7f7acdd3ea67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24736-missing-authorization-in-metaphorcr-65e96142</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24736%3A%20Missing%20Authorization%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24746-improper-neutralization-of-input-du-0c008b2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Iser%20Popup%20Maker&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24755-improper-neutralization-of-input-du-a1474454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20PDF%20Invoice%20Builder%20for%20WooCommerce&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24753-missing-authorization-in-stellarwp--e44e9532</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24753%3A%20Missing%20Authorization%20in%20StellarWP%20Gutenberg%20Blocks%20by%20Kadence%20Blocks&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24751-missing-authorization-in-godaddy-co-2bc5e804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24751%3A%20Missing%20Authorization%20in%20GoDaddy%20CoBlocks&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24750-missing-authorization-in-syed-balkh-3a3e394b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24750%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20ExactMetrics&amp;severity=null&amp;id=69cd7283e6bfc5ba1deeaab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24756-cross-site-request-forgery-csrf-in--996d253a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24756%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mgplugin%20Roi%20Calculator&amp;severity=null&amp;id=69cd7285e6bfc5ba1deeab10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24729-improper-neutralization-of-input-du-8a1bafdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24729%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24721-improper-neutralization-of-input-du-6aa01de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aleksandar%20Uro%C5%A1evi%C4%87%20Easy%20YouTube%20Gallery&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24733-improper-control-of-filename-for-in-5710347b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24733%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Akhtarujjaman%20Shuvo%20Post%20Grid%20Master&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24726-improper-neutralization-of-input-du-cef552f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24726%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HT%20Plugins%20HT%20Contact%20Form%207&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24725-missing-authorization-in-thimpress--e9ec1921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24725%3A%20Missing%20Authorization%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24730-improper-neutralization-of-input-du-78e50be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RexTheme%20WP%20VR&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24738-cross-site-request-forgery-csrf-in--9ceae180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24738%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jerry%20Rietveld%20Call%20Now%20Button&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24728-improper-neutralization-of-special--d0df6c9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24728%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yannick%20Lefebvre%20Bug%20Library&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24723-improper-neutralization-of-input-du-0e0684e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24723%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Booking%20Calendar%20Contact%20Form&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24719-improper-neutralization-of-input-du-371348c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Widget%20Countdown&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24731-improper-neutralization-of-input-du-7b6aa600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IP2Location%20Download%20IP2Location%20Country%20Blocker&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24732-improper-neutralization-of-input-du-e1c73ff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20BookingPress&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24724-cross-site-request-forgery-csrf-in--2aa2b30c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24724%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Side%20Menu%20Lite&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24739-cross-site-request-forgery-csrf-in--6e9e8bdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24739%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shahjahan%20Jewel%20FluentSMTP&amp;severity=null&amp;id=69cd7282e6bfc5ba1deeaa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24716-cross-site-request-forgery-csrf-in--143f05ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24716%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Herd%20Effects&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24727-improper-neutralization-of-input-du-eac27d7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Contact%20Form%20Email&amp;severity=null&amp;id=69cd7281e6bfc5ba1deeaa53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24717-cross-site-request-forgery-csrf-in--e358a787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24717%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Modal%20Window&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24703-server-side-request-forgery-ssrf-in-e23c80c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24703%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Ronald%20Huereca%20Comment%20Edit%20Core%20%E2%80%93%20Simple%20Comment%20Editing&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24715-cross-site-request-forgery-csrf-in--91707afb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24715%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Counter%20Box&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24713-cross-site-request-forgery-csrf-in--31970b5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24713%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Button%20Generator%20%E2%80%93%20easily%20Button%20Builder&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24722-improper-neutralization-of-input-du-ebefac34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20FAQ%20Builder%20AYS&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24720-cross-site-request-forgery-csrf-in--4e5fe2a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24720%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Sticky%20Buttons&amp;severity=null&amp;id=69cd7280e6bfc5ba1deeaa3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24696-cross-site-request-forgery-csrf-in--2465e842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24696%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shafaet%20Alam%20Attire%20Blocks&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24709-improper-neutralization-of-input-du-621893a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Plethora%20Plugins%20Plethora%20Plugins%20Tabs%20%2B%20Accordions&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24712-cross-site-request-forgery-csrf-in--f72cd94d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24712%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24698-cross-site-request-forgery-csrf-in--44a2d901</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24698%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24711-cross-site-request-forgery-csrf-in--dd69a886</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24711%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Popup%20Box&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24714-cross-site-request-forgery-csrf-in--3bf85403</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24714%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Wow-Company%20Bubble%20Menu%20%E2%80%93%20circle%20floating%20menu&amp;severity=null&amp;id=69cd727fe6bfc5ba1deeaa22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24705-missing-authorization-in-arshid-woo-9df525c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24705%3A%20Missing%20Authorization%20in%20Arshid%20WooCommerce%20Quick%20View&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24704-improper-neutralization-of-input-du-e01f2ec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grimdonkey%20Magic%20the%20Gathering%20Card%20Tooltips&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24674-improper-neutralization-of-input-du-4de30d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Denis%20Cherniatev%20ShMapper%20by%20Teplitsa&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24683-improper-neutralization-of-special--8504c1b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24683%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Chill%20RSVP%20and%20Event%20Management&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24695-server-side-request-forgery-ssrf-in-d9445039</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24695%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20HT%20Plugins%20Extensions%20For%20CF7&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24701-server-side-request-forgery-ssrf-in-4859a2cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24701%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Bob%20Chained%20Quiz&amp;severity=null&amp;id=69cd727de6bfc5ba1deea9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24691-missing-authorization-in-ctltwp-peo-83a07b2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24691%3A%20Missing%20Authorization%20in%20ctltwp%20People%20Lists&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24693-missing-authorization-in-yehi-advan-04db9bfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24693%3A%20Missing%20Authorization%20in%20Yehi%20Advanced%20Notifications&amp;severity=null&amp;id=69cd727be6bfc5ba1deea1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24681-improper-neutralization-of-input-du-6cedd5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24681%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpWax%20Product%20Carousel%20Slider%20%26%20Grid%20Ultimate%20for%20WooCommerce&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24682-missing-authorization-in-michael-su-ead1e811</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24682%3A%20Missing%20Authorization%20in%20Michael%20Super%20Block%20Slider&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24687-improper-neutralization-of-input-du-791b5234</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lars%20Wallenborn%20Show%2FHide%20Shortcode&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24675-improper-neutralization-of-input-du-34209b93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24675%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24666-improper-neutralization-of-input-du-0cac771d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24666%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20AI%20Chatbot%20for%20WordPress%20%E2%80%93%20Hyve%20Lite&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24679-missing-authorization-in-webraketen-c5832133</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24679%3A%20Missing%20Authorization%20in%20webraketen%20Internal%20Links%20Manager&amp;severity=null&amp;id=69cd727ae6bfc5ba1deea110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24673-improper-neutralization-of-script-r-c67e942e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24673%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20AyeCode%20Ketchup%20Shortcodes&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24669-improper-neutralization-of-special--f6bfbe54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24669%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20serpednet%20SERPed.net&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24658-improper-neutralization-of-input-du-afaddb7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24658%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Auction%20Nudge%20%E2%80%93%20Your%20eBay%20on%20Your%20Site&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24672-improper-neutralization-of-special--f55f0db0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24672%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20Form%20Builder%20CP&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24668-improper-neutralization-of-input-du-aa151cd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themeisle%20PPOM%20for%20WooCommerce&amp;severity=null&amp;id=69cd7278e6bfc5ba1deea0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24659-improper-neutralization-of-special--d28ad6da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24659%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24649-missing-authorization-in-bowo-admin-451e3477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24649%3A%20Missing%20Authorization%20in%20Bowo%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24663-improper-neutralization-of-special--1ca01635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24663%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mra13%20Simple%20Download%20Monitor&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24657-improper-neutralization-of-input-du-e8126a82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24657%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebToffee%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=69cd7275e6bfc5ba1deea044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24644-improper-neutralization-of-input-du-ccf98c36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebToffee%20WooCommerce%20PDF%20Invoices%2C%20Packing%20Slips%2C%20Delivery%20Notes%20and%20Shipping%20Labels&amp;severity=null&amp;id=69cd7273e6bfc5ba1dee9ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24647-cross-site-request-forgery-csrf-in--bec77a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24647%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20datafeedr%20WooCommerce%20Cloak%20Affiliate%20Links&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24650-unrestricted-upload-of-file-with-da-02df5981</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24650%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20Tourfic&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24625-missing-authorization-in-marco-alme-b15c2f09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24625%3A%20Missing%20Authorization%20in%20Marco%20Almeida%20%7C%20Webdados%20Taxonomy%2FTerm%20and%20Role%20based%20Discounts%20for%20WooCommerce&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24623-cross-site-request-forgery-csrf-in--7f6adcdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Really%20Simple%20Plugins%20Really%20Simple%20SSL&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24638-improper-neutralization-of-input-du-4c2670b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pddring%20Create%20with%20Code&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24627-improper-neutralization-of-input-du-6658e2b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Linnea%20Huxford%20Blur%20Text&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24652-missing-authorization-in-revmakx-wp-af2c7031</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24652%3A%20Missing%20Authorization%20in%20revmakx%20WP%20Duplicate&amp;severity=null&amp;id=69cd7273e6bfc5ba1deea012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24634-improper-neutralization-of-input-du-31ae7428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Svetoslav%20Marinov%20Orbisius%20Simple%20Notice&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24613-missing-authorization-in-foliovisio-026d42b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24613%3A%20Missing%20Authorization%20in%20FolioVision%20FV%20Thoughtful%20Comments&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24610-improper-neutralization-of-input-du-854e0fd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Christian%20Leuenberg%20Restrict%20Anonymous%20Access&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24622-cross-site-request-forgery-csrf-in--5b79b529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24622%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd726fe6bfc5ba1dee9f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24618-missing-authorization-in-element-in-1ec55267</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24618%3A%20Missing%20Authorization%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd726ee6bfc5ba1dee9f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24636-cross-site-request-forgery-csrf-in--fbd72407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24636%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rick%20Laymance%20MachForm%20Shortcode&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24633-missing-authorization-in-silverplug-b1cc67d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24633%3A%20Missing%20Authorization%20in%20silverplugins217%20Build%20Private%20Store%20For%20Woocommerce&amp;severity=null&amp;id=69cd7271e6bfc5ba1dee9fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24611-improper-limitation-of-a-pathname-t-b8302ec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24611%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smackcoders%20Inc.%2C%20WP%20Ultimate%20Exporter&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24596-missing-authorization-in-wc-product-adb6b389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24596%3A%20Missing%20Authorization%20in%20WC%20Product%20Table%20WooCommerce%20Product%20Table%20Lite&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24604-missing-authorization-in-vikas-ratu-a8b863e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24604%3A%20Missing%20Authorization%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=69cd726be6bfc5ba1dee9e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24594-missing-authorization-in-aribhour-l-8675c523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24594%3A%20Missing%20Authorization%20in%20aribhour%20Linet%20ERP-Woocommerce%20Integration&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24562-cross-site-request-forgery-csrf-in--40e1174e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24562%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Optimal%20Access%20KBucket&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24595-improper-neutralization-of-input-du-4e84a431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20All%20Embed%20%E2%80%93%20Elementor%20Addons&amp;severity=null&amp;id=69cd726ae6bfc5ba1dee9536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24572-cross-site-request-forgery-csrf-in--7c42029f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24588-missing-authorization-in-patreon-pa-32604ebb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24588%3A%20Missing%20Authorization%20in%20patreon%20Patreon%20WordPress&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24543-cross-site-request-forgery-csrf-in--13ccea32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RSTheme%20Ultimate%20Coming%20Soon%20%26%20Maintenance&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24573-improper-neutralization-of-input-du-4b0f8fcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Softaculous%20PageLayer&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24547-improper-neutralization-of-input-du-1630428d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matthias.wagner%20Caching%20Compatible%20Cookie%20Opt-In%20and%20JavaScript&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24552-generation-of-error-message-contain-870face3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24552%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20paytiumsupport%20Paytium&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee9202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24570-improper-neutralization-of-input-du-ca4bef70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24579-improper-neutralization-of-input-du-920e9f64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20Phillips%20Nested%20Pages&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24589-missing-authorization-in-js-morisse-6408f199</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24589%3A%20Missing%20Authorization%20in%20JS%20Morisset%20JSM%20Show%20Post%20Metadata&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24585-improper-neutralization-of-input-du-65c53b18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24578-improper-neutralization-of-input-du-9a8a288b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24571-missing-authorization-in-epsiloncoo-c8a3c089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24571%3A%20Missing%20Authorization%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7262e6bfc5ba1dee93a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24591-missing-authorization-in-ninja-team-b56ab005</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24591%3A%20Missing%20Authorization%20in%20Ninja%20Team%20GDPR%20CCPA%20Compliance%20Support&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24546-cross-site-request-forgery-csrf-in--bddce8f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24546%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RSTheme%20Ultimate%20Coming%20Soon%20%26%20Maintenance&amp;severity=null&amp;id=69cd7256e6bfc5ba1dee91af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24582-insertion-of-sensitive-information--c2adbc1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24582%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24561-cross-site-request-forgery-csrf-in--d60c9f29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24561%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20awcode%20ReviewsTap&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24580-missing-authorization-in-aa-web-ser-560df0e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24580%3A%20Missing%20Authorization%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd7268e6bfc5ba1dee94d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24568-cross-site-request-forgery-csrf-in--70c841a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24568%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Brainstorm%20Force%20Starter%20Templates&amp;severity=null&amp;id=69cd725be6bfc5ba1dee92c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24555-cross-site-request-forgery-csrf-in--e74147e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20subscriptiondna%20Subscription%20DNA&amp;severity=null&amp;id=69cd7258e6bfc5ba1dee920b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23991-missing-authorization-in-dotstore-p-22f2fae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23991%3A%20Missing%20Authorization%20in%20Dotstore%20Product%20Size%20Charts%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee915c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13698-cwe-862-missing-authorization-in-as-a00753d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13698%3A%20CWE-862%20Missing%20Authorization%20in%20Astoundify%20Jobify%20-%20Job%20Board%20WordPress%20Theme&amp;severity=medium&amp;id=699f6e69b7ef31ef0b5a02d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41757-cwe-319-cleartext-transmission-of-s-43c5acd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41757%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Concert%20Software&amp;severity=medium&amp;id=68e0f3c6b66c7f7acdd3ea84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10324-cwe-1230-exposure-of-sensitive-info-2a562a4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10324%3A%20CWE-1230%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20rometheme%20RomethemeKit%20For%20Elementor&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11913-cwe-918-server-side-request-forgery-c0ea5175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11913%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20buddydev%20Activity%20Plus%20Reloaded%20for%20BuddyPress&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13408-cwe-98-improper-control-of-filename-fe69bae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13408%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpwax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate%20%E2%80%93%20with%20Shortcode%2C%20Gutenberg%20Block%20%26%20Elementor%20Widget&amp;severity=high&amp;id=699f6e55b7ef31ef0b59e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13354-cwe-79-improper-neutralization-of-i-ed8af861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%20Plugin%20and%20Elementor%20Templates&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13335-cwe-862-missing-authorization-in-te-96d7a28d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13335%3A%20CWE-862%20Missing%20Authorization%20in%20templatescoderthemes%20Spexo%20Addons%20for%20Elementor%20%E2%80%93%20Free%20Elementor%20Addons%2C%20Widgets%20and%20Templates&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13542-cwe-79-improper-neutralization-of-i-be8e4391</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13542%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pagup%20WP%20Google%20Street%20View%20(with%20360%C2%B0%20virtual%20tour)%20%26%20Google%20maps%20%2B%20Local%20SEO&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13594-cwe-89-improper-neutralization-of-s-92840151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13594%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20neofix%20Simple%20Downloads%20List&amp;severity=medium&amp;id=699f6e63b7ef31ef0b59f598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13572-cwe-79-improper-neutralization-of-i-87e1fd93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nfusionsolutions%20Precious%20Metals%20Charts%20and%20Widgets%20for%20WordPress&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13409-cwe-22-improper-limitation-of-a-pat-b4dab3c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13409%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpwax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate%20%E2%80%93%20with%20Shortcode%2C%20Gutenberg%20Block%20%26%20Elementor%20Widget&amp;severity=high&amp;id=699f6e55b7ef31ef0b59e688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22714-improper-neutralization-of-input-du-3876517e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MDJM%20Mobile%20DJ%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23889-improper-neutralization-of-input-du-687db174</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23889%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20FooGallery%20Captions&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23888-improper-neutralization-of-input-du-5257ff49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23888%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GrandSlambert%20Custom%20Page%20Extensions&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23885-improper-neutralization-of-input-du-4d4605a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anildhiman%20MJ%20Contact%20us&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23839-improper-neutralization-of-input-du-1ad1e8a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asif%20Shakeel%20Sticky%20Button&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23838-improper-neutralization-of-input-du-7ca2b361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rally%20Vincent%20Bauernregeln&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23837-improper-neutralization-of-input-du-0167322b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23837%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martinjuhasz%20One%20Backend%20Language&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23737-improper-neutralization-of-input-du-f1b02a8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thobian%20Network-Favorites&amp;severity=null&amp;id=69cd722be6bfc5ba1dee8504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23734-improper-neutralization-of-input-du-a4bcc2f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Casey%20Bisson%20Gigaom%20Sphinx&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23711-improper-neutralization-of-input-du-ef1b94be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23711%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Quincy%20Kwende%20Quote%20me&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23622-improper-neutralization-of-input-du-8b35f392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sabuj%20Kundu%20CBX%20Accounting%20%26%20Bookkeeping&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23621-improper-neutralization-of-input-du-0572fcfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algothemes%20Causes%20%E2%80%93%20Donation%20Plugin&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23522-improper-neutralization-of-input-du-3df5aa24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matthew%20Haines-Young%20HM%20Portfolio&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23427-improper-neutralization-of-input-du-ad655c4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23427%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Anderson%20%2F%20Team%20Updraft%20Redux%20Converter&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23422-improper-limitation-of-a-pathname-t-f9f0b958</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23422%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moaluko%20Store%20Locator&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12494-cwe-79-improper-neutralization-of-i-2b0a8d90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otrok7%20BMLT%20Meeting%20Map&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13583-cwe-79-improper-neutralization-of-i-0e2b2a65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jitendra742744%20Simple%20Gallery%20with%20Filter&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13545-cwe-22-improper-limitation-of-a-pat-7f672a5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13545%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eminozlem%20Bootstrap%20Ultimate&amp;severity=critical&amp;id=699f6e5fb7ef31ef0b59f17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13683-cwe-352-cross-site-request-forgery--13c8b301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13683%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sperse%20Automate%20Hub%20Free%20by%20Sperse.IO&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13680-cwe-89-improper-neutralization-of-s-562f67e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13680%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20codepeople%20Form%20Builder%20CP&amp;severity=medium&amp;id=699f6e67b7ef31ef0b5a00a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57277-na-32d5b975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57277%3A%20n%2Fa&amp;severity=medium&amp;id=69777f554623b1157c9acd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-24-2dbc37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-24&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dbc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-24-f129c4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f129c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0693-cwe-204-observable-response-discrepa-b4b6ddc7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0693%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20AWS%20AWS%20Sign-in%20IAM%20Login%20Flow&amp;severity=medium&amp;id=68ee9ba2d8f994a66eca6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52331-cwe-494-download-of-code-without-in-e70ed510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52331%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20ECOVACS%20Unspecified%20robots&amp;severity=high&amp;id=68e0f3c0b66c7f7acdd3d07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0650-improper-access-control-8a95edc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0650%3A%20Improper%20Access%20Control&amp;severity=high&amp;id=68af0c87ad5a09ad00627bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23960-improper-neutralization-of-input-du-1194ce25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23960%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basteln3rk%20Save%20%26%20Import%20Image%20from%20URL&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23894-improper-neutralization-of-input-du-df73fde6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tatsuya%20wp-flickr-press&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23836-improper-neutralization-of-input-du-1e6f54e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SuryaBhan%20Custom%20Coming%20Soon&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23835-improper-neutralization-of-input-du-077cab22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jmraya%20Legal%20%2B&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23834-improper-neutralization-of-input-du-27172f88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RaminMT%20Links%2FProblem%20Reporter&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23733-improper-neutralization-of-input-du-fffaf0ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sayoko%20SC%20Simple%20Zazzle&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23730-improper-neutralization-of-input-du-721e501f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23730%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flx0%20FLX%20Dashboard%20Groups&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23729-improper-neutralization-of-input-du-ebbfd90a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23729%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fures%20XTRA%20Settings&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee844d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23727-improper-neutralization-of-input-du-b0daf4fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antonzaroutski%20AZ%20Content%20Finder&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23725-improper-neutralization-of-input-du-2e2f24f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23725%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pshikli%20Accessibility%20Task%20Manager&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23724-improper-neutralization-of-input-du-7dca415f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23724%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oleksandr87%20University%20Quizzes%20Online&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23723-improper-neutralization-of-input-du-0efbcb98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23723%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hdw%20player%20Plestar%20Directory%20Listing&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee843b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23722-improper-neutralization-of-input-du-c3755fc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23722%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mind3dom%20Mind3doM%20RyeBread%20Widgets&amp;severity=null&amp;id=69cd7229e6bfc5ba1dee8438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23636-improper-neutralization-of-input-du-6f3a2788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dimitar%20A.%20My%20Favorite%20Car&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23634-improper-neutralization-of-input-du-e8588711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codehandling%20Youtube%20Video%20Grid&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23629-improper-neutralization-of-input-du-fc0df104</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Subhasis%20Laha%20Gallerio&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23628-improper-neutralization-of-input-du-f02af922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20NewMediaOne%20GeoDigs&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23626-improper-neutralization-of-input-du-54c8e088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fukushima%20Kumihimo&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23624-improper-neutralization-of-input-du-a7259583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alessandro%20Benoit%20WpDevTool&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23545-improper-neutralization-of-input-du-299e7d6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Navnish%20Bhardwaj%20WP%20Social%20Broadcast&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23544-improper-neutralization-of-input-du-e8985310</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heart5%20StatPressCN&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23541-improper-neutralization-of-input-du-e2790f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edmon.parker%20Download%2C%20Downloads&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22768-cross-site-request-forgery-csrf-in--887a604b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22768%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20JinHan%20Park%20Rocket%20Media%20Library%20Mime%20Type&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22264-improper-neutralization-of-input-du-a2e96711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Patel%20WP%20Query%20Creator&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10846-cwe-20-improper-input-validation-in-compose-spec-compose-go-befad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10846%3A%20CWE-20%20Improper%20Input%20Validation%20in%20compose-spec%20compose-go&amp;severity=medium&amp;id=682d983ec4522896dcbefad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23540-improper-neutralization-of-input-du-78bb53eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohsin%20Khan%20WP%20Front-end%20login%20and%20register&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57947-vulnerability-in-linux-linux-bdeb53</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23006-cwe-502-deserialization-of-untruste-0472e24f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23006%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SonicWall%20SMA1000&amp;severity=critical&amp;id=68881727ad5a09ad0088bc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13340-cwe-79-improper-neutralization-of-i-a5e5bc4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20MDTF%20%E2%80%93%20Meta%20Data%20and%20Taxonomies%20Filter&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12118-cwe-79-improper-neutralization-of-i-faa36a82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theeventscalendar%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13422-cwe-79-improper-neutralization-of-i-7244c59c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13422%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suhas93%20SEO%20Blogger%20to%20WordPress%20Migration%20using%20301%20Redirection&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13236-cwe-89-improper-neutralization-of-s-5bd698ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13236%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20leogermani%20Tainacan&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12504-cwe-79-improper-neutralization-of-i-91e823ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Broadcast%20Live%20Video%20%E2%80%93%20Live%20Streaming%20%3A%20HTML5%2C%20WebRTC%2C%20HLS%2C%20RTSP%2C%20RTMP&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13234-cwe-89-improper-neutralization-of-s-49291497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13234%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20woobewoo%20Product%20Table%20by%20WBW&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59ca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12043-cwe-79-improper-neutralization-of-i-6812b69e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Post%20Slider%20and%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0635-cwe-770-allocation-of-resources-with-b1aeca27</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0635%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3036be58cf853b75f139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0619-cwe-522-insufficiently-protected-cre-47f21a87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0619%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3035be58cf853b75f120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0648-cwe-248-uncaught-exception-in-m-file-af4d78a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0648%3A%20CWE-248%20Uncaught%20Exception%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c3036be58cf853b75f13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13593-cwe-98-improper-control-of-filename-ff431b34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13593%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20otrok7%20BMLT%20Meeting%20Map&amp;severity=high&amp;id=699f6e63b7ef31ef0b59f593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13511-cwe-352-cross-site-request-forgery--7cc1250d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13511%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themehunk%20Variation%20Swatches%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59eed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-23-2d9fcb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-23&amp;severity=medium&amp;id=682c7dc1e8347ec82d2d9fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-23-f130f3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12477-cwe-79-improper-neutralization-of-i-16ac37ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12477%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20156-improper-handling-of-insufficient-p-a826055a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20156%3A%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20Cisco%20Cisco%20Meeting%20Management&amp;severity=critical&amp;id=69a0a44d85912abc71d65242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20128-heap-based-buffer-overflow-in-cisco-654cee68</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20128%3A%20Heap-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Secure%20Endpoint&amp;severity=medium&amp;id=6908f50df612d110fe9cbec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23914-deserialization-of-untrusted-data-i-0eeaefc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23914%3A%20Deserialization%20of%20Untrusted%20Data%20in%20muzaara%20Muzaara%20Google%20Ads%20Report&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23809-improper-neutralization-of-input-du-ed0b3d58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23809%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sunil%20Nanda%20Blue%20Wrench%20Video%20Widget&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23992-improper-neutralization-of-input-du-42618fd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23992%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20toocheke%20Toocheke%20Companion&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee915f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0604-improper-authentication-bec2dc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0604%3A%20Improper%20Authentication&amp;severity=medium&amp;id=682d9838c4522896dcbec2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23882-improper-neutralization-of-input-du-adfde36f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23882%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20misanthrop%20WP%20Download%20Codes&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23846-improper-neutralization-of-input-du-86df55d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thaikolja%20Flexible%20Blogtitle&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23812-improper-neutralization-of-input-du-04716063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Jeffrey%20Contact%20Form%207%20Round%20Robin%20Lead%20Distribution&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23768-improper-neutralization-of-input-du-f39192be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23768%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inwavethemes%20InFunding&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23746-improper-neutralization-of-input-du-b22988d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Edem%20CMC%20MIGRATE&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23709-improper-neutralization-of-input-du-1535877b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kiroro%20Formatted%20post&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23643-improper-neutralization-of-input-du-61066ce2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a.ankit%20ReadMe%20Creator&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23506-improper-neutralization-of-input-du-c770dd66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23506%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imsoftware%20WP%20IMAP%20Auth&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23486-missing-authorization-in-tamlyn-dat-0e5ae4e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23486%3A%20Missing%20Authorization%20in%20tamlyn%20Database%20Sync&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23475-improper-neutralization-of-input-du-0cca4697</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23475%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fireantology%20History%20timeline&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23462-improper-neutralization-of-input-du-cb55eab5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anil%20Jailta%20FWD%20Slider&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0979e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23449-improper-neutralization-of-input-du-b600fc63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidpuc%20Simple%20shortcode%20buttons&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22772-improper-neutralization-of-input-du-879335db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stephanemartinw%20Mapbox%20for%20WP%20Advanced&amp;severity=null&amp;id=69cd760be6bfc5ba1df091c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23966-improper-neutralization-of-input-du-a70c433c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23966%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ala%20Falaki%20a%20Gateway%20for%20Pasargad%20Bank%20on%20WooCommerce&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23959-improper-neutralization-of-input-du-0e18e05f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Linus%20Lundahl%20Good%20Old%20Gallery&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23953-unrestricted-upload-of-file-with-da-459be43e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23953%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Scriptonite%20user%20files&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23949-improper-control-of-filename-for-in-21cd3c38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23949%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20dzeriho%20Improved%20Sale%20Badges%20%E2%80%93%20Free%20Version&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee9097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23948-improper-control-of-filename-for-in-da9d56cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23948%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Webarea%20Background%20animation%20blocks&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee9094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23944-deserialization-of-untrusted-data-i-4ee0a6da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23944%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bulktheme%20WOOEXIM&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23942-unrestricted-upload-of-file-with-da-22902b79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23942%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ngocuct0912%20WP%20Load%20Gallery&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee904e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23938-improper-control-of-filename-for-in-8377ffc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23938%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20CRUDLab%20Image%20Gallery%20Box%20by%20CRUDLab&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23932-deserialization-of-untrusted-data-i-9dc6f76b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23932%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Marko-M%20Quick%20Count&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23931-improper-neutralization-of-special--c607a8bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23931%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Oliver%20Fuhrmann%20WordPress%20Local%20SEO&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23921-unrestricted-upload-of-file-with-da-dfe50543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23921%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sh1zen%20Multi%20Uploader%20for%20Gravity%20Forms&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23918-unrestricted-upload-of-file-with-da-e97d2075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23918%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Enrico%20Sandoli%20Smallerik%20File%20Browser&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23910-improper-neutralization-of-special--0b52c95f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23910%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20keighl%20Menus%20Plus%2B&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23874-improper-neutralization-of-input-du-9ac0f11f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FalconTheme%20Team%20WP%20Block%20Pack&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23867-improper-neutralization-of-input-du-81bb54d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markcoker%20WordPress%20File%20Search&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23866-improper-neutralization-of-input-du-d50c113e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20E.%20Marten%20EU%20DSGVO%20Helper&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23811-improper-neutralization-of-input-du-f9878f61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghasemy14%20WP2APP&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23806-cross-site-request-forgery-csrf-in--adf4ae8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23806%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFarmer%20Ultimate%20Subscribe&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23803-cross-site-request-forgery-csrf-in--c267390d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23803%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rik%20Schennink%20Snippy&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23798-cwe-79-improper-neutralization-of-i-5294a726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ElbowRobo%20Mass%20Messaging%20in%20BuddyPress&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23784-improper-neutralization-of-special--38706734</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23784%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20David%20Jeffrey%20Contact%20Form%207%20Round%20Robin%20Lead%20Distribution&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23781-insertion-of-sensitive-information--cd993a02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23781%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Web%20Mumbai%20WM%20Options%20Import%20Export&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23774-insertion-of-sensitive-information--8fdccc7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23774%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Niket%20Joshi%20WPDB%20to%20Sql&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee860b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23770-improper-neutralization-of-input-du-2126f031</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Caspie%20Fast%20Tube&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23769-improper-neutralization-of-input-du-1c510097</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23769%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dreamsofmatter%20Content%20Mirror&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23758-improper-neutralization-of-input-du-3be3ece6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pootlepress%20Pootle%20button&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23732-improper-neutralization-of-input-du-3610acd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20franciscopalacios%20Easy%20Filtering&amp;severity=null&amp;id=69cd722be6bfc5ba1dee84f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23706-improper-neutralization-of-input-du-79b38cee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23706%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milordk%20Jet%20Skinner%20for%20BuddyPress&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23701-improper-neutralization-of-input-du-74074365</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23701%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20limesquare%20Lime%20Developer%20Login&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23700-improper-neutralization-of-input-du-585784bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonisink%20yCyclista&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23697-improper-neutralization-of-input-du-caa0e2b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23697%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdeal%20Pod%C4%8Dl%C3%A1nkov%C3%A1%20inzerce&amp;severity=null&amp;id=69cd764ce6bfc5ba1df0b0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23696-improper-neutralization-of-input-du-6b4c671a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronan%20Mockett%20Staging%20CDN&amp;severity=null&amp;id=69cd764ce6bfc5ba1df0b0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23695-improper-neutralization-of-input-du-c4a15e6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23695%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kinlane%20CtyGrid%20Hyp3rL0cal%20Search&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23686-improper-neutralization-of-input-du-1af8048d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23686%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phpdevca%20Admin%20Menu%20Organizer&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23684-missing-authorization-in-eugen-bobr-e3057fd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23684%3A%20Missing%20Authorization%20in%20Eugen%20Bobrowski%20Debug%20Tool&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23683-improper-neutralization-of-input-du-1b77dce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xdxdVSxdxd%20MACME&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23682-improper-neutralization-of-input-du-c4df4579</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bhuvnesh%20Gupta%20Preloader%20Quotes&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23681-improper-neutralization-of-input-du-5c8b6da0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23681%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tahminajannat%20REDIRECTION%20PLUS&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23679-improper-neutralization-of-input-du-9cf569dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Flourish%20Pixel%20FP%20RSS%20Category%20Excluder&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23678-improper-neutralization-of-input-du-4925cf95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23678%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md%20Imranur%20Rahman%20LocalGrid&amp;severity=null&amp;id=69cd7649e6bfc5ba1df0afb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23676-improper-neutralization-of-input-du-4a5eafee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20Email&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0af01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23674-improper-neutralization-of-input-du-658ff6e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andygauk%20Bit.ly%20linker&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23672-improper-neutralization-of-input-du-3f3c9308</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23672%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tenteeglobal%20Instant%20Appointment&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23631-improper-neutralization-of-input-du-429a3eee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sarah%20Lewis%20Content%20Planner&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0aca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23630-improper-neutralization-of-input-du-0992eb67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Irshad%20A.Khan%20Cyber%20Slider&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23625-improper-neutralization-of-input-du-b938a36d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awcode%20Unique%20UX&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23611-improper-neutralization-of-input-du-0da31919</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webhue%20WH%20Cache%20%26%20Security&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23610-improper-neutralization-of-input-du-b0d90bf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tehsmash%20Ultimate%20Events&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23609-improper-neutralization-of-input-du-c81230d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Helle1%20Tagesteller&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23607-improper-neutralization-of-input-du-506b5790</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23607%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Camoo%20Sarl%20CAMOO%20SMS&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23606-improper-neutralization-of-input-du-3f8133dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23606%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sebkay%20Calendi&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23605-improper-neutralization-of-input-du-dfb85ee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23605%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lampd%20Call%20To%20Action%20Popup&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23604-improper-neutralization-of-input-du-f34ab856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maeve%20Lander%20Rezdy%20Reloaded&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23603-improper-neutralization-of-input-du-60cadaff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23603%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MohammadJafar%20Khajeh%20Group%20category%20creator&amp;severity=null&amp;id=69cd763fe6bfc5ba1df0ab75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23602-improper-neutralization-of-input-du-f1b05ae9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23602%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Europe%20Ecologie%20Les%20Verts%20EELV%20Newsletter&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23601-improper-neutralization-of-input-du-96e8f6a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23601%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patrice%20Tab%20My%20Content&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23597-improper-neutralization-of-input-du-44556073</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sabareesha%20Rio%20Photo%20Gallery&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23592-improper-neutralization-of-input-du-b512d50f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20animexxx%20dForms&amp;severity=null&amp;id=69cd763de6bfc5ba1df0aab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23589-improper-neutralization-of-input-du-28d5610a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markugwuanyi%20ContentOptin%20Lite&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23583-improper-neutralization-of-input-du-46a6300e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Explara%20Explara%20Membership&amp;severity=null&amp;id=69cd763ce6bfc5ba1df0aa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23578-improper-neutralization-of-input-du-072229bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bastien%20Ho%20Custom%20CSS%20Addons&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23562-improper-limitation-of-a-pathname-t-e1214956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23562%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pitinca%20XLSXviewer&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23548-improper-neutralization-of-input-du-c0ae7121</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bilal%20TAS%20Responsivity&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23535-improper-neutralization-of-input-du-dfdf84c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martin_ziegert%20REAL%20WordPress%20Sidebar&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23512-missing-authorization-in-118group-t-ec3a0e8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23512%3A%20Missing%20Authorization%20in%20118group%20Team%20118GROUP%20Agent&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23509-improper-neutralization-of-input-du-0b561ce7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23509%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteheart%20HyperComments&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23507-improper-neutralization-of-input-du-141324e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23507%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Blrt%20Blrt%20WP%20Embed&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23503-improper-neutralization-of-input-du-4fc65552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osolwordpress%20Customizable%20Captcha%20and%20Contact%20Us&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23500-improper-neutralization-of-input-du-bfcd974e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faaiq%20Simple%20Custom%20post%20type%20custom%20field&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23498-improper-neutralization-of-input-du-b5c6b122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23498%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ContentLocalized%20Translation.Pro&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23495-improper-neutralization-of-input-du-b6810143</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chetan%20Khandla%20WooCommerce%20Order%20Search&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0395-cwe-131-incorrect-calculation-of-buffer-size-in-the-gnu-c-library-glibc-bee39b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0395%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=medium&amp;id=682d983bc4522896dcbee39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13496-cwe-89-improper-neutralization-of-s-e80a426a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13496%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13447-cwe-862-missing-authorization-in-th-213848c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13447%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13499-cwe-94-improper-control-of-generati-91c7831a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13499%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13495-cwe-94-improper-control-of-generati-1a86848d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13495%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e5bb7ef31ef0b59ed6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0429-cwe-502-deserialization-of-untrusted-72754ac8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0429%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20senols%20AI%20Power%3A%20Complete%20AI%20Pack&amp;severity=high&amp;id=699f6b69b7ef31ef0b55526b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13319-cwe-79-improper-neutralization-of-i-81f44d29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13319%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0428-cwe-502-deserialization-of-untrusted-43955ce8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0428%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20senols%20AI%20Power%3A%20Complete%20AI%20Pack&amp;severity=high&amp;id=699f6b69b7ef31ef0b555267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13360-cwe-918-server-side-request-forgery-930f7928</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13360%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20senols%20AI%20Power%3A%20Complete%20AI%20Pack&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13361-cwe-862-missing-authorization-in-se-4d956701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13361%3A%20CWE-862%20Missing%20Authorization%20in%20senols%20AI%20Power%3A%20Complete%20AI%20Pack&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12117-cwe-79-improper-neutralization-of-i-62219fe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Stackable%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12857-cwe-288-authentication-bypass-using-9752f3da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12857%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13406-cwe-79-improper-neutralization-of-i-2a3f14a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20XML%20for%20Google%20Merchant%20Center&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12879-cwe-862-missing-authorization-in-qu-49ad34eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12879%3A%20CWE-862%20Missing%20Authorization%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11218-improper-privilege-management-bd877e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11218%3A%20Improper%20Privilege%20Management&amp;severity=high&amp;id=682d9819c4522896dcbd877e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13590-cwe-79-improper-neutralization-of-i-e2c3ed18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ayecode%20Ketchup%20Shortcodes&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13584-cwe-79-improper-neutralization-of-i-029f7b73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13584%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Picture%20Gallery%20%E2%80%93%20Frontend%20Image%20Uploads%2C%20AJAX%20Photo%20List&amp;severity=medium&amp;id=699f6e61b7ef31ef0b59f49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13426-cwe-89-improper-neutralization-of-s-eeb80730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13426%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gamerz%20WP-Polls&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23090-84411a74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23090&amp;severity=null&amp;id=687ad5bda83201eaacf7835e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23083-vulnerability-in-nodejs-node-bed624</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23083%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-22-23521633</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-22&amp;severity=medium&amp;id=68367c97182aa0cae231a15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-22-f26571</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-22&amp;severity=medium&amp;id=682acdc4bbaf20d303f26571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-22-f120ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f120ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13091-cwe-434-unrestricted-upload-of-file-815cbfc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13091%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20QuantumCloud%20WPBot%20Pro%20Wordpress%20Chatbot&amp;severity=critical&amp;id=699f6e4db7ef31ef0b59c8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49749-remote-code-execution-in-google-and-d6f2812d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49749%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=high&amp;id=69a0a44485912abc71d6312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43765-elevation-of-privilege-in-google-an-a1ee741e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43765%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43d85912abc71d624a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43095-elevation-of-privilege-in-google-an-0dc34d93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43095%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43d85912abc71d6249e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34730-elevation-of-privilege-in-google-an-6a09b08d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34730%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43d85912abc71d6248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45479-cwe-918-server-side-request-forgery-b952b9cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45479%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=critical&amp;id=68487f591b0bd07c3938aa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45478-cwe-79-improper-neutralization-of-i-dd660770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ranger&amp;severity=medium&amp;id=68487f591b0bd07c3938aa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21569-difficult-to-exploit-vulnerability--db5d9055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21569%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Hyperion%20Data%20Relationship%20Management.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Hyperion%20Data%20Relationship%20Management.%20in%20Oracle%20Corporation%20Oracle%20Hyperion%20Data%20Relationship%20Management&amp;severity=medium&amp;id=69a0a45185912abc71d6565f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21567-easily-exploitable-vulnerability-al-30c22148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21567%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21566-easily-exploitable-vulnerability-al-932117a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21566%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21559-easily-exploitable-vulnerability-al-f706df0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21559%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21556-easily-exploitable-vulnerability-al-b52254f2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21556%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM%20Framework.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Agile%20PLM%20Framework%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Agile%20PLM%20Framework.%20in%20Oracle%20Corporation%20Oracle%20Agile%20PLM%20Framework&amp;severity=critical&amp;id=69a0a45185912abc71d6565c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21555-easily-exploitable-vulnerability-al-e5fd629d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21555%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4fc28fd46ded81d147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21546-easily-exploitable-vulnerability-al-911fbd5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21546%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=69091a4dc28fd46ded81d113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21543-easily-exploitable-vulnerability-al-94f417ec</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21543%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091a4dc28fd46ded81d10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21540-easily-exploitable-vulnerability-al-38481d81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21540%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21536-easily-exploitable-vulnerability-al-10b5b939</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21536%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21535-easily-exploitable-vulnerability-al-65ad2f63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21535%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20T3%2C%20IIOP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.%20in%20Oracle%20Corporation%20Oracle%20WebLogic%20Server&amp;severity=critical&amp;id=69a0a45185912abc71d65659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21534-easily-exploitable-vulnerability-al-82711270</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21534%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21532-easily-exploitable-vulnerability-al-93fe2dd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21532%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Analytics%20Desktop%20executes%20to%20compromise%20Oracle%20Analytics%20Desktop.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Analytics%20Desktop.%20in%20Oracle%20Corporation%20Oracle%20Analytics%20Desktop&amp;severity=high&amp;id=69a0a45185912abc71d65656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21531-easily-exploitable-vulnerability-al-0632b51c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21531%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21529-easily-exploitable-vulnerability-al-b4adb944</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21529%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21525-easily-exploitable-vulnerability-al-1903875d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21525%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21524-easily-exploitable-vulnerability-al-524494f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21524%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20JD%20Edwards%20EnterpriseOne%20Tools.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=critical&amp;id=69a0a45185912abc71d65653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21523-easily-exploitable-vulnerability-al-6170ccf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21523%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21522-easily-exploitable-vulnerability-al-d7ae6b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21522%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4dc28fd46ded81d0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21521-easily-exploitable-vulnerability-al-56effc3f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21521%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=high&amp;id=69091a4cc28fd46ded81d0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21520-difficult-to-exploit-vulnerability--552e91ad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21520%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Cluster%20executes%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Cluster%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=low&amp;id=69091a4cc28fd46ded81d0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21519-difficult-to-exploit-vulnerability--a9c0bdc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21519%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21518-easily-exploitable-vulnerability-al-c7925807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21518%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21515-easily-exploitable-vulnerability-al-7db0d531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21515%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20JD%20Edwards%20EnterpriseOne%20Tools.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20JD%20Edwards%20EnterpriseOne%20Tools.%20in%20Oracle%20Corporation%20JD%20Edwards%20EnterpriseOne%20Tools&amp;severity=high&amp;id=69a0a45185912abc71d65650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21505-easily-exploitable-vulnerability-al-b75fe706</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21505%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21504-easily-exploitable-vulnerability-al-bb78dd21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21504%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21503-easily-exploitable-vulnerability-al-2e546a02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21503%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21501-easily-exploitable-vulnerability-al-1c54f7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21501%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21500-easily-exploitable-vulnerability-al-d4632947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21500%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21499-easily-exploitable-vulnerability-al-1c129e73</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21499%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4cc28fd46ded81d0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21497-easily-exploitable-vulnerability-al-ba6e7739</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21497%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21494-difficult-to-exploit-vulnerability--6869fe7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21494%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21493-difficult-to-exploit-vulnerability--049c32a5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21493%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21491-easily-exploitable-vulnerability-al-1e366011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21491%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21490-easily-exploitable-vulnerability-al-e23979d1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21490%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69091a4ac28fd46ded81d08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23994-improper-neutralization-of-input-du-b0316db9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Estatebud%20Estatebud%20%E2%80%93%20Properties%20%26%20Listings&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22722-missing-authorization-in-marketing--e5c87f5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22722%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22721-missing-authorization-in-farhan-noo-a8d42323</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22721%3A%20Missing%20Authorization%20in%20Farhan%20Noor%20ApplyOnline&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22661-improper-neutralization-of-input-du-1a6e1b29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22661%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Payments%20%E2%80%93%20Get%20Paid%20with%20PayPal%2C%20Square%20%26%20Stripe&amp;severity=null&amp;id=69cd75fee6bfc5ba1df08ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22276-improper-neutralization-of-input-du-6a6c9711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enguerranws%20Related%20Post%20Shortcode&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22267-improper-neutralization-of-input-du-8af72e24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Themes%20Shortcode%20Compatibility&amp;severity=null&amp;id=69cd75d4e6bfc5ba1df07f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23580-improper-neutralization-of-input-du-fa3104df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matthew%20BizLibrary&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23551-improper-neutralization-of-input-du-e0effac0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razvypp%20SexBundle&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23489-improper-neutralization-of-input-du-d979b7d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Messenlehner%20WP-Announcements&amp;severity=null&amp;id=69cd7629e6bfc5ba1df0a3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23477-missing-authorization-in-realtywork-cd8e3418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23477%3A%20Missing%20Authorization%20in%20realtyworkstation%20Realty%20Workstation&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23461-improper-neutralization-of-input-du-57121c7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xkollsoftware%20Social2Blog&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0979b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23454-improper-neutralization-of-input-du-275a9ddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flashmaniac%20Nature%20FlipBook&amp;severity=null&amp;id=69cd761ae6bfc5ba1df09763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24001-cross-site-request-forgery-csrf-in--a5eb8dde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24001%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ng%C3%B4%20Th%E1%BA%AFng%20IT%20PPO%20Call%20To%20Actions&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee916b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23998-improper-neutralization-of-input-du-21e412ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20raratheme%20UltraLight&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23997-improper-neutralization-of-input-du-656a80bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23997%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tamara%20Solution%20Tamara%20Checkout&amp;severity=null&amp;id=69cd7255e6bfc5ba1dee9165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22825-improper-neutralization-of-input-du-b554460a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdesk%20Flexible%20PDF%20Coupons&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22733-improper-neutralization-of-input-du-e41564df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22732-improper-neutralization-of-input-du-f3cee18f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Admiral%20Ad%20Blocking%20Detector&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22727-improper-neutralization-of-input-du-1cd6196b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22727%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginOps%20MailChimp%20Subscribe%20Forms&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22723-unrestricted-upload-of-file-with-da-3e0932df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22723%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22719-improper-neutralization-of-input-du-bb00d036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20e4jvikwp%20VikAppointments%20Services%20Booking%20Calendar&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22718-improper-neutralization-of-input-du-afdb5568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roninwp%20FAT%20Event%20Lite&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22717-missing-authorization-in-joe-dolson-b1b9c2b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22717%3A%20Missing%20Authorization%20in%20Joe%20Dolson%20My%20Tickets&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22711-improper-neutralization-of-input-du-45866789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22711%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thomas%20Maier%20Image%20Source%20Control&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22710-improper-neutralization-of-special--09e11c25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22710%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20storeapps%20Smart%20Manager&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22709-improper-neutralization-of-input-du-ba46dfe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soft8Soft%20LLC%20Verge3D&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22262-improper-neutralization-of-input-du-d7956cec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WittyFolk%20Bonjour%20Bar&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32555-incorrect-privilege-assignment-in-i-40b749e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32555%3A%20Incorrect%20Privilege%20Assignment%20in%20InspiryThemes%20Easy%20Real%20Estate&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22735-improper-neutralization-of-input-du-e0d2346b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22735%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steve%20Burge%20WordPress%20Tag%20Cloud%20Plugin%20%E2%80%93%20Tag%20Groups&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22553-improper-neutralization-of-special--ba3e11cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22553%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dhananjaysingh%20Multiple%20Carousel&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22322-improper-neutralization-of-input-du-b233000a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DeluxeThemes%20Private%20Messages%20for%20UserPro&amp;severity=null&amp;id=69cd75dae6bfc5ba1df0819d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22318-missing-authorization-in-enituretec-f4dc4e6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22318%3A%20Missing%20Authorization%20in%20enituretechnology%20Standard%20Box%20Sizes%20%E2%80%93%20for%20WooCommerce&amp;severity=null&amp;id=69cd75dae6bfc5ba1df08197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22311-improper-control-of-filename-for-in-15062d63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22311%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20DeluxeThemes%20Private%20Messages%20for%20UserPro&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56277-improper-encoding-or-escaping-of-ou-da884850</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56277%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51919-unrestricted-upload-of-file-with-da-7abb603a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51919%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=null&amp;id=69cd7535e6bfc5ba1df03668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51888-incorrect-privilege-assignment-in-f-0393f389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51888%3A%20Incorrect%20Privilege%20Assignment%20in%20favethemes%20Homey%20Login%20Register&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51818-improper-neutralization-of-special--a8236362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51818%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20radykal%20Fancy%20Product%20Designer&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49700-improper-neutralization-of-input-du-1ccf43da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49699-deserialization-of-untrusted-data-i-1c4e0498</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49699%3A%20Deserialization%20of%20Untrusted%20Data%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49688-deserialization-of-untrusted-data-i-2445cc88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49688%3A%20Deserialization%20of%20Untrusted%20Data%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df01994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49666-improper-neutralization-of-special--1363acd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49666%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49655-improper-neutralization-of-special--33408bef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49655%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARPrice&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df01767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57946-vulnerability-in-linux-linux-bdeb4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21664-vulnerability-in-linux-linux-be9778</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21663-vulnerability-in-linux-linux-be9774</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21662-vulnerability-in-linux-linux-bdd2ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21661-vulnerability-in-linux-linux-be9770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21660-vulnerability-in-linux-linux-bdd2c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21659-vulnerability-in-linux-linux-be976c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe976c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21658-vulnerability-in-linux-linux-be9768</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21657-vulnerability-in-linux-linux-be9764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21656-vulnerability-in-linux-linux-be975e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe975e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57945-vulnerability-in-linux-linux-bdd203</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57944-vulnerability-in-linux-linux-bdeb3c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57943-vulnerability-in-linux-linux-bdeb2b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57942-vulnerability-in-linux-linux-bdeb23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57941-vulnerability-in-linux-linux-bdeb1b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57940-vulnerability-in-linux-linux-bdeb13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57939-vulnerability-in-linux-linux-bdeb0b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57938-vulnerability-in-linux-linux-bdeafc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57936-vulnerability-in-linux-linux-bdeaeb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeaeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57935-vulnerability-in-linux-linux-bdd1fb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57934-vulnerability-in-linux-linux-bdeae3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57933-vulnerability-in-linux-linux-bdeadb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57932-vulnerability-in-linux-linux-bdeac4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57931-vulnerability-in-linux-linux-bdeac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57930-vulnerability-in-linux-linux-bdeaba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeaba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13444-cwe-352-cross-site-request-forgery--8d51a498</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13444%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tuxlog%20wp-greet&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11226-cwe-79-improper-neutralization-of-i-6fa3377b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexmoss%20FireCask%20Like%20%26%20Share%20Button&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b59416f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13230-cwe-89-improper-neutralization-of-s-a2a5b31d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13230%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20the_champ%20Social%20Share%2C%20Social%20Login%20and%20Social%20Comments%20Plugin%20%E2%80%93%20Super%20Socializer&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0450-cwe-79-improper-neutralization-of-in-5bb773ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23184-cwe-400-uncontrolled-resource-consu-b7456c2e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23184%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=medium&amp;id=69403410d9bcdf3f3de99382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13404-cwe-79-improper-neutralization-of-i-7d606183</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13404%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12104-cwe-862-missing-authorization-in-wp-00076b42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12104%3A%20CWE-862%20Missing%20Authorization%20in%20wpfeedback%20Visual%20Website%20Collaboration%2C%20Feedback%20%26%20Project%20Management%20%E2%80%93%20Atarim&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12005-cwe-352-cross-site-request-forgery--9fa106bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12005%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zjhzxhz%20WP-BibTeX&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0371-cwe-79-improper-neutralization-of-in-e552e46a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10936-cwe-502-deserialization-of-untruste-23c43f80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10936%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20instawp%20String%20locator&amp;severity=high&amp;id=699f6e03b7ef31ef0b593913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13536-cwe-209-generation-of-error-message-e069d76e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13536%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%208blocks%201003%20Mortgage%20Application&amp;severity=medium&amp;id=699f6e5fb7ef31ef0b59f15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56998-na-6baa1228</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56998%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56997-na-62cf5acc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54795-na-159395dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54795%3A%20n%2Fa&amp;severity=medium&amp;id=68f2616f9c34d0947f2ce865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54794-na-e6924899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54794%3A%20n%2Fa&amp;severity=critical&amp;id=68f2616f9c34d0947f2ce861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54792-na-39141dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54792%3A%20n%2Fa&amp;severity=medium&amp;id=68f2616f9c34d0947f2ce85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-21-2dabeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-21&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dabeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-21-f1258b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f1258b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21655-vulnerability-in-linux-linux-be9744</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13176-cwe-385-covert-timing-channel-in-openssl-openssl-289643</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13176%3A%20CWE-385%20Covert%20Timing%20Channel%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=6834b1540acd01a249289643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52923-vulnerability-in-linux-linux-be7928</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24337-cwe-281-improper-preservation-of-pe-38bef327</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24337%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20Musing%20Studio%20WriteFreely&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-20-2dec89</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-20&amp;severity=medium&amp;id=682c7dc2e8347ec82d2dec89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-20-f1300e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f1300e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57929-vulnerability-in-linux-linux-bdeaa9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57928-vulnerability-in-linux-linux-bdeaa1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57927-vulnerability-in-linux-linux-bdea99</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57926-vulnerability-in-linux-linux-bdea91</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57925-vulnerability-in-linux-linux-bdea80</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57924-vulnerability-in-linux-linux-bdea7a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57923-vulnerability-in-linux-linux-bdea69</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57922-vulnerability-in-linux-linux-bdea54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57921-vulnerability-in-linux-linux-bdea4c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57920-vulnerability-in-linux-linux-bdea44</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57919-vulnerability-in-linux-linux-bdea3c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57918-vulnerability-in-linux-linux-bdea38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57917-vulnerability-in-linux-linux-bdea2b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57916-vulnerability-in-linux-linux-bdea27</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57914-vulnerability-in-linux-linux-bdea23</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57913-vulnerability-in-linux-linux-bdea1f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57912-vulnerability-in-linux-linux-bdea1b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdea1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57911-vulnerability-in-linux-linux-bdea0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbdea0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57910-vulnerability-in-linux-linux-bdd1f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57909-vulnerability-in-linux-linux-bde9fd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57908-vulnerability-in-linux-linux-bde9f9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57907-vulnerability-in-linux-linux-bde9f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57906-vulnerability-in-linux-linux-bdd1eb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57905-vulnerability-in-linux-linux-bde9f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57904-vulnerability-in-linux-linux-bde9ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21654-vulnerability-in-linux-linux-be9740</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21653-vulnerability-in-linux-linux-be973c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe973c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21652-vulnerability-in-linux-linux-be9738</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21651-vulnerability-in-linux-linux-be9734</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21650-vulnerability-in-linux-linux-bdd2c2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21649-vulnerability-in-linux-linux-be9730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21648-vulnerability-in-linux-linux-be972c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe972c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21647-vulnerability-in-linux-linux-bdd2be</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21646-vulnerability-in-linux-linux-be9728</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21645-vulnerability-in-linux-linux-bdd2ba</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21644-vulnerability-in-linux-linux-be9724</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21643-vulnerability-in-linux-linux-be9717</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21642-vulnerability-in-linux-linux-bdd2a9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21641-vulnerability-in-linux-linux-be9704</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21640-vulnerability-in-linux-linux-be9700</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21639-vulnerability-in-linux-linux-be96fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21638-vulnerability-in-linux-linux-bdd2a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21637-vulnerability-in-linux-linux-be96f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21636-vulnerability-in-linux-linux-be96f4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21635-vulnerability-in-linux-linux-be96f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21634-vulnerability-in-linux-linux-be96ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe96ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21633-aeb0f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21633&amp;severity=low&amp;id=682cd0f71484d88663aeb0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21632-vulnerability-in-linux-linux-be96e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe96e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21631-vulnerability-in-linux-linux-bdd29b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8722-cwe-79-improper-neutralization-of-in-5d63ab47</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8722%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-19-2dcf65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-19&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dcf65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-19-f12973</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13375-cwe-620-unverified-password-change--59f12fb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13375%3A%20CWE-620%20Unverified%20Password%20Change%20in%20spoonthemes%20Adifier%20System&amp;severity=critical&amp;id=699f6e52b7ef31ef0b59e3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13184-cwe-89-improper-neutralization-of-s-b5cabaed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13184%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6e4eb7ef31ef0b59c945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13392-cwe-79-improper-neutralization-of-i-d98f7f37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Rate%20Star%20Review%20Vote%20%E2%80%93%20AJAX%20Reviews%2C%20Votes%2C%20Star%20Ratings&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13433-cwe-79-improper-neutralization-of-i-b04ac0f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yunra%20Utilities%20for%20MTG&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13393-cwe-79-improper-neutralization-of-i-d829e4b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0369-cwe-79-improper-neutralization-of-in-09251557</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetEngine&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55514d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12696-cwe-79-improper-neutralization-of-i-ce37939e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Picture%20Gallery%20%E2%80%93%20Frontend%20Image%20Uploads%2C%20AJAX%20Photo%20List&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13385-cwe-79-improper-neutralization-of-i-6390eeeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jsmoriss%20JSM%20Screenshot%20Machine%20Shortcode&amp;severity=medium&amp;id=699f6e53b7ef31ef0b59e4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13517-cwe-79-improper-neutralization-of-i-da7c6385</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12385-cwe-352-cross-site-request-forgery--75aa3759</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12385%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevonadonis%20WP%20Abstracts&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13519-cwe-79-improper-neutralization-of-i-d29a67e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webwizardsdev%20MarketKing%20%E2%80%94%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13317-cwe-352-cross-site-request-forgery--ae968016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13317%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20advancedcreation%20ShipWorks%20Connector%20for%20Woocommerce&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0515-cwe-862-missing-authorization-in-cms-7c5e7b5b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0515%3A%20CWE-862%20Missing%20Authorization%20in%20cmsmasters%20Buzz%20Club%20%E2%80%93%20Night%20Club%2C%20DJ%20and%20Music%20Festival%20Event%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13432-cwe-352-cross-site-request-forgery--c24fc5f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13432%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sjhand%20Webcamconsult&amp;severity=medium&amp;id=699f6e56b7ef31ef0b59e816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13391-cwe-79-improper-neutralization-of-i-92cf067a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20MicroPayments%20%E2%80%93%20Fans%20Paysite%3A%20Paid%20Creator%20Subscriptions%2C%20Digital%20Assets%2C%20Tokens%20Wallet&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0308-cwe-89-improper-neutralization-of-sp-b74c741f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0308%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=699f6b67b7ef31ef0b5550a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13516-cwe-79-improper-neutralization-of-i-0420206d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Kubio%20AI%20Page%20Builder&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13515-cwe-79-improper-neutralization-of-i-9e2d41ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webzunft%20Image%20Source%20Control%20Lite%20%E2%80%93%20Show%20Image%20Credits%20and%20Captions&amp;severity=medium&amp;id=699f6e5cb7ef31ef0b59ef1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0318-cwe-200-exposure-of-sensitive-inform-e2e6bdf1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0318%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6b67b7ef31ef0b55511f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0554-cwe-79-improper-neutralization-of-in-db0b37a8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=699f6b69b7ef31ef0b55530b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12071-cwe-862-missing-authorization-in-ev-9836b779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12071%3A%20CWE-862%20Missing%20Authorization%20in%20evergreencontentposter%20Evergreen%20Content%20Poster%20%E2%80%93%20Auto%20Post%20and%20Schedule%20Your%20Best%20Content%20to%20Social%20Media&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23209-cwe-94-improper-control-of-generati-04886799</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23209%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=high&amp;id=68881727ad5a09ad0088bc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-18-2dc816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-18&amp;severity=medium&amp;id=682c7dc1e8347ec82d2dc816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-18-f1310c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f1310c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23206-cwe-347-improper-verification-of-cr-f85980a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23206%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20aws%20aws-cdk&amp;severity=low&amp;id=697391d84623b1157c4b18cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21185-cwe-284-improper-access-control-in--ae2fecd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21185%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=68c0c0d09ed239a66badfce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21399-cwe-426-untrusted-search-path-in-mi-aaac28ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21399%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Edge%20Update%20Setup&amp;severity=high&amp;id=6852d15033c7acc046ee0911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12370-cwe-284-improper-access-control-in--9ff5f363</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12370%3A%20CWE-284%20Improper%20Access%20Control%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12203-cwe-79-improper-neutralization-of-i-0c92c9d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandondove%20RSS%20Icon%20Widget&amp;severity=medium&amp;id=699f6e31b7ef31ef0b59783f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12466-cwe-79-improper-neutralization-of-i-4e27291a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scribit%20Proofreading&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12598-cwe-79-improper-neutralization-of-i-9ad17c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookProgress%20by%20Stormhill%20Media&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12637-cwe-200-exposure-of-sensitive-infor-f8afb38d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12637%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20katsushi-kawamori%20Moving%20Users&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13367-cwe-862-missing-authorization-in-ba-f8629f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13367%3A%20CWE-862%20Missing%20Authorization%20in%20barteled%20Sandbox&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13386-cwe-79-improper-neutralization-of-i-29fc3723</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobig%20quote-posttype-plugin&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13366-cwe-79-improper-neutralization-of-i-b58c5131</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20barteled%20Sandbox&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12508-cwe-79-improper-neutralization-of-i-3b0c12c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glofoxwebdev%20Glofox%20Shortcodes&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10799-cwe-22-improper-limitation-of-a-pat-b91ebb5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10799%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20imithemes%20Eventer%20-%20WordPress%20Event%20%26%20Booking%20Manager%20Plugin&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13333-cwe-434-unrestricted-upload-of-file-a02949a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13333%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20saadiqbal%20Advanced%20File%20Manager%20%E2%80%94%20Ultimate%20WordPress%20File%20Manager%20and%20Document%20Library%20Plugin&amp;severity=high&amp;id=699f6e50b7ef31ef0b59cb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13398-cwe-79-improper-neutralization-of-i-0612829d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20naa986%20Checkout%20for%20PayPal&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13434-cwe-79-improper-neutralization-of-i-f04ff764</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chuck1982%20WP%20Inventory%20Manager&amp;severity=medium&amp;id=699f6e57b7ef31ef0b59e8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13401-cwe-79-improper-neutralization-of-i-d9c5b9f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20naa986%20Payment%20Button%20for%20PayPal&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21325-cwe-732-incorrect-permission-assign-389b7cb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21325%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0c0d09ed239a66badfd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57372-na-bdb0b219</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57372%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57252-na-28381db4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57252%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57030-na-dd5a7716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57030%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52870-na-6c05a364</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52870%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb9b7ef31ef0b55a691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-17-2ddb14</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-17&amp;severity=medium&amp;id=682c7dc2e8347ec82d2ddb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-17-f1288c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f1288c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23764-missing-authorization-in-ujjavaljan-53ed6b9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23764%3A%20Missing%20Authorization%20in%20ujjavaljani%20Copy%20Move%20Posts&amp;severity=null&amp;id=69cd722fe6bfc5ba1dee85dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23793-cross-site-request-forgery-csrf-in--ef2a8bf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23793%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ciprian%20Turcu%20Auto%20FTP&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23957-missing-authorization-in-surdotly-s-be3e0eae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23957%3A%20Missing%20Authorization%20in%20surdotly%20Sur.ly&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23965-improper-neutralization-of-input-du-deb1f530</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23965%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kopatheme%20Kopa%20Nictitate%20Toolkit&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23961-missing-authorization-in-wptasker-w-fe0d74b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23961%3A%20Missing%20Authorization%20in%20wptasker%20WordPress%20Graphs%20%26%20Charts&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23963-missing-authorization-in-flymke-mar-415bbd6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23963%3A%20Missing%20Authorization%20in%20flymke%20Mark%20Posts&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23962-missing-authorization-in-jjtrabucco-b5ba0ec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23962%3A%20Missing%20Authorization%20in%20jjtrabucco%20Goldstar&amp;severity=null&amp;id=69cd7252e6bfc5ba1dee90f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23954-missing-authorization-in-awcode-sal-0ef2a3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23954%3A%20Missing%20Authorization%20in%20awcode%20Salvador%20%E2%80%93%20AI%20Image%20Generator&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee90a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23939-improper-neutralization-of-input-du-7ffe8982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KHAN-IT%20Image%20Switcher&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23950-improper-neutralization-of-input-du-c3ee6b2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23950%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ezmarketing%20EZPlayer&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee909a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23943-improper-neutralization-of-input-du-7a76bed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aruvi%20PDF.js%20Shortcode&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23946-improper-neutralization-of-input-du-695fb4a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23946%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Le-Pixel-Solitaire%20Enhanced%20YouTube%20Shortcode&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee908e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23941-improper-neutralization-of-input-du-22fbd12e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23941%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20meinturnierplan%20MeinTurnierplan.de%20Widget%20Viewer&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee904b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23951-improper-neutralization-of-input-du-529029ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23951%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DIVENGINE%20Gallery%3A%20Hybrid%20%E2%80%93%20Advanced%20Visual%20Gallery&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee909d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23947-improper-neutralization-of-input-du-a4f359e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23947%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M.J%20WP-Player&amp;severity=null&amp;id=69cd7250e6bfc5ba1dee9091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23934-improper-neutralization-of-input-du-4c2ca572</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sam%20Brodie%20Giveaways%20and%20Contests%20by%20PromoSimple&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee9003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23940-improper-neutralization-of-input-du-465c4f4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horiyuki%20Image%20Switcher&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee9048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23928-improper-neutralization-of-input-du-7b78fad5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aleksandar%20Arsovski%20Google%20Org%20Chart&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23924-improper-neutralization-of-input-du-12cc3bfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeremy%20WP%20Photo%20Sphere&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23935-improper-neutralization-of-input-du-dd01d133</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fengler%20Magic%20Google%20Maps&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee9006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23933-improper-neutralization-of-input-du-cd85ffa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpfreeware%20WpF%20Ultimate%20Carousel&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee9000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23930-missing-authorization-in-paypalmuse-222a10f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23930%3A%20Missing%20Authorization%20in%20paypalmuse%20PayPal%20Marketing%20Solutions&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23925-improper-neutralization-of-input-du-a80f5967</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jp2112%20Feedburner%20Optin%20Form&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23936-improper-neutralization-of-input-du-f02e245c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Harun%20R.%20Rayhan(thecrazycoder)%20CC%20Circle%20Progress%20Bar&amp;severity=null&amp;id=69cd724ee6bfc5ba1dee903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23927-improper-neutralization-of-input-du-cc932d07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20massimo.serpilli%20Incredible%20Font%20Awesome&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23929-missing-authorization-in-wishfulthe-2cf33de1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23929%3A%20Missing%20Authorization%20in%20wishfulthemes%20Email%20Capture%20%26%20Lead%20Generation&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23922-cross-site-request-forgery-csrf-in--c3111838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23922%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Harsh%20iSpring%20Embedder&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23915-improper-control-of-filename-for-in-0170f031</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23915%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Event%20Lite&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23926-improper-neutralization-of-input-du-2c31aa62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TC.K%20Ajax%20WP%20Query%20Search%20Filter&amp;severity=null&amp;id=69cd724ce6bfc5ba1dee8feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23916-missing-authorization-in-nuanced-me-76f53526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23916%3A%20Missing%20Authorization%20in%20Nuanced%20Media%20WP%20Meetup&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23919-improper-neutralization-of-script-r-e2babab5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23919%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Ella%20Van%20Durpe%20Slides%20%26%20Presentations&amp;severity=null&amp;id=69cd724ae6bfc5ba1dee8f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23912-improper-neutralization-of-special--5509891e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23912%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Philipp%20Speck%20WordPress%20Custom%20Sidebar&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23901-cross-site-request-forgery-csrf-in--3fd0d040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23901%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cybio%20GravatarLocalCache&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23913-improper-neutralization-of-special--4bd17ed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23913%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pankajpragma%20WordPress%20Google%20Map%20Professional&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23911-improper-neutralization-of-special--c41e898f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23911%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20solidres%20Solidres%20%E2%80%93%20Hotel%20booking%20plugin&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23909-improper-neutralization-of-input-du-431c291f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Common%20Ninja%20Compare%20Ninja&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23908-improper-neutralization-of-input-du-2cd834ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rami%20Yushuvaev%20Pastebin&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23900-cross-site-request-forgery-csrf-in--0c69a52c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23900%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20genkisan%20Genki%20Announcement&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23902-cross-site-request-forgery-csrf-in--b9eb412f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23902%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Taras%20Dashkevych%20Error%20Notification&amp;severity=null&amp;id=69cd7249e6bfc5ba1dee8ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23897-improper-neutralization-of-input-du-206817aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivobrett%20Apply%20with%20LinkedIn%20buttons&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23898-cross-site-request-forgery-csrf-in--44e61e01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23898%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivobrett%20Apply%20with%20LinkedIn%20buttons&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23887-improper-neutralization-of-input-du-02846c7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottwallick%20Blog%20Summary&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23891-improper-neutralization-of-input-du-1332980a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Loy%20Yet%20Another%20Countdown&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23884-cross-site-request-forgery-csrf-in--456bb138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23884%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Chris%20Roberts%20Annie&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23892-improper-neutralization-of-input-du-5a4a6a9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Furr%20Progress%20Tracker&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23896-improper-neutralization-of-input-du-e93c61db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23896%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thom4%20Mindmeister%20Shortcode&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23890-improper-neutralization-of-input-du-85eac786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tom%20Ewer%20Easy%20Tweet%20Embed&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23895-cross-site-request-forgery-csrf-in--1391fd48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23895%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dan%20Cameron%20Add%20RSS&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23876-improper-neutralization-of-input-du-f38cdb96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20No-Nonsense%20WP%20krpano&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23893-improper-neutralization-of-input-du-e607e6ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Manny%20Costales%20GMap%20Shortcode&amp;severity=null&amp;id=69cd7247e6bfc5ba1dee8e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23875-cross-site-request-forgery-csrf-in--8f4af25d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23875%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20madeglobal%20Better%20Protected%20Pages&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23886-improper-neutralization-of-input-du-a1862759</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23886%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Roberts%20Annie&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23880-cross-site-request-forgery-csrf-in--c65c5537</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23880%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anmari%20amr%20personalise&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23878-improper-neutralization-of-input-du-eac989ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Reilly%20Post-to-Post%20Links&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23873-improper-neutralization-of-input-du-bbab9c43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anshi%20Solutions%20Category%20D3%20Tree&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23877-improper-neutralization-of-input-du-38470afd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nitethemes%20Nite%20Shortcodes&amp;severity=null&amp;id=69cd7246e6bfc5ba1dee8e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23864-improper-neutralization-of-input-du-e8580d9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luke%20America%20WCS%20QR%20Code%20Generator&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23868-improper-neutralization-of-input-du-296e05bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mliebelt%20Chess%20Tempo%20Viewer&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23871-cross-site-request-forgery-csrf-in--d3bba753</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23871%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bas%20Matthee%20LSD%20Google%20Maps%20Embedder&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23865-improper-neutralization-of-input-du-4b2ac529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23865%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pressfore%20Winning%20Portfolio&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23863-improper-neutralization-of-input-du-044d9c67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sabaoh%20Rollover%20Tab&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23870-cross-site-request-forgery-csrf-in--99403b91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23870%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wygk%20Copyright%20Safeguard%20Footer%20Notice&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23854-improper-neutralization-of-input-du-06483dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yesstreamingdev%20Shoutcast%20and%20Icecast%20HTML5%20Web%20Radio%20Player%20by%20YesStreaming.com&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23869-cross-site-request-forgery-csrf-in--fb5280db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23869%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shibulijack%20CJ%20Custom%20Content&amp;severity=null&amp;id=69cd7243e6bfc5ba1dee8dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23859-improper-neutralization-of-input-du-6f1ad22a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jd7777%20Daily%20Proverb&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23860-improper-neutralization-of-input-du-7bd5fea7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crea8xion%20Charity-thermometer&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23862-missing-authorization-in-szmake-con-2ab33f5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23862%3A%20Missing%20Authorization%20in%20SzMake%20Contact%20Form%207%20Anti%20Spambot&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23861-cross-site-request-forgery-csrf-in--760ef346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23861%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Zack%20Katz%20Debt%20Calculator&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23856-improper-neutralization-of-input-du-af4e43fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Odyno%20Simple%20Vertical%20Timeline&amp;severity=null&amp;id=69cd7241e6bfc5ba1dee8cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23848-cross-site-request-forgery-csrf-in--2a7086f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23848%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dpowney%20Hotspots%20Analytics&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23842-cross-site-request-forgery-csrf-in--e084e07a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23842%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nilesh%20Shiragave%20WordPress%20Gallery%20Plugin&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23830-improper-neutralization-of-input-du-9d9eb6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23830%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jobair%20JB%20Horizontal%20Scroller%20News%20Ticker&amp;severity=null&amp;id=69cd723be6bfc5ba1dee883e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23841-improper-neutralization-of-input-du-49d608ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23841%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foo123%20Top%20Flash%20Embed&amp;severity=null&amp;id=69cd723de6bfc5ba1dee8c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23844-cross-site-request-forgery-csrf-in--ee4a6d66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23844%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jamsheer%20K%20Custom%20Widget%20Classes&amp;severity=null&amp;id=69cd723fe6bfc5ba1dee8c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23831-improper-neutralization-of-input-du-dbb45897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23831%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mobstac%20QR%20Code%20Generator&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23828-improper-neutralization-of-input-du-da672d73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23828%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sindhi%20WordPress%20Data%20Guard&amp;severity=null&amp;id=69cd723be6bfc5ba1dee883b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23826-improper-neutralization-of-input-du-45c63d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pedjas%20Stop%20Comment%20Spam&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23833-improper-neutralization-of-input-du-8ff45987</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23833%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RaminMT%20Links%2FProblem%20Reporter&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23823-cross-site-request-forgery-csrf-in--5b71f96b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23823%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jprintf%20CNZZ%2651LA%20for%20WordPress&amp;severity=null&amp;id=69cd723be6bfc5ba1dee882f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23825-improper-neutralization-of-input-du-5c94ccd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20osuthorpe%20Easy%20Shortcode%20Buttons&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23821-cross-site-request-forgery-csrf-in--4c457aa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23821%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aleapp%20WP%20Cookies%20Alert&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23832-cross-site-request-forgery-csrf-in--df1c42fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23832%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matt%20Gibbs%20Admin%20Cleanup&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23820-cross-site-request-forgery-csrf-in--fa66e4f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23820%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thapa.laxman%20Content%20Security%20Policy%20Pro&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23827-improper-neutralization-of-input-du-4a32d8e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20straps%20Strx%20Magic%20Floating%20Sidebar%20Maker&amp;severity=null&amp;id=69cd723be6bfc5ba1dee8838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23818-cross-site-request-forgery-csrf-in--6ae11c45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23818%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pyko%20More%20Link%20Modifier&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23807-improper-neutralization-of-input-du-afe5b70e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jim2212001%20Spiderpowa%20Embed%20PDF&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23822-cross-site-request-forgery-csrf-in--b3256a69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23822%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alicornea%20Category%20Custom%20Fields&amp;severity=null&amp;id=69cd723be6bfc5ba1dee882c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23808-cross-site-request-forgery-csrf-in--d6d48433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23808%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dutch%20van%20Andel%20Custom%20List%20Table%20Example&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23805-cross-site-request-forgery-csrf-in--a439c6bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23805%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20itamarg%20SEOReseller%20Partner&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23817-cross-site-request-forgery-csrf-in--e900108a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23817%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mahadirz%20MHR-Custom-Anti-Copy&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23810-cross-site-request-forgery-csrf-in--9e854f57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23810%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Igor%20Sazonov%20Len%20Slider&amp;severity=null&amp;id=69cd7239e6bfc5ba1dee87cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23801-cross-site-request-forgery-csrf-in--720e4d80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23801%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FuzzGuard%20Style%20Admin&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23804-cross-site-request-forgery-csrf-in--9224bd4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23804%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shiv%20Prakash%20Tiwari%20WP%20Service%20Payment%20Form%20With%20Authorize.net&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23797-cross-site-request-forgery-csrf-in--623db17b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23797%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mike%20Selander%20WP%20Options%20Editor&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23795-improper-neutralization-of-input-du-7adcae0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23795%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghuger%20Easy%20FAQs&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee872b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23800-cross-site-request-forgery-csrf-in--90cf733f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23800%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nova706%20OrangeBox&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23802-improper-neutralization-of-input-du-8a71380b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23802%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SteveSoehl%20WP-Revive%20Adserver&amp;severity=null&amp;id=69cd7238e6bfc5ba1dee87a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23796-improper-neutralization-of-input-du-658f6158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tushar%20Patel%20Easy%20Portfolio&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23791-improper-neutralization-of-input-du-bda6117c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23791%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mikakaltoft%20Horizontal%20Line%20Shortcode&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee871f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23794-improper-neutralization-of-input-du-57e5ddd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20_rccoder_%20wp_amaps&amp;severity=null&amp;id=69cd7236e6bfc5ba1dee8728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23780-improper-neutralization-of-special--db75d00a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23780%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Alpha%20BPO%20Easy%20Code%20Snippets&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23785-missing-authorization-in-august-inf-81223d60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23785%3A%20Missing%20Authorization%20in%20August%20Infotech%20AI%20Responsive%20Gallery%20Album&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23778-missing-authorization-in-pravin-dur-9c8c82fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23778%3A%20Missing%20Authorization%20in%20Pravin%20Durugkar%20User%20Sync%20ActiveCampaign&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23779-improper-neutralization-of-special--c5e1183d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23779%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20web-mv%20ResAds&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee8673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23777-improper-neutralization-of-input-du-099d472c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23777%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20willowsconsulting%20GDPR%20Personal%20Data%20Reports&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee866d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23772-improper-neutralization-of-input-du-5d123462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eugenio%20Petulla%26%238217%3B%20imaGenius&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23775-improper-neutralization-of-input-du-28d52a2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23775%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWP%20GMAPS%20for%20WPBakery%20Page%20Builder%20Free&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee860e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23776-missing-authorization-in-ekaterir-c-5b7f5c59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23776%3A%20Missing%20Authorization%20in%20ekaterir%20Cache%20Sniper%20for%20Nginx&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee8611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23783-improper-neutralization-of-input-du-ff56892c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23783%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carrotbits%20Greek%20Namedays%20Widget%20From%20Eortologio.Net&amp;severity=null&amp;id=69cd7233e6bfc5ba1dee867f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23767-improper-neutralization-of-input-du-9209ceff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revoxis%20Marmoset%20Viewer&amp;severity=null&amp;id=69cd7230e6bfc5ba1dee85f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23749-cross-site-request-forgery-csrf-in--181d6bf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23749%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20progpars.net%20mybb%20Last%20Topics&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23713-cross-site-request-forgery-csrf-in--75fed646</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23713%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20artanik%20Hack%20me%20if%20you%20can&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23745-cross-site-request-forgery-csrf-in--ff6224be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23745%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tussendoor%20B.V.%20Call%20me%20Now&amp;severity=null&amp;id=69cd722de6bfc5ba1dee8553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23743-cross-site-request-forgery-csrf-in--70727389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23743%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20MartijnScheijbeler%20Social%20Analytics&amp;severity=null&amp;id=69cd722de6bfc5ba1dee854d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23717-cross-site-request-forgery-csrf-in--49a6ea24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23717%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20itmooti%20Theme%20My%20Ontraport%20Smartform&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23720-cross-site-request-forgery-csrf-in--47715a55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23720%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marco%20Castelluccio%20Web%20Push&amp;severity=null&amp;id=69cd7224e6bfc5ba1dee8400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23702-cross-site-request-forgery-csrf-in--9aae9598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23702%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Schalk%20Burger%20Anonymize%20Links&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23712-cross-site-request-forgery-csrf-in--4dad1302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23712%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kapostintegrations%20Kapost&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23715-cross-site-request-forgery-csrf-in--27705c14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23715%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RaymondDesign%20Post%20%26%20Page%20Notes&amp;severity=null&amp;id=69cd764fe6bfc5ba1df0b20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23703-cross-site-request-forgery-csrf-in--b6f0ade4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23703%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cstoltenkamp%20Free%20MailClient%20FMC&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23710-cross-site-request-forgery-csrf-in--54ee0c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23710%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mayur%20Sojitra%20Flying%20Twitter%20Birds&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23708-cross-site-request-forgery-csrf-in--0045ed40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23708%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dominic%20Fallows%20DF%20Draggable&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23698-cross-site-request-forgery-csrf-in--cea72dc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23698%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivanra10%20WP%20Custom%20Google%20Search&amp;severity=null&amp;id=69cd764ce6bfc5ba1df0b0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23694-cross-site-request-forgery-csrf-in--e90e1486</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23694%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shabboscommerce%20Shabbos%20and%20Yom%20Tov&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23699-improper-neutralization-of-input-du-d3430bd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23699%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techmix%20Event%20Countdown%20Timer%20Plugin%20by%20TechMix&amp;severity=null&amp;id=69cd764de6bfc5ba1df0b104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23692-cross-site-request-forgery-csrf-in--c4302f9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23692%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20artanik%20Slider%20for%20Writers&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23690-cross-site-request-forgery-csrf-in--aa3f1330</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23690%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ArtkanMedia%20Book%20a%20Place&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23675-cross-site-request-forgery-csrf-in--da9c8032</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23675%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sana%20Ullah%20Import%20Users%20to%20MailChimp&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23677-cross-site-request-forgery-csrf-in--6866767c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23677%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DSmidge%20HTTP%20to%20HTTPS%20link%20changer%20by%20Eyga.net&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23673-cross-site-request-forgery-csrf-in--7b5b2237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23673%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dkukral%20Email%20on%20Publish&amp;severity=null&amp;id=69cd7648e6bfc5ba1df0aef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23693-cross-site-request-forgery-csrf-in--c94579a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23693%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20uosiu%20Secure%20CAPTCHA&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23691-cross-site-request-forgery-csrf-in--56a571a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23691%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Braulio%20Aquino%20Send%20to%20Twitter&amp;severity=null&amp;id=69cd764be6bfc5ba1df0b046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23665-cross-site-request-forgery-csrf-in--cee73e02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23665%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ravi%20Kumar%20Vanukuru%20RSV%20GMaps&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0aebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23644-improper-neutralization-of-input-du-a719c15f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justin.kuepper%20QuoteMedia%20Tools&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23661-cross-site-request-forgery-csrf-in--181d9f6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23661%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryscript%20NV%20Slider&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23649-cross-site-request-forgery-csrf-in--9840172f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23649%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kreg%20Steppe%20Auphonic%20Importer&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0add3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23654-cross-site-request-forgery-csrf-in--262af321</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23654%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20krolow%20Twitter%20Post&amp;severity=null&amp;id=69cd7646e6bfc5ba1df0ae42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23660-cross-site-request-forgery-csrf-in--715412ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23660%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20waltercerrudo%20MFPlugin&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23662-cross-site-request-forgery-csrf-in--89872be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23662%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ryscript%20WP%20Panoramio&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23659-cross-site-request-forgery-csrf-in--80524594</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23659%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hernanjh%20MercadoLibre%20Integration&amp;severity=null&amp;id=69cd7647e6bfc5ba1df0ae8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23642-improper-neutralization-of-input-du-eb41db92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23642%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pflonk%20Sidebar-Content%20from%20Shortcode&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23640-cross-site-request-forgery-csrf-in--89d44069</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23640%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nazmul%20Ahsan%20Rename%20Author%20Slug&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0ad6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23623-improper-neutralization-of-input-du-80ee1b9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mahesh%20Bisen%20Contact%20Form%207%20%E2%80%93%20CCAvenue%20Add-on&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23641-improper-neutralization-of-input-du-d881d57d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PowieT%20Powie&apos;s%20pLinks%20PagePeeker&amp;severity=null&amp;id=69cd7643e6bfc5ba1df0ad2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23627-cross-site-request-forgery-csrf-in--6e67f89b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23627%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenchsquared%20Comment-Emailer&amp;severity=null&amp;id=69cd7641e6bfc5ba1df0ac95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23639-cross-site-request-forgery-csrf-in--13294b69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23639%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nazmul%20Ahsan%20MDC%20YouTube%20Downloader&amp;severity=null&amp;id=69cd7644e6bfc5ba1df0ad6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23573-cross-site-request-forgery-csrf-in--1033ac7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23573%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sammyb%20WP%20Background%20Tile&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23618-cross-site-request-forgery-csrf-in--87d2fd2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23618%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20starise%20Twitter%20Shortcode&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23577-cross-site-request-forgery-csrf-in--64f776c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23577%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sourov%20Amin%20Word%20Freshener&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23617-cross-site-request-forgery-csrf-in--764d91eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cybio%20Floatbox%20Plus&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23567-cross-site-request-forgery-csrf-in--77d2ce00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23567%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tamer%20Ziady%20GDReseller&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23547-improper-neutralization-of-input-du-8e34a0c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20Login%20Page&amp;severity=null&amp;id=69cd7636e6bfc5ba1df0a800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23569-cross-site-request-forgery-csrf-in--9d84af65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23569%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kelvin%20Ng%20Shortcode%20in%20Comment&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23620-improper-neutralization-of-input-du-4e92737e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23620%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trof%20Captchelfie%20%E2%80%93%20Captcha%20by%20Selfie&amp;severity=null&amp;id=69cd7640e6bfc5ba1df0ac0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23572-cross-site-request-forgery-csrf-in--355d6c2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23572%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dave%20Konopka%20UpDownUpDown&amp;severity=null&amp;id=69cd763ae6bfc5ba1df0a96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23557-cross-site-request-forgery-csrf-in--bb3a7bf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kathleen%20Malone%20Find%20Your%20Reps&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a84c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23560-cross-site-request-forgery-csrf-in--2acb63d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23560%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plumwd%20Web%20Testimonials&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23566-cross-site-request-forgery-csrf-in--df705fc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23566%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20syedamirhussain91%20Custom%20Post&amp;severity=null&amp;id=69cd7639e6bfc5ba1df0a8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23528-incorrect-privilege-assignment-in-m-bef268d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23528%3A%20Incorrect%20Privilege%20Assignment%20in%20Mosterd3d%20DD%20Roles&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23532-cross-site-request-forgery-csrf-in--bfa6da52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23532%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Regios%20MyAnime%20Widget&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23558-cross-site-request-forgery-csrf-in--9a83f465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23558%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitalfisherman%20Geotagged%20Media&amp;severity=null&amp;id=69cd7637e6bfc5ba1df0a84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23537-cross-site-request-forgery-csrf-in--9e48beb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23537%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20add%20custom%20google%20tag%20manager&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23510-cross-site-request-forgery-csrf-in--06be8331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23510%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jan%20%C5%A0t%C4%9Btina%20WordPress%20Logging%20Service&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23511-cross-site-request-forgery-csrf-in--d408ecfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23511%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stargazer%20WP-BlackCheck&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23530-cross-site-request-forgery-csrf-in--86c34bcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23530%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20Custom%20Post%20Type%20Lockdown&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23533-cross-site-request-forgery-csrf-in--04f09f47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zetxek%20WP%20Lyrics&amp;severity=null&amp;id=69cd7634e6bfc5ba1df0a757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23514-missing-authorization-in-sanjay-pra-11c8df7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23514%3A%20Missing%20Authorization%20in%20Sanjay%20Prasad%20Loginplus&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23513-cross-site-request-forgery-csrf-in--8e6ff663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23513%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jd7777%20Bible%20Embed&amp;severity=null&amp;id=69cd7630e6bfc5ba1df0a5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23499-cross-site-request-forgery-csrf-in--2e6e39b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23499%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pascal%20Casier%20Board%20Election&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23508-cross-site-request-forgery-csrf-in--b41576a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23508%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20OrigoThemes%20Extra%20Options%20%E2%80%93%20Favicons&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23501-cross-site-request-forgery-csrf-in--913f94b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23501%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SpruceJoy%20Cookie%20Consent%20%26%20Autoblock%20for%20GDPR%2FCCPA&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23435-cross-site-request-forgery-csrf-in--4c0631a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marcucci%20Password%20Protect%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd7616e6bfc5ba1df0961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23452-improper-neutralization-of-input-du-fc273fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EditionGuard%20EditionGuard%20for%20WooCommerce%20%E2%80%93%20eBook%20Sales%20with%20DRM&amp;severity=null&amp;id=69cd7619e6bfc5ba1df09703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23438-improper-neutralization-of-input-du-f0c9351c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vincent%20Mimoun-Prat%20WP%20PT-Viewer&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23497-cross-site-request-forgery-csrf-in--42ece6a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23497%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20albdesign%20Simple%20Project%20Manager&amp;severity=null&amp;id=69cd762fe6bfc5ba1df0a4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23434-improper-neutralization-of-input-du-ec75e448</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23434%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20viher3%20Easy%20EU%20Cookie%20law&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23471-cross-site-request-forgery-csrf-in--eab46745</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23471%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etemplates%20ECT%20Add%20to%20Cart%20Button&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23444-improper-neutralization-of-input-du-4037a9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23444%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nasir179125%20Scroll%20Top%20Advanced&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23424-cross-site-request-forgery-csrf-in--66065971</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23424%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bnovotny%20Marquee%20Style%20RSS%20News%20Ticker&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0951f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23426-cross-site-request-forgery-csrf-in--842d6cd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Binesh%20Dobhal%20go%20Social&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23453-improper-neutralization-of-input-du-42b802de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Myriad%20Solutionz%20Stars%20SMTP%20Mailer&amp;severity=null&amp;id=69cd7619e6bfc5ba1df09706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23445-cross-site-request-forgery-csrf-in--54632a9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23445%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottswezey%20Easy%20Tynt&amp;severity=null&amp;id=69cd7619e6bfc5ba1df096ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23430-cross-site-request-forgery-csrf-in--ad7a51a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23430%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oren%20Yomtov%20Mass%20Custom%20Fields%20Manager&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23455-cross-site-request-forgery-csrf-in--aef35567</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23455%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Master%20Software%20Solutions%20WP%20VTiger%20Synchronization&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0978c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23436-cross-site-request-forgery-csrf-in--682fc947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23436%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20capa%20Wp-Scribd-List&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23442-cross-site-request-forgery-csrf-in--0304951b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23442%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mschertel%20Shockingly%20Big%20IE6%20Warning&amp;severity=null&amp;id=69cd7616e6bfc5ba1df09632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23456-cross-site-request-forgery-csrf-in--0649978c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23456%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oddthinking%20EmailShroud&amp;severity=null&amp;id=69cd761ae6bfc5ba1df0978f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23476-cross-site-request-forgery-csrf-in--08ee5f89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23476%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20isnowfy%20my-related-posts&amp;severity=null&amp;id=69cd7624e6bfc5ba1df099a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23429-improper-neutralization-of-input-du-befa9635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20altima-interactive%20Altima%20Lookbook%20Free%20for%20WooCommerce&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23483-cross-site-request-forgery-csrf-in--a9b827f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23483%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hoyce%20Universal%20Analytics%20Injector&amp;severity=null&amp;id=69cd7625e6bfc5ba1df099e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23463-cross-site-request-forgery-csrf-in--f087a22e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23463%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mukesh%20Dak%20MD%20Custom%20content%20after%20or%20before%20of%20post&amp;severity=null&amp;id=69cd761ae6bfc5ba1df097a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23432-improper-neutralization-of-input-du-848d31d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AlTi5%20AlT%20Report&amp;severity=null&amp;id=69cd7616e6bfc5ba1df095ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23470-cross-site-request-forgery-csrf-in--879e9606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23470%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xavsio4%20Visit%20Site%20Link%20enhanced&amp;severity=null&amp;id=69cd761ee6bfc5ba1df09882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23467-cross-site-request-forgery-csrf-in--ae2b4d59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vimal.ghorecha%20RSS%20News%20Scroller&amp;severity=null&amp;id=69cd761ee6bfc5ba1df0987c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23423-missing-authorization-in-smackcoder-8203ca0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23423%3A%20Missing%20Authorization%20in%20Smackcoders%20Inc.%2C%20SendGrid%20for%20WordPress&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0951c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12427-cwe-862-missing-authorization-in-mo-94875142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12427%3A%20CWE-862%20Missing%20Authorization%20in%20mondula2016%20Multi%20Step%20Form&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59897f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12613-cwe-89-improper-neutralization-of-s-3eb7e8ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12613%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20coder426%20Passwords%20Manager&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12615-cwe-89-improper-neutralization-of-s-8dc6c391</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12615%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20coder426%20Passwords%20Manager&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12614-cwe-89-improper-neutralization-of-s-7995990f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12614%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20coder426%20Passwords%20Manager&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13355-cwe-434-unrestricted-upload-of-file-0b3ae2ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13355%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nmedia%20Admin%20and%20Customer%20Messages%20After%20Order%20for%20WooCommerce%3A%20OrderConvo&amp;severity=medium&amp;id=699f6e51b7ef31ef0b59e273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13387-cwe-79-improper-neutralization-of-i-cb7d09a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Responsive%20Tabs&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48885-escalation-of-privilege-in-fortinet-bf75e57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48885%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiRecorder&amp;severity=medium&amp;id=696793f38330e067163e9f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10789-cwe-352-cross-site-request-forgery--54badc53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10789%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpeventmanager%20WP%20User%20Profile%20Avatar&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b592566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11452-cwe-79-improper-neutralization-of-i-76f0490f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gwendydd%20Chamber%20Dashboard%20Business%20Directory&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10970-cwe-94-improper-control-of-generati-02f7e83a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10970%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealer%2C%20Classifieds%20%26%20Listing&amp;severity=medium&amp;id=699f6e04b7ef31ef0b5939c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0170-cwe-79-improper-neutralization-of-in-c0a72b52</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scriptsbundle%20DWT%20-%20Directory%20%26%20Listing%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57774-na-d23100f3</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57774%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57773-na-85b4182f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57773%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57772-na-ce43409a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57772%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57771-na-d04d3bee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57771%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57684-na-3f8c12ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57684%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bdbb7ef31ef0b55b7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57578-na-15111bc6</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57578%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57577-na-401693e6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57577%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-16-2ddec7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-16&amp;severity=medium&amp;id=682c7dc2e8347ec82d2ddec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-16-f120dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f120dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0215-cwe-79-improper-neutralization-of-in-bf124e86</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20UpdraftPlus%3A%20WP%20Backup%20%26%20Migration%20Plugin&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54470-an-attacker-with-physical-access-ma-3f2dfb1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54470%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54535-an-attacker-with-access-to-calendar-3fc63c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54535%3A%20An%20attacker%20with%20access%20to%20calendar%20data%20could%20also%20read%20reminders%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40854-an-app-may-be-able-to-cause-unexpec-2b279b67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40854%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40839-an-attacker-with-physical-access-to-fd360c2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40839%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20contents%20from%20the%20Lock%20Screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb82ae6bfc5ba1df6e9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40771-an-app-may-be-able-to-execute-arbit-508a59e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40771%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb827e6bfc5ba1df6e90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27856-processing-a-file-may-lead-to-unexp-8bd6e495</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27856%3A%20Processing%20a%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=69a0a43c85912abc71d620de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44136-an-attacker-with-physical-access-to-7f870f20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44136%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20disable%20Stolen%20Device%20Protection%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb82ae6bfc5ba1df6e9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54540-processing-maliciously-crafted-web--2b7dd9eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54540%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20Apple%20Music&amp;severity=medium&amp;id=69ceb833e6bfc5ba1df6ee5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0501-cwe-295-improper-certificate-validat-aa074525</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0501%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Amazon%20WorkSpaces%20Client&amp;severity=high&amp;id=68ee9df131414aa8fc5b889c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0500-cwe-295-improper-certificate-validat-57dbb957</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0500%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Amazon%20WorkSpaces%20Client&amp;severity=high&amp;id=68ee9df131414aa8fc5b8894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56295-missing-authorization-in-ays-pro-po-adc7b30e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56295%3A%20Missing%20Authorization%20in%20Ays%20Pro%20Poll%20Maker&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22317-improper-neutralization-of-input-du-b09f6cdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gallery%20Ape%20Photo%20Gallery%20%E2%80%93%20Image%20Gallery%20by%20Ape&amp;severity=null&amp;id=69cd75dae6bfc5ba1df08194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22329-improper-neutralization-of-input-du-39761c0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agile%20Logix%20Free%20Google%20Maps&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0822a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22587-improper-neutralization-of-input-du-66cde2b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atanas%20Krachev%20SEO%20Bulk%20Editor&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22729-missing-authorization-in-infomaniak-3a9d5f7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22729%3A%20Missing%20Authorization%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=null&amp;id=69cd7604e6bfc5ba1df08f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22731-cross-site-request-forgery-csrf-in--0dd4027c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22731%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20silverplugins217%20Build%20Private%20Store%20For%20Woocommerce&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22734-improper-neutralization-of-input-du-c155bfdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22734%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20Posts%20Footer%20Manager&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22736-incorrect-privilege-assignment-in-s-60755062</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22736%3A%20Incorrect%20Privilege%20Assignment%20in%20Saad%20Iqbal%20User%20Management&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22737-missing-authorization-in-magepeople-839866d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22737%3A%20Missing%20Authorization%20in%20magepeopleteam%20WpTravelly&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22738-improper-neutralization-of-input-du-f961e3fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22738%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alimir%20WP%20ULike&amp;severity=null&amp;id=69cd7606e6bfc5ba1df08fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22742-improper-neutralization-of-input-du-45c00f7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falldeaf%20WP%20ViewSTL&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22743-improper-neutralization-of-input-du-3ef14ca5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohsin%20Rasool%20Twitter%20Bootstrap%20Collapse%20aka%20Accordian%20Shortcode&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0902b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22744-improper-neutralization-of-input-du-3c2a28c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Seodev%20S-DEV%20SEO&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0902e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22745-improper-neutralization-of-input-du-309b6289</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bjoerne%20Navigation%20Du%20Lapin%20Blanc&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22746-improper-neutralization-of-input-du-7d9ea568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zartis%20HireHive%20Job%20Plugin&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22747-improper-neutralization-of-input-du-866fd669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tormorten%20Foundation%20Columns&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22748-improper-neutralization-of-input-du-4965fb03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Setmore%20SetMore%20Theme%20%E2%80%93%20Custom%20Post%20Types&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0903a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22749-improper-neutralization-of-input-du-f49e3fc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemesCraft.co%20Social%20Media%20Engine&amp;severity=null&amp;id=69cd7608e6bfc5ba1df0903d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22750-improper-neutralization-of-input-du-60cc9c68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22750%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Patel%20Post%20Carousel%20%26%20Slider&amp;severity=null&amp;id=69cd7608e6bfc5ba1df09040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22751-improper-neutralization-of-input-du-7428a0c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22751%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20farinspace%20Partners&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22752-improper-neutralization-of-input-du-f885c7cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WesternDeal%20GSheetConnector%20for%20Forminator%20Forms&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22754-improper-neutralization-of-input-du-b3a427df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22754%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Berkman%20Klein%20Center%20Amber&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22755-improper-neutralization-of-input-du-514284dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22755%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bavington%20WP%20Headmaster&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22758-improper-neutralization-of-input-du-daea499f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Harnani%20Elementor%20AI%20Addons&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22759-improper-neutralization-of-input-du-6c776542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldGrid%20Post%20and%20Page%20Builder%20by%20BoldGrid&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22760-improper-neutralization-of-input-du-48e31de3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeBard%20CodeBard%20Help%20Desk&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22761-improper-neutralization-of-input-du-ff7ac9c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Olaf%20Lederer%20Ajax%20Contact%20Form&amp;severity=null&amp;id=69cd7609e6bfc5ba1df090eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22762-improper-neutralization-of-input-du-10bc34e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Octrace%20WordPress%20HelpDesk%20%26%20Support%20Ticket%20System%20Plugin%20%E2%80%93%20Octrace%20Support&amp;severity=null&amp;id=69cd760be6bfc5ba1df09198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22764-improper-neutralization-of-input-du-23b8a7ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vipul%20Jariwala%20WP%20Post%20Corrector&amp;severity=null&amp;id=69cd760be6bfc5ba1df091b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22765-improper-neutralization-of-input-du-929dde7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22765%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weiluri%20WP%20Order%20By&amp;severity=null&amp;id=69cd760be6bfc5ba1df091ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22766-improper-neutralization-of-input-du-b0bb3a24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Masoud%20Amini%20Zarinpal%20Paid%20Download&amp;severity=null&amp;id=69cd760be6bfc5ba1df091bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22773-insertion-of-sensitive-information--0e783ff0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22773%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20WP%20Chill%20Htaccess%20File%20Editor&amp;severity=null&amp;id=69cd760be6bfc5ba1df091cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22776-improper-neutralization-of-input-du-298b2284</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codebycarter%20WP%20Bulletin%20Board&amp;severity=null&amp;id=69cd760ce6bfc5ba1df0925e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22778-improper-neutralization-of-input-du-609db6a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20damniel%20Lijit%20Search&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22779-missing-authorization-in-codeaffair-a30a8ea3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22779%3A%20Missing%20Authorization%20in%20codeaffairs%20WP%20News%20Sliders&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22780-improper-neutralization-of-input-du-75b59587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22780%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrey%20wp-pano&amp;severity=null&amp;id=69cd760ce6bfc5ba1df0926b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22782-unrestricted-upload-of-file-with-da-c809f241</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22782%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Web%20Ready%20Now%20WR%20Price%20List%20Manager%20For%20Woocommerce&amp;severity=null&amp;id=69cd760ce6bfc5ba1df0926e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22784-cross-site-request-forgery-csrf-in--0e468ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22784%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swedish%20boy%20Background%20Control&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22785-improper-neutralization-of-special--167ba4e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22785%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ComMotion%20Course%20Booking%20System&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22786-path-traversal-in-element-invader-e-f106a338</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22786%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd760fe6bfc5ba1df09379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22787-missing-authorization-in-bplugins-b-16328a4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22787%3A%20Missing%20Authorization%20in%20bPlugins%20Button%20Block&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0938c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22788-improper-neutralization-of-input-du-b2413566</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Codexpert%2C%20Inc%20CoDesigner&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0938f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22793-improper-neutralization-of-input-du-48425dd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22793%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bold%20Bold%20pagos%20en%20linea&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22795-improper-neutralization-of-input-du-8616f9ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22795%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitaldonkey%20Multilang%20Contact%20Form&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22797-improper-neutralization-of-input-du-b6adf961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22797%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20O%C4%9Fulcan%20%C3%96z%C3%BCgen%C3%A7%20Gallery%20and%20Lightbox&amp;severity=null&amp;id=69cd7610e6bfc5ba1df0939e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22798-improper-neutralization-of-input-du-e4d7d049</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CHR%20Designer%20Responsive%20jQuery%20Slider&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22799-improper-neutralization-of-special--e18a3e5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22799%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vertim%20Neon%20Product%20Designer&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12084-heap-based-buffer-overflow-259513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12084%3A%20Heap-based%20Buffer%20Overflow&amp;severity=critical&amp;id=682f0c680acd01a249259513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57857-vulnerability-in-linux-linux-bde8f3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57844-vulnerability-in-linux-linux-bde8db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57841-vulnerability-in-linux-linux-bdd1af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57802-vulnerability-in-linux-linux-bde886</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57801-vulnerability-in-linux-linux-bde882</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57795-vulnerability-in-linux-linux-bde86b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54031-vulnerability-in-linux-linux-bdf0d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53681-vulnerability-in-linux-linux-bdf08a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39282-vulnerability-in-linux-linux-be2c46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36476-vulnerability-in-linux-linux-be254a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe254a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21629-vulnerability-in-linux-linux-bdd280</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57903-vulnerability-in-linux-linux-bdd1e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57902-vulnerability-in-linux-linux-bdd1db</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57901-vulnerability-in-linux-linux-bdd1d7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57900-vulnerability-in-linux-linux-bde9e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57899-vulnerability-in-linux-linux-bde9e5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57898-vulnerability-in-linux-linux-bde9e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57897-vulnerability-in-linux-linux-bde9dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57896-vulnerability-in-linux-linux-bde9cc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57895-vulnerability-in-linux-linux-bde9c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57893-vulnerability-in-linux-linux-bde9c4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57892-vulnerability-in-linux-linux-bde9c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57891-vulnerability-in-linux-linux-bde9bc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57890-vulnerability-in-linux-linux-bde9ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57889-vulnerability-in-linux-linux-bde9a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57888-vulnerability-in-linux-linux-bde9a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57887-vulnerability-in-linux-linux-bde99b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57886-vulnerability-in-linux-linux-bde995</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57885-vulnerability-in-linux-linux-bde973</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57884-vulnerability-in-linux-linux-bde96b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57883-vulnerability-in-linux-linux-bde963</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57882-vulnerability-in-linux-linux-bde95f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11029-exposure-of-sensitive-system-inform-0d53cf9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11029%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13215-cwe-359-exposure-of-private-persona-736dd0a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13215%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59c9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11851-cwe-862-missing-authorization-in-ni-6a5ad27f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11851%3A%20CWE-862%20Missing%20Authorization%20in%20nitropack%20NitroPack%20%E2%80%93%20Caching%20%26%20Speed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Defer%20CSS%20%26%20JS%2C%20Lazy%20load%20Images%20and%20CDN&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12593-cwe-79-improper-neutralization-of-i-8fd1ce3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12593%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20addonsorg%20PDF%20for%20WPForms%20%2B%20Drag%20and%20Drop%20Template%20Builder&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11848-cwe-862-missing-authorization-in-ni-22f2ede0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11848%3A%20CWE-862%20Missing%20Authorization%20in%20nitropack%20NitroPack%20%E2%80%93%20Caching%20%26%20Speed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Defer%20CSS%20%26%20JS%2C%20Lazy%20load%20Images%20and%20CDN&amp;severity=high&amp;id=699f6e22b7ef31ef0b59682c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35280-execute-unauthorized-code-or-comman-26e5b9ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35280%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiDeceptor&amp;severity=medium&amp;id=69834d77f9fa50a62f8e393e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13351-cwe-79-improper-neutralization-of-i-736eca07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13351%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neran%20Social%20proof%20testimonials%20and%20reviews%20by%20Repuso&amp;severity=high&amp;id=699f6e51b7ef31ef0b59e264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12818-cwe-79-improper-neutralization-of-i-1ce60c3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robdavenport%20WP%20Smart%20TV&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12403-cwe-79-improper-neutralization-of-i-635be8f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12403%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realwebcare%20Awesome%20Responsive%20Photo%20Gallery%20%E2%80%93%20Image%20%26%20Video%20Lightbox%20Gallery&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12423-cwe-79-improper-neutralization-of-i-64b8b8f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12423%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Contact%20Form%207%20Redirect%20%26%20Thank%20You%20Page&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59897a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10775-cwe-639-authorization-bypass-throug-004af03a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10775%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9636-cwe-269-improper-privilege-managemen-1206f14d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9636%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20pickplugins%20Post%20Grid%20and%20Gutenberg%20Blocks%20%E2%80%93%20ComboBlocks&amp;severity=critical&amp;id=699f6b56b7ef31ef0b553073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11870-cwe-79-improper-neutralization-of-i-8e408816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Event%20Registration%20Calendar%20By%20vcita&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13394-cwe-79-improper-neutralization-of-i-aa41f4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13394%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swarminteractive%20ViewMedica%209&amp;severity=medium&amp;id=699f6e54b7ef31ef0b59e4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13334-cwe-79-improper-neutralization-of-i-e80475a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13334%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theverylastperson%20Car%20Demon&amp;severity=medium&amp;id=699f6e50b7ef31ef0b59cb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41453-na-84730205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41453%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b56867d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57025-na-ff143773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57025%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57024-na-069f8296</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57024%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57023-na-97a82f4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57023%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23061-cwe-94-improper-control-of-generati-d36cdc50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23061%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mongoosejs%20Mongoose&amp;severity=critical&amp;id=699f6b1bb7ef31ef0b54e35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57727-na-in-na-94bbaf2e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57727%3A%20n%2Fa&amp;severity=critical&amp;id=68432d2d71f4d251b5d66f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-15-2e0279</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-15&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e0279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-15-f12ccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55893-cwe-352-cross-site-request-forgery-csrf-in-typo3-typo3-aeac89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55893%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682cd0f71484d88663aeac89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55894-cwe-352-cross-site-request-forgery-csrf-in-typo3-typo3-aeac97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55894%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682cd0f71484d88663aeac97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21134-integer-underflow-wrap-or-wraparoun-85e15a1b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21134%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=69a0a44f85912abc71d652c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21133-integer-underflow-wrap-or-wraparoun-f46ba9bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21133%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Illustrator%20on%20iPad&amp;severity=high&amp;id=69a0a44f85912abc71d652bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21122-integer-underflow-wrap-or-wraparoun-a6a9b0f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21122%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20(CWE-191)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21127-uncontrolled-search-path-element-cw-8d96faa5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21127%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Photoshop%20Desktop&amp;severity=high&amp;id=69a0a44f85912abc71d652ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23073-cwe-200-exposure-of-sensitive-infor-7d2d4b8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23073%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Wikimedia%20Foundation%20Mediawiki%20-%20GlobalBlocking%20Extension&amp;severity=low&amp;id=68f178b69f8a5dbaea26afab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21245-cwe-122-heap-based-buffer-overflow--86920ad3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21245%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21409-cwe-122-heap-based-buffer-overflow--bed5e1a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21409%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21223-cwe-122-heap-based-buffer-overflow--1b98fc6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21223%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21238-cwe-122-heap-based-buffer-overflow--8f5fadf7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21238%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21240-cwe-122-heap-based-buffer-overflow--fe23ab78</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21240%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21250-cwe-122-heap-based-buffer-overflow--044df045</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21250%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21417-cwe-122-heap-based-buffer-overflow--11924513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21417%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21246-cwe-122-heap-based-buffer-overflow--d9739d80</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21246%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21334-cwe-416-use-after-free-in-microsoft-eed873c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21334%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68881726ad5a09ad0088bbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21333-cwe-122-heap-based-buffer-overflow--00382cd0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21333%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68881726ad5a09ad0088bbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21311-cwe-303-incorrect-implementation-of-51949c7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21311%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=critical&amp;id=68c0c0d09ed239a66badfd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21326-cwe-843-access-of-resource-using-in-541cb787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21326%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=68c0c0d09ed239a66badfd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21332-cwe-41-improper-resolution-of-path--b0b36c84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21332%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0c0d09ed239a66badfd1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21313-cwe-833-deadlock-in-microsoft-windo-2b04e55b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21313%3A%20CWE-833%3A%20Deadlock%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=68c0c0d09ed239a66badfd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21218-cwe-400-uncontrolled-resource-consu-399d5233</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21218%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=68c0bd4d9ed239a66badea77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21402-cwe-641-improper-restriction-of-nam-0445617c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21402%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20Office%20LTSC%20for%20Mac%202021&amp;severity=high&amp;id=68c0bd549ed239a66badec69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21378-cwe-122-heap-based-buffer-overflow--a506f176</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21378%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd539ed239a66badec47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21374-cwe-125-out-of-bounds-read-in-micro-6be9d38b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21374%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd539ed239a66badec44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21372-cwe-416-use-after-free-in-microsoft-9daa3ce6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21372%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c0bd539ed239a66badec41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21370-cwe-20-improper-input-validation-in-fcd65ee1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21370%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68c0bd539ed239a66badec3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21361-cwe-641-improper-restriction-of-nam-34b4d1ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21361%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Microsoft%20Office%20LTSC%20for%20Mac%202021&amp;severity=high&amp;id=68c0bd539ed239a66badec22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21360-cwe-269-improper-privilege-manageme-0683795d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21360%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=68c0bd539ed239a66badec1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21343-cwe-269-improper-privilege-manageme-fd4fb47a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21343%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=68c0bd529ed239a66badebf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21340-cwe-284-improper-access-control-in--f5337416</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21340%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68c0bd529ed239a66badebf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21339-cwe-122-heap-based-buffer-overflow--7df35e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21339%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd529ed239a66badebee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21338-cwe-190-integer-overflow-or-wraparo-05cd36a1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21338%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=68c0bd529ed239a66badebeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21336-cwe-203-observable-discrepancy-in-m-825686fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21336%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0c0d09ed239a66badfd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21331-cwe-59-improper-link-resolution-bef-186ac2dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21331%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd529ed239a66badebe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21324-cwe-125-out-of-bounds-read-in-micro-0edde373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21324%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21172-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-bda89b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21172%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981cc4522896dcbda89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21323-cwe-532-insertion-of-sensitive-info-aca161bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21323%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21317-cwe-532-insertion-of-sensitive-info-d312843d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21317%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=medium&amp;id=68c0bd529ed239a66badebbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21312-cwe-908-use-of-uninitialized-resour-0be8c66c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21312%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=low&amp;id=68c0bd519ed239a66badeba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21310-cwe-125-out-of-bounds-read-in-micro-d0cbce68</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21310%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd519ed239a66badeba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21308-cwe-200-exposure-of-sensitive-infor-2339fc87</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21308%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd519ed239a66badeb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21307-cwe-416-use-after-free-in-microsoft-f66afa45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21307%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=68c0bd519ed239a66badeb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21305-cwe-122-heap-based-buffer-overflow--bbee9d6d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21305%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd519ed239a66badeb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21300-cwe-400-uncontrolled-resource-consu-fe1b1f04</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21300%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21292-cwe-94-improper-control-of-generati-d243dcb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21292%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd509ed239a66badeb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21287-cwe-269-improper-privilege-manageme-aa5db345</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21287%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21286-cwe-122-heap-based-buffer-overflow--9fa2d31f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21286%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21276-cwe-191-integer-underflow-wrap-or-w-b43513ab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21276%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21275-cwe-285-improper-authorization-in-m-0c219cea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21275%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21274-cwe-59-improper-link-resolution-bef-03287817</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21274%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21273-cwe-122-heap-based-buffer-overflow--da3bfa5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21273%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21189-cwe-41-improper-resolution-of-path--6ad5ffd1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21189%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21261-cwe-125-out-of-bounds-read-in-micro-ebb9cd50</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21261%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21256-cwe-125-out-of-bounds-read-in-micro-f009048e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21256%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badead9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21232-cwe-125-out-of-bounds-read-in-micro-ad71bf35</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21232%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badea9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21231-cwe-400-uncontrolled-resource-consu-14de3fd2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21231%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badea9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21230-cwe-20-improper-input-validation-in-3b84355d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21230%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badea99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21229-cwe-125-out-of-bounds-read-in-micro-bddca4ac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21229%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badea96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21228-cwe-125-out-of-bounds-read-in-micro-1812b280</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21228%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21227-cwe-125-out-of-bounds-read-in-micro-536155a4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21227%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21226-cwe-125-out-of-bounds-read-in-micro-86eb8f62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21226%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21225-cwe-843-access-of-resource-using-in-c1f11d07</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21225%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21224-cwe-591-sensitive-data-storage-in-i-ade77298</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21224%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68386826182aa0cae2801b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21213-cwe-284-improper-access-control-in--94f2bf87</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21213%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21211-cwe-693-protection-mechanism-failur-843c2c0c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21211%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21186-cwe-122-heap-based-buffer-overflow--24b4c679</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21186%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd4c9ed239a66badea43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21187-cwe-94-improper-control-of-generati-2703654c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21187%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=high&amp;id=68c0bd4c9ed239a66badea46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21202-cwe-284-improper-access-control-in--76790578</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21202%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21207-cwe-400-uncontrolled-resource-consu-0427377a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21207%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd4c9ed239a66badea52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21193-cwe-352-cross-site-request-forgery--dcef42f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21193%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Microsoft%20Windows%20Server%202016&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21335-cwe-416-use-after-free-in-microsoft-f4888926</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21335%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68881726ad5a09ad0088bbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21220-cwe-908-use-of-uninitialized-resour-b87b1719</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21220%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4d9ed239a66badea7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21330-cwe-400-uncontrolled-resource-consu-851e0af0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21330%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd529ed239a66badebe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21328-cwe-41-improper-resolution-of-path--e3aec682</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21328%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21329-cwe-41-improper-resolution-of-path--5e776fb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21329%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21278-cwe-362-concurrent-execution-using--c4027d3f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21278%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21405-cwe-284-improper-access-control-in--af0914e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21405%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.12&amp;severity=high&amp;id=68c0bd549ed239a66badec6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21217-cwe-693-protection-mechanism-failur-6bbbd5b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21217%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21403-cwe-863-incorrect-authorization-in--2333e401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21403%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Microsoft%20On-Premises%20Data%20Gateway&amp;severity=medium&amp;id=68c0bd549ed239a66badec6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21395-cwe-122-heap-based-buffer-overflow--b730fdd9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21395%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd549ed239a66badec63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21393-cwe-79-improper-neutralization-of-i-e5d3c1b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21393%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=68c0bd549ed239a66badec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21389-cwe-400-uncontrolled-resource-consu-742306c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21389%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd539ed239a66badec53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21219-cwe-41-improper-resolution-of-path--9d000a0a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21219%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21382-cwe-190-integer-overflow-or-wraparo-3a6f1c6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21382%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd539ed239a66badec4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21366-cwe-416-use-after-free-in-microsoft-992c9b1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21366%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21365-cwe-426-untrusted-search-path-in-mi-4b1be7b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21365%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21364-cwe-502-deserialization-of-untruste-458a0306</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21364%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21363-cwe-822-untrusted-pointer-dereferen-6a81413b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21363%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21362-cwe-416-use-after-free-in-microsoft-466d428b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21362%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21357-cwe-908-use-of-uninitialized-resour-e404e656</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21357%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=medium&amp;id=68c0bd539ed239a66badec1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21356-cwe-843-access-of-resource-using-in-dfcc7049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21356%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21354-cwe-822-untrusted-pointer-dereferen-f685ad06</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21354%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21348-cwe-285-improper-authorization-in-m-aa421657</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21348%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68c0bd539ed239a66badec13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21346-cwe-693-protection-mechanism-failur-2a458b10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21346%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd539ed239a66badec10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21345-cwe-416-use-after-free-in-microsoft-78d2177a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21345%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68c0bd529ed239a66badebfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21344-cwe-20-improper-input-validation-in-09484071</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21344%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68c0bd529ed239a66badebfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21341-cwe-125-out-of-bounds-read-in-micro-37d0b079</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21341%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21173-cwe-379-creation-of-temporary-file-in-directory-with-insecure-permissions-in-microsoft-net-8-0-bda74b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21173%3A%20CWE-379%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981cc4522896dcbda74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21178-cwe-122-heap-based-buffer-overflow--684289ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21178%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Visual%20Studio%202015%20Update%203&amp;severity=high&amp;id=68c0c0d09ed239a66badfce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21176-cwe-126-buffer-over-read-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-bda7f9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21176%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981cc4522896dcbda7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21327-cwe-125-out-of-bounds-read-in-micro-d20af7fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21327%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21321-cwe-532-insertion-of-sensitive-info-e270dd04</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21321%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21320-cwe-532-insertion-of-sensitive-info-a5e489b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21320%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21319-cwe-532-insertion-of-sensitive-info-20d7ca6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21319%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21318-cwe-532-insertion-of-sensitive-info-2038d2aa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21318%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21316-cwe-532-insertion-of-sensitive-info-1623ffdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21316%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd529ed239a66badebba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21315-cwe-416-use-after-free-in-microsoft-b60bb0eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21315%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68c0bd519ed239a66badebad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21314-cwe-451-user-interface-ui-misrepres-c51fbd48</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21314%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68c0bd519ed239a66badebaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21309-cwe-591-sensitive-data-storage-in-i-64e15c1d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21309%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=68c0bd519ed239a66badeba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21306-cwe-122-heap-based-buffer-overflow--14251da8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21306%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd519ed239a66badeb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21304-cwe-416-use-after-free-in-microsoft-67aec62f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21304%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=68c0bd519ed239a66badeb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21303-cwe-122-heap-based-buffer-overflow--c5ffb4c9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21303%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21302-cwe-122-heap-based-buffer-overflow--c2362e4b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21302%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21301-cwe-284-improper-access-control-in--197edccd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21301%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd509ed239a66badeb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21299-cwe-922-insecure-storage-of-sensiti-2bc0dc7f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21299%3A%20CWE-922%3A%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21298-cwe-416-use-after-free-in-microsoft-7820f14b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21298%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=68c0bd509ed239a66badeb70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21297-cwe-416-use-after-free-in-microsoft-881c5e70</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21297%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202008%20R2%20Service%20Pack%201&amp;severity=high&amp;id=68c0bd509ed239a66badeb6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21296-cwe-416-use-after-free-in-microsoft-efd8078f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21296%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21295-cwe-416-use-after-free-in-microsoft-953cb809</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21295%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21294-cwe-591-sensitive-data-storage-in-i-61a6e2ab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21294%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21293-cwe-284-improper-access-control-in--41461686</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21293%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0c0d09ed239a66badfd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21291-cwe-415-double-free-in-microsoft-wi-cba08858</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21291%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd509ed239a66badeb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21290-cwe-400-uncontrolled-resource-consu-59a70c37</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21290%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21289-cwe-400-uncontrolled-resource-consu-775b2a09</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21289%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21288-cwe-908-use-of-uninitialized-resour-09b9c1d1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21288%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd509ed239a66badeb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21285-cwe-476-null-pointer-dereference-in-9d3f8b89</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21285%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21284-cwe-20-improper-input-validation-in-56748142</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21284%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd509ed239a66badeb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21282-cwe-122-heap-based-buffer-overflow--80d5a8cf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21282%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd509ed239a66badeb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21281-cwe-416-use-after-free-in-microsoft-a05aba8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21281%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21280-cwe-20-improper-input-validation-in-e07aefc4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21280%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21277-cwe-126-buffer-over-read-in-microso-37671960</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21277%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21272-cwe-908-use-of-uninitialized-resour-f8618328</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21272%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21271-cwe-126-buffer-over-read-in-microso-517bc838</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21271%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21270-cwe-400-uncontrolled-resource-consu-1a684468</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21270%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21269-cwe-41-improper-resolution-of-path--f4c3b8bf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21269%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21268-cwe-41-improper-resolution-of-path--8e8585ec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21268%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21266-cwe-122-heap-based-buffer-overflow--247a69f5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21266%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4f9ed239a66badeaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21265-cwe-125-out-of-bounds-read-in-micro-4c095ca4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21265%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21263-cwe-125-out-of-bounds-read-in-micro-649ece31</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21263%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21260-cwe-125-out-of-bounds-read-in-micro-47b8a562</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21260%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21258-cwe-125-out-of-bounds-read-in-micro-91932919</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21258%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21257-cwe-125-out-of-bounds-read-in-micro-fb39df5a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21257%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=medium&amp;id=68c0bd4f9ed239a66badeae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21255-cwe-125-out-of-bounds-read-in-micro-4b8bcfd6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21255%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badead6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21252-cwe-122-heap-based-buffer-overflow--98c64ffd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21252%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badead3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21251-cwe-400-uncontrolled-resource-consu-0a478655</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21251%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badead0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21249-cwe-125-out-of-bounds-read-in-micro-a9a24032</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21249%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badeacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21248-cwe-122-heap-based-buffer-overflow--4968a0d7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21248%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21244-cwe-190-integer-overflow-or-wraparo-7968ce03</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21244%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21243-cwe-190-integer-overflow-or-wraparo-b68e09d3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21243%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21242-cwe-200-exposure-of-sensitive-infor-e6cc2d22</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21242%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4e9ed239a66badeac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21241-cwe-122-heap-based-buffer-overflow--ad200e1d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21241%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21239-cwe-122-heap-based-buffer-overflow--c6f15e3c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21239%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21237-cwe-122-heap-based-buffer-overflow--644cb14d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21237%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21236-cwe-122-heap-based-buffer-overflow--26aa6ea5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21236%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21235-cwe-20-improper-input-validation-in-8cf4326e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21235%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21234-cwe-20-improper-input-validation-in-13dceebd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21234%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21233-cwe-122-heap-based-buffer-overflow--8f25ca3b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21233%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd4e9ed239a66badeaa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21215-cwe-125-out-of-bounds-read-in-micro-0fa90214</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21215%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21214-cwe-200-exposure-of-sensitive-infor-5b56d697</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21214%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4d9ed239a66badea6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21210-cwe-636-not-failing-securely-failin-36824c57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21210%3A%20CWE-636%3A%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=medium&amp;id=68c0bd4c9ed239a66badea55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21171-cwe-122-heap-based-buffer-overflow--6bafdd3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21171%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%209.0&amp;severity=high&amp;id=68c0bd4c9ed239a66badea40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21413-cwe-122-heap-based-buffer-overflow--5a3f919f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21413%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd549ed239a66badec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21411-cwe-122-heap-based-buffer-overflow--380acf68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21411%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=68c0bd549ed239a66badec72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12087-path-traversal-bd6699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12087%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd6699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23366-improper-neutralization-of-input-du-b63c24ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23366%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=68b38a1cad5a09ad0096159f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12747-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-bd66b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12747%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd66b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12088-path-traversal-bd669d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12088%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd669d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12086-detection-of-error-condition-without-action-bd9dbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12086%3A%20Detection%20of%20Error%20Condition%20Without%20Action&amp;severity=medium&amp;id=682d981bc4522896dcbd9dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12085-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-259515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12085%3A%20Use%20of%20Uninitialized%20Resource&amp;severity=high&amp;id=682f0c680acd01a249259515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21607-cwe-670-always-incorrect-control-flow-implementation-in-vyperlang-vyper-bf1215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21607%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20vyperlang%20vyper&amp;severity=medium&amp;id=682d9840c4522896dcbf1215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13162-cwe-89-improper-neutralization-of-s-34f4bd4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13162%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13163-cwe-502-deserialization-of-untruste-cfb369c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13163%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13164-cwe-908-use-of-uninitialized-resour-01f4baa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13164%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13169-cwe-125-out-of-bounds-read-in-ivant-d8cbb97b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13169%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d620ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13171-cwe-434-unrestricted-upload-of-file-27495616</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13171%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43c85912abc71d620c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13172-cwe-347-improper-verification-of-cr-530fd99b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13172%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43c85912abc71d620c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13158-cwe-426-untrusted-search-path-in-iv-b30b5dd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13158%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=69a0a43a85912abc71d6209f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13159-cwe-36-absolute-path-traversal-in-i-8d866fb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13159%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=68f7d9b0247d717aace268b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13160-cwe-36-absolute-path-traversal-in-i-acf6a555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13160%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=68f7d9b0247d717aace268be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13161-cwe-36-absolute-path-traversal-in-i-3a9bb4bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13161%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=68f7d9b0247d717aace268c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10811-cwe-36-absolute-path-traversal-in-i-2eebbb91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10811%3A%20CWE-36%20Absolute%20Path%20Traversal%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=69a0a43a85912abc71d6208e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10630-cwe-366-race-condition-within-a-thr-b51b3948</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10630%3A%20CWE-366%3A%20Race%20Condition%20within%20a%20Thread%20in%20Ivanti%20Application%20Control%20Engine&amp;severity=high&amp;id=69a0a43885912abc71d61ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39761-cwe-77-improper-neutralization-of-s-5d0060d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39761%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39760-cwe-77-improper-neutralization-of-s-a734abb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39760%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39759-cwe-77-improper-neutralization-of-s-0175eed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39759%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39765-cwe-77-improper-neutralization-of-s-78a2f427</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39765%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39764-cwe-77-improper-neutralization-of-s-317d69d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39764%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39763-cwe-77-improper-neutralization-of-s-0d4d248f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39763%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39762-cwe-77-improper-neutralization-of-s-d4078243</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39762%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929aafe7723195e0fd67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39770-cwe-120-buffer-copy-without-checkin-61f1ee4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39770%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39769-cwe-120-buffer-copy-without-checkin-d8a52584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39769%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39768-cwe-120-buffer-copy-without-checkin-9e7329e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39768%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39783-cwe-77-improper-neutralization-of-s-a0a65961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39783%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39782-cwe-77-improper-neutralization-of-s-1afa5de6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39782%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39781-cwe-77-improper-neutralization-of-s-4beb719d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39781%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39803-cwe-120-buffer-copy-without-checkin-cdb40e27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39803%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929b1fe7723195e0fd852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39802-cwe-120-buffer-copy-without-checkin-cb5d9bc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39802%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929b1fe7723195e0fd84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39801-cwe-120-buffer-copy-without-checkin-672a1986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39801%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39800-cwe-15-external-control-of-system-o-a5e6f7ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39800%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39799-cwe-15-external-control-of-system-o-50414f96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39799%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39798-cwe-15-external-control-of-system-o-a8cd9fcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39798%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39795-cwe-15-external-control-of-system-o-47aad5a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39795%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39794-cwe-15-external-control-of-system-o-fdb85ade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39794%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39793-cwe-15-external-control-of-system-o-3df738e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39793%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39790-cwe-15-external-control-of-system-o-f3bb938c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39790%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39789-cwe-15-external-control-of-system-o-b57ba482</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39789%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39788-cwe-15-external-control-of-system-o-807b55ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39788%3A%20CWE-15%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929affe7723195e0fd7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39787-cwe-22-improper-limitation-of-a-pat-915b3901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39787%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39786-cwe-22-improper-limitation-of-a-pat-d6dcc723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39786%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39785-cwe-74-improper-neutralization-of-s-20df6530</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39785%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39784-cwe-74-improper-neutralization-of-s-ab4bb436</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39784%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Wavlink%20Wavlink%20AC3000&amp;severity=critical&amp;id=690929acfe7723195e0fd6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45326-improper-access-control-in-fortinet-1490e032</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45326%3A%20Improper%20access%20control%20in%20Fortinet%20FortiDeceptor&amp;severity=low&amp;id=6983546df9fa50a62f8ff38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27778-execute-unauthorized-code-or-comman-a0c1ef26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27778%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a963d0ff220b9507e1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48884-escalation-of-privilege-in-fortinet-d5aca854</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48884%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=696793f38330e067163e9f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46668-denial-of-service-in-fortinet-forti-b01b2595</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46668%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=696762bf8330e0671657350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46669-denial-of-service-in-fortinet-forti-90a02bbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46669%3A%20Denial%20of%20service%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=696762bf8330e0671657350d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50566-execute-unauthorized-code-or-comman-84780c0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50566%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=696793f38330e067163e9f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55591-execute-unauthorized-code-or-comman-1234e539</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55591%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=critical&amp;id=68f7d9b6247d717aace26c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12240-cwe-79-improper-neutralization-of-i-cc9c79ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53649-cwe-552-files-or-directories-access-334a64ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53649%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12919-cwe-287-improper-authentication-in--fd0388f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12919%3A%20CWE-287%20Improper%20Authentication%20in%20madalinungureanu%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11736-cleartext-storage-of-sensitive-info-7ba2ed87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11736%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11734-protection-mechanism-failure-ff3c2357</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11734%3A%20Protection%20Mechanism%20Failure&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13156-cwe-79-improper-neutralization-of-i-6f2e9a0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20HTML5%20Video%20Player%20%E2%80%93%20mp4%20Video%20Player%20Plugin%20and%20Block&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0394-cwe-434-unrestricted-upload-of-file--ee48e311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0394%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20trainingbusinesspros%20WordPress%20CRM%2C%20Email%20%26%20Marketing%20Automation%20for%20WordPress%20%7C%20Award%20Winner%20%E2%80%94%20Groundhogg&amp;severity=high&amp;id=699f6b69b7ef31ef0b55525d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0393-cwe-352-cross-site-request-forgery-c-67fea99e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0393%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b69b7ef31ef0b555256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12008-cwe-200-exposure-of-sensitive-infor-419c7df3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12008%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12006-cwe-862-missing-authorization-in-bo-a1a1f556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12006%3A%20CWE-862%20Missing%20Authorization%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12365-cwe-862-missing-authorization-in-bo-cf140daf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12365%3A%20CWE-862%20Missing%20Authorization%20in%20boldgrid%20W3%20Total%20Cache&amp;severity=high&amp;id=699f6e38b7ef31ef0b597fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13323-cwe-79-improper-neutralization-of-i-2ec53f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12083-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-omron-corporation-machine-automation-controller-nj-series-bd9d53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12083%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OMRON%20Corporation%20Machine%20Automation%20Controller%20NJ-series&amp;severity=medium&amp;id=682d981bc4522896dcbd9d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57661-na-552bc345</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57661%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57659-na-03fa2dcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57659%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57654-na-e608315f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57654%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57652-na-0d5bb54e</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57652%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57651-na-373bb06d</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57651%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57650-na-845bd7ad</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57650%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b74b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57649-na-fc87fd71</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57649%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57648-na-ea27c076</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57648%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57647-na-698cbf30</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57647%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57646-na-1ef19e62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57646%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57645-na-1ce541d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57645%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57644-na-af06af6a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57644%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57643-na-e47614c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57643%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57642-na-bedefa2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57642%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57641-na-b174e928</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57641%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57640-na-285d515b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57640%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57639-na-16a7829c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57639%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57638-na-58c2b291</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57638%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57637-na-b1d7d725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57637%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57636-na-fd7e513d</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57636%3A%20n%2Fa&amp;severity=high&amp;id=699f6bdab7ef31ef0b55b6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57635-na-ad4734ae</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57635%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57634-na-c868bc37</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57634%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57633-na-0d3fee1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57633%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57632-na-16a06721</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57632%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57631-na-ac6db4af</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57631%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57630-na-4a509fe6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57630%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57629-na-23dbcd94</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57629%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57628-na-61ba4a40</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57628%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57627-na-5159ee01</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57627%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57626-na-1dabdc7b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57626%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57625-na-afe2caab</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57625%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57624-na-eae2e808</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57624%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57623-na-db029701</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57623%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57622-na-ecdaddb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57622%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57621-na-c62c42e7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57621%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57620-na-904a6e38</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57620%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57619-na-18265dac</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57619%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57618-na-4f4e1556</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57618%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57617-na-ffd2bf6c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57617%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57616-na-455d9a36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57616%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd8b7ef31ef0b55b618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57615-na-575b4a0f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57615%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55000-na-28cdeb93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55000%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53563-na-a38cbcd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53563%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbfb7ef31ef0b55a9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50861-na-51ec2675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50861%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50859-na-b44d642c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50859%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50858-na-a5b3e22e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50858%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b5575e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50857-na-02ddba20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50857%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22997-na-50bfe253</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22996-na-617e7e1a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22996%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23019-cwe-940-improper-verification-of-so-8f994196</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23019%3A%20CWE-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20IETF%20IPv6&amp;severity=medium&amp;id=69091a4fc28fd46ded81d165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23018-cwe-940-improper-verification-of-so-0351b5ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23018%3A%20CWE-940%20Improper%20Verification%20of%20Source%20of%20a%20Communication%20Channel%20in%20IETF%20IPv6&amp;severity=medium&amp;id=69091a4fc28fd46ded81d15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-14-2e0be8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-14&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e0be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-14-f13a9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f13a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11396-cwe-359-exposure-of-private-persona-fa41f7fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11396%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20awordpresslife%20Event%20Monster%20%E2%80%93%20Event%20Management%2C%20Tickets%20Booking%2C%20Upcoming%20Event&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52333-cwe-119-improper-restriction-of-ope-56b456be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52333%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OFFIS%20DCMTK&amp;severity=high&amp;id=690916c8c28fd46ded7ccf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47796-cwe-119-improper-restriction-of-ope-5e14216a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47796%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20OFFIS%20DCMTK&amp;severity=high&amp;id=690908517fff0e30cee23581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56065-improper-neutralization-of-input-du-926b76a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56065%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56301-improper-neutralization-of-input-du-35f4ce13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22800-missing-authorization-in-saad-iqbal-233de3d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22800%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22314-improper-neutralization-of-input-du-ad87c590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Scripts%20Food%20Store%20%E2%80%93%20Online%20Food%20Delivery%20%26%20Pickup&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0813c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22337-improper-neutralization-of-input-du-9e644b28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22337%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosoftplugin%20Order%20Audit%20Log%20for%20WooCommerce&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22344-improper-neutralization-of-input-du-eb574c89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timmcdaniels%20Media%20Category%20Library&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22498-improper-neutralization-of-input-du-6c54c615</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22498%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20N3wNormal%20LucidLMS&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22499-improper-neutralization-of-input-du-4845817d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22499%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FAKTOR%20VIER%20F4%20Post%20Tree&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22514-improper-neutralization-of-input-du-4e0c8034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamna%20Khawaja%20KNR%20Author%20List%20Widget&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22567-improper-neutralization-of-input-du-af41d417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22567%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20trustist%20TRUSTist%20REVIEWer&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22568-improper-neutralization-of-input-du-712110f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arete-it%20Post%20And%20Page%20Reactions&amp;severity=null&amp;id=69cd75f6e6bfc5ba1df08954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22569-improper-neutralization-of-input-du-288960f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22569%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GrandSlambert%20Featured%20Page%20Widget&amp;severity=null&amp;id=69cd75f6e6bfc5ba1df08957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22570-improper-neutralization-of-input-du-8529dce4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22570%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdjekic%20Inline%20Tweets&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22576-improper-neutralization-of-input-du-6e45af3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcus%20Downing%20Site%20PIN&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22583-improper-neutralization-of-input-du-cc05754d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anshulsojatia%20Scan%20External%20Links&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22586-improper-neutralization-of-input-du-56f7e369</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dstoever%20WPEX%20Replace%20DB%20Urls&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22588-improper-neutralization-of-input-du-7c94c58e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intelligence_lab%20Scanventory&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22777-deserialization-of-untrusted-data-i-0260d14f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22777%3A%20Deserialization%20of%20Untrusted%20Data%20in%20StellarWP%20GiveWP&amp;severity=null&amp;id=69cd760ce6bfc5ba1df09261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0412-cwe-119-improper-restriction-of-oper-d56d750b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0412%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6b69b7ef31ef0b555263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46920-na-a9badbcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46920%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46919-na-6ad05b10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46919%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46481-cwe-601-url-redirection-to-untruste-d2571bc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46481%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Venki%20Supravizio%20BPM&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46480-cwe-522-insufficiently-protected-cr-3b491dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46480%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Venki%20Supravizio%20BPM&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46479-cwe-434-unrestricted-upload-of-file-6d2374cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46479%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Venki%20Supravizio%20BPM&amp;severity=critical&amp;id=699f6d00b7ef31ef0b56c2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46310-na-aaa4b416</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46310%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfcb7ef31ef0b56ab28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44771-na-f090f014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44771%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce2b7ef31ef0b569e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57811-na-53c18a56</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57811%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bdbb7ef31ef0b55b7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57488-na-8268d590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57488%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57487-na-dc12d7b9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57487%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54999-na-d7063f68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54999%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48883-na-033617a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48883%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22963-cwe-352-cross-site-request-forgery--f7d1ca88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22963%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sismics%20Teedy&amp;severity=high&amp;id=6896070dad5a09ad0004626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packets-everywhere-report-about-delivery-abuse-sys-56443ff8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Packets%20everywhere!%22%20report%20about%20delivery%20abuse%20system%20and%20phishing&amp;severity=low&amp;id=68367c06182aa0cae231036a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-13-2e094d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-13&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e094d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-13-f12058</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/packets-everywhere-report-about-delivery-abuse-system-and-phishing-f0c53a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22Packets%20everywhere!%22%20report%20about%20delivery%20abuse%20system%20and%20phishing&amp;severity=low&amp;id=682acdbebbaf20d303f0c53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-12-2df9b6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-12&amp;severity=medium&amp;id=682c7dc2e8347ec82d2df9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-12-f122c8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57881-vulnerability-in-linux-linux-bde94e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde94e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57880-vulnerability-in-linux-linux-bde946</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57879-vulnerability-in-linux-linux-bdd1c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57878-vulnerability-in-linux-linux-bde935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57877-vulnerability-in-linux-linux-bde92d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57876-vulnerability-in-linux-linux-bdd1b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57875-vulnerability-in-linux-linux-bde925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57874-vulnerability-in-linux-linux-bde91f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57872-vulnerability-in-linux-linux-bde8fb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57850-vulnerability-in-linux-linux-bde8e3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde8e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57849-vulnerability-in-linux-linux-bde8dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57843-vulnerability-in-linux-linux-bde8d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57839-vulnerability-in-linux-linux-bde8cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57838-vulnerability-in-linux-linux-bde8bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde8bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57809-vulnerability-in-linux-linux-bde896</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57807-vulnerability-in-linux-linux-bde892</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57806-vulnerability-in-linux-linux-bde88e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57805-vulnerability-in-linux-linux-bdd1a2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57804-vulnerability-in-linux-linux-bde88a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57800-vulnerability-in-linux-linux-bde87e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57799-vulnerability-in-linux-linux-bde87a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57798-vulnerability-in-linux-linux-bde878</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57793-vulnerability-in-linux-linux-bde849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57792-vulnerability-in-linux-linux-bde841</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57791-vulnerability-in-linux-linux-bde839</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56788-vulnerability-in-linux-linux-bde833</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56372-vulnerability-in-linux-linux-bdf13a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56372%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56369-vulnerability-in-linux-linux-bdf12d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56369%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56368-vulnerability-in-linux-linux-bdf12b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56368%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55916-vulnerability-in-linux-linux-bdf127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55881-vulnerability-in-linux-linux-bdf11a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54455-vulnerability-in-linux-linux-bdf0df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54455%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54193-vulnerability-in-linux-linux-bdf0db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53690-vulnerability-in-linux-linux-bdf0bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53685-vulnerability-in-linux-linux-bdf0af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52319-vulnerability-in-linux-linux-bdf7a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52319%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51729-vulnerability-in-linux-linux-bdf79e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49573-vulnerability-in-linux-linux-be0763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49571-vulnerability-in-linux-linux-be0745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49568-vulnerability-in-linux-linux-be073d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47408-vulnerability-in-linux-linux-be03f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47408%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46896-vulnerability-in-linux-linux-be03e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41149-vulnerability-in-linux-linux-be18fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55642-vulnerability-in-linux-linux-bdf112</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55641-vulnerability-in-linux-linux-bdf10a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55639-vulnerability-in-linux-linux-bdf0ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54683-vulnerability-in-linux-linux-bdf0eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54460-vulnerability-in-linux-linux-bdd0b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54460%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54191-vulnerability-in-linux-linux-bdd0b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53687-vulnerability-in-linux-linux-bdf0b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53682-vulnerability-in-linux-linux-bdf08e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53680-vulnerability-in-linux-linux-bdf086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52332-vulnerability-in-linux-linux-bdf7a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52332%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50051-vulnerability-in-linux-linux-bdfdd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49569-vulnerability-in-linux-linux-bdce98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48881-vulnerability-in-linux-linux-bdce87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdce87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48876-vulnerability-in-linux-linux-be0737</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48875-vulnerability-in-linux-linux-be0733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48873-vulnerability-in-linux-linux-be072f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe072f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47809-vulnerability-in-linux-linux-be072b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe072b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47794-vulnerability-in-linux-linux-be0727</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47143-vulnerability-in-linux-linux-be03f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47141-vulnerability-in-linux-linux-be03e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe03e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45828-vulnerability-in-linux-linux-be0f43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43098-vulnerability-in-linux-linux-be1f46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41935-vulnerability-in-linux-linux-be190b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe190b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41932-vulnerability-in-linux-linux-be1907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12407-cwe-79-improper-neutralization-of-i-bab64f48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12407%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20murali-indiacitys%20Push%20Notification%20for%20Post%20and%20BuddyPress&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b5981fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11386-cwe-79-improper-neutralization-of-i-d2f20ce7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wow-analytics%20GatorMail%20SmartForms&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12527-cwe-79-improper-neutralization-of-i-1fb6fcbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alanperfectportal%20Perfect%20Portal%20Widgets&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11892-cwe-79-improper-neutralization-of-i-b38120e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Accordion%20Slider%20Lite&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12877-cwe-502-deserialization-of-untruste-390f358b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12877%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6e4bb7ef31ef0b59c70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12412-cwe-79-improper-neutralization-of-i-e6f9bd51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12412%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Rental%20and%20Booking%20Manager%20for%20Bike%2C%20Car%2C%20Dress%2C%20Resort%20with%20WooCommerce%20Integration%20%E2%80%93%20WpRently%20%7C%20WordPress%20plugin&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12520-cwe-79-improper-neutralization-of-i-739c7148</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reader87%20Dominion%20%E2%80%93%20Domain%20Checker%20for%20WPBakery&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12116-cwe-639-authorization-bypass-throug-db8a5ae0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12116%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codepopular%20Unlimited%20Theme%20Addon%20For%20Elementor%20and%20WooCommerce&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59750f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12519-cwe-79-improper-neutralization-of-i-2d1ab9b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tcoder%20TCBD%20Auto%20Refresher&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11874-cwe-79-improper-neutralization-of-i-6b20c7e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Grid%20Accordion%20Lite&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11915-cwe-639-authorization-bypass-throug-01fdd65d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11915%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rrdevs%20RRAddons%20for%20Elementor&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11758-cwe-79-improper-neutralization-of-i-2fd89372</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20milmor%20WP%20SPID%20Italia&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59577f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12304-cwe-79-improper-neutralization-of-i-e2834e56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12204-cwe-862-missing-authorization-in-ga-f15531ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12204%3A%20CWE-862%20Missing%20Authorization%20in%20galdub%20Coupon%20X%3A%20Discount%20Pop%20Up%2C%20Promo%20Code%20Pop%20Ups%2C%20Announcement%20Pop%20Up%2C%20WooCommerce%20Popups&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11327-cwe-79-improper-neutralization-of-i-4f15c13e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flowdee%20ClickWhale%20%E2%80%93%20Link%20Manager%2C%20Link%20Shortener%20and%20Click%20Tracker%20for%20Affiliate%20Links%20%26%20Link%20Pages&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12505-cwe-79-improper-neutralization-of-i-6b2824cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tinuzz%20Trackserver&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12627-cwe-502-deserialization-of-untruste-349ea7fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12627%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20galdub%20Coupon%20X%3A%20Discount%20Pop%20Up%2C%20Promo%20Code%20Pop%20Ups%2C%20Announcement%20Pop%20Up%2C%20WooCommerce%20Popups&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12472-cwe-639-authorization-bypass-throug-52445a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12472%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metaphorcreations%20Post%20Duplicator&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12404-cwe-89-improper-neutralization-of-s-ff29cad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12404%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20crowdfavorite%20CF%20Internal%20Link%20Shortcode&amp;severity=high&amp;id=699f6e38b7ef31ef0b5980e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-11-2e00d1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-11&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e00d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-11-f12eda</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12847-cwe-78-improper-neutralization-of-s-02d1fbc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12847%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20NETGEAR%20DGN1000&amp;severity=critical&amp;id=691f8f1bb342c1dca41c33d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22598-cwe-79-improper-neutralization-of-i-3c126dca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22598%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ae0f66ad5a09ad005b18c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22597-cwe-79-improper-neutralization-of-i-73da38b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22597%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabRedesCefetRJ%20WeGIA&amp;severity=high&amp;id=68ae0f66ad5a09ad005b18bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13318-cwe-463-deletion-of-data-structure--322e88ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13318%3A%20CWE-463%20Deletion%20of%20Data%20Structure%20Sentinel%20in%20smartdatasoft%20Essential%20WP%20Real%20Estate&amp;severity=medium&amp;id=699f6e4eb7ef31ef0b59ca8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13183-cwe-79-improper-neutralization-of-i-d8b9f6ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0311-cwe-79-improper-neutralization-of-in-f53b592b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6b67b7ef31ef0b555112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12473-cwe-89-improper-neutralization-of-s-3d8fd906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12473%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20opacewebdesign%20AI%20Scribe%20%E2%80%93%20SEO%20AI%20Writer%2C%20Content%20Generator%2C%20Humanizer%2C%20Blog%20Writer%2C%20SEO%20Optimizer%2C%20DALLE-3%2C%20AI%20WordPress%20Plugin%20ChatGPT%20(GPT-4o%20128K)&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12606-cwe-862-missing-authorization-in-op-3cb54b84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12606%3A%20CWE-862%20Missing%20Authorization%20in%20opacewebdesign%20AI%20Scribe%20%E2%80%93%20SEO%20AI%20Writer%2C%20Content%20Generator%2C%20Humanizer%2C%20Blog%20Writer%2C%20SEO%20Optimizer%2C%20DALLE-3%2C%20AI%20WordPress%20Plugin%20ChatGPT%20(GPT-4o%20128K)&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29971-na-d9568c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29971%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da2b7ef31ef0b5899d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29970-na-375f89f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29970%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da2b7ef31ef0b5899d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25371-na-10f25d06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25371%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33299-na-a7fc2be2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33299%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b561780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33298-na-ed1c467b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33298%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b56177d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33297-na-547e6a28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33297%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b56177a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57687-na-59152441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57687%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bdbb7ef31ef0b55b7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57228-na-ff9983f3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57228%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57227-na-9bb5547b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57227%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57226-na-bd655bea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57226%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57225-na-da7d0779</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57225%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd6b7ef31ef0b55b53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57224-na-e7ab829d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57224%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd6b7ef31ef0b55b53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57223-na-211d9c97</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57223%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd6b7ef31ef0b55b538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57222-na-b15889da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57222%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57214-na-81b00022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57214%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57213-na-0185f54b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57213%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57212-na-96dd90e7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57212%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd6b7ef31ef0b55b52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57211-na-ec7ee695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57211%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd6b7ef31ef0b55b529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54998-na-d98bc4ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54998%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54997-na-0286a1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54996-na-41f700cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54996%3A%20n%2Fa&amp;severity=high&amp;id=699f6bcab7ef31ef0b55af7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54994-na-13d21559</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54994%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54910-na-02e9bed9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54910%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54849-na-145de692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54849%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54848-na-5306d8fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54848%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55ae38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54847-na-0e98968d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54847%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54846-na-c7aac4ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54846%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55ae2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54687-na-e8bbde3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54687%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23113-cwe-352-cross-site-request-forgery--31a15136</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23113%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vanderbilt%20REDCap&amp;severity=low&amp;id=699f6b1bb7ef31ef0b54e36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23112-cwe-79-improper-neutralization-of-i-610d38e3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23111-cwe-79-improper-neutralization-of-i-a829cf1e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23111%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23110-cwe-79-improper-neutralization-of-i-b49f13ca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23110%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22949-na-393f3e80</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22949%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b1bb7ef31ef0b54e355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22946-na-61d8908f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22946%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b1bb7ef31ef0b54e308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57823-cwe-191-integer-underflow-wrap-or-w-084b4782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57823%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20librdf%20Raptor%20RDF%20Syntax%20Library&amp;severity=critical&amp;id=6908ed741c2a0078ae510274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57822-cwe-125-out-of-bounds-read-in-librd-5519c1c5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57822%3A%20CWE-125%20Out-of-bounds%20Read%20in%20librdf%20Raptor%20RDF%20Syntax%20Library&amp;severity=medium&amp;id=6908ed741c2a0078ae51026e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-23016-cwe-190-integer-overflow-or-wraparound-in-fastcgi-fcgi-bf1098</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-23016%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20FastCGI%20fcgi&amp;severity=critical&amp;id=682d9840c4522896dcbf1098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-10-2e2638</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-10&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e2638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-10-f1283f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f1283f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21380-cwe-284-improper-access-control-in--8d68f498</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21380%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Marketplace%20SaaS&amp;severity=high&amp;id=68c0bd539ed239a66badec4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21385-cwe-918-server-side-request-forgery-3b6754ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21385%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Purview&amp;severity=high&amp;id=68c0bd539ed239a66badec50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10215-cwe-639-authorization-bypass-throug-c8171729</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10215%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Iqonic%20Design%20WPBookit&amp;severity=critical&amp;id=699f6deeb7ef31ef0b590f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22149-cwe-672-operation-on-a-resource-after-expiration-or-release-in-micahparks-jwkset-275509</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22149%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20MicahParks%20jwkset&amp;severity=low&amp;id=6830d58c0acd01a249275509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22295-improper-neutralization-of-input-du-954ca8f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22307-improper-neutralization-of-input-du-72a0afe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saiful%20Islam%20Product%20Table%20for%20WooCommerce&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0811d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22313-improper-neutralization-of-input-du-df55186b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OTWthemes%20Widgetize%20Pages%20Light&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22330-improper-neutralization-of-input-du-68673f1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22330%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mahesh%20Waghmare%20MG%20Parallax%20Slider&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0822e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22331-improper-neutralization-of-input-du-32b89354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22331%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20P3JX%20Cf7Save%20Extension&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22345-improper-neutralization-of-input-du-a4831a35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tsinf%20TS%20Comfort%20DB&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22361-improper-neutralization-of-input-du-b3fa7700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22361%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Opentracker%20Opentracker%20Analytics&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22504-unrestricted-upload-of-file-with-da-9bb40655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22504%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20jumpdemand%204ECPS%20Web%20Forms&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22505-improper-neutralization-of-special--c5932711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22505%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Crispweb%20NC%20Wishlist%20for%20Woocommerce&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22508-improper-control-of-filename-for-in-6792a086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22508%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20roninwp%20FAT%20Event%20Lite&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0866a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22510-deserialization-of-untrusted-data-i-30d7821b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22510%3A%20Deserialization%20of%20Untrusted%20Data%20in%20kkarpieszuk%20WC%20Price%20History%20for%20Omnibus&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0866d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22521-improper-neutralization-of-input-du-2e47249b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Farrell%20wp%20Hosting%20Performance%20Check&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22527-improper-neutralization-of-special--349496a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22527%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22535-improper-neutralization-of-special--04cecf75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22535%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jonkern%20WPListCal&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22537-improper-neutralization-of-special--70edb1e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22537%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20traveller11%20Google%20Maps%20Travel%20Route&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22539-improper-neutralization-of-input-du-9f43b124</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22539%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ka2%20Custom%20DataBase%20Tables&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df087ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22540-improper-neutralization-of-special--93cf0bf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22540%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20seballero%20Emailing%20Subscription&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22542-improper-neutralization-of-special--1308b9c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22542%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ofek%20Nakar%20Virtual%20Bot&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22561-missing-authorization-in-kbowson-ti-69bf3ac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22561%3A%20Missing%20Authorization%20in%20kbowson%20Title%20Experiments%20Free&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22594-improper-neutralization-of-input-du-38ec0ce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hccoder%20Better%20User%20Shortcodes&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22595-improper-neutralization-of-input-du-9412817f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yamna%20Khawaja%20Mailing%20Group%20Listserv&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22801-improper-neutralization-of-input-du-cdca543a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20Free%20WooCommerce%20Theme%2099fy%20Extension&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22802-improper-neutralization-of-input-du-4727955b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22802%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20add-ons.org%20Email%20Templates%20Customizer%20for%20WordPress%20%E2%80%93%20Drag%20And%20Drop%20Email%20Templates%20Builder%20%E2%80%93%20YeeMail&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22803-improper-neutralization-of-input-du-42a8be26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22803%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Advanced%20Product%20Information%20for%20WooCommerce&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22804-improper-neutralization-of-input-du-6e0d8b1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22804%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22805-improper-neutralization-of-input-du-0bcc5402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Skill%20Bar&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22806-improper-neutralization-of-input-du-b7087dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22806%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modernaweb%20Studio%20Black%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22807-improper-neutralization-of-input-du-a1e7afb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Robert%20Responsive%20Flickr%20Slideshow&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22808-improper-neutralization-of-input-du-21532de3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Surbma%20Surbma%20%7C%20Premium%20WP&amp;severity=null&amp;id=69cd7610e6bfc5ba1df093ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22809-improper-neutralization-of-input-du-ea445604</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22809%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theme%20funda%20PDF%20Catalog%20Woocommerce&amp;severity=null&amp;id=69cd7610e6bfc5ba1df09402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22810-improper-neutralization-of-input-du-907ea4e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22810%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Phi%20Phan%20Content%20Blocks%20Builder&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22811-improper-neutralization-of-input-du-8e6e9ee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cristian%20Stan%20MT%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0944a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22812-improper-neutralization-of-input-du-584d7ce3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aezaz%20Shaikh%20News%20Ticker%20Widget%20for%20Elementor&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22813-improper-neutralization-of-input-du-6ddce914</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumCloud%20Conversational%20Forms%20for%20ChatBot&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22814-cross-site-request-forgery-csrf-in--2cf46d33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22814%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dylan%20James%20Zephyr%20Admin%20Theme&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0945e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22815-improper-neutralization-of-input-du-9b522a76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22815%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Button%20Block&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22817-improper-neutralization-of-input-du-7f6889fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22817%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Venutius%20BP%20Profile%20Shortcodes%20Extra&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0946e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22818-improper-neutralization-of-input-du-bce22563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20S3Bubble%20S3Player%20%E2%80%93%20WooCommerce%20%26%20Elementor%20Integration&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22819-improper-neutralization-of-input-du-4e649f5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22819%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roberto%20Bottalico%20Qr%20Code%20and%20Barcode%20Scanner%20Reader&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22820-improper-neutralization-of-input-du-52b359b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22820%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goldsounds%20VR%20Views&amp;severity=null&amp;id=69cd7613e6bfc5ba1df094f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22821-improper-neutralization-of-input-du-cfc787e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22821%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vfthemes%20StorePress&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22822-improper-neutralization-of-input-du-387145de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22822%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bishawjit-das%20wp%20custom%20countdown&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22823-improper-neutralization-of-input-du-407b3e32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtwerdy%20Genesis%20Style%20Shortcodes&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0950a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22824-improper-neutralization-of-input-du-fb1a12c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22824%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucia.intelisano%20Live%20Flight%20Radar&amp;severity=null&amp;id=69cd7613e6bfc5ba1df0950d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22826-improper-neutralization-of-input-du-96188377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpecommerce%20Sell%20Digital%20Downloads&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22827-improper-neutralization-of-input-du-6cf46c61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joomag%20WP%20Joomag&amp;severity=null&amp;id=69cd7613e6bfc5ba1df09516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6155-cwe-862-missing-authorization-in-wps-099d4733</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6155%3A%20CWE-862%20Missing%20Authorization%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12394-cwe-352-cross-site-request-forgery--b4dfa5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12394%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jonathankissam%20Action%20Network&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11642-cwe-22-improper-limitation-of-a-pat-fe6fd3ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11642%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mdshuvo%20Post%20Grid%20Master%20%E2%80%93%20Custom%20Post%20Types%2C%20Taxonomies%20%26%20Ajax%20Filter%20Everything%20with%20Infinite%20Scroll%2C%20Load%20More%2C%20Pagination%20%26%20Shortcode%20Builder&amp;severity=critical&amp;id=699f6e18b7ef31ef0b595156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12616-cwe-862-missing-authorization-in-bi-b596146a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12616%3A%20CWE-862%20Missing%20Authorization%20in%20bitlydeveloper%20Bitly%26%23039%3Bs%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12491-cwe-79-improper-neutralization-of-i-d970b4f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reichertbrothers%20SimplyRETS%20Real%20Estate%20IDX&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12515-cwe-79-improper-neutralization-of-i-2a36e5b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masjidal%20Muslim%20Prayer%20Time-Salah%2FIqamah&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12848-cwe-862-missing-authorization-in-so-6fa5cf32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12848%3A%20CWE-862%20Missing%20Authorization%20in%20sonalsinha21%20SKT%20Page%20Builder&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11686-cwe-79-improper-neutralization-of-i-daf4cdbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manycontacts%20WhatsApp%20%F0%9F%9A%80%20click%20to%20chat&amp;severity=medium&amp;id=699f6e19b7ef31ef0b59524e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11815-cwe-79-improper-neutralization-of-i-a7cefdfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posturinn%20P%C3%B3sturinn%5C%26%23039%3Bs%20Shipping%20with%20WooCommerce&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59674d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11907-cwe-79-improper-neutralization-of-i-27b54089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11907%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20skyword%20Skyword%20API%20Plugin&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12621-cwe-79-improper-neutralization-of-i-79d3e5de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12621%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yumpu%20Yumpu%20E-Paper%20publishing&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11328-cwe-79-improper-neutralization-of-i-efadc593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cluevo%20CLUEVO%20LMS%2C%20E-Learning%20Platform&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12218-cwe-352-cross-site-request-forgery--5c18ddfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12218%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phoeniixx%20Woocommerce%20check%20pincode%2Fzipcode%20for%20shipping&amp;severity=medium&amp;id=699f6e32b7ef31ef0b59798b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11929-cwe-862-missing-authorization-in-mp-f30bdd93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11929%3A%20CWE-862%20Missing%20Authorization%20in%20mpc%20Responsive%20FlipBook%20Plugin%20Wordpress&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12605-cwe-352-cross-site-request-forgery--35880256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12605%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20opacewebdesign%20AI%20Scribe%20%E2%80%93%20SEO%20AI%20Writer%2C%20Content%20Generator%2C%20Humanizer%2C%20Blog%20Writer%2C%20SEO%20Optimizer%2C%20DALLE-3%2C%20AI%20WordPress%20Plugin%20ChatGPT%20(GPT-4o%20128K)&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12067-cwe-89-improper-neutralization-of-s-4524c693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12067%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wptravel%20WP%20Travel%20%E2%80%93%20Ultimate%20Travel%20Booking%20System%2C%20Tour%20Management%20Engine&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12206-cwe-352-cross-site-request-forgery--0a8c6921</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12206%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stylemix%20WordPress%20Header%20Builder%20Plugin%20%E2%80%93%20Pearl&amp;severity=medium&amp;id=699f6e31b7ef31ef0b59784c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5769-cwe-862-missing-authorization-in-sur-2a766ea3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5769%3A%20CWE-862%20Missing%20Authorization%20in%20surakrai%20MIMO%20Woocommerce%20Order%20Tracking&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12285-cwe-79-improper-neutralization-of-i-dd2353ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12285%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ssema%20SEMA%20API&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12330-cwe-530-exposure-of-backup-file-to--07edd1a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12330%3A%20CWE-530%20Exposure%20of%20Backup%20File%20to%20an%20Unauthorized%20Control%20Sphere%20in%20databasebackup%20WP%20Database%20Backup%20%E2%80%93%20Unlimited%20Database%20%26%20Files%20Backup%20by%20Backup%20for%20WP&amp;severity=high&amp;id=699f6e37b7ef31ef0b597ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12222-cwe-79-improper-neutralization-of-i-bc04819e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12222%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amitrotem%20Deliver%20via%20Shipos%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e32b7ef31ef0b5979a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12249-cwe-862-missing-authorization-in-sa-eb5a60b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12249%3A%20CWE-862%20Missing%20Authorization%20in%20samdani%20GS%20Insever%20Portfolio&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12496-cwe-79-improper-neutralization-of-i-ffa4751e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12496%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linearoy%20Linear&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12493-cwe-79-improper-neutralization-of-i-49a0ed91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12493%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blueberryacc%20Files%20Download%20Delay&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12122-cwe-79-improper-neutralization-of-i-d6a4e912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20web-mv%20ResAds&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b59758d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13153-cwe-79-improper-neutralization-of-i-b8b4e8a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor&amp;severity=medium&amp;id=699f6e4db7ef31ef0b59c8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53706-cwe-269-improper-privilege-manageme-c1595b8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53706%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=69a0a44985912abc71d64ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53704-cwe-287-improper-authentication-in--7234e0cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53704%3A%20CWE-287%20Improper%20Authentication%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=68f7d9b6247d717aace26c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0306-covert-timing-channel-aec585</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0306%3A%20Covert%20Timing%20Channel&amp;severity=high&amp;id=682cd0fb1484d88663aec585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56827-heap-based-buffer-overflow-bd66f0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56827%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d9816c4522896dcbd66f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56826-heap-based-buffer-overflow-bd66ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56826%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d9816c4522896dcbd66ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28362-vulnerability-in-rails-action-pack-beb7b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28362%3A%20Vulnerability%20in%20Rails%20Action%20Pack&amp;severity=medium&amp;id=682d9837c4522896dcbeb7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27980-vulnerability-in-nodejs-node-bed5e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27980%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37372-vulnerability-in-nodejs-node-beb7bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37372%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=low&amp;id=682d9837c4522896dcbeb7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46464-na-ccb97b4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46464%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42898-na-2ad73764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42898%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b56945d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56377-cwe-79-improper-neutralization-of-i-c10d4f4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56377%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56376-cwe-79-improper-neutralization-of-i-eab45aa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Vanderbilt%20REDCap&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56114-na-01dfdd35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56114%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55494-na-2a51c8b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55494%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55226-na-b3be98c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55226%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55225-na-6b433551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55225%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55224-na-4ae15649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55224%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54887-na-f6fe3876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54887%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55ae4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54762-na-7117b1bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54762%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54761-na-2cec1df2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54761%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54724-na-97aaa822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54724%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55ad50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51229-na-bb4705c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51229%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b55895c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48806-na-ab97d0e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48806%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7bb7ef31ef0b555cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-09-2e1a2c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-09&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e1a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-09-f12208</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0283-cwe-121-stack-based-buffer-overflow--2eb44d50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0283%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ivanti%20Connect%20Secure&amp;severity=high&amp;id=69a0a44985912abc71d64aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56787-vulnerability-in-linux-linux-bde82f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56786-vulnerability-in-linux-linux-aec088</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56785-vulnerability-in-linux-linux-bde827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56784-vulnerability-in-linux-linux-bde823</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56783-vulnerability-in-linux-linux-bdd19e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56782-vulnerability-in-linux-linux-bde81f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56781-vulnerability-in-linux-linux-bde81b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56781&amp;severity=null&amp;id=682d9822c4522896dcbde81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56780-vulnerability-in-linux-linux-bdd19a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56779-vulnerability-in-linux-linux-bde819</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56778-vulnerability-in-linux-linux-bde7e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56777-vulnerability-in-linux-linux-bde7dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56776-vulnerability-in-linux-linux-bde7d4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56775-vulnerability-in-linux-linux-bde7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56774-vulnerability-in-linux-linux-bde7bd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56773-vulnerability-in-linux-linux-bde7b7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56772-vulnerability-in-linux-linux-bde7b3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56771-vulnerability-in-linux-linux-bde7af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56770-vulnerability-in-linux-linux-bde7ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12337-cwe-79-improper-neutralization-of-i-d1aaf22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webwirkung%20Shipping%20via%20Planzer%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11830-cwe-79-improper-neutralization-of-i-3e0c0186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59681a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11423-cwe-862-missing-authorization-in-wp-c54f8b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11423%3A%20CWE-862%20Missing%20Authorization%20in%20WP%20Swings%20Gift%20Cards%20for%20WooCommerce%20Pro&amp;severity=high&amp;id=699f6e13b7ef31ef0b594c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12853-cwe-434-unrestricted-upload-of-file-b5138f50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12853%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpchill%20Modula%20Image%20Gallery&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12854-cwe-434-unrestricted-upload-of-file-897329d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12854%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ggnomes%20Garden%20Gnome%20Package&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12712-cwe-862-missing-authorization-in-le-4dc18ef4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12712%3A%20CWE-862%20Missing%20Authorization%20in%20levelfourstorefront%20Shopping%20Cart%20%26%20eCommerce%20Store&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12855-cwe-862-missing-authorization-in-sc-e0dce5f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12855%3A%20CWE-862%20Missing%20Authorization%20in%20scriptsbundle%20AdForest&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11939-cwe-89-improper-neutralization-of-s-21eb9b01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11939%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20StylemixThemes%20Cost%20Calculator%20Builder%20PRO&amp;severity=high&amp;id=699f6e28b7ef31ef0b596efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9939-cwe-22-improper-limitation-of-a-path-c72f55f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9939%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=high&amp;id=699f6b65b7ef31ef0b554f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11350-cwe-640-weak-password-recovery-mech-5a6a2ddb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11350%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=699f6e0fb7ef31ef0b5946da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12328-cwe-79-improper-neutralization-of-i-9c808bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madrasthemes%20MAS%20Elementor&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11635-cwe-94-improper-control-of-generati-add3dfa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11635%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=critical&amp;id=699f6e18b7ef31ef0b59514a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12045-cwe-79-improper-neutralization-of-i-4d3e0ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12584-cwe-200-exposure-of-sensitive-infor-79a33f35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12584%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xpro%20140%2B%20Widgets%20%7C%20Xpro%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12852-cwe-79-improper-neutralization-of-i-d05d4b66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12851-cwe-79-improper-neutralization-of-i-2a7671e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%2C%20Carousel%20and%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11613-cwe-94-improper-control-of-generati-f4e6607a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11613%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=critical&amp;id=699f6e18b7ef31ef0b595145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10585-cwe-22-improper-limitation-of-a-pat-0797b331</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20revmakx%20InfiniteWP%20Client&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11270-cwe-862-missing-authorization-in-wp-d72c6e89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11270%3A%20CWE-862%20Missing%20Authorization%20in%20wpwebinarsystem%20WordPress%20Webinar%20Plugin%20%E2%80%93%20WebinarPress&amp;severity=high&amp;id=699f6e0ab7ef31ef0b5941db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12030-cwe-89-improper-neutralization-of-s-07a12f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12030%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20MDTF%20%E2%80%93%20Meta%20Data%20and%20Taxonomies%20Filter&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11271-cwe-862-missing-authorization-in-wp-3ca4b8a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11271%3A%20CWE-862%20Missing%20Authorization%20in%20wpwebinarsystem%20WordPress%20Webinar%20Plugin%20%E2%80%93%20WebinarPress&amp;severity=high&amp;id=699f6e0ab7ef31ef0b5941df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12205-cwe-79-improper-neutralization-of-i-9e1d42a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11816-cwe-862-missing-authorization-in-wp-9ebd3348</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11816%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6e22b7ef31ef0b596751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12112-cwe-79-improper-neutralization-of-i-39b959c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hassantafreshi%20Easy%20Form%20Builder%20%E2%80%93%20WordPress%20plugin%20form%20builder%3A%20contact%20form%2C%20survey%20form%2C%20payment%20form%2C%20and%20custom%20form%20builder&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11916-cwe-862-missing-authorization-in-wp-66b39aba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11916%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6e27b7ef31ef0b596dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12713-cwe-862-missing-authorization-in-br-4e6de07c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12713%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20SureForms%20%E2%80%93%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12521-cwe-79-improper-neutralization-of-i-6ed16e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teonos%20Slotti%20Ajanvaraus&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55517-na-6c04716c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55517%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55459-na-6c14f0cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55459%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54818-na-b763b2c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54818%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc6b7ef31ef0b55add1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54731-cwe-674-uncontrolled-recursion-in-c-3fe071d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54731%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20Coherent%20Graphics%20CPDF&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51442-na-93978b83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51442%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50603-cwe-78-improper-neutralization-of-s-2f9040f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50603%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Aviatrix%20Controller&amp;severity=critical&amp;id=68f7d9b5247d717aace26bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-08-2e1300</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-08&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e1300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-08-f12660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0218-generation-of-predictable-numbers-or-191828b4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0218%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20pgAgent&amp;severity=medium&amp;id=6908ed741c2a0078ae51027a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22306-insertion-of-sensitive-information--6171eb0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22306%3A%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Spencer%20Haws%20Link%20Whisper%20Free&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0811a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22363-missing-authorization-in-hermann-la-a8cf86e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22363%3A%20Missing%20Authorization%20in%20Hermann%20LAHAMI%20Allada%20T-shirt%20Designer%20for%20Woocommerce&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0847d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22296-improper-neutralization-of-input-du-5520f7fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Hash%20Elements&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12429-cwe-22-improper-limitation-of-a-pat-1eb6b66a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12429%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ABB%20AC500%20V3&amp;severity=medium&amp;id=69092616fe7723195e0b35ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22500-improper-neutralization-of-input-du-41934c54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22500%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ali%20Ali%20Alpha%20Price%20Table%20For%20Elementor&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56270-missing-authorization-in-securesubm-a8feed1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56270%3A%20Missing%20Authorization%20in%20SecureSubmit%20WP%20SecureSubmit&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56272-missing-authorization-in-themesuppo-1137554f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56272%3A%20Missing%20Authorization%20in%20ThemeSupport%20Hide%20Category%20by%20User%20Role%20for%20WooCommerce&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12430-cwe-280-improper-handling-of-insuff-1f1eb96d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12430%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20ABB%20AC500%20V3&amp;severity=high&amp;id=69092618fe7723195e0b379a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0243-memory-safety-bugs-fixed-in-firefox--bb30292e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0243%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20134%2C%20Thunderbird%20134%2C%20Firefox%20ESR%20128.6%2C%20and%20Thunderbird%20128.6%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e8309a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0242-memory-safety-bugs-fixed-in-firefox--937a6165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0242%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20134%2C%20Thunderbird%20134%2C%20Firefox%20ESR%20115.19%2C%20Firefox%20ESR%20128.6%2C%20Thunderbird%20115.19%2C%20and%20Thunderbird%20128.6%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e8309a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0241-memory-corruption-when-using-javascr-1d33d5ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0241%3A%20Memory%20corruption%20when%20using%20JavaScript%20Text%20Segmentation%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909325c35043901e8309a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0240-compartment-mismatch-when-parsing-ja-a2574750</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0240%3A%20Compartment%20mismatch%20when%20parsing%20JavaScript%20JSON%20module%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e8309a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0239-alt-svc-alpn-validation-failure-when-e6a987f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0239%3A%20Alt-Svc%20ALPN%20validation%20failure%20when%20redirected%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0238-use-after-free-when-breaking-lines-i-69ef2ab0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0238%3A%20Use-after-free%20when%20breaking%20lines%20in%20text%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0237-webchannel-apis-susceptible-to-confu-74fe341e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0237%3A%20WebChannel%20APIs%20susceptible%20to%20confused%20deputy%20attack%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0297-sql-injection-in-code-projects-onlin-c8729c48</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0297%3A%20SQL%20Injection%20in%20code-projects%20Online%20Book%20Shop&amp;severity=medium&amp;id=68ae166dad5a09ad005b4cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56056-improper-neutralization-of-input-du-87eb346b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56056%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kmfoysal06%20SimpleCharm&amp;severity=high&amp;id=69cd75bfe6bfc5ba1df07327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22294-improper-neutralization-of-input-du-5f23b535</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22294%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theme%20funda%20Custom%20Field%20For%20WP%20Job%20Manager&amp;severity=null&amp;id=69cd75d6e6bfc5ba1df07fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22335-improper-neutralization-of-input-du-20a66d84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rajib.dewan%20Opencart%20Product%20in%20WP&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0823b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22338-improper-neutralization-of-input-du-6329121c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22338%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lich_wang%20WP-tagMaker&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22502-improper-neutralization-of-special--096eb7d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22502%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mindvalley%20MindValley%20Super%20PageMash&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22503-cross-site-request-forgery-csrf-in--4285e91b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22503%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20digitalzoomstudio%20Admin%20debug%20wordpress%20%E2%80%93%20enable%20debug&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22507-improper-neutralization-of-special--6565d8e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22507%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iDo8p%20WPMU%20Prefill%20Post&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22511-improper-neutralization-of-input-du-55638941</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22511%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ella%20Van%20Durpe%20Slides%20%26%20Presentations&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22512-missing-authorization-in-boldgrid-h-d6a82563</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22512%3A%20Missing%20Authorization%20in%20BoldGrid%20Help%20Scout&amp;severity=null&amp;id=69cd75ede6bfc5ba1df08673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22515-improper-neutralization-of-input-du-76c5fe98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simon%20Show%20Google%20Analytics%20widget&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0867c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22516-improper-neutralization-of-input-du-64aaafda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hpinfosys%20Metadata%20SEO&amp;severity=null&amp;id=69cd75ede6bfc5ba1df0867f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22517-improper-neutralization-of-input-du-a42a829c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ben%20Huson%20List%20Pages%20at%20Depth&amp;severity=null&amp;id=69cd75eee6bfc5ba1df086b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22518-improper-neutralization-of-input-du-65df3ea8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Justified%20Image%20Gallery&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22519-improper-neutralization-of-special--d7b8bc1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22519%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jerodmoore%20eDoc%20Easy%20Tables&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22520-cross-site-request-forgery-csrf-in--6f898a2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22520%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tock%20Tock%20Widget&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22522-improper-neutralization-of-input-du-bb3d5e77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roya%20khosravi%20SingSong&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22524-improper-neutralization-of-input-du-1b968038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22524%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22525-improper-neutralization-of-input-du-2c982a5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22525%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bharat%20Kambariya%20Donation%20Block%20For%20PayPal&amp;severity=null&amp;id=69cd75efe6bfc5ba1df086f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22528-improper-neutralization-of-input-du-d529bcde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22528%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Huurkalender.nl%20Huurkalender%20WP&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22529-improper-neutralization-of-input-du-7791e839</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22529%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordpresteem%20WE%20Blocks&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22530-improper-neutralization-of-input-du-346483b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22530%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22531-cwe-79-improper-neutralization-of-i-e02cdb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22531%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20Bilal%20M%20Urdu%20Formatter%20%E2%80%93%20Shamil&amp;severity=medium&amp;id=68ae12eaad5a09ad005b31b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22532-cwe-79-improper-neutralization-of-i-aeae0c6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20snagysandor%20Simple%20Photo%20Sphere&amp;severity=null&amp;id=68ae0f66ad5a09ad005b18bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22533-improper-neutralization-of-special--90f85b2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22533%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bulktheme%20WOOEXIM&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22534-missing-authorization-in-ella-van-d-c3f19ca4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22534%3A%20Missing%20Authorization%20in%20Ella%20Van%20Durpe%20Slides%20%26%20Presentations&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22536-improper-neutralization-of-special--55ac1806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22536%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hiren.sabd%20WP%20Music%20Player&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22538-cross-site-request-forgery-csrf-in--6416a9cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22538%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ofek%20Nakar%20Virtual%20Bot&amp;severity=null&amp;id=69cd75f2e6bfc5ba1df087cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22541-missing-authorization-in-etruel-wp--2f5d6f0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22541%3A%20Missing%20Authorization%20in%20etruel%20WP%20Delete%20Post%20Copies&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22543-missing-authorization-in-beautifult-3a1c58d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22543%3A%20Missing%20Authorization%20in%20beautifultemplates%20ST%20Gallery%20WP&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0880b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22544-improper-neutralization-of-input-du-05ae12ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22544%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mind%20Doodle%20Mind%20Doodle%20Visual%20Sitemaps%20%26%20Tasks&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22545-improper-neutralization-of-input-du-314027d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sw.galati%20iframe%20to%20embed&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22546-improper-neutralization-of-input-du-c4c9f8ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Obaid%20Hossain%20jQuery%20TwentyTwenty&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22547-improper-neutralization-of-input-du-374b16c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jaykrishnang%20JK%20Html%20To%20Pdf&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df08817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22548-improper-neutralization-of-input-du-1c2783ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20frankkoenen%20ldap_login_password_and_role_manager&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22549-improper-neutralization-of-input-du-39d3843a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seinoxygen%20WP%20Github&amp;severity=null&amp;id=69cd75f3e6bfc5ba1df0881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22550-improper-neutralization-of-input-du-8b2cf590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22550%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joe%20Rhoney%20AddFunc%20Mobile%20Detect&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22551-improper-neutralization-of-input-du-a44b9c97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20albedo0%20Boot-Modal&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22552-cross-site-request-forgery-csrf-in--151890cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22552%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bnielsen%20Affiliate%20Disclosure%20Statement&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22554-improper-neutralization-of-input-du-1dac4148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fdfranklin06%20Video%20Embed%20Optimizer&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22555-cross-site-request-forgery-csrf-in--a9209259</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22555%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20njshofe%20Smoothness%20Slider%20Shortcode&amp;severity=null&amp;id=69cd75f4e6bfc5ba1df088bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22556-cross-site-request-forgery-csrf-in--b1260ce1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22556%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20CMS%20Ninja%20Norse%20Rune%20Oracle%20Plugin&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df088bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22557-cross-site-request-forgery-csrf-in--16d606cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cdowp%20News%20Publisher%20Autopilot&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df088c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22558-improper-neutralization-of-input-du-d754273b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22558%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcus%20C.%20J.%20Hartmann%20mcjh%20button%20shortcode&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df088c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22559-cross-site-request-forgery-csrf-in--6c2e8324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22559%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tubepress%20TubePress.NET&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22560-missing-authorization-in-saoshyant1-af311859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22560%3A%20Missing%20Authorization%20in%20saoshyant1994%20Saoshyant%20Page%20Builder&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df0893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22562-cross-site-request-forgery-csrf-in--e34eb96d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22562%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kbowson%20Title%20Experiments%20Free&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22563-cross-site-request-forgery-csrf-in--6138079b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22563%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20faaiq%20Pretty%20Url&amp;severity=null&amp;id=69cd75f5e6bfc5ba1df08945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22572-improper-neutralization-of-input-du-6695a5f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22572%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brian%20Legacy%20ePlayer&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22573-improper-neutralization-of-input-du-2a4cea8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20copist%20Icons%20Enricher&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22574-improper-neutralization-of-input-du-945e705d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22574%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cleanshooter%20ICS%20Button&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22577-improper-neutralization-of-input-du-2bf5f345</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22577%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Damion%20Armentrout%20Able%20Player&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22578-improper-neutralization-of-input-du-ea147d57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aazztech%20WP%20Cookie&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22579-improper-neutralization-of-input-du-4a99a8ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22579%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arefly%20WP%20Header%20Notification&amp;severity=null&amp;id=69cd75f7e6bfc5ba1df089ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22580-improper-neutralization-of-input-du-eeb7462d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Auto%20IT%20Biltorvet%20Dealer%20Tools&amp;severity=null&amp;id=69cd75f8e6bfc5ba1df08a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22581-improper-neutralization-of-input-du-e3189c7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bytephp%20Arcade%20Ready&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22582-cross-site-request-forgery-csrf-in--12b7211b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22582%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Nelle%20Uptime%20Robot&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22584-improper-neutralization-of-input-du-5c4cdd5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Timeline%20Pro&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22585-improper-neutralization-of-input-du-3792a4da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themebon%20Ultimate%20Image%20Hover%20Effects&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22589-cross-site-request-forgery-csrf-in--8ae79519</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22589%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bozdoz%20Quote%20Tweet&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22590-cross-site-request-forgery-csrf-in--651ffddb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22590%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mmrs151%20Prayer%20Times%20Anywhere&amp;severity=null&amp;id=69cd75f9e6bfc5ba1df08a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22591-missing-authorization-in-8blocks-10-b8517a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22591%3A%20Missing%20Authorization%20in%208blocks%201003%20Mortgage%20Application&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22592-missing-authorization-in-8blocks-10-cbecc5a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22592%3A%20Missing%20Authorization%20in%208blocks%201003%20Mortgage%20Application&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22593-improper-neutralization-of-input-du-2e139a98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burria%20Laika%20Pedigree%20Tree&amp;severity=null&amp;id=69cd75fae6bfc5ba1df08b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0296-sql-injection-in-code-projects-onlin-c39ccc5e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0296%3A%20SQL%20Injection%20in%20code-projects%20Online%20Book%20Shop&amp;severity=medium&amp;id=68ae04daad5a09ad005ad9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0295-cross-site-scripting-in-code-project-09f7b4f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0295%3A%20Cross%20Site%20Scripting%20in%20code-projects%20Online%20Book%20Shop&amp;severity=medium&amp;id=68ae04daad5a09ad005ad9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12131-cwe-639-authorization-bypass-throug-aee26c3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12131%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b5975a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12738-cwe-79-improper-neutralization-of-i-f8dbe51e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reflectionmedia%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12426-cwe-200-exposure-of-sensitive-infor-3c7b067d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=medium&amp;id=69092147fe7723195e054085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12425-cwe-22-improper-limitation-of-a-pat-1652123b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12425%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=low&amp;id=69092147fe7723195e054081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11826-cwe-79-improper-neutralization-of-i-0c7da600</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdmag%20Quill%20Forms%20%7C%20The%20Best%20Typeform%20Alternative%20%7C%20Create%20Conversational%20Multi%20Step%20Form%2C%20Survey%2C%20Quiz%2C%20Cost%20Estimation%20or%20Donation%20Form%20on%20WordPress&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12711-cwe-862-missing-authorization-in-wp-12e3e7bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12711%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20RSVP%20and%20Event%20Management&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12532-cwe-200-exposure-of-sensitive-infor-6e532297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12532%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bestwpdeveloper%20BWD%20Elementor%20Addons%20(2500%2B%20presets%2C%20Meet%20The%20Team%2C%20Lottie%2C%20Lord%20Icon%2C%20Masking%2C%20Woocommerce%2C%20Theme%20Builder%2C%20Products%2C%20Blogs%2C%20CV%2C%20Contact%20Form%207%20Styler%2C%20Header%2C%20Slider%2C%20Hero%20Section)&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12033-cwe-862-missing-authorization-in-ar-4c13dd4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12033%3A%20CWE-862%20Missing%20Authorization%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12316-cwe-862-missing-authorization-in-ar-e825e932</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12316%3A%20CWE-862%20Missing%20Authorization%20in%20artbees%20Jupiter%20X%20Core&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43243-unrestricted-upload-of-file-with-da-32862c86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43243%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeglow%20JobBoard%20Job%20listing&amp;severity=null&amp;id=69cd746de6bfc5ba1def77fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49222-deserialization-of-untrusted-data-i-2bf2e105</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49222%3A%20Deserialization%20of%20Untrusted%20Data%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49249-path-traversal-in-smsa-express-smsa-cf1c09ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49249%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20SMSA%20Express%20SMSA%20Shipping&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def882a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49294-cross-site-request-forgery-csrf-in--dc0426b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49294%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20magepeopleteam%20Bus%20Ticket%20Booking%20with%20Seat%20Reservation&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49633-improper-neutralization-of-input-du-85196db3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49633%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Designinvento%20DirectoryPress&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49644-incorrect-privilege-assignment-in-a-c4772636</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49644%3A%20Incorrect%20Privilege%20Assignment%20in%20AllAccessible%20Accessibility%20by%20AllAccessible&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49649-improper-control-of-filename-for-in-37232787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49649%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51651-missing-authorization-in-imran-tauq-c5f28822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51651%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP%20Forms&amp;severity=null&amp;id=69cd750fe6bfc5ba1df02855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51700-improper-neutralization-of-input-du-80fb7949</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51700%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eutrue%20NAVER%20Analytics&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56271-missing-authorization-in-securesubm-3e8734c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56271%3A%20Missing%20Authorization%20in%20SecureSubmit%20WP%20SecureSubmit&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56273-missing-authorization-in-wpvividplu-f3b619aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56273%3A%20Missing%20Authorization%20in%20wpvividplugins%20WPvivid%20Backup%20and%20Migration&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56274-improper-neutralization-of-input-du-743f8e10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56274%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Widgets&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56276-missing-authorization-in-syed-balkh-1052da4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56276%3A%20Missing%20Authorization%20in%20Syed%20Balkhi%20Contact%20Form%20by%20WPForms&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56278-improper-control-of-generation-of-c-c31261d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56278%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Smackcoders%20Inc.%2C%20WP%20Ultimate%20Exporter&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56279-server-side-request-forgery-ssrf-in-9c5202a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56279%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mra13%20Compact%20WP%20Audio%20Player&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56280-incorrect-privilege-assignment-in-a-eb021c45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56280%3A%20Incorrect%20Privilege%20Assignment%20in%20AmentoTech%20Private%20Limited%20WPGuppy&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56281-improper-control-of-filename-for-in-c77f2c91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56281%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56282-improper-control-of-filename-for-in-1564c2d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56282%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Elicus%20WPMozo%20Addons%20Lite%20for%20Elementor&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56283-deserialization-of-untrusted-data-i-b75391d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56283%3A%20Deserialization%20of%20Untrusted%20Data%20in%20plainware%20Locatoraid%20Store%20Locator&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56284-improper-neutralization-of-special--453471cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56284%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sslplugins%20SSL%20Wireless%20SMS%20Notification&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56285-improper-neutralization-of-input-du-8cde37ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56285%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56286-improper-limitation-of-a-pathname-t-59156aa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56286%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcodingplace%20Classic%20Addons%20%E2%80%93%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56287-improper-neutralization-of-input-du-8b3ab55e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56287%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AppJetty%20WP%20jQuery%20DataTable&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56288-improper-neutralization-of-input-du-cf226aac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20WP%20Docs&amp;severity=null&amp;id=69cd75cfe6bfc5ba1df07d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56289-improper-neutralization-of-input-du-d46e6909</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56290-improper-neutralization-of-special--cdec7389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56290%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20silverplugins217%20Multiple%20Shipping%20And%20Billing%20Address%20For%20Woocommerce&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56291-deserialization-of-untrusted-data-i-e85f8698</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56291%3A%20Deserialization%20of%20Untrusted%20Data%20in%20plainware%20PlainInventory&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56292-improper-neutralization-of-input-du-53efcdc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Email%20Reminders&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56293-improper-neutralization-of-input-du-bb29c9d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56293%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nasir%20Ahmed%20Advanced%20Form%20Integration&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56294-missing-authorization-in-posimyth-n-17483f88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56294%3A%20Missing%20Authorization%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56296-improper-neutralization-of-input-du-b1f9b786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kitae%20Park%20Mang%20Board%20WP&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56297-improper-neutralization-of-input-du-ae8ca13c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QuantumCloud%20Highlight&amp;severity=null&amp;id=69cd75d1e6bfc5ba1df07e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56298-improper-neutralization-of-input-du-094f7d24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56298%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rob%20%40%205%20Star%20Plugins%20Pretty%20Simple%20Popup%20Builder&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56299-improper-neutralization-of-input-du-61167c58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pektsekye%20Notify%20Odoo&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56300-insertion-of-sensitive-information--02709339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56300%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpspin%20Post%2FPage%20Copying%20Tool&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22261-improper-neutralization-of-input-du-23493abb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcus%20(aka%20%40msykes)%20WP%20FullCalendar&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22297-cross-site-request-forgery-csrf-in--fb939837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22297%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aipost%20AI%20WP%20Writer&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0806e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22299-missing-authorization-in-space-code-157a0089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22299%3A%20Missing%20Authorization%20in%20Space%20Codes%20AI%20for%20SEO&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22300-cross-site-request-forgery-csrf-in--e49498a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22300%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PixelYourSite%20PixelYourSite%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22301-cross-site-request-forgery-csrf-in--94c8fee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22301%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22302-missing-authorization-in-wp-grids-w-8fa72136</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22302%3A%20Missing%20Authorization%20in%20WP%20Grids%20WP%20Wand&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0807a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22303-insertion-of-sensitive-information--e81a52be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22303%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df0807d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22304-missing-authorization-in-osamaesh-w-29a88f96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22304%3A%20Missing%20Authorization%20in%20osama.esh%20WP%20Visitor%20Statistics%20(Real%20Time%20Traffic)&amp;severity=null&amp;id=69cd75d7e6bfc5ba1df08080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22305-improper-control-of-filename-for-in-0f23091e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22305%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Essential%20Plugin%20Hero%20Banner%20Ultimate&amp;severity=null&amp;id=69cd75d8e6bfc5ba1df08106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22308-improper-neutralization-of-input-du-04128b3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Kitajima%20Smart%20Custom%20Fields&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22309-improper-neutralization-of-input-du-7659cc6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RopeSwingHld%20SpeakOut!%20Email%20Petitions&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0812a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22310-improper-neutralization-of-input-du-249c7e68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marsian%20TemplatesNext%20ToolKit&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0812f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22312-improper-neutralization-of-input-du-a92ae576</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThimPress%20Thim%20Elementor%20Kit&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df08136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22315-improper-neutralization-of-input-du-036c65df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22315%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Typing%20Text&amp;severity=null&amp;id=69cd75d9e6bfc5ba1df0813f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22316-improper-neutralization-of-input-du-c8989610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd75dae6bfc5ba1df08191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22321-improper-neutralization-of-input-du-ef97f23b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22321%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TheInnovs%20ElementsCSS%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75dae6bfc5ba1df0819a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22323-improper-neutralization-of-input-du-61b43138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liton%20Arefin%20Image%20Hover%20Effects%20for%20Elementor&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22324-improper-neutralization-of-input-du-fca27f60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andon%20Ivanov%20OZ%20Canonical&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22325-cross-site-request-forgery-csrf-in--8bf7f946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22325%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nchankov%20Autocompleter&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22327-improper-neutralization-of-input-du-876620bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22327%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Olaf%20Lederer%20EO4WP&amp;severity=null&amp;id=69cd75dae6bfc5ba1df081aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22328-cross-site-request-forgery-csrf-in--0dd6dee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22328%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Elevio%20by%20Dixa%20Elevio&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0820a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22333-improper-neutralization-of-input-du-fa199b57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22336-cross-site-request-forgery-csrf-in--6ecb4e69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22336%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Amos%20Lee%EF%BC%88%E4%B8%80%E5%88%80%EF%BC%89%20Wizhi%20Multi%20Filters%20by%20Wenprise&amp;severity=null&amp;id=69cd75dce6bfc5ba1df0823e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22339-improper-neutralization-of-input-du-09c4ac9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22339%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemeart%20Store%20Commerce&amp;severity=null&amp;id=69cd75dce6bfc5ba1df08247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22342-cross-site-request-forgery-csrf-in--b3a0c0da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22342%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jenst%20WP%20Simple%20Sitemap&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22343-cross-site-request-forgery-csrf-in--8b23117c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22343%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20koter84%20wpSOL&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22347-cross-site-request-forgery-csrf-in--b107a96b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22347%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bannersky%20BSK%20Forms%20Blacklist&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22348-improper-neutralization-of-special--3a8359c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22348%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rtowebsites%20DynamicTags&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22349-improper-neutralization-of-special--24e06217</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22349%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Marka%20WordPress%20Auction%20Plugin&amp;severity=null&amp;id=69cd75dde6bfc5ba1df082e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22351-improper-neutralization-of-special--45993bfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22351%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20penguinarts%20Contact%20Form%207%20Database%20%E2%80%93%20CFDB7&amp;severity=null&amp;id=69cd75e2e6bfc5ba1df08430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22352-improper-neutralization-of-special--0a3334f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22352%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ELEXtensions%20ELEX%20WooCommerce%20Advanced%20Bulk%20Edit%20Products%2C%20Prices%20%26%20Attributes&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0843f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22353-improper-neutralization-of-input-du-c49f6af3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bvads%20BVD%20Easy%20Gallery%20Manager&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22355-improper-neutralization-of-input-du-21c3ae03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20asokaaso2%20Kikx%20Simple%20Post%20Author%20Filter&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22357-improper-neutralization-of-input-du-6906a528</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdever%20Target%20Notifications&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22358-improper-neutralization-of-input-du-70794dc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Simone%20Marcon%20Wp%20advertising%20management&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0844b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22359-improper-neutralization-of-input-du-d6582361</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22359%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pjfc%20SyncFields&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df0844e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22362-improper-neutralization-of-input-du-bce14325</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22362%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Bakovic%20WPAchievements%20Free&amp;severity=null&amp;id=69cd75e3e6bfc5ba1df08457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22364-improper-control-of-filename-for-in-a0b20915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22364%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Service%20Shogun%20Ach%20Invoice%20App&amp;severity=null&amp;id=69cd75e5e6bfc5ba1df084d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12699-cwe-79-improper-neutralization-of-i-f722e500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12699%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themepoints%20Service%20Box&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12152-cwe-22-improper-limitation-of-a-pat-27868458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12152%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mulika%20MIPL%20WC%20Multisite%20Sync%20%E2%80%93%20Synchronize%20WC%20Products%2C%20Orders%2C%20Customers%20%26%20Coupons%20across%20multiple%20sites&amp;severity=high&amp;id=699f6e30b7ef31ef0b597684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12719-cwe-862-missing-authorization-in-ni-d878ae5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12719%3A%20CWE-862%20Missing%20Authorization%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12516-cwe-79-improper-neutralization-of-i-189f0812</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vickydalmia%20Coupon%20Plugin&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12077-cwe-79-improper-neutralization-of-i-2323d5b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12077%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12202-cwe-862-missing-authorization-in-ir-6dee5fe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12202%3A%20CWE-862%20Missing%20Authorization%20in%20IronTemplates%20Croma%20Music&amp;severity=high&amp;id=699f6e31b7ef31ef0b59783b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10866-cwe-862-missing-authorization-in-ak-ad7e32cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10866%3A%20CWE-862%20Missing%20Authorization%20in%20akshay-menariya%20Export%20Import%20Menus&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12437-cwe-79-improper-neutralization-of-i-e2ca752e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12437%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Marketplace%20Items&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12781-cwe-862-missing-authorization-in-la-d389b599</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12781%3A%20CWE-862%20Missing%20Authorization%20in%20Laborator%20Aurum%20-%20WordPress%20%26%20WooCommerce%20Shopping%20Theme&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11764-cwe-79-improper-neutralization-of-i-acfe273f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11764%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20covertcommunication%20Solar%20Wizard%20Lite&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59578c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12499-cwe-79-improper-neutralization-of-i-848c2676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biztechc%20WP%20jQuery%20DataTable&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12495-cwe-79-improper-neutralization-of-i-42fc998d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20virgial%20Bootstrap%20Blocks%20for%20WP%20Editor%20v2&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9354-cwe-79-improper-neutralization-of-in-86bcfef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9354%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20estatik%20Estatik%20Mortgage%20Calculator&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9502-cwe-79-improper-neutralization-of-in-6db87e07</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Elementor%20Addons%20with%20White%20Label%2C%20Free%20Widgets%2C%20Hover%20Effects%2C%20Conditions%2C%20%26%20Animations&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b55148e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12624-cwe-79-improper-neutralization-of-i-bf6d9986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11725-cwe-862-missing-authorization-in-co-ab338277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11725%3A%20CWE-862%20Missing%20Authorization%20in%20cozyvision1%20SMS%20Alert%20Order%20Notifications%20%E2%80%93%20WooCommerce&amp;severity=high&amp;id=699f6e1bb7ef31ef0b59544a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11282-cwe-200-exposure-of-sensitive-infor-512ea3d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11282%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpchill%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b59430b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12384-cwe-79-improper-neutralization-of-i-da8c4519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20letscms%20Binary%20MLM%20Woocommerce&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11756-cwe-79-improper-neutralization-of-i-247f169a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11756%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sweepwidget%20SweepWidget%20Contests%2C%20Giveaways%2C%20Photo%20Contests%2C%20Competitions&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10536-cwe-862-missing-authorization-in-wp-39b902da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10536%3A%20CWE-862%20Missing%20Authorization%20in%20wpqode%20FancyPost%20%E2%80%93%20Best%20Ultimate%20Post%20Block%2C%20Post%20Grid%2C%20Layouts%2C%20Carousel%2C%20Slider%20For%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11887-cwe-79-improper-neutralization-of-i-3c0d40e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geotargetly%20Geo%20Content&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12073-cwe-79-improper-neutralization-of-i-e79fd95f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jleuze%20Meteor%20Slides&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12471-cwe-94-improper-control-of-generati-8d6c34ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12471%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20postsaint%20Post%20Saint%3A%20ChatGPT%2C%20GPT4%2C%20DALL-E%2C%20Stable%20Diffusion%2C%20Pexels%2C%20Dezgo%20AI%20Text%20%26%20Image%20Generator&amp;severity=high&amp;id=699f6e3eb7ef31ef0b59b89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12633-cwe-79-improper-neutralization-of-i-6867f09f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beardev%20JoomSport%20%E2%80%93%20for%20Sports%3A%20Team%20%26%20League%2C%20Football%2C%20Hockey%20%26%20more&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12383-cwe-352-cross-site-request-forgery--7e7fe73c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20letscms%20Binary%20MLM%20Woocommerce&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12438-cwe-79-improper-neutralization-of-i-b6a68e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flickrocket%20WooCommerce%20Digital%20Content%20Delivery%20(incl.%20DRM)%20%E2%80%93%20FlickRocket&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9702-cwe-79-improper-neutralization-of-in-b46287b9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12535-cwe-862-missing-authorization-in-ef-b47c3f31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12535%3A%20CWE-862%20Missing%20Authorization%20in%20eflyjason%20Host%20PHP%20Info&amp;severity=high&amp;id=699f6e41b7ef31ef0b59bbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12464-cwe-79-improper-neutralization-of-i-4d248551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12464%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chatroll%20Chatroll%20Live%20Chat&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12261-cwe-79-improper-neutralization-of-i-e7022c94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12261%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marekzak01%20SmartEmailing.cz&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12439-cwe-79-improper-neutralization-of-i-0428a280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lumiblog%20Marketplace%20Items&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12849-cwe-22-improper-limitation-of-a-pat-86d1bc7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12849%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpguruin%20Error%20Log%20Viewer%20By%20WP%20Guru&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11369-cwe-79-improper-neutralization-of-i-fb8a3cdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11369%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rajeshsingh520%20Store%20credit%20%2F%20Gift%20cards%20for%20woocommerce&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9697-cwe-862-missing-authorization-in-soc-01393ce0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9697%3A%20CWE-862%20Missing%20Authorization%20in%20socialrocket%20Social%20Rocket%20%E2%80%93%20Social%20Sharing%20Plugin&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11749-cwe-79-improper-neutralization-of-i-1a5bf45b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11749%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20appizy%20App%20Embed&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12324-cwe-79-improper-neutralization-of-i-a86514af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20letscms%20Unilevel%20MLM%20Plan&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12435-cwe-79-improper-neutralization-of-i-45634203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12435%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20a3rev%20Compare%20Products%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11382-cwe-79-improper-neutralization-of-i-f5572dee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11382%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20commonninja%20Common%20Ninja%3A%20Fully%20Customizable%20%26%20Perfectly%20Responsive%20Free%20Widgets%20for%20WordPress%20Websites&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59492f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12445-cwe-79-improper-neutralization-of-i-cfe9720c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rightmessage%20RightMessage%20WP&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12322-cwe-352-cross-site-request-forgery--7f00832f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12322%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theperfectwedding%20ThePerfectWedding.nl%20Widget&amp;severity=high&amp;id=699f6e36b7ef31ef0b597dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11810-cwe-79-improper-neutralization-of-i-599afcc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paygreen%20PayGreen%20Payment%20Gateway&amp;severity=medium&amp;id=699f6e20b7ef31ef0b59667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12470-cwe-266-incorrect-privilege-assignm-e0d5406d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12470%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20themesawesome%20School%20Management%20System%20%E2%80%93%20SakolaWP&amp;severity=critical&amp;id=699f6e3eb7ef31ef0b59b7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9208-cwe-79-improper-neutralization-of-in-8b0515e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upress%20Enable%20Accessibility&amp;severity=medium&amp;id=699f6b43b7ef31ef0b5509a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12327-cwe-862-missing-authorization-in-pr-df9d2b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12327%3A%20CWE-862%20Missing%20Authorization%20in%20proloybhaduri%20LazyLoad%20Background%20Images&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11496-cwe-862-missing-authorization-in-in-9311148a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11496%3A%20CWE-862%20Missing%20Authorization%20in%20infility%20Infility%20Global&amp;severity=medium&amp;id=699f6e18b7ef31ef0b5950de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12159-cwe-200-exposure-of-sensitive-infor-2bd0788f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12159%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20muzaara%20Optimize%20Your%20Campaigns%20%E2%80%93%20Google%20Shopping%20%E2%80%93%20Google%20Ads%20%E2%80%93%20Google%20Adwords&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59769e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12256-cwe-79-improper-neutralization-of-i-069cf482</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maximize%20Simple%20Video%20Management%20System&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12176-cwe-862-missing-authorization-in-wo-c5bfcded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12176%3A%20CWE-862%20Missing%20Authorization%20in%20wordlift%20WordLift%20%E2%80%93%20AI%20powered%20SEO%20%E2%80%93%20Schema&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12332-cwe-89-improper-neutralization-of-s-06737eee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12332%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12140-cwe-200-exposure-of-sensitive-infor-0f1e9bb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12140%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20aiwp%20Elementor%20Addons%20AI%20Addons%20%E2%80%93%2070%20Widgets%2C%20Premium%20Templates%2C%20Ultimate%20Elements&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12264-cwe-287-improper-authentication-in--a4bb78e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12264%3A%20CWE-287%20Improper%20Authentication%20in%20payuplugin%20PayU%20CommercePro%20Plugin&amp;severity=critical&amp;id=699f6e33b7ef31ef0b597afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11290-cwe-200-exposure-of-sensitive-infor-acabeb59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brownoxford%20Member%20Access&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11377-cwe-79-improper-neutralization-of-i-b78f98c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11377%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sperse%20Automate%20Hub%20Free%20by%20Sperse.IO&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12158-cwe-862-missing-authorization-in-ar-0588009a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12158%3A%20CWE-862%20Missing%20Authorization%20in%20arrowplugins%20Popup%20%E2%80%93%20MailChimp%2C%20GetResponse%20and%20ActiveCampaign%20Intergrations&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59769a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12153-cwe-79-improper-neutralization-of-i-033dd349</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grandy%20GDY%20Modular%20Content&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11363-cwe-79-improper-neutralization-of-i-a66c1efc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20outtheboxthemes%20Same%20but%20Different%20%E2%80%93%20Related%20Posts%20by%20Taxonomy&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12453-cwe-79-improper-neutralization-of-i-93349fa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uptodown%20Uptodown%20APK%20Download%20Widget&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12457-cwe-79-improper-neutralization-of-i-a54db42e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeatelier%20Chat%20Support%20for%20Viber%20%E2%80%93%20Chat%20Bubble%20and%20Chat%20Button%20for%20Gutenberg%2C%20Elementor%20and%20Shortcode&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12207-cwe-79-improper-neutralization-of-i-2e3d18e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12207%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20otwthemes%20Toggles%20Shortcode%20and%20Widget&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11337-cwe-79-improper-neutralization-of-i-1668f262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20divineapi%20Horoscope%20And%20Tarot&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12252-cwe-94-improper-control-of-generati-e71972d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12252%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20seobeginner%20SEO%20LAT%20Auto%20Post&amp;severity=critical&amp;id=699f6e33b7ef31ef0b597a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12291-cwe-352-cross-site-request-forgery--6a2d8fdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12291%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swarminteractive%20ViewMedica%209&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12313-cwe-502-deserialization-of-untruste-7ba3399b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12313%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20a3rev%20Compare%20Products%20for%20WooCommerce&amp;severity=high&amp;id=699f6e36b7ef31ef0b597dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12290-cwe-79-improper-neutralization-of-i-fb4335e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infility%20Infility%20Global&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12170-cwe-352-cross-site-request-forgery--0a5cf09a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12170%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swarminteractive%20ViewMedica%209&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59777f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11445-cwe-79-improper-neutralization-of-i-b607f4d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sazzadh%20Image%20Magnify&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12288-cwe-352-cross-site-request-forgery--4c5e10ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12288%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ramon-fincken%20Simple%20add%20pages%20or%20posts&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11378-cwe-79-improper-neutralization-of-i-fa467a1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bizappventures%20Bizapp%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59491e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12157-cwe-89-improper-neutralization-of-s-1d5f6330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12157%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20arrowplugins%20Popup%20%E2%80%93%20MailChimp%2C%20GetResponse%20and%20ActiveCampaign%20Intergrations&amp;severity=high&amp;id=699f6e30b7ef31ef0b597696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12126-cwe-79-improper-neutralization-of-i-44b32b5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seomantis%20SEO%20Keywords&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11690-cwe-79-improper-neutralization-of-i-af81040d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11690%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deios%20Financial%20Stocks%20%26%20Crypto%20Market%20Data%20Plugin&amp;severity=medium&amp;id=699f6e19b7ef31ef0b59525f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12214-cwe-79-improper-neutralization-of-i-b5c2e7a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12214%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hoststreamsell%20WooCommerce%20HSS%20Extension%20for%20Streaming%20Video&amp;severity=medium&amp;id=699f6e32b7ef31ef0b597987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11465-cwe-502-deserialization-of-untruste-25c18712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11465%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20eherman24%20Custom%20Product%20Tabs%20for%20WooCommerce&amp;severity=high&amp;id=699f6e16b7ef31ef0b594f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11434-cwe-79-improper-neutralization-of-i-78b5823e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11434%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intergotelecom%20WP%20%E2%80%93%20Bulk%20SMS%20%E2%80%93%20by%20SMS.to&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11338-cwe-79-improper-neutralization-of-i-df2500cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daniel1088%20PIXNET%20Plugin&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12462-cwe-79-improper-neutralization-of-i-80e98ccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andersyogo%20YOGO%20Booking&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10527-cwe-862-missing-authorization-in-cl-7eff537e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10527%3A%20CWE-862%20Missing%20Authorization%20in%20clevelandwebdeveloper%20Spacer&amp;severity=low&amp;id=699f6df4b7ef31ef0b59155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12049-cwe-79-improper-neutralization-of-i-948ec5b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bandido%20Woo%20Ukrposhta&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11383-cwe-79-improper-neutralization-of-i-e07a963b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calculatorscanadaca%20CC%20Canadian%20Mortgage%20Calculator&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12538-cwe-200-exposure-of-sensitive-infor-3d636e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12538%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20binsaifullah%20Duplicate%20Post%2C%20Page%20and%20Any%20Custom%20Post&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11899-cwe-79-improper-neutralization-of-i-a8209827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11899%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Slider%20Pro%20Lite&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12559-cwe-862-missing-authorization-in-1c-731d6617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12559%3A%20CWE-862%20Missing%20Authorization%20in%201clickdesigns%20ClickDesigns&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12098-cwe-79-improper-neutralization-of-i-0a6b9d23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arsdeveloper%20ARS%20Affiliate%20Page%20Plugin&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11777-cwe-79-improper-neutralization-of-i-3d2b4cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11777%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20endortrails%20Sell%20Media&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b59644c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12416-cwe-89-improper-neutralization-of-s-aaee55ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12416%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20delabon%20Live%20Sales%20Notification%20for%20Woocommerce%20%E2%80%93%20Woomotiv&amp;severity=high&amp;id=699f6e3bb7ef31ef0b598953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12541-cwe-352-cross-site-request-forgery--10554237</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12541%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chative%20Chative%20Live%20chat%20and%20Chatbot&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bc91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12419-cwe-94-improper-control-of-generati-235b9196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12419%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tobias_conrad%20Design%20for%20Contact%20Form%207%20Style%20WordPress%20Plugin%20%E2%80%93%20CF7%20WOW%20Styler&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12528-cwe-79-improper-neutralization-of-i-d1eb12ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pantherius%20WordPress%20Survey%20%26%20Poll%20%E2%80%93%20Quiz%2C%20Survey%20and%20Poll%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11934-cwe-79-improper-neutralization-of-i-9bc22e03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11934%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20formaloo%20Formaloo%20Form%20Maker%20%26%20Customer%20Analytics%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12557-cwe-352-cross-site-request-forgery--9eaf7c3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12557%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20transportersio%20Transporters.io&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12402-cwe-288-authentication-bypass-using-1548ad65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12402%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20themescoder%20Themes%20Coder%20%E2%80%93%20Create%20Android%20%26%20iOS%20Apps%20For%20Your%20Woocommerce%20Site&amp;severity=critical&amp;id=699f6e38b7ef31ef0b5980dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11437-cwe-89-improper-neutralization-of-s-e3d2818a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11437%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20solwininfotech%20Timeline%20Designer&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12590-cwe-79-improper-neutralization-of-i-7d42895e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20india-web-developer%20WP%20Youtube%20Gallery&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48245-na-6ec2d24b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48245%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46603-na-c48b4de0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46603%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46602-na-a51dc5bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46602%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46601-na-e4cfc41b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46601%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56c3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46242-na-728e641e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46242%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aa9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44450-na-1c392bed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44450%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40427-na-cf59767c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40427%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca9b7ef31ef0b567d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35532-na-914c9603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35532%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5ab7ef31ef0b563409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55556-na-a5451277</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55556%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55555-na-582627f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55555%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55414-na-687c1e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55414%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bceb7ef31ef0b55b163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55413-na-4cc9e1b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55413%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55412-na-09c975cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55412%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55411-na-ef322c4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55411%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55218-na-a21591cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55218%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55008-na-e6867e24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55008%3A%20n%2Fa&amp;severity=high&amp;id=699f6bcab7ef31ef0b55af8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53522-na-397ff069</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53522%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbfb7ef31ef0b55a9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53345-na-cb3b2e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53345%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50660-na-90a6ec25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50660%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b557389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50659-na-053a2d83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50659%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b557384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50658-na-e6d055da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50658%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b55737f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54819-na-732445ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54819%3A%20n%2Fa&amp;severity=critical&amp;id=698f5d11c9e1ff5ad84e3939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-07-2e1674</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-07&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e1674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-07-f12f3d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55626-cwe-680-integer-overflow-to-buffer--3f921501</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55626%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20OISF%20suricata&amp;severity=low&amp;id=690908537fff0e30cee2391c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6605-improper-control-of-resource-identif-18fcd1da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6605%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=high&amp;id=690904b000ff46172d4a0e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6604-improper-control-of-resource-identif-00ba6af5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6604%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=medium&amp;id=690904ae00ff46172d4a0dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6601-improper-control-of-resource-identif-da46b897</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6601%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=medium&amp;id=690904ae00ff46172d4a0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56769-vulnerability-in-linux-linux-bde7a7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56768-vulnerability-in-linux-linux-bde783</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56767-vulnerability-in-linux-linux-bde77b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56766-vulnerability-in-linux-linux-bdd196</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56765-vulnerability-in-linux-linux-bde773</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56764-vulnerability-in-linux-linux-bde76f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde76f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56763-vulnerability-in-linux-linux-bde76b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde76b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56761-vulnerability-in-linux-linux-bde767</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56760-vulnerability-in-linux-linux-bde75a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56759-vulnerability-in-linux-linux-bde758</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56758-vulnerability-in-linux-linux-bdd192</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56757-vulnerability-in-linux-linux-bde754</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-21612-cwe-79-improper-neutralization-of-i-b936d913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-21612%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-TabberNeue&amp;severity=high&amp;id=68ae12eaad5a09ad005b31ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45553-cwe-416-use-after-free-in-qualcomm--575474af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45553%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a43f85912abc71d63030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21464-cwe-120-buffer-copy-without-checkin-0b5658f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21464%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69a0a43c85912abc71d620d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20105-cwe-787-out-of-bounds-write-in-medi-93b9a4ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20105%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8768&amp;severity=medium&amp;id=69a0a43c85912abc71d620cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20148-cwe-787-out-of-bounds-write-in-medi-0cc4bbcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20148%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT3603%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT7902%2C%20MT7920%2C%20MT7922%2C%20MT8518S%2C%20MT8532%2C%20MT8766%2C%20MT8768%2C%20MT8775%2C%20MT8796%2C%20MT8798&amp;severity=critical&amp;id=69a0a43c85912abc71d620d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20146-cwe-787-out-of-bounds-write-in-medi-41c28128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20146%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT2737%2C%20MT3603%2C%20MT6835%2C%20MT6878%2C%20MT6886%2C%20MT6897%2C%20MT6990%2C%20MT7902%2C%20MT7920%2C%20MT7922%2C%20MT8365%2C%20MT8518S%2C%20MT8532%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8755%2C%20MT8766%2C%20MT8768%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8796%2C%20MT8798%2C%20MT8893&amp;severity=high&amp;id=69a0a43c85912abc71d620d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20140-cwe-787-out-of-bounds-write-in-medi-0d3057d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20140%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6768%2C%20MT6781%2C%20MT6833%2C%20MT6853%2C%20MT6877%2C%20MT6885%2C%20MT6893%2C%20MT8518S%2C%20MT8532&amp;severity=medium&amp;id=69a0a43c85912abc71d620cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20154-cwe-121-stack-overflow-in-mediatek--3863fd93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20154%3A%20CWE-121%20Stack%20Overflow%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769K%2C%20MT6769S%2C%20MT6769T%2C%20MT6769Z%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6785U%2C%20MT6789%2C%20MT6833P%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6855T%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6877T%2C%20MT6877TT%2C%20MT6880%2C%20MT6880T%2C%20MT6880U%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT8666%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8788E%2C%20MT8789%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=6994829080d747be20bad130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46622-na-a902f193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46622%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d02b7ef31ef0b56d2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46209-na-a02fe4f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46209%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46073-na-68dbe1cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46073%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35498-na-e6184085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35498%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b5633f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56828-na-ab78fa01</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56828%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd4b7ef31ef0b55b484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55529-na-c8f3f717</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55529%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55408-cwe-862-missing-authorization-in-as-5286bb08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55408%3A%20CWE-862%20Missing%20Authorization%20in%20ASUS%20ASCI&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55407-na-096b38bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55407%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55076-cwe-352-cross-site-request-forgery--7603c487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55076%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Grocy%20project%20Grocy&amp;severity=high&amp;id=699f6bccb7ef31ef0b55affd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55075-cwe-425-direct-request-forced-brows-48da61fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55075%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Grocy%20project%20Grocy&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55affa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55074-cwe-79-improper-neutralization-of-i-13d9022f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Grocy%20project%20Grocy&amp;severity=high&amp;id=699f6bccb7ef31ef0b55aff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54880-na-5b69160e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54880%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55ae46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54879-na-c3374a79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54879%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55ae42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54764-na-b5fc6e7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54764%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54763-na-02151ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54763%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53936-na-353de077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53936%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55ac2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53935-na-35bfc310</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53935%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55ab92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53934-na-654682a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53934%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc2b7ef31ef0b55ab8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53933-na-aca50751</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53933%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55ab8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51112-na-9b1e5116</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51112%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51111-na-3479434a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51111%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48457-na-c964a9c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48457%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b555800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48456-na-b572546b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48456%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b5557fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48455-na-4c4a4e12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48455%3A%20n%2Fa&amp;severity=low&amp;id=699f6b72b7ef31ef0b5557f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-06-2e0fdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-06&amp;severity=medium&amp;id=682c7dc2e8347ec82d2e0fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-06-f12ee2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-05-2e41f6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-05&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e41f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-05-f12ef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10957-cwe-502-deserialization-of-untruste-288e4140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10957%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20davidanderson%20UpdraftPlus%3A%20WP%20Backup%20%26%20Migration%20Plugin&amp;severity=high&amp;id=699f6e04b7ef31ef0b5939a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12195-cwe-89-improper-neutralization-of-s-0b4ec88c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12195%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12279-cwe-352-cross-site-request-forgery--5e2eb20a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12279%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justin_k%20WP%20Social%20AutoConnect&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12475-cwe-79-improper-neutralization-of-i-ab16cfce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12475%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpexpertsio%20WP%20Multi%20Store%20Locator&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12221-cwe-79-improper-neutralization-of-i-0fb0aa4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Turnkey%20bbPress%20by%20WeaverTheme&amp;severity=medium&amp;id=699f6e32b7ef31ef0b59799b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11930-cwe-79-improper-neutralization-of-i-4ef501be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taskbuilder%20Taskbuilder%20%E2%80%93%20WordPress%20Project%20%26%20Task%20Management%20plugin&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12583-cwe-1336-improper-neutralization-of-3b1738f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12583%3A%20CWE-1336%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20alexacrm%20Dynamics%20365%20Integration&amp;severity=critical&amp;id=699f6e43b7ef31ef0b59bfc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10932-cwe-502-deserialization-of-untruste-8c4eb8ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10932%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20inisev%20Backup%20Migration&amp;severity=high&amp;id=699f6e03b7ef31ef0b593909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12545-cwe-352-cross-site-request-forgery--0190e7aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12545%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akashmalik%20Scratch%20%26%20Win%20%E2%80%93%20Giveaways%20and%20Contests.%20Boost%20subscribers%2C%20traffic%2C%20repeat%20visits%2C%20%20referrals%2C%20sales%20and%20more&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11974-cwe-79-improper-neutralization-of-i-56b828aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11974%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=699f6e29b7ef31ef0b596ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12701-cwe-79-improper-neutralization-of-i-9d6dcee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12701%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20WP%20Smart%20Import%20%3A%20Import%20any%20XML%20File%20to%20WordPress&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12047-cwe-79-improper-neutralization-of-i-38dd5b7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12047%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartersite%20WP%20Compress%20%E2%80%93%20Instant%20Performance%20%26%20Speed%20Optimization&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22390-cwe-521-weak-password-requirements-495f9527</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22390%3A%20CWE-521%20Weak%20Password%20Requirements&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22388-cwe-79-improper-neutralization-of-i-3aa5fb0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22387-cwe-598-use-of-get-request-method-w-99e0877f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22387%3A%20CWE-598%20Use%20of%20GET%20Request%20Method%20With%20Sensitive%20Query%20Strings&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22386-cwe-613-insufficient-session-expira-e178152d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22386%3A%20CWE-613%20Insufficient%20Session%20Expiration&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22385-cwe-862-missing-authorization-e8f7a535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22385%3A%20CWE-862%20Missing%20Authorization&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22384-cwe-472-external-control-of-assumed-bd35a191</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22384%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter&amp;severity=high&amp;id=699f6b1bb7ef31ef0b54e2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22383-cwe-79-improper-neutralization-of-i-6a3e335f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-04-2e3bf6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-04&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e3bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-04-f13075</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-04&amp;severity=medium&amp;id=682acdc2bbaf20d303f13075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11733-cwe-94-improper-control-of-generati-fa984264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11733%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20hcabrera%20WordPress%20Popular%20Posts&amp;severity=high&amp;id=699f6e1bb7ef31ef0b59559e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12237-cwe-918-server-side-request-forgery-c8ae663b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12237%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nik00726%20Photo%20Gallery%20Slideshow%20%26%20Masonry%20Tiled%20Gallery&amp;severity=medium&amp;id=699f6e32b7ef31ef0b5979a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56408-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-phpoffice-phpspreadsheet-aeac8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56408%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHPOffice%20PhpSpreadsheet&amp;severity=high&amp;id=682cd0f71484d88663aeac8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12132-cwe-639-authorization-bypass-throug-f7ddf44c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12132%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b5975a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36613-na-517b9d57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35365-na-5d571f64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35365%3A%20n%2Fa&amp;severity=high&amp;id=699f6c58b7ef31ef0b56328c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55507-na-5c00dbbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55507%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55078-na-5e1b1362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55078%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48814-na-d25954d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48814%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22376-cwe-338-use-of-cryptographically-we-17ded964</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22376%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-03-2e3984</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-03&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e3984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-03-f12cf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43768-elevation-of-privilege-in-google-an-8c6708df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43768%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a0a43f85912abc71d63026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43097-elevation-of-privilege-in-google-an-3678010d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43097%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6909214efe7723195e054596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8447-deadlock-aec806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8447%3A%20Deadlock&amp;severity=medium&amp;id=682cd0fb1484d88663aec806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9950-cwe-379-in-forescout-secureconnector-fb3ff974</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9950%3A%20CWE-379%20in%20Forescout%20SecureConnector&amp;severity=high&amp;id=683ffd67182aa0cae2a3884c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55542-cwe-266-in-acronis-acronis-cyber-protect-16-bf1609</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55542%3A%20CWE-266%20in%20Acronis%20Acronis%20Cyber%20Protect%2016&amp;severity=medium&amp;id=682d9840c4522896dcbf1609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49035-vulnerability-in-linux-linux-be69b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe69b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37237-cross-site-request-forgery-csrf-in--7f394371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37237%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fs-code%20FS%20Poster&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38778-cross-site-request-forgery-csrf-in--d542048b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38778%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39623-cross-site-request-forgery-csrf-in--27b6e5ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39623%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56257-improper-neutralization-of-input-du-803028ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56257%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CoolPlugins%20Coins%20MarketCap&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56268-improper-neutralization-of-input-du-72dbfd5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56268%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hookandhook%20Post%20Grid%20Elementor%20Addon&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56302-improper-neutralization-of-input-du-47ad1a49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jorisderuiter%20ConvertCalculator%20for%20WordPress&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56267-improper-neutralization-of-input-du-1dda396a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20html5maps%20Interactive%20UK%20Map&amp;severity=null&amp;id=69cd75cee6bfc5ba1df07cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56266-missing-authorization-in-sonaar-mp3-925592ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56266%3A%20Missing%20Authorization%20in%20sonaar%20MP3%20Audio%20Player%20for%20Music%2C%20Radio%20%26%20Podcast%20by%20Sonaar&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56264-unrestricted-upload-of-file-with-da-2f94bc4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56264%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Beee%20ACF%20City%20Selector&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56263-improper-neutralization-of-input-du-dc5b3713</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GS%20Plugins%20GS%20Shots%20for%20Dribbble&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56262-improper-neutralization-of-input-du-1d42daf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56262%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GS%20Plugins%20GS%20Coaches&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56261-improper-neutralization-of-input-du-405d009d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GS%20Plugins%20Project%20Showcase&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56260-improper-neutralization-of-input-du-a849e3d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StorePlugin%20ShopElement&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56259-improper-neutralization-of-input-du-f42e74c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56259%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paolo%20GeoDirectory&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56258-improper-neutralization-of-input-du-28db75c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56258%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlockArt%20Magazine%20Blocks&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56255-missing-authorization-in-stiofan-ay-5516f450</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56255%3A%20Missing%20Authorization%20in%20Stiofan%20AyeCode%20Connect&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56254-improper-neutralization-of-input-du-39591500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56254%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56253-missing-authorization-in-supsystic--6875954b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56253%3A%20Missing%20Authorization%20in%20supsystic%20Data%20Tables%20Generator%20by%20Supsystic&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56252-improper-neutralization-of-input-du-fbc352ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56252%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56251-cross-site-request-forgery-csrf-in--d3ef7493</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56251%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Event%20Espresso%20Event%20Espresso%204%20Decaf&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56250-improper-neutralization-of-special--a01f1a0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56250%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Greg%20Ross%20Just%20Writing%20Statistics&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56249-unrestricted-upload-of-file-with-da-fb1416ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56249%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56248-improper-limitation-of-a-pathname-t-6945267a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56248%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ludwig%20You%20WPMasterToolKit&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56247-improper-neutralization-of-special--9e2c58f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56247%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20AF%20themes%20WP%20Post%20Author&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56246-improper-neutralization-of-input-du-6f6e8ed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56245-improper-neutralization-of-input-du-093b1dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56244-missing-authorization-in-wp-royal-a-8d056653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56244%3A%20Missing%20Authorization%20in%20WP%20Royal%20Ashe%20Extra&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56243-missing-authorization-in-js-morisse-0ced9ade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56243%3A%20Missing%20Authorization%20in%20JS%20Morisset%20WPSSO%20Core&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56242-improper-neutralization-of-input-du-a2c7c4a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56242%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56241-improper-neutralization-of-input-du-6cd2f184</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56240-improper-neutralization-of-input-du-107a2153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pronamic%20Pronamic%20Google%20Maps&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56239-improper-neutralization-of-input-du-f12c0b7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Audio%20Dock&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56238-missing-authorization-in-quantumclo-7a778163</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56238%3A%20Missing%20Authorization%20in%20QuantumCloud%20Floating%20Action%20Buttons&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56237-improper-neutralization-of-input-du-ca419f6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56236-missing-authorization-in-juni-hesti-32beb854</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56236%3A%20Missing%20Authorization%20in%20Juni%20Hestia%20Nginx%20Cache&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56026-improper-neutralization-of-input-du-143e3ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Greg%20%26%238211%3B%20SiteOrigin%20Simple%20Proxy&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56025-improper-neutralization-of-input-du-e9944031</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adworkmedia%20AdWork%20Media%20EZ%20Content%20Locker&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56024-improper-neutralization-of-input-du-e210441d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20Custom%20Dashboard%20Widget&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56023-improper-neutralization-of-input-du-915a82ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PerfectSolution%20WP%20eCommerce%20Quickpay&amp;severity=null&amp;id=69cd75bae6bfc5ba1df0710e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56022-improper-neutralization-of-input-du-a4486ff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20Monsters%20Preloader%20by%20WordPress%20Monsters&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0708f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56018-improper-neutralization-of-input-du-c145f4e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56018%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BU%20Web%20Team%20BU%20Section%20Editing&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43927-cross-site-request-forgery-csrf-in--4b2c318f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43927%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Till%20Kr%C3%BCss%20Email%20Address%20Encoder&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38790-cross-site-request-forgery-csrf-in--d9225f36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38790%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Smartsupp%20Smartsupp%20%E2%80%93%20live%20chat%2C%20chatbots%2C%20AI%20and%20lead%20generation&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38789-cross-site-request-forgery-csrf-in--e4b24a62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38789%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marco%20Milesi%20Telegram%20Bot%20%26%20Channel&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38766-cross-site-request-forgery-csrf-in--bf879af2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38766%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20matomoteam%20Matomo%20Analytics&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38765-cross-site-request-forgery-csrf-in--b7614ce1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38765%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20outtheboxthemes%20Oceanic&amp;severity=null&amp;id=69cd7465e6bfc5ba1def709e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38763-cross-site-request-forgery-csrf-in--305961b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38763%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themes4wp%20Popularis%20Verse&amp;severity=null&amp;id=69cd7465e6bfc5ba1def709b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38762-cross-site-request-forgery-csrf-in--708927c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38762%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20Event%20Tickets&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38753-cross-site-request-forgery-csrf-in--69d9cff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38753%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Labib%20Ahmed%20Animated%20Rotating%20Words&amp;severity=null&amp;id=69cd7463e6bfc5ba1def701f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38751-cross-site-request-forgery-csrf-in--2758d341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38751%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Magazine3%20Google%20Adsense%20%26%20Banner%20Ads%20by%20AdsforWP&amp;severity=null&amp;id=69cd7463e6bfc5ba1def701c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38729-cross-site-request-forgery-csrf-in--7c0107c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38729%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mbeelink%20MBE%20eShip&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38691-cross-site-request-forgery-csrf-in--d8b1d9e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38691%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Metorik%20Metorik%20%E2%80%93%20Reports%20%26%20Email%20Automation%20for%20WooCommerce&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37937-cross-site-request-forgery-csrf-in--ae7fcc6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37937%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Rara%20Business&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37543-cross-site-request-forgery-csrf-in--2c944dd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37543%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nitesh%20Ultimate%20Auction&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37540-cross-site-request-forgery-csrf-in--73a0fb5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37540%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZEEN101%20Leaky%20Paywall&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37518-cross-site-request-forgery-csrf-in--ea9469c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37518%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37511-cross-site-request-forgery-csrf-in--87a0b6e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37511%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20swte%20Swift%20Performance%20Lite&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37508-cross-site-request-forgery-csrf-in--1d821095</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37508%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Construction%20Landing%20Page&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37503-cross-site-request-forgery-csrf-in--c748b074</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37503%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Lawyer%20Landing%20Page&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37493-cross-site-request-forgery-csrf-in--ab934e43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37493%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sonalsinha21%20Posterity&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37491-cross-site-request-forgery-csrf-in--5013a0b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37491%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20apollo13themes%20Rife%20Free&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37490-cross-site-request-forgery-csrf-in--056b6ea7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37490%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Bard&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37478-cross-site-request-forgery-csrf-in--10378cb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37478%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Ashe&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37473-cross-site-request-forgery-csrf-in--dac6ce49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37473%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blazethemes%20Trendy%20News&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37469-cross-site-request-forgery-csrf-in--c1118fb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37469%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37467-cross-site-request-forgery-csrf-in--13cf38d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37467%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Hestia&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37458-cross-site-request-forgery-csrf-in--fa3e6249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37458%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Highlight&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37451-cross-site-request-forgery-csrf-in--f1c441c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Travel%20Agency&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37450-cross-site-request-forgery-csrf-in--b2866ecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37450%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Benevolent&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37448-cross-site-request-forgery-csrf-in--7775fc6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37448%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20famethemes%20OnePress&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37441-cross-site-request-forgery-csrf-in--0621a94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37441%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20desertthemes%20NewsMash&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37435-cross-site-request-forgery-csrf-in--e1724403</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Perfect%20Portfolio&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37431-cross-site-request-forgery-csrf-in--eb92de7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37431%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Mesmerize&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37426-cross-site-request-forgery-csrf-in--6d0cd0c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Elegant%20Pink&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37421-cross-site-request-forgery-csrf-in--7a539f71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20JobScout&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37417-cross-site-request-forgery-csrf-in--72b5007f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37417%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpcoachify%20Coachify&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37413-cross-site-request-forgery-csrf-in--03f52016</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Preschool%20and%20Kindergarten&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37412-cross-site-request-forgery-csrf-in--73b0e02c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37412%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blossomthemes%20Blossom%20Shop&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37274-cross-site-request-forgery-csrf-in--004468e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Rui%20Guerreiro%20WP%20Mobile%20Menu&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37272-cross-site-request-forgery-csrf-in--a827ca26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wptravelengine%20Travel%20Monster&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37243-cross-site-request-forgery-csrf-in--50df2272</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37243%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blossomthemes%20Vandana%20Lite&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37242-cross-site-request-forgery-csrf-in--00932fde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37242%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20Newspack%20Newsletters&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37240-cross-site-request-forgery-csrf-in--34ed2bae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37240%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sbouey%20Falang%20multilanguage&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37238-cross-site-request-forgery-csrf-in--fa8e26cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37238%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Greg%20Winiarski%20WPAdverts&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37236-cross-site-request-forgery-csrf-in--164f6617</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37236%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tim%20W%20Loco%20Translate&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37235-cross-site-request-forgery-csrf-in--265b2a77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37235%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Adrian%20Tobey%20Groundhogg&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37104-cross-site-request-forgery-csrf-in--e0cd514f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37104%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Chic%20Lite&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37103-cross-site-request-forgery-csrf-in--63648c16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37103%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raratheme%20Education%20Zone&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37102-cross-site-request-forgery-csrf-in--78ca654c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37102%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blossomthemes%20Vilva&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37093-cross-site-request-forgery-csrf-in--036f4c5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stylemix%20MasterStudy%20LMS&amp;severity=null&amp;id=69cd7448e6bfc5ba1def693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56027-improper-neutralization-of-input-du-c2388ec1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bizswoop%20Leads%20CRM&amp;severity=null&amp;id=69cd75bae6bfc5ba1df0711a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56028-improper-neutralization-of-input-du-0f989e3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56028%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lemonadestudio%20Lemonade%20Social%20Networks%20Autoposter%20Pinterest&amp;severity=null&amp;id=69cd75bae6bfc5ba1df0711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56029-improper-neutralization-of-input-du-5d883624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56029%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dreamwinner%20Easy%20Language%20Switcher&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56030-improper-neutralization-of-input-du-2853095e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56030%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Carver%20Lab%2010CentMail&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56032-improper-neutralization-of-input-du-75ec8ca0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FolioVision%20FV%20Descriptions&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0715f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56033-improper-neutralization-of-input-du-adcea01c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20FAQs&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56019-improper-neutralization-of-input-du-15f97b61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56019%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gavinr%20Inline%20Footnotes&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56034-improper-neutralization-of-input-du-f349eb7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56034%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Irshad%20A.Khan%20Services%20updates%20for%20customers&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0716a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56035-improper-neutralization-of-input-du-681a2767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kurt%20Payne%20Upload%20Scanner&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0716d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56036-improper-neutralization-of-input-du-bd3bed66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ondrej%20Donek%20odPhotogallery&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56037-improper-neutralization-of-input-du-7b4a5099</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SoftClever%20Limited%20User%20Referral&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56038-improper-neutralization-of-input-du-f92822fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56038%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catalinsendsms%20SendSMS&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56060-improper-neutralization-of-input-du-db312543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56060%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Link%20Software%20LLC%20HTML%20Forms&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56069-improper-neutralization-of-input-du-4d28b04d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56069%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48197-na-6689e00d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48197%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0db7ef31ef0b56d838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56829-cwe-434-unrestricted-upload-of-file-a904606f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56829%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&amp;severity=critical&amp;id=699f6bd4b7ef31ef0b55b489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22214-cwe-89-improper-neutralization-of-s-a2c7ed56</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22214%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)&amp;severity=medium&amp;id=699f6b1bb7ef31ef0b54e2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-02-2e3525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-02&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e3525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-02-f12724</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-01-08b424b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-01&amp;severity=medium&amp;id=68367c99182aa0cae2321cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-01-7610d7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-01&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb7610d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2025-01-01-f12d32</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202025-01-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56020-improper-neutralization-of-input-du-9692629f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56020%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svegliadesign%20SvegliaT%20Buttons&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56021-improper-neutralization-of-input-du-c67a0791</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibnuyahya%20Category%20Post%20Shortcode&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0708c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56062-improper-neutralization-of-input-du-4b7d8200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56062%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56063-improper-neutralization-of-input-du-4f280299</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56063%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df0743e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13080-cross-site-scripting-in-phpgurukul-land-record-system-bed988</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13080%3A%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Land%20Record%20System&amp;severity=medium&amp;id=682d983ac4522896dcbed988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25133-improper-access-control-3b9d1cf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25133%3A%20Improper%20Access%20Control&amp;severity=high&amp;id=699f6d60b7ef31ef0b570d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6602-improper-control-of-resource-identif-a415aee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6602%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)&amp;severity=medium&amp;id=690904ae00ff46172d4a0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49686-missing-authorization-in-fatcatapps-5b25768b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49686%3A%20Missing%20Authorization%20in%20fatcatapps%20Landing%20Page%20Cat&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df0198e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49687-missing-authorization-in-storeapps--a44a7c89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49687%3A%20Missing%20Authorization%20in%20storeapps%20Smart%20Manager&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df01991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49694-missing-authorization-in-imw3-my-wp-c4e607d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49694%3A%20Missing%20Authorization%20in%20imw3%20My%20Wp%20Brand&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49698-missing-authorization-in-pricelisto-f979294b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49698%3A%20Missing%20Authorization%20in%20PriceListo%20Best%20Restaurant%20Menu%20by%20PriceListo&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51667-missing-authorization-in-paytiumsup-51dce5d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51667%3A%20Missing%20Authorization%20in%20paytiumsupport%20Paytium&amp;severity=null&amp;id=69cd7510e6bfc5ba1df02908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55995-missing-authorization-in-torod-comp-cabc2a44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55995%3A%20Missing%20Authorization%20in%20Torod%20Company%20for%20Information%20Technology%20Torod&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56002-missing-authorization-in-mightyform-1c036221</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56002%3A%20Missing%20Authorization%20in%20mightyforms%20Contact%20Form%2C%20Survey%20%26%20Form%20Builder%20%E2%80%93%20MightyForms&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df0703b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56070-missing-authorization-in-azzaroco-w-b8f3d3eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56070%3A%20Missing%20Authorization%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56207-cross-site-request-forgery-csrf-in--11c1ba29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56207%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EditionGuard%20EditionGuard%20for%20WooCommerce%20%E2%80%93%20eBook%20Sales%20with%20DRM&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56206-cross-site-request-forgery-csrf-in--7d059543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56206%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20krishankakkar%20gap-hub-user-role&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56204-cross-site-request-forgery-csrf-in--44c6b376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56204%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20Sinking%20Dropdowns&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56203-cross-site-request-forgery-csrf-in--44364627</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56203%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gholme4%20Wayne%20Audio%20Player&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56066-missing-authorization-in-inspry-age-125ea5a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56066%3A%20Missing%20Authorization%20in%20inspry%20Agency%20Toolkit&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56061-missing-authorization-in-ateeq-rafe-70fef8a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56061%3A%20Missing%20Authorization%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56045-path-traversal-in-vibethemes-wplms-1b496559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56045%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56044-authentication-bypass-using-an-alte-0dec3fc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56044%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56043-incorrect-privilege-assignment-in-v-5680c809</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56043%3A%20Incorrect%20Privilege%20Assignment%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56040-incorrect-privilege-assignment-in-v-4a60ea73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56040%3A%20Incorrect%20Privilege%20Assignment%20in%20VibeThemes%20VibeBP&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0717c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56042-improper-neutralization-of-special--e5956baf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56042%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56041-improper-neutralization-of-special--61481b15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56041%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20VibeBP&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df0717f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56039-improper-neutralization-of-special--e47230ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56039%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20VibeBP&amp;severity=null&amp;id=69cd75bbe6bfc5ba1df07179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56064-unrestricted-upload-of-file-with-da-ccc7b396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56064%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56046-unrestricted-upload-of-file-with-da-20362d52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56046%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df0725b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56068-deserialization-of-untrusted-data-i-7ec83575</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56068%3A%20Deserialization%20of%20Untrusted%20Data%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df0744d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55991-missing-authorization-in-mario-pesh-28be1912</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55991%3A%20Missing%20Authorization%20in%20Mario%20Peshev%20WP-CRM%20System&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56031-missing-authorization-in-yulio-alem-2f90a27f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56031%3A%20Missing%20Authorization%20in%20Yulio%20Aleman%20Jimenez%20Smart%20Shopify%20Product&amp;severity=null&amp;id=69cd75bae6bfc5ba1df07126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56067-missing-authorization-in-azzaroco-w-36abe609</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56067%3A%20Missing%20Authorization%20in%20azzaroco%20WP%20SuperBackup&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df0744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56071-incorrect-privilege-assignment-in-m-b9a1b2d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56071%3A%20Incorrect%20Privilege%20Assignment%20in%20mikeleembruggen%20Simple%20Dashboard&amp;severity=null&amp;id=69cd75c1e6bfc5ba1df07456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56205-incorrect-privilege-assignment-in-s-cb57e5a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56205%3A%20Incorrect%20Privilege%20Assignment%20in%20SunnyKai%20AI%20Magic&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56209-improper-neutralization-of-input-du-e40bba24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeventhQueen%20Kleo&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56210-improper-neutralization-of-input-du-dfafb7e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56221-improper-neutralization-of-input-du-8e73c90e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56221%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elicus%20WPMozo%20Addons%20Lite%20for%20Elementor&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56223-improper-neutralization-of-input-du-0c5c9581</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56223%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20Gulri%20Slider&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df0796c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56226-improper-neutralization-of-input-du-74738b01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56226%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56228-improper-neutralization-of-input-du-5cfa778a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Wishlist%20for%20WooCommerce&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56231-improper-neutralization-of-input-du-a4fd56f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Debuggers%20Studio%20SaasPricing&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56233-improper-neutralization-of-input-du-f5d5556b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kinhelios%20KinTPV%20WooConnect&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56234-missing-authorization-in-vowelweb-v-a2b8cdf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56234%3A%20Missing%20Authorization%20in%20vowelweb%20VW%20Automobile%20Lite&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56227-missing-authorization-in-wp-royal-r-72f19af9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56227%3A%20Missing%20Authorization%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56225-missing-authorization-in-leap13-pre-24d77ad7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56225%3A%20Missing%20Authorization%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd75c6e6bfc5ba1df079f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56219-missing-authorization-in-marketing--5546a714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56219%3A%20Missing%20Authorization%20in%20Marketing%20Fire%20Widget%20Options&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56217-missing-authorization-in-shahjada-d-ffd12e50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56217%3A%20Missing%20Authorization%20in%20Shahjada%20Download%20Manager&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df0795a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56215-missing-authorization-in-dbar-produ-81d09800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56215%3A%20Missing%20Authorization%20in%20DBAR%20Productions%20Member%20Directory%20and%20Contact%20Form&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56235-improper-neutralization-of-input-du-1e5666a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vicky%20Kumar%20Coupon&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56256-improper-neutralization-of-input-du-cc0b8ae6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56256%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andy%20Fragen%20Embed%20PDF%20Viewer&amp;severity=null&amp;id=69cd75cae6bfc5ba1df07b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56265-improper-neutralization-of-input-du-01e64d3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweb%20WooCommerce%20PDF%20Vouchers&amp;severity=null&amp;id=69cd75cbe6bfc5ba1df07bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56218-cross-site-request-forgery-csrf-in--fcd1e86c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56218%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sevenspark%20Contact%20Form%207%20%E2%80%93%20Dynamic%20Text%20Extension&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df0795d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56222-cross-site-request-forgery-csrf-in--04e6a145</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56222%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CodeBard%20CodeBard%20Help%20Desk&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56232-cross-site-request-forgery-csrf-in--ef466dbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56232%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alex%20Volkov%20WP%20Nice%20Loader&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56220-incorrect-privilege-assignment-in-s-77b14dbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56220%3A%20Incorrect%20Privilege%20Assignment%20in%20sslplugins%20SSL%20Wireless%20SMS%20Notification&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56212-improper-neutralization-of-special--8728bad0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56212%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56211-missing-authorization-in-deluxethem-51db3a5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56211%3A%20Missing%20Authorization%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df078fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56213-path-traversal-in-arraytics-eventin-b5578946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56213%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Arraytics%20Eventin&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df07902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56214-path-traversal-in-deluxethemes-user-8e65362a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56214%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd75c3e6bfc5ba1df07905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56216-improper-control-of-filename-for-in-3e0508ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56216%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=null&amp;id=69cd75c4e6bfc5ba1df07957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56230-improper-control-of-filename-for-in-13fd04de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56230%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Maidul%20Dynamic%20Product%20Category%20Grid%2C%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=69cd75c7e6bfc5ba1df07a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45497-incorrect-permission-assignment-for-485f4856</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45497%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&amp;severity=high&amp;id=68467fab71f4d251b582404b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-31-2e6e83</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-31&amp;severity=medium&amp;id=682c7dc4e8347ec82d2e6e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-31-f128ab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13051-cwe-122-heap-based-buffer-overflow--ba4a8d15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=699f6e4db7ef31ef0b59c8a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13050-cwe-122-heap-based-buffer-overflow--833b8d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13050%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Graphite&amp;severity=high&amp;id=699f6e4db7ef31ef0b59c8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13049-cwe-843-access-of-resource-using-in-ab087255</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13049%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13048-cwe-787-out-of-bounds-write-in-ashl-ca13f8de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13048%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13047-cwe-843-access-of-resource-using-in-301e7e6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13047%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13046-cwe-787-out-of-bounds-write-in-ashl-d787f626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13046%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13045-cwe-121-stack-based-buffer-overflow-ad5bf27c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13045%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13044-cwe-787-out-of-bounds-write-in-ashl-0bab3dd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13044%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Ashlar-Vellum%20Cobalt&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12753-cwe-59-improper-link-resolution-bef-db4fdeb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12753%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Foxit%20PDF%20Reader&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12752-cwe-119-improper-restriction-of-ope-40d0a799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12752%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12751-cwe-125-out-of-bounds-read-in-foxit-2edbc509</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12751%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13043-cwe-59-improper-link-resolution-bef-59dc9be6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13043%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6e4cb7ef31ef0b59c7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11946-cwe-319-cleartext-transmission-of-s-e1d8a95f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11946%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20iXsystems%20TrueNAS%20CORE&amp;severity=low&amp;id=699f6e28b7ef31ef0b596f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11944-cwe-22-improper-limitation-of-a-pat-54461056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11944%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iXsystems%20TrueNAS%20CORE&amp;severity=high&amp;id=699f6e28b7ef31ef0b596f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12836-cwe-843-access-of-resource-using-in-0a030d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12836%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Delta%20Electronics%20DRASimuCAD&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12835-cwe-787-out-of-bounds-write-in-delt-7750d26c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12835%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20DRASimuCAD&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12834-cwe-843-access-of-resource-using-in-0e50ef57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12834%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Delta%20Electronics%20DRASimuCAD&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46542-cwe-89-improper-neutralization-of-s-cffc9308</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46542%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Veritas%20Data%20Insight&amp;severity=medium&amp;id=68f25a599c34d0947f29dfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-30-2e50df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-30&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e50df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-30-f123c0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f123c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56756-vulnerability-in-linux-linux-bde750</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56755-vulnerability-in-linux-linux-bde726</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56754-vulnerability-in-linux-linux-bde71e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56753-vulnerability-in-linux-linux-bde71a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56752-vulnerability-in-linux-linux-bde716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56751-vulnerability-in-linux-linux-bde712</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56750-vulnerability-in-linux-linux-bde703</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56749-vulnerability-in-linux-linux-bde6fb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56748-vulnerability-in-linux-linux-bde6f3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56747-vulnerability-in-linux-linux-bde6ed</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56746-vulnerability-in-linux-linux-bde6dc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56745-vulnerability-in-linux-linux-bde6bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56744-vulnerability-in-linux-linux-bdd18c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56743-vulnerability-in-linux-linux-bde6bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56742-vulnerability-in-linux-linux-bde6b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56740-vulnerability-in-linux-linux-bde6b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56739-vulnerability-in-linux-linux-bde6a2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56730-vulnerability-in-linux-linux-bde69e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56729-vulnerability-in-linux-linux-bde69a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56728-vulnerability-in-linux-linux-bde696</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56727-vulnerability-in-linux-linux-bde685</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56726-vulnerability-in-linux-linux-bde67b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56725-vulnerability-in-linux-linux-bde65e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56724-vulnerability-in-linux-linux-bde65a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56723-vulnerability-in-linux-linux-bde656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56722-vulnerability-in-linux-linux-bde654</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56721-vulnerability-in-linux-linux-bde63c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56720-vulnerability-in-linux-linux-bde634</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56719-vulnerability-in-linux-linux-bdd188</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56718-vulnerability-in-linux-linux-bde62c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56717-vulnerability-in-linux-linux-bdd184</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56716-vulnerability-in-linux-linux-bde626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56715-vulnerability-in-linux-linux-bde622</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56714-vulnerability-in-linux-linux-bde61a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56713-vulnerability-in-linux-linux-bde5f2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56712-vulnerability-in-linux-linux-bde5ee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56711-vulnerability-in-linux-linux-bde5ea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56710-vulnerability-in-linux-linux-bde5e6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56709-vulnerability-in-linux-linux-bde5e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12238-cwe-94-improper-control-of-generati-4747d499</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12238%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=699f6e32b7ef31ef0b5979d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56738-cwe-208-observable-timing-discrepan-73461fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56738%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20GNU%20GRUB2&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56737-cwe-122-heap-based-buffer-overflow--f45b0109</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56737%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20GNU%20GRUB2&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-29-2e4d2b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-29&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e4d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-29-f1207b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f1207b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56708-vulnerability-in-linux-linux-bde5de</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56707-vulnerability-in-linux-linux-bde5cd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56706-vulnerability-in-linux-linux-bde5c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56705-vulnerability-in-linux-linux-bde5bd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56704-vulnerability-in-linux-linux-bde5b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56703-vulnerability-in-linux-linux-bde5a0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56702-vulnerability-in-linux-linux-bde593</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56701-vulnerability-in-linux-linux-bde58f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56700-vulnerability-in-linux-linux-bde582</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56699-vulnerability-in-linux-linux-bde57e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56698-vulnerability-in-linux-linux-bde57a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56697-vulnerability-in-linux-linux-bde576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56696-vulnerability-in-linux-linux-bde572</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56695-vulnerability-in-linux-linux-bde56e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56694-vulnerability-in-linux-linux-bdd160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56693-vulnerability-in-linux-linux-bde56a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56692-vulnerability-in-linux-linux-bde54d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56691-vulnerability-in-linux-linux-bde549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56690-vulnerability-in-linux-linux-bdd15c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd15c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56689-vulnerability-in-linux-linux-bde545</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56688-vulnerability-in-linux-linux-bde53f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56687-vulnerability-in-linux-linux-bde53d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56685-vulnerability-in-linux-linux-bde539</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56684-vulnerability-in-linux-linux-bde537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56683-vulnerability-in-linux-linux-bdd154</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56682-vulnerability-in-linux-linux-bde535</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56681-vulnerability-in-linux-linux-bde533</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56680-vulnerability-in-linux-linux-bde526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56679-vulnerability-in-linux-linux-bde504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56678-vulnerability-in-linux-linux-bde500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56677-vulnerability-in-linux-linux-bde4fc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56676-vulnerability-in-linux-linux-bde4f8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-28-2e4838</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-28&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e4838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-28-f130ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f130ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12856-cwe-78-improper-neutralization-of-s-0b2870dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12856%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Four-Faith%20F3x24&amp;severity=high&amp;id=6921acbf8e780dcd644b652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12987-os-command-injection-in-draytek-vigor2960-aeb8ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12987%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor2960&amp;severity=medium&amp;id=682cd0f81484d88663aeb8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12986-os-command-injection-in-draytek-vigor2960-aebab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12986%3A%20OS%20Command%20Injection%20in%20DrayTek%20Vigor2960&amp;severity=medium&amp;id=682cd0f91484d88663aebab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56675-vulnerability-in-linux-linux-bde4f4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56674-vulnerability-in-linux-linux-bde4f0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56673-vulnerability-in-linux-linux-bde4ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56672-vulnerability-in-linux-linux-bde4e8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56671-vulnerability-in-linux-linux-bde4e4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56670-vulnerability-in-linux-linux-bde4e0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56669-vulnerability-in-linux-linux-bde4be</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56668-vulnerability-in-linux-linux-bde4b8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56667-vulnerability-in-linux-linux-bde4b6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56666-vulnerability-in-linux-linux-bde4b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56665-vulnerability-in-linux-linux-bdd14c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56664-vulnerability-in-linux-linux-bde4b0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56663-vulnerability-in-linux-linux-bdd148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56662-vulnerability-in-linux-linux-bdd144</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56661-vulnerability-in-linux-linux-bde4a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56660-vulnerability-in-linux-linux-bde49d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56659-vulnerability-in-linux-linux-bde497</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56658-vulnerability-in-linux-linux-bdd133</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56657-vulnerability-in-linux-linux-bde493</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56656-vulnerability-in-linux-linux-bde48f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56655-vulnerability-in-linux-linux-bdd12b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56654-vulnerability-in-linux-linux-bdd123</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56653-vulnerability-in-linux-linux-bde472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56652-vulnerability-in-linux-linux-bde46e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56651-vulnerability-in-linux-linux-bdd11f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56650-vulnerability-in-linux-linux-bde46a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56649-vulnerability-in-linux-linux-bde466</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56648-vulnerability-in-linux-linux-bdd0ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56647-vulnerability-in-linux-linux-bde464</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56646-vulnerability-in-linux-linux-bde455</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56645-vulnerability-in-linux-linux-bde451</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56644-vulnerability-in-linux-linux-bdd0f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56643-vulnerability-in-linux-linux-bde44d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9822c4522896dcbde44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56642-vulnerability-in-linux-linux-bdd0f1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56641-vulnerability-in-linux-linux-bde449</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56640-vulnerability-in-linux-linux-bde43c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56639-vulnerability-in-linux-linux-bde41b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56638-vulnerability-in-linux-linux-bde415</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56637-vulnerability-in-linux-linux-bde411</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56636-vulnerability-in-linux-linux-bde40d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde40d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56635-vulnerability-in-linux-linux-bde3fe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56634-vulnerability-in-linux-linux-bde3f8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56633-vulnerability-in-linux-linux-bde3f4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56632-vulnerability-in-linux-linux-bde3ec</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56631-vulnerability-in-linux-linux-bdd0eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56630-vulnerability-in-linux-linux-bde3e8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56629-vulnerability-in-linux-linux-bde3e4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56628-vulnerability-in-linux-linux-bde3c2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56627-vulnerability-in-linux-linux-bde3be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56626-vulnerability-in-linux-linux-bde3ba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56625-vulnerability-in-linux-linux-bde3b6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56624-vulnerability-in-linux-linux-bde3b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56623-vulnerability-in-linux-linux-aec086</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56622-vulnerability-in-linux-linux-bde3a5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56621-vulnerability-in-linux-linux-bde3a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56620-vulnerability-in-linux-linux-bde39d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56619-vulnerability-in-linux-linux-bde399</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56618-vulnerability-in-linux-linux-bdf3cc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56617-vulnerability-in-linux-linux-bdf3c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56616-vulnerability-in-linux-linux-bdf3c4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56615-vulnerability-in-linux-linux-bdf3c0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56614-vulnerability-in-linux-linux-bdf3bc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56614%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9823c4522896dcbdf3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56613-vulnerability-in-linux-linux-bdf3b8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56612-vulnerability-in-linux-linux-bdf3b2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56611-vulnerability-in-linux-linux-bdf3ac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56610-vulnerability-in-linux-linux-bdf39b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56609-vulnerability-in-linux-linux-bdf397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56608-vulnerability-in-linux-linux-bdf393</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56607-vulnerability-in-linux-linux-bdf38f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56606-vulnerability-in-linux-linux-bdf38b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56605-vulnerability-in-linux-linux-bdf37e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56604-vulnerability-in-linux-linux-bdf37a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56603-vulnerability-in-linux-linux-bdf376</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56602-vulnerability-in-linux-linux-bdf372</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56601-vulnerability-in-linux-linux-aec084</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56600-vulnerability-in-linux-linux-aec082</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56599-vulnerability-in-linux-linux-bdf36e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56598-vulnerability-in-linux-linux-bdf352</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56597-vulnerability-in-linux-linux-bdf34e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56596-vulnerability-in-linux-linux-bdf34a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56595-vulnerability-in-linux-linux-bdf346</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56594-vulnerability-in-linux-linux-bdf342</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56593-vulnerability-in-linux-linux-bdf33e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56592-vulnerability-in-linux-linux-bdf33a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56591-vulnerability-in-linux-linux-bdf336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56590-vulnerability-in-linux-linux-bdf332</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56589-vulnerability-in-linux-linux-bdf32e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56588-vulnerability-in-linux-linux-bdf31b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56587-vulnerability-in-linux-linux-bdf317</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56586-vulnerability-in-linux-linux-bdf313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56585-vulnerability-in-linux-linux-bdf306</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56584-vulnerability-in-linux-linux-bdf302</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56583-vulnerability-in-linux-linux-bdd0da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56582-vulnerability-in-linux-linux-bdf2fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56581-vulnerability-in-linux-linux-bdf2fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56580-vulnerability-in-linux-linux-bdf2f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56579-vulnerability-in-linux-linux-bdf2f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56579%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56578-vulnerability-in-linux-linux-bdf2ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56577-vulnerability-in-linux-linux-bdf2ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56576-vulnerability-in-linux-linux-bdf2ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56575-vulnerability-in-linux-linux-bdf2c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56574-vulnerability-in-linux-linux-bdf2ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56574%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56573-vulnerability-in-linux-linux-bdf2b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56572-vulnerability-in-linux-linux-bdf2b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9823c4522896dcbdf2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56570-vulnerability-in-linux-linux-bdf2a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56569-vulnerability-in-linux-linux-bdf299</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56568-vulnerability-in-linux-linux-bdf295</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56567-vulnerability-in-linux-linux-bdf291</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56566-vulnerability-in-linux-linux-bdf267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56565-vulnerability-in-linux-linux-bdf261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56564-vulnerability-in-linux-linux-bdf25d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56563-vulnerability-in-linux-linux-bdf255</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56562-vulnerability-in-linux-linux-bdf251</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56561-vulnerability-in-linux-linux-bdd0d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56560-vulnerability-in-linux-linux-bdf24d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56559-vulnerability-in-linux-linux-bdf240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56558-vulnerability-in-linux-linux-bdf231</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56558%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56557-vulnerability-in-linux-linux-bdf229</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56556-vulnerability-in-linux-linux-bdf221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56556%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56555-vulnerability-in-linux-linux-bdf200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56555%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56554-vulnerability-in-linux-linux-bdf1fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56554%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56553-vulnerability-in-linux-linux-bdf1f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56553%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9823c4522896dcbdf1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56552-vulnerability-in-linux-linux-bdf1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56552%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56551-vulnerability-in-linux-linux-bdf1e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56551%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56550-vulnerability-in-linux-linux-bdd0d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56550%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56549-vulnerability-in-linux-linux-bdf1e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56549%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56548-vulnerability-in-linux-linux-bdd0c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56548%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56547-vulnerability-in-linux-linux-bdf1df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56547%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56546-vulnerability-in-linux-linux-bdf1d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56545-vulnerability-in-linux-linux-bdf1c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56545%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56544-vulnerability-in-linux-linux-bdf1c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56544%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56543-vulnerability-in-linux-linux-bdf1a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56543%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56542-vulnerability-in-linux-linux-bdf1a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56542%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56541-vulnerability-in-linux-linux-bdf19d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56541%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56540-vulnerability-in-linux-linux-bdf199</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56540%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56539-vulnerability-in-linux-linux-bdf195</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56539%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56538-vulnerability-in-linux-linux-bdf188</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56538%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56537-vulnerability-in-linux-linux-bdf186</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56537%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56536-vulnerability-in-linux-linux-bdf177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56536%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56535-vulnerability-in-linux-linux-bdf16f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56535%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56534-vulnerability-in-linux-linux-bdf167</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56534%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56533-vulnerability-in-linux-linux-bdf146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56533%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56532-vulnerability-in-linux-linux-bdf142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56532%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56531-vulnerability-in-linux-linux-bdf13e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56531%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53239-vulnerability-in-linux-linux-bdf06d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53238-vulnerability-in-linux-linux-bdf069</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53237-vulnerability-in-linux-linux-bdd094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53236-vulnerability-in-linux-linux-bdf065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53235-vulnerability-in-linux-linux-bdf061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53234-vulnerability-in-linux-linux-bdd090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53233-vulnerability-in-linux-linux-bdf052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53232-vulnerability-in-linux-linux-bdf04a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53231-vulnerability-in-linux-linux-bdf026</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53230-vulnerability-in-linux-linux-bdf01e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53229-vulnerability-in-linux-linux-bdf016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53228-vulnerability-in-linux-linux-bdf00e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53228%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53227-vulnerability-in-linux-linux-bdf006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53226-vulnerability-in-linux-linux-bdd08c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53226%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53225-vulnerability-in-linux-linux-bdf002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53224-vulnerability-in-linux-linux-bdefe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdefe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53223-vulnerability-in-linux-linux-bdefde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdefde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53222-vulnerability-in-linux-linux-bdefd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53222%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdefd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53221-vulnerability-in-linux-linux-bdefca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53221%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdefca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53220-vulnerability-in-linux-linux-bdefa2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53220%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdefa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53219-vulnerability-in-linux-linux-bdef91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53219%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53218-vulnerability-in-linux-linux-bdef89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53218%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53217-vulnerability-in-linux-linux-bdef81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53217%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53216-vulnerability-in-linux-linux-bdef79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53216%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53215-vulnerability-in-linux-linux-bdef71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53215%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53214-vulnerability-in-linux-linux-bdef62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53214%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53213-vulnerability-in-linux-linux-bdef5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53213%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53212-vulnerability-in-linux-linux-bdef52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53212%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53211-vulnerability-in-linux-linux-bdef4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53211%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53210-vulnerability-in-linux-linux-bdef33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53210%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53209-vulnerability-in-linux-linux-bdd088</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53209%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53208-vulnerability-in-linux-linux-bdef2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53208%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53207-vulnerability-in-linux-linux-bdd084</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53207%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53206-vulnerability-in-linux-linux-bdd077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53206%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53205-vulnerability-in-linux-linux-bdef22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53205%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53204-vulnerability-in-linux-linux-bdef15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53204%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53203-vulnerability-in-linux-linux-bdef11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53203%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdef11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53202-vulnerability-in-linux-linux-bdef0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53202%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53201-vulnerability-in-linux-linux-bdd066</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53201%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53200-vulnerability-in-linux-linux-bdef09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53200%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53199-vulnerability-in-linux-linux-bdef03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53199%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdef03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53198-vulnerability-in-linux-linux-bdeeff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53198%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53197-vulnerability-in-linux-linux-bdeefb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53197%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53196-vulnerability-in-linux-linux-bdeee2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53196%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53195-vulnerability-in-linux-linux-bdeede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53195%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53194-vulnerability-in-linux-linux-bdeeda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53194%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53193-vulnerability-in-linux-linux-bdeed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53192-vulnerability-in-linux-linux-bdeed2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53192%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53191-vulnerability-in-linux-linux-bdeece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53190-vulnerability-in-linux-linux-bdeeca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53190%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53189-vulnerability-in-linux-linux-bdeeb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53189%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53188-vulnerability-in-linux-linux-bdeea8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53188%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdeea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53187-vulnerability-in-linux-linux-bdee9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53187%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53186-vulnerability-in-linux-linux-bdd05e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53186%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53185-vulnerability-in-linux-linux-bdee87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53185%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53184-vulnerability-in-linux-linux-bdee83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53184%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53183-vulnerability-in-linux-linux-bdee7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53183%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53182-vulnerability-in-linux-linux-bdee7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53182%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53181-vulnerability-in-linux-linux-bdee77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53181%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53180-vulnerability-in-linux-linux-bdee73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53180%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53179-vulnerability-in-linux-linux-bdee64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53179%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53178-vulnerability-in-linux-linux-bdee5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53178%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53177-vulnerability-in-linux-linux-bdee54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53177%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53176-vulnerability-in-linux-linux-bdee43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53176%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53175-vulnerability-in-linux-linux-bdee2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53175%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53174-vulnerability-in-linux-linux-bdee26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53174%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53173-vulnerability-in-linux-linux-bdee1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53173%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53172-vulnerability-in-linux-linux-bdee1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53172%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdee1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53171-vulnerability-in-linux-linux-bdee09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53171%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53170-vulnerability-in-linux-linux-bdee01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53170%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdee01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53169-vulnerability-in-linux-linux-bdd056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53169%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53168-vulnerability-in-linux-linux-bdedf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53168%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53167-vulnerability-in-linux-linux-bdedea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53167%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53166-vulnerability-in-linux-linux-bdede2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53166%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53165-vulnerability-in-linux-linux-bdedda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53165%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49034-vulnerability-in-linux-linux-be69b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982fc4522896dcbe69b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53164-vulnerability-in-linux-linux-bdedc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53164%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3393-cwe-754-improper-check-for-unusual-o-f11207db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3393%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=68f7d9b3247d717aace26a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9774-improper-neutralization-of-escape-me-e7b311c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9774%3A%20Improper%20Neutralization%20of%20Escape%2C%20Meta%2C%20or%20Control%20Sequences&amp;severity=medium&amp;id=699f6b5fb7ef31ef0b554bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39025-na-e17c52d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39025%3A%20n%2Fa&amp;severity=high&amp;id=699f6c81b7ef31ef0b565b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54775-na-bdf1198d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54775%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54774-na-18b5f1dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54774%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55adc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54454-na-829134cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54454%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55acb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54453-na-3ac5e474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54453%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55acac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54452-na-9d1c2833</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54452%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55aca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54451-na-c2900097</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54451%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55aca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54450-na-779b3843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54450%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc4b7ef31ef0b55ac4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53476-na-37e9909a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53476%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50944-na-89791874</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50944%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba2b7ef31ef0b557661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50717-na-c294c54c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50717%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b55741a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50716-na-977e0b1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50716%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b557416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50715-na-5df8748b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50715%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b557412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50714-na-13c00327</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50714%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b55740e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50713-na-9a67b25a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50713%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b55740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56527-cwe-79-improper-neutralization-of-i-ff48337e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56527%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908557fff0e30cee2395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56522-na-in-tecnick-tcpdf-1ac198de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56522%3A%20n%2Fa%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908557fff0e30cee23956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56520-na-in-tecnick-tcpdf-7ebc4280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56520%3A%20n%2Fa%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908557fff0e30cee2394e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56519-na-in-tecnick-tcpdf-3ac2b4e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56519%3A%20n%2Fa%20in%20tecnick%20tcpdf&amp;severity=high&amp;id=690908537fff0e30cee23933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-27-2e497b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-27&amp;severity=medium&amp;id=682c7dc3e8347ec82d2e497b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-27-f127f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12950-sql-injection-in-code-projects-travel-management-system-aeb886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12950%3A%20SQL%20Injection%20in%20code-projects%20Travel%20Management%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56433-cwe-1188-initialization-of-a-resour-24812db8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56433%3A%20CWE-1188%20Initialization%20of%20a%20Resource%20with%20an%20Insecure%20Default%20in%20shadow-maint%20shadow-utils&amp;severity=low&amp;id=699f6bd4b7ef31ef0b55b42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54907-na-53869259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54907%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55ae4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-26-2ea936</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-26&amp;severity=medium&amp;id=682c7dc4e8347ec82d2ea936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-26-f12a08</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47102-cwe-863-incorrect-authorization-in--674783c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47102%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20AIX&amp;severity=medium&amp;id=68e0f3c5b66c7f7acdd3ea64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10862-cwe-89-improper-neutralization-of-s-760918d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10862%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Form%20Builder%20%E2%80%93%20Contact%20forms%20and%20much%20more&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12335-cwe-639-authorization-bypass-throug-1ce9949e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12335%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themefusion%20Avada%20(Fusion)%20Builder&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11281-cwe-862-missing-authorization-in-we-702e4c16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11281%3A%20CWE-862%20Missing%20Authorization%20in%20Webkul%20WooCommerce%20Point%20of%20Sale&amp;severity=critical&amp;id=699f6e0bb7ef31ef0b594307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12428-cwe-89-improper-neutralization-of-s-4a97fb46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12428%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20peterschulznl%20WP%20Data%20Access%20%E2%80%93%20App%2C%20Table%2C%20Form%20and%20Chart%20Builder%20plugin&amp;severity=high&amp;id=699f6e3bb7ef31ef0b598985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12636-cwe-352-cross-site-request-forgery--eea6ecc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12636%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wplegalpages%20Privacy%20Policy%20Generator%2C%20Terms%20%26%20Conditions%20Generator%20WordPress%20Plugin%20%3A%20WP%20Legal%20Pages&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12190-cwe-862-missing-authorization-in-bi-5a9aef0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12190%3A%20CWE-862%20Missing%20Authorization%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=medium&amp;id=699f6e31b7ef31ef0b59782d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12272-cwe-98-improper-control-of-filename-12e5a246</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12272%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Elementor%20Widgets%20%7C%20Create%20Travel%20Booking%20Website%20Using%20WordPress%20and%20Elementor&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12413-cwe-862-missing-authorization-in-we-b55940fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12413%3A%20CWE-862%20Missing%20Authorization%20in%20webwizardsdev%20MarketKing%20%E2%80%94%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12032-cwe-89-improper-neutralization-of-s-79a84afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12032%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themefic%20Tourfic%20%E2%80%93%20Ultimate%20Hotel%20Booking%2C%20Travel%20Booking%20%26%20Apartment%20Booking%20WordPress%20Plugin%20%7C%20WooCommerce%20Booking&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56430-cwe-476-null-pointer-dereference-in-openfhe-openfhe-befabe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56430%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenFHE%20OpenFHE&amp;severity=medium&amp;id=682d983ec4522896dcbefabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56431-n-a-in-n-a-bd8e61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56431%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd8e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-25-2eab77</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-25&amp;severity=medium&amp;id=682c7dc4e8347ec82d2eab77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-25-f127bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12746-cwe-89-improper-neutralization-of-s-2b4b1cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12746%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amazon%20Amazon%20Redshift%20ODBC%20Driver&amp;severity=high&amp;id=68ee9df131414aa8fc5b888f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12745-cwe-89-improper-neutralization-of-s-329b03f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12745%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amazon%20Amazon%20Redshift%20Python%20Connector&amp;severity=high&amp;id=68ee9ff531414aa8fc5df08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12744-cwe-89-improper-neutralization-of-s-5dd14b8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12744%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amazon%20Amazon%20Redshift%20JDBC%20Driver&amp;severity=high&amp;id=68ee9ff531414aa8fc5df089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53163-vulnerability-in-linux-linux-bdedbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53162-vulnerability-in-linux-linux-bdedb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53161-vulnerability-in-linux-linux-bdedae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdedae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53160-vulnerability-in-linux-linux-bdedaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdedaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53158-vulnerability-in-linux-linux-bdeda6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53157-vulnerability-in-linux-linux-bdeda2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdeda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53156-vulnerability-in-linux-linux-bded91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53155-vulnerability-in-linux-linux-bded89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53154-vulnerability-in-linux-linux-bded81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53153-vulnerability-in-linux-linux-bded6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53152-vulnerability-in-linux-linux-bded68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53151-vulnerability-in-linux-linux-bded64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53150-vulnerability-in-linux-linux-bded60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53149-vulnerability-in-linux-linux-bded5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53148-vulnerability-in-linux-linux-bded58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53147-vulnerability-in-linux-linux-bded54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53146-vulnerability-in-linux-linux-bded47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53145-vulnerability-in-linux-linux-bded36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbded36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10856-cwe-89-improper-neutralization-of-s-1e9fe17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10856%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11726-cwe-89-improper-neutralization-of-s-ddc82510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11726%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20Appointment%20Booking%20Calendar%20Plugin%20and%20Scheduling%20Plugin%20%E2%80%93%20BookingPress&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10584-cwe-434-unrestricted-upload-of-file-2fdd98d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10584%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20designinvento%20DirectoryPress%20%E2%80%93%20Business%20Directory%20And%20Classified%20Ad%20Listing&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59181f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12268-cwe-79-improper-neutralization-of-i-091dc120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Blocks%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53241-vulnerability-in-linux-linux-bdf075</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53240-vulnerability-in-linux-linux-bdd098</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12881-cwe-862-missing-authorization-in-gi-fc6ba954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12881%3A%20CWE-862%20Missing%20Authorization%20in%20giuse%20PlugVersions%20%E2%80%93%20Easily%20rollback%20to%20previous%20versions%20of%20your%20plugins&amp;severity=high&amp;id=699f6e4bb7ef31ef0b59c712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12850-cwe-22-improper-limitation-of-a-pat-c5f50ac2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12850%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sminozzi%20Database%20Backup%20and%20check%20Tables%20Automated%20With%20Scheduler%202024&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12031-cwe-89-improper-neutralization-of-s-dc9421ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12031%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeTides%20Advanced%20Floating%20Content&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12103-cwe-639-authorization-bypass-throug-a49b7ed2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12103%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20giuse%20Content%20No%20Cache%20%7C%20Serve%20uncached%20partial%20content%20even%20when%20you%20add%20it%20to%20a%20page%20that%20is%20fully%20cached.&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8721-cwe-79-improper-neutralization-of-in-2a75be38</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8721%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20data443%20Tracking%20Code%20Manager&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12468-cwe-79-improper-neutralization-of-i-a6f15beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20WP%20Datepicker&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11896-cwe-79-improper-neutralization-of-i-311f0594</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flippercode%20Text%20Prompter%20%E2%80%93%20Unlimited%20chatgpt%20text%20prompts%20for%20openai%20tasks&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12814-cwe-79-improper-neutralization-of-i-8200de32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aerin%20Loan%20Comparison&amp;severity=medium&amp;id=699f6e48b7ef31ef0b59c4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41882-cwe-121-stack-based-buffer-overflow-7fe7da6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41882%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41885-cwe-547-use-of-hard-coded-security--38f3463b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41885%3A%20CWE-547%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41886-cwe-755-improper-handling-of-except-95832833</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41886%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12405-cwe-79-improper-neutralization-of-i-ea001e9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12405%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20Export%20Customers%20Data&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12100-cwe-79-improper-neutralization-of-i-6eb21f16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getalby%20Bitcoin%20Lightning%20Publisher%20for%20WordPress&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5973a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12622-cwe-79-improper-neutralization-of-i-ef0fa18e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptipsntricks%20WordPress%20Simple%20Shopping%20Cart&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12594-cwe-862-missing-authorization-in-zi-f5f5f7c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12594%3A%20CWE-862%20Missing%20Authorization%20in%20zia-imtiaz%20Custom%20Login%20Page%20Styler&amp;severity=high&amp;id=699f6e43b7ef31ef0b59bfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12210-cwe-862-missing-authorization-in-ty-d60f580e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12210%3A%20CWE-862%20Missing%20Authorization%20in%20tychesoftwares%20Print%20Invoice%20%26%20Delivery%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e32b7ef31ef0b59797e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11885-cwe-79-improper-neutralization-of-i-67cc642e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20NinjaTeam%20Chat%20for%20Telegram&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12034-cwe-340-generation-of-predictable-n-4d56d289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12034%3A%20CWE-340%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20webfactory%20Advanced%20Google%20reCAPTCHA&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5971ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41887-cwe-22-improper-limitation-of-a-pat-c6b181c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41887%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Hanwha%20Vision%20Co.%2C%20Ltd.%20XRN-420S&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12617-cwe-862-missing-authorization-in-kk-0ae77bc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12617%3A%20CWE-862%20Missing%20Authorization%20in%20kkarpieszuk%20WC%20Price%20History%20for%20Omnibus&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12507-cwe-79-improper-neutralization-of-i-e44d469a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12507%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optio%20Optio%20Dentistry&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12518-cwe-79-improper-neutralization-of-i-da886c2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20denischerniatev%20ShMapper%20by%20Teplitsa&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12710-cwe-79-improper-neutralization-of-i-9f7a37ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marcelismus%20WP-Appbox&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12266-cwe-862-missing-authorization-in-el-aede92ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12266%3A%20CWE-862%20Missing%20Authorization%20in%20elextensions%20ELEX%20WooCommerce%20Dynamic%20Pricing%20and%20Discounts&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12582-authentication-bypass-by-primary-weakness-aebac4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12582%3A%20Authentication%20Bypass%20by%20Primary%20Weakness&amp;severity=high&amp;id=682cd0f91484d88663aebac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47515-unix-symbolic-link-symlink-followin-e8f77f1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47515%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following&amp;severity=high&amp;id=699f6d08b7ef31ef0b56d5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9427-improper-encoding-or-escaping-of-out-5986abeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9427%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-24-2eae63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-24&amp;severity=medium&amp;id=682c7dc4e8347ec82d2eae63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-24-f122e7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f122e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56326-cwe-1336-improper-neutralization-of-f2446132</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56326%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20pallets%20jinja&amp;severity=medium&amp;id=690908537fff0e30cee23927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55539-cwe-327-in-acronis-acronis-cyber-pr-4585c20b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55539%3A%20CWE-327%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=low&amp;id=6840c579182aa0cae2c16b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11230-cwe-79-improper-neutralization-of-i-a1fc50f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11230%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Elementor%20(Formerly%20Elementor%20Header%20%26%20Footer%20Builder)&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-23-4400e1aa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-23&amp;severity=medium&amp;id=68367c96182aa0cae23194c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-23-f214be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-23&amp;severity=medium&amp;id=682acdc4bbaf20d303f214be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-23-f130e9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f130e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11852-cwe-862-missing-authorization-in-bd-b338ec94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11852%3A%20CWE-862%20Missing%20Authorization%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%2C%20Carousel%20and%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56375-cwe-191-integer-underflow-wrap-or-w-2d8e0277</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56375%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20nicmx%20fort-validator&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56378-na-5fee72cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56378%3A%20n%2Fa&amp;severity=medium&amp;id=690908537fff0e30cee2392d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-22-2ea759</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-22&amp;severity=medium&amp;id=682c7dc4e8347ec82d2ea759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-22-f13112</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51463-cwe-918-server-side-request-forgery-2fadafb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51463%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=69092eea35043901e82cab3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51464-cwe-288-authentication-bypass-using-496525a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51464%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel&amp;severity=medium&amp;id=69092eea35043901e82cab3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12875-cwe-73-external-control-of-file-nam-ba658b78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12875%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6e4bb7ef31ef0b59c702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12591-cwe-79-improper-neutralization-of-i-a4f8a052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wbolt%20MagicPost%20%E2%80%93%20WordPress%E6%96%87%E7%AB%A0%E7%AE%A1%E7%90%86%E5%8A%9F%E8%83%BD%E5%A2%9E%E5%BC%BA%E6%8F%92%E4%BB%B6&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10453-cwe-79-improper-neutralization-of-i-3733e345</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20Than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6df4b7ef31ef0b5914c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11688-cwe-79-improper-neutralization-of-i-2cc2dc79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20van-abel%20LaTeX2HTML&amp;severity=medium&amp;id=699f6e19b7ef31ef0b595256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11722-cwe-89-improper-neutralization-of-s-12c171f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11722%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12408-cwe-79-improper-neutralization-of-i-be544bd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpseahorse%20WP%20on%20AWS&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12558-cwe-862-missing-authorization-in-pu-e3355edd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12558%3A%20CWE-862%20Missing%20Authorization%20in%20puckrobin%20WP%20BASE%20Booking%20of%20Appointments%2C%20Services%20and%20Events&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59be83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10797-cwe-639-authorization-bypass-throug-cb71580a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10797%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20solitweb%20Full%20Screen%20Menu%20for%20Elementor&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11808-cwe-79-improper-neutralization-of-i-0dee5848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pingmeter%20Pingmeter%20Uptime%20Monitoring&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12588-cwe-79-improper-neutralization-of-i-5df9e959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9545-cwe-79-improper-neutralization-of-in-70b0a9d1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9545%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11975-cwe-352-cross-site-request-forgery--8d8cdc14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11975%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20reactflow%20Reactflow%20Visitor%20Recording%20and%20Heatmaps&amp;severity=medium&amp;id=699f6e29b7ef31ef0b597003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11682-cwe-79-improper-neutralization-of-i-a66694f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moonheart%20G%20Web%20Pro%20Store%20Locator&amp;severity=medium&amp;id=699f6e18b7ef31ef0b59523d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11196-cwe-79-improper-neutralization-of-i-5c68cc54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11196%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tugbucket%20Multi-column%20Tag%20Map&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12697-cwe-79-improper-neutralization-of-i-529cd99f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmaster-1%20real.Kit&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12262-cwe-79-improper-neutralization-of-i-253d6632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12635-cwe-89-improper-neutralization-of-s-76e2fd75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12635%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fahadmahmood%20WP%20Docs&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11938-cwe-79-improper-neutralization-of-i-d6c8c286</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpswings%20One%20Click%20Upsell%20Funnel%20for%20WooCommerce%20%E2%80%93%20%20Funnel%20Builder%20for%20WordPress%2C%20Create%20WooCommerce%20Upsell%2C%20Post-Purchase%20Upsell%20%26%20Cross%20Sell%20Offers%20that%20Boost%20Sales%20%26%20Increase%20Profits%20with%20Sales%20Funnel%20Builder&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12721-cwe-502-deserialization-of-untruste-529d4f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12721%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webbuilder143%20Custom%20Product%20Tabs%20For%20WooCommerce&amp;severity=high&amp;id=699f6e46b7ef31ef0b59c2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12771-cwe-352-cross-site-request-forgery--4b51b2e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12771%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20implecode%20eCommerce%20Product%20Catalog%20Plugin%20for%20WordPress&amp;severity=high&amp;id=699f6e48b7ef31ef0b59c448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12066-cwe-73-external-control-of-file-nam-30bc68ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12066%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20smsaexpress%20SMSA%20Shipping(official)&amp;severity=high&amp;id=699f6e2db7ef31ef0b597375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11287-cwe-79-improper-neutralization-of-i-2bd2aac7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11287%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11977-cwe-94-improper-control-of-generati-c3c5aad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11977%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20collizo4sky%20kk%20Star%20Ratings%20%E2%80%93%20Rate%20Post%20%26%20Collect%20User%20Feedbacks&amp;severity=high&amp;id=699f6e29b7ef31ef0b597008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11349-cwe-288-authentication-bypass-using-d4a22556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11349%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20scriptsbundle%20AdForest&amp;severity=critical&amp;id=699f6e0fb7ef31ef0b5946cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-21-f12f5e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11811-cwe-79-improper-neutralization-of-i-702c9399</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20feedify%20Feedify%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59673d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12840-bd683e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12840&amp;severity=low&amp;id=682d9816c4522896dcbd683e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56337-cwe-367-time-of-check-time-of-use-t-6d46fd7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56337%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=690204553aaa02566521b568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12014-cwe-20-improper-input-validation-in-lleidanet-pki-esigna-aeb014</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12014%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Lleidanet%20PKI%20eSigna&amp;severity=low&amp;id=682cd0f71484d88663aeb014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11878-cwe-79-improper-neutralization-of-i-57b884ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gbsdeveloper%20Category%20Post%20Slider&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12506-cwe-79-improper-neutralization-of-i-77007fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magblogapi%20NACC%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11774-cwe-79-improper-neutralization-of-i-bb9d437d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20outdooractive%20Outdooractive%20Embed&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b59642d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11783-cwe-79-improper-neutralization-of-i-17ca58a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11783%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20financecalculatorwp%20Financial%20Calculator&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11806-cwe-79-improper-neutralization-of-i-f78e7af5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11806%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carlosfrancopkt1%20PKT1%20Centro%20de%20envios&amp;severity=medium&amp;id=699f6e20b7ef31ef0b59666a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11893-cwe-79-improper-neutralization-of-i-308039e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spoki%20Spoki%20%E2%80%93%20Chat%20Buttons%20and%20WooCommerce%20Notifications&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11331-cwe-79-improper-neutralization-of-i-848a5f49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11331%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e0db7ef31ef0b59450b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11784-cwe-79-improper-neutralization-of-i-92667a75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ticketsource%20Sell%20Tickets%20Online%20%E2%80%93%20TicketSource%20Ticket%20Shop&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9619-cwe-79-improper-neutralization-of-in-c07704bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20holithemes%20WP%20SHAPES&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11297-cwe-200-exposure-of-sensitive-infor-ea7193df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11297%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cyberlord92%20Page%20Restriction%20WordPress%20(WP)%20%E2%80%93%20Protect%20WP%20Pages%2FPost&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b594406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12509-cwe-79-improper-neutralization-of-i-a19fc89a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rluks%20Embed%20Twine&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11812-cwe-352-cross-site-request-forgery--a6590fca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11812%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20seopilot%20Wtyczka%20SeoPilot%20dla%20WP&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12571-cwe-98-improper-control-of-filename-dcc6c7d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12571%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20moaluko%20Store%20Locator%20for%20WordPress%20with%20Google%20Maps%20%E2%80%93%20LotsOfLocales&amp;severity=critical&amp;id=699f6e43b7ef31ef0b59bef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11411-cwe-79-improper-neutralization-of-i-90418d0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20socratous139%20Spotlightr&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11775-cwe-79-improper-neutralization-of-i-414db0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aasthasolutions%20Particle%20Background&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9503-cwe-284-improper-access-control-in-y-b9f8c8ed</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9503%3A%20CWE-284%20Improper%20Access%20Control%20in%20yasinedr%20Maintenance%20%26%20Coming%20Soon%20Redirect%20Animation&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21549-improper-input-validation-in-spatie-ef29ca2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21549%3A%20Improper%20Input%20Validation%20in%20spatie%2Fbrowsershot&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44298-an-app-may-be-able-to-access-inform-cb47bd56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44298%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7635043901e828b267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44293-a-user-may-be-able-to-view-sensitiv-9a50f156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44293%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44211-an-app-may-be-able-to-access-user-s-6eb7ae46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44211%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a3fe7723195e0fd273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44231-a-person-with-physical-access-to-a--48bed393</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44231%3A%20A%20person%20with%20physical%20access%20to%20a%20Mac%20may%20be%20able%20to%20bypass%20Login%20Window%20during%20a%20software%20update%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a5fe7723195e0fd3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44292-an-app-may-be-able-to-access-sensit-ed340ed6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44292%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44195-an-app-may-be-able-to-read-arbitrar-67a739a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44195%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a1fe7723195e0fd1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44223-an-attacker-with-physical-access-to-ca389ec7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44223%3A%20An%20attacker%20with%20physical%20access%20to%20a%20Mac%20may%20be%20able%20to%20view%20protected%20content%20from%20the%20Login%20Window%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42867-an-app-may-be-able-to-gain-root-pri-73301ec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42867%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20GarageBand&amp;severity=high&amp;id=690a554ca730e5a3d9d77d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11776-cwe-79-improper-neutralization-of-i-0fe377c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arothman%20PCRecruiter%20Extensions&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54538-a-remote-attacker-may-be-able-to-ca-ca1c3054</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54538%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb833e6bfc5ba1df6ee4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12831-cwe-863-incorrect-authorization-in--e7480ed5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12831%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Arista%20NG%20Firewall&amp;severity=medium&amp;id=699f6e49b7ef31ef0b59c598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12832-cwe-89-improper-neutralization-of-s-0547d6b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12832%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12830-cwe-22-improper-limitation-of-a-pat-9fc5f39a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12830%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12829-cwe-78-improper-neutralization-of-s-04658dd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12829%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Arista%20NG%20Firewall&amp;severity=high&amp;id=699f6e49b7ef31ef0b59c592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37758-na-79d7bf3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37758%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55509-na-27761b17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55509%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55471-na-0a1b5049</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55471%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b17b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55470-na-332d0185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55470%3A%20n%2Fa&amp;severity=high&amp;id=699f6bceb7ef31ef0b55b177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55342-na-bce61153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55342%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55341-na-6fc9ca66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55341%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55186-na-902b584b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55186%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-20-f12d0d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12111-cwe-77-improper-neutralization-of-s-32e0b055</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12111%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20OpenText%20Privileged%20Access%20Manager&amp;severity=high&amp;id=68e8048eba0e608b4faa7cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7139-cwe-787-out-of-bounds-write-in-silab-f03ca53f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7139%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20RS9116%20Bluetooth%20SDK&amp;severity=medium&amp;id=68371302182aa0cae24e8df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7138-cwe-617-reachable-assertion-in-silab-fbeafb39</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7138%3A%20CWE-617%20Reachable%20Assertion%20in%20silabs.com%20RS9116%20Bluetooth%20SDK&amp;severity=medium&amp;id=68371302182aa0cae24e8df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7137-cwe-787-out-of-bounds-write-in-silab-31515c10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7137%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20RS9116%20Bluetooth%20SDK&amp;severity=medium&amp;id=68371302182aa0cae24e8df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7005-cwe-757-selection-of-less-secure-alg-31e555f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7005%3A%20CWE-757%3A%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20Sciener%20TTLock%20App&amp;severity=high&amp;id=690a47466d939959c80222e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25131-improper-input-validation-f5ba9b27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25131%3A%20Improper%20Input%20Validation&amp;severity=high&amp;id=699f6d5fb7ef31ef0b570c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37962-improper-neutralization-of-input-du-f8005dfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37962%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agency%20Dominion%20Inc.%20Fusion&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12626-cwe-79-improper-neutralization-of-i-582f3527</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rubengc%20AutomatorWP%20%E2%80%93%20The%20%231%20automator%20plugin%20for%20no-code%20automation%20in%20WordPress&amp;severity=critical&amp;id=699f6e46b7ef31ef0b59c260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12331-cwe-862-missing-authorization-in-ni-8188a7ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12331%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11616-cwe-125-out-of-bounds-read-in-netsk-1aa033af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11616%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Netskope%20Inc.%20Endpoint%20DLP&amp;severity=medium&amp;id=68487f5c1b0bd07c3938d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12560-cwe-200-exposure-of-sensitive-infor-4367c46f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12560%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bplugins%20Button%20Block%20%E2%80%93%20Get%20fully%20customizable%20%26%20multi-functional%20buttons&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59beeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11768-cwe-285-improper-authorization-in-c-84485711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11768%3A%20CWE-285%20Improper%20Authorization%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11740-cwe-94-improper-control-of-generati-2f16088c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11740%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=699f6e1bb7ef31ef0b5955a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12121-cwe-918-server-side-request-forgery-254e8786</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12121%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20cyberlord92%20Broken%20Link%20Checker%20%7C%20Finder&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10548-cwe-200-exposure-of-sensitive-infor-ec36cf83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10548%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35141-cwe-250-execution-with-unnecessary--859c3c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35141%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=high&amp;id=69092624fe7723195e0b47b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55196-na-720551df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55196%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55082-na-89741141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55082%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55081-na-ff7ef29f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55081%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54984-na-c0964204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54984%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54983-na-c628e6f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54983%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54982-na-82c984a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54982%3A%20n%2Fa&amp;severity=null&amp;id=699f6bcab7ef31ef0b55af2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54790-na-9f42e346</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54790%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc6b7ef31ef0b55adc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54663-na-043898c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54663%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55acbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-19-f127b7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f127b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56145-cwe-94-improper-control-of-generati-9fe73915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56145%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20craftcms%20cms&amp;severity=critical&amp;id=6839b29a182aa0cae2b1bcf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12686-cwe-78-improper-neutralization-of-s-e59dcf8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12686%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support(RS)%20%26%20Privileged%20Remote%20Access(PRA)&amp;severity=medium&amp;id=68f7d9b0247d717aace268b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56047-improper-neutralization-of-special--6d07cc41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56047%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df0725e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56053-improper-neutralization-of-special--bb3567ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56053%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df0731e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56048-missing-authorization-in-vibethemes-568db5b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56048%3A%20Missing%20Authorization%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56050-unrestricted-upload-of-file-with-da-e1c58de0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56050%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56052-unrestricted-upload-of-file-with-da-97ee6a1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56052%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bee6bfc5ba1df07315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56054-unrestricted-upload-of-file-with-da-17f6a1fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56054%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56057-unrestricted-upload-of-file-with-da-8a7cfff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56057%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df0732a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54381-missing-authorization-in-dotstore-a-99d1f845</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54381%3A%20Missing%20Authorization%20in%20Dotstore%20Advance%20Menu%20Manager&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54383-incorrect-privilege-assignment-in-w-d7e18378</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54383%3A%20Incorrect%20Privilege%20Assignment%20in%20wpweb%20WooCommerce%20PDF%20Vouchers&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56049-path-traversal-in-vibethemes-wplms-987f8ef5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56049%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df07264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56055-path-traversal-in-vibethemes-wplms-22dc8d4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56055%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56051-improper-control-of-generation-of-c-238e4dc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56051%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20VibeThemes%20WPLMS&amp;severity=null&amp;id=69cd75bde6bfc5ba1df0726a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52485-missing-authorization-in-yudiz-solu-e8985bf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52485%3A%20Missing%20Authorization%20in%20Yudiz%20Solutions%20Ltd.%20WP%20Menu%20Image&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55997-missing-authorization-in-webchunky--67cf3ed7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55997%3A%20Missing%20Authorization%20in%20webchunky%20Order%20Delivery%20%26%20Pickup%20Location%20Date%20Time&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49677-improper-neutralization-of-input-du-a4bb9453</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49677%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20David%20Cramer%20Bootstrap%20Buttons&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51646-improper-neutralization-of-input-du-d4e09c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20saoshyant1994%20Saoshyant%20Element&amp;severity=high&amp;id=69cd750de6bfc5ba1df027c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54350-improper-neutralization-of-input-du-0b3489e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hjyl%20hmd&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56010-improper-neutralization-of-input-du-b62347dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56010%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lannoy%20Device%20Detector&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56016-improper-neutralization-of-input-du-919165bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56016%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maartenhemmes%20Image%20Mapper&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55975-improper-neutralization-of-special--b9c947ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55975%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rohit%20Urane%20Dr%20Affiliate&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55984-improper-neutralization-of-special--b59ff7a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55984%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20susheelhbti%20Saksh%20Escrow%20System&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55985-improper-neutralization-of-special--796eec06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55985%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ydesignservices%20YDS%20Support%20Ticket%20System&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56058-deserialization-of-untrusted-data-i-16800b56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56058%3A%20Deserialization%20of%20Untrusted%20Data%20in%20denniskravetstns%20VRPConnector&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df0732d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56059-improperly-controlled-modification--c9509616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56059%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20farinspace%20Partners&amp;severity=null&amp;id=69cd75bfe6bfc5ba1df07330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56008-missing-authorization-in-spreadr-sp-4a391a8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56008%3A%20Missing%20Authorization%20in%20spreadr%20Spreadr%20Woocommerce&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df0704a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4996-cwe-259-use-of-hard-coded-password-i-e97650c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4996%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Asseco%20Business%20Solutions%20S.A.%20Wapro%20ERP%20Desktop&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4995-cwe-757-selection-of-less-secure-alg-9627418e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4995%3A%20CWE-757%20Selection%20of%20Less-Secure%20Algorithm%20During%20Negotiation%20(&apos;Algorithm%20Downgrade&apos;)%20in%20Asseco%20Business%20Solutions%20S.A.%20Wapro%20ERP%20Desktop&amp;severity=critical&amp;id=68e0f3bfb66c7f7acdd3cbe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11912-cwe-89-improper-neutralization-of-s-a5a6a755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11912%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=high&amp;id=699f6e27b7ef31ef0b596d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11291-cwe-200-exposure-of-sensitive-infor-7926587b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11291%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20madalinungureanu%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11926-cwe-862-missing-authorization-in-sh-929e5864</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11926%3A%20CWE-862%20Missing%20Authorization%20in%20ShineTheme%20Travel%20Booking%20WordPress%20Theme&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12454-cwe-352-cross-site-request-forgery--c679f564</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12454%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20iovamihai%20Affiliate%20Program%20Suite%20%E2%80%94%20SliceWP%20Affiliates&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12554-cwe-352-cross-site-request-forgery--2a5f333b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12554%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pkthree%20Peter%E2%80%99s%20Custom%20Anti-Spam&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12340-cwe-200-exposure-of-sensitive-infor-b2774ca0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12340%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wealcoder%20Animation%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11614-out-of-bounds-read-68e135ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11614%3A%20Out-of-bounds%20Read&amp;severity=high&amp;id=690ebb293a8fd010ecf4f0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11295-cwe-200-exposure-of-sensitive-infor-920f314c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11295%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pluginsandsnippets%20Simple%20Page%20Access%20Restriction&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b594401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12287-cwe-287-improper-authentication-in--82db2f4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12287%3A%20CWE-287%20Improper%20Authentication%20in%20Mikado-Themes%20Biagiotti%20Membership&amp;severity=critical&amp;id=699f6e35b7ef31ef0b597cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12698-uncontrolled-resource-consumption-644f09bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12698%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f5eed11cb603d890ffb75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12061-cwe-639-authorization-bypass-throug-f8968da8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12061%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12250-cwe-200-exposure-of-sensitive-infor-78307a31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12250%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zealopensource%20Accept%20Authorize.NET%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12449-cwe-79-improper-neutralization-of-i-64decf1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20videowhisper%20Video%20Share%20VOD%20%E2%80%93%20Turnkey%20Video%20Site%20Builder%20Script&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12596-cwe-862-missing-authorization-in-ch-e333da15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12596%3A%20CWE-862%20Missing%20Authorization%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59c00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12259-cwe-862-missing-authorization-in-sw-a3cca9b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12259%3A%20CWE-862%20Missing%20Authorization%20in%20sweetdaisy86%20CRM%20WordPress%20Plugin%20%E2%80%93%20RepairBuddy&amp;severity=high&amp;id=699f6e33b7ef31ef0b597ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11254-cwe-79-improper-neutralization-of-i-96aae237</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12025-cwe-89-improper-neutralization-of-s-a91544b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12025%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robfelty%20Collapsing%20Categories&amp;severity=high&amp;id=699f6e2ab7ef31ef0b5970ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12432-cwe-330-use-of-insufficiently-rando-c0b48066</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12432%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20wpclever%20WPC%20Shop%20as%20a%20Customer%20for%20WooCommerce&amp;severity=high&amp;id=699f6e3bb7ef31ef0b598989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12513-cwe-79-improper-neutralization-of-i-f39949ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rewardsfuel%20Contests%20by%20Rewards%20Fuel&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11881-cwe-79-improper-neutralization-of-i-a40b4ad2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11881%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tymotey%20Easy%20Waveform%20Player&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12500-cwe-79-improper-neutralization-of-i-db071bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20philantro%20Philantro%20%E2%80%93%20Donations%20and%20Donor%20Management&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11748-cwe-79-improper-neutralization-of-i-e87bc101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11748%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taeggie%20Taeggie%20Feed&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b5955b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11439-cwe-79-improper-neutralization-of-i-db56514a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aklaren%20ScanCircle&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39703-cwe-77-improper-neutralization-of-s-41a2005b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39703%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ThreatQuotient%20ThreatQ&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37649-na-48eb3db1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37649%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56175-na-a6a57ea0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56175%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56174-na-82894965</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56174%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56173-na-a48d97f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56173%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56170-na-679e03e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56170%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56116-na-663464da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56116%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd4b7ef31ef0b55b414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56115-na-efecd47d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56115%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd4b7ef31ef0b55b411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55506-na-84bae616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55506%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55492-na-62658497</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55492%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55461-na-fa95add8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55461%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bceb7ef31ef0b55b174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55239-na-9186174e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55239%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55232-na-0d340010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55232%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55231-na-1101bc43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55231%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55088-na-8ccb3abf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55088%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55086-na-06e2877c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55086%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49202-na-c62dcc03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49202%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49201-na-32e32027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49201%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53580-na-47eb6df2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53580%3A%20n%2Fa&amp;severity=high&amp;id=690916c8c28fd46ded7ccf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-qualcomm-dsp-driver-how-serbian-authorities-have-deployed-surveillance-technology-and-digital-repression-tactics-775699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Qualcomm%20DSP%20Driver%20-%20How%20Serbian%20authorities%20have%20deployed%20surveillance%20technology%20and%20digital%20repression%20tactics&amp;severity=low&amp;id=682c7ad6e3e6de8ceb775699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-18-f1222b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f1222b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-qualcomm-dsp-driver-how-serbian-authorities-have-deployed-surveillance-technology-and-digital-repression-tactics-f0c538</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Qualcomm%20DSP%20Driver%20-%20How%20Serbian%20authorities%20have%20deployed%20surveillance%20technology%20and%20digital%20repression%20tactics&amp;severity=low&amp;id=682acdbebbaf20d303f0c538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10973-cleartext-transmission-of-sensitive-cea2ee02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10973%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9779-trust-boundary-violation-466771f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9779%3A%20Incorrect%20Privilege%20Assignment&amp;severity=high&amp;id=691f769028b41f27b43d128a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53144-vulnerability-in-linux-linux-bdd039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12178-cwe-787-out-of-bounds-write-in-auto-6bc3f712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12178%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20Navisworks%20Freedom&amp;severity=high&amp;id=697275ff4623b1157c865181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10356-cwe-200-exposure-of-sensitive-infor-7c50559e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10356%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54677-cwe-400-uncontrolled-resource-consu-6f69d5ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54677%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204553aaa02566521b57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50379-cwe-367-time-of-check-time-of-use-t-8b074b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50379%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=690204553aaa02566521b56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11280-cwe-200-exposure-of-sensitive-infor-fe8cc27c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11280%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yuryonfolio%20PPWP%20%E2%80%93%20Password%20Protect%20Pages&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b594303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9654-cwe-863-incorrect-authorization-in-s-e2ba65cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9654%3A%20CWE-863%20Incorrect%20Authorization%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=low&amp;id=699f6b56b7ef31ef0b55311b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12395-cwe-79-improper-neutralization-of-i-2757d2ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12395%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amitwpdeveloper%20WooCommerce%20Additional%20Fees%20On%20Checkout%20(Free)&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12601-cwe-400-uncontrolled-resource-consu-6f42d1ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12601%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=699f6e44b7ef31ef0b59c026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12469-cwe-79-improper-neutralization-of-i-da58aaf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20puckrobin%20WP%20BASE%20Booking%20of%20Appointments%2C%20Services%20and%20Events&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12127-cwe-80-improper-neutralization-of-s-3efe2daf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12127%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mantrabrain%20Learning%20Management%20System%2C%20eLearning%2C%20Course%20Builder%2C%20WordPress%20LMS%20Plugin%20%E2%80%93%20Sikshya%20LMS&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b597595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12024-cwe-79-improper-neutralization-of-i-4058fca1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12024%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=high&amp;id=699f6e2ab7ef31ef0b5970c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8326-cwe-200-exposure-of-sensitive-inform-5250c388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8326%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20clavaque%20s2Member%20%E2%80%93%20Excellent%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=high&amp;id=699f6c26b7ef31ef0b5607e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12293-cwe-352-cross-site-request-forgery--0aa7c66b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12293%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shinephp%20User%20Role%20Editor&amp;severity=high&amp;id=699f6e35b7ef31ef0b597cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11294-cwe-200-exposure-of-sensitive-infor-99013c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11294%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20memberful%20Memberful%20%E2%80%93%20Membership%20Plugin&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12220-cwe-352-cross-site-request-forgery--6b6c706d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12220%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20theafricanboss%20SMS%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e32b7ef31ef0b597996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12219-cwe-352-cross-site-request-forgery--7649af6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12219%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tomroyal%20Stop%20Registration%20Spam&amp;severity=medium&amp;id=699f6e32b7ef31ef0b597991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9624-cwe-918-server-side-request-forgery--a39dcd27</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9624%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Soflyy%20WP%20All%20Import%20Pro&amp;severity=high&amp;id=699f6b54b7ef31ef0b552435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12356-cwe-77-improper-neutralization-of-s-205fd629</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12356%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20BeyondTrust%20Remote%20Support&amp;severity=critical&amp;id=68f7d9b0247d717aace268ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12239-cwe-79-improper-neutralization-of-i-aef469a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Lite%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31668-na-8a583600</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31668%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29646-na-fb948604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29646%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da0b7ef31ef0b589860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37607-na-168ae79d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37607%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37606-na-7c5a8168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37606%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37605-na-ddac1006</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37605%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36832-na-54cf0ed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36832%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b563a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36831-na-142b5259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36831%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c66b7ef31ef0b5639fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55516-na-f3b0bd14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55516%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55515-na-fc04413b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55515%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55514-na-ce0c83de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55514%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55513-na-4cdc2c0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55513%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55496-na-269b07ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55496%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55059-na-e946103f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55059%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55aff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55058-na-5e331fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55058%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55057-na-7e03937f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55057%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55056-na-09b71953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55056%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54662-na-1dac1fd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54662%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc4b7ef31ef0b55acb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51175-na-c9f9f557</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51175%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b55888b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-17-f121cc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f121cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11906-cwe-79-improper-neutralization-of-i-5ec0b8e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cswaim%20TPG%20Get%20Posts&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11905-cwe-79-improper-neutralization-of-i-15e09f7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11905%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freeben%20Animated%20Counters&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11902-cwe-79-improper-neutralization-of-i-5ee79fc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20slopeit%20Slope%20Widgets&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11900-cwe-79-improper-neutralization-of-i-c6f47b2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11900%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Portfolio%20%E2%80%93%20Filterable%20Masonry%20Portfolio%20Gallery%20for%20Professionals&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12443-cwe-79-improper-neutralization-of-i-7fa000fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12443%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crmperks%20CRM%20Perks%20%E2%80%93%20WordPress%20HelpDesk%20Integration%20%E2%80%93%20Zendesk%2C%20Freshdesk%2C%20HelpScout&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54357-cross-site-request-forgery-csrf-in--a393baef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54357%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ThemeFusion%20Avada&amp;severity=null&amp;id=69cd7597e6bfc5ba1df06705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54376-improper-control-of-filename-for-in-40976bbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54376%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Spider%20Themes%20EazyDocs&amp;severity=null&amp;id=69cd759be6bfc5ba1df06829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56003-missing-authorization-in-david-cram-6608d3d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56003%3A%20Missing%20Authorization%20in%20David%20Cramer%20Caldera%20SMTP%20Mailer&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df0703e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55999-missing-authorization-in-marco-gian-ecd82a03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55999%3A%20Missing%20Authorization%20in%20Marco%20Giannini%20XML%20Multilanguage%20Sitemap%20Generator&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54348-improper-neutralization-of-input-du-48701d23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yaycommerce%20Brand&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54280-improper-neutralization-of-special--a1549160</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54280%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Iqonic%20Design%20WPBookit&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54279-exposure-of-sensitive-system-inform-dc92dee9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54279%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Tobias%20Keller%20WP-NERD%20Toolkit&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43234-authentication-bypass-using-an-alte-94a6195d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43234%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WofficeIO%20Woffice&amp;severity=null&amp;id=69cd746be6bfc5ba1def71ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54229-incorrect-privilege-assignment-in-s-12dbe047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54229%3A%20Incorrect%20Privilege%20Assignment%20in%20straightvisions%20GmbH%20SV100%20Companion&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49775-cwe-122-heap-based-buffer-overflow--d018ac85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49775%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Opcenter%20Execution%20Foundation&amp;severity=critical&amp;id=696616cfa60475309f9ce616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54354-missing-authorization-in-beatk-term-74be1f4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54354%3A%20Missing%20Authorization%20in%20beat.k%20Termin-Kalender&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54358-improper-neutralization-of-input-du-82614ed1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Enrico%20Cantori%203D%20Avatar%20User%20Profile&amp;severity=null&amp;id=69cd7597e6bfc5ba1df06708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54359-missing-authorization-in-saul-moral-6e7e9a31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54359%3A%20Missing%20Authorization%20in%20Saul%20Morales%20Pacheco%20Banner%20System&amp;severity=null&amp;id=69cd7599e6bfc5ba1df06796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54361-improper-neutralization-of-special--3a60bca2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54361%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tenteeglobal%20Instant%20Appointment&amp;severity=null&amp;id=69cd7599e6bfc5ba1df0679c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54363-incorrect-privilege-assignment-in-s-76348cb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54363%3A%20Incorrect%20Privilege%20Assignment%20in%20saiful.total%20Wp%20NssUser%20Register&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54364-improper-neutralization-of-input-du-37c5eac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54364%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spartac%20Feedpress%20Generator&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54365-incorrect-privilege-assignment-in-k-04042b5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54365%3A%20Incorrect%20Privilege%20Assignment%20in%20Knowhalim%20KH%20Easy%20User%20Settings&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54367-deserialization-of-untrusted-data-i-c9f8c6fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54367%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Ultimate%20Member%20ForumWP&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54368-cross-site-request-forgery-csrf-in--492f649b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54368%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rubengarzajr%20GitSync&amp;severity=null&amp;id=69cd759ae6bfc5ba1df067e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54369-missing-authorization-in-themehunk--9bb16171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54369%3A%20Missing%20Authorization%20in%20ThemeHunk%20Zita%20Site%20Builder&amp;severity=null&amp;id=69cd759be6bfc5ba1df06814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54370-unrestricted-upload-of-file-with-da-ae85f1fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54370%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SuitePlugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=null&amp;id=69cd759be6bfc5ba1df06818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54374-improper-limitation-of-a-pathname-t-3b5a8192</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54374%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sabri%20Sogrid&amp;severity=null&amp;id=69cd759be6bfc5ba1df06823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54375-improper-limitation-of-a-pathname-t-53cb1882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54375%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sabri%20Woolook&amp;severity=null&amp;id=69cd759be6bfc5ba1df06826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54378-missing-authorization-in-quietly-qu-5d40e663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54378%3A%20Missing%20Authorization%20in%20Quietly%20Quietly%20Insights&amp;severity=null&amp;id=69cd759be6bfc5ba1df0682c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54379-missing-authorization-in-blokhauswp-c4de9a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54379%3A%20Missing%20Authorization%20in%20blokhauswp%20Minterpress&amp;severity=null&amp;id=69cd759be6bfc5ba1df0682f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54380-improper-limitation-of-a-pathname-t-32c0247f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54380%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Filippo%20Bodei%20WP%20Cookies%20Enabler&amp;severity=null&amp;id=69cd759be6bfc5ba1df06832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54382-improper-limitation-of-a-pathname-t-045a78a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54382%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54385-server-side-request-forgery-ssrf-in-0b2f50d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54385%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20princeahmed%20Radio%20Player&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54387-improper-neutralization-of-input-du-6129b37e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jaytesh%20Barange%20Posts%20Date%20Ranges&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54390-improper-neutralization-of-input-du-8a666f15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bouzid%20Nazim%20Zitouni%20TagGator&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0695c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54395-improper-neutralization-of-input-du-5c480b7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54395%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20preblogging%20Increase%20Sociability&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54403-improper-neutralization-of-input-du-3b02db7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54403%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oktoberfive%20Visual%20Recent%20Posts&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54406-improper-neutralization-of-input-du-0929c8c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54406%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moallemi%20Comments%20On%20Feed&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54422-improper-neutralization-of-input-du-6be21b3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tgw365%20Evernote%20Sync&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55972-improper-neutralization-of-special--03b0c309</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55972%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chriscarvache%20eTemplates&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55973-improper-neutralization-of-special--05817e3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55973%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rnystrom%20TSB%20Occasion%20Editor&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55974-improper-neutralization-of-special--294b483a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55974%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Mart%C3%AD%20Batlles%20Martinez%20Mimoos&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55976-improper-neutralization-of-special--b188cc60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55976%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mikeleembruggen%20Critical%20Site%20Intel&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55977-improper-neutralization-of-special--2886cb19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55977%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BinaryCarpenter%20LaunchPage.app%20Importer&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55978-improper-neutralization-of-special--4c5bc280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55978%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WalletStation%20Code%20Generator%20Pro&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55979-improper-neutralization-of-special--31c416a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55979%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robindkumar%20Wr%20Age%20Verification&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55980-improper-neutralization-of-special--9c441061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55980%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20robindkumar%20Wr%20Age%20Verification&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55981-improper-neutralization-of-special--3cd3446b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55981%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Nabajit%20Roy%20Nabz%20Image%20Gallery&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55982-improper-neutralization-of-special--2e5abde6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55982%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20richteam%20Share%20Buttons%20%E2%80%93%20Social%20Media&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55986-improper-neutralization-of-special--00b39407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55986%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tiny13%20Service&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55987-improper-neutralization-of-special--31624822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55987%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ritesh%20Sanap%20Advanced%20What%20should%20we%20write%20next%20about&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55988-improper-neutralization-of-special--e3bf1333</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55988%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Amol%20Nirmala%20Waman%20Navayan%20CSV%20Export&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55996-missing-authorization-in-dreamfox-d-ac0795c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55996%3A%20Missing%20Authorization%20in%20dreamfox%20Dreamfox%20Media%20Payment%20gateway%20per%20Product%20for%20Woocommerce&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56013-authentication-bypass-using-an-alte-e2871d61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56013%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wovax%20Wovax%20IDX&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0707d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54384-missing-authorization-in-anh-tran-f-a4475a1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54384%3A%20Missing%20Authorization%20in%20Anh%20Tran%20Falcon%20%E2%80%93%20WordPress%20Optimizations%20%26%20Tweaks&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54417-missing-authorization-in-pixelgrade-23afeec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54417%3A%20Missing%20Authorization%20in%20pixelgrade%20PixProof&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55992-missing-authorization-in-open-tools-d409e377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55992%3A%20Missing%20Authorization%20in%20Open%20Tools%20WooCommerce%20Basic%20Ordernumbers&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55993-missing-authorization-in-pickplugin-8307e06a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55993%3A%20Missing%20Authorization%20in%20PickPlugins%20Job%20Board%20Manager&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55994-missing-authorization-8180d98e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55994%3A%20Missing%20Authorization&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56001-missing-authorization-in-ksher-thai-43bf0671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56001%3A%20Missing%20Authorization%20in%20ksher%20thailand%20Ksher&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56007-missing-authorization-in-leader-cod-ca8e2b08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56007%3A%20Missing%20Authorization%20in%20leader%20codes%20Leader&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56009-missing-authorization-in-spreadr-sp-5e74d7b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56009%3A%20Missing%20Authorization%20in%20spreadr%20Spreadr%20Woocommerce&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0706b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54360-improper-neutralization-of-input-du-ebd96494</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20premila%20Gutensee&amp;severity=null&amp;id=69cd7599e6bfc5ba1df06799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54441-improper-neutralization-of-input-du-2da8e35a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meini%20Utech%20World%20Time&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54442-improper-neutralization-of-input-du-61261ea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54442%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cortesfrau%20Better%20WP%20Login%20Page&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54443-improper-neutralization-of-input-du-85406a1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsCafe%20Advanced%20Data%20Table%20For%20Elementor&amp;severity=null&amp;id=69cd75aee6bfc5ba1df06d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56011-improper-neutralization-of-input-du-30cdee5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56011%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ilja%20Zaglov%20Responsive%20Google%20Maps%20%7C%20by%20imbaa&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df07077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54331-cross-site-request-forgery-csrf-in--70d3d042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54331%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Micha%20I%20Plant%20A%20Tree&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54352-cross-site-request-forgery-csrf-in--3b25e89b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sabri%20Sogrid&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54355-cross-site-request-forgery-csrf-in--6c88662e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54355%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54356-cross-site-request-forgery-csrf-in--d207811c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54356%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=69cd7597e6bfc5ba1df06702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54372-cross-site-request-forgery-csrf-in--29e36036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54372%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sourov%20Amin%20Insertify&amp;severity=null&amp;id=69cd759be6bfc5ba1df0681c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54396-cross-site-request-forgery-csrf-in--b6ed0bd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54396%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elmervillanueva%20Bet%20sport%20Free&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0697c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54418-cross-site-request-forgery-csrf-in--2e06af33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54418%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Diversified%20Technology%20Corp.%20DTC%20Documents&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54419-cross-site-request-forgery-csrf-in--a82c49fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54419%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20chenyenming%20Ui%20Slider%20Filter%20By%20Price&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56005-cross-site-request-forgery-csrf-in--a7b3bcf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56005%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Posti%20Posti%20Shipping&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54332-cross-site-request-forgery-csrf-in--fdf0a76a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54332%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPFactory%20WP%20Currency%20Exchange%20Rates&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54353-cross-site-request-forgery-csrf-in--d5fc2ae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54353%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpgear%20Hack-Info&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54386-cross-site-request-forgery-csrf-in--c4d29cd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54386%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pushmonkey%20Push%20Monkey%20Pro%20%E2%80%93%20Web%20Push%20Notifications%20and%20WooCommerce%20Abandoned%20Cart&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54388-cross-site-request-forgery-csrf-in--4b5a57e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54388%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Phuc%20Pham%20Multiple%20Admin%20Emails&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54389-cross-site-request-forgery-csrf-in--285e6a29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54389%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eduardo%20addWeather&amp;severity=null&amp;id=69cd759ce6bfc5ba1df068f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54391-cross-site-request-forgery-csrf-in--1b783fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54391%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mattwalters%20WordPress%20Filter&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0696d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54392-cross-site-request-forgery-csrf-in--b770023f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54392%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20midoks%20WP%E5%BE%AE%E4%BF%A1%E6%9C%BA%E5%99%A8%E4%BA%BA&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54393-cross-site-request-forgery-csrf-in--e9247a64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54393%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sheikh%20Heera%20WP%20Fiddle&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54394-cross-site-request-forgery-csrf-in--c290d72c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54394%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20khubbaib%20Mandrill%20WP&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54397-cross-site-request-forgery-csrf-in--40ef069c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54397%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20antonio.gocaj%20Go%20Animate&amp;severity=null&amp;id=69cd759ee6bfc5ba1df0697f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54398-cross-site-request-forgery-csrf-in--77adeec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54398%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jcaruso001%20Flaming%20Forms&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54399-cross-site-request-forgery-csrf-in--c459ad30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54399%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CRUDLab%20CRUDLab%20Google%20Plus%20Button&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54400-cross-site-request-forgery-csrf-in--1671f5bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54400%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20meloniq%20AppMaps&amp;severity=null&amp;id=69cd759ee6bfc5ba1df06988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54401-cross-site-request-forgery-csrf-in--61b64522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54401%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ciprian%20Turcu%20Advanced%20Fancybox&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54402-missing-authorization-in-mohamed-ab-831c432d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54402%3A%20Missing%20Authorization%20in%20Mohamed%20Abd%20Elhalim%20Arabic%20Webfonts&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54404-cross-site-request-forgery-csrf-in--2a56684e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54404%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nazmul%20Ahsan%20MDC%20Comment%20Toolbar&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54405-cross-site-request-forgery-csrf-in--0b84df4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54405%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etemplates%20ECT%20Social%20Share&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54407-cross-site-request-forgery-csrf-in--614c1171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54407%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a328496647%20CK%20and%20SyntaxHighlighter&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54408-cross-site-request-forgery-csrf-in--bc5bf1fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54408%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codehandling%20Youtube%20Video%20Grid&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54409-cross-site-request-forgery-csrf-in--2dc424e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54409%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fzmaster%20XPD%20Reduce%20Image%20Filesize&amp;severity=null&amp;id=69cd759fe6bfc5ba1df06a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54410-cross-site-request-forgery-csrf-in--9d5b1b05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54410%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eagerterrier%20SOPA%20Blackout&amp;severity=null&amp;id=69cd75a2e6bfc5ba1df06ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54411-cross-site-request-forgery-csrf-in--f7cb79f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54411%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hosting.io%20WP%20Controller&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54412-cross-site-request-forgery-csrf-in--692f0247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54412%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20etemplates%20ECT%20Product%20Carousel&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54413-cross-site-request-forgery-csrf-in--d8f2d5a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54413%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brandt-net%20Display%20Future%20Posts&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54414-cross-site-request-forgery-csrf-in--04e9799b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54414%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20geoWP%20Geoportail%20Shortcode&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54415-cross-site-request-forgery-csrf-in--077868fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54415%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cconoly%20WP-HideThat&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54416-cross-site-request-forgery-csrf-in--9129894b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54416%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Navdeep%20Wp%20Login%20with%20Ajax&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54420-cross-site-request-forgery-csrf-in--d428000a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aleksandr%20Novikov%20Metrika&amp;severity=null&amp;id=69cd75a3e6bfc5ba1df06b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54421-cross-site-request-forgery-csrf-in--f90c85ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sanjay_Negi%20Floating%20Video%20Player&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54423-cross-site-request-forgery-csrf-in--34a3b31a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54423%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jesse%20Overright%20Social%20Media%20Sharing&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54424-improper-neutralization-of-input-du-268dd8d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ilya_compman%20Like%20in%20Vk.com&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54425-cross-site-request-forgery-csrf-in--28b2e193</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54425%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LionScripts.com%20LionScripts%3A%20Site%20Maintenance%20%26%20Noindex%20Nofollow%20Plugin&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54426-cross-site-request-forgery-csrf-in--1e963620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54426%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20crossfitatgg%20LeaderBoard%20Plugin&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54427-cross-site-request-forgery-csrf-in--2733b4f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54427%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ljmacphee%20Category%20of%20Posts&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54428-cross-site-request-forgery-csrf-in--16794709</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54428%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20onigetoc%20Add%20image%20to%20Post&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54429-cross-site-request-forgery-csrf-in--f74d90b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54429%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivan-ovsyannikov%20Aphorismus&amp;severity=null&amp;id=69cd75a4e6bfc5ba1df06b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54430-cross-site-request-forgery-csrf-in--81971c94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54430%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Europe%20Ecologie%20Les%20Verts%20EELV%20Newsletter&amp;severity=null&amp;id=69cd75ace6bfc5ba1df06d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54431-cross-site-request-forgery-csrf-in--faa4a3e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54431%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20phpdevp%20Admin%20Customization&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54432-cross-site-request-forgery-csrf-in--e5e3c249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54432%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Shambhu%20Patnaik%20WP%20Flipkart%20Importer&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54433-cross-site-request-forgery-csrf-in--3a3027fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54433%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marcel%20CL%20Simple%20Booking%20Widget&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54434-cross-site-request-forgery-csrf-in--9fc2d0ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54434%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20BenJemin%20phZoom&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54435-cross-site-request-forgery-csrf-in--ed28d7f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Thomas%20Hoefter%20Onlywire%20Multi%20Autosubmitter&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54436-cross-site-request-forgery-csrf-in--ead853c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54436%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20milordk%20Jet%20Footer%20Code&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54437-improper-neutralization-of-input-du-c470bb62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20koolkatwebdesigns%20jCarousel&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54438-cross-site-request-forgery-csrf-in--1c492030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54438%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gaxx%20Gaxx%20Keywords&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54439-cross-site-request-forgery-csrf-in--ff6de27c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54439%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alok%20Tiwari%20Amazon%20Product%20Price&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54440-cross-site-request-forgery-csrf-in--5095fa4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54440%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20blueskyy%20WP-Ban-User&amp;severity=null&amp;id=69cd75ade6bfc5ba1df06d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56012-cross-site-request-forgery-csrf-in--98a56da8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56012%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lizeipe%20Flash%20News%20%2F%20Post%20(Responsive)&amp;severity=null&amp;id=69cd75b8e6bfc5ba1df0707a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55989-improper-neutralization-of-special--0a9af90c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55989%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kyle%20M%20Brown%20WP%20Simple%20Pay%20Lite%20Manager&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55990-improper-neutralization-of-special--1cee85dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55990%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tsjippy%20Mollie%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54373-improper-limitation-of-a-pathname-t-a7a80b0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54373%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chris%20Gardenberg%20EduAdmin%20Booking&amp;severity=null&amp;id=69cd759be6bfc5ba1df06820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55998-missing-authorization-in-eric-sloan-e8a6ef67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55998%3A%20Missing%20Authorization%20in%20Eric%20Sloan%20Popup%20Surveys%20%26%20Polls%20for%20WordPress%20(Mare.io)&amp;severity=null&amp;id=69cd75b5e6bfc5ba1df06f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56004-missing-authorization-in-awfowler-e-b891380d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56004%3A%20Missing%20Authorization%20in%20awfowler%20Easy%20Site%20Importer&amp;severity=null&amp;id=69cd75b7e6bfc5ba1df07041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54366-generation-of-error-message-contain-e9bcd9b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54366%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20videogallery%20Vimeography&amp;severity=null&amp;id=69cd7599e6bfc5ba1df067ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29671-na-36df76cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29671%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37776-na-d92f0563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37776%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37775-na-893e1c41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37775%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37774-na-939e6c9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37774%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37773-na-fdb969f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37773%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56112-na-31d8c763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56112%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56087-na-4a6a5a9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56087%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56086-na-73575f14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56086%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56085-na-4c78a6cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56085%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56084-cwe-77-improper-neutralization-of-s-e78bee50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56084%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56083-na-16442c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56083%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55557-na-6c0b9758</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55557%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55554-na-aae976f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55554%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55452-na-bff91b80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55452%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55451-na-ed4d7cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55451%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55104-na-cb150003</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55104%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55103-na-dedfd66c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55103%3A%20n%2Fa&amp;severity=high&amp;id=699f6bccb7ef31ef0b55b06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55100-na-da0d1ac4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55100%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bccb7ef31ef0b55b066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55085-na-09c0db85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55085%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53376-na-d2340891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53376%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-16-fb9d2349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-16&amp;severity=medium&amp;id=68367c98182aa0cae231eefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lookout-discovers-two-russian-android-spywar-f349adf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lookout%20Discovers%20Two%20Russian%20Android%20Spyware%20Families%20from%20Gamaredon%20APT&amp;severity=low&amp;id=68367c0d182aa0cae23126f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-16-752393</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-16&amp;severity=medium&amp;id=682c7abce3e6de8ceb752393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-16-f12908</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lookout-discovers-two-russian-android-spyware-families-from-gamaredon-apt-f0c322</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lookout%20Discovers%20Two%20Russian%20Android%20Spyware%20Families%20from%20Gamaredon%20APT&amp;severity=low&amp;id=682acdbebbaf20d303f0c322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mitigating-brute-force-attacks-on-netscaler-devices-f0c320</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mitigating%20Brute%20Force%20Attacks%20on%20NetScaler%20Devices&amp;severity=low&amp;id=682acdbebbaf20d303f0c320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11858-improper-neutralization-of-special--bd9a3b85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11858%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=699f6e23b7ef31ef0b5968d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56082-na-b8bd51d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56082%3A%20n%2Fa&amp;severity=low&amp;id=699f6bd2b7ef31ef0b55b36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56074-na-5c7e49da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56074%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56073-na-87ee6a8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56073%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56072-na-2269025e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56072%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55970-na-3d7a4915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55970%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55969-na-61198dc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55969%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd2b7ef31ef0b55b307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-15-f125cd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f125cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11721-cwe-269-improper-privilege-manageme-08547f79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11721%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=699f6e1ab7ef31ef0b5953a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11720-cwe-79-improper-neutralization-of-i-d5d56ae8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=high&amp;id=699f6e1ab7ef31ef0b5953a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11712-cwe-359-exposure-of-private-persona-b4367f0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11712%3A%20CWE-359%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11710-cwe-89-improper-neutralization-of-s-ba8c9d48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11710%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11711-cwe-89-improper-neutralization-of-s-13fc1b0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11711%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=high&amp;id=699f6e1ab7ef31ef0b59538b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11714-cwe-89-improper-neutralization-of-s-1de17625</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11714%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b59539b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11713-cwe-89-improper-neutralization-of-s-00544348</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11713%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11715-cwe-862-missing-authorization-in-wp-f50a4f8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11715%3A%20CWE-862%20Missing%20Authorization%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b5953a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12446-cwe-79-improper-neutralization-of-i-7d50029c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gravitymaster97%20Post%20to%20Pdf&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12628-cwe-79-improper-neutralization-of-i-7d4487c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12628%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20budiony%20bodi0%60s%20Easy%20cache&amp;severity=medium&amp;id=699f6e46b7ef31ef0b59c268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12422-cwe-79-improper-neutralization-of-i-94b61be2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12422%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xylus%20Import%20Eventbrite%20Events&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12459-cwe-79-improper-neutralization-of-i-474c776a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ganohr%20Ganohrs%20Toggle%20Shortcode&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11752-cwe-79-improper-neutralization-of-i-5983cf51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20babo2015%20Eveeno&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12474-cwe-79-improper-neutralization-of-i-80a352f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12474%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geodatasource%20GeoDataSource%20Country%20Region%20DropDown&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10690-cwe-639-authorization-bypass-throug-dd79fa50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10690%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rstheme2017%20Shortcodes%20for%20Elementor&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10646-cwe-79-improper-neutralization-of-i-058661e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Fluent%20Forms%20%E2%80%93%20Customizable%20Contact%20Forms%2C%20Survey%2C%20Quiz%2C%20%26%20Conversational%20Form%20Builder&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12501-cwe-79-improper-neutralization-of-i-45b68b84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kylephillips%20Simple%20Locator&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11884-cwe-79-improper-neutralization-of-i-eb26c9cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Wp%20photo%20text%20slider%2050&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9698-cwe-434-unrestricted-upload-of-file--2ce3a869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9698%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20aruphash%20Crafthemes%20Demo%20Import&amp;severity=high&amp;id=699f6b59b7ef31ef0b5548ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11888-cwe-79-improper-neutralization-of-i-abe56ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ider%20IDer%20Login%20for%20WordPress&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11869-cwe-79-improper-neutralization-of-i-c15c95e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uvstudio%20Buk%20for%20WordPress&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11877-cwe-79-improper-neutralization-of-i-14c70cd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpscore%20Cricket%20Live%20Score&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12502-cwe-79-improper-neutralization-of-i-53b22908</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeasap%20My%20IDX%20Home%20Search&amp;severity=medium&amp;id=699f6e3fb7ef31ef0b59b9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11894-cwe-79-improper-neutralization-of-i-191fd3b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theandystratton%20The%20Permalinker&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11855-cwe-79-improper-neutralization-of-i-8d249d72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20koalendar%20Koalendar%20%E2%80%93%20Events%20%26%20Appointments%20Booking%20Calendar&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12447-cwe-639-authorization-bypass-throug-30a5678d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12447%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webdeveric%20Get%20Post%20Content%20Shortcode&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12523-cwe-79-improper-neutralization-of-i-2bbb29e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12523%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wssoffice21%20States%20Map%20US&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12458-cwe-79-improper-neutralization-of-i-232b517b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devnethr%20Smart%20PopUp%20Blaster&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12411-cwe-79-improper-neutralization-of-i-ffcb89bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onetarek%20WP%20Ad%20Guru%20%E2%80%93%20Banner%20ad%2C%20Responsive%20popup%2C%20Popup%20maker%2C%20Ad%20rotator%20%26%20More&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b59820d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12448-cwe-79-improper-neutralization-of-i-179c8e5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smusman98%20Posts%20and%20Products%20Views%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3cb7ef31ef0b59b6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11883-cwe-79-improper-neutralization-of-i-e2084d9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20connatix%20Connatix%20Video%20Embed&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12517-cwe-79-improper-neutralization-of-i-c538eab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12517%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prontotools%20WooCommerce%20Cart%20Count%20Shortcode&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11462-cwe-79-improper-neutralization-of-i-d1a15c26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filestack%20Filestack%20Official&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11770-cwe-79-improper-neutralization-of-i-6d7ccb6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tarakpatel18%20Post%20Carousel%20%26%20Slider&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11095-cwe-79-improper-neutralization-of-i-f80906e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11095%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Visualmodo%20Elements&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11876-cwe-79-improper-neutralization-of-i-8b068091</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoannr35%20Kredeum%20NFTs%2C%20the%20easiest%20way%20to%20sell%20your%20NFTs%20directly%20on%20your%20WordPress%20site&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11751-cwe-79-improper-neutralization-of-i-0266a7a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11751%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tcoder%20TCBD%20Popover&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11755-cwe-79-improper-neutralization-of-i-47ce1c14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11755%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20acewebx%20IMS%20Countdown&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12578-cwe-200-exposure-of-sensitive-infor-4d457a0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12578%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tickera%20Tickera%20%E2%80%93%20WordPress%20Event%20Ticketing&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11865-cwe-79-improper-neutralization-of-i-5c37ed2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20html5maps%20Tabs%20Maker&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11867-cwe-79-improper-neutralization-of-i-ca54cb62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20papin%20Companion%20Portfolio%20%E2%80%93%20Responsive%20Portfolio%20Plugin&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11889-cwe-79-improper-neutralization-of-i-0f4a07a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20homeasap%20My%20IDX%20Home%20Search&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11873-cwe-79-improper-neutralization-of-i-f0362dd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glomex%20glomex%20oEmbed&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12555-cwe-352-cross-site-request-forgery--b3d02bf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12555%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mgplugin%20SIP%20Calculator&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-14-f12118</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12553-cwe-862-missing-authorization-in-ge-09a7494e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12553%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GeoVision%20GV-ASManager&amp;severity=medium&amp;id=699f6e41b7ef31ef0b59bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12552-cwe-59-improper-link-resolution-bef-eef61c95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12552%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Wacom%20Center&amp;severity=high&amp;id=699f6e41b7ef31ef0b59bca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54351-cross-site-request-forgery-csrf-in--a3582945</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54351%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Thomas%20K%20Landis%20Fancy%20Roller%20Scroller&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54349-improper-neutralization-of-input-du-21c2c702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mashiurz%20Plain%20Post&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54347-improper-neutralization-of-input-du-be28bee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BAKKBONE%20Australia%20FloristPress&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54346-improper-neutralization-of-input-du-40669aad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20Barter&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54345-improper-neutralization-of-input-du-b6300ad9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20Bicycleshop&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54344-improper-neutralization-of-input-du-1469a518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20WP%20Quick%20Shop&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54343-improper-neutralization-of-input-du-95cbaef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehowarde%20Connect%20Contact%20Form%207%20to%20Constant%20Contact&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54341-improper-neutralization-of-input-du-66a5903f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LabelGrid%20LabelGrid%20Tools&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54340-improper-neutralization-of-input-du-d2d12253</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54340%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sylviavanos%20Simple%20Presenter&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54339-improper-neutralization-of-input-du-4ca10bc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54339%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jbd7%20geoFlickr&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54338-improper-neutralization-of-input-du-3efe437d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54338%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20christer_f%20Hello%20Event%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd7597e6bfc5ba1df066aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54337-cross-site-request-forgery-csrf-in--53135983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54337%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DevriX%20DX%20Dark%20Site&amp;severity=null&amp;id=69cd7596e6bfc5ba1df06697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54335-improper-neutralization-of-input-du-58718a46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54335%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ImmoSoft%20ImmoToolBox%20Connect&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54334-improper-neutralization-of-input-du-f94deea5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zeshanb%20Quran%20Phrases%20About%20Most%20People%20Shortcodes&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54333-improper-neutralization-of-input-du-0575ce03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20silverplugins217%20Check%20Pincode%20For%20Woocommerce&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54330-server-side-request-forgery-ssrf-in-d507e0c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54330%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20hurraki%20Hurrakify&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54329-improper-neutralization-of-input-du-f68f8d91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Metup%20CleverNode%20Related%20Content&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54328-improper-neutralization-of-input-du-ede327f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54328%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20linknacional%20Invoice%20Payment%20for%20WooCommerce&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54326-missing-authorization-in-eyal-fitou-f8b36353</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54326%3A%20Missing%20Authorization%20in%20Eyal%20Fitoussi%20GEO%20my%20WordPress&amp;severity=null&amp;id=69cd7594e6bfc5ba1df065e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54325-improper-neutralization-of-input-du-cf8cf7a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54325%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DealerTrend%20CarDealerPress&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54324-improper-neutralization-of-input-du-e7ef41cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54324%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mtomic%20SMSify&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54323-missing-authorization-in-saad-iqbal-f1baa2e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54323%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20New%20User%20Approve&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54322-improper-neutralization-of-input-du-1d8e3a40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ederson%20Peka%20Media%20Downloader&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0657d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54320-improper-neutralization-of-input-du-09861977</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icdsoft%20ICDSoft%20Reseller%20Store&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0657a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54317-improper-neutralization-of-input-du-fefaa22e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54317%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Google%20Web%20Stories&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54316-improper-neutralization-of-input-du-979557bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54316%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Restaurant%20%26%20Cafe%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54315-improper-neutralization-of-input-du-3293e980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54315%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7593e6bfc5ba1df06571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54314-improper-neutralization-of-input-du-6bc0b1b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54314%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Primary%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0656e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54312-improper-neutralization-of-input-du-89b97e36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54312%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PersianScript%20Persian%20Woocommerce%20SMS&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0656b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54311-missing-authorization-in-ilychkov-m-3bc04c65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54311%3A%20Missing%20Authorization%20in%20i.lychkov%20Mark%20New%20Posts&amp;severity=null&amp;id=69cd7593e6bfc5ba1df0654e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54310-missing-authorization-in-aslam-khan-3bf6170b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54310%3A%20Missing%20Authorization%20in%20Aslam%20Khan%20Gouran%20Gou%20Manage%20My%20Account%20Menu&amp;severity=null&amp;id=69cd7590e6bfc5ba1df064a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54309-insertion-of-sensitive-information--a081ea2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54309%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20wpdebuglog%20PostBox&amp;severity=null&amp;id=69cd7590e6bfc5ba1df0649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54308-improper-neutralization-of-input-du-15d50402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20Cryptocurrency%20Price%20Widget&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54307-cross-site-request-forgery-csrf-in--1adf6c95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54307%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aipost%20AIcomments&amp;severity=null&amp;id=69cd7590e6bfc5ba1df0648f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54306-cross-site-request-forgery-csrf-in--d165e9ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54306%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aitool%20AIKCT%20Engine%20Chatbot%2C%20ChatGPT%2C%20Gemini%2C%20GPT-4o%20Best%20AI%20Chatbot&amp;severity=null&amp;id=69cd7590e6bfc5ba1df0648c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54305-improper-neutralization-of-input-du-eb1f83c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtexpress%20J%26T%20Express%20Malaysia&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54303-improper-neutralization-of-input-du-89685843</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ido%20Kobelkowsky%20Simple%20Payment&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54302-improper-neutralization-of-input-du-c764db65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vikas%20Ratudi%20VPSUForm&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54301-improper-neutralization-of-input-du-e2fcae95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manidoraisamy%20FormFacade&amp;severity=null&amp;id=69cd7590e6bfc5ba1df06480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54300-cross-site-request-forgery-csrf-in--b0232ed4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54300%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Basar%20Ventures%20AutoWP&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54299-improper-neutralization-of-input-du-8f46f3ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20revidev%20Revi.io&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54298-missing-authorization-in-sminozzi-c-e1cba5cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54298%3A%20Missing%20Authorization%20in%20sminozzi%20Car%20Dealer&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54297-authentication-bypass-using-an-alte-da461ef2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54297%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20extremeidea%20vBSSO-lite&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54296-authentication-bypass-using-an-alte-ef723ccc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54296%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Codexpert%2C%20Inc%20CoSchool%20LMS&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54295-authentication-bypass-using-an-alte-21b91e15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54295%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20FluxBuilder%20ListApp%20Mobile%20Manager&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54294-authentication-bypass-using-an-alte-0e785bc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54294%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Appgenix%20Infotech%20Firebase%20OTP%20Authentication&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54293-incorrect-privilege-assignment-in-c-3e747291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54293%3A%20Incorrect%20Privilege%20Assignment%20in%20CE21%20CE21%20Suite&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54290-improper-neutralization-of-input-du-0b3940c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54290%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Justin%20Fletcher%20Role%20Includer&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54289-missing-authorization-in-awesomesup-08f1f24d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54289%3A%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support&amp;severity=null&amp;id=69cd758fe6bfc5ba1df063d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54288-improper-neutralization-of-input-du-c7ee4735</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LDD%20Web%20Design%20LDD%20Directory%20Lite&amp;severity=null&amp;id=69cd758ce6bfc5ba1df0630b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54287-improper-neutralization-of-input-du-ffa83385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54287%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Best%20WP%20Developer%20Advanced%20Blog%20Post%20Block&amp;severity=null&amp;id=69cd758ce6bfc5ba1df06308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54286-improper-neutralization-of-input-du-865c2a23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54286%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Smaily%20Smaily%20for%20WP&amp;severity=null&amp;id=69cd758ce6bfc5ba1df06305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54282-deserialization-of-untrusted-data-i-75bfbd23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54282%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Themeum%20WP%20Mega%20Menu&amp;severity=null&amp;id=69cd758ce6bfc5ba1df06302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54278-missing-authorization-in-plugin-dev-5d569103</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54278%3A%20Missing%20Authorization%20in%20Plugin%20Devs%20News%20Ticker%20for%20Elementor&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54277-improper-neutralization-of-input-du-63c6f917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54277%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alireza%20Aliniya%20Nias%20course&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54276-improper-neutralization-of-input-du-134c0752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devfelixmoira%20Poll%20Builder&amp;severity=null&amp;id=69cd758ce6bfc5ba1df062f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54275-improper-neutralization-of-input-du-881113e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54275%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wibergsweb%20CSV%20to%20html&amp;severity=null&amp;id=69cd758be6bfc5ba1df06189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54274-improper-neutralization-of-input-du-94fc4a08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54274%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Octrace%20WordPress%20HelpDesk%20%26%20Support%20Ticket%20System%20Plugin%20%E2%80%93%20Octrace%20Support&amp;severity=null&amp;id=69cd758be6bfc5ba1df06186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54273-deserialization-of-untrusted-data-i-15c08070</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54273%3A%20Deserialization%20of%20Untrusted%20Data%20in%20PickPlugins%20Mail%20Picker&amp;severity=null&amp;id=69cd758be6bfc5ba1df06183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54272-improper-neutralization-of-input-du-675d2d39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54272%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20Radius%20Blocks&amp;severity=null&amp;id=69cd758be6bfc5ba1df06180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54271-missing-authorization-in-arni-cinco-e5f5cd86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54271%3A%20Missing%20Authorization%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=null&amp;id=69cd758be6bfc5ba1df0617d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54268-missing-authorization-in-greg-siteo-713eba79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54268%3A%20Missing%20Authorization%20in%20Greg%20-%20SiteOrigin%20SiteOrigin%20Widgets%20Bundle&amp;severity=null&amp;id=69cd758be6bfc5ba1df06177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54267-missing-authorization-in-creativemi-cfaf9d74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54267%3A%20Missing%20Authorization%20in%20CreativeMindsSolutions%20CM%20Answers&amp;severity=null&amp;id=69cd758be6bfc5ba1df06174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54266-improper-neutralization-of-input-du-875edb69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ImageRecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=null&amp;id=69cd758ae6bfc5ba1df06171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54265-improper-neutralization-of-input-du-ed04a652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd758ae6bfc5ba1df0616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54264-improper-neutralization-of-input-du-a429335b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmorillas1%20Shortcodes%20Blocks%20Creator%20Ultimate&amp;severity=null&amp;id=69cd758ae6bfc5ba1df06162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54262-unrestricted-upload-of-file-with-da-b77a592b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54262%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sidngr%20Import%20Export%20For%20WooCommerce&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54261-improper-neutralization-of-special--f4b4706d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54261%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20HK%20Digital%20Agency%20LLC%20TAX%20SERVICE%20Electronic%20HDM&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54259-improper-limitation-of-a-pathname-t-97734693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54259%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DELUCKS%20DELUCKS%20SEO&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54258-improper-neutralization-of-special--4620bec7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54258%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Anzar%20Ahmed%20Ni%20CRM%20Lead&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54256-missing-authorization-in-seerox-eas-54738377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54256%3A%20Missing%20Authorization%20in%20Seerox%20Easy%20Blocks%20pro&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54252-missing-authorization-in-dotonpaper-b009c723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54252%3A%20Missing%20Authorization%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=null&amp;id=69cd7586e6bfc5ba1df0601b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54250-improper-neutralization-of-input-du-42a30e65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54250%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54248-cross-site-request-forgery-csrf-in--c4bdad84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54248%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eewee%20eewee%20admin%20custom&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54246-improper-neutralization-of-input-du-420a5ee5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54246%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20FAQs&amp;severity=null&amp;id=69cd7586e6bfc5ba1df0600f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54245-improper-neutralization-of-input-du-ae7d7399</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54245%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Clients&amp;severity=null&amp;id=69cd7586e6bfc5ba1df0600c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54244-improper-neutralization-of-input-du-0b2d22be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54244%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Easy%20Replace&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54243-improper-neutralization-of-input-du-dcfb985e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54243%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Think201%20Echoza&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54242-missing-authorization-in-appsbd-sim-4a71d188</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54242%3A%20Missing%20Authorization%20in%20appsbd%20Simple%20Notification&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54240-improper-neutralization-of-input-du-6c1d2667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blazeonline%20Blaze%20Online%20eParcel%20for%20WooCommerce&amp;severity=null&amp;id=69cd7586e6bfc5ba1df05fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54239-missing-authorization-in-dugudlabs--ae73e74a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54239%3A%20Missing%20Authorization%20in%20dugudlabs%20Eyewear%20prescription%20form&amp;severity=null&amp;id=69cd7586e6bfc5ba1df05fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54238-improper-neutralization-of-input-du-f33f8ea4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cleveland%20Heights-University%20Heights%20Public%20Library%20Webdeveloper%20Board%20Document%20Manager%20from%20CHUHPL&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54237-improper-neutralization-of-input-du-43e4cdf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54237%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20CRM%20Lead&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54236-improper-neutralization-of-input-du-723fc7d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54236%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Bulk%20Product%20Editor&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54235-improper-neutralization-of-input-du-4a3d89e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54235%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shiptimize%20Shiptimize%20for%20WooCommerce&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54234-improper-neutralization-of-special--eb1c7f05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54234%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wp-buy%20Limit%20Login%20Attempts&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54233-improper-neutralization-of-input-du-b0545cea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20overclokk%20Advanced%20Control%20Manager%20for%20WordPress%20by%20ItalyStrap&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54231-improper-neutralization-of-input-du-d4a9f6fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Order%20Export&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9608-cwe-79-improper-neutralization-of-in-85f0b31f</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20richardperdaan%20MyParcel&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11827-cwe-79-improper-neutralization-of-i-60b82bdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gsarig%20Out%20of%20the%20Block%3A%20OpenStreetMap&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52059-cwe-120-buffer-copy-without-checkin-59f358b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52059%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20RTI%20Connext%20Professional&amp;severity=medium&amp;id=692f11fa0eb63243a5f7cdc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10783-cwe-862-missing-authorization-in-ma-cddeb7b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10783%3A%20CWE-862%20Missing%20Authorization%20in%20mainwp%20MainWP%20Child%20%E2%80%93%20Securely%20Connects%20to%20the%20MainWP%20Dashboard%20to%20Manage%20Multiple%20Sites&amp;severity=high&amp;id=699f6dfcb7ef31ef0b592483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9290-cwe-434-unrestricted-upload-of-file--a2e1a864</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9290%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20azzaroco%20Super%20Backup%20%26%20Clone%20-%20Migrate%20for%20WordPress&amp;severity=critical&amp;id=699f6b47b7ef31ef0b550d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11012-cwe-94-improper-control-of-generati-24f3b121</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11012%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ninjateam%20Notibar%20%E2%80%93%20Notification%20Bar%20for%20WordPress&amp;severity=medium&amp;id=699f6e04b7ef31ef0b593ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12465-cwe-79-improper-neutralization-of-i-c1a8273b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20propertyhive%20Property%20Hive%20Stamp%20Duty%20Calculator&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11275-cwe-639-authorization-bypass-throug-b63e6199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11275%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arraytics%20WP%20Timetics-%20AI-powered%20Appointment%20Booking%20Calendar%20and%20Online%20Scheduling%20Plugin&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12309-cwe-639-authorization-bypass-throug-98b72f42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12309%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20collizo4sky%20Rate%20My%20Post%20%E2%80%93%20Star%20Rating%20Plugin%20by%20FeedbackWP&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12417-cwe-94-improper-control-of-generati-8a69070f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12417%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20quantumcloud%20Simple%20Link%20Directory&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11910-cwe-79-improper-neutralization-of-i-f42f58b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12042-cwe-434-unrestricted-upload-of-file-3719b299</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12042%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11911-cwe-862-missing-authorization-in-th-358b46c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11911%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11754-cwe-79-improper-neutralization-of-i-b5b4c1d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11754%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ameliabooking%20Booking%20System%20Trafft&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59576f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12421-cwe-94-improper-control-of-generati-29414f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12421%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20elliotvs%20Coupon%20Affiliates%20%E2%80%93%20Affiliate%20Plugin%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59896f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12420-cwe-94-improper-control-of-generati-0c143b50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12420%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20amauric%20WPMobile.App%20%E2%80%94%20Android%20and%20iOS%20Mobile%20Application&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b59896b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12414-cwe-352-cross-site-request-forgery--e17d9e2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12414%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themifyme%20Themify%20Store%20Locator&amp;severity=medium&amp;id=699f6e3ab7ef31ef0b598219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11832-cwe-79-improper-neutralization-of-i-7486d5cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11832%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6e22b7ef31ef0b59681f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12581-cwe-79-improper-neutralization-of-i-14126489</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21544-improper-input-validation-in-spatie-b6436778</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21544%3A%20Improper%20Input%20Validation%20in%20spatie%2Fbrowsershot&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11809-cwe-79-improper-neutralization-of-i-9b622fb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11809%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20primersoftware%20Primer%20MyData%20for%20Woocommerce&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12579-cwe-400-uncontrolled-resource-consu-df3c6604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12579%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20teckel%20Minify%20HTML&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59bf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12574-cwe-79-improper-neutralization-of-i-42133a96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amrendesign%20SVG%20Shortcode&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59beff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12300-cwe-862-missing-authorization-in-we-f40ec984</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12300%3A%20CWE-862%20Missing%20Authorization%20in%20webandprint%20AR%20for%20WordPress&amp;severity=low&amp;id=699f6e35b7ef31ef0b597cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12572-cwe-352-cross-site-request-forgery--920d49bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12572%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20stathisg%20Hello%20In%20All%20Languages&amp;severity=medium&amp;id=699f6e43b7ef31ef0b59befb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55918-na-7e57b341</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55918%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55956-na-2ecd6085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55956%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9b6247d717aace26c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-13-f1207f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f1207f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spearphishing-campaign-targeted-at-least-20-autonomous-system-as-owners-f0c31e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=spearphishing%20campaign%20targeted%20at%20least%2020%20Autonomous%20System%20(AS)%20owners&amp;severity=low&amp;id=682acdbebbaf20d303f0c31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49071-cwe-612-improper-authorization-of-index-containing-sensitive-information-in-microsoft-microsoft-defender-for-endpoint-for-windows-bd6109</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49071%3A%20CWE-612%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Windows&amp;severity=medium&amp;id=682d9815c4522896dcbd6109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49147-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-update-catalog-bd6310</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49147%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Update%20Catalog&amp;severity=critical&amp;id=682d9815c4522896dcbd6310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28143-cwe-620-unverified-password-change--34164ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28143%3A%20CWE-620%20Unverified%20Password%20Change%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092621fe7723195e0b46fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28146-cwe-798-use-of-hard-coded-credentia-ac4d7a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28146%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092623fe7723195e0b471f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50584-cwe-89-improper-neutralization-of-s-8a01f671</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50584%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092eea35043901e82cab18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28145-cwe-89-improper-neutralization-of-s-3d262251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28145%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092623fe7723195e0b471a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28144-cwe-384-session-fixation-in-image-a-8e5d4222</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28144%3A%20CWE-384%20Session%20Fixation%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092621fe7723195e0b46ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36494-cwe-79-improper-neutralization-of-i-f9f85194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092626fe7723195e0b5aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36498-cwe-79-improper-neutralization-of-i-0e4c0cbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092626fe7723195e0b5ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12271-cwe-79-improper-neutralization-of-i-f2047ef2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12271%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jtermaat%20360%20Javascript%20Viewer&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47947-cwe-79-improper-neutralization-of-i-73edf082</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47947%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092ee835043901e82caab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28142-cwe-79-improper-neutralization-of-i-2d0f1f88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092621fe7723195e0b46f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12401-improper-input-validation-bd841c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12401%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=682d9819c4522896dcbd841c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12397-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-bebeae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12397%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=high&amp;id=682d9838c4522896dcbebeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12160-cwe-79-improper-neutralization-of-i-09b150c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seraphinitesoft%20Seraphinite%20Bulk%20Discounts%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5976a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11760-cwe-79-improper-neutralization-of-i-3ed2ade2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11760%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20falselight%20Currency%20Converter%20Widget%20%E2%9A%A1%20PRO&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12333-cwe-94-improper-control-of-generati-e05c2263</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12333%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20xTemos%20Woodmart&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12329-cwe-200-exposure-of-sensitive-infor-6914bcde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12329%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11724-cwe-862-missing-authorization-in-wp-0f3eb5bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11724%3A%20CWE-862%20Missing%20Authorization%20in%20wplegalpages%20Cookie%20Consent%2C%20Consent%20Log%2C%20Cookie%20Scanner%2C%20Script%20Blocker%20(for%20GDPR%2C%20CCPA%20%26%20ePrivacy)%20%3A%20WP%20Cookie%20Consent&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12201-cwe-862-missing-authorization-in-ha-24f048ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12201%3A%20CWE-862%20Missing%20Authorization%20in%20hashthemes%20Hash%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=699f6e31b7ef31ef0b597837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12312-cwe-502-deserialization-of-untruste-a0529fa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12312%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20johnwwweissberg%20Print%20Science%20Designer&amp;severity=high&amp;id=699f6e36b7ef31ef0b597da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10583-cwe-79-improper-neutralization-of-i-640fbd0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popups%20Builder&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59181b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11727-cwe-79-improper-neutralization-of-i-cd2b032c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20NotificationX%20%E2%80%93%20Live%20Sales%20Notification%2C%20WooCommerce%20Sales%20Popup%2C%20FOMO%2C%20Social%20Proof%2C%20Announcement%20Banner%20%26%20Floating%20Notification%20Top%20Bar&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11181-cwe-639-authorization-bypass-throug-6627f1c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11181%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpsoul%20Greenshift%20%E2%80%93%20animation%20and%20page%20builder%20blocks&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10784-cwe-79-improper-neutralization-of-i-5046a50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b592550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12263-cwe-862-missing-authorization-in-lo-59bde238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12263%3A%20CWE-862%20Missing%20Authorization%20in%20lordspace%20Child%20Theme%20Creator%20by%20Orbisius&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12059-cwe-639-authorization-bypass-throug-af233ab6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12059%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20elementinvader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12265-cwe-862-missing-authorization-in-de-c32df124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12265%3A%20CWE-862%20Missing%20Authorization%20in%20depayfi%20Web3%20Crypto%20Payments%20by%20DePay%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11052-cwe-79-improper-neutralization-of-i-0f26277c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11052%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=high&amp;id=699f6e04b7ef31ef0b593ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11766-cwe-79-improper-neutralization-of-i-9b231b1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20WordPress%20Book%20Plugin%20for%20Displaying%20Books%20in%20Grid%2C%20Flip%2C%20Slider%2C%20Popup%20Layout%20and%20more&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11785-cwe-79-improper-neutralization-of-i-401792df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanthuy%20Integrate%20Firebase&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11871-cwe-79-improper-neutralization-of-i-f0d4449a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tw2113%20Social%20Media%20Shortcodes&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11757-cwe-79-improper-neutralization-of-i-7a03e5d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sojahu%20WP%20GeoNames&amp;severity=medium&amp;id=699f6e1db7ef31ef0b59577b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12255-cwe-200-exposure-of-sensitive-infor-68aafb78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12255%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zealopensource%20Accept%20Stripe%20Payments%20Using%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10124-cwe-284-improper-access-control-in--3fef3920</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10124%3A%20CWE-284%20Improper%20Access%20Control%20in%20themehunk%20Vayu%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=699f6decb7ef31ef0b590d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12172-cwe-862-missing-authorization-in-ho-55e63517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12172%3A%20CWE-862%20Missing%20Authorization%20in%20hookandhook%20WP%20Courses%20LMS%20%E2%80%93%20Online%20Courses%20Builder%2C%20eLearning%20Courses%2C%20Courses%20Solution%2C%20Education%20Courses&amp;severity=high&amp;id=699f6e30b7ef31ef0b597791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11765-cwe-79-improper-neutralization-of-i-c2afb320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20WordPress%20Portfolio%20Plugin%20%E2%80%93%20A%20Plugin%20for%20Making%20Filterable%20Portfolio%20Grid%2C%20Portfolio%20Slider%20and%20more&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12072-cwe-79-improper-neutralization-of-i-52bccee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Analytics%20Cat%20%E2%80%93%20Google%20Analytics%20Made%20Easy&amp;severity=medium&amp;id=699f6e2db7ef31ef0b597386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12018-cwe-862-missing-authorization-in-al-7ce1d053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12018%3A%20CWE-862%20Missing%20Authorization%20in%20aliakro%20Snippet%20Shortcodes&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11359-cwe-79-improper-neutralization-of-i-d1379ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11359%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12040-cwe-98-improper-control-of-filename-50b4961b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12040%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpwax%20Product%20Carousel%20Slider%20%26%20Grid%20Ultimate%20for%20WooCommerce&amp;severity=high&amp;id=699f6e2bb7ef31ef0b5971ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11781-cwe-79-improper-neutralization-of-i-6105dd84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smartagenda%20Smart%20Agenda%20%E2%80%93%20Prise%20de%20rendez-vous%20en%20ligne&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b59649a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11882-cwe-79-improper-neutralization-of-i-e908acab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20FAQ%20And%20Answers%20%E2%80%93%20Create%20Frequently%20Asked%20Questions%20Area%20on%20WP%20Sites&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12526-cwe-352-cross-site-request-forgery--70c0af49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12526%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20arenaim%20Arena.IM%20%E2%80%93%20Live%20Blogging%20for%20real-time%20events&amp;severity=medium&amp;id=699f6e40b7ef31ef0b59bbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11709-cwe-862-missing-authorization-in-ke-e849af88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11709%3A%20CWE-862%20Missing%20Authorization%20in%20kekotron%20AI%20Post%20Generator%20%7C%20AutoWriter&amp;severity=medium&amp;id=699f6e1ab7ef31ef0b595381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12441-cwe-79-improper-neutralization-of-i-d48dcc04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12441%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shanebp%20BP%20Email%20Assign%20Templates&amp;severity=medium&amp;id=699f6e3bb7ef31ef0b598a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12156-cwe-79-improper-neutralization-of-i-2481d457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20AI%20Content%20Writer%2C%20RSS%20Feed%20to%20Post%2C%20Autoblogging%20SEO%20Help&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12162-cwe-79-improper-neutralization-of-i-3d1d48c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suiteplugins%20Video%20%26%20Photo%20Gallery%20for%20Ultimate%20Member&amp;severity=medium&amp;id=699f6e30b7ef31ef0b5976a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11459-cwe-79-improper-neutralization-of-i-2f10c746</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karlkiesinger%20Country%20Blocker&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11804-cwe-79-improper-neutralization-of-i-8a0b34f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20planaday%20Planaday%20API&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10182-cwe-79-improper-neutralization-of-i-05272d10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cognito%20Apps%20Cognito%20Forms&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12463-cwe-79-improper-neutralization-of-i-3e3cb63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arenaim%20Arena.IM%20%E2%80%93%20Live%20Blogging%20for%20real-time%20events&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11384-cwe-79-improper-neutralization-of-i-2af3080f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arenaim%20Arena.IM%20%E2%80%93%20Live%20Blogging%20for%20real-time%20events&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11410-cwe-79-improper-neutralization-of-i-81359284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11410%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sharabindu%20Top%20and%20footer%20bars%20for%20announcements%2C%20notifications%2C%20advertisements%2C%20promotions%20%E2%80%93%20YooBar&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10590-cwe-434-unrestricted-upload-of-file-66834c54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10590%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20halfdata%20Opt-In%20Downloads&amp;severity=high&amp;id=699f6df6b7ef31ef0b591838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11875-cwe-79-improper-neutralization-of-i-dae42a27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hage%20Add%20infos%20to%20The%20Events%20Calendar&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10910-cwe-94-improper-control-of-generati-157e2849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10910%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20g5theme%20Grid%20Plus%20%E2%80%93%20Unlimited%20grid%20layout&amp;severity=high&amp;id=699f6e03b7ef31ef0b5938f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11750-cwe-79-improper-neutralization-of-i-e2eab2ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlyoffice%20ONLYOFFICE%20DocSpace&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11891-cwe-79-improper-neutralization-of-i-b6bec49b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaushik07%20Perfect%20Font%20Awesome%20Integration&amp;severity=medium&amp;id=699f6e25b7ef31ef0b596b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12406-cwe-89-improper-neutralization-of-s-dcca3999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12406%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System%20%E2%80%93%20Manage%20e-Digital%20Books%20Library&amp;severity=medium&amp;id=699f6e38b7ef31ef0b5980ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11723-cwe-79-improper-neutralization-of-i-600bab35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11723%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20insiderealestate%20kvCORE%20IDX&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11683-cwe-79-improper-neutralization-of-i-1ec5fdf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11683%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hanif-khan%20Newsletter%20Subscriptions&amp;severity=medium&amp;id=699f6e18b7ef31ef0b595241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12258-cwe-79-improper-neutralization-of-i-98dcf112</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shivtiwari%20WP%20Service%20Payment%20Form%20With%20Authorize.net&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12260-cwe-79-improper-neutralization-of-i-75304c46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dipankarpal212%20Ultimate%20Endpoints%20With%20Rest%20Api&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12338-cwe-79-improper-neutralization-of-i-b645dde7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20websitetoolbox%20Website%20Toolbox%20Community&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10111-cwe-287-improper-authentication-in--9318b2a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10111%3A%20CWE-287%20Improper%20Authentication%20in%20cyberlord92%20OAuth%20Single%20Sign%20On%20%E2%80%93%20SSO%20(OAuth%20Client)&amp;severity=high&amp;id=699f6decb7ef31ef0b590ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11901-cwe-79-improper-neutralization-of-i-d548af9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberlord92%20PowerBI%20Embed%20Reports&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11417-cwe-352-cross-site-request-forgery--12e88c6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11417%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dejureorg%20dejure.org%20Vernetzungsfunktion&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11015-cwe-287-improper-authentication-in--864a7506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11015%3A%20CWE-287%20Improper%20Authentication%20in%20tarecord%20Sign%20In%20With%20Google&amp;severity=critical&amp;id=699f6e04b7ef31ef0b593abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11443-cwe-862-missing-authorization-in-de-e14d94aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11443%3A%20CWE-862%20Missing%20Authorization%20in%20decollete%20de%3Abranding&amp;severity=high&amp;id=699f6e15b7ef31ef0b594e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11419-cwe-352-cross-site-request-forgery--3f8a43aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11419%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20get3code%20Password%20for%20WP&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12461-cwe-79-improper-neutralization-of-i-f67e01a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zoan%20WP-Revive%20Adserver&amp;severity=medium&amp;id=699f6e3eb7ef31ef0b59b791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11433-cwe-79-improper-neutralization-of-i-85b096b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20surbma%20Surbma%20%7C%20SalesAutopilot%20Shortcode&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11914-cwe-79-improper-neutralization-of-i-133d7af7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shafayat-alam%20Gutenberg%20Blocks%20and%20Page%20Layouts%20%E2%80%93%20Attire%20Blocks&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11427-cwe-79-improper-neutralization-of-i-28e40c21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maheshmaharjan%20Catch%20Popup&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11279-cwe-79-improper-neutralization-of-i-015743dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11279%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vberkel%20Schema%20App%20Structured%20Data&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b5942ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11689-cwe-352-cross-site-request-forgery--c9e7d696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11689%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20caagsoftware%20HQ%20Rental%20Software&amp;severity=high&amp;id=699f6e19b7ef31ef0b59525a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11413-cwe-79-improper-neutralization-of-i-d78c41dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hostfact%20HostFact%20bestelformulier%20integratie&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11430-cwe-89-improper-neutralization-of-s-b53a40c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11430%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20elvinhaci%20SQL%20Chart%20Builder&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12341-cwe-862-missing-authorization-in-ma-b9cb61df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12341%3A%20CWE-862%20Missing%20Authorization%20in%20mahendrapatidarmp%20Custom%20Skins%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e38b7ef31ef0b597fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11442-cwe-79-improper-neutralization-of-i-317b0336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Horizontal%20scroll%20image%20slideshow&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31670-na-b8e1e0f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31670%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55099-na-f01ff91d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55099%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bccb7ef31ef0b55b062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54842-na-d01e450d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54842%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55add5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54811-na-631a9cc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54811%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55adce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54810-na-09a72a85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54810%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55adcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-12-f12f16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44299-an-attacker-may-be-able-to-cause-un-2422821e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44299%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20arbitrary%20code%20execution%20in%20DCP%20firmware%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb82fe6bfc5ba1df6ed4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54466-an-encrypted-volume-may-be-accessed-2959285b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54466%3A%20An%20encrypted%20volume%20may%20be%20accessed%20by%20a%20different%20user%20without%20prompting%20for%20the%20password%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eed35043901e82cb12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54489-running-a-mount-command-may-unexpec-2b9289fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54489%3A%20Running%20a%20mount%20command%20may%20unexpectedly%20execute%20arbitrary%20code%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef035043901e82cb20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54503-muting-a-call-while-ringing-may-not-09df9251</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54503%3A%20Muting%20a%20call%20while%20ringing%20may%20not%20result%20in%20mute%20being%20enabled%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69092ef235043901e82cb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54515-a-malicious-app-may-be-able-to-gain-eafa07e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54515%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef435043901e82cb396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54493-privacy-indicators-for-microphone-a-0b437d6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54493%3A%20Privacy%20indicators%20for%20microphone%20access%20may%20be%20attributed%20incorrectly%20in%20Apple%20macOS&amp;severity=low&amp;id=69092ef235043901e82cb23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44201-processing-a-malicious-crafted-file-2f8a7431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44201%3A%20Processing%20a%20malicious%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54485-an-attacker-with-physical-access-to-ec3326e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54485%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20view%20notification%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092eef35043901e82cb1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54484-an-app-may-be-able-to-access-user-s-c8304747</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54484%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eef35043901e82cb1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44200-an-app-may-be-able-to-read-sensitiv-c6be41c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44200%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54492-an-attacker-in-a-privileged-network-aa98a080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54492%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20alter%20network%20traffic%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69092ef035043901e82cb21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44241-an-attacker-may-be-able-to-cause-un-790c2819</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44241%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20arbitrary%20code%20execution%20in%20DCP%20firmware%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb82ee6bfc5ba1df6ed1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54514-an-app-may-be-able-to-break-out-of--3f737664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54514%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092ef435043901e82cb38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54502-processing-maliciously-crafted-web--b75f3578</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54502%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690916c8c28fd46ded7ccfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54471-a-malicious-application-may-be-able-1b453719</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54471%3A%20A%20malicious%20application%20may%20be%20able%20to%20leak%20a%20user&apos;s%20credentials%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82fe6bfc5ba1df6ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54534-processing-maliciously-crafted-web--88fd2e1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54534%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=high&amp;id=690916cac28fd46ded7ccfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44220-parsing-a-maliciously-crafted-video-5f5fe120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44220%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54505-processing-maliciously-crafted-web--c294c936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54505%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20memory%20corruption%20in%20Apple%20Safari&amp;severity=medium&amp;id=69092ef235043901e82cb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54513-an-app-may-be-able-to-access-sensit-cd9acef2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54513%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef435043901e82cb37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44246-on-a-device-with-private-relay-enab-5f6e634b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44246%3A%20On%20a%20device%20with%20Private%20Relay%20enabled%2C%20adding%20a%20website%20to%20the%20Safari%20Reading%20List%20may%20reveal%20the%20originating%20IP%20address%20to%20the%20website%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a7fe7723195e0fd564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54495-an-app-may-be-able-to-modify-protec-5130e995</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54495%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef235043901e82cb251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54529-an-app-may-be-able-to-execute-arbit-a94c28af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54529%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef435043901e82cb3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54476-an-app-may-be-able-to-access-user-s-01f06007</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54476%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eef35043901e82cb1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54524-a-malicious-app-may-be-able-to-acce-494191f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54524%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef435043901e82cb39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54477-an-app-may-be-able-to-access-user-s-554d1959</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54477%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eef35043901e82cb1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54498-an-app-may-be-able-to-break-out-of--ec7c16b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54498%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef235043901e82cb257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54508-processing-maliciously-crafted-web--7b9b1c5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54508%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=high&amp;id=690916c8c28fd46ded7ccfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54528-an-app-may-be-able-to-overwrite-arb-bdf91a3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54528%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=high&amp;id=69092ef435043901e82cb3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54494-an-attacker-may-be-able-to-create-a-ba902b4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54494%3A%20An%20attacker%20may%20be%20able%20to%20create%20a%20read-only%20memory%20mapping%20that%20can%20be%20written%20to%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef235043901e82cb242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54504-an-app-may-be-able-to-access-user-s-60c2d6d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54504%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef235043901e82cb280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44291-a-malicious-app-may-be-able-to-gain-85de3971</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44291%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7435043901e828ad66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54527-an-app-may-be-able-to-access-sensit-a81aaa7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54527%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef435043901e82cb3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44248-a-user-with-screen-sharing-access-m-13ecd7c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44248%3A%20A%20user%20with%20screen%20sharing%20access%20may%20be%20able%20to%20view%20another%20user&apos;s%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a7fe7723195e0fd574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54531-an-app-may-be-able-to-bypass-kaslr--c2e618e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54531%3A%20An%20app%20may%20be%20able%20to%20bypass%20kASLR%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef435043901e82cb3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54474-an-app-may-be-able-to-access-user-s-4cdb1588</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54474%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092eed35043901e82cb132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44225-an-app-may-be-able-to-gain-elevated-872afff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44225%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a5fe7723195e0fd3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44224-a-malicious-app-may-be-able-to-gain-f5f9d3f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44224%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a5fe7723195e0fd39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54526-a-malicious-app-may-be-able-to-acce-15ebd7b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54526%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef435043901e82cb39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44290-an-app-may-be-able-to-determine-a-u-8b6f9309</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44290%3A%20An%20app%20may%20be%20able%20to%20determine%20a%20user%E2%80%99s%20current%20location%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb82fe6bfc5ba1df6ed4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54506-an-attacker-may-be-able-to-cause-un-0e0731eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54506%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20arbitrary%20code%20execution%20in%20DCP%20firmware%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092ef235043901e82cb292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54510-an-app-may-be-able-to-leak-sensitiv-b5da6cb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54510%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef435043901e82cb371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44300-an-app-may-be-able-to-access-protec-65ac49db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44300%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7635043901e828b26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44245-an-app-may-be-able-to-cause-unexpec-7198dfd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44245%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a7fe7723195e0fd559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54479-processing-maliciously-crafted-web--75b9f800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54479%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=high&amp;id=69092eef35043901e82cb1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44212-cookies-belonging-to-one-origin-may-7a3ca779</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44212%3A%20Cookies%20belonging%20to%20one%20origin%20may%20be%20sent%20to%20another%20origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54491-a-malicious-application-may-be-able-a1582d84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54491%3A%20A%20malicious%20application%20may%20be%20able%20to%20determine%20a%20user&apos;s%20current%20location%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef035043901e82cb218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44242-an-attacker-may-be-able-to-cause-un-f55a7982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44242%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20arbitrary%20code%20execution%20in%20DCP%20firmware%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb82ee6bfc5ba1df6ed1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54501-processing-a-maliciously-crafted-fi-369b1ecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54501%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial%20of%20service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef235043901e82cb26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54500-processing-a-maliciously-crafted-im-7f0fbf6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54500%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef235043901e82cb25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44243-an-app-may-be-able-to-modify-protec-4d8b5082</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44243%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=6909214ffe7723195e054671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54490-a-local-attacker-may-gain-access-to-82954deb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54490%3A%20A%20local%20attacker%20may%20gain%20access%20to%20user&apos;s%20Keychain%20items%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092ef035043901e82cb214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54486-processing-a-maliciously-crafted-fo-4d3479f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54486%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092ef035043901e82cb1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54465-an-app-may-be-able-to-elevate-privi-b95e79f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54465%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=critical&amp;id=69092eed35043901e82cb126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11872-cwe-276-incorrect-default-permissio-042ebec3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11872%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Epic%20Games%20Epic%20Games%20Launcher&amp;severity=high&amp;id=699f6e23b7ef31ef0b5968fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11949-cwe-502-deserialization-of-untruste-35e8dcdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11949%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=699f6e29b7ef31ef0b596fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11948-cwe-1395-dependency-on-vulnerable-t-d9cd3cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11948%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20GFI%20Archiver&amp;severity=critical&amp;id=699f6e28b7ef31ef0b596f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11947-cwe-502-deserialization-of-untruste-3545ff3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11947%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GFI%20Archiver&amp;severity=high&amp;id=699f6e28b7ef31ef0b596f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11950-cwe-191-integer-underflow-wrap-or-w-567b468d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11950%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20XnSoft%20XnView%20Classic&amp;severity=high&amp;id=699f6e29b7ef31ef0b596feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28141-cwe-352-cross-site-request-forgery--3d64bde5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28141%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092621fe7723195e0b46f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28140-cwe-250-execution-with-unnecessary--5c65a3fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28140%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=medium&amp;id=69092621fe7723195e0b46eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28139-cwe-250-execution-with-unnecessary--6c831dd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28139%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092621fe7723195e0b46e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11351-cwe-200-exposure-of-sensitive-infor-106b0d03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11351%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tickera%20Restrict%20%E2%80%93%20membership%2C%20site%2C%20content%20and%20user%20access%20restrictions%20for%20WordPress&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12325-cwe-79-improper-neutralization-of-i-4fe09e05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12325%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20morehawes%20Waymark&amp;severity=medium&amp;id=699f6e37b7ef31ef0b597edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12294-cwe-284-improper-access-control-in--ef9af6a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12294%3A%20CWE-284%20Improper%20Access%20Control%20in%20jottlieb%20Last%20Viewed%20Posts%20by%20WPBeginner&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11840-cwe-862-missing-authorization-in-sh-5aa8ab4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11840%3A%20CWE-862%20Missing%20Authorization%20in%20shakee93%20RapidLoad%20%E2%80%93%20Optimize%20Web%20Vitals%20Automatically&amp;severity=high&amp;id=699f6e22b7ef31ef0b596823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11008-cwe-200-exposure-of-sensitive-infor-9a74e9ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11008%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20supercleanse%20Members%20%E2%80%93%20Membership%20%26%20User%20Role%20Editor%20Plugin&amp;severity=medium&amp;id=699f6e04b7ef31ef0b5939d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54269-missing-authorization-in-ninja-team-bfc74592</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54269%3A%20Missing%20Authorization%20in%20Ninja%20Team%20Notibar&amp;severity=null&amp;id=69cd758be6bfc5ba1df0617a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12283-cwe-79-improper-neutralization-of-i-efcd97f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20WP%20Pipes&amp;severity=medium&amp;id=699f6e35b7ef31ef0b597c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12004-cwe-352-cross-site-request-forgery--273bc575</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12004%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpclever%20WPC%20Order%20Notes%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b59709f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55884-na-718950f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55884%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd2b7ef31ef0b55b2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55587-na-86696c27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55587%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-11-f12112</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49105-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-bd623d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49105%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd623d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49138-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd62f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49138%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49128-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-bd62e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49128%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd62e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49127-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd62e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49127%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49118-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd62a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49118%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49116-cwe-416-use-after-free-in-microsoft-windows-server-2019-bd629c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49116%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd629c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49114-cwe-820-missing-synchronization-in-microsoft-windows-10-version-1809-bd6294</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49114%3A%20CWE-820%3A%20Missing%20Synchronization%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49113-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd6283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49113%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49112-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bd627b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49112%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682d9815c4522896dcbd627b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49110-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd625e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49110%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd625e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49109-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd624f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49109%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd624f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49095-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-bd61e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49095%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd61e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49090-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-server-2025-bd61aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49090%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=682d9815c4522896dcbd61aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49088-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-bd61a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49088%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd61a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49083-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd6185</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49083%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49082-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-microsoft-windows-10-version-1809-bd6172</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49082%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49081-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd616a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49081%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd616a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49080-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd6151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49080%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49079-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd614d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49079%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd614d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49078-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bd6149</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49078%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49077-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bd6145</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49077%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49076-cwe-287-improper-authentication-in-microsoft-windows-10-version-1809-bd6141</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49076%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49075-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-bd6130</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49075%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49072-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd610f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49072%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd610f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49065-cwe-125-out-of-bounds-read-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bd60df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49065%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=682d9815c4522896dcbd60df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49063-cwe-502-deserialization-of-untrusted-data-in-microsoft-muzic-bd60d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49063%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Muzic&amp;severity=high&amp;id=682d9815c4522896dcbd60d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49062-cwe-23-relative-path-traversal-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bd60d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49062%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=682d9815c4522896dcbd60d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43600-cwe-284-improper-access-control-in-microsoft-microsoft-office-2016-bd60b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43600%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Office%202016&amp;severity=high&amp;id=682d9815c4522896dcbd60b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49142-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-bd630c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49142%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d9815c4522896dcbd630c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49132-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-bd62ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49132%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49129-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-bd62ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49129%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd62ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49126-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd62de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49126%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49125-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-bd62da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49125%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd62da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49124-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-10-version-1809-bd62d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49124%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49123-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-bd62d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49123%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49122-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd62ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49122%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49121-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-bd62b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49121%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd62b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49120-cwe-453-insecure-default-variable-initialization-in-microsoft-windows-server-2019-bd62ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49120%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd62ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49119-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-server-2019-bd62a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49119%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd62a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49117-cwe-393-return-of-wrong-status-code-in-microsoft-windows-server-2022-bd62a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49117%3A%20CWE-393%3A%20Return%20of%20Wrong%20Status%20Code%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9815c4522896dcbd62a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49115-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-bd6298</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49115%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd6298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49111-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd6260</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49111%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49108-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-bd624b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49108%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49107-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-bd6245</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49107%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49106-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-bd6241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49106%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd6241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49104-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd6239</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49104%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49103-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bd6237</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49103%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49102-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd6228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49102%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49101-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd6209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49101%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49099-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd6201</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49099%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49098-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd61fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49098%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd61fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49097-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-bd61ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49097%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd61ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49096-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-bd61ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49096%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd61ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49094-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd61e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49094%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd61e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49093-cwe-681-incorrect-conversion-between-numeric-types-in-microsoft-windows-server-2025-bd61de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49093%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=682d9815c4522896dcbd61de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49092-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd61cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49092%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd61cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49091-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2019-bd61c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49091%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd61c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49089-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bd61a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49089%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd61a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49087-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bd619e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49087%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd619e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49086-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-bd619a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49086%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd619a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49085-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2019-bd6196</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49085%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9815c4522896dcbd6196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49084-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-10-version-1809-bd6189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49084%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49074-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd6128</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49074%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9815c4522896dcbd6128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49073-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bd6120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49073%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9815c4522896dcbd6120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49070-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bd60eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49070%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d9815c4522896dcbd60eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49069-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-bd60e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49069%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d9815c4522896dcbd60e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49068-cwe-284-improper-access-control-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bd60e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49068%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d9815c4522896dcbd60e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49064-cwe-611-improper-restriction-of-xml-external-entity-reference-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bd60db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49064%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=682d9815c4522896dcbd60db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49059-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-office-2019-bd60cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49059%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d9815c4522896dcbd60cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49057-cwe-20-improper-input-validation-in-microsoft-microsoft-defender-for-endpoint-for-android-bd60cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49057%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Android&amp;severity=high&amp;id=682d9815c4522896dcbd60cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43594-cwe-284-improper-access-control-in-microsoft-microsoft-system-center-2022-bd60b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43594%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20System%20Center%202022&amp;severity=high&amp;id=682d9815c4522896dcbd60b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55548-cwe-703-improper-check-or-handling--9ca3c0fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55548%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20ORing%20IAP-420&amp;severity=medium&amp;id=6909325735043901e8309918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55547-cwe-77-improper-neutralization-of-s-0e2954d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55547%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ORing%20IAP-420&amp;severity=critical&amp;id=6909325735043901e8309914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55546-cwe-79-improper-neutralization-of-i-2469cadf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ORing%20IAP-420&amp;severity=high&amp;id=6909325735043901e8309910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55545-cwe-79-improper-neutralization-of-i-f8635fdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55545%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20ORing%20IAP-420&amp;severity=high&amp;id=6909325735043901e830990c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55544-cwe-77-improper-neutralization-of-s-70c48d90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55544%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20ORing%20IAP-420&amp;severity=high&amp;id=68e63093859c29afa3a63e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12323-cwe-79-improper-neutralization-of-i-b5e6030f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dueclic%20turboSMTP&amp;severity=medium&amp;id=699f6e36b7ef31ef0b597dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53832-cwe-522-insufficiently-protected-cr-033aad93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53832%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=medium&amp;id=690916c8c28fd46ded7ccf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52051-cwe-20-improper-input-validation-in-0aebc704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52051%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20S7-PLCSIM%20V17&amp;severity=high&amp;id=6938009429016b16de45ff63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49849-cwe-502-deserialization-of-untruste-e4711ede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49849%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20S7-PLCSIM%20V16&amp;severity=high&amp;id=6938009429016b16de45ff60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11868-cwe-284-improper-access-control-in--14f50e4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11868%3A%20CWE-284%20Improper%20Access%20Control%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10959-cwe-94-improper-control-of-generati-96d1af71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10959%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Use%20constructor%20to%20create%20tables&amp;severity=high&amp;id=699f6e04b7ef31ef0b5939b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11106-cwe-200-exposure-of-sensitive-infor-fb121eb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11106%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpchill%20Simple%20Restrict&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11928-cwe-79-improper-neutralization-of-i-940db147</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11928%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20iChart%20%E2%80%93%20Easy%20Charts%20and%20Graphs&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11945-cwe-79-improper-neutralization-of-i-e7115425</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11945%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20Email%20Reminders&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11973-cwe-79-improper-neutralization-of-i-adb09924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11973%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karim42%20Quran%20multilanguage%20Text%20%26%20Audio&amp;severity=medium&amp;id=699f6e29b7ef31ef0b596ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11940-cwe-79-improper-neutralization-of-i-cbf60b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11940%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20propertyhive%20Property%20Hive%20Mortgage%20Calculator&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47946-cwe-434-unrestricted-upload-of-file-c09dfd64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47946%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092ee835043901e82caaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28138-cwe-78-improper-neutralization-of-s-935f4a0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28138%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Image%20Access%20GmbH%20Scan2Net&amp;severity=high&amp;id=69092621fe7723195e0b46e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11205-cwe-862-missing-authorization-in-sm-8778c920</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11205%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20WPForms%20%E2%80%93%20Easy%20Form%20Builder%20for%20WordPress%20%E2%80%93%20Contact%20Forms%2C%20Payment%20Forms%2C%20Surveys%2C%20%26%20More&amp;severity=high&amp;id=699f6e0ab7ef31ef0b59413f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46657-na-958c334d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46657%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46442-na-92595add</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46442%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56ac5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46341-na-cff156a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46341%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45494-na-6d65bbee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45494%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45493-na-670f6cbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45493%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55586-na-184f7e96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55586%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd2b7ef31ef0b55b2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55500-na-3f950d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55500%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd0b7ef31ef0b55b20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54751-na-84a964d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54751%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55ad65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53919-na-1747411f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53919%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc2b7ef31ef0b55ab7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53552-na-9ba09d99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53552%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbfb7ef31ef0b55a9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53481-na-cc2159b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53481%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53480-na-eeb2e96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53480%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbeb7ef31ef0b55a954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51165-na-f5b5622a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51165%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b558887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50931-na-073457f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50931%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b557659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50930-na-e2592905</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50930%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b557656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50929-na-94fcdd6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50929%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b557653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50928-na-5933de0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50928%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b557650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50924-na-eebe5723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50924%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50921-na-a14c4a8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50921%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b5575f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50920-na-78d4dfee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50920%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b5575f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50699-na-f4fe6bac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50699%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b557406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55550-na-da3af5ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55550%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9b6247d717aace26c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-10-83516610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-10&amp;severity=medium&amp;id=68367c97182aa0cae231b0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild-2cf3d6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Advisory%3A%20Oh%20No%20Cleo!%20Cleo%20Software%20Actively%20Being%20Exploited%20in%20the%20Wild&amp;severity=low&amp;id=682c7dbfe8347ec82d2cf3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-10-f28ed9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-10&amp;severity=medium&amp;id=682acdc5bbaf20d303f28ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-10-f128d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f128d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12369-insufficient-verification-of-data-a-c8527d7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12369%3A%20Insufficient%20Verification%20of%20Data%20Authenticity&amp;severity=medium&amp;id=68e0f3c0b66c7f7acdd3d07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53814-exposure-of-sensitive-system-inform-d35a1624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53814%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Adnan%20Analytify&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54218-missing-authorization-in-thehp-aio--e94882e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54218%3A%20Missing%20Authorization%20in%20thehp%20AIO%20Contact&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52385-improper-control-of-filename-for-in-32f425dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52385%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpmart%20Team%20Member&amp;severity=null&amp;id=69cd7540e6bfc5ba1df03993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52480-missing-authorization-in-astoundify-5058ffe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52480%3A%20Missing%20Authorization%20in%20Astoundify%20Jobify&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53816-missing-authorization-in-themeum-tu-69441980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53816%3A%20Missing%20Authorization%20in%20Themeum%20Tutor%20LMS%20Elementor%20Addons&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54217-missing-authorization-in-reputeinfo-3c686d37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54217%3A%20Missing%20Authorization%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53791-improper-neutralization-of-input-du-e6268994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53791%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ogun%20Labs%20Lenxel%20Core%20for%20Lenxel(LNX)%20LMS&amp;severity=null&amp;id=69cd756ee6bfc5ba1df05988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53798-missing-authorization-in-bakkbone-a-98dce292</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53798%3A%20Missing%20Authorization%20in%20BAKKBONE%20Australia%20FloristPress&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53818-improper-neutralization-of-input-du-d07431ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53818%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPXPO%20PostX&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54219-improper-neutralization-of-input-du-d49e1983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54219%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehp%20AIO%20Contact&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54220-improper-neutralization-of-input-du-0f4869a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54220%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20roninwp%20FAT%20Services%20Booking&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54253-improper-neutralization-of-input-du-4934664a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54253%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xpro%20Xpro%20Elementor%20Addons&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54254-missing-authorization-in-kofi-mokom-05a818ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54254%3A%20Missing%20Authorization%20in%20Kofi%20Mokome%20Message%20Filter%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53819-missing-authorization-in-boldgrid-c-092f0d45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53819%3A%20Missing%20Authorization%20in%20BoldGrid%20Client%20Invoicing%20by%20Sprout%20Invoices&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54215-improper-neutralization-of-special--b9e6ba6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54215%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roninwp%20Revy&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53790-improper-limitation-of-a-pathname-t-c53be16c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53790%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ogun%20Labs%20Lenxel%20Core%20for%20Lenxel(LNX)%20LMS&amp;severity=null&amp;id=69cd756ee6bfc5ba1df05985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43222-missing-authorization-in-seventhque-b6784c81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43222%3A%20Missing%20Authorization%20in%20SeventhQueen%20Sweet%20Date&amp;severity=null&amp;id=69cd746be6bfc5ba1def71e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54227-missing-authorization-in-dotstore-m-37414bcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54227%3A%20Missing%20Authorization%20in%20Dotstore%20Minimum%20and%20Maximum%20Quantity%20for%20WooCommerce&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54251-missing-authorization-in-prodigycom-7d8f98d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54251%3A%20Missing%20Authorization%20in%20prodigycommerce%20Prodigy%20Commerce&amp;severity=null&amp;id=69cd7586e6bfc5ba1df06018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54224-improper-neutralization-of-input-du-da512281</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54228-improper-neutralization-of-input-du-8cef2d9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weboccult%20Technologies%20Pvt%20Ltd%20Wot%20Elementor%20Widgets&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54230-improper-neutralization-of-input-du-6ed8ab93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54230%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Masud%20Hasan%20Unlock%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54232-improper-neutralization-of-input-du-44540e2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RRDevs%20RRAddons%20for%20Elementor&amp;severity=null&amp;id=69cd7585e6bfc5ba1df05f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54260-improper-neutralization-of-input-du-92a1e9ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54260%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54226-cross-site-request-forgery-csrf-in--ee9ac677</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54226%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20karlkiesinger%20Country%20Blocker&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54255-url-redirection-to-untrusted-site-o-f95bd5f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54255%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20aviplugins.com%20Login%20Widget%20With%20Shortcode&amp;severity=null&amp;id=69cd7588e6bfc5ba1df060cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54225-improper-control-of-filename-for-in-a9127d95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54225%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codegearthemes%20Designer&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54223-improper-neutralization-of-script-r-a9b7d9fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54223%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20reputeinfosystems%20ARForms%20Form%20Builder&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46547-na-7c14bb14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46547%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56c3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46455-na-2e2d517f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46455%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56ac6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40583-na-1ac5f31b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40583%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cafb7ef31ef0b56805d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40582-na-6269c363</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40582%3A%20n%2Fa&amp;severity=high&amp;id=699f6cafb7ef31ef0b568058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55582-na-3a9a44b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55582%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd2b7ef31ef0b55b2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55580-na-ac3b75a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55580%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55579-na-5945c7c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55579%3A%20n%2Fa&amp;severity=high&amp;id=699f6bd2b7ef31ef0b55b2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55578-na-c066659e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55578%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bd0b7ef31ef0b55b28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55564-na-3f729d0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55564%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54938-na-5306bc8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54938%3A%20n%2Fa&amp;severity=high&amp;id=699f6bcab7ef31ef0b55af2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54936-na-b8413ef7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54936%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54935-na-96e0024a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54935%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bcab7ef31ef0b55af26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54934-na-f1114ee7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54934%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54933-na-10dcf7f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54933%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54932-na-841d71c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54932%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54931-na-10a13b5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54931%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bcab7ef31ef0b55af1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54930-na-effced56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54930%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54928-na-cff8fedd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54928%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55aec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54927-na-d40e1dc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54927%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc8b7ef31ef0b55aec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54926-na-8f04d436</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54926%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54925-na-88c3939d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54925%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54924-na-2134c46f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54924%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aeba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54923-na-469a175e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54923%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54922-na-99b1c78e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54922%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54921-na-708fba82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54921%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55aeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54919-na-81f0e52c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54919%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc8b7ef31ef0b55aeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54918-na-d6a2b81c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54918%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc8b7ef31ef0b55ae55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53450-na-1b826ac9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53450%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53441-na-c82353ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53441%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbeb7ef31ef0b55a8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50628-na-5841e3be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50628%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b5572a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50627-na-5f041700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50627%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b5572a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50626-na-1f12be5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50626%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b55729b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50625-na-4c2c6e7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50625%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b557296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55565-na-4e42ebcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55565%3A%20n%2Fa&amp;severity=medium&amp;id=6909325735043901e830991c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-09-f12a0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12209-cwe-98-improper-control-of-filename-8ddcc1ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12209%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wphealth%20WP%20Umbrella%3A%20Update%20Backup%20Restore%20%26%20Monitoring&amp;severity=critical&amp;id=699f6e31b7ef31ef0b597854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55560-na-cbbd43cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55560%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bd0b7ef31ef0b55b283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-08-f12f9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11457-cwe-79-improper-neutralization-of-i-ab85e2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spartac%20Feedpress%20Generator%20%E2%80%93%20External%20RSS%20Frontend%20Customizer&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11380-cwe-79-improper-neutralization-of-i-14f8cdb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11380%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imahui%20Mini%20Program%20API&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11501-cwe-502-deserialization-of-untruste-f2e8b7f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11501%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdzier%20Gallery&amp;severity=high&amp;id=699f6e18b7ef31ef0b5950e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11464-cwe-79-improper-neutralization-of-i-e82ded83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11464%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alphabposervice%20Easy%20Code%20Snippets&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12128-cwe-79-improper-neutralization-of-i-4bf671a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nshowketgmailcom%20Simple%20Ecommerce%20Shopping%20Cart%20Plugin-%20Sell%20products%20through%20Paypal&amp;severity=medium&amp;id=699f6e2eb7ef31ef0b59759a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11010-cwe-22-improper-limitation-of-a-pat-b45bb1d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11010%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softaculous%20FileOrganizer%20%E2%80%93%20Manage%20WordPress%20and%20Website%20Files&amp;severity=high&amp;id=699f6e04b7ef31ef0b5939d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11367-cwe-79-improper-neutralization-of-i-6f97cf7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20matansmoove%20Smoove%20connector%20for%20Elementor%20forms&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12270-cwe-89-improper-neutralization-of-s-010203c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12270%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jonathandejong%20Beautiful%20taxonomy%20filters&amp;severity=high&amp;id=699f6e35b7ef31ef0b597c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11374-cwe-79-improper-neutralization-of-i-f1206a2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11374%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rezaplus%20TWChat%20%E2%80%93%20Send%20or%20receive%20messages%20from%20users&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12253-cwe-862-missing-authorization-in-ns-42f81ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12253%3A%20CWE-862%20Missing%20Authorization%20in%20nshowketgmailcom%20Simple%20Ecommerce%20Shopping%20Cart%20Plugin-%20Sell%20products%20through%20Paypal&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53143-vulnerability-in-linux-linux-bded2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7894-cwe-862-missing-authorization-in-and-b8e1aef8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7894%3A%20CWE-862%20Missing%20Authorization%20in%20andreiigna%20If%20Menu%20%E2%80%93%20Visibility%20control%20for%20Menus&amp;severity=medium&amp;id=699f6c20b7ef31ef0b5603e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8679-cwe-89-improper-neutralization-of-sp-3c3c603d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8679%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20owthub%20Library%20Management%20System%20%E2%80%93%20Manage%20e-Digital%20Books%20Library&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12115-cwe-352-cross-site-request-forgery--9ccc454f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12115%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59750b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12167-cwe-79-improper-neutralization-of-i-d1d6172a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmorillas1%20Shortcodes%20Blocks%20Creator%20Ultimate&amp;severity=medium&amp;id=699f6e30b7ef31ef0b597777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12165-cwe-79-improper-neutralization-of-i-90ddeae4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12165%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tsjippy%20Mollie%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59776a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11353-cwe-862-missing-authorization-in-cl-46ed683f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11353%3A%20CWE-862%20Missing%20Authorization%20in%20clicksend%20SMS%20for%20Lead%20Capture%20Forms&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12257-cwe-79-improper-neutralization-of-i-a3eb9977</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12257%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cardgate%20CardGate%20Payments%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e33b7ef31ef0b597a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11904-cwe-79-improper-neutralization-of-i-29ff3543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11904%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12026-cwe-862-missing-authorization-in-ko-3fa57e92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12026%3A%20CWE-862%20Missing%20Authorization%20in%20kofimokome%20Message%20Filter%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12166-cwe-79-improper-neutralization-of-i-2781b23e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12166%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmorillas1%20Shortcodes%20Blocks%20Creator%20Ultimate&amp;severity=medium&amp;id=699f6e30b7ef31ef0b59776e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11451-cwe-79-improper-neutralization-of-i-3ab679d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harshitpeer%20Zooom&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11943-cwe-79-improper-neutralization-of-i-ba5bd0a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e28b7ef31ef0b596f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10046-cwe-79-improper-neutralization-of-i-96b9484f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20persianscript%20%D8%A7%D9%81%D8%B2%D9%88%D9%86%D9%87%20%D9%BE%DB%8C%D8%A7%D9%85%DA%A9%20%D9%88%D9%88%DA%A9%D8%A7%D9%85%D8%B1%D8%B3%20Persian%20WooCommerce%20SMS&amp;severity=medium&amp;id=699f6decb7ef31ef0b590b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11436-cwe-79-improper-neutralization-of-i-cd5c918f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20genetechproducts%20Drag%20%26%20Drop%20Builder%2C%20Human%20Face%20Detector%2C%20Pre-built%20Templates%2C%20Spam%20Protection%2C%20User%20Email%20Notifications%20%26%20more!&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11329-cwe-79-improper-neutralization-of-i-b9b746ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20comfino%20Comfino%20Payment%20Gateway&amp;severity=medium&amp;id=699f6e0db7ef31ef0b594501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53473-na-e3569f02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53473%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-07-b2e48b6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-07&amp;severity=medium&amp;id=68367c97182aa0cae2319b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-07-f26d30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-07&amp;severity=medium&amp;id=682acdc4bbaf20d303f26d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-07-f124f8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f124f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11738-uncaught-exception-2d8f59c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11738%3A%20Uncaught%20Exception&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4633-cwe-79-improper-neutralization-of-in-9896afa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Slider%20%26%20Popup%20Builder%20by%20Depicter%20%E2%80%93%20Add%20Image%20Slider%2C%20Carousel%20Slider%2C%20Exit%20Intent%20Popup%2C%20Popup%20Modal%2C%20Coupon%20Popup%2C%20Post%20Slider%20Carousel&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10516-cwe-22-improper-limitation-of-a-pat-98fdc518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10516%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20swte%20Swift%20Performance%20Lite&amp;severity=high&amp;id=699f6df4b7ef31ef0b5914dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53826-missing-authorization-in-wpsight-wp-04110f30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53826%3A%20Missing%20Authorization%20in%20WPSight%20WPCasa&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53795-missing-authorization-in-andymoyle--84876a1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53795%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53799-missing-authorization-in-bakkbone-a-099ddfd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53799%3A%20Missing%20Authorization%20in%20BAKKBONE%20Australia%20FloristPress&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53803-missing-authorization-in-brandtoss--dcac1982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53803%3A%20Missing%20Authorization%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53810-missing-authorization-in-n-media-si-c8663431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53810%3A%20Missing%20Authorization%20in%20N-Media%20Simple%20User%20Registration&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53825-missing-authorization-in-ninja-team-d848b1c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53825%3A%20Missing%20Authorization%20in%20Ninja%20Team%20Filebird&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53794-improper-neutralization-of-input-du-aeef4fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryo%20Arkhe%20Blocks&amp;severity=null&amp;id=69cd756ee6bfc5ba1df05991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53796-improper-neutralization-of-input-du-eb35ddc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53801-improper-neutralization-of-input-du-ef122a13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53802-improper-neutralization-of-input-du-eea8cf88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53802%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FuturioWP%20Futurio%20Extra&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53812-improper-neutralization-of-input-du-584ae4b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacques%20Malgrange%20WP%20GeoNames&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53820-improper-neutralization-of-input-du-1edd1566</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53820%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20captivateaudio%20Captivate%20Sync&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53823-improper-neutralization-of-input-du-34692d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54206-improper-neutralization-of-input-du-45812155</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54206%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20URBAN%20BASE%20Z-Downloads&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54207-improper-neutralization-of-input-du-f476acb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54207%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Marka%20WordPress%20Auction%20Plugin&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54208-improper-neutralization-of-input-du-154ca8bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54208%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joni%20Halabi%20Block%20Controller&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54209-improper-neutralization-of-input-du-fadbac48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54209%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20Awesome%20Shortcodes&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54210-improper-neutralization-of-input-du-5af13842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54210%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codexshaper%20Advanced%20Element%20Bucket%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54211-improper-neutralization-of-input-du-4fda3a41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54211%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visualmodo%20Borderless&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54212-improper-neutralization-of-input-du-21a7bff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54212%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Magical%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54205-cross-site-request-forgery-csrf-in--d7982e5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54205%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Paloma%20Paloma%20Widget&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51615-improper-neutralization-of-special--9ba24050</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51615%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Marka%20WordPress%20Auction%20Plugin&amp;severity=null&amp;id=69cd750ae6bfc5ba1df0268c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54214-unrestricted-upload-of-file-with-da-19488c67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54214%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20roninwp%20Revy&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54216-path-traversal-in-reputeinfosystems-7b14a94a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54216%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd7580e6bfc5ba1df05d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51815-improper-control-of-generation-of-c-6aefd397</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51815%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cristi%C3%A1n%20L%C3%A1vaque%20s2Member&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53806-missing-authorization-in-yonifre-ma-029be659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53806%3A%20Missing%20Authorization%20in%20yonifre%20Maspik%20%E2%80%93%20Spam%20blacklist&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53809-cross-site-request-forgery-csrf-in--8cc2c039</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53809%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53807-improper-neutralization-of-special--133a2632</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53807%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd757be6bfc5ba1df05be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53808-improper-neutralization-of-special--07fcf671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53808%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Basix%20NEX-Forms&amp;severity=null&amp;id=69cd757be6bfc5ba1df05be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53815-improper-neutralization-of-special--db999cf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53815%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53817-improper-neutralization-of-special--b0adfe90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53817%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20acowebs%20Product%20Labels%20For%20Woocommerce&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53804-insertion-of-sensitive-information--a11fa66c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53804%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53811-unrestricted-upload-of-file-with-da-21143c2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53811%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20POSIMYTH%20WDesignkit&amp;severity=null&amp;id=69cd757be6bfc5ba1df05bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53824-improper-control-of-filename-for-in-f6f7de61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53824%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20all_bootstrap_blocks%20All%20Bootstrap%20Blocks&amp;severity=null&amp;id=69cd757ce6bfc5ba1df05c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53805-missing-authorization-in-brandtoss--b1f15389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53805%3A%20Missing%20Authorization%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd7571e6bfc5ba1df05a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10771-cwe-94-improper-control-of-generati-a5cd4104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10771%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SICK%20AG%20SICK%20InspectorP61x&amp;severity=high&amp;id=6960d0d3ecefc3cd7c1b8616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11729-cwe-89-improper-neutralization-of-s-fbe539d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11729%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b59546e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11730-cwe-89-improper-neutralization-of-s-9e4ec155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11730%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b595472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53142-vulnerability-in-linux-linux-bded19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9823c4522896dcbded19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53141-vulnerability-in-linux-linux-bded15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10681-cwe-94-improper-control-of-generati-62b10259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10681%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20reputeinfosystems%20ARMember%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11460-cwe-89-improper-neutralization-of-s-c7ab72c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11460%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pictureplanet%20Verowa%20Connect&amp;severity=high&amp;id=699f6e16b7ef31ef0b594f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11289-cwe-98-improper-control-of-filename-c238cc67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11289%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pencidesign%20Soledad&amp;severity=high&amp;id=699f6e0cb7ef31ef0b5943e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11728-cwe-89-improper-neutralization-of-s-885fac6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11728%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20iqonicdesign%20KiviCare%20%E2%80%93%20Clinic%20%26%20Patient%20Management%20System%20(EHR)&amp;severity=high&amp;id=699f6e1bb7ef31ef0b59545c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10909-cwe-94-improper-control-of-generati-2c4227e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10909%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kingyes%20Pojo%20Forms&amp;severity=medium&amp;id=699f6e03b7ef31ef0b5938e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11339-cwe-79-improper-neutralization-of-i-8c48b13c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11339%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devnethr%20Smart%20PopUp%20Blaster&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10689-cwe-639-authorization-bypass-throug-71d917ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10689%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webangon%20XLTab%20%E2%80%93%20Accordions%20and%20Tabs%20for%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10692-cwe-639-authorization-bypass-throug-4102ee5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10692%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ideaboxcreations%20PowerPack%20Elementor%20Addons%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6dfbb7ef31ef0b59236d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11204-cwe-79-improper-neutralization-of-i-1fb79194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20ForumWP%20%E2%80%93%20Forum%20%26%20Discussion%20Board&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b594135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12155-cwe-862-missing-authorization-in-ma-d8eb59ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12155%3A%20CWE-862%20Missing%20Authorization%20in%20matthias-reuter%20SV100%20Companion&amp;severity=critical&amp;id=699f6e30b7ef31ef0b59768d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11823-cwe-79-improper-neutralization-of-i-ea86185b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vjalby%20Folder%20Gallery&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11687-cwe-79-improper-neutralization-of-i-18bfccc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martinnguyen1990%20Next-Cart%20Store%20to%20WooCommerce%20Migration&amp;severity=medium&amp;id=699f6e19b7ef31ef0b595252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9706-cwe-862-missing-authorization-in-rst-e9c87c61</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9706%3A%20CWE-862%20Missing%20Authorization%20in%20rstheme2017%20Ultimate%20Coming%20Soon%20%26%20Maintenance&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11352-cwe-79-improper-neutralization-of-i-67311607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11352%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cs123%20TwentyTwenty&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12028-cwe-862-missing-authorization-in-ak-7ce3ff10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12028%3A%20CWE-862%20Missing%20Authorization%20in%20akirk%20Friends&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9872-cwe-79-improper-neutralization-of-in-361543e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12110-cwe-862-missing-authorization-in-je-e64d9651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12110%3A%20CWE-862%20Missing%20Authorization%20in%20jerryscg%20Gold%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5974ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10320-cwe-79-improper-neutralization-of-i-8646bd39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iamjonasmarlo%20Cookielay&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11450-cwe-79-improper-neutralization-of-i-be564299</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onlyoffice%20ONLYOFFICE%20Docs&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11276-cwe-79-improper-neutralization-of-i-2ff69df3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edgarrojas%20PDF%20Builder%20for%20WooCommerce.%20Create%20invoices%2Cpacking%20slips%20and%20more&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b5942f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11368-cwe-79-improper-neutralization-of-i-92889c6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nanard33%20Splash%20Sync&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11336-cwe-352-cross-site-request-forgery--9106ef75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11336%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dactum%20Clickbank%20WordPress%20Plugin%20(Storefront)&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12027-cwe-862-missing-authorization-in-ko-a6aed700</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12027%3A%20CWE-862%20Missing%20Authorization%20in%20kofimokome%20Message%20Filter%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6e2ab7ef31ef0b5970d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11323-cwe-862-missing-authorization-in-ke-f85d2716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11323%3A%20CWE-862%20Missing%20Authorization%20in%20kekotron%20AI%20Quiz%20%7C%20Quiz%20Maker&amp;severity=high&amp;id=699f6e0db7ef31ef0b5944e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9866-cwe-79-improper-neutralization-of-in-5332a6ff</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sasonikolov%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9705-cwe-862-missing-authorization-in-rst-75a2e019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9705%3A%20CWE-862%20Missing%20Authorization%20in%20rstheme2017%20Ultimate%20Coming%20Soon%20%26%20Maintenance&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10849-cwe-79-improper-neutralization-of-i-5a25588b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20desertthemes%20NewsMash&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11292-cwe-200-exposure-of-sensitive-infor-8e326a6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11292%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nimeshrmr%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=699f6e0cb7ef31ef0b5943f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11444-cwe-352-cross-site-request-forgery--3a046815</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11444%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cluevo%20CLUEVO%20LMS%2C%20E-Learning%20Platform&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12060-cwe-79-improper-neutralization-of-i-e3ae8ac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20francescosganga%20WP%20Media%20Optimizer%20(.webp)&amp;severity=medium&amp;id=699f6e2bb7ef31ef0b5972c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10879-cwe-79-improper-neutralization-of-i-9111a784</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20ForumWP%20%E2%80%93%20Forum%20%26%20Discussion%20Board&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12003-cwe-352-cross-site-request-forgery--0cc5123d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12003%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mikeyott%20WP%20System&amp;severity=medium&amp;id=699f6e29b7ef31ef0b59700c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11178-cwe-288-authentication-bypass-using-a6a3a4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11178%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20india-web-developer%20Login%20With%20OTP&amp;severity=high&amp;id=699f6e07b7ef31ef0b593e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10578-cwe-434-unrestricted-upload-of-file-9d69c65d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10578%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20blazethemes%20Pubnews&amp;severity=high&amp;id=699f6df6b7ef31ef0b5917a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11585-cwe-22-improper-limitation-of-a-pat-b5dff184</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11585%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nsp-code%20WP%20Hide%20%26%20Security%20Enhancer&amp;severity=high&amp;id=699f6e18b7ef31ef0b595135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11201-cwe-79-improper-neutralization-of-i-91a09758</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpexpertsio%20myCred%20%E2%80%93%20Exclusive%20Platform%20for%20Loyalty%20Points%20and%20Rewards%20%E2%80%93%20Create%20Leaderboards%2C%20Ranks%2C%20Badges%2C%20Cashback%20Coupons%2C%20Referral%20Programs%2C%20WooCommerce%20%26%20eCommerce%20wallet%2C%20Gamification%20Awards%2C%20and%20Achievements.&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b59406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11379-cwe-79-improper-neutralization-of-i-19721324</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edward_plainview%20Broadcast&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10247-cwe-89-improper-neutralization-of-s-98d0a64a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10247%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20totalsoft%20Video%20Gallery%20%E2%80%93%20YouTube%20Gallery%20and%20Vimeo%20Gallery&amp;severity=high&amp;id=699f6defb7ef31ef0b590ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9769-cwe-79-improper-neutralization-of-in-a142349e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20totalsoft%20Video%20Gallery%20%E2%80%93%20YouTube%20Gallery%20and%20Vimeo%20Gallery&amp;severity=medium&amp;id=699f6b5fb7ef31ef0b554bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10836-cwe-79-improper-neutralization-of-i-16d8ad58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10836%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesdaddy%20Flixita&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49041-cwe-449-the-ui-performs-the-wrong-action-in-microsoft-microsoft-edge-chromium-based-bd60c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49041%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9815c4522896dcbd60c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44856-na-bd83793a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44856%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44855-na-56f3a265</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44855%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44854-na-fed4458b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44854%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44853-na-463fcd3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44853%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44852-na-ef455765</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44852%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41650-na-de3217f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41650%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41649-na-3767e43c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41649%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b5689ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41648-na-2c20ec11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41648%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b5689fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41647-na-a272fc10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41647%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b5689f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41646-na-89ad2dd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41646%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b5689f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41645-na-a9146b4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41645%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b5689eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41644-na-bf630ada</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41644%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b5689e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38927-na-b9f459dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38927%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38926-na-115402f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38926%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38925-na-e5cdd4ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38925%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38924-na-dac9a208</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38924%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38923-na-1b07b4b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38923%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38922-na-9cc6d43d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38922%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7cb7ef31ef0b564f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38921-na-7219e060</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38921%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55268-na-79625377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55268%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bceb7ef31ef0b55b0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54750-na-6cfd6584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54750%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55ad62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54749-na-c684a213</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54749%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc6b7ef31ef0b55ad5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54747-na-3c66c131</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54747%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55ad5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54745-na-21f15e92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54745%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc6b7ef31ef0b55ad57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53908-na-a2894ff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53908%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53907-na-94b097a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53907%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc2b7ef31ef0b55aafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50677-na-5845eed8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50677%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b557402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48703-na-cf6d4053</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48703%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-06-f12a9d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11324-cwe-79-improper-neutralization-of-i-489b4024</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bastho%20Accounting%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10777-cwe-639-authorization-bypass-throug-a6761f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10777%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpvibes%20AnyWhere%20Elementor&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10056-cwe-79-improper-neutralization-of-i-9a356739</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyale-vc%20Contact%20Form%20Builder%20by%20vcita&amp;severity=medium&amp;id=699f6decb7ef31ef0b590bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11779-cwe-79-improper-neutralization-of-i-309a3991</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11779%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexvtn%20WIP%20WooCarousel%20Lite&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10848-cwe-79-improper-neutralization-of-i-5eb15fba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20desertthemes%20NewsMunch&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11341-cwe-352-cross-site-request-forgery--489de787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11341%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ecolosites%20Simple%20Redirection&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11420-cwe-79-improper-neutralization-of-i-f183612a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10937-cwe-284-improper-access-control-in--ad40146e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10937%3A%20CWE-284%20Improper%20Access%20Control%20in%20pickplugins%20Related%20Posts%2C%20Inline%20Related%20Posts%2C%20Contextual%20Related%20Posts%2C%20Related%20Content%20By%20PickPlugins&amp;severity=medium&amp;id=699f6e03b7ef31ef0b59391c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11429-cwe-98-improper-control-of-filename-7b9e2e73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11429%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20galdub%20Free%20Responsive%20Testimonials%2C%20Social%20Proof%20Reviews%2C%20and%20Customer%20Reviews%20%E2%80%93%20Stars%20Testimonials&amp;severity=high&amp;id=699f6e13b7ef31ef0b594c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10178-cwe-79-improper-neutralization-of-i-ecd0ed6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gutentor%20Gutentor%20%E2%80%93%20Gutenberg%20Blocks%20%E2%80%93%20Page%20Builder%20for%20Gutenberg%20Editor&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10881-cwe-79-improper-neutralization-of-i-78648a3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10881%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sodah%20LUNA%20RADIO%20PLAYER&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30964-na-01ee3547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30964%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30963-na-7ea015d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30963%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30962-na-2d65bf01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30962%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30961-na-0032858a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30961%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41579-na-5c80257a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41579%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbbb7ef31ef0b568851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38920-na-86d77d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38920%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38910-na-d1ac0f42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38910%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7cb7ef31ef0b564f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37863-na-fc26b894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37863%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c72b7ef31ef0b5641bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37862-na-c8721cfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37862%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b5641b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37861-na-7afc7de4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37861%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c72b7ef31ef0b5641b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37860-na-4cef75f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37860%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b5641aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54679-na-288ce378</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54679%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc6b7ef31ef0b55ad47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53523-na-11c8b03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53523%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbfb7ef31ef0b55a9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53490-na-f15a5c3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53490%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53472-na-e82c02ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53472%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53471-na-e91bdffb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53471%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a8ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53470-na-624381ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53470%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53457-na-1a33adfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53457%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53442-na-e56d452f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53442%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbeb7ef31ef0b55a8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-05-f125f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f125f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54221-improper-neutralization-of-special--4cf5f127</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54221%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20roninwp%20FAT%20Services%20Booking&amp;severity=null&amp;id=69cd7581e6bfc5ba1df05e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11643-cwe-862-missing-authorization-in-al-26c3fb6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11643%3A%20CWE-862%20Missing%20Authorization%20in%20allaccessible%20Accessibility%20by%20AllAccessible&amp;severity=high&amp;id=699f6e18b7ef31ef0b59515a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53140-vulnerability-in-linux-linux-bdd035</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53139-vulnerability-in-linux-linux-bded11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbded11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53138-vulnerability-in-linux-linux-bdfafa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53137-vulnerability-in-linux-linux-bdfaf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53136-vulnerability-in-linux-linux-bdfaee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53135-vulnerability-in-linux-linux-bdfaea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53134-vulnerability-in-linux-linux-bdfad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53133-vulnerability-in-linux-linux-bdfad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53132-vulnerability-in-linux-linux-bdfacd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53131-vulnerability-in-linux-linux-bdfac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53130-vulnerability-in-linux-linux-bdfaa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53129-vulnerability-in-linux-linux-bdfaa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53128-vulnerability-in-linux-linux-bdfa9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9824c4522896dcbdfa9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53127-vulnerability-in-linux-linux-bdd026</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53126-vulnerability-in-linux-linux-bdfa97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53125-vulnerability-in-linux-linux-bdfa95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7488-cwe-190-integer-overflow-or-wraparou-7107bc3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7488%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20RestApp%20Inc.%20Online%20Ordering%20System&amp;severity=medium&amp;id=68ee4b3a509368ccaa76d797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11935-cwe-79-improper-neutralization-of-i-8f698613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11935%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neotrendy%20Email%20Address%20Obfuscation&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8962-cwe-79-improper-neutralization-of-in-a8b3f86b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8962%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11854-cwe-79-improper-neutralization-of-i-9351438a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11854%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webilia%20Listdom%20%E2%80%93%20Business%20Directory%20and%20Classified%20Ads%20Listings%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11814-cwe-79-improper-neutralization-of-i-c27cb7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20Additional%20Custom%20Order%20Status%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11880-cwe-79-improper-neutralization-of-i-a12d3985</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bplugins%20B%20Testimonial%20%E2%80%93%20Testimonial%20plugin%20for%20WP&amp;severity=medium&amp;id=699f6e24b7ef31ef0b596a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5020-cwe-79-improper-neutralization-of-in-57028df7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11952-cwe-22-improper-limitation-of-a-pat-a915eb13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11952%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcodingplace%20Classic%20Addons%20%E2%80%93%20WPBakery%20Page%20Builder&amp;severity=high&amp;id=699f6e29b7ef31ef0b596ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10787-cwe-639-authorization-bypass-throug-b5d45699</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10787%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b59255d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10567-cwe-862-missing-authorization-in-te-c7bd6e50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10567%3A%20CWE-862%20Missing%20Authorization%20in%20templateinvaders%20TI%20WooCommerce%20Wishlist&amp;severity=high&amp;id=699f6df6b7ef31ef0b591791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11903-cwe-79-improper-neutralization-of-i-7c8cee73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timsayshey%20WP%20eCards&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11769-cwe-79-improper-neutralization-of-i-33790d9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11769%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20floristone%20Flower%20Delivery%20by%20Florist%20One&amp;severity=medium&amp;id=699f6e1eb7ef31ef0b596409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11293-cwe-287-improper-authentication-in--3cf663f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11293%3A%20CWE-287%20Improper%20Authentication%20in%20Genetech%20Solutions%20Pie%20Register%20-%20Social%20Sites%20Login%20(Add%20on)&amp;severity=high&amp;id=699f6e0cb7ef31ef0b5943f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10664-cwe-862-missing-authorization-in-co-3aca968e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10664%3A%20CWE-862%20Missing%20Authorization%20in%20codesavory%20Knowledge%20Base%20documentation%20%26%20wiki%20plugin%20%E2%80%93%20BasePress%20Docs&amp;severity=medium&amp;id=699f6df9b7ef31ef0b5919d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11466-cwe-79-improper-neutralization-of-i-3fefd6be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tomasgroulik%20Intro%20Tour%20Tutorial%20DeepPresentation&amp;severity=medium&amp;id=699f6e18b7ef31ef0b5950d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12099-cwe-639-authorization-bypass-throug-b5034760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12099%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20getdollie%20Dollie%20Hub%20%E2%80%93%20Build%20Your%20Own%20WordPress%20Cloud%20Platform&amp;severity=medium&amp;id=699f6e2db7ef31ef0b5973a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10885-cwe-79-improper-neutralization-of-i-f790027b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20searchiq%20SearchIQ%20%E2%80%93%20The%20Search%20Solution&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11807-cwe-79-improper-neutralization-of-i-f64685d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11807%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20calliko%20NPS%20computy&amp;severity=medium&amp;id=699f6e20b7ef31ef0b59666e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11747-cwe-79-improper-neutralization-of-i-64deace0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpenhanced%20Responsive%20Videos&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b5955ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10663-cwe-862-missing-authorization-in-sm-163fe41d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10663%3A%20CWE-862%20Missing%20Authorization%20in%20smarettheme%20Eleblog%20%E2%80%93%20Elementor%20Blog%20And%20Magazine%20Addons&amp;severity=medium&amp;id=699f6df9b7ef31ef0b5919d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11813-cwe-352-cross-site-request-forgery--8e747699</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11813%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aminshah74%20Pulsating%20Chat%20Button&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11897-cwe-79-improper-neutralization-of-i-07687260</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mightyforms%20Contact%20Form%2C%20Survey%20%26%20Form%20Builder%20%E2%80%93%20MightyForms&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11093-cwe-79-improper-neutralization-of-i-38fd0c30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11093%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20burgthaleratsirconic%20SG%20Helper&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10952-cwe-94-improper-control-of-generati-c471dc07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10952%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpkube%20Authors%20List&amp;severity=high&amp;id=699f6e03b7ef31ef0b59392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10587-cwe-502-deserialization-of-untruste-40a53eee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10587%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20funnelforms%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor%20%E2%80%93%20Funnelforms%20Free&amp;severity=high&amp;id=699f6df6b7ef31ef0b59182c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10832-cwe-352-cross-site-request-forgery--01f1ea78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10832%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jooseposti%20Posti%20Shipping&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39219-na-3baa11ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39219%3A%20n%2Fa&amp;severity=high&amp;id=699f6c85b7ef31ef0b565d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39163-na-4496a8df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39163%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565c47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37575-na-b8b0401b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37575%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37574-na-3dbac9c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37574%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54675-na-37e61d55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54675%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55acc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54674-na-345fb53f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54674%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55acc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54664-413cad50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54664&amp;severity=null&amp;id=699f6bc4b7ef31ef0b55acc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54661-cwe-61-unix-symbolic-link-symlink-f-3e5a798f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54661%3A%20CWE-61%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20dest-unreach%20socat&amp;severity=critical&amp;id=699f6bc4b7ef31ef0b55acb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53614-na-6dbb3c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53614%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc0b7ef31ef0b55aa77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52676-na-32229f21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52676%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb7b7ef31ef0b55a553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51210-na-79aae34c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51210%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b558947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50947-na-a87b1090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50947%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b557667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48453-na-4e6888c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48453%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b70b7ef31ef0b55578c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-04-f120bf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f120bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11391-cwe-434-unrestricted-upload-of-file-d30275b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11391%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20modalweb%20Advanced%20File%20Manager&amp;severity=high&amp;id=699f6e12b7ef31ef0b594a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11200-cwe-79-improper-neutralization-of-i-0c868266</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11200%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GoodLayers%20Goodlayers%20Core&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11326-cwe-79-improper-neutralization-of-i-f6ed91be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Campaign%20Monitor%20Forms%20by%20Optin%20Cat&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11782-cwe-79-improper-neutralization-of-i-b6a6208d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11782%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b59649e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-12062-cwe-639-authorization-bypass-throug-e7cfaaee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-12062%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Charity%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6e2db7ef31ef0b59736e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11325-cwe-79-improper-neutralization-of-i-49f2379f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11325%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20AWeber%20Forms%20by%20Optin%20Cat&amp;severity=medium&amp;id=699f6e0db7ef31ef0b5944ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11866-cwe-79-improper-neutralization-of-i-9841c1cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paulnagle%20BMLT%20Tabbed%20Map&amp;severity=medium&amp;id=699f6e23b7ef31ef0b5968e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11844-cwe-862-missing-authorization-in-no-32ec9784</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11844%3A%20CWE-862%20Missing%20Authorization%20in%20northernbeacheswebsites%20IdeaPush&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11732-cwe-89-improper-neutralization-of-s-ca6c9b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11732%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20venutius%20BP%20Profile%20Shortcodes%20Extra&amp;severity=medium&amp;id=699f6e1bb7ef31ef0b59547c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11805-cwe-79-improper-neutralization-of-i-8113407f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11805%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20soraco%20Quick%20License%20Manager%20%E2%80%93%20WooCommerce%20Plugin&amp;severity=medium&amp;id=699f6e20b7ef31ef0b596666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11853-cwe-79-improper-neutralization-of-i-53ea75c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mlaza%20jAlbum%20Bridge&amp;severity=medium&amp;id=699f6e22b7ef31ef0b596839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11461-cwe-79-improper-neutralization-of-i-b7085c57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20taunoh%20Form%20Data%20Collector&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11898-cwe-79-improper-neutralization-of-i-e2b70754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20akashmalik%20Scratch%20%26%20Win%20%E2%80%93%20Giveaways%20and%20Contests.%20Boost%20subscribers%2C%20traffic%2C%20repeat%20visits%2C%20%20referrals%2C%20sales%20and%20more&amp;severity=medium&amp;id=699f6e26b7ef31ef0b596c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11707-cwe-79-improper-neutralization-of-i-c1602733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphocus%20My%20auctions%20allegro&amp;severity=medium&amp;id=699f6e19b7ef31ef0b595263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11453-cwe-79-improper-neutralization-of-i-1dd1ca23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11453%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20samdani%20WordPress%20Pinterest%20Plugin%20%E2%80%93%20Make%20a%20Popup%2C%20User%20Profile%2C%20Masonry%20and%20Gallery%20Layout&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9058-cwe-79-improper-neutralization-of-in-69636eb1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9058%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%2C%20Carousel%20and%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b3db7ef31ef0b54fa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10484-cwe-79-improper-neutralization-of-i-d00524f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6df4b7ef31ef0b5914cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9694-cwe-79-improper-neutralization-of-in-eb288749</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9694%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CMSMasters%20CMSMasters%20Elementor%20Addon&amp;severity=medium&amp;id=699f6b59b7ef31ef0b554803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29404-na-a20f3521</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29404%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9eb7ef31ef0b589691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46625-na-a25c281a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46625%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46624-na-7ef32283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46624%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53921-na-02a04143</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53921%3A%20n%2Fa&amp;severity=low&amp;id=699f6bc2b7ef31ef0b55ab7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53502-na-f0750f2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53502%3A%20n%2Fa&amp;severity=low&amp;id=699f6bbeb7ef31ef0b55a965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51363-na-c7a8001d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51363%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb1b7ef31ef0b55a1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51114-na-d1786097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51114%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50948-na-78bf9623</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50948%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b55766b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45757-n-a-in-n-a-bebecd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45757%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbebecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-03-f129ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f129ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51900-improper-neutralization-of-input-du-d1234f71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51900%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20James%20Hunt%20What%20Would%20Seth%20Godin%20Do&amp;severity=null&amp;id=69cd752de6bfc5ba1df03518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52453-improper-neutralization-of-input-du-9500c187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52453%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photonicgnostic%20Library%20Bookshelves&amp;severity=null&amp;id=69cd754be6bfc5ba1df03dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52454-improper-neutralization-of-input-du-932eea61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goqsystem%20GoQMieruca&amp;severity=null&amp;id=69cd754be6bfc5ba1df03daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52455-improper-neutralization-of-input-du-4a2af0f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goqsystem%20GoQSmile&amp;severity=null&amp;id=69cd754be6bfc5ba1df03db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52456-improper-neutralization-of-input-du-c6dd7d29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52456%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpoets%20Awesome%20Studio&amp;severity=null&amp;id=69cd754be6bfc5ba1df03db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52457-improper-neutralization-of-input-du-0acbc388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52457%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20youneeq%20Youneeq%20Recommendations&amp;severity=null&amp;id=69cd754be6bfc5ba1df03db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52458-improper-neutralization-of-input-du-655ef60c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zaymund%20TM%20Islamic%20Helper&amp;severity=null&amp;id=69cd754be6bfc5ba1df03dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52459-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-chameleoni-com-chameleoni-jobs-bedb3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52459%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chameleoni%20Chameleoni%20Jobs&amp;severity=null&amp;id=682d983bc4522896dcbedb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52460-improper-neutralization-of-input-du-df46a895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20atarapay%20AtaraPay%20WooCommerce%20Payment%20Gateway&amp;severity=null&amp;id=69cd754ee6bfc5ba1df03f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52461-improper-neutralization-of-input-du-d996cb05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kinsta%20Infinite%20Slider&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52462-improper-neutralization-of-input-du-3d504b22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jacob%20Schwartz%20WP%20e-Commerce%20Style%20Email&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52463-improper-neutralization-of-input-du-9334c238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52463%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Peter%20Westwood%20Post%20By%20Email&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52464-improper-neutralization-of-input-du-d14c71ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anmari%20amr%20shortcodes&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52465-improper-neutralization-of-input-du-f0b4fe88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52465%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Data443%20Risk%20Mitigation%2C%20Inc.%20LGPD%20Framework&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52466-improper-neutralization-of-input-du-a71d81ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52466%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Explara%20Explara%20Events&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52467-improper-neutralization-of-input-du-bfdad9f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20August%20Infotech%20AI%20Responsive%20Gallery%20Album&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52469-improper-neutralization-of-input-du-213d396e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dhrubok%20Infotech%20Services%20Ltd.%20WooCommerce%20Price%20Alert&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52476-unrestricted-upload-of-file-with-da-8b076daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52476%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Stefan%20Bohacek%20Fediverse%20Embeds&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52477-cross-site-request-forgery-csrf-in--f01ee998</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52477%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20docxpresso%20Document%20%26%20Data%20Automation&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52478-improper-neutralization-of-input-du-bce594da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52478%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Astoundify%20Jobify&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52479-cross-site-request-forgery-csrf-in--097a861c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52479%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Astoundify%20Jobify&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52482-improper-neutralization-of-input-du-3d4c2092</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52482%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafalautopilot%20Ortto&amp;severity=null&amp;id=69cd7553e6bfc5ba1df04091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52483-improper-neutralization-of-input-du-38f4447b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52483%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Igor%20Benic%20LeanPress&amp;severity=null&amp;id=69cd7553e6bfc5ba1df0409e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52484-improper-neutralization-of-input-du-cb72aba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52484%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deepintowp%20Wc%20Recently%20viewed%20products&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52486-improper-neutralization-of-input-du-a18ae4f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52486%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SolverWp%20Elementor%20Portfolio%20Builder&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52487-improper-neutralization-of-input-du-862949ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52487%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52489-improper-neutralization-of-input-du-22ccebf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52489%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20udidol%20Add%20Chat%20App%20Button&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52491-improper-neutralization-of-input-du-1a04f26b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52491%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sanil%20Shakya%20Sticky%20Social%20Icons&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52492-improper-neutralization-of-input-du-ec581de2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52492%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Image%20horizontal%20reel%20scroll%20slideshow&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52493-improper-neutralization-of-input-du-b73bc578</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52493%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Leuze%20Meteor%20Slides&amp;severity=null&amp;id=69cd7553e6bfc5ba1df040bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52502-improper-neutralization-of-input-du-8235148f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ImbaSynergy%20ImbaChat&amp;severity=null&amp;id=69cd7554e6bfc5ba1df0412b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52503-improper-neutralization-of-input-du-9c1d9351</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tailored%20Media%20Tailored%20Tools&amp;severity=null&amp;id=69cd7554e6bfc5ba1df0412e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53707-cross-site-request-forgery-csrf-in--406a5c78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53707%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ahmeti%20Ahmeti%20Wp%20G%C3%BCzel%20S%C3%B6zler&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53708-missing-authorization-in-kekotron-a-188201b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53708%3A%20Missing%20Authorization%20in%20kekotron%20AI%20Quiz&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53709-improper-neutralization-of-input-du-250ec6b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nasir%20Uddin%20Generic%20Elements&amp;severity=null&amp;id=69cd7557e6bfc5ba1df045ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53711-cross-site-request-forgery-csrf-in--d6700a86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53711%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tranchesdunet%20Hotlink2Watermark&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53712-cross-site-request-forgery-csrf-in--c53529d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53712%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kevmimcc%20Kevin&apos;s&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53713-cross-site-request-forgery-csrf-in--431392a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53713%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rickota%20Silverlight%20Video%20Player&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53714-cross-site-request-forgery-csrf-in--7a6a4f4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53714%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Irish_Cathal%20Continue%20Shopping%20From%20Cart&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53715-cross-site-request-forgery-csrf-in--c1731a7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53715%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Thomas%20Hoefter%20Simple%20Travel%20Map&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53716-cross-site-request-forgery-csrf-in--3e070f16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53716%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20overtrue%20wp%20auto%20top&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53717-cross-site-request-forgery-csrf-in--d1c12553</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53717%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20yonisink%20yPHPlista&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53718-cross-site-request-forgery-csrf-in--2f379fb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53718%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eric%20Teubert%20Multi%20Feed%20Reader&amp;severity=null&amp;id=69cd7558e6bfc5ba1df045c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53719-cross-site-request-forgery-csrf-in--e73ab0c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53719%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20onigetoc%20Zajax%20%E2%80%93%20Ajax%20Navigation&amp;severity=null&amp;id=69cd7558e6bfc5ba1df04624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53720-cross-site-request-forgery-csrf-in--130fd4c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53720%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ole1986%20WP-ISPConfig%203&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53721-improper-neutralization-of-input-du-fbf2ba17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53721%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stachethemes%20Advanced%20Event%20Manager&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53722-cross-site-request-forgery-csrf-in--192cfc64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53722%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rockemmusic%20Favicon%20My%20Blog&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53723-cross-site-request-forgery-csrf-in--5d26101c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53723%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20acbaltaci%20Google%20Plus%20Share%20and%20%2B1%20Button&amp;severity=null&amp;id=69cd7559e6bfc5ba1df0464a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53724-cross-site-request-forgery-csrf-in--ad37c3c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53724%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ronnybull%20IceStats&amp;severity=null&amp;id=69cd7559e6bfc5ba1df0464d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53725-cross-site-request-forgery-csrf-in--e46fcef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53725%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aMiT%20Post%20Hits%20Counter&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53726-cross-site-request-forgery-csrf-in--9189cd71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53726%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20RealtyCandy.com%20RealtyCandy%20IDX%20Broker%20Extended&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53727-cross-site-request-forgery-csrf-in--61c433a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53727%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Lars%20Koudal%20LinkLaunder%20SEO&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53728-cross-site-request-forgery-csrf-in--db6ae461</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53728%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oliver%20Lindner%20Protect%20Your%20Content&amp;severity=null&amp;id=69cd7559e6bfc5ba1df04659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53729-cross-site-request-forgery-csrf-in--82fdab8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53729%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20plumwd%20Blizzard%20Quotes&amp;severity=null&amp;id=69cd7559e6bfc5ba1df0465c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53741-improper-neutralization-of-input-du-4433946a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53741%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Garrett%20Grimm%20Simple%20Popup&amp;severity=null&amp;id=69cd755ee6bfc5ba1df04808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53751-cross-site-request-forgery-csrf-in--95e31b03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53751%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hakeemnala%20Build%20App%20Online&amp;severity=null&amp;id=69cd755ee6bfc5ba1df04823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53753-cross-site-request-forgery-csrf-in--667abba8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53753%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CultBooking%20CultBooking%20Hotel%20Booking%20Engine&amp;severity=null&amp;id=69cd7560e6bfc5ba1df05521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53754-cross-site-request-forgery-csrf-in--bc3987f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53754%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Irish_Cathal%20Out%20Of%20Stock%20Badge&amp;severity=null&amp;id=69cd7560e6bfc5ba1df05524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53755-cross-site-request-forgery-csrf-in--53183cf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53755%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Andrea%20Pernici%20Third%20Party%20Cookie%20Eraser&amp;severity=null&amp;id=69cd7560e6bfc5ba1df05527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53759-improper-neutralization-of-input-du-5e986577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Planet%20Studio%20ArCa%20Payment%20Gateway&amp;severity=null&amp;id=69cd7560e6bfc5ba1df05534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53761-cross-site-request-forgery-csrf-in--1f0d8235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53761%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20P%20Roy%20WP%20Revisions%20Manager&amp;severity=null&amp;id=69cd7560e6bfc5ba1df05537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53762-cross-site-request-forgery-csrf-in--4515214b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53762%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20FasterThemes%20FastBook&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53765-cross-site-request-forgery-csrf-in--8e8fd79c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53765%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Think201%20Mins%20To%20Read&amp;severity=null&amp;id=69cd7563e6bfc5ba1df0562a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53769-cross-site-request-forgery-csrf-in--1b762a33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53769%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lriaudel%20Custom%20Post%20Type%20to%20Map%20Store&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53770-cross-site-request-forgery-csrf-in--cc5b3462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53770%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pbmacintyre%20RingCentral%20Communications&amp;severity=null&amp;id=69cd7563e6bfc5ba1df0563a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53775-cross-site-request-forgery-csrf-in--43d01e26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53775%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20benmoreassynt%20DancePress%20(TRWA)&amp;severity=null&amp;id=69cd7565e6bfc5ba1df05794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53776-cross-site-request-forgery-csrf-in--7bb92cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53776%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20raphaelheide%20Donate%20Me&amp;severity=null&amp;id=69cd7565e6bfc5ba1df05797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53777-cross-site-request-forgery-csrf-in--f5d1c363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53777%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Alberto%20Reineri%20Simple%20Header%20and%20Footer&amp;severity=null&amp;id=69cd7565e6bfc5ba1df0579a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53779-cross-site-request-forgery-csrf-in--3e3d20db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53779%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%208bitkid%20Yahoo!%20WebPlayer&amp;severity=null&amp;id=69cd7565e6bfc5ba1df057a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53780-cross-site-request-forgery-csrf-in--0c547902</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53780%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rajeevglocify%20Load%20More%20Posts&amp;severity=null&amp;id=69cd7565e6bfc5ba1df057a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53781-cross-site-request-forgery-csrf-in--fcc444bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53781%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20homejunction%20SpatialMatch%20IDX&amp;severity=null&amp;id=69cd7565e6bfc5ba1df057a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53782-cross-site-request-forgery-csrf-in--8c070a21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53782%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cmsaccount%20Photo%20Video%20Store&amp;severity=null&amp;id=69cd7565e6bfc5ba1df057a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53784-missing-authorization-in-e-goi-smar-7c0dc14c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53784%3A%20Missing%20Authorization%20in%20E-goi%20Smart%20Marketing%20SMS%20and%20Newsletters%20Forms&amp;severity=null&amp;id=69cd756ee6bfc5ba1df05976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53789-cross-site-request-forgery-csrf-in--583af3e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53789%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ritesh%20Sanap%20Advanced%20What%20should%20we%20write%20next%20about&amp;severity=null&amp;id=69cd756ee6bfc5ba1df05982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53792-improper-neutralization-of-special--9726462c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53792%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bob%20Watu%20Quiz&amp;severity=null&amp;id=69cd756ee6bfc5ba1df0598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53793-cross-site-request-forgery-csrf-in--d117f6a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53793%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jerodmoore%20eDoc%20Easy%20Tables&amp;severity=null&amp;id=69cd756ee6bfc5ba1df0598e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53124-vulnerability-in-linux-linux-bdfa86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53123-vulnerability-in-linux-linux-bdd01e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53122-vulnerability-in-linux-linux-bdfa7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53121-vulnerability-in-linux-linux-bdfa76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53120-vulnerability-in-linux-linux-bdfa6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53119-vulnerability-in-linux-linux-bdd018</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53118-vulnerability-in-linux-linux-bdfa66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53117-vulnerability-in-linux-linux-bdfa3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53116-vulnerability-in-linux-linux-bdfa33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53115-vulnerability-in-linux-linux-bdd014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53114-vulnerability-in-linux-linux-bdfa2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53113-vulnerability-in-linux-linux-bdfa29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53112-vulnerability-in-linux-linux-bdfa21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53111-vulnerability-in-linux-linux-bdfa19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53110-vulnerability-in-linux-linux-bdfa15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53109-vulnerability-in-linux-linux-bdfa11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53108-vulnerability-in-linux-linux-bdfa00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfa00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53107-vulnerability-in-linux-linux-bdf9f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53106-vulnerability-in-linux-linux-bdf9df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53105-vulnerability-in-linux-linux-bdf9ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53730-cross-site-request-forgery-csrf-in--a17c4593</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53730%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20springthistle%20April&apos;s%20Call%20Posts&amp;severity=null&amp;id=69cd755ce6bfc5ba1df0475b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53740-improper-neutralization-of-input-du-f3c6baef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53740%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPSwings%20WooCommerce%20Ultimate%20Gift%20Card&amp;severity=null&amp;id=69cd755ee6bfc5ba1df047f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53104-vulnerability-in-linux-linux-bdf9c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53103-vulnerability-in-linux-linux-bdf9c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31669-na-18089be3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31669%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd5b7ef31ef0b58f070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39890-na-7d33c24c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39890%3A%20n%2Fa&amp;severity=high&amp;id=699f6c89b7ef31ef0b565ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39343-na-1f93c2ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39343%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53941-na-0e4d59bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53941%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55ac3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53940-na-f921e2dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53940%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55ac3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53939-na-336e3e79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53939%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55ac36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53938-na-38903f05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53938%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55ac32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53937-na-911d4eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53937%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55ac2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53900-na-a4df58e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53900%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55aaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53617-na-ef138b30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53617%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc0b7ef31ef0b55aa7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53605-na-9cc3f855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53605%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc0b7ef31ef0b55aa74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53564-cwe-434-unrestricted-upload-of-file-f67b1e42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53564%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Sangoma%20FreePBX&amp;severity=low&amp;id=699f6bbfb7ef31ef0b55aa00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53484-na-671b8b34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53484%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53477-na-24ca2a08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53477%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbeb7ef31ef0b55a950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53459-na-19ab862a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53459%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbeb7ef31ef0b55a8e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53375-na-10584266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53375%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53364-na-51da7255</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53364%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52732-na-7432ded0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52732%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb7b7ef31ef0b55a56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52724-na-736250fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52724%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb7b7ef31ef0b55a560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-02-f12fbd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kinsing-cryptomining-exploiting-erlang-service-f0c318</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kinsing%20cryptomining%20exploiting%20Erlang%20service&amp;severity=low&amp;id=682acdbebbaf20d303f0c318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53742-improper-neutralization-of-input-du-6d55eb43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53742%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Prism%20I.T.%20Systems%20Multilevel%20Referral%20Affiliate%20Plugin%20for%20WooCommerce&amp;severity=null&amp;id=69cd755ee6bfc5ba1df0480b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53743-improper-neutralization-of-input-du-e695a2ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53743%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aezaz%20Shaikh%20Countdown%20Timer%20for%20Elementor&amp;severity=null&amp;id=69cd755ee6bfc5ba1df0480e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53744-improper-neutralization-of-input-du-0f19bf56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53744%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SkyBootstrap%20Elementor%20Image%20Gallery%20Plugin&amp;severity=null&amp;id=69cd755ee6bfc5ba1df04811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53745-improper-neutralization-of-input-du-004936fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53745%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20%EC%BD%94%EC%8A%A4%EB%AA%A8%EC%8A%A4%ED%8C%9C%20%26%238211%3B%20Cosmosfarm%20%EC%86%8C%EC%85%9C%20%EA%B3%B5%EC%9C%A0%20%EB%B2%84%ED%8A%BC%20By%20%EC%BD%94%EC%8A%A4%EB%AA%A8%EC%8A%A4%ED%8C%9C&amp;severity=null&amp;id=69cd755ee6bfc5ba1df04814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53746-improper-neutralization-of-input-du-d2d6c2d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53746%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FlickDevs%20Elementor%20Button%20Plus&amp;severity=null&amp;id=69cd755ee6bfc5ba1df04817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53747-improper-neutralization-of-input-du-0a52dace</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53747%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nutttaro%20Video%20Player%20for%20WPBakery&amp;severity=null&amp;id=69cd755ee6bfc5ba1df0481a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53748-improper-neutralization-of-input-du-be6da8ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53748%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20L.%20WP%20Mermaid&amp;severity=null&amp;id=69cd755ee6bfc5ba1df0481d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53749-improper-neutralization-of-input-du-85c55da7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53749%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Plugin%20Devs%20Post%20Carousel%20Slider%20for%20Elementor&amp;severity=null&amp;id=69cd755ee6bfc5ba1df04820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53752-improper-neutralization-of-input-du-969ff3e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53752%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Berg%20Informatik%20Stripe%20Donation&amp;severity=null&amp;id=69cd7560e6bfc5ba1df0551d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45520-na-3d2b6258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45520%3A%20n%2Fa&amp;severity=high&amp;id=699f6cefb7ef31ef0b56a4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-12-01-f12cac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-12-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53756-improper-neutralization-of-input-du-fec0eca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53756%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aftab%20Husain%20Vertical%20Carousel&amp;severity=null&amp;id=69cd7560e6bfc5ba1df0552a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53757-improper-neutralization-of-input-du-6dae507e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SocialEvolution%20WP%20Find%20Your%20Nearest&amp;severity=null&amp;id=69cd7560e6bfc5ba1df0552d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53758-improper-neutralization-of-input-du-9fa16a22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53758%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20L.%20WP%20MathJax&amp;severity=null&amp;id=69cd7560e6bfc5ba1df05530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53764-improper-neutralization-of-input-du-2f45b5f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SoftHopper%20Softtemplates%20For%20Elementor&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53766-improper-neutralization-of-input-du-b6e0b4f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53766%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devnex%20Devnex%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd7563e6bfc5ba1df0562d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53767-improper-neutralization-of-input-du-bfd312c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53767%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pixobe%20Pixobe%20Cartography&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53771-improper-neutralization-of-input-du-9eed3f0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53771%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sergiomico%20SimpleSchema&amp;severity=null&amp;id=69cd7563e6bfc5ba1df0563f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53772-improper-neutralization-of-input-du-d5cd1934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53772%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Mail%20Picker&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53773-improper-neutralization-of-input-du-14d4603d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53773%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pracapl%20Znajd%C5%BA%20Prac%C4%99%20z%20Praca.pl&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53774-improper-neutralization-of-input-du-80bc0500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53774%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakub%20Glos%20Sparkle%20Elementor%20Kit&amp;severity=null&amp;id=69cd7565e6bfc5ba1df05791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53778-cross-site-request-forgery-csrf-in--7f6f30b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53778%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Essential%20Marketer%20Essential%20Breadcrumbs&amp;severity=null&amp;id=69cd7565e6bfc5ba1df0579d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53786-improper-neutralization-of-input-du-c2a5d09d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Codeless%20Cowidgets%20%E2%80%93%20Elementor%20Addons&amp;severity=null&amp;id=69cd756ee6bfc5ba1df05979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53787-improper-neutralization-of-input-du-ee5c66e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Random%20Banner&amp;severity=null&amp;id=69cd756ee6bfc5ba1df0597c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53788-improper-neutralization-of-input-du-2ea884b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53788%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20portfoliohub%20WordPress%20Portfolio%20Builder%20%E2%80%93%20Portfolio%20Gallery&amp;severity=null&amp;id=69cd756ee6bfc5ba1df0597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53783-improper-neutralization-of-special--72753fe2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53783%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Anzar%20Ahmed%20Ni%20WooCommerce%20Cost%20Of%20Goods&amp;severity=null&amp;id=69cd756de6bfc5ba1df0593f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53768-exposure-of-sensitive-system-inform-bd828577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53768%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20ideinteractive%20Content%20Audit%20Exporter&amp;severity=null&amp;id=69cd7563e6bfc5ba1df05633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53739-improper-control-of-filename-for-in-e05ce8e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53739%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Cool%20Plugins%20Cryptocurrency%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd755ce6bfc5ba1df04773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53738-server-side-request-forgery-ssrf-in-75cb87f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53738%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Gabe%20Livan%20Asset%20CleanUp%3A%20Page%20Speed%20Booster&amp;severity=null&amp;id=69cd755ce6bfc5ba1df04770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11252-cwe-79-improper-neutralization-of-i-3880804e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Social%20Sharing%20Plugin%20%E2%80%93%20Sassy%20Social%20Share&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-11-30-850131</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-11-30&amp;severity=medium&amp;id=682b68eed14de609c8850131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-30-f13154</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-30&amp;severity=medium&amp;id=682acdc2bbaf20d303f13154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47193-na-39275bdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47193%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d08b7ef31ef0b56d58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45495-na-31438697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45495%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cedb7ef31ef0b56a43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39162-na-2aa13849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39162%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c83b7ef31ef0b565c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36671-na-61d39c6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36671%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c63b7ef31ef0b5638f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36626-na-9179dadf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36626%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c63b7ef31ef0b5638e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36625-na-bd206c2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36625%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c63b7ef31ef0b5638dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36624-na-fc814cba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36624%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c63b7ef31ef0b5638d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36622-na-73f9ff57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36622%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c62b7ef31ef0b563813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36621-na-e9da4f60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36621%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b56380e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36620-na-f24ff5e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36620%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b563809</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36619-na-877087b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36619%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b563804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36617-na-4f76e989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36617%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36616-na-1caa9414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36616%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36615-na-ea996952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36615%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36612-na-4f5fa4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36612%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b5637eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36611-na-67c7bf00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36611%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b5637e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36610-00f1b5f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36610&amp;severity=null&amp;id=699f6c61b7ef31ef0b5637ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35451-na-ceefe7e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35451%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b56330b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35371-na-84109c35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35371%3A%20n%2Fa&amp;severity=high&amp;id=699f6c58b7ef31ef0b5632e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35369-na-90c2a95b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35369%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b563296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35366-na-28fa384b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35366%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c58b7ef31ef0b563291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54159-na-875c74de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54159%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55ac49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54124-na-47851c17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54124%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc4b7ef31ef0b55ac45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-54123-na-32670c90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-54123%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc4b7ef31ef0b55ac42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53623-na-0fc598fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53623%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc0b7ef31ef0b55aa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53507-na-6ffa1457</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53507%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbfb7ef31ef0b55a9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53506-na-48e91580</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53506%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbfb7ef31ef0b55a9db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53505-na-1a1e7bee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53505%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbeb7ef31ef0b55a96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53504-na-2d5974c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53504%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bbeb7ef31ef0b55a968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52782-na-37dad2f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52782%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb9b7ef31ef0b55a67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52781-na-d18bc5b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52781%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb9b7ef31ef0b55a679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52780-na-58c869dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52780%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb9b7ef31ef0b55a676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52779-na-8f418d70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52779%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb9b7ef31ef0b55a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52778-na-57bb00a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52778%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb8b7ef31ef0b55a5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52777-na-33cc0350</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52777%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb8b7ef31ef0b55a5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48406-na-f4cfb8ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48406%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b70b7ef31ef0b55571a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48651-na-c934ac1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48651%3A%20n%2Fa&amp;severity=high&amp;id=69092ee835043901e82caab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36618-na-2771f25c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36618%3A%20n%2Fa&amp;severity=medium&amp;id=6909214cfe7723195e054527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35368-na-1da47a14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35368%3A%20n%2Fa&amp;severity=critical&amp;id=6909214afe7723195e054504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35367-na-6c3f305d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35367%3A%20n%2Fa&amp;severity=critical&amp;id=6909214afe7723195e0544fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-29-942b17c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-29&amp;severity=medium&amp;id=68367c97182aa0cae231d31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36623-n-a-in-n-a-bece29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36623%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbece29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-29-741f22</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-29&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb741f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-29-f12d34</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9852-cwe-427-uncontrolled-search-path-ele-d3cf866f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9852%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=6960b130ecefc3cd7c0f7cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8300-cwe-561-dead-code-in-mitsubishi-elec-c7069eab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8300%3A%20CWE-561%20Dead%20Code%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=6960b131ecefc3cd7c0f7d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8299-cwe-427-uncontrolled-search-path-ele-0d91d9f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8299%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=6960b131ecefc3cd7c0f7d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52922-vulnerability-in-linux-linux-be7924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7747-cwe-681-incorrect-conversion-between-79251c16</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7747%3A%20CWE-681%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20subratamal%20Wallet%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c1eb7ef31ef0b56023e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53731-improper-neutralization-of-input-du-9d993707</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53731%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fintelligence%20Fintelligence%20Calculator&amp;severity=null&amp;id=69cd755ce6bfc5ba1df0475e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53732-cross-site-request-forgery-csrf-in--e709e472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53732%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpwox%20Footer%20Flyout%20Widget&amp;severity=null&amp;id=69cd755ce6bfc5ba1df04761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53733-improper-neutralization-of-input-du-d050dd65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53733%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harshtohit111%20Fence%20URL&amp;severity=null&amp;id=69cd755ce6bfc5ba1df04764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53734-cross-site-request-forgery-csrf-in--15fe1779</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53734%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jamie%20O%20Idealien%20Category%20Enhancements&amp;severity=null&amp;id=69cd755ce6bfc5ba1df04767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53736-cross-site-request-forgery-csrf-in--564c497d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53736%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Jason%20Grim%20Custom%20Shortcode%20Sidebars&amp;severity=null&amp;id=69cd755ce6bfc5ba1df0476a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11402-improper-neutralization-of-input-du-9dc55f52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11402%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kubiq%20Block%20Editor%20Bootstrap%20Blocks&amp;severity=null&amp;id=69cd7413e6bfc5ba1def5126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53737-improper-neutralization-of-input-du-4208142f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53737%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brandtoss%20WP%20Mailster&amp;severity=null&amp;id=69cd755ce6bfc5ba1df0476d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52474-improper-neutralization-of-special--c64e41c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52474%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20%D0%A1%D0%B5%D1%80%D0%B2%D0%B8%D1%81%20%26%238220%3B%D0%AD%D0%BA%D1%81%D0%BF%D1%80%D0%B5%D1%81%D1%81%20%D0%9F%D0%BB%D0%B0%D1%82%D0%B5%D0%B6%D0%B8%26%238221%3B%20Express%20Payments%20Module&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52495-improper-neutralization-of-special--3e1cd9da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52495%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enituretechnology%20Distance%20Based%20Shipping%20Calculator&amp;severity=null&amp;id=69cd7554e6bfc5ba1df040e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52496-improper-control-of-filename-for-in-c2b58003</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52496%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20AbsolutePlugins%20Absolute%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52497-improper-control-of-filename-for-in-e143ce42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52497%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20quomodosoft%20Shopready&amp;severity=null&amp;id=69cd7554e6bfc5ba1df0411c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52498-path-traversal-in-softpulseinfotech-b0a0a47b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52498%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20softpulseinfotech%20SP%20Blog%20Designer&amp;severity=null&amp;id=69cd7554e6bfc5ba1df0411f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52499-improper-control-of-filename-for-in-8e7d8096</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52499%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ibrahim%20Pricing%20table%20addon%20for%20elementor&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52501-improper-control-of-filename-for-in-a7b1a322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52501%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20WebbyTemplate%20Office%20Locator&amp;severity=null&amp;id=69cd7554e6bfc5ba1df04128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52481-improper-limitation-of-a-pathname-t-2b83446a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52481%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Astoundify%20Jobify&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52475-authentication-bypass-using-an-alte-668049c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52475%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Information%20Technology%20Wawp&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11082-cwe-434-unrestricted-upload-of-file-1507f653</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11082%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tumultinc%20Tumult%20Hype%20Animations&amp;severity=critical&amp;id=699f6e06b7ef31ef0b593c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10780-cwe-639-authorization-bypass-throug-c241e8ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10780%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Restaurant%20%26%20Cafe%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8672-cwe-94-improper-control-of-generatio-cbc55d71</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8672%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20marketingfire%20Widget%20Options%20%E2%80%93%20The%20%231%20WordPress%20Widget%20%26%20Block%20Control%20Plugin&amp;severity=critical&amp;id=699f6c2eb7ef31ef0b560e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10670-cwe-639-authorization-bypass-throug-23f6b995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10670%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nicheaddons%20Primary%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10798-cwe-639-authorization-bypass-throug-7efed798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10798%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b59267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11103-cwe-640-weak-password-recovery-mech-8189bcd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11103%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20contest-gallery%20Photos%2C%20Files%2C%20YouTube%2C%20Twitter%2C%20Instagram%2C%20TikTok%2C%20Ecommerce%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%2C%20Sell%20via%20PayPal%2C%20Social%20Share%20Buttons&amp;severity=critical&amp;id=699f6e07b7ef31ef0b593d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11684-cwe-79-improper-neutralization-of-i-0c24c729</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iseardmedia%20Kudos%20Donations%20%E2%80%93%20Easy%20donations%20and%20payments%20with%20Mollie&amp;severity=medium&amp;id=699f6e19b7ef31ef0b595245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11786-cwe-79-improper-neutralization-of-i-a8a4951a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wphostingdev%20Login%20with%20Vipps%20and%20MobilePay&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11458-cwe-79-improper-neutralization-of-i-b552a836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20FAQ%20Builder%20AYS&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11685-cwe-79-improper-neutralization-of-i-ea56218f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iseardmedia%20Kudos%20Donations%20%E2%80%93%20Easy%20donations%20and%20payments%20with%20Mollie&amp;severity=medium&amp;id=699f6e19b7ef31ef0b59524a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11366-cwe-79-improper-neutralization-of-i-ffa3f038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intellasoftsolutions%20SEO%20Landing%20Page%20Generator&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11333-cwe-79-improper-neutralization-of-i-f3d6ad50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20r00tsector%20HLS%20Player&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9669-cwe-22-improper-limitation-of-a-path-e418ab85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9669%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=high&amp;id=69739fe94623b1157c4da9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11431-cwe-79-improper-neutralization-of-i-828eb122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ragicsupport%20Ragic%20Shortcode&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8066-cwe-434-unrestricted-upload-of-file--971dd78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8066%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=high&amp;id=699f6c22b7ef31ef0b5604a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11203-cwe-79-improper-neutralization-of-i-31bde2be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20PDF%203D%20FlipBook%2C%20Instagram%20Social%20Feeds%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20YouTube%20Videos%2C%20Maps%20%26%20Upload%20PDF%20Documents&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b594128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11788-cwe-79-improper-neutralization-of-i-adaf0a4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11788%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20YouTube%20Integration&amp;severity=medium&amp;id=699f6e1fb7ef31ef0b5964b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11761-cwe-79-improper-neutralization-of-i-598169a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20legalweb%20LegalWeb%20Cloud&amp;severity=medium&amp;id=699f6e1db7ef31ef0b595788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11925-cwe-288-authentication-bypass-using-cc3b0c8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11925%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20https%3A%2F%2Fcodecanyon.net%2Fitem%2Fjobsearch-wp-job-board-wordpress-plugin%2F21066856%20JobSearch%20WP%20Job%20Board&amp;severity=critical&amp;id=699f6e27b7ef31ef0b596ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11918-cwe-862-missing-authorization-in-rs-a00b84bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11918%3A%20CWE-862%20Missing%20Authorization%20in%20rswebstudios%20Image%20Alt%20Text&amp;severity=medium&amp;id=699f6e27b7ef31ef0b596dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-28-f129e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f129e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11933-cwe-122-heap-based-buffer-overflow--71d7369b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11933%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e27b7ef31ef0b596df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11803-cwe-787-out-of-bounds-write-in-fuji-fb336cd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11803%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Tellus%20Lite&amp;severity=high&amp;id=699f6e20b7ef31ef0b59665f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11802-cwe-121-stack-based-buffer-overflow-a08a5631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11802%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Tellus%20Lite&amp;severity=high&amp;id=699f6e20b7ef31ef0b59665c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11801-cwe-787-out-of-bounds-write-in-fuji-16e5db56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11801%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Tellus%20Lite&amp;severity=high&amp;id=699f6e20b7ef31ef0b596659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11800-cwe-121-stack-based-buffer-overflow-09b041af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11800%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Tellus%20Lite&amp;severity=high&amp;id=699f6e20b7ef31ef0b59664f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11799-cwe-121-stack-based-buffer-overflow-10d39c85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11799%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Tellus%20Lite&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11798-cwe-787-out-of-bounds-write-in-fuji-aeedddae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11798%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11797-cwe-787-out-of-bounds-write-in-fuji-86276f13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11797%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11796-cwe-787-out-of-bounds-write-in-fuji-7fd97ec7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11796%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11795-cwe-121-stack-based-buffer-overflow-711be034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11795%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11794-cwe-787-out-of-bounds-write-in-fuji-2a02e751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11794%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11793-cwe-787-out-of-bounds-write-in-fuji-5dbf3976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11793%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11792-cwe-121-stack-based-buffer-overflow-065bfc63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11792%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11791-cwe-121-stack-based-buffer-overflow-a2a64d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11791%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5965a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11790-cwe-121-stack-based-buffer-overflow-ae30227e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11790%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5964c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11789-cwe-121-stack-based-buffer-overflow-7d3407c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11789%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5964bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11787-cwe-121-stack-based-buffer-overflow-3b8b2ff9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11787%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Fuji%20Electric%20Monitouch%20V-SFT&amp;severity=high&amp;id=699f6e1fb7ef31ef0b5964b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9369-insufficient-data-validation-in-goog-948c71c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9369%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=691f65fd40b920e2707f6002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11009-cwe-89-improper-neutralization-of-s-a551ec06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11009%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pagup%20Internal%20Linking%20for%20SEO%20traffic%20%26%20Ranking%20%E2%80%93%20Auto%20internal%20links%20(100%25%20automatic)&amp;severity=medium&amp;id=699f6e04b7ef31ef0b5939d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10521-cwe-352-cross-site-request-forgery--789e3763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10521%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cimatti%20WordPress%20Contact%20Forms%20by%20Cimatti&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11667-cwe-22-improper-limitation-of-a-pat-a2278a85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11667%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=high&amp;id=68f7d9b0247d717aace268a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10175-cwe-79-improper-neutralization-of-i-d193f98d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10175%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labibahmed42%20Pricing%20Tables%20For%20WPBakery%20Page%20Builder%20(formerly%20Visual%20Composer)&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10580-cwe-862-missing-authorization-in-wp-eecb8943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10580%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=medium&amp;id=699f6df6b7ef31ef0b5917b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10895-cwe-79-improper-neutralization-of-i-27ec54b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20logichunt%20Counter%20Up%20%E2%80%93%20Animated%20Number%20Counter%20%26%20Milestone%20Showcase&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11219-cwe-22-improper-limitation-of-a-pat-1ac28fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11219%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b59414d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11083-cwe-200-exposure-of-sensitive-infor-7a3a9bdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11083%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46055-na-065ec3a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46055%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46054-na-b4ab6e73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46054%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf7b7ef31ef0b56a908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37816-na-d5ce5e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37816%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c70b7ef31ef0b564097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31976-na-1a5e0658</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31976%3A%20n%2Fa&amp;severity=high&amp;id=699f6c30b7ef31ef0b560fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53635-na-b3569358</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53635%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55aae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53604-na-f60ed5bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53604%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc0b7ef31ef0b55aa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53603-na-fc818922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53603%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc0b7ef31ef0b55aa6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52951-na-e70b65a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52951%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51228-na-c5f7aa99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51228%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b558955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53920-na-73101d6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53920%3A%20n%2Fa&amp;severity=high&amp;id=690916c8c28fd46ded7ccf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-game-of-emperor-unveiling-long-term-earth-es-35fad081</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Game%20of%20Emperor%3A%20Unveiling%20Long%20Term%20Earth%20Estries%20Cyber%20Intrusions&amp;severity=low&amp;id=6842e9ce71f4d251b5c75966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-27-f130bb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-27&amp;severity=medium&amp;id=682acdc2bbaf20d303f130bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-game-of-emperor-unveiling-long-term-earth-estries-cyber-intrusions-6e1eb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Game%20of%20Emperor%3A%20Unveiling%20Long%20Term%20Earth%20Estries%20Cyber%20Intrusions&amp;severity=medium&amp;id=6828eab7e1a0c275ea6e1eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53849-cwe-121-stack-based-buffer-overflow-39f74872</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53849%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20editorconfig%20editorconfig-core-c&amp;severity=medium&amp;id=69092eed35043901e82cb11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49035-cwe-269-improper-privilege-manageme-ccd6ab42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49035%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Partner%20Center&amp;severity=high&amp;id=68f7d9b5247d717aace26b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8676-improper-authorization-bed004</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8676%3A%20Improper%20Authorization&amp;severity=high&amp;id=682d9839c4522896dcbed004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10878-cwe-79-improper-neutralization-of-i-82c40c02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Sugar%20Calendar%20%E2%80%93%20Event%20Calendar%2C%20Event%20Tickets%2C%20and%20Event%20Management%20Platform&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52337-improper-input-validation-b40d55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52337%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=682d46994d7c5ea9f4b40d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52336-improper-privilege-management-b3f283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52336%3A%20Improper%20Privilege%20Management&amp;severity=high&amp;id=682d31604d7c5ea9f4b3f283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8236-cwe-79-improper-neutralization-of-in-100d3680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6c24b7ef31ef0b560659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9461-cwe-78-improper-neutralization-of-sp-0e3ceb28</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9461%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20boldgrid%20Total%20Upkeep%20%E2%80%93%20WordPress%20Backup%20Plugin%20plus%20Restore%20%26%20Migrate%20by%20BoldGrid&amp;severity=high&amp;id=699f6b4fb7ef31ef0b551476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53975-ssl-security-padlock-icon-could-be--915fb4e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53975%3A%20SSL%20security%20padlock%20icon%20could%20be%20visually%20spoofed%20to%20look%20secure%20on%20an%20HTTP%20page%20in%20Mozilla%20Firefox%20for%20iOS&amp;severity=medium&amp;id=6900d7531e78ed0e5889e108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11699-memory-safety-bugs-fixed-in-firefox-70c4ce0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11699%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20133%2C%20Firefox%20ESR%20128.5%2C%20and%20Thunderbird%20128.5%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092616fe7723195e0b35f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11704-potential-double-free-vulnerability-568943f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11704%3A%20Potential%20double-free%20vulnerability%20in%20PKCS%237%20decryption%20handling%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69092147fe7723195e054077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11697-improper-keypress-handling-in-execu-753b5d0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11697%3A%20Improper%20Keypress%20Handling%20in%20Executable%20File%20Confirmation%20Dialog%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092616fe7723195e0b35ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11696-unhandled-exception-in-add-on-signa-59cac609</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11696%3A%20Unhandled%20Exception%20in%20Add-on%20Signature%20Verification%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092616fe7723195e0b35e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11695-url-bar-spoofing-via-manipulated-pu-b207bc78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11695%3A%20URL%20Bar%20Spoofing%20via%20Manipulated%20Punycode%20and%20Whitespace%20Characters%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092616fe7723195e0b35df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11694-csp-bypass-and-xss-exposure-via-web-3c6abdd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11694%3A%20CSP%20Bypass%20and%20XSS%20Exposure%20via%20Web%20Compatibility%20Shims%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092616fe7723195e0b35d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11692-select-list-elements-could-be-shown-a3482e92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11692%3A%20Select%20list%20elements%20could%20be%20shown%20over%20another%20site%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092616fe7723195e0b35cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10579-cwe-862-missing-authorization-in-wp-ad9de260</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10579%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=medium&amp;id=699f6df6b7ef31ef0b5917ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10308-cwe-79-improper-neutralization-of-i-838071cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8899-cwe-200-exposure-of-sensitive-inform-097deccd</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8899%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11024-cwe-230-improper-handling-of-missin-86a38edb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11024%3A%20CWE-230%20Improper%20Handling%20of%20Missing%20Values%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=critical&amp;id=699f6e04b7ef31ef0b593abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11032-cwe-79-improper-neutralization-of-i-a31b4125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11032%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20man4toman%20Parsi%20Date&amp;severity=medium&amp;id=699f6e04b7ef31ef0b593ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11091-cwe-79-improper-neutralization-of-i-bbd5dff3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11091%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sayedulsayem%20Support%20SVG%20%E2%80%93%20Upload%20svg%20files%20in%20wordpress%20without%20hassle&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11192-cwe-79-improper-neutralization-of-i-9fb6d254</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11192%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jonkastonka%20Sp*tify%20Play%20Button%20for%20WordPress&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11119-cwe-79-improper-neutralization-of-i-c8cae8aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bluenotes%20BNE%20Gallery%20Extended&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9170-cwe-79-improper-neutralization-of-in-6f0650cd</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36251-out-of-bounds-read-in-sharp-corpora-b0b38b7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36251%3A%20Out-of-bounds%20read%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=high&amp;id=690a3b50ff58c9332ff073fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36248-use-of-hard-coded-credentials-in-sh-fad254a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36248%3A%20Use%20of%20hard-coded%20credentials%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=critical&amp;id=690a3b50ff58c9332ff073f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35244-use-of-hard-coded-credentials-in-sh-73fade21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35244%3A%20Use%20of%20hard-coded%20credentials%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=critical&amp;id=690a3b50ff58c9332ff073db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34162-access-to-critical-private-variable-c87b1d9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34162%3A%20Access%20to%20critical%20private%20variable%20via%20public%20method%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=medium&amp;id=690a3b4eff58c9332ff07383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33616-authentication-bypass-in-sharp-corp-5607136a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33616%3A%20Authentication%20bypass%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=medium&amp;id=690a3b4eff58c9332ff0737a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33610-authentication-bypass-using-an-alte-40dc56f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33610%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=critical&amp;id=690a3b4eff58c9332ff07371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33605-improper-limitation-of-a-pathname-t-da911d59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33605%3A%20Improper%20limitation%20of%20a%20pathname%20to%20a%20restricted%20directory%20(&apos;Path%20Traversal&apos;)%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=high&amp;id=690a3b4eff58c9332ff07368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32151-storing-passwords-in-a-recoverable--58dbe0c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32151%3A%20Storing%20passwords%20in%20a%20recoverable%20format%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=medium&amp;id=690a3b4dff58c9332ff06eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29978-plaintext-storage-of-a-password-in--150560a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29978%3A%20Plaintext%20storage%20of%20a%20password%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=medium&amp;id=690a3b4cff58c9332ff06e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29146-cleartext-storage-of-sensitive-info-78a5a95a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29146%3A%20Cleartext%20storage%20of%20sensitive%20information%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=medium&amp;id=690a3b4cff58c9332ff06e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28955-incorrect-permission-assignment-for-3d54d7ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28955%3A%20Incorrect%20permission%20assignment%20for%20critical%20resource%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28038-stack-based-buffer-overflow-in-shar-9a8c600b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28038%3A%20Stack-based%20buffer%20overflow%20in%20Sharp%20Corporation%20Multiple%20MFPs%20(multifunction%20printers)&amp;severity=critical&amp;id=690a3b67ff58c9332ff0a57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11202-cwe-79-improper-neutralization-of-i-63840dea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11202%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativemindssolutions%20CM%20WordPress%20Search%20And%20Replace%20Plugin&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5940f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9504-cwe-434-unrestricted-upload-of-file--a4eeddba</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9504%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpdevart%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=high&amp;id=699f6b4fb7ef31ef0b55149b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10857-cwe-35-path-traversal-in-tychesoftw-5e104b71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10857%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20tychesoftwares%20Product%20Input%20Fields%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e01b7ef31ef0b592e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11002-cwe-94-improper-control-of-generati-9c82c6cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11002%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20InPost%20Gallery&amp;severity=medium&amp;id=699f6e04b7ef31ef0b5939ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10542-cwe-862-missing-authorization-in-cl-dd15736e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10542%3A%20CWE-862%20Missing%20Authorization%20in%20cleantalk%20Spam%20protection%2C%20Anti-Spam%2C%20FireWall%20by%20CleanTalk&amp;severity=critical&amp;id=699f6df6b7ef31ef0b59169b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10781-cwe-703-improper-check-or-handling--2d181c36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10781%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20cleantalk%20Spam%20protection%2C%20Anti-Spam%2C%20FireWall%20by%20CleanTalk&amp;severity=high&amp;id=699f6dfcb7ef31ef0b592479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10570-cwe-89-improper-neutralization-of-s-851b675b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10570%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cleantalk%20Security%20%26%20Malware%20scan%20by%20CleanTalk&amp;severity=high&amp;id=699f6df6b7ef31ef0b591795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11418-cwe-79-improper-neutralization-of-i-71047d6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11418%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20antonbond%20Additional%20Order%20Filters%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11342-cwe-352-cross-site-request-forgery--c9ed2e51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11342%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sanskritforum%20Skt%20NURCaptcha&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10729-cwe-285-improper-authorization-in-t-2e9d3c62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10729%3A%20CWE-285%20Improper%20Authorization%20in%20Tyche%20Softwares%20Booking%20%26%20Appointment%20Plugin%20for%20WooCommerce&amp;severity=high&amp;id=699f6dfcb7ef31ef0b5923e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53620-na-e2c494d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53620%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc0b7ef31ef0b55aa83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53619-na-aad3a9d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53619%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc0b7ef31ef0b55aa80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53555-na-3a7256f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53555%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbfb7ef31ef0b55a9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53365-na-c6ef0b2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53365%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50942-na-8f1a0e36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50942%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba2b7ef31ef0b55765c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51058-na-a54cb253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51058%3A%20n%2Fa&amp;severity=medium&amp;id=690908537fff0e30cee23904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-26-ef7b5ba2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-26&amp;severity=medium&amp;id=68367c99182aa0cae2323e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53101-vulnerability-in-linux-linux-bdf9bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53100-vulnerability-in-linux-linux-bdf9b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53099-vulnerability-in-linux-linux-bdf9b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53098-vulnerability-in-linux-linux-bdf9a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53097-vulnerability-in-linux-linux-bdd003</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53096-vulnerability-in-linux-linux-bdcffb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10492-external-control-of-file-name-or-pa-ebd00fb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10492%3A%20External%20Control%20of%20File%20Name%20or%20Path&amp;severity=low&amp;id=69136629f922b639ab601295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10451-use-of-hard-coded-credentials-in-re-d7bcad56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10451%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2024&amp;severity=medium&amp;id=691362a4f922b639ab5baf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10270-inefficient-regular-expression-comp-5672d22b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10270%3A%20Inefficient%20Regular%20Expression%20Complexity&amp;severity=medium&amp;id=691362a4f922b639ab5baf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9666-inconsistent-interpretation-of-http--fb9bdfab</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9666%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=medium&amp;id=68e0f3c4b66c7f7acdd3ea2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6538-server-side-request-forgery-ssrf-b3d6b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6538%3A%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=medium&amp;id=682d18f64d7c5ea9f4b3d6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7056-cwe-79-cross-site-scripting-xss-in-w-cfeed472</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7056%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20WPForms&amp;severity=low&amp;id=69164d2d05b975ba758b6b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10710-cwe-79-cross-site-scripting-xss-in--fd3bfe65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10710%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20YaDisk%20Files&amp;severity=low&amp;id=6961693845ea0302aa73d9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10709-cwe-79-cross-site-scripting-xss-in--1c1f225f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10709%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20YaDisk%20Files&amp;severity=medium&amp;id=696175d145ea0302aa963f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11483-improper-access-control-b7092f0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11483%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45756-na-28efcca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45756%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf1b7ef31ef0b56a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45755-na-ed002c04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45755%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf1b7ef31ef0b56a600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53930-na-db9ba5af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53930%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55ab82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53599-na-6b286033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53599%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc0b7ef31ef0b55aa6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53597-na-091666f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53597%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc0b7ef31ef0b55aa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53556-na-88a30801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53556%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbfb7ef31ef0b55a9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53554-na-b86f4698</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53554%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbfb7ef31ef0b55a9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52787-na-140fdd12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52787%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb9b7ef31ef0b55a67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50672-na-f5ca33ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50672%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b5573fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50671-na-61c0b61a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50671%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b5573fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-25-f12530</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f12530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11233-cwe-122-heap-based-buffer-overflow--79105d85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11233%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=69092616fe7723195e0b35be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11234-cwe-20-improper-input-validation-in-caa8cfde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11234%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=69092616fe7723195e0b35c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11236-cwe-787-out-of-bounds-write-in-php--9c334d11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11236%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PHP%20Group%20PHP&amp;severity=critical&amp;id=69092616fe7723195e0b35c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53916-na-7eb0dfdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53916%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc2b7ef31ef0b55ab74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53915-na-7495f4d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53915%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53914-na-c64e826f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53914%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53913-na-ff525d1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53913%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53912-na-0fef6c21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53912%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53911-na-88da200c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53911%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53910-na-abcebbc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53910%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53909-na-830e4bd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53909%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bc2b7ef31ef0b55ab05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53901-na-1fa3e464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53901%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bc2b7ef31ef0b55aaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53899-na-f248d27d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53899%3A%20n%2Fa&amp;severity=high&amp;id=699f6bc2b7ef31ef0b55aae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-24-f12419</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11228-cwe-79-improper-neutralization-of-i-9aa5ad87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b594187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11229-cwe-79-improper-neutralization-of-i-f1e11559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11231-cwe-79-improper-neutralization-of-i-cb57634d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11034-cwe-94-improper-control-of-generati-8c7b1cd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11034%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpbean%20Request%20a%20Quote%20for%20WooCommerce%20and%20Elementor%20%E2%80%93%20Get%20a%20Quote%20Button%20%E2%80%93%20Product%20Enquiry%20Form%20Popup%20%E2%80%93%20Product%20Quotation&amp;severity=high&amp;id=699f6e04b7ef31ef0b593acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10519-cwe-79-improper-neutralization-of-i-2b2f6832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20karzin%20Wishlist%20for%20WooCommerce%3A%20Multi%20Wishlists%20Per%20Customer%20PRO&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11199-cwe-79-improper-neutralization-of-i-0df2048a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11199%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rescuethemes%20Rescue%20Shortcodes&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11227-cwe-79-improper-neutralization-of-i-436306e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20strangerstudios%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b59417b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9659-cwe-434-unrestricted-upload-of-file--50a0a80f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9659%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=critical&amp;id=699f6b56b7ef31ef0b553137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9941-cwe-269-improper-privilege-managemen-0efb0611</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9941%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=high&amp;id=699f6b65b7ef31ef0b554fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9942-cwe-434-unrestricted-upload-of-file--8422099f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9942%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dasinfomedia%20WPGYM%20-%20Wordpress%20Gym%20Management%20System&amp;severity=critical&amp;id=699f6b65b7ef31ef0b554fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9511-cwe-502-deserialization-of-untrusted-f66c9407</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9511%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20techjewel%20FluentSMTP%20%E2%80%93%20WP%20SMTP%20Plugin%20with%20Amazon%20SES%2C%20SendGrid%2C%20MailGun%2C%20Postmark%2C%20Google%20and%20Any%20SMTP%20Provider&amp;severity=critical&amp;id=699f6b4fb7ef31ef0b5515f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10803-cwe-22-improper-limitation-of-a-pat-4442dbd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10803%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FWDesign%20MP3%20Sticky%20Player&amp;severity=high&amp;id=699f6dfeb7ef31ef0b5926a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9660-cwe-434-unrestricted-upload-of-file--e162e521</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9660%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dasinfomedia%20School%20Management%20System%20for%20Wordpress&amp;severity=high&amp;id=699f6b56b7ef31ef0b55313b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9635-cwe-79-improper-neutralization-of-in-a773a0e5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theafricanboss%20Checkout%20with%20Cash%20App%20on%20WooCommerce&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55306c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11446-cwe-79-improper-neutralization-of-i-93638318</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpol%20Chessgame%20Shizzle&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11330-cwe-79-improper-neutralization-of-i-aec0b304</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11330%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20Custom%20CSS%2C%20JS%20%26%20PHP&amp;severity=medium&amp;id=699f6e0db7ef31ef0b594505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11265-cwe-200-exposure-of-sensitive-infor-7b97c426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11265%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20codepopular%20Increase%20Maximum%20Upload%20File%20Size%20%7C%20Increase%20Execution%20Time&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b5941d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11188-cwe-79-improper-neutralization-of-i-e4e774cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11188%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11361-cwe-79-improper-neutralization-of-i-8fd7e9f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11361%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20PDF%20Invoices%20%26%20Packing%20Slips%20Generator%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b594705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11426-cwe-79-improper-neutralization-of-i-9496124c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20someguy9%20AutoListicle%3A%20Automatically%20Update%20Numbered%20List%20Articles&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10606-cwe-862-missing-authorization-in-wp-627b2503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10606%3A%20CWE-862%20Missing%20Authorization%20in%20wptravelengine%20WP%20Travel%20Engine%20%E2%80%93%20Tour%20Booking%20Plugin%20%E2%80%93%20Tour%20Operator%20Software&amp;severity=medium&amp;id=699f6df8b7ef31ef0b591910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11332-cwe-79-improper-neutralization-of-i-42451bfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11332%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hipaatizer%20HIPAA%20Compliant%20Forms%20with%20Drag%E2%80%99n%E2%80%99Drop%20HIPAA%20Form%20Builder.%20Sign%20HIPAA%20documents&amp;severity=medium&amp;id=699f6e0db7ef31ef0b594511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11387-cwe-79-improper-neutralization-of-i-08717a5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11387%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeffreyvr%20Easy%20Liveblogs&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11408-cwe-79-improper-neutralization-of-i-b676b99c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teonos%20Slotti%20Ajanvaraus&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10873-cwe-98-improper-control-of-filename-d8c825cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10873%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=high&amp;id=699f6e01b7ef31ef0b593569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10880-cwe-79-improper-neutralization-of-i-161e75a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20JobBoardWP%20%E2%80%93%20Job%20Board%20Listings%20and%20Submissions&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59364e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10868-cwe-639-authorization-bypass-throug-cfffd5cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10868%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10116-cwe-79-improper-neutralization-of-i-cc3e4420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexmoss%20FireCask%E2%80%99s%20Twitter%20Follow%20Button&amp;severity=medium&amp;id=699f6decb7ef31ef0b590cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11415-cwe-352-cross-site-request-forgery--9f75e5f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11415%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20meloniq%20WP-Orphanage%20Extended&amp;severity=high&amp;id=699f6e13b7ef31ef0b594bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10813-cwe-862-missing-authorization-in-co-65a5a216</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10813%3A%20CWE-862%20Missing%20Authorization%20in%20codersaiful%20Product%20Table%20for%20WooCommerce%20by%20CodeAstrology%20(wooproducttable.com)&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b5926e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10537-cwe-862-missing-authorization-in-wp-51868db3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10537%3A%20CWE-862%20Missing%20Authorization%20in%20wpusermanager%20WP%20User%20Manager%20%E2%80%93%20User%20Profile%20Builder%20%26%20Membership&amp;severity=medium&amp;id=699f6df6b7ef31ef0b59167c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10886-cwe-79-improper-neutralization-of-i-512f54dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boomdevs%20Tribute%20Testimonials%20%E2%80%93%20WordPress%20Testimonial%20Grid%2FSlider&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11362-cwe-79-improper-neutralization-of-i-3f5747e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peachpay%20Payments%20Plugin%20and%20Checkout%20Plugin%20for%20WooCommerce%3A%20Stripe%2C%20PayPal%2C%20Square%2C%20Authorize.net&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b59470b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10874-cwe-79-improper-neutralization-of-i-4e74dbcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oooorgle%20Quotes%20llama&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9223-cwe-862-missing-authorization-in-wpf-c2083c03</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9223%3A%20CWE-862%20Missing%20Authorization%20in%20wpformation%20WPDash%20Notes&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10961-cwe-288-authentication-bypass-using-067a8c1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10961%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20claudeschlesser%20Social%20Login&amp;severity=critical&amp;id=699f6e04b7ef31ef0b5939bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10216-cwe-862-missing-authorization-in-wp-58e89f83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10216%3A%20CWE-862%20Missing%20Authorization%20in%20wpusermanager%20WP%20User%20Manager%20%E2%80%93%20User%20Profile%20Builder%20%26%20Membership&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11463-cwe-79-improper-neutralization-of-i-96f97e0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20debounce%20DeBounce%20Email%20Validator&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10869-cwe-79-improper-neutralization-of-i-5fc6c7d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20guardgiant%20WordPress%20Brute%20Force%20Protection%20%E2%80%93%20Stop%20Brute%20Force%20Attacks&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59354e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-23-f12f1a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9114-cwe-787-out-of-bounds-write-in-fasts-40f440ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9114%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20FastStone%20Image%20Viewer&amp;severity=high&amp;id=699f6b3fb7ef31ef0b54fbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9113-cwe-787-out-of-bounds-write-in-fasts-05a65e43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9113%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20FastStone%20Image%20Viewer&amp;severity=high&amp;id=699f6b3fb7ef31ef0b54fbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9112-cwe-787-out-of-bounds-write-in-fasts-611a7032</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9112%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20FastStone%20Image%20Viewer&amp;severity=high&amp;id=699f6b3fb7ef31ef0b54fbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8360-cwe-78-improper-neutralization-of-sp-83d466d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8360%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Visteon%20Infotainment&amp;severity=medium&amp;id=699f6c26b7ef31ef0b56088b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8359-cwe-78-improper-neutralization-of-sp-aba3d8b4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8359%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Visteon%20Infotainment&amp;severity=medium&amp;id=699f6c26b7ef31ef0b560888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8358-cwe-78-improper-neutralization-of-sp-1f32e34c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8358%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Visteon%20Infotainment&amp;severity=medium&amp;id=699f6c26b7ef31ef0b560885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8357-cwe-1326-missing-immutable-root-of-t-3dd96daf</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8357%3A%20CWE-1326%3A%20Missing%20Immutable%20Root%20of%20Trust%20in%20Hardware%20in%20Visteon%20Infotainment&amp;severity=high&amp;id=699f6c26b7ef31ef0b560882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8356-cwe-345-insufficient-verification-of-4734eb6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8356%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Visteon%20Infotainment&amp;severity=high&amp;id=699f6c26b7ef31ef0b56087f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8355-cwe-89-improper-neutralization-of-sp-b9bfc449</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8355%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Visteon%20Infotainment&amp;severity=medium&amp;id=699f6c26b7ef31ef0b56087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7565-cwe-22-improper-limitation-of-a-path-723e7972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7565%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SMARTBEAR%20SoapUI&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55fef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7511-cwe-125-out-of-bounds-read-in-trimbl-26fdd229</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7511%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Trimble%20SketchUp%20Pro&amp;severity=low&amp;id=699f6c1ab7ef31ef0b55fed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7510-cwe-416-use-after-free-in-trimble-sk-45d8a695</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7510%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55fed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7509-cwe-121-stack-based-buffer-overflow--14c252f4</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7509%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Trimble%20SketchUp&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55fed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7508-cwe-122-heap-based-buffer-overflow-i-36f6d73b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7508%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fe44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7392-cwe-410-insufficient-resource-pool-i-68e3f93b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7392%3A%20CWE-410%3A%20Insufficient%20Resource%20Pool%20in%20ChargePoint%20Home%20Flex&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7391-cwe-200-exposure-of-sensitive-inform-8f29a421</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7391%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ChargePoint%20Home%20Flex&amp;severity=low&amp;id=699f6c16b7ef31ef0b55fc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7352-cwe-787-out-of-bounds-write-in-pdf-x-a61a4918</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7352%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7245-cwe-732-incorrect-permission-assignm-5f9eb5a9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7245%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6871-cwe-732-incorrect-permission-assignm-6890e25a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6871%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20G%20DATA%20Total%20Security&amp;severity=high&amp;id=699f6c0eb7ef31ef0b55f6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11394-cwe-502-deserialization-of-untruste-0d3a6902</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11394%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=699f6e12b7ef31ef0b594a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11393-cwe-502-deserialization-of-untruste-ca4a666e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11393%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=699f6e12b7ef31ef0b594a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11392-cwe-502-deserialization-of-untruste-296d866b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11392%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Hugging%20Face%20Transformers&amp;severity=high&amp;id=699f6e12b7ef31ef0b594a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9248-cwe-787-out-of-bounds-write-in-foxit-5a295a19</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9248%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b45b7ef31ef0b550be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9250-cwe-416-use-after-free-in-foxit-pdf--d9fa130e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9250%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b47b7ef31ef0b550c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9252-cwe-416-use-after-free-in-foxit-pdf--73a2e465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9252%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6b47b7ef31ef0b550ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9253-cwe-125-out-of-bounds-read-in-foxit--90257c53</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9253%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6b47b7ef31ef0b550ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9251-cwe-416-use-after-free-in-foxit-pdf--c4b7b6a7</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9251%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6b47b7ef31ef0b550c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9254-cwe-416-use-after-free-in-foxit-pdf--35919689</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9254%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b47b7ef31ef0b550cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9255-cwe-416-use-after-free-in-foxit-pdf--2a330ab3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9255%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b47b7ef31ef0b550caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9256-cwe-125-out-of-bounds-read-in-foxit--59d18404</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9256%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6b47b7ef31ef0b550cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9243-cwe-416-use-after-free-in-foxit-pdf--973a1582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9243%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b45b7ef31ef0b550bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9245-cwe-732-incorrect-permission-assignm-e455d77e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9245%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b45b7ef31ef0b550bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9244-cwe-732-incorrect-permission-assignm-c9762fda</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9244%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b45b7ef31ef0b550bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9246-cwe-125-out-of-bounds-read-in-foxit--e2ba4e19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9246%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6b45b7ef31ef0b550bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9247-cwe-787-out-of-bounds-write-in-foxit-3e28dca9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9247%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b45b7ef31ef0b550bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9249-cwe-125-out-of-bounds-read-in-foxit--29484226</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9249%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6b47b7ef31ef0b550c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7242-cwe-59-improper-link-resolution-befo-eedb6deb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7242%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7241-cwe-59-improper-link-resolution-befo-72b26d27</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7241%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7244-cwe-427-uncontrolled-search-path-ele-a7e36d9c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7244%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7243-cwe-59-improper-link-resolution-befo-1defa2ca</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7243%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Panda%20Security%20Dome&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7240-cwe-59-improper-link-resolution-befo-d31c9eb7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7240%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20F-Secure%20Total&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7238-cwe-59-improper-link-resolution-befo-6f6e5e2a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7238%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7239-cwe-59-improper-link-resolution-befo-6902135d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7239%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7236-cwe-59-improper-link-resolution-befo-7d3b4e55</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7236%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20AntiVirus%20Free&amp;severity=medium&amp;id=699f6c12b7ef31ef0b55f9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7234-cwe-59-improper-link-resolution-befo-285b4a46</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7234%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20AntiVirus%20Free&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7237-cwe-59-improper-link-resolution-befo-5b7d44ba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7237%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20AntiVirus%20Free&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7235-cwe-59-improper-link-resolution-befo-45d397f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7235%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20AVG%20AntiVirus%20Free&amp;severity=medium&amp;id=699f6c12b7ef31ef0b55f9b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7233-cwe-59-improper-link-resolution-befo-ac73b6d3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7233%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Free%20Antivirus&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7232-cwe-59-improper-link-resolution-befo-978bf177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7232%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Free%20Antivirus&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7227-cwe-59-improper-link-resolution-befo-66d61cec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7227%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Free%20Antivirus&amp;severity=high&amp;id=699f6c10b7ef31ef0b55f90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7229-cwe-59-improper-link-resolution-befo-c7a7978c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7229%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Cleanup%20Premium&amp;severity=high&amp;id=699f6c10b7ef31ef0b55f911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7231-cwe-59-improper-link-resolution-befo-6e1b3956</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7231%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Cleanup%20Premium&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7230-cwe-59-improper-link-resolution-befo-ba577e4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7230%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Cleanup%20Premium&amp;severity=high&amp;id=699f6c12b7ef31ef0b55f9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7228-cwe-59-improper-link-resolution-befo-a946b1dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7228%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Avast%20Free%20Antivirus&amp;severity=medium&amp;id=699f6c10b7ef31ef0b55f90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8025-cwe-122-heap-based-buffer-overflow-i-179f5ef6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8025%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Nikon%20NEF%20Codec&amp;severity=high&amp;id=699f6c22b7ef31ef0b56048e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8849-cwe-125-out-of-bounds-read-in-pdf-xc-5ab36bb9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8849%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8848-cwe-125-out-of-bounds-read-in-pdf-xc-f06388f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8848%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8847-cwe-125-out-of-bounds-read-in-pdf-xc-185c8198</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8847%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8846-cwe-125-out-of-bounds-read-in-pdf-xc-3e078fb0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8846%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8845-cwe-125-out-of-bounds-read-in-pdf-xc-d27f0b35</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8845%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8844-cwe-125-out-of-bounds-read-in-pdf-xc-f39773ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8844%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8843-cwe-125-out-of-bounds-read-in-pdf-xc-383b62d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8843%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8842-cwe-457-use-of-uninitialized-variabl-b24011fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8842%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8841-cwe-125-out-of-bounds-read-in-pdf-xc-e3ba5f04</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8841%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8840-cwe-125-out-of-bounds-read-in-pdf-xc-d05fb507</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8840%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8839-cwe-125-out-of-bounds-read-in-pdf-xc-f7478ac3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8839%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8838-cwe-125-out-of-bounds-read-in-pdf-xc-0cfe264c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8838%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8837-cwe-125-out-of-bounds-read-in-pdf-xc-be2aad92</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8837%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8836-cwe-125-out-of-bounds-read-in-pdf-xc-becfbe61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8836%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8835-cwe-125-out-of-bounds-read-in-pdf-xc-14b1ae83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8835%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8834-cwe-125-out-of-bounds-read-in-pdf-xc-bd124f9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8834%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8833-cwe-125-out-of-bounds-read-in-pdf-xc-a537d9fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8833%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8832-cwe-125-out-of-bounds-read-in-pdf-xc-823bb6b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8832%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b36b7ef31ef0b54f536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8831-cwe-125-out-of-bounds-read-in-pdf-xc-a5b20d57</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8831%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8830-cwe-787-out-of-bounds-write-in-pdf-x-a5248e22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8830%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b36b7ef31ef0b54f52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8829-cwe-125-out-of-bounds-read-in-pdf-xc-a45a344b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8829%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8828-cwe-125-out-of-bounds-read-in-pdf-xc-fe9385a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8828%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8827-cwe-787-out-of-bounds-write-in-pdf-x-9de76e9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8827%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8826-cwe-125-out-of-bounds-read-in-pdf-xc-38bae1ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8826%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f4e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8825-cwe-125-out-of-bounds-read-in-pdf-xc-cb98af09</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8825%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8824-cwe-125-out-of-bounds-read-in-pdf-xc-d6bc6247</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8824%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8823-cwe-125-out-of-bounds-read-in-pdf-xc-28dfcb6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8823%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8822-cwe-125-out-of-bounds-read-in-pdf-xc-ea9d5637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8821-cwe-416-use-after-free-in-pdf-xchang-60d656d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8821%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8820-cwe-125-out-of-bounds-read-in-pdf-xc-2bf9ff85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8820%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8819-cwe-125-out-of-bounds-read-in-pdf-xc-f4dcbf58</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8819%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8818-cwe-416-use-after-free-in-pdf-xchang-56a39c4c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8818%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8817-cwe-787-out-of-bounds-write-in-pdf-x-8347f334</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8817%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8816-cwe-416-use-after-free-in-pdf-xchang-53ea6b1d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8816%3A%20CWE-416%3A%20Use%20After%20Free%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6b34b7ef31ef0b54f482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8815-cwe-119-improper-restriction-of-oper-5be0f633</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8815%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8814-cwe-125-out-of-bounds-read-in-pdf-xc-5b5e4e98</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8814%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8813-cwe-787-out-of-bounds-write-in-pdf-x-ffe7860d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8813%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8812-cwe-125-out-of-bounds-read-in-pdf-xc-e22ad3f6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8812%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8811-cwe-693-protection-mechanism-failure-b9b89c33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8811%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20WinZip%20Computing%20WinZip&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8809-cwe-78-improper-neutralization-of-sp-6a20953e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8809%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cohesive%20Networks%20VNS3&amp;severity=high&amp;id=699f6b34b7ef31ef0b54f46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8808-cwe-78-improper-neutralization-of-sp-aaee6df8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8808%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cohesive%20Networks%20VNS3&amp;severity=high&amp;id=699f6b32b7ef31ef0b54f3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8807-cwe-78-improper-neutralization-of-sp-f5e07941</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8807%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cohesive%20Networks%20VNS3&amp;severity=critical&amp;id=699f6b32b7ef31ef0b54f3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8806-cwe-78-improper-neutralization-of-sp-01247774</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8806%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cohesive%20Networks%20VNS3&amp;severity=critical&amp;id=699f6b32b7ef31ef0b54f3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9257-cwe-20-improper-input-validation-in--0f85d4be</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9257%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9766-cwe-59-improper-link-resolution-befo-0cafe313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9766%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Wacom%20Center&amp;severity=high&amp;id=699f6b5fb7ef31ef0b554bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9755-cwe-125-out-of-bounds-read-in-tungst-f8c6c506</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9755%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5eb7ef31ef0b554b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9757-cwe-125-out-of-bounds-read-in-tungst-8e4738b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9757%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9761-cwe-125-out-of-bounds-read-in-tungst-d672a2d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9761%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5fb7ef31ef0b554bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9735-cwe-787-out-of-bounds-write-in-tungs-20beae0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9735%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9744-cwe-787-out-of-bounds-write-in-tungs-6eac207a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9744%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9751-cwe-125-out-of-bounds-read-in-tungst-bdaefae9</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9751%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5eb7ef31ef0b554b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9764-cwe-416-use-after-free-in-tungsten-a-5ae53879</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9764%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5fb7ef31ef0b554bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9758-cwe-125-out-of-bounds-read-in-tungst-1ba87abb</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9758%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9753-cwe-125-out-of-bounds-read-in-tungst-8a5f1db7</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9753%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9763-cwe-125-out-of-bounds-read-in-tungst-166752c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9763%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5fb7ef31ef0b554bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9762-cwe-125-out-of-bounds-read-in-tungst-414018f2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9762%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5fb7ef31ef0b554bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9760-cwe-125-out-of-bounds-read-in-tungst-118003cf</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9760%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9759-cwe-125-out-of-bounds-read-in-tungst-77aa402a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9759%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9754-cwe-125-out-of-bounds-read-in-tungst-a5e61cec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9754%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9752-cwe-125-out-of-bounds-read-in-tungst-d48fb3ea</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9752%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5eb7ef31ef0b554b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9734-cwe-122-heap-based-buffer-overflow-i-2f611727</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9734%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9733-cwe-787-out-of-bounds-write-in-tungs-579b640a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9733%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9736-cwe-787-out-of-bounds-write-in-tungs-6819631a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9736%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9737-cwe-787-out-of-bounds-write-in-tungs-4bb889b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9737%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9739-cwe-119-improper-restriction-of-oper-fbf620d6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9739%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9750-cwe-125-out-of-bounds-read-in-tungst-06aff98c</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9750%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9745-cwe-121-stack-based-buffer-overflow--2aaafe07</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9745%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9741-cwe-122-heap-based-buffer-overflow-i-da273167</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9741%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9746-cwe-787-out-of-bounds-write-in-tungs-bf083c7b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9746%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9747-cwe-787-out-of-bounds-write-in-tungs-3a4e0dcc</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9747%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9740-cwe-787-out-of-bounds-write-in-tungs-4be6d7f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9740%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9742-cwe-122-heap-based-buffer-overflow-i-1f0fed6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9742%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9738-cwe-119-improper-restriction-of-oper-ffb4ba28</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9738%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9749-cwe-125-out-of-bounds-read-in-tungst-e931890e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9749%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=low&amp;id=699f6b5db7ef31ef0b554ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9748-cwe-416-use-after-free-in-tungsten-a-9cd7a2ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9748%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9743-cwe-122-heap-based-buffer-overflow-i-889b1723</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9743%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9732-cwe-416-use-after-free-in-tungsten-a-d3049eff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9732%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Tungsten%20Automation%20Power%20PDF&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9731-cwe-119-improper-restriction-of-oper-818c4a6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9731%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5db7ef31ef0b554a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9730-cwe-119-improper-restriction-of-oper-b550be1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9730%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9729-cwe-416-use-after-free-in-trimble-sk-2670d7da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9729%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9728-cwe-416-use-after-free-in-trimble-sk-d347deb6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9728%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9727-cwe-416-use-after-free-in-trimble-sk-8da2b8bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9727%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9726-cwe-121-stack-based-buffer-overflow--831e5749</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9726%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9725-cwe-416-use-after-free-in-trimble-sk-21587bcb</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9725%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9724-cwe-416-use-after-free-in-trimble-sk-460e26d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9723-cwe-416-use-after-free-in-trimble-sk-1e44b4c2</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9723%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9722-cwe-416-use-after-free-in-trimble-sk-dfc6eaf2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9722%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9721-cwe-416-use-after-free-in-trimble-sk-a03455f5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9721%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b5549d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9720-cwe-125-out-of-bounds-read-in-trimbl-e150beb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9720%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b554994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9719-cwe-416-use-after-free-in-trimble-sk-83be95be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9719%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b55498e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9718-cwe-125-out-of-bounds-read-in-trimbl-e05d6289</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9718%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b554987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9717-cwe-457-use-of-uninitialized-variabl-8d855978</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9717%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b554984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9716-cwe-416-use-after-free-in-trimble-sk-4aae16d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9716%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b554981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9715-cwe-416-use-after-free-in-trimble-sk-23955eb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9715%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b55497e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9714-cwe-416-use-after-free-in-trimble-sk-e2343639</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9714%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Viewer&amp;severity=high&amp;id=699f6b5bb7ef31ef0b55497b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9713-cwe-416-use-after-free-in-trimble-sk-a3c69a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9713%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp%20Pro&amp;severity=high&amp;id=699f6b5bb7ef31ef0b554978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9712-cwe-416-use-after-free-in-trimble-sk-9138131c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9712%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Trimble%20SketchUp&amp;severity=high&amp;id=699f6b5bb7ef31ef0b554975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11581-cwe-125-out-of-bounds-read-in-luxio-286341bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11581%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6e18b7ef31ef0b59510d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11580-cwe-122-heap-based-buffer-overflow--dfe4790a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11580%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6e18b7ef31ef0b595105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11579-cwe-787-out-of-bounds-write-in-luxi-d1504bb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11579%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6e18b7ef31ef0b5950fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11578-cwe-121-stack-based-buffer-overflow-811626d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11578%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6e18b7ef31ef0b5950f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11577-cwe-787-out-of-bounds-write-in-luxi-6b3ff2a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11577%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6e18b7ef31ef0b5950eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11576-cwe-122-heap-based-buffer-overflow--e7760e65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11576%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6e18b7ef31ef0b5950e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6260-cwe-59-improper-link-resolution-befo-ed0a048e</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6260%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Malwarebytes%20Anti-Malware&amp;severity=high&amp;id=699f6bfeb7ef31ef0b55d6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6249-cwe-121-stack-based-buffer-overflow--dcb00d3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6249%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Wyze%20Cam%20v3&amp;severity=high&amp;id=699f6bfeb7ef31ef0b55d680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6248-cwe-287-improper-authentication-in-w-9b96e7b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6248%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Wyze%20Cam%20v3&amp;severity=high&amp;id=699f6bfeb7ef31ef0b55d67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6247-cwe-78-improper-neutralization-of-sp-4a25b923</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6247%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Wyze%20Cam%20v3&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6246-cwe-122-heap-based-buffer-overflow-i-08d22e2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6246%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wyze%20Cam%20v3&amp;severity=critical&amp;id=699f6bfeb7ef31ef0b55d675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6233-cwe-59-improper-link-resolution-befo-8714198d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6233%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Check%20Point%20ZoneAlarm%20Extreme%20Security&amp;severity=high&amp;id=699f6bfeb7ef31ef0b55d672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5722-cwe-321-use-of-hard-coded-cryptograp-f805f003</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5722%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5721-cwe-306-missing-authentication-for-c-f72031d6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5721%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55cd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5720-cwe-78-improper-neutralization-of-sp-bfeb5d32</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5720%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55cd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5719-cwe-78-improper-neutralization-of-sp-a2f68f1b</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5719%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55cd0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5718-cwe-306-missing-authentication-for-c-50214cc5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5718%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55cd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5717-cwe-78-improper-neutralization-of-sp-8e76eeb6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5717%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55cd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5716-cwe-307-improper-restriction-of-exce-116aa8d3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5716%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55ccfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5513-cwe-787-out-of-bounds-write-in-kofax-260cc901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5513%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6beab7ef31ef0b55c1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5512-cwe-125-out-of-bounds-read-in-kofax--65ac9dd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5512%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6beab7ef31ef0b55c19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5511-cwe-125-out-of-bounds-read-in-kofax--303547c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5511%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6beab7ef31ef0b55c19b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5510-cwe-125-out-of-bounds-read-in-kofax--eb5ab817</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5510%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30377-cwe-59-improper-link-resolution-bef-12e01a55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30377%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20G%20DATA%20Total%20Security&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58dbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30376-cwe-427-uncontrolled-search-path-el-d5c1fd45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30376%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Famatech%20Advanced%20IP%20Scanner&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58dbac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1868-cwe-59-improper-link-resolution-befo-c9a69459</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1868%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20G%20DATA%20Total%20Security&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1867-cwe-59-improper-link-resolution-befo-16600bbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1867%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20G%20DATA%20Total%20Security&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52804-cwe-400-uncontrolled-resource-consu-dd9c2e0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52804%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tornadoweb%20tornado&amp;severity=high&amp;id=69092eed35043901e82cb110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8929-cwe-200-exposure-of-sensitive-inform-cb09fd3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8929%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=6909325935043901e83099a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8932-cwe-787-out-of-bounds-write-in-php-g-5de131aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8932%3A%20CWE-787%20Out-of-bounds%20Write%20in%20PHP%20Group%20PHP&amp;severity=critical&amp;id=6909325935043901e83099a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10666-cwe-639-authorization-bypass-throug-1e7701d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10666%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Easy%20Twitter%20Feed%20%E2%80%93%20Twitter%20feeds%20plugin%20for%20WP&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8735-cwe-79-improper-neutralization-of-in-42d3ba76</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailmunch%20MailMunch%20%E2%80%93%20Grow%20your%20Email%20List&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11225-cwe-79-improper-neutralization-of-i-24fbc33d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Premium%20Packages%20%E2%80%93%20Sell%20Digital%20Products%20Securely&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b594161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10034-cwe-79-improper-neutralization-of-i-5a0a438e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gallerycreator%20Gallery%20Blocks%20with%20Lightbox.%20Image%20Gallery%2C%20(HTML5%20video%20%2C%20YouTube%2C%20Vimeo)%20Video%20Gallery%20and%20Lightbox%20for%20native%20gallery&amp;severity=medium&amp;id=699f6debb7ef31ef0b590b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11601-cwe-862-missing-authorization-in-te-4a72e086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11601%3A%20CWE-862%20Missing%20Authorization%20in%20techfyd%20Sky%20Addons%20for%20Elementor%20(Free%20Templates%20Library%2C%20Live%20Copy%2C%20Animations%2C%20Post%20Grid%2C%20Post%20Carousel%2C%20Particles%2C%20Sliders%2C%20Chart%2C%20Blog%2C%20Video%20Gallery)&amp;severity=high&amp;id=699f6e18b7ef31ef0b59513f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11355-cwe-862-missing-authorization-in-co-7eab7352</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11355%3A%20CWE-862%20Missing%20Authorization%20in%20codelizarplugs%20Ultimate%20YouTube%20Video%20%26%20Shorts%20Player%20With%20Vimeo&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11104-cwe-862-missing-authorization-in-te-ca28c3a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11104%3A%20CWE-862%20Missing%20Authorization%20in%20techfyd%20Sky%20Addons%20for%20Elementor%20(Free%20Templates%20Library%2C%20Live%20Copy%2C%20Animations%2C%20Post%20Grid%2C%20Post%20Carousel%2C%20Particles%2C%20Sliders%2C%20Chart%2C%20Blog%2C%20Video%20Gallery)&amp;severity=high&amp;id=699f6e07b7ef31ef0b593da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11381-cwe-79-improper-neutralization-of-i-887300a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11381%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cesarmaeso%20Control%20horas&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59492b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47863-na-5051f40c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47863%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d09b7ef31ef0b56d640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37783-na-8c814738</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37783%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37782-na-64e2d8eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37782%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6fb7ef31ef0b563fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52726-na-74041b03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52726%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb7b7ef31ef0b55a569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51074-na-3228facf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51074%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51073-na-1fc9b684</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51073%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b5579cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51072-na-4f7a135c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51072%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b5579c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50965-na-558a4240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50965%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b557672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50657-na-ce10c462</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50657%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b55737b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-22-f12651</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52616-small-space-of-random-values-aecb91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52616%3A%20Small%20Space%20of%20Random%20Values&amp;severity=medium&amp;id=682cd0fc1484d88663aecb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52615-use-of-insufficiently-random-values-d7f43b99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52615%3A%20Use%20of%20Insufficiently%20Random%20Values&amp;severity=medium&amp;id=683ee1ec182aa0cae27396f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53095-vulnerability-in-linux-linux-bdf999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53094-vulnerability-in-linux-linux-bdf995</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53093-vulnerability-in-linux-linux-bdf975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53092-vulnerability-in-linux-linux-bdf971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53091-vulnerability-in-linux-linux-bdf96d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53090-vulnerability-in-linux-linux-bdf969</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53089-vulnerability-in-linux-linux-bdf965</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28027-cwe-78-improper-neutralization-of-s-3341eeba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28027%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MC%20Technologies%20MC%20LR%20Router&amp;severity=high&amp;id=69092621fe7723195e0b46de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28026-cwe-78-improper-neutralization-of-s-4d7fb1d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28026%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MC%20Technologies%20MC%20LR%20Router&amp;severity=high&amp;id=69092621fe7723195e0b46da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28025-cwe-78-improper-neutralization-of-s-3a12bfe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28025%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20MC%20Technologies%20MC%20LR%20Router&amp;severity=high&amp;id=69092621fe7723195e0b46d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11088-cwe-200-exposure-of-sensitive-infor-4fc653ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11088%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20mra13%20Simple%20Membership&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11089-cwe-200-exposure-of-sensitive-infor-f7a8af77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11089%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cayenne%20Anonymous%20Restricted%20Content&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9542-cwe-200-exposure-of-sensitive-inform-936ab807</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9542%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20techfyd%20Sky%20Addons%20for%20Elementor%20(Free%20Templates%20Library%2C%20Live%20Copy%2C%20Animations%2C%20Post%20Grid%2C%20Post%20Carousel%2C%20Particles%2C%20Sliders%2C%20Chart%2C%20Blog%2C%20Video%20Gallery)&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10316-cwe-200-exposure-of-sensitive-infor-cb4c6bff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10316%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jetmonsters%20Stratum%20%E2%80%93%20Elementor%20Widgets&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10792-cwe-79-improper-neutralization-of-i-bec57f2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getwpfunnels%20Easiest%20Funnel%20Builder%20For%20WordPress%20%26%20WooCommerce%20by%20WPFunnels&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b59256f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11596-cwe-126-buffer-over-read-in-wiresha-9861f067</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11596%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949b3c064ed76fb5b76e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11595-cwe-835-loop-with-unreachable-exit--e72041b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11595%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949b3c064ed76fb5b76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10675-cwe-79-improper-neutralization-of-i-658819b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cservit%20affiliate-toolkit%20%E2%80%93%20WP%20Affiliate%20Plugin%20with%20Amazon&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591ab1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11371-cwe-79-improper-neutralization-of-i-3bec1050</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20slimndap%20Theater%20for%20WordPress&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11456-cwe-79-improper-neutralization-of-i-baf7cd36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdedev%20Run%20Contests%2C%20Raffles%2C%20and%20Giveaways%20with%20ContestsWP&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10400-cwe-89-improper-neutralization-of-s-1f6240bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10400%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=699f6df4b7ef31ef0b5914a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10890-cwe-79-improper-neutralization-of-i-e1d84d05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gwin%20WPAdverts%20%E2%80%93%20Classifieds%20Plugin&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10393-cwe-284-improper-access-control-in--987aa2d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10393%3A%20CWE-284%20Improper%20Access%20Control%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6df3b7ef31ef0b591429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9828-cwe-89-sql-injection-in-taskbuilder-0c3cd3b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9828%3A%20CWE-89%20SQL%20Injection%20in%20Taskbuilder&amp;severity=medium&amp;id=6961693845ea0302aa73d9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10671-cwe-639-authorization-bypass-throug-f5d63679</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10671%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Button%20Block%20%E2%80%93%20Get%20fully%20customizable%20%26%20multi-functional%20buttons&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11334-cwe-862-missing-authorization-in-lu-541d9f69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11334%3A%20CWE-862%20Missing%20Authorization%20in%20luydjmi%20My%20Contador%20lesr&amp;severity=medium&amp;id=699f6e0eb7ef31ef0b5945e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10788-cwe-79-improper-neutralization-of-i-df22b926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10788%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pojome%20Activity%20Log%20%E2%80%93%20Monitor%20%26%20Record%20User%20Changes&amp;severity=high&amp;id=699f6dfdb7ef31ef0b592561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10782-cwe-639-authorization-bypass-throug-09595209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10782%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20theblockswp%20Theme%20Builder%20For%20Elementor&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b59247f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11438-cwe-79-improper-neutralization-of-i-8986f36e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11438%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jburleigh1%20StreamWeasels%20Online%20Status%20Bar&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10528-cwe-862-missing-authorization-in-ul-d18f6bcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10528%3A%20CWE-862%20Missing%20Authorization%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9371-cwe-79-improper-neutralization-of-in-1f7aeb4f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9371%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Branda%20%E2%80%93%20Branda%20%E2%80%93%20White%20Label%20%26%20Branding%2C%20Custom%20Login%20Page%20Customizer&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10623-cwe-79-improper-neutralization-of-i-88ba3525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EngineThemes%20ForumEngine&amp;severity=medium&amp;id=699f6df8b7ef31ef0b59191c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10796-cwe-639-authorization-bypass-throug-8552429f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10796%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ifso%20If-So%20Dynamic%20Content%20Personalization&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10785-cwe-79-improper-neutralization-of-i-03ae7292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b592554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11440-cwe-79-improper-neutralization-of-i-cb78d347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20greyowl0015%20Grey%20Owl%20Lightbox&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10177-cwe-79-improper-neutralization-of-i-c3acc65f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11365-cwe-79-improper-neutralization-of-i-2eddb6ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20securityforce%20Crypto%20and%20DeFi%20Widgets%20%E2%80%93%20Web3%20Cryptocurrency%20Shortcodes&amp;severity=medium&amp;id=699f6e10b7ef31ef0b594814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11416-cwe-352-cross-site-request-forgery--70e1de94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11416%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexvtn%20WIP%20Incoming%20Lite&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10898-cwe-98-improper-control-of-filename-62cc603b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10898%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20krishaweb%20Contact%20Form%207%20Email%20Add%20on&amp;severity=high&amp;id=699f6e01b7ef31ef0b5936dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10172-cwe-79-improper-neutralization-of-i-c299393c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidcoders%20WPBakery%20Visual%20Composer%20WHMCS%20Elements&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11385-cwe-79-improper-neutralization-of-i-af17d142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20safi-mohammad%20Pure%20CSS%20Circle%20Progress%20bar&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59493b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9442-cwe-79-improper-neutralization-of-in-ac7897a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faktorvier%20F4%20Improvements&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11388-cwe-79-improper-neutralization-of-i-5dbc13bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tahmidulkarim%20Dino%20Game%20%E2%80%93%20Embed%20Google%20Chrome%20Dinosaur%20Game%20in%20WordPress&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11409-cwe-502-deserialization-of-untruste-bb9be9dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11409%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20priyajain2802%20Grid%20View%20Gallery&amp;severity=high&amp;id=699f6e13b7ef31ef0b594baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11424-cwe-79-improper-neutralization-of-i-1f3c3e9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11424%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pengbos%20Slick%20Sitemap&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11360-cwe-79-improper-neutralization-of-i-637f91e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11360%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20husobj%20Page%20Parts&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10696-cwe-639-authorization-bypass-throug-36bc7839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10696%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codersaiful%20UltraAddons%20%E2%80%93%20Elementor%20Addons%20(Header%20Footer%20Builder%2C%20Custom%20Font%2C%20Custom%20CSS%2CWoo%20Widget%2C%20Menu%20Builder%2C%20Anywhere%20Elementor%20Shortcode)&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b5923a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10522-cwe-79-improper-neutralization-of-i-25a672d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10522%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seb-emendo%20Co-marquage%20service-public.fr&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11197-cwe-693-protection-mechanism-failur-750aca1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11197%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20babatechs%20Lock%20User%20Account&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11412-cwe-79-improper-neutralization-of-i-6273275f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11412%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sabbirislam397%20Shine%20PDF%20Embeder&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11435-cwe-79-improper-neutralization-of-i-039cc45c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11435%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20goback2%20salavat%20counter%20Plugin&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11432-cwe-79-improper-neutralization-of-i-45054b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexvtn%20SuevaFree%20Essential%20Kit&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11428-cwe-79-improper-neutralization-of-i-b5429026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aishan%20Lazy%20load%20videos%20and%20sticky%20control&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11354-cwe-862-missing-authorization-in-co-154916bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11354%3A%20CWE-862%20Missing%20Authorization%20in%20codelizarplugs%20Ultimate%20YouTube%20Video%20%26%20Shorts%20Player%20With%20Vimeo&amp;severity=medium&amp;id=699f6e0fb7ef31ef0b5946ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10726-cwe-352-cross-site-request-forgery--1b7d301c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10726%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mainichiweb%20Friendly%20Functions%20for%20Welcart&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b5923cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11370-cwe-79-improper-neutralization-of-i-777fac0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mediaticus%20Subaccounts%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e10b7ef31ef0b59482f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9111-cwe-79-improper-neutralization-of-in-7945ceb3</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9111%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Product%20Designer&amp;severity=medium&amp;id=699f6b3fb7ef31ef0b54fbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11455-cwe-79-improper-neutralization-of-i-23721299</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wolfgang101%20Include%20Mastodon%20Feed&amp;severity=medium&amp;id=699f6e16b7ef31ef0b594f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10532-cwe-862-missing-authorization-in-wp-0c7372e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10532%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Bard%20Extra&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11414-cwe-79-improper-neutralization-of-i-6581acfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11414%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dasmaeh%20RecipePress%20Reloaded&amp;severity=medium&amp;id=699f6e13b7ef31ef0b594bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10164-cwe-79-improper-neutralization-of-i-c1a186b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10164%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Premium%20Packages%20%E2%80%93%20Sell%20Digital%20Products%20Securely&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9851-cwe-79-improper-neutralization-of-in-c1ca8596</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20feedmymedia%20LSX%20Tour%20Operator&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10682-cwe-79-improper-neutralization-of-i-b4658e76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mikewire_rocksolid%20Announcement%20%26%20Notification%20Banner%20%E2%80%93%20Bulletin&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11447-cwe-79-improper-neutralization-of-i-59615e91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peepso%20Community%20by%20PeepSo%20%E2%80%93%20Download%20from%20PeepSo.com&amp;severity=medium&amp;id=699f6e15b7ef31ef0b594e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48286-na-cb2bdb0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48286%3A%20n%2Fa&amp;severity=high&amp;id=699f6d13b7ef31ef0b56daf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45517-na-66c6807b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45517%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45514-na-ce467bde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45514%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45513-na-545c916b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45513%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45512-na-ff4ca3ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45512%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45194-na-40e99d89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45194%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53432-na-d17f0ce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53432%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53429-na-713268d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53429%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbeb7ef31ef0b55a8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53426-na-d00c275b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53426%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53425-na-555e4a16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53425%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53335-na-1ca3f91a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53335%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53334-na-0240ec37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53334%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53333-na-f2f7584d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53333%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51367-na-6b8f1d6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51367%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb1b7ef31ef0b55a242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51366-na-84550a65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51366%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb1b7ef31ef0b55a23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51364-na-dcb5bdea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51364%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51337-na-8e51bb17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51337%3A%20n%2Fa&amp;severity=low&amp;id=699f6bb1b7ef31ef0b55a1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48747-na-b2bb0cf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48747%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30896-na-971ec7e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30896%3A%20n%2Fa&amp;severity=critical&amp;id=69456ab7a90e3c9a1542fb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-21-f13114</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f13114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52470-improper-neutralization-of-input-du-98706271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52470%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainvireinfo%20Dynamic%20URL%20SEO&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52472-improper-neutralization-of-input-du-1f612e30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weather%20Atlas%20Weather%20Atlas%20Widget&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52473-improper-neutralization-of-input-du-56e4d668</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52473%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sandeep%20Verma%20HTML5%20Lyrics%20Karaoke%20Player&amp;severity=null&amp;id=69cd754fe6bfc5ba1df03f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11154-cwe-862-missing-authorization-in-ke-48b6bf36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11154%3A%20CWE-862%20Missing%20Authorization%20in%20kevinb%20PublishPress%20Revisions%3A%20Duplicate%20Posts%2C%20Submit%2C%20Approve%20and%20Schedule%20Content%20Changes&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10913-cwe-502-deserialization-of-untruste-b6eb288c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10913%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20migrate%20Clone&amp;severity=high&amp;id=699f6e03b7ef31ef0b5938f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9479-cwe-266-incorrect-privilege-assignme-70b28dff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9479%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9478-cwe-266-incorrect-privilege-assignme-1b7e30c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9478%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20upKeeper%20Solutions%20upKeeper%20Instant%20Privilege%20Access&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52437-missing-authentication-for-critical-10dacc01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52437%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Saul%20Morales%20Pacheco%20Banner%20System&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52438-missing-authentication-for-critical-e70bb491</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52438%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20deco.agency%20de%3Abranding&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11404-cwe-434-unrestricted-upload-of-file-1fbaa3dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11404%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20django%20CMS%20Association%20django%20Filer&amp;severity=medium&amp;id=68ee47d0509368ccaa6fc9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52451-cross-site-request-forgery-csrf-in--d8cefffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52451%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aaronrobbins%20Post%20Ideas&amp;severity=null&amp;id=69cd754be6bfc5ba1df03da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52448-improper-limitation-of-a-pathname-t-2e0c2fc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52448%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webcodingplace%20Ultimate%20Classified%20Listings&amp;severity=null&amp;id=69cd754be6bfc5ba1df03da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10520-cwe-862-missing-authorization-in-we-9137418b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10520%3A%20CWE-862%20Missing%20Authorization%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=medium&amp;id=699f6df4b7ef31ef0b59154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52450-improper-control-of-filename-for-in-60fb2146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52450%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20officialprocoders%20nBlocks&amp;severity=null&amp;id=69cd754be6bfc5ba1df03da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52439-deserialization-of-untrusted-data-i-de028bf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52439%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mark%20O&apos;Donnell%20Team%20Rosters&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52440-deserialization-of-untrusted-data-i-f1315f1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52440%3A%20Deserialization%20of%20Untrusted%20Data%20in%20xpresslane%20Xpresslane%20Fast%20Checkout&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52441-improperly-controlled-modification--47b1a15c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52441%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20Rajesh%20Thanoch%20Quick%20Learn&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52443-deserialization-of-untrusted-data-i-f873a829</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52443%3A%20Deserialization%20of%20Untrusted%20Data%20in%20masikonis%20Geolocator&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52445-deserialization-of-untrusted-data-i-150434d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52445%3A%20Deserialization%20of%20Untrusted%20Data%20in%20ModelTheme%20QRMenu%20Restaurant%20QR%20Menu%20Lite&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52446-cross-site-request-forgery-csrf-in--08aa8c10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52446%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Buying%20Buddy%20Buying%20Buddy%20IDX%20CRM&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52444-improper-limitation-of-a-pathname-t-fefd2c9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52444%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpopal%20Opal%20Woo%20Custom%20Product%20Variation&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52447-path-traversal-in-corporatezen222-c-93e2c374</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52447%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20corporatezen222%20Contact%20Page%20With%20Google%20Map&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10872-cwe-79-improper-neutralization-of-i-1be07491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Getwid%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48899-improper-access-control-f465cfcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48899%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45691-b116e47c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45691&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45690-661b0d4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45690&amp;severity=high&amp;id=699f6cefb7ef31ef0b56a581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45689-d7501627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45689&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11179-cwe-89-improper-neutralization-of-s-94d16943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11179%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10891-cwe-79-improper-neutralization-of-i-4a896af9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pdfcrowd%20Save%20as%20PDF%20Plugin%20by%20Pdfcrowd&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10665-cwe-862-missing-authorization-in-ya-b737a6eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10665%3A%20CWE-862%20Missing%20Authorization%20in%20yaadsarig%20Yaad%20Sarig%20Payment%20Gateway%20For%20WC&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10126-cwe-552-files-or-directories-access-3714c44f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10126%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20M-Files%20Corporation%22%20M-Files%20Server&amp;severity=medium&amp;id=699c3035be58cf853b75f103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10127-cwe-303-incorrect-implementation-of-76884949</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10127%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=critical&amp;id=699c3035be58cf853b75f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11176-cwe-863-incorrect-authorization-in--359ed7d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11176%3A%20CWE-863%20Incorrect%20Authorization%20in%20M-Files%20Corporation%20M-Files%20Aino&amp;severity=medium&amp;id=699c3035be58cf853b75f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10365-cwe-200-exposure-of-sensitive-infor-d06be6f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10365%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6df3b7ef31ef0b591407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10855-cwe-639-authorization-bypass-throug-8da75558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10855%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sirv%20Image%20Optimizer%2C%20Resizer%20and%20CDN%20%E2%80%93%20Sirv&amp;severity=high&amp;id=699f6dffb7ef31ef0b5927f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10899-cwe-94-improper-control-of-generati-fdb598ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10899%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wcproducttable%20WooCommerce%20Product%20Table%20Lite&amp;severity=high&amp;id=699f6e01b7ef31ef0b5936e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9239-cwe-79-improper-neutralization-of-in-8a0633c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8726-cwe-79-improper-neutralization-of-in-9ccf7d84</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailmunch%20MailChimp%20Forms%20by%20MailMunch&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10900-cwe-862-missing-authorization-in-me-0b5f157d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10900%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6e03b7ef31ef0b5938dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11277-cwe-79-improper-neutralization-of-i-bbea0401</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aaron13100%20404%20Solution&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b5942f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9653-cwe-79-improper-neutralization-of-in-247868d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gloriafood%20Restaurant%20Menu%20%E2%80%93%20Food%20Ordering%20System%20%E2%80%93%20Table%20Reservation&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11278-cwe-79-improper-neutralization-of-i-9aca0689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gdragon%20GD%20bbPress%20Attachments&amp;severity=medium&amp;id=699f6e0bb7ef31ef0b5942fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29292-na-ef8f8688</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29292%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9bb7ef31ef0b589462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45511-na-e3726dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45511%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45510-na-ed0b8202</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45510%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33439-na-059ad7f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33439%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c42b7ef31ef0b561a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52771-na-adff93e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52771%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb8b7ef31ef0b55a5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52770-na-7676c3a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52770%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb8b7ef31ef0b55a5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52769-na-85ba2f73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52769%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb8b7ef31ef0b55a5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52757-na-7b16adde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52757%3A%20n%2Fa&amp;severity=low&amp;id=699f6bb8b7ef31ef0b55a5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52755-na-39f4484d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52755%3A%20n%2Fa&amp;severity=low&amp;id=699f6bb8b7ef31ef0b55a5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52754-na-9783886e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52754%3A%20n%2Fa&amp;severity=low&amp;id=699f6bb7b7ef31ef0b55a576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52739-na-4510f714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52739%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb7b7ef31ef0b55a572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52725-na-722018f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52725%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb7b7ef31ef0b55a565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52701-na-ec221b9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52701%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb7b7ef31ef0b55a556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51209-na-fcd87291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51209%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b55892e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51151-na-345dc4f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51151%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48986-na-e6e32c77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48986%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48985-na-5e3c2566</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48985%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48984-na-72c8856f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48984%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7eb7ef31ef0b555e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48983-na-41af9f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48983%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48982-na-6b061abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48982%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48981-na-54e224f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48981%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48536-na-004daf0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48536%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b55588d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48535-na-3af3498c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48535%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b55588a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48534-na-d46b1df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48534%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b555887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48533-na-13d325a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48533%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b555884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48531-na-bb3eef65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48531%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b555881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48530-na-7d255a04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48530%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b55587e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52702-na-d56aa8c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52702%3A%20n%2Fa&amp;severity=medium&amp;id=69367514232db2b373822962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-20-f12388</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f12388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44309-processing-maliciously-crafted-web--3ec1b937</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44309%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20a%20cross%20site%20scripting%20attack.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20on%20Intel-based%20Mac%20systems.%20in%20Apple%20Safari&amp;severity=medium&amp;id=68f7d9b5247d717aace26b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44308-processing-maliciously-crafted-web--b6c93646</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44308%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20on%20Intel-based%20Mac%20systems.%20in%20Apple%20Safari&amp;severity=high&amp;id=68f7d9b5247d717aace26b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44307-an-app-may-be-able-to-execute-arbit-d06489cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44307%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb82fe6bfc5ba1df6ed56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44306-an-app-may-be-able-to-execute-arbit-ae9f4809</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44306%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb82fe6bfc5ba1df6ed53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51669-cross-site-request-forgery-csrf-in--b6882bd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51669%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kalmang%20Dynamic%20Widgets&amp;severity=null&amp;id=69cd7510e6bfc5ba1df02910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30424-improper-neutralization-of-input-du-e6d4caaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30424%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPZOOM%20Beaver%20Builder%20Addons%20by%20WPZOOM&amp;severity=null&amp;id=69cd741ee6bfc5ba1def546e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11400-cwe-79-improper-neutralization-of-i-d87c9935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=699f6e12b7ef31ef0b594a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53088-vulnerability-in-linux-linux-bdf961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53087-vulnerability-in-linux-linux-bdf95d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53086-vulnerability-in-linux-linux-bdf959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53085-vulnerability-in-linux-linux-bdcff3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53084-vulnerability-in-linux-linux-bdf955</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53083-vulnerability-in-linux-linux-bdf948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53082-vulnerability-in-linux-linux-bdf92d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53081-vulnerability-in-linux-linux-bdf929</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53080-vulnerability-in-linux-linux-bdf925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53079-vulnerability-in-linux-linux-bdf914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53078-vulnerability-in-linux-linux-bdf90c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53077-vulnerability-in-linux-linux-bdf906</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53076-vulnerability-in-linux-linux-bdf902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53075-vulnerability-in-linux-linux-bdf8fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53074-vulnerability-in-linux-linux-bdf8ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53073-vulnerability-in-linux-linux-bdcfef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53072-vulnerability-in-linux-linux-bdf8e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53071-vulnerability-in-linux-linux-bdf8d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53070-vulnerability-in-linux-linux-bdf8cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53069-vulnerability-in-linux-linux-bdf8c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53068-vulnerability-in-linux-linux-bdf8c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53067-vulnerability-in-linux-linux-bdf8c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53066-vulnerability-in-linux-linux-bdf8b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53065-vulnerability-in-linux-linux-bdf8a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53064-vulnerability-in-linux-linux-bdf8a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53063-vulnerability-in-linux-linux-bdf89d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53062-vulnerability-in-linux-linux-bdf88c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53061-vulnerability-in-linux-linux-bdf877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53060-vulnerability-in-linux-linux-bdf873</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53059-vulnerability-in-linux-linux-bdf86d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53058-vulnerability-in-linux-linux-bdf869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53057-vulnerability-in-linux-linux-bdf865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53056-vulnerability-in-linux-linux-bdcfcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53055-vulnerability-in-linux-linux-bdf861</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53053-vulnerability-in-linux-linux-bdf852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53052-vulnerability-in-linux-linux-bdf84a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53051-vulnerability-in-linux-linux-bdf842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53050-vulnerability-in-linux-linux-bdf83e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53049-vulnerability-in-linux-linux-bdf81c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9824c4522896dcbdf81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53048-vulnerability-in-linux-linux-bdf814</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53047-vulnerability-in-linux-linux-bdf80c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53046-vulnerability-in-linux-linux-bdf806</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53045-vulnerability-in-linux-linux-bdf802</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53044-vulnerability-in-linux-linux-bdf7e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53043-vulnerability-in-linux-linux-bdf7e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53042-vulnerability-in-linux-linux-bdf7d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50304-vulnerability-in-linux-linux-bdf79a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50304%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50303-vulnerability-in-linux-linux-bdf796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50303%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43338-cross-site-request-forgery-csrf-in--e724c327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43338%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Automattic%20Crowdsignal%20Dashboard%20%E2%80%93%20Polls%2C%20Surveys%20%26%20more&amp;severity=null&amp;id=69cd746fe6bfc5ba1def789e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51686-cross-site-request-forgery-csrf-in--f8a1d64e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51686%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Deepak%20Khokhar%20Manage%20User%20Columns&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52388-cross-site-request-forgery-csrf-in--4d21448b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52388%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mikeage%20Hebrew%20Date&amp;severity=null&amp;id=69cd7540e6bfc5ba1df03999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52401-cross-site-request-forgery-csrf-in--eee8a3b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52401%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HuangYe%20WuDeng%20Hacklog%20DownloadManager&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52402-cross-site-request-forgery-csrf-in--5791d21d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52402%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gunghoinc%20Exclusive%20Content%20Password%20Protect&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52420-cross-site-request-forgery-csrf-in--63f1a64a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52420%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themeisle%20Disable%20Admin%20Notices%20individually&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50532-improper-neutralization-of-input-du-7fb5fd9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50532%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jerin%20K%20Alexander%20Events%20Manager%20Pro%20%E2%80%93%20extended&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50533-cross-site-request-forgery-csrf-in--3c47dc1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50533%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20David%20Garcia%20Domain%20Sharding&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50534-cross-site-request-forgery-csrf-in--7725a94c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50534%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20techdabang%20World%20Prayer%20Time&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51631-cross-site-request-forgery-csrf-in--d591cda9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51631%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Md%20Eftakhairul%20Islam%20Sticky%20Social%20Bar&amp;severity=null&amp;id=69cd750ce6bfc5ba1df0275f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51632-cross-site-request-forgery-csrf-in--bd68c014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51632%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sam%20Hoe%20SH%20Slideshow&amp;severity=null&amp;id=69cd750ce6bfc5ba1df02762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51633-cross-site-request-forgery-csrf-in--f08ab29e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51633%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivycat%20Simple%20Page%20Specific%20Sidebars&amp;severity=null&amp;id=69cd750ce6bfc5ba1df02765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51634-cross-site-request-forgery-csrf-in--e21965be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20a.ankit%20Webriti%20Custom%20Login&amp;severity=null&amp;id=69cd750ce6bfc5ba1df02768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51635-cross-site-request-forgery-csrf-in--0bfe08fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51635%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Garmur%20While%20Loading&amp;severity=null&amp;id=69cd750ce6bfc5ba1df0276b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51636-cross-site-request-forgery-csrf-in--aa1e3fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51636%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Z.com%20byGMO%20GMO%20Social%20Connection&amp;severity=null&amp;id=69cd750ce6bfc5ba1df0276e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51637-cross-site-request-forgery-csrf-in--dafc3004</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51637%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sroyalty%20Admin%20SMS%20Alert&amp;severity=null&amp;id=69cd750ce6bfc5ba1df02771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51638-cross-site-request-forgery-csrf-in--ad084ab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51638%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Sanjeev%20Mohindra%20Awesome%20Shortcodes%20For%20Genesis&amp;severity=null&amp;id=69cd750ce6bfc5ba1df02774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51639-cross-site-request-forgery-csrf-in--3f210989</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51639%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hints%20Naver%20Blog&amp;severity=null&amp;id=69cd750de6bfc5ba1df027b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51640-cross-site-request-forgery-csrf-in--a48d62b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51640%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Matt%20Rude%20MDR%20Webmaster%20Tools&amp;severity=null&amp;id=69cd750de6bfc5ba1df027b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51641-cross-site-request-forgery-csrf-in--a5f1c0b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51641%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Juan%20Camilo%20Advanced%20PDF%20Generator&amp;severity=null&amp;id=69cd750de6bfc5ba1df027b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51642-cross-site-request-forgery-csrf-in--84efb7f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51642%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ivan9146%20Seo%20Free&amp;severity=null&amp;id=69cd750de6bfc5ba1df027bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51643-cross-site-request-forgery-csrf-in--56c1b879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51643%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ragaskar%20Amazon%20Associate%20Filter&amp;severity=null&amp;id=69cd750de6bfc5ba1df027bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51644-cross-site-request-forgery-csrf-in--006ce528</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51644%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20samwilson%20Addressbook&amp;severity=null&amp;id=69cd750de6bfc5ba1df027c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51645-cross-site-request-forgery-csrf-in--74702c7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51645%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themefusecom%20ThemeFuse%20Maintenance%20Mode&amp;severity=null&amp;id=69cd750de6bfc5ba1df027c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51648-cross-site-request-forgery-csrf-in--da69cb2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51648%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hands01%20e-shops&amp;severity=null&amp;id=69cd750de6bfc5ba1df027cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51649-cross-site-request-forgery-csrf-in--cf83fc23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51649%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Patrick%20Lumumba%20Mobilize&amp;severity=null&amp;id=69cd750de6bfc5ba1df027ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51650-cross-site-request-forgery-csrf-in--2d63bb89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51650%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottmydollarplancom%20Random%20Featured%20Post&amp;severity=null&amp;id=69cd750de6bfc5ba1df027d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51652-cross-site-request-forgery-csrf-in--f4466a50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51652%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marckocher%20Skip%20To&amp;severity=null&amp;id=69cd750fe6bfc5ba1df02858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51653-cross-site-request-forgery-csrf-in--2d5a6530</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51653%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20akira1891%20UPDATE%20NOTIFICATIONS&amp;severity=null&amp;id=69cd750fe6bfc5ba1df0285b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51654-cross-site-request-forgery-csrf-in--c462b8ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51654%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Eric%20Allen%20APK%20Downloader&amp;severity=null&amp;id=69cd750fe6bfc5ba1df0285e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51655-cross-site-request-forgery-csrf-in--16782cc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51655%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20microkid%20Custom%20Author%20URL&amp;severity=null&amp;id=69cd750fe6bfc5ba1df02861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51656-cross-site-request-forgery-csrf-in--eb6ae97c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51656%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20litefeel%20Flash%20Show%20And%20Hide%20Box&amp;severity=null&amp;id=69cd750fe6bfc5ba1df02864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51657-cross-site-request-forgery-csrf-in--03959ad6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51657%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Woopy%20Plugins%20SmartLink%20Dynamic%20URLs&amp;severity=null&amp;id=69cd750fe6bfc5ba1df02867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52421-cross-site-request-forgery-csrf-in--814d1668</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52421%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20WP%20Popup%20Window%20Maker&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50513-improper-neutralization-of-input-du-0304523d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50513%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPXPO%20PostX&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50514-improper-neutralization-of-input-du-64875d2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50514%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kevin%20Stover%20Ninja%20Forms&amp;severity=null&amp;id=69cd74fde6bfc5ba1df0217c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50515-improper-neutralization-of-input-du-97e55793</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50515%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kevin%20Stover%20Ninja%20Forms&amp;severity=null&amp;id=69cd74fde6bfc5ba1df0217f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50516-improper-neutralization-of-input-du-5980e57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50516%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adamskaat%20Countdown%20%26%20Clock&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50517-improper-neutralization-of-input-du-6f5f429b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50517%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IDSK%20team%20ID-SK%20Toolkit&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50518-improper-neutralization-of-input-du-ad96830c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50518%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Common%20Ninja%20Pricer%20Ninja&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df02213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50519-improper-neutralization-of-input-du-e0a8a568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Josh%20Kohlbach%20Jigoshop%20%E2%80%93%20Store%20Exporter&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df02216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50520-improper-neutralization-of-input-du-352908bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50520%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Peter%20J.%20Herrel%20Ancient%20World%20Linked%20Data&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df02219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50521-improper-neutralization-of-input-du-326fc22e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50521%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alleythemes%20Alley%20Elementor%20Widget&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df0221c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50522-improper-neutralization-of-input-du-fa04a6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50522%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redyyu%20WeChat%20Subscribers%20Lite&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df0221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50535-improper-neutralization-of-input-du-8e87beb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50535%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kyle%20M%20Brown%20Step%20by%20Step&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50536-improper-neutralization-of-input-du-a25b2ff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50536%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tamer%20Ziady%20GDReseller&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50537-improper-neutralization-of-input-du-2285f073</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50537%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stefano%20Marra%20Smart%20Mockups&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50538-improper-neutralization-of-input-du-8cb8e259</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50538%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20irfantea%20Show%20Visitor%20IP%20Address&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50540-improper-neutralization-of-input-du-cd9fed78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50540%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20demixpress%20(dp)%20AddThis&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50541-improper-neutralization-of-input-du-51f43d06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20overclokk%20Advanced%20Control%20Manager%20for%20WordPress%20by%20ItalyStrap&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50542-improper-neutralization-of-input-du-2046d06f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50542%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zachsilberstein%20RLM%20Elementor%20Widgets%20Pack&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50543-improper-neutralization-of-input-du-cc0624ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50543%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mudssar%20amazing%20neo%20icon%20font%20for%20elementor&amp;severity=null&amp;id=69cd7501e6bfc5ba1df0234a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50545-improper-neutralization-of-input-du-fdd4461c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50545%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AuburnForest%20DataMentor&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50546-improper-neutralization-of-input-du-c627fa17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Riley%20Magnuson%20MyOrderDesk&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50547-improper-neutralization-of-input-du-1e20ccab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50547%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20Hodder%20Themedy%20Toolbox&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50548-improper-neutralization-of-input-du-2cbe0d7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50548%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abdullah%20Nahian%20Awesome%20Progress%20Bar&amp;severity=null&amp;id=69cd7501e6bfc5ba1df02359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50549-improper-neutralization-of-input-du-ae60df83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Steven%20Nolles%20Bonway%20Static%20Block%20Editor&amp;severity=null&amp;id=69cd7503e6bfc5ba1df023c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50551-improper-neutralization-of-input-du-3f39257b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50551%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Odyno%20EndomondoWP&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50552-improper-neutralization-of-input-du-1d257612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50552%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jasonpancake%20Hover%20Video%20Preview&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50553-improper-neutralization-of-input-du-ec6ef612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Classy%20Addons%20Classy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50556-improper-neutralization-of-input-du-c176efec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50556%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WorldMarkerter%20WM%20Zoom&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51794-improper-neutralization-of-input-du-aee67a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51794%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sellerthemes%20Storely&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51795-improper-neutralization-of-input-du-759ba8a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51795%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fayjur%20Pdf%20Embedder%20Fay&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51796-improper-neutralization-of-input-du-37eb4f6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51796%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahjahan%20Jewel%20Trendy%20Restaurant%20Menu&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51797-improper-neutralization-of-input-du-9963c2d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51797%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md.%20Shiddikur%20Rahman%20Ultimate%20Accordion&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51798-improper-neutralization-of-input-du-663505b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51798%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Surbma%20Surbma%20%7C%20Font%20Awesome&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51799-improper-neutralization-of-input-du-881e236b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51799%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vadim%20Bogaiskov%20Bg%20Patriarchia%20BU&amp;severity=null&amp;id=69cd751de6bfc5ba1df02efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51801-improper-neutralization-of-input-du-67810eb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jakeatthrive%20Brand%20my%20Footer&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51802-improper-neutralization-of-input-du-c272f095</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51802%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bread%20%26amp%3B%20Butter%20Bread%20%26%20Butter&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51803-improper-neutralization-of-input-du-4a80e271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51803%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Magnetic%20Creative%20Inline%20Click%20To%20Tweet&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51804-improper-neutralization-of-input-du-be75d7c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51804%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobmatnyc%20Moka%20Get%20Posts%20Shortcode&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51805-improper-neutralization-of-input-du-0bab2dca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51805%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonisink%20yPHPlista&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51806-improper-neutralization-of-input-du-bc8e31dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51806%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shingo%20Awesome%20Fitness%20Testimonials&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51807-improper-neutralization-of-input-du-74220987</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51807%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Black%20and%20White%20AgendaPress%20%E2%80%93%20Easily%20Publish%20Meeting%20Agendas%20and%20Programs%20on%20WordPress&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51808-improper-neutralization-of-input-du-c2d269e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51808%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pat%20O%26%238217%3BBrien%20codeSnips&amp;severity=null&amp;id=69cd751de6bfc5ba1df02f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51809-improper-neutralization-of-input-du-e46d9eaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51809%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20intelligentDesign%20Keymaster%20Chord%20Notation%20Free&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51810-improper-neutralization-of-input-du-f5d4a8a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51810%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20George%20Lewe%20Lewe%20Bootstrap%20Visuals&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51811-improper-neutralization-of-input-du-b7b632ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51811%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hussam%20Hussien%20Popup%20Image&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51812-improper-neutralization-of-input-du-f2c60644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasim%20Pro%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51813-improper-neutralization-of-input-du-ea16fe92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51813%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anantaddons%20Anant%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51814-improper-neutralization-of-input-du-80b162af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51814%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51816-improper-neutralization-of-input-du-11ef91bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51816%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saul%20Morales%20Pacheco%20Banner%20System&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51819-improper-neutralization-of-input-du-1b7edae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51819%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigrisflexplatform%20Tigris%20Flexplatform&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51821-improper-neutralization-of-input-du-3cbc45f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51821%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wordpresteem%20WE%20%E2%80%93%20Client%20Logo%20Carousel&amp;severity=null&amp;id=69cd7520e6bfc5ba1df0301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51822-improper-neutralization-of-input-du-edfcaedf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51822%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20keonthemes%20Creative%20Blocks&amp;severity=null&amp;id=69cd7520e6bfc5ba1df03020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51823-improper-neutralization-of-input-du-01028c48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51823%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SherkSpear%20Add%20Ribbon%20Shortcode&amp;severity=null&amp;id=69cd7520e6bfc5ba1df03023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51824-improper-neutralization-of-input-du-fcde6fa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51824%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Karam%20Singh%20Advanced%20Video%20Player%20with%20Analytics&amp;severity=null&amp;id=69cd7520e6bfc5ba1df03026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51825-improper-neutralization-of-input-du-f56468f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51825%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20crissoca%20Alert%20Me!&amp;severity=null&amp;id=69cd7520e6bfc5ba1df03029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51826-improper-neutralization-of-input-du-6aa18b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51826%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jandal%20Bitcoin%20Payments&amp;severity=null&amp;id=69cd7520e6bfc5ba1df0302c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51827-improper-neutralization-of-input-du-20f90745</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51827%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Movement%20Ventures%20Boombox%20Shortcode&amp;severity=null&amp;id=69cd7520e6bfc5ba1df0302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51828-improper-neutralization-of-input-du-7e79074f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51828%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dan%20Griffiths%20Beacon%20For%20Help%20Scout&amp;severity=null&amp;id=69cd7520e6bfc5ba1df03032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51829-improper-neutralization-of-input-du-b7597b79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51829%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20figoliquinn%20Mobile%20Kiosk&amp;severity=null&amp;id=69cd7521e6bfc5ba1df03075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51830-improper-neutralization-of-input-du-37830e2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51830%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fazilatunnesa%20News%20Ticker&amp;severity=null&amp;id=69cd7521e6bfc5ba1df03088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51831-improper-neutralization-of-input-du-9ed5404f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51831%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aboutorab%20Pourhaghani%20Persian%20Nested%20Show%2FHide%20Text&amp;severity=null&amp;id=69cd7521e6bfc5ba1df0308b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51833-improper-neutralization-of-input-du-3aa4514b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51833%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nomaniplex%20Easy%20Social%20Sharebar&amp;severity=null&amp;id=69cd7521e6bfc5ba1df0308e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51834-improper-neutralization-of-input-du-4b715c4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51834%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luzuk%20Themes%20Luzuk%20Slider&amp;severity=null&amp;id=69cd7521e6bfc5ba1df03091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51835-improper-neutralization-of-input-du-7a7195ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51835%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajinkyanahar%20OpenCart%20Product%20Display&amp;severity=null&amp;id=69cd7521e6bfc5ba1df03094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51836-improper-neutralization-of-input-du-2d5be400</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51836%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20teconce%20Wezido&amp;severity=null&amp;id=69cd7521e6bfc5ba1df03097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51838-improper-neutralization-of-input-du-7f16e9b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51838%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smajda%20Pull%20This&amp;severity=null&amp;id=69cd7521e6bfc5ba1df0309d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51839-improper-neutralization-of-input-du-5239b0b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51839%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Meini%20Utech%20Spinning%20Earth&amp;severity=null&amp;id=69cd7521e6bfc5ba1df030a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51840-improper-neutralization-of-input-du-f75c6e8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51840%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rezaul%20Wd-image-magnifier-xoss&amp;severity=null&amp;id=69cd7521e6bfc5ba1df030a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51841-improper-neutralization-of-input-du-7de1280a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51841%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Abdul%20Awal%20Uzzal%20File%20Select%20Control%20For%20Elementor&amp;severity=null&amp;id=69cd7522e6bfc5ba1df03119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51842-improper-neutralization-of-input-du-5df94641</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51842%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sazzad%20Image%20Carousel%20Shortcode&amp;severity=null&amp;id=69cd7522e6bfc5ba1df0311c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51844-improper-neutralization-of-input-du-77c9f323</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51844%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kiran%20Patil%20Location%20Click%20Map&amp;severity=null&amp;id=69cd7522e6bfc5ba1df03122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51846-improper-neutralization-of-input-du-ff116f6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51846%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Simpson%20Community%20Yard%20Sale&amp;severity=null&amp;id=69cd7522e6bfc5ba1df03128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51847-improper-neutralization-of-input-du-51248493</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51847%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20giovanebribeiro%20WP%20PagSeguro%20Payments&amp;severity=null&amp;id=69cd7522e6bfc5ba1df0312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51848-improper-neutralization-of-input-du-0949c383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51848%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalzoomstudio%20Parallaxer&amp;severity=null&amp;id=69cd7522e6bfc5ba1df0312e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51849-improper-neutralization-of-input-du-8fe551af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51849%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marco%20Piarulli%20My%20Restaurant%20Menu&amp;severity=null&amp;id=69cd7522e6bfc5ba1df03131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51850-improper-neutralization-of-input-du-005e228f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51850%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bchristopeit%20WoW%20Guild%20Armory%20Roster&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51851-improper-neutralization-of-input-du-f458dc9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51851%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20salehattari%20best%20bootstrap%20widgets%20for%20elementor&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51852-improper-neutralization-of-input-du-c255ee2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51852%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maidul%20Dynamic%20Post%20Grid%20Elementor%20Addon&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51853-improper-neutralization-of-input-du-087c8980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51853%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alberuni%20Azad.%20Faltu%20Testimonial%20Rotator&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51854-improper-neutralization-of-input-du-56359fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51854%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20holanetworks%20Hola%20Free%20Video%20Player&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51855-improper-neutralization-of-input-du-1da7c458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51855%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Productineer%20Redirecter&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51856-improper-neutralization-of-input-du-43338599</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51856%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibllex%20Moose%20Elementor%20Kit&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51857-improper-neutralization-of-input-du-360ac170</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51857%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DannyCooper%20Olympus%20Shortcodes&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51858-improper-neutralization-of-input-du-f3d3bc12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51858%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginOps%20Social%20Locker&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51859-improper-neutralization-of-input-du-e12d6e23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51859%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bamboo%20Manchester%20Bamboo%20Enquiries&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51860-improper-neutralization-of-input-du-2a2bbbee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51860%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20Custom%20Dashboard%20Widget&amp;severity=null&amp;id=69cd7524e6bfc5ba1df031ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51861-improper-neutralization-of-input-du-f4749b4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51861%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20EventPress&amp;severity=null&amp;id=69cd7525e6bfc5ba1df03246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51862-improper-neutralization-of-input-du-843adc47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51862%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Baptiste%20Wicht%20Google%20Visualization%20Charts&amp;severity=null&amp;id=69cd7525e6bfc5ba1df03249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51863-improper-neutralization-of-input-du-643360d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51863%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Profit%20Funnels%20PF%20Timer&amp;severity=null&amp;id=69cd7525e6bfc5ba1df0324c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51864-improper-neutralization-of-input-du-add0f7c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51864%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Agnel%20Waghela%20Shortcode%20Collection&amp;severity=null&amp;id=69cd7525e6bfc5ba1df0324f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51865-improper-neutralization-of-input-du-a4586923</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51865%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leroysabrina%20Simple%20Social%20Share%20Block&amp;severity=null&amp;id=69cd7525e6bfc5ba1df03252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51866-improper-neutralization-of-input-du-d0645bb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51866%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20riponshah%20Social%20button&amp;severity=null&amp;id=69cd7525e6bfc5ba1df03255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51867-improper-neutralization-of-input-du-de02c192</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51867%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geilt%20Simpul%20Events%20by%20Esotech&amp;severity=null&amp;id=69cd7525e6bfc5ba1df03258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51868-improper-neutralization-of-input-du-e673f063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51868%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tapan%20Kumer%20Das%20DuoGeek%20Blocks&amp;severity=null&amp;id=69cd7525e6bfc5ba1df0325b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51869-improper-neutralization-of-input-du-b949e474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51869%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Best%20WP%20Developer%20Gutenium%20Blocks&amp;severity=null&amp;id=69cd7525e6bfc5ba1df0325e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51870-improper-neutralization-of-input-du-2480f6e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51870%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dragwyb%20Ultimate%20Flipbox%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7527e6bfc5ba1df032e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51871-improper-neutralization-of-input-du-1b8079f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luzuk%20Themes%20Luzuk%20Team&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51872-improper-neutralization-of-input-du-7c7b5108</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51872%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20luzuk%20Themes%20Luzuk%20Testimonials&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51873-improper-neutralization-of-input-du-4e14859e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51873%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Masashi%20Takizawa%20Multi-day%20Booking%20Calendar&amp;severity=null&amp;id=69cd7527e6bfc5ba1df0330e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51874-improper-neutralization-of-input-du-73eda5b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51874%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ParOne%2C%20Inc%20ParOne%20Feeds&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51875-improper-neutralization-of-input-du-4d2ec4b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51875%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nazmul%20Ahsan%20MDC%20YouTube%20Downloader&amp;severity=null&amp;id=69cd7527e6bfc5ba1df0331a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51876-improper-neutralization-of-input-du-8a9d3df9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51876%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Codstack%20wp_automatic_widget&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51877-improper-neutralization-of-input-du-2856caf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51877%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20straightvisions%20GmbH%20SV%20Forms&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51878-improper-neutralization-of-input-du-d455856d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20strailejoey%20AchillesTheme-shortcodes&amp;severity=null&amp;id=69cd7527e6bfc5ba1df0332c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51879-improper-neutralization-of-input-du-8f751840</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51879%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Arash%20Heidari%20Text%20Advertisements&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51880-improper-neutralization-of-input-du-b5477122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51880%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sistemasBebetter%20BeBetter%20Social%20Icons&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51881-improper-neutralization-of-input-du-a4dc1402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51881%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Beautimour%20Be%20Shortcodes&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51883-improper-neutralization-of-input-du-25c6b489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51883%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Micha%20I%20Plant%20A%20Tree&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51884-improper-neutralization-of-input-du-dcd993d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51884%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Matsuyama%20Posts%20Search&amp;severity=null&amp;id=69cd7527e6bfc5ba1df0336c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51885-improper-neutralization-of-input-du-a5a94947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51885%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Matsuyama%20Browsing%20History&amp;severity=null&amp;id=69cd7527e6bfc5ba1df0336f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51886-improper-neutralization-of-input-du-c2ff605f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51886%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Matsuyama%20Posts%20Filter&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51887-improper-neutralization-of-input-du-db193d4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51887%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ryscript%20NV%20Slider&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51889-improper-neutralization-of-input-du-bc9f670f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51889%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GeroNikolov%20Fancy%20User%20List&amp;severity=null&amp;id=69cd7527e6bfc5ba1df0337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51890-improper-neutralization-of-input-du-2988dd45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51890%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geoWP%20Geoportail%20Shortcode&amp;severity=null&amp;id=69cd752ce6bfc5ba1df0345f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51891-improper-neutralization-of-input-du-4b52587f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51891%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SalesWizard.pl%20Official%20SalesWizard%20CRM%20Plugin&amp;severity=null&amp;id=69cd752ce6bfc5ba1df03462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51892-improper-neutralization-of-input-du-57a74bca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51892%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Noor%20Alam%20Sell%20Media%20File%20with%20Stripe&amp;severity=null&amp;id=69cd752ce6bfc5ba1df03465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51893-improper-neutralization-of-input-du-f6efff7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51893%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FixoLab%20Postify%3A%20Post%20Layout%20For%20Elementor&amp;severity=null&amp;id=69cd752ce6bfc5ba1df0346a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51894-improper-neutralization-of-input-du-c7ac8be9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51894%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reyzua%20Topbar%20ID%20for%20Elementor&amp;severity=null&amp;id=69cd752ce6bfc5ba1df0346f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51895-improper-neutralization-of-input-du-6de4e317</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51895%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pankaj9296%20Minical%20Hotel%20Booking%20Plugin&amp;severity=null&amp;id=69cd752ce6bfc5ba1df03473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51896-improper-neutralization-of-input-du-843a6ddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51896%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Magic%20Slider&amp;severity=null&amp;id=69cd752ce6bfc5ba1df03477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51897-improper-neutralization-of-input-du-a1d7bac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51897%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Erik%20Saulnier%20News%20Articles&amp;severity=null&amp;id=69cd752ce6bfc5ba1df0347b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51898-improper-neutralization-of-input-du-e2e720fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51898%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sachin8600%20Semantic%20Shortcode&amp;severity=null&amp;id=69cd752ce6bfc5ba1df0347e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51899-improper-neutralization-of-input-du-f45e9868</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51899%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seothemes%20Simple%20Pricing%20Table&amp;severity=null&amp;id=69cd752ce6bfc5ba1df03481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51901-improper-neutralization-of-input-du-db53c01c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51901%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wojciechborowicz%20Smooth%20Maps&amp;severity=null&amp;id=69cd752ee6bfc5ba1df0352d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51902-improper-neutralization-of-input-du-ef09446b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51902%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cybio%20TinyCode&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51903-improper-neutralization-of-input-du-ab0031ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51903%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brandon%20Hubbard%20WP%20Listings%20Pro&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51904-improper-neutralization-of-input-du-cd6bcd29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51904%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joan%20Boluda%20Embed%20documents%20shortcode&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51905-improper-neutralization-of-input-du-2fdbfa7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51905%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ravi%20Kumar%20Vanukuru%20RSV%20PDF%20Preview&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51906-improper-neutralization-of-input-du-e7ac9ebb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51906%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ravi%20Kumar%20Vanukuru%20RSV%20360%20View&amp;severity=null&amp;id=69cd752ee6bfc5ba1df0353c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51907-improper-neutralization-of-input-du-54795e1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51907%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Codemenschen%20WP%20Virtual%20Room%20Configurator&amp;severity=null&amp;id=69cd752ee6bfc5ba1df0353f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51908-improper-neutralization-of-input-du-fb001050</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51908%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevinabl%20Adventure%20Bucket%20List&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51909-improper-neutralization-of-input-du-50fce5cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51909%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Monarkie%20DCS%20audioCase&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51910-improper-neutralization-of-input-du-b6e4729c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51910%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ezlab%20Assist24%20Help%20Desk&amp;severity=null&amp;id=69cd752ee6bfc5ba1df03548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51911-improper-neutralization-of-input-du-b35728b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51911%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ketan%20Patel%20Featured%20product%20by%20category%20name&amp;severity=null&amp;id=69cd7535e6bfc5ba1df03656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51912-improper-neutralization-of-input-du-377d0f96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51912%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lilaeamedia%20IntelliWidget%20Elements&amp;severity=null&amp;id=69cd7535e6bfc5ba1df03659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51914-improper-neutralization-of-input-du-a3b48100</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51914%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20drop%20in%20image%20slideshow%20gallery&amp;severity=null&amp;id=69cd7535e6bfc5ba1df0365c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51916-improper-neutralization-of-input-du-69957724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51916%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Creative%20Brahma%20Multifox%20Plus&amp;severity=null&amp;id=69cd7535e6bfc5ba1df0365f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51917-improper-neutralization-of-input-du-0ac0aa56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51917%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lequanghuylc%20Multiple%20Votes%20in%20one%20page&amp;severity=null&amp;id=69cd7535e6bfc5ba1df03662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51918-improper-neutralization-of-input-du-260ce625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Freshlight%20Lab%20Pay%20With%20Stripe&amp;severity=null&amp;id=69cd7535e6bfc5ba1df03665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51920-improper-neutralization-of-input-du-cd3395db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51920%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20J%C3%A9go%20Map%20Store%20Locator&amp;severity=null&amp;id=69cd7535e6bfc5ba1df0366b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51921-improper-neutralization-of-input-du-46294c93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20midori%20scrollup&amp;severity=null&amp;id=69cd7535e6bfc5ba1df0366e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51922-improper-neutralization-of-input-du-412b760b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maruf%20Arafat%20VP%20Sitemap&amp;severity=null&amp;id=69cd7535e6bfc5ba1df0368d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51923-improper-neutralization-of-input-du-4021b26e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51923%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Websand%20Websand%20Subscription%20Form&amp;severity=null&amp;id=69cd7536e6bfc5ba1df0369b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51924-improper-neutralization-of-input-du-5faac99e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51924%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alexandremagno%20WP%20Agenda&amp;severity=null&amp;id=69cd7536e6bfc5ba1df0369e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51925-improper-neutralization-of-input-du-0b0f85bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51925%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sazzad%20Testimonial%20Slider%20Shortcode&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51926-improper-neutralization-of-input-du-402c5b2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51926%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20GreenCon&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51927-improper-neutralization-of-input-du-66acfcd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51927%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asaduzzaman%20Abir%20Rig%20Elements%20For%20Elementor&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51928-improper-neutralization-of-input-du-69478a72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51928%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jakir%20Hasan%20Blocks%20Post%20Grid&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51929-improper-neutralization-of-input-du-84c35a91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20philspectrum%20Icon%20Widget&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51930-improper-neutralization-of-input-du-2e998d73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51930%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IronFeet%20Custom%20URL%20Shortener&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51931-improper-neutralization-of-input-du-5e353218</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51931%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shazahanul%20Islam%20Shohag%20AzonBox&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51932-improper-neutralization-of-input-du-33279e22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51932%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saif%20Kings%20Tab%20Slider&amp;severity=null&amp;id=69cd7536e6bfc5ba1df036b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51933-improper-neutralization-of-input-du-8a4bf85d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dozyde%20Cookie%20Nonsense%20for%20YT&amp;severity=null&amp;id=69cd753be6bfc5ba1df03788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51934-improper-neutralization-of-input-du-2984e8a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51934%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uri%20Lazcano%20Ekiline%20Block%20Collection&amp;severity=null&amp;id=69cd753be6bfc5ba1df0378b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51935-improper-neutralization-of-input-du-c9a0abc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51935%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sam%20Perrow%20Fast%20Video%20and%20Image%20Display&amp;severity=null&amp;id=69cd753be6bfc5ba1df0378e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51936-improper-neutralization-of-input-du-c570c671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51936%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eSparkBiz%20ESB%20Testimonials&amp;severity=null&amp;id=69cd753be6bfc5ba1df03791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51937-improper-neutralization-of-input-du-18f86e66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51937%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bnisia%20IA%20Map%20Analytics%20Basic&amp;severity=null&amp;id=69cd753be6bfc5ba1df03794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51938-improper-neutralization-of-input-du-3606a66c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Charity%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd753be6bfc5ba1df03797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49680-missing-authorization-in-rextheme-w-c10ba078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49680%3A%20Missing%20Authorization%20in%20RexTheme%20WP%20VR&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49689-missing-authorization-in-harmonic-d-a7fd69f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49689%3A%20Missing%20Authorization%20in%20Harmonic%20Design%20HD%20Quiz%20%E2%80%93%20Save%20Results%20Light&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df01997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49697-missing-authorization-in-sunshineph-5b8f3b65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49697%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50417-missing-authorization-in-boldthemes-540ede1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50417%3A%20Missing%20Authorization%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51660-missing-authorization-in-binsaifull-b3e69089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51660%3A%20Missing%20Authorization%20in%20Binsaifullah%20Easy%20Accordion%20Gutenberg%20Block&amp;severity=null&amp;id=69cd7510e6bfc5ba1df028d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51671-missing-authorization-in-themeisle--3e8a9b10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51671%3A%20Missing%20Authorization%20in%20Themeisle%20Otter%20-%20Gutenberg%20Block&amp;severity=null&amp;id=69cd7510e6bfc5ba1df02917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51817-missing-authorization-in-codezel-co-8803a7fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51817%3A%20Missing%20Authorization%20in%20CodeZel%20Combo%20WP%20Rewrite%20Slugs&amp;severity=null&amp;id=69cd751ee6bfc5ba1df02f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52395-missing-authorization-in-quantumclo-6f9e5b81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52395%3A%20Missing%20Authorization%20in%20QuantumCloud%20Floating%20Buttons%20for%20WooCommerce&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9777-cwe-79-improper-neutralization-of-in-d0b1f778</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9777%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Ashe&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554c76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9830-cwe-79-improper-neutralization-of-in-a1822c71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Bard&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11198-cwe-79-improper-neutralization-of-i-951dd4d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11198%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gdragon%20GD%20Rating%20System&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11224-cwe-79-improper-neutralization-of-i-898be0d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11224%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehowarde%20Parallax%20Image&amp;severity=medium&amp;id=699f6e0ab7ef31ef0b594155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11194-cwe-862-missing-authorization-in-te-217e115e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11194%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=high&amp;id=699f6e08b7ef31ef0b593f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11195-cwe-79-improper-neutralization-of-i-d18e21b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11195%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nik00726%20Email%20Subscription%20Popup&amp;severity=medium&amp;id=699f6e08b7ef31ef0b593f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11036-cwe-94-improper-control-of-generati-384d1c66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11036%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20The%20%231%20gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6e04b7ef31ef0b593ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11038-cwe-94-improper-control-of-generati-82a9f1de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11038%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpbean%20WPB%20Popup%20for%20Contact%20Form%207%20%E2%80%93%20Showing%20The%20Contact%20Form%207%20Popup%20on%20Button%20Click%20%E2%80%93%20CF7%20Popup&amp;severity=high&amp;id=699f6e04b7ef31ef0b593adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10388-cwe-79-improper-neutralization-of-i-e5dee994</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20welaunch%20WordPress%20GDPR&amp;severity=high&amp;id=699f6df3b7ef31ef0b59141d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11069-cwe-862-missing-authorization-in-we-60e1a089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11069%3A%20CWE-862%20Missing%20Authorization%20in%20welaunch%20WordPress%20GDPR&amp;severity=medium&amp;id=699f6e04b7ef31ef0b593ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10268-cwe-79-improper-neutralization-of-i-bf305e32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=699f6df1b7ef31ef0b591190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11098-cwe-79-improper-neutralization-of-i-f5db6ad5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11098%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mr2p%20SVG%20Block&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8403-cwe-1287-improper-validation-of-spec-4e1697ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8403%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-F%20Series%20FX5-ENET&amp;severity=high&amp;id=69cb4fb9e6bfc5ba1dc69fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50302-vulnerability-in-linux-linux-bdcfcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50302%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50301-vulnerability-in-linux-linux-bdf792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50301%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50300-vulnerability-in-linux-linux-bdf78e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50300%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50299-vulnerability-in-linux-linux-bdf788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50299%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50298-vulnerability-in-linux-linux-bdf784</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50298%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50297-vulnerability-in-linux-linux-bdf76a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50297%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50296-vulnerability-in-linux-linux-bdcfc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50296%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50295-vulnerability-in-linux-linux-bdcfc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50295%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50294-vulnerability-in-linux-linux-bdf766</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50294%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50293-vulnerability-in-linux-linux-bdf762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50293%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50292-vulnerability-in-linux-linux-bdf75e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50292%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50291-vulnerability-in-linux-linux-bdf75a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50291%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50290-vulnerability-in-linux-linux-bdf756</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50290%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50289-vulnerability-in-linux-linux-bdf752</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50289%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50288-vulnerability-in-linux-linux-bdf74e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50288%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50287-vulnerability-in-linux-linux-bdf74a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50287%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50286-vulnerability-in-linux-linux-bdf746</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50286%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50285-vulnerability-in-linux-linux-bdf72c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50285%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50284-vulnerability-in-linux-linux-bdcfbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50284%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50283-vulnerability-in-linux-linux-bdf728</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50283%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50282-vulnerability-in-linux-linux-bdf724</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50281-vulnerability-in-linux-linux-bdcfbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50281%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50280-vulnerability-in-linux-linux-bdcfb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50280%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50279-vulnerability-in-linux-linux-bdf720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50279%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50278-vulnerability-in-linux-linux-bdf71c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50278%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50277-vulnerability-in-linux-linux-bdf718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50277%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50276-vulnerability-in-linux-linux-bdf714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50276%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50275-vulnerability-in-linux-linux-bdf710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50275%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50274-vulnerability-in-linux-linux-bdf70a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50274%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50273-vulnerability-in-linux-linux-bdf706</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50273%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50272-vulnerability-in-linux-linux-bdcfb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50272%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50271-vulnerability-in-linux-linux-bdf6ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50271%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50270-vulnerability-in-linux-linux-bdf6e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50270%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50269-vulnerability-in-linux-linux-bdcfad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50269%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50268-vulnerability-in-linux-linux-bdf6e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50268%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50267-vulnerability-in-linux-linux-bdf6e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50267%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50266-vulnerability-in-linux-linux-bdf6dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50266%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50265-vulnerability-in-linux-linux-bdf6d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50265%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50264-vulnerability-in-linux-linux-bdf6d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50264%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52921-vulnerability-in-linux-linux-be7920</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48072-na-e9eaa6a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48072%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0ab7ef31ef0b56d6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48071-na-dfebcb49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48071%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0ab7ef31ef0b56d6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48070-na-8c47cd74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48070%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0ab7ef31ef0b56d6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48069-na-76c0c921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48069%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0ab7ef31ef0b56d6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52789-na-82a8ad26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52789%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb9b7ef31ef0b55a688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52788-na-b7721129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52788%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb9b7ef31ef0b55a685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52763-na-5cfbc985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52763%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb8b7ef31ef0b55a5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52762-na-9e073b92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52762%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb8b7ef31ef0b55a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52759-na-fe24e936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52759%3A%20n%2Fa&amp;severity=low&amp;id=699f6bb8b7ef31ef0b55a5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52714-na-6deb6bba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52714%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb7b7ef31ef0b55a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52711-na-05bbf311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52711%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb7b7ef31ef0b55a559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52675-na-e72d50ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52675%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb6b7ef31ef0b55a4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50803-na-9f19b558</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50803%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b55747f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48694-na-1b455e75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48694%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b76b7ef31ef0b555a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-19-f12743</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51939-improper-neutralization-of-input-du-86e5d514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51939%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Santhosh%20veer%20Stylish%20Internal%20Links&amp;severity=null&amp;id=69cd753be6bfc5ba1df0379a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51940-improper-neutralization-of-input-du-324440bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51940%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sohelwpexpert%20WP%20Responsive%20Video&amp;severity=null&amp;id=69cd753be6bfc5ba1df0379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52339-improper-neutralization-of-input-du-2f2c87e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52339%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Maximilian%20Ruthe%20Mage%20Front%20End%20Forms&amp;severity=null&amp;id=69cd753be6bfc5ba1df037a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52340-improper-neutralization-of-input-du-891aa3db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52340%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MartyThornley%20Photographer%20Connections&amp;severity=null&amp;id=69cd753be6bfc5ba1df037c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52341-improper-neutralization-of-input-du-95017584</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Offshorent%20Solutions%20Pvt%20Ltd%20OS%20Our%20Team&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52342-improper-neutralization-of-input-du-43039816</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Offshorent%20Solutions%20Pvt%20Ltd%20OS%20BXSlider&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52343-improper-neutralization-of-input-du-e5ed888e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Offshorent%20Solutions%20Pvt%20Ltd%20OS%20Pricing%20Tables&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52344-improper-neutralization-of-input-du-b1c689db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52344%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Codeies%20Pvt%20Ltd%20Provide%20Forex%20Signals&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52345-improper-neutralization-of-input-du-cc9825a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RobertoAlicata%20ra_qrcode&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52346-improper-neutralization-of-input-du-2a98f537</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JavierMendezPWG%20SimpleGMaps&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52347-improper-neutralization-of-input-du-42f54372</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwebsitecreator%20Website%20remote%20Install%20vor%20Gravity%2C%20WPForms%2C%20Formidable%2C%20Ninja%2C%20Caldera&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52348-improper-neutralization-of-input-du-41f4ec9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA%20Extensions%20AA%20Audio%20Player&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21287-easily-exploitable-vulnerability-al-3f722dcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21287%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM%20Framework.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Agile%20PLM%20Framework%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Agile%20PLM%20Framework&amp;severity=high&amp;id=68f7d9b1247d717aace26925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52349-improper-neutralization-of-input-du-e92b6e99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md.%20Shiddikur%20Rahman%20Awesome%20Tool%20Tip&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10486-cwe-862-missing-authorization-in-au-8a83bf0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10486%3A%20CWE-862%20Missing%20Authorization%20in%20automattic%20Google%20for%20WooCommerce&amp;severity=medium&amp;id=699f6df4b7ef31ef0b5914d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52389-improper-neutralization-of-input-du-7db54c91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=69cd7540e6bfc5ba1df0399c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52390-path-traversal-in-greg-ross-cyan-ba-7995fe86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52390%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Greg%20Ross%20CYAN%20Backup&amp;severity=null&amp;id=69cd7540e6bfc5ba1df0399f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52394-improper-neutralization-of-input-du-c0a06354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52394%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20verkkovaraani%20Print%20PDF%20Generator%20and%20Publisher&amp;severity=null&amp;id=69cd7541e6bfc5ba1df03a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52417-improper-neutralization-of-input-du-289212ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52417%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BoldThemes%20ReConstruction&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52418-improper-neutralization-of-input-du-961c7155</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52418%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CactusThemes%20Gameplan&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52304-cwe-444-inconsistent-interpretation-1ab7586c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52304%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=690916c8c28fd46ded7ccf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10390-cwe-862-missing-authorization-in-el-c34a43d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10390%3A%20CWE-862%20Missing%20Authorization%20in%20Elfsight%20Elfsight%20Telegram%20Chat%20CC&amp;severity=medium&amp;id=699f6df3b7ef31ef0b591421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52419-improper-neutralization-of-input-du-089e6a37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52419%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Clipboard%20Agency%20Copy%20Anything%20to%20Clipboard&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52422-improper-neutralization-of-input-du-735c8232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Terry%20L.%20WP%20Githuber%20MD&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52423-improper-neutralization-of-input-du-f863ed18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52423%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52424-cross-site-request-forgery-csrf-in--25a9e6d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52424%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sureshdsk%20wp-login%20customizer&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9474-cwe-78-improper-neutralization-of-sp-c0df8bcf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9474%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=68f7d9b8247d717aace26cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0012-cwe-306-missing-authentication-for-c-1982a84f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0012%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=critical&amp;id=68f7d9af247d717aace2687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52425-improper-neutralization-of-input-du-b35a84fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52425%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladislav%20Urchenko%20Drozd%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52426-improper-neutralization-of-input-du-93f02264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Linear%20Oy%20Linear&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52435-improper-neutralization-of-special--486c1cb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52435%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjada%20WPDM%20%E2%80%93%20Premium%20Packages&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52436-improper-neutralization-of-special--705d5fdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52436%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20Post%20SMTP&amp;severity=null&amp;id=69cd754ae6bfc5ba1df03cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52428-improper-control-of-filename-for-in-09bd2410</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52428%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Peter%20Ads%20Booster%20by%20Ads%20Pro&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52430-deserialization-of-untrusted-data-i-eec28f24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52430%3A%20Deserialization%20of%20Untrusted%20Data%20in%20bublick%20Lis%20Video%20Gallery&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52432-deserialization-of-untrusted-data-i-0fcf8b41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52432%3A%20Deserialization%20of%20Untrusted%20Data%20in%20NIX%20Solutions%20Ltd%20NIX%20Anti-Spam%20Light&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52433-deserialization-of-untrusted-data-i-f38b5449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52433%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Mindstien%20Technologies%20My%20Geo%20Posts%20Free&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52427-deserialization-of-untrusted-data-i-fac51dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52427%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Vollstart%20Event%20Tickets%20with%20Ticket%20Scanner&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52429-unrestricted-upload-of-file-with-da-fe292cbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52429%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20AntonHoelstad%20WP%20Quick%20Setup&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52434-deserialization-of-untrusted-data-i-75a39fb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52434%3A%20Deserialization%20of%20Untrusted%20Data%20in%20supsystic%20Popup%20by%20Supsystic&amp;severity=null&amp;id=69cd7546e6bfc5ba1df03c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52316-cwe-391-unchecked-error-condition-i-209a2bc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52316%3A%20CWE-391%20Unchecked%20Error%20Condition%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=critical&amp;id=690204553aaa02566521b575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48901-improper-authorization-8c1dc328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48901%3A%20Improper%20Authorization&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48898-missing-authorization-32bbf892</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48898%3A%20Missing%20Authorization&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48897-improper-authorization-e2c5456d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48897%3A%20Improper%20Authorization&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48896-generation-of-error-message-contain-adeac5f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48896%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38828-vulnerability-in-spring-spring-bd7392</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38828%3A%20Vulnerability%20in%20Spring%20Spring&amp;severity=medium&amp;id=682d9817c4522896dcbd7392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28058-na-45a6d757</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28058%3A%20n%2Fa&amp;severity=high&amp;id=699f6d89b7ef31ef0b587f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48294-na-9c8e0a95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48294%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d13b7ef31ef0b56db0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48293-na-841d8e29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48293%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d13b7ef31ef0b56db08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48292-na-27a7fa8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48292%3A%20n%2Fa&amp;severity=high&amp;id=699f6d13b7ef31ef0b56db04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44757-na-b3657486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44757%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33231-na-9e751dc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33231%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b56164c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52945-na-380af96a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52945%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52944-na-88ebd32b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52944%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52942-na-3758e7f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52942%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52941-na-7efda47d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52941%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52940-na-fee7bce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52940%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52926-cwe-269-improper-privilege-manageme-71d942b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52926%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Delinea%20Privilege%20Manager&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52922-na-b92818f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52922%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52921-na-ff2b3275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52921%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbcb7ef31ef0b55a7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52920-na-0bee98ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52920%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbcb7ef31ef0b55a7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52919-na-510a00d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52919%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbab7ef31ef0b55a70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52918-na-b64b5921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52918%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbab7ef31ef0b55a70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52917-na-832313df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52917%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbab7ef31ef0b55a706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52916-na-8bdcb37a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52916%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbab7ef31ef0b55a702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52915-na-92782267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52915%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbab7ef31ef0b55a6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52914-na-d94b6e88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52914%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbab7ef31ef0b55a6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52913-na-f4ade8b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52913%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bbab7ef31ef0b55a6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52912-na-d6a2150a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52912%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbab7ef31ef0b55a6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51053-na-ab550ca2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51053%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba8b7ef31ef0b5579aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51051-na-9f5590e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51051%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba8b7ef31ef0b557954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50919-na-dae8c3a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50919%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba2b7ef31ef0b5575f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50804-na-60a35e62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50804%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b557484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52947-na-af8890bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52947%3A%20n%2Fa&amp;severity=medium&amp;id=69092eed35043901e82cb11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52946-na-6ba97ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52946%3A%20n%2Fa&amp;severity=high&amp;id=69092eed35043901e82cb116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50849-na-65eeee72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50849%3A%20n%2Fa&amp;severity=medium&amp;id=68f65a059f0e7cefe16a9d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50848-na-693b6b90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50848%3A%20n%2Fa&amp;severity=medium&amp;id=68f65a059f0e7cefe16a9d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-18-f12ae5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0793-improper-input-validation-67eb0474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0793%3A%20Improper%20Input%20Validation&amp;severity=high&amp;id=699f6de5b7ef31ef0b5904a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52876-na-c517ac32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52876%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbab7ef31ef0b55a6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52872-na-0d933c5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52872%3A%20n%2Fa&amp;severity=high&amp;id=699f6bbab7ef31ef0b55a6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52871-na-f5d535e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52871%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb9b7ef31ef0b55a695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52867-na-5fbb4131</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52867%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb9b7ef31ef0b55a68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-17-f12647</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f12647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52397-unrestricted-upload-of-file-with-da-bd42865c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52397%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Davor%20Zeljkovic%20Convert%20Docx2post&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52398-unrestricted-upload-of-file-with-da-63c6ee28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52398%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Halyra%20CDI&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52399-unrestricted-upload-of-file-with-da-b55ba3b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52399%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Clarisse%20K.%20Writer%20Helper&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52400-unrestricted-upload-of-file-with-da-f5543716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52400%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Subhasis%20Laha%20Gallerio&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52403-unrestricted-upload-of-file-with-da-e6723a83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52403%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Saad%20Iqbal%20User%20Management&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52404-unrestricted-upload-of-file-with-da-b5a38d3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52404%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bigfiveagency%20CF7%20Reply%20Manager&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52405-unrestricted-upload-of-file-with-da-f9cebefd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52405%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bikramjoshii%20B-Banner%20Slider&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52406-unrestricted-upload-of-file-with-da-dc2f6da0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52406%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wibergsweb%20CSV%20to%20html&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52407-unrestricted-upload-of-file-with-da-bacac17d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52407%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20BasePress%20BasePress%20Migration%20Tools&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52408-unrestricted-upload-of-file-with-da-ec610b47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52408%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pushassist%20Push%20Notifications%20for%20WordPress%20by%20PushAssist&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52409-deserialization-of-untrusted-data-i-78406168</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52409%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Phoenixheart%20AJAX%20Random%20Posts&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52410-deserialization-of-untrusted-data-i-b1887931</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52410%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Phoenixheart%20Referrer%20Detector&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52411-deserialization-of-untrusted-data-i-dea326d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52411%3A%20Deserialization%20of%20Untrusted%20Data%20in%20flowcraft%20Advanced%20Personalization&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52413-deserialization-of-untrusted-data-i-302e0796</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52413%3A%20Deserialization%20of%20Untrusted%20Data%20in%20dmcwebzone%20Airin%20Blog&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52414-deserialization-of-untrusted-data-i-2541d681</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52414%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Anthony%20Carbon%20WDES%20Responsive%20Mobile%20Menu&amp;severity=null&amp;id=69cd7543e6bfc5ba1df03add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52386-improper-control-of-filename-for-in-9c19ca2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52386%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20Classified%20Listing&amp;severity=null&amp;id=69cd7540e6bfc5ba1df03996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52415-cross-site-request-forgery-csrf-in--ecba203e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52415%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20skipstorm%20SK%20WP%20Settings%20Backup&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52416-missing-authorization-in-eugen-bobr-97c5a533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52416%3A%20Missing%20Authorization%20in%20Eugen%20Bobrowski%20Debug%20Tool&amp;severity=null&amp;id=69cd7545e6bfc5ba1df03b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11094-cwe-488-exposure-of-data-element-to-e46a6305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11094%3A%20CWE-488%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session%20in%20aaron13100%20404%20Solution&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10592-cwe-80-improper-neutralization-of-s-e8a6a421</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10592%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mapster%20Mapster%20WP%20Maps&amp;severity=medium&amp;id=699f6df8b7ef31ef0b591907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9887-cwe-89-improper-neutralization-of-sp-755589f1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9887%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cyberlord92%20Login%20using%20WordPress%20Users%20(%20WP%20as%20SAML%20IDP%20)&amp;severity=high&amp;id=699f6b63b7ef31ef0b554e58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10645-cwe-89-improper-neutralization-of-s-afd301ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10645%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sudiptomahato%20Blogger%20301%20Redirect&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10614-cwe-862-missing-authorization-in-iv-f2e49913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10614%3A%20CWE-862%20Missing%20Authorization%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6df8b7ef31ef0b591914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8856-cwe-434-unrestricted-upload-of-file--b3e8940c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8856%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20revmakx%20Backup%20and%20Staging%20by%20WP%20Time%20Capsule&amp;severity=critical&amp;id=699f6b38b7ef31ef0b54f674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10728-cwe-862-missing-authorization-in-wp-1cf912df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10728%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20and%20WordPress%20Blog%20Plugin%20%E2%80%93%20PostX&amp;severity=high&amp;id=699f6dfcb7ef31ef0b5923d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10533-cwe-862-missing-authorization-in-ni-0cb3b206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10533%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20WP%20Chat%20App&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10262-cwe-94-improper-control-of-generati-fddbf423</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10262%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20stevehenty%20Drop%20Shadow%20Boxes&amp;severity=medium&amp;id=699f6df1b7ef31ef0b59117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9839-cwe-94-improper-control-of-generatio-482b19a2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9839%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20uiuxlab%20Uix%20Slideshow&amp;severity=high&amp;id=699f6b61b7ef31ef0b554ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11085-cwe-862-missing-authorization-in-ma-84d41438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11085%3A%20CWE-862%20Missing%20Authorization%20in%20maxwellberkel%20WP%20Log%20Viewer&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8873-cwe-79-improper-neutralization-of-in-3dd9ef5f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peprodev%20PeproDev%20WooCommerce%20Receipt%20Uploader&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9850-cwe-79-improper-neutralization-of-in-fdd0c1e3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20augustinfotech%20SVG%20Case%20Study&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9938-cwe-79-improper-neutralization-of-in-72e3c21d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kasperta%20Bounce%20Handler%20MailPoet%203&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6628-cwe-352-cross-site-request-forgery-c-b4b0889b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6628%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cscode%20EleForms%20%E2%80%93%20All%20In%20One%20Form%20Integration%20including%20DB%20for%20Elementor&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10015-cwe-79-improper-neutralization-of-i-46efcb98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10015%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jorisderuiter%20ConvertCalculator%20for%20WordPress&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9615-cwe-79-improper-neutralization-of-in-beaf14cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20engelen%20BulkPress&amp;severity=medium&amp;id=699f6b54b7ef31ef0b55241b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10147-cwe-79-improper-neutralization-of-i-76354796</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20starverte%20Steel&amp;severity=medium&amp;id=699f6decb7ef31ef0b590d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9386-cwe-79-improper-neutralization-of-in-0f9e8d72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmariocom%20Exclusive%20Divi%20%E2%80%93%20Divi%20Preloader%2C%20Modules%20for%20Divi%20%26%20Extra%20Theme&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b55107c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11092-cwe-79-improper-neutralization-of-i-452fbb09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20petrichorpost%20SVGPlus&amp;severity=medium&amp;id=699f6e06b7ef31ef0b593c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10875-cwe-79-improper-neutralization-of-i-a66d6543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dhoppe%20Gallery%20Manager&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11118-cwe-352-cross-site-request-forgery--c14a534a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11118%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bilbud%20404%20Error%20Monitor&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9935-cwe-22-improper-limitation-of-a-path-561aab46</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9935%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20redefiningtheweb%20PDF%20Generator%20Addon%20for%20Elementor%20Page%20Builder&amp;severity=high&amp;id=699f6b65b7ef31ef0b554f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9192-cwe-269-improper-privilege-managemen-d918c4da</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9192%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20pressaholic%20WordPress%20Video%20Robot%20-%20The%20Ultimate%20Video%20Importer&amp;severity=high&amp;id=699f6b41b7ef31ef0b54fd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10017-cwe-79-improper-neutralization-of-i-8ebf1943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10017%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20westi%20PJW%20Mime%20Config&amp;severity=medium&amp;id=699f6debb7ef31ef0b590ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9849-cwe-434-unrestricted-upload-of-file--fcead314</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9849%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20creativeinteractivemedia%20Real3D%20Flipbook%20Lite%20%E2%80%93%203D%20FlipBook%2C%20PDF%20Viewer%2C%20PDF%20Embedder&amp;severity=high&amp;id=699f6b61b7ef31ef0b554d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10884-cwe-79-improper-neutralization-of-i-0bc3620c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simpleform%20SimpleForm%20Contact%20Form%20Submissions&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10883-cwe-79-improper-neutralization-of-i-58148b78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simpleform%20SimpleForm%20%E2%80%93%20Contact%20form%20made%20simple&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59369d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10786-cwe-862-missing-authorization-in-10-2eefa1a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10786%3A%20CWE-862%20Missing%20Authorization%20in%2010up%20Simple%20Local%20Avatars&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b592558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10861-cwe-862-missing-authorization-in-ay-a46904d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10861%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Popup%20Box%20%E2%80%93%20Create%20Countdown%2C%20Coupon%2C%20Video%2C%20Contact%20Form%20Popups&amp;severity=medium&amp;id=699f6e01b7ef31ef0b593527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10795-cwe-639-authorization-bypass-throug-b8fc3420</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10795%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themes4wp%20Popularis%20Extra&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b59266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-16-f1294a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f1294a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9500-cwe-379-creation-of-temporary-file-i-3f6e79fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9500%3A%20CWE-379%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20Autodesk%20Installer&amp;severity=high&amp;id=68e3f46f083a44572bc63cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11217-debug-messages-revealing-unnecessary-information-bd8418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11217%3A%20Debug%20Messages%20Revealing%20Unnecessary%20Information&amp;severity=medium&amp;id=682d9819c4522896dcbd8418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11182-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-mdaemon-email-server-aeb2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11182%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20MDaemon%20Email%20Server&amp;severity=medium&amp;id=682cd0f81484d88663aeb2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10311-cwe-288-authentication-bypass-using-373c024d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10311%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cmorillas1%20External%20Database%20Based%20Actions&amp;severity=high&amp;id=699f6df1b7ef31ef0b5911e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8978-cwe-200-exposure-of-sensitive-inform-a3d6bb0a</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8978%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Addon%2C%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8979-cwe-200-exposure-of-sensitive-inform-3bbf73e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8979%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Addon%2C%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=high&amp;id=699f6b3ab7ef31ef0b54f89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10825-cwe-79-improper-neutralization-of-i-7df2b3c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10825%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johndarrel%20Hide%20My%20WP%20Ghost%20%E2%80%93%20Security%20%26%20Firewall&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b5926f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8961-cwe-79-improper-neutralization-of-in-65100602</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8961%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Addon%2C%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10793-cwe-79-improper-neutralization-of-i-1d5641eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10793%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20melapress%20WP%20Activity%20Log&amp;severity=high&amp;id=699f6dfdb7ef31ef0b592575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10260-cwe-79-improper-neutralization-of-i-0977b2f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tripetto%20WordPress%20form%20builder%20plugin%20for%20contact%20forms%2C%20surveys%20and%20quizzes%20%E2%80%93%20Tripetto&amp;severity=high&amp;id=699f6defb7ef31ef0b591004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9356-cwe-79-improper-neutralization-of-in-4313e530</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9356%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yotpo%20Yotpo%3A%20Product%20%26%20Photo%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10582-cwe-862-missing-authorization-in-sm-00f92072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10582%3A%20CWE-862%20Missing%20Authorization%20in%20smartwpress%20Music%20Player%20for%20Elementor%20%E2%80%93%20Audio%20Player%20%26%20Podcast%20Player&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10113-cwe-79-improper-neutralization-of-i-38d34009</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10113%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeka-club%20WP%20AdCenter%20%E2%80%93%20Ad%20Manager%20%26%20Adsense%20Ads&amp;severity=medium&amp;id=699f6decb7ef31ef0b590cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9609-cwe-79-improper-neutralization-of-in-f9a46cbf</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20Export%20Import%20%E2%80%93%20WordPress%20extension%20for%20LearnPress&amp;severity=medium&amp;id=699f6b54b7ef31ef0b55239d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10897-cwe-862-missing-authorization-in-th-63e90635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10897%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20Elementor%20Addons&amp;severity=medium&amp;id=699f6e01b7ef31ef0b5936d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10924-cwe-288-authentication-bypass-using-c4864662</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10924%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Really%20Simple%20Plugins%20Really%20Simple%20Security%20Pro%20multisite&amp;severity=critical&amp;id=697395744623b1157c4bc71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11120-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-geovision-gv-vs12-bd89ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11120%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20GeoVision%20GV-VS12&amp;severity=critical&amp;id=682d9819c4522896dcbd89ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24450-na-f2ea698d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24450%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5cb7ef31ef0b570ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24449-na-c9623f6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24449%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5cb7ef31ef0b570ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24447-na-bb19c821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24447%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5cb7ef31ef0b570ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24446-na-99d3a38c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24446%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5cb7ef31ef0b570acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24431-na-12176e53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24431%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5cb7ef31ef0b570ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24426-na-809cfaf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24426%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b570a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24425-na-63cb72e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24425%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5ab7ef31ef0b570a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23169-na-f1c1d944</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23169%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d51b7ef31ef0b5704d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48068-na-b8031714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48068%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0ab7ef31ef0b56d6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46467-na-01780db5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46467%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46466-na-c3121ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46466%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46465-na-dc7c00a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46465%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46463-na-fd86fd7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46463%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46462-na-334dae63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46462%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46383-na-0cd30179</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46383%3A%20n%2Fa&amp;severity=low&amp;id=699f6cfeb7ef31ef0b56ac02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45971-na-d487f139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45971%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf5b7ef31ef0b56a80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45970-na-6ac0ea8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45970%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf5b7ef31ef0b56a807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45969-na-cc90f1d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45969%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf5b7ef31ef0b56a803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44759-na-40e5db9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44759%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44758-na-ba483afb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44758%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce2b7ef31ef0b569e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44625-na-1e6216d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44625%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51330-na-0caeab22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51330%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb1b7ef31ef0b55a1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51164-na-cb6a414f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51164%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bacb7ef31ef0b558882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51142-na-2035cc25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51142%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51141-na-d6cb8720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51141%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51037-na-5214cf90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51037%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b55794f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50986-na-102cb27f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50986%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba4b7ef31ef0b557748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50983-na-371eba8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50983%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50800-na-d0751078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50800%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b557474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50724-na-88e2730e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50724%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b55741e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50655-na-b8bb2fe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50655%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b557377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50654-na-d36b1f70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50654%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b557373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50652-na-57951a90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50652%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b55736f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50651-na-26ce6cc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50651%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b55736b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50650-na-acb95dca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50650%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b557367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50649-na-92abc3cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50649%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b5572c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50648-na-6ff9393b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50648%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b5572bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50647-na-0564075b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50647%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b5572b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49592-na-1554d565</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49592%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-15-b59ce355</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-15&amp;severity=medium&amp;id=68367c98182aa0cae231ea9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-15-751b67</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-15&amp;severity=medium&amp;id=682c7abce3e6de8ceb751b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-15-f12001</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51658-cross-site-request-forgery-csrf-in--5b45d3ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51658%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Henrik%20Hoff%20WP%20Course%20Manager&amp;severity=null&amp;id=69cd750fe6bfc5ba1df0286a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51659-cross-site-request-forgery-csrf-in--938af574</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51659%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GeekRMX%20Twitter%20%40Anywhere%20Plus&amp;severity=null&amp;id=69cd750fe6bfc5ba1df0286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51679-cross-site-request-forgery-csrf-in--53a8a85c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51679%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gentlesource%20Appointmind&amp;severity=null&amp;id=69cd7512e6bfc5ba1df029a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51684-cross-site-request-forgery-csrf-in--690405de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51684%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ciprian%20Popescu%20W3P%20SEO&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51687-cross-site-request-forgery-csrf-in--cd4827c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51687%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Platform.ly%20Platform.ly%20Official&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51688-cross-site-request-forgery-csrf-in--f27dad51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51688%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fraudlabspro%20FraudLabs%20Pro%20SMS%20Verification&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10397-cwe-787-out-of-bounds-write-in-the--6806699e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10397%3A%20CWE-787%20Out-of-bounds%20Write%20in%20The%20OpenAFS%20Foundation%20OpenAFS&amp;severity=high&amp;id=694aafb3e971240e2a6ed38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10396-cwe-772-missing-release-of-resource-96aca588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10396%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20The%20OpenAFS%20Foundation%20OpenAFS&amp;severity=medium&amp;id=694ab6b2e971240e2a747f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10394-cwe-305-in-the-openafs-foundation-o-3d65c2de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10394%3A%20CWE-305%20in%20The%20OpenAFS%20Foundation%20OpenAFS&amp;severity=high&amp;id=694ab6b2e971240e2a747f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52369-unrestricted-upload-of-file-with-da-54132e34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52369%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Optimal%20Access%20KBucket&amp;severity=null&amp;id=69cd753de6bfc5ba1df038a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52372-unrestricted-upload-of-file-with-da-3e475883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52372%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WebTechGlobal%20Easy%20CSV%20Importer%20BETA&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52373-unrestricted-upload-of-file-with-da-74acf97a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52373%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Team%20Devexhub%20Devexhub%20Gallery&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52374-unrestricted-upload-of-file-with-da-1e5693c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52374%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20DoThatTask%20Do%20That%20Task&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52375-unrestricted-upload-of-file-with-da-144fccd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52375%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Arttia%20Creative%20Datasets%20Manager%20by%20Arttia%20Creative&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52376-unrestricted-upload-of-file-with-da-4cf97439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52376%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20cmsMinds%20Boat%20Rental%20Plugin%20for%20WordPress&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52377-unrestricted-upload-of-file-with-da-a1df5aac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52377%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bdthemes%20Instant%20Image%20Generator&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52378-improper-limitation-of-a-pathname-t-3b5d51d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52378%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20labs64%20DigiPass&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52379-unrestricted-upload-of-file-with-da-8399d761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52379%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20faizalbahasan%20kineticPay%20for%20WooCommerce&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52380-unrestricted-upload-of-file-with-da-7ccc9c42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52380%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20softpulseinfotech%20Picsmize&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52382-missing-authorization-in-medmatech--fe4d16ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52382%3A%20Missing%20Authorization%20in%20medmatech%20Matix%20Popup%20Builder&amp;severity=null&amp;id=69cd7540e6bfc5ba1df0398a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52383-missing-authorization-in-aitool-ai--f01491d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52383%3A%20Missing%20Authorization%20in%20aitool%20Ai%20Auto%20Tool%20Content%20Writing%20Assistant%20(Gemini%20Writer%2C%20ChatGPT%20)%20All%20in%20One&amp;severity=null&amp;id=69cd7540e6bfc5ba1df0398d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5125-cwe-79-improper-neutralization-of-in-1b631337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b27178f764e1f470c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52384-unrestricted-upload-of-file-with-da-0715217f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52384%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wpmonks%20Sage%20AI%3A%20Chatbots%2C%20OpenAI%20GPT-4%20Bulk%20Articles%2C%20Dalle-3%20Image%20Generation&amp;severity=null&amp;id=69cd7540e6bfc5ba1df03990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3502-cwe-201-insertion-of-sensitive-infor-485dff17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3502%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b26178f764e1f470b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52381-improper-control-of-filename-for-in-f663ebc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52381%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Shoaib%20Rehmat%20ZIJ%20KART&amp;severity=null&amp;id=69cd753ee6bfc5ba1df03900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52396-improper-limitation-of-a-pathname-t-c4915887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52396%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20RealMag777%20WOLF&amp;severity=null&amp;id=69cd7542e6bfc5ba1df03a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52371-improper-limitation-of-a-pathname-t-a2edf120</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52371%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DonnellC%20Global%20Gateway%20e4%20%7C%20Payeezy%20Gateway%20%7C&amp;severity=null&amp;id=69cd753ee6bfc5ba1df038e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52393-deserialization-of-untrusted-data-i-e5e32d69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52393%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Eric%20Teubert%20Podlove%20Podcast%20Publisher&amp;severity=null&amp;id=69cd7540e6bfc5ba1df039a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10962-cwe-502-deserialization-of-untruste-e494c015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10962%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid%20Backup%20%26%20Migration&amp;severity=high&amp;id=699f6e04b7ef31ef0b5939c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10979-external-control-of-system-or-confi-9237b629</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10979%3A%20External%20Control%20of%20System%20or%20Configuration%20Setting%20in%20PostgreSQL&amp;severity=high&amp;id=69092615fe7723195e0b3597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10978-incorrect-privilege-assignment-in-p-f8097d68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10978%3A%20Incorrect%20Privilege%20Assignment%20in%20PostgreSQL&amp;severity=medium&amp;id=69092615fe7723195e0b3591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10977-use-of-less-trusted-source-in-postg-d8f6b9f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10977%3A%20Use%20of%20Less%20Trusted%20Source%20in%20PostgreSQL&amp;severity=low&amp;id=69092615fe7723195e0b358d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10976-improper-preservation-of-consistency-between-independent-representations-of-shared-state-in-postgresql-bd7375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10976%3A%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20PostgreSQL&amp;severity=medium&amp;id=682d9817c4522896dcbd7375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7730-heap-based-buffer-overflow-b99024dc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7730%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=699f6c1eb7ef31ef0b56023a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3447-heap-based-buffer-overflow-befad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3447%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=682d983ec4522896dcbefad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10571-cwe-98-improper-control-of-filename-776f4b95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10571%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ays-pro%20Chartify%20%E2%80%93%20WordPress%20Chart%20Plugin&amp;severity=critical&amp;id=699f6df6b7ef31ef0b591799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50306-cwe-252-unchecked-return-value-in-a-ae949d58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50306%3A%20CWE-252%20Unchecked%20Return%20Value%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=critical&amp;id=690916c8c28fd46ded7ccf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38479-cwe-20-improper-input-validation-in-a45743b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38479%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=6909214cfe7723195e05454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5920-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-palo-alto-networks-cloud-ngfw-bed912</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=medium&amp;id=682d983ac4522896dcbed912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31695-na-48c3296a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31695%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48284-na-a4283ca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48284%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d13b7ef31ef0b56daf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41217-na-72acefe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41217%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b568195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41209-na-89469884</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41209%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b568191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41206-na-d91cc080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41206%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b56818d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40579-na-cd8342fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40579%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b568052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39707-na-1406ef34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39707%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c87b7ef31ef0b565ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52613-na-1f2e54cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51156-na-222a981e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51156%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50968-na-77435ee0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50968%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba4b7ef31ef0b55771a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50843-na-7ed96802</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50843%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b557560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50842-na-232c2890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50842%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b55755d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50841-na-fdb9c4bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50841%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b55755a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50840-na-5feca511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50840%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b557557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50839-na-4f96f98b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50839%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b557554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50838-na-604b7485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50838%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b557551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50837-na-e02951a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50837%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b55754e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50836-na-4d8608b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50836%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba0b7ef31ef0b55754b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50835-na-8a794b94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50835%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b557548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50834-na-b785c2ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50834%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b557545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50833-na-6e690082</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50833%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b557504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50832-na-1e361f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50832%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b557501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50831-na-c4e56b97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50831%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50830-na-2a2461f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50830%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50829-na-421503ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50829%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50828-na-a65c1841</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50828%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50827-na-c65c65a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50827%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50826-na-23642510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50826%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50825-na-5abd7a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50825%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50824-na-425e0269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50824%3A%20n%2Fa&amp;severity=low&amp;id=699f6ba0b7ef31ef0b5574e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50823-na-50416504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50823%3A%20n%2Fa&amp;severity=low&amp;id=699f6b9eb7ef31ef0b557490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49778-na-ab48b4b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49778%3A%20n%2Fa&amp;severity=high&amp;id=699f6b80b7ef31ef0b555fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49777-na-e90c994d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49777%3A%20n%2Fa&amp;severity=high&amp;id=699f6b80b7ef31ef0b555fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49776-na-481c7155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49776%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-14-f12ffb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21853-denial-of-service-in-4th-and-5th-ge-56c08626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21853%3A%20denial%20of%20service%20in%204th%20and%205th%20Generation%20Intel(R)%20Xeon(R)%20Processors&amp;severity=medium&amp;id=6909261dfe7723195e0b4176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21820-escalation-of-privilege-in-intelr-x-efce34ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21820%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Xeon(R)%20processor%20memory%20controller%20configurations%20when%20using%20Intel(R)%20SGX&amp;severity=high&amp;id=6909261dfe7723195e0b416a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23918-escalation-of-privilege-in-intelr-x-cc7a5d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23918%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Xeon(R)%20processor%20memory%20controller%20configurations%20when%20using%20Intel(R)%20SGX&amp;severity=high&amp;id=6909261ffe7723195e0b469e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43093-elevation-of-privilege-in-google-an-0335e750</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43093%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68f7d9b4247d717aace26ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9476-cwe-266-in-grafana-labs-grafana-oss--40421c3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9476%3A%20CWE-266%20in%20Grafana%20Labs%20Grafana%20OSS%20and%20Enterprise&amp;severity=medium&amp;id=6903a6a4aebfcd54748ac664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48900-exposure-of-sensitive-information-t-f8d02b26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48900%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11028-cwe-288-authentication-bypass-using-ce262b39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11028%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20icdsoft%20MultiManager%20WP%20%E2%80%93%20Manage%20All%20Your%20WordPress%20Sites%20Easily&amp;severity=critical&amp;id=699f6e04b7ef31ef0b593ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9682-cwe-79-improper-neutralization-of-in-f3795789</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9682%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5547c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9668-cwe-79-improper-neutralization-of-in-66cd41e9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b59b7ef31ef0b55479d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9059-cwe-79-improper-neutralization-of-in-db75106d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9059%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b3db7ef31ef0b54fa71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10877-cwe-79-improper-neutralization-of-i-d88b2776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nasirahmed%20AFI%20%E2%80%93%20The%20Easiest%20Integration%20Plugin&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59363f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11150-cwe-22-improper-limitation-of-a-pat-d3d4122e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11150%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WordPress%20User%20Extra%20Fields&amp;severity=critical&amp;id=699f6e07b7ef31ef0b593e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10800-cwe-862-missing-authorization-in-va-82dc9b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10800%3A%20CWE-862%20Missing%20Authorization%20in%20vanquish%20WordPress%20User%20Extra%20Fields&amp;severity=high&amp;id=699f6dfeb7ef31ef0b59268d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10816-cwe-22-improper-limitation-of-a-pat-4116b6bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10816%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sodah%20LUNA%20RADIO%20PLAYER&amp;severity=high&amp;id=699f6dfeb7ef31ef0b5926f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10174-cwe-639-authorization-bypass-throug-138f3820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10174%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wedevs%20WP%20Project%20Manager%20%E2%80%93%20Task%2C%20team%2C%20and%20project%20management%20plugin%20featuring%20kanban%20board%20and%20gantt%20charts&amp;severity=high&amp;id=699f6deeb7ef31ef0b590e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10820-cwe-434-unrestricted-upload-of-file-36d323e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10820%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WooCommerce%20Upload%20Files&amp;severity=critical&amp;id=699f6dfeb7ef31ef0b5926f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10828-cwe-502-deserialization-of-untruste-37747b67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10828%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20algolplus%20Advanced%20Order%20Export%20For%20WooCommerce&amp;severity=high&amp;id=699f6dfeb7ef31ef0b5926fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10794-cwe-639-authorization-bypass-throug-39f6ea98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10794%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20duongancol%20Boostify%20Header%20Footer%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b59260d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10802-cwe-862-missing-authorization-in-ha-dfefa248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10802%3A%20CWE-862%20Missing%20Authorization%20in%20hashthemes%20Hash%20Elements&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b59269d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10529-cwe-862-missing-authorization-in-ko-25edccec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10529%3A%20CWE-862%20Missing%20Authorization%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11143-cwe-352-cross-site-request-forgery--d164dd09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11143%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=699f6e07b7ef31ef0b593e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10684-cwe-79-improper-neutralization-of-i-8ec77961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10531-cwe-862-missing-authorization-in-ko-91962a7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10531%3A%20CWE-862%20Missing%20Authorization%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10530-cwe-862-missing-authorization-in-ko-ef8e8dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10530%3A%20CWE-862%20Missing%20Authorization%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=medium&amp;id=699f6df4b7ef31ef0b59156d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10593-cwe-352-cross-site-request-forgery--594e6d60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10593%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20WPForms%20%E2%80%93%20Easy%20Form%20Builder%20for%20WordPress%20%E2%80%93%20Contact%20Forms%2C%20Payment%20Forms%2C%20Surveys%2C%20%26%20More&amp;severity=medium&amp;id=699f6df8b7ef31ef0b59190b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10882-cwe-79-improper-neutralization-of-i-848290c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59365c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9426-cwe-79-improper-neutralization-of-in-5e6170a0</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkaquamarine%20Aqua%20SVG%20Sprite&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10629-cwe-862-missing-authorization-in-ax-c4350f19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10629%3A%20CWE-862%20Missing%20Authorization%20in%20axelkeller%20GPX%20Viewer&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8874-cwe-79-improper-neutralization-of-in-2109cd00</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaminskym%20AJAX%20Login%20and%20Registration%20modal%20popup%20%2B%20inline%20form&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10854-cwe-862-missing-authorization-in-no-49f27eb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10854%3A%20CWE-862%20Missing%20Authorization%20in%20northmule%20Buy%20one%20click%20WooCommerce&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10853-cwe-862-missing-authorization-in-no-5de0bf2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10853%3A%20CWE-862%20Missing%20Authorization%20in%20northmule%20Buy%20one%20click%20WooCommerce&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10717-cwe-862-missing-authorization-in-wp-e5d217c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10717%3A%20CWE-862%20Missing%20Authorization%20in%20wpmonks%20Styler%20for%20Ninja%20Forms&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b5923c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10038-cwe-80-improper-neutralization-of-s-713fefaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10038%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20cmanon%20WP-Strava&amp;severity=medium&amp;id=699f6debb7ef31ef0b590b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10850-cwe-79-improper-neutralization-of-i-ed4c3548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razorpay%20Razorpay%20Payment%20Button%20Elementor%20Plugin&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9614-cwe-79-improper-neutralization-of-in-4a154577</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9614%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailmunch%20Constant%20Contact%20Forms%20by%20MailMunch&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10577-cwe-79-improper-neutralization-of-i-894b9f4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10577%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fbtopcn%20%E8%83%96%E9%BC%A0%E9%87%87%E9%9B%86(Fat%20Rat%20Collect)%20%E5%BE%AE%E4%BF%A1%E7%9F%A5%E4%B9%8E%E7%AE%80%E4%B9%A6%E8%85%BE%E8%AE%AF%E6%96%B0%E9%97%BB%E5%88%97%E8%A1%A8%E5%88%86%E9%A1%B5%E9%87%87%E9%9B%86%2C%20%E8%BF%98%E6%9C%89%E8%87%AA%E5%8A%A8%E9%87%87%E9%9B%86%E3%80%81%E8%87%AA%E5%8A%A8%E5%8F%91%E5%B8%83%E3%80%81%E8%87%AA%E5%8A%A8%E6%A0%87%E7%AD%BE%E3%80%81%E7%AD%89%E5%A4%9A%E9%A1%B9%E5%8A%9F%E8%83%BD%E3%80%82%E5%BC%80%E6%BA%90%E6%8F%92%E4%BB%B6&amp;severity=medium&amp;id=699f6df6b7ef31ef0b5917a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10851-cwe-79-improper-neutralization-of-i-ceee415e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10851%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20razorpay%20Razorpay%20Payment%20Button%20Plugin&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8985-cwe-79-improper-neutralization-of-in-f2254574</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kimberlynorris%20Social%20Proof%20(Testimonial)%20Slider&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9578-cwe-862-missing-authorization-in-ego-c7172655</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9578%3A%20CWE-862%20Missing%20Authorization%20in%20egolacrima%20Hide%20Links&amp;severity=medium&amp;id=699f6b52b7ef31ef0b552205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10852-cwe-862-missing-authorization-in-no-95c5b7e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10852%3A%20CWE-862%20Missing%20Authorization%20in%20northmule%20Buy%20one%20click%20WooCommerce&amp;severity=medium&amp;id=699f6dffb7ef31ef0b5927eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10778-cwe-639-authorization-bypass-throug-9ab305aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10778%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20staxwp%20BuddyPress%20Builder%20for%20Elementor%20%E2%80%93%20BuddyBuilder&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b59246d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45879-na-47af031d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45879%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45878-na-7ce20f1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45878%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45877-na-276454b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45877%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45876-na-fb5799cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45876%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45875-na-acb14bdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45875%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42834-na-cc51c53a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42834%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b5693ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40410-na-e3899151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40410%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca8b7ef31ef0b567a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40408-na-663dc606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40408%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40407-na-2d7dd760</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40407%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40405-na-81cb56d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40405%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40404-na-30e5303f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40404%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca8b7ef31ef0b567a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51027-na-dd53312a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51027%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b55793f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50972-na-7df774f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50972%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50971-na-4f2ca458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50971%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50970-na-f955990c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50970%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50969-na-53b86884</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50969%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b55771e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50956-na-941d854d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50956%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba2b7ef31ef0b55766f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50853-na-74cebd18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50853%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b5575d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50852-na-00f6b42b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50852%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba2b7ef31ef0b5575d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48510-na-e8779058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48510%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b72b7ef31ef0b555818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-13-f12b5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11168-vulnerability-in-python-software-fo-fb62a1a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11168%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69092615fe7723195e0b359d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49039-cwe-287-improper-authentication-in--cbd64349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49039%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Server%202025&amp;severity=high&amp;id=68f7d9b5247d717aace26b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43451-cwe-73-external-control-of-file-nam-6bd964bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43451%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%20Server%202025&amp;severity=medium&amp;id=68f7d9b4247d717aace26abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8068-cwe-269-improper-privilege-managemen-8acedc34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8068%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Citrix%20Citrix%20Session%20Recording&amp;severity=medium&amp;id=68f7d9b7247d717aace26c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49369-cwe-295-improper-certificate-valida-4c64af84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49369%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Icinga%20icinga2&amp;severity=critical&amp;id=69092ee835043901e82caabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50336-cwe-22-improper-limitation-of-a-pat-57af580e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50336%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20matrix-org%20matrix-js-sdk&amp;severity=medium&amp;id=69092eea35043901e82cab13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8074-cwe-306-missing-authentication-for-c-d8c22981</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8074%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Nomysoft%20Informatics%20Nomysem&amp;severity=critical&amp;id=68ee4e5118c99eb639aa9a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10245-cwe-288-authentication-bypass-using-3215bef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10245%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20mobisoft974%20Relais%202FA&amp;severity=critical&amp;id=699f6defb7ef31ef0b590ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10323-cwe-79-improper-neutralization-of-i-cb3c98c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=699f6df1b7ef31ef0b591200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10179-cwe-79-improper-neutralization-of-i-47c58567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10179%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpslickstream%20Slickstream%3A%20Engagement%20and%20Conversions&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10790-cwe-79-improper-neutralization-of-i-b3d79dc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qriouslad%20Admin%20and%20Site%20Enhancements%20(ASE)&amp;severity=medium&amp;id=699f6dfdb7ef31ef0b59256a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9357-cwe-79-improper-neutralization-of-in-4fd316da</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9357%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michelwppi%20xili-tidy-tags&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10538-cwe-79-improper-neutralization-of-i-f204d5fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10538%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10685-cwe-79-improper-neutralization-of-i-cffefb22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10685%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Contact%20Form%207%20Redirect%20%26%20Thank%20You%20Page&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10672-cwe-73-external-control-of-file-nam-47ffbcdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10672%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20themeisle%20Multiple%20Page%20Generator%20Plugin%20%E2%80%93%20MPG&amp;severity=low&amp;id=699f6df9b7ef31ef0b591aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10695-cwe-639-authorization-bypass-throug-fd9e63f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10695%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20futuriowp%20Futurio%20Extra&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49395-exposure-of-sensitive-information-t-b457801b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49395%3A%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata&amp;severity=medium&amp;id=69200f8659bb91a9a9ac5c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49394-improper-verification-of-cryptograp-0d4c491d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49394%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&amp;severity=medium&amp;id=69200f8659bb91a9a9ac5c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49393-improper-verification-of-cryptograp-23d771ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49393%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&amp;severity=medium&amp;id=691f6d0640b920e270875280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28731-na-367886f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28731%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5891ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28730-na-3b976b4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28730%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b589149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28729-na-f657b5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28729%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5890be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28728-na-5a55f48f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28728%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b5890b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28726-na-3404a0ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28726%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5890ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51179-na-7fb1655a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51179%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b55888e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51094-na-05bebf5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51094%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51093-na-1ee06aa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51093%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-12-f1239f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1239f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11079-improper-input-validation-74e530c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11079%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43439-4537af22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43439&amp;severity=medium&amp;id=699f6cd8b7ef31ef0b5697c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50263-vulnerability-in-linux-linux-bdf6d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50263%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43437-bec176cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43437&amp;severity=medium&amp;id=699f6cd8b7ef31ef0b5697be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43435-f01dcd15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43435&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b569756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43433-e56f3fd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43433&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b56974e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43432-fadfdb7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43432&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b56974a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43430-a5a75b32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43430&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b569742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43429-14904fee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43429&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b56973e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43427-df9b5802</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43427&amp;severity=low&amp;id=699f6cd6b7ef31ef0b569736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52350-improper-neutralization-of-input-du-aa6da43c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52350%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nrmendez%20CRM%202go&amp;severity=null&amp;id=69cd753ce6bfc5ba1df037e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52351-improper-neutralization-of-input-du-1b2e0e2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52351%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BU%20Web%20Team%20BU%20Slideshow&amp;severity=null&amp;id=69cd753de6bfc5ba1df0388b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52352-improper-neutralization-of-input-du-20d89303</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miloandrew%20Postcasa%20Shortcode&amp;severity=null&amp;id=69cd753de6bfc5ba1df0388e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52353-improper-neutralization-of-input-du-8fd3ca53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gabriel%20Serafini%20Christian%20Science%20Bible%20Lesson%20Subjects&amp;severity=null&amp;id=69cd753de6bfc5ba1df03891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52354-improper-neutralization-of-input-du-af0747f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52354%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cool%20Plugins%20Web%20Stories%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd753de6bfc5ba1df03894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52355-improper-neutralization-of-input-du-5fe52634</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MiKa%20OSM&amp;severity=null&amp;id=69cd753de6bfc5ba1df03897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52356-improper-neutralization-of-input-du-ef41dd7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd753de6bfc5ba1df0389a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52357-improper-neutralization-of-input-du-6fedfde4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lqd%20LIQUID%20BLOCKS&amp;severity=null&amp;id=69cd753de6bfc5ba1df0389d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52358-improper-neutralization-of-input-du-1e1189a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52358%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberChimps%20Responsive%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd753de6bfc5ba1df038a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51820-improper-neutralization-of-special--6fe8187d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51820%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wplsquared%20L%20Squared%20Hub%20WP&amp;severity=null&amp;id=69cd7520e6bfc5ba1df0301a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51837-improper-neutralization-of-special--da17d40a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51837%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sophia%20M%20Williams%20WP%20Contest&amp;severity=null&amp;id=69cd7521e6bfc5ba1df0309a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51843-improper-neutralization-of-special--414ad039</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51843%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20fruitcakestudios%20Horsemanager&amp;severity=null&amp;id=69cd7522e6bfc5ba1df0311f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51845-improper-neutralization-of-special--ca1bb313</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51845%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20richteam%20Share%20Buttons%20%E2%80%93%20Social%20Media&amp;severity=null&amp;id=69cd7522e6bfc5ba1df03125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51882-improper-neutralization-of-special--50ba5d20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51882%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopalkumar315%20Gboy%20Custom%20Google%20Map&amp;severity=null&amp;id=69cd7527e6bfc5ba1df03366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51788-unrestricted-upload-of-file-with-da-d0a5ac76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51788%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Joshua%20Wolfe%20The%20Novel%20Design%20Store%20Directory&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51789-unrestricted-upload-of-file-with-da-739a72e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51789%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20UjW0L%20Image%20Classify&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51790-unrestricted-upload-of-file-with-da-c6ffd85f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51790%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20HB%20WEBSOL%20HB%20AUDIO%20GALLERY&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51791-cwe-434-unrestricted-upload-of-file-f22f2edd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51791%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Made%20I.T.%20Forms&amp;severity=null&amp;id=697391d84623b1157c4b18c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51792-unrestricted-upload-of-file-with-da-be066cfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51792%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Dang%20Ngoc%20Binh%20Audio%20Record&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51793-cwe-434-unrestricted-upload-of-file-8877a8a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51793%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ateeq%20Rafeeq%20RepairBuddy&amp;severity=null&amp;id=69727fa14623b1157c88acce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51571-improper-neutralization-of-input-du-729fede8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masterbip%20MasterBip%20para%20Elementor&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51572-improper-neutralization-of-input-du-f4b68b78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51572%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20QR%20Codes&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51573-improper-neutralization-of-input-du-6515f25e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ersatzpole%20ML%20Responsive%20Audio%20player%20with%20playlist%20Shortcode&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51575-improper-neutralization-of-input-du-42796918</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51575%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md.%20Abdullah%20Al%20Masum%20Extender%20All%20In%20One%20For%20Elementor&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25255-na-ef4fbcd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25255%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25254-na-3e3f65e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25254%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25253-na-84ee3901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25253%3A%20n%2Fa&amp;severity=high&amp;id=699f6d63b7ef31ef0b571bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48322-na-2cc3f29b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48322%3A%20n%2Fa&amp;severity=high&amp;id=699f6d14b7ef31ef0b56db69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46966-na-83f2fe70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46966%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46965-na-5cbc84fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46965%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46964-na-34320d9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46964%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46963-na-8c9dd054</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46963%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46962-na-a39163f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46962%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d06b7ef31ef0b56d4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44546-na-5cea9000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44546%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdeb7ef31ef0b569b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41992-na-79de90b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41992%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36061-na-4e8dc076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36061%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5bb7ef31ef0b563488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52533-na-d85d6146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52533%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb6b7ef31ef0b55a4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51213-na-dad9034e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51213%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b558952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51190-na-bada9e82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51190%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b558927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51189-na-265938f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51189%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b5588a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51188-na-5cbfbd51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51188%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b5588a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51187-na-7d3c724c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51187%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b55889d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51186-na-fe0fa228</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51186%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b558897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51135-na-0c17df1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51135%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baab7ef31ef0b557ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51054-na-51880137</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51054%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b5579ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51026-na-97402059</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51026%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b55793c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50991-na-320bd070</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50991%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b55778c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50990-na-59a1bb20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50990%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50989-na-eb449244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50989%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba4b7ef31ef0b557751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50667-na-780d9024</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50667%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b55738e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50636-na-9f66db60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50636%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9cb7ef31ef0b5572ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50601-na-d092230d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50601%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9ab7ef31ef0b557218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48939-na-0a7ac050</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48939%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52532-na-c8f28aaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52532%3A%20n%2Fa&amp;severity=high&amp;id=69092eed35043901e82cb10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52531-cwe-787-out-of-bounds-write-in-gnom-086ffb07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52531%3A%20CWE-787%20Out-of-bounds%20Write%20in%20GNOME%20libsoup&amp;severity=medium&amp;id=69092eed35043901e82cb103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52530-na-7a69cb31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52530%3A%20n%2Fa&amp;severity=high&amp;id=69092eed35043901e82cb0fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-11-f12cb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10958-cwe-94-improper-control-of-generati-7910fcb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10958%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=high&amp;id=699f6e04b7ef31ef0b5939ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10265-cwe-79-improper-neutralization-of-i-bdb5905f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=699f6df1b7ef31ef0b591186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51576-improper-neutralization-of-input-du-7c25e1c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51576%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpza%20AMP%20Img%20Shortcode&amp;severity=null&amp;id=69cd7504e6bfc5ba1df02439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51577-improper-neutralization-of-input-du-1b0f51e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51577%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neville.lugton%20bpmn.io&amp;severity=null&amp;id=69cd7504e6bfc5ba1df0243c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51578-improper-neutralization-of-input-du-ab576196</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51578%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lpagg%203D%20Presentation&amp;severity=null&amp;id=69cd7504e6bfc5ba1df0243f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51580-improper-neutralization-of-input-du-c87d48da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51580%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zootemplate%20Clever%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7504e6bfc5ba1df02445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51581-improper-neutralization-of-input-du-20e37f0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51581%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Restaurant%20%26%20Cafe%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7504e6bfc5ba1df02448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51583-improper-neutralization-of-input-du-ae9ec44f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51583%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PluginsPoint%20Kento%20Ads%20Rotator&amp;severity=null&amp;id=69cd7504e6bfc5ba1df0244e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51584-improper-neutralization-of-input-du-241cbbbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51584%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anas2004%20Marquee%20Elementor%20with%20Posts&amp;severity=null&amp;id=69cd7504e6bfc5ba1df02451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46954-na-875b218a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46954%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46952-na-6281bb69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46952%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46613-na-8ba787d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56d2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46956-na-c9753c00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46956%3A%20n%2Fa&amp;severity=high&amp;id=69092b7735043901e828cb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46955-na-ef4a9f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46955%3A%20n%2Fa&amp;severity=medium&amp;id=69092b7735043901e828cb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46953-na-83f92e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46953%3A%20n%2Fa&amp;severity=high&amp;id=69092b7735043901e828cb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46951-na-ff979d0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46951%3A%20n%2Fa&amp;severity=high&amp;id=69092b7735043901e828cb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-10-f125cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f125cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51585-improper-neutralization-of-input-du-88170048</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51585%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Sales%20Page%20Addon%20%E2%80%93%20Elementor%20%26%20Beaver%20Builder&amp;severity=null&amp;id=69cd7508e6bfc5ba1df0252b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51586-improper-neutralization-of-input-du-f9e9e2bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51586%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20camilluskillus%20Elementary%20Addons&amp;severity=null&amp;id=69cd7508e6bfc5ba1df0252e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51587-improper-neutralization-of-input-du-6abb9901</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51587%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softfirm%20Definitive%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7508e6bfc5ba1df02531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51588-improper-neutralization-of-input-du-37dbf416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51588%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20riponhossain%20Super%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7508e6bfc5ba1df02534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51589-improper-neutralization-of-input-du-7331e6f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51589%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcirqle%20Bigmart%20Elements&amp;severity=null&amp;id=69cd7508e6bfc5ba1df02537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51590-improper-neutralization-of-input-du-1e667724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HooThemes%20Hoo%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7508e6bfc5ba1df0253a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51591-improper-neutralization-of-input-du-2ad68d72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51591%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Grids%20Slicko&amp;severity=null&amp;id=69cd7508e6bfc5ba1df0253d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51592-improper-neutralization-of-input-du-fda06914</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51592%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mystical%20Themes%20Meta%20Store%20Elements&amp;severity=null&amp;id=69cd7508e6bfc5ba1df02543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51593-improper-neutralization-of-input-du-e938e135</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51593%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Glopium%20%D0%9A%D1%83%D1%80%D1%81%20%D0%B2%D0%B0%D0%BB%D1%8E%D1%82%20UAH&amp;severity=null&amp;id=69cd7508e6bfc5ba1df02549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51594-improper-neutralization-of-input-du-5262e7fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51594%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rafel.sanso%20Gmap%20Point%20List&amp;severity=null&amp;id=69cd7508e6bfc5ba1df0254f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51595-improper-neutralization-of-input-du-8828eae5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51595%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SKSDEV%20SKSDEV%20Toolkit&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51596-improper-neutralization-of-input-du-4a746907</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51596%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nilesh%20Shiragave%20Business&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51597-improper-neutralization-of-input-du-8204edb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51597%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeshark%20ThemeShark%20Templates%20%26%20Widgets%20for%20Elementor&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51598-improper-neutralization-of-input-du-5e700995</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51598%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kendysond%20Selar.co%20Widget&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51599-improper-neutralization-of-input-du-a324f62a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20russell.albin%20Simple%20Business%20Manager&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51603-improper-neutralization-of-input-du-653246a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51603%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mirceatm%20NMR%20Strava%20activities&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51604-improper-neutralization-of-input-du-f7b931af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51604%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmabugay%20Media%20Modal&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51606-improper-neutralization-of-special--29b331ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51606%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Blrt%20Blrt%20WP%20Embed&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51608-improper-neutralization-of-special--98a1430b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51608%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20colinph970%20AmaDiscount&amp;severity=null&amp;id=69cd750ae6bfc5ba1df02677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51609-improper-neutralization-of-input-du-4041c1c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51609%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Aakif%20Kadiwala%20Emoji%20Shortcode&amp;severity=null&amp;id=69cd750ae6bfc5ba1df0267a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51610-improper-neutralization-of-input-du-29dbc47f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51610%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20seothemes%20Display%20Terms%20Shortcode&amp;severity=null&amp;id=69cd750ae6bfc5ba1df0267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51611-improper-neutralization-of-input-du-2da227cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51611%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Miguel%20Peixe%20WP%20Feature%20Box&amp;severity=null&amp;id=69cd750ae6bfc5ba1df02680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51612-improper-neutralization-of-input-du-4fba9a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51612%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20designerken%20Reftagger%20Shortcode&amp;severity=null&amp;id=69cd750ae6bfc5ba1df02683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51613-improper-neutralization-of-input-du-63d5d583</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51613%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bidbud%20TradeMe%20widgets&amp;severity=null&amp;id=69cd750ae6bfc5ba1df02686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51614-improper-neutralization-of-input-du-679248fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51614%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aajoda%20Aajoda%20Testimonials&amp;severity=null&amp;id=69cd750ae6bfc5ba1df02689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51616-improper-neutralization-of-input-du-f1b9083e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51616%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rupok%20AwesomePress&amp;severity=null&amp;id=69cd750ae6bfc5ba1df0268f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51618-improper-neutralization-of-input-du-4a8c7341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51618%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DuoGeek%20Custom%20Admin%20Menu&amp;severity=null&amp;id=69cd750ae6bfc5ba1df026ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51622-improper-neutralization-of-input-du-447c0fe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP-EXPERTS.IN%20WP%20EASY%20RECIPE&amp;severity=null&amp;id=69cd750be6bfc5ba1df026ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51623-improper-neutralization-of-special--0ae40bee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51623%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mehral%20WP%20EIS&amp;severity=null&amp;id=69cd750be6bfc5ba1df026bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51627-improper-neutralization-of-input-du-5ba56aeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaedinger%20Audio%20Comparison%20Lite&amp;severity=null&amp;id=69cd750be6bfc5ba1df026c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51628-improper-neutralization-of-input-du-13868866</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EzyOnlineBookings%20EzyOnlineBookings%20Online%20Booking%20System%20Widget&amp;severity=null&amp;id=69cd750be6bfc5ba1df026cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51629-improper-neutralization-of-input-du-4a356a28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MetricThemes%20Header%20Footer%20Composer%20for%20Elementor&amp;severity=null&amp;id=69cd750be6bfc5ba1df026cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51630-cross-site-request-forgery-csrf-in--9823abef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51630%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Lars%20Schenk%20Responsive%20Flickr%20Gallery&amp;severity=null&amp;id=69cd750ce6bfc5ba1df0275c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51662-improper-neutralization-of-input-du-2089d1d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51662%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Modernaweb%20Studio%20Black%20Widgets%20For%20Elementor&amp;severity=null&amp;id=69cd7510e6bfc5ba1df028f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51663-improper-neutralization-of-input-du-65d5954e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51663%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bricksable%20Bricksable%20for%20Bricks%20Builder&amp;severity=null&amp;id=69cd7510e6bfc5ba1df028f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51664-improper-neutralization-of-input-du-8780ebf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51664%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markkinchin%20Beds24%20Online%20Booking&amp;severity=null&amp;id=69cd7510e6bfc5ba1df028fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51668-improper-neutralization-of-input-du-2ca74577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51668%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mtilly%20MyCurator%20Content%20Curation&amp;severity=null&amp;id=69cd7510e6bfc5ba1df0290c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51670-improper-neutralization-of-input-du-32520b4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JoomSky%20JS%20Help%20Desk&amp;severity=null&amp;id=69cd7510e6bfc5ba1df02914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51673-improper-neutralization-of-input-du-dca7ff7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51673%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20HT%20Politic&amp;severity=null&amp;id=69cd7512e6bfc5ba1df02996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51674-improper-neutralization-of-input-du-0a5ffecb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51674%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fast%20Themes%20Sastra%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7512e6bfc5ba1df02999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51675-improper-neutralization-of-input-du-f9c07ef4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51675%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Syed%20Balkhi%20aThemes%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7512e6bfc5ba1df0299c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51676-improper-neutralization-of-input-du-be2eec72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Delicious%20Delisho&amp;severity=null&amp;id=69cd7512e6bfc5ba1df0299f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51689-improper-neutralization-of-script-r-c513f64d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51689%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Saleswonder%20Team%3A%20Tobias%20CF7%20WOW%20Styler&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51690-improper-neutralization-of-input-du-856d7fba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51690%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20neelam.samariya%20Wp%20Slide%20Categorywise&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51691-improper-neutralization-of-input-du-715a47bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51691%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aryanduntley%20Admin%20Amplify&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51692-improper-neutralization-of-input-du-4255a5e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20askewbrook%20Bing%20Search%20API%20Integration&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51693-improper-neutralization-of-input-du-9af4ff07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20labdav%20Search%20order%20by%20product%20SKU%20for%20WooCommerce&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51694-improper-neutralization-of-input-du-489a531a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51694%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20digitalfisherman%20Geotagged%20Media&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51695-improper-neutralization-of-input-du-ed226754</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51695%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yes%20We%20Work%20Fabrica%20Synced%20Pattern%20Instances&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51696-improper-neutralization-of-input-du-1e7f4ede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ben.moody%20Content%20Syndication%20Toolkit%20Reader&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51698-improper-neutralization-of-input-du-53498ea0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51698%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Luis%20Rock%20Master%20Bar&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51699-improper-neutralization-of-input-du-f07ec61d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51699%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Buooy%20Buooy%20Sticky%20Header&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51701-improper-neutralization-of-input-du-5d57e03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51701%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mahesh%20Waghmare%20MG%20Post%20Contributors&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51702-improper-neutralization-of-input-du-eeed2ffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ben.moody%20SrcSet%20Responsive%20Images%20for%20WordPress&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10837-cwe-79-improper-neutralization-of-i-b05e4328</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20phppoet%20SysBasics%20Customize%20My%20Account%20for%20WooCommerce&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b592710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51703-improper-neutralization-of-input-du-a5178650</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20laura20%20WP-Basics&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51704-improper-neutralization-of-input-du-b4f93545</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20John%20Hanusek%20imPress&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51705-improper-neutralization-of-input-du-03b094e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51705%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jamesdbruner%20WP%20MMenu%20Lite&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51706-improper-neutralization-of-input-du-a415637a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51706%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Upeksha%20Wisidagama%20UW%20Freelancer&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51707-improper-neutralization-of-input-du-642df0e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51707%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WebCodin%20WP%20Visual%20Adverts&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51708-improper-neutralization-of-input-du-c550f1bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Narnoo%20Narnoo%20Commerce%20Manager&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51709-improper-neutralization-of-input-du-b5511a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mariandz%20TeleAdmin&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51710-improper-neutralization-of-input-du-fb05a7c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Minerva%20Infotech%20Responsive%20Data%20Table&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51711-improper-neutralization-of-input-du-f067e92e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51711%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hitesh%20Khunt%20Saragna&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51712-improper-neutralization-of-input-du-42c21fc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51712%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Visser%20Jigoshop%20%E2%80%93%20Store%20Toolkit&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51713-improper-neutralization-of-input-du-c1407a2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51713%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TRe%20Technology%20And%20Research%20S.r.l.%20HQ60%20Fidelity%20Card&amp;severity=null&amp;id=69cd7517e6bfc5ba1df02ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51714-improper-neutralization-of-input-du-46e9b0fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51714%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techdabang%20User%20Password%20Reset&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51716-improper-neutralization-of-input-du-5d98a676</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51716%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gopiplus%20Twitter%20real%20time%20search%20scrolling&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51717-improper-neutralization-of-input-du-3cb6f9d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51717%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Perception%20System%20System%20Pvt.%20Ltd.%20Ajax%20Content%20Filter&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51718-improper-neutralization-of-input-du-360d6cc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51718%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arsdehnel%20Simple%20Modal&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51719-improper-neutralization-of-input-du-41dcd4d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51719%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roman%20Peterhans%20Simplistic%20SEO&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51759-improper-neutralization-of-input-du-c57ee951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Detlef%20Beyer%20SVT%20Simple&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51760-improper-neutralization-of-input-du-f1697c0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ristretto%20Apps%20Dashing%20Memberships&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51761-improper-neutralization-of-input-du-0ad797bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51761%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zackgilbert%20WPHelpful&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10352-cwe-200-exposure-of-sensitive-infor-bdfd2626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10352%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nalam-1%20Magical%20Addons%20For%20Elementor%20(%20Header%20Footer%20Builder%2C%20Free%20Elementor%20Widgets%2C%20Elementor%20Templates%20Library%20)&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10261-cwe-94-improper-control-of-generati-cf97cc2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10261%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20madalinungureanu%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=high&amp;id=699f6df1b7ef31ef0b591179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10640-cwe-94-improper-control-of-generati-0c2ea5dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10640%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20FOX%20%E2%80%93%20Currency%20Switcher%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=699f6df9b7ef31ef0b5919c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50262-vulnerability-in-linux-linux-bdf6bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50262%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf6bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50261-vulnerability-in-linux-linux-bdf6b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50261%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50260-vulnerability-in-linux-linux-bdf69e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50260%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50259-vulnerability-in-linux-linux-bdf696</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50259%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50258-vulnerability-in-linux-linux-bdf690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50258%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50257-vulnerability-in-linux-linux-bdf681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50257%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50256-vulnerability-in-linux-linux-bdf672</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50256%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50255-vulnerability-in-linux-linux-bdf66a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50255%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50254-vulnerability-in-linux-linux-bdf662</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50254%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50253-vulnerability-in-linux-linux-bdf65c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50253%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50252-vulnerability-in-linux-linux-bdf658</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50252%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50251-vulnerability-in-linux-linux-bdf650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50251%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50250-vulnerability-in-linux-linux-bdf630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50250%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50249-vulnerability-in-linux-linux-bdcf9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50249%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50248-vulnerability-in-linux-linux-bdf62c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50248%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf62c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50247-vulnerability-in-linux-linux-bdf624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50247%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50246-vulnerability-in-linux-linux-bdf61c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50246%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50245-vulnerability-in-linux-linux-bdf618</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50245%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50244-vulnerability-in-linux-linux-bdf60b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50244%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50243-vulnerability-in-linux-linux-bdf607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50243%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50242-vulnerability-in-linux-linux-bdf603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50242%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50241-vulnerability-in-linux-linux-bdcf8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50240-vulnerability-in-linux-linux-bdf5ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50239-vulnerability-in-linux-linux-bdf5fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50238-vulnerability-in-linux-linux-bdcf89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50237-vulnerability-in-linux-linux-bdf5e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50236-vulnerability-in-linux-linux-bdf5e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50235-vulnerability-in-linux-linux-bdcf85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50234-vulnerability-in-linux-linux-bdf5d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50233-vulnerability-in-linux-linux-bdf5d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50232-vulnerability-in-linux-linux-bdf5cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50231-vulnerability-in-linux-linux-bdf5cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50230-vulnerability-in-linux-linux-bdf5c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50229-vulnerability-in-linux-linux-bdcf81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50227-vulnerability-in-linux-linux-bdf5c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50226-vulnerability-in-linux-linux-bdf5bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50226%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50225-vulnerability-in-linux-linux-bdf5b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50224-vulnerability-in-linux-linux-bdf5a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50223-vulnerability-in-linux-linux-bdf5a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50222-vulnerability-in-linux-linux-bdf59e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50222%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50221-vulnerability-in-linux-linux-bdf58f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50221%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50220-vulnerability-in-linux-linux-bdf587</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50220%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50218-vulnerability-in-linux-linux-bdf57f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50218%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50217-vulnerability-in-linux-linux-bdf570</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50217%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50216-vulnerability-in-linux-linux-bdf568</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50216%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50215-vulnerability-in-linux-linux-bdf560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50215%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50214-vulnerability-in-linux-linux-bdf55a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50214%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50213-vulnerability-in-linux-linux-bdf545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50213%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50212-vulnerability-in-linux-linux-bdf541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50212%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51762-improper-neutralization-of-input-du-134a642e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51762%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Gipple%20PropertyShift&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51763-improper-neutralization-of-input-du-8f07dac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51763%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biplob018%20Team%20Showcase%20and%20Slider%20%E2%80%93%20Team%20Members%20Builder&amp;severity=null&amp;id=69cd7518e6bfc5ba1df02cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10676-improper-neutralization-of-input-du-df7f5c67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10676%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wojciechborowicz%20Conversion%20Helper&amp;severity=null&amp;id=69cd7413e6bfc5ba1def5123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51776-improper-neutralization-of-input-du-f588525f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51776%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sam%20Hotchkiss%20Daily%20Image&amp;severity=null&amp;id=69cd751be6bfc5ba1df02db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51778-improper-neutralization-of-input-du-857f6cb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51778%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tevya%20Satisfaction%20Reports%20from%20Help%20Scout&amp;severity=null&amp;id=69cd751be6bfc5ba1df02db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51779-improper-neutralization-of-input-du-613bafdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51779%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jason%20Coleman%20Don&apos;t%20Break%20The%20Code&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51780-improper-neutralization-of-input-du-c5ea061b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51780%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eewee%20eewee%20admin%20custom&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51781-improper-neutralization-of-input-du-c8b37433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51781%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Stefan%20Backor%20Firework%20Shoppable%20Live%20Video&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50524-improper-neutralization-of-special--6108e4e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50524%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Qu%C3%BD%20L%C3%AA%2091%20Administrator%20Z&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df02225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50539-improper-neutralization-of-special--44a8f412</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50539%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20lodgix%20Lodgix.com%20Vacation%20Rental%20Website%20Builder&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50544-improper-neutralization-of-special--eb2f5776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50544%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MicahBlu%20RSVP%20ME&amp;severity=null&amp;id=69cd7501e6bfc5ba1df0234d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51570-improper-neutralization-of-special--7f8190de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51570%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20odihost%20Easy%20Gallery&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51579-improper-neutralization-of-special--4092212d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51579%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saleswonder%20Team%3A%20Tobias%205%20Stars%20Rating%20Funnel&amp;severity=null&amp;id=69cd7504e6bfc5ba1df02442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51601-improper-neutralization-of-special--a57e5c97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51601%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Maksym%20Marko%20Website%20price%20calculator&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51602-improper-neutralization-of-special--ccc4375e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51602%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20oleksandr87%20Simple%20Job%20Manager&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51607-improper-neutralization-of-special--cd610bc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51607%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20percent20%20Golf%20Tracker&amp;severity=null&amp;id=69cd7508e6bfc5ba1df025f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51619-improper-neutralization-of-special--d8659d08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51619%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20market360%20Market%20360%20Viewer&amp;severity=null&amp;id=69cd750be6bfc5ba1df026b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51621-improper-neutralization-of-special--bd6adb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51621%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reza19%20Download-Mirror-Counter&amp;severity=null&amp;id=69cd750be6bfc5ba1df026b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51625-improper-neutralization-of-special--b9875aae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51625%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20edckwt%20Quran%20Shortcode&amp;severity=null&amp;id=69cd750be6bfc5ba1df026c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51782-improper-neutralization-of-input-du-caa68f11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51782%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sanjay%20Prasad%20Loginplus&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51783-improper-neutralization-of-input-du-5681084b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51783%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zaus%20Forms%3A%203rd-Party%20Post%20Again&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51784-improper-neutralization-of-input-du-b5ede46b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51784%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VietFriend%20team%20FriendStore%20for%20WooCommerce&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51786-improper-neutralization-of-input-du-f239ac21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51786%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestweblayout%20Realty%20by%20BestWebSoft&amp;severity=null&amp;id=69cd751be6bfc5ba1df02df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51787-improper-neutralization-of-input-du-b87e9e9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51787%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd751be6bfc5ba1df02e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51785-server-side-request-forgery-ssrf-in-790bb892</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51785%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nks%20Responsive%20Filterable%20Portfolio&amp;severity=null&amp;id=69cd751be6bfc5ba1df02dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10508-cwe-230-improper-handling-of-missin-a95a9480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10508%3A%20CWE-230%20Improper%20Handling%20of%20Missing%20Values%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20User%20Registration%20Plugin%20with%20Custom%20Registration%20Forms&amp;severity=critical&amp;id=699f6df4b7ef31ef0b5914d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10589-cwe-862-missing-authorization-in-no-04d4508c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10589%3A%20CWE-862%20Missing%20Authorization%20in%20nouthemes%20Leopard%20-%20WordPress%20Offload%20Media&amp;severity=critical&amp;id=699f6df6b7ef31ef0b591834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10801-cwe-434-unrestricted-upload-of-file-2a8f8c3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10801%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vanquish%20WordPress%20User%20Extra%20Fields&amp;severity=critical&amp;id=699f6dfeb7ef31ef0b592695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10547-cwe-434-unrestricted-upload-of-file-8ebde349</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10547%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20e-plugins%20WP%20Membership&amp;severity=critical&amp;id=699f6df6b7ef31ef0b591723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10871-cwe-98-improper-control-of-filename-32eeb403</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10871%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20trustyplugins%20Category%20Ajax%20Filter&amp;severity=critical&amp;id=699f6e01b7ef31ef0b593557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10688-cwe-639-authorization-bypass-throug-1a84c36b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10688%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20crestaproject%20Attesa%20Extra&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10876-cwe-79-improper-neutralization-of-i-9ae7a0d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=medium&amp;id=699f6e01b7ef31ef0b59363a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9874-cwe-89-improper-neutralization-of-sp-d5154346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9874%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10683-cwe-79-improper-neutralization-of-i-555affbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10683%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20scottpaterson%20Contact%20Form%207%20%E2%80%93%20PayPal%20%26%20Stripe%20Add-on&amp;severity=medium&amp;id=699f6dfab7ef31ef0b5922bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8756-cwe-200-exposure-of-sensitive-inform-a194565f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8756%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ThemeCatcher%20Quform%20-%20WordPress%20Form%20Builder&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10470-cwe-22-improper-limitation-of-a-pat-6e96ec93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10470%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20VibeThemes%20WPLMS%20Learning%20Management%20System%20for%20WordPress%2C%20WordPress%20LMS&amp;severity=critical&amp;id=699f6df4b7ef31ef0b5914c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10667-cwe-639-authorization-bypass-throug-a8f6480d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10667%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Content%20Slider%20Block&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10669-cwe-639-authorization-bypass-throug-c70c2afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10669%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bplugins%20Countdown%20Timer%20block%20%E2%80%93%20Display%20the%20event%26%23039%3Bs%20date%20into%20a%20timer.&amp;severity=medium&amp;id=699f6df9b7ef31ef0b591a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10814-cwe-918-server-side-request-forgery-fb913960</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10814%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dartiss%20Code%20Embed&amp;severity=medium&amp;id=699f6dfeb7ef31ef0b5926eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10770-cwe-639-authorization-bypass-throug-55f42ed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10770%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20envothemes%20Envo%20Extra&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10693-cwe-639-authorization-bypass-throug-1bd4c0f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10693%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20sonalsinha21%20SKT%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10627-cwe-434-unrestricted-upload-of-file-81bf4eab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10627%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=critical&amp;id=699f6df9b7ef31ef0b591954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10626-cwe-22-improper-limitation-of-a-pat-4c72428b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10626%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=high&amp;id=699f6df8b7ef31ef0b591924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10625-cwe-22-improper-limitation-of-a-pat-39032e1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10625%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20vanquish%20WooCommerce%20Support%20Ticket%20System&amp;severity=critical&amp;id=699f6df8b7ef31ef0b591920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10674-cwe-862-missing-authorization-in-th-4bdea102</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10674%3A%20CWE-862%20Missing%20Authorization%20in%20themehunk%20Th%20Shop%20Mania&amp;severity=high&amp;id=699f6df9b7ef31ef0b591aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9226-cwe-79-improper-neutralization-of-in-9fb8489f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Landing%20Page%20Cat%20%E2%80%93%20Coming%20Soon%20Page%2C%20Maintenance%20Page%20%26%20Squeeze%20Pages&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10673-cwe-862-missing-authorization-in-th-52ac1d35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10673%3A%20CWE-862%20Missing%20Authorization%20in%20themehunk%20Top%20Store&amp;severity=high&amp;id=699f6df9b7ef31ef0b591aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8960-cwe-79-improper-neutralization-of-in-bd1dfd2d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codelessthemes%20Cowidgets%20%E2%80%93%20Elementor%20Addons&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10779-cwe-639-authorization-bypass-throug-ae3e280d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10779%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20codelessthemes%20Cowidgets%20%E2%80%93%20Elementor%20Addons&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b592471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10294-cwe-862-missing-authorization-in-ce-cc245ac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10294%3A%20CWE-862%20Missing%20Authorization%20in%20ce21com%20CE21%20Suite&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9775-cwe-79-improper-neutralization-of-in-ecf7e281</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shtheme%20Anih%20-%20Creative%20Agency%20WordPress%20Theme&amp;severity=medium&amp;id=699f6b5fb7ef31ef0b554bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10285-cwe-200-exposure-of-sensitive-infor-2a62b592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10285%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=699f6df1b7ef31ef0b59119e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10586-cwe-862-missing-authorization-in-eu-d08142bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10586%3A%20CWE-862%20Missing%20Authorization%20in%20eugenbobrowski%20Debug%20Tool&amp;severity=critical&amp;id=699f6df6b7ef31ef0b591828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10284-cwe-288-authentication-bypass-using-142ebcd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10284%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20ce21com%20CE21%20Suite&amp;severity=critical&amp;id=699f6df1b7ef31ef0b59119a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10588-cwe-862-missing-authorization-in-eu-3cab06bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10588%3A%20CWE-862%20Missing%20Authorization%20in%20eugenbobrowski%20Debug%20Tool&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9262-cwe-639-authorization-bypass-through-37bea164</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9262%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20khaledsaikat%20User%20Meta%20%E2%80%93%20User%20Profile%20Builder%20and%20User%20management%20plugin&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9270-cwe-79-improper-neutralization-of-in-8852a7de</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9270%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ogunlab%20Lenxel%20Core%20for%20Lenxel(LNX)%20LMS&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52314-cwe-863-incorrect-authorization-in--799a8c3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52314%3A%20CWE-863%20Incorrect%20Authorization%20in%20amazon%20data.all&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52312-cwe-863-incorrect-authorization-in--4775c961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52312%3A%20CWE-863%20Incorrect%20Authorization%20in%20amazon%20data.all&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52313-cwe-863-incorrect-authorizationcape-fe0702d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52313%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20amazon%20data.all&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10953-cwe-863-incorrect-authorization-in--740e971a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10953%3A%20CWE-863%20Incorrect%20Authorization%20in%20amazon%20data.all&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52311-cwe-863-incorrect-authorization-in--d1e7a3ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52311%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20amazon%20data.all&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-09-f12641</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50592-cwe-367-time-of-check-time-of-use-t-bb3c01dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50592%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20HASOMED%20Elefant%20Software%20Updater&amp;severity=high&amp;id=69092eea35043901e82cab31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50593-cwe-798-use-of-hard-coded-credentia-ef2a74cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50593%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20HASOMED%20Elefant&amp;severity=high&amp;id=69092eea35043901e82cab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50591-cwe-77-improper-neutralization-of-s-4417be72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50591%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20HASOMED%20Elefant%20Software%20Updater&amp;severity=high&amp;id=69092eea35043901e82cab2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50590-cwe-276-incorrect-default-permissio-986ed0ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50590%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20HASOMED%20Elefant&amp;severity=high&amp;id=69092eea35043901e82cab27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50589-cwe-306-missing-authentication-for--ae746b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50589%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20HASOMED%20Elefant&amp;severity=high&amp;id=69092eea35043901e82cab22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10325-cwe-79-improper-neutralization-of-i-a9d6ae43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10325%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10187-cwe-79-improper-neutralization-of-i-f2fc9159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpexpertsio%20myCred%20%E2%80%93%20Loyalty%20Points%20and%20Rewards%20plugin%20for%20WordPress%20and%20WooCommerce%20%E2%80%93%20Give%20Points%2C%20Ranks%2C%20Badges%2C%20Cashback%2C%20WooCommerce%20rewards%2C%20and%20WooCommerce%20credits%20for%20Gamification&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50588-cwe-1393-use-of-default-password-in-081f1b57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50588%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20HASOMED%20Elefant&amp;severity=critical&amp;id=69092eea35043901e82cab1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10269-cwe-79-improper-neutralization-of-i-d56d337c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20benjamin_zekavica%20Easy%20SVG%20Support&amp;severity=medium&amp;id=699f6df1b7ef31ef0b591195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50211-vulnerability-in-linux-linux-bdf53d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50211%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50210-vulnerability-in-linux-linux-bdf52e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50210%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50209-vulnerability-in-linux-linux-bdf51d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50209%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf51d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50208-vulnerability-in-linux-linux-bdf515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50208%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50207-vulnerability-in-linux-linux-bdf50d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50207%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50206-vulnerability-in-linux-linux-bdcf7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50206%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50205-vulnerability-in-linux-linux-bdf505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50205%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50204-vulnerability-in-linux-linux-bdf4fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50204%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50203-vulnerability-in-linux-linux-bdcf79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50203%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50202-vulnerability-in-linux-linux-bdf4ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50202%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50201-vulnerability-in-linux-linux-bdf4d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50201%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50200-vulnerability-in-linux-linux-bdf4cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50200%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdf4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50199-vulnerability-in-linux-linux-bdf4c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50199%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdf4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50198-vulnerability-in-linux-linux-bdf4b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50198%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50197-vulnerability-in-linux-linux-bdf4a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50197%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50196-vulnerability-in-linux-linux-bdf49b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50196%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50195-vulnerability-in-linux-linux-bdf493</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50195%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50194-vulnerability-in-linux-linux-bdf48b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50194%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50193-vulnerability-in-linux-linux-bdcf6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50192-vulnerability-in-linux-linux-bdf483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50192%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50191-vulnerability-in-linux-linux-bdf47d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50190-vulnerability-in-linux-linux-bdf459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50190%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50189-vulnerability-in-linux-linux-bdf451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50189%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50188-vulnerability-in-linux-linux-bdf440</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50188%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50187-vulnerability-in-linux-linux-bdf438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50187%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50186-vulnerability-in-linux-linux-bdcf68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50186%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50185-vulnerability-in-linux-linux-bdf430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50185%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50184-vulnerability-in-linux-linux-bdf421</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50184%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50183-vulnerability-in-linux-linux-bdf419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50183%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50182-vulnerability-in-linux-linux-bdf40f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50182%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf40f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50180-vulnerability-in-linux-linux-bdf407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50180%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10621-cwe-80-improper-neutralization-of-s-e3e8ec27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10621%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20fullworks%20Simple%20Shortcode%20for%20Google%20Maps&amp;severity=medium&amp;id=699f6df8b7ef31ef0b591918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50179-vulnerability-in-linux-linux-bdf3ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50179%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9823c4522896dcbdf3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50178-vulnerability-in-linux-linux-bdf3dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50178%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50177-vulnerability-in-linux-linux-bdf3d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50177%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9823c4522896dcbdf3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50176-vulnerability-in-linux-linux-bdcf64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50176%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50175-vulnerability-in-linux-linux-be01ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50175%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe01ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50174-vulnerability-in-linux-linux-be01a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50174%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe01a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50173-vulnerability-in-linux-linux-be01a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50173%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe01a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21538-regular-expression-denial-of-service-redos-in-cross-spawn-aeb016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21538%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20cross-spawn&amp;severity=high&amp;id=682cd0f71484d88663aeb016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27532-na-f72db265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27532%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57cebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27529-na-fe487a19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27529%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57ceab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27528-na-4dc1501f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27528%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57ce9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27527-na-0675e001</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27527%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57ce91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25431-na-a8c54100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25431%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48073-na-3af9ab96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48073%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0ab7ef31ef0b56d6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47190-na-3a104d84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47190%3A%20n%2Fa&amp;severity=low&amp;id=699f6d06b7ef31ef0b56d50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46947-na-5041a494</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46947%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44765-na-de5e4640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44765%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce2b7ef31ef0b569e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40240-na-9dfc5a5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40240%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40239-na-deaf7c3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40239%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35427-na-74955e04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35427%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b563307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35424-na-ebbc9506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35424%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b563303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35423-na-57209898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35423%3A%20n%2Fa&amp;severity=high&amp;id=699f6c58b7ef31ef0b5632ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35421-na-2a628573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35421%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b5632fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35420-na-126f45c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35420%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b5632f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35419-na-d6beede5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35419%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b5632f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35418-na-6ed7b54c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35418%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b5632ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35410-na-dd22570c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35410%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b5632ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51211-na-2facc4aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51211%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bacb7ef31ef0b55894e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51157-na-5c9a9159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51157%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51152-na-e486e7ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51152%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51055-na-9d475191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51055%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b5579b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51032-na-1327c180</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51032%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b55794b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51031-na-7da97526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51031%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b557947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51030-na-4a68edcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51030%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b557943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50966-na-864f6cee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50966%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba4b7ef31ef0b557715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50811-na-387f8e97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50811%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b55748d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50810-na-513abf18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50810%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b55748a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50809-na-bb94a787</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50809%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9eb7ef31ef0b557487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50634-na-9b8886e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50634%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9cb7ef31ef0b5572aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-08-f12df2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47072-cwe-121-stack-based-buffer-overflow-9e78eaec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47072%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20x-stream%20xstream&amp;severity=high&amp;id=69092b7735043901e828cb4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10969-sql-injection-in-1000-projects-bookstore-management-system-aec788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10969%3A%20SQL%20Injection%20in%201000%20Projects%20Bookstore%20Management%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10963-improper-authentication-4f9fd4a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10963%3A%20Improper%20Authentication&amp;severity=high&amp;id=68e0f3bdb66c7f7acdd3cb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43440-f44a8d08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43440&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43438-892229fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43438&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43436-132dc8f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43436&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43434-fa088a3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43434&amp;severity=high&amp;id=699f6cd6b7ef31ef0b569752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43431-6a95ce7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43431&amp;severity=high&amp;id=699f6cd6b7ef31ef0b569746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43428-dd5e6350</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43428&amp;severity=high&amp;id=699f6cd6b7ef31ef0b56973a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43426-25ba659b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43426&amp;severity=high&amp;id=699f6cd6b7ef31ef0b569732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43425-2714a303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43425&amp;severity=high&amp;id=699f6cd6b7ef31ef0b5696de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8442-cwe-79-improper-neutralization-of-in-17711155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50172-vulnerability-in-linux-linux-be0186</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50172%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50171-vulnerability-in-linux-linux-be0182</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50171%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50170-vulnerability-in-linux-linux-be017e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50170%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe017e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50169-vulnerability-in-linux-linux-be017a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50169%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe017a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50168-vulnerability-in-linux-linux-be0176</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50168%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50167-vulnerability-in-linux-linux-be0172</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50167%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50166-vulnerability-in-linux-linux-be016e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50166%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50165-vulnerability-in-linux-linux-be0161</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50165%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50164-vulnerability-in-linux-linux-bdcf60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50164%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50163-vulnerability-in-linux-linux-be015d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe015d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50162-vulnerability-in-linux-linux-be014e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe014e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50161-vulnerability-in-linux-linux-be012d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe012d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50160-vulnerability-in-linux-linux-be0125</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50159-vulnerability-in-linux-linux-be011f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe011f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50158-vulnerability-in-linux-linux-be011b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe011b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50157-vulnerability-in-linux-linux-be0117</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50156-vulnerability-in-linux-linux-be0115</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50155-vulnerability-in-linux-linux-bdcf4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50154-vulnerability-in-linux-linux-bdcf49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50153-vulnerability-in-linux-linux-be0111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50152-vulnerability-in-linux-linux-be0104</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50151-vulnerability-in-linux-linux-be0100</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50150-vulnerability-in-linux-linux-be00f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe00f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50149-vulnerability-in-linux-linux-be00d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe00d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50148-vulnerability-in-linux-linux-be00cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe00cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50147-vulnerability-in-linux-linux-be00c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe00c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50146-vulnerability-in-linux-linux-be00c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe00c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50145-vulnerability-in-linux-linux-be00bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe00bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50144-vulnerability-in-linux-linux-be00b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe00b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50143-vulnerability-in-linux-linux-be00b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe00b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50142-vulnerability-in-linux-linux-be00a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe00a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50141-vulnerability-in-linux-linux-be00a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe00a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50140-vulnerability-in-linux-linux-be0094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50139-vulnerability-in-linux-linux-be0077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38286-cwe-770-allocation-of-resources-wit-a13f31aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38286%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=690204553aaa02566521b563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48290-na-bcc901c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48290%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d13b7ef31ef0b56dafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46961-na-dea8a7eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46961%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46960-na-a308a9e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46960%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36064-na-76268e28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36064%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5bb7ef31ef0b56348e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36063-na-293daeb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36063%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5bb7ef31ef0b56348b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51434-na-0b86b81e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51434%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51428-na-d6ccf2a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51428%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50766-na-b1ab6cc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50766%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b9eb7ef31ef0b557471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50599-na-75585ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50599%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9ab7ef31ef0b557214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48954-na-d61f028e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48954%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48953-na-991abf06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48953%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48952-na-093a2211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48952%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48951-na-8b075ba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48951%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48950-na-04955cd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48950%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gorilla-ddos-f8cea71d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Gorilla%20DDoS&amp;severity=low&amp;id=68493dbccacb3d99bea6dd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-07-f12110</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51754-cwe-668-exposure-of-resource-to-wro-2b6d0a79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51754%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20twigphp%20Twig&amp;severity=low&amp;id=6838254f182aa0cae2753d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/copyrhightadamantys-campaign-rhadamantys-exploits--a57192da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CopyRh(ight)adamantys%20Campaign%3A%20Rhadamantys%20Exploits%20Intellectual%20Property%20Infringement%20Baits&amp;severity=medium&amp;id=69393eea681246c13de6475c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6861-exposure-of-sensitive-information-to-ba163462</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6861%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=high&amp;id=68e7a931ba0e608b4f997e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10186-cwe-79-improper-neutralization-of-i-2ccd6ecd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bastho%20Event%20post&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8323-cwe-79-improper-neutralization-of-in-8cfe033e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Pricing%20Tables%20WordPress%20Plugin%20%E2%80%93%20Easy%20Pricing%20Tables&amp;severity=medium&amp;id=699f6c26b7ef31ef0b5607d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10168-cwe-79-improper-neutralization-of-i-baae2edf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10168%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Use%20constructor%20to%20create%20tables&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10715-cwe-79-improper-neutralization-of-i-16a5f5ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chrisvrichardson%20MapPress%20Maps%20for%20WordPress&amp;severity=medium&amp;id=699f6dfcb7ef31ef0b5923bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9902-incorrect-authorization-39493e0c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9902%3A%20Incorrect%20Authorization&amp;severity=medium&amp;id=6909325c35043901e83099e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8615-cwe-434-unrestricted-upload-of-file--4c6782fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8615%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20https%3A%2F%2Fcodecanyon.net%2Fitem%2Fjobsearch-wp-job-board-wordpress-plugin%2F21066856%20JobSearch%20WP%20Job%20Board&amp;severity=critical&amp;id=699f6c2cb7ef31ef0b560ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8614-cwe-434-unrestricted-upload-of-file--97e05cc0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8614%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20https%3A%2F%2Fcodecanyon.net%2Fitem%2Fjobsearch-wp-job-board-wordpress-plugin%2F21066856%20JobSearch%20WP%20Job%20Board&amp;severity=critical&amp;id=699f6c2cb7ef31ef0b560ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6626-cwe-862-missing-authorization-in-csc-1e713bcb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6626%3A%20CWE-862%20Missing%20Authorization%20in%20cscode%20EleForms%20%E2%80%93%20All%20In%20One%20Form%20Integration%20including%20DB%20for%20Elementor&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9946-cwe-287-improper-authentication-in-t-064b27ac</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9946%3A%20CWE-287%20Improper%20Authentication%20in%20the_champ%20Social%20Share%2C%20Social%20Login%20and%20Social%20Comments%20Plugin%20%E2%80%93%20Super%20Socializer&amp;severity=high&amp;id=699f6b65b7ef31ef0b554fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10543-cwe-862-missing-authorization-in-tu-02a15d38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10543%3A%20CWE-862%20Missing%20Authorization%20in%20tumultinc%20Tumult%20Hype%20Animations&amp;severity=medium&amp;id=699f6df6b7ef31ef0b5916a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10020-cwe-287-improper-authentication-in--b1d8cf10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10020%3A%20CWE-287%20Improper%20Authentication%20in%20heateor%20Heateor%20Social%20Login%20WordPress&amp;severity=high&amp;id=699f6debb7ef31ef0b590b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10535-cwe-862-missing-authorization-in-ma-cff5df78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10535%3A%20CWE-862%20Missing%20Authorization%20in%20martinvalchev%20Video%20Gallery%20for%20WooCommerce&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9307-cwe-434-unrestricted-upload-of-file--52c6f942</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9307%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themelooks%20mFolio%20Lite&amp;severity=critical&amp;id=699f6b49b7ef31ef0b550e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10647-cwe-79-improper-neutralization-of-i-439397f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20westguard%20WS%20Form%20LITE%20%E2%80%93%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6df9b7ef31ef0b5919cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48325-na-ea63815b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48325%3A%20n%2Fa&amp;severity=high&amp;id=699f6d14b7ef31ef0b56db6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51409-na-6c76c372</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51409%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50637-na-e94cabf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50637%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9cb7ef31ef0b5572b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-06-e740d92e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-06&amp;severity=medium&amp;id=68367c97182aa0cae231ad81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-06-f28aaf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-06&amp;severity=medium&amp;id=682acdc5bbaf20d303f28aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-06-f11ffd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10028-cwe-922-insecure-storage-of-sensiti-6de33aa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10028%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20everestthemes%20Everest%20Backup%20%E2%80%93%20WordPress%20Cloud%20Backup%2C%20Migration%2C%20Restore%20%26%20Cloning%20Plugin&amp;severity=high&amp;id=699f6debb7ef31ef0b590b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10084-cwe-200-exposure-of-sensitive-infor-25b37dcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10084%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sevenspark%20Contact%20Form%207%20%E2%80%93%20Dynamic%20Text%20Extension&amp;severity=medium&amp;id=699f6decb7ef31ef0b590be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50138-vulnerability-in-linux-linux-be006f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe006f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50137-vulnerability-in-linux-linux-be0067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50136-vulnerability-in-linux-linux-bdcf45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50135-vulnerability-in-linux-linux-be0061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50134-vulnerability-in-linux-linux-be005d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe005d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50133-vulnerability-in-linux-linux-be0059</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50132-vulnerability-in-linux-linux-be004c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe004c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50131-vulnerability-in-linux-linux-be003b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe003b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50130-vulnerability-in-linux-linux-be0033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50129-vulnerability-in-linux-linux-be0029</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50128-vulnerability-in-linux-linux-be000e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe000e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50127-vulnerability-in-linux-linux-be000a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe000a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50126-vulnerability-in-linux-linux-be0006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50125-vulnerability-in-linux-linux-bdcf41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50124-vulnerability-in-linux-linux-be0002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50123-vulnerability-in-linux-linux-bdfffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdfffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50122-vulnerability-in-linux-linux-bdfffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdfffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50121-vulnerability-in-linux-linux-bdffef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdffef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50120-vulnerability-in-linux-linux-bdcf3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50119-vulnerability-in-linux-linux-bdffde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdffde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50118-vulnerability-in-linux-linux-bdffd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdffd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50117-vulnerability-in-linux-linux-bdffce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdffce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50116-vulnerability-in-linux-linux-bdffb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdffb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50115-vulnerability-in-linux-linux-bdffad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdffad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50114-vulnerability-in-linux-linux-bdffa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50113-vulnerability-in-linux-linux-bdffa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdffa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50112-vulnerability-in-linux-linux-bdff98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50111-vulnerability-in-linux-linux-bdff90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50110-vulnerability-in-linux-linux-bdff8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50109-vulnerability-in-linux-linux-bdff88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50108-vulnerability-in-linux-linux-aec075</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50107-vulnerability-in-linux-linux-bdff79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50106-vulnerability-in-linux-linux-bdff71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdff71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50105-vulnerability-in-linux-linux-bdff52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50104-vulnerability-in-linux-linux-bdff50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50103-vulnerability-in-linux-linux-bdff4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50102-vulnerability-in-linux-linux-bdff48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50101-vulnerability-in-linux-linux-bdff3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50100-vulnerability-in-linux-linux-bdff33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50099-vulnerability-in-linux-linux-bdff2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50098-vulnerability-in-linux-linux-bdff2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50097-vulnerability-in-linux-linux-bdcf37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50096-vulnerability-in-linux-linux-bdff1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbdff1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50095-vulnerability-in-linux-linux-bdff14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbdff14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50094-vulnerability-in-linux-linux-bdfef7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50093-vulnerability-in-linux-linux-bdfef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50092-vulnerability-in-linux-linux-bdfeef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9824c4522896dcbdfeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50091-vulnerability-in-linux-linux-bdfeeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfeeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50090-vulnerability-in-linux-linux-bdfede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10329-cwe-200-exposure-of-sensitive-infor-0981d8de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10329%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20g5theme%20Ultimate%20Bootstrap%20Elements%20for%20Elementor&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10263-cwe-94-improper-control-of-generati-f6fb1f8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10263%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tickera%20Tickera%20%E2%80%93%20WordPress%20Event%20Ticketing&amp;severity=high&amp;id=699f6df1b7ef31ef0b591182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9867-cwe-79-improper-neutralization-of-in-8d6354bc</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9657-cwe-79-improper-neutralization-of-in-d5821c49</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55312a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9178-cwe-79-improper-neutralization-of-in-7622a666</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9178%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xplodedthemes%20XT%20Floating%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10319-cwe-200-exposure-of-sensitive-infor-8268f77f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10319%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xpro%20140%2B%20Widgets%20%7C%20Xpro%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52920-vulnerability-in-linux-linux-be7911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10687-cwe-89-improper-neutralization-of-s-b21fe0e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10687%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contest-gallery%20Photos%2C%20Files%2C%20YouTube%2C%20Twitter%2C%20Instagram%2C%20TikTok%2C%20Ecommerce%20Contest%20Gallery%20%E2%80%93%20Upload%2C%20Vote%2C%20Sell%20via%20PayPal%2C%20Social%20Share%20Buttons&amp;severity=critical&amp;id=699f6dfab7ef31ef0b5922ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9878-cwe-79-improper-neutralization-of-in-4097b1da</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7429-cwe-284-improper-access-control-in-k-079dfd1e</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7429%3A%20CWE-284%20Improper%20Access%20Control%20in%20kseaborn%20Zotpress&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47255-cwe-354-improper-validation-of-inte-df2ce632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47255%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%202N%202N%20Access%20Commander&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47254-cwe-807-reliance-on-untrusted-input-09e0eafd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47254%3A%20CWE-807%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%202N%202N%20Access%20Commander&amp;severity=medium&amp;id=696109bd7a8fb5c58f6e7c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47253-cwe-22-improper-limitation-of-a-pat-e8eec60e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47253%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%202N%202N%20Access%20Commander&amp;severity=high&amp;id=696109bd7a8fb5c58f6e7c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9667-cwe-79-improper-neutralization-of-in-b0eb49a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20podcastmotor%20Seriously%20Simple%20Podcasting&amp;severity=medium&amp;id=699f6b59b7ef31ef0b554796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10711-cwe-352-cross-site-request-forgery--8bcd037f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10711%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ithemelandco%20WooCommerce%20Report&amp;severity=high&amp;id=699f6dfcb7ef31ef0b5923b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10114-cwe-287-improper-authentication-in--b665ea13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10114%3A%20CWE-287%20Improper%20Authentication%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=high&amp;id=699f6decb7ef31ef0b590cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9443-cwe-79-improper-neutralization-of-in-64a24585</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9443%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20basticom%20Basticom%20Framework&amp;severity=medium&amp;id=699f6b4db7ef31ef0b551300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10097-cwe-287-improper-authentication-in--342fe07e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10097%3A%20CWE-287%20Improper%20Authentication%20in%20Softaculous%20Loginizer%20Security&amp;severity=high&amp;id=699f6decb7ef31ef0b590bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10340-cwe-79-improper-neutralization-of-i-ddc1aa82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmorillas1%20Shortcodes%20Blocks%20Creator%20Ultimate&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48312-na-25a42641</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48312%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48176-na-bf9af9e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48176%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52030-na-46d359ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52030%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52029-na-9689fd71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52029%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52028-na-4e4375d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52028%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52026-na-84736e96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52026%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52025-na-2179fbf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52025%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52024-na-9845b298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52024%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52023-na-5f6d1363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52023%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb6b7ef31ef0b55a49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52022-na-18bb2f85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52022%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb5b7ef31ef0b55a444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52021-na-520d0ce8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52021%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb5b7ef31ef0b55a440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52020-na-3f3e5096</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52020%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb5b7ef31ef0b55a43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52019-na-4f92bf72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52019%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb5b7ef31ef0b55a438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52018-na-1c533ab8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52018%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb5b7ef31ef0b55a434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52017-na-501ee129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52017%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb5b7ef31ef0b55a430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52016-na-95731f15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52016%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb5b7ef31ef0b55a42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52015-na-069c86d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52015%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb5b7ef31ef0b55a428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52014-na-7a1c4f68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52014%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb5b7ef31ef0b55a424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-52013-na-de1be2fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-52013%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb5b7ef31ef0b55a420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51382-na-c166a31f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51382%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51381-na-f99ad1e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51381%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51380-na-aebcd82d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51380%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51379-na-8127404f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51379%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51362-na-658e8a90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51362%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb1b7ef31ef0b55a1d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51358-na-55e32423</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51358%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb1b7ef31ef0b55a1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51240-na-0f42d49a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51240%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b55895f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51132-na-97cf8745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51132%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baab7ef31ef0b557abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51116-na-c30dfb76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51116%3A%20n%2Fa&amp;severity=high&amp;id=699f6baab7ef31ef0b557a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51115-na-7020820d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51115%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baab7ef31ef0b557a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51024-na-b0d27f83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51024%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba8b7ef31ef0b557938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51023-na-368d0099</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51023%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba8b7ef31ef0b557934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51022-na-27f5f428</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51022%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba8b7ef31ef0b557930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51021-na-470b0c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51021%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba6b7ef31ef0b5578ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51020-na-05961c27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51020%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51019-na-67afbf71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51019%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51018-na-256b8cb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51018%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51017-na-e4cb3a4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51017%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51016-na-890ab08b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51016%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51015-na-4116354a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51015%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51014-na-5e9b4176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51014%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51013-na-b5f44002</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51013%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51012-na-92d1fb66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51012%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b5578a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51011-na-062cdbf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51011%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b557850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51010-na-69a24313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51010%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba6b7ef31ef0b55784c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51009-na-9a43609e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51009%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba6b7ef31ef0b557848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51008-na-9aebea15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51008%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba6b7ef31ef0b557844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51007-na-c56f0bcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51007%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b557840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51006-na-fff90146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51006%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b55783c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51005-na-2128fec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51005%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba6b7ef31ef0b557838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51004-na-e6ed24ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51004%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b557834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51003-na-5a2f773c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51003%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b557830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51002-na-5849e721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51002%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba6b7ef31ef0b55782c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51001-na-91357af3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51001%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b5577b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51000-na-c9c0c7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51000%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b5577ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50999-na-79863c4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50999%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b5577a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50998-na-9dbad37a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50998%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b5577a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50997-na-484a4956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b55779f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50996-na-ffd9d85a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50996%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b55779b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50995-na-c4f19db0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50995%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50994-na-8bc4f2cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50994%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ba4b7ef31ef0b557793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50993-na-a27391b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50993%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba4b7ef31ef0b55778f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48746-na-a5ea3d28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48746%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b78b7ef31ef0b555b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-05-f12fbb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-05&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51677-improper-neutralization-of-input-du-d073711b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51677%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ajay%20Knowledge%20Base&amp;severity=null&amp;id=69cd7512e6bfc5ba1df029a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51678-improper-neutralization-of-input-du-28d97a1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51678%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marcel%20Pol%20Elo%20Rating%20Shortcode&amp;severity=null&amp;id=69cd7512e6bfc5ba1df029a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51680-improper-neutralization-of-input-du-42eef7c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51680%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CrestaProject%20Cresta%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7512e6bfc5ba1df029ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51681-improper-neutralization-of-input-du-b3258fb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51681%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeRevolution%20WP%20Pocket%20URLs&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51682-improper-neutralization-of-input-du-4fa15686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51682%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HasThemes%20HT%20Builder%20%E2%80%93%20WordPress%20Theme%20Builder%20for%20Elementor&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51683-improper-neutralization-of-input-du-b7320cb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51683%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Custom%20post%20type%20templates%20for%20Elementor&amp;severity=null&amp;id=69cd7514e6bfc5ba1df02b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51626-improper-neutralization-of-special--f202de38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51626%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chenyenming%20Woocommerce%20Quote%20Calculator&amp;severity=null&amp;id=69cd750be6bfc5ba1df026c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51672-improper-neutralization-of-special--81e5ddac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51672%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPDeveloper%20BetterLinks&amp;severity=null&amp;id=69cd7512e6bfc5ba1df02993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50528-exposure-of-sensitive-system-inform-9d5c424d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50528%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Stacks%20Stacks%20Mobile%20App%20Builder&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df0222b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50523-unrestricted-upload-of-file-with-da-ac332b18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50523%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20RainbowLink%20Inc.%20All%20Post%20Contact%20Form&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df02222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50526-cwe-434-unrestricted-upload-of-file-0b09f2df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50526%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Lindeni%20Mahlalela%20Multi%20Purpose%20Mail%20Form&amp;severity=null&amp;id=697395744623b1157c4bc72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50527-unrestricted-upload-of-file-with-da-1c37bef5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50527%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Stacks%20Stacks%20Mobile%20App%20Builder&amp;severity=null&amp;id=69cd74ffe6bfc5ba1df02228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50529-unrestricted-upload-of-file-with-da-e3ee3860</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50529%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rudrainn%20Training%20%E2%80%93%20Courses&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50530-unrestricted-upload-of-file-with-da-0a25439d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50530%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Myriad%20Solutionz%20Stars%20SMTP%20Mailer&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50531-unrestricted-upload-of-file-with-da-8f63e1fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50531%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20davidfcarr%20RSVPMaker%20for%20Toastmasters&amp;severity=null&amp;id=69cd7501e6bfc5ba1df022e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51582-path-traversal-in-thimpress-wp-hote-e1176607</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51582%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20ThimPress%20WP%20Hotel%20Booking&amp;severity=null&amp;id=69cd7504e6bfc5ba1df0244b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51665-server-side-request-forgery-ssrf-in-1ff62a7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51665%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Noor%20Alam%20Magical%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd7510e6bfc5ba1df028ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10035-cwe-94-improper-control-of-generati-85a7146d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10035%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20BG-TEK%20Informatics%20Security%20Technologies%20CoslatV3&amp;severity=critical&amp;id=68ee4920509368ccaa72489b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51661-improper-neutralization-of-special--fe3e7ceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51661%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20David%20Lingren%20Media%20LIbrary%20Assistant&amp;severity=null&amp;id=69cd7510e6bfc5ba1df028f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30619-na-71fd2eee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30619%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc4b7ef31ef0b58de70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30618-na-bb12bd9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30618%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc4b7ef31ef0b58de6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30617-na-8a0cefdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30617%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc4b7ef31ef0b58de27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30616-na-30e141eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30616%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58ddbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48342-81b17cfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48342&amp;severity=null&amp;id=699f6d14b7ef31ef0b56db76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48336-na-28d4fb49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48336%3A%20n%2Fa&amp;severity=high&amp;id=699f6d14b7ef31ef0b56db72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48061-na-050e8c18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48061%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0ab7ef31ef0b56d6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48059-na-dc7877fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48059%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0ab7ef31ef0b56d6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48057-na-82fb0686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48057%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0ab7ef31ef0b56d6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48052-na-1a7f230f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48052%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d09b7ef31ef0b56d657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48050-na-8390de9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48050%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d09b7ef31ef0b56d653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45893-na-8419c3f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45893%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45891-na-75ce543f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45891%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45890-na-d66b2026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45890%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45889-na-416425f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45889%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45888-na-9c78be22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45888%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45887-na-bd3e0b24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45887%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45885-na-612b0550</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45885%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45884-na-9df0abb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45884%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45882-na-4944f7a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45882%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45185-na-46b65431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45185%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45164-na-b48c6764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45164%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce8b7ef31ef0b56a103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34891-na-5b53cd99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34891%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c55b7ef31ef0b563129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34887-na-9dc20954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34887%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c54b7ef31ef0b5630a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34885-na-bb22218f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34885%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c54b7ef31ef0b5630a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34883-na-7f914396</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34883%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c54b7ef31ef0b5630a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34882-na-01b21404</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34882%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c54b7ef31ef0b56309d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51408-na-001a1c23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51408%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51329-na-edf9b301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51329%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51328-na-6ea11236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51328%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb1b7ef31ef0b55a1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51327-na-9d10c1b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51327%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb1b7ef31ef0b55a1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51326-na-41af831a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51326%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51253-na-7533b01b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51253%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558ab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51251-na-47ab53ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51251%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51249-na-7b3d65ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51249%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51246-na-f2de3cd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51246%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51136-na-6469222d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51136%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baab7ef31ef0b557ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51127-na-71005f90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51127%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baab7ef31ef0b557ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48809-na-7cfdfe92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48809%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48463-na-58ddd357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48463%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b55580a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-04-f11f5c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-03-f1201e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1201e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9896-cwe-79-improper-neutralization-of-in-1bcb2756</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spiderdevs%20BBP%20Core%20%E2%80%93%20Expand%20bbPress%20powered%20forums%20with%20useful%20features&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9868-cwe-79-improper-neutralization-of-in-74f49880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8739-cwe-79-improper-neutralization-of-in-5a3ad6ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20ReCaptcha%20Integration%20for%20WordPress&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10540-cwe-89-improper-neutralization-of-s-a3d4ced2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10540%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20Appointment%20Booking%20Calendar%20Plugin%20and%20Scheduling%20Plugin%20%E2%80%93%20BookingPress&amp;severity=medium&amp;id=699f6df6b7ef31ef0b591690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10310-cwe-79-improper-neutralization-of-i-d1388a97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10310%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51774-na-b0bbe1bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51774%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-02-7cb8caa2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-02&amp;severity=medium&amp;id=68359c995d5f0974d01dfa4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-02-f1411d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f1411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-02-f12e2a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-02-6e2d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-02&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e2d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44233-parsing-a-maliciously-crafted-video-e4bd7db0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44233%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ee6bfc5ba1df6ed07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44232-parsing-a-maliciously-crafted-video-663e8254</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44232%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ee6bfc5ba1df6ecfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44234-parsing-a-maliciously-crafted-video-0d75fd2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44234%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ee6bfc5ba1df6ed11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49256-incorrect-authorization-in-wp-chill-59e215d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49256%3A%20Incorrect%20Authorization%20in%20WP%20Chill%20Htaccess%20File%20Editor&amp;severity=null&amp;id=69cd74bae6bfc5ba1def898d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48045-missing-authorization-in-happymonst-cc4e384b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48045%3A%20Missing%20Authorization%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48044-missing-authorization-in-shortpixel-0d337d3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48044%3A%20Missing%20Authorization%20in%20ShortPixel%20ShortPixel%20Image%20Optimizer&amp;severity=null&amp;id=69cd74ace6bfc5ba1def864d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48039-missing-authorization-in-imran-tauq-1e5b87e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48039%3A%20Missing%20Authorization%20in%20Imran%20Tauqeer%20CubeWP&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47314-missing-authorization-in-sunshineph-55d217ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47314%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47311-missing-authorization-in-kraft-plug-19259fa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47311%3A%20Missing%20Authorization%20in%20Kraft%20Plugins%20Wheel%20of%20Life&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47302-missing-authorization-in-shahjahan--2a95f74b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47302%3A%20Missing%20Authorization%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44038-missing-authorization-in-sunshineph-ec333aca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44038%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37255-missing-authorization-in-roxnor-ele-7317df82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37255%3A%20Missing%20Authorization%20in%20Roxnor%20ElementsKit%20Elementor%20addons%20Lite&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37440-missing-authorization-in-andymoyle--a5936a8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37440%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37444-missing-authorization-in-wpmu-dev-y-c568e271</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37444%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Defender%20Security&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37481-missing-authorization-in-radiusthem-4199f0b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37481%3A%20Missing%20Authorization%20in%20RadiusTheme%20The%20Post%20Grid&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37482-missing-authorization-in-radiusthem-c3f3a34e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37482%3A%20Missing%20Authorization%20in%20RadiusTheme%20The%20Post%20Grid&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37483-missing-authorization-in-radiusthem-c097abcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37483%3A%20Missing%20Authorization%20in%20RadiusTheme%20The%20Post%20Grid&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38714-missing-authorization-in-epsiloncoo-2dff5bb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38714%3A%20Missing%20Authorization%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38771-missing-authorization-in-vito-peleg-63f1fe97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38771%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39654-missing-authorization-in-fetch-desi-63d485c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39654%3A%20Missing%20Authorization%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=null&amp;id=69cd7469e6bfc5ba1def717e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43118-missing-authorization-in-wpmu-dev-y-a1a9cad9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43118%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Hummingbird&amp;severity=null&amp;id=69cd7469e6bfc5ba1def7187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43136-missing-authorization-in-sunshineph-7e0daf01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43136%3A%20Missing%20Authorization%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd7469e6bfc5ba1def718a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43158-missing-authorization-in-masteriyo--019b841c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43158%3A%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=69cd7469e6bfc5ba1def7190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43159-missing-authorization-in-masteriyo--6649c619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43159%3A%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=69cd7469e6bfc5ba1def7193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43208-missing-authorization-in-matt-mille-cb0da711</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43208%3A%20Missing%20Authorization%20in%20Matt%20Miller%20Send%20Emails%20with%20Mandrill&amp;severity=null&amp;id=69cd7469e6bfc5ba1def7196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43229-missing-authorization-in-cornel-rai-6225bc80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43229%3A%20Missing%20Authorization%20in%20Cornel%20Raiu%20WP%20Search%20Analytics&amp;severity=null&amp;id=69cd746be6bfc5ba1def71e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43253-missing-authorization-in-zaytech-sm-f095ab3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43253%3A%20Missing%20Authorization%20in%20ZAYTECH%20Smart%20Online%20Order%20for%20Clover&amp;severity=null&amp;id=69cd746de6bfc5ba1def77ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43254-missing-authorization-in-zaytech-sm-94b5794e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43254%3A%20Missing%20Authorization%20in%20ZAYTECH%20Smart%20Online%20Order%20for%20Clover&amp;severity=null&amp;id=69cd746de6bfc5ba1def7802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43290-missing-authorization-in-vito-peleg-a932a05c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43290%3A%20Missing%20Authorization%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd746fe6bfc5ba1def788c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43932-missing-authorization-in-posimyth-t-f1b04f12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43932%3A%20Missing%20Authorization%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43973-missing-authorization-in-stiofan-ge-1a18a00c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43973%3A%20Missing%20Authorization%20in%20Stiofan%20GetPaid&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44006-missing-authorization-in-amir-helze-68528bd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44006%3A%20Missing%20Authorization%20in%20Amir%20Helzer%20WooCommerce%20Multilingual%20%26%20Multicurrency&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44019-missing-authorization-in-renzo-john-e7d06a38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44019%3A%20Missing%20Authorization%20in%20Renzo%20Johnson%20Contact%20Form%207%20Campaign%20Monitor%20Extension&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44020-missing-authorization-in-prasadkirp-acba8346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44020%3A%20Missing%20Authorization%20in%20prasadkirpekar%20WP%20Free%20SSL%20%E2%80%93%20Free%20SSL%20Certificate%20for%20WordPress%20and%20force%20HTTPS&amp;severity=null&amp;id=69cd747be6bfc5ba1def7adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44021-missing-authorization-in-truepushpl-ab3a3c48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44021%3A%20Missing%20Authorization%20in%20truepushplugin%20Truepush&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44031-missing-authorization-in-beardev-jo-3eac3ee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44031%3A%20Missing%20Authorization%20in%20beardev%20JoomSport&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47308-missing-authorization-in-wpdevelope-f561e1ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47308%3A%20Missing%20Authorization%20in%20WPDeveloper%20Templately&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47318-missing-authorization-in-magazine3--a9067cfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47318%3A%20Missing%20Authorization%20in%20Magazine3%20PWA%20for%20WP%20%26%20AMP&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47321-missing-authorization-in-fahad-mahm-903ef372</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47321%3A%20Missing%20Authorization%20in%20Fahad%20Mahmood%20WP%20Datepicker&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47358-missing-authorization-in-daniel-ise-a2fbff00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47358%3A%20Missing%20Authorization%20in%20Daniel%20Iser%20Popup%20Maker&amp;severity=null&amp;id=69cd7498e6bfc5ba1def8174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47359-cross-site-request-forgery-csrf-in--07d055c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47359%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20averta%20Depicter%20Slider&amp;severity=null&amp;id=69cd7498e6bfc5ba1def8177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47361-missing-authorization-in-wpvibes-el-0bb1a32d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47361%3A%20Missing%20Authorization%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=null&amp;id=69cd7498e6bfc5ba1def817d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47362-missing-authorization-in-wp-chill-s-661a66f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47362%3A%20Missing%20Authorization%20in%20WP%20Chill%20Strong%20Testimonials&amp;severity=null&amp;id=69cd7498e6bfc5ba1def8180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10367-cwe-79-improper-neutralization-of-i-3c8cc16d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6df3b7ef31ef0b59140f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10232-cwe-79-improper-neutralization-of-i-483e2cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10232%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20atomchat%20Group%20Chat%20%26%20Video%20Chat%20by%20AtomChat&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9655-cwe-79-improper-neutralization-of-in-97b4a0de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55311f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7424-cwe-284-improper-access-control-in-t-3aa6735a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7424%3A%20CWE-284%20Improper%20Access%20Control%20in%20themeisle%20Multiple%20Page%20Generator%20Plugin%20%E2%80%93%20MPG&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47939-stack-based-buffer-overflow-in-ricoh-company-ltd-multiple-laser-printers-and-mfps-which-implement-web-image-monitor-59d375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47939%3A%20Stack-based%20buffer%20overflow%20in%20Ricoh%20Company%2C%20Ltd.%20Multiple%20laser%20printers%20and%20MFPs%20which%20implement%20Web%20Image%20Monitor&amp;severity=high&amp;id=682d8121c631aa761259d375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28265-na-af23e76d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28265%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8ab7ef31ef0b58810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27525-na-3e9722b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27525%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7fb7ef31ef0b57ce85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27524-na-048fda50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27524%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57ce78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22733-na-ff7e0020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22733%3A%20n%2Fa&amp;severity=low&amp;id=699f6d4db7ef31ef0b570215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48289-na-8b5b56b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48289%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d13b7ef31ef0b56dafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48270-na-81970f36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48270%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56da4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48217-na-5ef46e64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48217%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0fb7ef31ef0b56d8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40490-na-e7543e08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40490%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51432-na-f9fa62bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51432%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51431-na-ce78de47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51431%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51407-na-88b59a28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51407%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51406-na-d2a68b8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51406%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb1b7ef31ef0b55a25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51399-na-aa573461</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51399%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb1b7ef31ef0b55a25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51398-na-3b89b700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51398%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb1b7ef31ef0b55a256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51377-na-70f17929</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51377%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb1b7ef31ef0b55a246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51252-na-1c048cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51252%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51248-na-1170395f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51248%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51247-na-89acf0c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51247%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51245-na-81f7a224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51245%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51244-na-c8237ec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51244%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48410-na-082704bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48410%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b55571e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48352-na-a7fbb9d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48352%3A%20n%2Fa&amp;severity=high&amp;id=699f6b70b7ef31ef0b55570c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-11-01-167a22</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-11-01&amp;severity=medium&amp;id=682b69a652745a861d167a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-11-01-f12190</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-11-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6479-cwe-89-improper-neutralization-of-sp-3f245f30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6479%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shopitpress%20SIP%20Reviews%20Shortcode%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55eff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6480-cwe-89-improper-neutralization-of-sp-142419dc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6480%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shopitpress%20SIP%20Reviews%20Shortcode%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55eff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10573-out-of-bounds-write-182bff69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10573%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8553-exposure-of-sensitive-information-to-9a9dc080</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8553%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=691362a4f922b639ab5baf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48910-cwe-1321-improperly-controlled-modi-3330a8bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48910%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20cure53%20DOMPurify&amp;severity=critical&amp;id=6909214ffe7723195e054692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43933-improper-neutralization-of-input-du-7ed3f77a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43933%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amauri%20WPMobile.App&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49674-cross-site-request-forgery-csrf-in--679372ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49674%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20lukashuser%20EKC%20Tournament%20Manager&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49685-cross-site-request-forgery-csrf-in--858a3f32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49685%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Custom%20Twitter%20Feeds%20(Tweets%20Widget)&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df0198b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9434-cwe-352-cross-site-request-forgery-c-e4dca0b5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9434%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alexgff%20WPGlobus%20Translate%20Options&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9446-cwe-79-improper-neutralization-of-in-9f2a03eb</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kilukrumedia%20WP%20Simple%20Anchors%20Links&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9430-cwe-306-missing-authentication-for-c-99def283</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9430%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20wpcloudtechnologies%20Get%20Quote%20For%20Woocommerce%20%E2%80%93%20Request%20A%20Quote%20For%20Woocommerce&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9165-cwe-79-improper-neutralization-of-in-e99381dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9165%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codemenschen%20Gift%20Cards%20(Gift%20Vouchers%20and%20Packages)%20(WooCommerce%20Supported)&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9700-cwe-639-authorization-bypass-through-37c0a9c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9700%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10392-cwe-434-unrestricted-upload-of-file-368916de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10392%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20senols%20AI%20Power%3A%20Complete%20AI%20Pack&amp;severity=critical&amp;id=699f6df3b7ef31ef0b591425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9708-cwe-79-improper-neutralization-of-in-5a27dfe6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdelower%20Easy%20SVG%20Upload&amp;severity=medium&amp;id=699f6b5bb7ef31ef0b554971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10544-cwe-532-insertion-of-sensitive-info-2cddd4a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10544%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20prasidhda%20Woo%20Manage%20Fraud%20Orders&amp;severity=medium&amp;id=699f6df6b7ef31ef0b5916af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48311-na-71e1b446</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48311%3A%20n%2Fa&amp;severity=high&amp;id=699f6d13b7ef31ef0b56db15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48307-na-3ee3adde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48307%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d13b7ef31ef0b56db10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48200-na-c57231d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48200%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0db7ef31ef0b56d83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42835-na-a958313b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42835%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b5693f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42515-na-7022a4e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42515%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc1b7ef31ef0b568d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39722-na-4c8d1d63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39722%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39721-na-03578352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39721%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39720-na-778b8815</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39720%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39719-na-06a9921b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39719%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39332-na-2461f05e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39332%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c86b7ef31ef0b565ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51430-na-c03e336d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51430%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51260-na-e8e120f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51260%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baeb7ef31ef0b558b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51259-na-fafec2d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51259%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baeb7ef31ef0b558b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51255-na-5d6048bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51255%3A%20n%2Fa&amp;severity=critical&amp;id=699f6baeb7ef31ef0b558afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51254-na-0a44a4cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51254%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51066-na-2c80a5e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51066%3A%20n%2Fa&amp;severity=high&amp;id=699f6ba8b7ef31ef0b5579c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51065-na-765d2d97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51065%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba8b7ef31ef0b5579c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51064-na-9406b428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51064%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba8b7ef31ef0b5579bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51063-na-adde47ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51063%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba8b7ef31ef0b5579b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51060-na-a4429bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51060%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ba8b7ef31ef0b5579b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50802-na-986e8a15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50802%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b55747b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50801-na-b06038de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50801%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9eb7ef31ef0b557477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-31-ea6b0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-31&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea6b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-31-f12b06</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50419-incorrect-authorization-in-wpsoul-g-fcb9347c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50419%3A%20Incorrect%20Authorization%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31151-cwe-798-use-of-hard-coded-credentia-f25664d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31151%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20LevelOne%20WBR-6012&amp;severity=high&amp;id=69092623fe7723195e0b472f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28875-cwe-798-use-of-hard-coded-credentia-d0b7b5bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28875%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20LevelOne%20WBR-6012&amp;severity=high&amp;id=69092623fe7723195e0b4724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3935-cwe-415-double-free-in-eclipse-found-e2397fd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3935%3A%20CWE-415%20Double%20Free%20in%20Eclipse%20Foundation%20mosquitto&amp;severity=medium&amp;id=6909214efe7723195e05457a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10525-cwe-122-heap-based-buffer-overflow--f0f5c73a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10525%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Eclipse%20Foundation%20mosquitto&amp;severity=high&amp;id=69092147fe7723195e054071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9388-cwe-79-improper-neutralization-of-in-90a25e04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20modernaweb%20Black%20Widgets%20For%20Elementor&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50504-incorrect-privilege-assignment-in-w-76a5b076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50504%3A%20Incorrect%20Privilege%20Assignment%20in%20webxmedia%20Bulk%20Change%20Role&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50506-incorrect-privilege-assignment-in-a-e8986efd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50506%3A%20Incorrect%20Privilege%20Assignment%20in%20azexo%20Marketing%20Automation%20by%20AZEXO&amp;severity=null&amp;id=69cd74fce6bfc5ba1df020e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50508-improper-limitation-of-a-pathname-t-a90e14d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50508%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chetan%20Khandla%20Woocommerce%20Product%20Design&amp;severity=null&amp;id=69cd74fde6bfc5ba1df0216a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50510-unrestricted-upload-of-file-with-da-63e7e2e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50510%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20webandprint%20AR%20For%20Woocommerce&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50511-unrestricted-upload-of-file-with-da-a3a02693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50511%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20donimedia%20WP%20donimedia%20carousel&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50507-deserialization-of-untrusted-data-i-91f2dac7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50507%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Daschmi%20DS.DownloadList&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9632-heap-based-buffer-overflow-aecbf0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9632%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=682cd0fc1484d88663aecbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50512-generation-of-error-message-contain-6b04e135</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50512%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Posti%20Posti%20Shipping&amp;severity=null&amp;id=69cd74fde6bfc5ba1df02176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50509-improper-limitation-of-a-pathname-t-af8906a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50509%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Chetan%20Khandla%20Woocommerce%20Product%20Design&amp;severity=null&amp;id=69cd74fde6bfc5ba1df0216d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50503-authentication-bypass-using-an-alte-09b2f9e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50503%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Deryck%20User%20Toolkit&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10108-cwe-79-improper-neutralization-of-i-3a8779bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10108%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gwin%20WPAdverts%20%E2%80%93%20Classifieds%20Plugin&amp;severity=high&amp;id=699f6decb7ef31ef0b590ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10223-cwe-79-improper-neutralization-of-i-e8a6c713</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10223%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20htplugins%20WP%20Team%20%E2%80%93%20WordPress%20Team%20Member%20Plugin&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8871-cwe-79-improper-neutralization-of-in-94905c4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Pricing%20Tables%20WordPress%20Plugin%20%E2%80%93%20Easy%20Pricing%20Tables&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10399-cwe-862-missing-authorization-in-wp-234137f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10399%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=699f6df4b7ef31ef0b591455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8792-cwe-79-improper-neutralization-of-in-db6c4688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20markjaquith%20Subscribe%20to%20Comments&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8627-cwe-79-improper-neutralization-of-in-b0a258dd</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20josh401%20Ultimate%20TinyMCE&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9885-cwe-79-improper-neutralization-of-in-6187d10a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fstaude%20Widget%20or%20Sidebar%20Shortcode&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9846-cwe-94-improper-control-of-generatio-c41373a5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9846%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20amu02aftab%20Enable%20Shortcodes%20inside%20Widgets%2CComments%20and%20Experts&amp;severity=high&amp;id=699f6b61b7ef31ef0b554d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9886-cwe-79-improper-neutralization-of-in-756b594f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20suifengtec%20WP%20Baidu%20Map&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9884-cwe-79-improper-neutralization-of-in-70178696</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20twinpictures%20T(-)%20Countdown&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48346-na-d2c6d9a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48346%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48272-na-bb1c8901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48272%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d11b7ef31ef0b56da53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48271-na-e6941feb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48271%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56da4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48241-na-4e4c017e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48241%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d11b7ef31ef0b56d9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48214-na-fc4eede3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48214%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0fb7ef31ef0b56d8c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48202-na-ddc1536d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48202%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48112-na-77f75f8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48112%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0bb7ef31ef0b56d72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48093-na-55e070b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48093%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0bb7ef31ef0b56d725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46531-na-795d6e86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46531%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56c3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43382-na-c9ae7671</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43382%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b5696db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42041-na-74381067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42041%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37573-na-b75b112d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37573%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36060-na-36a04e9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36060%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5bb7ef31ef0b563485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31975-na-8723d41b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31975%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31973-na-f4104389</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31973%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31972-na-be41b837</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31972%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51427-na-615db2f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51427%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb3b7ef31ef0b55a2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51426-na-6108a2a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51426%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51425-na-6e8d3eff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51425%3A%20n%2Fa&amp;severity=high&amp;id=699f6bb3b7ef31ef0b55a2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51424-na-e25caa93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51424%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb3b7ef31ef0b55a2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51419-na-02197377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51419%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51304-na-cd535751</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51304%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51301-na-8350bfb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51301%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51300-na-0f3fc0c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51300%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51299-na-ee55c1c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51299%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51296-na-e76a5cd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51296%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51258-na-e06a305a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51258%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51257-na-3f07a522</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51257%3A%20n%2Fa&amp;severity=high&amp;id=699f6baeb7ef31ef0b558b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51243-na-dd543868</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51243%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b558965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51242-na-8710f430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51242%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bacb7ef31ef0b558962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48807-na-627e9349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48807%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7bb7ef31ef0b555cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48735-na-742e84c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48735%3A%20n%2Fa&amp;severity=high&amp;id=699f6b78b7ef31ef0b555b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48734-na-a82f85aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48734%3A%20n%2Fa&amp;severity=high&amp;id=699f6b78b7ef31ef0b555b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48733-na-25a54cd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48733%3A%20n%2Fa&amp;severity=high&amp;id=699f6b78b7ef31ef0b555b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48648-na-37587de7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48648%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b76b7ef31ef0b555a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48647-na-5f374385</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48647%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48646-na-fd801e6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48646%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48569-na-ea29d171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48569%3A%20n%2Fa&amp;severity=medium&amp;id=68f25ddf9c34d0947f2bbf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-30-f12d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7992-cwe-121-stack-overflow-in-autodesk-autocad-aecb36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7992%3A%20CWE-121%20Stack%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fc1484d88663aecb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7991-cwe-787-out-of-bounds-write-in-autodesk-autocad-aecb34</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7991%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fc1484d88663aecb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9997-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-autocad-aecb49</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9997%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fc1484d88663aecb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9996-cwe-787-out-of-bounds-write-in-autodesk-autocad-aecb3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9996%3A%20CWE-787%20Out-of-Bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fc1484d88663aecb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9489-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-autodesk-autocad-aecb3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9489%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fc1484d88663aecb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8896-cwe-908-use-of-uninitialized-resource-in-autodesk-autocad-aecb38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8896%3A%20CWE-908%20Use%20of%20Uninitialized%20Resource%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=682cd0fc1484d88663aecb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8592-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-autodesk-autocad-bf0798</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8592%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983fc4522896dcbf0798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50421-missing-authorization-in-wp-overnig-e3cfb761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50421%3A%20Missing%20Authorization%20in%20WP%20Overnight%20WooCommerce%20PDF%20Invoices%20%26%20Packing%20Slips&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50422-missing-authorization-in-cloudways--7cd98425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50422%3A%20Missing%20Authorization%20in%20Cloudways%20Breeze&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50423-missing-authorization-in-wpdevelope-2cceb570</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50423%3A%20Missing%20Authorization%20in%20WPDeveloper%20Templately&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50424-missing-authorization-in-wpdevelope-eb1a2388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50424%3A%20Missing%20Authorization%20in%20WPDeveloper%20Templately&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50425-exposure-of-sensitive-system-inform-0fe48cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50425%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Roland%20Murg%20WP%20Booking%20System&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9827-cwe-125-out-of-bounds-read-in-autodesk-autocad-befc68</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9827%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9826-cwe-416-use-after-free-in-autodesk-autocad-befc64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9826%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8600-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-autodesk-autocad-befc60</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8600%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefc60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8599-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-autodesk-autocad-befcfb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8599%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefcfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8598-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-autodesk-autocad-befcf7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8598%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefcf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8597-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-autodesk-autocad-befcd9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8597%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8596-cwe-787-out-of-bounds-write-in-autodesk-autocad-befcd5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8596%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefcd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50428-missing-authorization-in-mondula201-40f4ac76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50428%3A%20Missing%20Authorization%20in%20mondula2016%20Multi%20Step%20Form&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8595-cwe-416-use-after-free-in-autodesk-autocad-befcd1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8595%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8594-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-befccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8594%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8593-cwe-787-out-of-bounds-write-in-autodesk-autocad-befcc9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8593%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefcc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8591-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-befd68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8591%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50454-missing-authorization-in-benjamin-d-ec6d4675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50454%3A%20Missing%20Authorization%20in%20Benjamin%20Denis%20SEOPress&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8590-cwe-416-use-after-free-in-autodesk-autocad-befd64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8590%3A%20CWE-416%20Use%20After%20Free%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8589-cwe-125-out-of-bounds-read-in-autodesk-autocad-befd60</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8589%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8588-cwe-125-out-of-bounds-read-in-autodesk-autocad-befd5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8588%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8587-cwe-122-heap-based-buffer-overflow-in-autodesk-autocad-befd3f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8587%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefd3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50455-missing-authorization-in-benjamin-d-5b71fbdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50455%3A%20Missing%20Authorization%20in%20Benjamin%20Denis%20SEOPress&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50456-missing-authorization-in-benjamin-d-29940f39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50456%3A%20Missing%20Authorization%20in%20Benjamin%20Denis%20SEOPress&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50459-missing-authorization-in-hossni-mub-5cd0bd04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50459%3A%20Missing%20Authorization%20in%20Hossni%20Mubarak%20AidWP&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9989-cwe-288-authentication-bypass-using--23b92dc8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9989%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20odude%20Crypto%20Tool&amp;severity=critical&amp;id=699f6b66b7ef31ef0b55505d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9990-cwe-352-cross-site-request-forgery-c-3a35b384</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20odude%20Crypto%20Tool&amp;severity=high&amp;id=699f6b66b7ef31ef0b555062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9988-cwe-288-authentication-bypass-using--65a6b6db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9988%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20odude%20Crypto%20Tool&amp;severity=critical&amp;id=699f6b65b7ef31ef0b554fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7985-cwe-434-unrestricted-upload-of-file--187d9fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7985%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20softaculous%20FileOrganizer%20%E2%80%93%20Manage%20WordPress%20and%20Website%20Files&amp;severity=high&amp;id=699f6c20b7ef31ef0b5603fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10226-cwe-79-improper-neutralization-of-i-e9da7a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9505-cwe-79-improper-neutralization-of-in-71cc78ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b5514a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47640-improper-neutralization-of-input-du-db4f1cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weDevs%20WP%20ERP&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49632-improper-neutralization-of-input-du-f8893189</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Senthil%20Vel%20CWD%203D%20Image%20Gallery&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49634-improper-neutralization-of-input-du-80d05ae7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49634%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rimon%20Habib%20BP%20Member%20Type%20Manager&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49635-improper-neutralization-of-input-du-f6f7b967</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49635%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manjurul.cis%20Banner%20Slider&amp;severity=null&amp;id=69cd74dce6bfc5ba1df0142b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8309-cwe-89-improper-neutralization-of-sp-139b414c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8309%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=medium&amp;id=68ef9b2d178f764e1f470e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7042-cwe-89-improper-neutralization-of-sp-6cef86c8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7042%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20langchain-ai%20langchain-ai%2Flangchainjs&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7472-cwe-93-improper-neutralization-of-cr-94dda416</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7472%3A%20CWE-93%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49636-improper-neutralization-of-input-du-b72b65bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49636%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woracal%20Agile%20Video%20Player%20Lite&amp;severity=null&amp;id=69cd74dce6bfc5ba1df0142e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7010-cwe-208-observable-timing-discrepanc-9fcfeb1c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7010%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20mudler%20mudler%2Flocalai&amp;severity=high&amp;id=68ef9b2a178f764e1f470d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49637-improper-neutralization-of-input-du-144ea775</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49637%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Foxskav%20Bet%20WC%202018%20Russia&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6868-cwe-59-improper-link-resolution-befo-42acbc9b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6868%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20mudler%20mudler%2Flocalai&amp;severity=high&amp;id=68ef9b2a178f764e1f470d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7475-cwe-862-missing-authorization-in-lun-0f9905f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7475%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b2b178f764e1f470d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49638-improper-neutralization-of-input-du-730ca86b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ventureharbour%20Risk%20Warning%20Bar&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49639-improper-neutralization-of-input-du-bd61a1f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49639%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Edward%20Stoever%20Monitor.chat&amp;severity=null&amp;id=69cd74dce6bfc5ba1df01437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49640-improper-neutralization-of-input-du-d8fc89c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49640%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AmaderCode%20Lab%20ACL%20Floating%20Cart%20for%20WooCommerce&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41153-cwe-78-improper-neutralization-of-s-4a854256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41153%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Hitachi%20Energy%20TRO600&amp;severity=high&amp;id=68fb3da20691a1b5991c5187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49641-improper-neutralization-of-input-du-446c0c72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tidaweb%20Tida%20URL%20Screenshot&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10467-memory-safety-bugs-fixed-in-firefox-f3de5ec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10467%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20132%2C%20Thunderbird%20132%2C%20Firefox%20ESR%20128.4%2C%20and%20Thunderbird%20128.4%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69092615fe7723195e0b3584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10466-dom-push-subscription-message-could-195c665f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10466%3A%20DOM%20push%20subscription%20message%20could%20hang%20Thunderbird%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092615fe7723195e0b357b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10465-clipboard-paste-button-persisted-ac-51ebf057</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10465%3A%20Clipboard%20%22paste%22%20button%20persisted%20across%20tabs%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092615fe7723195e0b3572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10464-history-interface-could-have-been-u-8e535194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10464%3A%20History%20interface%20could%20have%20been%20used%20to%20cause%20a%20Denial%20of%20Service%20condition%20in%20the%20browser%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092615fe7723195e0b3569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10463-cross-origin-video-frame-leak-in-mo-2e18153d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10463%3A%20Cross%20origin%20video%20frame%20leak%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092615fe7723195e0b355f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10462-origin-of-permission-prompt-could-b-833d135a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10462%3A%20Origin%20of%20permission%20prompt%20could%20be%20spoofed%20by%20long%20URL%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69092615fe7723195e0b3556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10461-xss-due-to-content-disposition-bein-3a0197e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10461%3A%20XSS%20due%20to%20Content-Disposition%20being%20ignored%20in%20multipart%2Fx-mixed-replace%20response%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092613fe7723195e0b3066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10460-confusing-display-of-origin-for-ext-f82082f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10460%3A%20Confusing%20display%20of%20origin%20for%20external%20protocol%20handler%20prompt%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092613fe7723195e0b305d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10459-use-after-free-in-layout-with-acces-a73222d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10459%3A%20Use-after-free%20in%20layout%20with%20accessibility%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092613fe7723195e0b3053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10458-permission-leak-via-embed-or-object-6cc956cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10458%3A%20Permission%20leak%20via%20embed%20or%20object%20elements%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69092613fe7723195e0b3049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49643-improper-neutralization-of-input-du-a8a5cede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fifthsegment%20Whitelist&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49645-improper-neutralization-of-input-du-4a448e6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ilias%20Gomatos%20Affiliate%20Platform&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49646-improper-neutralization-of-input-du-a7534a56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ioannup%20Code%20Generate&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49647-improper-neutralization-of-input-du-15533a21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Carl%20Alberto%20Simple%20Custom%20Admin&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49648-improper-neutralization-of-input-du-a442bebd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20SVG%20Captcha&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49650-improper-neutralization-of-input-du-d5d68a37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49650%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xarbo%20BuddyPress%20Greeting%20Message&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df01758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49651-improper-neutralization-of-input-du-b8ba0de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49651%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Matt%20Royal%20WooCommerce%20Maintenance%20Mode&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df0175b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49654-improper-neutralization-of-input-du-c6ae9381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49654%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marian%20Heddesheimer%20Extra%20Privacy%20for%20Elementor&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df01764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49656-improper-neutralization-of-input-du-b3f0bf0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49656%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fifthsegment%20DocumentPress&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df0176a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49660-improper-neutralization-of-input-du-d1ca9138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49660%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CampusExplorer%20Campus%20Explorer%20Widget&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df0184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49661-improper-neutralization-of-input-du-74b002fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49661%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lew%20Ayotte%20leenk.me&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49662-improper-neutralization-of-input-du-57283417</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49662%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webgensis%20Simple%20Load%20More&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49663-improper-neutralization-of-input-du-a3712b5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49663%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elenkadark%20uCAT%20%E2%80%93%20Next%20Story&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df0185d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10181-cwe-79-improper-neutralization-of-i-c1a3d93d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10181%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contrid%20Newsletters&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49667-improper-neutralization-of-input-du-f8367856</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49667%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Asaduzzaman%20Abir%20Local%20Business%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49670-improper-neutralization-of-input-du-fcaf0020</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49670%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sam%20Glover%20Client%20Power%20Tools%20Portal&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49672-cross-site-request-forgery-csrf-in--e1799aa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49672%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20giffordcheung%20Google%20Docs%20RSVP&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df0187e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49673-improper-neutralization-of-input-du-cd1637e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49673%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Van%20Abel%20LaTeX2HTML&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df018bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10360-cwe-200-exposure-of-sensitive-infor-57e0a2d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10360%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df3b7ef31ef0b591403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10233-cwe-79-improper-neutralization-of-i-2964899c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10233%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cozyvision1%20SMS%20Alert%20Order%20Notifications%20%E2%80%93%20WooCommerce&amp;severity=medium&amp;id=699f6defb7ef31ef0b590ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10266-cwe-79-improper-neutralization-of-i-cfa60157</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df1b7ef31ef0b59118c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10185-cwe-79-improper-neutralization-of-i-f9914f61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20YouTube%20Integration&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10184-cwe-79-improper-neutralization-of-i-ec18b3a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Kick%20Integration&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49679-improper-neutralization-of-input-du-d6299911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49692-improper-neutralization-of-input-du-47cf1e71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49692%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPCenter%20AffiliateX&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50407-improper-neutralization-of-input-du-fb2a5e9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50407%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50409-improper-neutralization-of-input-du-c4dbe7ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50409%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50410-improper-neutralization-of-input-du-9aa3345d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50410%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50550-incorrect-privilege-assignment-in-l-8a1745e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50550%3A%20Incorrect%20Privilege%20Assignment%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=69cd7504e6bfc5ba1df023db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10227-cwe-79-improper-neutralization-of-i-f37321bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10227%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cservit%20affiliate-toolkit&amp;severity=medium&amp;id=699f6defb7ef31ef0b590fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10437-cwe-862-missing-authorization-in-wp-7701aab3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10437%3A%20CWE-862%20Missing%20Authorization%20in%20wpclever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=medium&amp;id=699f6df4b7ef31ef0b5914c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10436-cwe-98-improper-control-of-filename-b4eac601</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10436%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpclever%20WPC%20Smart%20Messages%20for%20WooCommerce&amp;severity=high&amp;id=699f6df4b7ef31ef0b5914b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9376-cwe-79-improper-neutralization-of-in-902c667c</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20climaxthemes%20Kata%20Plus%20%E2%80%93%20Addons%20for%20Elementor%20%E2%80%93%20Widgets%2C%20Extensions%20and%20Templates&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49642-improper-neutralization-of-input-du-db5191a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49642%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20Todo%20Custom%20Field&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df015ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50411-improper-neutralization-of-input-du-ee5ab3b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50411%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50412-improper-neutralization-of-input-du-7647d09b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50412%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jules%20Colle%20Conditional%20Fields%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50413-improper-neutralization-of-input-du-0e5d1c99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50413%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Javier%20Carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50414-improper-neutralization-of-input-du-af23d121</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50414%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Buttonizer%20Button%20contact%20VR&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50415-improper-neutralization-of-input-du-4470593f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50415%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pagup%20Ads.txt%20%26%20App-ads.txt%20Manager%20for%20WordPress&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50418-improper-neutralization-of-input-du-60c505eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50418%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Time%20Slot%20Booking%20Time%20Slot&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50426-improper-neutralization-of-input-du-b858fd33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50426%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Survey%20Maker&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50475-missing-authorization-in-scott-gamo-2c6efc63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50475%3A%20Missing%20Authorization%20in%20Scott%20Gamon%20Signup%20Page&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50476-missing-authorization-in-grn-softwa-eb1bbbb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50476%3A%20Missing%20Authorization%20in%20GR%C3%9CN%20Software%20Group%20GmbH%20GR%C3%9CN%20spendino%20Spendenformular&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50481-incorrect-privilege-assignment-in-s-76e3afb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50481%3A%20Incorrect%20Privilege%20Assignment%20in%20stackthemes%20Bstone%20Demo%20Importer&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50485-incorrect-privilege-assignment-in-u-adbf1988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50485%3A%20Incorrect%20Privilege%20Assignment%20in%20Udit%20Rawat%20Exam%20Matrix&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df0201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50490-missing-authorization-in-lowcage-pe-55883b8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50490%3A%20Missing%20Authorization%20in%20lowcage%20PegaPoll&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df0202a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50427-unrestricted-upload-of-file-with-da-7b43135d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50427%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20devsoftbaltic%20SurveyJS&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10048-cwe-79-improper-neutralization-of-i-bd032b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ifeelweb%20Post%20Status%20Notifier&amp;severity=medium&amp;id=699f6decb7ef31ef0b590b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9438-cwe-80-improper-neutralization-of-sc-51794f48</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9438%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20seuroficial%20SEUR%20Oficial&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50473-unrestricted-upload-of-file-with-da-16c4343c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50473%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Ajar%20Productions%20Ajar%20in5%20Embed&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50480-unrestricted-upload-of-file-with-da-fcbf7e14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50480%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20azexo%20Marketing%20Automation%20by%20AZEXO&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50482-unrestricted-upload-of-file-with-da-c1b51156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50482%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Chetan%20Khandla%20Woocommerce%20Product%20Design&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50484-unrestricted-upload-of-file-with-da-8d8ee152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50484%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Lindeni%20Mahlalela%20Multi%20Purpose%20Mail%20Form&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df01ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50493-unrestricted-upload-of-file-with-da-9b4ba117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50493%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20masterhomepage%20Automatic%20Translation&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df02036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50494-unrestricted-upload-of-file-with-da-6eca7238</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50494%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Amin%20Omer%20Sudan%20Payment%20Gateway%20for%20WooCommerce&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df02039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10312-cwe-200-exposure-of-sensitive-infor-82ff1a1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10312%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df1b7ef31ef0b5911e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10000-cwe-79-improper-neutralization-of-i-77cb1344</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20eLearning%20and%20Online%20Course%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10008-cwe-862-missing-authorization-in-ma-5b24b574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10008%3A%20CWE-862%20Missing%20Authorization%20in%20masteriyo%20Masteriyo%20LMS%20%E2%80%93%20eLearning%20and%20Online%20Course%20Builder%20for%20WordPress&amp;severity=high&amp;id=699f6deab7ef31ef0b5909e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50088-vulnerability-in-linux-linux-bdfeda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfeda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50087-vulnerability-in-linux-linux-bdfed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50086-vulnerability-in-linux-linux-bdfed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50085-vulnerability-in-linux-linux-bdcf35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50084-vulnerability-in-linux-linux-bdcf26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50083-vulnerability-in-linux-linux-bdfec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50082-vulnerability-in-linux-linux-bdfebd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50081-vulnerability-in-linux-linux-bdfea0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50080-vulnerability-in-linux-linux-bdfe9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50079-vulnerability-in-linux-linux-bdfe98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50078-vulnerability-in-linux-linux-bdfe94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50077-vulnerability-in-linux-linux-bdfe90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50076-vulnerability-in-linux-linux-bd8224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd8224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50075-vulnerability-in-linux-linux-bdfe8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50074-vulnerability-in-linux-linux-bdcf1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcf1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50073-vulnerability-in-linux-linux-bdfe88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50072-vulnerability-in-linux-linux-bdcf16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50071-vulnerability-in-linux-linux-bdfe84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50070-vulnerability-in-linux-linux-bdfe82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfe82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50069-vulnerability-in-linux-linux-bdfe80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfe80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50068-vulnerability-in-linux-linux-bdfe51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48206-na-28aa5140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48206%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48138-na-86f79549</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48138%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0bb7ef31ef0b56d737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48063-na-86684fcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48063%3A%20n%2Fa&amp;severity=null&amp;id=699f6d0ab7ef31ef0b56d6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44081-na-228b8e92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44081%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdab7ef31ef0b56990b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44080-na-8666ada4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44080%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b569907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51568-na-453922c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51568%3A%20n%2Fa&amp;severity=critical&amp;id=699f6bb3b7ef31ef0b55a34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51181-na-aef5b6d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51181%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b558894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51180-na-9bd8a1bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51180%3A%20n%2Fa&amp;severity=high&amp;id=699f6bacb7ef31ef0b558891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51076-na-a02df560</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51076%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51075-na-72d4b986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51075%3A%20n%2Fa&amp;severity=medium&amp;id=699f6baab7ef31ef0b557a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48573-na-210b47b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48573%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b74b7ef31ef0b555932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48461-na-8f774e49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48461%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b555806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51567-na-9797da6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51567%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9b6247d717aace26c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51378-na-32b97d3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51378%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9b6247d717aace26c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-29-f12e7f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44260-a-malicious-app-with-root-privilege-75fadf8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44260%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20modify%20the%20contents%20of%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7135043901e828ab34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44237-processing-a-maliciously-crafted-fi-f81a9c27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44237%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44295-an-app-may-be-able-to-modify-protec-67cdd5b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44295%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7435043901e828ad7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44283-parsing-a-maliciously-crafted-file--14f4b812</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44283%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7335043901e828ac57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44145-an-attacker-with-physical-access-to-47cf22cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44145%3A%20An%20attacker%20with%20physical%20access%20to%20a%20macOS%20device%20with%20Sidecar%20enabled%20may%20be%20able%20to%20bypass%20the%20Lock%20Screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44240-processing-a-maliciously-crafted-fo-70f2a8e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44240%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44217-password-autofill-may-fill-in-passw-93a71b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44217%3A%20Password%20autofill%20may%20fill%20in%20passwords%20after%20failing%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb82ee6bfc5ba1df6ecf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44256-an-app-may-be-able-to-break-out-of--c076cee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44256%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=690929a9fe7723195e0fd60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44257-an-app-may-be-able-to-access-sensit-c18c8459</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44257%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a9fe7723195e0fd613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44216-an-app-may-be-able-to-access-user-s-8d121fa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44216%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40853-an-attacker-may-be-able-to-use-siri-2ae7ba27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40853%3A%20An%20attacker%20may%20be%20able%20to%20use%20Siri%20to%20enable%20Auto-Answer%20Calls%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44144-processing-a-maliciously-crafted-fi-6f67b329</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44144%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a0fe7723195e0fd12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44282-parsing-a-file-may-lead-to-disclosu-ca84f79c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44282%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7335043901e828ac48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44294-an-attacker-with-root-privileges-ma-b9abf0bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44294%3A%20An%20attacker%20with%20root%20privileges%20may%20be%20able%20to%20delete%20protected%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44236-processing-a-maliciously-crafted-fi-e3ba5ef6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44236%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44261-an-attacker-may-be-able-to-view-res-316ca118</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44261%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7135043901e828ab3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44277-an-app-may-be-able-to-cause-unexpec-52842b99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44277%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092b7335043901e828ac1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40792-a-malicious-app-may-be-able-to-chan-d15bc34e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40792%3A%20A%20malicious%20app%20may%20be%20able%20to%20change%20network%20settings%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb827e6bfc5ba1df6e918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44155-maliciously-crafted-web-content-may-9ffdf8f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44155%3A%20Maliciously%20crafted%20web%20content%20may%20violate%20iframe%20sandboxing%20policy%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a1fe7723195e0fd191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44285-an-app-may-be-able-to-cause-unexpec-98ccdc34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44285%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69092b7435043901e828ad4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44196-an-app-may-be-able-to-modify-protec-99d6bf60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44196%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a1fe7723195e0fd1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44159-an-app-may-be-able-to-bypass-privac-174e62bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44159%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a1fe7723195e0fd1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44270-a-sandboxed-process-may-be-able-to--20aaffb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44270%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7135043901e828ab70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44289-an-app-may-be-able-to-read-sensitiv-6d427cc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44289%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7435043901e828ad5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44122-an-application-may-be-able-to-break-d8a1b88b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44122%3A%20An%20application%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a0fe7723195e0fd117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44175-an-app-may-be-able-to-access-sensit-29770fd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44175%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a1fe7723195e0fd1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44174-an-attacker-may-be-able-to-view-res-3a7d0015</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44174%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44123-a-malicious-app-with-root-privilege-94fb59fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44123%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20keyboard%20input%20and%20location%20information%20without%20user%20consent%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb82ae6bfc5ba1df6e9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44267-a-malicious-application-may-be-able-6f6386ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44267%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=low&amp;id=69092b7135043901e828ab5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44197-a-malicious-app-may-be-able-to-caus-0def8c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44197%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=low&amp;id=690929a1fe7723195e0fd1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44251-an-attacker-may-be-able-to-view-res-022d860d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44251%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690929a7fe7723195e0fd57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44247-a-malicious-application-may-be-able-b4f5b5f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44247%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a7fe7723195e0fd56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44302-processing-a-maliciously-crafted-fo-47942fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44302%3A%20Processing%20a%20maliciously%20crafted%20font%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7635043901e828b27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40855-a-sandboxed-app-may-be-able-to-acce-8cad7cdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40855%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929b1fe7723195e0fd85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44284-parsing-a-maliciously-crafted-file--810823dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44284%3A%20Parsing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44194-an-app-may-be-able-to-access-sensit-eea8a8cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44194%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a1fe7723195e0fd1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44252-restoring-a-maliciously-crafted-bac-cafc9a17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44252%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a7fe7723195e0fd57e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44213-an-attacker-in-a-privileged-network-67a71be1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44213%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a3fe7723195e0fd277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44301-a-malicious-application-may-be-able-fc8ec4f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44301%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7635043901e828b273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44244-processing-maliciously-crafted-web--b50e81a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44244%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a7fe7723195e0fd54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44287-a-malicious-application-may-be-able-d72db260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44287%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7435043901e828ad58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44229-private-browsing-may-leak-some-brow-65071341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44229%3A%20Private%20browsing%20may%20leak%20some%20browsing%20history%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a5fe7723195e0fd3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44264-a-malicious-app-may-be-able-to-crea-333711b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44264%3A%20A%20malicious%20app%20may%20be%20able%20to%20create%20symlinks%20to%20protected%20regions%20of%20the%20disk%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7135043901e828ab49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44273-a-malicious-app-may-be-able-to-acce-c7750659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44273%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7335043901e828ac00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44265-an-attacker-with-physical-access-ca-ab4170b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44265%3A%20An%20attacker%20with%20physical%20access%20can%20input%20Game%20Controller%20events%20to%20apps%20running%20on%20a%20locked%20device%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7135043901e828ab51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44137-an-attacker-with-physical-access-ma-ba8ea8d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44137%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20share%20items%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a0fe7723195e0fd127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44208-an-app-may-be-able-to-bypass-certai-41af32a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44208%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb82ce6bfc5ba1df6ea7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44228-an-app-may-be-able-to-inherit-xcode-36b80054</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44228%3A%20An%20app%20may%20be%20able%20to%20inherit%20Xcode%20permissions%20and%20access%20user%20data%20in%20Apple%20Xcode&amp;severity=high&amp;id=69ceb82ee6bfc5ba1df6ecfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44156-an-app-may-be-able-to-bypass-privac-4d8101b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44156%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=690929a1fe7723195e0fd199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44269-a-malicious-app-may-use-shortcuts-t-23f035bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44269%3A%20A%20malicious%20app%20may%20use%20shortcuts%20to%20access%20restricted%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7135043901e828ab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44253-an-app-may-be-able-to-modify-protec-04bed500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44253%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690929a7fe7723195e0fd588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44258-restoring-a-maliciously-crafted-bac-6c05f40c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44258%3A%20Restoring%20a%20maliciously%20crafted%20backup%20file%20may%20lead%20to%20modification%20of%20protected%20system%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a9fe7723195e0fd61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27849-an-app-may-be-able-to-read-sensitiv-079356fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27849%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=low&amp;id=69ceb825e6bfc5ba1df6e814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44126-processing-a-maliciously-crafted-fi-27f32219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44126%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a0fe7723195e0fd11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44235-an-attacker-may-be-able-to-view-res-37f034fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44235%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44262-a-user-may-be-able-to-view-sensitiv-7caa6c2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44262%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20visionOS&amp;severity=medium&amp;id=69092b7135043901e828ab41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44274-an-attacker-with-physical-access-to-a31dac58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44274%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7335043901e828ac0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44254-an-app-may-be-able-to-access-sensit-9b9bc460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44254%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a7fe7723195e0fd58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44203-an-app-may-be-able-to-access-a-user-5ae957e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44203%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Photos%20Library%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44215-processing-an-image-may-result-in-d-4136bb69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44215%3A%20Processing%20an%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44239-an-app-may-be-able-to-leak-sensitiv-8f9c4f63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44239%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a5fe7723195e0fd3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44281-parsing-a-file-may-lead-to-disclosu-0d941df0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44281%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7335043901e828ac41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44278-a-sandboxed-app-may-be-able-to-acce-ba04fdb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44278%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7335043901e828ac24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44297-processing-a-maliciously-crafted-me-d74a00f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44297%3A%20Processing%20a%20maliciously%20crafted%20message%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7635043901e828b259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44279-parsing-a-file-may-lead-to-disclosu-ff40f2fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44279%3A%20Parsing%20a%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=69092b7335043901e828ac33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44296-processing-maliciously-crafted-web--d75e82a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44296%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=medium&amp;id=69092b7435043901e828ad84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44280-an-app-may-be-able-to-modify-protec-a5a008d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44280%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69092b7335043901e828ac3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40851-an-attacker-with-physical-access-ma-67b7b6b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40851%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contact%20photos%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690929b1fe7723195e0fd856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44255-a-malicious-app-may-be-able-to-run--efb9c270</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44255%3A%20A%20malicious%20app%20may%20be%20able%20to%20run%20arbitrary%20shortcuts%20without%20user%20consent%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a7fe7723195e0fd59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44222-an-app-may-be-able-to-read-sensitiv-c10627b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44222%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=low&amp;id=690929a3fe7723195e0fd2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44275-a-malicious-application-may-be-able-06dd27de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44275%3A%20A%20malicious%20application%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=low&amp;id=69092b7335043901e828ac14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44263-an-app-may-be-able-to-access-user-s-f710ae78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44263%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69092b7135043901e828ab45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44218-processing-a-maliciously-crafted-fi-4f88cf56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44218%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20heap%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929a3fe7723195e0fd294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40867-a-remote-attacker-may-be-able-to-br-32a43a21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40867%3A%20A%20remote%20attacker%20may%20be%20able%20to%20break%20out%20of%20Web%20Content%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690929b1fe7723195e0fd866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44259-an-attacker-may-be-able-to-misuse-a-d60ea13f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44259%3A%20An%20attacker%20may%20be%20able%20to%20misuse%20a%20trust%20relationship%20to%20download%20malicious%20content%20in%20Apple%20Safari&amp;severity=high&amp;id=69092b7135043901e828ab29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50495-unrestricted-upload-of-file-with-da-715b5c36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50495%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nunomorgadinho%20Plugin%20Propagator&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50496-unrestricted-upload-of-file-with-da-5c5eca6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50496%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20webandprint%20AR%20For%20WordPress&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50434-improper-control-of-filename-for-in-87f5411b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50434%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themehorse%20NewsCard&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50435-improper-control-of-filename-for-in-59e09d95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50435%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themehorse%20Meta%20News&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50436-improper-control-of-filename-for-in-dafc4ca9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50436%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themehorse%20Clean%20Retina&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50453-relative-path-traversal-in-webangon-e1cc9d8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50453%3A%20Relative%20Path%20Traversal%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50457-improper-control-of-filename-for-in-8d96691d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50457%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Qode%20Qode%20Essential%20Addons&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50429-improper-neutralization-of-input-du-dbda451a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BlockArt%20Magazine%20Blocks&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50431-improper-neutralization-of-input-du-69d2414c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50431%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cloudways%20Breeze&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50432-improper-neutralization-of-input-du-92a0c10a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50432%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50433-improper-neutralization-of-input-du-3d6db92b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowDevs%20Sky%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50437-improper-neutralization-of-input-du-2537b001</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paolo%20GeoDirectory&amp;severity=null&amp;id=69cd74eae6bfc5ba1df01c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50438-improper-neutralization-of-input-du-df469b3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50438%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50439-improper-neutralization-of-input-du-638addb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50439%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Astra%20Widgets&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50440-improper-neutralization-of-input-du-2b7b7d51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50440%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Chris%20Coyier%20CodePen%20Embedded%20Pens%20Shortcode&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50441-improper-neutralization-of-input-du-3308194a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50441%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50445-improper-neutralization-of-input-du-dd6e39de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50445%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20merkulove%20Selection%20Lite&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50446-improper-neutralization-of-input-du-ef1bb9ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50446%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FuturioWP%20Futurio%20Extra&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50447-improper-neutralization-of-input-du-e2fdadb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50447%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EnvoThemes%20Envo&apos;s%20Elementor%20Templates%20%26%20Widgets%20for%20WooCommerce&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50448-improper-neutralization-of-input-du-bfac0f50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50448%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Product%20Add-Ons&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50449-improper-neutralization-of-input-du-e0d2f66f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50449%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RedefiningTheWeb%20PDF%20Generator%20Addon%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50451-improper-neutralization-of-input-du-aa3e6a6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RealMag777%20MDTF&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50458-improper-neutralization-of-input-du-56210d1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20CodeUs%20Advanced%20Sermons&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50460-improper-neutralization-of-input-du-11d00e73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Firelight%20Firelight%20Lightbox&amp;severity=null&amp;id=69cd74efe6bfc5ba1df01e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50461-improper-neutralization-of-input-du-d62a4fa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50461%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20EmbedPress&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50462-improper-neutralization-of-input-du-44597f36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50462%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20html5maps%20Interactive%20World%20Map&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50464-improper-neutralization-of-input-du-989f49e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50464%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lebedel%20Kodex%20Posts%20likes&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50467-improper-neutralization-of-input-du-7c524c4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50467%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20siteengineai%20Scrollbar%20by%20webxapp%20%E2%80%93%20Best%20vertical%2Fhorizontal%20scrollbars%20plugin&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50468-improper-neutralization-of-input-du-2c7f1954</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50468%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20faceleg%20Raptor%20Editor&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50469-improper-neutralization-of-input-du-92608bb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50469%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brightvesseldev%20Textboxes&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9629-cwe-862-missing-authorization-in-hok-9c36523b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9629%3A%20CWE-862%20Missing%20Authorization%20in%20hokku%20Contact%20Form%207%20%2B%20Telegram&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45802-cwe-20-improper-input-validation-in-29750b39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45802%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20squid-cache%20squid&amp;severity=high&amp;id=6909214ffe7723195e05468d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49761-cwe-1333-inefficient-regular-expres-38df249a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49761%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20ruby%20rexml&amp;severity=medium&amp;id=6909214ffe7723195e054697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50443-improper-neutralization-of-input-du-288e1cf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50443%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPXPO%20PostX&amp;severity=medium&amp;id=69cd74ebe6bfc5ba1df01c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50470-improper-neutralization-of-input-du-9e4ebb6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50470%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themes4WP%20Themes4WP%20YouTube%20External%20Subtitles&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50471-improper-neutralization-of-input-du-c4a9de3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50471%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20checklistcom%20Trip%20Plan&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50472-improper-neutralization-of-input-du-a67a5570</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martindrapeau%20Amilia%20Store&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50501-improper-neutralization-of-input-du-c7b4cbea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50501%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Climax%20Themes%20Kata%20Plus&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50502-improper-neutralization-of-input-du-14f482dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50502%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50479-improper-neutralization-of-special--26cc8b9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50479%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chenyenming%20Woocommerce%20Quote%20Calculator&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50491-improper-neutralization-of-special--9c1d6b59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50491%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MicahBlu%20RSVP%20ME&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df0202e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50497-improper-control-of-filename-for-in-2593dcde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50497%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wdesco%20Advanced%20Online%20Ordering%20and%20Delivery%20Platform&amp;severity=null&amp;id=69cd74fbe6bfc5ba1df020ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50463-url-redirection-to-untrusted-site-o-27aa780c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50463%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd74f0e6bfc5ba1df01e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50483-authorization-bypass-through-user-c-f68a43c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50483%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Tareq%20Hasan%20Meetup&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50488-authentication-bypass-using-an-alte-f27d50d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50488%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20yespbs%20Token%20Login&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df02023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50408-deserialization-of-untrusted-data-i-444c6ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50408%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Bob%20Namaste!%20LMS&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50416-deserialization-of-untrusted-data-i-c824eb54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50416%3A%20Deserialization%20of%20Untrusted%20Data%20in%20WPClever%20WPC%20Shop%20as%20a%20Customer%20for%20WooCommerce&amp;severity=null&amp;id=69cd74e8e6bfc5ba1df01b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50450-improper-control-of-generation-of-c-be013ca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50450%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20RealMag777%20MDTF&amp;severity=null&amp;id=69cd74eee6bfc5ba1df01d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50492-improper-control-of-generation-of-c-ac61d803</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50492%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Scott%20Paterson%20ScottCart&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df02033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50498-cwe-94-improper-control-of-generati-a39bc7c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50498%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Ajit%20Bohra%20WP%20Query%20Console&amp;severity=null&amp;id=697395744623b1157c4bc726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50477-authentication-bypass-using-an-alte-dd1976e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50477%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Stacks%20Stacks%20Mobile%20App%20Builder&amp;severity=null&amp;id=69cd74f4e6bfc5ba1df01fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50486-authentication-bypass-using-an-alte-f1a21f50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50486%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Acnoo%20Acnoo%20Flutter%20API&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df0201d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50487-authentication-bypass-using-an-alte-a9b5ab8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50487%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Acnoo%20MaanStore%20API&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df02020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50489-authentication-bypass-using-an-alte-63165ef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50489%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20realtyworkstation%20Realty%20Workstation&amp;severity=null&amp;id=69cd74f7e6bfc5ba1df02026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50442-improper-restriction-of-xml-externa-92319fb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50442%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd74ebe6bfc5ba1df01c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9162-cwe-94-improper-control-of-generatio-60526e0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9162%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20yaniiliev%20All-in-One%20WP%20Migration%20and%20Backup&amp;severity=high&amp;id=699f6b41b7ef31ef0b54fc7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50067-vulnerability-in-linux-linux-bdfe49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48291-na-37a37898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48291%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d13b7ef31ef0b56db01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48196-na-c820db6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48196%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0db7ef31ef0b56d835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48195-na-87a71930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48195%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0db7ef31ef0b56d832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48191-na-62449b0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48191%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0db7ef31ef0b56d82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48178-na-9a37d181</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48178%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0db7ef31ef0b56d7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48177-na-8d484b0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48177%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0db7ef31ef0b56d7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48107-na-9b020039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48107%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0bb7ef31ef0b56d729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48074-na-7090ab13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48074%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0bb7ef31ef0b56d721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42930-na-a65296bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42930%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42011-na-5211795b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42011%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39205-na-689489f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39205%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c83b7ef31ef0b565ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34537-na-51e5bfee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34537%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c53b7ef31ef0b562bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51509-na-861481cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51509%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51508-na-dc1654d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51508%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51507-na-04ef99ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51507%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-51506-na-5f3e07ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-51506%3A%20n%2Fa&amp;severity=medium&amp;id=699f6bb3b7ef31ef0b55a33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48936-na-f22a1020</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48936%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7cb7ef31ef0b555dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48826-na-f3fcb27f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48826%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48825-na-3f33113f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48825%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48594-na-ddd17774</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48594%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48465-na-228e5a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48465%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b72b7ef31ef0b555811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48357-na-3d0732af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48357%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b70b7ef31ef0b555713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48356-na-a76ae661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48356%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b70b7ef31ef0b555710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-28-f12890</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50616-na-2949bae8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50616%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9ab7ef31ef0b557231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50615-na-30b664b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50615%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9ab7ef31ef0b55722e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50614-na-3d4bc71a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50614%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9ab7ef31ef0b55722b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50613-na-7e22ecec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9ab7ef31ef0b557228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50612-na-4837f322</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50612%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b9ab7ef31ef0b557225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50611-na-61ae7b3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50611%3A%20n%2Fa&amp;severity=high&amp;id=699f6b9ab7ef31ef0b557220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50610-na-1edf37b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50610%3A%20n%2Fa&amp;severity=low&amp;id=699f6b9ab7ef31ef0b55721b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50624-na-in-na-6e9c1fab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50624%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683aba2c182aa0cae2d7774d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-27-5193efc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-27&amp;severity=medium&amp;id=68367c99182aa0cae2321c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50602-n-a-in-n-a-bed749</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50602%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-27-760fee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-27&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb760fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-27-f124dd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f124dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9501-cwe-288-authentication-bypass-using--c917382a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9501%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20xpeedstudio%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=critical&amp;id=699f6b4fb7ef31ef0b551489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10402-cwe-862-missing-authorization-in-wp-0f175405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10402%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=699f6df4b7ef31ef0b5914ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10117-cwe-79-improper-neutralization-of-i-d75bc9f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20WP%20Crowdfunding&amp;severity=medium&amp;id=699f6decb7ef31ef0b590cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10357-cwe-200-exposure-of-sensitive-infor-2ae88e43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10357%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zootemplate%20Clever%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6df3b7ef31ef0b5913fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9116-cwe-79-improper-neutralization-of-in-05eb38ac</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monkeeboy%20Monkee-Boy%20Essentials&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9772-cwe-94-improper-control-of-generatio-61e4bc25</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9772%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20uiuxlab%20Uix%20Shortcodes%20%E2%80%93%20Compatible%20with%20Gutenberg&amp;severity=high&amp;id=699f6b5fb7ef31ef0b554bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9642-cwe-79-improper-neutralization-of-in-b2d84b25</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9642%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rock4temps%20Editor%20Custom%20Color%20Palette&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55307d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8392-cwe-98-improper-control-of-filename--b3105c58</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8392%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20delabon%20WordPress%20Post%20Grid%20Layouts%20with%20Pagination%20%E2%80%93%20Sogrid&amp;severity=high&amp;id=699f6c28b7ef31ef0b560921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9637-cwe-639-authorization-bypass-through-3e231d97</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9637%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20jdsofttech%20School%20Management%20System%20%E2%80%93%20WPSchoolPress&amp;severity=high&amp;id=699f6b56b7ef31ef0b553079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9967-cwe-79-improper-neutralization-of-in-195ced8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20renemaurer%20WP%20show%20more&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9853-cwe-79-improper-neutralization-of-in-65089706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9853%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20slovenskoit%20ID-SK%20Toolkit&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10092-cwe-862-missing-authorization-in-wp-d1d8a168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10092%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=699f6decb7ef31ef0b590bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9456-cwe-79-improper-neutralization-of-in-d186f463</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9456%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elvishp2006%20WP%20Awesome%20Login&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8870-cwe-79-improper-neutralization-of-in-de023d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Forms%20for%20Mailchimp%20by%20Optin%20Cat%20%E2%80%93%20Grow%20Your%20MailChimp%20List&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9613-cwe-79-improper-neutralization-of-in-630a340a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manidoraisamy%20FormFacade%20%E2%80%93%20WordPress%20plugin%20for%20Google%20Forms&amp;severity=medium&amp;id=699f6b54b7ef31ef0b5523ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9454-cwe-79-improper-neutralization-of-in-6476ac48</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9454%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miyabe%20PriPre&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10091-cwe-79-improper-neutralization-of-i-2ab0ebcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10091%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6decb7ef31ef0b590bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9930-cwe-288-authentication-bypass-using--1fbd8171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9930%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20skylarkcob%20Extensions%20by%20HocWP%20Team&amp;severity=critical&amp;id=699f6b65b7ef31ef0b554f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9932-cwe-434-unrestricted-upload-of-file--7a0d8f64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9932%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20jurredeklijn%20Wux%20Blog%20Editor&amp;severity=critical&amp;id=697395744623b1157c4bc72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9462-cwe-79-improper-neutralization-of-in-8de9974e</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b55147a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9475-cwe-89-improper-neutralization-of-sp-b8038557</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9475%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Versus%20Polls%2C%20Anonymous%20Polls%2C%20Image%20Polls&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9626-cwe-862-missing-authorization-in-zem-0ea38faf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9626%3A%20CWE-862%20Missing%20Authorization%20in%20zemanta%20Editorial%20Assistant%20by%20Sovrn&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9890-cwe-288-authentication-bypass-using--bee50964</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9890%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20deryck%20User%20Toolkit&amp;severity=high&amp;id=699f6b63b7ef31ef0b554e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9931-cwe-288-authentication-bypass-using--9a213b7d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9931%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20jurredeklijn%20Wux%20Blog%20Editor&amp;severity=critical&amp;id=699f6b65b7ef31ef0b554f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-26-13eb886e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-26&amp;severity=medium&amp;id=68367c99182aa0cae232282c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-26-763549</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-26&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb763549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-26-f12478</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9584-cwe-862-missing-authorization-in-ima-6a3d1ed5</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9584%3A%20CWE-862%20Missing%20Authorization%20in%20imagemappro%20Image%20Map%20Pro%20%E2%80%93%20Drag-and-drop%20Builder%20for%20Interactive%20Images&amp;severity=medium&amp;id=699f6b52b7ef31ef0b55228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9585-cwe-79-improper-neutralization-of-in-2b2ad344</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9585%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20imagemappro%20Image%20Map%20Pro%20%E2%80%93%20Drag-and-drop%20Builder%20for%20Interactive%20Images&amp;severity=medium&amp;id=699f6b52b7ef31ef0b55228e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10374-cwe-79-improper-neutralization-of-i-f00108d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10374%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=699f6df3b7ef31ef0b591418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8666-cwe-79-improper-neutralization-of-in-756199b8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svnlabs%20Shoutcast%20Icecast%20HTML5%20Radio%20Player&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10112-cwe-79-improper-neutralization-of-i-e17c7a6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10112%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mortenpeterandersen%20Simple%20News&amp;severity=medium&amp;id=699f6decb7ef31ef0b590ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10343-cwe-79-improper-neutralization-of-i-2658beb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20beekyoshida%20Beek%20Widget%20Extention&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10016-cwe-79-improper-neutralization-of-i-6e408477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10016%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jaredatch%20File%20Upload%20Types%20by%20WPForms&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9628-cwe-862-missing-authorization-in-wps-72475435</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9628%3A%20CWE-862%20Missing%20Authorization%20in%20wpsolution%20WPS%20Telegram%20Chat&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9630-cwe-862-missing-authorization-in-wps-3d5899ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9630%3A%20CWE-862%20Missing%20Authorization%20in%20wpsolution%20WPS%20Telegram%20Chat&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9598-cwe-352-cross-site-request-forgery-c-02c5e016</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9598%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=high&amp;id=699f6b54b7ef31ef0b55238b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10150-cwe-79-improper-neutralization-of-i-2b148486</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10150%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bamazoo%20Bamazoo%20%E2%80%93%20Button%20Generator&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10342-cwe-79-improper-neutralization-of-i-c3a7d9cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10342%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tezzeract%20League%20of%20Legends%20Shortcodes&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10341-cwe-89-improper-neutralization-of-s-53c739c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tezzeract%20League%20of%20Legends%20Shortcodes&amp;severity=medium&amp;id=699f6df2b7ef31ef0b5912d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9607-cwe-79-improper-neutralization-of-in-0da887a2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9607%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%2010Web%20Social%20Post%20Feed&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9235-cwe-285-improper-authorization-in-ma-bcd1bfb3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9235%3A%20CWE-285%20Improper%20Authorization%20in%20mapster%20Mapster%20WP%20Maps&amp;severity=high&amp;id=699f6b45b7ef31ef0b550b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10148-cwe-79-improper-neutralization-of-i-2bbed743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10148%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sohelwpexpert%20Awesome%20buttons&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9302-cwe-640-weak-password-recovery-mecha-efe0feea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9302%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=high&amp;id=699f6b49b7ef31ef0b550e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9488-cwe-288-authentication-bypass-using--561a68f0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9488%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20advancedcoding%20Comments%20%E2%80%93%20wpDiscuz&amp;severity=critical&amp;id=699f6b4fb7ef31ef0b551484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9109-cwe-862-missing-authorization-in-oct-b18e57df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9109%3A%20CWE-862%20Missing%20Authorization%20in%20octolize%20WooCommerce%20UPS%20Shipping%20%E2%80%93%20Live%20Rates%20and%20Access%20Points&amp;severity=medium&amp;id=699f6b3fb7ef31ef0b54fbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9686-cwe-862-missing-authorization-in-cho-d9de28c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9686%3A%20CWE-862%20Missing%20Authorization%20in%20choplugins%20Order%20Notification%20for%20Telegram&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5547f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48343-na-0d9f2c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48343%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d14b7ef31ef0b56db78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48239-na-5e22fedf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48239%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d11b7ef31ef0b56d9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48238-na-8cdedb6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48238%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d11b7ef31ef0b56d9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48237-na-2c2aed97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48237%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d11b7ef31ef0b56d9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48236-na-1bb275af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48236%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48235-na-a3a2552e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48235%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48234-na-67a8c852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48234%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48233-na-04109175</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48233%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48232-na-cd1ff5b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48232%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48230-na-9d642d42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48230%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48229-na-9a90e864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48229%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48228-na-224a1dd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48228%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48227-na-31cd617c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48227%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0fb7ef31ef0b56d918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48226-na-a204698c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48226%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48225-na-6682b60f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48225%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48224-na-a831da78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48224%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0fb7ef31ef0b56d8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48223-na-5675b810</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48223%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48222-na-e91d9213</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48222%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48218-na-0c5562a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48218%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0fb7ef31ef0b56d8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48204-na-63f99e28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48204%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37847-na-7eaed38d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37847%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c71b7ef31ef0b564125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37846-na-5a9ef5d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37846%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c71b7ef31ef0b564121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37845-na-4c291def</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37845%3A%20n%2Fa&amp;severity=high&amp;id=699f6c71b7ef31ef0b56411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37844-na-f941f639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37844%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c71b7ef31ef0b564119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48743-na-98386d2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48743%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48700-na-9335a386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48700%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48655-na-fe0eaea2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48655%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48654-na-ce24b95f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48654%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b76b7ef31ef0b555a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48581-na-6a464b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48581%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b74b7ef31ef0b55597f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48580-na-de12c158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48580%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b74b7ef31ef0b555938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48579-na-449883f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48579%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b74b7ef31ef0b555935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48459-na-fe76e969</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48459%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b555803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48450-na-f1c99a02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48450%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48448-na-c614e691</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48448%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48396-na-88a477a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48396%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-25-f11f5a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48932-cwe-284-improper-access-control-in--c7fc874a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48932%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20IceWhaleTech%20ZimaOS&amp;severity=medium&amp;id=690bc2956ab8174a0d403374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10295-incorrect-authorization-4899ac28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10295%3A%20Incorrect%20Authorization&amp;severity=high&amp;id=691ebfd49f5a9374a9cb440e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44206-a-user-may-be-able-to-bypass-some-w-82ce09f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44206%3A%20A%20user%20may%20be%20able%20to%20bypass%20some%20web%20content%20restrictions%20in%20Apple%20Safari&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44205-a-sandboxed-app-may-be-able-to-acce-d79a21cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44205%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb82ce6bfc5ba1df6ea6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44141-a-person-with-physical-access-to-an-1c7de6b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44141%3A%20A%20person%20with%20physical%20access%20to%20an%20unlocked%20Mac%20may%20be%20able%20to%20gain%20root%20code%20execution%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40810-an-app-may-be-able-to-cause-a-copro-0af0c5ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40810%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20coprocessor%20crash%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb827e6bfc5ba1df6e91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44185-processing-maliciously-crafted-web--6b780526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44185%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a1fe7723195e0fd1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49693-improper-neutralization-of-input-du-1122462e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kraft%20Plugins%20Mega%20Elements&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49695-improper-neutralization-of-input-du-8f355c5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49695%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiffy%20Plugins%20WP%20Flow%20Plus&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10180-cwe-79-improper-neutralization-of-i-297312a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10180%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20felipeelia%20Contact%20Form%207%20%E2%80%93%20Repeatable%20Fields&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49696-improper-neutralization-of-input-du-048014d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49696%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Robo%20Gallery&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49702-improper-neutralization-of-input-du-9425d95a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred%20Elementor&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49703-improper-neutralization-of-input-du-31eeac06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20WpEvently&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49681-improper-neutralization-of-special--42cbf8da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49681%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20activity-log.com%20WP%20Sessions%20Time%20Monitoring%20Full%20Automatic&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49691-improper-neutralization-of-special--dbe3b03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49691%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WBW%20Plugins%20Product%20Filter%20by%20WBW&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df0199d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49683-missing-authorization-in-magazine3--43bb4c52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49683%3A%20Missing%20Authorization%20in%20Magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49682-url-redirection-to-untrusted-site-o-5cb5dd6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49682%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wp.insider%20Simple%20Membership&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8959-cwe-79-improper-neutralization-of-in-a242dbeb</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20WP%20Adminify%20%E2%80%93%20Custom%20WordPress%20Dashboard%2C%20Login%20and%20Admin%20Customizer&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10176-cwe-79-improper-neutralization-of-i-b94cbc34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10176%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Compact%20WP%20Audio%20Player&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9214-cwe-79-improper-neutralization-of-in-175d8bf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9214%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20edgarrojas%20Extra%20Product%20Options%20Builder%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9650-cwe-79-improper-neutralization-of-in-ffdff57a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8717-cwe-79-improper-neutralization-of-in-151f6409</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8717%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20Dear%20Flipbook%20%E2%80%93%20PDF%20Flipbook%2C%203D%20Flipbook%2C%20PDF%20embed%2C%20PDF%20viewer&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10050-cwe-200-exposure-of-sensitive-infor-1c44a3e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10050%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6decb7ef31ef0b590b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9943-cwe-352-cross-site-request-forgery-c-b1cba6e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9943%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wcmp%20MultiVendorX%20%E2%80%93%20The%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8667-cwe-862-missing-authorization-in-nle-705165fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8667%3A%20CWE-862%20Missing%20Authorization%20in%20nlemsieh%20HurryTimer%20%E2%80%93%20An%20Scarcity%20and%20Urgency%20Countdown%20Timer%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9531-cwe-285-improper-authorization-in-wc-61e9fc42</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9531%3A%20CWE-285%20Improper%20Authorization%20in%20wcmp%20MultiVendorX%20%E2%80%93%20The%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9864-cwe-79-improper-neutralization-of-in-19912d2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9864%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9865-cwe-79-improper-neutralization-of-in-24c90ac8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9374-cwe-79-improper-neutralization-of-in-f730fda6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9374%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vladimirs%20Terms%20descriptions&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48208-na-9822fbc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48208%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0fb7ef31ef0b56d8bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48145-na-1d0073ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48145%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48144-na-28eaff95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48144%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48143-na-efa5b1ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48143%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48142-na-3dbb7dfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48142%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0db7ef31ef0b56d7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48141-na-f75e277f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48141%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0bb7ef31ef0b56d742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48140-na-a26ca913</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48140%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0bb7ef31ef0b56d73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48139-na-9f8d22f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48139%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0bb7ef31ef0b56d73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46478-na-b97fb49b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46478%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d00b7ef31ef0b56c29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45263-na-0fbd8ea7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45263%3A%20n%2Fa&amp;severity=high&amp;id=699f6cecb7ef31ef0b56a3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45262-na-9124b6ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45262%3A%20n%2Fa&amp;severity=high&amp;id=699f6cecb7ef31ef0b56a3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45261-na-54e91e39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45261%3A%20n%2Fa&amp;severity=high&amp;id=699f6cecb7ef31ef0b56a3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45260-na-48d183ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45260%3A%20n%2Fa&amp;severity=high&amp;id=699f6cecb7ef31ef0b56a3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45259-na-5fd59d14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45259%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cecb7ef31ef0b56a3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45242-na-1754e838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45242%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41618-na-c777f6e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41618%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbdb7ef31ef0b568944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41617-na-a231dab0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41617%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbdb7ef31ef0b56893e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40595-na-15723d97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40595%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b568070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48548-na-2c78d883</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48548%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b74b7ef31ef0b55592b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48547-na-8da69d7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48547%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48546-na-0416e4ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48546%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48545-na-95832b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48545%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48544-na-cee01038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48544%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b55591d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48542-na-0a0cd5fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48542%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b55591a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48541-na-d6a3f904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48541%3A%20n%2Fa&amp;severity=high&amp;id=699f6b72b7ef31ef0b55589d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48540-na-68dda6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48540%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b72b7ef31ef0b55589a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48539-na-3359db3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48539%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b72b7ef31ef0b555895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48538-na-a8daad11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48538%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b72b7ef31ef0b555890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48514-na-1ff0d567</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48514%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b72b7ef31ef0b55581e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48454-na-e42d963f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48454%3A%20n%2Fa&amp;severity=high&amp;id=699f6b70b7ef31ef0b555791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48442-na-c1201e6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48442%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48441-na-2499e4ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48441%3A%20n%2Fa&amp;severity=high&amp;id=699f6b70b7ef31ef0b555780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48440-na-19887851</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48440%3A%20n%2Fa&amp;severity=high&amp;id=699f6b70b7ef31ef0b55577d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48427-na-bab8c2d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48427%3A%20n%2Fa&amp;severity=high&amp;id=699f6b70b7ef31ef0b555779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48426-na-94a04b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48426%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48425-na-e082c4d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48425%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48424-na-baa89fa2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48424%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b55572a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48423-na-517aa0a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48423%3A%20n%2Fa&amp;severity=high&amp;id=699f6b70b7ef31ef0b555727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-cobalt-whisper-threat-actor-targets-mult-31b9edb6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Cobalt%20Whisper%3A%20Threat%20Actor%20Targets%20Multiple%20Industries%20Across%20Hong%20Kong%20and%20Pakistan.&amp;severity=low&amp;id=68367c09182aa0cae2310861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-24-f12b82</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-cobalt-whisper-threat-actor-targets-multiple-industries-across-hong-kong-and-pakistan-f0c31a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Cobalt%20Whisper%3A%20Threat%20Actor%20Targets%20Multiple%20Industries%20Across%20Hong%20Kong%20and%20Pakistan.&amp;severity=low&amp;id=682acdbebbaf20d303f0c31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/investigating-fortimanager-zero-day-exploitation-cve-2024-47575-f0c314</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Investigating%20FortiManager%20Zero-Day%20Exploitation%20(CVE-2024-47575)&amp;severity=low&amp;id=682acdbebbaf20d303f0c314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20481-missing-release-of-resource-after-e-896657f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20481%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=68f7d9b1247d717aace26918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20340-improper-neutralization-of-special--6243c051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20340%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Management%20Center%20(FMC)&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49652-unrestricted-upload-of-file-with-da-bc06cd2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49652%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Renata%20Bracichowicz%203D%20Work%20In%20Progress&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df0175e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49653-unrestricted-upload-of-file-with-da-e1088305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49653%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20james-eggers%20Portfolleo&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df01761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49658-unrestricted-upload-of-file-with-da-31bc973a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49658%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ecomerciar%20Woocommerce%20Custom%20Profile%20Picture&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df01770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49668-unrestricted-upload-of-file-with-da-925595fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49668%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20christopherdewese1099%20Verbalize%20WP&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df0186c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49669-unrestricted-upload-of-file-with-da-ebf01239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49669%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Alexander%20De%20Ridder%20INK%20Official&amp;severity=null&amp;id=69cd74e2e6bfc5ba1df01872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49676-unrestricted-upload-of-file-with-da-3eddd786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49676%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Michael%20Bourne%20Custom%20Icons%20for%20Elementor&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49690-improper-control-of-filename-for-in-d4bb2da1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49690%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Qode%20Qi%20Blocks&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df0199a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49701-improper-control-of-filename-for-in-316e4854</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49701%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themehorse%20Mags&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49684-deserialization-of-untrusted-data-i-2f3cb7db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49684%3A%20Deserialization%20of%20Untrusted%20Data%20in%20revmakx%20Backup%20and%20Staging%20by%20WP%20Time%20Capsule&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49657-missing-authorization-in-renata-bra-7c1771c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49657%3A%20Missing%20Authorization%20in%20Renata%20Bracichowicz%203D%20Work%20In%20Progress&amp;severity=null&amp;id=69cd74dfe6bfc5ba1df0176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49675-authentication-bypass-using-an-alte-7e792702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49675%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Vitalii%20iBryl%20Switch%20User&amp;severity=null&amp;id=69cd74e3e6bfc5ba1df018d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10250-cwe-79-improper-neutralization-of-i-e6c3d5e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10250%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SteelThemes%20Nioland%20-%20SaaS%20%26%20Software%20Startup%20Tech%20WordPress%20Theme&amp;severity=medium&amp;id=699f6defb7ef31ef0b591000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10041-insecure-storage-of-sensitive-infor-092f3370</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10041%3A%20Insecure%20Storage%20of%20Sensitive%20Information&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50050-deserialization-of-untrusted-data-c-5e69fc93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50050%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Meta%20Platforms%2C%20Inc%20Llama%20Stack&amp;severity=medium&amp;id=699f6b99b7ef31ef0b557172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8500-cwe-79-improper-neutralization-of-in-5048247c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9530-cwe-200-exposure-of-sensitive-inform-99ce9c00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9530%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10045-cwe-352-cross-site-request-forgery--a753bc4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10045%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20Transients%20Manager&amp;severity=medium&amp;id=699f6debb7ef31ef0b590b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9947-cwe-287-improper-authentication-in-p-c12ee67a</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9947%3A%20CWE-287%20Improper%20Authentication%20in%20ProfilePress%20Team%20ProfilePress%20Pro&amp;severity=high&amp;id=699f6b65b7ef31ef0b554fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9583-cwe-862-missing-authorization-in-jea-37e65a6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9583%3A%20CWE-862%20Missing%20Authorization%20in%20jeangalea%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=699f6b52b7ef31ef0b552285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9829-cwe-862-missing-authorization-in-met-4f28175e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9829%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20Download%20Plugin&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50066-vulnerability-in-linux-linux-bdfe41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9927-cwe-287-improper-authentication-in-w-7ccb5e19</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9927%3A%20CWE-287%20Improper%20Authentication%20in%20WP%20Overnight%20BV%20WooCommerce%20Order%20Proposal&amp;severity=high&amp;id=699f6b65b7ef31ef0b554f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31880-cwe-770-allocation-of-resources-wit-7cb7222f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31880%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2debf0ba78a050536ecf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48213-na-1e12708c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48213%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0fb7ef31ef0b56d8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40432-na-dd0deacd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40432%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca9b7ef31ef0b567d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40431-na-1ef0673f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40431%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca9b7ef31ef0b567d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50383-na-a520960f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50383%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b99b7ef31ef0b55717b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50382-na-79017ab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50382%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b99b7ef31ef0b557175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-23-f12687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7587-cwe-276-incorrect-default-permission-48f86a25</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7587%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Mitsubishi%20Electric%20Corporation%20GENESIS64&amp;severity=high&amp;id=69609893ecefc3cd7c0975e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9287-cwe-428-unquoted-search-path-or-element-in-python-software-foundation-cpython-befae1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9287%3A%20CWE-428%20Unquoted%20Search%20Path%20or%20Element%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=682d983ec4522896dcbefae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38002-cwe-862-missing-authorization-in-li-26f00c43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38002%3A%20CWE-862%20Missing%20Authorization%20in%20Liferay%20Portal&amp;severity=critical&amp;id=68ed57c406a2a330d326046f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50312-exposure-of-sensitive-information-t-779ca55c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50312%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204.16&amp;severity=medium&amp;id=68e8557cba0e608b4fb1ef00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50311-allocation-of-resources-without-lim-3db13e00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50311%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204.18&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10234-improper-neutralization-of-input-du-cede4d9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6843308371f4d251b5d72866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9050-improper-control-of-generation-of-co-2a4cf425</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9050%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=68e0f3c3b66c7f7acdd3e9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10189-cwe-79-improper-neutralization-of-i-c3d947ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeswd%20Anchor%20Episodes%20Index%20(Spotify%20for%20Podcasters)&amp;severity=medium&amp;id=699f6deeb7ef31ef0b590f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9231-cwe-79-improper-neutralization-of-in-75738128</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9231%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52919-vulnerability-in-linux-linux-be7909</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52918-vulnerability-in-linux-linux-be7901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9541-cwe-200-exposure-of-sensitive-inform-d05f38d9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9541%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20blazethemes%20News%20Kit%20Elementor%20Addons&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9589-cwe-79-improper-neutralization-of-in-a934268a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9589%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Category%20and%20Taxonomy%20Meta%20Fields&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5522a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9591-cwe-79-improper-neutralization-of-in-0f31034c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Category%20and%20Taxonomy%20Image&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5522a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9590-cwe-79-improper-neutralization-of-in-36feec21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amu02aftab%20Category%20and%20Taxonomy%20Meta%20Fields&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5522a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9588-cwe-352-cross-site-request-forgery-c-454e76c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20amu02aftab%20Category%20and%20Taxonomy%20Meta%20Fields&amp;severity=medium&amp;id=699f6b52b7ef31ef0b55229c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9627-cwe-200-exposure-of-sensitive-inform-b1cc8468</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9627%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gsuvorov%20TeploBot%20%E2%80%93%20Telegram%20Bot%20for%20WP&amp;severity=high&amp;id=699f6b54b7ef31ef0b55243d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8852-cwe-200-exposure-of-sensitive-inform-3f2a272b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8852%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20yaniiliev%20All-in-One%20WP%20Migration%20and%20Backup&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10003-cwe-862-missing-authorization-in-st-75a6f43d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10003%3A%20CWE-862%20Missing%20Authorization%20in%20stevemullen%20Rover%20IDX&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10002-cwe-288-authentication-bypass-using-2a3aac30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10002%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20stevemullen%20Rover%20IDX&amp;severity=high&amp;id=699f6deab7ef31ef0b5909d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31029-na-310ae519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31029%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd0b7ef31ef0b58ece2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26519-na-555738b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26519%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d79b7ef31ef0b572b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46538-na-1065f9e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46538%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d02b7ef31ef0b56c3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46482-na-e2721a26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46482%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46240-na-e6604708</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46240%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45526-na-9b98ed68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45526%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45518-na-2712095d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45518%3A%20n%2Fa&amp;severity=high&amp;id=699f6cefb7ef31ef0b56a4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44812-na-882a102e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44812%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce4b7ef31ef0b569f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44331-na-8b0b857f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44331%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b569919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42643-na-609d428b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42643%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc8b7ef31ef0b56902f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40494-na-e9a3f787</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40494%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40493-na-32e8cd0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40493%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cabb7ef31ef0b567ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49211-na-5bba7bc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49211%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49210-na-4aac4754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49210%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48708-na-d06748a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48708%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48707-na-1af5db06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48707%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48657-na-2581f8d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48657%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48656-na-510491ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48656%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b76b7ef31ef0b555a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48652-na-63b13673</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48652%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b76b7ef31ef0b555a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48644-na-8304f010</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48644%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b76b7ef31ef0b555a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48605-na-fb88658e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48605%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48570-na-2919d964</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48570%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b55592f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48415-na-384d1642</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48415%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b70b7ef31ef0b555724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-10-22-7f6e3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-10-22&amp;severity=medium&amp;id=682b68ded14de609c87f6e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-22-f12bd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10125-cwe-290-authentication-bypass-by-sp-259d6705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10125%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Amazon%20Amazon.ApplicationLoadBalancer.Identity.AspNetCore%20Middleware&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8901-cwe-290-authentication-bypass-by-spo-277b770a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8901%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Amazon%20AWS%20ALB%20Route%20Directive%20Adapter%20For%20Istio&amp;severity=medium&amp;id=68ee9ff531414aa8fc5df0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49033-vulnerability-in-linux-linux-be69af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe69af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49032-vulnerability-in-linux-linux-be6993</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49031-vulnerability-in-linux-linux-be698f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe698f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49030-vulnerability-in-linux-linux-be698b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe698b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49029-vulnerability-in-linux-linux-be697e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe697e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49028-vulnerability-in-linux-linux-be697a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe697a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49027-vulnerability-in-linux-linux-be6976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49026-vulnerability-in-linux-linux-be6972</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49025-vulnerability-in-linux-linux-be696e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe696e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49024-vulnerability-in-linux-linux-be696a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe696a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49023-vulnerability-in-linux-linux-be6966</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49022-vulnerability-in-linux-linux-be6938</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49021-vulnerability-in-linux-linux-be6934</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49020-vulnerability-in-linux-linux-be6930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49019-vulnerability-in-linux-linux-be692c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe692c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49018-vulnerability-in-linux-linux-bdd5b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49017-vulnerability-in-linux-linux-be691b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe691b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49016-vulnerability-in-linux-linux-be6913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49015-vulnerability-in-linux-linux-be690b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe690b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49014-vulnerability-in-linux-linux-be6905</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49013-vulnerability-in-linux-linux-be6901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49012-vulnerability-in-linux-linux-be68fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49011-vulnerability-in-linux-linux-be68d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49010-vulnerability-in-linux-linux-be68cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49009-vulnerability-in-linux-linux-be68c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49008-vulnerability-in-linux-linux-be68c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49007-vulnerability-in-linux-linux-be68c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49006-vulnerability-in-linux-linux-be68bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe68bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49005-vulnerability-in-linux-linux-bdd5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49004-vulnerability-in-linux-linux-be68b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49003-vulnerability-in-linux-linux-be68ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe68ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49002-vulnerability-in-linux-linux-be68a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe68a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49001-vulnerability-in-linux-linux-be68a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe68a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-49000-vulnerability-in-linux-linux-be6878</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-49000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48999-vulnerability-in-linux-linux-be6874</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48998-vulnerability-in-linux-linux-be6870</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48997-vulnerability-in-linux-linux-be686a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe686a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48996-vulnerability-in-linux-linux-be6866</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48995-vulnerability-in-linux-linux-be6862</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48994-vulnerability-in-linux-linux-be685e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe685e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48992-vulnerability-in-linux-linux-be6851</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48991-vulnerability-in-linux-linux-be684d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe684d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48990-vulnerability-in-linux-linux-aebf8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48989-vulnerability-in-linux-linux-be683c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe683c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48988-vulnerability-in-linux-linux-be681b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe681b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48987-vulnerability-in-linux-linux-be6817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48986-vulnerability-in-linux-linux-bdd597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48985-vulnerability-in-linux-linux-be6813</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48984-vulnerability-in-linux-linux-be680f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe680f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48983-vulnerability-in-linux-linux-be680b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48982-vulnerability-in-linux-linux-be6807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48981-vulnerability-in-linux-linux-be6803</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48980-vulnerability-in-linux-linux-be67ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe67ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48979-vulnerability-in-linux-linux-be67f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe67f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48978-vulnerability-in-linux-linux-be67e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48977-vulnerability-in-linux-linux-bdd591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48976-vulnerability-in-linux-linux-bdd58d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48975-vulnerability-in-linux-linux-be67c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48974-vulnerability-in-linux-linux-be67bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe67bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48973-vulnerability-in-linux-linux-be67b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48972-vulnerability-in-linux-linux-be67b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48971-vulnerability-in-linux-linux-be67ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48970-vulnerability-in-linux-linux-be67aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48969-vulnerability-in-linux-linux-be67a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe67a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48968-vulnerability-in-linux-linux-be67a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe67a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48967-vulnerability-in-linux-linux-be6795</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48966-vulnerability-in-linux-linux-be6791</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48965-vulnerability-in-linux-linux-be676b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe676b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48964-vulnerability-in-linux-linux-be6763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48963-vulnerability-in-linux-linux-be675b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe675b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48962-vulnerability-in-linux-linux-be6757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48961-vulnerability-in-linux-linux-be6753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48960-vulnerability-in-linux-linux-be674f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe674f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48959-vulnerability-in-linux-linux-be673e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe673e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48958-vulnerability-in-linux-linux-be6736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48957-vulnerability-in-linux-linux-be6730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48956-vulnerability-in-linux-linux-be672a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe672a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48955-vulnerability-in-linux-linux-be6706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48954-vulnerability-in-linux-linux-be6702</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48953-vulnerability-in-linux-linux-be66fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe66fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48952-vulnerability-in-linux-linux-bdd589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48951-vulnerability-in-linux-linux-be66ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe66ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48950-vulnerability-in-linux-linux-be66e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe66e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48949-vulnerability-in-linux-linux-be66dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe66dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48948-vulnerability-in-linux-linux-be66d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe66d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48947-vulnerability-in-linux-linux-be66d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe66d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48946-vulnerability-in-linux-linux-be66c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe66c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50065-vulnerability-in-linux-linux-bdcef8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50064-vulnerability-in-linux-linux-bdfe39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfe39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50063-vulnerability-in-linux-linux-bdfe35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50062-vulnerability-in-linux-linux-bdfe31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfe31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50061-vulnerability-in-linux-linux-bdfe1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50060-vulnerability-in-linux-linux-bdfe16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50059-vulnerability-in-linux-linux-bdfe12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50058-vulnerability-in-linux-linux-bdfe0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfe0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50057-vulnerability-in-linux-linux-bdfde8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfde8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50056-vulnerability-in-linux-linux-bdfde0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfde0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50055-vulnerability-in-linux-linux-bdfdd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50049-vulnerability-in-linux-linux-aec073</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50048-vulnerability-in-linux-linux-aec071</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50047-vulnerability-in-linux-linux-bdfdd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50046-vulnerability-in-linux-linux-bdfdc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50045-vulnerability-in-linux-linux-bdfdb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50044-vulnerability-in-linux-linux-bdfdaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfdaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50043-vulnerability-in-linux-linux-bdfda2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50042-vulnerability-in-linux-linux-bdcef4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50041-vulnerability-in-linux-linux-bdcef0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50040-vulnerability-in-linux-linux-bdceec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdceec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50039-vulnerability-in-linux-linux-bdfd9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50038-vulnerability-in-linux-linux-bdfd81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50037-vulnerability-in-linux-linux-bdfd7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfd7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50036-vulnerability-in-linux-linux-bdcee8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50035-vulnerability-in-linux-linux-bdfd6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50034-vulnerability-in-linux-linux-bdfd66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50033-vulnerability-in-linux-linux-bdfd62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50032-vulnerability-in-linux-linux-bdcee4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50031-vulnerability-in-linux-linux-bdfd5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50030-vulnerability-in-linux-linux-bdfd51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50029-vulnerability-in-linux-linux-bdfd4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50028-vulnerability-in-linux-linux-bdfd49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50027-vulnerability-in-linux-linux-bdfd45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50026-vulnerability-in-linux-linux-bdfd28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50025-vulnerability-in-linux-linux-bdfd19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50024-vulnerability-in-linux-linux-bdfd11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50023-vulnerability-in-linux-linux-bdfd09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50022-vulnerability-in-linux-linux-bdfd01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50021-vulnerability-in-linux-linux-bdfcf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50020-vulnerability-in-linux-linux-bdfcf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50019-vulnerability-in-linux-linux-bdfcf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50017-vulnerability-in-linux-linux-bdfce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50016-bd71bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50016&amp;severity=low&amp;id=682d9817c4522896dcbd71bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50015-vulnerability-in-linux-linux-bdfce0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50014-vulnerability-in-linux-linux-bdfcc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50013-vulnerability-in-linux-linux-bdfcb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50012-vulnerability-in-linux-linux-bdfcb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50011-vulnerability-in-linux-linux-bdfcae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50010-vulnerability-in-linux-linux-bdfca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50009-vulnerability-in-linux-linux-bdfc9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50008-vulnerability-in-linux-linux-bdfc9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50007-vulnerability-in-linux-linux-bdfc96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50006-vulnerability-in-linux-linux-bdfc87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50005-vulnerability-in-linux-linux-bdfc83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50004-vulnerability-in-linux-linux-bdfc65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50003-vulnerability-in-linux-linux-bdfc5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50002-vulnerability-in-linux-linux-bdfc55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50001-vulnerability-in-linux-linux-bdfc4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-50000-vulnerability-in-linux-linux-bdfc47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-50000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49999-vulnerability-in-linux-linux-bdfc43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49998-vulnerability-in-linux-linux-bdcee0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49997-vulnerability-in-linux-linux-bdfc3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49996-vulnerability-in-linux-linux-bdfc39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49995-bf1483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49995&amp;severity=medium&amp;id=682d9840c4522896dcbf1483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49994-vulnerability-in-linux-linux-bdfc2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49992-vulnerability-in-linux-linux-bdfc26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49991-vulnerability-in-linux-linux-aec06f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49990-vulnerability-in-linux-linux-bdfc06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfc06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49989-vulnerability-in-linux-linux-bdfc02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfc02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49988-vulnerability-in-linux-linux-bdfbfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49987-vulnerability-in-linux-linux-aec06d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49986-vulnerability-in-linux-linux-bdfbfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49985-vulnerability-in-linux-linux-bdfbf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49984-vulnerability-in-linux-linux-bdfbf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49983-vulnerability-in-linux-linux-bdfbee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49982-vulnerability-in-linux-linux-bdcedc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49981-vulnerability-in-linux-linux-bdfbea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49980-vulnerability-in-linux-linux-bdfbe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49979-vulnerability-in-linux-linux-bdfbe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49978-vulnerability-in-linux-linux-bdfbcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49977-vulnerability-in-linux-linux-bdced8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdced8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49976-vulnerability-in-linux-linux-bdfbc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfbc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49975-vulnerability-in-linux-linux-bdfbc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49974-vulnerability-in-linux-linux-aec06b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49973-vulnerability-in-linux-linux-bdfbc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49972-vulnerability-in-linux-linux-bdfbc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49971-vulnerability-in-linux-linux-bdfbb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49970-vulnerability-in-linux-linux-bdfba3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49969-vulnerability-in-linux-linux-aec069</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49968-vulnerability-in-linux-linux-bdfb9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49966-vulnerability-in-linux-linux-bdfb93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49965-vulnerability-in-linux-linux-bdcec7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49964-vulnerability-in-linux-linux-bdfb8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49963-vulnerability-in-linux-linux-bdfb6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49962-vulnerability-in-linux-linux-aec067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49961-vulnerability-in-linux-linux-bdfb6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49960-vulnerability-in-linux-linux-aec065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49959-vulnerability-in-linux-linux-bdfb68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49958-vulnerability-in-linux-linux-bdceb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdceb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49957-vulnerability-in-linux-linux-bdfb4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49956-vulnerability-in-linux-linux-bdfb46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49955-vulnerability-in-linux-linux-bdfb3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49954-vulnerability-in-linux-linux-bdfb36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49953-vulnerability-in-linux-linux-bdfb2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49952-vulnerability-in-linux-linux-bdfb28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49951-vulnerability-in-linux-linux-bdfb24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9824c4522896dcbdfb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49950-vulnerability-in-linux-linux-bdfb06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfb06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49949-vulnerability-in-linux-linux-bdceac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdceac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49948-vulnerability-in-linux-linux-bdfb02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9824c4522896dcbdfb02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49947-vulnerability-in-linux-linux-bdcea8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49946-vulnerability-in-linux-linux-be0ad9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49945-vulnerability-in-linux-linux-be0ad5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49944-vulnerability-in-linux-linux-be0ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49943-vulnerability-in-linux-linux-be0abe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49942-vulnerability-in-linux-linux-be0ab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49941-vulnerability-in-linux-linux-be0aae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49940-vulnerability-in-linux-linux-be0a8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49939-vulnerability-in-linux-linux-be0a82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49938-vulnerability-in-linux-linux-be0a7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49937-vulnerability-in-linux-linux-be0a72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49936-vulnerability-in-linux-linux-aec063</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49935-vulnerability-in-linux-linux-be0a6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49934-vulnerability-in-linux-linux-be0a5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49933-vulnerability-in-linux-linux-aeb067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49932-vulnerability-in-linux-linux-be0a4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49931-vulnerability-in-linux-linux-be0a42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49930-vulnerability-in-linux-linux-be0a3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49929-vulnerability-in-linux-linux-aec056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49928-vulnerability-in-linux-linux-aeb05a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49927-vulnerability-in-linux-linux-be0a32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49926-vulnerability-in-linux-linux-be0a0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49925-vulnerability-in-linux-linux-aec054</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49924-vulnerability-in-linux-linux-be0a06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49923-vulnerability-in-linux-linux-be09fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49922-vulnerability-in-linux-linux-be09f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49921-vulnerability-in-linux-linux-be09ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49920-vulnerability-in-linux-linux-be09df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49919-vulnerability-in-linux-linux-be09d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49918-vulnerability-in-linux-linux-be09c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49917-vulnerability-in-linux-linux-be09c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49916-vulnerability-in-linux-linux-be09b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49915-vulnerability-in-linux-linux-be09a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe09a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49914-vulnerability-in-linux-linux-be099d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49913-vulnerability-in-linux-linux-be0999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49912-vulnerability-in-linux-linux-be0995</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49911-vulnerability-in-linux-linux-be0991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49910-vulnerability-in-linux-linux-be0980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49909-vulnerability-in-linux-linux-aec052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49908-vulnerability-in-linux-linux-be0971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49907-vulnerability-in-linux-linux-be0969</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49906-vulnerability-in-linux-linux-be0961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49905-vulnerability-in-linux-linux-be0959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49904-vulnerability-in-linux-linux-be0944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49903-vulnerability-in-linux-linux-be0940</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49902-vulnerability-in-linux-linux-be093c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe093c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49901-vulnerability-in-linux-linux-be0938</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49900-vulnerability-in-linux-linux-be0934</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49899-vulnerability-in-linux-linux-be0927</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49898-vulnerability-in-linux-linux-aec050</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49897-vulnerability-in-linux-linux-be0923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49896-vulnerability-in-linux-linux-aec04e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49895-vulnerability-in-linux-linux-be091f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe091f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49894-vulnerability-in-linux-linux-be090e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49893-vulnerability-in-linux-linux-be0906</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49892-vulnerability-in-linux-linux-be08ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe08ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49891-vulnerability-in-linux-linux-be08e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe08e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49890-vulnerability-in-linux-linux-aec04c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49889-vulnerability-in-linux-linux-be08d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9825c4522896dcbe08d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49888-vulnerability-in-linux-linux-be08ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe08ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49887-vulnerability-in-linux-linux-be08c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe08c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49886-vulnerability-in-linux-linux-be08b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe08b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49885-vulnerability-in-linux-linux-be08ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe08ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49884-vulnerability-in-linux-linux-be08a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe08a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49883-vulnerability-in-linux-linux-be089d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe089d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49882-vulnerability-in-linux-linux-be0899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49881-vulnerability-in-linux-linux-be0882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49880-vulnerability-in-linux-linux-be087e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe087e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49879-vulnerability-in-linux-linux-be0864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49878-vulnerability-in-linux-linux-be085e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe085e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49877-vulnerability-in-linux-linux-bdcea4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49876-vulnerability-in-linux-linux-be085a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe085a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49875-vulnerability-in-linux-linux-be0854</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49874-vulnerability-in-linux-linux-be084e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe084e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49873-vulnerability-in-linux-linux-be084a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe084a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49872-vulnerability-in-linux-linux-be0844</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49871-vulnerability-in-linux-linux-be0840</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49870-vulnerability-in-linux-linux-be0820</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49869-vulnerability-in-linux-linux-be081a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe081a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49868-vulnerability-in-linux-linux-be0816</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49867-vulnerability-in-linux-linux-be080e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe080e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49866-vulnerability-in-linux-linux-be0806</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49865-vulnerability-in-linux-linux-be07fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe07fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49864-vulnerability-in-linux-linux-be07ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe07ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49863-vulnerability-in-linux-linux-be07de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe07de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6519-use-after-free-2471a02c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6519%3A%20Use%20After%20Free&amp;severity=high&amp;id=699f6c05b7ef31ef0b55f099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49862-vulnerability-in-linux-linux-be07d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe07d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49861-vulnerability-in-linux-linux-be07ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe07ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49860-vulnerability-in-linux-linux-be07b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe07b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49859-vulnerability-in-linux-linux-be07af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe07af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49858-vulnerability-in-linux-linux-be07ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe07ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49857-vulnerability-in-linux-linux-be079a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe079a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49856-vulnerability-in-linux-linux-be0792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49855-vulnerability-in-linux-linux-bdcea0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49854-vulnerability-in-linux-linux-bdce9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49853-vulnerability-in-linux-linux-be078a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe078a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49852-vulnerability-in-linux-linux-be0782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49851-vulnerability-in-linux-linux-be0773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49850-vulnerability-in-linux-linux-be076b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe076b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47757-vulnerability-in-linux-linux-be0723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47756-vulnerability-in-linux-linux-be0712</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47754-vulnerability-in-linux-linux-be06fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe06fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47753-vulnerability-in-linux-linux-be06f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe06f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47752-vulnerability-in-linux-linux-be06f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe06f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47751-vulnerability-in-linux-linux-be06f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe06f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47750-vulnerability-in-linux-linux-be06e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe06e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47749-vulnerability-in-linux-linux-be06d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe06d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47748-vulnerability-in-linux-linux-be06d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe06d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47747-vulnerability-in-linux-linux-be06c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe06c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47746-vulnerability-in-linux-linux-be06b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe06b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47745-vulnerability-in-linux-linux-be06af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe06af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47744-vulnerability-in-linux-linux-be068d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe068d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47743-vulnerability-in-linux-linux-be0687</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47742-vulnerability-in-linux-linux-be0683</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47741-vulnerability-in-linux-linux-be067b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe067b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47740-vulnerability-in-linux-linux-be0673</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47739-vulnerability-in-linux-linux-be066d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe066d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47738-vulnerability-in-linux-linux-bdce7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdce7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47737-vulnerability-in-linux-linux-be0660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47737%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47736-vulnerability-in-linux-linux-be0658</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47736%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47735-vulnerability-in-linux-linux-be0650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47734-vulnerability-in-linux-linux-be0648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47734%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47733-vulnerability-in-linux-linux-be0626</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47732-vulnerability-in-linux-linux-be0617</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47731-vulnerability-in-linux-linux-be060f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe060f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47730-vulnerability-in-linux-linux-be0607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47729-vulnerability-in-linux-linux-be05ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe05ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47728-vulnerability-in-linux-linux-be05f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47727-vulnerability-in-linux-linux-be05f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47726-vulnerability-in-linux-linux-be05ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47724-vulnerability-in-linux-linux-be05de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47723-vulnerability-in-linux-linux-be05d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47721-vulnerability-in-linux-linux-be05c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe05c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47720-vulnerability-in-linux-linux-be05b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe05b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47719-vulnerability-in-linux-linux-be05b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47718-vulnerability-in-linux-linux-be05ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe05ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47717-vulnerability-in-linux-linux-be05a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe05a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47716-vulnerability-in-linux-linux-be05a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47715-vulnerability-in-linux-linux-be05a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe05a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47714-vulnerability-in-linux-linux-be059c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe059c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47713-vulnerability-in-linux-linux-be0598</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47712-vulnerability-in-linux-linux-bdce77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47711-vulnerability-in-linux-linux-bdce59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47710-vulnerability-in-linux-linux-bdce53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdce53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47709-vulnerability-in-linux-linux-be0592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47708-vulnerability-in-linux-linux-be0578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47707-vulnerability-in-linux-linux-bdce4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47706-vulnerability-in-linux-linux-be0570</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47705-vulnerability-in-linux-linux-be0568</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47704-vulnerability-in-linux-linux-be0560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47703-vulnerability-in-linux-linux-be0558</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47702-vulnerability-in-linux-linux-be0550</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47701-vulnerability-in-linux-linux-be054e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe054e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47700-vulnerability-in-linux-linux-be054c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe054c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47699-vulnerability-in-linux-linux-be054a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe054a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47698-vulnerability-in-linux-linux-be0548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47697-vulnerability-in-linux-linux-be0523</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47696-vulnerability-in-linux-linux-be051f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe051f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47695-vulnerability-in-linux-linux-be051b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe051b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47694-vulnerability-in-linux-linux-be0515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47693-vulnerability-in-linux-linux-bdce4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdce4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47692-vulnerability-in-linux-linux-be0511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47691-vulnerability-in-linux-linux-be050d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe050d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47690-vulnerability-in-linux-linux-be0509</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47689-vulnerability-in-linux-linux-bdce47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdce47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47688-vulnerability-in-linux-linux-bdce43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47687-vulnerability-in-linux-linux-be0505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47686-vulnerability-in-linux-linux-be0501</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47685-vulnerability-in-linux-linux-be04fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47684-vulnerability-in-linux-linux-bdce3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47683-vulnerability-in-linux-linux-be04d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe04d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47682-vulnerability-in-linux-linux-be04cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47681-vulnerability-in-linux-linux-be04cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe04cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47680-vulnerability-in-linux-linux-be04c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47679-vulnerability-in-linux-linux-be04ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47678-vulnerability-in-linux-linux-be04b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe04b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47677-vulnerability-in-linux-linux-be04b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe04b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47676-vulnerability-in-linux-linux-be04ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47675-vulnerability-in-linux-linux-be04a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49273-missing-authorization-in-metagauss--e43b5976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49273%3A%20Missing%20Authorization%20in%20Metagauss%20ProfileGrid&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49293-missing-authorization-in-rextheme-w-fefd4d7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49293%3A%20Missing%20Authorization%20in%20RexTheme%20WP%20VR&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49321-missing-authorization-in-colorlibpl-cb33b8a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49321%3A%20Missing%20Authorization%20in%20colorlibplugins%20Simple%20Custom%20Post%20Order&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47328-improper-neutralization-of-special--682bdb39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47328%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aman%20FunnelKit%20Automations&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31007-na-29824820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31007%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58ec2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30158-na-0a687c9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30158%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30157-na-b290fdcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30157%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48231-na-948077b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48231%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0fb7ef31ef0b56d925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47912-na-170e2606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47912%3A%20n%2Fa&amp;severity=high&amp;id=699f6d09b7ef31ef0b56d64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47224-na-f9259383</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47224%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d08b7ef31ef0b56d5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47223-na-d4ff5ddc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47223%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d08b7ef31ef0b56d5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47189-na-ef3ef230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47189%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46326-na-f4070044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46326%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfcb7ef31ef0b56ab35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46239-na-d9fe28e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46239%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46238-na-5e06f222</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46238%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46236-na-e814d7d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46236%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41714-na-33c861de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41714%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41712-na-3632c865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41712%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbeb7ef31ef0b568a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40091-na-ef25e799</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40091%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40090-na-9d086fbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40090%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40089-na-9aaf3a00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40089%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca6b7ef31ef0b56727d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40088-na-bd49d80a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40088%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca4b7ef31ef0b5671d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40087-na-852c4e22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40087%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca4b7ef31ef0b5671d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40086-na-2572b7fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40086%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca4b7ef31ef0b5671cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40085-na-50509c1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40085%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca4b7ef31ef0b5671c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40084-na-1ff64876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40084%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca4b7ef31ef0b5671c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40083-na-e704677c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40083%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca4b7ef31ef0b5671c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35315-na-3290ae08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35315%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b56327e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35287-na-0a68d1d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35287%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c58b7ef31ef0b56327b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35286-na-cc3b1c8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35286%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c56b7ef31ef0b5631f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35285-na-130f3f03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35285%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c56b7ef31ef0b5631f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49215-98445dc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49215&amp;severity=null&amp;id=699f6b7eb7ef31ef0b555f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48659-na-3cbffdff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48659%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b76b7ef31ef0b555a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48645-na-9d13a985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48645%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48597-na-b7f03464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48597%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48509-na-89e500f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48509%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b72b7ef31ef0b555815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48709-na-9a086c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48709%3A%20n%2Fa&amp;severity=medium&amp;id=6914f9cc6c8e220c428a4839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41713-na-fd11819e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41713%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9b4247d717aace26aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44000-insufficiently-protected-credential-6545b1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44000%3A%20Insufficiently%20Protected%20Credentials%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=69cd7473e6bfc5ba1def793d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49325-missing-authorization-in-wpdiscover-f7e77886</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49325%3A%20Missing%20Authorization%20in%20wpdiscover%20Photo%20Gallery%20Builder&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47634-cross-site-request-forgery-csrf-in--904cd200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47634%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Streamline%20CartBounty%20%E2%80%93%20Save%20and%20recover%20abandoned%20carts%20for%20WooCommerce&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49250-cross-site-request-forgery-csrf-in--79f064c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49250%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Syed%20Balkhi%20Table%20of%20Contents%20Plus&amp;severity=null&amp;id=69cd74bae6bfc5ba1def897b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49272-cross-site-request-forgery-csrf-in--fae664be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49272%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpweb%20Social%20Auto%20Poster&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49274-cross-site-request-forgery-csrf-in--c8e997cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49274%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49275-cross-site-request-forgery-csrf-in--1fe9e05d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49275%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Northern%20Beaches%20Websites%20IdeaPush&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49306-cross-site-request-forgery-csrf-in--42d64ba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49306%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wp-buy%20WP%20Content%20Copy%20Protection%20%26%20No%20Right%20Click&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49628-cross-site-request-forgery-csrf-in--ae1a9eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49628%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20whiletrue%20Most%20And%20Least%20Read%20Posts%20Widget&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49335-cross-site-request-forgery-csrf-in--de8f9dbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49335%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sh4d0w28%20GoogleDrive%20folder%20list&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49605-cross-site-request-forgery-csrf-in--8aee4584</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49605%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Stefan%20Nour%20AVChat%20Video%20Chat&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0118f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49629-cross-site-request-forgery-csrf-in--7bcf44d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49629%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fahad%20Mahmood%20Endless%20Posts%20Navigation&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0135b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47325-improper-neutralization-of-special--514dd315</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47325%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Themeisle%20MPG&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49609-improper-neutralization-of-special--5f2f2a1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49609%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Brandon%20White%20Author%20Discussion&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49612-improper-neutralization-of-special--df0be941</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49612%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sanjeev%20SW%20Contact%20Form&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0127e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49613-improper-neutralization-of-special--c1985ac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49613%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20developersnote%20Simple%20Code%20Insert%20Shortcode&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49614-improper-neutralization-of-special--43b84539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49614%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SermonAudio%20SermonAudio%20Widgets&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49615-cross-site-request-forgery-csrf-in--e3485a56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49615%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Henrique%20Rodrigues%20SafetyForms&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49616-improper-neutralization-of-special--5c9e8d2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49616%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nyasro%20Rate%20Own%20Post&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0128a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49617-cross-site-request-forgery-csrf-in--f7c10b8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49617%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20anciwasim%20Back%20Link%20Tracker&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0128d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49618-improper-neutralization-of-special--413f1b2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49618%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Jordan%20Lyall%20MyTweetLinks&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49619-improper-neutralization-of-special--e8f8fa79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49619%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20acespritech%20Social%20Link%20Groups&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49620-improper-neutralization-of-special--e9da4164</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49620%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mrcheck116%20FERMA.ru.net&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44061-improper-neutralization-of-input-du-e696eb8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44061%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPFactory%20EU%2FUK%20VAT%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49621-cross-site-request-forgery-csrf-in--49ca2e0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49621%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aatmaadhikari%20APA%20Register%20Newsletter%20Form&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49622-cross-site-request-forgery-csrf-in--48094d61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49622%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aatmaadhikari%20Apa%20Banner%20Slider&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49623-improper-neutralization-of-special--3de50951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49623%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hasan%20movahed%20Duplicate%20Title%20Validate&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0134c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49608-incorrect-privilege-assignment-in-g-f24c1c64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49608%3A%20Incorrect%20Privilege%20Assignment%20in%20gerryworks%20GERRYWORKS%20Post%20by%20Mail&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df011a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49324-unrestricted-upload-of-file-with-da-235d1adf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49324%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sovratecdev%20Sovratec%20Case%20Management&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49326-unrestricted-upload-of-file-with-da-4b735018</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49326%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Vasileios%20Kerasiotis%20Affiliator&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49327-unrestricted-upload-of-file-with-da-63b26b8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49327%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bepitulaz%20Woostagram%20Connect&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49329-unrestricted-upload-of-file-with-da-83a11ba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49329%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20vivek2tamrakar%20WP%20REST%20API%20FNS&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49330-unrestricted-upload-of-file-with-da-e5f83e6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49330%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brx8r%20Nice%20Backgrounds&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49331-unrestricted-upload-of-file-with-da-c1c08324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49331%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Myriad%20Solutionz%20Property%20Lot%20Management%20System&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49607-unrestricted-upload-of-file-with-da-cf14b837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49607%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20redhopit%20WP%20Dropbox%20Dropins&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0119b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49610-unrestricted-upload-of-file-with-da-9d6d510d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49610%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20photokiteditor%20photokit&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df01278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49332-deserialization-of-untrusted-data-i-b9dc3993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49332%3A%20Deserialization%20of%20Untrusted%20Data%20in%20giveawayboost%20Giveaway%20Boost&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49624-deserialization-of-untrusted-data-i-2f0f8328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49624%3A%20Deserialization%20of%20Untrusted%20Data%20in%20smartdevth%20Advanced%20Advertising%20System&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df0134f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49625-deserialization-of-untrusted-data-i-9042751d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49625%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sphoid%20SiteBuilder%20Dynamic%20Components&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49626-deserialization-of-untrusted-data-i-186bbe06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49626%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Piyush%20Patel%20Shipyaari%20Shipping%20Management&amp;severity=null&amp;id=69cd74d8e6bfc5ba1df01355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49286-improper-limitation-of-a-pathname-t-edf1b946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49286%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Jeroen%20Berkvens%20SSV%20Events&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49611-unrestricted-upload-of-file-with-da-dbf297b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49611%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20paxmanpwnz%20Product%20Website%20Showcase&amp;severity=null&amp;id=69cd74d5e6bfc5ba1df0127b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49328-authentication-bypass-using-an-alte-fb7ae84e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49328%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20vivek2tamrakar%20WP%20REST%20API%20FNS&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49604-authentication-bypass-using-an-alte-9fa122f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49604%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20N-Media%20Simple%20User%20Registration&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48049-improper-neutralization-of-input-du-883498db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48049%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mighty%20Plugins%20Mighty%20Builder&amp;severity=null&amp;id=69cd74ace6bfc5ba1def865c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49323-improper-neutralization-of-input-du-9a1816d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49323%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shahriar%20Alam%20All%20in%20One%20Slider&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49334-improper-neutralization-of-input-du-901a8051</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49334%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Unizoe%20Web%20Solutions%20jLayer%20Parallax%20Slider&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df0117d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49606-improper-neutralization-of-input-du-0251e643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49606%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DotsquaresLtd%20Google%20Map%20Locations&amp;severity=null&amp;id=69cd74d2e6bfc5ba1df01195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49630-improper-neutralization-of-input-du-99692f45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20WP%20Education&amp;severity=null&amp;id=69cd74dce6bfc5ba1df0141c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49631-improper-neutralization-of-input-du-f13cc621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Md%20Abdul%20Kader%20Easy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74dce6bfc5ba1df0141f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9897-cwe-79-improper-neutralization-of-in-ef244b17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20streamweasels%20StreamWeasels%20Twitch%20Integration&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9889-cwe-200-exposure-of-sensitive-inform-a368046b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9889%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20elementinvader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10131-cwe-94-improper-control-of-generati-4b80f52f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10131%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20infiniflow%20infiniflow%2Fragflow&amp;severity=high&amp;id=68ef9b21178f764e1f4709ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9219-cwe-79-improper-neutralization-of-in-50a465ff</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9219%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxfoundry%20WordPress%20Social%20Share%20Buttons&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-19-e76e36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-19&amp;severity=medium&amp;id=682b7ba2d3ddd8cef2e76e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-19-f1269c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f1269c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9593-cwe-94-improper-control-of-generatio-ee79fd16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9593%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Scott%20Paterson%20Time%20Clock%20Pro&amp;severity=high&amp;id=699f6b54b7ef31ef0b552382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9537-vulnerability-in-sciencelogic-sl1-399d728d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9537%3A%20Vulnerability%20in%20ScienceLogic%20SL1&amp;severity=critical&amp;id=68f7d9b8247d717aace26cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9674-cwe-79-improper-neutralization-of-in-a35a0894</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20morceaudebois%20Debrandify%20%C2%B7%20Remove%20or%20Replace%20WordPress%20Branding&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5547b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43300-improper-neutralization-of-input-du-3acf54a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43300%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bert%20Movie%20Database&amp;severity=null&amp;id=69cd746fe6bfc5ba1def7892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49224-improper-neutralization-of-input-du-afa4e154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49224%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahesh_9696%20Mitm%20Bug%20Tracker&amp;severity=null&amp;id=69cd74aee6bfc5ba1def870d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49225-improper-neutralization-of-input-du-5fdd5e72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49225%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20swebdeveloper%20wpPricing%20Builder&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49228-improper-neutralization-of-input-du-66c87ed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49228%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Edwin%20Rivera%20bVerse%20Convert&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49230-improper-neutralization-of-input-du-ca8144ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49230%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harry005%20Ajax%20Custom%20CSS%2FJS&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def8763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49231-improper-neutralization-of-input-du-4e3cee16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49231%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyclop%20WordPress%20Video&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def8766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49232-improper-neutralization-of-input-du-b4d6e9ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49232%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20derethor%20El%20mejor%20Cluster&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def8769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49233-improper-neutralization-of-input-du-c714ffd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49233%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MadrasThemes%20MAS%20Elementor&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def876c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49234-improper-neutralization-of-input-du-c94951bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49234%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeworm%20Plexx%20Elementor%20Extension&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def876f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49236-improper-neutralization-of-input-du-e8596971</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49236%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hafiz%20Uddin%20Ahmed%20Crazy%20Call%20To%20Action%20Box&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def8775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49238-improper-neutralization-of-input-du-4e9f175b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20emka73%20ADIF%20Log%20Search%20Widget&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def877b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49239-improper-neutralization-of-input-du-cac10da2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nikhilvaghela%20Add%20Categories%20Post%20Footer&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def877e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49240-improper-neutralization-of-input-du-4db1fa0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49240%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ajberasategui%20AB%20Categories%20Search%20Widget&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def880e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49241-improper-neutralization-of-input-du-2a280e99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tady%20Tito&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def8811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49243-improper-control-of-filename-for-in-6a64922e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49243%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ramjon27%20Dynamic%20Elementor%20Addons&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def8817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9425-cwe-79-improper-neutralization-of-in-f880d7ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sajjad67%20Advanced%20Category%20and%20Custom%20Taxonomy%20Image&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10057-cwe-79-improper-neutralization-of-i-2cb7b83e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fahadmahmood%20RSS%20Feed%20Widget&amp;severity=medium&amp;id=699f6decb7ef31ef0b590bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10078-cwe-862-missing-authorization-in-ch-ddcd3e8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10078%3A%20CWE-862%20Missing%20Authorization%20in%20chertz%20WP%20Easy%20Post%20Types&amp;severity=high&amp;id=699f6decb7ef31ef0b590bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10079-cwe-502-deserialization-of-untruste-a8c4f3dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10079%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20chertz%20WP%20Easy%20Post%20Types&amp;severity=high&amp;id=699f6decb7ef31ef0b590be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10055-cwe-79-improper-neutralization-of-i-6d75477c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20Click%20to%20Chat%20%E2%80%93%20WP%20Support%20All-in-One%20Floating%20Widget&amp;severity=medium&amp;id=699f6decb7ef31ef0b590bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10080-cwe-79-improper-neutralization-of-i-9517eea6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10080%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20chertz%20WP%20Easy%20Post%20Types&amp;severity=medium&amp;id=699f6decb7ef31ef0b590be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9703-cwe-79-improper-neutralization-of-in-69f93100</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Arconix%20Shortcodes&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9206-cwe-79-improper-neutralization-of-in-064eca6a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9206%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madrasthemes%20MAS%20Companies%20For%20WP%20Job%20Manager&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9366-cwe-79-improper-neutralization-of-in-bb307d7e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzest%20Easy%20Menu%20Manager%20%7C%20WPZest&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10014-cwe-79-improper-neutralization-of-i-2aa874e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10014%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tiandi%20Flat%20UI%20Button&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9892-cwe-79-improper-neutralization-of-in-04aa5f77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apintop%20Add%20Widget%20After%20Content&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9382-cwe-79-improper-neutralization-of-in-c93924f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9382%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gantry%20Gantry%204%20Framework&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b55106a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9364-cwe-862-missing-authorization-in-sma-e4d2d9b9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9364%3A%20CWE-862%20Missing%20Authorization%20in%20smackcoders%20SendGrid%20for%20WordPress&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9361-cwe-862-missing-authorization-in-giu-bddd67b0</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9361%3A%20CWE-862%20Missing%20Authorization%20in%20giuliopanda%20Bulk%20images%20optimizer%3A%20Resize%2C%20optimize%2C%20convert%20to%20webp%2C%20rename%20%E2%80%A6&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9383-cwe-79-improper-neutralization-of-in-faa24eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20parcelpro%20Parcel%20Pro&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b55106e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9452-cwe-79-improper-neutralization-of-in-c48ec0be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lolitaframework%20Branding&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9350-cwe-79-improper-neutralization-of-in-71afe36b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dpdbaltics%20DPD%20Baltic%20Shipping&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8740-cwe-79-improper-neutralization-of-in-e7551d99</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8740%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20GetResponse%20Forms%20by%20Optin%20Cat&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9373-cwe-79-improper-neutralization-of-in-351c821a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9373%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeid%20Elemenda&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10040-cwe-352-cross-site-request-forgery--033657bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10040%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20paulirish-1%20Infinite-Scroll&amp;severity=medium&amp;id=699f6debb7ef31ef0b590b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10049-cwe-79-improper-neutralization-of-i-779b5cd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ioannup%20Edit%20WooCommerce%20Templates&amp;severity=medium&amp;id=699f6decb7ef31ef0b590b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8790-cwe-79-improper-neutralization-of-in-3bd34c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeinwp%20Social%20Share%20With%20Floating%20Bar&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8916-cwe-79-improper-neutralization-of-in-6617d093</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sukiwp%20Suki%20Sites%20Import&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9848-cwe-79-improper-neutralization-of-in-723e2719</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20k2servicecom%20Product%20Customizer%20Light&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45944-na-b9523901</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45944%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf3b7ef31ef0b56a767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7316-cwe-1284-improper-validation-of-spec-61c2eb2f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7316%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Mitsubishi%20Electric%20Corporation%20Mitsubishi%20Electric%20CNC%20M800V%20Series%20M800VW&amp;severity=medium&amp;id=6949d68eefa849cc131bc31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49248-improper-neutralization-of-input-du-61a6d53a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49248%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spacetime%20Ad%20Inserter&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def8826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49255-improper-neutralization-of-input-du-d3dd6662</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49255%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniele%20Alessandra%20Da%20Reactions&amp;severity=null&amp;id=69cd74bae6bfc5ba1def898a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49259-improper-neutralization-of-input-du-1bb049e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49259%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Primary%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd74bae6bfc5ba1def8996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49261-improper-neutralization-of-input-du-e6e40906</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ryo%20Arkhe%20Blocks&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49263-improper-neutralization-of-input-du-dcb0f7e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49263%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Matsuyama%20My%20Favorites&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49264-improper-neutralization-of-input-du-b53187f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49264%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49276-improper-neutralization-of-input-du-c6720074</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49276%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cliogrow%20Clio%20Grow&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49277-improper-neutralization-of-input-du-52616ad4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49277%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saiful%20Islam%20UltraAddons%20Elementor%20Lite&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49278-improper-neutralization-of-input-du-db7b710c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49278%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omnipressteam%20Omnipress&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49279-improper-neutralization-of-input-du-8eb66cfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49279%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Daniel%20Floeter%20Hyperlink%20Group%20Block&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49280-improper-neutralization-of-input-du-c9f130b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49280%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Weblizar%20-%20WordPress%20Themes%20%26amp%3B%20Plugin%20Lightbox%20slider%20%E2%80%93%20Responsive%20Lightbox%20Gallery&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49281-improper-neutralization-of-special--ff674d93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49281%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ninja%20Team%20Click%20to%20Chat%20%E2%80%93%20WP%20Support%20All-in-One%20Floating%20Widget&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49282-improper-neutralization-of-input-du-3ff179f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49282%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dFactory%20Responsive%20Lightbox&amp;severity=null&amp;id=69cd74c4e6bfc5ba1def8b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49283-improper-neutralization-of-input-du-e77063cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49283%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20CURCY&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49288-improper-neutralization-of-input-du-86926c5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49288%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20VillaTheme%20Email%20Template%20Customizer%20for%20WooCommerce&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49292-improper-neutralization-of-input-du-83b92549</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49292%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tim%20Strifler%20Exclusive%20Addons%20Elementor&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49295-improper-neutralization-of-input-du-673d1143</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49295%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PressTigers%20Simple%20Testimonials%20Showcase&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49296-improper-neutralization-of-input-du-cace2715</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49296%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JC%20Custom%20Add%20to%20Cart%20Button%20Label%20and%20Link&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49298-improper-neutralization-of-input-du-8a737a17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49298%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pepro%20Dev.%20Group%20PeproDev%20Ultimate%20Invoice&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49301-improper-neutralization-of-input-du-ba56e723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Sinan%20Yorulmaz%20G%20Meta%20Keywords&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49302-improper-neutralization-of-input-du-62f13818</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49302%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20portfoliohub%20WordPress%20Portfolio%20Builder%20%E2%80%93%20Portfolio%20Gallery&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49307-improper-neutralization-of-input-du-573e3fe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpseek%20Admin%20Management%20Xtended&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49308-improper-neutralization-of-input-du-93d90eee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49308%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Toast%20Plugins%20Animator&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49309-improper-neutralization-of-input-du-f232f801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49309%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omarfolghe%20Digitally&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49310-improper-neutralization-of-input-du-55878abb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themesflat%20themesflat-addons-for-elementor&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49311-improper-neutralization-of-input-du-6d929e22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49311%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49319-improper-neutralization-of-input-du-8ffdd01b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49319%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20B.M.%20Rafiul%20Alam%20Awesome%20Contact%20Form7%20for%20Elementor&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49220-cross-site-request-forgery-csrf-in--b7bcc2dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49220%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nikel%20Cookie%20Scanner&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49221-cross-site-request-forgery-csrf-in--18fc59c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49221%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20julian.weinert%20cSlider&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49223-cross-site-request-forgery-csrf-in--e0afbde4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49223%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shibulijack%20CJ%20Change%20Howdy&amp;severity=null&amp;id=69cd74aee6bfc5ba1def870a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49229-improper-neutralization-of-input-du-ceb580fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49229%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arifnezami%20Better%20Author%20Bio&amp;severity=null&amp;id=69cd74aee6bfc5ba1def871c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49237-cross-site-request-forgery-csrf-in--7be8b7f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49237%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ahmeti%20Ahmeti%20Wp%20Timeline&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def8778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49304-cross-site-request-forgery-csrf-in--71ab586e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49304%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DOTonPAPER%20Pinpoint%20Booking%20System&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49313-cross-site-request-forgery-csrf-in--1487f867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49313%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rudestan%20VKontakte%20Wall%20Post&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49217-incorrect-privilege-assignment-in-m-6b5ce44c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49217%3A%20Incorrect%20Privilege%20Assignment%20in%20madiriaashish%20Adding%20drop%20down%20roles%20in%20registration&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49219-incorrect-privilege-assignment-in-t-d4706237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49219%3A%20Incorrect%20Privilege%20Assignment%20in%20themexpo%20RS-Members&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49322-incorrect-privilege-assignment-in-c-d9d86e14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49322%3A%20Incorrect%20Privilege%20Assignment%20in%20CodePassenger%20Job%20Board%20Manager%20for%20WordPress&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47304-improper-neutralization-of-special--9d06542e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47304%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Shahjahan%20Jewel%20Fluent%20Support&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47312-improper-neutralization-of-special--8c2f0005</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47312%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WP%20Grim%20Classic%20Editor%20and%20Classic%20Widgets&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49244-improper-neutralization-of-special--bac991fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49244%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vrinsoft%20CSV%20Product%20Import%20Export%20for%20WooCommerce&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49246-improper-neutralization-of-special--fed40dc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49246%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20anand23%20Ajax%20Rating%20with%20Custom%20Login&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def8820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49297-improper-neutralization-of-special--c16a6c6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49297%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20zohocrm%20Zoho%20CRM%20Lead%20Magnet&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49305-improper-neutralization-of-special--813d3dc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49305%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPFactory%20Email%20Verification%20for%20WooCommerce&amp;severity=null&amp;id=69cd74cae6bfc5ba1defbd1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49235-insertion-of-sensitive-information--ceab33a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49235%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20videowhisper%20Contact%20Forms%2C%20Live%20Support%2C%20CRM%2C%20Video%20Messages&amp;severity=null&amp;id=69cd74b0e6bfc5ba1def8772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49284-exposure-of-sensitive-information-t-d93e6cb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49284%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20BogdanFix%20WP%20SendFox&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49314-unrestricted-upload-of-file-with-da-95924114</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49314%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20jiangqie%20JiangQie%20Free%20Mini%20Program&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49285-improper-limitation-of-a-pathname-t-c782a818</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49285%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Jeroen%20Berkvens%20SSV%20MailChimp&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49287-improper-limitation-of-a-pathname-t-9d0eb58d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49287%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mh6webentwicklung%20PDF-Rechnungsverwaltung&amp;severity=null&amp;id=69cd74c7e6bfc5ba1def9d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49400-permissive-regular-expression-cwe-6-3f47dbac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49400%3A%20Permissive%20Regular%20Expression%20(CWE-625)%20in%20Meta%20Tacquito&amp;severity=critical&amp;id=699f6b7eb7ef31ef0b555f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49317-improper-control-of-filename-for-in-ad6ae96e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49317%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ZIPANG%20Point%20Maker&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49318-deserialization-of-untrusted-data-i-3a26ed5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49318%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Scott%20My%20Reading%20Library&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49312-server-side-request-forgery-ssrf-in-acf71fc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49312%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WisdmLabs%20Edwiser%20Bridge&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9683-authentication-bypass-by-primary-wea-d8732c12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9683%3A%20Authentication%20Bypass%20by%20Primary%20Weakness&amp;severity=medium&amp;id=690d4641dd7ca828ab19619f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49315-improper-limitation-of-a-pathname-t-0a5d613b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49315%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CodeFlock%20FREE%20DOWNLOAD%20MANAGER&amp;severity=null&amp;id=69cd74cce6bfc5ba1defdbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48021-improper-neutralization-of-input-du-c7130873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48021%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Scott%20Paterson%20Contact%20Form%207%20%E2%80%93%20PayPal%20%26%20Stripe%20Add-on&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def858b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48023-improper-neutralization-of-input-du-eeffc2c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48023%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rconnect305%20Restaurant%20Reservations%20Widget&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def858e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48025-improper-neutralization-of-input-du-010a953e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48025%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dogrow%20Simple%20Baseball%20Scoreboard&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def8594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48032-improper-neutralization-of-input-du-ca3b45da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sumitsurai%20Featured%20Posts%20with%20Multiple%20Custom%20Groups%20(FPMCG)&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48036-improper-neutralization-of-input-du-ed2371f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Blocks&amp;severity=null&amp;id=69cd74dbe6bfc5ba1df0140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48046-improper-neutralization-of-input-du-04f8714a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsystic%20Contact%20Form%20by%20Supsystic&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48048-cross-site-request-forgery-csrf-in--f8fee111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48048%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20GabbyKhrmon%20Wsify%20Widget&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48031-cross-site-request-forgery-csrf-in--e4716a13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48031%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sumitsurai%20Featured%20Posts%20with%20Multiple%20Custom%20Groups%20(FPMCG)&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48037-cross-site-request-forgery-csrf-in--3dbfe849</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48037%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20A%20WP%20Life%20Contact%20Form%20Widget&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48038-cross-site-request-forgery-csrf-in--b8a0dfe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48038%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tuxlog%20wp-Monalisa&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48047-cross-site-request-forgery-csrf-in--91148fec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48047%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Razon%20Komar%20Pal%20Linked%20Variation%20for%20WooCommerce&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48043-improper-neutralization-of-special--e9c6e386</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48043%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ShortPixel%20ShortPixel%20Image%20Optimizer&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48024-exposure-of-sensitive-system-inform-0238bb39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48024%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Fahad%20Mahmood%20Keep%20Backup%20Daily&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def8591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49320-improper-neutralization-of-input-du-684a7b07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dennis%20Encyclopedia%20%2F%20Glossary%20%2F%20Wiki&amp;severity=null&amp;id=69cd74cfe6bfc5ba1df00d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9898-cwe-79-improper-neutralization-of-in-8cd33426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehowarde%20Parallax%20Image&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9184-cwe-79-improper-neutralization-of-in-5dcfdb92</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sendpulse%20SendPulse%20Free%20Web%20Push&amp;severity=high&amp;id=699f6b41b7ef31ef0b54fd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8920-cwe-79-improper-neutralization-of-in-ea2eaaa7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8920%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vladolaru%20Fonto%20%E2%80%93%20Custom%20Web%20Fonts%20Manager&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f7e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9951-cwe-79-improper-neutralization-of-in-cdc7ce50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9951%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9213-cwe-79-improper-neutralization-of-in-0fc042bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9213%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20persianscript%20%D8%A7%D9%81%D8%B2%D9%88%D9%86%D9%87%20%D9%BE%DB%8C%D8%A7%D9%85%DA%A9%20%D9%88%D9%88%DA%A9%D8%A7%D9%85%D8%B1%D8%B3%20Persian%20WooCommerce%20SMS&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9351-cwe-352-cross-site-request-forgery-c-be81b1fe</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9351%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9352-cwe-352-cross-site-request-forgery-c-f8f682d8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9352%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmudev%20Forminator%20Forms%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7417-cwe-200-exposure-of-sensitive-inform-d9aeed06</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7417%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8719-cwe-79-improper-neutralization-of-in-99f7ed06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8719%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flexmls%20Flexmls%C2%AE%20IDX%20Plugin&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9347-cwe-79-improper-neutralization-of-in-7a0764c3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9263-cwe-639-authorization-bypass-through-5f8c7658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9263%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20arraytics%20WP%20Timetics-%20AI-powered%20Appointment%20Booking%20Calendar%20and%20Online%20Scheduling%20Plugin&amp;severity=critical&amp;id=699f6b47b7ef31ef0b550d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9863-cwe-266-incorrect-privilege-assignme-e6b49224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9863%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20cyberlord92%20Miniorange%20OTP%20Verification%20with%20Firebase&amp;severity=critical&amp;id=699f6b61b7ef31ef0b554d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9940-cwe-75-failure-to-sanitize-special-e-7316ec89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9940%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9215-cwe-639-authorization-bypass-through-01aa42e9</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9215%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20publishpress%20Co-Authors%2C%20Multiple%20Authors%20and%20Guest%20Authors%20in%20an%20Author%20Box%20with%20PublishPress%20Authors&amp;severity=high&amp;id=699f6b43b7ef31ef0b550a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9240-cwe-79-improper-neutralization-of-in-98700f28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9240%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thecatkin%20ReDi%20Restaurant%20Reservation&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9862-cwe-639-authorization-bypass-through-09915a92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9862%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cyberlord92%20Miniorange%20OTP%20Verification%20with%20Firebase&amp;severity=critical&amp;id=699f6b61b7ef31ef0b554d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9861-cwe-288-authentication-bypass-using--ee61e082</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9861%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20cyberlord92%20Miniorange%20OTP%20Verification%20with%20Firebase&amp;severity=high&amp;id=699f6b61b7ef31ef0b554d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30875-na-65ef1989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30875%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58ea02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27766-na-8b487721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27766%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48192-na-9eff9479</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48192%3A%20n%2Fa&amp;severity=high&amp;id=699f6d0db7ef31ef0b56d82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33453-na-360d8579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33453%3A%20n%2Fa&amp;severity=high&amp;id=699f6c43b7ef31ef0b561b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49593-na-0fce6629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49593%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48638-na-62c8186e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48638%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48637-na-98d5ddc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48637%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48636-na-1d944fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48636%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48635-na-be3452c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48635%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48634-na-c118f492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48634%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48633-na-3e4e081d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48633%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b555a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48632-na-ccd2e7cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48632%3A%20n%2Fa&amp;severity=high&amp;id=699f6b76b7ef31ef0b5559fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48631-na-e79f53df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48631%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b5559a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48630-na-726e1427</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48630%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b55599b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48629-na-f3f7e83b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48629%3A%20n%2Fa&amp;severity=high&amp;id=699f6b74b7ef31ef0b555997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47522-cwe-617-reachable-assertion-in-oisf-7209511a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47522%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45797-cwe-770-allocation-of-resources-wit-a1d7a66f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45797%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20libhtp&amp;severity=high&amp;id=6908f50df612d110fe9cbebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45796-cwe-193-off-by-one-error-in-oisf-su-5765fbdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45796%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20OISF%20suricata&amp;severity=medium&amp;id=690908517fff0e30cee23578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45795-cwe-617-reachable-assertion-in-oisf-7494a915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45795%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20OISF%20suricata&amp;severity=high&amp;id=69ce82f2e6bfc5ba1de1d967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10033-improper-neutralization-of-input-du-67cc04ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49265-improper-neutralization-of-input-du-5b00de0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49265%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SPBooking.com%20Booking.com%20Banner%20Creator&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49266-improper-neutralization-of-input-du-a5b45083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49266%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Thimo%20Grauerholz%20WP-Spreadplugin&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49267-improper-neutralization-of-input-du-41fbed88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49267%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayon46%20Unlimited%20Addon%20For%20Elementor&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9893-cwe-288-authentication-bypass-using--a0fa09ac</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9893%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20nextendweb%20Nextend%20Social%20Login%20Pro&amp;severity=critical&amp;id=699f6b63b7ef31ef0b554e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49270-improper-neutralization-of-input-du-3d465a75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49270%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Smart%20Blocks&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49252-exposure-of-sensitive-system-inform-6c3a3481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49252%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20VaultDweller%20Leyka&amp;severity=null&amp;id=69cd74bae6bfc5ba1def8981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49245-improper-limitation-of-a-pathname-t-a0e3acd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49245%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nahimsalami%20Ahime%20Image%20Printer&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def881d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49258-path-traversal-in-limbcode-wordpres-ff1c882b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49258%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Limbcode%20WordPress%20Gallery%20Plugin%20%E2%80%93%20Limb%20Image%20Gallery&amp;severity=null&amp;id=69cd74bae6bfc5ba1def8993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48034-unrestricted-upload-of-file-with-da-02f5728a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48034%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20fliperrr%20Creates%203D%20Flipbook%2C%20PDF%20Flipbook&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49216-unrestricted-upload-of-file-with-da-4c0697fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49216%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20jclay06%20Feed%20Comments%20Number&amp;severity=null&amp;id=69cd74ace6bfc5ba1def865f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49242-unrestricted-upload-of-file-with-da-37117935</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49242%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Shafiq%20Digital%20Lottery&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def8814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49260-unrestricted-upload-of-file-with-da-64d3ea6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49260%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Limbcode%20WordPress%20Gallery%20Plugin%20%E2%80%93%20Limb%20Image%20Gallery&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47351-improper-limitation-of-a-pathname-t-5e7c7291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47351%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20The%20CSSIgniter%20Team%20MaxSlider&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47645-improper-limitation-of-a-pathname-t-6dda81d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47645%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Danish%20Ali%20Malik%20Top%20Bar%20%E2%80%93%20PopUps%20%E2%80%93%20by%20WPOptin&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48029-improper-control-of-filename-for-in-5f36c266</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48029%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Hung%20Trang%20Si%20SB%20Random%20Posts%20Widget&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def85a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49251-improper-control-of-filename-for-in-c5af89a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49251%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Acnoo%20Maan%20Addons%20For%20Elementor&amp;severity=null&amp;id=69cd74bae6bfc5ba1def897e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48026-deserialization-of-untrusted-data-i-15a14e9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48026%3A%20Deserialization%20of%20Untrusted%20Data%20in%20GMRobbins%20Disc%20Golf%20Manager&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def8597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48028-deserialization-of-untrusted-data-i-ab04eb9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48028%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Boyan%20Raichev%20IP%20Loc8&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48030-deserialization-of-untrusted-data-i-e329f7be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48030%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Webextends%20Telecash%20Ricaricaweb&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def85a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49218-deserialization-of-untrusted-data-i-d72c5e19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49218%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Al%20Imran%20Akash%20Recently&amp;severity=null&amp;id=69cd74ace6bfc5ba1def8665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49226-deserialization-of-untrusted-data-i-8d0ff5e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49226%3A%20Deserialization%20of%20Untrusted%20Data%20in%20taketin%20TAKETIN%20To%20WP%20Membership&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49227-deserialization-of-untrusted-data-i-76e47255</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49227%3A%20Deserialization%20of%20Untrusted%20Data%20in%20foter%20Free%20Stock%20Photos%20Foter&amp;severity=null&amp;id=69cd74aee6bfc5ba1def8716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49254-improper-control-of-generation-of-c-48e0f3a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49254%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sunjianle%20ajax-extend&amp;severity=null&amp;id=69cd74bae6bfc5ba1def8987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47637-relative-path-traversal-in-litespee-60f103b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47637%3A%20Relative%20Path%20Traversal%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49253-relative-path-traversal-in-jamespar-41e595af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49253%3A%20Relative%20Path%20Traversal%20in%20JamesPark.ninja%20Analyse%20Uploads&amp;severity=null&amp;id=69cd74bae6bfc5ba1def8984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47649-unrestricted-upload-of-file-with-da-3c410b1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47649%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20THATplugin%20Iconize&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48027-unrestricted-upload-of-file-with-da-ff6da5ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48027%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20xaraartech%20External%20featured%20image%20from%20bing&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def859a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48035-unrestricted-upload-of-file-with-da-0227a5e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48035%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20takayukii%20ACF%20Images%20Search%20And%20Insert&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48042-deserialization-of-untrusted-data-i-737b7dc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48042%3A%20Deserialization%20of%20Untrusted%20Data%20in%20supsystic%20Contact%20Form%20by%20Supsystic&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49257-unrestricted-upload-of-file-with-da-957268e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49257%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Denis%20Azz%20Anonim%20Posting&amp;severity=null&amp;id=69cd74bae6bfc5ba1def8990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49271-deserialization-of-untrusted-data-i-2dd125c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49271%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Unlimited%20Elements%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=null&amp;id=69cd74c0e6bfc5ba1def8a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49247-authentication-bypass-using-an-alte-0ac40b6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49247%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20SK%20BuddyPress%20Better%20Registration&amp;severity=null&amp;id=69cd74b4e6bfc5ba1def8823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8921-cwe-79-improper-neutralization-of-in-f442ba7d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8921%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzita%20Zita%20Elementor%20Site%20Library&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9444-cwe-79-improper-neutralization-of-in-18784370</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9444%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b4db7ef31ef0b551395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9540-cwe-200-exposure-of-sensitive-inform-ee720dba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9540%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9061-cwe-94-improper-control-of-generatio-305b3d4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9061%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themehunk%20WP%20Popup%20Builder%20%E2%80%93%20Popup%20Forms%20and%20Marketing%20Lead%20Generation&amp;severity=high&amp;id=699f6b3db7ef31ef0b54fa7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8507-cwe-352-cross-site-request-forgery-c-f239f0ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8507%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20File%20Manager%20File%20Manager%20Pro&amp;severity=high&amp;id=699f6c2ab7ef31ef0b560b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9582-cwe-79-improper-neutralization-of-in-f876c5f7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bqworks%20Accordion%20Slider&amp;severity=medium&amp;id=699f6b52b7ef31ef0b552215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8746-cwe-434-unrestricted-upload-of-file--48d97e6b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8746%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20File%20Manager%20File%20Manager%20Pro&amp;severity=high&amp;id=699f6b30b7ef31ef0b54f245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8918-cwe-434-unrestricted-upload-of-file--5c380663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8918%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20File%20Manager%20File%20Manager%20Pro&amp;severity=high&amp;id=699f6b3ab7ef31ef0b54f7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9937-cwe-79-improper-neutralization-of-in-67740b82</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prasidhda%20Woo%20Manage%20Fraud%20Orders&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9888-cwe-79-improper-neutralization-of-in-77b13f90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elementinvader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9873-cwe-79-improper-neutralization-of-in-7ce54777</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peepso%20Community%20by%20PeepSo%20%E2%80%93%20Social%20Network%2C%20Membership%2C%20Registration%2C%20User%20Profiles%2C%20Premium%20%E2%80%93%20Mobile%20App&amp;severity=medium&amp;id=699f6b62b7ef31ef0b554ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9105-cwe-288-authentication-bypass-using--0f8787ac</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9105%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Tophive%20Ultimate%20AI&amp;severity=critical&amp;id=699f6b3fb7ef31ef0b54fbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9634-cwe-502-deserialization-of-untrusted-ac2a0a53</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9634%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6b56b7ef31ef0b553067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9647-cwe-79-improper-neutralization-of-in-302b42bc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tkama%20Kama%20SpamBlock&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9652-cwe-79-improper-neutralization-of-in-3ec02fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9652%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20Locatoraid%20Store%20Locator&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9891-cwe-862-missing-authorization-in-zlu-29c3cab4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9891%3A%20CWE-862%20Missing%20Authorization%20in%20zluck%20Multiline%20files%20upload%20for%20contact%20form%207&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9305-cwe-640-weak-password-recovery-mecha-4dd7ae5a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9305%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=high&amp;id=699f6b49b7ef31ef0b550e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9649-cwe-352-cross-site-request-forgery-c-65cd10f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9649%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20alimir%20WP%20ULike%20%E2%80%93%20All-in-One%20Engagement%20Toolkit&amp;severity=medium&amp;id=699f6b56b7ef31ef0b55308b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9104-cwe-703-improper-check-or-handling-o-4d663d8b</loc>
    <lastmod>2026-03-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9104%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20Tophive%20Ultimate%20AI&amp;severity=medium&amp;id=699f6b3fb7ef31ef0b54fbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8787-cwe-79-improper-neutralization-of-in-9f2cc79a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elbanyaoui%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8541-cwe-79-improper-neutralization-of-in-d9f373cd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8541%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flycart%20Discount%20Rules%20for%20WooCommerce%20%E2%80%93%20Create%20Smart%20WooCommerce%20Coupons%20%26%20Discounts%2C%20Bulk%20Discount%2C%20BOGO%20Coupons&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9521-cwe-79-improper-neutralization-of-in-bc1371fe</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20india-web-developer%20SEO%20Manager&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48180-na-bc472992</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48180%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46606-na-afa94253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46606%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56d2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46605-na-32b31328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46605%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56d2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46213-na-e5111ca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46213%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aa3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46212-na-31df33cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46212%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44762-na-6d1d4136</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44762%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce2b7ef31ef0b569e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48758-na-d86ecc02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48758%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48744-na-f5390583</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48744%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-16-f12e07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9956-inappropriate-implementation-in-goog-cc120c2f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9956%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=69091a47c28fd46ded81cf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21262-easily-exploitable-vulnerability-al-9828001b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21262%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Connectors.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Connectors%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Connectors.%20in%20Oracle%20Corporation%20MySQL%20Connectors&amp;severity=medium&amp;id=6909261dfe7723195e0b415e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21244-difficult-to-exploit-vulnerability--01cf8597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21244%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6909261dfe7723195e0b415a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21243-difficult-to-exploit-vulnerability--a1e8a2d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21243%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6909261dfe7723195e0b4156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21241-easily-exploitable-vulnerability-al-c09f3959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21241%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261cfe7723195e0b38b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21239-easily-exploitable-vulnerability-al-20a246db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21239%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261cfe7723195e0b38b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21237-difficult-to-exploit-vulnerability--3cac94f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21237%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6909261cfe7723195e0b38b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21236-easily-exploitable-vulnerability-al-37ea201f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21236%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261cfe7723195e0b38ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21235-difficult-to-exploit-vulnerability--1e4a0b17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21235%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=medium&amp;id=6909261cfe7723195e0b38a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21232-difficult-to-exploit-vulnerability--55decdb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21232%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6909261cfe7723195e0b38a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21231-difficult-to-exploit-vulnerability--89ab6442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21231%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=low&amp;id=6909261cfe7723195e0b389f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21230-easily-exploitable-vulnerability-al-0d69a5d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21230%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6909261cfe7723195e0b389b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21219-easily-exploitable-vulnerability-al-2d0a251b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21219%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261cfe7723195e0b3897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21218-easily-exploitable-vulnerability-al-32f883ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21218%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6909261cfe7723195e0b3893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21217-difficult-to-exploit-vulnerability--1f5d8158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21217%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=6909261afe7723195e0b3884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21213-easily-exploitable-vulnerability-al-fac042a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21213%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20MySQL%20Server%20executes%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261afe7723195e0b3880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21210-difficult-to-exploit-vulnerability--19534e83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21210%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%20accessible%20data.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=6909261afe7723195e0b387b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21208-difficult-to-exploit-vulnerability--bc0449f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21208%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Oracle%20Java%20SE&amp;severity=low&amp;id=6909261afe7723195e0b3876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21203-easily-exploitable-vulnerability-al-bfd46c3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21203%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20Cluster&amp;severity=medium&amp;id=6909261afe7723195e0b3872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21201-easily-exploitable-vulnerability-al-77c42dbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21201%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261afe7723195e0b386e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21199-easily-exploitable-vulnerability-al-186b6dbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21199%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261afe7723195e0b386a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21198-easily-exploitable-vulnerability-al-70ad2980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21198%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261afe7723195e0b3866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21197-easily-exploitable-vulnerability-al-d3d92869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21197%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261afe7723195e0b3862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21196-easily-exploitable-vulnerability-al-22ea0fda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21196%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=6909261afe7723195e0b385e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21194-easily-exploitable-vulnerability-al-0dc45073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21194%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69092618fe7723195e0b37e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21193-easily-exploitable-vulnerability-al-a12ffba7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21193%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=69092618fe7723195e0b37dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9676-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-24150f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9676%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d68e7d4f2164cc924150f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9979-use-after-free-befd3626</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9979%3A%20Use%20After%20Free&amp;severity=medium&amp;id=691f769028b41f27b43d1291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47674-vulnerability-in-linux-linux-be04a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe04a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45274-cwe-306-missing-authentication-for--117e5a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45274%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MB%20connect%20line%20mbNET.mini&amp;severity=critical&amp;id=690908517fff0e30cee23572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47945-cwe-340-generation-of-predictable-n-a6a8196c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47945%3A%20CWE-340%3A%20Generation%20of%20Predictable%20Numbers%20or%20Identifiers%20in%20RITTAL%20GmbH%20%26%20Co.%20KG%20IoT%20Interface%20%26%20CMC%20III%20Processing%20Unit&amp;severity=critical&amp;id=69092ee835043901e82caaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47944-cwe-1299-missing-protection-mechani-c02fd706</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47944%3A%20CWE-1299%3A%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20RITTAL%20GmbH%20%26%20Co.%20KG%20IoT%20Interface%20%26%20CMC%20III%20Processing%20Unit&amp;severity=medium&amp;id=69092ee835043901e82caaa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47943-cwe-347-improper-verification-of-cr-43bb0043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47943%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20RITTAL%20GmbH%20%26%20Co.%20KG%20IoT%20Interface%20%26%20CMC%20III%20Processing%20Unit&amp;severity=critical&amp;id=69092ee835043901e82caa9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9895-cwe-79-improper-neutralization-of-in-4306e513</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elbanyaoui%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=699f6b63b7ef31ef0b554e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9837-cwe-94-improper-control-of-generatio-23194810</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9837%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20numanrki%20AADMY%20%E2%80%93%20Add%20Auto%20Date%20Month%20Year%20Into%20Posts&amp;severity=high&amp;id=699f6b61b7ef31ef0b554cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9944-cwe-79-improper-neutralization-of-in-9e994053</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20woothemes%20WooCommerce&amp;severity=medium&amp;id=699f6b65b7ef31ef0b554fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9820-cwe-784-reliance-on-cookies-without--93d40d52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9820%3A%20CWE-784%20Reliance%20on%20Cookies%20without%20Validation%20and%20Integrity%20Checking%20in%20a%20Security%20Decision%20in%20dueclic%20WP%202FA%20with%20Telegram&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6757-cwe-200-exposure-of-sensitive-inform-35eb00ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6757%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9687-cwe-639-authorization-bypass-through-0fceda7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9687%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20dueclic%20WP%202FA%20with%20Telegram&amp;severity=high&amp;id=699f6b59b7ef31ef0b5547fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31955-na-cfc89cf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31955%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd9b7ef31ef0b58f880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48283-na-655b2f5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48283%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d11b7ef31ef0b56da63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48282-na-e227d648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48282%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56da60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48280-na-d0f58395</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48280%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56da5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48279-na-7f7dc769</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48279%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56da5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48278-na-41391824</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48278%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d11b7ef31ef0b56da57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44775-na-b2e74123</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44775%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44337-na-9b7e84f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44337%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdcb7ef31ef0b569991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41344-na-669c9d74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41344%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b5683e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41311-na-7d56c1d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41311%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b568385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35584-na-c1b4255e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35584%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5bb7ef31ef0b563475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49195-na-bbeaebca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49195%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7eb7ef31ef0b555ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48783-na-9a0d6373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48783%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7ab7ef31ef0b555c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48782-na-6c6bd5b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48782%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7ab7ef31ef0b555c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48781-na-ce7f7ce8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48781%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7ab7ef31ef0b555c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48779-na-c0b1961b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48779%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7ab7ef31ef0b555c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48714-na-25370d98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48714%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48713-na-fb3c9fec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48713%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48712-na-8b5cd261</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48712%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48710-na-538b370e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48710%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b78b7ef31ef0b555b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48624-na-2ab952b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48624%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b74b7ef31ef0b555994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48623-na-99dfc666</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48623%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b74b7ef31ef0b555991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48622-na-cd8bf617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48622%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b74b7ef31ef0b55598e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48411-na-a653d55a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48411%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b70b7ef31ef0b555721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48948-na-c7303c8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48948%3A%20n%2Fa&amp;severity=medium&amp;id=6925cfc8159f97fbc0f17f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9548-cwe-79-improper-neutralization-of-in-a0e641b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9548%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mostafas1990%20SlimStat%20Analytics&amp;severity=high&amp;id=699f6b52b7ef31ef0b552200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9546-cwe-200-exposure-of-sensitive-inform-dd41180d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9546%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xplodedthemes%20WPIDE%20%E2%80%93%20File%20Manager%20%26%20Code%20Editor&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8184-cwe-400-uncontrolled-resource-consum-6787fb31</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8184%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Jetty&amp;severity=medium&amp;id=690908577fff0e30cee23a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6762-cwe-400-uncontrolled-resource-consum-b00b424d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6762%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Jetty&amp;severity=low&amp;id=690908577fff0e30cee23a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9823-cwe-400-uncontrolled-resource-consum-5f93c9a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9823%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Eclipse%20Foundation%20Jetty&amp;severity=medium&amp;id=690908577fff0e30cee23a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48259-na-7a593a6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48259%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56da43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48257-na-675dac60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48257%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48255-na-5e20767c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48255%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48253-na-04a9e269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48253%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48251-na-c99e5132</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48251%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48249-na-f12f9c95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48249%3A%20n%2Fa&amp;severity=high&amp;id=699f6d11b7ef31ef0b56d9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48168-na-c0a8d867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48168%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48153-na-c8572a8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48153%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48150-na-543a04bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48150%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d0db7ef31ef0b56d7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48120-na-2c6511bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48120%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0bb7ef31ef0b56d734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48119-na-19a7ed49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48119%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d0bb7ef31ef0b56d731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41997-na-70d5a415</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc0b7ef31ef0b568bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35520-na-f6f712f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35520%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5ab7ef31ef0b563400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49214-na-0180fb51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49214%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7eb7ef31ef0b555f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48795-na-a75e05e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48795%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7bb7ef31ef0b555cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48793-na-9c770802</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48793%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7bb7ef31ef0b555cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48792-na-0656cf3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48792%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7bb7ef31ef0b555ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48790-na-ad43e0d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48790%3A%20n%2Fa&amp;severity=medium&amp;id=699f6b7bb7ef31ef0b555ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-13-f12528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8757-cwe-89-improper-neutralization-of-sp-1f549f54</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8757%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20afthemes%20WP%20Post%20Author%20%E2%80%93%20Boost%20Your%20Blog%26%23039%3Bs%20Engagement%20with%20Author%20Box%2C%20Social%20Links%2C%20Co-Authors%2C%20Guest%20Authors%2C%20Post%20Rating%20System%2C%20and%20Custom%20User%20Registration%20Form%20Builder&amp;severity=high&amp;id=699f6b30b7ef31ef0b54f251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8902-cwe-200-exposure-of-sensitive-inform-cfd98c4c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8902%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9595-cwe-79-improper-neutralization-of-in-df591e60</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=699f6b54b7ef31ef0b552387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9696-cwe-79-improper-neutralization-of-in-56b34feb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9696%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rescuethemes%20Rescue%20Shortcodes&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8760-cwe-94-improper-control-of-generatio-92f3c4ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8760%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20bfintal%20Stackable%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8915-cwe-79-improper-neutralization-of-in-7033c2a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8915%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Category%20Icon&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9704-cwe-79-improper-neutralization-of-in-ebf43f5d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dvankooten%20Social%20Sharing%20(by%20Danny)&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5548bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9047-cwe-22-improper-limitation-of-a-path-3a46c300</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9047%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=critical&amp;id=699f6b3cb7ef31ef0b54fa5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9756-cwe-862-missing-authorization-in-sld-a8fddfad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9756%3A%20CWE-862%20Missing%20Authorization%20in%20sldesignpl%20Order%20Attachments%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b5eb7ef31ef0b554b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9670-cwe-79-improper-neutralization-of-in-bddfe49e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sujin2f%202D%20Tag%20Cloud&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5547a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9656-cwe-79-improper-neutralization-of-in-3234ae35</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azexo%20Mynx%20Page%20Builder&amp;severity=medium&amp;id=699f6b56b7ef31ef0b553126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9776-cwe-79-improper-neutralization-of-in-33f69c7a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20butterflymedia%20ImagePress%20%E2%80%93%20Image%20Gallery&amp;severity=medium&amp;id=699f6b5fb7ef31ef0b554be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7489-cwe-79-improper-neutralization-of-in-11cc36a3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Forms%20for%20Mailchimp%20by%20Optin%20Cat%20%E2%80%93%20Grow%20Your%20MailChimp%20List&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fe2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9187-cwe-862-missing-authorization-in-ada-7fb485f3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9187%3A%20CWE-862%20Missing%20Authorization%20in%20adamskaat%20Read%20more%20By%20Adam&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9824-cwe-862-missing-authorization-in-but-dfa03a70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9824%3A%20CWE-862%20Missing%20Authorization%20in%20butterflymedia%20ImagePress%20%E2%80%93%20Image%20Gallery&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9778-cwe-352-cross-site-request-forgery-c-4fd24ec5</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9778%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20butterflymedia%20ImagePress%20%E2%80%93%20Image%20Gallery&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9821-cwe-200-exposure-of-sensitive-inform-e1f1c4ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9821%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20guruteam%20Bot%20for%20Telegram%20on%20WooCommerce&amp;severity=high&amp;id=699f6b61b7ef31ef0b554c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9860-cwe-862-missing-authorization-in-qod-ce4e694d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9860%3A%20CWE-862%20Missing%20Authorization%20in%20QODE%20Bridge%20Core&amp;severity=medium&amp;id=699f6b61b7ef31ef0b554d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9592-cwe-352-cross-site-request-forgery-c-e747c627</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottpaterson%20Easy%20PayPal%20Gift%20Certificate&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5522ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-49193-na-a0cafde8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-49193%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7eb7ef31ef0b555ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-12-f12fd0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48041-improper-neutralization-of-input-du-2b19b766</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CreativeMindsSolutions%20CM%20Tooltip%20Glossary&amp;severity=null&amp;id=69cd74dee6bfc5ba1df014b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48033-deserialization-of-untrusted-data-i-1c5d0ada</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48033%3A%20Deserialization%20of%20Untrusted%20Data%20in%20baptiste.gourdin%20Talkback&amp;severity=null&amp;id=69cd74aae6bfc5ba1def85e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47331-improper-neutralization-of-special--c0f381ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47331%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ninja%20Team%20Multi%20Step%20for%20Contact%20Form&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48020-improper-neutralization-of-special--f1783c31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48020%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20revmakx%20Backup%20and%20Staging%20by%20WP%20Time%20Capsule&amp;severity=null&amp;id=69cd74a8e6bfc5ba1def8588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47353-url-redirection-to-untrusted-site-o-23d7a2c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47353%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7498e6bfc5ba1def8165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44157-parsing-a-maliciously-crafted-video-b727a0d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44157%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20Apple%20TV&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47875-cwe-79-improper-neutralization-of-i-28d35516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47875%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cure53%20DOMPurify&amp;severity=critical&amp;id=690908517fff0e30cee23587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9538-cwe-200-exposure-of-sensitive-inform-71a434b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9538%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b55161e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8913-cwe-200-exposure-of-sensitive-inform-d26cbadd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8913%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7514-cwe-22-improper-limitation-of-a-path-fa34dcef</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7514%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtoffee%20WordPress%20Comments%20Import%20%26%20Export&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55fedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9051-cwe-79-improper-neutralization-of-in-e7b2f2b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9051%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Ultimate%20Post%20Grid&amp;severity=medium&amp;id=699f6b3db7ef31ef0b54fa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9507-cwe-20-improper-input-validation-in--f3c54b0a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9507%3A%20CWE-20%20Improper%20Input%20Validation%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b5514a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9211-cwe-79-improper-neutralization-of-in-df1f6f19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9211%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fullservices%20FULL%20%E2%80%93%20Cliente&amp;severity=medium&amp;id=699f6b43b7ef31ef0b5509b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9610-cwe-79-improper-neutralization-of-in-416fc0ac</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9610%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafasashi%20Language%20Switcher&amp;severity=medium&amp;id=699f6b54b7ef31ef0b5523a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9234-cwe-862-missing-authorization-in-ata-d1d4ccec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9234%3A%20CWE-862%20Missing%20Authorization%20in%20ataurr%20GutenKit%20%E2%80%93%20Page%20Builder%20Blocks%2C%20Patterns%2C%20and%20Templates%20for%20Gutenberg%20Block%20Editor&amp;severity=critical&amp;id=699f6b45b7ef31ef0b550b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9232-cwe-79-improper-neutralization-of-in-f8911d18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9232%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20Download%20Plugins%20and%20Themes%20in%20ZIP%20from%20Dashboard&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9707-cwe-862-missing-authorization-in-the-b84c556c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9707%3A%20CWE-862%20Missing%20Authorization%20in%20themehunk%20Hunk%20Companion&amp;severity=critical&amp;id=699f6b59b7ef31ef0b5548cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9436-cwe-79-improper-neutralization-of-in-c80f17df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9436%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kevinb%20PublishPress%20Revisions%3A%20Duplicate%20Posts%2C%20Submit%2C%20Approve%20and%20Schedule%20Content%20Changes&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9221-cwe-79-improper-neutralization-of-in-8318c17f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leogermani%20Tainacan&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9616-cwe-79-improper-neutralization-of-in-0a30111e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9616%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blockmeister%20BlockMeister%20%E2%80%93%20Block%20Pattern%20Builder&amp;severity=medium&amp;id=699f6b54b7ef31ef0b55241f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9346-cwe-79-improper-neutralization-of-in-0a135e4a</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9346%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20michaelzangl%20Embed%20videos%20and%20respect%20privacy&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9611-cwe-79-improper-neutralization-of-in-7cb1bb0d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ttodua%20Increase%20upload%20file%20size%20%26%20Maximum%20Execution%20Time%20limit&amp;severity=medium&amp;id=699f6b54b7ef31ef0b5523a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9586-cwe-862-missing-authorization-in-vit-6099083b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9586%3A%20CWE-862%20Missing%20Authorization%20in%20vittor1o%20Linkz.ai%20%E2%80%93%20Automatic%20link%20previews%20on%20hover&amp;severity=medium&amp;id=699f6b52b7ef31ef0b552292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9587-cwe-862-missing-authorization-in-vit-57d6838f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9587%3A%20CWE-862%20Missing%20Authorization%20in%20vittor1o%20Linkz.ai%20%E2%80%93%20Automatic%20link%20previews%20on%20hover&amp;severity=medium&amp;id=699f6b52b7ef31ef0b552297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9543-cwe-79-improper-neutralization-of-in-dc11920b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9543%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amandato%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=699f6b52b7ef31ef0b5521f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9822-cwe-288-authentication-bypass-using--2c6322ea</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9822%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20pedaloagency%20Pedalo%20Connector&amp;severity=critical&amp;id=699f6b61b7ef31ef0b554ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46532-na-83cd78f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46532%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d02b7ef31ef0b56c3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46468-na-fbd48dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46468%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46215-na-b31947db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46215%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46088-na-ae061df1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46088%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf8b7ef31ef0b56a988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45754-na-eb3100fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45754%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf1b7ef31ef0b56a5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45184-na-e792cd2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45184%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44807-na-65df7f72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44807%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44734-na-32a1a26c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44734%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44731-na-daf3e0c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44731%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce2b7ef31ef0b569da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44730-na-e6020eea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44730%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce2b7ef31ef0b569da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44729-na-9206263c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44729%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44415-na-07e1e1cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44415%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44414-na-975125d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44414%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44413-na-14610c10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44413%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42640-na-fd38d18f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42640%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc8b7ef31ef0b56902b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42018-na-0f0e57cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42018%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48827-na-fd5d861d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48827%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48813-na-95294818</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48813%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7cb7ef31ef0b555d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48788-na-0671ba5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48788%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7bb7ef31ef0b555ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48787-na-a43d93aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48787%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7bb7ef31ef0b555cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48786-na-ffb64143</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48786%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7bb7ef31ef0b555cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48784-na-32a280b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48784%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7bb7ef31ef0b555cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48778-na-5109c301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48778%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7ab7ef31ef0b555c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48777-na-bb8c4f6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48777%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7ab7ef31ef0b555c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48776-na-667adf1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48776%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7ab7ef31ef0b555c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48775-na-ff231149</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48775%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7ab7ef31ef0b555c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48774-na-2330d3bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48774%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7ab7ef31ef0b555c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48773-na-95096fff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48773%3A%20n%2Fa&amp;severity=high&amp;id=699f6b7ab7ef31ef0b555c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48772-na-5fe7ae1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48772%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b78b7ef31ef0b555ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48771-na-60236999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48771%3A%20n%2Fa&amp;severity=high&amp;id=699f6b78b7ef31ef0b555b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48770-na-0849779e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48770%3A%20n%2Fa&amp;severity=high&amp;id=699f6b78b7ef31ef0b555b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48769-na-4a23da06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48769%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b78b7ef31ef0b555b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48768-na-07e38164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48768%3A%20n%2Fa&amp;severity=high&amp;id=699f6b78b7ef31ef0b555b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47354-url-redirection-to-untrusted-site-o-5252c95c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47354%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20wp.insider%20Simple%20Membership%20After%20Login%20Redirection&amp;severity=null&amp;id=69cd7498e6bfc5ba1def8168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47648-url-redirection-to-untrusted-site-o-6dff0669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47648%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Metagauss%20EventPrime&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def853d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47636-deserialization-of-untrusted-data-i-206690fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47636%3A%20Deserialization%20of%20Untrusted%20Data%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4658-cwe-89-improper-neutralization-of-sp-8244b47c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4658%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TE%20Informatics%20Nova%20CMS&amp;severity=medium&amp;id=68ee4921509368ccaa7248ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9781-cwe-230-improper-handling-of-missing-0b6f7810</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9781%3A%20CWE-230%3A%20Improper%20Handling%20of%20Missing%20Values%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949d3c064ed76fb5b807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9780-cwe-456-missing-initialization-of-a--7bca8fed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9780%3A%20CWE-456%3A%20Missing%20Initialization%20of%20a%20Variable%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949d3c064ed76fb5b801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9074-cwe-79-improper-neutralization-of-in-6bdc9922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20essamamdani%20Advanced%20Blocks%20Pro&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9520-cwe-862-missing-authorization-in-use-7dc1fdfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9520%3A%20CWE-862%20Missing%20Authorization%20in%20userplus%20User%20registration%20%26%20user%20profile%20%E2%80%93%20UserPlus&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b551601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9067-cwe-862-missing-authorization-in-you-31149c0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9067%3A%20CWE-862%20Missing%20Authorization%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8477-cwe-352-cross-site-request-forgery-c-29756f04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8477%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20neeraj_slit%20Newsletter%2C%20SMTP%2C%20Email%20marketing%20and%20Subscribe%20forms%20by%20Brevo%20(formely%20Sendinblue)&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9022-cwe-89-improper-neutralization-of-sp-6e39e1b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9022%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20totalsoft%20TS%20Poll%20%E2%80%93%20Survey%2C%20Versus%20Poll%2C%20Image%20Poll%2C%20Video%20Poll&amp;severity=high&amp;id=699f6b3cb7ef31ef0b54f98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8729-cwe-79-improper-neutralization-of-in-f4e9061c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8729%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brianbrey%20Easy%20Social%20Share%20Buttons&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9685-cwe-862-missing-authorization-in-rai-b993a735</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9685%3A%20CWE-862%20Missing%20Authorization%20in%20rainafarai%20Notification%20for%20Telegram&amp;severity=medium&amp;id=699f6b59b7ef31ef0b5547d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9057-cwe-79-improper-neutralization-of-in-f9c7c7d2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20curatorio%20Curator.io%3A%20Show%20all%20your%20social%20media%20posts%20in%20a%20beautiful%20feed.&amp;severity=medium&amp;id=699f6b3db7ef31ef0b54fa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9581-cwe-94-improper-control-of-generatio-4e0f8f6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9581%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20happyplugins%20Shortcodes%20AnyWhere&amp;severity=high&amp;id=699f6b52b7ef31ef0b55220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9377-cwe-79-improper-neutralization-of-in-bd95f2cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9377%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omardabbas%20Products%2C%20Order%20%26%20Customers%20Export%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9065-cwe-862-missing-authorization-in-mat-4aabcd33</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9065%3A%20CWE-862%20Missing%20Authorization%20in%20matbao%20WP%20Helper%20Premium&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9064-cwe-79-improper-neutralization-of-in-ffcb4088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20namogo%20Elementor%20Inline%20SVG&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9066-cwe-79-improper-neutralization-of-in-6c4ae38b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dale668%20Marketing%20and%20SEO%20Booster&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9522-cwe-288-authentication-bypass-using--80e5163d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9522%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20lagunaisw%20WP%20Users%20Masquerade&amp;severity=high&amp;id=699f6b4fb7ef31ef0b55160b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9518-cwe-269-improper-privilege-managemen-14a69288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9518%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20userplus%20User%20registration%20%26%20user%20profile%20%E2%80%93%20UserPlus&amp;severity=critical&amp;id=699f6b4fb7ef31ef0b5515f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8987-cwe-79-improper-neutralization-of-in-6ef02698</loc>
    <lastmod>2026-03-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8513-cwe-862-missing-authorization-in-qua-379cfc7b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8513%3A%20CWE-862%20Missing%20Authorization%20in%20quarka%20QA%20Analytics%20%E2%80%93%20Web%20Analytics%20Tool%20with%20Heatmaps%20%26%20Session%20Replay%20Across%20All%20Pages&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9205-cwe-79-improper-neutralization-of-in-b9ec3228</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20Maximum%20Products%20per%20User%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9519-cwe-266-incorrect-privilege-assignme-c537a3e3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9519%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20userplus%20User%20registration%20%26%20user%20profile%20%E2%80%93%20UserPlus&amp;severity=high&amp;id=699f6b4fb7ef31ef0b5515fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9072-cwe-79-improper-neutralization-of-in-380c3f1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gdprextensionscom%20GDPR-Extensions-com%20%E2%80%93%20Consent%20Manager&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9457-cwe-79-improper-neutralization-of-in-45ce959c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cssjockey%20WP%20Builder&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7048-cwe-863-incorrect-authorization-in-o-221e0207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7048%3A%20CWE-863%20Incorrect%20Authorization%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36051-80661151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36051&amp;severity=null&amp;id=699f6c5bb7ef31ef0b563480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35202-na-b75e6366</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35202%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48949-na-9c606ec2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48949%3A%20n%2Fa&amp;severity=critical&amp;id=6925cfc8159f97fbc0f17f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48958-na-53ba7913</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48958%3A%20n%2Fa&amp;severity=high&amp;id=690908517fff0e30cee2358e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-10-94b80470</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-10&amp;severity=medium&amp;id=68367c99182aa0cae232406f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7041-cwe-639-authorization-bypass-through-2a776fa4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7041%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20open-webui%20open-webui%2Fopen-webui&amp;severity=medium&amp;id=68ef9b2b178f764e1f470d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3656-exposure-of-sensitive-information-to-a018498b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3656%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=high&amp;id=691ec3739f5a9374a9d10fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9468-cwe-787-out-of-bounds-write-in-palo-alto-networks-cloud-ngfw-bed996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9468%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Palo%20Alto%20Networks%20Cloud%20NGFW&amp;severity=high&amp;id=682d983ac4522896dcbed996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9465-cwe-89-improper-neutralization-of-sp-f875eb6e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9465%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Expedition&amp;severity=critical&amp;id=68f7d9b8247d717aace26cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9463-cwe-78-improper-neutralization-of-sp-52b3a78d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9463%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Palo%20Alto%20Networks%20Expedition&amp;severity=critical&amp;id=68f7d9b8247d717aace26cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47673-vulnerability-in-linux-linux-be0487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47672-vulnerability-in-linux-linux-be0476</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47672&amp;severity=null&amp;id=682d9825c4522896dcbe0476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47671-vulnerability-in-linux-linux-be0470</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47670-vulnerability-in-linux-linux-be046c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe046c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7840-cwe-77-improper-neutralization-of-sp-6ebe208d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7840%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Progress%20Software%20Telerik%20Reporting&amp;severity=high&amp;id=690908577fff0e30cee23a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9675-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-b41bd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9675%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=682d513c4d7c5ea9f4b41bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9671-missing-authorization-90a13c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9671%3A%20Missing%20Authorization&amp;severity=medium&amp;id=68f6478a50505a0863b7fd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8048-cwe-470-use-of-externally-controlled-116fec1a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8048%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Progress%20Software%20Telerik%20Reporting&amp;severity=high&amp;id=690908577fff0e30cee23a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8014-cwe-470-use-of-externally-controlled-9e7f64a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8014%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Progress%20Software%20Telerik%20Reporting&amp;severity=high&amp;id=690908577fff0e30cee23a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47669-vulnerability-in-linux-linux-be0468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47668-vulnerability-in-linux-linux-be0464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47667-vulnerability-in-linux-linux-be0460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47666-vulnerability-in-linux-linux-be0451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47665-vulnerability-in-linux-linux-be0449</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47664-vulnerability-in-linux-linux-be0441</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47663-vulnerability-in-linux-linux-be0426</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47662-vulnerability-in-linux-linux-be0422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47661-vulnerability-in-linux-linux-be0415</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47660-vulnerability-in-linux-linux-be0411</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47659-vulnerability-in-linux-linux-be040d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe040d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47658-vulnerability-in-linux-linux-be0409</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46871-vulnerability-in-linux-linux-be03bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe03bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46870-vulnerability-in-linux-linux-be03b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9286-cwe-89-improper-neutralization-of-sp-bf2f1cfd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9286%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20TRtek%20Software%20Distant%20Education%20Platform&amp;severity=high&amp;id=68ee4e5118c99eb639aa9a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9680-use-after-free-in-animation-timeline-c1b65273</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9680%3A%20Use-after-free%20in%20Animation%20timeline%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=68f7d9b8247d717aace26cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9451-cwe-79-improper-neutralization-of-in-af894975</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20afragen%20Embed%20PDF%20Viewer&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9449-cwe-79-improper-neutralization-of-in-25fba7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gregross%20Auto%20iFrame&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7963-cwe-79-improper-neutralization-of-in-d58b2693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmsmasters%20CMSMasters%20Content%20Composer&amp;severity=medium&amp;id=699f6c20b7ef31ef0b5603fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25825-na-5744d5f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25825%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6fb7ef31ef0b572223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25286-e83b3d04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25286&amp;severity=null&amp;id=699f6d63b7ef31ef0b571c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25285-fb75daca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25285&amp;severity=null&amp;id=699f6d63b7ef31ef0b571c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25284-b454c554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25284&amp;severity=null&amp;id=699f6d63b7ef31ef0b571c25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25283-7326e259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25283&amp;severity=null&amp;id=699f6d63b7ef31ef0b571c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25282-d91288f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25282&amp;severity=null&amp;id=699f6d63b7ef31ef0b571c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47191-na-ae77e34a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47191%3A%20n%2Fa&amp;severity=high&amp;id=699f6d08b7ef31ef0b56d57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46316-na-c44f6cfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46316%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46307-na-b549575a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46307%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46304-na-798c4b73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46304%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46292-na-a69dbc70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46292%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46237-na-bec8410a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46237%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45746-na-73cff6b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45746%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf1b7ef31ef0b56a5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45179-na-40bfd145</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45179%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45160-na-008bc34e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45160%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42934-na-d3553369</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42934%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48942-na-d961df04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48942%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7cb7ef31ef0b555dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48941-na-daf21101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48941%3A%20n%2Fa&amp;severity=critical&amp;id=699f6b7cb7ef31ef0b555df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48933-na-88e87c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48933%3A%20n%2Fa&amp;severity=medium&amp;id=69092ee835043901e82caabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9602-type-confusion-in-google-chrome-24798ba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9602%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=691f65fd40b920e2707f6006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43572-cwe-707-improper-neutralization-in--f0bacf0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43572%3A%20CWE-707%3A%20Improper%20Neutralization%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9b5247d717aace26b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43468-cwe-89-improper-neutralization-of-s-75743901</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43468%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Configuration%20Manager&amp;severity=critical&amp;id=698e242ec9e1ff5ad802d090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43573-cwe-79-improper-neutralization-of-i-1964af08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43573%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Windows%2010%20Version%2022H2&amp;severity=medium&amp;id=68f7d9b5247d717aace26b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38229-cwe-416-use-after-free-in-microsoft-microsoft-visual-studio-2022-version-17-6-bda7ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38229%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.6&amp;severity=high&amp;id=682d981cc4522896dcbda7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9622-inconsistent-interpretation-of-http--4a3b15bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9622%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=medium&amp;id=6920235bcf2d47c38997b88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9621-insertion-of-sensitive-information-i-70d9c175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9621%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&amp;severity=medium&amp;id=691f82024f1c50aa2eb5aeb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9620-cleartext-transmission-of-sensitive--921bd9e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9620%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information&amp;severity=medium&amp;id=691f82024f1c50aa2eb5aeaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9380-cwe-77-improper-neutralization-of-sp-63df5f4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9380%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Ivanti%20CSA%20(Cloud%20Services%20Appliance)&amp;severity=high&amp;id=68f7d9b8247d717aace26cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9379-cwe-89-improper-neutralization-of-sp-bb218d3e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9379%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ivanti%20CSA%20(Cloud%20Services%20Appliance)&amp;severity=medium&amp;id=68f7d9b8247d717aace26cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8431-cwe-862-missing-authorization-in-rob-27ad79aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8431%3A%20CWE-862%20Missing%20Authorization%20in%20robosoft%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=699f6c28b7ef31ef0b56093e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8482-cwe-79-improper-neutralization-of-in-dc443001</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9207-cwe-79-improper-neutralization-of-in-d9137038</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9207%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boonebgorges%20BuddyPress%20Docs&amp;severity=medium&amp;id=699f6b43b7ef31ef0b55099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8488-cwe-79-improper-neutralization-of-in-ef879671</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ays-pro%20Survey%20Maker&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8433-cwe-79-improper-neutralization-of-in-d965ff30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8433%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehunk%20Easy%20Mega%20Menu%20Plugin%20for%20WordPress%20%E2%80%93%20ThemeHunk&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8629-cwe-79-improper-neutralization-of-in-4ab22cd7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8629%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amirhelzer%20WooCommerce%20Multilingual%20%26%20Multicurrency%20with%20WPML&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47565-cwe-183-permissive-list-of-allowed--04b42377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47565%3A%20CWE-183%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=69b05637ea502d3aa87d7c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47563-cwe-22-improper-limitation-of-a-pat-5c513466</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47563%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=medium&amp;id=69b05637ea502d3aa87d7c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47562-cwe-77-improper-neutralization-of-s-a4b80008</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47562%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=high&amp;id=69b05637ea502d3aa87d7c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47553-cwe-88-improper-neutralization-of-a-931f9a83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47553%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Siemens%20SINEC%20Security%20Monitor&amp;severity=critical&amp;id=69b05637ea502d3aa87d7c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46887-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-siemens-simatic-drive-controller-cpu-1504d-tf-bd66ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46887%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d9816c4522896dcbd66ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46886-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-siemens-simatic-drive-controller-cpu-1504d-tf-bd66c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46886%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d9816c4522896dcbd66c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8943-cwe-288-authentication-bypass-using--a6540dfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8943%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20latepoint%20LatePoint%20Plugin&amp;severity=critical&amp;id=699f6b3ab7ef31ef0b54f7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8911-cwe-89-improper-neutralization-of-sp-3722ad57</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8911%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20latepoint%20LatePoint%20Plugin&amp;severity=critical&amp;id=699f6b38b7ef31ef0b54f71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8964-cwe-79-improper-neutralization-of-in-737058c5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8964%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sirv%20Image%20Optimizer%2C%20Resizer%20and%20CDN%20%E2%80%93%20Sirv&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9292-cwe-79-improper-neutralization-of-in-b87bed24</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9292%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20QODE%20Bridge%20Core&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21533-arbitrary-argument-injection-in-ggi-cdd93600</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21533%3A%20Arbitrary%20Argument%20Injection%20in%20ggit&amp;severity=medium&amp;id=69bf1f9ff4197a8e3b06ff5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21532-command-injection-in-ggit-22fe3bef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21532%3A%20Command%20Injection%20in%20ggit&amp;severity=high&amp;id=69bf1f9ff4197a8e3b06ff58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9026-cwe-158-improper-neutralization-of-n-39227213</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9026%3A%20CWE-158%3A%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character%20in%20PHP%20Group%20PHP&amp;severity=low&amp;id=6909325935043901e83099ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8927-vulnerability-in-php-group-php-f0ccfbff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8927%3A%20Vulnerability%20in%20PHP%20Group%20PHP&amp;severity=high&amp;id=6909325935043901e830999f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8926-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-php-group-php-bf0825</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8926%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20PHP%20Group%20PHP&amp;severity=high&amp;id=682d983fc4522896dcbf0825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8925-vulnerability-in-php-group-php-4860e6f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8925%3A%20Vulnerability%20in%20PHP%20Group%20PHP&amp;severity=low&amp;id=6909325935043901e830999a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25885-na-567bfbc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25885%3A%20n%2Fa&amp;severity=high&amp;id=699f6d73b7ef31ef0b572405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46539-na-92b49e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46539%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56c3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46410-na-a05e5a56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46410%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfeb7ef31ef0b56ac0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45918-na-48f45c47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45918%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf3b7ef31ef0b56a755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45880-na-13128ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45880%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44349-na-43cbd40b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44349%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdcb7ef31ef0b5699a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36814-na-3a5f58a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36814%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c66b7ef31ef0b5639e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-08-f12da6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43047-cwe-416-use-after-free-in-qualcomm--95990a10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43047%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68f7d9b4247d717aace26ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47344-exposure-of-sensitive-information-t-4a4d31c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47344%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Stylemix%20uListing&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47335-improper-neutralization-of-special--17927e5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47335%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=null&amp;id=69cd7493e6bfc5ba1def8065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46446-na-f65179df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46446%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56ac63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46325-na-7d955ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46325%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfcb7ef31ef0b56ab32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46300-na-b8d95fff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46300%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfcb7ef31ef0b56ab1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46278-na-c04c97ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46278%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46076-na-05f70956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46076%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf7b7ef31ef0b56a916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46041-na-26a81277</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46041%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf6b7ef31ef0b56a87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46040-na-4500a552</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46040%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45933-na-04204c5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45933%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45932-na-727c471a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45932%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf3b7ef31ef0b56a75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45919-na-e1938eda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45919%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45894-na-88b65e4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45894%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45874-na-1c8407c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45874%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf1b7ef31ef0b56a67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45873-na-363fbc98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45873%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf1b7ef31ef0b56a676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44674-na-5e21ea78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44674%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce0b7ef31ef0b569c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44068-na-2ed69644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44068%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42831-na-45924f36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42831%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b5693e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-07-f1214c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f1214c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mamba-2fa-a-new-contender-in-the-aitm-phishing-ecosystem-f0c536</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mamba%202FA%3A%20A%20new%20contender%20in%20the%20AiTM%20phishing%20ecosystem&amp;severity=low&amp;id=682acdbebbaf20d303f0c536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47338-improper-neutralization-of-special--e868aa97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47338%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Saad%20Iqbal%20WPExperts%20Square%20For%20GiveWP&amp;severity=null&amp;id=69cd7493e6bfc5ba1def806e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47350-improper-neutralization-of-special--24ade035</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47350%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Ajax%20Search&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47650-improper-neutralization-of-input-du-646702cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47650%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Axton%20WP-WebAuthn&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44010-improper-neutralization-of-input-du-4066fe89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44010%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchthemes%20Full%20frame&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44022-improper-neutralization-of-input-du-fec5db3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44022%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Trustmary%20Review%20%26%20testimonial%20widgets&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44024-improper-neutralization-of-input-du-5b7dff7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44024%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Medical%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44026-improper-neutralization-of-input-du-9728bb45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44026%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Charity%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44027-improper-neutralization-of-input-du-3d9afe0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44027%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atawai%20Gum%20Elementor%20Addon&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44032-improper-neutralization-of-input-du-403ed472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44032%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Restaurant%20%26%20Cafe%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44033-improper-neutralization-of-input-du-f220692f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44033%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Primary%20Addon%20for%20Elementor&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44035-improper-neutralization-of-input-du-fbe16be1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44035%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atawai%20Gum%20Elementor%20Addon&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44036-improper-neutralization-of-input-du-ec1ed7d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44036%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pierre%20Lebedel%20Kodex%20Posts%20likes&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44037-improper-neutralization-of-input-du-b6f4391e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44037%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magepeopleteam%20Multipurpose%20Ticket%20Booking%20Manager&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44040-improper-neutralization-of-input-du-b6cc5712</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44040%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20ShiftController%20Employee%20Shift%20Scheduling&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44041-improper-neutralization-of-input-du-fa6240eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44041%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Northern%20Beaches%20Websites%20IdeaPush&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44042-improper-neutralization-of-input-du-ca45cffd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44042%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Fahad%20Mahmood%20WP%20Datepicker&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44043-improper-neutralization-of-input-du-4dba7109</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44043%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010Web%20Photo%20Gallery%20by%2010Web&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44045-improper-neutralization-of-input-du-bcea2f1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44045%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kevon%20Adonis%20WP%20Abstracts&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44046-improper-neutralization-of-input-du-0b2d25ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44046%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20%E2%80%93%20WooCommerce%20Product%20Filter&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45454-improper-neutralization-of-input-du-cc9caff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45454%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Unlimited%20Elements%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47297-improper-neutralization-of-input-du-bad4dfff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47297%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20CP%20Polls&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47298-improper-neutralization-of-input-du-541c0fb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47298%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47299-improper-neutralization-of-input-du-e9465827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47299%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SeedProd%20Coming%20Soon%20Page%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20by%20SeedProd&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47300-improper-neutralization-of-input-du-eeb14357</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47300%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Imran%20Tauqeer%20CubeWP%20Forms&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47301-improper-neutralization-of-input-du-42d913e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47301%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bit%20Apps%20Bit%20Form&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47306-improper-neutralization-of-input-du-64c71a98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Secure%20Copy%20Content%20Protection%20and%20Content%20Locking&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47307-improper-neutralization-of-input-du-8cf8977c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Essential%20Plugin%20Meta%20slider%20and%20carousel%20with%20lightbox&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47310-improper-neutralization-of-input-du-adff1984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47310%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arisoft%20ARI%20Fancy%20Lightbox&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47313-improper-neutralization-of-input-du-6d2c94b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchthemes%20Catch%20Base&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47320-improper-neutralization-of-input-du-18d50d2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47320%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mark%20Westguard%20WS%20Form%20LITE&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47322-improper-neutralization-of-input-du-039181a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47322%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ex-Themes%20WP%20Timeline%20%E2%80%93%20Vertical%20and%20Horizontal%20timeline%20plugin&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47326-improper-neutralization-of-input-du-ef238ccc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47326%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ILLID%20Share%20This%20Image&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47327-improper-neutralization-of-input-du-c09ce17d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47327%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Eyal%20Fitoussi%20GEO%20my%20WordPress&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47329-improper-neutralization-of-input-du-85690346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47329%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47332-improper-neutralization-of-input-du-a6efcc81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47332%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowDevs%20Sky%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7493e6bfc5ba1def805f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47333-improper-neutralization-of-input-du-3f9a46ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tangible%20Loops%20%26%20Logic&amp;severity=null&amp;id=69cd7493e6bfc5ba1def8062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47336-improper-neutralization-of-input-du-883a8a3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47336%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vladimir%20Statsenko%20Terms%20descriptions&amp;severity=null&amp;id=69cd7493e6bfc5ba1def8068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47339-improper-neutralization-of-input-du-ec9e2f60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47339%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JWardee%20WP%20Mail%20Catcher&amp;severity=null&amp;id=69cd7493e6bfc5ba1def8071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47340-improper-neutralization-of-input-du-56f2f96d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47340%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=null&amp;id=69cd7493e6bfc5ba1def8074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47341-improper-neutralization-of-input-du-f9e150ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lester%20Chan%20WP-DownloadManager&amp;severity=null&amp;id=69cd7493e6bfc5ba1def8077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47342-improper-neutralization-of-input-du-ea92403e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47342%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Accordion&amp;severity=null&amp;id=69cd7493e6bfc5ba1def807a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47343-improper-neutralization-of-input-du-151d65fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47343%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kraft%20Plugins%20Mega%20Elements&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47345-improper-neutralization-of-input-du-7838b134</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47345%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Starter%20Templates&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47346-improper-neutralization-of-input-du-948ad97e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47346%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Newsletters&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47347-improper-neutralization-of-input-du-5910fd14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47347%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ays%20Pro%20Chartify&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47348-improper-neutralization-of-input-du-78025d47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47348%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YellowPencil%20YellowPencil%20Visual%20CSS%20Style%20Editor&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47349-improper-neutralization-of-input-du-5256ef0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amauri%20WPMobile.App&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47352-improper-neutralization-of-input-du-3a5a4722</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47352%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xylus%20Themes%20WP%20Bulk%20Delete&amp;severity=null&amp;id=69cd7495e6bfc5ba1def80f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47355-improper-neutralization-of-input-du-2310f39d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47355%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CozyThemes%20Cozy%20Blocks&amp;severity=null&amp;id=69cd7498e6bfc5ba1def816b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47356-improper-neutralization-of-input-du-19a083e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47356%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20catchthemes%20Create&amp;severity=null&amp;id=69cd7498e6bfc5ba1def816e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47357-improper-neutralization-of-input-du-fbd3ea23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47357%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7498e6bfc5ba1def8171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47360-improper-neutralization-of-input-du-03ef58a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47360%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=null&amp;id=69cd7498e6bfc5ba1def817a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47364-improper-neutralization-of-input-du-8d56dd6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47364%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47365-improper-neutralization-of-input-du-a8c323d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47365%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Atakan%20Au%20Automatically%20Hierarchic%20Categories%20in%20Menu&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47366-improper-neutralization-of-input-du-5e909bc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47366%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47367-improper-neutralization-of-input-du-383aed0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47367%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Product%20Add-Ons&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47368-improper-neutralization-of-input-du-72d462d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47368%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-06-f1243e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f1243e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47369-improper-neutralization-of-input-du-606bc52d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47369%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweb%20Social%20Auto%20Poster&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47370-improper-neutralization-of-input-du-a4b11286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47370%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Paul%20Bearne%20Author%20Avatars%20List%2FBlock&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47371-improper-neutralization-of-input-du-63e6acaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47371%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Walter%20Pinem%20WP%20MyLinks&amp;severity=null&amp;id=69cd749ae6bfc5ba1def81fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47373-improper-neutralization-of-input-du-67b103dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47373%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=69cd749ae6bfc5ba1def8201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47374-improper-neutralization-of-input-du-dfc28c63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47374%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiteSpeed%20Technologies%20LiteSpeed%20Cache&amp;severity=null&amp;id=69cd749ae6bfc5ba1def8204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47375-improper-neutralization-of-input-du-5ff3f3a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47375%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20XLTab%20%E2%80%93%20Accordions%20and%20Tabs%20for%20Elementor%20Page%20Builder&amp;severity=null&amp;id=69cd749de6bfc5ba1def8253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47376-improper-neutralization-of-input-du-e594120b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47376%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Tribulant%20Software%20Slideshow%20Gallery&amp;severity=null&amp;id=69cd749de6bfc5ba1def8256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47377-improper-neutralization-of-input-du-911c5dbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47377%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themekraft%20BuddyForms&amp;severity=null&amp;id=69cd749de6bfc5ba1def8259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47378-improper-neutralization-of-input-du-c5e1a474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47378%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Lomu%20WPCOM%20Member&amp;severity=null&amp;id=69cd749de6bfc5ba1def825c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47379-improper-neutralization-of-input-du-001fa6f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47379%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shamalli%20Web%20Directory%20Free&amp;severity=null&amp;id=69cd749de6bfc5ba1def825f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47380-improper-neutralization-of-input-du-af7bd338</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47380%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=null&amp;id=69cd749de6bfc5ba1def8262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47381-improper-neutralization-of-input-du-5141de49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47381%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Depicter%20Slider&amp;severity=null&amp;id=69cd749de6bfc5ba1def8265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47382-improper-neutralization-of-input-du-f5f37b52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47382%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20Page-list&amp;severity=null&amp;id=69cd749de6bfc5ba1def8268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47383-improper-neutralization-of-input-du-72329bb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47383%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webangon%20The%20Pack%20Elementor%20addons&amp;severity=null&amp;id=69cd749de6bfc5ba1def826b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47384-improper-neutralization-of-input-du-f640d18c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47384%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AresIT%20WP%20Compress&amp;severity=null&amp;id=69cd749de6bfc5ba1def826e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47385-improper-neutralization-of-input-du-e4945f5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47385%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Blocks%20for%20Gutenberg&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def8317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47386-improper-neutralization-of-input-du-18956285</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47386%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Extended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def831a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47387-improper-neutralization-of-input-du-a17df3c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47387%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Search%20Atlas%20Group%20Search%20Atlas%20SEO&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def831d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47388-improper-neutralization-of-input-du-c4f28610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47388%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iova.mihai%20SliceWP&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def8320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47389-improper-neutralization-of-input-du-4295bb0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47389%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Basix%20NEX-Forms&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def8323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47390-improper-neutralization-of-input-du-9fb44783</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47390%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def8326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47391-improper-neutralization-of-input-du-df8781d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47391%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47392-improper-neutralization-of-input-du-eda27dc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47392%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def832c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47393-improper-neutralization-of-input-du-5ad1537f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47393%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mohamed%20Magdy%20Quill%20Forms&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47394-improper-neutralization-of-input-du-1e46c833</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47394%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eyecix%20JobSearch&amp;severity=null&amp;id=69cd74a0e6bfc5ba1def8332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47395-improper-neutralization-of-input-du-555a16fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47395%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robokassa%20Robokassa%20payment%20gateway%20for%20Woocommerce&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def8383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47621-improper-neutralization-of-input-du-b22236a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47621%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Katie%20Zotpress&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def8389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47622-improper-neutralization-of-input-du-0ee29ffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47622%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ILLID%20Advanced%20Woo%20Labels&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def838c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47623-improper-neutralization-of-input-du-8fb46c0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47623%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GhozyLab%20Gallery%20Lightbox&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def838f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47624-improper-neutralization-of-input-du-abb5f420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47624%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bannersky%20BSK%20Forms%20Blacklist&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def8392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47625-improper-neutralization-of-input-du-cc5a10b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47625%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def8395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47626-improper-neutralization-of-input-du-817a3794</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def8398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47627-improper-neutralization-of-input-du-ada0e3f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47627%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Travel%20WP%20Travel%20Gutenberg%20Blocks&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def839b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47628-improper-neutralization-of-input-du-0d8cb723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47628%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LA-Studio%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def839e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47629-improper-neutralization-of-input-du-0f826d17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47629%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47630-improper-neutralization-of-input-du-8eef2fb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47630%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Element%20Invader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47631-improper-neutralization-of-input-du-eea85522</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20Logo%20Carousel%20%E2%80%93%20Clients%20logo%20carousel%20for%20WP&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47632-improper-neutralization-of-input-du-f1ad7c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47632%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Detheme%20DethemeKit%20For%20Elementor&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47638-improper-neutralization-of-input-du-86c4be0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47638%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47639-improper-neutralization-of-input-du-fd9468dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47639%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vibhav%20Sinha%20VdoCipher&amp;severity=null&amp;id=69cd74a4e6bfc5ba1def84d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47642-improper-neutralization-of-input-du-9deaacbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47642%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Keap%20Keap%20Official%20Opt-in%20Forms&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47643-improper-neutralization-of-input-du-6961f776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47643%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Alex%20Include%20Fussball.de%20Widgets&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def852d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47644-improper-neutralization-of-input-du-bd8d1f7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47644%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Copyscape%20Copyscape%20Premium&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47646-url-redirection-to-untrusted-site-o-2a5415c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47646%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20tomlister%20Payflex%20Payment%20Gateway&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47647-improper-neutralization-of-input-du-290594c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Essekia%20Helpie%20FAQ&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47324-path-traversal-in-ex-themes-wp-time-65b68f51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47324%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20Ex-Themes%20WP%20Timeline%20%E2%80%93%20Vertical%20and%20Horizontal%20timeline%20plugin&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47323-improper-control-of-filename-for-in-85329ac3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47323%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Ex-Themes%20WP%20Timeline%20%E2%80%93%20Vertical%20and%20Horizontal%20timeline%20plugin&amp;severity=null&amp;id=69cd7491e6bfc5ba1def7fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47319-unrestricted-upload-of-file-with-da-d082347b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47319%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Bit%20Apps%20Bit%20Form&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47316-authorization-bypass-through-user-c-5a6ca079</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47316%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Dimitri%20Grassi%20Salon%20booking%20system&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47309-improper-limitation-of-a-pathname-t-bbd83f1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47309%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Condless%20Cities%20Shipping%20Zones%20for%20WooCommerce&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44034-improper-limitation-of-a-pathname-t-0303ee6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44034%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Martin%20Greenwood%20WPSPX&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44023-improper-control-of-filename-for-in-25e9d037</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44023%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20abcapp%20ABCApp%20Creator&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44018-improper-limitation-of-a-pathname-t-e482b064</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44018%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20istmoplugins%20Instant%20Chat%20Floating%20Button%20for%20WordPress%20Websites&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9314-cwe-502-deserialization-of-untrusted-468e5d9b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9314%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20rankmath%20Rank%20Math%20SEO%20%E2%80%93%20AI%20SEO%20Tools%20to%20Dominate%20SEO%20Rankings&amp;severity=high&amp;id=699f6b49b7ef31ef0b550e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9161-cwe-862-missing-authorization-in-ran-54fe9b9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9161%3A%20CWE-862%20Missing%20Authorization%20in%20rankmath%20Rank%20Math%20SEO%20%E2%80%93%20AI%20SEO%20Tools%20to%20Dominate%20SEO%20Rankings&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44016-improper-limitation-of-a-pathname-t-0f61044b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44016%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20amarksteadman%20Podiant&amp;severity=null&amp;id=69cd747be6bfc5ba1def7acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44015-improper-limitation-of-a-pathname-t-a89fba67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44015%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20istmoplugins%20Users%20Control&amp;severity=null&amp;id=69cd747be6bfc5ba1def7acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44014-improper-limitation-of-a-pathname-t-b9c53d12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44014%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Vmax%20Studio%20Vmax%20Project%20Manager&amp;severity=null&amp;id=69cd7476e6bfc5ba1def7a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44013-improper-limitation-of-a-pathname-t-8d8e7fa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44013%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Innate%20Images%20LLC%20VR%20Calendar&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44012-improper-limitation-of-a-pathname-t-24862c55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44012%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpdev33%20WP%20Newsletter%20Subscription&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44011-improper-limitation-of-a-pathname-t-15b2e5da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44011%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ExpressTech%20Systems%20WP%20Ticket%20Ultra%20Help%20Desk%20%26%20Support%20Plugin&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9146-improper-limitation-of-a-pathname-to-5664a4d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9146%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jamesdlow%20CSS%20JS%20Files&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9417-cwe-434-unrestricted-upload-of-file--ee8baad0</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9417%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hashthemes%20Hash%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b55108b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8486-cwe-79-improper-neutralization-of-in-1ade3975</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8743-cwe-434-unrestricted-upload-of-file--7faef3c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8743%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20Bit%20File%20Manager%20%E2%80%93%20100%25%20Free%20%26%20Open%20Source%20File%20Manager%20and%20Code%20Editor%20for%20WordPress&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9528-cwe-79-improper-neutralization-of-in-b764be52</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9528%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6b4fb7ef31ef0b55160f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9385-cwe-79-improper-neutralization-of-in-032eacca</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Builder&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9455-cwe-79-improper-neutralization-of-in-aba1d8da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20guillaume-lostweb%20WP%20Cleanup%20and%20Basic%20Functions&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5513bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-05-f12434</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f12434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43687-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-microchip-timeprovider-4100-273fb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43687%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Microchip%20TimeProvider%204100&amp;severity=high&amp;id=6830962c0acd01a249273fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8149-cwe-79-improper-neutralization-of-in-0618abfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8149%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=69858a71f9fa50a62fe1264c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8499-cwe-79-improper-neutralization-of-in-0c0edd8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themehigh%20Checkout%20Field%20Editor%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6400-cwe-312-cleartext-storage-of-sensiti-65893948</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6400%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Finrota%20Netahsilat&amp;severity=high&amp;id=68ee4b3a509368ccaa76d78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9271-cwe-79-improper-neutralization-of-in-cd538f97</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9271%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remydcf%20Re%3AWP&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9071-cwe-79-improper-neutralization-of-in-b179aed2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sigmadevs%20Easy%20Demo%20Importer%20%E2%80%93%20A%20Modern%20One-Click%20Demo%20Import%20Solution&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9435-cwe-79-improper-neutralization-of-in-0b642e89</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9435%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plainware%20ShiftController%20Employee%20Shift%20Scheduling&amp;severity=medium&amp;id=699f6b4db7ef31ef0b5512ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9306-cwe-79-improper-neutralization-of-in-8553d1aa</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9306%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9242-cwe-79-improper-neutralization-of-in-5569ad7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9242%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20memberful%20Memberful%20%E2%80%93%20Membership%20Plugin&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8804-cwe-79-improper-neutralization-of-in-8a060ac0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dartiss%20Code%20Embed&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9237-cwe-79-improper-neutralization-of-in-bf1d228d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcentrics%20Fish%20and%20Ships%20%E2%80%93%20Most%20flexible%20shipping%20table%20rate.%20A%20WooCommerce%20shipping%20rate&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8519-cwe-79-improper-neutralization-of-in-3195b24e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8520-cwe-352-cross-site-request-forgery-c-7af7a0fc</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8520%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9384-cwe-79-improper-neutralization-of-in-177967c1</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20Quantity%20Dynamic%20Pricing%20%26%20Bulk%20Discounts%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9445-cwe-79-improper-neutralization-of-in-506d2ddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20acekyd%20Display%20Medium%20Posts&amp;severity=medium&amp;id=699f6b4db7ef31ef0b55139b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9375-cwe-79-improper-neutralization-of-in-33aa1f85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9375%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contact-banker%20WordPress%20Captcha%20Plugin%20by%20Captcha%20Bank&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9204-cwe-79-improper-neutralization-of-in-398fae4c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9204%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nerdpressteam%20Smart%20Custom%20404%20Error%20Page&amp;severity=medium&amp;id=699f6b43b7ef31ef0b55098d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9421-cwe-79-improper-neutralization-of-in-0cc59c9e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20prontotools%20Login%20Logout%20Shortcode&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9368-cwe-79-improper-neutralization-of-in-fb04a8e1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9368%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20migumello%20Aggregator%20Advanced%20Settings&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9349-cwe-79-improper-neutralization-of-in-9913325c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20miunosoft%20Auto%20Amazon%20Links%20%E2%80%93%20Amazon%20Associates%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9372-cwe-79-improper-neutralization-of-in-41657b3e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9372%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockshub%20WP%20Blocks%20Hub&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b550fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9353-cwe-79-improper-neutralization-of-in-ef13abcf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themes4wp%20Popularis%20Extra&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9345-cwe-79-improper-neutralization-of-in-068c1a72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9345%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tychesoftwares%20Product%20Delivery%20Date%20for%20WooCommerce%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8802-cwe-79-improper-neutralization-of-in-345197a6</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cliogrow%20Clio%20Grow&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47913-na-250e4e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47913%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d09b7ef31ef0b56d64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47911-na-8b64dbb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47911%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d09b7ef31ef0b56d649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47910-na-17291718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47910%3A%20n%2Fa&amp;severity=high&amp;id=699f6d09b7ef31ef0b56d644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47855-na-f615fac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47855%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d09b7ef31ef0b56d63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47850-na-048ec499</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47850%3A%20n%2Fa&amp;severity=high&amp;id=699f6d09b7ef31ef0b56d635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47211-na-37a77924</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47211%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d08b7ef31ef0b56d596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46486-na-a1308bbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46486%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46409-na-7da45061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46409%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfeb7ef31ef0b56ac09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46078-na-06660bb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46078%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf8b7ef31ef0b56a96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46077-na-6ec78ce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46077%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44439-na-473adb39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44439%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41516-na-2028628e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41516%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b5687d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41515-na-26680fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41515%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b5687cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41514-na-dce02cd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41514%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b5687c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41513-na-79a0c0d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41513%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b5687c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41512-na-9b4e1193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41512%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b5687bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37869-na-cb53529f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37869%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b56425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37868-na-820cbdcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37868%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b564257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47854-na-d2a99c1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47854%3A%20n%2Fa&amp;severity=medium&amp;id=68f25ddf9c34d0947f2bbefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-04-f13169</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-04&amp;severity=medium&amp;id=682acdc2bbaf20d303f13169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44207-audio-messages-in-messages-may-be-a-ebc2bdd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44207%3A%20Audio%20messages%20in%20Messages%20may%20be%20able%20to%20capture%20a%20few%20seconds%20of%20audio%20before%20the%20microphone%20indicator%20is%20activated%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44204-a-users-saved-passwords-may-be-read-4815b79e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44204%3A%20A%20user&apos;s%20saved%20passwords%20may%20be%20read%20aloud%20by%20VoiceOver%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690929a3fe7723195e0fd26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42415-cwe-190-integer-overflow-or-wraparo-9ab8cbae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42415%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20Project%20G%20Structured%20File%20Library%20(libgsf)&amp;severity=high&amp;id=690929a0fe7723195e0fd0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36474-cwe-190-integer-overflow-or-wraparo-d4f3d938</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36474%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GNOME%20Project%20G%20Structured%20File%20Library%20(libgsf)&amp;severity=high&amp;id=69092626fe7723195e0b5ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8352-cwe-22-improper-limitation-of-a-path-5422f755</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8352%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20dejanmarkovic%20Social%20Web%20Suite%20%E2%80%93%20Social%20Media%20Auto%20Post%2C%20Social%20Media%20Auto%20Publish&amp;severity=high&amp;id=699f6c26b7ef31ef0b56086f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46658-na-3c98afb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46658%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45872-na-94fbc817</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45872%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45871-na-9f5e8a88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45871%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45870-na-a5e0dc78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45870%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41596-na-c145d9e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41596%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbcb7ef31ef0b5688d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41595-na-c99a2680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41595%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbcb7ef31ef0b5688cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41592-na-a8484978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41592%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbcb7ef31ef0b5688cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41590-na-902ab6a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41590%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbcb7ef31ef0b5688c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41589-na-aaa3763e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41589%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b568869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41588-na-f22c19d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41588%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b568865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41586-na-d7c25a9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41586%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b568861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41585-na-73f59bba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41585%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b56885d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41584-na-db72d7cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41584%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b568859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41583-na-474faef0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41583%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b568855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34535-na-f9a1ff6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34535%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c53b7ef31ef0b562bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-03-f125d1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f125d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9440-cwe-79-improper-neutralization-of-in-8f33338a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=692a5c732a13ea799fd8c86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20509-concurrent-execution-using-shared-r-d963ff52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20509%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=medium&amp;id=6840ac7f182aa0cae2bd73a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20513-authorization-bypass-through-user-c-f66f206e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20513%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=medium&amp;id=6840ac7f182aa0cae2bd73a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20502-uncontrolled-resource-consumption-i-f34d30c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20502%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=medium&amp;id=6840ac7f182aa0cae2bd739f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20501-out-of-bounds-write-in-cisco-cisco--c489070b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20501%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=high&amp;id=6840ac7f182aa0cae2bd739d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20499-out-of-bounds-write-in-cisco-cisco--f66c78c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20499%3A%20Out-of-bounds%20Write%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=high&amp;id=6840ac7f182aa0cae2bd7399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20500-uncontrolled-resource-consumption-i-bac6837a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20500%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=medium&amp;id=6840ac7f182aa0cae2bd739b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20498-double-free-in-cisco-cisco-meraki-m-8c56d879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20498%3A%20Double%20Free%20in%20Cisco%20Cisco%20Meraki%20MX%20Firmware&amp;severity=high&amp;id=6840ac7f182aa0cae2bd7397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20432-improper-neutralization-of-special--f9eaf038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20432%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Data%20Center%20Network%20Manager&amp;severity=critical&amp;id=69cdef39e6bfc5ba1d8a4ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44193-a-local-attacker-may-be-able-to-ele-7eadd780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44193%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20iTunes%20for%20Windows&amp;severity=high&amp;id=69ceb82ce6bfc5ba1df6ea60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8505-cwe-87-improper-neutralization-of-al-4f043896</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8505%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20connekthq%20WordPress%20Infinite%20Scroll%20%E2%80%93%20Ajax%20Load%20More&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8282-cwe-79-improper-neutralization-of-in-19ebd0b2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=699f6c24b7ef31ef0b560726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44017-improper-limitation-of-a-pathname-t-c760ff66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44017%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20MinHyeong%20Lim%20MH%20Board&amp;severity=null&amp;id=69cd747be6bfc5ba1def7ad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44030-improper-limitation-of-a-pathname-t-26091dc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44030%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Mestres%20do%20WP%20Checkout%20Mestres%20WP&amp;severity=null&amp;id=69cd7481e6bfc5ba1def7bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9218-cwe-79-improper-neutralization-of-in-1f691474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9218%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpblockart%20Magazine%20Blocks%20%E2%80%93%20Blog%20Designer%2C%20Magazine%20%26%20Newspaper%20Website%20Builder%2C%20Page%20Builder%20with%20Posts%20Blocks%2C%20Post%20Grid&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9378-cwe-79-improper-neutralization-of-in-eb4ddebd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icopydoc%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=699f6b4bb7ef31ef0b551065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9344-cwe-79-improper-neutralization-of-in-3625ccd2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9344%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thevisionofhamza%20BerqWP%20%E2%80%93%20Automated%20All-In-One%20PageSpeed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Cache%2C%20CDN%2C%20Images%2C%20CSS%2C%20and%20JavaScript&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8800-cwe-79-improper-neutralization-of-in-03cd4bb7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8800%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sanrl%20RabbitLoader%20%E2%80%93%20Website%20Speed%20Optimization%20for%20improving%20Core%20Web%20Vital%20metrics%20with%20Cache%2C%20Image%20Optimization%2C%20and%20more&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9210-cwe-79-improper-neutralization-of-in-acdbb515</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9210%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20Top%20Bar&amp;severity=medium&amp;id=699f6b43b7ef31ef0b5509ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9222-cwe-79-improper-neutralization-of-in-beb35a3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9222%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madalinungureanu%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9225-cwe-79-improper-neutralization-of-in-b513be3e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rainbowgeek%20SEOPress%20%E2%80%93%20On-site%20SEO&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9172-cwe-79-improper-neutralization-of-in-f59848ee</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kraftplugins%20Demo%20Importer%20Plus&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8967-cwe-79-improper-neutralization-of-in-c0988e0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iworks%20PWA%20%E2%80%94%20easy%20way%20to%20Progressive%20Web%20App&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8254-cwe-94-improper-control-of-generatio-48d8676a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8254%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6c24b7ef31ef0b56067f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9333-cwe-281-improper-preservation-of-per-b5e039cb</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9333%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20M-Files%20Corporation%20M-Files%20Connector%20for%20Copilot&amp;severity=medium&amp;id=699c3035be58cf853b75f11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9174-cwe-79-improper-neutralization-of-in-7815a0b4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9174%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20M-Files%20Hubshare&amp;severity=medium&amp;id=699c3035be58cf853b75f118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7855-cwe-434-unrestricted-upload-of-file--f0f7956e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7855%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=high&amp;id=699f6c20b7ef31ef0b560354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24122-na-29cb0bba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24122%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b5707f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46626-na-0d0bae8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46626%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45964-na-eb0c6754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45964%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf5b7ef31ef0b56a7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45962-na-cd8ee38c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45962%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf5b7ef31ef0b56a7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45960-na-ac6cc745</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45960%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45186-na-e83c6b69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45186%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ceab7ef31ef0b56a2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41290-na-8bb90665</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41290%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b56836a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33662-na-6ef4cba0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33662%3A%20n%2Fa&amp;severity=high&amp;id=699f6c43b7ef31ef0b561b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33210-na-678c67ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33210%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b5615f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45519-na-8bae0815</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45519%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9b5247d717aace26b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-02-f130f9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9407-improper-input-validation-f37e1bce</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9407%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=6846c60d7b622a9fdf1e791b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9341-improper-link-resolution-before-file-access-link-following-bd6682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9341%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)&amp;severity=medium&amp;id=682d9816c4522896dcbd6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9355-use-of-uninitialized-variable-aec8e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9355%3A%20Use%20of%20Uninitialized%20Variable&amp;severity=medium&amp;id=682cd0fb1484d88663aec8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47071-cwe-22-improper-limitation-of-a-pat-5a404e3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47071%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FreePBX%20endpointman&amp;severity=medium&amp;id=698f9fdcc9e1ff5ad86c3974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9401-memory-safety-bugs-fixed-in-firefox--ad51b6ef</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9401%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20131%2C%20Firefox%20ESR%20115.16%2C%20Firefox%20ESR%20128.3%2C%20Thunderbird%20131%2C%20and%20Thunderbird%20128.3%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6909325c35043901e83099dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9397-potential-directory-upload-bypass-vi-40b7b5d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9397%3A%20Potential%20directory%20upload%20bypass%20via%20clickjacking%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69a5d050b6c0d8506fbcb7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9394-cross-origin-access-to-json-contents-061b1a57</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9394%3A%20Cross-origin%20access%20to%20JSON%20contents%20through%20multipart%20responses%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6909325c35043901e83099d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9393-cross-origin-access-to-pdf-contents--a4ce20e2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9393%3A%20Cross-origin%20access%20to%20PDF%20contents%20through%20multipart%20responses%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6909325935043901e83099be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9392-compromised-content-process-can-bypa-702bc497</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9392%3A%20Compromised%20content%20process%20can%20bypass%20site%20isolation%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=6909325935043901e83099b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9060-cwe-79-improper-neutralization-of-in-674121c9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grandplugins%20AVIF%20Uploader&amp;severity=medium&amp;id=699f6b3db7ef31ef0b54fa75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9118-cwe-79-improper-neutralization-of-in-af11dc65</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9118%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quomodosoft%20QS%20Dark%20Mode%20Plugin&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9289-cwe-288-authentication-bypass-using--a1f0e894</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9289%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20RedefiningTheWeb%20WordPress%20%26%20WooCommerce%20Affiliate%20Program&amp;severity=critical&amp;id=699f6b47b7ef31ef0b550d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8430-cwe-862-missing-authorization-in-spi-cbb557f3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8430%3A%20CWE-862%20Missing%20Authorization%20in%20spicethemes%20Spice%20Starter%20Sites&amp;severity=medium&amp;id=699f6c28b7ef31ef0b56093a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9265-cwe-269-improper-privilege-managemen-9aabad7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9265%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20CodeRevolution%20Echo%20RSS%20Feed%20Post%20Generator&amp;severity=critical&amp;id=699f6b47b7ef31ef0b550d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8324-cwe-79-improper-neutralization-of-in-dfc00389</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ishitaka%20XO%20Slider&amp;severity=medium&amp;id=699f6c26b7ef31ef0b5607df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8786-cwe-79-improper-neutralization-of-in-fb61f15c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brochris%20Auto%20Featured%20Image%20from%20Title&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9018-cwe-89-improper-neutralization-of-sp-436b53be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9018%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hahncgdev%20WP%20Easy%20Gallery%20%E2%80%93%20WordPress%20Gallery%20Plugin&amp;severity=high&amp;id=699f6b3cb7ef31ef0b54f982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9220-cwe-79-improper-neutralization-of-in-e4b4522f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9220%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20Copy%20Media%20File&amp;severity=medium&amp;id=699f6b43b7ef31ef0b550a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8793-cwe-79-improper-neutralization-of-in-76dd64e4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8793%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jkohlbach%20Store%20Exporter%20for%20WooCommerce%20%E2%80%93%20Export%20Products%2C%20Export%20Orders%2C%20Export%20Subscriptions%2C%20and%20More&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8288-cwe-79-improper-neutralization-of-in-fd6596dc</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8288%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20adreastrian%20Guten%20Post%20Layout%20%E2%80%93%20An%20Advanced%20Post%20Grid%20Collection%20for%20WordPress%20Gutenberg&amp;severity=medium&amp;id=699f6c24b7ef31ef0b56072c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9228-cwe-79-improper-neutralization-of-in-2cb212d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9228%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20joelcj91%20Loggedin%20%E2%80%93%20Limit%20Active%20Logins&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8799-cwe-79-improper-neutralization-of-in-9274615b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghuger%20Custom%20Banners&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9224-cwe-22-improper-limitation-of-a-path-c6f3de0e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9224%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kau-boy%20Hello%20World&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9209-cwe-79-improper-neutralization-of-in-67f916ed</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9209%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cornelraiu-1%20WP%20Search%20Analytics&amp;severity=medium&amp;id=699f6b43b7ef31ef0b5509a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9241-cwe-79-improper-neutralization-of-in-983d63d4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9241%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fishpie%20PDF%20Image%20Generator&amp;severity=medium&amp;id=699f6b45b7ef31ef0b550bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8728-cwe-79-improper-neutralization-of-in-3ab84afa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brianbrey%20Easy%20Load%20More&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8727-cwe-79-improper-neutralization-of-in-40f21d49</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20torstenbulk%20DK%20PDF&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7434-cwe-502-deserialization-of-untrusted-f63bf496</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7434%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ultrapressorg%20UltraPress&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9267-cwe-79-improper-neutralization-of-in-7e323740</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optinhound%20Easy%20WordPress%20Subscribe%20%E2%80%93%20Optin%20Hound&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8989-cwe-79-improper-neutralization-of-in-0bea4571</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20galdub%20Free%20Responsive%20Testimonials%2C%20Social%20Proof%20Reviews%2C%20and%20Customer%20Reviews%20%E2%80%93%20Stars%20Testimonials&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8675-cwe-862-missing-authorization-in-sou-534205b8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8675%3A%20CWE-862%20Missing%20Authorization%20in%20soumettre%20Soumettre.fr&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9304-cwe-79-improper-neutralization-of-in-bfbe8257</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dgamoni%20LocateAndFilter&amp;severity=medium&amp;id=699f6b49b7ef31ef0b550e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8990-cwe-79-improper-neutralization-of-in-7b8acbe2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberhobo%20Geo%20Mashup&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8632-cwe-862-missing-authorization-in-cag-331a5968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8632%3A%20CWE-862%20Missing%20Authorization%20in%20cagdasdag%20KB%20Support%20%E2%80%93%20WordPress%20Help%20Desk%20and%20Knowledge%20Base&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8548-cwe-862-missing-authorization-in-cag-31c32e00</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8548%3A%20CWE-862%20Missing%20Authorization%20in%20cagdasdag%20KB%20Support%20%E2%80%93%20WordPress%20Help%20Desk%20and%20Knowledge%20Base&amp;severity=high&amp;id=699f6c2cb7ef31ef0b560c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9272-cwe-79-improper-neutralization-of-in-f781c2e7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9272%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mascotdevelopers%20R%20Animated%20Icon%20Plugin&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8720-cwe-79-improper-neutralization-of-in-b8fcf771</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rumbletalk%20RumbleTalk%20Live%20Group%20Chat%20%E2%80%93%20HTML5&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8718-cwe-79-improper-neutralization-of-in-0edfc690</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8718%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daveshine%20Gravity%20Forms%20Toolbar&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7433-cwe-502-deserialization-of-untrusted-df4bd8ac</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7433%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ultrapressorg%20Empowerment&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9274-cwe-79-improper-neutralization-of-in-3c22d24e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azexo%20Elastik%20Page%20Builder&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7869-cwe-79-improper-neutralization-of-in-8e312bd6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20123.chat%20123.chat%20-%20Video%20Chat&amp;severity=high&amp;id=699f6c20b7ef31ef0b5603d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9106-cwe-288-authentication-bypass-using--0515dcd6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9106%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20xunhuweb%20Wechat%20Social%20login%20%E5%BE%AE%E4%BF%A1QQ%E9%92%89%E9%92%89%E7%99%BB%E5%BD%95%E6%8F%92%E4%BB%B6&amp;severity=critical&amp;id=699f6b3fb7ef31ef0b54fbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7432-cwe-502-deserialization-of-untrusted-b5148485</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7432%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20ultrapressorg%20Unseen%20Blog&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9269-cwe-79-improper-neutralization-of-in-cee55807</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cconover%20Relogo&amp;severity=medium&amp;id=699f6b47b7ef31ef0b550d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9119-cwe-79-improper-neutralization-of-in-aa75a071</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20automatic-rock%20SVG%20Complete&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9108-cwe-434-unrestricted-upload-of-file--028ab6a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9108%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20xunhuweb%20Wechat%20Social%20login%20%E5%BE%AE%E4%BF%A1QQ%E9%92%89%E9%92%89%E7%99%BB%E5%BD%95%E6%8F%92%E4%BB%B6&amp;severity=critical&amp;id=699f6b3fb7ef31ef0b54fbc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8107-cwe-79-improper-neutralization-of-in-33e4c4be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=699f6c22b7ef31ef0b5604c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8981-cwe-80-improper-neutralization-of-sc-ee2aff69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8981%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpmudev%20Broken%20Link%20Checker&amp;severity=high&amp;id=699f6b3ab7ef31ef0b54f89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47396-improper-neutralization-of-input-du-58d5ff78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47396%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd74a2e6bfc5ba1def8386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31835-na-d84a0947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31835%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25661-na-16a97292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25661%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6db7ef31ef0b5720fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25659-na-de104b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25659%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6db7ef31ef0b5720f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25658-na-631c8a32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25658%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6db7ef31ef0b5720f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46084-na-1719a5d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46084%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf8b7ef31ef0b56a97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46083-na-d2630800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46083%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf8b7ef31ef0b56a97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46082-na-4e5900e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46082%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf8b7ef31ef0b56a976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46081-na-45820c71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46081%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf8b7ef31ef0b56a973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46080-na-9a012b1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46080%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf8b7ef31ef0b56a970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46079-na-63037671</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46079%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf8b7ef31ef0b56a96d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45999-na-59bd4433</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45999%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45967-na-6441e511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45967%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf5b7ef31ef0b56a800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44744-na-5682f952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44744%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce2b7ef31ef0b569e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44610-na-94c8d8f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44610%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce0b7ef31ef0b569c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42514-na-61ccb073</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42514%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc1b7ef31ef0b568d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41276-na-95a6eaec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41276%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb5b7ef31ef0b568352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-10-01-f12ea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-10-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-inside-the-dragon-dragonforce-ransomware-group-f0c312</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Inside%20the%20Dragon%3A%20DragonForce%20Ransomware%20Group&amp;severity=low&amp;id=682acdbebbaf20d303f0c312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46869-vulnerability-in-linux-linux-be03ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6051-cwe-926-improper-export-of-android-a-fd12d32b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6051%3A%20CWE-926%20Improper%20Export%20of%20Android%20Application%20Components%20in%20Vercom%20S.A.%20Redlink%20SDK&amp;severity=medium&amp;id=68e0f3bdb66c7f7acdd3cbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47641-improper-neutralization-of-input-du-e99f19dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47641%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Muhammad%20Shakeel%20Confetti%20Fall%20Animation&amp;severity=null&amp;id=69cd74a6e6bfc5ba1def8526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28813-na-505a0b5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28813%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b58924f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28812-na-405479dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28812%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b58924c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28811-na-0130a175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28811%3A%20n%2Fa&amp;severity=low&amp;id=699f6d98b7ef31ef0b589249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28810-na-beff868d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28810%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b589246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28809-na-a4f69528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28809%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b589243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28808-na-3b7d2c36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28808%3A%20n%2Fa&amp;severity=low&amp;id=699f6d98b7ef31ef0b589240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28807-na-895abfcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28807%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b58923d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46635-na-af49c676</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46635%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46549-na-b3b31227</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46549%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56c3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46548-na-26ed1a19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46548%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56c3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46540-na-7a3c36ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46540%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56c3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46511-na-cd8f9733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46511%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46510-na-530c472d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46510%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46503-fd52f652</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46503&amp;severity=null&amp;id=699f6d00b7ef31ef0b56c317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46475-na-0b4791c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46475%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d00b7ef31ef0b56c29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46313-na-03921d0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46313%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46293-na-ae0bfcb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46293%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfab7ef31ef0b56aab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46280-na-c2728688</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46280%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45993-na-1be43dd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45993%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45920-na-7f5b78f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45920%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf3b7ef31ef0b56a75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45200-na-6a2b9103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45200%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42017-na-fcf5d140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42017%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc0b7ef31ef0b568be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35495-na-2e5fd652</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35495%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b5633f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-30-f12b55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-29-f126a0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f126a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8189-cwe-79-improper-neutralization-of-in-648c101e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thangnv27%20WP%20MultiTasking%20%E2%80%93%20WP%20Utilities&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8712-cwe-79-improper-neutralization-of-in-f2934a6f</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8712%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gtmserver%20GTM%20Server%20Side&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8715-cwe-79-improper-neutralization-of-in-cf81067d</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8715%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20clifgriffin%20Simple%20LDAP%20Login&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9189-cwe-862-missing-authorization-in-oma-37526981</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9189%3A%20CWE-862%20Missing%20Authorization%20in%20omardabbas%20EU%2FUK%20VAT%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8353-cwe-502-deserialization-of-untrusted-5dfff602</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8353%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6c26b7ef31ef0b560874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9023-cwe-79-improper-neutralization-of-in-e40cd916</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9023%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20axton%20WP-WebAuthn&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8788-cwe-79-improper-neutralization-of-in-ea9f8d76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8788%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20omardabbas%20EU%2FUK%20VAT%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8547-cwe-79-improper-neutralization-of-in-079add28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grimmdude%20Simple%20Popup%20Plugin&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560c04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-09-28-8540b3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-09-28&amp;severity=medium&amp;id=682b68efd14de609c88540b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-28-f12129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38796-cwe-122-heap-based-buffer-overflow--6bf43e74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38796%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20TianoCore%20EDK2&amp;severity=medium&amp;id=6909084f7fff0e30cee23506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45744-cwe-257-storing-passwords-in-a-reco-2c18c7ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45744%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20TopQuadrant%20TopBraid%20EDG&amp;severity=low&amp;id=68e0f3c0b66c7f7acdd3d073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7149-cwe-22-improper-limitation-of-a-path-5849f4e7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7149%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themewinter%20Event%20Manager%2C%20Events%20Calendar%2C%20Tickets%2C%20Registrations%20%E2%80%93%20Eventin&amp;severity=high&amp;id=699f6c10b7ef31ef0b55f8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45863-null-pointer-dereference-cwe-476-in-7d0cb2a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45863%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Facebook%20Facebook%20Thrift&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45773-use-after-free-cwe-416-in-facebook--7f55c4d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45773%3A%20Use%20After%20Free%20(CWE-416)%20in%20Facebook%20Facebook%20Thrift&amp;severity=high&amp;id=699f6cf1b7ef31ef0b56a60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46868-vulnerability-in-linux-linux-be03a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe03a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46867-vulnerability-in-linux-linux-be03a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe03a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46866-vulnerability-in-linux-linux-be039f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe039f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46865-vulnerability-in-linux-linux-be039b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe039b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46864-vulnerability-in-linux-linux-be0397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46863-vulnerability-in-linux-linux-be0393</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46862-vulnerability-in-linux-linux-be038f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46861-vulnerability-in-linux-linux-be0372</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46860-vulnerability-in-linux-linux-be036e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe036e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46859-vulnerability-in-linux-linux-be036a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe036a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46858-vulnerability-in-linux-linux-be0366</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46857-vulnerability-in-linux-linux-be0364</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46856-vulnerability-in-linux-linux-be0360</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46855-vulnerability-in-linux-linux-bdce2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46854-vulnerability-in-linux-linux-be0353</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46853-vulnerability-in-linux-linux-be0344</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46852-vulnerability-in-linux-linux-be033c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46851-vulnerability-in-linux-linux-be0334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46850-vulnerability-in-linux-linux-be0313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46849-vulnerability-in-linux-linux-be030f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe030f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46848-vulnerability-in-linux-linux-be030b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe030b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46847-vulnerability-in-linux-linux-bdce26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46846-vulnerability-in-linux-linux-be02fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe02fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46845-vulnerability-in-linux-linux-be02f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe02f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46844-vulnerability-in-linux-linux-be02f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe02f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46843-vulnerability-in-linux-linux-aec04a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46842-vulnerability-in-linux-linux-be02e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe02e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46841-vulnerability-in-linux-linux-be02db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe02db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46840-vulnerability-in-linux-linux-be02d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe02d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46838-vulnerability-in-linux-linux-be02cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe02cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46837-vulnerability-in-linux-linux-be02b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe02b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46836-vulnerability-in-linux-linux-be0298</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46835-vulnerability-in-linux-linux-be0294</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46834-vulnerability-in-linux-linux-be028c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe028c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46833-vulnerability-in-linux-linux-be0284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46832-vulnerability-in-linux-linux-be027c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe027c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46831-vulnerability-in-linux-linux-be0274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46830-vulnerability-in-linux-linux-bdce1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46829-vulnerability-in-linux-linux-bdce09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdce09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46828-vulnerability-in-linux-linux-be026e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe026e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46827-vulnerability-in-linux-linux-be026a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe026a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46826-vulnerability-in-linux-linux-be0266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46825-vulnerability-in-linux-linux-be0242</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46824-vulnerability-in-linux-linux-be023e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe023e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46823-vulnerability-in-linux-linux-be022d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe022d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46822-vulnerability-in-linux-linux-be0225</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46821-vulnerability-in-linux-linux-be021d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe021d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46820-vulnerability-in-linux-linux-be0219</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46819-vulnerability-in-linux-linux-aeb058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46818-vulnerability-in-linux-linux-be0215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe0215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46817-vulnerability-in-linux-linux-be0211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46816-vulnerability-in-linux-linux-be0200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe0200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46815-vulnerability-in-linux-linux-be01f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe01f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46814-vulnerability-in-linux-linux-aec048</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46813-vulnerability-in-linux-linux-be01d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe01d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46812-vulnerability-in-linux-linux-be01cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe01cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46811-vulnerability-in-linux-linux-be01c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9825c4522896dcbe01c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46810-vulnerability-in-linux-linux-be01c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe01c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46809-vulnerability-in-linux-linux-be01c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe01c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46808-vulnerability-in-linux-linux-be01bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe01bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46807-vulnerability-in-linux-linux-aec046</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46806-vulnerability-in-linux-linux-be01af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9825c4522896dcbe01af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46805-vulnerability-in-linux-linux-be135d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe135d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46804-vulnerability-in-linux-linux-be1359</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46803-vulnerability-in-linux-linux-aec044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46802-vulnerability-in-linux-linux-be1355</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6931-cwe-79-improper-neutralization-of-in-a73ceb27</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6931%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theeventscalendar%20The%20Events%20Calendar&amp;severity=high&amp;id=699f6c0eb7ef31ef0b55f78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8681-cwe-79-improper-neutralization-of-in-8f2986ed</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8991-cwe-79-improper-neutralization-of-in-fe7fa3b1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9049-cwe-79-improper-neutralization-of-in-655d5df1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6b3db7ef31ef0b54fa5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9029-buffer-over-read-b1405122</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9029%3A%20Buffer%20Over-read&amp;severity=high&amp;id=699f6b3cb7ef31ef0b54fa56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8922-cwe-502-deserialization-of-untrusted-a8facd87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8922%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20rajeshsingh520%20Product%20Enquiry%20for%20WooCommerce%2C%20WooCommerce%20product%20catalog&amp;severity=high&amp;id=699f6b3ab7ef31ef0b54f7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9130-cwe-89-improper-neutralization-of-sp-5afe38e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9130%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=high&amp;id=699f6b41b7ef31ef0b54fc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8965-cwe-79-improper-neutralization-of-in-4ae8e269</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Code%20Supply%20Co.%20Absolute%20Reviews&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7011-cwe-1242-inclusion-of-undocumented-f-11b9b62b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7011%3A%20CWE-1242%3A%20Inclusion%20of%20Undocumented%20Features%20or%20Chicken%20Bits%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20NP-CB4500UL&amp;severity=medium&amp;id=6936810245c0181069558099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25411-na-d7c8f024</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25411%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46472-na-65353fc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46472%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46471-na-2dd03660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46471%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46470-na-c867bdd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46470%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d00b7ef31ef0b56c28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46441-na-4b4fb5c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46441%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46367-na-50d74f04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46367%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfcb7ef31ef0b56ab9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46366-na-6de7ef7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46366%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46333-na-228f82fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46333%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfcb7ef31ef0b56ab93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46331-na-ef2c36ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46331%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46257-na-61edf7af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46257%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aaa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46256-na-6dc13942</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46256%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfab7ef31ef0b56aa9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46097-na-5e18240c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46097%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfab7ef31ef0b56aa2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40512-na-fe5c48fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40512%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40511-na-e8c250f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40511%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40509-na-0d0a03aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40509%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33369-na-145a11e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33369%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b5618d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33368-na-7e106b08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33368%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b5618d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-27-f12da2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47177-bd6836</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47177&amp;severity=low&amp;id=682d9816c4522896dcbd6836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47175-cwe-20-improper-input-validation-in-d5fa7e25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47175%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20libppd&amp;severity=high&amp;id=69092b7835043901e828cb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47076-cwe-20-improper-input-validation-in-bfdffa0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47076%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenPrinting%20libcupsfilters&amp;severity=high&amp;id=69092b7835043901e828cb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47176-cwe-1327-binding-to-an-unrestricted-3de6ffc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47176%3A%20CWE-1327%3A%20Binding%20to%20an%20Unrestricted%20IP%20Address%20in%20OpenPrinting%20cups-browsed&amp;severity=medium&amp;id=69092b7935043901e828d3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47121-cwe-521-weak-password-requirements-in-gotenna-pro-bebed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47121%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20goTenna%20Pro&amp;severity=medium&amp;id=682d9838c4522896dcbebed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8771-cwe-862-missing-authorization-in-ice-ec2abda9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8771%3A%20CWE-862%20Missing%20Authorization%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7259-cleartext-storage-of-sensitive-infor-da1c39de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7259%3A%20Cleartext%20Storage%20of%20Sensitive%20Information&amp;severity=medium&amp;id=691f82024f1c50aa2eb5ae99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9177-cwe-79-improper-neutralization-of-in-3316bb70</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mahodder%20Themedy%20Toolbox&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8633-cwe-79-improper-neutralization-of-in-95bf385f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8633%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8725-cwe-434-unrestricted-upload-of-file--930fdd31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8725%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20modalweb%20Advanced%20File%20Manager&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8126-cwe-434-unrestricted-upload-of-file--666759fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8126%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20modalweb%20Advanced%20File%20Manager&amp;severity=high&amp;id=699f6c22b7ef31ef0b56058c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8704-cwe-22-improper-limitation-of-a-path-4174ee90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8704%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20modalweb%20Advanced%20File%20Manager&amp;severity=high&amp;id=699f6b2db7ef31ef0b54f066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9115-cwe-79-improper-neutralization-of-in-b79ae361</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9115%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thechetanvaghela%20Common%20Tools%20for%20Site&amp;severity=medium&amp;id=699f6b3fb7ef31ef0b54fbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9117-cwe-79-improper-neutralization-of-in-7cbd939c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sekler%20Mapplic%20Lite&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9173-cwe-79-improper-neutralization-of-in-180e2c8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9173%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alefypf%20GF%20Custom%20Style&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9127-cwe-79-improper-neutralization-of-in-b03fade2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20solaplugins%20Super%20Testimonials&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9125-cwe-79-improper-neutralization-of-in-2f14cb43</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohsensd1373%20king_IE&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fc65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47337-missing-authorization-in-phillip-da-3430afd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47337%3A%20Missing%20Authorization%20in%20Phillip%20Dane%20Joy%20Of%20Text%20Lite&amp;severity=null&amp;id=69cd7493e6bfc5ba1def806b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9025-cwe-862-missing-authorization-in-cod-b885378f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9025%3A%20CWE-862%20Missing%20Authorization%20in%20codesupplyco%20Sight%20%E2%80%93%20Professional%20Image%20Gallery%20and%20Portfolio&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8872-cwe-80-improper-neutralization-of-sc-30211f8d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8872%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20bizswoop%20Store%20Hours%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8861-cwe-79-improper-neutralization-of-in-5400efa8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7781-cwe-288-authentication-bypass-using--79d8c41a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7781%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20artbees%20Jupiter%20X%20Core&amp;severity=high&amp;id=699f6c1eb7ef31ef0b560268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7772-cwe-434-unrestricted-upload-of-file--6deada40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7772%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20artbees%20Jupiter%20X%20Core&amp;severity=critical&amp;id=699f6c1eb7ef31ef0b56024b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8803-cwe-79-improper-neutralization-of-in-8203975b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20madfishdigital%20Bulk%20NoIndex%20%26%20NoFollow%20Toolkit&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8552-cwe-862-missing-authorization-in-wpc-0c384e3b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8552%3A%20CWE-862%20Missing%20Authorization%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560cdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8723-cwe-79-improper-neutralization-of-in-55cce51e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8723%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ouhinit%20012%20Ps%20Multi%20Languages&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8404-cwe-59-improper-link-resolution-before-file-access-link-following-in-papercut-papercut-ng-papercut-mf-bd674c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8404%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20PaperCut%20PaperCut%20NG%2C%20PaperCut%20MF&amp;severity=high&amp;id=682d9816c4522896dcbd674c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46632-na-05962561</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46632%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46628-na-e8b3c7e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46628%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46627-na-1ae76b5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46627%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d04b7ef31ef0b56d382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46330-na-74970b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46330%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46329-na-e9bd8b94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46329%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46328-na-51ccbbe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46328%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46327-na-3f99c43d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46327%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfcb7ef31ef0b56ab3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45989-na-3d9385c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45989%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45986-na-bc939737</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45986%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45985-na-91f22326</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45985%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45984-na-21cad3f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45984%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45983-na-79a07442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45983%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45982-na-4760c9fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45982%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf5b7ef31ef0b56a818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45981-na-ae6d57aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45981%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf5b7ef31ef0b56a815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45980-na-dd94d049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45980%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf5b7ef31ef0b56a812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45979-na-049882d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45979%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf5b7ef31ef0b56a80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44860-na-3f9da897</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44860%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b56a048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41605-na-4cb86b62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41605%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbcb7ef31ef0b5688e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40508-na-8c16d4aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40508%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40507-na-141bc1f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40507%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40506-na-d145bd56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40506%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-26-f127da</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f127da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-unraveling-sloppylemming-s-operations-across-south-asia-f0c310</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Unraveling%20SloppyLemming%E2%80%99s%20Operations%20Across%20South%20Asia&amp;severity=low&amp;id=682acdbebbaf20d303f0c310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47305-cross-site-request-forgery-csrf-in--6079d7f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47305%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dnesscarkey%20Use%20Any%20Font&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47315-cross-site-request-forgery-csrf-in--b087ffc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47315%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20GiveWP&amp;severity=null&amp;id=69cd748ee6bfc5ba1def7ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43237-exposure-of-sensitive-information-t-abfca057</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43237%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Steve%20Burge%20WordPress%20Tag%20Cloud%20Plugin%20%E2%80%93%20Tag%20Groups&amp;severity=null&amp;id=69cd746be6bfc5ba1def71ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43959-improper-neutralization-of-input-du-a3bd3ef4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43959%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themepoints%20Testimonials&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8546-cwe-79-improper-neutralization-of-in-bdf1ec8d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6592-cwe-306-missing-authentication-for-c-2289efa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6592%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20WatchGuard%20Authentication%20Gateway&amp;severity=critical&amp;id=68efe3a56817339dcf86e560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8858-cwe-79-improper-neutralization-of-in-eeb803f7</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9169-cwe-79-improper-neutralization-of-in-492469e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litespeedtech%20LiteSpeed%20Cache&amp;severity=medium&amp;id=699f6b41b7ef31ef0b54fcfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47303-improper-neutralization-of-input-du-b8616369</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47303%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Livemesh%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd748ce6bfc5ba1def7e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3866-cwe-79-improper-neutralization-of-in-64b43eb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20%E2%80%93%20The%20Contact%20Form%20Builder%20That%20Grows%20With%20You&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8290-cwe-639-authorization-bypass-through-31bad792</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8290%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wclovers%20WCFM%20%E2%80%93%20Frontend%20Manager%20for%20WooCommerce%20along%20with%20Bookings%20Subscription%20Listings%20Compatible&amp;severity=high&amp;id=699f6c26b7ef31ef0b5607b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8678-cwe-862-missing-authorization-in-rev-5f8fc796</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8678%3A%20CWE-862%20Missing%20Authorization%20in%20revolutbusiness%20Revolut%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8910-cwe-1230-exposure-of-sensitive-infor-f7f63ce2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8910%3A%20CWE-1230%20Exposure%20of%20Sensitive%20Information%20Through%20Metadata%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8658-cwe-862-missing-authorization-in-wpe-0b5256c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8658%3A%20CWE-862%20Missing%20Authorization%20in%20wpexpertsio%20myCred%20%E2%80%93%20Loyalty%20Points%20and%20Rewards%20plugin%20for%20WordPress%20and%20WooCommerce%20%E2%80%93%20Give%20Points%2C%20Ranks%2C%20Badges%2C%20Cashback%2C%20WooCommerce%20rewards%2C%20and%20WooCommerce%20credits%20for%20Gamification&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8275-cwe-89-improper-neutralization-of-sp-24cf501e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8275%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20theeventscalendar%20The%20Events%20Calendar&amp;severity=critical&amp;id=699f6c24b7ef31ef0b560716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8668-cwe-79-improper-neutralization-of-in-7fb8d11a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7385-cwe-89-improper-neutralization-of-sp-b5d7369e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7385%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ashishajani%20WordPress%20Simple%20HTML%20Sitemap&amp;severity=critical&amp;id=699f6c16b7ef31ef0b55fc35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8516-cwe-200-exposure-of-sensitive-inform-e87e087b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8516%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8514-cwe-502-deserialization-of-untrusted-d0f60555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8514%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20prisna%20Prisna%20GWT%20%E2%80%93%20Google%20Website%20Translator&amp;severity=critical&amp;id=699f6c2ab7ef31ef0b560b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8515-cwe-79-improper-neutralization-of-in-00352c69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8515%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8350-cwe-862-missing-authorization-in-unc-543efa70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8350%3A%20CWE-862%20Missing%20Authorization%20in%20Uncanny%20Owl%20Uncanny%20Groups%20for%20LearnDash&amp;severity=low&amp;id=699f6c26b7ef31ef0b56086b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8349-cwe-862-missing-authorization-in-unc-77238fd1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8349%3A%20CWE-862%20Missing%20Authorization%20in%20Uncanny%20Owl%20Uncanny%20Groups%20for%20LearnDash&amp;severity=high&amp;id=699f6c26b7ef31ef0b5607ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9073-cwe-79-improper-neutralization-of-in-91b15fb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20GutenGeek%20Free%20Gutenberg%20Blocks%20for%20WordPress&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7491-cwe-862-missing-authorization-in-rea-6ff2704a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7491%3A%20CWE-862%20Missing%20Authorization%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fe2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6590-cwe-862-missing-authorization-in-jav-227f501f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6590%3A%20CWE-862%20Missing%20Authorization%20in%20javmah%20Spreadsheet%20Integration%20%E2%80%93%20Automate%20Google%20Sheets%20With%20WordPress%2C%20WooCommerce%20%26%20Most%20Popular%20Form%20Plugins.%20Also%2C%20Display%20Google%20sheet%20as%20a%20Table.&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8434-cwe-862-missing-authorization-in-the-cbfd1416</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8434%3A%20CWE-862%20Missing%20Authorization%20in%20themehunk%20Easy%20Mega%20Menu%20Plugin%20for%20WordPress%20%E2%80%93%20ThemeHunk&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8485-cwe-639-authorization-bypass-through-5cf4bdb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8485%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=critical&amp;id=699f6c2ab7ef31ef0b560a99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9024-cwe-79-improper-neutralization-of-in-9dc7e617</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9024%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20braginteractive%20Material%20Design%20Icons&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9028-cwe-79-improper-neutralization-of-in-12f17329</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bastianonm%20WP%20GPX%20Maps&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54fa50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8621-cwe-89-improper-neutralization-of-sp-22ed5094</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8621%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mmrs151%20Daily%20Prayer%20Time&amp;severity=critical&amp;id=699f6c2cb7ef31ef0b560cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8483-cwe-200-exposure-of-sensitive-inform-c03532d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8483%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20farookibrahim%20MAS%20Static%20Content&amp;severity=medium&amp;id=699f6c2ab7ef31ef0b560a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8484-cwe-89-improper-neutralization-of-sp-2f88c8b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8484%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20xjb%20REST%20API%20TO%20MiniProgram&amp;severity=high&amp;id=699f6c2ab7ef31ef0b560a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8476-cwe-352-cross-site-request-forgery-c-e77f12a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8476%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottpaterson%20Easy%20PayPal%20Events&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8713-cwe-79-improper-neutralization-of-in-1e806c4b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8713%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pierre-lebedel%20Kodex%20Posts%20likes&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9068-cwe-79-improper-neutralization-of-in-441cd635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themexclub%20OneElements%20%E2%80%93%20Best%20Elementor%20Addons&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7617-cwe-79-improper-neutralization-of-in-22d67126</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20itpathsolutions%20Contact%20Form%20to%20Any%20API&amp;severity=high&amp;id=699f6c1cb7ef31ef0b560015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9069-cwe-79-improper-neutralization-of-in-993a4990</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20besnikac%20Graphicsly%20%E2%80%93%20The%20ultimate%20graphics%20plugin%20for%20WordPress%20website%20builder%20(%20Gutenberg%2C%20Elementor%2C%20Beaver%20Builder%2C%20WPBakery%20)&amp;severity=medium&amp;id=699f6b3eb7ef31ef0b54fb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8741-cwe-79-improper-neutralization-of-in-f7417745</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8741%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20outtheboxthemes%20Beam%20me%20up%20Scotty%20%E2%80%93%20Back%20to%20Top%20Button&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7426-cwe-200-exposure-of-sensitive-inform-f8f1f866</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7426%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20peepso%20Community%20by%20PeepSo%20%E2%80%93%20Social%20Network%2C%20Membership%2C%20Registration%2C%20User%20Profiles%2C%20Premium%20%E2%80%93%20Mobile%20App&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fd9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9027-cwe-79-improper-neutralization-of-in-418a9ba3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9027%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20WPZOOM%20Shortcodes&amp;severity=medium&amp;id=699f6b3cb7ef31ef0b54f9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8549-cwe-79-improper-neutralization-of-in-96f73fce</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8549%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20simplecalendar%20Simple%20Calendar%20%E2%80%93%20Google%20Calendar%20Plugin&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8481-cwe-94-improper-control-of-generatio-30e8465c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8481%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20minimus%20Special%20Text%20Boxes&amp;severity=high&amp;id=699f6c2ab7ef31ef0b560a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7386-cwe-352-cross-site-request-forgery-c-4c4bab53</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7386%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codename065%20Premium%20Packages%20%E2%80%93%20Sell%20Digital%20Products%20Securely&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22893-na-3975c8c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22893%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b57031b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46655-na-ab1c7645</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46655%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46600-na-7c50be21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46600%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d02b7ef31ef0b56c3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46489-na-9a433e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46489%3A%20n%2Fa&amp;severity=high&amp;id=699f6d00b7ef31ef0b56c314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46488-na-44f15520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46488%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d00b7ef31ef0b56c311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46485-na-4c38b3b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46485%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d00b7ef31ef0b56c30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46461-na-1135907c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46461%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45750-na-7acd5afe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45750%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf1b7ef31ef0b56a5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44678-na-437996c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44678%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41708-na-66dcaa6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41708%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44825-na-c779b173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44825%3A%20n%2Fa&amp;severity=high&amp;id=698f5d11c9e1ff5ad84e3934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-25-f12a5d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-9123-integer-overflow-in-google-chrome-60469bdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-9123%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=691f65fd40b920e2707f5ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8877-cwe-89-improper-neutralization-of-sp-8b68a32d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8877%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Riello%20Netman%20204&amp;severity=medium&amp;id=690a2e00f0ba78a050538d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8878-cwe-640-weak-password-recovery-mecha-919ccff7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8878%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Riello%20Netman%20204&amp;severity=critical&amp;id=690a2e00f0ba78a050538d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8801-cwe-200-exposure-of-sensitive-inform-5d9cf3e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8801%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8436-cwe-89-improper-neutralization-of-sp-8c34a58b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8436%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20hahncgdev%20WP%20Easy%20Gallery%20%E2%80%93%20WordPress%20Gallery%20Plugin&amp;severity=critical&amp;id=699f6c28b7ef31ef0b5609af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8437-cwe-862-missing-authorization-in-hah-7df68ee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8437%3A%20CWE-862%20Missing%20Authorization%20in%20hahncgdev%20WP%20Easy%20Gallery%20%E2%80%93%20WordPress%20Gallery%20Plugin&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8914-cwe-79-improper-neutralization-of-in-13b78fed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8914%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20haibasoft%20Thanh%20To%C3%A1n%20Qu%C3%A9t%20M%C3%A3%20QR%20Code%20T%E1%BB%B1%20%C4%90%E1%BB%99ng%20%E2%80%93%20MoMo%2C%20ViettelPay%2C%20VNPay%20v%C3%A0%2040%20ng%C3%A2n%20h%C3%A0ng%20Vi%E1%BB%87t%20Nam&amp;severity=high&amp;id=699f6b38b7ef31ef0b54f725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8103-cwe-79-improper-neutralization-of-in-1ad37099</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8103%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cguntur%20WP%20Category%20Dropdown&amp;severity=medium&amp;id=699f6c22b7ef31ef0b5604af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8919-cwe-79-improper-neutralization-of-in-894e6e57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shakeelu%20Confetti%20Fall%20Animation&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8267-cwe-79-improper-neutralization-of-in-371766d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20princeahmed%20Radio%20Player%20%E2%80%93%20Live%20Shoutcast%2C%20Icecast%20and%20Any%20Audio%20Stream%20Player%20for%20WordPress&amp;severity=medium&amp;id=699f6c24b7ef31ef0b560684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8917-cwe-79-improper-neutralization-of-in-6ca1c075</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8917%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anwppro%20AnWP%20Football%20Leagues&amp;severity=medium&amp;id=699f6b3ab7ef31ef0b54f7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8628-cwe-79-improper-neutralization-of-in-51f35e12</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8628%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Popup%2C%20Optin%20Form%20%26%20Email%20Newsletters%20for%20Mailchimp%2C%20HubSpot%2C%20AWeber%20%E2%80%93%20MailOptin&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8671-cwe-22-improper-limitation-of-a-path-d1c264a2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8671%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ex-Themes%20WooEvents%20-%20Calendar%20and%20Event%20Booking&amp;severity=critical&amp;id=699f6c2eb7ef31ef0b560e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8623-cwe-94-improper-control-of-generatio-48130e68</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8623%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20MDTF%20%E2%80%93%20Meta%20Data%20and%20Taxonomies%20Filter&amp;severity=high&amp;id=699f6c2cb7ef31ef0b560cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8624-cwe-89-improper-neutralization-of-sp-c4d59e62</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8624%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20MDTF%20%E2%80%93%20Meta%20Data%20and%20Taxonomies%20Filter&amp;severity=critical&amp;id=699f6c2cb7ef31ef0b560cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8794-cwe-620-unverified-password-change-i-72d414e4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8794%3A%20CWE-620%20Unverified%20Password%20Change%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8791-cwe-639-authorization-bypass-through-e03e61d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8791%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20smub%20Charitable%20%E2%80%93%20Donation%20Plugin%20for%20WordPress%20%E2%80%93%20Fundraising%20with%20Recurring%20Donations%20%26%20More&amp;severity=critical&amp;id=699f6b32b7ef31ef0b54f33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8544-cwe-79-improper-neutralization-of-in-c60bcf3e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8544%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fatcatapps%20Pixel%20Cat%20%E2%80%93%20Conversion%20Pixel%20Manager&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8738-cwe-79-improper-neutralization-of-in-5d051502</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8738%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20podcastmotor%20Seriously%20Simple%20Stats&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8662-cwe-79-improper-neutralization-of-in-6dad2c08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dvankooten%20Koko%20Analytics&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8795-cwe-352-cross-site-request-forgery-c-d1794c48</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8795%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=high&amp;id=699f6b32b7ef31ef0b54f34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8716-cwe-79-improper-neutralization-of-in-80029b73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8716%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xplodedthemes%20XT%20Ajax%20Add%20To%20Cart%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8657-cwe-79-improper-neutralization-of-in-00de1d00</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8657%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ggnomes%20Garden%20Gnome%20Package&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8432-cwe-862-missing-authorization-in-web-115a1591</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8432%3A%20CWE-862%20Missing%20Authorization%20in%20webba-agency%20Appointment%20%26%20Event%20Booking%20Calendar%20Plugin%20%E2%80%93%20Webba%20Booking&amp;severity=medium&amp;id=699f6c28b7ef31ef0b56099d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46957-na-dd105de7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46957%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d06b7ef31ef0b56d498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46612-na-29f1658d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46612%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d02b7ef31ef0b56d2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46610-na-d7e0c973</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46610%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46609-na-480d1a72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46609%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46607-na-ac03f8df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46607%3A%20n%2Fa&amp;severity=high&amp;id=699f6d02b7ef31ef0b56d2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42797-na-9f40fa65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42797%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cceb7ef31ef0b569350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-24-f12cd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48945-vulnerability-in-linux-linux-be66bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe66bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45453-authentication-bypass-by-spoofing-i-c7083879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45453%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Peter%20Hardy-vanDoorn%20Maintenance%20Redirect&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44048-improper-control-of-filename-for-in-bef1b228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44048%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpWax%20Product%20Carousel%20Slider%20%26%20Grid%20Ultimate%20for%20WooCommerce&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46639-na-478ef3bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46639%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46241-na-b431cd30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46241%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfab7ef31ef0b56aa98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44540-na-782d1c2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44540%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41228-na-8c2b4081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41228%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b56819c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40442-na-a167f16e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40442%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca9b7ef31ef0b567da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40441-na-33420f54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40441%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca9b7ef31ef0b567d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39843-na-04fbc1c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39843%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c88b7ef31ef0b565fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39842-na-20c94d1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39842%3A%20n%2Fa&amp;severity=high&amp;id=699f6c88b7ef31ef0b565fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39342-na-2327f0d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39342%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c87b7ef31ef0b565e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39341-na-8224e876</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39341%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c87b7ef31ef0b565e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37779-na-7744d177</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37779%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34331-na-2a5fe85a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34331%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4eb7ef31ef0b56220f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-23-f12090</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43989-server-side-request-forgery-ssrf-in-b5e8a144</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43989%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Firsh%20Justified%20Image%20Grid&amp;severity=null&amp;id=69cd7473e6bfc5ba1def793a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47220-na-2eea4189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47220%3A%20n%2Fa&amp;severity=null&amp;id=699f6d08b7ef31ef0b56d5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47218-na-32e72770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47218%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d08b7ef31ef0b56d59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-22-f12624</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8680-cwe-80-improper-neutralization-of-sc-0a83bdb7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8680%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20for%20WordPress&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560e4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-47210-na-488d5056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-47210%3A%20n%2Fa&amp;severity=high&amp;id=699f6d08b7ef31ef0b56d591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-21-1ff45e1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-21&amp;severity=medium&amp;id=68367c99182aa0cae2324372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-09-21-1e7bcb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-09-21&amp;severity=medium&amp;id=682b69bf52745a861d1e7bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8612-exposure-of-sensitive-information-to-an-unauthorized-actor-bf9038</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8612%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=low&amp;id=682d9bb5c4522896dcbf9038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8853-cwe-269-improper-privilege-managemen-941ebb7f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8853%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jeremieglotin%20Webo-facto&amp;severity=critical&amp;id=699f6b38b7ef31ef0b54f66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46654-na-de0338df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46654%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46652-na-44e6f56d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46652%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d04b7ef31ef0b56d3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46649-na-111bc31f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46649%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46648-na-e5e2a69e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46648%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46647-na-a0392afc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46647%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46646-na-9c1a61e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46646%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46645-na-871f84f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46645%3A%20n%2Fa&amp;severity=high&amp;id=699f6d04b7ef31ef0b56d3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46644-na-61fb832d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46644%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d04b7ef31ef0b56d398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46640-na-09d34326</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46640%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d04b7ef31ef0b56d395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46103-na-c516b7a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46103%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfab7ef31ef0b56aa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46101-na-eb3f8008</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46101%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfab7ef31ef0b56aa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45489-na-69a42eb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45489%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42697-na-c00c1936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42697%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc9b7ef31ef0b5690cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37879-na-27d74da1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37879%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c72b7ef31ef0b56426e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-20-f12fb5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45810-cwe-119-improper-restriction-of-ope-1809983f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45810%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=697d10c0ac0632022277c28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43489-cwe-843-access-of-resource-using-in-84898940</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43489%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=699f6cdab7ef31ef0b56989a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43496-cwe-787-out-of-bounds-write-in-micr-7ea2e1b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43496%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=699f6cdab7ef31ef0b5698a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38221-cwe-79-improper-neutralization-of-i-f6f55845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38221%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=699f6c74b7ef31ef0b564394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8963-cwe-22-improper-limitation-of-a-path-b0c53289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8963%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Ivanti%20CSA%20(Cloud%20Services%20Appliance)&amp;severity=critical&amp;id=68f7d9b7247d717aace26ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38016-cwe-284-improper-access-control-in--3a9b9c4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38016%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Office%20LTSC%202021&amp;severity=high&amp;id=699f6c74b7ef31ef0b564336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8883-url-redirection-to-untrusted-site-open-redirect-bebe5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8883%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=medium&amp;id=682d9838c4522896dcbebe5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8698-improper-verification-of-cryptograph-12ec2e2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8698%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&amp;severity=high&amp;id=691356bfb36faa5b6c09d27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8354-reachable-assertion-bf9036</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8354%3A%20Reachable%20Assertion&amp;severity=medium&amp;id=682d9bb5c4522896dcbf9036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45770-improper-link-resolution-before-file-access-link-following-c6a562</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45770%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45769-out-of-bounds-write-c6a560</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45769%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8364-cwe-79-improper-neutralization-of-in-7aab7b20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dondon-benjamincouk%20WP%20Custom%20Fields%20Search&amp;severity=medium&amp;id=699f6c28b7ef31ef0b560918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8850-cwe-79-improper-neutralization-of-in-20e22b3b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8850%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dvankooten%20MC4WP%3A%20Mailchimp%20for%20WordPress&amp;severity=medium&amp;id=699f6b38b7ef31ef0b54f665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31570-na-bed443a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31570%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd3b7ef31ef0b58ee70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46946-na-dd4ca3bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46946%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d06b7ef31ef0b56d484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46394-na-00f37135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46394%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46382-na-5bed3946</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46382%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cfeb7ef31ef0b56abff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45752-na-e93d2d45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45752%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf1b7ef31ef0b56a5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40125-na-145a7f3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40125%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca6b7ef31ef0b5672a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33109-na-06105c1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33109%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c39b7ef31ef0b5614b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-19-f126aa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f126aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lumma-stealer-malware-delivered-via-github-spam-pandora-analysis-l6e-exe-f0c303</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lumma%20Stealer%20Malware%20(delivered%20via%20GitHub%20Spam)%20-%20Pandora%20analysis%20(l6E.exe)&amp;severity=low&amp;id=682acdbebbaf20d303f0c303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36981-cwe-125-out-of-bounds-read-in-openp-4f04a56c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36981%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPLC%20OpenPLC_v3&amp;severity=high&amp;id=690a2decf0ba78a05053719d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36980-cwe-125-out-of-bounds-read-in-openp-ab6bd95e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36980%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20OpenPLC%20OpenPLC_v3&amp;severity=high&amp;id=690a2decf0ba78a050537199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39590-cwe-704-incorrect-type-conversion-o-edc6504b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39590%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20OpenPLC%20OpenPLC_v3&amp;severity=high&amp;id=690a2deef0ba78a0505371f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39589-cwe-704-incorrect-type-conversion-o-2b951525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39589%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20OpenPLC%20OpenPLC_v3&amp;severity=high&amp;id=690a2decf0ba78a0505371b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6406-cwe-306-missing-authentication-for-c-b1a3ef49</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6406%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Yordam%20Information%20Technology%20Mobile%20Library%20Application&amp;severity=high&amp;id=68ee4b3a509368ccaa76d791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46801-vulnerability-in-linux-linux-be1351</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46800-vulnerability-in-linux-linux-be134d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe134d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46799-vulnerability-in-linux-linux-be1349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46798-vulnerability-in-linux-linux-be1345</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46797-vulnerability-in-linux-linux-be1341</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46796-vulnerability-in-linux-linux-be1330</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46795-vulnerability-in-linux-linux-be1328</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46794-vulnerability-in-linux-linux-be130f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe130f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46793-vulnerability-in-linux-linux-be130b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46792-vulnerability-in-linux-linux-be12fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9827c4522896dcbe12fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46791-vulnerability-in-linux-linux-be12fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46790-vulnerability-in-linux-linux-be12f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe12f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46789-vulnerability-in-linux-linux-be12f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe12f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46788-vulnerability-in-linux-linux-be12ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46787-vulnerability-in-linux-linux-be12ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46786-vulnerability-in-linux-linux-be12e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46785-vulnerability-in-linux-linux-bdcdf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcdf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46784-vulnerability-in-linux-linux-be12d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46783-vulnerability-in-linux-linux-be12b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46782-vulnerability-in-linux-linux-be12b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46781-vulnerability-in-linux-linux-be12b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe12b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46780-vulnerability-in-linux-linux-be12ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46779-vulnerability-in-linux-linux-be12a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe12a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46778-vulnerability-in-linux-linux-be12a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe12a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46777-vulnerability-in-linux-linux-be12a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe12a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46776-vulnerability-in-linux-linux-be1293</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46775-vulnerability-in-linux-linux-be1284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46774-vulnerability-in-linux-linux-be127c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe127c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46773-vulnerability-in-linux-linux-be125b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe125b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46772-vulnerability-in-linux-linux-be1253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46771-vulnerability-in-linux-linux-be124f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe124f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46770-vulnerability-in-linux-linux-be124b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe124b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46769-vulnerability-in-linux-linux-be123e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe123e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46768-vulnerability-in-linux-linux-be123a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46767-vulnerability-in-linux-linux-be1236</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46766-vulnerability-in-linux-linux-be1232</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46765-vulnerability-in-linux-linux-be122e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe122e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46764-vulnerability-in-linux-linux-be121d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe121d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46763-vulnerability-in-linux-linux-be1200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46762-vulnerability-in-linux-linux-be11fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe11fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46761-vulnerability-in-linux-linux-be11f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46760-vulnerability-in-linux-linux-be11f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46759-vulnerability-in-linux-linux-be11f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46755-vulnerability-in-linux-linux-be11ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46754-vulnerability-in-linux-linux-be11e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46753-vulnerability-in-linux-linux-be11e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe11e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46752-vulnerability-in-linux-linux-be11d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46751-vulnerability-in-linux-linux-be11d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe11d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46750-vulnerability-in-linux-linux-be11af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46749-vulnerability-in-linux-linux-be11a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe11a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46748-vulnerability-in-linux-linux-be119f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe119f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46747-vulnerability-in-linux-linux-be1197</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46746-vulnerability-in-linux-linux-be1191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46745-vulnerability-in-linux-linux-be118d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe118d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46744-vulnerability-in-linux-linux-be1189</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46743-vulnerability-in-linux-linux-be117c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe117c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46742-vulnerability-in-linux-linux-be1178</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46741-vulnerability-in-linux-linux-be1174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46740-vulnerability-in-linux-linux-bdcdf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcdf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46739-vulnerability-in-linux-linux-be115a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe115a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46738-vulnerability-in-linux-linux-be1156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46737-vulnerability-in-linux-linux-be1152</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46737%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46736-vulnerability-in-linux-linux-be114e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46736%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe114e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46735-vulnerability-in-linux-linux-be114a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe114a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46734-vulnerability-in-linux-linux-be1146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46734%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46733-vulnerability-in-linux-linux-be1142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46732-vulnerability-in-linux-linux-be113e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe113e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46731-vulnerability-in-linux-linux-be113a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe113a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46730-vulnerability-in-linux-linux-be1136</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46729-vulnerability-in-linux-linux-be1110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46728-vulnerability-in-linux-linux-be1108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46727-vulnerability-in-linux-linux-be1104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46726-vulnerability-in-linux-linux-be10f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe10f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46725-vulnerability-in-linux-linux-be10eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe10eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46724-vulnerability-in-linux-linux-be10e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe10e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46723-vulnerability-in-linux-linux-be10dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe10dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46722-vulnerability-in-linux-linux-be10d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe10d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46721-vulnerability-in-linux-linux-be10d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe10d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46720-vulnerability-in-linux-linux-be10c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe10c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46719-vulnerability-in-linux-linux-be1098</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46718-vulnerability-in-linux-linux-be1090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46717-vulnerability-in-linux-linux-be1088</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46716-vulnerability-in-linux-linux-be1080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46715-vulnerability-in-linux-linux-be1071</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46714-vulnerability-in-linux-linux-be1069</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6641-cwe-185-incorrect-regular-expression-c3d95320</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6641%3A%20CWE-185%20Incorrect%20Regular%20Expression%20in%20astrasecuritysuite%20WP%20Hardening%20(discontinued)&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46959-na-8141352d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46959%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d06b7ef31ef0b56d4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46377-na-8960318e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46377%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56abfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46376-na-f5b7adff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46376%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56abf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46375-na-8bda2d76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46375%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56abf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46374-na-82c75b64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46374%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfcb7ef31ef0b56aba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46373-na-e283ec4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46373%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56aba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46086-na-a8cc0b91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46086%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf8b7ef31ef0b56a985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45523-na-04e6b2e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45523%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cefb7ef31ef0b56a4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44589-na-6ee2d5cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44589%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44542-na-219c87ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44542%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdeb7ef31ef0b569b30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40568-na-628ca6ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40568%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cafb7ef31ef0b568042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39339-na-5a31555f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39339%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35515-na-62443b47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35515%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5ab7ef31ef0b5633fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34399-na-12189a3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34399%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4fb7ef31ef0b562273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34057-na-1235890f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34057%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b5620ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-09-18-85760a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-09-18&amp;severity=medium&amp;id=682b68f0d14de609c885760a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-18-f12204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43971-improper-neutralization-of-input-du-1cb4a7bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43971%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43975-improper-neutralization-of-input-du-870d24fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43975%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=69cd7473e6bfc5ba1def792b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44001-improper-neutralization-of-input-du-f3683565</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44001%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Royal%20Royal%20Elementor%20Addons&amp;severity=null&amp;id=69cd7473e6bfc5ba1def7940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44002-improper-neutralization-of-input-du-446f613e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44002%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Team%20Showcase&amp;severity=null&amp;id=69cd7473e6bfc5ba1def7944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44003-improper-neutralization-of-input-du-b1fb8197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44003%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spicethemes%20Spice%20Starter%20Sites&amp;severity=null&amp;id=69cd7473e6bfc5ba1def7949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44005-improper-neutralization-of-input-du-a5e60a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44005%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpsoul%20Greenshift&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44007-improper-neutralization-of-input-du-57c5e9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44007%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Templates%20%E2%80%93%20Elementor%20%26%20Gutenberg%20templates&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44008-improper-neutralization-of-input-du-54fefab1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44008%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dylan%20Kuhn%20Geo%20Mashup&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44009-improper-neutralization-of-input-du-747c80d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44009%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WC%20Lovers%20WCFM%20Marketplace&amp;severity=null&amp;id=69cd7476e6bfc5ba1def79f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44047-improper-neutralization-of-input-du-fc72edfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44047%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IDX%20Broker%20IMPress%20for%20IDX%20Broker&amp;severity=null&amp;id=69cd7485e6bfc5ba1def7ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44049-improper-neutralization-of-input-du-65a3d426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44049%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeHunk%20Gutenberg%20Blocks&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43938-improper-neutralization-of-input-du-2bf75b9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43938%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Peters%20Name%20Directory&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43977-improper-neutralization-of-input-du-d34e6a67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43977%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=69cd7473e6bfc5ba1def7932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44064-improper-neutralization-of-input-du-6e1dead5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44064%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LikeBtn%20Like%20Button%20Rating&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37985-cwe-1037-processor-optimization-removal-or-modification-of-security-critical-code-in-microsoft-windows-11-version-22h2-bdb724</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37985%3A%20CWE-1037%3A%20%20Processor%20Optimization%20Removal%20or%20Modification%20of%20Security-critical%20Code%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682d981dc4522896dcbdb724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43976-improper-neutralization-of-special--1209bda2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43976%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=69cd7473e6bfc5ba1def792e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43978-improper-neutralization-of-special--1151dc27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43978%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20highwarden%20Super%20Store%20Finder&amp;severity=null&amp;id=69cd7473e6bfc5ba1def7937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44004-improper-neutralization-of-special--13278b50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44004%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Arni%20Cinco%20WPCargo%20Track%20%26%20Trace&amp;severity=null&amp;id=69cd7473e6bfc5ba1def7951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44050-improper-neutralization-of-input-du-fec3008d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44050%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cryout-creations%20Verbosa&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44051-improper-neutralization-of-input-du-d99c7527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44051%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johan%20van%20der%20Wijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45451-improper-neutralization-of-input-du-92738db8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45451%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cryout-creations%20Roseta&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45452-improper-neutralization-of-input-du-7eaf0279</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45452%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cryout-creations%20Septera&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8957-cwe-78-improper-neutralization-of-sp-33562e37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8957%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20PTZOptics%20PT30X-SDI&amp;severity=high&amp;id=68f7d9b7247d717aace26ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8956-cwe-306-missing-authentication-for-c-6e7c99ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8956%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20PTZOptics%20PT30X-SDI&amp;severity=critical&amp;id=68e68a7f47cdb70919d539a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43460-cwe-285-improper-authorization-in-m-bb8b787b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43460%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Dynamics%20365%20Business%20Central%20Online&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38183-cwe-918-server-side-request-forgery-f10cfc0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38183%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20GroupMe&amp;severity=critical&amp;id=699f6c74b7ef31ef0b564345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38813-cwe-273-improper-check-for-dropped--4321aefb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38813%3A%20CWE-273%20Improper%20Check%20for%20Dropped%20Privileges%20in%20VMware%20vCenter%20Server&amp;severity=high&amp;id=68487f531b0bd07c39389def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38812-cwe-122-heap-based-buffer-overflow--e58adb07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38812%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20VMware%20vCenter%20Server&amp;severity=critical&amp;id=68487f531b0bd07c39389dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8939-uncontrolled-resource-consumption-04cbb609</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8939%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f82024f1c50aa2eb5aea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8768-reachable-assertion-cdcd106d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8768%3A%20Reachable%20Assertion&amp;severity=high&amp;id=691ec609337afffbc0f72899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8761-cwe-601-url-redirection-to-untrusted-96e07b34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8761%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20mihail-barinov%20Share%20This%20Image&amp;severity=high&amp;id=699f6b30b7ef31ef0b54f25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46362-na-2a03f21b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46362%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfcb7ef31ef0b56ab99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46085-na-aec71694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46085%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf8b7ef31ef0b56a981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-09-17-1b4159</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-09-17&amp;severity=medium&amp;id=682b69b552745a861d1b4159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-17-f1218c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f1218c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45496-improper-privilege-management-8fbf6a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45496%3A%20Improper%20Privilege%20Management&amp;severity=critical&amp;id=691356bfb36faa5b6c09d25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7387-execution-with-unnecessary-privilege-3bfb06b7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7387%3A%20Execution%20with%20Unnecessary%20Privileges&amp;severity=critical&amp;id=691356bfb36faa5b6c09d274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40848-an-attacker-may-be-able-to-read-sen-5cd5c30f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40848%3A%20An%20attacker%20may%20be%20able%20to%20read%20sensitive%20information%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df4f0ba78a05053760a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44149-an-app-may-be-able-to-access-protec-99b9f2fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44149%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df9f0ba78a0505386f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44165-network-traffic-may-leak-outside-a--b253507c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44165%3A%20Network%20traffic%20may%20leak%20outside%20a%20VPN%20tunnel%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2dfbf0ba78a05053874e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40825-a-malicious-app-with-root-privilege-2924e0ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40825%3A%20A%20malicious%20app%20with%20root%20privileges%20may%20be%20able%20to%20modify%20the%20contents%20of%20system%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df0f0ba78a050537415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44132-an-app-may-be-able-to-break-out-of--12c036cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44132%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df7f0ba78a0505386cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44124-a-malicious-bluetooth-input-device--9eb88630</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44124%3A%20A%20malicious%20Bluetooth%20input%20device%20may%20bypass%20pairing%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df6f0ba78a050537682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40844-an-app-may-be-able-to-observe-data--d2da45be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40844%3A%20An%20app%20may%20be%20able%20to%20observe%20data%20displayed%20to%20the%20user%20by%20Shortcuts%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df2f0ba78a050537493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44153-an-app-may-be-able-to-access-user-s-eca5d11d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44153%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df9f0ba78a050538708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40852-an-attacker-may-be-able-to-see-rece-a9284cf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40852%3A%20An%20attacker%20may%20be%20able%20to%20see%20recent%20photos%20without%20authentication%20in%20Assistive%20Access%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2df4f0ba78a050537622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44186-an-app-may-be-able-to-access-protec-cc17e5dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44186%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfcf0ba78a050538846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44169-an-app-may-be-able-to-cause-unexpec-217a1c09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44169%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2dfbf0ba78a050538778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44128-an-automator-quick-action-workflow--a9afbf33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44128%3A%20An%20Automator%20Quick%20Action%20workflow%20may%20be%20able%20to%20bypass%20Gatekeeper%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df6f0ba78a050537692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44190-an-app-may-be-able-to-read-arbitrar-03869cb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44190%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfef0ba78a050538c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44191-an-app-may-gain-unauthorized-access-eb9dc7a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44191%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Bluetooth%20in%20Apple%20Xcode&amp;severity=medium&amp;id=690a2dfef0ba78a050538c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44129-an-app-may-be-able-to-leak-sensitiv-d477b595</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44129%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df7f0ba78a0505386bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44187-a-malicious-website-may-exfiltrate--c49e6afa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44187%3A%20A%20malicious%20website%20may%20exfiltrate%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929a1fe7723195e0fd1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44168-an-app-may-be-able-to-modify-protec-e144146b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44168%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfbf0ba78a050538770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44152-an-app-may-be-able-to-access-user-s-328b51f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44152%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df9f0ba78a050538704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40845-processing-a-maliciously-crafted-vi-4227ab8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40845%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df2f0ba78a05053749e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44125-a-malicious-application-may-be-able-39728925</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44125%3A%20A%20malicious%20application%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df6f0ba78a050537686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44133-on-mdm-managed-devices-an-app-may-b-366fbd47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44133%3A%20On%20MDM%20managed%20devices%2C%20an%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df7f0ba78a0505386d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44164-an-app-may-be-able-to-bypass-privac-7e63be1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44164%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2dfbf0ba78a050538744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44148-an-app-may-be-able-to-break-out-of--ce122ba9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44148%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=690a2df9f0ba78a0505386f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40842-an-app-may-be-able-to-access-user-s-e72fc602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40842%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df2f0ba78a05053748b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44180-an-attacker-with-physical-access-ma-14c764d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44180%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a2dfcf0ba78a0505387f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27861-an-application-may-be-able-to-read--718bd61b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27861%3A%20An%20application%20may%20be%20able%20to%20read%20restricted%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2de9f0ba78a050536e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44163-a-malicious-application-may-be-able-05a68b20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44163%3A%20A%20malicious%20application%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfbf0ba78a05053873c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44134-an-app-may-be-able-to-read-sensitiv-e7610f06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44134%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df7f0ba78a0505386d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40862-an-attacker-may-be-able-to-determin-e5937ed4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40862%3A%20An%20attacker%20may%20be%20able%20to%20determine%20the%20Apple%20ID%20of%20the%20owner%20of%20the%20computer%20in%20Apple%20Xcode&amp;severity=high&amp;id=690a2df4f0ba78a050537648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40863-an-app-may-be-able-to-leak-sensitiv-984724f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40863%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df6f0ba78a050537662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44135-an-app-may-be-able-to-access-protec-4811a531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44135%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20files%20within%20an%20App%20Sandbox%20container%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df7f0ba78a0505386d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44162-a-malicious-application-may-gain-ac-bfe88e2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44162%3A%20A%20malicious%20application%20may%20gain%20access%20to%20a%20user&apos;s%20Keychain%20items%20in%20Apple%20Xcode&amp;severity=high&amp;id=690a2df9f0ba78a05053872e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40859-an-app-may-be-able-to-access-user-s-6fae6d5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40859%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df4f0ba78a05053763a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27876-unpacking-a-maliciously-crafted-arc-75ffb6c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27876%3A%20Unpacking%20a%20maliciously%20crafted%20archive%20may%20allow%20an%20attacker%20to%20write%20arbitrary%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2de9f0ba78a050536e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44158-a-shortcut-may-output-sensitive-use-2ff400cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44158%3A%20A%20shortcut%20may%20output%20sensitive%20user%20data%20without%20consent%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df9f0ba78a050538714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27860-an-application-may-be-able-to-read--95700675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27860%3A%20An%20application%20may%20be%20able%20to%20read%20restricted%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2de7f0ba78a050535f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40770-a-non-privileged-user-may-be-able-t-74fe0151</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40770%3A%20A%20non-privileged%20user%20may%20be%20able%20to%20modify%20restricted%20network%20settings%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2deef0ba78a050537215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44178-an-app-may-be-able-to-modify-protec-23fdf609</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44178%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfcf0ba78a0505387eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40838-a-malicious-app-may-be-able-to-acce-2929bd85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40838%3A%20A%20malicious%20app%20may%20be%20able%20to%20access%20notifications%20from%20the%20user&apos;s%20device%20in%20Apple%20macOS&amp;severity=low&amp;id=690a2df2f0ba78a05053747d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44139-an-attacker-with-physical-access-ma-0302ed02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44139%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a2df7f0ba78a0505386de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44181-an-app-may-be-able-to-read-sensitiv-6b9f97e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44181%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfcf0ba78a0505387f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44154-processing-a-maliciously-crafted-fi-06dbf197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44154%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df9f0ba78a05053870e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40843-an-app-may-be-able-to-modify-protec-cac8bc53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40843%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df2f0ba78a05053748f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44182-an-app-may-be-able-to-access-sensit-f9f2687c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44182%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20data%20logged%20when%20a%20shortcut%20fails%20to%20launch%20another%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfcf0ba78a050538822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40856-an-attacker-may-be-able-to-force-a--53f72cfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40856%3A%20An%20attacker%20may%20be%20able%20to%20force%20a%20device%20to%20disconnect%20from%20a%20secure%20network%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2df4f0ba78a050537626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27879-an-attacker-may-be-able-to-cause-un-18e73047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27879%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2de9f0ba78a050536e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40801-an-app-may-be-able-to-access-protec-2bc9b852</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40801%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df0f0ba78a05053740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27880-processing-a-maliciously-crafted-fi-cb2091df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27880%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2de9f0ba78a050536e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40840-an-attacker-with-physical-access-ma-3881cf6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40840%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df2f0ba78a050537481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40790-an-app-may-be-able-to-read-sensitiv-1a3f579a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40790%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20data%20from%20the%20GPU%20memory%20in%20Apple%20visionOS&amp;severity=medium&amp;id=690a2df0f0ba78a0505373e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40837-an-app-may-be-able-to-access-protec-e97642f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40837%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df2f0ba78a050537479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44177-an-app-may-be-able-to-access-user-s-e86001aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44177%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfcf0ba78a0505387e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44198-processing-maliciously-crafted-web--c4ade77b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44198%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2dfef0ba78a050538c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40860-an-app-may-be-able-to-modify-protec-9df4bdf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40860%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df4f0ba78a05053763e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44161-processing-a-maliciously-crafted-te-487a278c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44161%3A%20Processing%20a%20maliciously%20crafted%20texture%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df9f0ba78a050538726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27875-privacy-indicators-for-microphone-o-b53d9ceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27875%3A%20Privacy%20Indicators%20for%20microphone%20or%20camera%20access%20may%20be%20attributed%20incorrectly%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2de9f0ba78a050536e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27874-a-remote-attacker-may-be-able-to-ca-b334229e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27874%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2de9f0ba78a050536e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44160-processing-a-maliciously-crafted-te-fdf3991c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44160%3A%20Processing%20a%20maliciously%20crafted%20texture%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df9f0ba78a05053871e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27858-an-app-may-be-able-to-access-protec-4cbfb315</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27858%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2de7f0ba78a050535f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40861-an-app-may-be-able-to-gain-root-pri-70133c6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40861%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df4f0ba78a050537644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44176-processing-an-image-may-lead-to-a-d-7e18e7d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44176%3A%20Processing%20an%20image%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2dfbf0ba78a050538797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40791-an-app-may-be-able-to-access-inform-1e860449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40791%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a2df0f0ba78a0505373ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40841-processing-a-maliciously-crafted-vi-ac46014c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40841%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df2f0ba78a050537485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40857-processing-maliciously-crafted-web--b6910d94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40857%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20universal%20cross%20site%20scripting%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2df4f0ba78a05053762e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44183-an-app-may-be-able-to-cause-a-denia-3ecca113</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44183%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2dfcf0ba78a05053882b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40831-an-app-may-be-able-to-access-a-user-865f6fb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40831%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Photos%20Library%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df2f0ba78a050537475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44171-an-attacker-with-physical-access-to-d0de993a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44171%3A%20An%20attacker%20with%20physical%20access%20to%20a%20locked%20device%20may%20be%20able%20to%20Control%20Nearby%20Devices%20via%20accessibility%20features%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2dfbf0ba78a05053878f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40866-visiting-a-malicious-website-may-le-21a4906b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40866%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20address%20bar%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=690929b1fe7723195e0fd861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44130-an-app-with-root-privileges-may-be--4fbe4e88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44130%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df7f0ba78a0505386c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44167-an-app-may-be-able-to-overwrite-arb-d2d41017</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44167%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2dfbf0ba78a050538764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44188-an-app-may-be-able-to-access-protec-e09b646d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44188%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfcf0ba78a05053884a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27795-a-camera-extension-may-be-able-to-a-49849fdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27795%3A%20A%20camera%20extension%20may%20be%20able%20to%20access%20the%20internet%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2de7f0ba78a050535f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44184-an-app-may-be-able-to-access-user-s-4e8df026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44184%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2dfcf0ba78a05053883b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40850-an-app-may-be-able-to-access-user-s-5d627c6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40850%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df4f0ba78a050537612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44147-an-app-may-gain-unauthorized-access-f584b2dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44147%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Local%20Network%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2df7f0ba78a0505386e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27869-an-app-may-be-able-to-record-the-sc-6ff0c9f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27869%3A%20An%20app%20may%20be%20able%20to%20record%20the%20screen%20without%20an%20indicator%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a2de9f0ba78a050536e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44151-an-app-may-be-able-to-modify-protec-e436e0b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44151%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df9f0ba78a0505386fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40846-processing-a-maliciously-crafted-vi-eb35eef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40846%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df2f0ba78a0505374b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40797-visiting-a-malicious-website-may-le-8e2ae2ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40797%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df0f0ba78a050537402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40847-an-app-may-be-able-to-access-sensit-37bae868</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40847%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2df4f0ba78a050537602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44146-an-app-may-be-able-to-break-out-of--b011f623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44146%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=690a2df7f0ba78a0505386e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44202-private-browsing-tabs-may-be-access-0db6a0bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44202%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2dfef0ba78a050538c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44166-an-app-may-be-able-to-access-user-s-163a2449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44166%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2dfbf0ba78a05053875c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40826-an-unencrypted-document-may-be-writ-a4cdb641</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40826%3A%20An%20unencrypted%20document%20may%20be%20written%20to%20a%20temporary%20file%20when%20using%20print%20preview%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df0f0ba78a05053741b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44189-a-logic-issue-existed-where-a-proce-f26592dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44189%3A%20A%20logic%20issue%20existed%20where%20a%20process%20may%20be%20able%20to%20capture%20screen%20contents%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2dfcf0ba78a05053884e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23237-an-app-may-be-able-to-cause-a-denia-160f7131</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23237%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a2de7f0ba78a050535f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44131-an-app-may-be-able-to-access-sensit-b92fa1fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44131%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df7f0ba78a0505386c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44127-private-browsing-tabs-may-be-access-3abf247e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44127%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2df6f0ba78a05053768c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40830-an-app-may-be-able-to-enumerate-a-u-f63e1e02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40830%3A%20An%20app%20may%20be%20able%20to%20enumerate%20a%20user&apos;s%20installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a2df0f0ba78a050537421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44170-an-app-may-be-able-to-access-user-s-20f1cc11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44170%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a2dfbf0ba78a050538787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23984-information-disclosure-in-intelr-pr-269df0e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23984%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909261ffe7723195e0b46a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24968-denial-of-service-in-intelr-process-0d5b4f57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24968%3A%20denial%20of%20service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909261ffe7723195e0b46a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25546-denial-of-service-in-uefi-firmware--a6f153e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25546%3A%20denial%20of%20service%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Processors&amp;severity=low&amp;id=6909262bfe7723195e0b5e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43753-information-disclosure-in-intelr-pr-6d930ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43753%3A%20information%20disclosure%20in%20Intel(R)%20Processors%20with%20Intel(R)%20SGX&amp;severity=medium&amp;id=69092635fe7723195e0b61d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22351-escalation-of-privilege-in-uefi-fir-09eccbe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22351%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909262bfe7723195e0b5de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23904-escalation-of-privilege-in-uefi-fir-7b785f74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23904%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Processors&amp;severity=medium&amp;id=6909262bfe7723195e0b5de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41833-escalation-of-privilege-in-uefi-fir-9af1283a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41833%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20processors&amp;severity=high&amp;id=69092635fe7723195e0b61ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21781-information-disclosure-denial-of-se-1e093b6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21781%3A%20information%20disclosure%2C%20denial%20of%20service%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Processors&amp;severity=high&amp;id=6909261dfe7723195e0b4166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21829-escalation-of-privilege-in-intelr-p-4ef191cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21829%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=6909261dfe7723195e0b416e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42772-escalation-of-privilege-in-uefi-fir-b2f37f5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42772%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20reference%20processors&amp;severity=high&amp;id=69092635fe7723195e0b61be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43626-escalation-of-privilege-in-uefi-fir-4a1486b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43626%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Processors&amp;severity=high&amp;id=69092635fe7723195e0b61d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21871-escalation-of-privilege-in-uefi-fir-943c0594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21871%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Processors&amp;severity=high&amp;id=6909261dfe7723195e0b417a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23599-denial-of-service-in-seamless-firmw-56210755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23599%3A%20denial%20of%20service%20in%20Seamless%20Firmware%20Updates%20for%20some%20Intel%C3%82%C2%AE%20reference%20platforms&amp;severity=high&amp;id=6909261ffe7723195e0b469a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46937-na-d89472d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46937%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d06b7ef31ef0b56d47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46451-na-de55f952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46451%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56ac67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46424-na-0116194b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46424%3A%20n%2Fa&amp;severity=high&amp;id=699f6cfeb7ef31ef0b56ac14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46419-na-09906d28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46419%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cfeb7ef31ef0b56ac11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45416-na-e46855da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45416%3A%20n%2Fa&amp;severity=high&amp;id=699f6cedb7ef31ef0b56a424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45415-na-986d2113</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45415%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45414-na-c2b392f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45414%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cecb7ef31ef0b56a3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45413-na-0a700fcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45413%3A%20n%2Fa&amp;severity=high&amp;id=699f6cecb7ef31ef0b56a3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44623-na-5fcfa30e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44623%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44445-b731d0d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44445&amp;severity=null&amp;id=699f6cdeb7ef31ef0b569ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42798-na-da1efe9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42798%3A%20n%2Fa&amp;severity=high&amp;id=699f6cceb7ef31ef0b569353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42796-na-f6f22491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42796%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cceb7ef31ef0b56934c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42795-na-f88d786e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42795%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cceb7ef31ef0b569348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42794-na-ea1982ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42794%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cceb7ef31ef0b569344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-16-49994121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-16&amp;severity=medium&amp;id=68359c9a5d5f0974d01e3e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-16-f1bc4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-16&amp;severity=medium&amp;id=682acdc3bbaf20d303f1bc4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-16-f130c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-16&amp;severity=medium&amp;id=682acdc2bbaf20d303f130c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44059-improper-neutralization-of-input-du-189daa2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44059%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ronald%20Huereca%20Custom%20Query%20Blocks&amp;severity=null&amp;id=69cd7488e6bfc5ba1def7d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45455-improper-neutralization-of-input-du-2ca425f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45455%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JoomUnited%20WP%20Meta%20SEO&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45456-improper-neutralization-of-input-du-b48f53c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45456%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20JoomUnited%20WP%20Meta%20SEO&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45457-improper-neutralization-of-input-du-82630080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45457%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiffy%20Plugins%20Spiffy%20Calendar&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45458-improper-neutralization-of-input-du-f940e395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45458%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Spiffy%20Plugins%20Spiffy%20Calendar&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45459-improper-neutralization-of-input-du-f425a54c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45459%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PickPlugins%20Product%20Slider%20for%20WooCommerce&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45460-improper-neutralization-of-input-du-4a8767bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45460%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manu225%20Flipping%20Cards&amp;severity=null&amp;id=69cd7489e6bfc5ba1def7e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46938-na-fda28fc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46938%3A%20n%2Fa&amp;severity=high&amp;id=699f6d06b7ef31ef0b56d481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-15-f13aa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f13aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6482-cwe-269-improper-privilege-managemen-59e653c7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6482%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20glboy%20Login%20with%20phone%20number&amp;severity=high&amp;id=699f6c04b7ef31ef0b55effd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8797-cwe-79-improper-neutralization-of-in-b6ae65d3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8797%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20murgroland%20WP%20Booking%20System%20%E2%80%93%20Booking%20Calendar&amp;severity=medium&amp;id=699f6b32b7ef31ef0b54f3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8669-cwe-89-improper-neutralization-of-sp-8aacad62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8669%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20softaculous%20Backuply%20%E2%80%93%20Backup%2C%20Restore%2C%20Migrate%20and%20Clone&amp;severity=critical&amp;id=699f6c2eb7ef31ef0b560e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8724-cwe-79-improper-neutralization-of-in-240fe776</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xootix%20Waitlist%20Woocommerce%20(%20Back%20in%20stock%20notifier%20)&amp;severity=medium&amp;id=699f6b2eb7ef31ef0b54f10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8479-cwe-94-improper-control-of-generatio-1c79b2ca</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8479%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20webliberty%20Simple%20Spoiler&amp;severity=high&amp;id=699f6c2ab7ef31ef0b560a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8246-cwe-269-improper-privilege-managemen-aa280647</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8246%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=high&amp;id=699f6c24b7ef31ef0b56066a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8775-insertion-of-sensitive-information-i-a8ab178f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8775%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&amp;severity=medium&amp;id=6909325935043901e8309990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8271-cwe-94-improper-control-of-generatio-d38070c4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8271%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20FOX%20%E2%80%93%20Currency%20Switcher%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=699f6c24b7ef31ef0b56070c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-14-f12179</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6087-cwe-639-authorization-bypass-through-6c751c9d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6087%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8242-cwe-434-unrestricted-upload-of-file--0b245c08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8242%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=medium&amp;id=699f6c24b7ef31ef0b560664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5870-cwe-79-improper-neutralization-of-in-1ca77b9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnoldgoodway%20Tweaker5&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5869-cwe-79-improper-neutralization-of-in-1b6b8c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arnoldgoodway%20Neighborly&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8730-cwe-79-improper-neutralization-of-in-172b9786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cvscvstechcom%20Exit%20Notifier&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5867-cwe-79-improper-neutralization-of-in-91d2d494</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nattywp%20Delicate&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8734-cwe-79-improper-neutralization-of-in-b5707e47</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lucasstad%20Lucas%20String%20Replace&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5884-cwe-79-improper-neutralization-of-in-2bce29bd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20allprices%20Beauty&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8737-cwe-79-improper-neutralization-of-in-f7451c7c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kubiq%20PDF%20Thumbnail%20Generator&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7423-cwe-352-cross-site-request-forgery-c-2883c71b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7423%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xwp%20Stream&amp;severity=high&amp;id=699f6c16b7ef31ef0b55fce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6544-cwe-200-exposure-of-sensitive-inform-1601b990</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6544%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20coffee2code%20Custom%20Post%20Limits&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8747-cwe-79-improper-neutralization-of-in-773faa7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8747%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20khromov%20Email%20Obfuscate%20Shortcode&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8731-cwe-79-improper-neutralization-of-in-7be5ce29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arielhr1987%20Cron%20Jobs&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8269-cwe-284-improper-access-control-in-i-de6bdd2b</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8269%3A%20CWE-284%20Improper%20Access%20Control%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=high&amp;id=699f6c24b7ef31ef0b560706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8714-cwe-79-improper-neutralization-of-in-ba19315d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iovamihai%20WordPress%20Affiliates%20Plugin%20%E2%80%94%20SliceWP%20Affiliates&amp;severity=medium&amp;id=699f6b2db7ef31ef0b54f074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8732-cwe-79-improper-neutralization-of-in-690271e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20arielhr1987%20Roles%20%26%20Capabilities&amp;severity=medium&amp;id=699f6b2fb7ef31ef0b54f1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5789-cwe-79-improper-neutralization-of-in-5fabcb5b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5789%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Towfiq%20I.%20Triton%20Lite&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46713-vulnerability-in-linux-linux-be1061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8663-cwe-79-improper-neutralization-of-in-e36ea208</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20murgroland%20WP%20Simple%20Booking%20Calendar&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8742-cwe-79-improper-neutralization-of-in-f81db59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8742%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Addon%2C%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b30b7ef31ef0b54f23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8664-cwe-79-improper-neutralization-of-in-726c85da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boopathi0001%20WP%20Test%20Email&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5567-cwe-79-improper-neutralization-of-in-85c60eae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7888-cwe-862-missing-authorization-in-tec-a8c85ba6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7888%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=699f6c20b7ef31ef0b5603de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8665-cwe-79-improper-neutralization-of-in-c648dd4c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20Custom%20Login&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46712-vulnerability-in-linux-linux-be1059</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46711-vulnerability-in-linux-linux-be1055</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46710-vulnerability-in-linux-linux-be1044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46709-vulnerability-in-linux-linux-bdcdea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcdea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46708-vulnerability-in-linux-linux-be102b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe102b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46707-vulnerability-in-linux-linux-be1027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46706-vulnerability-in-linux-linux-be1023</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46705-vulnerability-in-linux-linux-be1016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46704-vulnerability-in-linux-linux-be1012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9826c4522896dcbe1012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46703-vulnerability-in-linux-linux-be100e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe100e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46702-vulnerability-in-linux-linux-be100a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe100a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46701-vulnerability-in-linux-linux-be1006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe1006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5628-cwe-79-improper-neutralization-of-in-614320be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5628%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusion%20Fusion%20Builder&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46700-vulnerability-in-linux-linux-be1002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe1002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46699-vulnerability-in-linux-linux-be0ffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46698-vulnerability-in-linux-linux-bdcde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46697-vulnerability-in-linux-linux-be0fde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46696-vulnerability-in-linux-linux-be0fda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46695-vulnerability-in-linux-linux-be0fd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46694-vulnerability-in-linux-linux-be0fd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46693-vulnerability-in-linux-linux-be0fce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46692-vulnerability-in-linux-linux-be0fca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46691-vulnerability-in-linux-linux-bdcdd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcdd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46690-vulnerability-in-linux-linux-be0fc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46689-vulnerability-in-linux-linux-be0fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46688-vulnerability-in-linux-linux-be0fbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46687-vulnerability-in-linux-linux-be0fba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46686-vulnerability-in-linux-linux-bdcdcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcdcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46685-vulnerability-in-linux-linux-be0f9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46684-vulnerability-in-linux-linux-be0f9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46683-vulnerability-in-linux-linux-be0f96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46682-vulnerability-in-linux-linux-be0f92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46681-vulnerability-in-linux-linux-be0f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46680-vulnerability-in-linux-linux-be0f8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46679-vulnerability-in-linux-linux-be0f84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46678-vulnerability-in-linux-linux-bdcdc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcdc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46677-vulnerability-in-linux-linux-be0f80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46676-vulnerability-in-linux-linux-be0f7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46675-vulnerability-in-linux-linux-be0f7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46674-vulnerability-in-linux-linux-be0f58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46673-vulnerability-in-linux-linux-be0f54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8656-cwe-79-improper-neutralization-of-in-843f7f52</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20algoritmika%20WPFactory%20Helper&amp;severity=medium&amp;id=699f6c2eb7ef31ef0b560d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46049-na-ea84bdfc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46049%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46048-na-3702230d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46048%3A%20n%2Fa&amp;severity=high&amp;id=699f6cf7b7ef31ef0b56a902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46047-na-0e11da0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46047%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46046-na-a893f59b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46046%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46045-na-703809d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46045%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf7b7ef31ef0b56a8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46044-na-2eb7931c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46044%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf6b7ef31ef0b56a87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44798-na-9a02c721</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44798%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44685-na-14a214ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44685%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce0b7ef31ef0b569c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44430-na-659e5640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44430%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdeb7ef31ef0b569ace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-13-f1283d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f1283d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6840-improper-authorization-e30686f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6840%3A%20Improper%20Authorization&amp;severity=medium&amp;id=691f82024f1c50aa2eb5ae8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3305-cwe-639-authorization-bypass-through-c95ab2b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3305%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Utarit%20Information%20SoliClub&amp;severity=high&amp;id=68ee47d1509368ccaa6fd05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8522-cwe-89-improper-neutralization-of-sp-ca7634aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8522%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=critical&amp;id=699f6c2cb7ef31ef0b560be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8529-cwe-89-improper-neutralization-of-sp-033f7b84</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8529%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=critical&amp;id=699f6c2cb7ef31ef0b560be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8622-cwe-79-improper-neutralization-of-in-0b017a5c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8622%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20martynasma%20amCharts%3A%20Charts%20and%20Maps&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45624-exposure-of-sensitive-information-d-3de26e04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45624%3A%20Exposure%20of%20Sensitive%20Information%20Due%20to%20Incompatible%20Policies%20in%20PgPool%20Global%20Development%20Group%20Pgpool-II&amp;severity=high&amp;id=69092b7735043901e828cb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38222-cwe-276-incorrect-default-permissio-f27d5617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38222%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=699f6c74b7ef31ef0b564397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45182-na-72f5d183</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45182%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45181-na-76b977f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45181%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44460-na-8d4fd8ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44460%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44459-na-ec631eb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44459%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41629-na-a884ed27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41629%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbdb7ef31ef0b56895a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40457-na-5da558c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40457%3A%20n%2Fa&amp;severity=critical&amp;id=699f6caab7ef31ef0b567dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34336-na-ec511454</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34336%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4fb7ef31ef0b56226e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34335-na-ca203938</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34335%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4fb7ef31ef0b562269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34334-na-74ba196e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34334%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4eb7ef31ef0b562216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-12-f1254d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1254d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46672-vulnerability-in-linux-linux-be0f50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45030-vulnerability-in-linux-linux-be0f3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45029-vulnerability-in-linux-linux-be0f3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45028-vulnerability-in-linux-linux-be0f37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45027-vulnerability-in-linux-linux-bd7b60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9818c4522896dcbd7b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45026-vulnerability-in-linux-linux-be0f33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45025-vulnerability-in-linux-linux-be0f2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45024-vulnerability-in-linux-linux-be0f2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45023-vulnerability-in-linux-linux-be0f10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45022-vulnerability-in-linux-linux-be0f0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45021-vulnerability-in-linux-linux-be0efb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45020-vulnerability-in-linux-linux-be0ef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45019-vulnerability-in-linux-linux-be0eef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45018-vulnerability-in-linux-linux-be0eeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45017-vulnerability-in-linux-linux-be0ede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45016-vulnerability-in-linux-linux-bdcdbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcdbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45015-vulnerability-in-linux-linux-be0eda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45014-vulnerability-in-linux-linux-be0ed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45013-vulnerability-in-linux-linux-be0ed2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45012-vulnerability-in-linux-linux-be0eb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45011-vulnerability-in-linux-linux-be0eb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45010-vulnerability-in-linux-linux-be0ea4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45009-vulnerability-in-linux-linux-be0e9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5416-cwe-79-improper-neutralization-of-in-72afd7c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5416%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55bed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8277-cwe-288-authentication-bypass-using--ab0489fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8277%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20villatheme%20WooCommerce%20Photo%20Reviews%20Premium&amp;severity=critical&amp;id=699f6c24b7ef31ef0b560722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8045-cwe-79-improper-neutralization-of-in-176a9af4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nko%20Advanced%20WordPress%20Backgrounds&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7626-cwe-73-external-control-of-file-name-fada42a2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7626%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20wpdelicious%20WP%20Delicious%20%E2%80%93%20Recipe%20Plugin%20for%20Food%20Bloggers%20(formerly%20Delicious%20Recipes)&amp;severity=high&amp;id=699f6c1cb7ef31ef0b560034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8440-cwe-79-improper-neutralization-of-in-87c90cc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Addon%2C%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6c28b7ef31ef0b5609b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7727-cwe-862-missing-authorization-in-bpl-8221bec0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7727%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20HTML5%20Video%20Player%20%E2%80%93%20mp4%20Video%20Player%20Plugin%20and%20Block&amp;severity=medium&amp;id=699f6c1db7ef31ef0b5601d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7721-cwe-862-missing-authorization-in-bpl-f12cdff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7721%3A%20CWE-862%20Missing%20Authorization%20in%20bplugins%20HTML5%20Video%20Player%20%E2%80%93%20mp4%20Video%20Player%20Plugin%20and%20Block&amp;severity=medium&amp;id=699f6c1db7ef31ef0b5601bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8253-cwe-266-incorrect-privilege-assignme-9ef0bcb5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8253%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20pickplugins%20Post%20Grid%20and%20Gutenberg%20Blocks&amp;severity=high&amp;id=699f6c24b7ef31ef0b560679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44851-na-1f9f5cc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44851%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce6b7ef31ef0b569fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44577-na-f87b8890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44577%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44575-na-a2145ae0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44575%3A%20n%2Fa&amp;severity=low&amp;id=699f6ce0b7ef31ef0b569bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44574-na-9a053ecc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44574%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44573-na-4b574d53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44573%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce0b7ef31ef0b569bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44572-na-f242c8bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44572%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44571-na-8ae1da46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44571%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44570-na-15983232</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44570%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44541-na-5d891fa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44541%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdeb7ef31ef0b569b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44466-na-f417602d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44466%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdeb7ef31ef0b569ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42760-na-1afded08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42760%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccbb7ef31ef0b56919f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-11-f1292b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f1292b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8190-cwe-78-improper-neutralization-of-sp-e54a12fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8190%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Ivanti%20CSA%20(Cloud%20Services%20Appliance)&amp;severity=high&amp;id=68f7d9b7247d717aace26c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37980-cwe-269-improper-privilege-manageme-20c32117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37980%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c74b7ef31ef0b564333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38194-cwe-20-improper-input-validation-in-3641722a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38194%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Web%20Apps&amp;severity=high&amp;id=699f6c74b7ef31ef0b56438b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43495-cwe-190-integer-overflow-or-wraparo-1d27fa1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43495%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43491-cwe-416-use-after-free-in-microsoft-68145b30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43491%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=critical&amp;id=699f6cdab7ef31ef0b56989d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43487-cwe-693-protection-mechanism-failur-525c9592</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43487%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=699f6cdab7ef31ef0b569897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30073-cwe-41-improper-resolution-of-path--851a8fb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30073%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43479-cwe-284-improper-access-control-in--3a3df9f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43479%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Power%20Automate%20for%20Desktop&amp;severity=high&amp;id=699f6cdab7ef31ef0b569891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43476-cwe-79-improper-neutralization-of-i-9fd7dc64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43476%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=699f6cd8b7ef31ef0b569842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43475-cwe-126-buffer-over-read-in-microso-0e3cf573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43475%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202008%20Service%20Pack%202&amp;severity=high&amp;id=699f6cd8b7ef31ef0b56983f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43470-cwe-59-improper-link-resolution-bef-e6633809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43470%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Network%20Watcher%20VM%20Extension&amp;severity=high&amp;id=699f6cd8b7ef31ef0b569839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43469-cwe-94-improper-control-of-generati-ef682ba3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43469%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20CycleCloud%208.2.0&amp;severity=high&amp;id=699f6cd8b7ef31ef0b569836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43466-cwe-502-deserialization-of-untruste-32e6c67d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43466%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=699f6cd8b7ef31ef0b569830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43461-cwe-451-user-interface-ui-misrepres-d607c624</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43461%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=68f7d9b4247d717aace26ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43458-cwe-908-use-of-uninitialized-resour-80e6de77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43458%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43457-cwe-428-unquoted-search-path-or-ele-4264cf6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43457%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43455-cwe-20-improper-input-validation-in-8083c68f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43455%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43454-cwe-23-relative-path-traversal-in-m-842b917a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43454%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=699f6cd8b7ef31ef0b5697ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38119-cwe-416-use-after-free-in-microsoft-9f63b10f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38119%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c74b7ef31ef0b564342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38045-cwe-122-heap-based-buffer-overflow--b9a1b4c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38045%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c74b7ef31ef0b56433c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21416-cwe-122-heap-based-buffer-overflow--3f86d165</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21416%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6d46b7ef31ef0b56ff41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38263-cwe-591-sensitive-data-storage-in-i-c426001d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38263%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=699f6c78b7ef31ef0b564bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38260-cwe-908-use-of-uninitialized-resour-818da89e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38260%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=699f6c78b7ef31ef0b564bd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38259-cwe-416-use-after-free-in-microsoft-f2388221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38259%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=699f6c78b7ef31ef0b564bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38258-cwe-23-relative-path-traversal-in-m-134b069d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38258%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=699f6c78b7ef31ef0b564bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38257-cwe-908-use-of-uninitialized-resour-46a92e01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38257%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c78b7ef31ef0b564bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38248-cwe-416-use-after-free-in-microsoft-f3fc2354</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38248%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38247-cwe-415-double-free-in-microsoft-wi-764813d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38247%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38246-cwe-121-stack-based-buffer-overflow-3123983c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38246%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38245-cwe-20-improper-input-validation-in-022c239b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38245%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38244-cwe-20-improper-input-validation-in-13c286dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38244%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38243-cwe-20-improper-input-validation-in-1093f1c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38243%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38239-cwe-1390-weak-authentication-in-mic-fec2acc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38239%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c76b7ef31ef0b564ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38238-cwe-122-heap-based-buffer-overflow--15c45b90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38238%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c76b7ef31ef0b564aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38237-cwe-122-heap-based-buffer-overflow--bfcd46ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38237%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c76b7ef31ef0b564aac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38235-cwe-416-use-after-free-in-microsoft-a4178b16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38235%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=699f6c76b7ef31ef0b564aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38234-cwe-20-improper-input-validation-in-126b78d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38234%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=699f6c76b7ef31ef0b564aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38233-cwe-476-null-pointer-dereference-in-c0e3ce2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38233%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=699f6c76b7ef31ef0b564aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38232-cwe-476-null-pointer-dereference-in-2bce390f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38232%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=high&amp;id=699f6c76b7ef31ef0b564a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38231-cwe-285-improper-authorization-in-m-f7c294f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38231%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=699f6c74b7ef31ef0b5643a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38228-cwe-77-improper-neutralization-of-s-0cba3bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38228%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=699f6c74b7ef31ef0b5643a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38227-cwe-77-improper-neutralization-of-s-3cd662a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38227%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=699f6c74b7ef31ef0b56439d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38226-cwe-693-protection-mechanism-failur-50f3e603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38226%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=68f7d9b3247d717aace26a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38225-cwe-287-improper-authentication-in--0caa4668</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38225%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Business%20Central%202023%20Release%20Wave%201&amp;severity=high&amp;id=699f6c74b7ef31ef0b56439a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38217-cwe-693-protection-mechanism-failur-8d6ebd16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38217%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68f7d9b3247d717aace26a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38046-cwe-20-improper-input-validation-in-33df86ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38046%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c74b7ef31ef0b56433f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38014-cwe-269-improper-privilege-manageme-bb9fbc50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38014%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9b2247d717aace26a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37341-cwe-284-improper-access-control-in--443787c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37341%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c66b7ef31ef0b563abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37965-cwe-20-improper-input-validation-in-f52e8a3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37965%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c74b7ef31ef0b56432d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43465-cwe-416-use-after-free-in-microsoft-20ef9458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43465%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=699f6cd8b7ef31ef0b56982d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43492-cwe-284-improper-access-control-in--b65d5bfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43492%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20AutoUpdate%20for%20Mac&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43482-cwe-285-improper-authorization-in-m-3d36d650</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43482%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Outlook%20for%20iOS&amp;severity=medium&amp;id=699f6cdab7ef31ef0b569894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43474-cwe-170-improper-null-termination-i-3228df6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43474%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6cd8b7ef31ef0b56983c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43467-cwe-362-concurrent-execution-using--c14e45b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43467%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=699f6cd8b7ef31ef0b569833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43464-cwe-502-deserialization-of-untruste-d39cf9e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43464%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=699f6cd8b7ef31ef0b56982a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43463-cwe-416-use-after-free-in-microsoft-c6df39d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43463%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=699f6cd8b7ef31ef0b569827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38256-cwe-908-use-of-uninitialized-resour-ab42f0ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38256%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=699f6c78b7ef31ef0b564bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38254-cwe-908-use-of-uninitialized-resour-7c65a6c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38254%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=699f6c78b7ef31ef0b564bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38253-cwe-416-use-after-free-in-microsoft-1bc7bb7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38253%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=699f6c78b7ef31ef0b564bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38252-cwe-416-use-after-free-in-microsoft-34c99354</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38252%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38250-cwe-126-buffer-over-read-in-microso-25053099</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38250%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38249-cwe-416-use-after-free-in-microsoft-99b5b9ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38249%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38242-cwe-122-heap-based-buffer-overflow--384b1523</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38242%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c77b7ef31ef0b564b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38241-cwe-20-improper-input-validation-in-c1c7fbe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38241%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c76b7ef31ef0b564ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38240-cwe-125-out-of-bounds-read-in-micro-a0ebb8b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38240%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=699f6c76b7ef31ef0b564ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38236-cwe-400-uncontrolled-resource-consu-4eb6656e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38236%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=699f6c76b7ef31ef0b564aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38230-cwe-20-improper-input-validation-in-c4d265bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38230%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=699f6c74b7ef31ef0b5643a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38188-cwe-59-improper-link-resolution-bef-dbac3531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38188%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Network%20Watcher%20VM%20Extension&amp;severity=high&amp;id=699f6c74b7ef31ef0b564348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38220-cwe-284-improper-access-control-in--1d57f66c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38220%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=critical&amp;id=699f6c74b7ef31ef0b564391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38216-cwe-20-improper-input-validation-in-61c61f03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38216%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=high&amp;id=699f6c74b7ef31ef0b56438e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38018-cwe-502-deserialization-of-untruste-b131250e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38018%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=699f6c74b7ef31ef0b564339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26191-cwe-122-heap-based-buffer-overflow--f4287bce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26191%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6d73b7ef31ef0b57248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26186-cwe-416-use-after-free-in-microsoft-18b98a86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26186%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6d73b7ef31ef0b57248c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37342-cwe-125-out-of-bounds-read-in-micro-9d82e12d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37342%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2028)&amp;severity=high&amp;id=699f6c68b7ef31ef0b563b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37337-cwe-197-numeric-truncation-error-in-bd19c030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37337%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c66b7ef31ef0b563ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37339-cwe-822-untrusted-pointer-dereferen-7adb5ce7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37339%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c66b7ef31ef0b563ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37340-cwe-822-untrusted-pointer-dereferen-e8bbdcec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37340%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c66b7ef31ef0b563abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37335-cwe-122-heap-based-buffer-overflow--d9d83218</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37335%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c66b7ef31ef0b563aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37966-cwe-125-out-of-bounds-read-in-micro-66b91590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37966%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c74b7ef31ef0b564330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37338-cwe-125-out-of-bounds-read-in-micro-58f1c864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37338%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=699f6c66b7ef31ef0b563ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6841-improper-handling-of-extra-values-d1b9139e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6841%3A%20Improper%20Handling%20of%20Extra%20Values&amp;severity=high&amp;id=690eefde44af18c3752cf5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43799-cwe-79-improper-neutralization-of-i-8946c2ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43799%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pillarjs%20send&amp;severity=medium&amp;id=6909084f7fff0e30cee2351c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23185-allocation-of-resources-without-lim-04ff207d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23185%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=high&amp;id=690a2de7f0ba78a050535f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35282-information-disclosure-in-fortinet--275409e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35282%3A%20Information%20disclosure%20in%20Fortinet%20FortiClientiOS&amp;severity=low&amp;id=696762bf8330e06716573507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31490-information-disclosure-in-fortinet--e6f79111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31490%3A%20Information%20disclosure%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a2148330e0671671d0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23184-allocation-of-resources-without-lim-fe0aa525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23184%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Open-Xchange%20GmbH%20OX%20Dovecot%20Pro&amp;severity=medium&amp;id=690a2de7f0ba78a050535f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8654-cwe-908-use-of-uninitialized-resource-in-mongodb-inc-mongodb-server-aeba57</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8654%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aeba57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8443-heap-based-buffer-overflow-14e753f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8443%3A%20Heap-based%20Buffer%20Overflow&amp;severity=low&amp;id=68e90ce7dd820f2ffe5dfcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8369-cwe-862-missing-authorization-in-met-2e17f0f8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8369%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6c28b7ef31ef0b56091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6282-cwe-79-improper-neutralization-of-in-b4f56e3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7770-cwe-434-unrestricted-upload-of-file--4519eda4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7770%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20Bit%20File%20Manager%20%E2%80%93%20100%25%20Free%20%26%20Open%20Source%20File%20Manager%20and%20Code%20Editor%20for%20WordPress&amp;severity=high&amp;id=699f6c1eb7ef31ef0b560243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8645-cwe-824-access-of-uninitialized-poin-797a82ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8645%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909325935043901e830998b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44087-cwe-190-integer-overflow-or-wraparound-in-siemens-automation-license-manager-v5-bd66be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44087%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Siemens%20Automation%20License%20Manager%20V5&amp;severity=high&amp;id=682d9816c4522896dcbd66be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33698-cwe-122-heap-based-buffer-overflow--26480d5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33698%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Opcenter%20Quality&amp;severity=critical&amp;id=68ee16327eab8b438c025da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8241-cwe-79-improper-neutralization-of-in-fb4ac1ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8241%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pixelgrade%20Nova%20Blocks%20by%20Pixelgrade&amp;severity=medium&amp;id=699f6c24b7ef31ef0b56065e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8543-cwe-79-improper-neutralization-of-in-4d6cbac6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8543%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hardwaremaster%20Slider%20comparison%20image%20before%20and%20after&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7618-cwe-79-improper-neutralization-of-in-9c5f8dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peepso%20Community%20by%20PeepSo%20%E2%80%93%20Social%20Network%2C%20Membership%2C%20Registration%2C%20User%20Profiles%2C%20Premium%20%E2%80%93%20Mobile%20App&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b560019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7655-cwe-79-improper-neutralization-of-in-aa8d499b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20peepso%20Community%20by%20PeepSo%20%E2%80%93%20Social%20Network%2C%20Membership%2C%20Registration%2C%20User%20Profiles%2C%20Premium%20%E2%80%93%20Mobile%20App&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8478-cwe-94-improper-control-of-generatio-c57ed4a4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8478%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20worschtebrot%20Affiliate%20Super%20Assistent&amp;severity=high&amp;id=699f6c28b7ef31ef0b5609cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8268-cwe-94-improper-control-of-generatio-c68ee15d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8268%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vinoth06%20Frontend%20Dashboard&amp;severity=high&amp;id=699f6c24b7ef31ef0b560701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31960-na-67321372</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31960%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd9b7ef31ef0b58f889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25074-na-8c458a64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25074%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5fb7ef31ef0b570c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25073-na-d824ed9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25073%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5eb7ef31ef0b570c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45845-d791359c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45845&amp;severity=null&amp;id=699f6cf1b7ef31ef0b56a668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44893-na-0141c030</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44893%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce6b7ef31ef0b56a058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44872-na-1bb72187</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44872%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce6b7ef31ef0b56a054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44871-na-b48b10d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44871%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b56a050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44867-na-70fe654f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44867%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b56a04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44815-na-5381d1ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44815%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44667-na-891768fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44667%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43040-na-4ff33678</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43040%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd6b7ef31ef0b5696d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37728-na-4d7e38fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37728%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34831-na-ff5daef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34831%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c54b7ef31ef0b563096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-10-e6690c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-10&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e6690c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-10-f11fa0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7341-session-fixation-b8a39a7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7341%3A%20Session%20Fixation&amp;severity=high&amp;id=69156c928f1a6240445ae4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7318-use-of-a-key-past-its-expiration-date-beb7de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7318%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date&amp;severity=medium&amp;id=682d9837c4522896dcbeb7de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7260-url-redirection-to-untrusted-site-open-redirect-bebe57</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7260%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=medium&amp;id=682d9838c4522896dcbebe57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8373-cwe-791-incomplete-filtering-of-special-elements-in-google-angularjs-aeb84e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8373%3A%20CWE-791%3A%20Incomplete%20Filtering%20of%20Special%20Elements%20in%20Google%20AngularJS&amp;severity=medium&amp;id=682cd0f81484d88663aeb84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8372-cwe-1289-improper-validation-of-unsafe-equivalence-in-input-in-google-angularjs-aeb84c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8372%3A%20CWE-1289%3A%20Improper%20Validation%20of%20Unsafe%20Equivalence%20in%20Input%20in%20Google%20AngularJS&amp;severity=medium&amp;id=682cd0f81484d88663aeb84c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7015-cwe-306-missing-authentication-for-c-478e14a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7015%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Profelis%20Informatics%20and%20Consulting%20PassBox&amp;severity=high&amp;id=68ee4b3a509368ccaa76d794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24510-na-119c96e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24510%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5db7ef31ef0b570b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44902-na-770880c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44902%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce6b7ef31ef0b56a05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44725-na-077b3da5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44725%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44724-na-4ea19c91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44724%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44721-na-656299f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44721%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce2b7ef31ef0b569d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44720-na-07ceb8ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44720%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569c39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44411-na-a5260282</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44411%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdcb7ef31ef0b569a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44410-na-784a9e79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44410%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdcb7ef31ef0b569a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44335-na-a15276ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44335%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b56998d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44334-na-f7713805</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44334%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44333-na-fa6c540e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44333%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b56991d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44085-na-3a53d29a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44085%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdab7ef31ef0b569914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42759-na-7c7a8d46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42759%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccbb7ef31ef0b56919b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-09-f12037</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-08-f127ff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f127ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40711-vulnerability-in-veeam-backup-and-r-10b4a6f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40711%3A%20Vulnerability%20in%20Veeam%20Backup%20and%20%20Recovery&amp;severity=critical&amp;id=68f7d9b3247d717aace26a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46809-vulnerability-in-nodejs-node-bed59d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46809%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36138-vulnerability-in-nodejs-node-bed620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36138%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39333-vulnerability-in-nodejs-node-bed595</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39333%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36137-vulnerability-in-nodejs-node-bed61c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36137%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=low&amp;id=682d983ac4522896dcbed61c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30582-vulnerability-in-nodejs-node-bed50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30582%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30587-vulnerability-in-nodejs-node-bed51f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30587%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30583-vulnerability-in-nodejs-node-bed513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30583%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30584-vulnerability-in-nodejs-node-bed517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30584%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6010-cwe-472-external-control-of-assumed--31ab2f34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6010%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20StylemixThemes%20Cost%20Calculator%20Builder%20PRO&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7620-cwe-434-unrestricted-upload-of-file--60cf1e3e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7620%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20justinbusa%20Customizer%20Export%2FImport&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b560021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7112-cwe-89-improper-neutralization-of-sp-ef8c1386</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7112%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dotonpaper%20Pinpoint%20Booking%20System%20%E2%80%93%20%231%20WordPress%20Booking%20Plugin&amp;severity=high&amp;id=699f6c0fb7ef31ef0b55f84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1596-cwe-79-improper-neutralization-of-in-a899eeeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1596%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SaturdayDrive%20Ninja%20Forms%20-%20File%20Uploads&amp;severity=high&amp;id=699f6d37b7ef31ef0b56f084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6849-cwe-79-improper-neutralization-of-in-1b503591</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxsdesign%20Preloader%20Plus%20%E2%80%93%20WordPress%20Loading%20Screen%20Plugin&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8538-cwe-200-information-exposure-in-ugly-54ede26d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8538%3A%20CWE-200%20Information%20Exposure%20in%20uglyrobot%20Big%20File%20Uploads%20%E2%80%93%20Increase%20Maximum%20File%20Upload%20Size&amp;severity=medium&amp;id=699f6c2cb7ef31ef0b560bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-07-f12cba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7652-vulnerability-in-mozilla-firefox-4d822935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7652%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039194aebfcd54747fad43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8509-improper-authorization-546262d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8509%3A%20Improper%20Authorization&amp;severity=high&amp;id=691ec609337afffbc0f72894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7611-cwe-79-improper-neutralization-of-in-a5bb1287</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b560011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7493-cwe-269-improper-privilege-managemen-daa205a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7493%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20whyun%20WPCOM%20Member&amp;severity=critical&amp;id=699f6c18b7ef31ef0b55fe38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8428-cwe-639-authorization-bypass-through-a72ca68c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8428%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ultimatemember%20ForumWP%20%E2%80%93%20Forum%20%26%20Discussion%20Board%20Plugin&amp;severity=high&amp;id=699f6c28b7ef31ef0b560936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7599-cwe-79-improper-neutralization-of-in-73b1d4c5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7599%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcodeus%20Advanced%20Sermons&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55ff5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7622-cwe-862-missing-authorization-in-the-5cfb6653</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7622%3A%20CWE-862%20Missing%20Authorization%20in%20themastercut%20Revision%20Manager%20TMC&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b56002a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1744-cwe-639-authorization-bypass-through-4992a3da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1744%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Ariva%20Computer%20Accord%20ORS&amp;severity=critical&amp;id=68ee47d1509368ccaa6fd058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52916-vulnerability-in-linux-linux-be78f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe78f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52915-vulnerability-in-linux-linux-be78f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe78f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8427-cwe-862-missing-authorization-in-wps-4ed7b1ba</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8427%3A%20CWE-862%20Missing%20Authorization%20in%20wpshuffle%20Frontend%20Post%20Submission%20Manager%20Lite%20%E2%80%93%20Frontend%20Posting%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6c28b7ef31ef0b560931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8317-cwe-79-improper-neutralization-of-in-d2d6ac03</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeka-club%20WP%20AdCenter%20%E2%80%93%20Ad%20Manager%20%26%20Adsense%20Ads&amp;severity=medium&amp;id=699f6c26b7ef31ef0b5607c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8292-cwe-639-authorization-bypass-through-02d7ec62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8292%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=critical&amp;id=699f6c26b7ef31ef0b5607be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7349-cwe-89-improper-neutralization-of-sp-d58e55ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7349%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WP%20LMS%20for%20eLearning%2C%20Online%20Courses%2C%20%26%20Quizzes&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8247-cwe-269-improper-privilege-managemen-11eabd78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8247%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20contrid%20Newsletters&amp;severity=high&amp;id=699f6c24b7ef31ef0b56066e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8480-cwe-862-missing-authorization-in-sir-d6dfae90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8480%3A%20CWE-862%20Missing%20Authorization%20in%20sirv%20Image%20Optimizer%2C%20Resizer%20and%20CDN%20%E2%80%93%20Sirv&amp;severity=high&amp;id=699f6c2ab7ef31ef0b560a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7415-cwe-200-information-exposure-in-coff-b961d223</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7415%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Remember%20Me%20Controls&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fcc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40865-inputs-to-the-virtual-keyboard-may--44f3ad9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40865%3A%20Inputs%20to%20the%20virtual%20keyboard%20may%20be%20inferred%20from%20Persona%20in%20Apple%20visionOS&amp;severity=medium&amp;id=69ceb82ae6bfc5ba1df6e9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45771-na-de30fd2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45771%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf1b7ef31ef0b56a60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45758-na-619ceafd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45758%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cf1b7ef31ef0b56a608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45751-na-238f6fdf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45751%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cf1b7ef31ef0b56a5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44845-na-76a9ec63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44845%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44844-na-d9c84280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44844%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b569fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44839-na-8400db14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44839%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce6b7ef31ef0b569fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44838-na-d6da399e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44838%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce4b7ef31ef0b569f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44837-na-9c86c900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44837%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44739-na-7a2353bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44739%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44408-na-2af31b7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44408%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44402-na-6d25a056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44402%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdcb7ef31ef0b569a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44401-na-059d1693</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44401%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdcb7ef31ef0b569a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44082-na-e95415b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44082%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdab7ef31ef0b56990f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa24-249a-russian-military-cyber-actors-target-us--d2bcde1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA24-249A%3A%20Russian%20Military%20Cyber%20Actors%20Target%20U.S.%20and%20Global%20Critical%20Infrastructure&amp;severity=low&amp;id=68367c04182aa0cae230feac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-06-f12812</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa24-249a-russian-military-cyber-actors-target-u-s-and-global-critical-infrastructure-f0c301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA24-249A%3A%20Russian%20Military%20Cyber%20Actors%20Target%20U.S.%20and%20Global%20Critical%20Infrastructure&amp;severity=low&amp;id=682acdbebbaf20d303f0c301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8395-cwe-89-sql-injection-in-flycass-cock-58a6a274</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8395%3A%20CWE-89%20SQL%20Injection%20in%20FlyCASS%20Cockpit%20Access%20Security%20System%20(CASS)&amp;severity=critical&amp;id=6925be8c5b1d823317eaa231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8445-improper-input-validation-c021065a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8445%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=69091a47c28fd46ded81cf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7381-cwe-862-missing-authorization-in-cre-005c38bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7381%3A%20CWE-862%20Missing%20Authorization%20in%20creativform%20Geo%20Controller&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7380-cwe-862-missing-authorization-in-cre-832ba1de</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7380%3A%20CWE-862%20Missing%20Authorization%20in%20creativform%20Geo%20Controller&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6894-cwe-79-improper-neutralization-of-in-05e5a0d7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20filipe-mateus-do-nascimento%20RD%20Station&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6929-cwe-79-improper-neutralization-of-in-ea04d40e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6929%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ankitpokhrel%20Dynamic%20Featured%20Image&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6332-cwe-862-missing-authorization-in-ame-0fd9b9ca</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6332%3A%20CWE-862%20Missing%20Authorization%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia%20Premium&amp;severity=medium&amp;id=699f6c01b7ef31ef0b55ee0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8363-cwe-79-improper-neutralization-of-in-cf174449</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mihail-barinov%20Share%20This%20Image&amp;severity=medium&amp;id=699f6c26b7ef31ef0b56088e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5309-cwe-862-missing-authorization-in-wpv-4dd143bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5309%3A%20CWE-862%20Missing%20Authorization%20in%20wpvibes%20Form%20Vibes%20%E2%80%93%20Database%20Manager%20for%20Forms&amp;severity=medium&amp;id=699f6be4b7ef31ef0b55bdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6835-cwe-200-information-exposure-in-vino-74387dbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6835%3A%20CWE-200%20Information%20Exposure%20in%20vinod-dalvi%20Ivory%20Search%20%E2%80%93%20WordPress%20Search%20Plugin&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7627-cwe-94-improper-control-of-generatio-c8846b45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7627%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20bitpressadmin%20Bit%20File%20Manager%20%E2%80%93%20100%25%20Free%20%26%20Open%20Source%20File%20Manager%20and%20Code%20Editor%20for%20WordPress&amp;severity=high&amp;id=699f6c1cb7ef31ef0b5600cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45589-na-ff9aa059</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45589%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45178-na-97b454f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45178%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45175-na-b34422f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45175%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce8b7ef31ef0b56a1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45173-na-e04d31d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45173%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce8b7ef31ef0b56a19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45171-na-140f5e6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45171%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce8b7ef31ef0b56a195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45158-na-ff2d4ee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45158%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44728-na-d3217e7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44728%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44727-na-12549a63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44727%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce2b7ef31ef0b569d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44587-na-a256e1ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44587%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42885-na-3ab8c1fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42885%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b56945a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-05-76f86d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-05&amp;severity=medium&amp;id=682c7ac3e3e6de8ceb76f86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-05-f127bf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f127bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20506-vulnerability-in-cisco-clamav-8861786d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20506%3A%20Vulnerability%20in%20Cisco%20ClamAV&amp;severity=medium&amp;id=69092618fe7723195e0b37bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20505-vulnerability-in-cisco-clamav-68977ec1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20505%3A%20Vulnerability%20in%20Cisco%20ClamAV&amp;severity=medium&amp;id=69092618fe7723195e0b37b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45008-vulnerability-in-linux-linux-be0e94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45007-vulnerability-in-linux-linux-aec037</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45006-vulnerability-in-linux-linux-be0e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45005-vulnerability-in-linux-linux-be0e7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45004-vulnerability-in-linux-linux-be0e73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45003-vulnerability-in-linux-linux-be0e6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45002-vulnerability-in-linux-linux-be0e67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45001-vulnerability-in-linux-linux-be0e43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45000-vulnerability-in-linux-linux-be0e3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44999-vulnerability-in-linux-linux-be0e33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44998-vulnerability-in-linux-linux-be0e2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44997-vulnerability-in-linux-linux-be0e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44996-vulnerability-in-linux-linux-be0e1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44995-vulnerability-in-linux-linux-be0e1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44994-vulnerability-in-linux-linux-be0e16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44993-vulnerability-in-linux-linux-be0e12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44992-vulnerability-in-linux-linux-be0e05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44991-vulnerability-in-linux-linux-be0dea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44990-vulnerability-in-linux-linux-be0de6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44989-vulnerability-in-linux-linux-be0de2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44988-vulnerability-in-linux-linux-bdcdac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44987-vulnerability-in-linux-linux-be0dde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0dde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44986-vulnerability-in-linux-linux-bdcd97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44985-vulnerability-in-linux-linux-be0dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44984-vulnerability-in-linux-linux-be0dd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44983-vulnerability-in-linux-linux-be0dd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44982-vulnerability-in-linux-linux-be0dce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44981-vulnerability-in-linux-linux-be0dca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44980-vulnerability-in-linux-linux-be0dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44979-vulnerability-in-linux-linux-be0da6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44978-vulnerability-in-linux-linux-be0d97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44977-vulnerability-in-linux-linux-aec035</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44976-vulnerability-in-linux-linux-be0d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44975-vulnerability-in-linux-linux-be0d8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44974-vulnerability-in-linux-linux-be0d89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44973-vulnerability-in-linux-linux-be0d85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44972-vulnerability-in-linux-linux-be0d81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44972&amp;severity=null&amp;id=682d9826c4522896dcbe0d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44971-vulnerability-in-linux-linux-be0d7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44970-vulnerability-in-linux-linux-aec033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44969-vulnerability-in-linux-linux-be0d79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44968-vulnerability-in-linux-linux-be0d75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44967-vulnerability-in-linux-linux-be0d53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44966-vulnerability-in-linux-linux-be0d4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44965-vulnerability-in-linux-linux-be0d4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44964-vulnerability-in-linux-linux-be0d47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44963-vulnerability-in-linux-linux-be0d43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44962-vulnerability-in-linux-linux-aeb056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44961-vulnerability-in-linux-linux-aec031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44960-vulnerability-in-linux-linux-bdcd93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44959-vulnerability-in-linux-linux-bdcd86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44958-vulnerability-in-linux-linux-bdcd82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44957-vulnerability-in-linux-linux-be0d3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44956-vulnerability-in-linux-linux-be0d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44955-vulnerability-in-linux-linux-be0d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44954-vulnerability-in-linux-linux-be0d28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44953-vulnerability-in-linux-linux-be0d24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44951-vulnerability-in-linux-linux-bdcd7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44950-vulnerability-in-linux-linux-be0d0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44949-vulnerability-in-linux-linux-be0d07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44948-vulnerability-in-linux-linux-be0d03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9826c4522896dcbe0d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20439-hidden-functionality-in-cisco-cisco-1183cb2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20439%3A%20Hidden%20Functionality%20in%20Cisco%20Cisco%20Smart%20License%20Utility&amp;severity=critical&amp;id=68487f531b0bd07c39389de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45075-cwe-306-missing-authentication-for--14b1d0d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45075%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20IBM%20webMethods%20Integration&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8411-cross-site-scripting-in-abcd-abcd2-f0c633b9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8411%3A%20Cross%20Site%20Scripting%20in%20ABCD%20ABCD2&amp;severity=medium&amp;id=69a0a1ca85912abc71d0bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8418-uncontrolled-resource-consumption-bd63c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8418%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=682d9815c4522896dcbd63c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7923-improper-authentication-0b87f4f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7923%3A%20Improper%20Authentication&amp;severity=critical&amp;id=69135a44b36faa5b6c0e5ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7012-improper-authentication-4d5dc948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7012%3A%20Improper%20Authentication&amp;severity=critical&amp;id=68e7a931ba0e608b4f997e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8289-cwe-862-missing-authorization-in-wcm-c9c30c65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8289%3A%20CWE-862%20Missing%20Authorization%20in%20wcmp%20MultiVendorX%20%E2%80%93%20The%20Ultimate%20WooCommerce%20Multivendor%20Marketplace%20Solution&amp;severity=critical&amp;id=699f6c24b7ef31ef0b560732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7870-cwe-287-improper-authentication-in-p-2a352272</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7870%3A%20CWE-287%20Improper%20Authentication%20in%20pixelyoursite%20PixelYourSite%20Pro%20%E2%80%93%20Your%20smart%20PIXEL%20(TAG)%20Manager&amp;severity=medium&amp;id=699f6c20b7ef31ef0b5603d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45195-cwe-425-direct-request-forced-brows-a247901d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45195%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=critical&amp;id=68f7d9b5247d717aace26b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8318-cwe-79-improper-neutralization-of-in-6203f762</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8318%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20websevendev%20Attributes%20for%20Blocks&amp;severity=medium&amp;id=699f6c26b7ef31ef0b5607ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8121-cwe-862-missing-authorization-in-wpe-b232cd23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8121%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8123-cwe-639-authorization-bypass-through-94e4efa7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8123%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8102-cwe-862-missing-authorization-in-wpe-ad255d83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8102%3A%20CWE-862%20Missing%20Authorization%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6c22b7ef31ef0b5604aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8106-cwe-200-information-exposure-in-wpex-a6be3afd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8106%3A%20CWE-200%20Information%20Exposure%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6c22b7ef31ef0b5604bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8119-cwe-79-improper-neutralization-of-in-b27c7820</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8119%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8104-cwe-22-improper-limitation-of-a-path-1885bc61</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8104%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=high&amp;id=699f6c22b7ef31ef0b5604b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8117-cwe-79-improper-neutralization-of-in-acdd9bd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpextended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8325-cwe-79-improper-neutralization-of-in-7583c41d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8325%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blockspare%20Blockspare%3A%20Gutenberg%20Blocks%20%26%20Patterns%20for%20Blogs%2C%20Magazines%2C%20Business%20Sites%20%E2%80%93%20Post%20Grids%2C%20Sliders%2C%20Carousels%2C%20Counters%2C%20Page%20Builder%20%26%20Starter%20Site%20Imports%2C%20No%20Coding%20Needed&amp;severity=medium&amp;id=699f6c26b7ef31ef0b5607e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7950-cwe-22-improper-limitation-of-a-path-74acb022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7950%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpjobportal%20WP%20Job%20Portal%20%E2%80%93%20A%20Complete%20Recruitment%20System%20for%20Company%20or%20Job%20Board%20website&amp;severity=critical&amp;id=699f6c20b7ef31ef0b5603f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45692-na-13bf4dbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45692%3A%20n%2Fa&amp;severity=high&amp;id=699f6cefb7ef31ef0b56a589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45177-na-52c1391b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45177%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce8b7ef31ef0b56a1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45174-na-b4c00e17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45174%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce8b7ef31ef0b56a1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45172-na-bbc24c6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45172%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce8b7ef31ef0b56a19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45170-na-3dfec5ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45170%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce8b7ef31ef0b56a190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44859-na-b62ac395</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44859%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b56a001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44821-na-87be81f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44821%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44820-na-eb35703a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44820%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44818-na-22321f43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44818%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44817-na-15eb2cb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44817%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44808-na-d19e5b55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44808%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce4b7ef31ef0b569f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44400-na-417336e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44400%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44383-na-f653af25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44383%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b5699b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42642-na-5d421610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42642%3A%20n%2Fa&amp;severity=medium&amp;id=69838cacf9fa50a62fa093ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-earth-lusca-uses-ktlvdoor-backdoor-for-multi-bdeef520</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Earth%20Lusca%20Uses%20KTLVdoor%20Backdoor%20for%20Multiplatform%20Intrusion&amp;severity=low&amp;id=68359ca25d5f0974d01fcc40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-04-f12bba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-earth-lusca-uses-ktlvdoor-backdoor-for-multiplatform-intrusion-f0e865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Earth%20Lusca%20Uses%20KTLVdoor%20Backdoor%20for%20Multiplatform%20Intrusion&amp;severity=low&amp;id=682acdbebbaf20d303f0e865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45620-buffer-copy-without-checking-size-o-8f742a3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45620%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=low&amp;id=69092b7735043901e828cb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45619-buffer-copy-without-checking-size-o-5056c440</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45619%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=medium&amp;id=69092b7735043901e828cb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45618-use-of-uninitialized-variable-c0afea28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45618%3A%20Use%20of%20Uninitialized%20Variable&amp;severity=low&amp;id=69092b7635043901e828b2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45617-use-of-uninitialized-variable-345f6cfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45617%3A%20Use%20of%20Uninitialized%20Variable&amp;severity=low&amp;id=69092b7635043901e828b29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45616-use-of-uninitialized-variable-ea281d70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45616%3A%20Use%20of%20Uninitialized%20Variable&amp;severity=low&amp;id=69092b7635043901e828b297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45615-use-of-uninitialized-variable-56ff9546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45615%3A%20Use%20of%20Uninitialized%20Variable&amp;severity=low&amp;id=69092b7635043901e828b292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4629-improper-enforcement-of-a-single-uni-8fd0fe2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4629%3A%20Improper%20Enforcement%20of%20a%20Single%2C%20Unique%20Action&amp;severity=medium&amp;id=692013a1ce2640f942c6ad51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4259-cwe-862-missing-authorization-in-sam-2cf0e193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4259%3A%20CWE-862%20Missing%20Authorization%20in%20SAMPA%C5%9E%20Holding%20AKOS%20(AkosCepVatandasService)&amp;severity=medium&amp;id=68ee47d1509368ccaa6fd05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8384-garbage-collection-could-mis-color-c-5949b862</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8384%3A%20Garbage%20collection%20could%20mis-color%20cross-compartment%20objects%20in%20OOM%20conditions%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=690a2e00f0ba78a050538d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8383-firefox-did-not-ask-before-openings--d509cfa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8383%3A%20Firefox%20did%20not%20ask%20before%20openings%20news%3A%20links%20in%20an%20external%20application%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=690a2e00f0ba78a050538d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8382-internal-event-interfaces-were-expos-ee4a93f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8382%3A%20Internal%20event%20interfaces%20were%20exposed%20to%20web%20content%20when%20browser%20EventHandler%20listener%20callbacks%20ran%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=690a2e00f0ba78a050538d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8381-type-confusion-when-looking-up-a-pro-849372de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8381%3A%20Type%20confusion%20when%20looking%20up%20a%20property%20name%20in%20a%20%22with%22%20block%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=690a2e00f0ba78a050538d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6232-cwe-1333-inefficient-regular-express-9b391296</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6232%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=6909325735043901e830992c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44921-na-428948b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44921%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44920-na-e982dce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44920%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce8b7ef31ef0b56a0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44809-na-1b790c92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44809%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce4b7ef31ef0b569f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42991-na-ad29b66e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42991%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b569655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42902-na-d9264df4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42902%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd0b7ef31ef0b569469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42901-na-e75bda81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42901%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b569465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41436-na-599b2f62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41436%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb8b7ef31ef0b56865c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41435-na-f27cbf65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41435%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb8b7ef31ef0b568658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41434-na-0105e216</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41434%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b568654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41433-na-6f1b1ddf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41433%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b5685e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38456-na-4ff27a3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38456%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34463-na-5de936db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34463%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-03-f1316b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f1316b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44947-vulnerability-in-linux-linux-be0cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5148-exposure-of-data-element-to-wrong-se-55a4f197</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5148%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session&amp;severity=high&amp;id=691f6f9228b41f27b4347591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45623-na-ae602f2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45623%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cefb7ef31ef0b56a57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45622-na-678df838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45622%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cefb7ef31ef0b56a578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45528-na-84c5367e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45528%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45527-na-c298f3e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45527%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cefb7ef31ef0b56a56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-02-f12a21</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5053-cwe-285-improper-authorization-in-te-ee61de88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5053%3A%20CWE-285%20Improper%20Authorization%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45522-na-440de438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45522%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cefb7ef31ef0b56a4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45509-na-e67e4a51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45509%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45508-na-14de7986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45508%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-09-01-f13079</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-09-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f13079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44946-vulnerability-in-linux-linux-be0cfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7717-cwe-89-improper-neutralization-of-sp-13c1228f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7717%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thimpress%20WP%20Events%20Manager&amp;severity=high&amp;id=699f6c1db7ef31ef0b5601b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8108-cwe-79-improper-neutralization-of-in-b52c4939</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8108%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mihail-barinov%20Share%20This%20Image&amp;severity=medium&amp;id=699f6c22b7ef31ef0b56056c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8276-cwe-79-improper-neutralization-of-in-43ab9f61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8276%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20WPZOOM%20Portfolio%20Lite%20%E2%80%93%20Filterable%20Portfolio%20Plugin&amp;severity=medium&amp;id=699f6c24b7ef31ef0b56071c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44945-vulnerability-in-linux-linux-be0cf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3886-cwe-79-improper-neutralization-of-in-9063ec0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5212-cwe-79-improper-neutralization-of-in-1bc21ef6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7435-cwe-502-deserialization-of-untrusted-0cad208c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7435%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shafayat-alam%20Attire&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-31-ea529a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-31&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea529a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-31-f12e8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8285-improper-validation-of-certificate-w-68dd4d87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8285%3A%20Improper%20Validation%20of%20Certificate%20with%20Host%20Mismatch&amp;severity=medium&amp;id=68e85c74ba0e608b4fb2ea22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8235-null-pointer-dereference-b40d62</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8235%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=682d46994d7c5ea9f4b40d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48944-vulnerability-in-linux-linux-bdd585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7858-cwe-862-missing-authorization-in-max-5332ee00</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7858%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=699f6c20b7ef31ef0b5603cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8252-cwe-98-improper-control-of-filename--e834031c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8252%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20hornero%20Clean%20Login&amp;severity=high&amp;id=699f6c24b7ef31ef0b560673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8274-cwe-79-improper-neutralization-of-in-fcd9202f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8274%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=medium&amp;id=699f6c24b7ef31ef0b560711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7122-cwe-79-improper-neutralization-of-in-aa1f7d91</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44944-vulnerability-in-linux-linux-bdcd78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8319-cwe-352-cross-site-request-forgery-c-092c3470</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8319%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themefic%20Tourfic%20%E2%80%93%20Ultimate%20Hotel%20Booking%2C%20Travel%20Booking%20%26%20Apartment%20Booking%20WordPress%20Plugin%20%7C%20WooCommerce%20Booking&amp;severity=medium&amp;id=699f6c26b7ef31ef0b5607d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8016-cwe-502-deserialization-of-untrusted-de152c65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8016%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20theeventscalendar%20The%20Events%20Calendar%20Pro&amp;severity=critical&amp;id=699f6c20b7ef31ef0b560403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5879-cwe-79-improper-neutralization-of-in-81a82d05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hubspotdev%20HubSpot%20%E2%80%93%20CRM%2C%20Email%20Marketing%2C%20Live%20Chat%2C%20Forms%20%26%20Analytics&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2694-cwe-502-deserialization-of-untrusted-069cbd7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2694%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20MuffinGroup%20Betheme&amp;severity=high&amp;id=699f6db4b7ef31ef0b58b14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3998-cwe-79-improper-neutralization-of-in-6f23c8df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3998%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20MuffinGroup%20Betheme&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b567165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4401-cwe-79-improper-neutralization-of-in-a87e16b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b5567f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5784-cwe-862-missing-authorization-in-the-8b64979b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5784%3A%20CWE-862%20Missing%20Authorization%20in%20themium%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=699f6bf1b7ef31ef0b55cdb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5061-cwe-79-improper-neutralization-of-in-647488e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5061%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kriesi%20Enfold%20-%20Responsive%20Multi-Purpose%20Theme&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44918-na-2f2af89b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44918%3A%20n%2Fa&amp;severity=low&amp;id=699f6ce8b7ef31ef0b56a0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44916-na-e5f114e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44916%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce6b7ef31ef0b56a069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45492-na-13c4417d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45492%3A%20n%2Fa&amp;severity=high&amp;id=690a2dfef0ba78a050538c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45491-na-68066b11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45491%3A%20n%2Fa&amp;severity=high&amp;id=690a2dfef0ba78a050538c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45490-na-6d028520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45490%3A%20n%2Fa&amp;severity=critical&amp;id=69092b7635043901e828b288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vt-collection-flubot-via-stix-21-bundle-bundle-931-a9ddcba7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VT%20collection%20-%20flubot%20via%20STIX%202.1%20Bundle%20(bundle--931832a0-f7dc-4088-b0d0-9808ad05d585)%20and%20converted%20with%20the%20MISP-STIX%20import%20feature.&amp;severity=low&amp;id=68367c0c182aa0cae2312175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flubot-distribution-vectors-threat-network-infrastructure-775dff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FluBot%20-%20Distribution%20vectors%20%26%20Threat%20network%20infrastructure&amp;severity=low&amp;id=682c7ad8e3e6de8ceb775dff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-30-f12aa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flubot-distribution-vectors-threat-network-infrastructure-f0c2fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FluBot%20-%20Distribution%20vectors%20%26%20Threat%20network%20infrastructure&amp;severity=low&amp;id=682acdbebbaf20d303f0c2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vt-collection-flubot-via-stix-2-1-bundle-bundle-931832a0-f7dc-4088-b0d0-9808ad05d585-and-converted-with-the-misp-stix-import-feature-f0c2fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VT%20collection%20-%20flubot%20via%20STIX%202.1%20Bundle%20(bundle--931832a0-f7dc-4088-b0d0-9808ad05d585)%20and%20converted%20with%20the%20MISP-STIX%20import%20feature.&amp;severity=low&amp;id=682acdbebbaf20d303f0c2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-aa24-242a-stopransomware-ransomhub-ransomware-f0c2f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20-%20AA24-242A%20%23StopRansomware%3A%20RansomHub%20Ransomware&amp;severity=medium&amp;id=682acdbebbaf20d303f0c2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1545-cwe-1256-improper-restriction-of-sof-744223c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1545%3A%20CWE-1256%3A%20Improper%20Restriction%20of%20Software%20Interfaces%20to%20Hardware%20Features%20in%20WolfSSL%20wolfCrypt&amp;severity=medium&amp;id=697936c84623b1157c4a64f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6670-cwe-89-improper-neutralization-of-sp-1a8ea218</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6670%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Progress%20Software%20Corporation%20WhatsUp%20Gold&amp;severity=critical&amp;id=68f7d9b7247d717aace26c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43953-improper-neutralization-of-input-du-1a3ec60a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43953%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webcodingplace%20Classic%20Addons%20%E2%80%93%20WPBakery%20Page%20Builder&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43944-authentication-bypass-by-spoofing-i-50dc2332</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43944%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20ilyasine%20Maintenance%20%26%20Coming%20Soon%20Redirect%20Animation&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39622-improper-neutralization-of-special--2bf99a60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39622%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39620-improper-neutralization-of-special--a64a93bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39620%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def711d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38795-improper-neutralization-of-special--5db4416b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38795%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1056-cwe-79-improper-neutralization-of-in-f44fdb12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1056%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FunnelKit%20FunnelKit%20Funnel%20Builder%20Pro&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3679-cwe-200-information-exposure-in-cali-643f883d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3679%3A%20CWE-200%20Information%20Exposure%20in%20calinvingan%20Premium%20SEO%20Pack%20%E2%80%93%20WP%20SEO%20Plugin&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1384-cwe-79-improper-neutralization-of-in-890200e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Premium%20Portfolio%20Features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2541-cwe-200-information-exposure-in-popu-07d54f0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2541%3A%20CWE-200%20Information%20Exposure%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7895-cwe-79-improper-neutralization-of-in-3d7e45ba</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6c20b7ef31ef0b5603e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6551-cwe-200-information-exposure-in-webd-585f6311</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6551%3A%20CWE-200%20Information%20Exposure%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4442-vulnerability-in-linux-linux-bea811</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4442%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9836c4522896dcbea811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4428-cwe-306-missing-authentication-for-c-a7ada635</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4428%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Menulux%20Information%20Technologies%20Managment%20Portal&amp;severity=medium&amp;id=68ee4b3a509368ccaa76d78b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7607-cwe-89-improper-neutralization-of-sp-b11a81a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7607%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rustaurius%20Front%20End%20Users&amp;severity=high&amp;id=699f6c1cb7ef31ef0b560009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5987-cwe-862-missing-authorization-in-vol-dbb80253</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5987%3A%20CWE-862%20Missing%20Authorization%20in%20vol4ikman%20WP%20Accessibility%20Helper%20(WAH)&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3944-cwe-79-improper-neutralization-of-in-a03467e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3944%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delower186%20WP%20To%20Do&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b56702b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7606-cwe-79-improper-neutralization-of-in-f0680b1a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7606%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rustaurius%20Front%20End%20Users&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b560002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7418-cwe-200-information-exposure-in-tech-37ed5257</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7418%3A%20CWE-200%20Information%20Exposure%20in%20techlabpro1%20The%20Post%20Grid%20%E2%80%93%20Shortcode%2C%20Gutenberg%20Blocks%20and%20Elementor%20Addon%20for%20Post%20Grid&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7856-cwe-862-missing-authorization-in-son-a8c8eb33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7856%3A%20CWE-862%20Missing%20Authorization%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=critical&amp;id=699f6c20b7ef31ef0b560359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5857-cwe-862-missing-authorization-in-fun-443781b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5857%3A%20CWE-862%20Missing%20Authorization%20in%20funnelforms%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor%20%E2%80%93%20Funnelforms%20Free&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7857-cwe-89-improper-neutralization-of-sp-099a9100</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7857%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=critical&amp;id=699f6c20b7ef31ef0b56035f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45436-na-be4f9204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45436%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45435-na-1042c516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45435%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cedb7ef31ef0b56a427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44919-na-9b8da507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44919%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce8b7ef31ef0b56a0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44779-na-b25ffa3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44779%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44778-na-e021dadb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44778%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44777-na-e8a054bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44777%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41372-na-23c0a619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41372%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b5685cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41371-na-09117047</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41371%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41370-na-1d0af5c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41370%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b568583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41369-na-823a9cf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41369%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b568580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41368-na-c8781ae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41368%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b56857d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41367-na-a5dcf4f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41367%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b56857a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41366-na-18d7ce00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41366%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b568577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41364-na-c2d209bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41364%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b568574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41361-na-20b0fcd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41361%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb7b7ef31ef0b568571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41351-na-fbac8ed5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41351%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb5b7ef31ef0b5683e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41350-na-3a0aca7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41350%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb5b7ef31ef0b5683e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41349-na-88cf3275</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41349%3A%20n%2Fa&amp;severity=medium&amp;id=697790e84623b1157ca22c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41358-na-ee677164</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41358%3A%20n%2Fa&amp;severity=medium&amp;id=697790e84623b1157ca22c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41348-na-80bd64d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41348%3A%20n%2Fa&amp;severity=medium&amp;id=697789dd4623b1157c9f2bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41347-na-561ebd85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41347%3A%20n%2Fa&amp;severity=medium&amp;id=697789dd4623b1157c9f2bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41346-na-6115cac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41346%3A%20n%2Fa&amp;severity=medium&amp;id=697789dd4623b1157c9f2bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41345-na-68b00736</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41345%3A%20n%2Fa&amp;severity=medium&amp;id=697786594623b1157c9dc5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45440-n-a-in-drupal-drupal-core-bf7d61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45440%3A%20n%2Fa%20in%20Drupal%20Drupal%20core&amp;severity=medium&amp;id=682d984bc4522896dcbf7d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-29-f12b7a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8250-cwe-825-expired-pointer-dereference--3f5ac228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8250%3A%20CWE-825%3A%20Expired%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=6909325935043901e8309986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8195-cwe-862-missing-authorization-in-mbi-70660d10</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8195%3A%20CWE-862%20Missing%20Authorization%20in%20mbis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=699f6c22b7ef31ef0b560597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7447-cwe-862-missing-authorization-in-fun-761d12b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7447%3A%20CWE-862%20Missing%20Authorization%20in%20funnelforms%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor%20%E2%80%93%20Funnelforms%20Free&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fdb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44943-vulnerability-in-linux-linux-be0cea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6311-cwe-434-unrestricted-upload-of-file--0643ef7b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6311%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20funnelforms%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor%20%E2%80%93%20Funnelforms%20Free&amp;severity=high&amp;id=699f6c00b7ef31ef0b55ed63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6312-cwe-22-improper-limitation-of-a-path-120839bf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6312%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20funnelforms%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor%20%E2%80%93%20Funnelforms%20Free&amp;severity=medium&amp;id=699f6c00b7ef31ef0b55ed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4554-cwe-79-improper-neutralization-of-in-89427aab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20OpenText%20Access%20Manager&amp;severity=high&amp;id=68e3c79efee0e782790922df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4555-cwe-266-incorrect-privilege-assignme-0a2bc8db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4555%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20OpenText%20NetIQ%20Access%20Manager&amp;severity=high&amp;id=68e3c79efee0e782790922e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6448-cwe-200-information-exposure-in-moll-73f5d056</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6448%3A%20CWE-200%20Information%20Exposure%20in%20mollieintegration%20Mollie%20Payments%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c03b7ef31ef0b55ef63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8030-cwe-502-deserialization-of-untrusted-289b07a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8030%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons%2C%20Woocommerce%20Builder%2C%20EDD%20Builder%2C%20Elementor%20Store%20Builder%2C%20Product%20Grid%2C%20Product%20Table%2C%20Woocommerce%20Slider&amp;severity=critical&amp;id=699f6c22b7ef31ef0b560492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7573-cwe-88-argument-injection-or-modific-d42c7619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7573%3A%20CWE-88%20Argument%20Injection%20or%20Modification%20in%20msaari%20Relevanssi%20Live%20Ajax%20Search&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55ff52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45233-na-0f7447c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45233%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45232-na-b63ab8cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45232%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44915-na-4b3d2fc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44915%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce6b7ef31ef0b56a066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44914-na-6b32ca5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44914%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce6b7ef31ef0b56a063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44913-na-51987972</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44913%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce6b7ef31ef0b56a060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44761-na-bd1f233d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44761%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce2b7ef31ef0b569e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44760-na-90c59d34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44760%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce2b7ef31ef0b569e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42905-na-3799f3f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42905%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b56946e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42900-na-3be0fe2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42900%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b569461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42793-na-75e26150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42793%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cceb7ef31ef0b569340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41236-na-25593633</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41236%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b56819f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34198-na-cd331811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34198%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4cb7ef31ef0b56217e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34195-na-f2a6b43b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34195%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b56217b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45896-na-7b55ad34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45896%3A%20n%2Fa&amp;severity=high&amp;id=69092635fe7723195e0b61e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-28-f1210a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1210a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8199-cwe-862-missing-authorization-in-smu-8d895c84</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8199%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20Reviews%20Feed%20%E2%80%93%20Add%20Testimonials%20and%20Customer%20Reviews%20From%20Google%20Reviews%2C%20Yelp%2C%20TripAdvisor%2C%20and%20More&amp;severity=medium&amp;id=699f6c22b7ef31ef0b56059c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8200-cwe-352-cross-site-request-forgery-c-bc2b1de7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8200%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smub%20Reviews%20Feed%20%E2%80%93%20Add%20Testimonials%20and%20Customer%20Reviews%20From%20Google%20Reviews%2C%20Yelp%2C%20TripAdvisor%2C%20and%20More&amp;severity=medium&amp;id=699f6c24b7ef31ef0b560654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8207-cwe-114-process-control-in-mongodb-inc-mongodb-server-aeba55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8207%3A%20CWE-114%3A%20Process%20Control%20in%20MongoDB%20Inc%20MongoDB%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aeba55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7791-cwe-79-improper-neutralization-of-in-61e00ae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20140%2B%20Widgets%20%7C%20Xpro%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6c20b7ef31ef0b560332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6789-cwe-22-improper-limitation-of-a-path-ec48122d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6789%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=699c3035be58cf853b75f10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8046-cwe-79-improper-neutralization-of-in-d22f6203</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpwax%20Logo%20Showcase%20Ultimate%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Slider%20%26%20Logo%20Grid&amp;severity=medium&amp;id=699f6c22b7ef31ef0b56049e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7304-cwe-79-improper-neutralization-of-in-0287addf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7304%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Ninja%20Tables%20%E2%80%93%20Easiest%20Data%20Table%20Builder&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55faf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6804-cwe-79-improper-neutralization-of-in-7b0abd2c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6804%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45321-na-b7ea5368</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45321%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cecb7ef31ef0b56a3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45264-na-974bd72f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45264%3A%20n%2Fa&amp;severity=high&amp;id=699f6cecb7ef31ef0b56a3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44342-na-e4fff0ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44342%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b56999f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44341-na-6ade580d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44341%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b56999a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44340-na-bb80fce3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44340%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42851-na-4a0627b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42851%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd0b7ef31ef0b569400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41622-na-fac8558b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41622%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbdb7ef31ef0b56894a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36068-na-29e3c493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36068%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-comment-on-github-pointing-to-malware-2d5f50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20comment%20on%20GitHub%20pointing%20to%20malware&amp;severity=low&amp;id=682c7dc0e8347ec82d2d5f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-27-f1244f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f1244f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43117-cross-site-request-forgery-csrf-in--87e8d830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43117%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Hummingbird&amp;severity=null&amp;id=69cd7469e6bfc5ba1def7184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43299-cross-site-request-forgery-csrf-in--0930cf35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43299%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Softaculous%20SpeedyCache&amp;severity=null&amp;id=69cd746fe6bfc5ba1def788f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43255-improper-neutralization-of-input-du-a2d10c1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43255%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zookatron%20MyBookTable%20Bookstore&amp;severity=null&amp;id=69cd746de6bfc5ba1def7805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43214-missing-authorization-in-saad-iqbal-761fc078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43214%3A%20Missing%20Authorization%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=69cd746be6bfc5ba1def71d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43230-insertion-of-sensitive-information--17002bed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43230%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Anssi%20Laitila%20Shared%20Files&amp;severity=null&amp;id=69cd746be6bfc5ba1def71e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43259-insertion-of-sensitive-information--1b537aa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43259%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20WebFactory%20Order%20Export%20for%20WooCommerce&amp;severity=null&amp;id=69cd746de6bfc5ba1def7808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43264-insertion-of-sensitive-information--4347f21f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43264%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20mischiefmarmot%20Create%20by%20Mediavine&amp;severity=null&amp;id=69cd746de6bfc5ba1def780b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43283-insertion-of-sensitive-information--c7a6d290</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43283%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd746fe6bfc5ba1def7889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8165-path-traversal-in-chengdu-everbrite--6b8ae16d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8165%3A%20Path%20Traversal%20in%20Chengdu%20Everbrite%20Network%20Technology%20BeikeShop&amp;severity=medium&amp;id=6923fb9b011871acbdf22a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8164-unrestricted-upload-in-chengdu-everb-c2057191</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8164%3A%20Unrestricted%20Upload%20in%20Chengdu%20Everbrite%20Network%20Technology%20BeikeShop&amp;severity=medium&amp;id=6923fb9b011871acbdf22a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8163-path-traversal-in-chengdu-everbrite--1078c297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8163%3A%20Path%20Traversal%20in%20Chengdu%20Everbrite%20Network%20Technology%20BeikeShop&amp;severity=medium&amp;id=6923fb9b011871acbdf22a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44942-vulnerability-in-linux-linux-be0ce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44941-vulnerability-in-linux-linux-be0cda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44940-vulnerability-in-linux-linux-be0cd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9826c4522896dcbe0cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44939-vulnerability-in-linux-linux-be0cb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44938-vulnerability-in-linux-linux-aec02f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44937-vulnerability-in-linux-linux-be0ca8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44936-vulnerability-in-linux-linux-be0ca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44935-vulnerability-in-linux-linux-be0ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44934-vulnerability-in-linux-linux-be0c8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44933-vulnerability-in-linux-linux-be0c87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44932-vulnerability-in-linux-linux-be0c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44931-vulnerability-in-linux-linux-be0c77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43914-vulnerability-in-linux-linux-be0c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43913-vulnerability-in-linux-linux-be0c6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43912-vulnerability-in-linux-linux-be0c51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43911-vulnerability-in-linux-linux-aec02d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43910-vulnerability-in-linux-linux-be0c44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43909-vulnerability-in-linux-linux-aec02b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec02b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43908-vulnerability-in-linux-linux-be0c40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43907-vulnerability-in-linux-linux-be0c3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43906-vulnerability-in-linux-linux-be0c38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43905-vulnerability-in-linux-linux-be0c34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43904-vulnerability-in-linux-linux-be0c30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43902-vulnerability-in-linux-linux-be0c2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43901-vulnerability-in-linux-linux-be0c28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43900-vulnerability-in-linux-linux-be0c24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43899-vulnerability-in-linux-linux-be0c0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43897-vulnerability-in-linux-linux-be0c07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43896-vulnerability-in-linux-linux-be0c03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43895-vulnerability-in-linux-linux-aec029</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43895&amp;severity=null&amp;id=682cd0fa1484d88663aec029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43894-vulnerability-in-linux-linux-be0bff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43893-vulnerability-in-linux-linux-be0bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43892-vulnerability-in-linux-linux-bdcd74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43891-vulnerability-in-linux-linux-be0bea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43890-vulnerability-in-linux-linux-be0bd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43889-vulnerability-in-linux-linux-be0bd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43888-vulnerability-in-linux-linux-be0bc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43887-vulnerability-in-linux-linux-be0bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43886-vulnerability-in-linux-linux-be0ba8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43884-vulnerability-in-linux-linux-be0ba4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45265-na-cece14b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45265%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cecb7ef31ef0b56a3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45256-na-02bdc58a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45256%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ceab7ef31ef0b56a348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45241-na-470f2834</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45241%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44797-na-529f7fa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44797%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44796-na-4fd99688</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44796%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce4b7ef31ef0b569ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44795-na-1de59bac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44795%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44794-na-7a1db3af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44794%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44793-na-4ac50140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44793%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce4b7ef31ef0b569e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44565-na-5719d763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44565%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44563-na-30fc8808</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44563%3A%20n%2Fa&amp;severity=high&amp;id=699f6ce0b7ef31ef0b569b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44558-na-5f1b1126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44558%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44557-na-6b6c07f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44557%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44556-na-482e10ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44556%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44555-na-436c866e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44555%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdeb7ef31ef0b569b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44553-na-926c24be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44553%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44550-na-d7b89e91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44550%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdeb7ef31ef0b569b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44549-na-e469f4bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44549%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdeb7ef31ef0b569b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42906-na-aa444c15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42906%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b569472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42818-na-8a6cf288</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42818%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b5693e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42816-na-05b40507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42816%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b5693e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42792-na-e2eec82c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42792%3A%20n%2Fa&amp;severity=low&amp;id=699f6cceb7ef31ef0b56933c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42791-na-27b5c311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42791%3A%20n%2Fa&amp;severity=high&amp;id=699f6cceb7ef31ef0b569338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42790-na-efe24078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42790%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cceb7ef31ef0b569334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42789-na-e320066f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42789%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccdb7ef31ef0b5692de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42788-na-26b67afb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42788%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccdb7ef31ef0b5692da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42787-na-b22c9283</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42787%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccdb7ef31ef0b5692d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41996-na-c16acef1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41996%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41444-na-06396083</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41444%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb8b7ef31ef0b568678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41285-na-c1988067</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41285%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb5b7ef31ef0b568360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34087-na-b254f71a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34087%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4cb7ef31ef0b5620f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39097-na-5dd2f774</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39097%3A%20n%2Fa&amp;severity=medium&amp;id=6903f7a3aebfcd5474a44745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-26-f12707</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45258-na-edd26733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45258%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ceab7ef31ef0b56a34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45244-na-a75c3eb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45244%3A%20n%2Fa&amp;severity=medium&amp;id=68e3d1aafa854abf392e6c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-25-95600b85</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-25&amp;severity=medium&amp;id=68367c9a182aa0cae23254a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7656-cwe-94-improper-control-of-generatio-1148b7c8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7656%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20levantoan%20Image%20Hotspot%20by%20DevVN&amp;severity=high&amp;id=699f6c1db7ef31ef0b5601a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7351-cwe-502-deserialization-of-untrusted-431a21a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7351%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20presstigers%20Simple%20Job%20Board&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6499-cwe-200-information-exposure-in-maxf-2cca25d8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6499%3A%20CWE-200%20Information%20Exposure%20in%20maxfoundry%20WordPress%20Button%20Plugin%20MaxButtons&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55f016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6631-cwe-862-missing-authorization-in-ima-f1ca06ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6631%3A%20CWE-862%20Missing%20Authorization%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2254-cwe-79-improper-neutralization-of-in-52b16207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20risetheme%20RT%20Easy%20Builder%20%E2%80%93%20Advanced%20addons%20for%20Elementor&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8120-cwe-352-cross-site-request-forgery-c-fcf1fdb9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8120%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6c22b7ef31ef0b56057e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7568-cwe-352-cross-site-request-forgery-c-be63c070</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7568%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20brandondove%20Favicon%20Generator%20(CLOSED)&amp;severity=critical&amp;id=699f6c1ab7ef31ef0b55ff4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45240-na-90dd10ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45240%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45239-na-67ed8688</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45239%3A%20n%2Fa&amp;severity=high&amp;id=6909214ffe7723195e054689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45238-na-f4b71cf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45238%3A%20n%2Fa&amp;severity=high&amp;id=6909214ffe7723195e054685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45237-na-2be34760</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45237%3A%20n%2Fa&amp;severity=critical&amp;id=6909214ffe7723195e054681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45236-na-35b4ff7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45236%3A%20n%2Fa&amp;severity=high&amp;id=6909214ffe7723195e05467d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45235-na-6fadc74d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45235%3A%20n%2Fa&amp;severity=high&amp;id=6909214ffe7723195e054679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45234-na-80bf34db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45234%3A%20n%2Fa&amp;severity=high&amp;id=6909214ffe7723195e054675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-24-f12139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38207-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aeb2b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38207%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb2b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43883-vulnerability-in-linux-linux-be0b97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5502-cwe-79-improper-neutralization-of-in-a0aa0960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5502%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6be9b7ef31ef0b55c104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7258-cwe-862-missing-authorization-in-auk-46058855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7258%3A%20CWE-862%20Missing%20Authorization%20in%20aukejomm%20WooCommerce%20Google%20Feed%20Manager&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fadf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7559-cwe-94-improper-control-of-generatio-71c8d310</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7559%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20File%20Manager%20File%20Manager%20Pro&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55fee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43477-cwe-284-improper-access-control-in-microsoft-microsoft-entra-aeb2d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43477%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Entra&amp;severity=high&amp;id=682cd0f81484d88663aeb2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44390-na-10078c48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44390%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44387-na-116b5fec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44387%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cdcb7ef31ef0b569a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44386-na-60e14014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44386%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b569a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44382-na-cb501f1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44382%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b5699ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44381-na-d251716b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44381%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdcb7ef31ef0b5699a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43032-na-9b3f627f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43032%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b5696ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43031-na-896d5d0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43031%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b5696c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42992-154af582</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42992&amp;severity=null&amp;id=699f6cd4b7ef31ef0b569658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42915-na-723fc76d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42915%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd0b7ef31ef0b56947a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42914-na-bf0839fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42914%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b569476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42852-na-a8083867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42852%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b569457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42766-na-cb7500a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42766%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccbb7ef31ef0b5691b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42765-na-f079adbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42765%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccbb7ef31ef0b5691b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42764-na-8b7ddf8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42764%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccbb7ef31ef0b5691af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42756-na-2ef62cbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42756%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccab7ef31ef0b569138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42636-na-a38d21c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42636%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc8b7ef31ef0b569024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42531-na-371addd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42531%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc1b7ef31ef0b568d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42523-na-8a4e4123</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42523%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc1b7ef31ef0b568d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42040-na-78e2fd3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42040%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40111-na-1489836a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40111%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39841-na-87fa64f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39841%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33854-na-72b39723</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33854%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c47b7ef31ef0b561da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33853-na-1d31b94c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33853%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c47b7ef31ef0b561da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33852-na-be948adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33852%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c47b7ef31ef0b561d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32501-na-7c652faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32501%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c37b7ef31ef0b56140e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42845-na-3a347003</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42845%3A%20n%2Fa&amp;severity=high&amp;id=698f5d11c9e1ff5ad84e392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-23-f12171</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ngate-android-malware-relays-nfc-traffic-to-steal-cash-f0c2f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20NGate%20Android%20malware%20relays%20NFC%20traffic%20to%20steal%20cash&amp;severity=low&amp;id=682acdbebbaf20d303f0c2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-booking-com-website-lookyloo-capture-https-booking-0ef4-8213-ae7f-3fec3e22-1facc-pw-stays-superb-apartment-to-rent-in-central-nijmegen-sid-9648547963-id-376818034-awg-dvm-fcgjghuw8y-f0c2f3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20booking.com%20website%20-%20Lookyloo%20Capture%20(https%3A%2F%2Fbooking-0ef4-8213-ae7f-3fec3e22.1facc.pw%2F%3Fstays%3Dsuperb-apartment-to-rent-in-central-nijmegen%26sid%3D9648547963%26id%3D376818034%26awg_dvm%3DFCgjGHuw8y)&amp;severity=low&amp;id=682acdbebbaf20d303f0c2f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-booking-com-service-website-gathering-pii-including-passport-f0c2f1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20booking.com%20service%20website%20gathering%20PII%20including%20passport&amp;severity=low&amp;id=682acdbebbaf20d303f0c2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38210-cwe-125-out-of-bounds-read-in-microsoft-microsoft-edge-chromium-based-aeb2bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38210%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f81484d88663aeb2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38208-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-edge-for-android-aeb2b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38208%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=682cd0f81484d88663aeb2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38209-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aeb2ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38209%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f81484d88663aeb2ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39717-vulnerability-in-versa-director-51ae97b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39717%3A%20Vulnerability%20in%20Versa%20Director&amp;severity=medium&amp;id=68f7d9b3247d717aace26a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8088-cwe-835-loop-with-unreachable-exit-c-b484fba7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8088%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=68e55c41a677756fc99bb4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43398-cwe-776-improper-restriction-of-rec-4ac84552</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43398%3A%20CWE-776%3A%20Improper%20Restriction%20of%20Recursive%20Entity%20References%20in%20DTDs%20(&apos;XML%20Entity%20Expansion&apos;)%20in%20ruby%20rexml&amp;severity=medium&amp;id=6909214efe7723195e05459b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39745-cwe-327-use-of-a-broken-or-risky-cr-590d7a42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39745%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Sterling%20Connect%3ADirect%20Web%20Services&amp;severity=medium&amp;id=69b5ad022f860ef9432515cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7848-cwe-639-authorization-bypass-through-f6239eb4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7848%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20deepakkite%20User%20Private%20Files%20%E2%80%93%20WordPress%20File%20Sharing%20Plugin&amp;severity=medium&amp;id=699f6c20b7ef31ef0b560346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39744-cwe-352-cross-site-request-forgery--02009601</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39744%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Sterling%20Connect%3ADirect%20Web%20Services&amp;severity=medium&amp;id=69b5ad022f860ef9432515c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39746-cwe-319-cleartext-transmission-of-s-b4bdde36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39746%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Sterling%20Connect%3ADirect%20Web%20Services&amp;severity=medium&amp;id=68e0f3c4b66c7f7acdd3ea21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6870-cwe-79-improper-neutralization-of-in-fa6292e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dfactory%20Responsive%20Lightbox%20%26%20Gallery&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7778-cwe-79-improper-neutralization-of-in-92e5fbc4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7778%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6c1eb7ef31ef0b56025b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48941-vulnerability-in-linux-linux-bdd574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48940-vulnerability-in-linux-linux-be6686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48939-vulnerability-in-linux-linux-be667e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48938-vulnerability-in-linux-linux-be667a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48937-vulnerability-in-linux-linux-be6676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48935-vulnerability-in-linux-linux-be6672</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48934-vulnerability-in-linux-linux-be6661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48933-vulnerability-in-linux-linux-be665b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe665b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48932-vulnerability-in-linux-linux-be6655</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48931-vulnerability-in-linux-linux-be662b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe662b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48930-vulnerability-in-linux-linux-be6627</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48929-vulnerability-in-linux-linux-be6623</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48928-vulnerability-in-linux-linux-be6614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48927-vulnerability-in-linux-linux-be660c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe660c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48926-vulnerability-in-linux-linux-be6604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48943-vulnerability-in-linux-linux-be669f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe669f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48942-vulnerability-in-linux-linux-be668e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5583-cwe-79-improper-neutralization-of-in-df3cdbf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5583%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6becb7ef31ef0b55c2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7836-cwe-863-incorrect-authorization-in-t-6cda76c6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7836%3A%20CWE-863%20Incorrect%20Authorization%20in%20themifyme%20Themify%20Builder&amp;severity=medium&amp;id=699f6c20b7ef31ef0b560342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7384-cwe-434-unrestricted-upload-of-file--064de217</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7384%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20acyba%20AcyMailing%20%E2%80%93%20An%20Ultimate%20Newsletter%20Plugin%20and%20Marketing%20Automation%20Solution%20for%20WordPress&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48925-vulnerability-in-linux-linux-be65fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe65fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48924-vulnerability-in-linux-linux-be65f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe65f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48923-vulnerability-in-linux-linux-aebf7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48922-vulnerability-in-linux-linux-be65ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe65ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48921-vulnerability-in-linux-linux-bdd56c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48920-vulnerability-in-linux-linux-be65e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe65e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48919-vulnerability-in-linux-linux-be65bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe65bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48918-vulnerability-in-linux-linux-be65b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe65b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48917-bd7199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48917&amp;severity=low&amp;id=682d9817c4522896dcbd7199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48916-vulnerability-in-linux-linux-bdd55d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd55d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48915-vulnerability-in-linux-linux-be65b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe65b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48914-vulnerability-in-linux-linux-be65af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe65af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48913-vulnerability-in-linux-linux-be65ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe65ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48912-vulnerability-in-linux-linux-be65a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe65a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48911-vulnerability-in-linux-linux-be65a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe65a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48910-vulnerability-in-linux-linux-be659f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe659f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48909-vulnerability-in-linux-linux-be659b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe659b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48908-vulnerability-in-linux-linux-be6597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48907-vulnerability-in-linux-linux-be6577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48906-vulnerability-in-linux-linux-bdd555</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48905-vulnerability-in-linux-linux-be6573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48904-vulnerability-in-linux-linux-be656f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe656f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48903-vulnerability-in-linux-linux-be655e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe655e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48902-vulnerability-in-linux-linux-be6556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48901-vulnerability-in-linux-linux-be654e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe654e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4441-vulnerability-in-linux-linux-bea800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4441%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42056-na-3d926572</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42056%3A%20n%2Fa&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45201-na-19a8c567</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45201%3A%20n%2Fa&amp;severity=high&amp;id=699f6ceab7ef31ef0b56a332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45193-na-266048cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45193%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45192-na-ea40e738</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45192%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45191-na-f967968e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45191%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ceab7ef31ef0b56a2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45169-na-0263e0e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45169%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45168-na-66d8cf3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45168%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45167-na-8085b9b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45167%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45166-na-277deec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45166%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45165-na-b14752b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45165%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ce8b7ef31ef0b56a107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45163-na-39a89614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45163%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ce8b7ef31ef0b56a0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43033-na-1e50a3f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43033%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd6b7ef31ef0b5696cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42776-na-81b951a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42776%3A%20n%2Fa&amp;severity=high&amp;id=699f6cccb7ef31ef0b569231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42775-na-229b8c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42775%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cccb7ef31ef0b56922d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42774-na-b4e7e409</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42774%3A%20n%2Fa&amp;severity=high&amp;id=699f6cccb7ef31ef0b569229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42773-na-1ef52e0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42773%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cccb7ef31ef0b569225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42772-na-1a58d96f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42772%3A%20n%2Fa&amp;severity=high&amp;id=699f6cccb7ef31ef0b569221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42771-na-d88ef455</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42771%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cccb7ef31ef0b56921d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42770-na-e2f70b1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42770%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cccb7ef31ef0b569219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42769-na-5636d974</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42769%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cccb7ef31ef0b569215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42768-na-ba9adcf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42768%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccbb7ef31ef0b5691bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42767-na-f3d2c9ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42767%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccbb7ef31ef0b5691bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42763-na-479c946d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42763%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccbb7ef31ef0b5691ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42762-na-89b2da70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42762%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccbb7ef31ef0b5691a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42761-na-4afdec0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42761%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccbb7ef31ef0b5691a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42599-na-5dd0241c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42599%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36445-na-df433bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36445%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5db7ef31ef0b5635bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36444-na-c72599a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36444%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5635ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36443-na-12324ae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36443%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5635b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36442-na-6eb46d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36442%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5635b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36441-na-3664155b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36441%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5db7ef31ef0b5635ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36440-na-8ff2dd7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36440%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5db7ef31ef0b5635a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36439-na-1c95e631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36439%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5db7ef31ef0b56359f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-22-f12227</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28987-cwe-798-use-of-hard-coded-credentia-9864e418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28987%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=68f7d9b2247d717aace269e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7971-type-confusion-in-google-chrome-54bf830a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7971%3A%20Type%20confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9b7247d717aace26c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7965-inappropriate-implementation-in-goog-08655094</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7965%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9b7247d717aace26c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5930-cwe-732-incorrect-permission-assignm-ead9a8bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5930%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=699f6bf6b7ef31ef0b55d193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5929-cwe-427-uncontrolled-search-path-ele-73403fb4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5929%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=699f6bf6b7ef31ef0b55d18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5928-cwe-59-improper-link-resolution-befo-13347aaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5928%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20VIPRE%20Advanced%20Security&amp;severity=high&amp;id=699f6bf6b7ef31ef0b55d18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7448-cwe-78-improper-neutralization-of-sp-6b0735a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7448%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Magnet%20Forensics%20AXIOM&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6814-cwe-89-improper-neutralization-of-sp-f2788b8b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6814%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NETGEAR%20ProSAFE%20Network%20Management%20System&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6813-cwe-89-improper-neutralization-of-sp-fe16f595</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6813%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20NETGEAR%20ProSAFE%20Network%20Management%20System&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7604-cwe-863-incorrect-authorization-in-l-aa1c81ae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7604%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55ff75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7603-cwe-22-improper-limitation-of-a-path-56458904</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7603%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55ff71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7602-cwe-22-improper-limitation-of-a-path-19c34f08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7602%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55ff6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7601-cwe-22-improper-limitation-of-a-path-8f659541</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7601%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55ff69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7600-cwe-22-improper-limitation-of-a-path-da0abbeb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7600%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55ff65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7725-cwe-416-use-after-free-in-foxit-pdf--f93876c5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7725%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6c1db7ef31ef0b5601ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7724-cwe-416-use-after-free-in-foxit-pdf--73c7b95c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7724%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6c1db7ef31ef0b5601ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7723-cwe-416-use-after-free-in-foxit-pdf--eca5bbc0</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7723%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6c1db7ef31ef0b5601c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7722-cwe-416-use-after-free-in-foxit-pdf--6678e7aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7722%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6c1db7ef31ef0b5601c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7795-cwe-121-stack-based-buffer-overflow--6e61829d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7795%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Autel%20MaxiCharger%20AC%20Elite%20Business%20C50&amp;severity=high&amp;id=699f6c20b7ef31ef0b560339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7885-concurrent-execution-using-shared-re-6417c80d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7885%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=high&amp;id=68faafd950358b89bd7bfd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8007-improper-certificate-validation-3a658c99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8007%3A%20Improper%20Certificate%20Validation&amp;severity=high&amp;id=691f82024f1c50aa2eb5aea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5335-cwe-502-deserialization-of-untrusted-a54b8b03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5335%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20bdthemes%20Ultimate%20Store%20Kit%20Elementor%20Addons%2C%20Woocommerce%20Builder%2C%20EDD%20Builder%2C%20Elementor%20Store%20Builder%2C%20Product%20Grid%2C%20Product%20Table%2C%20Woocommerce%20Slider&amp;severity=critical&amp;id=699f6be5b7ef31ef0b55be34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6339-cwe-79-improper-neutralization-of-in-42dc5236</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6339%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Phlox%20PRO&amp;severity=medium&amp;id=699f6c01b7ef31ef0b55ee16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52914-vulnerability-in-linux-linux-be78d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe78d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52913-vulnerability-in-linux-linux-be78cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe78cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52912-vulnerability-in-linux-linux-aebfb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52911-vulnerability-in-linux-linux-bdd89c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52910-vulnerability-in-linux-linux-be78c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe78c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52909-vulnerability-in-linux-linux-be78c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe78c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52908-vulnerability-in-linux-linux-bdd881</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52907-vulnerability-in-linux-linux-be78b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe78b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52906-vulnerability-in-linux-linux-be78a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe78a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52905-vulnerability-in-linux-linux-be78a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe78a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52904-vulnerability-in-linux-linux-be78a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe78a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52903-vulnerability-in-linux-linux-be7891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52902-vulnerability-in-linux-linux-be7889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52901-vulnerability-in-linux-linux-be786c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe786c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52900-vulnerability-in-linux-linux-be785f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe785f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52899-vulnerability-in-linux-linux-aebfb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52898-vulnerability-in-linux-linux-aebfb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52897-vulnerability-in-linux-linux-be785b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe785b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52896-vulnerability-in-linux-linux-bdd87d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52895-vulnerability-in-linux-linux-be7857</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52894-vulnerability-in-linux-linux-be7853</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52893-vulnerability-in-linux-linux-be784f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe784f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48899-vulnerability-in-linux-linux-be6546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48898-vulnerability-in-linux-linux-be6542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48897-vulnerability-in-linux-linux-be653e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48896-vulnerability-in-linux-linux-be652d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe652d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48895-vulnerability-in-linux-linux-be6514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48894-vulnerability-in-linux-linux-be6510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48893-vulnerability-in-linux-linux-be650c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe650c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48892-vulnerability-in-linux-linux-be64fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe64fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48891-vulnerability-in-linux-linux-be64f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48890-vulnerability-in-linux-linux-be64ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe64ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48889-vulnerability-in-linux-linux-be64e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982fc4522896dcbe64e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48888-vulnerability-in-linux-linux-be64e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48887-vulnerability-in-linux-linux-be64d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48886-vulnerability-in-linux-linux-be64cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48885-vulnerability-in-linux-linux-be64b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48884-vulnerability-in-linux-linux-be64ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe64ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48883-vulnerability-in-linux-linux-be64a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe64a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48882-vulnerability-in-linux-linux-be64a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48881-vulnerability-in-linux-linux-be64a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe64a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48880-vulnerability-in-linux-linux-be6494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48879-vulnerability-in-linux-linux-bdd54d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48878-vulnerability-in-linux-linux-be6490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48877-vulnerability-in-linux-linux-be6481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48876-vulnerability-in-linux-linux-be6479</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48875-vulnerability-in-linux-linux-be6471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48874-vulnerability-in-linux-linux-be6456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48873-vulnerability-in-linux-linux-bdd538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48872-vulnerability-in-linux-linux-be6452</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48871-vulnerability-in-linux-linux-be644e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe644e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48870-vulnerability-in-linux-linux-be644a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe644a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48869-vulnerability-in-linux-linux-be6446</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48868-vulnerability-in-linux-linux-be6442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48867-vulnerability-in-linux-linux-be6435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6508-insufficient-entropy-fc78d796</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6508%3A%20Insufficient%20Entropy&amp;severity=high&amp;id=69135a44b36faa5b6c0e5ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6568-cwe-200-information-exposure-in-flam-54442585</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6568%3A%20CWE-200%20Information%20Exposure%20in%20flamix%20Flamix%3A%20Bitrix24%20and%20Contact%20Form%207%20integrations&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7629-cwe-80-improper-neutralization-of-sc-ee9b1ef6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7629%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20marla14%20Responsive%20Video&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7651-cwe-89-improper-neutralization-of-sp-b7dadde4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7651%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20appcheap%20App%20Builder%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Flight&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7090-cwe-79-improper-neutralization-of-in-6f3ba3d4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shawfactor%20LH%20Add%20Media%20From%20Url&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7647-cwe-352-cross-site-request-forgery-c-7956557a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7647%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20otasync%20OTA%20Sync%20Booking%20Engine%20Widget&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7032-cwe-862-missing-authorization-in-elb-0ed7b60f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7032%3A%20CWE-862%20Missing%20Authorization%20in%20elbanyaoui%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7030-cwe-862-missing-authorization-in-elb-a800ec8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7030%3A%20CWE-862%20Missing%20Authorization%20in%20elbanyaoui%20Smart%20Online%20Order%20for%20Clover&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6883-cwe-862-missing-authorization-in-set-2b37f0a0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6883%3A%20CWE-862%20Missing%20Authorization%20in%20sethshoultes%20Event%20Espresso%20%E2%80%93%20Event%20Registration%20%26%20Ticketing%20Sales&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7390-cwe-862-missing-authorization-in-sta-21a297c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7390%3A%20CWE-862%20Missing%20Authorization%20in%20starkinfo%20WP%20Testimonial%20Widget&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6767-cwe-79-improper-neutralization-of-in-97a7414b</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sersis%20WordSurvey&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7134-cwe-79-improper-neutralization-of-in-55b9fbed</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7134%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20liquidpoll%20LiquidPoll%20%E2%80%93%20Polls%2C%20Surveys%2C%20NPS%20and%20Feedback%20Reviews&amp;severity=high&amp;id=699f6c0fb7ef31ef0b55f85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5880-cwe-200-information-exposure-in-clev-85b27825</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5880%3A%20CWE-200%20Information%20Exposure%20in%20clevelandwebdeveloper%20Hide%20My%20Site&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7854-cwe-89-improper-neutralization-of-sp-955cc814</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7854%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20sjhoo%20Woo%20Inquiry&amp;severity=critical&amp;id=699f6c20b7ef31ef0b560350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43882-vulnerability-in-linux-linux-be0b93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43881-vulnerability-in-linux-linux-be0b82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43880-vulnerability-in-linux-linux-be0b7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43879-vulnerability-in-linux-linux-be0b72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43878-vulnerability-in-linux-linux-be0b6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43877-vulnerability-in-linux-linux-be0b64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43876-vulnerability-in-linux-linux-be0b60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43875-vulnerability-in-linux-linux-be0b42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43874-vulnerability-in-linux-linux-be0b3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43873-vulnerability-in-linux-linux-be0b3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43872-vulnerability-in-linux-linux-be0b36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43871-vulnerability-in-linux-linux-be0b32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43870-vulnerability-in-linux-linux-bdcd70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43869-vulnerability-in-linux-linux-bdcd6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43027-na-6eb43e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43027%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd6b7ef31ef0b5696c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43022-na-dd415776</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43022%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd6b7ef31ef0b5696c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42939-na-361bdc1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42939%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42786-na-b921434e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42786%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccdb7ef31ef0b5692d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42785-na-98237f1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42785%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccdb7ef31ef0b5692ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42784-na-2a17b2b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42784%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccdb7ef31ef0b5692ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42783-na-e4096a98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42783%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccdb7ef31ef0b5692c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42782-na-cc1d2adf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42782%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccdb7ef31ef0b5692c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42781-na-5c8b8b59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42781%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccdb7ef31ef0b5692be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42780-na-7569c62e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42780%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccdb7ef31ef0b5692ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42779-na-713c938c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42779%3A%20n%2Fa&amp;severity=high&amp;id=699f6cccb7ef31ef0b569239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42777-na-3e91b4ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42777%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cccb7ef31ef0b569235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42550-na-2b5797d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42550%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc1b7ef31ef0b568d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40453-na-14ba8e9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40453%3A%20n%2Fa&amp;severity=critical&amp;id=699f6caab7ef31ef0b567dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39344-na-8914f986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39344%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-21-f1218e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f1218e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-major-payment-disruption-ransomware-strikes-indian-banking-infrastructure-f0c2e4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Major%20Payment%20Disruption%3A%20Ransomware%20Strikes%20Indian%20Banking%20Infrastructure&amp;severity=low&amp;id=682acdbebbaf20d303f0c2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43868-vulnerability-in-linux-linux-be0b2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43867-vulnerability-in-linux-linux-be0b2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43866-vulnerability-in-linux-linux-bdcd68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43865-vulnerability-in-linux-linux-be0b19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43864-vulnerability-in-linux-linux-be0b0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43863-vulnerability-in-linux-linux-be0b07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43862-vulnerability-in-linux-linux-be0af2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43861-vulnerability-in-linux-linux-be0aee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9826c4522896dcbe0aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38175-cwe-284-improper-access-control-in-microsoft-azure-managed-instance-for-apache-cassandra-aeb278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38175%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Managed%20Instance%20for%20Apache%20Cassandra&amp;severity=critical&amp;id=682cd0f71484d88663aeb278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7054-cwe-79-improper-neutralization-of-in-66629f6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Boost%20Sales%2C%20Conversions%2C%20Optins%2C%20Subscribers%20with%20the%20Ultimate%20WP%20Popups%20Builder&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5576-cwe-79-improper-neutralization-of-in-6b897cec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5576%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20Tutor%20LMS%20Elementor%20Addons&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6864-cwe-79-improper-neutralization-of-in-34f594c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6864%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20infosatech%20WP%20Last%20Modified%20Info&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7782-cwe-22-improper-limitation-of-a-path-6afecbfe</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7782%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=high&amp;id=699f6c1eb7ef31ef0b56026e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7780-cwe-89-improper-neutralization-of-sp-c7a20994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7780%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=high&amp;id=699f6c1eb7ef31ef0b560262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6575-cwe-79-improper-neutralization-of-in-46ca733e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5763-cwe-79-improper-neutralization-of-in-30c61ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5763%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cd9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7777-cwe-22-improper-limitation-of-a-path-bcb20022</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7777%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=critical&amp;id=699f6c1eb7ef31ef0b560254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7775-cwe-79-improper-neutralization-of-in-ae6c24b8</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=medium&amp;id=699f6c1eb7ef31ef0b560250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7702-cwe-89-improper-neutralization-of-sp-d8877885</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7702%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=high&amp;id=699f6c1db7ef31ef0b5601ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5940-cwe-862-missing-authorization-in-web-cb151670</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5940%3A%20CWE-862%20Missing%20Authorization%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7827-cwe-89-improper-neutralization-of-sp-d4f6ae79</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7827%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20levelfourstorefront%20Shopping%20Cart%20%26%20eCommerce%20Store&amp;severity=high&amp;id=699f6c20b7ef31ef0b56033c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5939-cwe-862-missing-authorization-in-web-26aaa03e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5939%3A%20CWE-862%20Missing%20Authorization%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5932-cwe-502-deserialization-of-untrusted-e90699bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5932%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=critical&amp;id=699f6bf6b7ef31ef0b55d197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5941-cwe-862-missing-authorization-in-web-4cb53ed0</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5941%3A%20CWE-862%20Missing%20Authorization%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7850-cwe-352-cross-site-request-forgery-c-6f65e216</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7850%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dontdream%20BP%20Profile%20Search&amp;severity=medium&amp;id=699f6c20b7ef31ef0b56034a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31842-na-b3d66961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31842%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30949-na-feaa5d45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30949%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dcdb7ef31ef0b58eab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43688-na-dfa93afc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43688%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42919-na-29a413a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42919%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd2b7ef31ef0b5694df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42621-na-de636970</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42621%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42619-na-4b805c80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42619%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42618-na-9544e00b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42618%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42617-na-0c6184ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42617%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42613-na-de9d0431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42613%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42612-na-1a93696a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42612%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42611-na-ab720656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42611%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42610-na-887bb63e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42610%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42609-na-a4d7a143</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42609%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42608-na-bb3bad71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42608%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc6b7ef31ef0b568f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42607-na-ca4d0dc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42607%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42606-na-f10f3290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42606%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc5b7ef31ef0b568f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42605-na-13345886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42605%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42604-na-20bebede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42604%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42603-na-c242e943</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42603%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc5b7ef31ef0b568f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42598-na-22b7f98b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42598%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc5b7ef31ef0b568efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42586-na-edf69487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42586%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42585-na-6491ad3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42585%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42583-na-522bc936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42583%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc5b7ef31ef0b568ef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42582-na-20d276e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42582%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc4b7ef31ef0b568e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42581-na-e38575cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42581%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc4b7ef31ef0b568e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42580-na-52509724</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42580%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc4b7ef31ef0b568e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42579-na-28d12aa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42579%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc4b7ef31ef0b568e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42578-na-33292900</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42578%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc4b7ef31ef0b568e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42577-na-76dc618d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42577%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc4b7ef31ef0b568e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42576-na-f6171e9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42576%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc4b7ef31ef0b568e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42575-na-8aeace08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42575%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc4b7ef31ef0b568e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42574-na-0917a18f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42574%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc4b7ef31ef0b568e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42572-na-3863a816</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42572%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc4b7ef31ef0b568e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42571-na-5cbb9bc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42571%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42570-na-48dce464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42570%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42569-na-c366881c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42569%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42568-na-46d34269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42568%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42567-na-4dbe098f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42567%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42566-na-f1139f45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42566%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc3b7ef31ef0b568e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42565-na-8050bcc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42565%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42564-na-9ee05604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42564%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc3b7ef31ef0b568e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42563-na-91dd56c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42563%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42562-na-710986b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42562%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc3b7ef31ef0b568e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42561-na-31958baf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42561%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc2b7ef31ef0b568db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42560-na-ce1da3b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42560%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc2b7ef31ef0b568db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42559-na-2c57caaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42559%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc2b7ef31ef0b568db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42558-na-8e9cba61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42558%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc2b7ef31ef0b568dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42557-na-140ed4fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42557%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc2b7ef31ef0b568dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42556-na-5b2b6698</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42556%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc2b7ef31ef0b568da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42555-na-9cb5380d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42555%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc2b7ef31ef0b568da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42554-na-37b86936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42554%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc2b7ef31ef0b568da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42553-na-abf51b64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42553%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc2b7ef31ef0b568d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42552-na-7535f6a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42552%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc2b7ef31ef0b568d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35540-na-81623e47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35540%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5bb7ef31ef0b56346d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33872-na-760a2e21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33872%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c49b7ef31ef0b561f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-20-f120af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f120af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7305-cwe-787-out-of-bounds-write-in-autodesk-autocad-befb42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7305%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=medium&amp;id=682d983ec4522896dcbefb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43354-deserialization-of-untrusted-data-i-e18b9273</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43354%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=69cd7471e6bfc5ba1def78e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7592-cwe-400-uncontrolled-resource-consum-69448908</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7592%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=6909325735043901e8309955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43242-deserialization-of-untrusted-data-i-cd7fb5de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43242%3A%20Deserialization%20of%20Untrusted%20Data%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=null&amp;id=69cd746de6bfc5ba1def77f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43240-improper-authentication-in-azzaroco-a32c8012</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43240%3A%20Improper%20Authentication%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=null&amp;id=69cd746de6bfc5ba1def77f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25582-improper-neutralization-of-input-du-8369745f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25582%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a2de7f0ba78a050535f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23729-na-c42c9253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23729%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d51b7ef31ef0b5704f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44076-na-270c22b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44076%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cdab7ef31ef0b569902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44073-na-19694ed2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44073%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44069-na-b9dd6d3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44069%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44067-na-9e408f97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44067%3A%20n%2Fa&amp;severity=high&amp;id=699f6cdab7ef31ef0b5698ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42815-na-5ae166e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42815%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b5693dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42813-na-e3e8bd3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42813%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cceb7ef31ef0b569357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42658-na-44babe1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42658%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc8b7ef31ef0b569037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42657-na-bfdf00af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42657%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc8b7ef31ef0b569032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42633-na-cc2527d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42633%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc8b7ef31ef0b56901e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35539-na-bb16dc44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35539%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b563411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35538-na-4fe70ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35538%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b56340d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44070-na-44754526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44070%3A%20n%2Fa&amp;severity=critical&amp;id=690a2df6f0ba78a05053767e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-19-f12386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f12386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43239-authorization-bypass-through-user-c-ac7eaaac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43239%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=69cd746be6bfc5ba1def71f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43266-authorization-bypass-through-user-c-edf92837</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43266%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=69cd746de6bfc5ba1def780e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43241-improper-neutralization-of-input-du-aff0c0b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43241%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20azzaroco%20Ultimate%20Membership%20Pro&amp;severity=null&amp;id=69cd746de6bfc5ba1def77f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43306-improper-neutralization-of-input-du-d9c79de3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43306%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=null&amp;id=69cd746fe6bfc5ba1def7895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43313-improper-neutralization-of-input-du-d2975ed8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43313%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20manidoraisamy%20FormFacade&amp;severity=null&amp;id=69cd746fe6bfc5ba1def7898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43238-improper-neutralization-of-input-du-c2256e6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43238%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weDevs%20weMail&amp;severity=null&amp;id=69cd746be6bfc5ba1def71f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43349-improper-neutralization-of-input-du-f0f5cd4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43349%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20all_bootstrap_blocks%20All%20Bootstrap%20Blocks&amp;severity=null&amp;id=69cd746fe6bfc5ba1def78a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43353-improper-neutralization-of-input-du-07f2c885</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43353%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=69cd746fe6bfc5ba1def78a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-18-f12b46</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7703-cwe-79-improper-neutralization-of-in-500409a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20ARMember%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=medium&amp;id=699f6c1db7ef31ef0b5601b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43860-vulnerability-in-linux-linux-be0ae1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43859-vulnerability-in-linux-linux-be0add</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9826c4522896dcbe0add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43858-vulnerability-in-linux-linux-be20d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43857-vulnerability-in-linux-linux-be20d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe20d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43856-vulnerability-in-linux-linux-be20c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43855-vulnerability-in-linux-linux-bdcd55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43854-vulnerability-in-linux-linux-be20be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe20be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43853-vulnerability-in-linux-linux-be20b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43852-vulnerability-in-linux-linux-be2094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43851-vulnerability-in-linux-linux-bdcd51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43850-vulnerability-in-linux-linux-be208c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe208c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43849-vulnerability-in-linux-linux-be2084</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43848-vulnerability-in-linux-linux-be207c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe207c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43847-vulnerability-in-linux-linux-be206d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe206d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43846-vulnerability-in-linux-linux-be2065</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43845-vulnerability-in-linux-linux-be205d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe205d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43844-vulnerability-in-linux-linux-be2055</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43843-vulnerability-in-linux-linux-be2046</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43842-vulnerability-in-linux-linux-be203e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe203e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43841-vulnerability-in-linux-linux-be2027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43840-vulnerability-in-linux-linux-be2016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43839-vulnerability-in-linux-linux-be200e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe200e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43838-vulnerability-in-linux-linux-bdcd4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43837-vulnerability-in-linux-linux-be2006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43836-vulnerability-in-linux-linux-be1ffe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43835-vulnerability-in-linux-linux-be1ff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43834-vulnerability-in-linux-linux-bdcd49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43833-vulnerability-in-linux-linux-be1fe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43832-vulnerability-in-linux-linux-be1fd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43831-vulnerability-in-linux-linux-be1fd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43830-vulnerability-in-linux-linux-be1fc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43829-vulnerability-in-linux-linux-be1fb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43828-vulnerability-in-linux-linux-be1faf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43827-vulnerability-in-linux-linux-be1fab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43826-vulnerability-in-linux-linux-be1fa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43825-vulnerability-in-linux-linux-be1fa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43824-vulnerability-in-linux-linux-be1f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43823-vulnerability-in-linux-linux-be1f9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43822-vulnerability-in-linux-linux-be1f97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43821-vulnerability-in-linux-linux-be1f93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43820-vulnerability-in-linux-linux-bdcd45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43819-vulnerability-in-linux-linux-be1f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43818-vulnerability-in-linux-linux-be1f60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43817-vulnerability-in-linux-linux-bdcd34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43816-vulnerability-in-linux-linux-be1f58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43815-vulnerability-in-linux-linux-be1f4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42322-vulnerability-in-linux-linux-be1f3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42322%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42321-vulnerability-in-linux-linux-be1f22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42321%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42320-vulnerability-in-linux-linux-bdcd2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42320%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42319-vulnerability-in-linux-linux-be1f1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42319%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42318-vulnerability-in-linux-linux-be1f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42318%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42317-vulnerability-in-linux-linux-be1f0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42317%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42316-vulnerability-in-linux-linux-be1f02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42316%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42315-vulnerability-in-linux-linux-be1ee2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42315%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42314-vulnerability-in-linux-linux-be1ede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42314%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42313-vulnerability-in-linux-linux-be1eda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42313%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42312-vulnerability-in-linux-linux-bdcd1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42312%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42311-vulnerability-in-linux-linux-be1ed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42311%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42310-vulnerability-in-linux-linux-be1ed2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42310%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42309-vulnerability-in-linux-linux-be1ece</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42309%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42307-vulnerability-in-linux-linux-bdcd15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42307%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42306-vulnerability-in-linux-linux-bdcd0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42306%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42305-vulnerability-in-linux-linux-be1eca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42305%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42304-vulnerability-in-linux-linux-bdccfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42304%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdccfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42303-vulnerability-in-linux-linux-be1ec6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42303%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42302-vulnerability-in-linux-linux-bdccf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42302%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdccf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42301-vulnerability-in-linux-linux-be1ec2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42301%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1ec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42300-vulnerability-in-linux-linux-be1eb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42300%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42299-vulnerability-in-linux-linux-be1e98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42299%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42298-vulnerability-in-linux-linux-be1e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42298%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42297-vulnerability-in-linux-linux-be1e8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42297%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42296-vulnerability-in-linux-linux-be1e84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42296%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42295-vulnerability-in-linux-linux-be1e6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42295%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42294-vulnerability-in-linux-linux-be1e62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42294%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42293-vulnerability-in-linux-linux-be1e5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42293%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42292-vulnerability-in-linux-linux-be1e52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42292%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42291-vulnerability-in-linux-linux-be1e4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42291%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42290-vulnerability-in-linux-linux-be1e44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42290%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42289-vulnerability-in-linux-linux-be1e26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42289%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42288-vulnerability-in-linux-linux-be1e22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42288%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42287-vulnerability-in-linux-linux-bdccf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42287%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdccf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42286-vulnerability-in-linux-linux-be1e1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42286%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42285-vulnerability-in-linux-linux-be1e1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42285%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42284-vulnerability-in-linux-linux-be1e14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42284%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42283-vulnerability-in-linux-linux-be1e10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42283%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42282-vulnerability-in-linux-linux-be1e0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42281-vulnerability-in-linux-linux-be1e08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42281%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42280-vulnerability-in-linux-linux-be1df7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42280%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1df7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42279-vulnerability-in-linux-linux-be1def</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42279%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42278-vulnerability-in-linux-linux-bdccee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42278%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdccee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42277-vulnerability-in-linux-linux-bdccea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42277%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdccea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42276-vulnerability-in-linux-linux-be1dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42276%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52889-vulnerability-in-linux-linux-be784b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe784b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42275-vulnerability-in-linux-linux-be1dd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42275%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42274-vulnerability-in-linux-linux-be1dc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42274%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42273-vulnerability-in-linux-linux-bdcce6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42273%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42272-vulnerability-in-linux-linux-bdcce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42272%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42271-vulnerability-in-linux-linux-be1dbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42271%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42270-vulnerability-in-linux-linux-be1db5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42270%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42269-vulnerability-in-linux-linux-be1daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42269%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42268-vulnerability-in-linux-linux-be1da9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42268%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1da9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42267-vulnerability-in-linux-linux-be1d98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42267%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42266-vulnerability-in-linux-linux-be1d90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42266%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42265-vulnerability-in-linux-linux-be1d81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42265%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42264-vulnerability-in-linux-linux-be1d68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42264%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42263-vulnerability-in-linux-linux-be1d60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42263%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42262-vulnerability-in-linux-linux-be1d58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42262%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42261-vulnerability-in-linux-linux-be1d50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42261%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42260-vulnerability-in-linux-linux-be1d41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42260%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6500-cwe-862-missing-authorization-in-ins-ab5f59d9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6500%3A%20CWE-862%20Missing%20Authorization%20in%20inspirelabs%20InPost%20PL&amp;severity=critical&amp;id=699f6c04b7ef31ef0b55f01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-17-f12ac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43472-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-aeb2d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43472%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7144-cwe-79-improper-neutralization-of-in-f79b35d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetElements&amp;severity=medium&amp;id=699f6c10b7ef31ef0b55f8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7145-cwe-22-improper-limitation-of-a-path-45165989</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7145%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Crocoblock%20JetElements&amp;severity=high&amp;id=699f6c10b7ef31ef0b55f8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42462-cwe-306-missing-authentication-for--17f74b02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42462%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20upKeeper%20Solutions%20upKeeper%20Manager&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7146-cwe-22-improper-limitation-of-a-path-8470eabe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7146%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Crocoblock%20JetTabs%20for%20Elementor&amp;severity=high&amp;id=699f6c10b7ef31ef0b55f8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7136-cwe-79-improper-neutralization-of-in-09acd99c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetSearch&amp;severity=medium&amp;id=699f6c10b7ef31ef0b55f8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7147-cwe-79-improper-neutralization-of-in-7bd1af53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Crocoblock%20JetBlocks%20for%20Elementor&amp;severity=medium&amp;id=699f6c10b7ef31ef0b55f8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7501-cwe-352-cross-site-request-forgery-c-8e36e430</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7501%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20algoritmika%20Download%20Plugins%20and%20Themes%20in%20ZIP%20from%20Dashboard&amp;severity=medium&amp;id=699f6c18b7ef31ef0b55fe3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7301-cwe-79-improper-neutralization-of-in-03f644d1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7301%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=high&amp;id=699f6c14b7ef31ef0b55faeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7422-cwe-352-cross-site-request-forgery-c-82173cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7422%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jfarthing84%20Theme%20My%20Login&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7630-cwe-200-information-exposure-in-msaa-89ccdb36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7630%3A%20CWE-200%20Information%20Exposure%20in%20msaari%20Relevanssi%20%E2%80%93%20A%20Better%20Search&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25837-na-505b9b26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25837%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d70b7ef31ef0b5722a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43011-na-cee11c29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43011%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd6b7ef31ef0b5696bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43009-na-afd333d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43009%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b569668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43006-na-20a50c5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43006%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b569664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43005-na-d5ef1afc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43005%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b569660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42995-na-735c1bdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42995%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b56965d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42994-na-1542ac04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42994%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b56965a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42850-na-bef50142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42850%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b5693fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42849-na-744f56f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42849%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd0b7ef31ef0b5693f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42758-na-e12868fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42758%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ccab7ef31ef0b56913f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42637-na-0c5f2127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42637%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc8b7ef31ef0b569027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42634-na-71bdd191</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42634%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc8b7ef31ef0b569021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-08-16-1b6948</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-08-16&amp;severity=medium&amp;id=682b69b652745a861d1b6948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-16-f12762</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31905-cwe-319-cleartext-transmission-of-s-cfa66f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31905%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20QRadar%20Network%20Packet%20Capture&amp;severity=medium&amp;id=68e0f3c6b66c7f7acdd3ea8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7262-cwe-22-improper-limitation-of-a-path-63b5b7e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7262%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20Kingsoft%20WPS%20Office&amp;severity=critical&amp;id=68f7d9b7247d717aace26c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43275-393becb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43275&amp;severity=null&amp;id=69806b1df9fa50a62f2c3c87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7411-cwe-200-information-exposure-in-cont-ed53484c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7411%3A%20CWE-200%20Information%20Exposure%20in%20contrid%20Newsletters&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7063-cwe-200-information-exposure-in-wpme-ca123919</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7063%3A%20CWE-200%20Information%20Exposure%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7064-cwe-79-improper-neutralization-of-in-ef311b17</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6534-cwe-639-authorization-bypass-through-user-controlled-key-in-directus-directus-aeb4e4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6534%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Directus%20Directus&amp;severity=medium&amp;id=682cd0f81484d88663aeb4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6533-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-directus-directus-aeb50f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6533%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Directus%20Directus&amp;severity=medium&amp;id=682cd0f81484d88663aeb50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7628-cwe-288-authentication-bypass-using--d0f547f9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7628%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=high&amp;id=699f6c1cb7ef31ef0b5600d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7624-cwe-285-improper-authorization-in-dy-ce2a34e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7624%3A%20CWE-285%20Improper%20Authorization%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=high&amp;id=699f6c1cb7ef31ef0b56002f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7420-cwe-352-cross-site-request-forgery-c-94ea7494</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7420%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20f1logic%20Insert%20PHP%20Code%20Snippet&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fcdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31800-na-ed4159f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31800%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd6b7ef31ef0b58f64f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31799-na-01f0be1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31799%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31798-na-a9af97a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31798%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27731-na-d4bd0976</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27731%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587dc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27730-na-85925b47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27730%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d87b7ef31ef0b587dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27729-na-1f6e3d85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27729%3A%20n%2Fa&amp;severity=high&amp;id=699f6d87b7ef31ef0b587db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27728-na-a55372ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27728%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23168-na-c0f49be5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23168%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d51b7ef31ef0b5704d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22219-na-9a1d61cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22219%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b57002f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22218-na-380d2dbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22218%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b57002b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42986-na-e8a27273</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42986%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b569652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42985-na-c5417f4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42985%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b56964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42984-na-883d22aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42984%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b56964c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42983-na-dc200743</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42983%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b569609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42982-na-8960bde7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42982%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b569606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42981-na-cd6dc94e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42981%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b569603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42980-na-7ee77b55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42980%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b569600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42979-na-b02a3b9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42979%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b5695fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42977-na-507ef3a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42977%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b5695fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42976-na-398547a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42976%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b5695f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42974-na-cdb1ef5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42974%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b5695f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42973-na-f6b04804</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42973%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd4b7ef31ef0b5695f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42969-na-993c4c36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42969%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd4b7ef31ef0b5695ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42968-na-63a3a289</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42968%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b569561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42966-na-b7150b33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42966%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd2b7ef31ef0b56955e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42955-na-42918615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42955%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b56955b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42954-na-9d42cf87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42954%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b569558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42953-na-1e22e80b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42953%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b569555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42951-na-8ef0068f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42951%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd2b7ef31ef0b569552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42950-na-01b1dfc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42950%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd2b7ef31ef0b56954f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42949-na-ad489796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42949%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b56954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42948-na-f5c00cf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42948%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd2b7ef31ef0b569549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42946-na-90b14baa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42946%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b569546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42945-na-e24cba62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42945%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42944-na-6159dcd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42944%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42943-na-0d21fae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42943%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd2b7ef31ef0b5694f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42942-na-e5168d12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42942%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42941-na-663f09bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42941%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd2b7ef31ef0b5694f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42940-na-1b8a44ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42940%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cd2b7ef31ef0b5694ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42843-na-2108b7d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42843%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cd0b7ef31ef0b5693f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42757-na-8e5cb89e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42757%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccab7ef31ef0b56913c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42681-na-35eb092b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42681%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc9b7ef31ef0b5690c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42679-na-41b8f142</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42679%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc9b7ef31ef0b5690c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42678-na-7791bf7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42678%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc9b7ef31ef0b5690c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42677-na-5f2b786f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42677%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc9b7ef31ef0b5690bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42676-na-a46aab02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42676%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc8b7ef31ef0b56903e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32231-na-4344745c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32231%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b56107c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-15-e5477f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-15&amp;severity=medium&amp;id=682b7b9cd3ddd8cef2e5477f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-15-f12a4e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31882-cwe-943-improper-neutralization-of--291722d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31882%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2debf0ba78a050536ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37529-cwe-789-uncontrolled-memory-allocat-3def5b42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37529%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2decf0ba78a0505371a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35152-cwe-789-uncontrolled-memory-allocat-ea655b06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35152%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2decf0ba78a050537194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35136-cwe-943-improper-neutralization-of--29862e69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35136%3A%20CWE-943%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2decf0ba78a05053718f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42441-cwe-266-llm-incorrect-privilege-ass-d585b104</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42441%3A%20CWE-266%20%5BLLM%5D%20Incorrect%20Privilege%20Assignment%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Desktop%20App%20for%20macOS%2C%20Zoom%20Meeting%20SDK%20for%20macOS%2C%20Zoom%20Rooms%20Client%20for%20macOS&amp;severity=medium&amp;id=68e0f3bfb66c7f7acdd3cbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5916-cwe-313-cleartext-storage-in-a-file-or-on-disk-in-palo-alto-networks-pan-os-bed992</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5916%3A%20CWE-313%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Palo%20Alto%20Networks%20PAN-OS&amp;severity=medium&amp;id=682d983ac4522896dcbed992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42434-cwe-862-missing-authorization-in-zo-a2a52fa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42434%3A%20CWE-862%20Missing%20Authorization%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Apps%2C%20SDKs%2C%20Rooms%20Clients%2C%20and%20Rooms%20Controllers&amp;severity=medium&amp;id=68e0f3bfb66c7f7acdd3cbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39824-cwe-862-missing-authorization-in-zo-5843b629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39824%3A%20CWE-862%20Missing%20Authorization%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Apps%2C%20SDKs%2C%20Rooms%20Clients%2C%20and%20Rooms%20Controllers&amp;severity=medium&amp;id=68e0f3bfb66c7f7acdd3cbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39823-cwe-862-missing-authorization-in-zo-ebf43682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39823%3A%20CWE-862%20Missing%20Authorization%20in%20Zoom%20Communications%20Inc.%20Zoom%20Workplace%20Apps%2C%20SDKs%2C%20Rooms%20Clients%2C%20and%20Rooms%20Controllers&amp;severity=medium&amp;id=68e0f3bfb66c7f7acdd3cbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27267-cwe-362-concurrent-execution-using--7df1d00e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27267%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20IBM%20SDK%2C%20Java%20Technology%20Edition&amp;severity=medium&amp;id=68e0f3c5b66c7f7acdd3ea61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42259-vulnerability-in-linux-linux-be1d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42259%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7347-cwe-126-buffer-over-read-in-f5-nginx-d8e13e77</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7347%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20F5%20NGINX%20Open%20Source&amp;severity=medium&amp;id=69091a47c28fd46ded81cf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34424-denial-of-service-in-intelr-csme-1eb95f2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34424%3A%20denial%20of%20service%20in%20Intel(R)%20CSME&amp;severity=medium&amp;id=69092632fe7723195e0b5f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21844-denial-of-service-in-intelr-csme-83dfe364</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21844%3A%20denial%20of%20service%20in%20Intel(R)%20CSME&amp;severity=medium&amp;id=6909261dfe7723195e0b4172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48361-information-disclosure-in-intelr-cs-56a0352b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48361%3A%20information%20disclosure%20in%20Intel(R)%20CSME&amp;severity=medium&amp;id=69092637fe7723195e0b6228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40067-escalation-of-privilege-in-intelr-c-3b97b3e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40067%3A%20escalation%20of%20privilege%20in%20Intel(R)%20CSME&amp;severity=medium&amp;id=69092633fe7723195e0b6183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6532-cwe-79-improper-neutralization-of-in-ddca52e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6532%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codersaiful%20Sheet%20to%20Table%20Live%20Sync%20for%20Google%20Sheet&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4389-cwe-434-unrestricted-upload-of-file--1566ea03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4389%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20averta%20Slider%20%26%20Popup%20Builder%20by%20Depicter%20%E2%80%93%20Add%20Image%20Slider%2C%20Carousel%20Slider%2C%20Exit%20Intent%20Popup%2C%20Popup%20Modal%2C%20Coupon%20Popup%2C%20Post%20Slider%20Carousel&amp;severity=high&amp;id=699f6b8ab7ef31ef0b556755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7588-cwe-79-improper-neutralization-of-in-bc5906f0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Gutenberg%20Blocks%2C%20Page%20Builder%20%E2%80%93%20ComboBlocks&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55ff5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-14-f12ac6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38163-cwe-284-improper-access-control-in-microsoft-windows-server-2022-aeb259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38163%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682cd0f71484d88663aeb259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28986-cwe-502-deserialization-of-untruste-044dd8ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28986%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20Web%20Help%20Desk&amp;severity=critical&amp;id=68f7d9b2247d717aace269df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7593-cwe-287-improper-authentication-in-i-ff5943ad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7593%3A%20CWE-287%20Improper%20Authentication%20in%20Ivanti%20vTM&amp;severity=critical&amp;id=68f7d9b7247d717aace26c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37968-cwe-345-insufficient-verification-of-data-authenticity-in-microsoft-windows-server-2019-aeb1bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37968%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38109-cwe-918-server-side-request-forgery-ssrf-in-microsoft-azure-health-bot-aeb1ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38109%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Azure%20Health%20Bot&amp;severity=critical&amp;id=682cd0f71484d88663aeb1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38223-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aeb2d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38223%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f81484d88663aeb2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38215-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-11-version-24h2-aeb2c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38215%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f81484d88663aeb2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38214-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2019-aeb2c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38214%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682cd0f81484d88663aeb2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38120-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-aeb1e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38120%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38211-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-aeb2be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38211%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682cd0f81484d88663aeb2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38195-cwe-284-improper-access-control-in-microsoft-azure-cyclecloud-8-2-0-aeb299</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38195%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20CycleCloud%208.2.0&amp;severity=high&amp;id=682cd0f81484d88663aeb299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38189-cwe-20-improper-input-validation-in-microsoft-microsoft-office-2019-aeb288</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38189%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682cd0f81484d88663aeb288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38187-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-aeb286</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38187%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38186-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aeb284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38186%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38185-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-aeb282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38185%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38180-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-aeb27e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38180%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38177-cwe-116-improper-encoding-or-escaping-of-output-in-microsoft-app-installer-aeb27a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38177%3A%20CWE-116%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Microsoft%20App%20Installer&amp;severity=high&amp;id=682cd0f71484d88663aeb27a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38173-cwe-73-external-control-of-file-name-or-path-in-microsoft-microsoft-office-2019-aeb276</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38173%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=682cd0f71484d88663aeb276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38171-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-aeb267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38171%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38170-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-365-apps-for-enterprise-aeb265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38170%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f71484d88663aeb265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38169-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-office-2019-aeb263</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38169%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38165-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-11-version-22h2-aeb25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38165%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682cd0f71484d88663aeb25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38162-cwe-284-improper-access-control-in-microsoft-azure-connected-machine-agent-aeb257</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38162%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=682cd0f71484d88663aeb257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38158-cwe-416-use-after-free-in-microsoft-c-sdk-for-azure-iot-aeb244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38158%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20C%20SDK%20for%20Azure%20IoT&amp;severity=high&amp;id=682cd0f71484d88663aeb244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38157-cwe-415-double-free-in-microsoft-azure-iot-hub-device-client-sdk-aeb242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38157%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Azure%20IoT%20Hub%20Device%20Client%20SDK&amp;severity=high&amp;id=682cd0f71484d88663aeb242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38155-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb240</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38155%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f71484d88663aeb240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38154-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-aeb23e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38154%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38153-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aeb23c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38153%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb23c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38152-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb23a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38152%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38151-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-24h2-aeb238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38151%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=682cd0f71484d88663aeb238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38150-cwe-416-use-after-free-in-microsoft-windows-server-2022-aeb22b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38150%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682cd0f71484d88663aeb22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38148-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-24h2-aeb229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38148%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38147-cwe-416-use-after-free-in-microsoft-windows-server-2022-aeb227</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38147%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682cd0f71484d88663aeb227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38146-cwe-476-null-pointer-dereference-in-microsoft-windows-11-version-24h2-aeb225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38146%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38145-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-aeb223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38145%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38144-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-aeb221</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38144%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38143-cwe-306-missing-authentication-for-critical-function-in-microsoft-windows-11-version-24h2-aeb21f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38143%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=682cd0f71484d88663aeb21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38142-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb21d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38142%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38141-cwe-416-use-after-free-in-microsoft-windows-11-version-24h2-aeb21b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38141%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38140-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb219</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38140%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682cd0f71484d88663aeb219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38138-cwe-416-use-after-free-in-microsoft-windows-server-2019-aeb20c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38138%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38137-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2022-aeb20a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38137%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682cd0f71484d88663aeb20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38136-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb208</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38136%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38135-cwe-126-buffer-over-read-in-microsoft-windows-11-version-24h2-aeb206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38135%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38134-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-24h2-aeb204</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38134%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38133-cwe-138-improper-neutralization-of-special-elements-in-microsoft-windows-10-version-1809-aeb202</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38133%3A%20CWE-138%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38132-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38132%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38131-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-11-version-24h2-aeb1fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38131%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb1fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38130-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-24h2-aeb1fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38130%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38128-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2019-aeb1fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38128%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb1fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38127-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aeb1ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38127%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38126-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-aeb1eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38126%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38125-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-aeb1e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38125%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38122-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb1e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38122%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f71484d88663aeb1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38121-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-aeb1e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38121%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aeb1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38118-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aeb1df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38118%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f71484d88663aeb1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38117-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-24h2-aeb1dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38117%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb1dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38116-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb1db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38116%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38115-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-24h2-aeb1ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38115%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38114-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-24h2-aeb1cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38114%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f71484d88663aeb1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29995-cwe-208-observable-timing-discrepancy-in-microsoft-windows-10-version-1809-aeb1af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29995%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38107-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb1c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38107%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38106-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-aeb1c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38106%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aeb1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38098-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-connected-machine-agent-aeb1c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38098%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=682cd0f71484d88663aeb1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38063-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-aeb1be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38063%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682cd0f71484d88663aeb1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38084-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-officeplus-aeb1c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38084%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20OfficePLUS&amp;severity=high&amp;id=682cd0f71484d88663aeb1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38213-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-aeb2c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38213%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f81484d88663aeb2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38201-cwe-20-improper-input-validation-in-microsoft-azure-stack-hub-aeb2a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=high&amp;id=682cd0f81484d88663aeb2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38199-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aeb2a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38199%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682cd0f81484d88663aeb2a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38198-cwe-345-insufficient-verification-of-data-authenticity-in-microsoft-windows-10-version-1809-aeb29f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38198%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38197-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-teams-for-ios-aeb29d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38197%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Teams%20for%20iOS&amp;severity=medium&amp;id=682cd0f81484d88663aeb29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38196-cwe-20-improper-input-validation-in-microsoft-windows-11-version-24h2-aeb29b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38196%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f81484d88663aeb29b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38193-cwe-416-use-after-free-in-microsoft-windows-11-version-24h2-aeb297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38193%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f81484d88663aeb297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38191-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-10-version-1809-aeb295</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38191%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38184-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aeb280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38184%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38178-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-11-version-24h2-aeb27c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38178%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=high&amp;id=682cd0f81484d88663aeb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38172-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-365-apps-for-enterprise-aeb269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38172%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0f71484d88663aeb269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38168-cwe-400-uncontrolled-resource-consumption-in-microsoft-net-8-0-aeb261</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38168%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682cd0f71484d88663aeb261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38167-cwe-319-cleartext-transmission-of-sensitive-information-in-microsoft-microsoft-visual-studio-2022-version-17-10-aeb25f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38167%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=medium&amp;id=682cd0f71484d88663aeb25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38161-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aeb24a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38161%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f71484d88663aeb24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38160-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1607-aeb248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38160%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=critical&amp;id=682cd0f71484d88663aeb248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38159-cwe-416-use-after-free-in-microsoft-windows-10-version-1607-aeb246</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38159%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201607&amp;severity=critical&amp;id=682cd0f71484d88663aeb246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38123-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-24h2-aeb1e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38123%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20Version%2024H2&amp;severity=medium&amp;id=682cd0f71484d88663aeb1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38108-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-azure-stack-hub-aeb1c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38108%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=critical&amp;id=682cd0f71484d88663aeb1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7746-cwe-1392-use-of-default-credentials--0a21283a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7746%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20Traccar%20Server&amp;severity=critical&amp;id=68ebab23d74f1b90252cbdb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43153-incorrect-privilege-assignment-in-w-61b83bcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43153%3A%20Incorrect%20Privilege%20Assignment%20in%20WofficeIO%20Woffice&amp;severity=null&amp;id=69cd7469e6bfc5ba1def718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38787-insertion-of-sensitive-information--d3cec08f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38787%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Javier%20Carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6823-cwe-434-unrestricted-upload-of-file--705d3678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6823%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7247-cwe-79-improper-neutralization-of-in-b01145a6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7247%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6c12b7ef31ef0b55fa18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7092-cwe-79-improper-neutralization-of-in-11a775d1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7094-cwe-94-improper-control-of-generatio-258e3cf1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7094%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20rabilal%20JS%20Help%20Desk%20%E2%80%93%20The%20Ultimate%20Help%20Desk%20%26%20Support%20Plugin&amp;severity=critical&amp;id=699f6c0fb7ef31ef0b55f83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7388-cwe-79-improper-neutralization-of-in-3f67b870</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7388%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gfazioli%20WP%20Bannerize%20Pro&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42740-na-23a040da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42740%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc9b7ef31ef0b5690da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42739-na-1453c3dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42739%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc9b7ef31ef0b5690d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42738-na-3ff3ba5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42738%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc9b7ef31ef0b5690d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42737-na-8a769d8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42737%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc9b7ef31ef0b5690d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42736-na-60539d26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42736%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc9b7ef31ef0b5690ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41711-na-b76da8b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41711%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbeb7ef31ef0b568a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41613-na-c9383694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbdb7ef31ef0b568937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37015-na-c294ea3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37015%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b563aa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-13-f128d4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f128d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37930-insertion-of-sensitive-information--88784d25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37930%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20ThemeSphere%20SmartMag&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7590-improper-neutralization-of-input-dur-05f82a5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7590%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Spectra&amp;severity=null&amp;id=69cd75d2e6bfc5ba1df07ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7066-cwe-125-in-siemens-jt2go-bed15e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7066%3A%20CWE-125%20in%20Siemens%20JT2Go&amp;severity=high&amp;id=682d983ac4522896dcbed15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43216-improper-neutralization-of-input-du-901f7b74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43216%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Chill%20Filr&amp;severity=null&amp;id=69cd746be6bfc5ba1def71db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43218-improper-neutralization-of-input-du-6a98f760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43218%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mediavine%20Mediavine%20Control%20Panel&amp;severity=null&amp;id=69cd746be6bfc5ba1def71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7700-improper-neutralization-of-special-e-7f151a9b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7700%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)&amp;severity=medium&amp;id=691f82024f1c50aa2eb5ae9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42258-vulnerability-in-linux-linux-bdccd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42258%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdccd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6639-cwe-79-improper-neutralization-of-in-3ce10a29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6639%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AxtonYao%20MDx&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5651-improper-control-of-generation-of-co-6d2a1764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5651%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=690ca00948bc5002b401c240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7694-cwe-434-unrestricted-upload-of-file--c5b59021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7694%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20TeamT5%20ThreatSonar%20Anti-Ransomware&amp;severity=high&amp;id=6994fa1780d747be20dfa48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27442-na-f2d5e4a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27442%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b579acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42748-na-fadd0fe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42748%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccab7ef31ef0b569135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42747-na-6af0b4bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42747%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccab7ef31ef0b569132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42745-na-bcb83367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42745%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ccab7ef31ef0b56912f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42744-na-185a329c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42744%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccab7ef31ef0b56912c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42743-na-d7575ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42743%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccab7ef31ef0b569129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42742-na-b61713ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42742%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccab7ef31ef0b569126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42741-na-33b94f45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42741%3A%20n%2Fa&amp;severity=high&amp;id=699f6ccab7ef31ef0b569123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42632-na-396ef0f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42632%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42631-na-840c7ee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42631%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42630-na-a18d5b06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42630%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42629-na-505cf6fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42629%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc7b7ef31ef0b568fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42628-na-23142438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42628%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42627-na-8479e47a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42627%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42626-na-252ec6ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42626%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42625-na-f4084368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42625%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc7b7ef31ef0b568fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42624-na-d2b75890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42624%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42623-na-55e658e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42623%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc7b7ef31ef0b568fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42547-na-55d7dede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42547%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc1b7ef31ef0b568d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42546-na-8e00d0d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42546%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc1b7ef31ef0b568d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42545-na-aeb8ead9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42545%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc1b7ef31ef0b568d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42543-na-5b7c7e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42543%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc1b7ef31ef0b568d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42520-na-391c7761</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42520%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc1b7ef31ef0b568d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41651-na-1aa44ae1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41651%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b568a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41475-na-cdbe172c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41475%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb9b7ef31ef0b56873c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39091-na-8860eba5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39091%3A%20n%2Fa&amp;severity=high&amp;id=699f6c81b7ef31ef0b565b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41710-na-a27d02ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41710%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9b4247d717aace26aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40500-na-2ba68d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40500%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c6b66c7f7acdd3ea9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27443-n-a-in-n-a-aeb2e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27443%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-12-f12b63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-11-1387b17e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-11&amp;severity=medium&amp;id=68367c99182aa0cae2322482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-11-761677</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-11&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb761677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-11-f12628</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7574-cwe-352-cross-site-request-forgery-c-701ea5c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7574%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cyberfoxdigital%20Christmasify!&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55ff56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7649-cwe-79-improper-neutralization-of-in-d7889da0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7649%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpopal%20Opal%20Membership&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7648-cwe-862-missing-authorization-in-wpo-3547d807</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7648%3A%20CWE-862%20Missing%20Authorization%20in%20wpopal%20Opal%20Membership&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b5600e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7503-cwe-288-authentication-bypass-using--2c0ea72d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7503%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=critical&amp;id=699f6c18b7ef31ef0b55fe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6692-cwe-79-improper-neutralization-of-in-19e738b7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=low&amp;id=699f6c0ab7ef31ef0b55f4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7621-cwe-862-missing-authorization-in-wpf-544e0daa</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7621%3A%20CWE-862%20Missing%20Authorization%20in%20wpfeedback%20Visual%20Website%20Collaboration%2C%20Feedback%20%26%20Project%20Management%20%E2%80%93%20Atarim&amp;severity=medium&amp;id=699f6c1cb7ef31ef0b560025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6691-cwe-79-improper-neutralization-of-in-05a2853c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20eCommerce%20Payments%20and%20Subscriptions%20made%20easy&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-08-10-881b2c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-08-10&amp;severity=medium&amp;id=682b68f7d14de609c8881b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-10-f12c1f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42367-cwe-61-unix-symbolic-link-symlink-f-65347431</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42367%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=6846d2137b622a9fdf21908f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6562-cwe-200-information-exposure-in-cser-5f5fa9c0</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6562%3A%20CWE-200%20Information%20Exposure%20in%20cservit%20affiliate-toolkit%20%E2%80%93%20WordPress%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7410-cwe-200-information-exposure-in-esth-8687f727</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7410%3A%20CWE-200%20Information%20Exposure%20in%20esthertyler%20My%20Custom%20CSS%20PHP%20%26%20ADS&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7412-cwe-200-information-exposure-in-coff-2f19a155</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7412%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20No%20Update%20Nag&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7416-cwe-200-information-exposure-in-coff-6d567524</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7416%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Reveal%20Template&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7414-cwe-200-information-exposure-in-edga-5f389477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7414%3A%20CWE-200%20Information%20Exposure%20in%20edgarrojas%20PDF%20Builder%20for%20WPForms&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7413-cwe-200-information-exposure-in-coff-ed72897a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7413%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Obfuscate%20Email&amp;severity=medium&amp;id=699f6c16b7ef31ef0b55fcba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7382-cwe-200-information-exposure-in-coff-81b2c31d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7382%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Linkify%20Text&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7399-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-samsung-electronics-magicinfo-9-server-bd88e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7399%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Samsung%20Electronics%20MagicINFO%209%20Server&amp;severity=high&amp;id=682d9819c4522896dcbd88e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4359-cwe-98-improper-control-of-filename--429f048c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4359%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b88b7ef31ef0b556590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4360-cwe-79-improper-neutralization-of-in-5d18d2d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4360%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b88b7ef31ef0b556594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3279-cwe-306-missing-authentication-for-c-5fb639ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3279%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=critical&amp;id=68ef9b26178f764e1f470b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41577-na-25b14798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41577%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbbb7ef31ef0b56884e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41570-na-385e9cbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41570%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbbb7ef31ef0b56884b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41476-na-f2816fcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41476%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb9b7ef31ef0b56873f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41332-na-2b6fe692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41332%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb5b7ef31ef0b5683de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40479-na-b43ac32b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40479%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40472-na-f0b20e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40472%3A%20n%2Fa&amp;severity=medium&amp;id=699f6caab7ef31ef0b567de0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39338-na-7b1e794e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39338%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c86b7ef31ef0b565de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38989-na-aafcfba9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38989%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7eb7ef31ef0b5659c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37826-na-9a18eba6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37826%3A%20n%2Fa&amp;severity=high&amp;id=699f6c70b7ef31ef0b5640ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-09-f12f09</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7557-improper-access-control-ee2f65ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7557%3A%20Authentication%20Bypass%20by%20Primary%20Weakness&amp;severity=high&amp;id=691ec609337afffbc0f72890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7006-null-pointer-dereference-bd8e69</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7006%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=682d981ac4522896dcbd8e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7006-null-pointer-dereference-bd8e69</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7006%3A%20NULL%20Pointer%20Dereference&amp;severity=high&amp;id=682d981ac4522896dcbd8e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38200-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-microsoft-office-2019-aeb2a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38200%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=682cd0f81484d88663aeb2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38219-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aeb2d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38219%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0f81484d88663aeb2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38218-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-microsoft-edge-chromium-based-aeb2c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38218%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682cd0f81484d88663aeb2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43168-heap-based-buffer-overflow-in-red-h-0e8c1068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43168%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=690929a0fe7723195e0fd110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43167-null-pointer-dereference-in-red-hat-c5f52b9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43167%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=low&amp;id=690929a0fe7723195e0fd108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0107-cwe-125-out-of-bounds-read-in-nvidia-a24ae330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0107%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20GPU%20Display%20Driver%2C%20vGPU%20Software%2C%20Cloud%20Gaming&amp;severity=high&amp;id=690a3b61ff58c9332ff09421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7480-cwe-266-in-avaya-aura-system-manager-47d599af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7480%3A%20CWE-266%20in%20Avaya%20Aura%20System%20Manager&amp;severity=medium&amp;id=68e0f3c3b66c7f7acdd3e9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3659-cwe-78-improper-neutralization-of-sp-1ed66b6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3659%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20KAON%20Group%20AR2140&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42257-vulnerability-in-linux-linux-be1d30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42257%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42256-vulnerability-in-linux-linux-be1d28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42256%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42255-vulnerability-in-linux-linux-be1d20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42255%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42254-vulnerability-in-linux-linux-be1d18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42254%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42253-vulnerability-in-linux-linux-be1d03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42253%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42252-vulnerability-in-linux-linux-be1cff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42252%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42251-vulnerability-in-linux-linux-be1cfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42251%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6824-cwe-862-missing-authorization-in-lea-7d6a5886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6824%3A%20CWE-862%20Missing%20Authorization%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7150-cwe-89-improper-neutralization-of-sp-a1e3c07a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7150%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%2010web%20Slider%20by%2010Web%20%E2%80%93%20Responsive%20Image%20Slider&amp;severity=high&amp;id=699f6c10b7ef31ef0b55f905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7548-cwe-89-improper-neutralization-of-sp-1766df0f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7548%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55fedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5226-cwe-79-improper-neutralization-of-in-1d18853e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5226%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daniyalahmedk%20Fuse%20Social%20Floating%20Sidebar&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5668-cwe-79-improper-neutralization-of-in-6b0d0e92</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20Lightbox%20%26%20Modal%20Popup%20WordPress%20Plugin%20%E2%80%93%20FooBox&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6869-cwe-862-missing-authorization-in-sbo-9ed0f00d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6869%3A%20CWE-862%20Missing%20Authorization%20in%20sbouey%20Falang%20multilanguage%20for%20WordPress&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6987-cwe-862-missing-authorization-in-the-f13b8b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6987%3A%20CWE-862%20Missing%20Authorization%20in%20themebeez%20Orchid%20Store&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6552-cwe-200-information-exposure-in-amel-da8d7095</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6552%3A%20CWE-200%20Information%20Exposure%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6254-cwe-20-improper-input-validation-in--a086be6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6254%3A%20CWE-20%20Improper%20Input%20Validation%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7492-cwe-352-cross-site-request-forgery-c-ac4f787c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7492%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mainwp%20MainWP%20Child%20Reports&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fe33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7350-cwe-288-authentication-bypass-using--814b521c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7350%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20reputeinfosystems%20Appointment%20Booking%20Calendar%20Plugin%20and%20Scheduling%20Plugin%20%E2%80%93%20BookingPress&amp;severity=critical&amp;id=699f6c14b7ef31ef0b55fb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38202-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aeb2a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38202%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f81484d88663aeb2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21302-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-aeb1ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21302%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f71484d88663aeb1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7486-cwe-502-deserialization-of-untrusted-efc6e55b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7486%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20codename065%20MultiPurpose&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7560-cwe-502-deserialization-of-untrusted-d8a1de3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7560%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20codename065%20News%20Flash&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55feeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7561-cwe-502-deserialization-of-untrusted-e3c25dd6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7561%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shahriar0822%20The%20Next&amp;severity=high&amp;id=699f6c1ab7ef31ef0b55feef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41238-na-70c8593e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41238%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b56822f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40488-na-6c8dbf3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40488%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40487-na-b09e4017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40487%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40486-na-d46c21f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40486%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40484-na-febdc3ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40484%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cabb7ef31ef0b567e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40482-na-17ec8174</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40482%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40481-na-2b40271b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40481%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cabb7ef31ef0b567e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40477-na-117904f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40477%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40476-na-bc9ad90a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40476%3A%20n%2Fa&amp;severity=high&amp;id=699f6caab7ef31ef0b567df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40475-na-817a1e17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40475%3A%20n%2Fa&amp;severity=medium&amp;id=699f6caab7ef31ef0b567ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40474-na-26991778</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40474%3A%20n%2Fa&amp;severity=high&amp;id=699f6caab7ef31ef0b567de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40473-na-79312b5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40473%3A%20n%2Fa&amp;severity=medium&amp;id=699f6caab7ef31ef0b567de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37382-na-88875243</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37382%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563b50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-08-f12b74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7143-insecure-inherited-permissions-87f2cbaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7143%3A%20Insecure%20Inherited%20Permissions&amp;severity=medium&amp;id=691f82024f1c50aa2eb5ae92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42250-vulnerability-in-linux-linux-be1cf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42250%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42249-vulnerability-in-linux-linux-be1cf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42249%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42248-vulnerability-in-linux-linux-be1ce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42248%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42247-vulnerability-in-linux-linux-be1ce2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42247%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42246-vulnerability-in-linux-linux-be1cde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42246%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe1cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42245-vulnerability-in-linux-linux-be1cd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42245%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42244-vulnerability-in-linux-linux-be1cd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42244%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe1cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42243-vulnerability-in-linux-linux-be1cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42243%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42242-vulnerability-in-linux-linux-be1cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42242%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42241-vulnerability-in-linux-linux-be1cb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42240-vulnerability-in-linux-linux-bdccd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdccd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42239-vulnerability-in-linux-linux-be1cae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42238-vulnerability-in-linux-linux-be1caa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42237-vulnerability-in-linux-linux-be1ca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42236-vulnerability-in-linux-linux-be1ca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42235-vulnerability-in-linux-linux-be1c9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42234-vulnerability-in-linux-linux-be1c9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42233-vulnerability-in-linux-linux-be1c96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42232-vulnerability-in-linux-linux-be1c83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7355-cwe-79-improper-neutralization-of-in-4bf65675</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevart%20Organization%20chart&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7353-cwe-79-improper-neutralization-of-in-96e6f877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7353%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptipsntricks%20Accept%20Stripe%20Payments&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6522-cwe-918-server-side-request-forgery--db1d047f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6522%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Webnus%20Modern%20Events%20Calendar&amp;severity=high&amp;id=699f6c05b7ef31ef0b55f0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-43199-na-a86fd9f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-43199%3A%20n%2Fa&amp;severity=high&amp;id=699f6cd6b7ef31ef0b5696d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41432-na-e561df50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41432%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41309-na-7bca2ecd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41309%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b56837f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41308-na-50e38e66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41308%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b56837c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41252-na-9c78f490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41252%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b5682e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41249-na-019a6f29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41249%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b5682df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41248-na-664adaf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41248%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b56824b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41247-na-32e6de51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41247%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb3b7ef31ef0b568248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41245-na-96e415c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41245%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b568244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41244-na-3ff03ffd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41244%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b568241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41242-na-4e2d82c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41242%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b56823d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41241-na-00bfe885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41241%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b56823a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41240-na-79117dab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41240%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b568237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41239-na-a0767156</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41239%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b568233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41237-na-53eff7d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41237%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb3b7ef31ef0b56822b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34480-na-b9120412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34480%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c51b7ef31ef0b562871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34479-na-1a46f379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34479%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c51b7ef31ef0b56286e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42005-na-d7ea35f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42005%3A%20n%2Fa&amp;severity=critical&amp;id=690a2df6f0ba78a050537678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41991-na-97a72a0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41991%3A%20n%2Fa&amp;severity=high&amp;id=690a2df6f0ba78a050537672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41990-na-ee884608</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41990%3A%20n%2Fa&amp;severity=high&amp;id=690a2df6f0ba78a05053766c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41989-na-8a1eaf90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41989%3A%20n%2Fa&amp;severity=high&amp;id=690a2df6f0ba78a050537666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-07-f125b6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f125b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38206-cwe-918-server-side-request-forgery-ssrf-in-microsoft-microsoft-copilot-studio-aeb2b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38206%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20Copilot%20Studio&amp;severity=high&amp;id=682cd0f81484d88663aeb2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38166-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-dynamics-crm-service-portal-web-resource-aeb25d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38166%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20CRM%20Service%20Portal%20Web%20Resource&amp;severity=high&amp;id=682cd0f71484d88663aeb25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7564-cwe-22-improper-limitation-of-a-path-e2d8845e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7564%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Logsign%20Unified%20SecOps%20Platform&amp;severity=medium&amp;id=699f6c1ab7ef31ef0b55fef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7317-cwe-79-improper-neutralization-of-in-5f548584</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20galdub%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7055-cwe-122-heap-based-buffer-overflow-i-3401f42c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7055%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20FFmpeg&amp;severity=medium&amp;id=6909325735043901e830994c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5709-cwe-22-improper-limitation-of-a-path-a6b1cbc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5709%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=high&amp;id=699f6bf0b7ef31ef0b55ccfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5708-cwe-79-improper-neutralization-of-in-d8805838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5708%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=699f6bf0b7ef31ef0b55ccf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7485-cwe-79-improper-neutralization-of-in-568391ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7485%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kaizencoders%20Traffic%20Manager&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fe21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6315-cwe-434-unrestricted-upload-of-file--9ab429e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6315%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20unitecms%20Blox%20Page%20Builder&amp;severity=high&amp;id=699f6c00b7ef31ef0b55ed76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7484-cwe-434-unrestricted-upload-of-file--834d213e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7484%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20crmperks%20CRM%20Perks%20Forms%20%E2%80%93%20WordPress%20Form%20Builder&amp;severity=high&amp;id=699f6c18b7ef31ef0b55fe1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30170-na-f316f682</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30170%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28740-na-ff762cb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28740%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b5891c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28739-na-bf3d4d38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28739%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d98b7ef31ef0b5891bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42219-na-bc71b15b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42219%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42218-na-d3ebf7ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42218%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc0b7ef31ef0b568c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41616-na-e738bd41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41616%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbdb7ef31ef0b56893a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41270-na-0dbf408f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41270%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb3b7ef31ef0b5682fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41226-na-275d915b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41226%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b568198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39229-na-a0c508f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39229%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c86b7ef31ef0b565dbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39228-na-3a93aefe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39228%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c85b7ef31ef0b565d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39227-na-668bfff6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39227%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c85b7ef31ef0b565d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39226-na-5b6810bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39226%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c85b7ef31ef0b565d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39225-na-8c86b629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39225%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c85b7ef31ef0b565d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33897-na-b63922a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33897%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4ab7ef31ef0b56202b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-06-f12ccb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7397-cwe-77-improper-neutralization-of-sp-77e99038</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7397%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Korenix%20JetPort%205601v3&amp;severity=critical&amp;id=690a2e00f0ba78a050538d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7396-cwe-311-missing-encryption-of-sensit-a848a46d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7396%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Korenix%20JetPort%205601v3&amp;severity=high&amp;id=690a2dfef0ba78a050538c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7409-improper-synchronization-b40d60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7409%3A%20Improper%20Synchronization&amp;severity=high&amp;id=682d46994d7c5ea9f4b40d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7383-improper-certificate-validation-b40d5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7383%3A%20Improper%20Certificate%20Validation&amp;severity=high&amp;id=682d46994d7c5ea9f4b40d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7395-cwe-287-improper-authentication-in-k-52e29d20</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7395%3A%20CWE-287%20Improper%20Authentication%20in%20Korenix%20JetPort%205601v3&amp;severity=critical&amp;id=690a2dfef0ba78a050538c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38856-cwe-863-incorrect-authorization-in--95e53944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38856%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=high&amp;id=68f7d9b3247d717aace26a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42010-na-05aae26b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42010%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41381-na-92ea0795</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41381%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41380-na-2afa40c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41380%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41376-na-038a9551</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41376%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb7b7ef31ef0b5685da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41200-na-1709eaca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41200%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b56818a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40498-na-daafec53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40498%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40096-na-d11feeeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40096%3A%20n%2Fa&amp;severity=low&amp;id=699f6ca6b7ef31ef0b567291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-05-f12de2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-04-f125e6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f125e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6872-cwe-862-missing-authorization-in-tem-c399c9c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6872%3A%20CWE-862%20Missing%20Authorization%20in%20templatespare%20TemplateSpare%3A%20Quick%20%26%20Easy%20WordPress%20Site%20Builder%20%E2%80%93%20475%2B%20Ready-Made%20Demos%20for%20News%2C%20Blogs%2C%20eCommerce%2C%20and%20More.%20One-Click%20Import%2C%20No%20Coding%20Needed&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6709-cwe-862-missing-authorization-in-kp4-fba63230</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6709%3A%20CWE-862%20Missing%20Authorization%20in%20kp4coder%20Sync%20Post%20With%20Other%20Site&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7356-cwe-79-improper-neutralization-of-in-aa98b3db</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7356%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55fb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7257-cwe-434-unrestricted-upload-of-file--7edb2dbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7257%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20yaycommerce%20YayExtra%20%E2%80%93%20WooCommerce%20Extra%20Product%20Options&amp;severity=critical&amp;id=699f6c14b7ef31ef0b55fad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7031-cwe-862-missing-authorization-in-nin-676316d3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7031%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20File%20Manager%20Pro%20%E2%80%93%20Filester&amp;severity=high&amp;id=699f6c0eb7ef31ef0b55f7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7291-cwe-269-improper-privilege-managemen-4bfe7219</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7291%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20jetmonsters%20JetFormBuilder%20%E2%80%94%20Dynamic%20Blocks%20Form%20Builder&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-03-f12440</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f12440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3056-uncontrolled-resource-consumption-4c3b3497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3056%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=683f3b5c182aa0cae2871581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7319-exposure-of-sensitive-information-to-4da68464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7319%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=68e85c74ba0e608b4fb2ea1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7314-cwe-288-authentication-bypass-using--a0823a8f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7314%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20anji-plus%20AJ-Report&amp;severity=critical&amp;id=691f4e5938b88f02b5191676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6704-cwe-79-improper-neutralization-of-in-343666a7</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6704%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advancedcoding%20Comments%20%E2%80%93%20wpDiscuz&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f4b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38879-cwe-20-improper-input-validation-in-0179ca39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38879%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20Omnivise%20T3000%20Application%20Server%20R9.2&amp;severity=high&amp;id=690929aafe7723195e0fd668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38878-cwe-22-improper-limitation-of-a-pat-4f7ec64c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38878%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20Omnivise%20T3000%20Application%20Server%20R9.2&amp;severity=high&amp;id=690929aafe7723195e0fd664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38877-cwe-312-cleartext-storage-of-sensit-a027db85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38877%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Siemens%20Omnivise%20T3000%20Application%20Server%20R9.2&amp;severity=high&amp;id=690929a9fe7723195e0fd643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38876-cwe-552-files-or-directories-access-3f1e7a04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38876%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Siemens%20Omnivise%20T3000%20Application%20Server%20R9.2&amp;severity=high&amp;id=690929a9fe7723195e0fd63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4643-cwe-79-improper-neutralization-of-in-16b0f51a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4643%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3238-cwe-352-cross-site-request-forgery-c-ad0581f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3238%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20looks_awesome%20WordPress%20Menu%20Plugin%20%E2%80%94%20Superfly%20Responsive%20Menu&amp;severity=high&amp;id=699f6c8eb7ef31ef0b56640a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3827-cwe-79-improper-neutralization-of-in-e577b034</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3827%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Spectra%20Pro&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7389-cwe-522-insufficiently-protected-cre-0d644b6d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7389%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20wpmudev%20Forminator%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=699f6c16b7ef31ef0b55fc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6567-cwe-200-information-exposure-in-moto-48af4c85</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6567%3A%20CWE-200%20Information%20Exposure%20in%20motovnet%20Ebook%20Store&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28298-na-aa4b9c2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28298%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8cb7ef31ef0b5883c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28297-na-0cea6aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28297%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8cb7ef31ef0b5883ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42458-na-f8ae56f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42458%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc0b7ef31ef0b568c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41519-na-36881209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41519%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b5687e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41518-na-560eeb37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41518%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b5687db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41517-na-2874558e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41517%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbbb7ef31ef0b5687d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38891-na-aeb1b5aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38891%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38890-na-16bd81f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38890%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7cb7ef31ef0b564eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38889-na-5f2990e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38889%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38888-na-088667a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38888%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38887-na-3cd03308</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38887%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7ab7ef31ef0b564daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38886-na-30cb34c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38886%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7ab7ef31ef0b564da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38885-na-e254ba06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38885%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38884-na-dd01ede0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38884%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38883-na-c674b546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38883%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7ab7ef31ef0b564d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38882-na-4432f85f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38882%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7ab7ef31ef0b564d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38881-na-26e79b8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38881%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33894-na-5b361c14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33894%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4ab7ef31ef0b562024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33896-na-45df2c04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33896%3A%20n%2Fa&amp;severity=high&amp;id=690a2decf0ba78a050537188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33895-na-e278278d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33895%3A%20n%2Fa&amp;severity=medium&amp;id=690a2debf0ba78a050536f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33893-na-abb8b553</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33893%3A%20n%2Fa&amp;severity=medium&amp;id=690a2debf0ba78a050536ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33892-na-1ecf00da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33892%3A%20n%2Fa&amp;severity=medium&amp;id=690a2debf0ba78a050536ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42461-na-98b3a37d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42461%3A%20n%2Fa&amp;severity=medium&amp;id=690929a0fe7723195e0fd104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42460-na-47d40002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42460%3A%20n%2Fa&amp;severity=medium&amp;id=690929a0fe7723195e0fd100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42459-na-3765a34f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42459%3A%20n%2Fa&amp;severity=medium&amp;id=690929a0fe7723195e0fd0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-02-ebcac5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-02&amp;severity=medium&amp;id=682b7badd3ddd8cef2ebcac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-02-f12d53</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39626-improper-neutralization-of-input-du-6d913b17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39626%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rob%20%40%205%20Star%20Plugins%20Pretty%20Simple%20Popup%20Builder&amp;severity=null&amp;id=69cd7467e6bfc5ba1def712c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39631-improper-neutralization-of-input-du-5d4f6a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39631%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd7467e6bfc5ba1def712f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39646-improper-neutralization-of-input-du-055ee8e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kunal%20Custom%20404%20Pro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39647-improper-neutralization-of-input-du-328e4e74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39647%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kofi%20Mokome%20Message%20Filter%20for%20Contact%20Form%207&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39649-improper-neutralization-of-input-du-0bc1e78a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39649%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPDeveloper%20Essential%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7469e6bfc5ba1def717b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39663-improper-neutralization-of-input-du-6acd1ae9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39663%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Epsiloncool%20WP%20Fast%20Total%20Search&amp;severity=null&amp;id=69cd7469e6bfc5ba1def7181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39637-server-side-request-forgery-ssrf-in-25f3dafc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39637%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pixelcurve%20Edubin&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39619-improper-limitation-of-a-pathname-t-072cf3fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39619%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7465e6bfc5ba1def70b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39621-improper-limitation-of-a-pathname-t-b9dacdb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39621%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39624-improper-limitation-of-a-pathname-t-6eebe1b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39624%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20CridioStudio%20ListingPro&amp;severity=null&amp;id=69cd7467e6bfc5ba1def7129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7211-url-redirection-to-untrusted-site-open-redirect-in-1e-1e-platform-aeb1a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7211%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%201E%201E%20Platform&amp;severity=medium&amp;id=682cd0f71484d88663aeb1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6040-cwe-352-cross-site-request-forgery-c-5bf547ce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6040%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20parisneo%20parisneo%2Flollms&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41946-cwe-400-uncontrolled-resource-consu-50eb36d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41946%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20rexml&amp;severity=medium&amp;id=6909214efe7723195e05458e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41123-cwe-400-uncontrolled-resource-consu-691c5f63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41123%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20rexml&amp;severity=medium&amp;id=6909214efe7723195e054586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6923-vulnerability-in-python-software-fou-2d47a884</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6923%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=6909325735043901e830993b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2455-cwe-79-improper-neutralization-of-in-5a6ec579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BDThemes%20Element%20Pack%20Pro%20-%20Addon%20for%20Elementor%20Page%20Builder%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6dafb7ef31ef0b58abed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6346-cwe-79-improper-neutralization-of-in-6a3757c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6346%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Gutenberg%20Blocks%2C%20Page%20Builder%20%E2%80%93%20ComboBlocks&amp;severity=medium&amp;id=699f6c02b7ef31ef0b55ee98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7302-cwe-79-improper-neutralization-of-in-887aeb46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=699f6c14b7ef31ef0b55faf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2090-cwe-918-server-side-request-forgery--7bc75352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2090%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20doublesharp%20Remote%20Content%20Shortcode&amp;severity=medium&amp;id=699f6da4b7ef31ef0b589c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6698-cwe-862-missing-authorization-in-xpe-1a86f38d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6698%3A%20CWE-862%20Missing%20Authorization%20in%20xpeedstudio%20FundEngine%20%E2%80%93%20Donation%20and%20Crowdfunding%20Platform&amp;severity=high&amp;id=699f6c0ab7ef31ef0b55f4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6687-cwe-200-information-exposure-in-limp-d08fc6dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6687%3A%20CWE-200%20Information%20Exposure%20in%20limpinho%20CTT%20Expresso%20para%20WooCommerce&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34021-unrestricted-upload-of-file-with-da-12b6431d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34021%3A%20Unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20ELECOM%20CO.%2CLTD.%20WRC-1167GST2&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41265-na-fdacae7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41265%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b5682f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41264-na-d187f8de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41264%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b5682f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41259-na-ca99842b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41259%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb3b7ef31ef0b5682ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41260-na-c49a3469</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41260%3A%20n%2Fa&amp;severity=high&amp;id=69403b19d9bcdf3f3dec91be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-08-01-f123a1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-08-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f123a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38182-cwe-1390-weak-authentication-in-microsoft-dynamics-365-field-service-on-premises-v7-series-bdb9e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38182%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Dynamics%20365%20Field%20Service%20(on-premises)%20v7%20series&amp;severity=critical&amp;id=682d981ec4522896dcbdb9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6208-cwe-79-improper-neutralization-of-in-e32d7aa5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7135-cwe-862-missing-authorization-in-leo-44a02b5f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7135%3A%20CWE-862%20Missing%20Authorization%20in%20leogermani%20Tainacan&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6725-cwe-79-improper-neutralization-of-in-111509fd</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%20Plugin%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f4c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2508-cwe-862-missing-authorization-in-tak-6b0bb3d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2508%3A%20CWE-862%20Missing%20Authorization%20in%20takanakui%20WP%20Mobile%20Menu%20%E2%80%93%20The%20Mobile-Friendly%20Responsive%20Menu&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6770-cwe-79-improper-neutralization-of-in-3bd0dd6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vikasratudi%20Lifetime%20free%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20for%20WordPress%20VForm&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39950-cwe-121-stack-based-buffer-overflow-19724f0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39950%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dahua%20NVR4XXX%20and%20IPC-HX8XXX&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39949-cwe-617-reachable-assertion-in-dahu-a77a4d61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39949%3A%20CWE-617%20Reachable%20Assertion%20in%20Dahua%20NVR4XXX&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39948-cwe-476-null-pointer-dereference-in-e893c207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39948%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Dahua%20NVR4XXX&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39944-cwe-770-allocation-of-resources-wit-c2f51c6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39944%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Dahua%20IPC-HX8XXX%20and%20NVR4XXX&amp;severity=high&amp;id=68e0f3c5b66c7f7acdd3ea4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42381-na-9e50e72e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42381%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41630-na-7cd9ca40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41630%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbdb7ef31ef0b56895e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41262-na-2fd753a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41262%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b5682f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41255-na-adaae689</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41255%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b5682ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41254-na-fae38b0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41254%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb3b7ef31ef0b5682e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41253-na-7682a2ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41253%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb3b7ef31ef0b5682e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40465-na-34bf4fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40465%3A%20n%2Fa&amp;severity=high&amp;id=699f6caab7ef31ef0b567ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40464-na-0138d7e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40464%3A%20n%2Fa&amp;severity=high&amp;id=699f6caab7ef31ef0b567dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-31-edb91980</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-31&amp;severity=medium&amp;id=68367c99182aa0cae2321905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-31-7564ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-31&amp;severity=medium&amp;id=682c7abde3e6de8ceb7564ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-07-31-84cf1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-07-31&amp;severity=medium&amp;id=682b68eed14de609c884cf1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-31-f1275c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f1275c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5901-cwe-79-improper-neutralization-of-in-70c7084b</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5901%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7297-cwe-913-improper-control-of-dynamica-f0a34040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7297%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources&amp;severity=high&amp;id=69c6acf53c064ed76fc0f152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mid-year-doppelganger-information-operations-in-eu-07880b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Mid-year%20Doppelganger%20information%20operations%20in%20Europe%20and%20the%20US&amp;severity=medium&amp;id=6894a3f5ad5a09ad00f9f535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42231-vulnerability-in-linux-linux-be1c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42230-vulnerability-in-linux-linux-be1c6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42229-vulnerability-in-linux-linux-be1c66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42228-vulnerability-in-linux-linux-be1c5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42228%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42227-vulnerability-in-linux-linux-be1c4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42225-vulnerability-in-linux-linux-be1c45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42224-vulnerability-in-linux-linux-aec027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42223-vulnerability-in-linux-linux-aec025</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42162-vulnerability-in-linux-linux-aec018</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42161-vulnerability-in-linux-linux-be1c3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42160-vulnerability-in-linux-linux-be1c35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42159-vulnerability-in-linux-linux-aeb054</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42158-vulnerability-in-linux-linux-be1c2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42157-vulnerability-in-linux-linux-be1c02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42157%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42156-vulnerability-in-linux-linux-aeb052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42156%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42155-vulnerability-in-linux-linux-be1bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42155%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42154-vulnerability-in-linux-linux-be1bf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42154%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42153-vulnerability-in-linux-linux-be1bf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42152-vulnerability-in-linux-linux-be1be8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42151-vulnerability-in-linux-linux-be1be0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42150-vulnerability-in-linux-linux-bdcccd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42149-vulnerability-in-linux-linux-be1bd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42148-vulnerability-in-linux-linux-be1bc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42147-vulnerability-in-linux-linux-be1bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42146-vulnerability-in-linux-linux-be1bb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42145-vulnerability-in-linux-linux-be1b97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42144-vulnerability-in-linux-linux-be1b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42142-vulnerability-in-linux-linux-be1b7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42141-vulnerability-in-linux-linux-bdccb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdccb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42140-vulnerability-in-linux-linux-bdccad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdccad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42139-vulnerability-in-linux-linux-be1b76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42138-vulnerability-in-linux-linux-be1b6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42137-vulnerability-in-linux-linux-be1b66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42136-vulnerability-in-linux-linux-aec016</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42135-vulnerability-in-linux-linux-be1b5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42134-vulnerability-in-linux-linux-be1b4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42133-vulnerability-in-linux-linux-bdcca9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42132-vulnerability-in-linux-linux-bdcca3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdcca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42131-vulnerability-in-linux-linux-be1b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42130-vulnerability-in-linux-linux-be1b3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42130&amp;severity=null&amp;id=682d9827c4522896dcbe1b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42129-vulnerability-in-linux-linux-be1b1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42128-vulnerability-in-linux-linux-be1b19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42127-vulnerability-in-linux-linux-be1b15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42126-vulnerability-in-linux-linux-aec014</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42125-vulnerability-in-linux-linux-aeb050</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42124-vulnerability-in-linux-linux-be1b11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1b11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42123-vulnerability-in-linux-linux-be1b0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42122-vulnerability-in-linux-linux-be1b09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42121-vulnerability-in-linux-linux-be1b07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42120-vulnerability-in-linux-linux-be1b03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42119-vulnerability-in-linux-linux-be1b01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42118-vulnerability-in-linux-linux-be1af2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42117-vulnerability-in-linux-linux-be1ad3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42115-vulnerability-in-linux-linux-be1acf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42115%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42114-vulnerability-in-linux-linux-be1acb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42113-vulnerability-in-linux-linux-be1ac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42112-vulnerability-in-linux-linux-bdcc9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdcc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42111-vulnerability-in-linux-linux-bddf92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42110-vulnerability-in-linux-linux-be1ab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42109-vulnerability-in-linux-linux-bddf8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42108-vulnerability-in-linux-linux-be1ab0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42107-vulnerability-in-linux-linux-be1aaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42106-vulnerability-in-linux-linux-be1aa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42105-vulnerability-in-linux-linux-be1aa2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42104-vulnerability-in-linux-linux-be1a93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42103-vulnerability-in-linux-linux-be1a69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1a69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42102-vulnerability-in-linux-linux-bddf8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42101-vulnerability-in-linux-linux-be1a61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42100-vulnerability-in-linux-linux-bddf66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42099-vulnerability-in-linux-linux-be1a59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52888-vulnerability-in-linux-linux-be7847</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7100-cwe-79-improper-neutralization-of-in-c9cfc46f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7100%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6c0fb7ef31ef0b55f844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41611-na-f3f10b9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41611%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbcb7ef31ef0b5688e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41610-na-0b8101b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41610%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbcb7ef31ef0b5688e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41440-na-7a7e6865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41440%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b568671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41439-na-1d2a1fc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41439%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b568669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41438-na-2ce53c49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41438%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b568660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41305-na-10b1e20d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41305%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b568376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41304-na-97c1679e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41304%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb5b7ef31ef0b568370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40094-na-47e59813</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40094%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39012-na-e6d99a63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39012%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39011-na-5b5606b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39011%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39010-na-b829e542</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39010%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38986-na-382a477d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38986%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7eb7ef31ef0b565024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38984-na-fe9bf447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38984%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7eb7ef31ef0b565021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38983-na-982949b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38983%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7eb7ef31ef0b56501e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36572-na-0e18cd19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36572%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b5636ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-30-f11f7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40777-processing-a-maliciously-crafted-fi-59a2df0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40777%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a3b52ff58c9332ff0743e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40798-an-app-may-be-able-to-read-safaris--4b4a8bcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40798%3A%20An%20app%20may%20be%20able%20to%20read%20Safari&apos;s%20browsing%20history%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a3b53ff58c9332ff074f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27888-an-app-may-be-able-to-modify-protec-9df35ded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27888%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb827e6bfc5ba1df6e909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40809-a-shortcut-may-be-able-to-bypass-in-29a1c997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40809%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20Internet%20permission%20requirements%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b55ff58c9332ff078da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27871-an-app-may-be-able-to-access-protec-501cc9bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27871%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27826-an-app-may-be-able-to-execute-arbit-5ebdd1e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27826%3A%20A%20local%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20shutdown%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b65ff58c9332ff09eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40833-a-shortcut-may-be-able-to-use-sensi-f49a489b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40833%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b58ff58c9332ff08a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40794-private-browsing-tabs-may-be-access-5bcab21e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40794%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2df0f0ba78a0505373f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27884-an-app-may-be-able-to-access-user-s-0c919c1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27884%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb827e6bfc5ba1df6e8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40813-an-attacker-with-physical-access-ma-3aa567ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40813%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b55ff58c9332ff0790c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40805-an-app-may-be-able-to-bypass-privac-8f20c03a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40805%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b55ff58c9332ff078a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40782-processing-maliciously-crafted-web--c49ab4f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40782%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=critical&amp;id=690a2deef0ba78a05053724f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40829-an-attacker-may-be-able-to-view-res-971b556c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40829%3A%20An%20attacker%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b57ff58c9332ff079dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40828-a-malicious-app-may-be-able-to-gain-24bbd6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40828%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b57ff58c9332ff079d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40783-a-malicious-application-may-be-able-bfe27f71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40783%3A%20A%20malicious%20application%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b52ff58c9332ff07465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40804-a-malicious-application-may-be-able-dbc6030c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40804%3A%20A%20malicious%20application%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b55ff58c9332ff078a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40812-a-shortcut-may-be-able-to-bypass-in-42f7e8c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40812%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20Internet%20permission%20requirements%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b55ff58c9332ff078f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40795-an-app-may-be-able-to-read-sensitiv-65dd1fae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40795%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a3b53ff58c9332ff074da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40832-an-app-may-be-able-to-view-a-contac-a31304ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40832%3A%20An%20app%20may%20be%20able%20to%20view%20a%20contact&apos;s%20phone%20number%20in%20system%20logs%20in%20Apple%20macOS&amp;severity=low&amp;id=690a3b57ff58c9332ff079eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40824-an-app-may-be-able-to-bypass-privac-d12017ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40824%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b57ff58c9332ff079b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40776-processing-maliciously-crafted-web--423c9fa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40776%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2deef0ba78a050537219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40799-processing-a-maliciously-crafted-fi-e35d5cd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40799%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b53ff58c9332ff07504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40815-a-malicious-attacker-with-arbitrary-99db09a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40815%3A%20A%20malicious%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b55ff58c9332ff07914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27882-an-app-may-be-able-to-modify-protec-5b22d8b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27882%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40803-an-attacker-may-be-able-to-cause-un-1a35dddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40803%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b53ff58c9332ff07534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40784-processing-a-maliciously-crafted-fi-7f73a6ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40784%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b52ff58c9332ff07470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27877-processing-a-maliciously-crafted-fi-7e2b2daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27877%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40788-a-local-attacker-may-be-able-to-cau-04027454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40788%3A%20A%20local%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20shutdown%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b53ff58c9332ff074ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40823-an-app-may-be-able-to-access-user-s-4e18226f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40823%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b57ff58c9332ff079ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40835-a-shortcut-may-be-able-to-use-sensi-d638a64a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40835%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b58ff58c9332ff08ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40834-a-shortcut-may-be-able-to-bypass-se-0ee0b78a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40834%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20sensitive%20Shortcuts%20app%20settings%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b58ff58c9332ff08aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40822-an-attacker-with-physical-access-to-2a4b4e3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40822%3A%20An%20attacker%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a3b57ff58c9332ff079a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40789-processing-maliciously-crafted-web--316f5e91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40789%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2df0f0ba78a0505373d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40818-an-attacker-with-physical-access-ma-cb088d17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40818%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b57ff58c9332ff07984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40785-processing-maliciously-crafted-web--d5d42b50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40785%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20a%20cross%20site%20scripting%20attack%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2deef0ba78a050537260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40802-a-local-attacker-may-be-able-to-ele-61183b2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40802%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b53ff58c9332ff07529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40814-an-app-may-be-able-to-bypass-privac-d004b1c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40814%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2df0f0ba78a050537410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27883-an-app-may-be-able-to-modify-protec-b237e8ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27883%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40793-an-app-may-be-able-to-access-user-s-c3a30bb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40793%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b53ff58c9332ff074c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40786-an-attacker-may-be-able-to-view-sen-0e3f3f4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40786%3A%20An%20attacker%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b52ff58c9332ff07487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40817-visiting-a-website-that-frames-mali-83fa7ce2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40817%3A%20Visiting%20a%20website%20that%20frames%20malicious%20content%20may%20lead%20to%20UI%20spoofing%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a3b57ff58c9332ff07976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40821-third-party-app-extensions-may-not--4c30a3d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40821%3A%20Third%20party%20app%20extensions%20may%20not%20receive%20the%20correct%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b57ff58c9332ff07995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27863-a-local-attacker-may-be-able-to-det-19cad8d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27863%3A%20A%20local%20attacker%20may%20be%20able%20to%20determine%20kernel%20memory%20layout%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b65ff58c9332ff09f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27862-enabling-lockdown-mode-while-settin-2a7832e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27862%3A%20Enabling%20Lockdown%20Mode%20while%20setting%20up%20a%20Mac%20may%20cause%20FileVault%20to%20become%20unexpectedly%20disabled%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b65ff58c9332ff09f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27823-an-attacker-in-a-privileged-network-56b10f1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27823%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20spoof%20network%20packets%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b65ff58c9332ff09e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40836-a-shortcut-may-be-able-to-use-sensi-44722414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40836%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b58ff58c9332ff08ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27881-an-app-may-be-able-to-access-inform-0a95eda2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27881%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user%E2%80%99s%20contacts%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40816-a-local-attacker-may-be-able-to-cau-20e35c18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40816%3A%20A%20local%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20shutdown%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b55ff58c9332ff07925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27878-an-app-with-root-privileges-may-be--dbb16fe6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27878%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40800-an-app-may-be-able-to-modify-protec-7ddb6acd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40800%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b53ff58c9332ff0751d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40787-a-shortcut-may-be-able-to-bypass-in-42029b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40787%3A%20A%20shortcut%20may%20be%20able%20to%20bypass%20Internet%20permission%20requirements%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a3b53ff58c9332ff0749c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23261-an-attacker-may-be-able-to-read-inf-bc4de96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23261%3A%20An%20attacker%20may%20be%20able%20to%20read%20information%20belonging%20to%20another%20user%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b61ff58c9332ff0943c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40827-an-app-may-be-able-to-overwrite-arb-08579866</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40827%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b57ff58c9332ff079c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27873-processing-a-maliciously-crafted-vi-0220c3bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27873%3A%20Processing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40775-an-app-may-be-able-to-leak-sensitiv-a3c36148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40775%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b52ff58c9332ff07433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27853-a-maliciously-crafted-zip-archive-m-6c416bee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27853%3A%20A%20maliciously%20crafted%20ZIP%20archive%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb825e6bfc5ba1df6e81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40780-processing-maliciously-crafted-web--3cc3742c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40780%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2deef0ba78a05053723d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40807-a-shortcut-may-be-able-to-use-sensi-4d13566b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40807%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b55ff58c9332ff078cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40811-an-app-may-be-able-to-modify-protec-94371756</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40811%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b55ff58c9332ff078f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27886-an-unprivileged-app-may-be-able-to--48cdacfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27886%3A%20An%20unprivileged%20app%20may%20be%20able%20to%20log%20keystrokes%20in%20other%20apps%20including%20those%20using%20secure%20input%20mode%20in%20Apple%20macOS&amp;severity=high&amp;id=690a2de9f0ba78a050536ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40796-private-browsing-may-leak-some-brow-46ca447a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40796%3A%20Private%20browsing%20may%20leak%20some%20browsing%20history%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b53ff58c9332ff074e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40779-processing-maliciously-crafted-web--7440a890</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40779%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20an%20unexpected%20process%20crash%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a2deef0ba78a05053722b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40778-photos-in-the-hidden-photos-album-m-660f4982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40778%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a3b52ff58c9332ff0744f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27887-an-app-may-be-able-to-access-user-s-4f15bcff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27887%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb827e6bfc5ba1df6e904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40806-processing-a-maliciously-crafted-fi-fa68d8ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40806%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b55ff58c9332ff078b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40781-a-local-attacker-may-be-able-to-ele-56168dc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40781%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a3b52ff58c9332ff0745a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40774-an-app-may-be-able-to-bypass-privac-79e89982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40774%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a3b52ff58c9332ff0741f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27872-an-app-may-be-able-to-access-protec-987ef017</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27872%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a3b67ff58c9332ff0a52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27809-an-app-may-be-able-to-access-user-s-e2c8f4c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27809%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81fe6bfc5ba1df6e5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3219-vulnerability-in-python-software-foundation-cpython-beb7bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3219%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=682d9837c4522896dcbeb7bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7252-cwe-59-improper-link-resolution-befo-15e8169b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7252%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Comodo%20Internet%20Security%20Pro&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7251-cwe-59-improper-link-resolution-befo-0019e000</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7251%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Comodo%20Internet%20Security%20Pro&amp;severity=high&amp;id=699f6c14b7ef31ef0b55fad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7250-cwe-59-improper-link-resolution-befo-a580ae4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7250%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Comodo%20Internet%20Security%20Pro&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7249-cwe-59-improper-link-resolution-befo-b4eb2963</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7249%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Comodo%20Firewall&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7248-cwe-22-improper-limitation-of-a-path-d5e62a43</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7248%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Comodo%20Internet%20Security%20Pro&amp;severity=high&amp;id=699f6c12b7ef31ef0b55fa22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42098-vulnerability-in-linux-linux-be1a51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42097-vulnerability-in-linux-linux-be1a49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42096-vulnerability-in-linux-linux-be1a45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9827c4522896dcbe1a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42095-vulnerability-in-linux-linux-bddf60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42094-vulnerability-in-linux-linux-be1a41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42093-vulnerability-in-linux-linux-aec012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42092-vulnerability-in-linux-linux-be1a34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1a34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42091-vulnerability-in-linux-linux-be1a30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42090-vulnerability-in-linux-linux-be1a2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42089-vulnerability-in-linux-linux-be19fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42088-vulnerability-in-linux-linux-be19f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42087-vulnerability-in-linux-linux-be19f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42086-vulnerability-in-linux-linux-be19f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42085-vulnerability-in-linux-linux-be19ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42084-vulnerability-in-linux-linux-be19dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42083-vulnerability-in-linux-linux-be19d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe19d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42082-vulnerability-in-linux-linux-be19d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42081-vulnerability-in-linux-linux-be19cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42080-vulnerability-in-linux-linux-be19bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe19bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42079-vulnerability-in-linux-linux-be199b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe199b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42078-vulnerability-in-linux-linux-be1999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42077-vulnerability-in-linux-linux-be1995</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42076-vulnerability-in-linux-linux-be1993</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42075-vulnerability-in-linux-linux-be1984</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42074-vulnerability-in-linux-linux-be197c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe197c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42073-vulnerability-in-linux-linux-be1974</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42072-vulnerability-in-linux-linux-be1970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42071-vulnerability-in-linux-linux-be196c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe196c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42070-vulnerability-in-linux-linux-be195f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe195f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42069-vulnerability-in-linux-linux-be1940</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42068-vulnerability-in-linux-linux-be1931</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42067-vulnerability-in-linux-linux-be1929</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42066-vulnerability-in-linux-linux-be1923</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42065-vulnerability-in-linux-linux-be191f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe191f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42064-vulnerability-in-linux-linux-be1917</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42063-vulnerability-in-linux-linux-be190f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe190f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52887-vulnerability-in-linux-linux-be7843</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41098-vulnerability-in-linux-linux-be18d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41097-vulnerability-in-linux-linux-bddf5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41096-vulnerability-in-linux-linux-be18ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41095-vulnerability-in-linux-linux-be18c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe18c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41094-vulnerability-in-linux-linux-be18be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41093-vulnerability-in-linux-linux-be18b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41092-vulnerability-in-linux-linux-be18b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41089-vulnerability-in-linux-linux-be189d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe189d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41088-vulnerability-in-linux-linux-be188c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe188c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41087-vulnerability-in-linux-linux-be186b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe186b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41086-vulnerability-in-linux-linux-be1867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41085-vulnerability-in-linux-linux-be185f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41085%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe185f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41084-vulnerability-in-linux-linux-be185b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41084%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe185b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41083-vulnerability-in-linux-linux-be1857</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41082-vulnerability-in-linux-linux-be1853</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41081-vulnerability-in-linux-linux-aec010</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41080-vulnerability-in-linux-linux-be1846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41079-vulnerability-in-linux-linux-be1842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41078-vulnerability-in-linux-linux-be183e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe183e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41077-vulnerability-in-linux-linux-be182f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe182f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41076-vulnerability-in-linux-linux-be180a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe180a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41075-vulnerability-in-linux-linux-aec00e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec00e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41074-vulnerability-in-linux-linux-aec00c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41073-vulnerability-in-linux-linux-be1804</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41072-vulnerability-in-linux-linux-be1800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41070-vulnerability-in-linux-linux-aec00a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aec00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41069-vulnerability-in-linux-linux-be17fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe17fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41068-vulnerability-in-linux-linux-be17f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe17f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41067-vulnerability-in-linux-linux-be17eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe17eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41066-vulnerability-in-linux-linux-be17e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe17e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41065-vulnerability-in-linux-linux-be17e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe17e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41064-vulnerability-in-linux-linux-aec008</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41063-vulnerability-in-linux-linux-be17d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe17d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41062-vulnerability-in-linux-linux-be17ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe17ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41061-vulnerability-in-linux-linux-be17ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe17ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41060-vulnerability-in-linux-linux-be179c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe179c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41059-vulnerability-in-linux-linux-aec006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aec006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41058-vulnerability-in-linux-linux-be1798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41057-vulnerability-in-linux-linux-be1790</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41056-vulnerability-in-linux-linux-be178c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe178c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41055-vulnerability-in-linux-linux-bddf54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41054-vulnerability-in-linux-linux-be1788</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41053-vulnerability-in-linux-linux-be1784</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41052-vulnerability-in-linux-linux-be1775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41051-vulnerability-in-linux-linux-be176d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41050-vulnerability-in-linux-linux-be1765</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41049-vulnerability-in-linux-linux-bddf50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41048-vulnerability-in-linux-linux-be1748</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41047-vulnerability-in-linux-linux-bddf4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41046-vulnerability-in-linux-linux-be1744</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41045-vulnerability-in-linux-linux-be1737</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41044-vulnerability-in-linux-linux-be1733</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41043-vulnerability-in-linux-linux-be172f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe172f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41042-vulnerability-in-linux-linux-be1720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41041-vulnerability-in-linux-linux-be1718</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41040-vulnerability-in-linux-linux-bddf3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41039-vulnerability-in-linux-linux-be1710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41038-vulnerability-in-linux-linux-be1708</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41037-vulnerability-in-linux-linux-be1700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41036-vulnerability-in-linux-linux-bddf3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41035-vulnerability-in-linux-linux-bddf37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41034-vulnerability-in-linux-linux-be16e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41033-vulnerability-in-linux-linux-be16dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe16dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41032-vulnerability-in-linux-linux-be16d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41031-vulnerability-in-linux-linux-be16cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41030-vulnerability-in-linux-linux-be16c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe16c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41029-vulnerability-in-linux-linux-be16c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41028-vulnerability-in-linux-linux-be16bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41027-vulnerability-in-linux-linux-be16bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41026-vulnerability-in-linux-linux-be16b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41025-vulnerability-in-linux-linux-be16b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe16b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41023-vulnerability-in-linux-linux-bddf33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41022-vulnerability-in-linux-linux-be1696</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41021-vulnerability-in-linux-linux-be1692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41020-vulnerability-in-linux-linux-be168e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe168e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6124-cwe-79-improper-neutralization-of-in-52fa762a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6124%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20Hubshare&amp;severity=high&amp;id=699c2930be58cf853b7275ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6881-cwe-79-improper-neutralization-of-in-9c953ad9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6881%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20Hubshare&amp;severity=high&amp;id=699c3035be58cf853b75f113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41019-vulnerability-in-linux-linux-be168a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe168a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41018-vulnerability-in-linux-linux-bddf0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41017-vulnerability-in-linux-linux-be1686</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41016-vulnerability-in-linux-linux-be1682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41015-vulnerability-in-linux-linux-be1675</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41014-vulnerability-in-linux-linux-be1671</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41013-vulnerability-in-linux-linux-be166d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe166d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41091-vulnerability-in-linux-linux-be18b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41090-vulnerability-in-linux-linux-be18ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe18ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28806-na-bdb12092</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28806%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b58923a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28804-na-d7aaf5f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28804%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b589237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41640-na-4a4e0d72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41640%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbeb7ef31ef0b5689e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41637-na-70fe824a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41637%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbdb7ef31ef0b568963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41624-na-0aa74b8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41624%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbdb7ef31ef0b56894f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40576-na-774f5cb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40576%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b568048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37859-na-bce2bf2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37859%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c72b7ef31ef0b5641a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37858-na-df66d889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37858%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c72b7ef31ef0b5641a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37857-na-fbb1648a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37857%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b56419b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37856-na-679159f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37856%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c72b7ef31ef0b564196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33365-na-b68bc24f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33365%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b5618cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-29-f12079</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42055-na-7b478a52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42055%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc0b7ef31ef0b568c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42054-na-e83d8274</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42054%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc0b7ef31ef0b568c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42053-na-49356024</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42053%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42051-na-5e46ef02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42051%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42050-na-c99cd946</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42050%3A%20n%2Fa&amp;severity=high&amp;id=699f6cc0b7ef31ef0b568c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42049-na-b3d1e648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42049%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cc0b7ef31ef0b568c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-28-eaf6f265</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-28&amp;severity=medium&amp;id=68367c99182aa0cae2324148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6703-cwe-79-improper-neutralization-of-in-8eb1f22e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6518-cwe-79-improper-neutralization-of-in-89378a3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6518%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55f024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6520-cwe-79-improper-neutralization-of-in-0b9c14aa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6520%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6897-cwe-79-improper-neutralization-of-in-a05dca29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6897%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20aThemes%20Starter%20Sites&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6521-cwe-79-improper-neutralization-of-in-e61c97f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6627-cwe-79-improper-neutralization-of-in-0f8d26f0</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5614-cwe-200-information-exposure-in-piot-9421a337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5614%3A%20CWE-200%20Information%20Exposure%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6458-cwe-862-missing-authorization-in-wcp-d99c8354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6458%3A%20CWE-862%20Missing%20Authorization%20in%20wcproducttable%20WooCommerce%20Product%20Table%20Lite&amp;severity=medium&amp;id=699f6c03b7ef31ef0b55ef71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6569-cwe-200-information-exposure-in-vibh-b2facee8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6569%3A%20CWE-200%20Information%20Exposure%20in%20vibhorchhabra%20Campaign%20Monitor%20for%20WordPress&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5969-cwe-20-improper-input-validation-in--01dc245f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5969%3A%20CWE-20%20Improper%20Input%20Validation%20in%20CodeRevolution%20Aiomatic%20-%20Automatic%20AI%20Content%20Writer%20%26%20Editor%2C%20GPT-3%20%26%20GPT-4%2C%20ChatGPT%20ChatBot%20%26%20AI%20Toolkit&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6546-cwe-200-information-exposure-in-coff-da152b11</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6546%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20One%20Click%20Close%20Comments&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6634-cwe-79-improper-neutralization-of-in-87792280</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wibergsweb%20Master%20Currency%20WP&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6661-cwe-79-improper-neutralization-of-in-11ff8cd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6661%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paritydiscounts%20ParityPress%20%E2%80%93%20Parity%20Pricing%20with%20Discount%20Rules&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6566-cwe-200-information-exposure-in-aram-1bd51f86</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6566%3A%20CWE-200%20Information%20Exposure%20in%20aramex%20Aramex%20Shipping%20WooCommerce&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6549-cwe-200-information-exposure-in-coff-087d8c3a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6549%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Admin%20Post%20Navigation&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6573-cwe-200-information-exposure-in-tomd-27389df0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6573%3A%20CWE-200%20Information%20Exposure%20in%20tomdude%20Intelligence&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6545-cwe-200-information-exposure-in-coff-b31bc87c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6545%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Admin%20Trim%20Interface&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6431-cwe-434-unrestricted-upload-of-file--ffc43f8c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6431%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20mnetadmanager%20Media.net%20Ads%20Manager&amp;severity=high&amp;id=699f6c03b7ef31ef0b55ef4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6591-cwe-862-missing-authorization-in-nit-6b00851d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6591%3A%20CWE-862%20Missing%20Authorization%20in%20nitesh_singh%20Ultimate%20WordPress%20Auction%20Plugin&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6548-cwe-200-information-exposure-in-coff-b71c0125</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6548%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Add%20Admin%20JavaScript&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6152-cwe-502-deserialization-of-untrusted-9d74040f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6152%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wptexture%20Flipbox%20Builder&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1798-cwe-862-missing-authorization-in-the-6c7a37dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1798%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20Migration%20Tool&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1804-cwe-862-missing-authorization-in-the-543ef121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1804%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20Migration%20Tool&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4410-cwe-862-missing-authorization-in-ign-a86e0649</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4410%3A%20CWE-862%20Missing%20Authorization%20in%20ignitionwp%20IgnitionDeck%20Crowdfunding%20Platform&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b55680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6547-cwe-200-information-exposure-in-coff-8cd24728</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6547%3A%20CWE-200%20Information%20Exposure%20in%20coffee2code%20Add%20Admin%20CSS&amp;severity=medium&amp;id=699f6c05b7ef31ef0b55f0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42029-na-5e612b9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42029%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc0b7ef31ef0b568bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-27-f12329</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7128-exposure-of-sensitive-information-to-an-unauthorized-actor-aec7f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7128%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682cd0fb1484d88663aec7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38522-cwe-444-inconsistent-interpretation-1ff33e4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38522%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69092633fe7723195e0b6175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35296-cwe-20-improper-input-validation-in-9de0e0dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35296%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=69092624fe7723195e0b47cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35161-cwe-444-inconsistent-interpretation-d66e11a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35161%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=critical&amp;id=69092624fe7723195e0b47c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4447-cwe-863-incorrect-authorization-in-d-d36251b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4447%3A%20CWE-863%20Incorrect%20Authorization%20in%20dotCMS%20dotCMS%20core&amp;severity=critical&amp;id=697b39a8ac063202227f4977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27358-na-f843e5cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27358%3A%20n%2Fa&amp;severity=low&amp;id=699f6d7bb7ef31ef0b576c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27357-na-4466b308</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27357%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7bb7ef31ef0b576c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26520-na-9de75706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26520%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d79b7ef31ef0b572b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24257-na-eddfb7b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24257%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b5708f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42007-na-fa918c05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42007%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cc0b7ef31ef0b568bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41628-na-49ddb8c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41628%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbdb7ef31ef0b568953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41375-na-3c3646d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41375%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41374-na-bd913380</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41374%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41373-na-111d4883</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41373%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b5685d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41356-na-96de028b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41356%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb7b7ef31ef0b56856e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41354-na-49ea9662</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41354%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb7b7ef31ef0b56856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41353-na-b0f92eb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41353%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb7b7ef31ef0b568568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40433-na-8cefea14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40433%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca9b7ef31ef0b567d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40117-na-d55e93c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40117%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca6b7ef31ef0b56729c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41355-na-01ad5ab1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41355%3A%20n%2Fa&amp;severity=medium&amp;id=698f5609c9e1ff5ad84b62b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-26-f12c00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38103-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-microsoft-edge-chromium-based-bdb306</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38103%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d981dc4522896dcbdb306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6558-cwe-79-cross-site-scripting-in-hms-industrial-networks-anybus-compactcom-30-bed333</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6558%3A%20CWE-79%20Cross-site%20Scripting%20in%20HMS%20Industrial%20Networks%20Anybus-CompactCom%2030&amp;severity=medium&amp;id=682d983ac4522896dcbed333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6589-cwe-98-improper-control-of-filename--061c28cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6589%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=high&amp;id=699f6c08b7ef31ef0b55f2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41706-na-152967f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41706%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41705-na-5fea75e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41705%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbeb7ef31ef0b568a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41473-na-c4f54866</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41473%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb9b7ef31ef0b568739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41468-na-e74fd35f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41468%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb9b7ef31ef0b568736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40324-na-f6f6e6cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40324%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca6b7ef31ef0b56731f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40318-na-44c1ef15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40318%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca6b7ef31ef0b567319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38289-na-ee7da981</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38289%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c79b7ef31ef0b564c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38288-na-5f9e597e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38288%3A%20n%2Fa&amp;severity=high&amp;id=699f6c78b7ef31ef0b564bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38287-na-76a4c815</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38287%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c78b7ef31ef0b564bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-25-f1226b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f1226b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7079-missing-authentication-for-critical--257a8b68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7079%3A%20Missing%20Authentication%20for%20Critical%20Function&amp;severity=medium&amp;id=6835f9e9182aa0cae21d0f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45249-cwe-1393-in-acronis-acronis-cyber-i-8d49948d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45249%3A%20CWE-1393%20in%20Acronis%20Acronis%20Cyber%20Infrastructure&amp;severity=critical&amp;id=68f7d9ae247d717aace25dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6096-cwe-470-use-of-externally-controlled-input-to-select-classes-or-code-unsafe-reflection-in-progress-software-corporation-telerik-reporting-befadd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6096%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Progress%20Software%20Corporation%20Telerik%20Reporting&amp;severity=medium&amp;id=682d983ec4522896dcbefadd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5818-cwe-79-improper-neutralization-of-in-2996104e</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3896-cwe-79-improper-neutralization-of-in-4b029f88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6896-cwe-79-improper-neutralization-of-in-00b40574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6930-cwe-79-improper-neutralization-of-in-c818a59f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6930%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=medium&amp;id=699f6c0eb7ef31ef0b55f787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6629-cwe-79-improper-neutralization-of-in-af1decff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6629%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f38e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6571-cwe-200-information-exposure-in-wpch-f2a5a7c6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6571%3A%20CWE-200%20Information%20Exposure%20in%20wpchill%20Optimize%20Images%20ALT%20Text%20(alt%20tag)%20%26%20names%20for%20SEO%20using%20AI&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6553-cwe-200-information-exposure-in-agui-c1f2c91e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6553%3A%20CWE-200%20Information%20Exposure%20in%20aguidrevitch%20WP%20Meteor%20Website%20Speed%20Optimization%20Addon&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6836-cwe-862-missing-authorization-in-ama-8064c5bf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6836%3A%20CWE-862%20Missing%20Authorization%20in%20amans2k%20Funnel%20Builder%20for%20WordPress%20by%20FunnelKit%20%E2%80%93%20Customize%20WooCommerce%20Checkout%20Pages%2C%20Create%20Sales%20Funnels%2C%20Order%20Bumps%20%26%20One%20Click%20Upsells&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3246-cwe-352-cross-site-request-forgery-c-b7cb3307</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3246%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20litespeedtech%20LiteSpeed%20Cache&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5861-cwe-862-missing-authorization-in-wpe-da066f51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5861%3A%20CWE-862%20Missing%20Authorization%20in%20wpexpertsio%20WP%20EasyPay%20%E2%80%93%20Square%20for%20WordPress&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6755-cwe-862-missing-authorization-in-wpw-ee521543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6755%3A%20CWE-862%20Missing%20Authorization%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6751-cwe-352-cross-site-request-forgery-c-cb526634</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6751%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7027-cwe-288-authentication-bypass-using--0f4cc627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7027%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WPWeb%20WooCommerce%20-%20PDF%20Vouchers&amp;severity=high&amp;id=699f6c0eb7ef31ef0b55f798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6754-cwe-862-missing-authorization-in-wpw-137e589a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6754%3A%20CWE-862%20Missing%20Authorization%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6753-cwe-79-improper-neutralization-of-in-57879b81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6752-cwe-79-improper-neutralization-of-in-80891471</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6750-cwe-862-missing-authorization-in-wpw-5d6f5e64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6750%3A%20CWE-862%20Missing%20Authorization%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=high&amp;id=699f6c0ab7ef31ef0b55f4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6756-cwe-434-unrestricted-upload-of-file--98c229c5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6756%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WPWeb%20Social%20Auto%20Poster&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41551-na-715aeb6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41551%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b568848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41550-na-c4e30590</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41550%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b5687e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41466-na-41e79334</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41466%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb9b7ef31ef0b568733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41465-na-3f814c1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41465%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb9b7ef31ef0b568730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41464-na-5bf41dff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41464%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb9b7ef31ef0b56872d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41463-na-dc8297fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41463%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb9b7ef31ef0b56872a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41462-na-c3c10cf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41462%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb9b7ef31ef0b568727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41461-na-b0f18c75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41461%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb9b7ef31ef0b568724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41460-na-0bf781bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41460%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb8b7ef31ef0b568684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41459-na-3f7d4f52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41459%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb8b7ef31ef0b568681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40137-na-f7d011d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40137%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b56730d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39345-na-269f6080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39345%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36541-na-48d56aec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36541%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5fb7ef31ef0b5636e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36539-na-a49ad2e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36539%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b5636e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36538-na-f310fcf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36538%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5fb7ef31ef0b5636df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36537-na-b6274dde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36537%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5fb7ef31ef0b563692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36536-na-fc2ce820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36536%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b56368f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36535-na-f0eeea54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36535%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b56368c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36534-na-bec6f4db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36534%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5fb7ef31ef0b563689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36533-na-9240ef81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36533%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b563686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31977-na-d2d0d840</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31977%3A%20n%2Fa&amp;severity=high&amp;id=699f6c30b7ef31ef0b560fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31971-na-10dda6a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31971%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31970-na-7621e793</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31970%3A%20n%2Fa&amp;severity=high&amp;id=699f6c30b7ef31ef0b560fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40767-na-67314a0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40767%3A%20n%2Fa&amp;severity=medium&amp;id=690a2deef0ba78a05053720e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rdgas-the-next-chapter-in-domain-generation-algorithms-777e45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RDGAs%3A%20The%20Next%20Chapter%20in%20Domain%20Generation%20Algorithms&amp;severity=low&amp;id=682c7adbe3e6de8ceb777e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-24-ebbf14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-24&amp;severity=medium&amp;id=682b7badd3ddd8cef2ebbf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-24-f12787</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38164-cwe-284-improper-access-control-in-microsoft-groupme-bdb312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38164%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20GroupMe&amp;severity=critical&amp;id=682d981dc4522896dcbdb312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38176-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-microsoft-groupme-bdb32f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38176%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Microsoft%20GroupMe&amp;severity=high&amp;id=682d981dc4522896dcbdb32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4081-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-ni-labview-bed2ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4081%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=682d983ac4522896dcbed2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4080-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-ni-labview-bed2e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4080%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NI%20LabVIEW&amp;severity=high&amp;id=682d983ac4522896dcbed2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4079-cwe-125-out-of-bounds-read-in-ni-labview-bed2dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4079%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NI%20LabVIEW&amp;severity=high&amp;id=682d983ac4522896dcbed2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5602-cwe-121-stack-based-buffer-overflow-in-ni-io-trace-tool-bed2fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5602%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NI%20IO%20Trace%20Tool&amp;severity=high&amp;id=682d983ac4522896dcbed2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41012-vulnerability-in-linux-linux-be1669</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6885-cwe-22-improper-limitation-of-a-path-f787b3bb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6885%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ckp267%20MaxiBlocks%3A%202200%2B%20Patterns%2C%20190%20Pages%2C%2014.2K%20Icons%20%26%20100%20Styles&amp;severity=high&amp;id=699f6c0eb7ef31ef0b55f6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6828-cwe-434-unrestricted-upload-of-file--18e3b445</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6828%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20davidanderson%20Redux%20Framework&amp;severity=high&amp;id=699f6c0cb7ef31ef0b55f5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41319-na-47b459ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41319%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b5683d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40060-na-039fc96b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40060%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca4b7ef31ef0b5671ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39702-na-a59e01b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39702%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c87b7ef31ef0b565e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-23-f12850</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29073-cwe-829-inclusion-of-functionality--e767b8bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29073%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Ankitects%20Anki&amp;severity=medium&amp;id=690a3b4cff58c9332ff06e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26020-cwe-74-improper-neutralization-of-s-9d9f2f98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26020%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Ankitects%20Anki&amp;severity=critical&amp;id=690a3b63ff58c9332ff097b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32152-cwe-184-incomplete-blacklist-in-ank-d37bf32d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32152%3A%20CWE-184%3A%20Incomplete%20Blacklist%20in%20Ankitects%20Anki&amp;severity=low&amp;id=690a3b4eff58c9332ff0735c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32484-cwe-80-improper-neutralization-of-s-a03acf15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32484%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Ankitects%20Anki&amp;severity=high&amp;id=690a3b4eff58c9332ff07360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39601-cwe-306-missing-authentication-for--da3009c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39601%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20CPCI85%20Central%20Processing%2FCommunication&amp;severity=medium&amp;id=6909214efe7723195e054560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38708-improper-neutralization-of-special--b52a7a95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38708%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd7463e6bfc5ba1def700a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37114-improper-neutralization-of-input-du-c871719f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37114%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Takashi%20Matsuyama%20My%20Favorites&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37239-improper-neutralization-of-input-du-bcfcc054</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37239%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Branda&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37259-improper-neutralization-of-input-du-9ffe456f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37259%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Extended%20The%20Ultimate%20WordPress%20Toolkit%20%E2%80%93%20WP%20Extended&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37261-improper-neutralization-of-input-du-14a4fa5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37261%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20Amazon&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37271-improper-neutralization-of-input-du-29fe7b4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37271%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Michael%20Nelson%20Print%20My%20Blog&amp;severity=null&amp;id=69cd7452e6bfc5ba1def6bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37409-improper-neutralization-of-input-du-8c20f107</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37409%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IdeaBox%20Creations%20PowerPack%20Lite%20for%20Beaver%20Builder&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37429-improper-neutralization-of-input-du-f2dde6d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37429%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hamid%20Alinia%20Login%20with%20phone%20number&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37433-improper-neutralization-of-input-du-be575474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37433%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20Mailster&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37434-improper-neutralization-of-input-du-c79ccd5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37434%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Vito%20Peleg%20Atarim&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28698-na-e4f95da2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28698%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d95b7ef31ef0b588f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41880-na-823b493a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41880%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbeb7ef31ef0b568a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41704-na-5f5552d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41704%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbeb7ef31ef0b568a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41703-na-148abcbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41703%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbeb7ef31ef0b568a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41320-na-2e6ac68f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41320%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b5683da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41318-na-144621d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41318%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb5b7ef31ef0b5683d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41317-na-ee43b980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41317%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b5683ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41316-na-4b977675</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41316%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb5b7ef31ef0b5683ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41315-na-6a5dfbf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41315%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb5b7ef31ef0b5683c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41314-na-8f84baa2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41314%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb5b7ef31ef0b56838f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40502-na-80704578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40502%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40430-257e4501</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40430&amp;severity=null&amp;id=699f6ca9b7ef31ef0b567d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40075-na-84d084fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40075%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca4b7ef31ef0b5671bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40051-na-d169c7b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40051%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca4b7ef31ef0b5671b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39250-na-05a984b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39250%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c86b7ef31ef0b565dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38944-na-c53a2918</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38944%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7cb7ef31ef0b564f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-22-f13131</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37495-improper-neutralization-of-input-du-ed7525a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37495%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mischiefmarmot%20Create%20by%20Mediavine&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37519-improper-neutralization-of-input-du-d71e6828</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37519%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%20for%20WordPress&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6933-sql-injection-in-limesurvey-980f01d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6933%3A%20SQL%20Injection%20in%20LimeSurvey&amp;severity=medium&amp;id=69383acf29cea75c35b77041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-21-f13aa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f13aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6848-cwe-79-improper-neutralization-of-in-8fe9359d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20Post%20and%20Page%20Builder%20by%20BoldGrid%20%E2%80%93%20Visual%20Drag%20and%20Drop%20Editor&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37918-improper-neutralization-of-input-du-d1a0590a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37918%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPCone%20ConeBlog%20%E2%80%93%20WordPress%20Blog%20Widgets&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37922-improper-neutralization-of-input-du-67fb2402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37922%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37943-improper-neutralization-of-input-du-0b1318b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37943%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Ajax%20Product%20Filter&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37946-improper-neutralization-of-input-du-cee6855d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37946%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20weDevs%20ReCaptcha%20Integration%20for%20WordPress&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6497-cwe-89-improper-neutralization-of-sp-358e9b69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6497%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=high&amp;id=699f6c04b7ef31ef0b55f00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38687-improper-neutralization-of-input-du-ac485db2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38687%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wowDevs%20Sky%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6636-cwe-862-missing-authorization-in-wpw-ab9580dc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6636%3A%20CWE-862%20Missing%20Authorization%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=critical&amp;id=699f6c08b7ef31ef0b55f3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6635-cwe-288-authentication-bypass-using--501805a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6635%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=high&amp;id=699f6c08b7ef31ef0b55f39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6637-cwe-305-authentication-bypass-by-pri-413dbd59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6637%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=high&amp;id=699f6c08b7ef31ef0b55f3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38712-improper-neutralization-of-input-du-3efac603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38712%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Qode%20Qi%20Blocks&amp;severity=null&amp;id=69cd7463e6bfc5ba1def700e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6489-cwe-862-missing-authorization-in-jet-3c8b59ea</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6489%3A%20CWE-862%20Missing%20Authorization%20in%20jetmonsters%20Getwid%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55f002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6491-cwe-862-missing-authorization-in-jet-98c32427</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6491%3A%20CWE-862%20Missing%20Authorization%20in%20jetmonsters%20Getwid%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55f006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6694-cwe-257-storing-passwords-in-a-recov-a8646fe6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6694%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20smub%20WP%20Mail%20SMTP%20by%20WPForms%20%E2%80%93%20The%20Most%20Popular%20SMTP%20and%20Email%20Log%20Plugin&amp;severity=low&amp;id=699f6c0ab7ef31ef0b55f4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3934-cwe-22-improper-limitation-of-a-path-e2b414a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3934%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20claudiosanches%20Mercado%20Pago%20payments%20for%20WooCommerce&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6281-cwe-22-improper-limitation-of-a-path-6afb0b2a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6281%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=high&amp;id=68ef9b2a178f764e1f470d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6560-cwe-200-information-exposure-in-addo-1df7f71c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6560%3A%20CWE-200%20Information%20Exposure%20in%20addonify%20Addonify%20%E2%80%93%20Quick%20View%20For%20WooCommerce&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2337-cwe-79-improper-neutralization-of-in-19aca81c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ghuger%20Easy%20Testimonials&amp;severity=medium&amp;id=699f6dadb7ef31ef0b58aa34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5804-cwe-352-cross-site-request-forgery-c-33f83e3b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5804%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jules-colle%20Conditional%20Fields%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40348-na-65c815e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40348%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-20-f13194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f13194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5977-cwe-639-authorization-bypass-through-adb65c22</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5977%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6338-cwe-89-improper-neutralization-of-sp-d0bb7c9b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6338%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20foliovision%20FV%20Flowplayer%20Video%20Player&amp;severity=high&amp;id=699f6c01b7ef31ef0b55ee10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6799-cwe-862-missing-authorization-in-yit-312e5094</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6799%3A%20CWE-862%20Missing%20Authorization%20in%20yithemes%20YITH%20Essential%20Kit%20for%20WooCommerce%20%231&amp;severity=medium&amp;id=699f6c0cb7ef31ef0b55f561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41603-na-8139a890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41603%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cbcb7ef31ef0b5688dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41602-na-7b1e54ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41602%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbcb7ef31ef0b5688da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41597-na-28d849bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41597%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cbcb7ef31ef0b5688d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41492-na-be99fa86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41492%3A%20n%2Fa&amp;severity=high&amp;id=699f6cbbb7ef31ef0b5687ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41281-na-edf6ea8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41281%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb5b7ef31ef0b56835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40400-na-b8ef1c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40400%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39963-na-7933aacd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39963%3A%20n%2Fa&amp;severity=high&amp;id=699f6c89b7ef31ef0b56608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39962-na-89190a48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39962%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c89b7ef31ef0b56608c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39123-na-dd2a46b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39123%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tr-87-crowdstrike-agent-causing-bsod-loop-on-windows-faulty-update-on-falcon-sensor-2cf3c6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TR-87%20-%20CrowdStrike%20Agent%20causing%20BSOD%20loop%20on%20Windows%20-%20Faulty%20Update%20on%20Falcon%20Sensor&amp;severity=medium&amp;id=682c7dbfe8347ec82d2cf3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-19-f12d36</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38156-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-edge-chromium-based-bdb30e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38156%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d981dc4522896dcbdb30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5997-cwe-862-missing-authorization-in-cod-2df513d3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5997%3A%20CWE-862%20Missing%20Authorization%20in%20codexpert%20Duplica%20%E2%80%93%20Duplicate%20Posts%2C%20Pages%2C%20Custom%20Posts%20or%20Users&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6455-cwe-200-information-exposure-in-xpee-2f27b6b5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6455%3A%20CWE-200%20Information%20Exposure%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6c03b7ef31ef0b55ef68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40704-cwe-1392-use-of-default-credentials-in-philips-vue-pacs-bed0e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40704%3A%20CWE-1392%20Use%20of%20Default%20Credentials%20in%20Philips%20Vue%20PACS&amp;severity=medium&amp;id=682d983ac4522896dcbed0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31143-vulnerability-in-xen-xen-befa9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31143%3A%20Vulnerability%20in%20Xen%20Xen&amp;severity=high&amp;id=682d983ec4522896dcbefa9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5555-cwe-79-improper-neutralization-of-in-f7e08302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5555%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3242-cwe-434-unrestricted-upload-of-file--b0f18885</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3242%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=699f6c8eb7ef31ef0b566412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5554-cwe-79-improper-neutralization-of-in-00c28b83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c23f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41011-vulnerability-in-linux-linux-be1647</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6599-cwe-862-missing-authorization-in-mek-1048552a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6599%3A%20CWE-862%20Missing%20Authorization%20in%20mekshq%20Meks%20Video%20Importer&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6705-cwe-79-improper-neutralization-of-in-c0b25606</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ericmann%20RegLevel&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5964-cwe-79-improper-neutralization-of-in-a4c2960e</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5964%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tislam100%20Zenon%20Lite&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5726-cwe-502-deserialization-of-untrusted-3a834450</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5726%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpdiscover%20Timeline%20Event%20History&amp;severity=high&amp;id=699f6bf1b7ef31ef0b55cd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6175-cwe-862-missing-authorization-in-dee-6e8c1eb0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6175%3A%20CWE-862%20Missing%20Authorization%20in%20deetronix%20Booking%20Ultra%20Pro%20Appointments%20Booking%20Calendar%20Plugin&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41184-na-db815e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41184%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cb1b7ef31ef0b568187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39173-na-56bfe572</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39173%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c83b7ef31ef0b565cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39090-na-4f766a6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39090%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c81b7ef31ef0b565b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-18-f12afa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5582-cwe-79-improper-neutralization-of-in-59537c87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=699f6becb7ef31ef0b55c2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6220-cwe-434-unrestricted-upload-of-file--a9d21492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6220%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&amp;severity=critical&amp;id=699f6bfeb7ef31ef0b55d66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5703-cwe-862-missing-authorization-in-ice-874039e2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5703%3A%20CWE-862%20Missing%20Authorization%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5251-cwe-79-improper-neutralization-of-in-d9b87ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5251%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6467-cwe-73-external-control-of-file-name-79a0f921</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6467%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20reputeinfosystems%20Appointment%20Booking%20Calendar%20Plugin%20and%20Online%20Scheduling%20Plugin%20%E2%80%93%20BookingPress&amp;severity=high&amp;id=699f6c03b7ef31ef0b55ef7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6669-cwe-79-improper-neutralization-of-in-9aa29603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6669%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quantumcloud%20AI%20ChatBot%20for%20WordPress%20%E2%80%93%20WPBot&amp;severity=medium&amp;id=699f6c0ab7ef31ef0b55f43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5253-cwe-79-improper-neutralization-of-in-6bdcf45f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5253%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6660-cwe-280-improper-handling-of-insuffi-291dd810</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6660%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20reputeinfosystems%20Appointment%20Booking%20Calendar%20Plugin%20and%20Online%20Scheduling%20Plugin%20%E2%80%93%20BookingPress&amp;severity=high&amp;id=699f6c0ab7ef31ef0b55f429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5252-cwe-79-improper-neutralization-of-in-7ffed6c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5255-cwe-79-improper-neutralization-of-in-19f392d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5254-cwe-79-improper-neutralization-of-in-570d08c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20WPBakery&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6033-cwe-862-missing-authorization-in-the-ce1d109e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6033%3A%20CWE-862%20Missing%20Authorization%20in%20themewinter%20Event%20Manager%2C%20Events%20Calendar%2C%20Tickets%2C%20Registrations%20%E2%80%93%20Eventin&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41010-vulnerability-in-linux-linux-be1643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41009-vulnerability-in-linux-linux-be163f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe163f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6807-cross-site-scripting-in-sourcecodest-99392e96</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6807%3A%20Cross%20Site%20Scripting%20in%20SourceCodester%20Student%20Study%20Center%20Desk%20Management%20System&amp;severity=medium&amp;id=68487f581b0bd07c3938a911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6535-use-of-default-credentials-78d9431e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6535%3A%20Use%20of%20Default%20Credentials&amp;severity=medium&amp;id=691f730d28b41f27b438b879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40492-na-197c7b04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40492%3A%20n%2Fa&amp;severity=high&amp;id=699f6cabb7ef31ef0b567e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40420-36c2c14d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40420&amp;severity=null&amp;id=699f6ca9b7ef31ef0b567d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40402-na-efe8d35c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40402%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca8b7ef31ef0b567a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40119-na-ef3da809</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40119%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca6b7ef31ef0b5672a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39124-na-e9c820c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39124%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38447-na-7aa2ad87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38447%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38446-na-dfabaafe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38446%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c79b7ef31ef0b564c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-17-f12a80</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21179-easily-exploitable-vulnerability-al-d347cf67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21179%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21177-easily-exploitable-vulnerability-al-d841b92e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21177%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20NDB%20Cluster&amp;severity=medium&amp;id=690a2de5f0ba78a050535f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21173-easily-exploitable-vulnerability-al-9d8f2c7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21173%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21171-easily-exploitable-vulnerability-al-5c4bbdc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21171%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21166-difficult-to-exploit-vulnerability--c2f75906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21166%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20MySQL%20Server%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21163-easily-exploitable-vulnerability-al-97f1adf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21163%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21162-easily-exploitable-vulnerability-al-478e40e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21162%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21160-easily-exploitable-vulnerability-al-c34cf510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21160%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21159-easily-exploitable-vulnerability-al-ed8c374e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21159%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21142-easily-exploitable-vulnerability-al-70ec2da2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21142%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de5f0ba78a050535ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21135-easily-exploitable-vulnerability-al-e3341d3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21135%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de3f0ba78a050535d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21134-easily-exploitable-vulnerability-al-b2006f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21134%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de3f0ba78a050535d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21130-easily-exploitable-vulnerability-al-c9f08139</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21130%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de3f0ba78a050535d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21129-easily-exploitable-vulnerability-al-9c379d1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21129%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de3f0ba78a050535d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21127-easily-exploitable-vulnerability-al-cb7ee7e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21127%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de3f0ba78a050535d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21125-easily-exploitable-vulnerability-al-6d733395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21125%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Cluster.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Cluster.%20in%20Oracle%20Corporation%20MySQL%20NDB%20Cluster&amp;severity=medium&amp;id=690a2de3f0ba78a050535cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20996-easily-exploitable-vulnerability-al-fedf7bb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20996%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a2de3f0ba78a050535cf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39908-cwe-400-uncontrolled-resource-consu-fb5e64cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39908%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20rexml&amp;severity=medium&amp;id=6909214efe7723195e054564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6655-improper-control-of-generation-of-co-f2571215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6655%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)&amp;severity=high&amp;id=683c4454182aa0cae211861e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6435-cwe-732-incorrect-permission-assignment-for-critical-resource-in-rockwell-automation-pavilion8-bed32b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6435%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Rockwell%20Automation%20Pavilion8%C2%AE&amp;severity=high&amp;id=682d983ac4522896dcbed32b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48866-vulnerability-in-linux-linux-be6424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48865-vulnerability-in-linux-linux-be641c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe641c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48864-vulnerability-in-linux-linux-be6414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe6414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48863-vulnerability-in-linux-linux-be63f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe63f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48862-vulnerability-in-linux-linux-be63f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe63f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48861-vulnerability-in-linux-linux-be63f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe63f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48860-vulnerability-in-linux-linux-be63ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe63ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48859-vulnerability-in-linux-linux-be63de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe63de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48858-vulnerability-in-linux-linux-bdd534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48857-vulnerability-in-linux-linux-be63d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe63d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48856-vulnerability-in-linux-linux-be63d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe63d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48855-vulnerability-in-linux-linux-be63c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe63c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48854-vulnerability-in-linux-linux-be63c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe63c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48853-vulnerability-in-linux-linux-be63b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe63b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48852-vulnerability-in-linux-linux-be639a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982fc4522896dcbe639a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48851-vulnerability-in-linux-linux-be6396</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48850-vulnerability-in-linux-linux-be6392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982fc4522896dcbe6392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48849-vulnerability-in-linux-linux-be6381</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48848-vulnerability-in-linux-linux-be6379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48847-vulnerability-in-linux-linux-be6375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48846-vulnerability-in-linux-linux-be6371</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48845-vulnerability-in-linux-linux-be6364</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48844-vulnerability-in-linux-linux-be635c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe635c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48843-vulnerability-in-linux-linux-be6354</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48842-vulnerability-in-linux-linux-aebf7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48841-vulnerability-in-linux-linux-be6339</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48840-vulnerability-in-linux-linux-be6335</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48839-vulnerability-in-linux-linux-be6326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48838-vulnerability-in-linux-linux-be6322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48837-vulnerability-in-linux-linux-be631e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe631e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48836-vulnerability-in-linux-linux-bdd530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48835-vulnerability-in-linux-linux-be6311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48834-vulnerability-in-linux-linux-be630d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe630d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48833-vulnerability-in-linux-linux-be6309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48832-vulnerability-in-linux-linux-be6305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48831-vulnerability-in-linux-linux-be6301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48830-vulnerability-in-linux-linux-be62e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe62e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48829-vulnerability-in-linux-linux-be62e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe62e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48828-vulnerability-in-linux-linux-be62dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe62dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48827-vulnerability-in-linux-linux-be62d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe62d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48826-vulnerability-in-linux-linux-be62c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe62c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48825-vulnerability-in-linux-linux-be62bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe62bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48824-vulnerability-in-linux-linux-aebf79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48823-vulnerability-in-linux-linux-be62b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe62b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48822-vulnerability-in-linux-linux-bdd52c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48821-vulnerability-in-linux-linux-be62b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe62b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48820-vulnerability-in-linux-linux-be62af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe62af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48819-vulnerability-in-linux-linux-be629e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe629e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48818-vulnerability-in-linux-linux-be6278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48817-vulnerability-in-linux-linux-be6270</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48816-vulnerability-in-linux-linux-bdd528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48815-vulnerability-in-linux-linux-be6268</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48814-vulnerability-in-linux-linux-be6260</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48813-vulnerability-in-linux-linux-be6258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48812-vulnerability-in-linux-linux-be6254</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48811-vulnerability-in-linux-linux-be6245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48810-vulnerability-in-linux-linux-be6241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48809-vulnerability-in-linux-linux-be623d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe623d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48808-vulnerability-in-linux-linux-be6230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48807-vulnerability-in-linux-linux-bdd524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48806-vulnerability-in-linux-linux-bdd520</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48805-vulnerability-in-linux-linux-be6213</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48804-vulnerability-in-linux-linux-be6209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48803-vulnerability-in-linux-linux-be6203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48802-vulnerability-in-linux-linux-be61ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe61ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48801-vulnerability-in-linux-linux-be61f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe61f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48800-vulnerability-in-linux-linux-be61e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe61e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48799-vulnerability-in-linux-linux-be61e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe61e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48798-vulnerability-in-linux-linux-be61dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe61dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48797-vulnerability-in-linux-linux-be61d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe61d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48796-vulnerability-in-linux-linux-aebf77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48795-vulnerability-in-linux-linux-be61c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe61c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48794-vulnerability-in-linux-linux-be61ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe61ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48793-vulnerability-in-linux-linux-be61a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe61a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48792-vulnerability-in-linux-linux-be61a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe61a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48791-vulnerability-in-linux-linux-be619e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe619e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48790-vulnerability-in-linux-linux-be6191</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48789-vulnerability-in-linux-linux-be618d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe618d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48788-vulnerability-in-linux-linux-be6189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48787-vulnerability-in-linux-linux-be6185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48786-vulnerability-in-linux-linux-be6176</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47624-vulnerability-in-linux-linux-aebf58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47623-vulnerability-in-linux-linux-be9611</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47622-vulnerability-in-linux-linux-be960d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe960d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48785-vulnerability-in-linux-linux-be616e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48784-vulnerability-in-linux-linux-bdd51c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48783-vulnerability-in-linux-linux-be6155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48782-vulnerability-in-linux-linux-be6151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48781-vulnerability-in-linux-linux-be614d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe614d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48780-vulnerability-in-linux-linux-be6149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48779-vulnerability-in-linux-linux-be6145</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48778-vulnerability-in-linux-linux-be6141</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48777-vulnerability-in-linux-linux-be613b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe613b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48776-vulnerability-in-linux-linux-bdd518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48775-vulnerability-in-linux-linux-be6139</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48774-vulnerability-in-linux-linux-be6135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48773-vulnerability-in-linux-linux-aebf75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6457-cwe-89-improper-neutralization-of-sp-2dd2fe87</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6457%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=critical&amp;id=699f6c03b7ef31ef0b55ef6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6621-cwe-862-missing-authorization-in-jea-2c517844</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6621%3A%20CWE-862%20Missing%20Authorization%20in%20jeangalea%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52886-vulnerability-in-linux-linux-bdd879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6579-cwe-862-missing-authorization-in-gen-19a80495</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6579%3A%20CWE-862%20Missing%20Authorization%20in%20genetechproducts%20Web%20and%20WooCommerce%20Addons%20for%20WPBakery%20Builder&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1937-cwe-862-missing-authorization-in-the-17dc98e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1937%3A%20CWE-862%20Missing%20Authorization%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=699f6d44b7ef31ef0b56f88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3587-cwe-79-improper-neutralization-of-in-5ad1cb56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Premium%20Portfolio%20Features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6c95b7ef31ef0b566870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6565-cwe-200-information-exposure-in-vivi-7bac6dd9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6565%3A%20CWE-200%20Information%20Exposure%20in%20vividcolorsjp%20AForms%20%E2%80%94%20Form%20Builder%20for%20Price%20Calculator%20%26%20Cost%20Estimation&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6570-cwe-200-information-exposure-in-mte9-751b9607</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6570%3A%20CWE-200%20Information%20Exposure%20in%20mte90%20Glossary&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5852-cwe-22-improper-limitation-of-a-path-e3afecc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5852%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2691-cwe-79-improper-neutralization-of-in-aafff17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeventmanager%20WP%20Event%20Manager%20%E2%80%93%20Events%20Calendar%2C%20Registrations%2C%20Sell%20Tickets%20with%20WooCommerce&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41008-vulnerability-in-linux-linux-be163b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe163b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4780-cwe-79-improper-neutralization-of-in-b0b545cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blocksera%20Image%20Hover%20Effects%20%E2%80%93%20Elementor%20Addon&amp;severity=medium&amp;id=699f6b95b7ef31ef0b556ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6559-cwe-200-information-exposure-in-watc-5f7bbdc2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6559%3A%20CWE-200%20Information%20Exposure%20in%20watchful%20Backup%2C%20Restore%20and%20Migrate%20WordPress%20Sites%20With%20the%20XCloner%20Plugin&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6557-cwe-200-information-exposure-in-wpde-a940d8bc</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6557%3A%20CWE-200%20Information%20Exposure%20in%20wpdevteam%20SchedulePress%20%E2%80%93%20Auto%20Post%20%26%20Publish%2C%20Auto%20Social%20Share%2C%20Schedule%20Posts%20with%20Editorial%20Calendar%20%26%20Missed%20Schedule%20Post%20Publisher&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40536-na-9ae3bda6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40536%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40535-na-9b9ce7b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40535%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cadb7ef31ef0b567f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40516-na-7a531557</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40516%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40515-na-f469bc5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40515%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cadb7ef31ef0b567f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40505-na-ab7126b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40505%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cabb7ef31ef0b567ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40503-na-9edd0700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40503%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cabb7ef31ef0b567ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40456-na-df6e7822</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40456%3A%20n%2Fa&amp;severity=critical&amp;id=699f6caab7ef31ef0b567dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40425-na-1d69b5e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40425%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca9b7ef31ef0b567d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40394-na-e7fe0b73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40394%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca8b7ef31ef0b567a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40392-na-f4cca4e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40392%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca8b7ef31ef0b567a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40322-na-5a151a5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40322%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b56731c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40130-na-b320d32c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40130%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca6b7ef31ef0b567309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40129-na-f0175f16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40129%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca6b7ef31ef0b567305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39036-na-eb894390</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39036%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c81b7ef31ef0b565b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35338-na-a989b0c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35338%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c58b7ef31ef0b563289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33182-na-0e5961e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33182%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b5615f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33181-na-1908e37c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33181%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b5615f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33180-na-73814ffb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33180%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3bb7ef31ef0b5615ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-16-1b0ff455</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-16&amp;severity=medium&amp;id=68367c96182aa0cae231984e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-16-f252c9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-16&amp;severity=medium&amp;id=682acdc4bbaf20d303f252c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-16-f1256a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f1256a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39819-cwe-494-download-of-code-without-in-d9fa4012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39819%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20and%20SDK%20for%20Windows&amp;severity=medium&amp;id=68e0f3bfb66c7f7acdd3cbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39826-cwe-367-time-of-check-time-of-use-t-be2705e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39826%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Zoom%20Communications%2C%20Inc%20Zoom%20Workplace%20Apps%20and%20SDKs&amp;severity=medium&amp;id=68e0f3bfb66c7f7acdd3cbff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41007-vulnerability-in-linux-linux-be1637</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6345-cwe-94-improper-control-of-generatio-194326d5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6345%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20pypa%20pypa%2Fsetuptools&amp;severity=high&amp;id=690a2dfef0ba78a050538c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31946-na-2c3638a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31946%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40560-na-d74fa66d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40560%3A%20n%2Fa&amp;severity=high&amp;id=699f6cafb7ef31ef0b56803c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40555-na-367e748c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40555%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b568036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40554-na-c1d5afe6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40554%3A%20n%2Fa&amp;severity=high&amp;id=699f6cafb7ef31ef0b568030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40553-na-916c6639</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40553%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40524-na-1fb1903d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40524%3A%20n%2Fa&amp;severity=critical&amp;id=699f6cadb7ef31ef0b567f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40416-na-e42946a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40416%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca8b7ef31ef0b567a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40415-na-cc14b03c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40415%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca8b7ef31ef0b567a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40414-na-1eac5e41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40414%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca8b7ef31ef0b567a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37386-na-b40d44c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37386%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37016-na-805f9dde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37016%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c66b7ef31ef0b563aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36438-na-731a2ef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36438%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b56359b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36434-na-55371ed6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36434%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36433-na-bd01e144</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36433%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36432-na-85f65193</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36432%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-15-f126c9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f126c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52885-vulnerability-in-linux-linux-be783f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe783f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-14-f12ff3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6465-cwe-862-missing-authorization-in-ric-506df008</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6465%3A%20CWE-862%20Missing%20Authorization%20in%20rico-macchi%20WP%20Links%20Page&amp;severity=medium&amp;id=699f6c03b7ef31ef0b55ef76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6574-cwe-200-information-exposure-in-stij-a733eca4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6574%3A%20CWE-200%20Information%20Exposure%20in%20stijnvanderree%20Laposta&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39329-uncontrolled-resource-consumption-85ebeb63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39329%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f730d28b41f27b438b86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39327-uncontrolled-resource-consumption-b994eb4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39327%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=69201212ce2640f942c372c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-13-f12aa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5902-cwe-79-improper-neutralization-of-in-0cc8f763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5902%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20User%20Feedback%20%E2%80%93%20Create%20Interactive%20Feedback%20Form%2C%20User%20Surveys%2C%20and%20Polls%20in%20Seconds&amp;severity=high&amp;id=699f6bf6b7ef31ef0b55d11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39917-cwe-307-improper-restriction-of-exc-0c7e4e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39917%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20neutrinolabs%20xrdp&amp;severity=high&amp;id=6909084f7fff0e30cee2350b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38735-improper-control-of-filename-for-in-1acee152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38735%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Bastien%20Ho%20Event%20post&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38706-path-traversal-in-devitems-ht-mega-76cab8ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38706%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20DevItems%20HT%20Mega&amp;severity=null&amp;id=69cd7463e6bfc5ba1def7006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37927-incorrect-privilege-assignment-in-n-21ef1332</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37927%3A%20Incorrect%20Privilege%20Assignment%20in%20NooTheme%20Jobmonster&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37202-missing-authorization-in-binarycarp-438c648c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37202%3A%20Missing%20Authorization%20in%20BinaryCarpenter%20Ultimate%20Custom%20Add%20To%20Cart%20Button%20(Ajax)%20For%20WooCommerce%20by%20Binary%20Carpenter&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37213-cross-site-request-forgery-csrf-in--704000e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37213%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20guru-aliexpress%20AliNext&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37544-missing-authorization-in-saleswonde-5adf28d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37544%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20Get%20Better%20Reviews%20for%20WooCommerce&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5325-cwe-89-improper-neutralization-of-sp-41444ece</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5325%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpvibes%20Form%20Vibes%20%E2%80%93%20Database%20Manager%20for%20Forms&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6495-cwe-79-improper-neutralization-of-in-46c3ab38</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6495%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c04b7ef31ef0b55f00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41006-vulnerability-in-linux-linux-bddf03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41005-vulnerability-in-linux-linux-be1631</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41004-vulnerability-in-linux-linux-be162d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe162d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41003-vulnerability-in-linux-linux-be1629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41002-vulnerability-in-linux-linux-be1625</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41001-vulnerability-in-linux-linux-be1621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-41000-vulnerability-in-linux-linux-be1603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-41000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40999-vulnerability-in-linux-linux-be15ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe15ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40998-vulnerability-in-linux-linux-be15fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40997-vulnerability-in-linux-linux-be15f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40996-vulnerability-in-linux-linux-bddefb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9821c4522896dcbddefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40995-vulnerability-in-linux-linux-be15f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe15f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40994-vulnerability-in-linux-linux-be15e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40993-vulnerability-in-linux-linux-be15e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe15e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40992-vulnerability-in-linux-linux-be15de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40991-vulnerability-in-linux-linux-be15da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40990-vulnerability-in-linux-linux-be15d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe15d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40989-vulnerability-in-linux-linux-be15b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe15b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40988-vulnerability-in-linux-linux-be15a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40987-vulnerability-in-linux-linux-be15a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe15a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40986-vulnerability-in-linux-linux-bddef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40985-vulnerability-in-linux-linux-be159e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe159e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40984-vulnerability-in-linux-linux-be1596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40983-vulnerability-in-linux-linux-be158e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe158e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40981-vulnerability-in-linux-linux-be158a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe158a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40980-vulnerability-in-linux-linux-aebff9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40979-vulnerability-in-linux-linux-be157b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe157b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40978-vulnerability-in-linux-linux-be1577</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40977-vulnerability-in-linux-linux-be1573</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40976-vulnerability-in-linux-linux-be1545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40975-vulnerability-in-linux-linux-be1541</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40974-vulnerability-in-linux-linux-be153d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe153d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40973-vulnerability-in-linux-linux-be1539</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40972-vulnerability-in-linux-linux-be1533</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40971-vulnerability-in-linux-linux-be1531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40970-vulnerability-in-linux-linux-be152d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe152d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40969-vulnerability-in-linux-linux-be1529</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40968-vulnerability-in-linux-linux-be151c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe151c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40967-vulnerability-in-linux-linux-be1518</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40966-vulnerability-in-linux-linux-be14f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe14f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40965-vulnerability-in-linux-linux-be14ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe14ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40964-vulnerability-in-linux-linux-be14e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe14e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40963-vulnerability-in-linux-linux-bddeef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40962-vulnerability-in-linux-linux-be14e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe14e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40961-vulnerability-in-linux-linux-be14e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40960-vulnerability-in-linux-linux-be14dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40959-vulnerability-in-linux-linux-be14d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40958-vulnerability-in-linux-linux-be14d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40957-vulnerability-in-linux-linux-be14d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40956-vulnerability-in-linux-linux-be14cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40955-vulnerability-in-linux-linux-be14ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe14ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40954-vulnerability-in-linux-linux-be149d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe149d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40953-vulnerability-in-linux-linux-be1495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40952-vulnerability-in-linux-linux-be148d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe148d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40951-vulnerability-in-linux-linux-be1485</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40950-vulnerability-in-linux-linux-be147d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe147d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40949-vulnerability-in-linux-linux-be1475</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40948-vulnerability-in-linux-linux-be1471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40947-vulnerability-in-linux-linux-bddee2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40945-vulnerability-in-linux-linux-be146d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe146d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40944-vulnerability-in-linux-linux-be1460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40943-vulnerability-in-linux-linux-be143e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe143e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40942-vulnerability-in-linux-linux-be143a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe143a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40941-vulnerability-in-linux-linux-be1434</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40940-vulnerability-in-linux-linux-be1430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40939-vulnerability-in-linux-linux-be142a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe142a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40938-vulnerability-in-linux-linux-be1426</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40937-vulnerability-in-linux-linux-be1422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40936-vulnerability-in-linux-linux-be141e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe141e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40935-vulnerability-in-linux-linux-be141a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe141a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40934-vulnerability-in-linux-linux-bdded1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdded1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40933-vulnerability-in-linux-linux-be1416</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40932-vulnerability-in-linux-linux-be13f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40931-vulnerability-in-linux-linux-be13f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40930-vulnerability-in-linux-linux-be13f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40929-vulnerability-in-linux-linux-be13ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40928-vulnerability-in-linux-linux-be13e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40927-vulnerability-in-linux-linux-be13e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40926-vulnerability-in-linux-linux-be13e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40925-vulnerability-in-linux-linux-be13d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40924-vulnerability-in-linux-linux-be13cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40923-vulnerability-in-linux-linux-be13cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40922-vulnerability-in-linux-linux-be13b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40921-vulnerability-in-linux-linux-bddec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40920-vulnerability-in-linux-linux-bddec1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40919-vulnerability-in-linux-linux-be13ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40918-vulnerability-in-linux-linux-be13a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40917-vulnerability-in-linux-linux-be13a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe13a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40916-vulnerability-in-linux-linux-bddeb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40915-vulnerability-in-linux-linux-be13a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe13a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40914-vulnerability-in-linux-linux-bdde93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40913-vulnerability-in-linux-linux-be1391</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40912-vulnerability-in-linux-linux-bdde8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40911-vulnerability-in-linux-linux-be138d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe138d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40910-vulnerability-in-linux-linux-bdde83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40909-vulnerability-in-linux-linux-bdde7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40908-vulnerability-in-linux-linux-be1385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9827c4522896dcbe1385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40907-vulnerability-in-linux-linux-be1381</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe1381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40906-vulnerability-in-linux-linux-be137d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9827c4522896dcbe137d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40905-vulnerability-in-linux-linux-be2e01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40904-vulnerability-in-linux-linux-be2dfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40903-vulnerability-in-linux-linux-bdde72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40902-vulnerability-in-linux-linux-be2df9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40901-vulnerability-in-linux-linux-be2df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40900-vulnerability-in-linux-linux-be2dd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40899-vulnerability-in-linux-linux-be2dd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39510-vulnerability-in-linux-linux-be2dce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39510%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39509-vulnerability-in-linux-linux-be2dca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39509%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39508-vulnerability-in-linux-linux-be2dc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39508%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39507-vulnerability-in-linux-linux-be2dc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39507%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39506-vulnerability-in-linux-linux-be2db5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39506%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39505-vulnerability-in-linux-linux-be2db1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39505%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39504-vulnerability-in-linux-linux-be2dad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39504%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39503-vulnerability-in-linux-linux-bdde6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39503%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39502-vulnerability-in-linux-linux-be2d9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39502%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39501-bd719d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39501&amp;severity=low&amp;id=682d9817c4522896dcbd719d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39500-vulnerability-in-linux-linux-be2d7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39500%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39499-vulnerability-in-linux-linux-be2d77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39499%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39498-vulnerability-in-linux-linux-be2d73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39498%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39497-vulnerability-in-linux-linux-be2d6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39497%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39496-vulnerability-in-linux-linux-aeb01c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39496%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39495-vulnerability-in-linux-linux-be2d6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39495%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39494-vulnerability-in-linux-linux-aebff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39494%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6328-cwe-288-authentication-bypass-using--b8615de0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6328%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20inspireui%20MStore%20API%20%E2%80%93%20Create%20Native%20Android%20%26%20iOS%20Apps%20On%20The%20Cloud&amp;severity=critical&amp;id=699f6c01b7ef31ef0b55ee05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6353-cwe-89-improper-neutralization-of-sp-1f236a3c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6353%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20subratamal%20Wallet%20for%20WooCommerce&amp;severity=high&amp;id=699f6c02b7ef31ef0b55ee9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6625-cwe-79-improper-neutralization-of-in-e2249b5a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6625%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20m_uysl%20WP%20Total%20Branding%20%E2%80%93%20Complete%20branding%20solution%20for%20WordPress&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6588-cwe-79-improper-neutralization-of-in-aebee089</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amandato%20PowerPress%20Podcasting%20plugin%20by%20Blubrry&amp;severity=medium&amp;id=699f6c08b7ef31ef0b55f2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6555-cwe-200-information-exposure-in-time-d1402d40</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6555%3A%20CWE-200%20Information%20Exposure%20in%20timersys%20WP%20Popups%20%E2%80%93%20WordPress%20Popup%20builder&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1375-cwe-352-cross-site-request-forgery-c-046cf8cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1375%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bastho%20Event%20post&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30213-na-04072924</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30213%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40551-na-3352a9d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40551%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40550-na-e1760f1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40550%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40548-na-763812d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40548%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40546-na-b2e6cf7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40546%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40545-na-06729980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40545%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40543-na-9b706490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40543%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40542-na-79da1fb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40542%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40541-na-bf4713a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40541%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40540-na-e8c7509c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40540%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40539-na-6520eb8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40539%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cadb7ef31ef0b567f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40520-na-579d4134</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40520%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40518-na-38797afb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40518%3A%20n%2Fa&amp;severity=high&amp;id=699f6cadb7ef31ef0b567f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40110-na-0399675e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40110%3A%20n%2Fa&amp;severity=critical&amp;id=699f6ca6b7ef31ef0b567295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39340-na-379aeedc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39340%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-12-f1279c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f1279c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6392-cwe-862-missing-authorization-in-sir-2701dc4c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6392%3A%20CWE-862%20Missing%20Authorization%20in%20sirv%20Image%20Optimizer%2C%20Resizer%20and%20CDN%20%E2%80%93%20Sirv&amp;severity=medium&amp;id=699f6c02b7ef31ef0b55eeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37151-cwe-754-improper-check-for-unusual--b83aeb14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37151%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20OISF%20suricata&amp;severity=medium&amp;id=6909084f7fff0e30cee234fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6666-cwe-89-improper-neutralization-of-sp-5e0351e7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6666%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6c0ab7ef31ef0b55f439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6624-cwe-269-improper-privilege-managemen-984642be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6624%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20parorrey%20JSON%20API%20User&amp;severity=critical&amp;id=699f6c08b7ef31ef0b55f2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6256-cwe-79-improper-neutralization-of-in-e3b4ea71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20Feeds%20for%20YouTube%20(YouTube%20video%2C%20channel%2C%20and%20gallery%20plugin)&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0619-cwe-862-missing-authorization-in-tom-0616c288</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0619%3A%20CWE-862%20Missing%20Authorization%20in%20tomlister%20Payflex%20Payment%20Gateway&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6397-cwe-288-authentication-bypass-using--e2fbeaa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6397%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=critical&amp;id=699f6c02b7ef31ef0b55eeba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6554-cwe-200-information-exposure-in-wpmu-1068f277</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6554%3A%20CWE-200%20Information%20Exposure%20in%20wpmudev%20Branda%20%E2%80%93%20White%20Label%20WordPress%2C%20Custom%20Login%20Page%20Customizer&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6210-cwe-200-information-exposure-in-smub-7081c93c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6210%3A%20CWE-200%20Information%20Exposure%20in%20smub%20Duplicator%20%E2%80%93%20Migration%20%26%20Backup%20Plugin&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36435-na-636c9709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36435%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5db7ef31ef0b563598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-11-f12933</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6447-cwe-79-improper-neutralization-of-in-c7255bf5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fullservices%20FULL%20%E2%80%93%20Cliente&amp;severity=high&amp;id=699f6c03b7ef31ef0b55ef5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6037-cwe-770-allocation-of-resources-with-9c363994</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6037%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b2a178f764e1f470d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6236-vulnerability-in-netsclaer-netscaler-console-bed323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6236%3A%20Vulnerability%20in%20NetSclaer%20NetScaler%20Console&amp;severity=high&amp;id=682d983ac4522896dcbed323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6235-vulnerability-in-netscaler-netscaler-console-bf5cb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6235%3A%20Vulnerability%20in%20NetScaler%20NetScaler%20Console&amp;severity=medium&amp;id=682d9848c4522896dcbf5cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5910-cwe-306-missing-authentication-for-c-8ef706e1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5910%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Palo%20Alto%20Networks%20Expedition&amp;severity=critical&amp;id=68f7d9b7247d717aace26c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5217-cwe-184-incomplete-list-of-disallowe-5f755bdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5217%3A%20CWE-184%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20ServiceNow%20Now%20Platform&amp;severity=critical&amp;id=68f7d9b6247d717aace26c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4879-cwe-1287-improper-validation-of-spec-4c459248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4879%3A%20CWE-1287%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20ServiceNow%20Now%20Platform&amp;severity=critical&amp;id=68f7d9b5247d717aace26bae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33860-cwe-614-sensitive-cookie-in-https-session-without-secure-attribute-in-ibm-security-qradar-edr-aeb5e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33860%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=682cd0f81484d88663aeb5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35006-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-ibm-security-qradar-edr-aeb5e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35006%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20Security%20QRadar%20EDR&amp;severity=medium&amp;id=682cd0f81484d88663aeb5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6556-cwe-200-information-exposure-in-wpmu-2295ca92</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6556%3A%20CWE-200%20Information%20Exposure%20in%20wpmudev%20SmartCrawl%20WordPress%20SEO%20checker%2C%20SEO%20analyzer%2C%20SEO%20optimizer&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5664-cwe-79-improper-neutralization-of-in-94cae9de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonaar%20MP3%20Audio%20Player%20%E2%80%93%20Music%20Player%2C%20Podcast%20Player%20%26%20Radio%20by%20Sonaar&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39493-vulnerability-in-linux-linux-bdde6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39493%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39492-vulnerability-in-linux-linux-be2d5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39492%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39491-vulnerability-in-linux-linux-be2d54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39491%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39490-vulnerability-in-linux-linux-be2d4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39490%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39489-vulnerability-in-linux-linux-be2d3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39489%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39488-vulnerability-in-linux-linux-be2d35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39488%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6410-cwe-639-authorization-bypass-through-b02a8dd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6410%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6c02b7ef31ef0b55eec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6411-cwe-269-improper-privilege-managemen-1f92da3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6411%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=high&amp;id=699f6c02b7ef31ef0b55eecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6550-cwe-200-information-exposure-in-tyxl-bb7a6655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6550%3A%20CWE-200%20Information%20Exposure%20in%20tyxla%20Gravity%20Forms%3A%20Multiple%20Form%20Instances&amp;severity=medium&amp;id=699f6c06b7ef31ef0b55f1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5792-cwe-89-improper-neutralization-of-sp-8fc6bee8</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5792%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Houzez%20Houzez%20CRM&amp;severity=high&amp;id=699f6bf1b7ef31ef0b55ce62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5677-cwe-862-missing-authorization-in-aum-4ddd68aa</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5677%3A%20CWE-862%20Missing%20Authorization%20in%20aumkub%20Featured%20Image%20Generator&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4866-cwe-79-improper-neutralization-of-in-2bcba2e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codersaiful%20UltraAddons%20%E2%80%93%20Elementor%20Addons%20(Header%20Footer%20Builder%2C%20Custom%20Font%2C%20Custom%20CSS%2CWoo%20Widget%2C%20Menu%20Builder%2C%20Anywhere%20Elementor%20Shortcode)&amp;severity=medium&amp;id=699f6b97b7ef31ef0b556ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22018-vulnerability-in-nodejs-node-bed5d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22018%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=low&amp;id=682d983ac4522896dcbed5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25077-na-51ebd0bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25077%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5fb7ef31ef0b570c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25076-na-522dc70b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25076%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5fb7ef31ef0b570c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40417-na-40be51df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40417%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca9b7ef31ef0b567d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40412-na-e6bde36a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40412%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca8b7ef31ef0b567a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40336-na-f9a71af0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40336%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca8b7ef31ef0b567a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40334-na-64dffc23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40334%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40333-na-104a1700</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40333%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40332-na-355d947d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40332%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca8b7ef31ef0b567a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40331-na-18e2d2e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40331%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca8b7ef31ef0b567a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40329-na-7fc4edf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40329%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca6b7ef31ef0b567325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40328-na-bf8452c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40328%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca6b7ef31ef0b567322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37770-na-f6e8c942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37770%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6fb7ef31ef0b563f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39614-na-992e268d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39614%3A%20n%2Fa&amp;severity=high&amp;id=690a2deef0ba78a0505371fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39330-na-70ef9384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39330%3A%20n%2Fa&amp;severity=medium&amp;id=690a2decf0ba78a0505371b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39329-na-5280f500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39329%3A%20n%2Fa&amp;severity=medium&amp;id=690a2decf0ba78a0505371ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38875-na-4557d528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38875%3A%20n%2Fa&amp;severity=high&amp;id=690a2decf0ba78a0505371a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-10-f12abc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21417-cwe-862-missing-authorization-in-microsoft-windows-10-version-1809-bdb549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21417%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39883-cwe-122-heap-based-buffer-overflow-in-delta-electronics-cncsoft-g2-bed2bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39883%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=682d983ac4522896dcbed2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39882-cwe-125-out-of-bounds-read-in-delta-electronics-cncsoft-g2-bed2b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39882%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=682d983ac4522896dcbed2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39881-cwe-787-out-of-bounds-write-in-delta-electronics-cncsoft-g2-bed294</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39881%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=682d983ac4522896dcbed294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39880-stack-based-buffer-overflow-cwe-121-in-delta-electronics-cncsoft-g2-bed28c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39880%3A%20STACK-BASED%20BUFFER%20OVERFLOW%20CWE-121%20in%20Delta%20Electronics%20CNCSoft-G2&amp;severity=high&amp;id=682d983ac4522896dcbed28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6501-uncontrolled-resource-consumption-d1463b15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6501%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=low&amp;id=69201212ce2640f942c372e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38105-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bdb30a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38105%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981dc4522896dcbdb30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38101-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38101%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981dc4522896dcbdb302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38099-cwe-287-improper-authentication-in-microsoft-windows-server-2019-bdb99e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38099%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d981ec4522896dcbdb99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38095-cwe-20-improper-input-validation-in-microsoft-powershell-7-4-bdb2fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38095%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20PowerShell%207.4&amp;severity=high&amp;id=682d981dc4522896dcbdb2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38094-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bdb996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38094%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d981ec4522896dcbdb996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38092-cwe-693-protection-mechanism-failure-in-microsoft-azure-cyclecloud-7-9-10-bdb98e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38092%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Azure%20CycleCloud%207.9.10&amp;severity=high&amp;id=682d981ec4522896dcbdb98e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38089-cwe-269-improper-privilege-management-in-microsoft-microsoft-defender-for-iot-bdb984</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38089%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=critical&amp;id=682d981ec4522896dcbdb984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38081-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-visual-studio-2022-version-17-4-bdb93d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38081%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.4&amp;severity=high&amp;id=682d981ec4522896dcbdb93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38079-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38079%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38078-cwe-416-use-after-free-in-microsoft-windows-11-version-21h2-bdb931</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38078%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=682d981ec4522896dcbdb931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38076-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-bdb91c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38076%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=critical&amp;id=682d981ec4522896dcbdb91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38074-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-server-2019-bdb916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38074%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=critical&amp;id=682d981ec4522896dcbdb916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38073-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2019-bdb912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38073%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38070-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-bdb8e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38070%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38069-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-windows-10-version-1809-bdb8e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38069%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38068-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-bdb8de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38068%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38067-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-bdb8da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38067%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38066-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bdb8d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38066%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38065-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb8d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38065%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38058-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-bdb889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38058%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38057-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38057%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38053-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bdb860</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38053%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38052-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bdb858</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38052%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38050-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bdb84a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38050%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38049-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-10-version-1809-bdb82e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38049%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38048-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb828</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38048%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38047-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bdb824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38047%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38044-cwe-197-numeric-truncation-error-in-microsoft-windows-server-2019-bdb81e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38044%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38033-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bdb7f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38033%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38032-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-21h2-bdb7ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38032%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=682d981ec4522896dcbdb7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38031-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-bdb7e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38031%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38030-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-bdb7bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38030%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38028-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb7b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38028%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38027-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-bdb7ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38027%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38021-cwe-20-improper-input-validation-in-microsoft-microsoft-office-2019-bdb77d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38021%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d981dc4522896dcbdb77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38020-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-microsoft-office-2019-bdb775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38020%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=682d981dc4522896dcbdb775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38019-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bdb76d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38019%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38017-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-bdb751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38017%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981dc4522896dcbdb751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38011-cwe-130-improper-handling-of-length-parameter-inconsistency-in-microsoft-windows-10-version-1809-bdb73c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38011%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38010-cwe-130-improper-handling-of-length-parameter-inconsistency-in-microsoft-windows-10-version-1809-bdb738</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38010%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37989-cwe-130-improper-handling-of-length-parameter-inconsistency-in-microsoft-windows-10-version-1809-bdb734</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37989%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37988-cwe-130-improper-handling-of-length-parameter-inconsistency-in-microsoft-windows-10-version-1809-bdb730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37988%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37984-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37984%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37978-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-11-version-22h2-bdb709</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37978%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d981dc4522896dcbdb709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37977-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2022-bdb705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37977%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d981dc4522896dcbdb705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37975-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bdb701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37975%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37973-cwe-674-uncontrolled-recursion-in-microsoft-windows-10-version-1809-bdb6f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37973%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37972-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb6f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37972%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37971-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb6e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37971%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35256-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb5c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35256%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28928-cwe-121-stack-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28928%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37336-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2017-gdr-bdb6bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37336%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37333-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb6ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37333%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37334-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-bdb6b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37334%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37330-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb68d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37330%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37329-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37329%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37328-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb67f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37328%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37327-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb67b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37327%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37326-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb659</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37326%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21449-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb561</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21449%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37324-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-13-bdb64a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37324%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2013)&amp;severity=high&amp;id=682d981dc4522896dcbdb64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37323-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2017-gdr-bdb642</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37323%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37322-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb63a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37322%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37321-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb632</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37321%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37320-cwe-416-use-after-free-in-microsoft-microsoft-sql-server-2017-gdr-bdb62a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37320%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb62a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37319-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb624</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37319%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21425-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-for-x64-based-systems-cu-27-bdb551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21425%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20for%20x64-based%20Systems%20(CU%2027)&amp;severity=high&amp;id=682d981dc4522896dcbdb551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21331-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb4ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21331%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21317-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb4ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21317%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21308-cwe-416-use-after-free-in-microsoft-microsoft-sql-server-2017-gdr-bdb4d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21308%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21303-cwe-416-use-after-free-in-microsoft-microsoft-sql-server-2022-for-cu-13-bdb4d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21303%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2013)&amp;severity=high&amp;id=682d981dc4522896dcbdb4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20701-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb4cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20701%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35272-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-bdb60f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35272%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=682d981dc4522896dcbdb60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35271-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35271%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35267-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-azure-devops-server-2022-bdb5df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35267%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20DevOps%20Server%202022&amp;severity=high&amp;id=682d981dc4522896dcbdb5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35266-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-azure-devops-server-2022-bdb5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35266%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20DevOps%20Server%202022&amp;severity=high&amp;id=682d981dc4522896dcbdb5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35261-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-network-watcher-vm-extension-bdb5d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35261%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Network%20Watcher%20VM%20Extension&amp;severity=high&amp;id=682d981dc4522896dcbdb5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30105-cwe-400-uncontrolled-resource-consumption-in-microsoft-net-8-0-bdb2fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30105%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%208.0&amp;severity=high&amp;id=682d981dc4522896dcbdb2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30079-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-bdb5b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30079%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30071-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-bdb5b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30071%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981dc4522896dcbdb5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32987-cwe-918-server-side-request-forgery-ssrf-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bdb5c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32987%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d981dc4522896dcbdb5c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30013-cwe-415-double-free-in-microsoft-windows-10-version-1809-bdb591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30013%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26184-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2022-bdb569</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26184%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=682d981dc4522896dcbdb569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38112-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-windows-10-version-22h2-bdb9d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38112%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Windows%2010%20Version%2022H2&amp;severity=high&amp;id=682d981ec4522896dcbdb9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38104-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bdb9d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38104%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38102-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb9c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38102%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38100-cwe-284-improper-access-control-in-microsoft-windows-server-2019-bdb9a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38100%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38091-cwe-166-improper-handling-of-missing-special-element-in-microsoft-windows-10-version-1809-bdb988</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38091%3A%20CWE-166%3A%20Improper%20Handling%20of%20Missing%20Special%20Element%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38086-cwe-197-numeric-truncation-error-in-microsoft-azure-kinect-sdk-bdb95a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38086%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Azure%20Kinect%20SDK&amp;severity=medium&amp;id=682d981ec4522896dcbdb95a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38085-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bdb952</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38085%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38080-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2022-bdb939</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38080%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d981ec4522896dcbdb939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38077-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-bdb92d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38077%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=critical&amp;id=682d981ec4522896dcbdb92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38072-cwe-476-null-pointer-dereference-in-microsoft-windows-server-2019-bdb90a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38072%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38071-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-bdb8fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38071%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981ec4522896dcbdb8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38064-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-bdb8c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38064%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38062-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb8b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38062%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38061-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-bdb8b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38061%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38060-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb8ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38060%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38059-cwe-416-use-after-free-in-microsoft-windows-server-2022-bdb896</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38059%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d981ec4522896dcbdb896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38056-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bdb881</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38056%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38055-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bdb870</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38055%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38054-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb868</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38054%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38051-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38043-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bdb818</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38043%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38041-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-bdb807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38041%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981ec4522896dcbdb807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38034-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bdb7ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38034%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38025-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb7a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38025%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981ec4522896dcbdb7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38024-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bdb795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38024%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d981dc4522896dcbdb795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38023-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bdb78d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38023%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d981dc4522896dcbdb78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38022-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-bdb785</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38022%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38015-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-bdb744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38015%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d981dc4522896dcbdb744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38013-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-bdb740</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38013%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981dc4522896dcbdb740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37987-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-bdb72c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37987%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37986-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bdb728</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37986%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37981-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bdb70d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37981%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37974-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-bdb6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37974%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37970-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb6e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37970%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37969-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bdb6c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37969%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37331-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb695</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37331%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37332-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb6a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37332%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37318-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-for-x64-based-systems-cu-27-bdb620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37318%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20for%20x64-based%20Systems%20(CU%2027)&amp;severity=high&amp;id=682d981dc4522896dcbdb620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21428-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2017-gdr-bdb559</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21428%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21415-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb541</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21415%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21414-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb53d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21414%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21398-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21398%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21373-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21373%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21335-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb500</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21335%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21333-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21333%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21332-cwe-416-use-after-free-in-microsoft-microsoft-sql-server-2017-gdr-bdb4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21332%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981dc4522896dcbdb4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38087-cwe-415-double-free-in-microsoft-microsoft-sql-server-2017-gdr-bdb962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38087%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981ec4522896dcbdb962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38088-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2017-gdr-bdb96a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38088%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202017%20(GDR)&amp;severity=high&amp;id=682d981ec4522896dcbdb96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35270-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-10-version-1809-bdb5e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35270%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d981dc4522896dcbdb5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35264-cwe-416-use-after-free-in-microsoft-net-6-0-bda7e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35264%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=682d981cc4522896dcbda7e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30098-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-microsoft-windows-server-2025-server-core-installation-bdb2f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30098%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Windows%20Server%202025%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d981dc4522896dcbdb2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30081-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-bdb5bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30081%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28899-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-bdb578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28899%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d981dc4522896dcbdb578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30061-cwe-285-improper-authorization-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-bdb5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30061%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d981dc4522896dcbdb5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6237-improper-handling-of-missing-values-d8e4a4b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6237%3A%20Improper%20Handling%20of%20Missing%20Values&amp;severity=medium&amp;id=691f730d28b41f27b438b872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27782-improper-access-control-in-fortinet-957333ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27782%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAIOps&amp;severity=high&amp;id=696132fa6c9099d823e56086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27784-information-disclosure-in-fortinet--c2eeeb8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27784%3A%20Information%20disclosure%20in%20Fortinet%20FortiAIOps&amp;severity=high&amp;id=696132fa6c9099d823e5608c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27785-execute-unauthorized-code-or-comman-d8c71a43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27785%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAIOps&amp;severity=medium&amp;id=696132fa6c9099d823e5608f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27783-improper-access-control-in-fortinet-0b0a6387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27783%3A%20Improper%20access%20control%20in%20Fortinet%20FortiAIOps&amp;severity=high&amp;id=696132fa6c9099d823e56089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6615-vulnerability-in-mozilla-firefox-018cc0bc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6615%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039194aebfcd54747fad3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6614-vulnerability-in-mozilla-firefox-48799500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6614%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039194aebfcd54747fad39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6613-vulnerability-in-mozilla-firefox-ce2e1569</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6613%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039194aebfcd54747fad34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6612-vulnerability-in-mozilla-firefox-4eef7c78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6612%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039194aebfcd54747fad2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6611-vulnerability-in-mozilla-firefox-b824d453</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6611%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69039194aebfcd54747fad2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6610-vulnerability-in-mozilla-firefox-47fc8f4d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6610%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039194aebfcd54747fad25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6609-vulnerability-in-mozilla-firefox-d83f6eaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6609%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039194aebfcd54747fad20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6608-vulnerability-in-mozilla-firefox-0115c06f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6608%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039194aebfcd54747fad1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6607-vulnerability-in-mozilla-firefox-f76d043b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6607%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039192aebfcd54747fad0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6606-vulnerability-in-mozilla-firefox-bf2a2cfa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6606%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039192aebfcd54747fad07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6605-vulnerability-in-mozilla-firefox-c8e66372</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6605%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039192aebfcd54747fad03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6604-vulnerability-in-mozilla-firefox-4911d948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6604%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039192aebfcd54747facfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6603-vulnerability-in-mozilla-firefox-c5b9dc0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6603%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69039192aebfcd54747facf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6602-vulnerability-in-mozilla-firefox-c6dfff30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6602%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=69039192aebfcd54747facee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6601-vulnerability-in-mozilla-firefox-5e5b3124</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6601%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039192aebfcd54747face7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6600-vulnerability-in-mozilla-firefox-2e419b3e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6600%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69039192aebfcd54747face0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39328-uncontrolled-resource-consumption-eb16beab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39328%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f730d28b41f27b438b86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37520-improper-control-of-filename-for-in-315ca5aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37520%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20RadiusTheme%20ShopBuilder%20%E2%80%93%20Elementor%20WooCommerce%20Builder%20Addons&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39888-cwe-547-use-of-hard-coded-security-relevant-constants-in-siemens-mendix-encryption-bed2c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39888%3A%20CWE-547%3A%20Use%20of%20Hard-coded%2C%20Security-relevant%20Constants%20in%20Siemens%20Mendix%20Encryption&amp;severity=high&amp;id=682d983ac4522896dcbed2c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39876-cwe-770-allocation-of-resources-without-limits-or-throttling-in-siemens-sinema-remote-connect-server-bed284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39876%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d983ac4522896dcbed284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39875-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-sinema-remote-connect-server-bed275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39875%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d983ac4522896dcbed275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39874-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-siemens-sinema-remote-connect-server-bed26d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39874%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39873-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-siemens-sinema-remote-connect-server-bed265</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39873%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39872-cwe-378-creation-of-temporary-file-with-insecure-permissions-in-siemens-sinema-remote-connect-server-bed25f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39872%3A%20CWE-378%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=critical&amp;id=682d983ac4522896dcbed25f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39871-cwe-863-incorrect-authorization-in-siemens-sinema-remote-connect-server-bed259</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39871%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d983ac4522896dcbed259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39870-cwe-602-client-side-enforcement-of-server-side-security-in-siemens-sinema-remote-connect-server-bed248</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39870%3A%20CWE-602%3A%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d983ac4522896dcbed248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39869-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-siemens-sinema-remote-connect-server-bed240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39869%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d983ac4522896dcbed240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39868-cwe-425-direct-request-forced-browsing-in-siemens-sinema-remote-connect-server-bed220</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39868%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39867-cwe-425-direct-request-forced-browsing-in-siemens-sinema-remote-connect-server-bed218</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39867%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39866-cwe-267-privilege-defined-with-unsafe-actions-in-siemens-sinema-remote-connect-server-bed210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39866%3A%20CWE-267%3A%20Privilege%20Defined%20With%20Unsafe%20Actions%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39865-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-siemens-sinema-remote-connect-server-bed208</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39865%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39675-cwe-497-exposure-of-sensitive-system-information-to-an-unauthorized-control-sphere-in-siemens-ruggedcom-rmc30-bed200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39675%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Siemens%20RUGGEDCOM%20RMC30&amp;severity=high&amp;id=682d983ac4522896dcbed200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39571-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-sinema-remote-connect-server-bed1ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39571%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed1ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39570-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-sinema-remote-connect-server-bed1e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39570%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=high&amp;id=682d983ac4522896dcbed1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39569-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-sinema-remote-connect-client-bed1d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39569%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Client&amp;severity=medium&amp;id=682d983ac4522896dcbed1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39568-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-sinema-remote-connect-client-bed1d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39568%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Client&amp;severity=high&amp;id=682d983ac4522896dcbed1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39567-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-sinema-remote-connect-client-bed1c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39567%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Client&amp;severity=high&amp;id=682d983ac4522896dcbed1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38867-cwe-326-inadequate-encryption-strength-in-siemens-siprotec-5-6md84-cp300-bed1af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38867%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Siemens%20SIPROTEC%205%206MD84%20(CP300)&amp;severity=medium&amp;id=682d983ac4522896dcbed1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38278-cwe-266-incorrect-privilege-assignment-in-siemens-ruggedcom-rmc8388-v5-x-bed1ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38278%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Siemens%20RUGGEDCOM%20RMC8388%20V5.X&amp;severity=medium&amp;id=682d983ac4522896dcbed1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37997-cwe-121-stack-based-buffer-overflow-in-siemens-jt-open-bed19e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37997%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20JT%20Open&amp;severity=high&amp;id=682d983ac4522896dcbed19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37996-cwe-476-null-pointer-dereference-in-siemens-jt-open-bed19a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37996%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20JT%20Open&amp;severity=low&amp;id=682d983ac4522896dcbed19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32056-cwe-787-out-of-bounds-write-in-siemens-simcenter-femap-bed18e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32056%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=682d983ac4522896dcbed18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30321-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-siemens-simatic-pcs-7-v9-1-bed186</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30321%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SIMATIC%20PCS%207%20V9.1&amp;severity=medium&amp;id=682d983ac4522896dcbed186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52891-cwe-1325-improperly-controlled-sequential-memory-allocation-in-siemens-simatic-energy-manager-basic-bed15a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52891%3A%20CWE-1325%3A%20Improperly%20Controlled%20Sequential%20Memory%20Allocation%20in%20Siemens%20SIMATIC%20Energy%20Manager%20Basic&amp;severity=medium&amp;id=682d983ac4522896dcbed15a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52238-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-siemens-ruggedcom-rst2228-bed156</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52238%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20RUGGEDCOM%20RST2228&amp;severity=medium&amp;id=682d983ac4522896dcbed156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52237-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-siemens-ruggedcom-i800-bed152</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52237%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=high&amp;id=682d983ac4522896dcbed152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32737-cwe-502-deserialization-of-untrusted-data-in-siemens-simatic-step-7-safety-v18-bed0d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32737%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20STEP%207%20Safety%20V18&amp;severity=medium&amp;id=682d983ac4522896dcbed0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32735-cwe-502-deserialization-of-untrusted-data-in-siemens-simatic-step-7-safety-v16-bed0d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32735%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20STEP%207%20Safety%20V16&amp;severity=medium&amp;id=682d983ac4522896dcbed0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45147-cwe-502-deserialization-of-untrusted-data-in-siemens-simatic-pcs-neo-v4-0-bed0ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45147%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SIMATIC%20PCS%20neo%20V4.0&amp;severity=high&amp;id=682d983ac4522896dcbed0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3596-cwe-328-use-of-weak-hash-in-ietf-rfc-bed2ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3596%3A%20CWE-328%3A%20Use%20of%20Weak%20Hash%20in%20IETF%20RFC&amp;severity=critical&amp;id=682d983ac4522896dcbed2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37497-improper-limitation-of-a-pathname-t-bda83de2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37497%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Crocoblock%20JetThemeCore&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6391-cwe-79-improper-neutralization-of-in-45534702</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=medium&amp;id=699f6c02b7ef31ef0b55eeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4862-cwe-79-improper-neutralization-of-in-eec49f76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6b97b7ef31ef0b556fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5946-cwe-79-improper-neutralization-of-in-da75e69a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20squelch%20Squelch%20Tabs%20and%20Accordions%20Shortcodes&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37437-improper-neutralization-of-input-du-c6871d6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37437%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elementor%20Elementor%20Website%20Builder&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37430-authentication-bypass-by-spoofing-i-8af06ccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37430%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20patreon%20Patreon%20WordPress&amp;severity=null&amp;id=69cd7457e6bfc5ba1def6d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37418-unrestricted-upload-of-file-with-da-91f80c77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37418%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37410-improper-control-of-filename-for-in-6ab94d16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37410%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20IdeaBox%20Creations%20PowerPack%20Lite%20for%20Beaver%20Builder&amp;severity=null&amp;id=69cd7455e6bfc5ba1def6c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39487-vulnerability-in-linux-linux-be2d16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39487%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37502-deserialization-of-untrusted-data-i-3de36b76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20wpweb%20WooCommerce%20Social%20Login&amp;severity=null&amp;id=69cd745de6bfc5ba1def6e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3563-cwe-79-improper-neutralization-of-in-591be7eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3563%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20studiopress%20Genesis%20Blocks&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3604-cwe-89-improper-neutralization-of-sp-a343c2ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3604%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=critical&amp;id=699f6c97b7ef31ef0b56694e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5669-cwe-862-missing-authorization-in-opt-a2f8e30e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5669%3A%20CWE-862%20Missing%20Authorization%20in%20optemiz%20XPlainer%20%E2%80%93%20WooCommerce%20Product%20FAQ%20%5BWooCommerce%20Accordion%20FAQ%20Plugin%5D&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6069-cwe-862-missing-authorization-in-gen-86926741</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6069%3A%20CWE-862%20Missing%20Authorization%20in%20genetechproducts%20Registration%20Forms%20%E2%80%93%20User%20Registration%20Forms%2C%20Invitation-Based%20Registrations%2C%20Front-end%20User%20Profile%2C%20Login%20Form%20%26%20Content%20Restriction&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4102-cwe-862-missing-authorization-in-elf-f803b6b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4102%3A%20CWE-862%20Missing%20Authorization%20in%20elfsight%20Pricing%20Table&amp;severity=medium&amp;id=699f6b82b7ef31ef0b556142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5992-cwe-862-missing-authorization-in-cli-4526d9c5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5992%3A%20CWE-862%20Missing%20Authorization%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5937-cwe-79-improper-neutralization-of-in-97e391dd</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5937%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mardojai%20Simple%20Alert%20Boxes&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6168-cwe-352-cross-site-request-forgery-c-4f500b54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6168%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aprokopenko%20Just%20Custom%20Fields&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5456-cwe-22-improper-limitation-of-a-path-27a3a46a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5456%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20pandavideo%20Panda%20Video&amp;severity=high&amp;id=699f6be8b7ef31ef0b55c024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5457-cwe-79-improper-neutralization-of-in-54a4a3df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5457%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pandavideo%20Panda%20Video&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3228-cwe-200-information-exposure-in-wpku-3bf235b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3228%3A%20CWE-200%20Information%20Exposure%20in%20wpkube%20Social%20Sharing%20Plugin%20%E2%80%93%20Kiwi&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b56639c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3603-cwe-79-improper-neutralization-of-in-ad9baced</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3603%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20photoweblog%20OSM%20%E2%80%93%20OpenStreetMap&amp;severity=medium&amp;id=699f6c97b7ef31ef0b56694a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5648-cwe-862-missing-authorization-in-ste-77b99256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5648%3A%20CWE-862%20Missing%20Authorization%20in%20stellarwp%20LearnDash%20LMS%20%E2%80%93%20Reports&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5856-cwe-862-missing-authorization-in-wpp-297f7bf2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5856%3A%20CWE-862%20Missing%20Authorization%20in%20wppuzzle%20Comment%20Images%20Reloaded&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4100-cwe-352-cross-site-request-forgery-c-2ca0135f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4100%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20elfsight%20Pricing%20Table&amp;severity=medium&amp;id=699f6b82b7ef31ef0b55613e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4868-cwe-79-improper-neutralization-of-in-df6dfef3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20petesheppard84%20Extensions%20for%20Elementor&amp;severity=medium&amp;id=699f6b97b7ef31ef0b556fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5600-cwe-862-missing-authorization-in-hap-efe9f49e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5600%3A%20CWE-862%20Missing%20Authorization%20in%20happymonkeyagency%20SCSS%20Happy%20Compiler%20%E2%80%93%20Compile%20SCSS%20to%20CSS%20%26%20Automatic%20Enqueue&amp;severity=medium&amp;id=699f6becb7ef31ef0b55c2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3608-cwe-862-missing-authorization-in-pic-385c69b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3608%3A%20CWE-862%20Missing%20Authorization%20in%20pickplugins%20Product%20Designer&amp;severity=medium&amp;id=699f6c97b7ef31ef0b56695a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5810-cwe-798-use-of-hard-coded-credential-eb61fc0b</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5810%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20wp2speed%20WP2Speed%20Faster%20%E2%80%93%20Optimize%20PageSpeed%20Insights%20Score%2090-100&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5704-cwe-862-missing-authorization-in-opt-b22b44be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5704%3A%20CWE-862%20Missing%20Authorization%20in%20optemiz%20XPlainer%20%E2%80%93%20WooCommerce%20Product%20FAQ%20%5BWooCommerce%20Accordion%20FAQ%20Plugin%5D&amp;severity=medium&amp;id=699f6bf0b7ef31ef0b55ccee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6167-cwe-862-missing-authorization-in-apr-418e7d11</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6167%3A%20CWE-862%20Missing%20Authorization%20in%20aprokopenko%20Just%20Custom%20Fields&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5479-cwe-79-improper-neutralization-of-in-c2185839</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jevnet%20Easy%20Pixels&amp;severity=high&amp;id=699f6be8b7ef31ef0b55c03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5993-cwe-862-missing-authorization-in-cli-a3de3e82</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5993%3A%20CWE-862%20Missing%20Authorization%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6320-cwe-352-cross-site-request-forgery-c-7950113f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6320%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dwieeb%20ScrollTo%20Top&amp;severity=high&amp;id=699f6c01b7ef31ef0b55edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6321-cwe-352-cross-site-request-forgery-c-3c1cf396</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6321%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dwieeb%20ScrollTo%20Bottom&amp;severity=high&amp;id=699f6c01b7ef31ef0b55ee01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6310-cwe-352-cross-site-request-forgery-c-91367df5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6310%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20deano1987%20Advanced%20AJAX%20Page%20Loader&amp;severity=high&amp;id=699f6c00b7ef31ef0b55ed5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6314-cwe-434-unrestricted-upload-of-file--e75bc530</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6314%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20rmac0001%20IQ%20Testimonials&amp;severity=critical&amp;id=699f6c00b7ef31ef0b55ed72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6313-cwe-434-unrestricted-upload-of-file--5dabe48e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6313%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20nikolaystrikhar%20Gutenberg%20Forms%20%E2%80%93%20WordPress%20Form%20Builder%20Plugin&amp;severity=critical&amp;id=699f6c00b7ef31ef0b55ed6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6309-cwe-352-cross-site-request-forgery-c-4428b7e9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6309%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20praveen-rajan%20Attachment%20File%20Icons%20(AF%20Icons)&amp;severity=high&amp;id=699f6c00b7ef31ef0b55ed59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5881-cwe-79-improper-neutralization-of-in-c266327a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5881%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tranbinhcse%20Webico%20Slider%20Flatsome%20Addons&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6123-cwe-434-unrestricted-upload-of-file--d4fd3679</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6123%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20bitpressadmin%20Contact%20Form%20by%20Bit%20Form%3A%20Multi%20Step%20Form%2C%20Calculation%20Contact%20Form%2C%20Payment%20Contact%20Form%20%26%20Custom%20Contact%20Form%20builder&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6316-cwe-352-cross-site-request-forgery-c-0117f05f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6316%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zealopensource%20Generate%20PDF%20using%20Contact%20Form%207&amp;severity=high&amp;id=699f6c00b7ef31ef0b55ed7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6317-cwe-352-cross-site-request-forgery-c-5cbe2ac0</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6317%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zealopensource%20Generate%20PDF%20using%20Contact%20Form%207&amp;severity=high&amp;id=699f6c01b7ef31ef0b55edee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6180-cwe-862-missing-authorization-in-ash-d934fb1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6180%3A%20CWE-862%20Missing%20Authorization%20in%20ashanjay%20EventON&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37923-cross-site-request-forgery-csrf-in--d7360f23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37923%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cliengo%20Cliengo%20%E2%80%93%20Chatbot&amp;severity=null&amp;id=69cd7461e6bfc5ba1def6fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6161-cwe-434-unrestricted-upload-of-file--d52ccf17</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6161%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pjgalbraith%20Default%20Thumbnail%20Plus&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37555-unrestricted-upload-of-file-with-da-a1bcf446</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37555%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ZealousWeb%20Generate%20PDF%20using%20Contact%20Form%207&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5441-cwe-434-unrestricted-upload-of-file--bdde48ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5441%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Webnus%20Modern%20Events%20Calendar&amp;severity=high&amp;id=699f6be7b7ef31ef0b55bfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6169-cwe-79-improper-neutralization-of-in-cde28330</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6169%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6170-cwe-79-improper-neutralization-of-in-281cc057</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4667-cwe-79-improper-neutralization-of-in-ad600c5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20plugindevs%20Blog%2C%20Posts%20and%20Category%20Filter%20for%20Elementor&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6166-cwe-89-improper-neutralization-of-sp-0433581a</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6166%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6171-cwe-348-use-of-less-trusted-source-i-f6d705cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6171%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6bfcb7ef31ef0b55d5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6365-cwe-94-improper-control-of-generatio-53dcb95b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6365%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20woobewoo%20Product%20Table%20by%20WBW&amp;severity=critical&amp;id=699f6c02b7ef31ef0b55eea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5793-cwe-89-improper-neutralization-of-sp-cc86ac31</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Favethemes%20Houzez%20Theme%20-%20Functionality&amp;severity=high&amp;id=699f6bf1b7ef31ef0b55ce66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5855-cwe-862-missing-authorization-in-slu-d0ba5def</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5855%3A%20CWE-862%20Missing%20Authorization%20in%20slui%20Media%20Hygiene%3A%20Remove%20or%20Delete%20Unused%20Images%20and%20More!&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22020-vulnerability-in-nodejs-node-bed5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22020%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5569-cwe-835-loop-with-unreachable-exit-c-a45b0c4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5569%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20jaraco%20jaraco%2Fzipp&amp;severity=medium&amp;id=68ef9b28178f764e1f470ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29153-na-c644f947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29153%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b58939d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28068-na-3b5cce33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28068%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28067-na-b76f61b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28067%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27386-na-700a34a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27386%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7db7ef31ef0b579abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27385-na-51435127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27385%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7db7ef31ef0b579ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27363-na-3bd7ab11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27363%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7db7ef31ef0b579aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27361-na-b724b487</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27361%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7bb7ef31ef0b576c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40750-na-b8a258e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40750%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b56817f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40742-na-efc002c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40742%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b568154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40741-na-bd7bd8bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40741%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b56814e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40740-na-e13d53be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40740%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b568148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40739-na-d7bcea5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40739%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b568142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40738-na-1e0f7fc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40738%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b56813c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40736-na-8585ac64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40736%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b568136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40735-na-c708797d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40735%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b568130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40734-na-a27e74b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40734%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b56812a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40733-na-aaf38ed4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40733%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cb1b7ef31ef0b568127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40732-na-6b0b44ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40732%3A%20n%2Fa&amp;severity=high&amp;id=699f6cb1b7ef31ef0b568124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40731-na-3b8e83a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40731%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b5680ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40730-na-fb00baee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40730%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b5680b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40729-na-032856e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40729%3A%20n%2Fa&amp;severity=high&amp;id=699f6cafb7ef31ef0b5680b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40728-na-1a40a432</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40728%3A%20n%2Fa&amp;severity=high&amp;id=699f6cafb7ef31ef0b5680b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40727-na-47cd5879</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40727%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b5680ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40726-na-b7e29309</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40726%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b5680ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40038-na-399848bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40038%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca4b7ef31ef0b5671b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40037-na-6234721f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40037%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca3b7ef31ef0b567181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40036-na-e18b238e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40036%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca3b7ef31ef0b56717b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40035-na-0961e184</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40035%3A%20n%2Fa&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b567174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40034-na-b94bf8df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40034%3A%20n%2Fa&amp;severity=high&amp;id=699f6ca3b7ef31ef0b56716d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39181-na-8f1c777f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39181%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c83b7ef31ef0b565cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39171-na-315bc190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39171%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39072-na-455ba44c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39072%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c81b7ef31ef0b565b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39071-na-9312ec36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39071%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c81b7ef31ef0b565b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39069-na-304c05c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39069%3A%20n%2Fa&amp;severity=high&amp;id=699f6c81b7ef31ef0b565b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39063-na-83cf0041</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39063%3A%20n%2Fa&amp;severity=high&amp;id=699f6c81b7ef31ef0b565b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39031-na-0adfd365</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39031%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c81b7ef31ef0b565b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38972-na-40e5fbd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38972%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b56501b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38963-na-d2868c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38963%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b565017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38959-na-246464de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38959%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b565014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37873-na-4e1fbef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37873%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c72b7ef31ef0b564268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37872-na-3c7b56bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37872%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b564265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37871-na-f6a8e78b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37871%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b564262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37870-na-efdbfac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37870%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c72b7ef31ef0b56425f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37865-na-588f7b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37865%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c72b7ef31ef0b564254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37830-na-b4a3b39a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37830%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c71b7ef31ef0b56410c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37829-na-8c86a5da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37829%3A%20n%2Fa&amp;severity=high&amp;id=699f6c71b7ef31ef0b564109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36676-na-1f648eb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36676%3A%20n%2Fa&amp;severity=high&amp;id=699f6c63b7ef31ef0b5638f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36526-na-d5ec88a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36526%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b563676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-09-f12aa5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3653-missing-release-of-memory-after-effe-30c4f0f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3653%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=68faafd950358b89bd7bfd3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5971-uncontrolled-recursion-db28b7ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5971%3A%20Uncontrolled%20Recursion&amp;severity=high&amp;id=68faafd950358b89bd7bfd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6409-signal-handler-race-condition-264ac2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6409%3A%20Signal%20Handler%20Race%20Condition&amp;severity=high&amp;id=682f7ce40acd01a249264ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47677-cwe-352-cross-site-request-forgery--bf742c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47677%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5cff58c9332ff08e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34435-cwe-347-improper-verification-of-cr-4c828a68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34435%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b58ff58c9332ff08afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21778-cwe-122-heap-based-buffer-overflow--e133cf98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21778%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b61ff58c9332ff09434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46685-cwe-259-use-of-hard-coded-password--1972d17e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46685%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20LevelOne%20WBR-6013&amp;severity=critical&amp;id=690a3b5aff58c9332ff08e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49593-cwe-489-leftover-debug-code-in-leve-c2608cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49593%3A%20CWE-489%3A%20Leftover%20Debug%20Code%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49073-cwe-121-stack-based-buffer-overflow-507b1cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49073%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5cff58c9332ff08e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48270-cwe-121-stack-based-buffer-overflow-988d7117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48270%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5cff58c9332ff08e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45742-cwe-190-integer-overflow-or-wraparo-d749eda1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45742%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5aff58c9332ff08e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49595-cwe-121-stack-based-buffer-overflow-44d0166b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49595%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45215-cwe-121-stack-based-buffer-overflow-15dc1c74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45215%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5aff58c9332ff08e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47856-cwe-121-stack-based-buffer-overflow-26dbedc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47856%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5cff58c9332ff08e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50240-cwe-121-stack-based-buffer-overflow-74d98397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50240%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50239-cwe-121-stack-based-buffer-overflow-ad1c4068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50239%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41251-cwe-121-stack-based-buffer-overflow-0b3532bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41251%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5aff58c9332ff08e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50244-cwe-121-stack-based-buffer-overflow-b57e9ab1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50244%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50243-cwe-121-stack-based-buffer-overflow-ad6a4711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50243%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50383-cwe-78-improper-neutralization-of-s-88567adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50383%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5fff58c9332ff09307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50382-cwe-78-improper-neutralization-of-s-636ff4c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50382%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5fff58c9332ff09302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50381-cwe-78-improper-neutralization-of-s-344932ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50381%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5fff58c9332ff092fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50330-cwe-121-stack-based-buffer-overflow-e1dbb5e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50330%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49867-cwe-121-stack-based-buffer-overflow-c00d12e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49867%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20LevelOne%20WBR-6013&amp;severity=high&amp;id=690a3b5dff58c9332ff08ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4341-cwe-639-authorization-bypass-through-662f696d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4341%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ExtremePacs%20Extreme%20XDS&amp;severity=medium&amp;id=68ee47d1509368ccaa6fd061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31504-na-6501153b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31504%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58ee34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39202-na-8da45780</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39202%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-08-f1302d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f1302d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3651-cwe-1333-inefficient-regular-express-f8dea264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3651%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20kjd%20kjd%2Fidna&amp;severity=medium&amp;id=68ef9b26178f764e1f470b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40614-na-fe7f39b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40614%3A%20n%2Fa&amp;severity=medium&amp;id=6925be8c5b1d823317eaa228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-07-f12c91</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37554-improper-neutralization-of-input-du-946c41b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37554%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saiful%20Islam%20UltraAddons%20Elementor%20Lite&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37541-improper-neutralization-of-input-du-b3d78085</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37541%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StaxWP%20Elementor%20Addons%2C%20Widgets%20and%20Enhancements%20%E2%80%93%20Stax&amp;severity=null&amp;id=69cd745fe6bfc5ba1def6f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39486-vulnerability-in-linux-linux-be2d12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39486%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40601-na-9a358c9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40601%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b5680a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40600-na-aba4a8e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40600%3A%20n%2Fa&amp;severity=medium&amp;id=699f6cafb7ef31ef0b5680a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40597-na-59fc63be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40597%3A%20n%2Fa&amp;severity=high&amp;id=699f6cafb7ef31ef0b5680a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40594-na-fb8a7c36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40594%3A%20n%2Fa&amp;severity=low&amp;id=699f6cafb7ef31ef0b568067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-06-f12f75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5753-cwe-89-improper-neutralization-of-sp-e32f5018</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5753%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20vanna-ai%20vanna-ai%2Fvanna&amp;severity=high&amp;id=68ef9b28178f764e1f470cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6505-out-of-bounds-read-b40d5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6505%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=682d46994d7c5ea9f4b40d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39485-vulnerability-in-linux-linux-be2d0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39485%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39484-vulnerability-in-linux-linux-be2d01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39484%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39483-vulnerability-in-linux-linux-be2cfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39483%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39482-vulnerability-in-linux-linux-be2cf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39482%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39481-vulnerability-in-linux-linux-be2cec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39481%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39480-vulnerability-in-linux-linux-be2ce8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39480%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39479-vulnerability-in-linux-linux-be2ce4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39478-vulnerability-in-linux-linux-be2ce0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39478%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39477-vulnerability-in-linux-linux-be2cbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39477%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39476-vulnerability-in-linux-linux-bdde66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39475-vulnerability-in-linux-linux-bdde62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39475%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39474-vulnerability-in-linux-linux-be2cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39474%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39473-vulnerability-in-linux-linux-be2cb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39473%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39472-vulnerability-in-linux-linux-be2cb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39472%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39027-na-537af541</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39027%3A%20n%2Fa&amp;severity=high&amp;id=69a709cdd1a09e29cb586e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29319-na-0df16489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29319%3A%20n%2Fa&amp;severity=low&amp;id=699f6d9bb7ef31ef0b5894c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27717-na-4f8c77cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27716-na-78b584d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27716%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27715-na-897d50c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27715%3A%20n%2Fa&amp;severity=high&amp;id=699f6d87b7ef31ef0b587da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27713-na-9e5e2e80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27713%3A%20n%2Fa&amp;severity=high&amp;id=699f6d85b7ef31ef0b584ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27711-na-7ab831e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27711%3A%20n%2Fa&amp;severity=high&amp;id=699f6d85b7ef31ef0b584fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27710-na-cc059ebd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27710%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d85b7ef31ef0b584fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27709-na-acb64801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27709%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d85b7ef31ef0b584fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23998-na-05acdcce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23998%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d54b7ef31ef0b570611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23997-na-bd453551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d54b7ef31ef0b57060e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39210-na-ec806f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39210%3A%20n%2Fa&amp;severity=high&amp;id=699f6c85b7ef31ef0b565d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39182-na-caac4979</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39182%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39178-na-fd3c43e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39178%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c83b7ef31ef0b565cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39174-na-384ea42f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39174%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c83b7ef31ef0b565cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39150-na-8ef2bccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39150%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39028-na-51aff258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39028%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c81b7ef31ef0b565b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39023-na-94fc1116</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39023%3A%20n%2Fa&amp;severity=high&amp;id=699f6c80b7ef31ef0b565ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39022-na-44f02960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39022%3A%20n%2Fa&amp;severity=high&amp;id=699f6c80b7ef31ef0b565adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39021-na-85dd4199</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39021%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39020-na-26ce9ba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39020%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39019-na-3fb2b563</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39019%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565ad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37769-na-73f47c03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37769%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37767-na-b9cbbc1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37767%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563f8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33862-na-e1f33b21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33862%3A%20n%2Fa&amp;severity=high&amp;id=699f6c49b7ef31ef0b561f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52340-na-cdd5cab1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52340%3A%20n%2Fa&amp;severity=high&amp;id=690a3b61ff58c9332ff0941a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36041-na-fc60dcab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36041%3A%20n%2Fa&amp;severity=high&amp;id=690a3b50ff58c9332ff073e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34481-na-2cac34ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34481%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b50ff58c9332ff073bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32498-na-37060bbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32498%3A%20n%2Fa&amp;severity=medium&amp;id=690a2debf0ba78a050536ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-05-f124bc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f124bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37472-improper-neutralization-of-input-du-f540e2a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37472%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WofficeIO%20Woffice&amp;severity=null&amp;id=69cd745ae6bfc5ba1def6dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5943-cwe-352-cross-site-request-forgery-c-09220267</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5943%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kylephillips%20Nested%20Pages&amp;severity=high&amp;id=699f6bf8b7ef31ef0b55d260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32754-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-johnson-controls-kantech-kt1-door-controller-rev01-bed196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32754%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Johnson%20Controls%20Kantech%20KT1%20Door%20Controller%2C%20Rev01&amp;severity=low&amp;id=682d983ac4522896dcbed196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1574-cwe-470-use-of-externally-controlled-8342d446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1574%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Mitsubishi%20Electric%20Iconics%20Digital%20Solutions%20GENESIS64&amp;severity=medium&amp;id=695f9d8ec901b06321e41284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1573-cwe-306-missing-authentication-for-c-38b6ca46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1573%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Iconics%20Digital%20Solutions%20GENESIS64&amp;severity=medium&amp;id=695f9d8ec901b06321e4127f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1182-cwe-427-uncontrolled-search-path-ele-cb09cbe2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1182%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Mitsubishi%20Electric%20Iconics%20Digital%20Solutions%20GENESIS64&amp;severity=high&amp;id=695f99f7c901b06321e2674f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6319-cwe-434-unrestricted-upload-of-file--6db1941f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6319%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wbolt%20IMGspider%20%E2%80%93%20%E5%9B%BE%E7%89%87%E9%87%87%E9%9B%86%E6%8A%93%E5%8F%96%E6%8F%92%E4%BB%B6&amp;severity=high&amp;id=699f6c01b7ef31ef0b55edf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6434-cwe-400-uncontrolled-resource-consum-39655273</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6434%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20(&apos;Resource%20Exhaustion&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=low&amp;id=699f6c03b7ef31ef0b55ef58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6318-cwe-434-unrestricted-upload-of-file--789c3085</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6318%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wbolt%20IMGspider%20%E2%80%93%20%E5%9B%BE%E7%89%87%E9%87%87%E9%9B%86%E6%8A%93%E5%8F%96%E6%8F%92%E4%BB%B6&amp;severity=high&amp;id=699f6c01b7ef31ef0b55edf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5641-cwe-862-missing-authorization-in-ced-670c5d64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5641%3A%20CWE-862%20Missing%20Authorization%20in%20cedcommerce%20One%20Click%20Order%20Re-Order&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3639-cwe-79-improper-neutralization-of-in-1b3c3ee1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3639%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2926-cwe-79-improper-neutralization-of-in-75ff8f27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3638-cwe-79-improper-neutralization-of-in-38302dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2385-cwe-22-improper-limitation-of-a-path-48baab84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2385%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=high&amp;id=699f6daeb7ef31ef0b58aaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39943-na-4bc5d0ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39943%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c89b7ef31ef0b566087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39935-na-2161dca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39935%3A%20n%2Fa&amp;severity=high&amp;id=699f6c89b7ef31ef0b566082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39934-na-f878ccd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39934%3A%20n%2Fa&amp;severity=high&amp;id=699f6c89b7ef31ef0b56607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39933-na-bda21bdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39933%3A%20n%2Fa&amp;severity=high&amp;id=699f6c89b7ef31ef0b566078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39932-na-7b4a3b17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39932%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c89b7ef31ef0b566010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39931-na-d182a176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39931%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c89b7ef31ef0b56600c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39930-na-94099dad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39930%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c89b7ef31ef0b566007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39211-na-aa187b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39211%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c85b7ef31ef0b565d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39936-na-2301c111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39936%3A%20n%2Fa&amp;severity=high&amp;id=692af12498abb602783e1f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39937-na-2cb9c09a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39937%3A%20n%2Fa&amp;severity=high&amp;id=69120ff3d84bdc1ba68e99d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-04-decb3ea4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-04&amp;severity=medium&amp;id=68367c97182aa0cae231d5bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-04-7494cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-04&amp;severity=medium&amp;id=682c7abbe3e6de8ceb7494cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-04-f130d8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-04&amp;severity=medium&amp;id=682acdc2bbaf20d303f130d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6383-cwe-122-heap-based-buffer-overflow-i-68aae90e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6383%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20MongoDB%20Inc%20libbson&amp;severity=medium&amp;id=690908577fff0e30cee23a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34750-cwe-755-improper-handling-of-except-b8a1fe0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34750%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=690204553aaa02566521b55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5821-cwe-22-improper-limitation-of-a-path-464da025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5821%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20stitionai%20stitionai%2Fdevika&amp;severity=medium&amp;id=68ef9b2a178f764e1f470ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6126-uncontrolled-resource-consumption-014e0891</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6126%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=low&amp;id=69201212ce2640f942c372df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32937-cwe-78-improper-neutralization-of-s-354cfc27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32937%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Grandstream%20GXP2135&amp;severity=high&amp;id=690a3b4eff58c9332ff07364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6263-cwe-79-improper-neutralization-of-in-b57922f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20WP%20Lightbox%202&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6340-cwe-79-improper-neutralization-of-in-7d06eee6</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c01b7ef31ef0b55ee1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4482-cwe-79-improper-neutralization-of-in-02126039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4482%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4543-cwe-352-cross-site-request-forgery-c-639b5a9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4543%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20aliakro%20Snippet%20Shortcodes&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29511-na-de503f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29511%3A%20n%2Fa&amp;severity=high&amp;id=699f6da0b7ef31ef0b58984f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29510-na-12ca2b93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29510%3A%20n%2Fa&amp;severity=medium&amp;id=699f6da0b7ef31ef0b589849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29507-na-51899081</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29507%3A%20n%2Fa&amp;severity=medium&amp;id=699f6da0b7ef31ef0b589844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29506-na-37b99341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29506%3A%20n%2Fa&amp;severity=medium&amp;id=699f6da0b7ef31ef0b5897f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39920-na-a2a0caa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39920%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c89b7ef31ef0b565ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39844-na-53e3ab4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39844%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c88b7ef31ef0b565fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39223-na-297a0f9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39223%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c85b7ef31ef0b565d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39220-na-eae042d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39220%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c85b7ef31ef0b565d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38453-na-27fb6165</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38453%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37726-na-46c66d4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37726%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33871-na-cc18f476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33871%3A%20n%2Fa&amp;severity=high&amp;id=699f6c49b7ef31ef0b561f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33870-na-2a0f043a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33870%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c49b7ef31ef0b561f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33869-na-d00478b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33869%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c49b7ef31ef0b561f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52169-na-01f101f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52169%3A%20n%2Fa&amp;severity=high&amp;id=69092638fe7723195e0b6304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52168-na-9d95daf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52168%3A%20n%2Fa&amp;severity=high&amp;id=69092638fe7723195e0b62fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-03-f1305e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f1305e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6381-cwe-680-integer-overflow-to-buffer-o-e37cc22c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6381%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20MongoDB%20Inc%20libbson&amp;severity=medium&amp;id=690908557fff0e30cee23985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4467-uncontrolled-resource-consumption-b3e67d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4467%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682d26e64d7c5ea9f4b3e67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6264-cwe-79-improper-neutralization-of-in-377dab8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6264%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gandhihitesh9%20Post%20Meta%20Data%20Manager&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6099-cwe-420-unprotected-alternate-channe-bad7c748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6099%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6088-cwe-862-missing-authorization-in-thi-a4e28898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6088%3A%20CWE-862%20Missing%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4268-cwe-79-improper-neutralization-of-in-008b2972</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4268%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%20WordPress%20Blocks%20Plugin&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6012-cwe-862-missing-authorization-in-sty-4aea4fbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6012%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6011-cwe-79-improper-neutralization-of-in-b0593205</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20Cost%20Calculator%20Builder&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5260-cwe-79-improper-neutralization-of-in-7abcca66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5544-cwe-79-improper-neutralization-of-in-09033f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5544%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5545-cwe-862-missing-authorization-in-sty-fa8eade5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5545%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20Motors%20%E2%80%93%20Car%20Dealer%2C%20Classifieds%20%26%20Listing&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3513-cwe-79-improper-neutralization-of-in-017c5785</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3513%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimateblocks%20Ultimate%20Blocks%20%E2%80%93%20WordPress%20Blocks%20Plugin&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5504-cwe-79-improper-neutralization-of-in-4e81c281</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5504%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20apollo13themes%20Rife%20Elementor%20Extensions%20%26%20Templates&amp;severity=medium&amp;id=699f6be9b7ef31ef0b55c114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5219-cwe-79-improper-neutralization-of-in-39c9785c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5219%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsysticcom%20Easy%20Google%20Maps&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6172-cwe-89-improper-neutralization-of-sp-afbc8d4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6172%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=699f6bfcb7ef31ef0b55d5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1427-cwe-79-improper-neutralization-of-in-2f561ae2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techlabpro1%20The%20Post%20Grid%20%E2%80%93%20Shortcode%2C%20Gutenberg%20Blocks%20and%20Elementor%20Addon%20for%20Post%20Grid&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5349-cwe-22-improper-limitation-of-a-path-f934a902</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5349%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=high&amp;id=699f6be6b7ef31ef0b55becd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5419-cwe-79-improper-neutralization-of-in-ec51f798</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20voidthemes%20Void%20Contact%20Form%207%20Widget%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55bee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5938-cwe-79-improper-neutralization-of-in-91371042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5938%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sur%20Boot%20Store&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25088-na-3250c972</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25088%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5fb7ef31ef0b570c81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25086-na-f11e770b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25086%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5fb7ef31ef0b570c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22106-na-7c659a4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22106%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b570021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22104-na-15ffbd2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22104%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b57001c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22103-na-065252c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22103%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b570017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39206-na-afa94ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39206%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39143-na-0abe6614</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39143%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39119-na-52cff5e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39119%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39894-na-bf0ae942</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39894%3A%20n%2Fa&amp;severity=high&amp;id=690a2deef0ba78a050537200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39891-na-d15fda95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39891%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9b3247d717aace26a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-02-f122fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f122fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39573-cwe-20-improper-input-validation-in-90458616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39573%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=690929aafe7723195e0fd66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38477-cwe-476-null-pointer-dereference-in-f9e2f20e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38477%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=690929a9fe7723195e0fd639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38476-cwe-829-inclusion-of-functionality--d0bfb027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38476%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=critical&amp;id=690929a9fe7723195e0fd633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38475-cwe-116-improper-encoding-or-escaping-of-output-in-apache-software-foundation-apache-http-server-bec280</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38475%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=critical&amp;id=682d9838c4522896dcbec280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20399-improper-neutralization-of-special--769f461f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20399%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20NX-OS%20Software&amp;severity=medium&amp;id=68f7d9b1247d717aace26913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6387-signal-handler-race-condition-bf0baa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6387%3A%20Signal%20Handler%20Race%20Condition&amp;severity=high&amp;id=682d983fc4522896dcbf0baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20079-cwe-787-out-of-bounds-write-in-medi-e37b62f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20079%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MediaTek%2C%20Inc.%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8676%2C%20MT8678&amp;severity=critical&amp;id=69a0c5b685912abc710cd5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23736-na-0cbb495d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23736%3A%20n%2Fa&amp;severity=high&amp;id=699f6d53b7ef31ef0b570580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39853-na-c9eb3f56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39853%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c88b7ef31ef0b565ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39249-na-04422e17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39249%3A%20n%2Fa&amp;severity=high&amp;id=699f6c86b7ef31ef0b565dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39236-na-a8d7934f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39236%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c86b7ef31ef0b565dbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39018-na-e7e3a281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39018%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39017-na-52367c9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39017%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39016-na-9f2dff51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39016%3A%20n%2Fa&amp;severity=high&amp;id=699f6c80b7ef31ef0b565acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39015-na-2349e157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39015%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39014-na-2e3c141c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39014%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39013-na-c78fd312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39013%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39008-na-5288860a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39008%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39003-na-aa455be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39003%3A%20n%2Fa&amp;severity=high&amp;id=699f6c80b7ef31ef0b565a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39002-na-2614dd03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39002%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39001-na-5ea79b8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39001%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39000-na-cbf54031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39000%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c80b7ef31ef0b565a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38999-na-1f99be8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38999%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c80b7ef31ef0b565a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38998-54a0e6f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38998&amp;severity=null&amp;id=699f6c7eb7ef31ef0b5659de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38997-na-01a940ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38997%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b5659db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38996-na-4451d886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38996%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7eb7ef31ef0b5659d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38994-na-cab292eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38994%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7eb7ef31ef0b5659d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38993-na-23a73930</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38993%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7eb7ef31ef0b5659d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38992-na-dc03498c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38992%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7eb7ef31ef0b5659cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38991-na-8198fe7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38991%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7eb7ef31ef0b5659ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38990-na-f536ea0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38990%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b5659c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38987-na-9f7c1c11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38987%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b5659bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37765-na-7365b240</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37765%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37764-na-687c0694</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37764%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37763-na-edafe2c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37763%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37762-na-ce0dcd0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37762%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6fb7ef31ef0b563f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32229-na-6dff4937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32229%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b561079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32228-na-a075cb8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32228%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b561076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-07-01-f1235b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-07-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f1235b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34703-cwe-405-asymmetric-resource-consump-4c8638f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34703%3A%20CWE-405%3A%20Asymmetric%20Resource%20Consumption%20(Amplification)%20in%20randombit%20botan&amp;severity=high&amp;id=697d10c0ac0632022277c287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-30-f1260d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f1260d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2386-cwe-89-improper-neutralization-of-sp-8f560852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2386%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flippercode%20WP%20Maps%20%E2%80%93%20Display%20Google%20Maps%20Perfectly%20with%20Ease&amp;severity=high&amp;id=699f6daeb7ef31ef0b58ab04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5819-cwe-79-improper-neutralization-of-in-098e1387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5790-cwe-79-improper-neutralization-of-in-8e99e3ef</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5666-cwe-79-improper-neutralization-of-in-59300909</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20petesheppard84%20Extensions%20for%20Elementor&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6363-cwe-79-improper-neutralization-of-in-6ee2cc64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urkekg%20Stock%20Ticker&amp;severity=medium&amp;id=699f6c02b7ef31ef0b55eea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5598-cwe-922-insecure-storage-of-sensitiv-c86b1f44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5598%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20modalweb%20Advanced%20File%20Manager&amp;severity=high&amp;id=699f6becb7ef31ef0b55c2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5889-cwe-79-improper-neutralization-of-in-5e4cdd43</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6265-cwe-89-improper-neutralization-of-sp-a1588a37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6265%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WordPress&amp;severity=critical&amp;id=699f6bfeb7ef31ef0b55d6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5192-cwe-79-improper-neutralization-of-in-bd85644c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5192%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20amans2k%20Funnel%20Builder%20for%20WordPress%20by%20FunnelKit%20%E2%80%93%20Customize%20WooCommerce%20Checkout%20Pages%2C%20Create%20Sales%20Funnels%2C%20Order%20Bumps%20%26%20One%20Click%20Upsells&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5942-cwe-639-authorization-bypass-through-fe2f00da</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5942%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20carlosfazenda%20Page%20and%20Post%20Clone&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d25b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6405-cwe-352-cross-site-request-forgery-c-3ba86084</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6405%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20bhagirath25%20Floating%20Social%20Buttons&amp;severity=medium&amp;id=699f6c02b7ef31ef0b55eec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39846-na-09bf8a3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39846%3A%20n%2Fa&amp;severity=low&amp;id=699f6c88b7ef31ef0b565ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39840-na-b4061535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39840%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-29-f12950</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29040-cwe-502-deserialization-of-untruste-b039b781</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29040%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20tpm2-software%20tpm2-tss&amp;severity=medium&amp;id=690a3b4cff58c9332ff06e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5827-cwe-89-improper-neutralization-of-sp-03e8fb80</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5827%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20vanna-ai%20vanna-ai%2Fvanna&amp;severity=critical&amp;id=68ef9b2a178f764e1f470cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25041-cwe-79-improper-neutralization-of-i-33a2454f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=6909261ffe7723195e0b46b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25053-cwe-295-improper-certificate-valida-e97bb4c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25053%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=6909261ffe7723195e0b46b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29039-cwe-807-reliance-on-untrusted-input-39bef41d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29039%3A%20CWE-807%3A%20Reliance%20on%20Untrusted%20Inputs%20in%20a%20Security%20Decision%20in%20tpm2-software%20tpm2-tools&amp;severity=critical&amp;id=690a3b4cff58c9332ff06e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35139-cwe-276-incorrect-default-permissio-4bd8ead7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35139%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=medium&amp;id=69092624fe7723195e0b47af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35137-cwe-258-empty-password-in-configura-b2dbe669</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35137%3A%20CWE-258%20Empty%20Password%20in%20Configuration%20File%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=medium&amp;id=69092624fe7723195e0b47aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29038-cwe-1283-mutable-attestation-or-mea-9de3817b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29038%3A%20CWE-1283%3A%20Mutable%20Attestation%20or%20Measurement%20Reporting%20Data%20in%20tpm2-software%20tpm2-tools&amp;severity=medium&amp;id=690a3b69ff58c9332ff0a5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5922-cwe-79-improper-neutralization-of-in-ac90999b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tislam100%20Scylla%20lite&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5662-cwe-79-improper-neutralization-of-in-387437db</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Ultimate%20Post%20Kit%20Addons%20For%20Elementor%20%E2%80%93%20(Post%20Grid%2C%20Post%20Carousel%2C%20Post%20Slider%2C%20Category%20List%2C%20Post%20Tabs%2C%20Timeline%2C%20Post%20Ticker%2C%20Tag%20Cloud)&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5925-cwe-79-improper-neutralization-of-in-540f67ed</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5925%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tislam100%20Theron%20Lite&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5424-cwe-79-improper-neutralization-of-in-96c64422</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5424%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gallerycreator%20Gallery%20Blocks%20with%20Lightbox.%20Image%20Gallery%2C%20(HTML5%20video%20%2C%20YouTube%2C%20Vimeo)%20Video%20Gallery%20and%20Lightbox%20for%20native%20gallery&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55beea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6288-cwe-79-improper-neutralization-of-in-2eade580</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6288%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tatvic%20Conversios%3A%20Google%20Analytics%204%20(GA4)%2C%20Google%20Ads%2C%20Microsoft%20Ads%2C%20and%20Multi-Channel%20Conversion%20Tracking&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2795-cwe-200-information-exposure-in-loos-6b2d61e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2795%3A%20CWE-200%20Information%20Exposure%20in%20looswebstudio%20SEO%20SIMPLE%20PACK&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5796-cwe-79-improper-neutralization-of-in-279e2cf5</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ravichandra%20Infinite&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5788-cwe-79-improper-neutralization-of-in-f37ce1c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5788%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nattywp%20Silesia&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55ce50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6296-cwe-79-improper-neutralization-of-in-a8fb3e10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6296%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Stackable%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5864-cwe-862-missing-authorization-in-bre-dca177b3</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5864%3A%20CWE-862%20Missing%20Authorization%20in%20brechtvds%20Easy%20Affiliate%20Links&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5863-cwe-862-missing-authorization-in-bre-a9fd5df2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5863%3A%20CWE-862%20Missing%20Authorization%20in%20brechtvds%20Easy%20Image%20Collage&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27629-na-1365966b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27629%3A%20n%2Fa&amp;severity=high&amp;id=699f6d83b7ef31ef0b5817bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27628-na-9547508d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27628%3A%20n%2Fa&amp;severity=high&amp;id=699f6d83b7ef31ef0b5817b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39828-na-fd73c8dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39828%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c87b7ef31ef0b565f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37741-na-f431bfe9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37741%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37370-na-60ef684e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37370%3A%20n%2Fa&amp;severity=high&amp;id=6996fb4d8fb9188dea8c0e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37371-na-9ba96027</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37371%3A%20n%2Fa&amp;severity=critical&amp;id=6909214cfe7723195e05453e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-28-f12252</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5642-vulnerability-in-python-software-fou-6ae093ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5642%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=68e54032a677756fc996bc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3331-vulnerability-in-spotfire-spotfire-e-621db2d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3331%3A%20Vulnerability%20in%20Spotfire%20Spotfire%20Enterprise%20Runtime%20for%20R%20-%20Server%20Edition&amp;severity=medium&amp;id=69a0c89232ffcdb8a2524573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5980-cwe-22-improper-limitation-of-a-path-411ee503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5980%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20lightning-ai%20lightning-ai%2Fpytorch-lightning&amp;severity=critical&amp;id=68ef9b2a178f764e1f470d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6086-cwe-863-incorrect-authorization-in-l-0c5dcaa0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6086%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=medium&amp;id=68ef9b2a178f764e1f470d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5714-cwe-863-incorrect-authorization-in-l-0867b605</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5714%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b28178f764e1f470ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6038-cwe-1333-inefficient-regular-express-8198353b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6038%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b2a178f764e1f470d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5710-cwe-862-missing-authorization-in-ber-cc02f230</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5710%3A%20CWE-862%20Missing%20Authorization%20in%20berriai%20berriai%2Flitellm&amp;severity=medium&amp;id=68ef9b28178f764e1f470ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6090-cwe-22-improper-limitation-of-a-path-41d34102</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6090%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b2a178f764e1f470d44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5751-cwe-94-improper-control-of-generatio-04115b84</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5751%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20berriai%20berriai%2Flitellm&amp;severity=critical&amp;id=68ef9b28178f764e1f470cab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5826-cwe-94-improper-control-of-generatio-2bb5b412</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5826%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20vanna-ai%20vanna-ai%2Fvanna&amp;severity=critical&amp;id=68ef9b2a178f764e1f470cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5979-cwe-94-improper-control-of-generatio-40458266</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5979%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=high&amp;id=68ef9b2a178f764e1f470d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38370-cwe-276-incorrect-default-permissio-111a3298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38370%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20IBM%20Security%20Access%20Manager%20Docker&amp;severity=high&amp;id=69092632fe7723195e0b5f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38368-cwe-863-incorrect-authorization-in--8582bce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38368%3A%20CWE-863%20Incorrect%20Authorization%20in%20IBM%20Security%20Access%20Manager%20Docker&amp;severity=medium&amp;id=69092632fe7723195e0b5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30997-cwe-250-execution-with-unnecessary--d392b1e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30997%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Access%20Manager%20Docker&amp;severity=high&amp;id=6909262ffe7723195e0b5eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30998-cwe-250-execution-with-unnecessary--53d9a37b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30998%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Access%20Manager%20Docker&amp;severity=high&amp;id=6909262ffe7723195e0b5ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38371-cwe-327-use-of-a-broken-or-risky-cr-6fd08f81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38371%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Security%20Access%20Manager%20Docker&amp;severity=medium&amp;id=69092632fe7723195e0b5f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35260-cwe-426-untrusted-search-path-in-microsoft-microsoft-power-platform-aec14c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35260%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Power%20Platform&amp;severity=high&amp;id=682cd0fa1484d88663aec14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1153-cwe-89-improper-neutralization-of-sp-09f25239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1153%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Talya%20Informatics%20Travel%20APPS&amp;severity=medium&amp;id=68ee47d1509368ccaa6fd051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6262-cwe-79-improper-neutralization-of-in-175d3dc7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awordpresslife%20Portfolio%20Gallery%20%E2%80%93%20Image%20Gallery%20Plugin&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0949-cwe-306-missing-authentication-in-ta-05f7d0eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0949%3A%20CWE-306%20Missing%20Authentication%20in%20Talya%20Informatics%20Elektraweb&amp;severity=critical&amp;id=68ee47d0509368ccaa6fc9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4983-cwe-79-improper-neutralization-of-in-ddd6019e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4983%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b99b7ef31ef0b557163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5601-cwe-79-improper-neutralization-of-in-4540a842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5601%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mediavine%20Create%20by%20Mediavine&amp;severity=medium&amp;id=699f6becb7ef31ef0b55c2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6283-cwe-79-improper-neutralization-of-in-54eaf3ca</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6283%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20For%20Elementor&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4570-cwe-79-improper-neutralization-of-in-70082ff2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4570%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4569-cwe-79-improper-neutralization-of-in-07f855bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5289-cwe-79-improper-neutralization-of-in-bb02236d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6054-cwe-434-unrestricted-upload-of-file--eacc39a6</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6054%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ka-yue%20Auto%20Featured%20Image&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31802-na-552cb3ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31802%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd6b7ef31ef0b58f658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28820-na-1b6a3720</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28820%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b589374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39708-na-addda579</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39708%3A%20n%2Fa&amp;severity=high&amp;id=699f6c87b7ef31ef0b565ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39705-na-d0082287</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39705%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c87b7ef31ef0b565ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39669-na-a3f0ef57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39669%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c87b7ef31ef0b565e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39209-na-1c1bdfae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39209%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c85b7ef31ef0b565d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39208-na-2db0c3b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39208%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c83b7ef31ef0b565cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39207-na-60557173</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39207%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39158-na-e138f01c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39158%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565c3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39157-na-0819e698</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39157%3A%20n%2Fa&amp;severity=low&amp;id=699f6c83b7ef31ef0b565c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39156-na-34ccaac1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39156%3A%20n%2Fa&amp;severity=low&amp;id=699f6c83b7ef31ef0b565c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39155-na-f5c9bbf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39155%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c83b7ef31ef0b565c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39154-na-d614acf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39154%3A%20n%2Fa&amp;severity=high&amp;id=699f6c83b7ef31ef0b565c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39153-na-225c8b3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39153%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c83b7ef31ef0b565c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39134-na-1e765da5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39134%3A%20n%2Fa&amp;severity=high&amp;id=699f6c82b7ef31ef0b565bd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39133-na-2780488e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39133%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39132-na-176f6ed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39132%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39130-na-efe78026</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39130%3A%20n%2Fa&amp;severity=high&amp;id=699f6c82b7ef31ef0b565bcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39129-na-dbc86ac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39129%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c82b7ef31ef0b565bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36755-na-c30ffc9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36755%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c64b7ef31ef0b563988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36075-na-88990fa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36075%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5db7ef31ef0b5634ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36074-na-0f114613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36074%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36073-na-6a538757</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36073%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36072-na-65edb550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36072%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5db7ef31ef0b5634e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36059-na-30d327df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36059%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5bb7ef31ef0b563482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-27-f128f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f128f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5215-cwe-79-improper-neutralization-of-in-b8e16366</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5215%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5332-cwe-79-improper-neutralization-of-in-6a609cc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5332%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6be5b7ef31ef0b55be30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27867-when-your-headphones-are-seeking-a--5ef1052b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27867%3A%20When%20your%20headphones%20are%20seeking%20a%20connection%20request%20to%20one%20of%20your%20previously%20paired%20devices%2C%20an%20attacker%20in%20Bluetooth%20range%20might%20be%20able%20to%20spoof%20the%20intended%20source%20device%20and%20gain%20access%20to%20your%20headphones%20in%20Apple%20AirPods&amp;severity=low&amp;id=69ceb827e6bfc5ba1df6e8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5173-cwe-79-improper-neutralization-of-in-3045a0ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5173%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23767-na-9b6da860</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23767%3A%20n%2Fa&amp;severity=high&amp;id=699f6d54b7ef31ef0b5705f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23765-na-723eed2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23765%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d54b7ef31ef0b5705f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39243-na-a21cc4f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39243%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c86b7ef31ef0b565dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38950-na-4801a7b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38950%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b565008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38949-na-77950e34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38949%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b565004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37734-na-04ba889f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37734%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6db7ef31ef0b563e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37571-na-87ad02fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37571%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36829-na-a806624a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36829%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b5639f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35545-na-ceae2876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35545%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5bb7ef31ef0b563470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34581-na-88ad2e58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34581%3A%20n%2Fa&amp;severity=high&amp;id=699f6c54b7ef31ef0b56308f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34580-na-7a2350c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34580%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c54b7ef31ef0b563087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33327-na-ffb83dca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33327%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3fb7ef31ef0b56183d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33326-na-a408fcfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33326%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3fb7ef31ef0b561838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-26-e67b2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-26&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e67b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-26-f127c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f127c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4869-cwe-79-improper-neutralization-of-in-8773158d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeka-club%20Cookie%20Consent%20for%20WP%20%E2%80%93%20Cookie%20Consent%2C%20Consent%20Log%2C%20Cookie%20Scanner%2C%20Script%20Blocker%20(for%20GDPR%2C%20CCPA%20%26%20ePrivacy)&amp;severity=high&amp;id=699f6b97b7ef31ef0b557004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6060-cwe-532-insertion-of-sensitive-infor-b9f5ebfe</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6060%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Phloc%20Webscopes&amp;severity=critical&amp;id=695450a9db813ff03e2be644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4885-cwe-22-improper-limitation-of-a-path-4032670c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4885%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Progress%20Software%20Corporation%20WhatsUp%20Gold&amp;severity=critical&amp;id=68f7d9b5247d717aace26bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37894-cwe-787-out-of-bounds-write-in-squi-09847258</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37894%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20squid-cache%20squid&amp;severity=medium&amp;id=6909214cfe7723195e054544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5990-cwe-20-improper-input-validation-in-rockwell-automation-thinmanager-thinserver-bed31b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5990%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20ThinManager%C2%AE%20ThinServer%E2%84%A2&amp;severity=high&amp;id=682d983ac4522896dcbed31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5989-cwe-20-improper-input-validation-in-rockwell-automation-thinmanager-thinserver-bed306</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5989%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20ThinManager%C2%AE%20ThinServer%E2%84%A2&amp;severity=critical&amp;id=682d983ac4522896dcbed306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5988-cwe-20-improper-input-validation-in-rockwell-automation-thinmanager-thinserver-bed302</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5988%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Rockwell%20Automation%20ThinManager%C2%AE%20ThinServer%E2%84%A2&amp;severity=critical&amp;id=682d983ac4522896dcbed302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39471-vulnerability-in-linux-linux-aebff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39471%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39470-vulnerability-in-linux-linux-bdde5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39470%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39469-vulnerability-in-linux-linux-be2ca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39469%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39468-vulnerability-in-linux-linux-aebff3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39468%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39467-vulnerability-in-linux-linux-be2ca0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39467%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39466-vulnerability-in-linux-linux-be2c9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39466%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39465-vulnerability-in-linux-linux-be2c98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39465%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39464-vulnerability-in-linux-linux-be2c94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39464%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39463-vulnerability-in-linux-linux-be2c85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39463%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39462-vulnerability-in-linux-linux-be2c6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39462%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9829c4522896dcbe2c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39461-vulnerability-in-linux-linux-be2c66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39461%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39371-vulnerability-in-linux-linux-be2c62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39371%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39301-vulnerability-in-linux-linux-be2c5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39301%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39298-vulnerability-in-linux-linux-be2c5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39298%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39296-vulnerability-in-linux-linux-be2c56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39296%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39293-vulnerability-in-linux-linux-be2c52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39293%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39276-vulnerability-in-linux-linux-bdde45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39276%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38661-vulnerability-in-linux-linux-be2bf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38385-vulnerability-in-linux-linux-be28ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38385%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe28ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38306-vulnerability-in-linux-linux-be28a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38306%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe28a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37354-vulnerability-in-linux-linux-be28a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37354%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe28a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37078-vulnerability-in-linux-linux-be289d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe289d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48772-vulnerability-in-linux-linux-be6128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4440-vulnerability-in-linux-linux-bea7f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4440%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37085-authentication-bypass-vulnerability-304b2175</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37085%3A%20Authentication%20bypass%20vulnerability%20in%20VMware%20ESXi&amp;severity=medium&amp;id=68f7d9b2247d717aace26a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21827-cwe-489-leftover-debug-code-in-tp-l-5376380e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21827%3A%20CWE-489%3A%20Leftover%20Debug%20Code%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=690a3b61ff58c9332ff09438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5451-cwe-79-improper-neutralization-of-in-746f7915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dream-Theme%20The7%20%E2%80%94%20Website%20and%20eCommerce%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6307-cwe-79-improper-neutralization-of-in-25f66919</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20Foundation%20WordPress&amp;severity=medium&amp;id=699f6c00b7ef31ef0b55ed53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6028-cwe-89-improper-neutralization-of-sp-7d6911cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6028%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ays-pro%20Quiz%20Maker&amp;severity=critical&amp;id=699f6bfab7ef31ef0b55d407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3249-cwe-862-missing-authorization-in-wpz-46469575</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3249%3A%20CWE-862%20Missing%20Authorization%20in%20wpzita%20Zita%20Elementor%20Site%20Library&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5431-cwe-98-improper-control-of-filename--6ad5bc3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5431%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20themewinter%20WPCafe%20%E2%80%93%20Online%20Food%20Ordering%2C%20Restaurant%20Menu%2C%20Delivery%2C%20and%20Reservations%20for%20WooCommerce&amp;severity=high&amp;id=699f6be7b7ef31ef0b55bf92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4196-cwe-782-in-avaya-ip-office-92bc9898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4196%3A%20CWE-782%20in%20Avaya%20IP%20Office&amp;severity=critical&amp;id=68e0f3c3b66c7f7acdd3e9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23157-cwe-787-out-of-bounds-write-in-auto-917a8dba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23157%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=697275ff4623b1157c865199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6297-cwe-506-embedded-malicious-code-in-w-8e3b0b38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6297%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20warfareplugins%20Social%20Sharing%20Plugin%20%E2%80%93%20Social%20Warfare&amp;severity=critical&amp;id=699f6c00b7ef31ef0b55ed47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23156-cwe-787-out-of-bounds-write-in-auto-56ab8828</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23156%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=697275ff4623b1157c865193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37006-cwe-787-out-of-bounds-write-in-auto-fd1cd311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37006%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=697275ff4623b1157c8651a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37000-cwe-787-out-of-bounds-write-in-auto-09eee066</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37000%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=697275ff4623b1157c86519f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23148-cwe-787-out-of-bounds-write-in-auto-2ee5a518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23148%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=697275ff4623b1157c86518d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23147-cwe-787-out-of-bounds-write-in-auto-496c6961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23147%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Autodesk%20AutoCAD&amp;severity=high&amp;id=697275ff4623b1157c865187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30931-na-f5c8ff1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30931%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58eaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21740-na-36c0ab12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21740%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b56ffb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21739-na-6ef5f5d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21739%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38952-na-f41bc845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38952%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7eb7ef31ef0b56500f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38951-na-5620644a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38951%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7eb7ef31ef0b56500c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37855-na-03581013</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37855%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b564193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37843-na-ec76b1d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37843%3A%20n%2Fa&amp;severity=high&amp;id=699f6c71b7ef31ef0b564115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37820-na-6a48f464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37820%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c70b7ef31ef0b56409f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37742-na-1c253fd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37742%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36819-na-147dd8aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36819%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c66b7ef31ef0b5639ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35527-na-b26ac181</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35527%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5ab7ef31ef0b563406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35526-na-7654398b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35526%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b563403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34400-na-a8476c12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34400%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4fb7ef31ef0b562276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-25-f123d3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f123d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37026-vulnerability-in-linux-linux-be2899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37021-vulnerability-in-linux-linux-be2895</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36479-vulnerability-in-linux-linux-be2556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35247-vulnerability-in-linux-linux-be347d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35247%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe347d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34030-vulnerability-in-linux-linux-be3475</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34027-vulnerability-in-linux-linux-be3471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33847-vulnerability-in-linux-linux-be346d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe346d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32936-vulnerability-in-linux-linux-be3437</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39292-vulnerability-in-linux-linux-be2c4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39292%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39291-vulnerability-in-linux-linux-be2c4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39291%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38667-vulnerability-in-linux-linux-be2c11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38664-vulnerability-in-linux-linux-be2c09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38663-vulnerability-in-linux-linux-be2c01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38384-vulnerability-in-linux-linux-be28b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38384%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe28b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37228-unrestricted-upload-of-file-with-da-b5529643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37228%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd744ee6bfc5ba1def6aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38903-na-597f5df1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38903%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38897-na-45be7021</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38897%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38896-na-d0fdc6d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38896%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38895-na-969bd1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38895%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38894-na-9022e3a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38894%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38892-na-41973ad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38892%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7cb7ef31ef0b564ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37825-na-6a9e7884</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37825%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c70b7ef31ef0b5640a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37759-na-bde6f51c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37759%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6fb7ef31ef0b563f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37732-na-f68278bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37732%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37681-na-46223d15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37681%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37679-na-a091c38f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37679%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37678-na-33d7909c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37678%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37677-na-b2c9dc16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37677%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36683-na-73255b5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36683%3A%20n%2Fa&amp;severity=high&amp;id=699f6c64b7ef31ef0b563978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36682-na-ba5411f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36682%3A%20n%2Fa&amp;severity=high&amp;id=699f6c64b7ef31ef0b563975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36681-na-8c183632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36681%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c64b7ef31ef0b563972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34992-na-e28dc947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34992%3A%20n%2Fa&amp;severity=high&amp;id=699f6c55b7ef31ef0b56313d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34991-na-e86304cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34991%3A%20n%2Fa&amp;severity=high&amp;id=699f6c55b7ef31ef0b56313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34988-na-b3809b28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34988%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c55b7ef31ef0b563131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34313-na-f2a2cab9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34313%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4eb7ef31ef0b562209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33881-na-5b01f83f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33881%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4ab7ef31ef0b56201b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33879-na-2940be3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33879%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c49b7ef31ef0b561f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33278-na-96063029</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33278%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3db7ef31ef0b561770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-24-f120fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f120fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39337-na-65cb8045</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39337%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c86b7ef31ef0b565de2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39334-na-658f728b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39334%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c86b7ef31ef0b565ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39331-na-abe123c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39331%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c86b7ef31ef0b565dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-23-f11fb7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3593-cwe-352-cross-site-request-forgery-c-d70132f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3593%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SevenSpark%20UberMenu&amp;severity=high&amp;id=699f6c95b7ef31ef0b56687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5596-cwe-352-cross-site-request-forgery-c-b923a505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5596%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20armember%20ARMember%20Premium%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=medium&amp;id=699f6becb7ef31ef0b55c2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4940-cwe-601-url-redirection-to-untrusted-262d2acd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4940%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=medium&amp;id=68ef9b27178f764e1f470c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4874-cwe-639-authorization-bypass-through-8eb79fe2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4874%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20BricksBuilder%20Bricks%20Builder&amp;severity=medium&amp;id=699f6b97b7ef31ef0b557011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5965-cwe-79-improper-neutralization-of-in-57e643b1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5965%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wildweblab%20Mosaic&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5966-cwe-79-improper-neutralization-of-in-3536586f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5966%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ppfeufer%20Grey%20Opaque&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4313-cwe-79-improper-neutralization-of-in-6dcfad1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4313%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fusionplugin%20Table%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b86b7ef31ef0b556446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5791-cwe-79-improper-neutralization-of-in-d8272382</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=high&amp;id=699f6bf1b7ef31ef0b55ce5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2484-cwe-79-improper-neutralization-of-in-1cd13435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5346-cwe-79-improper-neutralization-of-in-ed0fd6e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5346%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55beba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-22-f12643</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6120-cwe-862-missing-authorization-in-spa-e0154943</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6120%3A%20CWE-862%20Missing%20Authorization%20in%20sparklewpthemes%20Sparkle%20Demo%20Importer&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37227-cross-site-request-forgery-csrf-in--035e2849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37227%3A%20Cross%20Site%20Request%20Forgery%20(CSRF)%20in%20Tribulant%20Newsletters&amp;severity=medium&amp;id=69a0beae85912abc7105bcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6239-improper-input-validation-70db1200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6239%3A%20Improper%20Input%20Validation&amp;severity=high&amp;id=683bcfdb182aa0cae200b37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35759-improper-neutralization-of-input-du-c9af4091</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35759%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=69cd7448e6bfc5ba1def692f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35760-improper-neutralization-of-input-du-65f16d41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35760%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpjobportal%20WP%20Job%20Portal&amp;severity=null&amp;id=69cd7448e6bfc5ba1def6933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35764-improper-neutralization-of-input-du-56c03c7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35764%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7448e6bfc5ba1def6937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35768-improper-neutralization-of-input-du-c8b3a294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35768%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LiveComposer%20Page%20Builder%3A%20Live%20Composer&amp;severity=null&amp;id=69cd7448e6bfc5ba1def693b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36481-vulnerability-in-linux-linux-be255a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36481%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe255a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36477-vulnerability-in-linux-linux-be254c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36477%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe254c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36288-vulnerability-in-linux-linux-bddd09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36288%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34777-vulnerability-in-linux-linux-be3479</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39277-vulnerability-in-linux-linux-be2c1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39277%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38780-vulnerability-in-linux-linux-bdde41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38662-vulnerability-in-linux-linux-bdde34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38659-vulnerability-in-linux-linux-be2bf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38637-vulnerability-in-linux-linux-be2bf1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38636-vulnerability-in-linux-linux-be2bed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38635-vulnerability-in-linux-linux-be2be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38634-vulnerability-in-linux-linux-be2bde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38633-vulnerability-in-linux-linux-be2bb2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38632-vulnerability-in-linux-linux-bdde30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38631-vulnerability-in-linux-linux-be2baa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38630-vulnerability-in-linux-linux-be2ba2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38629-vulnerability-in-linux-linux-be2b9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38628-vulnerability-in-linux-linux-be2b9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38627-vulnerability-in-linux-linux-bdde2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38626-vulnerability-in-linux-linux-be2b96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38625-vulnerability-in-linux-linux-be2b85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38624-vulnerability-in-linux-linux-be2b81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2b81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38623-vulnerability-in-linux-linux-be2b7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9829c4522896dcbe2b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38622-vulnerability-in-linux-linux-be2b6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38621-vulnerability-in-linux-linux-be2b4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38390-vulnerability-in-linux-linux-bdddcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38390%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdddcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38388-vulnerability-in-linux-linux-be28c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38388%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9829c4522896dcbe28c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38381-vulnerability-in-linux-linux-bdddba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38381%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdddba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37356-vulnerability-in-linux-linux-be28a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37356%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe28a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36489-vulnerability-in-linux-linux-be255e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36489%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe255e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36484-vulnerability-in-linux-linux-bddd26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36484%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddd26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36478-vulnerability-in-linux-linux-be2552</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36478%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36286-vulnerability-in-linux-linux-be2546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36286%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36281-vulnerability-in-linux-linux-be2539</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36281%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36270-vulnerability-in-linux-linux-be252a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36270%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe252a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36244-vulnerability-in-linux-linux-bddcfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36244%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddcfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33621-vulnerability-in-linux-linux-be343f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe343f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33619-vulnerability-in-linux-linux-be343b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31076-vulnerability-in-linux-linux-be3433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52884-vulnerability-in-linux-linux-be7817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6027-cwe-89-improper-neutralization-of-sp-8fbf0b54</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6027%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themifyme%20Themify%20%E2%80%93%20WooCommerce%20Product%20Filter&amp;severity=critical&amp;id=699f6bfab7ef31ef0b55d401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5859-cwe-79-improper-neutralization-of-in-e315bef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5859%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vcita%20Online%20Booking%20%26%20Scheduling%20Calendar%20for%20WordPress%20by%20vcita&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5945-cwe-79-improper-neutralization-of-in-04fdeb08</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5945%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shortpixel%20WP%20SVG%20Images&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6225-cwe-79-improper-neutralization-of-in-024de84f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6225%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=699f6bfeb7ef31ef0b55d66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5191-cwe-79-improper-neutralization-of-in-b916640c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5191%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Branda%20%E2%80%93%20White%20Label%20WordPress%2C%20Custom%20Login%20Page%20Customizer&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5639-cwe-639-authorization-bypass-through-bdcce653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5639%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20cozmoslabs%20User%20Profile%20Picture&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5756-cwe-89-improper-neutralization-of-sp-6b05c652</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5756%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=699f6bf1b7ef31ef0b55cd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3961-cwe-862-missing-authorization-in-con-57bf2313</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3961%3A%20CWE-862%20Missing%20Authorization%20in%20convertkit%20ConvertKit%20%E2%80%93%20Email%20Newsletter%2C%20Email%20Marketing%2C%20Subscribers%20and%20Landing%20Pages&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b5670aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5455-cwe-98-improper-control-of-filename--507b324a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5455%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder&amp;severity=high&amp;id=699f6be8b7ef31ef0b55c020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1955-cwe-862-missing-authorization-in-wpr-b6dd9566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1955%3A%20CWE-862%20Missing%20Authorization%20in%20wprepublic%20Hide%20Dashboard%20Notifications&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1639-cwe-862-missing-authorization-in-wpe-6521c343</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1639%3A%20CWE-862%20Missing%20Authorization%20in%20wpexpertsio%20License%20Manager%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3610-cwe-862-missing-authorization-in-wen-42248a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3610%3A%20CWE-862%20Missing%20Authorization%20in%20wen-solutions%20WP%20Child%20Theme%20Generator&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5503-cwe-98-improper-control-of-filename--7bd9da69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5503%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codevibrant%20WP%20Blog%20Post%20Layouts&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5344-cwe-79-improper-neutralization-of-in-cec400e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5344%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6be5b7ef31ef0b55be48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37694-70079c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37694&amp;severity=null&amp;id=699f6c6db7ef31ef0b563e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37673-na-def20408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37673%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37672-na-94cf80cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37672%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37654-na-b5444044</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37654%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36532-na-faddc982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36532%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b563683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34989-na-9dbe8b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34989%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c55b7ef31ef0b563134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34452-na-6724f36d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34452%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-21-f13a9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f13a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6154-cwe-122-heap-based-buffer-overflow-i-9e1f5cf2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6154%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Parallels%20Desktop&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6153-cwe-693-protection-mechanism-failure-d0e7546f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6153%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Parallels%20Desktop&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6147-cwe-59-improper-link-resolution-befo-98e0d1d9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6147%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Poly%20Plantronics%20Hub&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38082-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-chromium-based-aec15f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38082%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0fa1484d88663aec15f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38093-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-chromium-based-aec163</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38093%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0fa1484d88663aec163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6162-uncontrolled-resource-consumption-44b1b28f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6162%3A%20Exposure%20of%20Data%20Element%20to%20Wrong%20Session&amp;severity=high&amp;id=690dcfa5c2e5047ad7418679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5156-cwe-79-improper-neutralization-of-in-3775041d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20UX-themes%20Flatsome&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49113-cwe-312-cleartext-storage-of-sensit-42a9eb77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49113%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Kiuwan%20SAST%20Local%20Analyzer&amp;severity=high&amp;id=690a3b5cff58c9332ff08e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49112-vulnerability-in-kiuwan-sast-5f570bab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49112%3A%20Vulnerability%20in%20Kiuwan%20SAST&amp;severity=medium&amp;id=690a3b5cff58c9332ff08e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49111-cwe-79-improper-neutralization-of-i-fbd7ea4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49111%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Kiuwan%20SAST&amp;severity=medium&amp;id=690a3b5cff58c9332ff08e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49110-cwe-611-improper-restriction-of-xml-c13a9ede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49110%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Kiuwan%20SAST&amp;severity=high&amp;id=690a3b5cff58c9332ff08e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4439-vulnerability-in-linux-linux-bea7ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4439%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52883-vulnerability-in-linux-linux-be7813</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48771-vulnerability-in-linux-linux-be6102</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48770-vulnerability-in-linux-linux-be60fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48769-vulnerability-in-linux-linux-be60f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48768-vulnerability-in-linux-linux-bdd50b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48767-vulnerability-in-linux-linux-be60ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48766-vulnerability-in-linux-linux-aebf73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48765-vulnerability-in-linux-linux-be60e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48764-vulnerability-in-linux-linux-be60e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48763-vulnerability-in-linux-linux-be60d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe60d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48762-vulnerability-in-linux-linux-be60cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48761-vulnerability-in-linux-linux-be60c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48760-vulnerability-in-linux-linux-be60c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48759-vulnerability-in-linux-linux-be60a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe60a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48758-vulnerability-in-linux-linux-be609d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe609d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48757-vulnerability-in-linux-linux-be6099</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48756-vulnerability-in-linux-linux-be6095</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48755-vulnerability-in-linux-linux-be6091</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48754-vulnerability-in-linux-linux-be608d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe608d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48753-vulnerability-in-linux-linux-be6089</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48752-vulnerability-in-linux-linux-be6085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48751-vulnerability-in-linux-linux-bdd4ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48750-vulnerability-in-linux-linux-be6076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48749-vulnerability-in-linux-linux-be606e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe606e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48748-vulnerability-in-linux-linux-be6055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48747-vulnerability-in-linux-linux-aeb00c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb00c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48746-vulnerability-in-linux-linux-be6051</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48745-vulnerability-in-linux-linux-be6042</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48744-vulnerability-in-linux-linux-be603a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe603a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48743-vulnerability-in-linux-linux-bdd4e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48742-vulnerability-in-linux-linux-be6032</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe6032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48741-vulnerability-in-linux-linux-be602e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48740-vulnerability-in-linux-linux-be601d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48739-vulnerability-in-linux-linux-be6013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe6013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48738-vulnerability-in-linux-linux-be600d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe600d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48735-vulnerability-in-linux-linux-aebf71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48734-vulnerability-in-linux-linux-be5ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48734%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48733-vulnerability-in-linux-linux-be5fdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48732-vulnerability-in-linux-linux-be5fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48731-vulnerability-in-linux-linux-be5fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48730-vulnerability-in-linux-linux-be5fbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48729-vulnerability-in-linux-linux-be5fb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48728-vulnerability-in-linux-linux-be5fa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48727-vulnerability-in-linux-linux-be5f9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48726-vulnerability-in-linux-linux-be5f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48725-vulnerability-in-linux-linux-be5f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48724-vulnerability-in-linux-linux-bdd4e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48723-vulnerability-in-linux-linux-be5f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48722-vulnerability-in-linux-linux-be5f5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48721-vulnerability-in-linux-linux-bdd4e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48720-vulnerability-in-linux-linux-be5f52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48720%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48719-vulnerability-in-linux-linux-be5f4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48718-vulnerability-in-linux-linux-be5f42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48717-vulnerability-in-linux-linux-be5f3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48716-vulnerability-in-linux-linux-be5f34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d982ec4522896dcbe5f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48715-vulnerability-in-linux-linux-be5f25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48714-vulnerability-in-linux-linux-be5f1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48713-vulnerability-in-linux-linux-be5f19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48713%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48712-vulnerability-in-linux-linux-be5f06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48711-vulnerability-in-linux-linux-be5ef1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47620-vulnerability-in-linux-linux-be9609</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47619-vulnerability-in-linux-linux-be95f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5036-cwe-79-improper-neutralization-of-in-623b3260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5036%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47618-vulnerability-in-linux-linux-be95f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe95f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47617-vulnerability-in-linux-linux-be95d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38620-vulnerability-in-linux-linux-be2b4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4098-cwe-22-improper-limitation-of-a-path-672b1a61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4098%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%203uu%20Shariff%20Wrapper&amp;severity=critical&amp;id=699f6b82b7ef31ef0b556139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38619-vulnerability-in-linux-linux-be2b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5686-cwe-79-improper-neutralization-of-in-f176d95d</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5686%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20WPZOOM%20Addons%20for%20Elementor%20(Templates%2C%20Widgets)&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4390-cwe-863-incorrect-authorization-in-a-15b6c4d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4390%3A%20CWE-863%20Incorrect%20Authorization%20in%20averta%20Slider%20%26%20Popup%20Builder%20by%20Depicter%20%E2%80%93%20Add%20Image%20Slider%2C%20Carousel%20Slider%2C%20Exit%20Intent%20Popup%2C%20Popup%20Modal%2C%20Coupon%20Popup%2C%20Post%20Slider%20Carousel&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b55675a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5605-cwe-89-improper-neutralization-of-sp-bf69a9dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5605%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=high&amp;id=699f6becb7ef31ef0b55c2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5213-cwe-201-insertion-of-sensitive-infor-d59e839f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5213%3A%20CWE-201%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=68ef9b28178f764e1f470c91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3562-cwe-95-improper-neutralization-of-di-31f7165a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3562%3A%20CWE-95%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20mgibbs189%20Custom%20Field%20Suite&amp;severity=high&amp;id=699f6c95b7ef31ef0b5667dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1168-cwe-79-improper-neutralization-of-in-3a12cd76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1168%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rainbowgeek%20SEOPress%20%E2%80%93%20On-site%20SEO&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3561-cwe-89-improper-neutralization-of-sp-8bf64636</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3561%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mgibbs189%20Custom%20Field%20Suite&amp;severity=high&amp;id=699f6c95b7ef31ef0b5667d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3558-cwe-79-improper-neutralization-of-in-4bc016c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3558%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mgibbs189%20Custom%20Field%20Suite&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3597-cwe-601-url-redirection-to-untrusted-7dec240c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3597%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20recorp%20Export%20WP%20Page%20to%20Static%20HTML%2FCSS&amp;severity=high&amp;id=699f6c95b7ef31ef0b566887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3605-cwe-89-improper-neutralization-of-sp-318d5e83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3605%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thimpress%20WP%20Hotel%20Booking&amp;severity=critical&amp;id=699f6c97b7ef31ef0b566952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4626-cwe-79-improper-neutralization-of-in-21650ecf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4626%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5432-cwe-288-authentication-bypass-using--9399c7f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5432%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20webinnane%20Lifeline%20Donation&amp;severity=critical&amp;id=699f6be7b7ef31ef0b55bf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4742-cwe-89-improper-neutralization-of-sp-4ca152da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4742%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20youzify%20Youzify%20%E2%80%93%20BuddyPress%20Community%2C%20User%20Profile%2C%20Social%20Network%20%26%20Membership%20Plugin%20for%20WordPress&amp;severity=critical&amp;id=699f6b95b7ef31ef0b556eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3627-cwe-862-missing-authorization-in-kra-895daf8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3627%3A%20CWE-862%20Missing%20Authorization%20in%20kraftplugins%20Wheel%20of%20Life%3A%20Coaching%20and%20Assessment%20Tool%20for%20Life%20Coach&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3602-cwe-862-missing-authorization-in-pro-97d417d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3602%3A%20CWE-862%20Missing%20Authorization%20in%20promolayerpopupbuilder%20Pop%20ups%2C%20Exit%20intent%20popups%2C%20email%20popups%2C%20banners%2C%20bars%2C%20countdowns%20and%20cart%20savers%20%E2%80%93%20Promolayer&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31586-na-082bddb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31586%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58eeeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30848-na-4a76c247</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30848%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcab7ef31ef0b58e753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28397-na-2162f735</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28397%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37818-na-4d317685</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37818%3A%20n%2Fa&amp;severity=high&amp;id=699f6c70b7ef31ef0b56409b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37699-na-21de9b9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37699%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6db7ef31ef0b563e8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37676-na-8818e5e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37676%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37674-na-388f2773</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37674%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37626-na-8a2efc69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37626%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36071-na-0ccabbe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36071%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5db7ef31ef0b5634e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33335-na-f9208e9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33335%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3fb7ef31ef0b561845</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-20-f12cf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47616-vulnerability-in-linux-linux-be95d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47614-vulnerability-in-linux-linux-be95d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47614%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47613-vulnerability-in-linux-linux-be95cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47612-vulnerability-in-linux-linux-be95c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe95c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47611-vulnerability-in-linux-linux-be95c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47610-vulnerability-in-linux-linux-be95be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe95be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47609-vulnerability-in-linux-linux-be95b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47608-vulnerability-in-linux-linux-be95a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe95a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47607-vulnerability-in-linux-linux-be959f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe959f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47606-vulnerability-in-linux-linux-be959b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe959b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47605-vulnerability-in-linux-linux-be9597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47604-vulnerability-in-linux-linux-be9593</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47603-vulnerability-in-linux-linux-bde18c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47602-vulnerability-in-linux-linux-be958f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe958f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47601-vulnerability-in-linux-linux-be958b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe958b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47600-vulnerability-in-linux-linux-be957e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe957e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47599-vulnerability-in-linux-linux-be957a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe957a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47598-vulnerability-in-linux-linux-be9576</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47597-vulnerability-in-linux-linux-be9558</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47596-vulnerability-in-linux-linux-be9554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47595-vulnerability-in-linux-linux-be9550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47594-vulnerability-in-linux-linux-be954c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe954c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47593-vulnerability-in-linux-linux-be9548</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47592-vulnerability-in-linux-linux-be9544</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47591-vulnerability-in-linux-linux-be9540</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47590-vulnerability-in-linux-linux-be953c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe953c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47589-vulnerability-in-linux-linux-be9538</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47588-vulnerability-in-linux-linux-bde184</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47587-vulnerability-in-linux-linux-be9534</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47586-vulnerability-in-linux-linux-be9521</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47585-vulnerability-in-linux-linux-be951d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe951d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47584-vulnerability-in-linux-linux-be9519</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47583-vulnerability-in-linux-linux-be9515</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47582-vulnerability-in-linux-linux-be9504</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47580-vulnerability-in-linux-linux-be9500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47579-vulnerability-in-linux-linux-be94f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47579%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe94f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47578-vulnerability-in-linux-linux-be94ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe94ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47577-vulnerability-in-linux-linux-be94eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe94eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47576-vulnerability-in-linux-linux-be94e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe94e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38618-vulnerability-in-linux-linux-be2b41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38617-vulnerability-in-linux-linux-be2b3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38616-vulnerability-in-linux-linux-be2b3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38615-vulnerability-in-linux-linux-be2b37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38614-vulnerability-in-linux-linux-be2b26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38614%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38613-vulnerability-in-linux-linux-be2b22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38612-vulnerability-in-linux-linux-be2b1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9829c4522896dcbe2b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38611-vulnerability-in-linux-linux-be2af0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38610-vulnerability-in-linux-linux-bdde28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38609-vulnerability-in-linux-linux-be2aec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38608-vulnerability-in-linux-linux-be2ae8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38607-vulnerability-in-linux-linux-be2ae4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38606-vulnerability-in-linux-linux-be2ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38605-vulnerability-in-linux-linux-be2acb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38604-vulnerability-in-linux-linux-be2ac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38603-vulnerability-in-linux-linux-be2ac3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38602-vulnerability-in-linux-linux-bdde24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38601-vulnerability-in-linux-linux-be2abf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38600-vulnerability-in-linux-linux-aebff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38599-vulnerability-in-linux-linux-be2ab2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38598-vulnerability-in-linux-linux-bdde20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdde20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38597-vulnerability-in-linux-linux-be2a8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38596-vulnerability-in-linux-linux-be2a7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38595-vulnerability-in-linux-linux-bdde1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38594-vulnerability-in-linux-linux-bdde18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdde18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38593-vulnerability-in-linux-linux-be2a76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38592-vulnerability-in-linux-linux-be2a6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38591-vulnerability-in-linux-linux-be2a66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38590-vulnerability-in-linux-linux-be2a62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38589-vulnerability-in-linux-linux-be2a5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38588-vulnerability-in-linux-linux-be2a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38587-vulnerability-in-linux-linux-be2a4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38586-vulnerability-in-linux-linux-be2a47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38585-vulnerability-in-linux-linux-be2a29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38584-vulnerability-in-linux-linux-be2a25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38583-vulnerability-in-linux-linux-be2a21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38582-vulnerability-in-linux-linux-be2a1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38581-vulnerability-in-linux-linux-aebfef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38580-vulnerability-in-linux-linux-be2a19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38579-vulnerability-in-linux-linux-be2a15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38579%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38578-vulnerability-in-linux-linux-be2a11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38577-vulnerability-in-linux-linux-be2a0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38576-vulnerability-in-linux-linux-be2a09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38575-vulnerability-in-linux-linux-bdddf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38575%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38574-vulnerability-in-linux-linux-be2a05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38574%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38573-vulnerability-in-linux-linux-be29e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38572-vulnerability-in-linux-linux-be29e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38571-vulnerability-in-linux-linux-be29df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe29df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38570-vulnerability-in-linux-linux-be29db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38569-vulnerability-in-linux-linux-be29d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38568-vulnerability-in-linux-linux-be29d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38567-vulnerability-in-linux-linux-be29cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe29cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38566-vulnerability-in-linux-linux-be29cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38565-vulnerability-in-linux-linux-be29c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe29c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38564-vulnerability-in-linux-linux-be29ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe29ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38563-vulnerability-in-linux-linux-be299b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe299b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38562-vulnerability-in-linux-linux-be2997</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38561-vulnerability-in-linux-linux-be2995</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38560-vulnerability-in-linux-linux-be2986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38559-vulnerability-in-linux-linux-be297e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe297e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38558-vulnerability-in-linux-linux-be2976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38558%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38557-vulnerability-in-linux-linux-be296e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe296e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38556-vulnerability-in-linux-linux-bdddec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38556%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdddec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38555-vulnerability-in-linux-linux-bddde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38555%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38554-vulnerability-in-linux-linux-bddddc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38554%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38553-vulnerability-in-linux-linux-be2966</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38553%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38552-vulnerability-in-linux-linux-be2962</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38552%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38551-vulnerability-in-linux-linux-be295e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38551%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe295e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38550-vulnerability-in-linux-linux-bdddd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38550%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdddd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38549-vulnerability-in-linux-linux-be292f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38549%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe292f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38548-vulnerability-in-linux-linux-be2927</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38548%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38547-vulnerability-in-linux-linux-be291d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38547%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe291d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38546-vulnerability-in-linux-linux-be2915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38545-vulnerability-in-linux-linux-be290f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38545%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe290f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38544-vulnerability-in-linux-linux-be290b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38544%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe290b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38543-vulnerability-in-linux-linux-be2907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38543%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38542-vulnerability-in-linux-linux-be28fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38542%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe28fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38541-vulnerability-in-linux-linux-aeb01a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38541%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682cd0f71484d88663aeb01a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38540-vulnerability-in-linux-linux-bd8e23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38540%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d981ac4522896dcbd8e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38539-vulnerability-in-linux-linux-be28f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38539%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe28f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38538-vulnerability-in-linux-linux-be28e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38538%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe28e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36979-vulnerability-in-linux-linux-be2891</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4632-cwe-79-improper-neutralization-of-in-051228e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4632%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cartflowswp%20WooCommerce%20Checkout%20%26%20Funnel%20Builder%20by%20CartFlows%20%E2%80%93%20Create%20High%20Converting%20Stores%20For%20WooCommerce&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0383-cwe-79-improper-neutralization-of-in-3f8677c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0789-cwe-348-use-of-less-trusted-source-i-9551f986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0789%3A%20CWE-348%20Use%20of%20Less%20Trusted%20Source%20in%20florent73%20WP%20Maintenance&amp;severity=medium&amp;id=699f6de5b7ef31ef0b590493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1407-cwe-352-cross-site-request-forgery-c-051ba0e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1407%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3894-cwe-79-improper-neutralization-of-in-f9fb498e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20robosoft%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36978-vulnerability-in-linux-linux-be2865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5208-cwe-770-allocation-of-resources-with-23255052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5208%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=68ef9b28178f764e1f470c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5853-cwe-434-unrestricted-upload-of-file--7277a879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5853%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20sirv%20Image%20Optimizer%2C%20Resizer%20and%20CDN%20%E2%80%93%20Sirv&amp;severity=critical&amp;id=699f6bf3b7ef31ef0b55cfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6132-cwe-434-unrestricted-upload-of-file--c747279f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6132%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20raajtram%20Pexels%3A%20Free%20Stock%20Photos&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5574-cwe-98-improper-control-of-filename--57d316d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5574%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20codevibrant%20WP%20Magazine%20Modules%20Lite&amp;severity=high&amp;id=699f6bebb7ef31ef0b55c253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5343-cwe-352-cross-site-request-forgery-c-f8c135f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5343%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20robosoft%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=high&amp;id=699f6be5b7ef31ef0b55be41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3229-cwe-434-unrestricted-upload-of-file--5f0ad7c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3229%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wordpresschef%20Salon%20Booking%20System&amp;severity=critical&amp;id=699f6c8eb7ef31ef0b5663a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2381-cwe-434-unrestricted-upload-of-file--093c2d24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2381%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ali2woo%20AliExpress%20Dropshipping%20with%20AliNext%20Lite&amp;severity=high&amp;id=699f6daeb7ef31ef0b58aaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4623-cwe-79-improper-neutralization-of-in-d4528abb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20auburnforest%20Blogmentor%20%E2%80%93%20Blog%20Layouts%20for%20Elementor&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5768-cwe-862-missing-authorization-in-sur-6bcf01b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5768%3A%20CWE-862%20Missing%20Authorization%20in%20surakrai%20MIMO%20Woocommerce%20Order%20Tracking&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5649-cwe-502-deserialization-of-untrusted-f543fd6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5649%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webhuntinfotech%20Universal%20Slider&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5724-cwe-502-deserialization-of-untrusted-64c7440f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5724%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webhuntinfotech%20Photo%20Video%20Gallery%20Master&amp;severity=high&amp;id=699f6bf1b7ef31ef0b55cd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3984-cwe-79-improper-neutralization-of-in-6f381c1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20embedsocial%20EmbedSocial%20%E2%80%93%20Social%20Media%20Feeds%2C%20Reviews%20and%20Galleries&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b5670b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4873-cwe-284-improper-access-control-in-a-85622d17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4873%3A%20CWE-284%20Improper%20Access%20Control%20in%20aspengrovestudios%20Replace%20Image&amp;severity=medium&amp;id=699f6b97b7ef31ef0b55700d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4541-cwe-352-cross-site-request-forgery-c-1f54274a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4541%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20viitorcloudvc%20Custom%20Product%20List%20Table&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4663-cwe-79-improper-neutralization-of-in-e6c89aac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20garbowza%20OSM%20Map%20Widget%20for%20Elementor&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5021-cwe-918-server-side-request-forgery--9115c75b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5021%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nimble3%20WordPress%20Picture%20%2F%20Portfolio%20%2F%20Media%20Gallery&amp;severity=critical&amp;id=699f6bdcb7ef31ef0b55b846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4787-cwe-20-improper-input-validation-in--cf750074</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4787%3A%20CWE-20%20Improper%20Input%20Validation%20in%20StylemixThemes%20Cost%20Calculator%20Builder%20PRO&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4450-cwe-862-missing-authorization-in-ali-62d5d4ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4450%3A%20CWE-862%20Missing%20Authorization%20in%20ali2woo%20AliExpress%20Dropshipping%20with%20AliNext%20Lite&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b55696d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6125-cwe-640-weak-password-recovery-mecha-42d8ba0f</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6125%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20glboy%20Login%20with%20phone%20number&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36684-na-70979e78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36684%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c64b7ef31ef0b56397b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36680-na-a4ea3c3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36680%3A%20n%2Fa&amp;severity=high&amp;id=699f6c64b7ef31ef0b56396f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36679-na-94317e68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36679%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c64b7ef31ef0b56396c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36678-na-95edfa2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36678%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c63b7ef31ef0b5638ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36677-na-944f708c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36677%3A%20n%2Fa&amp;severity=high&amp;id=699f6c63b7ef31ef0b5638fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34994-na-12392375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34994%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c55b7ef31ef0b563143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34993-na-671dee46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34993%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c55b7ef31ef0b563140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34990-na-fb302a8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34990%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c55b7ef31ef0b563137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33836-na-7c42c278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33836%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c47b7ef31ef0b561d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-19-f12b25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6146-cwe-121-stack-based-buffer-overflow--8795ea1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6146%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Actiontec%20WCB6200Q&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6145-cwe-134-use-of-externally-controlled-a808a03e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6145%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Actiontec%20WCB6200Q&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6144-cwe-121-stack-based-buffer-overflow--823a2569</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6144%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Actiontec%20WCB6200Q&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6143-cwe-120-buffer-copy-without-checking-76275906</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6143%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Actiontec%20WCB6200Q&amp;severity=high&amp;id=699f6bfcb7ef31ef0b55d530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6142-cwe-120-buffer-copy-without-checking-b93f5afb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6142%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Actiontec%20WCB6200Q&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5970-cwe-79-improper-neutralization-of-in-5d2155e6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5970%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxfoundry%20MaxGalleria&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36977-vulnerability-in-linux-linux-be285f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe285f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36976-vulnerability-in-linux-linux-be285d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe285d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36975-vulnerability-in-linux-linux-be2859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36974-vulnerability-in-linux-linux-be2855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5967-incorrect-default-permissions-3b724c66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5967%3A%20Incorrect%20Default%20Permissions&amp;severity=low&amp;id=69201212ce2640f942c372d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5953-improper-validation-of-consistency-w-20b97a02</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5953%3A%20Improper%20Validation%20of%20Consistency%20within%20Input&amp;severity=medium&amp;id=69091a47c28fd46ded81cf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5533-cwe-20-improper-input-validation-in--9d401c56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5533%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Elegant%20Themes%20Divi&amp;severity=medium&amp;id=699f6beab7ef31ef0b55c1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37080-heap-overflow-vulnerability-in-vmwa-a932bd2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37080%3A%20Heap-overflow%20vulnerability%20in%20VMware%20vCenter%20Server&amp;severity=critical&amp;id=697453364623b1157ca0bb4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37079-heap-overflow-vulnerability-in-vmwa-d49ef0e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37079%3A%20Heap-overflow%20vulnerability%20in%20VMware%20vCenter%20Server&amp;severity=critical&amp;id=69729bc34623b1157c91e043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5860-cwe-862-missing-authorization-in-tic-d6d17efe</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5860%3A%20CWE-862%20Missing%20Authorization%20in%20tickera%20Tickera%20%E2%80%93%20WordPress%20Event%20Ticketing&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5541-cwe-862-missing-authorization-in-vow-0969a058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5541%3A%20CWE-862%20Missing%20Authorization%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=699f6beab7ef31ef0b55c1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1634-cwe-862-missing-authorization-in-sta-75f04fe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1634%3A%20CWE-862%20Missing%20Authorization%20in%20startbooking%20Scheduling%20Plugin%20%E2%80%93%20Online%20Booking%20for%20WordPress&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0845-cwe-79-improper-neutralization-of-in-30fa3b3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0845%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20redlettuce%20PDF%20Viewer%20for%20Elementor&amp;severity=medium&amp;id=699f6de6b7ef31ef0b59063a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4375-cwe-79-improper-neutralization-of-in-4c59e9f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4375%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22002-na-08d4575d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22002%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b56ffb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38348-na-772dc617</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38348%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c79b7ef31ef0b564c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38347-na-2434fbc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38347%3A%20n%2Fa&amp;severity=high&amp;id=699f6c79b7ef31ef0b564c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37821-na-0c9ef603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37821%3A%20n%2Fa&amp;severity=high&amp;id=699f6c70b7ef31ef0b5640a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37802-na-f1d52b10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37802%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c70b7ef31ef0b564093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37800-na-9853939c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37800%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c70b7ef31ef0b56408e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37799-na-0bde7817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37799%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c70b7ef31ef0b56408a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37791-na-6dd86937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37791%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b563ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-18-f12357</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36973-vulnerability-in-linux-linux-be2846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0397-vulnerability-in-python-software-fou-1041af2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0397%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69092613fe7723195e0b3027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4032-vulnerability-in-python-software-fou-4702750e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4032%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=690929b1fe7723195e0fd86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6047-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-geovision-gv-dsp-lpr-v2-bd89b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6047%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20GeoVision%20GV_DSP_LPR_V2&amp;severity=critical&amp;id=682d9819c4522896dcbd89b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38470-na-cf119cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38470%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7ab7ef31ef0b564d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38469-na-59260843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38469%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c7ab7ef31ef0b564d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38449-na-2b1a47cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38449%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37848-na-7c3d979a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37848%3A%20n%2Fa&amp;severity=high&amp;id=699f6c71b7ef31ef0b564129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37840-na-b33ae1a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37840%3A%20n%2Fa&amp;severity=high&amp;id=699f6c71b7ef31ef0b564112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37828-na-30e4aaaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37828%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c70b7ef31ef0b5640af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37798-na-c8c67426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37798%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6fb7ef31ef0b564004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37795-na-5a745111</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37795%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b564001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37794-na-5fd6e409</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37794%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6fb7ef31ef0b563ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37664-na-2ca86f0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37664%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37663-na-4c787d9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37663%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6db7ef31ef0b563e10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37662-na-07ec4615</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37662%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563d7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37661-na-3147c435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37661%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37625-na-9336afdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37625%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37623-na-d0542452</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37623%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37622-na-a376b76e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37622%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c6ab7ef31ef0b563cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37621-na-7716e12a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37621%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37620-na-5409874a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37620%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37619-na-f7b963da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37619%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36583-na-4490ae4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36583%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b56379c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36582-na-67f8c0f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36582%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c61b7ef31ef0b563796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36581-na-07357c57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36581%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b563790</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36580-na-98837379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36580%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c61b7ef31ef0b56378a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36578-na-0d22ab31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36578%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5fb7ef31ef0b5636fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36577-na-7caf4c47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36577%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5fb7ef31ef0b5636f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36575-na-be10b597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36575%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b5636f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36574-na-e3163ea0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36574%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5fb7ef31ef0b5636f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36573-na-94af84dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36573%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b5636f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36543-na-c3865fac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36543%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c5fb7ef31ef0b5636e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36527-na-e592ae72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36527%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5fb7ef31ef0b56367a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34833-na-913d1f9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34833%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c54b7ef31ef0b563099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-17-f12701</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38467-na-7c34eb5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38467%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38462-na-b36a0bb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38462%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7ab7ef31ef0b564d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38461-na-2663d48c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38461%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38459-na-126a01e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38459%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38458-na-2d7cef25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38458%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38457-na-e4b451d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38457%3A%20n%2Fa&amp;severity=high&amp;id=699f6c7ab7ef31ef0b564cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38448-na-920471e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38448%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c7ab7ef31ef0b564ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38443-na-dc1d88d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38443%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c79b7ef31ef0b564c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38427-na-d3a4ca68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38427%3A%20n%2Fa&amp;severity=high&amp;id=699f6c79b7ef31ef0b564c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38396-na-5c48df01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38396%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c79b7ef31ef0b564c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38395-na-331b0ab4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38395%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c79b7ef31ef0b564c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34451-na-eff1c388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34451%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c50b7ef31ef0b5627c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38441-na-684291d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38441%3A%20n%2Fa&amp;severity=critical&amp;id=69092626fe7723195e0b5ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38440-na-ffb87060</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38440%3A%20n%2Fa&amp;severity=high&amp;id=69092626fe7723195e0b5acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38439-na-c1842b1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38439%3A%20n%2Fa&amp;severity=critical&amp;id=69092626fe7723195e0b5ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38428-n-a-in-n-a-bf84f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf84f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-16-f12683</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27275-cwe-266-incorrect-privilege-assignm-a326bfb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27275%3A%20CWE-266%20Incorrect%20Privilege%20Assignment&amp;severity=high&amp;id=68e0f3c6b66c7f7acdd3ea8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5611-cwe-79-improper-neutralization-of-in-bb907c9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Stratum%20%E2%80%93%20Elementor%20Widgets&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55caae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4095-cwe-79-improper-neutralization-of-in-8204ff1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4095%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baden03%20Collapse-O-Matic&amp;severity=medium&amp;id=699f6b82b7ef31ef0b55612d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4551-cwe-98-improper-control-of-filename--93771934</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4551%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20yotuwp%20Video%20Gallery%20%E2%80%93%20YouTube%20Playlist%2C%20Channel%20Gallery%20by%20YotuWP&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2695-cwe-79-improper-neutralization-of-in-5c18ce51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%203uu%20Shariff%20Wrapper&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4258-cwe-98-improper-control-of-filename--aa93a4fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4258%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20yotuwp%20Video%20Gallery%20%E2%80%93%20YouTube%20Playlist%2C%20Channel%20Gallery%20by%20YotuWP&amp;severity=critical&amp;id=699f6b84b7ef31ef0b556313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5858-cwe-862-missing-authorization-in-qua-dbd43fb4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5858%3A%20CWE-862%20Missing%20Authorization%20in%20quantumcloud%20AI%20Infographic%20Maker&amp;severity=medium&amp;id=699f6bf3b7ef31ef0b55cfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3105-cwe-94-improper-control-of-generatio-b71767bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3105%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20webcraftic%20Woody%20code%20snippets%20%E2%80%93%20Insert%20Header%20Footer%20Code%2C%20AdSense%20Ads&amp;severity=critical&amp;id=699f6c8cb7ef31ef0b566262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1399-cwe-79-improper-neutralization-of-in-19424a87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gloriafood%20Restaurant%20Menu%20%E2%80%93%20Food%20Ordering%20System%20%E2%80%93%20Table%20Reservation&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eadc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5871-cwe-502-deserialization-of-untrusted-e07b21a6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5871%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=critical&amp;id=699f6bf4b7ef31ef0b55d06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5868-cwe-330-use-of-insufficiently-random-76323500</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5868%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20WPWeb%20WooCommerce%20-%20Social%20Login&amp;severity=medium&amp;id=699f6bf4b7ef31ef0b55d060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6000-cwe-285-improper-authorization-in-fo-bedbae37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6000%3A%20CWE-285%20Improper%20Authorization%20in%20FooEvents%20FooEvents%20for%20WooCommerce&amp;severity=high&amp;id=699f6bfab7ef31ef0b55d3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4479-cwe-79-improper-neutralization-of-in-3f516528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4479%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3813-cwe-98-improper-control-of-filename--b80d8ef6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3813%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=high&amp;id=699f6c9db7ef31ef0b566d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3815-cwe-79-improper-neutralization-of-in-c38e9b3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Newspaper%20-%20News%20%26%20WooCommerce%20WordPress%20Theme&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3814-cwe-79-improper-neutralization-of-in-b216cf2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5263-cwe-79-improper-neutralization-of-in-46f7ab20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5263%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2544-cwe-862-missing-authorization-in-pop-db39e78e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2544%3A%20CWE-862%20Missing%20Authorization%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=high&amp;id=699f6db3b7ef31ef0b58b068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38394-na-a22643d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38394%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c79b7ef31ef0b564c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-15-f1285c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f1285c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2024-cwe-22-improper-limitation-of-a-path-aaef63ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2024%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Premio%20Folders%20Pro&amp;severity=high&amp;id=699f6da3b7ef31ef0b589aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2023-cwe-22-improper-limitation-of-a-path-cddaeed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2023%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20galdub%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2472-cwe-639-authorization-bypass-through-7b909bc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2472%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20latepoint%20LatePoint%20Plugin&amp;severity=critical&amp;id=699f6db0b7ef31ef0b58ad72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4863-cwe-79-improper-neutralization-of-in-17a30b3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6b97b7ef31ef0b556fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5577-cwe-98-improper-control-of-filename--a571be13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5577%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20mcnardelli%20Where%20I%20Was%2C%20Where%20I%20Will%20Be&amp;severity=critical&amp;id=699f6becb7ef31ef0b55c2ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5994-cwe-79-improper-neutralization-of-in-9f263efc</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=699f6bfab7ef31ef0b55d3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2122-cwe-79-improper-neutralization-of-in-e0e36eab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2122%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20FooGallery%20%E2%80%93%20Responsive%20Photo%20Gallery%2C%20Image%20Viewer%2C%20Justified%2C%20Masonry%20%26%20Carousel&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4404-cwe-918-server-side-request-forgery--e62fd7a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4404%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=high&amp;id=699f6b8cb7ef31ef0b5567fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5551-cwe-352-cross-site-request-forgery-c-79a12242</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5551%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPStaging%20WP%20STAGING%20Pro%20WordPress%20Backup%20Plugin&amp;severity=high&amp;id=699f6bebb7ef31ef0b55c235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4936-cwe-98-improper-control-of-filename--99a66d58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4936%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20flightbycanto%20Canto&amp;severity=critical&amp;id=699f6b98b7ef31ef0b5570b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1094-cwe-862-missing-authorization-in-arr-40bc4336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1094%3A%20CWE-862%20Missing%20Authorization%20in%20arraytics%20WP%20Timetics-%20AI-powered%20Appointment%20Booking%20Calendar%20and%20Online%20Scheduling%20Plugin&amp;severity=high&amp;id=699f6d20b7ef31ef0b56e2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0892-cwe-352-cross-site-request-forgery-c-b9dc9fd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0892%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vberkel%20Schema%20App%20Structured%20Data&amp;severity=medium&amp;id=699f6de7b7ef31ef0b590735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24320-na-bbc026c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24320%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37831-na-a291caa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37831%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c71b7ef31ef0b56410f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37645-na-a94d574a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37645%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37644-na-3b41ab7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37644%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37643-na-97013beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37643%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37642-na-c939ade4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37642%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6ab7ef31ef0b563d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37641-na-00c09d4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37641%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563d62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37640-na-9f9f624f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37640%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37639-na-99193c59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37639%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37637-na-8c56bf32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37637%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6ab7ef31ef0b563cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36656-na-b709c59d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36656%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c63b7ef31ef0b5638ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36598-na-defd29f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36598%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b5637b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34539-na-16bfee39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34539%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c54b7ef31ef0b563084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33377-na-dfcdeb73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33377%3A%20n%2Fa&amp;severity=high&amp;id=699f6c40b7ef31ef0b561942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33374-na-2b836c8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33374%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c40b7ef31ef0b56193e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33373-na-01f62d9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33373%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c40b7ef31ef0b56193a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36597-na-c29f85d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36597%3A%20n%2Fa&amp;severity=high&amp;id=6986057df9fa50a62f14c55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36599-na-eb5292cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36599%3A%20n%2Fa&amp;severity=medium&amp;id=6985fe75f9fa50a62f11707e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36600-na-6576ddb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36600%3A%20n%2Fa&amp;severity=high&amp;id=695e97867349d0379db35c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-14-f12e28</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32902-denial-of-service-in-google-android-2d483992</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32902%3A%20Denial%20of%20service%20in%20Google%20Android&amp;severity=high&amp;id=69a0c89232ffcdb8a2524570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32896-elevation-of-privilege-in-google-an-255ff954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32896%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68f7d9b2247d717aace26a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5947-cwe-306-missing-authentication-for-c-856847ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5947%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Deep%20Sea%20Electronics%20DSE855&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5948-cwe-121-stack-based-buffer-overflow--a58ae847</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5948%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Deep%20Sea%20Electronics%20DSE855&amp;severity=high&amp;id=699f6bf8b7ef31ef0b55d274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5949-cwe-835-loop-with-unreachable-exit-c-4e0e41f2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5949%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Deep%20Sea%20Electronics%20DSE855&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5950-cwe-121-stack-based-buffer-overflow--0b0cab4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5950%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Deep%20Sea%20Electronics%20DSE855&amp;severity=high&amp;id=699f6bf8b7ef31ef0b55d2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5951-cwe-306-missing-authentication-for-c-46761236</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5951%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Deep%20Sea%20Electronics%20DSE855&amp;severity=high&amp;id=699f6bf8b7ef31ef0b55d2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5952-cwe-306-missing-authentication-for-c-21219fe1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5952%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Deep%20Sea%20Electronics%20DSE855&amp;severity=medium&amp;id=699f6bf8b7ef31ef0b55d302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5924-cwe-693-protection-mechanism-failure-b4f7209d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5924%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Dropbox%20Dropbox%20Desktop&amp;severity=high&amp;id=699f6bf6b7ef31ef0b55d184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38083-cwe-449-the-ui-performs-the-wrong-action-in-microsoft-microsoft-edge-for-ios-aec161</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38083%3A%20CWE-449%3A%20The%20UI%20Performs%20the%20Wrong%20Action%20in%20Microsoft%20Microsoft%20Edge%20for%20iOS&amp;severity=medium&amp;id=682cd0fa1484d88663aec161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30057-cwe-356-product-ui-does-not-warn-user-of-unsafe-actions-in-microsoft-microsoft-edge-for-ios-aec0c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30057%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20Microsoft%20Microsoft%20Edge%20for%20iOS&amp;severity=medium&amp;id=682cd0fa1484d88663aec0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30058-cwe-357-insufficient-ui-warning-of-dangerous-operations-in-microsoft-microsoft-edge-chromium-based-aec0c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30058%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682cd0fa1484d88663aec0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34102-improper-restriction-of-xml-externa-8a5a493f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34102%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20Adobe%20Commerce&amp;severity=critical&amp;id=68f7d9b2247d717aace26a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4371-cwe-502-deserialization-of-untrusted-9e52c159</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4371%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20codexpert%20CoDesigner%20%E2%80%93%20The%20Most%20Compact%20and%20User-Friendly%20Elementor%20WooCommerce%20Builder&amp;severity=critical&amp;id=699f6b8ab7ef31ef0b5566ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0979-cwe-79-improper-neutralization-of-in-f818fd32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0979%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Dashboard%20Widgets%20Suite&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1565-cwe-79-improper-neutralization-of-in-36532f3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3073-cwe-451-user-interface-ui-misreprese-8d666397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3073%3A%20CWE-451%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20smub%20Easy%20WP%20SMTP%20by%20SendLayer%20%E2%80%93%20WordPress%20SMTP%20and%20Email%20Log%20Plugin&amp;severity=low&amp;id=699f6c8cb7ef31ef0b566254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4615-cwe-79-improper-neutralization-of-in-6c7e86dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elespare%20Elespare%20%E2%80%93%20News%2C%20Magazine%20and%20Blog%20Elements%20%26%20Blog%20Addons%20for%20Elementor%20with%20Header%20Footer%20Builder.%20One%20Click%20Import%3A%20No%20Coding%20Required!&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5265-cwe-79-improper-neutralization-of-in-b1515579</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5787-cwe-79-improper-neutralization-of-in-ab86f3d2</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5757-cwe-79-improper-neutralization-of-in-9184e435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5757%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2098-cwe-289-authentication-bypass-by-alt-e6c7187a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2098%3A%20CWE-289%20Authentication%20Bypass%20by%20Alternate%20Name%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=699f6da6b7ef31ef0b58a203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3922-cwe-89-improper-neutralization-of-sp-6235dcbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3922%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20Dokan%20Pro&amp;severity=critical&amp;id=699f6c9fb7ef31ef0b566f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31777-na-33817796</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31777%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-38293-na-c89d606c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-38293%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c79b7ef31ef0b564c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37877-na-0e63cca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37877%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c72b7ef31ef0b56426b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37849-na-a957ed77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37849%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c72b7ef31ef0b564190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37635-na-8b89dcb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37635%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c6ab7ef31ef0b563cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37633-na-ff6b177f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37633%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37631-na-4794e2f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37631%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37630-na-260b16ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37630%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6ab7ef31ef0b563cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36760-na-d453ee49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36760%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b5639e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36647-na-8458985d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36647%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c63b7ef31ef0b5638e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36589-na-a2a5dcec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36589%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36588-na-11320fa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36588%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c61b7ef31ef0b5637ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36587-na-d39ec4a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36587%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b5637a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36586-na-6c9b65e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36586%3A%20n%2Fa&amp;severity=high&amp;id=699f6c61b7ef31ef0b5637a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35328-65f44a30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35328&amp;severity=null&amp;id=699f6c58b7ef31ef0b563285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35326-3b76a5d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35326&amp;severity=null&amp;id=699f6c58b7ef31ef0b563283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35325-abf8a4bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35325&amp;severity=null&amp;id=699f6c58b7ef31ef0b563281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33253-na-d14a651b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33253%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b56164f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-13-f12875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5798-cwe-287-improper-authentication-in-h-40e61135</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5798%3A%20CWE-287%3A%20Improper%20Authentication%20in%20HashiCorp%20Vault&amp;severity=low&amp;id=690a2ddcf0ba78a050535a85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31881-cwe-770-allocation-of-resources-wit-8333ec3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31881%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2debf0ba78a050536ed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28762-cwe-770-allocation-of-resources-wit-9d1f94af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28762%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=690a2de9f0ba78a050536ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5909-cwe-269-improper-privilege-managemen-8eda612f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5909%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5908-cwe-532-insertion-of-sensitive-infor-dc74a8f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5908%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Palo%20Alto%20Networks%20GlobalProtect%20App&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5907-cwe-269-improper-privilege-managemen-6461ba52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5907%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5906-cwe-79-improper-neutralization-of-in-ce87ade6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5906%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Palo%20Alto%20Networks%20Prisma%20Cloud%20Compute&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5905-cwe-346-origin-validation-error-in-p-29fdb945</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5905%3A%20CWE-346%20Origin%20Validation%20Error%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=low&amp;id=699f6bf6b7ef31ef0b55d121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5891-weak-authentication-in-red-hat-red-h-9ba50325</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5891%3A%20Weak%20Authentication%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5674-cwe-862-missing-authorization-in-the-3082f247</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5674%3A%20CWE-862%20Missing%20Authorization%20in%20The%20Newsletter%20Team%20Newsletter%20-%20API%20v1%20and%20v2%20addon%20for%20Newsletter&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3492-cwe-79-improper-neutralization-of-in-ef8d6949</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3492%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1766-cwe-79-improper-neutralization-of-in-bb9bb5bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f42e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4898-cwe-862-missing-authorization-in-ins-809f2a6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4898%3A%20CWE-862%20Missing%20Authorization%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=critical&amp;id=699f6b98b7ef31ef0b5570a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2092-cwe-79-improper-neutralization-of-in-ac4bbe29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6da4b7ef31ef0b589c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4845-cwe-89-improper-neutralization-of-sp-12349f0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4845%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6b96b7ef31ef0b556f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5742-improper-link-resolution-before-file-09023ee7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5742%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)&amp;severity=medium&amp;id=69201212ce2640f942c372cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5154-improper-limitation-of-a-pathname-to-b874a1f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5154%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=691ec3739f5a9374a9d11009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5468-cwe-862-missing-authorization-in-sty-4d4adffb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5468%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20WordPress%20Header%20Builder%20Plugin%20%E2%80%93%20Pearl&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5266-cwe-79-improper-neutralization-of-in-cba6b45a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3183-use-of-password-hash-with-insufficie-3e6ba40d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3183%3A%20Use%20of%20Password%20Hash%20With%20Insufficient%20Computational%20Effort&amp;severity=high&amp;id=691ec3739f5a9374a9d10fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2698-incorrect-authorization-4fea79a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2698%3A%20Incorrect%20Authorization&amp;severity=high&amp;id=68e7a5cfba0e608b4f98d843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3925-cwe-79-improper-neutralization-of-in-6f604d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3925%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5892-cwe-79-improper-neutralization-of-in-0d8d956f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20badhonrocks%20Divi%20Torque%20Lite%20%E2%80%93%20Divi%20Theme%20and%20Extra%20Theme&amp;severity=medium&amp;id=699f6bf6b7ef31ef0b55d113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3559-cwe-79-improper-neutralization-of-in-69c0b6f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mgibbs189%20Custom%20Field%20Suite&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4564-cwe-79-improper-neutralization-of-in-a3d4c75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4564%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codexpert%20CoDesigner%20%E2%80%93%20The%20Most%20Compact%20and%20User-Friendly%20Elementor%20WooCommerce%20Builder&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5553-cwe-79-improper-neutralization-of-in-6acc69e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5553%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5543-cwe-89-improper-neutralization-of-sp-fde4bf83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5543%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20contrid%20Slideshow%20Gallery%20LITE&amp;severity=high&amp;id=699f6beab7ef31ef0b55c1be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4315-cwe-22-improper-limitation-of-a-path-0cf40b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4315%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parisneo%20parisneo%2Flollms&amp;severity=critical&amp;id=68ef9b27178f764e1f470c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37665-na-009bf1ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37665%3A%20n%2Fa&amp;severity=high&amp;id=699f6c6db7ef31ef0b563e16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36840-na-32b3fe25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36840%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c66b7ef31ef0b563a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36699-43e7a40d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36699&amp;severity=null&amp;id=699f6c64b7ef31ef0b563981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36691-na-fd210647</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36691%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c64b7ef31ef0b56397e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36523-na-c2054e42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36523%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5db7ef31ef0b5635c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36856-na-b80b01b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36856%3A%20n%2Fa&amp;severity=high&amp;id=696913454c611209ad3d9fab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37629-na-1b8e6ba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37629%3A%20n%2Fa&amp;severity=medium&amp;id=68e56dd5a677756fc9a02ce0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-12-f13073</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f13073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4669-cwe-79-improper-neutralization-of-in-a97915d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4669%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Events%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5646-cwe-79-improper-neutralization-of-in-94e038cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5646%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20futuriowp%20Futurio%20Extra&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4727-authentication-bypass-by-primary-wea-35d1a78d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4727%3A%20Authentication%20Bypass%20by%20Primary%20Weakness&amp;severity=high&amp;id=691ebfd29f5a9374a9cb4200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37301-cwe-1336-improper-neutralization-of-9b987204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37301%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20adfinis%20document-merge-service&amp;severity=high&amp;id=6983a549f9fa50a62fa8d0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28022-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-hitachi-energy-foxman-un-aeb0e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28022%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Hitachi%20Energy%20FOXMAN-UN&amp;severity=medium&amp;id=682cd0f71484d88663aeb0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30052-cwe-693-protection-mechanism-failure-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-aec0c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30052%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=medium&amp;id=682cd0fa1484d88663aec0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37325-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-azure-data-science-virtual-machines-aec15d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37325%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20Data%20Science%20Virtual%20Machines&amp;severity=high&amp;id=682cd0fa1484d88663aec15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35265-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aec15b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35265%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35263-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-aec14e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35263%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=682cd0fa1484d88663aec14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35254-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-monitor-aec148</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35254%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=682cd0fa1484d88663aec148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35253-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-file-sync-aec146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35253%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20File%20Sync&amp;severity=medium&amp;id=682cd0fa1484d88663aec146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35252-cwe-1104-use-of-unmaintained-third-party-components-in-microsoft-azure-storage-aec144</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35252%3A%20CWE-1104%3A%20Use%20of%20Unmaintained%20Third%20Party%20Components%20in%20Microsoft%20Azure%20Storage&amp;severity=high&amp;id=682cd0fa1484d88663aec144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35249-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-dynamics-365-business-central-2024-release-wave-1-aec140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35249%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Business%20Central%202024%20Release%20Wave%201&amp;severity=high&amp;id=682cd0fa1484d88663aec140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35248-cwe-1390-weak-authentication-in-microsoft-microsoft-dynamics-365-business-central-2023-release-wave-1-aec13e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35248%3A%20CWE-1390%3A%20Weak%20Authentication%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Business%20Central%202023%20Release%20Wave%201&amp;severity=high&amp;id=682cd0fa1484d88663aec13e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30104-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-office-2019-aec13c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30104%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682cd0fa1484d88663aec13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30103-cwe-184-incomplete-list-of-disallowed-inputs-in-microsoft-microsoft-office-2019-aec12f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30103%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682cd0fa1484d88663aec12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30102-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aec12d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30102%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0fa1484d88663aec12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30101-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-aec12b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30101%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682cd0fa1484d88663aec12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30100-cwe-426-untrusted-search-path-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aec129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30100%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0fa1484d88663aec129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30099-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aec127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30099%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30097-cwe-415-double-free-in-microsoft-windows-10-version-1809-aec125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30097%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30096-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-aec123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30096%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30095-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aec121</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30095%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30094-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aec11f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30094%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30093-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aec11d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30093%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30091-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aec110</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30091%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30090-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-aec10e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30090%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30089-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aec10c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30089%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30088-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aec10a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30088%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30087-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aec108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30087%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30086-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aec106</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30086%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30085-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-21h2-aec104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30085%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=682cd0fa1484d88663aec104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30084-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-aec102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30084%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30083-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-server-2019-aec100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30083%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0fa1484d88663aec100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30068-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-aec0df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30068%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30067-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-aec0d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30067%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30066-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aec0d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30066%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30065-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aec0ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30065%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30064-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2022-aec0cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30064%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682cd0fa1484d88663aec0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30063-cwe-641-improper-restriction-of-names-for-files-and-other-resources-in-microsoft-windows-10-version-1809-aec0ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30063%3A%20CWE-641%3A%20Improper%20Restriction%20of%20Names%20for%20Files%20and%20Other%20Resources%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30062-cwe-416-use-after-free-in-microsoft-windows-server-2019-aec0c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30062%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0fa1484d88663aec0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29060-cwe-284-improper-access-control-in-microsoft-microsoft-visual-studio-2022-version-17-10-aec0c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29060%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.10&amp;severity=medium&amp;id=682cd0fa1484d88663aec0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35255-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-azure-identity-library-for-net-aec14a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35255%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Azure%20Identity%20Library%20for%20.NET&amp;severity=medium&amp;id=682cd0fa1484d88663aec14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35250-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-aec142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35250%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30082-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aec0fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30082%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30080-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-aec0f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30080%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682cd0fa1484d88663aec0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30078-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-aec0ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30078%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30077-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-aec0ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30077%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0fa1484d88663aec0ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30076-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-aec0eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30076%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30075-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2008-service-pack-2-aec0e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30075%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20Service%20Pack%202&amp;severity=high&amp;id=682cd0fa1484d88663aec0e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30074-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2008-service-pack-2-aec0e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30074%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202008%20Service%20Pack%202&amp;severity=high&amp;id=682cd0fa1484d88663aec0e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30072-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-11-version-22h2-aec0e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30072%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682cd0fa1484d88663aec0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30070-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-server-2019-aec0e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30070%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682cd0fa1484d88663aec0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30069-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-aec0e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30069%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fa1484d88663aec0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34763-missing-authorization-in-saleswonde-03238f18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34763%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20Builder%20for%20WooCommerce%20reviews%20shortcodes%20%E2%80%93%20ReviewShort&amp;severity=null&amp;id=69cd7434e6bfc5ba1def6427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34815-missing-authorization-in-javier-car-86cd6ce0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34815%3A%20Missing%20Authorization%20in%20Javier%20Carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=null&amp;id=69cd7434e6bfc5ba1def6444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34819-missing-authorization-in-moreconver-d0631532</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34819%3A%20Missing%20Authorization%20in%20Moreconvert%20Team%20MC%20Woocommerce%20Wishlist&amp;severity=null&amp;id=69cd7434e6bfc5ba1def6448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34821-missing-authorization-in-anssi-lait-8caff86c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34821%3A%20Missing%20Authorization%20in%20Anssi%20Laitila%20Contact%20List&amp;severity=null&amp;id=69cd7434e6bfc5ba1def644c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34826-missing-authorization-in-saleswonde-c956e8f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34826%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20CF7%20WOW%20Styler&amp;severity=null&amp;id=69cd7437e6bfc5ba1def650a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26010-execute-unauthorized-code-or-commands-in-fortinet-fortipam-bed179</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26010%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiPAM&amp;severity=medium&amp;id=682d983ac4522896dcbed179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21754-improper-access-control-in-fortinet-fortiproxy-bed162</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21754%3A%20Improper%20access%20control%20in%20Fortinet%20FortiProxy&amp;severity=low&amp;id=682d983ac4522896dcbed162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46720-execute-unauthorized-code-or-commands-in-fortinet-fortios-bed0fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46720%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=682d983ac4522896dcbed0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23111-execute-unauthorized-code-or-commands-in-fortinet-fortios-bed166</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23111%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=682d983ac4522896dcbed166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5189-cwe-79-improper-neutralization-of-in-b4bbd96d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55baae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5692-bypass-of-file-name-restrictions-dur-96bc1f8f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5692%3A%20Bypass%20of%20file%20name%20restrictions%20during%20saving%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69a0c5b685912abc710cd5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34813-missing-authorization-in-moreconver-09a34c02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34813%3A%20Missing%20Authorization%20in%20Moreconvert%20Team%20MC%20Woocommerce%20Wishlist&amp;severity=null&amp;id=69cd7434e6bfc5ba1def6440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5584-cwe-79-improper-neutralization-of-in-ada880b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5584%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ladela%20WordPress%20Online%20Booking%20and%20Scheduling%20Plugin%20%E2%80%93%20Bookly&amp;severity=medium&amp;id=699f6becb7ef31ef0b55c2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5531-cwe-79-improper-neutralization-of-in-d3117c32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5531%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=699f6beab7ef31ef0b55c1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4266-cwe-200-information-exposure-in-xpee-48e85a87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4266%3A%20CWE-200%20Information%20Exposure%20in%20xpeedstudio%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6b86b7ef31ef0b55639b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3549-cwe-89-improper-neutralization-of-sp-f506fd82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3549%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=critical&amp;id=699f6c93b7ef31ef0b566704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3723-cwe-922-insecure-storage-of-sensitiv-9d128e55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3723%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4319-cwe-862-missing-authorization-in-vso-edb15b2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4319%3A%20CWE-862%20Missing%20Authorization%20in%20vsourz1td%20Advanced%20Contact%20form%207%20DB&amp;severity=medium&amp;id=699f6b86b7ef31ef0b556459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5530-cwe-79-improper-neutralization-of-in-884344b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5530%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6beab7ef31ef0b55c1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2473-cwe-863-incorrect-authorization-in-t-98104062</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2473%3A%20CWE-863%20Incorrect%20Authorization%20in%20tabrisrp%20WPS%20Hide%20Login&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0653-cwe-79-improper-neutralization-of-in-f73374ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0653%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hiroaki-miyashita%20Custom%20Field%20Template&amp;severity=medium&amp;id=699f6de1b7ef31ef0b590101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0627-cwe-79-improper-neutralization-of-in-56f25477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0627%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hiroaki-miyashita%20Custom%20Field%20Template&amp;severity=medium&amp;id=699f6de1b7ef31ef0b5900e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5090-cwe-79-improper-neutralization-of-in-566c3483</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5090%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26330-na-215ae1a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26330%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36821-na-48c1360d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36821%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b5639f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36702-na-75b1267a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36702%3A%20n%2Fa&amp;severity=high&amp;id=699f6c64b7ef31ef0b563983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36650-na-36f2bf49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36650%3A%20n%2Fa&amp;severity=high&amp;id=699f6c63b7ef31ef0b5638ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35329-e84391f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35329&amp;severity=null&amp;id=699f6c58b7ef31ef0b563287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34406-na-5ecf8525</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34406%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4fb7ef31ef0b562280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34405-na-01b1897c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34405%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4fb7ef31ef0b56227c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-11-f1314c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f1314c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35241-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-composer-composer-bf7cb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35241%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20composer%20composer&amp;severity=medium&amp;id=682d984bc4522896dcbf7cb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27830-a-maliciously-crafted-webpage-may-b-cb35319d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27830%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a3b65ff58c9332ff09ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27851-processing-maliciously-crafted-web--a258436f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27851%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=690a3b65ff58c9332ff09f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27806-an-app-may-be-able-to-access-sensit-2c7e2c5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27806%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81fe6bfc5ba1df6e58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27811-an-app-may-be-able-to-elevate-privi-fd6f1aa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27811%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb81fe6bfc5ba1df6e5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27807-an-app-may-be-able-to-circumvent-ap-19cf5587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27807%3A%20An%20app%20may%20be%20able%20to%20circumvent%20App%20Privacy%20Report%20logging%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81fe6bfc5ba1df6e5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27850-a-maliciously-crafted-webpage-may-b-c172ba86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27850%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a3b65ff58c9332ff09f00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27885-an-app-may-be-able-to-modify-protec-ad950140</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27885%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb827e6bfc5ba1df6e8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27831-processing-a-file-may-lead-to-unexp-05ec68af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27831%3A%20Processing%20a%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb823e6bfc5ba1df6e748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27857-a-remote-attacker-may-be-able-to-ca-a246cdac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27857%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb827e6bfc5ba1df6e8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27800-processing-a-maliciously-crafted-me-90006777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27800%3A%20Processing%20a%20maliciously%20crafted%20message%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81de6bfc5ba1df6e204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27836-processing-a-maliciously-crafted-im-c1ccf5ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27836%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb823e6bfc5ba1df6e778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27820-processing-web-content-may-lead-to--187c5f98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27820%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=690a3b63ff58c9332ff097dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27840-an-attacker-that-has-already-achiev-a5fd3b02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27840%3A%20An%20attacker%20that%20has%20already%20achieved%20kernel%20code%20execution%20may%20be%20able%20to%20bypass%20kernel%20memory%20protections%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb823e6bfc5ba1df6e78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27817-an-app-may-be-able-to-execute-arbit-a8828055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27817%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb821e6bfc5ba1df6e660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27801-an-app-may-be-able-to-elevate-privi-4f9bb7f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27801%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81fe6bfc5ba1df6e52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27814-a-person-with-physical-access-to-a--c4f5a960</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27814%3A%20A%20person%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20view%20contact%20information%20from%20the%20lock%20screen%20in%20Apple%20watchOS&amp;severity=low&amp;id=69ceb821e6bfc5ba1df6e637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27802-processing-a-maliciously-crafted-fi-fd4d9748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27802%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81fe6bfc5ba1df6e540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27855-a-shortcut-may-be-able-to-use-sensi-1592d804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27855%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb825e6bfc5ba1df6e822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27838-a-maliciously-crafted-webpage-may-b-cf3e648f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27838%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a3b65ff58c9332ff09ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23251-an-attacker-with-physical-access-ma-5311c566</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23251%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20leak%20Mail%20account%20credentials%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81de6bfc5ba1df6e1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27819-an-attacker-with-physical-access-ma-f3659340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27819%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb821e6bfc5ba1df6e684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27815-an-app-may-be-able-to-execute-arbit-a790793e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27815%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb821e6bfc5ba1df6e63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27799-an-unprivileged-app-may-be-able-to--b7cbf7c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27799%3A%20An%20unprivileged%20app%20may%20be%20able%20to%20log%20keystrokes%20in%20other%20apps%20including%20those%20using%20secure%20input%20mode%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb81de6bfc5ba1df6e1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27808-processing-web-content-may-lead-to--d1635db5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27808%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=690a3b63ff58c9332ff097cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27832-an-app-may-be-able-to-elevate-privi-312fe148</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27832%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb823e6bfc5ba1df6e760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27845-an-app-may-be-able-to-access-notes--08f6454e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27845%3A%20An%20app%20may%20be%20able%20to%20access%20Notes%20attachments%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb825e6bfc5ba1df6e807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27812-processing-web-content-may-lead-to--0225917e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27812%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20visionOS&amp;severity=high&amp;id=69ceb821e6bfc5ba1df6e62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23282-a-maliciously-crafted-email-may-be--509240dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23282%3A%20A%20maliciously%20crafted%20email%20may%20be%20able%20to%20initiate%20FaceTime%20calls%20without%20user%20authorization%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81de6bfc5ba1df6e1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27828-an-app-may-be-able-to-execute-arbit-ebf98376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27828%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb823e6bfc5ba1df6e732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27805-an-app-may-be-able-to-access-sensit-398873e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27805%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81fe6bfc5ba1df6e573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27844-a-websites-permission-dialog-may-pe-585eea3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27844%3A%20A%20website&apos;s%20permission%20dialog%20may%20persist%20after%20navigation%20away%20from%20the%20site%20in%20Apple%20Safari&amp;severity=critical&amp;id=69ceb825e6bfc5ba1df6e7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27833-processing-maliciously-crafted-web--422792da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27833%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=690a3b65ff58c9332ff09ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27848-a-malicious-app-may-be-able-to-gain-eed31c66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27848%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb825e6bfc5ba1df6e80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40389-an-app-may-be-able-to-access-sensit-6ae12b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40389%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a439f6d939959c8fddc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27792-an-app-may-be-able-to-access-user-s-d45979f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27792%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47616d939959c8022f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23299-an-app-may-be-able-to-break-out-of--67cb004a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23299%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47596d939959c8022ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35680-improper-neutralization-of-script-r-8ab16b16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35680%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20YITHEMES%20YITH%20WooCommerce%20Product%20Add-Ons&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35650-improper-control-of-filename-for-in-6731e983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35650%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Melapress%20MelaPress%20Login%20Security&amp;severity=null&amp;id=69cd7437e6bfc5ba1def6536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34800-missing-authorization-in-crafthemes-31ee2623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34800%3A%20Missing%20Authorization%20in%20Crafthemes%20Crafthemes%20Demo%20Import&amp;severity=null&amp;id=69cd7434e6bfc5ba1def642f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36972-vulnerability-in-linux-linux-bdddb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdddb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3700-cwe-259-use-of-hard-coded-password-i-999ad58e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3700%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Estomed%20Sp.%20z%20o.o.%20Simple%20Care&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3699-cwe-259-use-of-hard-coded-password-i-c5fb4606</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3699%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20drEryk%20sp.%20z%20o.o.%20drEryk%20Gabinet&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1228-cwe-259-use-of-hard-coded-password-i-d1c28697</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1228%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20EuroSoft%20Sp.%20z%20o.%20o.%20Eurosoft%20Przychodnia&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36971-vulnerability-in-linux-linux-be2840</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35723-missing-authorization-in-andrew-das-38f9ab8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35723%3A%20Missing%20Authorization%20in%20Andrew%20Dashboard%20To-Do%20List&amp;severity=null&amp;id=69cd7448e6bfc5ba1def6923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31613-na-78b30f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd4b7ef31ef0b58ef8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31612-na-d6fbadf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31612%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58eefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26507-na-d81c5d37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26507%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b572b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37880-na-fd7e3fa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37880%3A%20n%2Fa&amp;severity=high&amp;id=699f6c72b7ef31ef0b564274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37393-na-9db78323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37393%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c68b7ef31ef0b563b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37014-na-4cc18dd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37014%3A%20n%2Fa&amp;severity=high&amp;id=699f6c66b7ef31ef0b563aa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36531-na-3db37d0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36531%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5fb7ef31ef0b563680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36528-na-26e2c8c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36528%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5fb7ef31ef0b56367d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35474-na-2b39b7d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35474%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5ab7ef31ef0b5633f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34332-na-d7b69d4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34332%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4eb7ef31ef0b562213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33850-na-d8fcc741</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33850%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c47b7ef31ef0b561d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-10-f1286d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f1286d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4577-cwe-78-improper-neutralization-of-sp-27dbf0ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4577%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20PHP%20Group%20PHP&amp;severity=critical&amp;id=68f7d9b5247d717aace26b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5458-vulnerability-in-php-group-php-566ef9b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5458%3A%20Vulnerability%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=6909325735043901e8309923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31359-missing-authorization-in-premmerce--3f03121a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31359%3A%20Missing%20Authorization%20in%20Premmerce%20Premmerce%20Product%20Filter%20for%20WooCommerce&amp;severity=null&amp;id=69cd7424e6bfc5ba1def598b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32701-missing-authorization-in-instawp-in-b9fbb606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32701%3A%20Missing%20Authorization%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32703-improper-limitation-of-a-pathname-t-2bafff69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32703%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32704-missing-authorization-in-reputeinfo-ffd00448</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32704%3A%20Missing%20Authorization%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32705-missing-authorization-in-reputeinfo-c37f8967</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32705%3A%20Missing%20Authorization%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd742ee6bfc5ba1def620f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32725-missing-authorization-in-saleswonde-677a85b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32725%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%205%20Stars%20Rating%20Funnel&amp;severity=null&amp;id=69cd742ee6bfc5ba1def621b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32778-improper-limitation-of-a-pathname-t-d6a25cbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32778%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd742ee6bfc5ba1def621f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32792-missing-authorization-in-wpmu-dev-y-d55187ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32792%3A%20Missing%20Authorization%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Hummingbird&amp;severity=null&amp;id=69cd742ee6bfc5ba1def622c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33572-missing-authorization-in-posimyth-n-c1d42a02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33572%3A%20Missing%20Authorization%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30534-missing-authorization-in-typps-cale-7c51d4c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30534%3A%20Missing%20Authorization%20in%20typps%20Calendarista%20Basic%20Edition&amp;severity=null&amp;id=69cd7421e6bfc5ba1def584b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31246-missing-authorization-in-wpxpo-post-fe4a3f77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31246%3A%20Missing%20Authorization%20in%20WPXPO%20PostX&amp;severity=null&amp;id=69cd7421e6bfc5ba1def585a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37570-na-a3eae580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37570%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37569-na-50e7be9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37569%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37535-na-a6621a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37535%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37568-na-96dbd395</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37568%3A%20n%2Fa&amp;severity=high&amp;id=6908ed741c2a0078ae510267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-09-f1304c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f1304c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35659-missing-authorization-in-iqonic-des-6dc14489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35659%3A%20Missing%20Authorization%20in%20Iqonic%20Design%20KiviCare&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35679-improper-neutralization-of-input-du-e9fc44e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35679%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20GiveWP&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35684-cross-site-request-forgery-csrf-in--8b904296</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35684%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%2010up%20ElasticPress&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35693-improper-neutralization-of-input-du-b04ec0bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35693%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20AA%20Web%20Servant%2012%20Step%20Meeting%20List&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35694-improper-neutralization-of-input-du-9b332480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35694%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Amauri%20WPMobile.App&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35698-improper-neutralization-of-input-du-51be3319</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35698%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Tab%20Manager&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35709-improper-neutralization-of-input-du-f1f417b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35709%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=69cd7448e6bfc5ba1def691f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36970-vulnerability-in-linux-linux-be283a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe283a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36969-vulnerability-in-linux-linux-be2836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36968-vulnerability-in-linux-linux-be2825</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36967-vulnerability-in-linux-linux-be2806</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36966-vulnerability-in-linux-linux-be2802</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36965-vulnerability-in-linux-linux-be27f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe27f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35732-improper-neutralization-of-input-du-7266f447</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35732%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20Custom%20Login&amp;severity=null&amp;id=69cd7448e6bfc5ba1def6927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35739-improper-neutralization-of-input-du-4274c2b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35739%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20RadiusTheme%20The%20Post%20Grid&amp;severity=null&amp;id=69cd7448e6bfc5ba1def692b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5654-cwe-862-missing-authorization-in-wes-bdc636f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5654%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20CF7%20Google%20Sheets%20Connector&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4468-cwe-280-improper-handling-of-insuffi-d05a67a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4468%3A%20CWE-280%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20wordpresschef%20Salon%20Booking%20System&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b5569f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5091-cwe-79-improper-neutralization-of-in-1c7725f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5091%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sonalsinha21%20SKT%20Addons%20for%20Elementor&amp;severity=high&amp;id=699f6bdeb7ef31ef0b55b979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5613-cwe-79-improper-neutralization-of-in-39160198</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5613%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awordpresslife%20Formula&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5087-cwe-862-missing-authorization-in-web-95d2f187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5087%3A%20CWE-862%20Missing%20Authorization%20in%20webfactory%20Minimal%20Coming%20Soon%20%E2%80%93%20Coming%20Soon%20Page&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5638-cwe-79-improper-neutralization-of-in-4e22ff6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5638%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20awordpresslife%20Formula&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4661-cwe-862-missing-authorization-in-web-c62fdaf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4661%3A%20CWE-862%20Missing%20Authorization%20in%20webfactory%20WP%20Reset%20%E2%80%93%20Most%20Advanced%20WordPress%20Reset%20Tool&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5770-cwe-862-missing-authorization-in-web-5e97851a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5770%3A%20CWE-862%20Missing%20Authorization%20in%20webfactory%20WP%20Force%20SSL%20%26%20HTTPS%20SSL%20Redirect&amp;severity=medium&amp;id=699f6bf1b7ef31ef0b55cdaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3668-cwe-732-incorrect-permission-assignm-a10a77a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3668%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20PowerPack%20PowerPack%20Pro%20for%20Elementor&amp;severity=high&amp;id=699f6c99b7ef31ef0b566aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5663-cwe-79-improper-neutralization-of-in-445ffa6d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5663%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Cards%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37408-na-9d9db4cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37408%3A%20n%2Fa&amp;severity=high&amp;id=699f6c68b7ef31ef0b563b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-08-eba80661</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-08&amp;severity=medium&amp;id=68359c9e5d5f0974d01f8a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-08-f1fde5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-08&amp;severity=medium&amp;id=682acdc3bbaf20d303f1fde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-08-f12116</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5382-cwe-862-missing-authorization-in-lit-d3c56ff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5382%3A%20CWE-862%20Missing%20Authorization%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55bed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5599-cwe-922-insecure-storage-of-sensitiv-79ea331d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5599%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20softaculous%20FileOrganizer%20%E2%80%93%20Manage%20WordPress%20and%20Website%20Files&amp;severity=high&amp;id=699f6becb7ef31ef0b55c2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5542-cwe-79-improper-neutralization-of-in-cf9b0cdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5542%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=high&amp;id=699f6beab7ef31ef0b55c1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5438-cwe-639-authorization-bypass-through-1b731b84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5438%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bf9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4610-cwe-416-use-after-free-in-arm-ltd-bi-e3552b92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4610%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=68f7d9b5247d717aace26b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5637-cwe-862-missing-authorization-in-van-1f226f66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5637%3A%20CWE-862%20Missing%20Authorization%20in%20vanyukov%20Market%20Exporter&amp;severity=high&amp;id=699f6bedb7ef31ef0b55cacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5645-cwe-79-improper-neutralization-of-in-077c96f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5645%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20envothemes%20Envo%20Extra&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5481-cwe-35-path-traversal-in-10web-photo-60a3dbf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5481%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5426-cwe-79-improper-neutralization-of-in-f105fb9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bf86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4703-cwe-79-improper-neutralization-of-in-5fb17579</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horearadu%20One%20Page%20Express%20Companion&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4488-cwe-79-improper-neutralization-of-in-8682c21a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4488%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4489-cwe-79-improper-neutralization-of-in-4a5024cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4451-cwe-79-improper-neutralization-of-in-52efd209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4451%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b556971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3592-cwe-89-improper-neutralization-of-sp-5ee41a0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3592%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20expresstech%20Quiz%20and%20Survey%20Master%20(QSM)%20%E2%80%93%20Easy%20Quiz%20and%20Survey%20Maker&amp;severity=critical&amp;id=699f6c95b7ef31ef0b56687b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4354-cwe-918-server-side-request-forgery--a2dbcea5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4354%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tobiasbg%20TablePress%20%E2%80%93%20Tables%20in%20WordPress%20made%20easy&amp;severity=medium&amp;id=699f6b88b7ef31ef0b556581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4042-cwe-79-improper-neutralization-of-in-0c8d0986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Gutenberg%20Blocks%2C%20Page%20Builder%20%E2%80%93%20ComboBlocks&amp;severity=medium&amp;id=699f6b80b7ef31ef0b55604e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4902-cwe-89-improper-neutralization-of-sp-bc30ebf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4902%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=699f6b98b7ef31ef0b5570ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5640-cwe-79-improper-neutralization-of-in-db6fb0f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5640%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6beeb7ef31ef0b55cb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5612-cwe-79-improper-neutralization-of-in-87221e81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5612%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Essential%20Addons%20Essential%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1988-cwe-79-improper-neutralization-of-in-46a22d74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pickplugins%20Gutenberg%20Blocks%2C%20Page%20Builder%20%E2%80%93%20ComboBlocks&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5425-cwe-79-improper-neutralization-of-in-81533ec6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5425%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pandaboxwp%20WP%20jQuery%20Lightbox&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55bef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4887-cwe-98-improper-control-of-filename--15518855</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4887%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=high&amp;id=699f6b98b7ef31ef0b557095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5607-cwe-862-missing-authorization-in-nin-87ca8de3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5607%3A%20CWE-862%20Missing%20Authorization%20in%20ninjateam%20GDPR%20CCPA%20Compliance%20%26%20Cookie%20Consent%20Banner&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55caaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3987-cwe-79-improper-neutralization-of-in-de21d0bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3987%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20takanakui%20WP%20Mobile%20Menu%20%E2%80%93%20The%20Mobile-Friendly%20Responsive%20Menu&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b5670bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1768-cwe-79-improper-neutralization-of-in-636d4227</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1768%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nayrathemes%20Clever%20Fox&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1689-cwe-862-missing-authorization-in-the-e8fe48f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1689%3A%20CWE-862%20Missing%20Authorization%20in%20themefarmer%20WooCommerce%20Tools&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31959-na-fdebd4a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31959%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd9b7ef31ef0b58f886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31958-na-ea01c360</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31958%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd9b7ef31ef0b58f883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30162-na-33bcaf33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30162%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37388-na-8fe63ffd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37388%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c68b7ef31ef0b563b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37384-na-302fa0c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37384%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c68b7ef31ef0b563b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36811-5b298ba0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36811&amp;severity=null&amp;id=699f6c66b7ef31ef0b5639e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37383-na-8b071bab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37383%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9b2247d717aace26a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-07-f12601</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32752-cwe-306-missing-authentication-for-critical-function-in-johnson-controls-istar-configuration-utility-icu-bf08f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32752%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Johnson%20Controls%20iSTAR%20Configuration%20Utility%20(ICU)&amp;severity=critical&amp;id=682d983fc4522896dcbf08f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5124-cwe-203-observable-discrepancy-in-gaizhenbiao-gaizhenbiao-chuanhuchatgpt-aeb0af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5124%3A%20CWE-203%20Observable%20Discrepancy%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=682cd0f71484d88663aeb0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2965-cwe-674-uncontrolled-recursion-in-la-88720cd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2965%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=medium&amp;id=68ef9b26178f764e1f470b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3404-cwe-863-incorrect-authorization-in-g-cda5f899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3404%3A%20CWE-863%20Incorrect%20Authorization%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b26178f764e1f470b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5278-cwe-434-unrestricted-upload-of-file--164f4804</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5278%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=medium&amp;id=68ef9b28178f764e1f470c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5130-cwe-862-missing-authorization-in-lun-14c2c0d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5130%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b27178f764e1f470c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1873-cwe-22-improper-limitation-of-a-path-a086574e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1873%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b25178f764e1f470b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2035-cwe-862-missing-authorization-in-zen-d4f2e6dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2035%3A%20CWE-862%20Missing%20Authorization%20in%20zenml-io%20zenml-io%2Fzenml&amp;severity=medium&amp;id=68ef9b25178f764e1f470b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2288-cwe-352-cross-site-request-forgery-c-1da02a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2288%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20parisneo%20parisneo%2Flollms-webui&amp;severity=high&amp;id=68ef9b26178f764e1f470b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5133-cwe-200-exposure-of-sensitive-inform-0d131320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5133%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=critical&amp;id=68ef9b27178f764e1f470c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30373-cwe-787-out-of-bounds-write-in-kofa-662ab099</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30373%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58dba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0520-cwe-22-improper-limitation-of-a-path-7454d134</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0520%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=68ef9b21178f764e1f4709a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2213-cwe-620-unverified-password-change-i-36b1e2e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2213%3A%20CWE-620%20Unverified%20Password%20Change%20in%20zenml-io%20zenml-io%2Fzenml&amp;severity=low&amp;id=68ef9b25178f764e1f470b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5307-cwe-125-out-of-bounds-read-in-kofax--b0862663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5307%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6be4b7ef31ef0b55bdb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5306-cwe-119-improper-restriction-of-oper-f12ae3bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5306%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bdb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5550-cwe-22-improper-limitation-of-a-path-2ced8fce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5550%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=medium&amp;id=68ef9b28178f764e1f470c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5126-cwe-862-missing-authorization-in-lun-a4932122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5126%3A%20CWE-862%20Missing%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b27178f764e1f470c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5305-cwe-121-stack-based-buffer-overflow--dad08bcb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5305%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bdb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5304-cwe-787-out-of-bounds-write-in-kofax-9a638f46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5304%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5303-cwe-787-out-of-bounds-write-in-kofax-fcaa700e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5303%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bdaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4941-cwe-22-improper-limitation-of-a-path-8146cc63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4941%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b27178f764e1f470c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5452-cwe-915-improperly-controlled-modifi-4f5349cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5452%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20lightning-ai%20lightning-ai%2Fpytorch-lightning&amp;severity=critical&amp;id=68ef9b28178f764e1f470c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5302-cwe-787-out-of-bounds-write-in-kofax-32f0388f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5302%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5301-cwe-122-heap-based-buffer-overflow-i-a5a4d0be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5301%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3504-cwe-863-incorrect-authorization-in-l-fd105afd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3504%3A%20CWE-863%20Incorrect%20Authorization%20in%20lunary-ai%20lunary-ai%2Flunary&amp;severity=high&amp;id=68ef9b26178f764e1f470b8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30369-cwe-732-incorrect-permission-assign-078b3df1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30369%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20A10%20Thunder%20ADC&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58db97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30368-cwe-78-improper-neutralization-of-s-e639dd3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30368%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20A10%20Thunder%20ADC&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58db93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5506-cwe-787-out-of-bounds-write-in-luxio-b39d5d3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5506%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5508-cwe-787-out-of-bounds-write-in-luxio-f61483f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5508%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5509-cwe-427-uncontrolled-search-path-ele-ad891955</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5509%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Luxion%20KeyShot&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5507-cwe-121-stack-based-buffer-overflow--32924cc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5507%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5269-cwe-416-use-after-free-in-sonos-era--9735c2bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5269%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Sonos%20Era%20100&amp;severity=high&amp;id=699f6be2b7ef31ef0b55bcbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5268-cwe-125-out-of-bounds-read-in-sonos--35f5a390</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5268%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Sonos%20Era%20100&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bcba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5267-cwe-787-out-of-bounds-write-in-sonos-564fc52c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5267%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Sonos%20Era%20100&amp;severity=high&amp;id=699f6be2b7ef31ef0b55bcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5256-cwe-191-integer-underflow-wrap-or-wr-e5007ede</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5256%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Sonos%20Era%20100&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5505-cwe-22-improper-limitation-of-a-path-acd26a35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5505%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20NETGEAR%20ProSAFE%20Network%20Management%20System&amp;severity=high&amp;id=699f6be9b7ef31ef0b55c11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30375-cwe-416-use-after-free-in-luxion-ke-c92950f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30375%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58dba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30374-cwe-787-out-of-bounds-write-in-luxi-e8f40eff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30374%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Luxion%20KeyShot%20Viewer&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58dba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3152-cwe-918-server-side-request-forgery--b2f8b2a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3152%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=high&amp;id=68ef9b26178f764e1f470b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5489-cwe-862-missing-authorization-in-wbc-bc7c318a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5489%3A%20CWE-862%20Missing%20Authorization%20in%20wbcomdesigns%20Wbcom%20Designs%20%E2%80%93%20Custom%20Font%20Uploader&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5188-cwe-79-improper-neutralization-of-in-cb0dd01e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5188%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5038-cwe-79-improper-neutralization-of-in-4f42d9e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5038%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5329-cwe-89-improper-neutralization-of-sp-6760702a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5329%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=high&amp;id=699f6be5b7ef31ef0b55be29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5259-cwe-79-improper-neutralization-of-in-14a44ff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5259%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wcmp%20MultiVendorX%20Marketplace%20%E2%80%93%20WooCommerce%20MultiVendor%20Marketplace%20Solution&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28995-cwe-22-improper-limitation-of-a-pat-f22fce9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28995%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SolarWinds%20SolarWinds%20Serv-U&amp;severity=high&amp;id=68f7d9b2247d717aace26a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5221-cwe-79-improper-neutralization-of-in-a3f7187a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5221%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Blocks&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5665-cwe-862-missing-authorization-in-xoo-d6e1375c</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5665%3A%20CWE-862%20Missing%20Authorization%20in%20xootix%20Login%2FSignup%20Popup%20(%20Inline%20Form%20%2B%20Woocommerce%20)&amp;severity=medium&amp;id=699f6befb7ef31ef0b55cc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3049-insufficient-verification-of-data-authenticity-b3f281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3049%3A%20Insufficient%20Verification%20of%20Data%20Authenticity&amp;severity=medium&amp;id=682d31604d7c5ea9f4b3f281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0972-cwe-284-improper-access-control-in-z-295a573b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0972%3A%20CWE-284%20Improper%20Access%20Control%20in%20zhuyi%20BuddyPress%20Members%20Only&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5152-cwe-79-improper-neutralization-of-in-7faff88b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5152%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20quomodosoft%20ElementsReady%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5161-cwe-79-improper-neutralization-of-in-8149c5e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Addons%20For%20Elementor%20(%20Header%20Footer%20Builder%2C%20Free%20Elementor%20Widgets%2C%20Elementor%20Templates%20Library%20)&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5162-cwe-79-improper-neutralization-of-in-697780e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5162%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ibabar%20WordPress%20prettyPhoto&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5153-cwe-22-improper-limitation-of-a-path-2161ff38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5153%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wshberlin%20Startklar%20Elementor%20Addons&amp;severity=critical&amp;id=699f6bdeb7ef31ef0b55ba0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1175-cwe-862-missing-authorization-in-wpp-6ac1ab98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1175%3A%20CWE-862%20Missing%20Authorization%20in%20wppost%20WP-Recall%20%E2%80%93%20Registration%2C%20Profile%2C%20Commerce%20%26%20More&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5141-cwe-79-improper-neutralization-of-in-ebab2167</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mpntod%20Rotating%20Tweets%20(Twitter%20widget%20and%20shortcode)&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5615-cwe-200-information-exposure-in-will-3fa2dc36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5615%3A%20CWE-200%20Information%20Exposure%20in%20willnorris%20Open%20Graph&amp;severity=medium&amp;id=699f6bedb7ef31ef0b55cac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4458-cwe-79-improper-neutralization-of-in-53598e67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b5569e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4212-cwe-79-improper-neutralization-of-in-a1f092b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4212%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b84b7ef31ef0b5562f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5449-cwe-862-missing-authorization-in-wpp-da963ac3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5449%3A%20CWE-862%20Missing%20Authorization%20in%20wppool%20WP%20Dark%20Mode%20%E2%80%93%20WordPress%20Dark%20Mode%20Plugin%20for%20Improved%20Accessibility%2C%20Dark%20Theme%2C%20Night%20Mode%2C%20and%20Social%20Sharing&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bfa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4459-cwe-87-improper-neutralization-of-al-8e514e8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4459%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b5569e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4608-cwe-79-improper-neutralization-of-in-5667af80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artbees%20SellKit%20%E2%80%93%20Funnel%20builder%20and%20checkout%20optimizer%20for%20WooCommerce%20to%20sell%20more%2C%20faster&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4707-cwe-79-improper-neutralization-of-in-210c48a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horearadu%20Materialis%20Companion&amp;severity=medium&amp;id=699f6b95b7ef31ef0b556e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2922-cwe-79-improper-neutralization-of-in-d962a3f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2922%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesflat%20Themesflat%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4364-cwe-79-improper-neutralization-of-in-9bc1d02e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5565a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2017-cwe-862-missing-authorization-in-ada-d3dc9a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2017%3A%20CWE-862%20Missing%20Authorization%20in%20adamskaat%20Countdown%2C%20Coming%20Soon%2C%20Maintenance%20%E2%80%93%20Countdown%20%26%20Clock&amp;severity=medium&amp;id=699f6da2b7ef31ef0b5899ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4705-cwe-79-improper-neutralization-of-in-a8c2d810</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20j0hnsmith%20Testimonials%20Widget&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5179-cwe-22-improper-limitation-of-a-path-ce20def8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5179%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20codelessthemes%20Cowidgets%20%E2%80%93%20Elementor%20Addons&amp;severity=high&amp;id=699f6bdeb7ef31ef0b55ba2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2350-cwe-79-improper-neutralization-of-in-a7910e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2350%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zootemplate%20Clever%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5224-cwe-79-improper-neutralization-of-in-4307a666</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5224%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20johnnash1975%20Easy%20Social%20Like%20Box%20%E2%80%93%20Popup%20%E2%80%93%20Sidebar%20Widget&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5001-cwe-79-improper-neutralization-of-in-20d05896</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20biplob018%20Image%20Hover%20Effects%20for%20Elementor%20with%20Lightbox%20and%20Flipbox&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4194-cwe-94-improper-control-of-generatio-613c59bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4194%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wponlinesupport%20Album%20and%20Image%20Gallery%20plus%20Lightbox&amp;severity=medium&amp;id=699f6b84b7ef31ef0b55626e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0910-cwe-200-information-exposure-in-rest-73d3a947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0910%3A%20CWE-200%20Information%20Exposure%20in%20restrict%20Restrict%20for%20Elementor&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4942-cwe-79-improper-neutralization-of-in-d3a0a5b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4942%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dextorlobo%20Custom%20Dash&amp;severity=medium&amp;id=699f6b98b7ef31ef0b5570ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5342-cwe-79-improper-neutralization-of-in-6237868e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5342%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20purvabathe%20Simple%20Image%20Popup%20Shortcode&amp;severity=medium&amp;id=699f6be5b7ef31ef0b55be3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4788-cwe-862-missing-authorization-in-duo-f5d6673c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4788%3A%20CWE-862%20Missing%20Authorization%20in%20duongancol%20Boostify%20Header%20Footer%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5324-cwe-862-missing-authorization-in-xoo-bd3d3460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5324%3A%20CWE-862%20Missing%20Authorization%20in%20xootix%20Login%2FSignup%20Popup%20(%20Inline%20Form%20%2B%20Woocommerce%20)&amp;severity=high&amp;id=699f6be4b7ef31ef0b55bdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33655-na-43f65902</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33655%3A%20n%2Fa&amp;severity=high&amp;id=6908f50df612d110fe9cbeaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-06-f12775</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5037-authentication-bypass-by-spoofing-33b86af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5037%3A%20Authentication%20Bypass%20by%20Spoofing&amp;severity=high&amp;id=691356bfb36faa5b6c09d269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35674-missing-authorization-in-unlimited--62eafa2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35674%3A%20Missing%20Authorization%20in%20Unlimited%20Elements%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4812-improper-neutralization-of-input-dur-44c80919</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4812%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3716-exposure-of-sensitive-information-to-af5ac404</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3716%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=68e901b9fd0dca528e8b9a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3469-cwe-79-improper-neutralization-of-in-734e59a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3469%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GeneratePress%20GP%20Premium&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5459-cwe-862-missing-authorization-in-rus-d996f382</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5459%3A%20CWE-862%20Missing%20Authorization%20in%20rustaurius%20Five%20Star%20Restaurant%20Menu%20and%20Food%20Ordering&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1662-cwe-306-missing-authentication-for-c-3086458a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1662%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20PORTY%20Smart%20Tech%20Technology%20Joint%20Stock%20Company%20PowerBank%20Application&amp;severity=high&amp;id=68ee47d1509368ccaa6fd054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4001-cwe-79-improper-neutralization-of-in-2d6c16bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4001%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6b80b7ef31ef0b555fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5536-cwe-79-improper-neutralization-of-in-57bf103a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5536%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Link&amp;severity=medium&amp;id=699f6beab7ef31ef0b55c1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4821-cwe-79-improper-neutralization-of-in-e3137874</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4821%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4743-cwe-89-improper-neutralization-of-sp-0cf6a3d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WordPress%20LMS%20for%20eLearning&amp;severity=critical&amp;id=699f6b95b7ef31ef0b556eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5571-cwe-79-improper-neutralization-of-in-aa71517a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5571%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6bebb7ef31ef0b55c24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5439-cwe-20-improper-input-validation-in--211c373d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5439%3A%20CWE-20%20Improper%20Input%20Validation%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bfa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4939-cwe-79-improper-neutralization-of-in-e4410230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4939%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpweaver%20Weaver%20Xtreme%20Theme%20Support&amp;severity=medium&amp;id=699f6b98b7ef31ef0b5570b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5453-cwe-862-missing-authorization-in-met-483c7a87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5453%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5006-cwe-79-improper-neutralization-of-in-ab01131d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5006%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duongancol%20Boostify%20Header%20Footer%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6bdbb7ef31ef0b55b7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4088-cwe-862-missing-authorization-in-sha-fcbca6a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4088%3A%20CWE-862%20Missing%20Authorization%20in%20shafayat-alam%20Gutenberg%20Blocks%20and%20Page%20Layouts%20%E2%80%93%20Attire%20Blocks&amp;severity=medium&amp;id=699f6b82b7ef31ef0b556125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5222-cwe-79-improper-neutralization-of-in-003623da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5222%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cyberchimps%20Responsive%20Addons%20%E2%80%93%20Starter%20Templates%2C%20Advanced%20Features%20and%20Customizer%20Settings%20for%20Responsive%20Theme.&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1164-cwe-79-improper-neutralization-of-in-9522399a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1164%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2368-cwe-352-cross-site-request-forgery-c-93b25664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2368%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ndijkstra%20Mollie%20Forms&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3667-cwe-79-improper-neutralization-of-in-b0143517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3667%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=699f6c99b7ef31ef0b566aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1940-cwe-79-improper-neutralization-of-in-3f74bdcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1940%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=699f6d44b7ef31ef0b56f88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2087-cwe-79-improper-neutralization-of-in-9b578c62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=699f6da4b7ef31ef0b589c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4295-cwe-89-improper-neutralization-of-sp-e9404336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4295%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=699f6b86b7ef31ef0b55643e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1161-cwe-79-improper-neutralization-of-in-fbfe8243</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5149-cwe-330-use-of-insufficiently-random-42f26028</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5149%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5483-cwe-200-information-exposure-in-thim-52b0d971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5483%3A%20CWE-200%20Information%20Exposure%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5317-cwe-79-improper-neutralization-of-in-63bb50fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20satollo%20Newsletter%20%E2%80%93%20Send%20awesome%20emails%20from%20WordPress&amp;severity=medium&amp;id=699f6be4b7ef31ef0b55bdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36837-na-bdb8998a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36837%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c66b7ef31ef0b563a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34055-na-592da8cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34055%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4cb7ef31ef0b5620e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-05-f12ec5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4520-cwe-862-missing-authorization-in-gai-6e25c453</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4520%3A%20CWE-862%20Missing%20Authorization%20in%20gaizhenbiao%20gaizhenbiao%2Fchuanhuchatgpt&amp;severity=high&amp;id=68ef9b27178f764e1f470c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0756-cwe-345-insufficient-verification-of-220efb22</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0756%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Insert%20or%20Embed%20Articulate%20Content%20into%20WordPress&amp;severity=low&amp;id=69a709cdd1a09e29cb586e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35653-improper-neutralization-of-input-du-b945aa16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35653%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=69cd743ce6bfc5ba1def6693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35655-cwe-79-improper-neutralization-of-i-0d7cbef7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Brave%20Brave%20Popup%20Builder&amp;severity=medium&amp;id=695450aedb813ff03e2bec46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35664-improper-neutralization-of-input-du-7ec6bd1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35664%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpvividplugins%20WPvivid%20Backup%20for%20MainWP&amp;severity=null&amp;id=69cd743ce6bfc5ba1def66a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35700-incorrect-privilege-assignment-in-d-196f5c09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35700%3A%20Incorrect%20Privilege%20Assignment%20in%20DeluxeThemes%20Userpro&amp;severity=null&amp;id=69cd7448e6bfc5ba1def691b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4254-cwe-214-invocation-of-process-using--41aef0e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4254%3A%20CWE-214%20Invocation%20of%20Process%20Using%20Visible%20Sensitive%20Information%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b27178f764e1f470c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4637-cwe-79-improper-neutralization-of-in-4fa77097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4637%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4581-cwe-79-improper-neutralization-of-in-2c62b0bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4581%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5420-cwe-79-improper-neutralization-of-in-0813da65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20SEH%20Computertechnik%20utnserver%20Pro&amp;severity=high&amp;id=68e63093859c29afa3a63e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4253-cwe-78-improper-neutralization-of-sp-15141333</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4253%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=high&amp;id=68ef9b27178f764e1f470c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5485-cwe-79-improper-neutralization-of-in-28425513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5485%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20SureTriggers%20%E2%80%93%20Connect%20All%20Your%20Plugins%2C%20Apps%2C%20Tools%20%26%20Automate%20Everything!&amp;severity=medium&amp;id=699f6be8b7ef31ef0b55c04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2470-cwe-79-cross-site-scripting-xss-in-s-8216b5af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2470%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Simple%20Ajax%20Chat&amp;severity=medium&amp;id=696175d145ea0302aa963f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4462-cwe-79-improper-neutralization-of-in-c09da6f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4462%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20freephp-1%20Nafeza%20Prayer%20Time&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b5569eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4997-cwe-862-missing-authorization-in-vic-d128edbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4997%3A%20CWE-862%20Missing%20Authorization%20in%20victorfreitas%20WPUpper%20Share%20Buttons&amp;severity=medium&amp;id=699f6b99b7ef31ef0b55716e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4273-cwe-79-improper-neutralization-of-in-9c06a817</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4273%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4697-cwe-79-improper-neutralization-of-in-a513d448</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codelessthemes%20Cowidgets%20%E2%80%93%20Elementor%20Addons&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4274-cwe-639-authorization-bypass-through-31244538</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4274%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20g5theme%20Essential%20Real%20Estate&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3230-cwe-79-improper-neutralization-of-in-91850c2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3230%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dfactory%20Download%20Attachments&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b5663fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2382-cwe-345-insufficient-verification-of-283171e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2382%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20ishanverma%20Authorize.net%20Payment%20Gateway%20For%20WooCommerce&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aaf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3031-cwe-79-improper-neutralization-of-in-c3d0d474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3031%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shrinitech%20Fluid%20Notification%20Bar&amp;severity=medium&amp;id=699f6c8ab7ef31ef0b566126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1718-cwe-345-insufficient-verification-of-ec7e0969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1718%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20claudiosanches%20Claudio%20Sanches%20%E2%80%93%20Checkout%20Cielo%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2019-cwe-284-improper-access-control-in-b-c30674d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2019%3A%20CWE-284%20Improper%20Access%20Control%20in%20bobbysmith007%20WP-DB-Table-Editor&amp;severity=high&amp;id=699f6da3b7ef31ef0b589a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3555-cwe-862-missing-authorization-in-gel-73f09d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3555%3A%20CWE-862%20Missing%20Authorization%20in%20gelform%20Social%20Link%20Pages%3A%20link-in-bio%20landing%20pages%20for%20your%20social%20media%20profiles&amp;severity=high&amp;id=699f6c93b7ef31ef0b56671c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1717-cwe-862-missing-authorization-in-mel-7750029c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1717%3A%20CWE-862%20Missing%20Authorization%20in%20melapress%20Admin%20Notices%20Manager&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3888-cwe-79-improper-neutralization-of-in-6568bfb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tagDiv%20tagDiv%20Composer&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4552-cwe-288-authentication-bypass-using--7d9176eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4552%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20phoeniixx%20Social%20Login%20Lite%20For%20WooCommerce&amp;severity=critical&amp;id=699f6b90b7ef31ef0b556b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4870-cwe-266-incorrect-privilege-assignme-256c0339</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4870%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20pokornydavid%20Frontend%20Registration%20%E2%80%93%20Contact%20Form%207&amp;severity=high&amp;id=699f6b97b7ef31ef0b557009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-04-f12b23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4540-exposure-of-sensitive-information-to-77c956f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4540%3A%20Cleartext%20Storage%20of%20Sensitive%20Information&amp;severity=high&amp;id=6920235bcf2d47c38997b87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0336-cwe-306-missing-authentication-for-c-d8d28d03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0336%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20EMTA%20Grup%20PDKS&amp;severity=critical&amp;id=68ee4920509368ccaa724898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34385-improper-neutralization-of-input-du-27b73740</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34385%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Wishlist&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34764-cd6a2b99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34764&amp;severity=low&amp;id=69807cb1f9fa50a62f340a2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34770-improper-neutralization-of-input-du-4f14c51d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34770%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Popup%20Maker%20Popup%20Maker%20WP&amp;severity=null&amp;id=69cd7434e6bfc5ba1def642b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34801-improper-neutralization-of-input-du-a89ac060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34801%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Mervin%20Praison%20Praison%20SEO%20WordPress&amp;severity=null&amp;id=69cd7434e6bfc5ba1def6433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3829-cwe-59-improper-link-resolution-befo-2c2525dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3829%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20in%20qdrant%20qdrant%2Fqdrant&amp;severity=critical&amp;id=68ef9b26178f764e1f470b98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35633-server-side-request-forgery-ssrf-in-4a58ad8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35633%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Creative%20Themes%20Blocksy%20Companion&amp;severity=null&amp;id=69cd7437e6bfc5ba1def651f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35637-server-side-request-forgery-ssrf-in-7907c6c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35637%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7437e6bfc5ba1def6524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35639-improper-neutralization-of-input-du-a770d835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35639%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Webliberty%20Simple%20Spoiler&amp;severity=null&amp;id=69cd7437e6bfc5ba1def6528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36964-vulnerability-in-linux-linux-be27eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe27eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36963-vulnerability-in-linux-linux-aeb0ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36962-vulnerability-in-linux-linux-be27e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe27e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36961-vulnerability-in-linux-linux-be27db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe27db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36960-vulnerability-in-linux-linux-be27d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe27d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34987-na-8ef8aafb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34987%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c55b7ef31ef0b56312d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-03-e8858f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-03&amp;severity=medium&amp;id=682b7ba5d3ddd8cef2e8858f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-03-f123df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f123df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4344-cwe-352-cross-site-request-forgery-c-24241770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4344%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20paultgoodchild%20Shield%20Security%20%E2%80%93%20Smart%20Bot%20Blocking%20%26%20Intrusion%20Prevention%20Security&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5564f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-02-f12fb1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35645-improper-neutralization-of-input-du-f2f2eaf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35645%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20M%20A%20Vinoth%20Kumar%20Random%20Banner&amp;severity=null&amp;id=69cd7437e6bfc5ba1def652d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35646-improper-neutralization-of-input-du-19e68eb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35646%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Erez%20Hadas-Sonnenschein%20Smartarget%20Message%20Bar&amp;severity=null&amp;id=69cd7437e6bfc5ba1def6531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3820-cwe-89-improper-neutralization-of-sp-352b127d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3820%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=critical&amp;id=699f6c9db7ef31ef0b566de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3200-cwe-89-improper-neutralization-of-sp-c26ba4c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3200%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tomdever%20wpForo%20Forum&amp;severity=critical&amp;id=699f6c8db7ef31ef0b566305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5348-cwe-98-improper-control-of-filename--3ddf9e7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5348%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Elements%20For%20Elementor&amp;severity=high&amp;id=699f6be6b7ef31ef0b55bec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3821-cwe-862-missing-authorization-in-wpd-5b0d5e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3821%3A%20CWE-862%20Missing%20Authorization%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=high&amp;id=699f6c9db7ef31ef0b566ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4958-cwe-862-missing-authorization-in-wpe-7020cfdc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4958%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=high&amp;id=699f6b99b7ef31ef0b557154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2295-cwe-79-improper-neutralization-of-in-8718ad5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2295%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20Contact%20Form%20Manager&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1324-cwe-862-missing-authorization-in-qqw-f1430fc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1324%3A%20CWE-862%20Missing%20Authorization%20in%20qqworld%20QQWorld%20Auto%20Save%20Images&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2506-cwe-79-improper-neutralization-of-in-2564a012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20popupbuilder%20Popup%20Builder%20%E2%80%93%20Create%20highly%20converting%2C%20mobile%20friendly%20marketing%20popups.&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4087-cwe-79-improper-neutralization-of-in-a54964a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4087%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b82b7ef31ef0b556120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5501-cwe-79-improper-neutralization-of-in-41c043d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5501%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20divisupreme%20Supreme%20Modules%20Lite%20%E2%80%93%20Divi%20Theme%2C%20Extra%20Theme%20and%20Divi%20Builder&amp;severity=medium&amp;id=699f6be9b7ef31ef0b55c0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4342-cwe-79-improper-neutralization-of-in-c7cac123</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4342%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5564f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3564-cwe-98-improper-control-of-filename--4965bed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3564%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=high&amp;id=699f6c95b7ef31ef0b5667e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3565-cwe-79-improper-neutralization-of-in-59c57c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3565%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vanderwijk%20Content%20Blocks%20(Custom%20Post%20Widget)&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4711-cwe-79-improper-neutralization-of-in-3e8acc71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4711%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20connekthq%20WordPress%20Infinite%20Scroll%20%E2%80%93%20Ajax%20Load%20More&amp;severity=medium&amp;id=699f6b95b7ef31ef0b556ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2933-cwe-79-improper-neutralization-of-in-b65f8ab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2933%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20godaddy%20Page%20Builder%20Gutenberg%20Blocks%20%E2%80%93%20CoBlocks&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-06-01-f130af</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-06-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f130af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36845-na-38730784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36845%3A%20n%2Fa&amp;severity=medium&amp;id=6909214cfe7723195e054536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36844-na-6dbfcbc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36844%3A%20n%2Fa&amp;severity=high&amp;id=6909214cfe7723195e054532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5564-buffer-copy-without-checking-size-of-7e6172a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5564%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=68379c5b182aa0cae261d62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29824-vulnerability-in-ivanti-epm-d30ef49b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29824%3A%20Vulnerability%20in%20Ivanti%20EPM&amp;severity=critical&amp;id=68f7d9b2247d717aace26a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35142-cwe-250-execution-with-unnecessary--e95dd750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35142%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=high&amp;id=69092624fe7723195e0b47bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35140-cwe-295-improper-certificate-valida-f020ddeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35140%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=high&amp;id=69092624fe7723195e0b47b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23692-cwe-1336-improper-neutralization-of-ba51f7e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23692%3A%20CWE-1336%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Rejetto%20HTTP%20File%20Server&amp;severity=critical&amp;id=68f7d9b2247d717aace269bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5041-cwe-79-improper-neutralization-of-in-135cf3fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4160-cwe-79-improper-neutralization-of-in-ff68e0eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codename065%20Download%20Manager&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5347-cwe-79-improper-neutralization-of-in-f9b3c4e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55bebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5427-cwe-79-improper-neutralization-of-in-e0283f5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5427%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themewinter%20WPCafe%20%E2%80%93%20Online%20Food%20Ordering%2C%20Restaurant%20Menu%2C%20Delivery%2C%20and%20Reservations%20for%20WooCommerce&amp;severity=medium&amp;id=699f6be7b7ef31ef0b55bf8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4379-cwe-79-improper-neutralization-of-in-ea7235a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4376-cwe-79-improper-neutralization-of-in-6241929f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4205-cwe-862-missing-authorization-in-lea-2118fa3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4205%3A%20CWE-862%20Missing%20Authorization%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b84b7ef31ef0b55627f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2793-cwe-79-improper-neutralization-of-in-8b769467</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2793%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpfeedback%20Visual%20Website%20Collaboration%2C%20Feedback%20%26%20Project%20Management%20%E2%80%93%20Atarim&amp;severity=high&amp;id=699f6db7b7ef31ef0b58b402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5418-cwe-79-improper-neutralization-of-in-60a7fc0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5418%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20For%20Elementor&amp;severity=medium&amp;id=699f6be6b7ef31ef0b55bede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5345-cwe-98-improper-control-of-filename--cdc52272</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5345%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20thenahidul%20Responsive%20Owl%20Carousel%20for%20Elementor&amp;severity=high&amp;id=699f6be5b7ef31ef0b55be4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36843-na-75eb9f07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36843%3A%20n%2Fa&amp;severity=high&amp;id=6909214cfe7723195e05452d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-31-f122db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f122db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-advisory-active-exploitation-of-check-point-remote-access-vpn-vulnerability-cve-2024-24919-f0c2da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Advisory%3A%20Active%20exploitation%20of%20Check%20Point%20Remote%20Access%20VPN%20vulnerability%20(CVE-2024-24919)&amp;severity=low&amp;id=682acdbebbaf20d303f0c2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1298-cwe-369-divide-by-zero-in-tianocore--d6d9e793</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1298%3A%20CWE-369%20Divide%20By%20Zero%20in%20TianoCore%20edk2&amp;severity=medium&amp;id=690904b000ff46172d4a0e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35431-n-a-in-n-a-aec169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35431%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36959-vulnerability-in-linux-linux-bddda8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36958-vulnerability-in-linux-linux-be27c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe27c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36957-vulnerability-in-linux-linux-bddda0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36956-vulnerability-in-linux-linux-be27c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe27c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36955-vulnerability-in-linux-linux-be27bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe27bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36954-vulnerability-in-linux-linux-bddd7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36953-vulnerability-in-linux-linux-be279a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe279a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36952-vulnerability-in-linux-linux-be2792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36951-vulnerability-in-linux-linux-be278a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe278a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36950-vulnerability-in-linux-linux-aeb096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36949-vulnerability-in-linux-linux-be2782</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36948-vulnerability-in-linux-linux-be277a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe277a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36947-vulnerability-in-linux-linux-be2776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36946-vulnerability-in-linux-linux-be2769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36945-vulnerability-in-linux-linux-be275c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe275c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36944-vulnerability-in-linux-linux-be2758</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36943-vulnerability-in-linux-linux-be2754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36941-vulnerability-in-linux-linux-aeb094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36940-vulnerability-in-linux-linux-be272d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe272d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36939-vulnerability-in-linux-linux-be2725</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36938-vulnerability-in-linux-linux-be2721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36937-vulnerability-in-linux-linux-be271d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe271d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36936-vulnerability-in-linux-linux-bddd74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36935-vulnerability-in-linux-linux-be271b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe271b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36934-vulnerability-in-linux-linux-be2703</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36933-vulnerability-in-linux-linux-be26fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe26fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36932-vulnerability-in-linux-linux-be26f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36931-vulnerability-in-linux-linux-be26f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36930-vulnerability-in-linux-linux-be26eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36929-vulnerability-in-linux-linux-be26ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36928-vulnerability-in-linux-linux-bddd6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36927-vulnerability-in-linux-linux-bddd64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36926-vulnerability-in-linux-linux-bd8e1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36925-vulnerability-in-linux-linux-be26ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe26ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36924-vulnerability-in-linux-linux-be26c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36923-vulnerability-in-linux-linux-be26c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36923&amp;severity=null&amp;id=682d9828c4522896dcbe26c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36922-vulnerability-in-linux-linux-be26c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36921-vulnerability-in-linux-linux-be26b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe26b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36920-vulnerability-in-linux-linux-be26ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe26ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36919-vulnerability-in-linux-linux-be26a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe26a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36918-vulnerability-in-linux-linux-be2698</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36917-vulnerability-in-linux-linux-be2690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36916-vulnerability-in-linux-linux-aeb04e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36915-vulnerability-in-linux-linux-be2673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36914-vulnerability-in-linux-linux-be266f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe266f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36913-vulnerability-in-linux-linux-be266b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe266b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36912-vulnerability-in-linux-linux-be265a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe265a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36911-vulnerability-in-linux-linux-be2652</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36910-vulnerability-in-linux-linux-be264a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe264a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36909-vulnerability-in-linux-linux-be2646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36908-vulnerability-in-linux-linux-be2644</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36907-vulnerability-in-linux-linux-bddd60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36907&amp;severity=low&amp;id=682d9821c4522896dcbddd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36906-vulnerability-in-linux-linux-be2633</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36905-vulnerability-in-linux-linux-be262b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe262b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36904-vulnerability-in-linux-linux-be2614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36903-vulnerability-in-linux-linux-bddd4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36902-vulnerability-in-linux-linux-be2610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36901-vulnerability-in-linux-linux-be260c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe260c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36900-vulnerability-in-linux-linux-be2608</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36899-vulnerability-in-linux-linux-be25f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe25f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36898-vulnerability-in-linux-linux-be25f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe25f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36897-vulnerability-in-linux-linux-be25ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe25ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36896-vulnerability-in-linux-linux-be25e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9828c4522896dcbe25e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36895-vulnerability-in-linux-linux-be25d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe25d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36894-vulnerability-in-linux-linux-be25d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe25d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36893-vulnerability-in-linux-linux-bddd47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36892-vulnerability-in-linux-linux-be25b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe25b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36891-vulnerability-in-linux-linux-be25af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe25af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36890-vulnerability-in-linux-linux-be25ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe25ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36889-vulnerability-in-linux-linux-be259e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36888-vulnerability-in-linux-linux-be2591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36887-vulnerability-in-linux-linux-be258b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe258b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36886-vulnerability-in-linux-linux-be2587</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36884-vulnerability-in-linux-linux-be2581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36883-vulnerability-in-linux-linux-bddd38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddd38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36882-vulnerability-in-linux-linux-be257d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe257d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36881-vulnerability-in-linux-linux-bddd2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36880-vulnerability-in-linux-linux-be2579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36033-vulnerability-in-linux-linux-be2522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36032-vulnerability-in-linux-linux-be2505</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9828c4522896dcbe2505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36031-vulnerability-in-linux-linux-be2501</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9828c4522896dcbe2501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52882-vulnerability-in-linux-linux-be7811</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36030-vulnerability-in-linux-linux-be24fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe24fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36029-vulnerability-in-linux-linux-be24f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe24f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36028-vulnerability-in-linux-linux-bddcf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36027-vulnerability-in-linux-linux-be24f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe24f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36026-vulnerability-in-linux-linux-be24f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe24f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36025-vulnerability-in-linux-linux-be24ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe24ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36024-vulnerability-in-linux-linux-be24e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe24e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36023-vulnerability-in-linux-linux-be24e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe24e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36022-vulnerability-in-linux-linux-be24e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe24e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36021-vulnerability-in-linux-linux-be24b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe24b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36020-vulnerability-in-linux-linux-bddcf2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36019-vulnerability-in-linux-linux-be24aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe24aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36018-vulnerability-in-linux-linux-be24a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe24a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36017-vulnerability-in-linux-linux-be249a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe249a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5326-cwe-862-missing-authorization-in-wpx-bc6e15c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5326%3A%20CWE-862%20Missing%20Authorization%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20and%20WordPress%20Blog%20Plugin%20%E2%80%93%20PostX&amp;severity=high&amp;id=699f6be5b7ef31ef0b55be1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3583-cwe-80-improper-neutralization-of-sc-1f80f3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3583%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20fornyhucker%20Simple%20Like%20Page%20Plugin&amp;severity=medium&amp;id=699f6c95b7ef31ef0b566867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4668-cwe-79-improper-neutralization-of-in-c3286f07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4668%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20celomitan%20Gum%20Elementor%20Addon&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4355-cwe-862-missing-authorization-in-smi-b1717690</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4355%3A%20CWE-862%20Missing%20Authorization%20in%20sminozzi%20Block%20Bad%20Bots%20and%20Stop%20Bad%20Bots%20Crawlers%20and%20Spiders%20and%20Anti%20Spam%20Protection&amp;severity=medium&amp;id=699f6b88b7ef31ef0b556588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4427-cwe-862-missing-authorization-in-com-501ed6fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4427%3A%20CWE-862%20Missing%20Authorization%20in%20comparisonslider%20Comparison%20Slider&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b556883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2089-cwe-79-improper-neutralization-of-in-2bece0d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2089%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20doublesharp%20Remote%20Content%20Shortcode&amp;severity=medium&amp;id=699f6da4b7ef31ef0b589c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4426-cwe-352-cross-site-request-forgery-c-3e135cbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4426%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20comparisonslider%20Comparison%20Slider&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b55687f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2657-cwe-87-improper-neutralization-of-al-19101149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2657%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20khl32%20Font%20Farsi&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4422-cwe-862-missing-authorization-in-com-8fe560fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4422%3A%20CWE-862%20Missing%20Authorization%20in%20comparisonslider%20Comparison%20Slider&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b55687b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5073-cwe-79-improper-neutralization-of-in-b7a1e044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5327-cwe-79-improper-neutralization-of-in-82c9da7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6be5b7ef31ef0b55be24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5341-cwe-79-improper-neutralization-of-in-68e8c244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6be5b7ef31ef0b55be39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5207-cwe-89-improper-neutralization-of-sp-4b3c52bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5207%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpexpertsio%20Post%20SMTP%20%E2%80%93%20The%20WordPress%20SMTP%20Plugin%20with%20Email%20Logs%20and%20Mobile%20App%20for%20Email%20Failure%20Notifications&amp;severity=high&amp;id=699f6be0b7ef31ef0b55baca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3277-cwe-862-missing-authorization-in-yum-7da7d651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3277%3A%20CWE-862%20Missing%20Authorization%20in%20yumpu%20Yumpu%20ePaper%20publishing&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3946-cwe-79-improper-neutralization-of-in-f3e9b679</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20delower186%20WP%20To%20Do&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3947-cwe-352-cross-site-request-forgery-c-3bf22dc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3947%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20delower186%20WP%20To%20Do&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4356-cwe-79-improper-neutralization-of-in-332efccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4356%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fernandobt%20List%20categories&amp;severity=medium&amp;id=699f6b88b7ef31ef0b55658c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3945-cwe-352-cross-site-request-forgery-c-b0705845</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3945%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20delower186%20WP%20To%20Do&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b56702f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3943-cwe-352-cross-site-request-forgery-c-b3b66d1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3943%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20delower186%20WP%20To%20Do&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4218-cwe-352-cross-site-request-forgery-c-b6fa007d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4218%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20perrinalexandre05%20AffiEasy&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2253-cwe-79-improper-neutralization-of-in-e2f6f02e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2253%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uapp%20Testimonial%20Carousel%20For%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3269-cwe-285-improper-authorization-in-wp-0be8e13e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3269%3A%20CWE-285%20Improper%20Authorization%20in%20wpchill%20Download%20Monitor&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3063-cwe-80-improper-neutralization-of-sc-38802d66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3063%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbean%20WPB%20Elementor%20Addons&amp;severity=medium&amp;id=699f6c8bb7ef31ef0b5661a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3190-cwe-79-improper-neutralization-of-in-8aa01bd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3190%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6c8db7ef31ef0b5662f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5223-cwe-80-improper-neutralization-of-sc-e7550b0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5223%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpxpo%20Post%20Grid%20Gutenberg%20Blocks%20and%20WordPress%20Blog%20Plugin%20%E2%80%93%20PostX&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3726-cwe-79-improper-neutralization-of-in-c2975df8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vinod-dalvi%20Login%20Logout%20Register%20Menu&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-30-f124f6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f124f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36016-vulnerability-in-linux-linux-be2496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4358-cwe-290-authentication-bypass-by-spo-255ed397</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4358%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Progress%20Software%20Corporation%20Telerik%20Report%20Server&amp;severity=critical&amp;id=68f7d9b5247d717aace26b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5039-cwe-79-improper-neutralization-of-in-a5d43636</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52881-vulnerability-in-linux-linux-bdd875</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3412-cwe-434-unrestricted-upload-of-file--1f6d3f05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3412%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20renehermi%20WP%20STAGING%20WordPress%20Backup%20Plugin%20%E2%80%93%20Migration%20Backup%20Restore&amp;severity=critical&amp;id=699f6c91b7ef31ef0b5665d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36015-vulnerability-in-linux-linux-bddce5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5086-cwe-79-improper-neutralization-of-in-b236a3d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5086%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Essential%20Addons%20Essential%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36014-vulnerability-in-linux-linux-be2492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4419-cwe-79-improper-neutralization-of-in-e7b5d546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pjaudiomv%20Fetch%20JFT&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b55681d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4611-cwe-703-improper-check-or-handling-o-6111fc1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4611%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20scottopolis%20AppPresser%20%E2%80%93%20Mobile%20App%20Framework&amp;severity=high&amp;id=699f6b91b7ef31ef0b556bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0434-cwe-284-improper-access-control-in-m-b9307647</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0434%3A%20CWE-284%20Improper%20Access%20Control%20in%20magepeopleteam%20WordPress%20Tour%20%26%20Travel%20Booking%20Plugin%20for%20WooCommerce%20%E2%80%93%20WpTravelly&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5150-cwe-288-authentication-bypass-using--f6244e06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5150%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20glboy%20Login%20with%20phone%20number&amp;severity=critical&amp;id=699f6bdeb7ef31ef0b55ba03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5204-cwe-288-authentication-bypass-using--3f13ca3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5204%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20boomdevs%20Swiss%20Toolkit%20For%20WP&amp;severity=high&amp;id=699f6be0b7ef31ef0b55babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36427-na-6f15e272</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36427%3A%20n%2Fa&amp;severity=high&amp;id=699f6c5db7ef31ef0b5634f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-29-f12c93</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35226-cwe-94-improper-control-of-generati-e0521a76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35226%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20smarty-php%20smarty&amp;severity=high&amp;id=69092624fe7723195e0b47c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22641-na-7036e976</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22641%3A%20n%2Fa&amp;severity=high&amp;id=690904b000ff46172d4a0e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28060-na-in-na-5f322b77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28060%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93f182aa0cae2b73048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28061-na-in-na-3eac3d48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93f182aa0cae2b7304a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5274-type-confusion-in-google-chrome-e9b0da83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5274%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9b6247d717aace26c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3657-improper-input-validation-in-red-hat-e954e366</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3657%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20Directory%20Server%2011.5%20E4S%20for%20RHEL%208&amp;severity=high&amp;id=6909214efe7723195e05456a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2199-improper-input-validation-e8913ab4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2199%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=69092149fe7723195e054423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5411-cwe-78-improper-neutralization-of-sp-75f27a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5411%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ORing%20IAP-420&amp;severity=high&amp;id=68e6339d143ec9919d6f2813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-28-f128fb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f128fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-27-f123d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f123d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-05-26-84dcf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-05-26&amp;severity=medium&amp;id=682b68eed14de609c884dcf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-26-f12589</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30056-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-microsoft-edge-chromium-based-beb77f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30056%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d9837c4522896dcbeb77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4045-cwe-79-improper-neutralization-of-in-f6feeb60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optinmonster%20Popup%20Builder%20by%20OptinMonster%20%E2%80%93%20WordPress%20Popups%20for%20Optins%2C%20Email%20Newsletters%20and%20Lead%20Generation&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5218-cwe-80-improper-neutralization-of-sc-f8379fad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5218%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20designextreme%20Reviews%20and%20Rating%20%E2%80%93%20Google%20Reviews&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55badb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4858-cwe-862-missing-authorization-in-uap-9dec0d60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4858%3A%20CWE-862%20Missing%20Authorization%20in%20uapp%20Testimonial%20Carousel%20For%20Elementor&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5229-cwe-79-improper-neutralization-of-in-f0ed9b70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5229%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nicheaddons%20Primary%20Addon%20for%20Elementor&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5220-cwe-80-improper-neutralization-of-sc-8ff561e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5220%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nicdark%20ND%20Shortcodes&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bb56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-25-75f06b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-25&amp;severity=medium&amp;id=682c7abfe3e6de8ceb75f06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-25-f12977</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52880-vulnerability-in-linux-linux-be780d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe780d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47572-vulnerability-in-linux-linux-be94d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe94d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47571-vulnerability-in-linux-linux-be94ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe94ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47570-vulnerability-in-linux-linux-be94ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe94ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47569-vulnerability-in-linux-linux-be94c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe94c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47568-vulnerability-in-linux-linux-be94ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe94ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47567-vulnerability-in-linux-linux-bde17c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde17c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47566-vulnerability-in-linux-linux-be94b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe94b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47565-vulnerability-in-linux-linux-be94a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe94a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47564-vulnerability-in-linux-linux-be94a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe94a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47563-vulnerability-in-linux-linux-be949d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe949d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47562-vulnerability-in-linux-linux-be9499</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47561-vulnerability-in-linux-linux-be946f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe946f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47560-vulnerability-in-linux-linux-be9469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47559-vulnerability-in-linux-linux-be9465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47558-vulnerability-in-linux-linux-be945d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47558%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe945d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47557-vulnerability-in-linux-linux-be9459</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47557%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47556-vulnerability-in-linux-linux-be9455</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47556%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47555-vulnerability-in-linux-linux-bde178</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47555%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47554-vulnerability-in-linux-linux-be9448</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47554%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47553-vulnerability-in-linux-linux-bde15e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47553%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47552-vulnerability-in-linux-linux-be9439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47552%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47551-vulnerability-in-linux-linux-aeaffd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47551%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47550-vulnerability-in-linux-linux-aebf56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47550%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47549-vulnerability-in-linux-linux-be9431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47549%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47548-vulnerability-in-linux-linux-be9429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47548%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9833c4522896dcbe9429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47547-vulnerability-in-linux-linux-be940e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47547%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe940e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47546-vulnerability-in-linux-linux-bde156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47546%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47544-vulnerability-in-linux-linux-be940a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47544%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe940a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47542-vulnerability-in-linux-linux-be9406</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47542%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47541-vulnerability-in-linux-linux-be9402</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47541%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47540-vulnerability-in-linux-linux-be93fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47540%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47539-vulnerability-in-linux-linux-be93fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47539%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47538-vulnerability-in-linux-linux-bde14e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47538%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47537-vulnerability-in-linux-linux-be93f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47537%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47536-vulnerability-in-linux-linux-be93e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47536%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe93e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47535-vulnerability-in-linux-linux-be93e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47535%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47534-vulnerability-in-linux-linux-be93d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47534%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47533-vulnerability-in-linux-linux-be93b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47533%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe93b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47532-vulnerability-in-linux-linux-be93b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47532%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47531-vulnerability-in-linux-linux-be93af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47531%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47530-vulnerability-in-linux-linux-be93ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47530%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47529-vulnerability-in-linux-linux-be93a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47529%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47528-vulnerability-in-linux-linux-be93a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47528%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe93a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47527-vulnerability-in-linux-linux-be939d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47527%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe939d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47526-vulnerability-in-linux-linux-be9399</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47526%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47525-vulnerability-in-linux-linux-be9395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47525%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47524-vulnerability-in-linux-linux-be9388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47524%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47523-vulnerability-in-linux-linux-be9368</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47523%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47522-vulnerability-in-linux-linux-be9360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47522%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47521-vulnerability-in-linux-linux-be9358</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47521%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47520-vulnerability-in-linux-linux-be9350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47520%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47519-vulnerability-in-linux-linux-be9348</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47519%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47518-vulnerability-in-linux-linux-be9344</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47518%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47517-vulnerability-in-linux-linux-be9340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47517%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47516-vulnerability-in-linux-linux-be932f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47516%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe932f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47515-vulnerability-in-linux-linux-bde146</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47515%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47514-vulnerability-in-linux-linux-be9327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47514%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47513-vulnerability-in-linux-linux-bde12b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47513%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47512-vulnerability-in-linux-linux-be9323</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47512%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47511-vulnerability-in-linux-linux-be9301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47511%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47510-vulnerability-in-linux-linux-be92fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47510%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe92fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47509-vulnerability-in-linux-linux-be92f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47509%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47508-vulnerability-in-linux-linux-be92f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47508%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47507-vulnerability-in-linux-linux-bde11a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47507%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47506-vulnerability-in-linux-linux-aebf54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47506%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47505-vulnerability-in-linux-linux-be92f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47505%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe92f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47504-vulnerability-in-linux-linux-be92ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47504%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47503-vulnerability-in-linux-linux-be92e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47503%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47502-vulnerability-in-linux-linux-be92e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47502%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47501-vulnerability-in-linux-linux-be92d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47501%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47500-vulnerability-in-linux-linux-be92ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47500%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe92ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47499-vulnerability-in-linux-linux-be92b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47499%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49575-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-flexense-vx-search-enterprise-bfbbd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49575%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20VX%20Search%20Enterprise&amp;severity=high&amp;id=682dbb0ac4522896dcbfbbd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49572-cwe-79-improper-neutralization-of-input-during-web-page-generation-xss-or-cross-site-scripting-in-flexense-vx-search-enterprise-bfbbd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20Flexense%20VX%20Search%20Enterprise&amp;severity=high&amp;id=682dbb0ac4522896dcbfbbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4455-cwe-79-improper-neutralization-of-in-acd690d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4455%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yithemes%20YITH%20WooCommerce%20Ajax%20Search&amp;severity=high&amp;id=699f6b8eb7ef31ef0b5569de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4037-cwe-94-improper-control-of-generatio-09949ffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4037%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20opajaap%20WP%20Photo%20Album%20Plus&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4366-cwe-79-improper-neutralization-of-in-f9fbf6ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4484-cwe-79-improper-neutralization-of-in-0c6c1cba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4484%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1332-cwe-434-unrestricted-upload-of-file--ac0b6d60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1332%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20brainstormforce%20Custom%20Fonts%20%E2%80%93%20Host%20Your%20Fonts%20Locally&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1376-cwe-284-improper-access-control-in-b-9135423f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1376%3A%20CWE-284%20Improper%20Access%20Control%20in%20bastho%20Event%20post&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5060-cwe-79-improper-neutralization-of-in-4f96d9b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5060%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kapasias%20LottieFiles%20%E2%80%93%20JSON%20Based%20Animation%20Lottie%20%26%20Bodymovin%20for%20Elementor&amp;severity=medium&amp;id=699f6bdcb7ef31ef0b55b864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4485-cwe-79-improper-neutralization-of-in-df693750</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4485%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0893-cwe-862-missing-authorization-in-vbe-f1b9bcae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0893%3A%20CWE-862%20Missing%20Authorization%20in%20vberkel%20Schema%20App%20Structured%20Data&amp;severity=medium&amp;id=699f6de7b7ef31ef0b590739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5142-cwe-79-improper-neutralization-of-in-7a8825ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20&apos;Cross-site%20Scripting&apos;)%20in%20M-Files%20Corporation%20Hubshare&amp;severity=high&amp;id=699c2930be58cf853b7275ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0867-cwe-94-improper-control-of-generatio-1a02ce9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0867%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sudar%20Email%20Log&amp;severity=high&amp;id=699f6de6b7ef31ef0b590652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1134-cwe-79-improper-neutralization-of-in-1d4b36fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1134%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rainbowgeek%20SEOPress%20%E2%80%93%20On-site%20SEO&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3718-cwe-79-improper-neutralization-of-in-f20c2855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3718%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3557-cwe-80-improper-neutralization-of-sc-bee8705d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3557%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2784-cwe-79-improper-neutralization-of-in-47999f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2784%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2618-cwe-87-improper-neutralization-of-al-9971277b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2618%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4544-cwe-288-authentication-bypass-using--c286a505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4544%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Genetech%20Solutions%20Pie%20Register%20-%20Social%20Sites%20Login%20(Add%20on)&amp;severity=critical&amp;id=699f6b90b7ef31ef0b556b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5205-cwe-79-improper-neutralization-of-in-0e1a3180</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5205%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20naa986%20Videojs%20HTML5%20Player&amp;severity=medium&amp;id=699f6be0b7ef31ef0b55bac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4409-cwe-352-cross-site-request-forgery-c-6f10e555</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4409%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20justin_k%20WP-ViperGB&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b556807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-24-f1301e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-24&amp;severity=medium&amp;id=682acdc2bbaf20d303f1301e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5247-cwe-434-unrestricted-upload-of-file--f93aace5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5247%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20NETGEAR%20ProSAFE%20Network%20Management%20System&amp;severity=high&amp;id=699f6be2b7ef31ef0b55bc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5246-cwe-1395-dependency-on-vulnerable-th-eee937a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5246%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20NETGEAR%20ProSAFE%20Network%20Management%20System&amp;severity=high&amp;id=699f6be2b7ef31ef0b55bc1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5245-cwe-1392-use-of-default-credentials--aaccafc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5245%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20NETGEAR%20ProSAFE%20Network%20Management%20System&amp;severity=high&amp;id=699f6be2b7ef31ef0b55bc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5244-cwe-656-reliance-on-security-through-23e3cd9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5244%3A%20CWE-656%3A%20Reliance%20on%20Security%20Through%20Obscurity%20in%20TP-Link%20Omada%20ER605&amp;severity=medium&amp;id=699f6be2b7ef31ef0b55bc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5243-cwe-120-buffer-copy-without-checking-99f6f4c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5243%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20TP-Link%20Omada%20ER605&amp;severity=high&amp;id=699f6be2b7ef31ef0b55bc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5242-cwe-121-stack-based-buffer-overflow--5a89ce24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5242%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Omada%20ER605&amp;severity=high&amp;id=699f6be0b7ef31ef0b55bb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5228-cwe-122-heap-based-buffer-overflow-i-d59a75c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5228%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20TP-Link%20Omada%20ER605&amp;severity=high&amp;id=699f6be0b7ef31ef0b55bb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5227-cwe-78-improper-neutralization-of-sp-1f1d88fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5227%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Omada%20ER605&amp;severity=high&amp;id=699f6be0b7ef31ef0b55bb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5299-cwe-749-exposed-dangerous-method-or--9647bd32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5299%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20D-Link%20D-View&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5298-cwe-749-exposed-dangerous-method-or--96c5fdb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5298%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20D-Link%20D-View&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5297-cwe-78-improper-neutralization-of-sp-a1eda9fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5297%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20D-Link%20D-View&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5296-cwe-321-use-of-hard-coded-cryptograp-91c53c39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5296%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20D-Link%20D-View&amp;severity=critical&amp;id=699f6be3b7ef31ef0b55bd56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5295-cwe-78-improper-neutralization-of-sp-190cf941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5295%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20D-Link%20G416&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5294-cwe-401-missing-release-of-memory-af-20ff524e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5294%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20D-Link%20DIR-3040&amp;severity=medium&amp;id=699f6be3b7ef31ef0b55bd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5293-cwe-121-stack-based-buffer-overflow--ce55538d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5293%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20D-Link%20DIR-2640&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5292-cwe-427-uncontrolled-search-path-ele-18a67875</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5292%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20D-Link%20Network%20Assistant&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5291-cwe-78-improper-neutralization-of-sp-9151e449</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5291%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20D-Link%20DIR-2150&amp;severity=high&amp;id=699f6be3b7ef31ef0b55bd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4365-cwe-79-improper-neutralization-of-in-c69404a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4365%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5565ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5084-cwe-434-unrestricted-upload-of-file--321e0fb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5084%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20hashthemes%20Hash%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=critical&amp;id=699f6bdcb7ef31ef0b55b873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5085-cwe-502-deserialization-of-untrusted-6630ed4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5085%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20hashthemes%20Hash%20Form%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder&amp;severity=high&amp;id=699f6bdeb7ef31ef0b55b95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4471-cwe-502-deserialization-of-untrusted-b112e6ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4471%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20xpro%20140%2B%20Widgets%20%7C%20Best%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=high&amp;id=699f6b8eb7ef31ef0b556a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1803-cwe-285-improper-authorization-in-wp-b3a39e14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1803%3A%20CWE-285%20Improper%20Authorization%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4378-cwe-79-improper-neutralization-of-in-297415cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1814-cwe-79-improper-neutralization-of-in-13efb2ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1814%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3997-cwe-79-improper-neutralization-of-in-d252c01f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b56715d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1815-cwe-79-improper-neutralization-of-in-df3770f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1815%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4779-cwe-89-improper-neutralization-of-sp-1acd375f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4779%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=high&amp;id=699f6b95b7ef31ef0b556eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2861-cwe-79-improper-neutralization-of-in-113917ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4706-cwe-79-improper-neutralization-of-in-e0488689</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpo365%20WordPress%20%2B%20Microsoft%20Office%20365%20%2F%20Azure%20AD%20%7C%20LOGIN&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36013-vulnerability-in-linux-linux-be2483</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36012-vulnerability-in-linux-linux-be247b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe247b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36011-vulnerability-in-linux-linux-bd8e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d981ac4522896dcbd8e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2038-cwe-259-use-of-hard-coded-password-i-2ac1b332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2038%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20wpfeedback%20Visual%20Website%20Collaboration%2C%20Feedback%20%26%20Project%20Management%20%E2%80%93%20Atarim&amp;severity=high&amp;id=699f6da3b7ef31ef0b589b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4043-cwe-79-improper-neutralization-of-in-36cfae23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4043%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Ultimate%20Post%20Grid&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3648-cwe-80-improper-neutralization-of-sc-8e002f73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3648%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20sharethis%20ShareThis%20Share%20Buttons&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5177-cwe-79-improper-neutralization-of-in-30c7079b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5177%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hashthemes%20Hash%20Elements&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55ba24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3711-cwe-862-missing-authorization-in-the-37f47490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3711%3A%20CWE-862%20Missing%20Authorization%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4347-cwe-22-improper-limitation-of-a-path-740bd252</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4347%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20emrevona%20WP%20Fastest%20Cache&amp;severity=high&amp;id=699f6b88b7ef31ef0b556508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3626-cwe-862-missing-authorization-in-ice-bace5e4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3626%3A%20CWE-862%20Missing%20Authorization%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6c97b7ef31ef0b5669fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4431-cwe-79-improper-neutralization-of-in-3e2bb5ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4431%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b55688c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4895-cwe-79-improper-neutralization-of-in-85170af4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=medium&amp;id=699f6b98b7ef31ef0b55709e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4978-cwe-506-embedded-malicious-code-in-j-76959ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4978%3A%20CWE-506%20Embedded%20Malicious%20Code%20in%20Justice%20AV%20Solutions%20Viewer&amp;severity=high&amp;id=68f7d9b5247d717aace26bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3201-cwe-79-improper-neutralization-of-in-48ef2ab9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3201%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20legalweb%20WP%20DSGVO%20Tools%20(GDPR)&amp;severity=medium&amp;id=699f6c8db7ef31ef0b566309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3065-cwe-79-improper-neutralization-of-in-51a91def</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3065%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohsinrasool%20PayPal%20Pay%20Now%2C%20Buy%20Now%2C%20Donation%20and%20Cart%20Buttons%20Shortcode&amp;severity=medium&amp;id=699f6c8bb7ef31ef0b5661a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4783-cwe-80-improper-neutralization-of-sc-9afd24a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4783%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20baden03%20jQuery%20T(-)%20Countdown%20Widget&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1855-cwe-918-server-side-request-forgery--97af6da1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1855%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20themewinter%20WPCafe%20%E2%80%93%20Online%20Food%20Ordering%2C%20Restaurant%20Menu%2C%20Delivery%2C%20and%20Reservations%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4486-cwe-79-improper-neutralization-of-in-bd07f832</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4486%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rafiul17%20Awesome%20Contact%20Form7%20for%20Elementor&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-23-f12f85</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4454-cwe-59-improper-link-resolution-befo-f659fb6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4454%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20WithSecure%20Elements&amp;severity=high&amp;id=699f6b8eb7ef31ef0b5569db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3926-cwe-79-improper-neutralization-of-in-4eb807d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3926%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4261-cwe-94-improper-control-of-generatio-a1f00fe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4261%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20themehunk%20Responsive%20Contact%20Form%20Builder%20%26%20Lead%20Generation%20Plugin&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36010-vulnerability-in-linux-linux-be2475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9828c4522896dcbe2475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5193-crlf-injection-in-ritlabs-tinyweb-se-9fbb7826</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5193%3A%20CRLF%20Injection%20in%20Ritlabs%20TinyWeb%20Server&amp;severity=medium&amp;id=695c0f8a3839e441758c3639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4262-cwe-79-improper-neutralization-of-in-4e7d734d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=high&amp;id=699f6b84b7ef31ef0b55631b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4362-cwe-79-improper-neutralization-of-in-dd9d8520</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4362%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6b88b7ef31ef0b55659d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2036-cwe-862-missing-authorization-in-far-d36cfc48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2036%3A%20CWE-862%20Missing%20Authorization%20in%20farhannoor%20ApplyOnline%20%E2%80%93%20Application%20Form%20Builder%20and%20Manager&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3495-cwe-89-improper-neutralization-of-sp-73a8cd76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20trustyplugins%20Country%20State%20City%20Dropdown%20CF7&amp;severity=critical&amp;id=699f6c93b7ef31ef0b56667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4896-cwe-79-improper-neutralization-of-in-5fc1e6f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbean%20WPB%20Elementor%20Addons&amp;severity=medium&amp;id=699f6b98b7ef31ef0b5570a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47498-vulnerability-in-linux-linux-be92a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47498%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47497-vulnerability-in-linux-linux-be92a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47497%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe92a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47496-vulnerability-in-linux-linux-be92a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47496%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe92a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47495-vulnerability-in-linux-linux-be929c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47495%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe929c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47494-vulnerability-in-linux-linux-be9298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47494%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47493-vulnerability-in-linux-linux-be9294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47493%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47492-vulnerability-in-linux-linux-be9290</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47492%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47491-vulnerability-in-linux-linux-be928c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47491%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe928c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47490-vulnerability-in-linux-linux-be9288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47490%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47489-vulnerability-in-linux-linux-be926a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47489%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe926a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47486-vulnerability-in-linux-linux-be9266</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47486%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47485-vulnerability-in-linux-linux-be9262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47485%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47484-vulnerability-in-linux-linux-be925e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47484%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe925e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47483-vulnerability-in-linux-linux-be925a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47483%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe925a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47482-vulnerability-in-linux-linux-be9256</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47482%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47481-vulnerability-in-linux-linux-bde112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47481%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47480-vulnerability-in-linux-linux-be9252</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47480%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47479-vulnerability-in-linux-linux-bde10a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47478-vulnerability-in-linux-linux-be924e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47478%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe924e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47477-vulnerability-in-linux-linux-be924a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47477%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe924a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47476-vulnerability-in-linux-linux-be9246</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47475-vulnerability-in-linux-linux-be922c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47475%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe922c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47474-vulnerability-in-linux-linux-be9228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47474%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5147-cwe-22-improper-limitation-of-a-path-5bc0b166</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5147%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wpzoom%20WPZOOM%20Addons%20for%20Elementor%20(Templates%2C%20Widgets)&amp;severity=critical&amp;id=699f6bdeb7ef31ef0b55b987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3666-cwe-87-improper-neutralization-of-al-a476b9fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3666%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20wpopal%20Opal%20Estate%20Pro%20%E2%80%93%20Property%20Management%20and%20Submission&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2953-cwe-79-improper-neutralization-of-in-afc4531a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2953%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theluckywp%20LuckyWP%20Table%20of%20Contents&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4157-cwe-502-deserialization-of-untrusted-5cad5739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4157%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=high&amp;id=699f6b82b7ef31ef0b5561c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2119-cwe-80-improper-neutralization-of-sc-a1c4b49b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2119%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20theluckywp%20LuckyWP%20Table%20of%20Contents&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0632-cwe-80-improper-neutralization-of-sc-5dfde31c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0632%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20juangirini%20Automatic%20Translator%20with%20Google%20Translate&amp;severity=medium&amp;id=699f6de1b7ef31ef0b5900fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2163-cwe-79-improper-neutralization-of-in-aadffdde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2163%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20njba%20Ninja%20Beaver%20Add-ons%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3671-cwe-79-improper-neutralization-of-in-f21e779a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3671%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baden03%20Print-O-Matic&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3198-cwe-79-improper-neutralization-of-in-1673d4d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3198%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20spyrosvl%20WP%20Font%20Awesome%20Share%20Icons&amp;severity=medium&amp;id=699f6c8db7ef31ef0b5662fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1762-cwe-79-improper-neutralization-of-in-dc9c74c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1762%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2088-cwe-202-exposure-of-sensitive-data-t-96d9a600</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2088%3A%20CWE-202%20Exposure%20of%20Sensitive%20Data%20Through%20Data%20Queries%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=high&amp;id=699f6da4b7ef31ef0b589c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3927-cwe-424-improper-protection-of-alter-84534111</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3927%3A%20CWE-424%20Improper%20Protection%20of%20Alternate%20Path%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b56700f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1446-cwe-352-cross-site-request-forgery-c-06581bec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1446%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nextscripts%20NextScripts%3A%20Social%20Networks%20Auto-Poster&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3663-cwe-862-missing-authorization-in-ric-35ecf8b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3663%3A%20CWE-862%20Missing%20Authorization%20in%20rico-macchi%20WP%20Scraper&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47473-vulnerability-in-linux-linux-be9224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47473%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47471-vulnerability-in-linux-linux-be9220</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47471%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47470-vulnerability-in-linux-linux-be921c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47470%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe921c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47468-vulnerability-in-linux-linux-be9218</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47468%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47467-vulnerability-in-linux-linux-be9214</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47467%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47466-vulnerability-in-linux-linux-be9210</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47466%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47465-vulnerability-in-linux-linux-be91ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47465%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47464-vulnerability-in-linux-linux-be91f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47464%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47463-vulnerability-in-linux-linux-be91e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47463%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47462-vulnerability-in-linux-linux-be91de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47462%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe91de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47461-vulnerability-in-linux-linux-be91da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47461%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47460-vulnerability-in-linux-linux-bde104</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47460%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47459-vulnerability-in-linux-linux-be91d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47459%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47458-vulnerability-in-linux-linux-be91d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47458%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47457-vulnerability-in-linux-linux-be91ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47457%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47456-vulnerability-in-linux-linux-be91bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47456%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe91bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47455-vulnerability-in-linux-linux-bde0f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47455%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47454-vulnerability-in-linux-linux-bde0eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47454%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47453-vulnerability-in-linux-linux-be91b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47453%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe91b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47452-vulnerability-in-linux-linux-bde0e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47452%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47451-vulnerability-in-linux-linux-be91a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47451%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe91a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47450-vulnerability-in-linux-linux-be919e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47450%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe919e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47449-vulnerability-in-linux-linux-be9189</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47449%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47448-vulnerability-in-linux-linux-be9185</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47448%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47447-vulnerability-in-linux-linux-be9181</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47447%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47446-vulnerability-in-linux-linux-be917d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47446%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe917d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47445-vulnerability-in-linux-linux-be9179</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47445%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47444-vulnerability-in-linux-linux-be9175</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47444%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47443-vulnerability-in-linux-linux-be9171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47443%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47442-vulnerability-in-linux-linux-be916d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47442%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe916d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47441-vulnerability-in-linux-linux-be915c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47441%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe915c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47440-vulnerability-in-linux-linux-be9154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47440%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9833c4522896dcbe9154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47439-vulnerability-in-linux-linux-be9138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47439%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47438-vulnerability-in-linux-linux-be9132</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47438%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47437-vulnerability-in-linux-linux-be912e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47437%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe912e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47436-vulnerability-in-linux-linux-bde0df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47436%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47435-vulnerability-in-linux-linux-aebf52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47435%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47434-vulnerability-in-linux-linux-be912a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47434%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe912a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47433-vulnerability-in-linux-linux-be9126</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47433%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3066-cwe-79-improper-neutralization-of-in-df339242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3066%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aruphash%20Elegant%20Addons%20for%20elementor&amp;severity=medium&amp;id=699f6c8bb7ef31ef0b5661ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4443-cwe-89-improper-neutralization-of-sp-000952b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4443%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20strategy11team%20Business%20Directory%20Plugin%20%E2%80%93%20Easy%20Listing%20Directories%20for%20WordPress&amp;severity=critical&amp;id=699f6b8eb7ef31ef0b55694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5092-cwe-79-improper-neutralization-of-in-1e6989c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aruphash%20Elegant%20Addons%20for%20elementor&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b97d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3611-cwe-79-improper-neutralization-of-in-95c12d0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20daveshine%20Toolbar%20Extras%20for%20Elementor%20%26%20More%20%E2%80%93%20WordPress%20Admin%20Bar%20Enhanced&amp;severity=medium&amp;id=699f6c97b7ef31ef0b5669f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4971-cwe-79-improper-neutralization-of-in-6fffadc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4971%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6b99b7ef31ef0b557158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4980-cwe-79-improper-neutralization-of-in-8ca65257</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4980%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=medium&amp;id=699f6b99b7ef31ef0b55715c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0453-cwe-284-improper-access-control-in-q-4440107d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0453%3A%20CWE-284%20Improper%20Access%20Control%20in%20quantumcloud%20AI%20ChatBot%20for%20WordPress%20%E2%80%93%20WPBot&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0452-cwe-284-improper-access-control-in-q-d578fc80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0452%3A%20CWE-284%20Improper%20Access%20Control%20in%20quantumcloud%20AI%20ChatBot%20for%20WordPress%20%E2%80%93%20WPBot&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0451-cwe-284-improper-access-control-in-q-da22b3f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0451%3A%20CWE-284%20Improper%20Access%20Control%20in%20quantumcloud%20AI%20ChatBot%20for%20WordPress%20%E2%80%93%20WPBot&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-22-f13163</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3518-cwe-89-improper-neutralization-of-sp-69a5d7e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3518%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=high&amp;id=699f6c93b7ef31ef0b5666a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3519-cwe-87-improper-neutralization-of-al-6d662b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3519%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=699f6c93b7ef31ef0b5666f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21683-rce-remote-code-execution-in-atlassian-confluence-data-center-bd6d0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21683%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=682d9816c4522896dcbd6d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34240-na-35f2da15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34240%3A%20n%2Fa&amp;severity=medium&amp;id=68efd53e346ce4cfc57b3a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52879-vulnerability-in-linux-linux-be780b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe780b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52878-vulnerability-in-linux-linux-be77fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52877-vulnerability-in-linux-linux-be77f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52876-vulnerability-in-linux-linux-be77f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52875-vulnerability-in-linux-linux-be77f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52874-vulnerability-in-linux-linux-be77ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe77ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52873-vulnerability-in-linux-linux-be77c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52872-vulnerability-in-linux-linux-bdd871</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52871-vulnerability-in-linux-linux-be77be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52870-vulnerability-in-linux-linux-be77b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52869-vulnerability-in-linux-linux-be77ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe77ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52868-vulnerability-in-linux-linux-be77aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe77aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52867-vulnerability-in-linux-linux-be77a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe77a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52866-vulnerability-in-linux-linux-be7797</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52865-vulnerability-in-linux-linux-be778f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe778f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52864-vulnerability-in-linux-linux-be778b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe778b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52863-vulnerability-in-linux-linux-be7787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52862-vulnerability-in-linux-linux-be7763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52861-vulnerability-in-linux-linux-be775f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe775f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52860-vulnerability-in-linux-linux-be775b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe775b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52859-vulnerability-in-linux-linux-be7757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52858-vulnerability-in-linux-linux-be7753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52857-vulnerability-in-linux-linux-bdd86d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52856-vulnerability-in-linux-linux-be774f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe774f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52855-vulnerability-in-linux-linux-be774b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe774b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52854-vulnerability-in-linux-linux-bdd869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52853-vulnerability-in-linux-linux-be7747</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52852-vulnerability-in-linux-linux-bdd865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52851-vulnerability-in-linux-linux-be7736</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52850-vulnerability-in-linux-linux-be772e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe772e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52849-vulnerability-in-linux-linux-bdd861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52848-vulnerability-in-linux-linux-bdd85d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52847-vulnerability-in-linux-linux-be770e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe770e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52846-vulnerability-in-linux-linux-be770a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe770a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52845-vulnerability-in-linux-linux-be7706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52844-vulnerability-in-linux-linux-be7702</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52843-vulnerability-in-linux-linux-be76fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe76fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52842-vulnerability-in-linux-linux-be76fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe76fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52841-vulnerability-in-linux-linux-be76f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52840-vulnerability-in-linux-linux-be76f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe76f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52839-vulnerability-in-linux-linux-be76ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52838-vulnerability-in-linux-linux-bdd843</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52837-vulnerability-in-linux-linux-be76ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe76ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52836-vulnerability-in-linux-linux-be76c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52835-vulnerability-in-linux-linux-be76c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52834-vulnerability-in-linux-linux-be76be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52833-vulnerability-in-linux-linux-be76ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52832-vulnerability-in-linux-linux-be76b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9830c4522896dcbe76b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52831-vulnerability-in-linux-linux-be76b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe76b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52829-vulnerability-in-linux-linux-be76b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52828-vulnerability-in-linux-linux-be76a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe76a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52827-vulnerability-in-linux-linux-be769f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe769f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52826-vulnerability-in-linux-linux-be769b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe769b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52825-vulnerability-in-linux-linux-aeb039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52821-vulnerability-in-linux-linux-be7680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52819-vulnerability-in-linux-linux-be767c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe767c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52818-vulnerability-in-linux-linux-be767a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe767a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52817-vulnerability-in-linux-linux-be7669</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52816-vulnerability-in-linux-linux-be7661</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52815-vulnerability-in-linux-linux-be7659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52814-vulnerability-in-linux-linux-be7653</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52813-vulnerability-in-linux-linux-be764d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe764d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52812-vulnerability-in-linux-linux-be7649</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52811-vulnerability-in-linux-linux-be7645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52810-vulnerability-in-linux-linux-be761c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe761c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52809-vulnerability-in-linux-linux-be7618</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52808-vulnerability-in-linux-linux-be7614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52807-vulnerability-in-linux-linux-be7610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52806-vulnerability-in-linux-linux-be760c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe760c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52805-vulnerability-in-linux-linux-be7606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52804-vulnerability-in-linux-linux-be7602</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52803-vulnerability-in-linux-linux-be75fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe75fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52801-vulnerability-in-linux-linux-be75fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9830c4522896dcbe75fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52800-vulnerability-in-linux-linux-be75f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe75f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52799-vulnerability-in-linux-linux-be75db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe75db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52798-vulnerability-in-linux-linux-be75ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe75ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52797-vulnerability-in-linux-linux-be75bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe75bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52796-vulnerability-in-linux-linux-be75b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe75b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52795-vulnerability-in-linux-linux-be75af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe75af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52794-vulnerability-in-linux-linux-be75a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe75a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52792-vulnerability-in-linux-linux-be759f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe759f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52791-vulnerability-in-linux-linux-be7597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52790-vulnerability-in-linux-linux-be7593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52789-vulnerability-in-linux-linux-be758f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe758f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52788-vulnerability-in-linux-linux-be756d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe756d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52787-vulnerability-in-linux-linux-be7569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52786-vulnerability-in-linux-linux-be755c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe755c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52785-vulnerability-in-linux-linux-be7558</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52784-vulnerability-in-linux-linux-be7554</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52783-vulnerability-in-linux-linux-be7550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52782-vulnerability-in-linux-linux-be754c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe754c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52781-vulnerability-in-linux-linux-bdd83f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52780-vulnerability-in-linux-linux-be7548</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52779-vulnerability-in-linux-linux-be7544</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52778-vulnerability-in-linux-linux-be7540</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52777-vulnerability-in-linux-linux-be7527</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52776-vulnerability-in-linux-linux-be7514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52775-vulnerability-in-linux-linux-be750e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe750e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52774-vulnerability-in-linux-linux-be750a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe750a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52773-vulnerability-in-linux-linux-be7506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52772-vulnerability-in-linux-linux-be74f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52771-vulnerability-in-linux-linux-be74f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe74f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52770-vulnerability-in-linux-linux-bdd832</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52769-vulnerability-in-linux-linux-be74f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52768-vulnerability-in-linux-linux-bdd82e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52767-vulnerability-in-linux-linux-be74ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52766-vulnerability-in-linux-linux-be74e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52765-vulnerability-in-linux-linux-be74ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe74ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52764-vulnerability-in-linux-linux-be74c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe74c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52763-vulnerability-in-linux-linux-be74b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52762-vulnerability-in-linux-linux-be74b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52761-vulnerability-in-linux-linux-be74b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52760-vulnerability-in-linux-linux-be74ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52757-vulnerability-in-linux-linux-be74a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52755-vulnerability-in-linux-linux-be74a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe74a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52754-vulnerability-in-linux-linux-be7498</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52753-vulnerability-in-linux-linux-be7494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52752-vulnerability-in-linux-linux-bd8e51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d981ac4522896dcbd8e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52751-vulnerability-in-linux-linux-be7471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52750-vulnerability-in-linux-linux-be746d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe746d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52749-vulnerability-in-linux-linux-aebfb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52748-vulnerability-in-linux-linux-be7469</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48710-vulnerability-in-linux-linux-be5eed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47432-vulnerability-in-linux-linux-be9122</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47432%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52747-vulnerability-in-linux-linux-be7458</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52746-vulnerability-in-linux-linux-be7450</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9830c4522896dcbe7450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52745-vulnerability-in-linux-linux-bdd82a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52744-vulnerability-in-linux-linux-be744a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52743-vulnerability-in-linux-linux-be7446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52742-vulnerability-in-linux-linux-be7435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52741-vulnerability-in-linux-linux-be742d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe742d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52740-vulnerability-in-linux-linux-be7425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52739-vulnerability-in-linux-linux-bdd826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52738-vulnerability-in-linux-linux-bdd822</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52737-vulnerability-in-linux-linux-be73ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52737%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52736-vulnerability-in-linux-linux-be73f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52736%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52735-vulnerability-in-linux-linux-be73f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9830c4522896dcbe73f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52733-vulnerability-in-linux-linux-be73f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe73f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52732-vulnerability-in-linux-linux-aebfaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52731-vulnerability-in-linux-linux-be73e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52730-vulnerability-in-linux-linux-be73e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52708-vulnerability-in-linux-linux-be73dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52707-vulnerability-in-linux-linux-be73d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe73d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52706-vulnerability-in-linux-linux-be73d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52705-vulnerability-in-linux-linux-be73ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52704-vulnerability-in-linux-linux-be73b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52703-vulnerability-in-linux-linux-be73b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9830c4522896dcbe73b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52702-vulnerability-in-linux-linux-be73a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe73a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52701-vulnerability-in-linux-linux-be7398</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52700-vulnerability-in-linux-linux-be7390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48709-vulnerability-in-linux-linux-be5ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48708-vulnerability-in-linux-linux-be5ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48707-vulnerability-in-linux-linux-be5ee1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48706-vulnerability-in-linux-linux-be5edd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47431-vulnerability-in-linux-linux-be911e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47431%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe911e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47430-vulnerability-in-linux-linux-be911a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47430%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe911a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47429-vulnerability-in-linux-linux-be9114</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47429%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47428-vulnerability-in-linux-linux-be9110</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47428%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47427-vulnerability-in-linux-linux-be90f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47427%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe90f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47426-vulnerability-in-linux-linux-be90f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47426%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47425-vulnerability-in-linux-linux-be90ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47425%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47424-vulnerability-in-linux-linux-be90e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47424%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47423-vulnerability-in-linux-linux-be90e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47423%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47422-vulnerability-in-linux-linux-be90de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47422%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47421-vulnerability-in-linux-linux-be90dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47421%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe90dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47420-vulnerability-in-linux-linux-be90cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47420%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47419-vulnerability-in-linux-linux-be90c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47419%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47418-vulnerability-in-linux-linux-be90bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47418%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47417-vulnerability-in-linux-linux-be90a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47417%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47416-vulnerability-in-linux-linux-be90a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47416%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe90a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47415-vulnerability-in-linux-linux-be909e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47415%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe909e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47414-vulnerability-in-linux-linux-be908f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47414%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe908f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47413-vulnerability-in-linux-linux-be9087</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47413%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47412-vulnerability-in-linux-linux-be9078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47412%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47410-vulnerability-in-linux-linux-be9070</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47410%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47409-vulnerability-in-linux-linux-aebf50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47409%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47408-vulnerability-in-linux-linux-be9068</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47408%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47407-vulnerability-in-linux-linux-be9060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47407%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47406-vulnerability-in-linux-linux-be9058</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47406%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47405-vulnerability-in-linux-linux-be9036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47405%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47404-vulnerability-in-linux-linux-be9030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47404%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47403-vulnerability-in-linux-linux-be902a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47403%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe902a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47402-vulnerability-in-linux-linux-be9019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47402%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe9019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47401-vulnerability-in-linux-linux-be900f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47401%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe900f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47400-vulnerability-in-linux-linux-be9007</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47400%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe9007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47399-vulnerability-in-linux-linux-be8fff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47399%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47398-vulnerability-in-linux-linux-be8ff7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47398%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47397-vulnerability-in-linux-linux-be8fdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47397%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47396-vulnerability-in-linux-linux-be8fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47396%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47395-vulnerability-in-linux-linux-be8fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47395%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47394-vulnerability-in-linux-linux-be8fbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47394%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47393-vulnerability-in-linux-linux-be8fb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47393%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47392-vulnerability-in-linux-linux-be8fb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47392%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47391-vulnerability-in-linux-linux-be8fb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47391%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47390-vulnerability-in-linux-linux-be8fac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47390%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47389-vulnerability-in-linux-linux-be8fa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47389%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47388-vulnerability-in-linux-linux-bde0db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47388%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47387-vulnerability-in-linux-linux-be8fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47387%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47386-vulnerability-in-linux-linux-be8fa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47386%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47385-vulnerability-in-linux-linux-be8f9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47385%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47384-vulnerability-in-linux-linux-be8f7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47384%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47383-vulnerability-in-linux-linux-be8f78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47383%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47382-vulnerability-in-linux-linux-bde0b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47382%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47381-vulnerability-in-linux-linux-be8f6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47381%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47380-vulnerability-in-linux-linux-be8f67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47380%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47379-vulnerability-in-linux-linux-aebf4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47379%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47378-vulnerability-in-linux-linux-be8f63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47378%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9833c4522896dcbe8f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47376-vulnerability-in-linux-linux-aebf4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47376%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47375-vulnerability-in-linux-linux-be8f5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47375%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47374-vulnerability-in-linux-linux-aebf3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47374%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47373-vulnerability-in-linux-linux-be8f59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47373%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47372-vulnerability-in-linux-linux-aebf3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47372%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47371-vulnerability-in-linux-linux-be8f55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47371%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47370-vulnerability-in-linux-linux-be8f51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47370%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47369-vulnerability-in-linux-linux-bd8e17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47369%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47368-vulnerability-in-linux-linux-be8f4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47368%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47367-vulnerability-in-linux-linux-be8f3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47367%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47366-vulnerability-in-linux-linux-be8f36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47366%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47365-vulnerability-in-linux-linux-be8f32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47365%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47364-vulnerability-in-linux-linux-be8f2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47364%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47363-vulnerability-in-linux-linux-be8f28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47363%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47362-vulnerability-in-linux-linux-be8f24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47362%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9833c4522896dcbe8f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47361-vulnerability-in-linux-linux-be8f20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47361%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9833c4522896dcbe8f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47360-vulnerability-in-linux-linux-bde0b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47360%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47359-vulnerability-in-linux-linux-bea58b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47359%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36788-vulnerability-in-linux-linux-bea624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47358-vulnerability-in-linux-linux-bea57a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47358%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47357-vulnerability-in-linux-linux-bea576</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47357%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47356-vulnerability-in-linux-linux-bea572</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47356%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47355-vulnerability-in-linux-linux-bea56e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47355%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47354-vulnerability-in-linux-linux-bea561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47354%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9835c4522896dcbea561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47353-vulnerability-in-linux-linux-bea542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47353%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47352-vulnerability-in-linux-linux-bea53c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47352%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47351-vulnerability-in-linux-linux-bea53a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47351%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47350-vulnerability-in-linux-linux-bea536</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47350%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47349-vulnerability-in-linux-linux-bea532</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47349%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47348-vulnerability-in-linux-linux-bea52e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47348%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9835c4522896dcbea52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47347-vulnerability-in-linux-linux-bea51f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47347%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47346-vulnerability-in-linux-linux-bea517</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47346%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47345-vulnerability-in-linux-linux-bea513</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47345%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47344-vulnerability-in-linux-linux-bea50f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47344%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47343-vulnerability-in-linux-linux-bea4e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47343%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47342-vulnerability-in-linux-linux-bea4df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47342%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47341-vulnerability-in-linux-linux-bde0a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47341%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47340-vulnerability-in-linux-linux-bea4d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47340%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47339-vulnerability-in-linux-linux-bea4d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47339%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47338-vulnerability-in-linux-linux-bea4d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47338%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47337-vulnerability-in-linux-linux-bea4c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47337%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47336-vulnerability-in-linux-linux-bea4bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47336%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47335-vulnerability-in-linux-linux-bea4b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47335%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47334-vulnerability-in-linux-linux-bea4a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47334%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47333-vulnerability-in-linux-linux-bea4a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47333%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47332-vulnerability-in-linux-linux-bea482</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47332%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47331-vulnerability-in-linux-linux-bea47e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47331%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47330-vulnerability-in-linux-linux-bea47a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47330%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47329-vulnerability-in-linux-linux-bea476</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47329%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47328-vulnerability-in-linux-linux-bea474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47328%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47327-vulnerability-in-linux-linux-bea465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47327%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47325-vulnerability-in-linux-linux-bea45f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47325%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47324-vulnerability-in-linux-linux-bea45b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47324%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47323-vulnerability-in-linux-linux-bea44a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47323%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47322-vulnerability-in-linux-linux-bea442</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47322%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47321-vulnerability-in-linux-linux-bea425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47321%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47320-vulnerability-in-linux-linux-bea414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47320%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47319-vulnerability-in-linux-linux-bea40c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47319%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47318-vulnerability-in-linux-linux-bea404</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47318%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47317-vulnerability-in-linux-linux-bea3fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47317%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47316-vulnerability-in-linux-linux-bea3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47316%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47315-vulnerability-in-linux-linux-bea3f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47315%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47314-vulnerability-in-linux-linux-bea3e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47314%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47313-vulnerability-in-linux-linux-bea3e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47313%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47312-vulnerability-in-linux-linux-bea3dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47312%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47311-vulnerability-in-linux-linux-bea3b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47311%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47310-vulnerability-in-linux-linux-bea3b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47310%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47309-vulnerability-in-linux-linux-bea3b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47309%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47308-vulnerability-in-linux-linux-bea3ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47308%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47307-vulnerability-in-linux-linux-bea3a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47307%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47306-vulnerability-in-linux-linux-bea3a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47306%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47305-vulnerability-in-linux-linux-bea3a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47305%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47304-vulnerability-in-linux-linux-bea39d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47304%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47303-vulnerability-in-linux-linux-bea399</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47303%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47302-vulnerability-in-linux-linux-bea395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47302%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47301-vulnerability-in-linux-linux-bea371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47301%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47300-vulnerability-in-linux-linux-bea360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47300%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47299-vulnerability-in-linux-linux-bea358</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47299%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47298-vulnerability-in-linux-linux-bea350</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47298%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47297-vulnerability-in-linux-linux-bea34a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47297%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47296-vulnerability-in-linux-linux-bea346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47296%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47295-vulnerability-in-linux-linux-bea342</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47295%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47294-vulnerability-in-linux-linux-bde0a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47294%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47293-vulnerability-in-linux-linux-bea33e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47293%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47292-vulnerability-in-linux-linux-bea32f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47292%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47291-vulnerability-in-linux-linux-bea327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47291%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47290-vulnerability-in-linux-linux-bea310</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47290%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47289-vulnerability-in-linux-linux-bea30c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47289%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea30c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47288-vulnerability-in-linux-linux-bea306</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47288%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47287-vulnerability-in-linux-linux-bea302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47287%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47286-vulnerability-in-linux-linux-bea2f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47286%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47284-vulnerability-in-linux-linux-bea2ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47284%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47283-vulnerability-in-linux-linux-bea2e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47283%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47282-vulnerability-in-linux-linux-bea2e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47282%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47281-vulnerability-in-linux-linux-bea2d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47281%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47280-vulnerability-in-linux-linux-bea2ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47280%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea2ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47279-vulnerability-in-linux-linux-bea2b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47279%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47278-vulnerability-in-linux-linux-bea2af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47278%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47277-vulnerability-in-linux-linux-bea2ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47277%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea2ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47276-vulnerability-in-linux-linux-bea2a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47276%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47275-vulnerability-in-linux-linux-bea298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47275%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47274-vulnerability-in-linux-linux-bea290</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47274%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9835c4522896dcbea290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47273-vulnerability-in-linux-linux-bea288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47273%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47272-vulnerability-in-linux-linux-bea284</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47272%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47271-vulnerability-in-linux-linux-bea280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47271%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47270-vulnerability-in-linux-linux-bea27c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47270%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47269-vulnerability-in-linux-linux-bea25c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47269%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47268-vulnerability-in-linux-linux-bea24b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47268%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47267-vulnerability-in-linux-linux-aebf3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47267%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47266-vulnerability-in-linux-linux-bde09c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47266%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47265-vulnerability-in-linux-linux-bea243</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47265%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47264-vulnerability-in-linux-linux-bea23b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47264%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47263-vulnerability-in-linux-linux-bea231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47263%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47262-vulnerability-in-linux-linux-bea229</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47262%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47261-vulnerability-in-linux-linux-bea223</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47261%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47260-vulnerability-in-linux-linux-bea21f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47260%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea21f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47259-vulnerability-in-linux-linux-bea212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47259%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47258-vulnerability-in-linux-linux-bea20e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47258%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47257-vulnerability-in-linux-linux-bea1ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47257%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47256-vulnerability-in-linux-linux-bea1e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47256%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47255-vulnerability-in-linux-linux-bea1de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47255%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47254-vulnerability-in-linux-linux-aebf39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47254%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47253-vulnerability-in-linux-linux-bea1da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47253%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47252-vulnerability-in-linux-linux-bea1d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47252%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47251-vulnerability-in-linux-linux-bea1d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47251%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47250-vulnerability-in-linux-linux-bea1ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47250%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47249-vulnerability-in-linux-linux-bea1ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47249%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47248-vulnerability-in-linux-linux-bea1bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47248%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47247-vulnerability-in-linux-linux-bea1b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47247%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47246-vulnerability-in-linux-linux-bea19e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47246%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47245-vulnerability-in-linux-linux-bea19a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47245%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea19a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47244-vulnerability-in-linux-linux-bea198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47244%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47243-vulnerability-in-linux-linux-bea187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47243%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47242-vulnerability-in-linux-linux-bd8e13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47242%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47241-vulnerability-in-linux-linux-bea17f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47241%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47240-vulnerability-in-linux-linux-bea177</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47240%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47239-vulnerability-in-linux-linux-bea16f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47239%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea16f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47238-vulnerability-in-linux-linux-bd8db4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47238%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47237-vulnerability-in-linux-linux-bea169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47237%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47236-vulnerability-in-linux-linux-bea165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47236%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47235-vulnerability-in-linux-linux-bea14b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47235%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47234-vulnerability-in-linux-linux-bea130</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47234%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47233-vulnerability-in-linux-linux-bea12c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47233%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47232-vulnerability-in-linux-linux-bea124</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47232%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47231-vulnerability-in-linux-linux-bea11c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47231%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47230-vulnerability-in-linux-linux-bea116</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47230%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47229-vulnerability-in-linux-linux-bea112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47229%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47228-vulnerability-in-linux-linux-bea103</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47228%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47227-vulnerability-in-linux-linux-bea0f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47227%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47226-vulnerability-in-linux-linux-bea0f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47226%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea0f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47225-vulnerability-in-linux-linux-bea0f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47225%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47224-vulnerability-in-linux-linux-bea0cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47224%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47223-vulnerability-in-linux-linux-bea0cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47223%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47222-vulnerability-in-linux-linux-bea0c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47222%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47221-vulnerability-in-linux-linux-bea0c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47221%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4452-cwe-79-improper-neutralization-of-in-cb11ebbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4452%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b556975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3268-cwe-862-missing-authorization-in-ema-21b2efb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3268%3A%20CWE-862%20Missing%20Authorization%20in%20emarket-design%20YouTube%20Video%20Gallery%20by%20YouTube%20Showcase%20%E2%80%93%20Video%20Gallery%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4619-cwe-79-improper-neutralization-of-in-2b9a0c64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4619%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4361-cwe-79-improper-neutralization-of-in-739999bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4361%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=medium&amp;id=699f6b88b7ef31ef0b556598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4876-cwe-79-improper-neutralization-of-in-620c405d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4876%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b98b7ef31ef0b557090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4553-cwe-79-improper-neutralization-of-in-6619b064</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4553%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4695-cwe-79-improper-neutralization-of-in-61e5efaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4695%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4700-cwe-79-improper-neutralization-of-in-098d47ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptb%20WP%20Table%20Builder%20%E2%80%93%20WordPress%20Table%20Plugin&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556df8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3345-cwe-79-improper-neutralization-of-in-c67ebc9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3345%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4566-cwe-862-missing-authorization-in-dev-d454e3b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4566%3A%20CWE-862%20Missing%20Authorization%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=high&amp;id=699f6b91b7ef31ef0b556bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4875-cwe-862-missing-authorization-in-dev-fbd53ea0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4875%3A%20CWE-862%20Missing%20Authorization%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b97b7ef31ef0b557015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4442-cwe-22-improper-limitation-of-a-path-dc7e9c3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4442%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wordpresschef%20Salon%20booking%20system&amp;severity=critical&amp;id=699f6b8eb7ef31ef0b55694a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4470-cwe-79-improper-neutralization-of-in-1ba7d76a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4470%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b5569fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4710-cwe-79-improper-neutralization-of-in-78b73bfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4710%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SevenSpark%20UberMenu&amp;severity=medium&amp;id=699f6b95b7ef31ef0b556ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4943-cwe-79-improper-neutralization-of-in-6b3a7bce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4943%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=699f6b99b7ef31ef0b557150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3155-cwe-80-improper-neutralization-of-sc-4c6736e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3155%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20pickplugins%20Post%20Grid%2C%20Form%20Maker%2C%20Popup%20Maker%2C%20WooCommerce%20Blocks%2C%20Post%20Blocks%2C%20Post%20Carousel%20%E2%80%93%20Combo%20Blocks&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b566276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36039-na-fb8305ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36039%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c5bb7ef31ef0b56347a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35061-na-1b0eed27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35061%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35060-na-74504e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35060%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35059-na-7049a38c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35059%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35058-na-2c89abe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35058%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35057-na-bf73fcf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35057%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35056-na-6e6a50b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35056%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c56b7ef31ef0b5631d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-21-f13001</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f13001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0401-cwe-78-improper-neutralization-of-sp-8cc74884</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0401%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ASUS%20ExpertWiFi&amp;severity=high&amp;id=6921b03d8e780dcd644facaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36009-vulnerability-in-linux-linux-bddce1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36008-vulnerability-in-linux-linux-be2464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36007-vulnerability-in-linux-linux-be2447</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36006-vulnerability-in-linux-linux-be2443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36005-vulnerability-in-linux-linux-be243f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe243f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36004-vulnerability-in-linux-linux-be243b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe243b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36003-vulnerability-in-linux-linux-be2437</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36002-vulnerability-in-linux-linux-bddcdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddcdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36001-vulnerability-in-linux-linux-be2428</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36000-vulnerability-in-linux-linux-bddcd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddcd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35999-vulnerability-in-linux-linux-be2420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35998-vulnerability-in-linux-linux-be241c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe241c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35997-vulnerability-in-linux-linux-be2418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35996-vulnerability-in-linux-linux-be2407</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35995-vulnerability-in-linux-linux-be23e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe23e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35994-vulnerability-in-linux-linux-be23e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35993-vulnerability-in-linux-linux-be23e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35992-vulnerability-in-linux-linux-be23d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35991-vulnerability-in-linux-linux-be23c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35990-vulnerability-in-linux-linux-be23c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe23c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35989-vulnerability-in-linux-linux-be23bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35988-vulnerability-in-linux-linux-be23b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35987-vulnerability-in-linux-linux-be23a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35986-vulnerability-in-linux-linux-be23a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe23a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35985-vulnerability-in-linux-linux-be2387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35984-vulnerability-in-linux-linux-be2383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35983-vulnerability-in-linux-linux-bddcd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddcd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35982-vulnerability-in-linux-linux-be2376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35981-vulnerability-in-linux-linux-be2370</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35980-vulnerability-in-linux-linux-be236c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe236c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35979-vulnerability-in-linux-linux-be2368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35978-vulnerability-in-linux-linux-be2364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35977-vulnerability-in-linux-linux-be2360</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35976-vulnerability-in-linux-linux-be2351</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35975-vulnerability-in-linux-linux-be2349</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35974-vulnerability-in-linux-linux-be232c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe232c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35973-vulnerability-in-linux-linux-bddcd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddcd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35972-vulnerability-in-linux-linux-be2328</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35971-vulnerability-in-linux-linux-be2324</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35970-vulnerability-in-linux-linux-be2320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35969-vulnerability-in-linux-linux-be2311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35968-vulnerability-in-linux-linux-be230d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe230d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35967-vulnerability-in-linux-linux-be2309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35966-vulnerability-in-linux-linux-be22f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe22f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35965-vulnerability-in-linux-linux-be22f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe22f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35964-vulnerability-in-linux-linux-be22e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe22e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35963-vulnerability-in-linux-linux-be22cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe22cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35962-vulnerability-in-linux-linux-be22c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe22c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35961-vulnerability-in-linux-linux-be22c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe22c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35960-vulnerability-in-linux-linux-be22a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d9828c4522896dcbe22a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35959-vulnerability-in-linux-linux-be22a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe22a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35958-vulnerability-in-linux-linux-be2299</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35957-vulnerability-in-linux-linux-be2291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35956-vulnerability-in-linux-linux-bddcb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35955-vulnerability-in-linux-linux-bddcb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35954-vulnerability-in-linux-linux-bddcb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35953-vulnerability-in-linux-linux-be2289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35952-vulnerability-in-linux-linux-be2283</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35951-vulnerability-in-linux-linux-be227f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe227f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35950-vulnerability-in-linux-linux-be2259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35949-vulnerability-in-linux-linux-be2253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35948-vulnerability-in-linux-linux-be2242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-20-f1281a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f1281a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35947-vulnerability-in-linux-linux-be223a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35946-vulnerability-in-linux-linux-be2234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35945-vulnerability-in-linux-linux-aebfed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35944-vulnerability-in-linux-linux-be2230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35943-vulnerability-in-linux-linux-be222c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe222c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35942-vulnerability-in-linux-linux-be221f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35940-vulnerability-in-linux-linux-be221b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe221b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35939-vulnerability-in-linux-linux-be2217</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35938-vulnerability-in-linux-linux-be21fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe21fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35937-vulnerability-in-linux-linux-aebfeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35936-vulnerability-in-linux-linux-be21fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe21fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35935-vulnerability-in-linux-linux-be21f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe21f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35934-vulnerability-in-linux-linux-be21f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe21f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35933-vulnerability-in-linux-linux-be21ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe21ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35932-vulnerability-in-linux-linux-be21ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe21ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35931-vulnerability-in-linux-linux-be21dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe21dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35930-vulnerability-in-linux-linux-aebfe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35929-vulnerability-in-linux-linux-be21d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe21d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35927-vulnerability-in-linux-linux-aebfe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35926-vulnerability-in-linux-linux-be21cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe21cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35925-vulnerability-in-linux-linux-be21c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe21c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35924-vulnerability-in-linux-linux-aebfda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35922-vulnerability-in-linux-linux-be2196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2196</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35921-vulnerability-in-linux-linux-be2192</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35920-vulnerability-in-linux-linux-be218e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe218e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35919-vulnerability-in-linux-linux-be218a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe218a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52699-vulnerability-in-linux-linux-be738c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe738c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35917-vulnerability-in-linux-linux-be2186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35916-vulnerability-in-linux-linux-be2182</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35915-vulnerability-in-linux-linux-be217e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe217e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35914-vulnerability-in-linux-linux-be217a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe217a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35913-vulnerability-in-linux-linux-be2176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35912-vulnerability-in-linux-linux-be2172</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35911-vulnerability-in-linux-linux-bddcac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35910-vulnerability-in-linux-linux-be2157</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35909-vulnerability-in-linux-linux-be2153</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35908-vulnerability-in-linux-linux-be2144</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2144</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35907-vulnerability-in-linux-linux-be2140</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35905-vulnerability-in-linux-linux-bddca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35904-vulnerability-in-linux-linux-be212f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35903-vulnerability-in-linux-linux-be2127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35902-vulnerability-in-linux-linux-bddca6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35901-vulnerability-in-linux-linux-be211f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe211f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35900-vulnerability-in-linux-linux-be2117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe2117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35899-vulnerability-in-linux-linux-be2111</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe2111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35898-vulnerability-in-linux-linux-be210d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9828c4522896dcbe210d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35897-vulnerability-in-linux-linux-be20ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35896-vulnerability-in-linux-linux-be20e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35895-vulnerability-in-linux-linux-be20e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35894-vulnerability-in-linux-linux-be20e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35893-vulnerability-in-linux-linux-be20dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9828c4522896dcbe20dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35892-vulnerability-in-linux-linux-bddc97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35891-vulnerability-in-linux-linux-be37b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35890-vulnerability-in-linux-linux-bd738a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9817c4522896dcbd738a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35889-vulnerability-in-linux-linux-be37ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35888-vulnerability-in-linux-linux-bd8de1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35887-vulnerability-in-linux-linux-be37ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35886-vulnerability-in-linux-linux-be37aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35885-vulnerability-in-linux-linux-be379d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe379d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35884-vulnerability-in-linux-linux-be376d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe376d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35883-vulnerability-in-linux-linux-be3765</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35882-vulnerability-in-linux-linux-be375f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe375f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35880-vulnerability-in-linux-linux-be375b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe375b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35879-vulnerability-in-linux-linux-bddc8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35878-vulnerability-in-linux-linux-be3757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35877-vulnerability-in-linux-linux-be3753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35875-vulnerability-in-linux-linux-be3746</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35874-vulnerability-in-linux-linux-be3742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35873-vulnerability-in-linux-linux-be3731</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35872-vulnerability-in-linux-linux-be3729</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35871-vulnerability-in-linux-linux-be3706</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35870-vulnerability-in-linux-linux-be3702</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35869-vulnerability-in-linux-linux-be36f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35868-vulnerability-in-linux-linux-be36f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35867-vulnerability-in-linux-linux-be36ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35866-vulnerability-in-linux-linux-be36e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35865-vulnerability-in-linux-linux-be36e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe36e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35864-vulnerability-in-linux-linux-be36e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35863-vulnerability-in-linux-linux-be36dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35862-vulnerability-in-linux-linux-be36d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35861-vulnerability-in-linux-linux-be36ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35860-vulnerability-in-linux-linux-be36a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe36a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-19-f13192</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-19&amp;severity=medium&amp;id=682acdc2bbaf20d303f13192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5088-cwe-79-improper-neutralization-of-in-a5d8d266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5088%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6bdeb7ef31ef0b55b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4432-cwe-79-improper-neutralization-of-in-688d8ae2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20piotnetdotcom%20Piotnet%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b556898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4709-cwe-79-improper-neutralization-of-in-61652b42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=high&amp;id=699f6b95b7ef31ef0b556e99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4698-cwe-79-improper-neutralization-of-in-fbff1488</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4698%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20uapp%20Testimonial%20Carousel%20For%20Elementor&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556dee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2772-cwe-79-improper-neutralization-of-in-016f5ab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2772%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2782-cwe-862-missing-authorization-in-tec-9f14c43a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2782%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=high&amp;id=699f6db5b7ef31ef0b58b2ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2771-cwe-862-missing-authorization-in-tec-ef75cd46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2771%3A%20CWE-862%20Missing%20Authorization%20in%20techjewel%20Contact%20Form%20Plugin%20by%20Fluent%20Forms%20for%20Quiz%2C%20Survey%2C%20and%20Drag%20%26%20Drop%20WP%20Form%20Builder&amp;severity=critical&amp;id=699f6db5b7ef31ef0b58b2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3812-cwe-98-improper-control-of-filename--6b4455d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3812%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeNectar%20Salient%20Core&amp;severity=high&amp;id=699f6c9db7ef31ef0b566d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3810-cwe-98-improper-control-of-filename--8f6d245e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3810%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ThemeNectar%20Salient%20Shortcodes&amp;severity=high&amp;id=699f6c9db7ef31ef0b566d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3811-cwe-79-improper-neutralization-of-in-fb49aa9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3811%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeNectar%20Salient%20Shortcodes&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4849-cwe-79-improper-neutralization-of-in-83e98006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4849%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ValvePress%20WordPress%20Automatic%20Plugin&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4891-cwe-79-improper-neutralization-of-in-26e9412d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6b98b7ef31ef0b557099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3714-cwe-79-improper-neutralization-of-in-6cdd7176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3714%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4374-cwe-79-improper-neutralization-of-in-10387d71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4374%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20detheme%20DethemeKit%20For%20Elementor&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4865-cwe-79-improper-neutralization-of-in-5876b79b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b97b7ef31ef0b556ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36048-na-e9972433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36048%3A%20n%2Fa&amp;severity=critical&amp;id=690a3b50ff58c9332ff073ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-18-f11fc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35859-vulnerability-in-linux-linux-be36a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe36a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35858-vulnerability-in-linux-linux-be3694</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35857-vulnerability-in-linux-linux-be368e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe368e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35856-vulnerability-in-linux-linux-be368a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe368a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35855-vulnerability-in-linux-linux-be3682</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35854-vulnerability-in-linux-linux-be367e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe367e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35853-vulnerability-in-linux-linux-be367a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe367a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35852-vulnerability-in-linux-linux-be3676</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35851-vulnerability-in-linux-linux-be3649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35850-vulnerability-in-linux-linux-be3645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35849-vulnerability-in-linux-linux-be3641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35848-vulnerability-in-linux-linux-be363d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35848%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe363d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35847-vulnerability-in-linux-linux-be3639</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35846-vulnerability-in-linux-linux-be3635</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35845-vulnerability-in-linux-linux-be3631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d982ac4522896dcbe3631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35844-vulnerability-in-linux-linux-be362d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe362d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35843-vulnerability-in-linux-linux-be3629</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35842-vulnerability-in-linux-linux-be3625</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35841-vulnerability-in-linux-linux-be360a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe360a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35840-vulnerability-in-linux-linux-be3606</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35839-vulnerability-in-linux-linux-be35f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe35f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52698-vulnerability-in-linux-linux-be7388</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52697-vulnerability-in-linux-linux-be7377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52696-vulnerability-in-linux-linux-be736f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe736f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52695-vulnerability-in-linux-linux-be7367</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52694-vulnerability-in-linux-linux-be7347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52693-vulnerability-in-linux-linux-be733f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe733f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52692-vulnerability-in-linux-linux-be7337</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52691-vulnerability-in-linux-linux-be732f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52690-vulnerability-in-linux-linux-be732b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe732b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52689-vulnerability-in-linux-linux-be7327</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52688-vulnerability-in-linux-linux-be731a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe731a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52687-vulnerability-in-linux-linux-be7309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52686-vulnerability-in-linux-linux-be7301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52684-vulnerability-in-linux-linux-be72f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe72f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52683-vulnerability-in-linux-linux-be72dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe72dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52682-vulnerability-in-linux-linux-be72d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe72d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52681-vulnerability-in-linux-linux-be72c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe72c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52680-vulnerability-in-linux-linux-be72c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe72c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52679-vulnerability-in-linux-linux-be72b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe72b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52678-vulnerability-in-linux-linux-be72b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe72b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52677-vulnerability-in-linux-linux-be72b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe72b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52676-vulnerability-in-linux-linux-be72a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe72a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52675-vulnerability-in-linux-linux-be7298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52674-vulnerability-in-linux-linux-be7290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35838-vulnerability-in-linux-linux-be35f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35837-vulnerability-in-linux-linux-be35e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35836-vulnerability-in-linux-linux-be35dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35835-vulnerability-in-linux-linux-be35d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35834-vulnerability-in-linux-linux-be35cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52673-vulnerability-in-linux-linux-aebfad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52672-vulnerability-in-linux-linux-be7270</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52671-vulnerability-in-linux-linux-be7268</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52670-vulnerability-in-linux-linux-be7260</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52669-vulnerability-in-linux-linux-be725c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe725c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52668-vulnerability-in-linux-linux-be7258</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52667-vulnerability-in-linux-linux-be7247</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35833-vulnerability-in-linux-linux-be35c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35832-vulnerability-in-linux-linux-be35be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe35be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52664-vulnerability-in-linux-linux-aeb037</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35831-vulnerability-in-linux-linux-bddc87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35830-vulnerability-in-linux-linux-be359e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe359e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35829-vulnerability-in-linux-linux-be359a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe359a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35828-vulnerability-in-linux-linux-be3596</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35827-vulnerability-in-linux-linux-be3585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35827%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52663-vulnerability-in-linux-linux-be723f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe723f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52662-vulnerability-in-linux-linux-be7237</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52661-vulnerability-in-linux-linux-be722f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe722f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35826-vulnerability-in-linux-linux-bddc83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35825-vulnerability-in-linux-linux-bddc5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35824-vulnerability-in-linux-linux-be357d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35823-vulnerability-in-linux-linux-be3575</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35822-vulnerability-in-linux-linux-be356f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982ac4522896dcbe356f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35821-vulnerability-in-linux-linux-be356b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35821%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe356b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35819-vulnerability-in-linux-linux-bddc53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35819%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35818-vulnerability-in-linux-linux-be3567</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35817-vulnerability-in-linux-linux-aebfd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35816-vulnerability-in-linux-linux-be3563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35815-vulnerability-in-linux-linux-be353f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe353f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35814-vulnerability-in-linux-linux-be353d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe353d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35813-vulnerability-in-linux-linux-be3539</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35811-vulnerability-in-linux-linux-be3535</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35810-vulnerability-in-linux-linux-be3531</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35809-vulnerability-in-linux-linux-be3520</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35808-vulnerability-in-linux-linux-be3518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35807-vulnerability-in-linux-linux-be3512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35806-vulnerability-in-linux-linux-bddc4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35805-vulnerability-in-linux-linux-be350e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35804-vulnerability-in-linux-linux-bddc3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35803-vulnerability-in-linux-linux-be350a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35801-vulnerability-in-linux-linux-be34e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe34e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35800-vulnerability-in-linux-linux-be34e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe34e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35799-vulnerability-in-linux-linux-be34e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe34e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35798-vulnerability-in-linux-linux-be34dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe34dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35797-vulnerability-in-linux-linux-be34d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe34d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35796-vulnerability-in-linux-linux-bddc38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35795-vulnerability-in-linux-linux-be34d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe34d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-5042-execution-with-unnecessary-privilege-b82b3c3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-5042%3A%20Execution%20with%20Unnecessary%20Privileges&amp;severity=medium&amp;id=69135f1ff922b639ab566fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35794-vulnerability-in-linux-linux-be34d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe34d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35793-vulnerability-in-linux-linux-be34ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe34ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35792-vulnerability-in-linux-linux-be34ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe34ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35791-vulnerability-in-linux-linux-bddc34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35790-vulnerability-in-linux-linux-be34b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe34b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35789-vulnerability-in-linux-linux-aebfd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35788-vulnerability-in-linux-linux-be3491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35787-vulnerability-in-linux-linux-be348d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe348d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35786-vulnerability-in-linux-linux-be3489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35785-vulnerability-in-linux-linux-be3485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35784-vulnerability-in-linux-linux-be3481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27436-vulnerability-in-linux-linux-be3420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27436%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27435-vulnerability-in-linux-linux-be341c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27435%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe341c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27434-vulnerability-in-linux-linux-be3418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27434%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27433-vulnerability-in-linux-linux-be3414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27433%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27432-vulnerability-in-linux-linux-be3412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27432%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52660-vulnerability-in-linux-linux-be721e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe721e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52659-vulnerability-in-linux-linux-be7209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27431-vulnerability-in-linux-linux-be33e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27431%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe33e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27419-vulnerability-in-linux-linux-be33e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27419%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe33e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52658-vulnerability-in-linux-linux-bdd81e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27418-vulnerability-in-linux-linux-be33dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27418%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe33dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27417-vulnerability-in-linux-linux-be33d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27417%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe33d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27416-vulnerability-in-linux-linux-bddc23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27416%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27415-vulnerability-in-linux-linux-be33c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27415%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe33c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27414-vulnerability-in-linux-linux-bddc1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27414%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27413-vulnerability-in-linux-linux-bddc13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27413%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27412-vulnerability-in-linux-linux-bddc0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27412%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27411-vulnerability-in-linux-linux-be33c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27411%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe33c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27410-vulnerability-in-linux-linux-bddbf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27410%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27409-vulnerability-in-linux-linux-be33bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27409%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe33bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27408-vulnerability-in-linux-linux-be33b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27408%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe33b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52657-vulnerability-in-linux-linux-bdd81a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27407-vulnerability-in-linux-linux-be33b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27407%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe33b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27406-vulnerability-in-linux-linux-be33a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27406%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982ac4522896dcbe33a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27405-vulnerability-in-linux-linux-be338b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27405%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe338b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27404-vulnerability-in-linux-linux-be3387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27404%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27403-vulnerability-in-linux-linux-be3383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27403%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27402-vulnerability-in-linux-linux-be337f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27402%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe337f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34807-cross-site-request-forgery-csrf-in--172c05a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34807%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20CodeBard%20Fast%20Custom%20Social%20Share%20by%20CodeBard&amp;severity=null&amp;id=69cd7434e6bfc5ba1def6437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32959-incorrect-privilege-assignment-in-s-59f407a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32959%3A%20Incorrect%20Privilege%20Assignment%20in%20Sirv%20CDN%20and%20Image%20Hosting%20Sirv&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32523-improper-control-of-filename-for-in-a1a947a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32523%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20EverPress%20Mailster&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32507-incorrect-privilege-assignment-in-h-71bb35c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32507%3A%20Incorrect%20Privilege%20Assignment%20in%20Hamid%20Alinia%20Login%20with%20phone%20number&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31281-missing-authorization-in-andymoyle--3830fda2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31281%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7421e6bfc5ba1def5870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27971-improper-control-of-filename-for-in-ce52ee5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27971%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20Premmerce%20Premmerce%20Permalink%20Manager%20for%20WooCommerce&amp;severity=null&amp;id=69cd7416e6bfc5ba1def51f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24882-incorrect-privilege-assignment-in-m-0d951b75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24882%3A%20Incorrect%20Privilege%20Assignment%20in%20masteriyo%20Masteriyo%20-%20LMS&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22145-incorrect-privilege-assignment-in-i-cdc84460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22145%3A%20Incorrect%20Privilege%20Assignment%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd7413e6bfc5ba1def512d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21746-authentication-bypass-by-spoofing-i-01a7051f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21746%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Roxnor%20Wp%20Ultimate%20Review&amp;severity=null&amp;id=69cd7413e6bfc5ba1def5129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4789-cwe-918-server-side-request-forgery--8fb7fd54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4789%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20StylemixThemes%20Cost%20Calculator%20Builder%20PRO&amp;severity=medium&amp;id=699f6b96b7ef31ef0b556f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34757-improper-neutralization-of-input-du-d073898e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34757%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visualmodo%20Borderless&amp;severity=null&amp;id=69cd7432e6bfc5ba1def636d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3551-cwe-98-improper-control-of-filename--e5588983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3551%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20pencidesign%20Penci%20Soledad%20Data%20Migrator&amp;severity=critical&amp;id=699f6c93b7ef31ef0b566710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34997-na-fc2c1afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34997%3A%20n%2Fa&amp;severity=high&amp;id=699f6c55b7ef31ef0b563146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34058-na-9cd948d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34058%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b5620f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-17-f12ac8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30060-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-monitor-beb787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30060%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=682d9837c4522896dcbeb787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3134-cwe-80-improper-neutralization-of-sc-d6735855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3134%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b56626d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24981-escalation-of-privilege-in-uefi-firmware-for-some-intel-r-server-m50fcp-family-products-aec8df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24981%3A%20escalation%20of%20privilege%20in%20UEFI%20firmware%20for%20some%20Intel(R)%20Server%20M50FCP%20Family%20products&amp;severity=high&amp;id=682cd0fb1484d88663aec8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3609-cwe-862-missing-authorization-in-rev-023b79f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3609%3A%20CWE-862%20Missing%20Authorization%20in%20reviewx%20ReviewX%20%E2%80%93%20Multi-criteria%20Rating%20%26%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c97b7ef31ef0b56695e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2619-cwe-862-missing-authorization-in-bra-f8d3fd10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2619%3A%20CWE-862%20Missing%20Authorization%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4204-cwe-352-cross-site-request-forgery-c-92d1aae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4204%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ithemelandco%20Bulk%20Posts%20Editing%20For%20WordPress&amp;severity=medium&amp;id=699f6b84b7ef31ef0b55627b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4733-cwe-502-deserialization-of-untrusted-72f2bcdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4733%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20plainware%20ShiftController%20Employee%20Shift%20Scheduling&amp;severity=high&amp;id=699f6b95b7ef31ef0b556eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35176-cwe-400-uncontrolled-resource-consu-d725faa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35176%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ruby%20rexml&amp;severity=medium&amp;id=6909214afe7723195e0544f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46842-vulnerability-in-xen-xen-bed397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46842%3A%20Vulnerability%20in%20Xen%20Xen&amp;severity=medium&amp;id=682d983ac4522896dcbed397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4760-cwe-1247-improper-protection-against-69da86ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4760%3A%20CWE-1247%3A%20Improper%20Protection%20Against%20Voltage%20and%20Clock%20Glitches%20in%20Microchip%20SAME70&amp;severity=medium&amp;id=6843062b71f4d251b5ce778e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4580-cwe-79-improper-neutralization-of-in-fae3058e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4580%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4634-cwe-79-improper-neutralization-of-in-e26c18c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4634%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4400-cwe-79-improper-neutralization-of-in-0dc782b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4400%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20Post%20and%20Page%20Builder%20by%20BoldGrid%20%E2%80%93%20Visual%20Drag%20and%20Drop%20Editor&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b556778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4288-cwe-79-improper-neutralization-of-in-9e4cb9c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4288%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4385-cwe-79-improper-neutralization-of-in-a18d69cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4385%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20envothemes%20Envo%20Extra&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b556747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4617-cwe-79-improper-neutralization-of-in-a5ee4b4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4617%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rankmath%20Rank%20Math%20SEO%20with%20AI%20Best%20SEO%20Tools&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4838-cwe-502-deserialization-of-untrusted-130d48ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4838%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Brainstorm%20Force%20ConvertPlus&amp;severity=high&amp;id=699f6b96b7ef31ef0b556f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4352-cwe-862-missing-authorization-in-the-be3b278b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4352%3A%20CWE-862%20Missing%20Authorization%20in%20themium%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=699f6b88b7ef31ef0b556511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4222-cwe-862-missing-authorization-in-the-49a0a3a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4222%3A%20CWE-862%20Missing%20Authorization%20in%20themium%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=699f6b84b7ef31ef0b55630b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4351-cwe-89-improper-neutralization-of-sp-e30f9437</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4351%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themium%20Tutor%20LMS%20Pro&amp;severity=high&amp;id=699f6b88b7ef31ef0b55650d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4391-cwe-79-improper-neutralization-of-in-2c3ac290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4391%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b55675f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4223-cwe-862-missing-authorization-in-the-50f1cdd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4223%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=critical&amp;id=699f6b84b7ef31ef0b55630f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3887-cwe-79-improper-neutralization-of-in-8aa450d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30274-out-of-bounds-write-cwe-787-in-adob-2962c073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30274%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Painter&amp;severity=high&amp;id=69418d7b9050fe8508ffc250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4546-cwe-79-improper-neutralization-of-in-d2754ccc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4546%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20avimegladon%20Custom%20Post%20Type%20Attachment&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4478-cwe-79-improper-neutralization-of-in-4b952943</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4478%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3643-cwe-352-cross-site-request-forgery-c-efabc369</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3643%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Newsletter%20Popup&amp;severity=high&amp;id=69616b4445ea0302aa763b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4318-cwe-89-improper-neutralization-of-sp-0213c9e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4318%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=699f6b86b7ef31ef0b556453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4635-cwe-79-improper-neutralization-of-in-519149bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4635%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Menu%20Icons%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4279-cwe-639-authorization-bypass-through-3d6df4d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4279%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3750-cwe-862-missing-authorization-in-the-970ebd9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3750%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=high&amp;id=699f6c9bb7ef31ef0b566cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4984-cwe-79-improper-neutralization-of-in-d96e1e6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4984%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO&amp;severity=medium&amp;id=699f6b99b7ef31ef0b557168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-16-f124b2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f124b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4947-type-confusion-in-google-chrome-6c3bb46e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4947%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=critical&amp;id=68f7d9b5247d717aace26bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4670-cwe-98-improper-control-of-filename--a5542369</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4670%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=699f6b94b7ef31ef0b556ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4702-cwe-79-improper-neutralization-of-in-72b262f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4702%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kraftplugins%20Mega%20Elements%20%E2%80%93%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b94b7ef31ef0b556dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4010-cwe-862-missing-authorization-in-ice-139520cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4010%3A%20CWE-862%20Missing%20Authorization%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6b80b7ef31ef0b555fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4636-cwe-79-improper-neutralization-of-in-8fa1dfc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4636%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20optimole%20Image%20Optimization%20by%20Optimole%20%E2%80%93%20Lazy%20Load%2C%20CDN%2C%20Convert%20WebP%20%26%20AVIF&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3406-cwe-352-cross-site-request-forgery-c-0dc475a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3406%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20Prayer&amp;severity=high&amp;id=69616b4445ea0302aa763b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4208-cwe-79-improper-neutralization-of-in-6cfe9ee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3189-cwe-79-improper-neutralization-of-in-a36fe615</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3189%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6c8db7ef31ef0b5662ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4373-cwe-79-improper-neutralization-of-in-af6cdc95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4373%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4656-cwe-79-improper-neutralization-of-in-e4fd5e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4199-cwe-862-missing-authorization-in-ith-d3049914</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4199%3A%20CWE-862%20Missing%20Authorization%20in%20ithemelandco%20Bulk%20Posts%20Editing%20For%20WordPress&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4847-cwe-89-improper-neutralization-of-sp-2b8c4339</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4847%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20alttextai%20Alt%20Text%20AI%20%E2%80%93%20Automatically%20generate%20image%20alt%20text%20for%20SEO%20and%20accessibility&amp;severity=high&amp;id=699f6b96b7ef31ef0b556f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4618-cwe-79-improper-neutralization-of-in-bb033b82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4618%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4734-cwe-79-improper-neutralization-of-in-dba67025</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=medium&amp;id=699f6b95b7ef31ef0b556eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28087-na-24191d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28087%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-15-f12dcd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0437-cwe-284-improper-access-control-in-w-99f0c27a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0437%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpexpertsio%20Password%20Protected%20%E2%80%93%20Ultimate%20Plugin%20to%20Password%20Protect%20Your%20WordPress%20Content%20with%20Ease&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4370-cwe-79-improper-neutralization-of-in-5a3612ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4370%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20WPZOOM%20Addons%20for%20Elementor%20(Templates%2C%20Widgets)&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4363-cwe-79-improper-neutralization-of-in-ad7b8569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nko%20Visual%20Portfolio%2C%20Photo%20Gallery%20%26%20Post%20Grid&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5565a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4666-cwe-79-improper-neutralization-of-in-bb9db5cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20visualmodo%20Borderless%20%E2%80%93%20Widgets%2C%20Elements%2C%20Templates%20and%20Toolkit%20for%20Elementor%20%26%20Gutenberg&amp;severity=medium&amp;id=699f6b93b7ef31ef0b556d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2637-cwe-427-uncontrolled-search-path-element-in-b-r-industrial-automation-scene-viewer-bf15e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2637%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20B%26R%20Industrial%20Automation%20Scene%20Viewer&amp;severity=medium&amp;id=682d9840c4522896dcbf15e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33485-na-99ab9a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33485%3A%20n%2Fa&amp;severity=critical&amp;id=691378fc47ab359031989268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4367-arbitrary-javascript-execution-in-pdf-js-in-mozilla-firefox-bf0bf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4367%3A%20Arbitrary%20JavaScript%20execution%20in%20PDF.js%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d983fc4522896dcbf0bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30054-cwe-20-improper-input-validation-in-microsoft-powerbi-client-js-sdk-beb76a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30054%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20PowerBI-client%20JS%20SDK&amp;severity=medium&amp;id=682d9837c4522896dcbeb76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30051-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb75e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30051%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30049-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb756</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30049%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30048-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-dynamics-365-beb745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30048%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365&amp;severity=high&amp;id=682d9837c4522896dcbeb745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30047-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-dynamics-365-beb71d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30047%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365&amp;severity=high&amp;id=682d9837c4522896dcbeb71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30046-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-net-7-0-beb715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30046%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20.NET%207.0&amp;severity=medium&amp;id=682d9837c4522896dcbeb715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30045-cwe-122-heap-based-buffer-overflow-in-microsoft-net-8-0-beb70d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30045%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20.NET%208.0&amp;severity=medium&amp;id=682d9837c4522896dcbeb70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30043-cwe-611-improper-restriction-of-xml-external-entity-reference-in-microsoft-microsoft-sharepoint-enterprise-server-2016-beb6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30043%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=682d9837c4522896dcbeb6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30042-cwe-502-deserialization-of-untrusted-data-in-microsoft-office-online-server-beb6f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30042%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Office%20Online%20Server&amp;severity=high&amp;id=682d9837c4522896dcbeb6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30041-cwe-693-protection-mechanism-failure-in-microsoft-microsoft-bing-search-for-ios-beb6f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30041%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Bing%20Search%20for%20iOS&amp;severity=medium&amp;id=682d9837c4522896dcbeb6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30040-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beb6e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30040%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30039-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beb6e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30039%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30038-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb6d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30038%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30037-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb6b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30037%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30036-cwe-41-improper-resolution-of-path-equivalence-in-microsoft-windows-server-2019-beb6ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30036%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9837c4522896dcbeb6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30035-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb6a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30035%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb6a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30034-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-beb6a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30034%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb6a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30033-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2022-beb6a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30033%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9837c4522896dcbeb6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30032-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb691</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30032%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30031-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb689</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30031%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30030-cwe-476-null-pointer-dereference-in-microsoft-windows-server-2008-service-pack-2-beb685</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30030%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202008%20Service%20Pack%202&amp;severity=high&amp;id=682d9837c4522896dcbeb685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30029-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb681</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30029%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30028-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb672</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30028%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30027-cwe-415-double-free-in-microsoft-windows-10-version-1809-beb651</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30027%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30025-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30025%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30024-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30024%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29994-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29994%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26238-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-21h2-beb534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26238%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%2021H2&amp;severity=high&amp;id=682d9837c4522896dcbeb534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30059-cwe-284-improper-access-control-in-microsoft-microsoft-intune-mobile-application-management-beb783</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30059%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Intune%20Mobile%20Application%20Management&amp;severity=medium&amp;id=682d9837c4522896dcbeb783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30053-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-azure-migrate-beb762</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30053%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Migrate&amp;severity=medium&amp;id=682d9837c4522896dcbeb762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30050-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb75a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30050%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30044-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-beb705</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30044%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d9837c4522896dcbeb705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30023-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30023%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30022-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30022%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30021-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb63d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30021%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30020-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30020%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30019-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-beb61d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30019%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9837c4522896dcbeb61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30018-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-beb615</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30018%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30017-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb60d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30017%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30016-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb5f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30016%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb5f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30015-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb5ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30015%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30014-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb5e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30014%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30012-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30012%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30011-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-server-2019-beb5d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30011%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9837c4522896dcbeb5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30010-cwe-23-relative-path-traversal-in-microsoft-windows-server-2019-beb5d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30010%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9837c4522896dcbeb5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30009-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb5cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30009%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30008-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-beb5cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30008%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30007-cwe-269-improper-privilege-management-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb5be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30007%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9837c4522896dcbeb5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30006-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb5b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30006%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30005-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30005%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30004-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30004%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30003-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb58f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30003%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30002-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beb58b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30002%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30001-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb587</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30001%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30000-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30000%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29999-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb569</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29999%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29998-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beb561</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29998%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29997-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29997%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29996-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb551</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29996%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44247-execute-unauthorized-code-or-comman-5cead57f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44247%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS&amp;severity=medium&amp;id=6945133ec326d36e536dfec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31488-execute-unauthorized-code-or-comman-7a0493e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31488%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiNAC&amp;severity=medium&amp;id=69418ba93e7fd18214c3d723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31491-execute-unauthorized-code-or-comman-111cdb2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31491%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a963d0ff220b9507e1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4871-key-exchange-without-entity-authenti-95cd8dc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4871%3A%20Key%20Exchange%20without%20Entity%20Authentication&amp;severity=medium&amp;id=691f6d0840b920e2708759bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4333-cwe-79-improper-neutralization-of-in-629442ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6b86b7ef31ef0b556465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4473-cwe-79-improper-neutralization-of-in-8fc0e77b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20Sydney%20Toolbox&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b556a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4624-cwe-79-improper-neutralization-of-in-98901019</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4624%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32057-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-siemens-simcenter-femap-bed192</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32057%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=682d983ac4522896dcbed192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32055-cwe-125-out-of-bounds-read-in-siemens-simcenter-femap-bed18a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32055%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=682d983ac4522896dcbed18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31486-cwe-312-cleartext-storage-of-sensit-48e0b308</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31486%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Siemens%20OPUPI0%20AMQP%2FMQTT&amp;severity=medium&amp;id=6909214afe7723195e0544e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4440-cwe-79-improper-neutralization-of-in-09adb33f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4440%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20140%2B%20Widgets%20%7C%20Best%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b5568ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4392-cwe-79-improper-neutralization-of-in-8f4d39c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20automattic%20Jetpack%20%E2%80%93%20WP%20Security%2C%20Backup%2C%20Speed%2C%20%26%20Growth&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b556764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4144-cwe-94-improper-control-of-generatio-fe6b00b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4144%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20wpkube%20Simple%20Basic%20Contact%20Form&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4445-cwe-862-missing-authorization-in-sma-21052dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4445%3A%20CWE-862%20Missing%20Authorization%20in%20smartersite%20WP%20Compress%20%E2%80%93%20Image%20Optimizer%20%5BAll-In-One%5D&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b55695a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33006-cwe-434-unrestricted-upload-of-file-53e0316c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33006%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=critical&amp;id=69418d7b9050fe8508ffc253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28165-cwe-79-improper-neutralization-of-i-5d3107e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28165%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20SAP_SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=high&amp;id=69418d7b9050fe8508ffc242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0870-cwe-285-improper-authorization-in-yi-dfa8322d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0870%3A%20CWE-285%20Improper%20Authorization%20in%20yithemes%20YITH%20WooCommerce%20Gift%20Cards&amp;severity=medium&amp;id=699f6de6b7ef31ef0b59065d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4761-out-of-bounds-write-in-google-chrome-3e756bec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4761%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9b5247d717aace26ba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4855-cwe-416-use-after-free-in-wireshark--c93eda6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4855%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Wireshark%20Foundation%20editcap&amp;severity=low&amp;id=69c6949b3c064ed76fb5b772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4854-cwe-835-loop-with-unreachable-exit-c-5067db6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4854%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092ee835043901e82caad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4853-cwe-762-mismatched-memory-management-8b476085</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4853%3A%20CWE-762%3A%20Mismatched%20Memory%20Management%20Routines%20in%20Wireshark%20Foundation%20editcap&amp;severity=low&amp;id=69092ee835043901e82caac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-14-f127f5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27810-an-app-may-be-able-to-read-sensitiv-8cc56a62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27810%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb81fe6bfc5ba1df6e5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27847-an-app-may-be-able-to-bypass-privac-0321db30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27847%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69418d7b9050fe8508ffc231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27796-an-attacker-may-be-able-to-elevate--d4160a26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27796%3A%20An%20attacker%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69418d7a9050fe8508ffc0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27827-an-app-may-be-able-to-read-arbitrar-aa06d71d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27827%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb823e6bfc5ba1df6e72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27816-an-attacker-may-be-able-to-access-u-0e7d1212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27816%3A%20An%20attacker%20may%20be%20able%20to%20access%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb821e6bfc5ba1df6e64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27841-an-app-may-be-able-to-disclose-kern-008ee5d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27841%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=69ceb825e6bfc5ba1df6e7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27821-a-shortcut-may-output-sensitive-use-17535e8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27821%3A%20A%20shortcut%20may%20output%20sensitive%20user%20data%20without%20consent%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb821e6bfc5ba1df6e689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27837-a-local-attacker-may-gain-access-to-a7429623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27837%3A%20A%20local%20attacker%20may%20gain%20access%20to%20Keychain%20items%20in%20Apple%20macOS&amp;severity=high&amp;id=69418d7a9050fe8508ffc0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23229-a-malicious-application-may-be-able-f2c9fe2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23229%3A%20A%20malicious%20application%20may%20be%20able%20to%20access%20Find%20My%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81de6bfc5ba1df6e19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27843-an-app-may-be-able-to-elevate-privi-67e59b1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27843%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb825e6bfc5ba1df6e7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27818-an-attacker-may-be-able-to-cause-un-00565305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27818%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb821e6bfc5ba1df6e678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27789-an-app-may-be-able-to-access-user-s-57068702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27789%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb81de6bfc5ba1df6e1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27822-an-app-may-be-able-to-gain-root-pri-2c496a19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27822%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb821e6bfc5ba1df6e697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27834-an-attacker-with-arbitrary-read-and-95aa9614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27834%3A%20An%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication%20in%20Apple%20Safari&amp;severity=high&amp;id=690a3b65ff58c9332ff09ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27835-an-attacker-with-physical-access-to-b8b80367</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27835%3A%20An%20attacker%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20access%20notes%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb823e6bfc5ba1df6e772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27839-a-malicious-application-may-be-able-56a6198c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27839%3A%20A%20malicious%20application%20may%20be%20able%20to%20determine%20a%20user&apos;s%20current%20location%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb823e6bfc5ba1df6e784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27803-an-attacker-with-physical-access-ma-97f0ed46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27803%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20share%20items%20from%20the%20lock%20screen%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=69ceb81fe6bfc5ba1df6e558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27842-an-app-may-be-able-to-execute-arbit-470a5921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27842%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb825e6bfc5ba1df6e7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23236-an-app-may-be-able-to-read-arbitrar-0bbbaceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23236%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb81de6bfc5ba1df6e1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27824-an-app-may-be-able-to-elevate-privi-b718cbaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27824%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb823e6bfc5ba1df6e71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27804-an-app-may-be-able-to-cause-unexpec-9afcc14c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27804%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=69ceb81fe6bfc5ba1df6e55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27829-processing-a-file-may-lead-to-unexp-ea230d45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27829%3A%20Processing%20a%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb823e6bfc5ba1df6e741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27852-a-maliciously-crafted-webpage-may-b-fac5ae28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27852%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20distribute%20a%20script%20that%20tracks%20users%20on%20other%20webpages%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=69ceb825e6bfc5ba1df6e817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27813-an-app-may-be-able-to-execute-arbit-2942b847</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27813%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=69ceb821e6bfc5ba1df6e631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27825-an-app-may-be-able-to-bypass-certai-17b80947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27825%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=high&amp;id=69418d7a9050fe8508ffc0c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27798-an-attacker-may-be-able-to-elevate--9272951b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27798%3A%20An%20attacker%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=69ceb81de6bfc5ba1df6e1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4840-cleartext-storage-of-sensitive-infor-6cfccfc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4840%3A%20Cleartext%20Storage%20of%20Sensitive%20Information&amp;severity=medium&amp;id=691f6d0840b920e2708759b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52656-vulnerability-in-linux-linux-be71fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27401-vulnerability-in-linux-linux-be337b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27401%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27400-vulnerability-in-linux-linux-bddbee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27400%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27399-vulnerability-in-linux-linux-be336c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27399%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe336c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27398-vulnerability-in-linux-linux-bddbe1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27398%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52655-vulnerability-in-linux-linux-be71f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe71f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35169-improper-neutralization-of-input-du-be10bd62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35169%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20all_bootstrap_blocks%20All%20Bootstrap%20Blocks&amp;severity=null&amp;id=69cd7437e6bfc5ba1def6513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34812-insertion-of-sensitive-information--b379cf76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34812%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20RadiusTheme%20ShopBuilder%20%E2%80%93%20Elementor%20WooCommerce%20Builder%20Addons&amp;severity=null&amp;id=69cd7434e6bfc5ba1def643c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35172-server-side-request-forgery-ssrf-in-8e74e3ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35172%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ShortPixel%20ShortPixel%20Adaptive%20Images&amp;severity=null&amp;id=69cd7437e6bfc5ba1def6517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43040-cwe-1220-insufficient-granularity-o-0b9be7dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43040%3A%20CWE-1220%20Insufficient%20Granularity%20of%20Access%20Control%20in%20IBM%20Spectrum%20Fusion%20HCI&amp;severity=medium&amp;id=6908f50bf612d110fe9cbe57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-35204-na-5259e47a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-35204%3A%20n%2Fa&amp;severity=high&amp;id=699f6c56b7ef31ef0b5631f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26306-na-89c9056f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26306%3A%20n%2Fa&amp;severity=medium&amp;id=69092148fe7723195e054402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34459-na-77e63b8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34459%3A%20n%2Fa&amp;severity=high&amp;id=690904b100ff46172d4a0e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-13-f11f7d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-12-f12022</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4487-cwe-79-improper-neutralization-of-in-e94e23fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4487%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4329-cwe-79-improper-neutralization-of-in-9ce307bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20Thim%20Elementor%20Kit&amp;severity=medium&amp;id=699f6b86b7ef31ef0b556461</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4560-cwe-434-unrestricted-upload-of-file--93140da2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4560%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20kognetiks%20Kognetiks%20Chatbot%20for%20WordPress&amp;severity=critical&amp;id=699f6b90b7ef31ef0b556b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4630-cwe-79-improper-neutralization-of-in-08d48722</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4630%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Starter%20Templates%20%E2%80%94%20Elementor%2C%20WordPress%20%26%20Beaver%20Builder%20Templates&amp;severity=medium&amp;id=699f6b92b7ef31ef0b556cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4209-cwe-79-improper-neutralization-of-in-fde12b45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4209%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6b84b7ef31ef0b5562f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-11-742b8a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-11&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb742b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-11-f125a6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f125a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4574-cwe-79-improper-neutralization-of-in-64d758b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4574%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iqonicdesign%20Graphina%20%E2%80%93%20Elementor%20Charts%20and%20Graphs&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3055-cwe-89-improper-neutralization-of-sp-e22dc6c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3055%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=high&amp;id=699f6c8bb7ef31ef0b566197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4430-cwe-80-improper-neutralization-of-sc-773a7b35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4430%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b556887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4417-cwe-79-improper-neutralization-of-in-c2e3cf36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4417%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sbouey%20Falang%20multilanguage%20for%20WordPress&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b556819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4213-cwe-922-insecure-storage-of-sensitiv-31c3da6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4213%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20levelfourstorefront%20Shopping%20Cart%20%26%20eCommerce%20Store&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4413-cwe-502-deserialization-of-untrusted-5a4723c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4413%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20jetmonsters%20Hotel%20Booking%20Lite&amp;severity=critical&amp;id=699f6b8cb7ef31ef0b556814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30055-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-microsoft-microsoft-edge-chromium-based-beb77b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30055%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9837c4522896dcbeb77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34199-na-e512a6d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34199%3A%20n%2Fa&amp;severity=high&amp;id=695be207b7d62031393eafde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4693-operation-on-a-resource-after-expira-af71cbb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4693%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release&amp;severity=medium&amp;id=690eefe044af18c3752cf625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4490-cwe-79-improper-neutralization-of-in-f3b1cbb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elegant%20Themes%20Divi%20Builder&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4039-cwe-94-improper-control-of-generatio-237de16c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4039%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20villatheme%20Orders%20Tracking%20for%20WooCommerce&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4277-cwe-79-improper-neutralization-of-in-9f446430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4444-cwe-420-unprotected-alternate-channe-bb070387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4444%3A%20CWE-420%20Unprotected%20Alternate%20Channel%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b556954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3956-cwe-79-improper-neutralization-of-in-51ad6f89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sc0ttkclark%20Pods%20%E2%80%93%20Custom%20Content%20Types%20and%20Fields&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b56709e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4434-cwe-89-improper-neutralization-of-sp-7f9a868f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4434%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=critical&amp;id=699f6b8cb7ef31ef0b55689e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4689-cross-site-request-forgery-csrf-in-s-23b389c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4689%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ShortPixel%20ShortPixel%20Adaptive%20Images&amp;severity=null&amp;id=69cd74e5e6bfc5ba1df019e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34828-cross-site-request-forgery-csrf-in--36fdd22a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34828%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7437e6bfc5ba1def650e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3547-cwe-79-improper-neutralization-of-in-0cf8c96e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3547%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4398-cwe-79-improper-neutralization-of-in-3a431505</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20abuhayat%20HTML5%20Audio%20Player-%20Best%20WordPress%20Audio%20Player%20Plugin&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b556771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4275-cwe-79-improper-neutralization-of-in-b5ab3000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4275%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2662-cwe-78-improper-neutralization-of-sp-6021a5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2662%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=high&amp;id=699f6db4b7ef31ef0b58b127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4449-cwe-79-improper-neutralization-of-in-eb9a45a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b556969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4448-cwe-79-improper-neutralization-of-in-2f938f32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b556963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3828-cwe-269-improper-privilege-managemen-cf09d125</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3828%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Brainstorm%20Force%20Spectra%20Pro&amp;severity=high&amp;id=699f6c9db7ef31ef0b566df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4481-cwe-79-improper-neutralization-of-in-0301cec8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4481%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6b90b7ef31ef0b556a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4280-cwe-862-missing-authorization-in-vid-8c719460</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4280%3A%20CWE-862%20Missing%20Authorization%20in%20videousermanuals%20White%20Label%20CMS&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30802-na-136a47a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30802%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dcab7ef31ef0b58e6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-aa24-131a-stopransomware-black-basta-ac311117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20-%20AA24-131A%20%23StopRansomware%3A%20Black%20Basta&amp;severity=low&amp;id=68367c0a182aa0cae2311df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-10-f12ede</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-aa24-131a-stopransomware-black-basta-f0c2e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20-%20AA24-131A%20%23StopRansomware%3A%20Black%20Basta&amp;severity=low&amp;id=682acdbebbaf20d303f0c2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4671-use-after-free-in-google-chrome-939edd7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4671%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=68f7d9b5247d717aace26b9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3808-cwe-98-improper-control-of-filename--583507be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3808%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20P-THEMES%20Porto%20Theme%20-%20Functionality&amp;severity=high&amp;id=699f6c9db7ef31ef0b566d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2290-cwe-502-deserialization-of-untrusted-6fc56f2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2290%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=high&amp;id=699f6dacb7ef31ef0b58a806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3809-cwe-98-improper-control-of-filename--2b13ace7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3809%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20P-THEMES%20Porto%20Theme%20-%20Functionality&amp;severity=high&amp;id=699f6c9db7ef31ef0b566d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4397-cwe-434-unrestricted-upload-of-file--c13b32f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4397%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=high&amp;id=699f6b8ab7ef31ef0b55676c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4104-cwe-79-improper-neutralization-of-in-5d646e53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4104%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20giuliopanda%20ADFO%20%E2%80%93%20Custom%20data%20in%20admin%20dashboard&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4038-cwe-94-improper-control-of-generatio-5a039a59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4038%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codewoogeek%20Back%20In%20Stock%20Notifier%20for%20WooCommerce%20%7C%20WooCommerce%20Waitlist%20Pro&amp;severity=medium&amp;id=699f6b80b7ef31ef0b55603d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2785-cwe-79-improper-neutralization-of-in-6cf2fe43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2785%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1467-cwe-918-server-side-request-forgery--c5b9fb41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1467%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20brainstormforce%20Starter%20Templates%20%E2%80%94%20Elementor%2C%20WordPress%20%26%20Beaver%20Builder%20Templates&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4463-cwe-352-cross-site-request-forgery-c-ebd235b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4463%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20squelch%20Squelch%20Tabs%20and%20Accordions%20Shortcodes&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b5569ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4193-cwe-79-improper-neutralization-of-in-d2b1db34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4193%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20Testimonial%20Slider&amp;severity=medium&amp;id=699f6b84b7ef31ef0b55626a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4567-cwe-79-improper-neutralization-of-in-f6e97292</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Shortcodes&amp;severity=medium&amp;id=699f6b91b7ef31ef0b556bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4082-cwe-352-cross-site-request-forgery-c-c3920540</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4082%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpjoli%20Joli%20FAQ%20SEO%20%E2%80%93%20WordPress%20FAQ%20Plugin&amp;severity=medium&amp;id=699f6b80b7ef31ef0b55605d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3070-cwe-502-deserialization-of-untrusted-13593939</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3070%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20jottlieb%20Last%20Viewed%20Posts%20by%20WPBeginner&amp;severity=critical&amp;id=699f6c8bb7ef31ef0b5661ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0445-cwe-79-improper-neutralization-of-in-b1d14800</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor%20%E2%80%93%20Elementor%20Addons%2C%20Page%20Templates%2C%20Widgets%2C%20Mega%20Menu%2C%20WooCommerce&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fc11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2846-cwe-79-improper-neutralization-of-in-80bf2091</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2846%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20upwerd%20Visual%20Footer%20Credit%20Remover&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3923-cwe-79-improper-neutralization-of-in-68d1d9f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3990-cwe-79-improper-neutralization-of-in-dc6ec3bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3990%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b567145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3806-cwe-98-improper-control-of-filename--4f3a71cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3806%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20P-THEMES%20Porto&amp;severity=critical&amp;id=699f6c9bb7ef31ef0b566cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1230-cwe-284-improper-access-control-in-r-e6219a9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1230%3A%20CWE-284%20Improper%20Access%20Control%20in%20redbitcz%20SimpleShop&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4335-cwe-79-improper-neutralization-of-in-8dfe476a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rankmath%20Rank%20Math%20SEO%20with%20AI%20Best%20SEO%20Tools&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5564e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4103-cwe-352-cross-site-request-forgery-c-2dccc850</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4103%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20giuliopanda%20ADFO%20%E2%80%93%20Custom%20data%20in%20admin%20dashboard&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4441-cwe-98-improper-control-of-filename--2aab3ae4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4441%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20ravanh%20XML%20Sitemap%20%26%20Google%20News&amp;severity=high&amp;id=699f6b8cb7ef31ef0b5568b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3915-cwe-862-missing-authorization-in-swi-33d38c9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3915%3A%20CWE-862%20Missing%20Authorization%20in%20Swift%20Ideas%20Swift%20Framework&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2923-cwe-79-improper-neutralization-of-in-5dc45cc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2923%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nalam-1%20Magical%20Addons%20For%20Elementor%20(%20Header%20Footer%20Builder%2C%20Free%20Elementor%20Widgets%2C%20Elementor%20Templates%20Library%20)&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4411-cwe-80-improper-neutralization-of-sc-4a5a2177</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4411%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mihdan%20Mihdan%3A%20Yandex%20Turbo%20Feed&amp;severity=medium&amp;id=699f6b8cb7ef31ef0b556810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4339-cwe-79-improper-neutralization-of-in-592e36c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4339%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5564ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4314-cwe-352-cross-site-request-forgery-c-aa840525</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4314%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20prasunsen%20Hostel&amp;severity=medium&amp;id=699f6b86b7ef31ef0b55644b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4446-cwe-79-improper-neutralization-of-in-5874353b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4446%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pt-guy%20Content%20Views%20%E2%80%93%20Post%20Grid%20%26%20Filter%2C%20Recent%20Posts%2C%20Category%20Posts%2C%20%26%20More%20(Gutenberg%20Blocks%20and%20Shortcode)&amp;severity=medium&amp;id=699f6b8eb7ef31ef0b55695f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3831-cwe-80-improper-neutralization-of-sc-d704a554</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3831%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3595-cwe-80-improper-neutralization-of-sc-e2423ca9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3595%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20pure-chat%20Pure%20Chat%20%E2%80%93%20Live%20Chat%20Plugin%20%26%20More!&amp;severity=medium&amp;id=699f6c95b7ef31ef0b566883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3722-cwe-863-incorrect-authorization-in-s-ef95e1f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3722%3A%20CWE-863%20Incorrect%20Authorization%20in%20swte%20Swift%20Performance%20Lite&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4312-cwe-352-cross-site-request-forgery-c-9f5e1f27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4312%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20daext%20Soccer%20Engine%20%E2%80%93%20Soccer%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6b86b7ef31ef0b556442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3916-cwe-79-improper-neutralization-of-in-f259b4a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3916%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Swift%20Ideas%20Swift%20Framework&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4383-cwe-79-improper-neutralization-of-in-78c017ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Membership&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b5566dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3952-cwe-79-improper-neutralization-of-in-4a17884f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3952%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20monetizemore%20Advanced%20Ads%20%E2%80%93%C2%A0Ad%20Manager%20%26%20AdSense&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4041-cwe-79-improper-neutralization-of-in-e15228ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4041%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yoast%20Yoast%20SEO&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1229-cwe-862-missing-authorization-in-red-ccc3fe8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1229%3A%20CWE-862%20Missing%20Authorization%20in%20redbitcz%20SimpleShop&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1166-cwe-79-improper-neutralization-of-in-e17622f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1166%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20blocksera%20Image%20Hover%20Effects%20%E2%80%93%20Elementor%20Addon&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3807-cwe-98-improper-control-of-filename--9faa7422</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3807%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20P-THEMES%20Porto&amp;severity=high&amp;id=699f6c9bb7ef31ef0b566cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4386-cwe-79-improper-neutralization-of-in-bc926822</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigroumeow%20Gallery%20Block%20(Meow%20Gallery)&amp;severity=medium&amp;id=699f6b8ab7ef31ef0b556750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4316-cwe-79-improper-neutralization-of-in-c7dd6754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4316%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6b86b7ef31ef0b55644f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3680-cwe-79-improper-neutralization-of-in-f0616403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3680%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelooks%20Enter%20Addons%20%E2%80%93%20Ultimate%20Template%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4158-cwe-79-improper-neutralization-of-in-2258f320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4158%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4150-cwe-79-improper-neutralization-of-in-1d2098e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4150%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkube%20Simple%20Basic%20Contact%20Form&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1693-cwe-639-authorization-bypass-through-c780efd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1693%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20smartypants%20SP%20Project%20%26%20Document%20Manager&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3954-cwe-502-deserialization-of-untrusted-50593429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3954%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20metaphorcreations%20Ditty%20%E2%80%93%20Responsive%20News%20Tickers%2C%20Sliders%2C%20and%20Lists&amp;severity=high&amp;id=699f6ca1b7ef31ef0b56709a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4107-cwe-79-improper-neutralization-of-in-365f31e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4107%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3068-cwe-79-improper-neutralization-of-in-cab1d492</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3068%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mgibbs189%20Custom%20Field%20Suite&amp;severity=medium&amp;id=699f6c8bb7ef31ef0b5661b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3989-cwe-79-improper-neutralization-of-in-a249fc3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b567141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27397-vulnerability-in-linux-linux-be3364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27397%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27396-vulnerability-in-linux-linux-bddbd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27396%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27395-vulnerability-in-linux-linux-be335c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27395%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe335c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27394-vulnerability-in-linux-linux-be3358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27394%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27393-vulnerability-in-linux-linux-be3354</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27393%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52654-vulnerability-in-linux-linux-bdd814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3727-improper-validation-of-integrity-check-value-aeb869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3727%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value&amp;severity=high&amp;id=682cd0f81484d88663aeb869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34556-insertion-of-sensitive-information--516f1b79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34556%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34557-cross-site-request-forgery-csrf-in--7d581c1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34557%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30172-na-8e54d889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30172%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30171-na-9ee348fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30171%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dbcb7ef31ef0b58d62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-09-f129a5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f129a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27793-parsing-a-file-may-lead-to-an-unexp-acdc9e61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27793%3A%20Parsing%20a%20file%20may%20lead%20to%20an%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20iTunes%20for%20Windows&amp;severity=medium&amp;id=690a3b63ff58c9332ff097ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27281-na-2c843396</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27281%3A%20n%2Fa&amp;severity=medium&amp;id=690a2de7f0ba78a050535f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27280-n-a-in-n-a-beb7b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27280%3A%20n%2Fa&amp;severity=critical&amp;id=682d9837c4522896dcbeb7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27282-na-86f7fe54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27282%3A%20n%2Fa&amp;severity=medium&amp;id=690a2de7f0ba78a050535f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32761-cwe-119-improper-restriction-of-ope-e780debd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32761%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=69814899f9fa50a62f6fcda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33612-cwe-295-improper-certificate-valida-f190261c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33612%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20F5%20BIG-IP%20Next%20Central%20Manager&amp;severity=medium&amp;id=69418d7b9050fe8508ffc257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31156-cwe-79-improper-neutralization-of-i-a2fdfbf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=69418ba93e7fd18214c3d720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32113-cwe-22-improper-limitation-of-a-pat-d7883f6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32113%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20OFBiz&amp;severity=critical&amp;id=68f7d9b2247d717aace26a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34347-cwe-77-improper-neutralization-of-s-8c95394a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34347%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20hoppscotch%20hoppscotch&amp;severity=high&amp;id=68487f531b0bd07c39389f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24833-missing-authorization-in-happymonst-966e59f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24833%3A%20Missing%20Authorization%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34546-improper-neutralization-of-input-du-bf6e4ec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34546%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Habibur%20Rahman%20Sticky%20Social%20Link&amp;severity=null&amp;id=69cd7432e6bfc5ba1def635d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34569-improper-neutralization-of-input-du-dd8724b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34569%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Katie%20Zotpress&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4135-cwe-94-improper-control-of-generatio-50534b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4135%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20joomunited%20WP%20Latest%20Posts&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4281-cwe-79-improper-neutralization-of-in-f9861f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4281%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=699f6b86b7ef31ef0b5563c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4438-uncontrolled-resource-consumption-6b6597ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4438%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=691ec609337afffbc0f728b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4437-uncontrolled-resource-consumption-6c7f88a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4437%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=691ec609337afffbc0f728ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4436-uncontrolled-resource-consumption-26e5f2f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4436%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=6911f07ebb27cbde2e80c9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3494-cwe-79-improper-neutralization-of-in-9641ef9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3494%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20horearadu%20Mesmerize%20Companion&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4418-use-after-free-8d8df8f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4418%3A%20Return%20of%20Stack%20Variable%20Address&amp;severity=medium&amp;id=690eefdf44af18c3752cf5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4393-cwe-288-authentication-bypass-using--42a98ab7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4393%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20thenbrent%20Social%20Connect&amp;severity=critical&amp;id=699f6b8ab7ef31ef0b556768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25533-na-232f2865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25533%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6cb7ef31ef0b57208e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25532-na-ab536b36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25532%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6cb7ef31ef0b57208b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25531-na-eeeb4982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25531%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6cb7ef31ef0b572088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25530-na-b1cf8bdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25530%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6cb7ef31ef0b572085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25529-na-fbc0d6a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25529%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6cb7ef31ef0b572082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25528-na-e03c7067</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25528%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6bb7ef31ef0b572002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25526-na-4f1c70c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25526%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6bb7ef31ef0b571fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25525-na-c1590806</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25525%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6bb7ef31ef0b571ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25524-na-eb29d566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25524%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6bb7ef31ef0b571ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25523-na-2d7fd678</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25523%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6bb7ef31ef0b571ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25522-na-e8a456f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25522%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25521-na-2751004e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25521%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25520-na-474781c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25520%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25519-na-749cee2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25519%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25518-na-da2e914b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25518%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25517-na-a7289e99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25517%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25515-na-45f4194e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25515%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6ab7ef31ef0b571f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34257-na-a1912675</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34257%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4eb7ef31ef0b562205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34255-na-cabdb6c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34255%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4eb7ef31ef0b562202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34244-na-6856ddd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34244%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b562181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31961-na-dfbf37bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31961%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c30b7ef31ef0b560f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-08-f12d0b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-kampania-apt28-skierowana-przeciwko-polskim-instytucjom-rz-dowym-f0c2d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Kampania%20APT28%20skierowana%20przeciwko%20polskim%20instytucjom%20rz%C4%85dowym&amp;severity=high&amp;id=682acdbebbaf20d303f0c2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23708-elevation-of-privilege-in-google-an-7e75db4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23708%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69418d7a9050fe8508ffc0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23706-elevation-of-privilege-in-google-an-b35563f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23706%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69418d7a9050fe8508ffc0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23705-elevation-of-privilege-in-google-an-2a9cb496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23705%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=69418d7a9050fe8508ffc0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4558-use-after-free-in-google-chrome-d981c307</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4558%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690a2dfef0ba78a050538c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27982-vulnerability-in-nodejs-node-bed605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27982%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32663-cwe-400-uncontrolled-resource-consu-1dcb832e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32663%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OISF%20suricata&amp;severity=high&amp;id=690904b100ff46172d4a0e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4346-cwe-22-improper-limitation-of-a-path-5f45e0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4346%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20wshberlin%20Startklar%20Elementor%20Addons&amp;severity=critical&amp;id=699f6b88b7ef31ef0b556503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4345-cwe-434-unrestricted-upload-of-file--9b12c40a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4345%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wshberlin%20Startklar%20Elementor%20Addons&amp;severity=critical&amp;id=699f6b88b7ef31ef0b5564fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4186-cwe-288-authentication-bypass-using--94cca7b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4186%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20wisdmlabs%20Edwiser%20Bridge%20%E2%80%93%20WordPress%20Moodle%20LMS%20Integration&amp;severity=critical&amp;id=699f6b84b7ef31ef0b556265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29150-na-2e5420b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29150%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b589390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29149-na-5b35ba55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29149%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b589389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25514-na-93d56ce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25514%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25513-na-d1ef57f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25513%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6ab7ef31ef0b571f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25512-na-98015c9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25512%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6ab7ef31ef0b571f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25511-na-421f530d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25511%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25510-na-1a270a7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25510%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25509-na-25e9a7fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25509%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25508-na-eae85141</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25508%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25507-na-ce1b0069</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25507%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6ab7ef31ef0b571f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34523-na-bad88eb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34523%3A%20n%2Fa&amp;severity=high&amp;id=699f6c53b7ef31ef0b562bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34315-na-4b49577a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34315%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4eb7ef31ef0b56220c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33860-na-507658c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33860%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c49b7ef31ef0b561f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33859-na-31347484</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33859%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c49b7ef31ef0b561f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33858-na-5ae4394d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33858%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c49b7ef31ef0b561f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33857-na-7d49e80d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33857%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c47b7ef31ef0b561dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33856-na-c3e28a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33856%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c47b7ef31ef0b561daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33783-na-ceb564eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33783%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c45b7ef31ef0b561ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33781-na-2b031754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33781%3A%20n%2Fa&amp;severity=high&amp;id=699f6c45b7ef31ef0b561ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33780-na-2165c224</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33780%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c45b7ef31ef0b561c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33748-na-9ecd8afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33748%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c44b7ef31ef0b561c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33434-na-f76933f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33434%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c42b7ef31ef0b561a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33161-na-cb434341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33161%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b5615eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33155-na-b8d6fdd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33155%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3bb7ef31ef0b5615e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33153-na-a6d6fe22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33153%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3bb7ef31ef0b5615e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33149-na-4f01419c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33149%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b5615e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33148-na-ed091556</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33148%3A%20n%2Fa&amp;severity=high&amp;id=699f6c39b7ef31ef0b56155d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33147-na-ba2a6d3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33147%3A%20n%2Fa&amp;severity=high&amp;id=699f6c39b7ef31ef0b56155a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33144-na-cb6b9426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33144%3A%20n%2Fa&amp;severity=high&amp;id=699f6c39b7ef31ef0b561557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33139-na-87e53c52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33139%3A%20n%2Fa&amp;severity=high&amp;id=699f6c39b7ef31ef0b561554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33124-na-31cb47af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33124%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c39b7ef31ef0b561551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33122-na-8f7d4f62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33122%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b56154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33120-na-b2d0b930</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33120%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c39b7ef31ef0b561547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32371-na-b78ee937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32371%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b561377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32370-na-bb01572f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32370%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c37b7ef31ef0b561373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32369-na-444e0066</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32369%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c37b7ef31ef0b56136e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34397-na-8754c497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34397%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b4eff58c9332ff0738c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-07-f12054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33570-missing-authorization-in-roxnor-met-d098cdf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33570%3A%20Missing%20Authorization%20in%20Roxnor%20Metform&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33907-missing-authorization-in-michael-ne-31f945c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33907%3A%20Missing%20Authorization%20in%20Michael%20Nelson%20Print%20My%20Blog&amp;severity=null&amp;id=69cd7432e6bfc5ba1def634d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34371-missing-authorization-in-hamid-alin-58788489</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34371%3A%20Missing%20Authorization%20in%20Hamid%20Alinia%20Login%20with%20phone%20number&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34373-improper-neutralization-of-input-du-2b5d72c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34373%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20The%20Plus%20Addons%20for%20Elementor%20Page%20Builder%20Lite&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34064-cwe-79-improper-neutralization-of-i-97d70a32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34064%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pallets%20jinja&amp;severity=medium&amp;id=69092624fe7723195e0b47a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23351-cwe-284-improper-access-control-in--4c67f9c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23351%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69418d789050fe8508ffbf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21476-cwe-20-improper-input-validation-in-cb08ed51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21476%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=69418d789050fe8508ffbf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43525-cwe-120-buffer-copy-without-checkin-808e3abc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43525%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=6941947b9050fe8508060d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33119-cwe-367-time-of-check-time-of-use-t-02ff4130</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33119%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=694194799050fe8508060cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30973-na-06a071ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30973%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28725-na-1f6b6d79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28725%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b58909e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26312-na-62593a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26312%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34538-na-fa402b57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34538%3A%20n%2Fa&amp;severity=high&amp;id=699f6c54b7ef31ef0b563081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34534-na-a0788338</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34534%3A%20n%2Fa&amp;severity=high&amp;id=699f6c53b7ef31ef0b562bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34533-na-a4e354fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34533%3A%20n%2Fa&amp;severity=high&amp;id=699f6c53b7ef31ef0b562bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34532-na-0ce1dda4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34532%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c53b7ef31ef0b562bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34471-na-7f246342</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34471%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c51b7ef31ef0b56285a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34470-na-8f4c551e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34470%3A%20n%2Fa&amp;severity=high&amp;id=699f6c51b7ef31ef0b562857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34252-na-89912f21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34252%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4eb7ef31ef0b5621ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34251-na-68748125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34251%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4eb7ef31ef0b5621fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34250-na-545331c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34250%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4eb7ef31ef0b5621f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34249-na-60676869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34249%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4cb7ef31ef0b562187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34246-na-13806ad8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34246%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b562184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34093-na-fc2deea7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34093%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4cb7ef31ef0b562174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34091-na-d99a3291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34091%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b562170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34090-na-fdd7ee47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34090%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b56216c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33830-na-e5cc93fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33830%3A%20n%2Fa&amp;severity=high&amp;id=699f6c46b7ef31ef0b561d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33829-na-514af761</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33829%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c46b7ef31ef0b561d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33788-na-39479456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33788%3A%20n%2Fa&amp;severity=high&amp;id=699f6c46b7ef31ef0b561d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33753-na-d5b1d7ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33753%3A%20n%2Fa&amp;severity=high&amp;id=699f6c45b7ef31ef0b561c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33752-na-d04c5d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33752%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c45b7ef31ef0b561c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33749-na-b3a6dd91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33749%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c44b7ef31ef0b561c28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33410-na-ec47ba7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33410%3A%20n%2Fa&amp;severity=high&amp;id=699f6c41b7ef31ef0b5619e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33409-na-91cf641a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33409%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c41b7ef31ef0b5619e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33408-na-1acc6669</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33408%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c41b7ef31ef0b5619e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33407-na-48b14e30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33407%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c41b7ef31ef0b5619dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33406-na-5884ea3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33406%3A%20n%2Fa&amp;severity=high&amp;id=699f6c41b7ef31ef0b5619d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33405-na-90d441d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33405%3A%20n%2Fa&amp;severity=high&amp;id=699f6c41b7ef31ef0b5619d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33404-na-c05323d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33404%3A%20n%2Fa&amp;severity=high&amp;id=699f6c41b7ef31ef0b5619d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33403-na-f43a3332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33403%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c40b7ef31ef0b56195a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33294-na-f5730b85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33294%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3db7ef31ef0b561777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33121-na-6930e51c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33121%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b56154b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33118-na-3a63e746</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33118%3A%20n%2Fa&amp;severity=high&amp;id=699f6c39b7ef31ef0b561544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33117-na-7b5aaef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33117%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b561541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33113-na-01898c78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33113%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b5614bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33112-cwe-78-improper-neutralization-of-s-9d3e0e49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33112%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=699f6c39b7ef31ef0b5614b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33110-na-4ec8f607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33110%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c39b7ef31ef0b5614b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34472-na-bfd3824d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34472%3A%20n%2Fa&amp;severity=medium&amp;id=6925c2045b1d823317eed0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-06-f12670</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34528-na-a57f94b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34528%3A%20n%2Fa&amp;severity=high&amp;id=699f6c53b7ef31ef0b562bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34527-na-ae600888</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34527%3A%20n%2Fa&amp;severity=high&amp;id=699f6c53b7ef31ef0b562bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34525-na-380bbfd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34525%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c53b7ef31ef0b562bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34524-na-11792d51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34524%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c53b7ef31ef0b562bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34519-na-db911dd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34519%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c52b7ef31ef0b56290a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34515-na-e1e650b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34515%3A%20n%2Fa&amp;severity=high&amp;id=699f6c52b7ef31ef0b562905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34511-9791ec36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34511&amp;severity=null&amp;id=699f6c52b7ef31ef0b562903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34510-na-334a621b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34510%3A%20n%2Fa&amp;severity=high&amp;id=699f6c52b7ef31ef0b5628ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34490-na-30b81e14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34490%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c52b7ef31ef0b5628fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34489-na-e71ae04d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34489%3A%20n%2Fa&amp;severity=high&amp;id=699f6c52b7ef31ef0b5628f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34488-na-63154d6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34488%3A%20n%2Fa&amp;severity=high&amp;id=699f6c52b7ef31ef0b5628f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34487-na-1c4a473e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34487%3A%20n%2Fa&amp;severity=high&amp;id=699f6c52b7ef31ef0b5628f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34486-na-73855910</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34486%3A%20n%2Fa&amp;severity=high&amp;id=699f6c52b7ef31ef0b5628f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34484-na-8862d90c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34484%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c52b7ef31ef0b5628ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34483-na-58c89070</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34483%3A%20n%2Fa&amp;severity=high&amp;id=699f6c51b7ef31ef0b562874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34478-na-f85a9390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34478%3A%20n%2Fa&amp;severity=high&amp;id=699f6c51b7ef31ef0b562869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34474-na-d4ffe536</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34474%3A%20n%2Fa&amp;severity=high&amp;id=699f6c51b7ef31ef0b56285d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34507-na-841966b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34507%3A%20n%2Fa&amp;severity=high&amp;id=690a3b50ff58c9332ff073d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34506-na-4ade09da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34506%3A%20n%2Fa&amp;severity=high&amp;id=690a3b50ff58c9332ff073d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34502-na-439a3f37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34502%3A%20n%2Fa&amp;severity=critical&amp;id=690a3b50ff58c9332ff073cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34500-na-98adc18c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34500%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b50ff58c9332ff073c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34509-na-5af0a763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34509%3A%20n%2Fa&amp;severity=medium&amp;id=6909214afe7723195e0544f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34508-na-5dba6ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34508%3A%20n%2Fa&amp;severity=medium&amp;id=6909214afe7723195e0544eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-05-f123f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f123f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1050-cwe-862-missing-authorization-in-car-499d34c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1050%3A%20CWE-862%20Missing%20Authorization%20in%20carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3240-cwe-502-deserialization-of-untrusted-592d249c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3240%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Brainstorm%20Force%20ConvertPlug&amp;severity=high&amp;id=699f6c8eb7ef31ef0b56640e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3237-cwe-862-missing-authorization-in-bra-b91e0c0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3237%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20ConvertPlug&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b566406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3868-cwe-79-improper-neutralization-of-in-2bad61ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3868%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20galdub%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34476-na-f1b3b08d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34476%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c51b7ef31ef0b562865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34475-na-3d27e1f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34475%3A%20n%2Fa&amp;severity=high&amp;id=699f6c51b7ef31ef0b562861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34469-na-fe411adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34469%3A%20n%2Fa&amp;severity=high&amp;id=699f6c51b7ef31ef0b562854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34468-na-50d8eb1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34468%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34467-na-3040e3b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34467%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34462-na-175fb225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34462%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34460-na-e0ac52a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34460%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-04-e6617e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-04&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e6617e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-04-f12eea</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48705-vulnerability-in-linux-linux-bdd4dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48704-vulnerability-in-linux-linux-be5ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48695-vulnerability-in-linux-linux-aebf5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48690-vulnerability-in-linux-linux-be5e84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48703-vulnerability-in-linux-linux-aebf6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48702-vulnerability-in-linux-linux-be5ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48701-vulnerability-in-linux-linux-be5ed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48701%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48699-vulnerability-in-linux-linux-aebf6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48698-vulnerability-in-linux-linux-aebf6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48697-vulnerability-in-linux-linux-be5ec0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48696-vulnerability-in-linux-linux-be5ea9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48694-vulnerability-in-linux-linux-be5ea5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48693-vulnerability-in-linux-linux-be5ea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48692-vulnerability-in-linux-linux-be5e9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48691-vulnerability-in-linux-linux-be5e8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48689-vulnerability-in-linux-linux-be5e7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48688-vulnerability-in-linux-linux-be5e74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48687-vulnerability-in-linux-linux-be5e65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48686-vulnerability-in-linux-linux-be5e5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48675-vulnerability-in-linux-linux-be5e3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48674-vulnerability-in-linux-linux-bdd4d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd4d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48673-vulnerability-in-linux-linux-be5e39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48672-vulnerability-in-linux-linux-be5e35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48671-vulnerability-in-linux-linux-be5e31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48670-vulnerability-in-linux-linux-be5e2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4439-cwe-79-improper-neutralization-of-in-c4f4e517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4439%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20Foundation%20WordPress&amp;severity=high&amp;id=699f6b8cb7ef31ef0b5568a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50224-cwe-290-authentication-bypass-by-sp-dc9b0a2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50224%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20TP-Link%20TL-WR841N&amp;severity=medium&amp;id=68f7d9af247d717aace26801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40477-cwe-129-improper-validation-of-arra-aa6826c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40477%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20RARLAB%20WinRAR&amp;severity=high&amp;id=690a5546a730e5a3d9d76d4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31673-na-c3bdcbad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31673%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31636-na-5e8816a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31636%3A%20n%2Fa&amp;severity=low&amp;id=699f6dd4b7ef31ef0b58ef9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30851-na-0cda9fce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30851%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58e7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29417-na-be81eaae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29417%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9eb7ef31ef0b589699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27453-na-b30ec2e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27453%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b579aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34455-na-a114f2ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34455%3A%20n%2Fa&amp;severity=high&amp;id=699f6c50b7ef31ef0b5627d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34453-na-e4078f99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34453%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c50b7ef31ef0b5627d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34449-na-9d658f67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34449%3A%20n%2Fa&amp;severity=null&amp;id=699f6c4fb7ef31ef0b56228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34446-na-3dfbad8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34446%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4fb7ef31ef0b562288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34408-na-dd0427e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34408%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4fb7ef31ef0b562284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34401-na-9336f5ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34401%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4fb7ef31ef0b562279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33793-na-744bc960</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33793%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c46b7ef31ef0b561d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33792-na-b116f490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33792%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c46b7ef31ef0b561d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33791-na-c8bdb3ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33791%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c46b7ef31ef0b561d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33789-na-2de44075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33789%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c46b7ef31ef0b561d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33787-na-3cb03dfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33787%3A%20n%2Fa&amp;severity=high&amp;id=699f6c46b7ef31ef0b561d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33786-na-ffe74985</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33786%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c45b7ef31ef0b561ca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33398-na-87ea7d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33398%3A%20n%2Fa&amp;severity=high&amp;id=699f6c40b7ef31ef0b561954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34403-na-8dcb52d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34403%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b4eff58c9332ff073a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34402-na-cadcb816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34402%3A%20n%2Fa&amp;severity=high&amp;id=690a3b4eff58c9332ff07399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-03-761c35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-03&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb761c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-03-f13146</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f13146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3681-cwe-79-improper-neutralization-of-in-0876f2c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3681%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cmoreira%20Interactive%20World%20Maps&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3473-cwe-79-improper-neutralization-of-in-b8f8300e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2099robots%20Header%20Footer%20Code%20Manager%20Pro&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4097-cwe-80-improper-neutralization-of-sc-76ccab0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4097%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20StylemixThemes%20Cost%20Calculator%20Builder&amp;severity=high&amp;id=699f6b82b7ef31ef0b556135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0710-cwe-20-improper-input-validation-in--a553f983</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0710%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Gravity%20Wiz%20GP%20Unique%20ID&amp;severity=medium&amp;id=699f6de4b7ef31ef0b5903b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2324-cwe-79-improper-neutralization-of-in-b655c764</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20FileOrganizer%20%E2%80%93%20Manage%20WordPress%20and%20Website%20Files&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3849-cwe-98-improper-control-of-filename--29ae042f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3849%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20holithemes%20Click%20to%20Chat%20%E2%80%93%20HoliThemes&amp;severity=high&amp;id=699f6c9db7ef31ef0b566dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3601-cwe-862-missing-authorization-in-ays-704c6a22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3601%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Best%20WordPress%20Poll%20Plugin&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2752-cwe-79-improper-neutralization-of-in-c078a96a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2752%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wooassist%20Where%20Did%20You%20Hear%20About%20Us%20Checkout%20Field%20for%20WooCommerce&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3553-cwe-862-missing-authorization-in-the-937926a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3553%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2667-cwe-434-unrestricted-upload-of-file--36fd883a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2667%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20instawp%20InstaWP%20Connect%20%E2%80%93%201-click%20WP%20Staging%20%26%20Migration&amp;severity=critical&amp;id=699f6db4b7ef31ef0b58b13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3340-cwe-79-improper-neutralization-of-in-f6a5feca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3340%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3936-cwe-862-missing-authorization-in-tec-1a59920c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3936%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20The%20Post%20Grid%20%E2%80%93%20Shortcode%2C%20Gutenberg%20Blocks%20and%20Elementor%20Addon%20for%20Post%20Grid&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b56701e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4086-cwe-352-cross-site-request-forgery-c-468c9096</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4086%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativemindssolutions%20CM%20Tooltip%20Glossary&amp;severity=medium&amp;id=699f6b82b7ef31ef0b55611c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3743-cwe-79-improper-neutralization-of-in-75ef1368</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3743%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566ca3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2751-cwe-20-improper-input-validation-in--fafe77f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2751%3A%20CWE-20%20Improper%20Input%20Validation%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2273-cwe-79-improper-neutralization-of-in-fc0041db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2273%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2960-cwe-352-cross-site-request-forgery-c-2031653f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2960%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20svs-websoft%20SVS%20Pricing%20Tables&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3897-cwe-862-missing-authorization-in-ays-9c0f8d4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3897%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Popup%20Box%20%E2%80%93%20Best%20WordPress%20Popup%20Plugin&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3747-cwe-20-improper-input-validation-in--c1d9f55d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3747%3A%20CWE-20%20Improper%20Input%20Validation%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4033-cwe-434-unrestricted-upload-of-file--f98f7bd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4033%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20plugins360%20All-in-One%20Video%20Gallery&amp;severity=high&amp;id=699f6b80b7ef31ef0b555fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2876-cwe-89-improper-neutralization-of-sp-1503ea36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2876%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=critical&amp;id=699f6db9b7ef31ef0b58d32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1716-cwe-862-missing-authorization-in-lit-3c2723ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1716%3A%20CWE-862%20Missing%20Authorization%20in%20litonice13%20Admin%20Bar%20Editor%20%E2%80%93%20Hide%20Toolbar%20by%20User%20Roles&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f23b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4324-cwe-79-improper-neutralization-of-in-9c160b0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4324%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wptipsntricks%20WP%20Video%20Lightbox&amp;severity=medium&amp;id=699f6b86b7ef31ef0b55645d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1415-cwe-352-cross-site-request-forgery-c-5a703a00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1415%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themehunk%20Responsive%20Contact%20Form%20Builder%20%26%20Lead%20Generation%20Plugin&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1759-cwe-79-improper-neutralization-of-in-f6149ebe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1759%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Most%20Advanced%20WordPress%20Marketing%20Toolkit&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4034-cwe-79-improper-neutralization-of-in-7f9cbcc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4034%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Virtue&amp;severity=medium&amp;id=699f6b80b7ef31ef0b555fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2328-cwe-79-improper-neutralization-of-in-fb6671dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2328%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devowl%20Real%20Media%20Library%3A%20Media%20Library%20Folder%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1797-cwe-89-improper-neutralization-of-sp-3bb8f821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1797%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Most%20Advanced%20WordPress%20Marketing%20Toolkit&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1416-cwe-352-cross-site-request-forgery-c-7ffcdbbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1416%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themehunk%20Responsive%20Contact%20Form%20Builder%20%26%20Lead%20Generation%20Plugin&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2417-cwe-862-missing-authorization-in-wpe-6694bc7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2417%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=high&amp;id=699f6dafb7ef31ef0b58abde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2082-cwe-79-improper-neutralization-of-in-6ada13e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2082%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cscode%20EleForms%20%E2%80%93%20All%20In%20One%20Form%20Integration%20including%20DB%20for%20Elementor&amp;severity=high&amp;id=699f6da3b7ef31ef0b589b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3725-cwe-79-improper-neutralization-of-in-579e1fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3233-cwe-862-missing-authorization-in-vin-a1a01898</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3233%3A%20CWE-862%20Missing%20Authorization%20in%20vinod-dalvi%20Ivory%20Search%20%E2%80%93%20WordPress%20Search%20Plugin&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b5663fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1840-cwe-80-improper-neutralization-of-sc-2e756d8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1840%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3500-cwe-98-improper-control-of-filename--4ba9b426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3500%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=high&amp;id=699f6c93b7ef31ef0b56668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2349-cwe-79-improper-neutralization-of-in-c7cf68b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hosseinhashemi%20Fancy%20Elementor%20Flipbox&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3307-cwe-79-improper-neutralization-of-in-07e6cb52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3307%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6c91b7ef31ef0b566538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4036-cwe-79-improper-neutralization-of-in-19c50176</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4036%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20Sydney%20Toolbox&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3588-cwe-79-improper-neutralization-of-in-a57c302f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3588%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Getwid%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6c95b7ef31ef0b566875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2401-cwe-79-improper-neutralization-of-in-3ede97d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2401%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jatacid%20Admin%20Page%20Spider&amp;severity=medium&amp;id=699f6dafb7ef31ef0b58abd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1679-cwe-80-improper-neutralization-of-sc-607b8619</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1679%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ukrsolution%20Print%20Labels%20with%20Barcodes.%20Create%20price%20tags%2C%20product%20labels%2C%20order%20labels%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4000-cwe-79-improper-neutralization-of-in-fa47c17e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stylemix%20WordPress%20Header%20Builder%20Plugin%20%E2%80%93%20Pearl&amp;severity=medium&amp;id=699f6b80b7ef31ef0b555fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0613-cwe-352-cross-site-request-forgery-c-110cdeac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0613%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gluten%20Delete%20Custom%20Fields&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3606-cwe-862-missing-authorization-in-met-8166b36f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3606%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Memberships%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3550-cwe-79-improper-neutralization-of-in-f6f5bf8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3550%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0629-cwe-862-missing-authorization-in-nme-e2b0426c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0629%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%202Checkout%20Payment%20Gateway%20for%20WooCommerce&amp;severity=medium&amp;id=699f6de1b7ef31ef0b5900f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4085-cwe-79-improper-neutralization-of-in-d8eb1751</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20docolli%20Tabellen%20von%20faustball.com&amp;severity=medium&amp;id=699f6b82b7ef31ef0b556118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3337-cwe-79-improper-neutralization-of-in-9717990b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3337%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6c91b7ef31ef0b566562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3197-cwe-79-improper-neutralization-of-in-ba75e605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3197%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c8db7ef31ef0b5662f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3891-cwe-79-improper-neutralization-of-in-948bbded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3891%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3715-cwe-80-improper-neutralization-of-sc-229f663f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3715%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=high&amp;id=699f6c9bb7ef31ef0b566bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3199-cwe-79-improper-neutralization-of-in-4de0fd27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3199%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c8db7ef31ef0b566300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3215-cwe-352-cross-site-request-forgery-c-aa38247f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3215%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b56638f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4265-cwe-79-improper-neutralization-of-in-e5caab67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4265%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=medium&amp;id=699f6b84b7ef31ef0b55631f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3517-cwe-80-improper-neutralization-of-sc-9b0cb245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3517%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6c93b7ef31ef0b56669b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3729-cwe-636-not-failing-securely-failing-c4620d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3729%3A%20CWE-636%20Not%20Failing%20Securely%20(&apos;Failing%20Open&apos;)%20in%20shabti%20Frontend%20Admin%20by%20DynamiApps&amp;severity=critical&amp;id=699f6c9bb7ef31ef0b566c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0615-cwe-200-information-exposure-in-code-5c1e64b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0615%3A%20CWE-200%20Information%20Exposure%20in%20codeatlantic%20Content%20Control%20%E2%80%93%20The%20Ultimate%20Content%20Restriction%20Plugin!%20Restrict%20Content%2C%20Create%20Conditional%20Blocks%20%26%20More&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2797-cwe-862-missing-authorization-in-mai-fff55df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2797%3A%20CWE-862%20Missing%20Authorization%20in%20mailerlite%20MailerLite%20%E2%80%93%20Signup%20forms%20(official)&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3287-cwe-862-missing-authorization-in-wpm-7d015c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3287%3A%20CWE-862%20Missing%20Authorization%20in%20wpmudev%20SmartCrawl%20WordPress%20SEO%20checker%2C%20SEO%20analyzer%2C%20SEO%20optimizer&amp;severity=medium&amp;id=699f6c91b7ef31ef0b56651c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3870-cwe-200-information-exposure-in-arsh-09b831c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3870%3A%20CWE-200%20Information%20Exposure%20in%20arshidkv12%20Contact%20Form%207%20Database%20Addon%20%E2%80%93%20CFDB7&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1173-cwe-89-improper-neutralization-of-sp-51292726</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1173%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6d24b7ef31ef0b56e53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3650-cwe-79-improper-neutralization-of-in-839bf210</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3650%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons%20and%20Templates%20Library&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0848-cwe-79-improper-neutralization-of-in-9468d941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0848%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aaextention%20AA%20Cash%20Calculator&amp;severity=medium&amp;id=699f6de6b7ef31ef0b590645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2542-cwe-80-improper-neutralization-of-sc-dbbd0f23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2542%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20jotform%20Jotform%20Online%20Forms%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder%2C%20Securely%20Embed%20Contact%20Forms&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0908-cwe-862-missing-authorization-in-abu-b53160fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0908%3A%20CWE-862%20Missing%20Authorization%20in%20abuhayat%20Advanced%20Post%20Block%20%E2%80%93%20Display%20Posts%2C%20Pages%2C%20or%20Custom%20Posts%20on%20Your%20Page&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2084-cwe-79-improper-neutralization-of-in-4034374b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2084%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6da4b7ef31ef0b589c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3312-cwe-862-missing-authorization-in-tod-6b8a983a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3312%3A%20CWE-862%20Missing%20Authorization%20in%20todiadiatmo%20Easy%20Custom%20Auto%20Excerpt&amp;severity=medium&amp;id=699f6c91b7ef31ef0b566552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1533-cwe-79-improper-neutralization-of-in-a1665186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1533%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2109-cwe-862-missing-authorization-in-the-f373f45d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2109%3A%20CWE-862%20Missing%20Authorization%20in%20themeinwp%20Booster%20Extension&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2765-cwe-79-improper-neutralization-of-in-f65aba57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3295-cwe-862-missing-authorization-in-wpe-dbf672e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3295%3A%20CWE-862%20Missing%20Authorization%20in%20wpeverest%20User%20Registration%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6c91b7ef31ef0b56652c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4092-cwe-79-improper-neutralization-of-in-96c08764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4092%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=699f6b82b7ef31ef0b556129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2967-cwe-79-improper-neutralization-of-in-d05c7c70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2967%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aharonyan%20Guest%20posting%20%2F%20Frontend%20Posting%20wordpress%20plugin%20%E2%80%93%20WP%20Front%20User%20Submit%20%2F%20Front%20Editor&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2346-cwe-639-authorization-bypass-through-3761877f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2346%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aa4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3724-cwe-79-improper-neutralization-of-in-2ce4aca6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3724%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4133-cwe-601-url-redirection-to-untrusted-3b446d92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4133%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20reputeinfosystems%20ARMember%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1386-cwe-79-improper-neutralization-of-in-9f88f5bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mailerlite%20MailerLite%20%E2%80%93%20Signup%20forms%20(official)&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3677-cwe-79-improper-neutralization-of-in-49dcc1f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3677%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tinyweb%20Ultimate%20410%20Gone%20Status%20Code&amp;severity=medium&amp;id=696a3ee4b22c7ad868a7527c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1809-cwe-497-exposure-of-system-data-to-a-baff9c4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1809%3A%20CWE-497%20Exposure%20of%20System%20Data%20to%20an%20Unauthorized%20Control%20Sphere%20in%20hiddenpearls%20Analytify%20%E2%80%93%20Google%20Analytics%20Dashboard%20For%20WordPress%20(GA4%20analytics%20made%20easy)&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1805-cwe-80-improper-neutralization-of-sc-915eb0fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1805%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1567-cwe-434-unrestricted-upload-of-file--add0ba28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1567%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=high&amp;id=699f6d35b7ef31ef0b56efd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2959-cwe-352-cross-site-request-forgery-c-37943d14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2959%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20svs-websoft%20SVS%20Pricing%20Tables&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3489-cwe-79-improper-neutralization-of-in-9a5f3a11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3489%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1993-cwe-80-improper-neutralization-of-sc-d33632fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1993%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20seothemes%20Icon%20Widget&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1677-cwe-862-missing-authorization-in-ukr-63a23d26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1677%3A%20CWE-862%20Missing%20Authorization%20in%20ukrsolution%20Print%20Labels%20with%20Barcodes.%20Create%20price%20tags%2C%20product%20labels%2C%20order%20labels%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2043-cwe-862-missing-authorization-in-csc-2454ef9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2043%3A%20CWE-862%20Missing%20Authorization%20in%20cscode%20EleForms%20%E2%80%93%20All%20In%20One%20Form%20Integration%20including%20DB%20for%20Elementor&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3649-cwe-472-external-control-of-assumed--5dd3c19b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3649%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter%20in%20smub%20Contact%20Form%20by%20WPForms%20%E2%80%93%20Drag%20%26%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1842-cwe-80-improper-neutralization-of-sc-0ba9e5f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1842%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2958-cwe-79-improper-neutralization-of-in-3ffa3115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2958%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20svs-websoft%20SVS%20Pricing%20Tables&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3942-cwe-862-missing-authorization-in-sty-79416bd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3942%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1688-cwe-862-missing-authorization-in-shi-60b7880e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1688%3A%20CWE-862%20Missing%20Authorization%20in%20shivashankerbhatta%20Woo%20Total%20Sales&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3670-cwe-79-improper-neutralization-of-in-a2ab8d54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20harmr%20Leaflet%20Maps%20Marker%20(Google%20Maps%2C%20OpenStreetMap%2C%20Bing%20Maps)&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3499-cwe-98-improper-control-of-filename--3dbb38c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3499%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons%20and%20Templates%20Library&amp;severity=high&amp;id=699f6c93b7ef31ef0b566681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3275-cwe-862-missing-authorization-in-sty-623e146e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3275%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20eRoom%20%E2%80%93%20Zoom%20Meetings%20%26%20Webinars&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1678-cwe-284-improper-access-control-in-d-0d0dc5f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1678%3A%20CWE-284%20Improper%20Access%20Control%20in%20dunhakdis%20Subway%20%E2%80%93%20Private%20Site%20Option&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3991-cwe-79-improper-neutralization-of-in-f3e4c078</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3991%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b56714f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1396-cwe-79-improper-neutralization-of-in-d5846ab1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1396%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2790-cwe-79-improper-neutralization-of-in-5d4bad55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2790%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3674-cwe-79-improper-neutralization-of-in-63eab7b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3674%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20meitar%20Inline%20Google%20Spreadsheet%20Viewer&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4203-cwe-79-improper-neutralization-of-in-f63250aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6b84b7ef31ef0b556277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2867-cwe-20-improper-input-validation-in--96a95d4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2867%3A%20CWE-20%20Improper%20Input%20Validation%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1572-cwe-79-improper-neutralization-of-in-ecf6b1b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1572%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20alimir%20WP%20ULike%20%E2%80%93%20Most%20Advanced%20WordPress%20Marketing%20Toolkit&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56efeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3734-cwe-94-improper-control-of-generatio-27e45e31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3734%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20realmag777%20FOX%20%E2%80%93%20Currency%20Switcher%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3599-cwe-862-missing-authorization-in-wpe-07dd33d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3599%3A%20CWE-862%20Missing%20Authorization%20in%20wpeka-club%20WP%20Cookie%20Consent%20(%20for%20GDPR%2C%20CCPA%20%26%20ePrivacy%20)&amp;severity=medium&amp;id=699f6c95b7ef31ef0b56688f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3647-cwe-79-improper-neutralization-of-in-1be1f1ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3647%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3161-cwe-79-improper-neutralization-of-in-b71d70bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3161%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b56627a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3071-cwe-862-missing-authorization-in-ama-5db23f9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3071%3A%20CWE-862%20Missing%20Authorization%20in%20amaa%20ACF%20On-The-Go&amp;severity=medium&amp;id=699f6c8bb7ef31ef0b5661be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3819-cwe-79-improper-neutralization-of-in-b7dfd280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3819%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3895-cwe-862-missing-authorization-in-fah-eacd5c7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3895%3A%20CWE-862%20Missing%20Authorization%20in%20fahadmahmood%20WP%20Datepicker&amp;severity=high&amp;id=699f6c9fb7ef31ef0b566f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3885-cwe-79-improper-neutralization-of-in-01c80d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2661-cwe-89-improper-neutralization-of-sp-b9a8fdbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2661%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ukrsolution%20Barcode%20Scanner%20and%20Inventory%20manager.%20POS%20(Point%20of%20Sale)%20%E2%80%93%20scan%20barcodes%20%26%20create%20orders%20with%20barcode%20reader.&amp;severity=high&amp;id=699f6db4b7ef31ef0b58b11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3338-cwe-79-improper-neutralization-of-in-2d7c86c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3338%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6c91b7ef31ef0b56656a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1897-cwe-502-deserialization-of-untrusted-11f87190</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1897%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Grid%20Gallery%20%E2%80%93%20Photo%20Image%20Grid%20Gallery&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3341-cwe-79-improper-neutralization-of-in-f3ba71b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1841-cwe-80-improper-neutralization-of-sc-2a4b990b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1841%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpbakery%20WPBakery%20Visual%20Composer&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3308-cwe-80-improper-neutralization-of-sc-2086e2e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3308%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6c91b7ef31ef0b566542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3546-cwe-862-missing-authorization-in-web-aa4598eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3546%3A%20CWE-862%20Missing%20Authorization%20in%20webtoffee%20WordPress%20Backup%20%26%20Migration&amp;severity=medium&amp;id=699f6c93b7ef31ef0b5666fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3675-cwe-79-improper-neutralization-of-in-345471e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3675%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2750-cwe-87-improper-neutralization-of-al-68dcec27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2750%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3021-cwe-79-improper-neutralization-of-in-4f514fe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3021%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdhadid%20Mhr%20Post%20Ticker&amp;severity=medium&amp;id=699f6c89b7ef31ef0b56609e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3045-cwe-79-improper-neutralization-of-in-aba5d17c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3045%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpovernight%20PDF%20Invoices%20%26%20Packing%20Slips%20for%20WooCommerce&amp;severity=high&amp;id=699f6c8ab7ef31ef0b56612e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1584-cwe-284-improper-access-control-in-h-39382617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1584%3A%20CWE-284%20Improper%20Access%20Control%20in%20hiddenpearls%20Analytify%20%E2%80%93%20Google%20Analytics%20Dashboard%20For%20WordPress%20(GA4%20analytics%20made%20easy)&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56eff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2503-cwe-80-improper-neutralization-of-sc-f2b83cf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2503%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3554-cwe-80-improper-neutralization-of-sc-f0744de2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3554%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20smub%20All%20in%20One%20SEO%20%E2%80%93%20Best%20WordPress%20SEO%20Plugin%20%E2%80%93%20Easily%20Improve%20SEO%20Rankings%20%26%20Increase%20Traffic&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3728-cwe-79-improper-neutralization-of-in-b62501ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3728%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4156-cwe-79-improper-neutralization-of-in-1e0b1830</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4156%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b82b7ef31ef0b5561c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3985-cwe-79-improper-neutralization-of-in-28e9ca81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b5670b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3206-cwe-862-missing-authorization-in-rec-1f2089df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3206%3A%20CWE-862%20Missing%20Authorization%20in%20recorp%20Different%20Menu%20in%20Different%20Pages%20%E2%80%93%20Control%20Menu%20Visibility%20(All%20in%20One)&amp;severity=medium&amp;id=699f6c8db7ef31ef0b56630d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4003-cwe-20-improper-input-validation-in--8fb107ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4003%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6b80b7ef31ef0b555fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3047-cwe-918-server-side-request-forgery--a400ffae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3047%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpovernight%20PDF%20Invoices%20%26%20Packing%20Slips%20for%20WooCommerce&amp;severity=high&amp;id=699f6c8ab7ef31ef0b566133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0847-cwe-352-cross-site-request-forgery-c-7805f146</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0847%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%205280studios%205280%20Bootstrap%20Modal%20Contact%20Form&amp;severity=medium&amp;id=699f6de6b7ef31ef0b590641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4334-cwe-79-improper-neutralization-of-in-27d5dbdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4334%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20divisupreme%20Supreme%20Modules%20Lite%20%E2%80%93%20Divi%20Theme%2C%20Extra%20Theme%20and%20Divi%20Builder&amp;severity=medium&amp;id=699f6b88b7ef31ef0b5564e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3957-cwe-94-improper-control-of-generatio-b825d2a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3957%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b5670a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2840-cwe-79-improper-neutralization-of-in-19d4927f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2840%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webbistro%20Enhanced%20Media%20Library&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3717-cwe-922-insecure-storage-of-sensitiv-36d19980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3717%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20glenwpcoder%20Drag%20and%20Drop%20Multiple%20File%20Upload%20%E2%80%93%20Contact%20Form%207&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4083-cwe-352-cross-site-request-forgery-c-4004c495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4083%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20way2neelam%20Easy%20Restaurant%20Table%20Booking&amp;severity=medium&amp;id=699f6b80b7ef31ef0b556061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1896-cwe-502-deserialization-of-untrusted-55bf0054</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1896%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Photo%20Gallery%20%E2%80%93%20Responsive%20Photo%20Gallery%2C%20Image%20Gallery%2C%20Portfolio%20Gallery%2C%20Logo%20Gallery%20And%20Team%20Gallery&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2345-cwe-80-improper-neutralization-of-sc-67c72415</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2345%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=6942f8e8847f7e98df04b55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3107-cwe-22-improper-limitation-of-a-path-2749dac1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3107%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20brainstormforce%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b566268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1959-cwe-79-improper-neutralization-of-in-9028a887</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1959%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20warfareplugins%20Social%20Sharing%20Plugin%20%E2%80%93%20Social%20Warfare&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fd94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2085-cwe-79-improper-neutralization-of-in-417cacef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2085%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6da4b7ef31ef0b589c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1348-cwe-79-improper-neutralization-of-in-179d65d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3074-cwe-79-improper-neutralization-of-in-dd65bc57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3074%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flickdevs%20Elementor%20ImageBox&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b566258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3520-cwe-862-missing-authorization-in-tru-011e9e00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3520%3A%20CWE-862%20Missing%20Authorization%20in%20trustyplugins%20Country%20State%20City%20Dropdown%20CF7&amp;severity=medium&amp;id=699f6c93b7ef31ef0b5666f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2831-cwe-89-improper-neutralization-of-sp-78956ebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2831%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kieranoshea%20Calendar&amp;severity=high&amp;id=699f6db7b7ef31ef0b58b506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3585-cwe-862-missing-authorization-in-flo-0f6e7f3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3585%3A%20CWE-862%20Missing%20Authorization%20in%20florent73%20Send%20PDF%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6c95b7ef31ef0b56686b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3581-cwe-862-missing-authorization-in-max-db8b7c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3581%3A%20CWE-862%20Missing%20Authorization%20in%20maxfoundry%20MaxGalleria&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3023-cwe-79-improper-neutralization-of-in-caa12361</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3023%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20restpack%20AnnounceKit&amp;severity=medium&amp;id=699f6c8ab7ef31ef0b56611a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1945-cwe-862-missing-authorization-in-rep-0a75ac60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1945%3A%20CWE-862%20Missing%20Authorization%20in%20reputeinfosystems%20Contact%20Form%2C%20Survey%20%26%20Popup%20Form%20Plugin%20for%20WordPress%20%E2%80%93%20%20ARForms%20Form%20Builder&amp;severity=high&amp;id=699f6d44b7ef31ef0b56f897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4406-cwe-79-improper-neutralization-of-in-cfff1a2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4406%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xiaomi%20Pro%2013&amp;severity=high&amp;id=699f6b8cb7ef31ef0b556804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4405-cwe-79-improper-neutralization-of-in-468b3051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4405%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Xiaomi%20Pro%2013&amp;severity=high&amp;id=699f6b8cb7ef31ef0b556801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4029-allocation-of-resources-without-limi-24b9eae6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4029%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling&amp;severity=medium&amp;id=68faafd950358b89bd7bfd45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30251-cwe-835-loop-with-unreachable-exit--6d1b8948</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30251%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20aio-libs%20aiohttp&amp;severity=high&amp;id=6909214afe7723195e0544d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3005-cwe-79-improper-neutralization-of-in-d3fc501a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6c89b7ef31ef0b566092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3883-cwe-79-improper-neutralization-of-in-e16da6ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Flipbook%20WordPress&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3280-cwe-80-improper-neutralization-of-sc-a97fd9a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3280%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpsitenet%20Follow%20Us%20Badges&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3490-cwe-79-improper-neutralization-of-in-ee4a5d5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3490%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6c93b7ef31ef0b566669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29309-na-c3407f92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29309%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b5894be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25290-na-efdc56d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25290%3A%20n%2Fa&amp;severity=high&amp;id=699f6d63b7ef31ef0b571c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33396-na-54b3435d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33396%3A%20n%2Fa&amp;severity=high&amp;id=699f6c40b7ef31ef0b561951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33394-na-c5c4913e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33394%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c40b7ef31ef0b56194e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33303-na-7448d4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33303%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b561825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33302-na-244afb61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33302%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3db7ef31ef0b561786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32359-na-ba11fb8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32359%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b56129c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31967-na-d2036c84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31967%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c30b7ef31ef0b560f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31966-na-e8345dca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31966%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31965-na-76ad49bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31965%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31964-na-14f4c982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31964%3A%20n%2Fa&amp;severity=high&amp;id=699f6c30b7ef31ef0b560f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31963-na-aed41e2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31963%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-02-f12bfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29011-cwe-259-use-of-hard-coded-password--886c3788</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29011%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20SonicWall%20GMS&amp;severity=high&amp;id=69418d7b9050fe8508ffc246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47212-cwe-190-integer-overflow-or-wraparo-035dbbb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47212%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20stb%20stb_vorbis.c&amp;severity=critical&amp;id=690a3b5cff58c9332ff08e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47166-cwe-285-improper-authorization-in-m-531205f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47166%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a3b5cff58c9332ff08e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27392-vulnerability-in-linux-linux-be3332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27392%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27391-vulnerability-in-linux-linux-be332e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27391%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe332e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27390-vulnerability-in-linux-linux-be332a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27390%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27389-vulnerability-in-linux-linux-be3326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27389%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27388-vulnerability-in-linux-linux-be3315</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27388%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27080-vulnerability-in-linux-linux-bddbd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27079-vulnerability-in-linux-linux-be330d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe330d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27078-vulnerability-in-linux-linux-be3305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27077-vulnerability-in-linux-linux-be3301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27076-vulnerability-in-linux-linux-be32fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27075-vulnerability-in-linux-linux-bddbcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27074-vulnerability-in-linux-linux-be32f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27073-vulnerability-in-linux-linux-be32d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27072-vulnerability-in-linux-linux-be32cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27071-vulnerability-in-linux-linux-be32c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27070-vulnerability-in-linux-linux-be32b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe32b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27069-vulnerability-in-linux-linux-be32ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27068-vulnerability-in-linux-linux-be32a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe32a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27067-vulnerability-in-linux-linux-be329e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d982ac4522896dcbe329e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27066-vulnerability-in-linux-linux-be329a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe329a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27065-vulnerability-in-linux-linux-be3296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27064-vulnerability-in-linux-linux-bddbc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52653-vulnerability-in-linux-linux-be71f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52652-vulnerability-in-linux-linux-be71f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48669-vulnerability-in-linux-linux-be5e29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27063-vulnerability-in-linux-linux-be3292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27062-vulnerability-in-linux-linux-be325f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe325f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27061-vulnerability-in-linux-linux-be3255</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27060-vulnerability-in-linux-linux-be324d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe324d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27059-vulnerability-in-linux-linux-be3247</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27058-vulnerability-in-linux-linux-be3243</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27057-vulnerability-in-linux-linux-be323f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe323f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27056-vulnerability-in-linux-linux-be323b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe323b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27054-vulnerability-in-linux-linux-be322e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe322e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27053-vulnerability-in-linux-linux-be322a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=critical&amp;id=682d982ac4522896dcbe322a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27052-vulnerability-in-linux-linux-be3226</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27051-vulnerability-in-linux-linux-be31fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27050-vulnerability-in-linux-linux-be31f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27049-vulnerability-in-linux-linux-be31f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe31f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27048-vulnerability-in-linux-linux-be31ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27047-vulnerability-in-linux-linux-be31ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27046-vulnerability-in-linux-linux-be31e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27045-vulnerability-in-linux-linux-be31e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe31e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27044-vulnerability-in-linux-linux-be31d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27043-vulnerability-in-linux-linux-be31cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe31cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27042-vulnerability-in-linux-linux-be31c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27042&amp;severity=null&amp;id=682d982ac4522896dcbe31c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27041-vulnerability-in-linux-linux-be31a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe31a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27040-vulnerability-in-linux-linux-be319f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe319f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27039-vulnerability-in-linux-linux-be319b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe319b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27038-vulnerability-in-linux-linux-be3197</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27037-vulnerability-in-linux-linux-be3193</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27036-vulnerability-in-linux-linux-be318f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe318f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27035-vulnerability-in-linux-linux-be318b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe318b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27034-vulnerability-in-linux-linux-be3187</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe3187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27033-vulnerability-in-linux-linux-be3183</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27032-vulnerability-in-linux-linux-bddbc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27031-vulnerability-in-linux-linux-be317f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe317f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27030-vulnerability-in-linux-linux-be315f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe315f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27029-vulnerability-in-linux-linux-be315b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe315b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27028-vulnerability-in-linux-linux-be314a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe314a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52650-vulnerability-in-linux-linux-be71ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52649-vulnerability-in-linux-linux-be71e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27027-vulnerability-in-linux-linux-be3142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27026-vulnerability-in-linux-linux-be313a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe313a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27025-vulnerability-in-linux-linux-be3132</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27024-vulnerability-in-linux-linux-bddbc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27023-vulnerability-in-linux-linux-be312a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe312a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4060-use-after-free-in-google-chrome-60f99d2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4060%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690a3b58ff58c9332ff08ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4059-out-of-bounds-read-in-google-chrome-c5a242dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4059%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=medium&amp;id=690a3b58ff58c9332ff08add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4058-type-confusion-in-google-chrome-07a6a312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4058%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=critical&amp;id=690a3b58ff58c9332ff08ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0334-cwe-79-improper-neutralization-of-in-9a3771f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0334%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27022-vulnerability-in-linux-linux-be3124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe3124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27021-vulnerability-in-linux-linux-be3120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27020-vulnerability-in-linux-linux-be311e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe311e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27019-vulnerability-in-linux-linux-be30ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27018-vulnerability-in-linux-linux-bddbbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27017-vulnerability-in-linux-linux-bddba3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27016-vulnerability-in-linux-linux-be30e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27015-vulnerability-in-linux-linux-be30df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe30df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27014-vulnerability-in-linux-linux-be30d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27013-vulnerability-in-linux-linux-be30d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27012-vulnerability-in-linux-linux-bddb9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27011-vulnerability-in-linux-linux-be30cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27010-vulnerability-in-linux-linux-be30c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27009-vulnerability-in-linux-linux-be30c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe30c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27008-vulnerability-in-linux-linux-be30b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27007-vulnerability-in-linux-linux-be30b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe30b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27006-vulnerability-in-linux-linux-be308e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe308e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27005-vulnerability-in-linux-linux-bddb9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27004-vulnerability-in-linux-linux-be3086</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe3086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27003-vulnerability-in-linux-linux-be307e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe307e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27002-vulnerability-in-linux-linux-be307a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe307a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27001-vulnerability-in-linux-linux-be3076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27000-vulnerability-in-linux-linux-be3072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26999-vulnerability-in-linux-linux-be3063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26998-vulnerability-in-linux-linux-bddb97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26997-vulnerability-in-linux-linux-bddb93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26996-vulnerability-in-linux-linux-be305b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe305b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26995-vulnerability-in-linux-linux-be3053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe3053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26994-vulnerability-in-linux-linux-be304f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe304f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26993-vulnerability-in-linux-linux-bddb8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26992-vulnerability-in-linux-linux-be302b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe302b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26991-vulnerability-in-linux-linux-be3023</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26990-vulnerability-in-linux-linux-be301b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe301b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26989-vulnerability-in-linux-linux-be3017</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26988-vulnerability-in-linux-linux-be3013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe3013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26987-vulnerability-in-linux-linux-be300f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe300f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26986-vulnerability-in-linux-linux-be3002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe3002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26985-vulnerability-in-linux-linux-be2ff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26984-vulnerability-in-linux-linux-be2fe9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26983-vulnerability-in-linux-linux-be2fe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26982-vulnerability-in-linux-linux-be2fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26981-vulnerability-in-linux-linux-be2fc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26980-vulnerability-in-linux-linux-be2fbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26936-vulnerability-in-linux-linux-be2e8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26978-vulnerability-in-linux-linux-be2fba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26977-vulnerability-in-linux-linux-be2fad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26976-vulnerability-in-linux-linux-be2fa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26975-vulnerability-in-linux-linux-be2fa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26975%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26974-vulnerability-in-linux-linux-be2fa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26973-vulnerability-in-linux-linux-be2f9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26971-vulnerability-in-linux-linux-be2f99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26970-vulnerability-in-linux-linux-be2f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26969-vulnerability-in-linux-linux-be2f75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26968-vulnerability-in-linux-linux-be2f71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26967-vulnerability-in-linux-linux-be2f6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26966-vulnerability-in-linux-linux-be2f67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26965-vulnerability-in-linux-linux-be2f63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26964-vulnerability-in-linux-linux-be2f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26963-vulnerability-in-linux-linux-be2f5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26962-vulnerability-in-linux-linux-be2f57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26961-vulnerability-in-linux-linux-be2f53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26960-vulnerability-in-linux-linux-be2f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26959-vulnerability-in-linux-linux-be2f2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26958-vulnerability-in-linux-linux-aebfd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26957-vulnerability-in-linux-linux-aebfd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26956-vulnerability-in-linux-linux-be2f1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26955-vulnerability-in-linux-linux-be2f1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26954-vulnerability-in-linux-linux-be2f16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26953-vulnerability-in-linux-linux-be2f12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26952-vulnerability-in-linux-linux-be2f0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26951-vulnerability-in-linux-linux-be2f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26950-vulnerability-in-linux-linux-be2f06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26949-vulnerability-in-linux-linux-be2f02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26948-vulnerability-in-linux-linux-be2ee9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26947-vulnerability-in-linux-linux-bddb8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26946-vulnerability-in-linux-linux-be2ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26946%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26945-vulnerability-in-linux-linux-be2ed8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26944-vulnerability-in-linux-linux-aeb018</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0f71484d88663aeb018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26943-vulnerability-in-linux-linux-be2ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26942-vulnerability-in-linux-linux-be2ed0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26941-vulnerability-in-linux-linux-be2ecc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26940-vulnerability-in-linux-linux-be2ec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26939-vulnerability-in-linux-linux-be2ec4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26938-vulnerability-in-linux-linux-be2ec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26937-vulnerability-in-linux-linux-be2eb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26935-vulnerability-in-linux-linux-bddb87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26934-vulnerability-in-linux-linux-be2e88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26933-vulnerability-in-linux-linux-be2e84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26932-vulnerability-in-linux-linux-be2e80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26931-vulnerability-in-linux-linux-be2e73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26930-vulnerability-in-linux-linux-be2e6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52648-vulnerability-in-linux-linux-be71e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52647-vulnerability-in-linux-linux-be71de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30176-na-95046af1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30176%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dbcb7ef31ef0b58d700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26504-na-44d834e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26504%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b572b68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25458-na-788952be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25458%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25355-na-32509a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25355%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24313-na-84dc37c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24313%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24312-na-f5c24121</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24312%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22830-na-ea3a6497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22830%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33835-na-8bbba124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33835%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c47b7ef31ef0b561d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33820-na-8915fc37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33820%3A%20n%2Fa&amp;severity=high&amp;id=699f6c46b7ef31ef0b561d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33775-na-571fadf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33775%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c45b7ef31ef0b561c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33768-na-01f5a41d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33768%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c45b7ef31ef0b561c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33766-na-d2c78fef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33766%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c45b7ef31ef0b561c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33763-na-999e83d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33763%3A%20n%2Fa&amp;severity=high&amp;id=699f6c45b7ef31ef0b561c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33442-na-d60da381</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33442%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c42b7ef31ef0b561a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33431-na-7a495490</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33431%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c42b7ef31ef0b561a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33430-na-b1145e8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33430%3A%20n%2Fa&amp;severity=high&amp;id=699f6c42b7ef31ef0b561a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33429-na-3962e31e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33429%3A%20n%2Fa&amp;severity=high&amp;id=699f6c42b7ef31ef0b561a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33428-na-e292c55e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33428%3A%20n%2Fa&amp;severity=high&amp;id=699f6c42b7ef31ef0b561a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33424-na-69671b09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33424%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c41b7ef31ef0b5619f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33423-na-cdb9fb26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33423%3A%20n%2Fa&amp;severity=high&amp;id=699f6c41b7ef31ef0b5619ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33393-na-a2bd7aea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33393%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c40b7ef31ef0b56194b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33306-na-5c50668e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33306%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b56182b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33304-na-c683d0b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33304%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3fb7ef31ef0b561828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33300-na-6b8f7254</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33300%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3db7ef31ef0b561783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33292-na-9fcaccce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33292%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3db7ef31ef0b561774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33078-na-697fb848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33078%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c39b7ef31ef0b5614a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32213-na-e11722c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32213%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b561073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32212-na-ab120ff3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32212%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b561070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32211-na-8c6c037d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32211%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b56106d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32210-na-e64422eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32210%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b56106a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25676-na-in-na-ac4442d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25676%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-05-01-f1305c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-05-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f1305c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4369-cleartext-storage-of-sensitive-infor-9877d262</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4369%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable&amp;severity=medium&amp;id=691f65fd40b920e2707f5ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3411-cwe-331-insufficient-entropy-in-dell-4c00f9cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3411%3A%20CWE-331%20Insufficient%20Entropy%20in%20Dell%20iDRAC8&amp;severity=critical&amp;id=690a3b52ff58c9332ff07419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25938-cwe-416-use-after-free-in-foxit-fox-794a21a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25938%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a3b63ff58c9332ff097ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25648-cwe-416-use-after-free-in-foxit-fox-24d471d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25648%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a3b63ff58c9332ff097a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25575-cwe-843-access-of-resource-using-in-5fbe7e05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25575%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a3b63ff58c9332ff0979d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4340-cwe-674-uncontrolled-recursion-44dece8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4340%3A%20CWE-674%20Uncontrolled%20Recursion&amp;severity=high&amp;id=690929a9fe7723195e0fd624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2617-vulnerability-in-hitachi-energy-rtu5-4b00b78f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2617%3A%20Vulnerability%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=high&amp;id=69a82324d1a09e29cb345e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2663-cwe-918-server-side-request-forgery--c0242317</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2663%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20websmokers%20ZD%20YouTube%20FLV%20Player&amp;severity=high&amp;id=699f6db4b7ef31ef0b58b12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4185-cwe-330-use-of-insufficiently-random-cd2746a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4185%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20algoritmika%20Customer%20Email%20Verification%20for%20WooCommerce&amp;severity=high&amp;id=699f6b84b7ef31ef0b55625f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3072-cwe-862-missing-authorization-in-hor-cdc60094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3072%3A%20CWE-862%20Missing%20Authorization%20in%20horiondigital%20ACF%20Front%20End%20Editor&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b566250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1895-cwe-502-deserialization-of-untrusted-f6737011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1895%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Event%20Monster%20%E2%80%93%20Event%20Management%2C%20Tickets%20Booking%2C%20Upcoming%20Event&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1371-cwe-862-missing-authorization-in-var-9046c827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1371%3A%20CWE-862%20Missing%20Authorization%20in%20varunvairavanlc%20LeadConnector&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0216-cwe-918-server-side-request-forgery--26f84184</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0216%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20levertechadmin%20Google%20Doc%20Embedder&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29384-na-c4b3ab6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29384%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9db7ef31ef0b5895a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29320-na-929e6ff4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29320%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b5894c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28716-na-535f297f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28716%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b589049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28269-na-058a057b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28269%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8ab7ef31ef0b58810f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26331-na-d8db5f16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26331%3A%20n%2Fa&amp;severity=high&amp;id=699f6d75b7ef31ef0b572517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23774-na-0e7833d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23774%3A%20n%2Fa&amp;severity=high&amp;id=699f6d54b7ef31ef0b570604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23773-na-a366ae9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23773%3A%20n%2Fa&amp;severity=high&amp;id=699f6d54b7ef31ef0b570600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23772-na-46cd300d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23772%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d54b7ef31ef0b5705fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22546-na-c0a79ec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22546%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b570113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34149-na-9e0f6408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34149%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4cb7ef31ef0b562178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34088-na-1f6462b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34088%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b562169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33832-na-070a70e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33832%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c47b7ef31ef0b561d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33831-na-c3386d24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33831%3A%20n%2Fa&amp;severity=high&amp;id=699f6c46b7ef31ef0b561d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33465-na-68e32320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33465%3A%20n%2Fa&amp;severity=high&amp;id=699f6c43b7ef31ef0b561b10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33383-na-ffe57567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33383%3A%20n%2Fa&amp;severity=high&amp;id=699f6c40b7ef31ef0b561946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33371-na-270885f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33371%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3fb7ef31ef0b5618db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33309-na-03a1a1a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33309%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b561833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33308-na-54fb5ea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33308%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3fb7ef31ef0b56182e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33275-na-87b65083</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33275%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3db7ef31ef0b561769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33274-na-7b06a7f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33274%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3cb7ef31ef0b561700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33273-na-b072f5cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33273%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3cb7ef31ef0b5616fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33270-na-09a1ef25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33270%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3cb7ef31ef0b5616ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33267-na-f68d0c85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33267%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3cb7ef31ef0b5616e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33103-na-4c770734</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33103%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b5614af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33102-na-34e558ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33102%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b5614ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33101-na-ee4d023a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33101%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b5614a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31837-na-dcf29916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31837%3A%20n%2Fa&amp;severity=high&amp;id=69092623fe7723195e0b473b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-30-f12dac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34010-cwe-428-in-acronis-acronis-cyber-pr-065e78a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34010%3A%20CWE-428%20in%20Acronis%20Acronis%20Cyber%20Protect%20Cloud%20Agent&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33571-improper-neutralization-of-input-du-e730590d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33571%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Infomaniak%20Network%20VOD%20Infomaniak&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33648-cwe-79-improper-neutralization-of-i-c4109d06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33648%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kemory%20Grubb%20Recencio%20Book%20Reviews&amp;severity=null&amp;id=699575bd80d747be20537854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1874-cwe-116-improper-encoding-or-escapin-e046ed87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1874%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20PHP%20Group%20PHP&amp;severity=critical&amp;id=690a3b61ff58c9332ff09425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2757-vulnerability-in-php-group-php-e91ddd99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2757%3A%20Vulnerability%20in%20PHP%20Group%20PHP&amp;severity=high&amp;id=690a3b69ff58c9332ff0a5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3096-cwe-20-improper-input-validation-in--78f4fde2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3096%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=690a3b52ff58c9332ff07411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2756-cwe-20-improper-input-validation-in--6b502239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2756%3A%20CWE-20%20Improper%20Input%20Validation%20in%20PHP%20Group%20PHP&amp;severity=medium&amp;id=690a3b69ff58c9332ff0a5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31823-na-cb7ab980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31823%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f7ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31822-na-af7578c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31822%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd8b7ef31ef0b58f756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31821-na-c6e4d462</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31821%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31820-na-df038039</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31820%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd8b7ef31ef0b58f74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31801-na-53792dfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31801%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd6b7ef31ef0b58f653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31747-na-28ee81ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31747%3A%20n%2Fa&amp;severity=low&amp;id=699f6dd5b7ef31ef0b58f0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31621-na-a56a5347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31621%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd4b7ef31ef0b58ef95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28320-na-f228c5df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28320%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8cb7ef31ef0b5883dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28294-na-b739af20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28294%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8cb7ef31ef0b5883b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27518-na-67620efc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27518%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57ce5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23995-na-7c4a4cee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23995%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d54b7ef31ef0b57060a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34050-na-ba3a8f2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34050%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b5620e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34049-na-15c34a46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34049%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b5620df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34048-na-6d068695</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34048%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c4cb7ef31ef0b5620db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34047-na-6a841b29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34047%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4cb7ef31ef0b5620d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34046-na-d2ac2253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34046%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b5620d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34045-na-ac6a7944</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34045%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4cb7ef31ef0b5620d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34044-na-39a7f71d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34044%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4ab7ef31ef0b56204d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34020-na-a5db7db3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34020%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4ab7ef31ef0b562049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33905-na-ac82a14e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33905%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4ab7ef31ef0b562043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33904-na-ef4e441e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33904%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4ab7ef31ef0b56203e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33903-na-d44e5eb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33903%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4ab7ef31ef0b562037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33449-na-a70cb83e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33449%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c43b7ef31ef0b561b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33445-na-48daa12b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33445%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c43b7ef31ef0b561b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33444-na-584b55eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33444%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c42b7ef31ef0b561a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33438-na-8911fc8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33438%3A%20n%2Fa&amp;severity=high&amp;id=699f6c42b7ef31ef0b561a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33435-na-e5356265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33435%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c42b7ef31ef0b561a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33350-na-d6eaad3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33350%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3fb7ef31ef0b5618cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33345-na-2f0e9fb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33345%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3fb7ef31ef0b5618c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33338-na-e4a44aa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33338%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b56184a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33276-na-a9d7be49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33276%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3db7ef31ef0b56176d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33272-na-e78bf491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33272%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3cb7ef31ef0b5616f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33271-na-1ee32d32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33271%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3cb7ef31ef0b5616f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33269-na-69da16f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33269%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3cb7ef31ef0b5616ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33268-na-62c6e353</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33268%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3cb7ef31ef0b5616e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33266-na-88d5b0fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33266%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3cb7ef31ef0b5616e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32493-na-42346d19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32493%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b56140a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32492-na-11fff95c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32492%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b561406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32491-na-a0c2babe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32491%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c37b7ef31ef0b561402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32269-na-4f577086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32269%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b5610e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31705-na-03dce11f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31705%3A%20n%2Fa&amp;severity=critical&amp;id=690a47656d939959c8023083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-29-f127f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48668-vulnerability-in-linux-linux-be5e25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48667-vulnerability-in-linux-linux-be5e21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48666-vulnerability-in-linux-linux-be5e1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48665-vulnerability-in-linux-linux-be5e19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48664-vulnerability-in-linux-linux-bdd4d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48663-vulnerability-in-linux-linux-be5dfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48662-vulnerability-in-linux-linux-be5df9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48661-vulnerability-in-linux-linux-be5df5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48660-vulnerability-in-linux-linux-be5df1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48659-vulnerability-in-linux-linux-be5ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48658-vulnerability-in-linux-linux-be5de9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48657-vulnerability-in-linux-linux-be5de5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48656-vulnerability-in-linux-linux-be5de1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48655-vulnerability-in-linux-linux-be5ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48654-vulnerability-in-linux-linux-be5dce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48653-vulnerability-in-linux-linux-be5db7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48652-vulnerability-in-linux-linux-bdd4cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48651-vulnerability-in-linux-linux-be5db3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48650-vulnerability-in-linux-linux-be5daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48650%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48649-vulnerability-in-linux-linux-be5dab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48648-vulnerability-in-linux-linux-be5da7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48647-vulnerability-in-linux-linux-bdd4c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9820c4522896dcbdd4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48646-vulnerability-in-linux-linux-be5da3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48645-vulnerability-in-linux-linux-be5d92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48644-vulnerability-in-linux-linux-be5d8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48643-vulnerability-in-linux-linux-be5d88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48642-vulnerability-in-linux-linux-be5d80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48641-vulnerability-in-linux-linux-be5d6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48640-vulnerability-in-linux-linux-be5d5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48639-vulnerability-in-linux-linux-be5d52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48638-vulnerability-in-linux-linux-be5d4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48637-vulnerability-in-linux-linux-be5d46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5d46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48636-vulnerability-in-linux-linux-be5d35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48635-vulnerability-in-linux-linux-be5d2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48634-vulnerability-in-linux-linux-be5d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48633-vulnerability-in-linux-linux-be5d1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48632-vulnerability-in-linux-linux-be5d0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48631-vulnerability-in-linux-linux-be5cf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26928-vulnerability-in-linux-linux-be2e6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26927-vulnerability-in-linux-linux-be2e5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33899-na-94fd291b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33899%3A%20n%2Fa&amp;severity=high&amp;id=699f6c4ab7ef31ef0b562033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33883-na-ee1461c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33883%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c4ab7ef31ef0b56201f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-28-f12ff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3309-cwe-79-improper-neutralization-of-in-9364e8bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3309%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6c91b7ef31ef0b56654a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3342-cwe-89-improper-neutralization-of-sp-03ca1878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3342%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jetmonsters%20Timetable%20and%20Event%20Schedule%20by%20MotoPress&amp;severity=critical&amp;id=6925c2045b1d823317eed0e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3034-cwe-22-improper-limitation-of-a-path-521984a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3034%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20willmot%20BackUpWordPress&amp;severity=low&amp;id=699f6c8ab7ef31ef0b56612a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2838-cwe-79-improper-neutralization-of-in-ebe83f1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2838%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpclever%20WPC%20Composite%20Products%20for%20WooCommerce&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2258-cwe-79-improper-neutralization-of-in-6972cf0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33851-na-f3aabba1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33851%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c47b7ef31ef0b561d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-04-27-882e4a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-04-27&amp;severity=medium&amp;id=682b68f8d14de609c8882e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-27-f122fa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f122fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33689-cross-site-request-forgery-csrf-in--3841a760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33689%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Tony%20Zeoli%20Radio%20Station&amp;severity=null&amp;id=69cd7432e6bfc5ba1def6349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52646-vulnerability-in-linux-linux-be71da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33678-cross-site-request-forgery-csrf-in--70c04485</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33678%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20eranfl%20ClickCease%20Click%20Fraud%20Protection&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3682-cwe-200-information-exposure-in-rene-e7bd3d34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3682%3A%20CWE-200%20Information%20Exposure%20in%20renehermi%20WP%20STAGING%20WordPress%20Backup%20Plugin%20%E2%80%93%20Migration%20Backup%20Restore&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1789-cwe-89-improper-neutralization-of-sp-8fcb72a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1789%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jack-kitterhing%20WP%20SMTP&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f4df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3962-cwe-434-unrestricted-upload-of-file--3c733ae0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3962%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20Product%20Addons%20%26%20Fields%20for%20WooCommerce&amp;severity=critical&amp;id=699f6ca1b7ef31ef0b5670ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2920-cwe-200-information-exposure-in-cbut-f0ed1434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2920%3A%20CWE-200%20Information%20Exposure%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3678-cwe-862-missing-authorization-in-pr--c0b0e65a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3678%3A%20CWE-862%20Missing%20Authorization%20in%20pr-gateway%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3890-cwe-79-improper-neutralization-of-in-90cd304c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4056-cwe-1333-inefficient-regular-express-78071589</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4056%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=high&amp;id=699c2930be58cf853b7275e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3154-improper-neutralization-of-special-e-0d2538bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3154%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)&amp;severity=high&amp;id=691ec3729f5a9374a9d10fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31828-na-7a40e8bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31828%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f7b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31755-na-e87f440d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31755%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd5b7ef31ef0b58f0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31741-na-42f7f649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31741%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31601-na-0f97eb50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31601%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd3b7ef31ef0b58eef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31551-na-50ddc06b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31551%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58ee64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31502-na-8fa18f41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31502%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd2b7ef31ef0b58ee28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28328-na-b1dba85f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28328%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8db7ef31ef0b588555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28327-na-2c1b1173</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28327%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8db7ef31ef0b588551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28326-na-64ea2a62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28326%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8db7ef31ef0b58854d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28325-na-40a38db2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28325%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8db7ef31ef0b588549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28322-na-746764b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28322%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8db7ef31ef0b588541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25343-na-f4dcf0b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25343%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d65b7ef31ef0b571ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22633-na-257cd3da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22633%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4bb7ef31ef0b570163</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33673-na-ca1626d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33673%3A%20n%2Fa&amp;severity=high&amp;id=699f6c44b7ef31ef0b561c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33672-na-98d06c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33672%3A%20n%2Fa&amp;severity=high&amp;id=699f6c44b7ef31ef0b561c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33671-na-e11d6f69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33671%3A%20n%2Fa&amp;severity=high&amp;id=699f6c44b7ef31ef0b561c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33670-na-f449bf5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33670%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c44b7ef31ef0b561c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33669-na-000638a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33669%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c44b7ef31ef0b561c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33668-na-f60006d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33668%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c44b7ef31ef0b561c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33667-na-65fb5618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33667%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c44b7ef31ef0b561c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33666-na-6b8d3b8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33666%3A%20n%2Fa&amp;severity=high&amp;id=699f6c44b7ef31ef0b561c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33665-na-cc7376b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33665%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c43b7ef31ef0b561b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33344-na-70a74027</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33344%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3fb7ef31ef0b5618c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33343-na-fee09b48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33343%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b5618c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33342-na-a287a9b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33342%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3fb7ef31ef0b5618bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33263-na-6d11db66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33263%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3cb7ef31ef0b5616df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33260-na-4844d8aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33260%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b56165b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33259-na-932659c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33259%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b561658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33258-na-8b3954f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33258%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b561655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33255-na-e48e68a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33255%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b561652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32404-na-0b7485f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32404%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c37b7ef31ef0b561388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32406-na-dcc9f608</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32406%3A%20n%2Fa&amp;severity=high&amp;id=6942d536b2cbfb3efaa86df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-26-7496fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-26&amp;severity=medium&amp;id=682c7abbe3e6de8ceb7496fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-26-f12f5a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3624-plaintext-storage-of-a-password-e030268f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3624%3A%20Plaintext%20Storage%20of%20a%20Password&amp;severity=high&amp;id=691f628a40b920e2707a8c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3625-plaintext-storage-of-a-password-f51c1aa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3625%3A%20Plaintext%20Storage%20of%20a%20Password&amp;severity=high&amp;id=691f628a40b920e2707a8c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3623-plaintext-storage-of-a-password-217fa8e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3623%3A%20Plaintext%20Storage%20of%20a%20Password&amp;severity=medium&amp;id=691ec3739f5a9374a9d10ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3622-plaintext-storage-of-a-password-7e606d59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3622%3A%20Plaintext%20Storage%20of%20a%20Password&amp;severity=high&amp;id=691ec3739f5a9374a9d10ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3508-uncontrolled-resource-consumption-54e47dc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3508%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f698540b920e2708380f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2905-incorrect-permission-assignment-for-critical-resource-b424fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2905%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource&amp;severity=medium&amp;id=682d58114d7c5ea9f4b424fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2467-observable-discrepancy-34d28646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2467%3A%20Observable%20Timing%20Discrepancy&amp;severity=medium&amp;id=691f65fd40b920e2707f5ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1726-improper-preservation-of-permissions-df837726</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1726%3A%20Improper%20Preservation%20of%20Permissions&amp;severity=medium&amp;id=69200c2a59bb91a9a9a60fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1657-missing-origin-validation-in-websock-850de2bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1657%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information&amp;severity=high&amp;id=691ec3729f5a9374a9d10f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1139-exposure-of-sensitive-information-to-5c96289d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1139%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=high&amp;id=690021eeba6dffc5e2226804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1102-unprotected-transport-of-credentials-f70cc239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1102%3A%20Unprotected%20Transport%20of%20Credentials&amp;severity=medium&amp;id=68fb65c0e72abe4943328fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0874-use-of-cache-containing-sensitive-in-86ea9723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0874%3A%20Use%20of%20Cache%20Containing%20Sensitive%20Information&amp;severity=medium&amp;id=691362a4f922b639ab5baf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6787-improper-authentication-97a3fce9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6787%3A%20Improper%20Authentication&amp;severity=medium&amp;id=69135f1ff922b639ab566fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6717-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-bd8717</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6717%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=682d9819c4522896dcbd8717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6596-uncontrolled-resource-consumption-ce455562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6596%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=6917ccfcb6d0b801e4c5bb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6544-permissive-regular-expression-89731878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6544%3A%20Permissive%20Regular%20Expression&amp;severity=medium&amp;id=69135f1ff922b639ab566fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6484-improper-output-neutralization-for-l-3ba662d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6484%3A%20Improper%20Output%20Neutralization%20for%20Logs&amp;severity=medium&amp;id=69136629f922b639ab601284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5675-improper-authorization-d9055d15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5675%3A%20Improper%20Authorization&amp;severity=medium&amp;id=691f5c4ce672cd9080e8d3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3597-improper-authentication-7073c34c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3597%3A%20Improper%20Authentication&amp;severity=medium&amp;id=69135f1ff922b639ab566fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1347-cwe-290-authentication-bypass-by-spoofing-in-gitlab-gitlab-253fe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1347%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2434-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-gitlab-gitlab-253fec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2434%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2829-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253fee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2829%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3730-cwe-79-improper-neutralization-of-in-4569dc01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Membership&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3994-cwe-79-improper-neutralization-of-in-576623c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3994%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6ca3b7ef31ef0b567159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4035-cwe-79-improper-neutralization-of-in-9726e11b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4035%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gt3themes%20Photo%20Gallery%20%E2%80%93%20GT3%20Image%20Gallery%20%26%20Gutenberg%20Block%20Gallery&amp;severity=medium&amp;id=699f6b80b7ef31ef0b555fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32961-improper-neutralization-of-input-du-35f647b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32961%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3733-cwe-200-information-exposure-in-wpde-08d7a547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3733%3A%20CWE-200%20Information%20Exposure%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3893-cwe-862-missing-authorization-in-tec-4dde2697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3893%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3988-cwe-79-improper-neutralization-of-in-eecb2102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shaonsina%20Sina%20Extension%20for%20Elementor%20(Slider%2C%20Gallery%2C%20Form%2C%20Modal%2C%20Data%20Table%2C%20Tab%2C%20Particle%2C%20Free%20Elementor%20Widgets%20%26%20Elementor%20Templates)&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b5670bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3929-cwe-79-improper-neutralization-of-in-44380ca6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3929%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pt-guy%20Content%20Views%20%E2%80%93%20Post%20Grid%20%26%20Filter%2C%20Recent%20Posts%2C%20Category%20Posts%2C%20%26%20More%20(Gutenberg%20Blocks%20and%20Shortcode)&amp;severity=medium&amp;id=699f6ca1b7ef31ef0b567014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31615-na-e0956223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31615%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd4b7ef31ef0b58ef8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31610-na-5f8ec6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31610%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58eef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31609-na-9713d345</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31609%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58eef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31574-na-a03fd013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31574%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58eedc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30939-na-00ba5173</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30939%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58eab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30890-na-cac7073c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30890%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58eaa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29660-na-be749719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29660%3A%20n%2Fa&amp;severity=medium&amp;id=699f6da0b7ef31ef0b58986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33664-na-b5ab3207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33664%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c43b7ef31ef0b561b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33663-na-41283278</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33663%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c43b7ef31ef0b561b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33661-na-0c693283</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33661%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c43b7ef31ef0b561b18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32324-na-b3b38268</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32324%3A%20n%2Fa&amp;severity=high&amp;id=699f6c35b7ef31ef0b561218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32236-na-9b80889f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32236%3A%20n%2Fa&amp;severity=low&amp;id=699f6c32b7ef31ef0b5610d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-25-f124cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f124cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices-f0c2d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ArcaneDoor%20-%20New%20espionage-focused%20campaign%20found%20targeting%20perimeter%20network%20devices&amp;severity=high&amp;id=682acdbebbaf20d303f0c2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26926-vulnerability-in-linux-linux-bddb83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26925-vulnerability-in-linux-linux-bddb76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26924-vulnerability-in-linux-linux-be2e52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26923-vulnerability-in-linux-linux-be2e4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20358-improper-neutralization-of-special--e8adfaac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20358%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Secure%20Firewall%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=69a8695ad1a09e29cb4e1dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20359-improper-control-of-generation-of-c-7b9fa5e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20359%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=68f7d9b1247d717aace2690e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20353-loop-with-unreachable-exit-conditio-f62764f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20353%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=high&amp;id=68f7d9b1247d717aace26909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27791-an-app-may-be-able-to-corrupt-copro-8169cb3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27791%3A%20An%20app%20may%20be%20able%20to%20corrupt%20coprocessor%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47616d939959c8022f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23228-locked-notes-content-may-have-been--0bc200d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23228%3A%20Locked%20Notes%20content%20may%20have%20been%20unexpectedly%20unlocked%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a474e6d939959c802258f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23271-a-malicious-website-may-cause-unexp-431c749c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23271%3A%20A%20malicious%20website%20may%20cause%20unexpected%20cross-origin%20behavior%20in%20Apple%20Safari&amp;severity=high&amp;id=69ceb81de6bfc5ba1df6e1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32699-cross-site-request-forgery-csrf-in--8a12513f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32699%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20YITHEMES%20YITH%20WooCommerce%20Compare&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32702-improper-neutralization-of-input-du-2264d2e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32702%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32711-improper-neutralization-of-input-du-fee8a3f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32711%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Saad%20Iqbal%20myCred&amp;severity=null&amp;id=69cd742ee6bfc5ba1def6217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32791-improper-neutralization-of-input-du-95cddd9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32791%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd742ee6bfc5ba1def6228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32815-improper-neutralization-of-input-du-fa1a48ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32815%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Peters%20All-in-one%20Like%20Widget&amp;severity=null&amp;id=69cd742ee6bfc5ba1def6234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32956-improper-neutralization-of-input-du-a042f222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32956%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Rometheme%20RTMKit&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32706-improper-neutralization-of-special--893c0fb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32706%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20reputeinfosystems%20ARForms&amp;severity=null&amp;id=69cd742ee6bfc5ba1def6213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32782-insertion-of-sensitive-information--82a3f472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32782%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20DevItems%20HT%20Mega&amp;severity=null&amp;id=69cd742ee6bfc5ba1def6223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32796-insertion-of-sensitive-information--14dcb5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32796%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Jack%20Arturo%20WP%20Fusion%20Lite&amp;severity=null&amp;id=69cd742ee6bfc5ba1def6230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32817-deserialization-of-untrusted-data-i-5b743a2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32817%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Javier%20Carazo%20Import%20and%20export%20users%20and%20customers&amp;severity=null&amp;id=69cd7430e6bfc5ba1def6299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32836-unrestricted-upload-of-file-with-da-d689b073</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32836%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=null&amp;id=69cd7430e6bfc5ba1def62a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33531-na-81fe599a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33531%3A%20n%2Fa&amp;severity=high&amp;id=699f6c43b7ef31ef0b561b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-potential-abuse-by-lazarus-group-using-linke-38a686a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Potential%20abuse%20by%20Lazarus%20group%20using%20LinkedIn%20to%20spread%20malware&amp;severity=high&amp;id=68359ca25d5f0974d01fce6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-24-f12e81</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lazarus-infrastructure-pivot-via-censys-f0c2d4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lazarus%20infrastructure%20(pivot%20via%20Censys)&amp;severity=high&amp;id=682acdbebbaf20d303f0c2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-potential-abuse-by-lazarus-group-using-linkedin-to-spread-malware-f0c2d2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Potential%20abuse%20by%20Lazarus%20group%20using%20LinkedIn%20to%20spread%20malware&amp;severity=high&amp;id=682acdbebbaf20d303f0c2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21979-cwe-787-out-of-bounds-write-in-amd--00d29c5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21979%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Software%3A%20Adrenalin%20Edition&amp;severity=medium&amp;id=690a474b6d939959c80223c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21972-cwe-787-out-of-bounds-write-in-amd--b7b7bb0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21972%3A%20CWE-787%20Out-of-bounds%20Write%20in%20AMD%20AMD%20Software%3A%20Adrenalin%20Edition&amp;severity=medium&amp;id=690a474b6d939959c80223bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28130-cwe-704-incorrect-type-conversion-o-659f74bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28130%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20OFFIS%20DCMTK&amp;severity=high&amp;id=69092149fe7723195e05441a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32679-missing-authorization-in-anssi-lait-df80b69b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32679%3A%20Missing%20Authorization%20in%20Anssi%20Laitila%20Shared%20Files&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2477-cwe-79-improper-neutralization-of-in-f6749ba8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2477%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20advancedcoding%20Comments%20%E2%80%93%20wpDiscuz&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26922-vulnerability-in-linux-linux-be2e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3491-cwe-79-improper-neutralization-of-in-4fc95f71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=699f6c93b7ef31ef0b56666d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3732-cwe-79-improper-neutralization-of-in-f23a8fe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20paoltaia%20GeoDirectory%20%E2%80%93%20WordPress%20Business%20Directory%20Plugin%2C%20or%20Classified%20Directory&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3665-cwe-79-improper-neutralization-of-in-3958e426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rankmath%20Rank%20Math%20SEO%20with%20AI%20Best%20SEO%20Tools&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0900-cwe-862-missing-authorization-in-ele-bcb9b10f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0900%3A%20CWE-862%20Missing%20Authorization%20in%20elespare%20Elespare%20%E2%80%93%20Blog%2C%20Magazine%20and%20Newspaper%20Addons%20for%20Elementor%20with%20Templates%2C%20Widgets%2C%20Kits%2C%20and%20Header%2FFooter%20Builder.%20One%20Click%20Import%3A%20No%20Coding%20Required!&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3664-cwe-862-missing-authorization-in-hin-3e2bd9f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3664%3A%20CWE-862%20Missing%20Authorization%20in%20hinjiriyo%20Quick%20Featured%20Images&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3889-cwe-79-improper-neutralization-of-in-9b281082</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6c9fb7ef31ef0b566ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2798-cwe-79-improper-neutralization-of-in-d4ad595d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2798%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2799-cwe-79-improper-neutralization-of-in-dedab3ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2799%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3293-cwe-89-improper-neutralization-of-sp-983c4640</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3293%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rtcamp%20rtMedia%20for%20WordPress%2C%20BuddyPress%20and%20bbPress&amp;severity=high&amp;id=699f6c91b7ef31ef0b566524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31804-na-efc864ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31804%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd6b7ef31ef0b58f65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31616-na-683fa9c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31616%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd4b7ef31ef0b58ef92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30886-na-f6d3971c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30886%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58ea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30800-na-29851721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30800%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcab7ef31ef0b58e6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28627-na-b4ff627e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28627%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33217-na-0a9bc99a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33217%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b561649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33215-na-b6f399f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33215%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c3bb7ef31ef0b561646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33214-na-41233d83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33214%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b561643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33213-na-cd876a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33213%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c3bb7ef31ef0b561640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33212-na-0f326e39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33212%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b5615fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33211-na-e825f7eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33211%3A%20n%2Fa&amp;severity=high&amp;id=699f6c3bb7ef31ef0b5615fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32258-na-2285627b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32258%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b5610de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-23-f127fb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f127fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27348-rce-remote-command-execution-in-apa-6a331c2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27348%3A%20RCE-Remote%20Command%20Execution%20in%20Apache%20Software%20Foundation%20Apache%20HugeGraph-Server&amp;severity=critical&amp;id=68f7d9b2247d717aace269d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3645-cwe-79-improper-neutralization-of-in-143a2362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3645%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Essential%20Addons%20Essential%20Addons%20for%20Elementor%20Pro&amp;severity=medium&amp;id=699f6c97b7ef31ef0b566a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32698-improper-neutralization-of-input-du-d34b3dae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32698%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HappyMonster%20Happy%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31545-na-90908971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31545%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd3b7ef31ef0b58ee46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31036-na-f00fdb8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31036%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd2b7ef31ef0b58ed93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30799-na-cb634e4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30799%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcab7ef31ef0b58e6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29661-na-b0851a97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29661%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da0b7ef31ef0b589870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29376-na-adcb0a07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29376%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9db7ef31ef0b5895a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29368-na-309ee10e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29368%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9db7ef31ef0b58959c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28722-na-a24a9da1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28722%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b58908c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28717-na-a6a827ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b589059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28699-na-7aa61628</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28699%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28436-na-c91f6529</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28436%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27574-na-9224429c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27574%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d82b7ef31ef0b580a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22856-na-d9bb2cce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22856%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22815-na-73f00bd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22815%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22813-na-8b526429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22813%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b57027f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22809-na-cbaec909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22809%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b57027c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22808-na-bb487a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22808%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4db7ef31ef0b570279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22807-na-63dca253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22807%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32418-na-acf074f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32418%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c37b7ef31ef0b5613f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32407-na-b10fb1ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32407%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b56138b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32399-na-46b947f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32399%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b561384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32394-na-1d370e93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32394%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b561381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32368-na-da4b2e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32368%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b56136a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32238-na-a22db72b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32238%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c32b7ef31ef0b5610d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-22-f125ec</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f125ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-21-f12dae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4014-cwe-79-improper-neutralization-of-in-6849beec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4014%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hcaptcha%20hCaptcha%20for%20WordPress&amp;severity=medium&amp;id=699f6b80b7ef31ef0b555fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1730-cwe-79-improper-neutralization-of-in-13b881b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1730%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1057-cwe-79-improper-neutralization-of-in-eb912d72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1057%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-20-f129ad</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f129ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1681-cwe-117-improper-output-neutralizati-2f68675f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1681%3A%20CWE-117%20Improper%20Output%20Neutralization%20for%20Logs%20in%20corydolphin%20corydolphin%2Fflask-cors&amp;severity=medium&amp;id=690904b000ff46172d4a0e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29991-cwe-94-improper-control-of-generation-of-code-code-injection-in-microsoft-microsoft-edge-chromium-based-beb517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29991%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9837c4522896dcbeb517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3600-cwe-862-missing-authorization-in-ays-2dcf44de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3600%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Poll%20Maker%20%E2%80%93%20Best%20WordPress%20Poll%20Plugin&amp;severity=high&amp;id=699f6c97b7ef31ef0b56693e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3731-cwe-79-improper-neutralization-of-in-e06b927b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3731%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c9bb7ef31ef0b566c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3818-cwe-79-improper-neutralization-of-in-5f69e517</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3818%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3615-cwe-79-improper-neutralization-of-in-e78604ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3615%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20maxfoundry%20Media%20Library%20Folders&amp;severity=medium&amp;id=699f6c97b7ef31ef0b5669f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3598-cwe-79-improper-neutralization-of-in-d2f9e607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3598%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmet%20ElementsKit%20Pro&amp;severity=medium&amp;id=699f6c95b7ef31ef0b56688b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3560-cwe-79-improper-neutralization-of-in-2c2fe429</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3560%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6c95b7ef31ef0b5667d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25000-vulnerability-in-ivanti-avalanche-b0df87da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25000%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=694188253e7fd18214bf80cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23535-vulnerability-in-ivanti-avalanche-8b02baa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23535%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=69418d7a9050fe8508ffc09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24995-vulnerability-in-ivanti-avalanche-c74dd295</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24995%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=69418d7a9050fe8508ffc0ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24999-vulnerability-in-ivanti-avlanche-df5b5439</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24999%3A%20Vulnerability%20in%20Ivanti%20Avlanche&amp;severity=high&amp;id=69418d7a9050fe8508ffc0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24997-vulnerability-in-ivanti-avalanche-93c12284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24997%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=69418d7a9050fe8508ffc0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23534-vulnerability-in-ivanti-avalanche-f66bb651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23534%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=69418d789050fe8508ffbf65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27976-vulnerability-in-ivanti-avalanche-c6296e48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27976%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=69418d7b9050fe8508ffc23f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29204-vulnerability-in-ivanti-avalanche-f9161ebb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29204%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=critical&amp;id=69418d7b9050fe8508ffc249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27975-vulnerability-in-ivanti-avalanche-dd5e7f17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27975%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=high&amp;id=69418d7b9050fe8508ffc23c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31846-na-90d16522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31846%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31841-na-d3386198</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31841%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31744-na-f8a60782</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31744%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd5b7ef31ef0b58f086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31587-na-03773794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31587%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58eeee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31584-na-d6d144cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31584%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58eee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31552-na-e088e370</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31552%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58ee6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31547-na-aa54a4a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31547%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd3b7ef31ef0b58ee5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31546-na-dd36e791</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31546%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd3b7ef31ef0b58ee4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30974-na-b1b35235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30974%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27752-na-614a41ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27752%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22905-na-c1ea35d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22905%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b570322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32409-na-2c18fbc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32409%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b5613ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32392-na-973c57b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32392%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c37b7ef31ef0b56137e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32391-na-6e1a5b91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32391%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b56137b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32206-na-79e117d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32206%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b561065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32166-na-2ccf0686</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32166%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b561060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51798-na-15837d9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51798%3A%20n%2Fa&amp;severity=high&amp;id=690a3b61ff58c9332ff09411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51797-na-05d1ab99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51797%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b61ff58c9332ff09407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51796-na-d38e2169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51796%3A%20n%2Fa&amp;severity=low&amp;id=690a3b61ff58c9332ff093fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51795-na-221f6299</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51795%3A%20n%2Fa&amp;severity=high&amp;id=690a3b5fff58c9332ff09364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51793-na-c36b3932</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51793%3A%20n%2Fa&amp;severity=high&amp;id=690a3b5fff58c9332ff0935b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51792-na-1c35859e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51792%3A%20n%2Fa&amp;severity=low&amp;id=690a3b5fff58c9332ff09334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51791-na-0f28a996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51791%3A%20n%2Fa&amp;severity=high&amp;id=690a3b5fff58c9332ff09328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49501-na-f4e40368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49501%3A%20n%2Fa&amp;severity=high&amp;id=690a3b5dff58c9332ff08ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49502-na-ccac8b29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49502%3A%20n%2Fa&amp;severity=high&amp;id=69092637fe7723195e0b6233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22640-na-9b272d53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22640%3A%20n%2Fa&amp;severity=high&amp;id=690904b000ff46172d4a0e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50010-na-in-na-f45972df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50010%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6842ede271f4d251b5c8819b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50009-na-in-na-e3d1bc41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50009%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6842ede271f4d251b5c88198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50008-na-in-na-8f5fba2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50008%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6842ede271f4d251b5c88195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50007-na-in-na-d515b5b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50007%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6842ede271f4d251b5c88192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-19-ebc8eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-19&amp;severity=medium&amp;id=682b7badd3ddd8cef2ebc8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-19-f13090</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-19&amp;severity=medium&amp;id=682acdc2bbaf20d303f13090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-stopransomware-akira-ransomware-f0c2c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%23StopRansomware%3A%20Akira%20Ransomware&amp;severity=medium&amp;id=682acdbebbaf20d303f0c2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3758-concurrent-execution-using-shared-re-77f2d9a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3758%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=high&amp;id=68e84aedba0e608b4fb043cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29987-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-microsoft-edge-chromium-based-beb4f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29987%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9837c4522896dcbeb4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29986-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-microsoft-edge-chromium-based-beb4ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29986%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9837c4522896dcbeb4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24910-cwe-732incorrectpermissionassignmen-95158f63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24910%3A%20CWE-732%3AIncorrectPermissionAssignmentforCriticalResource%20in%20checkpoint%20ZoneAlarmExtremeSecurityNextGen%2CIdentityAgentforWindows%2CIdentityAgentforWindowsTerminalServer&amp;severity=high&amp;id=68e0f3c8b66c7f7acdd3eafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27306-cwe-79-improper-neutralization-of-i-70e79fcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27306%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69092148fe7723195e054409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32126-improper-neutralization-of-input-du-3b3310b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32126%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Jeroen%20Peters%20Navigation%20menu%20as%20Dropdown%20Widget&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32553-improper-neutralization-of-input-du-22b16043</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32553%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20looks_awesome%20Superfly%20Menu&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32564-improper-neutralization-of-input-du-43b7ab9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32564%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPXPO%20PostX&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32568-improper-neutralization-of-input-du-9c4e83dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32568%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Melapress%20WP%202FA&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26921-vulnerability-in-linux-linux-be2e29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9829c4522896dcbe2e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32573-improper-neutralization-of-input-du-7a1296b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32573%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2833-cwe-80-improper-neutralization-of-sc-10c0c0c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2833%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20blueglassch%20Jobs%20for%20WordPress&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32599-improper-control-of-generation-of-c-179e738d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32599%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Deepak%20anand%20WP%20Dummy%20Content%20Generator&amp;severity=null&amp;id=69cd742be6bfc5ba1def5c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1429-cwe-79-improper-neutralization-of-in-6463d209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1429%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1426-cwe-79-improper-neutralization-of-in-bc16de63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1426%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3931-cross-site-scripting-in-totara-lms-69e32519</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3931%3A%20Cross%20Site%20Scripting%20in%20Totara%20LMS&amp;severity=medium&amp;id=68487f591b0bd07c3938aaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31750-na-47130e20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31750%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30938-na-e03285b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30938%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dcdb7ef31ef0b58eaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30564-na-40072d79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30564%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc1b7ef31ef0b58dc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32335-na-ae44c6ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32335%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32334-na-107541ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32334%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b56122f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32333-na-fc26b5d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32333%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b56122b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32332-na-419b166b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32332%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32327-na-75f42d49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32327%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32326-na-6b2ba2af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32326%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b56121f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32325-na-42f8897a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32325%3A%20n%2Fa&amp;severity=low&amp;id=699f6c35b7ef31ef0b56121b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30929-na-f1dc8558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30929%3A%20n%2Fa&amp;severity=high&amp;id=690a47656d939959c8023075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30928-na-ee863085</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30928%3A%20n%2Fa&amp;severity=high&amp;id=690a47656d939959c8023071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30927-na-854f17f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30927%3A%20n%2Fa&amp;severity=medium&amp;id=690a47656d939959c802306d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30926-na-76e26760</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30926%3A%20n%2Fa&amp;severity=medium&amp;id=690a47656d939959c8023069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30925-na-b49f83e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30925%3A%20n%2Fa&amp;severity=medium&amp;id=690a47656d939959c8023065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30924-na-60cdbf51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30924%3A%20n%2Fa&amp;severity=medium&amp;id=690a47656d939959c8023061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30923-na-386070c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30923%3A%20n%2Fa&amp;severity=critical&amp;id=690a47636d939959c8022ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30922-na-40ead329</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30922%3A%20n%2Fa&amp;severity=critical&amp;id=690a47636d939959c8022ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30921-na-717be653</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30921%3A%20n%2Fa&amp;severity=medium&amp;id=690a47636d939959c8022fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30920-na-9272aac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30920%3A%20n%2Fa&amp;severity=high&amp;id=690a47636d939959c8022fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-18-f124fa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f124fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4235-improper-restriction-of-operations-w-c65ccbb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4235%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ofono&amp;severity=high&amp;id=690a43a36d939959c8fde875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4234-improper-restriction-of-operations-w-229906ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4234%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ofono&amp;severity=high&amp;id=690a43a36d939959c8fde870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4233-improper-restriction-of-operations-w-aecb9b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4233%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ofono&amp;severity=high&amp;id=690a43a36d939959c8fde86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4232-improper-restriction-of-operations-w-753ea133</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4232%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20ofono&amp;severity=high&amp;id=690a43a36d939959c8fde867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2961-cwe-787-out-of-bounds-write-in-the-g-8668129d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2961%3A%20CWE-787%20Out-of-bounds%20Write%20in%20The%20GNU%20C%20Library%20glibc&amp;severity=high&amp;id=6902eea9a7d593c9933c3413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26920-vulnerability-in-linux-linux-bddb50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26919-vulnerability-in-linux-linux-be2e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26918-vulnerability-in-linux-linux-be2e18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26917-vulnerability-in-linux-linux-bddb48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26916-vulnerability-in-linux-linux-be2e09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26915-vulnerability-in-linux-linux-be2e05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9829c4522896dcbe2e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26914-vulnerability-in-linux-linux-be3f2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26913-vulnerability-in-linux-linux-be3f26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26912-vulnerability-in-linux-linux-be3f1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26911-vulnerability-in-linux-linux-be3efc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26910-vulnerability-in-linux-linux-bddb40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52645-vulnerability-in-linux-linux-be71c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2419-url-redirection-to-untrusted-site-op-833e8312</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2419%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)&amp;severity=high&amp;id=691356bfb36faa5b6c09d25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1249-origin-validation-error-bec212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1249%3A%20Origin%20Validation%20Error&amp;severity=high&amp;id=682d9838c4522896dcbec212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1132-improper-limitation-of-a-pathname-to-e70cc503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1132%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=690dcba503ca312466af76ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43491-cwe-284-improper-access-control-in--13554626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43491%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Peplink%20Smart%20Reader&amp;severity=medium&amp;id=690a43a36d939959c8fde84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45209-cwe-284-improper-access-control-in--e1aa0a69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45209%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Peplink%20Smart%20Reader&amp;severity=medium&amp;id=690a43a36d939959c8fde862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45744-cwe-284-improper-access-control-in--c8ef534e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45744%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Peplink%20Smart%20Reader&amp;severity=high&amp;id=690a47346d939959c8021aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39367-cwe-78-improper-neutralization-of-s-0a0122d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39367%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Peplink%20Smart%20Reader&amp;severity=critical&amp;id=690a439d6d939959c8fddb0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40146-cwe-77-improper-neutralization-of-s-a5f1c6d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40146%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Peplink%20Smart%20Reader&amp;severity=medium&amp;id=690a439f6d939959c8fddc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3333-cwe-79-improper-neutralization-of-in-fb9f1051</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3333%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6c91b7ef31ef0b56655a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26909-vulnerability-in-linux-linux-be3ef4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26907-vulnerability-in-linux-linux-be3eec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26907%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26906-vulnerability-in-linux-linux-be3ee4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26903-vulnerability-in-linux-linux-be3edc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26903%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26902-vulnerability-in-linux-linux-be3ed6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26902%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26901-vulnerability-in-linux-linux-be3eba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26901%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26900-vulnerability-in-linux-linux-be3eb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26900%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26899-vulnerability-in-linux-linux-be3eaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26899%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26898-vulnerability-in-linux-linux-be3ea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26898%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26897-vulnerability-in-linux-linux-bddb3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26897%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26896-vulnerability-in-linux-linux-be3e8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26896%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26895-vulnerability-in-linux-linux-be3e89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26895%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26894-vulnerability-in-linux-linux-be3e85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26894%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26893-vulnerability-in-linux-linux-be3e78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26893%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26892-vulnerability-in-linux-linux-bddb36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26892%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26891-vulnerability-in-linux-linux-be3e74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26891%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26890-vulnerability-in-linux-linux-be3e70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26890%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26889-vulnerability-in-linux-linux-bd8ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26889%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26888-vulnerability-in-linux-linux-bddb32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26888%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26887-vulnerability-in-linux-linux-be3e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26887%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26886-vulnerability-in-linux-linux-bddb21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26886%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26885-vulnerability-in-linux-linux-be3e68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26885%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26884-vulnerability-in-linux-linux-be3e64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26884%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26883-vulnerability-in-linux-linux-bddb19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26883%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26882-vulnerability-in-linux-linux-be3e60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26882%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26881-vulnerability-in-linux-linux-be3e40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26881%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26880-vulnerability-in-linux-linux-be3e3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26880%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26879-vulnerability-in-linux-linux-be3e38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26879%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26878-vulnerability-in-linux-linux-be3e34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26878%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26877-vulnerability-in-linux-linux-be3e30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26877%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26876-vulnerability-in-linux-linux-be3e2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26876%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26875-vulnerability-in-linux-linux-be3e28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26875%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26874-vulnerability-in-linux-linux-be3e24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26874%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26873-vulnerability-in-linux-linux-be3e20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26873%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26872-vulnerability-in-linux-linux-be3e1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26872%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26871-vulnerability-in-linux-linux-be3e02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26871%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26870-vulnerability-in-linux-linux-be3dfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26870%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26869-vulnerability-in-linux-linux-be3dfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26869%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26868-vulnerability-in-linux-linux-be3df6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26868%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26867-vulnerability-in-linux-linux-be3df0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26867%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26866-vulnerability-in-linux-linux-be3dec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26866%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26865-vulnerability-in-linux-linux-be3de8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26865%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26864-vulnerability-in-linux-linux-be3de4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26864%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26863-vulnerability-in-linux-linux-be3dd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26863%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26862-vulnerability-in-linux-linux-be3dcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26862%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26861-vulnerability-in-linux-linux-bddb13</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26861%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26860-vulnerability-in-linux-linux-be3db6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26860%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26859-vulnerability-in-linux-linux-be3db2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26859%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52644-vulnerability-in-linux-linux-be71bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26858-vulnerability-in-linux-linux-bddb0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26858%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26857-vulnerability-in-linux-linux-be3dae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26857%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26856-vulnerability-in-linux-linux-be3daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26856%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26855-vulnerability-in-linux-linux-be3d9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26855%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26854-vulnerability-in-linux-linux-be3d99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26854%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26853-vulnerability-in-linux-linux-be3d95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26853%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26852-vulnerability-in-linux-linux-be3d91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26852%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26851-vulnerability-in-linux-linux-be3d8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26851%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26850-vulnerability-in-linux-linux-be3d87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26850%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26849-vulnerability-in-linux-linux-be3d6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26849%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26847-vulnerability-in-linux-linux-be3d69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26847%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26846-vulnerability-in-linux-linux-be3d65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26846%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26845-vulnerability-in-linux-linux-be3d61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26845%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26844-vulnerability-in-linux-linux-be3d5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26844%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26843-vulnerability-in-linux-linux-aebfd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26843%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26842-vulnerability-in-linux-linux-be3d59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26842%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26841-vulnerability-in-linux-linux-be3d55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26841%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26840-vulnerability-in-linux-linux-be3d51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26840%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26839-vulnerability-in-linux-linux-be3d4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26839%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26838-vulnerability-in-linux-linux-be3d49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26837-vulnerability-in-linux-linux-be3d36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26837%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26836-vulnerability-in-linux-linux-be3d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26836%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26835-vulnerability-in-linux-linux-be3d1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26835%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26834-vulnerability-in-linux-linux-be3d15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26834%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26833-vulnerability-in-linux-linux-be3d0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26833%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26832-vulnerability-in-linux-linux-bddae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26832%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26829-vulnerability-in-linux-linux-be3cf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26829%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32505-improper-neutralization-of-input-du-839c3fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32505%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roxnor%20ElementsKit%20Elementor%20addons%20Lite&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26831-vulnerability-in-linux-linux-bddae5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26831%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26830-vulnerability-in-linux-linux-be3cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26830%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26828-vulnerability-in-linux-linux-be3cec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26828%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26826-vulnerability-in-linux-linux-be3cdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26826%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26825-vulnerability-in-linux-linux-be3cd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26825%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26824-vulnerability-in-linux-linux-be3cbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26824%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26823-vulnerability-in-linux-linux-be3cba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26823%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26822-vulnerability-in-linux-linux-bddae1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26822%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26820-vulnerability-in-linux-linux-be3cb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26820%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26818-vulnerability-in-linux-linux-be3ca5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26818%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52643-vulnerability-in-linux-linux-be71b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52642-vulnerability-in-linux-linux-be71ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31583-na-0ddbd0f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31583%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58eee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31041-na-c782c271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31041%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd2b7ef31ef0b58ed99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31040-na-67140b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31040%3A%20n%2Fa&amp;severity=low&amp;id=699f6dd2b7ef31ef0b58ed96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30990-na-f4ae0721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30990%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ec24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30988-na-2cf7afc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30988%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58ec21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30987-na-94e3eea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30987%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58ec1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30986-na-62e19690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30986%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58ec1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30985-na-96d2637f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30985%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ec18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30983-na-974276fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30983%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd0b7ef31ef0b58ec15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30982-na-feda2943</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30982%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ec12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30980-na-5749e210</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30980%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ec04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30979-na-f9ca32dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30979%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcfb7ef31ef0b58eb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30953-na-7fcf7bde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30953%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcfb7ef31ef0b58eb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30951-na-5f86311c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30951%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58eabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30950-na-c271bef6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30950%3A%20n%2Fa&amp;severity=low&amp;id=699f6dcdb7ef31ef0b58eabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32746-na-ace63c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32746%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b5614a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32745-na-d1d39df1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32745%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c39b7ef31ef0b5614a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32744-na-52f1f381</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32744%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c37b7ef31ef0b561415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32743-na-c4ece866</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32743%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c37b7ef31ef0b561412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32345-na-93f80653</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32345%3A%20n%2Fa&amp;severity=high&amp;id=699f6c35b7ef31ef0b561299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32344-na-bf32b0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32344%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32343-na-206d6403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32343%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32342-na-726ed9cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32342%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32340-na-8d398b8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32340%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c35b7ef31ef0b56128d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32339-na-46f554e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32339%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b56128a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32338-na-ffcbcdb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32338%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32337-na-65e34238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32337%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32320-na-f7880574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32320%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c35b7ef31ef0b561215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32318-na-5b1503ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32318%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c35b7ef31ef0b561212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32317-na-f70c72fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32317%3A%20n%2Fa&amp;severity=high&amp;id=699f6c35b7ef31ef0b56120f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32316-na-f3d9442a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32316%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c34b7ef31ef0b5611c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32315-na-c4cddc3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32315%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c34b7ef31ef0b5611be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32314-na-b34908b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32314%3A%20n%2Fa&amp;severity=low&amp;id=699f6c34b7ef31ef0b5611bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32313-na-bb1dceb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32313%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c34b7ef31ef0b5611b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32312-na-0868e89c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32312%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c34b7ef31ef0b5611b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32311-na-6e689748</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32311%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c34b7ef31ef0b5611b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32310-na-d7622cd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32310%3A%20n%2Fa&amp;severity=high&amp;id=699f6c34b7ef31ef0b5611af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32307-na-5777f542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32307%3A%20n%2Fa&amp;severity=high&amp;id=699f6c34b7ef31ef0b5611ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32306-na-3aa6a1b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32306%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c34b7ef31ef0b5611a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32305-na-0f6ecb2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32305%3A%20n%2Fa&amp;severity=high&amp;id=699f6c34b7ef31ef0b5611a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32303-na-a7a9f48d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32303%3A%20n%2Fa&amp;severity=high&amp;id=699f6c33b7ef31ef0b561161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32302-na-3653e4e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32302%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c33b7ef31ef0b56115e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32301-na-930efe22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32301%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c33b7ef31ef0b56115b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32299-na-0461ef4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32299%3A%20n%2Fa&amp;severity=high&amp;id=699f6c33b7ef31ef0b561158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32293-na-2a0fd6e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32293%3A%20n%2Fa&amp;severity=high&amp;id=699f6c33b7ef31ef0b561155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32292-na-ceeddc85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32292%3A%20n%2Fa&amp;severity=high&amp;id=699f6c33b7ef31ef0b561152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32291-na-0a74b779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32291%3A%20n%2Fa&amp;severity=high&amp;id=699f6c33b7ef31ef0b56114f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32290-na-47b07f7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32290%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c33b7ef31ef0b56114c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32288-na-dc53c44c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32288%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c33b7ef31ef0b561149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32287-na-57618527</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32287%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c33b7ef31ef0b561146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32286-na-89bea4d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32286%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c32b7ef31ef0b5610f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32285-na-540e5493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32285%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b5610ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32283-na-6b873e7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32283%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b5610eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32282-na-e8e8c331</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32282%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c32b7ef31ef0b5610e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32281-na-31eceb33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32281%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b5610e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32163-na-39a88ec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32163%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32162-na-a7eca5da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32162%3A%20n%2Fa&amp;severity=medium&amp;id=699f6c30b7ef31ef0b560fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32161-na-42d0daff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32161%3A%20n%2Fa&amp;severity=critical&amp;id=699f6c30b7ef31ef0b560fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31582-na-a5b3d92d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31582%3A%20n%2Fa&amp;severity=high&amp;id=690a3b4dff58c9332ff06ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31581-na-3eb673b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31581%3A%20n%2Fa&amp;severity=critical&amp;id=690a3b4dff58c9332ff06e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31031-na-c1eb619c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31031%3A%20n%2Fa&amp;severity=high&amp;id=690a3b4cff58c9332ff06e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31578-na-b5818efb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31578%3A%20n%2Fa&amp;severity=high&amp;id=69092623fe7723195e0b4733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31585-na-in-na-f2d0e831</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31585%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938ed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-17-f11f96</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21111-easily-exploitable-vulnerability-allows-low-privileged-attacker-with-logon-to-the-infrastructure-where-oracle-vm-virtualbox-executes-to-compromise-oracle-vm-virtualbox-successful-attacks-of-this-vulnerability-can-result-in-takeover-of-oracle-vm-virtualbox-in-oracle-corporation-vm-virtualbox-bd76d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21111%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20VM%20VirtualBox%20executes%20to%20compromise%20Oracle%20VM%20VirtualBox.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20VM%20VirtualBox.%20in%20Oracle%20Corporation%20VM%20VirtualBox&amp;severity=high&amp;id=682d9817c4522896dcbd76d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21057-easily-exploitable-vulnerability-al-42ede980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21057%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a3b61ff58c9332ff09430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3672-cwe-79-improper-neutralization-of-in-f0b59d22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3672%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bookingalgorithms%20BA%20Book%20Everything&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3243-cwe-862-missing-authorization-in-ivo-ecaf0cba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3243%3A%20CWE-862%20Missing%20Authorization%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b566419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3869-cwe-862-missing-authorization-in-ivo-ef7a9eeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3869%3A%20CWE-862%20Missing%20Authorization%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3067-cwe-89-improper-neutralization-of-sp-236ec6de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3067%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aukejomm%20WooCommerce%20Google%20Feed%20Manager&amp;severity=high&amp;id=699f6c8bb7ef31ef0b5661b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1357-cwe-79-improper-neutralization-of-in-1276f282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1357%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3867-cwe-79-improper-neutralization-of-in-e4f0bda1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tainacan%20Tainacan%20Interface&amp;severity=medium&amp;id=699f6c9db7ef31ef0b566e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31784-na-d555bc4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31784%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31760-na-0ccb38ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31760%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31759-na-e576295c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31759%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd5b7ef31ef0b58f0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31680-na-3318d3cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31680%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd5b7ef31ef0b58f07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31634-na-80eeb7c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31634%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd4b7ef31ef0b58ef99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31503-na-e8cac775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31503%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58ee2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29402-na-b5e8255a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29402%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9eb7ef31ef0b58968c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29291-na-e576dee8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29291%3A%20n%2Fa&amp;severity=null&amp;id=699f6d9bb7ef31ef0b58945f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32254-na-86257f8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32254%3A%20n%2Fa&amp;severity=high&amp;id=699f6c32b7ef31ef0b5610db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32256-na-a2fff2c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32256%3A%20n%2Fa&amp;severity=high&amp;id=6986057df9fa50a62f14c556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50872-na-in-na-263af2e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50872%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839ce93182aa0cae2b5b18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-16-f12db2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31374-cross-site-request-forgery-csrf-in--4a0f5ab7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31374%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Scott%20Bolinger%20AppPresser&amp;severity=null&amp;id=69cd7424e6bfc5ba1def5993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31376-cross-site-request-forgery-csrf-in--064824fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31376%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Andrew%20Dashboard%20To-Do%20List&amp;severity=null&amp;id=69cd7424e6bfc5ba1def599b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31382-cross-site-request-forgery-csrf-in--37bd0ec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31382%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=69cd7424e6bfc5ba1def599f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31421-missing-authorization-in-supsystic--2d850d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31421%3A%20Missing%20Authorization%20in%20supsystic%20Popup%20by%20Supsystic&amp;severity=null&amp;id=69cd7424e6bfc5ba1def59a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31424-cross-site-request-forgery-csrf-in--8c2e15ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31424%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Hamid%20Alinia%20Login%20with%20phone%20number&amp;severity=null&amp;id=69cd7424e6bfc5ba1def59a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31433-cross-site-request-forgery-csrf-in--44af4aa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31433%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20StellarWP%20The%20Events%20Calendar&amp;severity=null&amp;id=69cd7424e6bfc5ba1def59ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31942-cross-site-request-forgery-csrf-in--7ba7051b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31942%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20typps%20Calendarista%20Basic%20Edition&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32090-cross-site-request-forgery-csrf-in--82893999</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32090%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32101-cross-site-request-forgery-csrf-in--236d70ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32101%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Omnisend%20Email%20Marketing%20for%20WooCommerce%20by%20Omnisend&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32141-cross-site-request-forgery-csrf-in--8e57bdf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32141%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20libsyn%20Libsyn%20Publisher%20Hub&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32433-cross-site-request-forgery-csrf-in--c94ce15c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32433%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Themefic%20BEAF&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32435-cross-site-request-forgery-csrf-in--7f75d103</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32435%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20perrinalexandre05%20AffiEasy&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32445-cross-site-request-forgery-csrf-in--ed3769ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32445%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saleswonder%20Team%3A%20Tobias%20WebinarIgnition&amp;severity=null&amp;id=69cd7429e6bfc5ba1def5b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32082-cross-site-request-forgery-csrf-in--d8fa90f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32082%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Kamlesh%20Parmar%20Sync%20Post%20With%20Other%20Site&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32140-improper-neutralization-of-input-du-d35d34d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32140%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20libsyn%20Libsyn%20Publisher%20Hub&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3767-sql-injection-in-phpgurukul-news-por-5c4d8c2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3767%3A%20SQL%20Injection%20in%20PHPGurukul%20News%20Portal&amp;severity=medium&amp;id=6839a468182aa0cae2aec756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31652-na-ca2ce73d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31652%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31651-na-3b63a75a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31651%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd5b7ef31ef0b58f014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31650-na-eafc4b82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31650%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd4b7ef31ef0b58efa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31649-na-a4af6a52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31649%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd4b7ef31ef0b58efa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31648-na-7b5d6f49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31648%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd4b7ef31ef0b58efa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30840-na-621b4275</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30840%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcab7ef31ef0b58e74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30656-na-1a777f20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30656%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58df9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30567-na-308ab1ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30567%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dc90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28558-na-d7ee4911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28558%3A%20n%2Fa&amp;severity=high&amp;id=699f6d92b7ef31ef0b588b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28557-na-a7400058</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28557%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d92b7ef31ef0b588b8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28556-na-117921b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28556%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d92b7ef31ef0b588b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24487-na-27b36d2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24487%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5db7ef31ef0b570b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24486-na-bbdb9453</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24486%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5db7ef31ef0b570b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24485-na-8cfa4547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24485%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5db7ef31ef0b570b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32488-na-51c1599b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32488%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b5613ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31497-na-f5f60c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31497%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b4cff58c9332ff06e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32489-na-b48e266a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32489%3A%20n%2Fa&amp;severity=medium&amp;id=690904b000ff46172d4a0e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-15-f25418</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-15&amp;severity=medium&amp;id=682acdc4bbaf20d303f25418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-15-f12fe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-14-f12b9f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26817-vulnerability-in-linux-linux-be3c9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26817%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3662-cwe-862-missing-authorization-in-wpz-d840f846</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3662%3A%20CWE-862%20Missing%20Authorization%20in%20wpzoom%20WPZOOM%20Social%20Feed%20Widget%20%26%20Block&amp;severity=medium&amp;id=699f6c99b7ef31ef0b566a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3027-cwe-285-improper-authorization-in-ne-ea677f30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3027%3A%20CWE-285%20Improper%20Authorization%20in%20nextendweb%20Smart%20Slider%203&amp;severity=medium&amp;id=699f6c8ab7ef31ef0b56611e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1957-cwe-79-improper-neutralization-of-in-38667acc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1957%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32487-na-1a303087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32487%3A%20n%2Fa&amp;severity=high&amp;id=699f6c37b7ef31ef0b5613f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-13-f121ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400-f0c2c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Zero-Day%20Exploitation%20of%20Unauthenticated%20Remote%20Code%20Execution%20Vulnerability%20in%20GlobalProtect%20(CVE-2024-3400)&amp;severity=high&amp;id=682acdbebbaf20d303f0c2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21610-cwe-755-improper-handling-of-exceptional-conditions-in-juniper-networks-junos-os-aeb86d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21610%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682cd0f81484d88663aeb86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31303-cross-site-request-forgery-csrf-in--9d7eea38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31303%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fetch%20Designs%20Sign-up%20Sheets&amp;severity=null&amp;id=69cd7421e6bfc5ba1def5874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3054-cwe-502-deserialization-of-untrusted-dddc580c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3054%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid&amp;severity=high&amp;id=699f6c8ab7ef31ef0b56613b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3211-cwe-89-improper-neutralization-of-sp-c811f5e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3211%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20levelfourstorefront%20Shopping%20Cart%20%26%20eCommerce%20Store&amp;severity=high&amp;id=699f6c8eb7ef31ef0b566382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2801-cwe-79-improper-neutralization-of-in-4cb1a24e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2801%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getbowtied%20Shopkeeper%20Extender&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2137-cwe-79-improper-neutralization-of-in-da58f3cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2137%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themesgrove%20All-in-One%20Addons%20for%20Elementor%20%E2%80%93%20WidgetKit&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6489-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6489%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6678-inefficient-regular-expression-complexity-in-gitlab-gitlab-253fcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6678%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2279-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253fea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2279%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3092-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253ff2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3092%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31839-na-a6870a88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31839%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31818-na-0cd2eb7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31818%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd8b7ef31ef0b58f742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30845-na-9cd53e45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30845%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcab7ef31ef0b58e74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29400-na-1f49b3bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29400%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9db7ef31ef0b5895b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28718-na-07e93e75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28718%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d98b7ef31ef0b589072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25545-na-ad5adbc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25545%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6cb7ef31ef0b572091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22734-na-0a4cf429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22734%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22526-na-61f76814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22526%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b570107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49528-na-11835f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49528%3A%20n%2Fa&amp;severity=high&amp;id=690a3b5dff58c9332ff08ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-12-f12b86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31929-improper-neutralization-of-input-du-a35b44ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31929%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iain%20Poulson%20Intagrate%20Lite&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3344-cwe-434-unrestricted-upload-of-file--28ee991d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3344%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3343-cwe-79-improper-neutralization-of-in-c0fce8c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3343%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6c91b7ef31ef0b5665be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2966-cwe-200-information-exposure-in-bdth-77c17574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2966%3A%20CWE-200%20Information%20Exposure%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3285-cwe-79-improper-neutralization-of-in-c9d9cf8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3285%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metaslider%20Slider%2C%20Gallery%2C%20and%20Carousel%20by%20MetaSlider%20%E2%80%93%20Responsive%20WordPress%20Slideshows&amp;severity=medium&amp;id=699f6c90b7ef31ef0b566502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3652-ikev1-with-default-ahesp-configurati-03d8ef59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3652%3A%20IKEv1%20with%20default%20AH%2FESP%20configuration%20can%20cause%20libreswan%20to%20abort%20and%20restart%20in%20The%20Libreswan%20Project%20(www.libreswan.org)%20libreswan&amp;severity=medium&amp;id=69a1b7a632ffcdb8a23ccfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31678-na-4207d246</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31678%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd5b7ef31ef0b58f07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30917-na-8da0fc26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30917%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58eaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30885-na-d3945808</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30885%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58ea14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30884-na-a88b9cf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30884%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58ea11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30883-na-f302f87a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30883%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58ea0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30880-na-b72ffd50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30880%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58ea0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30879-na-87291b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30879%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58ea08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30878-na-aa1f347b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30878%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58ea05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29455-ffef6475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29455&amp;severity=null&amp;id=699f6d9fb7ef31ef0b589789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29454-8405a07e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29454&amp;severity=null&amp;id=699f6d9eb7ef31ef0b589704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29452-d339b048</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29452&amp;severity=null&amp;id=699f6d9eb7ef31ef0b589702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29450-33832d7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29450&amp;severity=null&amp;id=699f6d9eb7ef31ef0b589700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29449-8caec01b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29449&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29448-4d0c15e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29448&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29399-na-9a17fd92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29399%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9db7ef31ef0b5895b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28458-na-82a7b212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28458%3A%20n%2Fa&amp;severity=high&amp;id=699f6d90b7ef31ef0b588ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27592-na-9ac9ee34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27592%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d82b7ef31ef0b580a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25852-na-708f398b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25852%3A%20n%2Fa&amp;severity=high&amp;id=699f6d71b7ef31ef0b572342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22722-na-80aef22e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22722%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4db7ef31ef0b570205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22721-na-c8c3c271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22721%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b570174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22719-na-dc6ae078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22719%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4bb7ef31ef0b570171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22717-na-f50ab8c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22717%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b57016e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29483-na-e1cdebd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29483%3A%20n%2Fa&amp;severity=high&amp;id=690a3b58ff58c9332ff08aed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-11-f1279e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f1279e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1481-improper-input-validation-64ddc884</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1481%3A%20Improper%20Input%20Validation&amp;severity=medium&amp;id=690a47486d939959c8022334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47219-vulnerability-in-linux-linux-bea0bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47219%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47218-vulnerability-in-linux-linux-bea0bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47218%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47217-vulnerability-in-linux-linux-bea0b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47217%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47216-vulnerability-in-linux-linux-bea0b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47216%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47215-vulnerability-in-linux-linux-bea0a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47215%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47214-vulnerability-in-linux-linux-bde098</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47214%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47212-vulnerability-in-linux-linux-bea09a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47212%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47211-vulnerability-in-linux-linux-bea081</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47211%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47210-vulnerability-in-linux-linux-bea07d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47210%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47209-vulnerability-in-linux-linux-bea079</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47209%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47207-vulnerability-in-linux-linux-bea06c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47207%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47206-vulnerability-in-linux-linux-bea068</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47206%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47205-vulnerability-in-linux-linux-bea064</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47205%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47204-vulnerability-in-linux-linux-bea060</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47204%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47203-vulnerability-in-linux-linux-bea05c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47203%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea05c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47202-vulnerability-in-linux-linux-bea04d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47202%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47201-vulnerability-in-linux-linux-bea049</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47201%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47200-vulnerability-in-linux-linux-bea02c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47200%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47199-vulnerability-in-linux-linux-bea026</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47199%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47198-vulnerability-in-linux-linux-bea024</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47198%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47197-vulnerability-in-linux-linux-bde094</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47197%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47196-vulnerability-in-linux-linux-bea020</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47196%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47195-vulnerability-in-linux-linux-bde090</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47195%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47194-vulnerability-in-linux-linux-bea011</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47194%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47193-vulnerability-in-linux-linux-bea009</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47193%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47192-vulnerability-in-linux-linux-bde08c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47192%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47191-vulnerability-in-linux-linux-bea001</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47191%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47190-vulnerability-in-linux-linux-be9ff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47190%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47189-vulnerability-in-linux-linux-be9ff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47189%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47188-vulnerability-in-linux-linux-be9fe6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47188%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47187-vulnerability-in-linux-linux-be9fcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47187%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47186-vulnerability-in-linux-linux-aeb02d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47186%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47185-vulnerability-in-linux-linux-be9fbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47185%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47184-vulnerability-in-linux-linux-be9fba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47184%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47183-vulnerability-in-linux-linux-be9fb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47183%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47182-vulnerability-in-linux-linux-be9faa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47182%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47181-vulnerability-in-linux-linux-aebf37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47181%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31230-missing-authorization-in-shortpixel-6270d4f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31230%3A%20Missing%20Authorization%20in%20ShortPixel%20ShortPixel%20Adaptive%20Images&amp;severity=null&amp;id=69cd7421e6bfc5ba1def5856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31874-cwe-457-use-of-uninitialized-variab-fc07c019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31874%3A%20CWE-457%20Use%20of%20Uninitialized%20Variable%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=69092624fe7723195e0b479c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31873-cwe-798-use-of-hard-coded-credentia-1853364d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31873%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092623fe7723195e0b4749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31358-missing-authorization-in-saleswonde-9f1e2fe2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31358%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%205%20Stars%20Rating%20Funnel&amp;severity=null&amp;id=69cd7424e6bfc5ba1def5987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31871-cwe-295-improper-certificate-valida-de446a20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31871%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092623fe7723195e0b473f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31872-cwe-295-improper-certificate-valida-40a9b0bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31872%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092623fe7723195e0b4744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31278-insertion-of-sensitive-information--bbc12649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31278%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7421e6bfc5ba1def585e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3567-reachable-assertion-bdab0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3567%3A%20Reachable%20Assertion&amp;severity=medium&amp;id=682d981cc4522896dcbdab0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26816-vulnerability-in-linux-linux-be3c9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26816%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31924-cross-site-request-forgery-csrf-in--5ec99619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31924%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nosilver4u%20EWWW%20Image%20Optimizer&amp;severity=null&amp;id=69cd7426e6bfc5ba1def5a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31309-cwe-20-improper-input-validation-in-e5704651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31309%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Traffic%20Server&amp;severity=high&amp;id=690a47656d939959c8023079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26815-vulnerability-in-linux-linux-be3c93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26815%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2794-improper-restriction-of-operations-w-40d7b284</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2794%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer&amp;severity=high&amp;id=690a439b6d939959c8fdd5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2243-improper-neutralization-of-special-e-035d6caf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2243%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)&amp;severity=high&amp;id=690a47636d939959c8022fd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1780-cwe-79-improper-neutralization-of-in-bba9ca48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1780%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20setriosoft%20BizCalendar%20Web&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3210-cwe-79-improper-neutralization-of-in-0ae162e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3210%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b56637e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2655-cwe-79-improper-neutralization-of-in-b4edaa92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2655%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2539-cwe-79-improper-neutralization-of-in-3fc07ea0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2539%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3020-cwe-502-deserialization-of-untrusted-6c312a7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3020%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20shapedplugin%20Carousel%2C%20Slider%2C%20Gallery%20by%20WP%20Carousel%20%E2%80%93%20Image%20Carousel%20%26%20Photo%20Gallery%2C%20Post%20Carousel%20%26%20Post%20Grid%2C%20Product%20Carousel%20%26%20Product%20Grid%20for%20WooCommerce&amp;severity=high&amp;id=699f6c89b7ef31ef0b56609a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1042-cwe-862-missing-authorization-in-pri-722278e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1042%3A%20CWE-862%20Missing%20Authorization%20in%20princeahmed%20WP%20Radio%20%E2%80%93%20Worldwide%20Online%20Radio%20Stations%20Directory%20for%20WordPress&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3235-cwe-862-missing-authorization-in-the-0fb5f8fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3235%3A%20CWE-862%20Missing%20Authorization%20in%20ThemePunch%20Essential%20Grid%20Gallery%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b566402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2736-cwe-79-improper-neutralization-of-in-f0456d02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2735-cwe-79-improper-neutralization-of-in-9d8b4c19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2734-cwe-79-improper-neutralization-of-in-02a3ea6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2734%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1041-cwe-862-missing-authorization-in-pri-cceb6c85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1041%3A%20CWE-862%20Missing%20Authorization%20in%20princeahmed%20WP%20Radio%20%E2%80%93%20Worldwide%20Online%20Radio%20Stations%20Directory%20for%20WordPress&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2733-cwe-79-improper-neutralization-of-in-7cafbc76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2733%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2666-cwe-79-improper-neutralization-of-in-0afdbf6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2666%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2664-cwe-79-improper-neutralization-of-in-6800eec5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2665-cwe-79-improper-neutralization-of-in-87a1ffb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6236-insufficient-verification-of-data-au-263bda9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6236%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Red%20Hat%20Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%208&amp;severity=high&amp;id=691f5c4ce672cd9080e8d3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31819-na-f6ee9635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31819%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd8b7ef31ef0b58f746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30737-eefdb74e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30737&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30736-9fc33ed2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30736&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30735-840833d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30735&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30733-84fe4c43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30733&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30730-392c74bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30730&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30729-16cfd251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30729&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30728-f976b6b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30728&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30727-1b7f5ad2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30727&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30726-1b930ede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30726&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30724-5dbb4a97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30724&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30723-98339c1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30723&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30722-a810cb12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30722&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30721-f3078102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30721&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30719-56909478</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30719&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30718-5270d72d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30718&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30716-432c00e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30716&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30715-cfe3bba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30715&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30713-3432fea5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30713&amp;severity=null&amp;id=699f6dcab7ef31ef0b58e1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30712-5a5ec821</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30712&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30711-b9684139</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30711&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30710-04176f42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30710&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30708-374ad0ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30708&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30707-03746c01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30707&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29504-na-c0edcd6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29504%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9fb7ef31ef0b5897a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29460-na-8e73315a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29460%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9fb7ef31ef0b58978b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29447-adb59ec7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29447&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29445-1287615f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29445&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29444-b35460cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29444&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29443-d67aaf3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29443&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29441-10eedeca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29441&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29439-e1f693d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29439&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29296-na-14f70f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29296%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b5894ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29269-na-273f5538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29269%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b589446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28345-na-6afb603b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28345%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8eb7ef31ef0b58887e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28344-na-87530f43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28344%3A%20n%2Fa&amp;severity=low&amp;id=699f6d8eb7ef31ef0b58887b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27477-na-b8ff59b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27477%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7db7ef31ef0b57a4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27476-na-ebbf864b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27476%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7db7ef31ef0b57a4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27474-na-6facf777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27474%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b57a4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26362-na-50bd8f64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26362%3A%20n%2Fa&amp;severity=high&amp;id=699f6d75b7ef31ef0b572586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23735-na-742007dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23735%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d53b7ef31ef0b57057c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23734-na-1895b520</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23734%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d53b7ef31ef0b570578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23083-na-65d15e4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23083%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d51b7ef31ef0b570456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23080-na-e75d405c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23080%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d51b7ef31ef0b570447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23077-na-dde2fd63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23077%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b570438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23076-na-e2356b70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23076%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b5703a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-10-5ccd9bc2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-10&amp;severity=medium&amp;id=68359c9a5d5f0974d01e2193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-10-f183a9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f183a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-10-f13016</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f13016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-10-6e3070</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-10&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e3070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3446-double-free-in-red-hat-red-hat-enterprise-linux-8-beb7c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3446%3A%20Double%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=682d9837c4522896dcbeb7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2311-cwe-79-improper-neutralization-of-in-87e84a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2311%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2138-cwe-79-improper-neutralization-of-in-23037e4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2138%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2306-cwe-80-improper-neutralization-of-sc-08e15104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2306%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Revolution%20Slider%20Slider%20Revolution&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1352-cwe-862-missing-authorization-in-tec-07f546f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1352%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1498-cwe-79-improper-neutralization-of-in-f57bed81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1498%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0952-cwe-89-improper-neutralization-of-sp-a87a288f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0952%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6de9b7ef31ef0b590889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3267-cwe-79-improper-neutralization-of-in-9eb7c70a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3267%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2347-cwe-79-improper-neutralization-of-in-8b777e5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2347%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Astra&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2787-cwe-79-improper-neutralization-of-in-11f2fc85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2093-cwe-200-information-exposure-in-kuru-e77808b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2093%3A%20CWE-200%20Information%20Exposure%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a1a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3213-cwe-862-missing-authorization-in-rel-19e89dda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3213%3A%20CWE-862%20Missing%20Authorization%20in%20Relevanssi%20Relevanssi%20%E2%80%93%20A%20Better%20Search%20(Pro)&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b566386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2341-cwe-89-improper-neutralization-of-sp-cd7d6ce9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2341%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=699f6daeb7ef31ef0b58aa3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1984-cwe-862-missing-authorization-in-sil-af4fcd64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1984%3A%20CWE-862%20Missing%20Authorization%20in%20silverks%20Graphene&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2081-cwe-79-improper-neutralization-of-in-b5bb0d2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2081%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20Best%20WordPress%20Gallery%20Plugin%20%E2%80%93%20FooGallery&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1458-cwe-79-improper-neutralization-of-in-0ae6858f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ecbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2456-cwe-80-improper-neutralization-of-sc-21f07b99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2456%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ecwid%20Ecwid%20Ecommerce%20Shopping%20Cart&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2792-cwe-79-improper-neutralization-of-in-1f7f2e9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2039-cwe-79-improper-neutralization-of-in-9457f036</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2039%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bfintal%20Stackable%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1461-cwe-79-improper-neutralization-of-in-cc8da1af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1461%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ecc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2946-cwe-79-improper-neutralization-of-in-bad6dd8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2327-cwe-79-improper-neutralization-of-in-414d68c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tausworks%20Global%20Elementor%20Buttons&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1812-cwe-918-server-side-request-forgery--3f1e7363</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1812%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20wpeverest%20Everest%20Forms%20%E2%80%93%20Build%20Contact%20Forms%2C%20Surveys%2C%20Polls%2C%20Quizzes%2C%20Newsletter%20%26%20Application%20Forms%2C%20and%20Many%20More%20with%20Ease!&amp;severity=high&amp;id=699f6d40b7ef31ef0b56f641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2501-cwe-502-deserialization-of-untrusted-8977d8e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2501%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20nerdpressteam%20Hubbub%20Lite%20%E2%80%93%20Fast%2C%20Reliable%20Social%20Sharing%20Buttons&amp;severity=high&amp;id=699f6db1b7ef31ef0b58ae37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3208-cwe-79-improper-neutralization-of-in-7db4490c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20Sydney%20Toolbox&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b56637a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2344-cwe-89-improper-neutralization-of-sp-dd817fc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2344%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6daeb7ef31ef0b58aa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2654-cwe-35-path-traversal-in-mndpsingh28-cec33f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2654%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20mndpsingh287%20File%20Manager&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2117-cwe-79-improper-neutralization-of-in-a853bb8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2117%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2504-cwe-80-improper-neutralization-of-sc-e64347bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2504%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1792-cwe-502-deserialization-of-untrusted-5b22ed24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1792%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20jtsternberg%20CMB2&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0873-cwe-80-improper-neutralization-of-sc-22333c41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0873%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20prasunsen%20Watu%20Quiz&amp;severity=medium&amp;id=699f6de7b7ef31ef0b590731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1424-cwe-80-improper-neutralization-of-sc-39a4bb9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1424%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ebfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1587-cwe-862-missing-authorization-in-bla-680ab10c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1587%3A%20CWE-862%20Missing%20Authorization%20in%20blazethemes%20Newsmatic&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2222-cwe-862-missing-authorization-in-plu-883e3ce7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2222%3A%20CWE-862%20Missing%20Authorization%20in%20pluginsware%20Advanced%20Classifieds%20%26%20Directory%20Pro&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2789-cwe-79-improper-neutralization-of-in-9aa8e753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2789%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2623-cwe-79-improper-neutralization-of-in-c9bc5a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2623%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2325-cwe-80-improper-neutralization-of-sc-b01dc15d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2325%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1999-cwe-80-improper-neutralization-of-sc-465d0d4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1999%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20britner%20Gutenberg%20Blocks%20by%20Kadence%20Blocks%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1387-cwe-862-missing-authorization-in-the-11b27f75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1387%3A%20CWE-862%20Missing%20Authorization%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2287-cwe-80-improper-neutralization-of-sc-e94b298f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2287%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nuknightlab%20Knight%20Lab%20Timeline&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2348-cwe-79-improper-neutralization-of-in-e287c7bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2348%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20celomitan%20Gum%20Elementor%20Addon&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0872-cwe-639-authorization-bypass-through-a36e4f84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0872%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20prasunsen%20Watu%20Quiz&amp;severity=medium&amp;id=699f6de7b7ef31ef0b59072d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2305-cwe-79-improper-neutralization-of-in-6611623f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2305%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Cards%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1463-cwe-79-improper-neutralization-of-in-7a42ab22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1463%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ecd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1893-cwe-89-improper-neutralization-of-sp-28be6ed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1893%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mervb1%20Easy%20Property%20Listings&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f7e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3167-cwe-79-improper-neutralization-of-in-cff265f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3167%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=699f6c8db7ef31ef0b5662e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2289-cwe-79-improper-neutralization-of-in-9df44bfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Lite%20for%20Beaver%20Builder&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2507-cwe-80-improper-neutralization-of-sc-a45268df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2507%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20jetmonsters%20JetWidgets%20For%20Elementor&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2847-cwe-80-improper-neutralization-of-sc-4631124b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2847%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20nickboss%20WordPress%20File%20Upload&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2335-cwe-79-improper-neutralization-of-in-03694e6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2335%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cssigniterteam%20Elements%20Plus!&amp;severity=medium&amp;id=699f6dadb7ef31ef0b58aa2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2871-cwe-89-improper-neutralization-of-sp-a765f0a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2871%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3136-cwe-98-improper-control-of-filename--6f6fec46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3136%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=critical&amp;id=699f6c8cb7ef31ef0b566271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3214-cwe-1236-improper-neutralization-of--472398eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3214%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Relevanssi%20Relevanssi%20%E2%80%93%20A%20Better%20Search%20(Pro)&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b56638b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0598-cwe-80-improper-neutralization-of-sc-8b12ed7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0598%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20britner%20Gutenberg%20Blocks%20by%20Kadence%20Blocks%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1465-cwe-79-improper-neutralization-of-in-c22460e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1465%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ece7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2340-cwe-548-information-exposure-through-2f8d8f03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2340%3A%20CWE-548%20Information%20Exposure%20Through%20Directory%20Listing%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6dadb7ef31ef0b58aa38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1813-cwe-502-deserialization-of-untrusted-e697ca10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1813%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20presstigers%20Simple%20Job%20Board&amp;severity=critical&amp;id=699f6d40b7ef31ef0b56f645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1934-cwe-862-missing-authorization-in-sma-b6ed6ec4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1934%3A%20CWE-862%20Missing%20Authorization%20in%20smartersite%20WP%20Compress%20%E2%80%93%20Image%20Optimizer%20%5BAll-In-One%5D&amp;severity=high&amp;id=699f6d44b7ef31ef0b56f881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2026-cwe-79-improper-neutralization-of-in-28314853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2026%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20patrickposner%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2343-cwe-918-server-side-request-forgery--2c6301be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2343%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aa44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1790-cwe-22-improper-limitation-of-a-path-81da3352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1790%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20connekthq%20WordPress%20Infinite%20Scroll%20%E2%80%93%20Ajax%20Load%20More&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2536-cwe-20-improper-input-validation-in--a31d710f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2536%3A%20CWE-20%20Improper%20Input%20Validation%20in%20rankmath%20Rank%20Math%20SEO%20with%20AI%20SEO%20Tools&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0899-cwe-284-improper-access-control-in-c-54c3374e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0899%3A%20CWE-284%20Improper%20Access%20Control%20in%20clavaque%20s2Member%20%E2%80%93%20Best%20Membership%20Plugin%20for%20All%20Kinds%20of%20Memberships%2C%20Content%20Restriction%20Paywalls%20%26%20Member%20Access%20Subscriptions&amp;severity=medium&amp;id=699f6de7b7ef31ef0b59074f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2693-cwe-502-deserialization-of-untrusted-7078937b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2693%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20linkwhspr%20Link%20Whisper%20Free&amp;severity=high&amp;id=699f6db4b7ef31ef0b58b147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1464-cwe-79-improper-neutralization-of-in-9367a104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1464%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ecdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2974-cwe-200-information-exposure-in-wpde-742f4fce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2974%3A%20CWE-200%20Information%20Exposure%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6dbcb7ef31ef0b58d610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2183-cwe-79-improper-neutralization-of-in-4bbfd145</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20Beaver%20Builder%20Addons%20by%20WPZOOM&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3244-cwe-79-improper-neutralization-of-in-86048c37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3244%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b56641f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1991-cwe-862-missing-authorization-in-met-74d280bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1991%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=high&amp;id=699f6d46b7ef31ef0b56ff20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3097-cwe-862-missing-authorization-in-smu-34d19862</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3097%3A%20CWE-862%20Missing%20Authorization%20in%20smub%20WordPress%20Gallery%20Plugin%20%E2%80%93%20NextGEN%20Gallery&amp;severity=medium&amp;id=699f6c8cb7ef31ef0b56625c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2543-cwe-639-authorization-bypass-through-855dd294</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2543%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mbis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2186-cwe-79-improper-neutralization-of-in-c6c58cba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2186%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20Beaver%20Builder%20Addons%20by%20WPZOOM&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2457-cwe-80-improper-neutralization-of-sc-b59a48c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2457%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpcalc%20Modal%20Window%20%E2%80%93%20create%20popup%20modal%20window&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2788-cwe-79-improper-neutralization-of-in-02b20403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2788%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2650-cwe-20-improper-input-validation-in--b91c7a60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2650%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2783-cwe-80-improper-neutralization-of-sc-8df8e251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2783%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20rubengc%20GamiPress%20%E2%80%93%20The%20%231%20gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2738-cwe-80-improper-neutralization-of-sc-e6a717ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2738%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mbis%20Permalink%20Manager%20Lite&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0588-cwe-352-cross-site-request-forgery-c-a675aa5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0588%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fe05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1948-cwe-79-improper-neutralization-of-in-d6be1e1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1948%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jetmonsters%20Getwid%20%E2%80%93%20Gutenberg%20Blocks&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1571-cwe-80-improper-neutralization-of-sc-07f60af2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1571%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56efe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2181-cwe-79-improper-neutralization-of-in-693c1941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2181%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20Beaver%20Builder%20Addons%20by%20WPZOOM&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2027-cwe-20-improper-input-validation-in--9d00776f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2027%3A%20CWE-20%20Improper%20Input%20Validation%20in%20devowl%20Real%20Media%20Library%3A%20Media%20Library%20Folder%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1990-cwe-89-improper-neutralization-of-sp-bb70b7f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1990%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20metagauss%20RegistrationMagic%20%E2%80%93%20Custom%20Registration%20Forms%2C%20User%20Registration%2C%20Payment%2C%20and%20User%20Login&amp;severity=high&amp;id=699f6d46b7ef31ef0b56ff1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2334-cwe-434-unrestricted-upload-of-file--6776bb33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2334%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20envato%20Template%20Kit%20%E2%80%93%20Import&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1466-cwe-79-improper-neutralization-of-in-570ed05e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2198-cwe-79-improper-neutralization-of-in-f0ef025e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2198%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestwebsoft%20Contact%20Form%20by%20BestWebSoft%20%E2%80%93%20Advanced%20Contact%20Us%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0626-cwe-284-improper-access-control-in-e-e71adf1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0626%3A%20CWE-284%20Improper%20Access%20Control%20in%20elbanyaoui%20WooCommerce%20Clover%20Payment%20Gateway&amp;severity=medium&amp;id=699f6de1b7ef31ef0b5900e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2112-cwe-287-improper-authentication-in-1-2979b13d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2112%3A%20CWE-287%20Improper%20Authentication%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0662-cwe-79-improper-neutralization-of-in-6b94c123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0662%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20colorlibplugins%20FancyBox%20for%20WordPress&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2436-cwe-80-improper-neutralization-of-sc-226d9861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2436%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20someguy9%20Lightweight%20Accordion&amp;severity=medium&amp;id=699f6dafb7ef31ef0b58abe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1315-cwe-352-cross-site-request-forgery-c-dde250eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1315%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20techlabpro1%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=high&amp;id=699f6d29b7ef31ef0b56e7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2165-cwe-20-improper-input-validation-in--ef771e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2165%3A%20CWE-20%20Improper%20Input%20Validation%20in%20rainbowgeek%20SEOPress%20%E2%80%93%20On-site%20SEO&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2786-cwe-79-improper-neutralization-of-in-44a4fb80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1850-cwe-862-missing-authorization-in-kek-e708f995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1850%3A%20CWE-862%20Missing%20Authorization%20in%20kekotron%20AI%20Post%20Generator%20%7C%20AutoWriter&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2336-cwe-80-improper-neutralization-of-sc-cadcf578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2336%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20danieliser%20Popup%20Maker%20%E2%80%93%20Popup%20for%20opt-ins%2C%20lead%20gen%2C%20%26%20more&amp;severity=medium&amp;id=699f6dadb7ef31ef0b58aa30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0826-cwe-79-improper-neutralization-of-in-1345e998</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0826%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20qodeinteractive%20Qi%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6de5b7ef31ef0b5904b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1308-cwe-284-improper-access-control-in-d-c94fa45b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1308%3A%20CWE-284%20Improper%20Access%20Control%20in%20datafeedrcom%20WooCommerce%20Cloak%20Affiliate%20Links&amp;severity=high&amp;id=699f6d29b7ef31ef0b56e7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2513-cwe-20-improper-input-validation-in--38445623</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2513%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ninjateam%20WP%20Chat%20App&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2804-cwe-89-improper-neutralization-of-sp-e8466d2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2804%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jokr%20Network%20Summary&amp;severity=critical&amp;id=699f6db7b7ef31ef0b58b4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1960-cwe-79-improper-neutralization-of-in-31867434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fd99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2018-cwe-89-improper-neutralization-of-sp-2fa71aeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2018%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpwhitesecurity%20WP%20Activity%20Log%20Premium&amp;severity=high&amp;id=699f6da2b7ef31ef0b5899f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2423-cwe-80-improper-neutralization-of-sc-8b081bdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2423%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20stiofansisland%20UsersWP%20%E2%80%93%20Front-end%20login%20form%2C%20User%20Registration%2C%20User%20Profile%20%26%20Members%20Directory%20plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6dafb7ef31ef0b58abe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2261-cwe-639-authorization-bypass-through-0e9175cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2261%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20theeventscalendar%20Event%20Tickets%20and%20Registration&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2845-cwe-80-improper-neutralization-of-sc-ddb94a99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2845%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpdevteam%20BetterDocs%20%E2%80%93%20Best%20Documentation%2C%20FAQ%20%26%20Knowledge%20Base%20Plugin%20with%20AI%20Support%20%26%20Instant%20Answer%20for%20Elementor%20%26%20Gutenberg&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2125-cwe-434-unrestricted-upload-of-file--f0ef81b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2125%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20dattateccom%20Env%C3%ADaloSimple%3A%20Email%20Marketing%20y%20Newsletters&amp;severity=high&amp;id=699f6da6b7ef31ef0b58a2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2200-cwe-79-improper-neutralization-of-in-c8df3bae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2200%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bestwebsoft%20Contact%20Form%20by%20BestWebSoft%20%E2%80%93%20Advanced%20Contact%20Us%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1794-cwe-79-improper-neutralization-of-in-d4a87aee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3266-cwe-79-improper-neutralization-of-in-674ea9f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6c90b7ef31ef0b5664c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2226-cwe-20-improper-input-validation-in--464a34d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2226%3A%20CWE-20%20Improper%20Input%20Validation%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1904-cwe-862-missing-authorization-in-sty-df391d3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1904%3A%20CWE-862%20Missing%20Authorization%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1637-cwe-862-missing-authorization-in-jte-325b2e5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1637%3A%20CWE-862%20Missing%20Authorization%20in%20jtermaat%20360%20Javascript%20Viewer&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3053-cwe-79-improper-neutralization-of-in-75a07e36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3053%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpmudev%20Forminator%20%E2%80%93%20Contact%20Form%2C%20Payment%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=699f6c8ab7ef31ef0b566137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3064-cwe-79-improper-neutralization-of-in-08554744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3064%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20staxwp%20Elementor%20Addons%2C%20Widgets%20and%20Enhancements%20%E2%80%93%20Stax&amp;severity=medium&amp;id=699f6c8bb7ef31ef0b5661a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1974-cwe-22-improper-limitation-of-a-path-b49ca143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1974%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=high&amp;id=699f6d44b7ef31ef0b56fd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2492-cwe-79-improper-neutralization-of-in-a67e4280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2492%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0376-cwe-79-improper-neutralization-of-in-8fd58ff4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0376%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1774-cwe-79-improper-neutralization-of-in-cb37595f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1774%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Customily%20Customily%20Product%20Personalizer&amp;severity=high&amp;id=699f6d3cb7ef31ef0b56f451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1641-cwe-862-missing-authorization-in-pic-f4125d7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1641%3A%20CWE-862%20Missing%20Authorization%20in%20pickplugins%20Accordion&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1289-cwe-285-improper-authorization-in-th-ef89abb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1289%3A%20CWE-285%20Improper%20Authorization%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2342-cwe-89-improper-neutralization-of-sp-67313198</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2342%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=high&amp;id=699f6daeb7ef31ef0b58aa40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2033-cwe-862-missing-authorization-in-j3r-bd85be5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2033%3A%20CWE-862%20Missing%20Authorization%20in%20j_3rk%20Video%20Conferencing%20with%20Zoom&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2302-cwe-532-information-exposure-through-ea9bbec2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2302%3A%20CWE-532%20Information%20Exposure%20Through%20Log%20Files%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20Sell%20Digital%20Files%20%26%20Subscriptions%20(eCommerce%20Store%20%2B%20Payments%20Made%20Easy)&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2185-cwe-79-improper-neutralization-of-in-c579a7b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2185%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20Beaver%20Builder%20Addons%20by%20WPZOOM&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1852-cwe-79-improper-neutralization-of-in-8b43ba8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1852%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=high&amp;id=699f6d40b7ef31ef0b56f6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2187-cwe-79-improper-neutralization-of-in-12290013</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpzoom%20Beaver%20Builder%20Addons%20by%20WPZOOM&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a59b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24576-cwe-78-improper-neutralization-of-s-bc3e7e18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24576%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20rust-lang%20rust&amp;severity=critical&amp;id=690a475d6d939959c8022d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29993-cwe-284-improper-access-control-in-microsoft-azure-cyclecloud-8-6-0-beb530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29993%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20CycleCloud%208.6.0&amp;severity=high&amp;id=682d9837c4522896dcbeb530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29992-cwe-522-insufficiently-protected-credentials-in-microsoft-azure-identity-library-for-net-beb51f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29992%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Microsoft%20Azure%20Identity%20Library%20for%20.NET&amp;severity=medium&amp;id=682d9837c4522896dcbeb51f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29989-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-monitor-beb50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29989%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Monitor&amp;severity=high&amp;id=682d9837c4522896dcbeb50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29985-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb4ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29985%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29984-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb4c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29984%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29983-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29983%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29982-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb4ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29982%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20670-cwe-20-improper-input-validation-in-microsoft-outlook-for-windows-bead04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20670%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Outlook%20for%20Windows&amp;severity=high&amp;id=682d9836c4522896dcbead04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29062-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-beb48b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29062%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29061-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb487</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29061%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29056-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-microsoft-windows-server-2019-beb454</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29056%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9837c4522896dcbeb454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29054-cwe-284-improper-access-control-in-microsoft-microsoft-defender-for-iot-beb44c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29054%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d9837c4522896dcbeb44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29055-cwe-284-improper-access-control-in-microsoft-microsoft-defender-for-iot-beb450</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29055%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d9837c4522896dcbeb450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29053-cwe-36-absolute-path-traversal-in-microsoft-microsoft-defender-for-iot-beb448</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29053%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d9837c4522896dcbeb448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29052-cwe-269-improper-privilege-management-in-microsoft-windows-server-2022-beb444</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29052%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9837c4522896dcbeb444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29048-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29048%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29046-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb40e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29046%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29044-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29044%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28944-cwe-197-numeric-truncation-error-in-microsoft-microsoft-sql-server-2019-gdr-beb3ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28944%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28943-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb3e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28943%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28941-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb3e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28941%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb3e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28940-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb3c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28940%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28938-cwe-125-out-of-bounds-read-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb3be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28938%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28937-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb3b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28937%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28935-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb3a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28935%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28934-cwe-121-stack-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28934%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28933-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-microsoft-visual-studio-2019-version-16-11-includes-16-0-16-10-beb39d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28933%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202019%20version%2016.11%20(includes%2016.0%20-%2016.10)&amp;severity=high&amp;id=682d9837c4522896dcbeb39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28930-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-microsoft-sql-server-2019-cu-25-beb375</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28930%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28927-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-gdr-beb36d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28927%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb36d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28926-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb369</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28926%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28917-cwe-284-improper-access-control-in-microsoft-azure-arc-extension-beb312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28917%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Arc%20Extension&amp;severity=medium&amp;id=682d9837c4522896dcbeb312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28907-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb2ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28907%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9837c4522896dcbeb2ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28904-cwe-269-improper-privilege-management-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28904%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9837c4522896dcbeb292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28900-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beb27c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28900%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb27c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28897-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beb245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28897%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28925-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb365</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28925%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28924-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb361</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28924%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26257-cwe-415-double-free-in-microsoft-microsoft-365-apps-for-enterprise-beb235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26257%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682d9836c4522896dcbeb235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26251-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-sharepoint-server-2019-beb1ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26251%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Server%202019&amp;severity=medium&amp;id=682d9836c4522896dcbeb1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26240-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beb1a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26240%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26239-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb19c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26239%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26230-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26230%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26228-cwe-310-cryptographic-issues-in-microsoft-windows-10-version-1809-beb15d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26228%3A%20CWE-310%3A%20Cryptographic%20Issues%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb15d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26226-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2019-beb126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26226%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9836c4522896dcbeb126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26217-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb0f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26217%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb0f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26216-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2019-beb0d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26216%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26215-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-beb0cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26215%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26214-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb0c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26214%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26213-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb0bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26213%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9836c4522896dcbeb0bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26212-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-server-2019-beb0b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26212%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb0b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26211-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb0af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26211%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26208-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-beb08f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26208%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26207-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beb087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26207%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26245-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1507-beb1c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26245%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=682d9836c4522896dcbeb1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26244-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-10-version-1809-beb1b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26244%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb1b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26242-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-beb1a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26242%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26237-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb181</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26237%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26236-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26236%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9836c4522896dcbeb17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26235-cwe-306-missing-authentication-for-critical-function-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb179</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26235%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9836c4522896dcbeb179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26234-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-beb175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26234%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26229-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb161</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26229%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26210-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26210%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26248-cwe-303-incorrect-implementation-of-authentication-algorithm-in-microsoft-windows-10-version-1809-beb1ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26248%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26243-cwe-126-buffer-over-read-in-microsoft-windows-server-2022-beb1ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26243%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeb1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26241-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beb1a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26241%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26233-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb171</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26233%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26231-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26231%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26227-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb12e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26227%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26224-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb11e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26224%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26223-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb118</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26223%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26222-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26222%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26221-cwe-416-use-after-free-in-microsoft-windows-server-2019-beb10c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26221%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26220-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-beb108</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26220%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26219-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-beb104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26219%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26218-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-beb0f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26218%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26209-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-beb0a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26209%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26202-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-beb05a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26202%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26195-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2019-beb026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26195%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeb026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26194-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-windows-10-version-1809-beb005</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26194%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26189-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beaff9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26189%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26183-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-beafe4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26183%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeafe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26180-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-beafc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26180%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeafc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26175-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beaf78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26175%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26171-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beaf5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26171%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26168-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaf29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26168%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaf29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26193-cwe-285-improper-authorization-in-microsoft-azure-migrate-beb001</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26193%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Azure%20Migrate&amp;severity=medium&amp;id=682d9836c4522896dcbeb001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21447-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2022-beaeae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21447%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeaeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21324-cwe-269-improper-privilege-management-in-microsoft-microsoft-defender-for-iot-bead5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21324%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d9836c4522896dcbead5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21323-cwe-36-absolute-path-traversal-in-microsoft-microsoft-defender-for-iot-bead53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21323%3A%20CWE-36%3A%20Absolute%20Path%20Traversal%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d9836c4522896dcbead53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21322-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-microsoft-defender-for-iot-bead3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21322%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d9836c4522896dcbead3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20693-cwe-426-untrusted-search-path-in-microsoft-windows-10-version-1809-bead3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20693%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbead3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20665-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beacf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20665%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeacf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20678-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-bead1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20678%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbead1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29990-cwe-284-improper-access-control-in-microsoft-azure-kubernetes-service-beb513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29990%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=682d9837c4522896dcbeb513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29988-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb4fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29988%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20685-cwe-130-improper-handling-of-length-parameter-inconsistency-in-microsoft-azure-private-5g-core-bead2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20685%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Microsoft%20Azure%20Private%205G%20Core&amp;severity=medium&amp;id=682d9836c4522896dcbead2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29066-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-server-2019-beb4a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29066%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9837c4522896dcbeb4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29064-cwe-130-improper-handling-of-length-parameter-inconsistency-in-microsoft-windows-10-version-1809-beb497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29064%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29063-cwe-798-use-of-hard-coded-credentials-in-microsoft-azure-ai-search-beb48f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29063%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microsoft%20Azure%20AI%20Search&amp;severity=high&amp;id=682d9837c4522896dcbeb48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29050-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beb440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29050%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29047-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb41d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29047%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29045-cwe-121-stack-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb40a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29045%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29043-cwe-416-use-after-free-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb3fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29043%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28945-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-microsoft-sql-server-2019-gdr-beb3fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28945%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(GDR)&amp;severity=high&amp;id=682d9837c4522896dcbeb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28942-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb3e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28942%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb3e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28939-cwe-209-generation-of-error-message-containing-sensitive-information-in-microsoft-microsoft-sql-server-2019-cu-25-beb3c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28939%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28936-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb3ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28936%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28932-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb399</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28932%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28931-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28931%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28929-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-sql-server-2019-cu-25-beb371</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28929%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28915-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb30a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28915%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28914-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb2f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28914%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28913-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb2f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28913%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb2f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28912-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb2e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28912%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28911-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb2e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28911%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28910-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28910%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28909-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb2db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28909%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28908-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2019-cu-25-beb2b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28908%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202019%20(CU%2025)&amp;severity=high&amp;id=682d9837c4522896dcbeb2b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28906-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-sql-server-2022-for-cu-12-beb2a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28906%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20for%20(CU%2012)&amp;severity=high&amp;id=682d9837c4522896dcbeb2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28905-cwe-269-improper-privilege-management-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-beb29a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28905%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9837c4522896dcbeb29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28903-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb28a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28903%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28902-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beb282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28902%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28901-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beb27e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28901%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb27e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28898-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb26b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28898%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28896-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb23d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28896%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28923-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beb35d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28923%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28919-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb323</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28919%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28921-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb346</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28921%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28922-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-beb34e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28922%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9837c4522896dcbeb34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28920-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb33e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28920%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9837c4522896dcbeb33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26232-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-beb16d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26232%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26158-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-beaed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26158%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26205-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb066</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26205%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26200-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beb050</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26200%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26179-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beafbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26179%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeafbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26172-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beaf66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26172%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26256-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-22h2-beb22d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26256%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d9836c4522896dcbeb22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26255-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beb225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26255%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26254-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-beb221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26254%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeb221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26253-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beb21d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26253%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26252-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-beb210</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26252%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26250-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beb1f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26250%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeb1f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21424-cwe-284-improper-access-control-in-microsoft-azure-compute-gallery-beadf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21424%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Compute%20Gallery&amp;severity=medium&amp;id=682d9836c4522896dcbeadf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21409-cwe-416-use-after-free-in-microsoft-microsoft-visual-studio-2022-version-17-9-beadb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21409%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.9&amp;severity=high&amp;id=682d9836c4522896dcbeadb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20689-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-server-2012-bead36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20689%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682d9836c4522896dcbead36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20688-cwe-121-stack-based-buffer-overflow-in-microsoft-windows-server-2012-bead32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20688%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202012&amp;severity=high&amp;id=682d9836c4522896dcbead32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20669-cwe-693-protection-mechanism-failure-in-microsoft-windows-10-version-1809-beacfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20669%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeacfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31864-cwe-94-improper-control-of-generati-0a2203de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31864%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=critical&amp;id=690a6f039e609817bf702c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21755-execute-unauthorized-code-or-comman-d53f1e83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21755%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a2148330e0671671d0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21756-execute-unauthorized-code-or-comman-b3e513a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21756%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a2148330e0671671d0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31487-information-disclosure-in-fortinet--29b3feff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31487%3A%20Information%20disclosure%20in%20Fortinet%20FortiSandbox&amp;severity=medium&amp;id=6967a2148330e0671671d0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23671-execute-unauthorized-code-or-comman-882888e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23671%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6967a2148330e0671671d0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49074-cwe-749-exposed-dangerous-method-or-b7d9cdf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49074%3A%20CWE-749%3A%20Exposed%20Dangerous%20Method%20or%20Function%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a47396d939959c8021ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49134-cwe-829-inclusion-of-functionality--be7d6ad5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49134%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a47396d939959c8021baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49133-cwe-829-inclusion-of-functionality--02a4b8a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49133%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a47396d939959c8021bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48724-cwe-121-stack-based-buffer-overflow-7f8cd6f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48724%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a47396d939959c8021b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49913-cwe-121-stack-based-buffer-overflow-7291c87f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49913%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473c6d939959c8021c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49912-cwe-121-stack-based-buffer-overflow-1c941eaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49912%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473c6d939959c8021c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49911-cwe-121-stack-based-buffer-overflow-a4592b35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49911%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473c6d939959c8021c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49910-cwe-121-stack-based-buffer-overflow-a918c4bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49910%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473c6d939959c8021c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49909-cwe-121-stack-based-buffer-overflow-3f23b64c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49909%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473c6d939959c8021c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49908-cwe-121-stack-based-buffer-overflow-5001ae8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49908%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473c6d939959c8021c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49907-cwe-121-stack-based-buffer-overflow-3db88aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49907%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473b6d939959c8021c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49906-cwe-121-stack-based-buffer-overflow-b9a6dafb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49906%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Tp-Link%20AC1350%20Wireless%20MU-MIMO%20Gigabit%20Access%20Point%20(EAP225%20V3)&amp;severity=high&amp;id=690a473b6d939959c8021c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31860-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-zeppelin-bdaae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31860%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Zeppelin&amp;severity=medium&amp;id=682d981cc4522896dcbdaae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31370-improper-neutralization-of-special--51c69fcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31370%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20CodeIsAwesome%20AIKit&amp;severity=null&amp;id=69cd7424e6bfc5ba1def598f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1233-server-side-request-forgery-ssrf-93e45ad8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1233%3A%20Server-Side%20Request%20Forgery%20(SSRF)&amp;severity=high&amp;id=68efb0ddb00d656ee54120c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27983-vulnerability-in-nodejs-node-bed60d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27983%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31544-na-d2348fe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31544%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd3b7ef31ef0b58ee40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31507-na-38c1bc69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31507%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd3b7ef31ef0b58ee3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30706-9c3cb7d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30706&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30704-d72e4f92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30704&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30703-72d2ca8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30703&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30702-074eacbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30702&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30701-43051a4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30701&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30699-603eeed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30699&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30697-7777de80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30697&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30696-3d8d472c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30696&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30695-04f5f278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30695&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30694-b9afb408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30694&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30692-6f57d989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30692&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30691-270ed519</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30691&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30690-6a28a9e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30690&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30688-2f39ecf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30688&amp;severity=null&amp;id=699f6dc8b7ef31ef0b58e0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30687-c0c72498</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30687&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30686-7857ab39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30686&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e0a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30684-55a9f164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30684&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30683-18d94159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30683&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30681-f8826216</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30681&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30680-c69214ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30680&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30679-a1d6d43e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30679&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30678-907616f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30678&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30676-20c5a3fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30676&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27665-na-96a0efdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27665%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d84b7ef31ef0b583ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24245-na-274297ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24245%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b5708f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-09-f12e22</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26811-vulnerability-in-linux-linux-be3c54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26811%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31375-missing-authorization-in-saleswonde-2f6c0c51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31375%3A%20Missing%20Authorization%20in%20Saleswonder%20Team%3A%20Tobias%20WP2LEADS&amp;severity=null&amp;id=69cd7424e6bfc5ba1def5997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23192-improper-neutralization-of-input-du-05f2fed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23192%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a474d6d939959c80223fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23191-improper-neutralization-of-input-du-52388c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23191%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a474d6d939959c80223f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23190-improper-neutralization-of-input-du-beb27fff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23190%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a474d6d939959c80223ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23189-improper-neutralization-of-input-du-9cada1fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23189%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a474d6d939959c80223e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31817-na-6ba303ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31817%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31816-na-cf6742fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31816%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31815-na-5f1c860a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31815%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd8b7ef31ef0b58f739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31814-na-e1ad005f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31814%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31813-na-45e1af85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31813%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd8b7ef31ef0b58f733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31812-na-68d813d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31812%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31811-na-bac09d0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31811%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd6b7ef31ef0b58f66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31809-na-e1eab4ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31809%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd6b7ef31ef0b58f66a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31808-na-64619424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31808%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd6b7ef31ef0b58f667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31807-na-074ae31b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31807%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd6b7ef31ef0b58f664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31805-na-6fac68c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31805%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd6b7ef31ef0b58f660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31047-na-cdcacdb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31047%3A%20n%2Fa&amp;severity=low&amp;id=699f6dd2b7ef31ef0b58ed9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31022-na-5e8fe85a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31022%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ecdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30675-67496c14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30675&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30674-eb96cd7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30674&amp;severity=null&amp;id=699f6dc7b7ef31ef0b58e05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30672-68a4d9ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30672&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58dfab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30667-8172014c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30667&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58dfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30666-d07d97a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30666&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58dfa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30665-3da9560c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30665&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58dfa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30663-ce0853b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30663&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58dfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30662-4164a11c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30662&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58dfa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30661-9809d54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30661&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58df9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30659-1735a229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30659&amp;severity=null&amp;id=699f6dc5b7ef31ef0b58df9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28732-na-84309ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28732%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5891af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28270-na-a8fbd0cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28270%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8ab7ef31ef0b588113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28066-na-7b027412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28066%3A%20n%2Fa&amp;severity=high&amp;id=699f6d89b7ef31ef0b587f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27631-na-b045443a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27631%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d83b7ef31ef0b5817cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27488-na-f207018e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27488%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d7db7ef31ef0b57a4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26574-na-298153da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26574%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b572bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24279-na-b3629b1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24279%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b5708ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23086-na-3a8c9ff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23086%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d51b7ef31ef0b570465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23085-na-a99c4a92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23085%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b570460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23084-na-46b4f8cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23084%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b57045b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23082-na-d606b3ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23082%3A%20n%2Fa&amp;severity=null&amp;id=699f6d51b7ef31ef0b570451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23081-na-793d9fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23081%3A%20n%2Fa&amp;severity=null&amp;id=699f6d51b7ef31ef0b57044c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23079-na-49cd4b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23079%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d51b7ef31ef0b570442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23078-na-927ef06a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23078%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d51b7ef31ef0b57043d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22949-na-0d8c2dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22949%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b570392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-04-08-83697e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-04-08&amp;severity=medium&amp;id=682b68ead14de609c883697e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-08-f12135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31280-unrestricted-upload-of-file-with-da-1a142ca1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31280%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7421e6bfc5ba1def586c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31951-na-0a8a4b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31951%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd9b7ef31ef0b58f87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31950-na-6a8ae229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31950%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31949-na-a21f88c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31949%3A%20n%2Fa&amp;severity=medium&amp;id=690a2debf0ba78a050536ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31948-na-ea9f83d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31948%3A%20n%2Fa&amp;severity=medium&amp;id=690a2debf0ba78a050536edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-07-f12ae9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0406-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-befacd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0406%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=medium&amp;id=682d983ec4522896dcbefacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3159-out-of-bounds-memory-access-in-googl-bbf63c27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3159%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=690a47676d939959c80230ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3158-use-after-free-in-google-chrome-89b1f63f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3158%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=690a47656d939959c802308e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3156-inappropriate-implementation-in-goog-31c01267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3156%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=690a47656d939959c8023088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2296-cwe-79-improper-neutralization-of-in-39f180f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2296%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a81a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2132-cwe-79-improper-neutralization-of-in-53f174d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2132%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20g5theme%20Ultimate%20Bootstrap%20Elements%20for%20Elementor&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2458-cwe-79-improper-neutralization-of-in-65b41bbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2458%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codesupplyco%20Powerkit%20%E2%80%93%20Supercharge%20your%20WordPress%20Site&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0837-cwe-79-improper-neutralization-of-in-f846f745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0837%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1428-cwe-79-improper-neutralization-of-in-15413c90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Element%20Pack%20Elementor%20Addons%20(Header%20Footer%2C%20Template%20Library%2C%20Dynamic%20Grid%20%26%20Carousel%2C%20Remote%20Arrows)&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2949-cwe-79-improper-neutralization-of-in-d567f7c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2949%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shapedplugin%20Carousel%2C%20Slider%2C%20Gallery%20by%20WP%20Carousel%20%E2%80%93%20Image%20Carousel%20%26%20Photo%20Gallery%2C%20Post%20Carousel%20%26%20Post%20Grid%2C%20Product%20Carousel%20%26%20Product%20Grid%20for%20WooCommerce&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2471-cwe-79-improper-neutralization-of-in-78e26aa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2471%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bradvin%20Best%20WordPress%20Gallery%20Plugin%20%E2%80%93%20FooGallery&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2950-cwe-200-information-exposure-in-bold-a2f24f8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2950%3A%20CWE-200%20Information%20Exposure%20in%20boldgrid%20BoldGrid%20Easy%20SEO%20%E2%80%93%20Simple%20and%20Effective%20SEO&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d484</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3216-cwe-862-missing-authorization-in-web-8e3ff977</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3216%3A%20CWE-862%20Missing%20Authorization%20in%20webtoffee%20WooCommerce%20PDF%20Invoices%2C%20Packing%20Slips%2C%20Delivery%20Notes%20and%20Shipping%20Labels&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b566393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1385-cwe-862-missing-authorization-in-and-e6d965c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1385%3A%20CWE-862%20Missing%20Authorization%20in%20andypotanin%20WP-Stateless%20%E2%80%93%20Google%20Cloud%20Storage&amp;severity=high&amp;id=699f6d2db7ef31ef0b56ea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2656-cwe-79-improper-neutralization-of-in-2a452319</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2656%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20icegram%20Email%20Subscribers%20by%20Icegram%20Express%20%E2%80%93%20Email%20Marketing%2C%20Newsletters%2C%20Automation%20for%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6db3b7ef31ef0b58b089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3245-cwe-79-improper-neutralization-of-in-cad70fea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3245%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6c8eb7ef31ef0b566424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1994-cwe-862-missing-authorization-in-dfa-323b8b12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1994%3A%20CWE-862%20Missing%20Authorization%20in%20dfactory%20Image%20Watermark&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28741-na-829e552e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28741%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5891c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27620-na-7a3dbd1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27620%3A%20n%2Fa&amp;severity=high&amp;id=699f6d82b7ef31ef0b580abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-06-f12148</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29748-elevation-of-privilege-in-google-an-32894b77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29748%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68f7d9b2247d717aace26a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29745-information-disclosure-in-google-an-f7bf3491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29745%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68f7d9b2247d717aace26a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29741-elevation-of-privilege-in-google-an-0abe7987</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29741%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=69a263d732ffcdb8a2c17691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2499-cwe-79-improper-neutralization-of-in-b23ba40b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2499%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20squelch%20Squelch%20Tabs%20and%20Accordions%20Shortcodes&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31083-use-after-free-2af9695d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31083%3A%20Use%20After%20Free&amp;severity=high&amp;id=691ec3729f5a9374a9d10f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27437-vulnerability-in-linux-linux-be3426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27437%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26814-vulnerability-in-linux-linux-be3c8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26814%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26813-vulnerability-in-linux-linux-be3c7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26813%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26812-vulnerability-in-linux-linux-be3c74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26812%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26810-vulnerability-in-linux-linux-be3c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26810%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2115-cwe-352-cross-site-request-forgery-c-6d4db742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2115%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=high&amp;id=699f6da6b7ef31ef0b58a229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3217-cwe-89-improper-neutralization-of-sp-bb918f84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3217%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20listingthemes%20WP%20Directory%20Kit&amp;severity=high&amp;id=699f6c8eb7ef31ef0b566397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31852-na-7398a665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31852%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd8b7ef31ef0b58f7c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30891-na-1b306482</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30891%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58eaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30849-na-7892ad18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30849%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dcab7ef31ef0b58e756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29863-na-dba5f8f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29863%3A%20n%2Fa&amp;severity=high&amp;id=699f6da1b7ef31ef0b5898f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29672-na-e96a6bf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29672%3A%20n%2Fa&amp;severity=high&amp;id=699f6da1b7ef31ef0b5898da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26329-na-384cb9d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26329%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22363-na-90dff106</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22363%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b570037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-05-f129b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f129b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29049-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-edge-chromium-based-extended-stable-beb43c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29049%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)%20Extended%20Stable&amp;severity=medium&amp;id=682d9837c4522896dcbeb43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29981-cwe-1021-improper-restriction-of-rendered-ui-layers-or-frames-in-microsoft-microsoft-edge-chromium-based-beb4ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29981%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9837c4522896dcbeb4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45288-cwe-400-uncontrolled-resource-consu-11816c25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45288%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=high&amp;id=690a47346d939959c8021a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30255-cwe-390-detection-of-error-conditio-67e3dc1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30255%3A%20CWE-390%3A%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=690a47636d939959c8022fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27316-cwe-770-allocation-of-resources-wit-d8935450</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27316%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=690a3b63ff58c9332ff097b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38709-http-response-splitting-in-apache-s-d8135bbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38709%3A%20HTTP%20response%20splitting%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=high&amp;id=690a6f039e609817bf702c0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25699-cwe-287-improper-authentication-in--0964e160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25699%3A%20CWE-287%20Improper%20Authentication%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=high&amp;id=69858a71f9fa50a62fe12643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25705-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-esri-portal-for-arcgis-bd6d54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25705%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=682d9816c4522896dcbd6d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25709-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-esri-portal-for-arcgis-bd6d6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25709%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20Portal%20for%20ArcGIS&amp;severity=medium&amp;id=682d9816c4522896dcbd6d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25700-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-esri-arcgis-enterprise-builder-bd6d33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Esri%20ArcGIS%20Enterprise%20Builder&amp;severity=medium&amp;id=682d9816c4522896dcbd6d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30260-cwe-285-improper-authorization-in-n-e9b48538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30260%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nodejs%20undici&amp;severity=low&amp;id=690a2de9f0ba78a050536eae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30261-cwe-284-improper-access-control-in--bcd82e26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30261%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nodejs%20undici&amp;severity=low&amp;id=690a2debf0ba78a050536ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27919-cwe-390-detection-of-error-conditio-70088eb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27919%3A%20CWE-390%3A%20Detection%20of%20Error%20Condition%20Without%20Action%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=690a47616d939959c8022f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31082-buffer-over-read-40b0d932</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31082%3A%20Buffer%20Over-read&amp;severity=high&amp;id=691ec3729f5a9374a9d10f6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31081-buffer-over-read-05d6703b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31081%3A%20Buffer%20Over-read&amp;severity=high&amp;id=691ec3729f5a9374a9d10f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31080-buffer-over-read-a77a7640</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31080%3A%20Buffer%20Over-read&amp;severity=high&amp;id=691ec3729f5a9374a9d10f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3296-observable-discrepancy-f13b5f8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3296%3A%20Observable%20Timing%20Discrepancy&amp;severity=medium&amp;id=691f698540b920e2708380ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2700-cleartext-storage-of-sensitive-infor-10c420ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2700%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20an%20Environment%20Variable&amp;severity=high&amp;id=690dcfa5c2e5047ad741866f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26809-vulnerability-in-linux-linux-bddad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26809%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26808-vulnerability-in-linux-linux-be3c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26808%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3262-cwe-200-exposure-of-sensitive-inform-e62dae82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3262%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Best%20Practical%20Solutions%20Request%20Tracker&amp;severity=medium&amp;id=690904b100ff46172d4a0ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26807-vulnerability-in-linux-linux-bddac8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26807%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26806-vulnerability-in-linux-linux-be3c48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26806%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26805-vulnerability-in-linux-linux-bddac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26805%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26804-vulnerability-in-linux-linux-bddab8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26804%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26803-vulnerability-in-linux-linux-be3c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26803%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26802-vulnerability-in-linux-linux-be3c40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26802%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26801-vulnerability-in-linux-linux-be3c3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26801%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26800-vulnerability-in-linux-linux-bddab0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26800%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26799-vulnerability-in-linux-linux-be3c38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26799%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26798-vulnerability-in-linux-linux-bdda94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26798%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26797-vulnerability-in-linux-linux-be3c32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26797%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26796-vulnerability-in-linux-linux-be3c2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26796%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26795-vulnerability-in-linux-linux-be3c1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26795%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26794-vulnerability-in-linux-linux-be3c0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26794%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26793-vulnerability-in-linux-linux-be3c02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26793%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26792-vulnerability-in-linux-linux-bdda8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26792%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26791-vulnerability-in-linux-linux-be3bf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26791%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26790-vulnerability-in-linux-linux-be3beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26790%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26789-vulnerability-in-linux-linux-be3be3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26789%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26788-vulnerability-in-linux-linux-be3bdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26788%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe3bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26787-vulnerability-in-linux-linux-be3bd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26786-vulnerability-in-linux-linux-be3bcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26785-vulnerability-in-linux-linux-be3bbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe3bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26784-vulnerability-in-linux-linux-be3b9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26783-vulnerability-in-linux-linux-be3b92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26782-vulnerability-in-linux-linux-be3b8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26781-vulnerability-in-linux-linux-be3b82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26780-vulnerability-in-linux-linux-be3b73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26750-vulnerability-in-linux-linux-be3a45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26750%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26746-vulnerability-in-linux-linux-be3a0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26746%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26745-vulnerability-in-linux-linux-bdda61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26745%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1418-cwe-284-improper-access-control-in-m-12e03191</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1418%3A%20CWE-284%20Improper%20Access%20Control%20in%20mordauk%20CGC%20Maintenance%20Mode&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2008-cwe-502-deserialization-of-untrusted-337b7bfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2008%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Modal%20Popup%20Box%20%E2%80%93%20Popup%20Builder%2C%20Show%20Offers%20And%20News%20in%20Popup&amp;severity=high&amp;id=699f6da2b7ef31ef0b5899e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2919-cwe-79-improper-neutralization-of-in-54b33d0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2919%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20britner%20Gutenberg%20Blocks%20with%20AI%20by%20Kadence%20WP%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2830-cwe-79-improper-neutralization-of-in-f21d88e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20stevejburge%20WordPress%20Tag%20and%20Category%20Manager%20%E2%80%93%20AI%20Autotagger&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2803-cwe-79-improper-neutralization-of-in-d74e4435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2803%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3030-cwe-79-improper-neutralization-of-in-715fc3a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3030%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gqevu6bsiz%20Announce%20from%20the%20Dashboard&amp;severity=medium&amp;id=699f6c8ab7ef31ef0b566122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2868-cwe-80-improper-neutralization-of-sc-5ec07f76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2868%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20devitemsllc%20ShopLentor%20%E2%80%93%20WooCommerce%20Builder%20for%20Elementor%20%26%20Gutenberg%20%2B12%20Modules%20%E2%80%93%20All%20in%20One%20Solution%20(formerly%20WooLentor)&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58b673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3022-cwe-434-unrestricted-upload-of-file--9afab63e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3022%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20reputeinfosystems%20BookingPress%20%E2%80%93%20Appointment%20Booking%20Calendar%20Plugin%20and%20Online%20Scheduling%20Plugin&amp;severity=high&amp;id=699f6c8ab7ef31ef0b566115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2692-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-siyuan-siyuan-aeb528</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SiYuan%20SiYuan&amp;severity=critical&amp;id=682cd0f81484d88663aeb528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3273-cwe-77-command-injection-in-d-link-d-918d86d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3273%3A%20CWE-77%20Command%20Injection%20in%20D-Link%20DNS-320L&amp;severity=high&amp;id=68f7d9b3247d717aace26a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3272-cwe-798-hard-coded-credentials-in-d--e6aa15bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3272%3A%20CWE-798%20Hard-coded%20Credentials%20in%20D-Link%20DNS-320L&amp;severity=critical&amp;id=68f7d9b3247d717aace26a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31498-na-8724f3e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31498%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd2b7ef31ef0b58edb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31025-na-14614e9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31025%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd0b7ef31ef0b58ecdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30565-na-adf7a968</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30565%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc2b7ef31ef0b58dc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29387-na-8d72b231</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29387%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9db7ef31ef0b5895b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29386-na-628b8562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29386%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9db7ef31ef0b5895ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28520-na-889dff74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28520%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d90b7ef31ef0b588ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27575-na-6f081327</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27575%3A%20n%2Fa&amp;severity=high&amp;id=699f6d82b7ef31ef0b580a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25503-na-c76f41bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25503%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-04-f12ee4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2653-cwe-789-memory-allocation-with-exces-7a1c303c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2653%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20AMPHP%20amphp%2Fhttp-client&amp;severity=high&amp;id=690a47636d939959c8022fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26779-vulnerability-in-linux-linux-be3b6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26778-vulnerability-in-linux-linux-be3b63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26777-vulnerability-in-linux-linux-be3b5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26776-vulnerability-in-linux-linux-aebfce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26775-vulnerability-in-linux-linux-be3b52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26774-vulnerability-in-linux-linux-aebfcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26774%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26773-vulnerability-in-linux-linux-be3b4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26773%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26772-vulnerability-in-linux-linux-be3b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26772%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26771-vulnerability-in-linux-linux-be3b17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26771%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26770-vulnerability-in-linux-linux-be3b0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26770%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26769-vulnerability-in-linux-linux-be3b07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26769%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26768-vulnerability-in-linux-linux-be3b01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26768%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26767-vulnerability-in-linux-linux-aebfca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26767%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26766-vulnerability-in-linux-linux-bdda71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26766%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26765-vulnerability-in-linux-linux-be3af0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26765%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26764-vulnerability-in-linux-linux-be3ae8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26764%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26763-vulnerability-in-linux-linux-be3ae0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26763%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26762-vulnerability-in-linux-linux-be3ad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26762%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26761-vulnerability-in-linux-linux-be3ad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26761%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26760-vulnerability-in-linux-linux-be3aa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26760%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26759-vulnerability-in-linux-linux-be3a9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26759%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26758-vulnerability-in-linux-linux-be3a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26758%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26757-vulnerability-in-linux-linux-be3a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26757%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26756-vulnerability-in-linux-linux-be3a83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26756%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26755-vulnerability-in-linux-linux-be3a74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26755%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26754-vulnerability-in-linux-linux-be3a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26754%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26753-vulnerability-in-linux-linux-be3a62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26753%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26752-vulnerability-in-linux-linux-bdda69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26752%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26751-vulnerability-in-linux-linux-be3a4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26751%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3a4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26749-vulnerability-in-linux-linux-be3a1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26749%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26748-vulnerability-in-linux-linux-be3a17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26748%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26747-vulnerability-in-linux-linux-bd8dd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26747%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26744-vulnerability-in-linux-linux-be3a07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26744%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26743-vulnerability-in-linux-linux-be39f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26743%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe39f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26742-vulnerability-in-linux-linux-be39f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26742%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe39f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26741-vulnerability-in-linux-linux-be39ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26741%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe39ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26740-vulnerability-in-linux-linux-be39e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26740%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe39e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26739-vulnerability-in-linux-linux-bd7b58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26739%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9818c4522896dcbd7b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26738-vulnerability-in-linux-linux-be39d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26738%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe39d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26737-vulnerability-in-linux-linux-be39cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26737%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe39cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26736-vulnerability-in-linux-linux-be39ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26736%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe39ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26735-vulnerability-in-linux-linux-be39a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26735%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe39a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26734-vulnerability-in-linux-linux-be399b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26734%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe399b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26733-vulnerability-in-linux-linux-be3993</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26733%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26732-vulnerability-in-linux-linux-be398b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26732%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe398b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26731-vulnerability-in-linux-linux-bdda4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26731%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26730-vulnerability-in-linux-linux-be397a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26730%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe397a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26729-vulnerability-in-linux-linux-be3972</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26729%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26728-vulnerability-in-linux-linux-be396a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26728%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe396a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52641-vulnerability-in-linux-linux-be71a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe71a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52640-vulnerability-in-linux-linux-be71a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe71a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1180-cwe-78-improper-neutralization-of-sp-d591ca8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1180%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20TP-Link%20Omada%20ER605&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30366-cwe-416-use-after-free-in-foxit-pdf-ec222594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30366%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30334-cwe-416-use-after-free-in-foxit-pdf-7b19617e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30334%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30333-cwe-416-use-after-free-in-foxit-pdf-ddc46dbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30333%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30332-cwe-416-use-after-free-in-foxit-pdf-90a94654</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30332%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30331-cwe-416-use-after-free-in-foxit-pdf-6b61ce30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30331%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30329-cwe-416-use-after-free-in-foxit-pdf-a1eac961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30329%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbdb7ef31ef0b58d7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30328-cwe-416-use-after-free-in-foxit-pdf-379460b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30328%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30327-cwe-416-use-after-free-in-foxit-pdf-259e398a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30327%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30326-cwe-416-use-after-free-in-foxit-pdf-4c7e8cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30326%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30325-cwe-416-use-after-free-in-foxit-pdf-28b1003c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30325%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbdb7ef31ef0b58d7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30324-cwe-416-use-after-free-in-foxit-pdf-4b7874f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30324%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30323-cwe-125-out-of-bounds-read-in-foxit-3dadd84a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30323%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30322-cwe-416-use-after-free-in-foxit-pdf-ee5c5d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30322%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27346-cwe-125-out-of-bounds-read-in-kofax-65900256</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27346%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6d7bb7ef31ef0b576c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27344-cwe-119-improper-restriction-of-ope-d5414648</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27344%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b576c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27343-cwe-125-out-of-bounds-read-in-kofax-2788bd1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27343%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6d7bb7ef31ef0b576bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27342-cwe-787-out-of-bounds-write-in-kofa-002bb1d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27342%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b576beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27341-cwe-122-heap-based-buffer-overflow--efb9d961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27341%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b576096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27340-cwe-122-heap-based-buffer-overflow--c64792de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27340%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b57608a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27339-cwe-787-out-of-bounds-write-in-kofa-f824df97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27339%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b57607e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27338-cwe-125-out-of-bounds-read-in-kofax-6824abcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27338%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b576076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27337-cwe-121-stack-based-buffer-overflow-0b7b9f34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27337%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Kofax%20Power%20PDF&amp;severity=high&amp;id=699f6d7bb7ef31ef0b57606e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27336-cwe-125-out-of-bounds-read-in-kofax-6b9672a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27336%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6d7bb7ef31ef0b576065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26727-vulnerability-in-linux-linux-bdda46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26727%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26726-vulnerability-in-linux-linux-be3959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26726%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26725-vulnerability-in-linux-linux-be3951</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26725%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26724-vulnerability-in-linux-linux-be3931</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26724%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26723-vulnerability-in-linux-linux-be3929</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26723%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26722-vulnerability-in-linux-linux-be3921</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26722%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26721-vulnerability-in-linux-linux-be3919</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26721%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26719-vulnerability-in-linux-linux-be3913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26719%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26718-vulnerability-in-linux-linux-be390f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26718%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe390f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26717-vulnerability-in-linux-linux-be3907</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26717%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26716-vulnerability-in-linux-linux-be38f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26716%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26715-vulnerability-in-linux-linux-bdda37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26715%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26714-vulnerability-in-linux-linux-be38f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26714%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26712-vulnerability-in-linux-linux-bd8dca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26712%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26711-vulnerability-in-linux-linux-be38df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26711%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26710-vulnerability-in-linux-linux-be38c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26710%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26709-vulnerability-in-linux-linux-be38be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26709%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe38be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26708-vulnerability-in-linux-linux-be38af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26708%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26707-vulnerability-in-linux-linux-be38a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26707%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26706-vulnerability-in-linux-linux-be38a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26706%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe38a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26705-vulnerability-in-linux-linux-be389d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26705%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe389d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26704-vulnerability-in-linux-linux-be3895</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26704%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26703-vulnerability-in-linux-linux-be388d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26703%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe388d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26702-vulnerability-in-linux-linux-be3885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26702%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26700-vulnerability-in-linux-linux-be3876</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26700%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26699-vulnerability-in-linux-linux-be3856</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26699%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26698-vulnerability-in-linux-linux-be3852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26698%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26697-vulnerability-in-linux-linux-be384e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26697%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe384e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26696-vulnerability-in-linux-linux-be384a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26696%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe384a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26695-vulnerability-in-linux-linux-bdda31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26695%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26694-vulnerability-in-linux-linux-be3846</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26694%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26693-vulnerability-in-linux-linux-be3842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26693%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26692-vulnerability-in-linux-linux-be383e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26692%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe383e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26691-vulnerability-in-linux-linux-be383a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26691%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe383a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26690-vulnerability-in-linux-linux-be3836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26690%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe3836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26689-vulnerability-in-linux-linux-be3832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26689%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26688-vulnerability-in-linux-linux-be380c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26688%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe380c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26687-vulnerability-in-linux-linux-be3808</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26687%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe3808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26686-vulnerability-in-linux-linux-be37fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26686%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26685-vulnerability-in-linux-linux-bdda2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26685%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52639-vulnerability-in-linux-linux-be7195</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52639%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52638-vulnerability-in-linux-linux-be718d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52637-vulnerability-in-linux-linux-be7185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31420-null-pointer-dereference-1c97cc27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31420%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=691f6d0840b920e2708759b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31419-exposure-of-sensitive-system-inform-60213ac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31419%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere&amp;severity=medium&amp;id=68e90ce7dd820f2ffe5dfcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24976-cwe-130-improper-handling-of-length-2cd4a8ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24976%3A%20CWE-130%3A%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20Open%20Automation%20Software%20OAS%20Platform&amp;severity=medium&amp;id=690a475d6d939959c8022d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27201-cwe-20-improper-input-validation-in-dcec6bee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Open%20Automation%20Software%20OAS%20Platform&amp;severity=medium&amp;id=690a47616d939959c8022f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21870-cwe-73-external-control-of-file-nam-2a490d79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21870%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Open%20Automation%20Software%20OAS%20Platform&amp;severity=medium&amp;id=690a474b6d939959c80223a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22178-cwe-73-external-control-of-file-nam-3faaaf0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22178%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Open%20Automation%20Software%20OAS%20Platform&amp;severity=medium&amp;id=690a474d6d939959c80223d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25918-improper-control-of-generation-of-c-3d3194df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25918%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27191-improper-control-of-generation-of-c-5c489c58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27191%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20inpersttion%20Slivery%20Extender&amp;severity=null&amp;id=69cd7416e6bfc5ba1def51eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27972-improper-control-of-generation-of-c-6326d6b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27972%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Jack%20Arturo%20WP%20Fusion%20Lite&amp;severity=null&amp;id=69cd7416e6bfc5ba1def51fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3162-cwe-87-improper-neutralization-of-al-8b004ac8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3162%3A%20CWE-87%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6c8db7ef31ef0b5662e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1327-cwe-79-improper-neutralization-of-in-dc73447d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1327%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31012-na-dd736b79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31012%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ecd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31011-na-68c4dc7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31011%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ecd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31010-na-449b74bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31010%3A%20n%2Fa&amp;severity=high&amp;id=699f6dd0b7ef31ef0b58ecd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31009-na-50075ffa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31009%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58eccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31008-na-d343ca3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31008%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58eccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30998-na-22f1289f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30998%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ec27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30570-na-6589d5e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30570%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dc9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30569-na-3f28b7a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30569%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc2b7ef31ef0b58dc97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30568-na-2c059b11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30568%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc2b7ef31ef0b58dc93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30166-na-5df96354</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30166%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dbcb7ef31ef0b58d625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29413-na-9189897b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29413%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9eb7ef31ef0b589696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28836-na-c1b06d8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28836%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b589382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28755-na-34b91d38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28755%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b5891d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28589-na-45830114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28589%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28515-na-56057739</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28515%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d90b7ef31ef0b588ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28275-na-9a26c816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28275%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8ab7ef31ef0b588116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27706-na-fa392403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27706%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d85b7ef31ef0b584fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27705-na-5917cbb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27705%3A%20n%2Fa&amp;severity=high&amp;id=699f6d85b7ef31ef0b584fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27674-na-6c1c5df9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27674%3A%20n%2Fa&amp;severity=high&amp;id=699f6d84b7ef31ef0b583cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24724-na-6622f9b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24724%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5eb7ef31ef0b570c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24506-na-1d6221d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24506%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5db7ef31ef0b570b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28219-na-ab668dd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28219%3A%20n%2Fa&amp;severity=medium&amp;id=690a47636d939959c8022fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-03-f12432</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f12432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30371-cwe-416-use-after-free-in-foxit-pdf-75c78e3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30371%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dc1b7ef31ef0b58db9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30370-cwe-693-protection-mechanism-failur-d0fd65bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30370%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20RARLAB%20WinRAR&amp;severity=medium&amp;id=699f6dc1b7ef31ef0b58db9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30367-cwe-416-use-after-free-in-foxit-pdf-c587e6dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30367%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30365-cwe-416-use-after-free-in-foxit-pdf-82e58ed0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30365%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30364-cwe-125-out-of-bounds-read-in-foxit-4f98017a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30364%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbfb7ef31ef0b58dacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30363-cwe-125-out-of-bounds-read-in-foxit-56ff4ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30363%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbfb7ef31ef0b58dac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30362-cwe-416-use-after-free-in-foxit-pdf-fa8d9196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30362%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30361-cwe-416-use-after-free-in-foxit-pdf-a2412799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30361%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30360-cwe-416-use-after-free-in-foxit-pdf-ba9f4239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30360%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30359-cwe-125-out-of-bounds-read-in-foxit-6e49a78c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30359%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30358-cwe-416-use-after-free-in-foxit-pdf-34b2e66d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30358%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58dab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30357-cwe-843-access-of-resource-using-in-6e7cfcc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30357%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30356-cwe-125-out-of-bounds-read-in-foxit-a7302ae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30356%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbfb7ef31ef0b58da5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30355-cwe-787-out-of-bounds-write-in-foxi-9523c4c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30355%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30354-cwe-416-use-after-free-in-foxit-pdf-241c6c76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30354%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30353-cwe-125-out-of-bounds-read-in-foxit-c7ccb944</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30353%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30352-cwe-416-use-after-free-in-foxit-pdf-d3d0f24f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30352%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30351-cwe-416-use-after-free-in-foxit-pdf-96ae59bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30351%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30350-cwe-125-out-of-bounds-read-in-foxit-69fada6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30350%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbfb7ef31ef0b58da43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30349-cwe-787-out-of-bounds-write-in-foxi-d69d5f44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30349%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30348-cwe-787-out-of-bounds-write-in-foxi-1cbb19f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30348%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58da3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30346-cwe-416-use-after-free-in-foxit-pdf-26e6f588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30346%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbfb7ef31ef0b58d9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30345-cwe-416-use-after-free-in-foxit-pdf-cbd17fff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30345%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30344-cwe-416-use-after-free-in-foxit-pdf-f8e5b69d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30344%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30343-cwe-416-use-after-free-in-foxit-pdf-a6d5d30b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30343%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30342-cwe-416-use-after-free-in-foxit-pdf-b6403550</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30342%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30340-cwe-125-out-of-bounds-read-in-foxit-eb1b227a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30340%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbeb7ef31ef0b58d957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30339-cwe-416-use-after-free-in-foxit-pdf-9952d6d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30339%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30338-cwe-416-use-after-free-in-foxit-pdf-71ce50c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30338%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30337-cwe-416-use-after-free-in-foxit-pdf-d1ba869c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30337%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30336-cwe-416-use-after-free-in-foxit-pdf-4d4a7dd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30336%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20PDF%20Reader&amp;severity=high&amp;id=699f6dbeb7ef31ef0b58d947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24888-server-side-request-forgery-ssrf-in-a7a67777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24888%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20StellarWP%20Gutenberg%20Blocks%20by%20Kadence%20Blocks&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30335-cwe-125-out-of-bounds-read-in-foxit-a1c122de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30335%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=699f6dbdb7ef31ef0b58d801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22246-unauthenticated-command-injection-v-f9469305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22246%3A%20Unauthenticated%20Command%20Injection%20vulnerability%20in%20SD-WAN%20Edge%20in%20VMware%20SD-WAN%20Edge&amp;severity=high&amp;id=69418d789050fe8508ffbf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2389-cwe-78-improper-neutralization-of-sp-e2d64737</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2389%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20Flowmon&amp;severity=critical&amp;id=694188253e7fd18214bf80d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1946-cwe-79-improper-neutralization-of-in-746c19d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1946%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20studiopress%20Genesis%20Blocks&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56f89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1807-cwe-862-missing-authorization-in-a3r-4c459983</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1807%3A%20CWE-862%20Missing%20Authorization%20in%20a3rev%20Product%20Sort%20and%20Display%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1732-cwe-862-missing-authorization-in-dja-d358df92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1732%3A%20CWE-862%20Missing%20Authorization%20in%20djamio1988%20Sharkdropship%20Dropshipping%20%26%20Affiliate%20for%20for%20AliExpress&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f38a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2931-cwe-200-information-exposure-in-syam-ec69af13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2931%3A%20CWE-200%20Information%20Exposure%20in%20syammohanm%20WPFront%20User%20Role%20Editor&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1300-missing-release-of-memory-after-effe-2601c3eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1300%3A%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=690dcfa5c2e5047ad7418662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26684-vulnerability-in-linux-linux-be37f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26684%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26683-vulnerability-in-linux-linux-be37f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26683%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26682-vulnerability-in-linux-linux-be37ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26682%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26681-vulnerability-in-linux-linux-be37eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26681%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26680-vulnerability-in-linux-linux-be37e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26680%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26679-vulnerability-in-linux-linux-bdda25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26679%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26678-vulnerability-in-linux-linux-be37e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26678%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26677-vulnerability-in-linux-linux-be37df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26677%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26676-vulnerability-in-linux-linux-bd8dc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26676%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26675-vulnerability-in-linux-linux-be37c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26675%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26674-vulnerability-in-linux-linux-be37be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26674%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ac4522896dcbe37be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52636-vulnerability-in-linux-linux-be717d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe717d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26673-vulnerability-in-linux-linux-be37ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26673%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26672-vulnerability-in-linux-linux-be37b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26672%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26671-vulnerability-in-linux-linux-be37b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26671%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ac4522896dcbe37b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52635-vulnerability-in-linux-linux-be7164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52634-vulnerability-in-linux-linux-be7160</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52633-vulnerability-in-linux-linux-be715c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe715c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52632-vulnerability-in-linux-linux-be714f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe714f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2925-cwe-79-improper-neutralization-of-in-507f845d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2925%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2839-cwe-79-improper-neutralization-of-in-c053a8f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2839%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26670-vulnerability-in-linux-linux-bdda1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26670%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdda1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26669-vulnerability-in-linux-linux-be431e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26669%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe431e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26668-vulnerability-in-linux-linux-be431a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26668%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe431a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26667-vulnerability-in-linux-linux-be4318</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26667%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26666-vulnerability-in-linux-linux-be4309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26666%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26665-vulnerability-in-linux-linux-be4301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26665%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26664-vulnerability-in-linux-linux-bdda06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26664%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26663-vulnerability-in-linux-linux-be42e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26663%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe42e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26662-vulnerability-in-linux-linux-be42d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26662%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe42d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26661-vulnerability-in-linux-linux-be42cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26661%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe42cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26660-vulnerability-in-linux-linux-be42c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26660%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe42c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26659-vulnerability-in-linux-linux-be42bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26659%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe42bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26658-vulnerability-in-linux-linux-be42bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26658%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe42bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52631-vulnerability-in-linux-linux-be713e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe713e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26657-vulnerability-in-linux-linux-be42b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26657%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe42b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26656-vulnerability-in-linux-linux-be42a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26656%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe42a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1504-cwe-352-cross-site-request-forgery-c-3997db71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1504%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20secupress%20SecuPress%20Free%20%E2%80%94%20WordPress%20Security&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2924-cwe-79-improper-neutralization-of-in-e7b29e50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20echoplugins%20Creative%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6db9b7ef31ef0b58d35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2791-cwe-79-improper-neutralization-of-in-2d486d0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20MetForm%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20%26%20Custom%20Form%20Builder%20for%20Elementor&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31002-na-6d18fa5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31002%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ec2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30965-na-90f04796</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30965%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcfb7ef31ef0b58eb91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30946-na-0dd20bd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30946%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58eab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30809-na-441cc40b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30809%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcab7ef31ef0b58e748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30808-na-989aa6f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30808%3A%20n%2Fa&amp;severity=low&amp;id=699f6dcab7ef31ef0b58e744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30807-na-71cbdc7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30807%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcab7ef31ef0b58e740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30806-na-5d9b2522</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30806%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcab7ef31ef0b58e73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30621-na-4c0590b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30621%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc4b7ef31ef0b58de74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29514-na-57ff206c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29514%3A%20n%2Fa&amp;severity=high&amp;id=699f6da0b7ef31ef0b589854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29432-na-dff76232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29432%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9eb7ef31ef0b58969c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29276-na-55562744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29276%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9bb7ef31ef0b589457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28287-na-dc3f8ad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28287%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8cb7ef31ef0b5883a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27602-na-4686d511</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27602%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d82b7ef31ef0b580aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25187-na-6c792e23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25187%3A%20n%2Fa&amp;severity=high&amp;id=699f6d61b7ef31ef0b571ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25075-na-380a8766</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25075%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5fb7ef31ef0b570c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22780-na-dfeedff0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22780%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-02-f12fb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27334-cwe-125-out-of-bounds-read-in-kofax-d55640ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27334%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6d7bb7ef31ef0b57605a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27333-cwe-125-out-of-bounds-read-in-kofax-060155a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27333%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Kofax%20Power%20PDF&amp;severity=low&amp;id=699f6d7bb7ef31ef0b57604d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27332-cwe-125-out-of-bounds-read-in-pdf-x-29118bfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27332%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d7bb7ef31ef0b576041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27331-cwe-125-out-of-bounds-read-in-pdf-x-3af23362</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27331%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d7bb7ef31ef0b576037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27330-cwe-125-out-of-bounds-read-in-pdf-x-a8d8a88d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27330%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d79b7ef31ef0b57376f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27328-cwe-125-out-of-bounds-read-in-pdf-x-11f79012</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27328%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d79b7ef31ef0b573765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27327-cwe-787-out-of-bounds-write-in-pdf--c964750f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27327%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6d79b7ef31ef0b57375a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27326-cwe-125-out-of-bounds-read-in-pdf-x-c909c89a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27326%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d79b7ef31ef0b57374f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27325-cwe-125-out-of-bounds-read-in-pdf-x-f7f2fd55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27325%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d79b7ef31ef0b573746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27324-cwe-125-out-of-bounds-read-in-pdf-x-d1d9e2bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27324%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=low&amp;id=699f6d79b7ef31ef0b57373d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27323-cwe-295-improper-certificate-valida-b65ca071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27323%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20PDF-XChange%20PDF-XChange%20Editor&amp;severity=high&amp;id=699f6d79b7ef31ef0b573733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1863-cwe-89-improper-neutralization-of-sp-11f79f59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1863%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sante%20PACS%20Server&amp;severity=critical&amp;id=699f6d42b7ef31ef0b56f782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1179-cwe-121-stack-based-buffer-overflow--849b3c06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1179%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20TP-Link%20Omada%20ER605&amp;severity=high&amp;id=699f6d24b7ef31ef0b56e566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26655-vulnerability-in-linux-linux-be42a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26655%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe42a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26654-vulnerability-in-linux-linux-be429e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26654%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe429e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26653-vulnerability-in-linux-linux-be427c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26653%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe427c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31033-na-dc784212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31033%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd0b7ef31ef0b58ecea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30872-na-e24f6555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30872%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58e9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30871-na-5876ad34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30871%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58e9fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30870-na-8484f739</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30870%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58e93b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30867-na-ffa5e2f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30867%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dcdb7ef31ef0b58e91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30866-na-ec34ae8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30866%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58e919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30865-na-77c5447d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30865%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dcdb7ef31ef0b58e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30864-na-d9c3959d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30864%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58e913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30863-na-1ae6a447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30863%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58e910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30862-na-5cfdb8c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30862%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58e90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30861-na-d88d15dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30861%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dcdb7ef31ef0b58e90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30860-na-0e5b9b6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30860%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58e907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30859-na-0757eeda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30859%3A%20n%2Fa&amp;severity=high&amp;id=699f6dcdb7ef31ef0b58e903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29435-na-13195ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29435%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9eb7ef31ef0b5896a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29433-na-e471946e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29433%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9eb7ef31ef0b5896a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25080-na-cc5e70a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25080%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5fb7ef31ef0b570c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-04-01-f12c17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-04-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30549-improper-neutralization-of-input-du-90f16720</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30549%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cimatti%20Contact%20Forms%20by%20Cimatti&amp;severity=null&amp;id=69cd7421e6bfc5ba1def5850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25027-cwe-311-missing-encryption-of-sensi-0c947a59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25027%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20IBM%20Security%20Verify%20Access%20Docker&amp;severity=medium&amp;id=6909261ffe7723195e0b46ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27609-na-39aed837</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27609%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d82b7ef31ef0b580aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-31-73da9a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-31&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73da9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-31-f1306d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-31&amp;severity=medium&amp;id=682acdc2bbaf20d303f1306d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3018-cwe-502-deserialization-of-untrusted-c74224c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3018%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=high&amp;id=699f6c89b7ef31ef0b566096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2491-cwe-79-improper-neutralization-of-in-32cead6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2491%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2948-cwe-79-improper-neutralization-of-in-e4540784</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2948%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kylephillips%20Favorites&amp;severity=high&amp;id=699f6dbab7ef31ef0b58d47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2140-cwe-79-improper-neutralization-of-in-4676cfa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2140%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2142-cwe-79-improper-neutralization-of-in-ea131235</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2141-cwe-79-improper-neutralization-of-in-0c902ec5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2141%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2144-cwe-79-improper-neutralization-of-in-6bce81e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2144%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2143-cwe-79-improper-neutralization-of-in-c13d684e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2143%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brainstormforce%20Ultimate%20Addons%20for%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1238-cwe-80-improper-neutralization-of-sc-5402a82e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1238%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1051-cwe-79-improper-neutralization-of-in-865066b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1051%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20fernandobt%20List%20category%20posts&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e13d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2086-cwe-862-missing-authorization-in-pri-2a382d9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2086%3A%20CWE-862%20Missing%20Authorization%20in%20princeahmed%20Integrate%20Google%20Drive%20%E2%80%93%20Browse%2C%20Upload%2C%20Download%2C%20Embed%2C%20Play%2C%20Share%2C%20Gallery%2C%20and%20Manage%20Your%20Google%20Drive%20Files%20into%20Your%20WordPress%20Site&amp;severity=critical&amp;id=699f6da4b7ef31ef0b589c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2794-cwe-79-improper-neutralization-of-in-a0c5f821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2794%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20munirkamal%20Gutenberg%20Block%20Editor%20Toolkit%20%E2%80%93%20EditorsKit&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b40a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0367-cwe-79-improper-neutralization-of-in-97659d61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0367%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20unitecms%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2047-cwe-98-improper-control-of-filename--d1110220</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2047%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=high&amp;id=699f6da3b7ef31ef0b589b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1692-cwe-79-improper-neutralization-of-in-076ed912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1692%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20BoldGrid%20Easy%20SEO%20%E2%80%93%20Simple%20and%20Effective%20SEO&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29278-na-f24ade74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29278%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b58945b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28288-na-a3f51bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28288%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8cb7ef31ef0b5883ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-30-f123dd</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f123dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30435-improper-neutralization-of-input-du-62379c83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30435%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20POSIMYTH%20Nexter%20Blocks&amp;severity=null&amp;id=69cd741ee6bfc5ba1def5475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3094-embedded-malicious-code-adc3112c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3094%3A%20Embedded%20Malicious%20Code&amp;severity=critical&amp;id=691ec3729f5a9374a9d10f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30505-missing-authorization-in-andymoyle--0d723507</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30505%3A%20Missing%20Authorization%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd7421e6bfc5ba1def5846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30493-cross-site-request-forgery-csrf-in--f90144cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30493%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd741ee6bfc5ba1def547d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30488-improper-neutralization-of-special--66f18370</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30488%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Katie%20Zotpress&amp;severity=null&amp;id=69cd741ee6bfc5ba1def5479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30428-improper-neutralization-of-input-du-f54f80b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30428%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd741ee6bfc5ba1def5471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30503-improper-neutralization-of-input-du-8bc86920</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30503%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20EverPress%20Mailster&amp;severity=null&amp;id=69cd7421e6bfc5ba1def583f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2848-cwe-862-missing-authorization-in-cyb-e84d31b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2848%3A%20CWE-862%20Missing%20Authorization%20in%20cyberchimps%20Responsive&amp;severity=high&amp;id=699f6db7b7ef31ef0b58b5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3061-cwe-98-improper-control-of-filename--b11bc2a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3061%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=699f6c8bb7ef31ef0b56619c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52629-vulnerability-in-linux-linux-be7134</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe7134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2411-cwe-98-improper-control-of-filename--b2ed4fd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2411%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=critical&amp;id=699f6dafb7ef31ef0b58abd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2409-cwe-266-incorrect-privilege-assignme-406b21ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2409%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=critical&amp;id=699f6dafb7ef31ef0b58abd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2250-cwe-79-improper-neutralization-of-in-5d2f964b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2250%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpro%20140%2B%20Widgets%20%7C%20Best%20Addons%20For%20Elementor%20%E2%80%93%20FREE&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2280-cwe-79-improper-neutralization-of-in-647f282c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2280%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitforest%20Better%20Elementor%20Addons&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0956-cwe-89-improper-neutralization-of-sp-c6908a18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0956%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6de9b7ef31ef0b590891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1872-cwe-502-deserialization-of-untrusted-b29170b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1872%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20webdzier%20Button&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f7e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2964-cwe-352-cross-site-request-forgery-c-ba51cec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2964%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20marubon%20Pocket%20News%20Generator&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0609-cwe-79-improper-neutralization-of-in-42608031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0609%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6de0b7ef31ef0b58ff5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0608-cwe-89-improper-neutralization-of-sp-5cff0326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0608%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6de0b7ef31ef0b58ff5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2108-cwe-79-improper-neutralization-of-in-6e4abfcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2108%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kstover%20Ninja%20Forms%20Contact%20Form%20%E2%80%93%20The%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0913-cwe-89-improper-neutralization-of-sp-86973a57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0913%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wedevs%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=high&amp;id=699f6de9b7ef31ef0b590885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1858-cwe-502-deserialization-of-untrusted-23f9c425</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1858%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20weblizar%20Lightbox%20slider%20%E2%80%93%20Responsive%20Lightbox%20Gallery&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2116-cwe-79-improper-neutralization-of-in-466496e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2116%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20technocrackers%20Christmas%20Greetings&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2113-cwe-352-cross-site-request-forgery-c-1757346a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2113%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20kstover%20Ninja%20Forms%20Contact%20Form%20%E2%80%93%20The%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2970-cwe-352-cross-site-request-forgery-c-fb21b245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2970%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tsina%20News%20Wall&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2969-cwe-352-cross-site-request-forgery-c-25e4bec7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2969%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20backie%20WP-Eggdrop&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2963-cwe-79-improper-neutralization-of-in-7c33ad5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20marubon%20Pocket%20News%20Generator&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2968-cwe-79-improper-neutralization-of-in-83623b01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2968%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20backie%20WP-Eggdrop&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2844-cwe-862-missing-authorization-in-lon-bc877afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2844%3A%20CWE-862%20Missing%20Authorization%20in%20loncar%20Easy%20Appointments&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2842-cwe-79-improper-neutralization-of-in-22473551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2842%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20loncar%20Easy%20Appointments&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2936-cwe-79-improper-neutralization-of-in-2a169918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2936%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20Sydney%20Toolbox&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2841-cwe-79-improper-neutralization-of-in-24225877</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2841%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Otter%20Blocks%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6db7b7ef31ef0b58b5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2475-cwe-79-improper-neutralization-of-in-88933a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2475%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dglingren%20Media%20Library%20Assistant&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31032-na-6f8afe16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31032%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dd0b7ef31ef0b58ece6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30645-na-1831a510</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30645%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc5b7ef31ef0b58dee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30639-na-d2c22737</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30639%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58dee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30638-na-f88feb0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30638%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58dee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30637-na-09e51297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30637%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc5b7ef31ef0b58dee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30636-na-d359f411</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30636%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58dedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30634-na-baccc699</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30634%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc5b7ef31ef0b58deda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30633-na-d593089e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30633%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58ded7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30632-na-ab2568db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30632%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58ded4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30631-na-c493b0e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30631%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc5b7ef31ef0b58ded1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30630-na-7524d3a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30630%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc5b7ef31ef0b58dece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30629-na-f2fce329</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30629%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc4b7ef31ef0b58de89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30627-na-f673a52f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30627%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc4b7ef31ef0b58de86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30626-na-f1efe215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30626%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc4b7ef31ef0b58de83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30625-na-dc3697ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30625%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc4b7ef31ef0b58de80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30624-na-bacc7ac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30624%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc4b7ef31ef0b58de7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30623-na-b22a4056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30623%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc4b7ef31ef0b58de7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30622-na-df78de54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30622%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc4b7ef31ef0b58de77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30613-na-ead50d10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30613%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc3b7ef31ef0b58ddba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29686-na-ffdc028a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29686%3A%20n%2Fa&amp;severity=high&amp;id=699f6da1b7ef31ef0b5898e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29640-na-c13488f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29640%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da0b7ef31ef0b58985b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28405-na-34d85c0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28405%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b58893f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27619-na-96a6d98e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27619%3A%20n%2Fa&amp;severity=high&amp;id=699f6d82b7ef31ef0b580ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28960-na-8900c08d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28960%3A%20n%2Fa&amp;severity=high&amp;id=690a3b69ff58c9332ff0a5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-29-f12ac4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3019-exposure-of-resource-to-wrong-sphere-cfe6ec97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3019%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere&amp;severity=high&amp;id=691ec3729f5a9374a9d10f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2947-improper-neutralization-of-special-e-b0c518a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2947%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)&amp;severity=high&amp;id=691f698540b920e2708380e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42936-an-app-may-be-able-to-access-user-s-b92da3cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42936%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5553a730e5a3d9d78a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42931-a-process-may-gain-admin-privileges-01d32a12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42931%3A%20A%20process%20may%20gain%20admin%20privileges%20without%20proper%20authentication%20in%20Apple%20macOS&amp;severity=high&amp;id=690a5553a730e5a3d9d78a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42950-processing-maliciously-crafted-web--5c950237</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42950%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=69092635fe7723195e0b61c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42947-an-app-may-be-able-to-break-out-of--2c505079</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42947%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5554a730e5a3d9d7a2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42896-an-app-may-be-able-to-modify-protec-6ae63d73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42896%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5550a730e5a3d9d783ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42930-an-app-may-be-able-to-modify-protec-846b80c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42930%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a5553a730e5a3d9d78a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42913-remote-login-sessions-may-be-able-t-9c2bb1c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42913%3A%20Remote%20Login%20sessions%20may%20be%20able%20to%20obtain%20full%20disk%20access%20permissions%20in%20Apple%20macOS&amp;severity=high&amp;id=690a5551a730e5a3d9d784f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40390-an-app-may-be-able-to-access-user-s-e39a4c2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40390%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a53282a90255b94da6772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42893-an-app-may-be-able-to-access-protec-7b797d80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42893%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5550a730e5a3d9d7838f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42974-an-app-may-be-able-to-execute-arbit-2a88a332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42974%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5554a730e5a3d9d7a31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42962-a-remote-attacker-may-be-able-to-ca-93c4b285</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42962%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5554a730e5a3d9d7a316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42892-a-local-attacker-may-be-able-to-ele-cce281b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42892%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ea730e5a3d9d782fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30422-improper-neutralization-of-input-du-25e06d1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30422%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPVibes%20Elementor%20Addon%20Elements&amp;severity=null&amp;id=69cd741ee6bfc5ba1def546a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52628-vulnerability-in-linux-linux-be712c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9830c4522896dcbe712c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6371-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253fcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6371%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25599-improper-neutralization-of-input-du-7eb66245</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25599%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Craig%20Hewitt%20Seriously%20Simple%20Podcasting&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23500-server-side-request-forgery-ssrf-in-600ee4ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23500%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20StellarWP%20Gutenberg%20Blocks%20by%20Kadence%20Blocks&amp;severity=null&amp;id=69cd7413e6bfc5ba1def5139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30221-deserialization-of-untrusted-data-i-7d88f109</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30221%3A%20Deserialization%20of%20Untrusted%20Data%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd741be6bfc5ba1def5389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30229-deserialization-of-untrusted-data-i-e4d89623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30229%3A%20Deserialization%20of%20Untrusted%20Data%20in%20StellarWP%20GiveWP&amp;severity=null&amp;id=69cd741be6bfc5ba1def538d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30236-improper-neutralization-of-special--8832fd6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30236%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd741ee6bfc5ba1def545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30244-improper-neutralization-of-special--ab151f22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30244%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd741ee6bfc5ba1def5462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30245-improper-neutralization-of-special--abd8653e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30245%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Pierre%20Lannoy%20DecaLog&amp;severity=null&amp;id=69cd741ee6bfc5ba1def5466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2091-cwe-79-improper-neutralization-of-in-70eed711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2091%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6da4b7ef31ef0b589c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2110-cwe-352-cross-site-request-forgery-c-8a83c0ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2110%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1770-cwe-502-deserialization-of-untrusted-9b12b6e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1770%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20netweblogic%20Meta%20Tag%20Manager&amp;severity=high&amp;id=699f6d3cb7ef31ef0b56f43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2111-cwe-79-improper-neutralization-of-in-baa16c2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2111%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-3013-improper-authorization-in-teledyne-f-5665ee27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-3013%3A%20Improper%20Authorization%20in%20Teledyne%20FLIR%20AX8&amp;severity=medium&amp;id=68efa2a527d7577a18f335d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31065-na-0ac66e8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31065%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd2b7ef31ef0b58edaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31064-na-f0d5628e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31064%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd2b7ef31ef0b58eda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31063-na-d80c99ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31063%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd2b7ef31ef0b58eda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31062-na-7738dbc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31062%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dd2b7ef31ef0b58ed9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30612-na-c994968b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30612%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58ddb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30607-na-043f168b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30607%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58ddb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30606-na-c8204b96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30606%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58ddb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30604-na-5cd5c249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30604%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58ddae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30603-na-0c974d4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30603%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc3b7ef31ef0b58ddab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30601-na-d07d9ac8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30601%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58dda8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30600-na-c27126c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30600%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc3b7ef31ef0b58dda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30599-na-fd4e310d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30599%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc2b7ef31ef0b58dd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30598-na-a28296c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30598%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30597-na-65724ad2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30597%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30596-na-908b1059</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30596%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc2b7ef31ef0b58dd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30595-na-16c095ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30595%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc2b7ef31ef0b58dd01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30594-na-b7032d77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30594%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dcfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30592-na-232e978d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30592%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc2b7ef31ef0b58dcfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30591-na-2884c1c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30591%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc2b7ef31ef0b58dcf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30590-na-ee4acc27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30590%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30589-na-5ecc0a7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30589%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc2b7ef31ef0b58dcf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30588-na-528ddd23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30588%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30587-na-9f3e7322</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30587%3A%20n%2Fa&amp;severity=critical&amp;id=699f6dc2b7ef31ef0b58dca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30586-na-2e02ac8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30586%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30585-na-79b97964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30585%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dc2b7ef31ef0b58dca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30583-na-22126f6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30583%3A%20n%2Fa&amp;severity=high&amp;id=699f6dc2b7ef31ef0b58dc9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29489-na-22dd97d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29489%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9fb7ef31ef0b58979a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29316-na-40b3e04b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29316%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b5894c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28714-na-b124a4c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28714%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b58902a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28713-na-5a6a312b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28713%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d95b7ef31ef0b588f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28091-na-17a16faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28091%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587fb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28090-na-d03e9c9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28090%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27719-na-ec2212db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27719%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25506-na-5d4d5ca0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25506%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24407-na-86f19d3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24407%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5ab7ef31ef0b570a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23727-na-bb559402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23727%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b5704f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-28-f12bd5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0071-cwe-125-in-nvidia-gpu-display-driver-200cb8b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0071%3A%20CWE-125%20in%20nvidia%20GPU%20Display%20driver%2C%20vGPU%20driver%2C%20Cloud%20Gaming%20driver&amp;severity=high&amp;id=690a47486d939959c80222ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29945-information-written-to-log-files-ca-6d8b0fe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29945%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=69418d7b9050fe8508ffc24c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26652-vulnerability-in-linux-linux-be4278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26652%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26651-vulnerability-in-linux-linux-be4274</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26651%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30238-improper-neutralization-of-special--ab79b1b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30238%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Wasiliy%20Strecker%20%2F%20ContestGallery%20developer%20Contest%20Gallery&amp;severity=null&amp;id=69cd741ee6bfc5ba1def545e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29777-improper-neutralization-of-input-du-64e727ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29777%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPMU%20DEV%20-%20Your%20All-in-One%20WordPress%20Platform%20Forminator&amp;severity=null&amp;id=69cd7419e6bfc5ba1def5313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29792-improper-neutralization-of-input-du-5987555e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29792%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Unlimited%20Elements%20Unlimited%20Elements%20For%20Elementor%20(Free%20Widgets%2C%20Addons%2C%20Templates)&amp;severity=null&amp;id=69cd7419e6bfc5ba1def5317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30182-improper-neutralization-of-input-du-b28369ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30182%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DevItems%20HT%20Mega&amp;severity=null&amp;id=69cd741be6bfc5ba1def5375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29931-improper-neutralization-of-input-du-1d3c0f99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29931%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPGMaps%20WP%20Go%20Maps&amp;severity=null&amp;id=69cd741be6bfc5ba1def536d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2962-cwe-862-missing-authorization-in-cod-b0d7b64d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2962%3A%20CWE-862%20Missing%20Authorization%20in%20codesupplyco%20Networker%20-%20Tech%20News%20WordPress%20Theme%20with%20Dark%20Mode&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1023-missing-release-of-memory-after-effe-e4e18549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1023%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime&amp;severity=medium&amp;id=690dcfa5c2e5047ad7418654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2956-cwe-79-improper-neutralization-of-in-5f365bbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2956%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20specialk%20Simple%20Ajax%20Chat%20%E2%80%93%20Add%20a%20Fast%2C%20Secure%20Chat%20Box&amp;severity=medium&amp;id=699f6dbab7ef31ef0b58d492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29921-improper-neutralization-of-input-du-8adc1568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29921%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20supsystic%20Photo%20Gallery%20by%20Supsystic&amp;severity=null&amp;id=69cd741be6bfc5ba1def5369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30193-improper-neutralization-of-input-du-69c9755c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30193%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd741be6bfc5ba1def5379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2954-cwe-89-improper-neutralization-of-sp-14d75d6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2954%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jonathankissam%20Action%20Network&amp;severity=high&amp;id=699f6dbab7ef31ef0b58d48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1521-cwe-79-improper-neutralization-of-in-d1654bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1521%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2120-cwe-79-improper-neutralization-of-in-2e3448fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2120%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2121-cwe-79-improper-neutralization-of-in-d9fb9f64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2121%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2781-cwe-79-improper-neutralization-of-in-c6b2b4a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2781%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6db5b7ef31ef0b58b2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1364-cwe-79-improper-neutralization-of-in-21a93dd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1364%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20https%3A%2F%2Felementor.com%2F%20Elementor%20Website%20Builder%20Pro&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30194-improper-neutralization-of-input-du-6baf6d43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30194%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart&amp;severity=null&amp;id=69cd741be6bfc5ba1def537d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27188-improper-neutralization-of-input-du-04558e45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27188%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cloudways%20Breeze&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30197-improper-neutralization-of-input-du-14f1044f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30197%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20andy_moyle%20Church%20Admin&amp;severity=null&amp;id=69cd741be6bfc5ba1def5381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30199-improper-neutralization-of-input-du-6384a0be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30199%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20Amazon&amp;severity=null&amp;id=69cd741be6bfc5ba1def5385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2097-vulnerability-in-hitachi-energy-mach-12c7c000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2097%3A%20Vulnerability%20in%20Hitachi%20Energy%20MACH%20SCM%20Server&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0400-cwe-94-improper-control-of-generatio-b9b282f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0400%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Hitachi%20Energy%20MACH%20SCM&amp;severity=high&amp;id=68f0a5cd9f8a5dbaeaadd507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2203-cwe-22-improper-limitation-of-a-path-3794ae52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2203%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2139-cwe-79-improper-neutralization-of-in-208bd529</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2139%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20litonice13%20Master%20Addons%20%E2%80%93%20Free%20Widgets%2C%20Hover%20Effects%2C%20Toggle%2C%20Conditions%2C%20Animations%20for%20Elementor&amp;severity=medium&amp;id=699f6da8b7ef31ef0b58a433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2210-cwe-22-improper-limitation-of-a-path-64c04541</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2210%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28815-na-6d02505b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28815%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9ab7ef31ef0b58936b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28335-na-41fea6b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28335%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8db7ef31ef0b58855a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24334-na-ac42a855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24334%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b570a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28085-na-b894d0fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28085%3A%20n%2Fa&amp;severity=low&amp;id=690a47636d939959c8022fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25736-na-e7d17edb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25736%3A%20n%2Fa&amp;severity=high&amp;id=690a47616d939959c8022f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25735-na-bc9a9301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25735%3A%20n%2Fa&amp;severity=critical&amp;id=690a47616d939959c8022f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25734-na-94148d21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25734%3A%20n%2Fa&amp;severity=high&amp;id=690a47616d939959c8022f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25580-na-dc8ced3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25580%3A%20n%2Fa&amp;severity=medium&amp;id=690a475f6d939959c8022dda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25395-na-929eb74d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25395%3A%20n%2Fa&amp;severity=high&amp;id=690a475f6d939959c8022dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25394-na-2ba5bc1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25394%3A%20n%2Fa&amp;severity=medium&amp;id=690a475f6d939959c8022dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25393-na-25a37934</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25393%3A%20n%2Fa&amp;severity=critical&amp;id=690a475f6d939959c8022db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25392-na-f6200897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25392%3A%20n%2Fa&amp;severity=medium&amp;id=690a475f6d939959c8022dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25391-na-4c6ca10d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25391%3A%20n%2Fa&amp;severity=high&amp;id=690a475f6d939959c8022da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25390-na-fca8fe1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25390%3A%20n%2Fa&amp;severity=high&amp;id=690a475f6d939959c8022d9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25389-na-b026d18d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25389%3A%20n%2Fa&amp;severity=high&amp;id=690a475d6d939959c8022d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25388-na-ed851cba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25388%3A%20n%2Fa&amp;severity=high&amp;id=690a475d6d939959c8022d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24335-na-d2853291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24335%3A%20n%2Fa&amp;severity=high&amp;id=690a475b6d939959c8022d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46052-na-4366756b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46052%3A%20n%2Fa&amp;severity=null&amp;id=690a47376d939959c8021b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46051-na-4fa68c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46051%3A%20n%2Fa&amp;severity=low&amp;id=690a47376d939959c8021b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46049-na-12e7c739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46049%3A%20n%2Fa&amp;severity=medium&amp;id=690a47376d939959c8021b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46048-na-eb390b15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46048%3A%20n%2Fa&amp;severity=medium&amp;id=690a47376d939959c8021b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46047-na-810e8ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46047%3A%20n%2Fa&amp;severity=high&amp;id=690a47356d939959c8021afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46046-na-97901b9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46046%3A%20n%2Fa&amp;severity=medium&amp;id=690a47356d939959c8021af7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45935-na-f5769ce4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45935%3A%20n%2Fa&amp;severity=medium&amp;id=690a47356d939959c8021aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45931-na-f18389b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45931%3A%20n%2Fa&amp;severity=high&amp;id=690a47356d939959c8021ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45927-na-d64ea133</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45927%3A%20n%2Fa&amp;severity=critical&amp;id=690a47356d939959c8021ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45925-na-63a0ccdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45925%3A%20n%2Fa&amp;severity=null&amp;id=690a47356d939959c8021adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45924-na-9cdd176d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45924%3A%20n%2Fa&amp;severity=critical&amp;id=690a47356d939959c8021ad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45922-na-7fbcabd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45922%3A%20n%2Fa&amp;severity=medium&amp;id=690a47356d939959c8021acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45920-na-26b93a64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45920%3A%20n%2Fa&amp;severity=medium&amp;id=690a47356d939959c8021aca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45919-na-6d7788c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45919%3A%20n%2Fa&amp;severity=medium&amp;id=690a47346d939959c8021ab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45913-na-3d0d678a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45913%3A%20n%2Fa&amp;severity=medium&amp;id=690a47346d939959c8021aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39804-na-a0f7f83c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39804%3A%20n%2Fa&amp;severity=medium&amp;id=690a439f6d939959c8fddc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-27-e53ee7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-27&amp;severity=medium&amp;id=682b7b9cd3ddd8cef2e53ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-27-f1302f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-27&amp;severity=medium&amp;id=682acdc2bbaf20d303f1302f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2955-cwe-762-mismatched-memory-management-9e585c5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2955%3A%20CWE-762%3A%20Mismatched%20Memory%20Management%20Routines%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69092623fe7723195e0b4728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26649-vulnerability-in-linux-linux-be4270</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26649%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26648-vulnerability-in-linux-linux-aebfc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26648%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26647-vulnerability-in-linux-linux-aebfbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26647%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26646-vulnerability-in-linux-linux-aebfb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26646%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebfb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52627-vulnerability-in-linux-linux-be7124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9830c4522896dcbe7124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52626-vulnerability-in-linux-linux-bdd803</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52625-vulnerability-in-linux-linux-be7e55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52624-vulnerability-in-linux-linux-be7e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52624%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52623-vulnerability-in-linux-linux-aeaff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeaff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52622-vulnerability-in-linux-linux-be7e29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52621-vulnerability-in-linux-linux-be7e25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26645-vulnerability-in-linux-linux-be426c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26645%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe426c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26644-vulnerability-in-linux-linux-be4268</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26644%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6175-cwe-120-buffer-copy-without-checking-b0d348db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6175%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69092638fe7723195e0b631c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2889-improper-neutralization-of-input-dur-d94d85ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2889%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20Amazon&amp;severity=null&amp;id=69cd741be6bfc5ba1def5371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2303-cwe-80-improper-neutralization-of-sc-12f0e56a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2303%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20flector%20Easy%20Textillate&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2170-cwe-79-improper-neutralization-of-in-9c3cc524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2170%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kurudrive%20VK%20All%20in%20One%20Expansion%20Unit&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0866-cwe-94-improper-control-of-generatio-3d3d88cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0866%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20checkemail%20Check%20%26%20Log%20Email&amp;severity=high&amp;id=699f6de6b7ef31ef0b59064e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2732-cwe-79-improper-neutralization-of-in-16514055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themifyme%20Themify%20Shortcodes&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29684-na-432a4bb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29684%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29401-na-f814a1e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29401%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9eb7ef31ef0b58965b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28551-na-b9203f83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28551%3A%20n%2Fa&amp;severity=high&amp;id=699f6d92b7ef31ef0b588b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28545-na-1b0d5e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28545%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d92b7ef31ef0b588b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28442-na-b5e90256</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28442%3A%20n%2Fa&amp;severity=high&amp;id=699f6d90b7ef31ef0b588ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28093-na-a0e1df7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28093%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8ab7ef31ef0b5880f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27521-na-8e884a0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27521%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7fb7ef31ef0b57ce6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26577-na-f31d5fa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26577%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b573716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25421-na-2d6a492c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25421%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d68b7ef31ef0b571de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23722-na-2d35de63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23722%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b5704ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25420-na-710faed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25420%3A%20n%2Fa&amp;severity=high&amp;id=691346259f8eafcddaf60842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-26-f12177</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47180-vulnerability-in-linux-linux-be9fa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47180%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47179-vulnerability-in-linux-linux-bde088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47179%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9822c4522896dcbde088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47178-vulnerability-in-linux-linux-be9fa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47178%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47177-vulnerability-in-linux-linux-be9f93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47177%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47176-vulnerability-in-linux-linux-be9f8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47176%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47175-vulnerability-in-linux-linux-be9f83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47175%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47174-vulnerability-in-linux-linux-be9f6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47174%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47173-vulnerability-in-linux-linux-be9f68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47173%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47172-vulnerability-in-linux-linux-be9f64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47172%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47171-vulnerability-in-linux-linux-be9f60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47171%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47170-vulnerability-in-linux-linux-be9f5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47170%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47169-vulnerability-in-linux-linux-be9f4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47169%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47168-vulnerability-in-linux-linux-be9f49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47168%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47167-vulnerability-in-linux-linux-be9f38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47167%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47166-vulnerability-in-linux-linux-be9f30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47166%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47165-vulnerability-in-linux-linux-bde06d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47165%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9822c4522896dcbde06d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47164-vulnerability-in-linux-linux-be9f28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47164%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47163-vulnerability-in-linux-linux-be9f09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47163%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbe9f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47162-vulnerability-in-linux-linux-bde05e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47161-vulnerability-in-linux-linux-be9f05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47161%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbe9f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47160-vulnerability-in-linux-linux-be9ef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9ef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47159-vulnerability-in-linux-linux-be9ef4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47159%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47158-vulnerability-in-linux-linux-be9ee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47158%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47153-vulnerability-in-linux-linux-be9ed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47153%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47152-vulnerability-in-linux-linux-be9ed1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47152%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47151-vulnerability-in-linux-linux-be9ec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47151%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47150-vulnerability-in-linux-linux-be9ec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47150%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47149-vulnerability-in-linux-linux-be9ebf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47149%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47148-vulnerability-in-linux-linux-be9e9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47148%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47147-vulnerability-in-linux-linux-be9e9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47147%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47146-vulnerability-in-linux-linux-be9e97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47146%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47145-vulnerability-in-linux-linux-be9e93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47145%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47144-vulnerability-in-linux-linux-be9e8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47144%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47143-vulnerability-in-linux-linux-be9e80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47143%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47142-vulnerability-in-linux-linux-be9e7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47142%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47141-vulnerability-in-linux-linux-be9e76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47141%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47140-vulnerability-in-linux-linux-be9e6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47140%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47139-vulnerability-in-linux-linux-be9e66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47139%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47138-vulnerability-in-linux-linux-be9e37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47138%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47137-vulnerability-in-linux-linux-be9e2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47137%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47136-vulnerability-in-linux-linux-bde05a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47136%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30205-na-952484c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30205%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30204-na-098821bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30204%3A%20n%2Fa&amp;severity=low&amp;id=699f6dbcb7ef31ef0b58d721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30203-na-399eeecd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30203%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dbcb7ef31ef0b58d70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30202-na-c34402eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30202%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30187-na-c1aa5b2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30187%3A%20n%2Fa&amp;severity=medium&amp;id=699f6dbcb7ef31ef0b58d704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29666-na-7fda934b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29666%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29650-na-8bb117df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29650%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da0b7ef31ef0b589868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29515-na-a0eca515</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29515%3A%20n%2Fa&amp;severity=high&amp;id=699f6da0b7ef31ef0b589857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29442-6e639b30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29442&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29440-d039ac86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29440&amp;severity=null&amp;id=699f6d9eb7ef31ef0b5896a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29303-na-f11decd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29303%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9bb7ef31ef0b5894ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29302-na-64ebecc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29302%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b5894b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29301-na-0b4b68fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29301%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b5894b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28435-na-a72b3ed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28435%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28434-na-84d99f5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28434%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b588a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28421-na-0c184d9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28421%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8fb7ef31ef0b588a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28393-na-1d907c02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28393%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8fb7ef31ef0b588922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28387-na-1591d034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28387%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8eb7ef31ef0b58888a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25175-na-007bd5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25175%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d60b7ef31ef0b570d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-25-f12a23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-30156-na-d0459b79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-30156%3A%20n%2Fa&amp;severity=high&amp;id=699f6dbcb7ef31ef0b58d617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-24-f125f0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f125f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2326-cwe-352-cross-site-request-forgery-c-2b472fb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2326%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20supercleanse%20Pretty%20Links%20%E2%80%93%20Affiliate%20Links%2C%20Link%20Branding%2C%20Link%20Tracking%20%26%20Marketing%20Plugin&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1049-cwe-79-improper-neutralization-of-in-991054f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1049%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20godaddy%20Page%20Builder%20Gutenberg%20Blocks%20%E2%80%93%20CoBlocks&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2468-cwe-79-improper-neutralization-of-in-0538a54e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2468%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2688-cwe-79-improper-neutralization-of-in-d837f115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2688%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6db4b7ef31ef0b58b13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2202-cwe-79-improper-neutralization-of-in-6126a2ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2202%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20Page%20Builder%20by%20SiteOrigin&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2131-cwe-79-improper-neutralization-of-in-ed843f15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2131%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20moveaddons%20Move%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1697-cwe-79-improper-neutralization-of-in-5137cd8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1697%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themelocation%20Custom%20WooCommerce%20Checkout%20Fields%20Editor&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2025-cwe-502-deserialization-of-untrusted-a4bd68f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2025%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20svenl77%20BuddyPress%20WooCommerce%20My%20Account%20Integration.%20Create%20WooCommerce%20Member%20Pages&amp;severity=high&amp;id=699f6da3b7ef31ef0b589aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24725-na-82e2b622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24725%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5eb7ef31ef0b570c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23755-na-4bd69bfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23755%3A%20n%2Fa&amp;severity=high&amp;id=699f6d53b7ef31ef0b570595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-23-f12d09</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29059-cwe-209-generation-of-error-message-containing-sensitive-information-in-microsoft-microsoft-net-framework-4-8-beb465</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29059%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20.NET%20Framework%204.8&amp;severity=high&amp;id=682d9837c4522896dcbeb465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29057-cwe-357-insufficient-ui-warning-of-dangerous-operations-in-microsoft-microsoft-edge-chromium-based-beb458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29057%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9837c4522896dcbeb458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26247-cwe-269-improper-privilege-management-in-microsoft-microsoft-edge-chromium-based-beb1ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26247%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeb1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5685-uncontrolled-resource-consumption-in-69d0c32e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5685%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Apache%20Camel%204.4.0%20for%20Spring%20Boot&amp;severity=high&amp;id=68faafd950358b89bd7bfd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0957-cwe-79-improper-neutralization-of-in-a0a8838c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0957%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtoffee%20WooCommerce%20PDF%20Invoices%2C%20Packing%20Slips%2C%20Delivery%20Notes%20and%20Shipping%20Labels&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2392-cwe-79-improper-neutralization-of-in-9a77e400</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy%20Companion&amp;severity=medium&amp;id=699f6dafb7ef31ef0b58abc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2500-cwe-79-improper-neutralization-of-in-2c226825</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themegrill%20ColorMag&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2080-cwe-200-information-exposure-in-liqu-21e69fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2080%3A%20CWE-200%20Information%20Exposure%20in%20liquidpoll%20LiquidPoll%20%E2%80%93%20Polls%2C%20Surveys%2C%20NPS%20and%20Feedback%20Reviews&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2777-sql-injection-in-campcodes-online-marriage-registration-system-bed98c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2777%3A%20SQL%20Injection%20in%20Campcodes%20Online%20Marriage%20Registration%20System&amp;severity=medium&amp;id=682d983ac4522896dcbed98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29499-na-00ec9d7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29499%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9fb7ef31ef0b5897a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29385-na-fac209e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29385%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9db7ef31ef0b5895a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29366-na-14e095c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29366%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b5894d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29338-na-c5ae5e1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29338%3A%20n%2Fa&amp;severity=low&amp;id=699f6d9bb7ef31ef0b5894cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29275-na-052f0acb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29275%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9bb7ef31ef0b589454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29273-na-e5b29786</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29273%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b589451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29272-na-1fdf0fb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29272%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b58944d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29271-na-e5d622bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29271%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b589449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28593-na-d2f18d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28593%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28560-na-fae51084</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28560%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28559-na-1abe6753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28559%3A%20n%2Fa&amp;severity=high&amp;id=699f6d92b7ef31ef0b588b94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28441-na-62d85ab2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28441%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8fb7ef31ef0b588a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25808-na-634c7689</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25808%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6fb7ef31ef0b572219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25807-na-7aae3280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25807%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6fb7ef31ef0b572216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25168-na-7dbb7472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25168%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d60b7ef31ef0b570d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-22-f122a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f122a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27993-improper-neutralization-of-input-du-1d598fe3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27993%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20typps%20Calendarista%20Basic%20Edition&amp;severity=null&amp;id=69cd7416e6bfc5ba1def5204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27994-improper-neutralization-of-input-du-fa2f6873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27994%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20YITHEMES%20YITH%20WooCommerce%20Product%20Add-Ons&amp;severity=null&amp;id=69cd7416e6bfc5ba1def5208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2494-memory-allocation-with-excessive-siz-6f12a63a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2494%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value&amp;severity=medium&amp;id=690eec5844af18c375273406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28834-use-of-a-broken-or-risky-cryptographic-algorithm-c06591</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28834%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm&amp;severity=medium&amp;id=682df35bc4522896dcc06591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1394-missing-release-of-memory-after-effective-lifetime-in-red-hat-red-hat-ansible-automation-platform-2-4-for-rhel-8-bd66f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1394%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.4%20for%20RHEL%208&amp;severity=high&amp;id=682d9816c4522896dcbd66f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26643-vulnerability-in-linux-linux-bdda02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26643%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdda02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26642-vulnerability-in-linux-linux-be4264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26642%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52620-vulnerability-in-linux-linux-be7e21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9831c4522896dcbe7e21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28835-uncaught-exception-c06593</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28835%3A%20Uncaught%20Exception&amp;severity=medium&amp;id=682df35bc4522896dcc06593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1538-cwe-352-cross-site-request-forgery-c-acc07a38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1538%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mndpsingh287%20File%20Manager&amp;severity=high&amp;id=699f6d35b7ef31ef0b56ef7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29916-na-4d26aae5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29916%3A%20n%2Fa&amp;severity=medium&amp;id=699f6da2b7ef31ef0b5899ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29866-na-20358309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29866%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da2b7ef31ef0b5899ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29864-na-55654986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29864%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29862-na-16f2b518</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29862%3A%20n%2Fa&amp;severity=high&amp;id=699f6da1b7ef31ef0b5898ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29859-na-e836bfea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29859%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29858-na-251bbbd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29858%3A%20n%2Fa&amp;severity=critical&amp;id=699f6da1b7ef31ef0b5898e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29374-na-761c5026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29374%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9db7ef31ef0b58959f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29244-na-52e9b3db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29244%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b589443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29243-na-bbbe5145</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29243%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9bb7ef31ef0b5893ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28756-na-481f5f79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28756%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b589233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28635-na-7aad68a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28635%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28521-na-f99b7c82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28521%3A%20n%2Fa&amp;severity=high&amp;id=699f6d90b7ef31ef0b588aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28402-na-5fad9fd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28402%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27683-na-91a9637f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27683%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d84b7ef31ef0b583ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22724-na-9dd82cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22724%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b57020c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-21-f12b19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28916-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-xbox-gaming-services-beb30e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28916%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Xbox%20Gaming%20Services&amp;severity=high&amp;id=682d9837c4522896dcbeb30e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1856-cwe-502-deserialization-of-untrusted-61e5111c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1856%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Progress%20Software%20Corporation%20Telerik%20Reporting&amp;severity=high&amp;id=69418d769050fe8508ffb323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1801-cwe-502-deserialization-of-untrusted-c09b9114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1801%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Progress%20Software%20Corporation%20Telerik%20Reporting&amp;severity=high&amp;id=69418d769050fe8508ffb31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46841-vulnerability-in-xen-xen-befa95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46841%3A%20Vulnerability%20in%20Xen%20Xen&amp;severity=medium&amp;id=682d983ec4522896dcbefa95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1711-cwe-89-improper-neutralization-of-sp-d874763c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1711%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mediavine%20Create%20by%20Mediavine&amp;severity=critical&amp;id=699f6d39b7ef31ef0b56f236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1325-cwe-352-cross-site-request-forgery-c-9c9276d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1325%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20delabon%20Live%20Sales%20Notification%20for%20Woocommerce%20%E2%80%93%20Woomotiv&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1379-cwe-79-improper-neutralization-of-in-a6e78c5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1379%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20magenet%20Website%20Article%20Monetization%20By%20MageNet&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1205-cwe-434-unrestricted-upload-of-file--83782755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1205%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20israelb1%20Management%20App%20for%20WooCommerce%20%E2%80%93%20Order%20notifications%2C%20Order%20management%2C%20Lead%20management%2C%20Uptime%20Monitoring&amp;severity=high&amp;id=699f6d24b7ef31ef0b56e5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1119-cwe-862-missing-authorization-in-rai-c4e8598e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1119%3A%20CWE-862%20Missing%20Authorization%20in%20railmedia%20Order%20Tip%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2304-cwe-80-improper-neutralization-of-sc-e1e91beb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2304%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20anshuln90%20Animated%20Headline&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1181-cwe-862-missing-authorization-in-daz-d3ac9931</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1181%3A%20CWE-862%20Missing%20Authorization%20in%20dazzlersoft%20Coming%20Soon%2C%20Under%20Construction%20%26%20Maintenance%20Mode%20By%20Dazzler&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1844-cwe-862-missing-authorization-in-inf-448e653a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1844%3A%20CWE-862%20Missing%20Authorization%20in%20infosatech%20RevivePress%20%E2%80%93%20Keep%20your%20Old%20Content%20Evergreen&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1473-cwe-284-improper-access-control-in-c-f5a5a947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1473%3A%20CWE-284%20Improper%20Access%20Control%20in%20colorlibplugins%20Coming%20Soon%20%26%20Maintenance%20Mode%20by%20Colorlib&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2459-cwe-79-improper-neutralization-of-in-3a2baf2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2459%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpvncom%20UX%20Flat&amp;severity=high&amp;id=699f6db0b7ef31ef0b58ad62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1477-cwe-200-information-exposure-in-aank-51f07913</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1477%3A%20CWE-200%20Information%20Exposure%20in%20aankit%20Easy%20Maintenance%20Mode&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2129-cwe-79-improper-neutralization-of-in-69d0602e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2129%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpbits%20WPBITS%20Addons%20For%20Elementor%20Page%20Builder&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2538-cwe-639-authorization-bypass-through-c35400d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2538%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20mbis%20Permalink%20Manager%20Pro&amp;severity=medium&amp;id=699f6db2b7ef31ef0b58af61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2124-cwe-79-improper-neutralization-of-in-21022b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2124%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20remyb92%20Translate%20WordPress%20and%20go%20Multilingual%20%E2%80%93%20Weglot&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2474-cwe-79-improper-neutralization-of-in-ccf2ba0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2474%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jp2112%20Standout%20Color%20Boxes%20and%20Buttons&amp;severity=medium&amp;id=699f6db1b7ef31ef0b58ae0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2255-cwe-79-improper-neutralization-of-in-5ae11524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1799-cwe-89-improper-neutralization-of-sp-c94c620e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1799%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20The%20%231%20gamification%20plugin%20to%20reward%20points%2C%20achievements%2C%20badges%20%26%20ranks%20in%20WordPress&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2384-cwe-345-insufficient-verification-of-b1d42817</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2384%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20kilbot%20WooCommerce%20POS&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58aafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2460-cwe-79-improper-neutralization-of-in-0887bd76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2460%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rubengc%20GamiPress%20%E2%80%93%20Button&amp;severity=medium&amp;id=699f6db0b7ef31ef0b58ad66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1995-cwe-862-missing-authorization-in-inc-c38f548e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1995%3A%20CWE-862%20Missing%20Authorization%20in%20inc2734%20Smart%20Custom%20Fields&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1787-cwe-79-improper-neutralization-of-in-c68930a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1787%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rewardsfuel%20Contests%20by%20Rewards%20Fuel&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1785-cwe-352-cross-site-request-forgery-c-da158e44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1785%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rewardsfuel%20Contests%20by%20Rewards%20Fuel&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2387-cwe-89-improper-neutralization-of-sp-4c194721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2387%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nasirahmed%20Advanced%20Form%20Integration%20%E2%80%93%20Connect%20WooCommerce%20and%20Contact%20Form%207%20to%20Google%20Sheets%20and%20other%20platforms&amp;severity=medium&amp;id=699f6daeb7ef31ef0b58ab08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29474-na-c934a74c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29474%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9fb7ef31ef0b589797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29471-na-bdcfcc46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29471%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9fb7ef31ef0b589794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29470-na-ea973af8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29470%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9fb7ef31ef0b589791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29469-na-8e3250b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29469%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9fb7ef31ef0b58978e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28735-na-f70de043</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28735%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5891b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28584-na-64f29297</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28584%3A%20n%2Fa&amp;severity=low&amp;id=699f6d95b7ef31ef0b588e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28583-na-89bc7c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28583%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28582-na-6eb9bb26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28582%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588dd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28581-na-a9cd9f73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28581%3A%20n%2Fa&amp;severity=high&amp;id=699f6d93b7ef31ef0b588d3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28580-na-f21fa440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28580%3A%20n%2Fa&amp;severity=high&amp;id=699f6d93b7ef31ef0b588d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28579-na-87722f00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28579%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d93b7ef31ef0b588d34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28578-na-e1a87ece</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28578%3A%20n%2Fa&amp;severity=high&amp;id=699f6d93b7ef31ef0b588d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28577-na-a0c1894d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28577%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d93b7ef31ef0b588d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28576-na-288c87f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28576%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d93b7ef31ef0b588d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28575-na-756899e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28575%3A%20n%2Fa&amp;severity=high&amp;id=699f6d93b7ef31ef0b588d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28574-na-c9493d49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28574%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d93b7ef31ef0b588d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28573-na-1472786f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28573%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d93b7ef31ef0b588d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28572-na-84898a69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28572%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28571-na-e93ef2ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28571%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28570-na-78bd3a3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28570%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28569-na-c5374621</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28569%3A%20n%2Fa&amp;severity=high&amp;id=699f6d92b7ef31ef0b588c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28568-na-369c6a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28568%3A%20n%2Fa&amp;severity=high&amp;id=699f6d92b7ef31ef0b588c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28567-na-d730584f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28567%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28566-na-0fb7d806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28566%3A%20n%2Fa&amp;severity=high&amp;id=699f6d92b7ef31ef0b588c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28565-na-f2e52ff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28565%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28564-na-7c816cce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28564%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28563-na-f45c98ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28563%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28562-na-df29f4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28562%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28396-na-f39c32f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28396%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b58892f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28395-na-7a893794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28395%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8fb7ef31ef0b58892b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28392-na-0f9d1d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28392%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8eb7ef31ef0b588919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28286-na-912b674e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28286%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8cb7ef31ef0b5883a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25294-na-699b421f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25294%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24050-na-0ab549ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24050%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5706b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23721-na-4cc705a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23721%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b5704e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22085-na-c2c2763f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22085%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b570011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22084-na-7332653c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22084%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b56ffce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22083-na-ea3178a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22083%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b56ffcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22082-na-6e46ae1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22082%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b56ffc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22081-na-50b12a93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22081%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d49b7ef31ef0b56ffc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22080-na-92890fff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22080%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d49b7ef31ef0b56ffc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22079-na-d83904eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22079%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b56ffbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22078-na-456ae1e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22078%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b56ffbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22077-na-ae9cba56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22077%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b56ffb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50967-na-7684e707</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50967%3A%20n%2Fa&amp;severity=high&amp;id=690a3b5fff58c9332ff09317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-20-76be1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-20&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76be1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-20-f12a9f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27997-improper-neutralization-of-input-du-c727ecfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27997%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Visual%20Composer%20Visual%20Composer%20Website%20Builder&amp;severity=null&amp;id=69cd7416e6bfc5ba1def520c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27998-improper-neutralization-of-input-du-1de736ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27998%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dmitry%20V.%20(CEO%20of%20%22UKR%20Solution%22)%20Barcode%20Scanner%20with%20Inventory%20%26%20Order%20Manager&amp;severity=null&amp;id=69cd7416e6bfc5ba1def5210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29093-cross-site-request-forgery-csrf-in--b3afffa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29093%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Saleswonder%20Team%3A%20Tobias%20Builder%20for%20WooCommerce%20reviews%20shortcodes%20%E2%80%93%20ReviewShort&amp;severity=null&amp;id=69cd7419e6bfc5ba1def52ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2307-improper-verification-of-cryptograph-0205c300</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2307%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&amp;severity=medium&amp;id=691f5eed11cb603d890ffb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29095-improper-neutralization-of-input-du-da5fa913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29095%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Gemini%20Labs%20Site%20Reviews&amp;severity=null&amp;id=69cd7419e6bfc5ba1def52f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6597-vulnerability-in-python-software-fou-c0d2de46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6597%3A%20Vulnerability%20in%20Python%20Software%20Foundation%20CPython&amp;severity=high&amp;id=69092613fe7723195e0b3005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0450-cwe-405-in-python-software-foundatio-cc200e67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0450%3A%20CWE-405%20in%20Python%20Software%20Foundation%20CPython&amp;severity=medium&amp;id=69092613fe7723195e0b3035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29125-improper-neutralization-of-input-du-9e8bbdb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29125%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Elliot%20Sowersby%20%2F%20RelyWP%20Coupon%20Affiliates&amp;severity=null&amp;id=69cd7419e6bfc5ba1def52f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29134-improper-neutralization-of-input-du-b7c68fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29134%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Tourfic&amp;severity=null&amp;id=69cd7419e6bfc5ba1def52fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29135-unrestricted-upload-of-file-with-da-b7540d58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29135%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Themefic%20Tourfic&amp;severity=null&amp;id=69cd7419e6bfc5ba1def52ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29136-deserialization-of-untrusted-data-i-9c9750cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29136%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Themefic%20Tourfic&amp;severity=null&amp;id=69cd7419e6bfc5ba1def5304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29137-improper-neutralization-of-input-du-8798378b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29137%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Themefic%20Tourfic&amp;severity=null&amp;id=69cd7419e6bfc5ba1def5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29138-improper-neutralization-of-input-du-e386d7de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29138%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Joachim%20Jensen%20Restrict%20User%20Access%20%E2%80%93%20Membership%20Plugin%20with%20Force&amp;severity=null&amp;id=69cd7419e6bfc5ba1def530e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5388-nss-susceptible-to-timing-attack-aga-257668ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5388%3A%20NSS%20susceptible%20to%20timing%20attack%20against%20RSA%20decryption%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=690a47456d939959c8022285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22025-vulnerability-in-nodejs-node-bed5df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22025%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22017-vulnerability-in-nodejs-node-bed5cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22017%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28734-na-213becad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28734%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b5891b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28715-na-1296f8bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28715%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b58903d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28595-na-72a0774a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28595%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d95b7ef31ef0b588e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28447-na-fb478420</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28447%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d90b7ef31ef0b588ade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28446-na-b7e93019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28446%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d90b7ef31ef0b588adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28394-na-6376437f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28394%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8fb7ef31ef0b588926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28389-na-e3845185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28389%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8eb7ef31ef0b588892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28303-na-49e0c251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28303%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8cb7ef31ef0b5883cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28283-na-31f9ac52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28283%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8cb7ef31ef0b588396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28092-na-76e6d8cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28092%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8ab7ef31ef0b5880f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26369-na-81dfd530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26369%3A%20n%2Fa&amp;severity=high&amp;id=699f6d75b7ef31ef0b57258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24043-na-e23de548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24043%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5706ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24042-na-ef9c904a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24042%3A%20n%2Fa&amp;severity=high&amp;id=699f6d56b7ef31ef0b5706a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24336-na-06f3d215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24336%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c6b66c7f7acdd3ea96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-19-f12515</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f12515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1753-improper-link-resolution-before-file-e9b38bbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1753%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)&amp;severity=high&amp;id=691ec3729f5a9374a9d10f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2496-null-pointer-dereference-8b43a77c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2496%3A%20NULL%20Pointer%20Dereference&amp;severity=medium&amp;id=690eec5844af18c37527340f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2002-double-free-08945c6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2002%3A%20Double%20Free&amp;severity=high&amp;id=691f5eed11cb603d890ffb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7250-permissive-list-of-allowed-inputs-in-04a6f107</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7250%3A%20Permissive%20List%20of%20Allowed%20Inputs%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=69092147fe7723195e05406a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20767-improper-access-control-cwe-284-in--a073b8f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20767%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68f7d9b1247d717aace2691c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1013-use-of-out-of-range-pointer-offset-i-7e8b4262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1013%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=691f5c4ee672cd9080e8d4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26641-vulnerability-in-linux-linux-be4260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26641%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26640-vulnerability-in-linux-linux-be425c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26640%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe425c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52619-vulnerability-in-linux-linux-be7e1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52618-vulnerability-in-linux-linux-aeb035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52617-vulnerability-in-linux-linux-be7e19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26638-vulnerability-in-linux-linux-be4258</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26638%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26637-vulnerability-in-linux-linux-be4238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26637%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26636-vulnerability-in-linux-linux-be4234</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26636%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26635-vulnerability-in-linux-linux-be4230</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26635%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26634-vulnerability-in-linux-linux-bdd9fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26634%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52616-vulnerability-in-linux-linux-be7e0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52615-vulnerability-in-linux-linux-be7e02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52614-vulnerability-in-linux-linux-be7dfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52614%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26633-vulnerability-in-linux-linux-bdd9fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26633%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26632-vulnerability-in-linux-linux-be422c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26632%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe422c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26631-vulnerability-in-linux-linux-be4228</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26631%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52613-vulnerability-in-linux-linux-be7df2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52613%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52612-vulnerability-in-linux-linux-be7dd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52611-vulnerability-in-linux-linux-be7dcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52610-vulnerability-in-linux-linux-be7dc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7dc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52609-vulnerability-in-linux-linux-be7dc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52609%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29154-na-c27b1db3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29154%3A%20n%2Fa&amp;severity=high&amp;id=699f6d9bb7ef31ef0b5893a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-29151-na-fa7725c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-29151%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d9bb7ef31ef0b589397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28550-na-9823bbff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28550%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28547-na-312013e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28547%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d92b7ef31ef0b588b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28537-na-dc9bd823</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28537%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d90b7ef31ef0b588af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27757-na-6657db34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27757%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25657-na-2451a799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25657%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6db7ef31ef0b5720f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25656-na-c299e811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25656%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6db7ef31ef0b5720f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25655-na-1e23c267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25655%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6db7ef31ef0b5720ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24539-na-aae82fa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24539%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5eb7ef31ef0b570c01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28054-na-a5ada796</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28054%3A%20n%2Fa&amp;severity=high&amp;id=690a47616d939959c8022f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-18-f120f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f120f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-17-f130e7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f130e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1857-cwe-862-missing-authorization-in-wps-062bd678</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1857%3A%20CWE-862%20Missing%20Authorization%20in%20wpswings%20Ultimate%20Gift%20Cards%20for%20WooCommerce%20%E2%80%93%20Create%2C%20Redeem%20%26%20Manage%20Digital%20Gift%20Certificates%20with%20Personalized%20Templates&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1685-cwe-502-deserialization-of-untrusted-22766b2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1685%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20sygnoos%20Social%20Media%20Share%20Buttons&amp;severity=high&amp;id=699f6d39b7ef31ef0b56f1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1733-cwe-862-missing-authorization-in-cha-577e08f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1733%3A%20CWE-862%20Missing%20Authorization%20in%20charlestsmith%20Word%20Replacer%20Pro&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2042-cwe-79-improper-neutralization-of-in-9f415cea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2042%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1239-cwe-79-improper-neutralization-of-in-03072e6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2294-cwe-22-improper-limitation-of-a-path-64f78596</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2294%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softaculous%20Backuply%20%E2%80%93%20Backup%2C%20Restore%2C%20Migrate%20and%20Clone&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2308-cwe-79-improper-neutralization-of-in-e55cebd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2308%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20elementinvader%20ElementInvader%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27195-cwe-352-cross-site-request-forgery--05fd8848</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27195%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sverde1%20Watermark%20RELOADED&amp;severity=null&amp;id=6936f3803bff8e5109804488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28640-na-d1d525d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28640%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24156-na-dba1bfa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24156%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d58b7ef31ef0b570887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22513-na-01cea6a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22513%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b570101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-16-f126a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f126a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23298-an-app-may-bypass-gatekeeper-checks-8c38717c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23298%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20Xcode&amp;severity=medium&amp;id=690a47596d939959c8022ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47135-vulnerability-in-linux-linux-be9e27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47135%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47134-vulnerability-in-linux-linux-be9e1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47134%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47133-vulnerability-in-linux-linux-be9e17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47133%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47132-vulnerability-in-linux-linux-bde056</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47132%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47131-vulnerability-in-linux-linux-be9e0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47131%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47130-vulnerability-in-linux-linux-be9e0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47130%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47129-vulnerability-in-linux-linux-be9dfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47129%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47128-vulnerability-in-linux-linux-be9dfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47128%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47127-vulnerability-in-linux-linux-be9df6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47127%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9df6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47126-vulnerability-in-linux-linux-be9ddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47126%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47125-vulnerability-in-linux-linux-be9dd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47125%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47124-vulnerability-in-linux-linux-bde045</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47124%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47123-vulnerability-in-linux-linux-be9dca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47123%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47122-vulnerability-in-linux-linux-be9dc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47122%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47121-vulnerability-in-linux-linux-be9dba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47121%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9dba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47120-vulnerability-in-linux-linux-be9db2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47120%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47119-vulnerability-in-linux-linux-be9daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47119%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47118-vulnerability-in-linux-linux-be9da6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47118%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47117-vulnerability-in-linux-linux-be9da2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47117%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47116-vulnerability-in-linux-linux-be9d93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47116%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47114-vulnerability-in-linux-linux-be9d6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47114%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47113-vulnerability-in-linux-linux-be9d63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47113%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47112-vulnerability-in-linux-linux-aebf35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47112%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47111-vulnerability-in-linux-linux-be9d5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47111%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47110-vulnerability-in-linux-linux-aebf33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47110%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47109-vulnerability-in-linux-linux-be9d53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47109%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2193-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-amd-cpu-bed39f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2193%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20AMD%20CPU&amp;severity=medium&amp;id=682d983ac4522896dcbed39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6960-cwe-324-use-of-a-key-past-its-expira-58438565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6960%3A%20CWE-324%3A%20Use%20of%20a%20Key%20Past%20its%20Expiration%20Date%20in%20Sciener%20TTLock%20App&amp;severity=high&amp;id=690a47466d939959c80222d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7003-cwe-323-reusing-a-nonce-key-pair-in--35d8082c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7003%3A%20CWE-323%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20Sciener%20Kontrol%20Lux&amp;severity=medium&amp;id=690a47466d939959c80222d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7007-cwe-290-authentication-bypass-by-spo-b274e709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7007%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Sciener%20Gateway%20G2&amp;severity=high&amp;id=690a47486d939959c80222f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7006-cwe-799-improper-control-of-interact-71ff46e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7006%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20Sciener%20Kontrol%20Lux&amp;severity=critical&amp;id=690a47466d939959c80222e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7004-cwe-319-cleartext-transmission-of-se-ff64b894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7004%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Sciener%20TTLock%20App&amp;severity=medium&amp;id=690a47466d939959c80222dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7009-cwe-311-missing-encryption-of-sensit-4a0d72e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7009%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Sciener%20Kontrol%20Lux&amp;severity=high&amp;id=690a47486d939959c80222f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7017-cwe-494-download-of-code-without-int-c25e6830</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7017%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Sciener%20Kontrol%20Lux&amp;severity=critical&amp;id=690a47486d939959c80222fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6725-insufficient-granularity-of-access-c-b1f062f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6725%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20OpenStack%20Platform%2017.1%20for%20RHEL%208&amp;severity=medium&amp;id=691f5c4ce672cd9080e8d3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27987-improper-neutralization-of-input-du-0378e25f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27987%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StellarWP%20GiveWP&amp;severity=null&amp;id=69cd7416e6bfc5ba1def51ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1795-cwe-89-improper-neutralization-of-sp-44af5c5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1795%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2399-cwe-79-improper-neutralization-of-in-1f579256</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2399%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6dafb7ef31ef0b58abcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1796-cwe-79-improper-neutralization-of-in-724304c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1796%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20Professional%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28404-na-6add4eb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28404%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b58893b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28354-na-cc95e77e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28354%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8eb7ef31ef0b588884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28353-na-c1ac1f3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28353%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8eb7ef31ef0b588881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28318-na-32c148ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28318%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8cb7ef31ef0b5883d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27756-na-dbf36504</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27756%3A%20n%2Fa&amp;severity=high&amp;id=699f6d87b7ef31ef0b587e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26540-na-05c07800</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26540%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b572b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27351-na-39b167da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27351%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b63ff58c9332ff097bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-15-f130da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f130da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26246-cwe-1220-insufficient-granularity-of-access-control-in-microsoft-microsoft-edge-for-android-beb1c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26246%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=low&amp;id=682d9836c4522896dcbeb1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26163-cwe-693-protection-mechanism-failure-in-microsoft-microsoft-edge-chromium-based-beaf09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26163%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeaf09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2249-cwe-79-improper-neutralization-of-in-df6adf1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2249%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20choijun%20LA-Studio%20Element%20Kit%20for%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2256-cwe-79-improper-neutralization-of-in-db52b80e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bobbingwide%20oik&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28746-information-disclosure-in-intel-r-atom-r-processors-befa86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28746%3A%20information%20disclosure%20in%20Intel(R)%20Atom(R)%20Processors&amp;severity=medium&amp;id=682d983ec4522896dcbefa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32633-escalation-of-privilege-in-intelr-c-a4002dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32633%3A%20escalation%20of%20privilege%20in%20Intel(R)%20CSME%20installer%20software&amp;severity=medium&amp;id=690a2dddf0ba78a050535ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28389-escalation-of-privilege-in-intelr-c-2a902d23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28389%3A%20escalation%20of%20privilege%20in%20Intel(R)%20CSME%20installer%20software&amp;severity=medium&amp;id=690a2ddcf0ba78a050535ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28425-na-235dff7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28425%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b588a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28423-na-3380c293</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28423%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8fb7ef31ef0b588a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28418-na-1581771d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28418%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28417-na-773f134f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28417%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28390-na-73053ad2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28390%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8eb7ef31ef0b588895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28388-na-b52031df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28388%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8eb7ef31ef0b58888e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28383-na-71bc1a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28383%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8eb7ef31ef0b588887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28323-na-7db6cd92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28323%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8db7ef31ef0b588545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26503-na-5b36494d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26503%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d77b7ef31ef0b57268e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25653-na-6ebec8cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25653%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6db7ef31ef0b5720ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25651-na-46ccce42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25651%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6cb7ef31ef0b57209e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25650-na-561f8c53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25650%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6cb7ef31ef0b57209b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25649-na-f0861a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25649%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6cb7ef31ef0b572098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25139-na-b86b9aa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25139%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d60b7ef31ef0b570d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25228-na-7ee54ad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25228%3A%20n%2Fa&amp;severity=high&amp;id=690a475d6d939959c8022d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25652-cwe-287-improper-authentication-in-delinea-secret-server-aeaffb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25652%3A%20CWE-287%20Improper%20Authentication%20in%20Delinea%20Secret%20Server&amp;severity=high&amp;id=682cd0f71484d88663aeaffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-14-f12d83</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2242-cwe-79-improper-neutralization-of-in-29e2ebd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2242%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20takayukister%20Contact%20Form%207&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2079-cwe-79-improper-neutralization-of-in-1680fa57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2079%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20WPBakery%20Page%20Builder%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0800-cwe-434-unrestricted-upload-of-file--7c56ad23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0800%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Arcserve%20Unified%20Data%20Protection&amp;severity=high&amp;id=69418d769050fe8508ffb31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0799-cwe-287-improper-authentication-in-a-9d7d039c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0799%3A%20CWE-287%20Improper%20Authentication%20in%20Arcserve%20Unified%20Data%20Protection&amp;severity=critical&amp;id=69418d769050fe8508ffb319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26630-vulnerability-in-linux-linux-be4224</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23672-cwe-459-incomplete-cleanup-in-apach-a4bac815</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23672%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204523aaa02566521b4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24549-cwe-20-improper-input-validation-in-ff2addf0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24549%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=690204533aaa02566521b502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2000-cwe-79-improper-neutralization-of-in-d490c43f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6da2b7ef31ef0b5899dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1668-cwe-284-improper-access-control-in-t-87f88a20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1668%3A%20CWE-284%20Improper%20Access%20Control%20in%20ThemeFusion%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2238-cwe-79-improper-neutralization-of-in-a80a677c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2238%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1997-cwe-79-improper-neutralization-of-in-e28aa4d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1997%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1996-cwe-80-improper-neutralization-of-sc-d7421ead</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1996%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56ff34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2237-cwe-79-improper-neutralization-of-in-0bae8490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2237%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2239-cwe-79-improper-neutralization-of-in-5341e94c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2239%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Premium%20Addons%20for%20Elementor%20Premium%20Addons%20Pro%20for%20Elementor&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1291-cwe-80-improper-neutralization-of-sc-a9504ec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1291%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1894-cwe-79-improper-neutralization-of-in-467a3e9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20rogierlankhorst%20Burst%20Statistics%20%E2%80%93%20Privacy-Friendly%20Analytics%20for%20WordPress&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1751-cwe-89-improper-neutralization-of-sp-3631387c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1751%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=high&amp;id=699f6d3cb7ef31ef0b56f3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0687-cwe-284-improper-access-control-in-i-f25febe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0687%3A%20CWE-284%20Improper%20Access%20Control%20in%20intoxstudio%20Restrict%20User%20Access%20%E2%80%93%20Ultimate%20Membership%20%26%20Content%20Protection&amp;severity=medium&amp;id=699f6de3b7ef31ef0b5902fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1413-cwe-79-improper-neutralization-of-in-035c4207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1413%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1793-cwe-89-improper-neutralization-of-sp-6a314cd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1793%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20aweber%20AWeber%20%E2%80%93%20Free%20Sign%20Up%20Form%20and%20Landing%20Page%20Builder%20Plugin%20for%20Lead%20Generation%20and%20Email%20Newsletter%20Growth&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1950-cwe-502-deserialization-of-untrusted-85184238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1950%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpwax%20Product%20Carousel%20Slider%20%26%20Grid%20Ultimate%20for%20WooCommerce&amp;severity=high&amp;id=699f6d44b7ef31ef0b56fd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2252-cwe-79-improper-neutralization-of-in-7eadcf2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2252%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20droitthemes%20Droit%20Elementor%20Addons%20%E2%80%93%20Widgets%2C%20Blocks%2C%20Templates%20Library%20For%20Elementor%20Builder&amp;severity=medium&amp;id=699f6da9b7ef31ef0b58a67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1489-cwe-352-cross-site-request-forgery-c-d69640c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1489%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20cozyvision1%20SMS%20Alert%20Order%20Notifications%20%E2%80%93%20WooCommerce&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56edf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0368-cwe-522-insufficiently-protected-cre-a4c55b12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0368%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20wpmudev%20Hustle%20%E2%80%93%20Email%20Marketing%2C%20Lead%20Generation%2C%20Optins%2C%20Popups&amp;severity=high&amp;id=699f6ddbb7ef31ef0b58fa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1723-cwe-80-improper-neutralization-of-sc-007c2330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1723%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2194-cwe-79-improper-neutralization-of-in-5a43b98b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2194%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mostafas1990%20WP%20Statistics&amp;severity=high&amp;id=699f6da9b7ef31ef0b58a59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1038-cwe-79-improper-neutralization-of-in-61b4d5bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1038%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1499-cwe-80-improper-neutralization-of-sc-7330ddf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1499%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0827-cwe-352-cross-site-request-forgery-c-082b768d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0827%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20hammadh%20Play.ht%20%E2%80%93%20Make%20Your%20Blog%20Posts%20Accessible%20With%20Text%20to%20Speech%20Audio&amp;severity=medium&amp;id=699f6de6b7ef31ef0b590548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1311-cwe-434-unrestricted-upload-of-file--7c65ff13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1311%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=high&amp;id=699f6d29b7ef31ef0b56e7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1080-cwe-80-improper-neutralization-of-sc-c13867f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1080%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2286-cwe-79-improper-neutralization-of-in-61fe64fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2286%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20techfyd%20Sky%20Addons%20for%20Elementor%20(Free%20Templates%20Library%2C%20Live%20Copy%2C%20Animations%2C%20Post%20Grid%2C%20Post%20Carousel%2C%20Particles%2C%20Sliders%2C%20Chart%2C%20Blogs)&amp;severity=medium&amp;id=699f6dabb7ef31ef0b58a7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2028-cwe-79-improper-neutralization-of-in-ba51dfe7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2028%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1806-cwe-80-improper-neutralization-of-sc-7f6ec9e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1806%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1126-cwe-862-missing-authorization-in-met-2418f114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1126%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0377-cwe-284-improper-access-control-in-c-378bbce4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0377%3A%20CWE-284%20Improper%20Access%20Control%20in%20chrisbadgett%20LifterLMS%20%E2%80%93%20WordPress%20LMS%20Plugin%20for%20eLearning&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1541-cwe-80-improper-neutralization-of-sc-ce14ebb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1541%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20britner%20Gutenberg%20Blocks%20by%20Kadence%20Blocks%20%E2%80%93%20Page%20Builder%20Features&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0829-cwe-862-missing-authorization-in-nme-51eb6340</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0829%3A%20CWE-862%20Missing%20Authorization%20in%20nmedia%20Comments%20Extra%20Fields%20For%20Post%2CPages%20and%20CPT&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0369-cwe-284-improper-access-control-in-p-4b003ae0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0369%3A%20CWE-284%20Improper%20Access%20Control%20in%20pawaryogesh1989%20Bulk%20Edit%20Post%20Titles&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2030-cwe-80-improper-neutralization-of-sc-0cac9508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2030%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1365-cwe-80-improper-neutralization-of-sc-ad790a58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1365%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20icopydoc%20YML%20for%20Yandex%20Market&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0683-cwe-862-missing-authorization-in-aut-a6860fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0683%3A%20CWE-862%20Missing%20Authorization%20in%20autopolisbg%20Bulgarisation%20for%20WooCommerce&amp;severity=high&amp;id=699f6de3b7ef31ef0b5902cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1393-cwe-79-improper-neutralization-of-in-d655c2d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1393%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1497-cwe-80-improper-neutralization-of-sc-f56b2b8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1497%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1505-cwe-269-improper-privilege-managemen-1454d8e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1505%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20academylms%20Academy%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution%20for%20WordPress&amp;severity=high&amp;id=699f6d33b7ef31ef0b56ee88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1951-cwe-502-deserialization-of-untrusted-73c7f0c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1951%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpwax%20Logo%20Showcase%20Ultimate%20%E2%80%93%20Logo%20Carousel%2C%20Logo%20Slider%20%26%20Logo%20Grid&amp;severity=high&amp;id=699f6d44b7ef31ef0b56fd81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0700-cwe-79-improper-neutralization-of-in-1c58b646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0700%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wokamoto%20Simple%20Tweet&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59032b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0898-cwe-79-improper-neutralization-of-in-0bc03f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0898%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bluecoral%20Chat%20Bubble%20%E2%80%93%20Floating%20Chat%20with%20Contact%20Chat%20Icons%2C%20Messages%2C%20Telegram%2C%20Email%2C%20SMS%2C%20Call%20me%20back&amp;severity=medium&amp;id=699f6de7b7ef31ef0b59074b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1074-cwe-80-improper-neutralization-of-sc-25602e8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1074%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0681-cwe-693-protection-mechanism-failure-1dfa1458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0681%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20cyberlord92%20Page%20Restriction%20WordPress%20(WP)%20%E2%80%93%20Protect%20WP%20Pages%2FPost&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0631-cwe-284-improper-access-control-in-r-190ca9d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0631%3A%20CWE-284%20Improper%20Access%20Control%20in%20rayhanduitku%20Duitku%20Payment%20Gateway&amp;severity=medium&amp;id=699f6de1b7ef31ef0b5900f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1391-cwe-80-improper-neutralization-of-sc-965e560f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1391%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0896-cwe-79-improper-neutralization-of-in-03bbbbef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6de7b7ef31ef0b590742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1684-cwe-80-improper-neutralization-of-sc-bda46b0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1684%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Themisle%20Otter%20Blocks%20PRO%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0830-cwe-352-cross-site-request-forgery-c-4d4cca17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0830%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nmedia%20Comments%20Extra%20Fields%20For%20Post%2CPages%20and%20CPT&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2006-cwe-502-deserialization-of-untrusted-ccc09e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2006%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpwax%20Post%20Grid%2C%20Slider%20%26%20Carousel%20Ultimate%20%E2%80%93%20with%20Shortcode%2C%20Gutenberg%20Block%20%26%20Elementor%20Widget&amp;severity=high&amp;id=699f6da2b7ef31ef0b5899e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1985-cwe-79-improper-neutralization-of-in-24d9970e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1985%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Membership&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1363-cwe-79-improper-neutralization-of-in-2deea326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1363%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shapedplugin%20Easy%20Accordion%20%E2%80%93%20Best%20Accordion%20FAQ%20Plugin%20for%20WordPress&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1854-cwe-20-improper-input-validation-in--84c12c2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1854%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0447-cwe-862-missing-authorization-in-art-2d161d64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0447%3A%20CWE-862%20Missing%20Authorization%20in%20artibot%20ArtiBot%20Free%20Chat%20Bot%20for%20WordPress%20WebSites&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fc1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1772-cwe-502-deserialization-of-untrusted-6418b261</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1772%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20hammadh%20Play.ht%20%E2%80%93%20Make%20Your%20Blog%20Posts%20Accessible%20With%20Text%20to%20Speech%20Audio&amp;severity=high&amp;id=699f6d3cb7ef31ef0b56f448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1237-cwe-80-improper-neutralization-of-sc-e4848a3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1237%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brainstormforce%20Elementor%20Header%20%26%20Footer%20Builder&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2293-cwe-79-improper-neutralization-of-in-0bf0bf11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20geminilabs%20Site%20Reviews&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1537-cwe-79-improper-neutralization-of-in-0a4df41d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1537%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1203-cwe-89-improper-neutralization-of-sp-ab2ceced</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1203%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tatvic%20Conversios%20%E2%80%93%20Google%20Analytics%204%20(GA4)%2C%20Meta%20Pixel%20%26%20more%20Via%20Google%20Tag%20Manager%20For%20WooCommerce&amp;severity=high&amp;id=699f6d24b7ef31ef0b56e5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1380-cwe-862-missing-authorization-in-msa-522606b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1380%3A%20CWE-862%20Missing%20Authorization%20in%20msaari%20Relevanssi%20%E2%80%93%20A%20Better%20Search&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1691-cwe-80-improper-neutralization-of-sc-e66f149d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1691%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Themisle%20Otter%20Blocks%20PRO%20%E2%80%93%20Gutenberg%20Blocks%2C%20Page%20Builder%20for%20Gutenberg%20Editor%20%26%20FSE&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1321-cwe-345-insufficient-verification-of-98fb9331</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1321%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1680-cwe-79-improper-neutralization-of-in-3f4efd1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1680%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f11f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1414-cwe-79-improper-neutralization-of-in-9bc1f01a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1414%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1479-cwe-863-incorrect-authorization-in-e-e6d750ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1479%3A%20CWE-863%20Incorrect%20Authorization%20in%20edge22%20WP%20Show%20Posts&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1083-cwe-200-information-exposure-in-wpch-b60d17ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1083%3A%20CWE-200%20Information%20Exposure%20in%20wpchill%20Simple%20Restrict&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1462-cwe-284-improper-access-control-in-t-340a53f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1462%3A%20CWE-284%20Improper%20Access%20Control%20in%20themegrill%20Maintenance%20Page&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56eccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2172-cwe-304-missing-critical-step-in-aut-cb7ff390</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2172%3A%20CWE-304%20Missing%20Critical%20Step%20in%20Authentication%20in%20cyberlord92%20Web%20Application%20Firewall%20%E2%80%93%20website%20security&amp;severity=critical&amp;id=699f6da9b7ef31ef0b58a46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1452-cwe-863-incorrect-authorization-in-e-a0f1d904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1452%3A%20CWE-863%20Incorrect%20Authorization%20in%20edge22%20GenerateBlocks&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ecb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0614-cwe-80-improper-neutralization-of-sc-e7e78039</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0614%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20netweblogic%20Events%20Manager%20%E2%80%93%20Calendar%2C%20Bookings%2C%20Tickets%2C%20and%20more!&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58fffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0592-cwe-352-cross-site-request-forgery-c-1d17f375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20barrykooij%20Related%20Posts%20for%20WordPress&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fe13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0591-cwe-79-improper-neutralization-of-in-6789d32b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0591%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdatatables%20wpDataTables%20%E2%80%93%20WordPress%20Data%20Table%2C%20Dynamic%20Tables%20%26%20Table%20Charts%20Plugin&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fe0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1293-cwe-80-improper-neutralization-of-sc-273fb46b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1293%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0828-cwe-862-missing-authorization-in-ham-7c091aa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0828%3A%20CWE-862%20Missing%20Authorization%20in%20hammadh%20Play.ht%20%E2%80%93%20Make%20Your%20Blog%20Posts%20Accessible%20With%20Text%20to%20Speech%20Audio&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1409-cwe-79-improper-neutralization-of-in-e2d65bc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1409%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1763-cwe-862-missing-authorization-in-xpe-cc62dc01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1763%3A%20CWE-862%20Missing%20Authorization%20in%20xpeedstudio%20Wp%20Social%20Login%20and%20Register%20Social%20Counter&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0976-cwe-79-improper-neutralization-of-in-4848b4bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0976%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeventmanager%20WP%20Event%20Manager%20%E2%80%93%20Events%20Calendar%2C%20Registrations%2C%20Sell%20Tickets%20with%20WooCommerce&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1422-cwe-79-improper-neutralization-of-in-8c724c19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1422%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ebf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1640-cwe-639-authorization-bypass-through-f523dc14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1640%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20bitpressadmin%20Contact%20Form%20Builder%20by%20Bit%20Form%3A%20Create%20Contact%20Form%2C%20Multi%20Step%20Form%2C%20Conversational%20Form&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2020-cwe-79-improper-neutralization-of-in-892bc0b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=high&amp;id=699f6da3b7ef31ef0b589ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0449-cwe-79-improper-neutralization-of-in-565a96c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0449%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20artibot%20ArtiBot%20Free%20Chat%20Bot%20for%20WordPress%20WebSites&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1296-cwe-79-improper-neutralization-of-in-478982cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1296%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1484-cwe-80-improper-neutralization-of-sc-d8159637</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1484%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ameliabooking%20Booking%20for%20Appointments%20and%20Events%20Calendar%20%E2%80%93%20Amelia&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56edf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1127-cwe-862-missing-authorization-in-met-d1ad5e16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1127%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1535-cwe-79-improper-neutralization-of-in-439754f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1535%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1862-cwe-862-missing-authorization-in-ren-8205fe5b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1862%3A%20CWE-862%20Missing%20Authorization%20in%20renventura%20WooCommerce%20Add%20to%20Cart%20Custom%20Redirect&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1585-cwe-80-improper-neutralization-of-sc-c5f95289</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1585%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xpeedstudio%20Metform%20Elementor%20Contact%20Form%20Builder&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56eff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1392-cwe-79-improper-neutralization-of-in-c8c23d8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1392%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1642-cwe-352-cross-site-request-forgery-c-7ecb899f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1642%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mainwp%20MainWP%20Dashboard%20%20%E2%80%93%20WordPress%20Manager%20for%20Multiple%20Websites%20Maintenance&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f0a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1383-cwe-79-improper-neutralization-of-in-ad426d81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1383%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpvividplugins%20WPvivid%20Backup%20for%20MainWP&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1935-cwe-80-improper-neutralization-of-sc-604165df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1935%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20smub%20Giveaways%20and%20Contests%20by%20RafflePress%20%E2%80%93%20Get%20More%20Website%20Traffic%2C%20Email%20Subscribers%2C%20and%20Social%20Followers&amp;severity=high&amp;id=699f6d44b7ef31ef0b56f886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2106-cwe-200-information-exposure-in-styl-ef7d5a7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2106%3A%20CWE-200%20Information%20Exposure%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0871-cwe-79-improper-neutralization-of-in-cdd556d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6de6b7ef31ef0b590661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0326-cwe-79-improper-neutralization-of-in-a881945a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0897-cwe-80-improper-neutralization-of-sc-06d33b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0897%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20justinbusa%20Beaver%20Builder%20%E2%80%93%20WordPress%20Page%20Builder&amp;severity=medium&amp;id=699f6de7b7ef31ef0b590747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1358-cwe-22-improper-limitation-of-a-path-a6a255ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1358%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=high&amp;id=699f6d2bb7ef31ef0b56e90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1370-cwe-284-improper-access-control-in-t-af01e71e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1370%3A%20CWE-284%20Improper%20Access%20Control%20in%20themegrill%20Maintenance%20Page&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0839-cwe-639-authorization-bypass-through-54cfdc5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0839%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20radgeek%20FeedWordPress&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0385-cwe-862-missing-authorization-in-fre-cf0d10a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0385%3A%20CWE-862%20Missing%20Authorization%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fb34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1234-cwe-79-improper-neutralization-of-in-11ef6ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1234%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1158-cwe-862-missing-authorization-in-sve-8205c4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1158%3A%20CWE-862%20Missing%20Authorization%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1690-cwe-862-missing-authorization-in-sub-c8ce00f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1690%3A%20CWE-862%20Missing%20Authorization%20in%20subratamal%20TeraWallet%20%E2%80%93%20Best%20WooCommerce%20Wallet%20System%20With%20Cashback%20Rewards%2C%20Partial%20Payment%2C%20Wallet%20Refunds&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1536-cwe-79-improper-neutralization-of-in-32f0f3c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1536%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=high&amp;id=699f6d35b7ef31ef0b56ef6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1176-cwe-862-missing-authorization-in-htp-70a4dcc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1176%3A%20CWE-862%20Missing%20Authorization%20in%20htplugins%20HT%20Easy%20GA4%20%E2%80%93%20Google%20Analytics%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1843-cwe-862-missing-authorization-in-the-4a801e6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1843%3A%20CWE-862%20Missing%20Authorization%20in%20thedark%20Auto%20Affiliate%20Links&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2126-cwe-79-improper-neutralization-of-in-9e2f399e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2126%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1071-cwe-89-improper-neutralization-of-sp-87794f62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1071%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=critical&amp;id=699f6d1eb7ef31ef0b56e1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26629-vulnerability-in-linux-linux-bdd9ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52608-vulnerability-in-linux-linux-be7db7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7db7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1508-cwe-79-improper-neutralization-of-in-bcd00467</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1507-cwe-79-improper-neutralization-of-in-c0ca8ac8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1507%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1979-exposure-of-sensitive-information-to-4296f2f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1979%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=low&amp;id=691f5eed11cb603d890ffb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2123-cwe-79-improper-neutralization-of-in-d50ed386</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2123%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ultimatemember%20Ultimate%20Member%20%E2%80%93%20User%20Profile%2C%20Registration%2C%20Login%2C%20Member%20Directory%2C%20Content%20Restriction%20%26%20Membership%20Plugin&amp;severity=high&amp;id=699f6da6b7ef31ef0b58a2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1582-cwe-79-improper-neutralization-of-in-f146c152</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1582%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpgmaps%20WP%20Go%20Maps%20(formerly%20WP%20Google%20Maps)&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56eff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28684-na-31ef3a24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28684%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28683-na-305aa18f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28683%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28682-na-1f94be6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28682%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28681-na-85f5a9ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28681%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28680-na-029ac50c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28680%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28679-na-de816953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28679%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28678-na-e81624f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28678%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588eb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28677-na-1ce2764b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28677%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28675-na-e62ef254</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28675%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28673-na-a26fef70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28673%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28672-na-f259d43b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28672%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28670-na-22d0dd3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28670%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28669-na-bd69cb5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28669%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28667-na-f76060e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28667%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28666-na-c8b594c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28666%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28665-na-3897266b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28665%3A%20n%2Fa&amp;severity=high&amp;id=699f6d95b7ef31ef0b588e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28662-na-f33a6e61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28662%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28623-na-6a30e25b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28623%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d95b7ef31ef0b588e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28432-na-9e6ad5b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28432%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b588a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28431-na-69956efa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28431%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8fb7ef31ef0b588a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28429-na-21c2316c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28429%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8fb7ef31ef0b588a0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27703-na-d231fcf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27703%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d85b7ef31ef0b584fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25250-na-5d142672</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25250%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-13-f12965</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1326-cwe-79-improper-neutralization-of-in-0b9f3b41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1326%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jegtheme%20Jeg%20Elementor%20Kit&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1278-cwe-79-improper-neutralization-of-in-3fdb99cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1278%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sjaved%20Easy%20Social%20Feed%20%E2%80%93%20Social%20Photos%20Gallery%20%E2%80%93%20Post%20Feed%20%E2%80%93%20Like%20Box&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1214-cwe-352-cross-site-request-forgery-c-f3cf66fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1214%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sjaved%20Easy%20Social%20Feed%20%E2%80%93%20Social%20Photos%20Gallery%20%E2%80%93%20Post%20Feed%20%E2%80%93%20Like%20Box&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0966-cwe-80-improper-neutralization-of-sc-645175bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0966%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%203uu%20Shariff%20Wrapper&amp;severity=medium&amp;id=699f6de9b7ef31ef0b5908f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1502-cwe-862-missing-authorization-in-the-d435ec0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1502%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1213-cwe-352-cross-site-request-forgery-c-7bc48c5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1213%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sjaved%20Easy%20Social%20Feed%20%E2%80%93%20Social%20Photos%20Gallery%20%E2%80%93%20Post%20Feed%20%E2%80%93%20Like%20Box&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e5cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1503-cwe-352-cross-site-request-forgery-c-5b5f5eb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1503%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1450-cwe-79-improper-neutralization-of-in-5515ddb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1450%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%203uu%20Shariff%20Wrapper&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56eca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1421-cwe-79-improper-neutralization-of-in-0fc2dcb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1421%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1397-cwe-79-improper-neutralization-of-in-0181cd4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1397%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20devitemsllc%20HT%20Mega%20%E2%80%93%20Absolute%20Addons%20For%20Elementor&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0386-cwe-79-improper-neutralization-of-in-4ef2a754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0386%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldgrid%20weForms%20%E2%80%93%20Easy%20Drag%20%26%20Drop%20Contact%20Form%20Builder%20For%20WordPress&amp;severity=high&amp;id=699f6ddbb7ef31ef0b58fb38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2107-cwe-862-missing-authorization-in-blo-0a7efc37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2107%3A%20CWE-862%20Missing%20Authorization%20in%20blossomthemes%20Blossom%20Spa&amp;severity=medium&amp;id=699f6da6b7ef31ef0b58a20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2395-cwe-862-missing-authorization-in-aut-a9f2686b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2395%3A%20CWE-862%20Missing%20Authorization%20in%20autopolisbg%20Bulgarisation%20for%20WooCommerce&amp;severity=high&amp;id=699f6dafb7ef31ef0b58abc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23300-processing-a-maliciously-crafted-fi-c58a97cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23300%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20GarageBand&amp;severity=high&amp;id=690a47596d939959c8022cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2130-cwe-79-improper-neutralization-of-in-c1205c06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2130%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeworkweb%20CWW%20Companion&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2031-cwe-79-improper-neutralization-of-in-fe8ff7d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2031%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20j_3rk%20Video%20Conferencing%20with%20Zoom&amp;severity=medium&amp;id=699f6da3b7ef31ef0b589b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26165-cwe-256-plaintext-storage-of-a-password-in-microsoft-visual-studio-code-beaf13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26165%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=682d9836c4522896dcbeaf13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26204-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-microsoft-outlook-for-android-beb062</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26204%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Outlook%20for%20Android&amp;severity=high&amp;id=682d9836c4522896dcbeb062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26185-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-11-version-22h2-beafea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26185%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682d9836c4522896dcbeafea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26182-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beafde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26182%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeafde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26181-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beafcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26181%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeafcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26178-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaf93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26178%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26177-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-beaf8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26177%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaf8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26176-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beaf80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26176%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26174-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beaf72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26174%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26173-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beaf6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26173%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26170-cwe-20-improper-input-validation-in-microsoft-windows-server-2022-beaf56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26170%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeaf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26169-cwe-269-improper-privilege-management-in-microsoft-windows-10-version-1809-beaf52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26169%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26166-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaf19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26166%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26162-cwe-681-incorrect-conversion-between-numeric-types-in-microsoft-windows-10-version-1809-beaf03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26162%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26160-cwe-126-buffer-over-read-in-microsoft-windows-11-version-22h2-beaef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26160%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682d9836c4522896dcbeaef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21448-cwe-20-improper-input-validation-in-microsoft-microsoft-teams-for-android-beaeb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21448%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Teams%20for%20Android&amp;severity=medium&amp;id=682d9836c4522896dcbeaeb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21440-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beae61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21440%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21437-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beae53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21437%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21436-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-beae4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21436%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21435-cwe-426-untrusted-search-path-in-microsoft-windows-11-version-22h2-beae4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21435%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d9836c4522896dcbeae4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21434-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beae47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21434%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21433-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-beae43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21433%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21432-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-beae3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21432%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21431-cwe-732-incorrect-permission-assignment-for-critical-resource-in-microsoft-windows-server-2022-beae2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21431%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeae2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21427-cwe-287-improper-authentication-in-microsoft-windows-server-2019-beae04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21427%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d9836c4522896dcbeae04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21419-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-beade6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21419%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9836c4522896dcbeade6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21408-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-microsoft-windows-10-version-1809-beada7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21408%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeada7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21407-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bead9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21407%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbead9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21400-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-microsoft-azure-kubernetes-service-bead97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21400%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=682d9836c4522896dcbead97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21390-cwe-287-improper-authentication-in-microsoft-microsoft-authenticator-bead87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21390%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Authenticator&amp;severity=high&amp;id=682d9836c4522896dcbead87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21334-cwe-416-use-after-free-in-microsoft-system-center-operations-manager-scom-2019-bead6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21334%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20System%20Center%20Operations%20Manager%20(SCOM)%202019&amp;severity=critical&amp;id=682d9836c4522896dcbead6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21330-cwe-122-heap-based-buffer-overflow-in-microsoft-system-center-operations-manager-scom-2019-bead65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21330%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20System%20Center%20Operations%20Manager%20(SCOM)%202019&amp;severity=high&amp;id=682d9836c4522896dcbead65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26164-cwe-20-improper-input-validation-in-microsoft-sql-server-backend-for-django-beaf0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26164%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20SQL%20Server%20backend%20for%20Django&amp;severity=high&amp;id=682d9836c4522896dcbeaf0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26161-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaeff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26161%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26203-cwe-284-improper-access-control-in-microsoft-azure-data-studio-beb05e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26203%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Data%20Studio&amp;severity=high&amp;id=682d9836c4522896dcbeb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26201-cwe-284-improper-access-control-in-microsoft-intune-company-portal-for-android-beb056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26201%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Intune%20Company%20Portal%20for%20Android&amp;severity=medium&amp;id=682d9836c4522896dcbeb056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26199-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-365-apps-for-enterprise-beb04c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26199%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682d9836c4522896dcbeb04c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26198-cwe-426-untrusted-search-path-in-microsoft-microsoft-exchange-server-2019-cumulative-update-14-beb03f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26198%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%2014&amp;severity=high&amp;id=682d9836c4522896dcbeb03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26190-cwe-400-uncontrolled-resource-consumption-in-microsoft-microsoft-visual-studio-2022-version-17-9-beaffd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26190%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.9&amp;severity=high&amp;id=682d9836c4522896dcbeaffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26159-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26159%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26197-cwe-20-improper-input-validation-in-microsoft-windows-server-2019-beb02e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26197%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9836c4522896dcbeb02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21451-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beaec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21451%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21450-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beaebe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21450%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21446-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-beaea6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21446%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21445-cwe-415-double-free-in-microsoft-windows-server-2022-beae9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21445%3A%20CWE-415%3A%20Double%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeae9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21444-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beae9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21444%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21443-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beae96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21443%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21442-cwe-170-improper-null-termination-in-microsoft-windows-server-2022-beae89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21442%3A%20CWE-170%3A%20Improper%20Null%20Termination%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeae89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21441-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beae65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21441%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21439-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beae5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21439%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21438-cwe-369-divide-by-zero-in-microsoft-windows-10-version-1809-beae57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21438%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeae57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21430-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beae1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21430%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeae1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21429-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beae0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21429%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeae0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21426-cwe-416-use-after-free-in-microsoft-microsoft-sharepoint-enterprise-server-2016-beadfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21426%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d9836c4522896dcbeadfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21421-cwe-1395-dependency-on-vulnerable-third-party-component-in-microsoft-azure-sdk-beadec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21421%3A%20CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component%20in%20Microsoft%20Azure%20SDK&amp;severity=high&amp;id=682d9836c4522896dcbeadec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21418-cwe-284-improper-access-control-in-microsoft-software-for-open-networking-in-the-cloud-sonic-beadd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21418%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Software%20for%20Open%20Networking%20in%20the%20Cloud%20(SONiC)&amp;severity=high&amp;id=682d9836c4522896dcbeadd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21411-cwe-453-insecure-default-variable-initialization-in-microsoft-skype-for-consumer-beadcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21411%3A%20CWE-453%3A%20Insecure%20Default%20Variable%20Initialization%20in%20Microsoft%20Skype%20for%20Consumer&amp;severity=high&amp;id=682d9836c4522896dcbeadcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21392-cwe-400-uncontrolled-resource-consumption-in-microsoft-microsoft-visual-studio-2022-version-17-9-bead8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21392%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.9&amp;severity=high&amp;id=682d9836c4522896dcbead8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20671-cwe-276-incorrect-default-permissions-in-microsoft-windows-defender-antimalware-platform-bead15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20671%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Microsoft%20Windows%20Defender%20Antimalware%20Platform&amp;severity=medium&amp;id=682d9836c4522896dcbead15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2182-origin-validation-error-ce49edfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2182%3A%20Origin%20Validation%20Error&amp;severity=medium&amp;id=690eefde44af18c3752cf5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48788-execute-unauthorized-code-or-comman-d37f6ce9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48788%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiClientEMS&amp;severity=critical&amp;id=68f7d9ae247d717aace26795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22041-cwe-119-improper-restriction-of-ope-388055ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22041%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Siemens%20Cerberus%20PRO%20EN%20Engineering%20Tool&amp;severity=high&amp;id=69418d789050fe8508ffbf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22040-cwe-125-out-of-bounds-read-in-sieme-2d9e33e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22040%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Cerberus%20PRO%20EN%20Engineering%20Tool&amp;severity=high&amp;id=69418d789050fe8508ffbf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22039-cwe-120-buffer-copy-without-checkin-f3ffe816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22039%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20Cerberus%20PRO%20EN%20Engineering%20Tool&amp;severity=critical&amp;id=69418d789050fe8508ffbf53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0906-cwe-200-information-exposure-in-turt-1dc2e2d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0906%3A%20CWE-200%20Information%20Exposure%20in%20turtlepod%20f(x)%20Private%20Site&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28553-na-a88eb5da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28553%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d92b7ef31ef0b588b85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28535-na-11297db1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28535%3A%20n%2Fa&amp;severity=high&amp;id=699f6d90b7ef31ef0b588aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28340-na-2c8fe867</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28340%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8db7ef31ef0b588569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28339-na-41061836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28339%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d8db7ef31ef0b588565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28338-na-bba83597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28338%3A%20n%2Fa&amp;severity=high&amp;id=699f6d8db7ef31ef0b588562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27758-na-d41862c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27758%3A%20n%2Fa&amp;severity=high&amp;id=699f6d87b7ef31ef0b587e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26521-na-8326deab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26521%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d79b7ef31ef0b572b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25331-na-dbcf2995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25331%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d65b7ef31ef0b571ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25325-na-1c0aa48b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25325%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24097-na-511bb704</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24097%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5707e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24093-na-13c163fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24093%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b5707cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24092-na-0a0f9bc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24092%3A%20n%2Fa&amp;severity=high&amp;id=699f6d56b7ef31ef0b5707c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43279-na-664ad8a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43279%3A%20n%2Fa&amp;severity=medium&amp;id=690a43a16d939959c8fde0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49453-na-35a2ddc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49453%3A%20n%2Fa&amp;severity=medium&amp;id=68e0f3c7b66c7f7acdd3eab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-12-f12de6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1400-cwe-862-missing-authorization-in-ndi-ea9bca3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1400%3A%20CWE-862%20Missing%20Authorization%20in%20ndijkstra%20Mollie%20Forms&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1645-cwe-862-missing-authorization-in-ndi-29431c9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1645%3A%20CWE-862%20Missing%20Authorization%20in%20ndijkstra%20Mollie%20Forms&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27218-information-disclosure-in-google-an-dbd09db4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27218%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=69a0c89232ffcdb8a252456d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1441-off-by-one-error-6a279eb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1441%3A%20Off-by-one%20Error&amp;severity=medium&amp;id=690eefde44af18c3752cf5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28823-na-75e4be9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28823%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d9bb7ef31ef0b58937b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25854-na-6aa503bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25854%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d71b7ef31ef0b572346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-11-f124b4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f124b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28757-na-fbc37238</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28757%3A%20n%2Fa&amp;severity=high&amp;id=690a47636d939959c8022fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-10-f129a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f129a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1870-cwe-862-missing-authorization-in-ext-6cc57480</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1870%3A%20CWE-862%20Missing%20Authorization%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1767-cwe-79-improper-neutralization-of-in-65b88b14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1767%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1125-cwe-862-missing-authorization-in-met-ee4e643d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1125%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1320-cwe-79-improper-neutralization-of-in-6ec69189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1123-cwe-862-missing-authorization-in-met-7695faf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1123%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1124-cwe-862-missing-authorization-in-met-0bcf2c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1124%3A%20CWE-862%20Missing%20Authorization%20in%20metagauss%20EventPrime%20%E2%80%93%20Events%20Calendar%2C%20Bookings%20and%20Tickets&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28089-na-43ff210d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28089%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d89b7ef31ef0b587fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-09-f1231d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1231d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21900-cwe-74-in-qnap-systems-inc-qts-625fc72e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21900%3A%20CWE-74%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=69418d789050fe8508ffbf50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2318-path-traversal-filedir-in-zkteco-zkb-46210e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2318%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20ZKTeco%20ZKBio%20Media&amp;severity=medium&amp;id=68487f591b0bd07c3938aae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1851-cwe-862-missing-authorization-in-cse-f334932d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1851%3A%20CWE-862%20Missing%20Authorization%20in%20cservit%20affiliate-toolkit%20%E2%80%93%20WordPress%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2298-cwe-862-missing-authorization-in-cse-9eba7e0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2298%3A%20CWE-862%20Missing%20Authorization%20in%20cservit%20affiliate-toolkit%20%E2%80%93%20WordPress%20Affiliate%20Plugin&amp;severity=medium&amp;id=699f6dacb7ef31ef0b58a822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1987-cwe-80-improper-neutralization-of-sc-9024d425</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1987%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20cbutlerjr%20WP-Members%20Membership%20Plugin&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23259-processing-web-content-may-lead-to--dc03f09f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23259%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47536d939959c8022861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23234-an-app-may-be-able-to-execute-arbit-32618da2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23234%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47506d939959c8022668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23263-processing-maliciously-crafted-web--80e3fdb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23263%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=high&amp;id=690a47536d939959c8022878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23275-an-app-may-be-able-to-access-protec-d2e065f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23275%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47556d939959c8022a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23255-photos-in-the-hidden-photos-album-m-85048614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23255%3A%20Photos%20in%20the%20Hidden%20Photos%20Album%20may%20be%20viewed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=690a47526d939959c802271b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23238-an-app-may-be-able-to-edit-nvram-va-a5b16080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23238%3A%20An%20app%20may%20be%20able%20to%20edit%20NVRAM%20variables%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47506d939959c8022683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23280-a-maliciously-crafted-webpage-may-b-392450e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23280%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=high&amp;id=690a47576d939959c8022be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23279-an-app-may-be-able-to-access-user-s-60a55b4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23279%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47576d939959c8022be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23297-a-malicious-application-may-be-able-a6efe7a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23297%3A%20A%20malicious%20application%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47596d939959c8022cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23278-an-app-may-be-able-to-break-out-of--f7bc2b95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23278%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47556d939959c8022a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0258-an-app-may-be-able-to-execute-arbitr-3c6dcddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0258%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47486d939959c802231a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23281-an-app-may-be-able-to-access-sensit-917eed8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23281%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47576d939959c8022bfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23239-an-app-may-be-able-to-leak-sensitiv-279635b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23239%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47506d939959c8022688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23242-an-app-may-be-able-to-view-mail-dat-ea6b1c7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23242%3A%20An%20app%20may%20be%20able%20to%20view%20Mail%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a47506d939959c80226a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23254-a-malicious-website-may-exfiltrate--6ae5657e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23254%3A%20A%20malicious%20website%20may%20exfiltrate%20audio%20data%20cross-origin%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a47526d939959c8022708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23274-an-app-may-be-able-to-elevate-privi-0b49d7ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23274%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47556d939959c8022a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23262-an-app-may-be-able-to-spoof-system--85e28085</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23262%3A%20An%20app%20may%20be%20able%20to%20spoof%20system%20notifications%20and%20UI%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47536d939959c802286f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23235-an-app-may-be-able-to-access-user-s-15674bdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23235%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47506d939959c8022673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23258-processing-an-image-may-lead-to-arb-d5e91bfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23258%3A%20Processing%20an%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47536d939959c8022859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23253-an-app-may-be-able-to-access-a-user-854c708a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23253%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Photos%20Library%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47526d939959c8022703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23245-third-party-shortcuts-may-use-a-leg-ff894974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23245%3A%20Third-party%20shortcuts%20may%20use%20a%20legacy%20action%20from%20Automator%20to%20send%20events%20to%20apps%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47526d939959c80226c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23286-processing-an-image-may-lead-to-arb-8c0ec613</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23286%3A%20Processing%20an%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=690a47576d939959c8022c2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23269-an-app-may-be-able-to-modify-protec-0d8fa015</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23269%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47556d939959c8022a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23290-an-app-may-be-able-to-access-user-s-db02f1e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23290%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47596d939959c8022ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23249-processing-a-file-may-lead-to-a-den-ca5b1659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23249%3A%20Processing%20a%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47526d939959c80226f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23232-an-app-may-be-able-to-capture-a-use-17d3639a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23232%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20user&apos;s%20screen%20in%20Apple%20macOS&amp;severity=low&amp;id=690a474e6d939959c80225ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23265-an-app-may-be-able-to-cause-unexpec-d34e35c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23265%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=690a47536d939959c80228a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23273-private-browsing-tabs-may-be-access-43801a05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23273%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a47556d939959c8022a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23272-a-user-may-gain-access-to-protected-6dd67b9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23272%3A%20An%20attacker%20may%20gain%20access%20to%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47556d939959c8022a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23264-an-application-may-be-able-to-read--f850e93f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23264%3A%20An%20application%20may%20be%20able%20to%20read%20restricted%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47536d939959c8022890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23233-entitlements-and-privacy-permission-e1f21cc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23233%3A%20Entitlements%20and%20privacy%20permissions%20granted%20to%20this%20app%20may%20be%20used%20by%20a%20malicious%20app%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47506d939959c8022663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23248-processing-a-file-may-lead-to-a-den-0afe6b55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23248%3A%20Processing%20a%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47526d939959c80226ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23291-a-malicious-app-may-be-able-to-obse-b60ee236</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23291%3A%20A%20malicious%20app%20may%20be%20able%20to%20observe%20user%20data%20in%20log%20entries%20related%20to%20accessibility%20notifications%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47596d939959c8022cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23287-an-app-may-be-able-to-access-user-s-01a900c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23287%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47576d939959c8022c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23268-an-app-may-be-able-to-elevate-privi-3c69e5ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23268%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47556d939959c8022a24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23244-an-app-from-a-standard-user-account-1103a5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23244%3A%20An%20app%20from%20a%20standard%20user%20account%20may%20be%20able%20to%20escalate%20privilege%20after%20admin%20user%20login%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47506d939959c80226af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23205-an-app-may-be-able-to-access-sensit-b2f09462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23205%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a474d6d939959c8022411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23292-an-app-may-be-able-to-access-inform-68c3262f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23292%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a47596d939959c8022cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23284-processing-maliciously-crafted-web--56c65d25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23284%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20prevent%20Content%20Security%20Policy%20from%20being%20enforced%20in%20Apple%20Safari&amp;severity=medium&amp;id=690a47576d939959c8022c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23247-processing-a-file-may-lead-to-unexp-43be3d5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23247%3A%20Processing%20a%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47526d939959c80226e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23226-processing-web-content-may-lead-to--a5e1af2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23226%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a474e6d939959c8022575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23267-an-app-may-be-able-to-bypass-certai-08d135b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23267%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47536d939959c80228c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23288-an-app-may-be-able-to-elevate-privi-84982de6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23288%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47576d939959c8022c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23230-an-app-may-be-able-to-access-sensit-006de169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23230%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a474e6d939959c8022593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23231-an-app-may-be-able-to-access-user-s-21c56d6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23231%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a474e6d939959c802259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23266-an-app-may-be-able-to-modify-protec-f1c08a33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23266%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47536d939959c80228bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23289-a-person-with-physical-access-to-a--5a744477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23289%3A%20A%20person%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20use%20Siri%20to%20access%20private%20calendar%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47576d939959c8022c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23270-an-app-may-be-able-to-execute-arbit-deec67b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23270%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47556d939959c8022a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23227-an-app-may-be-able-to-read-sensitiv-31074221</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23227%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a474e6d939959c8022584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23250-an-app-may-be-able-to-access-blueto-ed8045f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23250%3A%20An%20app%20may%20be%20able%20to%20access%20Bluetooth-connected%20microphones%20without%20user%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47526d939959c80226f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23246-an-app-may-be-able-to-break-out-of--c1fe71d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23246%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a47526d939959c80226d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23285-an-app-may-be-able-to-create-symlin-e8819900</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23285%3A%20An%20app%20may%20be%20able%20to%20create%20symlinks%20to%20protected%20regions%20of%20the%20disk%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47576d939959c8022c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23293-an-attacker-with-physical-access-ma-0572bef0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23293%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47596d939959c8022cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23220-an-app-may-be-able-to-fingerprint-t-191e94a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23220%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a474e6d939959c8022566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28826-an-app-may-be-able-to-access-sensit-eaa91c22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28826%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a439b6d939959c8fdd576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23277-an-attacker-in-a-privileged-network-cc1cc20c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23277%3A%20An%20attacker%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20inject%20keystrokes%20by%20spoofing%20a%20keyboard%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47556d939959c8022a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23294-processing-malicious-input-may-lead-70d813c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23294%3A%20Processing%20malicious%20input%20may%20lead%20to%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47596d939959c8022cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23241-an-app-may-be-able-to-leak-sensitiv-665d6867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23241%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47506d939959c8022699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23216-an-app-may-be-able-to-overwrite-arb-b997a26f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23216%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a474e6d939959c802255b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23257-processing-an-image-may-result-in-d-930c4a15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23257%3A%20Processing%20an%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a47536d939959c8022849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23201-an-app-may-be-able-to-cause-a-denia-a413d801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23201%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a474d6d939959c8022401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23240-shake-to-undo-may-allow-a-deleted-p-90f36e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23240%3A%20Shake-to-undo%20may%20allow%20a%20deleted%20photo%20to%20be%20re-surfaced%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a47506d939959c8022695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23283-an-app-may-be-able-to-access-user-s-8be1194f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23283%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47576d939959c8022c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23295-an-unauthenticated-user-may-be-able-6dfc83fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23295%3A%20An%20unauthenticated%20user%20may%20be%20able%20to%20use%20an%20unprotected%20Persona%20in%20Apple%20visionOS&amp;severity=medium&amp;id=690a47596d939959c8022cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23260-an-app-may-be-able-to-access-user-s-24f9a1c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23260%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a47536d939959c802286a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23276-an-app-may-be-able-to-elevate-privi-42080715</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23276%3A%20An%20app%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a47556d939959c8022a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28754-na-151ccbc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28754%3A%20n%2Fa&amp;severity=high&amp;id=699f6d98b7ef31ef0b5891ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28753-na-ecd488a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28753%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d98b7ef31ef0b5891cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26313-na-47b35336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26313%3A%20n%2Fa&amp;severity=high&amp;id=699f6d75b7ef31ef0b572504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25848-na-61b18566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25848%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d71b7ef31ef0b572335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25845-na-63f8f4c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25845%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d70b7ef31ef0b5722bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-08-f12b0a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1986-cwe-434-unrestricted-upload-of-file--e34ddd62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1986%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20pluggabl%20Booster%20Elite%20for%20WooCommerce&amp;severity=high&amp;id=699f6d46b7ef31ef0b56fe85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1802-cwe-79-improper-neutralization-of-in-57c8b0ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1802%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26167-cwe-1021-improper-restriction-of-rendered-ui-layers-or-frames-in-microsoft-microsoft-edge-for-android-beaf21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26167%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=682d9836c4522896dcbeaf21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1725-trust-boundary-violation-ae970fda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1725%3A%20Trust%20Boundary%20Violation&amp;severity=medium&amp;id=6916966eb9f11918f9c6af11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2127-cwe-79-improper-neutralization-of-in-5389b97e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2127%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0203-cwe-352-cross-site-request-forgery-c-d8dd4880</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0203%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20UnitedOver%20Digits%3A%20WordPress%20Mobile%20Number%20Signup%20and%20Login&amp;severity=high&amp;id=699f6ddab7ef31ef0b58f999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2128-cwe-79-improper-neutralization-of-in-278bfc89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1773-cwe-502-deserialization-of-untrusted-9e8ac8e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1773%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20acowebs%20PDF%20Invoices%20and%20Packing%20Slips%20For%20WooCommerce&amp;severity=high&amp;id=699f6d3cb7ef31ef0b56f44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48725-cwe-121-stack-based-buffer-overflow-d049c3e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48725%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Netgear%20RAX30&amp;severity=high&amp;id=690a47396d939959c8021b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1169-cwe-862-missing-authorization-in-sve-9b7dfbaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1169%3A%20CWE-862%20Missing%20Authorization%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=high&amp;id=699f6d22b7ef31ef0b56e47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1170-cwe-862-missing-authorization-in-sve-09a1c2f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1170%3A%20CWE-862%20Missing%20Authorization%20in%20svenl77%20Post%20Form%20%E2%80%93%20Registration%20Form%20%E2%80%93%20Profile%20Form%20for%20User%20Profiles%20%E2%80%93%20Frontend%20Content%20Forms%20for%20User%20Submissions%20(UGC)&amp;severity=high&amp;id=699f6d24b7ef31ef0b56e522</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1534-cwe-20-improper-input-validation-in--e4c7669d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1534%3A%20CWE-20%20Improper%20Input%20Validation%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1382-cwe-98-improper-control-of-filename--5f3bc9c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1382%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20nicdark%20Restaurant%20Reservations&amp;severity=high&amp;id=699f6d2db7ef31ef0b56ea39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2136-cwe-79-improper-neutralization-of-in-b23af673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2136%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpkoithemes%20WPKoi%20Templates%20for%20Elementor&amp;severity=medium&amp;id=699f6da7b7ef31ef0b58a391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1419-cwe-79-improper-neutralization-of-in-0fbe5f70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1419%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20posimyththemes%20The%20Plus%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1506-cwe-79-improper-neutralization-of-in-ddf8298b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bdthemes%20Prime%20Slider%20%E2%80%93%20Addons%20For%20Elementor%20(Revolution%20of%20a%20slider%2C%20Hero%20Slider%2C%20Ecommerce%20Slider)&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1377-cwe-79-improper-neutralization-of-in-c87aef89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1377%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1500-cwe-79-improper-neutralization-of-in-a7c80a72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1500%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1720-cwe-79-improper-neutralization-of-in-baaabb98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpeverest%20User%20Registration%20%E2%80%93%20Custom%20Registration%20Form%2C%20Login%20Form%2C%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1366-cwe-79-improper-neutralization-of-in-f29bf895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28213-cwe-502-deserialization-of-untruste-76cedee7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28213%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NAVER%20nGrinder&amp;severity=critical&amp;id=699f6d8ab7ef31ef0b588105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28212-cwe-502-deserialization-of-untruste-782a5cdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28212%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NAVER%20nGrinder&amp;severity=critical&amp;id=699f6d8ab7ef31ef0b588101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28211-cwe-502-deserialization-of-untruste-7d5a3ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28211%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20NAVER%20nGrinder&amp;severity=critical&amp;id=699f6d8ab7ef31ef0b5880fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1761-cwe-79-improper-neutralization-of-in-bc004ad5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1761%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ninjateam%20WP%20Chat%20App&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28222-na-495617a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28222%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d8ab7ef31ef0b588108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27733-na-dce680b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27733%3A%20n%2Fa&amp;severity=high&amp;id=699f6d87b7ef31ef0b587dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27707-na-05dacf9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27707%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d85b7ef31ef0b584fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26566-na-598d8280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26566%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b572baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26492-na-c3fd81c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26492%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b57268a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25729-na-c0737b11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25729%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6eb7ef31ef0b57218f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25327-na-716f9569</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25327%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24375-na-ca23d096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24375%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b570a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24035-na-f03eb8a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24035%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5706a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22857-na-cf1ddc6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22857%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b570308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22752-na-f50eefe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22752%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4db7ef31ef0b57021c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-07-f12927</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2236-observable-timing-discrepancy-bec0d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2236%3A%20Covert%20Timing%20Channel&amp;severity=medium&amp;id=682d9838c4522896dcbec0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25111-cwe-674-uncontrolled-recursion-in-s-144b25ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25111%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20squid-cache%20squid&amp;severity=high&amp;id=69092148fe7723195e0543fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26627-vulnerability-in-linux-linux-be4217</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26626-vulnerability-in-linux-linux-be4213</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26625-vulnerability-in-linux-linux-be420f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26625%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe420f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26623-vulnerability-in-linux-linux-be420b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26623%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe420b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52607-vulnerability-in-linux-linux-aebfab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52606-vulnerability-in-linux-linux-be7db3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7db3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52604-vulnerability-in-linux-linux-be7daf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7daf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52603-vulnerability-in-linux-linux-be7dab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52602-vulnerability-in-linux-linux-be7da7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52601-vulnerability-in-linux-linux-be7da3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52600-vulnerability-in-linux-linux-be7d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52599-vulnerability-in-linux-linux-be7d80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52598-vulnerability-in-linux-linux-be7d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52597-vulnerability-in-linux-linux-aebfa9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52596-vulnerability-in-linux-linux-be7d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52595-vulnerability-in-linux-linux-be7d76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52594-vulnerability-in-linux-linux-aebf9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52593-vulnerability-in-linux-linux-aeb033</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0f71484d88663aeb033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52591-vulnerability-in-linux-linux-be7d72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52590-vulnerability-in-linux-linux-be7d65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52589-vulnerability-in-linux-linux-be7d61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52588-vulnerability-in-linux-linux-be7d5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52587-vulnerability-in-linux-linux-be7d4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52586-vulnerability-in-linux-linux-be7d2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52585-vulnerability-in-linux-linux-be7d27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52584-vulnerability-in-linux-linux-be7d23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9831c4522896dcbe7d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52583-vulnerability-in-linux-linux-be7d1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1989-cwe-79-improper-neutralization-of-in-aeb05e45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Social%20Sharing%20Plugin%20%E2%80%93%20Sassy%20Social%20Share&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1771-cwe-862-missing-authorization-in-has-b4c7abd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1771%3A%20CWE-862%20Missing%20Authorization%20in%20hashthemes%20Total&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1760-cwe-352-cross-site-request-forgery-c-3ca8e2fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1760%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20croixhaug%20Appointment%20Booking%20Calendar%20%E2%80%94%20Simply%20Schedule%20Appointments%20Booking%20Plugin&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25359-na-eb011068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25359%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38945-na-ecdd8b2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38945%3A%20n%2Fa&amp;severity=high&amp;id=690a439d6d939959c8fddb0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-06-f12ef7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25613-vulnerability-in-hewlett-packard-en-36f88ef5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25613%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20ArubaOS%20Wi-Fi%20Controllers%20and%20Campus%2FRemote%20Access%20Points&amp;severity=high&amp;id=694188253e7fd18214bf80d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23243-an-app-may-be-able-to-read-sensitiv-b877e838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23243%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a47506d939959c80226aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23296-an-attacker-with-arbitrary-kernel-r-af4cc071</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23296%3A%20An%20attacker%20with%20arbitrary%20kernel%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20kernel%20memory%20protections.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9b2247d717aace269a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23225-an-attacker-with-arbitrary-kernel-r-e74cabc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23225%3A%20An%20attacker%20with%20arbitrary%20kernel%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20kernel%20memory%20protections.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9b2247d717aace26996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23256-a-users-locked-tabs-may-be-briefly--ba328cec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23256%3A%20A%20user&apos;s%20locked%20tabs%20may%20be%20briefly%20visible%20while%20switching%20tab%20groups%20when%20Locked%20Private%20Browsing%20is%20enabled%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a47526d939959c8022722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48630-vulnerability-in-linux-linux-bdd4bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48630%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9820c4522896dcbdd4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48629-vulnerability-in-linux-linux-be5cf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48629%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1093-cwe-862-missing-authorization-in-sim-64cad880</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1093%3A%20CWE-862%20Missing%20Authorization%20in%20simon99%20Change%20Memory%20Limit&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1769-cwe-200-information-exposure-in-jmla-e62fc473</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1769%3A%20CWE-200%20Information%20Exposure%20in%20jmlapam%20JM%20Twitter%20Cards&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1381-cwe-862-missing-authorization-in-pag-a36d349f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1381%3A%20CWE-862%20Missing%20Authorization%20in%20pagebuildersandwich%20Page%20Builder%20Sandwich%20%E2%80%93%20Front%20End%20WordPress%20Page%20Builder%20Plugin&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0825-cwe-502-deserialization-of-untrusted-99604c15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0825%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20videogallery%20Vimeography%3A%20Vimeo%20Video%20Gallery%20WordPress%20Plugin&amp;severity=high&amp;id=699f6de5b7ef31ef0b5904b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1088-cwe-284-improper-access-control-in-r-535af7a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1088%3A%20CWE-284%20Improper%20Access%20Control%20in%20rajkakadiya%20Password%20Protected%20Store%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1285-cwe-862-missing-authorization-in-pag-4b0b8ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1285%3A%20CWE-862%20Missing%20Authorization%20in%20pagebuildersandwich%20Page%20Builder%20Sandwich%20%E2%80%93%20Front%20End%20WordPress%20Page%20Builder%20Plugin&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1731-cwe-502-deserialization-of-untrusted-640bbfb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1731%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20jkohlbach%20Auto%20Refresh%20Single%20Page&amp;severity=high&amp;id=699f6d3cb7ef31ef0b56f374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0698-cwe-80-improper-neutralization-of-sc-289979a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0698%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20alextselegidis%20Easy!Appointments&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1095-cwe-862-missing-authorization-in-raz-e694a664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1095%3A%20CWE-862%20Missing%20Authorization%20in%20razib_%20Build%20%26%20Control%20Block%20Patterns%20%E2%80%93%20Boost%20up%20Gutenberg%20Editor&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1478-cwe-284-improper-access-control-in-h-58aa3b92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1478%3A%20CWE-284%20Improper%20Access%20Control%20in%20helderk%20Maintenance%20Mode&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1782-cwe-79-improper-neutralization-of-in-bc857e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1782%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jbahlquist%20Blue%20Triad%20EZAnalytics&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1178-cwe-862-missing-authorization-in-the-57ff6a78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1178%3A%20CWE-862%20Missing%20Authorization%20in%20themeboy%20SportsPress%20%E2%80%93%20Sports%20Club%20%26%20League%20Manager&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27765-na-1e940659</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27765%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27764-na-1505705a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27764%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d87b7ef31ef0b587e44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27627-na-36634c85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27627%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d83b7ef31ef0b581798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27626-na-72d23498</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27626%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d82b7ef31ef0b580ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27625-na-7358a62b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27625%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d82b7ef31ef0b580ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27622-na-defb9a0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27622%3A%20n%2Fa&amp;severity=high&amp;id=699f6d82b7ef31ef0b580ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27565-na-d6d53fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27565%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d80b7ef31ef0b57dd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27563-na-52e0c426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27563%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d80b7ef31ef0b57dd68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27561-na-41973975</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27561%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d80b7ef31ef0b57dd5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26339-na-c72cd3ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26339%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d75b7ef31ef0b572576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26337-na-814a6a58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26337%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26335-na-3d66f811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26335%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26334-na-8861f179</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26334%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b57251e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26333-na-7adec227</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26333%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b57251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25817-na-ff0c5827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25817%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6fb7ef31ef0b57221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24278-na-e2051104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24278%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b5708fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24098-na-0fee6cf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24098%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b5707e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22889-na-c7dd983f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22889%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4fb7ef31ef0b570315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22188-na-62070620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22188%3A%20n%2Fa&amp;severity=high&amp;id=699f6d49b7ef31ef0b570026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27623-na-c9673589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27623%3A%20n%2Fa&amp;severity=medium&amp;id=6942d536b2cbfb3efaa86dec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43318-na-c8bae27e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43318%3A%20n%2Fa&amp;severity=high&amp;id=690a43a16d939959c8fde0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38944-na-b9a40f8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38944%3A%20n%2Fa&amp;severity=critical&amp;id=690a439d6d939959c8fddb06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48644-na-in-na-3c1f40a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48644%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b7303a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-05-f12a31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47108-vulnerability-in-linux-linux-be9d4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47108%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47107-vulnerability-in-linux-linux-be9d4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47107%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47106-vulnerability-in-linux-linux-be9d3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47106%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47105-vulnerability-in-linux-linux-be9d2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47105%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9d2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47104-vulnerability-in-linux-linux-bde03d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47104%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbde03d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47103-vulnerability-in-linux-linux-be9d27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47103%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47102-vulnerability-in-linux-linux-be9d1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47102%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47101-vulnerability-in-linux-linux-be9d02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47101%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47100-vulnerability-in-linux-linux-be9cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47100%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47099-vulnerability-in-linux-linux-be9cfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47099%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47098-vulnerability-in-linux-linux-be9cf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47098%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47097-vulnerability-in-linux-linux-be9cf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47097%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9cf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47096-vulnerability-in-linux-linux-bde035</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47096%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbde035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47095-vulnerability-in-linux-linux-be9cee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47095%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47094-vulnerability-in-linux-linux-be9cd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47094%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47093-vulnerability-in-linux-linux-be9cce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47093%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47092-vulnerability-in-linux-linux-be9cca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47092%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47091-vulnerability-in-linux-linux-be9cc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47091%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47090-vulnerability-in-linux-linux-be9ca9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47090%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47089-vulnerability-in-linux-linux-be9ca5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47089%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9834c4522896dcbe9ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47088-vulnerability-in-linux-linux-be9ca1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47088%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47087-vulnerability-in-linux-linux-bde02d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47087%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde02d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47083-vulnerability-in-linux-linux-be9c9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47083%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47082-vulnerability-in-linux-linux-be9c9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47082%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47086-vulnerability-in-linux-linux-aebf31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47086%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682cd0fa1484d88663aebf31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27199-cwe-23-in-jetbrains-teamcity-f210fa89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27199%3A%20CWE-23%20in%20JetBrains%20TeamCity&amp;severity=high&amp;id=6839e3ce182aa0cae2b8ab00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27198-cwe-288-in-jetbrains-teamcity-2f282e98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27198%3A%20CWE-288%20in%20JetBrains%20TeamCity&amp;severity=critical&amp;id=68f7d9b2247d717aace269d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26622-vulnerability-in-linux-linux-be41f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26622%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27718-na-66abf129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27718%3A%20n%2Fa&amp;severity=high&amp;id=699f6d87b7ef31ef0b587dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27694-na-22491b77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27694%3A%20n%2Fa&amp;severity=high&amp;id=699f6d85b7ef31ef0b584f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27684-na-3fec8c33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27684%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d84b7ef31ef0b583cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27680-na-7e851eb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27680%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d84b7ef31ef0b583cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25164-na-555a2bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25164%3A%20n%2Fa&amp;severity=high&amp;id=699f6d60b7ef31ef0b570d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-04-f12796</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28088-na-1930eb3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28088%3A%20n%2Fa&amp;severity=high&amp;id=699f6d89b7ef31ef0b587fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26469-na-e1bb386d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26469%3A%20n%2Fa&amp;severity=high&amp;id=699f6d77b7ef31ef0b572617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25842-na-a8cea161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25842%3A%20n%2Fa&amp;severity=high&amp;id=699f6d70b7ef31ef0b5722b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25839-na-a0a28e89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25839%3A%20n%2Fa&amp;severity=high&amp;id=699f6d70b7ef31ef0b5722aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25551-na-b4d7ce6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25551%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6cb7ef31ef0b572095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24307-na-b81ebb3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24307%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24302-na-3371a22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24302%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b570908</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-28084-na-f85cc898</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-28084%3A%20n%2Fa&amp;severity=high&amp;id=690a47616d939959c8022f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-03-f12e03</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52582-vulnerability-in-linux-linux-be7d1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52581-vulnerability-in-linux-linux-bdd7ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52580-vulnerability-in-linux-linux-be7d0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52580%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52578-vulnerability-in-linux-linux-be7d04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52578%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52577-vulnerability-in-linux-linux-bdd7fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52577%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52576-vulnerability-in-linux-linux-be7cfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52576%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52574-vulnerability-in-linux-linux-be7ced</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52574%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52573-vulnerability-in-linux-linux-be7ce5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52573%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52572-vulnerability-in-linux-linux-be7cc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52572%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52571-vulnerability-in-linux-linux-be7cb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52571%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7cb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52570-vulnerability-in-linux-linux-be7cb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52570%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52569-vulnerability-in-linux-linux-aebf9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52569%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52568-vulnerability-in-linux-linux-be7ca9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52568%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52567-vulnerability-in-linux-linux-bdd7f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52567%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52566-vulnerability-in-linux-linux-be7ca5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52566%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52565-vulnerability-in-linux-linux-bdd7f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52565%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52564-vulnerability-in-linux-linux-bdd7ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52564%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52563-vulnerability-in-linux-linux-be7c94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52563%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52562-vulnerability-in-linux-linux-bdd7eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52562%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52561-vulnerability-in-linux-linux-be7c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52561%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52560-vulnerability-in-linux-linux-be7c86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52560%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9831c4522896dcbe7c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52559-vulnerability-in-linux-linux-be7c82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52559%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52518-vulnerability-in-linux-linux-be7c21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52518%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52532-vulnerability-in-linux-linux-be7c7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52532%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52531-vulnerability-in-linux-linux-be7c56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52531%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52530-vulnerability-in-linux-linux-bdd7e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52530%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52529-vulnerability-in-linux-linux-bd8dbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52529%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52528-vulnerability-in-linux-linux-be7c50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52528%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52527-vulnerability-in-linux-linux-be7c4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52527%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52526-vulnerability-in-linux-linux-be7c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52526%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52525-vulnerability-in-linux-linux-bdd7e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52525%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52524-vulnerability-in-linux-linux-bdd7df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52524%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52523-vulnerability-in-linux-linux-be7c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52523%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52522-vulnerability-in-linux-linux-be7c40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52522%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52520-vulnerability-in-linux-linux-be7c2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52520%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52519-vulnerability-in-linux-linux-be7c27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52519%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52517-vulnerability-in-linux-linux-be7c10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52517%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52516-vulnerability-in-linux-linux-be7bf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52516%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52515-vulnerability-in-linux-linux-bdd7bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52515%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52513-vulnerability-in-linux-linux-be7be0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52513%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52512-vulnerability-in-linux-linux-be7bd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52512%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52511-vulnerability-in-linux-linux-be7bd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52511%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52510-vulnerability-in-linux-linux-be7bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52510%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52509-vulnerability-in-linux-linux-be7bc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52509%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52508-vulnerability-in-linux-linux-be7bc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52508%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52507-vulnerability-in-linux-linux-be7bbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52507%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52506-vulnerability-in-linux-linux-be7baf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52506%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52505-vulnerability-in-linux-linux-be7bab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52505%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52504-vulnerability-in-linux-linux-be7b7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52504%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52503-vulnerability-in-linux-linux-be7b77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52503%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52502-vulnerability-in-linux-linux-be7b6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52502%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52501-vulnerability-in-linux-linux-be7b69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52501%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52500-vulnerability-in-linux-linux-be7b65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52500%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52499-vulnerability-in-linux-linux-be7b63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52499%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48628-vulnerability-in-linux-linux-be5ce6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48628%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26621-vulnerability-in-linux-linux-be41e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26621%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe41e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48627-vulnerability-in-linux-linux-be5cde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48627%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982ec4522896dcbe5cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1398-cwe-79-improper-neutralization-of-in-ba568a4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1398%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20g5theme%20Ultimate%20Bootstrap%20Elements%20for%20Elementor&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ead7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1449-cwe-80-improper-neutralization-of-sc-af16deb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1449%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56eca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0611-cwe-79-improper-neutralization-of-in-64ae58de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0611%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20averta%20Master%20Slider%20%E2%80%93%20Responsive%20Touch%20Slider&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0378-cwe-79-improper-neutralization-of-in-17d4193d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0378%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tigroumeow%20AI%20Engine&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1775-cwe-79-improper-neutralization-of-in-aca9e776</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1775%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextendweb%20Nextend%20Social%20Login%20and%20Register&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1592-cwe-352-cross-site-request-forgery-c-f13a0fe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1592%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20rogierlankhorst%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-02-f12ee6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47081-vulnerability-in-linux-linux-be9c8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47081%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47080-vulnerability-in-linux-linux-be9c84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47080%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47079-vulnerability-in-linux-linux-be9c7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47079%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47078-vulnerability-in-linux-linux-be9c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47078%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47077-vulnerability-in-linux-linux-be9c6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47077%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47076-vulnerability-in-linux-linux-be9c4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47076%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47075-vulnerability-in-linux-linux-be9c3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47075%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47074-vulnerability-in-linux-linux-be9c3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47074%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47073-vulnerability-in-linux-linux-be9c37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47073%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47072-vulnerability-in-linux-linux-be9c33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47072%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47071-vulnerability-in-linux-linux-be9c2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47071%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47070-vulnerability-in-linux-linux-be9c2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47070%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47069-vulnerability-in-linux-linux-be9c27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47069%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20328-cwe-78-improper-neutralization-of-s-df6ef053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20328%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20ClamAV&amp;severity=medium&amp;id=690a47486d939959c802233c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1120-cwe-862-missing-authorization-in-xlp-b7a8a466</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1120%3A%20CWE-862%20Missing%20Authorization%20in%20xlplugins%20NextMove%20Lite%20%E2%80%93%20Thank%20You%20Page%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27950-missing-authorization-in-sirv-cdn-a-ab0921c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27950%3A%20Missing%20Authorization%20in%20Sirv%20CDN%20and%20Image%20Hosting%20Sirv&amp;severity=null&amp;id=69cd7416e6bfc5ba1def51f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27949-server-side-request-forgery-ssrf-in-0183bc3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27949%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Sirv%20CDN%20and%20Image%20Hosting%20Sirv&amp;severity=null&amp;id=69cd7416e6bfc5ba1def51ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1859-cwe-502-deserialization-of-untrusted-1840184a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1859%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20awordpresslife%20Slider%20Responsive%20Slideshow%20%E2%80%93%20Image%20slider%2C%20Gallery%20slideshow&amp;severity=high&amp;id=699f6d42b7ef31ef0b56f775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50312-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-websphere-application-server-liberty-bf7111</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50312%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20WebSphere%20Application%20Server%20Liberty&amp;severity=medium&amp;id=682d984ac4522896dcbf7111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27747-na-615eeb3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27747%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d87b7ef31ef0b587e34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27746-na-a05f54e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27746%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d87b7ef31ef0b587e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27744-na-46cdd882</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27744%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27734-na-47e43503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27734%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d87b7ef31ef0b587e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27689-na-71c68c0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27689%3A%20n%2Fa&amp;severity=high&amp;id=699f6d84b7ef31ef0b583d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27572-na-74086516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27572%3A%20n%2Fa&amp;severity=high&amp;id=699f6d80b7ef31ef0b57dd97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27571-na-d9d5e6b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27571%3A%20n%2Fa&amp;severity=high&amp;id=699f6d80b7ef31ef0b57dd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27569-na-79e1b3b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27569%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d80b7ef31ef0b57dd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27568-na-46166e83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27568%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d80b7ef31ef0b57dd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27567-na-b9ea4cbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27567%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d80b7ef31ef0b57dd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27559-na-d8dfa1f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27559%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d80b7ef31ef0b57dd58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27497-na-be598c71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27497%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b57a4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27355-na-798a27b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27355%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7bb7ef31ef0b576c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25438-na-6a6a4452</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25438%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25434-na-a907a2fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25434%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25386-na-08349605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25386%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25293-na-67fdbafe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25293%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24512-na-d5a59b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24512%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5eb7ef31ef0b570bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24511-na-33b7b0c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24511%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5db7ef31ef0b570b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22891-na-449e72a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22891%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b570318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27558-n-a-in-n-a-bf711b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27558%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf711b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27354-n-a-in-n-a-bf7115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46951-n-a-in-n-a-bf7109</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46951%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-03-01-f123b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-03-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f123b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-2045-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-session-session-aeb541</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-2045%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Session%20Session&amp;severity=medium&amp;id=682cd0f81484d88663aeb541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0403-cwe-918-server-side-request-forgery-ssrf-in-recipes-recipes-aeb6f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0403%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Recipes%20Recipes&amp;severity=medium&amp;id=682cd0f81484d88663aeb6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47068-vulnerability-in-linux-linux-be9c23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47068%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47067-vulnerability-in-linux-linux-be9c1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47067%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47066-vulnerability-in-linux-linux-be9c06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47066%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47065-vulnerability-in-linux-linux-be9c02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47065%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47064-vulnerability-in-linux-linux-be9bf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47064%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9bf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47063-vulnerability-in-linux-linux-be9bef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47063%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47062-vulnerability-in-linux-linux-be9beb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47062%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47061-vulnerability-in-linux-linux-bde029</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47061%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47060-vulnerability-in-linux-linux-bde025</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47060%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbde025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47059-vulnerability-in-linux-linux-be9be7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47059%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47058-vulnerability-in-linux-linux-be9be3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47058%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47057-vulnerability-in-linux-linux-be9bdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47057%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47056-vulnerability-in-linux-linux-be9bd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47056%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47055-vulnerability-in-linux-linux-bde005</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47055%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47054-vulnerability-in-linux-linux-be9bc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47054%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47020-vulnerability-in-linux-linux-be9a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47020%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47016-vulnerability-in-linux-linux-be9a5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47016%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46959-vulnerability-in-linux-linux-bddfa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46959%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddfa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26196-cwe-259-use-of-hard-coded-password-in-microsoft-microsoft-edge-for-android-beacd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26196%3A%20CWE-259%3A%20Use%20of%20Hard-coded%20Password%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=682d9836c4522896dcbeacd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26620-vulnerability-in-linux-linux-be41d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26620%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26619-vulnerability-in-linux-linux-be41d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26619%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26618-vulnerability-in-linux-linux-bdd9dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26618%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26617-vulnerability-in-linux-linux-be41cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26617%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26616-vulnerability-in-linux-linux-be41c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26616%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26615-vulnerability-in-linux-linux-be41bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26615%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26614-vulnerability-in-linux-linux-be41bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26614%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe41bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26612-vulnerability-in-linux-linux-be41b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26612%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe41b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26611-vulnerability-in-linux-linux-be41b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26611%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe41b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26610-vulnerability-in-linux-linux-be4190</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26610%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26608-vulnerability-in-linux-linux-be4188</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26608%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52498-vulnerability-in-linux-linux-be7b56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52498%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52497-vulnerability-in-linux-linux-be7b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52497%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52495-vulnerability-in-linux-linux-be7b3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52495%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52494-vulnerability-in-linux-linux-bdd7b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52494%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52493-vulnerability-in-linux-linux-be7b35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52493%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52492-vulnerability-in-linux-linux-be7b0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52492%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52491-vulnerability-in-linux-linux-be7b07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52491%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52490-vulnerability-in-linux-linux-bd8db8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52490%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9819c4522896dcbd8db8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52489-vulnerability-in-linux-linux-be7b03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52489%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52488-vulnerability-in-linux-linux-be7aff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52488%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52487-vulnerability-in-linux-linux-be7afb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52487%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52486-vulnerability-in-linux-linux-be7af5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52486%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7af5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52485-vulnerability-in-linux-linux-be7af3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52485%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7af3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26607-vulnerability-in-linux-linux-be4180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26607%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27906-cwe-862-missing-authorization-in-apache-software-foundation-apache-airflow-bdaad8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27906%3A%20CWE-862%20Missing%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=682d981cc4522896dcbdaad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1952-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-mattermost-mattermost-bf70bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1952%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=682d984ac4522896dcbf70bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1981-cwe-89-improper-neutralization-of-sp-bb287ff3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1981%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid&amp;severity=critical&amp;id=699f6d46b7ef31ef0b56fe6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1978-cwe-918-server-side-request-forgery--d77b9f3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1978%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20akirk%20Friends&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1982-cwe-862-missing-authorization-in-wpv-f029c21c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1982%3A%20CWE-862%20Missing%20Authorization%20in%20wpvividplugins%20Migration%2C%20Backup%2C%20Staging%20%E2%80%93%20WPvivid&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52484-vulnerability-in-linux-linux-be7aef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52484%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7aef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52483-vulnerability-in-linux-linux-be7aeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52483%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52482-vulnerability-in-linux-linux-aebf98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52482%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682cd0fa1484d88663aebf98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52481-vulnerability-in-linux-linux-be7adc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52481%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52480-vulnerability-in-linux-linux-be7ab0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52480%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7ab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52479-vulnerability-in-linux-linux-be7aa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52479%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52478-vulnerability-in-linux-linux-be7aa0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52478%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52477-vulnerability-in-linux-linux-be7a98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52477%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52476-vulnerability-in-linux-linux-be7a90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52476%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52475-vulnerability-in-linux-linux-be7a8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52475%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1976-cwe-352-cross-site-request-forgery-c-0b885828</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20activeim%20Marketing%20Optimizer&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fda4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1977-cwe-79-improper-neutralization-of-in-e5192a36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20foucciano%20Restaurant%20Solutions%20%E2%80%93%20Checklist&amp;severity=medium&amp;id=699f6d46b7ef31ef0b56fe62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21752-cwe-352-cross-site-request-forgery-csrf-in-ernest-marcinko-ajax-search-lite-bf70c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21752%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Ernest%20Marcinko%20Ajax%20Search%20Lite&amp;severity=medium&amp;id=682d984ac4522896dcbf70c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51696-cwe-352-cross-site-request-forgery-csrf-in-leantalk-anti-spam-protection-spam-protection-anti-spam-firewall-by-cleantalk-bf709f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51696%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20%D0%A1leanTalk%20-%20Anti-Spam%20Protection%20Spam%20protection%2C%20Anti-Spam%2C%20FireWall%20by%20CleanTalk&amp;severity=medium&amp;id=682d984ac4522896dcbf709f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1341-cwe-79-improper-neutralization-of-in-4e2655a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1341%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mdempfle%20Advanced%20iFrame&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1468-cwe-434-unrestricted-upload-of-file--4bb7332e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1468%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Avada%20%7C%20Website%20Builder%20For%20WordPress%20%26%20WooCommerce&amp;severity=high&amp;id=699f6d31b7ef31ef0b56ed29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0689-cwe-80-improper-neutralization-of-sc-c8a859b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0689%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mgibbs189%20Custom%20Field%20Suite&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59030a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27662-na-f75698c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27662%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d84b7ef31ef0b583c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27661-na-48032a17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27661%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d84b7ef31ef0b583c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27660-na-f7e44e9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27660%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d83b7ef31ef0b581803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27659-na-816026c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27659%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d83b7ef31ef0b5817fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27658-na-f69f4c8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27658%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d83b7ef31ef0b5817f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27657-na-4eebba26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27657%3A%20n%2Fa&amp;severity=high&amp;id=699f6d83b7ef31ef0b5817ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27656-na-807865de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27656%3A%20n%2Fa&amp;severity=high&amp;id=699f6d83b7ef31ef0b5817e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27655-na-cc66c30a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27655%3A%20n%2Fa&amp;severity=high&amp;id=699f6d83b7ef31ef0b5817db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25811-na-062d7d0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25811%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6fb7ef31ef0b57221c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25239-na-b6cf0ead</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25239%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25180-na-5b3fcd85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25180%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d61b7ef31ef0b571aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25167-na-a4ade125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25167%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d60b7ef31ef0b570d65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24525-na-362f00b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24525%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5eb7ef31ef0b570bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24520-na-790839d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24520%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5eb7ef31ef0b570bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24110-na-dd356338</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24110%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5707ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24028-na-e1209935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24028%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5706a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24246-na-8c01a551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24246%3A%20n%2Fa&amp;severity=medium&amp;id=690a475b6d939959c8022d1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22871-na-28dfbc1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22871%3A%20n%2Fa&amp;severity=high&amp;id=690a474d6d939959c80223d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25291-n-a-in-n-a-bf70cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25291%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf70cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51801-n-a-in-n-a-bf70b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51801%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf70b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-29-f120bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f120bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25579-os-command-injection-in-elecom-colt-a18137e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25579%3A%20OS%20command%20injection%20in%20ELECOM%20CO.%2CLTD.%20WRC-1167GS2-B&amp;severity=medium&amp;id=6981ae8df9fa50a62faf0c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23910-cross-site-request-forgery-csrf-in-elecom-co-ltd-wrc-1167gs2-b-bf6f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23910%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20ELECOM%20CO.%2CLTD.%20WRC-1167GS2-B&amp;severity=medium&amp;id=682d9849c4522896dcbf6f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1971-cwe-89-sql-injection-in-surya2developer-online-shopping-system-bf6f25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1971%3A%20CWE-89%20SQL%20Injection%20in%20Surya2Developer%20Online%20Shopping%20System&amp;severity=medium&amp;id=682d9849c4522896dcbf6f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0560-improper-handling-of-insufficient-pe-971fb0a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0560%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6917-creation-of-temporary-file-with-inse-e217e86c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6917%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=691f5c4ce672cd9080e8d3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23807-cwe-416-use-after-free-in-apache-so-55915fd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23807%3A%20CWE-416%20Use%20After%20Free%20in%20Apache%20Software%20Foundation%20Apache%20Xerces%20C%2B%2B&amp;severity=high&amp;id=6971b0364623b1157c3d420e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25930-cwe-352-cross-site-request-forgery-csrf-in-nuggethon-custom-order-statuses-for-woocommerce-bf6f63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25930%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Nuggethon%20Custom%20Order%20Statuses%20for%20WooCommerce&amp;severity=medium&amp;id=682d9849c4522896dcbf6f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25932-cross-site-request-forgery-csrf-in--9e7f5922</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25932%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Manish%20Kumar%20Agarwal%20Change%20Table%20Prefix&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1808-cwe-79-improper-neutralization-of-in-2b609733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1808%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21886-heap-based-buffer-overflow-0f38c971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21886%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=690a474b6d939959c80223a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21885-heap-based-buffer-overflow-bf6f36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21885%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=682d9849c4522896dcbf6f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26016-cwe-863-incorrect-authorization-in-apache-software-foundation-apache-superset-bf6f6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26016%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=682d9849c4522896dcbf6f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1861-cwe-862-missing-authorization-in-smi-aa326334</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1861%3A%20CWE-862%20Missing%20Authorization%20in%20sminozzi%20Disable%20Json%20API%2C%20Login%20Lockdown%2C%20XMLRPC%2C%20Pingback%2C%20Stop%20User%20Enumeration%20Anti%20Hacker%20Scan&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1719-cwe-352-cross-site-request-forgery-c-b0b8502d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1719%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scottpaterson%20Contact%20Form%207%20%E2%80%93%20PayPal%20%26%20Stripe%20Add-on&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1860-cwe-862-missing-authorization-in-sminozzi-disable-json-api-login-lockdown-xmlrpc-pingback-stop-user-enumeration-anti-hacker-scan-bf6f1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1860%3A%20CWE-862%20Missing%20Authorization%20in%20sminozzi%20Disable%20Json%20API%2C%20Login%20Lockdown%2C%20XMLRPC%2C%20Pingback%2C%20Stop%20User%20Enumeration%20Anti%20Hacker%20Scan&amp;severity=medium&amp;id=682d9849c4522896dcbf6f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1476-cwe-284-improper-access-control-in-a-73d921f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1476%3A%20CWE-284%20Improper%20Access%20Control%20in%20acurax%20Under%20Construction%20%2F%20Maintenance%20Mode%20from%20Acurax&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1136-cwe-862-missing-authorization-in-wpshopmart-coming-soon-page-maintenance-mode-bf6f1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1136%3A%20CWE-862%20Missing%20Authorization%20in%20wpshopmart%20Coming%20Soon%20Page%20%26%20Maintenance%20Mode&amp;severity=medium&amp;id=682d9849c4522896dcbf6f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0767-cwe-352-cross-site-request-forgery-c-ce45d312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0767%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20envothemes%20Envo%26%23039%3Bs%20Elementor%20Templates%20%26%20Widgets%20for%20WooCommerce&amp;severity=medium&amp;id=699f6de4b7ef31ef0b5903c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0786-cwe-89-improper-neutralization-of-sp-3e6b7954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0786%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20tatvic%20Conversios%20%E2%80%93%20Google%20Analytics%204%20(GA4)%2C%20Meta%20Pixel%20%26%20more%20Via%20Google%20Tag%20Manager%20For%20WooCommerce&amp;severity=high&amp;id=699f6de4b7ef31ef0b5903d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1368-cwe-862-missing-authorization-in-sam-8a443eec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1368%3A%20CWE-862%20Missing%20Authorization%20in%20samuelkwle%20Page%20Duplicator&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1516-cwe-862-missing-authorization-in-jus-67ec8726</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1516%3A%20CWE-862%20Missing%20Authorization%20in%20justinsainton%20WP%20eCommerce&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56eea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0766-cwe-284-improper-access-control-in-e-c2a1f8e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0766%3A%20CWE-284%20Improper%20Access%20Control%20in%20envothemes%20Envo%26%23039%3Bs%20Elementor%20Templates%20%26%20Widgets%20for%20WooCommerce&amp;severity=medium&amp;id=699f6de4b7ef31ef0b5903c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1954-cwe-352-cross-site-request-forgery-c-88ada3ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1954%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20oliverpos%20Oliver%20POS%20%E2%80%93%20A%20WooCommerce%20Point%20of%20Sale%20(POS)&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56fd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0431-cwe-352-cross-site-request-forgery-csrf-in-easynolo-gestpay-for-woocommerce-bf6f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0431%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20easynolo%20Gestpay%20for%20WooCommerce&amp;severity=medium&amp;id=682d9849c4522896dcbf6f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1566-cwe-862-missing-authorization-in-mat-020f7268</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1566%3A%20CWE-862%20Missing%20Authorization%20in%20mattdeclaire%20Redirects&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56efd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0432-cwe-352-cross-site-request-forgery-c-d3a3a026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0432%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20easynolo%20Gestpay%20for%20WooCommerce&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0768-cwe-352-cross-site-request-forgery-c-d76dfcf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0768%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20envothemes%20Envo%26%23039%3Bs%20Elementor%20Templates%20%26%20Widgets%20for%20WooCommerce&amp;severity=medium&amp;id=699f6de4b7ef31ef0b5903cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0682-cwe-693-protection-mechanism-failure-d2ed0a90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0682%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20sivel%20Page%20Restrict&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59024d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1791-cwe-79-improper-neutralization-of-in-8be2d8a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vickyagravat%20CodeMirror%20Blocks&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f53e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0433-cwe-352-cross-site-request-forgery-c-235bfc86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0433%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20easynolo%20Gestpay%20for%20WooCommerce&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0680-cwe-693-protection-mechanism-failure-90bf7b02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0680%3A%20CWE-693%20Protection%20Mechanism%20Failure%20in%20nimeshrmr%20WP%20Private%20Content%20Plus&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0975-cwe-284-improper-access-control-in-b-e0752183</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0975%3A%20CWE-284%20Improper%20Access%20Control%20in%20brandonwamboldt%20WordPress%20Access%20Control&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1514-cwe-89-improper-neutralization-of-sp-13d9f2bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1514%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20justinsainton%20WP%20eCommerce&amp;severity=critical&amp;id=699f6d33b7ef31ef0b56eea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47053-vulnerability-in-linux-linux-be9baf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47053%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47052-vulnerability-in-linux-linux-be9bab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47052%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9bab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47051-vulnerability-in-linux-linux-be9ba7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47051%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47050-vulnerability-in-linux-linux-be9ba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47050%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47049-vulnerability-in-linux-linux-bde001</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47049%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbde001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47048-vulnerability-in-linux-linux-be9b9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47048%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47047-vulnerability-in-linux-linux-be9b90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47047%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47046-vulnerability-in-linux-linux-be9b8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47046%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47045-vulnerability-in-linux-linux-be9b84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47045%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47044-vulnerability-in-linux-linux-be9b73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47044%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47043-vulnerability-in-linux-linux-be9b6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47043%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47042-vulnerability-in-linux-linux-be9b4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47042%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47041-vulnerability-in-linux-linux-be9b48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47041%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47040-vulnerability-in-linux-linux-be9b44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47040%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47039-vulnerability-in-linux-linux-be9b35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47039%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47038-vulnerability-in-linux-linux-be9b31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47038%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47037-vulnerability-in-linux-linux-be9b22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47037%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47036-vulnerability-in-linux-linux-be9b1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47036%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47035-vulnerability-in-linux-linux-be9b12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47035%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47034-vulnerability-in-linux-linux-be9b08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47034%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47033-vulnerability-in-linux-linux-be9b00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47033%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47032-vulnerability-in-linux-linux-be9ae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47032%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47031-vulnerability-in-linux-linux-be9adc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47031%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47030-vulnerability-in-linux-linux-be9ad8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47030%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47029-vulnerability-in-linux-linux-be9ac7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47029%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47028-vulnerability-in-linux-linux-be9abf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47028%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47027-vulnerability-in-linux-linux-be9ab7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47027%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47026-vulnerability-in-linux-linux-be9aaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47026%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47025-vulnerability-in-linux-linux-be9aa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47025%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47024-vulnerability-in-linux-linux-bddffd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47024%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47023-vulnerability-in-linux-linux-be9a98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47023%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47022-vulnerability-in-linux-linux-be9a90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47022%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47021-vulnerability-in-linux-linux-be9a79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47021%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47019-vulnerability-in-linux-linux-be9a68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47019%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47018-vulnerability-in-linux-linux-be9a64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47018%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47017-vulnerability-in-linux-linux-be9a60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47017%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47015-vulnerability-in-linux-linux-bddff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47015%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47014-vulnerability-in-linux-linux-bddff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47014%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47013-vulnerability-in-linux-linux-be9a58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47013%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47012-vulnerability-in-linux-linux-be9a54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47012%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47011-vulnerability-in-linux-linux-be9a50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47011%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47010-vulnerability-in-linux-linux-be9a4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47010%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47009-vulnerability-in-linux-linux-be9a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47009%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47008-vulnerability-in-linux-linux-be9a37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47008%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47007-vulnerability-in-linux-linux-be9a33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47007%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47006-vulnerability-in-linux-linux-be9a26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47006%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47005-vulnerability-in-linux-linux-be9a22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47005%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47004-vulnerability-in-linux-linux-be9a1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47004%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47003-vulnerability-in-linux-linux-be9a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47003%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47002-vulnerability-in-linux-linux-be9a16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47002%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47001-vulnerability-in-linux-linux-bddff1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47001%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-47000-vulnerability-in-linux-linux-bd8db0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-47000%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9819c4522896dcbd8db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46999-vulnerability-in-linux-linux-bddfed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46999%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46998-vulnerability-in-linux-linux-be9a12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46998%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46997-vulnerability-in-linux-linux-be9a0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46997%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9a0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46996-vulnerability-in-linux-linux-be99fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46996%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe99fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46995-vulnerability-in-linux-linux-be99ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46995%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe99ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46994-vulnerability-in-linux-linux-be99e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46994%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe99e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46993-vulnerability-in-linux-linux-be99e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46993%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe99e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46992-vulnerability-in-linux-linux-be99dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46992%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe99dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46991-vulnerability-in-linux-linux-be99d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46991%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe99d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46990-vulnerability-in-linux-linux-bddfe9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46990%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddfe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46989-vulnerability-in-linux-linux-be99d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46989%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe99d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46988-vulnerability-in-linux-linux-be99d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46988%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe99d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46987-vulnerability-in-linux-linux-bddfd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46987%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddfd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46986-vulnerability-in-linux-linux-be99bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46986%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe99bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46985-vulnerability-in-linux-linux-be99b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46985%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe99b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46984-vulnerability-in-linux-linux-be99a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46984%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe99a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46983-vulnerability-in-linux-linux-be999e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46983%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe999e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46982-vulnerability-in-linux-linux-be999a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46982%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe999a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46981-vulnerability-in-linux-linux-bddfd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46981%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46980-vulnerability-in-linux-linux-be9996</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46980%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46979-vulnerability-in-linux-linux-be9992</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46979%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46978-vulnerability-in-linux-linux-be998e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46978%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe998e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46977-vulnerability-in-linux-linux-be997f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46977%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe997f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46976-vulnerability-in-linux-linux-be997b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46976%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe997b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36787-vulnerability-in-linux-linux-bea600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36787%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36786-vulnerability-in-linux-linux-bea5fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36786%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36785-vulnerability-in-linux-linux-bea5f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36785%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea5f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36784-vulnerability-in-linux-linux-bea5e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36784%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36783-vulnerability-in-linux-linux-bea5df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36783%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36782-vulnerability-in-linux-linux-bea5d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36782%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36781-vulnerability-in-linux-linux-bea5d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36781%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36780-vulnerability-in-linux-linux-bea5cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36780%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36779-vulnerability-in-linux-linux-bea5c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36779%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36778-vulnerability-in-linux-linux-bea5c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36778%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1943-cwe-352-cross-site-request-forgery-c-e898552b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1943%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wpmoose%20Yuki&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56f893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1388-cwe-862-missing-authorization-in-wpm-9d0f97cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1388%3A%20CWE-862%20Missing%20Authorization%20in%20wpmoose%20Yuki&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56ea55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1568-cwe-918-server-side-request-forgery--cf7276e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1568%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20seraphinitesoft%20Seraphinite%20Accelerator&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56efdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27517-na-e3aff105</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27517%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7fb7ef31ef0b57ce49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27516-na-d8b6a457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27516%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d7db7ef31ef0b57a533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27515-na-eb9573b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27515%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b57a51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26559-na-c7f0bc0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26559%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d79b7ef31ef0b572ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26476-na-7d9b68ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26476%3A%20n%2Fa&amp;severity=low&amp;id=699f6d77b7ef31ef0b572675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26450-na-fb1abfb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26450%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b57259b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25869-na-b99ef454</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25869%3A%20n%2Fa&amp;severity=high&amp;id=699f6d73b7ef31ef0b5723f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25868-na-f1a12c46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25868%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d71b7ef31ef0b572352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25867-na-68dcbc57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25867%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d71b7ef31ef0b57234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25866-na-fb17efec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25866%3A%20n%2Fa&amp;severity=high&amp;id=699f6d71b7ef31ef0b57234c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25859-na-45667ae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25859%3A%20n%2Fa&amp;severity=high&amp;id=699f6d71b7ef31ef0b572349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25833-na-733ac893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25833%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d70b7ef31ef0b5722a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25831-na-be3947e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25831%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d70b7ef31ef0b5722a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25830-na-b6ea731e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25830%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d70b7ef31ef0b57229c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25351-na-ad9997b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25351%3A%20n%2Fa&amp;severity=low&amp;id=699f6d65b7ef31ef0b571d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25170-na-88a58f04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25170%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d60b7ef31ef0b570d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24155-na-bd2e68b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24155%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d58b7ef31ef0b570884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24149-na-6521de25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24149%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d58b7ef31ef0b570881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24148-na-771b1ff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24148%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b57087e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24147-na-ea4d9888</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24147%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d58b7ef31ef0b57087b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23302-na-eefe33e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23302%3A%20n%2Fa&amp;severity=high&amp;id=699f6d51b7ef31ef0b5704dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22723-na-deb87d5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22723%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b570208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22532-na-88b12638</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22532%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b57010a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26342-n-a-in-n-a-bf6f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26342%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9849c4522896dcbf6f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25350-n-a-in-n-a-bf6f5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25350%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9849c4522896dcbf6f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25202-n-a-in-n-a-bf6f53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25202%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9849c4522896dcbf6f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-28-f127d8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f127d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0763-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-mintplex-labs-mintplex-labs-anything-llm-bf6dd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0763%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mintplex-labs%20mintplex-labs%2Fanything-llm&amp;severity=medium&amp;id=682d9849c4522896dcbf6dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46974-vulnerability-in-linux-linux-bddfae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46974%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46973-vulnerability-in-linux-linux-be9973</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46973%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46972-vulnerability-in-linux-linux-be9964</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46972%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46971-vulnerability-in-linux-linux-be994b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46971%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe994b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46970-vulnerability-in-linux-linux-be9943</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46970%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46969-vulnerability-in-linux-linux-be993b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46969%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe993b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46968-vulnerability-in-linux-linux-be9933</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46968%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46967-vulnerability-in-linux-linux-be9924</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46967%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46966-vulnerability-in-linux-linux-bddfaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46966%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddfaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46965-vulnerability-in-linux-linux-be9915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46965%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe9915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46964-vulnerability-in-linux-linux-be990d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46964%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe990d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46963-vulnerability-in-linux-linux-bddfa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46963%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddfa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46962-vulnerability-in-linux-linux-be9905</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46962%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46961-vulnerability-in-linux-linux-be98fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46961%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe98fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46960-vulnerability-in-linux-linux-be98f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46960%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe98f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46958-vulnerability-in-linux-linux-be98d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46958%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe98d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46957-vulnerability-in-linux-linux-be98cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46957%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe98cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46956-vulnerability-in-linux-linux-be98c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46956%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe98c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46955-vulnerability-in-linux-linux-bddf9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46955%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46954-vulnerability-in-linux-linux-be98bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46954%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe98bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46953-vulnerability-in-linux-linux-be98ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46953%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9834c4522896dcbe98ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46952-vulnerability-in-linux-linux-be98a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46952%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe98a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46951-vulnerability-in-linux-linux-be9893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46951%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9834c4522896dcbe9893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46950-vulnerability-in-linux-linux-bd8d11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46950%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9819c4522896dcbd8d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46949-vulnerability-in-linux-linux-bea7e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46949%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46948-vulnerability-in-linux-linux-bea7da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46948%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea7da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46947-vulnerability-in-linux-linux-bea7d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46947%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46945-vulnerability-in-linux-linux-bea7d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46945%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46944-vulnerability-in-linux-linux-bea7ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46944%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46943-vulnerability-in-linux-linux-bea7c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46943%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46942-vulnerability-in-linux-linux-bea797</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46942%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46941-vulnerability-in-linux-linux-bea78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46941%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46940-vulnerability-in-linux-linux-bea787</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46940%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46939-vulnerability-in-linux-linux-bea783</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46939%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46938-vulnerability-in-linux-linux-bea77f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46938%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36777-vulnerability-in-linux-linux-bea59f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36777%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36776-vulnerability-in-linux-linux-bddf96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36776%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbddf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1722-overly-restrictive-account-lockout-m-ba0dacca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1722%3A%20Overly%20Restrictive%20Account%20Lockout%20Mechanism&amp;severity=low&amp;id=69200c2a59bb91a9a9a60fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1926-cwe-89-sql-injection-in-sourcecodester-free-and-open-source-inventory-management-system-bf6ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1926%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Free%20and%20Open%20Source%20Inventory%20Management%20System&amp;severity=medium&amp;id=682d9849c4522896dcbf6ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21742-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-apache-software-foundation-apache-james-mime4j-bdaad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21742%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20James%20Mime4J&amp;severity=medium&amp;id=682d981cc4522896dcbdaad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27905-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-aurora-bf6bf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27905%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Aurora&amp;severity=critical&amp;id=682d9849c4522896dcbf6bf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1650-cwe-862-missing-authorization-in-fre-8686a928</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1650%3A%20CWE-862%20Missing%20Authorization%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1649-cwe-862-missing-authorization-in-fre-072c742d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1649%3A%20CWE-862%20Missing%20Authorization%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1910-cwe-352-cross-site-request-forgery-c-e0f379e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1910%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56f879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1652-cwe-862-missing-authorization-in-fre-ec50197a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1652%3A%20CWE-862%20Missing%20Authorization%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1906-cwe-352-cross-site-request-forgery-c-8b56cd6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1906%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1912-cwe-352-cross-site-request-forgery-c-ae95ef63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1912%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56f87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1909-cwe-352-cross-site-request-forgery-c-d09b5fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1909%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d44b7ef31ef0b56f875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1653-cwe-862-missing-authorization-in-frenify-categorify-wordpress-media-library-category-file-manager-bf6dd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1653%3A%20CWE-862%20Missing%20Authorization%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=682d9849c4522896dcbf6dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1907-cwe-352-cross-site-request-forgery-c-e1c3662a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1907%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20frenify%20Categorify%20%E2%80%93%20WordPress%20Media%20Library%20Category%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6d42b7ef31ef0b56f803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46937-vulnerability-in-linux-linux-bea77b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46937%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46936-vulnerability-in-linux-linux-bea777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46936%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46935-vulnerability-in-linux-linux-bea773</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46935%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46934-vulnerability-in-linux-linux-bea766</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46934%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46933-vulnerability-in-linux-linux-bea755</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46933%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46932-vulnerability-in-linux-linux-bea730</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46932%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46931-vulnerability-in-linux-linux-bea72a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46931%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46930-vulnerability-in-linux-linux-bea726</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46930%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46929-vulnerability-in-linux-linux-bea722</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46929%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46928-vulnerability-in-linux-linux-bea71e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46928%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9835c4522896dcbea71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46927-vulnerability-in-linux-linux-bea71a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46927%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea71a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46926-vulnerability-in-linux-linux-bea702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46926%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46925-vulnerability-in-linux-linux-bea6fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46925%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46924-vulnerability-in-linux-linux-bea6f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46924%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46923-vulnerability-in-linux-linux-bea6e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46923%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46922-vulnerability-in-linux-linux-bea6be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46922%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46921-vulnerability-in-linux-linux-bea6ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46921%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6584-cwe-287-improper-authentication-in-unknown-wp-jobsearch-bf6dd1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6584%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20WP%20JobSearch&amp;severity=high&amp;id=682d9849c4522896dcbf6dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46920-vulnerability-in-linux-linux-bea6b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46920%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46919-vulnerability-in-linux-linux-bea6b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46919%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46918-vulnerability-in-linux-linux-bea6ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46918%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46917-vulnerability-in-linux-linux-bddf9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46917%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbddf9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46916-vulnerability-in-linux-linux-bea6aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46916%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46915-vulnerability-in-linux-linux-bea6a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46915%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46914-vulnerability-in-linux-linux-bea697</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46914%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46913-vulnerability-in-linux-linux-bea68f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46913%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46912-vulnerability-in-linux-linux-bea687</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46912%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46911-vulnerability-in-linux-linux-bea66c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46911%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46910-vulnerability-in-linux-linux-bea668</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46910%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46909-vulnerability-in-linux-linux-bea65b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46909%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46908-vulnerability-in-linux-linux-bea657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46908%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1698-cwe-89-improper-neutralization-of-sp-14071169</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1698%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevteam%20NotificationX%20%E2%80%93%20Best%20FOMO%2C%20Social%20Proof%2C%20WooCommerce%20Sales%20Popup%20%26%20Notification%20Bar%20Plugin%20With%20Elementor&amp;severity=critical&amp;id=699f6d39b7ef31ef0b56f223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1687-cwe-862-missing-authorization-in-mrt-78693fd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1687%3A%20CWE-862%20Missing%20Authorization%20in%20mrt3vn%20Thank%20You%20Page%20Customizer%20for%20WooCommerce%20%E2%80%93%20Increase%20Your%20Sales&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1686-cwe-862-missing-authorization-in-mrt-028ac07c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1686%3A%20CWE-862%20Missing%20Authorization%20in%20mrt3vn%20Thank%20You%20Page%20Customizer%20for%20WooCommerce%20%E2%80%93%20Increase%20Your%20Sales&amp;severity=medium&amp;id=699f6d39b7ef31ef0b56f1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1323-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-themeisle-orbit-fox-by-themeisle-bf6ba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1323%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=682d9849c4522896dcbf6ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27508-na-d99fe1e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27508%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b57a506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26542-na-9d3324ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26542%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d79b7ef31ef0b572b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26473-na-585ac302</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26473%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26472-na-b8c0e2ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26472%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b57266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26471-na-0bce03d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26471%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b57261f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26470-na-e8ef35af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26470%3A%20n%2Fa&amp;severity=high&amp;id=699f6d77b7ef31ef0b57261a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25846-na-c893e0d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25846%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d71b7ef31ef0b572331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25843-na-43e22c88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25843%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d70b7ef31ef0b5722b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25841-na-0ee299fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25841%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d70b7ef31ef0b5722b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25840-na-e5a55249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25840%3A%20n%2Fa&amp;severity=high&amp;id=699f6d70b7ef31ef0b5722ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25723-na-92bcce0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25723%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6db7ef31ef0b572106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25399-na-b2de1098</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25399%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25398-na-33d0b5c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25398%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25166-na-a1c2e056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25166%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d60b7ef31ef0b570d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24323-na-81502332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24323%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24099-na-9078cffa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24099%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5707ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24096-na-72357e66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24096%3A%20n%2Fa&amp;severity=high&amp;id=699f6d56b7ef31ef0b5707d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24095-na-5acac2c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24095%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b5707d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24027-na-a429df97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24027%3A%20n%2Fa&amp;severity=high&amp;id=699f6d56b7ef31ef0b57069e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22917-na-07c808fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22917%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b57032e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22544-na-1dc6d5b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22544%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4bb7ef31ef0b570110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22543-na-0b44aaca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22543%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b57010d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27507-na-337024cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27507%3A%20n%2Fa&amp;severity=high&amp;id=690a47616d939959c8022f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24720-na-in-na-aebbba03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24720%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b7303e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25400-n-a-in-n-a-aec489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25400%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec489</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-27-f11fb9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52474-vulnerability-in-linux-linux-be7a88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52474%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46906-vulnerability-in-linux-linux-bea653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46906%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36775-vulnerability-in-linux-linux-bea597</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36775%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-25162-vulnerability-in-linux-linux-bea593</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-25162%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-25160-vulnerability-in-linux-linux-bea58f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-25160%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9835c4522896dcbea58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23837-cwe-770-allocation-of-resources-wit-80d78873</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23837%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20OISF%20libhtp&amp;severity=high&amp;id=6908f50bf612d110fe9cbe7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26606-vulnerability-in-linux-linux-be4178</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26606%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27456-na-356761ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27456%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d7db7ef31ef0b57a481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27455-na-bd33a14f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27455%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d7db7ef31ef0b579b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27454-na-1ccb1f97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27454%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7db7ef31ef0b579af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27447-na-97a95ef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27447%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d7db7ef31ef0b579ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27444-na-ceb30495</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27444%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d7db7ef31ef0b579ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26468-na-7127b81f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26468%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26467-na-ce8864f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26467%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26466-na-879a3dfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26466%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b57260e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26465-na-eb06ed65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26465%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b57260b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26461-na-820b414a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26461%3A%20n%2Fa&amp;severity=high&amp;id=699f6d77b7ef31ef0b572605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26458-na-0057a66e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26458%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26455-na-70e5dbc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26455%3A%20n%2Fa&amp;severity=high&amp;id=699f6d75b7ef31ef0b57259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25770-na-74b9c150</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25770%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6fb7ef31ef0b572210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25768-na-dff973aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25768%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6fb7ef31ef0b57220d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25767-na-e864130d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25767%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6fb7ef31ef0b57220a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25763-na-ac48e2be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25763%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6eb7ef31ef0b5721af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25751-na-098263a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25751%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6eb7ef31ef0b5721a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25410-na-9ae1892d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25410%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571dd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25344-na-5ffab096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25344%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25247-na-cf08dcb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25247%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24401-na-bc98e619</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24401%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5ab7ef31ef0b570a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22873-na-6f335b54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22873%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b57030f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25082-na-e89bee23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25082%3A%20n%2Fa&amp;severity=medium&amp;id=690a475d6d939959c8022d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25081-na-b275fde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25081%3A%20n%2Fa&amp;severity=medium&amp;id=690a475d6d939959c8022d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24721-na-in-na-19815e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24721%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49960-n-a-in-n-a-bf6b88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49960%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9849c4522896dcbf6b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-26-f12892</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48626-vulnerability-in-linux-linux-be5cd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48626%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982ec4522896dcbe5cd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46905-vulnerability-in-linux-linux-bea644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46905%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46904-vulnerability-in-linux-linux-bea63c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46904%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9835c4522896dcbea63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52473-vulnerability-in-linux-linux-be7a7b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52473%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52472-vulnerability-in-linux-linux-be7a77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52472%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=low&amp;id=682d9831c4522896dcbe7a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52471-vulnerability-in-linux-linux-be7a66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52471%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52470-vulnerability-in-linux-linux-be7a47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52470%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52469-vulnerability-in-linux-linux-be7a41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52469%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52468-vulnerability-in-linux-linux-be7a3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52468%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52467-vulnerability-in-linux-linux-be7a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52467%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52465-vulnerability-in-linux-linux-be7a35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52465%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27359-na-5e33e232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27359%3A%20n%2Fa&amp;severity=high&amp;id=699f6d7bb7ef31ef0b576c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27350-na-70d858a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27350%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d7bb7ef31ef0b576c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-02-25-894e39</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-02-25&amp;severity=medium&amp;id=682b68fbd14de609c8894e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-25-f12cf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0243-cwe-918-server-side-request-forgery-ssrf-in-langchain-ai-langchain-ai-langchain-bf6b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0243%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20langchain-ai%20langchain-ai%2Flangchain&amp;severity=medium&amp;id=682d9849c4522896dcbf6b9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26605-vulnerability-in-linux-linux-bdd9d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26605%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26604-vulnerability-in-linux-linux-be4170</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26604%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26603-vulnerability-in-linux-linux-be416a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26603%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe416a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26602-vulnerability-in-linux-linux-be4166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26602%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26601-vulnerability-in-linux-linux-be4155</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26601%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26600-vulnerability-in-linux-linux-be414f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26600%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe414f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1165-cwe-22-improper-limitation-of-a-path-93261d54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1165%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20themefusecom%20Brizy%20%E2%80%93%20Page%20Builder&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1710-cwe-862-missing-authorization-in-unitecms-addon-library-bf6bc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1710%3A%20CWE-862%20Missing%20Authorization%20in%20unitecms%20Addon%20Library&amp;severity=high&amp;id=682d9849c4522896dcbf6bc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1758-cwe-918-server-side-request-forgery--99518e35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1758%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20superfaktura%20SuperFaktura%20WooCommerce&amp;severity=medium&amp;id=699f6d3cb7ef31ef0b56f3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1810-cwe-79-improper-neutralization-of-in-9630c4f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1810%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20eteubert%20Archivist%20%E2%80%93%20Custom%20Archive%20Templates&amp;severity=medium&amp;id=699f6d40b7ef31ef0b56f63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-24-f122e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f122e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26192-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-microsoft-edge-chromium-based-beacc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26192%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d9836c4522896dcbeacc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26188-cwe-357-insufficient-ui-warning-of-dangerous-operations-in-microsoft-microsoft-edge-for-android-beacc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26188%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=682d9836c4522896dcbeacc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21423-cwe-693-protection-mechanism-failure-in-microsoft-microsoft-edge-chromium-based-beacb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21423%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeacb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51393-cwe-770-allocation-of-resources-without-limits-or-throttling-in-silabs-com-ember-znet-sdk-bf6b92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51393%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20silabs.com%20Ember%20ZNet%20SDK&amp;severity=medium&amp;id=682d9849c4522896dcbf6b92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51392-cwe-1240-use-of-a-cryptographic-primitive-with-a-risky-implementation-in-silabs-com-ember-znet-sdk-bf6b8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51392%3A%20CWE-1240%20Use%20of%20a%20Cryptographic%20Primitive%20with%20a%20Risky%20Implementation%20in%20silabs.com%20Ember%20ZNet%20SDK&amp;severity=medium&amp;id=682d9849c4522896dcbf6b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26599-vulnerability-in-linux-linux-be414b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26599%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26598-vulnerability-in-linux-linux-be412b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26598%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe412b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26597-vulnerability-in-linux-linux-be4123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26597%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26596-vulnerability-in-linux-linux-be411b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26596%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe411b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26595-vulnerability-in-linux-linux-be4113</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26595%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52464-vulnerability-in-linux-linux-be7a26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52464%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52463-vulnerability-in-linux-linux-bdd7b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52463%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52462-vulnerability-in-linux-linux-be7a20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52462%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7a20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52461-vulnerability-in-linux-linux-be7a1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52461%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52460-vulnerability-in-linux-linux-be7a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52460%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52459-vulnerability-in-linux-linux-be7a10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52459%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52458-vulnerability-in-linux-linux-be79f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52458%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe79f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52457-vulnerability-in-linux-linux-bdd7b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52457%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52456-vulnerability-in-linux-linux-be79ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52456%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe79ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52455-vulnerability-in-linux-linux-be79e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52455%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe79e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52454-vulnerability-in-linux-linux-be79e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52454%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe79e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52453-vulnerability-in-linux-linux-be79e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52453%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe79e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26594-vulnerability-in-linux-linux-be410b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26594%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe410b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1360-cwe-352-cross-site-request-forgery-c-5ae8852e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1360%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Colibri%20WP&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1362-cwe-352-cross-site-request-forgery-c-3893ca59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1362%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e91a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1361-cwe-352-cross-site-request-forgery-c-6e11f9fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1361%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1590-cwe-79-improper-neutralization-of-in-bf943106</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1590%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20softaculous%20Page%20Builder%3A%20Pagelayer%20%E2%80%93%20Drag%20and%20Drop%20website%20builder&amp;severity=medium&amp;id=699f6d37b7ef31ef0b56f07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26593-vulnerability-in-linux-linux-be4107</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26593%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe4107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0563-cwe-770-allocation-of-resources-with-bebf382e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0563%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20M-Files%20Corporation%20M-Files%20Server&amp;severity=medium&amp;id=699c2930be58cf853b7275e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1778-cwe-862-missing-authorization-in-zes-350fa69e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1778%3A%20CWE-862%20Missing%20Authorization%20in%20zestardtechnologies%20Admin%20side%20data%20storage%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1777-cwe-352-cross-site-request-forgery-c-0de372a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1777%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20zestardtechnologies%20Admin%20side%20data%20storage%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1776-cwe-89-improper-neutralization-of-sp-65947f47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1776%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20zestardtechnologies%20Admin%20side%20data%20storage%20for%20Contact%20Form%207&amp;severity=high&amp;id=699f6d3eb7ef31ef0b56f4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1779-cwe-862-missing-authorization-in-zes-38a534f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1779%3A%20CWE-862%20Missing%20Authorization%20in%20zestardtechnologies%20Admin%20side%20data%20storage%20for%20Contact%20Form%207&amp;severity=medium&amp;id=699f6d3eb7ef31ef0b56f4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1781-cwe-77-command-injection-in-totolink-x6000r-ax3000-bf6bda</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1781%3A%20CWE-77%20Command%20Injection%20in%20Totolink%20X6000R%20AX3000&amp;severity=medium&amp;id=682d9849c4522896dcbf6bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25730-na-b9c756d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25730%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6eb7ef31ef0b572195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25469-na-d3339b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25469%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24310-na-6680ab4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24310%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24309-na-7763336e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24309%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22776-na-5efd1a47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22776%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b57021f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24681-na-3b0bec44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24681%3A%20n%2Fa&amp;severity=critical&amp;id=690a475d6d939959c8022d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-connectwise-screenconnect-attacks-deliver-ma-8906dd96</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ConnectWise%20ScreenConnect%20attacks%20deliver%20malware&amp;severity=medium&amp;id=68359c9d5d5f0974d01f3b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22988-n-a-in-n-a-bf6bef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22988%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9849c4522896dcbf6bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-23-f1273d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f1273d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-connectwise-screenconnect-attacks-deliver-malware-f0dd5c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ConnectWise%20ScreenConnect%20attacks%20deliver%20malware&amp;severity=medium&amp;id=682acdbebbaf20d303f0dd5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-connectwise-screenconnect-attacks-deliver-malware-6e27cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ConnectWise%20ScreenConnect%20attacks%20deliver%20malware&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e27cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1748-cwe-502-deserialization-in-van-der-schaar-lab-autoprognosis-bf6bd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1748%3A%20CWE-502%20Deserialization%20in%20van_der_Schaar%20LAB%20AutoPrognosis&amp;severity=medium&amp;id=682d9849c4522896dcbf6bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26592-vulnerability-in-linux-linux-be4103</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26592%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe4103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26591-vulnerability-in-linux-linux-be40f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26591%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe40f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52452-vulnerability-in-linux-linux-bdd7ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52452%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52451-vulnerability-in-linux-linux-be79dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52451%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe79dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52450-vulnerability-in-linux-linux-be79d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52450%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe79d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52449-vulnerability-in-linux-linux-be79c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52449%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe79c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52448-vulnerability-in-linux-linux-be79c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52448%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe79c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52447-vulnerability-in-linux-linux-be79b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52447%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe79b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52446-vulnerability-in-linux-linux-be79a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52446%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe79a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52445-vulnerability-in-linux-linux-be799c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52445%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe799c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52444-vulnerability-in-linux-linux-be7982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52444%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26590-vulnerability-in-linux-linux-be40e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26590%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe40e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26589-vulnerability-in-linux-linux-be40dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26589%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe40dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26588-vulnerability-in-linux-linux-be40c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26588%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe40c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26587-vulnerability-in-linux-linux-be40c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26587%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe40c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26586-vulnerability-in-linux-linux-be40bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26586%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe40bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52443-vulnerability-in-linux-linux-be797a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52443%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51653-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-dromara-hertzbeat-bf6b96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51653%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20dromara%20hertzbeat&amp;severity=medium&amp;id=682d9849c4522896dcbf6b96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44379-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-baserproject-basercms-bf6b77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44379%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=682d9849c4522896dcbf6b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22393-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-apache-software-foundation-apache-answer-bf6beb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22393%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Apache%20Software%20Foundation%20Apache%20Answer&amp;severity=critical&amp;id=682d9849c4522896dcbf6beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1053-cwe-284-improper-access-control-in-t-c3ed6a9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1053%3A%20CWE-284%20Improper%20Access%20Control%20in%20theeventscalendar%20Event%20Tickets%20and%20Registration&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0903-cwe-79-improper-neutralization-of-in-be59da8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0903%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smub%20User%20Feedback%20%E2%80%93%20Create%20Interactive%20Feedback%20Form%2C%20User%20Surveys%2C%20and%20Polls%20in%20Seconds&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4895-cwe-862-missing-authorization-in-gitlab-gitlab-253fa0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4895%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27283-na-9583a03b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27283%3A%20n%2Fa&amp;severity=high&amp;id=699f6d79b7ef31ef0b573729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26491-na-69432d51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26491%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26490-na-27d6cec7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26490%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26484-na-25ff2187</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26484%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26482-na-e816af58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26482%3A%20n%2Fa&amp;severity=high&amp;id=699f6d77b7ef31ef0b57267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26481-na-a446fc9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26481%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d77b7ef31ef0b572679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26445-na-31e49576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26445%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26352-na-d5952d77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26352%3A%20n%2Fa&amp;severity=high&amp;id=699f6d75b7ef31ef0b572582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26351-na-64b5f83a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26351%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b57257f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26349-na-dd50885d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26349%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b57257b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25876-na-a0be4f16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25876%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b572401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25875-na-497a665a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25875%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b5723fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25874-na-f142e9a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25874%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b5723f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25873-na-2eb87b08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25873%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b5723f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25851-na-cc15e8ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25851%3A%20n%2Fa&amp;severity=high&amp;id=699f6d71b7ef31ef0b57233e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25850-na-fa78b713</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25850%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d71b7ef31ef0b57233a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25828-na-cce6f208</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25828%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d6fb7ef31ef0b572229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25802-na-4ddb8b0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25802%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6fb7ef31ef0b572213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25756-na-700f8e29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25756%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6eb7ef31ef0b5721aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25753-na-cb1e2176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25753%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6eb7ef31ef0b5721a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25748-na-d1bb1fca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25748%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6eb7ef31ef0b5721a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25746-na-db5d189d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25746%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6eb7ef31ef0b57219e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25423-na-8ef1732b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25423%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571de6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25385-na-3deaecf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25385%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25369-na-8761e7ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25369%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25251-na-cb87241e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25251%3A%20n%2Fa&amp;severity=high&amp;id=699f6d63b7ef31ef0b571bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22547-na-b3102e56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22547%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b570117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52161-na-ec59f172</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52161%3A%20n%2Fa&amp;severity=high&amp;id=690a47456d939959c802225b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52160-na-8a88b3e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52160%3A%20n%2Fa&amp;severity=medium&amp;id=690a47456d939959c8022252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23094-n-a-in-n-a-bf6bf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23094%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9849c4522896dcbf6bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26483-n-a-in-n-a-bf6b3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26483%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9849c4522896dcbf6b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-22-752c4d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-22&amp;severity=medium&amp;id=682c7abde3e6de8ceb752c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-22-f11f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/i-soon-anxun-data-leak-in-github-f0c2bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=I-Soon%20%2F%20Anxun%20data%20leak%20in%20Github&amp;severity=low&amp;id=682acdbebbaf20d303f0c2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6477-cwe-266-incorrect-privilege-assignment-in-gitlab-gitlab-bf6b9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6477%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9849c4522896dcbf6b9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0410-cwe-841-improper-enforcement-of-behavioral-workflow-in-gitlab-gitlab-253fe2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0410%3A%20CWE-841%3A%20Improper%20Enforcement%20of%20Behavioral%20Workflow%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1451-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253fe8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1451%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0861-cwe-425-direct-request-forced-browsing-in-gitlab-gitlab-253fe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0861%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3509-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3509%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23654-cwe-918-server-side-request-forgery-ssrf-in-discourse-discourse-ai-bf6b12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23654%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20discourse%20discourse-ai&amp;severity=medium&amp;id=682d9849c4522896dcbf6b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1212-cwe-78-improper-neutralization-of-sp-5adb1e2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1212%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Progress%20Software%20LoadMaster&amp;severity=critical&amp;id=68f7d9b0247d717aace268d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26138-cwe-862-missing-authorization-in-xwikisas-application-licensing-bf6b35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26138%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwikisas%20application-licensing&amp;severity=medium&amp;id=682d9849c4522896dcbf6b35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26585-vulnerability-in-linux-linux-be40b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26585%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe40b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26584-vulnerability-in-linux-linux-be40b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26584%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d982bc4522896dcbe40b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26583-vulnerability-in-linux-linux-bdd9cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26583%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26582-vulnerability-in-linux-linux-be40ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26582%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d982bc4522896dcbe40ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52442-vulnerability-in-linux-linux-be7972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52442%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52441-vulnerability-in-linux-linux-be796a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52441%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe796a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52440-vulnerability-in-linux-linux-be7962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52440%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24837-cwe-352-cross-site-request-forgery-csrf-in-fr-d-ric-gilles-fg-prestashop-to-woocommerce-bf6b16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24837%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Fr%C3%A9d%C3%A9ric%20GILLES%20FG%20PrestaShop%20to%20WooCommerce&amp;severity=medium&amp;id=682d9849c4522896dcbf6b16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24843-cwe-352-cross-site-request-forgery-csrf-in-powerpack-addons-for-elementor-powerpack-pro-for-elementor-bf6b1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24843%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PowerPack%20Addons%20for%20Elementor%20PowerPack%20Pro%20for%20Elementor&amp;severity=medium&amp;id=682d9849c4522896dcbf6b1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1081-cwe-79-improper-neutralization-of-in-82dc6cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1081%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20iberezansky%203D%20FlipBook%20%E2%80%93%20PDF%20Flipbook%20WordPress&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0593-cwe-862-missing-authorization-in-pre-68b3b485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0593%3A%20CWE-862%20Missing%20Authorization%20in%20presstigers%20Simple%20Job%20Board&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fe18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42848-processing-a-maliciously-crafted-im-80f33bf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42848%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20heap%20corruption%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a554ca730e5a3d9d77d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42873-an-app-may-be-able-to-execute-arbit-6d6fcf9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42873%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a554ea730e5a3d9d782b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42853-an-app-may-be-able-to-access-user-s-ed649b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42853%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ca730e5a3d9d77d0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42823-an-app-may-be-able-to-access-user-s-6ebab845</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42823%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a554ba730e5a3d9d779cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42835-an-attacker-may-be-able-to-access-u-d70a48b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42835%3A%20An%20attacker%20may%20be%20able%20to%20access%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ba730e5a3d9d779ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42858-an-app-may-be-able-to-access-user-s-dd8b0a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42858%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ca730e5a3d9d77d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42878-an-app-may-be-able-to-access-sensit-9d47792a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42878%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ea730e5a3d9d782cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42839-an-app-may-be-able-to-access-sensit-21eff69e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42839%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20tvOS&amp;severity=medium&amp;id=690a554ca730e5a3d9d77cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42946-an-app-may-be-able-to-leak-sensitiv-91e6b6e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42946%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20tvOS&amp;severity=high&amp;id=690a5554a730e5a3d9d7a2eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42855-an-attacker-with-physical-access-ma-874c452b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42855%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20silently%20persist%20an%20Apple%20ID%20on%20an%20erased%20device%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a554ca730e5a3d9d77d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42951-a-user-may-be-unable-to-delete-brow-031c26ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42951%3A%20A%20user%20may%20be%20unable%20to%20delete%20browsing%20history%20items%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5554a730e5a3d9d7a300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42838-an-app-may-be-able-to-execute-arbit-41e890da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42838%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20out%20of%20its%20sandbox%20or%20with%20certain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ba730e5a3d9d779fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42859-an-app-may-be-able-to-modify-protec-e57da65a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42859%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ca730e5a3d9d77d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42834-an-app-may-be-able-to-access-sensit-23917cfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42834%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ba730e5a3d9d779e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42860-an-app-may-be-able-to-modify-protec-48c6a879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42860%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ca730e5a3d9d77d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42952-an-app-with-root-privileges-may-be--ee2d1015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42952%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a5554a730e5a3d9d7a304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42840-an-app-may-be-able-to-access-user-s-442345aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42840%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ca730e5a3d9d77cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42928-an-app-may-be-able-to-gain-elevated-01310d21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42928%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5553a730e5a3d9d78a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42953-an-app-may-be-able-to-access-sensit-7a5df230</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42953%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20tvOS&amp;severity=medium&amp;id=690a5554a730e5a3d9d7a30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42945-an-app-may-gain-unauthorized-access-4f0a7227</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42945%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Bluetooth%20in%20Apple%20macOS&amp;severity=critical&amp;id=690a5554a730e5a3d9d7a2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42877-an-app-may-be-able-to-modify-protec-89bb34fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42877%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ea730e5a3d9d782c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42836-an-attacker-may-be-able-to-access-c-969686e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42836%3A%20An%20attacker%20may%20be%20able%20to%20access%20connected%20network%20volumes%20mounted%20in%20the%20home%20directory%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ba730e5a3d9d779f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42942-a-malicious-app-may-be-able-to-gain-d223c08a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42942%3A%20A%20malicious%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5554a730e5a3d9d7a2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42939-a-users-private-browsing-activity-m-0782e571</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42939%3A%20A%20user&apos;s%20private%20browsing%20activity%20may%20be%20unexpectedly%20saved%20in%20the%20App%20Privacy%20Report%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=690a5554a730e5a3d9d7a2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42889-an-app-may-be-able-to-bypass-certai-116cfd05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42889%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ea730e5a3d9d782ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1562-cwe-862-missing-authorization-in-wes-3c56bee4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1562%3A%20CWE-862%20Missing%20Authorization%20in%20westerndeal%20WooCommerce%20Google%20Sheet%20Connector&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56ef8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1501-cwe-352-cross-site-request-forgery-c-6e5549f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1501%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webfactory%20Database%20Reset&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1108-cwe-862-missing-authorization-in-des-80afe584</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1108%3A%20CWE-862%20Missing%20Authorization%20in%20desertsnowman%20Plugin%20Groups&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26269-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-liferay-portal-bf6b39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682d9849c4522896dcbf6b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25147-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-liferay-portal-bf6b1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25147%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682d9849c4522896dcbf6b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26310-na-23e2507d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26310%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b572492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25896-na-4e86f754</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25896%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b57246b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25895-na-5c7aaa74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25895%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d73b7ef31ef0b572468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25894-na-49ed57cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25894%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d73b7ef31ef0b572413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25893-na-6ca2657c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25893%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d73b7ef31ef0b572410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25892-na-f5ef612e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25892%3A%20n%2Fa&amp;severity=high&amp;id=699f6d73b7ef31ef0b57240d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25891-na-800e557d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25891%3A%20n%2Fa&amp;severity=high&amp;id=699f6d73b7ef31ef0b57240a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25461-na-aefc127a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25461%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25381-na-530eca12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25381%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25288-na-b8d51e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25288%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d63b7ef31ef0b571c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24478-na-21a3640f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24478%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5cb7ef31ef0b570ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22778-na-83bfdd1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22778%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4db7ef31ef0b570223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22220-na-b9e8a0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22220%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d49b7ef31ef0b570033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24479-na-546810e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24479%3A%20n%2Fa&amp;severity=high&amp;id=690a475b6d939959c8022d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24476-na-a0f4e65d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24476%3A%20n%2Fa&amp;severity=high&amp;id=690a475b6d939959c8022d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25897-n-a-in-n-a-bf6b2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25897%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9849c4522896dcbf6b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-21-f13033</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f13033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26135-cwe-346-origin-validation-error-in-ylianst-meshcentral-bf6b31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26135%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20Ylianst%20MeshCentral&amp;severity=medium&amp;id=682d9849c4522896dcbf6b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1058-cwe-80-improper-neutralization-of-sc-4675a4df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1058%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1043-cwe-285-improper-authorization-in-mo-95ca65db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1043%3A%20CWE-285%20Improper%20Authorization%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1171-cwe-79-improper-neutralization-of-in-241420ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1171%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1090-cwe-862-missing-authorization-in-imagerecycle-imagerecycle-pdf-image-compression-bf6adc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1090%3A%20CWE-862%20Missing%20Authorization%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=682d9849c4522896dcbf6adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1172-cwe-79-improper-neutralization-of-in-a159b3ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1172%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1218-cwe-862-missing-authorization-in-kal-7e361632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1218%3A%20CWE-862%20Missing%20Authorization%20in%20kaliforms%20Contact%20Form%20builder%20with%20drag%20%26%20drop%20for%20WordPress%20%E2%80%93%20Kali%20Forms&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1133-cwe-862-missing-authorization-in-the-e00a0ca6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1133%3A%20CWE-862%20Missing%20Authorization%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1294-cwe-284-improper-access-control-in-s-b395ee12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1294%3A%20CWE-284%20Improper%20Access%20Control%20in%20sunshinephotocart%20Sunshine%20Photo%20Cart%3A%20Free%20Client%20Galleries%20for%20Photographers&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0838-cwe-80-improper-neutralization-of-sc-a44adbbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0838%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0516-cwe-352-cross-site-request-forgery-c-ef8eb450</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0516%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0604-cwe-80-improper-neutralization-of-sc-f5892df0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0604%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20bradvin%20Best%20WordPress%20Gallery%20Plugin%20%E2%80%93%20FooGallery&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0821-cwe-80-improper-neutralization-of-sc-2ff88c65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0821%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20algoritmika%20Cost%20of%20Goods%20Sold%20(COGS)%3A%20Cost%20%26%20Profit%20Calculator%20for%20WooCommerce&amp;severity=medium&amp;id=699f6de5b7ef31ef0b5904ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1317-cwe-89-improper-neutralization-of-sp-988babbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1317%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=high&amp;id=699f6d29b7ef31ef0b56e7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1389-cwe-862-missing-authorization-in-iovamihai-paid-membership-subscriptions-effortless-memberships-recurring-payments-content-restriction-bf1094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1389%3A%20CWE-862%20Missing%20Authorization%20in%20iovamihai%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=682d9840c4522896dcbf1094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0984-cwe-862-missing-authorization-in-ima-c71ebd0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0984%3A%20CWE-862%20Missing%20Authorization%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1336-cwe-352-cross-site-request-forgery-c-e62e0657</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1336%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0658-cwe-79-improper-neutralization-of-in-bf67bab1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0658%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20f1logic%20Insert%20PHP%20Code%20Snippet&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59022b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0590-cwe-352-cross-site-request-forgery-c-b36a1abd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0590%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20sammartin%20Microsoft%20Clarity&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1445-cwe-79-improper-neutralization-of-in-166ca6bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1445%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20malihu%20Page%20scroll%20to%20id&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1054-cwe-79-improper-neutralization-of-in-0d4cf767</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1054%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pluggabl%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0702-cwe-862-missing-authorization-in-oli-ec87053d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0702%3A%20CWE-862%20Missing%20Authorization%20in%20oliverpos%20Oliver%20POS%20%E2%80%93%20A%20WooCommerce%20Point%20of%20Sale%20(POS)&amp;severity=high&amp;id=699f6de3b7ef31ef0b59033d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1335-cwe-352-cross-site-request-forgery-c-268c4344</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1335%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0512-cwe-352-cross-site-request-forgery-c-87b16852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0512%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1206-cwe-89-improper-neutralization-of-sp-df7ca6a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1206%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=high&amp;id=699f6d24b7ef31ef0b56e5ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0514-cwe-352-cross-site-request-forgery-c-aca9f98c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0514%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1276-cwe-80-improper-neutralization-of-sc-b5e97d9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1276%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1288-cwe-284-improper-access-control-in-m-9580156b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1288%3A%20CWE-284%20Improper%20Access%20Control%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0656-cwe-80-improper-neutralization-of-sc-ffe83c7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0656%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpexpertsio%20Password%20Protected%20%E2%80%93%20Ultimate%20Plugin%20to%20Password%20Protect%20Your%20WordPress%20Content%20with%20Ease&amp;severity=medium&amp;id=699f6de1b7ef31ef0b590105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1322-cwe-862-missing-authorization-in-wpw-e0e05f5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1322%3A%20CWE-862%20Missing%20Authorization%20in%20wpwax%20Directorist%20%E2%80%93%20WordPress%20Business%20Directory%20Plugin%20with%20Classified%20Ads%20Listings&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1070-cwe-80-improper-neutralization-of-sc-d5a4d808</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1070%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0515-cwe-352-cross-site-request-forgery-c-725d2b4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0515%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0978-cwe-284-improper-access-control-in-d-cfaeac5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0978%3A%20CWE-284%20Improper%20Access%20Control%20in%20dgewirtz%20My%20Private%20Site&amp;severity=medium&amp;id=699f6de9b7ef31ef0b590911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0621-cwe-80-improper-neutralization-of-sc-e66ea5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0621%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20davidoffneal%20Simple%20Share%20Buttons%20Adder&amp;severity=medium&amp;id=699f6de0b7ef31ef0b59001d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1089-cwe-862-missing-authorization-in-ima-fb75a920</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1089%3A%20CWE-862%20Missing%20Authorization%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1586-cwe-80-improper-neutralization-of-sc-3a668258</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1586%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20magazine3%20Schema%20%26%20Structured%20Data%20for%20WP%20%26%20AMP&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56effd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1496-cwe-80-improper-neutralization-of-sc-9d8bd6d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1496%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20marceljm%20Featured%20Image%20from%20URL%20(FIFU)&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56edfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1217-cwe-862-missing-authorization-in-kaliforms-contact-form-builder-with-drag-drop-for-wordpress-kali-forms-bf1090</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1217%3A%20CWE-862%20Missing%20Authorization%20in%20kaliforms%20Contact%20Form%20builder%20with%20drag%20%26%20drop%20for%20WordPress%20%E2%80%93%20Kali%20Forms&amp;severity=high&amp;id=682d9840c4522896dcbf1090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1282-cwe-79-improper-neutralization-of-in-371d71f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1282%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ironikus%20Email%20Encoder%20%E2%80%93%20Protect%20Email%20Addresses%20and%20Phone%20Numbers&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1235-cwe-79-improper-neutralization-of-in-cddcf9ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1235%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1408-cwe-79-improper-neutralization-of-in-84dda590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1408%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1472-cwe-284-improper-access-control-in-f-76603b16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1472%3A%20CWE-284%20Improper%20Access%20Control%20in%20florent73%20WP%20Maintenance&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1411-cwe-79-improper-neutralization-of-in-31f86b72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1411%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56eb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1349-cwe-79-improper-neutralization-of-in-0b27e3b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1349%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1338-cwe-352-cross-site-request-forgery-c-bf3889a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1338%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1277-cwe-79-improper-neutralization-of-in-5d8a8545</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1277%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oceanwp%20Ocean%20Extra&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1519-cwe-79-improper-neutralization-of-in-0b454db9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1519%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56eea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1425-cwe-80-improper-neutralization-of-sc-8c7f3716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1425%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20wpdevteam%20EmbedPress%20%E2%80%93%20Embed%20PDF%2C%20Google%20Docs%2C%20Vimeo%2C%20Wistia%2C%20Embed%20YouTube%20Videos%2C%20Audios%2C%20Maps%20%26%20Embed%20Any%20Documents%20in%20Gutenberg%20%26%20Elementor&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ebff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1570-cwe-80-improper-neutralization-of-sc-c8217cc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1570%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d35b7ef31ef0b56efe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1492-cwe-284-improper-access-control-in-wpify-wpify-woo-czech-bf6aff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1492%3A%20CWE-284%20Improper%20Access%20Control%20in%20wpify%20WPify%20Woo%20Czech&amp;severity=medium&amp;id=682d9849c4522896dcbf6aff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1475-cwe-284-improper-access-control-in-a-bd7a2590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1475%3A%20CWE-284%20Improper%20Access%20Control%20in%20awordpresslife%20Coming%20Soon%20Maintenance%20Mode&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ed35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0506-cwe-80-improper-neutralization-of-sc-37ae5c82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0506%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20elemntor%20Elementor%20Website%20Builder%20%E2%80%93%20More%20than%20Just%20a%20Page%20Builder&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1044-cwe-284-improper-access-control-in-i-50c17342</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1044%3A%20CWE-284%20Improper%20Access%20Control%20in%20ivole%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1236-cwe-79-improper-neutralization-of-in-2322b77a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1236%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0620-cwe-200-information-exposure-in-yury-4b30fc61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0620%3A%20CWE-200%20Information%20Exposure%20in%20yuryonfolio%20PPWP%20%E2%80%93%20Password%20Protect%20Pages&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0513-cwe-352-cross-site-request-forgery-c-038b03c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0513%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1091-cwe-862-missing-authorization-in-ima-5a8be3fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1091%3A%20CWE-862%20Missing%20Authorization%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1340-cwe-862-missing-authorization-in-web-339fc883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1340%3A%20CWE-862%20Missing%20Authorization%20in%20webfactory%20Login%20Lockdown%20%E2%80%93%20Protect%20Login%20Form&amp;severity=medium&amp;id=699f6d2bb7ef31ef0b56e8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1337-cwe-862-missing-authorization-in-son-ae1d8aa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1337%3A%20CWE-862%20Missing%20Authorization%20in%20sonalsinha21%20SKT%20Page%20Builder&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6565-cwe-922-insecure-storage-of-sensitive-information-in-infinitewp-infinitewp-client-bf6ad8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6565%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20infinitewp%20InfiniteWP%20Client&amp;severity=medium&amp;id=682d9849c4522896dcbf6ad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1339-cwe-352-cross-site-request-forgery-c-f34c7fa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1339%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0379-cwe-352-cross-site-request-forgery-c-f150a175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0379%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smashballoon%20Custom%20Twitter%20Feeds%20%E2%80%93%20A%20Tweets%20Widget%20or%20X%20Feed%20Widget&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0438-cwe-80-improper-neutralization-of-sc-9ea8023a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0438%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20thehappymonster%20Happy%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0442-cwe-79-improper-neutralization-of-in-9341fca7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0442%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fc03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1128-cwe-74-improper-neutralization-of-sp-266209cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1128%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20themeum%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1448-cwe-79-improper-neutralization-of-in-07fc4ed6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20heateor%20Social%20Sharing%20Plugin%20%E2%80%93%20Sassy%20Social%20Share&amp;severity=medium&amp;id=699f6d31b7ef31ef0b56ec9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1318-cwe-862-missing-authorization-in-themeisle-rss-aggregator-by-feedzy-feed-to-post-autoblogging-news-youtube-video-feeds-aggregator-bf6ae0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1318%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=682d9849c4522896dcbf6ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0983-cwe-862-missing-authorization-in-ima-496310e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0983%3A%20CWE-862%20Missing%20Authorization%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6deab7ef31ef0b5909cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1447-cwe-79-improper-neutralization-of-in-d3d45512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1447%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20athemes%20Sydney%20Toolbox&amp;severity=medium&amp;id=699f6d2fb7ef31ef0b56ec21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1390-cwe-862-missing-authorization-in-iov-c7d44c90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1390%3A%20CWE-862%20Missing%20Authorization%20in%20iovamihai%20Paid%20Membership%20Subscriptions%20%E2%80%93%20Effortless%20Memberships%2C%20Recurring%20Payments%20%26%20Content%20Restriction&amp;severity=medium&amp;id=699f6d2db7ef31ef0b56eab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0602-cwe-80-improper-neutralization-of-sc-02ed0e6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0602%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20jeffparker%20YARPP%20%E2%80%93%20Yet%20Another%20Related%20Posts%20Plugin&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1242-cwe-80-improper-neutralization-of-sc-c405dc66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1242%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20leap13%20Premium%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6d27b7ef31ef0b56e699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0792-cwe-79-improper-neutralization-of-in-34394c78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0792%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6de5b7ef31ef0b59049c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1334-cwe-352-cross-site-request-forgery-c-6a3ded07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1334%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20imagerecycle%20ImageRecycle%20pdf%20%26%20image%20compression&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0616-cwe-200-information-exposure-in-patr-0118d8ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0616%3A%20CWE-200%20Information%20Exposure%20in%20patrickposner%20Passster%20%E2%80%93%20Password%20Protect%20Pages%20and%20Content&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52439-vulnerability-in-linux-linux-bdd7a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52439%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52438-vulnerability-in-linux-linux-be795a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52438%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe795a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52436-vulnerability-in-linux-linux-be7956</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52436%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52435-vulnerability-in-linux-linux-be7952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52435%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9831c4522896dcbe7952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52434-vulnerability-in-linux-linux-be7930</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52434%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9831c4522896dcbe7930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48220-cwe-672-operation-on-a-resource-after-expiration-or-release-in-decidim-decidim-bf1040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48220%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20decidim%20decidim&amp;severity=medium&amp;id=682d9840c4522896dcbf1040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22097-cwe-415-double-free-in-the-biosig-p-9b5c9d4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22097%3A%20CWE-415%3A%20Double%20Free%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a474d6d939959c80223ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23305-cwe-787-out-of-bounds-write-in-the--9e5887c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23305%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a475b6d939959c8022cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23809-cwe-415-double-free-in-the-biosig-p-c6934211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23809%3A%20CWE-415%3A%20Double%20Free%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a475b6d939959c8022d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21795-cwe-122-heap-based-buffer-overflow--8249be58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21795%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a474b6d939959c8022397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21812-cwe-190-integer-overflow-or-wraparo-b1302cca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21812%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a474b6d939959c802239c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23313-cwe-191-integer-underflow-wrap-or-w-75fca81a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23313%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a475b6d939959c8022d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23310-cwe-825-expired-pointer-dereference-16081c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23310%3A%20CWE-825%3A%20Expired%20Pointer%20Dereference%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a475b6d939959c8022d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23606-cwe-131-incorrect-calculation-of-bu-b375c773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23606%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20The%20Biosig%20Project%20libbiosig&amp;severity=critical&amp;id=690a475b6d939959c8022d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39541-cwe-126-buffer-over-read-in-silicon-cfaef973</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39541%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=medium&amp;id=690a439d6d939959c8fddb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39540-cwe-126-buffer-over-read-in-silicon-64cb8a2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39540%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=medium&amp;id=690a439d6d939959c8fddb13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38562-cwe-415-double-free-in-weston-embed-bb3e538c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38562%3A%20CWE-415%3A%20Double%20Free%20in%20Weston%20Embedded%20uC-TCP-IP&amp;severity=high&amp;id=690a439d6d939959c8fddaf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45318-cwe-122-heap-based-buffer-overflow-in-silicon-labs-gecko-platform-bf103c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45318%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=critical&amp;id=682d9840c4522896dcbf103c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26581-vulnerability-in-linux-linux-bdd9c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26581%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=682d9821c4522896dcbdd9c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52433-vulnerability-in-linux-linux-bdd7a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52433%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9821c4522896dcbdd7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24794-cwe-416-use-after-free-in-imaging-d-873c8fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24794%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imaging%20Data%20Commons%20libdicom&amp;severity=high&amp;id=690a475d6d939959c8022d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24793-cwe-416-use-after-free-in-imaging-d-07ef70da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24793%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Imaging%20Data%20Commons%20libdicom&amp;severity=high&amp;id=690a475d6d939959c8022d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25605-cwe-276-incorrect-default-permissions-in-liferay-portal-bf1077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25605%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682d9840c4522896dcbf1077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1559-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jackdewey-link-library-bf104e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1559%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jackdewey%20Link%20Library&amp;severity=medium&amp;id=682d9840c4522896dcbf104e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1510-cwe-79-improper-neutralization-of-in-7c8b3f51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1510%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gn_themes%20WP%20Shortcodes%20Plugin%20%E2%80%94%20Shortcodes%20Ultimate&amp;severity=medium&amp;id=699f6d33b7ef31ef0b56ee98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21896-vulnerability-in-nodejs-node-bed5c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21896%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21890-vulnerability-in-nodejs-node-bed5bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21890%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21891-vulnerability-in-nodejs-node-bed5c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21891%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22019-vulnerability-in-nodejs-node-bed5d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22019%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21892-vulnerability-in-nodejs-node-bed5c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21892%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25366-na-2afb7e6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25366%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25274-na-0407a280</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25274%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25199-na-5602e266</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25199%3A%20n%2Fa&amp;severity=high&amp;id=699f6d61b7ef31ef0b571adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25198-na-722b5855</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25198%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d61b7ef31ef0b571ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25197-na-e281547b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25197%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d61b7ef31ef0b571ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25196-na-efaa9300</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25196%3A%20n%2Fa&amp;severity=low&amp;id=699f6d61b7ef31ef0b571acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24474-na-b1136fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24474%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5cb7ef31ef0b570adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23758-na-fd6fc1c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23758%3A%20n%2Fa&amp;severity=high&amp;id=699f6d53b7ef31ef0b57059b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22824-na-ea9f5ec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22824%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4db7ef31ef0b570285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25262-na-13faef5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25262%3A%20n%2Fa&amp;severity=high&amp;id=6909261ffe7723195e0b46ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25260-n-a-in-n-a-bf1073</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25260%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf1073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-29050-n-a-in-n-a-bf0fce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-29050%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf0fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-02-20-89eb55</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-02-20&amp;severity=medium&amp;id=682b68fdd14de609c889eb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-20-f12662</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f12662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1635-uncontrolled-resource-consumption-befa69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1635%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=682d983ec4522896dcbefa69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1638-cwe-20-improper-input-validation-in-zephyrproject-rtos-zephyr-bf1052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1638%3A%20CWE-20%20Improper%20Input%20Validation%20in%20zephyrproject-rtos%20Zephyr&amp;severity=medium&amp;id=682d9840c4522896dcbf1052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25983-authorization-bypass-through-user-c-4fe705b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25983%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key&amp;severity=low&amp;id=699f6d73b7ef31ef0b572486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25982-cross-site-request-forgery-csrf-bf107b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25982%3A%20Cross-Site%20Request%20Forgery%20(CSRF)&amp;severity=medium&amp;id=682d9840c4522896dcbf107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25981-improper-access-control-53b86ad0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25981%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=699f6d73b7ef31ef0b572480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25980-improper-access-control-e6c96f05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25980%3A%20Improper%20Access%20Control&amp;severity=medium&amp;id=699f6d73b7ef31ef0b57247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25979-improper-handling-of-parameters-fd821712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25979%3A%20Improper%20Handling%20of%20Parameters&amp;severity=medium&amp;id=699f6d73b7ef31ef0b572474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25978-uncontrolled-resource-consumption-f281fcc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25978%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=high&amp;id=699f6d73b7ef31ef0b57246e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25710-cwe-835-loop-with-unreachable-exit--e4e197b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25710%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20Compress&amp;severity=high&amp;id=690a2de7f0ba78a050535f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26328-na-1db22c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26328%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b57250c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26327-na-f9048640</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26327%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d75b7ef31ef0b572508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-backmydata-ransomware-indicators-of-compromi-afbb6617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Backmydata%20Ransomware%20Indicators%20of%20Compromise%20(IOCs)%20-%20alerts%20-%20dnsc.ro&amp;severity=medium&amp;id=68359c9e5d5f0974d01fbd6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-19-f1205c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f1205c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-backmydata-ransomware-indicators-of-compromise-iocs-alerts-dnsc-ro-f0dd85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Backmydata%20Ransomware%20Indicators%20of%20Compromise%20(IOCs)%20-%20alerts%20-%20dnsc.ro&amp;severity=medium&amp;id=682acdbebbaf20d303f0dd85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52370-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-huawei-harmonyos-bf1044</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52370%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682d9840c4522896dcbf1044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-18-f12c72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0610-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-enartia-piraeus-bank-woocommerce-payment-gateway-bf104a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0610%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20enartia%20Piraeus%20Bank%20WooCommerce%20Payment%20Gateway&amp;severity=critical&amp;id=682d9840c4522896dcbf104a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1512-cwe-89-improper-neutralization-of-sp-676b64bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1512%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20stylemix%20MasterStudy%20LMS%20WordPress%20Plugin%20%E2%80%93%20for%20Online%20Courses%20and%20Education&amp;severity=critical&amp;id=699f6d33b7ef31ef0b56ee9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21494-authentication-bypass-by-spoofing-in-github-com-greenpau-caddy-security-bf106b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21494%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20github.com%2Fgreenpau%2Fcaddy-security&amp;severity=medium&amp;id=682d9840c4522896dcbf106b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21497-open-redirect-in-githubcomgreenpauc-dd4a3b0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21497%3A%20Open%20Redirect%20in%20github.com%2Fgreenpau%2Fcaddy-security&amp;severity=medium&amp;id=69a710d4d1a09e29cb5bfd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20984-difficult-to-exploit-vulnerability--f3749a52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20984%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474b6d939959c8022393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20982-easily-exploitable-vulnerability-al-1dd534c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20982%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474b6d939959c802238f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20978-easily-exploitable-vulnerability-al-261f9ba3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20978%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474b6d939959c802238b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20976-easily-exploitable-vulnerability-al-8bbde520</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20976%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474b6d939959c8022387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20974-easily-exploitable-vulnerability-al-e9cae999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20974%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c8022378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20972-easily-exploitable-vulnerability-al-a330ced5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20972%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c8022374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20970-easily-exploitable-vulnerability-al-a43b1774</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20970%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c8022370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20968-difficult-to-exploit-vulnerability--c727406e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20968%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c802236c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20966-easily-exploitable-vulnerability-al-db9da3f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20966%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c8022368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20964-difficult-to-exploit-vulnerability--01aee877</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20964%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c8022364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20962-easily-exploitable-vulnerability-al-566b2fb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20962%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c8022360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20960-easily-exploitable-vulnerability-al-9dc09e78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20960%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=690a474a6d939959c802235c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20953-easily-exploitable-vulnerability-al-26ea6578</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20953%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Agile%20PLM.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Agile%20PLM.%20in%20Oracle%20Corporation%20Agile%20PLM%20Framework&amp;severity=high&amp;id=68f7d9b1247d717aace26920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20945-difficult-to-exploit-vulnerability--737cc95d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20945%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=medium&amp;id=69092618fe7723195e0b37d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20925-difficult-to-exploit-vulnerability--fdd0b351</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20925%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=low&amp;id=690a474a6d939959c8022358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20923-difficult-to-exploit-vulnerability--184864c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20923%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=low&amp;id=690a474a6d939959c8022354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20921-difficult-to-exploit-vulnerability--68180edd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20921%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=medium&amp;id=69092618fe7723195e0b37ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20919-difficult-to-exploit-vulnerability--6c1606c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20919%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=medium&amp;id=69092618fe7723195e0b37ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25298-na-8e8fc90f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25298%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25297-na-e89161ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25297%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d63b7ef31ef0b571c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22727-na-99c1f84b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22727%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4db7ef31ef0b570211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-17-f12a6d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21984-cwe-79-in-netapp-storagegrid-bf106f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21984%3A%20CWE-79%20in%20NetApp%20StorageGRID&amp;severity=medium&amp;id=682d9840c4522896dcbf106f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25466-na-aa5b8c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25466%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25415-na-beb499c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25415%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571ddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25320-na-74a548a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25320%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d65b7ef31ef0b571c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25083-na-8e33129e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25083%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5fb7ef31ef0b570c79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24377-na-975e6e03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24377%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b570a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22854-na-bfb21632</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22854%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4db7ef31ef0b57028d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-16-f12894</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-exercise-phishing-targeting-different-organisation-in-benelux-cybersecurity-company-pistachio-f0c2b9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=(fake%3F%20exercise)%20Phishing%20targeting%20different%20organisation%20in%20Benelux%20(%22cybersecurity%22%20company%20Pistachio)&amp;severity=low&amp;id=682acdbebbaf20d303f0c2b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6937-cwe-20-improper-input-validation-in-wolfssl-wolfssl-bf0f76</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6937%3A%20CWE-20%20Improper%20Input%20Validation%20in%20wolfSSL%20wolfSSL&amp;severity=medium&amp;id=682d9840c4522896dcbf0f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6255-cwe-798-use-of-hard-coded-credentials-in-utarit-information-technologies-solipay-mobile-app-bf0f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6255%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Utarit%20Information%20Technologies%20SoliPay%20Mobile%20App&amp;severity=medium&amp;id=682d9840c4522896dcbf0f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23113-execute-unauthorized-code-or-comman-6bcb519b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23113%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSwitchManager&amp;severity=critical&amp;id=68f7d9b2247d717aace26992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20720-improper-neutralization-of-special--36d07442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20720%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20Adobe%20Commerce&amp;severity=critical&amp;id=694197f79050fe85080b12be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32462-cwe-20-improper-input-validation-in-dell-dell-smartfabric-os10-bf0f35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32462%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20Dell%20SmartFabric%20OS10&amp;severity=medium&amp;id=682d9840c4522896dcbf0f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20733-improper-input-validation-cwe-20-in-adobe-acrobat-reader-bf0f82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20733%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9840c4522896dcbf0f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0353-cwe-269-improper-privilege-managemen-b3afb5c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0353%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ESET%2C%20spol.%20s%20r.o.%20ESET%20NOD32%20Antivirus&amp;severity=high&amp;id=6939cd32c9771d4f433dddae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0708-cwe-200-information-exposure-in-fatc-ed98c96e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0708%3A%20CWE-200%20Information%20Exposure%20in%20fatcatapps%20Landing%20Page%20Cat%20%E2%80%93%20Coming%20Soon%20Page%2C%20Maintenance%20Page%20%26%20Squeeze%20Pages&amp;severity=medium&amp;id=699f6de4b7ef31ef0b5903b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1488-incorrect-default-permissions-efb6eb14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1488%3A%20Incorrect%20Default%20Permissions&amp;severity=high&amp;id=69135a44b36faa5b6c0e5fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23088-vulnerability-in-freebsd-freebsd-bf0edc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23088%3A%20Vulnerability%20in%20FreeBSD%20FreeBSD&amp;severity=critical&amp;id=682d9840c4522896dcbf0edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25502-na-9806cdcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25502%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d68b7ef31ef0b571ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25373-na-a9061988</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25373%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24386-na-d1956644</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24386%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b570a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24256-na-c1f3b508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24256%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d58b7ef31ef0b5708f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23674-na-bae5ff5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23674%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d51b7ef31ef0b5704e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-15-f11fdc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48733-vulnerability-in-canonical-ltd-ubuntu-edk-ii-bd853a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48733%3A%20Vulnerability%20in%20Canonical%20Ltd.%20Ubuntu%20EDK%20II&amp;severity=medium&amp;id=682d9819c4522896dcbd853a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1367-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tenable-security-center-bebec9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1367%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tenable%20Security%20Center&amp;severity=high&amp;id=682d9838c4522896dcbebec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25618-cwe-287-improper-authentication-in-mastodon-mastodon-bd6d2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25618%3A%20CWE-287%3A%20Improper%20Authentication%20in%20mastodon%20mastodon&amp;severity=medium&amp;id=682d9816c4522896dcbd6d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50927-cwe-125-out-of-bounds-read-in-contiki-ng-contiki-ng-bf0f3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50927%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9840c4522896dcbf0f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0010-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-palo-alto-networks-pan-os-bf0f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0010%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Palo%20Alto%20Networks%20PAN-OS&amp;severity=medium&amp;id=682d9840c4522896dcbf0f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0568-cwe-287-improper-authentication-in-schneider-electric-harmony-control-relay-rmnf22tb30-bd853e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0568%3A%20CWE-287%20Improper%20Authentication%20in%20Schneider%20Electric%20Harmony%20Control%20Relay%20RMNF22TB30&amp;severity=high&amp;id=682d9819c4522896dcbd853e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6409-cwe-798-use-of-hard-coded-credentials-in-schneider-electric-ecostruxure-control-expert-bd70c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6409%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Schneider%20Electric%20EcoStruxure%20Control%20Expert&amp;severity=high&amp;id=682d9817c4522896dcbd70c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24990-cwe-416-use-after-free-in-f5-nginx-plus-bd8542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24990%3A%20CWE-416%20Use%20After%20Free%20in%20F5%20NGINX%20Plus&amp;severity=high&amp;id=682d9819c4522896dcbd8542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24989-cwe-476-null-pointer-dereference-in-f5-nginx-plus-bd6dd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24989%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20NGINX%20Plus&amp;severity=high&amp;id=682d9816c4522896dcbd6dd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23805-cwe-131-incorrect-calculation-of-buffer-size-in-f5-big-ip-bd6dcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23805%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9816c4522896dcbd6dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21789-cwe-772-missing-release-of-resource-after-effective-lifetime-in-f5-big-ip-bf0f86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21789%3A%20CWE-772%20Missing%20Release%20of%20Resource%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9840c4522896dcbf0f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22093-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-f5-big-ip-bebf8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22093%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9838c4522896dcbebf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21782-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-f5-big-ip-bd6dab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21782%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9816c4522896dcbd6dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46186-cwe-425-direct-request-forced-browsing-in-ibm-jazz-for-service-management-bd8506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46186%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=medium&amp;id=682d9819c4522896dcbd8506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24591-escalation-of-privilege-in-intel-r-binary-configuration-tool-software-bf0f2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24591%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Binary%20Configuration%20Tool%20software&amp;severity=medium&amp;id=682d9840c4522896dcbf0f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25073-denial-of-service-in-intel-r-dsa-software-bd6e7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25073%3A%20denial%20of%20service%20in%20Intel(R)%20DSA%20software&amp;severity=medium&amp;id=682d9816c4522896dcbd6e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22311-escalation-of-privilege-in-intel-r-optane-tm-pmem-100-series-management-software-bd6e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22311%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Optane(TM)%20PMem%20100%20Series%20Management%20Software&amp;severity=medium&amp;id=682d9816c4522896dcbd6e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25174-escalation-of-privilege-in-intel-r-chipset-driver-software-bd6e82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25174%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Chipset%20Driver%20Software&amp;severity=medium&amp;id=682d9816c4522896dcbd6e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24589-escalation-of-privilege-in-intel-r-thunderbolt-tm-dch-drivers-for-windows-bd6e63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24589%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Thunderbolt(TM)%20DCH%20drivers%20for%20Windows&amp;severity=medium&amp;id=682d9816c4522896dcbd6e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24481-escalation-of-privilege-in-intel-r-thunderbolt-tm-dch-drivers-for-windows-bd8502</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24481%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Thunderbolt(TM)%20DCH%20drivers%20for%20Windows&amp;severity=medium&amp;id=682d9819c4522896dcbd8502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24542-escalation-of-privilege-in-intel-r-thunderbolt-tm-dch-drivers-for-windows-bd6e5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24542%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Thunderbolt(TM)%20DCH%20drivers%20for%20Windows&amp;severity=medium&amp;id=682d9816c4522896dcbd6e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22342-escalation-of-privilege-in-intel-r-thunderbolt-tm-dch-drivers-for-windows-bd6e5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22342%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Thunderbolt(TM)%20DCH%20drivers%20for%20Windows&amp;severity=high&amp;id=682d9816c4522896dcbd6e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22293-escalation-of-privilege-in-intel-r-thunderbolt-tm-dch-drivers-for-windows-bd6e53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22293%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Thunderbolt(TM)%20DCH%20drivers%20for%20Windows&amp;severity=high&amp;id=682d9816c4522896dcbd6e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24691-cwe-176-improper-handling-of-unicode-encoding-in-zoom-video-communications-inc-zoom-desktop-client-for-windows-zoom-vdi-client-for-windows-and-zoom-meeting-sdk-for-windows-bd6dd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24691%3A%20CWE-176%3A%20Improper%20Handling%20of%20Unicode%20Encoding%20in%20Zoom%20Video%20Communications%2C%20Inc.%20Zoom%20Desktop%20Client%20for%20Windows%2C%20Zoom%20VDI%20Client%20for%20Windows%2C%20and%20Zoom%20Meeting%20SDK%20for%20Windows&amp;severity=critical&amp;id=682d9816c4522896dcbd6dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25222-na-67f0cd4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25222%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d63b7ef31ef0b571bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25219-na-f786c04c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25219%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d63b7ef31ef0b571bb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25214-na-7f7f4bdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25214%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d61b7ef31ef0b571ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25212-na-804fc3c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25212%3A%20n%2Fa&amp;severity=high&amp;id=699f6d61b7ef31ef0b571ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25165-na-876ebba6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25165%3A%20n%2Fa&amp;severity=high&amp;id=699f6d60b7ef31ef0b570d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24301-na-bc316807</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24301%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b570905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24300-na-ff77127d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24300%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b570902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25208-n-a-in-n-a-bf0e66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25208%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25225-n-a-in-n-a-bd850a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25225%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd850a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25215-n-a-in-n-a-bd8496</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25215%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd8496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50387-n-a-in-n-a-bd6e86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50387%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25221-n-a-in-n-a-bd6e08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25220-n-a-in-n-a-bd6e04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25220%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25213-n-a-in-n-a-bd6e00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25213%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25211-n-a-in-n-a-bd6dfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25211%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25210-n-a-in-n-a-bd6ded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25210%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25209-n-a-in-n-a-bd6de5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25209%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25207-n-a-in-n-a-bd6ddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25207%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50868-n-a-in-n-a-bd6d96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50868%3A%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25301-n-a-in-n-a-bd6d25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25301%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25224-n-a-in-n-a-bd6d21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25224%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25223-n-a-in-n-a-bd6d1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25223%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-14-f12538</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24697-cwe-426-untrusted-search-path-in-zoom-video-communications-inc-zoom-clients-bd8492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24697%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20Zoom%20Video%20Communications%2C%20Inc.%20Zoom%20Clients&amp;severity=high&amp;id=682d9819c4522896dcbd8492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1485-relative-path-traversal-bd676e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1485%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=682d9816c4522896dcbd676e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25120-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-typo3-typo3-bf0e62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25120%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d983fc4522896dcbf0e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25121-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-typo3-typo3-bd75d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25121%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20typo3&amp;severity=high&amp;id=682d9817c4522896dcbd75d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20587-vulnerability-in-amd-3rd-gen-amd-epyc-processors-bd89ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20587%3A%20Vulnerability%20in%20AMD%203rd%20Gen%20AMD%20EPYC%E2%84%A2%20Processors&amp;severity=high&amp;id=682d9819c4522896dcbd89ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46757-vulnerability-in-amd-amd-ryzen-embedded-5000-bd89fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46757%3A%20Vulnerability%20in%20AMD%20AMD%20Ryzen%E2%84%A2%20Embedded%205000&amp;severity=high&amp;id=682d9819c4522896dcbd89fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1374-cwe-20-improper-input-validation-in-github-enterprise-server-bd7600</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1374%3A%20CWE-20%20Improper%20Input%20Validation%20in%20GitHub%20Enterprise%20Server&amp;severity=critical&amp;id=682d9817c4522896dcbd7600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1372-cwe-20-improper-input-validation-in-github-enterprise-server-bd75fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1372%3A%20CWE-20%20Improper%20Input%20Validation%20in%20GitHub%20Enterprise%20Server&amp;severity=critical&amp;id=682d9817c4522896dcbd75fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1359-cwe-20-improper-input-validation-in-github-enterprise-server-bd75f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1359%3A%20CWE-20%20Improper%20Input%20Validation%20in%20GitHub%20Enterprise%20Server&amp;severity=critical&amp;id=682d9817c4522896dcbd75f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1354-cwe-20-improper-input-validation-in-github-enterprise-server-bd848a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1354%3A%20CWE-20%20Improper%20Input%20Validation%20in%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=682d9819c4522896dcbd848a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1082-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-github-enterprise-server-bd75e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1082%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=682d9817c4522896dcbd75e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21412-cwe-693-protection-mechanism-failure-in-microsoft-windows-11-version-21h2-beac90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21412%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=682d9836c4522896dcbeac90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21410-cwe-287-improper-authentication-in-microsoft-microsoft-exchange-server-2016-cumulative-update-23-beac88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21410%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=critical&amp;id=682d9836c4522896dcbeac88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21406-cwe-319-cleartext-transmission-of-sensitive-information-in-microsoft-windows-10-version-1809-bd848e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21406%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9819c4522896dcbd848e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21405-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-beac80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21405%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeac80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21403-cwe-552-files-or-directories-accessible-to-external-parties-in-microsoft-azure-kubernetes-service-bd753b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21403%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=682d9817c4522896dcbd753b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21397-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-file-sync-beac44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21397%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20File%20Sync&amp;severity=medium&amp;id=682d9836c4522896dcbeac44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21395-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-beac3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21395%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9836c4522896dcbeac3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21391-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beac12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21391%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeac12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21384-cwe-416-use-after-free-in-microsoft-microsoft-365-apps-for-enterprise-bd752f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21384%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682d9817c4522896dcbd752f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21380-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-microsoft-dynamics-365-business-central-2022-release-wave-2-beabad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21380%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Business%20Central%202022%20Release%20Wave%202&amp;severity=high&amp;id=682d9836c4522896dcbeabad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21378-cwe-94-improper-control-of-generation-of-code-code-injection-in-microsoft-microsoft-office-2019-beaba5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21378%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d9836c4522896dcbeaba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21377-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beab9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21377%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeab9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21376-cwe-284-improper-access-control-in-microsoft-azure-kubernetes-service-bd8420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21376%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=critical&amp;id=682d9819c4522896dcbd8420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21374-cwe-20-improper-input-validation-in-microsoft-microsoft-teams-for-android-beab88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21374%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Teams%20for%20Android&amp;severity=medium&amp;id=682d9836c4522896dcbeab88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21370-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21370%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21368-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd7651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21368%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd7651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21367-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd764d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21367%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd764d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21365-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21365%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21364-cwe-284-improper-access-control-in-microsoft-azure-site-recovery-beab63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21364%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Azure%20Site%20Recovery&amp;severity=critical&amp;id=682d9836c4522896dcbeab63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21363-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-bd82a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21363%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9818c4522896dcbd82a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21362-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-beab5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21362%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeab5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21359-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21359%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21356-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-beab16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21356%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeab16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21355-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-bd763c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21355%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd763c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21353-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-bd82a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21353%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9818c4522896dcbd82a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21348-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaaf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21348%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21347-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21347%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21346-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-11-version-21h2-bd7618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21346%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=682d9817c4522896dcbd7618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21345-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-bd7614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21345%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9817c4522896dcbd7614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21344-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beaae1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21344%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21343-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beaad2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21343%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21342-cwe-400-uncontrolled-resource-consumption-in-microsoft-windows-11-version-22h2-beaaca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21342%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d9836c4522896dcbeaaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21341-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beaac4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21341%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21339-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bd7610</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21339%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9817c4522896dcbd7610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20684-cwe-20-improper-input-validation-in-microsoft-windows-server-2022-bea93f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20684%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=682d9836c4522896dcbea93f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21328-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-beaa77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21328%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9836c4522896dcbeaa77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20695-cwe-284-improper-access-control-in-microsoft-skype-for-business-server-2019-cu7-bea989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20695%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Skype%20for%20Business%20Server%202019%20CU7&amp;severity=medium&amp;id=682d9836c4522896dcbea989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21315-cwe-20-improper-input-validation-in-microsoft-microsoft-defender-for-endpoint-for-windows-beaa31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21315%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Defender%20for%20Endpoint%20for%20Windows&amp;severity=high&amp;id=682d9836c4522896dcbeaa31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21304-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bea9c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21304%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20679-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-azure-stack-hub-bea910</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20679%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Azure%20Stack%20Hub&amp;severity=medium&amp;id=682d9836c4522896dcbea910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20673-cwe-693-protection-mechanism-failure-in-microsoft-microsoft-office-2019-bd7608</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20673%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d9817c4522896dcbd7608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21420-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beacb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21420%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeacb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21413-cwe-20-improper-input-validation-in-microsoft-microsoft-office-2019-beaca1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21413%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=critical&amp;id=682d9836c4522896dcbeaca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21404-cwe-476-null-pointer-dereference-in-microsoft-net-6-0-beac78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21404%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=682d9836c4522896dcbeac78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21402-cwe-285-improper-authorization-in-microsoft-microsoft-365-apps-for-enterprise-bd7537</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21402%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=682d9817c4522896dcbd7537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21401-cwe-284-improper-access-control-in-microsoft-entra-beac54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21401%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Entra&amp;severity=critical&amp;id=682d9836c4522896dcbeac54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21396-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-bd7533</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21396%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9817c4522896dcbd7533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21394-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-beac34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21394%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9836c4522896dcbeac34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21393-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-beac1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21393%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9836c4522896dcbeac1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21389-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-beac0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21389%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d9836c4522896dcbeac0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21386-cwe-400-uncontrolled-resource-consumption-in-microsoft-asp-net-core-6-0-beabd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21386%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20ASP.NET%20Core%206.0&amp;severity=high&amp;id=682d9836c4522896dcbeabd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21381-cwe-352-cross-site-request-forgery-csrf-in-microsoft-entra-beabbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21381%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Microsoft%20Entra&amp;severity=medium&amp;id=682d9836c4522896dcbeabbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21379-cwe-190-integer-overflow-or-wraparound-in-microsoft-microsoft-office-2019-bd752b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21379%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d9817c4522896dcbd752b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21375-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-beab99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21375%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21372-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-beab73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21372%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21371-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-microsoft-windows-10-version-1809-bd7527</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21371%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd7527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21369-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd7655</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21369%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd7655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21366-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21366%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21361-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd7640</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21361%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd7640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21360-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21360%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21358-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21358%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21357-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-beab36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21357%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21354-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21354%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21354-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-beab09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21354%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21352-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beab01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21352%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeab01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21351-cwe-94-improper-control-of-generation-of-code-code-injection-in-microsoft-windows-11-version-23h2-beaaf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21351%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Windows%2011%20Version%2023H2&amp;severity=high&amp;id=682d9836c4522896dcbeaaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21350-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bd7638</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21350%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd7638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21349-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bd7627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21349%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9817c4522896dcbd7627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21340-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-beaaaf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21340%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21338-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-beaa9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21338%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaa9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21329-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-azure-connected-machine-agent-beaa86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21329%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Azure%20Connected%20Machine%20Agent&amp;severity=high&amp;id=682d9836c4522896dcbeaa86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21327-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-customer-engagement-v9-1-bd760c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21327%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20Customer%20Engagement%20V9.1&amp;severity=high&amp;id=682d9817c4522896dcbd760c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20667-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-azure-devops-server-2022-bd7604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20667%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20DevOps%20Server%202022&amp;severity=high&amp;id=682d9817c4522896dcbd7604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1140-cwe-125-out-of-bounds-read-in-filseclab-twister-antivirus-aeb581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1140%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Filseclab%20Twister%20Antivirus&amp;severity=medium&amp;id=682cd0f81484d88663aeb581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23440-cwe-125-out-of-bounds-read-in-virusblokada-vba32-antivirus-aeb4e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23440%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VirusBlokAda%20Vba32%20Antivirus&amp;severity=high&amp;id=682cd0f81484d88663aeb4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23439-cwe-125-out-of-bounds-read-in-virusblokada-vba32-antivirus-aeb4d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23439%3A%20CWE-125%20Out-of-bounds%20Read%20in%20VirusBlokAda%20Vba32%20Antivirus&amp;severity=high&amp;id=682cd0f81484d88663aeb4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1163-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-mbloch-mbloch-mapshaper-bd75e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1163%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20mbloch%20mbloch%2Fmapshaper&amp;severity=high&amp;id=682d9817c4522896dcbd75e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24782-cwe-346-origin-validation-error-in-hima-f30-03x-yy-com-bd82c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24782%3A%20CWE-346%20Origin%20Validation%20Error%20in%20HIMA%20F30%2003X%20YY%20(COM)&amp;severity=medium&amp;id=682d9818c4522896dcbd82c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6072-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-trellix-trellix-central-management-cm-bf0e56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6072%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Trellix%20Trellix%20Central%20Management%20(CM)&amp;severity=medium&amp;id=682d983fc4522896dcbf0e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1159-cwe-79-improper-neutralization-of-in-787b5be4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1159%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1157-cwe-79-improper-neutralization-of-in-1442ff3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1157%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1160-cwe-79-improper-neutralization-of-in-0947a507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1160%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20boldthemes%20Bold%20Page%20Builder&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24924-cwe-787-out-of-bounds-write-in-siemens-simcenter-femap-bd75c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24924%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=682d9817c4522896dcbd75c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24923-cwe-125-out-of-bounds-read-in-siemens-simcenter-femap-bd75ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24923%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=682d9817c4522896dcbd75ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24921-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-siemens-simcenter-femap-bd82ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24921%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Siemens%20Simcenter%20Femap&amp;severity=high&amp;id=682d9818c4522896dcbd82ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23816-cwe-798-use-of-hard-coded-credentials-in-siemens-location-intelligence-perpetual-large-bd7584</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23816%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Siemens%20Location%20Intelligence%20Perpetual%20Large&amp;severity=critical&amp;id=682d9817c4522896dcbd7584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23813-cwe-287-improper-authentication-in-siemens-polarion-alm-bd7580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23813%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Siemens%20Polarion%20ALM&amp;severity=high&amp;id=682d9817c4522896dcbd7580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23810-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-siemens-sinec-nms-bd7573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23810%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=high&amp;id=682d9817c4522896dcbd7573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23803-cwe-787-out-of-bounds-write-in-siemens-tecnomatix-plant-simulation-v2201-bd756f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23803%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Tecnomatix%20Plant%20Simulation%20V2201&amp;severity=high&amp;id=682d9817c4522896dcbd756f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23802-cwe-125-out-of-bounds-read-in-siemens-tecnomatix-plant-simulation-v2201-bd756b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23802%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Tecnomatix%20Plant%20Simulation%20V2201&amp;severity=high&amp;id=682d9817c4522896dcbd756b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23795-cwe-787-out-of-bounds-write-in-siemens-tecnomatix-plant-simulation-v2201-bd7567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23795%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Tecnomatix%20Plant%20Simulation%20V2201&amp;severity=high&amp;id=682d9817c4522896dcbd7567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50236-cwe-276-incorrect-default-permissions-in-siemens-polarion-alm-bd8a48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50236%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Siemens%20Polarion%20ALM&amp;severity=high&amp;id=682d9819c4522896dcbd8a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49125-cwe-125-out-of-bounds-read-in-siemens-parasolid-v35-0-bd8a33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49125%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Parasolid%20V35.0&amp;severity=high&amp;id=682d9819c4522896dcbd8a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22454-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-dell-powerprotect-data-manager-bd7563</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22454%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Dell%20PowerProtect%20Data%20Manager&amp;severity=high&amp;id=682d9817c4522896dcbd7563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21491-authentication-bypass-in-svix-bd753f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21491%3A%20Authentication%20Bypass%20in%20svix&amp;severity=medium&amp;id=682d9817c4522896dcbd753f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22024-vulnerability-in-ivanti-ics-bd755b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22024%3A%20Vulnerability%20in%20Ivanti%20ICS&amp;severity=high&amp;id=682d9817c4522896dcbd755b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50358-cwe-78-in-qnap-systems-inc-qts-bd75db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50358%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=682d9817c4522896dcbd75db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25642-cwe-295-improper-certificate-validation-in-sap-se-sap-cloud-connector-bd8442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25642%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20SAP_SE%20SAP%20Cloud%20Connector&amp;severity=high&amp;id=682d9819c4522896dcbd8442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47218-cwe-77-in-qnap-systems-inc-qts-bd8a2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47218%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=682d9819c4522896dcbd8a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24740-cwe-732-incorrect-permission-assignment-for-critical-resource-in-sap-se-sap-netweaver-application-server-abap-sap-kernel-bd75a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24740%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20SAP_SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20(SAP%20Kernel)&amp;severity=medium&amp;id=682d9817c4522896dcbd75a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24739-cwe-862-missing-authorization-in-sap-se-sap-bam-bank-account-management-bd75a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24739%3A%20CWE-862%3A%20Missing%20Authorization%20in%20SAP_SE%20SAP%20BAM%20(Bank%20Account%20Management)&amp;severity=medium&amp;id=682d9817c4522896dcbd75a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22132-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-sap-se-sap-ides-systems-bf0e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22132%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SAP_SE%20SAP%20IDES%20Systems&amp;severity=medium&amp;id=682d983fc4522896dcbf0e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22130-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sap-se-sap-crm-webclient-ui-bd755f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22130%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP_SE%20SAP%20CRM%20WebClient%20UI&amp;severity=high&amp;id=682d9817c4522896dcbd755f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22128-cwe-79-improper-neutralization-of-i-3ea3918e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22128%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP_SE%20SAP%20NetWeaver%20Business%20Client%20for%20HTML&amp;severity=medium&amp;id=699ec75cb7ef31ef0bf740c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52431-n-a-in-n-a-bf0e52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52431%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42374-n-a-in-n-a-bf0e3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42374%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0e3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49339-n-a-in-n-a-bd8a37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49339%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45206-n-a-in-n-a-bd8a07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45206%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38960-n-a-in-n-a-bd8a03</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38960%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25407-n-a-in-n-a-bd821c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25407%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd821c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52059-n-a-in-n-a-bd75df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd75df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24142-n-a-in-n-a-bd758c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24142%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd758c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-13-f12f83</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1454-use-after-free-bd8aab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1454%3A%20Use%20After%20Free&amp;severity=low&amp;id=682d9819c4522896dcbd8aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1250-cwe-268-privilege-chaining-in-gitlab-gitlab-bd8a9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1250%3A%20CWE-268%3A%20Privilege%20Chaining%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9819c4522896dcbd8a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1459-path-traversal-filedir-fb923ba9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1459%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eeec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23833-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-openrefine-openrefine-bd8a58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23833%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenRefine%20OpenRefine&amp;severity=high&amp;id=682d9819c4522896dcbd8a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25108-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-pixelfed-pixelfed-bd8a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25108%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20pixelfed%20pixelfed&amp;severity=critical&amp;id=682d9819c4522896dcbd8a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4437-cwe-1333-inefficient-regular-expression-complexity-in-dbartholomae-lambda-middleware-frameguard-bda198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4437%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20dbartholomae%20lambda-middleware%20frameguard&amp;severity=low&amp;id=682d981bc4522896dcbda198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22223-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd8aaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22223%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d9819c4522896dcbd8aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22225-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd8abb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22225%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d9819c4522896dcbd8abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22224-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd8ab3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22224%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d9819c4522896dcbd8ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22228-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd8ae9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22228%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d9819c4522896dcbd8ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22227-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd8ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22227%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d9819c4522896dcbd8ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0165-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd9d63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0165%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d981bc4522896dcbd9d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0166-dell-unity-versions-prior-to-5-4-contains-an-os-command-injection-vulnerability-in-its-svc-tcpdump-utility-an-authenticated-attacker-could-potentially-exploit-this-vulnerability-leading-to-the-execution-of-arbitrary-os-commands-with-elevated-privileges-in-dell-unity-bd9d69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0166%3A%20Dell%20Unity%2C%20versions%20prior%20to%205.4%2C%20contains%20an%20OS%20Command%20Injection%20Vulnerability%20in%20its%20svc_tcpdump%20utility.%20An%20authenticated%20attacker%20could%20potentially%20exploit%20this%20vulnerability%2C%20leading%20to%20the%20execution%20of%20arbitrary%20OS%20commands%20with%20elevated%20privileges.%20in%20Dell%20Unity&amp;severity=high&amp;id=682d981bc4522896dcbd9d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0167-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd9d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0167%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d981bc4522896dcbd9d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0169-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dell-unity-bf0e5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0169%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dell%20Unity&amp;severity=medium&amp;id=682d983fc4522896dcbf0e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34311-cwe-522-insufficiently-protected-credentials-in-ibm-cics-tx-standard-bda107</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34311%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20CICS%20TX%20Standard&amp;severity=medium&amp;id=682d981bc4522896dcbda107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0170-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-unity-bd9d79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0170%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Unity&amp;severity=high&amp;id=682d981bc4522896dcbd9d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34310-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-cics-tx-standard-bf0e01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34310%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20CICS%20TX%20Standard&amp;severity=medium&amp;id=682d983fc4522896dcbf0e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6081-cwe-79-cross-site-scripting-xss-in-unknown-chartjs-bd9d57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6081%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20chartjs&amp;severity=medium&amp;id=682d981bc4522896dcbd9d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6294-cwe-918-server-side-request-forgery-ssrf-in-unknown-popup-builder-bf0da2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6294%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Popup%20Builder&amp;severity=high&amp;id=682d983fc4522896dcbf0da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6036-cwe-287-improper-authentication-in-unknown-web3-bda170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6036%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Web3&amp;severity=critical&amp;id=682d981bc4522896dcbda170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0566-cwe-89-sql-injection-in-unknown-smart-manager-bd8a94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0566%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Smart%20Manager&amp;severity=high&amp;id=682d9819c4522896dcbd8a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0248-cwe-862-missing-authorization-in-unknown-eazydocs-bd8b2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0248%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20EazyDocs&amp;severity=medium&amp;id=682d9819c4522896dcbd8b2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6499-cwe-352-cross-site-request-forgery-csrf-in-unknown-lastunes-bd9d5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6499%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20lasTunes&amp;severity=medium&amp;id=682d981bc4522896dcbd9d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0421-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-mappress-maps-for-wordpress-bd8a90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0421%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20MapPress%20Maps%20for%20WordPress&amp;severity=medium&amp;id=682d9819c4522896dcbd8a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6681-uncontrolled-resource-consumption-in-61a15063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6681%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=691f5c4ce672cd9080e8d3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1062-heap-based-buffer-overflow-5a62c91e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1062%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24884-cwe-352-cross-site-request-forgery-csrf-in-ari-soft-contact-form-7-connector-bf0dc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24884%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ARI%20Soft%20Contact%20Form%207%20Connector&amp;severity=medium&amp;id=682d983fc4522896dcbf0dc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46615-cwe-502-deserialization-of-untrusted-data-in-kalli-dan-kd-coming-soon-bda158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46615%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Kalli%20Dan.%20KD%20Coming%20Soon&amp;severity=medium&amp;id=682d981bc4522896dcbda158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23512-cwe-502-deserialization-of-untrusted-data-in-wpxpo-productx-woocommerce-builder-gutenberg-woocommerce-blocks-bd8af1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23512%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpxpo%20ProductX%20%E2%80%93%20WooCommerce%20Builder%20%26%20Gutenberg%20WooCommerce%20Blocks&amp;severity=high&amp;id=682d9819c4522896dcbd8af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41708-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-open-xchange-gmbh-ox-app-suite-bda14c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41708%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=682d981bc4522896dcbda14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41707-uncontrolled-resource-consumption-i-fa528b93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41707%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a43a16d939959c8fde05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41706-uncontrolled-resource-consumption-i-36047efb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41706%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a439f6d939959c8fddcb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41705-uncontrolled-resource-consumption-i-a5ec5c54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41705%3A%20Uncontrolled%20Resource%20Consumption%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a439f6d939959c8fddcac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41704-improper-neutralization-of-input-du-b5bd5cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41704%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=high&amp;id=690a439f6d939959c8fddc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41703-improper-neutralization-of-input-du-6a5509b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41703%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a439f6d939959c8fddc7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23513-cwe-502-deserialization-of-untrusted-data-in-propertyhive-propertyhive-bd8af9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23513%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20PropertyHive%20PropertyHive&amp;severity=high&amp;id=682d9819c4522896dcbd8af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24796-cwe-502-deserialization-of-untrusted-data-in-magepeople-team-event-manager-and-tickets-selling-plugin-for-woocommerce-wpevently-wordpress-plugin-bd8a5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24796%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20MagePeople%20Team%20Event%20Manager%20and%20Tickets%20Selling%20Plugin%20for%20WooCommerce%20%E2%80%93%20WpEvently%20%E2%80%93%20WordPress%20Plugin&amp;severity=high&amp;id=682d9819c4522896dcbd8a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24926-cwe-502-deserialization-of-untrusted-data-in-unitedthemes-brooklyn-creative-multi-purpose-responsive-wordpress-theme-bf0dc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24926%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20UnitedThemes%20Brooklyn%20%7C%20Creative%20Multi-Purpose%20Responsive%20WordPress%20Theme&amp;severity=medium&amp;id=682d983fc4522896dcbf0dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24932-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-djo-vk-poster-group-bf0dcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24932%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Djo%20VK%20Poster%20Group&amp;severity=medium&amp;id=682d983fc4522896dcbf0dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25360-na-25bba581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25360%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d65b7ef31ef0b571d33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23761-na-ce2d8ad7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23761%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d53b7ef31ef0b57059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52429-na-05c99796</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52429%3A%20n%2Fa&amp;severity=medium&amp;id=690a47456d939959c802227c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25741-na-c20194a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25741%3A%20n%2Fa&amp;severity=medium&amp;id=6909261ffe7723195e0b46bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24337-na-4544b0f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24337%3A%20n%2Fa&amp;severity=high&amp;id=68e0f3c6b66c7f7acdd3ea9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52430-n-a-in-n-a-bda168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52430%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25740-n-a-in-n-a-bd8a7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25740%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23763-n-a-in-n-a-bd8a54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23763%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd8a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23759-n-a-in-n-a-bd8a50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23759%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd8a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25744-n-a-in-n-a-bd8a4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25744%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-12-f1247a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1247a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ivanti-connect-secure-journey-to-the-core-of-the-dslog-backdoor-f0c2b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ivanti%20Connect%20Secure%3A%20Journey%20to%20the%20core%20of%20the%20DSLog%20backdoor&amp;severity=high&amp;id=682acdbebbaf20d303f0c2b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1433-cwe-22-path-traversal-in-kde-plasma-workspace-bf0dbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1433%3A%20CWE-22%20Path%20Traversal%20in%20KDE%20Plasma%20Workspace&amp;severity=medium&amp;id=682d983fc4522896dcbf0dbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1151-stack-based-buffer-overflow-in-red-h-aa56111a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1151%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=690e13c80d6e36ffa2758cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25728-na-f2b9f5c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25728%3A%20n%2Fa&amp;severity=high&amp;id=699f6d6eb7ef31ef0b57218b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25714-na-68291418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25714%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6db7ef31ef0b572103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23724-na-98b24573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23724%3A%20n%2Fa&amp;severity=null&amp;id=699f6d51b7ef31ef0b5704f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25713-na-480d9259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25713%3A%20n%2Fa&amp;severity=high&amp;id=690a3b63ff58c9332ff097a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25711-na-in-na-fbe186bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25711%3A%20n%2Fa&amp;severity=high&amp;id=68373654182aa0cae2538130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25718-n-a-in-n-a-bf0dd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25718%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25419-n-a-in-n-a-aec40b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25419%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25418-n-a-in-n-a-aec3f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25418%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-11-e884bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-11&amp;severity=medium&amp;id=682b7ba5d3ddd8cef2e884bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-11-f12451</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22312-cwe-256-plaintext-storage-of-a-pass-1418129a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22312%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20Storage%20Defender%20-%20Resiliency%20Service&amp;severity=medium&amp;id=68487f531b0bd07c39389f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50957-cwe-312-cleartext-storage-of-sensitive-information-in-ibm-storage-defender-resiliency-service-bf0d9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50957%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20IBM%20Storage%20Defender%20-%20Resiliency%20Service&amp;severity=medium&amp;id=682d983fc4522896dcbf0d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24831-improper-neutralization-of-input-du-49b3c05e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24831%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Leap13%20Premium%20Addons%20for%20Elementor&amp;severity=null&amp;id=69cd7414e6bfc5ba1def519c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0596-cwe-862-missing-authorization-in-awe-28f3bf0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0596%3A%20CWE-862%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0595-cwe-862-missing-authorization-in-awesomesupport-awesome-support-wordpress-helpdesk-support-plugin-bf0daa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0595%3A%20CWE-862%20Missing%20Authorization%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=682d983fc4522896dcbf0daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0594-cwe-89-improper-neutralization-of-sp-145766ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0594%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20awesomesupport%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=high&amp;id=699f6de0b7ef31ef0b58ff35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1405-cwe-200-information-disclosure-in-linksys-wrt54gl-aec3c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1405%3A%20CWE-200%20Information%20Disclosure%20in%20Linksys%20WRT54GL&amp;severity=medium&amp;id=682cd0fa1484d88663aec3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21490-regular-expression-denial-of-servic-1990e5a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21490%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20angular&amp;severity=high&amp;id=690904b000ff46172d4a0e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45696-vulnerability-in-hcl-software-hcl-s-49ae71bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45696%3A%20Vulnerability%20in%20HCL%20Software%20HCL%20Sametime&amp;severity=medium&amp;id=683f45d9182aa0cae28897d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-10-f12e9a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23327-cwe-476-null-pointer-dereference-in-6540c11d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23327%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=high&amp;id=68487f5b1b0bd07c3938bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1404-cwe-200-information-disclosure-in-linksys-wrt54gl-aec3ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1404%3A%20CWE-200%20Information%20Disclosure%20in%20Linksys%20WRT54GL&amp;severity=medium&amp;id=682cd0fa1484d88663aec3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45718-vulnerability-in-hcl-software-hcl-s-7010216f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45718%3A%20Vulnerability%20in%20HCL%20Software%20HCL%20Sametime&amp;severity=low&amp;id=683f45d9182aa0cae28897d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45716-vulnerability-in-hcl-software-hcl-s-cc21dbf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45716%3A%20Vulnerability%20in%20HCL%20Software%20HCL%20Sametime&amp;severity=low&amp;id=683f45d9182aa0cae28897d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1246-cwe-20-improper-input-validation-in-concrete-cms-concrete-cms-bf0db9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1246%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Concrete%20CMS%20%20Concrete%20CMS%20&amp;severity=medium&amp;id=682d983fc4522896dcbf0db9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50291-cwe-522-insufficiently-protected-credentials-in-apache-software-foundation-apache-solr-aec3b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50291%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=682cd0fa1484d88663aec3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50292-cwe-732-incorrect-permission-assignment-for-critical-resource-in-apache-software-foundation-apache-solr-aec3b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50292%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=682cd0fa1484d88663aec3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50386-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-apache-software-foundation-apache-solr-bf0d83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50386%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=high&amp;id=682d983fc4522896dcbf0d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6724-cwe-639-authorization-bypass-through-user-controlled-key-in-software-engineering-consultancy-machine-equipment-limited-company-hearing-tracking-system-aec3b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6724%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Software%20Engineering%20Consultancy%20Machine%20Equipment%20Limited%20Company%20Hearing%20Tracking%20System&amp;severity=high&amp;id=682cd0fa1484d88663aec3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22119-cwe-20-improper-input-validation-in-224dbfb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22119%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zabbix%20Zabbix&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c8af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21762-execute-unauthorized-code-or-commands-in-fortinet-fortiproxy-bf0dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21762%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiProxy&amp;severity=critical&amp;id=682d983fc4522896dcbf0dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0229-out-of-bounds-write-34bedf22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0229%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=690a47486d939959c8022303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0657-cwe-80-improper-neutralization-of-sc-589ff2f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0657%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20davidanderson%20Internal%20Link%20Juicer%3A%20SEO%20Auto%20Linker%20for%20WordPress&amp;severity=medium&amp;id=699f6de1b7ef31ef0b590109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0842-cwe-400-uncontrolled-resource-consum-fbc3dd76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0842%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20(&apos;Resource%20Exhaustion&apos;)%20in%20softaculous%20Backuply%20%E2%80%93%20Backup%2C%20Restore%2C%20Migrate%20and%20Clone&amp;severity=high&amp;id=699f6de6b7ef31ef0b5905d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1122-cwe-862-missing-authorization-in-the-5b0e4b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1122%3A%20CWE-862%20Missing%20Authorization%20in%20themewinter%20Event%20Manager%2C%20Events%20Calendar%2C%20Events%20Tickets%20for%20WooCommerce%20%E2%80%93%20Eventin&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45190-644-improper-neutralization-of-http-1a372317</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45190%3A%20644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20Engineering%20Lifecycle%20Optimization%20-%20Publishing&amp;severity=medium&amp;id=683f45d9182aa0cae28897ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1353-cwe-502-deserialization-in-phpems-bd8201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1353%3A%20CWE-502%20Deserialization%20in%20PHPEMS&amp;severity=medium&amp;id=682d9818c4522896dcbd8201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24819-cwe-352-cross-site-request-forgery-csrf-in-icinga-icingaweb2-module-incubator-aec3e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24819%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Icinga%20icingaweb2-module-incubator&amp;severity=medium&amp;id=682cd0fa1484d88663aec3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25674-na-ae42e799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25674%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d6db7ef31ef0b5720ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25452-na-2ff35f4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25452%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d68b7ef31ef0b571ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25448-na-dc7980fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25448%3A%20n%2Fa&amp;severity=high&amp;id=699f6d68b7ef31ef0b571ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25316-na-16e395d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25316%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d65b7ef31ef0b571c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25313-na-284e2a1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25313%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571c93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25306-na-bb118532</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25306%3A%20n%2Fa&amp;severity=high&amp;id=699f6d65b7ef31ef0b571c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24308-na-18da995b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24308%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5ab7ef31ef0b5709b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25446-na-8a407cf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25446%3A%20n%2Fa&amp;severity=high&amp;id=690a475f6d939959c8022dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25445-na-5c27171b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25445%3A%20n%2Fa&amp;severity=high&amp;id=690a475f6d939959c8022dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25442-na-2e947b4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25442%3A%20n%2Fa&amp;severity=high&amp;id=690a475f6d939959c8022dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25454-n-a-in-n-a-bd8220</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25454%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd8220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25302-n-a-in-n-a-bd8209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25302%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd8209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25003-n-a-in-n-a-bd8205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25003%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd8205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25447-n-a-in-n-a-aec405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25447%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25443-n-a-in-n-a-aec3f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25443%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25315-n-a-in-n-a-aec3f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25315%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25305-n-a-in-n-a-aec3f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25305%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25314-n-a-in-n-a-aec3f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25314%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25304-n-a-in-n-a-aec3ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25304%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25004-n-a-in-n-a-aec3ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25004%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23749-n-a-in-n-a-aec3cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23749%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50026-n-a-in-n-a-aec3ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39683-n-a-in-n-a-aec395</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39683%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-09-f12da4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24830-cwe-269-improper-privilege-management-in-openobserve-openobserve-bd81b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24830%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20openobserve%20openobserve&amp;severity=critical&amp;id=682d9818c4522896dcbd81b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24871-improper-neutralization-of-input-du-95c12f40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24871%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20creativethemeshq%20Blocksy&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1149-cwe-347-improper-verification-of-cryptographic-signature-in-snow-software-inventory-agent-aec3b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1149%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Snow%20Software%20Inventory%20Agent&amp;severity=high&amp;id=682cd0fa1484d88663aec3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24878-improper-neutralization-of-input-du-7d6037c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24878%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Marco%20Almeida%20%7C%20Webdados%20Portugal%20CTT%20Tracking%20for%20WooCommerce&amp;severity=null&amp;id=69cd7414e6bfc5ba1def51ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1312-use-after-free-in-kernel-9caf654b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1312%3A%20Use%20After%20Free%20in%20kernel&amp;severity=medium&amp;id=699f6d29b7ef31ef0b56e7bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6518-cwe-256-plaintext-storage-of-a-password-in-mia-technology-inc-mi-a-med-aec3b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6518%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Mia%20Technology%20Inc.%20M%C4%B0A-MED&amp;severity=high&amp;id=682cd0fa1484d88663aec3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22464-cwe-532-insertion-of-sensitive-information-into-log-file-in-dell-appsync-bf0ccb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22464%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Dell%20AppSync&amp;severity=medium&amp;id=682d983fc4522896dcbf0ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23452-cwe-444-inconsistent-interpretation-349ff6e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23452%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20bRPC&amp;severity=high&amp;id=68406659182aa0cae2b37ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0965-cwe-284-improper-access-control-in-p-c5622755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0965%3A%20CWE-284%20Improper%20Access%20Control%20in%20pluginsandsnippets%20Simple%20Page%20Access%20Restriction&amp;severity=medium&amp;id=699f6de9b7ef31ef0b5908f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1207-cwe-89-improper-neutralization-of-sp-8105b6d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1207%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20wpdevelop%20WP%20Booking%20Calendar&amp;severity=critical&amp;id=699f6d24b7ef31ef0b56e5b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0511-cwe-352-cross-site-request-forgery-c-4a628c4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0511%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20wproyal%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25146-cwe-204-observable-response-discrepancy-in-liferay-portal-aec3ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25146%3A%20CWE-204%20Observable%20Response%20Discrepancy%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682cd0fa1484d88663aec3ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47798-cwe-384-session-fixation-in-liferay-portal-aec3ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47798%3A%20CWE-384%20Session%20Fixation%20in%20Liferay%20Portal&amp;severity=medium&amp;id=682cd0fa1484d88663aec3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25190-na-95288086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25190%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d61b7ef31ef0b571ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25189-na-3505e4e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25189%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d61b7ef31ef0b571ac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24496-na-18a89279</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24496%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5db7ef31ef0b570b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24213-na-3c1cef91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24213%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b57088d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24202-na-27df580b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24202%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b57088a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24024-na-2af14a7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24024%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b57069a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24023-na-238af50b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24023%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b570696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24017-na-667c683d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24017%3A%20n%2Fa&amp;severity=high&amp;id=699f6d56b7ef31ef0b570692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24021-na-in-na-2f1a53c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f5c1b0bd07c3938d49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47020-na-in-na-5c239560</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f531b0bd07c39389f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24014-na-in-na-e11c4d67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24014%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6841e8e1182aa0cae2eca064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22795-na-in-na-8d79cbfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22795%3A%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e88623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24091-n-a-in-n-a-bf0ce8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24091%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24026-n-a-in-n-a-bf0cd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24350-n-a-in-n-a-bd81b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24350%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd81b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24216-n-a-in-n-a-bd81a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24216%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd81a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24003-n-a-in-n-a-bd81a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24003%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd81a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24495-n-a-in-n-a-aec3d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24495%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24494-n-a-in-n-a-aec3d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24494%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24393-n-a-in-n-a-aec3d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24393%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24113-n-a-in-n-a-aec3d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24113%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24018-n-a-in-n-a-aec3d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23764-n-a-in-n-a-aec3cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23764%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23756-n-a-in-n-a-aec3cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23756%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23660-n-a-in-n-a-aec3c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23660%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42282-n-a-in-n-a-aec3a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42282%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40266-n-a-in-n-a-aec39b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40266%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40265-n-a-in-n-a-aec399</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40265%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40263-n-a-in-n-a-aec397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40263%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-08-f1303d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f1303d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6736-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253fdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6736%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6840-cwe-862-missing-authorization-in-gitlab-gitlab-253fde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6840%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6536-null-pointer-dereference-in-red-hat--020d5269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6536%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690a47466d939959c80222bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6535-null-pointer-dereference-in-red-hat-red-hat-enterprise-linux-8-bf0cc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6535%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=682d983fc4522896dcbf0cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6356-null-pointer-dereference-in-red-hat--dc418dff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6356%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690a47466d939959c80222a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20255-cross-site-request-forgery-csrf-in-cisco-cisco-telepresence-video-communication-server-vcs-expressway-bd8189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20255%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Cisco%20Cisco%20TelePresence%20Video%20Communication%20Server%20(VCS)%20Expressway&amp;severity=high&amp;id=682d9818c4522896dcbd8189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38369-cwe-521-weak-password-requirements-in-ibm-security-verify-access-appliance-aec393</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38369%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=682cd0fa1484d88663aec393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31002-256-plaintext-storage-of-a-password-64a73ac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31002%3A%20256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=683f45d9182aa0cae28897ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43017-cwe-295-improper-certificate-validation-in-ibm-security-verify-access-appliance-aec3aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43017%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=682cd0fa1484d88663aec3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32330-cwe-295-improper-certificate-valida-2463e358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32330%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092630fe7723195e0b5f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32328-cwe-319-cleartext-transmission-of-s-90d8ed92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32328%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092630fe7723195e0b5f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22012-elevation-of-privilege-in-google-android-bd8198</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22012%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d9818c4522896dcbd8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24811-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-zopefoundation-products-sqlalchemyda-aec3e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24811%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20zopefoundation%20Products.SQLAlchemyDA&amp;severity=critical&amp;id=682cd0fa1484d88663aec3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24771-cwe-284-improper-access-control-in--d1474bf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24771%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20open-formulieren%20open-forms&amp;severity=high&amp;id=697d10c0ac0632022277c280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1118-cwe-89-improper-neutralization-of-sp-403c19c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1118%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20chemiker%20Podlove%20Subscribe%20button&amp;severity=high&amp;id=699f6d20b7ef31ef0b56e2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1109-cwe-862-missing-authorization-in-ete-97b27816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1109%3A%20CWE-862%20Missing%20Authorization%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1110-cwe-862-missing-authorization-in-eteubert-podlove-podcast-publisher-aec338</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1110%3A%20CWE-862%20Missing%20Authorization%20in%20eteubert%20Podlove%20Podcast%20Publisher&amp;severity=medium&amp;id=682cd0fa1484d88663aec338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1078-cwe-862-missing-authorization-in-ays-54cc7b27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1078%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1079-cwe-862-missing-authorization-in-ays-2be742a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1079%3A%20CWE-862%20Missing%20Authorization%20in%20ays-pro%20Quiz%20Maker&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0977-cwe-79-improper-neutralization-of-in-218fc4bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0977%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20narinder-singh%20Timeline%20Widget%20For%20Elementor%20(Elementor%20Timeline%2C%20Vertical%20%26%20Horizontal%20Timeline)&amp;severity=medium&amp;id=699f6de9b7ef31ef0b59090d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1037-cwe-79-improper-neutralization-of-in-b65771d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1037%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20davidanderson%20All-In-One%20Security%20(AIOS)%20%E2%80%93%20Security%20and%20Firewall&amp;severity=medium&amp;id=699f6d1cb7ef31ef0b56e07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0628-cwe-918-server-side-request-forgery--c88438aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0628%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jeangalea%20WP%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=low&amp;id=699f6de1b7ef31ef0b5900ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1055-cwe-79-improper-neutralization-of-in-f3e905a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1055%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0256-cwe-79-improper-neutralization-of-in-320f5d32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0256%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20cifi%20Starbox%20%E2%80%93%20the%20Author%20Box%20for%20Humans&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23447-cwe-284-improper-access-control-in-elastic-elastic-network-drive-connector-bf0ccf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23447%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Elastic%20Elastic%20Network%20Drive%20Connector&amp;severity=medium&amp;id=682d983fc4522896dcbf0ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0849-cwe-73-external-control-of-file-name-or-path-in-leanote-leanote-aeb57f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0849%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Leanote%20Leanote&amp;severity=medium&amp;id=682cd0f81484d88663aeb57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1269-cwe-79-cross-site-scripting-in-sourc-5d2e06e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1269%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20SourceCodester%20Product%20Management%20System&amp;severity=low&amp;id=68487f531b0bd07c39389f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1267-cwe-79-cross-site-scripting-in-codeastro-restaurant-pos-system-bf0cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1267%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20CodeAstro%20Restaurant%20POS%20System&amp;severity=medium&amp;id=682d983fc4522896dcbf0cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22022-vulnerability-in-veeam-recovery-orc-f01bc4b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22022%3A%20Vulnerability%20in%20Veeam%20Recovery%20Orchestrator&amp;severity=high&amp;id=683f45d9182aa0cae28897f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22021-vulnerability-in-veeam-recovery-orc-ae1bf205</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22021%3A%20Vulnerability%20in%20Veeam%20Recovery%20Orchestrator&amp;severity=medium&amp;id=6841c5b1182aa0cae2e68cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24303-na-a0a1c782</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24303%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b57090b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24133-na-3f628e5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24133%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b570871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24130-na-1f07eb79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24130%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d56b7ef31ef0b5707f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24304-na-in-na-993dfd98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24304%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5c1b0bd07c3938d4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24188-na-in-na-67b14d22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f5c1b0bd07c3938d4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24488-na-in-na-c8a89d05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24488%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6841e8e1182aa0cae2eca07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24311-na-in-na-c8efdb28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24311%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841e8e1182aa0cae2eca072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24131-na-in-na-d4dfcd10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24131%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6841e8e1182aa0cae2eca068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24019-na-in-na-bb4b0b43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6841e8e1182aa0cae2eca066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24186-n-a-in-n-a-bd8138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24186%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd8138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23769-n-a-in-n-a-aec36e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23769%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38995-n-a-in-n-a-aec300</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38995%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-07-f12664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1284-use-after-free-in-google-chrome-aec33e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1284%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=critical&amp;id=682cd0fa1484d88663aec33e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22388-cwe-1188-insecure-default-initialization-of-resource-in-hid-global-iclass-se-cp1000-encoder-bd8d80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22388%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20HID%20Global%20iCLASS%20SE%20CP1000%20Encoder&amp;severity=medium&amp;id=682d9819c4522896dcbd8d80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1261-cwe-434-unrestricted-upload-in-juanpao-jpshop-bd8130</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1261%3A%20CWE-434%20Unrestricted%20Upload%20in%20Juanpao%20JPShop&amp;severity=medium&amp;id=682d9818c4522896dcbd8130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45213-cwe-942-permissive-cross-domain-policy-with-untrusted-domains-in-westermo-lynx-aec319</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45213%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Westermo%20Lynx&amp;severity=medium&amp;id=682cd0fa1484d88663aec319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24577-cwe-122-heap-based-buffer-overflow-in-libgit2-libgit2-aec37c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24577%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20libgit2%20libgit2&amp;severity=high&amp;id=682cd0fa1484d88663aec37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1260-cwe-434-unrestricted-upload-in-juanpao-jpshop-bd8d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1260%3A%20CWE-434%20Unrestricted%20Upload%20in%20Juanpao%20JPShop&amp;severity=medium&amp;id=682d9819c4522896dcbd8d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22241-cross-site-scripting-vulnerability--9328efa0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22241%3A%20Cross%20Site%20Scripting%20vulnerability%20in%20VMware%20Aria%20Operations%20for%20Networks&amp;severity=medium&amp;id=683f45d9182aa0cae28897f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22240-local-file-read-vulnerability-in-vmware-aria-operations-for-networks-aec35b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22240%3A%20Local%20File%20Read%20vulnerability%20in%20VMware%20Aria%20Operations%20for%20Networks&amp;severity=medium&amp;id=682cd0fa1484d88663aec35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22239-local-privilege-escalation-vulnerability-in-vmware-aria-operations-for-networks-aec359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22239%3A%20Local%20Privilege%20Escalation%20vulnerability%20in%20VMware%20Aria%20Operations%20for%20Networks&amp;severity=medium&amp;id=682cd0fa1484d88663aec359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22238-cross-site-scripting-vulnerability--fc866872</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22238%3A%20Cross%20Site%20Scripting%20Vulnerability%20in%20VMware%20Aria%20Operations%20for%20Networks&amp;severity=medium&amp;id=683f45d9182aa0cae28897f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22237-local-privilege-escalation-vulnerability-in-vmware-aria-operations-for-networks-aec357</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22237%3A%20Local%20Privilege%20Escalation%20vulnerability%20in%20VMware%20Aria%20Operations%20for%20Networks&amp;severity=high&amp;id=682cd0fa1484d88663aec357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1048-incomplete-cleanup-8d12dc08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1048%3A%20Incomplete%20Cleanup&amp;severity=low&amp;id=691f5c4ee672cd9080e8d4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1253-cwe-434-unrestricted-upload-in-byzor-e0ff7bed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1253%3A%20CWE-434%20Unrestricted%20Upload%20in%20Byzoro%20Smart%20S40%20Management%20Platform&amp;severity=medium&amp;id=68487f531b0bd07c39389efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43482-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tp-link-er7206-omada-gigabit-vpn-router-aec311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43482%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=682cd0fa1484d88663aec311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36498-cwe-78-improper-neutralization-of-s-240ca0c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36498%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=690a439d6d939959c8fddaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47209-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tp-link-er7206-omada-gigabit-vpn-router-bd771d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47209%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=682d9817c4522896dcbd771d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47167-cwe-78-improper-neutralization-of-s-6a776e69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47167%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=690a47376d939959c8021b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42664-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tp-link-er7206-omada-gigabit-vpn-router-aec30d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42664%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=682cd0fa1484d88663aec30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46683-cwe-78-improper-neutralization-of-s-86509d48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46683%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=690a47376d939959c8021b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47617-cwe-78-improper-neutralization-of-s-60296282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47617%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=690a47376d939959c8021b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47618-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-tp-link-er7206-omada-gigabit-vpn-router-aec31d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47618%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Tp-Link%20ER7206%20Omada%20Gigabit%20VPN%20Router&amp;severity=high&amp;id=682cd0fa1484d88663aec31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35188-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-solarwinds-solarwinds-platform-aec2fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35188%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=high&amp;id=682cd0fa1484d88663aec2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23344-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-enalean-tuleap-bd7721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23344%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9817c4522896dcbd7721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24591-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-allegro-ai-clearml-aec389</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24591%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Allegro.AI%20ClearML&amp;severity=high&amp;id=682cd0fa1484d88663aec389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0911-heap-based-buffer-overflow-814a0170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0911%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=690a47486d939959c802232e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0690-improper-output-neutralization-for-l-cc20b7ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0690%3A%20Improper%20Output%20Neutralization%20for%20Logs&amp;severity=medium&amp;id=68e6688d5e259e903d8f0fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23673-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-sling-servlets-resolver-bd7725</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23673%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Sling%20Servlets%20Resolver&amp;severity=high&amp;id=682d9817c4522896dcbd7725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24940-cwe-23-in-jetbrains-intellij-idea-aec38f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24940%3A%20CWE-23%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=low&amp;id=682cd0fa1484d88663aec38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0684-heap-based-buffer-overflow-4c7b7330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0684%3A%20Heap-based%20Buffer%20Overflow&amp;severity=medium&amp;id=690a47486d939959c8022327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43533-cwe-126-buffer-over-read-in-qualcomm-inc-snapdragon-aec317</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43533%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682cd0fa1484d88663aec317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43520-cwe-121-stack-based-buffer-overflow-in-qualcomm-inc-snapdragon-bd7719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43520%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d9817c4522896dcbd7719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43517-cwe-284-improper-access-control-in-qualcomm-inc-snapdragon-aec315</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43517%3A%20CWE-284%20Improper%20Access%20Control%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682cd0fa1484d88663aec315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43516-cwe-823-use-of-out-of-range-pointer-offset-in-qualcomm-inc-snapdragon-aec313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43516%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682cd0fa1484d88663aec313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33072-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-qualcomm-inc-snapdragon-aec2fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33072%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=682cd0fa1484d88663aec2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33068-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-qualcomm-inc-snapdragon-bd7715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33068%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=682d9817c4522896dcbd7715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33057-cwe-20-improper-input-validation-in-qualcomm-inc-snapdragon-bd8d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33057%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682d9819c4522896dcbd8d25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23304-denial-of-service-dos-in-cybozu-inc-fc920387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23304%3A%20Denial-of-service%20(DoS)%20in%20Cybozu%2C%20Inc.%20Cybozu%20KUNAI%20for%20Android&amp;severity=high&amp;id=68406659182aa0cae2b37acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24808-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-pyload-pyload-bd7736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24808%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20pyload%20pyload&amp;severity=medium&amp;id=682d9817c4522896dcbd7736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20825-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-galaxy-store-aec353</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20825%3A%20CWE-927%20%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=682cd0fa1484d88663aec353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20822-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-galaxy-store-bf0d20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20822%3A%20CWE-927%20%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Galaxy%20Store&amp;severity=medium&amp;id=682d983fc4522896dcbf0d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20817-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-bd8134</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20817%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9818c4522896dcbd8134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20813-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-samsung-mobile-samsung-mobile-devices-aec351</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20813%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(Classic%20Buffer%20Overflow)%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=682cd0fa1484d88663aec351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20812-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-samsung-mobile-samsung-mobile-devices-aec34f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20812%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(Classic%20Buffer%20Overflow)%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=682cd0fa1484d88663aec34f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20810-cwe-927-use-of-implicit-intent-for-sensitive-communication-in-samsung-mobile-samsung-mobile-devices-bf0d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20810%3A%20CWE-927%3A%20Use%20of%20Implicit%20Intent%20for%20Sensitive%20Communication%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d983fc4522896dcbf0d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25140-na-f2e8d8bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25140%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d60b7ef31ef0b570d42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24004-na-9f41c969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24004%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d56b7ef31ef0b57068e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24002-na-29b958df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24002%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d54b7ef31ef0b570614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22514-na-8676b3fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22514%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4bb7ef31ef0b570104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22365-na-in-na-47172157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22365%3A%20n%2Fa&amp;severity=medium&amp;id=6842df031a426642debc97e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22773-na-in-na-329b9bea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22773%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6842df031a426642debc97d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24254-na-in-na-299d6c18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24254%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6841e8e1182aa0cae2eca06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22519-na-in-na-7cd71ef1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22519%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e8861d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24291-n-a-in-n-a-bf0d30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24291%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24255-n-a-in-n-a-bd811c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24255%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd811c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24112-n-a-in-n-a-bd80cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24112%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd80cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22515-n-a-in-n-a-bd80c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22515%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd80c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47353-n-a-in-n-a-bd802c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47353%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd802c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24680-n-a-in-n-a-aec38d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24680%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24398-n-a-in-n-a-aec376</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24398%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24001-n-a-in-n-a-aec370</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24001%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22852-n-a-in-n-a-aec36c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22852%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22520-n-a-in-n-a-aec35d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22520%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47354-n-a-in-n-a-aec31b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-06-f128cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f128cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34042-incorrect-permission-assignment-for-09f44ef0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34042%3A%20Incorrect%20Permission%20Assignment%20for%20spring-security.xsd%20in%20N%2FA%20Spring%20Security&amp;severity=medium&amp;id=683f45d9182aa0cae28897cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0508-cwe-79-improper-neutralization-of-in-2ac4289d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0969-cwe-284-improper-access-control-in-r-60b77ece</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0969%3A%20CWE-284%20Improper%20Access%20Control%20in%20reputeinfosystems%20ARMember%20%E2%80%93%20Membership%20Plugin%2C%20Content%20Restriction%2C%20Member%20Levels%2C%20User%20Profile%20%26%20User%20signup&amp;severity=medium&amp;id=699f6de9b7ef31ef0b5908fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0701-cwe-602-client-side-enforcement-of-s-d38d11e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0701%3A%20CWE-602%20Client-Side%20Enforcement%20of%20Server-Side%20Security%20in%20UserPro%20-%20Community%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0373-cwe-284-improper-access-control-in-a-b8e9de83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0373%3A%20CWE-284%20Improper%20Access%20Control%20in%20aman086%20Views%20for%20WPForms%20%E2%80%93%20Display%20%26%20Edit%20WPForms%20Entries%20on%20your%20site%20frontend&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0668-cwe-502-deserialization-of-untrusted-5351e2bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0668%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20symptote%20Advanced%20Database%20Cleaner&amp;severity=medium&amp;id=68443c7f71f4d251b50d0057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6996-cwe-94-improper-control-of-generation-of-code-code-injection-in-josevega-display-custom-fields-in-the-frontend-post-and-user-profile-fields-bd7e47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6996%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20josevega%20Display%20custom%20fields%20in%20the%20frontend%20%E2%80%93%20Post%20and%20User%20Profile%20Fields&amp;severity=high&amp;id=682d9818c4522896dcbd7e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0428-cwe-352-cross-site-request-forgery-c-79585613</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0428%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mihdan%20Index%20Now&amp;severity=high&amp;id=699f6ddbb7ef31ef0b58fb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0366-cwe-284-improper-access-control-in-cifi-starbox-the-author-box-for-humans-bf0d05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0366%3A%20CWE-284%20Improper%20Access%20Control%20in%20cifi%20Starbox%20%E2%80%93%20the%20Author%20Box%20for%20Humans&amp;severity=medium&amp;id=682d983fc4522896dcbf0d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0586-cwe-79-improper-neutralization-of-in-96919f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0586%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0660-cwe-352-cross-site-request-forgery-csrf-in-strategy11team-formidable-forms-contact-form-survey-quiz-payment-calculator-form-custom-form-builder-bf0d09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0660%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20strategy11team%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=682d983fc4522896dcbf0d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0709-cwe-89-improper-neutralization-of-sp-a2c301c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0709%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20narinder-singh%20Cryptocurrency%20Widgets%20%E2%80%93%20Price%20Ticker%20%26%20Coins%20List&amp;severity=critical&amp;id=699f6de4b7ef31ef0b5903b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1208-cwe-200-information-exposure-in-lear-3d373b8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1208%3A%20CWE-200%20Information%20Exposure%20in%20LearnDash%20LMS&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0612-cwe-80-improper-neutralization-of-sc-f093b95f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0612%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20pt-guy%20Content%20Views%20%E2%80%93%20Post%20Grid%2C%20Slider%2C%20Accordion%20(Gutenberg%20Blocks%20and%20Shortcode)&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0371-cwe-284-improper-access-control-in-a-c9351887</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0371%3A%20CWE-284%20Improper%20Access%20Control%20in%20aman086%20Views%20for%20WPForms%20%E2%80%93%20Display%20%26%20Edit%20WPForms%20Entries%20on%20your%20site%20frontend&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6925-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unitecms-unlimited-addons-for-wpbakery-page-builder-aec32e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6925%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20unitecms%20Unlimited%20Addons%20for%20WPBakery%20Page%20Builder&amp;severity=high&amp;id=682cd0fa1484d88663aec32e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0597-cwe-80-improper-neutralization-of-sc-10c9bbb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0597%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20cifi%20SEO%20Plugin%20by%20Squirrly%20SEO&amp;severity=medium&amp;id=699f6de0b7ef31ef0b58ff48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1092-cwe-284-improper-access-control-in-t-e7d80853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1092%3A%20CWE-284%20Improper%20Access%20Control%20in%20themeisle%20RSS%20Aggregator%20by%20Feedzy%20%E2%80%93%20Feed%20to%20Post%2C%20Autoblogging%2C%20News%20%26%20YouTube%20Video%20Feeds%20Aggregator&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0630-cwe-79-improper-neutralization-of-in-d85508c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0630%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jeangalea%20WP%20RSS%20Aggregator%20%E2%80%93%20RSS%20Import%2C%20News%20Feeds%2C%20Feed%20to%20Post%2C%20and%20Autoblogging&amp;severity=medium&amp;id=699f6de1b7ef31ef0b5900f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0954-cwe-79-improper-neutralization-of-in-7332e352</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0954%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6de9b7ef31ef0b59088d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1121-cwe-862-missing-authorization-in-phi-65528859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1121%3A%20CWE-862%20Missing%20Authorization%20in%20philkurth%20Advanced%20Forms%20for%20ACF&amp;severity=medium&amp;id=699f6d20b7ef31ef0b56e2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1046-cwe-79-improper-neutralization-of-in-e707eab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1046%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collizo4sky%20Paid%20Membership%20Plugin%2C%20Ecommerce%2C%20User%20Registration%20Form%2C%20Login%20Form%2C%20User%20Profile%20%26%20Restrict%20Content%20%E2%80%93%20ProfilePress&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1072-cwe-862-missing-authorization-in-see-b68fc4d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1072%3A%20CWE-862%20Missing%20Authorization%20in%20seedprod%20Website%20Builder%20by%20SeedProd%20%E2%80%94%20Theme%20Builder%2C%20Landing%20Page%20Builder%2C%20Coming%20Soon%20Page%2C%20Maintenance%20Mode&amp;severity=high&amp;id=699f6d1eb7ef31ef0b56e1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1075-cwe-639-authorization-bypass-through-179a21a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1075%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20webfactory%20Minimal%20Coming%20Soon%20%E2%80%93%20Coming%20Soon%20Page&amp;severity=low&amp;id=699f6d1eb7ef31ef0b56e1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0384-cwe-79-improper-neutralization-of-in-b290ae19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0384%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fb30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0678-cwe-80-improper-neutralization-of-sc-f39bea51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0678%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20tychesoftwares%20Order%20Delivery%20Date%20for%20WP%20e-Commerce&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1209-cwe-200-information-exposure-in-lear-a199b915</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1209%3A%20CWE-200%20Information%20Exposure%20in%20LearnDash%20LMS&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0961-cwe-79-improper-neutralization-of-in-c3d8af19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0961%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gpriday%20SiteOrigin%20Widgets%20Bundle&amp;severity=medium&amp;id=699f6de9b7ef31ef0b5908ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0509-cwe-79-improper-neutralization-of-in-3f0ddd06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0509%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20hwk-fr%20WP%20404%20Auto%20Redirect%20to%20Similar%20Post&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fd77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0834-cwe-79-improper-neutralization-of-in-b99989b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0834%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webtechstreet%20Elementor%20Addon%20Elements&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0790-cwe-352-cross-site-request-forgery-c-0f97ef94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0790%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20WOLF%20%E2%80%93%20WordPress%20Posts%20Bulk%20Editor%20and%20Manager%20Professional&amp;severity=medium&amp;id=699f6de5b7ef31ef0b590497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1177-cwe-862-missing-authorization-in-wpc-7b52891c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1177%3A%20CWE-862%20Missing%20Authorization%20in%20wpclubmanager%20WP%20Club%20Manager%20%E2%80%93%20WordPress%20Sports%20Club%20Plugin&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1210-cwe-200-information-exposure-in-lear-d0d6811a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1210%3A%20CWE-200%20Information%20Exposure%20in%20LearnDash%20LMS&amp;severity=medium&amp;id=699f6d24b7ef31ef0b56e5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0835-cwe-862-missing-authorization-in-wpr-94966961</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0835%3A%20CWE-862%20Missing%20Authorization%20in%20wproyal%20Royal%20Elementor%20Kit&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0255-cwe-80-improper-neutralization-of-sc-28260827</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0255%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0796-cwe-352-cross-site-request-forgery-c-0fe5063a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0796%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Professional%20products%20tables%20for%20WooCommerce%20store&amp;severity=medium&amp;id=699f6de5b7ef31ef0b5904a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0691-cwe-80-improper-neutralization-of-sc-4d71c2b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0691%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20ninjateam%20FileBird%20%E2%80%93%20WordPress%20Media%20Library%20Folders%20%26%20File%20Manager&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0380-cwe-22-improper-limitation-of-a-path-e2ed18ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0380%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6635-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-munirkamal-gutenberg-block-editor-toolkit-editorskit-aec32c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6635%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20munirkamal%20Gutenberg%20Block%20Editor%20Toolkit%20%E2%80%93%20EditorsKit&amp;severity=high&amp;id=682cd0fa1484d88663aec32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0859-cwe-352-cross-site-request-forgery-c-4323f0e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0859%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mra13%20Affiliates%20Manager&amp;severity=medium&amp;id=699f6de6b7ef31ef0b590649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0585-cwe-79-improper-neutralization-of-in-1d7da557</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0585%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Addons%20for%20Elementor%20%E2%80%93%20Best%20Elementor%20Templates%2C%20Widgets%2C%20Kits%20%26%20WooCommerce%20Builders&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0370-cwe-284-improper-access-control-in-a-18329eeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0370%3A%20CWE-284%20Improper%20Access%20Control%20in%20aman086%20Views%20for%20WPForms%20%E2%80%93%20Display%20%26%20Edit%20WPForms%20Entries%20on%20your%20site%20frontend&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0221-cwe-22-improper-limitation-of-a-path-a3f1d86b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0221%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=critical&amp;id=699f6ddab7ef31ef0b58f9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0374-cwe-284-improper-access-control-in-a-f6edc8e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0374%3A%20CWE-284%20Improper%20Access%20Control%20in%20aman086%20Views%20for%20WPForms%20%E2%80%93%20Display%20%26%20Edit%20WPForms%20Entries%20on%20your%20site%20frontend&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6982-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-josevega-display-custom-fields-in-the-frontend-post-and-user-profile-fields-bf0d01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6982%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20josevega%20Display%20custom%20fields%20in%20the%20frontend%20%E2%80%93%20Post%20and%20User%20Profile%20Fields&amp;severity=medium&amp;id=682d983fc4522896dcbf0d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0823-cwe-79-improper-neutralization-of-in-4f81e1e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0823%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=699f6de5b7ef31ef0b5904b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0372-cwe-284-improper-access-control-in-a-21f9e3f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0372%3A%20CWE-284%20Improper%20Access%20Control%20in%20aman086%20Views%20for%20WPForms%20%E2%80%93%20Display%20%26%20Edit%20WPForms%20Entries%20on%20your%20site%20frontend&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0324-cwe-284-improper-access-control-in-reflectionmedia-user-profile-builder-beautiful-user-registration-forms-user-profiles-user-role-editor-aec332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0324%3A%20CWE-284%20Improper%20Access%20Control%20in%20reflectionmedia%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=high&amp;id=682cd0fa1484d88663aec332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0382-cwe-80-improper-neutralization-of-sc-e37e3ab9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0382%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=699f6ddbb7ef31ef0b58fb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0659-cwe-80-improper-neutralization-of-sc-a9e73edd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0659%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20smub%20Easy%20Digital%20Downloads%20%E2%80%93%20Sell%20Digital%20Files%20(eCommerce%20Store%20%26%20Payments%20Made%20Easy)&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59022f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0761-cwe-330-use-of-insufficiently-random-26d5e8c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0761%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20mndpsingh287%20File%20Manager&amp;severity=high&amp;id=699f6de4b7ef31ef0b5903be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0869-cwe-862-missing-authorization-in-con-ea2fc59b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0869%3A%20CWE-862%20Missing%20Authorization%20in%20connekthq%20Instant%20Images%20%E2%80%93%20One%20Click%20Image%20Uploads%20from%20Unsplash%2C%20Openverse%2C%20Pixabay%20and%20Pexels&amp;severity=high&amp;id=699f6de6b7ef31ef0b590657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0791-cwe-862-missing-authorization-in-realmag777-wolf-wordpress-posts-bulk-editor-and-manager-professional-bf0d16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0791%3A%20CWE-862%20Missing%20Authorization%20in%20realmag777%20WOLF%20%E2%80%93%20WordPress%20Posts%20Bulk%20Editor%20and%20Manager%20Professional&amp;severity=medium&amp;id=682d983fc4522896dcbf0d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0254-cwe-79-improper-neutralization-of-in-ca731930</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0254%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nomadcoder%20(Simply)%20Guest%20Author%20Name&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0797-cwe-862-missing-authorization-in-realmag777-active-products-tables-for-woocommerce-professional-products-tables-for-woocommerce-store-aec336</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0797%3A%20CWE-862%20Missing%20Authorization%20in%20realmag777%20Active%20Products%20Tables%20for%20WooCommerce.%20Professional%20products%20tables%20for%20WooCommerce%20store&amp;severity=medium&amp;id=682cd0fa1484d88663aec336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0699-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-tigroumeow-ai-engine-chatbots-generators-assistants-gpt-4-and-more-aec334</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0699%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20tigroumeow%20AI%20Engine%3A%20Chatbots%2C%20Generators%2C%20Assistants%2C%20GPT%204%20and%20more!&amp;severity=medium&amp;id=682cd0fa1484d88663aec334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0448-cwe-79-improper-neutralization-of-in-87f8b31e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0448%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livemesh%20Elementor%20Addons%20by%20Livemesh&amp;severity=medium&amp;id=699f6dddb7ef31ef0b58fc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24595-cwe-522-insufficiently-protected-credentials-in-allegro-ai-clearml-aec38b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24595%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Allegro.AI%20ClearML&amp;severity=medium&amp;id=682cd0fa1484d88663aec38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50782-observable-timing-discrepancy-f6ec4f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50782%3A%20Observable%20Timing%20Discrepancy&amp;severity=high&amp;id=69120492b8ffd8a38b9de5bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50781-observable-timing-discrepancy-d3d13e8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50781%3A%20Observable%20Timing%20Discrepancy&amp;severity=high&amp;id=68e6688d5e259e903d8f0fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0202-observable-timing-discrepancy-450f48c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0202%3A%20Observable%20Timing%20Discrepancy&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22208-cwe-863-incorrect-authorization-in-thorsten-phpmyfaq-aec355</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22208%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20thorsten%20phpMyFAQ&amp;severity=medium&amp;id=682cd0fa1484d88663aec355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7216-improper-limitation-of-a-pathname-to-6783c5bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7216%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24762-cwe-400-uncontrolled-resource-consumption-in-kludex-python-multipart-bd7732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24762%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Kludex%20python-multipart&amp;severity=high&amp;id=682d9817c4522896dcbd7732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23109-execute-unauthorized-code-or-comman-46f64a2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23109%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=6967a2148330e0671671d0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1225-cwe-502-deserialization-in-qibosoft-qibocms-x1-aec33c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1225%3A%20CWE-502%20Deserialization%20in%20QiboSoft%20QiboCMS%20X1&amp;severity=high&amp;id=682cd0fa1484d88663aec33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5643-cwe-787-out-of-bounds-write-in-arm-ltd-bifrost-gpu-kernel-driver-aec31f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5643%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Arm%20Ltd%20Bifrost%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=682cd0fa1484d88663aec31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24855-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-linux-linux-kernel-bf0cf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24855%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Linux%20Linux%20kernel&amp;severity=medium&amp;id=682d983fc4522896dcbf0cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7077-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sharp-nec-display-solutions-ltd-p403-p463-p553-p703-p801-x554un-x464un-x554uns-x464unv-x474hb-x464uns-x554unv-x555uns-x555unv-x754hb-x554hb-e705-e805-e905-un551s-un551vs-x551uhd-x651uhd-x841uhd-x981uhd-md551c8-aec330</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7077%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Sharp%20Display%20Solutions%2C%20Ltd.%20P403%2C%20P463%2C%20P553%2C%20P703%2C%20P801%2C%20X554UN%2C%20X464UN%2C%20X554UNS%2C%20X464UNV%2C%20X474HB%2C%20X464UNS%2C%20X554UNV%2C%20X555UNS%2C%20X555UNV%2C%20X754HB%2C%20X554HB%2C%20E705%2C%20E805%2C%20E905%2C%20UN551S%2C%20UN551VS%2C%20X551UHD%2C%20X651UHD%2C%20X841UHD%2C%20X981UHD%2C%20MD551C8&amp;severity=critical&amp;id=682cd0fa1484d88663aec330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20001-elevation-of-privilege-in-mediatek-inc-mt5583-mt5586-mt5691-mt5695-mt5696-mt9010-mt9011-mt9012-mt9015-mt9016-mt9020-mt9021-mt9022-mt9025-mt9026-mt9216-mt9218-mt9220-mt9221-mt9222-mt9255-mt9256-mt9266-mt9269-mt9286-mt9288-mt9602-mt9603-mt9610-mt9611-mt9612-mt9613-mt9615-mt9617-mt9618-mt9629-mt9630-mt9631-mt9632-mt9633-mt9636-mt9638-mt9639-mt9649-mt9650-mt9652-mt9653-mt9660-mt9666-mt9667-mt9669-mt9671-mt9675-mt9679-mt9685-mt9686-mt9688-mt9689-aec34b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20001%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT5583%2C%20MT5586%2C%20MT5691%2C%20MT5695%2C%20MT5696%2C%20MT9010%2C%20MT9011%2C%20MT9012%2C%20MT9015%2C%20MT9016%2C%20MT9020%2C%20MT9021%2C%20MT9022%2C%20MT9025%2C%20MT9026%2C%20MT9216%2C%20MT9218%2C%20MT9220%2C%20MT9221%2C%20MT9222%2C%20MT9255%2C%20MT9256%2C%20MT9266%2C%20MT9269%2C%20MT9286%2C%20MT9288%2C%20MT9602%2C%20MT9603%2C%20MT9610%2C%20MT9611%2C%20MT9612%2C%20MT9613%2C%20MT9615%2C%20MT9617%2C%20MT9618%2C%20MT9629%2C%20MT9630%2C%20MT9631%2C%20MT9632%2C%20MT9633%2C%20MT9636%2C%20MT9638%2C%20MT9639%2C%20MT9649%2C%20MT9650%2C%20MT9652%2C%20MT9653%2C%20MT9660%2C%20MT9666%2C%20MT9667%2C%20MT9669%2C%20MT9671%2C%20MT9675%2C%20MT9679%2C%20MT9685%2C%20MT9686%2C%20MT9688%2C%20MT9689&amp;severity=medium&amp;id=682cd0fa1484d88663aec34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20015-elevation-of-privilege-in-mediatek--67173ae7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20015%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6753%2C%20MT6757%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6781%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8321%2C%20MT8667%2C%20MT8673%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=69418d789050fe8508ffbf4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20012-elevation-of-privilege-in-mediatek-inc-mt6580-mt6731-mt6735-mt6737-mt6739-mt6753-mt6757-mt6757c-mt6757cd-mt6757ch-mt6761-mt6762-mt6763-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6835-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6886-mt6889-mt6891-mt6895-mt6983-mt6985-mt8321-mt8385-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791t-mt8797-mt8798-bd76fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20012%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6731%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6753%2C%20MT6757%2C%20MT6757C%2C%20MT6757CD%2C%20MT6757CH%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6891%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8321%2C%20MT8385%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9817c4522896dcbd76fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20007-elevation-of-privilege-in-mediatek-inc-mt6580-mt6739-mt6761-mt6762-mt6765-mt6779-mt6785-mt6789-mt6833-mt6835-mt6853-mt6853t-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6886-mt6889-mt6895-mt6983-mt6985-mt8321-mt8765-mt8766-mt8768-mt8786-mt8788-mt8789-mt8791-mt8797-mt8798-aec34d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20007%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6765%2C%20MT6779%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8321%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=682cd0fa1484d88663aec34d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20006-elevation-of-privilege-in-mediatek--d358ab40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20006%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT2713%2C%20MT6781%2C%20MT6880%2C%20MT6890%2C%20MT8188T&amp;severity=medium&amp;id=69418d789050fe8508ffbf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5677-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-axis-communications-ab-axis-os-aec777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5677%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=medium&amp;id=682cd0fb1484d88663aec777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24469-na-b03647a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24469%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5cb7ef31ef0b570adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24396-na-5967ce1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24396%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d5ab7ef31ef0b570a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24260-na-38f96611</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24260%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b5708f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23054-na-92db8ab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23054%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b57039d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24262-na-in-na-09cd2368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24262%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6843500671f4d251b5de40bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24266-na-in-na-38fe4127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24266%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841e8e1182aa0cae2eca070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24258-na-in-na-50275192</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24258%3A%20n%2Fa&amp;severity=high&amp;id=6841e8e1182aa0cae2eca06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24265-n-a-in-n-a-bd76a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24265%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd76a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24543-n-a-in-n-a-aec37a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24543%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24468-n-a-in-n-a-aec378</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24468%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24397-n-a-in-n-a-aec374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24397%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24259-n-a-in-n-a-aec372</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24259%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22667-n-a-in-n-a-aec36a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22667%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-05-f12794</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6240-observable-discrepancy-in-red-hat-re-2768c5b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6240%3A%20Observable%20Discrepancy%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690eefde44af18c3752cf5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-25159-cwe-89-sql-injection-in-mpedraza2020-intranet-del-monterroso-aec2f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-25159%3A%20CWE-89%20SQL%20Injection%20in%20mpedraza2020%20Intranet%20del%20Monterroso&amp;severity=medium&amp;id=682cd0fa1484d88663aec2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25089-na-226811c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25089%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5fb7ef31ef0b570c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52426-na-aaf02426</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52426%3A%20n%2Fa&amp;severity=medium&amp;id=690a47456d939959c8022273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52425-na-ebea8ec1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52425%3A%20n%2Fa&amp;severity=high&amp;id=690a2de3f0ba78a050535cef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36773-n-a-in-n-a-26443a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36773%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f60d40acd01a24926443a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25062-n-a-in-n-a-bd76c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25062%3A%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd76c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-04-f12db4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12db4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1215-cwe-79-cross-site-scripting-in-sourcecodester-crud-without-page-reload-aec33a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1215%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20SourceCodester%20CRUD%20without%20Page%20Reload&amp;severity=low&amp;id=682cd0fa1484d88663aec33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0909-cwe-200-information-exposure-in-caye-fca30af1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0909%3A%20CWE-200%20Information%20Exposure%20in%20cayenne%20Anonymous%20Restricted%20Content&amp;severity=medium&amp;id=699f6de9b7ef31ef0b59087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0895-cwe-79-improper-neutralization-of-in-16243335</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0895%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dearhive%20PDF%20Flipbook%2C%203D%20Flipbook%20%E2%80%93%20DearFlip&amp;severity=medium&amp;id=699f6de7b7ef31ef0b59073d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23550-vulnerability-in-hcl-software-launc-b63aa09c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23550%3A%20Vulnerability%20in%20HCL%20Software%20Launch%20%2F%20DevOps%20Deploy&amp;severity=medium&amp;id=683f4260182aa0cae288184d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37528-vulnerability-in-hcl-software-bigfi-348c5c31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37528%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20Platform&amp;severity=medium&amp;id=683f4959182aa0cae289164c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31006-cwe-400-uncontrolled-resource-consu-c5e1af02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31006%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=6909262ffe7723195e0b5f08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31004-cwe-300-channel-accessible-by-non-endpoint-man-in-the-middle-in-ibm-security-verify-access-appliance-aec2fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31004%3A%20CWE-300%20Channel%20Accessible%20by%20Non-Endpoint%20(&apos;Man-in-the-Middle&apos;)%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=682cd0fa1484d88663aec2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32329-cwe-345-insufficient-verification-o-5feece34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32329%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=69092630fe7723195e0b5f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32327-cwe-611-improper-restriction-of-xml-da70d6db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32327%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092630fe7723195e0b5f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43016-cwe-258-empty-password-in-configura-03acabe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43016%3A%20CWE-258%20Empty%20Password%20in%20Configuration%20File%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=69092635fe7723195e0b61cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30999-cwe-400-uncontrolled-resource-consu-e94efd76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30999%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=6909262ffe7723195e0b5ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31005-cwe-269-improper-privilege-manageme-4f5c84cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31005%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=6909262ffe7723195e0b5f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44031-na-b5f126ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44031%3A%20n%2Fa&amp;severity=high&amp;id=690a43a36d939959c8fde854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43183-n-a-in-n-a-aec30f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43183%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec30f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-03-f121d6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f121d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1198-cwe-502-deserialization-in-openbi-bd8d74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1198%3A%20CWE-502%20Deserialization%20in%20openBI&amp;severity=medium&amp;id=682d9819c4522896dcbd8d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1197-cwe-89-sql-injection-in-sourcecodester-testimonial-page-manager-aec2d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1197%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Testimonial%20Page%20Manager&amp;severity=high&amp;id=682cd0fa1484d88663aec2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23553-vulnerability-in-hcl-software-bigfi-c8d1cb63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23553%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20Platform&amp;severity=low&amp;id=683f4260182aa0cae288184f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37531-vulnerability-in-hcl-software-bigfi-fb4e3546</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37531%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20Platform&amp;severity=low&amp;id=683f4959182aa0cae2891652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37530-vulnerability-in-hcl-software-bigfi-769aa978</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37530%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20Platform&amp;severity=low&amp;id=683f4959182aa0cae2891650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37529-vulnerability-in-hcl-software-bigfi-ca0c93c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37529%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20Platform&amp;severity=low&amp;id=683f4959182aa0cae289164e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1189-cwe-404-denial-of-service-in-ampps-bd76a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1189%3A%20CWE-404%20Denial%20of%20Service%20in%20AMPPS&amp;severity=medium&amp;id=682d9817c4522896dcbd76a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37527-vulnerability-in-hcl-software-bigfi-e85571d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37527%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20Platform&amp;severity=medium&amp;id=683f4959182aa0cae289164a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1187-cwe-404-denial-of-service-in-munsoft-easy-outlook-express-recovery-aec2d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1187%3A%20CWE-404%20Denial%20of%20Service%20in%20Munsoft%20Easy%20Outlook%20Express%20Recovery&amp;severity=low&amp;id=682cd0fa1484d88663aec2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1186-cwe-404-denial-of-service-in-munsoft-70c79d89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1186%3A%20CWE-404%20Denial%20of%20Service%20in%20Munsoft%20Easy%20Archive%20Recovery&amp;severity=low&amp;id=68487f531b0bd07c39389ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47562-cwe-77-in-qnap-systems-inc-photo-station-bd8d53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47562%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20Photo%20Station&amp;severity=high&amp;id=682d9819c4522896dcbd8d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41282-cwe-77-in-qnap-systems-inc-qts-bd8d29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41282%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=682d9819c4522896dcbd8d29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41281-cwe-77-in-qnap-systems-inc-qts-aec2c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41281%3A%20CWE-77%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=682cd0fa1484d88663aec2c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41275-cwe-120-in-qnap-systems-inc-qts-bd769b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41275%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=682d9817c4522896dcbd769b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39297-cwe-78-in-qnap-systems-inc-qts-aec2be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39297%3A%20CWE-78%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=682cd0fa1484d88663aec2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24760-cwe-610-externally-controlled-reference-to-a-resource-in-another-sphere-in-mailcow-mailcow-dockerized-aec2f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24760%3A%20CWE-610%3A%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20mailcow%20mailcow-dockerized&amp;severity=high&amp;id=682cd0fa1484d88663aec2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6387-cwe-787-out-of-bounds-write-in-silabs-com-gsdk-aec2d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6387%3A%20CWE-787%20Out-of-bounds%20Write%20in%20silabs.com%20GSDK&amp;severity=high&amp;id=682cd0fa1484d88663aec2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6675-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-national-keep-cyber-security-services-cybermath-aec2d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6675%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20National%20Keep%20Cyber%20Security%20Services%20CyberMath&amp;severity=critical&amp;id=682cd0fa1484d88663aec2d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0963-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-codepeople-calculated-fields-form-bd8d63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0963%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codepeople%20Calculated%20Fields%20Form&amp;severity=medium&amp;id=682d9819c4522896dcbd8d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0844-cwe-22-improper-limitation-of-a-path-912f7295</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0844%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20devfelixmoira%20Popup%20More%20Popups%2C%20Lightboxes%2C%20and%20more%20popup%20modules&amp;severity=medium&amp;id=699f6de6b7ef31ef0b590636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-24681-cwe-732-incorrect-permission-assignment-for-critical-resource-in-b-r-industrial-automation-automation-studio-bd768e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-24681%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20B%26R%20Industrial%20Automation%20Automation%20Studio&amp;severity=high&amp;id=682d9817c4522896dcbd768e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23978-heap-based-buffer-overflow-in-kddi-corporation-home-spot-cube2-aec2f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23978%3A%20Heap-based%20buffer%20overflow%20in%20KDDI%20CORPORATION%20HOME%20SPOT%20CUBE2&amp;severity=critical&amp;id=682cd0fa1484d88663aec2f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0285-cwe-20-improper-input-validation-in-openharmony-openharmony-bd8d57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0285%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=682d9819c4522896dcbd8d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1143-na-in-line-corporation-central-dogma-6e8d760b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1143%3A%20na%20in%20LINE%20Corporation%20Central%20Dogma&amp;severity=critical&amp;id=683f45d9182aa0cae28897ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1162-cwe-352-cross-site-request-forgery-c-48a8fa42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1162%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1047-cwe-862-missing-authorization-in-the-9ec9d863</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1047%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20Orbit%20Fox%20by%20ThemeIsle&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21485-cross-site-scripting-xss-in-dash-core-components-aec2db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21485%3A%20Cross-site%20Scripting%20(XSS)%20in%20dash-core-components&amp;severity=medium&amp;id=682cd0fa1484d88663aec2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0685-cwe-89-improper-neutralization-of-sp-e5cde78c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0685%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20kstover%20Ninja%20Forms%20Contact%20Form%20%E2%80%93%20The%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=699f6de3b7ef31ef0b5902f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1073-cwe-79-improper-neutralization-of-in-8faa2716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1073%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mostafas1990%20SlimStat%20Analytics&amp;severity=medium&amp;id=699f6d1eb7ef31ef0b56e1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22320-cwe-502-deserialization-of-untrusted-data-in-ibm-operational-decision-manager-bd8d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22320%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20IBM%20Operational%20Decision%20Manager&amp;severity=critical&amp;id=682d9819c4522896dcbd8d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21399-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-beac4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21399%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d9836c4522896dcbeac4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50933-80-improper-neutralization-of-scrip-424f9bd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50933%3A%2080%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20IBM%20PowerSC&amp;severity=medium&amp;id=683f45d9182aa0cae28897da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24524-na-75770755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24524%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5eb7ef31ef0b570bf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24482-na-ea024636</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24482%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5cb7ef31ef0b570aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22779-na-9764b4ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22779%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4db7ef31ef0b570226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22900-na-in-na-343370bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22900%3A%20n%2Fa&amp;severity=high&amp;id=6843500671f4d251b5de40b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22533-na-in-na-681bd7da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22533%3A%20n%2Fa&amp;severity=critical&amp;id=684345db71f4d251b5dc11e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22108-na-in-na-ebc7f484</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22108%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6842df031a426642debc97df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24388-na-in-na-0f1684c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24388%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6841e8e1182aa0cae2eca074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22851-na-in-na-2a3c176c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22851%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e88619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22899-na-in-na-74d356ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22899%3A%20n%2Fa&amp;severity=high&amp;id=6840c579182aa0cae2c16af8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22903-na-in-na-48aa408a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22903%3A%20n%2Fa&amp;severity=high&amp;id=6840c579182aa0cae2c16af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48645-na-in-na-7a0b8b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48645%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b7303c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25006-n-a-in-n-a-bd8d88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25006%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46344-n-a-in-n-a-bd8d2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46344%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24160-n-a-in-n-a-bd768a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24160%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd768a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23746-n-a-in-n-a-bd7667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23746%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd7667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22902-n-a-in-n-a-aec2ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22902%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22901-n-a-in-n-a-aec2e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22901%3A%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22107-n-a-in-n-a-aec2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22107%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46045-n-a-in-n-a-aec2c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46045%3A%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-02-e5424a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-02&amp;severity=medium&amp;id=682b7b9cd3ddd8cef2e5424a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-02-f11fc5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21869-cwe-256-plaintext-storage-of-a-password-in-rapid-software-llc-rapid-scada-aec2dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21869%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20Rapid%20Software%20LLC%20Rapid%20SCADA&amp;severity=medium&amp;id=682cd0fa1484d88663aec2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22096-cwe-23-relative-path-traversal-in-rapid-software-llc-rapid-scada-bd74f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22096%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Rapid%20Software%20LLC%20Rapid%20SCADA&amp;severity=medium&amp;id=682d9817c4522896dcbd74f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24756-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-crafatar-crafatar-aec2f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24756%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20crafatar%20crafatar&amp;severity=high&amp;id=682cd0fa1484d88663aec2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49617-cwe-306-missing-authentication-for--31505f48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49617%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MachineSense%20FeverWarn&amp;severity=critical&amp;id=684325f071f4d251b5d4fa6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6221-cwe-306-missing-authentication-for-critical-function-in-machinesense-feverwarn-aec2cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6221%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20MachineSense%20FeverWarn&amp;severity=high&amp;id=682cd0fa1484d88663aec2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1040-use-of-weak-hash-cwe-328-in-gessler-gmbh-web-master-bd74a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1040%3A%20USE%20OF%20WEAK%20HASH%20CWE-328%20in%20Gessler%20GmbH%20WEB-MASTER&amp;severity=medium&amp;id=682d9817c4522896dcbd74a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5841-cwe-122-heap-based-buffer-overflow-in-academy-software-foundation-openexr-aec5bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5841%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Academy%20Software%20Foundation%20OpenEXR&amp;severity=critical&amp;id=682cd0fb1484d88663aec5bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1167-cwe-611-improper-restriction-of-xml-external-entity-reference-in-sew-eurodrive-movitools-motionstudio-aec2d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1167%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20SEW-EURODRIVE%20MOVITOOLS%20MotionStudio&amp;severity=medium&amp;id=682cd0fa1484d88663aec2d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24557-cwe-346-origin-validation-error-in-moby-moby-aec583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24557%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20moby%20moby&amp;severity=medium&amp;id=682cd0fb1484d88663aec583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24754-cwe-436-interpretation-conflict-in-brefphp-bref-aec2f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24754%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20brefphp%20bref&amp;severity=low&amp;id=682cd0fa1484d88663aec2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1141-logging-of-excessive-data-fd1ebdfe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1141%3A%20Logging%20of%20Excessive%20Data&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6078-cwe-78-improper-neutralization-of-sp-e959b805</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6078%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dassault%20Syst%C3%A8mes%20BIOVIA%20Materials%20Studio%20products&amp;severity=high&amp;id=68487f5a1b0bd07c3938ab7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22430-cwe-276-incorrect-default-permissions-in-dell-powerscale-onefs-bd8d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22430%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d9819c4522896dcbd8d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1130-cwe-862-missing-authorization-in-web-73d32bb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1130%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Form%20Builder%20%E2%80%93%20Contact%20forms%20and%20much%20more&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1129-cwe-862-missing-authorization-in-web-6f44d20f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1129%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Form%20Builder%20%E2%80%93%20Contact%20forms%20and%20much%20more&amp;severity=medium&amp;id=699f6d22b7ef31ef0b56e3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0907-cwe-862-missing-authorization-in-webaways-nex-forms-ultimate-form-builder-contact-forms-and-much-more-bd8d5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0907%3A%20CWE-862%20Missing%20Authorization%20in%20webaways%20NEX-Forms%20%E2%80%93%20Ultimate%20Form%20Builder%20%E2%80%93%20Contact%20forms%20and%20much%20more&amp;severity=medium&amp;id=682d9819c4522896dcbd8d5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23941-cross-site-scripting-xss-in-interme-56beacef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23941%3A%20Cross-site%20scripting%20(XSS)%20in%20Intermesh%20BV%20Group%20Office&amp;severity=medium&amp;id=68406659182aa0cae2b37ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23052-na-702165bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23052%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b570399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22939-na-09e1bda5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22939%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b57038e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22936-na-c62a8034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22936%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4fb7ef31ef0b57038a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23031-na-in-na-68c3e7fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24945-na-in-na-52bbea36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24945%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c8182aa0cae28296d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24061-na-in-na-5618f8d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c8182aa0cae28296c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24041-na-in-na-a7927cee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24041%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c8182aa0cae28296c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23034-na-in-na-894052d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23034%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c8182aa0cae28296ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23033-na-in-na-a0309a1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23033%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c8182aa0cae28296ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22859-na-in-na-7297cd59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22859%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683879c8182aa0cae28296a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47257-n-a-in-n-a-bd8d31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47257%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22927-n-a-in-n-a-aec4fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22927%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24059-n-a-in-n-a-aec4e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-02-01-f130b5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-02-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f130b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24571-cwe-80-improper-neutralization-of-s-338b616b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24571%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20WillyXJ%20facileManager&amp;severity=medium&amp;id=683879c8182aa0cae28296d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23651-cwe-362-concurrent-execution-using--c5a1e4b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23651%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20moby%20buildkit&amp;severity=high&amp;id=683879c8182aa0cae28296b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21626-cwe-403-exposure-of-file-descriptor-to-unintended-control-sphere-file-descriptor-leak-in-opencontainers-runc-aec4de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21626%3A%20CWE-403%3A%20Exposure%20of%20File%20Descriptor%20to%20Unintended%20Control%20Sphere%20(&apos;File%20Descriptor%20Leak&apos;)%20in%20opencontainers%20runc&amp;severity=high&amp;id=682cd0fa1484d88663aec4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1117-cwe-94-code-injection-in-openbi-561e5bf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1117%3A%20CWE-94%20Code%20Injection%20in%20openBI&amp;severity=high&amp;id=683879c8182aa0cae2829693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1115-cwe-78-os-command-injection-in-openb-aa881673</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1115%3A%20CWE-78%20OS%20Command%20Injection%20in%20openBI&amp;severity=high&amp;id=683879c8182aa0cae2829691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1111-cwe-79-cross-site-scripting-in-sourc-d0d8e39c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1111%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20SourceCodester%20QR%20Code%20Login%20System&amp;severity=medium&amp;id=683879c8182aa0cae282968d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21917-cwe-347-improper-verification-of-cr-9a1e916a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21917%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Rockwell%20Automation%20FactoryTalk%C2%AE%20Service%20Platform&amp;severity=critical&amp;id=69690c3d4c611209ad3437c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22158-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-peepso-community-by-peepso-social-network-membership-registration-user-profiles-aec4e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22158%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PeepSo%20Community%20by%20PeepSo%20%E2%80%93%20Social%20Network%2C%20Membership%2C%20Registration%2C%20User%20Profiles&amp;severity=medium&amp;id=682cd0fa1484d88663aec4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21893-vulnerability-in-ivanti-ics-3b5c072a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21893%3A%20Vulnerability%20in%20Ivanti%20ICS&amp;severity=high&amp;id=68f7d9b1247d717aace2692e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21888-vulnerability-in-ivanti-ics-ffa22cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21888%3A%20Vulnerability%20in%20Ivanti%20ICS&amp;severity=high&amp;id=683f45d9182aa0cae28897f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22289-improper-neutralization-of-input-du-0ffbc878</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22289%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CyberNetikz%20Post%20views%20Stats&amp;severity=null&amp;id=69cd7413e6bfc5ba1def5131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5390-cwe-36-in-honeywell-controledge-uoc-da1bba8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5390%3A%20CWE-36%20in%20Honeywell%20ControlEdge%20UOC&amp;severity=medium&amp;id=683879c8182aa0cae2829666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22293-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-andrea-tarantini-bp-profile-search-aec4e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22293%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Andrea%20Tarantini%20BP%20Profile%20Search&amp;severity=high&amp;id=682cd0fa1484d88663aec4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22302-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ignazio-scimone-albo-pretorio-on-line-27415c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22302%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Ignazio%20Scimone%20Albo%20Pretorio%20On%20line&amp;severity=medium&amp;id=6830a0ae0acd01a24927415c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22306-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hometory-mang-board-wp-aec4e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22306%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hometory%20Mang%20Board%20WP&amp;severity=medium&amp;id=682cd0fa1484d88663aec4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22307-improper-neutralization-of-input-du-940ae26e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22307%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WP%20Lab%20WP-Lister%20Lite%20for%20eBay&amp;severity=null&amp;id=69cd7413e6bfc5ba1def5135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23505-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dearhive-pdf-viewer-3d-pdf-flipbook-dearpdf-274164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23505%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DearHive%20PDF%20Viewer%20%26%203D%20PDF%20Flipbook%20%E2%80%93%20DearPDF&amp;severity=medium&amp;id=6830a0ae0acd01a249274164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23508-cwe-79-improper-neutralization-of-i-5a663531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23508%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bPlugins%20PDF%20Poster%20%E2%80%93%20PDF%20Embedder%20Plugin%20for%20WordPress&amp;severity=high&amp;id=6839f8d4182aa0cae2bba111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0219-cwe-269-improper-privilege-managemen-5a531313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0219%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Progress%20Software%20Telerik%20JustDecompile&amp;severity=high&amp;id=683879c8182aa0cae282966c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5992-observable-discrepancy-in-red-hat-re-7b706607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5992%3A%20Observable%20Discrepancy%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=69092638fe7723195e0b6310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22136-cwe-352-cross-site-request-forgery--723267ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22136%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20DroitThemes%20Droit%20Elementor%20Addons%20%E2%80%93%20Widgets%2C%20Blocks%2C%20Templates%20Library%20For%20Elementor%20Builder&amp;severity=medium&amp;id=6839f8d4182aa0cae2bba10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1112-cwe-119-improper-restriction-of-oper-7d2b16e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1112%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Angus%20Johnson%20Resource%20Hacker&amp;severity=high&amp;id=683879c8182aa0cae282968f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0589-vulnerability-in-devolutions-remote--c39fdf8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0589%3A%20Vulnerability%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22291-cwe-352-cross-site-request-forgery-csrf-in-marco-milesi-browser-theme-color-27415a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22291%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marco%20Milesi%20Browser%20Theme%20Color&amp;severity=medium&amp;id=6830a0ae0acd01a24927415a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22304-cwe-352-cross-site-request-forgery-csrf-in-borbis-media-freshmail-for-wordpress-27415e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22304%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Borbis%20Media%20FreshMail%20For%20WordPress&amp;severity=medium&amp;id=6830a0ae0acd01a24927415e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1086-cwe-416-use-after-free-in-linux-kern-d72a7710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1086%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Kernel&amp;severity=high&amp;id=68f7d9b0247d717aace268c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1085-cwe-416-use-after-free-in-linux-kern-50f8fe58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1085%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Kernel&amp;severity=high&amp;id=683879c8182aa0cae2829689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23507-cwe-89-improper-neutralization-of-s-b0761ded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23507%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=6839fc40182aa0cae2bc1f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22305-cwe-639-authorization-bypass-through-user-controlled-key-in-ali-forms-contact-form-builder-with-drag-drop-for-wordpress-kali-forms-274160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22305%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20ali%20Forms%20Contact%20Form%20builder%20with%20drag%20%26%20drop%20for%20WordPress%20%E2%80%93%20Kali%20Forms&amp;severity=high&amp;id=6830a0ae0acd01a249274160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1098-cwe-200-information-disclosure-in-re-99f661fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1098%3A%20CWE-200%20Information%20Disclosure%20in%20Rebuild&amp;severity=medium&amp;id=683879c8182aa0cae282968b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44312-cwe-200-exposure-of-sensitive-infor-383b858f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44312%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20ServiceComb%20Service-Center&amp;severity=medium&amp;id=6839fc40182aa0cae2bc1f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0836-cwe-862-missing-authorization-in-tec-bdc50649</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0836%3A%20CWE-862%20Missing%20Authorization%20in%20techlabpro1%20WordPress%20Review%20%26%20Structure%20Data%20Schema%20Plugin%20%E2%80%93%20Review%20Schema&amp;severity=medium&amp;id=699f6de6b7ef31ef0b5905c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22236-vulnerability-in-spring-spring-clou-4b63ff8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22236%3A%20Vulnerability%20in%20Spring%20Spring%20Cloud%20Contract&amp;severity=low&amp;id=683f45d9182aa0cae28897f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0914-observable-discrepancy-9a43156e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0914%3A%20Observable%20Discrepancy&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1069-cwe-434-unrestricted-upload-of-file--83e4014b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1069%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20crmperks%20Database%20for%20Contact%20Form%207%2C%20WPforms%2C%20Elementor%20forms&amp;severity=high&amp;id=683879c8182aa0cae2829687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23745-na-6b510427</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23745%3A%20n%2Fa&amp;severity=null&amp;id=699f6d53b7ef31ef0b570590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23170-na-13dde2bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23170%3A%20n%2Fa&amp;severity=medium&amp;id=690a474d6d939959c80223de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22569-na-in-na-e00dd02f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22569%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23775-na-in-na-0c338d09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23775%3A%20n%2Fa&amp;severity=high&amp;id=683879c8182aa0cae28296b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-31-f12f41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-31&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cutting-edge-part-2-investigating-ivanti-connect-secure-vpn-zero-day-exploitation-f0c2b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cutting%20Edge%2C%20Part%202%3A%20Investigating%20Ivanti%20Connect%20Secure%20VPN%20Zero-Day%20Exploitation&amp;severity=high&amp;id=682acdbebbaf20d303f0c2b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1077-use-after-free-in-google-chrome-c22dc530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1077%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=683f45d9182aa0cae28897eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1060-use-after-free-in-google-chrome-f70173e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1060%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=683879c8182aa0cae2829683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1059-use-after-free-in-google-chrome-bd832d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1059%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9818c4522896dcbd832d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21388-cwe-20-improper-input-validation-in-microsoft-microsoft-edge-chromium-based-beac00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21388%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeac00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24556-cwe-79-improper-neutralization-of-i-5241ee20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24556%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20urql-graphql%20urql&amp;severity=high&amp;id=683879c8182aa0cae28296cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46230-information-written-to-log-files-ca-d5568e65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46230%3A%20Information%20written%20to%20log%20files%20can%20be%20of%20a%20sensitive%20nature%20and%20give%20valuable%20guidance%20to%20an%20attacker%20or%20expose%20sensitive%20user%20information.%20in%20Splunk%20Splunk%20Add-on%20Builder&amp;severity=high&amp;id=6839ffe7182aa0cae2bc9d61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23840-cwe-532-insertion-of-sensitive-info-1c8fde93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23840%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20goreleaser%20goreleaser&amp;severity=medium&amp;id=683879c8182aa0cae28296c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23825-cwe-918-server-side-request-forgery-a4ca2c89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23825%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20TablePress%20TablePress&amp;severity=low&amp;id=683879c8182aa0cae28296c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22200-cwe-200-exposure-of-sensitive-infor-bb8262bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22200%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20vantage6%20vantage6-UI&amp;severity=low&amp;id=683879c8182aa0cae28296a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21649-cwe-94-improper-control-of-generati-d9b181d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21649%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20vantage6%20vantage6&amp;severity=high&amp;id=683879c8182aa0cae28296a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37518-vulnerability-in-hcl-software-bigfi-211411d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37518%3A%20Vulnerability%20in%20HCL%20Software%20BigFix%20ServiceNow%20Data%20Flow&amp;severity=medium&amp;id=683879c7182aa0cae282964d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0564-observable-discrepancy-23175032</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0564%3A%20Observable%20Discrepancy&amp;severity=medium&amp;id=683a035b182aa0cae2bd1b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1033-cwe-200-information-disclosure-in-op-6b9a69ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1033%3A%20CWE-200%20Information%20Disclosure%20in%20openBI&amp;severity=medium&amp;id=683879c8182aa0cae2829681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0674-cwe-269-improper-privilege-managemen-1f0566d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0674%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Lamassu%20Bitcoin%20ATM%20Douro%20machines&amp;severity=medium&amp;id=683879c8182aa0cae282966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1063-cwe-918-server-side-request-forgery--b9f6d9e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1063%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Appwrite%20Appwrite&amp;severity=medium&amp;id=683879c8182aa0cae2829685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6943-cwe-470-use-of-externally-controlled-9158c578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6943%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20Mitsubishi%20Electric%20Corporation%20EZSocket&amp;severity=critical&amp;id=683a035b182aa0cae2bd1b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6942-cwe-306-missing-authentication-for-c-5285b665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6942%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Corporation%20EZSocket&amp;severity=high&amp;id=683879c8182aa0cae282966a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6374-cwe-294-authentication-bypass-by-cap-31b812a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6374%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20WS%20Series%20WS0-GETH00200&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21803-cwe-416-use-after-free-in-linux-lin-e3a9fe9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21803%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Linux%20kernel&amp;severity=low&amp;id=683879c8182aa0cae28296a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1027-cwe-434-unrestricted-upload-in-sourc-acac7c9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1027%3A%20CWE-434%20Unrestricted%20Upload%20in%20SourceCodester%20Facebook%20News%20Feed%20Like&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1026-cwe-79-cross-site-scripting-in-cogit-53351311</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1026%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Cogites%20eReserv&amp;severity=low&amp;id=68487f5a1b0bd07c3938ab79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24328-na-3fe7fc48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24328%3A%20n%2Fa&amp;severity=high&amp;id=699f6d5ab7ef31ef0b5709cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24326-na-629774b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24326%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d5ab7ef31ef0b5709c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22894-na-82923b69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22894%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4fb7ef31ef0b57031e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22682-25dad11b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22682&amp;severity=null&amp;id=699f6d4bb7ef31ef0b57016c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24330-na-in-na-2a7514f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24330%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f5b1b0bd07c3938c1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22646-na-in-na-dca43a43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22646%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22643-na-in-na-a8ecc83e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22643%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683a0a8d182aa0cae2be1974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24332-na-in-na-e887bf38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24332%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683a06f1182aa0cae2bd9a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24331-na-in-na-ab944e16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24331%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683879c8182aa0cae28296cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24327-na-in-na-b8c78c10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24327%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683879c8182aa0cae28296cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22938-na-in-na-b41aad71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22938%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683879c8182aa0cae28296aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22647-na-in-na-4c6dc205</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22647%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c8182aa0cae28296a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51982-na-in-na-1dc18656</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683879c8182aa0cae2829664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51843-na-in-na-bfb1f982</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51843%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683879c8182aa0cae2829662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51837-na-in-na-9b4f9a30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51837%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683879c7182aa0cae2829655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36259-na-in-na-b81a558b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36259%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683879c7182aa0cae282964b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-30-f12073</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-krustyloader-rust-malware-linked-to-ivanti-connectsecure-compromises-f0c2a6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20KrustyLoader%20-%20Rust%20malware%20linked%20to%20Ivanti%20ConnectSecure%20compromises&amp;severity=high&amp;id=682acdbebbaf20d303f0c2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-host-hosted-in-ru-with-only-phishing-websites-f0c2a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20host%20(hosted%20in%20RU)%20with%20only%20phishing%20websites&amp;severity=high&amp;id=682acdbebbaf20d303f0c2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1022-cwe-79-cross-site-scripting-in-codea-d973caa4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1022%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20CodeAstro%20Simple%20Student%20Result%20Management%20System&amp;severity=low&amp;id=683879c8182aa0cae2829674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23334-cwe-22-improper-limitation-of-a-pat-dc643196</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23334%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=683a0a8d182aa0cae2be1967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23829-cwe-444-inconsistent-interpretation-e3f9af0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23829%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69092148fe7723195e0543ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1021-cwe-918-server-side-request-forgery--2780762d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1021%3A%20CWE-918%20Server-Side%20Request%20Forgery%20in%20Rebuild&amp;severity=medium&amp;id=6843500671f4d251b5de40b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4554-cwe-611-improper-restriction-of-xml--36b2c352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4554%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20OpenText%20AppBuilder&amp;severity=medium&amp;id=683879c7182aa0cae2829653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30970-the-product-uses-external-input-to--8f0eb826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30970%3A%20The%20product%20uses%20external%20input%20to%20construct%20a%20pathname%20that%20should%20be%20within%20a%20restricted%20directory%2C%20but%20it%20does%20not%20properly%20neutralize%20absolute%20path%20sequences%20such%20as%20%22%2Fabs%2Fpath%22%20that%20can%20resolve%20to%20a%20location%20that%20is%20outside%20of%20that%20directory.%20in%20Palantir%20com.palantir.gotham%3Ablackbird-witchcraft&amp;severity=medium&amp;id=683879c7182aa0cae2829649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23940-vulnerability-in-trend-micro-inc-tr-5eba0267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23940%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Security%20(Consumer)%20uiAirSupport&amp;severity=high&amp;id=683879c8182aa0cae28296c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1011-cwe-284-improper-access-controls-in--39e9bec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1011%3A%20CWE-284%20Improper%20Access%20Controls%20in%20SourceCodester%20Employee%20Management%20System&amp;severity=medium&amp;id=683ee1ec182aa0cae27396ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40551-out-of-bounds-read-in-red-hat-red-h-64f22a52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40551%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=medium&amp;id=68e0f3c1b66c7f7acdd3e995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1010-cwe-79-cross-site-scripting-in-sourc-65e2d5dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1010%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20SourceCodester%20Employee%20Management%20System&amp;severity=low&amp;id=683879c8182aa0cae2829672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1009-cwe-89-sql-injection-in-sourcecodest-4e084445</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1009%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Employee%20Management%20System&amp;severity=high&amp;id=6842df031a426642debc9658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40546-null-pointer-dereference-in-red-hat-6bcff52f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40546%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=medium&amp;id=68e0f3c1b66c7f7acdd3e969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40549-out-of-bounds-read-in-red-hat-red-h-085e8cb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40549%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=medium&amp;id=68e0f3c1b66c7f7acdd3e987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40550-out-of-bounds-read-in-red-hat-red-h-6cb06c0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40550%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=medium&amp;id=683879c7182aa0cae2829651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1705-cwe-862-missing-authorization-in-for-7d9e8361</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1705%3A%20CWE-862%20Missing%20Authorization%20in%20Forcepoint%20F%7COne%20SmartEdge%20Agent&amp;severity=high&amp;id=683879c7182aa0cae2829647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0788-cwe-96-improper-neutralization-of-directives-in-statically-saved-code-static-code-injection-in-superantispyware-superantispyware-pro-x-aeaff9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0788%3A%20CWE-96%3A%20Improper%20Neutralization%20of%20Directives%20in%20Statically%20Saved%20Code%20(&apos;Static%20Code%20Injection&apos;)%20in%20SUPERAntiSpyware%20SUPERAntiSpyware%20Pro%20X&amp;severity=medium&amp;id=682cd0f71484d88663aeaff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23826-cwe-770-allocation-of-resources-wit-cbcb8c02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23826%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20spbu-se%20spbu_se_site&amp;severity=medium&amp;id=683ee1ec182aa0cae27396e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23822-cwe-22-improper-limitation-of-a-pat-3c7ec915</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23822%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sni%20Thruk&amp;severity=medium&amp;id=683879c8182aa0cae28296bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1006-cwe-287-improper-authentication-in-s-4a9359d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1006%3A%20CWE-287%20Improper%20Authentication%20in%20Shanxi%20Diankeyun%20Technology%20NODERP&amp;severity=high&amp;id=683879c8182aa0cae2829670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40548-out-of-bounds-write-in-red-hat-red--69c175de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40548%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=high&amp;id=683879c7182aa0cae282964f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6165-cwe-79-cross-site-scripting-xss-in-u-672e99c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6165%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Restrict%20Usernames%20Emails%20Characters&amp;severity=medium&amp;id=683879c8182aa0cae2829668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6391-cwe-352-cross-site-request-forgery-c-c83fadfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6391%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Custom%20User%20CSS&amp;severity=high&amp;id=68387d4f182aa0cae28316b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7200-cwe-79-cross-site-scripting-xss-in-u-b8bbc087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7200%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20EventON&amp;severity=medium&amp;id=683ee1ec182aa0cae27396e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5943-cwe-79-cross-site-scripting-xss-in-unknown-wp-adv-quiz-264440</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5943%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Wp-Adv-Quiz&amp;severity=high&amp;id=682f60d40acd01a249264440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5124-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-26443e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5124%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682f60d40acd01a24926443e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6530-cwe-79-cross-site-scripting-xss-in-u-4fdb52d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6530%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20TJ%20Shortcodes&amp;severity=medium&amp;id=68387d4f182aa0cae28316b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5956-cwe-79-cross-site-scripting-xss-in-u-bc91764c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5956%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Wp-Adv-Quiz&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7199-cwe-639-authorization-bypass-through-0a4f3d3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7199%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Relevanssi&amp;severity=medium&amp;id=68387d4f182aa0cae28316b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6279-cwe-862-missing-authorization-in-unk-f0c05865</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6279%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Woostify%20Sites%20Library&amp;severity=high&amp;id=683ee1ec182aa0cae27396de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1002-cwe-121-stack-based-buffer-overflow--d8e56ed3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1002%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20N200RE&amp;severity=high&amp;id=68387d4f182aa0cae28316ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-1015-cwe-94-improper-control-of-generatio-7981699a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-1015%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SE-elektronic%20GmbH%20E-DDC3.3&amp;severity=critical&amp;id=683ee1ec182aa0cae27396da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0998-cwe-121-stack-based-buffer-overflow--94a6208b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0998%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20N200RE&amp;severity=high&amp;id=68387d4f182aa0cae28316ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46838-vulnerability-in-linux-linux-d861ee98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46838%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=high&amp;id=683ee1eb182aa0cae27396c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23791-cwe-532-insertion-of-sensitive-info-9f402a97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23791%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20OTRS%20AG%20OTRS&amp;severity=medium&amp;id=68387d4f182aa0cae2831722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0212-cwe-284-improper-access-control-in-c-7edbdc40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0212%3A%20CWE-284%20Improper%20Access%20Control%20in%20Cloudflare%20Cloudflare-WordPress&amp;severity=high&amp;id=68443c7f71f4d251b50d00d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0995-cwe-121-stack-based-buffer-overflow--953b1b81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0995%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W6&amp;severity=high&amp;id=683ee1eb182aa0cae27396be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0993-cwe-121-stack-based-buffer-overflow--bdd58214</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0993%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20i6&amp;severity=high&amp;id=68387d4f182aa0cae28316ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0989-cwe-24-path-traversal-filedir-in-sic-999dc22f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0989%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20Sichuan%20Yougou%20Technology%20KuERP&amp;severity=medium&amp;id=68387d4f182aa0cae28316e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24141-na-b9126b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24141%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d58b7ef31ef0b570878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24139-na-61f7caf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24139%3A%20n%2Fa&amp;severity=high&amp;id=699f6d58b7ef31ef0b570875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24135-na-in-na-68b3dc71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24135%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6841e8e1182aa0cae2eca06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49038-na-in-na-d086ae32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683ee1eb182aa0cae27396ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51842-na-in-na-6467fbf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dfeca182aa0cae252f6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24140-na-in-na-c5d63157</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24140%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68387d4f182aa0cae283178e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24134-na-in-na-2981e745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24134%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4f182aa0cae283178c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22559-na-in-na-6d85051b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22559%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4f182aa0cae2831707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51840-na-in-na-a6c0d6a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51840%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68387d4f182aa0cae28316ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-29-f125d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f125d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0986-cwe-78-os-command-injection-in-issab-a27f034b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0986%3A%20CWE-78%20OS%20Command%20Injection%20in%20Issabel%20PBX&amp;severity=medium&amp;id=68387d4f182aa0cae28316e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23782-cross-site-scripting-xss-in-applepl-108ddcf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23782%3A%20Cross-site%20scripting%20(XSS)%20in%20appleple%20inc.%20a-blog%20cms%20Ver.3.1.x%20series&amp;severity=medium&amp;id=683ee1eb182aa0cae27396b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6200-concurrent-execution-using-shared-re-d7a102d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6200%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20kernel&amp;severity=high&amp;id=6842df031a426642debc96ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0841-null-pointer-dereference-in-red-hat--3326ea52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0841%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68387d4f182aa0cae28316cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23743-na-2ff222dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23743%3A%20n%2Fa&amp;severity=low&amp;id=699f6d53b7ef31ef0b57058b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23742-na-f758766e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23742%3A%20n%2Fa&amp;severity=null&amp;id=699f6d53b7ef31ef0b570587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23738-na-b877004b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23738%3A%20n%2Fa&amp;severity=null&amp;id=699f6d53b7ef31ef0b570583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23741-na-in-na-a68d5fca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23741%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f4260182aa0cae2881851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23739-na-in-na-89deabf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23739%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68387d4f182aa0cae2831715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-28-f12833</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0960-cwe-502-deserialization-in-flink-ext-13667bcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0960%3A%20CWE-502%20Deserialization%20in%20flink-extended%20ai-flow&amp;severity=medium&amp;id=683ee1eb182aa0cae27396b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0618-cwe-80-improper-neutralization-of-sc-f171fa73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0618%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20techjewel%20Contact%20Form%20Plugin%20%E2%80%93%20Fastest%20Contact%20Form%20Builder%20Plugin%20for%20WordPress%20by%20Fluent%20Forms&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0824-cwe-79-improper-neutralization-of-in-c8bcb897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0824%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20timstrifler%20Exclusive%20Addons%20for%20Elementor&amp;severity=medium&amp;id=68387d4f182aa0cae28316c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0697-cwe-22-improper-limitation-of-a-path-504cdb23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0697%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20softaculous%20Backuply%20%E2%80%93%20Backup%2C%20Restore%2C%20Migrate%20and%20Clone&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59031a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0667-cwe-1078-inappropriate-source-code-s-db42ef80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0667%3A%20CWE-1078%20Inappropriate%20Source%20Code%20Style%20or%20Formatting%20in%2010web%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=medium&amp;id=699f6de3b7ef31ef0b59023c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0664-cwe-79-improper-neutralization-of-in-a8bcf692</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0664%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mekshq%20Meks%20Smart%20Social%20Widget&amp;severity=medium&amp;id=683f37c9182aa0cae28696c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22860-na-in-na-3168fc89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22860%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22861-na-in-na-1dc82772</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22861%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68387d4f182aa0cae283170b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52389-na-in-na-503313df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52389%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68387d4f182aa0cae28316ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48202-na-in-na-3067611e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48202%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4f182aa0cae28316a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48201-na-in-na-879b8ea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48201%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4f182aa0cae28316a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-27-f12bbc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23506-insertion-of-sensitive-information--c561bde8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23506%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20InstaWP%20InstaWP%20Connect&amp;severity=null&amp;id=69cd7413e6bfc5ba1def513d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22283-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-delhivery-delhivery-logistics-courier-274158</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22283%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Delhivery%20Delhivery%20Logistics%20Courier&amp;severity=high&amp;id=6830a0ae0acd01a249274158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0946-cwe-918-server-side-request-forgery--71566869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0946%3A%20CWE-918%20Server-Side%20Request%20Forgery%20in%2060IndexPage&amp;severity=high&amp;id=683f37c9182aa0cae28696cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29081-cwe-276-incorrect-default-permissio-95d214ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29081%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Revenera%20InstallShield&amp;severity=medium&amp;id=68387d4e182aa0cae2831693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0939-cwe-434-unrestricted-upload-in-byzor-ab06a198</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0939%3A%20CWE-434%20Unrestricted%20Upload%20in%20Byzoro%20Smart%20S210%20Management%20Platform&amp;severity=medium&amp;id=68387d4f182aa0cae28316e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21336-cwe-357-insufficient-ui-warning-of-dangerous-operations-in-microsoft-microsoft-edge-chromium-based-beaa8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21336%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=low&amp;id=682d9836c4522896dcbeaa8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20253-deserialization-of-untrusted-data-i-6b3580c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20253%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Cisco%20Cisco%20Unified%20Contact%20Center%20Enterprise&amp;severity=critical&amp;id=68387d4f182aa0cae28316f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20305-improper-neutralization-of-input-du-92b18cfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20305%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=medium&amp;id=683f37c9182aa0cae28696cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0933-cwe-434-unrestricted-upload-in-niush-c847cf73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0933%3A%20CWE-434%20Unrestricted%20Upload%20in%20Niushop%20B2B2C&amp;severity=medium&amp;id=68387d4f182aa0cae28316d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0931-cwe-121-stack-based-buffer-overflow--a7d6212d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0931%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=medium&amp;id=683f3b5c182aa0cae287157a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21985-cwe-269-improper-privilege-manageme-cf95e1cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21985%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20NetApp%20ONTAP%209&amp;severity=high&amp;id=68387d4f182aa0cae28316f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0929-cwe-121-stack-based-buffer-overflow--56e8afb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0929%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=medium&amp;id=68387d4f182aa0cae28316d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0927-cwe-121-stack-based-buffer-overflow--388288a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0927%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=medium&amp;id=68387d4f182aa0cae28316d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0926-cwe-121-stack-based-buffer-overflow--32afcf09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0926%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=medium&amp;id=68387d4f182aa0cae28316d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6291-url-redirection-to-untrusted-site-op-c60b786b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6291%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2022&amp;severity=high&amp;id=68e7a23aba0e608b4f980f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0923-cwe-121-stack-based-buffer-overflow--1653246b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0923%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20AC10U&amp;severity=medium&amp;id=683f3b5c182aa0cae2871578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23896-cwe-79-improper-neutralization-of-i-c1d36dd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23896%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283178a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23894-cwe-79-improper-neutralization-of-i-7fd15a11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23894%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23893-cwe-79-improper-neutralization-of-i-38444f28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23893%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23892-cwe-79-improper-neutralization-of-i-a52be613</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23892%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23890-cwe-79-improper-neutralization-of-i-cb0c20c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23890%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23889-cwe-79-improper-neutralization-of-i-da6e3ceb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23889%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23888-cwe-79-improper-neutralization-of-i-0846bedd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23888%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283177e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23887-cwe-79-improper-neutralization-of-i-b813b10d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23887%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23886-cwe-79-improper-neutralization-of-i-65261569</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23886%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23885-cwe-79-improper-neutralization-of-i-9545f257</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23885%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283176e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23884-cwe-79-improper-neutralization-of-i-59131ebd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23884%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283176c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23883-cwe-79-improper-neutralization-of-i-7e3bf1ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23883%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283176a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23882-cwe-79-improper-neutralization-of-i-be0d2620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23880-cwe-79-improper-neutralization-of-i-b855556b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23880%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23879-cwe-79-improper-neutralization-of-i-1b5b8132</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23879%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23878-cwe-79-improper-neutralization-of-i-db93d551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23877-cwe-79-improper-neutralization-of-i-3e3a080c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23877%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23875-cwe-79-improper-neutralization-of-i-195103a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23875%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23874-cwe-79-improper-neutralization-of-i-63548af0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23874%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23873-cwe-79-improper-neutralization-of-i-c258d818</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283174f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23872-cwe-79-improper-neutralization-of-i-62f74540</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23872%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283174d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23871-cwe-79-improper-neutralization-of-i-b20d181f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23871%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283174b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23870-cwe-79-improper-neutralization-of-i-8b996c91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23870%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23869-cwe-79-improper-neutralization-of-i-2fb8c2bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23869%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23867-cwe-79-improper-neutralization-of-i-5a766241</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23867%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23866-cwe-79-improper-neutralization-of-i-98a42ade</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23866%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23865-cwe-79-improper-neutralization-of-i-a53ca1b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23865%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23864-cwe-79-improper-neutralization-of-i-1a5468aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23864%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23863-cwe-79-improper-neutralization-of-i-7ec2cd8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23863%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23862-cwe-79-improper-neutralization-of-i-b7ef3e3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23862%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23861-cwe-79-improper-neutralization-of-i-d4639aff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23861%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283172e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23860-cwe-79-improper-neutralization-of-i-67d97adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23860%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283172c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23858-cwe-79-improper-neutralization-of-i-32b8a524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23858%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae283172a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23857-cwe-79-improper-neutralization-of-i-f03714cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23857%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23856-cwe-79-improper-neutralization-of-i-00fd2982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23856%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0727-cwe-476-null-pointer-dereference-in--f7f78797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0727%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=68387d4f182aa0cae28316c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23388-improper-authorization-in-handler-f-36152d3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23388%3A%20Improper%20authorization%20in%20handler%20for%20custom%20URL%20scheme%20in%20Mercari%2C%20Inc.%20%22Mercari%22%20App%20for%20Android&amp;severity=medium&amp;id=683f3b5c182aa0cae287157f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5612-cwe-862-missing-authorization-in-gitlab-gitlab-253fbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5612%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6159-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253fc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6159%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5933-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-gitlab-gitlab-253fc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5933%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0456-cwe-425-direct-request-forced-browsi-d586bd45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0456%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=68387d4f182aa0cae28316b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0402-cwe-22-improper-limitation-of-a-path-d09d8199</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0402%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GitLab%20GitLab&amp;severity=critical&amp;id=683f3b5c182aa0cae2871572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21387-cwe-357-insufficient-ui-warning-of-dangerous-operations-in-microsoft-microsoft-edge-chromium-based-beabf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21387%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeabf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21385-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-beabd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21385%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d9836c4522896dcbeabd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21383-cwe-347-improper-verification-of-cryptographic-signature-in-microsoft-microsoft-edge-chromium-based-beabcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21383%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=low&amp;id=682d9836c4522896dcbeabcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21382-cwe-942-permissive-cross-domain-policy-with-untrusted-domains-in-microsoft-microsoft-edge-chromium-based-beabc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21382%3A%20CWE-942%3A%20Permissive%20Cross-domain%20Policy%20with%20Untrusted%20Domains%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeabc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21326-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-beaa6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21326%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=critical&amp;id=682d9836c4522896dcbeaa6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22550-na-6c804dbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22550%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b57015a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38317-na-in-na-4a5e1155</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38317%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f3b5c182aa0cae2871570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22551-na-in-na-000b9a7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22551%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4f182aa0cae2831705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22545-na-in-na-0688492e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22545%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68387d4f182aa0cae2831703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48128-na-in-na-f03caa37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48128%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4e182aa0cae2831699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48126-na-in-na-b49e071c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48126%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4e182aa0cae2831697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38323-na-in-na-da07f469</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38323%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68387d4e182aa0cae2831695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-26-f12d2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23627-cwe-77-improper-neutralization-of-s-b3575efe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23627%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Motorola%20MR2600&amp;severity=critical&amp;id=68387d4f182aa0cae2831713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23625-cwe-77-improper-neutralization-of-s-7caa18e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23625%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20D-Link%20DAP-1650&amp;severity=critical&amp;id=68387d4f182aa0cae2831711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23621-cwe-131-incorrect-calculation-of-bu-25414ed7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23621%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20IBM%20Merge%20Healthcare%20eFilm%20Workstation&amp;severity=critical&amp;id=683f3ee7182aa0cae28796dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23615-cwe-119-improper-restriction-of-ope-8ef42b83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23615%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Symantec%20Messaging%20Gateway&amp;severity=critical&amp;id=68387d4f182aa0cae283170f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23613-cwe-119-improper-restriction-of-ope-35f2c75c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23613%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Symantec%20Deployment%20Solution&amp;severity=critical&amp;id=68387d4f182aa0cae283170d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21620-cwe-79-improper-neutralization-of-i-148ca31a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21620%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=68387d4f182aa0cae28316f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0890-cwe-89-sql-injection-in-hongmaple-oc-c3463a1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0890%3A%20CWE-89%20SQL%20Injection%20in%20hongmaple%20octopus&amp;severity=medium&amp;id=683f3ee7182aa0cae28796da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0887-cwe-404-denial-of-service-in-mafiati-5c9a416e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0887%3A%20CWE-404%20Denial%20of%20Service%20in%20Mafiatic%20Blue%20Server&amp;severity=medium&amp;id=68387d4f182aa0cae28316cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0884-cwe-89-sql-injection-in-sourcecodest-176f5c45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0884%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Online%20Tours%20%26%20Travels%20Management%20System&amp;severity=medium&amp;id=683f3ee7182aa0cae28796d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52356-heap-based-buffer-overflow-8e3272c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52356%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=69092147fe7723195e054043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52355-out-of-bounds-write-bebe53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52355%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=682d9838c4522896dcbebe53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23656-cwe-326-inadequate-encryption-stren-c60f5728</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23656%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20dexidp%20dex&amp;severity=high&amp;id=683f3ee7182aa0cae28796de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21630-cwe-862-missing-authorization-in-zu-553f65fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21630%3A%20CWE-862%3A%20Missing%20Authorization%20in%20zulip%20zulip&amp;severity=medium&amp;id=68387d4f182aa0cae28316f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0883-cwe-89-sql-injection-in-sourcecodest-7678b375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0883%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Online%20Tours%20%26%20Travels%20Management%20System&amp;severity=medium&amp;id=68387d4f182aa0cae28316cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7227-cwe-77-improper-neutralization-of-sp-4f3c7c64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7227%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20SystemK%20NVR%20504&amp;severity=critical&amp;id=68387d4f182aa0cae28316b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6267-improper-handling-of-exceptional-con-d913dbd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6267%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Quarkus%202.13.9.Final&amp;severity=high&amp;id=68e7a23aba0e608b4f980f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0880-cwe-352-cross-site-request-forgery-i-63fb1e01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0880%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20in%20Qidianbang%20qdbcrm&amp;severity=medium&amp;id=683f3ee7182aa0cae28796d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40547-out-of-bounds-write-in-red-hat-red--5adfbff1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40547%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3181-cwe-379-creation-of-temporary-file-i-6c167431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3181%3A%20CWE-379%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20Splashtop%20Splashtop%20Software%20Updater&amp;severity=high&amp;id=683f3ee7182aa0cae28796d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0822-weak-authentication-43a422c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0822%3A%20Weak%20Authentication&amp;severity=high&amp;id=68e7a5cfba0e608b4f98d83d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23855-cwe-79-improper-neutralization-of-i-1ff0c712</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23855%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cups%20Easy%20Cups%20Easy%20(Purchase%20%26%20Inventory)&amp;severity=high&amp;id=68387d4f182aa0cae2831724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22099-cwe-476-null-pointer-dereference-in-715ba139</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22099%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Linux%20Linux%20kernel&amp;severity=medium&amp;id=6842df031a426642debc9704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0625-cwe-79-improper-neutralization-of-in-c24b982c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0625%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20syammohanm%20WPFront%20Notification%20Bar&amp;severity=medium&amp;id=68387d4f182aa0cae28316c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0688-cwe-80-improper-neutralization-of-sc-4e39b794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0688%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20joshfraz%20WebSub%20(FKA.%20PubSubHubbub)&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0624-cwe-352-cross-site-request-forgery-c-11b23405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0624%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0617-cwe-862-missing-authorization-in-vid-2f6c3849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0617%3A%20CWE-862%20Missing%20Authorization%20in%20vidishp%20Category%20Discount%20Woocommerce&amp;severity=medium&amp;id=699f6de0b7ef31ef0b59000b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22637-na-3f889fc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22637%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b570166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24399-na-in-na-cca734b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24399%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841e8e1182aa0cae2eca076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22922-na-in-na-5206ed6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22922%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6840c579182aa0cae2c16af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22729-na-in-na-a38242db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22729%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6840c579182aa0cae2c16af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22529-na-in-na-4e7e5568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6840c579182aa0cae2c16aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23985-na-in-na-be3cb9cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23985%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c098182aa0cae2b3b738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22638-na-in-na-4b1e9c4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22638%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c098182aa0cae2b3b720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22636-na-in-na-7b86e2fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22636%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c098182aa0cae2b3b71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52046-na-in-na-656f1f2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52046%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33759-na-in-na-741633c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33759%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c098182aa0cae2b3b6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22639-na-in-na-2ab6d83e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22639%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387d4f182aa0cae2831709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51833-na-in-na-117f3185</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51833%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68387d4f182aa0cae28316aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-25-f12948</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23646-cwe-89-improper-neutralization-of-s-6237ac80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23646%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pimcore%20admin-ui-classic-bundle&amp;severity=high&amp;id=6839c098182aa0cae2b3b72c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23644-cwe-113-improper-neutralization-of--5562f9b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23644%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20(&apos;HTTP%20Request%2FResponse%20Splitting&apos;)%20in%20trillium-rs%20trillium&amp;severity=medium&amp;id=6839c098182aa0cae2b3b72a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23649-cwe-285-improper-authorization-in-l-6b657c4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23649%3A%20CWE-285%3A%20Improper%20Authorization%20in%20LemmyNet%20lemmy&amp;severity=high&amp;id=6839c098182aa0cae2b3b72e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23902-vulnerability-in-jenkins-project-je-e82fa34b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23902%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitLab%20Branch%20Source%20Plugin&amp;severity=medium&amp;id=6839c098182aa0cae2b3b736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23901-vulnerability-in-jenkins-project-je-35d52e79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23901%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20GitLab%20Branch%20Source%20Plugin&amp;severity=medium&amp;id=6839c098182aa0cae2b3b730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23899-vulnerability-in-jenkins-project-je-3bb722af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23899%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Git%20server%20Plugin&amp;severity=medium&amp;id=6840c579182aa0cae2c16b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23897-vulnerability-in-jenkins-project-je-a99c8690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23897%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=critical&amp;id=68f7d9b2247d717aace269c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44281-cwe-264-permissions-privileges-and--c7e667c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44281%3A%20CWE-264%3A%20Permissions%2C%20Privileges%20and%20Access%20Controls%20in%20Dell%20Dell%20Pair&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50943-cwe-502-deserialization-of-untruste-f88ed5cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50943%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=6839c098182aa0cae2b3b6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22152-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-webtoffee-product-import-export-for-woocommerce-274156</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22152%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WebToffee%20Product%20Import%20Export%20for%20WooCommerce&amp;severity=high&amp;id=6830a0ae0acd01a249274156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22309-cwe-502-deserialization-of-untrusted-data-in-quantumcloud-chatbot-with-ai-274162</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22309%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20QuantumCloud%20ChatBot%20with%20AI&amp;severity=high&amp;id=6830a0ae0acd01a249274162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0854-url-redirection-to-untrusted-site-op-e8d08abd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0854%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=6839c098182aa0cae2b3b711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0665-cwe-79-improper-neutralization-of-in-35c3cd34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0665%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vprat%20WP%20Customer%20Area&amp;severity=medium&amp;id=699f6de3b7ef31ef0b590237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31037-cwe-94-improper-control-of-generati-8a37daac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31037%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20NVIDIA%20Bluefield%202%20DPU%20BMC%2C%20BlueField%203%20DPU%20BMC&amp;severity=high&amp;id=68487f5a1b0bd07c3938ab6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22380-xml-external-entities-xxe-in-minist-0c847a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22380%3A%20XML%20external%20entities%20(XXE)%20in%20Ministry%20of%20Agriculture%2C%20Forestry%20and%20Fisheries%20Electronic%20Delivery%20Check%20System%20(Ministry%20of%20Agriculture%2C%20Forestry%20and%20Fisheries%20The%20Agriculture%20and%20Rural%20Development%20Project%20Version)%20March%2C%20Heisei%2031%20era%20edition&amp;severity=medium&amp;id=6841c24d182aa0cae2e60e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22651-na-41c79652</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22651%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4bb7ef31ef0b570169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24676-na-88cdbe70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24676%3A%20n%2Fa&amp;severity=high&amp;id=68f27d809c34d0947f370a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22720-na-in-na-a414fa7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22720%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6841d069182aa0cae2e88621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22725-na-in-na-158d2cd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22725%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52039-na-in-na-8883c135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c098182aa0cae2b3b6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52038-na-in-na-628b8bdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c098182aa0cae2b3b6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51886-na-in-na-92ed91ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51886%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c098182aa0cae2b3b6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51885-na-in-na-90a5f2c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51885%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c098182aa0cae2b3b6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51711-na-in-na-5a1e78f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51711%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c098182aa0cae2b3b6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44001-na-in-na-77b31ca7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44001%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43991-na-in-na-9b9bd98f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43991%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43990-na-in-na-b3118f9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43990%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42147-na-in-na-3f690b15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42147%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c098182aa0cae2b3b6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-24-f12359</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0809-inappropriate-implementation-in-google-chrome-aec65a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0809%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682cd0fb1484d88663aec65a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0804-insufficient-policy-enforcement-in-google-chrome-2644fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0804%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=high&amp;id=682f64490acd01a2492644fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0814-incorrect-security-ui-in-google-chro-819f6610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0814%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=6839c098182aa0cae2b3b70f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0810-insufficient-policy-enforcement-in-google-chrome-2644fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0810%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682f64490acd01a2492644fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0808-integer-underflow-in-google-chrome-bdc4b1a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0808%3A%20Integer%20underflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=6839c098182aa0cae2b3b70b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0812-inappropriate-implementation-in-goog-1c591122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0812%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=6839c098182aa0cae2b3b70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23453-use-of-hard-coded-credentials-in-sp-34841c12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23453%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Spoon%20Radio%20Japan%20Inc.%20Android%20Spoon%20application&amp;severity=medium&amp;id=68406659182aa0cae2b37ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47115-cwe-79-improper-neutralization-of-i-22a29416</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47115%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20HumanSignal%20label-studio&amp;severity=high&amp;id=6839c098182aa0cae2b3b6d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52328-vulnerability-in-trend-micro-inc-tr-2727f45b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52328%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=6839c098182aa0cae2b3b701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52327-vulnerability-in-trend-micro-inc-tr-8a7b11c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52327%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=medium&amp;id=68487f531b0bd07c39389f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52324-vulnerability-in-trend-micro-inc-tr-a92c41f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52324%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20Central&amp;severity=high&amp;id=6839c098182aa0cae2b3b6ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47200-vulnerability-in-trend-micro-inc-tr-21203d71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47200%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6839c098182aa0cae2b3b6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47199-vulnerability-in-trend-micro-inc-tr-6e758069</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47199%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6839c098182aa0cae2b3b6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47194-vulnerability-in-trend-micro-inc-tr-564e101f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47194%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=6839c098182aa0cae2b3b6d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41178-vulnerability-in-trend-micro-inc-tr-2093e677</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41178%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Mobile%20Security%20for%20Enterprise&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41177-vulnerability-in-trend-micro-inc-tr-66445c33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41177%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Mobile%20Security%20for%20Enterprise&amp;severity=medium&amp;id=6839c098182aa0cae2b3b6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23330-cwe-918-server-side-request-forgery-a74e0956</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23330%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20tutao%20tutanota&amp;severity=medium&amp;id=6839c098182aa0cae2b3b726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50274-vulnerability-in-hewlett-packard-en-3897211d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50274%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20HPE%20OneView&amp;severity=high&amp;id=6839c098182aa0cae2b3b6e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0754-crash-when-using-some-wasm-files-in-devtools-in-mozilla-firefox-2644f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0754%3A%20Crash%20when%20using%20some%20WASM%20files%20in%20devtools%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682f64490acd01a2492644f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0743-crash-in-nss-tls-method-in-mozilla-f-80f4bca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0743%3A%20Crash%20in%20NSS%20TLS%20method%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6839c098182aa0cae2b3b707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0755-memory-safety-bugs-fixed-in-firefox-122-firefox-esr-115-7-and-thunderbird-115-7-in-mozilla-firefox-2644f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0755%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20122%2C%20Firefox%20ESR%20115.7%2C%20and%20Thunderbird%20115.7%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682f64490acd01a2492644f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0753-hsts-policy-on-subdomain-could-bypas-aaa6e987</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0753%3A%20HSTS%20policy%20on%20subdomain%20could%20bypass%20policy%20of%20upper%20domain%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6839c098182aa0cae2b3b709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0749-phishing-site-popup-could-show-local-origin-in-address-bar-in-mozilla-firefox-2644f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0749%3A%20Phishing%20site%20popup%20could%20show%20local%20origin%20in%20address%20bar%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682f64490acd01a2492644f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0747-bypass-of-content-security-policy-when-directive-unsafe-inline-was-set-in-mozilla-firefox-2644d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0747%3A%20Bypass%20of%20Content%20Security%20Policy%20when%20directive%20unsafe-inline%20was%20set%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682f64490acd01a2492644d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0742-failure-to-update-user-input-timesta-bdda6d6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0742%3A%20Failure%20to%20update%20user%20input%20timestamp%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6839c098182aa0cae2b3b705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0741-out-of-bounds-write-in-angle-in-mozi-39aff995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0741%3A%20Out%20of%20bounds%20write%20in%20ANGLE%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6839c098182aa0cae2b3b703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0703-cwe-79-improper-neutralization-of-in-cc44c5a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0703%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpcalc%20Sticky%20Buttons%20%E2%80%93%20floating%20buttons%20builder&amp;severity=medium&amp;id=699f6de4b7ef31ef0b5903a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23348-improper-input-validation-in-applep-b1c72afe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23348%3A%20Improper%20input%20validation%20in%20appleple%20inc.%20a-blog%20cms%20Ver.3.1.x%20series&amp;severity=high&amp;id=6839c098182aa0cae2b3b728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23182-relative-path-traversal-in-appleple-f7c66eec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23182%3A%20Relative%20path%20traversal%20in%20appleple%20inc.%20a-blog%20cms%20Ver.3.1.x%20series&amp;severity=high&amp;id=6839c098182aa0cae2b3b724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23180-improper-input-validation-in-applep-dd6be77d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23180%3A%20Improper%20input%20validation%20in%20appleple%20inc.%20a-blog%20cms%20Ver.3.1.x%20series&amp;severity=high&amp;id=68406659182aa0cae2b37abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0587-cwe-79-improper-neutralization-of-in-878cd3cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0587%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mohammed_kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages&amp;severity=medium&amp;id=699f6ddeb7ef31ef0b58fe01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22770-cwe-20-improper-input-validation-in-hitron-systems-dvr-hvr-16781-261e02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22770%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hitron%20Systems%20DVR%20HVR-16781&amp;severity=high&amp;id=682f3d940acd01a249261e02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22769-cwe-20-improper-input-validation-in-1eb12438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22769%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hitron%20Systems%20DVR%20HVR-8781&amp;severity=high&amp;id=6839c098182aa0cae2b3b722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22768-cwe-20-improper-input-validation-in-ecd23ec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22768%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hitron%20Systems%20DVR%20HVR-4781&amp;severity=high&amp;id=6839c41d182aa0cae2b435da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39197-out-of-bounds-read-in-red-hat-red-h-9a514bdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39197%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=6839c41d182aa0cae2b43562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23218-an-attacker-may-be-able-to-decrypt--c51b55fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23218%3A%20An%20attacker%20may%20be%20able%20to%20decrypt%20legacy%20RSA%20PKCS%231%20v1.5%20ciphertexts%20without%20having%20the%20private%20key%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68406659182aa0cae2b37ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42887-an-app-may-be-able-to-read-arbitrar-4ba342d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42887%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a43a16d939959c8fde075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23222-processing-maliciously-crafted-web--4b76a320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23222%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20This%20fix%20associated%20with%20the%20Coruna%20exploit%20was%20shipped%20in%20iOS%2017.3%20on%20January%2022%2C%202024.%20This%20update%20brings%20that%20fix%20to%20devices%20that%20cannot%20update%20to%20the%20latest%20iOS%20version.%20in%20Apple%20Safari&amp;severity=high&amp;id=683f45d9182aa0cae28897fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42937-an-app-may-be-able-to-access-sensit-ad7af3f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42937%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a43a16d939959c8fde092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23214-processing-maliciously-crafted-web--177c9c7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23214%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6839c41d182aa0cae2b435f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23215-an-app-may-be-able-to-access-user-s-bc7720d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23215%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6839c41d182aa0cae2b435f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23203-a-shortcut-may-be-able-to-use-sensi-aa2523c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23203%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6839c41d182aa0cae2b435ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23223-an-app-may-be-able-to-access-sensit-47e9b58d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23223%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68406659182aa0cae2b37ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23219-stolen-device-protection-may-be-une-07fe1a5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23219%3A%20Stolen%20Device%20Protection%20may%20be%20unexpectedly%20disabled%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68406659182aa0cae2b37ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23204-a-shortcut-may-be-able-to-use-sensi-b12b2199</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23204%3A%20A%20shortcut%20may%20be%20able%20to%20use%20sensitive%20data%20with%20certain%20actions%20without%20prompting%20the%20user%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6839c41d182aa0cae2b435ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23212-an-app-may-be-able-to-execute-arbit-d197cb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23212%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=6839c41d182aa0cae2b435f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23208-an-app-may-be-able-to-execute-arbit-731041f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23208%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68406659182aa0cae2b37ac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42881-processing-a-file-may-lead-to-unexp-94329d8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42881%3A%20Processing%20a%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ea730e5a3d9d782d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23224-an-app-may-be-able-to-access-sensit-9c813b87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23224%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a474e6d939959c802256d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23209-processing-web-content-may-lead-to--b9fab0f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23209%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=6839c41d182aa0cae2b435f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23213-processing-web-content-may-lead-to--a98086eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23213%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=69ceb81de6bfc5ba1df6e17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23210-an-app-may-be-able-to-view-a-users--ced77aef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23210%3A%20An%20app%20may%20be%20able%20to%20view%20a%20user&apos;s%20phone%20number%20in%20system%20logs%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=68406659182aa0cae2b37ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23206-a-maliciously-crafted-webpage-may-be-able-to-fingerprint-the-user-in-apple-ios-and-ipados-aec637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23206%3A%20A%20maliciously%20crafted%20webpage%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20Safari&amp;severity=medium&amp;id=682cd0fb1484d88663aec637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23207-an-app-may-be-able-to-access-sensit-5405c88b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23207%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68406659182aa0cae2b37abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23211-a-users-private-browsing-activity-m-c633ff21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23211%3A%20A%20user&apos;s%20private%20browsing%20activity%20may%20be%20visible%20in%20Settings%20in%20Apple%20Safari&amp;severity=low&amp;id=690a474e6d939959c802254c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40528-an-app-may-be-able-to-bypass-privac-6d514f8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40528%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a439f6d939959c8fddc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42935-a-local-attacker-may-be-able-to-vie-b6f12341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42935%3A%20A%20local%20attacker%20may%20be%20able%20to%20view%20the%20previous%20logged%20in%20user%E2%80%99s%20desktop%20from%20the%20fast%20user%20switching%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a43a16d939959c8fde08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42888-processing-a-maliciously-crafted-im-011f911e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42888%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a43a16d939959c8fde07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23217-an-app-may-be-able-to-bypass-certain-privacy-preferences-in-apple-ios-and-ipados-aec61a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23217%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=682cd0fb1484d88663aec61a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22490-na-c67cda65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22490%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b5700fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23850-na-43560651</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23850%3A%20n%2Fa&amp;severity=medium&amp;id=690a475b6d939959c8022d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36177-na-1289fd03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36177%3A%20n%2Fa&amp;severity=critical&amp;id=690904ab00ff46172d4a0165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51210-na-in-na-66234a40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51210%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22496-na-in-na-de8981bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22496%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6842df031a426642debc97d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22705-na-in-na-8b2e7c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22705%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6842df031a426642debc9709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23851-na-in-na-a6993397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23851%3A%20n%2Fa&amp;severity=medium&amp;id=68406659182aa0cae2b37ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23849-na-in-na-4a673746</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23849%3A%20n%2Fa&amp;severity=medium&amp;id=6839c41e182aa0cae2b43628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23848-na-in-na-d1997646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23848%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c41e182aa0cae2b43626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22663-na-in-na-9859722d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22663%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b435d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22497-na-in-na-f4d17c2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22497%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c41d182aa0cae2b435d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45889-na-in-na-800efe6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45889%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c41d182aa0cae2b43573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42143-na-in-na-9b3d3555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42143%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c41d182aa0cae2b43571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35835-na-in-na-04269dc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35835%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b43560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31654-na-in-na-cc813bf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31654%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b4355e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-23-e680a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-23&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e680a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-23-f12d55</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23345-cwe-79-improper-neutralization-of-i-a6064610</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23345%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nautobot%20nautobot&amp;severity=high&amp;id=6839c41d182aa0cae2b435ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23342-cwe-203-observable-discrepancy-in-t-7d4b563f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23342%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20tlsfuzzer%20python-ecdsa&amp;severity=high&amp;id=6839c41d182aa0cae2b435fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23340-cwe-22-improper-limitation-of-a-pat-2f490ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23340%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20honojs%20node-server&amp;severity=medium&amp;id=6839c41d182aa0cae2b435fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47158-cwe-20-improper-input-validation-in-878f47b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47158%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6839c41d182aa0cae2b4357b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47152-cwe-209-generation-of-error-message-2270f8b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47152%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=6839c41d182aa0cae2b43579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6626-cwe-79-cross-site-scripting-xss-in-u-dfe18d08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6626%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Product%20Enquiry%20for%20WooCommerce&amp;severity=medium&amp;id=6839c41d182aa0cae2b43596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7194-cwe-79-cross-site-scripting-xss-in-u-f0dc698c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7194%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Meris&amp;severity=medium&amp;id=6839c41d182aa0cae2b4359c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7170-cwe-79-cross-site-scripting-xss-in-u-a9920bc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7170%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20EventON-RSVP&amp;severity=medium&amp;id=6839c41d182aa0cae2b4359a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50308-cwe-20-improper-input-validation-in-b5fde761</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50308%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=medium&amp;id=68487f531b0bd07c39389f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0204-cwe-425-direct-request-forced-browsi-df7d9489</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0204%3A%20CWE-425%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20Fortra%20GoAnywhere%20MFT&amp;severity=critical&amp;id=6839c41d182aa0cae2b4359e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0784-cwe-89-sql-injection-in-hongmaple-oc-cc7ede86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0784%3A%20CWE-89%20SQL%20Injection%20in%20hongmaple%20octopus&amp;severity=medium&amp;id=6839c41d182aa0cae2b435ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0783-cwe-434-unrestricted-upload-in-proje-159c9a15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0783%3A%20CWE-434%20Unrestricted%20Upload%20in%20Project%20Worlds%20Online%20Admission%20System&amp;severity=medium&amp;id=6839c41d182aa0cae2b435c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0778-cwe-78-os-command-injection-in-univi-28b35f4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0778%3A%20CWE-78%20OS%20Command%20Injection%20in%20Uniview%20ISC%202500-S&amp;severity=high&amp;id=6839c41d182aa0cae2b435bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36772-cwe-73-external-control-of-file-nam-f526d90b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36772%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Cloudlinux%20OS%20cagefs&amp;severity=medium&amp;id=6839c41d182aa0cae2b4355c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0775-use-after-free-5eed4ba6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0775%3A%20Use%20After%20Free&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22895-na-in-na-8c180f1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22895%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e88625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23771-na-in-na-e2786d8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23771%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41e182aa0cae2b43624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23770-na-in-na-97b86ef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23770%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c41d182aa0cae2b4361e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23768-na-in-na-df93c095</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23768%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b4361c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23752-na-in-na-344f2f4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23752%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b4361a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47352-na-in-na-2954890c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47352%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b4357d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-20189-na-in-na-dca37c35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-20189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b4355a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-22-f12c13</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0773-cwe-79-cross-site-scripting-in-codea-2145fd3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0773%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20CodeAstro%20Internet%20Banking%20System&amp;severity=low&amp;id=6839c41d182aa0cae2b435bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0771-cwe-119-memory-corruption-in-nsasoft-product-key-explorer-bd8325</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0771%3A%20CWE-119%20Memory%20Corruption%20in%20Nsasoft%20Product%20Key%20Explorer&amp;severity=medium&amp;id=682d9818c4522896dcbd8325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0770-cwe-276-incorrect-default-permission-aa54d562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0770%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20European%20Chemicals%20Agency%20IUCLID&amp;severity=medium&amp;id=6839c41d182aa0cae2b435bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6531-concurrent-execution-using-shared-re-e801cae3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6531%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=high&amp;id=690a47466d939959c80222b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0769-cwe-22-path-traversal-in-d-link-dir--b6907c69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0769%3A%20CWE-22%20Path%20Traversal%20in%20D-Link%20DIR-859&amp;severity=medium&amp;id=68f7d9b0247d717aace268a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23744-na-in-na-c6ddd2ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23744%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68406659182aa0cae2b37adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23731-na-in-na-fad50938</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23731%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68406659182aa0cae2b37add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23730-na-in-na-bb3255d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23730%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b43618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23726-na-in-na-fa4c5416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23726%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b43616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23725-na-in-na-89051042</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23725%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839c41d182aa0cae2b43614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52353-na-in-na-4b4513fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52353%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b43590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-21-f12b36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0521-cwe-94-improper-control-of-generatio-705d02ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0521%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20paddlepaddle%20paddlepaddle%2Fpaddle&amp;severity=critical&amp;id=6839c41d182aa0cae2b435a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7063-cwe-79-improper-neutralization-of-in-30c0c92e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7063%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WPForms%20WPForms%20Pro&amp;severity=high&amp;id=6839c41d182aa0cae2b43598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0679-cwe-862-missing-authorization-in-the-bef99e56</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0679%3A%20CWE-862%20Missing%20Authorization%20in%20themegrill%20ColorMag&amp;severity=medium&amp;id=6839c41d182aa0cae2b435a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0623-cwe-352-cross-site-request-forgery-c-037338e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0623%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20vektor-inc%20VK%20Block%20Patterns&amp;severity=medium&amp;id=699f6de0b7ef31ef0b590022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51926-na-in-na-4afe3269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51926%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b43583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51892-na-in-na-882da5de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51892%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b43581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-20-f130d6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f130d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23332-cwe-672-operation-on-a-resource-aft-14b24c49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23332%3A%20CWE-672%3A%20Operation%20on%20a%20Resource%20after%20Expiration%20or%20Release%20in%20notaryproject%20specifications&amp;severity=medium&amp;id=6839c41d182aa0cae2b435f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23688-cwe-323-reusing-a-nonce-key-pair-in-2d663c4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23688%3A%20CWE-323%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption&amp;severity=medium&amp;id=692a5c732a13ea799fd8c866</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23687-264654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23687&amp;severity=critical&amp;id=682f6b520acd01a249264654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23686-cwe-532-insertion-of-sensitive-info-ba2ec986</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23686%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&amp;severity=medium&amp;id=692a51f32a13ea799fcc56f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23685-a183ad34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23685&amp;severity=medium&amp;id=6839c41d182aa0cae2b43610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23689-cwe-209-generation-of-error-message-a74225a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23689%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information&amp;severity=high&amp;id=6839c41d182aa0cae2b43612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23684-cwe-407-inefficient-algorithmic-com-695e4eea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23684%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity&amp;severity=high&amp;id=692a51f32a13ea799fcc56ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23681-cwe-284-improper-access-control-94ace958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23681%3A%20CWE-284%20Improper%20Access%20Control&amp;severity=high&amp;id=68406659182aa0cae2b37adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22420-cwe-79-improper-neutralization-of-i-98e126d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22420%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jupyterlab%20jupyterlab&amp;severity=medium&amp;id=6839c41d182aa0cae2b435d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23683-175b48fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23683&amp;severity=high&amp;id=6929d3a04121026312b80a95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23680-cwe-347-improper-verification-of-cr-3cdb2b41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23680%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature&amp;severity=medium&amp;id=692a51f32a13ea799fcc56e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0734-cwe-89-sql-injection-in-smsot-de019992</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0734%3A%20CWE-89%20SQL%20Injection%20in%20Smsot&amp;severity=medium&amp;id=6839c41d182aa0cae2b435b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23679-cwe-384-session-fixation-6fff593a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23679%3A%20CWE-384%20Session%20Fixation&amp;severity=critical&amp;id=6839c41d182aa0cae2b4360e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0758-cwe-79-improper-neutralization-of-in-6a434872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0758%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6839c41d182aa0cae2b435b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23682-cwe-501-trust-boundary-violation-e4fae14d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23682%3A%20CWE-501%20Trust%20Boundary%20Violation&amp;severity=high&amp;id=6929d3a04121026312b80a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6044-cwe-290-authentication-bypass-by-spo-700148ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6044%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Lenovo%20Vantage&amp;severity=medium&amp;id=6839c41d182aa0cae2b43594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5081-cwe-497-exposure-of-sensitive-system-6db3d523</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5081%3A%20CWE-497%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Lenovo%20Tablet&amp;severity=low&amp;id=6839c41d182aa0cae2b43592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29495-escalation-of-privilege-in-intel-nuc-bios-firmware-bd78f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29495%3A%20escalation%20of%20privilege%20in%20Intel%20NUC%20BIOS%20firmware&amp;severity=high&amp;id=682d9817c4522896dcbd78f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0732-cwe-404-denial-of-service-in-pcman-ftp-server-bd78cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0732%3A%20CWE-404%20Denial%20of%20Service%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=682d9817c4522896dcbd78cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22211-cwe-190-integer-overflow-or-wraparo-a4e7caec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22211%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20FreeRDP%20FreeRDP&amp;severity=low&amp;id=6839c41d182aa0cae2b435d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0731-cwe-404-denial-of-service-in-pcman-f-6b8faff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0731%3A%20CWE-404%20Denial%20of%20Service%20in%20PCMan%20FTP%20Server&amp;severity=medium&amp;id=6839c41d182aa0cae2b435b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0729-cwe-89-sql-injection-in-foru-cms-e59b32f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0729%3A%20CWE-89%20SQL%20Injection%20in%20ForU%20CMS&amp;severity=medium&amp;id=6839c41d182aa0cae2b435b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0728-cwe-73-file-inclusion-in-foru-cms-bd78c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0728%3A%20CWE-73%20File%20Inclusion%20in%20ForU%20CMS&amp;severity=medium&amp;id=682d9817c4522896dcbd78c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0723-cwe-404-denial-of-service-in-freessh-41fcef07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0723%3A%20CWE-404%20Denial%20of%20Service%20in%20freeSSHd&amp;severity=medium&amp;id=6839c41d182aa0cae2b435b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0721-cwe-79-cross-site-scripting-in-jspxc-47adecc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0721%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Jspxcms&amp;severity=low&amp;id=68487f591b0bd07c3938ab02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0717-cwe-200-information-disclosure-in-d--bf0c4bda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0717%3A%20CWE-200%20Information%20Disclosure%20in%20D-Link%20DAP-1360&amp;severity=medium&amp;id=6839c41d182aa0cae2b435af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45845-cwe-502-deserialization-of-untrusted-data-in-nextend-smart-slider-3-274122</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45845%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Nextend%20Smart%20Slider%203&amp;severity=medium&amp;id=6830a0ae0acd01a249274122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21733-cwe-209-generation-of-error-message-b7887a5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21733%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204523aaa02566521b4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0705-cwe-89-improper-neutralization-of-sp-f85ea2a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0705%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webtoffee%20Stripe%20Payment%20Plugin%20for%20WooCommerce&amp;severity=critical&amp;id=699f6de4b7ef31ef0b5903ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23387-cross-site-scripting-xss-in-fusionp-7f4277ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23387%3A%20Cross-site%20scripting%20(XSS)%20in%20FusionPBX%20FusionPBX&amp;severity=medium&amp;id=6839c41d182aa0cae2b4360c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40683-cwe-285-improper-authorization-in-i-f1ca6923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40683%3A%20CWE-285%20Improper%20Authorization%20in%20IBM%20OpenPages%20with%20Watson&amp;severity=high&amp;id=6839c41d182aa0cae2b43564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22424-cwe-352-cross-site-request-forgery--f2e10483</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22424%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20argoproj%20argo-cd&amp;severity=high&amp;id=6839c41d182aa0cae2b435d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22920-na-449766a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22920%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b570387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22914-na-c6082969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22914%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4fb7ef31ef0b570327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22876-na-in-na-32b0cf4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22876%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22911-na-in-na-e9e0bda0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22911%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e88627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22919-na-in-na-1c602f03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22919%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e8861b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27168-na-in-na-20f30ffe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27168%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683dd85d182aa0cae24d8157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23659-na-in-na-ed6fff6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23659%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa6182aa0cae249835a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22877-na-in-na-be547fd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa6182aa0cae2498350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22563-na-in-na-0328f4b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22563%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dbfa6182aa0cae249834a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50028-na-in-na-54318804</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683dbfa5182aa0cae24982b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22956-na-in-na-570f676f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b435e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22915-na-in-na-f714e391</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22915%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b435de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22913-na-in-na-e25f2378</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22913%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b435dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50693-na-in-na-0f3ca7c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50693%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839c41d182aa0cae2b4357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47035-na-in-na-a53529fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47035%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b43577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47033-na-in-na-77268b36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47033%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839c41d182aa0cae2b43575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-01-19-85ddb8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-01-19&amp;severity=medium&amp;id=682b68f1d14de609c885ddb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-19-f13175</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-19&amp;severity=medium&amp;id=682acdc2bbaf20d303f13175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0693-cwe-404-denial-of-service-in-efs-eas-12a2c5f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0693%3A%20CWE-404%20Denial%20of%20Service%20in%20EFS%20Easy%20File%20Sharing%20FTP&amp;severity=medium&amp;id=683dbfa6182aa0cae249830e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43823-cwe-119-improper-restriction-of-ope-5bc67558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43823%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Delta%20Electronics%20DOPSoft&amp;severity=high&amp;id=683dd85d182aa0cae24d8166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43815-cwe-119-improper-restriction-of-ope-33fa2ef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43815%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Delta%20Electronics%20DOPSoft&amp;severity=high&amp;id=683dd85d182aa0cae24d8164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22402-cwe-281-improper-preservation-of-pe-5a30b5ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22402%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=68487f5b1b0bd07c3938bd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22404-cwe-281-improper-preservation-of-pe-2742a57b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22404%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=683dbfa6182aa0cae2498342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22419-cwe-120-buffer-copy-without-checkin-7dd17267</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22419%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20vyperlang%20vyper&amp;severity=high&amp;id=683dbfa6182aa0cae2498348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0607-improper-handling-of-values-7ff65d09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0607%3A%20Improper%20Handling%20of%20Values&amp;severity=medium&amp;id=683dbfa6182aa0cae2498306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0409-out-of-bounds-write-d5e0521c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0409%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=691ebfd49f5a9374a9cb43f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0408-improper-neutralization-of-null-byte-bba1bd0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0408%3A%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character&amp;severity=medium&amp;id=691ebfd29f5a9374a9cb42a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40051-cwe-434-unrestricted-upload-of-file-ece34d07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40051%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Progress%20Software%20Corporation%20OpenEdge&amp;severity=critical&amp;id=683dd85d182aa0cae24d8162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33630-cwe-476-null-pointer-dereference-in-openeuler-kernel-bd8ce3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33630%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20openEuler%20kernel&amp;severity=medium&amp;id=682d9819c4522896dcbd8ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7153-cwe-79-improper-neutralization-of-in-4d8ebdcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7153%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Macroturk%20Software%20and%20Internet%20Technologies%20Macro-Bel&amp;severity=medium&amp;id=683dbfa6182aa0cae24982eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22317-cwe-307-improper-restriction-of-exc-7497113b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22317%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20IBM%20App%20Connect%20Enterprise&amp;severity=critical&amp;id=683dbfa6182aa0cae2498340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0580-cwe-639-authorization-bypass-through-faf7b2f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0580%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20IDMSistemas%20Sinergia%2C%20Sinergia%202.0%2C%20and%20Sinergia%20Corporativo&amp;severity=medium&amp;id=683dbfa6182aa0cae2498302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0381-cwe-79-improper-neutralization-of-in-08d8d590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0381%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20brechtvds%20WP%20Recipe%20Maker&amp;severity=medium&amp;id=683dbfa6182aa0cae24982f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6816-out-of-bounds-write-in-red-hat-red-h-2aa24904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6816%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206%20Extended%20Lifecycle%20Support%20%20-%20EXTENSION&amp;severity=critical&amp;id=691ebfd29f5a9374a9cb4289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48345-vulnerability-in-unisoc-shanghai-te-ce4a621e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48345%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=683dbfa5182aa0cae24982ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6184-cwe-913-improper-control-of-dynamica-fb9d7060</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6184%3A%20CWE-913%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20Cloud%20Software%20Group%20Citrix%20Session%20Recording&amp;severity=medium&amp;id=683dbfa6182aa0cae24982d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0654-cwe-502-deserialization-in-deepfacel-70f4cbb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0654%3A%20CWE-502%20Deserialization%20in%20DeepFaceLab&amp;severity=medium&amp;id=683dbfa6182aa0cae249830c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22603-na-2644951e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22603%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4bb7ef31ef0b570160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22593-na-927b842a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22593%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4bb7ef31ef0b57015d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22818-na-in-na-4003614c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22818%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f591b0bd07c3938ab07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22548-na-in-na-740c13a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22548%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6842df031a426642debc97e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22699-na-in-na-d8131f8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22699%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e8861f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22817-na-in-na-8ee6996f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22817%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841d069182aa0cae2e88617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22819-na-in-na-8b3909ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22819%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dbfa6182aa0cae249834e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22592-na-in-na-4312c2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22592%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dbfa6182aa0cae249834c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51217-na-in-na-57fa893d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51217%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dbfa5182aa0cae24982b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50614-na-in-na-7b1a0240</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50614%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dbfa5182aa0cae24982b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49943-na-in-na-a6e3614c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49943%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa5182aa0cae24982af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-18-f12603</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6549-cwe-119-improper-restriction-of-oper-dcfcb1c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6549%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Cloud%20Software%20Group%20NetScaler%20ADC&amp;severity=high&amp;id=68f7d9af247d717aace26864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6548-cwe-94-improper-control-of-generatio-87d92529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6548%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cloud%20Software%20Group%20NetScaler%20ADC&amp;severity=medium&amp;id=68f7d9af247d717aace26860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42884-cwe-862-missing-authorization-in-themeinprogress-wip-custom-login-274120</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42884%3A%20CWE-862%20Missing%20Authorization%20in%20ThemeinProgress%20WIP%20Custom%20Login&amp;severity=medium&amp;id=6830a0ae0acd01a249274120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20287-improper-neutralization-of-argument-87eea2dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20287%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Cisco%20Cisco%20Business%20Wireless%20Access%20Point%20Software&amp;severity=medium&amp;id=683dbfa6182aa0cae249831f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20258-vulnerability-in-cisco-cisco-prime--b29aa16f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20258%3A%20Vulnerability%20in%20Cisco%20Cisco%20Prime%20Infrastructure&amp;severity=medium&amp;id=683dd85d182aa0cae24d8155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20272-unrestricted-upload-of-file-with-da-892d9038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20272%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cisco%20Cisco%20Unity%20Connection&amp;severity=high&amp;id=683dbfa6182aa0cae2498312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20270-improper-neutralization-of-input-du-126618ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20270%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Cisco%20Cisco%20BroadWorks&amp;severity=medium&amp;id=683dbfa6182aa0cae2498310</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23882-cwe-862-missing-authorization-in-brainstorm-force-ultimate-addons-for-beaver-builder-lite-274124</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23882%3A%20CWE-862%20Missing%20Authorization%20in%20Brainstorm%20Force%20Ultimate%20Addons%20for%20Beaver%20Builder%20%E2%80%93%20Lite&amp;severity=medium&amp;id=6830a0ae0acd01a249274124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41990-cwe-352-cross-site-request-forgery-csrf-in-vinoj-cardoza-3d-tag-cloud-27411e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41990%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Vinoj%20Cardoza%203D%20Tag%20Cloud&amp;severity=high&amp;id=6830a0ae0acd01a24927411e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34379-cwe-862-missing-authorization-in-magneticone-cart2cart-magento-to-woocommerce-migration-274126</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34379%3A%20CWE-862%20Missing%20Authorization%20in%20MagneticOne%20Cart2Cart%3A%20Magento%20to%20WooCommerce%20Migration&amp;severity=medium&amp;id=6830a0ae0acd01a249274126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36418-cwe-862-missing-authorization-in-vagary-digital-hreflang-tags-lite-27411c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36418%3A%20CWE-862%20Missing%20Authorization%20in%20Vagary%20Digital%20HREFLANG%20Tags%20Lite&amp;severity=medium&amp;id=6830a0ae0acd01a24927411c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0646-out-of-bounds-write-af6b4584</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0646%3A%20Out-of-bounds%20Write&amp;severity=high&amp;id=68e7a5cfba0e608b4f98d821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0641-deadlock-134ae63d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0641%3A%20Deadlock&amp;severity=medium&amp;id=691f5c4ee672cd9080e8d48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0639-deadlock-6f6dc200</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0639%3A%20Deadlock&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0643-cwe-434-unrestricted-upload-of-file--6f14d4d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0643%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Cires21%20C21%20Live%20Encoder%20and%20Live%20Mosaic&amp;severity=critical&amp;id=683dbfa6182aa0cae249830a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0642-cwe-284-improper-access-control-in-c-0a197771</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0642%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Cires21%20C21%20Live%20Encoder%20and%20Live%20Mosaic&amp;severity=critical&amp;id=683dbfa6182aa0cae2498308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51739-cwe-79-improper-neutralization-of-i-4e83aa06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=683dbfa6182aa0cae24982cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51737-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hathway-skyworth-router-cm5100-c0b1a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51737%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51736-cwe-79-improper-neutralization-of-i-cac06a88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51736%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=683dbfa6182aa0cae24982ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51735-cwe-79-improper-neutralization-of-i-831e46a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51732-cwe-79-improper-neutralization-of-i-aec94af1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51732%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=683dbfa6182aa0cae24982c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51727-cwe-79-improper-neutralization-of-i-6651c432</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51727%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=683dbfa6182aa0cae24982c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51726-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-hathway-skyworth-router-cm5100-c0b19e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=682df6dbc4522896dcc0b19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51725-cwe-79-improper-neutralization-of-i-0e93fda8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51725%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=683dbfa6182aa0cae24982c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51720-cwe-79-improper-neutralization-of-i-20b759e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51720%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hathway%20Skyworth%20Router%20CM5100&amp;severity=medium&amp;id=683dbfa6182aa0cae24982c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0405-cwe-89-improper-neutralization-of-sp-0aed0a15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0405%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20rogierlankhorst%20Burst%20Statistics%20%E2%80%93%20Privacy-Friendly%20Analytics%20for%20WordPress&amp;severity=high&amp;id=683dbfa6182aa0cae2498300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36235-na-in-na-27a7167f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f531b0bd07c39389e76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23525-na-in-na-81a3e69a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23525%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa6182aa0cae2498358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52069-na-in-na-4f7fbd8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52069%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa6182aa0cae24982ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48858-na-in-na-bbc2f375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48858%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa5182aa0cae24982ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46952-na-in-na-db3375b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dbfa5182aa0cae24982a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-17-f12169</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f12169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22406-cwe-89-improper-neutralization-of-s-987cad18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22406%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20shopware%20shopware&amp;severity=critical&amp;id=683dbfa6182aa0cae2498344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0603-cwe-502-deserialization-in-zhicms-bc66e5cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0603%3A%20CWE-502%20Deserialization%20in%20ZhiCms&amp;severity=high&amp;id=683dbfa6182aa0cae2498304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22411-cwe-79-improper-neutralization-of-i-dc0e38bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22411%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20avo-hq%20avo&amp;severity=medium&amp;id=683dbfa6182aa0cae2498346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20987-easily-exploitable-vulnerability-al-05e64c4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20987%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20BI%20Publisher%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20BI%20Publisher%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20BI%20Publisher%20(formerly%20XML%20Publisher)&amp;severity=medium&amp;id=683dbfa6182aa0cae249833e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20979-easily-exploitable-vulnerability-al-afa1f676</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20979%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20BI%20Publisher.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20BI%20Publisher%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20BI%20Publisher%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20BI%20Publisher%20accessible%20data.%20in%20Oracle%20Corporation%20BI%20Publisher%20(formerly%20XML%20Publisher)&amp;severity=medium&amp;id=683f4260182aa0cae288184b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20977-easily-exploitable-vulnerability-allows-low-privileged-attacker-with-network-access-via-multiple-protocols-to-compromise-mysql-server-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-ability-to-cause-a-hang-or-frequently-repeatable-crash-complete-dos-of-mysql-server-in-oracle-corporation-mysql-server-aec50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20977%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=682cd0fa1484d88663aec50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20975-easily-exploitable-vulnerability-al-3314d767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20975%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=683dbfa6182aa0cae2498331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20973-easily-exploitable-vulnerability-al-33e4942b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20973%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20971-easily-exploitable-vulnerability-al-8534796b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20971%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=683f4260182aa0cae2881849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20969-easily-exploitable-vulnerability-al-057c26c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20969%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=683f4260182aa0cae2881841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20967-easily-exploitable-vulnerability-al-e3edcaf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20967%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server%20as%20well%20as%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20MySQL%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=683dbfa6182aa0cae249832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20963-easily-exploitable-vulnerability-al-00cf20f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20963%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20MySQL%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20MySQL%20Server.%20in%20Oracle%20Corporation%20MySQL%20Server&amp;severity=medium&amp;id=683dbfa6182aa0cae249832d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20959-easily-exploitable-vulnerability-al-26758ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20959%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20executes%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20in%20Oracle%20Corporation%20Sun%20ZFS%20Storage%20Appliance%20Kit%20(AK)%20Software&amp;severity=medium&amp;id=683f4260182aa0cae288183f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20955-difficult-to-exploit-vulnerability--413f6878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20955%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20GraalVM%20Enterprise%20Edition&amp;severity=low&amp;id=683f4260182aa0cae288183d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20952-difficult-to-exploit-vulnerability--879d0473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20952%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=high&amp;id=69092618fe7723195e0b37d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20950-easily-exploitable-vulnerability-al-3c0adfd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20950%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Customer%20Interaction%20History.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Customer%20Interaction%20History%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Customer%20Interaction%20History%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Customer%20Interaction%20History%20accessible%20data.%20in%20Oracle%20Corporation%20Customer%20Interaction%20History&amp;severity=medium&amp;id=683dbfa6182aa0cae249832b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20948-easily-exploitable-vulnerability-allows-unauthenticated-attacker-with-network-access-via-http-to-compromise-oracle-knowledge-management-successful-attacks-require-human-interaction-from-a-person-other-than-the-attacker-and-while-the-vulnerability-is-in-oracle-knowledge-management-attacks-may-significantly-impact-additional-products-scope-change-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-update-insert-or-delete-access-to-some-of-oracle-knowledge-management-accessible-data-as-well-as-unauthorized-read-access-to-a-subset-of-oracle-knowledge-management-accessible-data-in-oracle-corporation-knowledge-management-aec4f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20948%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Knowledge%20Management.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Knowledge%20Management%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Knowledge%20Management%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Knowledge%20Management%20accessible%20data.%20in%20Oracle%20Corporation%20Knowledge%20Management&amp;severity=medium&amp;id=682cd0fa1484d88663aec4f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20946-easily-exploitable-vulnerability-al-83bf0935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20946%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Solaris%20executes%20to%20compromise%20Oracle%20Solaris.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20Oracle%20Solaris.%20in%20Oracle%20Corporation%20Solaris%20Operating%20System&amp;severity=medium&amp;id=683dbfa6182aa0cae2498329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20938-easily-exploitable-vulnerability-al-60850f49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20938%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iStore.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20iStore%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20iStore%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iStore%20accessible%20data.%20in%20Oracle%20Corporation%20iStore&amp;severity=medium&amp;id=683f4260182aa0cae288183b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20936-easily-exploitable-vulnerability-al-24648f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20936%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20One-to-One%20Fulfillment.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20One-to-One%20Fulfillment%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20One-to-One%20Fulfillment%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20One-to-One%20Fulfillment%20accessible%20data.%20in%20Oracle%20Corporation%20One-to-One%20Fulfillment&amp;severity=medium&amp;id=683f4260182aa0cae2881839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20930-easily-exploitable-vulnerability-al-e27abfd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20930%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Outside%20In%20Technology.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Outside%20In%20Technology%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Outside%20In%20Technology%20accessible%20data%20and%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Outside%20In%20Technology.%20in%20Oracle%20Corporation%20Outside%20In%20Technology&amp;severity=medium&amp;id=683dbfa6182aa0cae2498327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20926-difficult-to-exploit-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-oracle-java-se-oracle-graalvm-for-jdk-oracle-graalvm-enterprise-edition-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-access-to-critical-data-or-complete-access-to-all-oracle-java-se-oracle-graalvm-for-jdk-oracle-graalvm-enterprise-edition-accessible-data-in-oracle-corporation-java-se-jdk-and-jre-aec4bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20926%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=medium&amp;id=682cd0fa1484d88663aec4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20924-difficult-to-exploit-vulnerability--e0549922</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20924%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Audit%20Vault%20and%20Database%20Firewall.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20Audit%20Vault%20and%20Database%20Firewall%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20Audit%20Vault%20and%20Database%20Firewall.%20in%20Oracle%20Corporation%20Audit%20Vault%20and%20Database%20Firewall&amp;severity=high&amp;id=683dbfa6182aa0cae2498325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20922-difficult-to-exploit-vulnerability--2132b24c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20922%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20executes%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=low&amp;id=683dbfa6182aa0cae2498323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20918-difficult-to-exploit-vulnerability--427ef4a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20918%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20creation%2C%20deletion%20or%20modification%20access%20to%20critical%20data%20or%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data%20as%20well%20as%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=high&amp;id=69092618fe7723195e0b37c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20914-easily-exploitable-vulnerability-al-4de1c474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20914%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20logon%20to%20the%20infrastructure%20where%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20executes%20to%20compromise%20Oracle%20ZFS%20Storage%20Appliance%20Kit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20ZFS%20Storage%20Appliance%20Kit%20accessible%20data.%20in%20Oracle%20Corporation%20Sun%20ZFS%20Storage%20Appliance%20Kit%20(AK)%20Software&amp;severity=low&amp;id=683f4260182aa0cae2881837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20912-easily-exploitable-vulnerability-al-0330f5f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20912%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Audit%20Vault%20and%20Database%20Firewall.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Audit%20Vault%20and%20Database%20Firewall%20accessible%20data.%20in%20Oracle%20Corporation%20Audit%20Vault%20and%20Database%20Firewall&amp;severity=low&amp;id=683f4260182aa0cae2881835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20910-difficult-to-exploit-vulnerability--c53e2bec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20910%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Audit%20Vault%20and%20Database%20Firewall.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Audit%20Vault%20and%20Database%20Firewall%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Audit%20Vault%20and%20Database%20Firewall%20accessible%20data.%20in%20Oracle%20Corporation%20Audit%20Vault%20and%20Database%20Firewall&amp;severity=low&amp;id=683f4260182aa0cae2881833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20908-easily-exploitable-vulnerability-al-d0eb9605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20908%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebCenter%20Sites.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Oracle%20WebCenter%20Sites%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20WebCenter%20Sites%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20WebCenter%20Sites%20accessible%20data.%20in%20Oracle%20Corporation%20WebCenter%20Sites&amp;severity=medium&amp;id=683dbfa6182aa0cae2498321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20906-easily-exploitable-vulnerability-al-0524b955</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20906%3A%20Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20ICMP%20to%20compromise%20Integrated%20Lights%20Out%20Manager%20(ILOM).%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Integrated%20Lights%20Out%20Manager%20(ILOM)%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Integrated%20Lights%20Out%20Manager%20(ILOM)%20accessible%20data%20as%20well%20as%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Integrated%20Lights%20Out%20Manager%20(ILOM)%20accessible%20data.%20in%20Oracle%20Corporation%20SSM%20-%20(hot-tamale)%20ILOM%3A%20Integrated%20Lights%20Out%20Manager&amp;severity=medium&amp;id=6843500671f4d251b5de40b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20904-easily-exploitable-vulnerability-allows-low-privileged-attacker-with-network-access-via-http-to-compromise-oracle-business-intelligence-enterprise-edition-while-the-vulnerability-is-in-oracle-business-intelligence-enterprise-edition-attacks-may-significantly-impact-additional-products-scope-change-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-read-access-to-a-subset-of-oracle-business-intelligence-enterprise-edition-accessible-data-in-oracle-corporation-business-intelligence-enterprise-edition-aec428</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20904%3A%20Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20While%20the%20vulnerability%20is%20in%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%2C%20attacks%20may%20significantly%20impact%20additional%20products%20(scope%20change).%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Business%20Intelligence%20Enterprise%20Edition&amp;severity=medium&amp;id=682cd0fa1484d88663aec428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31021-cwe-829-inclusion-of-functionality--c0487a44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31021%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20hyperledger%20ursa&amp;severity=low&amp;id=683dd85d182aa0cae24d814f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0519-out-of-bounds-memory-access-in-googl-789e7f72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0519%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9b0247d717aace26899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0518-type-confusion-in-google-chrome-73014267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0518%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=69418d769050fe8508ffb313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0517-out-of-bounds-write-in-google-chrome-2644f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0517%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=682f64490acd01a2492644f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0599-cwe-79-cross-site-scripting-in-jspxcms-bd7896</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0599%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Jspxcms&amp;severity=low&amp;id=682d9817c4522896dcbd7896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6336-cwe-59-improper-link-resolution-befo-30183ed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6336%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HYPR%20Workforce%20Access&amp;severity=high&amp;id=683dbfa6182aa0cae24982e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6335-cwe-59-improper-link-resolution-befo-71421d30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6335%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20HYPR%20Workforce%20Access&amp;severity=medium&amp;id=683dbfa6182aa0cae24982e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7234-cwe-117-in-integration-objects-opc-u-26936c91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7234%3A%20CWE-117%20in%20Integration%20Objects%20OPC%20UA%20Server%20Toolkit&amp;severity=medium&amp;id=683dbfa6182aa0cae24982ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37523-vulnerability-in-hcl-software-hcl-b-f561a483</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37523%3A%20Vulnerability%20in%20HCL%20Software%20HCL%20BigFix%20OSD%20Bare%20Metal%20Server%20WebUI&amp;severity=medium&amp;id=683f4959182aa0cae2891648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0579-command-injection-in-totolink-x2000r-9a88d489</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0579%3A%20Command%20Injection%20in%20Totolink%20X2000R&amp;severity=medium&amp;id=683ee1eb182aa0cae2739644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45234-cwe-119-improper-restriction-of-ope-3333a683</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45234%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TianoCore%20edk2&amp;severity=high&amp;id=690904ac00ff46172d4a0d1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45233-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-tianocore-edk2-261e00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45233%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20TianoCore%20edk2&amp;severity=high&amp;id=682f3d940acd01a249261e00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45232-cwe-835-loop-with-unreachable-exit--94e765e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45232%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20TianoCore%20edk2&amp;severity=high&amp;id=683dbfa5182aa0cae24982a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45235-cwe-119-improper-restriction-of-ope-72e6582b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45235%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TianoCore%20edk2&amp;severity=high&amp;id=690904ac00ff46172d4a0d23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45237-cwe-338-use-of-cryptographically-we-1c3775c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45237%3A%20CWE-338%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20TianoCore%20edk2&amp;severity=medium&amp;id=690a47346d939959c8021a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45236-cwe-200-exposure-of-sensitive-infor-d276e015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45236%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TianoCore%20edk2&amp;severity=medium&amp;id=683dbfa5182aa0cae24982a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45231-cwe-125-out-of-bounds-read-in-tiano-a42a667b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45231%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TianoCore%20edk2&amp;severity=medium&amp;id=690904ac00ff46172d4a0d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45230-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-tianocore-edk2-bd8c88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45230%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20TianoCore%20edk2&amp;severity=high&amp;id=682d9819c4522896dcbd8c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45229-cwe-125-out-of-bounds-read-in-tiano-86910ae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45229%3A%20CWE-125%20Out-of-bounds%20Read%20in%20TianoCore%20edk2&amp;severity=medium&amp;id=683dbfa5182aa0cae24982a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7151-cwe-79-cross-site-scripting-xss-in-u-ee4898f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7151%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Product%20Enquiry%20for%20WooCommerce&amp;severity=medium&amp;id=683dbfa6182aa0cae24982e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6292-cwe-352-cross-site-request-forgery-c-bc7b840a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6292%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Ecwid%20Ecommerce%20Shopping%20Cart&amp;severity=medium&amp;id=683dbfa6182aa0cae24982d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5922-cwe-639-authorization-bypass-through-44e8c080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5922%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Royal%20Elementor%20Addons%20and%20Templates&amp;severity=high&amp;id=683dbfa6182aa0cae24982d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0238-cwe-862-missing-authorization-in-unk-7c4adcde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0238%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20EventON%20Premium&amp;severity=low&amp;id=683dbfa6182aa0cae24982f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7083-cwe-352-cross-site-request-forgery-c-32a919b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7083%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Voting%20Record&amp;severity=medium&amp;id=683dbfa6182aa0cae24982e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0239-cwe-79-cross-site-scripting-xss-in-unknown-contact-form-7-connector-bd77c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0239%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Contact%20Form%207%20Connector&amp;severity=medium&amp;id=682d9817c4522896dcbd77c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6732-cwe-79-cross-site-scripting-xss-in-u-87d6e6c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6732%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ultimate%20Maps%20by%20Supsystic&amp;severity=medium&amp;id=683dbfa6182aa0cae24982e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0187-cwe-79-cross-site-scripting-xss-in-unknown-community-by-peepso-2644f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0187%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Community%20by%20PeepSo&amp;severity=medium&amp;id=682f64490acd01a2492644f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0237-cwe-862-missing-authorization-in-unk-949c4681</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0237%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20EventON%20Premium&amp;severity=low&amp;id=683dbfa6182aa0cae24982ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0769-cwe-79-cross-site-scripting-xss-in-u-e5851cef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0769%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20hiWeb%20Migration%20Simple&amp;severity=medium&amp;id=683dd85d182aa0cae24d8153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0376-cwe-79-cross-site-scripting-xss-in-u-27647ec7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0376%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Qubely&amp;severity=medium&amp;id=683dd85d182aa0cae24d8151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2252-cwe-22-improper-limitation-of-a-path-6ee3e3d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2252%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Directorist&amp;severity=low&amp;id=683dd85d182aa0cae24d8159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3178-cwe-352-cross-site-request-forgery-c-257f07b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3178%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20POST%20SMTP%20Mailer&amp;severity=medium&amp;id=683dc31f182aa0cae24a04f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2655-cwe-89-sql-injection-in-unknown-cont-67b24912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2655%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Contact%20Form%20by%20WD&amp;severity=high&amp;id=683dc31f182aa0cae24a04ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0079-cwe-79-cross-site-scripting-xss-in-u-3ed5715d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0079%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Customer%20Reviews%20for%20WooCommerce&amp;severity=medium&amp;id=683dc31f182aa0cae24a04ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3194-cwe-79-cross-site-scripting-xss-in-u-64fcfe01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3194%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Dokan&amp;severity=medium&amp;id=683dc31f182aa0cae24a04db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4227-cwe-80-improper-neutralization-of-sc-d796d8eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4227%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Unknown%20ark-commenteditor&amp;severity=medium&amp;id=683dc31f182aa0cae24a04d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1609-cwe-94-improper-control-of-generatio-0aa77991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1609%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20school-management-pro&amp;severity=critical&amp;id=683dc31f182aa0cae24a04d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1760-cwe-352-cross-site-request-forgery-c-51e8eb28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1760%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Core%20Control&amp;severity=medium&amp;id=683dc31f182aa0cae24a04d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23179-cwe-79-cross-site-scripting-xss-in-unknown-contact-form-lead-form-elementor-builder-bd77a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23179%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Contact%20Form%20%26%20Lead%20Form%20Elementor%20Builder&amp;severity=medium&amp;id=682d9817c4522896dcbd77a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3899-cwe-352-cross-site-request-forgery-c-927214ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3899%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%203dprint&amp;severity=high&amp;id=683dc31f182aa0cae24a04e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2413-cwe-79-cross-site-scripting-xss-in-unknown-slide-anything-2646fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2413%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Slide%20Anything&amp;severity=medium&amp;id=682f6ee00acd01a2492646fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24870-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-fastest-cache-bd6eba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24870%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WP%20Fastest%20Cache&amp;severity=medium&amp;id=682d9816c4522896dcbd6eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24869-cwe-89-improper-neutralization-of-s-8996aaad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24869%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Unknown%20WP%20Fastest%20Cache&amp;severity=high&amp;id=683dc31f182aa0cae24a04d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24433-cwe-79-cross-site-scripting-xss-in--0f16fb27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24433%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20simple%20sort%26search&amp;severity=medium&amp;id=683dc31f182aa0cae24a04d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0577-cwe-121-stack-based-buffer-overflow--91fbce5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0577%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20LR1200GB&amp;severity=high&amp;id=683dc31f182aa0cae24a0515</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0576-cwe-121-stack-based-buffer-overflow--259df506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0576%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20LR1200GB&amp;severity=high&amp;id=68443c7f71f4d251b50d0069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0574-cwe-121-stack-based-buffer-overflow--c7a4e25f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0574%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20LR1200GB&amp;severity=high&amp;id=683dc31f182aa0cae24a0513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0582-use-after-free-18da2cb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0582%3A%20Use%20After%20Free&amp;severity=high&amp;id=691ebfd49f5a9374a9cb4407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0567-improper-verification-of-cryptograph-b5b29b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0567%3A%20Improper%20Verification%20of%20Cryptographic%20Signature&amp;severity=high&amp;id=683dc31f182aa0cae24a050f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0232-use-after-free-f807111b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0232%3A%20Use%20After%20Free&amp;severity=medium&amp;id=6920092a04dd2c5f9994c02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0570-cwe-284-improper-access-controls-in-totolink-n350rt-bd7523</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0570%3A%20CWE-284%20Improper%20Access%20Controls%20in%20Totolink%20N350RT&amp;severity=medium&amp;id=682d9817c4522896dcbd7523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0581-cwe-400-uncontrolled-resource-consum-ef095adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0581%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Sandsprite%20Scdbg&amp;severity=medium&amp;id=683dc31f182aa0cae24a0517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0569-cwe-200-information-disclosure-in-to-437da0fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0569%3A%20CWE-200%20Information%20Disclosure%20in%20Totolink%20T8&amp;severity=medium&amp;id=683dc31f182aa0cae24a0511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0553-observable-discrepancy-c734baa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0553%3A%20Observable%20Discrepancy&amp;severity=high&amp;id=691f5c4ce672cd9080e8d3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0554-cwe-79-improper-neutralization-of-in-239172fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0554%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Full%20Compass%20Systems%20WIC1200&amp;severity=medium&amp;id=683dc31f182aa0cae24a050d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52104-improper-access-control-in-huawei-h-77275077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52104%3A%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683dc31f182aa0cae24a04fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52100-improper-access-control-in-huawei-h-5f2247f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52100%3A%20Improper%20Access%20Control%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683dc31f182aa0cae24a04f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52108-business-logic-errors-in-huawei-har-d498fd19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52108%3A%20Business%20Logic%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683dc31f182aa0cae24a0507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52116-cwe-269-improper-privilege-manageme-16d6fb81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52116%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683dc31f182aa0cae24a050b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2011-10005-cwe-120-buffer-overflow-in-easyftp-63f2e8ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2011-10005%3A%20CWE-120%20Buffer%20Overflow%20in%20EasyFTP&amp;severity=medium&amp;id=683dc31f182aa0cae24a04cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52109-cwe-345-insufficient-verification-o-bc061f8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52109%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683dc31f182aa0cae24a0509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21673-rce-remote-code-execution-in-atlass-e1da36a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21673%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=683f45d9182aa0cae28897ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21672-rce-remote-code-execution-in-atlass-b598bf88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21672%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=high&amp;id=683dc31f182aa0cae24a0519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22527-rce-remote-code-execution-in-atlass-0109d415</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22527%3A%20RCE%20(Remote%20Code%20Execution)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=critical&amp;id=68f7d9a5247d717aace21813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49107-cwe-209-generation-of-error-message-a505f769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49107%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Hitachi%20Hitachi%20Device%20Manager&amp;severity=medium&amp;id=683dc31f182aa0cae24a04f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22916-na-d2dac0d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22916%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b57032a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51257-na-e3840b10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51257%3A%20n%2Fa&amp;severity=high&amp;id=690a473e6d939959c8021f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22491-na-in-na-78ef5ba2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22491%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6842df031a426642debc97cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22625-na-in-na-78bce9a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22625%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6840c579182aa0cae2c16aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22626-na-in-na-094fdddb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22626%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6840b70e182aa0cae2bef107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51059-na-in-na-283260fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51059%3A%20n%2Fa&amp;severity=high&amp;id=683f034b182aa0cae27e6705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47460-na-in-na-552f729d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47460%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f034b182aa0cae27e66f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43449-na-in-na-bd63a1eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43449%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f034b182aa0cae27e66f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22628-na-in-na-aa625990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22628%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683dc31f182aa0cae24a051d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49351-na-in-na-0aeb1b88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49351%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683dc31f182aa0cae24a04f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48926-na-in-na-e3653b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48926%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683dc31f182aa0cae24a04f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39691-na-in-na-3120d39a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39691%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683dc31f182aa0cae24a04ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-16-f12a6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0565-integer-underflow-wrap-or-wraparound-245ad128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0565%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)&amp;severity=medium&amp;id=683f034b182aa0cae27e6717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0562-use-after-free-f2fcc8a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0562%3A%20Use%20After%20Free&amp;severity=high&amp;id=69183b387ca9874b8f7d7bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0557-cwe-79-cross-site-scripting-in-dedebiz-bd777a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0557%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20DedeBIZ&amp;severity=low&amp;id=682d9817c4522896dcbd777a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0320-cwe-79-improper-neutralization-of-in-d17075ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0320%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FireEye%20FireEye%20Malware%20Analysis%20(AX)&amp;severity=medium&amp;id=683f034b182aa0cae27e6715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0317-cwe-79-improper-neutralization-of-in-26534739</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FireEye%20FireEye%20EX&amp;severity=medium&amp;id=683f034b182aa0cae27e6713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0315-cwe-98-improper-control-of-filename--f9022cae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0315%3A%20CWE-98%3A%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20FireEye%20FireEye%20Central%20Management&amp;severity=medium&amp;id=683f034b182aa0cae27e6711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0314-cwe-79-improper-neutralization-of-in-d7eaab97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0314%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FireEye%20FireEye%20Central%20Management&amp;severity=medium&amp;id=683f034b182aa0cae27e670f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6066-cwe-862-missing-authorization-in-unknown-wp-custom-widget-area-bd6e9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6066%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20WP%20Custom%20Widget%20area&amp;severity=medium&amp;id=682d9816c4522896dcbd6e9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6050-cwe-79-cross-site-scripting-xss-in-u-7adf9175</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6050%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Estatik%20Real%20Estate%20Plugin&amp;severity=medium&amp;id=683f034b182aa0cae27e670b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6163-cwe-79-cross-site-scripting-xss-in-u-29ff5616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6163%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Crowdfunding&amp;severity=medium&amp;id=68487f5a1b0bd07c3938ab76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6048-cwe-862-missing-authorization-in-unk-f2e9cf08</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6048%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Estatik%20Real%20Estate%20Plugin&amp;severity=medium&amp;id=683f034b182aa0cae27e6707</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6843-cwe-284-improper-access-control-in-u-81b13ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6843%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20easy.jobs-%20Best%20Recruitment%20Plugin%20for%20Job%20Board%20Listing%2C%20Manager%2C%20Career%20Page%20for%20Elementor%20%26%20Gutenberg&amp;severity=medium&amp;id=683f034b182aa0cae27e670d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6049-cwe-502-deserialization-of-untrusted-b4f547de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6049%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Estatik%20Real%20Estate%20Plugin&amp;severity=critical&amp;id=683f034b182aa0cae27e6709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20721-improper-input-validation-cwe-20-in-a30af26f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20721%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Acrobat%20for%20Edge&amp;severity=medium&amp;id=683f034b182aa0cae27e671b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4001-authentication-bypass-by-spoofing-in-ed2c12cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4001%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=691f730d28b41f27b438b88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46749-cwe-22-improper-limitation-of-a-pat-e1092b53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46749%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=medium&amp;id=683f034b182aa0cae27e66f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50290-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-solr-bd7322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50290%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Solr&amp;severity=medium&amp;id=682d9817c4522896dcbd7322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6915-null-pointer-dereference-in-red-hat--e40ebb66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6915%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690d0b9008e329e0f8ef0da1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22028-insufficient-verification-of-data-a-9718a5aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22028%3A%20Insufficient%20verification%20of%20data%20authenticity%20in%20THREE%20R%20SOLUTION%20CORP.%20JAPAN%203R-TMC01&amp;severity=medium&amp;id=683f034b182aa0cae27e66cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0546-cwe-404-denial-of-service-in-easyftp-0d7cbf24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0546%3A%20CWE-404%20Denial%20of%20Service%20in%20EasyFTP&amp;severity=medium&amp;id=683f034b182aa0cae27e66b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0545-open-redirect-in-codecanyon-rise-ultimate-project-manager-bf7e82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0545%3A%20Open%20Redirect%20in%20CodeCanyon%20RISE%20Ultimate%20Project%20Manager&amp;severity=medium&amp;id=682d984bc4522896dcbf7e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0542-cwe-121-stack-based-buffer-overflow--526ebe5a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0542%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W9&amp;severity=high&amp;id=68487f5b1b0bd07c3938c89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0541-cwe-121-stack-based-buffer-overflow-in-tenda-w9-bd6da7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0541%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W9&amp;severity=high&amp;id=682d9816c4522896dcbd6da7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0540-cwe-121-stack-based-buffer-overflow--41e6dd13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0540%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W9&amp;severity=medium&amp;id=683f034b182aa0cae27e66b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0539-cwe-121-stack-based-buffer-overflow--0bc39781</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0539%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20W9&amp;severity=high&amp;id=683f034b182aa0cae27e66b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0532-stack-based-buffer-overflow-in-tenda-a15-aeca23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0532%3A%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=682cd0fb1484d88663aeca23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0531-cwe-121-stack-based-buffer-overflow--e0b5be46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0531%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Tenda%20A15&amp;severity=high&amp;id=683f034b182aa0cae27e66b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0530-cwe-89-sql-injection-in-cxbsoft-post-f61e9c0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0530%3A%20CWE-89%20SQL%20Injection%20in%20CXBSoft%20Post-Office&amp;severity=medium&amp;id=683f034b182aa0cae27e66b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0527-cwe-89-sql-injection-in-cxbsoft-url--4c9e7b01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0527%3A%20CWE-89%20SQL%20Injection%20in%20CXBSoft%20Url-shorting&amp;severity=medium&amp;id=683f034b182aa0cae27e66ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-15-f1210e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f1210e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0522-cwe-352-cross-site-request-forgery-i-c4625e0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0522%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20in%20Allegro%20RomPager&amp;severity=medium&amp;id=683f034b182aa0cae27e66ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-14-f126a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f126a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0510-cwe-918-server-side-request-forgery-in-haokekeji-yiqiniu-aeca21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0510%3A%20CWE-918%20Server-Side%20Request%20Forgery%20in%20HaoKeKeJi%20YiQiNiu&amp;severity=high&amp;id=682cd0fb1484d88663aeca21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0505-cwe-434-unrestricted-upload-in-zhong-e9a54a9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0505%3A%20CWE-434%20Unrestricted%20Upload%20in%20ZhongFuCheng3y%20Austin&amp;severity=medium&amp;id=683f034b182aa0cae27e66aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0504-cwe-79-cross-site-scripting-in-code--0a72c7a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0504%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20code-projects%20Simple%20Online%20Hotel%20Reservation%20System&amp;severity=low&amp;id=683f034b182aa0cae27e66a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0500-cwe-79-cross-site-scripting-in-sourc-6bf0bc43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0500%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20SourceCodester%20House%20Rental%20Management%20System&amp;severity=low&amp;id=683f034b182aa0cae27e669b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0497-cwe-89-sql-injection-in-campcodes-st-3c381bc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0497%3A%20CWE-89%20SQL%20Injection%20in%20Campcodes%20Student%20Information%20System&amp;severity=medium&amp;id=68487f531b0bd07c39389e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0490-cwe-200-information-disclosure-in-hu-f8ca2b74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0490%3A%20CWE-200%20Information%20Disclosure%20in%20Huaxia%20ERP&amp;severity=medium&amp;id=683f034b182aa0cae27e6699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0484-cwe-89-sql-injection-in-code-projects-fighting-cock-information-system-aeca13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0484%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Fighting%20Cock%20Information%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aeca13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0483-cwe-89-sql-injection-in-taokeyun-8efae5d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0483%3A%20CWE-89%20SQL%20Injection%20in%20Taokeyun&amp;severity=medium&amp;id=683f034b182aa0cae27e6697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0482-cwe-89-sql-injection-in-taokeyun-0775562d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0482%3A%20CWE-89%20SQL%20Injection%20in%20Taokeyun&amp;severity=medium&amp;id=683f034b182aa0cae27e6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0251-cwe-80-improper-neutralization-of-sc-838d980e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0251%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20mihail-barinov%20Advanced%20Woo%20Search&amp;severity=medium&amp;id=699f6ddab7ef31ef0b58f9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0480-cwe-89-sql-injection-in-taokeyun-4d9a71dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0480%3A%20CWE-89%20SQL%20Injection%20in%20Taokeyun&amp;severity=high&amp;id=683f034b182aa0cae27e6693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0477-cwe-89-sql-injection-in-code-projects-fighting-cock-information-system-aec8c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0477%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Fighting%20Cock%20Information%20System&amp;severity=medium&amp;id=682cd0fb1484d88663aec8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0476-cwe-79-cross-site-scripting-in-blood-86952774</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0476%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Blood%20Bank%20%26%20Donor%20Management&amp;severity=low&amp;id=683f034b182aa0cae27e6691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51066-na-in-na-d3935a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51066%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68443c7f71f4d251b50d0063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51804-na-in-na-f46281b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51804%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f034a182aa0cae27e6619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51071-na-in-na-41b15c9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034a182aa0cae27e6617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51068-na-in-na-d5af03e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51068%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034a182aa0cae27e6615</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51063-na-in-na-031450ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51063%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f034a182aa0cae27e6613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50072-na-in-na-396632c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034a182aa0cae27e660f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46942-na-in-na-2d9efa6c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46942%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f034a182aa0cae27e65f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-13-73f99e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-13&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb73f99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-13-f12595</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0230-an-attacker-with-physical-access-to--388376f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0230%3A%20An%20attacker%20with%20physical%20access%20to%20the%20accessory%20may%20be%20able%20to%20extract%20its%20Bluetooth%20pairing%20key%20and%20monitor%20Bluetooth%20traffic%20in%20Apple%20Magic%20Keyboard%20Firmware&amp;severity=low&amp;id=683f034b182aa0cae27e666e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49647-cwe-266-incorrect-privilege-assignm-baf56d3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49647%3A%20CWE-266%3A%20Incorrect%20Privilege%20Assignment%20in%20Zoom%20Video%20Communications%2C%20Inc.%20Zoom%20Desktop%20Client%20for%20Windows%2C%20Zoom%20VDI%20Client%20for%20Windows%2C%20and%20Zoom%20SDKs%20for%20Windows%20before%20version%205.16.10&amp;severity=high&amp;id=683f034a182aa0cae27e65fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0473-cwe-89-sql-injection-in-code-project-d3c1a1d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0473%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Dormitory%20Management%20System&amp;severity=medium&amp;id=683f034b182aa0cae27e668f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0470-cwe-89-sql-injection-in-code-project-d026b4ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0470%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Human%20Resource%20Integrated%20System&amp;severity=medium&amp;id=683f034b182aa0cae27e668d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21655-cwe-400-uncontrolled-resource-consu-f769baf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21655%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20discourse%20discourse&amp;severity=medium&amp;id=683f034b182aa0cae27e66cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49098-cwe-284-improper-access-control-in--70d782f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49098%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20discourse%20discourse-reactions&amp;severity=low&amp;id=683f034a182aa0cae27e65f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2010-10011-cwe-22-path-traversal-in-acritum-fe-0d724ef1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2010-10011%3A%20CWE-22%20Path%20Traversal%20in%20Acritum%20Femitter%20Server&amp;severity=medium&amp;id=683ffd67182aa0cae2a38821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6683-null-pointer-dereference-in-red-hat--feca2562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6683%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690eefde44af18c3752cf5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31031-cwe-122-heap-based-buffer-overflow--46f9666f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31031%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20nvidia%20DGX%20A100&amp;severity=medium&amp;id=68e80b92ba0e608b4fab12d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31033-cwe-306-in-nvidia-dgx-a100-325b7c05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31033%3A%20CWE-306%20in%20nvidia%20DGX%20A100&amp;severity=medium&amp;id=683ffd67182aa0cae2a3883c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31032-cwe-627-in-nvidia-dgx-a100-00acc592</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31032%3A%20CWE-627%20in%20nvidia%20DGX%20A100&amp;severity=high&amp;id=683ffd67182aa0cae2a3882f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31024-cwe-121-in-nvidia-dgx-a100-03112f95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31024%3A%20CWE-121%20in%20nvidia%20DGX%20A100&amp;severity=critical&amp;id=683ffd67182aa0cae2a3882b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31030-cwe-121-in-nvidia-dgx-a100-a74064f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31030%3A%20CWE-121%20in%20nvidia%20DGX%20A100&amp;severity=critical&amp;id=683ffd67182aa0cae2a3882d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0464-cwe-89-sql-injection-in-code-project-c7417c56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0464%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Online%20Faculty%20Clearance&amp;severity=medium&amp;id=683f034b182aa0cae27e668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0463-cwe-89-sql-injection-in-code-projects-online-faculty-clearance-aec961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0463%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Online%20Faculty%20Clearance&amp;severity=medium&amp;id=682cd0fb1484d88663aec961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21887-vulnerability-in-ivanti-ics-527f9775</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21887%3A%20Vulnerability%20in%20Ivanti%20ICS&amp;severity=critical&amp;id=68f7d9b1247d717aace26929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0460-cwe-89-sql-injection-in-code-project-b9c10b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0460%3A%20CWE-89%20SQL%20Injection%20in%20code-projects%20Faculty%20Management%20System&amp;severity=medium&amp;id=683f034b182aa0cae27e6689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49262-cwe-190-integer-overflow-or-wraparo-7323227a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49262%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Hongdian%20H8951-4G-ESP&amp;severity=critical&amp;id=683f034a182aa0cae27e65fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49260-cwe-79-improper-neutralization-of-i-6cbbf237</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hongdian%20H8951-4G-ESP&amp;severity=medium&amp;id=683f034a182aa0cae27e65fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49258-cwe-79-improper-neutralization-of-i-2601eabc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Hongdian%20H8951-4G-ESP&amp;severity=medium&amp;id=683f034a182aa0cae27e65f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49255-cwe-306-missing-authentication-for--6f6ac491</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49255%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Hongdian%20H8951-4G-ESP&amp;severity=critical&amp;id=683f034a182aa0cae27e65f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2030-cwe-347-improper-verification-of-cryptographic-signature-in-gitlab-gitlab-253f15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2030%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4812-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4812%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5356-cwe-863-incorrect-authorization-in-gitlab-gitlab-253fae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5356%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7028-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-gitlab-gitlab-253fe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7028%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20GitLab%20GitLab&amp;severity=critical&amp;id=682ea68a0acd01a249253fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0437-cwe-835-loop-with-unreachable-exit-c-118b587b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0437%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20MongoDB%20Inc%20MongoDB%20C%20Driver&amp;severity=medium&amp;id=690904a900ff46172d4a00fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6740-cwe-427-uncontrolled-search-path-ele-4b3b363f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6740%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=683f034b182aa0cae27e6651</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6735-cwe-95-improper-neutralization-of-di-8739badc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6735%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Checkmk%20GmbH%20Checkmk&amp;severity=high&amp;id=683f034b182aa0cae27e664f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34061-vulnerability-in-cloud-foundry-rout-05f0594e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34061%3A%20Vulnerability%20in%20Cloud%20Foundry%20Routing%20Release&amp;severity=high&amp;id=683f034a182aa0cae27e65ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22027-improper-input-validation-in-ays-pr-b529edfd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22027%3A%20Improper%20input%20validation%20in%20AYS%20Pro%20Plugins%20WordPress%20Quiz%20Maker%20Plugin&amp;severity=medium&amp;id=6841e8e0182aa0cae2eca057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4960-cwe-79-cross-site-scripting-in-cloudfavorites-favorites-web-aec940</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4960%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20cloudfavorites%20favorites-web&amp;severity=low&amp;id=682cd0fb1484d88663aec940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21604-cwe-770-allocation-of-resources-wit-0b89c259</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21604%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=683f034b182aa0cae27e66cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21597-cwe-668-exposure-of-resource-to-wro-ac62c709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21597%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=683f034b182aa0cae27e66c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21594-cwe-122-heap-based-buffer-overflow--34354fc2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21594%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=683f034b182aa0cae27e66c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21587-cwe-755-improper-handling-of-except-f34ada70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21587%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=683f034b182aa0cae27e66ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23179-na-8dd6f508</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23179%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d51b7ef31ef0b5704d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22493-na-6b0d329e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22493%3A%20n%2Fa&amp;severity=medium&amp;id=699f6d4bb7ef31ef0b5700fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52339-na-8d4e27c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52339%3A%20n%2Fa&amp;severity=medium&amp;id=690a47456d939959c8022269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48909-na-in-na-c6d5f0a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48909%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68443c7f71f4d251b50d00cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23301-na-in-na-2a15d1af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23301%3A%20n%2Fa&amp;severity=medium&amp;id=68406659182aa0cae2b37acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23172-na-in-na-91a5bfa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23172%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68406659182aa0cae2b37abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30015-na-in-na-9e431fe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30015%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683ffd67182aa0cae2a38829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30014-na-in-na-14096850</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30014%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683ffd67182aa0cae2a38827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48620-na-in-na-f9c90251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48620%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683ffd67182aa0cae2a38825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2016-20021-na-in-na-cd580b65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2016-20021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683ffd67182aa0cae2a38823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23178-na-in-na-5c554e56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23178%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034b182aa0cae27e66d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23177-na-in-na-f8735c5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23177%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034b182aa0cae27e66d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23173-na-in-na-4a313e34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23173%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034b182aa0cae27e66d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22494-na-in-na-f1d631d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22494%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034b182aa0cae27e66d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22492-na-in-na-10ce0f10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22492%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f034b182aa0cae27e66d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50919-na-in-na-cc4049e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50919%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f034a182aa0cae27e6611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2024-01-12-170a3b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202024-01-12&amp;severity=medium&amp;id=682b69a852745a861d170a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-12-f13020</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f13020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0443-transmission-of-private-resources-in-9320ff4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0443%3A%20Transmission%20of%20Private%20Resources%20into%20a%20New%20Sphere%20(&apos;Resource%20Leak&apos;)&amp;severity=medium&amp;id=683f034b182aa0cae27e667c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21337-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-edge-chromium-based-beaa96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21337%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbeaa96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20675-cwe-284-improper-access-control-in-microsoft-microsoft-edge-chromium-based-bea8d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20675%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d9836c4522896dcbea8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0425-cwe-640-weak-password-recovery-in-fo-4f0302ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0425%3A%20CWE-640%20Weak%20Password%20Recovery%20in%20ForU%20CMS&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0424-cwe-79-cross-site-scripting-in-codea-df067c17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0424%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20CodeAstro%20Simple%20Banking%20System&amp;severity=low&amp;id=683f034b182aa0cae27e667a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0423-cwe-79-cross-site-scripting-in-codeastro-online-food-ordering-system-aec8cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0423%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20CodeAstro%20Online%20Food%20Ordering%20System&amp;severity=low&amp;id=682cd0fb1484d88663aec8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0422-cwe-79-cross-site-scripting-in-codea-18d02b6a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0422%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20CodeAstro%20POS%20and%20Inventory%20Management%20System&amp;severity=low&amp;id=683f034b182aa0cae27e6678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0417-cwe-24-path-traversal-filedir-in-des-9c885bc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0417%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20DeShang%20DSShop&amp;severity=medium&amp;id=683f034b182aa0cae27e6676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0416-cwe-24-path-traversal-filedir-in-deshang-dsmall-aec8c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0416%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20DeShang%20DSMall&amp;severity=medium&amp;id=682cd0fb1484d88663aec8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0414-cwe-284-improper-access-controls-in--c9910028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0414%3A%20CWE-284%20Improper%20Access%20Controls%20in%20DeShang%20DSCMS&amp;severity=medium&amp;id=683f034b182aa0cae27e6674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0412-cwe-284-improper-access-controls-in--06100f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0412%3A%20CWE-284%20Improper%20Access%20Controls%20in%20DeShang%20DSShop&amp;severity=medium&amp;id=683f034b182aa0cae27e6672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0411-cwe-284-improper-access-controls-in--226c40a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0411%3A%20CWE-284%20Improper%20Access%20Controls%20in%20DeShang%20DSMall&amp;severity=medium&amp;id=683f034b182aa0cae27e6670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6242-cwe-352-cross-site-request-forgery-c-fc2d947f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6242%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashanjay%20EventON&amp;severity=medium&amp;id=683f034a182aa0cae27e661f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6244-cwe-352-cross-site-request-forgery-c-8e10c353</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6244%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ashanjay%20EventON&amp;severity=medium&amp;id=683f034a182aa0cae27e662c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6582-cwe-284-improper-access-control-in-x-53d51b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6582%3A%20CWE-284%20Improper%20Access%20Control%20in%20xpeedstudio%20ElementsKit%20Elementor%20addons&amp;severity=medium&amp;id=683f034a182aa0cae27e663a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4960-cwe-79-improper-neutralization-of-in-84fdb735</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4960%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wclovers%20WCFM%20Marketplace%20%E2%80%93%20Best%20Multivendor%20Marketplace%20for%20WooCommerce&amp;severity=medium&amp;id=683f034a182aa0cae27e660d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7071-cwe-79-improper-neutralization-of-in-16e96c3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7071%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wpdevteam%20Essential%20Blocks%20%E2%80%93%20Page%20Builder%20Gutenberg%20Blocks%2C%20Patterns%20%26%20Templates&amp;severity=medium&amp;id=683f034b182aa0cae27e666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6504-cwe-639-authorization-bypass-through-1951c09b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6504%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20reflectionmedia%20User%20Profile%20Builder%20%E2%80%93%20Beautiful%20User%20Registration%20Forms%2C%20User%20Profiles%20%26%20User%20Role%20Editor&amp;severity=medium&amp;id=683f034a182aa0cae27e6636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6875-cwe-639-authorization-bypass-through-f05c0e57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6875%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20wpexpertsio%20POST%20SMTP%20%E2%80%93%20The%20%231%20WordPress%20SMTP%20Plugin%20with%20Advanced%20Email%20Logging%20and%20Delivery%20Failure%20Notifications&amp;severity=critical&amp;id=683f034b182aa0cae27e6655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5691-cwe-79-improper-neutralization-of-in-6ac56749</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5691%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20collectchat%20Collect.chat%20Chatbot%20%E2%9A%A1%EF%B8%8F&amp;severity=medium&amp;id=683f034a182aa0cae27e661b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6638-cwe-862-missing-authorization-in-gut-a36c8196</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6638%3A%20CWE-862%20Missing%20Authorization%20in%20gutengeek%20GG%20Woo%20Feed%20for%20WooCommerce%20Shopping%20Feed%20on%20Google%20Facebook%20and%20Other%20Channels&amp;severity=medium&amp;id=683f034b182aa0cae27e664b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7048-cwe-352-cross-site-request-forgery-c-4b989b82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7048%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20galdub%20Floating%20Notification%20Bar%2C%20Sticky%20Menu%20on%20Scroll%2C%20Announcement%20Banner%2C%20and%20Sticky%20Header%20for%20Any%20Theme%20%E2%80%93%20My%20Sticky%20Bar%20(formerly%20myStickymenu)&amp;severity=low&amp;id=683f034b182aa0cae27e666a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7019-cwe-862-missing-authorization-in-the-2a9e7356</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7019%3A%20CWE-862%20Missing%20Authorization%20in%20themeisle%20LightStart%20%E2%80%93%20Maintenance%20Mode%2C%20Coming%20Soon%20and%20Landing%20Page%20Builder&amp;severity=medium&amp;id=683f034b182aa0cae27e665d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6220-cwe-434-unrestricted-upload-of-file--49d655c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6220%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20piotnetdotcom%20Piotnet%20Forms&amp;severity=high&amp;id=683f034a182aa0cae27e661d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6637-cwe-862-missing-authorization-in-daa-cc8956d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6637%3A%20CWE-862%20Missing%20Authorization%20in%20daanvandenbergh%20CAOS%20%7C%20Host%20Google%20Analytics%20Locally&amp;severity=medium&amp;id=683f034a182aa0cae27e663e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6558-cwe-434-unrestricted-upload-of-file--779475b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6558%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20webtoffee%20Export%20and%20Import%20Users%20and%20Customers&amp;severity=high&amp;id=683f034a182aa0cae27e6638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6369-cwe-862-missing-authorization-in-rec-69041b8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6369%3A%20CWE-862%20Missing%20Authorization%20in%20recorp%20Export%20WP%20Page%20to%20Static%20HTML%2FCSS&amp;severity=medium&amp;id=683f034a182aa0cae27e6634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6855-cwe-862-missing-authorization-in-str-59d37f41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6855%3A%20CWE-862%20Missing%20Authorization%20in%20strangerstudios%20Paid%20Memberships%20Pro%20%E2%80%93%20Content%20Restriction%2C%20User%20Registration%2C%20%26%20Paid%20Subscriptions&amp;severity=low&amp;id=683f034b182aa0cae27e6653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6882-cwe-79-improper-neutralization-of-in-8a2cc35f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6882%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mra13%20Simple%20Membership&amp;severity=medium&amp;id=683f034b182aa0cae27e6657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6988-cwe-79-improper-neutralization-of-in-e40f2bed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6988%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20extendthemes%20Colibri%20Page%20Builder&amp;severity=medium&amp;id=683f034b182aa0cae27e665b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4248-cwe-352-cross-site-request-forgery-c-136ae3b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4248%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20webdevmattcrom%20GiveWP%20%E2%80%93%20Donation%20Plugin%20and%20Fundraising%20Platform&amp;severity=medium&amp;id=683f034a182aa0cae27e6600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6924-cwe-79-improper-neutralization-of-in-5bec25a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%2010web%20Photo%20Gallery%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Image%20Gallery&amp;severity=medium&amp;id=683f034b182aa0cae27e6659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6634-cwe-88-argument-injection-or-modific-6b983fcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6634%3A%20CWE-88%20Argument%20Injection%20or%20Modification%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=high&amp;id=683f034a182aa0cae27e663c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6684-cwe-79-improper-neutralization-of-in-9d747710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6684%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vowelweb%20Ibtana%20%E2%80%93%20WordPress%20Website%20Builder&amp;severity=medium&amp;id=683f034b182aa0cae27e664d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6506-cwe-639-authorization-bypass-through-3010c3ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6506%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20melapress%20WP%202FA%20%E2%80%93%20Two-factor%20authentication%20for%20WordPress&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6223-cwe-639-authorization-bypass-through-34312b71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6223%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20thimpress%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6520-cwe-352-cross-site-request-forgery-c-a8e7d9db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6520%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20melapress%20WP%202FA%20%E2%80%93%20Two-factor%20authentication%20for%20WordPress&amp;severity=medium&amp;id=68487f5b1b0bd07c3938bd72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21669-cwe-347-improper-verification-of-cr-27a71ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21669%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20hyperledger%20aries-cloudagent-python&amp;severity=critical&amp;id=683f0a31182aa0cae27f6f2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38267-cwe-311-missing-encryption-of-sensi-1e6a5786</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38267%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=69092632fe7723195e0b5f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31001-cwe-257-storing-passwords-in-a-reco-fe62904d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31001%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22195-cwe-79-improper-neutralization-of-i-bc6eb6ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22195%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pallets%20jinja&amp;severity=medium&amp;id=6909261ffe7723195e0b4691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31003-cwe-59-improper-link-resolution-bef-e8275708</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31003%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20IBM%20Security%20Verify%20Access%20Appliance&amp;severity=high&amp;id=6909262ffe7723195e0b5efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22194-cwe-215-insertion-of-sensitive-info-e0413006</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22194%3A%20CWE-215%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20Cyber-Domain-Ontology%20CDO-Utility-Local-UUID&amp;severity=low&amp;id=683f0a31182aa0cae27f6f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21666-cwe-284-improper-access-control-in--dc3924fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21666%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20pimcore%20customer-data-framework&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23058-na-1745e45c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23058%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d4fb7ef31ef0b5703a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23057-na-c1fdd227</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23057%3A%20n%2Fa&amp;severity=high&amp;id=699f6d4fb7ef31ef0b5703a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51073-na-in-na-8ffa829f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6843500671f4d251b5de40af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23059-na-in-na-b94e4fd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22942-na-in-na-4a6ed6e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22942%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52031-na-in-na-cf7605d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6ef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50126-na-in-na-0613f384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50126%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46474-na-in-na-2b7b7580</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46474%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0a31182aa0cae27f6ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37644-na-in-na-2ed0fb6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37644%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51989-bd9da4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51989&amp;severity=low&amp;id=682d981bc4522896dcbd9da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52030-n-a-in-n-a-aec88e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-11-f12323</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn-f0c2a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Active%20Exploitation%20of%20Two%20Zero-Day%20Vulnerabilities%20in%20Ivanti%20Connect%20Secure%20VPN&amp;severity=high&amp;id=682acdbebbaf20d303f0c2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21773-information-disclosure-in-tp-link-a-433ae938</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21773%3A%20Information%20disclosure%20in%20TP-Link%20Archer%20AX3000&amp;severity=high&amp;id=683f0a31182aa0cae27f6f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45794-cwe-306-missing-authentication-for-critical-function-in-omron-cj-series-and-cs-series-cpu-modules-262238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45794%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Omron%20CJ-series%20and%20CS-series%20CPU%20modules&amp;severity=high&amp;id=682f48200acd01a249262238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41069-a-3d-model-constructed-to-look-like-144d2096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41069%3A%20A%203D%20model%20constructed%20to%20look%20like%20the%20enrolled%20user%20may%20authenticate%20via%20Face%20ID%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5547a730e5a3d9d76ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40438-an-app-may-be-able-to-access-edited-a22e6ca7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40438%3A%20An%20app%20may%20be%20able%20to%20access%20edited%20photos%20saved%20to%20a%20temporary%20directory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5544a730e5a3d9d76704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42872-an-app-may-be-able-to-access-sensit-619c368e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42872%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28185-an-app-may-be-able-to-cause-a-denia-a4a15f1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28185%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38612-an-app-may-be-able-to-access-protec-13b30696</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38612%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=683f0a31182aa0cae27f6e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42828-an-app-may-be-able-to-gain-root-pri-aeae87ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42828%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=683f0a31182aa0cae27f6eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48504-an-app-may-be-able-to-access-user-s-f63fb1f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48504%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32424-an-attacker-that-has-already-achiev-e9dbd0eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32424%3A%20An%20attacker%20that%20has%20already%20achieved%20kernel%20code%20execution%20may%20be%20able%20to%20bypass%20kernel%20memory%20mitigations%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41994-a-camera-extension-may-be-able-to-a-9800ba93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41994%3A%20A%20camera%20extension%20may%20be%20able%20to%20access%20the%20camera%20view%20from%20apps%20other%20than%20the%20app%20for%20which%20it%20was%20granted%20permission%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ba730e5a3d9d779b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40393-an-authentication-issue-was-addressed-with-improved-state-management-in-apple-ios-and-ipados-bd8c84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40393%3A%20An%20authentication%20issue%20was%20addressed%20with%20improved%20state%20management.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d9819c4522896dcbd8c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40433-an-app-may-bypass-gatekeeper-checks-4aa436c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40433%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32931-an-app-with-root-privileges-may-be-able-to-access-private-information-in-apple-macos-aec5dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32931%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec5dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40430-an-app-may-be-able-to-access-remova-b303b06c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40430%3A%20An%20app%20may%20be%20able%20to%20access%20removable%20volumes%20without%20user%20consent%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a5544a730e5a3d9d766ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42933-an-app-may-be-able-to-gain-elevated-efeaf384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42933%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=683f0a31182aa0cae27f6eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42876-processing-a-file-may-lead-to-a-den-a7b0b303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42876%3A%20Processing%20a%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=high&amp;id=68487f591b0bd07c3938aaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41974-an-app-may-be-able-to-execute-arbit-5538a80a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41974%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5549a730e5a3d9d77189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42929-an-app-may-be-able-to-access-protec-e4c869b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42929%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a5553a730e5a3d9d78a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40411-an-app-may-be-able-to-access-user-s-e4b85b9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40411%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a5542a730e5a3d9d761eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41060-a-remote-user-may-be-able-to-cause--0db03eba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41060%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20kernel%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5546a730e5a3d9d76d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41987-an-app-may-be-able-to-access-sensit-a455e85e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41987%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a554ba730e5a3d9d779b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38607-an-app-may-be-able-to-modify-printe-f947c753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38607%3A%20An%20app%20may%20be%20able%20to%20modify%20Printer%20settings%20in%20Apple%20macOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42831-an-app-may-be-able-to-fingerprint-t-0a7050dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42831%3A%20An%20app%20may%20be%20able%20to%20fingerprint%20the%20user%20in%20Apple%20macOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42866-processing-web-content-may-lead-to--bc3204e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42866%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=683f0a31182aa0cae27f6eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42870-an-app-may-be-able-to-execute-arbit-dd53012b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42870%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a554ca730e5a3d9d77d37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42826-processing-a-file-may-lead-to-arbit-e8ec8e61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42826%3A%20Processing%20a%20file%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a554ba730e5a3d9d779dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42934-an-app-with-root-privileges-may-be--aac39316</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42934%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=690a5553a730e5a3d9d78a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42871-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-aec424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42871%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682cd0fa1484d88663aec424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38610-an-app-may-be-able-to-cause-unexpec-9d5cce72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38610%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a53252a90255b94da6714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40437-an-app-may-be-able-to-read-sensitiv-55667f73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40437%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40529-a-person-with-physical-access-to-a--16141f44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40529%3A%20A%20person%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20use%20VoiceOver%20to%20access%20private%20calendar%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=low&amp;id=683f0a31182aa0cae27f6e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21638-cwe-269-improper-privilege-manageme-259a3bd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21638%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Azure%20ipam&amp;severity=critical&amp;id=683f0a31182aa0cae27f6f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0333-insufficient-data-validation-in-goog-8f161f10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0333%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46712-escalation-of-privilege-in-fortinet-8b872590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46712%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiPortal&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29444-cwe-427-uncontrolled-search-path-element-in-ptc-kepware-kepserverex-aec86d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29444%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20PTC%20Kepware%20KEPServerEX&amp;severity=medium&amp;id=682cd0fb1484d88663aec86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45139-cwe-611-improper-restriction-of-xml-da1a8309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45139%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20fonttools%20fonttools&amp;severity=high&amp;id=683f0a31182aa0cae27f6eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47171-cwe-73-external-control-of-file-nam-60149699</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47171%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=690a47376d939959c8021b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49864-cwe-73-external-control-of-file-nam-ebec4de6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49864%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=690a473b6d939959c8021c0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49863-cwe-73-external-control-of-file-nam-bd1f2d04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49863%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=690a473b6d939959c8021c06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49862-cwe-73-external-control-of-file-nam-43877dbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49862%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=690a473b6d939959c8021c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49738-cwe-73-external-control-of-file-nam-73f31087</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49738%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=high&amp;id=690a473b6d939959c8021bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48730-cwe-79-improper-neutralization-of-i-199882f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48730%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=high&amp;id=690a47396d939959c8021ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48728-cwe-79-improper-neutralization-of-i-4617e762</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48728%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=690a47396d939959c8021b9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47861-cwe-79-improper-neutralization-of-i-802e6db8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47861%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=690a47376d939959c8021b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49715-cwe-434-unrestricted-upload-of-file-9c585551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49715%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47862-cwe-73-external-control-of-file-nam-b076fd78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47862%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=690a47376d939959c8021b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49589-cwe-640-weak-password-recovery-mech-de2aacd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49589%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20WWBN%20AVideo&amp;severity=high&amp;id=690a473b6d939959c8021bed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50172-cwe-640-weak-password-recovery-mech-e442cb0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50172%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20WWBN%20AVideo&amp;severity=medium&amp;id=690a473e6d939959c8021f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49810-cwe-307-improper-restriction-of-exc-7527652b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49810%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20WWBN%20AVideo&amp;severity=high&amp;id=690a473b6d939959c8021bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49599-cwe-331-insufficient-entropy-in-wwb-10417cf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49599%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20WWBN%20AVideo&amp;severity=critical&amp;id=690a473b6d939959c8021bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6158-cwe-862-missing-authorization-in-ash-4ac6ba41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6158%3A%20CWE-862%20Missing%20Authorization%20in%20ashanjay%20EventON&amp;severity=medium&amp;id=683f0a31182aa0cae27f6efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0389-cwe-89-sql-injection-in-sourcecodester-student-attendance-system-bd751f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0389%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Student%20Attendance%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd751f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48261-cwe-89-improper-neutralization-of-s-3858e614</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48261%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Rexroth%20Nexo%20cordless%20nutrunner%20NXA015S-36V%20(0608842001)&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5455-cross-site-request-forgery-csrf-in-r-0dd6fab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5455%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=medium&amp;id=691f5c4ce672cd9080e8d392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41781-cwe-20-improper-input-validation-in-917cc9c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41781%3A%20CWE-20%20Improper%20Input%20Validation%20in%20ZTE%20MF258&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21643-cwe-94-improper-control-of-generati-efb627c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21643%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20AzureAD%20azure-activedirectory-identitymodel-extensions-for-dotnet&amp;severity=high&amp;id=68487f531b0bd07c39389f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0364-cwe-89-sql-injection-in-phpgurukul-h-8f90f9e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0364%3A%20CWE-89%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0362-cwe-89-sql-injection-in-phpgurukul-hospital-management-system-bd74f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0362%3A%20CWE-89%20SQL%20Injection%20in%20PHPGurukul%20Hospital%20Management%20System&amp;severity=medium&amp;id=682d9817c4522896dcbd74f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0358-cwe-284-improper-access-controls-in--7192ec9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0358%3A%20CWE-284%20Improper%20Access%20Controls%20in%20DeShang%20DSO2O&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0356-cwe-284-improper-access-controls-in--b579fd4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0356%3A%20CWE-284%20Improper%20Access%20Controls%20in%20Mandelo%20ssm_shiro_blog&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51126-na-8663fdbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51126%3A%20n%2Fa&amp;severity=critical&amp;id=68f2961c9c34d0947f3d74d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51955-na-in-na-1272e183</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51955%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=684345db71f4d251b5dc11e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52064-na-in-na-2973d215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52064%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51971-na-in-na-b5c2c0f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51971%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51964-na-in-na-ffb70db8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51964%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51956-na-in-na-4ce08224</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51954-na-in-na-51941086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51127-na-in-na-b8724e1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51127%3A%20n%2Fa&amp;severity=high&amp;id=683f0a31182aa0cae27f6ede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50916-na-in-na-f048150c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50916%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0a31182aa0cae27f6edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49471-na-in-na-91ad23eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49471%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0a31182aa0cae27f6ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49394-na-in-na-dc9c5be4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26627-na-in-na-2e138e96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26627%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26630-n-a-in-n-a-264438</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26630%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f60d40acd01a249264438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26629-n-a-in-n-a-bd751b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26629%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd751b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-10-f1312f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f1312f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0354-cwe-24-path-traversal-filedir-in-unknown-o-download-station-aec8be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0354%3A%20CWE-24%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20unknown-o%20download-station&amp;severity=medium&amp;id=682cd0fb1484d88663aec8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0352-cwe-434-unrestricted-upload-in-likes-5fb7a487</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0352%3A%20CWE-434%20Unrestricted%20Upload%20in%20Likeshop&amp;severity=high&amp;id=683f0a31182aa0cae27f6f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0350-cwe-613-session-expiration-in-source-6263b651</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0350%3A%20CWE-613%20Session%20Expiration%20in%20SourceCodester%20Engineers%20Online%20Portal&amp;severity=low&amp;id=683f0a31182aa0cae27f6f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37297-cwe-122-heap-based-buffer-overflow--d53365e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37297%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20AMI%20MegaRAC_SPx&amp;severity=high&amp;id=683f0a31182aa0cae27f6e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5770-cwe-838-inappropriate-encoding-for-o-3febfab2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5770%3A%20CWE-838%20Inappropriate%20Encoding%20for%20Output%20Context%20in%20Proofpoint%20Proofpoint%20Enterprise%20Protection&amp;severity=medium&amp;id=683f0a31182aa0cae27f6efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6476-allocation-of-resources-without-limi-98b62d72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6476%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204.13&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0344-cwe-89-sql-injection-in-soxft-timemail-aec8a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0344%3A%20CWE-89%20SQL%20Injection%20in%20soxft%20TimeMail&amp;severity=medium&amp;id=682cd0fb1484d88663aec8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21319-cwe-20-improper-input-validation-in-microsoft-net-6-0-beaa4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21319%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20.NET%206.0&amp;severity=medium&amp;id=682d9836c4522896dcbeaa4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-48618-an-attacker-with-arbitrary-read-and-write-capability-may-be-able-to-bypass-pointer-authentication-apple-is-aware-of-a-report-that-this-issue-may-have-been-exploited-against-versions-of-ios-released-before-ios-15-7-1-in-apple-tvos-bd8c80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-48618%3A%20An%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20against%20versions%20of%20iOS%20released%20before%20iOS%2015.7.1.%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d9819c4522896dcbd8c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21320-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-windows-10-version-1809-beaa58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21320%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaa58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21318-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-beaa39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21318%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682d9836c4522896dcbeaa39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21314-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-beaa2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21314%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaa2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21312-cwe-20-improper-input-validation-in-microsoft-microsoft-net-framework-3-5-and-4-8-1-beaa14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21312%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.8.1&amp;severity=high&amp;id=682d9836c4522896dcbeaa14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21311-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bd74eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21311%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9817c4522896dcbd74eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21310-cwe-197-numeric-truncation-error-in-microsoft-windows-10-version-1809-beaa0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21310%3A%20CWE-197%3A%20Numeric%20Truncation%20Error%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbeaa0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21309-cwe-191-integer-underflow-wrap-or-wraparound-in-microsoft-windows-server-2022-beaa04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21309%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbeaa04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21306-cwe-306-missing-authentication-for-critical-function-in-microsoft-windows-server-2022-bea9ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21306%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=682d9836c4522896dcbea9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20692-cwe-326-inadequate-encryption-strength-in-microsoft-windows-10-version-1809-bea981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20692%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20687-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bea958</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20687%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20686-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-bea947</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20686%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9836c4522896dcbea947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20681-cwe-416-use-after-free-in-microsoft-windows-server-2022-bea920</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20681%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d9836c4522896dcbea920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21316-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-beaa35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21316%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaa35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20664-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bea8b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20664%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20663-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bea8ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20663%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20662-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-server-2019-bea89e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20662%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9836c4522896dcbea89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20661-cwe-476-null-pointer-dereference-in-microsoft-windows-10-version-1809-bea88d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20661%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20660-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bea885</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20660%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20656-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-microsoft-visual-studio-2017-version-15-9-includes-15-0-15-8-bea862</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20656%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=682d9836c4522896dcbea862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20655-cwe-416-use-after-free-in-microsoft-windows-server-2019-bea853</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20655%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=682d9836c4522896dcbea853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20653-cwe-125-out-of-bounds-read-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-bea849</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20653%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d9836c4522896dcbea849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20652-cwe-73-external-control-of-file-name-or-path-in-microsoft-windows-10-version-1809-bea841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20652%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0057-cwe-20-improper-input-validation-in-microsoft-net-8-0-bea83b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0057%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20.NET%208.0&amp;severity=critical&amp;id=682d9836c4522896dcbea83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0056-cwe-319-cleartext-transmission-of-sensitive-information-in-microsoft-microsoft-sql-server-2022-gdr-bea837</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0056%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Microsoft%20Microsoft%20SQL%20Server%202022%20(GDR)&amp;severity=high&amp;id=682d9836c4522896dcbea837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20672-cwe-400-uncontrolled-resource-consumption-in-microsoft-net-6-0-bea8c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20672%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%206.0&amp;severity=high&amp;id=682d9836c4522896dcbea8c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21325-cwe-426-untrusted-search-path-in-microsoft-microsoft-printer-metadata-troubleshooter-tool-beaa67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21325%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Microsoft%20Printer%20Metadata%20Troubleshooter%20Tool&amp;severity=high&amp;id=682d9836c4522896dcbeaa67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21313-cwe-209-generation-of-error-message-containing-sensitive-information-in-microsoft-windows-10-version-1809-beaa1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21313%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbeaa1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21307-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bea9f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21307%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea9f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21305-cwe-732-incorrect-permission-assignment-for-critical-resource-in-microsoft-windows-10-version-1809-bea9da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21305%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea9da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20700-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-10-version-1809-bea9c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20700%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20699-cwe-755-improper-handling-of-exceptional-conditions-in-microsoft-windows-10-version-1809-bea9b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20699%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20698-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bea9b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20698%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea9b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20697-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-11-version-22h2-bea9a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20697%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d9836c4522896dcbea9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20696-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bea9a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20696%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20694-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-aec8c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20694%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0fb1484d88663aec8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20691-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bea977</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20691%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20690-cwe-310-cryptographic-issues-in-microsoft-windows-10-version-1809-bea95e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20690%3A%20CWE-310%3A%20Cryptographic%20Issues%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20683-cwe-416-use-after-free-in-microsoft-windows-10-version-1809-bea937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20683%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20682-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bea92f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20682%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea92f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20680-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bea918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20680%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20658-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bea86e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20658%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20657-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-bea86a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20657%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20654-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bea84d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20654%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20676-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-microsoft-azure-storage-mover-bea8e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20676%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20Storage%20Mover&amp;severity=high&amp;id=682d9836c4522896dcbea8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20677-cwe-122-heap-based-buffer-overflow-in-microsoft-3d-viewer-bea8fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20677%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%203D%20Viewer&amp;severity=high&amp;id=682d9836c4522896dcbea8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20674-cwe-305-authentication-bypass-by-primary-weakness-in-microsoft-windows-10-version-1809-bea8c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20674%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d9836c4522896dcbea8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20666-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bea8b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20666%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d9836c4522896dcbea8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0340-exposure-of-sensitive-information-to-an-unauthorized-actor-aecb72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0340%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor&amp;severity=medium&amp;id=682cd0fc1484d88663aecb72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22164-the-software-does-not-properly-cont-a614f7de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22164%3A%20The%20software%20does%20not%20properly%20control%20the%20allocation%20and%20maintenance%20of%20a%20limited%20resource%20thereby%20enabling%20an%20actor%20to%20influence%20the%20amount%20of%20resources%20consumed%2C%20eventually%20leading%20to%20the%20exhaustion%20of%20available%20resources.%20in%20Splunk%20Splunk%20Enterprise%20Security%20(ES)&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36765-cwe-680-integer-overflow-to-buffer--22d405b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36765%3A%20CWE-680%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20TianoCore%20edk2&amp;severity=high&amp;id=683f0a31182aa0cae27f6e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36763-cwe-122-heap-based-buffer-overflow--f4bac996</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36763%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20TianoCore%20edk2&amp;severity=high&amp;id=683f0a31182aa0cae27f6e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7221-cwe-120-buffer-overflow-in-totolink-t6-aec89f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7221%3A%20CWE-120%20Buffer%20Overflow%20in%20Totolink%20T6&amp;severity=critical&amp;id=682cd0fb1484d88663aec89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51745-cwe-121-stack-based-buffer-overflow-9e9408b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51745%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20JT2Go&amp;severity=high&amp;id=683f0a31182aa0cae27f6eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51744-cwe-476-null-pointer-dereference-in-f584e223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51744%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20JT2Go&amp;severity=low&amp;id=68487f5a1b0bd07c3938ab84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51438-cwe-20-improper-input-validation-in-siemens-simatic-ipc1047e-26459e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51438%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20IPC1047E&amp;severity=critical&amp;id=682f67ff0acd01a24926459e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49132-cwe-824-access-of-uninitialized-pointer-in-siemens-solid-edge-se2023-bed14a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49132%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed14a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49131-cwe-824-access-of-uninitialized-pointer-in-siemens-solid-edge-se2023-bed146</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49131%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49130-cwe-824-access-of-uninitialized-pointer-in-siemens-solid-edge-se2023-bed142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49130%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49128-cwe-787-out-of-bounds-write-in-siemens-solid-edge-se2023-bed126</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49128%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49127-cwe-125-out-of-bounds-read-in-siemens-solid-edge-se2023-bed122</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49127%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49126-cwe-125-out-of-bounds-read-in-siemens-solid-edge-se2023-bed11e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49126%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49124-cwe-125-out-of-bounds-read-in-siemens-solid-edge-se2023-bed118</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49124%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49123-cwe-122-heap-based-buffer-overflow-in-siemens-solid-edge-se2023-bed112</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49123%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49122-cwe-122-heap-based-buffer-overflow-in-siemens-solid-edge-se2023-bed110</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49122%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49121-cwe-122-heap-based-buffer-overflow-in-siemens-solid-edge-se2023-bed101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49121%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20Solid%20Edge%20SE2023&amp;severity=high&amp;id=682d983ac4522896dcbed101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42797-cwe-908-use-of-uninitialized-resour-40e3d2fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42797%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Siemens%20CP-8031%20MASTER%20MODULE&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5347-cwe-347-improper-verification-of-cry-e4060c6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5347%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Korenix%20JetNet%20Series&amp;severity=critical&amp;id=683f0a31182aa0cae27f6ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5376-cwe-306-missing-authentication-for-c-54912aea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5376%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Korenix%20JetNet%20Series&amp;severity=high&amp;id=68e6339d143ec9919d6f280d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6830-cwe-79-improper-neutralization-of-in-8ee4d5cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6830%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20sswells%20Formidable%20Forms%20%E2%80%93%20Contact%20Form%2C%20Survey%2C%20Quiz%2C%20Payment%2C%20Calculator%20Form%20%26%20Custom%20Form%20Builder&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7219-cwe-121-stack-based-buffer-overflow--3262dace</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7219%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Totolink%20N350RT&amp;severity=high&amp;id=683f0a31182aa0cae27f6f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39336-vulnerability-in-ivanti-endpoint-ma-cc5f2565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39336%3A%20Vulnerability%20in%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=683f0a31182aa0cae27f6e98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21738-cwe-79-improper-neutralization-of-i-aecf08ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21738%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP_SE%20SAP%20NetWeaver%20ABAP%20Application%20Server%20and%20ABAP%20Platform&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21737-cwe-94-improper-control-of-generati-7c70d3de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21737%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP_SE%20SAP%20Application%20Interface%20Framework%20(File%20Adapter)&amp;severity=high&amp;id=683f0a31182aa0cae27f6f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47995-na-1c9d9f74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47995%3A%20n%2Fa&amp;severity=medium&amp;id=690a47396d939959c8021b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50643-na-in-na-8183547f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50643%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff3ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26998-na-in-na-e85f69b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26998%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff359</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22368-na-in-na-8865f7f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22368%3A%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50585-na-in-na-5f61bbf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50585%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0a31182aa0cae27f6eda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50136-na-in-na-4598a0ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50136%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47997-na-in-na-39d5f3a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47997%3A%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47994-na-in-na-2a413b21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47994%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0a31182aa0cae27f6ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38827-na-in-na-d431c8ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38827%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0a31182aa0cae27f6e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47996-n-a-in-n-a-aec892</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47996%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50930-n-a-in-n-a-aec890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50930%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-09-f12b97</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21651-cwe-400-uncontrolled-resource-consu-03052c7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21651%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20xwiki%20xwiki-platform&amp;severity=high&amp;id=683f0dc2182aa0cae27ff435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34344-cwe-862-missing-authorization-in-rymera-web-co-wholesale-suite-woocommerce-wholesale-prices-b2b-catalog-mode-order-form-wholesale-user-roles-dynamic-pricing-more-27411a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34344%3A%20CWE-862%20Missing%20Authorization%20in%20Rymera%20Web%20Co%20Wholesale%20Suite%20%E2%80%93%20WooCommerce%20Wholesale%20Prices%2C%20B2B%2C%20Catalog%20Mode%2C%20Order%20Form%2C%20Wholesale%20User%20Roles%2C%20Dynamic%20Pricing%20%26%20More&amp;severity=low&amp;id=6830a0ae0acd01a24927411a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51408-cwe-532-insertion-of-sensitive-information-into-log-file-in-studiowombat-wp-optin-wheel-gamified-optin-email-marketing-tool-for-wordpress-and-woocommerce-274128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51408%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20StudioWombat%20WP%20Optin%20Wheel%20%E2%80%93%20Gamified%20Optin%20Email%20Marketing%20Tool%20for%20WordPress%20and%20WooCommerce&amp;severity=medium&amp;id=6830a0ae0acd01a249274128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51490-cwe-532-insertion-of-sensitive-information-into-log-file-in-wpmu-dev-defender-security-malware-scanner-login-security-firewall-27412a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51490%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20WPMU%20DEV%20Defender%20Security%20%E2%80%93%20Malware%20Scanner%2C%20Login%20Security%20%26%20Firewall&amp;severity=medium&amp;id=6830a0ae0acd01a24927412a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52203-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oliver-seidel-bastian-germann-cformsii-274145</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52203%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Oliver%20Seidel%2C%20Bastian%20Germann%20cformsII&amp;severity=medium&amp;id=6830a0ae0acd01a249274145</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52205-cwe-502-deserialization-of-untrusted-data-in-svnlabs-softwares-html5-soundcloud-player-with-playlist-free-274147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52205%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SVNLabs%20Softwares%20HTML5%20SoundCloud%20Player%20with%20Playlist%20Free&amp;severity=critical&amp;id=6830a0ae0acd01a249274147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6631-cwe-428-in-subnet-solutions-inc-powe-dfcd8ed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6631%3A%20CWE-428%20in%20Subnet%20Solutions%20Inc.%20PowerSYSTEM%20Center&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6845-cwe-352-cross-site-request-forgery-csrf-in-unknown-commenttweets-aebe05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6845%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20CommentTweets&amp;severity=high&amp;id=682cd0f91484d88663aebe05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6528-cwe-94-improper-control-of-generatio-2fe4c2e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6528%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20Slider%20Revolution&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25095-cwe-94-improper-control-of-generati-4bf25757</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25095%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20Duplicator&amp;severity=critical&amp;id=683f0dc1182aa0cae27ff353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6139-cwe-862-missing-authorization-in-unk-d2837d20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6139%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Essential%20Real%20Estate&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6042-cwe-287-improper-authentication-in-u-859a2888</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6042%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Getwid&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52208-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-constant-contact-constant-contact-forms-274149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52208%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Constant%20Contact%20Constant%20Contact%20Forms&amp;severity=medium&amp;id=6830a0ae0acd01a249274149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3328-vulnerability-in-canonical-ltd-snapd-2c286ccb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3328%3A%20Vulnerability%20in%20Canonical%20Ltd.%20snapd&amp;severity=high&amp;id=683f0dc1182aa0cae27ff357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2588-cwe-416-in-the-linux-kernel-organization-linux-2646fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2588%3A%20CWE-416%20in%20The%20Linux%20Kernel%20Organization%20linux&amp;severity=medium&amp;id=682f6ee00acd01a2492646fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52219-cwe-502-deserialization-of-untrusted-data-in-gecka-gecka-terms-thumbnails-27414b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52219%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Gecka%20Gecka%20Terms%20Thumbnails&amp;severity=critical&amp;id=6830a0ae0acd01a24927414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35997-cwe-129-improper-validation-of-arra-661b81d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35997%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc2182aa0cae27ff372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35996-cwe-129-improper-validation-of-arra-914e6878</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35996%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc2182aa0cae27ff370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35128-cwe-190-integer-overflow-or-wraparo-4915a971</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35128%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc1182aa0cae27ff363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36747-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-gtkwave-gtkwave-261217</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36747%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=682f3a190acd01a249261217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37418-cwe-787-out-of-bounds-write-in-gtkwave-gtkwave-261219</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37418%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=682f3a190acd01a249261219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37416-cwe-787-out-of-bounds-write-in-gtkw-cb70432e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37416%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc2182aa0cae27ff376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37282-cwe-119-improper-restriction-of-ope-7543e902</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37282%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc2182aa0cae27ff374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38623-cwe-190-integer-overflow-or-wraparo-1721140c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38623%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc2182aa0cae27ff37a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38620-cwe-190-integer-overflow-or-wraparound-in-gtkwave-gtkwave-261242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38620%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=682f3a190acd01a249261242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38618-cwe-190-integer-overflow-or-wraparo-3148d2e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38618%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc2182aa0cae27ff378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35004-cwe-190-integer-overflow-or-wraparound-in-gtkwave-gtkwave-261240</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35004%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=682f3a190acd01a249261240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35057-cwe-190-integer-overflow-or-wraparo-1c83500f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35057%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20GTKWave%20GTKWave&amp;severity=high&amp;id=683f0dc1182aa0cae27ff361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47211-cwe-22-improper-limitation-of-a-pat-1803ff43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47211%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ManageEngine%20OpManager&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51701-cwe-444-inconsistent-interpretation-ae87f6f8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51701%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20fastify%20fastify-reply-from&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21647-cwe-444-inconsistent-interpretation-c896cf64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21647%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20puma%20puma&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0322-cwe-125-out-of-bounds-read-in-gpac-g-a720c9bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0322%3A%20CWE-125%20Out-of-bounds%20Read%20in%20gpac%20gpac%2Fgpac&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0321-cwe-121-stack-based-buffer-overflow-in-gpac-gpac-gpac-aebdf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0321%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20gpac%20gpac%2Fgpac&amp;severity=medium&amp;id=682cd0f91484d88663aebdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0308-cwe-918-server-side-request-forgery--26808673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0308%3A%20CWE-918%20Server-Side%20Request%20Forgery%20in%20Inis&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5091-cwe-416-use-after-free-in-arm-ltd-valhall-gpu-kernel-driver-26443c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5091%3A%20CWE-416%20Use%20After%20Free%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=682f60d40acd01a24926443c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41710-improper-neutralization-of-input-du-4d289430</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a43a16d939959c8fde063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29052-improper-neutralization-of-input-du-b86d7b84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29052%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=medium&amp;id=690a439b6d939959c8fdd587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29051-improper-access-control-in-open-xch-cdaf07d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29051%3A%20Improper%20Access%20Control%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=high&amp;id=690a439b6d939959c8fdd582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29048-cwe-78-improper-neutralization-of-s-09d9e55f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29048%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Open-Xchange%20GmbH%20OX%20App%20Suite&amp;severity=high&amp;id=684345db71f4d251b5dc11e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0304-cwe-918-server-side-request-forgery--dbc10d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0304%3A%20CWE-918%20Server-Side%20Request%20Forgery%20in%20Youke365&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0299-cwe-78-os-command-injection-in-totol-09cc88aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0299%3A%20CWE-78%20OS%20Command%20Injection%20in%20Totolink%20N200RE&amp;severity=high&amp;id=683f0dc2182aa0cae27ff41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0298-cwe-78-os-command-injection-in-totol-f81bfe3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0298%3A%20CWE-78%20OS%20Command%20Injection%20in%20Totolink%20N200RE&amp;severity=high&amp;id=683f0dc2182aa0cae27ff418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0297-cwe-78-os-command-injection-in-totolink-n200re-bd6878</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0297%3A%20CWE-78%20OS%20Command%20Injection%20in%20Totolink%20N200RE&amp;severity=high&amp;id=682d9816c4522896dcbd6878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0293-cwe-78-os-command-injection-in-totol-89113011</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0293%3A%20CWE-78%20OS%20Command%20Injection%20in%20Totolink%20LR1200GB&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50948-cwe-259-use-of-hard-coded-password--f0d1e7ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50948%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20IBM%20Storage%20Fusion%20HCI&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7215-cwe-79-cross-site-scripting-in-chanz-252074cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7215%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Chanzhaoyu%20chatgpt-web&amp;severity=low&amp;id=683f0dc2182aa0cae27ff3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0291-cwe-77-command-injection-in-totolink-lr1200gb-aebdf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0291%3A%20CWE-77%20Command%20Injection%20in%20Totolink%20LR1200GB&amp;severity=medium&amp;id=682cd0f91484d88663aebdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52271-na-in-na-0e594d91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52271%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52073-na-in-na-ec930648</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50982-na-in-na-c08a7d6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff3b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50162-na-in-na-45c2dae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50162%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc2182aa0cae27ff39d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47890-na-in-na-150d1d4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47890%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc2182aa0cae27ff399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-08-73e8a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-08&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73e8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-08-f12b78</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0284-cwe-79-cross-site-scripting-in-kashi-e8edd43c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0284%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Kashipara%20Food%20Management%20System&amp;severity=low&amp;id=683f0dc2182aa0cae27ff414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7212-cwe-434-unrestricted-upload-in-dedec-97f6f82a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7212%3A%20CWE-434%20Unrestricted%20Upload%20in%20DeDeCMS&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0283-cwe-79-cross-site-scripting-in-kashipara-food-management-system-aebddc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0283%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Kashipara%20Food%20Management%20System&amp;severity=low&amp;id=682cd0f91484d88663aebddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0280-cwe-89-sql-injection-in-kashipara-fo-702c883f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0280%3A%20CWE-89%20SQL%20Injection%20in%20Kashipara%20Food%20Management%20System&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0274-cwe-89-sql-injection-in-kashipara-fo-31937a98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0274%3A%20CWE-89%20SQL%20Injection%20in%20Kashipara%20Food%20Management%20System&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0273-cwe-89-sql-injection-in-kashipara-fo-50766320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0273%3A%20CWE-89%20SQL%20Injection%20in%20Kashipara%20Food%20Management%20System&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0272-cwe-89-sql-injection-in-kashipara-food-management-system-aebdc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0272%3A%20CWE-89%20SQL%20Injection%20in%20Kashipara%20Food%20Management%20System&amp;severity=medium&amp;id=682cd0f91484d88663aebdc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7211-cwe-291-reliance-on-ip-address-for-a-6589b9a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7211%3A%20CWE-291%20Reliance%20on%20IP%20Address%20for%20Authentication%20in%20Uniway%20Router&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7209-cwe-404-denial-of-service-in-uniway--274dce50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7209%3A%20CWE-404%20Denial%20of%20Service%20in%20Uniway%20Router&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0271-cwe-89-sql-injection-in-kashipara-fo-4e454dd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0271%3A%20CWE-89%20SQL%20Injection%20in%20Kashipara%20Food%20Management%20System&amp;severity=medium&amp;id=6843493d71f4d251b5dccabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0265-cwe-73-file-inclusion-in-sourcecodes-7d0891e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0265%3A%20CWE-73%20File%20Inclusion%20in%20SourceCodester%20Clinic%20Queuing%20System&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0264-cwe-639-authorization-bypass-in-sour-545584b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0264%3A%20CWE-639%20Authorization%20Bypass%20in%20SourceCodester%20Clinic%20Queuing%20System&amp;severity=high&amp;id=683f0dc2182aa0cae27ff40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0262-cwe-79-cross-site-scripting-in-onlin-722cad3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0262%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Online%20Job%20Portal&amp;severity=low&amp;id=683f0dc2182aa0cae27ff3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0261-cwe-404-denial-of-service-in-sentex--b48c555e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0261%3A%20CWE-404%20Denial%20of%20Service%20in%20Sentex%20FTPDMIN&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-07-f12609</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50612-na-in-na-214f502e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50612%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50609-na-in-na-d4658585</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50609%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-06-f12f3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21641-cwe-601-url-redirection-to-untruste-151ec19b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21641%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20flarum%20framework&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46836-vulnerability-in-xen-xen-dd470d9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46836%3A%20Vulnerability%20in%20Xen%20Xen&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34328-vulnerability-in-xen-xen-b25d2d37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34328%3A%20Vulnerability%20in%20Xen%20Xen&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34327-vulnerability-in-xen-xen-4799f493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34327%3A%20Vulnerability%20in%20Xen%20Xen&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff35d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34324-vulnerability-in-linux-linux-dbb8bb2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34324%3A%20Vulnerability%20in%20Linux%20Linux&amp;severity=medium&amp;id=6842df031a426642debc970e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39296-cwe-1321-in-qnap-systems-inc-qts-800c8a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39296%3A%20CWE-1321%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=high&amp;id=683f0dc2182aa0cae27ff37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45044-cwe-120-in-qnap-systems-inc-quts-he-73560c52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45044%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QuTS%20hero&amp;severity=low&amp;id=683f0dc2182aa0cae27ff382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47559-cwe-79-in-qnap-systems-inc-qumagie-f3cfd7e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47559%3A%20CWE-79%20in%20QNAP%20Systems%20Inc.%20QuMagie&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52125-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-webvitaly-iframe-27413f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52125%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20webvitaly%20iframe&amp;severity=medium&amp;id=6830a0ae0acd01a24927413f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52126-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-suman-bhattarai-send-users-email-274141</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52126%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Suman%20Bhattarai%20Send%20Users%20Email&amp;severity=medium&amp;id=6830a0ae0acd01a249274141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51673-cwe-352-cross-site-request-forgery-csrf-in-designful-stylish-price-list-price-table-builder-qr-code-restaurant-menu-27412c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51673%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Designful%20Stylish%20Price%20List%20%E2%80%93%20Price%20Table%20Builder%20%26%20QR%20Code%20Restaurant%20Menu&amp;severity=medium&amp;id=6830a0ae0acd01a24927412c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51538-cwe-352-cross-site-request-forgery-csrf-in-awesome-support-team-awesome-support-wordpress-helpdesk-support-plugin-261133</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51538%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Awesome%20Support%20Team%20Awesome%20Support%20%E2%80%93%20WordPress%20HelpDesk%20%26%20Support%20Plugin&amp;severity=medium&amp;id=682f368b0acd01a249261133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52119-cwe-352-cross-site-request-forgery-csrf-in-icegram-icegram-engage-wordpress-lead-generation-popup-builder-cta-optins-and-email-list-building-274139</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52119%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Icegram%20Icegram%20Engage%20%E2%80%93%20WordPress%20Lead%20Generation%2C%20Popup%20Builder%2C%20CTA%2C%20Optins%20and%20Email%20List%20Building&amp;severity=medium&amp;id=6830a0ae0acd01a249274139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52121-cwe-352-cross-site-request-forgery-csrf-in-nitropack-inc-nitropack-cache-speed-optimization-for-core-web-vitals-defer-css-javascript-lazy-load-images-27413b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52121%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NitroPack%20Inc.%20NitroPack%20%E2%80%93%20Cache%20%26%20Speed%20Optimization%20for%20Core%20Web%20Vitals%2C%20Defer%20CSS%20%26%20JavaScript%2C%20Lazy%20load%20Images&amp;severity=medium&amp;id=6830a0ae0acd01a24927413b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52122-cwe-352-cross-site-request-forgery--3b471a3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52122%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PressTigers%20Simple%20Job%20Board&amp;severity=medium&amp;id=68487f5b1b0bd07c3938c896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52123-cwe-352-cross-site-request-forgery-csrf-in-wpchill-strong-testimonials-27413d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52123%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WPChill%20Strong%20Testimonials&amp;severity=medium&amp;id=6830a0ae0acd01a24927413d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52128-cwe-352-cross-site-request-forgery-csrf-in-whitewp-white-label-wordpress-custom-admin-custom-login-page-and-custom-dashboard-274143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52128%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WhiteWP%20White%20Label%20%E2%80%93%20WordPress%20Custom%20Admin%2C%20Custom%20Login%20Page%2C%20and%20Custom%20Dashboard&amp;severity=medium&amp;id=6830a0ae0acd01a249274143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7207-vulnerability-in-debian-debian-cpio-bd8cc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7207%3A%20Vulnerability%20in%20Debian%20Debian%20cpio&amp;severity=medium&amp;id=682d9819c4522896dcbd8cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22088-na-72959940</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22088%3A%20n%2Fa&amp;severity=critical&amp;id=699f6d49b7ef31ef0b570014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22075-na-in-na-c72233f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22075%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6842df031a426642debc97da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22087-na-in-na-6a148251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22087%3A%20n%2Fa&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52323-na-in-na-b7d65646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52323%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51277-na-in-na-62b57298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51277%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50027-na-in-na-e59dd761</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff39b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-05-f1245f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f1245f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22048-cwe-79-improper-neutralization-of-i-da4db445</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22048%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6840c579182aa0cae2c16ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22047-cwe-362-concurrent-execution-using--3590a094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22047%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)&amp;severity=low&amp;id=683f0dc2182aa0cae27ff439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22051-cwe-190-integer-overflow-or-wraparo-1a64948b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22051%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound&amp;severity=critical&amp;id=692a51f32a13ea799fcc56e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22050-cwe-22-improper-limitation-of-a-pat-8a110838</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22050%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)&amp;severity=high&amp;id=692a51f32a13ea799fcc56db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22049-cwe-472-external-control-of-assumed-3ecb48e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22049%3A%20CWE-472%20External%20Control%20of%20Assumed-Immutable%20Web%20Parameter&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6270-use-after-free-in-red-hat-red-hat-en-58f6d408</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6270%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=691f5c4ce672cd9080e8d3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6551-cwe-434-unrestricted-upload-of-file--93477b0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6551%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20class.upload.php%20class.upload.php&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3726-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ocsinventory-ocsinventory-aeaff5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3726%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OCSInventory%20OCSInventory&amp;severity=medium&amp;id=682cd0f71484d88663aeaff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50866-cwe-89-improper-neutralization-of-s-00228bb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50866%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Travel%20Website&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff3b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50753-cwe-89-improper-neutralization-of-s-2acac12e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50753%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Online%20Notice%20Board%20System&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff3b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50743-cwe-89-improper-neutralization-of-s-b1a38587</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50743%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Online%20Notice%20Board%20System&amp;severity=critical&amp;id=683f0dc2182aa0cae27ff3b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45465-cwe-123-write-what-where-condition--4a93f2cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45465%3A%20CWE-123%3A%20Write-what-where%20Condition%20in%20Siemens%20syngo%20fastView&amp;severity=high&amp;id=683f0dc1182aa0cae27ff355</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6944-generation-of-error-message-containing-sensitive-information-in-red-hat-red-hat-developer-hub-bd871f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6944%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Red%20Hat%20RHDH-1.1-RHEL-9&amp;severity=medium&amp;id=682d9819c4522896dcbd871f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2081-cwe-787-out-of-bounds-write-in-hitachi-energy-rtu500-series-cmu-firmware-2646f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2081%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Hitachi%20Energy%20RTU500%20series%20CMU%20firmware&amp;severity=high&amp;id=682f6ee00acd01a2492646f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41784-cwe-269-improper-privilege-manageme-2cd1e49d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41784%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20ZTE%20Red%20Magic%208%20Pro&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20805-cwe-22-improper-limitation-of-a-pat-3c29a941</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20805%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(%26%2339%3BPath%20Traversal%26%2339%3B)%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=low&amp;id=683f0dc2182aa0cae27ff42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-20802-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bd6c0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-20802%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9816c4522896dcbd6c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50082-na-in-na-5f0fe359</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50082%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5b1b0bd07c3938c889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51812-na-in-na-3e9320c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51812%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f45d9182aa0cae28897dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52322-na-in-na-c31cb45c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52322%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29962-na-in-na-5780991d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29962%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff35b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-04-f123e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f123e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21634-cwe-770-allocation-of-resources-wit-860cc803</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21634%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20amazon-ion%20ion-java&amp;severity=high&amp;id=6909261dfe7723195e0b4162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5138-cwe-1319-improper-protection-against-f72bd5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5138%3A%20CWE-1319%20Improper%20Protection%20against%20Electromagnetic%20Fault%20Injection%20(EM-FI)%20in%20silabs.com%20GSDK&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6338-cwe-427-uncontrolled-search-path-ele-be0d844c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6338%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20Lenovo%20Universal%20Device%20Client%20(UDC)&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0217-use-after-free-1ca54911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0217%3A%20Use%20After%20Free&amp;severity=low&amp;id=68e901b8fd0dca528e8b9a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6004-improper-neutralization-of-special-e-6a8e950b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6004%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690a47466d939959c802229e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21633-cwe-22-improper-limitation-of-a-pat-fc2de7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21633%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20iBotPeaches%20Apktool&amp;severity=high&amp;id=683f0dc2182aa0cae27ff42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50253-cwe-200-exposure-of-sensitive-infor-23b35bb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50253%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20labring%20laf&amp;severity=critical&amp;id=68487f5b1b0bd07c3938bd64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46742-cwe-532-insertion-of-sensitive-info-37d4d034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46742%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20cubefs%20cubefs&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46741-cwe-200-exposure-of-sensitive-infor-dd6acbdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46741%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20cubefs%20cubefs&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff38f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21911-cwe-79-improper-neutralization-of-i-455dbd3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21911%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6929c5924121026312b3ca4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21910-cwe-79-improper-neutralization-of-i-1ccadd23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21910%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6929c5924121026312b3ca45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21909-cwe-407-inefficient-algorithmic-com-b0510551</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21909%3A%20CWE-407%20Inefficient%20Algorithmic%20Complexity&amp;severity=high&amp;id=683f0dc2182aa0cae27ff437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21908-cwe-79-improper-neutralization-of-i-83c861db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21908%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)&amp;severity=medium&amp;id=6929c9154121026312b544c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21907-cwe-755-improper-handling-of-except-598b6702</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21907%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions&amp;severity=high&amp;id=692a23934c03a75d3feb274d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51784-cwe-94-improper-control-of-generation-of-code-code-injection-in-apache-software-foundation-apache-inlong-aebdac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51784%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=critical&amp;id=682cd0f91484d88663aebdac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0201-cwe-862-missing-authorization-in-web-c2399032</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0201%3A%20CWE-862%20Missing%20Authorization%20in%20webcodingplace%20Product%20Expiry%20for%20WooCommerce&amp;severity=medium&amp;id=699f6dd9b7ef31ef0b58f896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6984-cwe-352-cross-site-request-forgery-c-12ad5c54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6984%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ideaboxcreations%20PowerPack%20Addons%20for%20Elementor%20(Free%20Widgets%2C%20Extensions%20and%20Templates)&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52312-cwe-476-null-pointer-dereference-in-f98083f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52312%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52308-cwe-369-divide-by-zero-in-paddlepaddle-paddlepaddle-bd742b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52308%3A%20CWE-369%20Divide%20By%20Zero%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=682d9817c4522896dcbd742b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52306-cwe-369-divide-by-zero-in-paddlepad-d5f949df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52306%3A%20CWE-369%20Divide%20By%20Zero%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-52305-cwe-369-divide-by-zero-in-paddlepad-89124b85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-52305%3A%20CWE-369%20Divide%20By%20Zero%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff3cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38678-cwe-125-out-of-bounds-read-in-paddl-a60e4bfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38678%3A%20CWE-125%20Out-of-bounds%20Read%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=683f0dc2182aa0cae27ff37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38675-cwe-369-divide-by-zero-in-paddlepaddle-paddlepaddle-c00a7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38675%3A%20CWE-369%20Divide%20By%20Zero%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=682dec48c4522896dcc00a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38674-cwe-369-divide-by-zero-in-paddlepad-164ae867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38674%3A%20CWE-369%20Divide%20By%20Zero%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=68434c7e71f4d251b5dd840d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0211-cwe-835-loop-with-unreachable-exit-c-9ee3dc52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0211%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=683f0dc2182aa0cae27ff3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0210-cwe-674-uncontrolled-recursion-in-wi-b58ff5fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0210%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949b3c064ed76fb5b766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0209-cwe-476-null-pointer-dereference-in--fe9578d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0209%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=683f0dc1182aa0cae27ff33a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0208-cwe-230-improper-handling-of-missing-8144caf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0208%3A%20CWE-230%3A%20Improper%20Handling%20of%20Missing%20Values%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69092613fe7723195e0b301f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0207-cwe-125-out-of-bounds-read-in-wiresh-e483ebb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0207%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=high&amp;id=69c6949b3c064ed76fb5b762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6981-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-mostafas1990-wp-sms-messaging-sms-notification-for-wordpress-woocommerce-gravityforms-etc-bd740a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6981%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20mostafas1990%20WP%20SMS%20%E2%80%93%20Messaging%20%26%20SMS%20Notification%20for%20WordPress%2C%20WooCommerce%2C%20GravityForms%2C%20etc&amp;severity=medium&amp;id=682d9817c4522896dcbd740a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6980-cwe-352-cross-site-request-forgery-c-46884607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6980%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mostafas1990%20WP%20SMS%20%E2%80%93%20Messaging%20%26%20SMS%20Notification%20for%20WordPress%2C%20WooCommerce%2C%20GravityForms%2C%20etc&amp;severity=medium&amp;id=6842df031a426642debc9653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6600-cwe-862-missing-authorization-in-daa-bd19638e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6600%3A%20CWE-862%20Missing%20Authorization%20in%20daanvandenbergh%20OMGF%20%7C%20GDPR%2FDSGVO%20Compliant%2C%20Faster%20Google%20Fonts.%20Easy.&amp;severity=high&amp;id=683f0dc1182aa0cae27ff332</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45722-vulnerability-in-hcl-software-dryic-3e351b11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45722%3A%20Vulnerability%20in%20HCL%20Software%20DRYiCE%20MyXalytics&amp;severity=high&amp;id=683f0dc1182aa0cae27ff306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50342-vulnerability-in-hcl-software-dryic-72d9176c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50342%3A%20Vulnerability%20in%20HCL%20Software%20DRYiCE%20MyXalytics&amp;severity=high&amp;id=683f45d9182aa0cae28897d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50345-vulnerability-in-hcl-software-dryic-20664e7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50345%3A%20Vulnerability%20in%20HCL%20Software%20DRYiCE%20MyXalytics&amp;severity=low&amp;id=683f0dc1182aa0cae27ff321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50922-na-in-na-a9904e1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50922%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc1182aa0cae27ff323</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50090-na-in-na-71107af3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50090%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f0dc1182aa0cae27ff31f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46308-na-in-na-77bf2aca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46308%3A%20n%2Fa&amp;severity=critical&amp;id=683f0dc1182aa0cae27ff313</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45559-na-in-na-fa30f87e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45559%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc1182aa0cae27ff304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37608-na-in-na-04eb3aa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37608%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc1182aa0cae27ff302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37607-na-in-na-3b4fa1b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37607%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f0dc1182aa0cae27ff300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-03-e888b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-03&amp;severity=medium&amp;id=682b7ba5d3ddd8cef2e888b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-03-f129ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f129ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48418-cwe-269-improper-privilege-manageme-a50cb403</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48418%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Google%20Pixel%20Watch&amp;severity=critical&amp;id=683f0dc1182aa0cae27ff317</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6339-cwe-311-missing-encryption-of-sensit-32b5e94f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6339%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Google%20Wifi%20Pro&amp;severity=critical&amp;id=683f0dc1182aa0cae27ff325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21627-cwe-79-improper-neutralization-of-i-3818ed7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21627%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PrestaShop%20PrestaShop&amp;severity=high&amp;id=683f0dc1182aa0cae27ff33c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0194-cwe-434-unrestricted-upload-in-codea-be72396c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0194%3A%20CWE-434%20Unrestricted%20Upload%20in%20CodeAstro%20Internet%20Banking%20System&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49794-cwe-290-authentication-bypass-by-spoofing-in-tiann-kernelsu-bd73fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49794%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20tiann%20KernelSU&amp;severity=medium&amp;id=682d9817c4522896dcbd73fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0191-cwe-538-file-and-directory-informati-3658b020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0191%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20RRJ%20Nueva%20Ecija%20Engineer%20Online%20Portal&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff336</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7192-missing-release-of-memory-after-effe-78b266bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7192%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208.2%20Advanced%20Update%20Support&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3010-cwe-1391-use-of-weak-credentials-in--0d63f7c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3010%3A%20CWE-1391%20Use%20of%20Weak%20Credentials%20in%20Priva%20TopControl%20Suite%20-%20Bacnet&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0193-use-after-free-194b1225</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0193%3A%20Use%20After%20Free&amp;severity=high&amp;id=68e7a5cfba0e608b4f98d817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0189-cwe-79-cross-site-scripting-in-rrj-nueva-ecija-engineer-online-portal-bd73d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0189%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20RRJ%20Nueva%20Ecija%20Engineer%20Online%20Portal&amp;severity=low&amp;id=682d9817c4522896dcbd73d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-20188-cwe-79-cross-site-scripting-in-zimb-c7685061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-20188%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Zimbra%20zm-ajax&amp;severity=low&amp;id=683f0dc1182aa0cae27ff2d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48732-cwe-200-exposure-of-sensitive-infor-891ac660</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48732%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6693-stack-based-buffer-overflow-in-red-hat-red-hat-enterprise-linux-8-bdab06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6693%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=682d981cc4522896dcbdab06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47857-cwe-416-use-after-free-in-openharmo-17704d9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47857%3A%20CWE-416%20Use%20After%20Free%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff315</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33120-cwe-416-use-after-free-in-qualcomm--7ab51b52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33120%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33118-cwe-416-use-after-free-in-qualcomm--20f28a40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33118%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33110-cwe-823-use-of-out-of-range-pointer-offset-in-qualcomm-inc-snapdragon-bffb27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33110%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682de1cdc4522896dcbffb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33108-cwe-416-use-after-free-in-qualcomm--f1b1fc94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33108%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33085-cwe-120-buffer-copy-without-checkin-aa44bbf7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33085%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33040-cwe-126-buffer-over-read-in-qualcom-3d281a02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33040%3A%20CWE-126%20Buffer%20Over-read%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33033-cwe-823-use-of-out-of-range-pointer-offset-in-qualcomm-inc-snapdragon-bffb25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33033%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=682de1cdc4522896dcbffb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33030-cwe-120-buffer-copy-without-checkin-779e0020</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33030%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=683f0dc1182aa0cae27ff2f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33014-cwe-20-improper-input-validation-in-9a8a0669</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33014%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47039-heap-based-buffer-overflow-bb642455</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47039%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=691f58cde672cd9080e446ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26159-improper-input-validation-in-follow-20cfe50c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26159%3A%20Improper%20Input%20Validation%20in%20follow-redirects&amp;severity=high&amp;id=6909262dfe7723195e0b5e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32888-denial-of-service-in-mediatek-inc-mt2735-mt6813-mt6833-mt6833p-mt6835-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6877t-mt6878-mt6879-mt6880-mt6883-mt6885-mt6886-mt6889-mt6890-mt6891-mt6893-mt6895-mt6895t-mt6896-mt6897-mt6980-mt6980d-mt6983t-mt6983w-mt6983z-mt6985-mt6985t-mt6989-mt6990-aebc85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32888%3A%20Denial%20of%20Service%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6877T%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895T%2C%20MT6896%2C%20MT6897%2C%20MT6980%2C%20MT6980D%2C%20MT6983T%2C%20MT6983W%2C%20MT6983Z%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6990&amp;severity=high&amp;id=682cd0f91484d88663aebc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32886-denial-of-service-in-mediatek-inc-m-89a2f978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32886%3A%20Denial%20of%20Service%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT6813%2C%20MT6833%2C%20MT6833P%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6877T%2C%20MT6878%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895T%2C%20MT6896%2C%20MT6897%2C%20MT6980%2C%20MT6980D%2C%20MT6983T%2C%20MT6983W%2C%20MT6983Z%2C%20MT6985%2C%20MT6985T%2C%20MT6989%2C%20MT6990%2C%20MT8673%2C%20MT8675%2C%20MT8676%2C%20MT8791%2C%20MT8791T%2C%20MT8792%2C%20MT8796%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=683f0dc1182aa0cae27ff2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32884-information-disclosure-in-mediatek--7237859c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32884%3A%20Information%20Disclosure%20in%20MediaTek%2C%20Inc.%20MT2713%2C%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8167%2C%20MT8167S%2C%20MT8168%2C%20MT8173%2C%20MT8175%2C%20MT8188%2C%20MT8192%2C%20MT8195%2C%20MT8195Z%2C%20MT8321%2C%20MT8362A%2C%20MT8365%2C%20MT8385%2C%20MT8395%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8696%2C%20MT8755%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8771%2C%20MT8775%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8798%2C%20MT8871&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32883-elevation-of-privilege-in-mediatek--3881fa8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32883%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT2713%2C%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8167%2C%20MT8167S%2C%20MT8168%2C%20MT8173%2C%20MT8175%2C%20MT8188%2C%20MT8195%2C%20MT8321%2C%20MT8362A%2C%20MT8365%2C%20MT8385%2C%20MT8390%2C%20MT8395%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32878-information-disclosure-in-mediatek-inc-mt6762-mt6765-mt6833-mt6879-mt6883-mt6885-mt6983-mt8167-mt8168-mt8188-mt8321-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791t-mt8797-mt8798-aebc83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32878%3A%20Information%20Disclosure%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6765%2C%20MT6833%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6983%2C%20MT8167%2C%20MT8168%2C%20MT8188%2C%20MT8321%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682cd0f91484d88663aebc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32876-information-disclosure-in-mediatek--e0aff322</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32876%3A%20Information%20Disclosure%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6731%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6753%2C%20MT6757%2C%20MT6757C%2C%20MT6757CD%2C%20MT6757CH%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8185%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32872-elevation-of-privilege-in-mediatek--c1a1954a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32872%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6731%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6753%2C%20MT6757%2C%20MT6757C%2C%20MT6757CD%2C%20MT6757CH%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8185%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0186-cwe-640-weak-password-recovery-in-hu-5ad137d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0186%3A%20CWE-640%20Weak%20Password%20Recovery%20in%20HuiRan%20Host%20Reseller%20System&amp;severity=low&amp;id=683f0dc1182aa0cae27ff334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49553-na-in-na-3f4149ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49553%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f112a182aa0cae2811bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26623-na-in-na-333628b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26623%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=683f112a182aa0cae2811bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49558-na-in-na-149adc1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49558%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49556-na-in-na-0b8145d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49556%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f0dc1182aa0cae27ff31b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45892-n-a-in-n-a-aecc32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45892%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fc1484d88663aecc32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26625-n-a-in-n-a-aebc8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26625%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682cd0f91484d88663aebc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49550-n-a-in-n-a-aebc89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49550%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f91484d88663aebc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-02-74fd95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-02&amp;severity=medium&amp;id=682c7abce3e6de8ceb74fd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-02-f120de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f120de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0183-cwe-80-basic-cross-site-scripting-in-rrj-nueva-ecija-engineer-online-portal-bd639c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0183%3A%20CWE-80%20Basic%20Cross%20Site%20Scripting%20in%20RRJ%20Nueva%20Ecija%20Engineer%20Online%20Portal&amp;severity=low&amp;id=682d9815c4522896dcbd639c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0182-cwe-89-sql-injection-in-sourcecodest-ece2665b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0182%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Engineers%20Online%20Portal&amp;severity=high&amp;id=683f112a182aa0cae2811bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0181-cwe-79-cross-site-scripting-in-rrj-n-aa2e47f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0181%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20RRJ%20Nueva%20Ecija%20Engineer%20Online%20Portal&amp;severity=low&amp;id=683f112a182aa0cae2811bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5877-cwe-918-server-side-request-forgery--392dbb1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5877%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20affiliate-toolkit&amp;severity=critical&amp;id=683f112a182aa0cae2811bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6064-cwe-200-information-exposure-in-unknown-payhere-payment-gateway-bd63f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6064%3A%20CWE-200%20Information%20Exposure%20in%20Unknown%20PayHere%20Payment%20Gateway&amp;severity=high&amp;id=682d9815c4522896dcbd63f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-21732-na-in-na-14978af3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-21732%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f112a182aa0cae2811bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2024-01-01-f12ec9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202024-01-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-31-f12be1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-30-f1290e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f1290e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-29-f12ba1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50854-cwe-89-improper-neutralization-of-s-902b27c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50854%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Squirrly%20Squirrly%20SEO%20-%20Advanced%20Pack&amp;severity=high&amp;id=683ee1ec182aa0cae27396f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-28-f1307b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f1307b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51443-cwe-703-improper-check-or-handling--7274440f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51443%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20signalwire%20freeswitch&amp;severity=high&amp;id=690a47446d939959c802221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4641-incorrect-implementation-of-authenti-22ec9872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4641%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm&amp;severity=medium&amp;id=690904ae00ff46172d4a0dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-27-f13188</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-27&amp;severity=medium&amp;id=682acdc2bbaf20d303f13188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50175-cross-site-scripting-xss-in-weseek-inc-growi-bf54a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50175%3A%20Cross-site%20scripting%20(XSS)%20in%20WESEEK%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=682d9847c4522896dcbf54a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45740-cross-site-scripting-xss-in-weseek-inc-growi-bf549c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45740%3A%20Cross-site%20scripting%20(XSS)%20in%20WESEEK%2C%20Inc.%20GROWI&amp;severity=medium&amp;id=682d9847c4522896dcbf549c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49438-na-6dd6ecc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49438%3A%20n%2Fa&amp;severity=null&amp;id=690a47396d939959c8021bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51101-n-a-in-n-a-bf54b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf54b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51104-n-a-in-n-a-bf538f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51104%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf538f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-26-f127a0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f127a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7104-cwe-122-heap-based-buffer-overflow-i-19cab8f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7104%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20SQLite%20SQLite3&amp;severity=medium&amp;id=69092613fe7723195e0b3015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7096-sql-injection-in-code-projects-facul-86087f10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7096%3A%20SQL%20Injection%20in%20code-projects%20Faculty%20Management%20System&amp;severity=medium&amp;id=693a86a47d4c6f31f79227ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7094-cwe-200-information-disclosure-in-netentsec-ns-asg-application-security-gateway-bf544c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7094%3A%20CWE-200%20Information%20Disclosure%20in%20Netentsec%20NS-ASG%20Application%20Security%20Gateway&amp;severity=medium&amp;id=682d9847c4522896dcbf544c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48654-na-1ebabb20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48654%3A%20n%2Fa&amp;severity=null&amp;id=690a5558a730e5a3d9d7c208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51775-na-14825d89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51775%3A%20n%2Fa&amp;severity=medium&amp;id=69092638fe7723195e0b62f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51771-n-a-in-n-a-bf53c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51771%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf53c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49954-n-a-in-n-a-bf519f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9846c4522896dcbf519f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47091-n-a-in-n-a-bf518f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47091%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9846c4522896dcbf518f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40236-n-a-in-n-a-bf517f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9846c4522896dcbf517f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-25-f12e43</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7101-cwe-95-improper-neutralization-of-di-aac5ccfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7101%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20Douglas%20Wilson%20Spreadsheet%3A%3AParseExcel&amp;severity=high&amp;id=68f7d9af247d717aace26871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51767-na-b983caaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51767%3A%20n%2Fa&amp;severity=high&amp;id=690a6f039e609817bf702c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51766-na-9a584e27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51766%3A%20n%2Fa&amp;severity=null&amp;id=690a47456d939959c802223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51764-na-2f4e77e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51764%3A%20n%2Fa&amp;severity=null&amp;id=690a47446d939959c8022226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-24-f12ff5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-24&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49594-cwe-201-information-exposure-throug-395459ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49594%3A%20CWE-201%3A%20Information%20Exposure%20Through%20Sent%20Data%20in%20instipod%20DuoUniversalKeycloakAuthenticator&amp;severity=medium&amp;id=690a473b6d939959c8021bf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7008-channel-accessible-by-non-endpoint-i-7f3480f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7008%3A%20Channel%20Accessible%20by%20Non-Endpoint%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7002-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-migrate-backup-migration-bf543b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7002%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20migrate%20Backup%20Migration&amp;severity=medium&amp;id=682d9847c4522896dcbf543b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-23-f124ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f124ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51650-cwe-862-missing-authorization-in-dromara-hertzbeat-bf5397</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51650%3A%20CWE-862%3A%20Missing%20Authorization%20in%20dromara%20hertzbeat&amp;severity=medium&amp;id=682d9847c4522896dcbf5397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50727-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-resque-resque-bf5387</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50727%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20resque%20resque&amp;severity=medium&amp;id=682d9847c4522896dcbf5387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50258-cwe-918-server-side-request-forgery-ssrf-in-pymedusa-medusa-bf537f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50258%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20pymedusa%20Medusa&amp;severity=medium&amp;id=682d9847c4522896dcbf537f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42465-na-6b8bbea4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42465%3A%20n%2Fa&amp;severity=null&amp;id=690a43a16d939959c8fde068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51704-na-ce045dab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51704%3A%20n%2Fa&amp;severity=null&amp;id=690a3b5fff58c9332ff09320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51713-na-9f444fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51713%3A%20n%2Fa&amp;severity=null&amp;id=69092637fe7723195e0b6255</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49356-n-a-in-n-a-bf5197</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49356%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9846c4522896dcbf5197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51707-n-a-in-n-a-bf5074</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51707%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9846c4522896dcbf5074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-22-f127e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f127e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-battleroyal-darkgate-cluster-spreads-via-email-and-fake-browser-updates-f0ee50</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20BattleRoyal%2C%20DarkGate%20Cluster%20Spreads%20via%20Email%20and%20Fake%20Browser%20Updates&amp;severity=medium&amp;id=682acdbebbaf20d303f0ee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-battleroyal-darkgate-cluster-spreads-via-email-and-fake-browser-updates-f0c2a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20BattleRoyal%2C%20DarkGate%20Cluster%20Spreads%20via%20Email%20and%20Fake%20Browser%20Updates&amp;severity=medium&amp;id=682acdbebbaf20d303f0c2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7024-heap-buffer-overflow-in-google-chrom-ff689190</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7024%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9af247d717aace26868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37519-vulnerability-in-hcl-software-hcl-bigfix-platform-bf4feb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37519%3A%20Vulnerability%20in%20HCL%20Software%20HCL%20BigFix%20Platform&amp;severity=medium&amp;id=682d9846c4522896dcbf4feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48689-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-railway-reservation-system-bf5070</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48689%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Railway%20Reservation%20System&amp;severity=medium&amp;id=682d9846c4522896dcbf5070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6746-cwe-532-insertion-of-sensitive-information-into-log-file-in-github-enterprise-server-bf5078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6746%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=682d9846c4522896dcbf5078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41097-cwe-208-observable-timing-discrepancy-in-silabs-com-gsdk-bf5063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41097%3A%20CWE-208%20Observable%20Timing%20Discrepancy%20in%20silabs.com%20GSDK&amp;severity=medium&amp;id=682d9846c4522896dcbf5063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7042-null-pointer-dereference-in-red-hat--03c0808e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7042%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=6920092a04dd2c5f9994c026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6546-use-after-free-in-red-hat-red-hat-en-78cf3d68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6546%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690cfc1ee0be39967232fe35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7039-cwe-74-injection-in-byzoro-s210-bf119a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7039%3A%20CWE-74%20Injection%20in%20Byzoro%20S210&amp;severity=medium&amp;id=682d9840c4522896dcbf119a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32747-cwe-639-authorization-bypass-through-user-controlled-key-in-woocommerce-woocommerce-bookings-bf118a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32747%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20WooCommerce%20WooCommerce%20Bookings&amp;severity=medium&amp;id=682d9840c4522896dcbf118a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45121-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45121%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45120-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45120%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45119-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45119%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45118-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45118%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45117-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45117%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45116-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45116%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45115-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-projectworlds-pvt-limited-online-examination-system-aeb7ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45115%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Projectworlds%20Pvt.%20Limited%20Online%20Examination%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50822-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-currency-wiki-currency-converter-widget-exchange-rates-bf1192</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Currency.Wiki%20Currency%20Converter%20Widget%20%E2%80%93%20Exchange%20Rates&amp;severity=medium&amp;id=682d9840c4522896dcbf1192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49778-cwe-502-deserialization-of-untrusted-data-in-hakan-demiray-sayfa-sayac-bf1100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49778%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Hakan%20Demiray%20Sayfa%20Sayac&amp;severity=medium&amp;id=682d9840c4522896dcbf1100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5989-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-uyumsoft-information-system-and-technologies-lioxerp-bf111d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5989%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Uyumsoft%20Information%20System%20and%20Technologies%20LioXERP&amp;severity=medium&amp;id=682d9840c4522896dcbf111d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7025-cwe-284-improper-access-controls-in-kylinsoft-hedron-domain-hook-bf1125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7025%3A%20CWE-284%20Improper%20Access%20Controls%20in%20KylinSoft%20hedron-domain-hook&amp;severity=medium&amp;id=682d9840c4522896dcbf1125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-7022-cwe-89-sql-injection-in-tongda-oa-2017-bf1121</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-7022%3A%20CWE-89%20SQL%20Injection%20in%20Tongda%20OA%202017&amp;severity=medium&amp;id=682d9840c4522896dcbf1121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-21-f2b31a77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-21&amp;severity=medium&amp;id=68359c9a5d5f0974d01e37ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51052-n-a-in-n-a-bf1104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51052%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf1104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-21-f196c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-21&amp;severity=medium&amp;id=682acdc3bbaf20d303f196c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-21-f12b9b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49272-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kashipara-group-hotel-management-aeb712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49272%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kashipara%20Group%20Hotel%20Management&amp;severity=medium&amp;id=682cd0f81484d88663aeb712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23970-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-woorockets-corsa-bf10f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23970%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20WooRockets%20Corsa&amp;severity=medium&amp;id=682d9840c4522896dcbf10f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49271-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kashipara-group-hotel-management-aeb710</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49271%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kashipara%20Group%20Hotel%20Management&amp;severity=medium&amp;id=682cd0f81484d88663aeb710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49270-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kashipara-group-hotel-management-aeb703</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49270%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kashipara%20Group%20Hotel%20Management&amp;severity=medium&amp;id=682cd0f81484d88663aeb703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40204-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-premio-folders-unlimited-folders-to-organize-media-library-folder-pages-posts-file-manager-bef278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40204%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Premio%20Folders%20%E2%80%93%20Unlimited%20Folders%20to%20Organize%20Media%20Library%20Folder%2C%20Pages%2C%20Posts%2C%20File%20Manager&amp;severity=critical&amp;id=682d983dc4522896dcbef278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47599-cwe-502-deserialization-of-untrusted-data-in-file-manager-by-bit-form-team-file-manager-100-free-open-source-file-manager-plugin-for-wordpress-bit-file-manager-bda1e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47599%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20File%20Manager%20by%20Bit%20Form%20Team%20File%20Manager%20%E2%80%93%20100%25%20Free%20%26%20Open%20Source%20File%20Manager%20Plugin%20for%20WordPress%20%7C%20Bit%20File%20Manager&amp;severity=medium&amp;id=682d981bc4522896dcbda1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49269-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kashipara-group-hotel-management-aeb701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49269%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Kashipara%20Group%20Hotel%20Management&amp;severity=medium&amp;id=682cd0f81484d88663aeb701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30872-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-bannersky-bsk-forms-blacklist-bda208</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30872%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20BannerSky%20BSK%20Forms%20Blacklist&amp;severity=high&amp;id=682d981bc4522896dcbda208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5007-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kashipara-group-student-information-system-aeb4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5007%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Student%20Information%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5011-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kashipara-group-student-information-system-aeb4c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5011%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Student%20Information%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb4c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5010-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kashipara-group-student-information-system-aeb4c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5010%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kashipara%20Group%20Student%20Information%20System&amp;severity=high&amp;id=682cd0f81484d88663aeb4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49772-cwe-502-deserialization-of-untrusted-data-in-phpbits-creative-studio-genesis-simple-love-bda225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49772%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Phpbits%20Creative%20Studio%20Genesis%20Simple%20Love&amp;severity=critical&amp;id=682d981bc4522896dcbda225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40010-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-realmag777-husky-products-filter-for-woocommerce-professional-bda218</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40010%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20realmag777%20HUSKY%20%E2%80%93%20Products%20Filter%20for%20WooCommerce%20Professional&amp;severity=critical&amp;id=682d981bc4522896dcbda218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51458-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bda22b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51458%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d981bc4522896dcbda22b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38513-cwe-639-authorization-bypass-through-user-controlled-key-in-jordy-meow-photo-engine-media-organizer-lightroom-bda210</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38513%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Jordy%20Meow%20Photo%20Engine%20(Media%20Organizer%20%26%20Lightroom)&amp;severity=medium&amp;id=682d981bc4522896dcbda210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0011-cwe-20-improper-input-validation-in-u-blox-toby-l2-bf10e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0011%3A%20CWE-20%20Improper%20Input%20Validation%20in%20u-blox%20TOBY-L2&amp;severity=medium&amp;id=682d9840c4522896dcbf10e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49032-n-a-in-n-a-bf108c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49032%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf108c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27172-n-a-in-n-a-bda148</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27172%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbda148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-20-762558</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-20&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb762558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-20-f12d26</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6929-cwe-639-authorization-bypass-through-user-controlled-key-in-eurotel-etl3100-bda190</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6929%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20EuroTel%20ETL3100&amp;severity=high&amp;id=682d981bc4522896dcbda190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42940-a-user-who-shares-their-screen-may-unintentionally-share-the-incorrect-content-in-apple-macos-bda150</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42940%3A%20A%20user%20who%20shares%20their%20screen%20may%20unintentionally%20share%20the%20incorrect%20content%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48327-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wc-vendors-wc-vendors-woocommerce-multi-vendor-woocommerce-marketplace-product-vendors-bda160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48327%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WC%20Vendors%20WC%20Vendors%20%E2%80%93%20WooCommerce%20Multi-Vendor%2C%20WooCommerce%20Marketplace%2C%20Product%20Vendors&amp;severity=high&amp;id=682d981bc4522896dcbda160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41727-vulnerability-in-ivanti-wavelink-bda0eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41727%3A%20Vulnerability%20in%20Ivanti%20Wavelink&amp;severity=critical&amp;id=682d981bc4522896dcbda0eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46257-vulnerability-in-ivanti-avalanche-bda0ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46257%3A%20Vulnerability%20in%20Ivanti%20Avalanche&amp;severity=critical&amp;id=682d981bc4522896dcbda0ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50272-vulnerability-in-hewlett-packard-enterprise-hpe-hpe-integrated-lights-out-5-ilo-5-hpe-integrated-lights-out-6-ilo-6-bd8c94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50272%3A%20Vulnerability%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Integrated%20Lights-out%205%20(iLO%205)%2C%20HPE%20Integrated%20Lights-out%206%20(iLO%206)%2C&amp;severity=high&amp;id=682d9819c4522896dcbd8c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6869-content-can-paint-outside-of-sandboxed-iframe-in-mozilla-firefox-bd8cba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6869%3A%20Content%20can%20paint%20outside%20of%20sandboxed%20iframe%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=682d9819c4522896dcbd8cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6858-heap-buffer-overflow-in-nstextfragment-in-mozilla-firefox-esr-bd8cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6858%3A%20Heap%20buffer%20overflow%20in%20nsTextFragment%20in%20Mozilla%20Firefox%20ESR&amp;severity=high&amp;id=682d9819c4522896dcbd8cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6940-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-mlflow-mlflow-mlflow-bd8cbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6940%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20mlflow%20mlflow%2Fmlflow&amp;severity=critical&amp;id=682d9819c4522896dcbd8cbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-targeting-luxembourg-services-hosted-and--685ed018</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20targeting%20Luxembourg%20services%20(hosted%20and%20served%20on%2Ffrom%20AWS)&amp;severity=medium&amp;id=68359c9f5d5f0974d01fc2ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49489-n-a-in-n-a-bd8c8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49489%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-19-f12de8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12de8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-targeting-luxembourg-services-hosted-and-served-on-from-aws-f0e677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20targeting%20Luxembourg%20services%20(hosted%20and%20served%20on%2Ffrom%20AWS)&amp;severity=medium&amp;id=682acdbebbaf20d303f0e677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45809-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-ricard-torres-thumbs-rating-bd8c02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45809%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Ricard%20Torres%20Thumbs%20Rating&amp;severity=medium&amp;id=682d9819c4522896dcbd8c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6918-unchecked-return-value-in-red-hat-re-f3cf4e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6918%3A%20Unchecked%20Return%20Value%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=low&amp;id=68e0f3c1b66c7f7acdd3e947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6927-url-redirection-to-untrusted-site-op-1b351fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6927%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2022&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47530-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wpvibes-redirect-404-error-page-to-homepage-or-custom-page-with-logs-bd8c21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47530%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WPVibes%20Redirect%20404%20Error%20Page%20to%20Homepage%20or%20Custom%20Page%20with%20Logs&amp;severity=high&amp;id=682d9819c4522896dcbd8c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48769-cwe-352-cross-site-request-forgery-csrf-in-blue-coral-chat-bubble-floating-chat-with-contact-chat-icons-messages-telegram-email-sms-call-me-back-bd8c2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48769%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Blue%20Coral%20Chat%20Bubble%20%E2%80%93%20Floating%20Chat%20with%20Contact%20Chat%20Icons%2C%20Messages%2C%20Telegram%2C%20Email%2C%20SMS%2C%20Call%20me%20back&amp;severity=medium&amp;id=682d9819c4522896dcbd8c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4724-cwe-94-improper-control-of-generation-of-code-code-injection-in-unknown-export-any-wordpress-data-to-xml-csv-aeac93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4724%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20Export%20any%20WordPress%20data%20to%20XML%2FCSV&amp;severity=high&amp;id=682cd0f71484d88663aeac93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6289-cwe-287-improper-authentication-in-unknown-swift-performance-lite-bd8c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6289%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20Swift%20Performance%20Lite&amp;severity=medium&amp;id=682d9819c4522896dcbd8c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5005-cwe-79-cross-site-scripting-xss-in-unknown-autocomplete-location-field-contact-form-7-bd8c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5005%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Autocomplete%20Location%20field%20Contact%20Form%207&amp;severity=medium&amp;id=682d9819c4522896dcbd8c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48755-cwe-352-cross-site-request-forgery-csrf-in-michael-winkler-teachpress-bd8c27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48755%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Michael%20Winkler%20teachPress&amp;severity=medium&amp;id=682d9819c4522896dcbd8c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49840-cwe-352-cross-site-request-forgery-csrf-in-palscode-multi-currency-for-woocommerce-bd8c40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49840%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Palscode%20Multi%20Currency%20For%20WooCommerce&amp;severity=medium&amp;id=682d9819c4522896dcbd8c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6228-out-of-bounds-write-in-red-hat-red-h-c7190d51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6228%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=low&amp;id=68e901b8fd0dca528e8b9a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5384-cleartext-storage-of-sensitive-infor-aea8d143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5384%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Red%20Hat%20Red%20Hat%20Data%20Grid%208.4.6&amp;severity=high&amp;id=691ebfd29f5a9374a9cb420f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5236-vulnerability-in-red-hat-red-hat-dat-f415e95e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5236%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Data%20Grid%208.4.4&amp;severity=medium&amp;id=690dd346c2e5047ad745b3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5056-missing-authorization-in-red-hat-ser-ff4379d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5056%3A%20Missing%20Authorization%20in%20Red%20Hat%20Service%20Interconnect%201%20for%20RHEL%209&amp;severity=medium&amp;id=68e7a23aba0e608b4f980f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5115-absolute-path-traversal-in-red-hat-r-ca82d133</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5115%3A%20Absolute%20Path%20Traversal%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.3%20for%20RHEL%208&amp;severity=medium&amp;id=68e84755ba0e608b4faf9c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3629-missing-critical-step-in-authentication-in-red-hat-red-hat-data-grid-8-4-4-bd8c10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3629%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Red%20Hat%20Red%20Hat%20Data%20Grid%208.4.4&amp;severity=medium&amp;id=682d9819c4522896dcbd8c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3628-missing-critical-step-in-authenticat-c47e909e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3628%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20Red%20Hat%20Red%20Hat%20Data%20Grid%208.4.4&amp;severity=medium&amp;id=690dcfa5c2e5047ad7418682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4320-insufficient-session-expiration-in-r-012743c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4320%3A%20Insufficient%20Session%20Expiration%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.15%20for%20RHEL%208&amp;severity=high&amp;id=68e8557bba0e608b4fb1eea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47038-heap-based-buffer-overflow-c4a6d37a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47038%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=68e55537a677756fc99a772e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32727-cwe-20-improper-input-validation-in-zabbix-zabbix-bd8c08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32727%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zabbix%20Zabbix&amp;severity=medium&amp;id=682d9819c4522896dcbd8c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6483-cwe-287-improper-authentication-in-aditaas-allied-digital-integrated-tool-as-a-service-bd8b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6483%3A%20CWE-287%20Improper%20Authentication%20in%20ADiTaaS%20Allied%20Digital%20Integrated%20Tool-as-a-Service&amp;severity=critical&amp;id=682d9819c4522896dcbd8b86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6906-cwe-120-buffer-overflow-in-totolink-a7100ru-bd8bc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6906%3A%20CWE-120%20Buffer%20Overflow%20in%20Totolink%20A7100RU&amp;severity=critical&amp;id=682d9819c4522896dcbd8bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51385-na-960d3ce5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51385%3A%20n%2Fa&amp;severity=medium&amp;id=690a6f039e609817bf702c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50981-n-a-in-n-a-bd8b82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50981%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48795-n-a-in-n-a-aec88c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48795%3A%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec88c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-18-f1258d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f1258d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3907-cwe-286-incorrect-user-management-in-gitlab-gitlab-253f60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3907%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6898-cwe-89-sql-injection-in-sourcecodester-best-courier-management-system-bd8bbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6898%3A%20CWE-89%20SQL%20Injection%20in%20SourceCodester%20Best%20Courier%20Management%20System&amp;severity=medium&amp;id=682d9819c4522896dcbd8bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6894-cwe-200-information-disclosure-in-hikvision-intercom-broadcasting-system-bd8bad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6894%3A%20CWE-200%20Information%20Disclosure%20in%20Hikvision%20Intercom%20Broadcasting%20System&amp;severity=medium&amp;id=682d9819c4522896dcbd8bad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50976-n-a-in-n-a-aeac87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50976%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeac87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-17-f13071</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f13071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6853-cwe-918-server-side-request-forgery-in-kalcaddle-kodexplorer-bd8b8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6853%3A%20CWE-918%20Server-Side%20Request%20Forgery%20in%20kalcaddle%20KodExplorer&amp;severity=medium&amp;id=682d9819c4522896dcbd8b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50784-na-5208a0e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50784%3A%20n%2Fa&amp;severity=null&amp;id=690a473e6d939959c8021f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-16-f1239b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f1239b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27317-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-netapp-ontap-9-bd8b5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27317%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20NetApp%20ONTAP%209&amp;severity=medium&amp;id=682d9819c4522896dcbd8b5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50723-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-xwiki-xwiki-platform-bd8b7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50723%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=critical&amp;id=682d9819c4522896dcbd8b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3904-cwe-1287-improper-validation-of-specified-type-of-input-in-gitlab-gitlab-253f51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3904%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5061-cwe-862-missing-authorization-in-gitlab-gitlab-253fa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5061%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5512-cwe-94-improper-control-of-generation-of-code-code-injection-in-gitlab-gitlab-253fb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5512%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6051-cwe-94-improper-control-of-generation-of-code-code-injection-in-gitlab-gitlab-253fc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6051%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3511-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3511%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6553-cwe-94-improper-control-of-generation-of-code-code-injection-in-migrate-backup-migration-bd8b8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6553%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20migrate%20Backup%20Migration&amp;severity=critical&amp;id=682d9819c4522896dcbd8b8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48538-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bd8b71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48538%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9819c4522896dcbd8b71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48452-cross-site-scripting-dom-based-xss-cwe-79-in-adobe-adobe-experience-manager-bd8b6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48452%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9819c4522896dcbd8b6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48527-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bffb11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48527%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de1cdc4522896dcbffb11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48559-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bffb1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48559%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de1cdc4522896dcbffb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48474-cross-site-scripting-dom-based-xss-cwe-79-in-adobe-adobe-experience-manager-bffb0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48474%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de1cdc4522896dcbffb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48570-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bffb1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48570%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de1cdc4522896dcbffb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48516-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bffb0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48516%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de1cdc4522896dcbffb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48463-cross-site-scripting-dom-based-xss-cwe-79-in-adobe-adobe-experience-manager-bffb0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48463%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de1cdc4522896dcbffb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48548-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bfffab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48548%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de546c4522896dcbfffab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48442-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bfffa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48442%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de546c4522896dcbfffa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48495-cross-site-scripting-dom-based-xss-cwe-79-in-adobe-adobe-experience-manager-bfffa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48495%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de546c4522896dcbfffa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48484-cross-site-scripting-dom-based-xss-cwe-79-in-adobe-adobe-experience-manager-bfffa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48484%3A%20Cross-site%20Scripting%20(DOM-based%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de546c4522896dcbfffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48506-cross-site-scripting-stored-xss-cwe-79-in-adobe-adobe-experience-manager-bfffa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48506%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682de546c4522896dcbfffa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6837-cwe-863-incorrect-authorization-in-w-d1df2a19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6837%3A%20CWE-863%20Incorrect%20Authorization%20in%20WSO2%20WSO2%20API%20Manager&amp;severity=high&amp;id=68415c3a182aa0cae2d6f454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48395-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-kaifa-technology-webitr-bfffa1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48395%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kaifa%20Technology%20WebITR&amp;severity=medium&amp;id=682de546c4522896dcbfffa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48380-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-softnext-mail-sqr-expert-bfff94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48380%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Softnext%20Mail%20SQR%20Expert&amp;severity=high&amp;id=682de546c4522896dcbfff94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48373-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-itpison-omicard-edm-s-sms-bfff92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48373%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ITPison%20OMICARD%20EDM%20&apos;s%20SMS&amp;severity=high&amp;id=682de546c4522896dcbfff92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-15-f12fd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4489-cwe-1279-cryptographic-operations-are-run-before-supporting-units-are-ready-in-silabs-com-z-ip-gateway-sdk-bfffb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4489%3A%20CWE-1279%20Cryptographic%20Operations%20are%20run%20Before%20Supporting%20Units%20are%20Ready%20in%20silabs.com%20Z%2FIP%20Gateway%20SDK&amp;severity=medium&amp;id=682de546c4522896dcbfffb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6702-type-confusion-in-google-chrome-33491fa7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6702%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=690a47466d939959c80222ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6134-improper-neutralization-of-input-dur-78a0d40b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6134%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Keycloak%2022&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49345-cwe-668-in-ubuntu-budgie-budgie-extras-bfffaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49345%3A%20CWE-668%20in%20Ubuntu%20Budgie%20Budgie%20Extras&amp;severity=medium&amp;id=682de546c4522896dcbfffaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6563-allocation-of-resources-without-limi-b0677e92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6563%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20Single%20Sign-On%207.6%20for%20RHEL%207&amp;severity=high&amp;id=68e7a23aba0e608b4f980f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50269-cwe-674-uncontrolled-recursion-in-squid-cache-squid-bfffb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50269%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20squid-cache%20squid&amp;severity=high&amp;id=682de546c4522896dcbfffb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48770-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nima-saberi-aparat-bfffad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48770%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Nima%20Saberi%20Aparat&amp;severity=medium&amp;id=682de546c4522896dcbfffad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6366-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-progress-software-corporation-whatsup-gold-c00435</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6366%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Progress%20Software%20Corporation%20WhatsUp%20Gold&amp;severity=high&amp;id=682de8d1c4522896dcc00435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48663-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-vapp-manager-c00433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48663%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20vApp%20Manager&amp;severity=high&amp;id=682de8d1c4522896dcc00433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49771-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-peter-raschendorfer-smart-external-link-click-monitor-link-log-2644e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49771%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Peter%20Raschendorfer%20Smart%20External%20Link%20Click%20Monitor%20%5BLink%20Log%5D&amp;severity=high&amp;id=682f64490acd01a2492644e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49739-vulnerability-in-ideabox-creations--39eaf2bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49739%3A%20Vulnerability%20in%20IdeaBox%20Creations%20PowerPack%20Pro%20for%20Elementor&amp;severity=high&amp;id=683f45d9182aa0cae28897d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49833-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-brainstorm-force-spectra-wordpress-gutenberg-blocks-2644ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49833%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Brainstorm%20Force%20Spectra%20%E2%80%93%20WordPress%20Gutenberg%20Blocks&amp;severity=medium&amp;id=682f64490acd01a2492644ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46143-cwe-494-download-of-code-without-integrity-check-in-phoenix-contact-automation-worx-software-suite-2644c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46143%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20PHOENIX%20CONTACT%20Automation%20Worx%20Software%20Suite&amp;severity=high&amp;id=682f64490acd01a2492644c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6572-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-gradio-app-gradio-app-gradio-2644c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6572%3A%20CWE-77%20%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gradio-app%20gradio-app%2Fgradio&amp;severity=critical&amp;id=682f64490acd01a2492644c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6569-cwe-73-external-control-of-file-name-or-path-in-h2oai-h2oai-h2o-3-2644c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6569%3A%20CWE-73%20External%20Control%20of%20File%20Name%20or%20Path%20in%20h2oai%20h2oai%2Fh2o-3&amp;severity=critical&amp;id=682f64490acd01a2492644c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46750-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-apache-software-foundation-apache-shiro-2645a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46750%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=medium&amp;id=682f67ff0acd01a2492645a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25644-cwe-755-improper-handling-of-exceptional-conditions-in-zte-mc801a-264598</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25644%3A%20CWE-755%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20ZTE%20MC801A&amp;severity=medium&amp;id=682f67ff0acd01a249264598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43042-cwe-1393-use-of-default-password-in-ibm-storage-virtualize-26459c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43042%3A%20CWE-1393%20Use%20of%20Default%20Password%20in%20IBM%20Storage%20Virtualize&amp;severity=high&amp;id=682f67ff0acd01a24926459c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49938-na-c89ac6fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49938%3A%20n%2Fa&amp;severity=null&amp;id=690a473e6d939959c8021f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49937-na-b60ef37c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49937%3A%20n%2Fa&amp;severity=null&amp;id=690a473e6d939959c8021f31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49936-na-c0f63cb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49936%3A%20n%2Fa&amp;severity=null&amp;id=690a473c6d939959c8021c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49935-na-e43f787f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49935%3A%20n%2Fa&amp;severity=null&amp;id=690a473c6d939959c8021c75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49934-na-7430f1ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49934%3A%20n%2Fa&amp;severity=null&amp;id=690a473c6d939959c8021c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49933-na-3d164a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49933%3A%20n%2Fa&amp;severity=null&amp;id=690a473c6d939959c8021c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50471-na-23f402f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50471%3A%20n%2Fa&amp;severity=null&amp;id=690a3b5fff58c9332ff0930c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41151-n-a-in-n-a-26459a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41151%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f67ff0acd01a24926459a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48085-n-a-in-n-a-26457c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48085%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f67ff0acd01a24926457c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-14-f12d57</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45170-264-permissions-privileges-access-controls-in-ibm-aix-264578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45170%3A%20264%20Permissions%2C%20Privileges%2C%20Access%20Controls%20in%20IBM%20AIX&amp;severity=high&amp;id=682f67ff0acd01a249264578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47619-cwe-918-server-side-request-forgery-ssrf-in-advplyr-audiobookshelf-26457a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47619%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20advplyr%20audiobookshelf&amp;severity=high&amp;id=682f67ff0acd01a24926457a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6772-cwe-89-sql-injection-in-otcms-26457e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6772%3A%20CWE-89%20SQL%20Injection%20in%20OTCMS&amp;severity=medium&amp;id=682f67ff0acd01a24926457e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50777-vulnerability-in-jenkins-project-jenkins-paaslane-estimate-plugin-26464e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50777%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20PaaSLane%20Estimate%20Plugin&amp;severity=medium&amp;id=682f6b520acd01a24926464e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50768-vulnerability-in-jenkins-project-jenkins-nexus-platform-plugin-26464c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50768%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Nexus%20Platform%20Plugin&amp;severity=high&amp;id=682f6b520acd01a24926464c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6757-cwe-200-information-disclosure-in-thecosy-icecms-264652</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6757%3A%20CWE-200%20Information%20Disclosure%20in%20Thecosy%20IceCMS&amp;severity=medium&amp;id=682f6b520acd01a249264652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48627-out-of-bounds-write-cwe-787-in-adobe-substance3d-sampler-264643</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48627%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Substance3D%20-%20Sampler&amp;severity=high&amp;id=682f6b520acd01a249264643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47081-out-of-bounds-read-cwe-125-in-adobe-substance3d-stager-264641</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47081%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Substance3D%20-%20Stager&amp;severity=medium&amp;id=682f6b520acd01a249264641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6723-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-repox-repox-264650</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6723%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Repox%20Repox&amp;severity=critical&amp;id=682f6b520acd01a249264650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47074-out-of-bounds-read-cwe-125-in-adobe-illustrator-26463f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47074%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=high&amp;id=682f6b520acd01a24926463f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47536-improper-access-control-in-fortinet-fortios-264723</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47536%3A%20Improper%20access%20control%20in%20Fortinet%20FortiOS&amp;severity=low&amp;id=682f6ee00acd01a249264723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46675-cwe-532-insertion-of-sensitive-information-into-log-file-in-elastic-kibana-26471a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46675%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Elastic%20Kibana&amp;severity=high&amp;id=682f6ee00acd01a24926471a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6478-integer-overflow-or-wraparound-in-re-1e5fa80b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6478%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206%20Extended%20Lifecycle%20Support%20%20-%20EXTENSION&amp;severity=high&amp;id=691ebfd29f5a9374a9cb426b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6377-out-of-bounds-read-in-red-hat-red-ha-6c8c2ffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6377%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206%20Extended%20Lifecycle%20Support%20%20-%20EXTENSION&amp;severity=high&amp;id=691ebfd29f5a9374a9cb424b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34194-na-1a1c4c7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34194%3A%20n%2Fa&amp;severity=null&amp;id=690a439d6d939959c8fddae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50440-na-in-na-03ad43ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50440%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683eff8d182aa0cae27db840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45864-n-a-in-n-a-2647ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45864%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f725b0acd01a2492647ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47325-n-a-in-n-a-264721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47325%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f6ee00acd01a249264721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47320-n-a-in-n-a-26471c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f6ee00acd01a24926471c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-13-f12284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6710-improper-neutralization-of-input-dur-49bf266f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6710%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20JBoss%20Core%20Services%20for%20RHEL%208&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5764-improper-neutralization-of-special-e-697b12bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5764%3A%20Improper%20Neutralization%20of%20Special%20Elements%20Used%20in%20a%20Template%20Engine%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.4%20for%20RHEL%208&amp;severity=high&amp;id=691f5c4ce672cd9080e8d3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5379-allocation-of-resources-without-limi-ca3fbccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5379%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%207.1%20EUS%20for%20RHEL%207&amp;severity=high&amp;id=68fc225cf816635ddaff9200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50251-cwe-674-uncontrolled-recursion-in-dompdf-php-svg-lib-2647ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50251%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20dompdf%20php-svg-lib&amp;severity=medium&amp;id=682f725b0acd01a2492647ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35622-spoofing-in-microsoft-windows-server-2019-2647e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35622%3A%20Spoofing%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682f725b0acd01a2492647e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35635-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-22h2-2647e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35635%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=medium&amp;id=682f725b0acd01a2492647e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36011-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-2647e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36011%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682f725b0acd01a2492647e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49923-cwe-532-insertion-of-sensitive-information-into-log-file-in-elastic-enterprise-search-27bf4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49923%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Elastic%20Enterprise%20Search&amp;severity=medium&amp;id=6831a1510acd01a24927bf4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4421-timing-side-channel-in-pkcs1-v15-dec-4cf47ddb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4421%3A%20Timing%20side-channel%20in%20PKCS%231%20v1.5%20decryption%20depadding%20code%20in%20Mozilla%20NSS&amp;severity=null&amp;id=690a5558a730e5a3d9d7c20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46285-cwe-20-improper-input-validation-in-siemens-opcenter-execution-foundation-27bf47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46285%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20Opcenter%20Execution%20Foundation&amp;severity=high&amp;id=6831a1510acd01a24927bf47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6727-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-mattermost-mattermost-27bf4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6727%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=6831a1510acd01a24927bf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48677-cwe-427-in-acronis-acronis-cyber-pr-e664f007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48677%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=high&amp;id=6840c579182aa0cae2c16b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45316-cwe-352-cross-site-request-forgery-csrf-in-mattermost-mattermost-27bf45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45316%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mattermost%20Mattermost&amp;severity=high&amp;id=6831a1510acd01a24927bf45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6547-cwe-284-improper-access-control-in-mattermost-mattermost-bd68cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6547%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=682d9816c4522896dcbd68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49584-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-in-sap-se-sap-fiori-launchpad-27bf49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49584%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20SAP_SE%20SAP%20Fiori%20Launchpad&amp;severity=medium&amp;id=6831a1510acd01a24927bf49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40446-processing-maliciously-crafted-inpu-773007a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40446%3A%20Processing%20maliciously%20crafted%20input%20may%20lead%20to%20arbitrary%20code%20execution%20in%20user-installed%20apps%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=690a5546a730e5a3d9d76cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42891-an-app-may-be-able-to-monitor-keyst-8a7f76f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42891%3A%20An%20app%20may%20be%20able%20to%20monitor%20keystrokes%20without%20user%20permission%20in%20Apple%20macOS&amp;severity=null&amp;id=690a554ea730e5a3d9d782f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42901-processing-a-maliciously-crafted-fi-2abd75a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42901%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42900-an-app-may-be-able-to-access-user-s-b1946aca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42900%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42886-a-user-may-be-able-to-cause-unexpec-fcf18c6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42886%3A%20A%20user%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a554ea730e5a3d9d782df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42874-secure-text-fields-may-be-displayed-9cf03d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42874%3A%20Secure%20text%20fields%20may%20be%20displayed%20via%20the%20Accessibility%20Keyboard%20when%20using%20a%20physical%20keyboard%20in%20Apple%20macOS&amp;severity=null&amp;id=690a554ea730e5a3d9d782be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42897-an-attacker-with-physical-access-ma-909c5a29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42897%3A%20An%20attacker%20with%20physical%20access%20may%20be%20able%20to%20use%20Siri%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42907-processing-a-maliciously-crafted-fi-69db0a9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42907%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42911-processing-a-maliciously-crafted-fi-c9a1a837</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42911%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42910-processing-a-maliciously-crafted-fi-b6254f43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42910%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42906-processing-a-maliciously-crafted-fi-4021508a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42906%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=68e0f3c0b66c7f7acdd3d08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42926-processing-a-maliciously-crafted-file-may-lead-to-unexpected-app-termination-or-arbitrary-code-execution-in-apple-macos-27c751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42926%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=6831a4d70acd01a24927c751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42909-processing-a-maliciously-crafted-fi-cffff2cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42909%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42899-processing-an-image-may-lead-to-arb-37ee1d62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42899%3A%20Processing%20an%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42905-processing-a-maliciously-crafted-fi-3948e2e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42905%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42894-an-app-may-be-able-to-access-inform-ee9b73ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42894%3A%20An%20app%20may%20be%20able%20to%20access%20information%20about%20a%20user&apos;s%20contacts%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42882-processing-an-image-may-lead-to-arb-cf99433f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42882%3A%20Processing%20an%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a554ea730e5a3d9d782d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42904-processing-a-maliciously-crafted-fi-ecd075bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42904%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42912-processing-a-maliciously-crafted-fi-14b74b62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42912%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42932-an-app-may-be-able-to-access-protec-32abde57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42932%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5553a730e5a3d9d78a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42898-processing-an-image-may-lead-to-arb-d2c141c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42898%3A%20Processing%20an%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42924-an-app-may-be-able-to-access-sensit-5667217d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42924%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5553a730e5a3d9d78a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42908-processing-a-maliciously-crafted-fi-58244cd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42908%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=6835cf87182aa0cae21621b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42903-processing-a-maliciously-crafted-fi-d5072a3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42903%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a5550a730e5a3d9d783ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42919-an-app-may-be-able-to-access-sensit-61849b03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42919%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5551a730e5a3d9d7850b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42923-private-browsing-tabs-may-be-access-04edd77a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42923%3A%20Private%20Browsing%20tabs%20may%20be%20accessed%20without%20authentication%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5553a730e5a3d9d78a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42922-an-app-may-be-able-to-read-sensitiv-cb68b1c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42922%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5553a730e5a3d9d78a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42884-an-app-may-be-able-to-disclose-kern-9b0abc08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42884%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=6835cf87182aa0cae21621b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42902-processing-a-maliciously-crafted-fi-52921f3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42902%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5550a730e5a3d9d783e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42914-an-app-may-be-able-to-break-out-of--4e2fc4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42914%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5551a730e5a3d9d784f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50495-na-3946abb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50495%3A%20n%2Fa&amp;severity=null&amp;id=690a473e6d939959c8021f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49994-na-ac9b2deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49994%3A%20n%2Fa&amp;severity=null&amp;id=690904ae00ff46172d4a0dcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49993-na-1145f1a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49993%3A%20n%2Fa&amp;severity=null&amp;id=690904ae00ff46172d4a0dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49992-na-b8b678b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49992%3A%20n%2Fa&amp;severity=null&amp;id=690904ae00ff46172d4a0dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49991-na-77745a98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49991%3A%20n%2Fa&amp;severity=null&amp;id=690904ae00ff46172d4a0dbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49990-na-c60e5f8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49990%3A%20n%2Fa&amp;severity=medium&amp;id=690904ae00ff46172d4a0db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41117-na-in-na-2c4fcdb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41117%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36652-na-in-na-406444f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36652%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835d30c182aa0cae216c476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-16153-na-in-na-d9b119f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-16153%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28465-na-in-na-8cff93e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28465%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835cf87182aa0cae21621b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-8314-na-in-na-185c963e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-8314%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835cf87182aa0cae21621ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-12-f12c5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5907-cwe-22-improper-limitation-of-a-path-8fa13a39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5907%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20File%20Manager&amp;severity=medium&amp;id=6835d30c182aa0cae216c47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6679-null-pointer-dereference-in-red-hat--832fd84b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6679%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=6920092a04dd2c5f9994c01c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48425-remote-code-execution-in-google-and-1766d4e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48425%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=6835d30c182aa0cae216c47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49417-na-in-na-b2fa97aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49417%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d30c182aa0cae216c45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3187-na-in-na-41d3e11f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3187%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-11-f121c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f121c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5870-uncontrolled-resource-consumption-in-a47c667b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5870%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Security%204.2&amp;severity=low&amp;id=68e0f3bcb66c7f7acdd3cb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5868-function-call-with-incorrect-argumen-f7c878a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5868%3A%20Function%20Call%20With%20Incorrect%20Argument%20Type%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Security%204.2&amp;severity=medium&amp;id=68e0f3bcb66c7f7acdd3cb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5869-integer-overflow-or-wraparound-in-re-1bff6f9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5869%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Security%204.2&amp;severity=high&amp;id=68e0f3bcb66c7f7acdd3cb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6655-cwe-89-sql-injection-in-hongjing-e-h-78e23e40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6655%3A%20CWE-89%20SQL%20Injection%20in%20Hongjing%20e-HR&amp;severity=high&amp;id=6835d69f182aa0cae2176733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50456-na-in-na-a3784660</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50456%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-10-f12758</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6646-cwe-79-cross-site-scripting-in-linkd-2c5ad011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6646%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20linkding&amp;severity=low&amp;id=6835da20182aa0cae217e5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28523-cwe-122-heap-based-buffer-overflow--c0b4f60e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28523%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20IBM%20Informix%20Dynamic%20Server&amp;severity=high&amp;id=6835da20182aa0cae217e5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6394-missing-authorization-in-red-hat-red-530506dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6394%3A%20Missing%20Authorization%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Quarkus%202.13.9.Final&amp;severity=high&amp;id=68e7a23aba0e608b4f980f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46932-na-in-na-23e895a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46932%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835da20182aa0cae217e5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-09-76bfec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-09&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76bfec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-09-f12ad9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ad9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6622-null-pointer-dereference-in-red-hat--b45abbdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6622%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690d0b9008e329e0f8ef0d97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6618-cwe-73-file-inclusion-in-sourcecodes-b22303cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6618%3A%20CWE-73%20File%20Inclusion%20in%20SourceCodester%20Simple%20Student%20Attendance%20System&amp;severity=medium&amp;id=6835d30c182aa0cae216c46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6610-out-of-bounds-read-in-red-hat-red-ha-71a72701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6610%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=68e84e5dba0e608b4fb0c532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6606-out-of-bounds-read-in-red-hat-red-ha-e9241697</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6606%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690eefde44af18c3752cf5ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32975-cwe-120-in-qnap-systems-inc-qts-8d2aea5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32975%3A%20CWE-120%20in%20QNAP%20Systems%20Inc.%20QTS&amp;severity=medium&amp;id=6835d30c182aa0cae216c45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47565-cwe-78-improper-neutralization-of-s-5ec9c5c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47565%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20QNAP%20Systems%20Inc.%20VioStor%20NVR&amp;severity=high&amp;id=68f7d9ae247d717aace2678d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48421-elevation-of-privilege-in-google-an-a5da1fc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48421%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6835dda5182aa0cae21866a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45866-na-238df09e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45866%3A%20n%2Fa&amp;severity=null&amp;id=690a5556a730e5a3d9d7a9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49485-na-in-na-3fe67576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49485%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae21866a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46494-na-in-na-aea7fe1c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46494%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae21866a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48928-na-in-na-a7071383</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48928%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae2186685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43743-na-in-na-1d5d36e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43743%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835dda5182aa0cae2186683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-08-f1237e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f1237e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4122-cwe-434-unrestricted-upload-of-file--04a02c16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4122%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Kashipara%20Group%20Student%20Information%20System&amp;severity=critical&amp;id=68371692182aa0cae24f0c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4486-cwe-400-uncontrolled-resource-consum-1fe0242e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4486%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Johnson%20Controls%20Metasys%20NAE55%2FSNE%2FSNC&amp;severity=high&amp;id=68371692182aa0cae24f0c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39171-cwe-668-exposure-of-resource-to-wro-3ada917e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39171%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20SENEC%20Storage%20Box%20V1&amp;severity=high&amp;id=690a53272a90255b94da6736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39169-cwe-798-use-of-hard-coded-credentia-bd6cbc3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39169%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SENEC%20Storage%20Box%20V1&amp;severity=critical&amp;id=690a53252a90255b94da671e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39167-cwe-862-missing-authorization-in-se-84f0b873</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39167%3A%20CWE-862%20Missing%20Authorization%20in%20SENEC%20Storage%20Box%20V1&amp;severity=high&amp;id=690a53252a90255b94da671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39172-cwe-319-cleartext-transmission-of-s-c5054ac7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39172%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20SENEC%20Storage%20Box%20V1&amp;severity=critical&amp;id=690a53272a90255b94da673a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49225-cross-site-scripting-xss-in-commsco-8b910147</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49225%3A%20Cross-site%20scripting%20(XSS)%20in%20CommScope%2C%20Inc.%20ZoneDirector&amp;severity=medium&amp;id=68371a22182aa0cae24f8af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5713-cwe-862-missing-authorization-in-qri-019bd3f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5713%3A%20CWE-862%20Missing%20Authorization%20in%20qriouslad%20System%20Dashboard&amp;severity=medium&amp;id=68372487182aa0cae25105a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41913-na-cb0b8b7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41913%3A%20n%2Fa&amp;severity=critical&amp;id=690a3b5aff58c9332ff08e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46307-na-in-na-cfa40217</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46307%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683732d3182aa0cae25301f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43304-na-in-na-afd64afd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43304%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683732d3182aa0cae25301ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48834-na-in-na-15d84763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48834%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68372f36182aa0cae2528331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49404-na-in-na-b8b4690f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49404%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68372bbe182aa0cae2520284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49493-na-in-na-a7d3666b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49493%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68372bbe182aa0cae2520282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49437-na-in-na-d67e7971</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49437%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68372bbe182aa0cae252027d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40301-na-in-na-7e9bb313</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40301%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68372bbe182aa0cae252027b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-07-f126e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f126e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49096-cwe-88-improper-neutralization-of-a-d389fe51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49096%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20jellyfin%20jellyfin&amp;severity=high&amp;id=683732d3182aa0cae25301f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6393-exposure-of-sensitive-information-to-fd667852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6393%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20build%20of%20Quarkus%202.13.9.Final&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39539-cwe-20-improper-input-validation-in-1af4126e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39539%3A%20CWE-20%20Improper%20Input%20Validation%20in%20AMI%20AptioV&amp;severity=high&amp;id=69419b7d9050fe85080f3cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49246-permissions-privileges-and-access-c-915e2211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49246%3A%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683732d3182aa0cae25301e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45210-improper-access-control-in-implem-i-b16a5250</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45210%3A%20Improper%20access%20control%20in%20Implem%20Inc.%20Pleasanter&amp;severity=medium&amp;id=683732d3182aa0cae25301e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49897-os-command-injection-in-fxc-inc-ae1-e44996c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49897%3A%20OS%20command%20injection%20in%20FXC%20Inc.%20AE1021PE&amp;severity=high&amp;id=68f7d9ae247d717aace2679e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6512-inappropriate-implementation-in-goog-2ee3838c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6512%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=683732d3182aa0cae25301e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-06-f12024</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa23-339a-threat-actors-exploit-adobe-coldfusion-cve-2023-26360-for-initial-access-to-government-servers-f0c29c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA23-339A%20Threat%20Actors%20Exploit%20Adobe%20ColdFusion%20CVE-%202023-26360%20for%20Initial%20Access%20to%20Government%20Servers&amp;severity=low&amp;id=682acdbebbaf20d303f0c29c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mar-10478915-1-v1-citrix-bleed-f0c29a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAR-10478915-1.v1%20Citrix%20Bleed&amp;severity=low&amp;id=682acdbebbaf20d303f0c29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24547-cwe-212-in-arista-networks-mos-a8885118</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24547%3A%20cwe-212%20in%20Arista%20Networks%20MOS&amp;severity=medium&amp;id=68385089182aa0cae27baae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44221-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-sonicwall-sma100-bec26f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44221%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonicWall%20SMA100&amp;severity=high&amp;id=682d9838c4522896dcbec26f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6448-cwe-1188-insecure-default-initializa-7cab9091</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6448%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Unitronics%20VisiLogic&amp;severity=critical&amp;id=68f7d9af247d717aace26859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41835-cwe-459-incomplete-cleanup-in-apach-859013d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41835%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Struts&amp;severity=high&amp;id=68385089182aa0cae27baae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39248-cwe-400-uncontrolled-resource-consu-1be83801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39248%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Dell%20Dell%20Networking%20OS10&amp;severity=high&amp;id=68385089182aa0cae27baae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33107-cwe-190-integer-overflow-or-wraparo-133c0622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33107%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68f7d9a9247d717aace21ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33106-cwe-823-use-of-out-of-range-pointer-8b8c9fba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33106%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68f7d9a9247d717aace21ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33092-cwe-120-buffer-copy-without-checkin-477be86d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33092%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683864b2182aa0cae27f9cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33070-cwe-287-improper-authentication-in--921223de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33070%3A%20CWE-287%20Improper%20Authentication%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683864b2182aa0cae27f9cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33063-cwe-416-use-after-free-in-qualcomm--ad3a0c24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33063%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=68f7d9a9247d717aace21ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33022-cwe-680-integer-overflow-to-buffer--4c26e244</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33022%3A%20CWE-680%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=683864b2182aa0cae27f9cd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28580-cwe-120-buffer-copy-without-checkin-aa1f5431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28580%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=medium&amp;id=683864b2182aa0cae27f9cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42576-cwe-287-improper-authentication-in--6bd61430</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42576%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Samsung%20Mobile%20Samsung%20Pass&amp;severity=medium&amp;id=6841d069182aa0cae2e88665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42561-cwe-787-out-of-bounds-write-in-sams-724b17b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42561%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=683864b2182aa0cae27f9cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48695-cwe-787-out-of-bounds-write-in-azur-465c22b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48695%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20azure-rtos%20usbx&amp;severity=high&amp;id=683864b2182aa0cae27f9cdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-05-f126a2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f126a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/psa-fake-cve-2023-45124-phishing-scam-tricks-users-into-installing-backdoor-plugin-f0c296</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PSA%3A%20Fake%20CVE-2023-45124%20Phishing%20Scam%20Tricks%20Users%20Into%20Installing%20Backdoor%20Plugin&amp;severity=low&amp;id=682acdbebbaf20d303f0c296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa23-335a-irgc-affiliated-cyber-actors-exploit-plcs-in-multiple-sectors-including-u-s-water-and-wastewater-systems-facilities-f0c294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA23-335A%3A%20IRGC-Affiliated%20Cyber%20Actors%20Exploit%20PLCs%20in%20Multiple%20Sectors%2C%20Including%20U.S.%20Water%20and%20Wastewater%20Systems%20Facilities&amp;severity=low&amp;id=682acdbebbaf20d303f0c294</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49290-cwe-400-uncontrolled-resource-consu-dd57885e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49290%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20lestrrat-go%20jwx&amp;severity=medium&amp;id=68386826182aa0cae2801b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49293-cwe-79-improper-neutralization-of-i-15a37733</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49293%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vitejs%20vite&amp;severity=medium&amp;id=68386826182aa0cae2801b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40463-cwe-798-use-of-hard-coded-credentia-c2d3a59b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40463%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20SierraWireless%20ALEOS&amp;severity=high&amp;id=68386826182aa0cae2801b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40459-cwe-476-null-pointer-dereference-in-d7051ad3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40459%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20SierraWireless%20ALEOS&amp;severity=high&amp;id=68386826182aa0cae2801b78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40076-information-disclosure-in-google-an-f18a9513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40076%3A%20Information%20disclosure%20in%20Google%20Android&amp;severity=medium&amp;id=68386826182aa0cae2801b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21216-elevation-of-privilege-in-google-an-bc6b11ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21216%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=critical&amp;id=68386826182aa0cae2801b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5137-cwe-79-cross-site-scripting-xss-in-u-ff48d4a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5137%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simply%20Excerpts&amp;severity=medium&amp;id=68386826182aa0cae2801b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5953-cwe-434-unrestricted-upload-of-file--aebdb0d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5953%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Welcart%20e-Commerce&amp;severity=high&amp;id=68386ba6182aa0cae2809bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49287-cwe-120-buffer-copy-without-checkin-2b4c8a7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49287%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20cxong%20tinydir&amp;severity=high&amp;id=68386ba6182aa0cae2809bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32863-elevation-of-privilege-in-mediatek--162b0670</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32863%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8781&amp;severity=medium&amp;id=68386ba6182aa0cae2809bca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32843-denial-of-service-in-mediatek-inc-m-1ca896e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32843%3A%20Denial%20of%20Service%20in%20MediaTek%2C%20Inc.%20MT2735%2C%20MT2737%2C%20MT6297%2C%20MT6298%2C%20MT6813%2C%20MT6815%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6875T%2C%20MT6877%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6895T%2C%20MT6896%2C%20MT6897%2C%20MT6980%2C%20MT6980D%2C%20MT6983%2C%20MT6985%2C%20MT6989%2C%20MT6990&amp;severity=high&amp;id=68386ba5182aa0cae2809bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32854-elevation-of-privilege-in-mediatek--39ae2edd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32854%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6835%2C%20MT6879%2C%20MT6886%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8321%2C%20MT8667%2C%20MT8673%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=68386ba5182aa0cae2809bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42747-vulnerability-in-unisoc-shanghai-te-1a39eb8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42747%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=68386ba5182aa0cae2809bbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42736-vulnerability-in-unisoc-shanghai-te-a255f5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42736%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=68386ba5182aa0cae2809bba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42726-vulnerability-in-unisoc-shanghai-te-e0d054f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42726%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=68386ba5182aa0cae2809bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42716-vulnerability-in-unisoc-shanghai-te-fac96f24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42716%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=68386ba5182aa0cae2809bb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42706-vulnerability-in-unisoc-shanghai-te-078c3e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42706%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=68386f5b182aa0cae2811a7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42698-vulnerability-in-unisoc-shanghai-te-5c878e6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42698%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=68386f5b182aa0cae2811a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42685-vulnerability-in-unisoc-shanghai-te-1f849ca9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42685%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=68386f5b182aa0cae2811a77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42681-vulnerability-in-unisoc-shanghai-te-6636c88c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42681%3A%20Vulnerability%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC7731E%2FSC9832E%2FSC9863A%2FT310%2FT606%2FT612%2FT616%2FT610%2FT618%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=68386f5b182aa0cae2811a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38003-264-permissions-privileges-access-c-321d7933</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38003%3A%20264%20Permissions%2C%20Privileges%2C%20Access%20Controls%20in%20IBM%20Db2%20for%20Linux%2C%20UNIX%20and%20Windows&amp;severity=high&amp;id=68386f5b182aa0cae2811a73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48866-na-aa3b78d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48866%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c6b66c7f7acdd3ea91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48863-na-in-na-45619c48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48863%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683ee1eb182aa0cae273967e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24049-na-in-na-87c7a5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24049%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68386f5b182aa0cae2811a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-04-f12810</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4957-cwe-79-cross-site-scripting-in-libre-cfa8c6df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4957%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20librespeed%20speedtest&amp;severity=low&amp;id=683e5dc4182aa0cae2606b89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-03-f120d6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f120d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6474-cwe-352-cross-site-request-forgery-i-f41c6da6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6474%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=683ee1eb182aa0cae27396a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47100-8d737c2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47100&amp;severity=null&amp;id=68e551c3a677756fc999ff6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-02-f122a3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f122a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48314-cwe-79-improper-neutralization-of-i-c3024a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48314%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CollaboraOnline%20online&amp;severity=high&amp;id=683ee1eb182aa0cae2739676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40699-cwe-20-improper-input-validation-in-ef6c58f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40699%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=683ee1eb182aa0cae2739672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5635-cwe-1320-improper-protection-for-out-5ef07723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5635%3A%20CWE-1320%20Improper%20Protection%20for%20Outbound%20Error%20Messages%20and%20Alert%20Signals%20in%20ArslanSoft%20Education%20Portal&amp;severity=high&amp;id=683ee1eb182aa0cae273969e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3443-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3443%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3964-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3964%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3949-cwe-201-insertion-of-sensitive-information-into-sent-data-in-gitlab-gitlab-253f70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3949%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4317-incorrect-authorization-in-gitlab-gitlab-253f87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4317%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4658-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4658%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4912-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-253fa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4912%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5226-cwe-94-improper-control-of-generation-of-code-code-injection-in-gitlab-gitlab-253fac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5226%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6033-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6033%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5995-cwe-863-incorrect-authorization-in-gitlab-gitlab-253fc3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5995%3A%20CWE-863%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48842-na-in-na-3e9c8513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683ee1eb182aa0cae273967a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-12-01-f126ae</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-12-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f126ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42917-processing-web-content-may-lead-to--00671b97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42917%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.1.%20in%20Apple%20Safari&amp;severity=high&amp;id=68f7d9ae247d717aace25dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42916-processing-web-content-may-disclose-70bc860e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42916%3A%20Processing%20web%20content%20may%20disclose%20sensitive%20information.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.1.%20in%20Apple%20Safari&amp;severity=medium&amp;id=68f7d9ae247d717aace25db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47279-cwe-22-improper-limitation-of-a-pat-7a1a2cbe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47279%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Delta%20Electronics%20InfraSuite%20Device%20Master&amp;severity=high&amp;id=683eff8d182aa0cae27db83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6344-cwe-287-improper-authentication-in-t-79fef1be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6344%3A%20CWE-287%20Improper%20Authentication%20in%20Tyler%20Technologies%20Court%20Case%20Management%20Plus&amp;severity=medium&amp;id=683ee1eb182aa0cae273966e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2264-cwe-20-improper-input-validation-in--0f333f57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2264%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-411L&amp;severity=medium&amp;id=683ee1eb182aa0cae2739666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34388-cwe-287-improper-authentication-in--c874f3eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34388%3A%20CWE-287%20Improper%20Authentication%20in%20Schweitzer%20Engineering%20Laboratories%20SEL-451&amp;severity=medium&amp;id=683ffd67182aa0cae2a3884e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48272-cwe-79-improper-neutralization-of-i-9432450e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48272%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yonifre%20Maspik%20%E2%80%93%20Spam%20Blacklist&amp;severity=high&amp;id=683ffd67182aa0cae2a38840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46086-cwe-79-improper-neutralization-of-i-297eeab4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46086%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SERVIT%20Software%20Solutions%20affiliate-toolkit%20%E2%80%93%20WordPress%20Affiliate%20Plugin&amp;severity=high&amp;id=683ffd67182aa0cae2a3883e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6402-cwe-89-sql-injection-in-phpgurukul-n-c423e292</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6402%3A%20CWE-89%20SQL%20Injection%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=68386f5b182aa0cae2811a5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48742-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-licensemanager-license-manager-for-woocommerce-25c22d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48742%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20LicenseManager%20License%20Manager%20for%20WooCommerce&amp;severity=high&amp;id=682f2c0b0acd01a24925c22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6432-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bigprof-online-inventory-manager-25c22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6432%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BigProf%20Online%20Inventory%20Manager&amp;severity=medium&amp;id=682f2c0b0acd01a24925c22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6428-cwe-79-improper-neutralization-of-in-cbdfcb7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6428%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20BigProf%20Online%20Invoicing%20System&amp;severity=medium&amp;id=683ffd67182aa0cae2a3884a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5966-cwe-434-unrestricted-upload-of-file--e9e71e9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5966%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20EspoCRM%20EspoCRM&amp;severity=critical&amp;id=683ffd67182aa0cae2a38846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6420-cwe-79-improper-neutralization-of-in-dc507ef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6420%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Voovi%20Social%20Networking%20Script%20Voovi%20Social%20Networking%20Script&amp;severity=medium&amp;id=683ffd67182aa0cae2a38848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48279-cwe-352-cross-site-request-forgery--252760d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48279%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Seraphinite%20Solutions%20Seraphinite%20Post%20.DOCX%20Source&amp;severity=medium&amp;id=683ffd67182aa0cae2a38842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48330-cwe-352-cross-site-request-forgery--548aa553</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48330%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Mike%20Strand%20Bulk%20Comment%20Remove&amp;severity=medium&amp;id=683ffd67182aa0cae2a38844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41128-cwe-79-improper-neutralization-of-i-247fd677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41128%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Iqonic%20Design%20WP%20Roadmap%20%E2%80%93%20Product%20Feedback%20Board&amp;severity=medium&amp;id=6841d069182aa0cae2e88663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45050-cwe-79-improper-neutralization-of-i-4680ffb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Automattic%20Jetpack%20%E2%80%93%20WP%20Security%2C%20Backup%2C%20Speed%2C%20%26%20Growth&amp;severity=medium&amp;id=6841d069182aa0cae2e88667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48329-cwe-79-improper-neutralization-of-i-215536e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48329%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20CodeBard%20Fast%20Custom%20Social%20Share%20by%20CodeBard&amp;severity=medium&amp;id=6841d069182aa0cae2e8866b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49081-cwe-20-improper-input-validation-in-2a133fb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49081%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20aio-libs%20aiohttp&amp;severity=high&amp;id=69092145fe7723195e053fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49076-cwe-352-cross-site-request-forgery--8406ef57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49076%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20pimcore%20customer-data-framework&amp;severity=medium&amp;id=68419f11182aa0cae2e11693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49094-cwe-918-server-side-request-forgery-9b555458</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49094%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20getsentry%20symbolicator&amp;severity=medium&amp;id=68419f11182aa0cae2e11695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4474-cwe-78-improper-neutralization-of-sp-126ccfcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4474%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20NAS326%20firmware&amp;severity=critical&amp;id=6941947f9050fe850806131e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4473-cwe-78-improper-neutralization-of-sp-f83e2e5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4473%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20NAS326%20firmware&amp;severity=critical&amp;id=6941947f9050fe850806131a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46385-na-43dfabd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46385%3A%20n%2Fa&amp;severity=null&amp;id=690a5558a730e5a3d9d7c201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46384-na-ae1d63da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46384%3A%20n%2Fa&amp;severity=null&amp;id=690a5556a730e5a3d9d7aa08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46383-na-ff213742</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46383%3A%20n%2Fa&amp;severity=null&amp;id=690a5556a730e5a3d9d7aa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48802-na-in-na-c49061c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48802%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68419f11182aa0cae2e11691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-30-f245ca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-30&amp;severity=medium&amp;id=682acdc4bbaf20d303f245ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-30-f12e7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42541-remote-code-execution-in-google-and-8f226d1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42541%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=critical&amp;id=68419f11182aa0cae2e1168d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49082-cwe-93-improper-neutralization-of-c-2a880981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49082%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69092145fe7723195e053ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44383-cwe-79-improper-neutralization-of-i-a8c7574d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44383%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=68419f11182aa0cae2e1168f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49083-cwe-476-null-pointer-dereference-in-ad59e993</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49083%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20pyca%20cryptography&amp;severity=medium&amp;id=69092637fe7723195e0b622c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49673-vulnerability-in-jenkins-project-je-53600fb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49673%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20NeuVector%20Vulnerability%20Scanner%20Plugin&amp;severity=high&amp;id=6841a29c182aa0cae2e196cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6345-integer-overflow-in-google-chrome-96b2704c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6345%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=68f7d9af247d717aace2684f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6347-use-after-free-in-google-chrome-55626613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6347%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6841a29c182aa0cae2e196d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48951-na-in-na-1f5e0fb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48951%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841a29c182aa0cae2e196cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45481-na-in-na-2e9006e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45481%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6841a29c182aa0cae2e196cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-29-f1228e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f1228e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29061-cwe-306-missing-authentication-for--762341ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29061%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Becton%2C%20Dickinson%20and%20Company%20(BD)%20FACSChorus&amp;severity=medium&amp;id=683f034b182aa0cae27e66ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29060-cwe-1299-missing-protection-mechani-1931bf25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29060%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Becton%2C%20Dickinson%20and%20Company%20(BD)%20FACSChorus&amp;severity=medium&amp;id=683f034b182aa0cae27e66ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30590-vulnerability-in-nodejs-node-bed547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30590%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=null&amp;id=682d983ac4522896dcbed547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30588-vulnerability-in-nodejs-node-bed523</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30588%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=null&amp;id=682d983ac4522896dcbed523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46589-cwe-444-inconsistent-interpretation-bc1c9e05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46589%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=6841a29c182aa0cae2e196c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5981-observable-discrepancy-in-red-hat-re-c2cb16c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5981%3A%20Observable%20Discrepancy%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690a5558a730e5a3d9d7c263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6201-cwe-78-improper-neutralization-of-sp-feb1b885</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6201%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Univera%20Computer%20System%20Panorama&amp;severity=high&amp;id=6841a29c182aa0cae2e196c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4225-cwe-434-unrestricted-upload-of-file--ad4413ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4225%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Chamilo%20Chamilo&amp;severity=high&amp;id=6841a29c182aa0cae2e196c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3368-cwe-78-improper-neutralization-of-sp-1284ae26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3368%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Chamilo%20Chamilo&amp;severity=critical&amp;id=683f034b182aa0cae27e66f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30585-vulnerability-in-nodejs-node-bed51b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30585%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=null&amp;id=682d983ac4522896dcbed51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35136-cwe-20-improper-input-validation-in-b88c808b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35136%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=medium&amp;id=6841a29c182aa0cae2e196bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41264-na-in-na-b206eba6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41264%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6841a29c182aa0cae2e196c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-28-f12728</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2707-cwe-79-cross-site-scripting-xss-in-u-71e1844b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2707%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20gAppointments&amp;severity=medium&amp;id=6841d069182aa0cae2e88657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5942-cwe-79-cross-site-scripting-xss-in-u-fdcb8b74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5942%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Medialist&amp;severity=medium&amp;id=6841d069182aa0cae2e8865d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4297-cwe-22-improper-limitation-of-a-path-f1452b85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4297%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Mmm%20Simple%20File%20List&amp;severity=medium&amp;id=6841d069182aa0cae2e88659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5604-cwe-434-unrestricted-upload-of-file--802ee716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5604%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Asgaros%20Forum&amp;severity=critical&amp;id=6841d069182aa0cae2e8865b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31275-cwe-457-use-of-uninitialized-variab-ef43565a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31275%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20WPS%20WPS%20Office&amp;severity=high&amp;id=690a53202a90255b94da5ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39542-cwe-73-external-control-of-file-nam-b0ab454c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39542%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53272a90255b94da6747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40194-cwe-73-external-control-of-file-nam-57bc2b6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40194%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53272a90255b94da674f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35985-cwe-73-external-control-of-file-nam-86ab9f5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35985%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53252a90255b94da66ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32616-cwe-416-use-after-free-in-foxit-fox-3c3cc8f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32616%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53212a90255b94da6021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41257-cwe-843-access-of-resource-using-in-d07dd6a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41257%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a5549a730e5a3d9d77164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38573-cwe-416-use-after-free-in-foxit-fox-756c6a3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38573%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=6841d069182aa0cae2e88640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5871-reachable-assertion-in-red-hat-red-h-58f665f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5871%3A%20Reachable%20Assertion%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42501-cwe-276-incorrect-default-permissio-d04bc025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42501%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=6841d069182aa0cae2e88642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40610-cwe-863-incorrect-authorization-in--12e33c0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40610%3A%20CWE-863%20Incorrect%20Authorization%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=medium&amp;id=683f034b182aa0cae27e66f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35075-cwe-74-improper-neutralization-of-s-dd83d25a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35075%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Mattermost%20Mattermost&amp;severity=low&amp;id=683f034b182aa0cae27e66ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40703-cwe-400-uncontrolled-resource-consu-1c8892bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40703%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Mattermost%20Mattermost&amp;severity=medium&amp;id=683f034a182aa0cae27e65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42365-na-633d7cf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42365%3A%20n%2Fa&amp;severity=null&amp;id=69092145fe7723195e053fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42364-na-1596c4f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42364%3A%20n%2Fa&amp;severity=medium&amp;id=69092145fe7723195e053fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46480-na-in-na-0bcc58df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46480%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6841d069182aa0cae2e88646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-27-f120ed</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f120ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6297-cwe-79-cross-site-scripting-in-phpgu-0f75a1e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6297%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20PHPGurukul%20Nipah%20Virus%20Testing%20Management%20System&amp;severity=medium&amp;id=683f034a182aa0cae27e6632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-26-f12cd7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-25-f12fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-25&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6277-uncontrolled-resource-consumption-in-red-hat-red-hat-enterprise-linux-6-bebf28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6277%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=682d9838c4522896dcbebf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6276-cwe-89-sql-injection-in-tongda-oa-20-04a4e30b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6276%3A%20CWE-89%20SQL%20Injection%20in%20Tongda%20OA%202017&amp;severity=medium&amp;id=683f034a182aa0cae27e6630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6275-cwe-79-cross-site-scripting-in-totvs-8dd3f979</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6275%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20TOTVS%20Fluig%20Platform&amp;severity=low&amp;id=683f034a182aa0cae27e662e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48796-cwe-200-exposure-of-sensitive-infor-95a71535</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48796%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=null&amp;id=692983894121026312971049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49298-na-bfe70be2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49298%3A%20n%2Fa&amp;severity=high&amp;id=690904ac00ff46172d4a0d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-24-f12cd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41791-cwe-79-improper-neutralization-of-i-021bbebe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41791%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Pandora%20FMS%20Pandora%20FMS&amp;severity=high&amp;id=683f06a8182aa0cae27ee91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4406-cwe-79-improper-neutralization-of-in-237442f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4406%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20KC%20Group%20E-Commerce%20Software&amp;severity=medium&amp;id=6841d069182aa0cae2e88648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3377-cwe-89-improper-neutralization-of-sp-a7334284</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3377%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Veribilim%20Software%20Computer%20Veribase&amp;severity=critical&amp;id=683f06a8182aa0cae27ee91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44289-cwe-284-improper-access-control-in--8f7c6557</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44289%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Dell%20Command%20Configure%20(DCC)&amp;severity=high&amp;id=6841d069182aa0cae2e88644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49208-na-in-na-ae75d229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49208%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6841d069182aa0cae2e8863e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-23-f129a7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f129a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30581-vulnerability-in-nodejs-node-bed50b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30581%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47819-cwe-352-cross-site-request-forgery--a7248f58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47819%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Dang%20Ngoc%20Binh%20Easy%20Call%20Now%20by%20ThikShare&amp;severity=medium&amp;id=6841d069182aa0cae2e8863c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47785-cwe-352-cross-site-request-forgery--83a37d2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47785%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LayerSlider%20LayerSlider&amp;severity=high&amp;id=6841d069182aa0cae2e8863a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25987-cwe-352-cross-site-request-forgery--f6b11e02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25987%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Aleksandar%20Uro%C5%A1evi%C4%87%20My%20YouTube%20Channel&amp;severity=medium&amp;id=6841d069182aa0cae2e88638</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20241-out-of-bounds-read-in-cisco-cisco-s-88c4e87e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20241%3A%20Out-of-bounds%20Read%20in%20Cisco%20Cisco%20Secure%20Client&amp;severity=medium&amp;id=6841a9b0182aa0cae2e29889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6009-cwe-266-incorrect-privilege-assignme-516e42a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6009%3A%20CWE-266%20Incorrect%20Privilege%20Assignment%20in%20UserPro%20-%20Community%20and%20User%20Profile%20WordPress%20Plugin&amp;severity=high&amp;id=68487f581b0bd07c3938a787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5383-cwe-352-cross-site-request-forgery-c-a50048cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5383%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20funnelforms%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor%20%E2%80%93%20Funnelforms%20Free&amp;severity=medium&amp;id=68487f581b0bd07c3938a770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5466-cwe-89-improper-neutralization-of-sp-761e19f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5466%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20gopi_plus%20Wp%20anything%20slider&amp;severity=high&amp;id=68487f581b0bd07c3938a774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5815-cwe-98-improper-control-of-filename--2fca10b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5815%3A%20CWE-98%20Improper%20Control%20of%20Filename%20for%20Include%2FRequire%20Statement%20in%20PHP%20Program%20(&apos;PHP%20Remote%20File%20Inclusion&apos;)%20in%20infornweb%20News%20%26%20Blog%20Designer%20Pack%20%E2%80%93%20WordPress%20Blog%20Plugin%20%E2%80%94%20(Blog%20Post%20Grid%2C%20Blog%20Post%20Slider%2C%20Blog%20Post%20Carousel%2C%20Blog%20Post%20Ticker%2C%20Blog%20Post%20Masonry)&amp;severity=high&amp;id=68487f581b0bd07c3938a781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4686-cwe-862-missing-authorization-in-bom-c757a7ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4686%3A%20CWE-862%20Missing%20Authorization%20in%20bompus%20WP%20Customer%20Reviews&amp;severity=medium&amp;id=68487f581b0bd07c3938a76b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5706-cwe-79-improper-neutralization-of-in-64edd625</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5706%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20vektor-inc%20VK%20Blocks&amp;severity=medium&amp;id=68487f581b0bd07c3938a77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27453-cwe-352-cross-site-request-forgery--0de7d194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27453%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20LWS%20LWS%20Tools&amp;severity=medium&amp;id=68487f571b0bd07c3938a715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27633-cwe-352-cross-site-request-forgery--90ac09a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27633%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Pixelgrade%20Customify%20%E2%80%93%20Intuitive%20Website%20Styling&amp;severity=medium&amp;id=68487f581b0bd07c3938a764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6011-cwe-79-improper-neutralization-of-in-ad869523</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6011%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DECE%20Software%20Geodi&amp;severity=medium&amp;id=68487f581b0bd07c3938a78d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48107-na-434afabb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48107%3A%20n%2Fa&amp;severity=null&amp;id=690a47396d939959c8021b90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45377-na-in-na-c3a18b58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45377%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f581b0bd07c3938a767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-22-f124b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f124b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46604-apache-activemq-vulnerability-exploited-to-infect-systems-with-cryptominers-and-rootkits-f0c287</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46604%20(Apache%20ActiveMQ)%20Vulnerability%20Exploited%20to%20Infect%20Systems%20With%20Cryptominers%20and%20Rootkits&amp;severity=low&amp;id=682acdbebbaf20d303f0c287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48239-cwe-284-improper-access-control-in--9f4685a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48239%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=high&amp;id=68487f571b0bd07c3938a612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5553-cwe-863-incorrect-authorization-in-a-23758ad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5553%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Axis%20Communications%20AB%20AXIS%20OS&amp;severity=high&amp;id=68487f561b0bd07c3938a50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49103-na-9fb038d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49103%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9ae247d717aace26799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-21-748dea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-21&amp;severity=medium&amp;id=682c7abae3e6de8ceb748dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-21-f1284e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f1284e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bibi-linux-a-new-wiper-dropped-by-pro-hamas-hacktivist-group-f0c285</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BiBi-Linux%3A%20A%20New%20Wiper%20Dropped%20By%20Pro-Hamas%20Hacktivist%20Group&amp;severity=medium&amp;id=682acdbebbaf20d303f0c285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6142-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dev-blog-dev-blog-aeb812</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6142%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Dev%20Blog%20Dev%20Blog&amp;severity=medium&amp;id=682cd0f81484d88663aeb812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6199-cwe-918-server-side-request-forgery-ssrf-in-bookstack-bookstack-aeb7f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6199%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20BookStack%20BookStack&amp;severity=medium&amp;id=682cd0f81484d88663aeb7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36013-cwe-798-use-of-hard-coded-credentials-in-microsoft-powershell-7-2-bee41d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36013%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Microsoft%20PowerShell%207.2&amp;severity=medium&amp;id=682d983bc4522896dcbee41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46337-ldap-injection-in-apache-software-f-a1fb1daf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46337%3A%20LDAP%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20Derby&amp;severity=critical&amp;id=68487f571b0bd07c3938a695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46471-na-in-na-8d0ff8a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46471%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f571b0bd07c3938a698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38823-na-in-na-305eebe5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38823%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f571b0bd07c3938a604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-20-ea8b91</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-20&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea8b91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-20-f12c6e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5341-use-after-free-in-red-hat-red-hat-en-6351eb9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5341%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-19-f12afe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32514-cwe-352-cross-site-request-forgery--9a5035c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32514%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Himanshu%20Parashar%20Google%20Site%20Verification%20plugin%20using%20Meta%20Tag&amp;severity=medium&amp;id=68487f561b0bd07c3938a593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47655-cwe-352-cross-site-request-forgery--6cb73e5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47655%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Marco%20Milesi%20ANAC%20XML%20Bandi%20di%20Gara&amp;severity=medium&amp;id=68487f571b0bd07c3938a60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-18-f12bf4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22273-improper-limitation-of-a-pathname-t-b7daa70c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22273%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20RoboHelp&amp;severity=high&amp;id=694194789050fe8508060c9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48029-na-b9225161</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48029%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c8b66c7f7acdd3eaf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48028-na-b8072f19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48028%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c7b66c7f7acdd3ead4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48031-na-90e6d340</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48031%3A%20n%2Fa&amp;severity=critical&amp;id=68e0f3c7b66c7f7acdd3eacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-17-f125f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f125f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46214-the-software-does-not-properly-neut-4af95b60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46214%3A%20The%20software%20does%20not%20properly%20neutralize%20special%20elements%20that%20are%20used%20in%20XML%2C%20allowing%20attackers%20to%20modify%20the%20syntax%2C%20content%2C%20or%20commands%20of%20the%20XML%20before%20it%20is%20processed%20by%20an%20end%20system.%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=68487f571b0bd07c3938a607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36008-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-bee419</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36008%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d983bc4522896dcbee419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36026-spoofing-in-microsoft-microsoft-edge-chromium-based-bee46c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36026%3A%20Spoofing%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d983bc4522896dcbee46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6176-vulnerability-in-red-hat-red-hat-ent-4f5309ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6176%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68f27d809c34d0947f370ab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47050-out-of-bounds-read-cwe-125-in-adobe-c694f53f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47050%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=68487f571b0bd07c3938a60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6121-out-of-bounds-read-in-red-hat-red-ha-d7113dcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6121%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68487f571b0bd07c3938a617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47043-out-of-bounds-read-cwe-125-in-adobe-1e6dd637</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47043%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Media%20Encoder&amp;severity=high&amp;id=6941947d9050fe850806129d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44359-use-after-free-cwe-416-in-adobe-acr-948dd55f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44359%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947d9050fe850806127c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44366-out-of-bounds-write-cwe-787-in-adob-5c838c34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44366%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947d9050fe8508061282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44338-out-of-bounds-read-cwe-125-in-adobe-e7ff434b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44338%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947b9050fe8508060d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44371-use-after-free-cwe-416-in-adobe-acr-f910db4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44371%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947d9050fe8508061288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44336-use-after-free-cwe-416-in-adobe-acr-b0f6d6cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44336%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=690a5556a730e5a3d9d7a9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44365-access-of-uninitialized-pointer-cwe-d2976678</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44365%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947d9050fe850806127f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44367-use-after-free-cwe-416-in-adobe-acr-a035cb4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44367%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947d9050fe8508061285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44337-out-of-bounds-read-cwe-125-in-adobe-a8b90c57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44337%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947b9050fe8508060d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44372-use-after-free-cwe-416-in-adobe-acr-54df88d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44372%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=6941947d9050fe850806128b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-16-f122df</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f122df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-6112-use-after-free-in-google-chrome-0fa484e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-6112%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=null&amp;id=69418d769050fe8508ffb307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5997-use-after-free-in-google-chrome-c5ecacdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5997%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=6941947f9050fe850806132b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5676-cwe-364-signal-handler-race-conditio-0793787a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5676%3A%20CWE-364%3A%20Signal%20Handler%20Race%20Condition%20in%20Eclipse%20Foundation%20OpenJ9&amp;severity=medium&amp;id=69092638fe7723195e0b630b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5984-cwe-494-download-of-code-without-int-9f75dc7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5984%3A%20CWE-494%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20Schneider%20Electric%20ION8650&amp;severity=high&amp;id=68e0f3c4b66c7f7acdd3ea18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48365-na-ea04a3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48365%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9ae247d717aace26791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48198-na-f97ae201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48198%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c7b66c7f7acdd3eac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48197-na-835cc797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48197%3A%20n%2Fa&amp;severity=medium&amp;id=68e0f3c7b66c7f7acdd3eabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48200-na-fb35f9cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48200%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c7b66c7f7acdd3eab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48199-na-091ea511</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48199%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c6b66c7f7acdd3eaa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-15-df1e0fa2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-15&amp;severity=medium&amp;id=68359c9a5d5f0974d01e4595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-15-f1bda7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-15&amp;severity=medium&amp;id=682acdc3bbaf20d303f1bda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-15-f1269e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f1269e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5189-relative-path-traversal-in-red-hat-r-5b2d476a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5189%3A%20Relative%20Path%20Traversal%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.4%20for%20RHEL%208&amp;severity=medium&amp;id=68e84755ba0e608b4faf9c0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36038-cwe-400-uncontrolled-resource-consumption-in-microsoft-asp-net-core-8-0-bee4cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36038%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20ASP.NET%20Core%208.0&amp;severity=high&amp;id=682d983bc4522896dcbee4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36558-security-feature-bypass-in-microsoft-net-6-0-bee611</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36558%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20.NET%206.0&amp;severity=medium&amp;id=682d983cc4522896dcbee611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47627-cwe-444-inconsistent-interpretation-d15d4fa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47627%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=medium&amp;id=69092145fe7723195e053fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47641-cwe-444-inconsistent-interpretation-e98a8caa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47641%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20aio-libs%20aiohttp&amp;severity=low&amp;id=69092145fe7723195e053fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34060-authentication-bypass-vulnerability-322d4b95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34060%3A%20Authentication%20Bypass%20Vulnerability%20in%20VMware%20Cloud%20Director%20Appliance%20(VCD%20Appliance)&amp;severity=high&amp;id=694194799050fe8508060cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36049-cwe-20-improper-input-validation-in-microsoft-microsoft-visual-studio-2022-version-17-2-bee50f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36049%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.2&amp;severity=high&amp;id=682d983cc4522896dcbee50f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36007-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-send-customer-voice-survey-from-dynamics-365-app-bee417</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36007%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Send%20Customer%20Voice%20survey%20from%20Dynamics%20365%20app&amp;severity=high&amp;id=682d983bc4522896dcbee417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36437-cwe-94-improper-control-of-generation-of-code-code-injection-in-microsoft-azure-pipelines-agent-bee609</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36437%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Azure%20Pipelines%20Agent&amp;severity=high&amp;id=682d983cc4522896dcbee609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23583-information-disclosure-escalation-o-2829f60f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23583%3A%20information%20disclosure%2C%20escalation%20of%20privilege%2C%20denial%20of%20service%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=694194789050fe8508060ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34991-execute-unauthorized-code-or-comman-50c3ebce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34991%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWLM&amp;severity=critical&amp;id=694194799050fe8508060d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26205-escalation-of-privilege-in-fortinet-a685c51b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26205%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiADC&amp;severity=high&amp;id=694194789050fe8508060cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36553-execute-unauthorized-code-or-comman-f5d995d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36553%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=694194799050fe8508060d09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41840-escalation-of-privilege-in-fortinet-6f07ac0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41840%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiClientWindows&amp;severity=high&amp;id=6941947b9050fe8508060d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36018-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-jupyter-extension-for-visual-studio-code-bee44b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36018%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Jupyter%20Extension%20for%20Visual%20Studio%20Code&amp;severity=high&amp;id=682d983bc4522896dcbee44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36016-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-0-bee443</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36016%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.0&amp;severity=medium&amp;id=682d983bc4522896dcbee443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36021-cwe-20-improper-input-validation-in-microsoft-on-prem-data-gateway-bee44f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36021%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20On-Prem%20Data%20Gateway&amp;severity=high&amp;id=682d983bc4522896dcbee44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36033-cwe-822-untrusted-pointer-dereference-in-microsoft-windows-10-version-1809-bee4ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36033%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983bc4522896dcbee4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36031-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-bee4aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36031%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d983bc4522896dcbee4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36030-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-bee49b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36030%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=medium&amp;id=682d983bc4522896dcbee49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36028-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36028%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682d983bc4522896dcbee474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36035-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-exchange-server-2016-cumulative-update-23-bee4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36035%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=682d983bc4522896dcbee4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36037-security-feature-bypass-in-microsoft-microsoft-office-2019-bee4c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36037%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d983bc4522896dcbee4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36045-cwe-822-untrusted-pointer-dereference-in-microsoft-microsoft-office-2019-bee4fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36045%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d983bc4522896dcbee4fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36042-cwe-122-heap-based-buffer-overflow-in-microsoft-microsoft-visual-studio-2022-version-17-6-bee4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36042%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.6&amp;severity=medium&amp;id=682d983bc4522896dcbee4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36041-cwe-416-use-after-free-in-microsoft-microsoft-office-2019-bee4ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36041%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d983bc4522896dcbee4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36039-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-exchange-server-2016-cumulative-update-23-bee4cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36039%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=682d983bc4522896dcbee4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36050-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-exchange-server-2019-cumulative-update-12-bee513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36050%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%2012&amp;severity=high&amp;id=682d983cc4522896dcbee513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36047-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-bee50b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36047%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee50b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36046-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-11-version-21h2-bee4fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36046%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=682d983bc4522896dcbee4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36392-cwe-126-buffer-over-read-in-microsoft-windows-server-2019-bee528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36392%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d983cc4522896dcbee528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36393-cwe-426-untrusted-search-path-in-microsoft-windows-10-version-1809-bee543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36393%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36394-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-bee54b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36394%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36395-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-server-2019-bee553</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36395%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=682d983cc4522896dcbee553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36396-cwe-41-improper-resolution-of-path-equivalence-in-microsoft-windows-11-version-22h2-bee562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36396%3A%20CWE-41%3A%20Improper%20Resolution%20of%20Path%20Equivalence%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d983cc4522896dcbee562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36397-cwe-126-buffer-over-read-in-microsoft-windows-10-version-1809-bee566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36397%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=critical&amp;id=682d983cc4522896dcbee566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36398-cwe-908-use-of-uninitialized-resource-in-microsoft-windows-10-version-1809-bee56a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36398%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d983cc4522896dcbee56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36399-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-server-2022-23h2-edition-server-core-installation-bee56e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36399%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%20Server%202022%2C%2023H2%20Edition%20(Server%20Core%20installation)&amp;severity=high&amp;id=682d983cc4522896dcbee56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36400-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee572</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36400%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36401-cwe-190-integer-overflow-or-wraparound-in-microsoft-windows-10-version-1809-bee576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36401%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36402-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee57a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36402%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee57a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36403-cwe-591-sensitive-data-storage-in-improperly-locked-memory-in-microsoft-windows-10-version-1809-bee598</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36403%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36404-cwe-284-improper-access-control-in-microsoft-windows-10-version-1809-bee59c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36404%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d983cc4522896dcbee59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36405-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-microsoft-windows-10-version-1809-bee5a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36405%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36406-cwe-20-improper-input-validation-in-microsoft-windows-server-2022-bee5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36406%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202022&amp;severity=medium&amp;id=682d983cc4522896dcbee5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36407-cwe-20-improper-input-validation-in-microsoft-windows-server-2022-bee5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36407%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=682d983cc4522896dcbee5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36408-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee5b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36408%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee5b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36439-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-exchange-server-2016-cumulative-update-23-bee60d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36439%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=682d983cc4522896dcbee60d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38177-cwe-502-deserialization-of-untrusted-data-in-microsoft-microsoft-sharepoint-enterprise-server-2016-bee654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38177%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=medium&amp;id=682d983cc4522896dcbee654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36017-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-microsoft-windows-10-version-1809-bee447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36017%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983bc4522896dcbee447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36036-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee4ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36036%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983bc4522896dcbee4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36043-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-microsoft-system-center-operations-manager-scom-2022-bee4f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36043%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20System%20Center%20Operations%20Manager%20(SCOM)%202022&amp;severity=medium&amp;id=682d983bc4522896dcbee4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36052-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-microsoft-azure-app-service-bee517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36052%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Azure%20App%20Service&amp;severity=high&amp;id=682d983cc4522896dcbee517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36410-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-microsoft-microsoft-dynamics-365-on-premises-version-9-1-bee5c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36410%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=682d983cc4522896dcbee5c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36413-security-feature-bypass-in-microsoft-microsoft-office-2019-bee5c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36413%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=682d983cc4522896dcbee5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36422-cwe-426-untrusted-search-path-in-microsoft-windows-defender-antimalware-platform-bee5c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36422%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20Microsoft%20Windows%20Defender%20Antimalware%20Platform&amp;severity=high&amp;id=682d983cc4522896dcbee5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36423-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee5cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36423%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee5cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36424-cwe-125-out-of-bounds-read-in-microsoft-windows-11-version-22h3-bee5f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36424%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2011%20version%2022H3&amp;severity=high&amp;id=682d983cc4522896dcbee5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36425-cwe-122-heap-based-buffer-overflow-in-microsoft-windows-10-version-1809-bee5fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36425%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36427-elevation-of-privilege-in-microsoft-windows-10-version-1809-bee601</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36427%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36428-cwe-125-out-of-bounds-read-in-microsoft-windows-10-version-1809-bee605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36428%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682d983cc4522896dcbee605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36560-security-feature-bypass-in-microsoft-microsoft-net-framework-3-5-and-4-8-1-bee61e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36560%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.8.1&amp;severity=high&amp;id=682d983cc4522896dcbee61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36705-cwe-59-improper-link-resolution-before-file-access-link-following-in-microsoft-windows-10-version-1809-bee622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36705%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36719-cwe-20-improper-input-validation-in-microsoft-windows-10-version-1809-bee626</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36719%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983cc4522896dcbee626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38151-cwe-908-use-of-uninitialized-resource-in-microsoft-host-integration-server-2020-bee645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38151%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Host%20Integration%20Server%202020&amp;severity=high&amp;id=682d983cc4522896dcbee645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46590-cwe-611-improper-restriction-of-xml-80073665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46590%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Siemens%20Siemens%20OPC%20UA%20Modelling%20Editor%20(SiOME)&amp;severity=high&amp;id=6941947d9050fe8508061293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45794-cwe-294-authentication-bypass-by-ca-887d7bea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45794%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Siemens%20Mendix%20Applications%20using%20Mendix%2010&amp;severity=medium&amp;id=6941947d9050fe8508061290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28391-cwe-119-improper-restriction-of-ope-27c54966</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28391%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=critical&amp;id=690a531e2a90255b94da5f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27882-cwe-122-heap-based-buffer-overflow--8f9b7912</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27882%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=critical&amp;id=690a531d2a90255b94da5f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28379-cwe-119-improper-restriction-of-ope-e7a189b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28379%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=critical&amp;id=690a531e2a90255b94da5f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31247-cwe-119-improper-restriction-of-ope-9c4b05cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31247%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Silicon%20Labs%20Gecko%20Platform&amp;severity=critical&amp;id=690a531f2a90255b94da5f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46446-na-19afc71f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46446%3A%20n%2Fa&amp;severity=null&amp;id=69092637fe7723195e0b6214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46445-na-5bcde74c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46445%3A%20n%2Fa&amp;severity=null&amp;id=69092637fe7723195e0b620a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-14-f12837</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-13-74ce95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-13&amp;severity=medium&amp;id=682c7abbe3e6de8ceb74ce95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-13-f12a61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-12-f12194</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46850-cwe-416-use-after-free-in-openvpn-o-09eaea21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46850%3A%20CWE-416%20Use%20After%20Free%20in%20OpenVPN%20OpenVPN%202%20(Community)&amp;severity=high&amp;id=6941947d9050fe8508061296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-11-f12e0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4804-cwe-489-active-debug-code-in-johnson-4542b89c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4804%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20Johnson%20Controls%20Quantum%20HD%20Unity%20Compressor&amp;severity=critical&amp;id=6941947f9050fe8508061327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36027-elevation-of-privilege-in-microsoft-microsoft-edge-chromium-based-bee470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36027%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d983bc4522896dcbee470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47108-cwe-770-allocation-of-resources-wit-de8827fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47108%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20open-telemetry%20opentelemetry-go-contrib&amp;severity=high&amp;id=690116f28f31b6f061e5f1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47246-na-474e36d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47246%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9ae247d717aace26787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-10-f129c2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f129c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36024-elevation-of-privilege-in-microsoft-microsoft-edge-chromium-based-bee45b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36024%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d983bc4522896dcbee45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36014-remote-code-execution-in-microsoft-microsoft-edge-chromium-based-bee421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36014%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d983bc4522896dcbee421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39198-use-after-free-in-red-hat-red-hat-e-9413b6be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39198%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47488-na-2178e07f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47488%3A%20n%2Fa&amp;severity=medium&amp;id=68e0f3c8b66c7f7acdd3eaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47489-na-d0812d66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47489%3A%20n%2Fa&amp;severity=null&amp;id=68e0f3c7b66c7f7acdd3ead9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-09-76ad05</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-09&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76ad05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-09-f1210c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1210c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4061-exposure-of-sensitive-information-to-07d39d62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4061%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20JBoss%20Enterprise%20Application%20Platform%207&amp;severity=medium&amp;id=68e8557bba0e608b4fb1ee87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-08-f12931</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4956-improper-restriction-of-rendered-ui--d89eb0dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4956%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4295-cwe-190-integer-overflow-or-wraparou-ad50096b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4295%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=6941947f9050fe8508061316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3889-cwe-119-improper-restriction-of-oper-b98daa31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3889%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Arm%20Ltd%20Valhall%20GPU%20Kernel%20Driver&amp;severity=high&amp;id=694194799050fe8508060d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33074-cwe-416-use-after-free-in-qualcomm--8fb4b905</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33074%3A%20CWE-416%20Use%20After%20Free%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=694194799050fe8508060cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33059-cwe-191-integer-underflow-wrap-or-w-f648c361</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33059%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=694194789050fe8508060cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33055-cwe-120-buffer-copy-without-checkin-4cf5287d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33055%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=694194789050fe8508060cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33031-cwe-120-buffer-copy-without-checkin-58695b2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33031%3A%20CWE-120%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=high&amp;id=694194789050fe8508060cba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22388-cwe-823-use-of-out-of-range-pointer-02a2c598</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22388%3A%20CWE-823%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Qualcomm%2C%20Inc.%20Snapdragon&amp;severity=critical&amp;id=694194789050fe8508060ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47102-na-c0c5f564</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47102%3A%20n%2Fa&amp;severity=medium&amp;id=68e0f3c7b66c7f7acdd3ead0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41425-n-a-in-n-a-bf0ba2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41425%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-07-f127e0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f127e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4700-cwe-862-missing-authorization-in-gitlab-gitlab-253f91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4700%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46728-cwe-476-null-pointer-dereference-in-3a9040c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46728%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20squid-cache%20squid&amp;severity=high&amp;id=6908f50bf612d110fe9cbe5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40661-improper-restriction-of-operations--a3218458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40661%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer&amp;severity=medium&amp;id=69092633fe7723195e0b6197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40660-improper-authentication-a5be545f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40660%3A%20Improper%20Authentication&amp;severity=medium&amp;id=68e8557bba0e608b4fb1ee7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4535-out-of-bounds-read-in-red-hat-red-ha-e92c0265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4535%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=69200c2a59bb91a9a9a60fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4910-exposure-of-resource-to-wrong-sphere-bc6be369</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4910%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20Red%20Hat%20Red%20Hat%203scale%20API%20Management%20Platform%202&amp;severity=medium&amp;id=68e84aedba0e608b4fb043a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5964-cwe-20-improper-input-validation-in-1e-platform-aeb19d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5964%3A%20CWE-20%20Improper%20Input%20Validation%20in%201E%20Platform&amp;severity=critical&amp;id=682cd0f71484d88663aeb19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45163-cwe-20-improper-input-validation-in-1e-platform-aeb190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45163%3A%20CWE-20%20Improper%20Input%20Validation%20in%201E%20Platform&amp;severity=critical&amp;id=682cd0f71484d88663aeb190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45161-cwe-20-improper-input-validation-in-1e-platform-aeb18c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45161%3A%20CWE-20%20Improper%20Input%20Validation%20in%201E%20Platform&amp;severity=critical&amp;id=682cd0f71484d88663aeb18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3399-cwe-201-insertion-of-sensitive-information-into-sent-data-in-gitlab-gitlab-253f34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3399%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3909-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253f62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3909%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3246-cwe-770-allocation-of-resources-without-limits-or-throttling-in-gitlab-gitlab-253f2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3246%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5090-improper-handling-of-exceptional-con-3bd15cbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5090%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690eefde44af18c3752cf5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5825-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-gitlab-gitlab-253fbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5825%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42669-uncontrolled-resource-consumption-4344b7f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42669%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4699-cwe-306-missing-authentication-for-c-8f087905</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4699%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC-F%20Series%20FX3U-16MT%2FES&amp;severity=critical&amp;id=6941947f9050fe8508061322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32837-elevation-of-privilege-in-mediatek-inc-mt6883-mt6885-mt6889-mt6893-mt8797-mt8798-bf017c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32837%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=682d983ec4522896dcbf017c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32836-elevation-of-privilege-in-mediatek-inc-mt6893-mt6895-mt6983-mt6985-mt8797-mt8798-bf0178</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32836%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d983ec4522896dcbf0178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32835-elevation-of-privilege-in-mediatek-inc-mt6580-mt6731-mt6735-mt6737-mt6739-mt6753-mt6757-mt6757c-mt6757cd-mt6757ch-mt6761-mt6762-mt6763-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6835-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6886-mt6889-mt6891-mt6893-mt6895-mt6983-mt6985-mt8185-mt8321-mt8385-mt8666-mt8667-mt8673-mt8675-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8791t-mt8797-mt8798-bf0d7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32835%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6731%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6753%2C%20MT6757%2C%20MT6757C%2C%20MT6757CD%2C%20MT6757CH%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8185%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d983fc4522896dcbf0d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32834-elevation-of-privilege-in-mediatek-inc-mt6580-mt6735-mt6737-mt6739-mt6753-mt6761-mt6765-mt6768-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6835-mt6853-mt6853t-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6886-mt6889-mt6893-mt6895-mt6983-mt6985-mt8185-mt8321-mt8385-mt8666-mt8667-mt8673-mt8675-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8791t-mt8797-mt8798-bee777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32834%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6753%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6835%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6886%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8185%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8673%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d983cc4522896dcbee777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32832-elevation-of-privilege-in-mediatek-inc-mt6883-mt6885-mt6889-mt6893-mt6895-mt6983-mt6985-mt8797-mt8798-bf0158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32832%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT6985%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=682d983ec4522896dcbf0158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38407-na-10322c86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38407%3A%20n%2Fa&amp;severity=high&amp;id=690a2dddf0ba78a050535af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38406-na-26a43c69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38406%3A%20n%2Fa&amp;severity=null&amp;id=690a2dddf0ba78a050535af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47004-n-a-in-n-a-bee7c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47004%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-06-f1233a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f1233a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-05-f122be</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f122be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46382-na-ea0002ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46382%3A%20n%2Fa&amp;severity=null&amp;id=690a5556a730e5a3d9d7a9fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46381-n-a-in-n-a-bed0f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46381%3A%20n%2Fa&amp;severity=null&amp;id=682d983ac4522896dcbed0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46380-n-a-in-n-a-bed0f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46380%3A%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-04-f1237a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f1237a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5088-incorrect-synchronization-in-red-hat-c0f2ae95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5088%3A%20Incorrect%20Synchronization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690904ae00ff46172d4a0ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3961-improper-limitation-of-a-pathname-to-66585f89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3961%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=critical&amp;id=691f730d28b41f27b438b87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46847-buffer-copy-without-checking-size-o-f4fdc9f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46847%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)&amp;severity=high&amp;id=691ebfd29f5a9374a9cb41d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46848-incorrect-conversion-between-numeri-f05460b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46848%3A%20Incorrect%20Conversion%20between%20Numeric%20Types&amp;severity=high&amp;id=691ebfd29f5a9374a9cb41f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42670-uncontrolled-resource-consumption-01d2424c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42670%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5824-improper-handling-of-exceptional-con-bfcce2ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5824%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=6908f50bf612d110fe9cbe64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4091-incorrect-default-permissions-in-red-3c6db468</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4091%3A%20Incorrect%20Default%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46846-inconsistent-interpretation-of-http-44097db6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46846%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)&amp;severity=critical&amp;id=68e7a239ba0e608b4f980f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36022-remote-code-execution-in-microsoft-microsoft-edge-chromium-based-bee453</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36022%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=682d983bc4522896dcbee453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36029-spoofing-in-microsoft-microsoft-edge-for-android-bee493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36029%3A%20Spoofing%20in%20Microsoft%20Microsoft%20Edge%20for%20Android&amp;severity=medium&amp;id=682d983bc4522896dcbee493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36034-cwe-416-use-after-free-in-microsoft-microsoft-edge-chromium-based-bee4b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36034%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=682d983bc4522896dcbee4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38965-na-0cd5a955</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38965%3A%20n%2Fa&amp;severity=null&amp;id=6913708412d2ca32afd48402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41260-na-2869a486</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41260%3A%20n%2Fa&amp;severity=null&amp;id=690a5549a730e5a3d9d7716f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41259-na-9840aa15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41259%3A%20n%2Fa&amp;severity=null&amp;id=690a5549a730e5a3d9d77168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45362-na-9af55127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45362%3A%20n%2Fa&amp;severity=null&amp;id=690a3b5aff58c9332ff08e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45360-na-633463e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45360%3A%20n%2Fa&amp;severity=medium&amp;id=690a3b5aff58c9332ff08e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43665-na-0ac9594f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43665%3A%20n%2Fa&amp;severity=null&amp;id=690a3b5aff58c9332ff08e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41164-na-bd255031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41164%3A%20n%2Fa&amp;severity=null&amp;id=690a3b5aff58c9332ff08e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47235-na-ac363b76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47235%3A%20n%2Fa&amp;severity=medium&amp;id=690a2de0f0ba78a050535baa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-47234-na-5f9f1477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-47234%3A%20n%2Fa&amp;severity=high&amp;id=690a2ddef0ba78a050535b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-03-f1266c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1266c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38473-reachable-assertion-in-avahi-d901475c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38473%3A%20Reachable%20Assertion%20in%20avahi&amp;severity=medium&amp;id=69092633fe7723195e0b6170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38472-reachable-assertion-in-avahi-cd98f743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38472%3A%20Reachable%20Assertion%20in%20avahi&amp;severity=medium&amp;id=69092633fe7723195e0b616b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38471-reachable-assertion-in-avahi-903b9c77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38471%3A%20Reachable%20Assertion%20in%20avahi&amp;severity=medium&amp;id=69092633fe7723195e0b6166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38470-reachable-assertion-in-avahi-17fc082c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38470%3A%20Reachable%20Assertion%20in%20avahi&amp;severity=medium&amp;id=69092632fe7723195e0b5fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38469-reachable-assertion-in-avahi-8c0f469f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38469%3A%20Reachable%20Assertion%20in%20avahi&amp;severity=medium&amp;id=69092632fe7723195e0b5f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46595-cwe-79-improper-neutralization-of-i-8c371fca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46595%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Algosec%20Algosec%20FireFlow&amp;severity=medium&amp;id=69144bf6d823118ac8cd3a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5408-improper-privilege-management-in-red-7863748c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5408%3A%20Improper%20Privilege%20Management%20in%20Red%20Hat%20Red%20Hat%20OpenShift%20Container%20Platform%204.11&amp;severity=high&amp;id=68e7a239ba0e608b4f980f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-02-752fc0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-02&amp;severity=medium&amp;id=682c7abde3e6de8ceb752fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-02-f12785</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3397-use-after-free-in-red-hat-red-hat-en-492f8fb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3397%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=68e84755ba0e608b4faf9c24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5856-use-after-free-in-google-chrome-bee6ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5856%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983cc4522896dcbee6ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5855-use-after-free-in-google-chrome-bee6e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5855%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983cc4522896dcbee6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5854-use-after-free-in-google-chrome-bee6e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5854%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983cc4522896dcbee6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5852-use-after-free-in-google-chrome-bee6ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5852%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983cc4522896dcbee6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5849-integer-overflow-in-google-chrome-bee660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5849%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983cc4522896dcbee660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5482-insufficient-data-validation-in-google-chrome-bedfd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5482%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983bc4522896dcbedfd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20175-improper-neutralization-of-special--1880f2ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20175%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=high&amp;id=694194769050fe85080608ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20170-improper-neutralization-of-special--9438f05c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20170%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Cisco%20Cisco%20Identity%20Services%20Engine%20Software&amp;severity=medium&amp;id=694194769050fe85080608ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20063-improper-control-of-generation-of-c-bca7262d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20063%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=high&amp;id=694194749050fe8508060897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20048-improper-privilege-management-in-ci-0f455d91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20048%3A%20Improper%20Privilege%20Management%20in%20Cisco%20Cisco%20Firepower%20Management%20Center&amp;severity=critical&amp;id=694194749050fe8508060894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5178-use-after-free-in-red-hat-red-hat-en-fea1609e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5178%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690d0f9108e329e0f8f19b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3972-creation-of-temporary-file-in-direct-d49e79b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3972%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5625-allocation-of-resources-without-limi-de9a49ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5625%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Red%20Hat%20Ironic%20content%20for%20Red%20Hat%20OpenShift%20Container%20Platform%204.12&amp;severity=medium&amp;id=68e84e5dba0e608b4fb0c50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-11-01-f12fdc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-11-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prolific-puma-shadowy-link-shortening-service-enab-7b17721c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prolific%20Puma%3A%20Shadowy%20Link%20Shortening%20Service%20Enables%20Cybercrime&amp;severity=medium&amp;id=695f817ac901b06321d427ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22518-improper-authorization-in-atlassian-a8921090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22518%3A%20Improper%20Authorization%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=critical&amp;id=68f7d9a5247d717aace2180d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4251-cwe-352-cross-site-request-forgery-csrf-in-unknown-eventprime-bf5ee3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4251%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20EventPrime&amp;severity=medium&amp;id=682d9848c4522896dcbf5ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5211-cwe-79-cross-site-scripting-xss-in-unknown-fattura24-bf5eeb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5211%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Fattura24&amp;severity=medium&amp;id=682d9848c4522896dcbf5eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4390-cwe-79-cross-site-scripting-xss-in-unknown-popup-box-bf5289</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4390%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Popup%20box&amp;severity=medium&amp;id=682d9846c4522896dcbf5289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5237-cwe-79-cross-site-scripting-xss-in-unknown-memberlite-shortcodes-bf5f0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5237%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Memberlite%20Shortcodes&amp;severity=medium&amp;id=682d9848c4522896dcbf5f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5519-cwe-352-cross-site-request-forgery-csrf-in-unknown-eventprime-bf5425</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5519%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20EventPrime&amp;severity=medium&amp;id=682d9847c4522896dcbf5425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5098-cwe-284-improper-access-control-in-unknown-campaign-monitor-forms-by-optin-cat-bf53dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5098%3A%20CWE-284%20Improper%20Access%20Control%20in%20Unknown%20Campaign%20Monitor%20Forms%20by%20Optin%20Cat&amp;severity=high&amp;id=682d9847c4522896dcbf53dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5238-cwe-79-cross-site-scripting-xss-in-unknown-eventprime-bf5f17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5238%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20EventPrime&amp;severity=medium&amp;id=682d9848c4522896dcbf5f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5243-cwe-79-cross-site-scripting-xss-in-unknown-login-screen-manager-bf5405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5243%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Login%20Screen%20Manager&amp;severity=medium&amp;id=682d9847c4522896dcbf5405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5307-cwe-79-cross-site-scripting-xss-in-unknown-photos-and-files-contest-gallery-bf5f21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5307%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photos%20and%20Files%20Contest%20Gallery&amp;severity=medium&amp;id=682d9848c4522896dcbf5f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4823-cwe-79-cross-site-scripting-xss-in-unknown-wp-meta-and-date-remover-bf5358</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4823%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Meta%20and%20Date%20Remover&amp;severity=medium&amp;id=682d9847c4522896dcbf5358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5229-cwe-79-cross-site-scripting-xss-in-unknown-e2pdf-bf5401</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5229%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20E2Pdf&amp;severity=medium&amp;id=682d9847c4522896dcbf5401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-31-f125e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f125e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5349-missing-release-of-memory-after-effe-cddba0a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5349%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20rmagick&amp;severity=medium&amp;id=690a5558a730e5a3d9d7c225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21358-elevation-of-privilege-in-google-android-bed9e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21358%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d983ac4522896dcbed9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-30-f123f2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f123f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-29-f12137</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-28-9e173f1b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-28&amp;severity=medium&amp;id=68359c9a5d5f0974d01e2be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-28-f18491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f18491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-28-f12b65</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-28-6e3104</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-28&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e3104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40131-elevation-of-privilege-in-google-android-bed6f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40131%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d983ac4522896dcbed6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40130-elevation-of-privilege-in-google-an-b1e5d63b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40130%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=6937058652c2eb5957f2f195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40125-elevation-of-privilege-in-google-android-bdc88f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40125%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d981fc4522896dcbdc88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40120-elevation-of-privilege-in-google-android-bdc88b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40120%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d981fc4522896dcbdc88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40117-elevation-of-privilege-in-google-android-bee7c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40117%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d983cc4522896dcbee7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40116-elevation-of-privilege-in-google-android-bdc887</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40116%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d981fc4522896dcbdc887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-27-f1254f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f1254f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46748-cwe-89-improper-neutralization-of-s-eec0dbb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46748%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=high&amp;id=68f7d9ae247d717aace25e03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5798-cwe-918-server-side-request-forgery-ssrf-in-unknown-assistant-bf5433</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5798%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Assistant&amp;severity=high&amp;id=682d9847c4522896dcbf5433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46753-na-3ee0fa1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46753%3A%20n%2Fa&amp;severity=null&amp;id=690a2ddef0ba78a050535b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46752-na-92017bc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46752%3A%20n%2Fa&amp;severity=null&amp;id=690a2ddef0ba78a050535b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43208-na-33da625b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43208%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9ae247d717aace25ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-26-f12718</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5574-use-after-free-in-red-hat-red-hat-en-90b58478</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5574%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=high&amp;id=691ebfd29f5a9374a9cb4217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5380-use-after-free-in-red-hat-red-hat-en-344e6ef6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5380%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=medium&amp;id=690a5558a730e5a3d9d7c24f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5367-out-of-bounds-write-in-red-hat-red-h-b02899b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5367%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206%20Extended%20Lifecycle%20Support%20%20-%20EXTENSION&amp;severity=high&amp;id=690a5558a730e5a3d9d7c22d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42852-processing-web-content-may-lead-to-arbitrary-code-execution-in-apple-ios-and-ipados-bdc8d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42852%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5472-use-after-free-in-google-chrome-bec743</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5472%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9839c4522896dcbec743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4692-heap-based-buffer-overflow-bada321b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4692%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=68f27d809c34d0947f370a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4693-out-of-bounds-read-in-red-hat-red-ha-efaaeff8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4693%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690a5558a730e5a3d9d7c216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34048-vulnerability-in-vmware-vmware-vcen-96f88974</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34048%3A%20Vulnerability%20in%20VMware%20VMware%20vCenter%20Server&amp;severity=critical&amp;id=68f7d9a9247d717aace21ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-25-f1285a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f1285a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5752-cwe-77-improper-neutralization-of-sp-a332eecf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5752%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Pip%20maintainers%20pip&amp;severity=medium&amp;id=6908ed741c2a0078ae51024e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20273-improper-neutralization-of-special--6c4e5b4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20273%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=68f7d9a5247d717aace216c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5732-vulnerability-in-mozilla-firefox-1ded6b11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5732%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2f4eb3efac3694219b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-24-f121ce</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5633-use-after-free-in-red-hat-red-hat-en-b9e3acb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5633%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690d0c0d08e329e0f8ef65be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-23-f12dc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46303-na-8444996b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46303%3A%20n%2Fa&amp;severity=null&amp;id=690a2dddf0ba78a050535afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-22-f12f7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-21-f12ea8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44483-cwe-532-insertion-of-sensitive-info-e61b69e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44483%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Apache%20Software%20Foundation%20Apache%20Santuario&amp;severity=null&amp;id=69092635fe7723195e0b61e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34051-authentication-bypass-vulnerability-in-vmware-aria-operations-for-logs-bebcc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34051%3A%20Authentication%20Bypass%20Vulnerability%20in%20VMware%20Aria%20Operations%20for%20Logs&amp;severity=critical&amp;id=682d9838c4522896dcbebcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46287-na-70d2669a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46287%3A%20n%2Fa&amp;severity=null&amp;id=690904ac00ff46172d4a0d2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-20-f12dc9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-19-f12158</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f12158</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5631-cwe-79-improper-neutralization-of-in-8a22415a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5631%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Roundcube%20Roundcubemail&amp;severity=medium&amp;id=68f7d9af247d717aace2683d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45727-xml-external-entities-xxe-in-north--60b549e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45727%3A%20XML%20external%20entities%20(XXE)%20in%20North%20Grid%20Corporation%20Proself%20Enterprise%2FStandard%20Edition&amp;severity=high&amp;id=68f7d9ae247d717aace25def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39331-vulnerability-in-nodejs-node-bed585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39331%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38552-vulnerability-in-nodejs-node-bed581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38552%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=null&amp;id=682d983ac4522896dcbed581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39332-vulnerability-in-nodejs-node-bed58d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39332%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=null&amp;id=682d983ac4522896dcbed58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38545-vulnerability-in-curl-curl-bed0d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38545%3A%20Vulnerability%20in%20curl%20curl&amp;severity=high&amp;id=682d983ac4522896dcbed0d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46009-na-dee27ba7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46009%3A%20n%2Fa&amp;severity=null&amp;id=690a47356d939959c8021af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-18-75349b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-18&amp;severity=medium&amp;id=682c7abde3e6de8ceb75349b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-18-f12d19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41715-cwe-269-improper-privilege-management-in-sonicwall-sonicos-bebd57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41715%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SonicWall%20SonicOS&amp;severity=high&amp;id=682d9838c4522896dcbebd57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22081-easily-exploitable-vulnerability-al-19552dbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22081%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTPS%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20for%20JDK%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=medium&amp;id=6909262bfe7723195e0b5dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22067-easily-exploitable-vulnerability-al-1698fd5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22067%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20CORBA%20to%20compromise%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Java%20SE%2C%20Oracle%20GraalVM%20Enterprise%20Edition%20accessible%20data.%20in%20Oracle%20Corporation%20Java%20SE%20JDK%20and%20JRE&amp;severity=medium&amp;id=6909262bfe7723195e0b5dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-17-f12aa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5089-cwe-209-generation-of-error-message-containing-sensitive-information-in-unknown-defender-security-bf53d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5089%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Unknown%20Defender%20Security&amp;severity=medium&amp;id=682d9847c4522896dcbf53d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4289-cwe-79-cross-site-scripting-xss-in-unknown-wp-matterport-shortcode-bf5243</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4289%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Matterport%20Shortcode&amp;severity=medium&amp;id=682d9846c4522896dcbf5243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4821-cwe-79-cross-site-scripting-xss-in-unknown-drag-and-drop-multiple-file-upload-for-woocommerce-bf5350</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4821%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Drag%20and%20Drop%20Multiple%20File%20Upload%20for%20WooCommerce&amp;severity=medium&amp;id=682d9847c4522896dcbf5350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4861-cwe-94-improper-control-of-generation-of-code-code-injection-in-unknown-file-manager-pro-bf5368</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4861%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20File%20Manager%20Pro&amp;severity=high&amp;id=682d9847c4522896dcbf5368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4725-cwe-79-cross-site-scripting-xss-in-unknown-simple-posts-ticker-bf5c86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4725%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Posts%20Ticker&amp;severity=medium&amp;id=682d9848c4522896dcbf5c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3279-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-wordpress-gallery-plugin-bf5120</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3279%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20WordPress%20Gallery%20Plugin&amp;severity=medium&amp;id=682d9846c4522896dcbf5120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5133-cwe-290-authentication-bypass-by-spoofing-in-unknown-user-activity-log-pro-bf53e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5133%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Unknown%20user-activity-log-pro&amp;severity=high&amp;id=682d9847c4522896dcbf53e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4811-cwe-79-cross-site-scripting-xss-in-unknown-wordpress-file-upload-bf5328</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4811%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WordPress%20File%20Upload&amp;severity=medium&amp;id=682d9847c4522896dcbf5328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3706-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-activitypub-bf5138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3706%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20ActivityPub&amp;severity=medium&amp;id=682d9846c4522896dcbf5138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3746-cwe-79-cross-site-scripting-xss-in-unknown-activitypub-bf515f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3746%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ActivityPub&amp;severity=medium&amp;id=682d9846c4522896dcbf515f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4646-cwe-79-cross-site-scripting-xss-in-unknown-simple-posts-ticker-bf52ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4646%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Posts%20Ticker&amp;severity=medium&amp;id=682d9847c4522896dcbf52ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3707-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-activitypub-bf5140</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3707%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20ActivityPub&amp;severity=medium&amp;id=682d9846c4522896dcbf5140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4666-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-form-maker-by-10web-bf52f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4666%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Form%20Maker%20by%2010Web&amp;severity=critical&amp;id=682d9847c4522896dcbf52f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5561-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-wordpress-wordpress-bf542b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5561%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20WordPress%20WordPress&amp;severity=medium&amp;id=682d9847c4522896dcbf542b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5003-cwe-538-insertion-of-sensitive-information-into-externally-accessible-file-or-directory-in-unknown-active-directory-integration-ldap-integration-bf53c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5003%3A%20CWE-538%20Insertion%20of%20Sensitive%20Information%20into%20Externally-Accessible%20File%20or%20Directory%20in%20Unknown%20Active%20Directory%20Integration%20%2F%20LDAP%20Integration&amp;severity=high&amp;id=682d9847c4522896dcbf53c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3155-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-wordpress-gallery-plugin-bf5113</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3155%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20WordPress%20Gallery%20Plugin&amp;severity=high&amp;id=682d9846c4522896dcbf5113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4805-cwe-79-cross-site-scripting-xss-in-unknown-tutor-lms-bf5324</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4805%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Tutor%20LMS&amp;severity=medium&amp;id=682d9847c4522896dcbf5324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4691-cwe-89-sql-injection-in-unknown-wordpress-online-booking-and-scheduling-plugin-bf5305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4691%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WordPress%20Online%20Booking%20and%20Scheduling%20Plugin&amp;severity=high&amp;id=682d9847c4522896dcbf5305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4783-cwe-79-cross-site-scripting-xss-in-unknown-magee-shortcodes-bf530f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4783%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Magee%20Shortcodes&amp;severity=medium&amp;id=682d9847c4522896dcbf530f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4795-cwe-79-cross-site-scripting-xss-in-unknown-testimonial-slider-shortcode-bf5320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4795%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Testimonial%20Slider%20Shortcode&amp;severity=medium&amp;id=682d9847c4522896dcbf5320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4687-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-bf52fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4687%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682d9847c4522896dcbf52fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4388-cwe-79-cross-site-scripting-xss-in-unknown-eventon-bf5281</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4388%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20EventON&amp;severity=medium&amp;id=682d9846c4522896dcbf5281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5167-cwe-79-cross-site-scripting-xss-in-unknown-user-activity-log-pro-bf53ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5167%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20user-activity-log-pro&amp;severity=medium&amp;id=682d9847c4522896dcbf53ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4776-cwe-89-sql-injection-in-unknown-school-management-system-bf5309</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4776%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20School%20Management%20System&amp;severity=high&amp;id=682d9847c4522896dcbf5309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4643-cwe-502-deserialization-of-untrusted-data-in-unknown-enable-media-replace-bf52c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4643%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Enable%20Media%20Replace&amp;severity=high&amp;id=682d9846c4522896dcbf52c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4950-cwe-79-cross-site-scripting-xss-in-unknown-interactive-contact-form-and-multi-step-form-builder-with-drag-drop-editor-bf5377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4950%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Interactive%20Contact%20Form%20and%20Multi%20Step%20Form%20Builder%20with%20Drag%20%26%20Drop%20Editor&amp;severity=medium&amp;id=682d9847c4522896dcbf5377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5087-cwe-79-cross-site-scripting-xss-in-unknown-page-builder-pagelayer-bf53cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5087%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Page%20Builder%3A%20Pagelayer&amp;severity=medium&amp;id=682d9847c4522896dcbf53cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4819-cwe-79-cross-site-scripting-xss-in-unknown-shared-files-bf5330</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4819%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Shared%20Files&amp;severity=medium&amp;id=682d9847c4522896dcbf5330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5177-cwe-209-information-exposure-through-an-error-message-in-unknown-vrm-360-3d-model-viewer-bf53fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5177%3A%20CWE-209%20Information%20Exposure%20Through%20an%20Error%20Message%20in%20Unknown%20Vrm%20360%203D%20Model%20Viewer&amp;severity=medium&amp;id=682d9847c4522896dcbf53fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4971-cwe-502-deserialization-of-untrusted-data-in-unknown-weaver-xtreme-theme-support-bf537b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4971%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Weaver%20Xtreme%20Theme%20Support&amp;severity=high&amp;id=682d9847c4522896dcbf537b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4290-cwe-79-cross-site-scripting-xss-in-unknown-wp-matterport-shortcode-bf5247</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4290%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Matterport%20Shortcode&amp;severity=medium&amp;id=682d9846c4522896dcbf5247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4620-cwe-79-cross-site-scripting-xss-in-unknown-booking-calendar-bebddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4620%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Booking%20Calendar&amp;severity=medium&amp;id=682d9838c4522896dcbebddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4827-cwe-352-cross-site-request-forgery-csrf-in-unknown-file-manager-pro-bf5360</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4827%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20File%20Manager%20Pro&amp;severity=high&amp;id=682d9847c4522896dcbf5360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45898-n-a-in-n-a-bec935</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45898%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbec935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-10-16-1bbeed</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-10-16&amp;severity=medium&amp;id=682b69b652745a861d1bbeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-16-f12cc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-15-75f350</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-15&amp;severity=medium&amp;id=682c7abfe3e6de8ceb75f350</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-15-f129e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f129e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-14-f12c3a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41843-execute-unauthorized-code-or-comman-fb168625</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41843%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6941947b9050fe8508060d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41680-execute-unauthorized-code-or-comman-6a4b9151</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41680%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSandbox&amp;severity=high&amp;id=6941947b9050fe8508060d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33303-execute-unauthorized-code-or-comman-6732c90b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33303%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiEDR&amp;severity=high&amp;id=694194799050fe8508060cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45162-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-1e-1e-platform-aeb18e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45162%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%201E%201E%20Platform&amp;severity=critical&amp;id=682cd0f71484d88663aeb18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5557-protection-mechanism-failure-in-red--aa7453c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5557%3A%20Protection%20Mechanism%20Failure%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=68e0f3c3b66c7f7acdd3e9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-13-f12402</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43789-out-of-bounds-read-c890bde3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43789%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=690a5556a730e5a3d9d7a9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5554-na-in-line-corporation-line-client-f-59efe712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5554%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=medium&amp;id=6937d385964788758a7fe756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23632-na-2200f712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23632%3A%20n%2Fa&amp;severity=null&amp;id=690904a900ff46172d4a010b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-12-f12240</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5474-heap-buffer-overflow-in-google-chrome-bec86f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5474%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9839c4522896dcbec86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5476-use-after-free-in-google-chrome-bec7e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5476%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9839c4522896dcbec7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5218-use-after-free-in-google-chrome-bed63a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5218%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d983ac4522896dcbed63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34356-cwe-78-improper-neutralization-of-s-26c54ddd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34356%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Peplink%20Surf%20SOHO%20HW1&amp;severity=high&amp;id=690a53222a90255b94da665e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28381-cwe-78-improper-neutralization-of-s-e024d8b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28381%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Peplink%20Surf%20SOHO%20HW1&amp;severity=high&amp;id=690a531e2a90255b94da5f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34354-cwe-80-improper-neutralization-of-s-f0693223</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34354%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Peplink%20Surf%20SOHO%20HW1&amp;severity=low&amp;id=690a53222a90255b94da665a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35194-cwe-78-improper-neutralization-of-s-7500f9ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35194%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Peplink%20Surf%20SOHO%20HW1&amp;severity=high&amp;id=690a53242a90255b94da668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35193-cwe-78-improper-neutralization-of-s-f0546f39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35193%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Peplink%20Surf%20SOHO%20HW1&amp;severity=high&amp;id=690a53242a90255b94da668a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32645-cwe-489-leftover-debug-code-in-yifa-70dc8631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32645%3A%20CWE-489%3A%20Leftover%20Debug%20Code%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53222a90255b94da663e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35056-cwe-121-stack-based-buffer-overflow-2d4737a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35056%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Yifan%20YF325&amp;severity=high&amp;id=690a53242a90255b94da6686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35055-cwe-121-stack-based-buffer-overflow-c9ea1620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35055%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Yifan%20YF325&amp;severity=high&amp;id=690a53242a90255b94da6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34365-cwe-121-stack-based-buffer-overflow-c6bb0620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34365%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53242a90255b94da666c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34346-cwe-489-leftover-debug-code-in-yifa-5369eb6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34346%3A%20CWE-489%3A%20Leftover%20Debug%20Code%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53222a90255b94da6656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31272-cwe-121-stack-based-buffer-overflow-11b7d160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31272%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Yifan%20YF325&amp;severity=high&amp;id=690a53202a90255b94da5ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34426-cwe-121-stack-based-buffer-overflow-6cd3e8be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34426%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53242a90255b94da6670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32632-cwe-284-improper-access-control-in--eed1f1a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32632%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Yifan%20YF325&amp;severity=high&amp;id=690a53222a90255b94da663a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35966-cwe-190-integer-overflow-or-wraparo-84caf558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35966%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53242a90255b94da6696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35965-cwe-190-integer-overflow-or-wraparo-38ae8792</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35965%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53242a90255b94da6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35968-cwe-190-integer-overflow-or-wraparo-68697f29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35968%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53252a90255b94da66dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35967-cwe-190-integer-overflow-or-wraparo-193b0b90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35967%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Yifan%20YF325&amp;severity=critical&amp;id=690a53252a90255b94da66d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44981-cwe-639-authorization-bypass-through-user-controlled-key-in-apache-software-foundation-apache-zookeeper-bf5187</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44981%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Apache%20Software%20Foundation%20Apache%20ZooKeeper&amp;severity=critical&amp;id=682d9846c4522896dcbf5187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-11-f1250b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f1250b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45648-cwe-20-improper-input-validation-in-5d5bf0ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45648%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204523aaa02566521b4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42795-cwe-459-incomplete-cleanup-in-apach-953f2d60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42795%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204523aaa02566521b4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42794-cwe-459-incomplete-cleanup-in-apach-f7199fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42794%3A%20CWE-459%20Incomplete%20Cleanup%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=null&amp;id=690204523aaa02566521b4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36563-cwe-20-improper-input-validation-in-3ed25a17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36563%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68f7d9aa247d717aace21f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36584-security-feature-bypass-in-microsof-8b9f47a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36584%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68f7d9aa247d717aace21f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41763-cwe-918-server-side-request-forgery-8d5fa138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41763%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Microsoft%20Skype%20for%20Business%20Server%202015%20CU13&amp;severity=medium&amp;id=68f7d9ad247d717aace2216a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41679-execute-unauthorized-code-or-comman-120c90a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41679%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiManager&amp;severity=high&amp;id=6941947b9050fe8508060d63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25607-execute-unauthorized-code-or-comman-21dc9753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25607%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAnalyzer&amp;severity=high&amp;id=694194789050fe8508060cb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34992-execute-unauthorized-code-or-comman-c6cf1393</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34992%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiSIEM&amp;severity=critical&amp;id=694194799050fe8508060d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36556-escalation-of-privilege-in-fortinet-f4f3589a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36556%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiMail&amp;severity=high&amp;id=694194799050fe8508060d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41841-escalation-of-privilege-in-fortinet-ea25c594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41841%3A%20Escalation%20of%20privilege%20in%20Fortinet%20FortiOS&amp;severity=high&amp;id=6941947b9050fe8508060d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42788-execute-unauthorized-code-or-comman-8d443d76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42788%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiAnalyzer&amp;severity=high&amp;id=6941947b9050fe8508060d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30806-cwe-78-improper-neutralization-of-s-eb98dc12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30806%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sangfor%20Net-Gen%20Application%20Firewall&amp;severity=critical&amp;id=6921ce09746035ea799bd54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30805-cwe-78-improper-neutralization-of-s-ad06bf0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30805%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Sangfor%20Net-Gen%20Application%20Firewall&amp;severity=critical&amp;id=6929c9154121026312b544b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30804-cwe-200-exposure-of-sensitive-infor-58eb8d2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30804%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sangfor%20Net-Gen%20Application%20Firewall&amp;severity=medium&amp;id=6929c9154121026312b544b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30803-cwe-290-authentication-bypass-by-sp-c3ca1fe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30803%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20Sangfor%20Net-Gen%20Application%20Firewall&amp;severity=critical&amp;id=6929c9154121026312b544af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30802-cwe-540-inclusion-of-sensitive-info-38d90ff9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30802%3A%20CWE-540%3A%20Inclusion%20of%20Sensitive%20Information%20in%20Source%20Code%20in%20Sangfor%20Net-Gen%20Application%20Firewall&amp;severity=medium&amp;id=6929c9154121026312b544c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30801-cwe-1392-use-of-default-credentials-f59f2419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30801%3A%20CWE-1392%3A%20Use%20of%20Default%20Credentials%20in%20qBittorrent%20qBittorrent%20client&amp;severity=critical&amp;id=69209279b50ca2a0e366a94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4966-cwe-119-improper-restriction-of-oper-acdb5f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4966%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Citrix%20NetScaler%20ADC&amp;severity=critical&amp;id=68f7d9ae247d717aace267e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43788-out-of-bounds-read-c61c6c65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43788%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=690a5556a730e5a3d9d7a9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43787-heap-based-buffer-overflow-05230d8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43787%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=690a5556a730e5a3d9d7a9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43786-uncontrolled-resource-consumption-e4d6e078</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43786%3A%20Uncontrolled%20Resource%20Consumption&amp;severity=medium&amp;id=690a5556a730e5a3d9d7a9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43785-out-of-bounds-write-2087a1e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43785%3A%20Out-of-bounds%20Write&amp;severity=medium&amp;id=690a5556a730e5a3d9d7a9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44487-na-in-na-17f31c7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44487%3A%20n%2Fa&amp;severity=high&amp;id=68449e1071f4d251b5219735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-10-f12768</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa23-250a-multiple-nation-state-threat-actors-exploit-cve-2022-47966-and-cve-2022-42475-f0c283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA23-250A%3A%20Multiple%20Nation-State%20Threat%20Actors%20Exploit%20CVE-2022-47966%20and%20CVE-2022-42475&amp;severity=low&amp;id=682acdbebbaf20d303f0c283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43641-cwe-787-out-of-bounds-write-in-lipn-e3b23035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43641%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20lipnitsk%20libcue&amp;severity=high&amp;id=6941947b9050fe8508060d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39194-out-of-bounds-read-in-red-hat-red-h-7b44e8fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39194%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=low&amp;id=690d0327e0be3996723a127a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39193-out-of-bounds-read-in-red-hat-red-h-147c6bd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39193%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690d0b9008e329e0f8ef0d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39192-out-of-bounds-read-in-red-hat-red-h-0eb676b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39192%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690eefde44af18c3752cf592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39189-out-of-bounds-read-in-red-hat-red-h-09f02e81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39189%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690d0b9008e329e0f8ef0d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44821-na-270679f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44821%3A%20n%2Fa&amp;severity=null&amp;id=690a43a36d939959c8fde85a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-09-f128bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f128bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-08-f12dcb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-07-f12a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21266-elevation-of-privilege-in-google-android-bdc87f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21266%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d981fc4522896dcbdc87f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21244-elevation-of-privilege-in-google-android-bec549</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21244%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=medium&amp;id=682d9838c4522896dcbec549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45322-na-f035a5ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45322%3A%20n%2Fa&amp;severity=null&amp;id=69092145fe7723195e053fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-06-2b4e1d11</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-06&amp;severity=medium&amp;id=68359c9d5d5f0974d01f5ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-06-f1dcff</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-06&amp;severity=medium&amp;id=682acdc3bbaf20d303f1dcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-06-f12988</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41175-integer-overflow-or-wraparound-bec34c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41175%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=682d9838c4522896dcbec34c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40745-integer-overflow-or-wraparound-bec33d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40745%3A%20Integer%20Overflow%20or%20Wraparound&amp;severity=medium&amp;id=682d9838c4522896dcbec33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42755-out-of-bounds-read-in-red-hat-red-h-0841836e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42755%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690eefde44af18c3752cf59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42754-null-pointer-dereference-in-red-hat-29166fcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42754%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690d0b9008e329e0f8ef0d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5346-type-confusion-in-google-chrome-bec380</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5346%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9838c4522896dcbec380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45160-cwe-552-files-or-directories-accessible-to-external-parties-in-1e-1e-client-aeb18a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45160%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%201E%201E%20Client&amp;severity=high&amp;id=682cd0f71484d88663aeb18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-45159-cwe-59-improper-link-resolution-before-file-access-link-following-in-1e-1e-client-aeb188</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-45159%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%201E%201E%20Client&amp;severity=high&amp;id=682cd0f71484d88663aeb188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-05-f12f66</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-05&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39191-improper-input-validation-in-red-ha-b0f24836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39191%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=high&amp;id=690d0f9108e329e0f8f19b60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3576-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-red-hat-red-hat-enterprise-linux-9-bec97e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3576%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=682d9839c4522896dcbec97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3428-heap-based-buffer-overflow-in-red-ha-5d64b36b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3428%3A%20Heap-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e84755ba0e608b4faf9c29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42824-a-local-attacker-may-be-able-to-ele-a643f753</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42824%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.6.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9ad247d717aace22194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20101-use-of-hard-coded-credentials-in-ci-5f6a4426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20101%3A%20Use%20of%20Hard-coded%20Credentials%20in%20Cisco%20Cisco%20Emergency%20Responder&amp;severity=critical&amp;id=694194749050fe850806089a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3971-improper-neutralization-of-script-re-adb92fbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3971%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.3%20for%20RHEL%208&amp;severity=high&amp;id=68e8557bba0e608b4fb1ee74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4380-insertion-of-sensitive-information-i-bc690efb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4380%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.4%20for%20RHEL%208&amp;severity=medium&amp;id=68e8557bba0e608b4fb1eeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4237-exposure-of-sensitive-system-informa-1840e5b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4237%3A%20Exposure%20of%20Sensitive%20System%20Information%20to%20an%20Unauthorized%20Control%20Sphere%20in%20Red%20Hat%20Red%20Hat%20Ansible%20Automation%20Platform%202.4%20for%20RHEL%208&amp;severity=high&amp;id=68e8557bba0e608b4fb1eea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22515-basm-broken-authentication-session--7fc35c86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22515%3A%20BASM%20(Broken%20Authentication%20%26%20Session%20Management)%20in%20Atlassian%20Confluence%20Data%20Center&amp;severity=critical&amp;id=68f7d9a5247d717aace21806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4586-improper-input-validation-in-red-hat-092de73f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4586%3A%20Improper%20Input%20Validation%20in%20Red%20Hat%20Red%20Hat%20Data%20Grid%208.4.6&amp;severity=high&amp;id=68e84aedba0e608b4fb0439b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43261-n-a-in-n-a-bec90a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43261%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbec90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-04-f12229</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f12229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4911-heap-based-buffer-overflow-bed7e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4911%3A%20Heap-based%20Buffer%20Overflow&amp;severity=high&amp;id=682d983ac4522896dcbed7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4732-race-condition-within-a-thread-in-re-095dcc69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4732%3A%20Race%20Condition%20within%20a%20Thread%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e6688d5e259e903d8f09f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4886-exposure-of-sensitive-information-to-bbc79d03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4886%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Satellite%206.13%20for%20RHEL%208&amp;severity=medium&amp;id=68e84aedba0e608b4fb043a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-03-767766</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-03&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb767766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-03-f120d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f120d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5344-cwe-122-heap-based-buffer-overflow-i-84f4236c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5344%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=medium&amp;id=69092147fe7723195e05405c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43361-na-0d0be746</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43361%3A%20n%2Fa&amp;severity=null&amp;id=690a43a16d939959c8fde0af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-02-f12094</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f12094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4211-cwe-416-use-after-free-in-arm-ltd-mi-3ced2cab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4211%3A%20CWE-416%20Use%20after%20free%20in%20Arm%20Ltd%20Midgard%20GPU%20Kernel%20Driver&amp;severity=medium&amp;id=68f7d9ae247d717aace267a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-10-01-f1225f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-10-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f1225f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5207-cwe-250-execution-with-unnecessary-privileges-in-gitlab-gitlab-253faa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5207%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-30-f12ec1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3413-cwe-201-insertion-of-sensitive-information-into-sent-data-in-gitlab-gitlab-253f43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3413%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3922-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-gitlab-gitlab-253f6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3922%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5198-cwe-863-incorrect-authorization-in-gitlab-gitlab-253fa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5198%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0989-cwe-282-improper-ownership-management-in-gitlab-gitlab-253f09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0989%3A%20CWE-282%3A%20Improper%20Ownership%20Management%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2233-cwe-862-missing-authorization-in-gitlab-gitlab-253f24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2233%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3115-cwe-286-incorrect-user-management-in-gitlab-gitlab-253f28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3115%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3920-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3920%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3917-cwe-1287-improper-validation-of-specified-type-of-input-in-gitlab-gitlab-253f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3917%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3914-cwe-286-incorrect-user-management-in-gitlab-gitlab-253f64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3914%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3906-cwe-1287-improper-validation-of-specified-type-of-input-in-gitlab-gitlab-253f53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3906%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3979-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3979%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4532-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4532%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-44270-na-cefc63b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-44270%3A%20n%2Fa&amp;severity=null&amp;id=69092635fe7723195e0b61da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-29-e6713c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-29&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e6713c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-29-f12a2f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5217-heap-buffer-overflow-in-google-chrom-17e17419</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5217%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9af247d717aace26806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42756-concurrent-execution-using-shared-r-06f7fe50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42756%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=690d0b9008e329e0f8ef0d8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5215-improper-handling-of-unexpected-data-62c4daef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5215%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-28-f26c4d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-28&amp;severity=medium&amp;id=682acdc4bbaf20d303f26c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-28-f12d4d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4066-cleartext-storage-in-a-file-or-on-di-5519fce9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4066%3A%20Cleartext%20Storage%20in%20a%20File%20or%20on%20Disk%20in%20Red%20Hat%20RHEL-8%20based%20Middleware%20Containers&amp;severity=medium&amp;id=68e8557bba0e608b4fb1ee94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42822-cwe-125-out-of-bounds-read-in-neutr-2facc901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42822%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=690904ac00ff46172d4a0d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20109-out-of-bounds-write-in-cisco-ios-6e7ee89e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20109%3A%20Out-of-bounds%20Write%20in%20Cisco%20IOS&amp;severity=medium&amp;id=68f7d9a4247d717aace216ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20186-improper-authorization-in-cisco-ios-340fb40f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20186%3A%20Improper%20Authorization%20in%20Cisco%20IOS&amp;severity=high&amp;id=694194769050fe85080608b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20231-improper-neutralization-of-special--daf37ee4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20231%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Cisco%20Cisco%20IOS%20XE%20Software&amp;severity=high&amp;id=694194769050fe85080608b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20252-missing-authorization-in-cisco-cisc-ae47e0bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20252%3A%20Missing%20Authorization%20in%20Cisco%20Cisco%20SD-WAN%20vManage&amp;severity=critical&amp;id=694194769050fe85080608c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20254-vulnerability-in-cisco-cisco-sd-wan-67459106</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20254%3A%20Vulnerability%20in%20Cisco%20Cisco%20SD-WAN%20vManage&amp;severity=high&amp;id=694194789050fe8508060c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40044-cwe-502-deserialization-of-untruste-a68ddb26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40044%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Progress%20Software%20Corporation%20WS_FTP%20Server&amp;severity=critical&amp;id=68f7d9ac247d717aace2212a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5175-use-after-free-of-imagebitmap-during-process-shutdown-in-mozilla-firefox-bec370</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5175%3A%20Use-after-free%20of%20ImageBitmap%20during%20process%20shutdown%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d9838c4522896dcbec370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5172-memory-corruption-in-ion-hints-in-mozilla-firefox-bec820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5172%3A%20Memory%20Corruption%20in%20Ion%20Hints%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d9839c4522896dcbec820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5176-memory-safety-bugs-fixed-in-firefox-118-firefox-esr-115-3-and-thunderbird-115-3-in-mozilla-firefox-bec83f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5176%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20118%2C%20Firefox%20ESR%20115.3%2C%20and%20Thunderbird%20115.3%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d9839c4522896dcbec83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5174-double-free-in-process-spawning-on-windows-in-mozilla-firefox-bdc8da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5174%3A%20Double-free%20in%20process%20spawning%20on%20Windows%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d981fc4522896dcbdc8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5168-out-of-bounds-write-in-filternoded2d1-in-mozilla-firefox-bec36c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5168%3A%20Out-of-bounds%20write%20in%20FilterNodeD2D1%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d9838c4522896dcbec36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-27-75b88a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-27&amp;severity=medium&amp;id=682c7abee3e6de8ceb75b88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-27-f12cb2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40402-an-app-may-be-able-to-access-sensit-77951841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40402%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40455-a-sandboxed-process-may-be-able-to-circumvent-sandbox-restrictions-in-apple-macos-bebd4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40455%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d9838c4522896dcbebd4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32361-an-app-may-be-able-to-access-user-s-5a2dfb01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32361%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53212a90255b94da6000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41073-an-app-may-be-able-to-access-protec-d41502ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41073%3A%20An%20app%20may%20be%20able%20to%20access%20protected%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32377-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bdc883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32377%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40418-an-apple-watch-ultra-may-not-lock-when-using-the-depth-app-in-apple-watchos-bdc8ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40418%3A%20An%20Apple%20Watch%20Ultra%20may%20not%20lock%20when%20using%20the%20Depth%20app%20in%20Apple%20watchOS&amp;severity=medium&amp;id=682d981fc4522896dcbdc8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41065-an-app-may-be-able-to-read-sensitiv-024e34d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41065%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40434-an-app-may-be-able-to-access-a-user-ed6fcbc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40434%3A%20An%20app%20may%20be%20able%20to%20access%20a%20user&apos;s%20Photos%20Library%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5544a730e5a3d9d766f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40422-an-app-may-be-able-to-cause-a-denia-3ec7ca87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40422%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5542a730e5a3d9d76212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41232-an-app-may-be-able-to-disclose-kern-18aa706b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41232%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40435-an-app-may-be-able-to-access-app-st-3d908b86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40435%3A%20An%20app%20may%20be%20able%20to%20access%20App%20Store%20credentials%20in%20Apple%20Xcode&amp;severity=null&amp;id=690a5544a730e5a3d9d766fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40419-an-app-may-be-able-to-gain-elevated-privileges-in-apple-ios-and-ipados-bdc8b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40419%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40399-an-app-may-be-able-to-disclose-kern-9f77bfff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40399%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41984-an-app-may-be-able-to-execute-arbit-367f2f3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41984%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5549a730e5a3d9d771ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41068-a-user-may-be-able-to-elevate-privileges-in-apple-ios-and-ipados-bdc8ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41068%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40454-an-app-may-be-able-to-delete-files--56ed60e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40454%3A%20An%20app%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40403-processing-web-content-may-disclose-6eb1da78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40403%3A%20Processing%20web%20content%20may%20disclose%20sensitive%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=6908f50bf612d110fe9cbe46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40395-an-app-may-be-able-to-access-contac-4ae0db98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40395%3A%20An%20app%20may%20be%20able%20to%20access%20contacts%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53282a90255b94da6783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29497-an-app-may-be-able-to-access-calend-e61527d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29497%3A%20An%20app%20may%20be%20able%20to%20access%20calendar%20data%20saved%20to%20a%20temporary%20directory%20in%20Apple%20macOS&amp;severity=null&amp;id=690a531f2a90255b94da5f8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41063-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bdc8c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41063%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40388-safari-may-save-photos-to-an-unprot-41d60eb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40388%3A%20Safari%20may%20save%20photos%20to%20an%20unprotected%20location%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53272a90255b94da6763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40520-an-app-may-be-able-to-access-edited-c2e49571</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40520%3A%20An%20app%20may%20be%20able%20to%20access%20edited%20photos%20saved%20to%20a%20temporary%20directory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40432-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bdc873</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40432%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38615-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bdc869</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38615%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40424-an-app-may-be-able-to-access-user-s-60314878</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40424%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5542a730e5a3d9d76218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41995-an-app-may-be-able-to-execute-arbit-76d12018</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41995%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a554ba730e5a3d9d779bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41079-an-app-may-be-able-to-bypass-privac-770b90ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41079%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76f15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40541-a-shortcut-may-output-sensitive-use-d8d80124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40541%3A%20A%20shortcut%20may%20output%20sensitive%20user%20data%20without%20consent%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40384-an-app-may-be-able-to-read-sensitiv-32f1a2da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40384%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53272a90255b94da6753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40412-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bdc86f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40412%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc86f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39233-processing-web-content-may-disclose-74225cb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39233%3A%20Processing%20web%20content%20may%20disclose%20sensitive%20information%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53272a90255b94da673e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35990-an-app-may-be-able-to-identify-what-e203b3d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35990%3A%20An%20app%20may%20be%20able%20to%20identify%20what%20other%20apps%20a%20user%20has%20installed%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53252a90255b94da66f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40428-an-app-may-be-able-to-access-sensit-72fd7bc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40428%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5544a730e5a3d9d766db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40429-an-app-may-be-able-to-access-sensit-a4106939</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40429%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5544a730e5a3d9d766e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39434-processing-web-content-may-lead-to-arbitrary-code-execution-in-apple-ios-and-ipados-bebdba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39434%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d9838c4522896dcbebdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40452-an-app-may-be-able-to-overwrite-arb-11ec308a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40452%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41078-an-app-may-be-able-to-bypass-certai-988f0418</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41078%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40448-a-remote-attacker-may-be-able-to-br-9c7a756b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40448%3A%20A%20remote%20attacker%20may%20be%20able%20to%20break%20out%20of%20Web%20Content%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40409-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bdc826</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40409%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40426-an-app-may-be-able-to-bypass-certai-3eeafebe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40426%3A%20An%20app%20may%20be%20able%20to%20bypass%20certain%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5544a730e5a3d9d766c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37448-a-user-may-be-able-to-view-restrict-ef462904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37448%3A%20A%20user%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53252a90255b94da6701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38586-a-sandboxed-process-may-be-able-to-circumvent-sandbox-restrictions-in-apple-macos-bdc801</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38586%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d981fc4522896dcbdc801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35984-an-attacker-in-physical-proximity-c-4eac038f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35984%3A%20An%20attacker%20in%20physical%20proximity%20can%20cause%20a%20limited%20out%20of%20bounds%20write%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53252a90255b94da66e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40410-an-app-may-be-able-to-disclose-kern-0697fb3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40410%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40386-an-app-may-be-able-to-access-notes--a5ce1016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40386%3A%20An%20app%20may%20be%20able%20to%20access%20Notes%20attachments%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53272a90255b94da675e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41981-an-attacker-that-has-already-achiev-fb9a63a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41981%3A%20An%20attacker%20that%20has%20already%20achieved%20kernel%20code%20execution%20may%20be%20able%20to%20bypass%20kernel%20memory%20mitigations%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5549a730e5a3d9d7719a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40406-an-app-may-be-able-to-read-arbitrar-ef94d0db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40406%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40391-an-app-may-be-able-to-disclose-kern-afda98cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40391%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53282a90255b94da6776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41979-an-app-may-be-able-to-modify-protec-b8d23023</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41979%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5549a730e5a3d9d7718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41996-apps-that-fail-verification-checks--77ce1fae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41996%3A%20Apps%20that%20fail%20verification%20checks%20may%20still%20launch%20in%20Apple%20macOS&amp;severity=null&amp;id=690a554ba730e5a3d9d779c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40407-a-remote-attacker-may-be-able-to-ca-7ea9df37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40407%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40450-an-app-may-bypass-gatekeeper-checks-3482bf77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40450%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41980-an-app-may-be-able-to-bypass-privac-d1b6ab50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41980%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5549a730e5a3d9d77192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40431-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bdc837</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40431%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40427-an-app-may-be-able-to-read-sensitiv-a9fadb0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40427%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5544a730e5a3d9d766c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32396-an-app-may-be-able-to-gain-elevated-privileges-in-apple-ios-and-ipados-bdc7f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32396%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc7f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41968-an-app-may-be-able-to-read-arbitrar-c215bc03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41968%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5549a730e5a3d9d77176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23495-an-app-may-be-able-to-access-sensit-f05ca958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23495%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20data%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53132a90255b94da5753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40441-processing-web-content-may-lead-to--9a9be62a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40441%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5544a730e5a3d9d7670a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40400-a-remote-user-may-cause-an-unexpected-app-termination-or-arbitrary-code-execution-in-apple-ios-and-ipados-bdc81e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40400%3A%20A%20remote%20user%20may%20cause%20an%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=critical&amp;id=682d981fc4522896dcbdc81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38596-an-app-may-fail-to-enforce-app-tran-1bc0ad66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38596%3A%20An%20app%20may%20fail%20to%20enforce%20App%20Transport%20Security%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a53252a90255b94da6706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40420-processing-web-content-may-lead-to--d91cebe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40420%3A%20Processing%20web%20content%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40436-an-attacker-may-be-able-to-cause-un-2c818516</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40436%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20read%20kernel%20memory%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5544a730e5a3d9d766ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35074-processing-web-content-may-lead-to-arbitrary-code-execution-in-apple-ios-and-ipados-bdc7f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35074%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41067-an-app-may-bypass-gatekeeper-checks-b4500117</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41067%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41071-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bdc83b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41071%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981fc4522896dcbdc83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41070-an-app-may-be-able-to-access-sensit-dfb6ba21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41070%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20data%20logged%20when%20a%20user%20shares%20a%20link%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41174-an-app-may-be-able-to-execute-arbit-dfc4c272</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41174%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41066-an-app-may-be-able-to-unexpectedly--47f5d88a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41066%3A%20An%20app%20may%20be%20able%20to%20unexpectedly%20leak%20a%20user&apos;s%20credentials%20from%20secure%20text%20fields%20in%20Apple%20macOS&amp;severity=null&amp;id=690a5547a730e5a3d9d76edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32421-an-app-may-be-able-to-observe-unpro-7427f034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32421%3A%20An%20app%20may%20be%20able%20to%20observe%20unprotected%20user%20data%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53212a90255b94da6014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40456-an-app-may-be-able-to-access-edited-ca165828</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40456%3A%20An%20app%20may%20be%20able%20to%20access%20edited%20photos%20saved%20to%20a%20temporary%20directory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5546a730e5a3d9d76d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41986-an-app-may-be-able-to-modify-protec-39dbd189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41986%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5549a730e5a3d9d771c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40417-visiting-a-website-that-frames-mali-f2c38ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40417%3A%20Visiting%20a%20website%20that%20frames%20malicious%20content%20may%20lead%20to%20UI%20spoofing%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=null&amp;id=690a5542a730e5a3d9d761ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36851-cwe-306-missing-authentication-for--c94b12bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36851%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68f7d9ab247d717aace220cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32541-cwe-416-use-after-free-in-hancom-ha-5e8f47cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32541%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Hancom%20Hancom%20Office%202020&amp;severity=high&amp;id=690a53212a90255b94da6019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5157-uncontrolled-resource-consumption-in-0ec48e59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5157%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=68e0f3c1b66c7f7acdd3e93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4065-improper-output-neutralization-for-l-c3a65f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4065%3A%20Improper%20Output%20Neutralization%20for%20Logs%20in%20Red%20Hat%20RHEL-8%20based%20Middleware%20Containers&amp;severity=medium&amp;id=68e8557bba0e608b4fb1ee8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-26-f12214</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-42753-out-of-bounds-write-in-red-hat-red--7d7a4bae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-42753%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=high&amp;id=690d0f9108e329e0f8f19b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4476-cwe-79-cross-site-scripting-xss-in-unknown-locatoraid-store-locator-bf5298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4476%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Locatoraid%20Store%20Locator&amp;severity=medium&amp;id=682d9846c4522896dcbf5298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3547-cwe-352-cross-site-request-forgery-csrf-in-unknown-all-in-one-b2b-for-woocommerce-bf512e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3547%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20All%20in%20One%20B2B%20for%20WooCommerce&amp;severity=high&amp;id=682d9846c4522896dcbf512e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4502-cwe-79-cross-site-scripting-xss-in-unknown-translate-wordpress-with-gtranslate-bebe8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4502%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Translate%20WordPress%20with%20GTranslate&amp;severity=medium&amp;id=682d9838c4522896dcbebe8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4148-cwe-79-cross-site-scripting-xss-in-unknown-ditty-beca42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4148%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Ditty&amp;severity=medium&amp;id=682d9839c4522896dcbeca42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4631-cwe-290-authentication-bypass-by-spoofing-in-unknown-dologin-security-bf52b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4631%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Unknown%20DoLogin%20Security&amp;severity=medium&amp;id=682d9846c4522896dcbf52b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4521-cwe-94-improper-control-of-generation-of-code-code-injection-in-unknown-import-xml-and-rss-feeds-bf52a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4521%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20Import%20XML%20and%20RSS%20Feeds&amp;severity=critical&amp;id=682d9846c4522896dcbf52a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4281-cwe-290-authentication-bypass-by-spoofing-in-unknown-activity-log-bf523f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4281%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Unknown%20Activity%20Log&amp;severity=medium&amp;id=682d9846c4522896dcbf523f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4238-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-prevent-files-folders-access-bf5eca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4238%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Prevent%20files%20%2F%20folders%20access&amp;severity=high&amp;id=682d9848c4522896dcbf5eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4490-cwe-89-sql-injection-in-unknown-wp-job-portal-bf529c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4490%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20Job%20Portal&amp;severity=critical&amp;id=682d9846c4522896dcbf529c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4300-cwe-94-improper-control-of-generation-of-code-code-injection-in-unknown-import-xml-and-rss-feeds-bf524f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4300%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20Import%20XML%20and%20RSS%20Feeds&amp;severity=high&amp;id=682d9846c4522896dcbf524f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5156-missing-release-of-memory-after-effe-b42b7a5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5156%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=high&amp;id=691f519438b88f02b51baaef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28393-cwe-121-stack-based-buffer-overflow-7418901a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28393%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Accusoft%20ImageGear&amp;severity=medium&amp;id=690a531e2a90255b94da5f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32614-cwe-124-buffer-underwrite-buffer-un-0061dbb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32614%3A%20CWE-124%3A%20Buffer%20Underwrite%20(&apos;Buffer%20Underflow&apos;)%20in%20Accusoft%20ImageGear&amp;severity=high&amp;id=690a53212a90255b94da601d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32284-cwe-119-improper-restriction-of-ope-32f46563</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32284%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Accusoft%20ImageGear&amp;severity=high&amp;id=690a53202a90255b94da5ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35002-cwe-119-improper-restriction-of-ope-03061e59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35002%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Accusoft%20ImageGear&amp;severity=critical&amp;id=690a53242a90255b94da667e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32653-cwe-191-integer-underflow-wrap-or-w-47bdb61b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32653%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Accusoft%20ImageGear&amp;severity=critical&amp;id=690a53222a90255b94da6642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39453-cwe-416-use-after-free-in-accusoft--c07d8e12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39453%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Accusoft%20ImageGear&amp;severity=critical&amp;id=690a53272a90255b94da6743</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40163-cwe-787-out-of-bounds-write-in-accu-9a65a7e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40163%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Accusoft%20ImageGear&amp;severity=critical&amp;id=690a53272a90255b94da674b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41419-na-5e679f8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41419%3A%20n%2Fa&amp;severity=null&amp;id=6924fa182a08b12b0e784288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-09-25-88b16b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-09-25&amp;severity=medium&amp;id=682b68f9d14de609c888b16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-25-f269e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-25&amp;severity=medium&amp;id=682acdc4bbaf20d303f269e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-25-f1252c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f1252c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-24-f12dea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-23-f1209e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f1209e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43770-na-791af3d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43770%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9ae247d717aace25de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-22-ea7021</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-22&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea7021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-22-f1211a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f1211a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4504-cwe-122-heap-based-buffer-overflow-in-openprinting-cups-bf52a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4504%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20OpenPrinting%20CUPS&amp;severity=high&amp;id=682d9846c4522896dcbf52a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41993-processing-web-content-may-lead-to--ed6c1a0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41993%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9ad247d717aace22183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41992-a-local-attacker-may-be-able-to-ele-73503f9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41992%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9ad247d717aace2217d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41991-a-malicious-app-may-be-able-to-bypa-d00659b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41991%3A%20A%20malicious%20app%20may%20be%20able%20to%20bypass%20signature%20validation.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20before%20iOS%2016.7.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=68f7d9ad247d717aace22178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-21-f12012</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f12012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-43496-vulnerability-in-jenkins-project-jenkins-bebf85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-43496%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins&amp;severity=high&amp;id=682d9838c4522896dcbebf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3341-vulnerability-in-isc-bind-9-63389257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3341%3A%20Vulnerability%20in%20ISC%20BIND%209&amp;severity=high&amp;id=692f4a55c92f9eed9384cee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4853-improper-neutralization-of-input-lea-f159a07d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4853%3A%20Improper%20Neutralization%20of%20Input%20Leaders%20in%20Red%20Hat%20Openshift%20Serverless%201%20on%20RHEL%208&amp;severity=high&amp;id=68e7a239ba0e608b4f980f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-20-f12568</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f12568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2995-cwe-79-cross-site-scripting-xss-in-unknown-leyka-bf5102</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2995%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Leyka&amp;severity=medium&amp;id=682d9846c4522896dcbf5102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4376-cwe-79-cross-site-scripting-xss-in-unknown-serial-codes-generator-and-validator-with-woocommerce-support-bf5279</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4376%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Serial%20Codes%20Generator%20and%20Validator%20with%20WooCommerce%20Support&amp;severity=medium&amp;id=682d9846c4522896dcbf5279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41179-vulnerability-in-trend-micro-inc-tr-a10c40f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41179%3A%20Vulnerability%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=68f7d9ad247d717aace22159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5009-cwe-863-incorrect-authorization-in-gitlab-gitlab-253fa4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5009%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=critical&amp;id=682ea68a0acd01a249253fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-19-f127a6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f127a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4806-use-after-free-in-red-hat-red-hat-enterprise-linux-8-bed779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4806%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=682d983ac4522896dcbed779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4527-stack-based-buffer-overflow-in-red-h-1d111dfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4527%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=691f5eeb11cb603d890ffb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-18-f1298c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f1298c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-17-f12a9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-16-f12871</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36562-cwe-416-use-after-free-in-microsoft-104bf928</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36562%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=high&amp;id=6903adc2aebfcd54748fc6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36727-spoofing-in-microsoft-microsoft-edg-2b19ee5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36727%3A%20Spoofing%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36735-cwe-416-use-after-free-in-microsoft-306b17f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36735%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Microsoft%20Edge%20(Chromium-based)&amp;severity=critical&amp;id=6903adc2aebfcd54748fc6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4959-cross-site-request-forgery-csrf-in-r-b7cc1e28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4959%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=68e84aedba0e608b4fb043aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-15-f13182</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f13182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29499-uncontrolled-resource-consumption-i-2ba79150</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29499%3A%20Uncontrolled%20Resource%20Consumption%20in%20glib2&amp;severity=medium&amp;id=69441d2c4eb3efac36942101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38205-improper-access-control-cwe-284-in--db23a9be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38205%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68f7d9ac247d717aace22102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-14-f12003</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20236-improper-verification-of-cryptograp-f203ffe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20236%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=694194769050fe85080608ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20135-improper-verification-of-cryptograp-05c7a75b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20135%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Cisco%20Cisco%20IOS%20XR%20Software&amp;severity=medium&amp;id=694194769050fe85080608a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3255-loop-with-unreachable-exit-condition-a363da91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3255%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68f27d809c34d0947f370aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39916-cwe-35-path-traversal-in-nlnet-labs-12ee805b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39916%3A%20CWE-35%3A%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20NLnet%20Labs%20Routinator&amp;severity=critical&amp;id=68e0f3bdb66c7f7acdd3cbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3935-cwe-787-out-of-bounds-write-in-wibu-codemeter-runtime-bed0dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3935%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Wibu%20CodeMeter%20Runtime&amp;severity=critical&amp;id=682d983ac4522896dcbed0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29183-execute-unauthorized-code-or-comman-c47b13f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29183%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiProxy&amp;severity=high&amp;id=694194789050fe8508060cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34984-execute-unauthorized-code-or-comman-80bcc1dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34984%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiWeb&amp;severity=high&amp;id=694194799050fe8508060d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26369-out-of-bounds-write-cwe-787-in-adob-f8bdbab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26369%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=68f7d9a7247d717aace218cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-13-74d143</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-13&amp;severity=medium&amp;id=682c7abbe3e6de8ceb74d143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-13-f12060</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4813-use-after-free-in-red-hat-red-hat-enterprise-linux-8-bed77f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4813%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=682d983ac4522896dcbed77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36739-cwe-122-heap-based-buffer-overflow--47978163</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36739%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%203D%20Viewer&amp;severity=high&amp;id=6903adc2aebfcd54748fc700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36740-cwe-122-heap-based-buffer-overflow--7443159e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36740%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%203D%20Viewer&amp;severity=high&amp;id=6903adc3aebfcd54748fc70d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36760-cwe-416-use-after-free-in-microsoft-dd06850a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36760%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%203D%20Viewer&amp;severity=high&amp;id=6903adc3aebfcd54748fc725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36761-cwe-20-improper-input-validation-in-0c58ab9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36761%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=68f7d9aa247d717aace21f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36762-cwe-20-improper-input-validation-in-9819e85f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36762%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=6903adc3aebfcd54748fc728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36763-cwe-200-exposure-of-sensitive-infor-d0ee9e11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36763%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=6903adc5aebfcd54748fc7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36764-cwe-73-external-control-of-file-nam-e1d7a102</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36764%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=6903adc5aebfcd54748fc7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36770-cwe-122-heap-based-buffer-overflow--bd939a7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36770%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%203D%20Builder&amp;severity=high&amp;id=6903adc5aebfcd54748fc7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36771-cwe-122-heap-based-buffer-overflow--2556294c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36771%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%203D%20Builder&amp;severity=high&amp;id=6903adc5aebfcd54748fc7c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36772-cwe-122-heap-based-buffer-overflow--bb63c206</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36772%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%203D%20Builder&amp;severity=high&amp;id=6903adc5aebfcd54748fc7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36773-cwe-126-buffer-over-read-in-microso-1666f5a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36773%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%203D%20Builder&amp;severity=high&amp;id=6903adc5aebfcd54748fc7cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36777-cwe-502-deserialization-of-untruste-ff1ee041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36777%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%2012&amp;severity=medium&amp;id=6903adc5aebfcd54748fc7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36788-remote-code-execution-in-microsoft--1992cccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36788%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20.NET%20Framework%203.5%20AND%204.8&amp;severity=high&amp;id=6903adc7aebfcd54748fc7ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36792-cwe-190-integer-overflow-or-wraparo-3176108c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36792%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=6903adc7aebfcd54748fc7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36793-cwe-122-heap-based-buffer-overflow--06fa1beb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36793%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=6903adc7aebfcd54748fc7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36794-cwe-191-integer-underflow-wrap-or-w-fadd6995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36794%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=6903adc7aebfcd54748fc7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36796-cwe-191-integer-underflow-wrap-or-w-938b6b94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36796%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.6&amp;severity=high&amp;id=6903adc7aebfcd54748fc7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36799-cwe-400-uncontrolled-resource-consu-d422b663</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36799%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20.NET%206.0&amp;severity=medium&amp;id=6903adc7aebfcd54748fc7f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36800-cwe-79-improper-neutralization-of-i-ac35ffa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36800%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Dynamics%20365%20for%20Finance%20and%20Operations&amp;severity=high&amp;id=6903adc7aebfcd54748fc7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38155-cwe-502-deserialization-of-untruste-9e914918</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38155%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Azure%20DevOps%20Server%202019.0.1&amp;severity=high&amp;id=6903adcaaebfcd54748fc86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38160-cwe-416-use-after-free-in-microsoft-5f708274</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38160%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=6903adcaaebfcd54748fc871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38163-security-feature-bypass-in-microsof-bf50accf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38163%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20Defender%20Security%20Intelligence%20Updates&amp;severity=high&amp;id=6903adcaaebfcd54748fc87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38164-cwe-79-improper-neutralization-of-i-260ff557</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38164%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=6903adccaebfcd54748fc900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36886-cwe-79-improper-neutralization-of-i-e13f12a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36886%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Microsoft%20Microsoft%20Dynamics%20365%20(on-premises)%20version%209.1&amp;severity=high&amp;id=6903adc8aebfcd54748fc826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33136-cwe-77-improper-neutralization-of-s-c1965892</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33136%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Azure%20DevOps%20Server%202020.0.2&amp;severity=high&amp;id=6903adc2aebfcd54748fc6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29332-cwe-330-use-of-insufficiently-rando-7df692b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29332%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Microsoft%20Azure%20Kubernetes%20Service&amp;severity=high&amp;id=6903adc2aebfcd54748fc6e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41764-cwe-347-improper-verification-of-cr-c970a96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41764%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=6903adccaebfcd54748fc903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36736-cwe-502-deserialization-of-untruste-98c29a76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36736%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Identity%20Linux%20Broker&amp;severity=medium&amp;id=6903adc2aebfcd54748fc6fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36742-remote-code-execution-in-microsoft--f5160799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36742%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Visual%20Studio%20Code&amp;severity=high&amp;id=6903adc3aebfcd54748fc710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36744-cwe-502-deserialization-of-untruste-a036333a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36744%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%2012&amp;severity=high&amp;id=6903adc3aebfcd54748fc713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36745-cwe-502-deserialization-of-untruste-8c3a0ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36745%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%2013&amp;severity=high&amp;id=6903adc3aebfcd54748fc716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36756-cwe-502-deserialization-of-untruste-f88100d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36756%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=6903adc3aebfcd54748fc719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36757-cwe-502-deserialization-of-untruste-ba8ece05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36757%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=high&amp;id=6903adc3aebfcd54748fc71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36758-cwe-59-improper-link-resolution-bef-91e3a15e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36758%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.7&amp;severity=high&amp;id=6903adc3aebfcd54748fc71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36759-cwe-822-untrusted-pointer-dereferen-ec03180e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36759%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Microsoft%20Visual%20Studio%202022%20version%2017.2&amp;severity=medium&amp;id=6903adc3aebfcd54748fc722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36765-elevation-of-privilege-in-microsoft-f5f17be7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36765%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=6903adc5aebfcd54748fc7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36766-cwe-125-out-of-bounds-read-in-micro-504a51df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36766%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=6903adc5aebfcd54748fc7b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36767-cwe-20-improper-input-validation-in-55f62261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36767%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=medium&amp;id=6903adc5aebfcd54748fc7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36801-cwe-126-buffer-over-read-in-microso-af93de4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36801%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=6903adc7aebfcd54748fc7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36802-cwe-416-use-after-free-in-microsoft-c5ec4bc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36802%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9aa247d717aace21f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36803-cwe-126-buffer-over-read-in-microso-bf297318</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36803%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=6903adc7aebfcd54748fc802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36804-cwe-416-use-after-free-in-microsoft-965fef16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36804%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc7aebfcd54748fc806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36805-cwe-77-improper-neutralization-of-s-ffb80870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36805%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38139-cwe-416-use-after-free-in-microsoft-0ad6e002</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38139%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38140-cwe-908-use-of-uninitialized-resour-4ff7e9fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38140%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=6903adc8aebfcd54748fc82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38141-cwe-367-time-of-check-time-of-use-t-ace069d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38141%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38142-cwe-190-integer-overflow-or-wraparo-35fd009d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38142%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38143-cwe-122-heap-based-buffer-overflow--f9df654b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38143%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38144-cwe-126-buffer-over-read-in-microso-ae205871</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38144%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38146-cwe-367-time-of-check-time-of-use-t-6c6d4e71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38146%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=6903adc8aebfcd54748fc83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38147-cwe-122-heap-based-buffer-overflow--60cea209</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38147%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc8aebfcd54748fc843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38148-cwe-121-stack-based-buffer-overflow-b19b217e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38148%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%20Server%202022&amp;severity=high&amp;id=6903adcaaebfcd54748fc85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38149-cwe-400-uncontrolled-resource-consu-4b27b09e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38149%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adcaaebfcd54748fc862</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38150-cwe-190-integer-overflow-or-wraparo-b97777dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38150%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Windows%2011%20version%2021H2&amp;severity=high&amp;id=6903adcaaebfcd54748fc865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38152-cwe-126-buffer-over-read-in-microso-da6b1277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38152%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Microsoft%20Windows%20Server%202019&amp;severity=medium&amp;id=6903adcaaebfcd54748fc868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38156-cwe-20-improper-input-validation-in-c2471e91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38156%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Microsoft%20Azure%20HDInsight&amp;severity=high&amp;id=6903adcaaebfcd54748fc86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38161-cwe-416-use-after-free-in-microsoft-8b13623f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38161%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adcaaebfcd54748fc874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38162-cwe-191-integer-underflow-wrap-or-w-298d148d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38162%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Microsoft%20Windows%20Server%202019&amp;severity=high&amp;id=6903adcaaebfcd54748fc877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35355-cwe-121-stack-based-buffer-overflow-ddfadecc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35355%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6903adc2aebfcd54748fc6ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4863-heap-buffer-overflow-in-google-chrom-73915faa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4863%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9ae247d717aace267b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28831-cwe-190-integer-overflow-or-wraparo-3f6d9058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28831%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Siemens%20SIMATIC%20BRAUMAT&amp;severity=high&amp;id=6913a08cf4d5bbdab5b1c776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32558-vulnerability-in-nodejs-node-bed55f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32558%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed55f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32005-vulnerability-in-nodejs-node-bdcab7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32005%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d981fc4522896dcbdcab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-12-f12a2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41990-processing-a-font-file-may-lead-to--6b5d48c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41990%3A%20Processing%20a%20font%20file%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20released%20before%20iOS%2015.7.1.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9ad247d717aace2216e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35682-elevation-of-privilege-in-google-android-bdc7fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35682%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d981fc4522896dcbdc7fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35674-elevation-of-privilege-in-google-an-7dbcf1a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35674%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=68f7d9aa247d717aace21f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35670-elevation-of-privilege-in-google-android-bebe7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35670%3A%20Elevation%20of%20privilege%20in%20Google%20Android&amp;severity=high&amp;id=682d9838c4522896dcbebe7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4294-cwe-79-cross-site-scripting-xss-in-unknown-url-shortify-bebdd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4294%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20URL%20Shortify&amp;severity=medium&amp;id=682d9838c4522896dcbebdd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4278-cwe-269-improper-privilege-management-in-unknown-masterstudy-lms-wordpress-plugin-bf522c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4278%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Unknown%20MasterStudy%20LMS%20WordPress%20Plugin&amp;severity=high&amp;id=682d9846c4522896dcbf522c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4060-cwe-79-cross-site-scripting-xss-in-unknown-wp-adminify-bf51de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4060%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Adminify&amp;severity=medium&amp;id=682d9846c4522896dcbf51de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4314-cwe-502-deserialization-of-untrusted-data-in-unknown-wpdatatables-bf5257</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4314%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20wpDataTables&amp;severity=high&amp;id=682d9846c4522896dcbf5257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4022-cwe-79-cross-site-scripting-xss-in-unknown-herd-effects-bf51d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4022%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Herd%20Effects&amp;severity=medium&amp;id=682d9846c4522896dcbf51d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4318-cwe-352-cross-site-request-forgery-csrf-in-unknown-herd-effects-bf525b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4318%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Herd%20Effects&amp;severity=medium&amp;id=682d9846c4522896dcbf525b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4270-cwe-79-cross-site-scripting-xss-in-unknown-min-max-control-bebe87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4270%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Min%20Max%20Control&amp;severity=medium&amp;id=682d9838c4522896dcbebe87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4307-cwe-352-cross-site-request-forgery-csrf-in-unknown-lock-user-account-bf5253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4307%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Lock%20User%20Account&amp;severity=medium&amp;id=682d9846c4522896dcbf5253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4585-vulnerability-in-mozilla-firefox-cc858e77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4585%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69441d2f4eb3efac36942195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4584-vulnerability-in-mozilla-firefox-8f70b867</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4584%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2f4eb3efac3694218d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4583-vulnerability-in-mozilla-firefox-3ad71d2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4583%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69441d2d4eb3efac36942170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4582-vulnerability-in-mozilla-firefox-1c1d515c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4582%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69441d2d4eb3efac3694216a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4581-vulnerability-in-mozilla-firefox-5f362759</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4581%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac36942162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4580-vulnerability-in-mozilla-firefox-7431d9f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4580%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac3694215c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4579-vulnerability-in-mozilla-firefox-106e9fec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4579%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac36942157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4578-vulnerability-in-mozilla-firefox-d749c43f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4578%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac36942151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4577-vulnerability-in-mozilla-firefox-dab7ecd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4577%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac3694214b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4576-vulnerability-in-mozilla-firefox-c12e59dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4576%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac36942143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4575-vulnerability-in-mozilla-firefox-05a33217</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4575%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac3694213b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4574-vulnerability-in-mozilla-firefox-6367a336</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4574%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2d4eb3efac36942133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4573-vulnerability-in-mozilla-firefox-a9bf1d01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4573%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2c4eb3efac36942121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41103-na-in-na-a061fab4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41103%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b73038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38743-n-a-in-n-a-bdc816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38743%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39780-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-asus-rt-ax55-aebda0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39780%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20ASUS%20RT-AX55&amp;severity=high&amp;id=682cd0f91484d88663aebda0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-11-f12039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spyware-telegram-mod-distributed-via-google-play-evil-telegram-doppelganger-attacks-chinese-users-f0c281</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spyware%20Telegram%20mod%20distributed%20via%20Google%20Play%20-%20Evil%20Telegram%20doppelganger%20attacks%20Chinese%20users&amp;severity=low&amp;id=682acdbebbaf20d303f0c281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-10-f1206f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f1206f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-09-f12438</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4807-cwe-440-expected-behavior-violation-in-openssl-openssl-bed14e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4807%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d983ac4522896dcbed14e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-08-0359447b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-08&amp;severity=medium&amp;id=68359c9d5d5f0974d01f3450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-08-f1d200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-08&amp;severity=medium&amp;id=682acdc3bbaf20d303f1d200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-08-f12f07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/police-ch-erpresserische-kryptow-hrung-adressen-f0c27f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Police.CH%20-%20Erpresserische%20Kryptow%C3%A4hrung-Adressen&amp;severity=low&amp;id=682acdbebbaf20d303f0c27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4528-cwe-502-deserialization-of-untrusted-data-in-redwood-software-jscape-mft-server-bf52b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4528%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Redwood%20Software%20JSCAPE%20MFT%20Server&amp;severity=high&amp;id=682d9846c4522896dcbf52b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41064-processing-a-maliciously-crafted-im-5fc5ef04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41064%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9ac247d717aace2213e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41061-a-maliciously-crafted-attachment-ma-671dac82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41061%3A%20A%20maliciously%20crafted%20attachment%20may%20result%20in%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9ac247d717aace22135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30800-cwe-787-out-of-bounds-write-in-mikr-665d3eed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30800%3A%20CWE-787%20Out-of-bounds%20Write%20in%20MikroTik%20RouterOS&amp;severity=high&amp;id=69209279b50ca2a0e366a949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-07-f216c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-07&amp;severity=medium&amp;id=682acdc4bbaf20d303f216c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-07-f123e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f123e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20269-authentication-bypass-using-an-alte-902a5841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20269%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Cisco%20Cisco%20Adaptive%20Security%20Appliance%20(ASA)%20Software&amp;severity=medium&amp;id=68f7d9a5247d717aace216c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20238-improper-authentication-in-cisco-ci-2915891a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20238%3A%20Improper%20Authentication%20in%20Cisco%20Cisco%20BroadWorks&amp;severity=critical&amp;id=694194769050fe85080608bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20250-stack-based-buffer-overflow-in-cisc-dcaa3f6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20250%3A%20Stack-based%20Buffer%20Overflow%20in%20Cisco%20Cisco%20Small%20Business%20RV%20Series%20Router%20Firmware&amp;severity=medium&amp;id=694194769050fe85080608c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4498-cwe-305-authentication-bypass-by-pri-16d76d3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4498%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Tenda%20N300%20Wireless%20N%20VDSL2%20Modem%20Router&amp;severity=null&amp;id=690a5558a730e5a3d9d7c212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28214-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bdc7f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28214%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc7f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28215-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bec5fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28215%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9838c4522896dcbec5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32356-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bec650</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32356%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9838c4522896dcbec650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28212-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bdc7e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28212%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28209-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bec6c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28209%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9839c4522896dcbec6c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28213-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bdc7ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28213%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc7ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28210-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bec470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28210%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9838c4522896dcbec470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28211-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-macos-bebdd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28211%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9838c4522896dcbebdd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-06-f12b95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4763-use-after-free-in-google-chrome-bdc843</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4763%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4762-type-confusion-in-google-chrome-57eb0886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4762%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9ae247d717aace267a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4781-cwe-122-heap-based-buffer-overflow-i-3344fbca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4781%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=69092147fe7723195e05403b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36308-na-9f16ffb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36308%3A%20n%2Fa&amp;severity=null&amp;id=690a3b5aff58c9332ff08e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-05-f1296f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f1296f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4752-cwe-416-use-after-free-in-vim-vimvim-99f98a00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4752%3A%20CWE-416%20Use%20After%20Free%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=69092147fe7723195e054030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4298-cwe-79-cross-site-scripting-xss-in-unknown-123-chat-bf524b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4298%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20123.chat&amp;severity=medium&amp;id=682d9846c4522896dcbf524b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4279-cwe-290-authentication-bypass-by-spoofing-in-unknown-user-activity-log-bf523b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4279%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Unknown%20User%20Activity%20Log&amp;severity=high&amp;id=682d9846c4522896dcbf523b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4216-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-orders-tracking-for-woocommerce-bf5205</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4216%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Orders%20Tracking%20for%20WooCommerce&amp;severity=low&amp;id=682d9846c4522896dcbf5205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4019-cwe-863-incorrect-authorization-in-unknown-media-from-ftp-bf51a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4019%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20Media%20from%20FTP&amp;severity=high&amp;id=682d9846c4522896dcbf51a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3499-cwe-79-cross-site-scripting-xss-in-unknown-photo-gallery-images-slider-in-rbs-image-gallery-bf5124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3499%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Photo%20Gallery%2C%20Images%2C%20Slider%20in%20Rbs%20Image%20Gallery&amp;severity=medium&amp;id=682d9846c4522896dcbf5124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4253-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-bf5209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4253%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AI%20ChatBot&amp;severity=medium&amp;id=682d9846c4522896dcbf5209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4254-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-bf520b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4254%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AI%20ChatBot&amp;severity=medium&amp;id=682d9846c4522896dcbf520b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4269-cwe-863-incorrect-authorization-in-unknown-user-activity-log-bf5211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4269%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20User%20Activity%20Log&amp;severity=medium&amp;id=682d9846c4522896dcbf5211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-04-e66604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-04&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e66604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-04-f12c36</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-03-f12992</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4738-cwe-122-heap-based-buffer-overflow-i-80bf94cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4738%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=69092147fe7723195e054029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-02-f124d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f124d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4709-cross-site-scripting-in-totvs-rm-2289ad78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4709%3A%20Cross%20Site%20Scripting%20in%20TOTVS%20RM&amp;severity=low&amp;id=6835ae13182aa0cae20f9d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3210-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253f2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3210%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3950-cwe-312-cleartext-storage-of-sensitive-information-in-gitlab-gitlab-253f72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3950%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4018-cwe-425-direct-request-forced-browsing-in-gitlab-gitlab-253f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4018%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4378-cwe-201-insertion-of-sensitive-information-into-sent-data-in-gitlab-gitlab-253f89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4378%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4343-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-gitlab-gitlab-253f03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4343%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0120-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0120%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1279-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-gitlab-gitlab-253f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1279%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1555-cwe-862-missing-authorization-in-gitlab-gitlab-253f11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1555%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3205-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253f2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3205%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3915-cwe-279-incorrect-execution-assigned-permissions-in-gitlab-gitlab-253f66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3915%3A%20CWE-279%3A%20Incorrect%20Execution-Assigned%20Permissions%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-09-01-f12a0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-09-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-31-ea881a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-31&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea881a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-31-f1256c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f1256c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41040-cwe-22-improper-limitation-of-a-pat-a36bf1b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41040%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20gitpython-developers%20GitPython&amp;severity=medium&amp;id=69092635fe7723195e0b61af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40184-cwe-755-improper-handling-of-except-43918cdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40184%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20neutrinolabs%20xrdp&amp;severity=low&amp;id=690904ac00ff46172d4a0d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4209-cwe-352-cross-site-request-forgery-csrf-in-unknown-poeditor-bf51f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4209%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20POEditor&amp;severity=medium&amp;id=682d9846c4522896dcbf51f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4150-cwe-352-cross-site-request-forgery-csrf-in-unknown-user-activity-tracking-and-log-bf51ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4150%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20User%20Activity%20Tracking%20and%20Log&amp;severity=medium&amp;id=682d9846c4522896dcbf51ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4023-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-all-users-messenger-bdc83f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4023%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20All%20Users%20Messenger&amp;severity=medium&amp;id=682d981fc4522896dcbdc83f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3992-cwe-79-cross-site-scripting-xss-in-unknown-postx-bf5177</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3992%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20PostX&amp;severity=medium&amp;id=682d9846c4522896dcbf5177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4109-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-unknown-ninja-forms-contact-form-bf51e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4109%3A%20CWE-80%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Unknown%20Ninja%20Forms%20Contact%20Form&amp;severity=medium&amp;id=682d9846c4522896dcbf51e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4013-cwe-352-cross-site-request-forgery-csrf-in-unknown-gdpr-cookie-compliance-ccpa-dsgvo-cookie-consent-bf51a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4013%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20GDPR%20Cookie%20Compliance%20(CCPA%2C%20DSGVO%2C%20Cookie%20Consent)&amp;severity=medium&amp;id=682d9846c4522896dcbf51a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4035-cwe-79-cross-site-scripting-xss-in-unknown-simple-blog-card-bf51da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4035%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Blog%20Card&amp;severity=medium&amp;id=682d9846c4522896dcbf51da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4036-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-simple-blog-card-bebf49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4036%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Simple%20Blog%20Card&amp;severity=medium&amp;id=682d9838c4522896dcbebf49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3501-cwe-79-cross-site-scripting-xss-in-unknown-formcraft-bf5128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3501%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20FormCraft&amp;severity=medium&amp;id=682d9846c4522896dcbf5128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3720-cwe-352-cross-site-request-forgery-csrf-in-unknown-upload-media-by-url-bdcc59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3720%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Upload%20Media%20By%20URL&amp;severity=medium&amp;id=682d981fc4522896dcbdcc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4522-cwe-1287-improper-validation-of-specified-type-of-input-in-gitlab-gitlab-253f8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4522%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41537-na-ef00dfcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41537%3A%20n%2Fa&amp;severity=null&amp;id=6913708312d2ca32afd483a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-08-30-83a31e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-08-30&amp;severity=medium&amp;id=682b68ead14de609c883a31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-30-f1227e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f1227e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40890-na-ab338953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40890%3A%20n%2Fa&amp;severity=critical&amp;id=690a439f6d939959c8fddc77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40889-na-c090f70b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40889%3A%20n%2Fa&amp;severity=null&amp;id=690a439f6d939959c8fddc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39615-na-9560f0b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39615%3A%20n%2Fa&amp;severity=null&amp;id=69092145fe7723195e053fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41266-na-c24ba291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41266%3A%20n%2Fa&amp;severity=high&amp;id=68f7d9ad247d717aace22165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41265-na-29d4cd23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41265%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9ad247d717aace2215f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-29-f128b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f128b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/diving-deep-into-unc4841-operations-following-barracuda-esg-zero-day-remediation-cve-2023-2868-f0dc1c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Diving%20Deep%20into%20UNC4841%20Operations%20Following%20Barracuda%20ESG%20Zero-Day%20Remediation%20(CVE-2023-2868)&amp;severity=medium&amp;id=682acdbebbaf20d303f0dc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fin8-linked-actor-targets-citrix-netscaler-systems-f0c279</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FIN8-LINKED%20ACTOR%20TARGETS%20CITRIX%20NETSCALER%20SYSTEMS&amp;severity=medium&amp;id=682acdbebbaf20d303f0c279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/diving-deep-into-unc4841-operations-following-barracuda-esg-zero-day-remediation-cve-2023-2868-6e26fc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Diving%20Deep%20into%20UNC4841%20Operations%20Following%20Barracuda%20ESG%20Zero-Day%20Remediation%20(CVE-2023-2868)&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e26fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40195-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-airflow-spark-provider-bf517b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40195%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Spark%20Provider&amp;severity=high&amp;id=682d9846c4522896dcbf517b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pandora-analysis-inv00273782377z-malicious-attachm-2b06bdb7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pandora%20analysis%20(INV0027378237.7z)%20-%20Malicious%20attachment&amp;severity=low&amp;id=68359c9f5d5f0974d01fc50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39810-n-a-in-n-a-bf0921</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39810%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-28-f126cb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f126cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pandora-analysis-inv0027378237-7z-malicious-attachment-f0e665</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pandora%20analysis%20(INV0027378237.7z)%20-%20Malicious%20attachment&amp;severity=low&amp;id=682acdbebbaf20d303f0e665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-27-f12dd1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-26-f12e01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2906-cwe-369-divide-by-zero-in-wireshark--918378a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2906%3A%20CWE-369%20Divide%20By%20Zero%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=null&amp;id=6909262dfe7723195e0b5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41080-cwe-601-url-redirection-to-untruste-ea30c567</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41080%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=null&amp;id=690204523aaa02566521b4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13689-inappropriate-implementation-in-google-chrome-bebc04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13689%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=682d9837c4522896dcbebc04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13690-inappropriate-implementation-in-google-chrome-bebc08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13690%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=critical&amp;id=682d9837c4522896dcbebc08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38201-authorization-bypass-through-user-c-df07b958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38201%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=691f553ce672cd9080df8cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40217-na-19d8e956</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40217%3A%20n%2Fa&amp;severity=null&amp;id=69092633fe7723195e0b6187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-25-f12958</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pandora-analysis-new-order-list-green-valley-corp-xlam-f0c275</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pandora%20analysis%20(NEW%20ORDER%20LIST%20GREEN%20VALLEY%20CORP.xlam)&amp;severity=low&amp;id=682acdbebbaf20d303f0c275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-mar-10459736-r1-v1-whirlpool-variant-f0c268</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20-%20MAR-10459736.r1.v1%20-%20WHIRLPOOL%20Variant&amp;severity=low&amp;id=682acdbebbaf20d303f0c268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4513-cwe-401-missing-release-of-memory-af-c7e1a2e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4513%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092637fe7723195e0b624c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4512-cwe-674-uncontrolled-recursion-in-wi-e0fb095d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4512%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092637fe7723195e0b6244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4511-cwe-835-loop-with-unreachable-exit-c-ca93d666</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4511%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092637fe7723195e0b623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32559-vulnerability-in-nodejs-node-bed567</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32559%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-24-f12a7e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4042-out-of-bounds-read-in-red-hat-red-ha-b525b2b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4042%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e90ce7dd820f2ffe5dfcbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3899-improper-authorization-in-red-hat-re-a6df524d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3899%3A%20Improper%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%207&amp;severity=high&amp;id=691ec609337afffbc0f7289f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38831-na-23db234c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38831%3A%20n%2Fa&amp;severity=high&amp;id=68f7d9ac247d717aace22110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-23-f130ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f130ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33850-cwe-203-observable-discrepancy-in-i-9cafb8d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33850%3A%20CWE-203%20Observable%20Discrepancy%20in%20IBM%20TXSeries%20for%20Multiplatforms&amp;severity=high&amp;id=69092630fe7723195e0b5f4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-21428-n-a-in-n-a-bebf7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-21428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d9838c4522896dcbebf7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-22524-n-a-in-n-a-bdcc38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-22524%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-21427-n-a-in-n-a-bdcbfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-21427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdcbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-22-f12302</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4459-null-pointer-dereference-in-red-hat--a2b4bf36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4459%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208.2%20Advanced%20Update%20Support&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32002-vulnerability-in-nodejs-node-bed54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32002%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38035-vulnerability-in-ivanti-mobileiron--beb4274a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38035%3A%20Vulnerability%20in%20Ivanti%20MobileIron%20Sentry&amp;severity=critical&amp;id=68f7d9ab247d717aace220e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4456-insufficient-granularity-of-access-c-fd93c30b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4456%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20RHOL-5.5-RHEL-8&amp;severity=medium&amp;id=68e8557cba0e608b4fb1eec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3936-cwe-79-cross-site-scripting-xss-in-unknown-blog2social-social-media-auto-post-scheduler-bf505d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3936%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=682d9846c4522896dcbf505d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3954-cwe-79-cross-site-scripting-xss-in-unknown-multiparcels-shipping-for-woocommerce-bdc760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3954%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MultiParcels%20Shipping%20For%20WooCommerce&amp;severity=medium&amp;id=682d981fc4522896dcbdc760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3667-cwe-79-cross-site-scripting-xss-in-unknown-chat-button-whatsapp-chat-facebook-messenger-telegram-chat-wechat-line-chat-discord-chat-for-customer-support-chat-with-floating-chat-widget-bdc728</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3667%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Chat%20Button%3A%20WhatsApp%20Chat%2C%20Facebook%20Messenger%2C%20Telegram%20Chat%2C%20WeChat%2C%20Line%20Chat%2C%20Discord%20Chat%20for%20Customer%20Support%20Chat%20with%20floating%20Chat%20Widget&amp;severity=medium&amp;id=682d981fc4522896dcbdc728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-21-f12fef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-20-f12b57</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-19-f12e41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38890-na-bf96f1be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38890%3A%20n%2Fa&amp;severity=null&amp;id=6937058652c2eb5957f2f190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-18-f12346</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36846-cwe-306-missing-authentication-for--6485ec83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36846%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68f7d9ab247d717aace220c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36845-cwe-473-php-external-variable-modif-59103246</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36845%3A%20CWE-473%20PHP%20External%20Variable%20Modification%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=critical&amp;id=68f7d9ab247d717aace220be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36844-cwe-473-php-external-variable-modif-435e4ac1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36844%3A%20CWE-473%20PHP%20External%20Variable%20Modification%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68f7d9ab247d717aace220b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36847-cwe-306-missing-authentication-for--d510666c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36847%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=68f7d9ab247d717aace220c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-08-17-1eb6c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-08-17&amp;severity=medium&amp;id=682b69c152745a861d1eb6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-17-f12043</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f12043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20209-improper-control-of-generation-of-c-59e210f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20209%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Cisco%20Cisco%20TelePresence%20Video%20Communication%20Server%20(VCS)%20Expressway&amp;severity=medium&amp;id=694194769050fe85080608b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4387-use-after-free-in-red-hat-red-hat-en-8fcb50df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4387%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=683ee1eb182aa0cae273966a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4385-null-pointer-dereference-in-red-hat--9ef5e41c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4385%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e8557bba0e608b4fb1eeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1465-cwe-79-cross-site-scripting-xss-in-unknown-wp-easypay-bdc47a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1465%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20EasyPay&amp;severity=medium&amp;id=682d981fc4522896dcbdc47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-16-f12202</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4324-vulnerability-in-broadcom-lsi-storag-f487beaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4324%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4325-vulnerability-in-broadcom-lsi-storag-2458ce27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4325%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4326-cwe-327-use-of-a-broken-or-risky-cry-faedaa16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4326%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4327-cwe-522-insufficiently-protected-cre-ca88b294</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4327%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4328-cwe-522-insufficiently-protected-cre-7925b5a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4328%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4329-vulnerability-in-broadcom-lsi-storag-9f7ee6cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4329%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4331-cwe-327-use-of-a-broken-or-risky-cry-09e7eea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4331%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4332-cwe-732-incorrect-permission-assignm-e43f9d45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4332%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4333-cwe-326-inadequate-encryption-streng-553518bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4333%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4334-vulnerability-in-broadcom-lsi-storag-2eb5d2ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4334%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4336-vulnerability-in-broadcom-lsi-storag-f3b36dc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4336%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4337-vulnerability-in-broadcom-lsi-storag-0d4af2d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4337%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4338-vulnerability-in-broadcom-lsi-storag-e6dffa63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4338%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4339-vulnerability-in-broadcom-lsi-storag-3609e9cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4339%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4340-vulnerability-in-broadcom-lsi-storag-59defeb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4340%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4341-vulnerability-in-broadcom-lsi-storag-41b9d5c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4341%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4342-vulnerability-in-broadcom-lsi-storag-51005516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4342%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4343-vulnerability-in-broadcom-lsi-storag-0de71c44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4343%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de1f0ba78a050535c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4344-cwe-331-insufficient-entropy-in-broa-f8fc974e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4344%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=critical&amp;id=690a2de3f0ba78a050535ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4323-vulnerability-in-broadcom-lsi-storag-05158635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4323%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de0f0ba78a050535baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4345-vulnerability-in-broadcom-lsi-storag-5e1f4eaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4345%3A%20Vulnerability%20in%20Broadcom%20LSI%20Storage%20Authority%20(LSA)&amp;severity=null&amp;id=690a2de3f0ba78a050535ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4369-insufficient-data-validation-in-google-chrome-bdc787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4369%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4355-out-of-bounds-memory-access-in-google-chrome-bdc77f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4355%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4354-heap-buffer-overflow-in-google-chrome-bdc777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4354%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4352-type-confusion-in-google-chrome-bdc768</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4352%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35082-vulnerability-in-ivanti-epmm-d622fa98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35082%3A%20Vulnerability%20in%20Ivanti%20EPMM&amp;severity=critical&amp;id=68f7d9aa247d717aace21f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32003-vulnerability-in-nodejs-node-bed557</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32003%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32004-vulnerability-in-nodejs-node-bd83d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32004%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d9818c4522896dcbd83d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32006-vulnerability-in-nodejs-node-bd83dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32006%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d9818c4522896dcbd83dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38852-na-b09fc889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38852%3A%20n%2Fa&amp;severity=null&amp;id=690a439d6d939959c8fddb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-15-f11f77</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21282-remote-code-execution-in-google-and-a8565777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21282%3A%20Remote%20code%20execution%20in%20Google%20Android&amp;severity=null&amp;id=690a6f039e609817bf702c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3601-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-simple-author-box-bdc720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3601%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Simple%20Author%20Box&amp;severity=medium&amp;id=682d981fc4522896dcbdc720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3721-cwe-79-cross-site-scripting-xss-in-unknown-wp-email-bdc750</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3721%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP-EMail&amp;severity=medium&amp;id=682d981fc4522896dcbdc750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29468-n-a-in-n-a-bdc56e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29468%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-14-f12898</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-13-f12382</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12382</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-08-12-833782</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-08-12&amp;severity=medium&amp;id=682b68e9d14de609c8833782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-12-f12756</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39418-insufficient-granularity-of-access--09feb708</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39418%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=low&amp;id=68e90ce7dd820f2ffe5dfcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39417-improper-neutralization-of-special--fe02be97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39417%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Red%20Hat%20Red%20Hat%20Advanced%20Cluster%20Security%204.2&amp;severity=high&amp;id=68e0f3bcb66c7f7acdd3cb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-40267-na-7d9b29ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-40267%3A%20n%2Fa&amp;severity=null&amp;id=69092633fe7723195e0b6190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-11-b0b28a40</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-11&amp;severity=medium&amp;id=68359c9a5d5f0974d01e1ef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-11-f18611</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f18611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-11-f13148</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f13148</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-11-6e31d9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-11&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e31d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-10-f12052</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f12052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4273-stack-based-buffer-overflow-in-red-h-9b6e93af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4273%3A%20Stack-based%20Buffer%20Overflow%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=69173e293d7715a824cb7df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-09-f1226d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1226d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38180-denial-of-service-in-microsoft-aspn-60def2bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38180%3A%20Denial%20of%20Service%20in%20Microsoft%20ASP.NET%20Core%202.1&amp;severity=high&amp;id=68f7d9ac247d717aace220f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-08-f12630</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3524-cwe-79-cross-site-scripting-xss-in-unknown-wpcode-bdc711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3524%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WPCode&amp;severity=medium&amp;id=682d981fc4522896dcbdc711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3671-cwe-79-cross-site-scripting-xss-in-unknown-multiparcels-shipping-for-woocommerce-bdc730</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3671%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20MultiParcels%20Shipping%20For%20WooCommerce&amp;severity=medium&amp;id=682d981fc4522896dcbdc730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3575-cwe-79-cross-site-scripting-xss-in-unknown-quiz-and-survey-master-bf5059</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3575%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Quiz%20And%20Survey%20Master&amp;severity=medium&amp;id=682d9846c4522896dcbf5059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4194-incorrect-authorization-in-red-hat-r-a3da3b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4194%3A%20Incorrect%20Authorization%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=69173e293d7715a824cb7de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4147-use-after-free-in-red-hat-red-hat-en-1e127931</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4147%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=high&amp;id=691ec3729f5a9374a9d10f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-07-f12858</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-06-f11f7f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-05-f12306</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f12306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29505-na-in-na-f8d937b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29505%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39143-n-a-in-n-a-bdc6b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39143%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc6b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-04-f123ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f123ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35081-vulnerability-in-ivanti-epmm-aefdc71c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35081%3A%20Vulnerability%20in%20Ivanti%20EPMM&amp;severity=high&amp;id=68f7d9aa247d717aace21f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4132-use-after-free-in-red-hat-red-hat-en-284e8f2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4132%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690defa9f9c655f2f6a01f09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4133-use-after-free-in-red-hat-red-hat-en-e9a386c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4133%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e8557bba0e608b4fb1ee99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3932-cwe-286-incorrect-user-management-in-gitlab-gitlab-253f6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3932%3A%20CWE-286%3A%20Incorrect%20User%20Management%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38952-n-a-in-n-a-aeb453</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38951-n-a-in-n-a-aeb451</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38951%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38950-n-a-in-n-a-aeb2dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38950%3A%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb2dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-03-f1275e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f1275e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2022-cwe-862-missing-authorization-in-gitlab-gitlab-253f13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2022%3A%20CWE-862%3A%20Missing%20Authorization%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3401-cwe-94-improper-control-of-generation-of-code-code-injection-in-gitlab-gitlab-253f41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3401%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3500-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253f49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3500%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3900-cwe-1287-improper-validation-of-specified-type-of-input-in-gitlab-gitlab-253f4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3900%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3994-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253f83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3994%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-02-f1235f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f1235f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0632-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253f07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0632%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1210-cwe-209-generation-of-error-message-containing-sensitive-information-in-gitlab-gitlab-253f0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1210%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682ea68a0acd01a249253f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2164-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-gitlab-253f22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2164%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3364-cwe-1333-inefficient-regular-expression-complexity-in-gitlab-gitlab-253f30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3364%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253f30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3385-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-gitlab-gitlab-253f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3385%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38560-integer-overflow-or-wraparound-in-r-00b2c0d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38560%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e84aedba0e608b4fb043b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38559-out-of-bounds-read-in-red-hat-red-h-582ec00e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38559%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e84aedba0e608b4fb043ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4053-vulnerability-in-mozilla-firefox-a3a38f10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4053%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2c4eb3efac3694211b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4051-vulnerability-in-mozilla-firefox-53075b6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4051%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2c4eb3efac36942115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-08-01-f127a4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-08-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f127a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4010-loop-with-unreachable-exit-condition-173ada82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4010%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e6688d5e259e903d8f09ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4004-use-after-free-in-red-hat-red-hat-en-725aed3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4004%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690ebb293a8fd010ecf4f0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3817-cwe-606-unchecked-input-for-loop-condition-in-openssl-openssl-bdc758</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3817%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682d981fc4522896dcbdc758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3508-cwe-352-cross-site-request-forgery-csrf-in-unknown-woocommerce-pre-orders-bf5055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3508%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WooCommerce%20Pre-Orders&amp;severity=medium&amp;id=682d9846c4522896dcbf5055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3507-cwe-352-cross-site-request-forgery-csrf-in-unknown-woocommerce-pre-orders-bf5051</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3507%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WooCommerce%20Pre-Orders&amp;severity=medium&amp;id=682d9846c4522896dcbf5051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34872-na-fd06ed60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34872%3A%20n%2Fa&amp;severity=medium&amp;id=690a53242a90255b94da6674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37580-na-62c0eae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37580%3A%20n%2Fa&amp;severity=medium&amp;id=68f7d9ab247d717aace220e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35792-na-in-na-06c69456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35792%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35791-na-in-na-8fd76ea9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35791%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-31-f125ee</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f125ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-30-f1203b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f1203b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-29-f1229d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f1229d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-28-f12a67</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38600-processing-web-content-may-lead-to-arbitrary-code-execution-in-apple-safari-bdc6ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38600%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=682d981fc4522896dcbdc6ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-27-f12cb0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38606-an-app-may-be-able-to-modify-sensit-517abe1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38606%3A%20An%20app%20may%20be%20able%20to%20modify%20sensitive%20kernel%20state.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20released%20before%20iOS%2015.7.1.%20in%20Apple%20tvOS&amp;severity=medium&amp;id=68f7d9ac247d717aace22106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37450-processing-web-content-may-lead-to--3192b4df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37450%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20Safari&amp;severity=high&amp;id=68f7d9ab247d717aace220da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1401-cwe-201-insertion-of-sensitive-information-into-sent-data-in-gitlab-gitlab-253f0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1401%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30577-na-49df649a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30577%3A%20n%2Fa&amp;severity=high&amp;id=690a2dddf0ba78a050535add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-26-f12340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3773-out-of-bounds-read-in-red-hat-red-ha-812e19a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3773%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=69173e293d7715a824cb7ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3772-null-pointer-dereference-in-red-hat--bcf89cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3772%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690defa9f9c655f2f6a01efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3637-uncontrolled-resource-consumption-in-efb4fe57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3637%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20OpenStack%20Platform%2016.2&amp;severity=medium&amp;id=68e84aedba0e608b4fb043bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35078-vulnerability-in-ivanti-endpoint-ma-d5af769f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35078%3A%20Vulnerability%20in%20Ivanti%20Endpoint%20Manager%20Mobile&amp;severity=critical&amp;id=68f7d9aa247d717aace21efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38745-na-6129fec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38745%3A%20n%2Fa&amp;severity=null&amp;id=690a439d6d939959c8fddaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-25-f127de</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3640-observable-discrepancy-in-red-hat-re-5472fd88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3640%3A%20Observable%20Discrepancy%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=high&amp;id=69173e293d7715a824cb7dd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33951-exposure-of-sensitive-information-t-34044412</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33951%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e84755ba0e608b4faf9be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3745-out-of-bounds-read-in-red-hat-red-ha-fc6e4474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3745%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e84aedba0e608b4fb043c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3750-improper-locking-in-red-hat-red-hat--a0bd1415</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3750%3A%20Improper%20Locking%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=medium&amp;id=690ef4fa097c6a910adb4b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3812-out-of-bounds-write-in-red-hat-red-h-382b86ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3812%3A%20Out-of-bounds%20Write%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=68e7a239ba0e608b4f980efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3384-improper-neutralization-of-input-dur-e44b4719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3384%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Red%20Hat%20Red%20Hat%20Quay%203&amp;severity=medium&amp;id=68e84755ba0e608b4faf9c20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3019-use-after-free-in-red-hat-red-hat-en-d5adfead</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3019%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=690904ab00ff46172d4a016a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3567-use-after-free-in-red-hat-red-hat-en-69f92658</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3567%3A%20Use%20After%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=690d0b9008e329e0f8ef0d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38200-uncontrolled-resource-consumption-i-eeeff942</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38200%3A%20Uncontrolled%20Resource%20Consumption%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=high&amp;id=691f553ce672cd9080df8ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33952-double-free-in-red-hat-red-hat-ente-c5c0a83a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33952%3A%20Double%20Free%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e84755ba0e608b4faf9bef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3248-cwe-79-cross-site-scripting-xss-in-unknown-all-in-one-floating-contact-form-call-chat-and-50-social-icon-tabs-bf501d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3248%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20All-in-one%20Floating%20Contact%20Form%2C%20Call%2C%20Chat%2C%20and%2050%2B%20Social%20Icon%20Tabs&amp;severity=medium&amp;id=682d9846c4522896dcbf501d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3344-cwe-79-cross-site-scripting-xss-in-unknown-auto-location-for-wp-job-manager-via-google-bdc6f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3344%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Auto%20Location%20for%20WP%20Job%20Manager%20via%20Google&amp;severity=medium&amp;id=682d981fc4522896dcbdc6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3417-vulnerability-in-mozilla-thunderbird-7391fc79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3417%3A%20Vulnerability%20in%20Mozilla%20Thunderbird&amp;severity=null&amp;id=69441d2c4eb3efac36942109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-24-f126a6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f126a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-23-f13010</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f13010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-22-f12300</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12300</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37903-cwe-78-improper-neutralization-of-s-5cc2c18d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37903%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69092632fe7723195e0b5f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3102-cwe-201-insertion-of-sensitive-information-into-sent-data-in-gitlab-gitlab-253f26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3102%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682ea68a0acd01a249253f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3484-cwe-863-incorrect-authorization-in-gitlab-gitlab-253f47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3484%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682ea68a0acd01a249253f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-21-f125e4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f125e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/moustachedbouncer-espionage-against-foreign-diplomats-in-belarus-f0c266</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MoustachedBouncer%3A%20Espionage%20against%20foreign%20diplomats%20in%20Belarus&amp;severity=high&amp;id=682acdbebbaf20d303f0c266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38203-deserialization-of-untrusted-data-c-d4d6635d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38203%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=68f7d9ac247d717aace220fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34968-insertion-of-sensitive-information--1d9494ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34968%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e84755ba0e608b4faf9bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34967-access-of-resource-using-incompatib-27bc2287</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34967%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=691f519438b88f02b51baae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34966-loop-with-unreachable-exit-conditio-85bf5d2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34966%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=691f519438b88f02b51baad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3347-improper-verification-of-cryptograph-7c1b55bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=medium&amp;id=68e84755ba0e608b4faf9c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-20-f12e20</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3674-mutable-attestation-or-measurement-r-eaa49f8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3674%3A%20Mutable%20Attestation%20or%20Measurement%20Reporting%20Data%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%209&amp;severity=low&amp;id=68e901b8fd0dca528e8b9a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3519-cwe-94-improper-control-of-generatio-92634194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3519%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Citrix%20NetScaler%20ADC&amp;severity=critical&amp;id=68f7d9ac247d717aace22125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30799-cwe-269-improper-privilege-manageme-383c29c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30799%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20MikroTik%20RouterOS&amp;severity=critical&amp;id=69209279b50ca2a0e366a945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28744-cwe-416-use-after-free-in-foxit-fox-343d1670</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28744%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a531f2a90255b94da5f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33866-cwe-416-use-after-free-in-foxit-fox-35b29faf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33866%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53222a90255b94da664e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32664-cwe-843-access-of-resource-using-in-94e46391</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32664%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53222a90255b94da6646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33876-cwe-416-use-after-free-in-foxit-fox-6fbd2021</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33876%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Foxit%20Foxit%20Reader&amp;severity=high&amp;id=690a53222a90255b94da6652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3446-cwe-606-unchecked-input-for-loop-condition-in-openssl-openssl-bf504d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3446%3A%20CWE-606%20Unchecked%20Input%20for%20Loop%20Condition%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682d9846c4522896dcbf504d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-19-f12ae7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-18-f1286f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f1286f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37476-cwe-22-improper-limitation-of-a-pat-7cac2fa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37476%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenRefine%20OpenRefine&amp;severity=medium&amp;id=68487f531b0bd07c39389fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3245-cwe-79-cross-site-scripting-xss-in-unknown-floating-chat-widget-contact-chat-icons-telegram-chat-line-messenger-wechat-email-sms-call-button-bf5015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3245%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Floating%20Chat%20Widget%3A%20Contact%20Chat%20Icons%2C%20Telegram%20Chat%2C%20Line%20Messenger%2C%20WeChat%2C%20Email%2C%20SMS%2C%20Call%20Button&amp;severity=medium&amp;id=682d9846c4522896dcbf5015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3041-cwe-79-cross-site-scripting-xss-in-unknown-autochat-automatic-conversation-bdc6b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3041%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Autochat%20Automatic%20Conversation&amp;severity=medium&amp;id=682d981fc4522896dcbdc6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38427-n-a-in-n-a-bdc6aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-17-f127c3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f127c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-16-f1294e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f1294e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-15-f126de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f126de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-38252-out-of-bounds-read-in-red-hat-red-h-8e7612cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-38252%3A%20Out-of-bounds%20Read%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e901b8fd0dca528e8b9a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2975-cwe-354-improper-validation-of-integrity-check-value-in-openssl-openssl-bf4fd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2975%3A%20CWE-354%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682d9846c4522896dcbf4fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3649-cwe-126-buffer-over-read-in-wireshar-eee6d1e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3649%3A%20CWE-126%3A%20Buffer%20Over-read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092633fe7723195e0b617e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3648-cwe-762-mismatched-memory-management-d6ae6d0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3648%3A%20CWE-762%3A%20Mismatched%20Memory%20Management%20Routines%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092633fe7723195e0b6179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-14-f12288</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/customerloader-a-new-malware-distributing-a-wide-variety-of-payloads-f0c27d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CustomerLoader%3A%20a%20new%20malware%20distributing%20a%20wide%20variety%20of%20payloads&amp;severity=medium&amp;id=682acdbebbaf20d303f0c27d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37466-cwe-94-improper-control-of-generati-d21f17e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37466%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20patriksimek%20vm2&amp;severity=critical&amp;id=69092632fe7723195e0b5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34133-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sonicwall-gms-bf4fe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34133%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20SonicWall%20GMS&amp;severity=high&amp;id=682d9846c4522896dcbf4fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34127-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-sonicwall-gms-bf4fdb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34127%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonicWall%20GMS&amp;severity=high&amp;id=682d9846c4522896dcbf4fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-13-f129cc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f129cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29300-deserialization-of-untrusted-data-c-aa0ffbaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29300%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=68f7d9a8247d717aace21928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29298-improper-access-control-cwe-284-in--b7a087ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29298%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68f7d9a8247d717aace21924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3618-buffer-copy-without-checking-size-of-9e1701ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3618%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20libtiff&amp;severity=medium&amp;id=69092145fe7723195e053fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3600-vulnerability-in-mozilla-firefox-72c2a3e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3600%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2c4eb3efac36942110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37582-cwe-94-improper-control-of-generation-of-code-code-injection-in-apache-software-foundation-apache-rocketmq-bf4ffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37582%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20RocketMQ&amp;severity=critical&amp;id=682d9846c4522896dcbf4ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3106-null-pointer-dereference-in-red-hat--d0d5cd14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3106%3A%20NULL%20Pointer%20Dereference%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=68e84aedba0e608b4fb04396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36266-na-in-na-26a2c0e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36266%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5e1b0bd07c3938ff28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-12-f11f9e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36884-cwe-362-concurrent-execution-using--813b2a69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36884%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9ab247d717aace220d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35311-cwe-367-time-of-check-time-of-use-t-65a5519e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35311%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68f7d9aa247d717aace21f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36874-cwe-59-improper-link-resolution-bef-a5e964a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36874%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9ab247d717aace220d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32049-security-feature-bypass-in-microsof-8589f904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32049%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a9247d717aace21978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32046-elevation-of-privilege-in-microsoft-ad617894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32046%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a9247d717aace21973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3108-vulnerability-in-red-hat-red-hat-ent-418ba0c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3108%3A%20Vulnerability%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%206&amp;severity=medium&amp;id=691f5352e672cd9080de2967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-11-f12d76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24489-cwe-284-in-citrix-citrix-sharefile--fc90caf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24489%3A%20CWE-284%20in%20Citrix%20Citrix%20ShareFile%20Storage%20Zones%20Controller&amp;severity=critical&amp;id=68f7d9a6247d717aace2189c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2967-cwe-79-cross-site-scripting-xss-in-unknown-tinymce-custom-styles-bdc641</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2967%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20TinyMCE%20Custom%20Styles&amp;severity=medium&amp;id=682d981fc4522896dcbdc641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3118-cwe-79-cross-site-scripting-xss-in-unknown-export-all-urls-bf500d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3118%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Export%20All%20URLs&amp;severity=medium&amp;id=682d9846c4522896dcbf500d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2964-cwe-79-cross-site-scripting-xss-in-unknown-simple-iframe-bf4fad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2964%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20Iframe&amp;severity=medium&amp;id=682d9846c4522896dcbf4fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36375-na-d25ed297</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36375%3A%20n%2Fa&amp;severity=null&amp;id=6913708312d2ca32afd483a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-10-f11ff9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-09-f128b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f128b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-08-f129f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f129f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-07-76a4bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-07&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76a4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-07-f120b5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f120b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24497-cwe-80-improper-neutralization-of-s-cdc2bc9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24497%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Milesight%20MilesightVPN&amp;severity=medium&amp;id=690a53132a90255b94da575c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24496-cwe-80-improper-neutralization-of-s-6d900172</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24496%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Milesight%20MilesightVPN&amp;severity=medium&amp;id=690a53132a90255b94da5758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24520-cwe-77-improper-neutralization-of-s-2746bc43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24520%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53132a90255b94da5764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24519-cwe-77-improper-neutralization-of-s-c6fc7399</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24519%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53132a90255b94da5760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24583-cwe-77-improper-neutralization-of-s-74828d6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24583%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53132a90255b94da576c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24582-cwe-77-improper-neutralization-of-s-095b03fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24582%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53132a90255b94da5768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25124-cwe-121-stack-based-buffer-overflow-6229e040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25124%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531d2a90255b94da5f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25123-cwe-121-stack-based-buffer-overflow-e6df63ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25123%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531d2a90255b94da5f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25122-cwe-121-stack-based-buffer-overflow-5758e41a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25122%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531d2a90255b94da5f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25121-cwe-121-stack-based-buffer-overflow-31a70176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25121%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531d2a90255b94da5f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25120-cwe-121-stack-based-buffer-overflow-b4ad4fa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25120%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25119-cwe-121-stack-based-buffer-overflow-83e66dc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25119%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25118-cwe-121-stack-based-buffer-overflow-3f74d2a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25118%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25117-cwe-121-stack-based-buffer-overflow-0645ffd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25117%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25116-cwe-121-stack-based-buffer-overflow-c53e9749</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25116%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25115-cwe-121-stack-based-buffer-overflow-bfa866d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25115%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25114-cwe-121-stack-based-buffer-overflow-bbd8056b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25114%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25113-cwe-121-stack-based-buffer-overflow-0f878cd9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25113%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25112-cwe-121-stack-based-buffer-overflow-25523882</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25112%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25111-cwe-121-stack-based-buffer-overflow-92551aed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25111%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531b2a90255b94da5ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25110-cwe-121-stack-based-buffer-overflow-6abc19ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25110%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25109-cwe-121-stack-based-buffer-overflow-6bf35eac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25109%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25108-cwe-121-stack-based-buffer-overflow-c6d11f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25108%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25107-cwe-121-stack-based-buffer-overflow-cbb145e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25107%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25106-cwe-121-stack-based-buffer-overflow-8e11e6cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25106%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25105-cwe-121-stack-based-buffer-overflow-e1c51543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25105%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25104-cwe-121-stack-based-buffer-overflow-26a5a0e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25104%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25103-cwe-121-stack-based-buffer-overflow-f1018a08</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25103%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25102-cwe-121-stack-based-buffer-overflow-a20199b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25102%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25101-cwe-121-stack-based-buffer-overflow-10929b50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25101%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53192a90255b94da5e70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25100-cwe-121-stack-based-buffer-overflow-ae0eea26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25100%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25099-cwe-121-stack-based-buffer-overflow-21affcf3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25099%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25098-cwe-121-stack-based-buffer-overflow-12b3ebd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25098%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25097-cwe-121-stack-based-buffer-overflow-65d18de4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25097%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25096-cwe-121-stack-based-buffer-overflow-da4a17ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25096%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25095-cwe-121-stack-based-buffer-overflow-16e430f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25095%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25094-cwe-121-stack-based-buffer-overflow-34c98f5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25094%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25093-cwe-121-stack-based-buffer-overflow-5cf40fc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25093%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25092-cwe-121-stack-based-buffer-overflow-d8be93f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25092%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25091-cwe-121-stack-based-buffer-overflow-3ff9c538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25091%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53172a90255b94da5e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25090-cwe-121-stack-based-buffer-overflow-a7ddf0b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25090%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da57b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25089-cwe-121-stack-based-buffer-overflow-a3215f65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25089%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da57b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25088-cwe-121-stack-based-buffer-overflow-5bf7103d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25088%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da57af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25087-cwe-121-stack-based-buffer-overflow-c7de3cc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25087%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da57ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25086-cwe-121-stack-based-buffer-overflow-bd1f37d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25086%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da57a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25085-cwe-121-stack-based-buffer-overflow-3e65bc48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25085%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da57a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25084-cwe-121-stack-based-buffer-overflow-ec40706e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25084%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da579f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25083-cwe-121-stack-based-buffer-overflow-7e9a702f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25083%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da579b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25082-cwe-121-stack-based-buffer-overflow-c2fa345c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25082%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da5797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25081-cwe-121-stack-based-buffer-overflow-3eae724e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25081%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a53152a90255b94da5793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25583-cwe-78-improper-neutralization-of-s-8abe546e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25583%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531d2a90255b94da5f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25582-cwe-78-improper-neutralization-of-s-1879c399</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25582%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Milesight%20UR32L&amp;severity=high&amp;id=690a531d2a90255b94da5f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34192-na-in-na-db7513dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34192%3A%20n%2Fa&amp;severity=critical&amp;id=68443c7f71f4d251b50d00c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-37453-n-a-in-n-a-bdc6a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-37453%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-06-f12198</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-05-75ed7d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-05&amp;severity=medium&amp;id=682c7abfe3e6de8ceb75ed7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-05-f11fde</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-04-f12939</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36377-na-3e3296d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36377%3A%20n%2Fa&amp;severity=null&amp;id=695450b1db813ff03e2bedf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36053-na-a828524f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36053%3A%20n%2Fa&amp;severity=high&amp;id=690a3b58ff58c9332ff08b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-03-f1260f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1260f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chinese-threat-actors-targeting-europe-in-smugx-campaign-f0c264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chinese%20Threat%20Actors%20Targeting%20Europe%20in%20SmugX%20Campaign&amp;severity=high&amp;id=682acdbebbaf20d303f0c264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-02-f12741</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26136-prototype-pollution-in-tough-cookie-bed0cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26136%3A%20Prototype%20Pollution%20in%20tough-cookie&amp;severity=medium&amp;id=682d983ac4522896dcbed0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-01-754421</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-01&amp;severity=medium&amp;id=682c7abde3e6de8ceb754421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-07-01-f12879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-07-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28323-vulnerability-in-ivanti-ivanti-endpoint-manager-bdc538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28323%3A%20Vulnerability%20in%20Ivanti%20Ivanti%20Endpoint%20Manager&amp;severity=critical&amp;id=682d981fc4522896dcbdc538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30586-vulnerability-in-nodejs-node-bd8341</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30586%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d9818c4522896dcbd8341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30589-vulnerability-in-nodejs-node-bed530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30589%3A%20Vulnerability%20in%20NodeJS%20Node&amp;severity=null&amp;id=682d983ac4522896dcbed530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2908-null-pointer-dereference-in-libtiff-8c6753eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2908%3A%20NULL%20Pointer%20Dereference%20in%20Libtiff&amp;severity=medium&amp;id=69092143fe7723195e053f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-30-f12361</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12361</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36617-na-c2bb19c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36617%3A%20n%2Fa&amp;severity=null&amp;id=690a2dddf0ba78a050535ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26966-na-ee006506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26966%3A%20n%2Fa&amp;severity=null&amp;id=69092143fe7723195e053ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25433-na-c643d6ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25433%3A%20n%2Fa&amp;severity=null&amp;id=69092143fe7723195e053eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-29-f12c4d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21237-information-disclosure-in-android-4ea1ab55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21237%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=68f7d9a5247d717aace216e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-28-f12c1b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2743-cwe-79-cross-site-scripting-xss-in-unknown-wp-erp-complete-hr-solution-with-recruitment-job-listings-woocommerce-crm-accounting-bdc5ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2743%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20ERP%20%7C%20Complete%20HR%20solution%20with%20recruitment%20%26%20job%20listings%20%7C%20WooCommerce%20CRM%20%26%20Accounting&amp;severity=medium&amp;id=682d981fc4522896dcbdc5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-27-f12910</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12910</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3421-use-after-free-in-google-chrome-bdc709</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3421%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3420-type-confusion-in-google-chrome-bdc701</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3420%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc701</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-26-f13012</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f13012</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-36661-n-a-in-n-a-bdc6a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-36661%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-25-f12ff7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-25&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-24-f12474</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32387-a-remote-attacker-may-be-able-to-ca-75cd29c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32387%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=null&amp;id=690a53212a90255b94da600e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32395-an-app-may-be-able-to-modify-protec-9169b8f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32395%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=null&amp;id=69092630fe7723195e0b5f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32439-processing-maliciously-crafted-web--0b0b060c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32439%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9a9247d717aace21ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32435-processing-web-content-may-lead-to--e74e3c42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32435%3A%20Processing%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20released%20before%20iOS%2015.7.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9a9247d717aace219a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32434-an-app-may-be-able-to-execute-arbit-ac4f7a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32434%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited%20against%20versions%20of%20iOS%20released%20before%20iOS%2015.7.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9a9247d717aace21994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32409-a-remote-attacker-may-be-able-to-br-d0b24990</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32409%3A%20A%20remote%20attacker%20may%20be%20able%20to%20break%20out%20of%20Web%20Content%20sandbox.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9a9247d717aace2198b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32373-processing-maliciously-crafted-web--523e8085</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32373%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20macOS&amp;severity=high&amp;id=68f7d9a9247d717aace21981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28204-processing-web-content-may-disclose-c4de2171</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28204%3A%20Processing%20web%20content%20may%20disclose%20sensitive%20information.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20macOS&amp;severity=medium&amp;id=68f7d9a7247d717aace218ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-23-f12f37</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-22-f122ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f122ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-21-f12749</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12749</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2533-cwe-352-cross-site-request-forgery-c-1fe0b35a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2533%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PaperCut%20PaperCut%20NG%2FMF&amp;severity=high&amp;id=68f7d9a9247d717aace21969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-20-f130b1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f130b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27992-cwe-78-improper-neutralization-of-s-76181b7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27992%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20NAS326%20firmware&amp;severity=critical&amp;id=68f7d9a7247d717aace218e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2600-cwe-79-cross-site-scripting-xss-in-unknown-custom-base-terms-bf4fa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2600%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Custom%20Base%20Terms&amp;severity=medium&amp;id=682d9846c4522896dcbf4fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2742-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-bf4fa5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2742%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AI%20ChatBot&amp;severity=medium&amp;id=682d9846c4522896dcbf4fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34417-memory-safety-bugs-fixed-in-firefox-114-in-mozilla-firefox-bdc664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34417%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20114%20in%20Mozilla%20Firefox&amp;severity=critical&amp;id=682d981fc4522896dcbdc664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32216-memory-safety-bugs-fixed-in-firefox-c776cecb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32216%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20113%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b274c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32214-potential-dos-via-exposed-protocol--17c87afc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32214%3A%20Potential%20DoS%20via%20exposed%20protocol%20handlers%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835ef3f182aa0cae21b2744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32210-incorrect-principal-object-ordering-193e7a64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32210%3A%20Incorrect%20principal%20object%20ordering%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b273c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32209-persistent-dos-via-favicon-image-in-84e1acdd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32209%3A%20Persistent%20DoS%20via%20favicon%20image%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835ef3f182aa0cae21b273a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32208-leak-of-script-base-url-in-service--ec8f5475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32208%3A%20Leak%20of%20script%20base%20URL%20in%20service%20workers%20via%20import()%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835ef3f182aa0cae21b2738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35852-na-18f4e251</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35852%3A%20n%2Fa&amp;severity=null&amp;id=690904ab00ff46172d4a015e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3312-cwe-415-in-kernel-bf503e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3312%3A%20CWE-415%20in%20Kernel&amp;severity=high&amp;id=682d9846c4522896dcbf503e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-19-f11fe2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35824-n-a-in-n-a-bdc670</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35824%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35823-n-a-in-n-a-bdc66c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35823%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-18-f13096</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f13096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-17-f128b3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f128b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-35788-n-a-in-n-a-bdc668</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-35788%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-16-f12620</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/formbook-campaign-f0e505</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FormBook%20campaign&amp;severity=low&amp;id=682acdbebbaf20d303f0e505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-15-f123db</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f123db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2976-creation-of-temporary-file-with-inse-2d34fee3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2976%3A%20Creation%20of%20Temporary%20File%20With%20Insecure%20Permissions%20in%20Google%20Guava&amp;severity=medium&amp;id=6909262ffe7723195e0b5ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26965-na-fc98a094</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26965%3A%20n%2Fa&amp;severity=medium&amp;id=69092143fe7723195e053eb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-14-f12e24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33133-cwe-122-heap-based-buffer-overflow--5898afb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33133%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=690a53222a90255b94da664a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29360-cwe-822-untrusted-pointer-dereferen-802619e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29360%3A%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a8247d717aace21930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29357-cwe-303-incorrect-implementation-of-f60c6cc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29357%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20Microsoft%20Microsoft%20SharePoint%20Server%202019&amp;severity=critical&amp;id=68f7d9a8247d717aace2192c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32029-cwe-125-out-of-bounds-read-in-micro-ed02e068</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32029%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=690a53202a90255b94da5ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3217-use-after-free-in-google-chrome-bdc6ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3217%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3216-type-confusion-in-google-chrome-bdc6e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3216%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc6e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3215-use-after-free-in-google-chrome-bdc6da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3215%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3214-use-after-free-in-google-chrome-bdc6ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3214%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20867-cwe-287-improper-authentication-in--6bb0e7dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20867%3A%20CWE-287%20Improper%20Authentication%20in%20VMware%20VMware%20Tools&amp;severity=low&amp;id=68f7d9a5247d717aace216cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27997-execute-unauthorized-code-or-comman-6ad70cdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27997%3A%20Execute%20unauthorized%20code%20or%20commands%20in%20Fortinet%20FortiOS-6K7K&amp;severity=critical&amp;id=68f7d9a7247d717aace218ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33919-cwe-77-improper-neutralization-of-s-48670560</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33919%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20CP-8031%20MASTER%20MODULE&amp;severity=high&amp;id=69092143fe7723195e053f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31238-cwe-732-incorrect-permission-assign-850d6ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31238%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20SICAM%20P850&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30901-cwe-352-cross-site-request-forgery--32ce5456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30901%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Siemens%20SICAM%20P850&amp;severity=medium&amp;id=6913a08cf4d5bbdab5b1c77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-13-f125ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f125ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2362-cwe-79-cross-site-scripting-xss-in-unknown-float-menu-bdc58f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2362%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Float%20menu&amp;severity=medium&amp;id=682d981fc4522896dcbdc58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3159-cwe-416-in-kernel-bf5011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3159%3A%20CWE-416%20in%20Kernel&amp;severity=medium&amp;id=682d9846c4522896dcbf5011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-12-f12267</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-11-f120f9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f120f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-10-f11f66</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2454-cwe-20-in-postgresql-c3f9b6f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2454%3A%20CWE-20%20in%20postgresql&amp;severity=high&amp;id=683ffd67182aa0cae2a387eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-09-f124ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f124ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34969-na-in-na-25391958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34969%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938facc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-08-f12dd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20887-networks-command-injection-vulnerab-2863fa64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20887%3A%20Networks%20Command%20Injection%20Vulnerability%20in%20Aria%20Operations%20for%20Networks%20(Formerly%20vRealize%20Network%20Insight)&amp;severity=critical&amp;id=68f7d9a5247d717aace216d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0667-cwe-122-heap-based-buffer-overflow-i-3f3db8e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0667%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5ce1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0668-cwe-125-out-of-bounds-read-in-wiresh-e594a47d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0668%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5ce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0666-cwe-122-heap-based-buffer-overflow-i-dd4158d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0666%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33865-na-327384b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33865%3A%20n%2Fa&amp;severity=high&amp;id=69092632fe7723195e0b5f71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33864-na-21ea36b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33864%3A%20n%2Fa&amp;severity=critical&amp;id=69092630fe7723195e0b5f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33863-na-e1aea4c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33863%3A%20n%2Fa&amp;severity=critical&amp;id=69092630fe7723195e0b5f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33538-na-bdcb98df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33538%3A%20n%2Fa&amp;severity=high&amp;id=68f7d9a9247d717aace21ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-07-f1258f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f1258f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2603-cwe-190-in-libcap-eb58e2e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2603%3A%20CWE-190%20in%20libcap&amp;severity=high&amp;id=692f4dcec92f9eed938a8efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-06-f12376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3079-type-confusion-in-google-chrome-0bdd91ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3079%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9ac247d717aace22118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-3111-cwe-416-in-kernel-bf5000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-3111%3A%20CWE-416%20in%20Kernel&amp;severity=high&amp;id=682d9846c4522896dcbf5000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-05-f121e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f121e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-04-f12ce8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ce8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-03-f12c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23606-vulnerability-in-mozilla-firefox-5759339f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23606%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69441d2c4eb3efac369420fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23605-vulnerability-in-mozilla-firefox-eda69149</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23605%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=69441d2c4eb3efac369420f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23604-vulnerability-in-mozilla-firefox-11bb0e47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23604%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69441d2c4eb3efac369420f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23603-vulnerability-in-mozilla-firefox-c6876635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23603%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69441d2c4eb3efac369420ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23602-vulnerability-in-mozilla-firefox-77bb3bb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23602%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=69441d2a4eb3efac369420cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23601-vulnerability-in-mozilla-firefox-96ec5cc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23601%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2a4eb3efac369420c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23600-vulnerability-in-mozilla-firefox-ad3c7897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23600%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2a4eb3efac369420c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23599-vulnerability-in-mozilla-firefox-61a0a525</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23599%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2a4eb3efac369420bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23598-vulnerability-in-mozilla-firefox-3e35e92e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23598%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2a4eb3efac369420b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23597-vulnerability-in-mozilla-firefox-54bf40ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23597%3A%20Vulnerability%20in%20Mozilla%20Firefox&amp;severity=null&amp;id=69441d2a4eb3efac369420b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-34362-na-37439ebd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-34362%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9a9247d717aace21eee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32215-memory-safety-bugs-fixed-in-firefox-7f64b99d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32215%3A%20Memory%20safety%20bugs%20fixed%20in%20Firefox%20113%20and%20Firefox%20ESR%20102.11%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b274a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32213-potential-memory-corruption-in-file-8285679a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32213%3A%20Potential%20memory%20corruption%20in%20FileReader%3A%3ADoReadData()%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b2742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32212-potential-spoof-due-to-obscured-add-0ad20c97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32212%3A%20Potential%20spoof%20due%20to%20obscured%20address%20bar%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b2740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32211-content-process-crash-due-to-invali-76416539</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32211%3A%20Content%20process%20crash%20due%20to%20invalid%20wasm%20code%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835ef3f182aa0cae21b273e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32207-potential-permissions-request-bypas-7117efb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32207%3A%20Potential%20permissions%20request%20bypass%20via%20clickjacking%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b2736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32206-crash-in-rlbox-expat-driver-in-mozi-0c84e828</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32206%3A%20Crash%20in%20RLBox%20Expat%20driver%20in%20Mozilla%20Firefox&amp;severity=medium&amp;id=6835ef3f182aa0cae21b2734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32205-browser-prompts-could-have-been-obs-7d45358c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32205%3A%20Browser%20prompts%20could%20have%20been%20obscured%20by%20popups%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=6835ef3f182aa0cae21b2732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0767-arbitrary-memory-write-via-pkcs-12-in-nss-in-mozilla-firefox-bdc46a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0767%3A%20Arbitrary%20memory%20write%20via%20PKCS%2012%20in%20NSS%20in%20Mozilla%20Firefox&amp;severity=high&amp;id=682d981fc4522896dcbdc46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-02-f123d9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f123d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22652-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-opensuse-libeconf-bd676a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22652%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20openSUSE%20libeconf&amp;severity=low&amp;id=682d9816c4522896dcbd676a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2977-cwe-119-in-opensc-2f732b0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2977%3A%20CWE-119%20in%20OpenSC&amp;severity=high&amp;id=6909262ffe7723195e0b5edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2598-cwe-416-in-kernel-bf4f9d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2598%3A%20CWE-416%20in%20Kernel&amp;severity=high&amp;id=682d9846c4522896dcbf4f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-06-01-f12365</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-06-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12365</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-31-f12b29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2939-insufficient-data-validation-in-google-chrome-bdc630</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2939%3A%20Insufficient%20data%20validation%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2936-type-confusion-in-google-chrome-bdc61b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2936%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2935-type-confusion-in-google-chrome-bdc617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2935%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2934-out-of-bounds-memory-access-in-google-chrome-bdc613</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2934%3A%20Out%20of%20bounds%20memory%20access%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2933-use-after-free-in-google-chrome-bdc60f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2933%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc60f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2932-use-after-free-in-google-chrome-bdc60b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2932%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc60b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2931-use-after-free-in-google-chrome-bdc607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2931%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2930-use-after-free-in-google-chrome-bdc603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2930%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2929-out-of-bounds-write-in-google-chrome-bdc5f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2929%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc5f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0329-cwe-89-sql-injection-in-unknown-elementor-website-builder-bf4f29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0329%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Elementor%20Website%20Builder&amp;severity=high&amp;id=682d9846c4522896dcbf4f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2952-loop-with-unreachable-exit-condition-eab9e760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2952%3A%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909262dfe7723195e0b5eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-30-f12da8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-29-760d47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-29&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb760d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-29-f12bb2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-28-f123bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f123bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-27-f12231</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32315-cwe-22-improper-limitation-of-a-pat-b3a58f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32315%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20igniterealtime%20Openfire&amp;severity=high&amp;id=68f7d9a9247d717aace2197c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2879-loop-with-unreachable-exit-condition-dc8347cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2879%3A%20Loop%20with%20unreachable%20exit%20condition%20(&apos;infinite%20loop&apos;)%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909262dfe7723195e0b5e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2858-buffer-over-read-in-wireshark-in-wir-60a5a442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2858%3A%20Buffer%20over-read%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909262dfe7723195e0b5e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2856-buffer-over-read-in-wireshark-in-wir-40a1cf30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2856%3A%20Buffer%20over-read%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909262dfe7723195e0b5e8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2855-buffer-over-read-in-wireshark-in-wir-1c159db9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2855%3A%20Buffer%20over-read%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909262dfe7723195e0b5e84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1981-cwe-400-in-avahi-61484f91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1981%3A%20CWE-400%20in%20avahi&amp;severity=medium&amp;id=69092629fe7723195e0b5cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2283-cwe-287-in-libssh-770ff802</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2283%3A%20CWE-287%20in%20libssh&amp;severity=null&amp;id=69092143fe7723195e053ef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-26-f12bdb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28370-open-redirect-in-tornadoweb-tornado-e04080fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28370%3A%20Open%20redirect%20in%20tornadoweb%20Tornado&amp;severity=medium&amp;id=6909262dfe7723195e0b5e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volt-typhoon-targets-us-critical-infrastructure-wi-5aed1876</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Volt%20Typhoon%20targets%20US%20critical%20infrastructure%20with%20living-off-the-land%20techniques&amp;severity=high&amp;id=68367c0a182aa0cae2311cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0950-cwe-129-improper-validation-of-array-index-in-the-document-foundation-libreoffice-bf4f3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0950%3A%20CWE-129%20Improper%20Validation%20of%20Array%20Index%20in%20The%20Document%20Foundation%20LibreOffice&amp;severity=high&amp;id=682d9846c4522896dcbf4f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-25-f129b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f129b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques-f0c25c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Volt%20Typhoon%20targets%20US%20critical%20infrastructure%20with%20living-off-the-land%20techniques&amp;severity=high&amp;id=682acdbebbaf20d303f0c25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33246-cwe-94-improper-control-of-generati-a535778a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33246%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20RocketMQ&amp;severity=critical&amp;id=68f7d9a9247d717aace21ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33010-cwe-120-buffer-copy-without-checkin-954e6b6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33010%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=critical&amp;id=68f7d9a9247d717aace21ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33009-cwe-120-buffer-copy-without-checkin-1872eea8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33009%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Zyxel%20ATP%20series%20firmware&amp;severity=critical&amp;id=68f7d9a9247d717aace21ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-24-f12327</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-23-f1294c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f1294c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-22-f13186</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-21-f12056</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f12056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-20-f126f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f126f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-19-f123a5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f123a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33204-na-ded40698</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33204%3A%20n%2Fa&amp;severity=high&amp;id=6908ed741c2a0078ae510247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-33203-n-a-in-n-a-bdc660</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-33203%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-18-f12764</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2745-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-wordpress-foundation-wordpress-bf0be6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2745%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20WordPress%20Foundation%20WordPress&amp;severity=medium&amp;id=682d983fc4522896dcbf0be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-17-740235</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-17&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb740235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-17-f126c1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f126c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2726-inappropriate-implementation-in-google-chrome-bdc5e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2726%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2725-use-after-free-in-google-chrome-bdc5c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2725%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2724-type-confusion-in-google-chrome-bdc5af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2724%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2723-use-after-free-in-google-chrome-bdc5a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2723%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2722-use-after-free-in-google-chrome-bdc59f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2722%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2721-use-after-free-in-google-chrome-bdc597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2721%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-16-f12380</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12380</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-15-f1264b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f1264b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-14-f126ac</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f126ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-13-76f5b0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-13&amp;severity=medium&amp;id=682c7ac3e3e6de8ceb76f5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-13-f130d0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f130d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25927-cwe-20-improper-input-validation-in-83acea4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25927%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20Security%20Verify%20Access&amp;severity=medium&amp;id=6909262bfe7723195e0b5e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2088-cwe-440-cwe-200-in-openstack-9983be0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2088%3A%20CWE-440-%3ECWE-200%20in%20OpenStack&amp;severity=medium&amp;id=690a2a2693114d0ef5ccabf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-12-f12e30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32668-na-84f40daa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32668%3A%20n%2Fa&amp;severity=medium&amp;id=69092630fe7723195e0b5f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30394-na-in-na-b0cb0d96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30394%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839bd14182aa0cae2b3381b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-11-f12b93</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-10-f13171</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f13171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29336-cwe-416-use-after-free-in-microsoft-75fc4b9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29336%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201507&amp;severity=high&amp;id=6835e4b9182aa0cae2196366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24955-cwe-94-improper-control-of-generati-fde54f72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24955%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=68f7d9a6247d717aace218a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2610-cwe-190-integer-overflow-or-wraparou-15950fe7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2610%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=69092143fe7723195e053f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31239-n-a-in-n-a-bdba86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31239%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdba86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-09-f12a8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0603-cwe-79-cross-site-scripting-xss-in-unknown-sloth-logo-customizer-bf4f3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0603%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Sloth%20Logo%20Customizer&amp;severity=high&amp;id=682d9846c4522896dcbf4f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0536-cwe-79-cross-site-scripting-xss-in-unknown-wp-d3-bdc438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0536%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Wp-D3&amp;severity=medium&amp;id=682d981fc4522896dcbdc438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1806-cwe-79-cross-site-scripting-xss-in-unknown-wp-inventory-manager-bdc48a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1806%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Inventory%20Manager&amp;severity=medium&amp;id=682d981fc4522896dcbdc48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1651-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-bdc482</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1651%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AI%20ChatBot&amp;severity=medium&amp;id=682d981fc4522896dcbdc482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1011-cwe-352-cross-site-request-forgery-csrf-in-unknown-ai-chatbot-bdc472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1011%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20AI%20ChatBot&amp;severity=medium&amp;id=682d981fc4522896dcbdc472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0544-cwe-79-cross-site-scripting-xss-in-unknown-wp-login-box-bdc43e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0544%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Login%20Box&amp;severity=medium&amp;id=682d981fc4522896dcbdc43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1660-cwe-79-cross-site-scripting-xss-in-unknown-ai-chatbot-bdc486</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1660%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20AI%20ChatBot&amp;severity=medium&amp;id=682d981fc4522896dcbdc486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0421-cwe-79-cross-site-scripting-xss-in-unknown-cloud-manager-bdc423</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0421%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Cloud%20Manager&amp;severity=medium&amp;id=682d981fc4522896dcbdc423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28180-a-user-in-a-privileged-network-posi-336a6533</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28180%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=690a531e2a90255b94da5f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27958-a-remote-user-may-be-able-to-cause--2d18d0fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27958%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=690a531e2a90255b94da5f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27953-a-remote-user-may-be-able-to-cause--fca6455c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27953%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=690a531d2a90255b94da5f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27935-a-remote-user-may-be-able-to-cause--c72e340a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27935%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a531d2a90255b94da5f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27934-a-remote-attacker-may-be-able-to-ca-6f5ee156</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27934%3A%20A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=690a531d2a90255b94da5f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2513-cwe-416-in-linux-kernel-ext4-filesystem-bf4f90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2513%3A%20CWE-416%20in%20Linux%20kernel%20ext4%20filesystem&amp;severity=medium&amp;id=682d9846c4522896dcbf4f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32233-n-a-in-n-a-bdc64d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc64d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-08-f124ea</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f124ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-07-f12c57</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-06-f12bc0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-32269-n-a-in-n-a-bdc65c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-32269%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-05-f128ca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21492-cwe-532-insertion-of-sensitive-info-4f7b4405</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21492%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=68f7d9a5247d717aace216e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-04-f1265e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f1265e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-03-f12c99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-02-f12a25</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-05-01-f11fbd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-05-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-30-f124ee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f124ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-29-f122fc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f122fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28528-cwe-78-improper-neutralization-of-s-0e9b084e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28528%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20AIX&amp;severity=high&amp;id=690a531f2a90255b94da5f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31484-na-61c8a638</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31484%3A%20n%2Fa&amp;severity=high&amp;id=69092630fe7723195e0b5f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-28-f12c7e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-27-f12946</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-26-f1268f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f1268f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25815-cwe-22-improper-limitation-of-a-pat-3ddea553</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25815%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20git-for-windows%20git&amp;severity=low&amp;id=690a2ddcf0ba78a050535a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29552-na-beeac5dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29552%3A%20n%2Fa&amp;severity=high&amp;id=68f7d9a8247d717aace21938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28771-cwe-78-improper-neutralization-of-s-949fc37d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28771%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Zyxel%20ZyWALL%2FUSG%20series%20firmware&amp;severity=critical&amp;id=68f7d9a8247d717aace2191f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31223-na-in-na-13e4f2e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31223%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b73032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26098-na-in-na-e4c0eeb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26098%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b7301b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-25-f12e3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27524-cwe-1188-insecure-default-initializ-8765dda7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27524%3A%20CWE-1188%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Apache%20Software%20Foundation%20Apache%20Superset&amp;severity=high&amp;id=68f7d9a7247d717aace218db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29479-na-541687eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29479%3A%20n%2Fa&amp;severity=medium&amp;id=6920c6d9d9b8477547869884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-31083-na-04531b89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-31083%3A%20n%2Fa&amp;severity=null&amp;id=6909262ffe7723195e0b5f0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28484-na-in-na-ff3ff9c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28484%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683a0def182aa0cae2be9818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26099-na-in-na-bca34f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26099%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b7301d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26097-na-in-na-19524c24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26097%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b73019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2006-cwe-362-in-linux-kernel-s-rxrpc-network-protocol-bf4f88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2006%3A%20CWE-362%20in%20Linux%20kernel&apos;s%20RxRPC%20network%20protocol&amp;severity=high&amp;id=682d9846c4522896dcbf4f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-24-f1281e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f1281e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-23-f12bfc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-22-f13167</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30798-cwe-400-uncontrolled-resource-consu-5246e5ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30798%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Encode%20Starlette&amp;severity=high&amp;id=69209279b50ca2a0e366a940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-21-f126cd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f126cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27350-cwe-284-improper-access-control-in--8fa04798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27350%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20PaperCut%20NG&amp;severity=critical&amp;id=68f7d9a7247d717aace218d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2194-cwe-787-in-linux-kernel-i2c-xgene-slimpro-bf4f8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2194%3A%20CWE-787%20in%20Linux%20kernel%3A%20i2c%3A%20xgene-slimpro&amp;severity=medium&amp;id=682d9846c4522896dcbf4f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2176-cwe-125-in-kernel-bdc587</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2176%3A%20CWE-125%20in%20Kernel&amp;severity=high&amp;id=682d981fc4522896dcbdc587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20873-security-bypass-with-spring-boot-when-deployed-to-cloud-foundry-in-spring-boot-bdc49d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20873%3A%20Security%20Bypass%20with%20Spring%20Boot%20when%20deployed%20to%20Cloud%20Foundry%20in%20Spring%20Boot&amp;severity=critical&amp;id=682d981fc4522896dcbdc49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-20-f12d28</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/3cx-software-supply-chain-compromise-initiated-by-a-prior-software-supply-chain-compromise-suspected-north-korean-actor-responsible-f0c256</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=3CX%20Software%20Supply%20Chain%20Compromise%20Initiated%20by%20a%20Prior%20Software%20Supply%20Chain%20Compromise%3B%20Suspected%20North%20Korean%20Actor%20Responsible&amp;severity=high&amp;id=682acdbebbaf20d303f0c256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30797-cwe-330-use-of-insufficiently-rando-21333462</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30797%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Netflix%20Lemur&amp;severity=high&amp;id=69209279b50ca2a0e366a93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2136-integer-overflow-in-google-chrome-d3a14674</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2136%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=critical&amp;id=68f7d9a9247d717aace2195c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22894-na-2c4507fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22894%3A%20n%2Fa&amp;severity=critical&amp;id=690e290721ad410e2906d1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22893-na-b038b5c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22893%3A%20n%2Fa&amp;severity=high&amp;id=690e290721ad410e2906d1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22621-na-5498c521</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22621%3A%20n%2Fa&amp;severity=critical&amp;id=690e290721ad410e2906d1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-19-f127fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f127fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30608-cwe-1333-inefficient-regular-expres-2fa65f93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30608%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20andialbrecht%20sqlparse&amp;severity=medium&amp;id=6909262ffe7723195e0b5ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27043-na-22551364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27043%3A%20n%2Fa&amp;severity=medium&amp;id=69092143fe7723195e053ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-18-f13054</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f13054</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1413-cwe-79-cross-site-scripting-xss-in-unknown-wp-vr-bf4f7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1413%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20VR&amp;severity=medium&amp;id=682d9846c4522896dcbf4f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-17-f1318e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f1318e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-30772-n-a-in-n-a-bdc649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-30772%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-16-f12c19</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22670-n-a-in-n-a-bdc4ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22670%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22669-n-a-in-n-a-bdc4a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22669%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-15-f11ff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2033-type-confusion-in-google-chrome-a0d280e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2033%3A%20Type%20Confusion%20in%20Google%20Chrome&amp;severity=high&amp;id=68f7d9a8247d717aace21943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29491-na-357076aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29491%3A%20n%2Fa&amp;severity=null&amp;id=690a439b6d939959c8fdd598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29383-na-da1cd7c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29383%3A%20n%2Fa&amp;severity=null&amp;id=690904a900ff46172d4a0149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-2008-cwe-129-in-linux-kernel-udmabuf-device-driver-bdc578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-2008%3A%20CWE-129%20in%20Linux%20kernel%20udmabuf%20device%20driver&amp;severity=high&amp;id=682d981fc4522896dcbdc578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-14-f12517</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snowyamber-malware-analysis-report-777c09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SNOWYAMBER%20-%20Malware%20Analysis%20Report&amp;severity=high&amp;id=682c7adae3e6de8ceb777c09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-13-76bb42</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-13&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76bb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-13-f12f73</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snowyamber-halfrig-quarterrig-ioc-reference-f0f1a1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SNOWYAMBER%2C%20HALFRIG%2C%20QUARTERRIG%20-%20IoC%20Reference&amp;severity=high&amp;id=682acdbebbaf20d303f0f1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/quarterrig-malware-analysis-report-f0c249</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=QUARTERRIG%20-%20Malware%20Analysis%20Report&amp;severity=high&amp;id=682acdbebbaf20d303f0c249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/halfrig-malware-analysis-report-f0c247</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HALFRIG%20-%20Malware%20Analysis%20Report&amp;severity=high&amp;id=682acdbebbaf20d303f0c247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/snowyamber-halfrig-quarterrig-ioc-reference-f0c243</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SNOWYAMBER%2C%20HALFRIG%2C%20QUARTERRIG%20-%20IoC%20Reference&amp;severity=high&amp;id=682acdbebbaf20d303f0c243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1994-null-pointer-dereference-in-wireshar-52b115b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1994%3A%20Null%20pointer%20dereference%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=6909262bfe7723195e0b5dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1993-excessive-iteration-in-wireshark-in--e6fe6cf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1993%3A%20Excessive%20iteration%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5d0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1992-buffer-over-read-in-wireshark-in-wir-2ce1a0b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1992%3A%20Buffer%20over-read%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-12-f12f81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28252-cwe-122-heap-based-buffer-overflow--6d898557</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28252%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a8247d717aace21916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28229-cwe-591-sensitive-data-storage-in-i-fd92f68a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28229%3A%20CWE-591%3A%20Sensitive%20Data%20Storage%20in%20Improperly%20Locked%20Memory%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a7247d717aace21907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28766-cwe-476-null-pointer-dereference-in-e3e717c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28766%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20SIPROTEC%205%206MD85%20(CP300)&amp;severity=high&amp;id=6913a08cf4d5bbdab5b1c772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29492-na-d11d07f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29492%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9a8247d717aace21934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-github-user-and-account-distributing-malicious-code-and-running-sordeal-stealer-777dd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20GitHub%20user%20and%20account%20-%20distributing%20malicious%20code%20and%20running%20%20Sordeal-Stealer&amp;severity=medium&amp;id=682c7adbe3e6de8ceb777dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-11-f11ffb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4827-cwe-79-cross-site-scripting-xss-in-unknown-wp-tiles-bf4f21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4827%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Tiles&amp;severity=medium&amp;id=682d9846c4522896dcbf4f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0422-cwe-79-cross-site-scripting-xss-in-unknown-article-directory-bdc427</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0422%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Article%20Directory&amp;severity=medium&amp;id=682d981fc4522896dcbdc427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28206-an-app-may-be-able-to-execute-arbit-ac9ee79a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28206%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9a7247d717aace218ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28205-processing-maliciously-crafted-web--97560e8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28205%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9a7247d717aace218f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1668-cwe-670-in-openvswitch-bf4f7e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1668%3A%20CWE-670%20in%20openvswitch&amp;severity=high&amp;id=682d9846c4522896dcbf4f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27076-n-a-in-n-a-bdc52c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27076%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26068-n-a-in-n-a-bdc4c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26068%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-10-f121e3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f121e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-09-f12f03</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24626-n-a-in-n-a-bd7364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24626%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-08-f120bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f120bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-07-f12ebf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26083-na-7613ef83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26083%3A%20n%2Fa&amp;severity=low&amp;id=68f7d9a6247d717aace218b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28500-n-a-in-n-a-bdc540</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28500%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-06-f125c3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f125c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0842-prototype-pollution-in-xml2js-11857b9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0842%3A%20Prototype%20Pollution%20in%20xml2js&amp;severity=medium&amp;id=69309dba728fb3f62ec6d166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-05-f12a8c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28997-cwe-323-reusing-a-nonce-key-pair-in-068fb282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28997%3A%20CWE-323%3A%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=6908f50bf612d110fe9cbe40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0835-server-side-xss-in-markdown-pdf-eb0aacb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0835%3A%20Server%20Side%20XSS%20in%20markdown-pdf&amp;severity=high&amp;id=69309dba728fb3f62ec6d162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29323-na-77dab4a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29323%3A%20n%2Fa&amp;severity=null&amp;id=690a439b6d939959c8fdd58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1671-na-in-sophos-sophos-web-appliance-b88f006e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1671%3A%20n%2Fa%20in%20Sophos%20Sophos%20Web%20Appliance&amp;severity=critical&amp;id=68f7d9a4247d717aace216a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-21514-na-in-na-f6d57c9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-21514%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5e1b0bd07c3938ff51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-04-f122af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f122af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-04-03-885ba2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-04-03&amp;severity=medium&amp;id=682b68f8d14de609c8885ba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-03-f126e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f126e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-02-f12bdf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-04-01-f128b7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-04-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f128b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28756-na-45f91ad1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28756%3A%20n%2Fa&amp;severity=null&amp;id=690a2dddf0ba78a050535ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28755-na-171d5eee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28755%3A%20n%2Fa&amp;severity=medium&amp;id=690904a900ff46172d4a013a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-31-f1233e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f1233e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26116-regular-expression-denial-of-servic-f659befb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26116%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20angular&amp;severity=medium&amp;id=690904a900ff46172d4a011c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26118-regular-expression-denial-of-servic-9341644a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26118%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20angular&amp;severity=medium&amp;id=690904a900ff46172d4a0130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26117-regular-expression-denial-of-servic-e0db6a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26117%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20angular&amp;severity=medium&amp;id=690904a900ff46172d4a0126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27535-authentication-bypass-by-primary-we-29012c92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27535%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20(CWE-305)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=medium&amp;id=68487f5e1b0bd07c3938ff1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27538-authentication-bypass-by-primary-we-070b143d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27538%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20(CWE-305)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=high&amp;id=68487f5e1b0bd07c3938fafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27534-path-traversal-cwe-22-in-https-github-com-curl-curl-bf4f82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27534%3A%20Path%20Traversal%20(CWE-22)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=high&amp;id=682d9846c4522896dcbf4f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-29059-n-a-in-n-a-bdc566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-29059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-30-f12513</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27167-n-a-in-n-a-bdc530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-29-f12a48</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28447-cwe-79-improper-neutralization-of-i-7a535f00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28447%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20smarty-php%20smarty&amp;severity=high&amp;id=6909262dfe7723195e0b5e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/apt43-north-korean-group-uses-cybercrime-to-fund-espionage-operations-777cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=APT43%3A%20North%20Korean%20Group%20Uses%20Cybercrime%20to%20Fund%20Espionage%20Operations&amp;severity=high&amp;id=682c7adae3e6de8ceb777cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-28-f1248d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1248d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0589-cwe-79-cross-site-scripting-xss-in-unknown-wp-image-carousel-bdc442</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0589%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Image%20Carousel&amp;severity=medium&amp;id=682d981fc4522896dcbdc442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1400-cwe-79-cross-site-scripting-xss-in-unknown-modern-events-calendar-lite-bf4f61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1400%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Modern%20Events%20Calendar%20Lite&amp;severity=medium&amp;id=682d9846c4522896dcbf4f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1073-cwe-119-in-kernel-bf4f42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1073%3A%20CWE-119%20in%20kernel&amp;severity=medium&amp;id=682d9846c4522896dcbf4f42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28866-n-a-in-n-a-bdc548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28866%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1078-cwe-787-in-linux-kernel-bdc476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1078%3A%20CWE-787%20in%20Linux%20kernel&amp;severity=high&amp;id=682d981fc4522896dcbdc476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-27-f130a9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-27&amp;severity=medium&amp;id=682acdc2bbaf20d303f130a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26802-n-a-in-n-a-bdc528</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26802%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26801-n-a-in-n-a-bdc51b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26801%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdc51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-26-76715e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-26&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb76715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-26-f11fe4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-25-f127b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-20963-elevation-of-privilege-in-android-43d7d28a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-20963%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=68f7d9a5247d717aace216dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28152-na-in-na-60cd4fb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28152%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28151-na-in-na-bb15132c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28151%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28150-na-in-na-829822bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28150%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b7301f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-24-f12bb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1544-out-of-bounds-read-888263ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1544%3A%20Out-of-bounds%20Read&amp;severity=medium&amp;id=690904a900ff46172d4a0104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26360-improper-access-control-cwe-284-in--94c25d6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26360%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=68f7d9a6247d717aace218bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26359-deserialization-of-untrusted-data-c-3e5389a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26359%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=68f7d9a6247d717aace218b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1252-cwe-416-in-kernel-bf4f59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1252%3A%20CWE-416%20in%20Kernel&amp;severity=high&amp;id=682d9846c4522896dcbf4f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28772-n-a-in-n-a-bdc544</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28772%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-23-f12b3c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0464-inefficient-algorithmic-complexity-in-openssl-openssl-bdc434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0464%3A%20inefficient%20algorithmic%20complexity%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28708-cwe-523-unprotected-transport-of-cr-b72eb54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28708%3A%20CWE-523%20Unprotected%20Transport%20of%20Credentials%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=medium&amp;id=690204523aaa02566521b4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0386-cwe-282-in-kernel-cdea8f17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0386%3A%20CWE-282%20in%20Kernel&amp;severity=high&amp;id=68f7d9a4247d717aace21690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-22-f12929</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bad-magic-new-apt-found-in-the-area-of-russo-ukrainian-conflict-f0e64a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Bad%20magic%3A%20new%20APT%20found%20in%20the%20area%20of%20Russo-Ukrainian%20conflict&amp;severity=low&amp;id=682acdbebbaf20d303f0e64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1530-use-after-free-in-google-chrome-bdc47e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1530%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-21-f1203f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f1203f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-20-f130ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f130ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28617-na-609e3c8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28617%3A%20n%2Fa&amp;severity=high&amp;id=69092143fe7723195e053ef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-19-f12c55</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-18-f12585</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28531-na-4a736493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28531%3A%20n%2Fa&amp;severity=null&amp;id=690a439b6d939959c8fdd56e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24678-n-a-in-n-a-bdc4ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24678%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-17-f11f85</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25280-na-ba0aa455</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25280%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9a6247d717aace218a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1390-cwe-1050-in-linux-kernel-tipc-kernel-module-bf4f5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1390%3A%20CWE-1050%20in%20Linux%20kernel%20(TIPC%20kernel%20module)&amp;severity=high&amp;id=682d9846c4522896dcbf4f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-16-f12c59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif-f0c2c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BatLoader%20Continues%20to%20Abuse%20Google%20Search%20Ads%20to%20Deliver%20Vidar%20Stealer%20and%20Ursnif&amp;severity=medium&amp;id=682acdbebbaf20d303f0c2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28450-na-ea61fd1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28450%3A%20n%2Fa&amp;severity=high&amp;id=6909262dfe7723195e0b5e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28461-na-63a337c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28461%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9a8247d717aace2191b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1389-command-injection-in-tp-link-archer--af144027</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1389%3A%20Command%20Injection%20in%20TP-Link%20Archer%20AX21%20(AX1800)&amp;severity=high&amp;id=68f7d9a4247d717aace216a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28466-n-a-in-n-a-bdc53c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28466%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc53c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-15-f126fd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f126fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-28005-n-a-in-trend-micro-inc-trend-micro-endpoint-encryption-full-disk-encryption-bdc534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-28005%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Endpoint%20Encryption%20Full%20Disk%20Encryption&amp;severity=medium&amp;id=682d981fc4522896dcbdc534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24880-security-feature-bypass-in-microsof-dadfb5e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24880%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=68f7d9a6247d717aace218a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27585-cwe-122-heap-based-buffer-overflow--241569c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27585%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20pjsip%20pjproject&amp;severity=high&amp;id=690a2ddcf0ba78a050535aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-14-f12856</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nobelium-uses-poland-s-ambassador-s-visit-to-the-u-s-to-target-eu-governments-assisting-ukraine-f0f5fb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=NOBELIUM%20Uses%20Poland&apos;s%20Ambassador%E2%80%99s%20Visit%20to%20the%20U.S.%20to%20Target%20EU%20Governments%20Assisting%20Ukraine&amp;severity=high&amp;id=682acdbebbaf20d303f0f5fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pandora-analysis-ilnas-04570323-exe-malicious-files-included-in-an-email-f0c23f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pandora%20analysis%20(Ilnas-04570323.exe)%20-%20malicious%20files%20included%20in%20an%20email&amp;severity=low&amp;id=682acdbebbaf20d303f0c23f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-13-7527fa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-13&amp;severity=medium&amp;id=682c7abde3e6de8ceb7527fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-13-f1275a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f1275a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-12-f12990</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-11-f13056</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f13056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27532-missing-authentication-for-critical-37559062</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27532%3A%20Missing%20Authentication%20for%20Critical%20Function%20(CWE-306)%20in%20Veeam%20Backup%20%26%20Replication&amp;severity=high&amp;id=68f7d9a7247d717aace218e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-10-f1318a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f1318a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-09-f12d95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-08-f12cb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25690-cwe-444-inconsistent-interpretation-ae4f1d62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25690%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20HTTP%20Server&amp;severity=critical&amp;id=6944242d4eb3efac36964747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-07-f124d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f124d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0078-cwe-79-cross-site-scripting-xss-in-unknown-resume-builder-bdc3c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0078%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Resume%20Builder&amp;severity=medium&amp;id=682d981fc4522896dcbdc3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1161-buffer-copy-without-checking-size-of-7ee478bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1161%3A%20Buffer%20copy%20without%20checking%20size%20of%20input%20(&apos;classic%20buffer%20overflow&apos;)%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-06-6d3ca431</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-06&amp;severity=medium&amp;id=68359c995d5f0974d01e01bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-06-f1421e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f1421e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-06-f12b38</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-06-6e2e23</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-06&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e2e23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-05-f122a9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f122a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1175-cwe-131-incorrect-calculation-of-buf-374dd2fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1175%3A%20CWE-131%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=69092142fe7723195e053e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-04-f121f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f121f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-27561-na-fb498f3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-27561%3A%20n%2Fa&amp;severity=high&amp;id=6941bc63535cdcbc0ad63cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-03-f12192</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f12192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1118-cwe-416-in-kernel-bf4f4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1118%3A%20CWE-416%20in%20Kernel&amp;severity=high&amp;id=682d9846c4522896dcbf4f4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-02-f11fb5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-03-01-f12be3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-03-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1017-cwe-787-out-of-bounds-write-in-trust-3b177f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1017%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Trusted%20Computing%20Group%20TPM2.0&amp;severity=null&amp;id=690a53132a90255b94da5747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1018-cwe-125-out-of-bounds-read-in-truste-0d01a565</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1018%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Trusted%20Computing%20Group%20TPM2.0&amp;severity=medium&amp;id=690a53132a90255b94da574d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41723-cwe-400-uncontrolled-resource-consumption-in-go-standard-library-net-http-bdc34a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41723%3A%20CWE%20400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Go%20standard%20library%20net%2Fhttp&amp;severity=high&amp;id=682d981fc4522896dcbdc34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22995-n-a-in-n-a-bdc4b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22995%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-28-f125b4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f125b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1061-sql-injection-in-sourcecodester-doctors-appointment-system-aeb8a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1061%3A%20SQL%20Injection%20in%20SourceCodester%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-1059-sql-injection-in-sourcecodester-doctors-appointment-system-aeb896</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-1059%3A%20SQL%20Injection%20in%20SourceCodester%20Doctors%20Appointment%20System&amp;severity=medium&amp;id=682cd0f81484d88663aeb896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23529-processing-maliciously-crafted-web--5efac92d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23529%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution.%20Apple%20is%20aware%20of%20a%20report%20that%20this%20issue%20may%20have%20been%20actively%20exploited.%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=68f7d9a6247d717aace21891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34910-na-in-na-fed6dde0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34910%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34909-na-in-na-c9f7102d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34909%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34908-na-in-na-9bbc3824</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34908%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26609-n-a-in-n-a-bdc508</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26609%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-27-f120b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f120b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26607-n-a-in-n-a-bdc504</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26607%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26606-n-a-in-n-a-bdc500</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26606%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26605-n-a-in-n-a-bdc4e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26605%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-26-e7728c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-26&amp;severity=medium&amp;id=682b7ba2d3ddd8cef2e7728c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-26-f12626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26544-n-a-in-n-a-bdc4ca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26544%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-25-f12ee8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-24-f12b02</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23920-untrusted-search-path-cwe-426-in-nodejs-node-bee378</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23920%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983bc4522896dcbee378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23919-cryptographic-issues-generic-cwe-310-in-nodejs-node-bee367</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23919%3A%20Cryptographic%20Issues%20-%20Generic%20(CWE-310)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983bc4522896dcbee367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23918-privilege-escalation-capec-233-in-nodejs-node-bd833d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23918%3A%20Privilege%20Escalation%20(CAPEC-233)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d9818c4522896dcbd833d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-23-f12666</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0933-integer-overflow-in-google-chrome-bdc46e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0933%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-22-f13035</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f13035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4714-cwe-79-cross-site-scripting-xss-in-unknown-wp-dark-mode-bdc3a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4714%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Dark%20Mode&amp;severity=medium&amp;id=682d981fc4522896dcbdc3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4750-cwe-79-cross-site-scripting-xss-in-unknown-wp-responsive-testimonials-slider-and-widget-bdc3ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4750%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Responsive%20Testimonials%20Slider%20And%20Widget&amp;severity=medium&amp;id=682d981fc4522896dcbdc3ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36656-cwe-79-cross-site-scripting-xss-in-unknown-spectra-bf4be2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36656%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Spectra&amp;severity=medium&amp;id=682d9846c4522896dcbf4be2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-26242-n-a-in-n-a-bdc4c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-26242%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-21-f1266e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f1266e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24998-cwe-770-allocation-of-resources-wit-19392f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24998%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20FileUpload&amp;severity=null&amp;id=690904a900ff46172d4a010f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-20-f12e6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-19-f12caa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-18-f12dc1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-24329-na-a2dbc968</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-24329%3A%20n%2Fa&amp;severity=high&amp;id=6909262bfe7723195e0b5def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-17-f13173</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f13173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23752-acl-in-joomla-project-joomla-cms-3b72ba03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23752%3A%20ACL%20in%20Joomla!%20Project%20Joomla!%20CMS&amp;severity=medium&amp;id=68f7d9a6247d717aace21898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-16-f1296d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f1296d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32953-n-a-in-n-a-bdc2a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32953%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc2a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32477-n-a-in-n-a-bdc275</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32477%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32475-n-a-in-n-a-bdc271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32475%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32471-n-a-in-n-a-bdc26d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32471%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc26d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32470-n-a-in-n-a-bdc269</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32470%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32469-n-a-in-n-a-bdc265</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32469%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-15-f12e1e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21823-cwe-190-integer-overflow-or-wraparo-372d7ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21823%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20Microsoft%20Microsoft%20Office%20for%20Android&amp;severity=high&amp;id=68f7d9a5247d717aace217fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23376-cwe-122-heap-based-buffer-overflow--7656ef6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23376%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a5247d717aace2181f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21715-security-feature-bypass-in-microsof-0ada88aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21715%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20365%20Apps%20for%20Enterprise&amp;severity=high&amp;id=68f7d9a5247d717aace217f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23379-cwe-23-relative-path-traversal-in-microsoft-microsoft-defender-for-iot-bed0c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23379%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Microsoft%20Microsoft%20Defender%20for%20IoT&amp;severity=high&amp;id=682d983ac4522896dcbed0c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0830-os-command-injection-in-easynas-becbb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0830%3A%20OS%20Command%20Injection%20in%20EasyNAS&amp;severity=medium&amp;id=682d9839c4522896dcbecbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-14-f121b1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f121b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25727-na-354a40b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25727%3A%20n%2Fa&amp;severity=medium&amp;id=690904a900ff46172d4a0118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25717-na-4a8371f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25717%3A%20n%2Fa&amp;severity=critical&amp;id=68f7d9a6247d717aace218ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-13-f12559</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12559</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-12-f12018</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-11-f12212</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-10-f12c4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-09-f1309a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f1309a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4304-timing-based-side-channel-attack-in-openssl-openssl-bed0b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4304%3A%20timing%20based%20side%20channel%20attack%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682d983ac4522896dcbed0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4450-double-free-in-openssl-openssl-bdc3a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4450%3A%20double-free%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc3a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0215-use-after-free-in-openssl-openssl-bdc404</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0215%3A%20use-after-free%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0216-invalid-pointer-dereference-in-openssl-openssl-bdc408</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0216%3A%20invalid%20pointer%20dereference%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0217-invalid-pointer-dereference-in-openssl-openssl-bdc41b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0217%3A%20invalid%20pointer%20dereference%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0286-type-confusion-vulnerability-in-openssl-openssl-bed0c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0286%3A%20type%20confusion%20vulnerability%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d983ac4522896dcbed0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0401-null-pointer-deference-in-openssl-openssl-bdc41f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0401%3A%20NULL%20pointer%20deference%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-08-f1279a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f1279a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23931-cwe-754-improper-check-for-unusual--a0d87506</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23931%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20pyca%20cryptography&amp;severity=medium&amp;id=6909262bfe7723195e0b5de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36471-n-a-in-n-a-bf16a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36471%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf16a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0705-integer-overflow-in-google-chrome-bdc45d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0705%3A%20Integer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc45d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0699-use-after-free-in-google-chrome-bdc44a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0699%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0698-out-of-bounds-read-in-google-chrome-bdc446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0698%3A%20Out%20of%20bounds%20read%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-07-f12d74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0669-cwe-502-deserialization-of-untrusted-975c3e6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0669%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Fortra%20Goanywhere%20MFT&amp;severity=high&amp;id=68f7d9a4247d717aace21699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2023-02-06-16aec9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202023-02-06&amp;severity=medium&amp;id=682b69a752745a861d16aec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-06-f1304e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f1304e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-05-f125cb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f125cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-04-f12986</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-03-f1262e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1262e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-02-f12cbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-25012-n-a-in-n-a-bdc4be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-25012%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc4be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-02-01-f12e2c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-02-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0341-cwe-121-in-editorconfig-editorconfig-68557fed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0341%3A%20CWE-121%20in%20EditorConfig%20EditorConfig%20C%20Core&amp;severity=high&amp;id=69092626fe7723195e0b5ada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-31-f12607</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f12607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0266-cwe-416-use-after-free-in-linux-linu-af202839</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0266%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Linux%20Kernel&amp;severity=high&amp;id=68f7d9a4247d717aace21689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22332-information-disclosure-in-pgpool-gl-6e06cc52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22332%3A%20Information%20Disclosure%20in%20PgPool%20Global%20Development%20Group%20Pgpool-II&amp;severity=medium&amp;id=6909262bfe7723195e0b5ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-30-f12cae</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-29-f12e9e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-28-f1267f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1267f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-27-f123a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f123a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41018-cwe-120-buffer-copy-without-checkin-3ce41654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41018%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siretta%20QUARTZ-GOLD&amp;severity=high&amp;id=68360ee1182aa0cae22072a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-26-f125c7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f125c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-25-f1211c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f1211c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0417-uncontrolled-memory-allocation-in-wi-08ad8657</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0417%3A%20Uncontrolled%20memory%20allocation%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092629fe7723195e0b5cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0416-expired-pointer-dereference-in-wires-f91d9af0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0416%3A%20Expired%20pointer%20dereference%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092628fe7723195e0b5ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0415-null-pointer-dereference-in-wireshar-0d62c17d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0415%3A%20Null%20pointer%20dereference%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092628fe7723195e0b5cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0413-null-pointer-dereference-in-wireshar-f0c473f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0413%3A%20Null%20pointer%20dereference%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092626fe7723195e0b5af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0412-uncontrolled-recursion-in-wireshark--ad297d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0412%3A%20Uncontrolled%20recursion%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092626fe7723195e0b5aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0411-excessive-iteration-in-wireshark-in--b7c9572a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0411%3A%20Excessive%20iteration%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=69092626fe7723195e0b5ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-24-f128d0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f128d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-23-24194ae9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-23&amp;severity=medium&amp;id=68359c9d5d5f0974d01f65bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-23-f1de23</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-23&amp;severity=medium&amp;id=682acdc3bbaf20d303f1de23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-23-f1272a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f1272a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-22-f12031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-21-7603cc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-21&amp;severity=medium&amp;id=682c7abfe3e6de8ceb7603cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-21-f122c4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-20-f12a7c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22745-cwe-120-buffer-copy-without-checkin-49f81061</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22745%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20tpm2-software%20tpm2-tss&amp;severity=medium&amp;id=6920bcb74429ea99a56abe0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-circleci-incident-report-for-january-4-2023--2e1c5058</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CircleCI%20incident%20report%20for%20January%204%2C%202023%20security%20incident&amp;severity=medium&amp;id=68359c9f5d5f0974d01fbfcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-19-f12c51</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-circleci-incident-report-for-january-4-2023-security-incident-f0e851</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CircleCI%20incident%20report%20for%20January%204%2C%202023%20security%20incident&amp;severity=medium&amp;id=682acdbebbaf20d303f0e851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/microsoft-office-365-phishing-hosted-on-ipfs-https-ipfs-io-ipfs-qmdzdtyprvvegtu7p6jz5dm3coznh2qdejtrfsuy8nncwh-f0c23d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Microsoft%20Office%20365%20Phishing%20-%20hosted%20on%20IPFS%20-%20https%3A%2F%2Fipfs.io%2Fipfs%2FQmdZDtyPrvVegTU7p6JZ5dm3CoZnH2qdEjTRfsUY8Nncwh&amp;severity=low&amp;id=682acdbebbaf20d303f0c23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21608-use-after-free-cwe-416-in-adobe-acr-a00a8e39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21608%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=high&amp;id=68f7d9a5247d717aace216e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-18-f12551</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21839-easily-exploitable-vulnerability-al-5c5bab03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21839%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20T3%2C%20IIOP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20access%20to%20critical%20data%20or%20complete%20access%20to%20all%20Oracle%20WebLogic%20Server%20accessible%20data.%20in%20Oracle%20Corporation%20WebLogic%20Server&amp;severity=high&amp;id=68f7d9a5247d717aace21801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-17-f12d64</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-16-f12d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-15-f12967</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-14-f12286</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-23559-n-a-in-n-a-bdc4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-23559%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-fg-ir-22-398-fortios-heap-based-buffer-overflow-in-sslvpnd-e68bd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20FG-IR-22-398%20%E2%80%93%20FortiOS%20-%20heap-based%20buffer%20overflow%20in%20SSLVPNd&amp;severity=high&amp;id=682b7ba0d3ddd8cef2e68bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-13-f12c8d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/analysis-of-fg-ir-22-398-fortios-heap-based-buffer-overflow-in-sslvpnd-f0c239</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Analysis%20of%20FG-IR-22-398%20%E2%80%93%20FortiOS%20-%20heap-based%20buffer%20overflow%20in%20SSLVPNd&amp;severity=high&amp;id=682acdbebbaf20d303f0c239</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-12-f1230c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1230c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-22952-na-2c40f9ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-22952%3A%20n%2Fa&amp;severity=high&amp;id=68f7d9a5247d717aace2181a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-11-c2295a01</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-11&amp;severity=medium&amp;id=68359c9d5d5f0974d01f3804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4415-cwe-200-in-systemd-bdc394</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4415%3A%20CWE-200%20in%20systemd&amp;severity=medium&amp;id=682d981fc4522896dcbdc394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-11-f1d940</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-11&amp;severity=medium&amp;id=682acdc3bbaf20d303f1d940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-11-f12a84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45092-cwe-22-improper-limitation-of-a-pat-db28a7de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45092%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Siemens%20SINEC%20INS&amp;severity=critical&amp;id=68360ee1182aa0cae22072aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-21674-cwe-416-use-after-free-in-microsoft-88103241</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-21674%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68f7d9a5247d717aace217f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45167-na-in-na-24f71770</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45166-na-in-na-2ca3cafc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45166%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45165-na-in-na-b0e71c57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45165%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45164-na-in-na-a99ebaed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45164%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38482-na-in-na-2ff39aba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38482%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38481-na-in-na-04ce7886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38481%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b73002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36443-na-in-na-fc47feba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36443%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b73000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36442-na-in-na-af8ffb59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36442%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36441-na-in-na-9e694789</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36441%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30332-na-in-na-0c89290e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30332%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-godfather-trojan-iocs-ebf68dcc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Godfather%20Trojan%20IOCs&amp;severity=high&amp;id=68359c9d5d5f0974d01f8086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0138-heap-buffer-overflow-in-google-chrome-bdc400</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0138%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0137-heap-buffer-overflow-in-google-chrome-bdc3fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0137%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0136-inappropriate-implementation-in-google-chrome-bdc3f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0136%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc3f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0135-use-after-free-in-google-chrome-bdc3e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0135%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0134-use-after-free-in-google-chrome-bdc3df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0134%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0129-heap-buffer-overflow-in-google-chrome-bdc3d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0129%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0128-use-after-free-in-google-chrome-bdc3cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0128%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-10-f121af</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f121af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-godfather-trojan-iocs-f0e4d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Godfather%20Trojan%20IOCs&amp;severity=high&amp;id=682acdbebbaf20d303f0e4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-vt-collection-godfather-malware-returns-targeting-banking-users-f0c22a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20(VT%20Collection)%20-%20GodFather%20Malware%20Returns%20Targeting%20Banking%20Users&amp;severity=low&amp;id=682acdbebbaf20d303f0c22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-09-f12efb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-08-f12348</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2016-15013-cwe-89-sql-injection-in-forumhulp-s-d03deddd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2016-15013%3A%20CWE-89%20SQL%20Injection%20in%20ForumHulp%20searchresults&amp;severity=medium&amp;id=68371302182aa0cae24e8df2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-10025-cwe-404-denial-of-service-in-luelis-761e8c75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-10025%3A%20CWE-404%20Denial%20of%20Service%20in%20luelista%20miniConf&amp;severity=low&amp;id=68371302182aa0cae24e8df0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36644-cwe-79-cross-site-scripting-in-jame-10ddeb5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36644%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20jamesmartin%20Inline%20SVG&amp;severity=low&amp;id=68371692182aa0cae24f0c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-07-f12576</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-10008-cwe-89-sql-injection-in-sheilazpy-e-57d3eff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-10008%3A%20CWE-89%20SQL%20Injection%20in%20sheilazpy%20eShop&amp;severity=medium&amp;id=68371692182aa0cae24f0c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4879-cwe-285-improper-authorization-in-fo-b59f194f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4879%3A%20CWE-285%20Improper%20Authorization%20in%20Forged%20Alliance%20Forever&amp;severity=medium&amp;id=68371692182aa0cae24f0c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-06-f12745</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-10015-cwe-89-sql-injection-in-glidernet-o-467ad027</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-10015%3A%20CWE-89%20SQL%20Injection%20in%20glidernet%20ogn-live&amp;severity=medium&amp;id=68371692182aa0cae24f0c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2014-125041-cwe-89-sql-injection-in-miccighel--7c764cf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2014-125041%3A%20CWE-89%20SQL%20Injection%20in%20Miccighel%20PR-CWT&amp;severity=medium&amp;id=68360ee1182aa0cae22072a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4304-cwe-77-command-injection-in-eprintsu-ad29d51c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4304%3A%20CWE-77%20Command%20Injection%20in%20eprintsug%20ulcc-core&amp;severity=medium&amp;id=68371692182aa0cae24f0c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-05-f128d8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f128d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4876-cwe-79-cross-site-scripting-in-kaltu-56e725e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4876%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20Kaltura%20mwEmbed&amp;severity=low&amp;id=68371692182aa0cae24f0c6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-0054-cwe-787-out-of-bounds-write-in-vim-v-73dc9320</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-0054%3A%20CWE-787%20Out-of-bounds%20Write%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=69092142fe7723195e053e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-04-f1296b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f1296b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2012-10002-cwe-79-cross-site-scripting-in-ahmy-c6bd6a9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2012-10002%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20ahmyi%20RivetTracker&amp;severity=low&amp;id=68371692182aa0cae24f0c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-03-f12bdd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-25093-cwe-79-cross-site-scripting-in-drag-43b564f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-25093%3A%20CWE-79%20Cross%20Site%20Scripting%20in%20dragonexpert%20Recent%20Threads%20on%20Index&amp;severity=low&amp;id=68371692182aa0cae24f0c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-02-f1213b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f1213b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4297-privilege-escalation-in-trampgeek-jo-cd842906</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4297%3A%20Privilege%20Escalation%20in%20trampgeek%20jobe&amp;severity=medium&amp;id=68371692182aa0cae24f0c54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2023-01-01-f1266a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202023-01-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f1266a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-31-f1205a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f1205a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42257-cwe-190-in-nvidia-vgpu-software-guest-driver-linux-vgpu-software-virtual-gpu-manager-nvidia-cloud-gaming-guest-driver-nvidia-cloud-gaming-virtual-gpu-manager-bf4d92</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42257%3A%20CWE-190%20in%20NVIDIA%20vGPU%20software%20(guest%20driver)%20-%20Linux%2C%20vGPU%20software%20(Virtual%20GPU%20Manager)%2C%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)%2C%20NVIDIA%20Cloud%20Gaming%20(Virtual%20GPU%20Manager)&amp;severity=medium&amp;id=682d9846c4522896dcbf4d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42255-cwe-787-in-nvidia-vgpu-software-guest-driver-linux-vgpu-software-virtual-gpu-manager-nvidia-cloud-gaming-guest-driver-nvidia-cloud-gaming-virtual-gpu-manager-bf4d8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42255%3A%20CWE-787%20in%20NVIDIA%20vGPU%20software%20(guest%20driver)%20-%20Linux%2C%20vGPU%20software%20(Virtual%20GPU%20Manager)%2C%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)%2C%20NVIDIA%20Cloud%20Gaming%20(Virtual%20GPU%20Manager)&amp;severity=medium&amp;id=682d9846c4522896dcbf4d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34679-cwe-476-in-nvidia-vgpu-software-guest-driver-linux-vgpu-software-virtual-gpu-manager-nvidia-cloud-gaming-guest-driver-nvidia-cloud-gaming-virtual-gpu-manager-bf4d0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34679%3A%20CWE-476%20in%20NVIDIA%20vGPU%20software%20(guest%20driver)%20-%20Linux%2C%20vGPU%20software%20(Virtual%20GPU%20Manager)%2C%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)%2C%20NVIDIA%20Cloud%20Gaming%20(Virtual%20GPU%20Manager)&amp;severity=medium&amp;id=682d9846c4522896dcbf4d0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-30-f120d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f120d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-29-f128e9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f128e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bluenoroff-introduces-new-methods-bypassing-motw-7e3b341d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BlueNoroff%20introduces%20new%20methods%20bypassing%20MoTW&amp;severity=medium&amp;id=68515d4fa8c921274385ac0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-28-f1209c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1209c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-27-f12766</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-26-f121ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-25-f13165</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-25&amp;severity=medium&amp;id=682acdc2bbaf20d303f13165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-24-f126c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f126c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44510-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4ea3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44510%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-23-76ca5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-23&amp;severity=medium&amp;id=682c7ac3e3e6de8ceb76ca5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-23-f12996</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12996</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-22-f12399</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38060-cwe-269-improper-privilege-management-in-openstack-openstack-bd9a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38060%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20OpenStack%20OpenStack&amp;severity=high&amp;id=682d981bc4522896dcbd9a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44488-url-redirection-to-untrusted-site-open-redirect-cwe-601-in-adobe-experience-manager-bf4e86</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44488%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20(CWE-601)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44474-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44474%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44471-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44471%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44470-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44470%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44467-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44467%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44466-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44466%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44465-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44465%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44463-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44463%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42365-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42365%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42364-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4df5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42364%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42362-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4df1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42362%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42357-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4de9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42357%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42356-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4de5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42356%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42354-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4de1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42354%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42352-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42352%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42350-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4dc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42350%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42349-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42349%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42348-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4da4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42348%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42346-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4da0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42346%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4da0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42345-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4d9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42345%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4d9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35695-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4d22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35695%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35693-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4d12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35693%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4d12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30679-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4cf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30679%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-21-f1316d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f1316d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-20-f12aab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44473-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44473%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44469-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44469%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44468-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44468%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42367-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42367%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42366-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42366%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44502-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf4e96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44502%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9846c4522896dcbf4e96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44500-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf4e92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44500%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9846c4522896dcbf4e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44499-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf4e8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44499%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9846c4522896dcbf4e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44498-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf4e8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44498%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9846c4522896dcbf4e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44462-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44462%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42360-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42360%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42351-incorrect-authorization-cwe-863-in-adobe-experience-manager-bf4dcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42351%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42343-server-side-request-forgery-ssrf-cwe-918-in-adobe-adobe-campaign-classic-acc-bf4d98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42343%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Adobe%20Campaign%20Classic%20(ACC)&amp;severity=medium&amp;id=682d9846c4522896dcbf4d98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35696-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4d31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35696%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4d31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35694-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf4d1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35694%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9846c4522896dcbf4d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-19-f125e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f125e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-qnap-worm-aka-raspberry-robin-f0c228</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20QNAP%20worm%20aka%20Raspberry%20Robin&amp;severity=low&amp;id=682acdbebbaf20d303f0c228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-18-ea69db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-18&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea69db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-18-f122eb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f122eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-17-f12248</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f12248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20570-information-disclosure-in-android-bf8473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20570%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf8473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20569-elevation-of-privilege-in-android-bf846f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20569%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20568-elevation-of-privilege-in-android-bf846b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20568%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20567-elevation-of-privilege-in-android-bf845f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20567%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf845f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20566-elevation-of-privilege-in-android-bf844e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20566%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf844e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20564-elevation-of-privilege-in-android-bf8446</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20564%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf8446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20563-elevation-of-privilege-in-android-bf843e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20563%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20562-information-disclosure-in-android-bf8412</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20562%3A%20Information%20disclosure%20in%20Android&amp;severity=low&amp;id=682d984bc4522896dcbf8412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20546-elevation-of-privilege-in-android-bf840e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20546%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf840e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20545-denial-of-service-in-android-bf840a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20545%3A%20Denial%20of%20service%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf840a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20544-elevation-of-privilege-in-android-bf83ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20544%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf83ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20543-denial-of-service-in-android-bf83eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20543%3A%20Denial%20of%20service%20in%20Android&amp;severity=low&amp;id=682d984bc4522896dcbf83eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20541-information-disclosure-in-android-bf83e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20541%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf83e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20527-information-disclosure-in-android-bf83e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20527%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf83e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20526-elevation-of-privilege-in-android-bf83d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20526%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=low&amp;id=682d984bc4522896dcbf83d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20525-elevation-of-privilege-in-android-bf83a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20525%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=low&amp;id=682d984bc4522896dcbf83a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20524-elevation-of-privilege-in-android-bf83a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20524%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf83a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20523-information-disclosure-in-android-bf839a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20523%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf839a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20510-information-disclosure-in-android-bf8396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20510%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf8396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20509-elevation-of-privilege-in-android-bf838a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20509%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf838a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20508-elevation-of-privilege-in-android-bf837b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20508%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf837b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20507-elevation-of-privilege-in-android-bf8373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20507%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf8373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20506-elevation-of-privilege-in-android-bf836b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20506%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf836b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20505-elevation-of-privilege-in-android-bf8352</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20505%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf8352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20504-elevation-of-privilege-in-android-bf8341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20504%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf8341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20503-elevation-of-privilege-in-android-bf8209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20503%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf8209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20199-information-disclosure-in-android-bf8205</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20199%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf8205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38241-n-a-in-n-a-bf81cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38241%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf81cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20514-elevation-of-privilege-in-android-bf7f8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20514%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf7f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20513-information-disclosure-in-android-bf7e71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20513%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf7e71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20512-elevation-of-privilege-in-android-bf7e6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20512%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984bc4522896dcbf7e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20511-information-disclosure-in-android-bf7e69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20511%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984bc4522896dcbf7e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31650-n-a-in-n-a-bf7e61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31650%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7e61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20521-denial-of-service-in-android-bf16d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20521%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d9840c4522896dcbf16d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-16-f12d45</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4226-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-rsfirewall-bf7e2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4226%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20RSFirewall!&amp;severity=critical&amp;id=682d984bc4522896dcbf7e2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46700-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-tvos-bf8335</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46700%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf8335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46699-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-tvos-bf8331</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46699%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf8331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46698-processing-maliciously-crafted-web-content-may-disclose-sensitive-user-information-in-apple-icloud-for-windows-bf81bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46698%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20sensitive%20user%20information%20in%20Apple%20iCloud%20for%20Windows&amp;severity=medium&amp;id=682d984bc4522896dcbf81bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46697-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf81b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46697%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf81b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46696-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-tvos-bf81b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46696%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf81b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46690-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-tvos-bf7eba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46690%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46702-an-app-may-be-able-to-disclose-kernel-memory-in-apple-ios-and-ipados-bf7e40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46702%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7e40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46695-visiting-a-website-that-frames-malicious-content-may-lead-to-ui-spoofing-in-apple-tvos-bf7e3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46695%3A%20Visiting%20a%20website%20that%20frames%20malicious%20content%20may%20lead%20to%20UI%20spoofing%20in%20Apple%20tvOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7e3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46694-parsing-a-maliciously-crafted-video-file-may-lead-to-kernel-code-execution-in-apple-tvos-bf7e36</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46694%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20kernel%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7e36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46693-processing-a-maliciously-crafted-file-may-lead-to-arbitrary-code-execution-in-apple-icloud-for-windows-bf7e32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46693%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iCloud%20for%20Windows&amp;severity=high&amp;id=682d984bc4522896dcbf7e32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46692-processing-maliciously-crafted-web-content-may-bypass-same-origin-policy-in-apple-icloud-for-windows-bf7e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46692%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20bypass%20Same%20Origin%20Policy%20in%20Apple%20iCloud%20for%20Windows&amp;severity=medium&amp;id=682d984bc4522896dcbf7e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46691-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-tvos-bf7dfb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46691%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46393-n-a-in-n-a-bf7df5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46393%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46392-n-a-in-n-a-bf7df1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46392%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45969-n-a-in-n-a-bf7ded</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45969%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45338-n-a-in-n-a-bf7de9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45338%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984bc4522896dcbf7de9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45033-n-a-in-n-a-bf7de1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45033%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7de1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44236-n-a-in-n-a-bf7ddd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7ddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44235-n-a-in-n-a-bf7dd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7dd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42867-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-tvos-bf7dd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42867%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42866-an-app-may-be-able-to-read-sensitive-location-information-in-apple-tvos-bf7dc2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42866%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20tvOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7dc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40373-n-a-in-n-a-bf7dbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40373%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7dbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42865-an-app-may-be-able-to-bypass-privacy-preferences-in-apple-tvos-bf7db1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42865%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20tvOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7db1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42854-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-bf7d9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42854%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7d9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42853-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-bf7d5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42853%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7d5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42852-processing-maliciously-crafted-web-content-may-result-in-the-disclosure-of-process-memory-in-apple-tvos-bf7d59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42852%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20result%20in%20the%20disclosure%20of%20process%20memory%20in%20Apple%20tvOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7d59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42851-parsing-a-maliciously-crafted-tiff-file-may-lead-to-disclosure-of-user-information-in-apple-tvos-bf7d55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42851%3A%20Parsing%20a%20maliciously%20crafted%20TIFF%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20tvOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42850-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bf7d48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42850%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d984bc4522896dcbf7d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42859-an-app-may-be-able-to-bypass-privacy-preferences-in-apple-macos-bf7d02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42859%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42849-a-user-may-be-able-to-elevate-privileges-in-apple-tvos-bf7cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42849%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7cfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42848-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-tvos-bf7cfa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42848%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42847-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7ceb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42847%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42846-parsing-a-maliciously-crafted-video-file-may-lead-to-unexpected-system-termination-in-apple-ios-and-ipados-bf7ce3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42846%3A%20Parsing%20a%20maliciously%20crafted%20video%20file%20may%20lead%20to%20unexpected%20system%20termination%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7ce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42845-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7cd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42845%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7cd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46689-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7ca9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46689%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42862-an-app-may-be-able-to-bypass-privacy-preferences-in-apple-macos-bf7ca5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42862%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7ca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42861-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-bf7ca1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42861%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40002-n-a-in-n-a-bf7c9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40002%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40001-n-a-in-n-a-bf7c8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40001%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40000-n-a-in-n-a-bf7c74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40000%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984bc4522896dcbf7c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32945-an-app-may-be-able-to-record-audio-with-paired-airpods-in-apple-macos-bf7c6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32945%3A%20An%20app%20may%20be%20able%20to%20record%20audio%20with%20paired%20AirPods%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32943-shake-to-undo-may-allow-a-deleted-photo-to-be-re-surfaced-without-authentication-in-apple-macos-bf7c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32943%3A%20Shake-to-undo%20may%20allow%20a%20deleted%20photo%20to%20be%20re-surfaced%20without%20authentication%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32942-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32942%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46634-n-a-in-n-a-bf7c4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46634%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46631-n-a-in-n-a-bf7c45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46631%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42863-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-tvos-bf7bdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42863%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7bdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42855-an-app-may-be-able-to-use-arbitrary-entitlements-in-apple-tvos-bf7ba8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42855%3A%20An%20app%20may%20be%20able%20to%20use%20arbitrary%20entitlements%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42844-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-ios-and-ipados-bf7b88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42844%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d984bc4522896dcbf7b88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42843-a-user-may-be-able-to-view-sensitive-user-information-in-apple-tvos-bf7b80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42843%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20tvOS&amp;severity=high&amp;id=682d984bc4522896dcbf7b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42842-a-remote-user-may-be-able-to-cause-kernel-code-execution-in-apple-macos-bf7b70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42842%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20kernel%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d984bc4522896dcbf7b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42821-an-app-may-bypass-gatekeeper-checks-in-apple-macos-bf7b61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42821%3A%20An%20app%20may%20bypass%20Gatekeeper%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42805-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7b59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42805%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42841-processing-a-maliciously-crafted-package-may-lead-to-arbitrary-code-execution-in-apple-macos-bf7b51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42841%3A%20Processing%20a%20maliciously%20crafted%20package%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42840-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7b4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42840%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42837-a-remote-user-may-be-able-to-cause-unexpected-app-termination-or-arbitrary-code-execution-in-apple-macos-bf7b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42837%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d984bc4522896dcbf7b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40004-n-a-in-n-a-bf7ac6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40004%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984bc4522896dcbf7ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32916-an-app-may-be-able-to-disclose-kernel-memory-in-apple-ios-bf7a74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32916%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20iOS&amp;severity=medium&amp;id=682d984ac4522896dcbf7a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32860-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7a6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32860%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf7a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32833-an-unauthorized-user-may-be-able-to-access-browsing-history-in-apple-ios-bf7a6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32833%3A%20An%20unauthorized%20user%20may%20be%20able%20to%20access%20browsing%20history%20in%20Apple%20iOS&amp;severity=medium&amp;id=682d984ac4522896dcbf7a6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39428-n-a-in-n-a-bf7a48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39428%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39427-n-a-in-n-a-bf7a33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39427%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39426-n-a-in-n-a-bf7a2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39426%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36573-n-a-in-n-a-bf7a2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36573%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36572-n-a-in-n-a-bf7a27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36572%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33420-n-a-in-n-a-bf796f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33420%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf796f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-20589-n-a-in-n-a-bf795e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-20589%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf795e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-20588-n-a-in-n-a-bf7956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-20588%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36607-n-a-in-n-a-bf793e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36607%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf793e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42864-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf16d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42864%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d9840c4522896dcbf16d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-21219-n-a-in-n-a-bf04ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-21219%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf04ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-24855-n-a-in-n-a-bd703a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-24855%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd703a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-15-f12e4b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23514-cwe-1333-inefficient-regular-expression-complexity-in-flavorjones-loofah-bf7dab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23514%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20flavorjones%20loofah&amp;severity=medium&amp;id=682d984bc4522896dcbf7dab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23512-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-metersphere-metersphere-bf794e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23512%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20metersphere%20metersphere&amp;severity=medium&amp;id=682d984ac4522896dcbf794e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3590-cwe-918-server-side-request-forgery-ssrf-in-wordpress-wordpress-bf7e7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3590%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20WordPress%20WordPress&amp;severity=medium&amp;id=682d984bc4522896dcbf7e7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23504-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-typo3-typo3-bf7946</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23504%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d984ac4522896dcbf7946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23502-cwe-613-insufficient-session-expiration-in-typo3-typo3-bf7a50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23502%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d984ac4522896dcbf7a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23501-cwe-287-improper-authentication-in-typo3-typo3-bf7a17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23501%3A%20CWE-287%3A%20Improper%20Authentication%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d984ac4522896dcbf7a17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23500-cwe-674-uncontrolled-recursion-in-typo3-typo3-bf7d90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23500%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d984bc4522896dcbf7d90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46127-n-a-in-n-a-bf7d06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46127%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984bc4522896dcbf7d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47411-n-a-in-n-a-bf7a23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47411%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47410-n-a-in-n-a-bf7a1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47410%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47409-n-a-in-n-a-bf7a1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47409%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47408-n-a-in-n-a-bf79d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47408%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47407-n-a-in-n-a-bf79d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47407%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47406-n-a-in-n-a-bf79c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47406%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf79c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46997-n-a-in-n-a-bf79c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46997%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf79c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46996-n-a-in-n-a-bf79ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46996%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf79ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46126-n-a-in-n-a-bf7999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46126%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46125-n-a-in-n-a-bf7975</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46125%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46124-n-a-in-n-a-bf7938</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46124%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46123-n-a-in-n-a-bf7927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46123%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46117-n-a-in-n-a-bf7879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46117%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46074-n-a-in-n-a-bf7871</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46074%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46073-n-a-in-n-a-bf786b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf786b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46072-n-a-in-n-a-bf7865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46071-n-a-in-n-a-bf7854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44910-n-a-in-n-a-bf784e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44910%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf784e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3106-cwe-476-in-kernel-bf784a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3106%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf784a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9420-n-a-in-n-a-bf7846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9420%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9419-n-a-in-n-a-bf7835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9419%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46122-n-a-in-n-a-bf7670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46122%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46121-n-a-in-n-a-bf766c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46121%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf766c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46120-n-a-in-n-a-bf7668</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46119-n-a-in-n-a-bf765b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46119%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf765b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46118-n-a-in-n-a-bf7627</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46118%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44898-n-a-in-n-a-bf7623</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44898%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44832-n-a-in-n-a-bf761f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44832%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf761f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3115-cwe-476-in-kernel-bf761b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3115%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf761b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3114-cwe-476-in-kernel-bf7617</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3114%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf7617</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3113-cwe-476-in-kernel-bf7613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3113%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf7613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3112-cwe-476-in-kernel-bf7588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3112%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf7588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3111-cwe-476-in-kernel-bf757b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3111%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf757b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3110-cwe-476-in-kernel-bf7577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3110%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf7577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3108-cwe-252-in-kernel-bf74e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3108%3A%20CWE-252%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf74e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3107-cwe-476-in-kernel-bf74e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3107%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf74e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3105-cwe-476-in-kernel-bf74d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3105%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d984ac4522896dcbf74d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46609-n-a-in-n-a-bf7218</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46609%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf7218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46443-n-a-in-n-a-bf720b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46443%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf720b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46343-use-after-free-in-xorg-x11-server-bf71ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46343%3A%20use-after-free%20in%20xorg-x11-server&amp;severity=high&amp;id=682d984ac4522896dcbf71ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46342-use-after-free-in-xorg-x11-server-bf71a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46342%3A%20use-after-free%20in%20xorg-x11-server&amp;severity=high&amp;id=682d984ac4522896dcbf71a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46341-out-of-bounds-access-in-xorg-x11-server-bf7097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46341%3A%20out-of-bounds%20access%20in%20xorg-x11-server&amp;severity=high&amp;id=682d984ac4522896dcbf7097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46340-stack-overflow-in-xorg-x11-server-bf6f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46340%3A%20stack%20overflow%20in%20xorg-x11-server&amp;severity=high&amp;id=682d9849c4522896dcbf6f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46256-cwe-22-in-github-github-enterprise-server-bf6efa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46256%3A%20CWE-22%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=682d9849c4522896dcbf6efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46255-cwe-22-in-github-github-enterprise-server-bf6ee7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46255%3A%20CWE-22%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=critical&amp;id=682d9849c4522896dcbf6ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3104-cwe-476-in-kernel-bf6e82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3104%3A%20CWE-476%20in%20Kernel&amp;severity=medium&amp;id=682d9849c4522896dcbf6e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38488-n-a-in-n-a-bf6c3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38488%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9849c4522896dcbf6c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31703-vmware-vrealize-log-insight-directory-traversal-vulnerability-in-vrealize-log-insight-vrli-bf6c33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31703%3A%20VMware%20vRealize%20Log%20Insight%20Directory%20Traversal%20Vulnerability%20in%20vRealize%20Log%20Insight%20(vRLI)&amp;severity=high&amp;id=682d9849c4522896dcbf6c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31702-vmware-vrealize-network-insight-vrni-contains-command-injection-vulnerability-in-vmware-vrealize-network-insight-vrni-bf6c2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31702%3A%20VMware%20vRealize%20Network%20Insight%20(vRNI)%20contains%20command%20injection%20vulnerability%20in%20VMware%20vRealize%20Network%20Insight%20(vRNI)&amp;severity=critical&amp;id=682d9849c4522896dcbf6c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31701-broken-authentication-vulnerability-in-vmware-workspace-one-access-access-vmware-identity-manager-vidm-bf6c2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31701%3A%20Broken%20Authentication%20Vulnerability%20in%20VMware%20Workspace%20ONE%20Access%20(Access)%2C%20VMware%20Identity%20Manager%20(vIDM)&amp;severity=medium&amp;id=682d9849c4522896dcbf6c2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31700-authenticated-remote-code-execution-vulnerability-in-vmware-workspace-one-access-access-vmware-identity-manager-vidm-bf6c27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31700%3A%20Authenticated%20Remote%20Code%20Execution%20Vulnerability%20in%20VMware%20Workspace%20ONE%20Access%20(Access)%2C%20VMware%20Identity%20Manager%20(vIDM)&amp;severity=high&amp;id=682d9849c4522896dcbf6c27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31358-n-a-in-n-a-bf6c1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31358%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9849c4522896dcbf6c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23741-cwe-863-in-github-github-enterprise-server-bf6bfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23741%3A%20CWE-863%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=682d9849c4522896dcbf6bfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-14-76903a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-14&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76903a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-14-f12709</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12709</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23499-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-typo3-html-sanitizer-bf4ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23499%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20html-sanitizer&amp;severity=medium&amp;id=682d9846c4522896dcbf4ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46364-cwe-918-server-side-request-forgery-ssrf-in-apache-software-foundation-apache-cxf-bf789b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46364%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=critical&amp;id=682d984ac4522896dcbf789b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46363-cwe-20-improper-input-validation-in-apache-software-foundation-apache-cxf-bf782d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46363%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20CXF&amp;severity=high&amp;id=682d984ac4522896dcbf782d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23505-cwe-287-improper-authentication-in-auth0-passport-wsfed-saml2-bf4cda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23505%3A%20CWE-287%3A%20Improper%20Authentication%20in%20auth0%20passport-wsfed-saml2&amp;severity=medium&amp;id=682d9846c4522896dcbf4cda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23473-cwe-863-incorrect-authorization-in-enalean-tuleap-bf4c1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23473%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9846c4522896dcbf4c1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46160-cwe-863-incorrect-authorization-in-enalean-tuleap-bf4efa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46160%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9846c4522896dcbf4efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41274-cwe-863-incorrect-authorization-in-sap-disclosure-management-bf77d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41274%3A%20CWE-863%20Incorrect%20Authorization%20in%20SAP%20Disclosure%20Management&amp;severity=medium&amp;id=682d984ac4522896dcbf77d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41273-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-sap-sourcing-and-sap-contract-lifecycle-management-bf77cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41273%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20SAP%20Sourcing%20and%20SAP%20Contract%20Lifecycle%20Management&amp;severity=medium&amp;id=682d984ac4522896dcbf77cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41272-cwe-862-missing-authorization-in-sap-netweaver-process-integration-bf7c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41272%3A%20CWE-862%20Missing%20Authorization%20in%20SAP%20NetWeaver%20Process%20Integration&amp;severity=medium&amp;id=682d984bc4522896dcbf7c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41271-cwe-862-missing-authorization-in-sap-netweaver-process-integration-bf77c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41271%3A%20CWE-862%20Missing%20Authorization%20in%20SAP%20NetWeaver%20Process%20Integration&amp;severity=medium&amp;id=682d984ac4522896dcbf77c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41268-cwe-269-improper-privilege-management-in-sap-business-planning-and-consolidation-bf7504</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41268%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20SAP%20Business%20Planning%20and%20Consolidation&amp;severity=medium&amp;id=682d984ac4522896dcbf7504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41267-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-sap-businessobjects-business-intelligence-platform-bf74ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41267%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform&amp;severity=medium&amp;id=682d984ac4522896dcbf74ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41266-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sap-commerce-webservices-2-0-swagger-ui-bf74e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20Commerce%20Webservices%202.0%20(Swagger%20UI)&amp;severity=medium&amp;id=682d984ac4522896dcbf74e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41264-cwe-94-improper-control-of-generation-of-code-code-injection-in-sap-basis-bf7433</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41264%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP%20BASIS&amp;severity=medium&amp;id=682d984ac4522896dcbf7433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46664-cwe-284-improper-access-control-in-siemens-mendix-workflow-commons-bf8322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46664%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20Mendix%20Workflow%20Commons&amp;severity=medium&amp;id=682d984bc4522896dcbf8322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46349-cwe-125-out-of-bounds-read-in-siemens-parasolid-v33-1-bf831a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46349%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Parasolid%20V33.1&amp;severity=medium&amp;id=682d984bc4522896dcbf831a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46348-cwe-787-out-of-bounds-write-in-siemens-parasolid-v33-1-bf8312</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46348%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Parasolid%20V33.1&amp;severity=medium&amp;id=682d984bc4522896dcbf8312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46347-cwe-787-out-of-bounds-write-in-siemens-parasolid-v33-1-bf830a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46347%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Parasolid%20V33.1&amp;severity=medium&amp;id=682d984bc4522896dcbf830a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46265-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-siemens-polarion-alm-bf8302</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46265%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20Polarion%20ALM&amp;severity=medium&amp;id=682d984bc4522896dcbf8302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46144-cwe-664-improper-control-of-a-resource-through-its-lifetime-in-siemens-scalance-sc622-2c-bf82e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46144%3A%20CWE-664%3A%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20Siemens%20SCALANCE%20SC622-2C&amp;severity=medium&amp;id=682d984bc4522896dcbf82e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46142-cwe-257-storing-passwords-in-a-recoverable-format-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf82d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46142%3A%20CWE-257%3A%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf82d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46140-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf82c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46140%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf82c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45937-cwe-284-improper-access-control-in-siemens-apogee-pxc-compact-bacnet-bf82c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45937%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20APOGEE%20PXC%20Compact%20(BACnet)&amp;severity=medium&amp;id=682d984bc4522896dcbf82c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45484-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf82b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45484%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf82b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44731-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-siemens-simatic-wincc-oa-v3-15-bf82b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44731%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20Siemens%20SIMATIC%20WinCC%20OA%20V3.15&amp;severity=medium&amp;id=682d984bc4522896dcbf82b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43517-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-simcenter-star-ccm-bf82a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43517%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Simcenter%20STAR-CCM%2B&amp;severity=medium&amp;id=682d984bc4522896dcbf82a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41288-cwe-770-allocation-of-resources-without-limits-or-throttling-in-siemens-jt2go-bf825e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41288%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf825e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41286-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf825a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41286%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf825a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41285-cwe-416-use-after-free-in-siemens-jt2go-bf8256</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41285%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41284-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf8252</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41284%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41283-cwe-787-out-of-bounds-write-in-siemens-jt2go-bf8241</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41283%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41282-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf8226</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41282%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41281-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf8222</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41281%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41280-cwe-476-null-pointer-dereference-in-siemens-jt2go-bf8215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41280%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41279-cwe-476-null-pointer-dereference-in-siemens-jt2go-bf8211</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41279%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44695-cwe-1286-improper-validation-of-syntactic-correctness-of-input-in-siemens-simatic-drive-controller-cpu-1504d-tf-bf8201</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44695%3A%20CWE-1286%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d984bc4522896dcbf8201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44694-cwe-1287-improper-validation-of-specified-type-of-input-in-siemens-simatic-drive-controller-cpu-1504d-tf-bf81fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44694%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d984bc4522896dcbf81fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44693-cwe-1284-improper-validation-of-specified-quantity-in-input-in-siemens-simatic-drive-controller-cpu-1504d-tf-bf81f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44693%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d984bc4522896dcbf81f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40365-cwe-20-improper-input-validation-in-siemens-simatic-drive-controller-cpu-1504d-tf-bf81d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40365%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d984bc4522896dcbf81d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46832-cwe-327-in-sick-rfu62x-firmware-bf7bf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46832%3A%20CWE-327%20in%20SICK%20RFU62x%20Firmware&amp;severity=medium&amp;id=682d984bc4522896dcbf7bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46353-cwe-330-use-of-insufficiently-random-values-in-siemens-scalance-x204rna-hsr-bf7810</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46353%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Siemens%20SCALANCE%20X204RNA%20(HSR)&amp;severity=critical&amp;id=682d984ac4522896dcbf7810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46352-cwe-400-uncontrolled-resource-consumption-in-siemens-scalance-x204rna-hsr-bf7801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46352%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SCALANCE%20X204RNA%20(HSR)&amp;severity=high&amp;id=682d984ac4522896dcbf7801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46351-cwe-400-uncontrolled-resource-consumption-in-siemens-scalance-x204rna-hsr-bf77f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46351%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SCALANCE%20X204RNA%20(HSR)&amp;severity=medium&amp;id=682d984ac4522896dcbf77f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46350-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-siemens-scalance-x204rna-hsr-bf77f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46350%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Siemens%20SCALANCE%20X204RNA%20(HSR)&amp;severity=medium&amp;id=682d984ac4522896dcbf77f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46062-n-a-in-n-a-bf77ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46062%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf77ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46061-n-a-in-n-a-bf77e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf77e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45688-n-a-in-n-a-bf77d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45688%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf77d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45685-n-a-in-n-a-bf77a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45685%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf77a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45028-n-a-in-n-a-bf77a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf77a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45005-n-a-in-n-a-bf779e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45005%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d984ac4522896dcbf779e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44874-n-a-in-n-a-bf779a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf779a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44636-n-a-in-n-a-bf7796</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44636%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44575-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-siemens-plm-help-server-v4-2-bf7792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44575%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Siemens%20PLM%20Help%20Server%20V4.2&amp;severity=medium&amp;id=682d984ac4522896dcbf7792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31698-denial-of-service-vulnerability-in-vmware-vcenter-server-vmware-cloud-foundation-bf778e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31698%3A%20Denial%20of%20service%20vulnerability%20in%20VMware%20vCenter%20Server%2C%20VMware%20Cloud%20Foundation&amp;severity=medium&amp;id=682d984ac4522896dcbf778e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33268-buffer-over-read-in-bluetooth-host-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bf7637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33268%3A%20Buffer%20over-read%20in%20Bluetooth%20HOST%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d984ac4522896dcbf7637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33238-loop-with-unreachable-exit-condition-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf7633</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33238%3A%20Loop%20with%20unreachable%20exit%20condition%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d984ac4522896dcbf7633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20500-denial-of-service-in-android-bf75fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20500%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf75fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20498-information-disclosure-in-android-bf75c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20498%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf75c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20497-information-disclosure-in-android-bf75bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20497%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf75bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20496-information-disclosure-in-android-bf7573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20496%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf7573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20495-elevation-of-privilege-in-android-bf756f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20495%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf756f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20491-elevation-of-privilege-in-android-bf7569</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20491%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf7569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20488-elevation-of-privilege-in-android-bf7565</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20488%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf7565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20487-elevation-of-privilege-in-android-bf754a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20487%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf754a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20486-elevation-of-privilege-in-android-bf7546</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20486%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf7546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20475-elevation-of-privilege-in-android-bf74ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20475%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf74ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20474-elevation-of-privilege-in-android-bf74c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20474%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf74c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20473-remote-code-execution-in-android-bf74c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20473%3A%20Remote%20code%20execution%20in%20Android&amp;severity=critical&amp;id=682d984ac4522896dcbf74c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20472-remote-code-execution-in-android-bf74b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20472%3A%20Remote%20code%20execution%20in%20Android&amp;severity=critical&amp;id=682d984ac4522896dcbf74b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20471-information-disclosure-in-android-bf74a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20471%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf74a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20470-elevation-of-privilege-in-android-bf748e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20470%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20469-remote-code-execution-in-android-bf748a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20469%3A%20Remote%20code%20execution%20in%20Android&amp;severity=high&amp;id=682d984ac4522896dcbf748a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46834-cwe-327-in-sick-rfu65x-firmware-bf745e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46834%3A%20CWE-327%20in%20SICK%20RFU65x%20Firmware&amp;severity=medium&amp;id=682d984ac4522896dcbf745e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46833-cwe-327-in-sick-rfu63x-firmware-bf7456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46833%3A%20CWE-327%20in%20SICK%20RFU63x%20Firmware&amp;severity=medium&amp;id=682d984ac4522896dcbf7456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20468-information-disclosure-in-android-bf742f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20468%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf742f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20466-information-disclosure-in-android-bf742b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20466%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf742b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46404-n-a-in-n-a-bf73d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46404%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf73d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46381-n-a-in-n-a-bf73cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46381%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf73cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46355-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-siemens-scalance-x204rna-hsr-bf73c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46355%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SCALANCE%20X204RNA%20(HSR)&amp;severity=high&amp;id=682d984ac4522896dcbf73c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46354-cwe-284-improper-access-control-in-siemens-scalance-x204rna-hsr-bf73c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46354%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20SCALANCE%20X204RNA%20(HSR)&amp;severity=medium&amp;id=682d984ac4522896dcbf73c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46059-n-a-in-n-a-bf73b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf73b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20449-denial-of-service-in-android-bf736b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20449%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf736b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0934-denial-of-service-in-android-bf7351</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0934%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d984ac4522896dcbf7351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46058-n-a-in-n-a-bf733f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46058%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf733f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46051-n-a-in-n-a-bf7337</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46051%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46047-n-a-in-n-a-bf72f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46047%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf72f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45936-cwe-284-improper-access-control-in-siemens-mendix-email-connector-bf72e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45936%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20Mendix%20Email%20Connector&amp;severity=high&amp;id=682d984ac4522896dcbf72e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45871-n-a-in-n-a-bf7296</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45871%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45693-n-a-in-n-a-bf7285</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45693%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45690-n-a-in-n-a-bf727d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45690%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf727d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45689-n-a-in-n-a-bf7277</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45689%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44303-n-a-in-n-a-bf7207</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44303%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43996-n-a-in-n-a-bf7203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43996%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43724-cwe-319-cleartext-transmission-of-sensitive-information-in-siemens-sicam-pas-pqs-bf7193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43724%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Siemens%20SICAM%20PAS%2FPQS&amp;severity=critical&amp;id=682d984ac4522896dcbf7193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43723-cwe-1287-improper-validation-of-specified-type-of-input-in-siemens-sicam-pas-pqs-bf718b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43723%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Siemens%20SICAM%20PAS%2FPQS&amp;severity=high&amp;id=682d984ac4522896dcbf718b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43722-cwe-427-uncontrolled-search-path-element-in-siemens-sicam-pas-pqs-bf7172</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43722%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Siemens%20SICAM%20PAS%2FPQS&amp;severity=high&amp;id=682d984ac4522896dcbf7172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42141-n-a-in-n-a-bf716e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42141%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf716e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42140-n-a-in-n-a-bf716a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42140%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf716a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42139-n-a-in-n-a-bf7156</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42139%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38628-n-a-in-n-a-bf7125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38628%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d984ac4522896dcbf7125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37155-n-a-in-n-a-bf7101</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37155%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d984ac4522896dcbf7101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33235-buffer-over-read-in-wlan-firmware-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf70fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33235%3A%20Buffer%20over-read%20in%20WLAN%20firmware%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d984ac4522896dcbf70fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31699-heap-overflow-issues-via-vulnerability-in-vmware-esxi-vmware-cloud-foundation-bf70d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31699%3A%20Heap%20overflow%20issues%20via%20vulnerability%20in%20VMware%20ESXi%2C%20VMware%20Cloud%20Foundation&amp;severity=low&amp;id=682d984ac4522896dcbf70d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25695-improper-validation-of-array-index-in-modem-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bf70d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25695%3A%20Improper%20Validation%20of%20Array%20Index%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d984ac4522896dcbf70d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31697-information-disclosure-vulnerability-in-vmware-vcenter-server-vmware-cloud-foundation-bf7057</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31697%3A%20Information%20disclosure%20vulnerability%20in%20VMware%20vCenter%20Server%2C%20VMware%20Cloud%20Foundation&amp;severity=medium&amp;id=682d9849c4522896dcbf7057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31696-memory-corruption-vulnerability-in-vmware-esxi-vmware-cloud-foundation-bf704f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31696%3A%20Memory%20corruption%20vulnerability%20in%20VMware%20ESXi%2C%20VMware%20Cloud%20Foundation&amp;severity=high&amp;id=682d9849c4522896dcbf704f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27581-cwe-327-in-sick-rfu61x-firmware-bf7047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27581%3A%20CWE-327%20in%20SICK%20RFU61x%20Firmware&amp;severity=medium&amp;id=682d9849c4522896dcbf7047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25712-out-of-bounds-access-due-to-ion-buffer-size-mismatch-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-mobile-snapdragon-wearables-bf6ff2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25712%3A%20Out-of-bounds%20access%20due%20to%20ION%20buffer%20size%20mismatch%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25692-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf6fea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25692%3A%20Reachable%20Assertion%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25691-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-mobile-bf6fe6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25691%3A%20Reachable%20Assertion%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25689-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-mobile-bf6fd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25689%3A%20Reachable%20Assertion%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25685-improper-authentication-in-modem-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf6fcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25685%3A%20Improper%20Authentication%20in%20Modem%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25682-use-of-out-of-range-pointer-offset-in-modem-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bf6fbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25682%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41915-cwe-436-interpretation-conflict-in-netty-netty-bf6e92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41915%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20netty%20netty&amp;severity=medium&amp;id=682d9849c4522896dcbf6e92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25711-improper-validation-of-array-index-in-camera-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf6e4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25711%3A%20Improper%20Validation%20of%20Array%20Index%20in%20Camera%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25702-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf6e46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25702%3A%20Reachable%20Assertion%20in%20Modem%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25698-improper-input-validation-in-spi-buses-in-qualcomm-inc-snapdragon-mobile-snapdragon-wearables-bf6e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25698%3A%20Improper%20Input%20Validation%20in%20SPI%20Buses%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25697-improper-input-validation-in-i2c-buses-in-qualcomm-inc-snapdragon-mobile-snapdragon-wearables-bf6e2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25697%3A%20Improper%20Input%20Validation%20in%20i2c%20Buses%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25681-improper-access-control-in-kernel-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-bf6e25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25681%3A%20Improper%20Access%20Control%20in%20KERNEL%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25677-use-after-free-in-diag-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf6e1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25677%3A%20Use%20After%20Free%20in%20DIAG%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d9849c4522896dcbf6e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25675-reachable-assertion-in-data-modem-in-qualcomm-inc-snapdragon-compute-snapdragon-industrial-iot-snapdragon-mobile-bf6c16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25675%3A%20Reachable%20Assertion%20in%20Data%20Modem%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Compute%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25673-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-mobile-bf6c03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25673%3A%20Reachable%20Assertion%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6c03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25672-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-mobile-bf6bff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25672%3A%20Reachable%20Assertion%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20611-elevation-of-privilege-in-android-bf6a6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20611%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9849c4522896dcbf6a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20502-information-disclosure-in-android-bf6842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20502%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d9849c4522896dcbf6842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20501-elevation-of-privilege-in-android-bf6832</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20501%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9849c4522896dcbf6832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20479-elevation-of-privilege-in-android-bf6782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20479%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9849c4522896dcbf6782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20478-elevation-of-privilege-in-android-bf6771</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20478%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9849c4522896dcbf6771</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20477-elevation-of-privilege-in-android-bf66db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20477%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9849c4522896dcbf66db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20476-denial-of-service-in-android-bf66d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20476%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d9849c4522896dcbf66d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20485-elevation-of-privilege-in-android-bf5f82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20485%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20484-elevation-of-privilege-in-android-bf5f7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20484%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20483-information-disclosure-in-android-bf5f78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20483%3A%20Information%20disclosure%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20482-denial-of-service-in-android-bf5f6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20482%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d9848c4522896dcbf5f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20480-elevation-of-privilege-in-android-bf5f5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20480%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20442-elevation-of-privilege-in-android-bf5f59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20442%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20411-remote-code-execution-in-android-bf5f40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20411%3A%20Remote%20code%20execution%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20240-elevation-of-privilege-in-android-bf5f2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20240%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=low&amp;id=682d9848c4522896dcbf5f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39660-elevation-of-privilege-in-android-bf5f27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39660%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9848c4522896dcbf5f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32415-n-a-in-n-a-bf5edb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32415%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5edb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44696-remote-code-execution-in-microsoft-microsoft-office-2019-bed097</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44696%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=682d983ac4522896dcbed097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44691-remote-code-execution-in-microsoft-microsoft-office-ltsc-2021-bed08a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44691%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Office%20LTSC%202021&amp;severity=high&amp;id=682d983ac4522896dcbed08a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44666-remote-code-execution-in-microsoft-windows-10-version-1809-bed086</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44666%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983ac4522896dcbed086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-13-f12d72</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fortinet-says-ssl-vpn-pre-auth-rce-bug-is-exploited-in-attacks-f0c226</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Fortinet%20says%20SSL-VPN%20pre-auth%20RCE%20bug%20is%20exploited%20in%20attacks&amp;severity=high&amp;id=682acdbebbaf20d303f0c226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41263-cwe-352-cross-site-request-forgery-csrf-in-sap-business-objects-business-intelligence-platform-web-intelligence-bf739e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41263%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20SAP%20Business%20Objects%20Business%20Intelligence%20Platform%20(Web%20intelligence)&amp;severity=medium&amp;id=682d984ac4522896dcbf739e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41262-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sap-netweaver-as-for-java-http-provider-service-bf7396</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41262%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20NetWeaver%20AS%20for%20Java%20(Http%20Provider%20Service)&amp;severity=medium&amp;id=682d984ac4522896dcbf7396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41261-cwe-284-in-sap-solution-manager-diagnostic-agent-bf738e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41261%3A%20CWE-284%20in%20SAP%20Solution%20Manager%20(Diagnostic%20Agent)&amp;severity=medium&amp;id=682d984ac4522896dcbf738e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4016-cwe-352-cross-site-request-forgery-csrf-in-unknown-booster-for-woocommerce-bf73dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4016%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=682d984ac4522896dcbf73dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3921-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-listingo-bf7373</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3921%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Listingo&amp;severity=critical&amp;id=682d984ac4522896dcbf7373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3900-cwe-502-deserialization-of-untrusted-data-in-unknown-cooked-pro-bf736f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3900%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Cooked%20Pro&amp;severity=critical&amp;id=682d984ac4522896dcbf736f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3989-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-motors-bf7329</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3989%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Motors&amp;severity=high&amp;id=682d984ac4522896dcbf7329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3862-cwe-79-cross-site-scripting-xss-in-unknown-livemesh-addons-for-elementor-bf7309</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3862%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Livemesh%20Addons%20for%20Elementor&amp;severity=medium&amp;id=682d984ac4522896dcbf7309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4000-cwe-79-cross-site-scripting-xss-in-unknown-woocommerce-shipping-bf7347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4000%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WooCommerce%20Shipping&amp;severity=medium&amp;id=682d984ac4522896dcbf7347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3946-cwe-862-missing-authorization-in-unknown-welcart-e-commerce-bf5ec4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3946%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Welcart%20e-Commerce&amp;severity=medium&amp;id=682d9848c4522896dcbf5ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3881-cwe-863-incorrect-authorization-in-unknown-wp-tools-increase-maximum-limits-repair-server-php-info-javascript-errors-file-permissions-transients-error-log-bf5eb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3881%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20WP%20Tools%20Increase%20Maximum%20Limits%2C%20Repair%2C%20Server%20PHP%20Info%2C%20Javascript%20errors%2C%20File%20Permissions%2C%20Transients%2C%20Error%20Log&amp;severity=medium&amp;id=682d9848c4522896dcbf5eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3880-cwe-863-incorrect-authorization-in-unknown-disable-json-api-login-lockdown-xmlrpc-pingback-stop-user-enumeration-anti-hacker-scan-bf5eaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3880%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20Disable%20Json%20API%2C%20Login%20Lockdown%2C%20XMLRPC%2C%20Pingback%2C%20Stop%20User%20Enumeration%20Anti%20Hacker%20Scan&amp;severity=medium&amp;id=682d9848c4522896dcbf5eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3879-cwe-863-incorrect-authorization-in-unknown-car-dealer-dealership-and-vehicle-sales-wordpress-plugin-bf5ea7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3879%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20Car%20Dealer%20(Dealership)%20and%20Vehicle%20sales%20WordPress%20Plugin&amp;severity=medium&amp;id=682d9848c4522896dcbf5ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3906-cwe-79-cross-site-scripting-xss-in-unknown-easy-form-builder-bf5e77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3906%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Easy%20Form%20Builder&amp;severity=medium&amp;id=682d9848c4522896dcbf5e77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3930-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-directorist-bf66ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3930%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Directorist&amp;severity=medium&amp;id=682d9849c4522896dcbf66ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4010-cwe-79-cross-site-scripting-xss-in-unknown-image-hover-effects-bf66b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4010%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Image%20Hover%20Effects&amp;severity=medium&amp;id=682d9849c4522896dcbf66b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3999-cwe-862-missing-authorization-in-unknown-dpd-baltic-shipping-bf732f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3999%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20DPD%20Baltic%20Shipping&amp;severity=high&amp;id=682d984ac4522896dcbf732f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3609-cwe-79-cross-site-scripting-xss-in-unknown-getyourguide-ticketing-bf7305</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3609%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20GetYourGuide%20Ticketing&amp;severity=medium&amp;id=682d984ac4522896dcbf7305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3982-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-booking-calendar-appointment-booking-system-bf72d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3982%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Booking%20calendar%2C%20Appointment%20Booking%20System&amp;severity=critical&amp;id=682d984ac4522896dcbf72d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3605-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-wp-csv-exporter-bf72a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3605%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20WP%20CSV%20Exporter&amp;severity=high&amp;id=682d984ac4522896dcbf72a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3853-cwe-79-cross-site-scripting-xss-in-unknown-supra-csv-bf72c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3853%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Supra%20CSV&amp;severity=medium&amp;id=682d984ac4522896dcbf72c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3981-cwe-89-sql-injection-in-unknown-icegram-express-bf7260</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3981%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Icegram%20Express&amp;severity=high&amp;id=682d984ac4522896dcbf7260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3915-cwe-89-sql-injection-in-unknown-dokan-bf723f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3915%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Dokan&amp;severity=critical&amp;id=682d984ac4522896dcbf723f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4004-cwe-862-missing-authorization-in-unknown-donation-button-bf729a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4004%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Donation%20Button&amp;severity=medium&amp;id=682d984ac4522896dcbf729a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3935-cwe-79-cross-site-scripting-xss-in-unknown-welcart-e-commerce-bf7258</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3935%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Welcart%20e-Commerce&amp;severity=medium&amp;id=682d984ac4522896dcbf7258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3919-cwe-79-cross-site-scripting-xss-in-unknown-jetpack-crm-bf71cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3919%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Jetpack%20CRM&amp;severity=medium&amp;id=682d984ac4522896dcbf71cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3934-cwe-79-cross-site-scripting-xss-in-unknown-flatpm-bf71e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3934%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20FlatPM&amp;severity=medium&amp;id=682d984ac4522896dcbf71e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4005-cwe-79-cross-site-scripting-xss-in-unknown-donation-button-bf721c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4005%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Donation%20Button&amp;severity=medium&amp;id=682d984ac4522896dcbf721c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3925-cwe-89-sql-injection-in-unknown-buddybadges-bf71de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3925%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20buddybadges&amp;severity=high&amp;id=682d984ac4522896dcbf71de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3933-cwe-79-cross-site-scripting-xss-in-unknown-essential-real-estate-bf71e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3933%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Essential%20Real%20Estate&amp;severity=medium&amp;id=682d984ac4522896dcbf71e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3883-cwe-863-incorrect-authorization-in-unknown-block-bad-bots-and-stop-bad-bots-crawlers-and-spiders-and-anti-spam-protection-bf7176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3883%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20Block%20Bad%20Bots%20and%20Stop%20Bad%20Bots%20Crawlers%20and%20Spiders%20and%20Anti%20Spam%20Protection&amp;severity=medium&amp;id=682d984ac4522896dcbf7176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3912-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-user-registration-bf7166</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3912%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20User%20Registration&amp;severity=high&amp;id=682d984ac4522896dcbf7166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3882-cwe-863-incorrect-authorization-in-unknown-memory-usage-memory-limit-php-and-server-memory-health-check-and-fix-plugin-bf7141</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3882%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20Memory%20Usage%2C%20Memory%20Limit%2C%20PHP%20and%20Server%20Memory%20Health%20Check%20and%20Fix%20Plugin&amp;severity=medium&amp;id=682d984ac4522896dcbf7141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3908-cwe-79-cross-site-scripting-xss-in-unknown-plug-your-woocommerce-into-the-largest-catalog-of-customized-print-products-from-helloprint-bf7152</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3908%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Plug%20your%20WooCommerce%20into%20the%20largest%20catalog%20of%20customized%20print%20products%20from%20Helloprint&amp;severity=medium&amp;id=682d984ac4522896dcbf7152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3359-cwe-502-deserialization-of-untrusted-data-in-unknown-shortcodes-and-extra-features-for-phlox-theme-bf7129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3359%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Shortcodes%20and%20extra%20features%20for%20Phlox%20theme&amp;severity=high&amp;id=682d984ac4522896dcbf7129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3485-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-ifm-moneo-appliance-bf66a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3485%3A%20CWE-640%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20ifm%20moneo%20appliance&amp;severity=medium&amp;id=682d9849c4522896dcbf66a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31596-cwe-668-exposure-of-resource-to-wrong-sphere-in-sap-sap-business-objects-platform-monitoring-db-bf65a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31596%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20SAP%20SAP%20Business%20Objects%20Platform%20(Monitoring%20DB)%20&amp;severity=medium&amp;id=682d9848c4522896dcbf65a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2993-n-a-in-zephyrproject-rtos-zephyr-bf6473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2993%3A%20n%2Fa%20in%20zephyrproject-rtos%20zephyr&amp;severity=medium&amp;id=682d9848c4522896dcbf6473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2807-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-algan-software-prens-student-information-system-bf646f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2807%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Algan%20Software%20Prens%20Student%20Information%20System&amp;severity=medium&amp;id=682d9848c4522896dcbf646f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43515-cwe-20-improper-input-validation-in-zabbix-frontend-bf65a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43515%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zabbix%20Frontend&amp;severity=medium&amp;id=682d9848c4522896dcbf65a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41560-successful-execution-of-this-vulnerability-can-result-in-an-unauthorized-hang-or-frequently-repeatable-crash-complete-dos-of-the-affected-system-in-tibco-software-inc-tibco-nimbus-bf5f9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41560%3A%20Successful%20execution%20of%20this%20vulnerability%20can%20result%20in%20an%20unauthorized%20hang%20or%20frequently%20repeatable%20crash%20(complete%20DOS)%20of%20the%20affected%20system.%20in%20TIBCO%20Software%20Inc.%20TIBCO%20Nimbus&amp;severity=medium&amp;id=682d9848c4522896dcbf5f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41559-successful-execution-of-these-vulnerabilities-will-result-in-an-attacker-being-able-to-execute-commands-with-the-privileges-of-the-affected-user-in-tibco-software-inc-tibco-nimbus-bf5e97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41559%3A%20Successful%20execution%20of%20these%20vulnerabilities%20will%20result%20in%20an%20attacker%20being%20able%20to%20execute%20commands%20with%20the%20privileges%20of%20the%20affected%20user.%20in%20TIBCO%20Software%20Inc.%20TIBCO%20Nimbus&amp;severity=medium&amp;id=682d9848c4522896dcbf5e97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25912-remote-code-execution-rce-in-simple-git-bf5e73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25912%3A%20Remote%20Code%20Execution%20(RCE)%20in%20simple-git&amp;severity=medium&amp;id=682d9848c4522896dcbf5e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41881-cwe-674-uncontrolled-recursion-in-netty-netty-bf6e8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41881%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20netty%20netty&amp;severity=medium&amp;id=682d9849c4522896dcbf6e8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46905-n-a-in-n-a-bf6494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf6494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46904-n-a-in-n-a-bf6416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46904%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf6416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46903-n-a-in-n-a-bf60ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46903%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf60ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45997-n-a-in-n-a-bf60aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45997%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf60aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45996-n-a-in-n-a-bf607c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45996%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf607c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45980-n-a-in-n-a-bf6074</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45980%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf6074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45979-n-a-in-n-a-bf606c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45979%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf606c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45977-n-a-in-n-a-bf603a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45977%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf603a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45970-n-a-in-n-a-bf6015</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45970%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf6015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45956-n-a-in-n-a-bf5ffc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45760-n-a-in-n-a-bf5ff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45760%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45759-n-a-in-n-a-bf5ff0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45759%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45756-n-a-in-n-a-bf5fdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45756%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46906-n-a-in-n-a-bf5fd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46906%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45957-n-a-in-n-a-bf5fcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45957%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45043-n-a-in-n-a-bf5fc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45043%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5fc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25837-n-a-in-n-a-bf5e6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25837%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25836-n-a-in-n-a-bf5e63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25836%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41943-n-a-in-n-a-bf5e5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41943%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44031-n-a-in-n-a-bf5de7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5de7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45968-n-a-in-n-a-bf5dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45968%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9848c4522896dcbf5dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45758-n-a-in-n-a-bf5c14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45758%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5c14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45275-n-a-in-n-a-bf5c10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45275%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45269-n-a-in-n-a-bf5bd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45269%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5bd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45228-n-a-in-n-a-bf5bb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45228%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d9847c4522896dcbf5bb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45227-n-a-in-n-a-bf5baf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45227%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44637-n-a-in-n-a-bf5b6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44637%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5b6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23511-cwe-274-improper-handling-of-insufficient-privileges-in-aws-amazon-cloudwatch-agent-bf4ceb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23511%3A%20CWE-274%3A%20Improper%20Handling%20of%20Insufficient%20Privileges%20in%20aws%20amazon-cloudwatch-agent&amp;severity=medium&amp;id=682d9846c4522896dcbf4ceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46908-n-a-in-n-a-bdc38c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46908%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-12-f12233</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-11-765ed9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-11&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb765ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-11-f1307d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f1307d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23485-cwe-269-improper-privilege-management-in-getsentry-sentry-bf4c73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23485%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20getsentry%20sentry&amp;severity=medium&amp;id=682d9846c4522896dcbf4c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45145-n-a-in-n-a-bf5b77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45145%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5b77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-10-f121d2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f121d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23497-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-freshrss-freshrss-bf4cc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23497%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20FreshRSS%20FreshRSS&amp;severity=medium&amp;id=682d9846c4522896dcbf4cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23510-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-cube-js-cube-js-bf4ce9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23510%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20cube-js%20cube.js&amp;severity=medium&amp;id=682d9846c4522896dcbf4ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46157-cwe-94-improper-control-of-generation-of-code-code-injection-in-akeneo-pim-community-dev-bf6ec0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46157%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20akeneo%20pim-community-dev&amp;severity=medium&amp;id=682d9849c4522896dcbf6ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46166-cwe-94-improper-control-of-generation-of-code-code-injection-in-codecentric-spring-boot-admin-bf4f02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46166%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20codecentric%20spring-boot-admin&amp;severity=medium&amp;id=682d9846c4522896dcbf4f02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41299-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-cloud-transformation-advisor-bf6204</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41299%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Transformation%20Advisor&amp;severity=medium&amp;id=682d9848c4522896dcbf6204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23477-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-neutrinolabs-xrdp-bf4c22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23477%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23484-cwe-190-integer-overflow-or-wraparound-in-neutrinolabs-xrdp-bf4c62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23484%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23483-cwe-125-out-of-bounds-read-in-neutrinolabs-xrdp-bf4c5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23483%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23482-cwe-125-out-of-bounds-read-in-neutrinolabs-xrdp-bf4c52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23482%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23481-cwe-125-out-of-bounds-read-in-neutrinolabs-xrdp-bf4c43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23481%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23480-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-neutrinolabs-xrdp-bf4c2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23480%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23479-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-neutrinolabs-xrdp-bf4c2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23479%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23478-cwe-787-out-of-bounds-write-in-neutrinolabs-xrdp-bf4c26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23478%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23468-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-neutrinolabs-xrdp-bf4c08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23468%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23493-cwe-125-out-of-bounds-read-in-neutrinolabs-xrdp-bf4c98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23493%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9846c4522896dcbf4c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2752-cwe-287-improper-authentication-in-secomea-gatemanager-bf5f8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2752%3A%20CWE-287%20Improper%20Authentication%20in%20Secomea%20GateManager&amp;severity=medium&amp;id=682d9848c4522896dcbf5f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33187-cwe-532-insertion-of-sensitive-information-into-log-file-in-brocade-brocade-sannav-bf5e04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33187%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Brocade%20Brocade%20SANnav&amp;severity=medium&amp;id=682d9848c4522896dcbf5e04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3724-use-of-externally-controlled-format-string-in-wireshark-in-wireshark-foundation-wireshark-bf5f90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3724%3A%20Use%20of%20externally-controlled%20format%20string%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=682d9848c4522896dcbf5f90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29839-cwe-522-insufficiently-protected-credentials-in-western-digital-my-cloud-bf5f88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29839%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Western%20Digital%20My%20Cloud&amp;severity=medium&amp;id=682d9848c4522896dcbf5f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3259-cwe-665-in-openshift-bf5e25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3259%3A%20CWE-665%20in%20OpenShift&amp;severity=high&amp;id=682d9848c4522896dcbf5e25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34297-n-a-in-n-a-bf5e0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34297%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44213-n-a-in-n-a-bf5ded</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44213%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45292-n-a-in-n-a-bf5b3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45292%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45290-n-a-in-n-a-bf5b05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45290%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44838-n-a-in-n-a-bf5a4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44838%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44790-n-a-in-n-a-bf5a45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44790%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29838-cwe-287-improper-authentication-in-western-digital-my-cloud-bf5a2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29838%3A%20CWE-287%20Improper%20Authentication%20in%20Western%20Digital%20My%20Cloud&amp;severity=medium&amp;id=682d9847c4522896dcbf5a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25630-stored-xss-vulnerability-in-symantec-messaging-gateway-bf5a02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25630%3A%20Stored%20XSS%20Vulnerability%20in%20Symantec%20Messaging%20Gateway&amp;severity=medium&amp;id=682d9847c4522896dcbf5a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25629-stored-xss-vulnerability-in-symantec-messaging-gateway-bf59fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25629%3A%20Stored%20XSS%20Vulnerability%20in%20Symantec%20Messaging%20Gateway&amp;severity=medium&amp;id=682d9847c4522896dcbf59fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-09-f12a44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41947-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dhis2-dhis2-core-bf4d50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41947%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dhis2%20dhis2-core&amp;severity=medium&amp;id=682d9846c4522896dcbf4d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41948-cwe-269-improper-privilege-management-in-dhis2-dhis2-core-bf4d54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41948%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20dhis2%20dhis2-core&amp;severity=medium&amp;id=682d9846c4522896dcbf4d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41949-cwe-918-server-side-request-forgery-ssrf-in-dhis2-dhis2-core-bf4d5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41949%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20dhis2%20dhis2-core&amp;severity=medium&amp;id=682d9846c4522896dcbf4d5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46158-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-prestashop-prestashop-bf4ee9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46158%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20PrestaShop%20PrestaShop&amp;severity=medium&amp;id=682d9846c4522896dcbf4ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46153-cwe-295-improper-certificate-validation-in-traefik-traefik-bf4ecc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46153%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20traefik%20traefik&amp;severity=medium&amp;id=682d9846c4522896dcbf4ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23469-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-traefik-traefik-bf6e06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23469%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20traefik%20traefik&amp;severity=medium&amp;id=682d9849c4522896dcbf6e06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23494-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-tinymce-tinymce-bf4cad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23494%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20tinymce%20tinymce&amp;severity=medium&amp;id=682d9846c4522896dcbf4cad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23495-cwe-755-improper-handling-of-exceptional-conditions-in-ipfs-go-merkledag-bf4cb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23495%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20ipfs%20go-merkledag&amp;severity=medium&amp;id=682d9846c4522896dcbf4cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23496-cwe-755-improper-handling-of-exceptional-conditions-in-nielsbasjes-yauaa-bf4cbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23496%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20nielsbasjes%20yauaa&amp;severity=medium&amp;id=682d9846c4522896dcbf4cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46831-cwe-453-in-jetbrains-teamcity-bf6490</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46831%3A%20CWE-453%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d9848c4522896dcbf6490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46830-cwe-918-in-jetbrains-teamcity-bf5abb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46830%3A%20CWE-918%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d9847c4522896dcbf5abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46829-cwe-287-in-jetbrains-jetbrains-gateway-bf5aaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46829%3A%20CWE-287%20in%20JetBrains%20JetBrains%20Gateway&amp;severity=medium&amp;id=682d9847c4522896dcbf5aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46828-cwe-691-in-jetbrains-intellij-idea-bf621e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46828%3A%20CWE-691%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=682d9848c4522896dcbf621e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46827-cwe-611-in-jetbrains-intellij-idea-bf6477</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46827%3A%20CWE-611%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=682d9848c4522896dcbf6477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46826-cwe-35-in-jetbrains-intellij-idea-bf5aa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46826%3A%20CWE-35%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=682d9847c4522896dcbf5aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46825-cwe-200-in-jetbrains-intellij-idea-bf5a9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46825%3A%20CWE-200%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=682d9847c4522896dcbf5a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46824-cwe-120-in-jetbrains-intellij-idea-bf5a72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46824%3A%20CWE-120%20in%20JetBrains%20IntelliJ%20IDEA&amp;severity=medium&amp;id=682d9847c4522896dcbf5a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23476-cwe-252-unchecked-return-value-in-sparklemotion-nokogiri-bf4c1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23476%3A%20CWE-252%3A%20Unchecked%20Return%20Value%20in%20sparklemotion%20nokogiri&amp;severity=medium&amp;id=682d9846c4522896dcbf4c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23492-cwe-400-uncontrolled-resource-consumption-in-libp2p-go-libp2p-bf4c89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23492%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20libp2p%20go-libp2p&amp;severity=medium&amp;id=682d9846c4522896dcbf4c89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39908-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-samsung-mobile-samsung-mobile-devices-bf6412</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39908%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9848c4522896dcbf6412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39903-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-samsung-mobile-samsung-mobile-devices-bf60a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39903%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9848c4522896dcbf60a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39902-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bf5f74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39902%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9848c4522896dcbf5f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4123-cwe-23-in-podman-bf5e37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4123%3A%20CWE-23%20in%20podman&amp;severity=low&amp;id=682d9848c4522896dcbf5e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4122-cwe-59-in-podman-bf5e31</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4122%3A%20CWE-59%20in%20podman&amp;severity=medium&amp;id=682d9848c4522896dcbf5e31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40939-n-a-in-n-a-bf5e2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40939%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9848c4522896dcbf5e2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46792-n-a-in-n-a-bf59ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46792%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45525-n-a-in-n-a-bf59dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45525%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45524-n-a-in-n-a-bf59d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45524%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45523-n-a-in-n-a-bf59d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45523%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45522-n-a-in-n-a-bf59c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45522%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45521-n-a-in-n-a-bf59c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45521%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45520-n-a-in-n-a-bf599d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45520%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf599d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45519-n-a-in-n-a-bf5995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45519%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45518-n-a-in-n-a-bf5928</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45518%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45517-n-a-in-n-a-bf5917</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45517%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45516-n-a-in-n-a-bf590f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45516%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf590f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45515-n-a-in-n-a-bf5907</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45515%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45514-n-a-in-n-a-bf5903</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45514%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45513-n-a-in-n-a-bf58ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45513%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf58ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45512-n-a-in-n-a-bf58fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45512%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf58fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45511-n-a-in-n-a-bf58db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45511%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf58db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45510-n-a-in-n-a-bf588b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45510%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf588b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45509-n-a-in-n-a-bf587e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45509%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf587e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45508-n-a-in-n-a-bf587a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45508%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf587a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45507-n-a-in-n-a-bf5876</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45507%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45506-n-a-in-n-a-bf5836</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45506%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45505-n-a-in-n-a-bf5832</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45505%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45504-n-a-in-n-a-bf57f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45504%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf57f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45503-n-a-in-n-a-bf57f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45503%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf57f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45501-n-a-in-n-a-bf57ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45501%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf57ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45499-n-a-in-n-a-bf57e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45499%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf57e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45498-n-a-in-n-a-bf57e5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45498%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf57e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45497-n-a-in-n-a-bf57e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45497%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf57e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44938-n-a-in-n-a-bf57a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44938%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf57a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44932-n-a-in-n-a-bf57a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44932%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf57a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44931-n-a-in-n-a-bf5792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39907-cwe-190-integer-overflow-or-wraparound-in-samsung-mobile-samsung-mobile-devices-bf5772</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39907%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39906-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bf576e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39906%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf576e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3262-cwe-453-in-openshift-bf5721</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3262%3A%20CWE-453%20in%20openshift&amp;severity=high&amp;id=682d9847c4522896dcbf5721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39915-cwe-284-improper-access-control-in-samsung-mobile-samsung-calendar-bf571d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39915%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Calendar&amp;severity=medium&amp;id=682d9847c4522896dcbf571d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39914-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-samsung-mobile-samsung-mobile-devices-bf5719</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39914%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39913-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-samsung-mobile-samsung-mobile-devices-bf5715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39913%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39912-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-samsung-mobile-devices-bf5711</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39912%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5711</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39911-cwe-703-improper-check-or-handling-of-exceptional-conditions-in-samsung-mobile-samsung-pass-bf56e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39911%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20Samsung%20Mobile%20Samsung%20Pass&amp;severity=medium&amp;id=682d9847c4522896dcbf56e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39910-cwe-284-improper-access-control-in-samsung-mobile-samsung-pass-bf56e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39910%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Pass&amp;severity=medium&amp;id=682d9847c4522896dcbf56e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39909-cwe-345-insufficient-verification-of-data-authenticity-in-samsung-mobile-samsung-gear-iconx-pc-manager-bf56df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39909%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Samsung%20Mobile%20Samsung%20Gear%20IconX%20PC%20Manager&amp;severity=medium&amp;id=682d9847c4522896dcbf56df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3260-cwe-1021-in-openshift-bf56ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3260%3A%20CWE-1021%20in%20Openshift&amp;severity=medium&amp;id=682d9847c4522896dcbf56ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39905-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bf56ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39905%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf56ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39904-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-samsung-mobile-samsung-mobile-devices-bf56a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39904%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf56a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39901-cwe-287-improper-authentication-in-samsung-mobile-samsung-mobile-devices-bf567b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39901%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf567b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39900-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bf5677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39900%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39899-cwe-287-improper-authentication-in-samsung-mobile-samsung-mobile-devices-bf5673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39899%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39898-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bf566f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39898%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf566f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39897-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-samsung-mobile-samsung-mobile-devices-bf566b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39897%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf566b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39896-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bf5667</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39896%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39895-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bf5663</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39895%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39894-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bf558c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39894%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9847c4522896dcbf558c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38765-n-a-in-n-a-bf557b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38765%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf557b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38754-cwe-79-cross-site-scripting-xss-in-micro-focus-micro-focus-operations-bridge-manager-bf5573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38754%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Micro%20Focus%20Micro%20Focus%20Operations%20Bridge%20Manager&amp;severity=medium&amp;id=682d9847c4522896dcbf5573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38599-n-a-in-n-a-bf556b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38599%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf556b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37918-broken-access-control-in-aruba-airwave-management-platform-bf553c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37918%3A%20Broken%20Access%20Control%20in%20Aruba%20AirWave%20Management%20Platform&amp;severity=high&amp;id=682d9847c4522896dcbf553c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37917-broken-access-control-in-aruba-airwave-management-platform-bf551c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37917%3A%20Broken%20Access%20Control%20in%20Aruba%20AirWave%20Management%20Platform&amp;severity=high&amp;id=682d9847c4522896dcbf551c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37916-broken-access-control-in-aruba-airwave-management-platform-bf545e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37916%3A%20Broken%20Access%20Control%20in%20Aruba%20AirWave%20Management%20Platform&amp;severity=high&amp;id=682d9847c4522896dcbf545e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33186-privilege-escalation-in-brocade-fabric-os-bf545a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33186%3A%20Privilege%20escalation%20in%20Brocade%20Fabric%20OS&amp;severity=critical&amp;id=682d9847c4522896dcbf545a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-08-f13133</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f13133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23471-cwe-400-uncontrolled-resource-consumption-in-containerd-containerd-bf4c12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23471%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20containerd%20containerd&amp;severity=medium&amp;id=682d9846c4522896dcbf4c12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23491-cwe-345-insufficient-verification-of-data-authenticity-in-certifi-python-certifi-bf4c83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23491%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20certifi%20python-certifi&amp;severity=medium&amp;id=682d9846c4522896dcbf4c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23487-cwe-400-uncontrolled-resource-consumption-in-libp2p-js-libp2p-bf4c7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23487%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20libp2p%20js-libp2p&amp;severity=medium&amp;id=682d9846c4522896dcbf4c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23486-cwe-400-uncontrolled-resource-consumption-in-libp2p-rust-libp2p-bf4c77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23486%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20libp2p%20rust-libp2p&amp;severity=medium&amp;id=682d9846c4522896dcbf4c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43581-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-ibm-content-navigator-bf5f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43581%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20IBM%20Content%20Navigator&amp;severity=medium&amp;id=682d9848c4522896dcbf5f55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41735-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-business-process-manager-bf5f51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41735%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Business%20Process%20Manager&amp;severity=medium&amp;id=682d9848c4522896dcbf5f51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36565-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-github-com-labstack-echo-v4-github-com-labstack-echo-v4-bf565f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36565%3A%20CWE%2022%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20github.com%2Flabstack%2Fecho%2Fv4%20github.com%2Flabstack%2Fecho%2Fv4&amp;severity=medium&amp;id=682d9847c4522896dcbf565f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41720-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-go-standard-library-os-bf5619</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41720%3A%20CWE%2022%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Go%20standard%20library%20os&amp;severity=high&amp;id=682d9847c4522896dcbf5619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3641-n-a-in-devolutions-remote-desktop-manager-bf5b83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3641%3A%20n%2Fa%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=high&amp;id=682d9847c4522896dcbf5b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45910-cwe-90-improper-neutralization-of-special-elements-used-in-an-ldap-query-ldap-injection-in-apache-software-foundation-apache-manifoldcf-bf5d7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45910%3A%20CWE-90%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20LDAP%20Query%20(&apos;LDAP%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20ManifoldCF&amp;severity=medium&amp;id=682d9848c4522896dcbf5d7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46742-cwe-94-improper-control-of-generation-of-code-code-injection-in-paddlepaddle-paddlepaddle-bf5d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46742%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=682d9848c4522896dcbf5d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46741-cwe-125-out-of-bounds-read-in-paddlepaddle-paddlepaddle-bf5d8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46741%3A%20CWE-125%20Out-of-bounds%20Read%20in%20PaddlePaddle%20PaddlePaddle&amp;severity=medium&amp;id=682d9848c4522896dcbf5d8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41800-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-f5-big-ip-bf5bbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41800%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9847c4522896dcbf5bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41622-cwe-352-cross-site-request-forgery-csrf-in-f5-big-ip-bf5bb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41622%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9847c4522896dcbf5bb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45009-n-a-in-n-a-bf5b8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45009%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45008-n-a-in-n-a-bf5b8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45008%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44942-n-a-in-n-a-bf5b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44942%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44849-n-a-in-n-a-bf5b73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44849%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44620-improper-authentication-in-unimo-technology-co-ltd-udr-ja1604-udr-ja1608-udr-ja1616-bf5b6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44620%3A%20Improper%20Authentication%20in%20UNIMO%20Technology%20Co.%2C%20Ltd%20UDR-JA1604%2FUDR-JA1608%2FUDR-JA1616&amp;severity=high&amp;id=682d9847c4522896dcbf5b6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44608-uncontrolled-resource-consumption-in-cybozu-inc-cybozu-remote-service-bf5b45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44608%3A%20Uncontrolled%20Resource%20Consumption%20in%20Cybozu%2C%20Inc.%20Cybozu%20Remote%20Service&amp;severity=high&amp;id=682d9847c4522896dcbf5b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44606-os-command-injection-in-unimo-technology-co-ltd-udr-ja1604-udr-ja1608-udr-ja1616-bf5b39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44606%3A%20OS%20Command%20Injection%20in%20UNIMO%20Technology%20Co.%2C%20Ltd%20UDR-JA1604%2FUDR-JA1608%2FUDR-JA1616&amp;severity=high&amp;id=682d9847c4522896dcbf5b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44393-n-a-in-n-a-bf5b28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44393%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44373-n-a-in-n-a-bf5b20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44373%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5b20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44371-n-a-in-n-a-bf5ae0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44371%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5ae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43668-improper-encoding-or-escaping-of-output-in-typora-typora-bf5adc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43668%3A%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Typora%20Typora&amp;severity=medium&amp;id=682d9847c4522896dcbf5adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43667-stack-based-buffer-overflow-in-omron-corporation-cx-programmer-bf5acb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43667%3A%20Stack-based%20Buffer%20Overflow%20in%20OMRON%20Corporation%20CX-Programmer&amp;severity=high&amp;id=682d9847c4522896dcbf5acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43660-improper-neutralization-of-server-side-includes-ssi-within-a-web-page-in-six-apart-ltd-movable-type-bf5ac7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43660%3A%20Improper%20Neutralization%20of%20Server-Side%20Includes%20(SSI)%20Within%20a%20Web%20Page%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=high&amp;id=682d9847c4522896dcbf5ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46685-vulnerability-in-jenkins-project-jenkins-gitea-plugin-bf5a6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46685%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Gitea%20Plugin&amp;severity=medium&amp;id=682d9847c4522896dcbf5a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45010-n-a-in-n-a-bf5a55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45010%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf5a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43509-out-of-bounds-write-in-omron-corporation-cx-programmer-bf5a3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43509%3A%20Out-of-bounds%20Write%20in%20OMRON%20Corporation%20CX-Programmer&amp;severity=high&amp;id=682d9847c4522896dcbf5a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43464-hidden-functionality-in-unimo-technology-co-ltd-udr-ja1604-udr-ja1608-udr-ja1616-bf5a37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43464%3A%20Hidden%20Functionality%20in%20UNIMO%20Technology%20Co.%2C%20Ltd%20UDR-JA1604%2FUDR-JA1608%2FUDR-JA1616&amp;severity=high&amp;id=682d9847c4522896dcbf5a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42458-authentication-bypass-using-an-alternate-path-or-channel-in-shift-tech-inc-bingo-cms-bf5a33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42458%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Shift%20Tech%20Inc.%20bingo!CMS&amp;severity=critical&amp;id=682d9847c4522896dcbf5a33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42329-unknown-in-linux-linux-bf5974</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42329%3A%20unknown%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9847c4522896dcbf5974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42328-unknown-in-linux-linux-bf5970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42328%3A%20unknown%20in%20Linux%20Linux&amp;severity=medium&amp;id=682d9847c4522896dcbf5970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41994-cross-site-scripting-in-basercms-users-community-basercms-bf596c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41994%3A%20Cross-site%20scripting%20in%20baserCMS%20Users%20Community%20baserCMS&amp;severity=medium&amp;id=682d9847c4522896dcbf596c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43508-use-after-free-in-omron-corporation-cx-programmer-bf5872</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43508%3A%20Use-after-free%20in%20OMRON%20Corporation%20CX-Programmer&amp;severity=high&amp;id=682d9847c4522896dcbf5872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46770-n-a-in-n-a-bf56c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46770%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf56c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46688-vulnerability-in-jenkins-project-jenkins-sonar-gerrit-plugin-bf56be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46688%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Sonar%20Gerrit%20Plugin&amp;severity=medium&amp;id=682d9847c4522896dcbf56be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46687-vulnerability-in-jenkins-project-jenkins-spring-config-plugin-bf5629</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46687%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Spring%20Config%20Plugin&amp;severity=medium&amp;id=682d9847c4522896dcbf5629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46686-vulnerability-in-jenkins-project-jenkins-custom-build-properties-plugin-bf5625</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46686%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Custom%20Build%20Properties%20Plugin&amp;severity=medium&amp;id=682d9847c4522896dcbf5625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46684-vulnerability-in-jenkins-project-jenkins-checkmarx-plugin-bf5621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46684%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Checkmarx%20Plugin&amp;severity=medium&amp;id=682d9847c4522896dcbf5621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46683-vulnerability-in-jenkins-project-jenkins-google-login-plugin-bf561d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46683%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Google%20Login%20Plugin&amp;severity=medium&amp;id=682d9847c4522896dcbf561d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45113-improper-validation-of-syntactic-correctness-of-input-in-six-apart-ltd-movable-type-bf55c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45113%3A%20Improper%20Validation%20of%20Syntactic%20Correctness%20of%20Input%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=medium&amp;id=682d9847c4522896dcbf55c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45026-n-a-in-n-a-bf55be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf55be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45025-n-a-in-n-a-bf55af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45025%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf55af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44361-n-a-in-n-a-bf5554</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44361%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44351-n-a-in-n-a-bf554c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44351%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf554c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46682-vulnerability-in-jenkins-project-jenkins-plot-plugin-bf5496</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46682%3A%20Vulnerability%20in%20Jenkins%20Project%20Jenkins%20Plot%20Plugin&amp;severity=critical&amp;id=682d9847c4522896dcbf5496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44153-n-a-in-n-a-bf5492</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44153%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42486-cross-site-scripting-in-basercms-users-community-basercms-bf548e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42486%3A%20Cross-site%20scripting%20in%20baserCMS%20Users%20Community%20baserCMS&amp;severity=medium&amp;id=682d9847c4522896dcbf548e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41783-improper-handling-of-syntactically-invalid-structure-in-tp-link-tp-link-re300-v1-bf5481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41783%3A%20Improper%20Handling%20of%20Syntactically%20Invalid%20Structure%20in%20TP-Link%20TP-Link%20RE300%20V1&amp;severity=medium&amp;id=682d9847c4522896dcbf5481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40966-authentication-bypass-in-buffalo-inc-buffalo-network-devices-bf547d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40966%3A%20Authentication%20Bypass%20in%20BUFFALO%20INC.%20Buffalo%20network%20devices&amp;severity=high&amp;id=682d9847c4522896dcbf547d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39044-hidden-functionality-in-buffalo-inc-buffalo-network-devices-bf5479</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39044%3A%20Hidden%20Functionality%20in%20BUFFALO%20INC.%20Buffalo%20network%20devices&amp;severity=medium&amp;id=682d9847c4522896dcbf5479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37406-cross-site-scripting-in-ricoh-company-ltd-aficio-sp-4210n-bf50ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37406%3A%20Cross-site%20scripting%20in%20RICOH%20COMPANY%2C%20LTD.%20Aficio%20SP%204210N&amp;severity=medium&amp;id=682d9846c4522896dcbf50ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34840-use-of-hard-coded-credentials-in-buffalo-inc-buffalo-network-devices-bf50b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34840%3A%20Use%20of%20hard-coded%20credentials%20in%20BUFFALO%20INC.%20Buffalo%20network%20devices&amp;severity=medium&amp;id=682d9846c4522896dcbf50b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45917-n-a-in-n-a-bf3cca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45917%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9844c4522896dcbf3cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45916-n-a-in-n-a-bf3cb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45916%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9844c4522896dcbf3cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45915-n-a-in-n-a-bf3ca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45915%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9844c4522896dcbf3ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45550-n-a-in-n-a-bf3ca0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45550%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9844c4522896dcbf3ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43468-external-initialization-of-trusted-variables-or-data-stores-in-hector-cabrera-wordpress-popular-posts-bf3516</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43468%3A%20External%20Initialization%20of%20Trusted%20Variables%20or%20Data%20Stores%20in%20Hector%20Cabrera%20WordPress%20Popular%20Posts&amp;severity=high&amp;id=682d9844c4522896dcbf3516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45217-n-a-in-n-a-bf2cc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45217%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9843c4522896dcbf2cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45122-cross-site-scripting-in-six-apart-ltd-movable-type-bf2637</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45122%3A%20Cross-site%20scripting%20in%20Six%20Apart%20Ltd.%20Movable%20Type&amp;severity=medium&amp;id=682d9842c4522896dcbf2637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-07-f1212d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f1212d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46333-cwe-94-improper-control-of-generation-of-code-code-injection-in-proofpoint-enterprise-protection-bf50db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46333%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20proofpoint%20enterprise_protection&amp;severity=medium&amp;id=682d9846c4522896dcbf50db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46332-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-proofpoint-enterprise-protection-bf50d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46332%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20proofpoint%20enterprise_protection&amp;severity=medium&amp;id=682d9846c4522896dcbf50d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23475-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-lirantal-daloradius-bf6e0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23475%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20lirantal%20daloradius&amp;severity=medium&amp;id=682d9849c4522896dcbf6e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46161-cwe-94-improper-control-of-generation-of-code-code-injection-in-bpampuch-pdfmake-bf6ed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46161%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20bpampuch%20pdfmake&amp;severity=medium&amp;id=682d9849c4522896dcbf6ed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43867-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-ibm-spectrum-scale-bf5bcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43867%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Spectrum%20Scale&amp;severity=medium&amp;id=682d9847c4522896dcbf5bcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46154-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-kalcaddle-kodexplorer-bf4ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46154%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20kalcaddle%20KodExplorer&amp;severity=medium&amp;id=682d9846c4522896dcbf4ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23466-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-kitabisa-teler-bf4be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23466%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20kitabisa%20teler&amp;severity=medium&amp;id=682d9846c4522896dcbf4be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34361-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-sterling-secure-proxy-bf5b7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34361%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20Sterling%20Secure%20Proxy&amp;severity=medium&amp;id=682d9847c4522896dcbf5b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23470-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-galaxyproject-galaxy-bf4c0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23470%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20galaxyproject%20galaxy&amp;severity=medium&amp;id=682d9846c4522896dcbf4c0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23472-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-arjunsharda-passeo-bf4c16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23472%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20ArjunSharda%20Passeo&amp;severity=medium&amp;id=682d9846c4522896dcbf4c16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38123-cwe-20-improper-input-validation-in-secomea-gatemanager-bf50cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38123%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Secomea%20GateManager&amp;severity=medium&amp;id=682d9846c4522896dcbf50cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34881-cwe-209-generation-of-error-message-containing-sensitive-information-in-hitachi-jp1-automatic-operation-bf5b41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34881%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20Hitachi%20JP1%2FAutomatic%20Operation&amp;severity=medium&amp;id=682d9847c4522896dcbf5b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46151-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pinterest-querybook-bf4ec4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46151%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pinterest%20querybook&amp;severity=medium&amp;id=682d9846c4522896dcbf4ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45326-n-a-in-n-a-bf5a5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45326%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45548-n-a-in-n-a-bf59e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45548%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf59e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44900-n-a-in-n-a-bf598d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44900%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf598d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44289-n-a-in-n-a-bf5989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44289%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42770-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8019-bf5985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42770%3A%20cwe-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8019&amp;severity=medium&amp;id=682d9847c4522896dcbf5985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42769-cwe-125-out-of-bounds-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8014-bf5981</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42769%3A%20cwe-125%20Out-of-bounds%20Read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8014&amp;severity=low&amp;id=682d9847c4522896dcbf5981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39099-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf58ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39099%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf58ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39098-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf58c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39098%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf58c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39097-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf58c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39097%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf58c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39096-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf58be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39096%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf58be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39095-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf58ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39095%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf58ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39094-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf58b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39094%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf58b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39093-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf586e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39093%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf586e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39092-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf5861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39092%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf5861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39091-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf585d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39091%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf585d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39090-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf5842</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39090%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9847c4522896dcbf5842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-6627-n-a-in-n-a-bf583e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-6627%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf583e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46383-n-a-in-n-a-bf50fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46383%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9846c4522896dcbf50fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46382-n-a-in-n-a-bf50f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46382%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9846c4522896dcbf50f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44030-n-a-in-n-a-bf50d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9846c4522896dcbf50d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43369-n-a-in-n-a-bf50cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43369%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9846c4522896dcbf50cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41910-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf4d48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41910%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9846c4522896dcbf4d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41902-cwe-787-out-of-bounds-write-in-tensorflow-tensorflow-bf4d39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41902%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9846c4522896dcbf4d39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42782-cwe-200-information-disclosure-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8007-bf3512</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42782%3A%20cwe-200%20Information%20Disclosure%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8007&amp;severity=medium&amp;id=682d9844c4522896dcbf3512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42781-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8006-bf350e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42781%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8006&amp;severity=medium&amp;id=682d9844c4522896dcbf350e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42780-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8005-bf350a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42780%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8005&amp;severity=medium&amp;id=682d9844c4522896dcbf350a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42779-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8003-bf34fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42779%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8003&amp;severity=medium&amp;id=682d9844c4522896dcbf34fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42778-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf34f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42778%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9844c4522896dcbf34f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42777-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf315d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42777%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9843c4522896dcbf315d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42776-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf3159</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42776%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9843c4522896dcbf3159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42775-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf3153</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42775%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9843c4522896dcbf3153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42764-cwe-190-integer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8009-bf314f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42764%3A%20cwe-190%20Integer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8009&amp;severity=medium&amp;id=682d9843c4522896dcbf314f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42763-cwe-190-integer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8008-bf314b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42763%3A%20cwe-190%20Integer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8008&amp;severity=medium&amp;id=682d9843c4522896dcbf314b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42762-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8004-bf3147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42762%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8004&amp;severity=medium&amp;id=682d9843c4522896dcbf3147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42761-cwe-125-out-of-bounds-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf3125</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42761%3A%20cwe-125%20Out-of-bounds%20Read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9843c4522896dcbf3125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42760-cwe-120-classic-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8018-bf311d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42760%3A%20cwe-120%20Classic%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8018&amp;severity=medium&amp;id=682d9843c4522896dcbf311d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42759-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8017-bf3115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42759%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8017&amp;severity=medium&amp;id=682d9843c4522896dcbf3115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42758-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8016-bf3111</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42758%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8016&amp;severity=low&amp;id=682d9843c4522896dcbf3111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42757-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8015-bf3100</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42757%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8015&amp;severity=low&amp;id=682d9843c4522896dcbf3100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42755-cwe-787-out-of-bounds-write-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8023-bf2cc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42755%3A%20cwe-787%20Out-of-bounds%20Write%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8023&amp;severity=medium&amp;id=682d9843c4522896dcbf2cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42774-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8002-bf23f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42774%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8002&amp;severity=medium&amp;id=682d9842c4522896dcbf23f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42773-cwe-125-out-of-bounds-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8001-bf2055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42773%3A%20cwe-125%20Out-of-bounds%20Read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8001&amp;severity=medium&amp;id=682d9841c4522896dcbf2055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42772-cwe-787-out-of-bounds-write-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8021-bf2046</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42772%3A%20cwe-787%20Out-of-bounds%20Write%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8021&amp;severity=medium&amp;id=682d9841c4522896dcbf2046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42767-cwe-190-integer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8012-bf2042</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42767%3A%20cwe-190%20Integer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8012&amp;severity=medium&amp;id=682d9841c4522896dcbf2042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42771-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8020-bf1d5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42771%3A%20cwe-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8020&amp;severity=medium&amp;id=682d9841c4522896dcbf1d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42768-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8013-bf1d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42768%3A%20cwe-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8013&amp;severity=medium&amp;id=682d9841c4522896dcbf1d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42766-cwe-200-information-disclosure-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8011-bf1d32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42766%3A%20cwe-200%20Information%20Disclosure%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8011&amp;severity=medium&amp;id=682d9841c4522896dcbf1d32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42754-cwe-416-use-after-free-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1d2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42754%3A%20CWE-416%20Use%20After%20Free%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9841c4522896dcbf1d2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42765-cwe-190-integer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8010-bf1b03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42765%3A%20cwe-190%20Integer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8010&amp;severity=medium&amp;id=682d9841c4522896dcbf1b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42756-cwe-120-classic-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1af2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42756%3A%20CWE-120%20Classic%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9841c4522896dcbf1af2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41325-n-a-in-n-a-bf1aea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41325%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9841c4522896dcbf1aea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40603-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zyxel-zywall-usg-series-firmware-bf16d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40603%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Zyxel%20ZyWALL%2FUSG%20series%20firmware&amp;severity=medium&amp;id=682d9840c4522896dcbf16d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39134-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39134%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9840c4522896dcbf1562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39133-cwe-787-out-of-bounds-write-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8022-bf155e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39133%3A%20cwe-787%20Out-of-bounds%20Write%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8022&amp;severity=medium&amp;id=682d9840c4522896dcbf155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39132-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf155a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39132%3A%20CWE-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9840c4522896dcbf155a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39131-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1556</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39131%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9840c4522896dcbf1556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39130-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39130%3A%20CWE-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9840c4522896dcbf1552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39129-cwe-121-stack-based-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf154e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39129%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9840c4522896dcbf154e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39106-cwe-121-stack-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39106%3A%20CWE-121%20Stack%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682d9840c4522896dcbf1548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39102-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf153b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39102%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9840c4522896dcbf153b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39101-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39101%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9840c4522896dcbf1507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39100-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-bf1503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39100%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682d9840c4522896dcbf1503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-06-f1226f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f1226f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2827-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ami-megarac-spx12-bf5826</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2827%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20AMI%20MegaRAC%20SPx12&amp;severity=medium&amp;id=682d9847c4522896dcbf5826</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40259-cwe-798-use-of-hard-coded-credentials-in-ami-megarac-spx12-bf582e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40259%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20AMI%20MegaRAC%20SPx12&amp;severity=medium&amp;id=682d9847c4522896dcbf582e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40242-cwe-798-use-of-hard-coded-credentials-in-ami-megarac-spx12-bf5b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40242%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20AMI%20MegaRAC%20SPx12&amp;severity=medium&amp;id=682d9847c4522896dcbf5b1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46164-cwe-665-improper-initialization-in-nodebb-nodebb-bf4efe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46164%3A%20CWE-665%3A%20Improper%20Initialization%20in%20NodeBB%20NodeBB&amp;severity=medium&amp;id=682d9846c4522896dcbf4efe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23467-cwe-125-out-of-bounds-read-in-openrazer-openrazer-bf4bec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23467%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20openrazer%20openrazer&amp;severity=medium&amp;id=682d9846c4522896dcbf4bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3846-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-workreap-bf582a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3846%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Workreap&amp;severity=high&amp;id=682d9847c4522896dcbf582a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3858-cwe-89-sql-injection-in-unknown-floating-chat-widget-contact-chat-icons-telegram-chat-line-wechat-email-sms-call-button-bf57d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3858%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Floating%20Chat%20Widget%3A%20Contact%20Chat%20Icons%2C%20Telegram%20Chat%2C%20Line%2C%20WeChat%2C%20Email%2C%20SMS%2C%20Call%20Button&amp;severity=high&amp;id=682d9847c4522896dcbf57d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3907-cwe-203-observable-discrepancy-in-unknown-clerk-bf57dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3907%3A%20CWE-203%20Observable%20Discrepancy%20in%20Unknown%20Clerk&amp;severity=high&amp;id=682d9847c4522896dcbf57dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3838-cwe-79-cross-site-scripting-xss-in-unknown-wpupper-share-buttons-bf57d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3838%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WPUpper%20Share%20Buttons&amp;severity=medium&amp;id=682d9847c4522896dcbf57d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1540-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-postmagthemes-demo-import-bf57d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1540%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20PostmagThemes%20Demo%20Import&amp;severity=low&amp;id=682d9847c4522896dcbf57d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3249-cwe-89-sql-injection-in-unknown-wp-csv-exporter-bf5778</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3249%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20CSV%20Exporter&amp;severity=high&amp;id=682d9847c4522896dcbf5778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3926-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-oauth-server-oauth-authentication-bf578a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3926%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WP%20OAuth%20Server%20(OAuth%20Authentication)&amp;severity=medium&amp;id=682d9847c4522896dcbf578a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3426-cwe-79-cross-site-scripting-xss-in-unknown-advanced-wp-columns-bf150b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3426%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Advanced%20WP%20Columns&amp;severity=medium&amp;id=682d9840c4522896dcbf150b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3830-cwe-79-cross-site-scripting-xss-in-unknown-wp-page-builder-bf150f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3830%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Page%20Builder&amp;severity=medium&amp;id=682d9840c4522896dcbf150f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3892-cwe-79-cross-site-scripting-xss-in-unknown-wp-oauth-server-oauth-authentication-bf1517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3892%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20OAuth%20Server%20(OAuth%20Authentication)&amp;severity=medium&amp;id=682d9840c4522896dcbf1517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3837-cwe-79-cross-site-scripting-xss-in-unknown-uji-countdown-bf1513</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3837%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Uji%20Countdown&amp;severity=medium&amp;id=682d9840c4522896dcbf1513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3677-cwe-352-cross-site-request-forgery-csrf-in-unknown-advanced-import-one-click-import-for-wordpress-or-theme-demo-data-bf148b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3677%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Advanced%20Import%20%3A%20One%20Click%20Import%20for%20WordPress%20or%20Theme%20Demo%20Data&amp;severity=low&amp;id=682d9840c4522896dcbf148b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3909-cwe-79-cross-site-scripting-xss-in-unknown-add-comments-bf1497</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3909%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Add%20Comments&amp;severity=medium&amp;id=682d9840c4522896dcbf1497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3694-cwe-200-information-exposure-in-unknown-syncee-bf148f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3694%3A%20CWE-200%20Information%20Exposure%20in%20Unknown%20Syncee&amp;severity=high&amp;id=682d9840c4522896dcbf148f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3856-cwe-89-sql-injection-in-unknown-comic-book-management-system-bf1493</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3856%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Comic%20Book%20Management%20System&amp;severity=high&amp;id=682d9840c4522896dcbf1493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45479-cwe-306-missing-authentication-for-critical-function-in-beappsmobile-pc-keyboard-wifi-bluetooth-bf5b14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45479%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20BEAppsMobile%20PC%20Keyboard%20WiFi%20%26%20Bluetooth&amp;severity=critical&amp;id=682d9847c4522896dcbf5b14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43557-cwe-1299-missing-protection-mechanism-for-alternate-hardware-interface-in-becton-dickinson-and-company-bd-bodyguard-pump-bf55a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43557%3A%20CWE-1299%20Missing%20Protection%20Mechanism%20for%20Alternate%20Hardware%20Interface%20in%20Becton%2C%20Dickinson%20and%20Company%20(BD)%20BodyGuard%E2%84%A2%20Pump&amp;severity=medium&amp;id=682d9847c4522896dcbf55a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45478-cwe-319-cleartext-transmission-of-sensitive-information-in-telepad-telepad-bf1b07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45478%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Telepad%20Telepad&amp;severity=medium&amp;id=682d9841c4522896dcbf1b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23143-permission-and-access-control-vulnerability-in-otcp-bf16c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23143%3A%20permission%20and%20access%20control%20%20vulnerability%20in%20OTCP&amp;severity=medium&amp;id=682d9840c4522896dcbf16c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35259-xml-injection-cwe-91-in-ivanti-endpoint-manager-bf14ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35259%3A%20XML%20Injection%20(CWE-91)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=high&amp;id=682d9840c4522896dcbf14ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27773-privilege-escalation-capec-233-in-ivanti-endpoint-manger-bf14fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27773%3A%20Privilege%20Escalation%20(CAPEC-233)%20in%20Ivanti%20Endpoint%20Manger&amp;severity=critical&amp;id=682d9840c4522896dcbf14fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39434-n-a-in-n-a-bf14e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39434%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf14e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34181-n-a-in-n-a-bf14e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34181%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf14e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45990-n-a-in-n-a-bf14dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45990%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf14dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45912-n-a-in-n-a-bf14d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45912%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf14d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45771-n-a-in-n-a-bf14d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45771%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf14d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45019-n-a-in-n-a-bf149b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf149b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45769-n-a-in-n-a-bf147f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45769%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf147f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45481-cwe-306-missing-authentication-for-critical-function-in-thisaay-lazy-mouse-bf1451</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45481%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20thisAAY%20Lazy%20Mouse&amp;severity=critical&amp;id=682d9840c4522896dcbf1451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45477-cwe-306-missing-authentication-for-critical-function-in-telepad-telepad-bf144d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45477%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Telepad%20Telepad&amp;severity=critical&amp;id=682d9840c4522896dcbf144d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45315-n-a-in-n-a-bf1449</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45315%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf1449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45313-n-a-in-n-a-bf1438</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45313%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf1438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45283-n-a-in-n-a-bf13d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45283%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf13d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45020-n-a-in-n-a-bf13cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf13cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44039-n-a-in-n-a-bf13c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf13c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44009-n-a-in-n-a-bf13b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44009%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf13b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43706-n-a-in-n-a-bf1385</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43706%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf1385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43556-cross-site-scripting-xss-stored-cwe-79-in-https-github-com-concretecms-concretecms-bf1381</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43556%3A%20Cross-site%20Scripting%20(XSS)%20-%20Stored%20(CWE-79)%20in%20https%3A%2F%2Fgithub.com%2Fconcretecms%2Fconcretecms&amp;severity=medium&amp;id=682d9840c4522896dcbf1381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43553-execution-with-unnecessary-privileges-cwe-250-in-edgemax-edgerouter-bf137d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43553%3A%20Execution%20with%20Unnecessary%20Privileges%20(CWE-250)%20in%20EdgeMAX%20EdgeRouter&amp;severity=high&amp;id=682d9840c4522896dcbf137d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43549-improper-authentication-generic-cwe-287-in-veeam-backup-for-google-cloud-bf1379</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43549%3A%20Improper%20Authentication%20-%20Generic%20(CWE-287)%20in%20Veeam%20Backup%20for%20Google%20Cloud&amp;severity=critical&amp;id=682d9840c4522896dcbf1379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43504-improper-authentication-in-wordpress-org-wordpress-bf1330</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43504%3A%20Improper%20authentication%20in%20WordPress.org%20WordPress&amp;severity=medium&amp;id=682d9840c4522896dcbf1330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43500-cross-site-scripting-in-wordpress-org-wordpress-bf132a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43500%3A%20Cross-site%20scripting%20in%20WordPress.org%20WordPress&amp;severity=medium&amp;id=682d9840c4522896dcbf132a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43499-cross-site-scripting-in-shirasagi-project-shirasagi-bf1326</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43499%3A%20Cross-site%20scripting%20in%20SHIRASAGI%20Project%20SHIRASAGI&amp;severity=medium&amp;id=682d9840c4522896dcbf1326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43497-cross-site-scripting-in-wordpress-org-wordpress-bf1322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43497%3A%20Cross-site%20scripting%20in%20WordPress.org%20WordPress&amp;severity=medium&amp;id=682d9840c4522896dcbf1322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43487-cross-site-scripting-in-salon-booking-system-salon-booking-system-bf1311</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43487%3A%20Cross-site%20scripting%20in%20Salon%20Booking%20System%20Salon%20booking%20system&amp;severity=medium&amp;id=682d9840c4522896dcbf1311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43484-classloader-manipulation-vulnerability-in-ntt-data-corporation-terasoluna-global-framework-and-terasoluna-server-framework-for-java-rich-bf130b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43484%3A%20ClassLoader%20manipulation%20vulnerability%20in%20NTT%20DATA%20Corporation%20TERASOLUNA%20Global%20Framework%20and%20TERASOLUNA%20Server%20Framework%20for%20Java%20(Rich)&amp;severity=high&amp;id=682d9840c4522896dcbf130b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43479-open-redirect-in-shirasagi-project-shirasagi-bf12d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43479%3A%20Open%20Redirect%20in%20SHIRASAGI%20Project%20SHIRASAGI&amp;severity=medium&amp;id=682d9840c4522896dcbf12d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43470-cross-site-request-forgery-in-fuji-soft-incorporated-f-fs040u-f-fs020w-f-fs030w-and-f-fs040w-bf12c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43470%3A%20Cross-site%20request%20forgery%20in%20FUJI%20SOFT%20INCORPORATED%20%2BF%20FS040U%2C%20%2BF%20FS020W%2C%20%2BF%20FS030W%2C%20and%20%2BF%20FS040W&amp;severity=high&amp;id=682d9840c4522896dcbf12c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43442-plaintext-storage-of-a-password-in-fuji-soft-incorporated-f-fs040u-software-bf12b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43442%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20FUJI%20SOFT%20INCORPORATED%20%2BF%20FS040U%20software&amp;severity=medium&amp;id=682d9840c4522896dcbf12b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43097-n-a-in-n-a-bf12b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43097%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf12b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42706-n-a-in-n-a-bf12ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42706%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf12ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42705-n-a-in-n-a-bf129b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42705%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf129b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42496-os-command-injection-in-kujirahand-nako3edit-editor-component-of-nadesiko3-pc-version-bf127a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42496%3A%20OS%20Command%20Injection%20in%20kujirahand%20Nako3edit%2C%20editor%20component%20of%20nadesiko3%20(PC%20Version)&amp;severity=critical&amp;id=682d9840c4522896dcbf127a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41830-cross-site-scripting-in-kyocera-document-solutions-inc-kyocera-document-solutions-mfps-and-printers-bf1276</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41830%3A%20Cross-site%20scripting%20in%20KYOCERA%20Document%20Solutions%20Inc.%20Kyocera%20Document%20Solutions%20MFPs%20and%20printers&amp;severity=medium&amp;id=682d9840c4522896dcbf1276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41807-missing-authorization-in-kyocera-document-solutions-inc-kyocera-document-solutions-mfps-and-printers-bf1272</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41807%3A%20Missing%20authorization%20in%20KYOCERA%20Document%20Solutions%20Inc.%20Kyocera%20Document%20Solutions%20MFPs%20and%20printers&amp;severity=medium&amp;id=682d9840c4522896dcbf1272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41798-session-information-easily-guessable-in-kyocera-document-solutions-inc-kyocera-document-solutions-mfps-and-printers-bf1263</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41798%3A%20Session%20Information%20Easily%20Guessable%20in%20KYOCERA%20Document%20Solutions%20Inc.%20Kyocera%20Document%20Solutions%20MFPs%20and%20printers&amp;severity=medium&amp;id=682d9840c4522896dcbf1263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41777-improper-check-or-handling-of-exceptional-conditions-in-kujirahand-nako3edit-editor-component-of-nadesiko3-pc-version-bf125b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41777%3A%20Improper%20check%20or%20handling%20of%20exceptional%20conditions%20in%20kujirahand%20Nako3edit%2C%20editor%20component%20of%20nadesiko3%20(PC%20Version)&amp;severity=high&amp;id=682d9840c4522896dcbf125b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41642-os-command-injection-in-kujirahand-nadesiko3-pc-version-bf1253</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41642%3A%20OS%20Command%20Injection%20in%20kujirahand%20Nadesiko3%20(PC%20Version)&amp;severity=critical&amp;id=682d9840c4522896dcbf1253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40918-n-a-in-n-a-bf124f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40918%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf124f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38337-n-a-in-n-a-bf124b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38337%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf124b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38336-n-a-in-n-a-bf11d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38336%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf11d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37325-n-a-in-n-a-bf11cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37325%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf11cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35254-use-after-free-cwe-416-in-ivanti-connect-secure-ics-ivanti-policy-secure-ips-and-ivanti-neurons-for-zero-trust-access-gateway-bf11b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35254%3A%20Use%20After%20Free%20(CWE-416)%20in%20Ivanti%20Connect%20Secure%20(ICS)%2C%20Ivanti%20Policy%20Secure%20(IPS)%2C%20and%20Ivanti%20Neurons%20for%20Zero%20Trust%20Access%20Gateway&amp;severity=high&amp;id=682d9840c4522896dcbf11b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32634-elevation-of-privilege-in-mediatek-inc-mt6761-mt6765-mt6768-mt6779-mt6781-mt6785-mt6833-mt6853-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6889-mt6893-mt6895-mt6983-mt8321-mt8385-mt8666-mt8675-mt8765-mt8766-mt8768-mt8786-mt8788-mt8789-mt8791-mt8797-bf117a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32634%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf117a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32633-elevation-of-privilege-in-mediatek-inc-mt6580-mt6739-mt6761-mt6762-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt7902-mt7921-mt8167s-mt8168-mt8175-mt8183-mt8185-mt8362a-mt8365-mt8385-mt8518-mt8532-mt8675-mt8695-mt8696-mt8766-mt8768-mt8786-mt8788-mt8789-mt8791-mt8797-bf1172</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32633%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT7902%2C%20MT7921%2C%20MT8167S%2C%20MT8168%2C%20MT8175%2C%20MT8183%2C%20MT8185%2C%20MT8362A%2C%20MT8365%2C%20MT8385%2C%20MT8518%2C%20MT8532%2C%20MT8675%2C%20MT8695%2C%20MT8696%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf1172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32632-elevation-of-privilege-in-mediatek-inc-mt6580-mt6735-mt6765-mt6768-mt6771-mt6779-mt6785-mt6833-mt6853-mt6873-mt6877-mt6885-mt6983-mt7663-mt7668-mt7902-mt7921-mt7933-mt8168-mt8365-mt8518-mt8532-mt8666-mt8667-mt8675-mt8695-mt8696-mt8766-mt8768-mt8786-mt8789-mt8791-mt8797-bf116e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32632%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6735%2C%20MT6765%2C%20MT6768%2C%20MT6771%2C%20MT6779%2C%20MT6785%2C%20MT6833%2C%20MT6853%2C%20MT6873%2C%20MT6877%2C%20MT6885%2C%20MT6983%2C%20MT7663%2C%20MT7668%2C%20MT7902%2C%20MT7921%2C%20MT7933%2C%20MT8168%2C%20MT8365%2C%20MT8518%2C%20MT8532%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8695%2C%20MT8696%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf116e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32631-elevation-of-privilege-in-mediatek-inc-mt6580-mt6739-mt6761-mt6765-mt6768-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6873-mt6877-mt6879-mt6883-mt6895-mt6983-mt8168-mt8365-mt8385-mt8666-mt8667-mt8675-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8797-bf116a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32631%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8365%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf116a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32630-elevation-of-privilege-in-mediatek-inc-mt6789-mt6855-mt6895-mt6983-mt8781-bf114a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32630%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6855%2C%20MT6895%2C%20MT6983%2C%20MT8781&amp;severity=medium&amp;id=682d9840c4522896dcbf114a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32629-elevation-of-privilege-in-mediatek-inc-mt6833-mt6853-mt6855-mt6873-mt6877-mt6893-mt8791-bf1146</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32629%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6893%2C%20MT8791&amp;severity=medium&amp;id=682d9840c4522896dcbf1146</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32628-elevation-of-privilege-in-mediatek-inc-mt6833-mt6853-mt6855-mt6873-mt6877-mt6893-mt8791-bf1142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32628%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6893%2C%20MT8791&amp;severity=medium&amp;id=682d9840c4522896dcbf1142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32626-elevation-of-privilege-in-mediatek-inc-mt6761-mt6765-mt6768-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6889-mt6893-mt6895-mt6983-mt8168-mt8365-mt8766-mt8781-mt8791-bf10e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32626%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8365%2C%20MT8766%2C%20MT8781%2C%20MT8791&amp;severity=medium&amp;id=682d9840c4522896dcbf10e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32625-elevation-of-privilege-in-mediatek-inc-mt6761-mt6765-mt6768-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6855-mt6873-mt6877-mt6879-mt6883-mt6885-mt6889-mt6893-mt6895-mt6983-mt8168-mt8365-mt8675-mt8766-mt8781-mt8791-bf10dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32625%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6761%2C%20MT6765%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8365%2C%20MT8675%2C%20MT8766%2C%20MT8781%2C%20MT8791&amp;severity=medium&amp;id=682d9840c4522896dcbf10dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32622-elevation-of-privilege-in-mediatek-inc-mt6789-mt6855-mt6879-mt6895-mt6983-mt8781-bf10db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32622%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6855%2C%20MT6879%2C%20MT6895%2C%20MT6983%2C%20MT8781&amp;severity=medium&amp;id=682d9840c4522896dcbf10db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32624-elevation-of-privilege-in-mediatek-inc-mt6789-mt6855-mt6895-mt6983-mt8168-mt8365-mt8781-bf1088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32624%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6855%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8365%2C%20MT8781&amp;severity=medium&amp;id=682d9840c4522896dcbf1088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32621-elevation-of-privilege-in-mediatek-inc-mt6895-mt6983-bf1016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32621%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6895%2C%20MT6983&amp;severity=medium&amp;id=682d9840c4522896dcbf1016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32620-elevation-of-privilege-in-mediatek-inc-mt6781-mt6789-mt6833-mt6853-mt6873-mt6877-mt8781-mt8791-bf0ffb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32620%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6781%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6873%2C%20MT6877%2C%20MT8781%2C%20MT8791&amp;severity=medium&amp;id=682d9840c4522896dcbf0ffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32619-elevation-of-privilege-in-mediatek-inc-mt6580-mt6731-mt6735-mt6737-mt6739-mt6753-mt6757-mt6757c-mt6757cd-mt6757ch-mt6761-mt6762-mt6763-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8185-mt8321-mt8385-mt8666-mt8667-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8791t-mt8797-bf0ff3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32619%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6731%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6753%2C%20MT6757%2C%20MT6757C%2C%20MT6757CD%2C%20MT6757CH%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8185%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf0ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32598-elevation-of-privilege-in-mediatek-inc-mt6762-mt6765-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt8385-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8797-bf0feb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32598%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT8385%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf0feb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32597-elevation-of-privilege-in-mediatek-inc-mt6762-mt6765-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt8385-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8797-bf0fe7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32597%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT8385%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf0fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32596-elevation-of-privilege-in-mediatek-inc-mt6762-mt6765-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt8385-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8797-bf0fe3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32596%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT8385%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf0fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32594-elevation-of-privilege-in-mediatek-inc-mt6762-mt6765-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt8385-mt8765-mt8766-mt8768-mt8781-mt8786-mt8788-mt8789-mt8791-mt8797-bf0fdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32594%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT8385%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8781%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=medium&amp;id=682d9840c4522896dcbf0fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32224-deserialization-of-untrusted-data-cwe-502-in-https-github-com-rails-rails-bf0ee0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32224%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20https%3A%2F%2Fgithub.com%2Frails%2Frails&amp;severity=critical&amp;id=682d9840c4522896dcbf0ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35255-use-of-cryptographically-weak-pseudo-random-number-generator-prng-cwe-338-in-nodejs-node-bee393</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35255%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20(CWE-338)%20in%20NodeJS%20Node&amp;severity=critical&amp;id=682d983bc4522896dcbee393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43548-os-command-injection-cwe-78-in-nodejs-node-bee363</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43548%3A%20OS%20Command%20Injection%20(CWE-78)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983bc4522896dcbee363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35256-http-request-smuggling-cwe-444-in-nodejs-node-bed507</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35256%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-05-f1285e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f1285e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46414-n-a-in-n-a-bf14e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46414%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf14e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46411-n-a-in-n-a-bf0f2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46411%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46410-n-a-in-n-a-bf0f1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46410%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46405-n-a-in-n-a-bf0f12</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46405%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf0f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46391-n-a-in-n-a-bf0f0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46391%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35508-n-a-in-n-a-bf0f0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35508%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf0f0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35507-n-a-in-n-a-bf0f06</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35507%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0f06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46413-n-a-in-n-a-bf0cbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46413%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46412-n-a-in-n-a-bf0cbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46412%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-04-f127bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f127bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3491-cwe-122-heap-based-buffer-overflow-in-vim-vim-vim-bf30f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3491%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=medium&amp;id=682d9843c4522896dcbf30f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37533-cwe-20-improper-input-validation-in-apache-software-foundation-apache-commons-net-bf0e6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37533%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Commons%20Net&amp;severity=medium&amp;id=682d983fc4522896dcbf0e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-03-f12685</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f12685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23465-cwe-94-improper-control-of-generation-of-code-code-injection-in-migueldeicaza-swiftterm-bf4be4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23465%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20migueldeicaza%20SwiftTerm&amp;severity=medium&amp;id=682d9846c4522896dcbf4be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46167-cwe-863-incorrect-authorization-in-clastix-capsule-bf4f19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46167%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20clastix%20capsule&amp;severity=medium&amp;id=682d9846c4522896dcbf4f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46145-cwe-287-improper-authentication-in-goauthentik-authentik-bf4ebc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46145%3A%20CWE-287%3A%20Improper%20Authentication%20in%20goauthentik%20authentik&amp;severity=medium&amp;id=682d9846c4522896dcbf4ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46159-cwe-770-allocation-of-resources-without-limits-or-throttling-in-discourse-discourse-bf4ef6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46159%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf4ef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45667-n-a-in-n-a-bf583a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45667%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf583a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3591-cwe-416-use-after-free-in-vim-vim-vim-bf5540</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3591%3A%20CWE-416%20Use%20After%20Free%20in%20vim%20vim%2Fvim&amp;severity=medium&amp;id=682d9847c4522896dcbf5540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3520-cwe-122-heap-based-buffer-overflow-in-vim-vim-vim-bf30f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3520%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=medium&amp;id=682d9843c4522896dcbf30f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45656-n-a-in-n-a-bf151f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45656%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf151f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45655-n-a-in-n-a-bf151b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45655%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf151b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45654-n-a-in-n-a-bf14d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45654%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf14d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45653-n-a-in-n-a-bf14c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45653%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf14c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45652-n-a-in-n-a-bf14b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45652%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf14b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45651-n-a-in-n-a-bf14b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45651%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf14b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45647-n-a-in-n-a-bf149f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45647%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf149f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45646-n-a-in-n-a-bf147b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45646%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf147b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45644-n-a-in-n-a-bf1468</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45644%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf1468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45643-n-a-in-n-a-bf1464</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45643%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf1464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45641-n-a-in-n-a-bf145e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45641%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf145e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45562-n-a-in-n-a-bf13f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45562%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf13f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45483-cwe-319-cleartext-transmission-of-sensitive-information-in-thisaay-lazy-mouse-bf13ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45483%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20thisAAY%20Lazy%20Mouse&amp;severity=medium&amp;id=682d9840c4522896dcbf13ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45482-cwe-521-weak-password-requirements-in-thisaay-lazy-mouse-bf13e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45482%3A%20CWE-521%3A%20Weak%20Password%20Requirements%20in%20thisAAY%20Lazy%20Mouse&amp;severity=critical&amp;id=682d9840c4522896dcbf13e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44950-n-a-in-n-a-bf138d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44950%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf138d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44949-n-a-in-n-a-bf1389</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44949%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf1389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44948-n-a-in-n-a-bf1375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44948%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf1375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44947-n-a-in-n-a-bf1348</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44947%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf1348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44946-n-a-in-n-a-bf1340</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44946%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf1340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44945-n-a-in-n-a-bf1338</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44945%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf1338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45645-n-a-in-n-a-bf1307</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45645%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf1307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44944-n-a-in-n-a-bf12e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44944%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf12e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44930-n-a-in-n-a-bf12d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44930%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf12d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44929-n-a-in-n-a-bf12d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44929%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf12d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44928-n-a-in-n-a-bf12aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44928%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf12aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44366-n-a-in-n-a-bf1038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44366%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf1038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44365-n-a-in-n-a-bf1034</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44365%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf1034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44363-n-a-in-n-a-bf1027</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44363%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9840c4522896dcbf1027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45674-n-a-in-n-a-bf0eb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45674%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45673-n-a-in-n-a-bf0eb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45673%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9840c4522896dcbf0eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45672-n-a-in-n-a-bf0ea9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45672%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf0ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45671-n-a-in-n-a-bf0ea1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45671%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf0ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45660-n-a-in-n-a-bf0e81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45660%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf0e81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45650-n-a-in-n-a-bf0e74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45650%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45649-n-a-in-n-a-bf0e6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45649%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45670-n-a-in-n-a-bf0e37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45670%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45669-n-a-in-n-a-bf0e33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45669%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45668-n-a-in-n-a-bf0e2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45668%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0e2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45664-n-a-in-n-a-bf0e20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45664%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45663-n-a-in-n-a-bf0e11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45663%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45661-n-a-in-n-a-bf0e09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45661%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45659-n-a-in-n-a-bf0caa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45659%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0caa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45658-n-a-in-n-a-bf0ca2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45658%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45657-n-a-in-n-a-bf0c9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45657%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45648-n-a-in-n-a-bf0c78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45648%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45215-n-a-in-n-a-bf0afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45215%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44961-n-a-in-n-a-bf0af4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44961%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44960-n-a-in-n-a-bf0ae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44960%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44962-n-a-in-n-a-bf0ad7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44962%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0ad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44955-n-a-in-n-a-bf0ad3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44955%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44954-n-a-in-n-a-bf0acf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0acf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44953-n-a-in-n-a-bf0acb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44953%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0acb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44952-n-a-in-n-a-bf0ac7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44952%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44951-n-a-in-n-a-bf0abf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44951%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44367-n-a-in-n-a-bf0aa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44367%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44362-n-a-in-n-a-bf0a88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44362%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44348-n-a-in-n-a-bf0a84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44348%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44347-n-a-in-n-a-bf0a78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44347%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44345-n-a-in-n-a-bf0a74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44345%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43325-n-a-in-n-a-bf0a55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43325%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45480-cwe-319-cleartext-transmission-of-sensitive-information-in-telepad-pc-keyboard-wifi-bluetooth-bf08a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45480%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Telepad%20PC%20Keyboard%20WiFi%20%26%20Bluetooth&amp;severity=medium&amp;id=682d983fc4522896dcbf08a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44959-n-a-in-n-a-bf08a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44959%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf08a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44957-n-a-in-n-a-bf0894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44957%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44956-n-a-in-n-a-bf088c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf088c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44291-n-a-in-n-a-bf0884</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44291%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44290-n-a-in-n-a-bf087c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44290%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf087c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44277-n-a-in-n-a-bf0874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44277%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-02-f12152</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f12152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41971-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf4d8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41971%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf4d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41970-cwe-284-improper-access-control-in-nextcloud-security-advisories-bf4d84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41970%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf4d84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41969-cwe-400-uncontrolled-resource-consumption-in-nextcloud-security-advisories-bf4d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41969%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf4d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41968-cwe-400-uncontrolled-resource-consumption-in-nextcloud-security-advisories-bf4d73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41968%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf4d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43901-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ibm-websphere-automation-for-cloud-pak-for-watson-aiops-bf5544</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43901%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20WebSphere%20Automation%20for%20Cloud%20Pak%20for%20Watson%20AIOps&amp;severity=medium&amp;id=682d9847c4522896dcbf5544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43900-cwe-287-improper-authentication-in-ibm-websphere-automation-for-ibm-cloud-pak-for-watson-aiops-bf16cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43900%3A%20CWE-287%20Improper%20Authentication%20in%20%20IBM%20WebSphere%20Automation%20for%20IBM%20Cloud%20Pak%20for%20Watson%20AIOps&amp;severity=medium&amp;id=682d9840c4522896dcbf16cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41297-cwe-352-cross-site-request-forgery-csrf-in-ibm-db2u-bf090a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41297%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20IBM%20Db2U&amp;severity=medium&amp;id=682d983fc4522896dcbf090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38997-cwe-644-improper-neutralization-of-http-headers-for-scripting-syntax-in-ibm-api-connect-bf575d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38997%3A%20CWE-644%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20IBM%20API%20Connect&amp;severity=medium&amp;id=682d9847c4522896dcbf575d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45797-n-a-in-trend-micro-inc-trend-micro-apex-one-bf091d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45797%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983fc4522896dcbf091d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3270-cwe-1059-incomplete-documentation-in-festo-se-bus-module-cpx-e-ep-bf08b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3270%3A%20CWE-1059%20%20Incomplete%20Documentation%20in%20Festo%20SE%20Bus%20module%20CPX-E-EP&amp;severity=medium&amp;id=682d983fc4522896dcbf08b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45050-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-axiell-iguana-bf04d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45050%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Axiell%20Iguana&amp;severity=medium&amp;id=682d983fc4522896dcbf04d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3711-n-a-in-sophos-sophos-firewall-bf5782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3711%3A%20n%2Fa%20in%20Sophos%20Sophos%20Firewall&amp;severity=medium&amp;id=682d9847c4522896dcbf5782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3710-n-a-in-sophos-sophos-firewall-bf16c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3710%3A%20n%2Fa%20in%20Sophos%20Sophos%20Firewall&amp;severity=medium&amp;id=682d9840c4522896dcbf16c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28607-n-a-in-n-a-bf123a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28607%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9840c4522896dcbf123a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23737-cwe-269-in-github-github-enterprise-server-bf1232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23737%3A%20CWE-269%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=682d9840c4522896dcbf1232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44212-n-a-in-n-a-bf0c68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44212%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44211-n-a-in-n-a-bf0c64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44211%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43333-n-a-in-n-a-bf0c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43333%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36431-n-a-in-n-a-bf0c43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36431%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0c43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35120-n-a-in-n-a-bf0b7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30528-n-a-in-n-a-bf0b7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30528%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0b7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45640-n-a-in-n-a-bf08e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45640%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf08e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45045-n-a-in-n-a-bf08e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45045%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf08e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42718-n-a-in-n-a-bf08db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42718%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf08db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3709-n-a-in-sophos-sophos-firewall-bf08d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3709%3A%20n%2Fa%20in%20Sophos%20Sophos%20Firewall&amp;severity=medium&amp;id=682d983fc4522896dcbf08d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3696-n-a-in-sophos-sophos-firewall-bf08d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3696%3A%20n%2Fa%20in%20Sophos%20Sophos%20Firewall&amp;severity=medium&amp;id=682d983fc4522896dcbf08d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3226-n-a-in-sophos-sophos-firewall-bf08af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3226%3A%20n%2Fa%20in%20Sophos%20Sophos%20Firewall&amp;severity=medium&amp;id=682d983fc4522896dcbf08af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29837-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-western-digital-my-cloud-home-bf08ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29837%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Western%20Digital%20My%20Cloud%20Home&amp;severity=medium&amp;id=682d983fc4522896dcbf08ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40849-n-a-in-n-a-bf0854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40849%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40489-n-a-in-n-a-bf0847</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40489%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0847</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3713-n-a-in-sophos-sophos-firewall-bf0841</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3713%3A%20n%2Fa%20in%20Sophos%20Sophos%20Firewall&amp;severity=medium&amp;id=682d983fc4522896dcbf0841</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37017-security-control-bypass-in-symantec-endpoint-protection-bf0839</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37017%3A%20Security%20Control%20Bypass%20in%20Symantec%20Endpoint%20Protection&amp;severity=high&amp;id=682d983fc4522896dcbf0839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37016-privilege-escalation-in-symantec-endpoint-protection-bf0831</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37016%3A%20Privilege%20Escalation%20in%20Symantec%20Endpoint%20Protection&amp;severity=critical&amp;id=682d983fc4522896dcbf0831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44262-n-a-in-n-a-beee9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44262%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeee9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-12-01-f12add</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-12-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12add</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42446-n-a-in-hcl-software-hcl-sametime-bf11db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42446%3A%20n%2Fa%20in%20HCL%20Software%20HCL%20Sametime&amp;severity=medium&amp;id=682d9840c4522896dcbf11db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44533-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf11fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44533%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=high&amp;id=682d9840c4522896dcbf11fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44532-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf11f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44532%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d9840c4522896dcbf11f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43542-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf11f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43542%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d9840c4522896dcbf11f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43541-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf11e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43541%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d9840c4522896dcbf11e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43518-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf1182</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43518%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d9840c4522896dcbf1182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37926-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37926%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37925-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37925%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37924-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37924%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37923-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37923%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37922-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37922%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37921-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37921%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37920-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37920%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37919-n-a-in-hewlett-packard-enterprise-hpe-aruba-edgeconnect-enterprise-software-bf0b59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37919%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Aruba%20EdgeConnect%20Enterprise%20Software&amp;severity=medium&amp;id=682d983fc4522896dcbf0b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37932-n-a-in-hewlett-packard-enterprise-hpe-hewlett-packard-enterprise-officeconnect-1820-1850-and-1920s-network-switches-bf0b5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37932%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20Hewlett%20Packard%20Enterprise%20OfficeConnect%201820%2C%201850%2C%20and%201920S%20Network%20switches&amp;severity=medium&amp;id=682d983fc4522896dcbf0b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3859-cwe-427-uncontrolled-search-path-element-in-trellix-trellix-agent-bf1d28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3859%3A%20CWE-%20427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Trellix%20Trellix%20Agent&amp;severity=medium&amp;id=682d9841c4522896dcbf1d28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40265-cwe-20-improper-input-validation-in-mitsubishi-electric-corporation-melsec-iq-r-series-rj71en71-bf0b61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40265%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Mitsubishi%20Electric%20Corporation%20MELSEC%20iQ-R%20Series%20RJ71EN71&amp;severity=medium&amp;id=682d983fc4522896dcbf0b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46162-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-discourse-discourse-bbcode-bf6edf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46162%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20discourse%20discourse-bbcode&amp;severity=medium&amp;id=682d9849c4522896dcbf6edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46156-cwe-489-active-debug-code-in-grafana-synthetic-monitoring-agent-bf4ee5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46156%3A%20CWE-489%3A%20Active%20Debug%20Code%20in%20grafana%20synthetic-monitoring-agent&amp;severity=medium&amp;id=682d9846c4522896dcbf4ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46149-cwe-125-out-of-bounds-read-in-capnproto-capnproto-bf4bc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46149%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20capnproto%20capnproto&amp;severity=medium&amp;id=682d9846c4522896dcbf4bc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46338-n-a-in-n-a-bf0b55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46338%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45869-n-a-in-n-a-bf0b41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45869%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45337-n-a-in-n-a-bf0b04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45337%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45332-n-a-in-n-a-bf0b00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45332%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45328-n-a-in-n-a-bf0adb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45328%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44296-n-a-in-n-a-bf0ac3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44296%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0ac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44295-n-a-in-n-a-bf0a96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44295%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44294-n-a-in-n-a-bf0a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44294%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44151-n-a-in-n-a-bf0a80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44151%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41412-n-a-in-n-a-bf0a7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41412%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf0a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38803-n-a-in-n-a-bf0a5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38803%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38802-n-a-in-n-a-bf0a59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38802%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38801-n-a-in-n-a-bf0a51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38801%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24441-code-injection-in-snyk-bf0a4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24441%3A%20Code%20Injection%20in%20snyk&amp;severity=medium&amp;id=682d983fc4522896dcbf0a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44136-n-a-in-n-a-bf0835</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44136%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf0835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44097-n-a-in-n-a-bf082d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44097%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf082d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44096-n-a-in-n-a-bf04cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44096%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983fc4522896dcbf04cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23746-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-gateway-management-ipsec-vpn-blade-snx-portal-bf04c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23746%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Gateway%20%26%20Management%2C%20IPsec%20VPN%20blade%20SNX%20portal.&amp;severity=high&amp;id=682d983fc4522896dcbf04c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22984-command-injection-in-snyk-bf04b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22984%3A%20Command%20Injection%20in%20snyk&amp;severity=medium&amp;id=682d983fc4522896dcbf04b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31740-n-a-in-n-a-bf043a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31740%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf043a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41413-n-a-in-n-a-beba90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41413%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeba90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-30-f122dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f122dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36964-cwe-502-deserialization-of-untrusted-data-in-solarwinds-solarwinds-platform-bf044b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36964%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=medium&amp;id=682d983fc4522896dcbf044b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36962-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-solarwinds-solarwinds-platform-bf0447</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36962%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=medium&amp;id=682d983fc4522896dcbf0447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36960-cwe-287-improper-authentication-in-solarwinds-solarwinds-platform-bf0c74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36960%3A%20CWE-287%20Improper%20Authentication%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=medium&amp;id=682d983fc4522896dcbf0c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21126-creation-of-temporary-file-in-directory-with-insecure-permissions-in-com-github-samtools-htsjdk-bf0b67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21126%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Insecure%20Permissions%20in%20com.github.samtools%3Ahtsjdk&amp;severity=medium&amp;id=682d983fc4522896dcbf0b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25848-directory-traversal-in-static-dev-server-bf0c4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25848%3A%20Directory%20Traversal%20in%20static-dev-server&amp;severity=medium&amp;id=682d983fc4522896dcbf0c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41676-cwe-85-doubled-character-xss-manipulations-in-team-johnlong-software-co-ltd-maild-mail-server-bf0b51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41676%3A%20CWE-85%20Doubled%20Character%20XSS%20Manipulations%20in%20TEAM%20JOHNLONG%20SOFTWARE%20CO.%2C%20LTD.%20MAILD%20Mail%20Server&amp;severity=medium&amp;id=682d983fc4522896dcbf0b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41675-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-team-johnlong-software-co-ltd-maild-mail-server-bf044f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41675%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20TEAM%20JOHNLONG%20SOFTWARE%20CO.%2C%20LTD.%20MAILD%20Mail%20Server&amp;severity=medium&amp;id=682d983fc4522896dcbf044f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32967-cwe-798-use-of-hard-coded-credentials-in-realtek-rtl8111ep-cg-bf5968</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32967%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Realtek%20RTL8111EP-CG&amp;severity=medium&amp;id=682d9847c4522896dcbf5968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32966-cwe-862-missing-authorization-in-realtek-rtl8111fp-cg-bf0c2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32966%3A%20CWE-862%20Missing%20Authorization%20in%20Realtek%20RTL8111FP-CG&amp;severity=medium&amp;id=682d983fc4522896dcbf0c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46152-cwe-129-improper-validation-of-array-index-in-op-tee-optee-os-bf6ebc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46152%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20OP-TEE%20optee_os&amp;severity=medium&amp;id=682d9849c4522896dcbf6ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46155-cwe-522-insufficiently-protected-credentials-in-airtable-airtable-js-bf4bd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46155%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Airtable%20airtable.js&amp;severity=medium&amp;id=682d9846c4522896dcbf4bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46150-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf4bcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46150%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf4bcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46148-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-discourse-discourse-bf4bbf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46148%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf4bbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45305-n-a-in-n-a-bf04d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45305%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf04d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45304-n-a-in-n-a-bf04d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45304%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf04d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45307-n-a-in-n-a-bf0481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45307%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45306-n-a-in-n-a-bf045f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45306%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf045f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45301-n-a-in-n-a-bf0457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45301%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45204-n-a-in-n-a-bf0432</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45204%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf0432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45202-n-a-in-n-a-bf042c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45202%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf042c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44635-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-fineract-bf0428</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44635%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Fineract&amp;severity=high&amp;id=682d983fc4522896dcbf0428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44356-n-a-in-n-a-bf040f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44356%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf040f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44355-n-a-in-n-a-bf040b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44355%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf040b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40799-n-a-in-n-a-bf03f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40799%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983fc4522896dcbf03f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3751-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-in-owncast-owncast-owncast-bf03ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3751%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20in%20owncast%20owncast%2Fowncast&amp;severity=medium&amp;id=682d983fc4522896dcbf03ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36433-n-a-in-n-a-bf03e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36433%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf03e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36137-n-a-in-n-a-bf03e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36137%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf03e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36136-n-a-in-n-a-bf03d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36136%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983fc4522896dcbf03d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45329-n-a-in-n-a-bf0291</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45329%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbf0291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44354-n-a-in-n-a-bf0282</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf0282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44279-n-a-in-n-a-bf0278</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44279%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf0278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44038-n-a-in-n-a-bf025f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf025f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44037-n-a-in-n-a-bf0259</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbf0259</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43326-n-a-in-n-a-bf0142</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43326%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbf0142</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42109-n-a-in-n-a-bf0116</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42109%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf0116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42100-n-a-in-n-a-bf010e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42100%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf010e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42099-n-a-in-n-a-bf00e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42099%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf00e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41568-na-in-line-corporation-line-client-for-ios-bf00e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41568%3A%20na%20in%20LINE%20Corporation%20LINE%20client%20for%20iOS&amp;severity=high&amp;id=682d983ec4522896dcbf00e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45343-n-a-in-n-a-bebacc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45343%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebacc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-29-f215a3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-29&amp;severity=medium&amp;id=682acdc4bbaf20d303f215a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-29-f12f01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12f01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41732-cwe-256-plaintext-storage-of-a-password-in-ibm-maximo-mobile-bf03fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41732%3A%20CWE-256%20Plaintext%20Storage%20of%20a%20Password%20in%20IBM%20Maximo%20Mobile&amp;severity=medium&amp;id=682d983fc4522896dcbf03fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45036-cwe-290-authentication-bypass-by-spoofing-in-velneo-velneo-vclient-bf036b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45036%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Velneo%20Velneo%20vClient&amp;severity=medium&amp;id=682d983ec4522896dcbf036b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42445-n-a-in-hcl-software-hcl-launch-bf03c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42445%3A%20n%2Fa%20in%20HCL%20Software%20HCL%20Launch&amp;severity=medium&amp;id=682d983fc4522896dcbf03c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3865-cwe-89-sql-injection-in-unknown-wp-user-merger-bf03c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3865%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20User%20Merger&amp;severity=high&amp;id=682d983fc4522896dcbf03c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3823-cwe-79-cross-site-scripting-xss-in-unknown-beautiful-cookie-consent-banner-bf0391</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3823%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Beautiful%20Cookie%20Consent%20Banner&amp;severity=medium&amp;id=682d983ec4522896dcbf0391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3511-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-awesome-support-befd70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3511%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Awesome%20Support&amp;severity=medium&amp;id=682d983ec4522896dcbefd70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3839-cwe-79-cross-site-scripting-xss-in-unknown-analytics-for-wp-befd7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3839%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Analytics%20for%20WP&amp;severity=medium&amp;id=682d983ec4522896dcbefd7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3603-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-export-customers-list-csv-for-woocommerce-wordpress-users-csv-export-guest-customer-list-befd76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3603%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20Export%20customers%20list%20csv%20for%20WooCommerce%2C%20WordPress%20users%20csv%2C%20export%20Guest%20customer%20list&amp;severity=critical&amp;id=682d983ec4522896dcbefd76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3834-cwe-79-cross-site-scripting-xss-in-unknown-google-forms-befdb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3834%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Google%20Forms&amp;severity=medium&amp;id=682d983ec4522896dcbefdb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3822-cwe-79-cross-site-scripting-xss-in-unknown-donations-via-paypal-bf00d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3822%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Donations%20via%20PayPal&amp;severity=medium&amp;id=682d983ec4522896dcbf00d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3848-cwe-89-sql-injection-in-unknown-wp-user-merger-bf00e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3848%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20User%20Merger&amp;severity=high&amp;id=682d983ec4522896dcbf00e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3833-cwe-79-cross-site-scripting-xss-in-unknown-fancier-author-box-by-thematosoup-bf00dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3833%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Fancier%20Author%20Box%20by%20ThematoSoup&amp;severity=medium&amp;id=682d983ec4522896dcbf00dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3824-cwe-79-cross-site-scripting-xss-in-unknown-wp-admin-ui-customize-bef718</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3824%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Admin%20UI%20Customize&amp;severity=medium&amp;id=682d983dc4522896dcbef718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3849-cwe-89-sql-injection-in-unknown-wp-user-merger-bef4d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3849%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20User%20Merger&amp;severity=high&amp;id=682d983dc4522896dcbef4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3490-cwe-502-deserialization-of-untrusted-data-in-unknown-checkout-field-editor-checkout-manager-for-woocommerce-bf0319</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3490%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Checkout%20Field%20Editor%20(Checkout%20Manager)%20for%20WooCommerce&amp;severity=high&amp;id=682d983ec4522896dcbf0319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3828-cwe-79-cross-site-scripting-xss-in-unknown-video-thumbnails-bf0329</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3828%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Video%20Thumbnails&amp;severity=medium&amp;id=682d983ec4522896dcbf0329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2983-cwe-79-cross-site-scripting-xss-in-unknown-salat-times-bf0311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2983%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Salat%20Times&amp;severity=medium&amp;id=682d983ec4522896dcbf0311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2311-cwe-79-cross-site-scripting-xss-in-unknown-find-and-replace-all-bf47b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2311%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Find%20and%20Replace%20All&amp;severity=medium&amp;id=682d9845c4522896dcbf47b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3610-cwe-79-cross-site-scripting-xss-in-unknown-jeeng-push-notifications-bf0321</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3610%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Jeeng%20Push%20Notifications&amp;severity=medium&amp;id=682d983ec4522896dcbf0321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3850-cwe-352-cross-site-request-forgery-csrf-in-unknown-find-and-replace-all-bf03a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3850%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Find%20and%20Replace%20All&amp;severity=medium&amp;id=682d983ec4522896dcbf03a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3831-cwe-79-cross-site-scripting-xss-in-unknown-recaptcha-bf0399</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3831%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20reCAPTCHA&amp;severity=medium&amp;id=682d983ec4522896dcbf0399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3689-cwe-89-sql-injection-in-unknown-html-forms-bf0385</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3689%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20HTML%20Forms&amp;severity=high&amp;id=682d983ec4522896dcbf0385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25059-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-download-plugin-bf0363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25059%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Download%20Plugin&amp;severity=medium&amp;id=682d983ec4522896dcbf0363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3769-cwe-89-sql-injection-in-unknown-owm-weather-bf0389</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3769%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20OWM%20Weather&amp;severity=high&amp;id=682d983ec4522896dcbf0389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3768-cwe-89-sql-injection-in-unknown-wpsmartcontracts-bf02a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3768%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WPSmartContracts&amp;severity=high&amp;id=682d983ec4522896dcbf02a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3601-cwe-79-cross-site-scripting-xss-in-unknown-image-hover-effects-css3-bef47a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3601%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Image%20Hover%20Effects%20Css3&amp;severity=medium&amp;id=682d983dc4522896dcbef47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46147-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-openedx-xblock-drag-and-drop-v2-bf6eb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46147%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20openedx%20xblock-drag-and-drop-v2&amp;severity=medium&amp;id=682d9849c4522896dcbf6eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45442-cwe-494-download-of-code-without-integrity-check-in-sinatra-sinatra-bf6eb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45442%3A%20CWE-494%3A%20Download%20of%20Code%20Without%20Integrity%20Check%20in%20sinatra%20sinatra&amp;severity=medium&amp;id=682d9849c4522896dcbf6eb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41965-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-opencast-opencast-bf4bb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41965%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20opencast%20opencast&amp;severity=medium&amp;id=682d9846c4522896dcbf4bb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41957-cwe-690-unchecked-return-value-to-null-pointer-dereference-in-julianhille-muhammarajs-bf4baf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41957%3A%20CWE-690%3A%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20julianhille%20MuhammaraJS&amp;severity=medium&amp;id=682d9846c4522896dcbf4baf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41944-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf4b7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41944%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf4b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41921-cwe-20-improper-input-validation-in-discourse-discourse-bf4aec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41921%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf4aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41912-cwe-287-improper-authentication-in-crewjam-saml-bf4a9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41912%3A%20CWE-287%3A%20Improper%20Authentication%20in%20crewjam%20saml&amp;severity=medium&amp;id=682d9846c4522896dcbf4a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44937-n-a-in-n-a-bf02b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44937%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbf02b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36193-n-a-in-n-a-befe9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36193%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31877-n-a-in-n-a-befe89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefe89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45221-n-a-in-n-a-befe16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefe16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45214-n-a-in-n-a-befe05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45214%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefe05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44400-n-a-in-n-a-befdfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44400%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38900-n-a-in-n-a-befdec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38900%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44399-n-a-in-n-a-befdc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44399%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefdc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44284-n-a-in-n-a-befdc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44284%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefdc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44283-n-a-in-n-a-befdc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44283%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefdc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38753-mfa-factor-authentication-bypass-in-netiq-advanced-authentication-befc74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38753%3A%20MFA%20Factor%20Authentication%20bypass%20in%20NetIQ%20Advanced%20Authentication&amp;severity=medium&amp;id=682d983ec4522896dcbefc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45939-n-a-in-n-a-bef4bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45939%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45921-n-a-in-n-a-bef497</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45921%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45224-n-a-in-n-a-bef493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45224%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45223-n-a-in-n-a-bef48f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45223%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44401-n-a-in-n-a-bef077</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44401%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24190-n-a-in-n-a-bef06f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24190%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef06f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24189-n-a-in-n-a-bef06b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24188-n-a-in-n-a-bef067</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24187-n-a-in-n-a-beefc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24187%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeefc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-28-f12fff</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43705-n-a-in-n-a-befea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43705%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45934-n-a-in-n-a-bef014</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45934%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45933-n-a-in-n-a-bef005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45933%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45932-n-a-in-n-a-beeffd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45932%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeeffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45931-n-a-in-n-a-beeff5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeeff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45930-n-a-in-n-a-beefb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45930%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeefb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45914-n-a-in-n-a-beefae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45914%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbeefae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-27-76636a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-27&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb76636a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-27-f12e87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45908-n-a-in-n-a-beff07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45908%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbeff07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45907-n-a-in-n-a-beff03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45907%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbeff03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45909-n-a-in-n-a-befede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45909%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24999-n-a-in-n-a-beef9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24999%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeef9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-26-f12e47</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-25-3b0fc5db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-25&amp;severity=medium&amp;id=68359c9d5d5f0974d01f6b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41958-cwe-502-deserialization-of-untrusted-data-in-4ra1n-super-xray-bf6ea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41958%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%204ra1n%20super-xray&amp;severity=medium&amp;id=682d9849c4522896dcbf6ea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39334-cwe-295-improper-certificate-validation-in-nextcloud-security-advisories-bf6e7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39334%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9849c4522896dcbf6e7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39333-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nextcloud-security-advisories-bf6e72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39333%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9849c4522896dcbf6e72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39332-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nextcloud-security-advisories-bf6e50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39332%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9849c4522896dcbf6e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39331-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nextcloud-security-advisories-bf6c65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39331%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9849c4522896dcbf6c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41156-cwe-345-insufficient-verification-of-data-authenticity-in-etms-co-ltd-ondiskplayeragent-bf58d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41156%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20ETMS%20Co.%2CLtd%20OndiskPlayerAgent&amp;severity=medium&amp;id=682d9847c4522896dcbf58d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41954-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-joniles-mpxj-bf4b8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41954%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20joniles%20mpxj&amp;severity=medium&amp;id=682d9846c4522896dcbf4b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41926-cwe-732-incorrect-permission-assignment-for-critical-resource-in-nextcloud-security-advisories-bf4b0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41926%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf4b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39346-cwe-400-uncontrolled-resource-consumption-in-nextcloud-security-advisories-bf491b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39346%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf491b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39339-cwe-319-cleartext-transmission-of-sensitive-information-in-nextcloud-security-advisories-bf48f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39339%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf48f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39338-cwe-20-improper-input-validation-in-nextcloud-security-advisories-bf48ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39338%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf48ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39325-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-baserproject-basercms-bf48a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39325%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20baserproject%20basercms&amp;severity=medium&amp;id=682d9846c4522896dcbf48a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41157-cwe-798-use-of-hard-coded-credentials-in-webcash-co-ltd-serp-server-2-0-bf0a8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41157%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Webcash%20Co.%2CLtd%20sERP%20Server%202.0&amp;severity=medium&amp;id=682d983fc4522896dcbf0a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37721-n-a-in-n-a-bf00d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37721%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf00d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37720-n-a-in-n-a-bf00c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37720%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf00c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36133-n-a-in-n-a-bf00a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36133%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbf00a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2721-insertion-of-sensitive-information-into-log-file-in-octopus-deploy-octopus-server-bf0098</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2721%3A%20Insertion%20of%20sensitive%20information%20into%20log%20file%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=high&amp;id=682d983ec4522896dcbf0098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23044-remote-command-execution-in-tiny-file-manager-bf0082</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23044%3A%20Remote%20command%20execution%20in%20Tiny%20File%20Manager&amp;severity=high&amp;id=682d983ec4522896dcbf0082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0698-dom-based-cross-site-scripting-xss-in-microweber-bf0075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0698%3A%20DOM-Based%20cross-site%20scripting%20(XSS)%20in%20Microweber&amp;severity=medium&amp;id=682d983ec4522896dcbf0075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45037-n-a-in-n-a-beff81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeff81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45036-n-a-in-n-a-beff79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45036%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeff79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38813-n-a-in-n-a-beff71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38813%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbeff71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38767-n-a-in-n-a-beff5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38767%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbeff5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45039-n-a-in-n-a-beff3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbeff3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45038-n-a-in-n-a-beff37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeff37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45040-n-a-in-n-a-beff29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeff29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45887-n-a-in-n-a-befeff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45887%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45885-n-a-in-n-a-beef96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45885%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeef96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45476-remote-command-execution-in-tiny-file-manager-beef62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45476%3A%20Remote%20command%20execution%20in%20Tiny%20File%20Manager&amp;severity=critical&amp;id=682d983dc4522896dcbeef62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45475-remote-command-execution-in-tiny-file-manager-beef5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45475%3A%20Remote%20command%20execution%20in%20Tiny%20File%20Manager&amp;severity=medium&amp;id=682d983dc4522896dcbeef5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45225-n-a-in-n-a-beef4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45225%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbeef4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45210-n-a-in-n-a-beeef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45210%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45208-n-a-in-n-a-beeef7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45208%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45207-n-a-in-n-a-beeef3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45207%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45206-n-a-in-n-a-beeee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45206%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45205-n-a-in-n-a-beeee2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45205%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45152-cwe-918-server-side-request-forgery-ssrf-in-moodle-beeede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45152%3A%20CWE-918%20-%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Moodle&amp;severity=critical&amp;id=682d983cc4522896dcbeeede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44860-n-a-in-n-a-beeebb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44860%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44859-n-a-in-n-a-beeeae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44859%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeeae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44858-n-a-in-n-a-beeeaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44858%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeeaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44844-n-a-in-n-a-beeea6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44843-n-a-in-n-a-beeea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44843%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44411-n-a-in-n-a-beee2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44411%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeee2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43984-server-side-xss-in-browsershot-beee20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43984%3A%20Server%20Side%20XSS%20in%20Browsershot&amp;severity=high&amp;id=682d983cc4522896dcbeee20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43983-server-side-xss-in-browsershot-beee18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43983%3A%20Server%20Side%20XSS%20in%20Browsershot&amp;severity=high&amp;id=682d983cc4522896dcbeee18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41712-lack-of-data-validation-path-traversal-in-frappe-beedf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41712%3A%20Lack%20of%20data%20validation%20-%20Path%20Traversal%20in%20Frappe&amp;severity=medium&amp;id=682d983cc4522896dcbeedf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41706-server-side-xss-in-browsershot-beedde</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41706%3A%20Server%20Side%20XSS%20in%20Browsershot&amp;severity=high&amp;id=682d983cc4522896dcbeedde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41705-remote-command-execution-in-badaso-beedd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41705%3A%20Remote%20command%20execution%20in%20Badaso&amp;severity=critical&amp;id=682d983cc4522896dcbeedd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41158-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-eyoom-co-ltd-eyoom-builder-beed96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41158%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20eyoom%20Co.%2CLtd%20eyoom%20builder&amp;severity=high&amp;id=682d983cc4522896dcbeed96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40282-n-a-in-n-a-beed89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40282%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeed89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38166-n-a-in-n-a-beed78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38166%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeed78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-25-f1dfe3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-25&amp;severity=medium&amp;id=682acdc3bbaf20d303f1dfe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-25-f12173</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f12173</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29833-cwe-522-insufficiently-protected-credentials-in-mitsubishi-electric-corporation-gx-works3-bf0090</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29833%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf0090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29832-cwe-316-cleartext-storage-of-sensitive-information-in-memory-in-mitsubishi-electric-corporation-gx-works3-bf0088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29832%3A%20CWE-316%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf0088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29831-cwe-259-use-of-hard-coded-password-in-mitsubishi-electric-corporation-gx-works3-bf0063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29831%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf0063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29830-cwe-321-use-of-hard-coded-cryptographic-key-in-mitsubishi-electric-corporation-gx-works3-bf004a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29830%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf004a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29829-cwe-321-use-of-hard-coded-cryptographic-key-in-mitsubishi-electric-corporation-gx-works3-bf0b08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29829%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983fc4522896dcbf0b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29828-cwe-321-use-of-hard-coded-cryptographic-key-in-mitsubishi-electric-corporation-gx-works3-bf0024</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29828%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf0024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29827-cwe-321-use-of-hard-coded-cryptographic-key-in-mitsubishi-electric-corporation-gx-works3-bf001c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29827%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf001c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29826-cwe-312-cleartext-storage-of-sensitive-information-in-mitsubishi-electric-corporation-gx-works3-bf0014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29826%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf0014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29825-cwe-259-use-of-hard-coded-password-in-mitsubishi-electric-corporation-gx-works3-bf000c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29825%3A%20CWE-259%20Use%20of%20Hard-coded%20Password%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf000c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25164-cwe-312-cleartext-storage-of-sensitive-information-in-mitsubishi-electric-corporation-gx-works3-bf0004</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25164%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20GX%20Works3&amp;severity=medium&amp;id=682d983ec4522896dcbf0004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40977-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-pilz-pasvisu-bf0a61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40977%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PILZ%20PASvisu&amp;severity=medium&amp;id=682d983fc4522896dcbf0a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40976-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-pilz-pascal-bf003b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40976%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20PILZ%20PAScal&amp;severity=medium&amp;id=682d983ec4522896dcbf003b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40266-cwe-20-improper-input-validation-in-mitsubishi-electric-got2000-series-gt27-model-bf0033</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40266%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Mitsubishi%20Electric%20GOT2000%20Series%20GT27%20model&amp;severity=medium&amp;id=682d983ec4522896dcbf0033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44749-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-knime-knime-analytics-platform-bf0b93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44749%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20KNIME%20KNIME%20Analytics%20Platform&amp;severity=medium&amp;id=682d983fc4522896dcbf0b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44748-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-knime-knime-server-beffed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44748%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20KNIME%20KNIME%20Server&amp;severity=medium&amp;id=682d983ec4522896dcbeffed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2650-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-wger-project-wger-project-wger-beffcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2650%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20wger-project%20wger-project%2Fwger&amp;severity=medium&amp;id=682d983ec4522896dcbeffcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26885-config-file-read-by-task-risk-in-apache-software-foundation-apache-dolphinscheduler-beffad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26885%3A%20config%20file%20read%20by%20task%20risk%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=high&amp;id=682d983ec4522896dcbeffad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-24-f12cd5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35246-cwe-319-inappropriate-encoding-for-output-context-in-solarwinds-engineer-s-toolset-beffa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35246%3A%20CWE-319%20Inappropriate%20Encoding%20for%20Output%20Context%20in%20SolarWinds%20Engineer&apos;s%20Toolset&amp;severity=medium&amp;id=682d983ec4522896dcbeffa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42896-cwe-416-use-after-free-in-linux-linux-kernel-bf8292</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42896%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf8292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42895-cwe-824-access-of-uninitialized-pointer-in-linux-linux-kernel-bf827b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42895%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Linux%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf827b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41935-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-xwiki-xwiki-platform-bf6d92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41935%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41934-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-xwiki-xwiki-platform-bf6d8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41934%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41931-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-xwiki-xwiki-platform-bf6d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41931%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41930-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bf6d86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41930%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41929-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bf6d82</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41929%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6d82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41928-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-xwiki-xwiki-platform-bf6d7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41928%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6d7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41925-cwe-352-cross-site-request-forgery-csrf-in-tailscale-tailscale-bf6d78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41925%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20tailscale%20tailscale&amp;severity=medium&amp;id=682d9849c4522896dcbf6d78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41924-cwe-346-origin-validation-error-in-tailscale-tailscale-bf6d74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41924%3A%20CWE-346%3A%20Origin%20Validation%20Error%20in%20tailscale%20tailscale&amp;severity=medium&amp;id=682d9849c4522896dcbf6d74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36111-cwe-345-insufficient-verification-of-data-authenticity-in-codenotary-immudb-bf6c37</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36111%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20codenotary%20immudb&amp;severity=medium&amp;id=682d9849c4522896dcbf6c37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41933-cwe-312-cleartext-storage-of-sensitive-information-in-xwiki-xwiki-platform-bf4b34</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41933%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9846c4522896dcbf4b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41932-cwe-400-uncontrolled-resource-consumption-in-xwiki-xwiki-platform-bf4b2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41932%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9846c4522896dcbf4b2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41927-cwe-352-cross-site-request-forgery-csrf-in-xwiki-xwiki-platform-bf4b13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41927%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9846c4522896dcbf4b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41923-cwe-269-improper-privilege-management-in-grails-grails-spring-security-core-bf4b03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41923%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20grails%20grails-spring-security-core&amp;severity=medium&amp;id=682d9846c4522896dcbf4b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41922-cwe-502-deserialization-of-untrusted-data-in-yiisoft-yii-bf4af4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41922%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20yiisoft%20yii&amp;severity=medium&amp;id=682d9846c4522896dcbf4af4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41875-cwe-502-deserialization-of-untrusted-data-in-airbnb-optica-bf4a5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41875%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20airbnb%20optica&amp;severity=medium&amp;id=682d9846c4522896dcbf4a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38115-cwe-650-in-solarwinds-solarwinds-sem-bf0adf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38115%3A%20CWE-650%20in%20SolarWinds%20%20SolarWinds%20SEM%20&amp;severity=medium&amp;id=682d983fc4522896dcbf0adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45873-n-a-in-n-a-beffbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45873%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeffbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45872-n-a-in-n-a-beffb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45872%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbeffb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45866-n-a-in-n-a-beff92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45866%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeff92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45472-n-a-in-n-a-beff33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45472%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbeff33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45462-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-apache-software-foundation-apache-dolphinscheduler-beff2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45462%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=critical&amp;id=682d983ec4522896dcbeff2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44140-n-a-in-n-a-befef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44140%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45280-n-a-in-n-a-befec5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45280%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45278-n-a-in-n-a-befebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45278%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45276-n-a-in-n-a-befeb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45276%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefeb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45151-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-moodle-befe79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45151%3A%20CWE-79%20-%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moodle&amp;severity=medium&amp;id=682d983ec4522896dcbefe79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45150-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-moodle-befe73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45150%3A%20CWE-79%20-%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Moodle&amp;severity=medium&amp;id=682d983ec4522896dcbefe73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45149-cwe-352-cross-site-request-forgery-csrf-in-moodle-befe1e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45149%3A%20CWE-352%20-%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Moodle&amp;severity=medium&amp;id=682d983ec4522896dcbefe1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44789-n-a-in-n-a-befdcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44789%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefdcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44280-n-a-in-n-a-befdbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44280%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefdbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44278-n-a-in-n-a-befdb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44278%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefdb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44260-n-a-in-n-a-befda9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44260%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44259-n-a-in-n-a-befd82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44259%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44258-n-a-in-n-a-befd7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44258%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44257-n-a-in-n-a-befd25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44257%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44256-n-a-in-n-a-befd1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44256%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44255-n-a-in-n-a-befd17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44255%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44254-n-a-in-n-a-befd13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44254%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44253-n-a-in-n-a-befd0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44253%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefd0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44252-n-a-in-n-a-befcb2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44252%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefcb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44251-n-a-in-n-a-befcaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44251%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefcaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44250-n-a-in-n-a-befca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44250%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44249-n-a-in-n-a-befc8d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44249%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefc8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44139-n-a-in-n-a-befc89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44139%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefc89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44120-n-a-in-n-a-befc85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39833-n-a-in-n-a-befc78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39833%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38147-n-a-in-n-a-befc38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38147%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38145-n-a-in-n-a-befc32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38145%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefc32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38114-cwe-444-inconsistent-interpretation-of-http-requests-http-request-smuggling-in-solarwinds-solarwinds-sem-befc2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38114%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20SolarWinds%20%20SolarWinds%20SEM%20&amp;severity=medium&amp;id=682d983ec4522896dcbefc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38113-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-solarwinds-solarwinds-sem-befc26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38113%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20SolarWinds%20%20SolarWinds%20SEM%20&amp;severity=medium&amp;id=682d983ec4522896dcbefc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37772-n-a-in-n-a-befc13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37772%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37430-n-a-in-n-a-befc0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37430%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37429-n-a-in-n-a-befc00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37429%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37421-n-a-in-n-a-befbcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37421%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefbcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36337-n-a-in-n-a-befbcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36337%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23588-n-a-in-n-a-befbba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23588%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23587-n-a-in-n-a-befbb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23587%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d983ec4522896dcbefbb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23586-n-a-in-n-a-befba3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23586%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23585-n-a-in-n-a-befb9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23585%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23584-n-a-in-n-a-befb93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23584%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23583-n-a-in-n-a-befb8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23583%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2009-1143-n-a-in-n-a-befb83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2009-1143%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2009-1142-n-a-in-n-a-befb52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2009-1142%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23740-cwe-88-in-github-github-enterprise-server-bef8e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23740%3A%20CWE-88%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=682d983dc4522896dcbef8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44118-n-a-in-n-a-bef5fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44118%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43213-n-a-in-n-a-bef5f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43213%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43196-n-a-in-n-a-bef5c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42095-n-a-in-n-a-bef4e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42095%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41446-n-a-in-n-a-bef434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40772-n-a-in-n-a-bef424</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40772%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40771-n-a-in-n-a-bef40b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40771%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef40b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40770-n-a-in-n-a-bef3e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40770%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40304-n-a-in-n-a-bef3d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40304%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef3d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35501-n-a-in-n-a-bef3c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35501%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35500-n-a-in-n-a-bef3bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35500%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34830-n-a-in-n-a-bef386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34830%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef386</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46854-n-a-in-n-a-bef37e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46854%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef37e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43258-n-a-in-n-a-bef376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43258%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef376</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35284-n-a-in-n-a-bef370</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35284%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef370</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23592-n-a-in-n-a-beeab0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23592%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-29334-n-a-in-n-a-beea9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-29334%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeea9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23593-n-a-in-n-a-beea8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23593%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeea8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23591-n-a-in-n-a-beea71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23591%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeea71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23590-n-a-in-n-a-beea69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23590%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeea69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23589-n-a-in-n-a-beea61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23589%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeea61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-23-f1246e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f1246e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3942-n-a-in-hp-inc-hp-print-products-and-digital-sending-products-befb6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3942%3A%20n%2Fa%20in%20HP%20Inc.%20HP%20Print%20products%20and%20Digital%20Sending%20products&amp;severity=critical&amp;id=682d983ec4522896dcbefb6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40228-cwe-613-insufficient-session-expiration-in-ibm-datapower-gateway-befdb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40228%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20IBM%20DataPower%20Gateway&amp;severity=medium&amp;id=682d983ec4522896dcbefdb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3910-cwe-416-use-after-free-in-linux-linux-kernel-bf820d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3910%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf820d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2513-cwe-312-cleartext-storage-of-sensitive-information-in-hitachi-energy-pcm600-bed07a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2513%3A%20CWE-312%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Hitachi%20Energy%20PCM600&amp;severity=high&amp;id=682d983ac4522896dcbed07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37931-cwe-287-improper-authentication-in-hpe-netbatch-plus-software-befc22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37931%3A%20CWE-287%20Improper%20Authentication%20in%20HPE%20NetBatch-Plus%20software&amp;severity=medium&amp;id=682d983ec4522896dcbefc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41950-cwe-250-execution-with-unnecessary-privileges-in-4ra1n-super-xray-bf6dcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41950%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%204ra1n%20super-xray&amp;severity=medium&amp;id=682d9849c4522896dcbf6dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41940-cwe-248-uncaught-exception-in-socketio-engine-io-bf6dad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41940%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20socketio%20engine.io&amp;severity=medium&amp;id=682d9849c4522896dcbf6dad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41952-cwe-400-uncontrolled-resource-consumption-in-matrix-org-synapse-bf4b83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41952%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20matrix-org%20synapse&amp;severity=medium&amp;id=682d9846c4522896dcbf4b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41943-cwe-276-incorrect-default-permissions-in-sourcegraph-sourcegraph-bf4b6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41943%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9846c4522896dcbf4b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41942-cwe-20-improper-input-validation-in-sourcegraph-sourcegraph-bf4b66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41942%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9846c4522896dcbf4b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41937-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bf4b56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41937%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9846c4522896dcbf4b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41936-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-xwiki-xwiki-platform-bf4b4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41936%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9846c4522896dcbf4b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41919-cwe-352-cross-site-request-forgery-csrf-in-fastify-fastify-bf4ae4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41919%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20fastify%20fastify&amp;severity=medium&amp;id=682d9846c4522896dcbf4ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39397-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-tu6ge-oss-rs-bf4a41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39397%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tu6ge%20oss-rs&amp;severity=medium&amp;id=682d9846c4522896dcbf4a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39199-cwe-345-insufficient-verification-of-data-authenticity-in-codenotary-immudb-bf4811</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39199%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20codenotary%20immudb&amp;severity=medium&amp;id=682d9845c4522896dcbf4811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4111-cwe-1284-improper-validation-of-specified-quantity-in-input-in-tooljet-tooljet-tooljet-bf08ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4111%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20tooljet%20tooljet%2Ftooljet&amp;severity=medium&amp;id=682d983fc4522896dcbf08ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45535-n-a-in-n-a-befb4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45535%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45529-n-a-in-n-a-befb3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefb3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45331-n-a-in-n-a-befb32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45331%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefb32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45330-n-a-in-n-a-befb2c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45330%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ec4522896dcbefb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44808-n-a-in-n-a-befb1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44808%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ec4522896dcbefb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40602-cwe-287-improper-authentication-in-zyxel-lte3301-m209-bef8fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40602%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Zyxel%20LTE3301-M209&amp;severity=critical&amp;id=682d983dc4522896dcbef8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37301-cwe-191-integer-underflow-wrap-or-wraparound-in-schneider-electric-modicon-m340-cpu-part-numbers-bmxp34-bef8b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37301%3A%20CWE-191%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20Schneider%20Electric%20Modicon%20M340%20CPU%20(part%20numbers%20BMXP34*)&amp;severity=high&amp;id=682d983dc4522896dcbef8b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30529-n-a-in-n-a-bef46a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30529%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44201-n-a-in-n-a-bef274</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44201%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44200-n-a-in-n-a-bef270</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44200%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44199-n-a-in-n-a-bef24e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44199%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44198-n-a-in-n-a-bef248</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44198%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44197-n-a-in-n-a-bef244</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44196-n-a-in-n-a-bef240</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44194-n-a-in-n-a-bef22f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44194%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef22f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44193-n-a-in-n-a-bef229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44193%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef229</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44191-n-a-in-n-a-bef225</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44191%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44190-n-a-in-n-a-bef21d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44190%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44188-n-a-in-n-a-bef219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44187-n-a-in-n-a-bef215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44187%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44186-n-a-in-n-a-bef1f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44186%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44184-n-a-in-n-a-bef1f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44184%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43751-n-a-in-n-a-bef1ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43751%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef1ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43685-n-a-in-n-a-bef1eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43685%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43215-n-a-in-n-a-bef1e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43215%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43214-n-a-in-n-a-bef1e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43214%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef1e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43212-n-a-in-n-a-bef1df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43212%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef1df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42989-n-a-in-n-a-bef1db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42989%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef1db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42098-n-a-in-n-a-bef1d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42098%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40303-n-a-in-n-a-bef1d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40303%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbef1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40189-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-apache-software-foundation-apache-airlfow-pig-provider-bef1af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40189%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airlfow%20Pig%20Provider&amp;severity=critical&amp;id=682d983dc4522896dcbef1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3500-cwe-248-in-keylime-bef1a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3500%3A%20CWE-248%20in%20keylime&amp;severity=medium&amp;id=682d983dc4522896dcbef1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39070-access-control-vulnerability-in-zxa10-c3xx-bef1a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39070%3A%20access%20control%20vulnerability%20in%20ZXA10%20C3XX&amp;severity=critical&amp;id=682d983dc4522896dcbef1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39067-buffer-overflow-in-mf286r-bef19f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39067%3A%20buffer%20overflow%20in%20MF286R&amp;severity=medium&amp;id=682d983dc4522896dcbef19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39066-sql-injection-in-mf286r-bef190</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39066%3A%20SQL%20injection%20in%20MF286R&amp;severity=high&amp;id=682d983dc4522896dcbef190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38724-n-a-in-n-a-bef18a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38724%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38649-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-apache-software-foundation-apache-airflow-pinot-provider-bef186</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38649%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Pinot%20Provider&amp;severity=critical&amp;id=682d983dc4522896dcbef186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38462-n-a-in-n-a-bef180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38462%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37774-n-a-in-n-a-bef17a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37774%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbef17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40954-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-apache-software-foundation-apache-airflow-spark-provider-beefa2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40954%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Spark%20Provider&amp;severity=medium&amp;id=682d983dc4522896dcbeefa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42097-n-a-in-n-a-beed4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42097%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeed4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42094-n-a-in-n-a-beed47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42094%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeed47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41445-n-a-in-n-a-beed43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41445%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeed43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41326-n-a-in-n-a-beecdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41326%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeecdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41131-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-apache-software-foundation-apache-airflow-hive-provider-beecd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41131%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow%20Hive%20Provider&amp;severity=high&amp;id=682d983cc4522896dcbeecd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40870-n-a-in-n-a-beeccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40870%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40842-n-a-in-n-a-beecc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeecc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37773-n-a-in-n-a-beecc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37773%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeecc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36180-n-a-in-n-a-beec07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36180%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeec07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36179-n-a-in-n-a-beec03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36179%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35407-n-a-in-n-a-beebf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35407%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeebf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33012-n-a-in-n-a-beebe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33012%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeebe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0222-cwe-269-improper-privilege-management-in-schneider-electric-modicon-m340-cpus-beebd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0222%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Schneider%20Electric%20Modicon%20M340%20CPUs&amp;severity=high&amp;id=682d983cc4522896dcbeebd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4116-remote-code-execution-in-quarkus-bee9f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4116%3A%20Remote%20COde%20Execution%20in%20quarkus&amp;severity=critical&amp;id=682d983cc4522896dcbee9f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45536-n-a-in-n-a-bee9f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45536%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44807-n-a-in-n-a-bee896</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44807%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44806-n-a-in-n-a-bee892</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44806%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44804-n-a-in-n-a-bee88e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44804%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee88e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44801-n-a-in-n-a-bee88a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44801%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee88a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44202-n-a-in-n-a-bee854</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44202%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-22-f12c53</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3919-n-a-in-hp-inc-omen-gaming-hub-and-hp-command-center-beeb78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3919%3A%20n%2Fa%20in%20HP%20Inc.%20OMEN%20Gaming%20Hub%20and%20HP%20Command%20Center&amp;severity=critical&amp;id=682d983cc4522896dcbeeb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3821-n-a-in-hp-inc-hp-futuresmart-bef169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3821%3A%20n%2Fa%20in%20HP%20Inc.%20HP%20FutureSmart&amp;severity=critical&amp;id=682d983dc4522896dcbef169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3661-n-a-in-hp-inc-hp-workstation-bios-bef137</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3661%3A%20n%2Fa%20in%20HP%20Inc.%20HP%20Workstation%20BIOS&amp;severity=high&amp;id=682d983dc4522896dcbef137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3437-n-a-in-hp-inc-omen-gaming-hub-sdk-bef133</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3437%3A%20n%2Fa%20in%20HP%20Inc.%20OMEN%20Gaming%20Hub%20SDK&amp;severity=critical&amp;id=682d983dc4522896dcbef133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37018-n-a-in-hp-inc-hp-pc-bios-bef13f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37018%3A%20n%2Fa%20in%20HP%20Inc.%20HP%20PC%20BIOS&amp;severity=high&amp;id=682d983dc4522896dcbef13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1038-n-a-in-hp-inc-hp-jumpstart-bef13b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1038%3A%20n%2Fa%20in%20HP%20Inc.%20HP%20Jumpstart&amp;severity=high&amp;id=682d983dc4522896dcbef13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44654-n-a-in-trend-micro-inc-trend-micro-apex-one-bef12f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44654%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983dc4522896dcbef12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44653-n-a-in-trend-micro-inc-trend-micro-apex-one-bef4ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44653%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983dc4522896dcbef4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44652-n-a-in-trend-micro-inc-trend-micro-apex-one-bef4ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44652%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983dc4522896dcbef4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44651-n-a-in-trend-micro-inc-trend-micro-apex-one-bef48b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44651%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983dc4522896dcbef48b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44650-n-a-in-trend-micro-inc-trend-micro-apex-one-bef12b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44650%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983dc4522896dcbef12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44649-n-a-in-trend-micro-inc-trend-micro-apex-one-bef127</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44649%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=682d983dc4522896dcbef127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44648-n-a-in-trend-micro-inc-trend-micro-apex-one-bef123</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44648%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=medium&amp;id=682d983dc4522896dcbef123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44647-n-a-in-trend-micro-inc-trend-micro-apex-one-beeb7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44647%3A%20n%2Fa%20in%20Trend%20Micro%2C%20Inc.%20Trend%20Micro%20Apex%20One&amp;severity=medium&amp;id=682d983cc4522896dcbeeb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40746-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-ibm-i-bf0b19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40746%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20IBM%20i&amp;severity=medium&amp;id=682d983fc4522896dcbf0b19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3589-cwe-639-authorization-bypass-through-user-controlled-key-in-miele-appwash-befe62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3589%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Miele%20appWash&amp;severity=medium&amp;id=682d983ec4522896dcbefe62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-hagga-threat-actor-abusing-fsociety-framework-29310dda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Hagga%20Threat%20Actor%20(ab)using%20FSociety%20framework%20%3F&amp;severity=medium&amp;id=68359ca05d5f0974d01fc7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41945-cwe-94-improper-control-of-generation-of-code-code-injection-in-4ra1n-super-xray-bf6db5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41945%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%204ra1n%20super-xray&amp;severity=medium&amp;id=682d9849c4522896dcbf6db5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45422-cwe-427-in-lg-pc-bef8ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45422%3A%20CWE-427%20in%20LG%20PC&amp;severity=high&amp;id=682d983dc4522896dcbef8ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45470-cwe-20-improper-input-validation-in-apache-software-foundation-apache-hama-beefaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45470%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Hama&amp;severity=high&amp;id=682d983dc4522896dcbeefaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45017-n-a-in-n-a-beef92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbeef92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45016-n-a-in-n-a-beef73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45016%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983dc4522896dcbeef73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44183-n-a-in-n-a-beef64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44183%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbeef64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44180-n-a-in-n-a-beef45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44180%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbeef45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44178-n-a-in-n-a-beef3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44178%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbeef3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44177-n-a-in-n-a-beef35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44177%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbeef35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44176-n-a-in-n-a-beef2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44176%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbeef2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44175-n-a-in-n-a-beef2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44175%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeef2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44174-n-a-in-n-a-beef0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44174%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeef0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43709-n-a-in-n-a-beef07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43709%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeef07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43708-n-a-in-n-a-beeec3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43708%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43707-n-a-in-n-a-beeebf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43707%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeebf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45015-n-a-in-n-a-beeb95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45015%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45014-n-a-in-n-a-beeb80</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45014%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeb80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45013-n-a-in-n-a-beeb3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45013%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeb3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45012-n-a-in-n-a-beeb2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45012%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44830-n-a-in-n-a-beeb2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44830%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44788-n-a-in-n-a-beeb23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44788%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44787-n-a-in-n-a-beeaca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44787%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeeaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44786-n-a-in-n-a-beeac6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44786%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44785-n-a-in-n-a-beeabc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44785%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeeabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44784-n-a-in-n-a-beeab8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44784%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44168-n-a-in-n-a-beea46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44168%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeea46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44167-n-a-in-n-a-beea3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeea3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44163-n-a-in-n-a-beea36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44163%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeea36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44158-n-a-in-n-a-bee9ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44158%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee9ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44156-n-a-in-n-a-bee9eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44156%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee9eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3690-cwe-79-cross-site-scripting-xss-in-unknown-popup-maker-bee9e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3690%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Popup%20Maker&amp;severity=medium&amp;id=682d983cc4522896dcbee9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3688-cwe-352-cross-site-request-forgery-csrf-in-unknown-wpqa-builder-bee9e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3688%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WPQA%20Builder&amp;severity=high&amp;id=682d983cc4522896dcbee9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3634-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-contact-form-7-database-addon-bee9dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3634%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20Contact%20Form%207%20Database%20Addon&amp;severity=critical&amp;id=682d983cc4522896dcbee9dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3618-cwe-79-cross-site-scripting-xss-in-unknown-spacer-bee9d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3618%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Spacer&amp;severity=medium&amp;id=682d983cc4522896dcbee9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44172-n-a-in-n-a-bee84a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44172%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44171-n-a-in-n-a-bee824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44171%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44169-n-a-in-n-a-bee820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44169%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43143-n-a-in-n-a-bee818</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43143%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43117-n-a-in-n-a-bee80c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43117%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42096-n-a-in-n-a-bee7b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42096%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40470-n-a-in-n-a-bee7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40470%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23582-n-a-in-n-a-bee716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23582%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38755-remote-unauthenticated-user-enumeration-in-micro-focus-micro-focus-filr-bee67c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38755%3A%20Remote%20unauthenticated%20user%20enumeration%20in%20Micro%20Focus%20Micro%20Focus%20Filr&amp;severity=medium&amp;id=682d983cc4522896dcbee67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3600-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-easy-digital-downloads-bee2a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3600%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20Easy%20Digital%20Downloads&amp;severity=critical&amp;id=682d983bc4522896dcbee2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3336-cwe-352-cross-site-request-forgery-csrf-in-unknown-event-monster-bee2a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3336%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Event%20Monster&amp;severity=medium&amp;id=682d983bc4522896dcbee2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24649-cwe-287-improper-authentication-in-unknown-wp-user-frontend-bee29f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24649%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20WP%20User%20Frontend&amp;severity=critical&amp;id=682d983bc4522896dcbee29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0421-cwe-116-improper-encoding-or-escaping-of-output-in-unknown-five-star-restaurant-reservations-bee017</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0421%3A%20CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output%20in%20Unknown%20Five%20Star%20Restaurant%20Reservations&amp;severity=medium&amp;id=682d983bc4522896dcbee017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1581-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-wp-polls-bee007</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1581%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20WP-Polls&amp;severity=medium&amp;id=682d983bc4522896dcbee007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1579-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-login-block-ips-bee003</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1579%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Login%20Block%20IPs&amp;severity=high&amp;id=682d983bc4522896dcbee003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1578-cwe-352-cross-site-request-forgery-csrf-in-unknown-my-wpdb-bedfff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1578%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20My%20wpdb&amp;severity=high&amp;id=682d983bc4522896dcbedfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30258-n-a-in-n-a-bedf96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30258%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbedf96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30257-n-a-in-n-a-bedf79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30257%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbedf79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35897-n-a-in-n-a-bedef1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35897%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedef1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3691-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-deepl-pro-api-translation-plugin-bede9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3691%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20DeepL%20Pro%20API%20translation%20plugin&amp;severity=high&amp;id=682d983bc4522896dcbede9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38148-n-a-in-n-a-bede66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38148%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbede66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38146-n-a-in-n-a-bede62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38146%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbede62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3763-cwe-352-cross-site-request-forgery-csrf-in-unknown-booster-for-woocommerce-bede05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3763%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Booster%20for%20WooCommerce&amp;severity=high&amp;id=682d983bc4522896dcbede05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3762-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-booster-for-woocommerce-bede01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3762%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Booster%20for%20WooCommerce&amp;severity=medium&amp;id=682d983bc4522896dcbede01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3753-cwe-79-cross-site-scripting-xss-in-unknown-evaluate-beddf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3753%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Evaluate&amp;severity=medium&amp;id=682d983bc4522896dcbeddf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3750-cwe-352-cross-site-request-forgery-csrf-in-unknown-ask-me-beddd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3750%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Ask%20me&amp;severity=medium&amp;id=682d983bc4522896dcbeddd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3720-cwe-89-sql-injection-in-unknown-event-monster-beddd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3720%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Event%20Monster&amp;severity=high&amp;id=682d983bc4522896dcbeddd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-21-f1203d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f1203d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/is-hagga-threat-actor-ab-using-fsociety-framework-f0eeb2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Is%20Hagga%20Threat%20Actor%20(ab)using%20FSociety%20framework%20%3F&amp;severity=medium&amp;id=682acdbebbaf20d303f0eeb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4069-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-librenms-bf08e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4069%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms%2Flibrenms&amp;severity=medium&amp;id=682d983fc4522896dcbf08e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3525-cwe-502-deserialization-of-untrusted-data-in-librenms-librenms-librenms-bf083d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3525%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20librenms%20librenms%2Flibrenms&amp;severity=medium&amp;id=682d983fc4522896dcbf083d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4068-cwe-915-improperly-controlled-modification-of-dynamically-determined-object-attributes-in-librenms-librenms-librenms-beff41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4068%3A%20CWE-915%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20librenms%20librenms%2Flibrenms&amp;severity=medium&amp;id=682d983ec4522896dcbeff41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3516-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-librenms-befbd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3516%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms%2Flibrenms&amp;severity=medium&amp;id=682d983ec4522896dcbefbd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3562-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-librenms-bef4d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3562%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms%2Flibrenms&amp;severity=medium&amp;id=682d983dc4522896dcbef4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4067-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-librenms-bef3c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4067%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms%2Flibrenms&amp;severity=low&amp;id=682d983dc4522896dcbef3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3561-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-librenms-librenms-librenms-bee798</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20librenms%20librenms%2Flibrenms&amp;severity=medium&amp;id=682d983cc4522896dcbee798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-20-f128eb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f128eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41939-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-knative-func-bf6d96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41939%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20knative%20func&amp;severity=medium&amp;id=682d9849c4522896dcbf6d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41938-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-flarum-framework-bf4b5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41938%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20flarum%20framework&amp;severity=medium&amp;id=682d9846c4522896dcbf4b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-19-f12d93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38395-n-a-in-hp-inc-hp-support-assistant-bee922</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38395%3A%20n%2Fa%20in%20HP%20Inc.%20HP%20Support%20Assistant&amp;severity=high&amp;id=682d983cc4522896dcbee922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2794-n-a-in-hp-inc-certain-hp-pagewide-pro-printers-bee91e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2794%3A%20n%2Fa%20in%20HP%20Inc.%20Certain%20HP%20PageWide%20Pro%20printers&amp;severity=high&amp;id=682d983cc4522896dcbee91e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22488-n-a-in-ibm-openbmc-bef430</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22488%3A%20n%2Fa%20in%20IBM%20OpenBMC&amp;severity=medium&amp;id=682d983dc4522896dcbef430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45471-cwe-770-in-jetbrains-hub-bef42c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45471%3A%20CWE-770%20in%20JetBrains%20Hub&amp;severity=low&amp;id=682d983dc4522896dcbef42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41909-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6d45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41909%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41908-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6d3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41908%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41907-cwe-131-incorrect-calculation-of-buffer-size-in-tensorflow-tensorflow-bf6d35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41907%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41901-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6d2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41901%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41900-cwe-787-out-of-bounds-write-in-tensorflow-tensorflow-bf6d27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41900%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41899-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41899%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41898-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6d0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41898%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41897-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf6d06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41897%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6d06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41896-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6cfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41896%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41895-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf6cf6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41895%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41894-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-tensorflow-tensorflow-bf6cd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41894%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41893-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf6ccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41893%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41891-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6cc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41891%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41890-cwe-704-incorrect-type-conversion-or-cast-in-tensorflow-tensorflow-bf6cc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41890%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41889-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf6cbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41889%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41888-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6cbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41888%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41887-cwe-131-incorrect-calculation-of-buffer-size-in-tensorflow-tensorflow-bf6cb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41887%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41886-cwe-131-incorrect-calculation-of-buffer-size-in-tensorflow-tensorflow-bf6cb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41886%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6cb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41885-cwe-131-incorrect-calculation-of-buffer-size-in-tensorflow-tensorflow-bf6caf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41885%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6caf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41884-cwe-670-always-incorrect-control-flow-implementation-in-tensorflow-tensorflow-bf6ca9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41884%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6ca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41883-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf6c96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41883%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6c96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41880-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf6c92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41880%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf6c92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41911-cwe-704-incorrect-type-conversion-or-cast-in-tensorflow-tensorflow-bf4a97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41911%3A%20CWE-704%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9846c4522896dcbf4a97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34667-cwe-121-stack-based-buffer-overflow-in-nvidia-nvidia-cuda-toolkit-befd09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34667%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20NVIDIA%20NVIDIA%20CUDA%20Toolkit&amp;severity=medium&amp;id=682d983ec4522896dcbefd09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31617-cwe-125-out-of-bounds-read-in-nvidia-nvidia-cloud-gaming-guest-driver-bef773</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31617%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)&amp;severity=high&amp;id=682d983dc4522896dcbef773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31608-cwe-281-improper-preservation-of-permissions-in-nvidia-geforce-workstation-compute-bef073</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31608%3A%20CWE-281%20Improper%20Preservation%20of%20Permissions%20in%20NVIDIA%20GeForce%2C%20Workstation%2C%20Compute&amp;severity=high&amp;id=682d983dc4522896dcbef073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31694-uncontrolled-search-path-element-in-vmware-installbuilder-beee94</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31694%3A%20Uncontrolled%20Search%20Path%20Element%20in%20VMware%20InstallBuilder&amp;severity=high&amp;id=682d983cc4522896dcbeee94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31616-cwe-20-improper-input-validation-in-nvidia-nvidia-cloud-gaming-guest-driver-beee8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31616%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)&amp;severity=medium&amp;id=682d983cc4522896dcbeee8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31615-cwe-476-null-pointer-dereference-in-nvidia-geforce-workstation-compute-beee68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31615%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20GeForce%2C%20Workstation%2C%20Compute&amp;severity=medium&amp;id=682d983cc4522896dcbeee68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31613-cwe-476-null-pointer-dereference-in-nvidia-nvidia-cloud-gaming-guest-driver-beee64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31613%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)&amp;severity=high&amp;id=682d983cc4522896dcbeee64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31612-cwe-125-out-of-bounds-read-in-nvidia-nvidia-cloud-gaming-guest-driver-beee53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31612%3A%20CWE-125%20Out-of-bounds%20Read%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)&amp;severity=high&amp;id=682d983cc4522896dcbeee53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31610-cwe-787-out-of-bounds-write-in-nvidia-nvidia-cloud-gaming-guest-driver-beee4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31610%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)&amp;severity=high&amp;id=682d983cc4522896dcbeee4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31607-cwe-20-improper-input-validation-in-nvidia-nvidia-cloud-gaming-guest-driver-nvidia-cloud-gaming-virtual-gpu-manager-beee43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31607%3A%20CWE-20%20Improper%20Input%20Validation%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)%2C%20NVIDIA%20Cloud%20Gaming%20(Virtual%20GPU%20Manager)&amp;severity=high&amp;id=682d983cc4522896dcbeee43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31606-cwe-787-out-of-bounds-write-in-nvidia-nvidia-cloud-gaming-guest-driver-beee3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31606%3A%20CWE-787%20Out-of-bounds%20Write%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)&amp;severity=high&amp;id=682d983cc4522896dcbeee3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30256-n-a-in-n-a-beedee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30256%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeedee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37936-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-elastic-kibana-beedea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37936%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=682d983cc4522896dcbeedea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-4055-cwe-146-in-xdg-utils-bee916</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-4055%3A%20CWE-146%20in%20xdg-utils&amp;severity=high&amp;id=682d983cc4522896dcbee916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45474-n-a-in-n-a-bee90e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45474%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44820-n-a-in-n-a-bee90a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44820%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee90a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44641-n-a-in-n-a-bee906</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44641%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44415-n-a-in-n-a-bee8fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44415%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44414-n-a-in-n-a-bee8e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44414%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44413-n-a-in-n-a-bee8de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44413%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee8de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44379-n-a-in-n-a-bee8da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44379%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37197-n-a-in-n-a-bee8d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee8d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34827-n-a-in-n-a-bee8ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34827%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee8ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34665-cwe-476-null-pointer-dereference-in-nvidia-nvidia-cloud-gaming-guest-driver-nvidia-cloud-gaming-virtual-gpu-manager-bee8ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34665%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)%2C%20NVIDIA%20Cloud%20Gaming%20(Virtual%20GPU%20Manager)&amp;severity=medium&amp;id=682d983cc4522896dcbee8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31739-n-a-in-n-a-bee8b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31739%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee8b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22141-cwe-601-url-redirection-to-untrusted-site-in-elastic-kibana-bee85e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22141%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20in%20Elastic%20Kibana&amp;severity=medium&amp;id=682d983cc4522896dcbee85e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44378-n-a-in-n-a-bee28a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44378%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44204-n-a-in-n-a-bee25d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44204%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee25d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43673-n-a-in-n-a-bee24e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43673%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43308-n-a-in-n-a-bee24a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43308%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42904-n-a-in-n-a-bee23e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42904%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee23e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38871-n-a-in-n-a-bee1ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38871%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee1ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45163-n-a-in-n-a-bee121</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45163%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45132-n-a-in-n-a-bee119</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45132%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45473-n-a-in-n-a-bee056</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45473%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-18-f12ba5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24939-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-silabs-com-ember-znet-beeb1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24939%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20silabs.com%20Ember%20ZNet&amp;severity=medium&amp;id=682d983cc4522896dcbeeb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36924-cwe-427-uncontrolled-search-path-element-in-zoom-video-communications-inc-zoom-rooms-installer-for-windows-bef779</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36924%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20Rooms%20Installer%20for%20Windows&amp;severity=high&amp;id=682d983dc4522896dcbef779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28766-cwe-94-improper-control-of-generation-of-code-code-injection-in-zoom-video-communications-inc-zoom-client-for-meetings-for-windows-32-bit-bee86d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28766%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20Client%20for%20Meetings%20for%20Windows%20(32-bit)&amp;severity=low&amp;id=682d983cc4522896dcbee86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28768-cwe-689-permission-race-condition-during-resource-copy-in-zoom-video-communications-inc-zoom-client-for-meetings-installer-for-macos-standard-and-for-it-admin-bee875</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28768%3A%20CWE-689%3A%20Permission%20Race%20Condition%20During%20Resource%20Copy%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20Client%20for%20Meetings%20Installer%20for%20macOS%20(Standard%20and%20for%20IT%20Admin)&amp;severity=high&amp;id=682d983cc4522896dcbee875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36785-information-disclosure-authorization-bypass-in-d-link-g-integrated-access-device4-beefe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36785%3A%20Information%20Disclosure%20%26%20Authorization%20Bypass.%20in%20D-Link%20G%20integrated%20Access%20Device4&amp;severity=high&amp;id=682d983dc4522896dcbeefe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39179-authenticated-remote-code-execution-in-college-management-college-management-system-v1-0-bef474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39179%3A%20Authenticated%20remote%20code%20execution%20in%20College%20Management%20College%20Management%20System%20v1.0&amp;severity=high&amp;id=682d983dc4522896dcbef474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39178-internal-server-ip-disclosure-in-webvendome-webvendome-bef470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39178%3A%20Internal%20Server%20IP%20Disclosure%20in%20webvendome%20webvendome&amp;severity=medium&amp;id=682d983dc4522896dcbef470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39180-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-college-management-college-management-system-v1-0-bee810</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39180%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20College%20Management%20College%20Management%20System%20v1.0&amp;severity=critical&amp;id=682d983cc4522896dcbee810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39181-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-reports-plugin-for-glpi-bee814</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39181%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20GLPI%20Reports%20plugin%20for%20GLPI&amp;severity=medium&amp;id=682d983cc4522896dcbee814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36784-remote-code-execution-rce-in-elsight-elsight-halo-befc6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36784%3A%20Remote%20Code%20Execution%20(RCE)%20in%20Elsight%20Elsight%20Halo&amp;severity=medium&amp;id=682d983ec4522896dcbefc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36787-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-webvendome-webvendome-befc70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36787%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20webvendome%20webvendome&amp;severity=medium&amp;id=682d983ec4522896dcbefc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32537-cwe-693-in-medtronic-minimed-600-series-insulin-pump-beedf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32537%3A%20CWE-693%20in%20Medtronic%20Minimed%20600%20Series%20Insulin%20Pump&amp;severity=medium&amp;id=682d983cc4522896dcbeedf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38390-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-business-automation-workflow-beefed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38390%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Business%20Automation%20Workflow&amp;severity=medium&amp;id=682d983dc4522896dcbeefed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40751-cwe-522-insufficiently-protected-credentials-in-ibm-urbancode-deploy-beedc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40751%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20IBM%20UrbanCode%20Deploy&amp;severity=medium&amp;id=682d983cc4522896dcbeedc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41920-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-duke-git-lancet-bf6d70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41920%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20duke-git%20lancet&amp;severity=medium&amp;id=682d9849c4522896dcbf6d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39389-cwe-20-improper-input-validation-in-lightningnetwork-lnd-bf6c8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39389%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20lightningnetwork%20lnd&amp;severity=medium&amp;id=682d9849c4522896dcbf6c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42985-n-a-in-n-a-befbf0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42985%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ec4522896dcbefbf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45461-n-a-in-n-a-beefa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45461%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983dc4522896dcbeefa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44725-n-a-in-n-a-beede6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44725%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeede6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44403-n-a-in-n-a-beede2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44403%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeede2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44402-n-a-in-n-a-beeda6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44402%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44384-n-a-in-n-a-beeda2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44384%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeeda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44001-n-a-in-n-a-beed9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44001%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbeed9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43332-n-a-in-n-a-beed68</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43332%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeed68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43192-n-a-in-n-a-beed1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43192%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeed1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43183-n-a-in-n-a-beed15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43183%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeed15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43171-n-a-in-n-a-beed0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43171%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeed0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43163-n-a-in-n-a-beed05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43163%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeed05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43162-n-a-in-n-a-beece1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43162%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbeece1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43142-n-a-in-n-a-beec0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43142%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeec0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43179-n-a-in-n-a-bee81c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43179%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42891-cwe-73-external-control-of-file-name-or-path-in-siemens-syngo-dynamics-bee7fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42891%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20syngo%20Dynamics&amp;severity=high&amp;id=682d983cc4522896dcbee7fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42734-cwe-73-external-control-of-file-name-or-path-in-siemens-syngo-dynamics-bee7f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42734%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20syngo%20Dynamics&amp;severity=high&amp;id=682d983cc4522896dcbee7f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42733-cwe-73-external-control-of-file-name-or-path-in-siemens-syngo-dynamics-bee7d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42733%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20syngo%20Dynamics&amp;severity=high&amp;id=682d983cc4522896dcbee7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36786-post-auth-rce-in-d-link-dsl-224-bee787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36786%3A%20Post-auth%20RCE%20in%20D-Link%20DSL-224&amp;severity=critical&amp;id=682d983cc4522896dcbee787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42732-cwe-73-external-control-of-file-name-or-path-in-siemens-syngo-dynamics-bee760</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42732%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20syngo%20Dynamics&amp;severity=high&amp;id=682d983cc4522896dcbee760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42533-elevation-of-privilege-in-android-bee75c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42533%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d983cc4522896dcbee75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42246-n-a-in-n-a-bee6da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42246%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42245-n-a-in-n-a-bee6cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42245%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee6cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42187-n-a-in-n-a-bee6c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42187%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee6c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40881-n-a-in-n-a-bee6bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40881%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983cc4522896dcbee6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39834-n-a-in-n-a-bee6b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39834%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33897-n-a-in-n-a-bee670</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33897%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbee670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42982-n-a-in-n-a-bee246</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20427-elevation-of-privilege-in-android-bee236</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20427%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d983bc4522896dcbee236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43140-n-a-in-n-a-bee200</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43140%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43138-n-a-in-n-a-bee1fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43138%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee1fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43096-n-a-in-n-a-bee1c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43096%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee1c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42954-n-a-in-n-a-bee1bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee1bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42903-n-a-in-n-a-bee18e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42903%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d983bc4522896dcbee18e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42894-cwe-918-server-side-request-forgery-ssrf-in-siemens-syngo-dynamics-bee0ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42894%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Siemens%20syngo%20Dynamics&amp;severity=high&amp;id=682d983bc4522896dcbee0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42893-cwe-73-external-control-of-file-name-or-path-in-siemens-syngo-dynamics-bee0e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42893%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20Siemens%20syngo%20Dynamics&amp;severity=high&amp;id=682d983bc4522896dcbee0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42892-cwe-23-relative-path-traversal-in-siemens-syngo-dynamics-bee0e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42892%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Siemens%20syngo%20Dynamics&amp;severity=medium&amp;id=682d983bc4522896dcbee0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38165-n-a-in-n-a-bee075</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38165%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36432-n-a-in-n-a-bee066</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36432%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20460-elevation-of-privilege-in-android-bedf66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20460%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d983bc4522896dcbedf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20459-elevation-of-privilege-in-android-bedf62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20459%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d983bc4522896dcbedf62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20428-elevation-of-privilege-in-android-bedf5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20428%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d983bc4522896dcbedf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31608-n-a-in-n-a-beded1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31608%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbeded1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-17-f12737</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34354-cwe-922-insecure-storage-of-sensitive-information-in-ibm-partner-engagement-manager-befe26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34354%3A%20CWE-922%20Insecure%20Storage%20of%20Sensitive%20Information%20in%20IBM%20Partner%20Engagement%20Manager&amp;severity=medium&amp;id=682d983ec4522896dcbefe26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41914-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-zulip-zulip-bf4abd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41914%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9846c4522896dcbf4abd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39383-cwe-918-server-side-request-forgery-ssrf-in-kubevela-kubevela-bf49db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39383%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20kubevela%20kubevela&amp;severity=medium&amp;id=682d9846c4522896dcbf49db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39317-cwe-125-out-of-bounds-read-in-freerdp-freerdp-bf4895</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39317%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20FreeRDP%20FreeRDP&amp;severity=medium&amp;id=682d9846c4522896dcbf4895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3980-n-a-in-sophos-sophos-mobile-managed-on-premises-beef03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3980%3A%20n%2Fa%20in%20Sophos%20Sophos%20Mobile%20managed%20on-premises&amp;severity=critical&amp;id=682d983cc4522896dcbeef03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44007-n-a-in-n-a-bee68b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44007%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983cc4522896dcbee68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2166-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-mastodon-mastodon-mastodon-bee678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2166%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20mastodon%20mastodon%2Fmastodon&amp;severity=critical&amp;id=682d983cc4522896dcbee678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44005-n-a-in-n-a-bee242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44005%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44004-n-a-in-n-a-bee208</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44004%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44003-n-a-in-n-a-bee204</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44003%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44073-n-a-in-n-a-bedec9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44073%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44071-n-a-in-n-a-bedec5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44070-n-a-in-n-a-bedec1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44070%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44069-n-a-in-n-a-bedebd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44069%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44008-n-a-in-n-a-bede1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44008%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbede1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44006-n-a-in-n-a-bede1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44006%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbede1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44002-n-a-in-n-a-bede16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44002%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbede16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44000-n-a-in-n-a-bede09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44000%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbede09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43999-n-a-in-n-a-bedd72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43999%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbedd72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43264-n-a-in-n-a-bedd6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43264%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbedd6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43263-n-a-in-n-a-bedd66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43263%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedd66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43256-n-a-in-n-a-bedcae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43256%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbedcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43234-n-a-in-n-a-bedca1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43234%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbedca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43135-n-a-in-n-a-bedc9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43135%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbedc9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42960-n-a-in-n-a-bedc99</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42960%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedc99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38819-n-a-in-n-a-bedc95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38819%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbedc95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-16-f12b7c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3920-cwe-862-missing-authorization-in-hashicorp-consul-bee7a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3920%3A%20CWE-862%20Missing%20Authorization%20in%20HashiCorp%20Consul&amp;severity=medium&amp;id=682d983cc4522896dcbee7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27895-cwe-532-information-exposure-through-log-files-in-palantir-foundry-build2-bee77f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27895%3A%20CWE-532%20Information%20Exposure%20Through%20Log%20Files%20in%20Palantir%20Foundry%20Build2&amp;severity=medium&amp;id=682d983cc4522896dcbee77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41558-successful-execution-of-these-vulnerabilities-will-result-in-an-attacker-being-able-to-execute-commands-with-the-privileges-of-the-affected-user-in-tibco-software-inc-tibco-spotfire-analyst-bee745</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41558%3A%20Successful%20execution%20of%20these%20vulnerabilities%20will%20result%20in%20an%20attacker%20being%20able%20to%20execute%20commands%20with%20the%20privileges%20of%20the%20affected%20user.%20in%20TIBCO%20Software%20Inc.%20TIBCO%20Spotfire%20Analyst&amp;severity=critical&amp;id=682d983cc4522896dcbee745</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43780-n-a-in-hp-inc-certain-hp-envy-officejet-and-deskjet-printers-bedc1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43780%3A%20n%2Fa%20in%20HP%20Inc.%20Certain%20HP%20ENVY%2C%20OfficeJet%2C%20and%20DeskJet%20printers&amp;severity=high&amp;id=682d983bc4522896dcbedc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42001-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-beeab4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42001%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983cc4522896dcbeeab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42000-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-bef3bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42000%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983dc4522896dcbef3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41814-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-bee8d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41814%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983cc4522896dcbee8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41789-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-bee756</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41789%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983cc4522896dcbee756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41611-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-bee754</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41611%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983cc4522896dcbee754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3958-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-bee73d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3958%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983cc4522896dcbee73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3895-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-common-user-interface-component-bee94c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3895%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20Common%20User%20Interface%20Component&amp;severity=medium&amp;id=682d983cc4522896dcbee94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3893-cwe-79-cross-site-scripting-xss-in-hallo-welt-gmbh-bluespice-bee735</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3893%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hallo%20Welt!%20GmbH%20BlueSpice&amp;severity=low&amp;id=682d983cc4522896dcbee735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3461-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-phoenix-contact-config-bee71e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3461%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20PHOENIX%20CONTACT%20Config%2B&amp;severity=high&amp;id=682d983cc4522896dcbee71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3737-cwe-125-out-of-bounds-read-in-phoenix-contact-config-bef3bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3737%3A%20CWE-125%20Out-of-bounds%20Read%20in%20PHOENIX%20CONTACT%20Config%2B&amp;severity=high&amp;id=682d983dc4522896dcbef3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3480-cwe-770-allocation-of-resources-without-limits-or-throttling-in-phoenix-contact-fl-mguard-centerport-bee726</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3480%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20PHOENIX%20CONTACT%20FL%20MGUARD%20CENTERPORT&amp;severity=high&amp;id=682d983cc4522896dcbee726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33239-loop-with-unreachable-exit-condition-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf708f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33239%3A%20Loop%20with%20unreachable%20exit%20condition%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d984ac4522896dcbf708f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33237-buffer-over-read-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf7087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33237%3A%20Buffer%20over-read%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d984ac4522896dcbf7087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33236-buffer-over-read-in-wlan-in-qualcomm-inc-snapdragon-compute-snapdragon-connectivity-snapdragon-mobile-snapdragon-wired-infrastructure-and-networking-bf7072</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33236%3A%20Buffer%20over-read%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d9849c4522896dcbf7072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33234-configuration-weakness-in-video-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf7061</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33234%3A%20Configuration%20weakness%20in%20video%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf7061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25743-use-after-free-in-graphics-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bf7028</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25743%3A%20Use-After-Free%20in%20Graphics%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf7028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25742-loop-with-unreachable-exit-condition-in-modem-in-qualcomm-inc-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-voice-music-bf7019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25742%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Voice%20%26%20Music&amp;severity=medium&amp;id=682d9849c4522896dcbf7019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25741-null-pointer-dereference-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf7011</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25741%3A%20NULL%20Pointer%20Dereference%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf7011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25727-use-of-out-of-range-pointer-offset-in-modem-in-qualcomm-inc-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-voice-music-bf6ffc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25727%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Voice%20%26%20Music&amp;severity=medium&amp;id=682d9849c4522896dcbf6ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25724-buffer-copy-without-checking-size-of-input-in-graphics-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bf6ff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25724%3A%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20in%20Graphics%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25710-dereferencing-a-pointer-that-is-already-freed-in-qualcomm-inc-snapdragon-auto-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-bf6fee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25710%3A%20Dereferencing%20a%20pointer%20that%20is%20already%20freed%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music&amp;severity=medium&amp;id=682d9849c4522896dcbf6fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25679-improper-access-control-in-video-in-qualcomm-inc-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf6fb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25679%3A%20Improper%20Access%20Control%20in%20Video%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25676-buffer-over-read-in-video-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-bf6f9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25676%3A%20Buffer%20Over-read%20in%20Video%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682d9849c4522896dcbf6f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25674-cryptographic-issues-in-wlan-in-qualcomm-inc-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-voice-music-bf6f95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25674%3A%20Cryptographic%20Issues%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Voice%20%26%20Music&amp;severity=medium&amp;id=682d9849c4522896dcbf6f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25671-reachable-assertion-in-modem-in-qualcomm-inc-snapdragon-mobile-bf6f8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25671%3A%20Reachable%20Assertion%20in%20MODEM%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682d9849c4522896dcbf6f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25667-information-disclosure-in-kernel-in-qualcomm-inc-snapdragon-wired-infrastructure-and-networking-bf6f8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25667%3A%20Information%20Disclosure%20in%20Kernel%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d9849c4522896dcbf6f8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41918-cwe-863-incorrect-authorization-in-opensearch-project-security-bf4adc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41918%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20opensearch-project%20security&amp;severity=medium&amp;id=682d9846c4522896dcbf4adc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41917-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-opensearch-project-opensearch-bf4ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41917%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20opensearch-project%20OpenSearch&amp;severity=medium&amp;id=682d9846c4522896dcbf4ad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41916-cwe-193-off-by-one-error-in-heimdal-heimdal-bf4ac5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41916%3A%20CWE-193%3A%20Off-by-one%20Error%20in%20heimdal%20heimdal&amp;severity=medium&amp;id=682d9846c4522896dcbf4ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45383-vulnerability-in-jenkins-project-jenkins-support-core-plugin-bee214</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45383%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Support%20Core%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbee214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45382-vulnerability-in-jenkins-project-jenkins-naginator-plugin-bee210</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45382%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Naginator%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbee210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45381-vulnerability-in-jenkins-project-jenkins-pipeline-utility-steps-plugin-bee1e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45381%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Pipeline%20Utility%20Steps%20Plugin&amp;severity=high&amp;id=682d983bc4522896dcbee1e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45380-vulnerability-in-jenkins-project-jenkins-junit-plugin-bee1c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45380%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20JUnit%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbee1c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43265-n-a-in-n-a-bee1c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43265%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee1c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42132-n-a-in-n-a-bee1af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42132%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42131-n-a-in-n-a-bee186</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42131%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42128-n-a-in-n-a-bee17e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42128%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee17e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42127-n-a-in-n-a-bee15c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42127%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee15c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42126-n-a-in-n-a-bee154</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42126%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42125-n-a-in-n-a-bee0d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42125%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42119-n-a-in-n-a-bee0d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42119%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42118-n-a-in-n-a-bee0cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42118%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42058-n-a-in-n-a-bee0b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42058%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee0b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42053-n-a-in-n-a-bee0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42053%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41396-n-a-in-n-a-bee090</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41396%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41395-n-a-in-n-a-bee08c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41395%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee08c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40847-n-a-in-n-a-bee07d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40846-n-a-in-n-a-bee079</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40846%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbee079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30283-n-a-in-n-a-bee04e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30283%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29279-n-a-in-n-a-bee046</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29279%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee046</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29278-n-a-in-n-a-bee024</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29278%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29277-n-a-in-n-a-bee013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29277%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29276-n-a-in-n-a-bee00f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29276%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29275-n-a-in-n-a-bee00b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29275%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45402-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-apache-software-foundation-apache-airflow-bedc3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45402%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=682d983bc4522896dcbedc3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45401-vulnerability-in-jenkins-project-jenkins-associated-files-plugin-bedc36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45401%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Associated%20Files%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbedc36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45400-vulnerability-in-jenkins-project-jenkins-japex-plugin-bedbeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45400%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20JAPEX%20Plugin&amp;severity=critical&amp;id=682d983bc4522896dcbedbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45399-vulnerability-in-jenkins-project-jenkins-cluster-statistics-plugin-bedbe3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45399%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Cluster%20Statistics%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbedbe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45398-vulnerability-in-jenkins-project-jenkins-cluster-statistics-plugin-bedbdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45398%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Cluster%20Statistics%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbedbdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45397-vulnerability-in-jenkins-project-jenkins-osf-builder-suite-xml-linter-plugin-bedbd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45397%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20OSF%20Builder%20Suite%20%3A%20%3A%20XML%20Linter%20Plugin&amp;severity=critical&amp;id=682d983bc4522896dcbedbd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45396-vulnerability-in-jenkins-project-jenkins-sourcemonitor-plugin-bedbb8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45396%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20SourceMonitor%20Plugin&amp;severity=critical&amp;id=682d983bc4522896dcbedbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40309-arbitrary-directory-deletion-in-apache-software-foundation-apache-archiva-bedbab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40309%3A%20Arbitrary%20directory%20deletion%20in%20Apache%20Software%20Foundation%20Apache%20Archiva&amp;severity=medium&amp;id=682d983bc4522896dcbedbab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40308-arbitrary-file-read-vulnerability-in-apache-software-foundation-apache-archiva-bedba7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40308%3A%20Arbitrary%20file%20read%20vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20Archiva&amp;severity=high&amp;id=682d983bc4522896dcbedba7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38666-vulnerability-in-jenkins-project-jenkins-ns-nd-integration-performance-publisher-plugin-bedba3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38666%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NS-ND%20Integration%20Performance%20Publisher%20Plugin&amp;severity=high&amp;id=682d983bc4522896dcbedba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30772-n-a-in-n-a-bedb9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30772%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbedb9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30771-n-a-in-n-a-bedb9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30771%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbedb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45395-vulnerability-in-jenkins-project-jenkins-cccc-plugin-bedb93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45395%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20CCCC%20Plugin&amp;severity=critical&amp;id=682d983bc4522896dcbedb93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45394-vulnerability-in-jenkins-project-jenkins-delete-log-plugin-bedb86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45394%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Delete%20log%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbedb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45393-vulnerability-in-jenkins-project-jenkins-delete-log-plugin-bedb82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45393%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Delete%20log%20Plugin&amp;severity=low&amp;id=682d983bc4522896dcbedb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30769-n-a-in-n-a-bedb63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30769%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedb63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30768-n-a-in-n-a-bedb5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30768%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedb5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45392-vulnerability-in-jenkins-project-jenkins-ns-nd-integration-performance-publisher-plugin-bedb2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45392%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NS-ND%20Integration%20Performance%20Publisher%20Plugin&amp;severity=medium&amp;id=682d983bc4522896dcbedb2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45391-vulnerability-in-jenkins-project-jenkins-ns-nd-integration-performance-publisher-plugin-bedae9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45391%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NS-ND%20Integration%20Performance%20Publisher%20Plugin&amp;severity=high&amp;id=682d983ac4522896dcbedae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45390-vulnerability-in-jenkins-project-jenkins-loader-io-plugin-beda5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45390%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20loader.io%20Plugin&amp;severity=medium&amp;id=682d983ac4522896dcbeda5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45389-vulnerability-in-jenkins-project-jenkins-xp-dev-plugin-beda4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45389%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20XP-Dev%20Plugin&amp;severity=medium&amp;id=682d983ac4522896dcbeda4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45388-vulnerability-in-jenkins-project-jenkins-config-rotator-plugin-beda2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45388%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Config%20Rotator%20Plugin&amp;severity=high&amp;id=682d983ac4522896dcbeda2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45387-vulnerability-in-jenkins-project-jenkins-bart-plugin-beda29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45387%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20BART%20Plugin&amp;severity=medium&amp;id=682d983ac4522896dcbeda29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45386-vulnerability-in-jenkins-project-jenkins-violations-plugin-beda18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45386%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Violations%20Plugin&amp;severity=medium&amp;id=682d983ac4522896dcbeda18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45385-vulnerability-in-jenkins-project-jenkins-cloudbees-docker-hub-registry-notification-plugin-beda10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45385%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20CloudBees%20Docker%20Hub%2FRegistry%20Notification%20Plugin&amp;severity=high&amp;id=682d983ac4522896dcbeda10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45384-vulnerability-in-jenkins-project-jenkins-reverse-proxy-auth-plugin-beda0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45384%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Reverse%20Proxy%20Auth%20Plugin&amp;severity=medium&amp;id=682d983ac4522896dcbeda0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43071-n-a-in-n-a-bed9bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42978-n-a-in-n-a-bed9b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42978%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42977-n-a-in-n-a-bed9ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42977%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed9ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42130-n-a-in-n-a-bed944</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42130%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42129-n-a-in-n-a-bed940</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42129%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42060-n-a-in-n-a-aecc47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42060%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fc1484d88663aecc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40845-n-a-in-n-a-aecc45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40845%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40844-n-a-in-n-a-aec86b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec86b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-15-74eb7c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-15&amp;severity=medium&amp;id=682c7abce3e6de8ceb74eb7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-15-f1214a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f1214a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27896-cwe-532-information-exposure-through-log-files-in-palantir-foundry-code-workbooks-bedf6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27896%3A%20CWE-532%20Information%20Exposure%20Through%20Log%20Files%20in%20Palantir%20Foundry%20Code-Workbooks&amp;severity=medium&amp;id=682d983bc4522896dcbedf6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28764-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-zoom-video-communications-inc-zoom-client-for-meetings-for-android-ios-linux-macos-and-windows-bee8c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28764%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20Client%20for%20Meetings%20(for%20Android%2C%20iOS%2C%20Linux%2C%20macOS%2C%20and%20Windows)&amp;severity=low&amp;id=682d983cc4522896dcbee8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34320-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-cics-tx-beed70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34320%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983cc4522896dcbeed70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34317-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-cics-tx-bee8ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34317%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983cc4522896dcbee8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34318-n-a-in-ibm-cics-tx-bedfb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34318%3A%20n%2Fa%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983bc4522896dcbedfb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34316-cwe-644-in-ibm-cics-tx-bedfaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34316%3A%20CWE-644%20in%20IBM%20CICS%20TX&amp;severity=low&amp;id=682d983bc4522896dcbedfaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34314-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ibm-cics-tx-bedf9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34314%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983bc4522896dcbedf9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34315-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-cics-tx-bedd62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34315%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983bc4522896dcbedd62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38705-1022-in-ibm-cics-tx-bed796</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38705%3A%201022%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983ac4522896dcbed796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34312-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ibm-cics-tx-bed78e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34312%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983ac4522896dcbed78e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24938-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-silabs-com-ember-znet-bed99e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24938%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20silabs.com%20Ember%20ZNet&amp;severity=medium&amp;id=682d983ac4522896dcbed99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34329-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ibm-cics-tx-befbf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34329%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983ec4522896dcbefbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34319-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-ibm-cics-tx-bee886</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34319%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983cc4522896dcbee886</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24937-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-silicon-labs-ember-znet-bed99a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24937%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Silicon%20Labs%20Ember%20ZNet&amp;severity=medium&amp;id=682d983ac4522896dcbed99a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34313-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ibm-cics-tx-bee261</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34313%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20IBM%20CICS%20TX&amp;severity=medium&amp;id=682d983bc4522896dcbee261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0137-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-michaelrsweet-htmldoc-befdad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0137%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20michaelrsweet%20htmldoc&amp;severity=medium&amp;id=682d983ec4522896dcbefdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35719-cwe-532-insertion-of-sensitive-information-into-log-file-in-ibm-mq-internet-pass-thru-befde4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35719%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20IBM%20MQ%20Internet%20Pass-Thru&amp;severity=medium&amp;id=682d983ec4522896dcbefde4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0324-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-linux-foundation-software-for-open-networking-in-the-cloud-sonic-bee286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0324%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Linux%20Foundation%20Software%20for%20Open%20Networking%20in%20the%20Cloud%20(SONiC)&amp;severity=high&amp;id=682d983bc4522896dcbee286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41913-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-calendar-bf4a9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41913%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse-calendar&amp;severity=medium&amp;id=682d9846c4522896dcbf4a9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39385-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf49ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39385%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf49ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43694-n-a-in-n-a-bedfbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43694%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedfbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43693-n-a-in-n-a-bedfbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43693%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbedfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43692-n-a-in-n-a-bedf05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43692%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43691-n-a-in-n-a-bedeff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43691%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43690-n-a-in-n-a-bedefd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43690%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedefd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43689-n-a-in-n-a-bedef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43689%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedef9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43687-n-a-in-n-a-bedef5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43687%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43686-n-a-in-n-a-bedeb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43686%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43342-n-a-in-n-a-bedeb5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43342%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983bc4522896dcbedeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43323-n-a-in-n-a-bedea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43323%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbedea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3631-cwe-79-cross-site-scripting-xss-in-unknown-oauth-client-by-digitialpixies-bede83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3631%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20OAuth%20Client%20by%20DigitialPixies&amp;severity=medium&amp;id=682d983bc4522896dcbede83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3578-cwe-79-cross-site-scripting-xss-in-unknown-profilegrid-user-profiles-memberships-groups-and-communities-bede7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3578%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20ProfileGrid%20%E2%80%93%20User%20Profiles%2C%20Memberships%2C%20Groups%20and%20Communities&amp;severity=medium&amp;id=682d983bc4522896dcbede7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3574-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-wpforms-pro-bede6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3574%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20WPForms%20Pro&amp;severity=critical&amp;id=682d983bc4522896dcbede6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3539-cwe-79-cross-site-scripting-xss-in-unknown-testimonials-bede6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3539%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Testimonials&amp;severity=medium&amp;id=682d983bc4522896dcbede6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3538-cwe-862-missing-authorization-in-unknown-webmaster-tools-verification-beddcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3538%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Webmaster%20Tools%20Verification&amp;severity=medium&amp;id=682d983bc4522896dcbeddcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3484-cwe-79-cross-site-scripting-xss-in-unknown-wpb-show-core-beddcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3484%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20wpb-show-core&amp;severity=medium&amp;id=682d983bc4522896dcbeddcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3362-cwe-613-insufficient-session-expiration-in-ikus060-ikus060-rdiffweb-beda02</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3362%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682d983ac4522896dcbeda02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44389-n-a-in-n-a-bed964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44389%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44387-n-a-in-n-a-bed95c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44387%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed95c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43294-n-a-in-n-a-bed954</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43294%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ac4522896dcbed954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43288-n-a-in-n-a-bed94c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43288%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33909-n-a-in-n-a-bed93c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33909%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33908-n-a-in-n-a-bed924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33908%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42110-n-a-in-n-a-bed8ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42110%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed8ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40405-n-a-in-n-a-bed8eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40405%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed8eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33907-n-a-in-n-a-bed8e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33907%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed8e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40127-cwe-94-improper-control-of-generation-of-code-code-injection-in-apache-software-foundation-apache-airflow-bed8b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40127%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=682d983ac4522896dcbed8b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3993-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-kareadita-kareadita-kavita-bed8b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3993%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20kareadita%20kareadita%2Fkavita&amp;severity=critical&amp;id=682d983ac4522896dcbed8b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33906-n-a-in-n-a-bed8ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33906%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed8ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42984-n-a-in-n-a-bed875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42984%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ac4522896dcbed875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40903-n-a-in-n-a-bed871</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40903%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed871</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33905-n-a-in-n-a-bed86d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed86d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32267-n-a-in-n-a-bed85c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32267%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32266-n-a-in-n-a-bed854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32266%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3903-cwe-843-in-kernel-bed848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3903%3A%20CWE-843%20in%20Kernel&amp;severity=medium&amp;id=682d983ac4522896dcbed848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3632-cwe-352-cross-site-request-forgery-csrf-in-unknown-oauth-client-by-digitialpixies-bed844</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3632%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20OAuth%20Client%20by%20DigitialPixies&amp;severity=medium&amp;id=682d983ac4522896dcbed844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3477-cwe-287-improper-authentication-in-tagdiv-tagdiv-composer-bed822</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3477%3A%20CWE-287%20Improper%20Authentication%20in%20tagDiv%20tagDiv%20Composer&amp;severity=critical&amp;id=682d983ac4522896dcbed822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31243-n-a-in-n-a-bed81e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31243%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed81e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30774-n-a-in-n-a-bed80f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30774%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30773-n-a-in-n-a-bed807</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30773%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3415-cwe-79-cross-site-scripting-xss-in-unknown-chat-bubble-floating-chat-with-contact-chat-icons-messages-telegram-email-sms-call-me-back-bed7ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3415%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Chat%20Bubble%20%E2%80%93%20Floating%20Chat%20with%20Contact%20Chat%20Icons%2C%20Messages%2C%20Telegram%2C%20Email%2C%20SMS%2C%20Call%20me%20back&amp;severity=medium&amp;id=682d983ac4522896dcbed7ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35613-n-a-in-n-a-bed7f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35613%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed7f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2450-cwe-862-missing-authorization-in-unknown-resmush-it-the-only-free-image-optimizer-compress-plugin-bed7ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2450%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20reSmush.it%20%3A%20the%20only%20free%20Image%20Optimizer%20%26%20compress%20plugin&amp;severity=medium&amp;id=682d983ac4522896dcbed7ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2449-cwe-352-cross-site-request-forgery-csrf-in-unknown-resmush-it-the-only-free-image-optimizer-compress-plugin-bed7e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2449%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20reSmush.it%20%3A%20the%20only%20free%20Image%20Optimizer%20%26%20compress%20plugin&amp;severity=medium&amp;id=682d983ac4522896dcbed7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27949-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-apache-software-foundation-apache-airflow-bed7b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27949%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=682d983ac4522896dcbed7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34325-n-a-in-n-a-bed792</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34325%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed792</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33986-n-a-in-n-a-bed773</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33986%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33985-n-a-in-n-a-bed751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33985%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33984-n-a-in-n-a-bed73d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33984%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed73d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33983-n-a-in-n-a-bed6e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33983%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed6e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33982-n-a-in-n-a-bed6e0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed6e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40272-n-a-in-n-a-bed6dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40272%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed6dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38828-n-a-in-n-a-bed6d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38828%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38827-n-a-in-n-a-bed69f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38827%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43146-n-a-in-n-a-becf2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43146%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecf2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43030-n-a-in-n-a-becec2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3238-cwe-459-in-kernel-becea0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3238%3A%20CWE-459%20in%20Kernel&amp;severity=high&amp;id=682d9839c4522896dcbecea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38167-n-a-in-n-a-bece98</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbece98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37290-n-a-in-n-a-bece94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37290%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbece94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37109-n-a-in-n-a-bec5ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37109%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9838c4522896dcbec5ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3469-cwe-79-cross-site-scripting-xss-in-unknown-wp-attachments-bdc329</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3469%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Attachments&amp;severity=medium&amp;id=682d981fc4522896dcbdc329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43968-n-a-in-n-a-aecc4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43968%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43967-n-a-in-n-a-aecc4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43967%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43695-n-a-in-n-a-aecc4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43695%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43295-n-a-in-n-a-aecc49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43295%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fc1484d88663aecc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-14-f12bf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-13-e67460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-13&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e67460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-13-f11f68</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41339-n-a-in-n-a-becf16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41339%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecf16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45195-n-a-in-n-a-becefc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45195%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43672-n-a-in-n-a-becedb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43672%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbecedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43671-n-a-in-n-a-beced3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43671%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbeced3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40773-n-a-in-n-a-becea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40773%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38651-n-a-in-n-a-bece9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38651%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbece9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45196-n-a-in-n-a-bec5f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-12-74800a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-12&amp;severity=medium&amp;id=682c7abae3e6de8ceb74800a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-12-f12d47</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31772-cwe-20-in-ibm-mq-bece8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31772%3A%20CWE-20%20in%20IBM%20MQ&amp;severity=medium&amp;id=682d9839c4522896dcbece8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40753-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-infosphere-information-server-becf0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40753%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbecf0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36776-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-cloud-pak-for-security-bece90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36776%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Security&amp;severity=medium&amp;id=682d9839c4522896dcbece90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40750-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ibm-websphere-application-server-bece4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682d9839c4522896dcbece4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38385-cwe-20-improper-input-validation-in-ibm-cloud-pak-for-security-becdf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38385%3A%20CWE-20%20Improper%20Input%20Validation%20in%20IBM%20Cloud%20Pak%20for%20Security&amp;severity=high&amp;id=682d9839c4522896dcbecdf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38387-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-ibm-cloud-pak-for-security-becd8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38387%3A%20CWE-78%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20IBM%20Cloud%20Pak%20for%20Security&amp;severity=high&amp;id=682d9839c4522896dcbecd8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34331-cwe-287-improper-authentication-in-ibm-power-fw-becd87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34331%3A%20CWE-287%20Improper%20Authentication%20in%20IBM%20Power%20FW&amp;severity=medium&amp;id=682d9839c4522896dcbecd87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3510-n-a-in-google-protocolbuffers-bf71c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3510%3A%20n%2Fa%20in%20Google%20ProtocolBuffers&amp;severity=medium&amp;id=682d984ac4522896dcbf71c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41906-cwe-918-server-side-request-forgery-ssrf-in-opensearch-project-notifications-bf4a93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41906%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20opensearch-project%20notifications&amp;severity=medium&amp;id=682d9846c4522896dcbf4a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41905-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mar10-wsgidav-bf4a8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41905%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20mar10%20wsgidav&amp;severity=medium&amp;id=682d9846c4522896dcbf4a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41904-cwe-357-insufficient-ui-warning-of-dangerous-operations-in-vector-im-element-ios-bf4a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41904%3A%20CWE-357%3A%20Insufficient%20UI%20Warning%20of%20Dangerous%20Operations%20in%20vector-im%20element-ios&amp;severity=medium&amp;id=682d9846c4522896dcbf4a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41892-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-archesproject-arches-bf4a87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41892%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20archesproject%20arches&amp;severity=medium&amp;id=682d9846c4522896dcbf4a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41882-cwe-94-improper-control-of-generation-of-code-code-injection-in-nextcloud-security-advisories-bf4a83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41882%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf4a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41873-cwe-125-out-of-bounds-read-in-contiki-ng-contiki-ng-bf4a51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41873%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9846c4522896dcbf4a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45193-n-a-in-n-a-beee3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45193%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983cc4522896dcbeee3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3945-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-kareadita-kareadita-kavita-bed79e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3945%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20kareadita%20kareadita%2Fkavita&amp;severity=critical&amp;id=682d983ac4522896dcbed79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45182-n-a-in-n-a-beceeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45182%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbeceeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45194-n-a-in-n-a-becdbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45194%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d9839c4522896dcbecdbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-11-f120f7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f120f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41719-cwe-400-uncontrolled-resource-consumption-in-github-com-shamaton-msgpack-v2-github-com-shamaton-msgpack-v2-bed7d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41719%3A%20CWE%20400%3A%20Uncontrolled%20Resource%20Consumption%20in%20github.com%2Fshamaton%2Fmsgpack%2Fv2%20github.com%2Fshamaton%2Fmsgpack%2Fv2&amp;severity=high&amp;id=682d983ac4522896dcbed7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42787-cwe-330-use-of-insufficiently-random-values-in-wiesemann-theis-com-server-lc-bec5b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42787%3A%20CWE-330%20Use%20of%20Insufficiently%20Random%20Values%20in%20Wiesemann%20%26%20Theis%20Com-Server%20LC&amp;severity=high&amp;id=682d9838c4522896dcbec5b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42786-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wiesemann-theis-com-server-lc-beed9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42786%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Wiesemann%20%26%20Theis%20Com-Server%20LC&amp;severity=medium&amp;id=682d983cc4522896dcbeed9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42785-cwe-306-missing-authentication-for-critical-function-in-wiesemann-theis-com-server-lc-bec5ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42785%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Wiesemann%20%26%20Theis%20Com-Server%20LC&amp;severity=critical&amp;id=682d9838c4522896dcbec5ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43754-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-suse-suse-linux-enterprise-module-for-suse-manager-server-4-2-bed7ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43754%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Module%20for%20SUSE%20Manager%20Server%204.2&amp;severity=low&amp;id=682d983ac4522896dcbed7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43753-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-suse-suse-linux-enterprise-module-for-suse-manager-server-4-2-bed7a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43753%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Module%20for%20SUSE%20Manager%20Server%204.2&amp;severity=medium&amp;id=682d983ac4522896dcbed7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31255-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-suse-suse-linux-enterprise-module-for-suse-manager-server-4-2-bed74d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31255%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20SUSE%20SUSE%20Linux%20Enterprise%20Module%20for%20SUSE%20Manager%20Server%204.2&amp;severity=medium&amp;id=682d983ac4522896dcbed74d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3867-cwe-613-insufficient-session-expiration-in-hashicorp-nomad-bec5a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3867%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20HashiCorp%20Nomad&amp;severity=low&amp;id=682d9838c4522896dcbec5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3866-cwe-668-exposure-of-resource-to-wrong-sphere-in-hashicorp-nomad-bec595</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3866%3A%20CWE-668%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20HashiCorp%20Nomad&amp;severity=medium&amp;id=682d9838c4522896dcbec595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39038-cwe-287-improper-authentication-in-flowring-agentflow-bpm-bec591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39038%3A%20CWE-287%20Improper%20Authentication%20in%20FLOWRING%20Agentflow%20BPM&amp;severity=high&amp;id=682d9838c4522896dcbec591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39037-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-flowring-agentflow-bpm-becd46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39037%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20FLOWRING%20Agentflow%20BPM&amp;severity=high&amp;id=682d9839c4522896dcbecd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39036-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-flowring-agentflow-bpm-bec58d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39036%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20FLOWRING%20Agentflow%20BPM&amp;severity=critical&amp;id=682d9838c4522896dcbec58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38122-cwe-319-cleartext-transmission-of-sensitive-information-in-powercom-co-ltd-upsmon-pro-bec589</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38122%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20POWERCOM%20CO.%2C%20LTD.%20UPSMON%20PRO&amp;severity=high&amp;id=682d9838c4522896dcbec589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38121-cwe-522-insufficiently-protected-credentials-in-powercom-co-ltd-upsmon-pro-bec585</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38121%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20POWERCOM%20CO.%2C%20LTD.%20UPSMON%20PRO&amp;severity=medium&amp;id=682d9838c4522896dcbec585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38120-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-powercom-co-ltd-upsmon-pro-bec578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38120%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20POWERCOM%20CO.%2C%20LTD.%20UPSMON%20PRO&amp;severity=medium&amp;id=682d9838c4522896dcbec578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38119-cwe-287-improper-authentication-in-powercom-co-ltd-upsmon-pro-bec555</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38119%3A%20CWE-287%20Improper%20Authentication%20in%20POWERCOM%20CO.%2C%20LTD.%20UPSMON%20PRO&amp;severity=critical&amp;id=682d9838c4522896dcbec555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41879-cwe-1321-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-parse-community-parse-server-bf4a7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41879%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9846c4522896dcbf4a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41878-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-parse-community-parse-server-bf4a79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41878%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9846c4522896dcbf4a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41876-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ezsystems-ezplatform-graphql-bf4a68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41876%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ezsystems%20ezplatform-graphql&amp;severity=medium&amp;id=682d9846c4522896dcbf4a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41874-cwe-668-exposure-of-resource-to-wrong-sphere-in-tauri-apps-tauri-bf4a55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41874%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20tauri-apps%20tauri&amp;severity=medium&amp;id=682d9846c4522896dcbf4a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39398-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-infotelglpi-tasklists-bf4a45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39398%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20InfotelGLPI%20tasklists&amp;severity=medium&amp;id=682d9846c4522896dcbf4a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39396-cwe-1321-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-parse-community-parse-server-bf4a30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39396%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9846c4522896dcbf4a30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39395-cwe-269-improper-privilege-management-in-go-vela-server-bf4a28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39395%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20go-vela%20server&amp;severity=medium&amp;id=682d9846c4522896dcbf4a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39394-cwe-787-out-of-bounds-write-in-bytecodealliance-wasmtime-bf4a13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39394%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9846c4522896dcbf4a13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39392-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-bytecodealliance-wasmtime-bf4a0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39392%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9846c4522896dcbf4a0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39388-cwe-863-incorrect-authorization-in-istio-istio-bf4a0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39388%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20istio%20istio&amp;severity=medium&amp;id=682d9846c4522896dcbf4a0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36022-cwe-344-use-of-invariant-value-in-dynamically-changing-context-in-eclipse-deeplearning4j-bf47c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36022%3A%20CWE-344%3A%20Use%20of%20Invariant%20Value%20in%20Dynamically%20Changing%20Context%20in%20eclipse%20deeplearning4j&amp;severity=medium&amp;id=682d9845c4522896dcbf47c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45130-n-a-in-n-a-becee3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45130%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45129-n-a-in-n-a-bece63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45129%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbece63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44087-n-a-in-n-a-bece52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44087%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbece52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43679-n-a-in-n-a-bece4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43679%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbece4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43074-n-a-in-n-a-becdf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43074%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbecdf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36938-cwe-125-out-of-bounds-read-cwe-822-untrusted-pointer-dereference-in-facebook-redex-becdef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36938%3A%20CWE-125%3A%20Out-of-bounds%20Read%2C%20CWE-822%3A%20Untrusted%20Pointer%20Dereference%20in%20Facebook%20Redex&amp;severity=critical&amp;id=682d9839c4522896dcbecdef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35740-n-a-in-n-a-becde0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35740%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecde0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34666-cwe-476-null-pointer-dereference-in-nvidia-nvidia-cloud-gaming-guest-driver-nvidia-cloud-gaming-virtual-gpu-manager-becdd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34666%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20NVIDIA%20NVIDIA%20Cloud%20Gaming%20(guest%20driver)%2C%20NVIDIA%20Cloud%20Gaming%20(Virtual%20GPU%20Manager)&amp;severity=medium&amp;id=682d9839c4522896dcbecdd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26088-n-a-in-n-a-becdd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26088%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecdd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44727-n-a-in-n-a-becd7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44727%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbecd7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44089-n-a-in-n-a-becd52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44089%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbecd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44088-n-a-in-n-a-becd4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44088%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbecd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40289-n-a-in-n-a-bec850</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40289%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40226-n-a-in-n-a-bec810</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40226%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbec810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39393-cwe-226-sensitive-information-in-resource-not-removed-before-reuse-in-bytecodealliance-wasmtime-bec18c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39393%3A%20CWE-226%3A%20Sensitive%20Information%20in%20Resource%20Not%20Removed%20Before%20Reuse%20in%20bytecodealliance%20wasmtime&amp;severity=high&amp;id=682d9838c4522896dcbec18c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-10-f12206</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f12206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27673-na-in-amd-amd-link-android-bece42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27673%3A%20NA%20in%20AMD%20AMD%20Link%20Android&amp;severity=high&amp;id=682d9839c4522896dcbece42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23831-na-in-amd-amd-prof-becd18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23831%3A%20NA%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=high&amp;id=682d9839c4522896dcbecd18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27674-na-in-amd-amd-prof-becd20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27674%3A%20NA%20in%20AMD%20AMD%20%CE%BCProf&amp;severity=high&amp;id=682d9839c4522896dcbecd20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26360-tbd-in-amd-amd-radeon-rx-6000-series-pro-w6000-series-beccf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26360%3A%20TBD%20in%20AMD%20AMD%20Radeon%20RX%206000%20Series%20%26%20PRO%20W6000%20Series&amp;severity=high&amp;id=682d9839c4522896dcbeccf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26391-tbd-in-amd-amd-radeon-rx-5000-series-pro-w5000-series-becc6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26391%3A%20TBD%20in%20AMD%20AMD%20Radeon%20RX%205000%20Series%20%26%20PRO%20W5000%20Series&amp;severity=high&amp;id=682d9839c4522896dcbecc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0031-cwe-345-insufficient-verification-of-data-authenticity-in-palo-alto-networks-cortex-xsoar-bec530</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0031%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Palo%20Alto%20Networks%20Cortex%20XSOAR&amp;severity=medium&amp;id=682d9838c4522896dcbec530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34579-cwe-269-improper-privilege-management-in-phoenix-contact-fl-mguard-dm-2981974-beed3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34579%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20PHOENIX%20CONTACT%20FL%20MGUARD%20DM%20(2981974)&amp;severity=high&amp;id=682d983cc4522896dcbeed3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34577-cwe-798-use-of-hard-coded-credentials-in-kaden-picoflux-air-bec52c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34577%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Kaden%20PICOFLUX%20AiR&amp;severity=medium&amp;id=682d9838c4522896dcbec52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34569-cwe-787-out-of-bounds-write-in-wago-750-81xx-xxx-xxxfw-bec51b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34569%3A%20CWE-787%20Out-of-bounds%20Write%20in%20WAGO%20750-81xx%2Fxxx-xxxFW&amp;severity=critical&amp;id=682d9838c4522896dcbec51b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34568-cwe-770-allocation-of-resources-without-limits-or-throttling-in-wago-750-81xx-xxx-xxxfw-becc81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34568%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20WAGO%20750-81xx%2Fxxx-xxxFW&amp;severity=high&amp;id=682d9839c4522896dcbecc81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34567-cwe-125-out-of-bounds-read-in-wago-750-81xx-xxx-xxxfw-becc7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34567%3A%20CWE-125%20Out-of-bounds%20Read%20in%20WAGO%20750-81xx%2Fxxx-xxxFW&amp;severity=high&amp;id=682d9839c4522896dcbecc7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34566-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-wago-750-81xx-xxx-xxxfw-becc79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34566%3A%20CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20WAGO%20750-81xx%2Fxxx-xxxFW&amp;severity=critical&amp;id=682d9839c4522896dcbecc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31253-cwe-426-untrusted-search-path-in-opensuse-factory-becc90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31253%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20openSUSE%20Factory&amp;severity=high&amp;id=682d9839c4522896dcbecc90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39368-cwe-404-improper-resource-shutdown-or-release-in-eclipse-californium-californium-bf4991</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39368%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20eclipse-californium%20californium&amp;severity=medium&amp;id=682d9846c4522896dcbf4991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39307-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-bf486c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39307%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9846c4522896dcbf486c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39306-cwe-20-improper-input-validation-in-grafana-grafana-bf4848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39306%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf4848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43119-n-a-in-n-a-bed9df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43119%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d983ac4522896dcbed9df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29836-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-western-digital-my-cloud-home-bece88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29836%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Western%20Digital%20My%20Cloud%20Home&amp;severity=low&amp;id=682d9839c4522896dcbece88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44561-permission-verification-vulnerability-in-huawei-harmonyos-bece56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44561%3A%20Permission%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbece56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39885-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-samsung-mobile-devices-bece46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39885%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9839c4522896dcbece46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44560-intent-redirection-vulnerability-in-huawei-harmonyos-bece21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44560%3A%20Intent%20redirection%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d9839c4522896dcbece21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44559-serialization-deserialization-mismatch-vulnerability-in-huawei-harmonyos-bece04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44559%3A%20Serialization%2Fdeserialization%20mismatch%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682d9839c4522896dcbece04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44558-serialization-deserialization-mismatch-vulnerability-in-huawei-harmonyos-becda7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44558%3A%20Serialization%2Fdeserialization%20mismatch%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682d9839c4522896dcbecda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44557-permission-verification-vulnerability-in-huawei-harmonyos-becda5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44557%3A%20Permission%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44555-service-hijacking-vulnerability-in-huawei-harmonyos-becd79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44555%3A%20Service%20hijacking%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecd79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44554-permission-verification-vulnerability-in-huawei-harmonyos-becd75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44554%3A%20Permission%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecd75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44553-weaknesses-introduced-during-design-in-huawei-harmonyos-becd71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44553%3A%20Weaknesses%20Introduced%20During%20Design%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d9839c4522896dcbecd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44550-uaf-vulnerability-in-huawei-harmonyos-becd33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44550%3A%20UAF%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43120-n-a-in-n-a-becd2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45062-n-a-in-n-a-beccbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45062%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbeccbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45061-n-a-in-n-a-beccb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbeccb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45060-n-a-in-n-a-becc94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45060%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45059-n-a-in-n-a-becc64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44563-race-condition-vulnerability-in-huawei-harmonyos-becc60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44563%3A%20Race%20condition%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d9839c4522896dcbecc60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44562-serialization-deserialization-mismatch-vulnerability-in-huawei-harmonyos-becc5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44562%3A%20Serialization%2Fdeserialization%20mismatch%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682d9839c4522896dcbecc5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44552-weaknesses-introduced-during-design-in-huawei-harmonyos-becc3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44552%3A%20Weaknesses%20Introduced%20During%20Design%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecc3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44551-thread-security-vulnerability-in-huawei-harmonyos-becc39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44551%3A%20Thread%20security%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682d9839c4522896dcbecc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44549-geofencing-api-access-vulnerability-in-huawei-harmonyos-becc1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44549%3A%20Geofencing%20API%20access%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44548-unstrict-permission-verification-vulnerability-in-huawei-harmonyos-becba3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44548%3A%20Unstrict%20permission%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=medium&amp;id=682d9839c4522896dcbecba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43058-n-a-in-n-a-becb7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43058%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbecb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43031-n-a-in-n-a-becb7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44547-uaf-vulnerability-in-huawei-harmonyos-becb61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44547%3A%20UAF%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbecb61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43321-n-a-in-n-a-becb59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43321%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43320-n-a-in-n-a-becb55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecb55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43310-n-a-in-n-a-becb51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43310%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43292-n-a-in-n-a-becb4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43292%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43291-n-a-in-n-a-becb40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43291%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43290-n-a-in-n-a-becb29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43290%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43278-n-a-in-n-a-becb18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43278%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43277-n-a-in-n-a-becb10</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43277%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43121-n-a-in-n-a-beca3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43121%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbeca3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43118-n-a-in-n-a-beca2d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43118%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbeca2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40797-n-a-in-n-a-bec97c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40797%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3413-incorrect-authorization-in-gitlab-in-gitlab-gitlab-bec97a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3413%3A%20Incorrect%20authorization%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9839c4522896dcbec97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39884-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bec960</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39884%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9839c4522896dcbec960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31689-session-fixation-in-vmware-workspace-one-assist-bec958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31689%3A%20Session%20fixation%20in%20VMware%20Workspace%20ONE%20Assist&amp;severity=critical&amp;id=682d9839c4522896dcbec958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31688-reflected-cross-site-scripting-xss-in-vmware-workspace-one-assist-bec931</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31688%3A%20Reflected%20cross-site%20scripting%20(XSS)%20in%20VMware%20Workspace%20ONE%20Assist&amp;severity=medium&amp;id=682d9839c4522896dcbec931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31687-broken-access-control-in-vmware-workspace-one-assist-bec92d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31687%3A%20Broken%20Access%20Control%20in%20VMware%20Workspace%20ONE%20Assist&amp;severity=critical&amp;id=682d9839c4522896dcbec92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31686-broken-authentication-method-in-vmware-workspace-one-assist-bec912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31686%3A%20Broken%20Authentication%20Method%20in%20VMware%20Workspace%20ONE%20Assist&amp;severity=critical&amp;id=682d9839c4522896dcbec912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31685-authentication-bypass-vulnerability-in-vmware-workspace-one-assist-bec90e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31685%3A%20Authentication%20Bypass%20vulnerability%20in%20VMware%20Workspace%20ONE%20Assist&amp;severity=critical&amp;id=682d9839c4522896dcbec90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46852-logic-bypass-vulnerability-in-huawei-harmonyos-bec8d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46852%3A%20Logic%20bypass%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbec8d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46851-unstrict-verification-vulnerability-in-huawei-harmonyos-bec8d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46851%3A%20Unstrict%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682d9839c4522896dcbec8d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44546-improper-update-of-reference-count-in-huawei-harmonyos-bec818</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44546%3A%20Improper%20Update%20of%20Reference%20Count%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682d9839c4522896dcbec818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44244-n-a-in-n-a-bec7af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44244%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec7af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42966-cwe-1333-inefficient-regular-expression-complexity-in-cleo-cleo-bec545</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42966%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20cleo%20cleo&amp;severity=medium&amp;id=682d9838c4522896dcbec545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42965-cwe-1333-inefficient-regular-expression-complexity-in-snowflake-connector-python-snowflake-connector-python-bec4f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42965%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20snowflake-connector-python%20snowflake-connector-python&amp;severity=low&amp;id=682d9838c4522896dcbec4f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42964-cwe-1333-inefficient-regular-expression-complexity-in-pymatgen-pymatgen-bec4f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42964%3A%20CWE-1333%20Inefficient%20Regular%20Expression%20Complexity%20in%20pymatgen%20pymatgen&amp;severity=medium&amp;id=682d9838c4522896dcbec4f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3819-improper-authorization-in-gitlab-in-gitlab-gitlab-bec4ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3819%3A%20Improper%20authorization%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9838c4522896dcbec4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3818-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-bec4ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3818%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3793-improper-authorization-in-gitlab-in-gitlab-gitlab-bec4e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3793%3A%20Improper%20authorization%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3726-protection-mechanism-failure-in-gitlab-in-gitlab-gitlab-bec4e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3726%3A%20Protection%20mechanism%20failure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec4e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3706-improper-authorization-in-gitlab-in-gitlab-gitlab-bec4d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3706%3A%20Improper%20authorization%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9838c4522896dcbec4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3285-improper-access-control-in-gitlab-in-gitlab-gitlab-bec4ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3285%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3280-url-redirection-to-untrusted-site-open-redirect-in-gitlab-in-gitlab-gitlab-bec49b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3280%3A%20Url%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9838c4522896dcbec49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3265-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-in-gitlab-gitlab-bec497</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3265%3A%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682d9838c4522896dcbec497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3486-url-redirection-to-untrusted-site-open-redirect-in-gitlab-in-gitlab-gitlab-bec440</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3486%3A%20Url%20redirection%20to%20untrusted%20site%20(&apos;open%20redirect&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3483-information-exposure-in-gitlab-in-gitlab-gitlab-bec43c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3483%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39893-cwe-532-insertion-of-sensitive-information-into-log-file-in-samsung-mobile-galaxy-buds-pro-manager-bec438</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39893%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Samsung%20Mobile%20Galaxy%20Buds%20Pro%20Manager&amp;severity=low&amp;id=682d9838c4522896dcbec438</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39892-cwe-287-improper-authentication-in-samsung-mobile-samsung-pass-bec434</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39892%3A%20CWE-287%20Improper%20Authentication%20in%20Samsung%20Mobile%20Samsung%20Pass&amp;severity=low&amp;id=682d9838c4522896dcbec434</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39891-cwe-125-out-of-bounds-read-in-samsung-mobile-editor-lite-bec430</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39891%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Samsung%20Mobile%20Editor%20Lite&amp;severity=medium&amp;id=682d9838c4522896dcbec430</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39890-cwe-285-improper-authorization-in-samsung-mobile-samsung-billing-bec42c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39890%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Billing&amp;severity=medium&amp;id=682d9838c4522896dcbec42c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39889-cwe-284-improper-access-control-in-samsung-mobile-galaxywatch4plugin-bec41f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39889%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20GalaxyWatch4Plugin&amp;severity=medium&amp;id=682d9838c4522896dcbec41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39887-cwe-284-improper-access-control-in-samsung-mobile-samsung-mobile-devices-bec41b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39887%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9838c4522896dcbec41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39886-cwe-280-improper-handling-of-insufficient-permissions-or-privileges-in-samsung-mobile-samsung-mobile-devices-bec417</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39886%3A%20CWE-280%3A%20Improper%20Handling%20of%20Insufficient%20Permissions%20or%20Privileges%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9838c4522896dcbec417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39883-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bec3f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39883%3A%20CWE-285%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9838c4522896dcbec3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39882-cwe-787-out-of-bounds-write-in-samsung-mobile-samsung-mobile-devices-bec3ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39882%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=682d9838c4522896dcbec3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39881-cwe-20-improper-input-validation-in-samsung-mobile-samsung-mobile-devices-bec3eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39881%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9838c4522896dcbec3eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39880-cwe-20-improper-input-validation-in-samsung-mobile-samsung-mobile-devices-bec3e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39880%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=high&amp;id=682d9838c4522896dcbec3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39879-cwe-285-improper-authorization-in-samsung-mobile-samsung-mobile-devices-bec3e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39879%3A%20CWE-285%3A%20%20%20Improper%20Authorization%20in%20Samsung%20Mobile%20Samsung%20Mobile%20Devices&amp;severity=medium&amp;id=682d9838c4522896dcbec3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2761-information-exposure-in-gitlab-in-gitlab-gitlab-bec3df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2761%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9838c4522896dcbec3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-09-f122ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f122ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27516-cwe-693-protection-mechanism-failure-in-citrix-citrix-gateway-citrix-adc-bec3db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27516%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20Citrix%20Citrix%20Gateway%2C%20Citrix%20ADC&amp;severity=medium&amp;id=682d9838c4522896dcbec3db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27510-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-citrix-citrix-gateway-citrix-adc-bec3d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27510%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Citrix%20Citrix%20Gateway%2C%20Citrix%20ADC&amp;severity=critical&amp;id=682d9838c4522896dcbec3d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27513-cwe-345-insufficient-verification-of-data-authenticity-in-citrix-citrix-gateway-citrix-adc-bec3d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27513%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Citrix%20Citrix%20Gateway%2C%20Citrix%20ADC&amp;severity=high&amp;id=682d9838c4522896dcbec3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43958-cwe-256-plaintext-storage-of-a-password-in-siemens-qms-automotive-bf82b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43958%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20Siemens%20QMS%20Automotive&amp;severity=medium&amp;id=682d984bc4522896dcbf82b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43397-cwe-787-out-of-bounds-write-in-siemens-parasolid-v34-0-bf829a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43397%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Parasolid%20V34.0&amp;severity=medium&amp;id=682d984bc4522896dcbf829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41664-cwe-121-stack-based-buffer-overflow-in-siemens-jt2go-bf826e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41664%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf826e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41663-cwe-416-use-after-free-in-siemens-jt2go-bf826a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41663%3A%20CWE-416%3A%20Use%20After%20Free%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf826a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41662-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf8266</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41662%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41661-cwe-125-out-of-bounds-read-in-siemens-jt2go-bf8262</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41661%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41660-cwe-787-out-of-bounds-write-in-siemens-jt2go-bf8198</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41660%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39157-cwe-125-out-of-bounds-read-in-siemens-parasolid-v34-0-bf811b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39157%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Siemens%20Parasolid%20V34.0&amp;severity=medium&amp;id=682d984bc4522896dcbf811b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39136-cwe-122-heap-based-buffer-overflow-in-siemens-jt2go-bf8113</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39136%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20JT2Go&amp;severity=medium&amp;id=682d984bc4522896dcbf8113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30694-cwe-352-cross-site-request-forgery-csrf-in-siemens-simatic-drive-controller-cpu-1504d-tf-bf808d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30694%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Siemens%20SIMATIC%20Drive%20Controller%20CPU%201504D%20TF&amp;severity=medium&amp;id=682d984bc4522896dcbf808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39377-cwe-131-incorrect-calculation-of-buffer-size-in-sysstat-sysstat-bf6c82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39377%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20sysstat%20sysstat&amp;severity=medium&amp;id=682d9849c4522896dcbf6c82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39343-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-azure-rtos-filex-bf6c69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39343%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20azure-rtos%20filex&amp;severity=medium&amp;id=682d9849c4522896dcbf6c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39386-cwe-248-uncaught-exception-in-fastify-fastify-websocket-bf4a03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39386%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20fastify%20fastify-websocket&amp;severity=medium&amp;id=682d9846c4522896dcbf4a03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39352-cwe-863-incorrect-authorization-in-openfga-openfga-bf494b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39352%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20openfga%20openfga&amp;severity=medium&amp;id=682d9846c4522896dcbf494b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39328-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-grafana-grafana-bf48b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39328%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9846c4522896dcbf48b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36077-cwe-522-insufficiently-protected-credentials-in-electron-electron-bf47cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36077%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20electron%20electron&amp;severity=medium&amp;id=682d9845c4522896dcbf47cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41215-cwe-601-in-sap-se-sap-netweaver-abap-server-and-abap-platform-bee23a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41215%3A%20CWE-601%20in%20SAP%20SE%20SAP%20NetWeaver%20ABAP%20Server%20and%20ABAP%20Platform&amp;severity=medium&amp;id=682d983bc4522896dcbee23a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41260-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sap-se-sap-financial-consolidation-bed9f1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41260%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20SE%20SAP%20Financial%20Consolidation&amp;severity=medium&amp;id=682d983ac4522896dcbed9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41258-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sap-se-sap-financial-consolidation-becdf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41258%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20SE%20SAP%20Financial%20Consolidation&amp;severity=medium&amp;id=682d9839c4522896dcbecdf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41211-cwe-787-out-of-bounds-write-in-sap-se-sap-3d-visual-enterprise-author-becd98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41211%3A%20CWE-787%20Out-of-bounds%20Write%20in%20SAP%20SE%20SAP%203D%20Visual%20Enterprise%20Author&amp;severity=high&amp;id=682d9839c4522896dcbecd98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39069-sql-injection-in-zaip-aie-becd4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39069%3A%20SQL%20injection%20in%20ZAIP-AIE&amp;severity=medium&amp;id=682d9839c4522896dcbecd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33322-cwe-79-cross-site-scripting-xss-in-mitsubishi-electric-corporation-air-conditioning-msz-fd40-56-63-71-8022s-becc0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33322%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Mitsubishi%20Electric%20Corporation%20Air%20Conditioning%20MSZ-FD40%2F56%2F63%2F71%2F8022S&amp;severity=medium&amp;id=682d9839c4522896dcbecc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41207-cwe-601-in-sap-se-sap-biller-direct-becbfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41207%3A%20CWE-601%20in%20SAP%20SE%20SAP%20Biller%20Direct&amp;severity=medium&amp;id=682d9839c4522896dcbecbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44318-n-a-in-n-a-becb9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44318%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44317-n-a-in-n-a-becb82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44317%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbecb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20465-elevation-of-privilege-in-android-becb06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20465%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbecb06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20462-elevation-of-privilege-in-android-becafe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20462%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbecafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20457-elevation-of-privilege-in-android-becaf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20457%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbecaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20454-elevation-of-privilege-in-android-becaf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20454%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbecaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20453-denial-of-service-in-android-becae1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20453%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbecae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20452-elevation-of-privilege-in-android-becad0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20452%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbecad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20451-elevation-of-privilege-in-android-becac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20451%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbecac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20450-elevation-of-privilege-in-android-becaa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20450%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbecaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20448-elevation-of-privilege-in-android-beca1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20448%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbeca1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20447-information-disclosure-in-android-beca16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20447%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbeca16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20441-elevation-of-privilege-in-android-beca12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20441%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbeca12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20426-denial-of-service-in-android-beca0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20426%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbeca0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20414-denial-of-service-in-android-bec9f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20414%3A%20Denial%20of%20service%20in%20Android&amp;severity=medium&amp;id=682d9839c4522896dcbec9f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40303-n-a-in-n-a-bec9e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40303%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec9e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39661-elevation-of-privilege-in-android-bec98a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39661%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbec98a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-1050-elevation-of-privilege-in-android-bec986</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-1050%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682d9839c4522896dcbec986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35473-n-a-in-n-a-bec8d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35473%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44316-n-a-in-n-a-bec896</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44316%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44315-n-a-in-n-a-bec885</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44315%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec885</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44314-n-a-in-n-a-bec87d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44314%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44313-n-a-in-n-a-bec875</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44313%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41203-cwe-502-in-sap-se-sap-businessobjects-business-intelligence-platform-central-management-console-and-bi-launchpad-bec858</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41203%3A%20CWE-502%20in%20SAP%20SE%20SAP%20BusinessObjects%20Business%20Intelligence%20Platform%20(Central%20Management%20Console%20and%20BI%20Launchpad)&amp;severity=critical&amp;id=682d9839c4522896dcbec858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44556-incorrect-type-conversion-or-cast-in-emui-bec7c1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44556%3A%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20EMUI&amp;severity=high&amp;id=682d9839c4522896dcbec7c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44457-cwe-294-authentication-bypass-by-capture-replay-in-siemens-mendix-saml-mendix-7-compatible-bec7b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44457%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20Siemens%20Mendix%20SAML%20(Mendix%207%20compatible)&amp;severity=critical&amp;id=682d9839c4522896dcbec7b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44321-n-a-in-n-a-bec7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44321%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec7b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44320-n-a-in-n-a-bec7b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec7b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44319-n-a-in-n-a-bec797</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44319%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44312-n-a-in-n-a-bec78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44312%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44311-n-a-in-n-a-bec787</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44311%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbec787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43343-n-a-in-n-a-bec77f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43343%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbec77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43144-n-a-in-n-a-bec777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43144%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41214-cwe-20-improper-input-validation-in-sap-se-sap-netweaver-application-server-abap-and-abap-platform-bec75e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41214%3A%20CWE-20%20Improper%20Input%20Validation%20in%20SAP%20SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=high&amp;id=682d9839c4522896dcbec75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37015-elevation-of-privilege-in-symantec-endpoint-detection-and-response-bec74f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37015%3A%20Elevation%20of%20Privilege%20in%20Symantec%20Endpoint%20Detection%20and%20Response&amp;severity=critical&amp;id=682d9839c4522896dcbec74f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34825-uncontrolled-search-path-element-in-nec-corporation-clusterpro-x-bec747</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34825%3A%20Uncontrolled%20Search%20Path%20Element%20in%20NEC%20Corporation%20CLUSTERPRO%20X&amp;severity=critical&amp;id=682d9839c4522896dcbec747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41434-n-a-in-n-a-bec73f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41434%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec73f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41433-n-a-in-n-a-bec730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41433%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41432-n-a-in-n-a-bec728</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41432%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec728</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34824-weak-file-and-folder-permissions-in-nec-corporation-clusterpro-x-bec718</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34824%3A%20Weak%20File%20and%20Folder%20Permissions%20in%20NEC%20Corporation%20CLUSTERPRO%20X&amp;severity=critical&amp;id=682d9839c4522896dcbec718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33321-cwe-319-cleartext-transmission-of-sensitive-information-in-mitsubishi-electric-corporation-photovoltaic-color-monitor-eco-guide-pv-dr006l-set-m-bec710</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33321%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Mitsubishi%20Electric%20Corporation%20PHOTOVOLTAIC%20COLOR%20MONITOR%20ECO-GUIDE%20PV-DR006L-SET-M&amp;severity=critical&amp;id=682d9839c4522896dcbec710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32618-elevation-of-privilege-in-mediatek-inc-mt6833-mt6873-mt6893-mt8798-bec6f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32618%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6873%2C%20MT6893%2C%20MT8798&amp;severity=medium&amp;id=682d9839c4522896dcbec6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32617-elevation-of-privilege-in-mediatek-inc-mt6789-mt6855-mt6895-mt6983-mt8798-bec6e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32617%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6855%2C%20MT6895%2C%20MT6983%2C%20MT8798&amp;severity=medium&amp;id=682d9839c4522896dcbec6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32616-elevation-of-privilege-in-mediatek-inc-mt6983-mt8871-mt8891-bec6d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32616%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6983%2C%20MT8871%2C%20MT8891&amp;severity=medium&amp;id=682d9839c4522896dcbec6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32615-elevation-of-privilege-in-mediatek-inc-mt6983-mt8871-mt8891-bec6bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32615%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6983%2C%20MT8871%2C%20MT8891&amp;severity=medium&amp;id=682d9839c4522896dcbec6bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32614-elevation-of-privilege-in-mediatek-inc-mt6789-mt6855-mt6879-mt6893-mt6983-mt8168-mt8365-mt8797-mt8798-bec6b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32614%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6789%2C%20MT6855%2C%20MT6879%2C%20MT6893%2C%20MT6983%2C%20MT8168%2C%20MT8365%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9839c4522896dcbec6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32613-elevation-of-privilege-in-mediatek-inc-mt6762-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8168-mt8185-mt8365-mt8696-mt8768-mt8786-mt8789-mt8791-mt8797-mt8798-bec6aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32613%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8185%2C%20MT8365%2C%20MT8696%2C%20MT8768%2C%20MT8786%2C%20MT8789%2C%20MT8791%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9839c4522896dcbec6aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32602-elevation-of-privilege-in-mediatek-inc-mt6833-mt6883-mt6983-mt8183-mt8185-mt8321-mt8385-mt8675-mt8765-mt8766-mt8768-mt8786-mt8789-mt8791-mt8791t-mt8797-bec6a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32602%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6833%2C%20MT6883%2C%20MT6983%2C%20MT8183%2C%20MT8185%2C%20MT8321%2C%20MT8385%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8789%2C%20MT8791%2C%20MT8791T%2C%20MT8797&amp;severity=medium&amp;id=682d9839c4522896dcbec6a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32601-elevation-of-privilege-in-mediatek-inc-mt6739-mt6761-mt6762-mt6763-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8321-mt8385-mt8666-mt8675-mt8765-mt8766-mt8768-mt8786-mt8788-mt8789-mt8795t-mt8797-mt8798-bec67e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32601%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8321%2C%20MT8385%2C%20MT8666%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8795T%2C%20MT8797%2C%20MT8798&amp;severity=high&amp;id=682d9838c4522896dcbec67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30515-n-a-in-n-a-bec676</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30515%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9838c4522896dcbec676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41757-n-a-in-n-a-bec621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41757%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbec621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32612-elevation-of-privilege-in-mediatek-inc-mt6762-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8168-mt8185-mt8365-mt8696-mt8768-mt8786-mt8789-mt8791-mt8797-mt8798-bec619</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32612%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8185%2C%20MT8365%2C%20MT8696%2C%20MT8768%2C%20MT8786%2C%20MT8789%2C%20MT8791%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9838c4522896dcbec619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26446-denial-of-service-in-mediatek-inc-mt2731-mt2735-mt6297-mt6725-mt6739-mt6761-mt6762-mt6762d-mt6762m-mt6763-mt6765-mt6765t-mt6767-mt6768-mt6769-mt6769t-mt6769z-mt6771-mt6779-mt6781-mt6783-mt6785-mt6785t-mt6789-mt6833-mt6853-mt6855-mt6873-mt6875-mt6877-mt6879-mt6880-mt6883-mt6885-mt6889-mt6890-mt6891-mt6893-mt6895-mt6983-mt8385-mt8666-mt8667-mt8675-mt8765-mt8766-mt8768-mt8786-mt8788-mt8789-mt8791-mt8797-bec611</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26446%3A%20Denial%20of%20Service%20in%20MediaTek%2C%20Inc.%20MT2731%2C%20MT2735%2C%20MT6297%2C%20MT6725%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6762D%2C%20MT6762M%2C%20MT6763%2C%20MT6765%2C%20MT6765T%2C%20MT6767%2C%20MT6768%2C%20MT6769%2C%20MT6769T%2C%20MT6769Z%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6783%2C%20MT6785%2C%20MT6785T%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6880%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6890%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8385%2C%20MT8666%2C%20MT8667%2C%20MT8675%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8789%2C%20MT8791%2C%20MT8797&amp;severity=high&amp;id=682d9838c4522896dcbec611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32611-elevation-of-privilege-in-mediatek-inc-mt6879-mt6895-mt6983-bec538</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32611%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6879%2C%20MT6895%2C%20MT6983&amp;severity=medium&amp;id=682d9838c4522896dcbec538</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32610-elevation-of-privilege-in-mediatek-inc-mt6762-mt6768-mt6769-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8168-mt8185-mt8365-mt8696-mt8768-mt8786-mt8789-mt8791-mt8797-mt8798-bec534</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32610%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6768%2C%20MT6769%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8185%2C%20MT8365%2C%20MT8696%2C%20MT8768%2C%20MT8786%2C%20MT8789%2C%20MT8791%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9838c4522896dcbec534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21778-elevation-of-privilege-in-mediatek-inc-mt6771-mt6779-mt6785-mt6853-mt6853t-mt6873-mt6877-mt6885-mt6891-mt6893-mt8168-mt8175-mt8183-mt8365-mt8385-mt8788-bec493</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21778%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6771%2C%20MT6779%2C%20MT6785%2C%20MT6853%2C%20MT6853T%2C%20MT6873%2C%20MT6877%2C%20MT6885%2C%20MT6891%2C%20MT6893%2C%20MT8168%2C%20MT8175%2C%20MT8183%2C%20MT8365%2C%20MT8385%2C%20MT8788&amp;severity=medium&amp;id=682d9838c4522896dcbec493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20446-elevation-of-privilege-in-android-bec48f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20446%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=low&amp;id=682d9838c4522896dcbec48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20445-information-disclosure-in-android-bec480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20445%3A%20Information%20disclosure%20in%20Android&amp;severity=high&amp;id=682d9838c4522896dcbec480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41259-cwe-89-in-sap-se-sap-sql-anywhere-bebdaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41259%3A%20CWE-89%20in%20SAP%20SE%20SAP%20SQL%20Anywhere&amp;severity=medium&amp;id=682d9838c4522896dcbebdaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41212-cwe-22-in-sap-se-sap-netweaver-application-server-abap-and-abap-platform-bebda6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41212%3A%20CWE-22%20in%20SAP%20SE%20SAP%20NetWeaver%20Application%20Server%20ABAP%20and%20ABAP%20Platform&amp;severity=medium&amp;id=682d9838c4522896dcbebda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3821-cwe-193-off-by-one-error-in-systemd-bebd74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3821%3A%20CWE-193%20-%20Off-by-one%20Error%20in%20systemd&amp;severity=medium&amp;id=682d9838c4522896dcbebd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34823-buffer-overflow-in-nec-corporation-clusterpro-x-bebd70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34823%3A%20Buffer%20overflow%20in%20NEC%20Corporation%20CLUSTERPRO%20X&amp;severity=critical&amp;id=682d9838c4522896dcbebd70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34822-path-traversal-in-nec-corporation-clusterpro-x-bebd04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34822%3A%20Path%20traversal%20in%20NEC%20Corporation%20CLUSTERPRO%20X&amp;severity=critical&amp;id=682d9838c4522896dcbebd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32609-elevation-of-privilege-in-mediatek-inc-mt6762-mt6768-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6855-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8168-mt8185-mt8365-mt8696-mt8768-mt8786-mt8789-mt8791-mt8797-mt8798-bebcfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32609%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6762%2C%20MT6768%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6855%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8168%2C%20MT8185%2C%20MT8365%2C%20MT8696%2C%20MT8768%2C%20MT8786%2C%20MT8789%2C%20MT8791%2C%20MT8797%2C%20MT8798&amp;severity=medium&amp;id=682d9838c4522896dcbebcfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32608-elevation-of-privilege-in-mediatek-inc-mt6893-mt6895-bebcf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32608%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6893%2C%20MT6895&amp;severity=medium&amp;id=682d9838c4522896dcbebcf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32607-elevation-of-privilege-in-mediatek-inc-mt6580-mt6739-mt6761-mt6762-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6789-mt6833-mt6853-mt6853t-mt6873-mt6875-mt6877-mt6879-mt6883-mt6885-mt6889-mt6891-mt6893-mt6895-mt6983-mt8167-mt8167s-mt8168-mt8173-mt8175-mt8362a-mt8365-mt8385-mt8666-mt8675-mt8696-mt8765-mt8766-mt8768-mt8786-mt8788-mt8791-mt8791t-mt8795t-mt8797-mt8871-mt8891-bebcee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32607%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6580%2C%20MT6739%2C%20MT6761%2C%20MT6762%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6789%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6879%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT6895%2C%20MT6983%2C%20MT8167%2C%20MT8167S%2C%20MT8168%2C%20MT8173%2C%20MT8175%2C%20MT8362A%2C%20MT8365%2C%20MT8385%2C%20MT8666%2C%20MT8675%2C%20MT8696%2C%20MT8765%2C%20MT8766%2C%20MT8768%2C%20MT8786%2C%20MT8788%2C%20MT8791%2C%20MT8791T%2C%20MT8795T%2C%20MT8797%2C%20MT8871%2C%20MT8891&amp;severity=medium&amp;id=682d9838c4522896dcbebcee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32605-elevation-of-privilege-in-mediatek-inc-mt6879-mt6895-mt6983-bebcea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32605%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6879%2C%20MT6895%2C%20MT6983&amp;severity=medium&amp;id=682d9838c4522896dcbebcea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32603-elevation-of-privilege-in-mediatek-inc-mt6879-mt6893-mt6895-mt6985-mt8795t-mt8798-bebcd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32603%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6879%2C%20MT6893%2C%20MT6895%2C%20MT6985%2C%20MT8795T%2C%20MT8798&amp;severity=medium&amp;id=682d9838c4522896dcbebcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41205-cwe-94-improper-control-of-generation-of-code-code-injection-in-sap-se-sap-gui-for-windows-bebc84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41205%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20SAP%20SE%20SAP%20GUI%20for%20Windows&amp;severity=medium&amp;id=682d9837c4522896dcbebc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41208-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-sap-se-sap-financial-consolidation-bd83d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41208%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20SAP%20SE%20SAP%20Financial%20Consolidation&amp;severity=medium&amp;id=682d9818c4522896dcbd83d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-08-f12831</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44746-cwe-200-in-acronis-acronis-cyber-protect-home-office-bee20c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44746%3A%20CWE-200%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=low&amp;id=682d983bc4522896dcbee20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44745-cwe-532-in-acronis-acronis-cyber-protect-home-office-becbba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44745%3A%20CWE-532%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=medium&amp;id=682d9839c4522896dcbecbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44744-cwe-427-in-acronis-acronis-cyber-protect-home-office-bed84e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44744%3A%20CWE-427%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=low&amp;id=682d983ac4522896dcbed84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44747-cwe-610-in-acronis-acronis-cyber-protect-home-office-bec8e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44747%3A%20CWE-610%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=low&amp;id=682d9839c4522896dcbec8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44733-cwe-269-in-acronis-acronis-cyber-protect-home-office-bec8e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44733%3A%20CWE-269%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=high&amp;id=682d9839c4522896dcbec8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44732-cwe-269-in-acronis-acronis-cyber-protect-home-office-bec8dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44732%3A%20CWE-269%20in%20Acronis%20Acronis%20Cyber%20Protect%20Home%20Office&amp;severity=high&amp;id=682d9839c4522896dcbec8dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2188-cwe-274-privilege-escalation-in-trellix-dxl-broker-bd83cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2188%3A%20cwe-274%3A%20Privilege%20Escalation%20in%20Trellix%20DXL%20Broker&amp;severity=medium&amp;id=682d9818c4522896dcbd83cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-12509-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-s-can-moni-tools-bebc0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-12509%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20s%3A%3Acan%20moni%3A%3Atools&amp;severity=high&amp;id=682d9837c4522896dcbebc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-12508-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-s-can-moni-tools-becbb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-12508%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20s%3A%3Acan%20moni%3A%3Atools&amp;severity=high&amp;id=682d9839c4522896dcbecbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-12507-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-s-can-moni-tools-bec8cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-12507%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20s%3A%3Acan%20moni%3Atools&amp;severity=high&amp;id=682d9839c4522896dcbec8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44797-n-a-in-n-a-bec8c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44797%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44796-n-a-in-n-a-bec8c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44796%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44795-n-a-in-n-a-bec8c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44795%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9839c4522896dcbec8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44794-n-a-in-n-a-bec89c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44794%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbec89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44054-n-a-in-n-a-bec869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44054%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9839c4522896dcbec869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3873-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jgraph-jgraph-drawio-bec814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3873%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jgraph%20jgraph%2Fdrawio&amp;severity=medium&amp;id=682d9839c4522896dcbec814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3558-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-import-and-export-users-and-customers-bec4d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3558%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20Import%20and%20export%20users%20and%20customers&amp;severity=high&amp;id=682d9838c4522896dcbec4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3537-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-role-based-pricing-for-woocommerce-bec4c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3537%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20Role%20Based%20Pricing%20for%20WooCommerce&amp;severity=low&amp;id=682d9838c4522896dcbec4c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3536-cwe-502-deserialization-of-untrusted-data-in-unknown-role-based-pricing-for-woocommerce-bec46c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3536%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Role%20Based%20Pricing%20for%20WooCommerce&amp;severity=low&amp;id=682d9838c4522896dcbec46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3494-cwe-89-sql-injection-in-unknown-complianz-gdpr-ccpa-cookie-consent-bec45f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3494%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Complianz%20%E2%80%93%20GDPR%2FCCPA%20Cookie%20Consent&amp;severity=high&amp;id=682d9838c4522896dcbec45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3489-cwe-862-missing-authorization-in-unknown-wp-hide-bec444</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3489%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Wp-Hide&amp;severity=medium&amp;id=682d9838c4522896dcbec444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3481-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-unknown-woocommerce-dropshipping-bec374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3481%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Unknown%20WooCommerce%20Dropshipping&amp;severity=critical&amp;id=682d9838c4522896dcbec374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3463-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-contact-form-plugin-fastest-contact-form-builder-plugin-for-wordpress-by-fluent-forms-bec2d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3463%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20Contact%20Form%20Plugin%20%E2%80%93%20Fastest%20Contact%20Form%20Builder%20Plugin%20for%20WordPress%20by%20Fluent%20Forms&amp;severity=critical&amp;id=682d9838c4522896dcbec2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3462-cwe-79-cross-site-scripting-xss-in-unknown-highlight-focus-bec2be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3462%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Highlight%20Focus&amp;severity=medium&amp;id=682d9838c4522896dcbec2be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3451-cwe-862-missing-authorization-in-unknown-product-stock-manager-bec298</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3451%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Product%20Stock%20Manager&amp;severity=medium&amp;id=682d9838c4522896dcbec298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3418-cwe-94-improper-control-of-generation-of-code-code-injection-in-unknown-import-any-xml-or-csv-file-to-wordpress-bec290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3418%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20Import%20any%20XML%20or%20CSV%20File%20to%20WordPress&amp;severity=high&amp;id=682d9838c4522896dcbec290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37866-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-ivy-bec288</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37866%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Ivy&amp;severity=high&amp;id=682d9838c4522896dcbec288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38163-n-a-in-n-a-bebc59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38163%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d9837c4522896dcbebc59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37865-allow-create-overwrite-any-file-on-the-syste-in-apache-software-foundation-apache-ivy-bebc46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37865%3A%20allow%20create%2Foverwrite%20any%20file%20on%20the%20syste%20in%20Apache%20Software%20Foundation%20Apache%20Ivy&amp;severity=critical&amp;id=682d9837c4522896dcbebc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42205-n-a-in-n-a-bebc1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42205%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbebc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44793-n-a-in-n-a-bdc384</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44793%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44792-n-a-in-n-a-bdc37c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44792%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc37c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42956-n-a-in-n-a-bdb05e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb05e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42955-n-a-in-n-a-bdb05a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42955%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb05a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43050-n-a-in-n-a-bdb056</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43050%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43049-n-a-in-n-a-bdb052</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43049%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43046-n-a-in-n-a-bdb04e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43046%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42990-n-a-in-n-a-bdb041</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42990%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43304-n-a-in-n-a-bdb01b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43304%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43303-n-a-in-n-a-bdb017</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43303%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43052-n-a-in-n-a-bdb013</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43052%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43051-n-a-in-n-a-bdb00f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43051%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43351-n-a-in-n-a-bdb007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43351%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43350-n-a-in-n-a-bdb003</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43350%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43319-n-a-in-n-a-bdafff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43319%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdafff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43306-n-a-in-n-a-bdaffb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43306%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdaffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43305-n-a-in-n-a-bdafe4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43305%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44053-n-a-in-n-a-bdafcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44053%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44052-n-a-in-n-a-bdafcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44052%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44051-n-a-in-n-a-bdafc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44051%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44050-n-a-in-n-a-bdafc1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44050%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44049-n-a-in-n-a-bdafbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44049%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44048-n-a-in-n-a-bdafb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44048%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdafb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43359-n-a-in-n-a-bdafa8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43359%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdafa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43352-n-a-in-n-a-bdaf8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43352%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdaf8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3872-cwe-193-in-qemu-bdad70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3872%3A%20CWE-193%20in%20QEMU&amp;severity=high&amp;id=682d981dc4522896dcbdad70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2711-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-import-any-xml-or-csv-file-to-wordpress-bdad57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2711%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Import%20any%20XML%20or%20CSV%20File%20to%20WordPress&amp;severity=high&amp;id=682d981dc4522896dcbdad57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2387-cwe-352-cross-site-request-forgery-csrf-in-unknown-easy-digital-downloads-simple-ecommerce-for-selling-digital-files-bdad42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2387%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Easy%20Digital%20Downloads%20%E2%80%93%20Simple%20eCommerce%20for%20Selling%20Digital%20Files&amp;severity=medium&amp;id=682d981dc4522896dcbdad42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-07-f12f58</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44544-n-a-in-n-a-bebcc0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44544%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9838c4522896dcbebcc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42919-n-a-in-n-a-bebcb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42919%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbebcb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42905-n-a-in-n-a-bebcb0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9838c4522896dcbebcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42707-n-a-in-n-a-bebbfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42707%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebbfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40284-n-a-in-n-a-bebbf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40284%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebbf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37710-n-a-in-n-a-bebbb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37710%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebbb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-06-f120fb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f120fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3869-cwe-94-improper-control-of-generation-of-code-in-froxlor-froxlor-froxlor-bdad5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3869%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20froxlor%20froxlor%2Ffroxlor&amp;severity=medium&amp;id=682d981dc4522896dcbdad5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-05-f256a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-05&amp;severity=medium&amp;id=682acdc4bbaf20d303f256a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-05-f12e26</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43572-cwe-400-in-splunk-splunk-enterprise-bec378</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43572%3A%20CWE-400%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d9838c4522896dcbec378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43570-cwe-611-improper-restriction-of-xml-external-entity-reference-in-splunk-splunk-enterprise-bdad78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43570%3A%20CWE-611%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d981dc4522896dcbdad78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43569-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-splunk-splunk-enterprise-bed741</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43569%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d983ac4522896dcbed741</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43568-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-splunk-splunk-enterprise-bec3a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43568%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(Cross-site%20Scripting)%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d9838c4522896dcbec3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43567-cwe-502-deserialization-of-untrusted-data-in-splunk-splunk-enterprise-bdad38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43567%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d981dc4522896dcbdad38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43566-cwe-20-improper-input-validation-in-splunk-splunk-enterprise-bdad30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43566%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d981dc4522896dcbdad30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43565-cwe-20-improper-input-validation-in-splunk-splunk-enterprise-bdad21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43565%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d981dc4522896dcbdad21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43564-cwe-400-uncontrolled-resource-consumption-in-splunk-splunk-enterprise-bec337</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43564%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=682d9838c4522896dcbec337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43563-cwe-20-improper-input-validation-in-splunk-splunk-enterprise-bdad19</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43563%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d981cc4522896dcbdad19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43562-cwe-20-improper-input-validation-in-splunk-splunk-enterprise-bdad0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43562%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Splunk%20Splunk%20Enterprise&amp;severity=low&amp;id=682d981cc4522896dcbdad0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38656-n-a-in-hcl-software-hcl-commerce-bebc63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38656%3A%20n%2Fa%20in%20HCL%20Software%20HCL%20Commerce&amp;severity=high&amp;id=682d9837c4522896dcbebc63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38661-n-a-in-hcl-software-hcl-workload-automation-bebc76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38661%3A%20n%2Fa%20in%20HCL%20Software%20HCL%20Workload%20Automation&amp;severity=medium&amp;id=682d9837c4522896dcbebc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38654-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-hcl-software-hcl-domino-bebc5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38654%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20HCL%20Software%20HCL%20Domino&amp;severity=medium&amp;id=682d9837c4522896dcbebc5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38660-cwe-352-cross-site-request-forgery-csrf-in-hcl-software-hcl-domino-bebc72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38660%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20HCL%20Software%20HCL%20Domino&amp;severity=high&amp;id=682d9837c4522896dcbebc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40263-cwe-798-use-of-hard-coded-credentials-in-becton-dickson-bd-bd-totalys-multiprocessor-bed6ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40263%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Becton%20Dickson%20(BD)%20BD%20Totalys%20MultiProcessor&amp;severity=medium&amp;id=682d983ac4522896dcbed6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27894-cwe-79-cross-site-scripting-xss-in-palantir-foundry-blobster-service-bebc3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27894%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Palantir%20Foundry%20Blobster%20Service&amp;severity=medium&amp;id=682d9837c4522896dcbebc3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27893-cwe-532-information-exposure-through-log-files-in-palantir-foundry-magritte-plugin-osisoft-pi-web-connector-bebc21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27893%3A%20CWE-532%20Information%20Exposure%20Through%20Log%20Files%20in%20Palantir%20Foundry%20Magritte%20plugin%20osisoft-pi-web-connector&amp;severity=medium&amp;id=682d9837c4522896dcbebc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39344-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-azure-rtos-usbx-bf6c71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39344%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20azure-rtos%20usbx&amp;severity=medium&amp;id=682d9849c4522896dcbf6c71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39387-cwe-287-improper-authentication-in-xwiki-contrib-oidc-bf4a07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39387%3A%20CWE-287%3A%20Improper%20Authentication%20in%20xwiki-contrib%20oidc&amp;severity=medium&amp;id=682d9846c4522896dcbf4a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39384-cwe-665-improper-initialization-in-openzeppelin-openzeppelin-contracts-bf49ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39384%3A%20CWE-665%3A%20Improper%20Initialization%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9846c4522896dcbf49ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3340-improper-restriction-of-xml-external-entity-reference-cwe-611-in-trellix-trellix-ips-manager-bee0c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3340%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(CWE-611)%20in%20Trellix%20Trellix%20IPS%20Manager&amp;severity=medium&amp;id=682d983bc4522896dcbee0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41670-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-schneider-electric-ecostruxure-operator-terminal-expert-bed6ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41670%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EcoStruxure%20Operator%20Terminal%20Expert&amp;severity=high&amp;id=682d983ac4522896dcbed6ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43945-cwe-131-incorrect-calculation-of-buffer-size-in-linux-linux-kernel-bec5d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43945%3A%20CWE-131%3A%20Incorrect%20Calculation%20of%20Buffer%20Size%20in%20linux%20linux_kernel&amp;severity=high&amp;id=682d9838c4522896dcbec5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41671-cwe-89-sql-injection-in-schneider-electric-ecostruxure-operator-terminal-expert-bec5a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41671%3A%20CWE-89%20SQL%20Injection%20in%20Schneider%20Electric%20EcoStruxure%20Operator%20Terminal%20Expert&amp;severity=high&amp;id=682d9838c4522896dcbec5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3023-cwe-134-use-of-externally-controlled-format-string-in-pingcap-pingcap-tidb-bec140</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3023%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20pingcap%20pingcap%2Ftidb&amp;severity=medium&amp;id=682d9838c4522896dcbec140</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41668-cwe-704-incorrect-type-conversion-or-cast-in-schneider-electric-ecostruxure-operator-terminal-expert-bebd38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41668%3A%20CWE-704%20Incorrect%20Type%20Conversion%20or%20Cast%20in%20Schneider%20Electric%20EcoStruxure%20Operator%20Terminal%20Expert&amp;severity=high&amp;id=682d9838c4522896dcbebd38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41667-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-schneider-electric-ecostruxure-operator-terminal-expert-bebd30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41667%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Schneider%20Electric%20EcoStruxure%20Operator%20Terminal%20Expert&amp;severity=high&amp;id=682d9838c4522896dcbebd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41666-cwe-347-improper-verification-of-cryptographic-signature-in-schneider-electric-ecostruxure-operator-terminal-expert-bebd28</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41666%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Schneider%20Electric%20EcoStruxure%20Operator%20Terminal%20Expert&amp;severity=high&amp;id=682d9838c4522896dcbebd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41669-cwe-347-improper-verification-of-cryptographic-signature-in-schneider-electric-ecostruxure-operator-terminal-expert-bebc8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41669%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Schneider%20Electric%20EcoStruxure%20Operator%20Terminal%20Expert&amp;severity=high&amp;id=682d9837c4522896dcbebc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44724-n-a-in-n-a-bebc00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44724%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebc00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3721-cwe-94-improper-control-of-generation-of-code-in-froxlor-froxlor-froxlor-bebbe9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3721%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20froxlor%20froxlor%2Ffroxlor&amp;severity=high&amp;id=682d9837c4522896dcbebbe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38582-n-a-in-n-a-bebb6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38582%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbebb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33684-cwe-295-improper-certificate-validation-in-apache-software-foundation-apache-pulsar-bebb2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33684%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Pulsar&amp;severity=high&amp;id=682d9837c4522896dcbebb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31691-potential-remote-code-execution-in-spring-by-vmware-bebb27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31691%3A%20Potential%20Remote%20Code%20Execution%20in%20Spring%20by%20VMware&amp;severity=critical&amp;id=682d9837c4522896dcbebb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39473-n-a-in-n-a-bebae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39473%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbebae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39432-n-a-in-n-a-bebadc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39432%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbebadc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34055-n-a-in-n-a-bebad4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34055%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-04-f12b59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43571-cwe-94-improper-control-of-generation-of-code-code-injection-in-splunk-splunk-enterprise-bebd47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43571%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(Code%20Injection)%20in%20Splunk%20Splunk%20Enterprise&amp;severity=high&amp;id=682d9838c4522896dcbebd47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43561-cwe-79-improper-neutralization-of-input-during-web-page-generation-in-splunk-splunk-enterprise-befef5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43561%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20in%20Splunk%20Splunk%20Enterprise&amp;severity=medium&amp;id=682d983ec4522896dcbefef5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37911-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbe1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37911%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=low&amp;id=682d9837c4522896dcbebbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37910-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37910%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37909-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37909%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37908-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37908%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37907-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbc0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37907%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44862-cwe-532-insertion-of-sensitive-information-into-log-file-in-netskope-nsclient-bebb9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44862%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Netskope%20NSClient&amp;severity=high&amp;id=682d9837c4522896dcbebb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37906-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbbc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37906%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37905-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebbb8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37905%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43495-cwe-476-null-pointer-dereference-in-openharmony-openharmony-bee115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43495%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=682d983bc4522896dcbee115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43449-cwe-20-improper-input-validation-in-openharmony-openharmony-bebb97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43449%3A%20CWE-20%20Improper%20Input%20Validation%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=682d9837c4522896dcbebb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37904-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebb67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37904%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=medium&amp;id=682d9837c4522896dcbebb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37903-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bec031</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37903%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9838c4522896dcbec031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37912-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bec035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37912%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9838c4522896dcbec035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37902-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bec133</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37902%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9838c4522896dcbec133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37901-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebb5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37901%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9837c4522896dcbebb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37900-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-becb69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37900%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9839c4522896dcbecb69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37899-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebb57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37899%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9837c4522896dcbebb57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37898-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebb48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37898%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=high&amp;id=682d9837c4522896dcbebb48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37897-n-a-in-hewlett-packard-enterprise-aruba-mobility-conductor-formerly-mobility-master-aruba-mobility-controllers-wlan-gateways-and-sd-wan-gateways-managed-by-aruba-central-bebb39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37897%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20Aruba%20Mobility%20Conductor%20(formerly%20Mobility%20Master)%3B%20Aruba%20Mobility%20Controllers%3B%20WLAN%20Gateways%20and%20SD-WAN%20Gateways%20managed%20by%20Aruba%20Central&amp;severity=critical&amp;id=682d9837c4522896dcbebb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3258-cwe-732-incorrect-permission-assignment-for-critical-resource-in-hypr-workforce-access-bec720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3258%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20HYPR%20Workforce%20Access&amp;severity=low&amp;id=682d9839c4522896dcbec720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3675-cwe-20-improper-input-validation-in-fedora-project-coreos-bebb77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3675%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Fedora%20Project%20CoreOS&amp;severity=low&amp;id=682d9837c4522896dcbebb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46846-n-a-in-hewlett-packard-enterprise-hpe-hpe-integrated-lights-out-5-beba6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46846%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Integrated%20Lights-Out%205&amp;severity=medium&amp;id=682d9837c4522896dcbeba6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37928-n-a-in-hewlett-packard-enterprise-hpe-hpe-nimble-storage-hybrid-flash-arrays-nimble-storage-secondary-flash-arrays-beba73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37928%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Nimble%20Storage%20Hybrid%20Flash%20Arrays%3B%20Nimble%20Storage%20Secondary%20Flash%20Arrays&amp;severity=high&amp;id=682d9837c4522896dcbeba73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37930-n-a-in-hewlett-packard-enterprise-hpe-hpe-nimble-storage-hybrid-flash-arrays-nimble-storage-secondary-flash-arrays-beba84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37930%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Nimble%20Storage%20Hybrid%20Flash%20Arrays%3B%20Nimble%20Storage%20Secondary%20Flash%20Arrays&amp;severity=medium&amp;id=682d9837c4522896dcbeba84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37929-n-a-in-hewlett-packard-enterprise-hpe-hpe-nimble-storage-hybrid-flash-arrays-nimble-storage-secondary-flash-arrays-beba77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37929%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20Nimble%20Storage%20Hybrid%20Flash%20Arrays%3B%20Nimble%20Storage%20Secondary%20Flash%20Arrays&amp;severity=medium&amp;id=682d9837c4522896dcbeba77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37927-n-a-in-hewlett-packard-enterprise-hpe-hpe-oneview-global-dashboard-ovgd-bec9ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37927%3A%20n%2Fa%20in%20Hewlett%20Packard%20Enterprise%20(HPE)%20HPE%20OneView%20Global%20Dashboard%20(OVGD)&amp;severity=medium&amp;id=682d9839c4522896dcbec9ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39382-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-keystonejs-keystone-bf6c8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39382%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20keystonejs%20keystone&amp;severity=medium&amp;id=682d9849c4522896dcbf6c8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39277-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf6c58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39277%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9849c4522896dcbf6c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39276-cwe-918-server-side-request-forgery-ssrf-in-glpi-project-glpi-bf6c45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39276%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9849c4522896dcbf6c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39262-cwe-83-improper-neutralization-of-script-in-attributes-in-a-web-page-in-glpi-project-glpi-bf6c41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39262%3A%20CWE-83%3A%20Improper%20Neutralization%20of%20Script%20in%20Attributes%20in%20a%20Web%20Page%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9849c4522896dcbf6c41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39376-cwe-20-improper-input-validation-in-glpi-project-glpi-bf49b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39376%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf49b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39375-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf49b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39375%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf49b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39373-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf49ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39373%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf49ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39372-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf49a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39372%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf49a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39371-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-glpi-project-glpi-bf499d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39371%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf499d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39370-cwe-284-improper-access-control-in-glpi-project-glpi-bf4999</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39370%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf4999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39323-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-bf489f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39323%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9846c4522896dcbf489f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39234-cwe-613-insufficient-session-expiration-in-glpi-project-glpi-bf4815</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39234%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9845c4522896dcbf4815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44623-cwe-538-file-and-directory-information-exposure-in-jetbrains-teamcity-bed8f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44623%3A%20CWE-538%20File%20and%20Directory%20Information%20Exposure%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d983ac4522896dcbed8f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39077-cwe-319-cleartext-transmission-of-sensitive-information-in-ibm-security-guardium-bec2d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39077%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20IBM%20Security%20Guardium&amp;severity=medium&amp;id=682d9838c4522896dcbec2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44622-cwe-284-improper-access-control-in-jetbrains-teamcity-bec11a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44622%3A%20CWE-284%20Improper%20Access%20Control%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=682d9838c4522896dcbec11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44638-n-a-in-n-a-bebac4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44638%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbebac4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43574-gain-access-in-ibm-robotic-process-automation-bebabe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43574%3A%20Gain%20Access%20in%20IBM%20Robotic%20Process%20Automation&amp;severity=high&amp;id=682d9837c4522896dcbebabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43107-n-a-in-n-a-bebaad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43107%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9837c4522896dcbebaad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43106-n-a-in-n-a-bebaa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43106%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9837c4522896dcbebaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44646-cwe-223-omission-of-security-relevant-information-in-jetbrains-teamcity-beba8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44646%3A%20CWE-223%3A%20Omission%20of%20Security-relevant%20Information%20in%20JetBrains%20TeamCity&amp;severity=low&amp;id=682d9837c4522896dcbeba8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44624-cwe-532-information-exposure-through-log-files-in-jetbrains-teamcity-beba88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44624%3A%20CWE-532%20Information%20Exposure%20Through%20Log%20Files%20in%20JetBrains%20TeamCity&amp;severity=medium&amp;id=682d9837c4522896dcbeba88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43101-n-a-in-n-a-beba6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9837c4522896dcbeba6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40276-insecure-or-unset-http-headers-content-security-policy-in-zettlr-beb985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40276%3A%20Insecure%20or%20unset%20HTTP%20headers%20-%20Content-Security-Policy%20in%20Zettlr&amp;severity=medium&amp;id=682d9837c4522896dcbeb985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40235-denial-of-service-in-ibm-infosphere-information-server-beb97f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40235%3A%20Denial%20of%20Service%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9837c4522896dcbeb97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40230-session-fixation-in-ibm-mq-appliance-beb97b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40230%3A%20Session%20Fixation%20in%20IBM%20MQ%20Appliance&amp;severity=medium&amp;id=682d9837c4522896dcbeb97b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38712-command-execution-in-ibm-websphere-application-server-beb977</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38712%3A%20Command%20Execution%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682d9837c4522896dcbeb977</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38168-n-a-in-n-a-beb92d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38168%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9837c4522896dcbeb92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35717-command-execution-in-ibm-infosphere-information-server-beb929</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35717%3A%20Command%20Execution%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=682d9837c4522896dcbeb929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35642-cross-site-scripting-in-ibm-infosphere-information-server-beb925</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35642%3A%20Cross-Site%20Scripting%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d9837c4522896dcbeb925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35279-information-disclosure-in-ibm-business-automation-workflow-beb901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35279%3A%20Information%20Disclosure%20in%20IBM%20Business%20Automation%20Workflow&amp;severity=medium&amp;id=682d9837c4522896dcbeb901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34339-information-disclosure-in-ibm-cognos-analytics-beb8fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34339%3A%20Information%20Disclosure%20in%20IBM%20Cognos%20Analytics&amp;severity=medium&amp;id=682d9837c4522896dcbeb8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32287-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-uima-beb8f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32287%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20UIMA&amp;severity=high&amp;id=682d9837c4522896dcbeb8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43372-n-a-in-n-a-bdcc4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43372%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43109-n-a-in-n-a-bdcc44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43109%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcc44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43108-n-a-in-n-a-bdcc3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43108%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcc3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43105-n-a-in-n-a-bdcc27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43105%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcc27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43104-n-a-in-n-a-bdcc23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43104%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcc23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43103-n-a-in-n-a-bdcc1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43103%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcc1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43102-n-a-in-n-a-bdcc1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcc1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43063-n-a-in-n-a-bdcc17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43063%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdcc17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43062-n-a-in-n-a-bdcc13</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43062%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdcc13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43061-n-a-in-n-a-bdcc0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdcc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42744-sql-injection-in-candidats-bdcc0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42744%3A%20SQL%20injection%20in%20CandidATS&amp;severity=critical&amp;id=682d981fc4522896dcbdcc0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42753-reflected-cross-site-scripting-xss-in-salonerp-bdcbd8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42753%3A%20Reflected%20cross-site%20scripting%20(XSS)%20in%20SalonERP&amp;severity=medium&amp;id=682d981fc4522896dcbdcbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42751-cross-site-request-forgery-csrf-in-candidats-bdcbd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42751%3A%20Cross-site%20request%20forgery%20(CSRF)%20in%20CandidATS&amp;severity=high&amp;id=682d981fc4522896dcbdcbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42750-stored-cross-site-scripting-xss-in-candidats-bdcbd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42750%3A%20Stored%20cross-site%20scripting%20(XSS)%20in%20CandidATS&amp;severity=high&amp;id=682d981fc4522896dcbdcbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42749-reflected-cross-site-scripting-xss-in-candidats-bdcbcc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42749%3A%20Reflected%20cross-site%20scripting%20(XSS)%20in%20CandidATS&amp;severity=medium&amp;id=682d981fc4522896dcbdcbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42748-reflected-cross-site-scripting-xss-in-candidats-bdcbc8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42748%3A%20Reflected%20cross-site%20scripting%20(XSS)%20in%20CandidATS&amp;severity=medium&amp;id=682d981fc4522896dcbdcbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42747-reflected-cross-site-scripting-xss-in-candidats-bdcbc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42747%3A%20Reflected%20cross-site%20scripting%20(XSS)%20in%20CandidATS&amp;severity=medium&amp;id=682d981fc4522896dcbdcbc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42743-prototype-pollution-in-deep-parse-json-bdcbbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42743%3A%20Prototype%20Pollution%20in%20deep-parse-json&amp;severity=medium&amp;id=682d981fc4522896dcbdcbbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42746-reflected-cross-site-scripting-xss-in-candidats-bdcb9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42746%3A%20Reflected%20cross-site%20scripting%20(XSS)%20in%20CandidATS&amp;severity=medium&amp;id=682d981fc4522896dcbdcb9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42442-information-disclosure-in-ibm-robotic-process-automation-for-cloud-pak-bdcb9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42442%3A%20Information%20Disclosure%20in%20IBM%20Robotic%20Process%20Automation%20for%20Cloud%20Pak&amp;severity=low&amp;id=682d981fc4522896dcbdcb9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41714-prototype-pollution-in-fastest-json-copy-bdcb97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41714%3A%20Prototype%20Pollution%20in%20fastest-json-copy&amp;severity=medium&amp;id=682d981fc4522896dcbdcb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41713-prototype-pollution-in-deep-object-diff-bdcb86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41713%3A%20Prototype%20Pollution%20in%20deep-object-diff&amp;severity=medium&amp;id=682d981fc4522896dcbdcb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41710-insecure-or-unset-http-headers-content-security-policy-in-markdownify-bdcb7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41710%3A%20Insecure%20or%20unset%20HTTP%20headers%20-%20Content-Security-Policy%20in%20Markdownify&amp;severity=medium&amp;id=682d981fc4522896dcbdcb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41435-n-a-in-n-a-bdcb76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41435%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40747-xml-external-entity-injection-in-ibm-infosphere-information-server-bdcb67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40747%3A%20XML%20External%20Entity%20Injection%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=critical&amp;id=682d981fc4522896dcbdcb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30615-cross-site-scripting-in-ibm-infosphere-information-server-bdcb5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30615%3A%20Cross-Site%20Scripting%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d981fc4522896dcbdcb5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30608-cross-site-request-forgery-in-ibm-infosphere-information-server-bdcb40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30608%3A%20Cross-Site%20Request%20Forgery%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=high&amp;id=682d981fc4522896dcbdcb40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22442-information-disclosure-in-ibm-infosphere-information-server-bdcb2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22442%3A%20Information%20Disclosure%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682d981fc4522896dcbdcb2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22425-csv-injection-in-ibm-infosphere-information-server-bdcb2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22425%3A%20CSV%20Injection%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=critical&amp;id=682d981fc4522896dcbdcb2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46853-n-a-in-n-a-bdcb27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46853%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcb27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37823-n-a-in-n-a-bdcb23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37823%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-22820-n-a-in-n-a-bdcb1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-22820%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-22819-n-a-in-n-a-bdcb1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-22819%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcb1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-22818-n-a-in-n-a-bdcb17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-22818%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdcb17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-03-f12918</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12918</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24942-cwe-122-heap-based-buffer-overflow-in-silabs-com-gecko-platform-bdcb3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24942%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20silabs.com%20Gecko%20Platform&amp;severity=critical&amp;id=682d981fc4522896dcbdcb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24936-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-silabs-com-gecko-bootloader-bebee6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24936%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20silabs.com%20Gecko%20Bootloader&amp;severity=high&amp;id=682d9838c4522896dcbebee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3575-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-frauscher-sensortechnik-diagnostic-system-fds102-bdcb44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3575%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Frauscher%20Sensortechnik%20Diagnostic%20System%20FDS102&amp;severity=critical&amp;id=682d981fc4522896dcbdcb44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45448-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-hitachi-vantara-pentaho-business-analytics-server-bebf38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45448%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Hitachi%20Vantara%20Pentaho%20Business%20Analytics%20Server&amp;severity=high&amp;id=682d9838c4522896dcbebf38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45447-cwe-319-cleartext-transmission-of-sensitive-information-in-hitachi-vantara-pentaho-business-analytics-server-beb89c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45447%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Hitachi%20Vantara%20Pentaho%20Business%20Analytics%20Server&amp;severity=high&amp;id=682d9837c4522896dcbeb89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45446-cwe-548-in-hitachi-vantara-pentaho-business-analytics-server-bebf20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45446%3A%20CWE-548%20in%20Hitachi%20Vantara%20Pentaho%20Business%20Analytics%20Server&amp;severity=medium&amp;id=682d9838c4522896dcbebf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39381-cwe-690-unchecked-return-value-to-null-pointer-dereference-in-julianhille-muhammarajs-bf6c86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39381%3A%20CWE-690%3A%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20julianhille%20MuhammaraJS&amp;severity=medium&amp;id=682d9849c4522896dcbf6c86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39353-cwe-20-improper-input-validation-in-xmldom-xmldom-bf6a79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39353%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20xmldom%20xmldom&amp;severity=medium&amp;id=682d9849c4522896dcbf6a79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39379-cwe-502-deserialization-of-untrusted-data-in-fluent-fluentd-bf49d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39379%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20fluent%20fluentd&amp;severity=medium&amp;id=682d9846c4522896dcbf49d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39378-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf49cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39378%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf49cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39356-cwe-285-improper-authorization-in-discourse-discourse-bf4957</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39356%3A%20CWE-285%3A%20Improper%20Authorization%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9846c4522896dcbf4957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39241-cwe-918-server-side-request-forgery-ssrf-in-discourse-discourse-bf4819</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39241%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9845c4522896dcbf4819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43227-n-a-in-n-a-bebf05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43227%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9838c4522896dcbebf05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2904-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-in-gitlab-gitlab-bebbb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2904%3A%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682d9837c4522896dcbebbb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43985-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-apache-software-foundation-apache-airflow-beb939</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43985%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=682d9837c4522896dcbeb939</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43982-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apache-software-foundation-apache-airflow-beb935</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43982%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=682d9837c4522896dcbeb935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43670-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apache-software-foundation-apache-sling-app-cms-beb931</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43670%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Sling%20App%20CMS&amp;severity=medium&amp;id=682d9837c4522896dcbeb931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43255-n-a-in-n-a-beb8f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43255%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43254-n-a-in-n-a-beb8f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43254%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43253-n-a-in-n-a-beb8e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43253%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43252-n-a-in-n-a-beb8da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43252%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43250-n-a-in-n-a-beb8d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43250%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43249-n-a-in-n-a-beb8cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43249%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43248-n-a-in-n-a-beb8c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43248%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43238-n-a-in-n-a-beb8a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43238%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43237-n-a-in-n-a-beb898</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43237%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43236-n-a-in-n-a-beb894</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43235-n-a-in-n-a-beb883</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43226-n-a-in-n-a-beb87d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43226%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb87d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43068-n-a-in-n-a-beb879</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43068%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43066-n-a-in-n-a-beb875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43066%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41551-n-a-in-n-a-beb864</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41551%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb864</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40840-n-a-in-n-a-beb85c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40840%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9837c4522896dcbeb85c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37789-n-a-in-n-a-beb835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37789%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43995-n-a-in-n-a-bdcaf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43995%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdcaf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43245-n-a-in-n-a-bdcaed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43245%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcaed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43244-n-a-in-n-a-bdcae7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43244%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcae7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43243-n-a-in-n-a-bdcadb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43243%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcadb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43242-n-a-in-n-a-bdcad7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43242%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcad7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43239-n-a-in-n-a-bdcab3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43239%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdcab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43241-n-a-in-n-a-bdc9d4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43241%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc9d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43240-n-a-in-n-a-bdc9d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43240%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-02-f12016</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f12016</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3781-cwe-311-missing-encryption-of-sensitive-data-in-devolutions-remote-desktop-manager-bdcaa7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3781%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=medium&amp;id=682d981fc4522896dcbdcaa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3780-cwe-284-improper-access-control-in-devolutions-remote-desktop-manager-bdcaa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3780%3A%20CWE-284%20Improper%20Access%20Control%20in%20Devolutions%20Remote%20Desktop%20Manager&amp;severity=high&amp;id=682d981fc4522896dcbdcaa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3509-n-a-in-google-protocolbuffers-bf71bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3509%3A%20n%2Fa%20in%20Google%20ProtocolBuffers&amp;severity=medium&amp;id=682d984ac4522896dcbf71bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-4099-cwe-326-inadequate-encryption-strength-in-hcl-software-hcl-verse-for-android-bebeee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-4099%3A%20CWE-326%20Inadequate%20Encryption%20Strength%20in%20HCL%20Software%20HCL%20Verse%20for%20Android&amp;severity=medium&amp;id=682d9838c4522896dcbebeee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3369-cwe-269-improper-privilege-management-in-bitdefender-engines-bebeea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3369%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Bitdefender%20Engines&amp;severity=high&amp;id=682d9838c4522896dcbebeea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25885-denial-of-service-dos-in-muhammara-bdca8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25885%3A%20Denial%20of%20Service%20(DoS)%20in%20muhammara&amp;severity=high&amp;id=682d981fc4522896dcbdca8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41553-cwe-532-insertion-of-sensitive-information-into-log-file-in-hitachi-hitachi-infrastructure-analytics-advisor-bdcaab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41553%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=medium&amp;id=682d981fc4522896dcbdcaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41552-cwe-918-server-side-request-forgery-ssrf-in-hitachi-hitachi-infrastructure-analytics-advisor-bec388</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41552%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=critical&amp;id=682d9838c4522896dcbec388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3191-cwe-532-insertion-of-sensitive-information-into-log-file-in-hitachi-hitachi-ops-center-analyzer-bebc7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3191%3A%20CWE-532%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Hitachi%20Hitachi%20Ops%20Center%20Analyzer&amp;severity=medium&amp;id=682d9837c4522896dcbebc7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36605-cwe-276-incorrect-default-permissions-in-hitachi-hitachi-infrastructure-analytics-advisor-bdca79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36605%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20Hitachi%20Hitachi%20Infrastructure%20Analytics%20Advisor&amp;severity=medium&amp;id=682d981fc4522896dcbdca79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42825-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-bf7c36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42825%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42824-processing-maliciously-crafted-web-content-may-disclose-sensitive-user-information-in-apple-macos-bf7c2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42824%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42823-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bf7bee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42823%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984bc4522896dcbf7bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42832-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7b34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42832%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42831-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7b1f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42831%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42830-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7b0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42830%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984bc4522896dcbf7b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42829-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf791f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42829%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf791f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42820-an-app-may-cause-unexpected-app-termination-or-arbitrary-code-execution-in-apple-macos-bf7901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42820%3A%20An%20app%20may%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf7901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42819-an-app-may-be-able-to-read-sensitive-location-information-in-apple-macos-bf78fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42819%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf78fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42818-a-user-in-a-privileged-network-position-may-be-able-to-track-user-activity-in-apple-macos-bf78f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42818%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20track%20user%20activity%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf78f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42817-visiting-a-maliciously-crafted-website-may-leak-sensitive-data-in-apple-ios-and-ipados-bf78f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42817%3A%20Visiting%20a%20maliciously%20crafted%20website%20may%20leak%20sensitive%20data%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d984ac4522896dcbf78f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42815-an-app-may-be-able-to-access-user-sensitive-data-in-apple-macos-bf78f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42815%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf78f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42814-an-app-may-be-able-to-access-user-sensitive-data-in-apple-macos-bf75cc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42814%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf75cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42813-processing-a-maliciously-crafted-certificate-may-lead-to-arbitrary-code-execution-in-apple-macos-bf758c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42813%3A%20Processing%20a%20maliciously%20crafted%20certificate%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d984ac4522896dcbf758c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42811-an-app-may-be-able-to-access-user-sensitive-data-in-apple-macos-bf7514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42811%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf7514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42810-processing-a-maliciously-crafted-usd-file-may-disclose-memory-contents-in-apple-macos-bf750c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42810%3A%20Processing%20a%20maliciously%20crafted%20USD%20file%20may%20disclose%20memory%20contents%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf750c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42809-processing-a-maliciously-crafted-gcx-file-may-lead-to-unexpected-app-termination-or-arbitrary-code-execution-in-apple-macos-bf744e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42809%3A%20Processing%20a%20maliciously%20crafted%20gcx%20file%20may%20lead%20to%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf744e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42808-a-remote-user-may-be-able-to-cause-kernel-code-execution-in-apple-macos-bf73a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42808%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20kernel%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d984ac4522896dcbf73a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42806-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf72de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42806%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf72de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42803-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf72d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42803%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf72d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42801-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bf7271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42801%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf7271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42800-a-user-may-be-able-to-cause-unexpected-app-termination-or-arbitrary-code-execution-in-apple-macos-bf71ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42800%3A%20A%20user%20may%20be%20able%20to%20cause%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf71ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42796-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-bf7162</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42796%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf7162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42795-processing-a-maliciously-crafted-image-may-lead-to-arbitrary-code-execution-in-apple-macos-bf715e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42795%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d984ac4522896dcbf715e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42793-an-app-may-be-able-to-bypass-code-signing-checks-in-apple-macos-bf715a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42793%3A%20An%20app%20may%20be%20able%20to%20bypass%20code%20signing%20checks%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d984ac4522896dcbf715a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39369-cwe-99-improper-control-of-resource-identifiers-resource-injection-in-apereo-phpcas-bf4995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39369%3A%20CWE-99%3A%20Improper%20Control%20of%20Resource%20Identifiers%20(&apos;Resource%20Injection&apos;)%20in%20apereo%20phpCAS&amp;severity=medium&amp;id=682d9846c4522896dcbf4995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27585-cwe-306-in-sick-sim1000-fx-bebb1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27585%3A%20CWE-306%20in%20SICK%20SIM1000%20FX&amp;severity=critical&amp;id=682d9837c4522896dcbebb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43355-n-a-in-n-a-beb83b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43355%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb83b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43354-n-a-in-n-a-beb837</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43353-n-a-in-n-a-beb831</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43353%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43331-n-a-in-n-a-beb824</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43331%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43330-n-a-in-n-a-beb820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43330%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43329-n-a-in-n-a-beb81c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43329%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb81c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43328-n-a-in-n-a-beb80f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43328%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43223-n-a-in-n-a-beb80b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43223%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43222-n-a-in-n-a-beb807</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43222%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43221-n-a-in-n-a-beb7e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9837c4522896dcbeb7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44542-n-a-in-n-a-bdca6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44542%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981fc4522896dcbdca6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43990-cwe-306-in-sick-sim1012-bdca69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43990%3A%20CWE-306%20in%20SICK%20SIM1012&amp;severity=high&amp;id=682d981fc4522896dcbdca69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43989-cwe-306-in-sick-sim2x00-arm-bdca65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43989%3A%20CWE-306%20in%20SICK%20SIM2x00%20(ARM)&amp;severity=high&amp;id=682d981fc4522896dcbdca65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43362-n-a-in-n-a-bdca37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43362%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdca37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43361-n-a-in-n-a-bdca33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43361%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdca33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43127-n-a-in-n-a-bdca2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43127%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdca2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43083-n-a-in-n-a-bdca2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43083%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdca2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43082-n-a-in-n-a-bdca27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43082%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdca27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43081-n-a-in-n-a-bdca23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43081%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdca23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32888-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bdc87b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32888%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc87b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42326-unknown-in-xen-xen-bdc858</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42326%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981fc4522896dcbdc858</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3373-out-of-bounds-write-in-google-chrome-bdc854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3373%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981fc4522896dcbdc854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43126-n-a-in-n-a-bdc69e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43126%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43125-n-a-in-n-a-bdc68d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43125%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc68d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43124-n-a-in-n-a-bdc4fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43124%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43086-n-a-in-n-a-bdc4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43086%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43085-n-a-in-n-a-bdc4f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43085%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc4f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43084-n-a-in-n-a-bdc374</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43084%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc374</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43079-n-a-in-n-a-bdc36e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43079%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43078-n-a-in-n-a-bdc36a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43078%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43076-n-a-in-n-a-bdc34e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43076%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3786-buffer-overflow-in-openssl-openssl-bdc339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3786%3A%20Buffer%20overflow%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3602-buffer-overflow-in-openssl-openssl-bdc331</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3602%3A%20Buffer%20overflow%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981fc4522896dcbdc331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32899-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bdc2a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32899%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc2a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32898-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bdc286</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32898%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981fc4522896dcbdc286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32889-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-bdc279</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32889%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=682d981fc4522896dcbdc279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42799-visiting-a-malicious-website-may-lead-to-user-interface-spoofing-in-apple-macos-bdc02e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42799%3A%20Visiting%20a%20malicious%20website%20may%20lead%20to%20user%20interface%20spoofing%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981ec4522896dcbdc02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42798-parsing-a-maliciously-crafted-audio-file-may-lead-to-disclosure-of-user-information-in-apple-macos-bdc02a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42798%3A%20Parsing%20a%20maliciously%20crafted%20audio%20file%20may%20lead%20to%20disclosure%20of%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981ec4522896dcbdc02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42791-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bdc026</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42791%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981ec4522896dcbdc026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42318-unknown-in-xen-xen-bdc022</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42318%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981ec4522896dcbdc022</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42788-a-malicious-application-may-be-able-to-read-sensitive-location-information-in-apple-macos-bdae45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42788%3A%20A%20malicious%20application%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981dc4522896dcbdae45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42327-unknown-in-xen-xen-bdae0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42327%3A%20unknown%20in%20Xen%20xen&amp;severity=high&amp;id=682d981dc4522896dcbdae0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42317-unknown-in-xen-xen-bdadf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42317%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981dc4522896dcbdadf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42316-unknown-in-xen-xen-bdadec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42316%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981dc4522896dcbdadec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34662-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-dolphinscheduler-bdab69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34662%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=medium&amp;id=682d981cc4522896dcbdab69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32924-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bdab65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32924%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbdab65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32923-processing-maliciously-crafted-web-content-may-disclose-internal-states-of-the-app-in-apple-macos-bdab61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32923%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20disclose%20internal%20states%20of%20the%20app%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981cc4522896dcbdab61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32903-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-bdab5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32903%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=682d981cc4522896dcbdab5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32895-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-bdab50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32895%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981cc4522896dcbdab50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32892-a-sandboxed-process-may-be-able-to-circumvent-sandbox-restrictions-in-apple-macos-bdab4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32892%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981cc4522896dcbdab4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32890-a-sandboxed-process-may-be-able-to-circumvent-sandbox-restrictions-in-apple-macos-bdab48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32890%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbdab48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32870-a-user-with-physical-access-to-a-device-may-be-able-to-use-siri-to-obtain-some-call-history-information-in-apple-macos-bdab37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32870%3A%20A%20user%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20use%20Siri%20to%20obtain%20some%20call%20history%20information%20in%20Apple%20macOS&amp;severity=low&amp;id=682d981cc4522896dcbdab37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31777-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-apache-software-foundation-apache-spark-bdab2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31777%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Spark&amp;severity=medium&amp;id=682d981cc4522896dcbdab2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2572-broken-access-control-in-octopus-deploy-octopus-server-bdab27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2572%3A%20Broken%20Access%20Control%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=critical&amp;id=682d981cc4522896dcbdab27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32877-an-app-may-be-able-to-access-user-sensitive-data-in-apple-macos-bda897</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32877%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981cc4522896dcbda897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32875-an-app-may-be-able-to-read-sensitive-location-information-in-apple-macos-bda893</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32875%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981cc4522896dcbda893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27586-cwe-306-in-sick-sim1004-bda7e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27586%3A%20CWE-306%20in%20SICK%20SIM1004&amp;severity=critical&amp;id=682d981cc4522896dcbda7e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27584-cwe-306-in-sick-sim2000st-ppc-bda7d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27584%3A%20CWE-306%20in%20SICK%20SIM2000ST%20(PPC)&amp;severity=critical&amp;id=682d981cc4522896dcbda7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27582-cwe-306-in-sick-sim4000-ppc-bda7d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27582%3A%20CWE-306%20in%20SICK%20SIM4000%20(PPC)&amp;severity=critical&amp;id=682d981cc4522896dcbda7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26762-a-malicious-application-may-be-able-to-execute-arbitrary-code-with-system-privileges-in-apple-macos-bda7cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26762%3A%20A%20malicious%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20system%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26730-processing-a-maliciously-crafted-image-may-lead-to-arbitrary-code-execution-in-apple-macos-bda7b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26730%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26719-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bda7b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26719%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26717-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bda7ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26717%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda7ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26716-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bda7a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26716%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23738-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-github-github-enterprise-server-bda738</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23738%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=medium&amp;id=682d981cc4522896dcbda738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22658-processing-a-maliciously-crafted-email-message-may-lead-to-a-denial-of-service-in-apple-ios-bda718</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22658%3A%20Processing%20a%20maliciously%20crafted%20email%20message%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20iOS&amp;severity=medium&amp;id=682d981cc4522896dcbda718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42315-unknown-in-xen-xen-bda68b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42315%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981cc4522896dcbda68b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42314-unknown-in-xen-xen-bda67e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42314%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981cc4522896dcbda67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42313-unknown-in-xen-xen-bda64b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42313%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981cc4522896dcbda64b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42312-unknown-in-xen-xen-bda5db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42312%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981cc4522896dcbda5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42311-unknown-in-xen-xen-bda5d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42311%3A%20unknown%20in%20Xen%20xen&amp;severity=medium&amp;id=682d981cc4522896dcbda5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42252-cwe-444-inconsistent-interpretation-of-http-requests-http-request-response-smuggling-in-apache-software-foundation-apache-tomcat-bda544</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42252%3A%20CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=high&amp;id=682d981cc4522896dcbda544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40839-n-a-in-n-a-bda540</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40839%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda540</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3314-use-after-free-in-google-chrome-bda53a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3314%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981cc4522896dcbda53a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3313-incorrect-security-ui-in-google-chrome-bda536</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3313%3A%20Incorrect%20security%20UI%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981cc4522896dcbda536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3312-insufficient-validation-of-untrusted-input-in-google-chrome-bda4d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3312%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981cc4522896dcbda4d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3310-insufficient-policy-enforcement-in-google-chrome-bda4d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3310%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981cc4522896dcbda4d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3309-use-after-free-in-google-chrome-bda486</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3309%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=medium&amp;id=682d981cc4522896dcbda486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3308-insufficient-policy-enforcement-in-google-chrome-bda3c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3308%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbda3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3307-use-after-free-in-google-chrome-bda3a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3307%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbda3a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3306-use-after-free-in-google-chrome-bda388</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3306%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbda388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3305-use-after-free-in-google-chrome-bda379</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3305%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbda379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3304-use-after-free-in-google-chrome-bda2a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3304%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981cc4522896dcbda2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32947-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bda2a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32947%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32946-an-app-may-be-able-to-record-audio-using-a-pair-of-connected-airpods-in-apple-ios-and-ipados-bda298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32946%3A%20An%20app%20may%20be%20able%20to%20record%20audio%20using%20a%20pair%20of%20connected%20AirPods%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d981cc4522896dcbda298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32944-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bda290</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32944%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981cc4522896dcbda290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32941-a-buffer-overflow-may-result-in-arbitrary-code-execution-in-apple-macos-bda28a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32941%3A%20A%20buffer%20overflow%20may%20result%20in%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=682d981cc4522896dcbda28a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32940-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bda1bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32940%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbda1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32939-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bda1b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32939%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981bc4522896dcbda1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32938-a-shortcut-may-be-able-to-check-the-existence-of-an-arbitrary-path-on-the-file-system-in-apple-macos-bda1af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32938%3A%20A%20shortcut%20may%20be%20able%20to%20check%20the%20existence%20of%20an%20arbitrary%20path%20on%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32936-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-bda1a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32936%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32935-a-user-may-be-able-to-view-restricted-content-from-the-lock-screen-in-apple-macos-bda103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32935%3A%20A%20user%20may%20be%20able%20to%20view%20restricted%20content%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32934-a-remote-user-may-be-able-to-cause-kernel-code-execution-in-apple-macos-bda0ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32934%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20kernel%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbda0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32932-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-and-ipados-bda0fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32932%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981bc4522896dcbda0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32929-an-app-may-be-able-to-access-ios-backups-in-apple-ios-and-ipados-bda0dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32929%3A%20An%20app%20may%20be%20able%20to%20access%20iOS%20backups%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=medium&amp;id=682d981bc4522896dcbda0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32928-a-user-in-a-privileged-network-position-may-be-able-to-intercept-mail-credentials-in-apple-macos-bda0d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32928%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20intercept%20mail%20credentials%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda0d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32910-an-archive-may-be-able-to-bypass-gatekeeper-in-apple-macos-bda0aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32910%3A%20An%20archive%20may%20be%20able%20to%20bypass%20Gatekeeper%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbda0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32909-an-app-may-be-able-to-access-user-sensitive-data-in-apple-ios-bda0a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32909%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20iOS&amp;severity=medium&amp;id=682d981bc4522896dcbda0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32887-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-bda09e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32887%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=682d981bc4522896dcbda09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32881-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-bda09a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32881%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32879-a-user-with-physical-access-to-a-device-may-be-able-to-access-contacts-from-the-lock-screen-in-apple-macos-bda096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32879%3A%20A%20user%20with%20physical%20access%20to%20a%20device%20may%20be%20able%20to%20access%20contacts%20from%20the%20lock%20screen%20in%20Apple%20macOS&amp;severity=low&amp;id=682d981bc4522896dcbda096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32927-joining-a-malicious-wi-fi-network-may-result-in-a-denial-of-service-of-the-settings-app-in-apple-ios-and-ipados-bda030</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32927%3A%20Joining%20a%20malicious%20Wi-Fi%20network%20may%20result%20in%20a%20denial-of-service%20of%20the%20Settings%20app%20in%20Apple%20iOS%20and%20iPadOS&amp;severity=high&amp;id=682d981bc4522896dcbda030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32926-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bda028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32926%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32907-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-ios-bda020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32907%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=682d981bc4522896dcbda020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26710-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bda018</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26710%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbda018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26709-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bda014</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26709%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbda014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22677-video-self-preview-in-a-webrtc-call-may-be-interrupted-if-the-user-answers-a-phone-call-in-apple-macos-bda010</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22677%3A%20Video%20self-preview%20in%20a%20webRTC%20call%20may%20be%20interrupted%20if%20the%20user%20answers%20a%20phone%20call%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbda010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32925-an-app-may-be-able-to-cause-unexpected-system-termination-or-write-kernel-memory-in-apple-ios-bd9fc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32925%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20iOS&amp;severity=high&amp;id=682d981bc4522896dcbd9fc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32922-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-bd9fc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32922%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32918-an-app-may-be-able-to-bypass-privacy-preferences-in-apple-macos-bd9f9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32918%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbd9f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32915-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bd9f99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32915%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32914-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bd9f95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32914%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32913-a-sandboxed-app-may-be-able-to-determine-which-app-is-currently-using-the-camera-in-apple-macos-bd9f91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32913%3A%20A%20sandboxed%20app%20may%20be%20able%20to%20determine%20which%20app%20is%20currently%20using%20the%20camera%20in%20Apple%20macOS&amp;severity=low&amp;id=682d981bc4522896dcbd9f91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32905-processing-a-maliciously-crafted-dmg-file-may-lead-to-arbitrary-code-execution-with-system-privileges-in-apple-macos-bd9f4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32905%3A%20Processing%20a%20maliciously%20crafted%20DMG%20file%20may%20lead%20to%20arbitrary%20code%20execution%20with%20system%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32904-an-app-may-be-able-to-access-user-sensitive-data-in-apple-macos-bd9f4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32904%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbd9f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32867-a-user-with-physical-access-to-an-ios-device-may-be-able-to-read-past-diagnostic-logs-in-apple-macos-bd9f47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32867%3A%20A%20user%20with%20physical%20access%20to%20an%20iOS%20device%20may%20be%20able%20to%20read%20past%20diagnostic%20logs%20in%20Apple%20macOS&amp;severity=low&amp;id=682d981bc4522896dcbd9f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32866-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bd9f43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32866%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32865-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-bd9f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32865%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32862-an-app-with-root-privileges-may-be-able-to-access-private-information-in-apple-macos-bd9ee1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32862%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbd9ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32859-deleted-contacts-may-still-appear-in-spotlight-search-results-in-apple-ios-bd9ecd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32859%3A%20Deleted%20contacts%20may%20still%20appear%20in%20spotlight%20search%20results%20in%20Apple%20iOS&amp;severity=medium&amp;id=682d981bc4522896dcbd9ecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25892-denial-of-service-dos-in-muhammara-bd9ec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25892%3A%20Denial%20of%20Service%20(DoS)%20in%20muhammara&amp;severity=high&amp;id=682d981bc4522896dcbd9ec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32858-an-app-may-be-able-to-leak-sensitive-kernel-state-in-apple-macos-bd9e95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32858%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbd9e95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32835-an-app-may-be-able-to-read-a-persistent-device-identifier-in-apple-ios-bd9e91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32835%3A%20An%20app%20may%20be%20able%20to%20read%20a%20persistent%20device%20identifier%20in%20Apple%20iOS&amp;severity=low&amp;id=682d981bc4522896dcbd9e91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32827-an-app-may-be-able-to-cause-a-denial-of-service-in-apple-macos-bd9e82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32827%3A%20An%20app%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=682d981bc4522896dcbd9e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32794-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-bd9e5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32794%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682d981bc4522896dcbd9e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-11-01-f1201c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-11-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f1201c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27784-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-hcl-software-hcl-launch-bebdc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27784%3A%20CWE-327%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20HCL%20Software%20HCL%20Launch&amp;severity=medium&amp;id=682d9838c4522896dcbebdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39018-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-m-files-hubshare-bebdb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39018%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20M-Files%20Hubshare&amp;severity=high&amp;id=682d9838c4522896dcbebdb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39019-cwe-287-improper-authentication-in-m-files-hubshare-beba67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39019%3A%20CWE-287%20Improper%20Authentication%20in%20M-Files%20Hubshare&amp;severity=medium&amp;id=682d9837c4522896dcbeba67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40294-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-php-point-of-sale-llc-php-point-of-sale-bda67a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40294%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=high&amp;id=682d981cc4522896dcbda67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40290-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-php-point-of-sale-llc-php-point-of-sale-bda043</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40290%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=medium&amp;id=682d981bc4522896dcbda043</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40287-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-php-point-of-sale-llc-php-point-of-sale-bda03f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40287%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=critical&amp;id=682d981bc4522896dcbda03f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40296-cwe-918-server-side-request-forgery-ssrf-in-php-point-of-sale-llc-php-point-of-sale-bd9ff2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40296%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=critical&amp;id=682d981bc4522896dcbd9ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40289-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-php-point-of-sale-llc-php-point-of-sale-bd9fd9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40289%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=critical&amp;id=682d981bc4522896dcbd9fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39017-cwe-20-improper-input-validation-in-m-files-hubshare-beba1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39017%3A%20CWE-20%20Improper%20Input%20Validation%20in%20M-Files%20Hubshare&amp;severity=high&amp;id=682d9837c4522896dcbeba1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40292-cwe-209-generation-of-error-message-containing-sensitive-information-in-php-point-of-sale-llc-php-point-of-sale-bd9fea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40292%3A%20CWE-209%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=medium&amp;id=682d981bc4522896dcbd9fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3059-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-schoolbox-pty-ltd-schoolbox-bdaec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3059%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Schoolbox%20Pty%20Ltd%20Schoolbox&amp;severity=high&amp;id=682d981dc4522896dcbdaec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40291-cwe-352-cross-site-request-forgery-csrf-in-php-point-of-sale-llc-php-point-of-sale-bd9fe6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40291%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=high&amp;id=682d981bc4522896dcbd9fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39016-cwe-20-improper-input-validation-in-m-files-hubshare-bd9fcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39016%3A%20CWE-20%20Improper%20Input%20Validation%20in%20M-Files%20Hubshare&amp;severity=high&amp;id=682d981bc4522896dcbd9fcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39020-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-schoolbox-pty-ltd-schoolbox-bd9fd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39020%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Schoolbox%20Pty%20Ltd%20Schoolbox&amp;severity=high&amp;id=682d981bc4522896dcbd9fd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40293-cwe-384-session-fixation-in-php-point-of-sale-llc-php-point-of-sale-bd9fee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40293%3A%20CWE-384%20Session%20Fixation%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=critical&amp;id=682d981bc4522896dcbd9fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40288-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-php-point-of-sale-llc-php-point-of-sale-bd9fd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40288%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PHP%20Point%20of%20Sale%20LLC%20PHP%20Point%20of%20Sale&amp;severity=critical&amp;id=682d981bc4522896dcbd9fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41679-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-forma-forma-lms-beb9af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41679%3A%20CWE-79%3A%20improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(Cross-site%20Scripting)%20in%20Forma%20Forma%20LMS&amp;severity=medium&amp;id=682d9837c4522896dcbeb9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42924-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-forma-forma-lms-bdcaaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42924%3A%20CWE-89%3A%20improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(SQL%20injection)%20in%20Forma%20Forma%20LMS&amp;severity=high&amp;id=682d981fc4522896dcbdcaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41681-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-forma-forma-lms-bd9ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41681%3A%20CWE-434%3A%20unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Forma%20Forma%20LMS&amp;severity=critical&amp;id=682d981bc4522896dcbd9ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41680-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-forma-forma-lms-bd9ed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41680%3A%20CWE-89%3A%20improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(SQL%20injection)%20in%20Forma%20Forma%20LMS&amp;severity=high&amp;id=682d981bc4522896dcbd9ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42925-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-forma-forma-lms-bd9ed9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42925%3A%20CWE-434%3A%20unrestricted%20upload%20of%20file%20with%20dangerous%20type%20in%20Forma%20Forma%20LMS&amp;severity=critical&amp;id=682d981bc4522896dcbd9ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42923-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-forma-forma-lms-bd9f89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42923%3A%20CWE-89%3A%20improper%20neutralization%20of%20special%20elements%20used%20in%20an%20SQL%20command%20(SQL%20injection)%20in%20Forma%20Forma%20LMS&amp;severity=high&amp;id=682d981bc4522896dcbd9f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28763-cwe-20-improper-input-validation-in-zoom-video-communications-inc-zoom-client-for-meetings-for-android-ios-linux-macos-and-windows-bebdb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28763%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20Client%20for%20Meetings%20(for%20Android%2C%20iOS%2C%20Linux%2C%20macOS%2C%20and%20Windows)&amp;severity=high&amp;id=682d9838c4522896dcbebdb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2741-uncontrolled-resource-consumption-cwe-400-in-zephyrproject-rtos-zephyr-bdca9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2741%3A%20Uncontrolled%20Resource%20Consumption%20(CWE-400)%20in%20zephyrproject-rtos%20zephyr&amp;severity=high&amp;id=682d981fc4522896dcbdca9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40742-cwe-noinfo-in-softnext-technologies-corp-mail-sqr-expert-bdc7c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40742%3A%20CWE-noinfo%20in%20SOFTNEXT%20TECHNOLOGIES%20CORP.%20Mail%20SQR%20Expert&amp;severity=medium&amp;id=682d981fc4522896dcbdc7c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40741-cwe-78-os-command-injection-in-softnext-technologies-corp-mail-sqr-expert-bd9f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40741%3A%20CWE-78%20OS%20Command%20Injection%20in%20SOFTNEXT%20TECHNOLOGIES%20CORP.%20Mail%20SQR%20Expert&amp;severity=critical&amp;id=682d981bc4522896dcbd9f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40739-cwe-79-cross-site-scripting-xss-in-ragic-inc-ragic-bd9f81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40739%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Ragic%2C%20Inc.%20Ragic&amp;severity=medium&amp;id=682d981bc4522896dcbd9f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39027-cwe-79-cross-site-scripting-xss-in-e-excellence-inc-u-office-force-bda46f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39027%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981cc4522896dcbda46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39026-cwe-79-cross-site-scripting-xss-in-e-excellence-inc-u-office-force-bda467</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39026%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981cc4522896dcbda467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39025-cwe-79-cross-site-scripting-xss-in-e-excellence-inc-u-office-force-bda45f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39025%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981cc4522896dcbda45f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39024-cwe-79-cross-site-scripting-xss-in-e-excellence-inc-u-office-force-bda457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39024%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981cc4522896dcbda457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39023-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-e-excellence-inc-u-office-force-bd9f7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39023%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981bc4522896dcbd9f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39022-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-e-excellence-inc-u-office-force-bd9f70</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39022%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981bc4522896dcbd9f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39021-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-e-excellence-inc-u-office-force-bd9f53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39021%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20e-Excellence%20Inc.%20U-Office%20Force&amp;severity=medium&amp;id=682d981bc4522896dcbd9f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39294-cwe-400-uncontrolled-resource-consumption-in-conduit-rust-conduit-hyper-bf4842</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39294%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20conduit-rust%20conduit-hyper&amp;severity=medium&amp;id=682d9845c4522896dcbf4842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3765-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thorsten-thorsten-phpmyfaq-bebda2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3765%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20thorsten%2Fphpmyfaq&amp;severity=high&amp;id=682d9838c4522896dcbebda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3766-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thorsten-thorsten-phpmyfaq-bdca9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3766%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20thorsten%2Fphpmyfaq&amp;severity=high&amp;id=682d981fc4522896dcbdca9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3499-improper-access-control-in-tenable-nessus-bdca61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3499%3A%20Improper%20Access%20Control%20in%20Tenable%20Nessus&amp;severity=medium&amp;id=682d981fc4522896dcbdca61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40471-n-a-in-n-a-bda49b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40471%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda49b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3334-cwe-502-deserialization-of-untrusted-data-in-unknown-easy-wp-smtp-bda497</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3334%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Easy%20WP%20SMTP&amp;severity=high&amp;id=682d981cc4522896dcbda497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3254-cwe-89-sql-injection-in-unknown-wordpress-classifieds-plugin-ad-directory-listings-by-awp-classifieds-bda47e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3254%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WordPress%20Classifieds%20Plugin%20%E2%80%93%20Ad%20Directory%20%26%20Listings%20by%20AWP%20Classifieds&amp;severity=critical&amp;id=682d981cc4522896dcbda47e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3237-cwe-79-cross-site-scripting-xss-in-unknown-wp-contact-slider-bda43e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3237%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Contact%20Slider&amp;severity=medium&amp;id=682d981cc4522896dcbda43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3096-cwe-862-missing-authorization-in-unknown-wp-total-hacks-bda43a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3096%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20WP%20Total%20Hacks&amp;severity=medium&amp;id=682d981cc4522896dcbda43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37623-n-a-in-n-a-bda436</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37623%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37620-n-a-in-n-a-bda41c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37620%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31692-spring-is-susceptible-to-authorization-rules-bypass-via-forward-or-include-dispatcher-types-in-spring-by-vmware-bda404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31692%3A%20Spring%20is%20susceptible%20to%20authorization%20rules%20bypass%20via%20forward%20or%20include%20dispatcher%20types.%20in%20Spring%20by%20VMware&amp;severity=critical&amp;id=682d981cc4522896dcbda404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40487-n-a-in-n-a-bda3a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40487%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda3a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43148-n-a-in-n-a-bda271</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43148%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40617-n-a-in-n-a-bda26b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40617%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda26b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40488-n-a-in-n-a-bda25c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40488%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43752-n-a-in-n-a-bda1de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43752%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbda1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43152-n-a-in-n-a-bda1cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43152%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43151-n-a-in-n-a-bda1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43151%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44081-n-a-in-n-a-bda13b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44081%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44079-n-a-in-n-a-bda137</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44079%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3441-cwe-79-cross-site-scripting-xss-in-unknown-rock-convert-bd9e6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3441%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Rock%20Convert&amp;severity=medium&amp;id=682d981bc4522896dcbd9e6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3440-cwe-79-cross-site-scripting-xss-in-unknown-rock-convert-bd9e62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3440%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Rock%20Convert&amp;severity=medium&amp;id=682d981bc4522896dcbd9e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3420-cwe-79-cross-site-scripting-xss-in-unknown-official-integration-for-billingo-bd9e19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3420%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Official%20Integration%20for%20Billingo&amp;severity=medium&amp;id=682d981bc4522896dcbd9e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3419-cwe-269-improper-privilege-management-in-unknown-automatic-user-roles-switcher-bd9e15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3419%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Unknown%20Automatic%20User%20Roles%20Switcher&amp;severity=medium&amp;id=682d981bc4522896dcbd9e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3408-cwe-79-cross-site-scripting-xss-in-unknown-wp-word-count-bd9e11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3408%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Word%20Count&amp;severity=medium&amp;id=682d981bc4522896dcbd9e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3380-cwe-502-deserialization-of-untrusted-data-in-unknown-customizer-export-import-bd9e0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3380%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Customizer%20Export%2FImport&amp;severity=high&amp;id=682d981bc4522896dcbd9e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3374-cwe-502-deserialization-of-untrusted-data-in-unknown-ocean-extra-bd9e09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3374%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Ocean%20Extra&amp;severity=high&amp;id=682d981bc4522896dcbd9e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3366-cwe-502-deserialization-of-untrusted-data-in-unknown-publishpress-capabilities-user-role-access-editor-permissions-admin-menus-bd9db6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3366%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20PublishPress%20Capabilities%20%E2%80%93%20User%20Role%20Access%2C%20Editor%20Permissions%2C%20Admin%20Menus&amp;severity=high&amp;id=682d981bc4522896dcbd9db6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3360-cwe-502-deserialization-of-untrusted-data-in-unknown-learnpress-wordpress-lms-plugin-bd9dac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3360%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20LearnPress%20%E2%80%93%20WordPress%20LMS%20Plugin&amp;severity=high&amp;id=682d981bc4522896dcbd9dac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3357-cwe-502-deserialization-of-untrusted-data-in-unknown-smart-slider-3-bd9da8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3357%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Smart%20Slider%203&amp;severity=high&amp;id=682d981bc4522896dcbd9da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2190-cwe-79-cross-site-scripting-xss-in-unknown-gallery-plugin-for-wordpress-envira-photo-gallery-bd9b62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2190%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Gallery%20Plugin%20for%20WordPress%20%E2%80%93%20Envira%20Photo%20Gallery&amp;severity=medium&amp;id=682d981bc4522896dcbd9b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2167-cwe-79-cross-site-scripting-xss-in-unknown-newspaper-bd9b5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2167%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Newspaper&amp;severity=medium&amp;id=682d981bc4522896dcbd9b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27583-cwe-285-in-sick-flexicompact-bd9b5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27583%3A%20CWE-285%20in%20SICK%20FlexiCompact&amp;severity=critical&amp;id=682d981bc4522896dcbd9b5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40661-n-a-in-n-a-bd9acc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40661%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40241-n-a-in-n-a-bd9ac8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40241%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-21016-n-a-in-n-a-bd9a6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-21016%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31690-privilege-escalation-in-spring-security-oauth2-client-in-spring-security-bd8181</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31690%3A%20Privilege%20Escalation%20in%20spring-security-oauth2-client%20in%20Spring%20Security&amp;severity=high&amp;id=682d9818c4522896dcbd8181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2627-cwe-79-cross-site-scripting-xss-in-unknown-newspaper-bd8087</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2627%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Newspaper&amp;severity=medium&amp;id=682d9818c4522896dcbd8087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-31-f12f9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-31&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-30-f12aa3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42777-n-a-in-n-a-bd9b56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42777%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44022-n-a-in-n-a-bd9ab3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44022%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9ab3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44020-n-a-in-n-a-bd9a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44019-n-a-in-n-a-bd9a5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42915-n-a-in-n-a-bd9a58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42915%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3754-cwe-521-weak-password-requirements-in-thorsten-thorsten-phpmyfaq-bd7ff0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3754%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20thorsten%20thorsten%2Fphpmyfaq&amp;severity=high&amp;id=682d9818c4522896dcbd7ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-29-f12453</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3708-cwe-918-server-side-request-forgery-ssrf-in-google-web-stories-bdcc07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3708%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20google%20Web%20Stories&amp;severity=critical&amp;id=682d981fc4522896dcbdcc07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3320-cwe-862-missing-authorization-in-cloudflare-warp-bdca14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3320%3A%20CWE-862%20Missing%20Authorization%20in%20Cloudflare%20WARP&amp;severity=medium&amp;id=682d981fc4522896dcbdca14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3322-cwe-862-missing-authorization-in-cloudflare-warp-bdad88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3322%3A%20CWE-862%20Missing%20Authorization%20in%20Cloudflare%20WARP&amp;severity=medium&amp;id=682d981dc4522896dcbdad88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3337-cwe-862-missing-authorization-in-cloudflare-warp-bda2f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3337%3A%20CWE-862%20Missing%20Authorization%20in%20Cloudflare%20WARP&amp;severity=medium&amp;id=682d981cc4522896dcbda2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3321-cwe-862-missing-authorization-in-cloudflare-warp-bd7fe8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3321%3A%20CWE-862%20Missing%20Authorization%20in%20Cloudflare%20WARP&amp;severity=medium&amp;id=682d9818c4522896dcbd7fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3512-cwe-862-missing-authorization-in-cloudflare-warp-bd9f0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3512%3A%20CWE-862%20Missing%20Authorization%20in%20Cloudflare%20WARP&amp;severity=medium&amp;id=682d981bc4522896dcbd9f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3616-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-cloudflare-octorpki-bdadfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3616%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Cloudflare%20OctoRPKI&amp;severity=medium&amp;id=682d981dc4522896dcbdadfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36206-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-johnson-controls-cevas-bdca0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36206%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Johnson%20Controls%20CEVAS&amp;severity=critical&amp;id=682d981fc4522896dcbdca0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33859-cwe-434-unrestricted-upload-of-file-in-eaton-foreseer-epms-bd9ee5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33859%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20in%20Eaton%20Foreseer%20EPMS&amp;severity=high&amp;id=682d981bc4522896dcbd9ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39367-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-davemckain-qtiworks-bf6a8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39367%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20davemckain%20qtiworks&amp;severity=medium&amp;id=682d9849c4522896dcbf6a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39366-cwe-303-incorrect-implementation-of-authentication-algorithm-in-datahub-project-datahub-bf6a83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39366%3A%20CWE-303%3A%20Incorrect%20Implementation%20of%20Authentication%20Algorithm%20in%20datahub-project%20datahub&amp;severity=medium&amp;id=682d9849c4522896dcbf6a83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43280-n-a-in-n-a-bd9ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43280%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43276-n-a-in-n-a-bd9ba1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43276%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9ba1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38728-n-a-in-n-a-bd9b52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38728%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9b52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43275-n-a-in-n-a-bd9b1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43275%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9b1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43233-n-a-in-n-a-bd9b12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9b12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43232-n-a-in-n-a-bd9b01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43232%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43286-n-a-in-n-a-bd98f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43286%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd98f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43285-n-a-in-n-a-bd98ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43285%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd98ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43231-n-a-in-n-a-bd9898</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43231%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43230-n-a-in-n-a-bd9888</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43230%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43229-n-a-in-n-a-bd9840</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43229%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43228-n-a-in-n-a-bd981a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43228%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43170-n-a-in-n-a-bd9816</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43170%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3018-information-exposure-in-gitlab-in-gitlab-gitlab-bd980a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3018%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d981ac4522896dcbd980a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37915-remote-arbitrary-code-execution-in-aruba-edgeconnect-enterprise-orchestrator-on-premises-bd9806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37915%3A%20Remote%20Arbitrary%20Code%20Execution%20in%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator%20(on-premises)&amp;severity=critical&amp;id=682d981ac4522896dcbd9806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37914-remote-authentication-bypass-in-aruba-edgeconnect-enterprise-orchestrator-on-premises-aruba-edgeconnect-enterprise-orchestrator-as-a-service-aruba-edgeconnect-enterprise-orchestrator-sp-and-aruba-edgeconnect-enterprise-orchestrator-global-enterprise-tenant-orchestrators-bd9802</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37914%3A%20Remote%20Authentication%20Bypass%20in%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator%20(on-premises)%2C%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator-as-a-Service%2C%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator-SP%20and%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator%20Global%20Enterprise%20Tenant%20Orchestrators&amp;severity=critical&amp;id=682d981ac4522896dcbd9802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37913-remote-authentication-bypass-in-aruba-edgeconnect-enterprise-orchestrator-on-premises-aruba-edgeconnect-enterprise-orchestrator-as-a-service-aruba-edgeconnect-enterprise-orchestrator-sp-and-aruba-edgeconnect-enterprise-orchestrator-global-enterprise-tenant-orchestrators-bd97fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37913%3A%20Remote%20Authentication%20Bypass%20in%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator%20(on-premises)%2C%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator-as-a-Service%2C%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator-SP%20and%20Aruba%20EdgeConnect%20Enterprise%20Orchestrator%20Global%20Enterprise%20Tenant%20Orchestrators&amp;severity=critical&amp;id=682d981ac4522896dcbd97fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37621-n-a-in-n-a-bd97b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37621%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd97b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2882-information-exposure-in-gitlab-in-gitlab-gitlab-bd9775</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2882%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d981ac4522896dcbd9775</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2826-improper-authorization-in-gitlab-in-gitlab-gitlab-bd9760</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2826%3A%20Improper%20authorization%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d981ac4522896dcbd9760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26884-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-apache-software-foundation-apache-dolphinscheduler-bd974a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26884%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20DolphinScheduler&amp;severity=medium&amp;id=682d981ac4522896dcbd974a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38737-n-a-in-n-a-bd9746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38737%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd9746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38736-n-a-in-n-a-bd9737</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38736%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd9737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38734-n-a-in-n-a-bd95b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38734%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd95b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38733-n-a-in-n-a-bd95ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38733%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd95ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38732-n-a-in-n-a-bd959e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38732%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd959e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38731-n-a-in-n-a-bd9596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38731%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd9596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38730-n-a-in-n-a-bd9590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38730%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd9590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38729-n-a-in-n-a-bd957f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38729%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd957f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37781-n-a-in-n-a-bd9557</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37781%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd9557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35388-n-a-in-n-a-bd9551</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35388%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd9551</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35387-n-a-in-n-a-bd954d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35387%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd954d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31678-vmware-cloud-foundation-contains-an-xml-external-entity-xxe-in-vmware-cloud-foundation-nsx-v-bd83d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31678%3A%20VMware%20Cloud%20Foundation%20contains%20an%20XML%20External%20Entity%20(XXE)%20in%20VMware%20Cloud%20Foundation%20(NSX-V)&amp;severity=critical&amp;id=682d9818c4522896dcbd83d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43283-n-a-in-n-a-bd7fb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43283%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43282-n-a-in-n-a-bd7f9f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43282%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd7f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43281-n-a-in-n-a-bd7f68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43281%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd7f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43169-n-a-in-n-a-bd7f2e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43169%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43168-n-a-in-n-a-bd7f1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43168%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43167-n-a-in-n-a-bd7f03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43166-n-a-in-n-a-bd7ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43166%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43165-n-a-in-n-a-bd7ec4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43165%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43164-n-a-in-n-a-bd7ea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43164%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7ea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38217-n-a-in-n-a-bd7e4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38217%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3741-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-chatwoot-chatwoot-chatwoot-bd744e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3741%3A%20CWE-307%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20chatwoot%20chatwoot%2Fchatwoot&amp;severity=critical&amp;id=682d9817c4522896dcbd744e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37782-n-a-in-n-a-bd6897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37782%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-28-f12e66</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0074-cwe-426-untrusted-search-path-in-litespeed-technologies-openlitespeed-web-server-bd744a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0074%3A%20CWE-426%20Untrusted%20Search%20Path%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed%20Web%20Server&amp;severity=high&amp;id=682d9817c4522896dcbd744a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0073-cwe-20-improper-input-validation-in-litespeed-technologies-openlitespeed-web-server-bdafe0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0073%3A%20CWE-20%20Improper%20Input%20Validation%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed%20Web%20Server&amp;severity=high&amp;id=682d981dc4522896dcbdafe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0072-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-litespeed-technologies-openlitespeed-web-server-bd7442</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0072%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20LiteSpeed%20Technologies%20OpenLiteSpeed%20Web%20Server&amp;severity=medium&amp;id=682d9817c4522896dcbd7442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24669-cwe-862-missing-authorization-in-forgerock-access-management-bda247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24669%3A%20CWE-862%20Missing%20Authorization%20in%20ForgeRock%20Access%20Management&amp;severity=medium&amp;id=682d981bc4522896dcbda247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24670-cwe-200-information-exposure-in-forgerock-access-management-bd7469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24670%3A%20CWE-200%20Information%20Exposure%20in%20ForgeRock%20Access%20Management&amp;severity=high&amp;id=682d9817c4522896dcbd7469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38744-cwe-287-improper-authentication-in-rockwell-automation-factorytalk-alarm-and-events-server-bdc7a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38744%3A%20CWE-287%20Improper%20Authentication%20in%20Rockwell%20Automation%20FactoryTalk%20Alarm%20and%20Events%20Server&amp;severity=high&amp;id=682d981fc4522896dcbdc7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3409-cwe-121-stack-based-buffer-overflow-in-openbmc-project-openbmc-bdb03b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3409%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20OpenBMC%20Project%20OpenBMC&amp;severity=high&amp;id=682d981dc4522896dcbdb03b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2809-cwe-229-improper-handling-of-values-in-openbmc-project-openbmc-bdad80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2809%3A%20CWE-229%3A%20Improper%20Handling%20of%20Values%20in%20OpenBMC%20Project%20OpenBMC&amp;severity=high&amp;id=682d981dc4522896dcbdad80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45476-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yordam-informatics-systems-yordam-library-information-document-automation-program-bd7465</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45476%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yordam%20Informatics%20Systems%20Yordam%20Library%20Information%20Document%20Automation%20Program&amp;severity=medium&amp;id=682d9817c4522896dcbd7465</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25918-regular-expression-denial-of-service-redos-in-shescape-bdaf8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25918%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20shescape&amp;severity=medium&amp;id=682d981dc4522896dcbdaf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3095-cwe-20-improper-input-validation-in-google-llc-dart-bf814b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3095%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20LLC%20Dart&amp;severity=medium&amp;id=682d984bc4522896dcbf814b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39364-cwe-312-cleartext-storage-of-sensitive-information-in-nextcloud-security-advisories-bf6a7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39364%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9849c4522896dcbf6a7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39365-cwe-94-improper-control-of-generation-of-code-code-injection-in-pimcore-pimcore-bf498d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39365%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20pimcore%20pimcore&amp;severity=medium&amp;id=682d9846c4522896dcbf498d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39330-cwe-400-uncontrolled-resource-consumption-in-nextcloud-security-advisories-bf48e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39330%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf48e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39329-cwe-285-improper-authorization-in-nextcloud-security-advisories-bf48d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39329%3A%20CWE-285%3A%20Improper%20Authorization%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9846c4522896dcbf48d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40183-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bosch-videojet-multi-4000-bdae3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40183%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bosch%20VIDEOJET%20multi%204000&amp;severity=medium&amp;id=682d981dc4522896dcbdae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42992-n-a-in-n-a-bd9b9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42992%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9b9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42991-n-a-in-n-a-bd9b99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42991%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42055-n-a-in-n-a-bd9b95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42055%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9b95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2508-information-exposure-in-octopus-deploy-octopus-server-bd9b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2508%3A%20Information%20Exposure%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=682d981bc4522896dcbd9b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42054-n-a-in-n-a-bd95fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42054%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd95fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40876-n-a-in-n-a-bd95c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40876%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd95c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40875-n-a-in-n-a-bd95c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40875%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd95c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40874-n-a-in-n-a-bd95b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd95b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39978-n-a-in-n-a-bd94d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39978%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd94d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39977-n-a-in-n-a-bd94d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39977%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd94d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39976-n-a-in-n-a-bd94d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39976%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ac4522896dcbd94d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36182-n-a-in-n-a-bd93ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36182%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd93ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32407-n-a-in-n-a-bd9031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32407%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd9031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31898-n-a-in-n-a-bd9017</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31898%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ac4522896dcbd9017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40184-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bosch-videojet-multi-4000-bd748e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40184%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Bosch%20VIDEOJET%20multi%204000&amp;severity=medium&amp;id=682d9817c4522896dcbd748e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3725-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-wireshark-in-wireshark-foundation-wireshark-bd7486</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3725%3A%20Buffer%20copy%20without%20checking%20size%20of%20input%20(&apos;classic%20buffer%20overflow&apos;)%20in%20Wireshark%20in%20Wireshark%20Foundation%20Wireshark&amp;severity=medium&amp;id=682d9817c4522896dcbd7486</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43367-n-a-in-n-a-bd6888</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43367%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6888</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43366-n-a-in-n-a-bd6880</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43366%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43365-n-a-in-n-a-bd6870</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43365%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43364-n-a-in-n-a-bd6868</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43364%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43340-n-a-in-n-a-bd6860</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43340%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42993-n-a-in-n-a-bd685c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42993%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd685c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-27-f20b99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-27&amp;severity=medium&amp;id=682acdc4bbaf20d303f20b99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-27-f12f35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-27&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40238-cwe-502-deserialization-of-untrusted-data-in-cert-cc-vince-the-vulnerability-information-and-coordination-environment-bd9b6e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40238%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CERT%2FCC%20VINCE%20-%20The%20Vulnerability%20Information%20and%20Coordination%20Environment&amp;severity=high&amp;id=682d981bc4522896dcbd9b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43748-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-synology-presto-file-server-beff0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43748%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Synology%20Presto%20File%20Server&amp;severity=medium&amp;id=682d983ec4522896dcbeff0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43749-cwe-269-improper-privilege-management-in-synology-presto-file-server-bd749f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43749%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Synology%20Presto%20File%20Server&amp;severity=medium&amp;id=682d9817c4522896dcbd749f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31256-cwe-59-improper-link-resolution-before-file-access-link-following-in-suse-opensuse-factory-bd7471</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31256%3A%20CWE-59%3A%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20SUSE%20openSUSE%20Factory&amp;severity=high&amp;id=682d9817c4522896dcbd7471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25849-cross-site-scripting-xss-in-joyqi-hyper-down-bd746d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25849%3A%20Cross-site%20Scripting%20(XSS)%20in%20joyqi%2Fhyper-down&amp;severity=medium&amp;id=682d9817c4522896dcbd746d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39348-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-twisted-twisted-bf6a75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39348%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20twisted%20twisted&amp;severity=medium&amp;id=682d9849c4522896dcbf6a75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39362-cwe-356-product-ui-does-not-warn-user-of-unsafe-actions-in-metabase-metabase-bf4987</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39362%3A%20CWE-356%3A%20Product%20UI%20does%20not%20Warn%20User%20of%20Unsafe%20Actions%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9846c4522896dcbf4987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39361-cwe-20-improper-input-validation-in-metabase-metabase-bf496b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39361%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9846c4522896dcbf496b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39360-cwe-304-missing-critical-step-in-authentication-in-metabase-metabase-bf4967</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39360%3A%20CWE-304%3A%20Missing%20Critical%20Step%20in%20Authentication%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9846c4522896dcbf4967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39359-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-metabase-metabase-bf4963</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39359%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9846c4522896dcbf4963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39358-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-metabase-metabase-bf495f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39358%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9846c4522896dcbf495f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39357-cwe-1321-improperly-controlled-modification-of-object-prototype-attributes-prototype-pollution-in-wintercms-winter-bf495b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39357%3A%20CWE-1321%3A%20Improperly%20Controlled%20Modification%20of%20Object%20Prototype%20Attributes%20(&apos;Prototype%20Pollution&apos;)%20in%20wintercms%20winter&amp;severity=medium&amp;id=682d9846c4522896dcbf495b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39355-cwe-287-improper-authentication-in-discourse-discourse-patreon-bf4953</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39355%3A%20CWE-287%3A%20Improper%20Authentication%20in%20discourse%20discourse-patreon&amp;severity=medium&amp;id=682d9846c4522896dcbf4953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39286-cwe-269-improper-privilege-management-in-jupyter-jupyter-core-bf4831</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39286%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20jupyter%20jupyter_core&amp;severity=medium&amp;id=682d9845c4522896dcbf4831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43776-server-side-request-forgery-ssrf-in-metabase-bd9ba9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43776%3A%20Server%20Side%20Request%20Forgery%20(SSRF)%20in%20Metabase&amp;severity=medium&amp;id=682d981bc4522896dcbd9ba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43775-sql-injection-in-delta-electronics-diaenergie-bd9b2b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43775%3A%20SQL%20Injection%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=critical&amp;id=682d981bc4522896dcbd9b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43774-sql-injection-in-delta-electronics-diaenergie-bd9b27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43774%3A%20SQL%20Injection%20in%20Delta%20Electronics%20DIAEnergie&amp;severity=critical&amp;id=682d981bc4522896dcbd9b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43766-in-apache-software-foundation-apache-iotdb-bd9b23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43766%3A%20Vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20IoTDB&amp;severity=high&amp;id=682d981bc4522896dcbd9b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43750-n-a-in-n-a-bd9b21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43750%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43003-n-a-in-n-a-bd9af9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43003%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43002-n-a-in-n-a-bd9af1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43002%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9af1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43001-n-a-in-n-a-bd9ae9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43001%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9ae9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43000-n-a-in-n-a-bd9aa2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43000%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42999-n-a-in-n-a-bd9a9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42999%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd9a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42998-n-a-in-n-a-bd9a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42998%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42468-cwe-20-improper-input-validation-in-apache-software-foundation-apache-flume-bd9a8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42468%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Flume&amp;severity=critical&amp;id=682d981bc4522896dcbd9a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3363-cwe-840-business-logic-errors-in-ikus060-ikus060-rdiffweb-bd903d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3363%3A%20CWE-840%20Business%20Logic%20Errors%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=low&amp;id=682d981ac4522896dcbd903d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39944-remote-code-execution-vulnerability-in-apache-software-foundation-apache-linkis-bd9035</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39944%3A%20Remote%20code%20execution%20vulnerability%20in%20Apache%20Software%20Foundation%20Apache%20Linkis&amp;severity=high&amp;id=682d981ac4522896dcbd9035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37202-n-a-in-n-a-bd900b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37202%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd900b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2782-insufficient-session-expiration-in-octopus-deploy-octopus-server-bd8fea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2782%3A%20Insufficient%20Session%20Expiration%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=critical&amp;id=682d981ac4522896dcbd8fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-26-f26ed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-26&amp;severity=medium&amp;id=682acdc4bbaf20d303f26ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-26-f12244</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12244</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38435-improper-input-validation-cwe-20-in-adobe-illustrator-bf47dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38435%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9845c4522896dcbf47dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38436-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf47fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38436%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9845c4522896dcbf47fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27622-cwe-918-server-side-request-forgery-ssrf-in-synology-diskstation-manager-dsm-bd8fe2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27622%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=682d981ac4522896dcbd8fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27623-cwe-306-missing-authentication-for-critical-function-in-synology-diskstation-manager-dsm-bd8fb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27623%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=high&amp;id=682d981ac4522896dcbd8fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36783-reflected-cross-site-scripting-rxss-in-algosec-fireflow-a32-0-bd8fa1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36783%3A%20Reflected%20Cross-Site-Scripting%20(RXSS)%20in%20AlgoSec%20FireFlow%20A32.0&amp;severity=medium&amp;id=682d981ac4522896dcbd8fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39345-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-flipped-aurora-gin-vue-admin-bf6a71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39345%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flipped-aurora%20gin-vue-admin&amp;severity=medium&amp;id=682d9849c4522896dcbf6a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39327-cwe-94-improper-control-of-generation-of-code-code-injection-in-azure-azure-cli-bf6a60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39327%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Azure%20azure-cli&amp;severity=medium&amp;id=682d9849c4522896dcbf6a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39322-cwe-285-improper-authorization-in-keystonejs-keystone-bf6a51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39322%3A%20CWE-285%3A%20Improper%20Authorization%20in%20keystonejs%20keystone&amp;severity=medium&amp;id=682d9849c4522896dcbf6a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39312-cwe-20-improper-input-validation-in-dataease-dataease-bf6a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39312%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20dataease%20dataease&amp;severity=medium&amp;id=682d9849c4522896dcbf6a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39354-cwe-670-always-incorrect-control-flow-implementation-in-rust-blockchain-evm-bf494f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39354%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20rust-blockchain%20evm&amp;severity=medium&amp;id=682d9846c4522896dcbf494f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39351-cwe-312-cleartext-storage-of-sensitive-information-in-dependencytrack-dependency-track-bf4947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39351%3A%20CWE-312%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20DependencyTrack%20dependency-track&amp;severity=medium&amp;id=682d9846c4522896dcbf4947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39350-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dependencytrack-frontend-bf4934</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39350%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DependencyTrack%20frontend&amp;severity=medium&amp;id=682d9846c4522896dcbf4934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39349-cwe-441-unintended-proxy-or-intermediary-confused-deputy-in-tasks-tasks-bf4923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39349%3A%20CWE-441%3A%20Unintended%20Proxy%20or%20Intermediary%20(&apos;Confused%20Deputy&apos;)%20in%20tasks%20tasks&amp;severity=medium&amp;id=682d9846c4522896dcbf4923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39342-cwe-285-improper-authorization-in-openfga-openfga-bf490c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39342%3A%20CWE-285%3A%20Improper%20Authorization%20in%20openfga%20openfga&amp;severity=medium&amp;id=682d9846c4522896dcbf490c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39341-cwe-285-improper-authorization-in-openfga-openfga-bf4904</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39341%3A%20CWE-285%3A%20Improper%20Authorization%20in%20openfga%20openfga&amp;severity=medium&amp;id=682d9846c4522896dcbf4904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39340-cwe-285-improper-authorization-in-openfga-openfga-bf48fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39340%3A%20CWE-285%3A%20Improper%20Authorization%20in%20openfga%20openfga&amp;severity=medium&amp;id=682d9846c4522896dcbf48fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39326-cwe-94-improper-control-of-generation-of-code-code-injection-in-kartverket-github-workflows-bf48a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39326%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20kartverket%20github-workflows&amp;severity=medium&amp;id=682d9846c4522896dcbf48a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39321-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-actions-runner-bf4899</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39321%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20actions%20runner&amp;severity=medium&amp;id=682d9846c4522896dcbf4899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39315-cwe-204-observable-response-discrepancy-in-getkirby-kirby-bf4884</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39315%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682d9846c4522896dcbf4884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3394-cwe-94-improper-control-of-generation-of-code-code-injection-in-unknown-wp-all-export-pro-bd9a54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3394%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Unknown%20WP%20All%20Export%20Pro&amp;severity=high&amp;id=682d981bc4522896dcbd9a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3393-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-unknown-post-to-csv-by-bestwebsoft-bd9a45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3393%3A%20CWE-1236%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20Unknown%20Post%20to%20CSV%20by%20BestWebSoft&amp;severity=critical&amp;id=682d981bc4522896dcbd9a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3392-cwe-79-cross-site-scripting-xss-in-unknown-wp-humans-txt-bd9a40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3392%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Humans.txt&amp;severity=medium&amp;id=682d981bc4522896dcbd9a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33184-stack-buffer-overflow-and-code-execution-in-brocade-fabric-os-bd9a38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33184%3A%20Stack%20Buffer%20Overflow%20and%20Code%20Execution%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d981bc4522896dcbd9a38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33183-stack-buffer-overflow-in-brocade-fabric-os-bd9a1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33183%3A%20Stack%20Buffer%20Overflow%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d981bc4522896dcbd9a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33182-privilege-escalation-in-brocade-fabric-os-bd98ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33182%3A%20Privilege%20escalation%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d981bc4522896dcbd98ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33181-information-disclosure-vulnerability-in-brocade-fabric-os-bd98b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33181%3A%20Information%20disclosure%20vulnerability%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=682d981bc4522896dcbd98b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41711-remote-command-execution-rce-in-badaso-bd8f95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41711%3A%20Remote%20command%20execution%20(RCE)%20in%20Badaso&amp;severity=critical&amp;id=682d981ac4522896dcbd8f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3644-cwe-256-in-pulp-ansible-bd8f44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3644%3A%20CWE-256%20in%20pulp_ansible&amp;severity=medium&amp;id=682d981ac4522896dcbd8f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3395-cwe-89-sql-injection-in-unknown-wp-all-export-pro-bd8d21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3395%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20All%20Export%20Pro&amp;severity=high&amp;id=682d9819c4522896dcbd8d21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3246-cwe-89-sql-injection-in-unknown-blog2social-social-media-auto-post-scheduler-bd8d1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3246%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=high&amp;id=682d9819c4522896dcbd8d1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3097-cwe-352-cross-site-request-forgery-csrf-in-unknown-plugin-lbstopattack-bd8d19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3097%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Plugin%20LBstopattack&amp;severity=medium&amp;id=682d9819c4522896dcbd8d19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38870-n-a-in-n-a-bd8d15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38870%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38162-n-a-in-n-a-bd8c73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38162%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36454-n-a-in-n-a-bd8c6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36454%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36453-n-a-in-n-a-bd8c6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36453%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36452-n-a-in-n-a-bd8c67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36452%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd8c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36451-n-a-in-n-a-bd8bda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36451%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8bda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35739-n-a-in-n-a-bd8b54</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35739%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8b54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35132-n-a-in-n-a-bd8b4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35132%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33178-improper-input-validation-in-brocade-fabric-os-bd8b31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33178%3A%20Improper%20input%20validation%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d9819c4522896dcbd8b31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2762-cwe-352-cross-site-request-forgery-csrf-in-unknown-adminpad-bd859d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2762%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20AdminPad&amp;severity=medium&amp;id=682d9819c4522896dcbd859d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28169-privilege-escalation-in-brocade-fabric-os-bd76f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28169%3A%20Privilege%20escalation%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd76f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28170-insertion-of-sensitive-information-into-debugging-code-in-brocade-fabric-os-bd76f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28170%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Debugging%20Code%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd76f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33179-exposure-of-sensitive-information-to-an-unauthorized-actor-in-brocade-fabric-os-bd76dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33179%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd76dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33180-improper-authorization-in-brocade-fabric-os-bd765d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33180%3A%20Improper%20Authorization%20in%20Brocade%20Fabric%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd765d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33185-stack-buffer-overflow-in-brocade-fabric-os-bd75d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33185%3A%20Stack%20Buffer%20Overflow%20in%20Brocade%20Fabric%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd75d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34870-cross-site-scripting-xss-via-data-injection-in-apache-software-foundation-apache-geode-bd74fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34870%3A%20Cross-Site%20Scripting%20(XSS)%20via%20data%20injection%20in%20Apache%20Software%20Foundation%20Apache%20Geode&amp;severity=medium&amp;id=682d9817c4522896dcbd74fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3247-cwe-918-server-side-request-forgery-ssrf-in-unknown-blog2social-social-media-auto-post-scheduler-bd74ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3247%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Blog2Social%3A%20Social%20Media%20Auto%20Post%20%26%20Scheduler&amp;severity=medium&amp;id=682d9817c4522896dcbd74ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3391-cwe-79-cross-site-scripting-xss-in-unknown-retain-live-chat-bd74df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3391%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Retain%20Live%20Chat&amp;severity=medium&amp;id=682d9817c4522896dcbd74df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3350-cwe-79-cross-site-scripting-xss-in-unknown-contact-bank-contact-form-builder-for-wordpress-bd74db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3350%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Contact%20Bank%20%E2%80%93%20Contact%20Form%20Builder%20for%20WordPress&amp;severity=medium&amp;id=682d9817c4522896dcbd74db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3335-cwe-502-deserialization-of-untrusted-data-in-unknown-kadence-woocommerce-email-designer-bd74bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3335%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Kadence%20WooCommerce%20Email%20Designer&amp;severity=high&amp;id=682d9817c4522896dcbd74bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3302-cwe-89-sql-injection-in-unknown-spam-protection-antispam-firewall-by-cleantalk-bd74b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3302%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Spam%20protection%2C%20AntiSpam%2C%20FireWall%20by%20CleanTalk&amp;severity=high&amp;id=682d9817c4522896dcbd74b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3300-cwe-89-sql-injection-in-unknown-form-maker-by-10web-mobile-friendly-drag-drop-contact-form-builder-bd74b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3300%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Form%20Maker%20by%2010Web%20%E2%80%93%20Mobile-Friendly%20Drag%20%26%20Drop%20Contact%20Form%20Builder&amp;severity=high&amp;id=682d9817c4522896dcbd74b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-25-f127f3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33757-broken-access-control-in-tenable-inc-tenable-nessus-bd98be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33757%3A%20Broken%20Access%20Control%20in%20Tenable%2C%20Inc.%20Tenable%20Nessus&amp;severity=medium&amp;id=682d981bc4522896dcbd98be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29851-n-a-in-n-a-bd98a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29851%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd98a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31468-n-a-in-n-a-bd76f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31468%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd76f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38117-cwe-798-use-of-hard-coded-credentials-in-juiker-juiker-app-bd9b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38117%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Juiker%20Juiker%20app&amp;severity=medium&amp;id=682d981bc4522896dcbd9b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43680-na-in-na-17a7b809</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43680%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39305-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-flipped-aurora-gin-vue-admin-bf6a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39305%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20flipped-aurora%20gin-vue-admin&amp;severity=medium&amp;id=682d9849c4522896dcbf6a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39314-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-getkirby-kirby-bf487c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39314%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682d9846c4522896dcbf487c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39313-cwe-1284-improper-validation-of-specified-quantity-in-input-in-parse-community-parse-server-bf4874</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39313%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9846c4522896dcbf4874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-4228-cwe-321-use-of-hard-coded-cryptographic-key-in-lanner-inc-iac-ast2500a-bdad3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-4228%3A%20CWE-321%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981dc4522896dcbdad3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46279-cwe-384-session-fixation-in-lanner-inc-iac-ast2500a-bd9ad0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46279%3A%20CWE-384%20Session%20Fixation%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981bc4522896dcbd9ad0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45925-cwe-203-information-exposure-through-discrepancy-in-lanner-inc-iac-ast2500a-bd9a71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45925%3A%20CWE-203%20Information%20Exposure%20Through%20Discrepancy%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981bc4522896dcbd9a71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40690-cross-site-scripting-in-bookstack-bookstack-bd9894</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40690%3A%20Cross-site%20scripting%20in%20BookStack%20BookStack&amp;severity=medium&amp;id=682d981bc4522896dcbd9894</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3344-cwe-440-in-linux-kernel-bd9890</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3344%3A%20CWE-440%20in%20Linux%20kernel&amp;severity=medium&amp;id=682d981bc4522896dcbd9890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39837-n-a-in-n-a-bd986d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39837%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd986d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39836-n-a-in-n-a-bd9869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39836%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38580-n-a-in-n-a-bd9865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38580%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36368-cross-site-scripting-in-ipfire-project-ipfire-bd9861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36368%3A%20Cross-site%20scripting%20in%20IPFire%20Project%20IPFire&amp;severity=medium&amp;id=682d981bc4522896dcbd9861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46850-n-a-in-n-a-bd985d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46850%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbd985d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46848-n-a-in-n-a-bd9859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46848%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981bc4522896dcbd9859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26727-cwe-94-improper-control-of-generation-of-code-code-injection-in-lanner-inc-iac-ast2500a-bd9799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26727%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=critical&amp;id=682d981ac4522896dcbd9799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26729-cwe-94-improper-control-of-generation-of-code-code-injection-in-lanner-inc-iac-ast2500a-bd972f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26729%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=critical&amp;id=682d981ac4522896dcbd972f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26733-cwe-284-improper-access-control-in-lanner-inc-iac-ast2500a-bd96fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26733%3A%20CWE-284%20Improper%20Access%20Control%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981ac4522896dcbd96fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26732-cwe-284-improper-access-control-in-lanner-inc-iac-ast2500a-bd96f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26732%3A%20CWE-284%20Improper%20Access%20Control%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981ac4522896dcbd96f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26731-cwe-94-improper-control-of-generation-of-code-code-injection-in-lanner-inc-iac-ast2500a-bd96e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26731%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=critical&amp;id=682d981ac4522896dcbd96e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26730-cwe-121-stack-based-buffer-overflow-in-lanner-inc-iac-ast2500a-bd96de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26730%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=critical&amp;id=682d981ac4522896dcbd96de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44776-cwe-284-improper-access-control-in-lanner-inc-iac-ast2500a-bd96b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44776%3A%20CWE-284%20Improper%20Access%20Control%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981ac4522896dcbd96b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44769-cwe-20-improper-input-validation-in-lanner-inc-iac-ast2500a-bd9694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44769%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981ac4522896dcbd9694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44467-cwe-284-improper-access-control-in-lanner-inc-iac-ast2500a-bd9685</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44467%3A%20CWE-284%20Improper%20Access%20Control%20in%20Lanner%20Inc%20IAC-AST2500A&amp;severity=medium&amp;id=682d981ac4522896dcbd9685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42010-crlf-injection-in-apache-software-foundation-apache-heron-incubating-bd967d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42010%3A%20CRLF%20Injection%20in%20Apache%20Software%20Foundation%20Apache%20Heron%20(Incubating)&amp;severity=critical&amp;id=682d981ac4522896dcbd967d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3676-cwe-20-improper-input-validation-in-the-eclipse-foundation-eclipse-openj9-bd9669</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3676%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20The%20Eclipse%20Foundation%20Eclipse%20OpenJ9&amp;severity=medium&amp;id=682d981ac4522896dcbd9669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41796-untrusted-search-path-vulnerability-in-sony-corporation-content-transfer-for-windows-bd9618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41796%3A%20Untrusted%20search%20path%20vulnerability%20in%20Sony%20Corporation%20Content%20Transfer%20(for%20Windows)&amp;severity=high&amp;id=682d981ac4522896dcbd9618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40984-stack-based-buffer-overflow-in-yokogawa-test-measurement-corporation-wtviewere-series-bd9614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40984%3A%20Stack-based%20Buffer%20Overflow%20in%20Yokogawa%20Test%20%26%20Measurement%20Corporation%20WTViewerE%20series&amp;severity=critical&amp;id=682d981ac4522896dcbd9614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41986-exposure-of-sensitive-information-to-an-unauthorized-actor-in-internet-initiative-japan-inc-iij-smartkey-bd95f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41986%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Internet%20Initiative%20Japan%20Inc.%20IIJ%20SmartKey&amp;severity=high&amp;id=682d981ac4522896dcbd95f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41799-improper-access-control-in-weseek-inc-growi-v5-series-and-v4-series-bd95f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41799%3A%20Improper%20Access%20Control%20in%20WESEEK%2C%20Inc.%20GROWI%20v5%20series%20and%20v4%20series&amp;severity=medium&amp;id=682d981ac4522896dcbd95f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41797-improper-authorization-in-handler-for-custom-url-scheme-in-bytedance-k-k-lemon8-app-for-android-and-lemon8-app-for-ios-bd95da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41797%3A%20Improper%20Authorization%20in%20Handler%20for%20Custom%20URL%20Scheme%20in%20ByteDance%20K.K.%20Lemon8%20App%20for%20Android%20and%20Lemon8%20App%20for%20iOS&amp;severity=medium&amp;id=682d981ac4522896dcbd95da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-24-f125ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f125ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-23-f12154</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-22-f121b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f121b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34439-cwe-770-allocation-of-resources-without-limits-or-throttling-in-dell-powerscale-onefs-bd98dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34439%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d981bc4522896dcbd98dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34438-other-in-dell-powerscale-onefs-bd9708</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34438%3A%20Other%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d981ac4522896dcbd9708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34437-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-powerscale-onefs-bd96c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34437%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d981ac4522896dcbd96c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31239-cwe-532-information-exposure-through-log-files-in-dell-powerscale-onefs-bd965a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31239%3A%20CWE-532%3A%20Information%20Exposure%20Through%20Log%20Files%20in%20Dell%20PowerScale%20OneFS&amp;severity=medium&amp;id=682d981ac4522896dcbd965a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26870-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-dell-powerstore-bd9652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26870%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20Dell%20PowerStore&amp;severity=high&amp;id=682d981ac4522896dcbd9652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-5355-cwe-276-incorrect-default-permissions-in-dell-isilon-onefs-bd964c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-5355%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20Isilon%20OneFS&amp;severity=medium&amp;id=682d981ac4522896dcbd964c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3203-cwe-912-hidden-functionality-in-oring-iap-420-bd98e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3203%3A%20CWE-912%20Hidden%20Functionality%20in%20ORing%20IAP-420(%2B)&amp;severity=critical&amp;id=682d981bc4522896dcbd98e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39259-cwe-20-improper-input-validation-in-skylot-jadx-bf69c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39259%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20skylot%20jadx&amp;severity=medium&amp;id=682d9849c4522896dcbf69c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23462-cwe-120-buffer-overflow-in-softmotions-iowow-bf6883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23462%3A%20CWE-120%20Buffer%20Overflow%20in%20Softmotions%20iowow&amp;severity=medium&amp;id=682d9849c4522896dcbf6883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3633-cwe-401-memory-leak-in-linux-kernel-bf4a4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3633%3A%20CWE-401%20Memory%20Leak%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d9846c4522896dcbf4a4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3629-cwe-401-memory-leak-in-linux-kernel-bf4a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3629%3A%20CWE-401%20Memory%20Leak%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d9846c4522896dcbf4a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39272-cwe-1284-improper-validation-of-specified-quantity-in-input-in-fluxcd-flux2-bf4829</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39272%3A%20CWE-1284%3A%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20fluxcd%20flux2&amp;severity=medium&amp;id=682d9845c4522896dcbf4829</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42189-n-a-in-n-a-bd9812</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd9812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41575-n-a-in-n-a-bd980e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41575%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ac4522896dcbd980e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41310-memory-corruption-read-in-autodesk-design-review-bd97d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41310%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd97d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3639-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-bd97d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3639%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d981ac4522896dcbd97d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3627-out-of-bounds-read-in-libtiff-in-libtiff-libtiff-bd97bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3627%3A%20Out-of-bounds%20read%20in%20libtiff%20in%20libtiff%20libtiff&amp;severity=medium&amp;id=682d981ac4522896dcbd97bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41309-memory-corruption-read-in-autodesk-design-review-bd979f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41309%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd979f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3626-out-of-bounds-write-in-libtiff-in-libtiff-libtiff-bd9795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3626%3A%20Out-of-bounds%20write%20in%20libtiff%20in%20libtiff%20libtiff&amp;severity=medium&amp;id=682d981ac4522896dcbd9795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43400-cwe-1390-none-in-siemens-siveillance-video-mobile-server-v2022-r2-bd9675</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43400%3A%20CWE-1390%3A%20None%20in%20Siemens%20Siveillance%20Video%20Mobile%20Server%20V2022%20R2&amp;severity=critical&amp;id=682d981ac4522896dcbd9675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42944-memory-corruption-vulnerability-in-autodesk-design-review-bd966d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42944%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd966d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42943-memory-corruption-vulnerability-in-autodesk-design-review-bd9646</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42943%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd9646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42941-memory-corruption-vulnerability-in-autodesk-design-review-bd9620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42941%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd9620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42940-memory-corruption-vulnerability-in-autodesk-design-review-bd961c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42940%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd961c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42939-memory-corruption-vulnerability-in-autodesk-design-review-bd8f9d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42939%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42938-memory-corruption-vulnerability-in-autodesk-design-review-bd8f85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42938%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42937-memory-corruption-read-in-autodesk-design-review-bd8f7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42937%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42936-memory-corruption-read-in-autodesk-design-review-bd8f6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42936%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42935-memory-corruption-read-in-autodesk-design-review-bd8f64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42935%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42934-memory-corruption-read-in-autodesk-design-review-bd8ee2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42934%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8ee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42933-memory-corruption-read-in-autodesk-design-review-bd8ed5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42933%3A%20Memory%20corruption%20Read%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d981ac4522896dcbd8ed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3570-heap-based-buffer-overflow-in-libtiff-in-libtiff-libtiff-bd8e1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3570%3A%20Heap-based%20buffer%20overflow%20in%20libtiff%20in%20libtiff%20libtiff&amp;severity=high&amp;id=682d9819c4522896dcbd8e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42553-buffer-overflow-in-stmicroelectronics-stm32cube-stm32-usb-host-library-bd8d00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42553%3A%20buffer%20overflow%20in%20STMicroelectronics%20STM32Cube%20STM32%20USB%20Host%20Library&amp;severity=medium&amp;id=682d9819c4522896dcbd8d00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3599-out-of-bounds-read-in-libtiff-in-libtiff-libtiff-bd8bfe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3599%3A%20Out-of-bounds%20read%20in%20libtiff%20in%20libtiff%20libtiff&amp;severity=medium&amp;id=682d9819c4522896dcbd8bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3598-out-of-bounds-read-in-libtiff-in-libtiff-libtiff-bd8bde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3598%3A%20Out-of-bounds%20read%20in%20libtiff%20in%20libtiff%20libtiff&amp;severity=medium&amp;id=682d9819c4522896dcbd8bde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3597-out-of-bounds-read-in-libtiff-in-libtiff-libtiff-bd8b21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3597%3A%20Out-of-bounds%20read%20in%20libtiff%20in%20libtiff%20libtiff&amp;severity=medium&amp;id=682d9819c4522896dcbd8b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42942-memory-corruption-vulnerability-in-autodesk-design-review-bd85a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42942%3A%20Memory%20corruption%20vulnerability%20in%20Autodesk%20Design%20Review&amp;severity=high&amp;id=682d9819c4522896dcbd85a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42206-n-a-in-n-a-bd8591</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42206%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42205-n-a-in-n-a-bd856b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42205%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd856b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37454-n-a-in-n-a-bd855e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37454%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd855e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36122-n-a-in-n-a-bd8527</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36122%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-21-f12b42</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38108-cwe-502-deserialization-of-untrusted-data-in-solarwinds-solarwinds-platform-bd84fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38108%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=high&amp;id=682d9819c4522896dcbd84fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36958-cwe-502-deserialization-of-untrusted-data-in-solarwinds-solarwinds-platform-bd865d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36958%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=high&amp;id=682d9819c4522896dcbd865d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36957-cwe-502-deserialization-of-untrusted-data-in-solarwinds-solarwinds-platform-bdad90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36957%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=high&amp;id=682d981dc4522896dcbdad90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36966-insecure-direct-object-reference-vulnerability-orion-platform-2020-2-6-in-solarwinds-solarwinds-platform-bd8b09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36966%3A%20Insecure%20Direct%20Object%20Reference%20Vulnerability%3A%20Orion%20Platform%202020.2.6%20in%20SolarWinds%20SolarWinds%20Platform&amp;severity=medium&amp;id=682d9819c4522896dcbd8b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3576-cwe-125-out-of-bounds-read-in-synology-diskstation-manager-dsm-bdadaa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3576%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=medium&amp;id=682d981dc4522896dcbdadaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27624-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-synology-diskstation-manager-dsm-bd97fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27624%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=critical&amp;id=682d981ac4522896dcbd97fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27625-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-synology-diskstation-manager-dsm-bd8b01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27625%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=critical&amp;id=682d9819c4522896dcbd8b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27626-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-synology-diskstation-manager-dsm-bd861d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27626%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Synology%20DiskStation%20Manager%20(DSM)&amp;severity=critical&amp;id=682d9819c4522896dcbd861d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42233-n-a-in-n-a-bd85fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42233%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd85fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42201-n-a-in-n-a-bd85a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42201%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd85a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42200-n-a-in-n-a-bd8482</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42200%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42199-n-a-in-n-a-bd847c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42199%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd847c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42198-n-a-in-n-a-bd8478</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42198%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42197-n-a-in-n-a-bd845e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42197%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd845e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42176-n-a-in-n-a-bd844e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42176%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd844e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42021-n-a-in-n-a-bd844a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd844a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41358-n-a-in-n-a-bd8446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41358%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd8446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40084-n-a-in-n-a-bd843e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40084%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9819c4522896dcbd843e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37298-n-a-in-n-a-bd843a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37298%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9819c4522896dcbd843a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31366-n-a-in-n-a-bd8414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31366%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9819c4522896dcbd8414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26954-n-a-in-n-a-bd8329</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd8329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33231-n-a-in-n-a-bd82de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33231%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd82de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9285-n-a-in-n-a-bd82da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9285%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd82da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-12744-n-a-in-n-a-bd82d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-12744%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd82d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3577-cwe-401-in-kernel-bd8128</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3577%3A%20CWE-401%20in%20Kernel&amp;severity=high&amp;id=682d9818c4522896dcbd8128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39823-n-a-in-n-a-bd8124</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39823%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd8124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37453-n-a-in-n-a-bd80d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37453%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd80d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-20-f12e2e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41983-cwe-319-cleartext-transmission-of-sensitive-information-in-f5-big-ip-bd8321</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41983%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20F5%20BIG-IP&amp;severity=low&amp;id=682d9818c4522896dcbd8321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41836-cwe-20-improper-input-validation-in-f5-big-ip-advanced-waf-asm-bd8b29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41836%3A%20CWE-20%20Improper%20Input%20Validation%20in%20F5%20BIG-IP%20Advanced%20WAF%20%26%20ASM&amp;severity=high&amp;id=682d9819c4522896dcbd8b29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41835-cwe-269-improper-privilege-management-in-f5-f5os-a-bd8b25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41835%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20F5%20F5OS-A&amp;severity=high&amp;id=682d9819c4522896dcbd8b25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41833-cwe-400-uncontrolled-resource-consumption-in-f5-big-ip-bd8a8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41833%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9819c4522896dcbd8a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41832-cwe-401-missing-release-of-memory-after-effective-lifetime-in-f5-big-ip-bd8335</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41832%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9818c4522896dcbd8335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41813-cwe-20-improper-input-validation-in-f5-big-ip-afm-pem-bd80e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41813%3A%20CWE-20%20Improper%20Input%20Validation%20in%20F5%20BIG-IP%20AFM%20%26%20PEM&amp;severity=medium&amp;id=682d9818c4522896dcbd80e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41806-cwe-400-uncontrolled-resource-consumption-in-f5-big-ip-afm-bd80e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41806%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20F5%20BIG-IP%20AFM&amp;severity=high&amp;id=682d9818c4522896dcbd80e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41787-cwe-476-null-pointer-dereference-in-f5-big-ip-dns-bda126</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41787%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20F5%20BIG-IP%20DNS&amp;severity=high&amp;id=682d981bc4522896dcbda126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41780-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-f5-f5os-a-bd80de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41780%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20F5%20F5OS-A&amp;severity=medium&amp;id=682d9818c4522896dcbd80de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41770-cwe-400-uncontrolled-resource-consumption-in-f5-big-ip-bd831d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41770%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9818c4522896dcbd831d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41743-cwe-787-out-of-bounds-write-in-f5-nginx-plus-bd830c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41743%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20NGINX%20Plus&amp;severity=high&amp;id=682d9818c4522896dcbd830c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41742-cwe-787-out-of-bounds-write-in-f5-nginx-bd82ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41742%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20NGINX&amp;severity=high&amp;id=682d9818c4522896dcbd82ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41741-cwe-787-out-of-bounds-write-in-f5-nginx-bd82ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41741%3A%20CWE-787%20Out-of-bounds%20Write%20in%20F5%20NGINX&amp;severity=high&amp;id=682d9818c4522896dcbd82ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41694-cwe-20-improper-input-validation-in-f5-big-ip-bd82e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41694%3A%20CWE-20%20Improper%20Input%20Validation%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9818c4522896dcbd82e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41691-cwe-763-release-of-invalid-pointer-or-reference-in-f5-big-ip-advanced-waf-asm-bd82e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41691%3A%20CWE-763%20Release%20of%20Invalid%20Pointer%20or%20Reference%20in%20F5%20BIG-IP%20Advanced%20WAF%20%26%20ASM&amp;severity=high&amp;id=682d9818c4522896dcbd82e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41624-cwe-401-missing-release-of-memory-after-effective-lifetime-in-f5-big-ip-bd826d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41624%3A%20CWE-401%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20F5%20BIG-IP&amp;severity=high&amp;id=682d9818c4522896dcbd826d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41617-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-f5-big-ip-advanced-waf-asm-bd8254</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41617%3A%20CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20F5%20BIG-IP%20Advanced%20WAF%20%26%20ASM&amp;severity=high&amp;id=682d9818c4522896dcbd8254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36795-cwe-682-incorrect-calculation-in-f5-big-ip-bd8241</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36795%3A%20CWE-682%20Incorrect%20Calculation%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9818c4522896dcbd8241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38107-cwe-209-information-exposure-through-an-error-message-in-solarwinds-sql-sentry-bd8245</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38107%3A%20CWE-209%20Information%20Exposure%20Through%20an%20Error%20Message%20in%20SolarWinds%20SQL%20Sentry&amp;severity=medium&amp;id=682d9818c4522896dcbd8245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25749-buffer-over-read-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf7038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25749%3A%20Buffer%20Over-read%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d9849c4522896dcbf7038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25748-integer-overflow-to-buffer-overflow-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bf7030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25748%3A%20Integer%20Overflow%20to%20Buffer%20Overflow%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d9849c4522896dcbf7030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39301-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-momofoolish-sra-admin-bf6a22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39301%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20momofoolish%20sra-admin&amp;severity=medium&amp;id=682d9849c4522896dcbf6a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39233-cwe-862-missing-authorization-in-enalean-tuleap-bf69aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39233%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9849c4522896dcbf69aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39267-cwe-287-improper-authentication-in-brokercap-bifrost-bf4821</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39267%3A%20CWE-287%3A%20Improper%20Authentication%20in%20brokercap%20Bifrost&amp;severity=medium&amp;id=682d9845c4522896dcbf4821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43435-vulnerability-in-jenkins-project-jenkins-360-fireline-plugin-bd829e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43435%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20360%20FireLine%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd829e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43434-vulnerability-in-jenkins-project-jenkins-neuvector-vulnerability-scanner-plugin-bd829a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43434%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NeuVector%20Vulnerability%20Scanner%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd829a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43433-vulnerability-in-jenkins-project-jenkins-screenrecorder-plugin-bd8296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43433%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20ScreenRecorder%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8296</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43432-vulnerability-in-jenkins-project-jenkins-xframium-builder-plugin-bd8292</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43432%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20XFramium%20Builder%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43431-vulnerability-in-jenkins-project-jenkins-compuware-strobe-measurement-plugin-bd828e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43431%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Strobe%20Measurement%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd828e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43430-vulnerability-in-jenkins-project-jenkins-compuware-topaz-for-total-test-plugin-bd827d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43430%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Topaz%20for%20Total%20Test%20Plugin&amp;severity=high&amp;id=682d9818c4522896dcbd827d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43423-vulnerability-in-jenkins-project-jenkins-compuware-source-code-download-for-endevor-pds-and-ispw-plugin-bd8275</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43423%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Source%20Code%20Download%20for%20Endevor%2C%20PDS%2C%20and%20ISPW%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43422-vulnerability-in-jenkins-project-jenkins-compuware-topaz-utilities-plugin-bd81f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43422%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Topaz%20Utilities%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd81f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43421-vulnerability-in-jenkins-project-jenkins-tuleap-git-branch-source-plugin-bd81f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43421%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Tuleap%20Git%20Branch%20Source%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd81f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43420-vulnerability-in-jenkins-project-jenkins-contrast-continuous-application-security-plugin-bd81ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43420%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Contrast%20Continuous%20Application%20Security%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd81ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43429-vulnerability-in-jenkins-project-jenkins-compuware-topaz-for-total-test-plugin-bd80ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43429%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Topaz%20for%20Total%20Test%20Plugin&amp;severity=high&amp;id=682d9818c4522896dcbd80ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43428-vulnerability-in-jenkins-project-jenkins-compuware-topaz-for-total-test-plugin-bd80ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43428%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Topaz%20for%20Total%20Test%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd80ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43427-vulnerability-in-jenkins-project-jenkins-compuware-topaz-for-total-test-plugin-bd80c3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43427%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Topaz%20for%20Total%20Test%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd80c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43426-vulnerability-in-jenkins-project-jenkins-s3-explorer-plugin-bd80a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43426%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20S3%20Explorer%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd80a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43425-vulnerability-in-jenkins-project-jenkins-custom-checkbox-parameter-plugin-bd80a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43425%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Custom%20Checkbox%20Parameter%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd80a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43419-vulnerability-in-jenkins-project-jenkins-katalon-plugin-bd8095</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43419%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Katalon%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43418-vulnerability-in-jenkins-project-jenkins-katalon-plugin-bd8091</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43418%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Katalon%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43417-vulnerability-in-jenkins-project-jenkins-katalon-plugin-bd808d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43417%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Katalon%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd808d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43416-vulnerability-in-jenkins-project-jenkins-katalon-plugin-bd8028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43416%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Katalon%20Plugin&amp;severity=high&amp;id=682d9818c4522896dcbd8028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43414-vulnerability-in-jenkins-project-jenkins-nunit-plugin-bd8024</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43414%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NUnit%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43413-vulnerability-in-jenkins-project-jenkins-job-import-plugin-bd8020</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43413%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Job%20Import%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43412-vulnerability-in-jenkins-project-jenkins-generic-webhook-trigger-plugin-bd8011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43412%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Generic%20Webhook%20Trigger%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd8011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43411-vulnerability-in-jenkins-project-jenkins-gitlab-plugin-bd7ffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43411%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20GitLab%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd7ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43410-vulnerability-in-jenkins-project-jenkins-mercurial-plugin-bd7ff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43410%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Mercurial%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd7ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43037-n-a-in-n-a-bd7ff4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3608-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thorsten-thorsten-phpmyfaq-bd7fec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3608%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thorsten%20thorsten%2Fphpmyfaq&amp;severity=high&amp;id=682d9818c4522896dcbd7fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43409-vulnerability-in-jenkins-project-jenkins-pipeline-supporting-apis-plugin-bd7fe0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43409%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Pipeline%3A%20Supporting%20APIs%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd7fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43408-vulnerability-in-jenkins-project-jenkins-pipeline-stage-view-plugin-bd7fdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43408%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Pipeline%3A%20Stage%20View%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd7fdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43407-vulnerability-in-jenkins-project-jenkins-pipeline-input-step-plugin-bd7fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43407%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Pipeline%3A%20Input%20Step%20Plugin&amp;severity=high&amp;id=682d9818c4522896dcbd7fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43185-n-a-in-n-a-bd7f97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43185%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43184-n-a-in-n-a-bd7f8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43184%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43039-n-a-in-n-a-bd7f87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43038-n-a-in-n-a-bd7f83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43035-n-a-in-n-a-bd7f74</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43035%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43034-n-a-in-n-a-bd7f64</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43034%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43033-n-a-in-n-a-bd7f3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43033%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43032-n-a-in-n-a-bd7f36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43032%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43029-n-a-in-n-a-bd7f32</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43029%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43028-n-a-in-n-a-bd7f17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7f17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43027-n-a-in-n-a-bd7f0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40798-n-a-in-n-a-bd7f07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40798%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd7f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43014-n-a-in-n-a-bd7ebc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43014%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42466-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apache-software-foundation-apache-isis-bd7eb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42466%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Isis&amp;severity=medium&amp;id=682d9818c4522896dcbd7eb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42227-n-a-in-n-a-bd7ea0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42227%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd7ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41709-remote-command-execution-rce-in-markdownify-bd7e9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41709%3A%20Remote%20command%20execution%20(RCE)%20in%20Markdownify&amp;severity=high&amp;id=682d9818c4522896dcbd7e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41708-improper-authorization-control-for-web-services-in-relatedcode-messenger-bd7e6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41708%3A%20Improper%20authorization%20control%20for%20web%20services%20in%20relatedcode%2FMessenger&amp;severity=medium&amp;id=682d9818c4522896dcbd7e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41707-improper-authorization-control-for-web-services-in-relatedcode-messenger-bd7e63</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41707%3A%20Improper%20authorization%20control%20for%20web%20services%20in%20relatedcode%2FMessenger&amp;severity=medium&amp;id=682d9818c4522896dcbd7e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41415-n-a-in-n-a-bd7e53</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41415%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43424-vulnerability-in-jenkins-project-jenkins-compuware-xpediter-code-coverage-plugin-bd7e4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43424%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Xpediter%20Code%20Coverage%20Plugin&amp;severity=medium&amp;id=682d9818c4522896dcbd7e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43415-vulnerability-in-jenkins-project-jenkins-repo-plugin-bd7ac7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43415%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20REPO%20Plugin&amp;severity=high&amp;id=682d9818c4522896dcbd7ac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43045-n-a-in-n-a-bd7abb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43045%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7abb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43044-n-a-in-n-a-bd7ab7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43044%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7ab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43043-n-a-in-n-a-bd7aa6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43043%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43042-n-a-in-n-a-bd7a96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43042%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd7a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43040-n-a-in-n-a-bd7a92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9818c4522896dcbd7a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43026-n-a-in-n-a-bd7a8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43025-n-a-in-n-a-bd7a7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43025%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7a7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43024-n-a-in-n-a-bd7a60</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43024%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43023-n-a-in-n-a-bd7a58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43023%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7a58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43022-n-a-in-n-a-bd7a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43022%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43021-n-a-in-n-a-bd7a41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43020-n-a-in-n-a-bd7a3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43019-n-a-in-n-a-bd7a37</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43019%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9818c4522896dcbd7a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43018-n-a-in-n-a-bd7a2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9818c4522896dcbd7a2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3327-cwe-306-missing-authentication-for-critical-function-in-ikus060-ikus060-rdiffweb-bd7a27</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3327%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682d9817c4522896dcbd7a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38901-n-a-in-n-a-bd7a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38901%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35860-n-a-in-n-a-bd79f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35860%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd79f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33077-n-a-in-n-a-bd79ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33077%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd79ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31684-http-server-may-log-request-headers-in-reactor-netty-bd79e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31684%3A%20HTTP%20Server%20may%20log%20request%20headers%20in%20Reactor%20Netty&amp;severity=medium&amp;id=682d9817c4522896dcbd79e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2805-cwe-312-in-ovirt-engine-bd79de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2805%3A%20CWE-312%20in%20ovirt-engine&amp;severity=medium&amp;id=682d9817c4522896dcbd79de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25736-buffer-over-read-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bd79d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25736%3A%20Buffer%20Over-read%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=high&amp;id=682d9817c4522896dcbd79d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25720-improper-validation-of-array-index-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bd79ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25720%3A%20Improper%20Validation%20of%20Array%20Index%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=critical&amp;id=682d9817c4522896dcbd79ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43017-n-a-in-n-a-bd79ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd79ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43016-n-a-in-n-a-bd798f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43016%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd798f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43015-n-a-in-n-a-bd798b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43015%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd798b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25719-buffer-over-read-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bd7983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25719%3A%20Buffer%20Over-read%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=high&amp;id=682d9817c4522896dcbd7983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25718-cryptographic-issue-in-wlan-in-qualcomm-inc-snapdragon-auto-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bd797d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25718%3A%20Cryptographic%20Issue%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=critical&amp;id=682d9817c4522896dcbd797d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40885-n-a-in-n-a-bd7979</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40885%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40884-n-a-in-n-a-bd7975</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40884%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3607-cwe-75-failure-to-sanitize-special-elements-into-a-different-plane-special-element-injection-in-octoprint-octoprint-octoprint-bd7964</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3607%3A%20CWE-75%20Failure%20to%20Sanitize%20Special%20Elements%20into%20a%20Different%20Plane%20(Special%20Element%20Injection)%20in%20octoprint%20octoprint%2Foctoprint&amp;severity=medium&amp;id=682d9817c4522896dcbd7964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3586-cwe-416-in-linux-kernel-bd795e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3586%3A%20CWE-416%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d9817c4522896dcbd795e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25687-buffer-copy-without-checking-size-of-input-in-video-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-bd7954</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25687%3A%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20in%20Video%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=high&amp;id=682d9817c4522896dcbd7954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25666-use-after-free-in-dsp-services-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-bd7930</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25666%3A%20Use%20After%20Free%20in%20DSP%20Services%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=medium&amp;id=682d9817c4522896dcbd7930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23734-cwe-502-deserialization-of-untrusted-data-in-github-github-enterprise-server-bd7928</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23734%3A%20CWE-502%09Deserialization%20of%20Untrusted%20Data%20in%20GitHub%20GitHub%20Enterprise%20Server&amp;severity=high&amp;id=682d9817c4522896dcbd7928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23241-arbitrary-data-modification-in-clustered-data-ontap-bd7920</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23241%3A%20Arbitrary%20Data%20Modification%20in%20Clustered%20Data%20ONTAP&amp;severity=high&amp;id=682d9817c4522896dcbd7920</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1414-cwe-1173-in-3scale-amp-system-bd790d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1414%3A%20CWE-1173%20in%203scale-amp-system&amp;severity=high&amp;id=682d9817c4522896dcbd790d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-23648-n-a-in-n-a-bd7905</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-23648%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd7905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2016-20016-n-a-in-n-a-bd78fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2016-20016%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd78fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-4281-cwe-276-in-red-hat-openshift-bd78d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-4281%3A%20CWE-276%20in%20Red%20Hat%20Openshift&amp;severity=medium&amp;id=682d9817c4522896dcbd78d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-4253-cwe-377-in-red-hat-openshift-bd78a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-4253%3A%20CWE-377%20in%20Red%20Hat%20Openshift&amp;severity=high&amp;id=682d9817c4522896dcbd78a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-19-f1287d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f1287d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39058-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-changing-information-technology-inc-rava-certificate-validation-system-bd78c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39058%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Changing%20Information%20Technology%20Inc.%20RAVA%20certificate%20validation%20system&amp;severity=high&amp;id=682d9817c4522896dcbd78c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39057-cwe-78-os-command-injection-in-changing-information-technology-inc-rava-certificate-validation-system-bd7eff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39057%3A%20CWE-78%20OS%20Command%20Injection%20in%20Changing%20Information%20Technology%20Inc.%20RAVA%20certificate%20validation%20system&amp;severity=high&amp;id=682d9818c4522896dcbd7eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39056-cwe-89-sql-injection-in-changing-information-technology-inc-rava-certificate-validation-system-bd7958</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39056%3A%20CWE-89%20SQL%20Injection%20in%20Changing%20Information%20Technology%20Inc.%20RAVA%20certificate%20validation%20system&amp;severity=critical&amp;id=682d9817c4522896dcbd7958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39055-cwe-918-server-side-request-forgery-ssrf-in-changing-information-technology-inc-rava-certificate-validation-system-bd7924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39055%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Changing%20Information%20Technology%20Inc.%20RAVA%20certificate%20validation%20system&amp;severity=medium&amp;id=682d9817c4522896dcbd7924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22251-cwe-257-storing-passwords-in-a-recoverable-format-in-juniper-networks-junos-os-bd7f6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22251%3A%20CWE-257%20Storing%20Passwords%20in%20a%20Recoverable%20Format%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9818c4522896dcbd7f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22250-denial-of-service-dos-in-juniper-networks-junos-os-bd791c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22250%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd791c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22249-denial-of-service-dos-in-juniper-networks-junos-os-bd78b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22249%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd78b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22248-cwe-732-incorrect-permission-assignment-for-critical-resource-in-juniper-networks-junos-os-evolved-bd78aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22248%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=682d9817c4522896dcbd78aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22247-cwe-20-improper-input-validation-in-juniper-networks-junos-os-evolved-bd7892</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22247%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=682d9817c4522896dcbd7892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22246-cwe-829-inclusion-of-functionality-from-untrusted-control-sphere-in-juniper-networks-junos-os-bd7874</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22246%3A%20CWE-829%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd7874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22245-cwe-23-relative-path-traversal-in-juniper-networks-junos-os-bd7863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22245%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd7863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22244-cwe-91-xml-injection-aka-blind-xpath-injection-in-juniper-networks-junos-os-bd7839</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22244%3A%20CWE-91%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd7839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22243-cwe-20-improper-input-validation-in-juniper-networks-junos-os-bd7828</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22243%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd7828</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22242-cwe-79-cross-site-scripting-xss-in-juniper-networks-junos-os-bd7822</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22242%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd7822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22241-cwe-20-improper-input-validation-in-juniper-networks-junos-os-bd7800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22241%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd7800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22240-denial-of-service-dos-in-juniper-networks-junos-os-bd77f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22240%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd77f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22239-cwe-250-execution-with-unnecessary-privileges-in-juniper-networks-junos-os-evolved-bd729c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22239%3A%20CWE-250%20Execution%20with%20Unnecessary%20Privileges%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=682d9817c4522896dcbd729c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22238-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-juniper-networks-junos-os-bd7298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22238%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd7298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22237-cwe-287-improper-authentication-in-juniper-networks-junos-os-bd728b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22237%3A%20CWE-287%20Improper%20Authentication%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd728b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22236-cwe-824-access-of-uninitialized-pointer-in-juniper-networks-junos-os-bd7287</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22236%3A%20CWE-824%20Access%20of%20Uninitialized%20Pointer%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd7287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22235-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-juniper-networks-junos-os-bd7283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22235%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd7283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22234-cwe-1250-improper-preservation-of-consistency-between-independent-representations-of-shared-state-in-juniper-networks-junos-os-bd77f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22234%3A%20CWE-1250%20Improper%20Preservation%20of%20Consistency%20Between%20Independent%20Representations%20of%20Shared%20State%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd77f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22233-cwe-690-unchecked-return-value-to-null-pointer-dereference-in-juniper-networks-junos-os-bd767e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22233%3A%20CWE-690%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd767e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22232-cwe-476-null-pointer-dereference-in-juniper-networks-junos-os-bd7659</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22232%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd7659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22231-cwe-690-unchecked-return-value-to-null-pointer-dereference-in-juniper-networks-junos-os-bd6fdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22231%3A%20CWE-690%20Unchecked%20Return%20Value%20to%20NULL%20Pointer%20Dereference%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd6fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22230-cwe-20-improper-input-validation-in-juniper-networks-junos-os-bd6fd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22230%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9817c4522896dcbd6fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22229-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-juniper-networks-paragon-active-assurance-formerly-netrounds-bd6fd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22229%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Juniper%20Networks%20Paragon%20Active%20Assurance%20(Formerly%20Netrounds)&amp;severity=high&amp;id=682d9817c4522896dcbd6fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22228-cwe-1287-improper-validation-of-specified-type-of-input-in-juniper-networks-junos-os-bd6fcf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22228%3A%20CWE-1287%3A%20Improper%20Validation%20of%20Specified%20Type%20of%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9817c4522896dcbd6fcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22227-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-juniper-networks-junos-os-evolved-bd6fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22227%3A%20CWE-754%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=medium&amp;id=682d9817c4522896dcbd6fcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22226-cwe-789-uncontrolled-memory-allocation-in-juniper-networks-junos-os-bd6f5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22226%3A%20CWE-789%20Uncontrolled%20Memory%20Allocation%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22225-denial-of-service-dos-in-juniper-networks-junos-os-bd6f53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22225%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22224-cwe-703-improper-check-or-handling-of-exceptional-conditions-in-juniper-networks-junos-os-bd6f4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22224%3A%20CWE-703%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22223-cwe-1285-improper-validation-of-specified-index-position-or-offset-in-input-in-juniper-networks-junos-os-bd6f13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22223%3A%20CWE-1285%3A%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6f13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22220-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-juniper-networks-junos-os-bd6f0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22220%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6f0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22219-cwe-241-improper-handling-of-unexpected-data-type-in-juniper-networks-junos-os-bd6f0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22219%3A%20CWE-241%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6f0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22218-denial-of-service-dos-in-juniper-networks-junos-os-bd6f07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22218%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9816c4522896dcbd6f07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22211-denial-of-service-dos-in-juniper-networks-junos-os-evolved-bd6efa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22211%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=682d9816c4522896dcbd6efa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22208-cwe-416-use-after-free-in-juniper-networks-junos-os-bd6ee9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22208%3A%20CWE-416%20Use%20After%20Free%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=medium&amp;id=682d9816c4522896dcbd6ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22201-cwe-1285-improper-validation-of-specified-index-position-or-offset-in-input-in-juniper-networks-junos-os-bd6ee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22201%3A%20CWE-1285%20Improper%20Validation%20of%20Specified%20Index%2C%20Position%2C%20or%20Offset%20in%20Input%20in%20Juniper%20Networks%20Junos%20OS&amp;severity=high&amp;id=682d9816c4522896dcbd6ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22192-denial-of-service-dos-in-juniper-networks-junos-os-evolved-bd6ed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22192%3A%20Denial%20of%20Service%20(DoS)%20in%20Juniper%20Networks%20Junos%20OS%20Evolved&amp;severity=high&amp;id=682d9816c4522896dcbd6ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31122-cwe-287-improper-authentication-in-wireapp-wire-server-bf47bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31122%3A%20CWE-287%3A%20Improper%20Authentication%20in%20wireapp%20wire-server&amp;severity=medium&amp;id=682d9845c4522896dcbf47bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31037-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oroinc-orocommerce-bf47b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31037%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oroinc%20orocommerce&amp;severity=medium&amp;id=682d9845c4522896dcbf47b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3339-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-trellix-trellix-epolicy-orchestrator-epo-bd8339</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3339%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Trellix%20Trellix%20ePolicy%20Orchestrator%20(ePO)&amp;severity=medium&amp;id=682d9818c4522896dcbd8339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42114-n-a-in-n-a-bd72aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42114%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd72aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42113-n-a-in-n-a-bd72a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42113%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd72a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42112-n-a-in-n-a-bd72a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42112%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd72a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41547-n-a-in-n-a-bd7254</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41547%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd7254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43260-n-a-in-n-a-bd6f23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43260%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9816c4522896dcbd6f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43259-n-a-in-n-a-bd6f1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43259%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9816c4522896dcbd6f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42117-n-a-in-n-a-bd6a26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42117%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9816c4522896dcbd6a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42218-n-a-in-n-a-bd6456</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42218%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42202-n-a-in-n-a-bd6431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42202%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd6431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42188-n-a-in-n-a-bd6429</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42116-n-a-in-n-a-bd63e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42116%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd63e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42115-n-a-in-n-a-bd63e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42115%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd63e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40889-n-a-in-n-a-bd63d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40889%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9815c4522896dcbd63d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3338-cwe-611-improper-restriction-of-xml-external-entity-reference-in-trellix-trellix-epolicy-orchestrator-epo-bd63ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3338%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20Trellix%20Trellix%20ePolicy%20Orchestrator%20(ePO)&amp;severity=medium&amp;id=682d9815c4522896dcbd63ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39198-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-dubbo-bd63c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39198%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20Dubbo&amp;severity=critical&amp;id=682d9815c4522896dcbd63c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36439-n-a-in-n-a-bd63a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36439%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd63a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36438-n-a-in-n-a-bd63a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36438%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd63a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3305-n-a-in-n-a-bd6394</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3305%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-15853-cwe-400-in-supybot-fedora-bd6377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-15853%3A%20CWE-400%20in%20supybot-fedora&amp;severity=medium&amp;id=682d9815c4522896dcbd6377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41544-n-a-in-n-a-aecc6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41544%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fc1484d88663aecc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41541-n-a-in-n-a-aec618</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41541%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41540-n-a-in-n-a-aec616</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41540%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41537-n-a-in-n-a-aec5f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41537%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41504-n-a-in-n-a-aec5f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41504%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41500-n-a-in-n-a-aec547</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41500%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41479-n-a-in-n-a-aec545</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41479%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec545</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3569-cwe-271-privilege-dropping-lowering-errors-in-synacor-zimbra-collaboration-suite-zcs-bd637b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3569%3A%20CWE-271%20Privilege%20Dropping%20%2F%20Lowering%20Errors%20in%20Synacor%20Zimbra%20Collaboration%20Suite%20(ZCS)&amp;severity=high&amp;id=682d9815c4522896dcbd637b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8976-cwe-352-cross-site-request-forgery-csrf-in-zgr-zgr-tps200-ng-bf47a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8976%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ZGR%20ZGR%20TPS200%20NG&amp;severity=medium&amp;id=682d9845c4522896dcbf47a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8973-cwe-284-improper-access-control-in-zgr-zgr-tps200-ng-bd6383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8973%3A%20CWE-284%3A%20improper%20access%20control%20in%20ZGR%20ZGR%20TPS200%20NG&amp;severity=critical&amp;id=682d9815c4522896dcbd6383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8974-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-zgr-zgr-tps200-ng-bd6390</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8974%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20ZGR%20ZGR%20TPS200%20NG&amp;severity=critical&amp;id=682d9815c4522896dcbd6390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8975-cwe-201-insertion-of-sensitive-information-into-sent-data-in-zgr-zgr-tps200-ng-bd696c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8975%3A%20CWE-201%3A%20Insertion%20of%20Sensitive%20Information%20Into%20Sent%20Data%20in%20ZGR%20ZGR%20TPS200%20NG&amp;severity=high&amp;id=682d9816c4522896dcbd696c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3368-privilege-escalation-in-nortonlifelock-avira-security-for-windows-bd724c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3368%3A%20Privilege%20Escalation%20in%20Nortonlifelock%20%22Avira%20Security%22%20%E2%80%93%20for%20Windows&amp;severity=high&amp;id=682d9817c4522896dcbd724c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32176-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-gin-vue-admin-gin-vue-admin-bd7226</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32176%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gin-vue-admin%20gin-vue-admin&amp;severity=critical&amp;id=682d9817c4522896dcbd7226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3501-cwe-200-information-exposure-in-accessing-template-content-without-permissions-otrs-bd7250</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3501%3A%20CWE-200%20Information%20Exposure%20in%20Accessing%20template%20content%20without%20permissions%20OTRS&amp;severity=low&amp;id=682d9817c4522896dcbd7250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39052-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-otrs-ag-otrs-bd722c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39052%3A%20CWE-835%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20OTRS%20AG%20OTRS&amp;severity=high&amp;id=682d9817c4522896dcbd722c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3281-cwe-440-expected-behavior-violation-in-wago-750-81xx-xxx-xxx-series-pfc100-pfc200-bd723f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3281%3A%20CWE-440%20Expected%20Behavior%20Violation%20in%20WAGO%20750-81xx%2Fxxx-xxx%20Series%20PFC100%2FPFC200&amp;severity=high&amp;id=682d9817c4522896dcbd723f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2052-cwe-284-improper-access-control-in-trumpf-werkzeugmaschinen-se-co-kg-trutops-monitor-bd7219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2052%3A%20CWE-284%20Improper%20Access%20Control%20in%20TRUMPF%20Werkzeugmaschinen%20SE%20%2B%20Co.%20KG%20TruTops%20Monitor&amp;severity=critical&amp;id=682d9817c4522896dcbd7219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3421-cwe-264-permissions-privileges-and-access-controls-in-google-llc-drive-for-desktop-macos-bf8164</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3421%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Google%20LLC%20Drive%20for%20Desktop%20MacOS&amp;severity=medium&amp;id=682d984bc4522896dcbf8164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23771-cwe-352-cross-site-request-forgery-csrf-in-efm-networks-co-ltd-nas1dual-nas2dual-nas4dual-bd792c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23771%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20EFM%20Networks%20Co.%2C%20Ltd%20NAS1dual%2C%20NAS2dual%2C%20NAS4dual&amp;severity=high&amp;id=682d9817c4522896dcbd792c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42983-n-a-in-n-a-bd7264</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42983%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd7264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42980-n-a-in-n-a-bd7260</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42980%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd7260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42975-n-a-in-n-a-bd725c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42975%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd725c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42237-n-a-in-n-a-bd7258</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42237%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd7258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3552-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-boxbilling-boxbilling-boxbilling-bd6926</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3552%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20boxbilling%20boxbilling%2Fboxbilling&amp;severity=high&amp;id=682d9816c4522896dcbd6926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3517-cwe-400-in-minimatch-bd656d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3517%3A%20CWE-400%20in%20minimatch&amp;severity=high&amp;id=682d9816c4522896dcbd656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3540-information-exposure-in-hunter2-in-the-hunter2-contributors-hunter2-bd6531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3540%3A%20Information%20exposure%20in%20hunter2%20in%20The%20hunter2%20Contributors%20hunter2&amp;severity=medium&amp;id=682d9815c4522896dcbd6531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38743-cwe-284-improper-access-control-in-factorytalk-vantagepoint-bd6473</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38743%3A%20CWE-284%20Improper%20Access%20Control%20in%20FactoryTalk%20VantagePoint&amp;severity=high&amp;id=682d9815c4522896dcbd6473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42165-n-a-in-n-a-bd637f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42165%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9815c4522896dcbd637f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42166-n-a-in-n-a-bd60ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42166%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9815c4522896dcbd60ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41751-n-a-in-n-a-bd60a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41751%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd60a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41542-n-a-in-n-a-bd60a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41542%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9815c4522896dcbd60a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41498-n-a-in-n-a-bd6067</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41498%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9815c4522896dcbd6067</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3325-improper-access-control-in-gitlab-in-gitlab-gitlab-bd6063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3325%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9815c4522896dcbd6063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3293-information-exposure-in-gitlab-in-gitlab-gitlab-bd605f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3293%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9815c4522896dcbd605f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3291-information-exposure-in-gitlab-in-gitlab-gitlab-bd6057</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3291%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9815c4522896dcbd6057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3288-use-of-incorrectly-resolved-name-or-reference-in-gitlab-in-gitlab-gitlab-bd6053</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3288%3A%20Use%20of%20incorrectly-resolved%20name%20or%20reference%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9815c4522896dcbd6053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3286-improper-access-control-in-gitlab-in-gitlab-gitlab-bd604d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3286%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9815c4522896dcbd604d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3283-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-bd6049</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3283%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682d9815c4522896dcbd6049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3282-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-drag-and-drop-multiple-file-upload-contact-form-7-bd6045</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3282%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Drag%20and%20Drop%20Multiple%20File%20Upload%20%E2%80%93%20Contact%20Form%207&amp;severity=medium&amp;id=682d9815c4522896dcbd6045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3279-uncaught-exception-in-gitlab-in-gitlab-gitlab-bd6041</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3279%3A%20Uncaught%20exception%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9815c4522896dcbd6041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3244-cwe-862-missing-authorization-in-unknown-import-all-xml-csv-txt-into-wordpress-bd602e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3244%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Import%20all%20XML%2C%20CSV%20%26%20TXT%20into%20WordPress&amp;severity=medium&amp;id=682d9815c4522896dcbd602e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3082-cwe-862-missing-authorization-in-unknown-miniorange-discord-integration-bd600e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3082%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20miniOrange%20Discord%20Integration&amp;severity=medium&amp;id=682d9815c4522896dcbd600e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3067-improper-access-control-in-gitlab-in-gitlab-gitlab-bd600a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3067%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9815c4522896dcbd600a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3066-authorization-bypass-through-user-controlled-key-in-gitlab-in-gitlab-gitlab-bd6002</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3066%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9815c4522896dcbd6002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3060-improper-control-of-resource-identifiers-resource-injection-in-gitlab-in-gitlab-gitlab-bd5ffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3060%3A%20Improper%20control%20of%20resource%20identifiers%20(&apos;resource%20injection&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682d9815c4522896dcbd5ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3031-improper-access-control-in-gitlab-in-gitlab-gitlab-bd5ffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3031%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682d9815c4522896dcbd5ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3030-improper-access-control-in-gitlab-in-gitlab-gitlab-bd5ff6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3030%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682d9815c4522896dcbd5ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2931-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-bd5fdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2931%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682d9815c4522896dcbd5fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2908-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-aecc87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2908%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fc1484d88663aecc87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2834-cwe-552-files-or-directories-accessible-to-external-parties-in-unknown-helpful-aecc85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2834%3A%20CWE-552%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20Unknown%20Helpful&amp;severity=medium&amp;id=682cd0fc1484d88663aecc85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2630-improper-access-control-in-gitlab-in-gitlab-gitlab-aecc83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2630%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fc1484d88663aecc83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2592-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-aecc6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2592%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fc1484d88663aecc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2574-cwe-79-cross-site-scripting-xss-in-unknown-meks-easy-social-share-aecc6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2574%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Meks%20Easy%20Social%20Share&amp;severity=medium&amp;id=682cd0fc1484d88663aecc6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2563-cwe-79-cross-site-scripting-xss-in-unknown-tutor-lms-elearning-and-online-course-solution-aecc68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2563%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Tutor%20LMS%20%E2%80%93%20eLearning%20and%20online%20course%20solution&amp;severity=medium&amp;id=682cd0fc1484d88663aecc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2533-improper-access-control-in-gitlab-in-gitlab-gitlab-aecc30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2533%3A%20Improper%20access%20control%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fc1484d88663aecc30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2527-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-in-gitlab-gitlab-aecc2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2527%3A%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682cd0fc1484d88663aecc2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2455-uncontrolled-resource-consumption-in-gitlab-in-gitlab-gitlab-aecc26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2455%3A%20Uncontrolled%20resource%20consumption%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fc1484d88663aecc26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2428-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-in-gitlab-gitlab-aecc22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2428%3A%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fc1484d88663aecc22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28291-cwe-522-in-nessus-professional-aecc0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28291%3A%20CWE-522%20in%20Nessus%20Professional&amp;severity=medium&amp;id=682cd0fc1484d88663aecc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25750-double-free-in-bthost-in-qualcomm-inc-snapdragon-mobile-aecbee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25750%3A%20Double%20Free%20in%20BTHOST%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=high&amp;id=682cd0fc1484d88663aecbee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25723-use-after-free-in-multimedia-frameworks-in-qualcomm-inc-snapdragon-mobile-aecbec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25723%3A%20Use-After-Free%20in%20Multimedia%20Frameworks%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=high&amp;id=682cd0fc1484d88663aecbec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23770-cwe-20-improper-input-validation-in-wisa-corp-smart-wing-cms-aecbea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23770%3A%20CWE-20%20Improper%20Input%20Validation%20in%20WISA%20corp.%20Smart%20Wing%20CMS&amp;severity=high&amp;id=682cd0fc1484d88663aecbea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23769-cwe-287-improper-authentication-in-secuever-co-ltd-reversewall-mds-aecbe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23769%3A%20CWE-287%20Improper%20Authentication%20in%20Secuever%20Co.%2CLtd%20reverseWall-MDS&amp;severity=high&amp;id=682cd0fc1484d88663aecbe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22128-remote-code-execution-in-tableau-server-aecbd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22128%3A%20Remote%20Code%20Execution%20in%20Tableau%20Server&amp;severity=critical&amp;id=682cd0fc1484d88663aecbd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0699-cwe-416-in-shapelib-aecbcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0699%3A%20CWE-416%20in%20shapelib&amp;severity=critical&amp;id=682cd0fc1484d88663aecbcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-14841-cwe-281-in-business-central-aecbc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-14841%3A%20CWE-281%20in%20Business-central&amp;severity=high&amp;id=682cd0fc1484d88663aecbc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-14840-cwe-522-in-business-central-aecbb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-14840%3A%20CWE-522%20in%20Business-central&amp;severity=high&amp;id=682cd0fc1484d88663aecbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-7517-cwe-20-in-hawkular-metrics-aecbb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-7517%3A%20CWE-20%20in%20Hawkular%20Metrics&amp;severity=low&amp;id=682cd0fc1484d88663aecbb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2865-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gitlab-in-gitlab-gitlab-aecab4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2865%3A%20Improper%20neutralization%20of%20input%20during%20web%20page%20generation%20(&apos;cross-site%20scripting&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=high&amp;id=682cd0fb1484d88663aecab4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33210-use-of-out-of-range-pointer-offset-in-automotive-multimedia-in-qualcomm-inc-snapdragon-auto-aeca55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33210%3A%20Use%20of%20Out-of-range%20Pointer%20Offset%20in%20Automotive%20Multimedia%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto&amp;severity=high&amp;id=682cd0fb1484d88663aeca55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2992-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-gitlab-in-gitlab-gitlab-aeca53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2992%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20a%20command%20(&apos;command%20injection&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=critical&amp;id=682cd0fb1484d88663aeca53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2884-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-gitlab-in-gitlab-gitlab-aeca51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2884%3A%20Improper%20neutralization%20of%20special%20elements%20used%20in%20an%20os%20command%20(&apos;os%20command%20injection&apos;)%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=critical&amp;id=682cd0fb1484d88663aeca51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33214-time-of-check-time-of-use-race-condition-in-display-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-aeca36</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33214%3A%20Time-of-check%20time-of-use%20race%20condition%20in%20Display%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=high&amp;id=682cd0fb1484d88663aeca36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33217-buffer-copy-without-checking-size-of-input-in-qualcomm-ipc-in-qualcomm-inc-snapdragon-mobile-aec9a3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33217%3A%20Buffer%20copy%20without%20checking%20size%20of%20input%20in%20Qualcomm%20IPC%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=high&amp;id=682cd0fb1484d88663aec9a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3126-cwe-352-cross-site-request-forgery-csrf-in-unknown-frontend-file-manager-plugin-aec959</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3126%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Frontend%20File%20Manager%20Plugin&amp;severity=medium&amp;id=682cd0fb1484d88663aec959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3131-cwe-89-sql-injection-in-unknown-search-logger-know-what-your-visitors-search-aec93e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3131%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Search%20Logger%20%E2%80%93%20Know%20What%20Your%20Visitors%20Search&amp;severity=high&amp;id=682cd0fb1484d88663aec93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3149-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-custom-cursors-aec90e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3149%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WP%20Custom%20Cursors&amp;severity=medium&amp;id=682cd0fb1484d88663aec90e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3139-cwe-79-cross-site-scripting-xss-in-unknown-we-re-open-aec90c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3139%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20We%E2%80%99re%20Open!&amp;severity=medium&amp;id=682cd0fb1484d88663aec90c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3151-cwe-352-cross-site-request-forgery-csrf-in-unknown-wp-custom-cursors-aec906</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3151%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20WP%20Custom%20Cursors&amp;severity=medium&amp;id=682cd0fb1484d88663aec906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3150-cwe-89-sql-injection-in-unknown-wp-custom-cursors-wordpress-cursor-plugin-aec904</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3150%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20WP%20Custom%20Cursors%20%7C%20WordPress%20Cursor%20Plugin&amp;severity=high&amp;id=682cd0fb1484d88663aec904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3158-cwe-89-sql-injection-in-factorytalk-vantagepoint-aec8ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3158%3A%20CWE-89%20SQL%20Injection%20in%20FactoryTalk%20VantagePoint&amp;severity=high&amp;id=682cd0fb1484d88663aec8ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3165-cwe-191-in-qemu-aec869</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3165%3A%20CWE-191%20in%20QEMU&amp;severity=medium&amp;id=682cd0fb1484d88663aec869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40605-n-a-in-n-a-aec867</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40605%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40055-n-a-in-n-a-aec865</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40055%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3351-information-exposure-in-gitlab-in-gitlab-gitlab-aec863</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3351%3A%20Information%20exposure%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fb1484d88663aec863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3331-authorization-bypass-through-user-controlled-key-in-gitlab-in-gitlab-gitlab-aec861</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3331%3A%20Authorization%20bypass%20through%20user-controlled%20key%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=low&amp;id=682cd0fb1484d88663aec861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3330-improper-authorization-in-gitlab-in-gitlab-gitlab-aec854</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3330%3A%20Improper%20authorization%20in%20GitLab%20in%20GitLab%20GitLab&amp;severity=medium&amp;id=682cd0fb1484d88663aec854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3243-cwe-89-sql-injection-in-unknown-import-all-xml-csv-txt-into-wordpress-aec852</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3243%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Import%20all%20XML%2C%20CSV%20%26%20TXT%20into%20WordPress&amp;severity=high&amp;id=682cd0fb1484d88663aec852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3206-cwe-522-insufficiently-protected-credentials-in-unknown-passster-aec850</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3206%3A%20CWE-522%20Insufficiently%20Protected%20Credentials%20in%20Unknown%20Passster&amp;severity=medium&amp;id=682cd0fb1484d88663aec850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41471-n-a-in-n-a-aec84a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41471%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec84a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41431-n-a-in-n-a-aec848</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41431%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec848</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41139-n-a-in-n-a-aec846</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41139%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40606-n-a-in-n-a-aec844</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40606%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42143-n-a-in-n-a-aec842</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42143%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42142-n-a-in-n-a-aec835</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42142%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42029-n-a-in-n-a-aec833</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42029%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41472-n-a-in-n-a-aec82d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41472%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec82d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42147-n-a-in-n-a-aec82b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42147%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec82b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42149-n-a-in-n-a-aec814</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42149%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42154-n-a-in-n-a-aec80a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42154%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42221-n-a-in-n-a-aec55e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42171-n-a-in-n-a-aec55c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42171%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42170-n-a-in-n-a-aec55a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42170%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42169-n-a-in-n-a-aec54d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42169%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42168-n-a-in-n-a-aec50d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42168%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec50d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42167-n-a-in-n-a-aec4d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec4d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42164-n-a-in-n-a-aec4cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42164%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec4cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42163-n-a-in-n-a-aec4ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42163%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec4ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-17-f11f89</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42969-n-a-in-n-a-aeca63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42969%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42968-n-a-in-n-a-aeca44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42968%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aeca44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41323-n-a-in-n-a-aeca38</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41323%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aeca38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42961-n-a-in-n-a-aeca1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42961%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-20149-n-a-in-n-a-aeca04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-20149%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aeca04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38448-use-after-free-cwe-416-in-adobe-dimension-bf4802</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38448%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf4802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38444-use-after-free-cwe-416-in-adobe-dimension-bf45a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38444%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf45a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38446-use-after-free-cwe-416-in-adobe-dimension-bf45b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38446%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf45b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38443-out-of-bounds-read-cwe-125-in-adobe-dimension-bf45a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38443%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf45a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38442-use-after-free-cwe-416-in-adobe-dimension-bf457b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38442%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf457b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38445-use-after-free-cwe-416-in-adobe-dimension-bf45ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38445%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf45ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38447-use-after-free-cwe-416-in-adobe-dimension-bf45bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38447%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf45bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38441-out-of-bounds-read-cwe-125-in-adobe-dimension-bf4575</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38441%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf4575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38440-out-of-bounds-read-cwe-125-in-adobe-dimension-bf4573</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38440%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9845c4522896dcbf4573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35689-improper-access-control-cwe-284-in-adobe-magento-commerce-bf44d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35689%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9845c4522896dcbf44d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35698-cross-site-scripting-stored-xss-cwe-79-in-adobe-magento-commerce-bf44fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35698%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9845c4522896dcbf44fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38437-use-after-free-cwe-416-in-adobe-acrobat-reader-bf456f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38437%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9845c4522896dcbf456f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38449-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf45ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38449%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9845c4522896dcbf45ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35691-null-pointer-dereference-cwe-476-in-adobe-acrobat-reader-bf44f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35691%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9845c4522896dcbf44f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42339-stack-based-buffer-overflow-cwe-121-in-adobe-acrobat-reader-bf4763</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42339%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9845c4522896dcbf4763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42342-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf4799</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42342%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9845c4522896dcbf4799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38450-stack-based-buffer-overflow-cwe-121-in-adobe-acrobat-reader-bf45d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38450%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9845c4522896dcbf45d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42341-improper-restriction-of-xml-external-entity-reference-xxe-cwe-611-in-adobe-coldfusion-bf4795</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42341%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38424-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bf456b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38424%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf456b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42340-improper-input-validation-cwe-20-in-adobe-coldfusion-bf4767</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42340%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38423-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bf455a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38423%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf455a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38422-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bf4552</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38422%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38421-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bf454a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38421%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf454a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38419-improper-restriction-of-xml-external-entity-reference-xxe-cwe-611-in-adobe-coldfusion-bf453e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38419%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20(&apos;XXE&apos;)%20(CWE-611)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf453e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35711-heap-based-buffer-overflow-cwe-122-in-adobe-coldfusion-bf4503</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35711%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38420-use-of-hard-coded-credentials-cwe-798-in-adobe-coldfusion-bf4542</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38420%3A%20Use%20of%20Hard-coded%20Credentials%20(CWE-798)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35690-stack-based-buffer-overflow-cwe-121-in-adobe-coldfusion-bf44f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35690%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf44f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35712-heap-based-buffer-overflow-cwe-122-in-adobe-coldfusion-bf4507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35712%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35710-stack-based-buffer-overflow-cwe-121-in-adobe-coldfusion-bf44ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35710%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf44ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38418-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-coldfusion-bf4517</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38418%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9845c4522896dcbf4517</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28761-cwe-284-improper-access-control-in-zoom-video-communications-inc-zoom-on-premise-meeting-connector-mmr-aeca06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28761%3A%20CWE-284%20Improper%20Access%20Control%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20On-Premise%20Meeting%20Connector%20MMR&amp;severity=medium&amp;id=682cd0fb1484d88663aeca06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28759-cwe-284-improper-access-control-in-zoom-video-communications-inc-zoom-on-premise-meeting-connector-mmr-aec9e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28759%3A%20CWE-284%20Improper%20Access%20Control%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20On-Premise%20Meeting%20Connector%20MMR&amp;severity=high&amp;id=682cd0fb1484d88663aec9e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28760-cwe-284-improper-access-control-in-zoom-video-communications-inc-zoom-on-premise-meeting-connector-mmr-aec99d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28760%3A%20CWE-284%20Improper%20Access%20Control%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20On-Premise%20Meeting%20Connector%20MMR&amp;severity=medium&amp;id=682cd0fb1484d88663aec99d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28762-cwe-16-misconfiguration-in-zoom-video-communications-inc-zoom-client-for-meetings-for-macos-aec99f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28762%3A%20CWE-16%20Misconfiguration%20in%20Zoom%20Video%20Communications%20Inc%20Zoom%20Client%20for%20Meetings%20for%20MacOS&amp;severity=high&amp;id=682cd0fb1484d88663aec99f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42464-cwe-276-incorrect-default-permissions-in-openharmony-openharmony-aec9be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42464%3A%20CWE-276%20Incorrect%20Default%20Permissions%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=682cd0fb1484d88663aec9be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42463-cwe-287-improper-authentication-in-openharmony-openharmony-aec9bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42463%3A%20CWE-287%20Improper%20Authentication%20in%20OpenHarmony%20OpenHarmony&amp;severity=high&amp;id=682cd0fb1484d88663aec9bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41686-cwe-787-out-of-bounds-write-in-openharmony-openharmony-aec9ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41686%3A%20CWE-787%20Out-of-bounds%20Write%20in%20OpenHarmony%20OpenHarmony&amp;severity=medium&amp;id=682cd0fb1484d88663aec9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42488-cwe-287-improper-authentication-in-openharmony-openharmony-aec9c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42488%3A%20CWE-287%20Improper%20Authentication%20in%20OpenHarmony%20OpenHarmony&amp;severity=high&amp;id=682cd0fb1484d88663aec9c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32177-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-gin-vue-admin-gin-vue-admin-aec9a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32177%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20gin-vue-admin%20gin-vue-admin&amp;severity=critical&amp;id=682cd0fb1484d88663aec9a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39311-cwe-502-deserialization-of-untrusted-data-in-gocd-gocd-bf475f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39311%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9845c4522896dcbf475f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39310-cwe-284-improper-access-control-in-gocd-gocd-bf475b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39310%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9845c4522896dcbf475b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39309-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-gocd-gocd-bf4757</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39309%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9845c4522896dcbf4757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39308-cwe-208-observable-timing-discrepancy-in-gocd-gocd-bf4755</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39308%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9845c4522896dcbf4755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41603-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aecad5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41603%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fc1484d88663aecad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41305-memory-corruption-in-subassembly-composer-aecab6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41305%3A%20Memory%20Corruption%20in%20Subassembly%20Composer&amp;severity=high&amp;id=682cd0fb1484d88663aecab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3506-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-barrykooij-barrykooij-related-posts-for-wp-aeca8f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3506%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20barrykooij%20barrykooij%2Frelated-posts-for-wp&amp;severity=medium&amp;id=682cd0fb1484d88663aeca8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42234-n-a-in-n-a-aeca59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42234%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aeca59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42071-n-a-in-n-a-aeca57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aeca57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41601-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aeca42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41601%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aeca42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41600-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aeca40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41600%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aeca40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41585-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aeca3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41585%3A%20Out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aeca3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41584-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aeca3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41584%3A%20Out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aeca3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41583-array-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aeca3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41583%3A%20Array%20out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aeca3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41582-configuration-defects-in-huawei-harmonyos-aeca1d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41582%3A%20Configuration%20defects%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aeca1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41581-out-of-bounds-access-vulnerability-in-huawei-harmonyos-aeca1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41581%3A%20Out-of-bounds%20access%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aeca1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41577-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aeca15</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41577%3A%20Out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aeca15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41576-weaknesses-introduced-during-design-in-huawei-harmonyos-aec9e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41576%3A%20Weaknesses%20Introduced%20During%20Design%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec9e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41539-n-a-in-n-a-aec9e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41539%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec9e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41538-n-a-in-n-a-aec9b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41538%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41536-n-a-in-n-a-aec9b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41536%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41535-n-a-in-n-a-aec9a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41535%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec9a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41477-n-a-in-n-a-aec9a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41477%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41436-n-a-in-n-a-aec9a5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41436%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec9a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42070-n-a-in-n-a-aec986</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42070%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42069-n-a-in-n-a-aec984</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42069%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42067-n-a-in-n-a-aec982</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42067%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42066-n-a-in-n-a-aec980</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42066%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42064-n-a-in-n-a-aec97e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42064%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec97e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41602-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec97c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41602%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41416-n-a-in-n-a-aec97a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41416%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41308-memory-corruption-in-subassembly-composer-aec978</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41308%3A%20Memory%20Corruption%20in%20Subassembly%20Composer&amp;severity=high&amp;id=682cd0fb1484d88663aec978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41307-memory-corruption-in-subassembly-composer-aec96b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41307%3A%20Memory%20Corruption%20in%20Subassembly%20Composer&amp;severity=high&amp;id=682cd0fb1484d88663aec96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41306-memory-corruption-in-autodesk-design-review-aec969</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41306%3A%20Memory%20corruption%20in%20Autodesk%C2%AE%20Design%20Review&amp;severity=high&amp;id=682cd0fb1484d88663aec969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41304-use-after-free-in-fbx-sdk-aec967</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41304%3A%20Use-After-Free%20in%20FBX%20SDK&amp;severity=high&amp;id=682cd0fb1484d88663aec967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41303-out-of-bounds-write-in-fbx-sdk-aec95f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41303%3A%20Out-Of-Bounds%20Write%20in%20FBX%20SDK&amp;severity=high&amp;id=682cd0fb1484d88663aec95f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41302-out-of-bounds-read-in-fbx-sdk-aec95d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41302%3A%20Out-Of-Bounds%20Read%20in%20FBX%20SDK&amp;severity=high&amp;id=682cd0fb1484d88663aec95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3439-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ikus060-ikus060-rdiffweb-aec95b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3439%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682cd0fb1484d88663aec95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39128-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec94c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39128%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec94c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39127-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec94a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39127%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec94a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39126-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec93c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39126%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39125-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec93a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39125%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39124-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec92d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39124%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec92d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39123-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec92b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39123%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec92b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39122-cwe-120-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec929</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39122%3A%20CWE-120%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41598-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec923</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41598%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aec923</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39121-cwe-120-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec921</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39121%3A%20CWE-120%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41589-interface-misuse-vulnerability-in-huawei-harmonyos-aec91d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41589%3A%20Interface%20misuse%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41597-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec8c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41597%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aec8c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41595-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec8c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41595%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aec8c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41587-configuration-defects-in-emui-aec880</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41587%3A%20Configuration%20defects%20in%20EMUI&amp;severity=medium&amp;id=682cd0fb1484d88663aec880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41580-out-of-bounds-access-vulnerability-in-huawei-harmonyos-aec84e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41580%3A%20Out-of-bounds%20access%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec84e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41578-out-of-bounds-write-vulnerability-in-huawei-harmonyos-aec84c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41578%3A%20Out-of-bounds%20write%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec84c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41588-service-logic-exception-vulnerability-in-huawei-harmonyos-aec831</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41588%3A%20Service%20logic%20exception%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41586-untruncated-data-vulnerability-in-huawei-harmonyos-aec82f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41586%3A%20Untruncated%20data%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec82f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41594-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec812</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41594%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aec812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41593-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec810</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41593%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aec810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41592-heap-overflow-out-of-bounds-read-null-pointer-vulnerability-in-huawei-harmonyos-aec80e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41592%3A%20Heap%20overflow%2FOut-of-bounds%20read%2FNull%20pointer%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=low&amp;id=682cd0fb1484d88663aec80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39115-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec737</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39115%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec737</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39117-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec71e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39117%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec71e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39065-cwe-241-improper-handling-of-unexpected-data-type-in-ikea-tr-dfri-gateway-system-aec71c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39065%3A%20CWE-241%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20Ikea%20TR%C3%85DFRI%20gateway%20system&amp;severity=medium&amp;id=682cd0fb1484d88663aec71c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39114-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39114%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39112-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39112%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39111-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39111%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec6f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39110-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39110%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec6f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38986-out-of-bounds-access-vulnerability-in-huawei-harmonyos-aec6f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38986%3A%20Out-of-bounds%20access%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec6f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38985-input-verification-vulnerability-in-huawei-harmonyos-aec6da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38985%3A%20Input%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec6da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38688-cwe-200-information-exposure-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38688%3A%20CWE-200%20Information%20Exposure%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec6d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38687-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38687%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec6d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38679-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38679%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec6d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38677-cwe-400-uncontrolled-resource-consumption-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38677%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39120-cwe-120-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39120%3A%20CWE-120%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39113-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39113%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39109-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39109%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39108-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39108%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec6a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39107-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec6a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39107%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec6a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38676-cwe-787-out-of-bounds-write-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec69e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38676%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec69e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38673-cwe-126-buffer-over-read-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec69c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38673%3A%20CWE-126%20Buffer%20Over-read%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec69c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38672-cwe-121-stack-based-buffer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec69a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38672%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec69a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39105-cwe-190-integer-overflow-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec67d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39105%3A%20CWE-190%20Integer%20Overflow%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39103-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec67b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39103%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39080-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec679</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39080%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39064-cwe-241-improper-handling-of-unexpected-data-type-in-ikea-tr-dfri-smart-lighting-system-aec677</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39064%3A%20CWE-241%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20Ikea%20TR%C3%85DFRI%20smart%20lighting%20system&amp;severity=high&amp;id=682cd0fb1484d88663aec677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39011-unauthorized-access-vulnerability-in-huawei-harmonyos-aec675</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39011%3A%20Unauthorized%20access%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38998-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aec673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38998%3A%20Out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38984-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aec671</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38984%3A%20Out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38983-uaf-vulnerability-in-huawei-harmonyos-aec664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38983%3A%20UAF%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38982-service-logic-error-vulnerability-in-huawei-harmonyos-aec662</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38982%3A%20Service%20logic%20error%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38977-heap-overflow-vulnerability-in-huawei-harmonyos-aec660</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38977%3A%20Heap%20overflow%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38698-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec65e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38698%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec65e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38697-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec65c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38697%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38981-out-of-bounds-read-vulnerability-in-huawei-harmonyos-aec652</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38981%3A%20Out-of-bounds%20read%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682cd0fb1484d88663aec652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38980-heap-overflow-vulnerability-in-huawei-harmonyos-aec645</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38980%3A%20Heap%20overflow%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38690-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec643</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38690%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec643</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38689-cwe-200-information-exposure-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec641</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38689%3A%20CWE-200%20Information%20Exposure%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38669-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec63f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38669%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec63f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37603-n-a-in-n-a-aec624</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37603%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37602-n-a-in-n-a-aec622</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37602%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35059-n-a-in-n-a-aec620</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35059%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35052-n-a-in-n-a-aec61e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35052%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec61e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35058-n-a-in-n-a-aec603</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35058%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec603</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35056-n-a-in-n-a-aec601</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35056%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35055-n-a-in-n-a-aec5ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35055%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec5ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35054-n-a-in-n-a-aec5fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35054%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec5fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35053-n-a-in-n-a-aec5de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35053%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec5de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2985-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec5da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2985%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fb1484d88663aec5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2984-cwe-787-out-of-bounds-write-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec5d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2984%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=medium&amp;id=682cd0fb1484d88663aec5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2963-memory-leaks-in-jasper-aec5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2963%3A%20memory%20leaks%20in%20jasper&amp;severity=high&amp;id=682cd0fb1484d88663aec5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2850-denial-of-service-in-389-ds-base-aec5c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2850%3A%20denial%20of%20service%20in%20389-ds-base&amp;severity=medium&amp;id=682cd0fb1484d88663aec5c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2780-authentication-bypass-by-capture-replay-in-octopus-deploy-octopus-server-aec5c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2780%3A%20Authentication%20Bypass%20by%20Capture-Replay%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=high&amp;id=682cd0fb1484d88663aec5c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20464-information-disclosure-in-android-aec59e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20464%3A%20Information%20disclosure%20in%20Android&amp;severity=medium&amp;id=682cd0fb1484d88663aec59e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20397-elevation-of-privilege-in-android-aec59c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20397%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682cd0fb1484d88663aec59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46840-out-of-bounds-access-vulnerability-in-huawei-harmonyos-aec59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46840%3A%20Out-of-bounds%20access%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46839-lack-of-length-check-vulnerability-in-huawei-harmonyos-aec598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46839%3A%20Lack%20of%20length%20check%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682cd0fb1484d88663aec598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0699-elevation-of-privilege-in-android-aec58b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0699%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=682cd0fb1484d88663aec58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35050-n-a-in-n-a-aec507</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35050%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35049-n-a-in-n-a-aec505</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35049%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35048-n-a-in-n-a-aec503</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35048%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35047-n-a-in-n-a-aec4ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35047%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35046-n-a-in-n-a-aec4ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35046%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35045-n-a-in-n-a-aec4ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35045%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35044-n-a-in-n-a-aec4cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35044%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35043-n-a-in-n-a-aec4cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35043%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35042-n-a-in-n-a-aec4c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35042%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35041-n-a-in-n-a-aec4c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35041%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec4c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38670-cwe-862-missing-authorization-in-unisoc-shanghai-technologies-co-ltd-sc9863a-sc9832e-sc7731e-t610-t310-t606-t760-t610-t618-t606-t612-t616-t760-t770-t820-s8000-aec417</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38670%3A%20CWE-862%20Missing%20Authorization%20in%20Unisoc%20(Shanghai)%20Technologies%20Co.%2C%20Ltd.%20SC9863A%2FSC9832E%2FSC7731E%2FT610%2FT310%2FT606%2FT760%2FT610%2FT618%2FT606%2FT612%2FT616%2FT760%2FT770%2FT820%2FS8000&amp;severity=high&amp;id=682cd0fa1484d88663aec417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35040-n-a-in-n-a-aec409</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32149-cwe-400-uncontrolled-resource-consumption-in-golang-org-x-text-golang-org-x-text-language-aec180</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32149%3A%20CWE%20400%3A%20Uncontrolled%20Resource%20Consumption%20in%20golang.org%2Fx%2Ftext%20golang.org%2Fx%2Ftext%2Flanguage&amp;severity=high&amp;id=682cd0fa1484d88663aec180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-14-f12d17</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39295-cwe-87-improper-neutralization-of-alternate-xss-syntax-in-knowagelabs-knowage-server-bf6a1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39295%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20KnowageLabs%20Knowage-Server&amp;severity=medium&amp;id=682d9849c4522896dcbf6a1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39303-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-ree6-applications-ree6-bf4744</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39303%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Ree6-Applications%20Ree6&amp;severity=medium&amp;id=682d9845c4522896dcbf4744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39302-cwe-863-incorrect-authorization-in-ree6-applications-ree6-bf473c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39302%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Ree6-Applications%20Ree6&amp;severity=medium&amp;id=682d9845c4522896dcbf473c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39300-cwe-347-improper-verification-of-cryptographic-signature-in-node-saml-node-saml-bf4738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39300%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20node-saml%20node-saml&amp;severity=medium&amp;id=682d9845c4522896dcbf4738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39293-cwe-191-integer-underflow-wrap-or-wraparound-in-azure-rtos-usbx-bf46fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39293%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20azure-rtos%20usbx&amp;severity=medium&amp;id=682d9845c4522896dcbf46fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39278-cwe-400-uncontrolled-resource-consumption-in-istio-istio-bf4698</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39278%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20istio%20istio&amp;severity=medium&amp;id=682d9845c4522896dcbf4698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39229-cwe-287-improper-authentication-in-grafana-grafana-bf45e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39229%3A%20CWE-287%3A%20Improper%20Authentication%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf45e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39201-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-bf45d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39201%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf45d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35944-cwe-94-improper-control-of-generation-of-code-code-injection-in-octobercms-october-bf450b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35944%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=682d9845c4522896dcbf450b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31130-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-bf44d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31130%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf44d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31123-cwe-347-improper-verification-of-cryptographic-signature-in-grafana-grafana-bf44ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31123%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf44ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2828-information-exposure-in-octopus-deploy-octopus-server-aec712</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2828%3A%20Information%20Exposure%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=682cd0fb1484d88663aec712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42156-n-a-in-n-a-aec6b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42156%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec6b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41674-n-a-in-n-a-aec6b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41674%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec6b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41534-n-a-in-n-a-aec6b5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41534%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec6b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41533-n-a-in-n-a-aec692</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41533%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41475-n-a-in-n-a-aec690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41475%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41474-n-a-in-n-a-aec683</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41474%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41473-n-a-in-n-a-aec681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41473%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41391-n-a-in-n-a-aec67f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41391%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41390-n-a-in-n-a-aec658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41390%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40187-n-a-in-n-a-aec656</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40187%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3457-cwe-346-origin-validation-error-in-ikus060-ikus060-rdiffweb-aec654</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3457%3A%20CWE-346%20Origin%20Validation%20Error%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=low&amp;id=682cd0fb1484d88663aec654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3456-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ikus060-ikus060-rdiffweb-aec626</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3456%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682cd0fb1484d88663aec626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41497-n-a-in-n-a-aec5bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41497%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41496-n-a-in-n-a-aec5b9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41496%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41495-n-a-in-n-a-aec5b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41495%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41489-n-a-in-n-a-aec5aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41489%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec5aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41480-n-a-in-n-a-aec5a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41480%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38902-n-a-in-n-a-aec5a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38902%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec5a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37208-n-a-in-n-a-aec5a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37208%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec5a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35612-n-a-in-n-a-aec5a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35612%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec5a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41485-n-a-in-n-a-aec581</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41485%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41484-n-a-in-n-a-aec57f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41484%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec57f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41483-n-a-in-n-a-aec57d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41483%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41482-n-a-in-n-a-aec57b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41482%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41481-n-a-in-n-a-aec579</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41481%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35611-n-a-in-n-a-aec56c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35611%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec56c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35136-n-a-in-n-a-aec56a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35136%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec56a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35135-n-a-in-n-a-aec568</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35135%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35134-n-a-in-n-a-aec566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35134%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35081-n-a-in-n-a-aec564</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35081%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35080-n-a-in-n-a-aec543</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35080%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34022-n-a-in-n-a-aec541</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34022%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42906-n-a-in-n-a-aec4b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42906%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42902-n-a-in-n-a-aec4b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42902%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42901-n-a-in-n-a-aec4aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42901%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec4aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42900-n-a-in-n-a-aec4a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42900%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec4a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42899-n-a-in-n-a-aec4a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42899%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec4a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42161-n-a-in-n-a-aec4a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42161%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42721-n-a-in-n-a-aec17a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42721%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42720-n-a-in-n-a-aec16d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42720%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42719-n-a-in-n-a-aec16b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42719%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec16b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42160-n-a-in-n-a-aebed0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42160%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f91484d88663aebed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42159-n-a-in-n-a-aebec3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42159%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aebec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34021-n-a-in-n-a-aebeb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f91484d88663aebeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34020-n-a-in-n-a-aebea4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f91484d88663aebea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24697-command-injection-in-apache-software-foundation-apache-kylin-aebe9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24697%3A%20Command%20injection%20in%20Apache%20Software%20Foundation%20Apache%20Kylin&amp;severity=critical&amp;id=682cd0f91484d88663aebe9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-20030-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-in-sonicwall-sonicwall-gms-aebe98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-20030%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20in%20SonicWall%20SonicWall%20GMS&amp;severity=high&amp;id=682cd0f91484d88663aebe98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-13-f122e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f122e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34391-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-dell-cpg-bios-aebeb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34391%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0f91484d88663aebeb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34390-cwe-457-use-of-uninitialized-variable-in-dell-cpg-bios-bd6960</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34390%3A%20CWE-457%3A%20Use%20of%20Uninitialized%20Variable%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682d9816c4522896dcbd6960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33937-cwe-23-relative-path-traversal-in-dell-geodrive-aebea2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33937%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Dell%20GeoDrive&amp;severity=high&amp;id=682cd0f91484d88663aebea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33922-cwe-276-incorrect-default-permissions-in-dell-geodrive-aec53f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33922%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20Dell%20GeoDrive&amp;severity=high&amp;id=682cd0fb1484d88663aec53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33921-cwe-427-uncontrolled-search-path-element-in-dell-geodrive-aec53d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33921%3A%20CWE-427%3A%20Uncontrolled%20Search%20Path%20Element%20in%20Dell%20GeoDrive&amp;severity=high&amp;id=682cd0fb1484d88663aec53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33920-cwe-428-unquoted-search-path-or-element-in-dell-geodrive-aec53b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33920%3A%20CWE-428%3A%20Unquoted%20Search%20Path%20or%20Element%20in%20Dell%20GeoDrive&amp;severity=high&amp;id=682cd0fb1484d88663aec53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33919-cwe-200-information-exposure-in-dell-geodrive-aec52e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33919%3A%20CWE-200%3A%20Information%20Exposure%20in%20Dell%20GeoDrive&amp;severity=high&amp;id=682cd0fb1484d88663aec52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33918-cwe-316-cleartext-storage-of-sensitive-information-in-memory-in-dell-geodrive-aec52c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33918%3A%20CWE-316%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20in%20Memory%20in%20Dell%20GeoDrive&amp;severity=medium&amp;id=682cd0fb1484d88663aec52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32493-cwe-121-stack-based-buffer-overflow-in-dell-cpg-bios-aec52a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32493%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20Dell%20CPG%20BIOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec52a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32491-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-dell-cpg-bios-aec528</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32491%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Dell%20CPG%20BIOS&amp;severity=medium&amp;id=682cd0fb1484d88663aec528</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32489-cwe-20-improper-input-validation-in-dell-cpg-bios-aec526</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32489%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0fb1484d88663aec526</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32488-cwe-20-improper-input-validation-in-dell-cpg-bios-aec524</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32488%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0fa1484d88663aec524</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32487-cwe-20-improper-input-validation-in-dell-cpg-bios-aec4a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32487%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0fa1484d88663aec4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32485-cwe-20-improper-input-validation-in-dell-cpg-bios-aebe9e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32485%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0f91484d88663aebe9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32484-cwe-20-improper-input-validation-in-dell-cpg-bios-aebe7d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32484%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=medium&amp;id=682cd0f91484d88663aebe7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32483-cwe-20-improper-input-validation-in-dell-cpg-bios-aebe9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32483%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=medium&amp;id=682cd0f91484d88663aebe9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31228-cwe-307-improper-restriction-of-excessive-authentication-attempts-in-dell-xtremio-aec491</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31228%3A%20CWE-307%3A%20Improper%20Restriction%20of%20Excessive%20Authentication%20Attempts%20in%20Dell%20XtremIO&amp;severity=high&amp;id=682cd0fa1484d88663aec491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0030-cwe-290-authentication-bypass-by-spoofing-in-palo-alto-networks-pan-os-aec6f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0030%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Palo%20Alto%20Networks%20PAN-OS&amp;severity=high&amp;id=682cd0fb1484d88663aec6f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3171-cwe-20-improper-input-validation-in-google-llc-protocolbuffers-bf815c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3171%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20LLC%20Protocolbuffers&amp;severity=medium&amp;id=682d984bc4522896dcbf815c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39299-cwe-347-improper-verification-of-cryptographic-signature-in-node-saml-passport-saml-bf4734</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39299%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20node-saml%20passport-saml&amp;severity=medium&amp;id=682d9845c4522896dcbf4734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39298-cwe-502-deserialization-of-untrusted-data-in-melisplatform-melis-front-bf470a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39298%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20melisplatform%20melis-front&amp;severity=medium&amp;id=682d9845c4522896dcbf470a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39297-cwe-502-deserialization-of-untrusted-data-in-melisplatform-melis-cms-bf4706</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39297%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20melisplatform%20melis-cms&amp;severity=medium&amp;id=682d9845c4522896dcbf4706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39283-cwe-125-out-of-bounds-read-in-freerdp-freerdp-bf46db</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39283%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20FreeRDP%20FreeRDP&amp;severity=medium&amp;id=682d9845c4522896dcbf46db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39282-cwe-908-use-of-uninitialized-resource-in-freerdp-freerdp-bf46d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39282%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20FreeRDP%20FreeRDP&amp;severity=medium&amp;id=682d9845c4522896dcbf46d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41351-n-a-in-n-a-aec635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41351%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41350-n-a-in-n-a-aec633</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41350%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41349-n-a-in-n-a-aec614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41349%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41348-n-a-in-n-a-aec607</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41348%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec607</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41316-n-a-in-n-a-aec605</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41316%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40871-n-a-in-n-a-aec5e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40871%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec5e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40664-cwe-287-improper-authentication-in-apache-software-foundation-apache-shiro-aec5e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40664%3A%20CWE-287%20Improper%20Authentication%20in%20Apache%20Software%20Foundation%20Apache%20Shiro&amp;severity=critical&amp;id=682cd0fb1484d88663aec5e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40469-n-a-in-n-a-aec5e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40469%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec5e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37614-n-a-in-n-a-aec5e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37614%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37611-n-a-in-n-a-aec5e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37611%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fb1484d88663aec5e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25661-untrusted-pointer-dereference-in-kernel-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-aec5c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25661%3A%20Untrusted%20Pointer%20Dereference%20in%20Kernel%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&amp;severity=high&amp;id=682cd0fb1484d88663aec5c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25660-double-free-in-kernel-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-aec5c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25660%3A%20Double%20Free%20in%20Kernel%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&amp;severity=high&amp;id=682cd0fb1484d88663aec5c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22078-integer-overflow-or-wraparound-issues-in-boot-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-aec5a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22078%3A%20Integer%20Overflow%20or%20Wraparound%20issues%20in%20BOOT%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682cd0fb1484d88663aec5a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42086-n-a-in-n-a-aec54b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42086%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fb1484d88663aec54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42081-n-a-in-n-a-aec549</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42081%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fb1484d88663aec549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42897-n-a-in-n-a-aec4a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42897%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42715-n-a-in-n-a-aec493</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42715%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42711-n-a-in-n-a-aec48f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42711%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42087-n-a-in-n-a-aec48d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42087%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42080-n-a-in-n-a-aec487</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42080%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42079-n-a-in-n-a-aec485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42079%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42078-n-a-in-n-a-aec481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42078%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42077-n-a-in-n-a-aec474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42077%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0fa1484d88663aec474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41403-n-a-in-n-a-aec472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41403%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0fa1484d88663aec472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28887-multiple-denial-of-service-dos-vulnerability-in-f-secure-and-withsecure-all-f-secure-and-withsecure-endpoint-protection-products-for-windows-mac-f-secure-linux-security-32-bit-f-secure-linux-security-64-bit-f-secure-atlant-f-secure-internet-gatekeeper-aec470</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28887%3A%20Multiple%20Denial-of-Service%20(DoS)%20vulnerability%20in%20F-Secure%20and%20WithSecure%20All%20F-Secure%20and%20WithSecure%20Endpoint%20Protection%20products%20for%20Windows%20%26%20Mac%20F-Secure%20Linux%20Security%20(32-bit)%20F-Secure%20Linux%20Security%20(64-bit)%20F-Secure%20Atlant%20F-Secure%20Internet%20Gatekeeper&amp;severity=medium&amp;id=682cd0fa1484d88663aec470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25665-buffer-over-read-in-kernel-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-consumer-iot-snapdragon-mobile-aec46e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25665%3A%20Buffer%20Over-read%20in%20Kernel%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682cd0fa1484d88663aec46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25664-information-exposure-in-graphics-linux-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-aec44f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25664%3A%20Information%20Exposure%20in%20Graphics%20Linux%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682cd0fa1484d88663aec44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25663-buffer-over-read-in-wlan-in-qualcomm-inc-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-aec44d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25663%3A%20Buffer%20Over-read%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity&amp;severity=medium&amp;id=682cd0fa1484d88663aec44d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25662-untrusted-pointer-dereference-in-video-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-wearables-aec44b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25662%3A%20Untrusted%20Pointer%20Dereference%20in%20Video%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Wearables&amp;severity=medium&amp;id=682cd0fa1484d88663aec44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22077-use-after-free-in-graphics-in-qualcomm-inc-snapdragon-mobile-aec447</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22077%3A%20Use-After-Free%20in%20Graphics%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Mobile&amp;severity=high&amp;id=682cd0fa1484d88663aec447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36369-n-a-in-n-a-aec445</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36369%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0fa1484d88663aec445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33106-n-a-in-n-a-aebea0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33106%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f91484d88663aebea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18447-n-a-in-n-a-aebe79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18447%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f91484d88663aebe79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18446-n-a-in-n-a-aebe77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f91484d88663aebe77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2720-information-exposure-in-octopus-deploy-octopus-server-aebe35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2720%3A%20Information%20Exposure%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=682cd0f91484d88663aebe35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2249-cwe-269-improper-privilege-management-in-avaya-avaya-aura-communication-manager-aeb52c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2249%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Avaya%20Avaya%20Aura%20Communication%20Manager&amp;severity=high&amp;id=682cd0f81484d88663aeb52c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-12-f12591</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36201-cwe-204-observable-response-discrepancy-in-johnson-controls-c-cure-9000-aec443</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36201%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Johnson%20Controls%20C%E2%80%A2CURE%209000&amp;severity=medium&amp;id=682cd0fa1484d88663aec443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34434-cwe-285-improper-authorization-in-dell-cloud-mobility-for-dell-storage-aeb53f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34434%3A%20CWE-285%3A%20Improper%20Authorization%20in%20Dell%20Cloud%20Mobility%20for%20Dell%20Storage&amp;severity=medium&amp;id=682cd0f81484d88663aeb53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34432-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-dell-dell-hybrid-client-dhc-aeb532</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34432%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Dell%20Dell%20Hybrid%20Client%20(DHC)&amp;severity=high&amp;id=682cd0f81484d88663aeb532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34431-cwe-284-improper-access-control-in-dell-dell-hybrid-client-dhc-aeb530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34431%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Dell%20Dell%20Hybrid%20Client%20(DHC)&amp;severity=medium&amp;id=682cd0f81484d88663aeb530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34430-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-dell-dell-hybrid-client-dhc-aeb52e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34430%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Dell%20Hybrid%20Client%20(DHC)&amp;severity=high&amp;id=682cd0f81484d88663aeb52e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34427-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-dell-dell-container-storage-modules-aebe85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34427%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20Dell%20Dell%20Container%20Storage%20Modules&amp;severity=high&amp;id=682cd0f91484d88663aebe85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34426-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-dell-dell-container-storage-modules-aebe83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34426%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Dell%20Dell%20Container%20Storage%20Modules&amp;severity=high&amp;id=682cd0f91484d88663aebe83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32492-cwe-20-improper-input-validation-in-dell-cpg-bios-aebe81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32492%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0f91484d88663aebe81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32486-cwe-20-improper-input-validation-in-dell-cpg-bios-aebe7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32486%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Dell%20CPG%20BIOS&amp;severity=high&amp;id=682cd0f91484d88663aebe7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38388-obtain-information-in-ibm-navigator-mobile-aec449</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38388%3A%20Obtain%20Information%20in%20IBM%20Navigator%20Mobile&amp;severity=medium&amp;id=682cd0fa1484d88663aec449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32174-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gogs-gogs-aebe7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32174%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gogs%20gogs&amp;severity=critical&amp;id=682cd0f91484d88663aebe7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32175-cwe-352-cross-site-request-forgery-csrf-in-adguardhome-adguardhome-aeb0a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32175%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20AdguardHome%20AdguardHome&amp;severity=medium&amp;id=682cd0f71484d88663aeb0a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41201-cwe-119-in-sap-se-sap-3d-visual-ent-c85c3f67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41201%3A%20CWE-119%20in%20SAP%20SE%20SAP%203D%20Visual%20Enterprise%20Viewer&amp;severity=high&amp;id=6841d069182aa0cae2e88636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41665-cwe-141-improper-neutralization-of-parameter-argument-delimiters-in-siemens-sicam-p850-bf81a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41665%3A%20CWE-141%3A%20Improper%20Neutralization%20of%20Parameter%2FArgument%20Delimiters%20in%20Siemens%20SICAM%20P850&amp;severity=medium&amp;id=682d984bc4522896dcbf81a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40226-cwe-384-session-fixation-in-siemens-sicam-p850-bf8194</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40226%3A%20CWE-384%3A%20Session%20Fixation%20in%20Siemens%20SICAM%20P850&amp;severity=medium&amp;id=682d984bc4522896dcbf8194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38465-cwe-522-insufficiently-protected-credentials-in-siemens-simatic-drive-controller-family-bf8107</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38465%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Siemens%20SIMATIC%20Drive%20Controller%20family&amp;severity=medium&amp;id=682d984bc4522896dcbf8107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31766-cwe-20-improper-input-validation-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf809d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31766%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf809d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31765-cwe-862-missing-authorization-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf8095</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31765%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf8095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39296-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-melisplatform-melis-asset-manager-bf4702</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39296%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20melisplatform%20melis-asset-manager&amp;severity=medium&amp;id=682d9845c4522896dcbf4702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39271-cwe-400-uncontrolled-resource-consumption-in-traefik-traefik-bf468c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39271%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20traefik%20traefik&amp;severity=medium&amp;id=682d9845c4522896dcbf468c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41033-elevation-of-privilege-in-microsoft-windows-10-version-1809-bed082</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41033%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682d983ac4522896dcbed082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38044-remote-code-execution-in-microsoft-windows-11-version-22h2-bed07e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38044%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2011%20version%2022H2&amp;severity=high&amp;id=682d983ac4522896dcbed07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38371-cwe-400-uncontrolled-resource-consumption-in-siemens-apogee-mbc-ppc-bacnet-bd6695</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38371%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20APOGEE%20MBC%20(PPC)%20(BACnet)&amp;severity=high&amp;id=682d9816c4522896dcbd6695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41199-cwe-119-in-sap-se-sap-3d-visual-enterprise-viewer-aec6fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41199%3A%20CWE-119%20in%20SAP%20SE%20SAP%203D%20Visual%20Enterprise%20Viewer&amp;severity=high&amp;id=682cd0fb1484d88663aec6fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42235-n-a-in-n-a-aeb478</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f81484d88663aeb478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42230-n-a-in-n-a-aeb476</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42230%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42229-n-a-in-n-a-aeb474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42229%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42039-n-a-in-n-a-aeb472</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42038-n-a-in-n-a-aeb470</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41530-n-a-in-n-a-aeb46e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41530%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb46e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41408-n-a-in-n-a-aeb46c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41408%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb46c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41407-n-a-in-n-a-aeb46a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41407%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f81484d88663aeb46a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42044-n-a-in-n-a-aeb468</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42044%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42043-n-a-in-n-a-aeb466</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42043%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42042-n-a-in-n-a-aeb459</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42042%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42041-n-a-in-n-a-aeb457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42041%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42040-n-a-in-n-a-aeb455</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f81484d88663aeb455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42238-n-a-in-n-a-aeb12f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42238%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb12f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42236-n-a-in-n-a-aeb12d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeb12d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42037-n-a-in-n-a-aeb12b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb12b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42034-n-a-in-n-a-aeb129</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42034%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41382-n-a-in-n-a-aeb127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41382%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41404-n-a-in-n-a-aeb121</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41404%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb121</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41387-n-a-in-n-a-aeb114</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41387%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41381-n-a-in-n-a-aeb112</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41381%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41380-n-a-in-n-a-aeb110</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41380%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41376-n-a-in-n-a-aeb10e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41376%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeb10e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41210-cwe-338-in-sap-se-sap-customer-data-cloud-gigya-aeb10c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41210%3A%20CWE-338%20in%20SAP%20SE%20SAP%20Customer%20Data%20Cloud%20(Gigya)&amp;severity=medium&amp;id=682cd0f71484d88663aeb10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41202-cwe-119-in-sap-se-sap-3d-visual-enterprise-viewer-aeb10a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41202%3A%20CWE-119%20in%20SAP%20SE%20SAP%203D%20Visual%20Enterprise%20Viewer&amp;severity=high&amp;id=682cd0f71484d88663aeb10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41386-n-a-in-n-a-aeb0f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41386%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb0f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41189-cwe-119-in-sap-se-sap-3d-visual-enterprise-viewer-aeb0e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41189%3A%20CWE-119%20in%20SAP%20SE%20SAP%203D%20Visual%20Enterprise%20Viewer&amp;severity=high&amp;id=682cd0f71484d88663aeb0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42731-n-a-in-n-a-aeb0ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42731%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb0ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42717-n-a-in-n-a-aeb090</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42717%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41851-cwe-824-access-of-uninitialized-pointer-in-siemens-jttk-aeb08e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41851%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20Siemens%20JTTK&amp;severity=high&amp;id=682cd0f71484d88663aeb08e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41385-n-a-in-n-a-aeb02f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41385%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb02f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41384-n-a-in-n-a-aeb00a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41384%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeb00a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41383-n-a-in-n-a-aeaff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41383%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeaff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41209-cwe-326-in-sap-se-sap-customer-data-cloud-gigya-aeafcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41209%3A%20CWE-326%20in%20SAP%20SE%20SAP%20Customer%20Data%20Cloud%20(Gigya)&amp;severity=medium&amp;id=682cd0f71484d88663aeafcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41206-cwe-79-in-sap-se-sap-businessobjects-business-intelligence-platform-analysis-for-olap-aeafbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41206%3A%20CWE-79%20in%20SAP%20SE%20SAP%20BusinessObjects%20Business%20Intelligence%20platform%20(Analysis%20for%20OLAP)&amp;severity=medium&amp;id=682cd0f71484d88663aeafbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41204-cwe-601-in-sap-se-sap-commerce-aeafb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41204%3A%20CWE-601%20in%20SAP%20SE%20SAP%20Commerce&amp;severity=high&amp;id=682cd0f71484d88663aeafb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41606-n-a-in-n-a-aeaee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41606%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeaee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41550-n-a-in-n-a-aeaee4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41550%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeaee4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41532-n-a-in-n-a-aeaee2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41532%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeaee2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41406-n-a-in-n-a-aeade2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41406%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeade2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41191-cwe-119-in-sap-se-sap-3d-visual-enterprise-viewer-aeadc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41191%3A%20CWE-119%20in%20SAP%20SE%20SAP%203D%20Visual%20Enterprise%20Viewer&amp;severity=high&amp;id=682cd0f71484d88663aeadc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-11-f120f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f120f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36063-cwe-121-stack-based-buffer-overflow-in-azure-rtos-usbx-bf68e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36063%3A%20CWE-121%3A%20Stack-based%20Buffer%20Overflow%20in%20azure-rtos%20usbx&amp;severity=medium&amp;id=682d9849c4522896dcbf68e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39292-cwe-1258-exposure-of-sensitive-system-information-due-to-uncleared-debug-information-in-abdolence-slack-morphism-rust-bf46ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39292%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20abdolence%20slack-morphism-rust&amp;severity=medium&amp;id=682d9845c4522896dcbf46ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39288-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-fastify-fastify-bf46e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39288%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20fastify%20fastify&amp;severity=medium&amp;id=682d9845c4522896dcbf46e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-10-f12b40</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42012-na-in-na-b9214588</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42012%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42011-na-in-na-af7e7db5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42011%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42010-na-in-na-a006ce7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42010%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-09-e8819e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-09&amp;severity=medium&amp;id=682b7ba5d3ddd8cef2e8819e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-09-f1249b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1249b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39281-cwe-20-improper-input-validation-in-fatfreecrm-fat-free-crm-bf46c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39281%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20fatfreecrm%20fat_free_crm&amp;severity=medium&amp;id=682d9845c4522896dcbf46c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-08-f12186</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/html-file-attachments-still-a-threat-7a374598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HTML%20File%20Attachments%3A%20Still%20A%20Threat&amp;severity=medium&amp;id=68d6860d047461c53675b8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39291-cwe-20-improper-input-validation-in-zoneminder-zoneminder-bf6a18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39291%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ZoneMinder%20zoneminder&amp;severity=medium&amp;id=682d9849c4522896dcbf6a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39290-cwe-287-improper-authentication-in-zoneminder-zoneminder-bf6a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39290%3A%20CWE-287%3A%20Improper%20Authentication%20in%20ZoneMinder%20zoneminder&amp;severity=medium&amp;id=682d9849c4522896dcbf6a14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39289-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-zoneminder-zoneminder-bf6a12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39289%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ZoneMinder%20zoneminder&amp;severity=medium&amp;id=682d9849c4522896dcbf6a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39285-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zoneminder-zoneminder-bf6a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39285%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ZoneMinder%20zoneminder&amp;severity=medium&amp;id=682d9849c4522896dcbf6a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39287-cwe-319-cleartext-transmission-of-sensitive-information-in-valexandersaulys-tiny-csrf-bf46df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39287%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20valexandersaulys%20tiny-csrf&amp;severity=medium&amp;id=682d9845c4522896dcbf46df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39877-cwe-284-improper-access-control-in-samsung-mobile-group-sharing-aeaff1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39877%3A%20CWE-284%20Improper%20Access%20Control%20in%20Samsung%20Mobile%20Group%20Sharing&amp;severity=medium&amp;id=682cd0f71484d88663aeaff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40872-n-a-in-n-a-aeafd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40872%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeafd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-07-f12081</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-linux-malware-found-on-a-single-compromised-linux-host-f0c21e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Linux%20malware%20found%20on%20a%20single%20compromised%20Linux%20host&amp;severity=medium&amp;id=682acdbebbaf20d303f0c21e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41853-cwe-470-use-of-externally-controlled-input-to-select-classes-or-code-unsafe-reflection-in-hypersql-database-hsqldb-bf81a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41853%3A%20CWE-470%20Use%20of%20Externally-Controlled%20Input%20to%20Select%20Classes%20or%20Code%20(&apos;Unsafe%20Reflection&apos;)%20in%20HyperSQL%20DataBase%20hsqldb&amp;severity=medium&amp;id=682d984bc4522896dcbf81a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39284-cwe-665-improper-initialization-in-codeigniter4-codeigniter4-bf69f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39284%3A%20CWE-665%3A%20Improper%20Initialization%20in%20codeigniter4%20CodeIgniter4&amp;severity=medium&amp;id=682d9849c4522896dcbf69f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39274-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-lora-net-loramac-node-bf69ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39274%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Lora-net%20LoRaMac-node&amp;severity=medium&amp;id=682d9849c4522896dcbf69ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39265-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-mybb-mybb-bf69e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39265%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20mybb%20mybb&amp;severity=medium&amp;id=682d9849c4522896dcbf69e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39222-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-dexidp-dex-bf6999</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39222%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dexidp%20dex&amp;severity=medium&amp;id=682d9849c4522896dcbf6999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39280-cwe-400-uncontrolled-resource-consumption-in-pyupio-dparse-bf46a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39280%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20pyupio%20dparse&amp;severity=medium&amp;id=682d9845c4522896dcbf46a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39279-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-discourse-discourse-chat-bf46a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39279%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20discourse%20discourse-chat&amp;severity=medium&amp;id=682d9845c4522896dcbf46a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39275-cwe-863-incorrect-authorization-in-saleor-saleor-bf4694</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39275%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20saleor%20saleor&amp;severity=medium&amp;id=682d9845c4522896dcbf4694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39273-cwe-798-use-of-hard-coded-credentials-in-flyteorg-flyteadmin-bf4690</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39273%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20flyteorg%20flyteadmin&amp;severity=medium&amp;id=682d9845c4522896dcbf4690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39270-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-discourse-discotoc-bf4688</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39270%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20discourse%20DiscoTOC&amp;severity=medium&amp;id=682d9845c4522896dcbf4688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39269-cwe-319-cleartext-transmission-of-sensitive-information-in-pjsip-pjproject-bf4684</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39269%3A%20CWE-319%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9845c4522896dcbf4684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39244-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-pjsip-pjproject-bf461c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39244%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9845c4522896dcbf461c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39237-cwe-347-improper-verification-of-cryptographic-signature-in-sylabs-sif-bf4614</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39237%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sylabs%20sif&amp;severity=medium&amp;id=682d9845c4522896dcbf4614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31008-cwe-330-use-of-insufficiently-random-values-in-rabbitmq-rabbitmq-server-bf44ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31008%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20rabbitmq%20rabbitmq-server&amp;severity=medium&amp;id=682d9845c4522896dcbf44ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-06-742fe2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-06&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb742fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-06-f126e4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f126e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-05-f12820</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-04-f123c4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f123c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33888-memory-corruption-in-utodesk-autocad-advance-steel-and-civil-3d-aeafbd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33888%3A%20Memory%20Corruption%20in%20utodesk%C2%AE%20AutoCAD%C2%AE%2C%20Advance%20Steel%20and%20Civil%203D%C2%AE&amp;severity=high&amp;id=682cd0f71484d88663aeafbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-of-exchange-0-day-campaign-atos-5199c80b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20of%20Exchange%200-day%20campaign%20(Atos)&amp;severity=high&amp;id=68359c9d5d5f0974d01f3b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-03-f120d2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f120d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-of-exchange-0-day-campaign-atos-f0dbfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20of%20Exchange%200-day%20campaign%20(Atos)&amp;severity=high&amp;id=682acdbebbaf20d303f0dbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/defttorero-tactics-techniques-and-procedures-of-intrusions-revealed-f0c21c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DeftTorero%3A%20tactics%2C%20techniques%20and%20procedures%20of%20intrusions%20revealed&amp;severity=low&amp;id=682acdbebbaf20d303f0c21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-of-exchange-0-day-campaign-atos-6e26dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20of%20Exchange%200-day%20campaign%20(Atos)&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e26dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-02-f11f60</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-01-f28e08</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-01&amp;severity=medium&amp;id=682acdc5bbaf20d303f28e08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-10-01-f12d85</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-10-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39268-cwe-352-cross-site-request-forgery-csrf-in-orchest-orchest-bf4680</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39268%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20orchest%20orchest&amp;severity=medium&amp;id=682d9845c4522896dcbf4680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34428-cwe-1333-inefficient-regular-expression-complexity-in-dell-dell-hybrid-client-dhc-aeaf20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34428%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20Dell%20Dell%20Hybrid%20Client%20(DHC)&amp;severity=medium&amp;id=682cd0f71484d88663aeaf20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40341-n-a-in-n-a-aeaf22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40341%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeaf22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40923-n-a-in-n-a-aeaeff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40923%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeaeff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40943-n-a-in-n-a-aeaf01</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40943%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeaf01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40756-n-a-in-n-a-aeaee0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40756%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeaee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35155-n-a-in-n-a-bdc2b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35155%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35156-n-a-in-n-a-aeaede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35156%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeaede</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41975-n-a-in-n-a-aeaebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41975%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeaebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40944-n-a-in-n-a-aeae49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40944%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682cd0f71484d88663aeae49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33354-n-a-in-n-a-aeae43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeae43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28851-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf44bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28851%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf44bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36965-stored-and-dom-xss-in-qoe-applications-orion-platform-in-solarwinds-orion-platform-aeae47</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36965%3A%20Stored%20and%20DOM%20XSS%20in%20QoE%20Applications%3A%20Orion%20Platform%20in%20SolarWinds%20Orion%20Platform&amp;severity=medium&amp;id=682cd0f71484d88663aeae47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32540-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-bosch-bvms-aeae45</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32540%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Bosch%20BVMS&amp;severity=high&amp;id=682cd0f71484d88663aeae45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40316-sql-injection-in-moodle-aeae41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40316%3A%20SQL%20injection%20in%20moodle&amp;severity=medium&amp;id=682cd0f71484d88663aeae41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40315-sql-injection-in-moodle-aeae3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40315%3A%20SQL%20injection%20in%20moodle&amp;severity=critical&amp;id=682cd0f71484d88663aeae3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40313-stored-xss-in-moodle-aeac76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40313%3A%20Stored%20XSS%20in%20moodle&amp;severity=high&amp;id=682cd0f71484d88663aeac76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40314-remote-code-execution-in-moodle-aeac78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40314%3A%20Remote%20code%20execution%20in%20moodle&amp;severity=critical&amp;id=682cd0f71484d88663aeac78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41870-n-a-in-n-a-aeac7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41870%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeac7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1959-improper-access-control-fingerprint-in-applock-fingerprint-aeac72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1959%3A%20Improper%20Access%20Control%20-%20Fingerprint%20in%20AppLock%20-%20Fingerprint&amp;severity=medium&amp;id=682cd0f71484d88663aeac72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40277-remote-command-execution-rce-in-joplin-aeac74</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40277%3A%20Remote%20command%20execution%20(RCE)%20in%20Joplin&amp;severity=high&amp;id=682cd0f71484d88663aeac74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40274-remote-command-execution-rce-in-gridea-aeac68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40274%3A%20Remote%20command%20execution%20(RCE)%20in%20Gridea&amp;severity=high&amp;id=682cd0f71484d88663aeac68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36961-cwe-89-sql-injection-in-solarwinds-orion-platform-aeaeb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36961%3A%20CWE-89%20SQL%20Injection%20in%20SolarWinds%20Orion%20Platform&amp;severity=high&amp;id=682cd0f71484d88663aeaeb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23726-cwe-200-information-exposure-in-ping-identity-pingcentral-aeaea4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23726%3A%20CWE-200%20Information%20Exposure%20in%20Ping%20Identity%20PingCentral&amp;severity=medium&amp;id=682cd0f71484d88663aeaea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41440-n-a-in-n-a-b36f87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41440%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd8894d7c5ea9f4b36f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41439-n-a-in-n-a-b36f85</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41439%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd8894d7c5ea9f4b36f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41437-n-a-in-n-a-b3768f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41437%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd9834d7c5ea9f4b3768f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37461-n-a-in-n-a-b3768d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37461%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd9834d7c5ea9f4b3768d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3371-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ikus060-ikus060-rdiffweb-aeaeb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3371%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=high&amp;id=682cd0f71484d88663aeaeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2529-cwe-20-improper-input-validation-in-cloudflare-goflow-aeaea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2529%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Cloudflare%20goflow&amp;severity=high&amp;id=682cd0f71484d88663aeaea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2922-cwe-23-relative-path-traversal-in-dnnsoftware-dnnsoftware-dnn-platform-aeaea8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2922%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20dnnsoftware%20dnnsoftware%2Fdnn.platform&amp;severity=medium&amp;id=682cd0f71484d88663aeaea8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41848-n-a-in-n-a-b37691</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41848%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd9834d7c5ea9f4b37691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21222-regular-expression-denial-of-service-redos-in-css-what-aeaea2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21222%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20css-what&amp;severity=medium&amp;id=682cd0f71484d88663aeaea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24373-regular-expression-denial-of-service-redos-in-react-native-reanimated-b397b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24373%3A%20Regular%20Expression%20Denial%20of%20Service%20(ReDoS)%20in%20react-native-reanimated&amp;severity=medium&amp;id=682ce77b4d7c5ea9f4b397b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41845-n-a-in-n-a-b3768b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41845%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd9834d7c5ea9f4b3768b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41846-n-a-in-n-a-b38479</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41846%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cdced4d7c5ea9f4b38479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41847-n-a-in-n-a-b3847b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cdced4d7c5ea9f4b3847b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41841-n-a-in-n-a-b38475</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41841%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cdced4d7c5ea9f4b38475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41842-n-a-in-n-a-b38477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41842%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cdced4d7c5ea9f4b38477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41843-n-a-in-n-a-b3846f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41843%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cdced4d7c5ea9f4b3846f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41844-n-a-in-n-a-b38471</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cdced4d7c5ea9f4b38471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2778-rate-limit-bypass-in-octopus-deploy-octopus-server-b397b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2778%3A%20Rate%20Limit%20Bypass%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=critical&amp;id=682ce77b4d7c5ea9f4b397b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-30-f12455</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3364-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ikus060-ikus060-rdiffweb-aeaeb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3364%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682cd0f71484d88663aeaeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39232-cwe-20-improper-input-validation-in-discourse-discourse-bf460c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39232%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9845c4522896dcbf460c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39226-cwe-770-allocation-of-resources-without-limits-or-throttling-in-discourse-discourse-bf45e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39226%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9845c4522896dcbf45e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36068-cwe-862-missing-authorization-in-discourse-discourse-bf4513</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36068%3A%20CWE-862%3A%20Missing%20Authorization%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9845c4522896dcbf4513</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36066-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-discourse-discourse-bf450f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36066%3A%20CWE-434%3A%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9845c4522896dcbf450f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40472-n-a-in-n-a-b39353</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40472%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682ce4114d7c5ea9f4b39353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33880-n-a-in-n-a-b3934f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33880%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682ce4114d7c5ea9f4b3934f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35137-n-a-in-n-a-b389f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35137%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682ce08d4d7c5ea9f4b389f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39266-cwe-693-protection-mechanism-failure-in-laverdet-isolated-vm-bf4671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39266%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20laverdet%20isolated-vm&amp;severity=medium&amp;id=682d9845c4522896dcbf4671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40879-n-a-in-n-a-b389fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40879%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682ce08d4d7c5ea9f4b389fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40887-n-a-in-n-a-b389fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40887%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682ce08d4d7c5ea9f4b389fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39168-obtain-information-in-ibm-robotic-process-automation-aeadc5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39168%3A%20Obtain%20Information%20in%20IBM%20Robotic%20Process%20Automation&amp;severity=medium&amp;id=682cd0f71484d88663aeadc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40931-n-a-in-n-a-aeadc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeadc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38732-missing-content-security-policy-in-snapcenter-aeaca8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38732%3A%20Missing%20Content%20Security%20Policy%20in%20SnapCenter&amp;severity=high&amp;id=682cd0f71484d88663aeaca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39254-cwe-322-key-exchange-without-entity-authentication-in-poljar-matrix-nio-bf463e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39254%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20poljar%20matrix-nio&amp;severity=medium&amp;id=682d9845c4522896dcbf463e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39252-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-rust-sdk-bf463c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39252%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-rust-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf463c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40408-n-a-in-n-a-aeac8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40408%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682cd0f71484d88663aeac8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40407-n-a-in-n-a-b36f83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40407%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd8894d7c5ea9f4b36f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40890-n-a-in-n-a-bffb23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40890%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682de1cdc4522896dcbffb23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40363-n-a-in-n-a-bffb21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40363%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682de1cdc4522896dcbffb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40126-n-a-in-n-a-bffb09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40126%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682de1cdc4522896dcbffb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40475-n-a-in-n-a-bfff8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40475%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682de546c4522896dcbfff8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3355-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-inventree-inventree-inventree-b38473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3355%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20inventree%20inventree%2Finventree&amp;severity=high&amp;id=682cdced4d7c5ea9f4b38473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43362-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-meddata-hbys-b3846b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43362%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MedData%20HBYS&amp;severity=critical&amp;id=682cdced4d7c5ea9f4b3846b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43361-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-meddata-hbys-b38469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43361%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20MedData%20HBYS&amp;severity=critical&amp;id=682cdced4d7c5ea9f4b38469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-5797-object-lifecycle-issue-in-google-chrome-b389f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-5797%3A%20Object%20lifecycle%20issue%20in%20Google%20Chrome&amp;severity=high&amp;id=682ce08d4d7c5ea9f4b389f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-11015-cwe-290-authentication-bypass-by-spoofing-in-suculent-thinx-device-api-bf44b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-11015%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20suculent%20thinx-device-api&amp;severity=medium&amp;id=682d9845c4522896dcbf44b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40048-n-a-in-n-a-b389f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40048%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682ce08d4d7c5ea9f4b389f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35888-n-a-in-n-a-b38a05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35888%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682ce08d4d7c5ea9f4b38a05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39250-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-js-sdk-bf463a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39250%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-js-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf463a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3352-cwe-416-use-after-free-in-vim-vim-vim-b397bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3352%3A%20CWE-416%20Use%20After%20Free%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=682ce77b4d7c5ea9f4b397bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41828-n-a-in-n-a-b38a07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41828%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682ce08d4d7c5ea9f4b38a07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39173-n-a-in-n-a-b3846d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39173%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cdced4d7c5ea9f4b3846d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-29-f121f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f121f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3326-cwe-521-weak-password-requirements-in-ikus060-ikus060-rdiffweb-b397bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3326%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682ce77b4d7c5ea9f4b397bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31628-cwe-674-uncontrolled-recursion-in-php-group-php-2430d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31628%3A%20CWE-674%20Uncontrolled%20Recursion%20in%20PHP%20Group%20PHP&amp;severity=low&amp;id=682d6c76d4f2164cc92430d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40708-out-of-bounds-read-information-disclosure-in-trend-micro-trend-micro-deep-security-2430e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40708%3A%20Out-Of-Bounds%20Read%20Information%20Disclosure%20in%20Trend%20Micro%20Trend%20Micro%20Deep%20Security&amp;severity=low&amp;id=682d6c76d4f2164cc92430e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39263-cwe-287-improper-authentication-in-nextauthjs-next-auth-bf464c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39263%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9845c4522896dcbf464c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39257-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-ios-sdk-bf4644</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39257%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-ios-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf4644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39255-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-ios-sdk-bf4640</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39255%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-ios-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf4640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34424-cwe-787-out-of-bounds-write-in-dell-dell-networking-os10-2430e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34424%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Dell%20Dell%20Networking%20OS10&amp;severity=high&amp;id=682d6c76d4f2164cc92430e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34394-cwe-295-improper-certificate-validation-in-dell-dell-networking-os10-2430db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34394%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Dell%20Dell%20Networking%20OS10&amp;severity=low&amp;id=682d6c76d4f2164cc92430db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29089-cwe-522-insufficiently-protected-credentials-in-dell-dell-networking-os10-b389f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29089%3A%20CWE-522%3A%20Insufficiently%20Protected%20Credentials%20in%20Dell%20Dell%20Networking%20OS10&amp;severity=medium&amp;id=682ce08d4d7c5ea9f4b389f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3292-cwe-524-use-of-cache-containing-sensitive-information-in-ikus060-ikus060-rdiffweb-bfff8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3292%3A%20CWE-524%20Use%20of%20Cache%20Containing%20Sensitive%20Information%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682de546c4522896dcbfff8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39248-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-android-sdk2-bf462d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39248%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-android-sdk2&amp;severity=medium&amp;id=682d9845c4522896dcbf462d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39246-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-android-sdk2-bf4481</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39246%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-android-sdk2&amp;severity=medium&amp;id=682d9845c4522896dcbf4481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23716-cwe-532-insertion-of-sensitive-information-into-log-file-in-elastic-elastic-cloud-enterprise-bfff84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23716%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20Elastic%20Elastic%20Cloud%20Enterprise&amp;severity=medium&amp;id=682de546c4522896dcbfff84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3215-cwe-113-improper-neutralization-of-crlf-sequences-in-http-headers-in-swift-project-swiftnio-b389f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3215%3A%20CWE-113%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20in%20HTTP%20Headers%20in%20Swift%20Project%20SwiftNIO&amp;severity=high&amp;id=682ce08d4d7c5ea9f4b389f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3287-cwe-256-cwe-552-in-fwupd-b39351</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3287%3A%20CWE-256%20%7C%20CWE-552%20in%20fwupd&amp;severity=medium&amp;id=682ce4114d7c5ea9f4b39351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3193-cwe-79-in-ovirt-engine-b397bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3193%3A%20CWE-79%20in%20ovirt-engine&amp;severity=medium&amp;id=682ce77b4d7c5ea9f4b397bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41434-n-a-in-n-a-b397b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41434%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682ce77b4d7c5ea9f4b397b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38934-n-a-in-n-a-bfff8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38934%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682de546c4522896dcbfff8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36771-obtain-information-in-ibm-qradar-user-behavior-analytics-bfff88</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36771%3A%20Obtain%20Information%20in%20IBM%20QRadar%20User%20Behavior%20Analytics&amp;severity=medium&amp;id=682de546c4522896dcbfff88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35722-cross-site-scripting-in-ibm-jazz-for-service-management-2430e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35722%3A%20Cross-Site%20Scripting%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=medium&amp;id=682d6c76d4f2164cc92430e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35282-gain-access-in-ibm-websphere-application-server-2430e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35282%3A%20Gain%20Access%20in%20IBM%20WebSphere%20Application%20Server&amp;severity=medium&amp;id=682d6c76d4f2164cc92430e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22387-cross-site-scripting-in-ibm-application-gateway-2430d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22387%3A%20Cross-Site%20Scripting%20in%20IBM%20Application%20Gateway&amp;severity=medium&amp;id=682d6c76d4f2164cc92430d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36448-n-a-in-n-a-bfff86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36448%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682de546c4522896dcbfff86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40942-n-a-in-n-a-bfff90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40942%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682de546c4522896dcbfff90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40912-n-a-in-n-a-b397c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40912%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682ce77b4d7c5ea9f4b397c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28816-cwe-79-cross-site-scripting-xss-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-b39d71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28816%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=medium&amp;id=682ceb104d7c5ea9f4b39d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28815-cwe-89-sql-injection-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-b39d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28815%3A%20CWE-89%20SQL%20Injection%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=low&amp;id=682ceb104d7c5ea9f4b39d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28814-cwe-23-relative-path-traversal-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-b39d6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28814%3A%20CWE-23%20Relative%20Path%20Traversal%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=critical&amp;id=682ceb104d7c5ea9f4b39d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28812-cwe-798-use-of-hard-coded-credentials-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-b39d6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28812%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=critical&amp;id=682ceb104d7c5ea9f4b39d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28811-cwe-78-os-command-injection-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c0042b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28811%3A%20CWE-78%20OS%20Command%20Injection%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=critical&amp;id=682de8d1c4522896dcc0042b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22526-cwe-306-missing-authentication-for-critical-function-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c00429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22526%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=critical&amp;id=682de8d1c4522896dcc00429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22525-cwe-20-improper-input-validation-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c00427</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22525%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=high&amp;id=682de8d1c4522896dcc00427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22524-cwe-89-sql-injection-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c00425</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22524%3A%20CWE-89%20SQL%20Injection%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=critical&amp;id=682de8d1c4522896dcc00425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22523-cwe-287-improper-authentication-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c00423</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22523%3A%20CWE-287%20Improper%20Authentication%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=high&amp;id=682de8d1c4522896dcc00423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22522-cwe-798-use-of-hard-coded-credentials-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c00421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22522%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=critical&amp;id=682de8d1c4522896dcc00421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40083-n-a-in-n-a-c00431</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40083%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682de8d1c4522896dcc00431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40082-n-a-in-n-a-c0041b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40082%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682de8d1c4522896dcc0041b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40486-n-a-in-n-a-c0041d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40486%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682de8d1c4522896dcc0041d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30935-n-a-in-n-a-bff6ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30935%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682dde53c4522896dcbff6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32169-cwe-285-improper-authorization-in-bytebase-bytebase-bff6a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32169%3A%20CWE-285%20Improper%20Authorization%20in%20bytebase%20bytebase&amp;severity=medium&amp;id=682dde53c4522896dcbff6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32170-cwe-285-improper-authorization-in-bytebase-bytebase-bffb1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32170%3A%20CWE-285%20Improper%20Authorization%20in%20bytebase%20bytebase&amp;severity=medium&amp;id=682de1cdc4522896dcbffb1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32166-cwe-125-out-of-bounds-read-in-ovs-ovs-bffaff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32166%3A%20CWE-125%20Out-of-bounds%20Read%20in%20ovs%20ovs&amp;severity=medium&amp;id=682de1cdc4522896dcbffaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32168-cwe-427-uncontrolled-search-path-element-in-notepad-plus-plus-notepad-plus-plus-bffb01</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32168%3A%20CWE-427%20Uncontrolled%20Search%20Path%20Element%20in%20notepad-plus-plus%20notepad-plus-plus&amp;severity=high&amp;id=682de1cdc4522896dcbffb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3348-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-tooljet-tooljet-tooljet-bffb07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3348%3A%20CWE-200%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20tooljet%20tooljet%2Ftooljet&amp;severity=medium&amp;id=682de1cdc4522896dcbffb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39054-cwe-79-cross-site-scripting-xss-in-cowell-information-system-co-ltd-enterprise-travel-management-system-bffb05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39054%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20COWELL%20INFORMATION%20SYSTEM%20CO.%2C%20LTD.%20enterprise%20travel%20management%20system&amp;severity=medium&amp;id=682de1cdc4522896dcbffb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39053-cwe-79-cross-site-scripting-xss-in-heimavista-inc-rpage-bffb03</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39053%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20HEIMAVISTA%20INC.%20Rpage&amp;severity=medium&amp;id=682de1cdc4522896dcbffb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39035-cwe-79-cross-site-scripting-xss-in-smart-evision-information-technology-inc-smart-evision-c00419</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39035%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=medium&amp;id=682de8d1c4522896dcc00419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39034-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-smart-evision-information-technology-inc-smart-evision-c00a8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39034%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=medium&amp;id=682dec48c4522896dcc00a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39033-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-smart-evision-information-technology-inc-smart-evision-c00a8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39033%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=critical&amp;id=682dec48c4522896dcc00a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39032-cwe-269-improper-privilege-management-in-smart-evision-information-technology-inc-smart-evision-c00a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39032%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=high&amp;id=682dec48c4522896dcc00a8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39031-cwe-200-information-exposure-in-smart-evision-information-technology-inc-smart-evision-c00a76</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39031%3A%20CWE-200%20Information%20Exposure%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=medium&amp;id=682dec48c4522896dcc00a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39030-cwe-200-information-exposure-in-smart-evision-information-technology-inc-smart-evision-c00a89</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39030%3A%20CWE-200%20Information%20Exposure%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=high&amp;id=682dec48c4522896dcc00a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39029-cwe-200-information-exposure-in-smart-evision-information-technology-inc-smart-evision-c00a87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39029%3A%20CWE-200%20Information%20Exposure%20in%20Smart%20eVision%20Information%20Technology%20Inc.%20Smart%20eVision&amp;severity=medium&amp;id=682dec48c4522896dcc00a87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38699-cwe-59-improper-link-resolution-before-file-access-link-following-in-asus-armoury-crate-service-c00a7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38699%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ASUS%20Armoury%20Crate%20Service&amp;severity=medium&amp;id=682dec48c4522896dcc00a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40929-n-a-in-n-a-c00a91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40929%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682dec48c4522896dcc00a91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2760-information-exposure-in-octopus-deploy-octopus-server-c00a74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2760%3A%20Information%20exposure%20in%20Octopus%20Deploy%20Octopus%20Server&amp;severity=medium&amp;id=682dec48c4522896dcc00a74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28813-cwe-89-sql-injection-in-carlo-gavazzi-uwp-3-0-monitoring-gateway-and-controller-c00a72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28813%3A%20CWE-89%20SQL%20Injection%20in%20Carlo%20Gavazzi%20UWP%203.0%20Monitoring%20Gateway%20and%20Controller&amp;severity=high&amp;id=682dec48c4522896dcc00a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1270-cwe-119-in-graphicsmagick-c00a70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1270%3A%20CWE-119%20in%20GraphicsMagick&amp;severity=high&amp;id=682dec48c4522896dcc00a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43980-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-apache-software-foundation-apache-tomcat-c00a6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43980%3A%20CWE-362%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Tomcat&amp;severity=low&amp;id=682dec48c4522896dcc00a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39264-cwe-295-improper-certificate-validation-in-nheko-reborn-nheko-bf44b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39264%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20Nheko-Reborn%20nheko&amp;severity=medium&amp;id=682d9845c4522896dcbf44b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39261-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-twigphp-twig-bf44a8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39261%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20twigphp%20Twig&amp;severity=medium&amp;id=682d9845c4522896dcbf44a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39251-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-js-sdk-bf44a0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39251%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-js-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf44a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39249-cwe-322-key-exchange-without-entity-authentication-in-matrix-org-matrix-js-sdk-bf4485</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39249%3A%20CWE-322%3A%20Key%20Exchange%20without%20Entity%20Authentication%20in%20matrix-org%20matrix-js-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf4485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39236-cwe-20-improper-input-validation-in-matrix-org-matrix-js-sdk-bf4469</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39236%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20matrix-org%20matrix-js-sdk&amp;severity=medium&amp;id=682d9845c4522896dcbf4469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-28-f12d0f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40497-n-a-in-n-a-c00a78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40497%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682dec48c4522896dcc00a78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41433-n-a-in-n-a-c00a6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41433%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682dec48c4522896dcc00a6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27862-cwe-130-improper-handling-of-length-parameter-in-ieee-802-2-c016a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27862%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20in%20IEEE%20802.2&amp;severity=medium&amp;id=682defd5c4522896dcc016a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27861-cwe-130-improper-handling-of-length-parameter-in-ieee-802-2-c016a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27861%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20in%20IEEE%20802.2&amp;severity=medium&amp;id=682defd5c4522896dcc016a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27854-cwe-290-authentication-bypass-by-spoofing-in-ietf-p802-1q-c0169e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27854%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20IETF%20P802.1Q&amp;severity=medium&amp;id=682defd5c4522896dcc0169e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39835-n-a-in-n-a-c06564</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39835%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682df35bc4522896dcc06564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27853-cwe-290-authentication-bypass-by-spoofing-in-ieee-802-2-c0655f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27853%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20IEEE%20802.2&amp;severity=medium&amp;id=682df35bc4522896dcc0655f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38932-n-a-in-n-a-c016a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38932%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682defd5c4522896dcc016a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37028-n-a-in-n-a-c016a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682defd5c4522896dcc016a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38335-n-a-in-n-a-c00a7c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38335%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682dec48c4522896dcc00a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40877-n-a-in-n-a-c016b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682defd5c4522896dcc016b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40878-n-a-in-n-a-c016b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40878%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682defd5c4522896dcc016b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40816-n-a-in-n-a-c016ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40816%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682defd5c4522896dcc016ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40817-n-a-in-n-a-c016b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40817%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682defd5c4522896dcc016b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39258-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-mailcow-mailcow-dockerized-bf69bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39258%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20mailcow%20mailcow-dockerized&amp;severity=medium&amp;id=682d9849c4522896dcbf69bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39256-cwe-502-deserialization-of-untrusted-data-in-orckestra-c1-cms-foundation-bf44a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39256%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Orckestra%20C1-CMS-Foundation&amp;severity=medium&amp;id=682d9845c4522896dcbf44a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23006-cwe-121-stack-based-buffer-overflow-in-western-digital-my-cloud-home-c016a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23006%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Western%20Digital%20My%20Cloud%20Home&amp;severity=low&amp;id=682defd5c4522896dcc016a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3323-sql-injection-in-advantech-iview-c016aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3323%3A%20SQL%20Injection%20in%20Advantech%20iView&amp;severity=high&amp;id=682defd5c4522896dcc016aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40354-n-a-in-n-a-c016ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682defd5c4522896dcc016ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40353-n-a-in-n-a-25c21d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40353%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2c0b0acd01a24925c21d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40352-n-a-in-n-a-25c21b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40352%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2c0b0acd01a24925c21b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37209-n-a-in-n-a-25c215</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37209%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2c0b0acd01a24925c215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31367-n-a-in-n-a-25c8d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31367%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2fb50acd01a24925c8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37193-n-a-in-n-a-25c8d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37193%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2fb50acd01a24925c8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41604-n-a-in-n-a-25c8e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41604%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2fb50acd01a24925c8e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40199-directory-traversal-in-ec-cube-co-ltd-ec-cube-3-series-and-ec-cube-4-series-c6a55c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40199%3A%20Directory%20traversal%20in%20EC-CUBE%20CO.%2CLTD.%20EC-CUBE%203%20series%20and%20EC-CUBE%204%20series&amp;severity=low&amp;id=682e1d8dc4522896dcc6a55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38975-cross-site-scripting-in-ec-cube-co-ltd-ec-cube-4-series-c6a54b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38975%3A%20Cross-site%20scripting%20in%20EC-CUBE%20CO.%2CLTD.%20EC-CUBE%204%20series&amp;severity=medium&amp;id=682e1d8dc4522896dcc6a54b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37346-improper-input-validation-in-ec-cube-co-ltd-product-image-bulk-upload-plugin-c6a549</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37346%3A%20Improper%20input%20validation%20in%20EC-CUBE%20CO.%2CLTD.%20Product%20Image%20Bulk%20Upload%20Plugin&amp;severity=critical&amp;id=682e1d8dc4522896dcc6a549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41571-n-a-in-n-a-c6a55e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41571%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e1d8dc4522896dcc6a55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41570-n-a-in-n-a-c0656d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41570%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682df35bc4522896dcc0656d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3324-cwe-121-stack-based-buffer-overflow-in-vim-vim-vim-c0656b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3324%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=682df35bc4522896dcc0656b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3303-cwe-667-cwe-362-cwe-476-in-linux-kernel-c06569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3303%3A%20CWE-667-%3ECWE-362-%3ECWE-476%20in%20Linux%20kernel&amp;severity=medium&amp;id=682df35bc4522896dcc06569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34326-n-a-in-n-a-c06562</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34326%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682df35bc4522896dcc06562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-27-f12d15</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3298-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ikus060-ikus060-rdiffweb-c06566</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3298%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682df35bc4522896dcc06566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40099-n-a-in-n-a-c6a55a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40099%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e1d8dc4522896dcc6a55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40098-n-a-in-n-a-c6a558</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40098%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e1d8dc4522896dcc6a558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40097-n-a-in-n-a-c6a54f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40097%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e1d8dc4522896dcc6a54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30004-n-a-in-n-a-c6a547</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30004%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e1d8dc4522896dcc6a547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40050-n-a-in-n-a-c6a54d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40050%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e1d8dc4522896dcc6a54d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3290-cwe-130-improper-handling-of-length-parameter-inconsistency-in-ikus060-ikus060-rdiffweb-24ef24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3290%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682e47610acd01a24924ef24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30003-n-a-in-n-a-c06580</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30003%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682df35bc4522896dcc06580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3272-cwe-130-improper-handling-of-length-parameter-inconsistency-in-ikus060-ikus060-rdiffweb-c06588</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3272%3A%20CWE-130%20Improper%20Handling%20of%20Length%20Parameter%20Inconsistency%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682df35bc4522896dcc06588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22058-possible-use-after-free-in-kernel-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-electronics-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-c0657e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22058%3A%20Possible%20Use-After-Free%20in%20Kernel%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&amp;severity=high&amp;id=682df35bc4522896dcc0657e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40044-n-a-in-n-a-c0658c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40044%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682df35bc4522896dcc0658c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40043-n-a-in-n-a-c0658a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40043%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682df35bc4522896dcc0658a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28052-cwe-264-permissions-privileges-and-access-controls-in-hitachi-vantara-hitachi-content-platform-c0657c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28052%3A%20CWE-264%20Permissions%2C%20Privileges%2C%20and%20Access%20Controls%20in%20Hitachi%20Vantara%20Hitachi%20Content%20Platform&amp;severity=high&amp;id=682df35bc4522896dcc0657c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3071-use-after-free-in-google-chrome-c06586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3071%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682df35bc4522896dcc06586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3058-use-after-free-in-google-chrome-c06584</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3058%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682df35bc4522896dcc06584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3056-insufficient-policy-enforcement-in-google-chrome-c0b1b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3056%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682df6dbc4522896dcc0b1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3057-inappropriate-implementation-in-google-chrome-c06582</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3057%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682df35bc4522896dcc06582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3055-use-after-free-in-google-chrome-c6bb09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3055%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e248fc4522896dcc6bb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3054-insufficient-policy-enforcement-in-google-chrome-c6bb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3054%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682e248fc4522896dcc6bb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3053-inappropriate-implementation-in-google-chrome-c6bb03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3053%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682e248fc4522896dcc6bb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3052-heap-buffer-overflow-in-google-chrome-c6bb01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3052%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682e248fc4522896dcc6bb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3051-heap-buffer-overflow-in-google-chrome-c0b1ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3051%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682df6dbc4522896dcc0b1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3050-heap-buffer-overflow-in-google-chrome-c0b19c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3050%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682df6dbc4522896dcc0b19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3049-use-after-free-in-google-chrome-c0bbbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3049%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682dfa70c4522896dcc0bbbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3047-insufficient-policy-enforcement-in-google-chrome-25c219</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3047%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682f2c0b0acd01a24925c219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3048-inappropriate-implementation-in-google-chrome-c0bbba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3048%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682dfa70c4522896dcc0bbba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3046-use-after-free-in-google-chrome-25c217</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3046%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682f2c0b0acd01a24925c217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3045-insufficient-validation-of-untrusted-input-in-google-chrome-25c8db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3045%3A%20Insufficient%20validation%20of%20untrusted%20input%20in%20Google%20Chrome&amp;severity=high&amp;id=682f2fb50acd01a24925c8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3044-inappropriate-implementation-in-google-chrome-25c8d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3044%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682f2fb50acd01a24925c8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3043-heap-buffer-overflow-in-google-chrome-c6baff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3043%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682e248fc4522896dcc6baff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3042-use-after-free-in-google-chrome-c6c693</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3042%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3041-use-after-free-in-google-chrome-c6c691</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3041%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3040-use-after-free-in-google-chrome-c6c68f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3040%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3039-use-after-free-in-google-chrome-c6c689</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3039%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2998-use-after-free-in-google-chrome-c6c687</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2998%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2861-inappropriate-implementation-in-google-chrome-c6c67d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2861%3A%20Inappropriate%20implementation%20in%20Google%20Chrome&amp;severity=medium&amp;id=682e280cc4522896dcc6c67d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2860-insufficient-policy-enforcement-in-google-chrome-c6c67b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2860%3A%20Insufficient%20policy%20enforcement%20in%20Google%20Chrome&amp;severity=medium&amp;id=682e280cc4522896dcc6c67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2859-use-after-free-in-google-chrome-c6c679</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2859%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2858-use-after-free-in-google-chrome-c6c677</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2858%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e280cc4522896dcc6c677</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2857-use-after-free-in-google-chrome-25c8d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2857%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682f2fb50acd01a24925c8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2855-use-after-free-in-google-chrome-25c8d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2855%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682f2fb50acd01a24925c8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2854-use-after-free-in-google-chrome-25c8cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2854%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682f2fb50acd01a24925c8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40784-n-a-in-n-a-25c8cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40784%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f2fb50acd01a24925c8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40785-n-a-in-n-a-260fbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40785%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f33050acd01a249260fbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28722-buffer-overflow-in-certain-hp-inkje-1040d54a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28722%3A%20Buffer%20Overflow%20in%20Certain%20HP%20inkjet%20printers%2C%20HP%20LaserJet%20Pro%20printers%2C%20HP%20PageWide%20Pro%20printers&amp;severity=critical&amp;id=68361cec182aa0cae2232236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28721-remote-code-execution-in-certain-hp-0dd853b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28721%3A%20Remote%20Code%20Execution%20in%20Certain%20HP%20inkjet%20printers%2C%20HP%20LaserJet%20Pro%20printers%2C%20HP%20PageWide%20Pro%20printers.&amp;severity=critical&amp;id=68361cec182aa0cae2232234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3103-cwe-193-in-linux-c6c67f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3103%3A%20CWE-193%20in%20Linux&amp;severity=high&amp;id=682e280cc4522896dcc6c67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39245-cwe-305-authentication-bypass-by-primary-weakness-in-makedeb-mist-bf447b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39245%3A%20CWE-305%3A%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20makedeb%20mist&amp;severity=medium&amp;id=682d9845c4522896dcbf447b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3204-n-a-in-nlnet-labs-unbound-bdc321</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3204%3A%20n%2Fa%20in%20NLnet%20Labs%20Unbound&amp;severity=high&amp;id=682d981fc4522896dcbdc321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39243-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-brettwooldridge-nuprocess-bf69ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39243%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20brettwooldridge%20NuProcess&amp;severity=medium&amp;id=682d9849c4522896dcbf69ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41437-n-a-in-n-a-c6af56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41437%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e2109c4522896dcc6af56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39219-cwe-287-improper-authentication-in-brokercap-bifrost-bf6995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39219%3A%20CWE-287%3A%20Improper%20Authentication%20in%20brokercap%20Bifrost&amp;severity=medium&amp;id=682d9849c4522896dcbf6995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40485-n-a-in-n-a-c6af62</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40485%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e2109c4522896dcc6af62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40484-n-a-in-n-a-c6af60</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40484%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e2109c4522896dcc6af60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40483-n-a-in-n-a-c6af5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40483%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e2109c4522896dcc6af5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40404-n-a-in-n-a-c6af5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40404%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e2109c4522896dcc6af5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40403-n-a-in-n-a-c6af5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40403%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e2109c4522896dcc6af5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40402-n-a-in-n-a-c6af58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40402%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e2109c4522896dcc6af58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3135-cwe-79-cross-site-scripting-xss-in-unknown-seo-smart-links-c6c683</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3135%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SEO%20Smart%20Links&amp;severity=medium&amp;id=682e280cc4522896dcc6c683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3119-cwe-287-improper-authentication-in-unknown-oauth-client-single-sign-on-for-wordpress-oauth-2-0-sso-c6c681</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3119%3A%20CWE-287%20Improper%20Authentication%20in%20Unknown%20OAuth%20client%20Single%20Sign%20On%20for%20WordPress%20(%20OAuth%202.0%20SSO%20)&amp;severity=high&amp;id=682e280cc4522896dcc6c681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3098-cwe-352-cross-site-request-forgery-csrf-in-unknown-login-block-ips-26112f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3098%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Unknown%20Login%20Block%20IPs&amp;severity=medium&amp;id=682f368b0acd01a24926112f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3076-cwe-434-unrestricted-upload-of-file-with-dangerous-type-in-unknown-cm-download-manager-26223a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3076%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20Unknown%20CM%20Download%20Manager&amp;severity=high&amp;id=682f48200acd01a24926223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3074-cwe-79-cross-site-scripting-xss-in-unknown-slider-hero-with-animation-video-background-260fb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3074%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Slider%20Hero%20with%20Animation%2C%20Video%20Background&amp;severity=medium&amp;id=682f33050acd01a249260fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3070-cwe-79-cross-site-scripting-xss-in-unknown-generate-pdf-using-contact-form-7-260fb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3070%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Generate%20PDF%20using%20Contact%20Form%207&amp;severity=medium&amp;id=682f33050acd01a249260fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3069-cwe-79-cross-site-scripting-xss-in-unknown-wordlift-ai-powered-seo-schema-260fb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3069%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WordLift%20%E2%80%93%20AI%20powered%20SEO%20%E2%80%93%20Schema&amp;severity=medium&amp;id=682f33050acd01a249260fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3062-cwe-79-cross-site-scripting-xss-in-unknown-simple-file-list-260fa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3062%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Simple%20File%20List&amp;severity=medium&amp;id=682f33050acd01a249260fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3025-cwe-79-cross-site-scripting-xss-in-unknown-bitcoin-altcoin-faucet-26112d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3025%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Bitcoin%20%2F%20Altcoin%20Faucet&amp;severity=medium&amp;id=682f368b0acd01a24926112d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2987-cwe-862-missing-authorization-in-unknown-ldap-wp-login-active-directory-integration-261116</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2987%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20Ldap%20WP%20Login%20%2F%20Active%20Directory%20Integration&amp;severity=high&amp;id=682f368b0acd01a249261116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2926-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-unknown-download-manager-c0f086</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2926%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Unknown%20Download%20Manager&amp;severity=medium&amp;id=682e0169c4522896dcc0f086</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2903-cwe-502-deserialization-of-untrusted-data-in-unknown-ninja-forms-contact-form-the-drag-and-drop-form-builder-for-wordpress-2eda94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2903%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Unknown%20Ninja%20Forms%20Contact%20Form%20%E2%80%93%20The%20Drag%20and%20Drop%20Form%20Builder%20for%20WordPress&amp;severity=high&amp;id=682e2a713750f1bc872eda94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2405-cwe-862-missing-authorization-in-unknown-wp-popup-builder-popup-forms-marketing-popup-newsletter-2eda92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2405%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20WP%20Popup%20Builder%20%E2%80%93%20Popup%20Forms%20%2C%20Marketing%20PoPuP%20%26%20%20Newsletter&amp;severity=medium&amp;id=682e2a713750f1bc872eda92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2404-cwe-79-cross-site-scripting-xss-in-unknown-wp-popup-builder-popup-forms-marketing-popup-newsletter-2eda90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2404%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Popup%20Builder%20%E2%80%93%20Popup%20Forms%20%2C%20Marketing%20PoPuP%20%26%20%20Newsletter&amp;severity=medium&amp;id=682e2a713750f1bc872eda90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2352-cwe-918-server-side-request-forgery-ssrf-in-unknown-post-smtp-mailer-email-log-2eda8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2352%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Post%20SMTP%20Mailer%2FEmail%20Log&amp;severity=high&amp;id=682e2a713750f1bc872eda8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1755-cwe-79-cross-site-scripting-xss-in-unknown-svg-support-2eda8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1755%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20SVG%20Support&amp;severity=medium&amp;id=682e2a713750f1bc872eda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1613-cwe-639-authorization-bypass-through-user-controlled-key-in-unknown-restricted-site-access-2eda8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1613%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Restricted%20Site%20Access&amp;severity=medium&amp;id=682e2a713750f1bc872eda8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24890-cwe-862-missing-authorization-in-unknown-scripts-organizer-24ee95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24890%3A%20CWE-862%20Missing%20Authorization%20in%20Unknown%20scripts-organizer&amp;severity=high&amp;id=682e44190acd01a24924ee95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40927-n-a-in-n-a-c6af64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40927%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e2109c4522896dcc6af64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40926-n-a-in-n-a-c6bb0b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40926%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e248fc4522896dcc6bb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3295-cwe-770-allocation-of-resources-without-limits-or-throttling-in-ikus060-ikus060-rdiffweb-24efab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3295%3A%20CWE-770%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682e4ad00acd01a24924efab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40928-n-a-in-n-a-c6934b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40928%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e12f6c4522896dcc6934b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40925-n-a-in-n-a-c69349</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40925%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e12f6c4522896dcc69349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40924-n-a-in-n-a-c69347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40924%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e12f6c4522896dcc69347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3301-cwe-460-improper-cleanup-on-thrown-exception-in-ikus060-ikus060-rdiffweb-c697b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3301%3A%20CWE-460%20Improper%20Cleanup%20on%20Thrown%20Exception%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682e1679c4522896dcc697b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38970-n-a-in-n-a-c697b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38970%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e1679c4522896dcc697b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36159-n-a-in-n-a-c697b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36159%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e1679c4522896dcc697b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36158-n-a-in-n-a-c0ced8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36158%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682dfdf5c4522896dcc0ced8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38553-n-a-in-n-a-c0f088</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38553%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682e0169c4522896dcc0f088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21169-prototype-pollution-in-express-xss-sanitizer-24efa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21169%3A%20Prototype%20Pollution%20in%20express-xss-sanitizer&amp;severity=high&amp;id=682e4ad00acd01a24924efa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41347-n-a-in-n-a-c6bb0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41347%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682e248fc4522896dcc6bb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3195-out-of-bounds-write-in-google-chrome-261131</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3195%3A%20Out%20of%20bounds%20write%20in%20Google%20Chrome&amp;severity=high&amp;id=682f368b0acd01a249261131</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3024-cwe-863-incorrect-authorization-in-unknown-bitcoin-satoshi-tools-faucets-visitor-rewarder-satoshi-games-referral-program-26112b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3024%3A%20CWE-863%20Incorrect%20Authorization%20in%20Unknown%20Bitcoin%20Satoshi%20Tools%20%3A%20%20Faucets%2C%20Visitor%20Rewarder%2C%20Satoshi%20Games%2C%20Referral%20Program&amp;severity=medium&amp;id=682f368b0acd01a24926112b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2853-heap-buffer-overflow-in-google-chrome-261114</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2853%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682f368b0acd01a249261114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2852-use-after-free-in-google-chrome-261112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2852%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682f368b0acd01a249261112</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3196-use-after-free-in-google-chrome-24efa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3196%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e4ad00acd01a24924efa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3197-use-after-free-in-google-chrome-24ee91</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3197%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e44190acd01a24924ee91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3199-use-after-free-in-google-chrome-c69c1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3199%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e1a01c4522896dcc69c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3198-use-after-free-in-google-chrome-c69c1b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3198%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682e1a01c4522896dcc69c1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3200-heap-buffer-overflow-in-google-chrome-c697b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3200%3A%20Heap%20buffer%20overflow%20in%20Google%20Chrome&amp;severity=high&amp;id=682e1679c4522896dcc697b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-26-f11fa2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41343-n-a-in-n-a-26123e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41343%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f3a190acd01a24926123e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3296-cwe-121-stack-based-buffer-overflow-in-vim-vim-vim-260fa6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3296%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=682f33050acd01a249260fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3297-cwe-416-use-after-free-in-vim-vim-vim-24ee93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3297%3A%20CWE-416%20Use%20After%20Free%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=682e44190acd01a24924ee93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-25-f11fbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41340-n-a-in-n-a-260faa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41340%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f33050acd01a249260faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23463-cwe-917-improper-neutralization-of-special-elements-used-in-an-expression-language-statement-expression-language-injection-in-nepxion-discover-bf6887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23463%3A%20CWE-917%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20Expression%20Language%20Statement%20(&apos;Expression%20Language%20Injection&apos;)%20in%20Nepxion%20Discover&amp;severity=medium&amp;id=682d9849c4522896dcbf6887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23464-cwe-918-server-side-request-forgery-ssrf-in-nepxion-discovery-bf688b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23464%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Nepxion%20Discovery&amp;severity=medium&amp;id=682d9849c4522896dcbf688b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23461-cwe-79-cross-site-scripting-xss-in-xdan-jodit-editor-bf6870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23461%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20xdan%20Jodit%20Editor&amp;severity=medium&amp;id=682d9849c4522896dcbf6870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36025-cwe-681-incorrect-conversion-between-numeric-types-in-hyperledger-besu-bf43a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36025%3A%20CWE-681%3A%20Incorrect%20Conversion%20between%20Numeric%20Types%20in%20hyperledger%20besu&amp;severity=medium&amp;id=682d9845c4522896dcbf43a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39240-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-renlm-mygraph-bf0150</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39240%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20renlm%20MyGraph&amp;severity=medium&amp;id=682d983ec4522896dcbf0150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39242-cwe-682-incorrect-calculation-in-paritytech-frontier-bf4477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39242%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20paritytech%20frontier&amp;severity=medium&amp;id=682d9845c4522896dcbf4477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-24-f129f1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f129f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40122-n-a-in-n-a-260fa8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40122%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f33050acd01a249260fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40121-n-a-in-n-a-261236</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40121%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a249261236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40120-n-a-in-n-a-261215</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40120%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a249261215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40119-n-a-in-n-a-261213</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40119%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a249261213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40118-n-a-in-n-a-261211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40118%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a249261211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40117-n-a-in-n-a-26120f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40117%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a24926120f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40116-n-a-in-n-a-c69c23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40116%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e1a01c4522896dcc69c23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40115-n-a-in-n-a-c69c21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40115%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e1a01c4522896dcc69c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40114-n-a-in-n-a-c69c1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40114%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682e1a01c4522896dcc69c1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40113-n-a-in-n-a-26120d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40113%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f3a190acd01a24926120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22629-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-safari-261209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22629%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=682f3a190acd01a249261209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32841-processing-a-maliciously-crafted-image-may-result-in-disclosure-of-process-memory-in-apple-macos-261230</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32841%3A%20Processing%20a%20maliciously%20crafted%20image%20may%20result%20in%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f3a190acd01a249261230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32831-processing-a-maliciously-crafted-applescript-binary-may-result-in-unexpected-termination-or-disclosure-of-process-memory-in-apple-macos-26122e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32831%3A%20Processing%20a%20maliciously%20crafted%20AppleScript%20binary%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682f3a190acd01a24926122e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32851-processing-a-maliciously-crafted-applescript-binary-may-result-in-unexpected-termination-or-disclosure-of-process-memory-in-apple-macos-261129</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32851%3A%20Processing%20a%20maliciously%20crafted%20AppleScript%20binary%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682f368b0acd01a249261129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32832-an-app-with-root-privileges-may-be--93c9d597</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32832%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=medium&amp;id=68361cec182aa0cae223223c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32848-an-app-may-be-able-to-capture-a-user-s-screen-in-apple-macos-261234</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32848%3A%20An%20app%20may%20be%20able%20to%20capture%20a%20user%E2%80%99s%20screen%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f3a190acd01a249261234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32825-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-26120b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32825%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f3a190acd01a24926120b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32842-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-261127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32842%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f368b0acd01a249261127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32828-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-261125</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32828%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f368b0acd01a249261125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32845-an-app-may-be-able-to-break-out-of-its-sandbox-in-apple-macos-260fb0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32845%3A%20An%20app%20may%20be%20able%20to%20break%20out%20of%20its%20sandbox%20in%20Apple%20macOS&amp;severity=critical&amp;id=682f33050acd01a249260fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32821-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-264596</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32821%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f67ff0acd01a249264596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32819-an-app-may-be-able-to-gain-root-privileges-in-apple-macos-264576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32819%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f67ff0acd01a249264576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32823-an-app-may-be-able-to-leak-sensitive-user-information-in-apple-macos-2644dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32823%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f64490acd01a2492644dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32826-an-app-may-be-able-to-gain-root-privileges-in-apple-macos-262893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32826%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f4f480acd01a249262893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32829-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-2622cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32829%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f4bbb0acd01a2492622cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32807-an-app-may-be-able-to-overwrite-arb-d015ae28</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32807%3A%20An%20app%20may%20be%20able%20to%20overwrite%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=high&amp;id=68361cec182aa0cae223223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32817-an-app-may-be-able-to-disclose-kernel-memory-in-apple-macos-264b4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32817%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f80630acd01a249264b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32816-visiting-a-website-that-frames-malicious-content-may-lead-to-ui-spoofing-in-apple-macos-264b42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32816%3A%20Visiting%20a%20website%20that%20frames%20malicious%20content%20may%20lead%20to%20UI%20spoofing%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f80630acd01a249264b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32815-an-app-with-root-privileges-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-264b40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32815%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f80630acd01a249264b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32820-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-26487c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32820%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f76020acd01a24926487c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32818-an-app-may-be-able-to-leak-sensitive-kernel-state-in-apple-macos-26487a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32818%3A%20An%20app%20may%20be%20able%20to%20leak%20sensitive%20kernel%20state%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f76020acd01a24926487a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32799-a-user-in-a-privileged-network-position-may-be-able-to-leak-sensitive-information-in-apple-macos-26122c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32799%3A%20A%20user%20in%20a%20privileged%20network%20position%20may%20be%20able%20to%20leak%20sensitive%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f3a190acd01a24926122c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32801-an-app-may-be-able-to-gain-root-privileges-in-apple-macos-26111a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32801%3A%20An%20app%20may%20be%20able%20to%20gain%20root%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f368b0acd01a24926111a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32800-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-261118</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32800%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f368b0acd01a249261118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32843-processing-a-maliciously-crafted-po-5ce9665c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32843%3A%20Processing%20a%20maliciously%20crafted%20Postscript%20file%20may%20result%20in%20unexpected%20app%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=68361cec182aa0cae223223e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32847-a-remote-user-may-be-able-to-cause-unexpected-system-termination-or-corrupt-kernel-memory-in-apple-macos-261232</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32847%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory%20in%20Apple%20macOS&amp;severity=critical&amp;id=682f3a190acd01a249261232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32797-processing-a-maliciously-crafted-applescript-binary-may-result-in-unexpected-termination-or-disclosure-of-process-memory-in-apple-macos-264b3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32797%3A%20Processing%20a%20maliciously%20crafted%20AppleScript%20binary%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682f80630acd01a249264b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32792-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-264b3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32792%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682f80630acd01a249264b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32798-an-app-may-be-able-to-gain-elevated-privileges-in-apple-macos-26208f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32798%3A%20An%20app%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f44a50acd01a24926208f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32853-processing-a-maliciously-crafted-applescript-binary-may-result-in-unexpected-termination-or-disclosure-of-process-memory-in-apple-macos-262006</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32853%3A%20Processing%20a%20maliciously%20crafted%20AppleScript%20binary%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682f41160acd01a249262006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32805-an-app-may-be-able-to-access-sensitive-user-information-in-apple-macos-262004</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32805%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f41160acd01a249262004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32796-an-app-may-be-able-to-execute-arbitrary-code-with-kernel-privileges-in-apple-macos-264e57</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32796%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=682f84020acd01a249264e57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32789-an-app-may-be-able-to-bypass-privacy-preferences-in-apple-macos-2648e5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32789%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f79590acd01a2492648e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32786-an-app-may-be-able-to-modify-protected-parts-of-the-file-system-in-apple-macos-2648e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32786%3A%20An%20app%20may%20be%20able%20to%20modify%20protected%20parts%20of%20the%20file%20system%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f79590acd01a2492648e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32790-a-remote-user-may-be-able-to-cause-a-denial-of-service-in-apple-macos-2648e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32790%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=high&amp;id=682f79590acd01a2492648e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32787-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-macos-2648e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32787%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682f79590acd01a2492648e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32852-processing-a-maliciously-crafted-applescript-binary-may-result-in-unexpected-termination-or-disclosure-of-process-memory-in-apple-macos-264abe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32852%3A%20Processing%20a%20maliciously%20crafted%20AppleScript%20binary%20may%20result%20in%20unexpected%20termination%20or%20disclosure%20of%20process%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=682f7ce40acd01a249264abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32783-an-app-may-gain-unauthorized-access-to-bluetooth-in-apple-macos-264abc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32783%3A%20An%20app%20may%20gain%20unauthorized%20access%20to%20Bluetooth%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f7ce40acd01a249264abc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32785-processing-an-image-may-lead-to-a-denial-of-service-in-apple-macos-264e55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32785%3A%20Processing%20an%20image%20may%20lead%20to%20a%20denial-of-service%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f84020acd01a249264e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26700-processing-maliciously-crafted-web-content-may-lead-to-code-execution-in-apple-macos-264620</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26700%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=682f6b520acd01a249264620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32782-an-app-with-root-privileges-may-be-able-to-access-private-information-in-apple-macos-26208d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32782%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f44a50acd01a24926208d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32781-an-app-with-root-privileges-may-be-able-to-access-private-information-in-apple-macos-26208b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32781%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20access%20private%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f44a50acd01a24926208b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22628-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-safari-262089</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22628%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=682f44a50acd01a249262089</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36521-processing-a-maliciously-crafted-tiff-file-may-lead-to-a-denial-of-service-or-potentially-disclose-memory-contents-in-apple-itunes-for-windows-262085</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36521%3A%20Processing%20a%20maliciously%20crafted%20tiff%20file%20may%20lead%20to%20a%20denial-of-service%20or%20potentially%20disclose%20memory%20contents%20in%20Apple%20iTunes%20for%20Windows&amp;severity=high&amp;id=682f44a50acd01a249262085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22624-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-safari-26461e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22624%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=682f6b520acd01a24926461e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22610-processing-maliciously-crafted-web-content-may-lead-to-code-execution-in-apple-safari-26461c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22610%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20code%20execution%20in%20Apple%20Safari&amp;severity=high&amp;id=682f6b520acd01a24926461c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26707-a-user-may-be-able-to-view-sensitive-user-information-in-apple-macos-2622d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26707%3A%20A%20user%20may%20be%20able%20to%20view%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=682f4bbb0acd01a2492622d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22637-a-malicious-website-may-cause-unexpected-cross-origin-behavior-in-apple-safari-2622d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22637%3A%20A%20malicious%20website%20may%20cause%20unexpected%20cross-origin%20behavior%20in%20Apple%20Safari&amp;severity=high&amp;id=682f4bbb0acd01a2492622d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40106-n-a-in-n-a-262895</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40106%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f4f480acd01a249262895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40107-n-a-in-n-a-262008</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40107%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f41160acd01a249262008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40105-n-a-in-n-a-264639</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40105%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f6b520acd01a249264639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40104-n-a-in-n-a-264637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40104%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f6b520acd01a249264637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40103-n-a-in-n-a-2644e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40103%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f64490acd01a2492644e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40102-n-a-in-n-a-2644df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f64490acd01a2492644df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40101-n-a-in-n-a-2644be</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f64490acd01a2492644be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40100-n-a-in-n-a-2644bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40100%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f64490acd01a2492644bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32211-sql-injection-cwe-89-in-rocketchat-80e15ebb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32211%3A%20SQL%20Injection%20(CWE-89)%20in%20Rocket.Chat&amp;severity=high&amp;id=683607d4182aa0cae21f75ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32217-cleartext-storage-of-sensitive-information-cwe-312-in-rocket-chat-264631</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32217%3A%20Cleartext%20Storage%20of%20Sensitive%20Information%20(CWE-312)%20in%20Rocket.chat&amp;severity=medium&amp;id=682f6b520acd01a249264631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30124-improper-authentication-generic-cwe-287-in-rocket-chat-mobile-app-264624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30124%3A%20Improper%20Authentication%20-%20Generic%20(CWE-287)%20in%20Rocket.Chat%20Mobile%20app&amp;severity=medium&amp;id=682f6b520acd01a249264624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32220-information-disclosure-cwe-200-in-rocket-chat-262002</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32220%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f41160acd01a249262002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32219-information-disclosure-cwe-200-in-rocket-chat-262000</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32219%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f41160acd01a249262000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32227-cleartext-transmission-of-sensitive-information-cwe-319-in-rocket-chat-26470c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32227%3A%20Cleartext%20Transmission%20of%20Sensitive%20Information%20(CWE-319)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f6ee00acd01a24926470c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32218-information-disclosure-cwe-200-in-rocket-chat-26470a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32218%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.chat&amp;severity=medium&amp;id=682f6ee00acd01a24926470a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32228-information-disclosure-cwe-200-in-rocket-chat-264635</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32228%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f6b520acd01a249264635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32226-improper-access-control-generic-cwe-284-in-rocket-chat-264633</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32226%3A%20Improper%20Access%20Control%20-%20Generic%20(CWE-284)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f6b520acd01a249264633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35247-information-disclosure-cwe-200-in-rocket-chat-2645a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35247%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f67ff0acd01a2492645a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32229-information-disclosure-cwe-200-in-rocket-chat-264594</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32229%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f67ff0acd01a249264594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35246-information-disclosure-cwe-200-in-rocket-chat-264b4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35246%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f80630acd01a249264b4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35251-cross-site-scripting-xss-stored-cwe-79-in-rocket-chat-2647dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35251%3A%20Cross-site%20Scripting%20(XSS)%20-%20Stored%20(CWE-79)%20in%20Rocket.chat&amp;severity=medium&amp;id=682f725b0acd01a2492647dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35250-privilege-escalation-capec-233-in-rocket-chat-2647db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35250%3A%20Privilege%20Escalation%20(CAPEC-233)%20in%20Rocket.chat&amp;severity=medium&amp;id=682f725b0acd01a2492647db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35249-information-disclosure-cwe-200-in-rocket-chat-2647d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35249%3A%20Information%20Disclosure%20(CWE-200)%20in%20Rocket.Chat&amp;severity=medium&amp;id=682f725b0acd01a2492647d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28886-denial-of-service-vulnerability-in-f-secure-and-withsecure-all-f-secure-and-withsecure-endpoint-protection-products-for-windows-running-32-bit-operating-system-f-secure-linux-security-32-f-secure-internet-gatekeeper-264622</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28886%3A%20Denial%20of%20Service%20Vulnerability%20in%20F-Secure%20and%20WithSecure%20All%20F-Secure%20and%20WithSecure%20Endpoint%20Protection%20products%20for%20Windows%20running%2032%20bit%20operating%20system.%20%20F-Secure%20Linux%20Security%2032%20F-Secure%20Internet%20Gatekeeper&amp;severity=medium&amp;id=682f6b520acd01a249264622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38439-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf43ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38439%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf43ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38438-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf43e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38438%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf43e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40630-cwe-384-session-fixation-in-tacitine-firewall-26463d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40630%3A%20CWE-384%20Session%20Fixation%20in%20Tacitine%20Firewall&amp;severity=medium&amp;id=682f6b520acd01a24926463d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35893-n-a-in-n-a-bdc2d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35893%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc2d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40629-cwe-200-information-exposure-in-tacitine-firewall-26463b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40629%3A%20CWE-200%20Information%20Exposure%20in%20Tacitine%20Firewall&amp;severity=high&amp;id=682f6b520acd01a24926463b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40748-cross-site-scripting-in-ibm-infosphere-information-server-26200a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40748%3A%20Cross-Site%20Scripting%20in%20IBM%20InfoSphere%20Information%20Server&amp;severity=medium&amp;id=682f41160acd01a24926200a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35721-cross-site-scripting-in-ibm-jazz-for-service-management-264710</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35721%3A%20Cross-Site%20Scripting%20in%20IBM%20Jazz%20for%20Service%20Management&amp;severity=medium&amp;id=682f6ee00acd01a249264710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34348-gain-access-in-ibm-partner-engagement-manager-264e59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34348%3A%20Gain%20Access%20in%20IBM%20Partner%20Engagement%20Manager&amp;severity=high&amp;id=682f84020acd01a249264e59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22423-denial-of-service-in-ibm-cca-for-mtm-4767-264e53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22423%3A%20Denial%20of%20Service%20in%20IBM%20CCA%20for%20MTM%204767&amp;severity=medium&amp;id=682f84020acd01a249264e53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40359-n-a-in-n-a-261238</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40359%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f3a190acd01a249261238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40358-n-a-in-n-a-2647df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40358%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f725b0acd01a2492647df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36338-n-a-in-n-a-bdc2e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36338%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc2e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35099-n-a-in-n-a-266e69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35099%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f866a0acd01a249266e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35098-n-a-in-n-a-266e67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35098%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f866a0acd01a249266e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35097-n-a-in-n-a-26ffc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35097%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f98d10acd01a24926ffc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35096-n-a-in-n-a-273c31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35096%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308bb60acd01a249273c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35095-n-a-in-n-a-273ca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35095%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308f330acd01a249273ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35094-n-a-in-n-a-273ca4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35094%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308f330acd01a249273ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35093-n-a-in-n-a-273ca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35093%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68308f330acd01a249273ca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35092-n-a-in-n-a-264e5d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35092%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f84020acd01a249264e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35091-n-a-in-n-a-264e5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35091%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682f84020acd01a249264e5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40628-cwe-94-improper-control-of-generation-of-code-code-injection-in-tacitine-firewall-264e4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40628%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Tacitine%20Firewall&amp;severity=critical&amp;id=682f84020acd01a249264e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3782-cwe-190-cwe-911-cwe-416-in-wayland-2646eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3782%3A%20(CWE-190%7CCWE-911)-%3ECWE-416%20in%20wayland&amp;severity=medium&amp;id=682f6ee00acd01a2492646eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38742-cwe-122-heap-based-buffer-overflow-in-rockwell-automation-thinmanager-thinserver-264712</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38742%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Rockwell%20Automation%20ThinManager%20ThinServer&amp;severity=high&amp;id=682f6ee00acd01a249264712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2070-cwe-121-stack-based-buffer-overflow-in-grandstream-grandstream-gsd3710-2646f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2070%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Grandstream%20Grandstream%20GSD3710&amp;severity=critical&amp;id=682f6ee00acd01a2492646f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2025-cwe-121-stack-based-buffer-overflow-in-grandstream-grandstream-gsd3710-264e4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2025%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Grandstream%20Grandstream%20GSD3710&amp;severity=critical&amp;id=682f84020acd01a249264e4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45035-cwe-287-improper-authentication-in-velneo-velneo-vclient-2646ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45035%3A%20CWE-287%20Improper%20Authentication%20in%20Velneo%20Velneo%20vClient&amp;severity=medium&amp;id=682f6ee00acd01a2492646ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40861-n-a-in-n-a-264e4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40861%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f84020acd01a249264e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40855-n-a-in-n-a-26ffcf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40855%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40866-n-a-in-n-a-26ffd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40866%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40867-n-a-in-n-a-26ffd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40867%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40868-n-a-in-n-a-26ffd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40868%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40854-n-a-in-n-a-26ffcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40854%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23144-access-control-vulnerability-in-zxvstb-2646ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23144%3A%20access%20control%20vulnerability%20in%20ZXvSTB&amp;severity=critical&amp;id=682f6ee00acd01a2492646ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40851-n-a-in-n-a-26ffcb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40851%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27492-cwe-191-in-meta-whatsapp-business-for-ios-2646f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27492%3A%20CWE-191%20in%20Meta%20WhatsApp%20Business%20for%20iOS&amp;severity=high&amp;id=682f6ee00acd01a2492646f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40853-n-a-in-n-a-26ffc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40853%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40860-n-a-in-n-a-26ffc9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40860%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f98d10acd01a24926ffc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40093-n-a-in-n-a-26ffc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40093%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f98d10acd01a24926ffc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40092-n-a-in-n-a-26ffc3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40092%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f98d10acd01a24926ffc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40091-n-a-in-n-a-27004c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40091%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f99000acd01a24927004c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40862-n-a-in-n-a-27004e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40862%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f99000acd01a24927004e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40864-n-a-in-n-a-270050</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40864%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682f99000acd01a249270050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30121-privilege-escalation-capec-233-in-ivanti-endpoint-manager-27004a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30121%3A%20Privilege%20Escalation%20(CAPEC-233)%20in%20Ivanti%20Endpoint%20Manager&amp;severity=medium&amp;id=682f99000acd01a24927004a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35257-privilege-escalation-capec-233-in-ui-desktop-for-windows-270048</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35257%3A%20Privilege%20Escalation%20(CAPEC-233)%20in%20UI%20Desktop%20for%20Windows&amp;severity=high&amp;id=682f99000acd01a249270048</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40865-na-in-na-613b7cd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40865%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d30c182aa0cae216c472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40869-na-in-na-58258cde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40869%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d30c182aa0cae216c474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2347-cwe-122-heap-based-buffer-overflow-in-uboot-uboot-bf8064</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2347%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Uboot%20Uboot&amp;severity=medium&amp;id=682d984bc4522896dcbf8064</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2566-cwe-122-heap-based-buffer-overflow-in-ffmpeg-ffmpeg-bf8083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2566%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20FFMPEG%20FFMPEG&amp;severity=medium&amp;id=682d984bc4522896dcbf8083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2785-cwe-125-out-of-bounds-read-in-linux-kernel-kernel-bf8087</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2785%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Linux%20Kernel%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf8087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38936-na-in-na-2f5488d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38936%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33683-cwe-295-improper-certificate-validation-in-apache-software-foundation-apache-pulsar-26470e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33683%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Pulsar&amp;severity=medium&amp;id=682f6ee00acd01a24926470e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33682-cwe-295-improper-certificate-valida-b98632dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33682%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Pulsar&amp;severity=medium&amp;id=6835d30c182aa0cae216c451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33681-cwe-295-improper-certificate-validation-in-apache-software-foundation-apache-pulsar-270040</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33681%3A%20CWE-295%20Improper%20Certificate%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Pulsar&amp;severity=medium&amp;id=682f99000acd01a249270040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24280-cwe-20-improper-input-validation-in-apache-software-foundation-apache-pulsar-27003e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24280%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Apache%20Software%20Foundation%20Apache%20Pulsar&amp;severity=medium&amp;id=682f99000acd01a24927003e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3269-cwe-384-session-fixation-in-ikus060-ikus060-rdiffweb-264714</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3269%3A%20CWE-384%20Session%20Fixation%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=682f6ee00acd01a249264714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26112-pinot-query-endpoint-and-the-realti-d4df4701</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26112%3A%20Pinot%20query%20endpoint%20and%20the%20realtime%20ingestion%20layer%20has%20a%20vulnerability%20in%20unprotected%20environments%20due%20to%20a%20groovy%20function%20support%20in%20Apache%20Software%20Foundation%20Apache%20Pinot&amp;severity=critical&amp;id=6835d30c182aa0cae216c44f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39238-cwe-287-improper-authentication-in-arvados-arvados-bf446f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39238%3A%20CWE-287%3A%20Improper%20Authentication%20in%20arvados%20arvados&amp;severity=medium&amp;id=682d9845c4522896dcbf446f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39239-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-netlify-netlify-ipx-bf4473</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39239%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20netlify%20netlify-ipx&amp;severity=medium&amp;id=682d9845c4522896dcbf4473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39231-cwe-287-improper-authentication-in-parse-community-parse-server-bf4467</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39231%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9845c4522896dcbf4467</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39230-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-awslabs-fhir-works-on-aws-authz-smart-bf4463</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39230%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20awslabs%20fhir-works-on-aws-authz-smart&amp;severity=medium&amp;id=682d9845c4522896dcbf4463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39225-cwe-669-incorrect-resource-transfer-between-spheres-in-parse-community-parse-server-bf4456</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39225%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9845c4522896dcbf4456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36604-na-in-na-8ca43191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36604%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41322-na-in-na-a81d0b66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41322%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41320-na-in-na-b9425e9b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835d30c182aa0cae216c457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37232-na-in-na-5fc36f0d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37232%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d30c182aa0cae216c470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37235-na-in-na-9396ad8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d30c182aa0cae216c453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41319-na-in-na-f4affe23</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41319%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68368ea2182aa0cae2350fc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40716-na-in-na-c25c5ad4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40716%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68368ea2182aa0cae2350fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40188-na-in-na-78372e3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40188%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68368ea2182aa0cae2350fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36944-na-in-na-cbf10e0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36944%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68368ea2182aa0cae2350fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41803-na-in-na-1cbd8836</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41803%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835dda5182aa0cae218668d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32849-an-app-may-be-able-to-access-sensit-14556aec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32849%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=6835d69f182aa0cae2176720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32814-an-app-may-be-able-to-execute-arbit-8058b8be</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32814%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6835d69f182aa0cae217671e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3278-cwe-476-null-pointer-dereference-in-vim-vim-vim-264718</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3278%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20vim%20vim%2Fvim&amp;severity=medium&amp;id=682f6ee00acd01a249264718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35951-cwe-190-integer-overflow-or-wraparound-in-redis-redis-bf42ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35951%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20redis%20redis&amp;severity=medium&amp;id=682d9845c4522896dcbf42ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35252-improper-input-validation-cwe-20-in-https-github-com-curl-curl-bdc2bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35252%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=low&amp;id=682d981fc4522896dcbdc2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-23-7620bc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-23&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb7620bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-23-f13031</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f13031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40298-na-in-na-16fa58eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40298%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835dda5182aa0cae218669e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38573-na-in-na-9cee735a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38573%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835dda5182aa0cae218669c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30426-na-in-na-bc1fe90b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30426%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e4b9182aa0cae219635a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23458-cwe-79-cross-site-scripting-xss-in-nhn-tui-grid-bf6853</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23458%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20nhn%20tui.grid&amp;severity=medium&amp;id=682d9849c4522896dcbf6853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36934-cwe-122-in-meta-whatsapp-for-ios-170b974c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36934%3A%20CWE-122%20in%20Meta%20WhatsApp%20for%20iOS&amp;severity=critical&amp;id=6835e4b9182aa0cae2196362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40089-na-in-na-27965716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40089%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d69f182aa0cae2176731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40088-na-in-na-46e68a30</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40088%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835d69f182aa0cae217672f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40087-na-in-na-2f2377a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40087%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d69f182aa0cae217672d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31937-na-in-na-475dd49c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31937%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6835d69f182aa0cae217671c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27774-cwe-209-information-exposure-throug-3683df70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27774%3A%20CWE-209%20Information%20Exposure%20Through%20an%20Error%20Message%20in%20HCL%20Software%20HCL%20Digital%20Experience&amp;severity=low&amp;id=6835d69f182aa0cae217671a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37234-na-in-na-0fb8d31b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37234%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d69f182aa0cae2176726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3274-cwe-352-cross-site-request-forgery-csrf-in-ikus060-ikus060-rdiffweb-264716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3274%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=high&amp;id=682f6ee00acd01a249264716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35894-n-a-in-n-a-bdc2db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35894%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc2db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34026-na-in-na-c155d7f3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835d69f182aa0cae2176722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35039-na-in-na-bafa3ee6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35039%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35038-na-in-na-b9a00203</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35038%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35037-na-in-na-8dc3bb79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35036-na-in-na-7d3e7dd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35036%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e4b9182aa0cae2196360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35035-na-in-na-f8808a0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35035%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e4b9182aa0cae219635e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35034-na-in-na-e5aae28c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35034%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e4b9182aa0cae219635c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35032-na-in-na-7996e8d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35032%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e83c182aa0cae219e1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35031-na-in-na-194c408a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35031%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae218669a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35030-na-in-na-b7a3f4d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae2186691</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35029-na-in-na-b500dc29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35029%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae218668f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35028-na-in-na-831b8445</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35027-na-in-na-09bd2a3c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35026-na-in-na-a7fa21e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e58f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35025-na-in-na-4787a64e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35025%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35024-na-in-na-0b49cbc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35024%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835d69f182aa0cae2176724</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35023-na-in-na-762c1843</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35023%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835da20182aa0cae217e58b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35022-na-in-na-efdcc0ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35022%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae2186681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35021-na-in-na-24cec9c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35021%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835dda5182aa0cae218667f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39190-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-pluginsglpi-sccm-bf422a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39190%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pluginsGLPI%20sccm&amp;severity=medium&amp;id=682d9845c4522896dcbf422a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40935-na-in-na-81504dcd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40935%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e152182aa0cae218e50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40934-na-in-na-13389364</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40934%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e152182aa0cae218e50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40933-na-in-na-bf95d4cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40933%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e152182aa0cae218e502</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40932-na-in-na-94d55eab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40932%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e152182aa0cae218e500</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35408-na-in-na-e26638a7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35408%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e152182aa0cae218e4fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40447-na-in-na-d6f9131a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40447%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e152182aa0cae218e4fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40446-na-in-na-bfe79ade</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835e4b9182aa0cae2196364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40444-na-in-na-a890dbb4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40444%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e83c182aa0cae219e1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40443-na-in-na-28d3f00f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40443%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e83c182aa0cae219e1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3267-cwe-352-cross-site-request-forgery-csrf-in-ikus060-ikus060-rdiffweb-275668</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3267%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=6830dc700acd01a249275668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3268-cwe-521-weak-password-requirements-in-ikus060-ikus060-minarca-275666</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3268%3A%20CWE-521%20Weak%20Password%20Requirements%20in%20ikus060%20ikus060%2Fminarca&amp;severity=critical&amp;id=6830dc700acd01a249275666</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2266-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-yordam-bilgi-teknolojileri-yordam-bilgi-teknolojileri-2646f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2266%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Yordam%20Bilgi%20Teknolojileri%20Yordam%20Bilgi%20Teknolojileri&amp;severity=medium&amp;id=682f6ee00acd01a2492646f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38512-na-in-na-d6ee991d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38512%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360472182aa0cae21ef79a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28980-na-in-na-9f3761ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28980%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835fd37182aa0cae21d8ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28981-na-in-na-23530afc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28981%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6835fd37182aa0cae21d8def</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28977-na-in-na-b7b648a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28977%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6835e4b9182aa0cae2196358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40186-na-in-na-781acb67</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40186%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68360472182aa0cae21ef7a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3256-cwe-416-use-after-free-in-vim-vim-vim-275664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3256%3A%20CWE-416%20Use%20After%20Free%20in%20vim%20vim%2Fvim&amp;severity=high&amp;id=6830dc700acd01a249275664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36062-cwe-281-improper-preservation-of-permissions-in-grafana-grafana-bf43b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36062%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf43b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-22-e58151</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-22&amp;severity=medium&amp;id=682b7b9dd3ddd8cef2e58151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-22-f12c11</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28982-na-in-na-135c9cff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28982%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360472182aa0cae21ef789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28978-na-in-na-a1bfadcd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28978%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360ee1182aa0cae22072ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39975-na-in-na-8612cc98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39975%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360ee1182aa0cae22072ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35896-n-a-in-n-a-bdc2e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35896%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc2e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28979-na-in-na-c51c8911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28979%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68361cec182aa0cae2232240</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39224-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-jordansissel-ruby-arr-pm-bf69a6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39224%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jordansissel%20ruby-arr-pm&amp;severity=medium&amp;id=682d9849c4522896dcbf69a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35895-n-a-in-n-a-bdc2df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35895%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc2df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28802-na-in-na-868e797e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28802%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68361cec182aa0cae2232238</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3233-cwe-352-cross-site-request-forgery-csrf-in-ikus060-ikus060-rdiffweb-275662</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3233%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=6830dc700acd01a249275662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23952-cwe-200-in-keylime-2646f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23952%3A%20CWE-200%20in%20keylime&amp;severity=high&amp;id=682f6ee00acd01a2492646f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23951-cwe-400-in-keylime-4b5d706e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23951%3A%20CWE-400%20in%20keylime&amp;severity=medium&amp;id=6836206f182aa0cae223c480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23950-cwe-379-in-keylime-89dae658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23950%3A%20CWE-379%20in%20keylime&amp;severity=high&amp;id=683623ec182aa0cae22466c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23949-cwe-290-in-keylime-157fb18c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23949%3A%20CWE-290%20in%20keylime&amp;severity=high&amp;id=683623ec182aa0cae22466c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43310-cwe-290-in-keylime-0a00f08b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43310%3A%20CWE-290%20in%20keylime&amp;severity=critical&amp;id=683623ec182aa0cae22466c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23948-cwe-200-in-keylime-251574e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23948%3A%20CWE-200%20in%20keylime&amp;severity=high&amp;id=6838ab0d182aa0cae2898e1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29800-cwe-367-in-networkd-dispatcher-14072a07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29800%3A%20CWE-367%20in%20networkd-dispatcher&amp;severity=medium&amp;id=68371692182aa0cae24f0c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29799-cwe-22-in-networkd-dispatcher-ccbe9ec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29799%3A%20CWE-22%20in%20networkd-dispatcher&amp;severity=medium&amp;id=68362776182aa0cae2250928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35621-na-in-na-ebe61298</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35621%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68371a22182aa0cae24f8aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30578-successful-execution-of-these-vulne-c527c47e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30578%3A%20Successful%20execution%20of%20these%20vulnerabilities%20will%20result%20in%20an%20attacker%20being%20able%20to%20execute%20commands%20with%20the%20privileges%20of%20the%20affected%20user.%20in%20TIBCO%20Software%20Inc.%20TIBCO%20EBX%20Add-ons&amp;severity=high&amp;id=68371a22182aa0cae24f8aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30577-successful-execution-of-these-vulnerabilities-will-result-in-an-attacker-being-able-to-execute-commands-with-the-privileges-of-the-affected-user-in-tibco-software-inc-tibco-ebx-2647d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30577%3A%20Successful%20execution%20of%20these%20vulnerabilities%20will%20result%20in%20an%20attacker%20being%20able%20to%20execute%20commands%20with%20the%20privileges%20of%20the%20affected%20user.%20in%20TIBCO%20Software%20Inc.%20TIBCO%20EBX&amp;severity=high&amp;id=682f725b0acd01a2492647d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31679-potential-unintended-data-exposure-for-resource-exposed-in-spring-data-rest-2647d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31679%3A%20Potential%20Unintended%20Data%20Exposure%20for%20Resource%20Exposed%20in%20Spring%20Data%20REST&amp;severity=low&amp;id=682f725b0acd01a2492647d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40030-na-in-na-9dedfb57</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40030%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68371a22182aa0cae24f8ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40029-na-in-na-3498efb3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40029%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68371692182aa0cae24f0c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40028-na-in-na-db3c9a0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40028%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68371692182aa0cae24f0c6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40027-na-in-na-6d10fcae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68371692182aa0cae24f0c68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40026-na-in-na-34c1f1d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68371692182aa0cae24f0c66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3250-cwe-614-sensitive-cookie-in-https-se-e8e5af5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3250%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20ikus060%20ikus060%2Frdiffweb&amp;severity=medium&amp;id=68371692182aa0cae24f0c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3251-cwe-614-sensitive-cookie-in-https-se-72dce0cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3251%3A%20CWE-614%20Sensitive%20Cookie%20in%20HTTPS%20Session%20Without%20&apos;Secure&apos;%20Attribute%20in%20ikus060%20ikus060%2Fminarca&amp;severity=high&amp;id=68371692182aa0cae24f0c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37027-na-in-na-0890fbde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37027%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68371a22182aa0cae24f8ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40616-bypass-security-in-ibm-maximo-asset-0de50581</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40616%3A%20Bypass%20Security%20in%20IBM%20Maximo%20Asset%20Management&amp;severity=medium&amp;id=68371a22182aa0cae24f8ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41255-vulnerability-in-jenkins-project-je-26572304</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41255%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20CONS3RT%20Plugin&amp;severity=medium&amp;id=68371a22182aa0cae24f8ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41254-vulnerability-in-jenkins-project-je-16e18229</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41254%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20CONS3RT%20Plugin&amp;severity=medium&amp;id=68371d87182aa0cae250090e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41253-vulnerability-in-jenkins-project-je-171a0577</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41253%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20CONS3RT%20Plugin&amp;severity=high&amp;id=68371d87182aa0cae250090c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41252-vulnerability-in-jenkins-project-je-79e99667</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41252%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20CONS3RT%20Plugin&amp;severity=medium&amp;id=68371d87182aa0cae250090a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41251-vulnerability-in-jenkins-project-je-6221b68e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41251%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Apprenda%20Plugin&amp;severity=medium&amp;id=68372123182aa0cae2508753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41250-vulnerability-in-jenkins-project-je-7872c4eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41250%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20SCM%20HttpClient%20Plugin&amp;severity=medium&amp;id=68360472182aa0cae21ef785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41249-vulnerability-in-jenkins-project-je-4f2793ae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41249%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20SCM%20HttpClient%20Plugin&amp;severity=high&amp;id=68360472182aa0cae21ef783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41248-vulnerability-in-jenkins-project-je-c33290af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41248%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20BigPanda%20Notifier%20Plugin&amp;severity=medium&amp;id=68360472182aa0cae21ef781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41247-vulnerability-in-jenkins-project-je-a357a228</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41247%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20BigPanda%20Notifier%20Plugin&amp;severity=medium&amp;id=68360472182aa0cae21ef77f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41246-vulnerability-in-jenkins-project-je-c839dce0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41246%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Worksoft%20Execution%20Manager%20Plugin&amp;severity=medium&amp;id=68360472182aa0cae21ef77d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41245-vulnerability-in-jenkins-project-je-1dee9ede</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41245%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Worksoft%20Execution%20Manager%20Plugin&amp;severity=high&amp;id=68372123182aa0cae2508751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41244-vulnerability-in-jenkins-project-je-55963867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41244%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20View26%20Test-Reporting%20Plugin&amp;severity=high&amp;id=68372123182aa0cae250874f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41242-vulnerability-in-jenkins-project-je-94adde40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41242%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20extreme-feedback%20Plugin&amp;severity=medium&amp;id=68372487182aa0cae251059e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41243-vulnerability-in-jenkins-project-je-37dd9cf4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41243%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20SmallTest%20Plugin&amp;severity=high&amp;id=68372123182aa0cae250874d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41241-vulnerability-in-jenkins-project-je-6ca710f7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41241%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20RQM%20Plugin&amp;severity=critical&amp;id=68372487182aa0cae2510598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41240-vulnerability-in-jenkins-project-je-b7ba57e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41240%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Walti%20Plugin&amp;severity=medium&amp;id=68372487182aa0cae2510596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41239-vulnerability-in-jenkins-project-je-fe2c1168</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41239%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20DotCi%20Plugin&amp;severity=medium&amp;id=68372831182aa0cae2518402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41238-vulnerability-in-jenkins-project-je-0868a9ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41238%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20DotCi%20Plugin&amp;severity=critical&amp;id=6838ab0d182aa0cae2898e1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41237-vulnerability-in-jenkins-project-je-d51caaf1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41237%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20DotCi%20Plugin&amp;severity=critical&amp;id=68372831182aa0cae2518400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41236-vulnerability-in-jenkins-project-je-3e190344</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41236%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Security%20Inspector%20Plugin&amp;severity=high&amp;id=68372831182aa0cae25183fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41235-vulnerability-in-jenkins-project-je-339c7d10</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41235%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20WildFly%20Deployer%20Plugin&amp;severity=medium&amp;id=68372831182aa0cae25183fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41234-vulnerability-in-jenkins-project-je-b54e9673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41234%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Rundeck%20Plugin&amp;severity=high&amp;id=68372831182aa0cae25183fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41233-vulnerability-in-jenkins-project-je-c4c837ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41233%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Rundeck%20Plugin&amp;severity=medium&amp;id=68372831182aa0cae25183f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41232-vulnerability-in-jenkins-project-je-c21924fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41232%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Build-Publisher%20Plugin&amp;severity=high&amp;id=68372487182aa0cae251059c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41231-vulnerability-in-jenkins-project-je-24fdabed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41231%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Build-Publisher%20Plugin&amp;severity=medium&amp;id=68372487182aa0cae251059a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41230-vulnerability-in-jenkins-project-je-02fa5e1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41230%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Build-Publisher%20Plugin&amp;severity=medium&amp;id=68372487182aa0cae2510594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41229-vulnerability-in-jenkins-project-je-11cbf7ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41229%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NS-ND%20Integration%20Performance%20Publisher%20Plugin&amp;severity=medium&amp;id=68372831182aa0cae25183f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41228-vulnerability-in-jenkins-project-je-d9cccb6c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41228%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NS-ND%20Integration%20Performance%20Publisher%20Plugin&amp;severity=high&amp;id=68372bbe182aa0cae2520279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41227-vulnerability-in-jenkins-project-je-c6179138</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41227%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20NS-ND%20Integration%20Performance%20Publisher%20Plugin&amp;severity=high&amp;id=68372bbe182aa0cae2520277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41226-vulnerability-in-jenkins-project-je-92d49dec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41226%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Compuware%20Common%20Configuration%20Plugin&amp;severity=critical&amp;id=68372bbe182aa0cae2520275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41225-vulnerability-in-jenkins-project-je-6e0db386</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41225%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Anchore%20Container%20Image%20Scanner%20Plugin&amp;severity=medium&amp;id=68372bbe182aa0cae2520273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41224-vulnerability-in-jenkins-project-je-2e1c3a79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41224%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins&amp;severity=medium&amp;id=68372bbe182aa0cae2520271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-5641-cwe-200-information-exposure-in-rapi-8733c6a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-5641%3A%20CWE-200%20Information%20Exposure%20in%20Rapid7%20InsightVM&amp;severity=low&amp;id=6838ab0d182aa0cae2898e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37246-na-in-na-a800d446</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37246%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360472182aa0cae21ef768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2265-cwe-35-path-traversal-in-ekino-bilgi-fc08c2e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2265%3A%20CWE-35%20Path%20Traversal%3A%20&apos;...%2F...%2F%2F&apos;%20in%20%C3%87ekino%20Bilgi%20Teknolojileri%20%C3%87ekino%20Bilgi%20Teknolojileri&amp;severity=high&amp;id=6838ab0d182aa0cae2898e1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38928-na-in-na-645a7580</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38928%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68360472182aa0cae21ef777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3255-cwe-79-improper-neutralization-of-in-8adc9e50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3255%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pimcore%20pimcore%2Fpimcore&amp;severity=medium&amp;id=68372bbe182aa0cae252026d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3068-cwe-269-improper-privilege-managemen-570024f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3068%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20octoprint%20octoprint%2Foctoprint&amp;severity=medium&amp;id=68372bbe182aa0cae252026b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2888-cwe-613-insufficient-session-expirat-25faedaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2888%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20octoprint%20octoprint%2Foctoprint&amp;severity=medium&amp;id=68372bbe182aa0cae2520256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38178-in-bind-9912-9913-9107-9108-9113-91-91a56801</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38178%3A%20In%20BIND%209.9.12%20-%3E%209.9.13%2C%209.10.7%20-%3E%209.10.8%2C%209.11.3%20-%3E%209.16.32%2C%209.18.0%20-%3E%209.18.6%2C%20versions%209.11.4-S1%20-%3E%209.11.37-S1%2C%209.16.8-S1%20-%3E%209.16.32-S1%20of%20the%20BIND%20Supported%20Preview%20Edition%2C%20and%20versions%209.19.0%20-%3E%209.19.4%20of%20the%20BIND%209.19%20development%20branch%2C%20the%20DNSSEC%20verification%20code%20for%20the%20EdDSA%20algorithm%20leaks%20memory%20when%20there%20is%20a%20signature%20length%20mismatch.%20in%20ISC%20BIND9&amp;severity=high&amp;id=68372bbe182aa0cae252025e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38177-in-bind-984-91632-and-versions-994--52c2e332</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38177%3A%20In%20BIND%209.8.4%20-%3E%209.16.32%20and%20versions%209.9.4-S1%20-%3E%209.11.37-S1%2C%209.16.8-S1%20-%3E%209.16.32-S1%20of%20the%20BIND%20Supported%20Preview%20Edition%2C%20the%20DNSSEC%20verification%20code%20for%20the%20ECDSA%20algorithm%20leaks%20memory%20when%20there%20is%20a%20signature%20length%20mismatch.%20in%20ISC%20BIND9&amp;severity=high&amp;id=68372bbe182aa0cae252025c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2906-in-bind-9180-9186-and-versions-9190--c528cf38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2906%3A%20In%20BIND%209.18.0%20-%3E%209.18.6%20and%20versions%209.19.0%20-%3E%209.19.4%20of%20the%20BIND%209.19%20development%20branch%2C%20changes%20between%20OpenSSL%201.x%20and%20OpenSSL%203.0%20expose%20a%20flaw%20in%20named%20that%20causes%20a%20small%20memory%20leak%20in%20key%20processing%20when%20using%20TKEY%20records%20in%20Diffie-Hellman%20mode%20with%20OpenSSL%203.0.0%20and%20later%20versions.%20in%20ISC%20BIND9&amp;severity=high&amp;id=68372bbe182aa0cae2520258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2881-in-bind-9180-9186-and-versions-9190--89d2becf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2881%3A%20In%20BIND%209.18.0%20-%3E%209.18.6%20and%20versions%209.19.0%20-%3E%209.19.4%20of%20the%20BIND%209.19%20development%20branch%2C%20when%20an%20HTTP%20connection%20was%20reused%20to%20request%20statistics%20from%20the%20stats%20channel%2C%20the%20content%20length%20of%20successive%20responses%20could%20grow%20in%20size%20past%20the%20end%20of%20the%20allocated%20buffer.%20in%20ISC%20BIND9&amp;severity=medium&amp;id=68372bbe182aa0cae2520254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2872-cwe-434-unrestricted-upload-of-file--20f3be4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2872%3A%20CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type%20in%20octoprint%20octoprint%2Foctoprint&amp;severity=low&amp;id=68372bbe182aa0cae2520252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0495-cwe-89-improper-neutralization-of-sp-ffe98fdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0495%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Parantez%20Teknoloji%20Parantez%20Teknoloji&amp;severity=critical&amp;id=68360472182aa0cae21ef75a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2315-cwe-89-improper-neutralization-of-sp-905ce5ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2315%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Database%20Software%20Database%20Software&amp;severity=critical&amp;id=68372bbe182aa0cae2520250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40754-cwe-601-url-redirection-to-untruste-600a2db4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40754%3A%20CWE-601%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=medium&amp;id=68360472182aa0cae21ef77b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40604-cwe-134-use-of-externally-controlle-5363feca</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40604%3A%20CWE-134%20Use%20of%20Externally-Controlled%20Format%20String%20in%20Apache%20Software%20Foundation%20Apache%20Airflow&amp;severity=high&amp;id=68360472182aa0cae21ef779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41218-na-in-na-c656bd40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41218%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68372f36182aa0cae252832f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41222-na-in-na-75699f06</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41222%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68372bbe182aa0cae252026f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37026-na-in-na-e273c395</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37026%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68360472182aa0cae21ef766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-21-f120b1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f120b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38619-na-in-na-9d27b11e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38619%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68372f36182aa0cae252832d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35085-na-in-na-a4009ff7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35085%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360472182aa0cae21ef764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35086-na-in-na-5205a2a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35086%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68372f36182aa0cae2528327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35087-na-in-na-c891cfa3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35087%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68372bbe182aa0cae252025a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35088-na-in-na-e78cd0f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35088%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68372f36182aa0cae2528329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35089-na-in-na-d52092b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35089%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68372f36182aa0cae252832b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35090-na-in-na-4f7675ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35090%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683732d3182aa0cae25301ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39221-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-j-onasjones-mcwebserver-bf442a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39221%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20J-onasJones%20McWebserver&amp;severity=medium&amp;id=682d9845c4522896dcbf442a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39220-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-drakkan-sftpgo-bf4422</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39220%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=682d9845c4522896dcbf4422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32880-an-app-may-be-able-to-access-user-s-71ca76b1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32880%3A%20An%20app%20may%20be%20able%20to%20access%20user-sensitive%20data%20in%20Apple%20macOS&amp;severity=medium&amp;id=683732d3182aa0cae25301df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32802-processing-a-maliciously-crafted-fi-42cd958f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32802%3A%20Processing%20a%20maliciously%20crafted%20file%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=high&amp;id=683732d3182aa0cae25301dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32882-an-app-may-be-able-to-bypass-privac-7588774f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32882%3A%20An%20app%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=critical&amp;id=68360472182aa0cae21ef762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26696-a-sandboxed-process-may-be-able-to--1e8d3242</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26696%3A%20A%20sandboxed%20process%20may%20be%20able%20to%20circumvent%20sandbox%20restrictions%20in%20Apple%20macOS&amp;severity=high&amp;id=683732d3182aa0cae25301d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32861-a-user-may-be-tracked-through-their-c7a62152</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32861%3A%20A%20user%20may%20be%20tracked%20through%20their%20IP%20address%20in%20Apple%20macOS&amp;severity=medium&amp;id=68360472182aa0cae21ef760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32788-a-remote-user-may-be-able-to-cause--a5c0ecc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32788%3A%20A%20remote%20user%20may%20be%20able%20to%20cause%20kernel%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=683732d3182aa0cae25301db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23685-cross-site-request-forgery-csrf-pro-121cde09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23685%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20Protections%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68360472182aa0cae21ef75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23692-authenticated-sql-injection-in-arub-3dd49eda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23692%3A%20Authenticated%20SQL%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=683732d3182aa0cae25301d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23693-authenticated-sql-injection-in-arub-26dc4126</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23693%3A%20Authenticated%20SQL%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=683732d3182aa0cae25301d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23695-authenticated-sql-injection-in-arub-6f491808</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23695%3A%20Authenticated%20SQL%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68386122182aa0cae27f1da5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23694-authenticated-sql-injection-in-arub-081593b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23694%3A%20Authenticated%20SQL%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68386122182aa0cae27f1da3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28637-local-denial-of-service-dos-potenti-d36c6f87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28637%3A%20local%20denial%20of%20service%20(DoS)%3B%20potential%20local%20arbitrary%20code%20execution%20in%20HPE%20Integrated%20Lights-Out%205%20(iLO%205)&amp;severity=high&amp;id=68360472182aa0cae21ef75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28639-remote-potential-adjacent-denial-of-1e85b6b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28639%3A%20remote%20potential%20adjacent%20denial%20of%20service%20(DoS)%3B%20potential%20adjacent%20arbitrary%20code%20execution%20in%20HPE%20Integrated%20Lights-Out%205%20(iLO%205)&amp;severity=high&amp;id=683864b2182aa0cae27f9cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28638-isolated-local-disclosure-of-inform-224f9a00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28638%3A%20isolated%20local%20disclosure%20of%20information%3B%20potential%20isolated%20local%20arbitrary%20code%20execution%20in%20HPE%20Integrated%20Lights-Out%205%20(iLO%205)&amp;severity=high&amp;id=683864b2182aa0cae27f9cc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23696-authenticated-sql-injection-in-arub-97d998ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23696%3A%20Authenticated%20SQL%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=683732d3182aa0cae25301d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28640-potential-local-arbitrary-code-exec-9fd8337c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28640%3A%20potential%20local%20arbitrary%20code%20execution%20in%20HPE%20Integrated%20Lights-Out%205%20(iLO%205)&amp;severity=high&amp;id=68385089182aa0cae27baaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40357-na-in-na-01606536</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40357%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68385089182aa0cae27baad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37877-local-privilege-escalation-in-aruba-6e1a0901</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37877%3A%20Local%20Privilege%20Escalation%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68360472182aa0cae21ef76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37880-authenticated-remote-command-inject-970bf92e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37880%3A%20Authenticated%20Remote%20Command%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68385089182aa0cae27baab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38931-na-in-na-b6e67d25</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68385089182aa0cae27baacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37878-authenticated-remote-command-inject-369d1488</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37878%3A%20Authenticated%20Remote%20Command%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68385089182aa0cae27baaaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37879-authenticated-remote-command-inject-378fd112</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37879%3A%20Authenticated%20Remote%20Command%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68385089182aa0cae27baab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37884-unauthenticated-denial-of-service-i-2400874b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37884%3A%20Unauthenticated%20Denial-of-Service%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68385089182aa0cae27baac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37881-authenticated-remote-command-inject-d28e47f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37881%3A%20Authenticated%20Remote%20Command%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68385089182aa0cae27baab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37882-authenticated-remote-command-inject-11815583</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37882%3A%20Authenticated%20Remote%20Command%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=68385089182aa0cae27baac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37883-authenticated-remote-command-inject-c38ad604</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37883%3A%20Authenticated%20Remote%20Command%20Injection%20in%20Aruba%20ClearPass%20Policy%20Manager&amp;severity=high&amp;id=683864b2182aa0cae27f9cca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39218-cwe-335-incorrect-usage-of-seeds-in-pseudo-random-number-generator-prng-in-fastly-js-compute-runtime-bf441a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39218%3A%20CWE-335%3A%20Incorrect%20Usage%20of%20Seeds%20in%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20fastly%20js-compute-runtime&amp;severity=medium&amp;id=682d9845c4522896dcbf441a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46835-traffic-hijacking-in-ws7200-10-54289e97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46835%3A%20Traffic%20Hijacking%20in%20WS7200-10&amp;severity=medium&amp;id=68373654182aa0cae2538122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37395-the-input-verification-in-cv81-wdm--b90d316e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37395%3A%20The%20input%20verification%20in%20CV81-WDM%20FW&amp;severity=high&amp;id=68373654182aa0cae2538128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46834-permission-bypass-in-jad-al50-dc2f99ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46834%3A%20Permission%20Bypass%20in%20JAD-AL50&amp;severity=medium&amp;id=68373654182aa0cae2538120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33735-password-verification-in-ws7200-10-feebdf63</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33735%3A%20Password%20Verification%20in%20WS7200-10&amp;severity=medium&amp;id=68373654182aa0cae2538126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36602-out-of-bounds-read-and-write-in-576-a1e9e325</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36602%3A%20Out-of-bounds%20Read%20and%20Write%20in%20576up005%20HOTA-CM-H-Shark-BD%3B577HOTA-CM-H-Shark-BD%3B581up-HOTA-CM-H-Shark-BD%3B586-HOTA-CM-H-Shark-BD%3B588-HOTA-CM-H-Shark-BD%3B606-HOTA-CM-H-Shark-BD%3BBI-ACC-REPORT%3BCM-H-Shark-BD&amp;severity=medium&amp;id=68373654182aa0cae253811e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40009-na-in-na-ca6849b3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40009%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68373654182aa0cae253812e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40008-na-in-na-c493014b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40008%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68373654182aa0cae253812c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30579-successful-exploitation-of-this-vul-87a053c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30579%3A%20Successful%20exploitation%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20Spotfire%20Server%20data%20and%20the%20ability%20to%20cause%20a%20partial%20denial%20of%20service.%20This%20vulnerability%20could%20allow%20an%20attacker%20to%20access%20resources%20other%20than%20the%20vulnerable%20system.%20in%20TIBCO%20Software%20Inc.%20TIBCO%20Spotfire%20Analytics%20Platform%20for%20AWS%20Marketplace&amp;severity=high&amp;id=68373654182aa0cae2538124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38955-na-in-na-26e16c98</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38955%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68373654182aa0cae253812a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38956-na-in-na-97759d2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38956%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683739c3182aa0cae253ffba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37205-na-in-na-06fed437</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37205%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683739c3182aa0cae253ffb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37265-na-in-na-05baf5e7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37265%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68375249182aa0cae257748c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40262-cwe-123-write-what-where-condition--99560ab5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40262%3A%20CWE-123%20Write-what-where%20Condition%20in%20AMI%20Aptio&amp;severity=high&amp;id=68360472182aa0cae21ef7a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40261-cwe-120-buffer-overflow-in-ami-apti-5f12540d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40261%3A%20CWE-120%20Buffer%20Overflow%20in%20AMI%20Aptio&amp;severity=high&amp;id=683755f2182aa0cae257f2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40250-cwe-121-stack-based-buffer-overflow-0dcd8d41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40250%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20AMI%20Aptio&amp;severity=high&amp;id=68375988182aa0cae25872b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40246-cwe-123-write-what-where-condition--4c24be2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40246%3A%20CWE-123%20Write-what-where%20Condition%20in%20AMI%20Aptio&amp;severity=high&amp;id=68385089182aa0cae27baaa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26873-cwe-121-stack-based-buffer-overflow-e9217ea1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26873%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20AMI%20Aptio&amp;severity=high&amp;id=68360472182aa0cae21ef787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37259-na-in-na-f0789f79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37259%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68375ceb182aa0cae258f107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39974-na-in-na-16ed8387</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39974%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68375ceb182aa0cae258f109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2016-20015-na-in-na-d5a48e1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2016-20015%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683864b2182aa0cae27f9cc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-20148-na-in-na-eaaaba7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-20148%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683864b2182aa0cae27f9cc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41138-na-in-na-2647d59e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41138%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683864b2182aa0cae27f9ccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-20147-na-in-na-8cb84f8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-20147%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683864b2182aa0cae27f9cc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37204-na-in-na-24befd90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37204%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68360472182aa0cae21ef798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38916-na-in-na-b1e43523</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38916%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68360472182aa0cae21ef79e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35196-na-in-na-be3fc5c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35196%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68386826182aa0cae2801b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32167-cwe-79-cross-site-scripting-xss-in--8f6639ac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32167%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Cloudreve%20Cloudreve&amp;severity=medium&amp;id=68386826182aa0cae2801b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40955-cwe-502-deserialization-of-untruste-76da890b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40955%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20InLong&amp;severity=high&amp;id=68386ba5182aa0cae2809bc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3245-cwe-94-improper-control-of-generatio-99a946b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3245%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20microweber%20microweber%2Fmicroweber&amp;severity=medium&amp;id=68360472182aa0cae21ef7a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2177-cwe-89-improper-neutralization-of-sp-85d89883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2177%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Kayrasoft%20Kayrasoft&amp;severity=critical&amp;id=68360472182aa0cae21ef796</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3005-cwe-79-improper-neutralization-of-in-b079864f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3005%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yetiforcecompany%20yetiforcecompany%2Fyetiforcecrm&amp;severity=medium&amp;id=68360472182aa0cae21ef7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3242-cwe-94-improper-control-of-generatio-228e3fae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3242%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20in%20microweber%20microweber%2Fmicroweber&amp;severity=medium&amp;id=68386ba5182aa0cae2809bc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3079-cwe-269-improper-privilege-managemen-a8b0377a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3079%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20FESTO%20Control%20block%20CPX-CEC-C1%20(no.%20567347)&amp;severity=high&amp;id=68386f5b182aa0cae2811a68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3004-cwe-79-improper-neutralization-of-in-c84c0710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3004%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yetiforcecompany%20yetiforcecompany%2Fyetiforcecrm&amp;severity=medium&amp;id=68360472182aa0cae21ef7a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34917-cwe-789-memory-allocation-with-exce-1e978eae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34917%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20Apache%20Software%20Foundation%20Apache%20Kafka&amp;severity=high&amp;id=68386826182aa0cae2801b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3000-cwe-79-improper-neutralization-of-in-93feea33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3000%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yetiforcecompany%20yetiforcecompany%2Fyetiforcecrm&amp;severity=medium&amp;id=68386826182aa0cae2801b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2924-cwe-79-improper-neutralization-of-in-4668eccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2924%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20yetiforcecompany%20yetiforcecompany%2Fyetiforcecrm&amp;severity=high&amp;id=68386826182aa0cae2801b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34746-cwe-331-insufficient-entropy-in-zyx-f1e6b576</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34746%3A%20CWE-331%3A%20Insufficient%20Entropy%20in%20Zyxel%20Zyxel%20GS1900%20series%20firmware&amp;severity=medium&amp;id=68386826182aa0cae2801b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32911-an-app-may-be-able-to-execute-arbit-76dab0f9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32911%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=68386f5b182aa0cae2811a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32908-a-user-may-be-able-to-elevate-privi-9c7550fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32908%3A%20A%20user%20may%20be%20able%20to%20elevate%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=68386f5b182aa0cae2811a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32886-processing-maliciously-crafted-web--8a8d1cd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32886%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS&amp;severity=high&amp;id=68386f5b182aa0cae2811a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32883-an-app-may-be-able-to-read-sensitiv-0b3dc2de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32883%3A%20An%20app%20may%20be%20able%20to%20read%20sensitive%20location%20information%20in%20Apple%20iOS&amp;severity=medium&amp;id=68386f5b182aa0cae2811a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39958-cwe-863-incorrect-authorization-in--4765b7de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39958%3A%20CWE-863%20%20Incorrect%20Authorization%20in%20OWASP%20ModSecurity%20Core%20Rule%20Set&amp;severity=high&amp;id=68386826182aa0cae2801b74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39957-cwe-693-protection-mechanism-failur-fa90cf05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39957%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20OWASP%20ModSecurity%20Core%20Rule%20Set&amp;severity=high&amp;id=68386826182aa0cae2801b72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39956-cwe-863-incorrect-authorization-in--453f630f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39956%3A%20CWE-863%20%20Incorrect%20Authorization%20in%20OWASP%20ModSecurity%20Core%20Rule%20Set&amp;severity=high&amp;id=68386826182aa0cae2801b70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39955-cwe-863-incorrect-authorization-in--b95a1f76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39955%3A%20CWE-863%20%20Incorrect%20Authorization%20in%20OWASP%20ModSecurity%20Core%20Rule%20Set&amp;severity=high&amp;id=68386826182aa0cae2801b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38340-na-in-na-33712001</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38340%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68386826182aa0cae2801b6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35957-cwe-290-authentication-bypass-by-spoofing-in-grafana-grafana-bf42b4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35957%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9845c4522896dcbf42b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-20-f12bd7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38550-na-in-na-aadf5d0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38550%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68360472182aa0cae21ef79c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35068-na-in-na-9bf7646d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35068%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683872c2182aa0cae28198ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35067-na-in-na-f6915096</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35067%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683872c2182aa0cae28198eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35066-na-in-na-6268c693</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35066%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683872c2182aa0cae28198e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35065-na-in-na-1a159dec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35065%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387633182aa0cae28217b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35064-na-in-na-4978b578</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35064%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387633182aa0cae28217b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35063-na-in-na-6d3e6f9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35063%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387633182aa0cae28217b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35062-na-in-na-66f03040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35062%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387633182aa0cae28217ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35061-na-in-na-4d1bef3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68387633182aa0cae28217ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35060-na-in-na-5df5e86e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35060%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683880c6182aa0cae283969d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38527-na-in-na-2a6a53e9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38527%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683880c6182aa0cae283969f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0143-cwe-284-improper-access-control-in-f-a6a30dbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0143%3A%20CWE-284%20Improper%20Access%20Control%20in%20ForgeRock%20LDAP%20Connector&amp;severity=critical&amp;id=683880c6182aa0cae2839699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28321-na-in-na-83d37d82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28321%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683880c6182aa0cae283969b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38509-na-in-na-7eec43f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38509%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683880c6182aa0cae2839695</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28204-na-in-na-34304a46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28204%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683880c6182aa0cae2839693</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38351-na-in-na-e85c0e6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38351%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68388485182aa0cae2841531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2995-cwe-284-in-cri-o-24413e21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2995%3A%20CWE-284%20in%20cri-o&amp;severity=high&amp;id=6838cb41182aa0cae28e8851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23766-cwe-20-improper-input-validation-in-aa34152d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23766%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Bluetree%20Co.%2C%20Ltd%20BigFileAgent&amp;severity=high&amp;id=6838a06f182aa0cae2880a6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23767-cwe-288-authentication-bypass-using-c0bc9544</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23767%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20HANSSAK%20Co.%2CLtd%20SecureGate&amp;severity=high&amp;id=683f3ee7182aa0cae28796be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23768-cwe-284-improper-access-control-in--3af65c17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23768%3A%20CWE-284%20Improper%20Access%20Control%20in%20Neo%20Information%20Systems%20Co.%2C%20Ltd%20Home%20AP%20NIS-HAP11AC&amp;severity=high&amp;id=683f3ee7182aa0cae28796c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37347-oob-read-information-disclosure-in--c73d3ca5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37347%3A%20OOB%20Read%20Information%20Disclosure%20in%20Trend%20Micro%20Trend%20Micro%20Security%20(Consumer)&amp;severity=medium&amp;id=6838a78c182aa0cae2890f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40713-na-in-na-3ffa2384</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40713%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f3ee7182aa0cae28796d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40712-na-in-na-04176c2f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40712%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f3ee7182aa0cae28796c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38425-use-after-free-cwe-416-in-adobe-bridge-bf43dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38425%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf43dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35708-heap-based-buffer-overflow-cwe-122-in-adobe-bridge-bf4285</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35708%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf4285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35706-heap-based-buffer-overflow-cwe-122-in-adobe-bridge-bf427d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35706%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf427d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35709-use-after-free-cwe-416-in-adobe-bridge-bf428d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35709%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf428d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35704-use-after-free-cwe-416-in-adobe-bridge-bf426c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35704%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf426c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35700-out-of-bounds-write-cwe-787-in-adobe-bridge-bf4249</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35700%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf4249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35702-out-of-bounds-read-cwe-125-in-adobe-bridge-bf4253</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35702%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf4253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35707-out-of-bounds-read-cwe-125-in-adobe-bridge-bf4281</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35707%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf4281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35703-out-of-bounds-read-cwe-125-in-adobe-bridge-bf425b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35703%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf425b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35705-out-of-bounds-read-cwe-125-in-adobe-bridge-bf4270</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35705%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf4270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35699-out-of-bounds-write-cwe-787-in-adobe-bridge-bf422e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35699%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf422e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35701-out-of-bounds-write-cwe-787-in-adobe-bridge-bf424d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35701%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9845c4522896dcbf424d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38577-na-in-na-59c53f8d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38577%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f3ee7182aa0cae28796c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38887-na-in-na-38512d8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38887%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f37c9182aa0cae28696c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-19-f12952</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-18-f12916</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-uber-breach-attack-analysis-f0c21a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Uber%20Breach%20%26%20Attack%20Analysis&amp;severity=low&amp;id=682acdbebbaf20d303f0c21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-17-f127d4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f127d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39217-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-some-natalie-ghas-to-csv-bf4414</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39217%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20some-natalie%20ghas-to-csv&amp;severity=medium&amp;id=682d9845c4522896dcbf4414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39212-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf4410</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39212%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9845c4522896dcbf4410</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39210-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-nextcloud-security-advisories-bf43fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39210%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9845c4522896dcbf43fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39211-cwe-918-server-side-request-forgery-ssrf-in-nextcloud-security-advisories-bf440c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39211%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9845c4522896dcbf440c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36015-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf4381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36015%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36012-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf434f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36012%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf434f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35996-cwe-369-divide-by-zero-in-tensorflow-tensorflow-bf42f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35996%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36027-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf68ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36027%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9849c4522896dcbf68ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36017-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf4392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36017%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36014-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf4372</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36014%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4372</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36000-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf4333</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36000%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36011-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf434b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36011%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf434b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36013-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf436a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36013%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf436a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35994-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35994%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35993-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35993%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35992-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35992%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35991-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35991%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35999-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf432f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35999%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf432f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35998-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf432b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35998%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf432b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35997-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35997%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35995-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35995%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36016-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf438e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36016%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf438e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36005-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4347</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36005%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36004-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36004%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36003-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf433f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36003%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf433f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36002-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf433b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36002%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf433b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36001-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4337</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36001%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36026-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf43ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36026%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf43ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36018-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4396</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36018%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36019-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf439e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36019%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf439e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35990-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf42c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35990%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf42c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35986-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf40ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35986%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35987-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf40f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35987%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35985-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf40ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35985%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35984-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf40dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35984%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35983-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf40d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35983%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35989-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf410d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35989%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf410d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35988-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf40f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35988%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35982-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf40c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35982%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35981-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf40c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35981%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35979-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf40b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35979%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35974-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf40b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35974%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf40b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35972-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf4084</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35972%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4084</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35973-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf4088</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35973%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35971-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4080</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35971%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35969-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf406b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35969%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf406b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35970-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf407c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35970%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf407c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35968-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4063</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35968%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35966-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf4055</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35966%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35967-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf405b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35967%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf405b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35964-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf4040</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35964%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35965-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf4051</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35965%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35963-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4025</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35963%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35960-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4021</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35960%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35959-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4010</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35959%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4010</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35952-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4008</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35952%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4008</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35940-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf3ffc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35940%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf3ffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35941-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf4000</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35941%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf4000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35937-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf3fdf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35937%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf3fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35939-cwe-787-out-of-bounds-write-in-tensorflow-tensorflow-bf3ff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35939%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf3ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35935-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf3fd7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35935%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf3fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35938-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf3fe7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35938%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf3fe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35934-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf3fbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35934%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9845c4522896dcbf3fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39009-permission-verification-vulnerabili-84754bf8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39009%3A%20Permission%20verification%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=683f0a31182aa0cae27f6e79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39001-path-traversal-vulnerability-in-hua-ed403f04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39001%3A%20Path%20traversal%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=683f37c9182aa0cae28696c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39007-permission-verification-bypass-vuln-9d4b4521</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39007%3A%20Permission%20verification%20bypass%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=683f3b5c182aa0cae2871574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39008-bundle-serializationdeserialization-8015fccd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39008%3A%20Bundle%20serialization%2Fdeserialization%20mismatch%20vulnerability%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=683f3b5c182aa0cae2871576</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35664-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3fb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35664%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30681-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30681%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30684-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30684%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34218-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3fa9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34218%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3fa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30686-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30686%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30682-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30682%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30680-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30680%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30685-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30685%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30678-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30678%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30683-violation-of-secure-design-principles-cwe-657-in-adobe-experience-manager-bf3f88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30683%3A%20Violation%20of%20Secure%20Design%20Principles%20(CWE-657)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30677-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf3f50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30677%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9845c4522896dcbf3f50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38417-out-of-bounds-read-cwe-125-in-adobe-indesign-bf41c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38417%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf41c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38416-out-of-bounds-read-cwe-125-in-adobe-indesign-bf41b8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38416%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf41b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30676-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30676%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38413-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf41a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38413%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf41a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38415-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf41b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38415%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf41b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30675-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30675%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38414-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf41a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38414%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf41a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30673-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30673%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30674-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30674%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30672-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30672%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28855-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28855%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28857-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28857%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30671-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3f23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30671%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28854-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28854%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28856-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3efb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28856%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28852-out-of-bounds-write-cwe-787-in-adobe-indesign-bf3ee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28852%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28853-out-of-bounds-write-cwe-787-in-adobe-indesign-bf3ee5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28853%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9845c4522896dcbf3ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38432-heap-based-buffer-overflow-cwe-122-in-adobe-photoshop-bf4211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38432%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf4211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38433-heap-based-buffer-overflow-cwe-122-in-adobe-photoshop-bf4219</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38433%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf4219</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38426-access-of-uninitialized-pointer-cwe-824-in-adobe-photoshop-bf41e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38426%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf41e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38428-use-after-free-cwe-416-in-adobe-photoshop-bf41f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38428%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf41f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38429-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf4201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38429%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf4201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38431-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf4209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38431%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf4209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35713-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf3fba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35713%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf3fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38427-access-of-uninitialized-pointer-cwe-824-in-adobe-photoshop-bf41e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38427%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf41e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38430-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf4205</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38430%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9845c4522896dcbf4205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38401-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf4125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38401%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf4125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38407-out-of-bounds-read-cwe-125-in-adobe-incopy-bf4157</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38407%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf4157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38405-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf414b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38405%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf414b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38406-out-of-bounds-read-cwe-125-in-adobe-incopy-bf414f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38406%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf414f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38404-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf4147</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38404%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf4147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38402-out-of-bounds-read-cwe-125-in-adobe-incopy-bf4136</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38402%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf4136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38403-out-of-bounds-read-cwe-125-in-adobe-incopy-bf413a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38403%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9845c4522896dcbf413a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38410-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf418f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38410%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9845c4522896dcbf418f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38408-improper-input-validation-cwe-20-in-adobe-illustrator-bf4176</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38408%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9845c4522896dcbf4176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38409-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf417e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38409%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9845c4522896dcbf417e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38411-heap-based-buffer-overflow-cwe-122-in-adobe-animate-bf4193</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38411%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9845c4522896dcbf4193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38412-out-of-bounds-read-cwe-125-in-adobe-animate-bf41a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38412%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9845c4522896dcbf41a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38877-na-in-na-314380d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38877%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f3b5c182aa0cae287156e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38878-na-in-na-a8ccb7de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38878%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f3437182aa0cae2861732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37250-na-in-na-7ca81b17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37250%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f3b5c182aa0cae287156c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38832-na-in-na-34870658</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38832%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f3ee7182aa0cae28796c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38833-na-in-na-e15e59bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38833%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683f3ee7182aa0cae28796c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42949-na-in-na-30972fed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42949%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=683f3ee7182aa0cae28796bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3176-cwe-416-use-after-free-in-linux-kernel-bf8160</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3176%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf8160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40152-cwe-121-stack-based-buffer-overflow-in-xstream-woodstox-bf8174</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40152%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20xstream%20Woodstox&amp;severity=medium&amp;id=682d984bc4522896dcbf8174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40151-cwe-121-stack-based-buffer-overflow-in-xstream-xstream-bf8170</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40151%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20xstream%20xstream&amp;severity=medium&amp;id=682d984bc4522896dcbf8170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2913-cwe-639-authorization-bypass-through-910ab7da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2913%3A%20CWE-639%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20Unknown%20Login%20No%20Captcha%20reCAPTCHA&amp;severity=medium&amp;id=683f37c9182aa0cae28696c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2912-cwe-918-server-side-request-forgery--f5823952</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2912%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Unknown%20Craw%20Data&amp;severity=medium&amp;id=683f3437182aa0cae2861730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2669-cwe-79-cross-site-scripting-xss-in-u-caba5956</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2669%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20WP%20Taxonomy%20Import&amp;severity=medium&amp;id=6842df031a426642debc9727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2654-cwe-79-cross-site-scripting-xss-in-u-a83a840d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2654%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Classified%20Listing%20%E2%80%93%20Classified%20ads%20%26%20Business%20Directory%20Plugin&amp;severity=medium&amp;id=6842df031a426642debc9722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25708-buffer-copy-without-checking-size-o-cd9cd057</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25708%3A%20Buffer%20Copy%20Without%20Checking%20Size%20of%20Input%20in%20WLAN%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Connectivity%2C%20Snapdragon%20Mobile&amp;severity=critical&amp;id=68405817182aa0cae2b17f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40150-cwe-400-uncontrolled-resource-consumption-in-jettison-jettison-bf816c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40150%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Jettison%20Jettison&amp;severity=medium&amp;id=682d984bc4522896dcbf816c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40149-cwe-121-stack-based-buffer-overflow-in-jettison-jettison-bf8168</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40149%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Jettison%20Jettison&amp;severity=medium&amp;id=682d984bc4522896dcbf8168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-16-f123fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f123fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36074-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf4115</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36074%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9845c4522896dcbf4115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36075-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf411d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36075%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9845c4522896dcbf411d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39213-cwe-125-out-of-bounds-read-in-pandatix-go-cvss-bf698d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39213%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pandatix%20go-cvss&amp;severity=medium&amp;id=682d9849c4522896dcbf698d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39215-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-tauri-apps-tauri-bf6991</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39215%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20tauri-apps%20tauri&amp;severity=medium&amp;id=682d9849c4522896dcbf6991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29240-cwe-908-use-of-uninitialized-resource-in-scylladb-scylla-bf3cce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29240%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20scylladb%20scylla&amp;severity=medium&amp;id=682d9844c4522896dcbf3cce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1798-cwe-20-improper-input-validation-in-google-llc-kubevirt-bf8017</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1798%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20LLC%20Kubevirt&amp;severity=medium&amp;id=682d984bc4522896dcbf8017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40663-cwe-125-out-of-bounds-read-in-nikon-nis-elements-viewer-bee93c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40663%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20NIKON%20NIS-Elements%20Viewer&amp;severity=high&amp;id=682d983cc4522896dcbee93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40662-cwe-125-out-of-bounds-read-in-nikon-nis-elements-viewer-bedfb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40662%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20NIKON%20NIS-Elements%20Viewer&amp;severity=high&amp;id=682d983bc4522896dcbedfb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39209-cwe-400-uncontrolled-resource-consumption-in-github-cmark-gfm-bf3ed9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39209%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20github%20cmark-gfm&amp;severity=medium&amp;id=682d9845c4522896dcbf3ed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-15-f12839</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36603-na-in-na-e7c3f624</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36603%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36056-cwe-347-improper-verification-of-cryptographic-signature-in-sigstore-cosign-bf68b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36056%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sigstore%20cosign&amp;severity=medium&amp;id=682d9849c4522896dcbf68b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31187-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf3d0e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31187%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf3d0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35946-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-bf3d26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35946%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf3d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35947-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-bf3d2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35947%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf3d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36112-cwe-918-server-side-request-forgery-ssrf-in-glpi-project-glpi-bf3e75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36112%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9845c4522896dcbf3e75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35945-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf3d1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35945%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf3d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31143-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-glpi-project-glpi-bf3cec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31143%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf3cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29492-cwe-20-improper-input-validation-in-33c2db36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29492%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=medium&amp;id=6840c579182aa0cae2c16b64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1778-cwe-119-improper-restriction-of-oper-5e3b2917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1778%3A%20CWE-119%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=6840c579182aa0cae2c16b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29922-cwe-20-improper-input-validation-in-d245200e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29922%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=6840c579182aa0cae2c16b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2277-cwe-1284-improper-validation-of-spec-a91b86be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2277%3A%20CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input%20in%20Hitachi%20Energy%20MicroSCADA%20X%20SYS600&amp;severity=high&amp;id=6840c579182aa0cae2c16b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0029-cwe-59-improper-link-resolution-befo-3fff0e03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0029%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20Palo%20Alto%20Networks%20Cortex%20XDR%20Agent&amp;severity=medium&amp;id=6840c579182aa0cae2c16b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37137-na-in-na-034dc9a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37137%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6840c579182aa0cae2c16b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40674-na-in-na-c500aaf8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40674%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36114-cwe-400-uncontrolled-resource-consumption-in-rust-lang-cargo-bf3e8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36114%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rust-lang%20cargo&amp;severity=medium&amp;id=682d9845c4522896dcbf3e8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36113-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-rust-lang-cargo-bf3e7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36113%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20rust-lang%20cargo&amp;severity=medium&amp;id=682d9845c4522896dcbf3e7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-14-f12722</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dissecting-plugx-to-extract-its-crown-jewels-f0c218</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dissecting%20PlugX%20to%20Extract%20Its%20Crown%20Jewels&amp;severity=low&amp;id=682acdbebbaf20d303f0c218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32555-na-in-na-64904233</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32555%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6841e8e0182aa0cae2eca045</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2962-cwe-400-in-qemu-bf3cd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2962%3A%20CWE-400%20in%20QEMU&amp;severity=high&amp;id=682d9844c4522896dcbf3cd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20392-elevation-of-privilege-in-android-02478527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20392%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=high&amp;id=6842df031a426642debc971d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20389-elevation-of-privilege-in-android-609112ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20389%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=critical&amp;id=6842df031a426642debc9718</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20388-elevation-of-privilege-in-android-6a07d0cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20388%3A%20Elevation%20of%20privilege%20in%20Android&amp;severity=critical&amp;id=6842df031a426642debc9713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39206-cwe-610-externally-controlled-reference-to-a-resource-in-another-sphere-in-theonedev-onedev-bf6959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39206%3A%20CWE-610%3A%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20theonedev%20onedev&amp;severity=medium&amp;id=682d9849c4522896dcbf6959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39207-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-theonedev-onedev-bf6966</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39207%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20theonedev%20onedev&amp;severity=medium&amp;id=682d9849c4522896dcbf6966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39208-cwe-552-files-or-directories-accessible-to-external-parties-in-theonedev-onedev-bf6989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39208%3A%20CWE-552%3A%20Files%20or%20Directories%20Accessible%20to%20External%20Parties%20in%20theonedev%20onedev&amp;severity=medium&amp;id=682d9849c4522896dcbf6989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39205-cwe-287-improper-authentication-in-theonedev-onedev-bf6953</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39205%3A%20CWE-287%3A%20Improper%20Authentication%20in%20theonedev%20onedev&amp;severity=medium&amp;id=682d9849c4522896dcbf6953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39203-cwe-269-improper-privilege-management-in-matrix-org-matrix-appservice-irc-bf3eca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39203%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20matrix-org%20matrix-appservice-irc&amp;severity=medium&amp;id=682d9845c4522896dcbf3eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39202-cwe-269-improper-privilege-management-in-matrix-org-matrix-appservice-irc-bf3eb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39202%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20matrix-org%20matrix-appservice-irc&amp;severity=medium&amp;id=682d9845c4522896dcbf3eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36105-cwe-203-observable-discrepancy-in-typo3-typo3-bf3e3e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36105%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36106-cwe-287-improper-authentication-in-typo3-typo3-bf3e46</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36106%3A%20CWE-287%3A%20Improper%20Authentication%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36107-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-typo3-typo3-bf3e4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36107%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36104-cwe-770-allocation-of-resources-without-limits-or-throttling-in-typo3-typo3-bf3e3a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36104%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3e3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36108-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-typo3-typo3-bf3e56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36108%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9845c4522896dcbf3e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36103-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siderolabs-talos-bf3e18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36103%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20siderolabs%20talos&amp;severity=medium&amp;id=682d9844c4522896dcbf3e18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36020-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-typo3-html-sanitizer-bf3d30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36020%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20html-sanitizer&amp;severity=medium&amp;id=682d9844c4522896dcbf3d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39801-cwe-287-in-sap-se-sap-grc-access-co-cacff92a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39801%3A%20CWE-287%20in%20SAP%20SE%20SAP%20GRC%20Access%20Control%20Emergency%20Access%20Management&amp;severity=high&amp;id=68487f561b0bd07c3938a509</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39799-cwe-79-in-sap-se-sap-netweaver-as-a-33b20097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39799%3A%20CWE-79%20in%20SAP%20SE%20SAP%20NetWeaver%20AS%20ABAP%20(SAP%20GUI%20for%20HTML%20within%20the%20Fiori%20Launchpad)&amp;severity=medium&amp;id=68487f561b0bd07c3938a505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2989-cwe-842-in-podman-e330459e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2989%3A%20CWE-842%20in%20podman&amp;severity=high&amp;id=6842df031a426642debc97c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39151-cwe-787-out-of-bounds-write-in-siem-bfb988ca</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39151%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20Siemens%20Parasolid%20V33.1&amp;severity=high&amp;id=6841e8e0182aa0cae2eca055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39158-cwe-400-uncontrolled-resource-consumption-in-siemens-ruggedcom-i800-bf813d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39158%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=682d984bc4522896dcbf813d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-13-f12db0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12db0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39200-cwe-347-improper-verification-of-cryptographic-signature-in-matrix-org-dendrite-bf3eb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39200%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20matrix-org%20dendrite&amp;severity=medium&amp;id=682d9845c4522896dcbf3eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36102-cwe-281-improper-preservation-of-permissions-in-shopware-shopware-bf3e12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36102%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9844c4522896dcbf3e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36101-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-shopware-shopware-bf3e0c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36101%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9844c4522896dcbf3e0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-12-f12d6a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/chiseling-in-lorenz-ransomware-group-cracks-mivoice-and-calls-back-for-free-f0c209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Chiseling%20In%3A%20Lorenz%20Ransomware%20Group%20Cracks%20MiVoice%20And%20Calls%20Back%20For%20Free&amp;severity=low&amp;id=682acdbebbaf20d303f0c209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hezb-cryptomining-malware-f0c205</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hezb%20cryptomining%20malware&amp;severity=medium&amp;id=682acdbebbaf20d303f0c205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-11-f1271e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f1271e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-10-f12cec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36110-cwe-1220-insufficient-granularity-of-access-control-in-gravitl-netmaker-bf3e6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36110%3A%20CWE-1220%3A%20Insufficient%20Granularity%20of%20Access%20Control%20in%20gravitl%20netmaker&amp;severity=medium&amp;id=682d9845c4522896dcbf3e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31006-cwe-400-uncontrolled-resource-consumption-in-hyperledger-indy-node-bf3cdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31006%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20hyperledger%20indy-node&amp;severity=medium&amp;id=682d9844c4522896dcbf3cdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36109-cwe-863-incorrect-authorization-in-moby-moby-bf3e65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36109%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20moby%20moby&amp;severity=medium&amp;id=682d9845c4522896dcbf3e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38144-cwe-352-cross-site-request-forgery-csrf-in-gvectors-team-wpforo-forum-wordpress-plugin-bf3ea9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38144%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gVectors%20Team%20wpForo%20Forum%20(WordPress%20plugin)&amp;severity=high&amp;id=682d9845c4522896dcbf3ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36087-cwe-20-improper-input-validation-in-oauthlib-oauthlib-bf6937</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36087%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20oauthlib%20oauthlib&amp;severity=medium&amp;id=682d9849c4522896dcbf6937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-09-f12250</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36084-cwe-943-improper-neutralization-of-special-elements-in-data-query-logic-in-aeb-labs-cruddl-bf3da6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36084%3A%20CWE-943%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Data%20Query%20Logic%20in%20AEB-labs%20cruddl&amp;severity=medium&amp;id=682d9844c4522896dcbf3da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36100-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-xwiki-xwiki-platform-bf694f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36100%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf694f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36098-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-xwiki-platform-bf6947</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36098%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36099-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-xwiki-xwiki-platform-bf694b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36099%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf694b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36097-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-xwiki-platform-bf6943</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36097%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36096-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-xwiki-platform-bf3dfb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36096%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9844c4522896dcbf3dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36095-cwe-352-cross-site-request-forgery-csrf-in-xwiki-xwiki-platform-bf3df3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36095%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9844c4522896dcbf3df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36094-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-xwiki-platform-bf693f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf693f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36093-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-xwiki-xwiki-platform-bf3deb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36093%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9844c4522896dcbf3deb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36092-cwe-287-improper-authentication-in-xwiki-xwiki-platform-bf3de3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36092%3A%20CWE-287%3A%20Improper%20Authentication%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9844c4522896dcbf3de3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36091-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bf3ddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36091%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9844c4522896dcbf3ddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36090-cwe-285-improper-authorization-in-xwiki-xwiki-platform-bf693b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36090%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf693b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36085-cwe-693-protection-mechanism-failure-in-open-policy-agent-opa-bf690d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36085%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20open-policy-agent%20opa&amp;severity=medium&amp;id=682d9849c4522896dcbf690d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-08-f13039</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f13039</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36089-cwe-294-authentication-bypass-by-capture-replay-in-kubevela-kubevela-bf3dce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36089%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20kubevela%20kubevela&amp;severity=medium&amp;id=682d9844c4522896dcbf3dce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36088-cwe-284-improper-access-control-in-gocd-gocd-bf3dc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36088%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9844c4522896dcbf3dc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36086-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-rust-osdev-linked-list-allocator-bf6911</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36086%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20rust-osdev%20linked-list-allocator&amp;severity=medium&amp;id=682d9849c4522896dcbf6911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36083-cwe-400-uncontrolled-resource-consumption-in-panva-jose-bf6909</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36083%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20panva%20jose&amp;severity=medium&amp;id=682d9849c4522896dcbf6909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36082-cwe-20-improper-input-validation-in-mansuf-mangadex-downloader-bf3da2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36082%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20mansuf%20mangadex-downloader&amp;severity=medium&amp;id=682d9844c4522896dcbf3da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36080-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-linbreux-wikmd-bf3d9a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36080%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Linbreux%20wikmd&amp;severity=medium&amp;id=682d9844c4522896dcbf3d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36081-cwe-23-relative-path-traversal-in-linbreux-wikmd-bf3d9e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36081%3A%20CWE-23%3A%20Relative%20Path%20Traversal%20in%20Linbreux%20wikmd&amp;severity=medium&amp;id=682d9844c4522896dcbf3d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36079-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-parse-community-parse-server-bf3d96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36079%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9844c4522896dcbf3d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36049-cwe-400-uncontrolled-resource-consumption-in-fluxcd-flux2-bf3d5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36049%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20fluxcd%20flux2&amp;severity=medium&amp;id=682d9844c4522896dcbf3d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36073-cwe-287-improper-authentication-in-rubygems-rubygems-org-bf3d92</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36073%3A%20CWE-287%3A%20Improper%20Authentication%20in%20rubygems%20rubygems.org&amp;severity=medium&amp;id=682d9844c4522896dcbf3d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36069-cwe-94-improper-control-of-generation-of-code-code-injection-in-python-poetry-poetry-bf68f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36069%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20python-poetry%20poetry&amp;severity=medium&amp;id=682d9849c4522896dcbf68f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36070-cwe-426-untrusted-search-path-in-python-poetry-poetry-bf3d8a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36070%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20python-poetry%20poetry&amp;severity=medium&amp;id=682d9844c4522896dcbf3d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31166-cwe-269-improper-privilege-management-in-xwiki-xwiki-platform-bf6893</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31166%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31167-cwe-285-improper-authorization-in-xwiki-xwiki-platform-bf6899</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31167%3A%20CWE-285%3A%20Improper%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9849c4522896dcbf6899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31149-cwe-290-authentication-bypass-by-spoofing-in-activitywatch-activitywatch-bf688f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31149%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20ActivityWatch%20activitywatch&amp;severity=medium&amp;id=682d9849c4522896dcbf688f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-07-e651c9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-07&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e651c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-07-f124b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f124b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36065-cwe-24-path-traversal-filedir-in-growthbook-growthbook-bf3d86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36065%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20growthbook%20growthbook&amp;severity=medium&amp;id=682d9844c4522896dcbf3d86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36064-cwe-1333-inefficient-regular-expression-complexity-in-ericcornelissen-shescape-bf68ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36064%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=682d9849c4522896dcbf68ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36072-cwe-597-use-of-wrong-operator-in-string-comparison-in-mesosoi-silverwaregames-io-issue-tracker-bf3d8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36072%3A%20CWE-597%3A%20Use%20of%20Wrong%20Operator%20in%20String%20Comparison%20in%20mesosoi%20silverwaregames-io-issue-tracker&amp;severity=medium&amp;id=682d9844c4522896dcbf3d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36061-cwe-665-improper-initialization-in-elrondnetwork-elrond-go-bf68d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36061%3A%20CWE-665%3A%20Improper%20Initialization%20in%20ElrondNetwork%20elrond-go&amp;severity=medium&amp;id=682d9849c4522896dcbf68d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36058-cwe-20-improper-input-validation-in-elrondnetwork-elrond-go-bf68cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36058%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20ElrondNetwork%20elrond-go&amp;severity=medium&amp;id=682d9849c4522896dcbf68cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36057-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-discourse-discourse-chat-bf3d75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36057%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20discourse%20discourse-chat&amp;severity=medium&amp;id=682d9844c4522896dcbf3d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36039-cwe-787-out-of-bounds-write-in-rizinorg-rizin-bf3d54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36039%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=682d9844c4522896dcbf3d54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36038-cwe-502-deserialization-of-untrusted-data-in-circuitverse-circuitverse-bf3d4c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36038%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20CircuitVerse%20CircuitVerse&amp;severity=medium&amp;id=682d9844c4522896dcbf3d4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36032-cwe-20-improper-input-validation-in-reactphp-http-bf3d3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36032%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20reactphp%20http&amp;severity=medium&amp;id=682d9844c4522896dcbf3d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35931-cwe-261-weak-encoding-for-password-in-nextcloud-security-advisories-bf3d16</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35931%3A%20CWE-261%3A%20Weak%20Encoding%20for%20Password%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9844c4522896dcbf3d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2943-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-connekthq-wordpress-infinite-scroll-ajax-load-more-bdc216</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2943%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20connekthq%20WordPress%20Infinite%20Scroll%20%E2%80%93%20Ajax%20Load%20More&amp;severity=medium&amp;id=682d981fc4522896dcbdc216</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2941-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gamerz-wp-useronline-bdc212</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2941%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gamerz%20WP-UserOnline&amp;severity=medium&amp;id=682d981fc4522896dcbdc212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2542-cwe-352-cross-site-request-forgery-csrf-in-gcornelisse-ucontext-for-clickbank-bdc20e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2542%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gcornelisse%20uContext%20for%20Clickbank&amp;severity=high&amp;id=682d981fc4522896dcbdc20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2541-cwe-352-cross-site-request-forgery-csrf-in-gcornelisse-ucontext-for-amazon-bdc201</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2541%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20gcornelisse%20uContext%20for%20Amazon&amp;severity=high&amp;id=682d981fc4522896dcbdc201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2518-cwe-352-cross-site-request-forgery-csrf-in-dholovnia-stockists-manager-for-woocommerce-bdc1fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2518%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20dholovnia%20Stockists%20Manager%20for%20Woocommerce&amp;severity=high&amp;id=682d981fc4522896dcbdc1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2473-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gamerz-wp-useronline-bdc1f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2473%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gamerz%20WP-UserOnline&amp;severity=medium&amp;id=682d981fc4522896dcbdc1f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2461-cwe-862-missing-authorization-in-oferwald-transposh-wordpress-translation-bdc1f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2461%3A%20CWE-862%20Missing%20Authorization%20in%20oferwald%20Transposh%20WordPress%20Translation&amp;severity=medium&amp;id=682d981fc4522896dcbdc1f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2438-cwe-502-deserialization-of-untrusted-data-in-wpmudev-broken-link-checker-bdc1ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2438%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20wpmudev%20Broken%20Link%20Checker&amp;severity=high&amp;id=682d981ec4522896dcbdc1ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2436-cwe-502-deserialization-of-untrusted-data-in-codename065-download-manager-bdc1c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2436%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20codename065%20Download%20Manager&amp;severity=high&amp;id=682d981ec4522896dcbdc1c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2434-cwe-502-deserialization-of-untrusted-data-in-instawp-string-locator-bdc1b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2434%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20instawp%20String%20locator&amp;severity=high&amp;id=682d981ec4522896dcbdc1b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2433-cwe-502-deserialization-of-untrusted-data-in-connekthq-wordpress-infinite-scroll-ajax-load-more-bdc1ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2433%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20connekthq%20WordPress%20Infinite%20Scroll%20%E2%80%93%20Ajax%20Load%20More&amp;severity=high&amp;id=682d981ec4522896dcbdc1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2233-cwe-352-cross-site-request-forgery-csrf-in-jkriddle-banner-cycler-bdc1a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2233%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20jkriddle%20Banner%20Cycler&amp;severity=high&amp;id=682d981ec4522896dcbdc1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31020-cwe-287-improper-authentication-in-hyperledger-indy-node-bf3ce4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31020%3A%20CWE-287%3A%20Improper%20Authentication%20in%20hyperledger%20indy-node&amp;severity=medium&amp;id=682d9844c4522896dcbf3ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36067-cwe-913-improper-control-of-dynamically-managed-code-resources-in-patriksimek-vm2-bf68ee</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36067%3A%20CWE-913%3A%20Improper%20Control%20of%20Dynamically-Managed%20Code%20Resources%20in%20patriksimek%20vm2&amp;severity=medium&amp;id=682d9849c4522896dcbf68ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36044-cwe-787-out-of-bounds-write-in-rizinorg-rizin-bf3c73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36044%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=682d9844c4522896dcbf3c73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36043-cwe-415-double-free-in-rizinorg-rizin-bf3c64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36043%3A%20CWE-415%3A%20Double%20Free%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=682d9844c4522896dcbf3c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36042-cwe-787-out-of-bounds-write-in-rizinorg-rizin-bf3c5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36042%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=682d9844c4522896dcbf3c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36041-cwe-787-out-of-bounds-write-in-rizinorg-rizin-bf3c56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36041%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=682d9844c4522896dcbf3c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36040-cwe-787-out-of-bounds-write-in-rizinorg-rizin-bf3c50</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36040%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20rizinorg%20rizin&amp;severity=medium&amp;id=682d9844c4522896dcbf3c50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-06-f12d6e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dangeroussavanna-two-year-long-campaign-targets-financial-institutions-in-french-speaking-africa-f0c203</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=DangerousSavanna%3A%20Two-year%20long%20campaign%20targets%20financial%20institutions%20in%20French-speaking%20Africa&amp;severity=medium&amp;id=682acdbebbaf20d303f0c203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-3008-cwe-78-os-command-injection-in-syoyo-tinygltf-bf8143</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-3008%3A%20CWE-78%20OS%20Command%20Injection%20in%20syoyo%20tinygltf&amp;severity=medium&amp;id=682d984bc4522896dcbf8143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38751-cwe-121-stack-based-buffer-overflow-in-snakeyaml-snakeyaml-bf810b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38751%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20snakeyaml%20SnakeYAML&amp;severity=medium&amp;id=682d984bc4522896dcbf810b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-09-05-80775e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-09-05&amp;severity=medium&amp;id=682b68e1d14de609c880775e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-05-f1245d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f1245d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-04-f124d5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f124d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-03-f12d68</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31152-cwe-703-improper-check-or-handling-of-exceptional-conditions-in-matrix-org-synapse-bf3c1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31152%3A%20CWE-703%3A%20Improper%20Check%20or%20Handling%20of%20Exceptional%20Conditions%20in%20matrix-org%20synapse&amp;severity=medium&amp;id=682d9844c4522896dcbf3c1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31196-cwe-918-server-side-request-forgery-ssrf-in-vran-dev-databasir-bf68aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31196%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vran-dev%20databasir&amp;severity=medium&amp;id=682d9849c4522896dcbf68aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35933-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-prestashop-productcomments-bf3c3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35933%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PrestaShop%20productcomments&amp;severity=medium&amp;id=682d9844c4522896dcbf3c3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36071-cwe-287-improper-authentication-in-drakkan-sftpgo-bf6905</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36071%3A%20CWE-287%3A%20Improper%20Authentication%20in%20drakkan%20sftpgo&amp;severity=medium&amp;id=682d9849c4522896dcbf6905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36076-cwe-352-cross-site-request-forgery-csrf-in-nodebb-nodebb-bf682a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36076%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20NodeBB%20NodeBB&amp;severity=medium&amp;id=682d9849c4522896dcbf682a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36078-cwe-789-memory-allocation-with-excessive-size-value-in-gagliardetto-binary-bf682e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36078%3A%20CWE-789%3A%20Memory%20Allocation%20with%20Excessive%20Size%20Value%20in%20gagliardetto%20binary&amp;severity=medium&amp;id=682d9849c4522896dcbf682e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31176-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-image-renderer-bf3c26</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31176%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20grafana%20grafana-image-renderer&amp;severity=medium&amp;id=682d9844c4522896dcbf3c26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-39189-n-a-in-n-a-bdc31d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-39189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc31d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-02-f12b5f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/buzzing-in-the-background-bumblebee-a-new-modular-backdoor-evolved-from-bookworm-f0c20b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Buzzing%20in%20the%20Background%3A%20BumbleBee%2C%20a%20New%20Modular%20Backdoor%20Evolved%20From%20BookWorm&amp;severity=medium&amp;id=682acdbebbaf20d303f0c20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36055-cwe-400-uncontrolled-resource-consumption-in-helm-helm-bf3c98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36055%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20helm%20helm&amp;severity=medium&amp;id=682d9844c4522896dcbf3c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36054-cwe-787-out-of-bounds-write-in-contiki-ng-contiki-ng-bf3c83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36054%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9844c4522896dcbf3c83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36052-cwe-125-out-of-bounds-read-in-contiki-ng-contiki-ng-bf3c7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36052%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9844c4522896dcbf3c7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36053-cwe-125-out-of-bounds-read-in-contiki-ng-contiki-ng-bf3c7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36053%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9844c4522896dcbf3c7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-09-01-f13052</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-09-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f13052</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-no-honor-among-thieves-prynt-stealer-s-backdoor-exposed-f0c220</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BOSINT%5D%20No%20Honor%20Among%20Thieves%20-%20Prynt%20Stealer%E2%80%99s%20Backdoor%20Exposed&amp;severity=high&amp;id=682acdbebbaf20d303f0c220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36051-cwe-436-interpretation-conflict-in-zitadel-zitadel-bf3c77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36051%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20zitadel%20zitadel&amp;severity=medium&amp;id=682d9844c4522896dcbf3c77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36048-cwe-436-interpretation-conflict-in-zulip-zulip-bf3bee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36048%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9844c4522896dcbf3bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36046-cwe-248-uncaught-exception-in-vercel-next-js-bf3be6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36046%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20vercel%20next.js&amp;severity=medium&amp;id=682d9844c4522896dcbf3be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1271-cwe-179-incorrect-behavior-order-ear-f84a5830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1271%3A%20CWE-179%20-%20Incorrect%20Behavior%20Order%3A%20Early%20Validation%2C%20CWE-1173%20Improper%20Use%20of%20Validation%20Framework%20in%20gzip%2C%20xz-utils&amp;severity=high&amp;id=68487f5e1b0bd07c3938fabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36045-cwe-330-use-of-insufficiently-random-values-in-nodebb-nodebb-bf3bdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36045%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20NodeBB%20NodeBB&amp;severity=medium&amp;id=682d9844c4522896dcbf3bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36035-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-fluxcd-flux2-bf3bce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36035%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fluxcd%20flux2&amp;severity=medium&amp;id=682d9844c4522896dcbf3bce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-31-f12033</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f12033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-30-f1316f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-30&amp;severity=medium&amp;id=682acdc2bbaf20d303f1316f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36037-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-getkirby-kirby-bf3bd4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36037%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20getkirby%20kirby&amp;severity=medium&amp;id=682d9844c4522896dcbf3bd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36036-cwe-94-improper-control-of-generation-of-code-code-injection-in-sjwall-mdx-mermaid-bf681b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36036%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sjwall%20mdx-mermaid&amp;severity=medium&amp;id=682d9849c4522896dcbf681b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36034-cwe-400-uncontrolled-resource-consumption-in-cainthebest-nitrado-js-bf3bac</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36034%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20cainthebest%20nitrado.js&amp;severity=medium&amp;id=682d9844c4522896dcbf3bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35962-cwe-184-incomplete-list-of-disallowed-inputs-in-zulip-zulip-mobile-bf3b5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35962%3A%20CWE-184%3A%20Incomplete%20List%20of%20Disallowed%20Inputs%20in%20zulip%20zulip-mobile&amp;severity=medium&amp;id=682d9844c4522896dcbf3b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0934-cwe-416-use-after-free-in-dnsmasq-20dfd881</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0934%3A%20CWE-416%20-%20Use%20After%20Free%20in%20dnsmasq&amp;severity=high&amp;id=68487f581b0bd07c3938a90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36033-cwe-87-improper-neutralization-of-alternate-xss-syntax-in-jhy-jsoup-bf6813</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36033%3A%20CWE-87%3A%20Improper%20Neutralization%20of%20Alternate%20XSS%20Syntax%20in%20jhy%20jsoup&amp;severity=medium&amp;id=682d9849c4522896dcbf6813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1199-cwe-416-use-after-free-cwe-476-null-pointer-dereference-in-kernel-bf3a9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1199%3A%20CWE-416%20-%20Use%20After%20Free%2C%20CWE-476%20-%20NULL%20Pointer%20Dereference.%20in%20Kernel&amp;severity=high&amp;id=682d9844c4522896dcbf3a9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-rat-new-ttps-detection-response-771a15</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20RAT%20New%20TTPS%20%E2%80%93%20Detection%20%26%20Response&amp;severity=high&amp;id=682c7ad0e3e6de8ceb771a15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-29-f120f1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f120f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-rat-new-ttps-detection-response-f0c201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20RAT%20New%20TTPS%20%E2%80%93%20Detection%20%26%20Response&amp;severity=high&amp;id=682acdbebbaf20d303f0c201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-28-f12f1c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-27-f12814</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-26-f125a8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f125a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-25-f1289e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f1289e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32857-a-user-in-a-privileged-network-posi-5f220d13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32857%3A%20A%20user%20in%20a%20privileged%20network%20position%20can%20track%20a%20user%E2%80%99s%20activity%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838a06f182aa0cae2880a6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32838-an-app-may-be-able-to-read-arbitrar-2630daf9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32838%3A%20An%20app%20may%20be%20able%20to%20read%20arbitrary%20files%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838cb41182aa0cae28e884b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32840-an-app-may-be-able-to-execute-arbit-d32bc548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32840%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6838cb41182aa0cae28e884d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32813-an-app-with-root-privileges-may-be--77b61012</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32813%3A%20An%20app%20with%20root%20privileges%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6838a40f182aa0cae2888dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32837-an-app-may-be-able-to-cause-unexpec-475ea027</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32837%3A%20An%20app%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20write%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=6838a40f182aa0cae2888dd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32834-an-app-may-be-able-to-access-sensit-d0407960</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32834%3A%20An%20app%20may%20be%20able%20to%20access%20sensitive%20user%20information%20in%20Apple%20macOS&amp;severity=medium&amp;id=6838a40f182aa0cae2888dd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32811-an-app-may-be-able-to-execute-arbit-91677786</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32811%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6838a78c182aa0cae2890f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32839-a-remote-user-may-cause-an-unexpect-30317b73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32839%3A%20A%20remote%20user%20may%20cause%20an%20unexpected%20app%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=6838a78c182aa0cae2890f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32812-an-app-may-be-able-to-execute-arbit-41cc3854</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32812%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6838a78c182aa0cae2890f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32810-an-app-may-be-able-to-execute-arbit-4a142499</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32810%3A%20An%20app%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6839e3ce182aa0cae2b8aafe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3998-cwe-125-out-of-bounds-read-in-glibc-a810ea3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3998%3A%20CWE-125%20-%20Out-of-bounds%20Read%20in%20glibc&amp;severity=high&amp;id=68487f5e1b0bd07c3938faaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32793-an-app-may-be-able-to-disclose-kern-cf5088df</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32793%3A%20An%20app%20may%20be%20able%20to%20disclose%20kernel%20memory%20in%20Apple%20macOS&amp;severity=high&amp;id=6839e3ce182aa0cae2b8aafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-24-e53d8e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-24&amp;severity=medium&amp;id=682b7b9cd3ddd8cef2e53d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-24-f12d91</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-23-e36a13a8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-23&amp;severity=medium&amp;id=68359c9d5d5f0974d01f4367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-23-f1da7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-23&amp;severity=medium&amp;id=682acdc3bbaf20d303f1da7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-23-f12605</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12605</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-22-f11f83</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-21-f12798</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12798</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-20-f12fd4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36030-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-vinsdragonis-project-nexus-bf3ba4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36030%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20vinsdragonis%20Project-Nexus&amp;severity=medium&amp;id=682d9844c4522896dcbf3ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35692-incorrect-authorization-cwe-863-in-adobe-magento-commerce-bf3b45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35692%3A%20Incorrect%20Authorization%20(CWE-863)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-27792-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-red-hat-red-hat-enterprise-linux-8-bee35f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-27792%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Red%20Hat%20Red%20Hat%20Enterprise%20Linux%208&amp;severity=high&amp;id=682d983bc4522896dcbee35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36031-cwe-755-improper-handling-of-exceptional-conditions-in-directus-directus-bf680b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36031%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20directus%20directus&amp;severity=medium&amp;id=682d9849c4522896dcbf680b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36009-cwe-863-incorrect-authorization-in-matrix-org-gomatrixserverlib-bf3b8f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36009%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20matrix-org%20gomatrixserverlib&amp;severity=medium&amp;id=682d9844c4522896dcbf3b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36008-cwe-190-integer-overflow-or-wraparound-in-paritytech-frontier-bf3b8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36008%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20paritytech%20frontier&amp;severity=medium&amp;id=682d9844c4522896dcbf3b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23460-cwe-121-stack-based-buffer-overflow-in-hjiang-jsonxx-bf3aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23460%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20hjiang%20Jsonxx&amp;severity=medium&amp;id=682d9844c4522896dcbf3aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23459-cwe-416-use-after-free-in-hjiang-jsonxx-bf3aa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23459%3A%20CWE-416%20Use%20After%20Free%20in%20hjiang%20Jsonxx&amp;severity=medium&amp;id=682d9844c4522896dcbf3aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-19-f1282f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f1282f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/brazil-malspam-pushes-astaroth-guildma-malware-f0c1ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Brazil%20malspam%20pushes%20Astaroth%20(Guildma)%20malware&amp;severity=high&amp;id=682acdbebbaf20d303f0c1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-jssloader-the-shellcode-edition-f0c1fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20JSSLoader%3A%20the%20shellcode%20edition&amp;severity=low&amp;id=682acdbebbaf20d303f0c1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33060-escalation-of-privilege-in-intel-r-processors-bdba8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33060%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981ec4522896dcbdba8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28696-escalation-of-privilege-in-intel-r-distribution-for-python-bdc161</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28696%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Distribution%20for%20Python&amp;severity=high&amp;id=682d981ec4522896dcbdc161</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26017-escalation-of-privilege-in-intel-r-dsa-software-for-bdc110</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26017%3A%20escalation%20of%20privilege%20in%20Intel(R)%20DSA%20software%20for&amp;severity=high&amp;id=682d981ec4522896dcbdc110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25841-escalation-of-privilege-in-version-bdc0fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25841%3A%20escalation%20of%20privilege%20in%20version&amp;severity=high&amp;id=682d981ec4522896dcbdc0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25999-escalation-of-privilege-in-version-bdc10c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25999%3A%20escalation%20of%20privilege%20in%20version&amp;severity=high&amp;id=682d981ec4522896dcbdc10c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26074-denial-of-service-in-intel-r-sps-bdc116</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26074%3A%20denial%20of%20service%20in%20Intel(R)%20SPS&amp;severity=medium&amp;id=682d981ec4522896dcbdc116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23403-denial-of-service-in-intel-r-data-center-manager-software-bdbfff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23403%3A%20denial%20of%20service%20in%20Intel(R)%20Data%20Center%20Manager%20software&amp;severity=medium&amp;id=682d981ec4522896dcbdbfff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24378-denial-of-service-in-intel-r-data-center-manager-software-bdc0a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24378%3A%20denial%20of%20service%20in%20Intel(R)%20Data%20Center%20Manager%20software&amp;severity=medium&amp;id=682d981ec4522896dcbdc0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23182-escalation-of-privilege-in-intel-r-data-center-manager-software-bdbfed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23182%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Data%20Center%20Manager%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbfed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27500-information-disclosure-in-intel-r-support-android-application-bdc14c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27500%3A%20information%20disclosure%20in%20Intel(R)%20Support%20Android%20application&amp;severity=medium&amp;id=682d981ec4522896dcbdc14c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21807-escalation-of-privilege-in-intel-r-vtune-tm-profiler-software-bdbf2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21807%3A%20escalation%20of%20privilege%20in%20Intel(R)%20VTune(TM)%20Profiler%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbf2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21812-escalation-of-privilege-in-intel-r-haxm-software-bdbf56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21812%3A%20escalation%20of%20privilege%20in%20Intel(R)%20HAXM%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbf56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21152-information-disclosure-in-intel-r-edge-insights-for-industrial-software-bdbd91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21152%3A%20information%20disclosure%20in%20Intel(R)%20Edge%20Insights%20for%20Industrial%20software&amp;severity=medium&amp;id=682d981ec4522896dcbdbd91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21148-escalation-of-privilege-in-intel-r-edge-insights-for-industrial-software-bdbd7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21148%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Edge%20Insights%20for%20Industrial%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbd7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25966-escalation-of-privilege-in-intel-r-edge-insights-for-industrial-software-bdc108</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25966%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Edge%20Insights%20for%20Industrial%20software&amp;severity=high&amp;id=682d981ec4522896dcbdc108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22730-escalation-of-privilege-in-intel-r-edge-insights-for-industrial-software-bdbf64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22730%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Edge%20Insights%20for%20Industrial%20software&amp;severity=critical&amp;id=682d981ec4522896dcbdbf64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21793-denial-of-service-in-intel-r-ethernet-500-series-controller-drivers-for-vmware-before-version-1-11-4-0-and-in-the-intel-r-ethernet-700-series-controller-drivers-for-vmware-bdbf28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21793%3A%20denial%20of%20service%20in%20Intel(R)%20Ethernet%20500%20Series%20Controller%20drivers%20for%20VMWare%20before%20version%201.11.4.0%20and%20in%20the%20Intel(R)%20Ethernet%20700%20Series%20Controller%20drivers%20for%20VMWare&amp;severity=medium&amp;id=682d981ec4522896dcbdbf28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23179-information-disclosure-in-intel-r-wireless-bluetooth-r-and-killer-tm-bluetooth-r-products-bdba4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23179%3A%20information%20disclosure%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20and%20Killer(TM)%20Bluetooth(R)%20products&amp;severity=high&amp;id=682d981ec4522896dcbdba4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26950-denial-of-service-in-intel-r-wireless-bluetooth-r-and-killer-tm-bluetooth-r-products-bdba7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26950%3A%20denial%20of%20service%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20and%20Killer(TM)%20Bluetooth(R)%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdba7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26257-denial-of-service-in-intel-r-wireless-bluetooth-r-and-killer-tm-bluetooth-r-products-bdba5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26257%3A%20denial%20of%20service%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20and%20Killer(TM)%20Bluetooth(R)%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdba5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33847-escalation-of-privilege-in-intel-r-wireless-bluetooth-r-and-killer-tm-bluetooth-r-products-bdbbb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33847%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20and%20Killer(TM)%20Bluetooth(R)%20products&amp;severity=high&amp;id=682d981ec4522896dcbdbbb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21140-information-disclosure-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdbd74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21140%3A%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbd74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21212-denial-of-service-in-intel-r-proset-wireless-wifi-products-bdbe19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21212%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbe19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23188-information-disclosure-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdba4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23188%3A%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=low&amp;id=682d981ec4522896dcbdba4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21160-denial-of-service-in-intel-r-proset-wireless-wifi-products-bdbdaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21160%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20products&amp;severity=high&amp;id=682d981ec4522896dcbdbdaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21197-denial-of-service-in-intel-r-proset-wireless-wifi-products-bdbdfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21197%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20products&amp;severity=high&amp;id=682d981ec4522896dcbdbdfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21139-escalation-of-privilege-in-intel-r-proset-wireless-wifi-products-bdbd59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21139%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20products&amp;severity=high&amp;id=682d981ec4522896dcbdbd59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21240-information-disclosure-in-intel-r-proset-wireless-wifi-products-bdbe6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21240%3A%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbe6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21172-escalation-of-privilege-in-intel-r-proset-wireless-wifi-products-bdbdba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21172%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbdba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26254-denial-of-service-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdba5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26254%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdba5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44470-information-disclosure-in-intel-r-connect-m-android-application-bdbc29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44470%3A%20information%20disclosure%20in%20Intel(R)%20Connect%20M%20Android%20application&amp;severity=medium&amp;id=682d981ec4522896dcbdbc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28709-denial-of-service-in-intel-r-e810-ethernet-controllers-bdc169</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28709%3A%20denial%20of%20service%20in%20Intel(R)%20E810%20Ethernet%20Controllers&amp;severity=medium&amp;id=682d981ec4522896dcbdc169</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33128-denial-of-service-in-intel-r-e810-ethernet-controllers-bdbb29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33128%3A%20denial%20of%20service%20in%20Intel(R)%20E810%20Ethernet%20Controllers&amp;severity=medium&amp;id=682d981ec4522896dcbdbb29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33126-denial-of-service-in-intel-r-700-and-722-series-ethernet-controllers-and-adapters-bdbb25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33126%3A%20denial%20of%20service%20in%20Intel(R)%20700%20and%20722%20Series%20Ethernet%20Controllers%20and%20Adapters&amp;severity=medium&amp;id=682d981ec4522896dcbdbb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35976-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-weaveworks-vscode-gitops-tools-bf3b7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35976%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20weaveworks%20vscode-gitops-tools&amp;severity=medium&amp;id=682d9844c4522896dcbf3b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35975-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-weaveworks-vscode-gitops-tools-bf3b6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35975%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20weaveworks%20vscode-gitops-tools&amp;severity=medium&amp;id=682d9844c4522896dcbf3b6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36024-cwe-862-missing-authorization-in-pycord-development-pycord-bf3ba0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36024%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Pycord-Development%20pycord&amp;severity=medium&amp;id=682d9844c4522896dcbf3ba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36023-cwe-20-improper-input-validation-in-hyperledger-fabric-bf3b93</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36023%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20hyperledger%20fabric&amp;severity=medium&amp;id=682d9844c4522896dcbf3b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30944-information-disclosure-in-intel-r-amt-and-intel-r-standard-manageability-bdc227</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30944%3A%20information%20disclosure%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=medium&amp;id=682d981fc4522896dcbdc227</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30601-information-disclosure-and-escalation-of-privilege-in-intel-r-amt-and-intel-r-standard-manageability-bdc21a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30601%3A%20information%20disclosure%20and%20escalation%20of%20privilege%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=critical&amp;id=682d981fc4522896dcbdc21a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28697-escalation-of-privilege-in-intel-r-amt-and-intel-r-standard-manageability-bdc165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28697%3A%20escalation%20of%20privilege%20in%20Intel(R)%20AMT%20and%20Intel(R)%20Standard%20Manageability&amp;severity=medium&amp;id=682d981ec4522896dcbdc165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26373-information-disclosure-in-intel-r-processors-bdc13b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26373%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdc13b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21233-information-disclosure-in-intel-r-processors-bdbe62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21233%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbe62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21229-escalation-of-privilege-in-intel-r-nuc-9-extreme-laptop-kit-drivers-bdbe5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21229%3A%20escalation%20of%20privilege%20in%20Intel(R)%20NUC%209%20Extreme%20Laptop%20Kit%20drivers&amp;severity=high&amp;id=682d981ec4522896dcbdbe5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21225-escalation-of-privilege-in-intel-r-data-center-manager-software-bdbe56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21225%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Data%20Center%20Manager%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbe56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21181-escalation-of-privilege-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdbdf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21181%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=high&amp;id=682d981ec4522896dcbdbdf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44545-denial-of-service-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdbc38</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44545%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbc38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37409-escalation-of-privilege-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdbbc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37409%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=high&amp;id=682d981ec4522896dcbdbbc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23223-escalation-of-privilege-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdba52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23223%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=high&amp;id=682d981ec4522896dcbdba52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23168-denial-of-service-in-intel-r-proset-wireless-wifi-and-killer-tm-wifi-products-bdba46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23168%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20and%20Killer(TM)%20WiFi%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdba46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-18-f129eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f129eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-reservations-requested-ta558-targets-hospitality-and-travel-f0c1fb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Reservations%20Requested%3A%20TA558%20Targets%20Hospitality%20and%20Travel&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-17-f12d11</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34259-improper-access-control-cwe-284-in-adobe-magento-commerce-bf3aee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34259%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3aee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34257-cross-site-scripting-stored-xss-cwe-79-in-adobe-magento-commerce-bf3ad1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34257%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3ad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34253-xml-injection-aka-blind-xpath-injection-cwe-91-in-adobe-magento-commerce-bf3ab2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34253%3A%20XML%20Injection%20(aka%20Blind%20XPath%20Injection)%20(CWE-91)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34255-improper-access-control-cwe-284-in-adobe-magento-commerce-bf3ac9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34255%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3ac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34254-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-magento-commerce-bf3aba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34254%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34256-improper-authorization-cwe-285-in-adobe-magento-commerce-bf3acd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34256%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3acd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34258-cross-site-scripting-stored-xss-cwe-79-in-adobe-magento-commerce-bf3ae6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34258%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9844c4522896dcbf3ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-16-f128ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35978-cwe-693-protection-mechanism-failure-in-minetest-minetest-bf3b7f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35978%3A%20CWE-693%3A%20Protection%20Mechanism%20Failure%20in%20minetest%20minetest&amp;severity=medium&amp;id=682d9844c4522896dcbf3b7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36010-cwe-95-improper-neutralization-of-directives-in-dynamically-evaluated-code-eval-injection-in-oxyno-zeta-react-editable-json-tree-bf67f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36010%3A%20CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20(&apos;Eval%20Injection&apos;)%20in%20oxyno-zeta%20react-editable-json-tree&amp;severity=medium&amp;id=682d9849c4522896dcbf67f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-15-f125c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f125c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36007-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-jlangch-venice-bf67e1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36007%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20jlangch%20venice&amp;severity=medium&amp;id=682d9849c4522896dcbf67e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36006-cwe-502-deserialization-of-untrusted-data-in-arvados-arvados-bf3b87</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36006%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20arvados%20arvados&amp;severity=medium&amp;id=682d9844c4522896dcbf3b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35961-cwe-354-improper-validation-of-integrity-check-value-in-openzeppelin-openzeppelin-contracts-bf3b59</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35961%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9844c4522896dcbf3b59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-14-f12b04</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35954-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-actions-toolkit-bf3b51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35954%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20actions%20toolkit&amp;severity=medium&amp;id=682d9844c4522896dcbf3b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35948-cwe-93-improper-neutralization-of-crlf-sequences-crlf-injection-in-nodejs-undici-bf67d1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35948%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20nodejs%20undici&amp;severity=medium&amp;id=682d9849c4522896dcbf67d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-13-f12071</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f12071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35942-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-loopbackio-loopback-connector-postgresql-bf3b4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35942%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20loopbackio%20loopback-connector-postgresql&amp;severity=medium&amp;id=682d9844c4522896dcbf3b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35943-cwe-352-cross-site-request-forgery-csrf-in-codeigniter4-shield-bf67c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35943%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codeigniter4%20shield&amp;severity=medium&amp;id=682d9849c4522896dcbf67c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35956-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-camilova-activerecord-update-by-case-bf3b55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35956%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20camilova%20activerecord-update-by-case&amp;severity=medium&amp;id=682d9844c4522896dcbf3b55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35953-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-bookwyrm-social-bookwyrm-bf67d9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35953%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20bookwyrm-social%20bookwyrm&amp;severity=medium&amp;id=682d9849c4522896dcbf67d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35980-cwe-612-improper-authorization-of-index-containing-sensitive-information-in-opensearch-project-security-bf3b83</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35980%3A%20CWE-612%3A%20Improper%20Authorization%20of%20Index%20Containing%20Sensitive%20Information%20in%20opensearch-project%20security&amp;severity=medium&amp;id=682d9844c4522896dcbf3b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35932-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf3b49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35932%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9844c4522896dcbf3b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2390-cwe-471-modification-of-assumed-immutable-data-maid-in-google-llc-play-services-sdk-bf806c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2390%3A%20CWE-471%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20Google%20LLC%20Play%20Services%20SDK&amp;severity=medium&amp;id=682d984bc4522896dcbf806c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2503-cwe-302-authentication-bypass-by-assumed-immutable-data-in-linux-kernel-linux-kernel-bf8074</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2503%3A%20CWE-302%20Authentication%20Bypass%20by%20Assumed-Immutable%20Data%20in%20Linux%20Kernel%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf8074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35949-cwe-918-server-side-request-forgery-ssrf-in-nodejs-undici-bf67d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35949%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nodejs%20undici&amp;severity=medium&amp;id=682d9849c4522896dcbf67d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-12-f125a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f125a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35676-heap-based-buffer-overflow-cwe-122-in-adobe-framemaker-bf3b3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35676%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9844c4522896dcbf3b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34264-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf3b1e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34264%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9844c4522896dcbf3b1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34260-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf3af6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34260%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9844c4522896dcbf3af6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34263-use-after-free-cwe-416-in-adobe-illustrator-bf3b0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34263%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9844c4522896dcbf3b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34261-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf3afa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34261%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9844c4522896dcbf3afa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34262-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf3b09</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34262%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9844c4522896dcbf3b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35666-improper-input-validation-cwe-20-in-adobe-acrobat-reader-bf3b22</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35666%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3b22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35671-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf3b2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35671%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35668-improper-input-validation-cwe-20-in-adobe-acrobat-reader-bf3b24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35668%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3b24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35678-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf3b41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35678%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35667-out-of-bounds-write-cwe-787-in-adobe-acrobat-reader-bf39ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35667%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf39ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35665-use-after-free-cwe-416-in-adobe-acrobat-reader-bf39a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35665%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf39a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35670-use-after-free-cwe-416-in-adobe-acrobat-reader-bf39c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35670%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf39c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34235-uncontrolled-search-path-element-cwe-427-in-adobe-premiere-elements-bf3995</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34235%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9844c4522896dcbf3995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35673-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf39cf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35673%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9844c4522896dcbf39cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35674-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf39d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35674%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9844c4522896dcbf39d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35677-heap-based-buffer-overflow-cwe-122-in-adobe-framemaker-bf39f2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35677%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9844c4522896dcbf39f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35675-use-after-free-cwe-416-in-adobe-framemaker-bf39df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35675%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9844c4522896dcbf39df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-11-f126e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f126e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36325-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf8103</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36325%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf8103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36324-cwe-770-allocation-of-resources-without-limits-or-throttling-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf80f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36324%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf80f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36323-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-siemens-ruggedcom-rm1224-lte-4g-eu-b36f81</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36323%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=critical&amp;id=682cd8894d7c5ea9f4b36f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-10-f128dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f128dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35697-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf39f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35697%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9844c4522896dcbf39f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35782-elevation-of-privilege-in-microsoft-783e847c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35782%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=medium&amp;id=6838a78c182aa0cae2890f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35781-elevation-of-privilege-in-microsoft-32cab8ed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35781%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=medium&amp;id=6838aece182aa0cae28a0d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35780-elevation-of-privilege-in-microsoft-b204f56a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35780%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=medium&amp;id=6838aece182aa0cae28a0d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35779-remote-code-execution-in-microsoft--c07699bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35779%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Azure%20RTOS%20GUIX%20Studio&amp;severity=high&amp;id=6838aece182aa0cae28a0d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35777-remote-code-execution-in-microsoft--ab15ce9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35777%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=high&amp;id=6838aece182aa0cae28a0d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35776-denial-of-service-in-microsoft-azur-04d0a57b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35776%3A%20Denial%20of%20Service%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=medium&amp;id=6838aece182aa0cae28a0d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35775-elevation-of-privilege-in-microsoft-803ba5fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35775%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=medium&amp;id=6838b200182aa0cae28a8c31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35774-elevation-of-privilege-in-microsoft-355919ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35774%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=medium&amp;id=6838b200182aa0cae28a8c2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35773-remote-code-execution-in-microsoft--840926a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35773%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Azure%20RTOS%20GUIX%20Studio&amp;severity=high&amp;id=6838b200182aa0cae28a8c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35772-remote-code-execution-in-microsoft--6a088d6d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35772%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Azure%20Site%20Recovery%20VMWare%20to%20Azure&amp;severity=high&amp;id=6838b59f182aa0cae28b0d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35771-elevation-of-privilege-in-microsoft-026660a2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35771%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b59f182aa0cae28b0d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35769-denial-of-service-in-microsoft-wind-bd748d5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35769%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b59f182aa0cae28b0cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35768-elevation-of-privilege-in-microsoft-44f50bbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35768%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b59f182aa0cae28b0cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35767-remote-code-execution-in-microsoft--61c2dedc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35767%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b90d182aa0cae28b8c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35766-remote-code-execution-in-microsoft--25fa5feb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35766%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b90d182aa0cae28b8c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35765-elevation-of-privilege-in-microsoft-5238f377</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35765%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b90d182aa0cae28b8c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35764-elevation-of-privilege-in-microsoft-dca09843</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35764%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b90d182aa0cae28b8c72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35763-elevation-of-privilege-in-microsoft-541d4212</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35763%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838b90d182aa0cae28b8c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35762-elevation-of-privilege-in-microsoft-2604cd4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35762%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838c00b182aa0cae28c8a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35761-elevation-of-privilege-in-microsoft-1c4a35ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35761%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838c00b182aa0cae28c8a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34716-spoofing-in-microsoft-microsoft-vis-e468febf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34716%3A%20Spoofing%20in%20Microsoft%20Microsoft%20Visual%20Studio%202017%20version%2015.9%20(includes%2015.0%20-%2015.8)&amp;severity=medium&amp;id=6838c00b182aa0cae28c8a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34715-remote-code-execution-in-microsoft--6f4f9b66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34715%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%20Server%202022&amp;severity=critical&amp;id=6838c384182aa0cae28d08fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34714-remote-code-execution-in-microsoft--f9d2bc6b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34714%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6838c384182aa0cae28d08fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34712-information-disclosure-in-microsoft-2c0e1548</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34712%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%2021H1&amp;severity=medium&amp;id=6838c384182aa0cae28d08f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34710-information-disclosure-in-microsoft-ebadc158</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34710%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=6838c719182aa0cae28d8812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34709-security-feature-bypass-in-microsof-a3df594b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34709%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=6838c719182aa0cae28d8810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34708-information-disclosure-in-microsoft-d2863080</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34708%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=6838cb41182aa0cae28e8849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34707-elevation-of-privilege-in-microsoft-e5dcd532</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34707%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6840c579182aa0cae2c16b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34706-elevation-of-privilege-in-microsoft-dd0f63df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34706%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6840c579182aa0cae2c16b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34705-elevation-of-privilege-in-microsoft-7378967d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34705%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6840c579182aa0cae2c16b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34703-elevation-of-privilege-in-microsoft-12ad1891</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34703%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6840c579182aa0cae2c16b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34702-remote-code-execution-in-microsoft--f290421a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34702%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6840c579182aa0cae2c16b34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34701-denial-of-service-in-microsoft-wind-8d299146</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34701%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6840c579182aa0cae2c16b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34699-elevation-of-privilege-in-microsoft-c4b2b4c6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34699%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6841e8e0182aa0cae2eca053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34696-remote-code-execution-in-microsoft--ccc8a474</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34696%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6841e8e0182aa0cae2eca051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34692-information-disclosure-in-microsoft-394d5a0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34692%3A%20Information%20Disclosure%20in%20Microsoft%20Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2023&amp;severity=medium&amp;id=6841e8e0182aa0cae2eca04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34691-elevation-of-privilege-in-microsoft-8d5852a0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34691%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=6841e8e0182aa0cae2eca04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33646-elevation-of-privilege-in-microsoft-5003f119</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33646%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Azure%20Batch&amp;severity=high&amp;id=6841e8e0182aa0cae2eca04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33640-elevation-of-privilege-in-microsoft-fa7644c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33640%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Open%20Management%20Infrastructure&amp;severity=high&amp;id=6841e8e0182aa0cae2eca049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33631-security-feature-bypass-in-microsof-0163d57f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33631%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20Office%202019&amp;severity=high&amp;id=6841e8e0182aa0cae2eca047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-09-f12020</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12020</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-08-f1289a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f1289a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-07-f12188</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-06-e76b8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-06&amp;severity=medium&amp;id=682b7ba2d3ddd8cef2e76b8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-06-f12cee</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35936-cwe-668-exposure-of-resource-to-wrong-sphere-in-evmos-ethermint-bf67ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35936%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20evmos%20ethermint&amp;severity=medium&amp;id=682d9849c4522896dcbf67ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37434-n-a-in-n-a-bebe51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37434%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9838c4522896dcbebe51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-05-f128ad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35930-cwe-347-improper-verification-of-cryptographic-signature-in-sigstore-policy-controller-bf3a81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35930%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sigstore%20policy-controller&amp;severity=medium&amp;id=682d9844c4522896dcbf3a81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35927-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-contiki-ng-contiki-ng-bf3a5b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35927%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9844c4522896dcbf3a5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35926-cwe-125-out-of-bounds-read-in-contiki-ng-contiki-ng-bf3a55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35926%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9844c4522896dcbf3a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32771-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-contiki-ng-contiki-ng-bf385d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32771%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20contiki-ng%20contiki-ng&amp;severity=medium&amp;id=682d9844c4522896dcbf385d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35929-cwe-347-improper-verification-of-cryptographic-signature-in-sigstore-cosign-bf67b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35929%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20sigstore%20cosign&amp;severity=medium&amp;id=682d9849c4522896dcbf67b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31119-cwe-532-insertion-of-sensitive-information-into-log-file-in-nextcloud-security-advisories-bf3869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31119%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9844c4522896dcbf3869</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31132-cwe-918-server-side-request-forgery-ssrf-in-nextcloud-security-advisories-bf3891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31132%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9844c4522896dcbf3891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31120-cwe-778-insufficient-logging-in-nextcloud-security-advisories-bf386d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31120%3A%20CWE-778%3A%20Insufficient%20Logging%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9844c4522896dcbf386d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31118-cwe-770-allocation-of-resources-without-limits-or-throttling-in-nextcloud-security-advisories-bf3865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31118%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9844c4522896dcbf3865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-04-f12eb9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35928-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-paulej-aescrypt-bf3a61</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35928%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20paulej%20AESCrypt&amp;severity=medium&amp;id=682d9844c4522896dcbf3a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31175-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ckeditor-ckeditor5-bf3919</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31175%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor5&amp;severity=medium&amp;id=682d9844c4522896dcbf3919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31197-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-pgjdbc-pgjdbc-bf67a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31197%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pgjdbc%20pgjdbc&amp;severity=medium&amp;id=682d9849c4522896dcbf67a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-03-f12491</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f12491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-repo-compromise-domain-myjino-ru-f0c1f9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Github%20Repo%20Compromise%20Domain%20MyJino%20RU&amp;severity=high&amp;id=682acdbebbaf20d303f0c1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/github-repo-compromise-domain-myjino-ru-6e27cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Github%20Repo%20Compromise%20Domain%20MyJino%20RU&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e27cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35925-cwe-287-improper-authentication-in-bookwyrm-social-bookwyrm-bf67aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35925%3A%20CWE-287%3A%20Improper%20Authentication%20in%20bookwyrm-social%20bookwyrm&amp;severity=medium&amp;id=682d9849c4522896dcbf67aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35923-cwe-400-uncontrolled-resource-consumption-in-imbrn-v8n-bf6769</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35923%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20imbrn%20v8n&amp;severity=medium&amp;id=682d9849c4522896dcbf6769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35924-cwe-20-improper-input-validation-in-nextauthjs-next-auth-bf3a51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35924%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9844c4522896dcbf3a51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-02-f13014</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f13014</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35921-cwe-269-improper-privilege-management-in-friendsofflarum-byobu-bf3a41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35921%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20FriendsOfFlarum%20byobu&amp;severity=medium&amp;id=682d9844c4522896dcbf3a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35920-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-sanic-org-sanic-bf6761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35920%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20sanic-org%20sanic&amp;severity=medium&amp;id=682d9849c4522896dcbf6761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35922-cwe-400-uncontrolled-resource-consumption-in-websockets-rs-rust-websocket-bf3a49</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35922%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20websockets-rs%20rust-websocket&amp;severity=medium&amp;id=682d9844c4522896dcbf3a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35918-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-streamlit-streamlit-bf3a32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35918%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20streamlit%20streamlit&amp;severity=medium&amp;id=682d9844c4522896dcbf3a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35917-cwe-670-always-incorrect-control-flow-implementation-in-solana-labs-solana-pay-bf3a2a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35917%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20solana-labs%20solana-pay&amp;severity=medium&amp;id=682d9844c4522896dcbf3a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35915-cwe-400-uncontrolled-resource-consumption-in-openzeppelin-openzeppelin-contracts-bf3a11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35915%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9844c4522896dcbf3a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35916-cwe-669-incorrect-resource-transfer-between-spheres-in-openzeppelin-openzeppelin-contracts-bf3a19</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35916%3A%20CWE-669%3A%20Incorrect%20Resource%20Transfer%20Between%20Spheres%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9844c4522896dcbf3a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31198-cwe-682-incorrect-calculation-in-openzeppelin-openzeppelin-contracts-bf3980</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31198%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9844c4522896dcbf3980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31195-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-dspace-dspace-bf397c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31195%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf397c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31192-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dspace-dspace-bf3967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31192%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf3967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31191-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dspace-dspace-bf3961</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31191%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf3961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31194-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-dspace-dspace-bf3978</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31194%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf3978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31193-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-dspace-dspace-bf396b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31193%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf396b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31189-cwe-209-generation-of-error-message-containing-sensitive-information-in-dspace-dspace-bf3959</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31189%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf3959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31190-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-dspace-dspace-bf395d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31190%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20DSpace%20DSpace&amp;severity=medium&amp;id=682d9844c4522896dcbf395d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31183-cwe-295-improper-certificate-validation-in-typelevel-fs2-bf6751</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31183%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20typelevel%20fs2&amp;severity=medium&amp;id=682d9849c4522896dcbf6751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31184-cwe-770-allocation-of-resources-without-limits-or-throttling-in-discourse-discourse-bf3936</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31184%3A%20CWE-770%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9844c4522896dcbf3936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31182-cwe-404-improper-resource-shutdown-or-release-in-discourse-discourse-bf3932</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31182%3A%20CWE-404%3A%20Improper%20Resource%20Shutdown%20or%20Release%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9844c4522896dcbf3932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31181-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-prestashop-prestashop-bf392e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31181%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PrestaShop%20PrestaShop&amp;severity=medium&amp;id=682d9844c4522896dcbf392e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31186-cwe-532-insertion-of-sensitive-information-into-log-file-in-nextauthjs-next-auth-bf3955</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31186%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9844c4522896dcbf3955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31185-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-makedeb-mprweb-bf3951</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31185%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20makedeb%20mprweb&amp;severity=medium&amp;id=682d9844c4522896dcbf3951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31179-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-ericcornelissen-shescape-bf673a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31179%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=682d9849c4522896dcbf673a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31180-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-ericcornelissen-shescape-bf6742</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31180%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=682d9849c4522896dcbf6742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31178-cwe-863-incorrect-authorization-in-elabftw-elabftw-bf3921</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31178%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20elabftw%20elabftw&amp;severity=medium&amp;id=682d9844c4522896dcbf3921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31177-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-dpgaspar-flask-appbuilder-bf391d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31177%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20dpgaspar%20Flask-AppBuilder&amp;severity=medium&amp;id=682d9844c4522896dcbf391d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31173-cwe-400-uncontrolled-resource-consumption-in-graphql-rust-juniper-bf6732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31173%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20graphql-rust%20juniper&amp;severity=medium&amp;id=682d9849c4522896dcbf6732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31155-cwe-863-incorrect-authorization-in-sourcegraph-sourcegraph-bf38b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31155%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9844c4522896dcbf38b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31154-cwe-863-incorrect-authorization-in-sourcegraph-sourcegraph-bf38b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31154%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9844c4522896dcbf38b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31148-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shopware-shopware-bf38b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31148%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9844c4522896dcbf38b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31128-cwe-862-missing-authorization-in-enalean-tuleap-bf387a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31128%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9844c4522896dcbf387a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31109-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-laminas-laminas-diactoros-bf3861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31109%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20laminas%20laminas-diactoros&amp;severity=medium&amp;id=682d9844c4522896dcbf3861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35919-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-minio-minio-bf6759</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35919%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20minio%20minio&amp;severity=medium&amp;id=682d9849c4522896dcbf6759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31188-cwe-918-server-side-request-forgery-ssrf-in-cvat-ai-cvat-bf6755</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31188%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20cvat-ai%20cvat&amp;severity=medium&amp;id=682d9849c4522896dcbf6755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-08-01-f129e3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-08-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f129e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-31-f12fa2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-31&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-30-f12572</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12572</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1799-cwe-501-trust-boundary-violation-in-google-llc-google-play-services-sdk-bf8021</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1799%3A%20CWE-501%20Trust%20Boundary%20Violation%20in%20Google%20LLC%20Google%20Play%20Services%20SDK&amp;severity=medium&amp;id=682d984bc4522896dcbf8021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-29-f13077</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-29&amp;severity=medium&amp;id=682acdc2bbaf20d303f13077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-28-f12114</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12114</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35669-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf39b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35669%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf39b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36912-vulnerability-in-jenkins-project-jenkins-openstack-heat-plugin-bdc30a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36912%3A%20Vulnerability%20in%20Jenkins%20project%20Jenkins%20Openstack%20Heat%20Plugin&amp;severity=medium&amp;id=682d981fc4522896dcbdc30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36879-n-a-in-n-a-bdc302</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36879%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981fc4522896dcbdc302</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36946-n-a-in-n-a-bdc319</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36946%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981fc4522896dcbdc319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-27-f12221</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-26-f11ff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f11ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-25-f11fe6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-24-f12613</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-23-f130f7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31168-cwe-285-improper-authorization-in-zulip-zulip-bf38fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31168%3A%20CWE-285%3A%20Improper%20Authorization%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9844c4522896dcbf38fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2327-cwe-416-use-after-free-in-linux-kernel-linux-kernel-bf804b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2327%3A%20CWE-416%20Use%20After%20Free%20in%20Linux%20Kernel%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf804b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-22-f12f92</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31170-cwe-20-improper-input-validation-in-openzeppelin-openzeppelin-contracts-bf3911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31170%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9844c4522896dcbf3911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31172-cwe-20-improper-input-validation-in-openzeppelin-openzeppelin-contracts-bf3915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31172%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20OpenZeppelin%20openzeppelin-contracts&amp;severity=medium&amp;id=682d9844c4522896dcbf3915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31169-cwe-682-incorrect-calculation-in-bytecodealliance-wasmtime-bf3900</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31169%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9844c4522896dcbf3900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31164-cwe-287-improper-authentication-in-tovyblox-tovy-bf38db</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31164%3A%20CWE-287%3A%20Improper%20Authentication%20in%20tovyblox%20tovy&amp;severity=medium&amp;id=682d9844c4522896dcbf38db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31162-cwe-1258-exposure-of-sensitive-system-information-due-to-uncleared-debug-information-in-abdolence-slack-morphism-rust-bf38d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31162%3A%20CWE-1258%3A%20Exposure%20of%20Sensitive%20System%20Information%20Due%20to%20Uncleared%20Debug%20Information%20in%20abdolence%20slack-morphism-rust&amp;severity=medium&amp;id=682d9844c4522896dcbf38d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-07-21-8c6fdb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-07-21&amp;severity=medium&amp;id=682b6905d14de609c88c6fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-21-f12e3f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31151-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-nodejs-undici-bf6704</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31151%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20nodejs%20undici&amp;severity=medium&amp;id=682d9849c4522896dcbf6704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31146-cwe-416-use-after-free-in-bytecodealliance-wasmtime-bf38a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31146%3A%20CWE-416%3A%20Use%20After%20Free%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9844c4522896dcbf38a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31160-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-jquery-jquery-ui-bf671b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31160%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20jquery%20jquery-ui&amp;severity=medium&amp;id=682d9849c4522896dcbf671b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46828-n-a-in-n-a-bdbc42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46828%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbc42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-20-f13150</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f13150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31150-cwe-93-improper-neutralization-of-crlf-sequences-crlf-injection-in-nodejs-undici-bf6700</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31150%3A%20CWE-93%3A%20Improper%20Neutralization%20of%20CRLF%20Sequences%20(&apos;CRLF%20Injection&apos;)%20in%20nodejs%20undici&amp;severity=medium&amp;id=682d9849c4522896dcbf6700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31144-cwe-122-heap-based-buffer-overflow-in-redis-redis-bf3899</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31144%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20redis%20redis&amp;severity=medium&amp;id=682d9844c4522896dcbf3899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-19-f12d38</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34875-cwe-125-out-of-bounds-read-in-foxit-pdf-reader-bee912</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34875%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Foxit%20PDF%20Reader&amp;severity=low&amp;id=682d983cc4522896dcbee912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2001-cwe-352-cross-site-request-forgery-csrf-in-nofearinc-dx-share-selection-bdc171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2001%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20nofearinc%20DX%20Share%20Selection&amp;severity=high&amp;id=682d981ec4522896dcbdc171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1912-cwe-352-cross-site-request-forgery-csrf-in-smartsoftbuttonwidget-button-widget-smartsoft-bdbcf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1912%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20smartsoftbuttonwidget%20Button%20Widget%20Smartsoft&amp;severity=high&amp;id=682d981ec4522896dcbdbcf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2437-cwe-502-deserialization-of-untrusted-data-in-slickremix-feed-them-social-page-post-video-and-photo-galleries-bdc1c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2437%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20slickremix%20Feed%20Them%20Social%20%E2%80%93%20Page%2C%20Post%2C%20Video%2C%20and%20Photo%20Galleries&amp;severity=critical&amp;id=682d981ec4522896dcbdc1c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2444-cwe-502-deserialization-of-untrusted-data-in-themeisle-visualizer-tables-and-charts-manager-for-wordpress-bdc1ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2444%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20themeisle%20Visualizer%3A%20Tables%20and%20Charts%20Manager%20for%20WordPress&amp;severity=high&amp;id=682d981ec4522896dcbdc1ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2435-cwe-352-cross-site-request-forgery-csrf-in-mbeltwski-anymind-widget-bdc1b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2435%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20mbeltwski%20AnyMind%20Widget&amp;severity=high&amp;id=682d981ec4522896dcbdc1b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2223-cwe-352-cross-site-request-forgery-csrf-in-ghozylab-image-slider-bdc19c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2223%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20ghozylab%20Image%20Slider&amp;severity=medium&amp;id=682d981ec4522896dcbdc19c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2108-cwe-862-missing-authorization-in-wbcomdesigns-wbcom-designs-buddypress-group-reviews-bdc198</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2108%3A%20CWE-862%20Missing%20Authorization%20in%20wbcomdesigns%20Wbcom%20Designs%20%E2%80%93%20BuddyPress%20Group%20Reviews&amp;severity=medium&amp;id=682d981ec4522896dcbdc198</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-18-f12367</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-17-f12a10</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-16-f12c95</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31153-cwe-664-improper-control-of-a-resource-through-its-lifetime-in-openzeppelin-cairo-contracts-bf6713</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31153%3A%20CWE-664%3A%20Improper%20Control%20of%20a%20Resource%20Through%20its%20Lifetime%20in%20OpenZeppelin%20cairo-contracts&amp;severity=medium&amp;id=682d9849c4522896dcbf6713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31159-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-aws-aws-sdk-java-bf6717</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31159%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20aws%20aws-sdk-java&amp;severity=medium&amp;id=682d9849c4522896dcbf6717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31157-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-packbackbooks-lti-1-3-php-library-bf38c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31157%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20packbackbooks%20lti-1-3-php-library&amp;severity=medium&amp;id=682d9844c4522896dcbf38c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31158-cwe-294-authentication-bypass-by-capture-replay-in-packbackbooks-lti-1-3-php-library-bf38c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31158%3A%20CWE-294%3A%20Authentication%20Bypass%20by%20Capture-replay%20in%20packbackbooks%20lti-1-3-php-library&amp;severity=medium&amp;id=682d9844c4522896dcbf38c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34251-out-of-bounds-write-cwe-787-in-adobe-incopy-bf3819</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34251%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9844c4522896dcbf3819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34252-out-of-bounds-read-cwe-125-in-adobe-incopy-bf381d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34252%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9844c4522896dcbf381d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34249-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf3806</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34249%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9844c4522896dcbf3806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34250-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf3815</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34250%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9844c4522896dcbf3815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34247-out-of-bounds-write-cwe-787-in-adobe-indesign-bf37fe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34247%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9844c4522896dcbf37fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34245-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf37e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34245%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9844c4522896dcbf37e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34246-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf37ef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34246%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9844c4522896dcbf37ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34248-out-of-bounds-read-cwe-125-in-adobe-indesign-bf3802</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34248%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9844c4522896dcbf3802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23201-cross-site-scripting-reflected-xss-cwe-79-in-adobe-robohelp-bf355a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23201%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20RoboHelp&amp;severity=medium&amp;id=682d9844c4522896dcbf355a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34243-use-after-free-cwe-416-in-adobe-photoshop-bf37c8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34243%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9844c4522896dcbf37c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34244-access-of-uninitialized-pointer-cwe-824-in-adobe-photoshop-bf37e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34244%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9844c4522896dcbf37e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34241-heap-based-buffer-overflow-cwe-122-in-adobe-character-animator-bf37c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34241%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Character%20Animator&amp;severity=medium&amp;id=682d9844c4522896dcbf37c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34242-out-of-bounds-read-cwe-125-in-adobe-character-animator-bf37c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34242%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Character%20Animator&amp;severity=medium&amp;id=682d9844c4522896dcbf37c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34239-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf37bc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34239%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf37bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34228-access-of-uninitialized-pointer-cwe-824-in-adobe-acrobat-reader-bf376b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34228%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf376b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34233-use-after-free-cwe-416-in-adobe-acrobat-reader-bf37a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34233%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf37a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34236-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf37b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34236%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf37b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34237-use-after-free-cwe-416-in-adobe-acrobat-reader-bf37b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34237%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf37b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34230-use-after-free-cwe-416-in-adobe-acrobat-reader-bf378c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34230%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf378c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34232-use-after-free-cwe-416-in-adobe-acrobat-reader-bf3794</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34232%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34234-use-after-free-cwe-416-in-adobe-acrobat-reader-bf37b0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34234%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf37b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34229-use-after-free-cwe-416-in-adobe-acrobat-reader-bf376f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34229%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf376f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34226-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf3767</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34226%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34225-use-after-free-cwe-416-in-adobe-acrobat-reader-bf3763</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34225%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34222-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf375b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34222%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf375b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34223-use-after-free-cwe-416-in-adobe-acrobat-reader-bf375f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34223%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf375f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34217-out-of-bounds-write-cwe-787-in-adobe-acrobat-reader-bf3757</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34217%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34215-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf3753</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34215%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9844c4522896dcbf3753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31107-cwe-863-incorrect-authorization-in-grafana-grafana-bf36bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31107%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9844c4522896dcbf36bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31097-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-grafana-grafana-bf3671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31097%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9844c4522896dcbf3671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31161-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-hap-wi-roxy-wi-bf374d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31161%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20hap-wi%20roxy-wi&amp;severity=medium&amp;id=682d9844c4522896dcbf374d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-15-f124be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f124be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31156-cwe-829-inclusion-of-functionality-from-untrusted-control-sphere-in-gradle-gradle-bf372a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31156%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20gradle%20gradle&amp;severity=medium&amp;id=682d9844c4522896dcbf372a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31147-cwe-1333-inefficient-regular-expression-complexity-in-jquery-validation-jquery-validation-bf3726</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31147%3A%20CWE-1333%3A%20Inefficient%20Regular%20Expression%20Complexity%20in%20jquery-validation%20jquery-validation&amp;severity=medium&amp;id=682d9844c4522896dcbf3726</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31142-cwe-208-observable-timing-discrepancy-in-fastify-fastify-bearer-auth-bf371e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31142%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20fastify%20fastify-bearer-auth&amp;severity=medium&amp;id=682d9844c4522896dcbf371e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29593-n-a-in-n-a-bdc16d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29593%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32223-uncontrolled-search-path-element-cwe-427-in-nodejs-node-bed4f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32223%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32222-cryptographic-issues-generic-cwe-310-in-nodejs-node-bed4dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32222%3A%20Cryptographic%20Issues%20-%20Generic%20(CWE-310)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32215-http-request-smuggling-cwe-444-in-nodejs-node-bed4d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32215%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32214-http-request-smuggling-cwe-444-in-nodejs-node-bed4cd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32214%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32213-http-request-smuggling-cwe-444-in-nodejs-node-bed4c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32213%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32212-improper-access-control-generic-cwe-284-in-nodejs-node-bed4ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32212%3A%20Improper%20Access%20Control%20-%20Generic%20(CWE-284)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-14-f124d7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f124d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31145-cwe-613-insufficient-session-expiration-in-flyteorg-flyteadmin-bf3722</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31145%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20flyteorg%20flyteadmin&amp;severity=medium&amp;id=682d9844c4522896dcbf3722</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2380-cwe-125-in-kernel-bf356b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2380%3A%20CWE-125%20in%20Kernel&amp;severity=medium&amp;id=682d9844c4522896dcbf356b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-13-f122c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31102-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-argoproj-argo-cd-bf368a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31102%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9844c4522896dcbf368a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31105-cwe-295-improper-certificate-validation-in-argoproj-argo-cd-bf36b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31105%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9844c4522896dcbf36b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31012-cwe-426-untrusted-search-path-in-git-for-windows-git-bf356f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31012%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20git-for-windows%20git&amp;severity=medium&amp;id=682d9844c4522896dcbf356f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31134-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-zulip-zulip-bf370e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31134%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9844c4522896dcbf370e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24800-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-octobercms-october-bf3567</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24800%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=682d9844c4522896dcbf3567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34820-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-simatic-cp-1242-7-v2-bf80e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34820%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SIMATIC%20CP%201242-7%20V2&amp;severity=medium&amp;id=682d984bc4522896dcbf80e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34819-cwe-122-heap-based-buffer-overflow-in-siemens-simatic-cp-1242-7-v2-bf80dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34819%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20Siemens%20SIMATIC%20CP%201242-7%20V2&amp;severity=medium&amp;id=682d984bc4522896dcbf80dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34663-cwe-94-improper-control-of-generation-of-code-code-injection-in-siemens-ruggedcom-i800-bf80d4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34663%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=682d984bc4522896dcbf80d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26649-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-siemens-scalance-x200-4p-irt-bf8047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26649%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20SCALANCE%20X200-4P%20IRT&amp;severity=medium&amp;id=682d984bc4522896dcbf8047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26648-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-siemens-scalance-x200-4p-irt-bf8038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26648%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20SCALANCE%20X200-4P%20IRT&amp;severity=medium&amp;id=682d984bc4522896dcbf8038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26647-cwe-330-use-of-insufficiently-random-values-in-siemens-scalance-x200-4p-irt-bf8032</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26647%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20Siemens%20SCALANCE%20X200-4P%20IRT&amp;severity=medium&amp;id=682d984bc4522896dcbf8032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34821-cwe-94-improper-control-of-generation-of-code-code-injection-in-siemens-ruggedcom-rm1224-lte-4g-eu-bf80ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34821%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Siemens%20RUGGEDCOM%20RM1224%20LTE(4G)%20EU&amp;severity=medium&amp;id=682d984bc4522896dcbf80ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-12-f13050</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f13050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-analysis-of-infrastructure-linked-to-the-hagga-threat-actor-f0c25a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20Analysis%20of%20Infrastructure%20linked%20to%20the%20Hagga%20Threat%20Actor&amp;severity=medium&amp;id=682acdbebbaf20d303f0c25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31080-cwe-400-uncontrolled-resource-consumption-in-kubeedge-kubeedge-bf3629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31080%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9844c4522896dcbf3629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31079-cwe-400-uncontrolled-resource-consumption-in-kubeedge-kubeedge-bf3625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31079%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9844c4522896dcbf3625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31078-cwe-400-uncontrolled-resource-consumption-in-kubeedge-kubeedge-bf3621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31078%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9844c4522896dcbf3621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31075-cwe-400-uncontrolled-resource-consumption-in-kubeedge-kubeedge-bf3619</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31075%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9844c4522896dcbf3619</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31074-cwe-400-uncontrolled-resource-consumption-in-kubeedge-kubeedge-bf3601</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31074%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9844c4522896dcbf3601</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31073-cwe-400-uncontrolled-resource-consumption-in-kubeedge-kubeedge-bf66e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31073%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9849c4522896dcbf66e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31140-cwe-209-generation-of-error-message-containing-sensitive-information-in-cuyz-valinor-bf66fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31140%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20CuyZ%20Valinor&amp;severity=medium&amp;id=682d9849c4522896dcbf66fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31139-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-karlatemp-unsafeaccessor-bf371a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31139%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Karlatemp%20UnsafeAccessor&amp;severity=medium&amp;id=682d9844c4522896dcbf371a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31138-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-mailcow-mailcow-dockerized-bf66eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31138%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20mailcow%20mailcow-dockerized&amp;severity=medium&amp;id=682d9849c4522896dcbf66eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-11-f11fa4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-10-f11f9a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-09-f1277d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f1277d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31137-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-hap-wi-roxy-wi-bf669a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31137%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20hap-wi%20roxy-wi&amp;severity=medium&amp;id=682d9849c4522896dcbf669a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-08-f13135</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-08&amp;severity=medium&amp;id=682acdc2bbaf20d303f13135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cssf-warnings-f0c1ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CSSF%20-%20Warnings&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31029-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-pi-hole-adminlte-bf3577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31029%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20pi-hole%20AdminLTE&amp;severity=medium&amp;id=682d9844c4522896dcbf3577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31121-cwe-20-improper-input-validation-in-hyperledger-fabric-bf36e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31121%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20hyperledger%20fabric&amp;severity=medium&amp;id=682d9844c4522896dcbf36e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31136-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bookwyrm-social-bookwyrm-bf3716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31136%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bookwyrm-social%20bookwyrm&amp;severity=medium&amp;id=682d9844c4522896dcbf3716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31135-cwe-129-improper-validation-of-array-index-in-attorneyonline-akashi-bf3712</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31135%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20AttorneyOnline%20akashi&amp;severity=medium&amp;id=682d9844c4522896dcbf3712</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31133-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-humhub-humhub-bf370a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31133%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20humhub%20humhub&amp;severity=medium&amp;id=682d9844c4522896dcbf370a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32207-business-logic-errors-cwe-840-in-https-github-com-curl-curl-bf374f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32207%3A%20Business%20Logic%20Errors%20(CWE-840)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=critical&amp;id=682d9844c4522896dcbf374f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32208-business-logic-errors-cwe-840-in-https-github-com-curl-curl-bdc261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32208%3A%20Business%20Logic%20Errors%20(CWE-840)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=medium&amp;id=682d981fc4522896dcbdc261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32206-allocation-of-resources-without-limits-or-throttling-cwe-770-in-https-github-com-curl-curl-bdc250</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32206%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20(CWE-770)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=medium&amp;id=682d981fc4522896dcbdc250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32205-allocation-of-resources-without-limits-or-throttling-cwe-770-in-https-github-com-curl-curl-bdc248</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32205%3A%20Allocation%20of%20Resources%20Without%20Limits%20or%20Throttling%20(CWE-770)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=medium&amp;id=682d981fc4522896dcbdc248</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-07-74b338</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-07&amp;severity=medium&amp;id=682c7abbe3e6de8ceb74b338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-07-f12760</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31127-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nextauthjs-next-auth-bf668e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31127%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9849c4522896dcbf668e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31131-cwe-287-improper-authentication-in-nextcloud-security-advisories-bf6696</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31131%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9849c4522896dcbf6696</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31124-cwe-209-generation-of-error-message-containing-sensitive-information-in-scottcwang-openssh-key-parser-bf668a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31124%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20scottcwang%20openssh_key_parser&amp;severity=medium&amp;id=682d9849c4522896dcbf668a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31126-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-hap-wi-roxy-wi-bf3706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31126%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20hap-wi%20roxy-wi&amp;severity=medium&amp;id=682d9844c4522896dcbf3706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31111-cwe-670-always-incorrect-control-flow-implementation-in-paritytech-frontier-bf36ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31111%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20paritytech%20frontier&amp;severity=medium&amp;id=682d9844c4522896dcbf36ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31129-cwe-400-uncontrolled-resource-consumption-in-moment-moment-bf6692</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31129%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20moment%20moment&amp;severity=medium&amp;id=682d9849c4522896dcbf6692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31125-cwe-287-improper-authentication-in-hap-wi-roxy-wi-bf36eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31125%3A%20CWE-287%3A%20Improper%20Authentication%20in%20hap-wi%20roxy-wi&amp;severity=medium&amp;id=682d9844c4522896dcbf36eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-06-e62474</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-06&amp;severity=medium&amp;id=682b7b9ed3ddd8cef2e62474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-06-f12597</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f12597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tlp-white-joint-csa-north-korean-state-sponsored-cyber-actors-use-maui-ransomware-to-target-the-healthcare-and-public-health-sector-f0c1e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BTLP%3AWHITE%5D%20Joint%20CSA%3A%20North%20Korean%20State-Sponsored%20Cyber%20Actors%20Use%20Maui%20Ransomware%20to%20Target%20the%20Healthcare%20and%20Public%20Health%20Sector&amp;severity=high&amp;id=682acdbebbaf20d303f0c1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31116-cwe-670-always-incorrect-control-flow-implementation-in-ultrajson-ultrajson-bf6686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31116%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20ultrajson%20ultrajson&amp;severity=medium&amp;id=682d9849c4522896dcbf6686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31117-cwe-415-double-free-in-ultrajson-ultrajson-bf36e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31117%3A%20CWE-415%3A%20Double%20Free%20in%20ultrajson%20ultrajson&amp;severity=medium&amp;id=682d9844c4522896dcbf36e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31014-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-nextcloud-security-advisories-bf6602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31014%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf6602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-07-05-909808</loc>
    <lastmod>2026-03-15</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-07-05&amp;severity=medium&amp;id=682b6912d14de609c8909808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-05-f1292f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f1292f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-04-f12681</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f12681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-03-f11fd6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31113-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-thinkst-canarytokens-bf36df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31113%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20thinkst%20canarytokens&amp;severity=medium&amp;id=682d9844c4522896dcbf36df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-01-76e125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-01&amp;severity=medium&amp;id=682c7ac3e3e6de8ceb76e125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-07-01-f125b2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-07-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f125b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31115-cwe-502-deserialization-of-untrusted-data-in-opensearch-project-opensearch-ruby-bf6682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31115%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20opensearch-project%20opensearch-ruby&amp;severity=medium&amp;id=682d9849c4522896dcbf6682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31112-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-parse-community-parse-server-bf36db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31112%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9844c4522896dcbf36db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-30-f12cd9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stopransomware-medusalocker-f0c1e6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%23StopRansomware%3A%20MedusaLocker&amp;severity=high&amp;id=682acdbebbaf20d303f0c1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31110-cwe-400-uncontrolled-resource-consumption-in-diygod-rsshub-bf6667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31110%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20DIYgod%20RSSHub&amp;severity=medium&amp;id=682d9849c4522896dcbf6667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31058-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-enalean-tuleap-bf35ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31058%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9844c4522896dcbf35ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31063-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-enalean-tuleap-bf35d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31063%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9844c4522896dcbf35d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31032-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-enalean-tuleap-bf357f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31032%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9844c4522896dcbf357f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-29-e86ba4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-29&amp;severity=medium&amp;id=682b7ba5d3ddd8cef2e86ba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-29-f12566</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31108-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-mermaid-js-mermaid-bf6663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31108%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20mermaid-js%20mermaid&amp;severity=medium&amp;id=682d9849c4522896dcbf6663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31061-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-bf35ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31061%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf35ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31068-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-glpi-project-glpi-bf35e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31068%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf35e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31106-cwe-915-improperly-controlled-modification-of-dynamically-determined-object-attributes-in-clever-underscore-deep-bf665f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31106%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20Clever%20underscore.deep&amp;severity=medium&amp;id=682d9849c4522896dcbf665f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31052-cwe-674-uncontrolled-recursion-in-matrix-org-synapse-bf35ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31052%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20matrix-org%20synapse&amp;severity=medium&amp;id=682d9844c4522896dcbf35ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31056-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-bf35b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31056%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9844c4522896dcbf35b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-28-f1303f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f1303f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31104-cwe-682-incorrect-calculation-in-bytecodealliance-wasmtime-bf36ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31104%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9844c4522896dcbf36ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31103-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-mat-sz-lettersanitizer-bf36a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31103%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20mat-sz%20lettersanitizer&amp;severity=medium&amp;id=682d9844c4522896dcbf36a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31101-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-prestashop-blockwishlist-bf665b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31101%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20PrestaShop%20blockwishlist&amp;severity=medium&amp;id=682d9849c4522896dcbf665b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31099-cwe-674-uncontrolled-recursion-in-rulex-rs-rulex-bf3679</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31099%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20rulex-rs%20rulex&amp;severity=medium&amp;id=682d9844c4522896dcbf3679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31100-cwe-617-reachable-assertion-in-rulex-rs-rulex-bf3686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31100%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20rulex-rs%20rulex&amp;severity=medium&amp;id=682d9844c4522896dcbf3686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31098-cwe-532-insertion-of-sensitive-information-into-log-file-in-weaveworks-weave-gitops-bf3675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31098%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20weaveworks%20weave-gitops&amp;severity=medium&amp;id=682d9844c4522896dcbf3675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31096-cwe-281-improper-preservation-of-permissions-in-discourse-discourse-bf366d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31096%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9844c4522896dcbf366d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31093-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-nextauthjs-next-auth-bf365c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31093%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9844c4522896dcbf365c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31092-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-pimcore-pimcore-bf6655</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31092%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20pimcore%20pimcore&amp;severity=medium&amp;id=682d9849c4522896dcbf6655</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31089-cwe-706-use-of-incorrectly-resolved-name-or-reference-in-parse-community-parse-server-bf3658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31089%3A%20CWE-706%3A%20Use%20of%20Incorrectly-Resolved%20Name%20or%20Reference%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9844c4522896dcbf3658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31094-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-stforscratch-scratchtools-bf3660</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31094%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20STForScratch%20ScratchTools&amp;severity=medium&amp;id=682d9844c4522896dcbf3660</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31085-cwe-311-missing-encryption-of-sensitive-data-in-ldapaccountmanager-lam-bf3631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31085%3A%20CWE-311%3A%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=682d9844c4522896dcbf3631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31084-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-ldapaccountmanager-lam-bf6653</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31084%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=682d9849c4522896dcbf6653</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31086-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-ldapaccountmanager-lam-bf3635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31086%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=682d9844c4522896dcbf3635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31087-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-ldapaccountmanager-lam-bf3639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31087%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=682d9844c4522896dcbf3639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31088-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-ldapaccountmanager-lam-bf3654</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31088%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=682d9844c4522896dcbf3654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31082-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-inventory-plugin-bf362d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31082%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=medium&amp;id=682d9844c4522896dcbf362d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31077-cwe-476-null-pointer-dereference-in-kubeedge-kubeedge-bf361d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31077%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9844c4522896dcbf361d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31076-cwe-476-null-pointer-dereference-in-kubeedge-kubeedge-bf6642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31076%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20kubeedge%20kubeedge&amp;severity=medium&amp;id=682d9849c4522896dcbf6642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31064-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bigbluebutton-bigbluebutton-bf6631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31064%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bigbluebutton%20bigbluebutton&amp;severity=medium&amp;id=682d9849c4522896dcbf6631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31065-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-bigbluebutton-bigbluebutton-bf35dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31065%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20bigbluebutton%20bigbluebutton&amp;severity=medium&amp;id=682d9844c4522896dcbf35dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31057-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shopware-shopware-bf35c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31057%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9844c4522896dcbf35c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31039-cwe-269-improper-privilege-management-in-bigbluebutton-greenlight-bf35a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31039%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20bigbluebutton%20greenlight&amp;severity=medium&amp;id=682d9844c4522896dcbf35a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31036-cwe-20-improper-input-validation-in-argoproj-argo-cd-bf35a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31036%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9844c4522896dcbf35a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31035-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-argoproj-argo-cd-bf33fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31035%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9844c4522896dcbf33fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31034-cwe-330-use-of-insufficiently-random-values-in-argoproj-argo-cd-bf33f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31034%3A%20CWE-330%3A%20Use%20of%20Insufficiently%20Random%20Values%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9844c4522896dcbf33f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31081-cwe-444-inconsistent-interpretation-of-http-requests-http-request-smuggling-in-libwww-perl-http-daemon-bf664f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31081%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20libwww-perl%20HTTP-Daemon&amp;severity=medium&amp;id=682d9849c4522896dcbf664f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31091-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-guzzle-guzzle-bf34bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31091%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20guzzle%20guzzle&amp;severity=medium&amp;id=682d9844c4522896dcbf34bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31090-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-guzzle-guzzle-bf34b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31090%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20guzzle%20guzzle&amp;severity=medium&amp;id=682d9844c4522896dcbf34b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-27-f1303b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-27&amp;severity=medium&amp;id=682acdc2bbaf20d303f1303b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-26-73ff90</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-26&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb73ff90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-26-f129d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f129d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29931-na-in-na-e7f92c49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29931%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31017-cwe-571-expression-is-always-true-in-zulip-zulip-bf33be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31017%3A%20CWE-571%3A%20Expression%20is%20Always%20True%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9843c4522896dcbf33be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31016-cwe-400-uncontrolled-resource-consumption-in-argoproj-argo-cd-bf33ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31016%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9843c4522896dcbf33ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29168-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wireapp-wire-webapp-bf32c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29168%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682d9843c4522896dcbf32c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24893-cwe-787-out-of-bounds-write-in-espressif-esp-idf-bf322e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24893%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20espressif%20esp-idf&amp;severity=medium&amp;id=682d9843c4522896dcbf322e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-25071-cwe-269-improper-privilege-manageme-51cb8505</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-25071%3A%20CWE-269%20Improper%20Privilege%20Management%20in%20Apple%20iOS&amp;severity=medium&amp;id=6839e3ce182aa0cae2b8aaf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-25-f12aeb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-24-f12c78</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31009-cwe-617-reachable-assertion-in-wireapp-wire-ios-bf33b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31009%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20wireapp%20wire-ios&amp;severity=medium&amp;id=682d9843c4522896dcbf33b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-23-e5d594</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-23&amp;severity=medium&amp;id=682b7b9dd3ddd8cef2e5d594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-23-f12b3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-russia-s-apt28-uses-fear-of-nuclear-war-to-spread-follina-docs-in-ukraine-f0c1e4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Russia&apos;s%20APT28%20uses%20fear%20of%20nuclear%20war%20to%20spread%20Follina%20docs%20in%20Ukraine&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22967-pam-auth-fails-to-reject-locked-accounts-in-saltstack-salt-bdbfcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22967%3A%20PAM%20auth%20fails%20to%20reject%20locked%20accounts.%20in%20SaltStack%20Salt&amp;severity=high&amp;id=682d981ec4522896dcbdbfcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-22-f11fe0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kinsing-dark-iot-botnet-among-threats-targeting-cve-2022-26134-f0c207</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kinsing%20%26%20Dark.IoT%20botnet%20among%20threats%20targeting%20CVE-2022-26134&amp;severity=low&amp;id=682acdbebbaf20d303f0c207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31095-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-chat-bf34bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31095%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse-chat&amp;severity=medium&amp;id=682d9844c4522896dcbf34bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-2068-command-injection-in-openssl-openssl-bdc175</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-2068%3A%20Command%20injection%20in%20OpenSSL%20OpenSSL&amp;severity=critical&amp;id=682d981ec4522896dcbdc175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-21-f12860</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31062-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-glpi-project-glpi-inventory-plugin-bf3483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31062%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20glpi-project%20glpi-inventory-plugin&amp;severity=medium&amp;id=682d9844c4522896dcbf3483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-20-f12e64</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-19-f126da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f126da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33981-n-a-in-n-a-bdc2af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33981%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=682d981fc4522896dcbdc2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-18-f12e6c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31083-cwe-287-improper-authentication-in-parse-community-parse-server-bf34b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31083%3A%20CWE-287%3A%20Improper%20Authentication%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9844c4522896dcbf34b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-17-74227c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-17&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb74227c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-17-f1270b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f1270b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30664-out-of-bounds-write-cwe-787-in-adobe-animate-bf3387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30664%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9843c4522896dcbf3387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30657-use-after-free-cwe-416-in-adobe-incopy-bf3366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30657%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf3366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30656-out-of-bounds-write-cwe-787-in-adobe-incopy-bf3362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30656%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf3362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30655-use-after-free-cwe-416-in-adobe-incopy-bf335e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30655%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf335e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30654-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf3344</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30654%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf3344</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30653-out-of-bounds-write-cwe-787-in-adobe-incopy-bf3340</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30653%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf3340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30652-out-of-bounds-write-cwe-787-in-adobe-incopy-bf333c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30652%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf333c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30651-out-of-bounds-read-cwe-125-in-adobe-incopy-bf3338</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30651%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf3338</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30650-heap-based-buffer-overflow-cwe-122-in-adobe-incopy-bf3334</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30650%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9843c4522896dcbf3334</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30665-out-of-bounds-write-cwe-787-in-adobe-indesign-bf338b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30665%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf338b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30663-out-of-bounds-write-cwe-787-in-adobe-indesign-bf3383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30663%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf3383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30662-out-of-bounds-write-cwe-787-in-adobe-indesign-bf337f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30662%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf337f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30661-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf337b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30661%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf337b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30659-out-of-bounds-write-cwe-787-in-adobe-indesign-bf3377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30659%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf3377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30658-heap-based-buffer-overflow-cwe-122-in-adobe-indesign-bf3373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30658%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf3373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-16-f11f81</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31071-cwe-276-incorrect-default-permissions-in-octokit-octopoller-rb-bf34ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31071%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20octokit%20octopoller.rb&amp;severity=medium&amp;id=682d9844c4522896dcbf34ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31072-cwe-276-incorrect-default-permissions-in-octokit-octokit-rb-bf34af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31072%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20octokit%20octokit.rb&amp;severity=medium&amp;id=682d9844c4522896dcbf34af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30669-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf33b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30669%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf33b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30668-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf33ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30668%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf33ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30667-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf33aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30667%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf33aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30666-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf33a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30666%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf33a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30649-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf3330</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30649%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf3330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30648-use-after-free-cwe-416-in-adobe-illustrator-bf332a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30648%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf332a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30647-use-after-free-cwe-416-in-adobe-illustrator-bf3326</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30647%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9843c4522896dcbf3326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24436-information-disclosure-in-intel-r-processors-bdc0d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24436%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdc0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21180-information-disclosure-in-intel-r-processors-bdbdec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21180%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbdec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21166-information-disclosure-in-intel-r-processors-bdbdb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21166%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbdb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21127-information-disclosure-in-intel-r-processors-bdbd2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21127%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbd2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21125-information-disclosure-in-intel-r-processors-bdbd2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21125%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbd2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21123-information-disclosure-in-intel-r-processors-bdbd19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21123%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43755-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf31fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43755%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9843c4522896dcbf31fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42735-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-photoshop-bf31cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42735%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf31cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28846-out-of-bounds-write-cwe-787-in-adobe-bridge-bf327e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28846%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf327e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28850-out-of-bounds-read-cwe-125-in-adobe-bridge-bf32aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28850%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf32aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28849-use-after-free-cwe-416-in-adobe-bridge-bf329b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28849%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf329b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28848-out-of-bounds-write-cwe-787-in-adobe-bridge-bf3293</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28848%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf3293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28847-out-of-bounds-write-cwe-787-in-adobe-bridge-bf328f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28847%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf328f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28845-out-of-bounds-write-cwe-787-in-adobe-bridge-bf3276</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28845%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf3276</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28844-out-of-bounds-write-cwe-787-in-adobe-bridge-bf326e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28844%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf326e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28843-out-of-bounds-write-cwe-787-in-adobe-bridge-bf3268</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28843%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf3268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28842-use-after-free-cwe-416-in-adobe-bridge-bf3264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28842%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf3264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28841-out-of-bounds-write-cwe-787-in-adobe-bridge-bf3260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28841%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf3260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28840-out-of-bounds-write-cwe-787-in-adobe-bridge-bf323a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28840%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf323a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28839-out-of-bounds-write-cwe-787-in-adobe-bridge-bf3234</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28839%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9843c4522896dcbf3234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31070-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-finastra-finastra-nodejs-libs-bf349e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31070%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Finastra%20finastra-nodejs-libs&amp;severity=medium&amp;id=682d9844c4522896dcbf349e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31044-cwe-256-plaintext-storage-of-a-password-in-rundeck-rundeck-bf3415</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31044%3A%20CWE-256%3A%20Plaintext%20Storage%20of%20a%20Password%20in%20rundeck%20rundeck&amp;severity=medium&amp;id=682d9844c4522896dcbf3415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31069-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-finastra-finastra-nodejs-libs-bf349a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31069%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Finastra%20finastra-nodejs-libs&amp;severity=medium&amp;id=682d9844c4522896dcbf349a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29450-cwe-352-cross-site-request-forgery-csrf-in-oliver-schl-be-admin-management-xtended-wordpress-plugin-bf3322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29450%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Oliver%20Schl%C3%B6be%20Admin%20Management%20Xtended%20(WordPress%20plugin)&amp;severity=medium&amp;id=682d9843c4522896dcbf3322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31219-cwe-59-improper-link-resolution-before-file-access-link-following-in-abb-drive-composer-entry-bf34e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31219%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ABB%20Drive%20Composer%20entry&amp;severity=medium&amp;id=682d9844c4522896dcbf34e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31218-cwe-59-improper-link-resolution-before-file-access-link-following-in-abb-drive-composer-entry-bf34e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31218%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ABB%20Drive%20Composer%20entry&amp;severity=medium&amp;id=682d9844c4522896dcbf34e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31217-cwe-59-improper-link-resolution-before-file-access-link-following-in-abb-drive-composer-entry-bf34d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31217%3A%20CWE-59%20Improper%20Link%20Resolution%20Before%20File%20Access%20(&apos;Link%20Following&apos;)%20in%20ABB%20Drive%20Composer%20entry&amp;severity=medium&amp;id=682d9844c4522896dcbf34d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43756-out-of-bounds-write-cwe-787-in-adobe-media-encoder-bf3201</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43756%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9843c4522896dcbf3201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43754-out-of-bounds-write-cwe-787-in-adobe-prelude-bf31f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43754%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9843c4522896dcbf31f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40776-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-lightroom-classic-bf31c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40776%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Lightroom%20Classic&amp;severity=medium&amp;id=682d9843c4522896dcbf31c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40727-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-indesign-bf31bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40727%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf31bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39820-out-of-bounds-write-cwe-787-in-adobe-indesign-bf31b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39820%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9843c4522896dcbf31b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-15-f11fda</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31066-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-edgexfoundry-edgex-go-bf348b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31066%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20edgexfoundry%20edgex-go&amp;severity=medium&amp;id=682d9844c4522896dcbf348b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31050-cwe-613-insufficient-session-expiration-in-typo3-typo3-bf3454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31050%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31048-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-typo3-typo3-bf344c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31048%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf344c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31049-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-typo3-typo3-bf3450</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31049%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31046-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-typo3-typo3-bf343b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31046%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf343b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29241-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-jupyter-server-jupyter-server-bf32ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29241%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20jupyter-server%20jupyter_server&amp;severity=medium&amp;id=682d9843c4522896dcbf32ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31047-cwe-532-insertion-of-sensitive-information-into-log-file-in-typo3-typo3-bf3448</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31047%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20TYPO3%20typo3&amp;severity=medium&amp;id=682d9844c4522896dcbf3448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31060-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf3468</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31060%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9844c4522896dcbf3468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31059-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-discourse-discourse-calendar-bf3464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31059%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20discourse%20discourse-calendar&amp;severity=medium&amp;id=682d9844c4522896dcbf3464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29238-cwe-425-direct-request-forced-browsing-in-jupyter-notebook-bf32ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29238%3A%20CWE-425%3A%20Direct%20Request%20(&apos;Forced%20Browsing&apos;)%20in%20jupyter%20notebook&amp;severity=medium&amp;id=682d9843c4522896dcbf32ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32262-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-siemens-sinema-remote-connect-server-bf80b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32262%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d984bc4522896dcbf80b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32251-cwe-306-missing-authentication-for-critical-function-in-siemens-sinema-remote-connect-server-bf80a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32251%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d984bc4522896dcbf80a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31465-cwe-732-incorrect-permission-assignment-for-critical-resource-in-siemens-xpedition-designer-vx-2-10-bf8005</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31465%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Siemens%20Xpedition%20Designer%20VX.2.10&amp;severity=medium&amp;id=682d984bc4522896dcbf8005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27221-cwe-203-observable-discrepancy-in-siemens-sinema-remote-connect-server-bf7ff7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27221%3A%20CWE-203%3A%20Observable%20Discrepancy%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d984bc4522896dcbf7ff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-14-f128ef</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29257-cwe-20-improper-input-validation-in-electron-electron-bf331e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29257%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20electron%20electron&amp;severity=medium&amp;id=682d9843c4522896dcbf331e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29247-cwe-668-exposure-of-resource-to-wrong-sphere-in-electron-electron-bf32f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29247%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20electron%20electron&amp;severity=medium&amp;id=682d9843c4522896dcbf32f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31054-cwe-400-uncontrolled-resource-consumption-in-argoproj-argo-events-bf345c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31054%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20argoproj%20argo-events&amp;severity=medium&amp;id=682d9844c4522896dcbf345c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31053-cwe-347-improper-verification-of-cryptographic-signature-in-biscuit-auth-biscuit-bf6629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31053%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20biscuit-auth%20biscuit&amp;severity=medium&amp;id=682d9849c4522896dcbf6629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31055-cwe-284-improper-access-control-in-google-kctf-bf3460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31055%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20google%20kctf&amp;severity=medium&amp;id=682d9844c4522896dcbf3460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29244-cwe-200-information-exposure-in-npm-npm-bf4cf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29244%3A%20CWE-200%20Information%20Exposure%20in%20npm%20npm&amp;severity=high&amp;id=682d9846c4522896dcbf4cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1750-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-numixtech-sticky-popup-bdbcd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20numixtech%20Sticky%20Popup&amp;severity=medium&amp;id=682d981ec4522896dcbdbcd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1969-cwe-352-cross-site-request-forgery-csrf-in-scriptcoil-mobile-browser-color-select-bdbd11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1969%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20scriptcoil%20Mobile%20browser%20color%20select&amp;severity=high&amp;id=682d981ec4522896dcbdbd11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1749-cwe-352-cross-site-request-forgery-csrf-in-createplugin-wpmk-ajax-finder-bdbcd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1749%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20createplugin%20WPMK%20Ajax%20Finder&amp;severity=high&amp;id=682d981ec4522896dcbdbcd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1961-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-duracelltomi-gtm4wp-bdbcf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1961%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duracelltomi%20GTM4WP&amp;severity=medium&amp;id=682d981ec4522896dcbdbcf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1900-cwe-352-cross-site-request-forgery-csrf-in-robmcvey-copify-bdbce5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1900%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20robmcvey%20Copify&amp;severity=high&amp;id=682d981ec4522896dcbdbce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1707-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-duracelltomi-gtm4wp-bdbccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1707%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20duracelltomi%20GTM4WP&amp;severity=medium&amp;id=682d981ec4522896dcbdbccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31041-cwe-20-improper-input-validation-in-open-formulieren-open-forms-bf3409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31041%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=682d9844c4522896dcbf3409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1822-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-dylanjkotze-zephyr-project-manager-bdbcdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1822%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20dylanjkotze%20Zephyr%20Project%20Manager&amp;severity=medium&amp;id=682d981ec4522896dcbdbcdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46816-out-of-bounds-write-cwe-787-in-adobe-premiere-bf3205</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46816%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9843c4522896dcbf3205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46817-out-of-bounds-write-cwe-787-in-adobe-media-encoder-bf320d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46817%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9843c4522896dcbf320d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31040-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-open-formulieren-open-forms-bf3405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31040%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20open-formulieren%20open-forms&amp;severity=medium&amp;id=682d9844c4522896dcbf3405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46818-out-of-bounds-write-cwe-787-in-adobe-media-encoder-bf3215</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46818%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9843c4522896dcbf3215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-13-f12ae1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ae1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-12-f1247e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1247e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-11-f126ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f126ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-10-f12dc7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31045-cwe-125-out-of-bounds-read-in-istio-istio-bf3419</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31045%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20istio%20istio&amp;severity=medium&amp;id=682d9844c4522896dcbf3419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31051-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-semantic-release-semantic-release-bf3458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31051%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20semantic-release%20semantic-release&amp;severity=medium&amp;id=682d9844c4522896dcbf3458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31033-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-sparklemotion-mechanize-bf33f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31033%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sparklemotion%20mechanize&amp;severity=medium&amp;id=682d9844c4522896dcbf33f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29250-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-glpi-project-glpi-bf32f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29250%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9843c4522896dcbf32f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29227-cwe-416-use-after-free-in-envoyproxy-envoy-bf32e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29227%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9843c4522896dcbf32e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29226-cwe-306-missing-authentication-for-critical-function-in-envoyproxy-envoy-bf32d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29226%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9843c4522896dcbf32d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29228-cwe-617-reachable-assertion-in-envoyproxy-envoy-bf32e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29228%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9843c4522896dcbf32e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29225-cwe-400-uncontrolled-resource-consumption-in-envoyproxy-envoy-bf65d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29225%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9848c4522896dcbf65d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29224-cwe-476-null-pointer-dereference-in-envoyproxy-envoy-bf32cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29224%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9843c4522896dcbf32cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24876-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf321d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24876%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9843c4522896dcbf321d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31043-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-guzzle-guzzle-bf3411</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31043%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20guzzle%20guzzle&amp;severity=medium&amp;id=682d9844c4522896dcbf3411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31042-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-guzzle-guzzle-bf340d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31042%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20guzzle%20guzzle&amp;severity=medium&amp;id=682d9844c4522896dcbf340d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-09-f12ebd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31038-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gogs-gogs-bf3401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31038%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gogs%20gogs&amp;severity=medium&amp;id=682d9844c4522896dcbf3401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-08-f12d6c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31031-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-pjsip-pjproject-bf33dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31031%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9843c4522896dcbf33dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-07-f12f98</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31027-cwe-639-authorization-bypass-through-user-controlled-key-in-jupyterhub-oauthenticator-bf33cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31027%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20jupyterhub%20oauthenticator&amp;severity=medium&amp;id=682d9843c4522896dcbf33cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31019-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-vapor-vapor-bf660a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31019%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20vapor%20vapor&amp;severity=medium&amp;id=682d9848c4522896dcbf660a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31026-cwe-908-use-of-uninitialized-resource-in-github-trilogy-bf33c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31026%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20github%20trilogy&amp;severity=medium&amp;id=682d9843c4522896dcbf33c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29255-cwe-670-always-incorrect-control-flow-implementation-in-vyperlang-vyper-bf65f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29255%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20vyperlang%20vyper&amp;severity=medium&amp;id=682d9848c4522896dcbf65f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29254-cwe-436-interpretation-conflict-in-silverstripe-silverstripe-omnipay-bf3305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29254%3A%20CWE-436%3A%20Interpretation%20Conflict%20in%20silverstripe%20silverstripe-omnipay&amp;severity=medium&amp;id=682d9843c4522896dcbf3305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24896-cwe-862-missing-authorization-in-enalean-tuleap-bf2d9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24896%3A%20CWE-862%3A%20Missing%20Authorization%20in%20Enalean%20tuleap&amp;severity=medium&amp;id=682d9843c4522896dcbf2d9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24840-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-codingjoe-django-s3file-bf65b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24840%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20codingjoe%20django-s3file&amp;severity=medium&amp;id=682d9848c4522896dcbf65b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-06-f1264d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f1264d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-05-f1229f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f1229f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-04-f12705</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12705</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31028-cwe-400-uncontrolled-resource-consumption-in-minio-minio-bf660e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31028%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20minio%20minio&amp;severity=medium&amp;id=682d9848c4522896dcbf660e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31025-cwe-285-improper-authorization-in-discourse-discourse-bf30e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31025%3A%20CWE-285%3A%20Improper%20Authorization%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9843c4522896dcbf30e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-03-f12acc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12acc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-mar-10382254-r1-v1-xmrig-cryptominer-f0c1ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20-%20MAR-10382254.r1.v1%3A%20XMRIG%20Cryptominer&amp;severity=low&amp;id=682acdbebbaf20d303f0c1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31024-cwe-284-improper-access-control-in-nextcloud-security-advisories-bf30db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31024%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9843c4522896dcbf30db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31023-cwe-209-generation-of-error-message-containing-sensitive-information-in-playframework-playframework-bf30d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31023%3A%20CWE-209%3A%20Generation%20of%20Error%20Message%20Containing%20Sensitive%20Information%20in%20playframework%20playframework&amp;severity=medium&amp;id=682d9843c4522896dcbf30d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31018-cwe-400-uncontrolled-resource-consumption-in-playframework-playframework-bf30be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31018%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20playframework%20playframework&amp;severity=medium&amp;id=682d9843c4522896dcbf30be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-02-f125c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f125c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa22-138b-threat-actors-chaining-vmware-vulnerabilities-for-full-system-control-f0c2b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA22-138B%20Threat%20Actors%20Chaining%20VMware%20Vulnerabilities%20for%20Full%20System%20Control&amp;severity=low&amp;id=682acdbebbaf20d303f0c2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29234-cwe-285-improper-authorization-in-bigbluebutton-bigbluebutton-bf3044</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29234%3A%20CWE-285%3A%20Improper%20Authorization%20in%20bigbluebutton%20bigbluebutton&amp;severity=medium&amp;id=682d9843c4522896dcbf3044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29233-cwe-285-improper-authorization-in-bigbluebutton-bigbluebutton-bf3033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29233%3A%20CWE-285%3A%20Improper%20Authorization%20in%20bigbluebutton%20bigbluebutton&amp;severity=medium&amp;id=682d9843c4522896dcbf3033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29232-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-bigbluebutton-bigbluebutton-bf302b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29232%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20bigbluebutton%20bigbluebutton&amp;severity=medium&amp;id=682d9843c4522896dcbf302b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29169-cwe-20-improper-input-validation-in-bigbluebutton-bigbluebutton-bf2f23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29169%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20bigbluebutton%20bigbluebutton&amp;severity=medium&amp;id=682d9843c4522896dcbf2f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31022-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-blevesearch-bleve-bd8600</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31022%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20blevesearch%20bleve&amp;severity=medium&amp;id=682d9819c4522896dcbd8600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31000-cwe-352-cross-site-request-forgery-csrf-in-solidusio-solidus-bf65f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31000%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20solidusio%20solidus&amp;severity=medium&amp;id=682d9848c4522896dcbf65f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24848-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-dhis2-dhis2-core-bf2d1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24848%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20dhis2%20dhis2-core&amp;severity=medium&amp;id=682d9843c4522896dcbf2d1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-01-740ea6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-01&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb740ea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-06-01-f12f56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-06-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-first-exploitation-of-follina-seen-in-the-wild-f0c1e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20First%20Exploitation%20of%20Follina%20Seen%20in%20the%20Wild&amp;severity=high&amp;id=682acdbebbaf20d303f0c1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sample-linux-miner-xmring-f0c1de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sample%20Linux%20miner%20-%20XMring&amp;severity=high&amp;id=682acdbebbaf20d303f0c1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31015-cwe-248-uncaught-exception-in-pylons-waitress-bf6606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31015%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20Pylons%20waitress&amp;severity=medium&amp;id=682d9848c4522896dcbf6606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31013-cwe-287-improper-authentication-in-ramank775-chat-server-bf30ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31013%3A%20CWE-287%3A%20Improper%20Authentication%20in%20ramank775%20chat-server&amp;severity=medium&amp;id=682d9843c4522896dcbf30ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31005-cwe-190-integer-overflow-or-wraparound-in-vapor-vapor-bf65fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31005%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20vapor%20vapor&amp;severity=medium&amp;id=682d9848c4522896dcbf65fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31011-cwe-287-improper-authentication-in-pingcap-tidb-bf30b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31011%3A%20CWE-287%3A%20Improper%20Authentication%20in%20pingcap%20tidb&amp;severity=medium&amp;id=682d9843c4522896dcbf30b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31007-cwe-842-placement-of-user-into-incorrect-group-in-elabftw-elabftw-bf30b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31007%3A%20CWE-842%3A%20Placement%20of%20User%20into%20Incorrect%20Group%20in%20elabftw%20elabftw&amp;severity=medium&amp;id=682d9843c4522896dcbf30b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29258-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-xwiki-xwiki-platform-bf30b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29258%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9843c4522896dcbf30b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29245-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-sshnet-ssh-net-bf65e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29245%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20sshnet%20SSH.NET&amp;severity=medium&amp;id=682d9848c4522896dcbf65e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29243-cwe-20-improper-input-validation-in-nextcloud-security-advisories-bf3059</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29243%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9843c4522896dcbf3059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29220-cwe-283-unverified-ownership-in-fastify-github-action-merge-dependabot-bf2fdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29220%3A%20CWE-283%3A%20Unverified%20Ownership%20in%20fastify%20github-action-merge-dependabot&amp;severity=medium&amp;id=682d9843c4522896dcbf2fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31003-cwe-122-heap-based-buffer-overflow-in-freeswitch-sofia-sip-bf65fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31003%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20freeswitch%20sofia-sip&amp;severity=medium&amp;id=682d9848c4522896dcbf65fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31002-cwe-125-out-of-bounds-read-in-freeswitch-sofia-sip-bf659b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31002%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20freeswitch%20sofia-sip&amp;severity=medium&amp;id=682d9848c4522896dcbf659b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-31-f12c30</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-space-pirates-analyzing-the-tools-and-connections-of-a-new-hacker-group-f0c1e2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Space%20Pirates%3A%20analyzing%20the%20tools%20and%20connections%20of%20a%20new%20hacker%20group&amp;severity=high&amp;id=682acdbebbaf20d303f0c1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-30-f129c6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f129c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24967-na-in-na-2e108cd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24967%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-29-742d3f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-29&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb742d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-29-f12daa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-28-73e472</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-28&amp;severity=medium&amp;id=682c7ab8e3e6de8ceb73e472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-28-f12e05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-27-74f10a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-27&amp;severity=medium&amp;id=682c7abce3e6de8ceb74f10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-27-f12777</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26776-an-attacker-may-be-able-to-cause-un-98945b97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26776%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20application%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20macOS&amp;severity=critical&amp;id=6839e3ce182aa0cae2b8aafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26775-an-attacker-may-be-able-to-cause-un-5e030890</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26775%3A%20An%20attacker%20may%20be%20able%20to%20cause%20unexpected%20application%20termination%20or%20arbitrary%20code%20execution%20in%20Apple%20Security%20Update%20-%20Catalina&amp;severity=critical&amp;id=6839e73e182aa0cae2b92a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26774-a-local-attacker-may-be-able-to-ele-a45caa7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26774%3A%20A%20local%20attacker%20may%20be%20able%20to%20elevate%20their%20privileges%20in%20Apple%20iTunes%20for%20Windows&amp;severity=high&amp;id=6839e73e182aa0cae2b92a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26773-an-application-may-be-able-to-delet-ec4854b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26773%3A%20An%20application%20may%20be%20able%20to%20delete%20files%20for%20which%20it%20does%20not%20have%20permission%20in%20Apple%20iTunes%20for%20Windows&amp;severity=high&amp;id=6839e73e182aa0cae2b929fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26772-an-application-may-be-able-to-execu-adb27678</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26772%3A%20An%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20macOS&amp;severity=high&amp;id=6839e73e182aa0cae2b929fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26771-a-malicious-application-may-be-able-7e99f367</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26771%3A%20A%20malicious%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20watchOS&amp;severity=high&amp;id=6839e73e182aa0cae2b929fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26770-a-malicious-application-may-be-able-6285c658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26770%3A%20A%20malicious%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20Security%20Update%20-%20Catalina&amp;severity=high&amp;id=6839fc40182aa0cae2bc1f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26769-a-malicious-application-may-be-able-45e71887</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26769%3A%20A%20malicious%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20Security%20Update%20-%20Catalina&amp;severity=high&amp;id=6839fc40182aa0cae2bc1f2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26768-an-application-may-be-able-to-execu-f352028f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26768%3A%20An%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20watchOS&amp;severity=high&amp;id=6839ffe7182aa0cae2bc9d5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26767-a-malicious-application-may-be-able-67349ffc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26767%3A%20A%20malicious%20application%20may%20be%20able%20to%20bypass%20Privacy%20preferences%20in%20Apple%20macOS&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26766-a-malicious-app-may-be-able-to-bypa-33184db4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26766%3A%20A%20malicious%20app%20may%20be%20able%20to%20bypass%20signature%20validation%20in%20Apple%20watchOS&amp;severity=medium&amp;id=6839ffe7182aa0cae2bc9d55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26765-a-malicious-attacker-with-arbitrary-1816b53d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26765%3A%20A%20malicious%20attacker%20with%20arbitrary%20read%20and%20write%20capability%20may%20be%20able%20to%20bypass%20Pointer%20Authentication%20in%20Apple%20watchOS&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26764-an-attacker-that-has-already-achiev-217f9dbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26764%3A%20An%20attacker%20that%20has%20already%20achieved%20kernel%20code%20execution%20may%20be%20able%20to%20bypass%20kernel%20memory%20mitigations%20in%20Apple%20watchOS&amp;severity=medium&amp;id=683a06f1182aa0cae2bd9a40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26763-a-malicious-application-may-be-able-2a32d8b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26763%3A%20A%20malicious%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20system%20privileges%20in%20Apple%20watchOS&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26761-an-application-may-be-able-to-execu-0a4b3ecb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26761%3A%20An%20application%20may%20be%20able%20to%20execute%20arbitrary%20code%20with%20kernel%20privileges%20in%20Apple%20Security%20Update%20-%20Catalina&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-05-26-13d9a0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-05-26&amp;severity=medium&amp;id=682b699f52745a861d13d9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-26-f127dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f127dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-31004-cwe-779-logging-of-excessive-data-in-cveproject-cve-services-bf659f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-31004%3A%20CWE-779%3A%20Logging%20of%20Excessive%20Data%20in%20CVEProject%20cve-services&amp;severity=medium&amp;id=682d9848c4522896dcbf659f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30999-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-friendsofflarum-upload-bf658e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30999%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20FriendsOfFlarum%20upload&amp;severity=medium&amp;id=682d9848c4522896dcbf658e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29256-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-lovell-sharp-bf309f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29256%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20lovell%20sharp&amp;severity=medium&amp;id=682d9843c4522896dcbf309f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29251-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-xwiki-xwiki-platform-bf3080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29251%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9843c4522896dcbf3080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29252-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-xwiki-xwiki-platform-bf3088</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29252%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9843c4522896dcbf3088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29253-cwe-24-path-traversal-filedir-in-xwiki-xwiki-platform-bf3090</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29253%3A%20CWE-24%3A%20Path%20Traversal%3A%20&apos;..%2Ffiledir&apos;%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9843c4522896dcbf3090</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1348-cwe-732-in-logrotate-a8b07cc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1348%3A%20CWE-732%20in%20logrotate&amp;severity=medium&amp;id=68487f5e1b0bd07c3938fae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29248-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-guzzle-guzzle-bf3061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29248%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20guzzle%20guzzle&amp;severity=medium&amp;id=682d9843c4522896dcbf3061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-25-f129e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f129e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29249-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-javaezlib-javaez-bf3076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29249%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20JavaEZLib%20JavaEZ&amp;severity=medium&amp;id=682d9843c4522896dcbf3076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29246-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-azure-rtos-usbx-bf305d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29246%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20azure-rtos%20usbx&amp;severity=medium&amp;id=682d9843c4522896dcbf305d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29242-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-gost-engine-engine-bf3055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29242%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20gost-engine%20engine&amp;severity=medium&amp;id=682d9843c4522896dcbf3055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29237-cwe-287-improper-authentication-in-opencast-opencast-bf3051</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29237%3A%20CWE-287%3A%20Improper%20Authentication%20in%20opencast%20opencast&amp;severity=medium&amp;id=682d9843c4522896dcbf3051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29223-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-azure-rtos-usbx-bf2ff5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29223%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20azure-rtos%20usbx&amp;severity=medium&amp;id=682d9843c4522896dcbf2ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29219-cwe-190-integer-overflow-or-wraparound-in-chainsafe-lodestar-bf2fd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29219%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20ChainSafe%20lodestar&amp;severity=medium&amp;id=682d9843c4522896dcbf2fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29217-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-jpadilla-pyjwt-bf2fc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29217%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20jpadilla%20pyjwt&amp;severity=medium&amp;id=682d9843c4522896dcbf2fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29221-cwe-94-improper-control-of-generation-of-code-code-injection-in-smarty-php-smarty-bf2fe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29221%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20smarty-php%20smarty&amp;severity=medium&amp;id=682d9843c4522896dcbf2fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-24-f12c15</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-23-f12246</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f12246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-22-f12e62</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29215-cwe-88-improper-neutralization-of-argument-delimiters-in-a-command-argument-injection-in-kaidomc-pm-pl-regionprotect-bf2fc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29215%3A%20CWE-88%3A%20Improper%20Neutralization%20of%20Argument%20Delimiters%20in%20a%20Command%20(&apos;Argument%20Injection&apos;)%20in%20kaidomc-pm-pl%20RegionProtect&amp;severity=medium&amp;id=682d9843c4522896dcbf2fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29222-cwe-295-improper-certificate-validation-in-pion-dtls-bf2fed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29222%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20pion%20dtls&amp;severity=medium&amp;id=682d9843c4522896dcbf2fed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-21-f121a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f121a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29189-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-pion-dtls-bf2f7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29189%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pion%20dtls&amp;severity=medium&amp;id=682d9843c4522896dcbf2f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29190-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-pion-dtls-bf2f9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29190%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20pion%20dtls&amp;severity=medium&amp;id=682d9843c4522896dcbf2f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29188-cwe-918-server-side-request-forgery-ssrf-in-stripe-smokescreen-bf2f7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29188%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stripe%20smokescreen&amp;severity=medium&amp;id=682d9843c4522896dcbf2f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29214-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-nextauthjs-next-auth-bf2faf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29214%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9843c4522896dcbf2faf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29216-cwe-94-improper-control-of-generation-of-code-code-injection-in-tensorflow-tensorflow-bf6586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29216%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29213-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6582</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29213%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29210-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-tensorflow-tensorflow-bf2fa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29210%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9843c4522896dcbf2fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29209-cwe-843-access-of-resource-using-incompatible-type-type-confusion-in-tensorflow-tensorflow-bf6552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29209%3A%20CWE-843%3A%20Access%20of%20Resource%20Using%20Incompatible%20Type%20(&apos;Type%20Confusion&apos;)%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29211-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6556</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29211%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29212-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6571</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29212%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29201-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf651f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29201%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf651f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29202-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6527</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29202%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29203-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf652f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29203%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf652f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29204-cwe-191-integer-underflow-wrap-or-wraparound-in-tensorflow-tensorflow-bf653e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29204%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29208-cwe-787-out-of-bounds-write-in-tensorflow-tensorflow-bf654e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29208%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf654e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29205-cwe-908-use-of-uninitialized-resource-in-tensorflow-tensorflow-bf6542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29205%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29206-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6546</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29206%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29207-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf654a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29207%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf654a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29195-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29195%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29197-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29197%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29196-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29196%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29198-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29198%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29199-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29199%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29200-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf6501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29200%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29193-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29193%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29194-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29194%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29191-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29191%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29192-cwe-20-improper-input-validation-in-tensorflow-tensorflow-bf64e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29192%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf64e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29186-cwe-321-use-of-hard-coded-cryptographic-key-in-rundeck-rundeck-bf2f77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29186%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20rundeck%20rundeck&amp;severity=medium&amp;id=682d9843c4522896dcbf2f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29185-cwe-208-observable-timing-discrepancy-in-constantoine-totp-rs-bf2f73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29185%3A%20CWE-208%3A%20Observable%20Timing%20Discrepancy%20in%20constantoine%20totp-rs&amp;severity=medium&amp;id=682d9843c4522896dcbf2f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29184-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-gocd-gocd-bf2f6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29184%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9843c4522896dcbf2f6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29183-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gocd-gocd-bf2f6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29183%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9843c4522896dcbf2f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29182-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-gocd-gocd-bf2f67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29182%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9843c4522896dcbf2f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29179-cwe-269-improper-privilege-management-in-cilium-cilium-bf2f5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29179%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20cilium%20cilium&amp;severity=medium&amp;id=682d9843c4522896dcbf2f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29178-cwe-276-incorrect-default-permissions-in-cilium-cilium-bf2f5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29178%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20cilium%20cilium&amp;severity=medium&amp;id=682d9843c4522896dcbf2f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29177-cwe-400-uncontrolled-resource-consumption-in-ethereum-go-ethereum-bf2f48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29177%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ethereum%20go-ethereum&amp;severity=medium&amp;id=682d9843c4522896dcbf2f48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29170-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-grafana-grafana-bf2f25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29170%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9843c4522896dcbf2f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29163-cwe-671-lack-of-administrator-control-over-security-in-nextcloud-security-advisories-bf2ee3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29163%3A%20CWE-671%3A%20Lack%20of%20Administrator%20Control%20over%20Security%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9843c4522896dcbf2ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29160-cwe-284-improper-access-control-in-nextcloud-security-advisories-bf64b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29160%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf64b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24906-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf64b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24906%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf64b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29159-cwe-639-authorization-bypass-through-user-controlled-key-in-nextcloud-security-advisories-bf64b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29159%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf64b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29165-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-argoproj-argo-cd-bf2ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29165%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9843c4522896dcbf2ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24905-cwe-20-improper-input-validation-in-argoproj-argo-cd-bf2dcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24905%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9843c4522896dcbf2dcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24904-cwe-61-unix-symbolic-link-symlink-following-in-argoproj-argo-cd-bf2db2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24904%3A%20CWE-61%3A%20UNIX%20Symbolic%20Link%20(Symlink)%20Following%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9843c4522896dcbf2db2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-20-82765ce9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-20&amp;severity=medium&amp;id=68359c9c5d5f0974d01ec64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29181-cwe-241-improper-handling-of-unexpected-data-type-in-sparklemotion-nokogiri-bf64bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29181%3A%20CWE-241%3A%20Improper%20Handling%20of%20Unexpected%20Data%20Type%20in%20sparklemotion%20nokogiri&amp;severity=high&amp;id=682d9848c4522896dcbf64bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-20-f1980c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-20&amp;severity=medium&amp;id=682acdc3bbaf20d303f1980c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-20-f1222d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1222d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-19-f12041</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f12041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29229-cwe-325-missing-cryptographic-step-in-cassproject-cass-bf3019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29229%3A%20CWE-325%3A%20Missing%20Cryptographic%20Step%20in%20cassproject%20CASS&amp;severity=medium&amp;id=682d9843c4522896dcbf3019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29230-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shopify-hydrogen-bf3021</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29230%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Shopify%20hydrogen&amp;severity=medium&amp;id=682d9843c4522896dcbf3021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-18-f12555</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f12555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29174-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-countly-countly-server-bf2f37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29174%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20Countly%20countly-server&amp;severity=medium&amp;id=682d9843c4522896dcbf2f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24890-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf64a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24890%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf64a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29581-cwe-911-improper-update-of-reference-count-in-linux-kernel-bf7ffd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29581%3A%20CWE-911%20Improper%20Update%20of%20Reference%20Count%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf7ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1116-cwe-190-integer-overflow-or-wraparound-in-linux-kernel-bf7f83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1116%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf7f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24856-cwe-918-server-side-request-forgery-ssrf-in-flyteorg-flyteconsole-bf2d22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24856%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20flyteorg%20flyteconsole&amp;severity=medium&amp;id=682d9843c4522896dcbf2d22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29162-cwe-276-incorrect-default-permissions-in-opencontainers-runc-bf2edf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29162%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20opencontainers%20runc&amp;severity=medium&amp;id=682d9843c4522896dcbf2edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-17-f11f58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29623-n-a-in-n-a-aeb1a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29623%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682cd0f71484d88663aeb1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-16-f12edc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12edc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-15-f12c40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24831-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-openclinica-openclinica-bf2d1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24831%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20OpenClinica%20OpenClinica&amp;severity=medium&amp;id=682d9843c4522896dcbf2d1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-14-f12cfa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24830-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-openclinica-openclinica-bf649c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24830%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OpenClinica%20OpenClinica&amp;severity=medium&amp;id=682d9848c4522896dcbf649c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28830-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf2ebd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28830%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28829-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2eb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28829%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28828-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2eab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28828%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28827-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2ea3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28827%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28826-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2e9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28826%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2e9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28825-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2e7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28825%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28824-use-after-free-cwe-416-in-adobe-framemaker-bf2e6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28824%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2e6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28823-use-after-free-cwe-416-in-adobe-framemaker-bf2e66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28823%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2e66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28822-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2e62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28822%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2e62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28821-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf2e5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28821%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9843c4522896dcbf2e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-13-f12937</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29218-cwe-269-improper-privilege-management-in-rubygems-rubygems-org-bf6588</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29218%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20rubygems%20rubygems.org&amp;severity=medium&amp;id=682d9848c4522896dcbf6588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28819-out-of-bounds-write-cwe-787-in-adobe-character-animator-bf2e54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28819%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Character%20Animator&amp;severity=medium&amp;id=682d9843c4522896dcbf2e54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0155-information-disclosure-in-intel-r-processors-bdb3c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0155%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0188-escalation-of-privilege-in-intel-r-processors-bdba02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0188%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981ec4522896dcbdba02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0159-escalation-of-privilege-in-intel-r-processors-bdb3e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0159%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb3e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33103-escalation-of-privilege-in-intel-r-processors-bdbace</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33103%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbace</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33124-escalation-of-privilege-in-intel-r-processors-bdbb21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33124%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbb21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0189-escalation-of-privilege-in-intel-r-processors-bdba06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0189%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981ec4522896dcbdba06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33122-escalation-of-privilege-in-intel-r-processors-bdbb10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33122%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981ec4522896dcbdbb10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0190-escalation-of-privilege-in-intel-r-processors-bdba0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0190%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981ec4522896dcbdba0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33123-escalation-of-privilege-in-intel-r-processors-bdbb14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33123%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981ec4522896dcbdbb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0154-escalation-of-privilege-in-intel-r-processors-bdb3c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0154%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0153-escalation-of-privilege-in-intel-r-processors-bdb3af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0153%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21151-information-disclosure-in-intel-r-processors-bdbd8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21151%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbd8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33149-information-disclosure-in-intel-r-processors-bdbb7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33149%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbb7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0005-information-disclosure-in-intel-r-processors-with-sgx-bdbc68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0005%3A%20information%20disclosure%20in%20Intel(R)%20Processors%20with%20SGX&amp;severity=low&amp;id=682d981ec4522896dcbdbc68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33117-information-disclosure-in-intel-r-xeon-r-scalable-processors-bdbb04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33117%3A%20information%20disclosure%20in%20Intel(R)%20Xeon(R)%20Scalable%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbb04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0004-escalation-of-privilege-in-intel-r-processors-in-intel-r-boot-guard-and-intel-r-txt-bdbc4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0004%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors%20in%20Intel(R)%20Boot%20Guard%20and%20Intel(R)%20TXT&amp;severity=medium&amp;id=682d981ec4522896dcbdbc4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33082-information-disclosure-in-intel-r-ssd-and-intel-r-optane-tm-ssd-products-bdbac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33082%3A%20information%20disclosure%20in%20Intel(R)%20SSD%20and%20Intel(R)%20Optane(TM)%20SSD%20Products&amp;severity=medium&amp;id=682d981ec4522896dcbdbac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33075-denial-of-service-in-intel-r-optane-tm-ssd-intel-r-optane-tm-ssd-dc-and-intel-r-ssd-dc-products-bdba9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33075%3A%20denial%20of%20service%20in%20Intel(R)%20Optane(TM)%20SSD%2C%20Intel(R)%20Optane(TM)%20SSD%20DC%20and%20Intel(R)%20SSD%20DC%20Products&amp;severity=medium&amp;id=682d981ec4522896dcbdba9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33074-information-disclosure-in-intel-r-ssd-intel-r-ssd-dc-and-intel-r-optane-tm-ssd-products-bdba96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33074%3A%20information%20disclosure%20in%20Intel(R)%20SSD%2C%20Intel(R)%20SSD%20DC%20and%20Intel(R)%20Optane(TM)%20SSD%20Products&amp;severity=medium&amp;id=682d981ec4522896dcbdba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33080-information-disclosure-or-escalation-of-privilege-in-intel-r-ssd-dc-intel-r-optane-tm-ssd-and-intel-r-optane-tm-ssd-dc-products-bdbabc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33080%3A%20information%20disclosure%20or%20escalation%20of%20privilege%20in%20Intel(R)%20SSD%20DC%2C%20Intel(R)%20Optane(TM)%20SSD%20and%20Intel(R)%20Optane(TM)%20SSD%20DC%20Products&amp;severity=medium&amp;id=682d981ec4522896dcbdbabc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33077-escalation-of-privilege-in-intel-r-ssd-intel-r-optane-tm-ssd-and-intel-r-ssd-dc-products-bdba9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33077%3A%20escalation%20of%20privilege%20in%20Intel(R)%20SSD%2C%20Intel(R)%20Optane(TM)%20SSD%20and%20Intel(R)%20SSD%20DC%20Products&amp;severity=medium&amp;id=682d981ec4522896dcbdba9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33078-denial-of-service-in-intel-r-optane-tm-ssd-and-intel-r-ssd-dc-products-bdbaab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33078%3A%20denial%20of%20service%20in%20Intel(R)%20Optane(TM)%20SSD%20and%20Intel(R)%20SSD%20DC%20Products&amp;severity=medium&amp;id=682d981ec4522896dcbdbaab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0126-escalation-of-privilege-in-intel-r-manageability-commander-bdb390</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0126%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Manageability%20Commander&amp;severity=high&amp;id=682d981dc4522896dcbdb390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21237-escalation-of-privilege-in-intel-r-nucs-bdbe66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21237%3A%20escalation%20of%20privilege%20in%20Intel(R)%20NUCs&amp;severity=medium&amp;id=682d981ec4522896dcbdbe66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24297-escalation-of-privilege-in-intel-r-nucs-bdc0a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24297%3A%20escalation%20of%20privilege%20in%20Intel(R)%20NUCs&amp;severity=medium&amp;id=682d981ec4522896dcbdc0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24382-escalation-of-privilege-in-intel-r-nucs-bdc0b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24382%3A%20escalation%20of%20privilege%20in%20Intel(R)%20NUCs&amp;severity=medium&amp;id=682d981ec4522896dcbdc0b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26258-escalation-of-privilege-in-intel-r-killer-tm-control-center-software-bdba62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26258%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Killer(TM)%20Control%20Center%20software&amp;severity=high&amp;id=682d981ec4522896dcbdba62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22139-escalation-of-privilege-in-intel-r-xtu-software-bdbf5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22139%3A%20escalation%20of%20privilege%20in%20Intel(R)%20XTU%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbf5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21128-escalation-of-privilege-in-intel-r-advisor-software-bdbd32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21128%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Advisor%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbd32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0194-escalation-of-privilege-in-intel-r-in-band-manageability-software-bdba1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0194%3A%20escalation%20of%20privilege%20in%20Intel(R)%20In-Band%20Manageability%20software&amp;severity=high&amp;id=682d981ec4522896dcbdba1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33108-escalation-of-privilege-in-intel-r-in-band-manageability-software-bdbada</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33108%3A%20escalation%20of%20privilege%20in%20Intel(R)%20In-Band%20Manageability%20software&amp;severity=medium&amp;id=682d981ec4522896dcbdbada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0193-escalation-of-privilege-in-intel-r-in-band-manageability-software-bdba14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0193%3A%20escalation%20of%20privilege%20in%20Intel(R)%20In-Band%20Manageability%20software&amp;severity=high&amp;id=682d981ec4522896dcbdba14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33135-denial-of-service-in-intel-r-sgx-bdbb59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33135%3A%20denial%20of%20service%20in%20Intel(R)%20SGX&amp;severity=medium&amp;id=682d981ec4522896dcbdbb59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21136-denial-of-service-in-intel-r-xeon-r-processors-bdbd44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21136%3A%20denial%20of%20service%20in%20Intel(R)%20Xeon(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21131-information-disclosure-in-intel-r-xeon-r-processors-bdbd36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21131%3A%20information%20disclosure%20in%20Intel(R)%20Xeon(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbd36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33130-information-disclosure-in-intel-r-realsense-tm-id-solution-f450-bdbb4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33130%3A%20information%20disclosure%20in%20Intel(R)%20RealSense(TM)%20ID%20Solution%20F450&amp;severity=medium&amp;id=682d981ec4522896dcbdbb4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-12-f12384</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12384</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-la-banque-postale-lookyloo-capture-httpon-0d02ad92</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20La%20Banque%20Postale%20-%20Lookyloo%20Capture%20(http%3A%2F%2Fone.doesntexist.com%2Fp%2Fb2ba4)&amp;severity=low&amp;id=68359c9b5d5f0974d01e99e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-11-f1277f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f1277f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-la-banque-postale-lookyloo-capture-http-one-doesntexist-com-p-b2ba4-f0c1dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20La%20Banque%20Postale%20-%20Lookyloo%20Capture%20(http%3A%2F%2Fone.doesntexist.com%2Fp%2Fb2ba4)&amp;severity=low&amp;id=682acdbebbaf20d303f0c1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-la-banque-postale-lookyloo-capture-http-one-doesntexist-com-p-b2ba4-6e1edd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20La%20Banque%20Postale%20-%20Lookyloo%20Capture%20(http%3A%2F%2Fone.doesntexist.com%2Fp%2Fb2ba4)&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e1edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1567-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-halmat-wp-js-bdbcc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1567%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20halmat%20WP%20JS&amp;severity=medium&amp;id=682d981ec4522896dcbdbcc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1505-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-davidfcarr-rsvpmaker-bdbcb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1505%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20davidfcarr%20RSVPMaker&amp;severity=critical&amp;id=682d981ec4522896dcbdbcb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1442-cwe-862-missing-authorization-in-xpeedstudio-metform-elementor-contact-form-builder-bdbc88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1442%3A%20CWE-862%20Missing%20Authorization%20in%20xpeedstudio%20Metform%20Elementor%20Contact%20Form%20Builder&amp;severity=high&amp;id=682d981ec4522896dcbdbc88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1453-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-davidfcarr-rsvpmaker-bdbc8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1453%3A%20CWE-89%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20davidfcarr%20RSVPMaker&amp;severity=critical&amp;id=682d981ec4522896dcbdbc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24287-cwe-1188-insecure-default-initialization-of-resource-in-siemens-simatic-pcs-7-v8-2-bf7faa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24287%3A%20CWE-1188%3A%20Insecure%20Default%20Initialization%20of%20Resource%20in%20Siemens%20SIMATIC%20PCS%207%20V8.2&amp;severity=medium&amp;id=682d984bc4522896dcbf7faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-10-695946ce</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-10&amp;severity=medium&amp;id=68359c995d5f0974d01dfd79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-10-f14088</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f14088</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-10-f12bd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-10-6e2d2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-10&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e2d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-09-751c94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-09&amp;severity=medium&amp;id=682c7abce3e6de8ceb751c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-09-f12397</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f12397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-08-f11f9c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29180-cwe-918-server-side-request-forgery-ssrf-in-charmbracelet-charm-bf2f63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29180%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20charmbracelet%20charm&amp;severity=medium&amp;id=682d9843c4522896dcbf2f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-07-f12e89</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27784-stack-based-buffer-overflow-cwe-121-in-adobe-after-effects-bf2dd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27784%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9843c4522896dcbf2dd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27783-stack-based-buffer-overflow-cwe-121-in-adobe-after-effects-bf2dd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27783%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9843c4522896dcbf2dd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28279-use-after-free-cwe-416-in-adobe-photoshop-bf2e50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28279%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28278-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2e4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28278%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28277-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2e46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28277%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28276-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2e3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28276%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28275-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2e1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28275%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28274-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf2e14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28274%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28273-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2e05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28273%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28272-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28272%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28271-use-after-free-cwe-416-in-adobe-photoshop-bf2df5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28271%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28270-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2ded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28270%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2ded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24105-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2d0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24105%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2d0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24099-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf2d08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24099%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24098-improper-input-validation-cwe-20-in-adobe-photoshop-bf2cee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24098%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2cee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23205-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf2cea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23205%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9843c4522896dcbf2cea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24823-cwe-668-exposure-of-resource-to-wrong-sphere-in-netty-netty-bf6498</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24823%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20netty%20netty&amp;severity=medium&amp;id=682d9848c4522896dcbf6498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24878-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-fluxcd-flux2-bf2d6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24878%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fluxcd%20flux2&amp;severity=medium&amp;id=682d9843c4522896dcbf2d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24877-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-fluxcd-flux2-bf2d60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24877%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20fluxcd%20flux2&amp;severity=medium&amp;id=682d9843c4522896dcbf2d60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24817-cwe-94-improper-control-of-generation-of-code-code-injection-in-fluxcd-flux2-bf2d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24817%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20fluxcd%20flux2&amp;severity=medium&amp;id=682d9843c4522896dcbf2d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-06-f1214e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f1214e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24884-cwe-347-improper-verification-of-cryptographic-signature-in-freifunk-gluon-ecdsautils-bf2d8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24884%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20freifunk-gluon%20ecdsautils&amp;severity=medium&amp;id=682d9843c4522896dcbf2d8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24899-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-contao-contao-bf2da2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24899%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20contao%20contao&amp;severity=medium&amp;id=682d9843c4522896dcbf2da2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29161-cwe-327-use-of-a-broken-or-risky-cryptographic-algorithm-in-xwiki-xwiki-platform-bf2ec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29161%3A%20CWE-327%3A%20Use%20of%20a%20Broken%20or%20Risky%20Cryptographic%20Algorithm%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9843c4522896dcbf2ec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24902-cwe-400-uncontrolled-resource-consumption-in-paulledemon-tkvideoplayer-bf2daa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24902%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20PaulleDemon%20tkVideoPlayer&amp;severity=low&amp;id=682d9843c4522896dcbf2daa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29171-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-sourcegraph-sourcegraph-bf2f2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29171%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9843c4522896dcbf2f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29164-cwe-269-improper-privilege-management-in-argoproj-argo-workflows-bf2eeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29164%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20argoproj%20argo-workflows&amp;severity=medium&amp;id=682d9843c4522896dcbf2eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29166-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-matrix-org-matrix-appservice-irc-bf2f0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29166%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20matrix-org%20matrix-appservice-irc&amp;severity=medium&amp;id=682d9843c4522896dcbf2f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29167-cwe-400-uncontrolled-resource-consumption-in-mozilla-hawk-bf2f14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29167%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20mozilla%20hawk&amp;severity=medium&amp;id=682d9843c4522896dcbf2f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29172-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-auth0-lock-bf2f2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29172%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20auth0%20lock&amp;severity=medium&amp;id=682d9843c4522896dcbf2f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29173-cwe-354-improper-validation-of-integrity-check-value-in-theupdateframework-go-tuf-bf2f33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29173%3A%20CWE-354%3A%20Improper%20Validation%20of%20Integrity%20Check%20Value%20in%20theupdateframework%20go-tuf&amp;severity=medium&amp;id=682d9843c4522896dcbf2f33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29176-cwe-862-missing-authorization-in-rubygems-rubygems-org-bf2f3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29176%3A%20CWE-862%3A%20Missing%20Authorization%20in%20rubygems%20rubygems.org&amp;severity=medium&amp;id=682d9843c4522896dcbf2f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27878-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-f5-big-ip-bf2de5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27878%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20F5%20BIG-IP&amp;severity=medium&amp;id=682d9843c4522896dcbf2de5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24903-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-rsyslog-rsyslog-bf2dae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24903%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20rsyslog%20rsyslog&amp;severity=medium&amp;id=682d9843c4522896dcbf2dae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-05-f1310a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-05&amp;severity=medium&amp;id=682acdc2bbaf20d303f1310a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24901-cwe-295-improper-certificate-validation-in-parse-community-parse-server-bf2da6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24901%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9843c4522896dcbf2da6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-04-752a0c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-04&amp;severity=medium&amp;id=682c7abde3e6de8ceb752a0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-04-f12cf4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0882-cwe-200-information-exposure-in-google-llc-fuchsia-kernel-bf7f63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0882%3A%20CWE-200%20Information%20Exposure%20in%20Google%20LLC%20Fuchsia%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf7f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22556-cwe-190-integer-overflow-or-wraparound-in-google-llc-fuchsia-kernel-bf7edf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22556%3A%20CWE-190%20Integer%20Overflow%20or%20Wraparound%20in%20Google%20LLC%20Fuchsia%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf7edf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22573-cwe-347-improper-verification-of-cryptographic-signature-in-google-llc-google-oauth-java-client-bf7f2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22573%3A%20CWE-347%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20Google%20LLC%20Google-oauth-java-client&amp;severity=medium&amp;id=682d984bc4522896dcbf7f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1473-denial-of-service-in-openssl-openssl-bdbcae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1473%3A%20Denial%20of%20Service%20in%20OpenSSL%20OpenSSL&amp;severity=high&amp;id=682d981ec4522896dcbdbcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1343-incorrect-signature-verfication-in-openssl-openssl-bdbc84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1343%3A%20Incorrect%20signature%20verfication%20in%20OpenSSL%20OpenSSL&amp;severity=medium&amp;id=682d981ec4522896dcbdbc84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1292-command-injection-in-openssl-openssl-bdbc80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1292%3A%20Command%20injection%20in%20OpenSSL%20OpenSSL&amp;severity=critical&amp;id=682d981ec4522896dcbdbc80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-03-f12d87</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24897-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-xwiki-xwiki-commons-bf64ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24897%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xwiki%20xwiki-commons&amp;severity=medium&amp;id=682d9848c4522896dcbf64ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-02-f12d70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-01-77059c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-01&amp;severity=medium&amp;id=682c7ac4e3e6de8ceb77059c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-05-01-f12b5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-05-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-30-f1254b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f1254b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24900-cwe-73-external-control-of-file-name-or-path-in-onlaj-piano-led-visualizer-bf646d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24900%3A%20CWE-73%3A%20External%20Control%20of%20File%20Name%20or%20Path%20in%20onlaj%20Piano-LED-Visualizer&amp;severity=medium&amp;id=682d9848c4522896dcbf646d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-29-f12adb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12adb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24898-cwe-611-improper-restriction-of-xml-external-entity-reference-in-xwiki-xwiki-commons-bf6469</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24898%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20xwiki%20xwiki-commons&amp;severity=medium&amp;id=682d9848c4522896dcbf6469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24892-cwe-640-weak-password-recovery-mechanism-for-forgotten-password-in-shopware-shopware-bf2d9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24892%3A%20CWE-640%3A%20Weak%20Password%20Recovery%20Mechanism%20for%20Forgotten%20Password%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9843c4522896dcbf2d9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24879-cwe-352-cross-site-request-forgery-csrf-in-shopware-shopware-bf2d73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24879%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9843c4522896dcbf2d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24873-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shopware-shopware-bf2d4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24873%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9843c4522896dcbf2d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-28-f12f54</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24736-cwe-476-null-pointer-dereference-in-redis-redis-bf6442</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24736%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20redis%20redis&amp;severity=medium&amp;id=682d9848c4522896dcbf6442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24735-cwe-94-improper-control-of-generation-of-code-code-injection-in-redis-redis-bf641a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24735%3A%20CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20redis%20redis&amp;severity=medium&amp;id=682d9848c4522896dcbf641a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24889-cwe-345-insufficient-verification-of-data-authenticity-in-nextcloud-security-advisories-bf6454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24889%3A%20CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf6454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24888-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-nextcloud-security-advisories-bf2d96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24888%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9843c4522896dcbf2d96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24887-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-nextcloud-security-advisories-bf644c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24887%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf644c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24886-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf2d92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24886%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9843c4522896dcbf2d92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24885-cwe-287-improper-authentication-in-nextcloud-security-advisories-bf6446</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24885%3A%20CWE-287%3A%20Improper%20Authentication%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf6446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24891-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-esapi-esapi-java-legacy-bf645c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24891%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ESAPI%20esapi-java-legacy&amp;severity=medium&amp;id=682d9848c4522896dcbf645c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-27-f124ac</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f124ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24866-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-assign-bf2d26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24866%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse-assign&amp;severity=medium&amp;id=682d9843c4522896dcbf2d26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24881-cwe-94-improper-control-of-generation-of-code-code-injection-in-ballcat-projects-ballcat-codegen-bf63f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24881%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20ballcat-projects%20ballcat-codegen&amp;severity=medium&amp;id=682d9848c4522896dcbf63f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24882-cwe-287-improper-authentication-in-freerdp-freerdp-bf6401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24882%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FreeRDP%20FreeRDP&amp;severity=medium&amp;id=682d9848c4522896dcbf6401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24883-cwe-287-improper-authentication-in-freerdp-freerdp-bf2d7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24883%3A%20CWE-287%3A%20Improper%20Authentication%20in%20FreeRDP%20FreeRDP&amp;severity=medium&amp;id=682d9843c4522896dcbf2d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-26-f12eff</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24880-cwe-253-incorrect-check-of-function-return-value-in-tethik-flask-session-captcha-bf2d77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24880%3A%20CWE-253%3A%20Incorrect%20Check%20of%20Function%20Return%20Value%20in%20Tethik%20flask-session-captcha&amp;severity=medium&amp;id=682d9843c4522896dcbf2d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1094-cwe-79-cross-site-scripting-xss-in-unknown-amr-users-bdbc74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1094%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Unknown%20amr%20users&amp;severity=medium&amp;id=682d981ec4522896dcbdbc74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25094-cwe-306-missing-authentication-for-critical-function-in-unknown-tatsu-bf7cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25094%3A%20CWE-306%20Missing%20Authentication%20for%20Critical%20Function%20in%20Unknown%20Tatsu&amp;severity=medium&amp;id=682d984bc4522896dcbf7cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23457-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-owasp-esapi-org-owasp-esapi-esapi-bf6243</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23457%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20OWASP%20ESAPI%20org.owasp.esapi%3Aesapi&amp;severity=medium&amp;id=682d9848c4522896dcbf6243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24792-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-pjsip-pjproject-bf2d10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24792%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9843c4522896dcbf2d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-25-f130cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-25&amp;severity=medium&amp;id=682acdc2bbaf20d303f130cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-24-f12e4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-23-f12e49</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-22-f1228c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f1228c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24875-cwe-532-insertion-of-sensitive-information-into-log-file-in-cveproject-cve-services-bf2d5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24875%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20CVEProject%20cve-services&amp;severity=medium&amp;id=682d9843c4522896dcbf2d5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24869-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf2d41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24869%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9843c4522896dcbf2d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24868-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-glpi-project-glpi-bf2d30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24868%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9843c4522896dcbf2d30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24867-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-glpi-project-glpi-bf2d2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24867%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20glpi-project%20glpi&amp;severity=medium&amp;id=682d9843c4522896dcbf2d2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41162-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-combodo-itop-bf2ce6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41162%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682d9843c4522896dcbf2ce6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24870-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-combodo-itop-bf63f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24870%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682d9848c4522896dcbf63f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41161-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-combodo-itop-bf2ce2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41161%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682d9843c4522896dcbf2ce2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-21-f12912</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/prynt-stealer-spotted-in-the-wild-a-new-info-stealer-performing-clipper-and-keylogger-activities-f0c222</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Prynt%20Stealer%20Spotted%20In%20the%20Wild%20-%20A%20New%20Info%20Stealer%20Performing%20Clipper%20And%20Keylogger%20Activities&amp;severity=high&amp;id=682acdbebbaf20d303f0c222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24865-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-humhub-humhub-bf63e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24865%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20humhub%20humhub&amp;severity=medium&amp;id=682d9848c4522896dcbf63e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24872-cwe-732-incorrect-permission-assignment-for-critical-resource-in-shopware-platform-bf2d49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24872%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9843c4522896dcbf2d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24871-cwe-918-server-side-request-forgery-ssrf-in-shopware-platform-bf2d45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24871%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9843c4522896dcbf2d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24864-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-originprotocol-origin-website-bf2cc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24864%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20OriginProtocol%20origin-website&amp;severity=medium&amp;id=682d9843c4522896dcbf2cc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24862-cwe-918-server-side-request-forgery-ssrf-in-vran-dev-databasir-bf63e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24862%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20vran-dev%20databasir&amp;severity=medium&amp;id=682d9848c4522896dcbf63e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24861-cwe-20-improper-input-validation-in-vran-dev-databasir-bf63e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24861%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20vran-dev%20databasir&amp;severity=medium&amp;id=682d9848c4522896dcbf63e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24799-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wireapp-wire-webapp-bf2bd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24799%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682d9843c4522896dcbf2bd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-20-f1233c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1233c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a22-108a-tradertraitor-north-korean-state-sponsored-apt-targets-blockchain-companies-f0c1cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A22-108A%20TraderTraitor%20North%20Korean%20State-Sponsored%20APT%20Targets%20Blockchain%20Companies&amp;severity=low&amp;id=682acdbebbaf20d303f0c1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24826-cwe-426-untrusted-search-path-in-git-lfs-git-lfs-bf2c2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24826%3A%20CWE-426%3A%20Untrusted%20Search%20Path%20in%20git-lfs%20git-lfs&amp;severity=medium&amp;id=682d9843c4522896dcbf2c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24860-cwe-321-use-of-hard-coded-cryptographic-key-in-vran-dev-databasir-bf63d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24860%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20vran-dev%20databasir&amp;severity=medium&amp;id=682d9848c4522896dcbf63d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24858-cwe-290-authentication-bypass-by-spoofing-in-nextauthjs-next-auth-bf2cac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24858%3A%20CWE-290%3A%20Authentication%20Bypass%20by%20Spoofing%20in%20nextauthjs%20next-auth&amp;severity=medium&amp;id=682d9843c4522896dcbf2cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1186-cwe-200-information-exposure-in-bepopiacompliant-be-popia-compliant-bdbc78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1186%3A%20CWE-200%20Information%20Exposure%20in%20bepopiacompliant%20Be%20POPIA%20Compliant&amp;severity=medium&amp;id=682d981ec4522896dcbdbc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1187-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-macbookandrew-wp-youtube-live-bdbc7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1187%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20macbookandrew%20WP%20YouTube%20Live&amp;severity=medium&amp;id=682d981ec4522896dcbdbc7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0992-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-siteground-security-optimizer-the-all-in-one-wordpress-protection-plugin-bdbc70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0992%3A%20CWE-288%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20siteground%20Security%20Optimizer%20%E2%80%93%20The%20All-In-One%20WordPress%20Protection%20Plugin&amp;severity=critical&amp;id=682d981ec4522896dcbdbc70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24825-cwe-918-server-side-request-forgery-ssrf-in-stripe-smokescreen-bf2c13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24825%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20stripe%20smokescreen&amp;severity=medium&amp;id=682d9843c4522896dcbf2c13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/related-iocs-to-https-cert-gov-ua-article-39708-cyberattack-on-state-organizations-of-ukraine-using-the-topic-azovstal-and-the-malicious-program-cobalt-strike-beacon-cert-ua-4490-eb4df4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Related%20IoCs%20to%20https%3A%2F%2Fcert.gov.ua%2Farticle%2F39708%20-%20Cyberattack%20on%20state%20organizations%20of%20Ukraine%20using%20the%20topic%20%22Azovstal%22%20and%20the%20malicious%20program%20Cobalt%20Strike%20Beacon%20(CERT-UA%20%23%204490)&amp;severity=high&amp;id=682b7bacd3ddd8cef2eb4df4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-19-e5869d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-19&amp;severity=medium&amp;id=682b7b9dd3ddd8cef2e5869d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-19-f124b8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f124b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tradertraitor-north-korean-state-sponsored-apt-targets-blockchain-companies-f0c1da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TraderTraitor%3A%20North%20Korean%20State-Sponsored%20APT%20Targets%20Blockchain%20Companies&amp;severity=high&amp;id=682acdbebbaf20d303f0c1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24841-cwe-284-improper-access-control-in-fleetdm-fleet-bf2c6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24841%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=682d9843c4522896dcbf2c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24863-cwe-400-uncontrolled-resource-consumption-in-swaggo-http-swagger-bf2cb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24863%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20swaggo%20http-swagger&amp;severity=medium&amp;id=682d9843c4522896dcbf2cb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35632-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2ab6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35632%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35631-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2ab2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35631%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2ab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35630-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2aae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35630%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2aae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35629-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2aaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35629%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2aaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28634-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2aa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28634%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28633-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2aa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28633%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2aa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28632-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28632%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28631-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28631%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28630-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28630%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28628-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28628%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28626-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28626%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28625-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28625%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28624-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28624%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28623-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28623%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28622-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28622%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28621-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28621%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28620-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28620%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28619-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28619%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28618-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28618%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28616-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28616%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28615-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28615%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28614-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28614%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28613-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28613%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28612-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28612%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28611-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf2a04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28611%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf2a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28610-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28610%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28609-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28609%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28608-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28608%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28607-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28607%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28606-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28606%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28605-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28605%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28604-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28604%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28602-cwe-129-improper-validation-of-array-index-in-cgal-project-libcgal-bf29c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28602%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project%20libcgal&amp;severity=medium&amp;id=682d9842c4522896dcbf29c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29458-na-in-na-bdc8c7e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29458%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5e1b0bd07c3938faf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24859-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-py-pdf-pypdf2-bf63b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24859%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20py-pdf%20PyPDF2&amp;severity=medium&amp;id=682d9848c4522896dcbf63b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-18-f13116</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f13116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-17-f127e4</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f127e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-16-f12e83</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29072-na-in-na-db086bec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29072%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938ff11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24857-cwe-287-improper-authentication-in-xi-django-mfa3-bf2ca8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24857%3A%20CWE-287%3A%20Improper%20Authentication%20in%20xi%20django-mfa3&amp;severity=medium&amp;id=682d9843c4522896dcbf2ca8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24851-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ldapaccountmanager-lam-bf63aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24851%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20LDAPAccountManager%20lam&amp;severity=medium&amp;id=682d9848c4522896dcbf63aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36828-cwe-79-cross-site-scripting-xss-in-florent-maillefaud-wp-maintenance-bf2ac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36828%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Florent%20Maillefaud%20WP%20Maintenance&amp;severity=medium&amp;id=682d9842c4522896dcbf2ac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-15-f121eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f121eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24853-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-metabase-metabase-bf63ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24853%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9848c4522896dcbf63ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24854-cwe-610-externally-controlled-reference-to-a-resource-in-another-sphere-in-metabase-metabase-bf2ca0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24854%3A%20CWE-610%3A%20Externally%20Controlled%20Reference%20to%20a%20Resource%20in%20Another%20Sphere%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9843c4522896dcbf2ca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24855-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-metabase-metabase-bf2ca4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24855%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20metabase%20metabase&amp;severity=medium&amp;id=682d9843c4522896dcbf2ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24849-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-aiko-it-systems-discatsharp-bf2c98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24849%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Aiko-IT-Systems%20DisCatSharp&amp;severity=medium&amp;id=682d9843c4522896dcbf2c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24850-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf2c9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24850%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9843c4522896dcbf2c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24846-cwe-20-improper-input-validation-in-geowebcache-geowebcache-bf2c8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24846%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20GeoWebCache%20geowebcache&amp;severity=medium&amp;id=682d9843c4522896dcbf2c8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24824-cwe-829-inclusion-of-functionality-from-untrusted-control-sphere-in-discourse-discourse-bf2bfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24824%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9843c4522896dcbf2bfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-1304-cwe-125-cwe-787-in-e2fsprogs-bf2ae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-1304%3A%20(CWE-125%7CCWE-787)%20in%20e2fsprogs&amp;severity=high&amp;id=682d9842c4522896dcbf2ae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-14-f12781</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24847-cwe-20-improper-input-validation-in-geoserver-geoserver-bf2c94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24847%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20geoserver%20geoserver&amp;severity=medium&amp;id=682d9843c4522896dcbf2c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24845-cwe-190-integer-overflow-or-wraparound-in-vyperlang-vyper-bf63a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24845%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20vyperlang%20vyper&amp;severity=medium&amp;id=682d9848c4522896dcbf63a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24843-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-flipped-aurora-gin-vue-admin-bf2c8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24843%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20flipped-aurora%20gin-vue-admin&amp;severity=medium&amp;id=682d9843c4522896dcbf2c8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24844-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-flipped-aurora-gin-vue-admin-bf63a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24844%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20flipped-aurora%20gin-vue-admin&amp;severity=medium&amp;id=682d9848c4522896dcbf63a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24828-cwe-20-improper-input-validation-in-composer-composer-bf2c3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24828%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20composer%20composer&amp;severity=medium&amp;id=682d9843c4522896dcbf2c3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24818-cwe-20-improper-input-validation-in-geotools-geotools-bf2bf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24818%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20geotools%20geotools&amp;severity=medium&amp;id=682d9843c4522896dcbf2bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24788-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-vyperlang-vyper-bf2b83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24788%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20vyperlang%20vyper&amp;severity=medium&amp;id=682d9843c4522896dcbf2b83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41119-cwe-400-uncontrolled-resource-consumption-in-wireapp-wire-server-bf6222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41119%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20wireapp%20wire-server&amp;severity=medium&amp;id=682d9848c4522896dcbf6222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-13-f124f2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f124f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24842-cwe-269-improper-privilege-management-in-minio-minio-bf639e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24842%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20minio%20minio&amp;severity=medium&amp;id=682d9848c4522896dcbf639e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24812-cwe-269-improper-privilege-management-in-grafana-grafana-bf2bea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24812%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9843c4522896dcbf2bea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40368-cwe-119-improper-restriction-of-operations-within-the-bounds-of-a-memory-buffer-in-siemens-simatic-s7-400-cpu-412-1-dp-v7-bf7f32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40368%3A%20CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer%20in%20Siemens%20%20SIMATIC%20S7-400%20CPU%20412-1%20DP%20V7&amp;severity=medium&amp;id=682d984bc4522896dcbf7f32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25622-cwe-400-uncontrolled-resource-consumption-in-siemens-simatic-cfu-diq-bf7fcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25622%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20Siemens%20SIMATIC%20CFU%20DIQ&amp;severity=medium&amp;id=682d984bc4522896dcbf7fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-12-f12476</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24839-cwe-400-uncontrolled-resource-consumption-in-sparklemotion-nekohtml-bf2c64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24839%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20sparklemotion%20nekohtml&amp;severity=medium&amp;id=682d9843c4522896dcbf2c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24838-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-nextcloud-security-advisories-bf2c60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24838%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9843c4522896dcbf2c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24833-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-privatebin-privatebin-bf639a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24833%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PrivateBin%20PrivateBin&amp;severity=medium&amp;id=682d9848c4522896dcbf639a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24837-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-hedgedoc-hedgedoc-bf2c51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24837%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20hedgedoc%20hedgedoc&amp;severity=medium&amp;id=682d9843c4522896dcbf2c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24832-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-gocd-gocd-bf2c4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24832%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20gocd%20gocd&amp;severity=medium&amp;id=682d9843c4522896dcbf2c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24827-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-yahoo-elide-bf2c35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24827%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20yahoo%20elide&amp;severity=medium&amp;id=682d9843c4522896dcbf2c35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24829-cwe-306-missing-authentication-for-critical-function-in-garden-io-garden-bf2c45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24829%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20garden-io%20garden&amp;severity=medium&amp;id=682d9843c4522896dcbf2c45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24815-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-jhipster-generator-jhipster-bf6375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24815%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20jhipster%20generator-jhipster&amp;severity=medium&amp;id=682d9848c4522896dcbf6375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24804-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf2be6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24804%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9843c4522896dcbf2be6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-11-70fdf8e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-11&amp;severity=medium&amp;id=68359c9e5d5f0974d01f84bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-11-f204cb</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-11&amp;severity=medium&amp;id=682acdc4bbaf20d303f204cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-11-f1273f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f1273f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-10-f12ea0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-09-f11f62</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24820-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-xwiki-xwiki-platform-bf6392</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24820%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9848c4522896dcbf6392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24819-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-xwiki-xwiki-platform-bf638e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24819%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9848c4522896dcbf638e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24821-cwe-648-incorrect-use-of-privileged-apis-in-xwiki-xwiki-platform-bf6396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24821%3A%20CWE-648%3A%20Incorrect%20Use%20of%20Privileged%20APIs%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9848c4522896dcbf6396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-08-f12c7c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-07-f12304</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12304</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24822-cwe-248-uncaught-exception-in-podium-lib-proxy-bf2bfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24822%3A%20CWE-248%3A%20Uncaught%20Exception%20in%20podium-lib%20proxy&amp;severity=medium&amp;id=682d9843c4522896dcbf2bfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24793-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-pjsip-pjproject-bf2bac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24793%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9843c4522896dcbf2bac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24786-cwe-125-out-of-bounds-read-in-pjsip-pjproject-bf2b5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24786%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9843c4522896dcbf2b5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-06-f124f4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f124f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24811-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-combodo-itop-bf6371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24811%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682d9848c4522896dcbf6371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24780-cwe-94-improper-control-of-generation-of-code-code-injection-in-combodo-itop-bf6349</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24780%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682d9848c4522896dcbf6349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41245-cwe-352-cross-site-request-forgery-csrf-in-combodo-itop-bf6233</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41245%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Combodo%20iTop&amp;severity=medium&amp;id=682d9848c4522896dcbf6233</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24795-cwe-122-heap-based-buffer-overflow-in-brianmario-yajl-ruby-bf6351</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24795%3A%20CWE-122%3A%20Heap-based%20Buffer%20Overflow%20in%20brianmario%20yajl-ruby&amp;severity=medium&amp;id=682d9848c4522896dcbf6351</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-05-f12e85</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36826-cwe-79-cross-site-scripting-xss-in-wedevs-wp-project-manager-wordpress-plugin-bf2ac2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36826%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20weDevs%20WP%20Project%20Manager%20(WordPress%20plugin)&amp;severity=medium&amp;id=682d9842c4522896dcbf2ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24814-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-directus-directus-bf2bf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24814%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20directus%20directus&amp;severity=medium&amp;id=682d9843c4522896dcbf2bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24813-cwe-288-authentication-bypass-using-an-alternate-path-or-channel-in-miraheze-createwiki-bf2bee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24813%3A%20CWE-288%3A%20Authentication%20Bypass%20Using%20an%20Alternate%20Path%20or%20Channel%20in%20miraheze%20CreateWiki&amp;severity=medium&amp;id=682d9843c4522896dcbf2bee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24787-cwe-697-incorrect-comparison-in-vyperlang-vyper-bf2b7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24787%3A%20CWE-697%3A%20Incorrect%20Comparison%20in%20vyperlang%20vyper&amp;severity=medium&amp;id=682d9843c4522896dcbf2b7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24801-cwe-444-inconsistent-interpretation-of-http-requests-http-request-smuggling-in-twisted-twisted-bf2bdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24801%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20twisted%20twisted&amp;severity=medium&amp;id=682d9843c4522896dcbf2bdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24785-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-moment-moment-bf2b57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24785%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20moment%20moment&amp;severity=medium&amp;id=682d9843c4522896dcbf2b57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-04-f128f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f128f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28391-na-in-na-76b0b1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28391%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938ed65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28388-n-a-in-n-a-bdc154</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28388%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc154</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-03-f12400</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f12400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28356-n-a-in-n-a-bdc150</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28356%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-02-f129ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f129ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-01-756613</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-01&amp;severity=medium&amp;id=682c7abde3e6de8ceb756613</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-04-01-f12a5f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-04-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24803-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-jirutka-asciidoctor-include-ext-bf6362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24803%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jirutka%20asciidoctor-include-ext&amp;severity=medium&amp;id=682d9848c4522896dcbf6362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24802-cwe-915-improperly-controlled-modification-of-dynamically-determined-object-attributes-in-rebeccastevens-deepmerge-ts-bf2be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24802%3A%20CWE-915%3A%20Improperly%20Controlled%20Modification%20of%20Dynamically-Determined%20Object%20Attributes%20in%20RebeccaStevens%20deepmerge-ts&amp;severity=medium&amp;id=682d9843c4522896dcbf2be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24798-cwe-212-improper-removal-of-sensitive-information-before-storage-or-transfer-in-irrdnet-irrd-bf2bc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24798%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20irrdnet%20irrd&amp;severity=medium&amp;id=682d9843c4522896dcbf2bc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24791-cwe-416-use-after-free-in-bytecodealliance-wasmtime-bf2b9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24791%3A%20CWE-416%3A%20Use%20After%20Free%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9843c4522896dcbf2b9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24794-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-auth0-express-openid-connect-bf2bb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24794%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20auth0%20express-openid-connect&amp;severity=medium&amp;id=682d9843c4522896dcbf2bb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24796-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-jens-maus-raspberrymatic-bf2bbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24796%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20jens-maus%20RaspberryMatic&amp;severity=medium&amp;id=682d9843c4522896dcbf2bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24797-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-pomerium-pomerium-bf2bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24797%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20pomerium%20pomerium&amp;severity=medium&amp;id=682d9843c4522896dcbf2bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24758-cwe-532-insertion-of-sensitive-information-into-log-file-in-jupyter-notebook-bf2b07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24758%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20jupyter%20notebook&amp;severity=medium&amp;id=682d9842c4522896dcbf2b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-31-f12a65</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24790-cwe-444-inconsistent-interpretation-of-http-requests-http-request-smuggling-in-puma-puma-bf2b93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24790%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20puma%20puma&amp;severity=medium&amp;id=682d9843c4522896dcbf2b93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-30-f13184</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-30&amp;severity=medium&amp;id=682acdc2bbaf20d303f13184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0343-cwe-275-permission-issues-in-google-llc-perfetto-dev-scripts-bf7f4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0343%3A%20CWE-275%20Permission%20Issues%20in%20Google%20LLC%20Perfetto%20Dev%20Scripts&amp;severity=medium&amp;id=682d984bc4522896dcbf7f4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22572-cwe-377-insecure-temporary-file-in-google-llc-data-transfer-project-bf7f19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22572%3A%20CWE-377%20Insecure%20Temporary%20File%20in%20Google%20LLC%20Data-Transfer-Project&amp;severity=medium&amp;id=682d984bc4522896dcbf7f19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22941-salt-master-allows-configured-users-to-target-any-of-the-minions-connected-to-the-syndic-with-their-configured-commands-in-saltstack-salt-bdbfc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22941%3A%20Salt%20Master%20allows%20configured%20users%20to%20target%20any%20of%20the%20minions%20connected%20to%20the%20syndic%20with%20their%20configured%20commands%20in%20SaltStack%20Salt&amp;severity=high&amp;id=682d981ec4522896dcbdbfc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22936-job-publishes-and-file-server-replies-are-susceptible-to-replay-attacks-in-saltstack-salt-bdbfbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22936%3A%20Job%20publishes%20and%20file%20server%20replies%20are%20susceptible%20to%20replay%20attacks.%20in%20SaltStack%20Salt&amp;severity=high&amp;id=682d981ec4522896dcbdbfbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22935-minion-authentication-denial-of-service-in-saltstack-salt-bdbf93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22935%3A%20Minion%20authentication%20denial%20of%20service%20in%20SaltStack%20Salt&amp;severity=low&amp;id=682d981ec4522896dcbdbf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-29-f1216b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f1216b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24789-cwe-918-server-side-request-forgery-ssrf-in-orckestra-c1-cms-foundation-bf2b8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24789%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Orckestra%20C1-CMS-Foundation&amp;severity=medium&amp;id=682d9843c4522896dcbf2b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-28-f122ad</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f122ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-27-f12a29</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-26-f12c1d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24784-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-statamic-cms-bf2b53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24784%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20statamic%20cms&amp;severity=medium&amp;id=682d9843c4522896dcbf2b53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24783-cwe-269-improper-privilege-management-in-denoland-deno-bf2b4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24783%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20denoland%20deno&amp;severity=medium&amp;id=682d9843c4522896dcbf2b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24778-cwe-863-incorrect-authorization-in-containerd-imgcrypt-bf6341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24778%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20containerd%20imgcrypt&amp;severity=medium&amp;id=682d9848c4522896dcbf6341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24777-cwe-617-reachable-assertion-in-grpc-grpc-swift-bf2b43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24777%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20grpc%20grpc-swift&amp;severity=medium&amp;id=682d9843c4522896dcbf2b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-25032-n-a-in-n-a-bda7a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-25032%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda7a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-25-f1268b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f1268b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24782-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf2b4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24782%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9843c4522896dcbf2b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24781-cwe-384-session-fixation-in-math-geon-geon-bf2b47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24781%3A%20CWE-384%3A%20Session%20Fixation%20in%20math-geon%20Geon&amp;severity=medium&amp;id=682d9843c4522896dcbf2b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24776-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-dpgaspar-flask-appbuilder-bf2b36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24776%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20dpgaspar%20Flask-AppBuilder&amp;severity=medium&amp;id=682d9843c4522896dcbf2b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-24-f120b7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f120b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24768-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-argoproj-argo-cd-bf2b13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24768%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9843c4522896dcbf2b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24731-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-argoproj-argo-cd-bf2afd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24731%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9842c4522896dcbf2afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24730-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-argoproj-argo-cd-bf2af0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24730%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20argoproj%20argo-cd&amp;severity=medium&amp;id=682d9842c4522896dcbf2af0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24757-cwe-532-insertion-of-sensitive-information-into-log-file-in-jupyter-server-jupyter-server-bf2b01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24757%3A%20CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File%20in%20jupyter-server%20jupyter_server&amp;severity=medium&amp;id=682d9842c4522896dcbf2b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0750-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-deanoakley-photoswipe-masonry-gallery-bdbc6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0750%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20deanoakley%20Photoswipe%20Masonry%20Gallery&amp;severity=medium&amp;id=682d981ec4522896dcbdbc6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0858-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-mcafee-llc-mcafee-epolicy-orchestrator-epo-bf2ae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0858%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20McAfee%2CLLC%20McAfee%20ePolicy%20Orchestrator%20(ePO)&amp;severity=medium&amp;id=682d9842c4522896dcbf2ae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-23-f1287b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f1287b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24774-cwe-20-improper-input-validation-in-cyclonedx-cyclonedx-bom-repo-server-bf2b2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24774%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20CycloneDX%20cyclonedx-bom-repo-server&amp;severity=medium&amp;id=682d9843c4522896dcbf2b2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21718-cwe-668-exposure-of-resource-to-wrong-sphere-in-electron-electron-bf2aec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21718%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20electron%20electron&amp;severity=medium&amp;id=682d9842c4522896dcbf2aec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24764-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-pjsip-pjproject-bf2b0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24764%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9843c4522896dcbf2b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-22-eb5ff3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-22&amp;severity=medium&amp;id=682b7bacd3ddd8cef2eb5ff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-22-f12c5f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24775-cwe-20-improper-input-validation-in-guzzle-psr7-bf2b32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24775%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20guzzle%20psr7&amp;severity=medium&amp;id=682d9843c4522896dcbf2b32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24766-cwe-444-inconsistent-interpretation-of-http-requests-http-request-smuggling-in-mitmproxy-mitmproxy-bf2b0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24766%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20mitmproxy%20mitmproxy&amp;severity=medium&amp;id=682d9843c4522896dcbf2b0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-21-f12c21</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-20-f11f5e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-19-f1216d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f1216d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23209-cwe-79-cross-site-scripting-xss-in-ahmed-kaludi-mohammed-kaludi-amp-for-wp-accelerated-mobile-pages-wordpress-plugin-bf2abe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23209%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Ahmed%20Kaludi%2C%20Mohammed%20Kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages%20(WordPress%20plugin)&amp;severity=medium&amp;id=682d9842c4522896dcbf2abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23150-cwe-79-cross-site-scripting-xss-in-ahmed-kaludi-mohammed-kaludi-amp-for-wp-accelerated-mobile-pages-wordpress-plugin-bf2aba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23150%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Ahmed%20Kaludi%2C%20Mohammed%20Kaludi%20AMP%20for%20WP%20%E2%80%93%20Accelerated%20Mobile%20Pages%20(WordPress%20plugin)&amp;severity=medium&amp;id=682d9842c4522896dcbf2aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44760-cwe-79-cross-site-scripting-xss-in-lester-gamerz-chan-wp-downloadmanager-wordpress-plugin-bf28fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44760%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Lester%20&apos;GaMerZ&apos;%20Chan%20WP-DownloadManager%20(WordPress%20plugin)&amp;severity=medium&amp;id=682d9842c4522896dcbf28fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0547-cwe-305-authentication-bypass-by-primary-weakness-in-openvpn-bf2904</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0547%3A%20CWE-305%20-%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20OpenVPN&amp;severity=critical&amp;id=682d9842c4522896dcbf2904</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24772-cwe-347-improper-verification-of-cryptographic-signature-in-digitalbazaar-forge-bf2988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24772%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=medium&amp;id=682d9842c4522896dcbf2988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24773-cwe-347-improper-verification-of-cryptographic-signature-in-digitalbazaar-forge-bf2990</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24773%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=medium&amp;id=682d9842c4522896dcbf2990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24771-cwe-347-improper-verification-of-cryptographic-signature-in-digitalbazaar-forge-bf2980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24771%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20digitalbazaar%20forge&amp;severity=medium&amp;id=682d9842c4522896dcbf2980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0742-cwe-275-permission-issues-in-linux-kernel-bf7f5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0742%3A%20CWE-275%20Permission%20Issues%20in%20Linux%20Kernel&amp;severity=medium&amp;id=682d984bc4522896dcbf7f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22571-cwe-275-permission-issues-in-google-llc-google-sa360-webquery-bigquery-bf7efc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22571%3A%20CWE-275%20Permission%20Issues%20in%20Google%20LLC%20google%2Fsa360-webquery-bigquery&amp;severity=medium&amp;id=682d984bc4522896dcbf7efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-18-f123c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f123c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24770-cwe-1236-improper-neutralization-of-formula-elements-in-a-csv-file-in-gradio-app-gradio-bf2978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24770%3A%20CWE-1236%3A%20Improper%20Neutralization%20of%20Formula%20Elements%20in%20a%20CSV%20File%20in%20gradio-app%20gradio&amp;severity=medium&amp;id=682d9842c4522896dcbf2978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24759-cwe-347-improper-verification-of-cryptographic-signature-in-chainsafe-js-libp2p-noise-bf296e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24759%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20ChainSafe%20js-libp2p-noise&amp;severity=medium&amp;id=682d9842c4522896dcbf296e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24761-cwe-444-inconsistent-interpretation-of-http-requests-http-request-smuggling-in-pylons-waitress-bf2972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24761%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%20Smuggling&apos;)%20in%20Pylons%20waitress&amp;severity=medium&amp;id=682d9842c4522896dcbf2972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-17-f12133</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f12133</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23610-cwe-347-improper-verification-of-cryptographic-signature-in-wireapp-wire-server-bf2913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23610%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20wireapp%20wire-server&amp;severity=medium&amp;id=682d9842c4522896dcbf2913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40735-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf2794</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40735%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf2794</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40738-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf27b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40738%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40742-null-pointer-dereference-cwe-476-in-adobe-audition-bf27c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40742%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40734-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf278c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40734%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf278c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40737-null-pointer-dereference-cwe-476-in-adobe-audition-bf27a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40737%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40740-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf27c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40740%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40741-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf27c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40741%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40739-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf27bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40739%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40736-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-audition-bf27a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40736%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9842c4522896dcbf27a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42728-buffer-overflow-cwe-120-in-adobe-bridge-bf28ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42728%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42264-null-pointer-dereference-cwe-476-in-adobe-premiere-bf289f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42264%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9842c4522896dcbf289f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40793-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-bf286f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40793%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9842c4522896dcbf286f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40794-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-bf2873</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40794%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9842c4522896dcbf2873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40792-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-bf286b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40792%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9842c4522896dcbf286b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42263-null-pointer-dereference-cwe-476-in-adobe-premiere-bf2897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42263%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9842c4522896dcbf2897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40796-null-pointer-dereference-cwe-476-in-adobe-premiere-bf2893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40796%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9842c4522896dcbf2893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40789-null-pointer-dereference-cwe-476-in-adobe-premiere-elements-bf2867</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40789%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf2867</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42526-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-elements-bf28b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42526%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf28b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40788-null-pointer-dereference-cwe-476-in-adobe-premiere-elements-bf2863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40788%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf2863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40785-null-pointer-dereference-cwe-476-in-adobe-premiere-elements-bf2857</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40785%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf2857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42527-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-elements-bf28b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42527%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf28b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40769-out-of-bounds-read-cwe-125-in-adobe-character-animator-preview-4-bf2808</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40769%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9842c4522896dcbf2808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40786-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-elements-bf285b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40786%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf285b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40787-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-elements-bf285f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40787%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Elements&amp;severity=medium&amp;id=682d9842c4522896dcbf285f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42724-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf28c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42724%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42722-out-of-bounds-read-cwe-125-in-adobe-bridge-bf28c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42722%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40762-null-pointer-dereference-cwe-476-in-adobe-character-animator-preview-4-bf27e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40762%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9842c4522896dcbf27e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42729-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf28f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42729%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42720-out-of-bounds-read-cwe-125-in-adobe-bridge-bf28c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42720%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40763-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-character-animator-preview-4-bf27ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40763%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9842c4522896dcbf27ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40764-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-character-animator-preview-4-bf27fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40764%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9842c4522896dcbf27fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40766-out-of-bounds-read-cwe-125-in-adobe-character-animator-preview-4-bf2800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40766%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9842c4522896dcbf2800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42730-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf28f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42730%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40768-null-pointer-dereference-cwe-476-in-adobe-character-animator-preview-4-bf2804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40768%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9842c4522896dcbf2804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42719-out-of-bounds-read-cwe-125-in-adobe-bridge-bf28bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42719%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42533-double-free-cwe-415-in-adobe-bridge-bf28b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42533%3A%20Double%20Free%20(CWE-415)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf28b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40780-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-media-encoder-bf281a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40780%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9842c4522896dcbf281a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40781-null-pointer-dereference-cwe-476-in-adobe-media-encoder-bf283c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40781%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9842c4522896dcbf283c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40750-null-pointer-dereference-cwe-476-in-adobe-bridge-bf27cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40750%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9842c4522896dcbf27cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40779-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-media-encoder-bf2816</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40779%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9842c4522896dcbf2816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40782-null-pointer-dereference-cwe-476-in-adobe-media-encoder-bf2846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40782%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9842c4522896dcbf2846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40777-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-media-encoder-bf280e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40777%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9842c4522896dcbf280e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40778-null-pointer-dereference-cwe-476-in-adobe-media-encoder-bf2812</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40778%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9842c4522896dcbf2812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24751-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-zulip-zulip-bf295b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24751%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9842c4522896dcbf295b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24729-cwe-400-uncontrolled-resource-consumption-in-ckeditor-ckeditor4-bf291f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24729%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20ckeditor%20ckeditor4&amp;severity=medium&amp;id=682d9842c4522896dcbf291f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24728-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-ckeditor-ckeditor4-bf291b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24728%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20ckeditor%20ckeditor4&amp;severity=medium&amp;id=682d9842c4522896dcbf291b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-03-16-10b320</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-03-16&amp;severity=medium&amp;id=682b699452745a861d10b320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-16-f12210</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24756-cwe-401-missing-release-of-memory-after-effective-lifetime-in-bareos-bareos-bf6331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24756%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20bareos%20bareos&amp;severity=medium&amp;id=682d9848c4522896dcbf6331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24752-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-sylius-syliusgridbundle-bf296a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24752%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Sylius%20SyliusGridBundle&amp;severity=medium&amp;id=682d9842c4522896dcbf296a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24755-cwe-863-incorrect-authorization-in-bareos-bareos-bf632b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24755%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20bareos%20bareos&amp;severity=medium&amp;id=682d9848c4522896dcbf632b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24721-cwe-863-incorrect-authorization-in-cometd-cometd-bf2917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24721%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20cometd%20cometd&amp;severity=medium&amp;id=682d9842c4522896dcbf2917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-15-e68942</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-15&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e68942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-15-f130b3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f130b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24740-cwe-287-improper-authentication-in-plone-volto-bf294d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24740%3A%20CWE-287%3A%20Improper%20Authentication%20in%20plone%20volto&amp;severity=medium&amp;id=682d9842c4522896dcbf294d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24749-cwe-80-improper-neutralization-of-script-related-html-tags-in-a-web-page-basic-xss-in-sylius-sylius-bf6327</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24749%3A%20CWE-80%3A%20Improper%20Neutralization%20of%20Script-Related%20HTML%20Tags%20in%20a%20Web%20Page%20(Basic%20XSS)%20in%20Sylius%20Sylius&amp;severity=medium&amp;id=682d9848c4522896dcbf6327</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24743-cwe-613-insufficient-session-expiration-in-sylius-sylius-bf6307</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24743%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20Sylius%20Sylius&amp;severity=medium&amp;id=682d9848c4522896dcbf6307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24742-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-sylius-sylius-bf2953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24742%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Sylius%20Sylius&amp;severity=medium&amp;id=682d9842c4522896dcbf2953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24733-cwe-1021-improper-restriction-of-rendered-ui-layers-or-frames-in-sylius-sylius-bf2925</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24733%3A%20CWE-1021%3A%20Improper%20Restriction%20of%20Rendered%20UI%20Layers%20or%20Frames%20in%20Sylius%20Sylius&amp;severity=medium&amp;id=682d9842c4522896dcbf2925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20001-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-fish-shell-fish-shell-bf2671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20001%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20fish-shell%20fish-shell&amp;severity=medium&amp;id=682d9842c4522896dcbf2671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-14-f13a9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f13a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-13-f128af</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f128af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-12-f12bf6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24760-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-parse-community-parse-server-bf6339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24760%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20parse-community%20parse-server&amp;severity=medium&amp;id=682d9848c4522896dcbf6339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23625-cwe-755-improper-handling-of-exceptional-conditions-in-wireapp-wire-ios-bf2690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23625%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20wireapp%20wire-ios&amp;severity=medium&amp;id=682d9842c4522896dcbf2690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33150-escalation-of-privilege-in-intel-r-trace-hub-instances-which-bdbb82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33150%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Trace%20Hub%20instances%20which&amp;severity=medium&amp;id=682d981ec4522896dcbdbb82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0002-information-disclosure-in-intel-r-processors-bdbc4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0002%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24090-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf269c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24090%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9842c4522896dcbf269c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24096-heap-based-buffer-overflow-cwe-122-in-adobe-after-effects-bf26a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24096%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9842c4522896dcbf26a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23187-buffer-overflow-cwe-120-in-adobe-illustrator-bf268c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23187%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf268c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24094-stack-based-buffer-overflow-cwe-121-in-adobe-after-effects-bf26a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24094%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9842c4522896dcbf26a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24097-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf26ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24097%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9842c4522896dcbf26ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24095-stack-based-buffer-overflow-cwe-121-in-adobe-after-effects-bf26a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24095%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9842c4522896dcbf26a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24754-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-pjsip-pjproject-bf2773</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24754%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9842c4522896dcbf2773</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-36518-n-a-in-n-a-bed06e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-36518%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0001-information-disclosure-in-intel-r-processors-bdbc46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0001%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbc46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-11-f12cb4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24726-cwe-400-uncontrolled-resource-consumption-in-istio-istio-bf2710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24726%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20istio%20istio&amp;severity=medium&amp;id=682d9842c4522896dcbf2710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41233-cwe-862-missing-authorization-in-nextcloud-security-advisories-bf265a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41233%3A%20CWE-862%3A%20Missing%20Authorization%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9842c4522896dcbf265a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iranian-linked-conglomerate-muddywater-comprised-o-1b1807a9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Iranian%20linked%20conglomerate%20MuddyWater%20comprised%20of%20regionally%20focused%20subgroups&amp;severity=medium&amp;id=68d68acd91f8e2d62bd1aa2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24750-cwe-269-improper-privilege-management-in-ultravnc-ultravnc-bf276b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24750%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20ultravnc%20UltraVNC&amp;severity=medium&amp;id=682d9842c4522896dcbf276b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-10-f12c9b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24753-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-stripe-stripe-cli-bf276f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24753%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20stripe%20stripe-cli&amp;severity=medium&amp;id=682d9842c4522896dcbf276f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24744-cwe-613-insufficient-session-expiration-in-shopware-platform-bf2746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24744%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24745-cwe-384-session-fixation-in-shopware-platform-bf274e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24745%3A%20CWE-384%3A%20Session%20Fixation%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9842c4522896dcbf274e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24746-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-shopware-platform-bf275f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24746%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9842c4522896dcbf275f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24747-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-shopware-platform-bf2763</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24747%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24748-cwe-287-improper-authentication-in-shopware-platform-bf2767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24748%3A%20CWE-287%3A%20Improper%20Authentication%20in%20shopware%20platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24741-cwe-400-uncontrolled-resource-consumption-in-nextcloud-security-advisories-bf62f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24741%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf62f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24734-cwe-94-improper-control-of-generation-of-code-code-injection-in-mybb-mybb-bf62e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24734%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20mybb%20mybb&amp;severity=medium&amp;id=682d9848c4522896dcbf62e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24732-cwe-613-insufficient-session-expiration-in-foxcpp-maddy-bf2714</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24732%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20foxcpp%20maddy&amp;severity=medium&amp;id=682d9842c4522896dcbf2714</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-09-f12a3e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24739-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-rudloff-alltube-bf2740</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24739%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20Rudloff%20alltube&amp;severity=medium&amp;id=682d9842c4522896dcbf2740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24714-cwe-863-incorrect-authorization-in-icinga-icingaweb2-bf26d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24714%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20Icinga%20icingaweb2&amp;severity=medium&amp;id=682d9842c4522896dcbf26d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24713-cwe-400-uncontrolled-resource-consumption-in-rust-lang-regex-bf26d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24713%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20rust-lang%20regex&amp;severity=medium&amp;id=682d9842c4522896dcbf26d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41241-cwe-863-incorrect-authorization-in-nextcloud-security-advisories-bf266d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41241%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9842c4522896dcbf266d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41239-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf2667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41239%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9842c4522896dcbf2667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41181-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-nextcloud-security-advisories-bf2649</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41181%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9842c4522896dcbf2649</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41180-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-nextcloud-security-advisories-bf6231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41180%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9848c4522896dcbf6231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25311-cwe-269-improper-privilege-management-in-siemens-sinec-nms-bf7fae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25311%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Siemens%20SINEC%20NMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24282-cwe-502-deserialization-of-untrusted-data-in-siemens-sinec-nms-bf7f9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24282%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20Siemens%20SINEC%20NMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24281-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-siemens-sinec-nms-bf7f93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24281%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Siemens%20SINEC%20NMS&amp;severity=medium&amp;id=682d984bc4522896dcbf7f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37209-cwe-326-inadequate-encryption-strength-in-siemens-ruggedcom-i800-bf7f2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37209%3A%20CWE-326%3A%20Inadequate%20Encryption%20Strength%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=medium&amp;id=682d984bc4522896dcbf7f2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24716-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-icinga-icingaweb2-bf26e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24716%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Icinga%20icingaweb2&amp;severity=medium&amp;id=682d9842c4522896dcbf26e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24715-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-icinga-icingaweb2-bf26dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24715%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Icinga%20icingaweb2&amp;severity=medium&amp;id=682d9842c4522896dcbf26dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-08-f12578</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12578</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24737-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-httpie-httpie-bf62ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24737%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20httpie%20httpie&amp;severity=medium&amp;id=682d9848c4522896dcbf62ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24738-cwe-287-improper-authentication-in-tharsis-evmos-bf273a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24738%3A%20CWE-287%3A%20Improper%20Authentication%20in%20tharsis%20evmos&amp;severity=medium&amp;id=682d9842c4522896dcbf273a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-07-f12c02</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nvidia-leak-abused-certificate-for-signing-malicious-code-and-tools-such-as-mimikatz-f0c1cb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nvidia%20leak%20-%20abused%20certificate%20for%20signing%20malicious%20code%20and%20tools%20such%20as%20mimikatz&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-06-f12e5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-05-f126bf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f126bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-04-f12150</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f12150</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38578-a-case-of-cwe-124-is-occurring-in-pismmcore-in-tianocore-edk-ii-bf263d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38578%3A%20A%20case%20of%20CWE-124%20is%20occurring%20in%20PiSmmCore.%20in%20TianoCore%20EDK%20II&amp;severity=medium&amp;id=682d9842c4522896dcbf263d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24725-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-ericcornelissen-shescape-bf62de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24725%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20ericcornelissen%20shescape&amp;severity=medium&amp;id=682d9848c4522896dcbf62de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24723-cwe-20-improper-input-validation-in-medialize-uri-js-bf62d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24723%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20medialize%20URI.js&amp;severity=medium&amp;id=682d9848c4522896dcbf62d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24724-cwe-190-integer-overflow-or-wraparound-in-github-cmark-gfm-bf62da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24724%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20github%20cmark-gfm&amp;severity=medium&amp;id=682d9848c4522896dcbf62da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21716-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-twisted-twisted-bf623f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21716%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20twisted%20twisted&amp;severity=medium&amp;id=682d9848c4522896dcbf623f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-03-f1312b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f1312b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24722-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-github-view-component-bf270c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24722%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20github%20view_component&amp;severity=medium&amp;id=682d9842c4522896dcbf270c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23656-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-zulip-zulip-bf2698</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23656%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9842c4522896dcbf2698</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23640-cwe-611-improper-restriction-of-xml-external-entity-reference-in-monitorjbl-excel-streaming-reader-bf2694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23640%3A%20CWE-611%3A%20Improper%20Restriction%20of%20XML%20External%20Entity%20Reference%20in%20monitorjbl%20excel-streaming-reader&amp;severity=medium&amp;id=682d9842c4522896dcbf2694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24447-na-in-na-146b7b0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24447%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eset-isaacwiper-and-hermeticwizard-new-wiper-and-worm-targeting-ukraine-7783a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BESET%5D%20IsaacWiper%20and%20HermeticWizard%3A%20New%20wiper%20and%20worm%20targeting%20Ukraine&amp;severity=medium&amp;id=682c7adce3e6de8ceb7783a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-02-f12de4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24719-cwe-359-exposure-of-private-personal-information-to-an-unauthorized-actor-in-fluture-js-fluture-node-bf26fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24719%3A%20CWE-359%3A%20Exposure%20of%20Private%20Personal%20Information%20to%20an%20Unauthorized%20Actor%20in%20fluture-js%20fluture-node&amp;severity=medium&amp;id=682d9842c4522896dcbf26fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24718-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-finastra-ssr-pages-bf26f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24718%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Finastra%20ssr-pages&amp;severity=medium&amp;id=682d9842c4522896dcbf26f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24717-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-finastra-ssr-pages-bf26ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24717%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Finastra%20ssr-pages&amp;severity=medium&amp;id=682d9842c4522896dcbf26ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41193-cwe-134-use-of-externally-controlled-format-string-in-wireapp-wire-avs-bf264d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41193%3A%20CWE-134%3A%20Use%20of%20Externally-Controlled%20Format%20String%20in%20wireapp%20wire-avs&amp;severity=medium&amp;id=682d9842c4522896dcbf264d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24446-na-in-na-36ba6545</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24446%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24720-cwe-20-improper-input-validation-in-janko-image-processing-bf62c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24720%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20janko%20image_processing&amp;severity=medium&amp;id=682d9848c4522896dcbf62c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-03-01-f121c4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-03-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f121c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gsocket-io-global-socket-relay-network-gsrn-infrastructure-f0c1c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=gsocket.io%20-%20Global%20Socket%20Relay%20Network%20(GSRN)%20-%20infrastructure&amp;severity=low&amp;id=682acdbebbaf20d303f0c1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41112-cwe-862-missing-authorization-in-rundeck-rundeck-bf2645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41112%3A%20CWE-862%3A%20Missing%20Authorization%20in%20rundeck%20rundeck&amp;severity=medium&amp;id=682d9842c4522896dcbf2645</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41111-cwe-639-authorization-bypass-through-user-controlled-key-in-rundeck-rundeck-bf2641</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41111%3A%20CWE-639%3A%20Authorization%20Bypass%20Through%20User-Controlled%20Key%20in%20rundeck%20rundeck&amp;severity=medium&amp;id=682d9842c4522896dcbf2641</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24712-cwe-352-cross-site-request-forgery-csrf-in-codeigniter4-codeigniter4-bf26b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24712%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20codeigniter4%20CodeIgniter4&amp;severity=medium&amp;id=682d9842c4522896dcbf26b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24711-cwe-20-improper-input-validation-in-codeigniter4-codeigniter4-bf2626</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24711%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20codeigniter4%20CodeIgniter4&amp;severity=medium&amp;id=682d9842c4522896dcbf2626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-28-f12f9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-27-766530</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-27&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb766530</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-27-f12423</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23308-n-a-in-n-a-bdbffb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23308%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbffb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-26-f12611</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f12611</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21706-cwe-863-incorrect-authorization-in-zulip-zulip-bf245c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21706%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9842c4522896dcbf245c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24710-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-weblateorg-weblate-bf2622</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24710%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WeblateOrg%20weblate&amp;severity=medium&amp;id=682d9842c4522896dcbf2622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0247-cwe-732-incorrect-permission-assignment-for-critical-resource-in-google-llc-fuchsia-bf7f3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0247%3A%20CWE-732%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20Google%20LLC%20Fuchsia&amp;severity=medium&amp;id=682d984bc4522896dcbf7f3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25328-cwe-78-os-command-injection-in-google-llc-fscrypt-bf7fc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25328%3A%20CWE-78%20OS%20Command%20Injection%20in%20Google%20LLC%20fscrypt&amp;severity=medium&amp;id=682d984bc4522896dcbf7fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25327-cwe-255-credentials-management-in-google-llc-fscrypt-bf7fbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25327%3A%20CWE-255%20Credentials%20Management%20in%20Google%20LLC%20fscrypt&amp;severity=medium&amp;id=682d984bc4522896dcbf7fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25326-cwe-400-uncontrolled-resource-consumption-in-google-llc-fscrypt-bf7fb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25326%3A%20CWE-400%20Uncontrolled%20Resource%20Consumption%20in%20Google%20LLC%20fscrypt&amp;severity=medium&amp;id=682d984bc4522896dcbf7fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hermeticwiper-773560</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HermeticWiper&amp;severity=high&amp;id=682c7ad3e3e6de8ceb773560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-25-f123a7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f123a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hermeticwiper-f0c1c1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HermeticWiper&amp;severity=high&amp;id=682acdbebbaf20d303f0c1c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24709-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-aws-awsui-documentation-bf261e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24709%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20aws%20awsui-documentation&amp;severity=medium&amp;id=682d9842c4522896dcbf261e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44533-improper-certificate-validation-cwe-295-in-nodejs-node-bed4a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44533%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed4a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44532-improper-following-of-a-certificate-s-chain-of-trust-cwe-296-in-nodejs-node-bed49f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44532%3A%20Improper%20Following%20of%20a%20Certificate&apos;s%20Chain%20of%20Trust%20(CWE-296)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed49f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44531-improper-certificate-validation-cwe-295-in-nodejs-node-bed497</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44531%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21824-modification-of-assumed-immutable-data-maid-cwe-471-in-nodejs-node-bed4a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21824%3A%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20(CWE-471)%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-24-f12d8f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hermeticwiper-new-destructive-malware-used-in-cyber-attacks-on-ukraine-f0c1bf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HermeticWiper%20%7C%20New%20Destructive%20Malware%20Used%20In%20Cyber%20Attacks%20on%20Ukraine&amp;severity=high&amp;id=682acdbebbaf20d303f0c1bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24707-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-anuko-timetracker-bf62bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24707%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20anuko%20timetracker&amp;severity=medium&amp;id=682d9848c4522896dcbf62bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24708-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-anuko-timetracker-bf261a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24708%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20anuko%20timetracker&amp;severity=medium&amp;id=682d9842c4522896dcbf261a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23655-cwe-347-improper-verification-of-cryptographic-signature-in-octobercms-october-bf2616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23655%3A%20CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20in%20octobercms%20october&amp;severity=medium&amp;id=682d9842c4522896dcbf2616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23653-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-backblaze-b2-command-line-tool-bf260e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23653%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Backblaze%20B2_Command_Line_Tool&amp;severity=medium&amp;id=682d9842c4522896dcbf260e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23651-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-backblaze-b2-sdk-python-bf260a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23651%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Backblaze%20b2-sdk-python&amp;severity=medium&amp;id=682d9842c4522896dcbf260a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21705-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-octobercms-october-bf2458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21705%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=682d9842c4522896dcbf2458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ncsc-uk-cyclops-blink-777fe9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BNCSC-UK%5D%20Cyclops%20blink&amp;severity=medium&amp;id=682c7adce3e6de8ceb777fe9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-23-f12f20</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23612-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-openmrs-openmrs-core-bf6278</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23612%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20openmrs%20openmrs-core&amp;severity=medium&amp;id=682d9848c4522896dcbf6278</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43826-cwe-416-use-after-free-in-envoyproxy-envoy-bf240d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43826%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf240d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43825-cwe-416-use-after-free-in-envoyproxy-envoy-bf2405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43825%3A%20CWE-416%3A%20Use%20After%20Free%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf2405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21655-cwe-670-always-incorrect-control-flow-implementation-in-envoyproxy-envoy-bf242e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21655%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf242e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21654-cwe-295-improper-certificate-validation-in-envoyproxy-envoy-bf241d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21654%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf241d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21657-cwe-295-improper-certificate-validation-in-envoyproxy-envoy-bf244c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21657%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf244c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21656-cwe-295-improper-certificate-validation-in-envoyproxy-envoy-bf2432</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21656%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf2432</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23606-cwe-674-uncontrolled-recursion-in-envoyproxy-envoy-bf2533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23606%3A%20CWE-674%3A%20Uncontrolled%20Recursion%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf2533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43824-cwe-476-null-pointer-dereference-in-envoyproxy-envoy-bf23fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43824%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20envoyproxy%20envoy&amp;severity=medium&amp;id=682d9842c4522896dcbf23fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23635-cwe-287-improper-authentication-in-istio-istio-bf25b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23635%3A%20CWE-287%3A%20Improper%20Authentication%20in%20istio%20istio&amp;severity=medium&amp;id=682d9842c4522896dcbf25b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23654-cwe-287-improper-authentication-in-requarks-wiki-bf2612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23654%3A%20CWE-287%3A%20Improper%20Authentication%20in%20Requarks%20wiki&amp;severity=medium&amp;id=682d9842c4522896dcbf2612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23652-cwe-287-improper-authentication-in-clastix-capsule-proxy-bf62b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23652%3A%20CWE-287%3A%20Improper%20Authentication%20in%20clastix%20capsule-proxy&amp;severity=medium&amp;id=682d9848c4522896dcbf62b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23608-cwe-416-use-after-free-in-pjsip-pjproject-bf2537</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23608%3A%20CWE-416%3A%20Use%20After%20Free%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9842c4522896dcbf2537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-22-f1249d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f1249d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-malware-analysis-report-ar22-055a-mar-10369127-1-v1-muddywater-f0c1c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA%20-%20Malware%20Analysis%20Report%20(AR22-055A)%20-%20MAR%E2%80%9310369127%E2%80%931.v1%20-%20MuddyWater&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44142-cwe-125-out-of-bounds-read-in-samba-samba-bf2415</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44142%3A%20CWE-125%20Out-of-bounds%20Read%20in%20Samba%20Samba&amp;severity=high&amp;id=682d9842c4522896dcbf2415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0563-cwe-209-in-util-linux-f490dbe3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0563%3A%20CWE-209%20in%20util-linux&amp;severity=medium&amp;id=68487f5d1b0bd07c3938e5ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0564-cwe-204-observable-response-discrepancy-in-qlik-sense-qlik-sense-enterprise-on-windows-bf0253</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0564%3A%20CWE-204%3A%20Observable%20Response%20Discrepancy%20in%20Qlik%20Sense%20Qlik%20Sense%20Enterprise%20on%20Windows&amp;severity=medium&amp;id=682d983ec4522896dcbf0253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-21-f12c9d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-20-f1241f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1241f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-19-f1271c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f1271c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23642-cwe-94-improper-control-of-generation-of-code-code-injection-in-sourcegraph-sourcegraph-bf629c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23642%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9848c4522896dcbf629c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23650-cwe-321-use-of-hard-coded-cryptographic-key-in-gravitl-netmaker-bf2606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23650%3A%20CWE-321%3A%20Use%20of%20Hard-coded%20Cryptographic%20Key%20in%20gravitl%20netmaker&amp;severity=medium&amp;id=682d9842c4522896dcbf2606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23649-cwe-295-improper-certificate-validation-in-sigstore-cosign-bf2602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23649%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20sigstore%20cosign&amp;severity=medium&amp;id=682d9842c4522896dcbf2602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23645-cwe-125-out-of-bounds-read-in-stefanberger-swtpm-bf25de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23645%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20stefanberger%20swtpm&amp;severity=medium&amp;id=682d9842c4522896dcbf25de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23647-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-prismjs-prism-bf25e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23647%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20PrismJS%20prism&amp;severity=medium&amp;id=682d9842c4522896dcbf25e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0451-cwe-305-authentication-bypass-by-primary-weakness-in-google-llc-dart-sdk-bf7f53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0451%3A%20CWE-305%20Authentication%20Bypass%20by%20Primary%20Weakness%20in%20Google%20LLC%20Dart%20SDK&amp;severity=medium&amp;id=682d984bc4522896dcbf7f53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25314-n-a-in-n-a-bdc0e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25314%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdc0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25315-n-a-in-n-a-bdc0f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25315%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdc0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25313-na-in-na-4d9032a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25313%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683a0def182aa0cae2be9816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-18-f123b4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f123b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23646-cwe-451-user-interface-ui-misrepresentation-of-critical-information-in-vercel-next-js-bf25e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23646%3A%20CWE-451%3A%20User%20Interface%20(UI)%20Misrepresentation%20of%20Critical%20Information%20in%20vercel%20next.js&amp;severity=medium&amp;id=682d9842c4522896dcbf25e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23632-cwe-295-improper-certificate-validation-in-traefik-traefik-bf259e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23632%3A%20CWE-295%3A%20Improper%20Certificate%20Validation%20in%20traefik%20traefik&amp;severity=medium&amp;id=682d9842c4522896dcbf259e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-02-17-1ffc01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-02-17&amp;severity=medium&amp;id=682b69c452745a861d1ffc01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-17-f12e5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23636-cwe-824-access-of-uninitialized-pointer-in-bytecodealliance-wasmtime-bf25bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23636%3A%20CWE-824%3A%20Access%20of%20Uninitialized%20Pointer%20in%20bytecodealliance%20wasmtime&amp;severity=medium&amp;id=682d9842c4522896dcbf25bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23644-cwe-918-server-side-request-forgery-ssrf-in-bookwyrm-social-bookwyrm-bf25d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23644%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20bookwyrm-social%20bookwyrm&amp;severity=medium&amp;id=682d9842c4522896dcbf25d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23202-uncontrolled-search-path-element-cwe-427-in-adobe-creative-cloud-desktop-component-bf24e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23202%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Creative%20Cloud%20(desktop%20component)&amp;severity=medium&amp;id=682d9842c4522896dcbf24e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23200-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf24da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23200%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9842c4522896dcbf24da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23204-out-of-bounds-read-cwe-125-in-adobe-premiere-rush-bf24fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23204%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9842c4522896dcbf24fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23203-buffer-overflow-cwe-120-in-adobe-photoshop-bf24ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23203%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9842c4522896dcbf24ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23197-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf24bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23197%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23199-null-pointer-dereference-cwe-476-in-adobe-illustrator-bf24c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23199%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23198-null-pointer-dereference-cwe-476-in-adobe-illustrator-bf24c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23198%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23196-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf24b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23196%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23195-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf24b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23195%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23194-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf24b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23194%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23190-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf2487</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23190%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf2487</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23191-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf248f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23191%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23186-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf2468</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23186%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf2468</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23189-null-pointer-dereference-cwe-476-in-adobe-illustrator-bf2470</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23189%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf2470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23188-buffer-overflow-cwe-120-in-adobe-illustrator-bf246c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23188%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf246c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23192-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf24a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23192%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23193-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf24ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23193%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9842c4522896dcbf24ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25235-n-a-in-n-a-bdc0d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25235%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdc0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25236-n-a-in-n-a-bdc0de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25236%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdc0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-16-f12547</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23643-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-sourcegraph-sourcegraph-bf25cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23643%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20sourcegraph%20sourcegraph&amp;severity=medium&amp;id=682d9842c4522896dcbf25cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23641-cwe-835-loop-with-unreachable-exit-condition-infinite-loop-in-discourse-discourse-bf25c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23641%3A%20CWE-835%3A%20Loop%20with%20Unreachable%20Exit%20Condition%20(&apos;Infinite%20Loop&apos;)%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9842c4522896dcbf25c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23639-cwe-362-concurrent-execution-using-shared-resource-with-improper-synchronization-race-condition-in-crossbeam-rs-crossbeam-bf628d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23639%3A%20CWE-362%3A%20Concurrent%20Execution%20using%20Shared%20Resource%20with%20Improper%20Synchronization%20(&apos;Race%20Condition&apos;)%20in%20crossbeam-rs%20crossbeam&amp;severity=medium&amp;id=682d9848c4522896dcbf628d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23604-cwe-269-improper-privilege-management-in-twentysix26-x26-cogs-bf252f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23604%3A%20CWE-269%3A%20Improper%20Privilege%20Management%20in%20Twentysix26%20x26-Cogs&amp;severity=medium&amp;id=682d9842c4522896dcbf252f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21698-cwe-400-uncontrolled-resource-consumption-in-prometheus-client-golang-bf2450</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21698%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20prometheus%20client_golang&amp;severity=medium&amp;id=682d9842c4522896dcbf2450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24227-n-a-in-n-a-bdc09c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24227%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-02-15-7fe3f4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-02-15&amp;severity=medium&amp;id=682b68dfd14de609c87fe3f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-15-f12ed8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/charting-ta2541-s-flight-f0c224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Charting%20TA2541&apos;s%20Flight&amp;severity=high&amp;id=682acdbebbaf20d303f0c224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23638-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-darylldoyle-svg-sanitizer-bf25c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23638%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20darylldoyle%20svg-sanitizer&amp;severity=medium&amp;id=682d9842c4522896dcbf25c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23637-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-k-box-k-box-bf25bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23637%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20k-box%20k-box&amp;severity=medium&amp;id=682d9842c4522896dcbf25bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-14-f12a4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-13-f1252a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f1252a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-12-f12436</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12436</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23634-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-puma-puma-bf25a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23634%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20puma%20puma&amp;severity=medium&amp;id=682d9842c4522896dcbf25a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-11-f12a4c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23630-cwe-829-inclusion-of-functionality-from-untrusted-control-sphere-in-gradle-gradle-bf259a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23630%3A%20CWE-829%3A%20Inclusion%20of%20Functionality%20from%20Untrusted%20Control%20Sphere%20in%20gradle%20gradle&amp;severity=medium&amp;id=682d9842c4522896dcbf259a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-10-f12c5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21220-escalation-of-privilege-in-intel-r-quartus-r-prime-pro-edition-bdbe29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21220%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Quartus(R)%20Prime%20Pro%20Edition&amp;severity=high&amp;id=682d981ec4522896dcbdbe29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21218-information-disclosure-in-intel-r-trace-analyzer-and-collector-bdbe21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21218%3A%20information%20disclosure%20in%20Intel(R)%20Trace%20Analyzer%20and%20Collector&amp;severity=medium&amp;id=682d981ec4522896dcbdbe21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21205-information-disclosure-in-intel-r-quartus-r-prime-pro-edition-bdbe11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21205%3A%20information%20disclosure%20in%20Intel(R)%20Quartus(R)%20Prime%20Pro%20Edition&amp;severity=high&amp;id=682d981ec4522896dcbdbe11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21226-information-disclosure-in-intel-r-trace-analyzer-and-collector-bdbe5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21226%3A%20information%20disclosure%20in%20Intel(R)%20Trace%20Analyzer%20and%20Collector&amp;severity=medium&amp;id=682d981ec4522896dcbdbe5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21203-escalation-of-privilege-in-intel-r-quartus-r-prime-standard-edition-bdbe01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21203%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Quartus(R)%20Prime%20Standard%20Edition&amp;severity=high&amp;id=682d981ec4522896dcbdbe01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21157-information-disclosure-in-intel-r-smart-campus-android-application-bdbda6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21157%3A%20information%20disclosure%20in%20Intel(R)%20Smart%20Campus%20Android%20application&amp;severity=medium&amp;id=682d981ec4522896dcbdbda6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21204-escalation-of-privilege-in-intel-r-quartus-r-prime-pro-edition-bdbe09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21204%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Quartus(R)%20Prime%20Pro%20Edition&amp;severity=high&amp;id=682d981ec4522896dcbdbe09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21156-denial-of-service-in-intel-r-trace-analyzer-and-collector-bdbda2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21156%3A%20denial%20of%20service%20in%20Intel(R)%20Trace%20Analyzer%20and%20Collector&amp;severity=medium&amp;id=682d981ec4522896dcbdbda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44454-escalation-of-privilege-in-intel-r-quartus-r-prime-pro-edition-bdbc21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44454%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Quartus(R)%20Prime%20Pro%20Edition&amp;severity=high&amp;id=682d981ec4522896dcbdbc21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21174-escalation-of-privilege-in-intel-r-quartus-r-prime-pro-edition-bdbdd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21174%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Quartus(R)%20Prime%20Pro%20Edition&amp;severity=high&amp;id=682d981ec4522896dcbdbdd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21153-information-disclosure-in-intel-r-capital-global-summit-android-application-bdbd95</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21153%3A%20information%20disclosure%20in%20Intel(R)%20Capital%20Global%20Summit%20Android%20application&amp;severity=medium&amp;id=682d981ec4522896dcbdbd95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21133-denial-of-service-in-intel-r-trace-analyzer-and-collector-bdbd3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21133%3A%20denial%20of%20service%20in%20Intel(R)%20Trace%20Analyzer%20and%20Collector&amp;severity=medium&amp;id=682d981ec4522896dcbdbd3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33155-denial-of-service-in-intel-r-wireless-bluetooth-r-and-killer-tm-bluetooth-r-products-bdbb8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33155%3A%20denial%20of%20service%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20and%20Killer(TM)%20Bluetooth(R)%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33166-information-disclosure-in-version-bdbb92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33166%3A%20information%20disclosure%20in%20version&amp;severity=medium&amp;id=682d981ec4522896dcbdbb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33129-escalation-of-privilege-in-intel-r-advisor-bdbb42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33129%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Advisor&amp;severity=high&amp;id=682d981ec4522896dcbdbb42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33139-denial-of-service-in-intel-r-wireless-bluetooth-r-and-killer-tm-bluetooth-r-products-bdbb67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33139%3A%20denial%20of%20service%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20and%20Killer(TM)%20Bluetooth(R)%20products&amp;severity=medium&amp;id=682d981ec4522896dcbdbb67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33137-escalation-of-privilege-in-intel-r-kernelflinger-project-bdbb5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33137%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Kernelflinger%20project&amp;severity=high&amp;id=682d981ec4522896dcbdbb5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33147-information-disclosure-in-intel-r-ipp-crypto-library-bdbb6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33147%3A%20information%20disclosure%20in%20Intel(R)%20IPP%20Crypto%20library&amp;severity=medium&amp;id=682d981ec4522896dcbdbb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33120-information-disclosure-or-cause-denial-of-service-in-intel-atom-r-processors-bdbb0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33120%3A%20information%20disclosure%20or%20cause%20denial%20of%20service%20in%20Intel%20Atom(R)%20Processors&amp;severity=medium&amp;id=682d981ec4522896dcbdbb0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33119-information-disclosure-in-intel-r-realsense-tm-dcm-bdbb08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33119%3A%20information%20disclosure%20in%20Intel(R)%20RealSense(TM)%20DCM&amp;severity=medium&amp;id=682d981ec4522896dcbdbb08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33114-denial-of-service-in-intel-r-proset-wireless-wifi-in-multiple-operating-systems-and-killer-tm-wifi-in-windows-10-and-11-bdbafc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33114%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20in%20multiple%20operating%20systems%20and%20Killer(TM)%20WiFi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981ec4522896dcbdbafc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33110-denial-of-service-in-intel-r-wireless-bluetooth-r-products-and-killer-tm-bluetooth-r-products-in-windows-10-and-11-bdbade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33110%3A%20denial%20of%20service%20in%20Intel(R)%20Wireless%20Bluetooth(R)%20products%20and%20Killer(TM)%20Bluetooth(R)%20products%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981ec4522896dcbdbade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33105-denial-of-service-in-intel-core-processors-with-radeon-rx-vega-m-gl-graphics-advisory-bdbad2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33105%3A%20denial%20of%20service%20in%20Intel%C2%AE%20Core%E2%84%A2%20Processors%20with%20Radeon%E2%84%A2%20RX%20Vega%20M%20GL%20Graphics%20Advisory&amp;severity=medium&amp;id=682d981ec4522896dcbdbad2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33113-denial-of-service-or-information-disclosure-in-intel-r-proset-wireless-wifi-in-multiple-operating-systems-and-killer-tm-wifi-in-windows-10-and-11-bdbae2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33113%3A%20denial%20of%20service%20or%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20in%20multiple%20operating%20systems%20and%20Killer(TM)%20WiFi%20in%20Windows%2010%20and%2011&amp;severity=high&amp;id=682d981ec4522896dcbdbae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33115-escalation-of-privilege-in-intel-r-proset-wireless-wifi-in-uefi-bdbb00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33115%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20WiFi%20in%20UEFI&amp;severity=high&amp;id=682d981ec4522896dcbdbb00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33107-information-disclosure-in-intel-r-amt-sdk-before-version-16-0-3-intel-r-scs-before-version-12-2-and-intel-r-mebx-bdbad6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33107%3A%20information%20disclosure%20in%20Intel(R)%20AMT%20SDK%20before%20version%2016.0.3%2C%20Intel(R)%20SCS%20before%20version%2012.2%20and%20Intel(R)%20MEBx&amp;severity=medium&amp;id=682d981ec4522896dcbdbad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33096-denial-of-service-in-intel-r-82599-ethernet-controllers-and-adapters-bdbac6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33096%3A%20denial%20of%20service%20in%20Intel(R)%2082599%20Ethernet%20Controllers%20and%20Adapters&amp;severity=medium&amp;id=682d981ec4522896dcbdbac6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33101-escalation-of-privilege-in-intel-r-gpa-software-bdbaca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33101%3A%20escalation%20of%20privilege%20in%20Intel(R)%20GPA%20software&amp;severity=high&amp;id=682d981ec4522896dcbdbaca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33061-denial-of-service-in-intel-r-82599-ethernet-controllers-and-adapters-bdba8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33061%3A%20denial%20of%20service%20in%20Intel(R)%2082599%20Ethernet%20Controllers%20and%20Adapters&amp;severity=medium&amp;id=682d981ec4522896dcbdba8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-23152-escalation-of-privilege-in-intel-r-advisor-software-bdba42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-23152%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Advisor%20software&amp;severity=high&amp;id=682d981ec4522896dcbdba42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0178-denial-of-service-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb49d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0178%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb49d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0183-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb9e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0183%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981ec4522896dcbdb9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33068-denial-of-service-in-intel-r-amt-bdba92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33068%3A%20denial%20of%20service%20in%20Intel(R)%20AMT&amp;severity=medium&amp;id=682d981ec4522896dcbdba92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0179-denial-of-service-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb4a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0179%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb4a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0177-denial-of-service-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb495</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0177%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0176-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb491</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0176%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb491</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0174-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb480</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0174%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0169-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-in-windows-10-and-11-bdb43e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0169%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0170-information-disclosure-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb459</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0170%3A%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0175-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb48d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0175%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb48d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0173-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb47c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0173%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0172-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb46b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0172%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0168-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb43a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0168%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb43a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0171-information-disclosure-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0171%3A%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0167-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb429</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0167%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0166-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb421</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0166%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0165-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-killer-tm-wi-fi-in-windows-10-and-11-bdb41d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0165%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0164-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-killer-tm-wi-fi-in-windows-10-and-11-bdb419</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0164%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=high&amp;id=682d981dc4522896dcbdb419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0162-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb400</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0162%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=high&amp;id=682d981dc4522896dcbdb400</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0161-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-killer-tm-wi-fi-in-windows-10-and-11-bdb3fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0161%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0163-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-and-killer-tm-wi-fi-in-windows-10-and-11-bdb408</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0163%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=high&amp;id=682d981dc4522896dcbdb408</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0156-escalation-of-privilege-in-intel-r-processors-bdb3c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0156%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0147-denial-of-service-in-intel-chipset-firmware-bdb3a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0147%3A%20denial%20of%20service%20in%20Intel%20Chipset%20firmware&amp;severity=medium&amp;id=682d981dc4522896dcbdb3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0127-denial-of-service-in-intel-r-processors-bdb39f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0127%3A%20denial%20of%20service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb39f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0124-escalation-of-privilege-in-intel-r-processors-bdb388</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0124%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb388</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0118-escalation-of-privilege-in-intel-r-processors-bdb363</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0118%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0145-information-disclosure-in-intel-r-processors-bdb3a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0145%3A%20information%20disclosure%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0125-escalation-of-privilege-in-intel-r-processors-bdb38c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0125%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb38c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0119-escalation-of-privilege-in-intel-r-processors-bdb367</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0119%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb367</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0116-escalation-of-privilege-in-intel-r-processors-bdb352</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0116%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0107-escalation-of-privilege-in-intel-r-processors-bdb346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0107%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0076-denial-of-service-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb2a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0076%3A%20denial%20of%20service%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb2a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0115-escalation-of-privilege-in-intel-r-processors-bdb34e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0115%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0111-escalation-of-privilege-in-intel-r-processors-bdb34a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0111%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb34a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0117-escalation-of-privilege-in-intel-r-processors-bdb35f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0117%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb35f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0103-escalation-of-privilege-in-intel-r-processors-bdb2f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0103%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb2f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0092-denial-of-service-in-intel-r-processors-bdb2b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0092%3A%20denial%20of%20service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb2b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0091-escalation-of-privilege-in-intel-r-processors-bdb2af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0091%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb2af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0093-denial-of-service-in-intel-r-processors-bdb2bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0093%3A%20denial%20of%20service%20in%20Intel(R)%20Processors&amp;severity=medium&amp;id=682d981dc4522896dcbdb2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0072-information-disclosure-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-some-killer-tm-wi-fi-in-windows-10-and-11-bdb2a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0072%3A%20information%20disclosure%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20some%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=medium&amp;id=682d981dc4522896dcbdb2a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0060-escalation-of-privilege-in-intel-r-sps-bdb290</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0060%3A%20escalation%20of%20privilege%20in%20Intel(R)%20SPS&amp;severity=medium&amp;id=682d981dc4522896dcbdb290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0099-escalation-of-privilege-in-intel-r-processors-bdb2e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0099%3A%20escalation%20of%20privilege%20in%20Intel(R)%20Processors&amp;severity=high&amp;id=682d981dc4522896dcbdb2e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-0066-escalation-of-privilege-in-intel-r-proset-wireless-wi-fi-in-multiple-operating-systems-and-killer-tm-wi-fi-in-windows-10-and-11-bdb29f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-0066%3A%20escalation%20of%20privilege%20in%20Intel(R)%20PROSet%2FWireless%20Wi-Fi%20in%20multiple%20operating%20systems%20and%20Killer(TM)%20Wi-Fi%20in%20Windows%2010%20and%2011&amp;severity=high&amp;id=682d981dc4522896dcbdb29f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23628-cwe-682-incorrect-calculation-in-open-policy-agent-opa-bf6289</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23628%3A%20CWE-682%3A%20Incorrect%20Calculation%20in%20open-policy-agent%20opa&amp;severity=medium&amp;id=682d9848c4522896dcbf6289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23622-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-xwiki-platform-bf258a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23622%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf258a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23621-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bf2586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23621%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23620-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-xwiki-xwiki-platform-bf2582</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23620%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23619-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-xwiki-xwiki-platform-bf2568</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23619%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2568</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23618-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-xwiki-xwiki-platform-bf2553</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23618%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23617-cwe-862-missing-authorization-in-xwiki-xwiki-platform-bf254f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23617%3A%20CWE-862%3A%20Missing%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf254f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23616-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-xwiki-xwiki-platform-bf254b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23616%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf254b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23615-cwe-863-incorrect-authorization-in-xwiki-xwiki-platform-bf2547</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23615%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9842c4522896dcbf2547</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21660-cwe-862-missing-authorization-in-flipped-aurora-gin-vue-admin-bf6237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21660%3A%20CWE-862%3A%20Missing%20Authorization%20in%20flipped-aurora%20gin-vue-admin&amp;severity=medium&amp;id=682d9848c4522896dcbf6237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-09-f121ad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23627-cwe-863-incorrect-authorization-in-justarchinet-archisteamfarm-bf2596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23627%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20JustArchiNET%20ArchiSteamFarm&amp;severity=medium&amp;id=682d9842c4522896dcbf2596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23626-cwe-20-improper-input-validation-in-m1k1o-blog-bf627c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23626%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20m1k1o%20blog&amp;severity=medium&amp;id=682d9848c4522896dcbf627c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21713-cwe-863-incorrect-authorization-in-grafana-grafana-bf2464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21713%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9842c4522896dcbf2464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21703-cwe-352-cross-site-request-forgery-csrf-in-grafana-grafana-bf2454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21703%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9842c4522896dcbf2454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21702-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-grafana-grafana-bf623b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21702%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9848c4522896dcbf623b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-08-f1243a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f1243a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23623-cwe-20-improper-input-validation-in-frouriojs-frourio-bf258e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23623%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20frouriojs%20frourio&amp;severity=medium&amp;id=682d9842c4522896dcbf258e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23624-cwe-20-improper-input-validation-in-frouriojs-frourio-express-bf2592</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23624%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20frouriojs%20frourio-express&amp;severity=medium&amp;id=682d9842c4522896dcbf2592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23613-cwe-191-integer-underflow-wrap-or-wraparound-in-neutrinolabs-xrdp-bf2543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23613%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20neutrinolabs%20xrdp&amp;severity=medium&amp;id=682d9842c4522896dcbf2543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21712-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-twisted-twisted-bf2460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21712%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20twisted%20twisted&amp;severity=medium&amp;id=682d9842c4522896dcbf2460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-07-f12f7b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-02-06-20ee9a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-02-06&amp;severity=medium&amp;id=682b69c752745a861d20ee9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-06-f12fa0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-05-f12b17</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0317-cwe-20-improper-input-validation-in-google-llc-go-attestation-bf7f4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0317%3A%20CWE-20%20Improper%20Input%20Validation%20in%20Google%20LLC%20go-attestation&amp;severity=medium&amp;id=682d984bc4522896dcbf7f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23609-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-bildsben-itunesrpc-remastered-bf253b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23609%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20bildsben%20iTunesRPC-Remastered&amp;severity=medium&amp;id=682d9842c4522896dcbf253b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23611-cwe-78-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-in-bildsben-itunesrpc-remastered-bf253f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23611%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20bildsben%20iTunesRPC-Remastered&amp;severity=medium&amp;id=682d9842c4522896dcbf253f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23561-cwe-787-out-of-bounds-write-in-tensorflow-tensorflow-bf24ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23561%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf24ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23557-cwe-369-divide-by-zero-in-tensorflow-tensorflow-bf6247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23557%3A%20CWE-369%3A%20Divide%20By%20Zero%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23558-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf624b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23558%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf624b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23570-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf6270</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23570%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23564-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf250b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23564%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf250b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23565-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf2518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23565%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf2518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23562-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf2503</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23562%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf2503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23563-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-tensorflow-tensorflow-bf2507</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23563%3A%20CWE-367%3A%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf2507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23559-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf6264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23559%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23560-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf6268</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23560%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23574-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf6274</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23574%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23571-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf251c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23571%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf251c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23566-cwe-787-out-of-bounds-write-in-tensorflow-tensorflow-bf626c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23566%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf626c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23577-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf6193</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23577%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23578-cwe-401-missing-release-of-memory-after-effective-lifetime-in-tensorflow-tensorflow-bf619b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23578%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23572-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-tensorflow-tensorflow-bf616a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23572%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf616a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23573-cwe-908-use-of-uninitialized-resource-in-tensorflow-tensorflow-bf616e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23573%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf616e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23585-cwe-401-missing-release-of-memory-after-effective-lifetime-in-tensorflow-tensorflow-bf61e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23585%3A%20CWE-401%3A%20Missing%20Release%20of%20Memory%20after%20Effective%20Lifetime%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23579-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf61aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23579%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23580-cwe-400-uncontrolled-resource-consumption-in-tensorflow-tensorflow-bf61ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23580%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23581-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf61b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23581%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23575-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf6183</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23575%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23576-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf618b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23576%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf618b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23588-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf61ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23588%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23589-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf61f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23589%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23586-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf61e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23586%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23583-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf61c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23583%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23582-cwe-617-reachable-assertion-in-tensorflow-tensorflow-bf61bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23582%3A%20CWE-617%3A%20Reachable%20Assertion%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23584-cwe-416-use-after-free-in-tensorflow-tensorflow-bf61c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23584%3A%20CWE-416%3A%20Use%20After%20Free%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23592-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf61f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23592%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23587-cwe-190-integer-overflow-or-wraparound-in-tensorflow-tensorflow-bf61e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23587%3A%20CWE-190%3A%20Integer%20Overflow%20or%20Wraparound%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23595-cwe-476-null-pointer-dereference-in-tensorflow-tensorflow-bf6200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23595%3A%20CWE-476%3A%20NULL%20Pointer%20Dereference%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf6200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23594-cwe-125-out-of-bounds-read-in-tensorflow-tensorflow-bf239b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23594%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf239b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23590-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-tensorflow-tensorflow-bf61f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23590%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23591-cwe-400-uncontrolled-resource-consumption-in-tensorflow-tensorflow-bf2393</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23591%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9842c4522896dcbf2393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23593-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-tensorflow-tensorflow-bf61fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23593%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20tensorflow%20tensorflow&amp;severity=medium&amp;id=682d9848c4522896dcbf61fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23600-cwe-287-improper-authentication-in-fleetdm-fleet-bf23b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23600%3A%20CWE-287%3A%20Improper%20Authentication%20in%20fleetdm%20fleet&amp;severity=medium&amp;id=682d9842c4522896dcbf23b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23605-cwe-212-improper-removal-of-sensitive-information-before-storage-or-transfer-in-wireapp-wire-webapp-bf23de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23605%3A%20CWE-212%3A%20Improper%20Removal%20of%20Sensitive%20Information%20Before%20Storage%20or%20Transfer%20in%20wireapp%20wire-webapp&amp;severity=medium&amp;id=682d9842c4522896dcbf23de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43841-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-xwiki-xwiki-platform-bf60f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43841%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9848c4522896dcbf60f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23614-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-twigphp-twig-bf23e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23614%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20twigphp%20Twig&amp;severity=medium&amp;id=682d9842c4522896dcbf23e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32732-cwe-352-cross-site-request-forgery-csrf-in-xwiki-xwiki-platform-bf60b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32732%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20xwiki%20xwiki-platform&amp;severity=medium&amp;id=682d9848c4522896dcbf60b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-04-f12534</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f12534</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21740-n-a-in-n-a-bdbf1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21740%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbf1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21741-n-a-in-n-a-bdbf24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21741%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbf24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21737-n-a-in-n-a-bdbf07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21737%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbf07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21738-n-a-in-n-a-bdbf14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21738%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbf14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21739-n-a-in-n-a-bdbf18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21739%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbf18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21734-n-a-in-n-a-bdbee8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21734%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbee8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21735-n-a-in-n-a-bdbef0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21735%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23569-n-a-in-n-a-bdc036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23569%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21729-n-a-in-n-a-bdbec1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21729%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbec1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21725-n-a-in-n-a-bdbea6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21725%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbea6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21736-n-a-in-n-a-bdbef8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21736%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23567-n-a-in-n-a-bdc01a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23567%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc01a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23568-n-a-in-n-a-bdc01e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23568%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc01e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21731-n-a-in-n-a-bdbec9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21731%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbec9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21733-n-a-in-n-a-bdbecd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21733%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbecd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21727-n-a-in-n-a-bdbeb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21727%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbeb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21726-n-a-in-n-a-bdbeb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21726%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbeb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21728-n-a-in-n-a-bdbebd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21728%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21730-n-a-in-n-a-bdbec5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21730%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbec5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-03-f1205e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1205e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26208-n-a-in-n-a-bdb189</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26208%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21724-n-a-in-n-a-bdbea2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21724%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-02-f12a02</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23601-cwe-352-cross-site-request-forgery-csrf-in-symfony-symfony-bf23ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23601%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20symfony%20symfony&amp;severity=medium&amp;id=682d9842c4522896dcbf23ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43848-cwe-908-use-of-uninitialized-resource-in-h2o-h2o-bf2109</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43848%3A%20CWE-908%3A%20Use%20of%20Uninitialized%20Resource%20in%20h2o%20h2o&amp;severity=medium&amp;id=682d9841c4522896dcbf2109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43859-cwe-400-uncontrolled-resource-consumption-in-x-stream-xstream-bf60f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43859%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20x-stream%20xstream&amp;severity=medium&amp;id=682d9848c4522896dcbf60f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21687-n-a-in-n-a-bdbe72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21687%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbe72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23596-n-a-in-n-a-bdc03a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23596%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdc03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23597-n-a-in-n-a-bdc047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23597%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdc047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23602-n-a-in-n-a-bdc06b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23602%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdc06b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23603-n-a-in-n-a-bdc073</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23603%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdc073</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-02-01-1c653e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-02-01&amp;severity=medium&amp;id=682b69b952745a861d1c653e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-02-01-f1273b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-02-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f1273b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21659-n-a-in-n-a-bdbe6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21659%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbe6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-31-753d58</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-31&amp;severity=medium&amp;id=682c7abde3e6de8ceb753d58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-31-f12a86</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cytrox-spyware-indicators-of-compromise-7bca41</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cytrox%20Spyware%20Indicators%20of%20Compromise&amp;severity=low&amp;id=682b81048ee1a77b717bca41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-amnestytech-investigations-master-2021-07-18-nso-pegasus-stix2-ea63b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20AmnestyTech%2Finvestigations%2Fmaster%2F2021-07-18_nso%2Fpegasus.stix2&amp;severity=high&amp;id=682b7baad3ddd8cef2ea63b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-30-f12d2a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cytrox-spyware-indicators-of-compromise-f0c1bd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cytrox%20Spyware%20Indicators%20of%20Compromise&amp;severity=low&amp;id=682acdbebbaf20d303f0c1bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-29-f12263</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12263</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21721-n-a-in-n-a-bdbe9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21721%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbe9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23598-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-laminas-laminas-form-bf23ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23598%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20laminas%20laminas-form&amp;severity=medium&amp;id=682d9842c4522896dcbf23ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23599-n-a-in-n-a-bdc065</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23599%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc065</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0394-cwe-79-improper-neutralization-of-in-a5d2e1e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0394%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20livehelperchat%20livehelperchat%2Flivehelperchat&amp;severity=medium&amp;id=68487f5e1b0bd07c3938fab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21720-n-a-in-n-a-bdbe7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21720%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbe7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21719-n-a-in-n-a-bdbe76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21719%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbe76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-28-f13190</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-28&amp;severity=medium&amp;id=682acdc2bbaf20d303f13190</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compromised-host-delivering-malware-mirai-f0c1bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Compromised%20host%20delivering%20malware%20(Mirai)&amp;severity=high&amp;id=682acdbebbaf20d303f0c1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-north-korea-s-lazarus-apt-leverages-windows-update-client-github-in-latest-campaign-f0c1ae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20North%20Korea%E2%80%99s%20Lazarus%20APT%20leverages%20Windows%20Update%20client%2C%20GitHub%20in%20latest%20campaign&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/disinformation-the-gru-s-galaxy-of-russian-speaking-websites-f0c1ac</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Disinformation%20-%20The%20GRU%E2%80%99s%20galaxy%20of%20Russian-speaking%20websites&amp;severity=low&amp;id=682acdbebbaf20d303f0c1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21723-cwe-125-out-of-bounds-read-in-pjsip-pjproject-bf238b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21723%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9842c4522896dcbf238b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21722-cwe-125-out-of-bounds-read-in-pjsip-pjproject-bf2383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21722%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9842c4522896dcbf2383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-27-f12242</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41166-cwe-276-incorrect-default-permissions-in-nextcloud-security-advisories-bf2099</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41166%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20nextcloud%20security-advisories&amp;severity=medium&amp;id=682d9841c4522896dcbf2099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32849-cwe-78-os-command-injection-in-gerapy-gerapy-bf60cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32849%3A%20CWE-78%20OS%20Command%20Injection%20in%20Gerapy%20gerapy&amp;severity=medium&amp;id=682d9848c4522896dcbf60cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32841-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-icsharpcode-sharpziplib-bf60be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32841%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icsharpcode%20sharpziplib&amp;severity=medium&amp;id=682d9848c4522896dcbf60be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32842-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-icsharpcode-sharpziplib-bf60cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32842%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icsharpcode%20sharpziplib&amp;severity=medium&amp;id=682d9848c4522896dcbf60cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32840-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-icsharpcode-sharpziplib-bf60ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32840%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20icsharpcode%20sharpziplib&amp;severity=medium&amp;id=682d9848c4522896dcbf60ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21686-cwe-94-improper-control-of-generation-of-code-code-injection-in-prestashop-prestashop-bf22be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21686%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20PrestaShop%20PrestaShop&amp;severity=medium&amp;id=682d9842c4522896dcbf22be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23990-n-a-in-n-a-bdc08b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23990%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdc08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22570-cwe-476-null-pointer-dereference-in-google-llc-protobuf-bf7ef4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22570%3A%20CWE-476%20NULL%20Pointer%20Dereference%20in%20Google%20LLC%20Protobuf&amp;severity=medium&amp;id=682d984bc4522896dcbf7ef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-26-f13110</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f13110</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43799-cwe-338-use-of-cryptographically-weak-pseudo-random-number-generator-prng-in-zulip-zulip-bf20ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43799%3A%20CWE-338%3A%20Use%20of%20Cryptographically%20Weak%20Pseudo-Random%20Number%20Generator%20(PRNG)%20in%20zulip%20zulip&amp;severity=medium&amp;id=682d9841c4522896dcbf20ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43863-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-nextcloud-android-bf2113</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43863%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20nextcloud%20android&amp;severity=medium&amp;id=682d9841c4522896dcbf2113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21697-cwe-918-server-side-request-forgery-ssrf-in-jupyterhub-jupyter-server-proxy-bf232a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21697%3A%20CWE-918%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20jupyterhub%20jupyter-server-proxy&amp;severity=medium&amp;id=682d9842c4522896dcbf232a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-25-f1281c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f1281c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21715-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-codeigniter4-codeigniter4-bf237b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21715%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20codeigniter4%20CodeIgniter4&amp;severity=medium&amp;id=682d9842c4522896dcbf237b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21711-cwe-125-out-of-bounds-read-in-liyansong2018-elfspirit-bf6166</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21711%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20liyansong2018%20elfspirit&amp;severity=medium&amp;id=682d9848c4522896dcbf6166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21710-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-starcitizentools-mediawiki-extensions-shortdescription-bf6162</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21710%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20StarCitizenTools%20mediawiki-extensions-ShortDescription&amp;severity=medium&amp;id=682d9848c4522896dcbf6162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23852-n-a-in-n-a-bdc083</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23852%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdc083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-24-f13125</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-24&amp;severity=medium&amp;id=682acdc2bbaf20d303f13125</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-23-f12f5c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-23&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23808-n-a-in-n-a-bdc07b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23808%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdc07b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-22-f12ee0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21708-cwe-400-uncontrolled-resource-consumption-in-graph-gophers-graphql-go-bf2375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21708%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20graph-gophers%20graphql-go&amp;severity=medium&amp;id=682d9842c4522896dcbf2375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21707-cwe-863-incorrect-authorization-in-wasmcloud-wasmcloud-otp-bf2364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21707%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20wasmCloud%20wasmcloud-otp&amp;severity=medium&amp;id=682d9842c4522896dcbf2364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-21-e5c8d6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-21&amp;severity=medium&amp;id=682b7b9dd3ddd8cef2e5c8d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-21-f1301c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f1301c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21658-cwe-363-race-condition-enabling-link-following-in-rust-lang-rust-bf6111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21658%3A%20CWE-363%3A%20Race%20Condition%20Enabling%20Link%20Following%20in%20rust-lang%20rust&amp;severity=medium&amp;id=682d9848c4522896dcbf6111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-20-f12d89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21701-cwe-863-incorrect-authorization-in-istio-istio-bf233a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21701%3A%20CWE-863%3A%20Incorrect%20Authorization%20in%20istio%20istio&amp;severity=medium&amp;id=682d9842c4522896dcbf233a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21679-cwe-670-always-incorrect-control-flow-implementation-in-istio-istio-bf22a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21679%3A%20CWE-670%3A%20Always-Incorrect%20Control%20Flow%20Implementation%20in%20istio%20istio&amp;severity=medium&amp;id=682d9842c4522896dcbf22a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21699-cwe-250-execution-with-unnecessary-privileges-in-ipython-ipython-bf615e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21699%3A%20CWE-250%3A%20Execution%20with%20Unnecessary%20Privileges%20in%20ipython%20ipython&amp;severity=medium&amp;id=682d9848c4522896dcbf615e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21704-cwe-276-incorrect-default-permissions-in-log4js-node-log4js-node-bf2342</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21704%3A%20CWE-276%3A%20Incorrect%20Default%20Permissions%20in%20log4js-node%20log4js-node&amp;severity=medium&amp;id=682d9842c4522896dcbf2342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23221-n-a-in-n-a-bdbff7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23221%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbff7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-19-f12935</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21694-cwe-732-incorrect-permission-assignment-for-critical-resource-in-onionshare-onionshare-bf2309</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21694%3A%20CWE-732%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf2309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21690-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-onionshare-onionshare-bf613e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21690%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9848c4522896dcbf613e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21700-cwe-400-uncontrolled-resource-consumption-in-micronaut-projects-micronaut-core-bf2330</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21700%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20micronaut-projects%20micronaut-core&amp;severity=medium&amp;id=682d9842c4522896dcbf2330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21692-cwe-287-improper-authentication-in-onionshare-onionshare-bf614d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21692%3A%20CWE-287%3A%20Improper%20Authentication%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9848c4522896dcbf614d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21689-cwe-400-uncontrolled-resource-consumption-in-onionshare-onionshare-bf22df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21689%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf22df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21693-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-onionshare-onionshare-bf2301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21693%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf2301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21691-cwe-306-missing-authentication-for-critical-function-in-onionshare-onionshare-bf22f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21691%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf22f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21695-cwe-287-improper-authentication-in-onionshare-onionshare-bf2311</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21695%3A%20CWE-287%3A%20Improper%20Authentication%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf2311</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21688-cwe-125-out-of-bounds-read-in-onionshare-onionshare-bf22c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21688%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf22c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21673-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-grafana-grafana-bf225f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21673%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20grafana%20grafana&amp;severity=medium&amp;id=682d9842c4522896dcbf225f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21696-cwe-20-improper-input-validation-in-onionshare-onionshare-bf2319</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21696%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20onionshare%20onionshare&amp;severity=medium&amp;id=682d9842c4522896dcbf2319</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21683-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-wagtail-wagtail-bf22b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21683%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20wagtail%20wagtail&amp;severity=medium&amp;id=682d9842c4522896dcbf22b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-18-f12dcf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12dcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-17-f121c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f121c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-16-764034</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-16&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb764034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-16-f129ca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f129ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/msft-mstic-destructive-malware-targeting-ukrainian-organizations-f0c1aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MSFT%20-%20MSTIC%20-%20Destructive%20malware%20targeting%20Ukrainian%20organizations&amp;severity=low&amp;id=682acdbebbaf20d303f0c1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23095-n-a-in-n-a-bdbfd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23095%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-15-e683c4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-15&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e683c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-15-f12fb7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43752-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf20c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43752%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf20c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44700-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf216d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44700%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf216d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45051-use-after-free-cwe-416-in-adobe-bridge-bf2191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45051%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf2191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45052-out-of-bounds-read-cwe-125-in-adobe-bridge-bf2199</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45052%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf2199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44743-out-of-bounds-write-cwe-787-in-adobe-bridge-bf217e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44743%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf217e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21685-cwe-191-integer-underflow-wrap-or-wraparound-in-paritytech-frontier-bf22ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21685%3A%20CWE-191%3A%20Integer%20Underflow%20(Wrap%20or%20Wraparound)%20in%20paritytech%20frontier&amp;severity=medium&amp;id=682d9842c4522896dcbf22ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21677-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf228f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21677%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9842c4522896dcbf228f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32649-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-octobercms-october-bf2069</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32649%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=682d9841c4522896dcbf2069</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32650-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-octobercms-october-bf60b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32650%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20octobercms%20october&amp;severity=medium&amp;id=682d9848c4522896dcbf60b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-14-4ab3a327</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-14&amp;severity=medium&amp;id=68359c9d5d5f0974d01f6ff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21681-cwe-400-uncontrolled-resource-consumption-in-markedjs-marked-bf613a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21681%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20markedjs%20marked&amp;severity=medium&amp;id=682d9848c4522896dcbf613a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21680-cwe-400-uncontrolled-resource-consumption-in-markedjs-marked-bf6132</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21680%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20markedjs%20marked&amp;severity=medium&amp;id=682d9848c4522896dcbf6132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23219-n-a-in-n-a-bdbff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23219%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbff3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23218-n-a-in-n-a-bdbff1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23218%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbff1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-14-f1db95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-14&amp;severity=medium&amp;id=682acdc3bbaf20d303f1db95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-14-f125ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f125ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21684-cwe-287-improper-authentication-in-discourse-discourse-bf22b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21684%3A%20CWE-287%3A%20Improper%20Authentication%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9842c4522896dcbf22b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45059-use-after-free-cwe-416-in-adobe-indesign-bf21f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45059%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9842c4522896dcbf21f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45057-out-of-bounds-write-cwe-787-in-adobe-indesign-bf21e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45057%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9842c4522896dcbf21e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45058-out-of-bounds-write-cwe-787-in-adobe-indesign-bf21f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45058%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9842c4522896dcbf21f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45055-out-of-bounds-read-cwe-125-in-adobe-incopy-bf21b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45055%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9841c4522896dcbf21b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45056-out-of-bounds-write-cwe-787-in-adobe-incopy-bf21d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45056%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9842c4522896dcbf21d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45053-out-of-bounds-write-cwe-787-in-adobe-incopy-bf21a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45053%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9841c4522896dcbf21a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45054-use-after-free-cwe-416-in-adobe-incopy-bf21ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45054%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9841c4522896dcbf21ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21678-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf2297</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21678%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9842c4522896dcbf2297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercommalwarealert-muddywater-has-been-seen-usin-0c3cf128</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CYBERCOM_Malware_Alert%20-%20%20MuddyWater%20has%20been%20seen%20using%20a%20variety%20of%20techniques%20to%20maintain%20access%20to%20victim%20networks.&amp;severity=medium&amp;id=68359ca05d5f0974d01fc8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-01-13-92ffd2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-01-13&amp;severity=medium&amp;id=682b691bd14de609c892ffd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-13-f12f64</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cybercom-malware-alert-muddywater-has-been-seen-using-a-variety-of-techniques-to-maintain-access-to-victim-networks-f0eed6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CYBERCOM_Malware_Alert%20-%20%20MuddyWater%20has%20been%20seen%20using%20a%20variety%20of%20techniques%20to%20maintain%20access%20to%20victim%20networks.&amp;severity=medium&amp;id=682acdbebbaf20d303f0eed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21676-cwe-754-improper-check-for-unusual-or-exceptional-conditions-in-socketio-engine-io-bf2287</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21676%3A%20CWE-754%3A%20Improper%20Check%20for%20Unusual%20or%20Exceptional%20Conditions%20in%20socketio%20engine.io&amp;severity=medium&amp;id=682d9842c4522896dcbf2287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21675-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-konloch-bytecode-viewer-bf2274</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21675%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20Konloch%20bytecode-viewer&amp;severity=medium&amp;id=682d9842c4522896dcbf2274</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-12-f12801</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12801</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21646-cwe-155-improper-neutralization-of-wildcards-or-matching-symbols-in-authzed-spicedb-bf2217</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21646%3A%20CWE-155%3A%20Improper%20Neutralization%20of%20Wildcards%20or%20Matching%20Symbols%20in%20authzed%20spicedb&amp;severity=medium&amp;id=682d9842c4522896dcbf2217</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21671-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-replit-crosis-bf2257</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21671%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20replit%20crosis&amp;severity=medium&amp;id=682d9842c4522896dcbf2257</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37198-cwe-352-cross-site-request-forgery-csrf-in-siemens-comos-v10-2-2647be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37198%3A%20CWE-352%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Siemens%20COMOS%20V10.2&amp;severity=high&amp;id=682f725b0acd01a2492647be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21669-cwe-798-use-of-hard-coded-credentials-in-puddingbot-pudding-bot-bf224a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21669%3A%20CWE-798%3A%20Use%20of%20Hard-coded%20Credentials%20in%20PuddingBot%20pudding-bot&amp;severity=medium&amp;id=682d9842c4522896dcbf224a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-11-f12747</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12747</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21672-cwe-115-misinterpretation-of-input-in-lfs-book-make-ca-bf225b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21672%3A%20CWE-115%3A%20Misinterpretation%20of%20Input%20in%20lfs-book%20make-ca&amp;severity=medium&amp;id=682d9842c4522896dcbf225b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21670-cwe-400-uncontrolled-resource-consumption-in-markdown-it-markdown-it-bf612a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21670%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20markdown-it%20markdown-it&amp;severity=medium&amp;id=682d9848c4522896dcbf612a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21666-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-aaron-junker-usoc-bf2242</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21666%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aaron-Junker%20USOC&amp;severity=medium&amp;id=682d9842c4522896dcbf2242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-29454-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-smarty-php-smarty-bf2061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-29454%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20smarty-php%20smarty&amp;severity=medium&amp;id=682d9841c4522896dcbf2061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21408-cwe-20-improper-input-validation-in-smarty-php-smarty-bf2059</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21408%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20smarty-php%20smarty&amp;severity=medium&amp;id=682d9841c4522896dcbf2059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-10-f1262c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f1262c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-09-f126e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f126e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22822-n-a-in-n-a-bdbf73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22822%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbf73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22823-n-a-in-n-a-bdbf75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22823%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbf75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22824-n-a-in-n-a-bdbf79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22824%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbf79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22825-n-a-in-n-a-bdbf81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22825%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbf81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22826-n-a-in-n-a-bdbf85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22826%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbf85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-22827-n-a-in-n-a-bdbf8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-22827%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbf8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-08-f129e9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f129e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21667-cwe-755-improper-handling-of-exceptional-conditions-in-soketi-soketi-bf2246</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21667%3A%20CWE-755%3A%20Improper%20Handling%20of%20Exceptional%20Conditions%20in%20soketi%20soketi&amp;severity=medium&amp;id=682d9842c4522896dcbf2246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22569-cwe-696-incorrect-behavior-order-in-google-llc-protobuf-java-bf7ef0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22569%3A%20CWE-696%20Incorrect%20Behavior%20Order%20in%20Google%20LLC%20protobuf-java&amp;severity=medium&amp;id=682d984bc4522896dcbf7ef0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2022-01-07-875312</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202022-01-07&amp;severity=medium&amp;id=682b68f5d14de609c8875312</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-07-f12984</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21662-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-wordpress-wordpress-develop-bf223a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21662%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20WordPress%20wordpress-develop&amp;severity=medium&amp;id=682d9842c4522896dcbf223a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21663-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-wordpress-wordpress-develop-bf6115</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21663%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20WordPress%20wordpress-develop&amp;severity=medium&amp;id=682d9848c4522896dcbf6115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21664-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-wordpress-wordpress-develop-bf223e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21664%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20WordPress%20wordpress-develop&amp;severity=medium&amp;id=682d9842c4522896dcbf223e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28715-unknown-in-linux-linux-2647ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28715%3A%20unknown%20in%20Linux%20Linux&amp;severity=medium&amp;id=682f725b0acd01a2492647ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36739-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-apache-software-foundation-apache-portals-2647bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36739%3A%20CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20Apache%20Software%20Foundation%20Apache%20Portals&amp;severity=medium&amp;id=682f725b0acd01a2492647bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-46143-n-a-in-n-a-bdbc3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-46143%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbc3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-06-f12e7d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21653-cwe-400-uncontrolled-resource-consumption-in-typelevel-jawn-bf610d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21653%3A%20CWE-400%3A%20Uncontrolled%20Resource%20Consumption%20in%20typelevel%20jawn&amp;severity=medium&amp;id=682d9848c4522896dcbf610d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21652-cwe-613-insufficient-session-expiration-in-shopware-shopware-bf2236</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21652%3A%20CWE-613%3A%20Insufficient%20Session%20Expiration%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9842c4522896dcbf2236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21651-cwe-601-url-redirection-to-untrusted-site-open-redirect-in-shopware-shopware-bf2232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21651%3A%20CWE-601%3A%20URL%20Redirection%20to%20Untrusted%20Site%20(&apos;Open%20Redirect&apos;)%20in%20shopware%20shopware&amp;severity=medium&amp;id=682d9842c4522896dcbf2232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21642-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-discourse-discourse-bf2200</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21642%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9842c4522896dcbf2200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43816-cwe-281-improper-preservation-of-permissions-in-containerd-containerd-bf60ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43816%3A%20CWE-281%3A%20Improper%20Preservation%20of%20Permissions%20in%20containerd%20containerd&amp;severity=medium&amp;id=682d9848c4522896dcbf60ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43779-cwe-20-improper-input-validation-in-pluginsglpi-addressing-bf60e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43779%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20pluginsGLPI%20addressing&amp;severity=medium&amp;id=682d9848c4522896dcbf60e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22567-cwe-284-improper-access-control-in-google-llc-dart-sdk-bf7eec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22567%3A%20CWE-284%20Improper%20Access%20Control%20in%20Google%20LLC%20Dart%20SDK&amp;severity=medium&amp;id=682d984bc4522896dcbf7eec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-05-f11fa6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45116-n-a-in-n-a-2647d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45116%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f725b0acd01a2492647d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21649-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-convos-chat-convos-bf60fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21649%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20convos-chat%20convos&amp;severity=medium&amp;id=682d9848c4522896dcbf60fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21650-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-convos-chat-convos-bf6100</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21650%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20convos-chat%20convos&amp;severity=medium&amp;id=682d9848c4522896dcbf6100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21648-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-nette-latte-bf221f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21648%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20nette%20latte&amp;severity=medium&amp;id=682d9842c4522896dcbf221f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21647-cwe-502-deserialization-of-untrusted-data-in-codeigniter4-codeigniter4-bf221b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21647%3A%20CWE-502%3A%20Deserialization%20of%20Untrusted%20Data%20in%20codeigniter4%20CodeIgniter4&amp;severity=medium&amp;id=682d9842c4522896dcbf221b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21644-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-aaron-junker-usoc-bf2211</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21644%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aaron-Junker%20USOC&amp;severity=medium&amp;id=682d9842c4522896dcbf2211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21643-cwe-89-improper-neutralization-of-special-elements-used-in-an-sql-command-sql-injection-in-aaron-junker-usoc-bf220f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21643%3A%20CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20(&apos;SQL%20Injection&apos;)%20in%20Aaron-Junker%20USOC&amp;severity=medium&amp;id=682d9842c4522896dcbf220f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43852-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-oroinc-platform-bf210b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43852%3A%20CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20oroinc%20platform&amp;severity=medium&amp;id=682d9841c4522896dcbf210b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43850-cwe-20-improper-input-validation-in-discourse-discourse-bf60f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43850%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20discourse%20discourse&amp;severity=medium&amp;id=682d9848c4522896dcbf60f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43832-cwe-306-missing-authentication-for-critical-function-in-spinnaker-spinnaker-bf20fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43832%3A%20CWE-306%3A%20Missing%20Authentication%20for%20Critical%20Function%20in%20spinnaker%20spinnaker&amp;severity=medium&amp;id=682d9841c4522896dcbf20fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41236-cwe-79-improper-neutralization-of-input-during-web-page-generation-cross-site-scripting-in-oroinc-platform-bf209d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41236%3A%20CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(&apos;Cross-site%20Scripting&apos;)%20in%20oroinc%20platform&amp;severity=medium&amp;id=682d9841c4522896dcbf209d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24042-heap-based-buffer-overflow-cwe-122-in-facebook-whatsapp-desktop-2647a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24042%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Facebook%20WhatsApp%20Desktop&amp;severity=critical&amp;id=682f725b0acd01a2492647a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39143-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-spinnaker-spinnaker-bf60d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39143%3A%20CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20spinnaker%20spinnaker&amp;severity=medium&amp;id=682d9848c4522896dcbf60d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20019-information-disclosure-in-mediatek-inc-mt6595-mt6735-mt6737-mt6739-mt6750-mt6750s-mt6753-mt6755-mt6755s-mt6757-mt6757c-mt6757cd-mt6757ch-mt6758-mt6761-mt6762-mt6763-mt6765-mt6768-mt6769-mt6771-mt6779-mt6781-mt6785-mt6795-mt6797-mt6799-mt6833-mt6853-mt6853t-mt6873-mt6875-mt6877-mt6883-mt6885-mt6889-mt6891-mt6893-mt8768-264878</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20019%3A%20Information%20Disclosure%20in%20MediaTek%2C%20Inc.%20MT6595%2C%20MT6735%2C%20MT6737%2C%20MT6739%2C%20MT6750%2C%20MT6750S%2C%20MT6753%2C%20MT6755%2C%20MT6755S%2C%20MT6757%2C%20MT6757C%2C%20MT6757CD%2C%20MT6757CH%2C%20MT6758%2C%20MT6761%2C%20MT6762%2C%20MT6763%2C%20MT6765%2C%20MT6768%2C%20MT6769%2C%20MT6771%2C%20MT6779%2C%20MT6781%2C%20MT6785%2C%20MT6795%2C%20MT6797%2C%20MT6799%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6873%2C%20MT6875%2C%20MT6877%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT8768&amp;severity=medium&amp;id=682f76020acd01a249264878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-20014-elevation-of-privilege-in-mediatek-inc-mt6781-mt6785-mt6833-mt6853-mt6853t-mt6873-mt6877-mt6883-mt6885-mt6889-mt6891-mt6893-mt8183-mt8185-mt8385-mt8788-mt8789-264876</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-20014%3A%20Elevation%20of%20Privilege%20in%20MediaTek%2C%20Inc.%20MT6781%2C%20MT6785%2C%20MT6833%2C%20MT6853%2C%20MT6853T%2C%20MT6873%2C%20MT6877%2C%20MT6883%2C%20MT6885%2C%20MT6889%2C%20MT6891%2C%20MT6893%2C%20MT8183%2C%20MT8185%2C%20MT8385%2C%20MT8788%2C%20MT8789&amp;severity=medium&amp;id=682f76020acd01a249264876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41141-cwe-667-improper-locking-in-pjsip-pjproject-bf2079</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41141%3A%20CWE-667%3A%20Improper%20Locking%20in%20pjsip%20pjproject&amp;severity=medium&amp;id=682d9841c4522896dcbf2079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-04-f122ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f122ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39967-improper-broadcast-permission-settings-in-huawei-emui-26486c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39967%3A%20Improper%20broadcast%20permission%20settings%20in%20Huawei%20EMUI&amp;severity=high&amp;id=682f76020acd01a24926486c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37133-unauthorized-file-access-vulnerability-in-huawei-emui-26486a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37133%3A%20Unauthorized%20file%20access%20vulnerability%20in%20Huawei%20EMUI&amp;severity=high&amp;id=682f76020acd01a24926486a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39990-stack-based-buffer-overflow-in-huawei-harmonyos-264874</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39990%3A%20Stack-based%20Buffer%20Overflow%20in%20Huawei%20HarmonyOS&amp;severity=critical&amp;id=682f76020acd01a249264874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39989-exposure-of-sensitive-information-to-an-unauthorized-actor-in-huawei-harmonyos-264872</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39989%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f76020acd01a249264872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39988-null-pointer-dereference-in-huawei-harmonyos-264870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39988%3A%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f76020acd01a249264870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39987-data-processing-errors-in-huawei-harmonyos-26486e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39987%3A%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f76020acd01a24926486e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39985-improper-validation-of-array-index-in-huawei-harmonyos-2647c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39985%3A%20Improper%20Validation%20of%20Array%20Index%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f725b0acd01a2492647c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39984-out-of-bounds-read-in-huawei-harmonyos-2647c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39984%3A%20Out-of-bounds%20Read%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f725b0acd01a2492647c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39983-data-processing-errors-in-huawei-harmonyos-2647c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39983%3A%20Data%20Processing%20Errors%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f725b0acd01a2492647c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39977-null-pointer-dereference-in-huawei-harmonyos-2647c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39977%3A%20NULL%20Pointer%20Dereference%20in%20Huawei%20HarmonyOS&amp;severity=high&amp;id=682f725b0acd01a2492647c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25022-cwe-79-cross-site-scripting-xss-in-unknown-updraftplus-wordpress-backup-plugin-2647b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25022%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Unknown%20UpdraftPlus%20WordPress%20Backup%20Plugin&amp;severity=medium&amp;id=682f725b0acd01a2492647b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24964-cwe-79-cross-site-scripting-xss-in-unknown-litespeed-cache-2647b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24964%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Unknown%20LiteSpeed%20Cache&amp;severity=medium&amp;id=682f725b0acd01a2492647b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24786-cwe-89-sql-injection-in-unknown-download-monitor-2647b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24786%3A%20CWE-89%20SQL%20Injection%20in%20Unknown%20Download%20Monitor&amp;severity=high&amp;id=682f725b0acd01a2492647b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-30337-use-after-free-in-dsp-services-in-qualcomm-inc-snapdragon-auto-snapdragon-compute-snapdragon-connectivity-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-snapdragon-voice-music-snapdragon-wearables-snapdragon-wired-infrastructure-and-networking-261dfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-30337%3A%20Use%20After%20Free%20in%20DSP%20Services%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&amp;severity=high&amp;id=682f3d940acd01a249261dfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-1918-information-exposure-in-kernel-in-qualcomm-inc-snapdragon-consumer-iot-snapdragon-industrial-iot-snapdragon-mobile-2647a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-1918%3A%20Information%20Exposure%20in%20Kernel%20in%20Qualcomm%2C%20Inc.%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile&amp;severity=medium&amp;id=682f725b0acd01a2492647a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-03-761f9e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-03&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb761f9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-03-f13137</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f13137</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0080-cwe-122-heap-based-buffer-overflow-in-mruby-mruby-mruby-261dfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0080%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20mruby%20mruby%2Fmruby&amp;severity=high&amp;id=682f3d940acd01a249261dfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-02-f12156</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f12156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-45960-n-a-in-n-a-bdbc3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-45960%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbc3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41819-n-a-in-n-a-261dfc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41819%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682f3d940acd01a249261dfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-01-765f5d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-01&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb765f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2022-01-01-f1306f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202022-01-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f1306f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-31-f12f26</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-31&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-30-f13094</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-30&amp;severity=medium&amp;id=682acdc2bbaf20d303f13094</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25993-cwe-79-cross-site-scripting-xss-in-requarks-wiki-bedd5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25993%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Requarks%20wiki&amp;severity=medium&amp;id=682d983bc4522896dcbedd5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25991-cwe-284-improper-access-control-in-ifmeorg-ifme-bedd51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25991%3A%20CWE-284%20Improper%20Access%20Control%20in%20ifmeorg%20ifme&amp;severity=medium&amp;id=682d983bc4522896dcbedd51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25990-cwe-79-cross-site-scripting-xss-in-ifmeorg-ifme-bedd34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25990%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20ifmeorg%20ifme&amp;severity=medium&amp;id=682d983bc4522896dcbedd34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25989-cwe-79-cross-site-scripting-xss-in-ifmeorg-ifme-bedd30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25989%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20ifmeorg%20ifme&amp;severity=medium&amp;id=682d983bc4522896dcbedd30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25988-cwe-79-cross-site-scripting-xss-in-ifmeorg-ifme-bedd2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25988%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20ifmeorg%20ifme&amp;severity=medium&amp;id=682d983bc4522896dcbedd2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-29-f123fe</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f123fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-28-f12975</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12975</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-27-f12b44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-26-f1298e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f1298e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-25-f24c6d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-25&amp;severity=medium&amp;id=682acdc4bbaf20d303f24c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-25-f130ce</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-25&amp;severity=medium&amp;id=682acdc2bbaf20d303f130ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-24-eafd80</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-24&amp;severity=medium&amp;id=682b7babd3ddd8cef2eafd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-24-f1256e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f1256e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-23-f12914</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12914</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-22-f121a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f121a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-21-f12c2e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44697-out-of-bounds-read-cwe-125-in-adobe-audition-bf2155</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44697%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9841c4522896dcbf2155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44698-out-of-bounds-read-cwe-125-in-adobe-audition-bf215d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44698%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9841c4522896dcbf215d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44699-out-of-bounds-read-cwe-125-in-adobe-audition-bf2165</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44699%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9841c4522896dcbf2165</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44181-out-of-bounds-write-cwe-787-in-adobe-dimension-bf212b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44181%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf212b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44180-out-of-bounds-write-cwe-787-in-adobe-dimension-bf2123</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44180%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf2123</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44183-out-of-bounds-read-cwe-125-in-adobe-dimension-bf2135</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44183%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf2135</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44182-out-of-bounds-read-cwe-125-in-adobe-dimension-bf212f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44182%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43763-out-of-bounds-read-cwe-125-in-adobe-dimension-bf20d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43763%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf20d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44179-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-dimension-bf211b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44179%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf211b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43746-access-of-uninitialized-pointer-cwe-824-in-adobe-premiere-rush-bf20b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43746%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf20b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43750-null-pointer-dereference-cwe-476-in-adobe-premiere-rush-bf20c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43750%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf20c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43023-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-bf20a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43023%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9841c4522896dcbf20a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43025-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-bf20a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43025%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9841c4522896dcbf20a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43030-access-of-uninitialized-pointer-cwe-824-in-adobe-premiere-rush-bf20b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43030%3A%20Access%20of%20Uninitialized%20Pointer%20(CWE-824)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf20b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43749-null-pointer-dereference-cwe-476-in-adobe-premiere-rush-bf20ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43749%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf20ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40784-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf2071</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40784%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf2071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43748-null-pointer-dereference-cwe-476-in-adobe-premiere-rush-bf200a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43748%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf200a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43024-out-of-bounds-write-cwe-787-in-adobe-premiere-rush-bf1ff6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43024%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf1ff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43022-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf1ff2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43022%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf1ff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43747-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf2006</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43747%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf2006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43021-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf1fe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43021%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf1fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43029-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf2002</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43029%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf2002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43028-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf1ffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43028%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf1ffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40783-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf1e9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40783%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf1e9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43026-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-rush-bf1ffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43026%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere%20Rush&amp;severity=medium&amp;id=682d9841c4522896dcbf1ffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-20-f1230a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1230a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-19-f11fc1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-18-f12b3e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44035-na-in-na-f925d0e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44035%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serverless-infostealer-delivered-in-est-european-countries-7733f0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serverless%20InfoStealer%20delivered%20in%20Est%20European%20Countries&amp;severity=high&amp;id=682c7ad2e3e6de8ceb7733f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-17-f12a63</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/serverless-infostealer-delivered-in-est-european-countries-f0c260</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Serverless%20InfoStealer%20delivered%20in%20Est%20European%20Countries&amp;severity=high&amp;id=682acdbebbaf20d303f0c260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-16-742804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-16&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb742804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-16-f12499</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12499</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-15-f12308</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-14-f11f64</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-13-7508f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-13&amp;severity=medium&amp;id=682c7abce3e6de8ceb7508f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-12-13-8e12f0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-12-13&amp;severity=medium&amp;id=682b690ad14de609c88e12f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-13-f124d9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f124d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-12-ebc58d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-12&amp;severity=medium&amp;id=682b7badd3ddd8cef2ebc58d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-12-f12442</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-11-f12098</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12098</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-10-f120cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f120cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-09-f29330</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-09&amp;severity=medium&amp;id=682acdc5bbaf20d303f29330</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-09-f12afc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43978-na-in-na-2f7d6320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43978%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42110-na-in-na-4eead65a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42110%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-08-f128bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f128bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44185-out-of-bounds-read-cwe-125-in-adobe-bridge-bf200e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44185%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf200e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44186-out-of-bounds-read-cwe-125-in-adobe-bridge-bf202b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44186%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf202b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-44187-out-of-bounds-read-cwe-125-in-adobe-bridge-bf2033</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-44187%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf2033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-07-f12c0f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-06-751537</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-06&amp;severity=medium&amp;id=682c7abce3e6de8ceb751537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-06-f127a2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f127a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-05-f1231f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f1231f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-04-f12a50</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-03-f13092</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f13092</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-02-f12a6f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25967-cwe-79-cross-site-scripting-xss-in-ckan-ckan-bedcc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25967%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20ckan%20ckan&amp;severity=medium&amp;id=682d983bc4522896dcbedcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-12-01-f12d66</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-12-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25987-cwe-79-cross-site-scripting-xss-in-hexo-hexo-bedd28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25987%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Hexo%20Hexo&amp;severity=medium&amp;id=682d983bc4522896dcbedd28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-30-f12570</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12570</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-29-f12622</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-28-f12c74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-27-f124f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f124f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-26-f124ba</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f124ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-25-f127d6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-24-f1267d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f1267d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25986-cwe-79-cross-site-scripting-xss-in-django-wiki-django-wiki-bedd17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25986%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Django-wiki%20Django-wiki&amp;severity=medium&amp;id=682d983bc4522896dcbedd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43019-incorrect-permission-assignment-for-critical-resource-cwe-732-in-adobe-creative-cloud-desktop-component-bf1fd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43019%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20(CWE-732)%20in%20Adobe%20Creative%20Cloud%20(desktop%20component)&amp;severity=medium&amp;id=682d9841c4522896dcbf1fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-23-e65710</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-23&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e65710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-23-f121b5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f121b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43016-null-pointer-dereference-cwe-476-in-adobe-incopy-bf1fad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43016%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9841c4522896dcbf1fad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43015-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-incopy-bf1fa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43015%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9841c4522896dcbf1fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42738-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1f7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42738%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42737-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1f7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42737%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42733-null-pointer-dereference-cwe-476-in-adobe-bridge-bf1f73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42733%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1f73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40775-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1e7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40775%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1e7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40774-null-pointer-dereference-cwe-476-in-adobe-prelude-bf1e73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40774%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40773-null-pointer-dereference-cwe-476-in-adobe-prelude-bf1e6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40773%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40772-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1e69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40772%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40770-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1e5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40770%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1e5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-11-22-1d9a72</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-11-22&amp;severity=medium&amp;id=682b69bc52745a861d1d9a72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-22-f12668</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12668</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-21-f12bc4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-20-f12fc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36003-out-of-bounds-read-cwe-125-in-adobe-audition-bf1d71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36003%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Audition&amp;severity=medium&amp;id=682d9841c4522896dcbf1d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-19-ff7caebe</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-19&amp;severity=medium&amp;id=68359c9d5d5f0974d01f4160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-19-f1d739</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-19&amp;severity=medium&amp;id=682acdc3bbaf20d303f1d739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-19-f12c97</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43017-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-gocart-bf1fb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43017%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20GoCart&amp;severity=medium&amp;id=682d9841c4522896dcbf1fb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42524-out-of-bounds-write-cwe-787-in-adobe-animate-bf1f3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42524%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42272-out-of-bounds-write-cwe-787-in-adobe-animate-bf1ed0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42272%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42271-out-of-bounds-write-cwe-787-in-adobe-animate-bf1ecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42271%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42270-out-of-bounds-write-cwe-787-in-adobe-animate-bf1ec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42270%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42269-use-after-free-cwe-416-in-adobe-animate-bf1ec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42269%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42268-null-pointer-dereference-cwe-476-in-adobe-animate-bf1ec0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42268%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42267-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-animate-bf1ebe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42267%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42266-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-animate-bf1ebc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42266%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40733-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-animate-bf1ddc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40733%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1ddc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40761-null-pointer-dereference-cwe-476-in-adobe-after-effects-bf1e56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40761%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40760-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1e52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40760%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40759-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1e4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40759%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40758-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1e3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40758%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40757-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1e33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40757%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40756-null-pointer-dereference-cwe-476-in-adobe-after-effects-bf1e12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40756%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40755-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1e0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40755%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40754-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1e01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40754%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1e01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40753-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1dfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40753%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1dfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40752-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1df9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40752%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40751-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1df5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40751%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1df5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-18-f12c32</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40745-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-campaign-bf1de4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40745%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Campaign&amp;severity=medium&amp;id=682d9841c4522896dcbf1de4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-17-f12d13</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43011-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1f8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43011%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1f8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43012-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1f9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43012%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42731-buffer-overflow-cwe-120-in-adobe-indesign-bf1f6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42731%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9841c4522896dcbf1f6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43013-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-media-encoder-bf1f9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43013%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf1f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25985-cwe-613-insufficient-session-expiration-in-factorjs-factor-bedd0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25985%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20FactorJS%20Factor&amp;severity=high&amp;id=682d983bc4522896dcbedd0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25984-cwe-79-cross-site-scripting-xss-in-factorjs-factor-bedd07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25984%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20FactorJS%20Factor&amp;severity=medium&amp;id=682d983bc4522896dcbedd07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25983-cwe-79-cross-site-scripting-xss-in-factorjs-factor-bedd03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25983%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20FactorJS%20Factor&amp;severity=medium&amp;id=682d983bc4522896dcbedd03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25982-cwe-79-cross-site-scripting-xss-in-factorjs-factor-bedcff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25982%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20FactorJS%20Factor&amp;severity=medium&amp;id=682d983bc4522896dcbedcff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25940-cwe-613-insufficient-session-expiration-in-arangodb-arangodb-bedcb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25940%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20arangodb%20arangodb&amp;severity=high&amp;id=682d983bc4522896dcbedcb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25965-cwe-352-cross-site-request-forgery-csrf-in-calibreweb-calibreweb-bedcbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25965%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20calibreweb%20calibreweb&amp;severity=high&amp;id=682d983bc4522896dcbedcbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25976-cwe-352-cross-site-request-forgery-csrf-in-piranhacms-piranha-bedcd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25976%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20PiranhaCMS%20Piranha&amp;severity=high&amp;id=682d983bc4522896dcbedcd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-16-f12873</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22959-http-request-smuggling-cwe-444-in-nodejs-node-bed46b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22959%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42386-cwe-416-in-busybox-busybox-bf1f37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42386%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42385-cwe-416-in-busybox-busybox-bf1f2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42385%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42384-cwe-416-in-busybox-busybox-bf1f27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42384%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42383-cwe-416-in-busybox-busybox-bf1f23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42383%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42382-cwe-416-in-busybox-busybox-bf1f1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42382%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42381-cwe-416-in-busybox-busybox-bf1f1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42381%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42380-cwe-416-in-busybox-busybox-bf1f0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42380%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1f0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42379-cwe-416-in-busybox-busybox-bf1efb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42379%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1efb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42378-cwe-416-in-busybox-busybox-bf1ef3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42378%3A%20CWE-416%20in%20busybox%20busybox&amp;severity=high&amp;id=682d9841c4522896dcbf1ef3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42375-cwe-159-in-busybox-busybox-bf1ed4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42375%3A%20CWE-159%20in%20busybox%20busybox&amp;severity=medium&amp;id=682d9841c4522896dcbf1ed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42374-cwe-125-in-busybox-busybox-bdbbfe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42374%3A%20CWE-125%20in%20busybox%20busybox&amp;severity=medium&amp;id=682d981ec4522896dcbdbbfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-15-f12378</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12378</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-14-f126dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f126dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-13-f130b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f130b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-12-f12cf6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25980-cwe-74-improper-neutralization-of-special-elements-in-output-used-by-a-downstream-component-injection-in-debiki-talkyard-bedcee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25980%3A%20CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20(&apos;Injection&apos;)%20in%20debiki%20talkyard&amp;severity=high&amp;id=682d983bc4522896dcbedcee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-11-f12a46</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-42111-na-in-na-6b339c22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-42111%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43523-n-a-in-n-a-bdbc19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43523%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981ec4522896dcbdbc19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25975-cwe-79-cross-site-scripting-xss-in-publify-core-publify-core-bedc6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25975%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20publify_core%20publify_core&amp;severity=medium&amp;id=682d983bc4522896dcbedc6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25974-cwe-79-cross-site-scripting-xss-in-publify-core-publify-core-bedc5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25974%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20publify_core%20publify_core&amp;severity=medium&amp;id=682d983bc4522896dcbedc5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-10-f129ce</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f129ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-09-f1241b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1241b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25979-cwe-613-insufficient-session-expiration-in-apostrophe-apostrophe-bedc78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25979%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20Apostrophe%20Apostrophe&amp;severity=critical&amp;id=682d983bc4522896dcbedc78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-08-f121e5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f121e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25978-cwe-79-cross-site-scripting-xss-in-apostrophe-apostrophe-bedc76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25978%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Apostrophe%20Apostrophe&amp;severity=medium&amp;id=682d983bc4522896dcbedc76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-07-f12b21</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-06-f12a00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3774-cwe-319-cleartext-transmission-of-sensitive-information-in-meross-meross-smart-wi-fi-2-way-wall-switch-bf1d7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3774%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Meross%20Meross%20Smart%20Wi-Fi%202%20Way%20Wall%20Switch&amp;severity=medium&amp;id=682d9841c4522896dcbf1d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-05-f12282</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f12282</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-04-f127b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f127b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22960-http-request-smuggling-cwe-444-in-nodejs-node-bed48f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22960%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed48f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-03-f1243c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1243c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25973-cwe-285-improper-authorization-in-publify-core-publify-core-bedc57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25973%3A%20CWE-285%20Improper%20Authorization%20in%20publify_core%20publify_core&amp;severity=medium&amp;id=682d983bc4522896dcbedc57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-02-f1314a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f1314a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-campagnes-d-hame-onnage-du-mode-op-ratoire-d-attaquants-nobelium-f0c1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCERT-FR%5D%20Campagnes%20d&apos;hame%C3%A7onnage%20du%20mode%20op%C3%A9ratoire%20d&apos;attaquants%20Nobelium&amp;severity=low&amp;id=682acdbebbaf20d303f0c1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-11-01-f12f94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-11-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-10-31-17a8e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-10-31&amp;severity=medium&amp;id=682b69aa52745a861d17a8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-31-f124fc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f124fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-30-f12e45</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-29-e68630</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-29&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e68630</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-29-f1290a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f1290a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-28-f125aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f125aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-27-75f7c9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-27&amp;severity=medium&amp;id=682c7abfe3e6de8ceb75f7c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-27-f12363</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12363</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-26-f1262a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f1262a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25977-cwe-79-cross-site-scripting-xss-in-piranhacms-piranha-bedc72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25977%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20PiranhaCMS%20Piranha&amp;severity=medium&amp;id=682d983bc4522896dcbedc72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-25-f127d2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f127d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-24-f12896</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12896</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-discovered-in-popular-npm-package-ua-parser-js-f0c1a4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Discovered%20in%20Popular%20NPM%20Package%2C%20ua-parser-js&amp;severity=medium&amp;id=682acdbebbaf20d303f0c1a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-23-f12cdb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12cdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-22-f12532</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12532</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40719-deserialization-of-untrusted-data-cwe-502-in-adobe-connect-bf1d8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40719%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Adobe%20Connect&amp;severity=medium&amp;id=682d9841c4522896dcbf1d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-21-76a18a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-21&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76a18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-21-f12470</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f12470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25972-cwe-918-server-side-request-forgery-ssrf-in-camaleon-cms-camaleon-cms-bedc15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25972%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20camaleon_cms%20camaleon_cms&amp;severity=medium&amp;id=682d983bc4522896dcbedc15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25971-cwe-248-uncaught-exception-in-camaleon-cms-camaleon-cms-bedc0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25971%3A%20CWE-248%20Uncaught%20Exception%20in%20camaleon_cms%20camaleon_cms&amp;severity=medium&amp;id=682d983bc4522896dcbedc0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25970-cwe-613-insufficient-session-expiration-in-camaleon-cms-camaleon-cms-bedc0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25970%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20camaleon_cms%20camaleon_cms&amp;severity=high&amp;id=682d983bc4522896dcbedc0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25969-cwe-79-cross-site-scripting-xss-in-camaleon-cms-camaleon-cms-bedc09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25969%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20camaleon_cms%20camaleon_cms&amp;severity=medium&amp;id=682d983bc4522896dcbedc09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-20-f1224c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1224c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25968-cwe-79-cross-site-scripting-xss-in-org-opencms-opencms-core-bedb97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25968%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20org.opencms%20opencms-core&amp;severity=medium&amp;id=682d983bc4522896dcbedb97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-19-f128ed</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f128ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-18-f12eaa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12eaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-17-f12854</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-16-f120ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f120ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41320-na-in-na-13d1d069</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41320%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40721-cross-site-scripting-reflected-xss-cwe-79-in-adobe-connect-bf1d93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40721%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Connect&amp;severity=medium&amp;id=682d9841c4522896dcbf1d93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40731-out-of-bounds-write-cwe-787-in-adobe-acrobat-reader-bf1dd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40731%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9841c4522896dcbf1dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40728-use-after-free-cwe-416-in-adobe-acrobat-reader-bf1da4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40728%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9841c4522896dcbf1da4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40730-use-after-free-cwe-416-in-adobe-acrobat-reader-bf1dca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40730%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9841c4522896dcbf1dca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40729-out-of-bounds-read-cwe-125-in-adobe-acrobat-reader-bf1da8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40729%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9841c4522896dcbf1da8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39864-cross-site-request-forgery-csrf-cwe-352-in-adobe-magento-commerce-bf1d75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39864%3A%20Cross-Site%20Request%20Forgery%20(CSRF)%20(CWE-352)%20in%20Adobe%20Magento%20Commerce&amp;severity=medium&amp;id=682d9841c4522896dcbf1d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-15-76339a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-15&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb76339a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-15-f12077</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-14-f127b9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f127b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-13-f1263f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f1263f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41136-cwe-444-inconsistent-interpretation-3cbcbbb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41136%3A%20CWE-444%3A%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20(&apos;HTTP%20Request%2FResponse%20Smuggling&apos;)%20in%20puma%20puma&amp;severity=low&amp;id=6835da20182aa0cae217e589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-12-f12c8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-11-f12bd3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25966-cwe-613-insufficient-session-expiration-in-orchardcore-users-bedb25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25966%3A%20CWE-613%20Insufficient%20Session%20Expiration%20in%20OrchardCore%20Users&amp;severity=high&amp;id=682d983bc4522896dcbedb25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-10-ebc0e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-10&amp;severity=medium&amp;id=682b7badd3ddd8cef2ebc0e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-10-f128f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f128f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-09-f12f43</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-08-f12417</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22930-use-after-free-cwe-416-in-nodejs-node-bed44b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22930%3A%20Use%20After%20Free%20(CWE-416)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-07-f128b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f128b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-06-f12a06</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-05-f1283b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f1283b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/uefi-threats-moving-to-the-esp-introducing-especter-bootkit-f0c1a6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=UEFI%20threats%20moving%20to%20the%20ESP%3A%20Introducing%20ESPecter%20bootkit&amp;severity=low&amp;id=682acdbebbaf20d303f0c1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38618-na-in-na-08c33ada</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38618%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25964-cwe-79-cross-site-scripting-xss-in-ozzieisaacs-calibreweb-bedb1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25964%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20OzzieIsaacs%20calibreweb&amp;severity=medium&amp;id=682d983bc4522896dcbedb1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-04-f13108</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-04&amp;severity=medium&amp;id=682acdc2bbaf20d303f13108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-03-f1306b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f1306b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-10-02-23474c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-10-02&amp;severity=medium&amp;id=682b69ce52745a861d23474c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-02-f120eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f120eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-10-01-f12971</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-10-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12971</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-41616-cwe-502-deserialization-of-untrusted-data-in-apache-software-foundation-apache-db-ddlutils-bf1eba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-41616%3A%20CWE-502%20Deserialization%20of%20Untrusted%20Data%20in%20Apache%20Software%20Foundation%20Apache%20DB%20ddlutils&amp;severity=critical&amp;id=682d9841c4522896dcbf1eba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25963-cwe-79-cross-site-scripting-xss-in-shuup-shuup-bedb15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25963%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20shuup%20shuup&amp;severity=medium&amp;id=682d983bc4522896dcbedb15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-30-f12a88</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-30&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28547-improper-input-validation-cwe-20-in-adobe-creative-cloud-desktop-component-bf1d6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28547%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Creative%20Cloud%20(desktop%20component)&amp;severity=medium&amp;id=682d9841c4522896dcbf1d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40697-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf1d83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40697%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39857-information-exposure-cwe-200-in-adobe-acrobat-reader-bf1d03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39857%3A%20Information%20Exposure%20(CWE-200)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9841c4522896dcbf1d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39835-use-after-free-cwe-416-in-adobe-framemaker-bf1cd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39835%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39829-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf1c9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39829%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39832-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-framemaker-bf1cbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39832%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1cbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39834-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf1ccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39834%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39830-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-framemaker-bf1ca6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39830%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1ca6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39833-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf1cc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39833%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1cc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39831-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf1cb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39831%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1cb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39821-out-of-bounds-read-cwe-125-in-adobe-indesign-bf1c85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39821%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9841c4522896dcbf1c85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-29-f12553</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12553</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-09-28-953505</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-09-28&amp;severity=medium&amp;id=682b6921d14de609c8953505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-28-f12587</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-20035-cwe-78-improper-neutralization-of-s-42894052</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-20035%3A%20CWE-78%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20in%20SonicWall%20SMA100&amp;severity=medium&amp;id=684345db71f4d251b5dc11eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40712-improper-input-validation-cwe-20-in-adobe-experience-manager-bf1d1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40712%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1d1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40714-cross-site-scripting-reflected-xss-cwe-79-in-adobe-experience-manager-bf1d24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40714%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1d24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40709-buffer-overflow-cwe-120-in-adobe-photoshop-bf1d14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40709%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9841c4522896dcbf1d14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39828-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-digital-editions-bf1c8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39828%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Digital%20Editions&amp;severity=medium&amp;id=682d9841c4522896dcbf1c8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40713-improper-certificate-validation-cwe-295-in-adobe-experience-manager-bf1d20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40713%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40711-cross-site-scripting-stored-xss-cwe-79-in-adobe-experience-manager-bf1d18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40711%3A%20Cross-site%20Scripting%20(Stored%20XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-27-f12bb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-26-f122a5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-26&amp;severity=medium&amp;id=682acdc0bbaf20d303f122a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-25-f128f9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f128f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/oint-hunting-the-lockbit-gang-s-exfiltration-infrastructures-777d88</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OINT%20-%20Hunting%20the%20LockBit%20Gang&apos;s%20Exfiltration%20Infrastructures&amp;severity=high&amp;id=682c7adbe3e6de8ceb777d88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-24-f12689</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-24&amp;severity=medium&amp;id=682acdc0bbaf20d303f12689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tinyturla-turla-deploys-new-malware-to-keep-a-secret-backdoor-on-victim-machines-f0c1a0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TinyTurla%20-%20Turla%20deploys%20new%20malware%20to%20keep%20a%20secret%20backdoor%20on%20victim%20machines&amp;severity=high&amp;id=682acdbebbaf20d303f0c1a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22005-file-upload-vulnerability-in-vmware-55508426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22005%3A%20File%20upload%20vulnerability%20in%20VMware%20vCenter%20Server%2C%20VMware%20Cloud%20Foundation&amp;severity=critical&amp;id=68487f521b0bd07c39389ce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22945-double-free-cwe-415-in-httpsgithubc-e4761000</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22945%3A%20Double%20Free%20(CWE-415)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=critical&amp;id=68487f5e1b0bd07c3938feff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-23-76b6ac</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-23&amp;severity=medium&amp;id=682c7ac2e3e6de8ceb76b6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-23-f12f05</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12f05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-22-f12f1e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-22&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-09-21-86891b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-09-21&amp;severity=medium&amp;id=682b68f3d14de609c886891b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-21-f122e3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f122e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-20-f1212f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1212f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-19-e653c7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-19&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e653c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-19-f12f62</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-19&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-09-18-81009f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-09-18&amp;severity=medium&amp;id=682b68e2d14de609c881009f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-18-f12f39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38404-cwe-122-heap-based-buffer-overflow-in-delta-electronics-dopsoft-2-bf1c5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38404%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20DOPSoft%202&amp;severity=medium&amp;id=682d9841c4522896dcbf1c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38402-cwe-121-stack-based-buffer-overflow-in-delta-electronics-dopsoft-2-bf1c4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38402%3A%20CWE-121%20Stack-based%20Buffer%20Overflow%20in%20Delta%20Electronics%20DOPSoft%202&amp;severity=medium&amp;id=682d9841c4522896dcbf1c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38406-cwe-787-out-of-bounds-write-in-delt-f4a5413a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38406%3A%20CWE-787%20Out-of-bounds%20Write%20in%20Delta%20Electronics%20DOPSoft%202&amp;severity=high&amp;id=68487f521b0bd07c39389cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-17-f28916</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-17&amp;severity=medium&amp;id=682acdc5bbaf20d303f28916</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-17-f11fff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-m-ris-botnet-f0c19e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20M%C4%93ris%20botnet&amp;severity=high&amp;id=682acdbebbaf20d303f0c19e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-16-f1207d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f1207d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-15-f126c3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f126c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37193-cwe-471-modification-of-assumed-immutable-data-maid-in-siemens-sinema-remote-connect-server-bf1c4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37193%3A%20CWE-471%3A%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d9841c4522896dcbf1c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37192-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-siemens-sinema-remote-connect-server-bf1c3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37192%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d9841c4522896dcbf1c3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37191-cwe-799-improper-control-of-interaction-frequency-in-siemens-sinema-remote-connect-server-bf1c32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37191%3A%20CWE-799%3A%20Improper%20Control%20of%20Interaction%20Frequency%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d9841c4522896dcbf1c32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37190-cwe-200-exposure-of-sensitive-information-to-an-unauthorized-actor-in-siemens-sinema-remote-connect-server-bf1c2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37190%3A%20CWE-200%3A%20Exposure%20of%20Sensitive%20Information%20to%20an%20Unauthorized%20Actor%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d9841c4522896dcbf1c2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37183-cwe-284-improper-access-control-in-siemens-sinema-remote-connect-server-bf1c22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37183%3A%20CWE-284%3A%20Improper%20Access%20Control%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d9841c4522896dcbf1c22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-37177-cwe-471-modification-of-assumed-immutable-data-maid-in-siemens-sinema-remote-connect-server-bf1c1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-37177%3A%20CWE-471%3A%20Modification%20of%20Assumed-Immutable%20Data%20(MAID)%20in%20Siemens%20SINEMA%20Remote%20Connect%20Server&amp;severity=medium&amp;id=682d9841c4522896dcbf1c1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27391-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-siemens-apogee-mbc-ppc-p2-ethernet-bf1b23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27391%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20APOGEE%20MBC%20(PPC)%20(P2%20Ethernet)&amp;severity=critical&amp;id=682d9841c4522896dcbf1b23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-14-f130f1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f130f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-13-f120ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f120ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-12-78b17af3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-12&amp;severity=medium&amp;id=68359c9a5d5f0974d01e2625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-12-f186eb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-12&amp;severity=medium&amp;id=682acdc2bbaf20d303f186eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-12-f12783</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-12-6e3264</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-12&amp;severity=medium&amp;id=6828eab9e1a0c275ea6e3264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-11-f12075</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-11&amp;severity=medium&amp;id=682acdc0bbaf20d303f12075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38357-cwe-79-cross-site-scripting-xss-in-sms-ovh-sms-ovh-beba3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38357%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20SMS%20OVH%20SMS%20OVH&amp;severity=medium&amp;id=682d9837c4522896dcbeba3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38358-cwe-79-cross-site-scripting-xss-in-moolamojo-moolamojo-beba47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38358%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20MoolaMojo%20MoolaMojo&amp;severity=medium&amp;id=682d9837c4522896dcbeba47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38359-cwe-79-cross-site-scripting-xss-in-wordpress-invitebox-plugin-wordpress-invitebox-plugin-beba61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38359%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WordPress%20InviteBox%20Plugin%20WordPress%20InviteBox%20Plugin&amp;severity=medium&amp;id=682d9837c4522896dcbeba61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38354-cwe-79-cross-site-scripting-xss-in-gnu-mailman-integration-gnu-mailman-integration-beba37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38354%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20GNU-Mailman%20Integration%20GNU-Mailman%20Integration&amp;severity=medium&amp;id=682d9837c4522896dcbeba37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38327-cwe-79-cross-site-scripting-xss-in-youtube-video-inserter-youtube-video-inserter-beba27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38327%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20YouTube%20Video%20Inserter%20YouTube%20Video%20Inserter&amp;severity=medium&amp;id=682d9837c4522896dcbeba27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38339-cwe-79-cross-site-scripting-xss-in-simple-matted-thumbnails-simple-matted-thumbnails-beba2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38339%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Simple%20Matted%20Thumbnails%20Simple%20Matted%20Thumbnails&amp;severity=medium&amp;id=682d9837c4522896dcbeba2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38347-cwe-79-cross-site-scripting-xss-in-custom-website-data-custom-website-data-beb9f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38347%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Custom%20Website%20Data%20Custom%20Website%20Data&amp;severity=medium&amp;id=682d9837c4522896dcbeb9f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38355-cwe-79-cross-site-scripting-xss-in-bug-library-bug-library-beba1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38355%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Bug%20Library%20Bug%20Library&amp;severity=medium&amp;id=682d9837c4522896dcbeba1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38336-cwe-79-cross-site-scripting-xss-in-edit-comments-xt-edit-comments-xt-beb9cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38336%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Edit%20Comments%20XT%20Edit%20Comments%20XT&amp;severity=medium&amp;id=682d9837c4522896dcbeb9cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38335-cwe-79-cross-site-scripting-xss-in-wise-agent-capture-forms-wise-agent-capture-forms-beb9bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38335%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Wise%20Agent%20Capture%20Forms%20Wise%20Agent%20Capture%20Forms&amp;severity=medium&amp;id=682d9837c4522896dcbeb9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38329-cwe-79-cross-site-scripting-xss-in-dj-emailpublish-dj-emailpublish-beb941</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38329%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20DJ%20EmailPublish%20DJ%20EmailPublish&amp;severity=medium&amp;id=682d9837c4522896dcbeb941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38328-cwe-79-cross-site-scripting-xss-in-notices-notices-beb93d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38328%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Notices%20Notices&amp;severity=medium&amp;id=682d9837c4522896dcbeb93d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38338-cwe-79-cross-site-scripting-xss-in-border-loading-bar-border-loading-bar-beb967</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38338%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Border%20Loading%20Bar%20Border%20Loading%20Bar&amp;severity=medium&amp;id=682d9837c4522896dcbeb967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38331-cwe-79-cross-site-scripting-xss-in-wp-t-wap-wp-t-wap-beb945</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38331%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP-T-Wap%20WP-T-Wap&amp;severity=medium&amp;id=682d9837c4522896dcbeb945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38333-cwe-79-cross-site-scripting-xss-in-wp-scrippets-wp-scrippets-beb949</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38333%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP%20Scrippets%20WP%20Scrippets&amp;severity=medium&amp;id=682d9837c4522896dcbeb949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38352-cwe-79-cross-site-scripting-xss-in-feedify-web-push-notifications-feedify-web-push-notifications-beb973</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38352%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Feedify%20%E2%80%93%20Web%20Push%20Notifications%20Feedify%20%E2%80%93%20Web%20Push%20Notifications&amp;severity=medium&amp;id=682d9837c4522896dcbeb973</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38341-cwe-79-cross-site-scripting-xss-in-woocommerce-payment-gateway-per-category-woocommerce-payment-gateway-per-category-beb9f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38341%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WooCommerce%20Payment%20Gateway%20Per%20Category%20WooCommerce%20Payment%20Gateway%20Per%20Category&amp;severity=medium&amp;id=682d9837c4522896dcbeb9f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38340-cwe-79-cross-site-scripting-xss-in-wordpress-simple-shop-wordpress-simple-shop-beb9d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38340%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Wordpress%20Simple%20Shop%20Wordpress%20Simple%20Shop&amp;severity=medium&amp;id=682d9837c4522896dcbeb9d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38349-cwe-79-cross-site-scripting-xss-in-integration-of-moneybird-for-woocommerce-integration-of-moneybird-for-woocommerce-beba01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38349%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Integration%20of%20Moneybird%20for%20WooCommerce%20Integration%20of%20Moneybird%20for%20WooCommerce&amp;severity=medium&amp;id=682d9837c4522896dcbeba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38353-cwe-79-cross-site-scripting-xss-in-dropdown-and-scrollable-text-dropdown-and-scrollable-text-beb9ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38353%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Dropdown%20and%20scrollable%20Text%20Dropdown%20and%20scrollable%20Text&amp;severity=medium&amp;id=682d9837c4522896dcbeb9ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38326-cwe-79-cross-site-scripting-xss-in-post-title-counter-post-title-counter-beb98d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38326%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Post%20Title%20Counter%20Post%20Title%20Counter&amp;severity=medium&amp;id=682d9837c4522896dcbeb98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38348-cwe-79-cross-site-scripting-xss-in-advance-search-advance-search-beb9a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38348%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Advance%20Search%20Advance%20Search&amp;severity=medium&amp;id=682d9837c4522896dcbeb9a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38332-cwe-79-cross-site-scripting-xss-in-on-page-seo-whatsapp-chat-button-on-page-seo-whatsapp-chat-button-beb9b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38332%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20On%20Page%20SEO%20%2B%20Whatsapp%20Chat%20Button%20On%20Page%20SEO%20%2B%20Whatsapp%20Chat%20Button&amp;severity=medium&amp;id=682d9837c4522896dcbeb9b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38337-cwe-79-cross-site-scripting-xss-in-rsvpmaker-excel-rsvpmaker-excel-beb9d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38337%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20RSVPMaker%20Excel%20RSVPMaker%20Excel&amp;severity=medium&amp;id=682d9837c4522896dcbeb9d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38330-cwe-79-cross-site-scripting-xss-in-yet-another-bol-com-plugin-yet-another-bol-com-plugin-beb9b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38330%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Yet%20Another%20bol.com%20Plugin%20Yet%20Another%20bol.com%20Plugin&amp;severity=medium&amp;id=682d9837c4522896dcbeb9b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38334-cwe-79-cross-site-scripting-xss-in-wp-design-maps-places-wp-design-maps-places-beb9bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38334%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP%20Design%20Maps%20%26%20Places%20WP%20Design%20Maps%20%26%20Places&amp;severity=medium&amp;id=682d9837c4522896dcbeb9bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38350-cwe-79-cross-site-scripting-xss-in-spideranalyse-spideranalyse-beb96b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38350%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20spideranalyse%20spideranalyse&amp;severity=medium&amp;id=682d9837c4522896dcbeb96b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38351-cwe-79-cross-site-scripting-xss-in-osd-subscribe-osd-subscribe-beb96f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38351%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20OSD%20Subscribe%20OSD%20Subscribe&amp;severity=low&amp;id=682d9837c4522896dcbeb96f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-10-f12703</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12703</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38323-cwe-79-cross-site-scripting-xss-in-rentpress-rentpress-bdc998</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38323%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20RentPress%20RentPress&amp;severity=medium&amp;id=682d981fc4522896dcbdc998</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38325-cwe-79-cross-site-scripting-xss-in-user-activation-email-user-activation-email-bdc9af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38325%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20User%20Activation%20Email%20User%20Activation%20Email&amp;severity=medium&amp;id=682d981fc4522896dcbdc9af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38319-cwe-79-cross-site-scripting-xss-in-more-from-google-more-from-google-bdbbe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38319%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20More%20From%20Google%20More%20From%20Google&amp;severity=medium&amp;id=682d981ec4522896dcbdbbe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38317-cwe-79-cross-site-scripting-xss-in-konnichiwa-membership-konnichiwa-membership-bdbbe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38317%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Konnichiwa!%20Membership%20Konnichiwa!%20Membership&amp;severity=medium&amp;id=682d981ec4522896dcbdbbe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38321-cwe-79-cross-site-scripting-xss-in-custom-menu-plugin-custom-menu-plugin-bdbbf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38321%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Custom%20Menu%20Plugin%20Custom%20Menu%20Plugin&amp;severity=medium&amp;id=682d981ec4522896dcbdbbf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38320-cwe-79-cross-site-scripting-xss-in-simplesamlphp-authentication-simplesamlphp-authentication-bdbbf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38320%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20simpleSAMLphp%20Authentication%20simpleSAMLphp%20Authentication&amp;severity=medium&amp;id=682d981ec4522896dcbdbbf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38324-cwe-89-sql-injection-in-sp-rental-manager-sp-rental-manager-bdbbfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38324%3A%20CWE-89%20SQL%20Injection%20in%20SP%20Rental%20Manager%20SP%20Rental%20Manager&amp;severity=high&amp;id=682d981ec4522896dcbdbbfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38316-cwe-79-cross-site-scripting-xss-in-wp-academic-people-list-wp-academic-people-list-bdaf87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38316%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP%20Academic%20People%20List%20WP%20Academic%20People%20List&amp;severity=medium&amp;id=682d981dc4522896dcbdaf87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38322-cwe-79-cross-site-scripting-xss-in-twitter-friends-widget-twitter-friends-widget-bdc994</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38322%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Twitter%20Friends%20Widget%20Twitter%20Friends%20Widget&amp;severity=medium&amp;id=682d981fc4522896dcbdc994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38318-cwe-79-cross-site-scripting-xss-in-3d-cover-carousel-3d-cover-carousel-bdc990</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38318%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%203D%20Cover%20Carousel%203D%20Cover%20Carousel&amp;severity=medium&amp;id=682d981fc4522896dcbdc990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-09-f13152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f13152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38388-n-a-in-line-corporation-central-dogma-bd717d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38388%3A%20n%2Fa%20in%20LINE%20Corporation%20Central%20Dogma&amp;severity=high&amp;id=682d9817c4522896dcbd717d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28571-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-cwe-78-in-adobe-after-effects-bf1b2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28571%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-08-f12c38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38616-na-in-na-8944d09c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38616%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38617-na-in-na-0038402a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38617%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38615-na-in-na-a6d85543</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38615%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-07-f12fbf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-40528-na-in-na-55a74009</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-40528%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-06-f120d4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f120d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-05-f126bb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f126bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-04-f12adf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12adf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-03-f123fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f123fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36017-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1b87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36017%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35996-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-after-effects-bf1b76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35996%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35994-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf1b66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35994%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35995-improper-input-validation-cwe-20-in-adobe-after-effects-bf1b6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35995%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35993-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf1b5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35993%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36019-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf1b8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36019%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36018-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf1b8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36018%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1b8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38314-cwe-200-information-exposure-in-redux-io-gutenberg-template-library-redux-framework-bdc98c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38314%3A%20CWE-200%20Information%20Exposure%20in%20Redux.io%20Gutenberg%20Template%20Library%20%26%20Redux%20Framework&amp;severity=medium&amp;id=682d981fc4522896dcbdc98c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38312-cwe-863-incorrect-authorization-in-redux-io-gutenberg-template-library-redux-framework-bdc988</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38312%3A%20CWE-863%20Incorrect%20Authorization%20in%20Redux.io%20Gutenberg%20Template%20Library%20%26%20Redux%20Framework&amp;severity=high&amp;id=682d981fc4522896dcbdc988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39322-cwe-79-cross-site-scripting-xss-in-cybernetikz-easy-social-icons-bdc9ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39322%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20cybernetikz%20Easy%20Social%20Icons&amp;severity=medium&amp;id=682d981fc4522896dcbdc9ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-02-f12e09</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39817-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1c7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39817%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1c7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36079-out-of-bounds-read-cwe-125-in-adobe-bridge-bf1c18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36079%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1c18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36075-buffer-overflow-cwe-120-in-adobe-bridge-bf1bf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36075%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36073-heap-based-buffer-overflow-cwe-122-in-adobe-bridge-bf1be8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36073%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1be8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36078-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1bf8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36078%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39816-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1c60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39816%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36076-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1bf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36076%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36074-out-of-bounds-read-cwe-125-in-adobe-bridge-bf1bec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36074%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36069-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1bd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36069%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36067-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1bc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36067%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36072-out-of-bounds-write-cwe-787-in-adobe-bridge-bf1be4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36072%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1be4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36070-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-media-encoder-bf1be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36070%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf1be0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36068-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1bc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36068%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1bc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36059-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1ba8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36059%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36049-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1b97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36049%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1b97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39320-cwe-79-cross-site-scripting-xss-in-noah-kagan-underconstruction-bdc9c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39320%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Noah%20Kagan%20underConstruction&amp;severity=medium&amp;id=682d981fc4522896dcbdc9c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-01-e55a2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-01&amp;severity=medium&amp;id=682b7b9cd3ddd8cef2e55a2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-09-01-f1309c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-09-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f1309c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-39316-cwe-22-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-in-zoomit-zoomsounds-wordpress-wave-audio-player-with-playlist-bdc9b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-39316%3A%20CWE-22%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20in%20ZoomIt%20ZoomSounds%20-%20WordPress%20Wave%20Audio%20Player%20with%20Playlist&amp;severity=high&amp;id=682d981fc4522896dcbdc9b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-31-f1289c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f1289c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34646-cwe-290-authentication-bypass-by-spoofing-in-pluggabl-llc-booster-for-woocommcerce-bdc984</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34646%3A%20CWE-290%20Authentication%20Bypass%20by%20Spoofing%20in%20Pluggabl%20LLC%20Booster%20for%20WooCommcerce&amp;severity=critical&amp;id=682d981fc4522896dcbdc984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34668-cwe-79-cross-site-scripting-xss-in-devowl-io-wordpress-real-media-library-bdc925</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34668%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20devowl.io%20WordPress%20Real%20Media%20Library&amp;severity=medium&amp;id=682d981fc4522896dcbdc925</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35635-cwe-129-improper-validation-of-array-index-in-cgal-project-bf1b1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35635%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project&amp;severity=medium&amp;id=682d9841c4522896dcbf1b1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35634-cwe-129-improper-validation-of-array-index-in-cgal-project-bf1b13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35634%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project&amp;severity=medium&amp;id=682d9841c4522896dcbf1b13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35633-cwe-129-improper-validation-of-array-index-in-cgal-project-bf1b0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35633%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project&amp;severity=medium&amp;id=682d9841c4522896dcbf1b0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-29-f1277b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f1277b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-28-f1264f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1264f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-27-f12536</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12536</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-26-f12e9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-25-f1310e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-25&amp;severity=medium&amp;id=682acdc2bbaf20d303f1310e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28619-out-of-bounds-read-cwe-125-in-adobe-animate-bf1b56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28619%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1b56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28620-heap-based-buffer-overflow-cwe-122-in-adobe-animate-bf1a19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28620%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28621-out-of-bounds-read-cwe-125-in-adobe-animate-bf1a2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28621%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1a2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28617-out-of-bounds-read-cwe-125-in-adobe-animate-bf1a09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28617%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1a09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28618-out-of-bounds-read-cwe-125-in-adobe-animate-bf1a11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28618%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf1a11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28614-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf19d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28614%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28612-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf19d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28612%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28615-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf19e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28615%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28608-heap-based-buffer-overflow-cwe-122-in-adobe-after-effects-bf19a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28608%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28610-heap-based-buffer-overflow-cwe-122-in-adobe-after-effects-bf19be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28610%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28611-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf19cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28611%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28616-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf19e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28616%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28609-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf19ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28609%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28607-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf19a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28607%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf19a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28606-stack-based-buffer-overflow-cwe-121-in-adobe-after-effects-bf1997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28606%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28605-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf1982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28605%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28600-out-of-bounds-read-cwe-125-in-adobe-after-effects-bf1959</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28600%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28602-out-of-bounds-write-cwe-787-in-adobe-after-effects-bf1969</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28602%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28603-heap-based-buffer-overflow-cwe-122-in-adobe-after-effects-bf197a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28603%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf197a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28604-heap-based-buffer-overflow-cwe-122-in-adobe-after-effects-bf197e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28604%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf197e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28601-null-pointer-dereference-cwe-476-in-adobe-after-effects-bf1961</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28601%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9841c4522896dcbf1961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28627-server-side-request-forgery-ssrf-cwe-918-in-adobe-experience-manager-bf1a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28627%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28628-cross-site-scripting-xss-cwe-79-in-adobe-experience-manager-bf1a42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28628%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1a42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28625-cross-site-scripting-xss-cwe-79-in-adobe-experience-manager-bf1a2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28625%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1a2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28626-improper-authorization-cwe-285-in-adobe-experience-manager-bf1a32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28626%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Experience%20Manager&amp;severity=medium&amp;id=682d9841c4522896dcbf1a32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-24-f12b48</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28596-out-of-bounds-write-cwe-787-in-adobe-framemaker-bf1951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28596%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9841c4522896dcbf1951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36013-out-of-bounds-read-cwe-125-in-adobe-media-encoder-bf1ab6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36013%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf1ab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-23-f126bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f126bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-22-f12a12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-21-f12f28</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-21&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36016-out-of-bounds-read-cwe-125-in-adobe-media-encoder-bf1ae2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36016%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf1ae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36014-improper-input-validation-cwe-20-in-adobe-media-encoder-bf1aba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36014%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf1aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36015-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-media-encoder-bf1ac0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36015%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf1ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36010-out-of-bounds-read-cwe-125-in-adobe-illustrator-bf1a9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36010%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf1a9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36011-improper-neutralization-of-special-elements-used-in-an-os-command-os-command-injection-cwe-78-in-adobe-illustrator-bf1aa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36011%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(&apos;OS%20Command%20Injection&apos;)%20(CWE-78)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf1aa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36008-use-after-free-cwe-416-in-adobe-illustrator-bf1a8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36008%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf1a8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36009-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-illustrator-bf1a93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36009%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf1a93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36006-improper-input-validation-cwe-20-in-adobe-photoshop-bf1a7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36006%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9841c4522896dcbf1a7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36007-improper-input-validation-cwe-20-in-adobe-prelude-bf1a89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36007%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1a89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36005-stack-based-buffer-overflow-cwe-121-in-adobe-photoshop-bf1a70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36005%3A%20Stack-based%20Buffer%20Overflow%20(CWE-121)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9841c4522896dcbf1a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36001-out-of-bounds-read-cwe-125-in-adobe-character-animator-preview-4-bf1a57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36001%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9841c4522896dcbf1a57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35999-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-prelude-bf1a53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35999%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Prelude&amp;severity=medium&amp;id=682d9841c4522896dcbf1a53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36000-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-character-animator-preview-4-bf1942</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36000%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Character%20Animator%20(Preview%204)&amp;severity=medium&amp;id=682d9841c4522896dcbf1942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35992-out-of-bounds-read-cwe-125-in-adobe-bridge-bf1927</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35992%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35990-out-of-bounds-write-cwe-787-in-adobe-bridge-bf1912</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35990%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf1912</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35997-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-premiere-bf193a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35997%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9841c4522896dcbf193a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-35989-out-of-bounds-write-cwe-787-in-adobe-bridge-bf190e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-35989%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf190e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28595-uncontrolled-search-path-element-cwe-427-in-adobe-dimension-bf18fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28595%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Dimension&amp;severity=medium&amp;id=682d9841c4522896dcbf18fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28591-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf18f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28591%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf18f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28624-heap-based-buffer-overflow-cwe-122-in-adobe-bridge-bf190a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28624%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9841c4522896dcbf190a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28589-out-of-bounds-read-cwe-125-in-adobe-media-encoder-bf18cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28589%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf18cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28592-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf18f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28592%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf18f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28593-use-after-free-cwe-416-in-adobe-illustrator-bf18fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28593%3A%20Use%20After%20Free%20(CWE-416)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9841c4522896dcbf18fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28590-out-of-bounds-read-cwe-125-in-adobe-media-encoder-bf18e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28590%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d9841c4522896dcbf18e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-20-f12f79</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-20&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34645-cwe-352-cross-site-request-forgery-csrf-in-wp-easycart-shopping-cart-ecommerce-store-bdc921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34645%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20WP%20EasyCart%20Shopping%20Cart%20%26%20eCommerce%20Store&amp;severity=high&amp;id=682d981fc4522896dcbdc921</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-08-19-193674</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-08-19&amp;severity=medium&amp;id=682b69b052745a861d193674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-19-f122ab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f122ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-18-f12f7f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanocore-20210816-771d56</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nanocore%2020210816&amp;severity=low&amp;id=682c7ad1e3e6de8ceb771d56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-17-f12b67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/nanocore-20210816-f0c18f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Nanocore%2020210816&amp;severity=low&amp;id=682acdbebbaf20d303f0c18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38315-cwe-79-cross-site-scripting-xss-in-smartypants-sp-project-document-manager-bdaf83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38315%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20SmartyPants%20SP%20Project%20%26%20Document%20Manager&amp;severity=medium&amp;id=682d981dc4522896dcbdaf83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34641-cwe-79-cross-site-scripting-xss-in-seopress-seopress-bdaf4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34641%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20SEOPress%20SEOPress&amp;severity=medium&amp;id=682d981dc4522896dcbdaf4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34667-cwe-79-cross-site-scripting-xss-in-calendar-plugin-calendar-plugin-bdaf7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34667%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Calendar_plugin%20Calendar_plugin&amp;severity=medium&amp;id=682d981dc4522896dcbdaf7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34666-cwe-79-cross-site-scripting-xss-in-add-sidebar-add-sidebar-bdaf7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34666%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Add%20Sidebar%20Add%20Sidebar&amp;severity=medium&amp;id=682d981dc4522896dcbdaf7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34665-cwe-79-cross-site-scripting-xss-in-wp-seo-tags-wp-seo-tags-275507</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34665%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP%20SEO%20Tags%20WP%20SEO%20Tags&amp;severity=medium&amp;id=6830d58c0acd01a249275507</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34664-cwe-79-cross-site-scripting-xss-in-moova-for-woocommerce-moova-for-woocommerce-275505</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34664%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Moova%20for%20WooCommerce%20Moova%20for%20WooCommerce&amp;severity=medium&amp;id=6830d58c0acd01a249275505</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34659-cwe-79-cross-site-scripting-xss-in-plugmatter-pricing-table-lite-plugmatter-pricing-table-lite-275501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34659%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Plugmatter%20Pricing%20Table%20Lite%20Plugmatter%20Pricing%20Table%20Lite&amp;severity=low&amp;id=6830d58c0acd01a249275501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34663-cwe-79-cross-site-scripting-xss-in-jquery-tagline-rotator-jquery-tagline-rotator-275503</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34663%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20jQuery%20Tagline%20Rotator%20jQuery%20Tagline%20Rotator&amp;severity=medium&amp;id=6830d58c0acd01a249275503</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34658-cwe-79-cross-site-scripting-xss-in-simple-popup-newsletter-simple-popup-newsletter-2754ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34658%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Simple%20Popup%20Newsletter%20Simple%20Popup%20Newsletter&amp;severity=medium&amp;id=6830d58c0acd01a2492754ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34655-cwe-79-cross-site-scripting-xss-in-wp-songbook-wp-songbook-2755f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34655%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP%20Songbook%20WP%20Songbook&amp;severity=medium&amp;id=6830d8f30acd01a2492755f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34657-cwe-79-cross-site-scripting-xss-in-typofr-typofr-bdaf77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34657%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20TypoFR%20TypoFR&amp;severity=medium&amp;id=682d981dc4522896dcbdaf77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34656-cwe-79-cross-site-scripting-xss-in-2way-videocalls-and-random-chat-html5-webcam-videochat-2way-videocalls-and-random-chat-html5-webcam-videochat-bdaf66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34656%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%202Way%20VideoCalls%20and%20Random%20Chat%20-%20HTML5%20Webcam%20Videochat%202Way%20VideoCalls%20and%20Random%20Chat%20-%20HTML5%20Webcam%20Videochat&amp;severity=medium&amp;id=682d981dc4522896dcbdaf66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34651-cwe-79-cross-site-scripting-xss-in-scribble-maps-scribble-maps-bdaf5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34651%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Scribble%20Maps%20Scribble%20Maps&amp;severity=medium&amp;id=682d981dc4522896dcbdaf5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34654-cwe-79-cross-site-scripting-xss-in-custom-post-type-relations-custom-post-type-relations-bdaf0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34654%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Custom%20Post%20Type%20Relations%20Custom%20Post%20Type%20Relations&amp;severity=medium&amp;id=682d981dc4522896dcbdaf0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34653-cwe-79-cross-site-scripting-xss-in-wp-fountain-wp-fountain-bdaf03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34653%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20WP%20Fountain%20WP%20Fountain&amp;severity=medium&amp;id=682d981dc4522896dcbdaf03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34649-cwe-79-cross-site-scripting-xss-in-simple-behance-portfolio-simple-behance-portfolio-bdaefb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34649%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Simple%20Behance%20Portfolio%20Simple%20Behance%20Portfolio&amp;severity=medium&amp;id=682d981dc4522896dcbdaefb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34652-cwe-79-cross-site-scripting-xss-in-media-usage-media-usage-bdaeb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34652%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Media%20Usage%20Media%20Usage&amp;severity=medium&amp;id=682d981dc4522896dcbdaeb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34642-cwe-79-cross-site-scripting-xss-in-followistic-smart-email-alerts-bdae8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34642%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Followistic%20Smart%20Email%20Alerts&amp;severity=medium&amp;id=682d981dc4522896dcbdae8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34644-cwe-79-cross-site-scripting-xss-in-multiplayer-games-multiplayer-games-bdaeac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34644%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Multiplayer%20Games%20Multiplayer%20Games&amp;severity=medium&amp;id=682d981dc4522896dcbdaeac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34643-cwe-79-cross-site-scripting-xss-in-skaut-bazar-skaut-bazar-bdaea4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34643%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Skaut%20Bazar%20Skaut%20Bazar&amp;severity=medium&amp;id=682d981dc4522896dcbdaea4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-16-e517e689</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-16&amp;severity=medium&amp;id=68359c9e5d5f0974d01fadf8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22940-use-after-free-cwe-416-in-nodejs-node-bed463</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22940%3A%20Use%20After%20Free%20(CWE-416)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed463</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22939-improper-certificate-validation-cwe-295-in-nodejs-node-bed45b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22939%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed45b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22931-improper-null-termination-cwe-170-in-nodejs-node-bed453</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22931%3A%20Improper%20Null%20Termination%20(CWE-170)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-16-f20667</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-16&amp;severity=medium&amp;id=682acdc4bbaf20d303f20667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-16-f12f96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-16&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-15-f122a7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f122a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-14-f123e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f123e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31399-na-in-na-11a98295</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31399%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-13-f12b61</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38604-na-in-na-fec335c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38604%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-12-f12411</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34640-cwe-79-cross-site-scripting-xss-in-securimage-wp-fixed-securimage-wp-fixed-2755f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34640%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Securimage-WP-Fixed%20Securimage-WP-Fixed&amp;severity=medium&amp;id=6830d8f30acd01a2492755f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-11-f130eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f130eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-10-ea7c65</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-10&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea7c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-10-f122e9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f122e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34660-cwe-79-cross-site-scripting-xss-in-very-good-plugins-wp-fusion-lite-2755f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34660%3A%20CWE-79%20Cross-site%20Scripting%20(XSS)%20in%20Very%20Good%20Plugins%20WP%20Fusion%20Lite&amp;severity=medium&amp;id=6830d8f30acd01a2492755f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-34661-cwe-352-cross-site-request-forgery-csrf-in-very-good-plugins-wp-fusion-lite-2755f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-34661%3A%20CWE-352%20Cross-Site%20Request%20Forgery%20(CSRF)%20in%20Very%20Good%20Plugins%20WP%20Fusion%20Lite&amp;severity=medium&amp;id=6830d8f30acd01a2492755f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-09-f12e4d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-08-08-8aec77</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-08-08&amp;severity=medium&amp;id=682b6901d14de609c88aec77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-08-f12415</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38185-na-in-na-84b1f82d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38185%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5e1b0bd07c3938f3f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-07-f12994</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12994</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-06-f12d8b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22924-improper-input-validation-cwe-20-in-20b3e982</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22924%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=low&amp;id=68487f5e1b0bd07c3938fa87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-05-f12096</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f12096</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-38111-n-a-in-n-a-bdbbd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-38111%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981ec4522896dcbdbbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-04-f13129</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-04&amp;severity=medium&amp;id=682acdc2bbaf20d303f13129</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32018-na-in-na-dd1d012e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32016-na-in-na-b6ba6446</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32016%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839d93e182aa0cae2b72fbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32017-na-in-na-d807f699</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32017%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839d93e182aa0cae2b72fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-30560-use-after-free-in-google-chrome-bdba80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-30560%3A%20Use%20after%20free%20in%20Google%20Chrome&amp;severity=high&amp;id=682d981ec4522896dcbdba80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-03-f13118</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-03&amp;severity=medium&amp;id=682acdc2bbaf20d303f13118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-02-f12aba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-02&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-08-01-f12167</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-08-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f12167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-31-f12822</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-30-f12497</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12497</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36741-arbitrary-file-upload-in-trend-micr-0604ef00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36741%3A%20Arbitrary%20File%20Upload%20in%20Trend%20Micro%20Trend%20Micro%20Apex%20One&amp;severity=high&amp;id=68487f521b0bd07c39389cf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-29-f12369</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-28-f121a9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f121a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-27-f12493</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-26-f12c8f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-25-f125d3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f125d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-24-f12c3c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-23-f1232b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f1232b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-22-f12050</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12050</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-21-f121f1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f121f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-33910-na-in-na-6099da80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-33910%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938dfe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-36980-n-a-in-n-a-bdbbc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-36980%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981ec4522896dcbdbbc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-20-f12bbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-19-f11fd4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f11fd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nso-related-domains-f0c18d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20NSO%20related%20domains&amp;severity=high&amp;id=682acdbebbaf20d303f0c18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-18-f12818</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-17-f12f18</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-16-f120da</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f120da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-protecting-customers-from-a-private-sector-offensive-actor-using-0-day-exploits-and-devilstongue-malware-f0c18b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Protecting%20customers%20from%20a%20private-sector%20offensive%20actor%20using%200-day%20exploits%20and%20DevilsTongue%20malware&amp;severity=high&amp;id=682acdbebbaf20d303f0c18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-15-f1231b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f1231b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31979-elevation-of-privilege-in-microsoft-cf764e52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31979%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=68487f521b0bd07c39389ced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-14-766928</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-14&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb766928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-14-f1308e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-14&amp;severity=medium&amp;id=682acdc2bbaf20d303f1308e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31895-cwe-120-buffer-copy-without-checking-size-of-input-classic-buffer-overflow-in-siemens-ruggedcom-i800-bd6686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31895%3A%20CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20(&apos;Classic%20Buffer%20Overflow&apos;)%20in%20Siemens%20RUGGEDCOM%20i800&amp;severity=high&amp;id=682d9816c4522896dcbd6686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-13-f125b0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f125b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22921-incorrect-permission-assignment-for-critical-resource-cwe-732-in-nodejs-node-bed43c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22921%3A%20Incorrect%20Permission%20Assignment%20for%20Critical%20Resource%20(CWE-732)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed43c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22918-out-of-bounds-read-cwe-125-in-nodejs-node-bed42b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22918%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-12-ea8efc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-12&amp;severity=medium&amp;id=682b7baad3ddd8cef2ea8efc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-12-f12a1f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-11-f12ff9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-11&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-10-f1308c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f1308c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-07-09-823e55</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-07-09&amp;severity=medium&amp;id=682b68e6d14de609c8823e55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-09-f12fe2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-09&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-08-f12321</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f12321</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-07-f13018</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f13018</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-06-f12ba3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ba3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-05-f1249f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f1249f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaseya-ransomware-attack-indicators-and-information-publicly-available-f0c189</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaseya%20ransomware%20attack%20-%20indicators%20and%20information%20publicly%20available&amp;severity=high&amp;id=682acdbebbaf20d303f0c189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-04-f12511</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f12511</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-03-f1237c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1237c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-02-f12395</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f12395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28423-na-in-na-2692b027</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28423%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683791d2182aa0cae2605abf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-07-01-f12fda</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-07-01&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-30-f12f47</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-30&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31531-na-in-na-d7e445f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31531%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31530-na-in-na-3b658330</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31530%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31160-na-in-na-0701ca4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31160%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-29-f12269</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f12269</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28623-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-premiere-bf1906</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28623%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Premiere&amp;severity=medium&amp;id=682d9841c4522896dcbf1906</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28597-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-photoshop-elements-bf1902</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28597%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Photoshop%20Elements&amp;severity=medium&amp;id=682d9841c4522896dcbf1902</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28579-improper-access-control-cwe-284-in-adobe-connect-bf18c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28579%3A%20Improper%20Access%20Control%20(CWE-284)%20in%20Adobe%20Connect&amp;severity=medium&amp;id=682d9841c4522896dcbf18c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28574-out-of-bounds-read-cwe-125-in-adobe-animate-bf18b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28574%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf18b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28570-uncontrolled-search-path-element-cwe-427-in-adobe-after-effects-bf18a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28570%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20After%20Effects&amp;severity=medium&amp;id=682d9840c4522896dcbf18a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28576-out-of-bounds-read-cwe-125-in-adobe-animate-bf18c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28576%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf18c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28575-out-of-bounds-read-cwe-125-in-adobe-animate-bf18be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28575%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9841c4522896dcbf18be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28573-out-of-bounds-read-cwe-125-in-adobe-animate-bf18ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28573%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf18ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21102-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-illustrator-bf189d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21102%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9840c4522896dcbf189d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21090-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-cwe-22-in-adobe-incopy-bf1855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21090%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20(&apos;Path%20Traversal&apos;)%20(CWE-22)%20in%20Adobe%20InCopy&amp;severity=medium&amp;id=682d9840c4522896dcbf1855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21099-out-of-bounds-write-cwe-787-in-adobe-indesign-bf187d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21099%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9840c4522896dcbf187d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21098-out-of-bounds-write-cwe-787-in-adobe-indesign-bf1879</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21098%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20InDesign&amp;severity=medium&amp;id=682d9840c4522896dcbf1879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-28-45293fcb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-28&amp;severity=medium&amp;id=68359c9d5d5f0974d01f797a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-28-f1e0db</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-28&amp;severity=medium&amp;id=682acdc3bbaf20d303f1e0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-28-f12d49</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-28&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-27-f12265</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f12265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-26-f12e0f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-25-f121e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f121e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-24-741ac8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-24&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb741ac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-24-f128da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f128da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-23-f12c34</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-22-f12175</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-24366-cwe-79-cross-site-scripting-xss-in-unknown-admin-columns-bdba56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-24366%3A%20CWE-79%20Cross-Site%20Scripting%20(XSS)%20in%20Unknown%20Admin%20Columns&amp;severity=medium&amp;id=682d981ec4522896dcbdba56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-21-f12ec7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-20-f12ac2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ac2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-19-f129d4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f129d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/netfilter-rootkit-samples-f-roth-google-sheet-expansion-f0c187</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Netfilter%20Rootkit%20Samples%20-%20F.%20Roth%20-%20Google%20sheet%20%2B%20expansion&amp;severity=high&amp;id=682acdbebbaf20d303f0c187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-18-f1224e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f1224e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-17-f12519</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-17&amp;severity=medium&amp;id=682acdc0bbaf20d303f12519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-16-f13058</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-16&amp;severity=medium&amp;id=682acdc2bbaf20d303f13058</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-15-f1308a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-15&amp;severity=medium&amp;id=682acdc2bbaf20d303f1308a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-14-f12062</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f12062</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-13-f1228a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-13&amp;severity=medium&amp;id=682acdc0bbaf20d303f1228a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-12-f12632</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f12632</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-11-7455ec</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-11&amp;severity=medium&amp;id=682c7abae3e6de8ceb7455ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-11-f1288e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f1288e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-10-f12e11</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-10&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-09-f1251b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f1251b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-08-f12efd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-08&amp;severity=medium&amp;id=682acdc1bbaf20d303f12efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-07-f12ccd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-07&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-06-f122c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-06&amp;severity=medium&amp;id=682acdc0bbaf20d303f122c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-05-7673ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-05&amp;severity=medium&amp;id=682c7ac1e3e6de8ceb7673ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-05-f12495</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-05&amp;severity=medium&amp;id=682acdc0bbaf20d303f12495</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-04-f12aad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f12aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-03-f12b76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-03&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-02-f12557</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f12557</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-06-01-f120a0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-06-01&amp;severity=medium&amp;id=682acdc0bbaf20d303f120a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-31-f12b08</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-31&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-30-f12035</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-29-e65bf3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-29&amp;severity=medium&amp;id=682b7b9fd3ddd8cef2e65bf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-29-f1245b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-29&amp;severity=medium&amp;id=682acdc0bbaf20d303f1245b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-29505-cwe-94-improper-control-of-generati-456e5fbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-29505%3A%20CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20(&apos;Code%20Injection&apos;)%20in%20x-stream%20xstream&amp;severity=high&amp;id=6838f151182aa0cae293f9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-28-743479</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-28&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb743479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-28-f12472</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f12472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-27-f12e0d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-26-f12779</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f12779</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-25-f12457</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-25&amp;severity=medium&amp;id=682acdc0bbaf20d303f12457</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-24-f12a04</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-23-f12bf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-23&amp;severity=medium&amp;id=682acdc1bbaf20d303f12bf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-22-f1201a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f1201a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-21-762dc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-21&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb762dc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-21-f12325</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-21&amp;severity=medium&amp;id=682acdc0bbaf20d303f12325</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25933-cross-site-scripting-in-opennms-bed687</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25933%3A%20Cross-Site%20Scripting%20in%20OpenNMS&amp;severity=medium&amp;id=682d983ac4522896dcbed687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25931-cross-site-request-forgery-in-opennms-bed67f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25931%3A%20Cross-Site%20Request%20Forgery%20in%20OpenNMS&amp;severity=high&amp;id=682d983ac4522896dcbed67f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25929-cross-site-scripting-in-opennms-bed66c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25929%3A%20Cross-Site%20Scripting%20in%20OpenNMS&amp;severity=medium&amp;id=682d983ac4522896dcbed66c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25930-cross-site-request-forgery-in-opennms-bed67b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25930%3A%20Cross-Site%20Request%20Forgery%20in%20OpenNMS&amp;severity=medium&amp;id=682d983ac4522896dcbed67b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-20-f12b80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-20&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-19-f1250d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-19&amp;severity=medium&amp;id=682acdc0bbaf20d303f1250d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-18-f121ab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-18&amp;severity=medium&amp;id=682acdc0bbaf20d303f121ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-17-f13127</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-17&amp;severity=medium&amp;id=682acdc2bbaf20d303f13127</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-16-f12005</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f12005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-15-f12459</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-15&amp;severity=medium&amp;id=682acdc0bbaf20d303f12459</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25941-prototype-pollution-in-deep-override-bed68f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25941%3A%20Prototype%20Pollution%20in%20deep-override&amp;severity=critical&amp;id=682d983ac4522896dcbed68f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25943-prototype-pollution-in-101-bed697</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25943%3A%20Prototype%20Pollution%20in%20101&amp;severity=critical&amp;id=682d983ac4522896dcbed697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-14-f12ec3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ec3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-13-f12c6c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-13&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-12-f128d6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-12&amp;severity=medium&amp;id=682acdc1bbaf20d303f128d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-11-f129c8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f129c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-10-f1312d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-10&amp;severity=medium&amp;id=682acdc2bbaf20d303f1312d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-09-f12c7a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-09&amp;severity=medium&amp;id=682acdc1bbaf20d303f12c7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-08-f1253a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f1253a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-07-f12261</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-07&amp;severity=medium&amp;id=682acdc0bbaf20d303f12261</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-06-f12abe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-06&amp;severity=medium&amp;id=682acdc1bbaf20d303f12abe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-05-f126ec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-05&amp;severity=medium&amp;id=682acdc1bbaf20d303f126ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-04-f1292d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-04&amp;severity=medium&amp;id=682acdc1bbaf20d303f1292d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-03-f1215a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1215a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-02-f12ffd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-02&amp;severity=medium&amp;id=682acdc2bbaf20d303f12ffd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-05-01-f12852</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-05-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-30-f130d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-30&amp;severity=medium&amp;id=682acdc2bbaf20d303f130d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-29-e75f22</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-29&amp;severity=medium&amp;id=682b7ba2d3ddd8cef2e75f22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-29-f12d07</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/aa21-110a-exploitation-of-pulse-connect-secure-vulnerabilities-f0e4b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=AA21-110A%20Exploitation%20of%20Pulse%20Connect%20Secure%20Vulnerabilities&amp;severity=low&amp;id=682acdbebbaf20d303f0e4b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-31777-na-in-na-197b8040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-31777%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-28-f1235d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1235d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-27-f12e8d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-27&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25928-prototype-pollution-in-safe-obj-bed664</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25928%3A%20Prototype%20Pollution%20in%20safe-obj&amp;severity=critical&amp;id=682d983ac4522896dcbed664</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25927-prototype-pollution-in-safe-flat-bed65c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25927%3A%20Prototype%20Pollution%20in%20safe-flat&amp;severity=critical&amp;id=682d983ac4522896dcbed65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-26-f126c7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-26&amp;severity=medium&amp;id=682acdc1bbaf20d303f126c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-04-25-8453c7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-04-25&amp;severity=medium&amp;id=682b68ecd14de609c88453c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-25-f126ea</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f126ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-24-f12739</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f12739</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-23-f123d5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f123d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-22-f12290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-22&amp;severity=medium&amp;id=682acdc0bbaf20d303f12290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-21-f12d4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fireeye-mandiant-pulsesecure-exploitation-countermeasures-f0c185</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FireEye%20Mandiant%20PulseSecure%20Exploitation%20Countermeasures&amp;severity=high&amp;id=682acdbebbaf20d303f0c185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-20-f11f98</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21070-uncontrolled-search-path-element-cwe-427-in-adobe-robohelp-bf17b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21070%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20RoboHelp&amp;severity=medium&amp;id=682d9840c4522896dcbf17b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-19-f12a82</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-18-f12b84</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-18&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-17-f12ae3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ae3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-16-f12a8a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-16&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28548-buffer-overflow-cwe-120-in-adobe-photoshop-bf18a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28548%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf18a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21087-cross-site-scripting-xss-cwe-79-in-adobe-coldfusion-bf1844</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21087%3A%20Cross-site%20Scripting%20(XSS)%20(CWE-79)%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d9840c4522896dcbf1844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21092-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21092%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9840c4522896dcbf1861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21091-out-of-bounds-read-cwe-125-in-adobe-bridge-bf185b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21091%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9840c4522896dcbf185b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28549-buffer-overflow-cwe-120-in-adobe-photoshop-bf18a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28549%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf18a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21095-out-of-bounds-write-cwe-787-in-adobe-bridge-bf186f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21095%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9840c4522896dcbf186f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21093-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-bridge-bf1865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21093%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9840c4522896dcbf1865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21100-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-digital-editions-bf188a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21100%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Digital%20Editions&amp;severity=medium&amp;id=682d9840c4522896dcbf188a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21096-improper-authorization-cwe-285-in-adobe-bridge-bf1875</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21096%3A%20Improper%20Authorization%20(CWE-285)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9840c4522896dcbf1875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21094-out-of-bounds-write-cwe-787-in-adobe-bridge-bf186b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21094%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Bridge&amp;severity=medium&amp;id=682d9840c4522896dcbf186b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-15-f12ea2</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ea2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-14-f12b7e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-14&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-13-f13106</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f13106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25925-cross-site-scripting-in-sickrage-bedabe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25925%3A%20Cross-Site%20Scripting%20in%20sickrage&amp;severity=medium&amp;id=682d983ac4522896dcbedabe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25926-cross-site-scripting-in-sickrage-bedac8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25926%3A%20Cross-Site%20Scripting%20in%20sickrage&amp;severity=medium&amp;id=682d983ac4522896dcbedac8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-12-741df3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-12&amp;severity=medium&amp;id=682c7ab9e3e6de8ceb741df3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-12-f1248f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f1248f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-11-f12ecb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-11&amp;severity=medium&amp;id=682acdc1bbaf20d303f12ecb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-10-f12404</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-10&amp;severity=medium&amp;id=682acdc0bbaf20d303f12404</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-09-f124cf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-09&amp;severity=medium&amp;id=682acdc0bbaf20d303f124cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-08-f1218a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-08&amp;severity=medium&amp;id=682acdc0bbaf20d303f1218a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-07-f12f3f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-07&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-06-f12fd2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-06&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-05-f1301a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-05&amp;severity=medium&amp;id=682acdc2bbaf20d303f1301a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-04-f12574</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-04&amp;severity=medium&amp;id=682acdc0bbaf20d303f12574</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-03-f1260b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-03&amp;severity=medium&amp;id=682acdc0bbaf20d303f1260b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-02-f123b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-02&amp;severity=medium&amp;id=682acdc0bbaf20d303f123b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22890-man-in-the-middle-cwe-300-in-httpsg-dfb329b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22890%3A%20Man-in-the-Middle%20(CWE-300)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f3e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22876-privacy-violation-cwe-359-in-httpsg-27f58813</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22876%3A%20Privacy%20Violation%20(CWE-359)%20in%20https%3A%2F%2Fgithub.com%2Fcurl%2Fcurl&amp;severity=medium&amp;id=68487f5e1b0bd07c3938fad5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28165-cwe-400-in-the-eclipse-foundation-eclipse-jetty-bed076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28165%3A%20CWE-400%20in%20The%20Eclipse%20Foundation%20Eclipse%20Jetty&amp;severity=high&amp;id=682d983ac4522896dcbed076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-04-01-f12877</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-04-01&amp;severity=medium&amp;id=682acdc1bbaf20d303f12877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-31-f11f6a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-31&amp;severity=medium&amp;id=682acdc0bbaf20d303f11f6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cheating-the-cheater-how-adversaries-are-using-backdoored-video-game-cheat-engines-and-modding-tools-f0c183</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cheating%20the%20cheater%3A%20How%20adversaries%20are%20using%20backdoored%20video%20game%20cheat%20engines%20and%20modding%20tools&amp;severity=low&amp;id=682acdbebbaf20d303f0c183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-30-f12549</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-30&amp;severity=medium&amp;id=682acdc0bbaf20d303f12549</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-29-f12835</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-29&amp;severity=medium&amp;id=682acdc1bbaf20d303f12835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-28-f1247c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-28&amp;severity=medium&amp;id=682acdc0bbaf20d303f1247c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-27-f122bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-27&amp;severity=medium&amp;id=682acdc0bbaf20d303f122bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-26-f130ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-26&amp;severity=medium&amp;id=682acdc2bbaf20d303f130ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analyzing-attacks-taking-advantage-of-the-exchange-server-vulnerabilities-f0c181</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20-%20Analyzing%20attacks%20taking%20advantage%20of%20the%20Exchange%20Server%20vulnerabilities&amp;severity=medium&amp;id=682acdbebbaf20d303f0c181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-25-e770b1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-25&amp;severity=medium&amp;id=682b7ba2d3ddd8cef2e770b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-25-f129af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-25&amp;severity=medium&amp;id=682acdc1bbaf20d303f129af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-24-f1271a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-24&amp;severity=medium&amp;id=682acdc1bbaf20d303f1271a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-23-f1220e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-23&amp;severity=medium&amp;id=682acdc0bbaf20d303f1220e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25917-cross-site-scripting-in-openemr-beda88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25917%3A%20Cross-Site-Scripting%20in%20openemr&amp;severity=medium&amp;id=682d983ac4522896dcbeda88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25918-cross-site-scripting-in-openemr-beda8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25918%3A%20Cross-Site-Scripting%20in%20openemr&amp;severity=medium&amp;id=682d983ac4522896dcbeda8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25920-improper-access-control-in-openemr-beda9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25920%3A%20Improper%20Access%20Control%20in%20openemr&amp;severity=medium&amp;id=682d983ac4522896dcbeda9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25921-cross-site-scripting-in-openemr-bedab6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25921%3A%20Cross-Site-Scripting%20in%20openemr&amp;severity=medium&amp;id=682d983ac4522896dcbedab6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25919-cross-site-scripting-in-openemr-beda90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25919%3A%20Cross-Site-Scripting%20in%20openemr&amp;severity=medium&amp;id=682d983ac4522896dcbeda90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-22-763791</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-22&amp;severity=medium&amp;id=682c7ac0e3e6de8ceb763791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-22-f128f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-22&amp;severity=medium&amp;id=682acdc1bbaf20d303f128f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-21-f12e60</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-21&amp;severity=medium&amp;id=682acdc1bbaf20d303f12e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-20-f1222f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-20&amp;severity=medium&amp;id=682acdc0bbaf20d303f1222f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-28831-n-a-in-n-a-bd735c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-28831%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9817c4522896dcbd735c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-19-f129d0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-19&amp;severity=medium&amp;id=682acdc1bbaf20d303f129d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-18-f12f77</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-18&amp;severity=medium&amp;id=682acdc2bbaf20d303f12f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-17-f12b27</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-17&amp;severity=medium&amp;id=682acdc1bbaf20d303f12b27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25916-prototype-pollution-in-patchmerge-beda84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25916%3A%20Prototype%20Pollution%20in%20patchmerge&amp;severity=critical&amp;id=682d983ac4522896dcbeda84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-16-f1268d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-16&amp;severity=medium&amp;id=682acdc0bbaf20d303f1268d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-15-752626</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-15&amp;severity=medium&amp;id=682c7abce3e6de8ceb752626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-15-f12a27</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-15&amp;severity=medium&amp;id=682acdc1bbaf20d303f12a27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-03-14-83ece5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-03-14&amp;severity=medium&amp;id=682b68ebd14de609c883ece5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-14-f121d4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-14&amp;severity=medium&amp;id=682acdc0bbaf20d303f121d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-13-f12fb9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-13&amp;severity=medium&amp;id=682acdc2bbaf20d303f12fb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21082-access-of-memory-location-after-end-of-buffer-cwe-788-in-adobe-photoshop-bf182d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21082%3A%20Access%20of%20Memory%20Location%20After%20End%20of%20Buffer%20(CWE-788)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf182d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21078-untrusted-search-path-cwe-426-in-adobe-creative-cloud-desktop-component-bf180e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21078%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Creative%20Cloud%20(desktop%20component)&amp;severity=medium&amp;id=682d9840c4522896dcbf180e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21074-out-of-bounds-read-cwe-125-in-adobe-animate-bf17e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21074%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf17e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21056-out-of-bounds-read-cwe-125-in-adobe-framemaker-bf1799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21056%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20FrameMaker&amp;severity=medium&amp;id=682d9840c4522896dcbf1799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21085-improper-input-validation-cwe-20-in-adobe-connect-bf1835</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21085%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Connect&amp;severity=medium&amp;id=682d9840c4522896dcbf1835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21071-out-of-bounds-write-cwe-787-in-adobe-animate-bf17b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21071%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf17b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21067-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf17a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21067%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf17a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21075-out-of-bounds-read-cwe-125-in-adobe-animate-bf17f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21075%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf17f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21080-cross-site-scripting-reflected-xss-cwe-79-in-adobe-connect-bf181e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21080%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Connect&amp;severity=medium&amp;id=682d9840c4522896dcbf181e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21076-out-of-bounds-read-cwe-125-in-adobe-animate-bf17fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21076%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf17fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21068-creation-of-temporary-file-in-directory-with-incorrect-permissions-cwe-379-in-adobe-creative-cloud-desktop-component-bf17a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21068%3A%20Creation%20of%20Temporary%20File%20in%20Directory%20with%20Incorrect%20Permissions%20(CWE-379)%20in%20Adobe%20Creative%20Cloud%20(desktop%20component)&amp;severity=medium&amp;id=682d9840c4522896dcbf17a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21077-heap-based-buffer-overflow-cwe-122-in-adobe-animate-bf1806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21077%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf1806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21069-improper-input-validation-cwe-20-in-adobe-creative-cloud-desktop-component-bf17ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21069%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Creative%20Cloud%20(desktop%20component)&amp;severity=medium&amp;id=682d9840c4522896dcbf17ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21073-out-of-bounds-read-cwe-125-in-adobe-animate-bf17d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21073%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf17d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21072-out-of-bounds-read-cwe-125-in-adobe-animate-bf17c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21072%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf17c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21079-cross-site-scripting-reflected-xss-cwe-79-in-adobe-connect-bf1816</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21079%3A%20Cross-site%20Scripting%20(Reflected%20XSS)%20(CWE-79)%20in%20Adobe%20Connect&amp;severity=medium&amp;id=682d9840c4522896dcbf1816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threatfox-iocs-for-2021-03-12-f120b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ThreatFox%20IOCs%20for%202021-03-12&amp;severity=medium&amp;id=682acdc0bbaf20d303f120b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dearcry-ransomware-abusing-exchange-server-f0c17d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DearCry%20ransomware%20(abusing%20Exchange%20Server)&amp;severity=high&amp;id=682acdbebbaf20d303f0c17d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21265-cwe-644-improper-neutralization-of--2ebf6a4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21265%3A%20CWE-644%3A%20Improper%20Neutralization%20of%20HTTP%20Headers%20for%20Scripting%20Syntax%20in%20octobercms%20october&amp;severity=medium&amp;id=6838f151182aa0cae293f9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25915-prototype-pollution-in-changeset-beda73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25915%3A%20Prototype%20Pollution%20in%20changeset&amp;severity=critical&amp;id=682d983ac4522896dcbeda73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21480-code-execution-in-sap-se-sap-manufacturing-integration-and-intelligence-bdba3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21480%3A%20Code%20Execution%20in%20SAP%20SE%20SAP%20Manufacturing%20Integration%20and%20Intelligence&amp;severity=critical&amp;id=682d981ec4522896dcbdba3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/march-2021-exchange-server-security-updates-for-ol-d54865f9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=March%202021%20Exchange%20Server%20Security%20Updates%20for%20older%20Cumulative%20Updates%20of%20Exchange%20Server&amp;severity=high&amp;id=68359c9d5d5f0974d01f3b82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/urlhaus-iocs-for-2021-03-09-8596e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=URLhaus%20IOCs%20for%202021-03-09&amp;severity=medium&amp;id=682b68f0d14de609c88596e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/march-2021-exchange-server-security-updates-for-older-cumulative-updates-of-exchange-server-f0dbc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=March%202021%20Exchange%20Server%20Security%20Updates%20for%20older%20Cumulative%20Updates%20of%20Exchange%20Server&amp;severity=high&amp;id=682acdbebbaf20d303f0dbc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35636-cwe-129-improper-validation-of-array-index-in-cgal-project-bf171a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35636%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL%20Project&amp;severity=medium&amp;id=682d9840c4522896dcbf171a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35628-cwe-129-improper-validation-of-array-index-in-cgal-bf1716</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35628%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL&amp;severity=medium&amp;id=682d9840c4522896dcbf1716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28636-cwe-129-improper-validation-of-array-index-in-cgal-bf170c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28636%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL&amp;severity=medium&amp;id=682d9840c4522896dcbf170c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28601-cwe-129-improper-validation-of-array-index-in-cgal-bf16ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28601%3A%20CWE-129%3A%20Improper%20Validation%20of%20Array%20Index%20in%20CGAL&amp;severity=medium&amp;id=682d9840c4522896dcbf16ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22883-denial-of-service-cwe-400-in-nodejs-node-bed41b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22883%3A%20Denial%20of%20Service%20(CWE-400)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-22884-reliance-on-reverse-dns-resolution-for-a-security-critical-action-cwe-350-in-nodejs-node-bed423</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-22884%3A%20Reliance%20on%20Reverse%20DNS%20Resolution%20for%20a%20Security-Critical%20Action%20(CWE-350)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cisa-gov-aa21-062a-mitigate-microsoft-exchange-server-vulnerabilities-f0ef4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CISA.gov%20-%20AA21-062A%20Mitigate%20Microsoft%20Exchange%20Server%20Vulnerabilities&amp;severity=low&amp;id=682acdbebbaf20d303f0ef4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-25914-prototype-pollution-in-object-collider-beda06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-25914%3A%20Prototype%20Pollution%20in%20object-collider&amp;severity=critical&amp;id=682d983ac4522896dcbeda06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-27618-na-in-na-97919267</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-27618%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938edb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27645-na-in-na-cbff1be7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27645%3A%20n%2Fa%20in%20n%2Fa&amp;severity=low&amp;id=68487f5e1b0bd07c3938faa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ironnetinjector-turla-s-new-malware-loading-tool-f0c16e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20IronNetInjector%3A%20Turla%E2%80%99s%20New%20Malware%20Loading%20Tool&amp;severity=medium&amp;id=682acdbebbaf20d303f0c16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/gamaredon-group-common-notes-from-mcafee-and-other-sources-f0c16c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Gamaredon%20Group%20(common%20notes%20from%20McAfee%20and%20other%20sources)&amp;severity=low&amp;id=682acdbebbaf20d303f0c16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27104-n-a-in-n-a-bee3c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27104%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27103-n-a-in-n-a-bee3bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27103%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee3bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27102-n-a-in-n-a-bee3ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27102%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983bc4522896dcbee3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-27101-n-a-in-n-a-bee3a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-27101%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983bc4522896dcbee3a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28918-na-in-na-1c4bded9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28918%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-report-extended-sandworm-intrusion-set-cam-0af28c97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT-FR%20report%20extended%20-%20sandworm%20intrusion%20set%20campaign%20targeting%20Centreon%20systems&amp;severity=medium&amp;id=68359ca35d5f0974d01fd5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-report-extended-sandworm-intrusion-set-campaign-targeting-centreon-systems-f0c16a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CERT-FR%20report%20extended%20-%20sandworm%20intrusion%20set%20campaign%20targeting%20Centreon%20systems&amp;severity=low&amp;id=682acdbebbaf20d303f0c16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21053-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf1762</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21053%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9840c4522896dcbf1762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21054-out-of-bounds-write-cwe-787-in-adobe-illustrator-bf1766</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21054%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9840c4522896dcbf1766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21055-untrusted-search-path-cwe-426-in-adobe-dreamweaver-bf177b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21055%3A%20Untrusted%20Search%20Path%20(CWE-426)%20in%20Adobe%20Dreamweaver&amp;severity=medium&amp;id=682d9840c4522896dcbf177b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21052-out-of-bounds-write-cwe-787-in-adobe-animate-bf175e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21052%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf175e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21049-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf1752</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21049%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf1752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21048-out-of-bounds-write-cwe-787-in-adobe-photoshop-bf174e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21048%3A%20Out-of-bounds%20Write%20(CWE-787)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf174e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21050-out-of-bounds-read-cwe-125-in-adobe-photoshop-bf1756</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21050%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf1756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21051-buffer-overflow-cwe-120-in-adobe-photoshop-bf175a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21051%3A%20Buffer%20Overflow%20(CWE-120)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf175a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21060-improper-input-validation-cwe-20-in-adobe-acrobat-reader-bf178a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21060%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20Adobe%20Acrobat%20Reader&amp;severity=medium&amp;id=682d9840c4522896dcbf178a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35498-cwe-400-in-openvswitch-bf1710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35498%3A%20CWE-400%20in%20openvswitch&amp;severity=high&amp;id=682d9840c4522896dcbf1710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-an-analysis-of-the-egregor-ransomware-7bd670</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20AN%20ANALYSIS%20OF%20THE%20EGREGOR%20RANSOMWARE&amp;severity=medium&amp;id=682b81068ee1a77b717bd670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-an-analysis-of-the-egregor-ransomware-f0c166</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20AN%20ANALYSIS%20OF%20THE%20EGREGOR%20RANSOMWARE&amp;severity=medium&amp;id=682acdbebbaf20d303f0c166</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-26937-n-a-in-n-a-bd7354</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-26937%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9817c4522896dcbd7354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-infrastructure-d-attaque-du-groupe-cybercriminel-ta505-778249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCERT-FR%5D%20Infrastructure%20d&apos;attaque%20du%20groupe%20cybercriminel%20TA505&amp;severity=medium&amp;id=682c7adce3e6de8ceb778249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hildegard-new-teamtnt-malware-targeting-kubernetes-f0c164</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hildegard%3A%20New%20TeamTNT%20Malware%20Targeting%20Kubernetes&amp;severity=high&amp;id=682acdbebbaf20d303f0c164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-25506-na-in-na-11519acb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-25506%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f521b0bd07c39389ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-kobalos-a-complex-linux-threat-to-high-performance-computing-infrastructure-f0c162</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Kobalos%20%E2%80%93%20A%20complex%20Linux%20threat%20to%20high%20performance%20computing%20infrastructure&amp;severity=medium&amp;id=682acdbebbaf20d303f0c162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28406-na-in-na-77ebaccc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28406%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28405-na-in-na-e0b7d329</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28405%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72fa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28404-na-in-na-1c57c331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28404%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28403-na-in-na-6cfabe41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28403%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28402-na-in-na-a1509d81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28402%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-28401-na-in-na-a0cc0d70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-28401%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26272-cwe-668-exposure-of-resource-to-wro-d161d4b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26272%3A%20CWE-668%3A%20Exposure%20of%20Resource%20to%20Wrong%20Sphere%20in%20electron%20electron&amp;severity=medium&amp;id=6835dda5182aa0cae218668b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-3326-na-in-na-1553132a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-3326%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5e1b0bd07c3938f3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-sandworm-intrusion-set-campaign-targeting--22758379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCERT-FR%5D%20Sandworm%20intrusion%20set%20campaign%20targeting%20Centreon%20systems&amp;severity=medium&amp;id=68367c12182aa0cae2312aeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cert-fr-sandworm-intrusion-set-campaign-targeting-centreon-systems-f0c168</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BCERT-FR%5D%20Sandworm%20intrusion%20set%20campaign%20targeting%20Centreon%20systems&amp;severity=low&amp;id=682acdbebbaf20d303f0c168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-campaign-targeting-security-researchers-f0f230</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20campaign%20targeting%20security%20researchers&amp;severity=medium&amp;id=682acdbebbaf20d303f0f230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-campaign-targeting-security-researchers-f0c160</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20campaign%20targeting%20security%20researchers&amp;severity=medium&amp;id=682acdbebbaf20d303f0c160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-27298-cwe-78-os-command-injection-in-phil-407bf357</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-27298%3A%20CWE-78%20OS%20Command%20Injection%20in%20Philips%20Interventional%20Workspot&amp;severity=medium&amp;id=6840c579182aa0cae2c16b2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-20190-cwe-502-in-jackson-databind-bed072</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-20190%3A%20CWE-502%20in%20jackson-databind&amp;severity=high&amp;id=682d983ac4522896dcbed072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21007-uncontrolled-search-path-element-cwe-427-in-adobe-illustrator-bf172f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21007%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Illustrator&amp;severity=medium&amp;id=682d9840c4522896dcbf172f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21006-heap-based-buffer-overflow-cwe-122-in-adobe-photoshop-bf172b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21006%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Adobe%20Photoshop&amp;severity=medium&amp;id=682d9840c4522896dcbf172b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21008-uncontrolled-search-path-element-cwe-427-in-adobe-animate-bf1742</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21008%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Animate&amp;severity=medium&amp;id=682d9840c4522896dcbf1742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21009-server-side-request-forgery-ssrf-cwe-918-in-adobe-campaign-bf1746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21009%3A%20Server-Side%20Request%20Forgery%20(SSRF)%20(CWE-918)%20in%20Adobe%20Campaign&amp;severity=medium&amp;id=682d9840c4522896dcbf1746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-21011-uncontrolled-search-path-element-cwe-427-in-adobe-captivate-bf174a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-21011%3A%20Uncontrolled%20Search%20Path%20Element%20(CWE-427)%20in%20Adobe%20Captivate&amp;severity=medium&amp;id=682d9840c4522896dcbf174a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/leonardo-s-p-a-data-breach-analysis-blog-post-from-reaqta-f0c15e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Leonardo%20S.p.A.%20Data%20Breach%20Analysis%20blog%20post%20from%20Reaqta&amp;severity=high&amp;id=682acdbebbaf20d303f0c15e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8265-use-after-free-cwe-416-in-nodejs-node-bed3e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8265%3A%20Use%20After%20Free%20(CWE-416)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed3e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8287-http-request-smuggling-cwe-444-in-nodejs-node-bed413</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8287%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-babuk-ransomware-f0c151</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Babuk%20Ransomware&amp;severity=low&amp;id=682acdbebbaf20d303f0c151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/c2-jarm-a-list-of-jarm-hashes-for-different-ssl-implementations-used-by-some-c2-tools-f0c14f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=C2-JARM%20-%20A%20list%20of%20JARM%20hashes%20for%20different%20ssl%20implementations%20used%20by%20some%20C2%20tools.&amp;severity=low&amp;id=682acdbebbaf20d303f0c14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-25013-na-in-na-9b6685a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-25013%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938ed9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-egregor-raas-continues-the-chaos-with-cobalt-7647b77d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Egregor%20RaaS%20Continues%20the%20Chaos%20with%20Cobalt%20Strike%20and%20Rclone&amp;severity=medium&amp;id=68359c9f5d5f0974d01fc07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-egregor-raas-continues-the-chaos-with-cobalt-strike-and-rclone-f0e5b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Egregor%20RaaS%20Continues%20the%20Chaos%20with%20Cobalt%20Strike%20and%20Rclone&amp;severity=medium&amp;id=682acdbebbaf20d303f0e5b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/regretlocker-vmray-analyzer-report-for-sample-1500977-f0c14b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RegretLocker%20-%20VMRay%20Analyzer%20Report%20for%20Sample%20%231500977&amp;severity=low&amp;id=682acdbebbaf20d303f0c14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/regretlocker-compiled-information-activity-and-samples-f0c149</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RegretLocker%20-%20compiled%20information%2C%20activity%20and%20samples&amp;severity=medium&amp;id=682acdbebbaf20d303f0c149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/regretlocker-compiled-information-activity-and-samples-6e1ed1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RegretLocker%20-%20compiled%20information%2C%20activity%20and%20samples&amp;severity=medium&amp;id=6828eab8e1a0c275ea6e1ed1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35728-n-a-in-n-a-bed06a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35728%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-advisory-solarwinds-supply-chain-attack-f0c147</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Threat%20Advisory%3A%20SolarWinds%20supply%20chain%20attack&amp;severity=high&amp;id=682acdbebbaf20d303f0c147</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-35460-n-a-in-n-a-bdb1b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-35460%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb1b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-27252-cwe-367-time-of-check-time-of-use-toctou-race-condition-in-medtronic-smart-model-25000-patient-reader-264b3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-27252%3A%20CWE-367%20Time-of-check%20Time-of-use%20(TOCTOU)%20Race%20Condition%20in%20Medtronic%20Smart%20Model%2025000%20Patient%20Reader&amp;severity=high&amp;id=682f80630acd01a249264b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-25187-cwe-122-heap-based-buffer-overflow-in-medtronic-smart-model-25000-patient-reader-264b48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-25187%3A%20CWE-122%20Heap-based%20Buffer%20Overflow%20in%20Medtronic%20Smart%20Model%2025000%20Patient%20Reader&amp;severity=high&amp;id=682f80630acd01a249264b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-25183-cwe-287-improper-authentication-in-medtronic-smart-model-25000-patient-reader-264b46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-25183%3A%20CWE-287%20Improper%20Authentication%20in%20Medtronic%20Smart%20Model%2025000%20Patient%20Reader&amp;severity=high&amp;id=682f80630acd01a249264b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-unc2452-sunburst-vxunderground-osint-related-3b4161d1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20UNC2452%20%2F%20SUNBURST%20%40vxunderground%20OSINT%20related%20findings&amp;severity=high&amp;id=68359c9e5d5f0974d01fb95e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-unc2452-sunburst-vxunderground-osint-related-findings-f0de39</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20UNC2452%20%2F%20SUNBURST%20%40vxunderground%20OSINT%20related%20findings&amp;severity=high&amp;id=682acdbebbaf20d303f0de39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cobaltstrike-c2s-dec2020-10-f0c143</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CobaltStrike%20C2s%20Dec2020_10&amp;severity=medium&amp;id=682acdbebbaf20d303f0c143</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-29562-na-in-na-62cb4b8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-29562%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5e1b0bd07c3938f3ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/usrnif-download-google-f0d3f1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=usrnif%20download%20google&amp;severity=medium&amp;id=682acdbebbaf20d303f0d3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-25638-cwe-89-in-hibernate-core-bf16fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-25638%3A%20CWE-89%20in%20hibernate-core&amp;severity=high&amp;id=682d9840c4522896dcbf16fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-7533-cwe-287-improper-authentication-in-w-31fd19b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-7533%3A%20CWE-287%20Improper%20Authentication%20in%20Web%20Server%20on%20Modicon%20M340%2C%20Modicon%20Quantum%20and%20Modicon%20Premium%20Legacy%20offers%20and%20their%20Communication%20Modules%20(see%20security%20notification%20for%20version%20information)&amp;severity=low&amp;id=68487f591b0bd07c3938aae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-egregor-the-new-ransomware-variant-to-watch-f0c13f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Egregor%3A%20The%20New%20Ransomware%20Variant%20To%20Watch&amp;severity=high&amp;id=682acdbebbaf20d303f0c13f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cobaltstrike-c2s-on-port-443-777041</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CobaltStrike%20C2s%20on%20Port%20443&amp;severity=low&amp;id=682c7adae3e6de8ceb777041</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8277-denial-of-service-cwe-400-in-nodejs-node-bed3ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8277%3A%20Denial%20of%20Service%20(CWE-400)%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-anatomy-of-attack-inside-bazarbackdoor-to-ryuk-ransomware-one-group-via-cobalt-strike-f0c130</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Anatomy%20of%20Attack%3A%20Inside%20BazarBackdoor%20to%20Ryuk%20Ransomware%20%22one%22%20Group%20via%20Cobalt%20Strike&amp;severity=high&amp;id=682acdbebbaf20d303f0c130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26167-na-in-na-082307b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26167%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=6839d93e182aa0cae2b72f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sekoa-ioc-csv-github-ryuk-f0c12e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SEKOA%20IOC%20-%20CSV%20GitHub%20-%20Ryuk&amp;severity=medium&amp;id=682acdbebbaf20d303f0c12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ryuk-ransomware-extensive-attack-infrastructure-revealed-f0c12c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ryuk%20Ransomware%3A%20Extensive%20Attack%20Infrastructure%20Revealed&amp;severity=medium&amp;id=682acdbebbaf20d303f0c12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/unc1878-ryuk-f0c12a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=unc1878%20-%20ryuk&amp;severity=medium&amp;id=682acdbebbaf20d303f0c12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-activity-targeting-the-healthcare-and-public-health-sector-f0c128</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20Activity%20Targeting%20the%20Healthcare%20and%20Public%20Health%20Sector&amp;severity=high&amp;id=682acdbebbaf20d303f0c128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ryuk-ransomware-and-associated-threat-activity-046bba39</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ryuk%20Ransomware%20and%20Associated%20Threat%20Activity&amp;severity=medium&amp;id=6932c955f88dbe026c9e4a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9746-null-pointer-dereference-cwe-476-in-adobe-flash-player-bf171e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9746%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Adobe%20Flash%20Player&amp;severity=medium&amp;id=682d9840c4522896dcbf171e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-26546-na-in-na-3cff9c32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-26546%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-15594-na-in-na-9e26b80f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-15594%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-15595-na-in-na-b2c80b09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-15595%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-cdrthief-indicators-of-compromise-who-is-calling-cdrthief-targets-linux-voip-softswitches-f0c126</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%2FCDRThief%E2%80%89%E2%80%94%E2%80%89Indicators%20of%20Compromise%20-%20Who%20is%20calling%3F%20CDRThief%20targets%20Linux%20VoIP%20softswitches&amp;severity=medium&amp;id=682acdbebbaf20d303f0c126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-25792-n-a-in-n-a-bdb181</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-25792%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8201-http-request-smuggling-cwe-444-in-nodejs-node-bed3cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8201%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed3cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8252-classic-buffer-overflow-cwe-120-in-nodejs-node-bed3df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8252%3A%20Classic%20Buffer%20Overflow%20(CWE-120)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed3df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8251-denial-of-service-cwe-400-in-nodejs-node-bed3d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8251%3A%20Denial%20of%20Service%20(CWE-400)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed3d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-16247-cwe-16-in-philips-clinical-collabor-ba768718</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-16247%3A%20CWE-16%20in%20Philips%20Clinical%20Collaboration%20Platform&amp;severity=medium&amp;id=68418437182aa0cae2dccceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-16200-cwe-757-in-philips-clinical-collabo-d6b437d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-16200%3A%20CWE-757%20in%20Philips%20Clinical%20Collaboration%20Platform&amp;severity=medium&amp;id=6840c579182aa0cae2c16ae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-16198-cwe-693-in-philips-clinical-collabo-925a8fff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-16198%3A%20CWE-693%20in%20Philips%20Clinical%20Collaboration%20Platform&amp;severity=medium&amp;id=68418437182aa0cae2dcccef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-14525-cwe-83-in-philips-clinical-collabor-c1829f8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-14525%3A%20CWE-83%20in%20Philips%20Clinical%20Collaboration%20Platform&amp;severity=low&amp;id=6840ba7d182aa0cae2bf6f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-14506-cwe-352-in-philips-clinical-collabo-145ba5f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-14506%3A%20CWE-352%20in%20Philips%20Clinical%20Collaboration%20Platform&amp;severity=low&amp;id=6840c579182aa0cae2c16b17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-15187-cwe-694-use-of-multiple-resources-w-8ac4b9d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-15187%3A%20CWE-694%3A%20Use%20of%20Multiple%20Resources%20with%20Duplicate%20Identifier%20in%20helm%20helm&amp;severity=low&amp;id=6838ea1f182aa0cae292fd93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-25020-n-a-in-n-a-bdb179</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-25020%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-17386-cwe-918-server-side-request-forgery-ssrf-in-cellopoint-celloos-bd87b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-17386%3A%20CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)%20in%20Cellopoint%20CelloOS&amp;severity=medium&amp;id=682d9819c4522896dcbd87b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-17385-unauthenticated-arbitrary-file-disclosure-in-cellopoint-celloos-bd87ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-17385%3A%20Unauthenticated%20Arbitrary%20File%20Disclosure%20in%20Cellopoint%20CelloOS&amp;severity=high&amp;id=682d9819c4522896dcbd87ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-17384-remote-command-execution-rce-in-cellopoint-celloos-bd878f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-17384%3A%20Remote%20Command%20Execution%20(RCE)%20in%20Cellopoint%20CelloOS&amp;severity=high&amp;id=682d9819c4522896dcbd878f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-16239-cwe-287-in-philips-suresigns-vs4-453701cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-16239%3A%20CWE-287%20in%20Philips%20SureSigns%20VS4&amp;severity=medium&amp;id=6840be00182aa0cae2bfede5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-16241-cwe-284-in-philips-suresigns-vs4-ed954fe9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-16241%3A%20CWE-284%20in%20Philips%20SureSigns%20VS4&amp;severity=medium&amp;id=68418437182aa0cae2dccce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-16237-cwe-20-in-philips-suresigns-vs4-23aeafee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-16237%3A%20CWE-20%20in%20Philips%20SureSigns%20VS4&amp;severity=low&amp;id=68418437182aa0cae2dccce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-14518-cwe-532-in-philips-dreammapper-355e8a0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-14518%3A%20CWE-532%20in%20Philips%20DreamMapper&amp;severity=medium&amp;id=6840c191182aa0cae2c06c33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9715-use-after-free-in-adobe-adobe-acrobat-and-reader-bdb284</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9715%3A%20Use-after-free%20in%20Adobe%20Adobe%20Acrobat%20and%20Reader&amp;severity=high&amp;id=682d981dc4522896dcbdb284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9675-out-of-bounds-read-in-adobe-adobe-bridge-bdb252</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9675%3A%20Out-of-bounds%20read%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9674-out-of-bounds-write-in-adobe-adobe-bridge-bdb24a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9674%3A%20Out-of-bounds%20write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb24a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9676-out-of-bounds-write-in-adobe-adobe-bridge-bdb280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9676%3A%20Out-of-bounds%20write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9673-dll-search-order-hijacking-in-adobe-adobe-coldfusion-2016-bdb246</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9673%3A%20DLL%20search-order%20hijacking%20in%20Adobe%20Adobe%20ColdFusion%202016&amp;severity=high&amp;id=682d981dc4522896dcbdb246</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9672-dll-search-order-hijacking-in-adobe-adobe-coldfusion-2016-bdb242</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9672%3A%20DLL%20search-order%20hijacking%20in%20Adobe%20Adobe%20ColdFusion%202016&amp;severity=high&amp;id=682d981dc4522896dcbdb242</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-to-empire-f0c124</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20to%20Empire&amp;severity=low&amp;id=682acdbebbaf20d303f0c124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9563-heap-overflow-in-adobe-adobe-bridge-bdb1f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9563%3A%20Heap%20Overflow%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9564-out-of-bounds-write-in-adobe-adobe-bridge-bdb218</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9564%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb218</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9556-out-of-bounds-write-in-adobe-adobe-bridge-bdb1e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9556%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9560-out-of-bounds-write-in-adobe-adobe-bridge-bdb1eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9560%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9561-out-of-bounds-write-in-adobe-adobe-bridge-bdb1ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9561%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9555-stack-based-buffer-overflow-in-adobe-adobe-bridge-bdb1d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9555%3A%20Stack-based%20Buffer%20Overflow%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9562-heap-overflow-in-adobe-adobe-bridge-bdb1f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9562%3A%20Heap%20Overflow%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9559-out-of-bounds-write-in-adobe-adobe-bridge-bdb1e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9559%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9554-out-of-bounds-write-in-adobe-adobe-bridge-bdb1c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9554%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9565-out-of-bounds-write-in-adobe-adobe-bridge-bdb21c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9565%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb21c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9566-use-after-free-in-adobe-adobe-bridge-bdb220</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9566%3A%20Use%20After%20Free%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb220</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9569-out-of-bounds-write-in-adobe-adobe-bridge-bdb235</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9569%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb235</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9568-memory-corruption-in-adobe-adobe-bridge-bdb231</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9568%3A%20Memory%20Corruption%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb231</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9567-use-after-free-in-adobe-adobe-bridge-bdb224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9567%3A%20Use%20After%20Free%20in%20Adobe%20Adobe%20Bridge&amp;severity=high&amp;id=682d981dc4522896dcbdb224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-14477-cwe-288-in-philips-ultrasound-clear-b12348a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-14477%3A%20CWE-288%20in%20Philips%20Ultrasound%20ClearVue&amp;severity=low&amp;id=68418437182aa0cae2dcccd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zloader-vba-r1c1-references-and-other-tomfoolery-e77401</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=zloader%3A%20VBA%2C%20R1C1%20References%2C%20and%20Other%20Tomfoolery&amp;severity=low&amp;id=682b7ba2d3ddd8cef2e77401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/zloader-vba-r1c1-references-and-other-tomfoolery-f0c122</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=zloader%3A%20VBA%2C%20R1C1%20References%2C%20and%20Other%20Tomfoolery&amp;severity=low&amp;id=682acdbebbaf20d303f0c122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-golden-tax-department-and-the-emergence-of-goldenspy-malware-f0c298</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Golden%20Tax%20Department%20and%20the%20Emergence%20of%20GoldenSpy%20Malware&amp;severity=low&amp;id=682acdbebbaf20d303f0c298</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8165-deserialization-of-untrusted-data-cwe-502-in-https-github-com-rails-rails-bd734c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8165%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20https%3A%2F%2Fgithub.com%2Frails%2Frails&amp;severity=critical&amp;id=682d9817c4522896dcbd734c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-13162-n-a-in-n-a-bdb16d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-13162%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981dc4522896dcbdb16d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-14061-n-a-in-n-a-bed04e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-14061%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed04e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dharma-ransomware-event-7789e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dharma%20Ransomware%20Event&amp;severity=low&amp;id=682c7adce3e6de8ceb7789e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-12023-cwe-532-in-philips-intellibridge-en-23eb9482</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-12023%3A%20CWE-532%20in%20Philips%20IntelliBridge%20Enterprise%20(IBE)&amp;severity=low&amp;id=68418437182aa0cae2dcccd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-9802-processing-maliciously-crafted-web-content-may-lead-to-arbitrary-code-execution-in-apple-ios-bdb288</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-9802%3A%20Processing%20maliciously%20crafted%20web%20content%20may%20lead%20to%20arbitrary%20code%20execution%20in%20Apple%20iOS&amp;severity=high&amp;id=682d981dc4522896dcbdb288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-iq-fa006-dridex-xls-documents-with-fancy-lures-778740</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20IQ-FA006%3ADridex%20XLS%20Documents%20with%20Fancy%20Lures&amp;severity=low&amp;id=682c7adce3e6de8ceb778740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-iq-fa006-dridex-xls-documents-with-fancy-lures-f0c113</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20IQ-FA006%3ADridex%20XLS%20Documents%20with%20Fancy%20Lures&amp;severity=low&amp;id=682acdbebbaf20d303f0c113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ta505-ioc-2020-06-06-7784bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TA505%20IoC%20-%202020-06-06&amp;severity=medium&amp;id=682c7adce3e6de8ceb7784bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-cyber-operation-targets-italy-digging-into-the-netwire-attack-chai-7783f1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Cyber%20Operation%20Targets%20Italy%3A%20Digging%20Into%20the%20Netwire%20Attack%20Chai&amp;severity=low&amp;id=682c7adce3e6de8ceb7783f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-13817-n-a-in-n-a-bdb171</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-13817%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb171</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-13776-na-in-na-8d6f7383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-13776%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938dfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-11080-cwe-707-improper-enforcement-of-mes-c6921d2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-11080%3A%20CWE-707%20Improper%20Enforcement%20of%20Message%20or%20Data%20Structure%20in%20nghttp2%20nghttp2&amp;severity=low&amp;id=68487f5d1b0bd07c3938dfc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-kaiten-ak47-a-mod-telnet-scanner-echo-loader-hexstrings-spread-f0c10d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%2FKAITEN%20AK47(a%20Mod-Telnet-Scanner)%20%26%20Echo-loader%20hexstrings%20spread&amp;severity=low&amp;id=682acdbebbaf20d303f0c10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kugou-trojan-backdoor-campaign-aim-rdp-on-hfs-panels-778a23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=KuGou%20trojan%20backdoor%20campaign%20aim%20RDP%20on%20HFS%20panels&amp;severity=medium&amp;id=682c7adde3e6de8ceb778a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-mirai-hilix-w-new-table-encoder-aims-realtek-huawei-routers-f0c109</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%2FMirai-Hilix%20(w%2FNew%20TABLE%20encoder)%20aims%20Realtek%20%26%20Huawei%20routers&amp;severity=low&amp;id=682acdbebbaf20d303f0c109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-12762-na-in-na-7dc5efc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-12762%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-mirai-fbot-new-actor-on-propagation-f0c105</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%2FMirai-Fbot%20-%20New%20actor%20on%20propagation&amp;severity=low&amp;id=682acdbebbaf20d303f0c105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ursnif-campaign-f1-pipen-at-f0c103</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ursnif%20Campaign%20f1.pipen.at&amp;severity=low&amp;id=682acdbebbaf20d303f0c103</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-to-pyxie-f0c107</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20to%20Pyxie&amp;severity=low&amp;id=682acdbebbaf20d303f0c107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-11868-n-a-in-n-a-bdb15c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-11868%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdb15c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-1712-cwe-416-in-unknown-systemd-558c37e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-1712%3A%20CWE-416%20in%20%5BUNKNOWN%5D%20systemd&amp;severity=high&amp;id=68487f5d1b0bd07c3938df4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-11113-n-a-in-n-a-bed04a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-11113%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed04a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10828-n-a-in-n-a-bdb156</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10828%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb156</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10827-n-a-in-n-a-bdb152</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10827%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb152</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10826-n-a-in-n-a-bdb141</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10826%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb141</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10825-n-a-in-n-a-bdb139</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10825%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb139</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10824-n-a-in-n-a-bdb10d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10824%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10823-n-a-in-n-a-bdb105</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10823%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981dc4522896dcbdb105</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pivot-from-ip-address-105-235-129-138-where-the-c2-was-running-f0c0f4</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Pivot%20from%20IP%20address%20(105.235.129.138)%20where%20the%20C2%20was%20running&amp;severity=low&amp;id=682acdbebbaf20d303f0c0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-to-ryuk-in-two-hours-f0c101</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20to%20Ryuk%20in%20Two%20Hours&amp;severity=medium&amp;id=682acdbebbaf20d303f0c101</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lokibot-equation-editor-sample-f0c0f2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Lokibot%20Equation%20Editor%20Sample&amp;severity=low&amp;id=682acdbebbaf20d303f0c0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-10673-n-a-in-n-a-bed044</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-10673%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-gtag-lib693-tt0002-779223</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20Gtag%20lib693%2Ftt0002&amp;severity=low&amp;id=682c7adee3e6de8ceb779223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-gtag-lib693-tt0002-f0c0f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20Gtag%20lib693%2Ftt0002&amp;severity=low&amp;id=682acdbebbaf20d303f0c0f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-sample-of-operation-lagtime-ta428-f0c0ec</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20new%20sample%20of%20operation%20lagtime%20TA428&amp;severity=low&amp;id=682acdbebbaf20d303f0c0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-revengerat-targeting-france-f0c0ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20revengeRAT%20targeting%20France&amp;severity=low&amp;id=682acdbebbaf20d303f0c0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rhombus-linux-ddos-botnet-aims-vps-iot-w-persistence-dropper-f0c0e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rhombus%20-%20Linux%20DDoS%20botnet%20aims%20VPS%20%26%20IoT%2C%20w%2Fpersistence%20%26%20dropper&amp;severity=low&amp;id=682acdbebbaf20d303f0c0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-gtag-qw1-7795ae</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20Gtag%20QW1&amp;severity=low&amp;id=682c7adfe3e6de8ceb7795ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-gtag-qw1-f0c0ee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20Gtag%20QW1&amp;severity=low&amp;id=682acdbebbaf20d303f0c0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/harma-and-odveta-ransomware-f0c0e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Harma%20and%20Odveta%20Ransomware&amp;severity=low&amp;id=682acdbebbaf20d303f0c0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hajime-linux-iot-botnet-s-p2p-nodes-activity-since-jan-2020-f0c0e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hajime%20Linux%20IoT%20botnet&apos;s%20P2P%20nodes%20(activity%20since%20Jan%202020)&amp;severity=low&amp;id=682acdbebbaf20d303f0c0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/remcos-rat-02-28-20-f0c0e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Remcos%20RAT%2002-28-20&amp;severity=low&amp;id=682acdbebbaf20d303f0c0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/racoon-stealer-f0c0d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Racoon%20Stealer&amp;severity=low&amp;id=682acdbebbaf20d303f0c0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/interesting-recon-script-f0c0d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Interesting%20Recon%20Script&amp;severity=low&amp;id=682acdbebbaf20d303f0c0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-mirai-fbot-new-variant-with-strong-infection-spreading-rate-f0c0cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%2FMirai-Fbot%20-%20New%20variant%20with%20strong%20infection%20spreading%20rate&amp;severity=low&amp;id=682acdbebbaf20d303f0c0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-3765-out-of-bounds-write-in-adobe-adobe-after-effects-bdb1bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-3765%3A%20Out-of-Bounds%20Write%20in%20Adobe%20Adobe%20After%20Effects&amp;severity=critical&amp;id=682d981dc4522896dcbdb1bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ostap-maldoc-samples-f0c0d1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ostap%20Maldoc%20Samples&amp;severity=low&amp;id=682acdbebbaf20d303f0c0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-and-adfind-recon-77d777</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20and%20AdFind%20Recon&amp;severity=low&amp;id=682c7af2e3e6de8ceb77d777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-and-adfind-recon-f0c0cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trickbot%20and%20AdFind%20Recon&amp;severity=low&amp;id=682acdbebbaf20d303f0c0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/irs-doc-malware-febb23fa</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IRS%20Doc%20Malware&amp;severity=low&amp;id=68367c20182aa0cae2312b36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/irs-doc-malware-f0c0cb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IRS%20Doc%20Malware&amp;severity=low&amp;id=682acdbebbaf20d303f0c0cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xmrig-masscan-f0c0c9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XMRig%20%26%20Masscan&amp;severity=low&amp;id=682acdbebbaf20d303f0c0c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dever-ransomware-f0c0c7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dever%20Ransomware&amp;severity=low&amp;id=682acdbebbaf20d303f0c0c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-15606-improper-input-validation-cwe-20-in-nodejs-node-bed3c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-15606%3A%20Improper%20Input%20Validation%20(CWE-20)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed3c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-15604-improper-certificate-validation-cwe-295-in-nodejs-node-bed3a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-15604%3A%20Improper%20Certificate%20Validation%20(CWE-295)%20in%20NodeJS%20Node&amp;severity=medium&amp;id=682d983ac4522896dcbed3a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-15605-http-request-smuggling-cwe-444-in-nodejs-node-bed3af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-15605%3A%20HTTP%20Request%20Smuggling%20(CWE-444)%20in%20NodeJS%20Node&amp;severity=high&amp;id=682d983ac4522896dcbed3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warzone-rat-77d824</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warzone%20RAT&amp;severity=low&amp;id=682c7af3e3e6de8ceb77d824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/warzone-rat-f0c0c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Warzone%20RAT&amp;severity=low&amp;id=682acdbebbaf20d303f0c0c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/updating-tracking-powershell-empire-c2-via-urlscan-f0c0c3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Updating%3A%20Tracking%20Powershell%20Empire%20C2%20via%20Urlscan&amp;severity=medium&amp;id=682acdbebbaf20d303f0c0c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2020-8422-na-in-na-4ab499fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2020-8422%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72fa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vbs-downloader-and-defender-control-77d8b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VBS%20Downloader%20and%20Defender%20Control&amp;severity=low&amp;id=682c7af9e3e6de8ceb77d8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vbs-downloader-and-defender-control-f0c0ae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VBS%20Downloader%20and%20Defender%20Control&amp;severity=low&amp;id=682acdbebbaf20d303f0c0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-trickbot-cobaltstrike-gtag-mor85-77d7c2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%20-%20Trickbot%20-%20CobaltStrike%20-%20gtag%20mor85&amp;severity=low&amp;id=682c7af3e3e6de8ceb77d7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-trickbot-cobaltstrike-gtag-mor85-f0c0b6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%20-%20Trickbot%20-%20CobaltStrike%20-%20gtag%20mor85&amp;severity=low&amp;id=682acdbebbaf20d303f0c0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-trickbot-f0c0b0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%2FTrickbot&amp;severity=low&amp;id=682acdbebbaf20d303f0c0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-first-node-js-based-ransomware-nodera-f0c0aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20First%20Node.js-based%20Ransomware%20%3A%20Nodera&amp;severity=low&amp;id=682acdbebbaf20d303f0c0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-iranian-pupyrat-bites-middle-eastern-organizations-f0c0ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Iranian%20PupyRAT%20Bites%20Middle%20Eastern%20Organizations&amp;severity=high&amp;id=682acdbebbaf20d303f0c0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/muhstik-botnet-attacks-tomato-routers-f0c0a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Muhstik%20Botnet%20Attacks%20Tomato%20Routers&amp;severity=medium&amp;id=682acdbebbaf20d303f0c0a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-20386-na-in-na-6e3903e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-20386%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938e5e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/xmrig-and-opsec-fail-f0c0b2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=XMRig%20and%20OPSEC%20Fail&amp;severity=low&amp;id=682acdbebbaf20d303f0c0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ako-ransomware-f0c0b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ako%20Ransomware&amp;severity=low&amp;id=682acdbebbaf20d303f0c0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13939-cwe-20-improper-input-validation-in-25ad0482</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13939%3A%20CWE-20%3A%20Improper%20Input%20Validation%20in%20Siemens%20APOGEE%20MEC%2FMBC%2FPXC%20(P2)&amp;severity=high&amp;id=68487f541b0bd07c3938a1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-5188-cwe-787-out-of-bounds-write-in-e2fsp-9d2a5376</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-5188%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20E2fsprogs&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-spam-via-mobile-phone-f0c0a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Spam%20via%20mobile%20phone&amp;severity=low&amp;id=682acdbebbaf20d303f0c0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-7162-na-in-na-c4ba478f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-7162%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-introducing-bioload-fin7-boostwrite-s-lost-twin-f0c097</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Introducing%20BIOLOAD%3A%20FIN7%20BOOSTWRITE%C3%A2%E2%82%AC%E2%84%A2s%20Lost%20Twin&amp;severity=low&amp;id=682acdbebbaf20d303f0c097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-bronzeunion-luckymouse-apt27-infection-checker-f0c095</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20%23BronzeUnion%2F%23LuckyMouse%2F%23APT27%20infection%20checker&amp;severity=low&amp;id=682acdbebbaf20d303f0c095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-let-s-play-again-with-predator-the-thief-fumik0-s-box-f0c093</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Let%C3%A2%E2%82%AC%E2%84%A2s%20play%20(again)%20with%20Predator%20the%20thief%20%C3%A2%E2%82%AC%E2%80%9C%20Fumik0_&apos;s%20box&amp;severity=low&amp;id=682acdbebbaf20d303f0c093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-reversing-a-real-world-249-bytes-backdoor-f0c091</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Reversing%20a%20real-world%20249%20bytes%20backdoor!&amp;severity=low&amp;id=682acdbebbaf20d303f0c091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ta505-evolves-servhelper-uses-predator-the-thief-and-team-viewer-hijacking-f0c08f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TA505%20evolves%20ServHelper%2C%20uses%20Predator%20The%20Thief%20and%20Team%20Viewer%20Hijacking&amp;severity=high&amp;id=682acdbebbaf20d303f0c08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-7286-an-application-may-be-able-to-gain-e-39050980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-7286%3A%20An%20application%20may%20be%20able%20to%20gain%20elevated%20privileges%20in%20Apple%20iOS&amp;severity=high&amp;id=68487f521b0bd07c39389cde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gallium-targeting-global-telecom-eb4b58</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20GALLIUM%3A%20Targeting%20global%20telecom&amp;severity=high&amp;id=6834b3f6290ffd83a4eb4b58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trickbot-cashcore-hashes-f0c085</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20trickbot%20cashcore%20hashes&amp;severity=low&amp;id=682acdbebbaf20d303f0c085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-12-10-trickbot-project-anchor-window-into-sophisticated-operation-f0c078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-12-10%3A%20TrickBot%20Project%20%C3%A2%E2%82%AC%C5%93Anchor%3A%C3%A2%E2%82%AC%C2%9D%20Window%20Into%20Sophisticated%20Operation&amp;severity=medium&amp;id=682acdbebbaf20d303f0c078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tracking-powershell-empire-c2-via-urlscan-f0c08b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tracking%20Powershell%20Empire%20C2%20via%20Urlscan&amp;severity=medium&amp;id=682acdbebbaf20d303f0c08b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bfv-cyber-brief-nr-01-2019-hinweis-auf-aktuelle-angriffskampagne-f0c087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BfV%20Cyber-Brief%20Nr.%2001%2F2019%20-%20Hinweis%20auf%20aktuelle%20Angriffskampagne%20-&amp;severity=high&amp;id=682acdbebbaf20d303f0c087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-pypi-packages-f0c076</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20PyPI%20packages&amp;severity=high&amp;id=682acdbebbaf20d303f0c076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-18276-na-in-na-d82d8a53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-18276%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5c1b0bd07c3938d91c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-wrong-hashes-from-getmonero-org-6151-malicious-binaries-f0c074</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Wrong%20hashes%20(from%20getmonero.org)%20%236151%20-%20malicious%20binaries&amp;severity=high&amp;id=682acdbebbaf20d303f0c074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trojan-electrumdosminer-a-trojan-responsible-for-the-denial-of-service-attacks-against-electrum-bitcoin-wallets-f0c072</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Trojan.ElectrumDoSMiner%20-%20%20a%20Trojan%20responsible%20for%20the%20denial%20of%20service%20attacks%20against%20Electrum%20bitcoin%20wallets.&amp;severity=low&amp;id=682acdbebbaf20d303f0c072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-8246-out-of-bounds-write-in-adobe-adobe-media-encoder-bdb0ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-8246%3A%20Out-of-bounds%20Write%20in%20Adobe%20Adobe%20Media%20Encoder&amp;severity=critical&amp;id=682d981dc4522896dcbdb0ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-8244-out-of-bounds-read-in-adobe-adobe-media-encoder-bdb0fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-8244%3A%20Out-of-bounds%20Read%20in%20Adobe%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d981dc4522896dcbdb0fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-8243-out-of-bounds-read-in-adobe-adobe-media-encoder-bdb0f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-8243%3A%20Out-of-bounds%20Read%20in%20Adobe%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d981dc4522896dcbdb0f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-8242-out-of-bounds-read-in-adobe-adobe-media-encoder-bdb0ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-8242%3A%20Out-of-bounds%20Read%20in%20Adobe%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d981dc4522896dcbdb0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-8241-out-of-bounds-read-in-adobe-adobe-media-encoder-bdb0e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-8241%3A%20Out-of-bounds%20Read%20in%20Adobe%20Adobe%20Media%20Encoder&amp;severity=medium&amp;id=682d981dc4522896dcbdb0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-more-than-a-dozen-obfuscated-apt33-botnets-used-for-extreme-narrow-targeting-eb78c4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20More%20than%20a%20Dozen%20Obfuscated%20APT33%20Botnets%20Used%20for%20Extreme%20Narrow%20Targeting&amp;severity=high&amp;id=6834b3fa290ffd83a4eb78c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13531-cwe-287-improper-authentication-in-medtronic-valleylab-ft10-energy-platform-vlft10gen-2647a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13531%3A%20CWE-287%20Improper%20Authentication%20in%20Medtronic%20Valleylab%20FT10%20Energy%20Platform%20(VLFT10GEN)&amp;severity=medium&amp;id=682f725b0acd01a2492647a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13535-cwe-693-in-medtronic-valleylab-ft10-energy-platform-vlft10gen-2647a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13535%3A%20CWE-693%20in%20Medtronic%20Valleylab%20FT10%20Energy%20Platform%20(VLFT10GEN)&amp;severity=medium&amp;id=682f725b0acd01a2492647a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13539-cwe-328-in-medtronic-valleylab-exchange-client-266e5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13539%3A%20CWE-328%20in%20Medtronic%20Valleylab%20Exchange%20Client&amp;severity=high&amp;id=682f866a0acd01a249266e5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-13543-cwe-798-use-of-hard-coded-credentials-in-medtronic-valleylab-exchange-client-266e65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-13543%3A%20CWE-798%20Use%20of%20Hard-coded%20Credentials%20in%20Medtronic%20Valleylab%20Exchange%20Client&amp;severity=medium&amp;id=682f866a0acd01a249266e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iecrypt-sample-analysed-with-vmray-analyzer-report-for-sample-245141-iecrypt-f0c06e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IECrypt%20sample%20analysed%20with%20VMRay%20Analyzer%20Report%20for%20Sample%20%23245141%20(IECrypt)&amp;severity=low&amp;id=682acdbebbaf20d303f0c06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turla-venomous-bear-implants-f0c06a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turla%2FVenomous%20Bear%20Implants&amp;severity=low&amp;id=682acdbebbaf20d303f0c06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-chrome-0-day-exploit-cve-2019-13720-used-in-operation-wizardopium-f0c068</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Chrome%200-day%20exploit%20CVE-2019-13720%20used%20in%20Operation%20WizardOpium&amp;severity=low&amp;id=682acdbebbaf20d303f0c068</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dans-l-il-de-notre-cybersoc-la-campagne-malspam-aggah-diversifie-ses-outils-f0c06c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dans%20l%C3%A2%E2%82%AC%E2%84%A2%C3%85%E2%80%9Cil%20de%20notre%20CyberSOC%20%3A%20la%20campagne%20malspam%20Aggah%20diversifie%20ses%20outils&amp;severity=low&amp;id=682acdbebbaf20d303f0c06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-advisory-turla-group-exploits-iranian-apt-to-expand-coverage-of-victims-eb841f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-Advisory%3A%20Turla%20group%20exploits%20Iranian%20APT%20to%20expand%20coverage%20of%20victims&amp;severity=low&amp;id=6834b3ff290ffd83a4eb841f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-connecting-the-dots-exposing-the-arsenal-and-methods-of-the-winnti-group-eba716</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Connecting%20the%20dots%3A%20Exposing%20the%20arsenal%20and%20methods%20of%20the%20Winnti%20Group&amp;severity=low&amp;id=6834b404290ffd83a4eba716</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-agenttesla-actors-email-eba299</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20AgentTesla%20Actors%20Email&amp;severity=low&amp;id=6834b404290ffd83a4eba299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-16905-n-a-in-n-a-bf5608</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-16905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/supply-chain-attacks-eba48c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SUPPLY%20CHAIN%20ATTACKS&amp;severity=low&amp;id=6834b404290ffd83a4eba48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-in-depth-ttp-10-07-19-f0c08d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%20in%20Depth%20TTP%2010-07-19&amp;severity=medium&amp;id=682acdbebbaf20d303f0c08d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/operation-ghost-white-paper-f0c066</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Operation%20Ghost%20-%20White%20Paper&amp;severity=high&amp;id=682acdbebbaf20d303f0c066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/compfun-successor-reductor-compromise-tls-traffic-ebaa0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=COMpfun%20successor%20Reductor%3A%20compromise%20TLS%20traffic&amp;severity=low&amp;id=6834b40a290ffd83a4ebaa0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-emissarypanda-apt-older-sample-2018-f0c059</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%23EmissaryPanda%20%23APT%20older%20sample%20(2018)&amp;severity=low&amp;id=682acdbebbaf20d303f0c059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3728-cwe-125-out-of-bounds-read-in-dell-rsa-bsafe-crypto-c-micro-edition-aeaea0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3728%3A%20CWE-125%3A%20Out-of-bounds%20Read%20in%20Dell%20RSA%20BSAFE%20Crypto-C%20Micro%20Edition&amp;severity=high&amp;id=682cd0f71484d88663aeaea0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-iot-multiplatform-linux-malware-linux-airdropbot-f0c057</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20IoT%20multiplatform%20Linux%20malware%3A%20Linux%2FAirDropBot&amp;severity=low&amp;id=682acdbebbaf20d303f0c057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/magecarts-fifth-team-began-using-kpot-for-stealing-3de91d52</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Magecarts%20fifth%20team%20began%20using%20KPOT%20for%20stealing%20activities&amp;severity=medium&amp;id=6932ccd6f88dbe026ca84070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-5094-cwe-787-out-of-bounds-write-in-e2fsp-d11326c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-5094%3A%20CWE-787%3A%20Out-of-bounds%20Write%20in%20E2fsprogs&amp;severity=high&amp;id=683a06f1182aa0cae2bd9a4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/missing-link-tibetan-groups-targeted-with-mobile-exploits-f0c055</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MISSING%20LINK%3A%20Tibetan%20Groups%20Targeted%20with%20Mobile%20Exploits&amp;severity=low&amp;id=682acdbebbaf20d303f0c055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-emotet-updated-c2-info-9-20-f0c053</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Emotet%20Updated%20C2%20Info%209%2F20&amp;severity=low&amp;id=682acdbebbaf20d303f0c053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-gootkit-banking-trojan-campaign-against-italian-companies-and-users-f0c051</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Gootkit%20Banking%20Trojan%20campaign%20against%20Italian%20Companies%20and%20Users.&amp;severity=low&amp;id=682acdbebbaf20d303f0c051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/on-memory-post-exploit-payloads-from-encoded-binary-f0c04f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=On-memory%20post%20exploit%20payloads%20from%20encoded%20binary&amp;severity=medium&amp;id=682acdbebbaf20d303f0c04f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-eset-discovered-an-undocumented-backdoor-used-by-the-infamous-stealth-falcon-group-f0c04d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ESET%20discovered%20an%20undocumented%20backdoor%20used%20by%20the%20infamous%20Stealth%20Falcon%20group&amp;severity=low&amp;id=682acdbebbaf20d303f0c04d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-15903-na-in-na-ab1c5932</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-15903%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683a0a8d182aa0cae2be1972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sectorj04-group-s-increased-activity-in-2019-f0c04b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SectorJ04%20Group%C3%A2%E2%82%AC%E2%84%A2s%20Increased%20Activity%20in%202019&amp;severity=low&amp;id=682acdbebbaf20d303f0c04b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mirai-loligang-bot-f0c047</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mirai%20-%20Loligang%20bot&amp;severity=low&amp;id=682acdbebbaf20d303f0c047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gamaredon-group-f0c049</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Gamaredon%20group&amp;severity=low&amp;id=682acdbebbaf20d303f0c049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-emotet-is-back-f0c03a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Emotet%20is%20back&amp;severity=low&amp;id=682acdbebbaf20d303f0c03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ruby-gem-warning-is-rest-client-1-6-13-hijacked-713-f0c038</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ruby%2FGem%20Warning!%20is%20rest-client%201.6.13%20hijacked%3F%20%23713&amp;severity=low&amp;id=682acdbebbaf20d303f0c038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-8062-insecure-library-loading-dll-hijacking-in-adobe-adobe-after-effects-bdae1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-8062%3A%20Insecure%20Library%20Loading%20(DLL%20hijacking)%20in%20Adobe%20Adobe%20After%20Effects&amp;severity=high&amp;id=682d981dc4522896dcbdae1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-recent-cloud-atlas-activity-f0c036</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Recent%20Cloud%20Atlas%20activity&amp;severity=low&amp;id=682acdbebbaf20d303f0c036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sharpening-the-machete-f0c034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sharpening%20the%20Machete&amp;severity=low&amp;id=682acdbebbaf20d303f0c034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-from-carnaval-to-cinco-de-mayo-the-journey-of-amavaldo-f0c032</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20From%20Carnaval%20to%20Cinco%20de%20Mayo%20%C3%A2%E2%82%AC%E2%80%9C%20The%20journey%20of%20Amavaldo&amp;severity=low&amp;id=682acdbebbaf20d303f0c032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1105-spoofing-in-microsoft-microsoft-outlook-for-android-aeadc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1105%3A%20Spoofing%20in%20Microsoft%20Microsoft%20Outlook%20for%20Android&amp;severity=high&amp;id=682cd0f71484d88663aeadc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-07-18-newer-poseidon-aka-findpos-aka-findstr-15-10-point-of-sale-malware-f0c030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-07-18%3A%20Newer%20%22PoSeidon%22%20aka%20%22FindPOS%22%20aka%20%22FindStr%22%2015.10%20Point-of-Sale%20Malware&amp;severity=medium&amp;id=682acdbebbaf20d303f0c030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turla-renews-its-arsenal-with-topinambour-f0c02e</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turla%20renews%20its%20arsenal%20with%20Topinambour&amp;severity=low&amp;id=682acdbebbaf20d303f0c02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sweed-exposing-years-of-agent-tesla-campaigns-f0c02c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20SWEED%3A%20Exposing%20years%20of%20Agent%20Tesla%20campaigns&amp;severity=low&amp;id=682acdbebbaf20d303f0c02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bitpaymer-source-code-fork-meet-doppelpaymer-ransomware-and-dridex-2-0-f0c070</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BitPaymer%20Source%20Code%20Fork%3A%20Meet%20DoppelPaymer%20Ransomware%20and%20Dridex%202.0&amp;severity=low&amp;id=682acdbebbaf20d303f0c070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-12652-n-a-in-n-a-c0b1aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-12652%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682df6dbc4522896dcc0b1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-spotlight-ratsnif-new-network-vermin-from-oceanlotus-f0c02a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Spotlight%3A%20Ratsnif%20-%20New%20Network%20Vermin%20from%20OceanLotus&amp;severity=low&amp;id=682acdbebbaf20d303f0c02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-10964-cwe-284-in-medtronic-minimed-508-pump-2646de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-10964%3A%20CWE-284%20in%20Medtronic%20MiniMed%20508%20pump&amp;severity=high&amp;id=682f6ee00acd01a2492646de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass-f0c028</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20OSX%2FLinker%3A%20New%20Mac%20malware%20attempts%20zero-day%20Gatekeeper%20bypass&amp;severity=low&amp;id=682acdbebbaf20d303f0c028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soft-cell-case-related-indicators-from-correlations-f0c019</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Soft%20Cell%20case%20-%20Related%20indicators%20from%20correlations&amp;severity=low&amp;id=682acdbebbaf20d303f0c019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/an-analysis-of-linux-ngioweb-botnet-f0c01b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=An%20Analysis%20of%20Linux.Ngioweb%20Botnet&amp;severity=low&amp;id=682acdbebbaf20d303f0c01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/soft-cell-case-guessed-indicators-via-twitter-discussion-f0c017</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Soft%20Cell%20case%20-%20guessed%20indicators%20(via%20Twitter%20discussion)&amp;severity=low&amp;id=682acdbebbaf20d303f0c017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-20843-na-in-na-f601a2fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-20843%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=683a0a8d182aa0cae2be1961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/related-malware-samples-f0c015</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Related%20malware%20samples&amp;severity=low&amp;id=682acdbebbaf20d303f0c015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/information-stealer-malware-via-fake-malicious-document-as-university-of-luxembourg-f0c013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Information%20stealer%20malware%20via%20fake%20malicious%20document%20as%20%22University%20of%20Luxembourg%22&amp;severity=low&amp;id=682acdbebbaf20d303f0c013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-12900-na-in-na-77e2826c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-12900%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68487f5c1b0bd07c3938d88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-12814-n-a-in-n-a-bed040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-12814%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hide-n-seek-botnet-updates-arsenal-with-exploits-against-nexus-repository-manager-thinkphp-f0c011</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hide%20%C3%A2%E2%82%AC%CB%9CN%20Seek%20Botnet%20Updates%20Arsenal%20with%20Exploits%20Against%20Nexus%20Repository%20Manager%20%26%20ThinkPHP&amp;severity=low&amp;id=682acdbebbaf20d303f0c011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1081-information-disclosure-in-microsoft-microsoft-edge-edgehtml-based-aeadc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1081%3A%20Information%20Disclosure%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aeadc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1080-remote-code-execution-in-microsoft-internet-explorer-10-aeadbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1080%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%2010&amp;severity=high&amp;id=682cd0f71484d88663aeadbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1069-elevation-of-privilege-in-microsoft-windows-10-version-1703-aeadbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1069%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeadbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1065-elevation-of-privilege-in-microsoft-windows-10-version-1803-aeadb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1065%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=high&amp;id=682cd0f71484d88663aeadb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1064-elevation-of-privilege-in-microsoft-windows-10-version-1703-aeadae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1064%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeadae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1055-remote-code-execution-in-microsoft-internet-explorer-10-aeadac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1055%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%2010&amp;severity=high&amp;id=682cd0f71484d88663aeadac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1054-security-feature-bypass-in-microsoft-microsoft-edge-edgehtml-based-aeadaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1054%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aeadaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1053-elevation-of-privilege-in-microsoft-windows-10-version-1703-aeada8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1053%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aeada8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1052-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aeada6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1052%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aeada6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1051-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aeada4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1051%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aeada4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1050-information-disclosure-in-microsoft-windows-10-version-1703-aeada2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1050%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aeada2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1049-information-disclosure-in-microsoft-windows-7-aeada0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1049%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aeada0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1048-information-disclosure-in-microsoft-windows-7-aead9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1048%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1047-information-disclosure-in-microsoft-windows-7-aead91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1047%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1046-information-disclosure-in-microsoft-windows-10-version-1703-aead8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1046%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1045-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1045%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1044-security-feature-bypass-in-microsoft-windows-10-version-1809-aead8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1044%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=medium&amp;id=682cd0f71484d88663aead8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1043-remote-code-execution-in-microsoft-windows-10-version-1703-aead89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1043%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1041-elevation-of-privilege-in-microsoft-windows-10-version-1803-aead87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1041%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=high&amp;id=682cd0f71484d88663aead87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1040-tampering-in-microsoft-windows-10-version-1703-aead85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1040%3A%20Tampering%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1039-information-disclosure-in-microsoft-windows-10-version-1703-aead83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1039%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1038-remote-code-execution-in-microsoft-internet-explorer-10-aead81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1038%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%2010&amp;severity=high&amp;id=682cd0f71484d88663aead81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1036-spoofing-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aead7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1036%3A%20Spoofing%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f71484d88663aead7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1035-remote-code-execution-in-microsoft-microsoft-sharepoint-server-2019-aead72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1035%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20SharePoint%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aead72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1034-remote-code-execution-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aead70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1034%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f71484d88663aead70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1033-spoofing-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aead6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1033%3A%20Spoofing%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f71484d88663aead6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1032-spoofing-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aead6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1032%3A%20Spoofing%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f71484d88663aead6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1031-spoofing-in-microsoft-microsoft-sharepoint-enterprise-server-2016-aead6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1031%3A%20Spoofing%20in%20Microsoft%20Microsoft%20SharePoint%20Enterprise%20Server%202016&amp;severity=high&amp;id=682cd0f71484d88663aead6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1029-denial-of-service-in-microsoft-microsoft-lync-server-2010-aead68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1029%3A%20Denial%20of%20Service%20in%20Microsoft%20Microsoft%20Lync%20Server%202010&amp;severity=medium&amp;id=682cd0f71484d88663aead68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1028-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1028%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1027-elevation-of-privilege-in-microsoft-windows-10-version-1803-aead64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1027%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=high&amp;id=682cd0f71484d88663aead64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1026-elevation-of-privilege-in-microsoft-windows-10-version-1803-aead62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1026%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=high&amp;id=682cd0f71484d88663aead62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1025-denial-of-service-in-microsoft-windows-10-version-1703-aead60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1025%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1024-remote-code-execution-in-microsoft-chakracore-aead53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1024%3A%20Remote%20Code%20Execution%20in%20Microsoft%20ChakraCore&amp;severity=medium&amp;id=682cd0f71484d88663aead53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1023-information-disclosure-in-microsoft-chakracore-aead51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1023%3A%20Information%20Disclosure%20in%20Microsoft%20ChakraCore&amp;severity=medium&amp;id=682cd0f71484d88663aead51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1022-elevation-of-privilege-in-microsoft-windows-10-version-1809-aead4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1022%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201809&amp;severity=high&amp;id=682cd0f71484d88663aead4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1021-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1021%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1019-security-feature-bypass-in-microsoft-windows-10-version-1703-aead4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1019%3A%20Security%20Feature%20Bypass%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1018-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1018%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1017-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1017%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1016-information-disclosure-in-microsoft-windows-7-aead45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1016%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1015-information-disclosure-in-microsoft-windows-7-aead43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1015%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1014-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1014%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1013-information-disclosure-in-microsoft-windows-7-aead34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1013%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1012-information-disclosure-in-microsoft-windows-10-version-1703-aead32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1012%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1011-information-disclosure-in-microsoft-windows-7-aead30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1011%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1010-information-disclosure-in-microsoft-windows-10-version-1703-aead2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1010%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1009-information-disclosure-in-microsoft-windows-7-aead2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1009%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aead2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1007-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1007%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1005-remote-code-execution-in-microsoft-internet-explorer-10-aead28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1005%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%2010&amp;severity=high&amp;id=682cd0f71484d88663aead28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1003-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aead26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1003%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aead26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-1002-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aead24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-1002%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aead24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0998-elevation-of-privilege-in-microsoft-windows-10-version-1803-aead22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0998%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=high&amp;id=682cd0f71484d88663aead22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0996-spoofing-in-microsoft-azure-devops-server-2019-aead15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0996%3A%20Spoofing%20in%20Microsoft%20Azure%20DevOps%20Server%202019&amp;severity=high&amp;id=682cd0f71484d88663aead15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0993-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aead13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0993%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aead13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0992-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aead11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0992%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aead11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0991-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aead0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0991%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aead0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0990-remote-code-execution-in-microsoft-chakracore-aead0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0990%3A%20Remote%20Code%20Execution%20in%20Microsoft%20ChakraCore&amp;severity=medium&amp;id=682cd0f71484d88663aead0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0989-remote-code-execution-in-microsoft-microsoft-edge-edgehtml-based-aead0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0989%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Microsoft%20Edge%20(EdgeHTML-based)&amp;severity=medium&amp;id=682cd0f71484d88663aead0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0988-remote-code-execution-in-microsoft-internet-explorer-10-aead09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0988%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%2010&amp;severity=high&amp;id=682cd0f71484d88663aead09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0986-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0986%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aead07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0985-remote-code-execution-in-microsoft-windows-7-aead05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0985%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%207&amp;severity=high&amp;id=682cd0f71484d88663aead05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0984-elevation-of-privilege-in-microsoft-windows-10-version-1703-aead03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0984%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aead03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0983-elevation-of-privilege-in-microsoft-windows-10-version-1703-aeacf6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0983%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0977-information-disclosure-in-microsoft-windows-7-aeacf4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0977%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aeacf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0974-remote-code-execution-in-microsoft-windows-10-version-1703-aeacf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0974%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacf2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0973-elevation-of-privilege-in-microsoft-windows-10-version-1703-aeacf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0973%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0972-denial-of-service-in-microsoft-windows-10-version-1703-aeacee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0972%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aeacee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0968-information-disclosure-in-microsoft-windows-7-aeacec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0968%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%207&amp;severity=medium&amp;id=682cd0f71484d88663aeacec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0960-elevation-of-privilege-in-microsoft-windows-7-aeacea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0960%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%207&amp;severity=high&amp;id=682cd0f71484d88663aeacea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0959-elevation-of-privilege-in-microsoft-windows-10-version-1803-aeace8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0959%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=high&amp;id=682cd0f71484d88663aeace8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0948-information-disclosure-in-microsoft-windows-10-version-1803-aeace6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0948%3A%20Information%20Disclosure%20in%20Microsoft%20Windows%2010%20Version%201803&amp;severity=medium&amp;id=682cd0f71484d88663aeace6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0943-elevation-of-privilege-in-microsoft-windows-10-version-1703-aeace4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0943%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeace4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0941-denial-of-service-in-microsoft-windows-10-version-1903-for-32-bit-systems-aeacd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0941%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201903%20for%2032-bit%20Systems&amp;severity=medium&amp;id=682cd0f71484d88663aeacd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0920-remote-code-execution-in-microsoft-internet-explorer-11-aeacd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0920%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%2011&amp;severity=medium&amp;id=682cd0f71484d88663aeacd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0909-remote-code-execution-in-microsoft-windows-10-version-1703-aeacd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0909%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0908-remote-code-execution-in-microsoft-windows-10-version-1703-aeacd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0908%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0907-remote-code-execution-in-microsoft-windows-10-version-1703-aeaccf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0907%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeaccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0906-remote-code-execution-in-microsoft-windows-10-version-1703-aeaccd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0906%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeaccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0905-remote-code-execution-in-microsoft-windows-10-version-1703-aeaccb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0905%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeaccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0904-remote-code-execution-in-microsoft-windows-10-version-1703-aeacc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0904%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0888-remote-code-execution-in-microsoft-windows-10-version-1703-aeacc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0888%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0722-remote-code-execution-in-microsoft-windows-10-version-1903-for-x64-based-systems-aeacc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0722%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201903%20for%20x64-based%20Systems&amp;severity=high&amp;id=682cd0f71484d88663aeacc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0713-denial-of-service-in-microsoft-windows-10-version-1703-aeacb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0713%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aeacb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0711-denial-of-service-in-microsoft-windows-10-version-1703-aeacb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0711%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aeacb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0710-denial-of-service-in-microsoft-windows-10-version-1703-aeacb4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0710%3A%20Denial%20of%20Service%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=medium&amp;id=682cd0f71484d88663aeacb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0709-remote-code-execution-in-microsoft-windows-10-version-1703-aeacb2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0709%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201703&amp;severity=high&amp;id=682cd0f71484d88663aeacb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-0620-remote-code-execution-in-microsoft-windows-10-version-1903-for-x64-based-systems-aeacb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-0620%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Version%201903%20for%20x64-based%20Systems&amp;severity=high&amp;id=682cd0f71484d88663aeacb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trojan-downloader-found-on-google-play-by-maler360-f0c00f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Trojan%20downloader%20found%20on%20Google%20Play%20by%20%40Maler360&amp;severity=low&amp;id=682acdbebbaf20d303f0c00f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threathunting-india-f0c00d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ThreatHunting%2FIndia%2F&amp;severity=low&amp;id=682acdbebbaf20d303f0c00d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dharma-ransomware-sample-f0c00b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dharma%20Ransomware%20sample&amp;severity=low&amp;id=682acdbebbaf20d303f0c00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-flawedammy-rat-f0bff8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FlawedAmmy%20RAT&amp;severity=low&amp;id=682acdbebbaf20d303f0bff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-10-years-of-virtual-dynamite-a-high-level-retrospective-of-atm-malware-f0bff6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%2010%20years%20of%20virtual%20dynamite%3A%20A%20high-level%20retrospective%20of%20ATM%20malware&amp;severity=low&amp;id=682acdbebbaf20d303f0bff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/linux-server-infection-with-coinminers-derived-from-original-post-with-iptables-rules-f0bff4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Linux%20server%20infection%20with%20coinminers%20(derived%20from%20original%20post%20with%20iptables%20rules)&amp;severity=low&amp;id=682acdbebbaf20d303f0bff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-9874-na-in-na-62fdf3f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-9874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68443c7f71f4d251b50d0066</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emissary-panda-attacks-middle-east-government-sharepoint-servers-by-palo-alto-unit42-f0bff2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emissary%20Panda%20Attacks%20Middle%20East%20Government%20Sharepoint%20Servers%20by%20Palo%20Alto%20Unit42&amp;severity=high&amp;id=682acdbebbaf20d303f0bff2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/script-maze-historical-malware-seen-f0bff0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Script-maze%20historical%20malware%20seen&amp;severity=low&amp;id=682acdbebbaf20d303f0bff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/smtp-attackers-honeypot-logs-for-2019-05-26-f0bfee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SMTP%20attackers%20honeypot%20logs%20for%202019-05-26&amp;severity=low&amp;id=682acdbebbaf20d303f0bfee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sorpresa-jasperloader-targets-italy-with-a-new-bag-of-tricks-f0bfec</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20%20Sorpresa!%20JasperLoader%20targets%20Italy%20with%20a%20new%20bag%20of%20tricks&amp;severity=low&amp;id=682acdbebbaf20d303f0bfec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-journey-to-zebrocy-land-f0bfea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20journey%20to%20Zebrocy%20land&amp;severity=low&amp;id=682acdbebbaf20d303f0bfea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6513-na-in-na-238c2662</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6513%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-200-hosts-attempting-linksys-rce-exploits-f0bfd9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20200%2B%20hosts%20attempting%20Linksys%20RCE%20exploits&amp;severity=low&amp;id=682acdbebbaf20d303f0bfd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-phishing-pdf-documents-phishkit-79d247bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20phishing%20-%20PDF%20documents%20%2F%20phishkit&amp;severity=low&amp;id=6933b2702271496a0fa16ea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/targeted-phishing-pdf-documents-phishkit-f0bfdb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Targeted%20phishing%20-%20PDF%20documents%20%2F%20phishkit&amp;severity=low&amp;id=682acdbebbaf20d303f0bfdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6516-na-in-na-6b754b37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6516%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6515-na-in-na-90483497</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6515%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6514-na-in-na-5a540102</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6514%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6512-na-in-na-7cee1992</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6512%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hidden-cobra-north-korean-malicious-cyber-activity-mar-10135536-r21-v2-f0bfdd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HIDDEN%20COBRA%20-%20North%20Korean%20Malicious%20Cyber%20Activity%20(MAR-10135536.r21.v2)&amp;severity=low&amp;id=682acdbebbaf20d303f0bfdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-emering-fin7-jscript-loader-malware-f0bfd7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%5BEmering%5D%20FIN7%20JScript%20Loader%20Malware&amp;severity=low&amp;id=682acdbebbaf20d303f0bfd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-keepass-dot-com-spreading-malware-acting-as-the-official-site-for-keepass-password-manager-download-for-dmg-and-exe-files-are-available-on-the-site-f0bfd1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20keepass(dot)com%20spreading%20malware%20acting%20as%20the%20official%20site%20for%20KeePass%20password%20manager.%20Download%20for%20.dmg%20and%20.exe%20files%20are%20available%20on%20the%20site.&amp;severity=low&amp;id=682acdbebbaf20d303f0bfd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-buckeye-espionage-outfit-used-equation-group-tools-prior-to-shadow-brokers-leak-f0bfcf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Buckeye%3A%20Espionage%20Outfit%20Used%20Equation%20Group%20Tools%20Prior%20to%20Shadow%20Brokers%20Leak&amp;severity=low&amp;id=682acdbebbaf20d303f0bfcf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/eset-turla-lightneuron-research-f0bfd3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ESET%20Turla%20LightNeuron%20Research&amp;severity=low&amp;id=682acdbebbaf20d303f0bfd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-goblin-panda-continues-to-target-vietnam-f0bfcb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Goblin%20Panda%20continues%20to%20target%20Vietnam&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-kernel-mode-malicious-loader-f0bfbe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Kernel%20Mode%20Malicious%20Loader&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-an-irc-based-botnet-f0bfbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Analysis%20of%20an%20IRC%20based%20Botnet&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-babyshark-malware-part-two-attacks-continue-using-kimjongrat-and-pcrat-f0bfba</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BabyShark%20Malware%20Part%20Two%20%C3%A2%E2%82%AC%E2%80%9C%20Attacks%20Continue%20Using%20KimJongRAT%20and%20PCRat&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3843-cwe-266-in-freedesktoporg-systemd-04a10b2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3843%3A%20CWE-266%20in%20%5Bfreedesktop.org%5D%20systemd&amp;severity=medium&amp;id=68487f5d1b0bd07c3938dfa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3844-cwe-268-in-freedesktoporg-systemd-153e401b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3844%3A%20CWE-268%20in%20%5Bfreedesktop.org%5D%20systemd&amp;severity=medium&amp;id=68487f5d1b0bd07c3938dfb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actor-ta505-targets-financial-enterprises-using-lolbins-and-a-new-backdoor-malware-f0bfb8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Actor%20TA505%20Targets%20Financial%20Enterprises%20Using%20LOLBins%20and%20a%20New%20Backdoor%20Malware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dnspionage-brings-out-the-karkoff-f0bfb6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20DNSpionage%20brings%20out%20the%20Karkoff&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-finteam-trojanized-teamviewer-against-government-targets-f0bfb4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FINTEAM%3A%20Trojanized%20TeamViewer%20Against%20Government%20Targets&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-carbanak-week-fire-eye-f0bfcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CARBANAK%20Week%20-%20Fire%20Eye&amp;severity=low&amp;id=682acdbebbaf20d303f0bfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nueva-campa-a-del-grupo-ruso-ta505-dirigida-a-chile-y-argentina-servhelper-f0bfb2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Nueva%20campa%C3%83%C2%B1a%20del%20grupo%20ruso%20TA505%20dirigida%20a%20Chile%20y%20Argentina.%20%23ServHelper&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-97-domains-phishing-spread-over-10-ip-s-f0bfb0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%2097%20domains%20phishing%20spread%20over%2010%20IP&apos;s&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-osint-reporting-regarding-dprk-and-ta505-overlap-f0bfae</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20OSINT%20Reporting%20Regarding%20DPRK%20and%20TA505%20Overlap&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3842-cwe-285-in-the-systemd-project-syste-83e83ede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3842%3A%20CWE-285%20in%20The%20systemd%20Project%20systemd&amp;severity=medium&amp;id=68487f5d1b0bd07c3938df98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mirai-compiled-for-new-processors-surfaces-in-the-wild-f0bf9f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mirai%20Compiled%20for%20New%20Processors%20Surfaces%20in%20the%20Wild&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-stuxshop-the-oldest-stuxnet-component-dials-up-f0bf9d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20STUXSHOP%20The%20Oldest%20Stuxnet%20Component%20Dials%20Up&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hancitor-domains-f0bf9b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hancitor%20domains&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tor-hidden-services-for-gandcrab-and-jokeroo-vendor-f0bf99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tor%20hidden%20services%20for%20GandCrab%20and%20jokeroo%20%22vendor%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-analysis-report-ar19-100a-mar-10135536-8-north-korean-trojan-hoplight-mar-10135536-r8-v1-f0bfac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Analysis%20Report%20(AR19-100A)%20MAR-10135536-8%20%C3%A2%E2%82%AC%E2%80%9C%20North%20Korean%20Trojan%3A%20HOPLIGHT%20MAR-10135536.r8.v1&amp;severity=low&amp;id=682acdbdbbaf20d303f0bfac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-winrar-zero-day-cve-2018-20250-abused-in-multiple-campaigns-f0bf97</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT-%20WinRAR%20Zero-day%20(CVE-2018-20250)%20Abused%20in%20Multiple%20Campaigns&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6540-cwe-319-cleartext-transmission-of-sensitive-information-in-medtronic-conexus-radio-frequency-telemetry-protocol-264ac0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6540%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Medtronic%20Conexus%20Radio%20Frequency%20Telemetry%20Protocol&amp;severity=medium&amp;id=682f7ce40acd01a249264ac0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6538-cwe-284-in-medtronic-medtronic-conexus-radio-frequency-telemetry-protocol-2648df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6538%3A%20CWE-284%20in%20Medtronic%20Conexus%20Radio%20Frequency%20Telemetry%20Protocol&amp;severity=critical&amp;id=682f79590acd01a2492648df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3856-cwe-190-in-the-libssh2-project-libssh2-bf16e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3856%3A%20CWE-190%20in%20The%20libssh2%20Project%20libssh2&amp;severity=medium&amp;id=682d9840c4522896dcbf16e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3857-cwe-190-in-the-libssh2-project-libssh2-bf16e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3857%3A%20CWE-190%20in%20The%20libssh2%20Project%20libssh2&amp;severity=medium&amp;id=682d9840c4522896dcbf16e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3863-cwe-190-in-the-libssh2-project-libssh2-bf16f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3863%3A%20CWE-190%20in%20The%20libssh2%20Project%20libssh2&amp;severity=medium&amp;id=682d9840c4522896dcbf16f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-shadowhammer-f0bf95</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Operation%20ShadowHammer&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-9978-na-in-na-3cc9cb17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-9978%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=683f112a182aa0cae2811bbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/lockergoga-yara-rules-f0bf93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=LockerGoga%20%20-%20yara%20rules&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-7161-na-in-na-5c04e6cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-7161%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-6970-na-in-na-01683202</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-6970%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18466-na-in-na-ea7ff398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18466%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-spam-warns-about-boeing-737-max-crashes-while-pushing-malware-f0bffc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Spam%20Warns%20about%20Boeing%20737%20Max%20Crashes%20While%20Pushing%20Malware&amp;severity=low&amp;id=682acdbebbaf20d303f0bffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-invoice-per-postal-mail-f0bf91</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20invoice%20(per%20postal%20mail)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-03-08-terraloader-signed-js-rat-f0bf8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-03-08%3A%20TerraLoader%20Signed%20-%3E%20JS%20RAT&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-slub-backdoor-uses-github-communicates-via-slack-f0bf8d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20New%20SLUB%20Backdoor%20Uses%20GitHub%2C%20Communicates%20via%20Slack&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-supreme-backdoor-factory-f0bf80</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Supreme%20Backdoor%20Factory&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-babyshark-malware-targets-u-s-national-security-think-tanks-f0bf7e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20BabyShark%20Malware%20Targets%20U.S.%20National%20Security%20Think%20Tanks&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iot-malware-gafgyt-gen28-active-20190220-20190222-f0bf7c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IoT%20malware%20-%20Gafgyt.Gen28%20(active)%20-%2020190220%20-%2020190222&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vmray-analyzer-report-for-sample-252574-related-amf-fr-org-f0bf78</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=VMRay%20Analyzer%20Report%20for%20Sample%20%23252574%20(related%20amf-fr.org)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-amf-fr-org-website-delivering-malicious-word-document-and-binaries-f0bf76</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20amf-fr.org%20website%20delivering%20malicious%20Word%20document%20and%20binaries&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-danabot-updated-with-new-c-c-communication-f0bf72</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DanaBot%20updated%20with%20new%20C%26C%20communication&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-xls-claiming-to-be-from-deloitte-f0bf70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20XLS%20claiming%20to%20be%20from%20Deloitte&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/financial-socgen-compliance-com-fake-website-delivering-malicious-documents-f0bf7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Financial%20-%20socgen-compliance.com%20fake%20website%20delivering%20malicious%20documents&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-31-isfb-v2-installs-dridex-3101-f0bf6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-31%3A%20ISFB%20v2%20Installs%20Dridex%20%223101%22&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cisco-job-posting-targets-korean-candidates-f0bf61</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cisco%20Job%20Posting%20Targets%20Korean%20Candidates&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-28-apt28-xtunnel-backdoor-f0bf5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-28%3A%20APT28%20XTunnel%20Backdoor&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-28-turla-kazuar-rat-f0bf5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-28%3A%20Turla%20Kazuar%20RAT&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-25-lazarus-pakistan-toolkits-f0bf59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-25%3A%20Lazarus%20Pakistan%20Toolkits&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/iocs-associated-with-dns-infrastructure-tampering-f0bf55</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=IOCs%20Associated%20with%20DNS%20Infrastructure%20Tampering&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-22-emotet-trickbot-f0bf5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-22%3A%20Emotet-%3ETrickBot&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-21-apt28-autoit-zebrocy-progression-f0bf57</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-21%3A%20APT28%20Autoit%20Zebrocy%20Progression&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/incident-pear-php-net-compromised-and-delivering-malicious-package-f0bf51</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Incident%20-%20pear.php.net%20-%20compromised%20and%20delivering%20malicious%20package&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-darkhydrus-delivers-new-trojan-that-can-use-google-drive-for-c2-communications-f0bf53</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DarkHydrus%20delivers%20new%20Trojan%20that%20can%20use%20Google%20Drive%20for%20C2%20communications&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-5733-successful-exploitation-of-this-vulnerability-may-exhaust-the-memory-available-to-dhcpd-and-or-cause-it-to-crash-resulting-in-a-denial-of-service-to-clients-in-isc-isc-dhcp-befad1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-5733%3A%20Successful%20exploitation%20of%20this%20vulnerability%20may%20exhaust%20the%20memory%20available%20to%20dhcpd%20and%2For%20cause%20it%20to%20crash%2C%20resulting%20in%20a%20denial%20of%20service%20to%20clients.%20in%20ISC%20ISC%20DHCP&amp;severity=medium&amp;id=682d983ec4522896dcbefad1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lojax-command-and-control-domains-still-active-f0bf4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LoJax%20Command%20and%20Control%20Domains%20Still%20Active&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2019-01-10-north-korea-lazarus-targeting-redbanc-f0bf3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2019-01-10%3A%20North%20Korea%20Lazarus%20Targeting%20REDBANC&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-16865-cwe-770-in-the-systemd-project-syst-ab7a50ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-16865%3A%20CWE-770%20in%20The%20systemd%20Project%20systemd&amp;severity=high&amp;id=68487f5c1b0bd07c3938d8e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-16864-cwe-770-in-the-systemd-project-syst-10ff1b18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-16864%3A%20CWE-770%20in%20The%20systemd%20Project%20systemd&amp;severity=high&amp;id=68487f5c1b0bd07c3938d8d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-16866-cwe-125-in-the-systemd-project-syst-db74a96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-16866%3A%20CWE-125%20in%20The%20systemd%20Project%20systemd&amp;severity=medium&amp;id=68487f5d1b0bd07c3938e5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actor-cold-river-network-traffic-analysis-and-a-deep-dive-on-agent-drable-f0bf40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Threat%20Actor%20%C3%A2%E2%82%AC%C5%93Cold%20River%C3%A2%E2%82%AC%C2%9D%3A%20Network%20Traffic%20Analysis%20and%20a%20Deep%20Dive%20on%20Agent%20Drable&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/servhelper-and-flawedgrace-new-malware-introduced-by-ta505-f0bf3c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ServHelper%20and%20FlawedGrace%20-%20New%20malware%20introduced%20by%20TA505&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ta505-group-adopts-new-servhelper-backdoor-and-flawedgrace-rat-f0bf42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TA505%20Group%20Adopts%20New%20ServHelper%20Backdoor%20and%20FlawedGrace%20RAT&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-darkhydrus-is-launching-attacks-to-targets-in-middle-east-f0bf3a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DarkHydrus%20is%20launching%20attacks%20to%20targets%20in%20Middle%20East&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-5747-na-in-na-87a1c7a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-5747%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938ed57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-20679-na-in-na-282cf387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-20679%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938ed4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-flash-ab-000102-mw-f0bf38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20FLASH%20AB-000102-MW&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2019-3905-na-in-na-c79f7a5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2019-3905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-sites-f0bf36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Sites&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6333-improper-neutralization-of-input-during-web-page-generation-cwe-79-in-facebook-nuclide-bda6ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6333%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(CWE-79)%20in%20Facebook%20Nuclide&amp;severity=critical&amp;id=682d981cc4522896dcbda6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6331-deserialization-of-untrusted-data-cwe-502-in-facebook-buck-bda414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6331%3A%20Deserialization%20of%20Untrusted%20Data%20(CWE-502)%20in%20Facebook%20Buck&amp;severity=critical&amp;id=682d981cc4522896dcbda414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6347-denial-of-service-cwe-400-in-facebook-proxygen-bda3fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6347%3A%20Denial%20of%20Service%20(CWE-400)%20in%20Facebook%20Proxygen&amp;severity=high&amp;id=682d981cc4522896dcbda3fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6346-denial-of-service-cwe-400-in-facebook-proxygen-bda3f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6346%3A%20Denial%20of%20Service%20(CWE-400)%20in%20Facebook%20Proxygen&amp;severity=high&amp;id=682d981cc4522896dcbda3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6344-heap-based-buffer-overflow-cwe-122-in-facebook-whatsapp-for-android-bda3d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6344%3A%20Heap-based%20Buffer%20Overflow%20(CWE-122)%20in%20Facebook%20WhatsApp%20for%20Android&amp;severity=high&amp;id=682d981cc4522896dcbda3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6343-null-pointer-dereference-cwe-476-in-facebook-proxygen-bda3d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6343%3A%20NULL%20Pointer%20Dereference%20(CWE-476)%20in%20Facebook%20Proxygen&amp;severity=high&amp;id=682d981cc4522896dcbda3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6342-improper-neutralization-of-special-elements-used-in-an-os-command-cwe-78-in-facebook-react-dev-utils-bda3be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6342%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20OS%20Command%20(CWE-78)%20in%20Facebook%20react-dev-utils&amp;severity=critical&amp;id=682d981cc4522896dcbda3be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6337-improper-cross-boundary-removal-of-sensitive-data-cwe-212-in-facebook-hhvm-bda369</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6337%3A%20Improper%20Cross-boundary%20Removal%20of%20Sensitive%20Data%20(CWE-212)%20in%20Facebook%20HHVM&amp;severity=high&amp;id=682d981cc4522896dcbda369</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6341-improper-neutralization-of-input-during-web-page-generation-cwe-79-in-facebook-react-dom-bda34e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6341%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(CWE-79)%20in%20Facebook%20react-dom&amp;severity=medium&amp;id=682d981cc4522896dcbda34e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6340-out-of-bounds-read-cwe-125-in-facebook-hhvm-bda085</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6340%3A%20Out-of-bounds%20Read%20(CWE-125)%20in%20Facebook%20HHVM&amp;severity=high&amp;id=682d981bc4522896dcbda085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6334-variable-extraction-error-cwe-621-in-facebook-hhvm-bda35a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6334%3A%20Variable%20Extraction%20Error%20(CWE-621)%20in%20Facebook%20HHVM&amp;severity=critical&amp;id=682d981cc4522896dcbda35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6336-security-features-cwe-254-in-facebook-osquery-bda07d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6336%3A%20Security%20Features%20(CWE-254)%20in%20Facebook%20osquery&amp;severity=high&amp;id=682d981bc4522896dcbda07d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6335-denial-of-service-cwe-400-in-facebook-hhvm-bda075</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6335%3A%20Denial%20of%20Service%20(CWE-400)%20in%20Facebook%20HHVM&amp;severity=high&amp;id=682d981bc4522896dcbda075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-20622-n-a-in-n-a-bda371</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-20622%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-20623-n-a-in-n-a-bda286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-20623%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda286</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6668-whitelist-bypass-vulnerability-in-mcafee-application-and-change-control-bda356</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6668%3A%20whitelist%20bypass%20vulnerability%20in%20McAfee%20Application%20and%20Change%20Control&amp;severity=medium&amp;id=682d981cc4522896dcbda356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18602-n-a-in-n-a-bda3ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18602%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda3ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-19937-n-a-in-n-a-bda346</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-19937%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda346</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18601-n-a-in-n-a-bda23d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18601%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbda23d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18600-n-a-in-n-a-bda237</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18600%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981bc4522896dcbda237</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-20618-n-a-in-n-a-bda331</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-20618%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda331</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-19906-n-a-in-n-a-bda241</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-19906%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-19918-n-a-in-n-a-bda049</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-19918%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda049</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-19905-n-a-in-n-a-bda047</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-19905%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbda047</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-19904-n-a-in-n-a-bd9f2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-19904%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981bc4522896dcbd9f2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/shamoon-potential-samples-f0bf34</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Shamoon%20potential%20samples&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bf34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-destructive-shamoon-malware-continues-its-return-with-a-new-anti-american-message-f0bf32</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Destructive%20Shamoon%20Malware%20Continues%20its%20Return%20with%20a%20New%20Anti-American%20Message&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-elf-binary-mirai-2018-12-22-collected-on-a-router-f0bf30</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20ELF%20binary%20(Mirai)%20-%202018-12-22%20(collected%20on%20a%20router)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-1000874-n-a-in-n-a-bda6ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-1000874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981cc4522896dcbda6ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-return-of-the-charming-kitten-f0bf21</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Return%20of%20The%20Charming%20Kitten&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-password-protected-zip-with-maldoc-f0bf1f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Password%20Protected%20ZIP%20with%20Maldoc&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18984-cwe-311-missing-encryption-of-sensitive-data-in-medtronic-carelink-9790-programmer-263f62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18984%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Medtronic%20CareLink%209790%20Programmer&amp;severity=medium&amp;id=682f56360acd01a249263f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-bomb-threat-email-scam-campaign-demanding-20k-in-bitcoin-f0bf23</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Bomb%20Threat%20Email%20Scam%20Campaign%20Demanding%20%2420K%20in%20Bitcoin&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8639-elevation-of-privilege-in-microsoft--ce1e8a3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8639%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%207&amp;severity=high&amp;id=68443c7f71f4d251b50d0060</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-sharpshooter-targets-global-defense-critical-infrastructure-f0bf1d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%C3%A2%E2%82%AC%CB%9COperation%20Sharpshooter%C3%A2%E2%82%AC%E2%84%A2%20Targets%20Global%20Defense%2C%20Critical%20Infrastructure&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sextortion-with-a-side-of-ransomware-f0bf1b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sextortion%20with%20a%20side%20of%20ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/flash-cve-2018-15982-iocs-f0bf19</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Flash%20CVE-2018-15982%20IOCs&amp;severity=high&amp;id=682acdbdbbaf20d303f0bf19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/samsam-ransomware-alert-aa18-337a-f0bf04</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SamSam%20Ransomware%20-%20Alert%20(AA18-337A)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6332-denial-of-service-cwe-400-in-facebook-hhvm-bda071</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6332%3A%20Denial%20of%20Service%20(CWE-400)%20in%20Facebook%20HHVM&amp;severity=medium&amp;id=682d981bc4522896dcbda071</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-making-a-ransomware-payment-it-may-now-violate-u-s-sanctions-f0bf17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Making%20a%20Ransomware%20Payment%3F%20It%20May%20Now%20Violate%20U.S.%20Sanctions&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hancitor-active-again-yith-new-macro-iocs-f0bf02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hancitor%20active%20again%20yith%20new%20macro%20-%20IoCs&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mar-10166283-r1-v1-samsam-ransomware-f0bf15</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAR-10166283.r1.v1%20(SamSam%20ransomware)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mar-10219351-r1-v2-samsam-ransomware-f0bf11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAR-10219351.r1.v2%20(SamSam%20ransomware)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/mar-10164494-r1-v1-samsam-ransomware-f0bf13</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MAR-10164494.r1.v1%20(SamSam%20ransomware)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dnspionage-campaign-targets-middle-east-f0bf00</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20DNSpionage%20Campaign%20Targets%20Middle%20East&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-event-stream-dependency-attack-steals-wallets-from-users-of-copay-f0befe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%60event-stream%60%20dependency%20attack%20steals%20wallets%20from%20users%20of%20copay&amp;severity=low&amp;id=682acdbdbbaf20d303f0befe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turla-png-dropper-is-back-f0befc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turla%20PNG%20Dropper%20is%20back&amp;severity=low&amp;id=682acdbdbbaf20d303f0befc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cozybear-in-from-the-cold-f0bef6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CozyBear%20%C3%A2%E2%82%AC%E2%80%9C%20In%20from%20the%20Cold%3F&amp;severity=low&amp;id=682acdbdbbaf20d303f0bef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analyzing-oilrig-s-ops-tempo-from-testing-to-weaponization-to-delivery-f0befa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Analyzing%20OilRig%C3%A2%E2%82%AC%E2%84%A2s%20Ops%20Tempo%20from%20Testing%20to%20Weaponization%20to%20Delivery&amp;severity=low&amp;id=682acdbdbbaf20d303f0befa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-big-game-hunting-the-evolution-of-indrik-spider-from-dridex-wire-fraud-to-bitpaymer-targeted-ransomware-f0bef4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Big%20Game%20Hunting%3A%20The%20Evolution%20of%20INDRIK%20SPIDER%20From%20Dridex%20Wire%20Fraud%20to%20BitPaymer%20Targeted%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bef4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15687-there-is-a-race-condition-between-a-d17cc53c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15687%3A%20There%20is%20a%20race%20condition%20between%20a%20stat(2)%20call%20and%20the%20fchmodat(2)%20call.%20in%20systemd%20systemd&amp;severity=high&amp;id=68487f5d1b0bd07c3938df82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15688-dhcp6optionappendia-contained-an-in-5050f71a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15688%3A%20dhcp6_option_append_ia()%20contained%20an%20incorrect%20buffer%20size%20calculation.%20in%20systemd%20systemd&amp;severity=high&amp;id=68487f5c1b0bd07c3938d8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15686-fgets-can-be-confused-by-overly-lon-56835ee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15686%3A%20fgets()%20can%20be%20confused%20by%20overly-long%20input%20strings.%20The%20first%20read%20will%20return%20a%20partial%20string%20and%20subsequent%20reads%20will%20begin%20as%20if%20it%20were%20a%20new%20line.%20in%20systemd%20systemd&amp;severity=high&amp;id=68487f5c1b0bd07c3938d8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-2018-10-09-hancitor-infection-with-zeus-panda-banker-f0bef2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%202018-10-09%20-%20HANCITOR%20INFECTION%20WITH%20ZEUS%20PANDA%20BANKER&amp;severity=low&amp;id=682acdbdbbaf20d303f0bef2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-spotlight-panda-banker-trojan-targets-the-us-canada-and-japan-f0bee5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Spotlight%3A%20Panda%20Banker%20Trojan%20Targets%20the%20US%2C%20Canada%20and%20Japan&amp;severity=low&amp;id=682acdbdbbaf20d303f0bee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-muddywater-expands-operations-f0bee3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20MuddyWater%20expands%20operations&amp;severity=low&amp;id=682acdbdbbaf20d303f0bee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-18066-n-a-in-n-a-bda6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-18066%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-indicators-of-compromise-for-malware-used-by-apt28-f0bedb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Indicators%20of%20Compromise%20for%20Malware%20used%20by%20APT28&amp;severity=low&amp;id=682acdbdbbaf20d303f0bedb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cig-circular-66-fastcash-atm-cash-out-campaign-f0bed9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CIG%20Circular%2066%20%20%C3%A2%E2%82%AC%E2%80%9C%20FASTCash%20%20ATM%20Cash%20%20Out%20Campaign&amp;severity=low&amp;id=682acdbdbbaf20d303f0bed9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15965-deserialization-of-untrusted-data-in-adobe-coldfusion-bda6dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15965%3A%20Deserialization%20of%20untrusted%20data%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682d981cc4522896dcbda6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15964-use-of-a-component-with-a-known-vulnerability-in-adobe-coldfusion-bda6d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15964%3A%20Use%20of%20a%20component%20with%20a%20known%20vulnerability%20in%20Adobe%20ColdFusion&amp;severity=high&amp;id=682d981cc4522896dcbda6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15963-security-bypass-in-adobe-coldfusion-bda6cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15963%3A%20Security%20bypass%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d981cc4522896dcbda6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15962-directory-listing-in-adobe-coldfusion-bda6c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15962%3A%20Directory%20listing%20in%20Adobe%20ColdFusion&amp;severity=medium&amp;id=682d981cc4522896dcbda6c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15959-deserialization-of-untrusted-data-in-adobe-coldfusion-bda6c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15959%3A%20Deserialization%20of%20untrusted%20data%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682d981cc4522896dcbda6c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15958-deserialization-of-untrusted-data-in-adobe-coldfusion-bda6b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15958%3A%20Deserialization%20of%20untrusted%20data%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682d981cc4522896dcbda6b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-15957-deserialization-of-untrusted-data-in-adobe-coldfusion-bda66e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-15957%3A%20Deserialization%20of%20untrusted%20data%20in%20Adobe%20ColdFusion&amp;severity=critical&amp;id=682d981cc4522896dcbda66e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-poison-ivy-group-and-the-cyberespionage-campaign-against-chinese-military-and-goverment-f0bed5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Poison%20Ivy%20Group%20and%20the%20Cyberespionage%20Campaign%20Against%20Chinese%20Military%20and%20Goverment&amp;severity=low&amp;id=682acdbdbbaf20d303f0bed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expanded-xbash-combines-botnet-ransomware-coinmining-in-worm-that-targets-linux-and-windows-f0bec6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20(expanded)%20-%20Xbash%20Combines%20Botnet%2C%20Ransomware%2C%20Coinmining%20in%20Worm%20that%20Targets%20Linux%20and%20Windows&amp;severity=low&amp;id=682acdbdbbaf20d303f0bec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dangerous-invoices-and-dangerous-infrastructure-f0bec2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dangerous%20Invoices%20and%20Dangerous%20Infrastructure&amp;severity=low&amp;id=682acdbdbbaf20d303f0bec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8440-elevation-of-privilege-in-microsoft--2e1d42a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8440%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%207&amp;severity=high&amp;id=68487f521b0bd07c39389ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-multi-exploit-iot-linux-botnets-mirai-and-gafgyt-target-apache-struts-sonicwall-f0bebc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Multi-exploit%20IoT%2FLinux%20Botnets%20Mirai%20and%20Gafgyt%20Target%20Apache%20Struts%2C%20SonicWall&amp;severity=low&amp;id=682acdbdbbaf20d303f0bebc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/powerpool-malware-exploits-zero-day-vulnerability-f0beb6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=powerpool-malware-exploits-zero-day-vulnerability&amp;severity=medium&amp;id=682acdbdbbaf20d303f0beb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-applejeus-lazarus-hits-cryptocurrency-exchange-with-fake-installer-and-macos-malware-f0beba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Operation%20AppleJeus%3A%20Lazarus%20hits%20cryptocurrency%20exchange%20with%20fake%20installer%20and%20macOS%20malware&amp;severity=low&amp;id=682acdbdbbaf20d303f0beba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/talos-blog-picking-apart-remcos-botnet-in-a-box-f0bea7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TALOS%20Blog%3A%20Picking%20Apart%20Remcos%20Botnet-In-A-Box&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-microsoft-disrupts-apt28-hacking-campaign-aimed-at-us-midterm-elections-f0bea5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Microsoft%20Disrupts%20APT28%20Hacking%20Campaign%20Aimed%20at%20US%20Midterm%20Elections&amp;severity=low&amp;id=682acdbdbbaf20d303f0bea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-fox-ransomware-matrix-variant-tries-its-best-to-close-all-file-handles-f0bee1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Fox%20Ransomware%20Matrix%20Variant%20Tries%20Its%20Best%20to%20Close%20All%20File%20Handles&amp;severity=low&amp;id=682acdbdbbaf20d303f0bee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turla-outlook-white-paper-7bdd9c40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Turla%20Outlook%20White%20Paper&amp;severity=high&amp;id=6854183733c7acc0460a88ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turla-outlook-white-paper-f0bfd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Turla%20Outlook%20White%20Paper&amp;severity=high&amp;id=682acdbebbaf20d303f0bfd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8373-remote-code-execution-in-microsoft-i-2b75f603</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8373%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Internet%20Explorer%209&amp;severity=high&amp;id=68487f521b0bd07c39389cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8414-remote-code-execution-in-microsoft-w-e0325c72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8414%3A%20Remote%20Code%20Execution%20in%20Microsoft%20Windows%2010%20Servers&amp;severity=high&amp;id=68487f521b0bd07c39389cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8406-elevation-of-privilege-in-microsoft--e38827ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8406%3A%20Elevation%20of%20Privilege%20in%20Microsoft%20Windows%20Server%202016&amp;severity=high&amp;id=68487f521b0bd07c39389c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt-c-35-f0bea3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%C3%A8%E2%80%9A%C5%A1%C3%A8%E2%80%9E%E2%80%98%C3%A8%E2%84%A2%C2%AB%C3%A7%C2%BB%E2%80%9E%C3%A7%C2%BB%E2%80%A1%C3%AF%C2%BC%CB%86APT-C-35%C3%AF%C2%BC%E2%80%B0%C3%A7%C2%A7%C2%BB%C3%A5%C5%A0%C2%A8%C3%A7%C2%AB%C2%AF%C3%A6%E2%80%9D%C2%BB%C3%A5%E2%80%A1%C2%BB%C3%A6%C2%B4%C2%BB%C3%A5%C5%A0%C2%A8%C3%A6%C2%8F%C2%AD%C3%A9%C5%93%C2%B2&amp;severity=low&amp;id=682acdbdbbaf20d303f0bea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tia-repo-consumption-keypass-ransomware-f0be9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%5BTIA-REPO%20Consumption%5D%20KeyPass%20ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0be9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-14781-cwe-294-authentication-bypass-by-capture-replay-in-medtronic-mmt-508-minimed-pump-263f68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-14781%3A%20CWE-294%20Authentication%20Bypass%20by%20Capture-replay%20in%20Medtronic%20MMT-%20508%20-%20MiniMed%20pump&amp;severity=medium&amp;id=682f56360acd01a249263f68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10634-cwe-319-cleartext-transmission-of-sensitive-information-in-medtronic-mmt-508-minimed-pump-263f66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10634%3A%20CWE-319%20Cleartext%20Transmission%20of%20Sensitive%20Information%20in%20Medtronic%20MMT-%20508%20-%20MiniMed%20pump&amp;severity=medium&amp;id=682f56360acd01a249263f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/talos-threat-roundup-for-august-3-10-f0be9d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Talos%3A%20Threat%20Roundup%20for%20August%203-10&amp;severity=low&amp;id=682acdbdbbaf20d303f0be9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10626-cwe-345-insufficient-verification-of-data-authenticity-in-medtronic-24950-mycarelink-monitor-262891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10626%3A%20CWE-345%20Insufficient%20Verification%20of%20Data%20Authenticity%20in%20Medtronic%2024950%20MyCareLink%20Monitor&amp;severity=medium&amp;id=682f4f480acd01a249262891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10622-cwe-257-in-medtronic-24950-mycarelink-monitor-26288f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10622%3A%20CWE-257%20in%20Medtronic%2024950%20MyCareLink%20Monitor&amp;severity=medium&amp;id=682f4f480acd01a24926288f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-keypass-ransomware-campaign-underway-f0bebe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20KeyPass%20Ransomware%20Campaign%20Underway&amp;severity=low&amp;id=682acdbdbbaf20d303f0bebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-familiar-feeling-a-malware-campaign-targeting-the-tibetan-diaspora-resurfaces-f0bec4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Familiar%20Feeling%20A%20Malware%20Campaign%20Targeting%20the%20Tibetan%20Diaspora%20Resurfaces&amp;severity=low&amp;id=682acdbdbbaf20d303f0bec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cyber-threatscape-report-2018-midyear-cybersecurity-risk-review-f0be97</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CYBER%20THREATSCAPE%20%20REPORT%202018%20-%20MIDYEAR%20CYBERSECURITY%20%20RISK%20REVIEW&amp;severity=low&amp;id=682acdbdbbaf20d303f0be97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rbc-themed-phish-obfuscated-javascript-in-htm-attachment-f0be95</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=RBC%20Themed%20Phish%2C%20Obfuscated%20Javascript%20in%20.htm%20attachment&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-off-the-shelf-rats-targeting-pakistan-f0be88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Off-the-shelf%20RATs%20Targeting%20Pakistan&amp;severity=low&amp;id=682acdbdbbaf20d303f0be88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-9866-cwe-77-improper-neutralization-of-special-elements-used-in-a-command-command-injection-in-sonicwall-global-management-system-gms-bdae17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-9866%3A%20CWE-77%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20(&apos;Command%20Injection&apos;)%20in%20SonicWall%20Global%20Management%20System%20(GMS)&amp;severity=critical&amp;id=682d981dc4522896dcbdae17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-domains-malwaremessiagh-f0be86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Domains%2C%20MALWAREMESSIAGH&amp;severity=low&amp;id=682acdbdbbaf20d303f0be86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-attacks-on-industrial-enterprises-using-rms-and-teamviewer-f0be82</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Attacks%20on%20industrial%20enterprises%20using%20RMS%20and%20TeamViewer&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-14847-n-a-in-n-a-bef647</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-14847%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983dc4522896dcbef647</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ursnif-malwaremessiagh-f0be84</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ursnif%2C%20MALWAREMESSIAGH&amp;severity=low&amp;id=682acdbdbbaf20d303f0be84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/talos-blog-multiple-cobalt-personality-disorder-f0be80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Talos%20Blog%3A%20Multiple%20Cobalt%20Personality%20Disorder&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-samsam-ransomware-crew-made-nearly-6-million-from-ransom-payments-f0be9b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20SamSam%20Ransomware%20Crew%20Made%20Nearly%20%246%20Million%20From%20Ransom%20Payments&amp;severity=low&amp;id=682acdbdbbaf20d303f0be9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-analysis-report-ar18-221a-mar-10135536-17-north-korean-trojan-keymarble-mar-10135536-r17-v1-f0be99</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20Analysis%20Report%20(AR18-221A)%20MAR-10135536-17%20%C3%A2%E2%82%AC%E2%80%9C%20North%20Korean%20Trojan%3A%20KEYMARBLE-%20MAR-10135536.r17.v1&amp;severity=low&amp;id=682acdbdbbaf20d303f0be99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-document-targets-vietnamese-officials-f0be7e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malicious%20document%20targets%20Vietnamese%20officials&amp;severity=low&amp;id=682acdbdbbaf20d303f0be7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/massive-malvertising-campaign-discovered-attempting-40-000-infections-per-week-f0be7c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Massive%20Malvertising%20Campaign%20Discovered%20Attempting%2040%2C000%20Infections%20per%20Week&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-2616-cwe-267-in-linux-util-linux-fd944204</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-2616%3A%20CWE-267%20in%20Linux%20util-linux&amp;severity=medium&amp;id=68487f5d1b0bd07c3938e5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-1002205-cwe-22-in-dotnetzip-dotnetzip-semvered-bda65b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-1002205%3A%20CWE-22%20in%20DotNetZip%20DotNetZip.Semvered&amp;severity=medium&amp;id=682d981cc4522896dcbda65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-leafminer-new-espionage-campaigns-targeting-middle-eastern-regions-f0be78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Leafminer%3A%20New%20Espionage%20Campaigns%20Targeting%20Middle%20Eastern%20Regions&amp;severity=low&amp;id=682acdbdbbaf20d303f0be78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-kronos-reborn-f0be7a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Kronos%20Reborn&amp;severity=low&amp;id=682acdbdbbaf20d303f0be7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hancitor-intel-f0be76</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hancitor%20Intel&amp;severity=low&amp;id=682acdbdbbaf20d303f0be76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-links-f0be69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%20links&amp;severity=low&amp;id=682acdbdbbaf20d303f0be69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/email-credential-phish-dropbox-theme-f0be67</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Email%20Credential%20Phish%2C%20Dropbox%20Theme&amp;severity=low&amp;id=682acdbdbbaf20d303f0be67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ovh-phishing-f0be65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OVH%20Phishing&amp;severity=low&amp;id=682acdbdbbaf20d303f0be65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10631-cwe-311-missing-encryption-of-sensitive-data-in-medtronic-8840-n-vision-clinician-programmer-264588</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10631%3A%20CWE-311%20Missing%20Encryption%20of%20Sensitive%20Data%20in%20Medtronic%208840%20N%E2%80%99Vision%20Clinician%20Programmer&amp;severity=medium&amp;id=682f67ff0acd01a249264588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt-attack-in-the-middle-east-the-big-bang-f0be61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20APT%20Attack%20In%20the%20Middle%20East%3A%20The%20Big%20Bang&amp;severity=low&amp;id=682acdbdbbaf20d303f0be61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/talos-blog-smoking-guns-smoke-loader-learned-new-tricks-f0be5f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Talos%20Blog%20-%20Smoking%20Guns%20-%20Smoke%20Loader%20learned%20new%20tricks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-blog-malicious-macro-hijacks-desktop-shortcuts-to-deliver-backdoor-f0be63</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Blog%3A%20Malicious%20Macro%20Hijacks%20Desktop%20Shortcuts%20to%20Deliver%20Backdoor&amp;severity=low&amp;id=682acdbdbbaf20d303f0be63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-down-but-not-out-a-look-into-recent-exploit-kit-activities-f0be5d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Down%20but%20Not%20Out%3A%20A%20Look%20Into%20Recent%20Exploit%20Kit%20Activities&amp;severity=low&amp;id=682acdbdbbaf20d303f0be5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipboard-cryptocoin-hijacker-f0be5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clipboard%20CryptoCoin%20Hijacker&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8870-cwe-259-in-medtronic-24950-mycarelink-monitor-26461a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8870%3A%20CWE-259%20in%20Medtronic%2024950%20MyCareLink%20Monitor&amp;severity=medium&amp;id=682f6b520acd01a24926461a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-8868-cwe-749-in-medtronic-24950-mycarelink-monitor-264618</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-8868%3A%20CWE-749%20in%20Medtronic%2024950%20MyCareLink%20Monitor&amp;severity=medium&amp;id=682f6b520acd01a249264618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10596-cwe-923-in-medtronic-2090-carelink-programmer-2644db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10596%3A%20CWE-923%20in%20Medtronic%202090%20CareLink%20Programmer&amp;severity=high&amp;id=682f64490acd01a2492644db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-with-legit-company-names-in-metadata-f0be59</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20with%20legit%20company%20names%20in%20metadata&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-emails-outlook-themed-f0be57</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Emails%20Outlook%20Themed&amp;severity=low&amp;id=682acdbdbbaf20d303f0be57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blog-post-emotet-infection-with-icedid-f0be4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blog%20Post%3A%20EMOTET%20INFECTION%20WITH%20ICEDID&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-1000500-na-in-na-d5c7f683</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-1000500%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938ed43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-1000517-na-in-na-db35cefd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-1000517%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938e5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-redalpha-new-campaigns-discovered-targeting-the-tibetan-community-f0bea1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RedAlpha%3A%20New%20Campaigns%20Discovered%20Targeting%20the%20Tibetan%20Community&amp;severity=low&amp;id=682acdbdbbaf20d303f0bea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rancor-targeted-attacks-in-south-east-asia-using-plaintee-and-ddkong-malware-families-f0be48</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RANCOR%3A%20Targeted%20Attacks%20in%20South%20East%20Asia%20Using%20PLAINTEE%20and%20DDKONG%20Malware%20Families&amp;severity=low&amp;id=682acdbdbbaf20d303f0be48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/registrant-tracking-for-earthalgerrity-armyspy-com-f0be44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Registrant%20Tracking%20for%20%22earthalgerrity%40armyspy.com%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0be44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tick-group-weaponized-secure-usb-drives-to-target-air-gapped-critical-systems-f0be42</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Tick%20Group%20Weaponized%20Secure%20USB%20Drives%20to%20Target%20Air-Gapped%20Critical%20Systems&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-that-hit-pyeongchang-olympics-deployed-in-new-attacks-f0be40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20That%20Hit%20Pyeongchang%20Olympics%20Deployed%20in%20New%20Attacks&amp;severity=low&amp;id=682acdbdbbaf20d303f0be40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bank-phishing-domains-f0be46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=bank%20phishing%20domains&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-12071-na-in-na-e7c03407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-12071%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6846c60e7b622a9fdf1e7935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-donut-ransomware-f0be3c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Donut%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0be3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/clipboard-hijacker-targeting-bitcoin-ethereum-users-infects-over-300-0000-pcs-f0be3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Clipboard%20Hijacker%20Targeting%20Bitcoin%20%26%20Ethereum%20Users%20Infects%20Over%20300%2C0000%20PCs&amp;severity=low&amp;id=682acdbdbbaf20d303f0be3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dbger-ransomware-uses-eternalblue-and-mimikatz-to-spread-across-networks-f0be3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DBGer%20Ransomware%20Uses%20EternalBlue%20and%20Mimikatz%20to%20Spread%20Across%20Networks&amp;severity=low&amp;id=682acdbdbbaf20d303f0be3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-invisimole-surprisingly-equipped-spyware-undercover-since-2013-f0be25</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20InvisiMole%3A%20surprisingly%20equipped%20spyware%2C%20undercover%20since%202013&amp;severity=low&amp;id=682acdbdbbaf20d303f0be25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-plead-downloader-used-by-blacktech-f0be23</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PLEAD%20Downloader%20Used%20by%20BlackTech&amp;severity=low&amp;id=682acdbdbbaf20d303f0be23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phishing-attacks-abuse-excel-internet-query-fi-454a950c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phishing%20Attacks%20Abuse%20Excel%20Internet%20Query%20Files&amp;severity=medium&amp;id=68692e906f40f0eb72ae1d8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trend-micro-blog-new-killdisk-variant-hits-latin-american-financial-organizations-again-f0be2b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Trend%20Micro%20Blog%3A%20New%20KillDisk%20Variant%20Hits%20Latin%20American%20Financial%20Organizations%20Again&amp;severity=low&amp;id=682acdbdbbaf20d303f0be2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sofacy-group-s-parallel-attacks-f0be21</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sofacy%20Group%E2%80%99s%20Parallel%20Attacks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-phishing-attacks-abuse-excel-internet-query-files-f0be1f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20Phishing%20Attacks%20Abuse%20Excel%20Internet%20Query%20Files&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/phishing-domains-f0be0c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Phishing%20Domains&amp;severity=low&amp;id=682acdbdbbaf20d303f0be0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-banker-updates-to-group-tag-tt0002-version-1000206-f0be0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%23TrickBot%20banker%20updates%20to%20group_tag%20%22%22tt0002%22%20version%20%221000206%22&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-iron-cybercrime-group-under-the-scope-f0bed3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Iron%20Cybercrime%20Group%20Under%20The%20Scope&amp;severity=low&amp;id=682acdbdbbaf20d303f0bed3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sigrun-ransomware-author-decrypting-russian-victims-for-free-f0be1d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sigrun%20Ransomware%20Author%20Decrypting%20Russian%20Victims%20for%20Free&amp;severity=low&amp;id=682acdbdbbaf20d303f0be1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/one-ip-hosting-multiple-phishing-domains-f0be08</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=One%20IP%20hosting%20multiple%20phishing%20domains&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/grand-soft-ek-domains-f0be06</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Grand%20Soft%20EK%20domains&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-backup-cryptomix-ransomware-variant-actively-infecting-users-f0be1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Backup%20Cryptomix%20Ransomware%20Variant%20Actively%20Infecting%20Users&amp;severity=low&amp;id=682acdbdbbaf20d303f0be1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-and-icedid-botnet-iocs-f0be02</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=%22TrickBot%22%20and%20%22IcedID%22%20Botnet%20IOCs&amp;severity=medium&amp;id=682acdbdbbaf20d303f0be02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/us-cert-alert-ta18-149a-hidden-cobra-joanap-backdoor-trojan-and-brambul-server-message-block-worm-f0be04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=US-CERT%20Alert%20(TA18-149A)%20HIDDEN%20COBRA%20%E2%80%93%20Joanap%20Backdoor%20Trojan%20and%20Brambul%20Server%20Message%20Block%20Worm&amp;severity=low&amp;id=682acdbdbbaf20d303f0be04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/talos-blog-threat-roundup-for-may-18-25-f0be00</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Talos%20Blog%3A%20Threat%20Roundup%20for%20May%2018-25&amp;severity=low&amp;id=682acdbdbbaf20d303f0be00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hancitor-f0bdfe</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Hancitor&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-5-17-2018-f0bdfc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%20-%205%2F17%2F2018&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdfc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-5-21-2018-f0bdfa</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%20-%205%2F21%2F2018&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdfa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/wells-fargo-phish-f0bded</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Wells%20Fargo%20Phish&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/talos-blog-vpnfilter-f0bdeb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Talos%20Blog%3A%20VPNFilter&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/emotet-5-18-2018-f0bde9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Emotet%205-18-2018&amp;severity=low&amp;id=682acdbdbbaf20d303f0bde9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/keylogger-info-via-twitter-feed-f0bde7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Keylogger%20info%20via%20Twitter%20Feed&amp;severity=low&amp;id=682acdbdbbaf20d303f0bde7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/trickbot-pir4-loader-config-f0bde5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TrickBot%20pir4%20loader%20config&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bde5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-4942-unsafe-xml-external-entity-processing-in-adobe-coldfusion-coldfusion-update-5-and-earlier-versions-coldfusion-11-update-13-and-earlier-versions-bda676</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-4942%3A%20Unsafe%20XML%20External%20Entity%20Processing%20in%20Adobe%20ColdFusion%20ColdFusion%20Update%205%20and%20earlier%20versions%2C%20ColdFusion%2011%20Update%2013%20and%20earlier%20versions&amp;severity=high&amp;id=682d981cc4522896dcbda676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-4938-insecure-library-loading-in-adobe-coldfusion-coldfusion-update-5-and-earlier-versions-coldfusion-11-update-13-and-earlier-versions-bda672</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-4938%3A%20Insecure%20Library%20Loading%20in%20Adobe%20ColdFusion%20ColdFusion%20Update%205%20and%20earlier%20versions%2C%20ColdFusion%2011%20Update%2013%20and%20earlier%20versions&amp;severity=high&amp;id=682d981cc4522896dcbda672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rat-gone-rogue-meet-ars-vbs-loader-f0bef8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20RAT%20Gone%20Rogue%3A%20Meet%20ARS%20VBS%20Loader&amp;severity=low&amp;id=682acdbdbbaf20d303f0bef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-bip-dharma-ransomware-variant-released-f0beb4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Bip%20Dharma%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0beb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-tale-of-two-zero-days-f0bde1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20tale%20of%20two%20zero-days&amp;severity=low&amp;id=682acdbdbbaf20d303f0bde1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/panda-malware-broadens-f5-blog-f0bde3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Panda%20Malware%20Broadens%20-%20F5%20Blog&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bde3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-analysis-report-ar18-165a-mar-10135536-12-north-korean-trojan-typeframe-f0be38</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Analysis%20Report%20(AR18-165A)%20MAR-10135536-12%20%C3%A2%E2%82%AC%E2%80%9C%20North%20Korean%20Trojan%3A%20TYPEFRAME&amp;severity=low&amp;id=682acdbdbbaf20d303f0be38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-apps-get-back-on-the-play-store-just-by-changing-their-name-f0bddf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malicious%20Apps%20Get%20Back%20on%20the%20Play%20Store%20Just%20by%20Changing%20Their%20Name&amp;severity=low&amp;id=682acdbdbbaf20d303f0bddf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-botnet-exploiting-gpon-vulnerability-f0bddd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Botnet%20exploiting%20GPON%20Vulnerability&amp;severity=low&amp;id=682acdbdbbaf20d303f0bddd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-1000168-na-in-na-cdecbe78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-1000168%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938df73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-5448-cwe-23-in-medtronic-2090-carelink-programmer-2644ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-5448%3A%20CWE-23%20in%20Medtronic%202090%20CareLink%20Programmer&amp;severity=medium&amp;id=682f64490acd01a2492644ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-5446-cwe-257-in-medtronic-2090-carelink-programmer-2644b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-5446%3A%20CWE-257%20in%20Medtronic%202090%20CareLink%20Programmer&amp;severity=medium&amp;id=682f64490acd01a2492644b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lojack-becomes-a-double-agent-f0bdcc</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lojack%20Becomes%20a%20Double-Agent&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gandcrab-version-3-released-with-autorun-feature-and-desktop-background-f0bdca</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GandCrab%20Version%203%20Released%20With%20Autorun%20Feature%20and%20Desktop%20Background&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-who-s-who-in-the-zoo-cyberespionage-operation-targets-android-users-in-the-middle-east-f0bdc8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Who&apos;s%20who%20in%20the%20zoo.%20Cyberespionage%20operation%20targets%20android%20users%20in%20the%20Middle%20East.&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-on-the-economic-significance-of-ransomware-campaigns-a-bitcoin-transactions-perspective-f0bdc4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20On%20the%20Economic%20Significance%20of%20Ransomware%20Campaigns%3A%20A%20Bitcoin%20Transactions%20Perspective&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analyzing-operation-ghostsecret-attack-seeks-to-steal-data-worldwide-f0bdc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Analyzing%20Operation%20GhostSecret%3A%20Attack%20Seeks%20to%20Steal%20Data%20Worldwide&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bdc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10213-na-in-na-fc09029c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10213%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10212-na-in-na-825dfdd3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10212%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10211-na-in-na-2bab0375</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10211%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10210-na-in-na-3d85b839</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10210%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10209-na-in-na-4f8a2cd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10209%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10208-na-in-na-5bea2a45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10208%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=6839d93e182aa0cae2b72f5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10207-na-in-na-b17e1d1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10207%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-10206-na-in-na-58422a32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-10206%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839d93e182aa0cae2b72f57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sednit-update-analysis-of-zebrocy-f0bdc0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sednit%20update%3A%20Analysis%20of%20Zebrocy&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bdc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-orangeworm-attack-group-targets-the-healthcare-sector-in-the-u-s-europe-and-asia-f0bdc6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Orangeworm%20attack%20group%20targets%20the%20healthcare%20sector%20in%20the%20U.S.%2C%20Europe%2C%20and%20Asia&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2826-difficult-to-exploit-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-java-se-successful-attacks-require-human-interaction-from-a-person-other-than-the-attacker-and-while-the-vulnerability-is-in-java-se-attacks-may-significantly-impact-additional-products-successful-attacks-of-this-vulnerability-can-result-in-takeover-of-java-se-in-oracle-corporation-java-bda636</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2826%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Java%20SE%2C%20attacks%20may%20significantly%20impact%20additional%20products.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Java%20SE.%20in%20Oracle%20Corporation%20Java&amp;severity=high&amp;id=682d981cc4522896dcbda636</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2825-difficult-to-exploit-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-java-se-successful-attacks-require-human-interaction-from-a-person-other-than-the-attacker-and-while-the-vulnerability-is-in-java-se-attacks-may-significantly-impact-additional-products-successful-attacks-of-this-vulnerability-can-result-in-takeover-of-java-se-in-oracle-corporation-java-bda5d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2825%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker%20and%20while%20the%20vulnerability%20is%20in%20Java%20SE%2C%20attacks%20may%20significantly%20impact%20additional%20products.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Java%20SE.%20in%20Oracle%20Corporation%20Java&amp;severity=high&amp;id=682d981cc4522896dcbda5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2815-easily-exploitable-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-java-se-java-se-embedded-jrockit-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-ability-to-cause-a-partial-denial-of-service-partial-dos-of-java-se-java-se-embedded-jrockit-in-oracle-corporation-java-bda5cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2815%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE%2C%20Java%20SE%20Embedded%2C%20JRockit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Java%20SE%2C%20Java%20SE%20Embedded%2C%20JRockit.%20in%20Oracle%20Corporation%20Java&amp;severity=medium&amp;id=682d981cc4522896dcbda5cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2798-easily-exploitable-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-java-se-java-se-embedded-jrockit-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-ability-to-cause-a-partial-denial-of-service-partial-dos-of-java-se-java-se-embedded-jrockit-in-oracle-corporation-java-bda5be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2798%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE%2C%20Java%20SE%20Embedded%2C%20JRockit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Java%20SE%2C%20Java%20SE%20Embedded%2C%20JRockit.%20in%20Oracle%20Corporation%20Java&amp;severity=medium&amp;id=682d981cc4522896dcbda5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2796-easily-exploitable-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-java-se-java-se-embedded-jrockit-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-ability-to-cause-a-partial-denial-of-service-partial-dos-of-java-se-java-se-embedded-jrockit-in-oracle-corporation-java-bda5b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2796%3A%20Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE%2C%20Java%20SE%20Embedded%2C%20JRockit.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20unauthorized%20ability%20to%20cause%20a%20partial%20denial%20of%20service%20(partial%20DOS)%20of%20Java%20SE%2C%20Java%20SE%20Embedded%2C%20JRockit.%20in%20Oracle%20Corporation%20Java&amp;severity=medium&amp;id=682d981cc4522896dcbda5b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2790-difficult-to-exploit-vulnerability-allows-unauthenticated-attacker-with-network-access-via-multiple-protocols-to-compromise-java-se-java-se-embedded-successful-attacks-require-human-interaction-from-a-person-other-than-the-attacker-successful-attacks-of-this-vulnerability-can-result-in-unauthorized-update-insert-or-delete-access-to-some-of-java-se-java-se-embedded-accessible-data-in-oracle-corporation-java-bda5a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2790%3A%20Difficult%20to%20exploit%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20multiple%20protocols%20to%20compromise%20Java%20SE%2C%20Java%20SE%20Embedded.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Java%20SE%2C%20Java%20SE%20Embedded%20accessible%20data.%20in%20Oracle%20Corporation%20Java&amp;severity=low&amp;id=682d981cc4522896dcbda5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-minecraft-cs-go-ransomware-strive-for-media-attention-f0bdaf</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Minecraft%20%26%20CS%3AGO%20Ransomware%20Strive%20For%20Media%20Attention&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-talos-cisco-threat-roundup-for-april-6-13-f0bdbc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Talos%2FCisco%20%20Threat%20Roundup%20for%20April%206%20-%2013&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-roaming-mantis-uses-dns-hijacking-to-infect-android-smartphones-f0be29</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Roaming%20Mantis%20uses%20DNS%20hijacking%20to%20infect%20Android%20smartphones&amp;severity=low&amp;id=682acdbdbbaf20d303f0be29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-maktub-ransomware-possibly-rebranded-as-iron-f0bdbe</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Maktub%20ransomware%3A%20possibly%20rebranded%20as%20Iron&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-icedid-banking-trojan-teams-up-with-rovnix-for-distribution-f0bda7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20IcedID%20Banking%20Trojan%20Teams%20up%20with%20Rovnix%20for%20Distribution&amp;severity=low&amp;id=682acdbdbbaf20d303f0bda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pubg-ransomware-decrypts-your-files-if-you-play-playerunknown-s-battlegrounds-f0bda3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PUBG%20Ransomware%20Decrypts%20Your%20Files%20If%20You%20Play%20PlayerUnknown&apos;s%20Battlegrounds&amp;severity=low&amp;id=682acdbdbbaf20d303f0bda3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-matrix-ransomware-variants-installed-via-hacked-remote-desktop-services-f0bda1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Matrix%20Ransomware%20Variants%20Installed%20Via%20Hacked%20Remote%20Desktop%20Services&amp;severity=low&amp;id=682acdbdbbaf20d303f0bda1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cisco-ios-cve-2018-0171-attack-f0bd9f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cisco%20IOS%20CVE-2018-0171%20attack&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bd9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-whiterose-ransomware-is-decryptable-tells-a-strange-story-f0bd9d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20WhiteRose%20Ransomware%20Is%20Decryptable%20%26%20Tells%20A%20Strange%20Story&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/crypren-ransomware-f0bdad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Crypren%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/vurten-ransomware-f0bdab</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Vurten%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-crypter-as-a-service-helps-jrat-fly-under-the-radar-f0bd8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Crypter-as-a-Service%20Helps%20jRAT%20Fly%20Under%20The%20Radar&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mole66-cryptomix-ransomware-variant-released-f0bd8c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mole66%20Cryptomix%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-forgot-about-default-accounts-no-worries-goscanssh-didn-t-f0bda5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Forgot%20About%20Default%20Accounts%3F%20No%20Worries%2C%20GoScanSSH%20Didn%C3%A2%E2%82%AC%E2%84%A2t&amp;severity=low&amp;id=682acdbdbbaf20d303f0bda5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-diskwriter-or-uselessdisk-bootlocker-may-be-a-wiper-f0bd8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20DiskWriter%20or%20UselessDisk%20BootLocker%20May%20Be%20A%20Wiper&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sofacy-uses-dealerschoice-to-target-european-government-agency-f0bd84</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sofacy%20Uses%20DealersChoice%20to%20Target%20European%20Government%20Agency&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-goodfellas-the-brazilian-carding-scene-is-after-you-f0be27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Goodfellas%2C%20the%20Brazilian%20carding%20scene%20is%20after%20you&amp;severity=low&amp;id=682acdbdbbaf20d303f0be27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-alert-ta18-074a-russian-government-cyber-activity-targeting-energy-and-other-critical-infrastructure-sectors-f0bd86</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Alert%20(TA18-074A)%20Russian%20Government%20Cyber%20Activity%20Targeting%20Energy%20and%20Other%20Critical%20Infrastructure%20Sectors&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sigma-ransomware-being-distributed-using-fake-craigslist-malspam-f0beb8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sigma%20Ransomware%20Being%20Distributed%20Using%20Fake%20Craigslist%20Malspam&amp;severity=low&amp;id=682acdbdbbaf20d303f0beb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns-f0bd80</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20APT15%20is%20alive%20and%20strong%3A%20An%20analysis%20of%20RoyalCli%20and%20RoyalDNS&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-royal-apt-apt15-related-information-from-ncc-group-cyber-defense-operations-research-f0bd7e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Royal%20APT%20-%20APT15%20-%20Related%20Information%20from%20NCC%20Group%20Cyber%20Defense%20Operations%20Research&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bd7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turla-nautilus-implant-f0bd71</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turla%20Nautilus%20Implant&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-traces-of-hacking-team-in-the-wild-f0bd6f</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20traces%20of%20Hacking%20Team%20in%20the%20wild&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bd6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-march-28-2018-malware-analysis-report-mar-10135536-11-north-korean-trojan-sharpknot-f0bd88</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20March%2028%2C%202018%3A%20Malware%20Analysis%20Report%20(MAR-10135536.11)%20%C3%A2%E2%82%AC%E2%80%9C%20North%20Korean%20Trojan%3A%20SHARPKNOT&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-qwerty-ransomware-utilizes-gnupg-to-encrypt-a-victims-files-f0bd82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Qwerty%20Ransomware%20Utilizes%20GnuPG%20to%20Encrypt%20a%20Victims%20Files&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apache-solr-the-new-target-for-cryptominers-f0bd6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Apache%20SOLR%3A%20the%20new%20target%20for%20cryptominers&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-tscookie-f0bd6b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20%C3%A2%E2%82%AC%C5%93TSCookie%C3%A2%E2%82%AC%C2%9D&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mcafee-uncovers-operation-honeybee-a-malicious-document-campaign-targeting-humanitarian-aid-groups-f0bd69</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20McAfee%20Uncovers%20Operation%20Honeybee%2C%20a%20Malicious%20Document%20Campaign%20Targeting%20Humanitarian%20Aid%20Groups&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sms-imessage-phishes-forcing-users-to-install-run-scripts-and-update-vpn-settings-f0bd67</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SMS%2FiMessage%20phishes%20forcing%20users%20to%20install%2Frun%20scripts%20and%20update%20VPN%20settings&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sofacy-attacks-multiple-government-entities-f0bd65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sofacy%20Attacks%20Multiple%20Government%20Entities&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bd65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-slice-of-2017-sofacy-activity-by-kaspersky-f0bd63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Slice%20of%202017%20Sofacy%20Activity%20by%20Kaspersky&amp;severity=high&amp;id=682acdbdbbaf20d303f0bd63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-6954-na-in-na-17b1bf1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-6954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5c1b0bd07c3938d90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dasan-unauthenticated-remote-code-execution-and-ongoing-abuse-f0bd52</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dasan%20Unauthenticated%20Remote%20Code%20Execution%20-%20and%20ongoing%20abuse&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-black-ruby-ransomware-skips-victims-in-iran-and-adds-a-miner-for-good-measure-f0bd90</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Black%20Ruby%20Ransomware%20Skips%20Victims%20in%20Iran%20and%20Adds%20a%20Miner%20for%20Good%20Measure&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-smominru-monero-mining-botnet-making-millions-for-operators-f0bd50</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Smominru%20Monero%20mining%20botnet%20making%20millions%20for%20operators&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gandcrab-ransomware-distributed-by-exploit-kits-appends-gdcb-extension-f0bd61</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GandCrab%20Ransomware%20Distributed%20by%20Exploit%20Kits%2C%20Appends%20GDCB%20Extension&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-vermin-quasar-rat-and-custom-malware-used-in-ukraine-f0bd4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20VERMIN%3A%20Quasar%20RAT%20and%20Custom%20Malware%20Used%20In%20Ukraine&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dark-caracal-cyber-espionage-at-a-global-scale-f0bd48</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dark%20Caracal%20Cyber-espionage%20at%20a%20Global%20Scale&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rtf-files-for-hancitor-utilize-exploit-for-cve-2017-11882-f0bd44</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RTF%20files%20for%20Hancitor%20utilize%20exploit%20for%20CVE-2017-11882&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-masuta-satori-creators-second-botnet-weaponizes-a-new-router-exploit-f0bd42</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Masuta%20%3A%20Satori%20Creators%C3%A2%E2%82%AC%E2%84%A2%20Second%20Botnet%20Weaponizes%20A%20New%20Router%20Exploit.&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-job-application-incl-macro-f0bd46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20Job%20Application%20incl.%20Macro&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analyzing-crossrat-f0bd4e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Analyzing%20CrossRAT&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-first-c-c-ipv6-azorult-f0bd33</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20First%20C%26C%20(IPv6)%20-%20Azorult&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-collected-via-pastebin-f0bd31</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20collected%20via%20pastebin&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-2627-n-a-in-n-a-bda59d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-2627%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d981cc4522896dcbda59d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malicious-chrome-browser-extensions-injecting-code-f0bd40</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malicious%20Chrome%20browser%20extensions%20injecting%20code&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-globeimposter-doc-2018-01-12-unpaid-invoice-1234567-7z-f0bd2f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20GlobeImposter%20%22..doc%22%202018-01-12%20%3A%20%22Unpaid%20invoice%20%22%20-%20%221234567.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-suspicious-binary-delivered-as-fake-jpeg-f0bd14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Suspicious%20binary%20delivered%20as%20fake%20jpeg&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-duping-doping-domains-possible-fancy-bear-domains-spoofing-anti-doping-and-olympic-organizations-by-threatconnect-f0bd27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Duping%20Doping%20Domains%20-%20Possible%20Fancy%20Bear%20Domains%20Spoofing%20Anti-Doping%20and%20Olympic%20Organizations%20by%20ThreatConnect&amp;severity=high&amp;id=682acdbdbbaf20d303f0bd27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mac-malware-of-2017-f0bd21</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mac%20Malware%20of%202017&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-first-kotlin-developed-malicious-app-signs-users-up-for-premium-sms-services-f0bd12</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20First%20Kotlin-Developed%20Malicious%20App%20Signs%20Users%20Up%20for%20Premium%20SMS%20Services&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-17485-n-a-in-n-a-bed03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-17485%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d983ac4522896dcbed03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-north-korean-monero-cryptocurrency-miner-f0bd0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20North%20Korean%20Monero%20Cryptocurrency%20Miner&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-5715-information-disclosure-in-intel-corporation-microprocessors-with-speculative-execution-bda599</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-5715%3A%20Information%20Disclosure%20in%20Intel%20Corporation%20Microprocessors%20with%20Speculative%20Execution&amp;severity=medium&amp;id=682d981cc4522896dcbda599</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-18018-na-in-na-e31f6f5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-18018%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5c1b0bd07c3938d882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/threat-analysis-malicious-microsoft-word-documents-being-used-in-targeted-attack-campaigns-f0bd0c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Threat%20Analysis%3A%20Malicious%20Microsoft%20Word%20Documents%20Being%20Used%20in%20Targeted%20Attack%20Campaigns&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-repository-containting-orignal-and-decompiled-files-of-trisis-triton-hatman-malware-f0bd0a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Repository%20containting%20orignal%20and%20decompiled%20files%20of%20TRISIS%2FTRITON%2FHATMAN%20malware&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bd0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-north-korea-bitten-by-bitcoin-bug-financially-motivated-campaigns-reveal-new-dimension-of-the-lazarus-group-f0bd02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20North%20Korea%20Bitten%20by%20Bitcoin%20Bug%3A%20Financially%20motivated%20campaigns%20reveal%20new%20dimension%20of%20the%20Lazarus%20Group&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-telegramrat-evades-traditional-defenses-via-the-cloud-f0bd4c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TelegramRAT%20evades%20traditional%20defenses%20via%20the%20cloud&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-dragonfly-analysis-suggests-links-to-earlier-attacks-f0bce5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20Dragonfly%20Analysis%20Suggests%20Links%20to%20Earlier%20Attacks&amp;severity=low&amp;id=682acdbdbbaf20d303f0bce5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-zeus-panda-banking-trojan-targets-online-holiday-shoppers-f0bceb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Zeus%20Panda%20Banking%20Trojan%20Targets%20Online%20Holiday%20Shoppers&amp;severity=low&amp;id=682acdbdbbaf20d303f0bceb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-attackers-deploy-new-ics-attack-framework-triton-and-cause-operational-disruption-to-critical-infrastructure-f0bcd0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Attackers%20Deploy%20New%20ICS%20Attack%20Framework%20%C3%A2%E2%82%AC%C5%93TRITON%C3%A2%E2%82%AC%C2%9D%20and%20Cause%20Operational%20Disruption%20to%20Critical%20Infrastructure&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-work-cryptomix-ransomware-variant-released-f0bcd2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20WORK%20Cryptomix%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rise-of-one-more-mirai-worm-variant-f0bcf5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Rise%20of%20One%20More%20Mirai%20Worm%20Variant&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-still-stealing-f0bce7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Still%20stealing&amp;severity=low&amp;id=682acdbdbbaf20d303f0bce7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-banking-malware-on-google-play-targets-polish-banks-f0bcf1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Banking%20malware%20on%20Google%20Play%20targets%20Polish%20banks&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-file-spider-ransomware-targeting-the-balkans-with-malspam-f0bcd4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20File%20Spider%20Ransomware%20Targeting%20the%20Balkans%20With%20Malspam&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-strongpity2-spyware-replaces-finfisher-in-mitm-campaign-isp-involved-f0bccc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20StrongPity2%20spyware%20replaces%20FinFisher%20in%20MitM%20campaign%20%C3%A2%E2%82%AC%E2%80%9C%20ISP%20involved%3F&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bccc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-16368-buffer-overflow-underflow-in-adobe-acrobat-reader-2017-012-20098-and-earlier-versions-2017-011-30066-and-earlier-versions-2015-006-30355-and-earlier-versions-11-0-22-and-earlier-versions-bda621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-16368%3A%20Buffer%20Overflow%20%2F%20Underflow%20in%20Adobe%20Acrobat%20Reader%202017.012.20098%20and%20earlier%20versions%2C%202017.011.30066%20and%20earlier%20versions%2C%202015.006.30355%20and%20earlier%20versions%2C%2011.0.22%20and%20earlier%20versions&amp;severity=high&amp;id=682d981cc4522896dcbda621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gratefulpos-credit-card-stealing-malware-just-in-time-for-the-shopping-season-f0bce9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GratefulPOS%20credit%20card%20stealing%20malware%20-%20just%20in%20time%20for%20the%20shopping%20season&amp;severity=low&amp;id=682acdbdbbaf20d303f0bce9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hc7-gotya-ransomware-installed-via-remote-desktop-services-spread-with-psexec-f0bcca</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20HC7%20GOTYA%20Ransomware%20Installed%20via%20Remote%20Desktop%20Services.%20Spread%20with%20PsExec&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-doc-2017-12-05-message-from-g10pr0123456-mycompany-com-20171205123-zip-f0bcc8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%22..doc%22%202017-12-05%20%3A%20&apos;Message%20from%20%22G10PR0123456.MYCOMPANY.COM%22&apos;%20-%20%2220171205123.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-doc-2017-12-04-emailing-1234567-1234567-7z-f0bcc6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%22..doc%22%202017-12-04%20%3A%20%22Emailing%3A%201234567%22%20-%20%221234567.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-doc-2017-12-01-12-invoice-3456-i-4321-7z-f0bcc4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%22..doc%22%202017-12-01%20%3A%20%2212_Invoice_3456%22%20-%20%22I_4321.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-doc-2017-11-30-fl-123456-11-30-2017-7z-f0bcb7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%22..doc%22%202017-11-30%20%3A%20%22FL-123456%2011.30.2017.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gaffe-reveals-full-list-of-targets-in-spear-phishing-attack-using-cobalt-strike-against-financial-institutions-f0bcb1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Gaffe%20Reveals%20Full%20List%20of%20Targets%20in%20Spear%20Phishing%20Attack%20Using%20Cobalt%20Strike%20Against%20Financial%20Institutions&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-emotet-banking-trojan-analysis-of-dropped-malware-morphing-at-scale-f0bced</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Emotet%20Banking%20Trojan%3A%20Analysis%20of%20Dropped%20Malware%20Morphing%20at%20Scale&amp;severity=low&amp;id=682acdbdbbaf20d303f0bced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-android-malware-appears-linked-to-lazarus-cybercrime-group-f0bcaf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Android%20Malware%20Appears%20Linked%20to%20Lazarus%20Cybercrime%20Group&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-halloware-ransomware-on-sale-on-the-dark-web-for-only-40-f0bcb5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Halloware%20Ransomware%20on%20Sale%20on%20the%20Dark%20Web%20for%20Only%20%2440&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-test-cryptomix-ransomware-variant-released-f0bcb3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Test%20Cryptomix%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fake-windows-troubleshooting-support-scam-uploads-screenshots-uses-paypal-f0bca9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Fake%20Windows%20Troubleshooting%20Support%20Scam%20Uploads%20Screenshots%20%26%20Uses%20Paypal&amp;severity=low&amp;id=682acdbdbbaf20d303f0bca9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-google-discovers-new-tizi-android-spyware-f0bcab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Google%20Discovers%20New%20Tizi%20Android%20Spyware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-uboatrat-navigates-east-asia-f0bca7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20UBoatRAT%20Navigates%20East%20Asia&amp;severity=low&amp;id=682acdbdbbaf20d303f0bca7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rokrat-reloaded-f0bca5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ROKRAT%20Reloaded&amp;severity=low&amp;id=682acdbdbbaf20d303f0bca5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tizi-detecting-and-blocking-socially-engineered-spyware-on-android-f0bcad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Tizi%3A%20Detecting%20and%20blocking%20socially%20engineered%20spyware%20on%20Android&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-16544-na-in-na-1f85a84a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-16544%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938e59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-dridex-2017-11-14-botnet-7200-invoice-no-123456-invoice-123456-06-doc-7bdbca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Dridex%202017-11-14%20%3A%20botnet%207200%20%3A%20%22Invoice%20No.%0A%20123456%22%20-%20%22Invoice-123456-06.doc%22&amp;severity=low&amp;id=682b81088ee1a77b717bdbca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-11-14-mac1-invoice-axby1234567-invoiceaxby1234567-doc-7bdb95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-11-14%20%3A%20%22mac1%22%20%3A%20%22Invoice%0A%20AXBY1234567%22%20-%20%22InvoiceAXBY1234567.doc%22&amp;severity=low&amp;id=682b81088ee1a77b717bdb95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-11-14-mac1-emailing-12345678-doc-12345678-7bdb14</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-11-14%20%3A%20%22mac1%22%20%3A%20%22Emailing%3A%0A%2012345678.doc%22%20-%20%2212345678%22&amp;severity=low&amp;id=682b81088ee1a77b717bdb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-0000-cryptomix-ransomware-variant-released-f0bc98</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%200000%20Cryptomix%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-multi-stage-malware-sneaks-into-google-play-f0bcce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Multi-stage%20malware%20sneaks%20into%20Google%20Play&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hidden-cobra-north-korean-trojan-volgmer-7bddcb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20HIDDEN%20COBRA%20%E2%80%93%20North%20Korean%20Trojan%3A%20Volgmer&amp;severity=low&amp;id=682b81098ee1a77b717bddcb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hidden-cobra-north-korean-remote-administration-tool-fallchill-7bdc69</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20HIDDEN%20COBRA%20%E2%80%93%20North%20Korean%20Remote%20Administration%20Tool%3A%20FALLCHILL&amp;severity=low&amp;id=682b81088ee1a77b717bdc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-malware-with-ties-to-sunorcal-discovered-7bd7da</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20New%20Malware%20with%20Ties%20to%20SunOrcal%20Discovered&amp;severity=low&amp;id=682b81078ee1a77b717bd7da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-malware-with-ties-to-sunorcal-discovered-f0bc96</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20New%20Malware%20with%20Ties%20to%20SunOrcal%20Discovered&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-09-affid-3-offline-asasin-documents-aby001234-doc-f0bc94</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-09%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Documents%22%20-%20%22ABY001234.doc%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-2017-11-01-emailing-az123-01-11-2017-az123-01-11-2017-doc-7be2c8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%202017-11-01%20%3A%20%22Emailing%3A%20AZ123%20-%2001.11.2017%22%20-%20%22AZ123%20-%2001.11.2017.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717be2c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-2017-11-02-scan-scan00123-doc-7be297</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%202017-11-02%20%3A%20%22Scan%22%20-%20%22Scan00123.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717be297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-03-affid-3-offline-asasin-scanned-image-from-mx-2600n-20171103-123456-doc-7be207</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-03%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Scanned%20image%20from%20MX-2600N%22%20-%20%2220171103_123456.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717be207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-07-affid-3-offline-asasin-emailing-az123-07-11-2017-az123-07-11-2017-doc-7be1b7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-07%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Emailing%3A%20AZ123%20-%2007.11.2017%22%20-%20%22AZ123%20-%2007.11.2017.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717be1b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-2017-11-02-12-invoice-3456-001-1234-doc-7be188</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%202017-11-02%20%3A%20%2212_Invoice_3456%22%20-%20%22001_1234.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717be188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-11-01-invoice-12345-invoice-doc-7bdf5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%2FTrickbot%20%22mac1%22%202017-11-01%20%3A%20%22Invoice%22%20-%20%2212345_Invoice.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717bdf5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-how-mobile-bankbots-disguise-as-perfectly-trustworthy-apps-f0bcf3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20How%20Mobile%20Bankbots%20Disguise%20as%20Perfectly%20Trustworthy%20Apps&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-08-affid-3-offline-asasin-invoice-ax1234567-invoice-ax1234567-doc-f0bc92</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-08%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Invoice%20AX1234567%22%20-%20%22Invoice-AX1234567.doc%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-07-affid-3-offline-asasin-invoice-123456789-987654321-11-07-2017-12-34-56-doc-f0bc8e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-07%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Invoice%20%23123456789%2C%22%20-%20%22987654321_11_07_2017_12_34_56.doc%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-06-affid-3-asasin-e3s1234567890123-payment-advice-advice-123456-20171106-doc-f0bc8c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-06%20%3A%20Affid%3D3%2C%20%22.asasin%22%20%3A%20%22E3S1234567890123%20Payment%20advice%22%20-%20%22advice_123456_20171106.doc%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-oilrig-deploys-alma-communicator-dns-tunneling-trojan-7bdef7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20OilRig%20Deploys%20%E2%80%9CALMA%20Communicator%E2%80%9D%20%E2%80%93%20DNS%20Tunneling%20Trojan&amp;severity=low&amp;id=682b810a8ee1a77b717bdef7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments-7bdec6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sowbug%3A%20Cyber%20espionage%20group%20targets%20South%20American%20and%20Southeast%20Asian%20governments&amp;severity=low&amp;id=682b810a8ee1a77b717bdec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-11-03-affid-3-offline-asasin-12345678-doc-7bdfdc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-11-03%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%2212345678.doc%22&amp;severity=low&amp;id=682b810a8ee1a77b717bdfdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mitigating-and-eliminating-info-stealing-qakbot-and-emotet-in-corporate-networks-7bd777</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mitigating%20and%20eliminating%20info-stealing%20Qakbot%20and%20Emotet%20in%20corporate%20networks&amp;severity=low&amp;id=682b81078ee1a77b717bd777</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-oceanlotus-blossoms-mass-digital-surveillance-and-attacks-targeting-asean-asian-nations-the-media-human-rights-groups-and-civil-society-f0bc79</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20OceanLotus%20Blossoms%3A%20Mass%20Digital%20Surveillance%20and%20Attacks%20Targeting%20ASEAN%2C%20Asian%20Nations%2C%20the%20Media%2C%20Human%20Rights%20Groups%2C%20and%20Civil%20Society&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fancy-bear-pens-the-worst-blog-posts-ever-by-threatconnect-f0bd29</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Fancy%20Bear%20Pens%20the%20Worst%20Blog%20Posts%20Ever%20by%20ThreatConnect&amp;severity=high&amp;id=682acdbdbbaf20d303f0bd29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/suspicious-domains-extrapolated-from-fake-microsoft-scammer-domain-f0bc71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Suspicious%20domains%20extrapolated%20from%20fake%20Microsoft%20scammer%20domain&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-10-31-invoice-inv0000123-inv0000123-doc-f0bc6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%2FTrickbot%20%22mac1%22%202017-10-31%20%3A%20%22Invoice%20INV0000123%22%20-%20%22INV0000123.doc%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/evasive-sage-2-2-ransomware-f0bc75</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Evasive%20Sage%202.2%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bahamut-revisited-more-cyber-espionage-in-the-middle-east-and-south-asia-f0bc6d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Bahamut%20Revisited%2C%20More%20Cyber%20Espionage%20in%20the%20Middle%20East%20and%20South%20Asia&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-return-of-not-petya-as-bad-rabbit-diskcoder-yes-those-two-are-the-same-f0bc6b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Return%20of%20Not%20Petya%20as%20Bad%20Rabbit%20Diskcoder%2C%20yes%20those%20two%20are%20the%20same!&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bad-rabbit-not-petya-is-back-with-improved-ransomware-f0bc69</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Bad%20Rabbit%3A%20Not-Petya%20is%20back%20with%20improved%20ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-badrabbit-ransomware-compiled-by-thaicert-a-member-of-the-electronic-transactions-development-agency-f0bc67</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BadRabbit%20Ransomware%20Compiled%20by%20ThaiCERT%2C%20a%20member%20of%20the%20Electronic%20Transactions%20Development%20Agency&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bad-rabbit-via-pastebin-f0bc58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bad%20Rabbit%20(via%20Pastebin)&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-15874-na-in-na-32a8fa3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-15874%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938ed3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-15873-na-in-na-177f4d82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-15873%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938ed33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bad-rabbit-ransomware-f0bc5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Bad%20Rabbit%20ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cyber-conflict-decoy-document-used-in-real-cyber-conflict-f0bddb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%C3%A2%E2%82%AC%C5%93Cyber%20Conflict%C3%A2%E2%82%AC%C2%9D%20Decoy%20Document%20Used%20In%20Real%20Cyber%20Conflict&amp;severity=low&amp;id=682acdbdbbaf20d303f0bddb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-us-cert-ta17-293a-report-renamed-psexec-execution-sigma-siem-ruleset-f0bc56</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20US%20CERT%20TA17-293A%20report%20-%20renamed%20PsExec%20execution%20(sigma%2FSIEM%20ruleset)&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bc56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-jaderat-mobile-surveillanceware-spikes-in-espionage-activity-f0bc54</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20JadeRAT%20mobile%20surveillanceware%20spikes%20in%20espionage%20activity&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-iot-reaper-a-rappid-spreading-new-iot-botnet-f0bc52</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20IoT_reaper%3A%20A%20Rappid%20Spreading%20New%20IoT%20Botnet&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-malspam-2017-10-19-emailed-invoice-f0bc50</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Malspam%202017-10-19%20%22Emailed%20Invoice%20-%20******%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-18-affid-3-offline-asasin-message-from-02087654321-voice-message-7z-f0bc4e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-18%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Message%20from%2002087654321%22%20-%20%22Voice%20Message.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-goodbye-cerber-hello-magniber-ransomware-f0bda9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Goodbye%20Cerber%3F%20Hello%20Magniber%20Ransomware!&amp;severity=low&amp;id=682acdbdbbaf20d303f0bda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-10-18-invoice-123456789-10-18-2017-7z-f0bc4c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%2FTrickbot%20%22mac1%22%202017-10-18%20%3A%20%22Invoice%20123456789%2010.18.2017.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-coalabot-http-ddos-bot-f0bedf</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CoalaBot%3A%20http%20Ddos%20Bot&amp;severity=low&amp;id=682acdbdbbaf20d303f0bedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-leviathan-espionage-actor-spearphishes-maritime-and-defense-targets-f0bc73</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Leviathan%3A%20Espionage%20actor%20spearphishes%20maritime%20and%20defense%20targets&amp;severity=high&amp;id=682acdbdbbaf20d303f0bc73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-blackoasis-apt-and-new-targeted-attacks-leveraging-zero-day-exploit-f0bc4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BlackOasis%20APT%20and%20new%20targeted%20attacks%20leveraging%20zero-day%20exploit&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-10-11-emailing-12345678-12345678-7z-f0bc48</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%2FTrickbot%20%22mac1%22%202017-10-11%20%3A%20%22Emailing%3A%2012345678%22%20-%20%2212345678.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-10-05-invoice-inv0000123-invoice-inv0000123-7z-f0bc39</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%2FTrickbot%20%22mac1%22%202017-10-05%20%3A%20%22Invoice%20INV0000123%22%20-%20%22Invoice%20INV0000123.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-10-11-supplement-payment-1234567890-f1234567890-11102017-7z-f0bc3b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22.asasin%22%2FTrickbot%20%22mac1%22%202017-10-11%20%3A%20%22Supplement%20payment%201234567890%22%20-%20%22F1234567890_11102017.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-10-affid-3-offline-asasin-voicemail-from-845-551-1234-vmsg12345678-20171010-7z-f0bc37</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-10%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Voicemail%20From%20845-551-1234%22%20-%20%22VMSG12345678_20171010.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-asasin-trickbot-mac1-2017-10-10-status-of-invoice-a2171234-56-a2171234-56-html-f0bc35</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2C%20%22asasin%22%20%2F%20Trickbot%20%22mac1%22%202017-10-10%20%3A%20%22Status%20of%20invoice%20A2171234-56%22%20-%20%22A2171234-56.html%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-10-affid-3-offline-asasin-document-is-complete-invoice-1234-sign-and-return-7z-f0bc33</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-10%20%3A%20Affid%3D3%2C%20offline%2C%20%22.asasin%22%20%3A%20%22Document%20...%20is%20complete%22%20-%20%22invoice_1234_sign_and_return.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-09-affid-3-offline-ykcol-invoice-ip1234567-invoice-ip1234567-7z-f0bc31</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-09%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Invoice%20IP1234567%22%20-%20%22Invoice-IP1234567.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-09-affid-3-offline-ykcol-invoice-ip1234567-invoice-ip1234567-7z-f0bc2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-09%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Invoice%20IP1234567%22%20-%20%22Invoice-IP1234567.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-05-affid-3-offline-ykcol-invoice-inv000123-invoice-inv000123-7z-f0bc2d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-05%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Invoice%20INV000123%22%20-%20%22Invoice%20INV000123.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-significant-formbook-distribution-campaigns-impacting-the-u-s-and-south-korea-f0bc2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Significant%20FormBook%20Distribution%20Campaigns%20Impacting%20the%20U.S.%20and%20South%20Korea&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-06-affid-3-offline-ykcol-your-remittance-advice-12345-remittance-7z-f0bc29</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-06%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Your%20Remittance%20Advice%22%20-%20%2212345%20Remittance.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-freemilk-a-highly-targeted-spear-phishing-campaign-f0bc1c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FreeMilk%3A%20A%20Highly%20Targeted%20Spear%20Phishing%20Campaign&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-05-affid-3-offline-ykcol-invoice-1234567-7z-f0bc1a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-05%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Invoice%22%20-%20%221234567.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-04-affid-3-offline-ykcol-message-from-02087654321-voice-message-7z-f0bc18</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-04%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Message%20from%2002087654321%22%20-%20%22Voice%20Message.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-04-affid-3-offline-ykcol-copy-of-invoice-a1234567890-invoicea1234567890-7z-f0bc14</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-04%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Copy%20of%20invoice%20A1234567890...%22%20-%20%22InvoiceA1234567890.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-03-affid-3-offline-ykcol-invoice-a-1234567890-7z-f0bc12</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-03%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22INVOICE%22%20-%20%22A_1234567890.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-10-03-f0bc0e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-10-03&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-evidence-aurora-operation-still-active-part-2-more-ties-uncovered-between-ccleaner-hack-chinese-hackers-f0bc10</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Evidence%20Aurora%20Operation%20Still%20Active%20Part%202%3A%20More%20Ties%20Uncovered%20Between%20CCleaner%20Hack%20%26%20Chinese%20Hackers&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-02-affid-3-offline-ykcol-emailed-invoice-123456-i-123456-7z-f0bc0c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-02%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Emailed%20Invoice%20-%20123456%22%20-%20%22I_123456.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-10-02-affid-3-offline-ykcol-new-doc-2017-10-02-page-3-7z-f0bc0a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-10-02%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22New%20Doc%202017-10-02%20-%20Page%203.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-29-affid-3-offline-ykcol-invoice-123456-7z-f0bbfd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-29%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Invoice%22%20-%20%22123456.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-affid-3-trickbot-mac1-2017-09-29-voice-message-from-voicemsg-html-links-f0bbfb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20Affid%3D3%2FTrickbot%20%22mac1%22%202017-09-29%20%3A%20%22Voice%20Message%20from%20...%22%20-%20%22%2Fvoicemsg.html%22%20links&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-28-affid-3-offline-ykcol-scan-data-scan-54321-7z-f0bbf9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-28%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Scan%20Data%22%20-%20%22Scan_54321.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-banking-trojan-attempts-to-steal-brazillion-f0bbf7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Banking%20Trojan%20Attempts%20To%20Steal%20Brazillion%24&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actors-target-government-of-belarus-using-cmstar-trojan-f0bbf5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Actors%20Target%20Government%20of%20Belarus%20Using%20CMSTAR%20Trojan&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-trickbot-emailing-scan0xxx-from-sales-f0bbf3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%20%2F%20Trickbot%3A%20%22Emailing%3A%20Scan0xxx%22%20from%20%22Sales%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-27-affid-3-offline-ykcol-scanned-image-from-mx-2600n-20170927-123456-7z-f0bbf1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-27%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Scanned%20image%20from%20MX-2600N%22%20-%20%2220170927_123456.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-experts-analyzed-an-advanced-all-in-memory-cryptoworm-f0bd23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Experts%20analyzed%20an%20Advanced%20%22all%20in%20memory%22%20CryptoWorm&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-26-affid-3-offline-ykcol-invoice-pis1234567-invoicepis1234567-7z-f0bbef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-26%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Invoice%20PIS1234567%22%20-%20%22InvoicePIS1234567.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-striking-oil-a-closer-look-at-adversary-infrastructure-f0bbed</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Striking%20Oil%3A%20A%20Closer%20Look%20at%20Adversary%20Infrastructure&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-26-affid-3-offline-ykcol-invoice-a1234567890-7z-f0bbeb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-26%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%3A%22INVOICE%22%20-%20%22A1234567890.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-25-affid-3-offline-ykcol-12-invoice-3456-001-1234-7z-f0bbde</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-25%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%2212_Invoice_3456%22%20-%20%22001_1234.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-microcin-malware-f0bd10</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20MICROCIN%20MALWARE&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-25-affid-3-offline-ykcol-message-from-02087654321-voice-message-7z-f0bbdc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-25%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Message%20from%2002087654321%22%20-%20%22Voice%20Message.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-22-affid-3-offline-ykcol-your-invoice-123456-invoice-file-654321-7z-f0bbda</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-22%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Your%20Invoice%20%23%20123456%22%20-%20%22Invoice_file_654321.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-21-22-affid-3-offline-ykcol-pic-1234-pic-1234-7z-f0bbd8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-21%2F22%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22PIC_1234%22%20-%20%22PIC_1234.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-invoice-re-2017-09-21-00xxx-from-amazon-marketplace-f0bbd6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%3A%20%22Invoice%20RE-2017-09-21-00xxx%22%09from%20%22Amazon%20Marketplace%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-18-affid-3-offline-ykcol-message-from-km-c224e-20171809-12345678901-7z-f0bbd4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-18%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Message%20from%20KM_C224e%22%20-%20%2220171809_12345678901.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-20-affid-3-offline-ykcol-new-voice-message-msg0321-7z-f0bbd2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-20%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22New%20voice%20message...%22%20-%20%22msg0321.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-finfisher-surveillance-campaigns-internet-providers-involved-f0bbd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20FinFisher%20surveillance%20campaigns%3A%20Internet%20providers%20involved%3F&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-track-to-the-future-how-to-use-historical-intelligence-to-get-back-to-the-future-and-defend-your-organization-example-using-apt28-by-threatconnect-f0bd2b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Track%20to%20the%20future%20-%20How%20to%20use%20historical%20intelligence%20to%20get%20back%20to%20the%20future%20and%20defend%20your%20organization%20(example%20using%20APT28)%20by%20ThreatConnect&amp;severity=high&amp;id=682acdbdbbaf20d303f0bd2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-19-affid-3-offline-ykcol-herbalife-order-number-6n01001234-6n01001234-1-7z-f0bbce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-19%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22HERBALIFE%20Order%20Number%3A%206N01001234%22%20-%20%226N01001234_1.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-19-affid-3-offline-ykcol-emailing-10008001234-10008001234-7z-f0bbcc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-19%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Emailing%20-%2010008001234%22%20-%20%2210008001234.7z%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-20-affid-3-offline-ykcol-status-of-invoice-a2171234-56-a2171234-56-rar-f0bbbf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-20%20%3A%20Affid%3D3%2C%20offline%2C%20%22.ykcol%22%20%3A%20%22Status%20of%20invoice%20A2171234-56%22%20-%20%22A2171234-56.rar%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-locky-ransomware-pushed-alongside-fakeglobe-in-upgraded-spam-campaigns-f0bd06</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Locky%20Ransomware%20Pushed%20Alongside%20FakeGlobe%20in%20Upgraded%20Spam%20Campaigns&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hangul-word-processor-and-postscript-abused-via-malicious-attachments-f0bbbd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hangul%20Word%20Processor%20and%20PostScript%20Abused%20Via%20Malicious%20Attachments&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-14-affid-3-lukitus-copy-of-invoice-12345-invoice-html-links-f0bbbb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-14%20%3A%20Affid%3D3%2C%20%22.lukitus%22%20%3A%20%22Copy%20of%20Invoice%2012345%22%20-%20%2Finvoice.html%20links&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-14429-n-a-in-n-a-bda595</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-14429%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-downandexec-banking-malware-utilizes-cdns-in-brazil-f0bd04</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DownAndExec%3A%20Banking%20malware%20utilizes%20CDNs%20in%20Brazil&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-variants-of-agent-btz-comrat-found-the-threat-that-hit-the-pentagon-in-2008-still-evolving-by-intezer-f0bbb9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20Variants%20of%20Agent.BTZ%2FComRAT%20Found%3A%20The%20Threat%20That%20Hit%20The%20Pentagon%20In%202008%20Still%20Evolving%20by%20Intezer&amp;severity=high&amp;id=682acdbdbbaf20d303f0bbb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-12-affid-3-lukitus-your-amazon-co-uk-order-amazonsignin-html-links-f0bbb7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-12%20%3A%20Affid%3D3%2C%20%22.lukitus%22%20%3A%20%22Your%20Amazon.co.uk%20order...%22%20%2F%20AmazonSignIn.html%20links&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-11-11-affid-3-lukitus-bankwest-you-have-a-new-estatement-statement-html-links-f0bbb5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-11%2F11%20%3A%20Affid%3D3%2C%20%22.lukitus%22%20%3A%20%22Bankwest%20-%20You%20have%20a%20new%20eStatement%22%20-%20%2Fstatement.html%20links&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-09-12-your-amazon-co-uk-order-phishing-f0bbb3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-09-12%20-%20&apos;Your%20Amazon.co.uk%20order&apos;%20phishing&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-malspam-2017-09-11-email-invoice-requested-f0bbb1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Malspam%202017-09-11%20%22Email%20Invoice%20Requested%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-malspam-subject-freefax-from-d-10-f0bbaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20malspam%20Subject%20FreeFax%20From%3A%5Cd%7B10%7D&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-group-uses-facebook-cdn-to-bypass-security-solutions-f0bbad</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20Group%20Uses%20Facebook%20CDN%20to%20Bypass%20Security%20Solutions&amp;severity=low&amp;id=682acdbdbbaf20d303f0bbad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-new-locky-f0bba0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20new%20locky&amp;severity=low&amp;id=682acdbdbbaf20d303f0bba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-09-06-affid-3-voice-message-from-011234567890-name-unavailable-message-html-links-f0bb9e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-09-06%20%3A%20Affid%3D3%20%3A%20%22Voice%20Message%20from%20011234567890%20-%20name%20unavailable%22%20-%20%2Fmessage.html%20links&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-09-08-microsoft-store-e-invoice-for-your-order-f0bb9c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-09-08%20-%20&apos;Microsoft%20Store%20E-invoice%20for%20your%20order%20%23&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-09-08-emailed-invoice-html-attachment-f0bb9a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-09-08%20-%20&apos;Emailed%20Invoice%20-&apos;%20-%20.html%20attachment&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dragonfly-western-energy-sector-targeted-by-sophisticated-attack-group-f0bb90</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dragonfly%3A%20Western%20energy%20sector%20targeted%20by%20sophisticated%20attack%20group&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-synack-ransomware-sees-huge-spike-in-activity-f0bb8e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20SynAck%20Ransomware%20Sees%20Huge%20Spike%20in%20Activity&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-jimmy-nukebot-from-neutrino-with-love-f0bb81</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Jimmy%20Nukebot%3A%20from%20Neutrino%20with%20love&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-javascript-malware-hosted-on-us-government-site-which-launches-powershell-to-connect-to-c2-f0bb79</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Javascript%20malware%20hosted%20on%20US%20government%20site%20which%20launches%20powershell%20to%20connect%20to%20C2.&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malspam-pushing-locky-ransomware-tries-hoeflertext-notifications-for-chrome-and-firefox-f0bcef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malspam%20pushing%20Locky%20ransomware%20tries%20HoeflerText%20notifications%20for%20Chrome%20and%20FireFox&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-emotet-trojan-acts-as-loader-spreads-automatically-f0bb7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Emotet%20Trojan%20Acts%20as%20Loader%2C%20Spreads%20Automatically&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-09-01-new-voice-message-f0bb77</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-09-01%20-%20&apos;New%20voice%20message&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rig-exploit-kit-distributes-princess-ransomware-f0bce3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RIG%20exploit%20kit%20distributes%20Princess%20ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bce3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-active-ransomware-attack-uses-impersonation-and-embedded-advanced-threats-f0bcd6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Active%20ransomware%20attack%20uses%20impersonation%20and%20embedded%20advanced%20threats&amp;severity=low&amp;id=682acdbdbbaf20d303f0bcd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gazing-at-gazer-f0bb75</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Gazing%20at%20Gazer&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-08-28-img-f0bb71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-08-28%20&apos;IMG-&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-nuclear-btcware-ransomware-released-f0bb73</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Nuclear%20BTCWare%20Ransomware%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ukrainian-financial-institutions-targeted-by-wave-of-malicious-eps-file-attacks-f0bb5c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ukrainian%20Financial%20Institutions%20Targeted%20by%20Wave%20of%20Malicious%20EPS%20File%20Attacks&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-rat-cook-chinese-apt-actors-use-fake-game-of-thrones-leaks-as-lures-f0bb5a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20RAT%20Cook%3A%20Chinese%20APT%20actors%20use%20fake%20Game%20of%20Thrones%20leaks%20as%20lures&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-arena-crysis-ransomware-variant-released-56e2b1c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Arena%20Crysis%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=69cbc738e6bfc5ba1d160f93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-arena-crysis-ransomware-variant-released-f0bb6f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Arena%20Crysis%20Ransomware%20Variant%20Released&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-08-25-new-voice-message-f0bb58</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-08-25%20&apos;New%20voice%20message&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-wap-billing-trojan-clickers-on-rise-f0bb56</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20WAP-billing%20Trojan-Clickers%20on%20rise&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-08-24-bill-f0bb52</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-08-24%20&apos;Bill-&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-08-25-your-sage-subscription-invoice-is-ready-f0bb50</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-08-25%20&apos;Your%20Sage%20subscription%20invoice%20is%20ready&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-chrome-extensions-stealing-roblox-in-game-currency-sending-cookies-via-discord-f0bc16</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malicious%20Chrome%20Extensions%20Stealing%20Roblox%20In-Game%20Currency%2C%20Sending%20Cookies%20via%20Discord&amp;severity=low&amp;id=682acdbdbbaf20d303f0bc16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-multi-platform-malware-adware-spreading-via-facebook-messenger-f0bb92</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20New%20multi%20platform%20malware%2Fadware%20spreading%20via%20Facebook%20Messenger&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-votiro-labs-exposed-a-new-hacking-campaign-targeting-vietnamese-organisations-using-weaponized-word-documents-f0bb94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Votiro%20Labs%20exposed%20a%20new%20hacking%20campaign%20targeting%20Vietnamese%20organisations%20using%20weaponized%20Word%20documents&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-uncovered-by-eset-researchers-aimed-at-gamers-f0bb3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20uncovered%20by%20ESET%20researchers%20aimed%20at%20gamers&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cryptocurrency-miner-uses-wmi-and-eternalblue-to-spread-filelessly-f0bb96</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cryptocurrency%20Miner%20Uses%20WMI%20and%20EternalBlue%20To%20Spread%20Filelessly&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-emotet-new-high-volume-spam-campaign-has-links-pointing-to-malicious-documents-that-download-banking-trojan-f0bb3d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Emotet%2C%20New%20high-volume%20spam%20campaign%20has%20links%20pointing%20to%20malicious%20documents%20that%20download%20banking%20Trojan&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-enginebox-malware-supports-10-brazilian-banks-f0bb39</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20EngineBox%20Malware%20Supports%2010%2B%20Brazilian%20Banks&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-chessmaster-makes-its-move-a-look-into-the-campaign-s-cyberespionage-arsenal-f0bf74</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ChessMaster%20Makes%20its%20Move%3A%20A%20Look%20into%20the%20Campaign%C3%A2%E2%82%AC%E2%84%A2s%20Cyberespionage%20Arsenal&amp;severity=low&amp;id=682acdbdbbaf20d303f0bf74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turla-apt-actor-refreshes-kopiluwak-javascript-backdoor-for-use-in-g20-themed-attack-f0bb3b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turla%20APT%20actor%20refreshes%20KopiLuwak%20JavaScript%20backdoor%20for%20use%20in%20G20-themed%20attack&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-booters-with-chinese-characteristics-the-rise-of-chinese-online-ddos-platforms-f0bb98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Booters%20with%20Chinese%20Characteristics%3A%20The%20Rise%20of%20Chinese%20Online%20DDoS%20Platforms&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shadowpad-popular-server-management-software-hit-in-supply-chain-attack-f0bb7d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ShadowPad%20%3A%20%20popular%20server%20management%20software%20hit%20in%20supply%20chain%20attack&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shadowpad-in-corporate-networks-f0bb37</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ShadowPad%20in%20corporate%20networks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-curious-case-of-notepad-and-chthonic-exposing-a-malicious-infrastructure-f0bb35</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Curious%20Case%20of%20Notepad%20and%20Chthonic%3A%20Exposing%20a%20Malicious%20Infrastructure&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actor-goes-on-a-chrome-extension-hijacking-spree-f0bb7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20actor%20goes%20on%20a%20Chrome%20extension%20hijacking%20spree&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-blockbuster-saga-continues-f0bb33</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Blockbuster%20Saga%20Continues&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fake-snapchat-in-google-play-store-f0bb31</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Fake%20Snapchat%20in%20Google%20Play%20Store&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt28-targets-hospitality-sector-presents-threat-to-travelers-f0bb24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20APT28%20Targets%20Hospitality%20Sector%2C%20Presents%20Threat%20to%20Travelers&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-9633-cwe-119-in-continental-ag-infineon-s-gold-2-pmb-8876-bda629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-9633%3A%20CWE-119%20in%20Continental%20AG%20Infineon%20S-Gold%202%20(PMB%208876)&amp;severity=high&amp;id=682d981cc4522896dcbda629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tale-of-the-two-payloads-trickbot-and-nitol-f0bb22</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Tale%20of%20the%20Two%20Payloads%20%C3%A2%E2%82%AC%E2%80%9C%20TrickBot%20and%20Nitol&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-look-at-js-powmet-a-completely-fileless-malware-f0bb1e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20Look%20at%20JS_POWMET%2C%20a%20Completely%20Fileless%20Malware&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-2285-cross-site-scripting-in-silkypress-simple-custom-css-and-js-bda625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-2285%3A%20Cross-site%20scripting%20in%20SilkyPress%20Simple%20Custom%20CSS%20and%20JS&amp;severity=medium&amp;id=682d981cc4522896dcbda625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fin7-carbanak-threat-actor-unleashes-bateleur-jscript-backdoor-f0bb1c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FIN7%2FCarbanak%20threat%20actor%20unleashes%20Bateleur%20JScript%20backdoor&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-real-news-fake-flash-mac-os-x-users-targeted-f0bb1a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Real%20News%2C%20Fake%20Flash%3A%20Mac%20OS%20X%20Users%20Targeted&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-new-era-in-mobile-banking-trojans-f0bb18</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20new%20era%20in%20mobile%20banking%20Trojans&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-twoface-webshell-persistent-access-point-for-lateral-movement-f0bb20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TwoFace%20Webshell%3A%20Persistent%20Access%20Point%20for%20Lateral%20Movement&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cowersnail-from-the-creators-of-sambacry-f0bb16</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CowerSnail%2C%20from%20the%20creators%20of%20SambaCry&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-version-of-trickbot-adds-worm-propagation-module-f0bb54</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Version%20of%20%C3%A2%E2%82%AC%C5%93Trickbot%C3%A2%E2%82%AC%C2%9D%20Adds%20Worm%20Propagation%20Module&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ursnif-variant-found-using-mouse-movement-for-decryption-and-evasion-f0bb5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ursnif%20variant%20found%20using%20mouse%20movement%20for%20decryption%20and%20evasion&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/finding-nemo-hosts-from-sofacy-by-threatconnect-f0bd25</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Finding%20Nemo(hosts)%20from%20Sofacy%20by%20ThreatConnect&amp;severity=high&amp;id=682acdbdbbaf20d303f0bd25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-linux-bew-un-backdoor-para-el-minado-de-bitcoin-f0bb14</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Linux.Bew%3A%20un%20backdoor%20para%20el%20minado%20de%20Bitcoin&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rurktar-spyware-under-construction-f0bb12</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Rurktar%20-%20Spyware%20under%20Construction&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-zayka-and-noob-cryptomix-ransomware-variants-released-in-quick-succession-f0bb60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20ZAYKA%20and%20NOOB%20CryptoMix%20Ransomware%20Variants%20Released%20in%20Quick%20Succession&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-unravelling-net-with-the-help-of-windbg-f0bb03</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Unravelling%20.NET%20with%20the%20Help%20of%20WinDBG&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-recent-winnti-infrastructure-and-samples-f0bb01</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Recent%20Winnti%20Infrastructure%20and%20Samples&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-spotlight-is-fireball-adware-or-malware-f0bb43</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Spotlight%3A%20Is%20Fireball%20Adware%20or%20Malware%3F&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-reyptson-ransomware-spams-your-friends-by-stealing-thunderbird-contacts-f0bb62</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Reyptson%20Ransomware%20Spams%20Your%20Friends%20by%20Stealing%20Thunderbird%20Contacts&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-lloyds-bank-f0bafd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20%23trickbot%20Lloyds%20Bank&amp;severity=low&amp;id=682acdbdbbaf20d303f0bafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-encrypted-docx-campaign-f0bafb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Encrypted%20Docx%20Campaign&amp;severity=low&amp;id=682acdbdbbaf20d303f0bafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-meet-ovidiy-stealer-bringing-credential-theft-to-the-masses-f0bb41</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Meet%20Ovidiy%20Stealer%3A%20Bringing%20credential%20theft%20to%20the%20masses&amp;severity=low&amp;id=682acdbdbbaf20d303f0bb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lockpos-joins-the-flock-f0baf9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LockPoS%20Joins%20the%20Flock&amp;severity=low&amp;id=682acdbdbbaf20d303f0baf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-9844-n-a-in-n-a-becc35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-9844%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbecc35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/hackshit-phishing-as-a-service-f0baff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=HackShit%20phishing%20as%20a%20service&amp;severity=low&amp;id=682acdbdbbaf20d303f0baff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-spam-campaign-delivers-cross-platform-remote-access-trojan-adwind-f0baf7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Spam%20Campaign%20Delivers%20Cross-platform%20Remote%20Access%20Trojan%20Adwind&amp;severity=low&amp;id=682acdbdbbaf20d303f0baf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-spydealer-android-trojan-spying-on-more-than-40-apps-f0baf5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20SpyDealer%3A%20Android%20Trojan%20Spying%20on%20More%20Than%2040%20Apps&amp;severity=low&amp;id=682acdbdbbaf20d303f0baf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-konni-campaign-references-north-korean-missile-capabilities-f0baf3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20KONNI%20Campaign%20References%20North%20Korean%20Missile%20Capabilities&amp;severity=low&amp;id=682acdbdbbaf20d303f0baf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-telebots-cunning-backdoor-f0bae6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Analysis%20of%20TeleBots%C3%A2%E2%82%AC%E2%84%A2%20cunning%20backdoor&amp;severity=low&amp;id=682acdbdbbaf20d303f0bae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-medoc-connection-f0bae4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20MeDoc%20Connection&amp;severity=low&amp;id=682acdbdbbaf20d303f0bae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-variant-of-petya-ransomware-spreading-like-wildfire-f0bae2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Variant%20of%20Petya%20Ransomware%20Spreading%20Like%20Wildfire&amp;severity=low&amp;id=682acdbdbbaf20d303f0bae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-d-j-vu-petya-ransomware-appears-with-smb-propagation-capabilities-f0bae0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20D%C3%83%C2%A9j%C3%83%C2%A0%20vu%3A%20Petya%20ransomware%20appears%20with%20SMB%20propagation%20capabilities&amp;severity=low&amp;id=682acdbdbbaf20d303f0bae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-06-27-mac1-facture-654321-abonneau-654321-docm-f0bade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-06-27%20%3A%20mac1%20%3A%20%22facture%20654321%22%20-%20%22abonneau_654321.docm%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-06-26-affid-3-12-invoice-3456-001-4321-zip-f0badc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-06-26%20%3A%20Affid%3D3%20%3A%20%2212_Invoice_3456%22%20-%20%22001_4321.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0badc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-emailing-jpg-zip-wsf-f0bada</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Emailing%3A%20%23%23%23%23%23%23%23%23.jpg%20zip%7Cwsf&amp;severity=low&amp;id=682acdbdbbaf20d303f0bada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-el-machete-s-malware-attacks-cut-through-latam-f0bad8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20El%20Machete&apos;s%20Malware%20Attacks%20Cut%20Through%20LATAM&amp;severity=low&amp;id=682acdbdbbaf20d303f0bad8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-following-the-trail-of-blacktech-s-cyber-espionage-campaigns-by-trendmicro-f0bad6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Following%20the%20Trail%20of%20BlackTech%C3%A2%E2%82%AC%E2%84%A2s%20Cyber%20Espionage%20Campaigns%20by%20TrendMicro&amp;severity=high&amp;id=682acdbdbbaf20d303f0bad6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-phishing-urls-f0bad4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20phishing%20URLs&amp;severity=low&amp;id=682acdbdbbaf20d303f0bad4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-locky-2017-06-21-affid-3-copy-of-invoice-87654321-87654321-zip-f0bac7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Locky%202017-06-21%20%3A%20Affid%3D3%20%3A%20%22Copy%20of%20Invoice%2087654321%22%20-%20%2287654321.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-facture-via-zip-wsf-f0bac5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20%23trickbot%20Facture%20%23%23%23%20via%20.zip%2F.WSF&amp;severity=low&amp;id=682acdbdbbaf20d303f0bac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2017-06-21-job-application-f0bac3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202017-06-21%20&apos;Job%20Application&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0bac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mcafee-discovers-pinkslipbot-exploiting-infected-machines-as-control-servers-releases-free-tool-to-detect-disable-trojan-f0bac1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20McAfee%20Discovers%20Pinkslipbot%20Exploiting%20Infected%20Machines%20as%20Control%20Servers%3B%20Releases%20Free%20Tool%20to%20Detect%2C%20Disable%20Trojan&amp;severity=low&amp;id=682acdbdbbaf20d303f0bac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-lokibot-goes-with-swift-theme-f0babf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20%23LokiBot%20goes%20%20with%20SWIFT%20theme&amp;severity=low&amp;id=682acdbdbbaf20d303f0babf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-jaff-2017-06-14-emailing-123456789-123456789-zip-f0babd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Jaff%202017-06-14%20%3A%20%22Emailing%3A%20123456789%22%20-%20%22123456789.ZIP%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0babd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-06-14-mac1-emailing-123456789-123456789-pdf-f0babb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-06-14%20%3A%20mac1%20%3A%20%22Emailing%3A%20123456789%22%20-%20%22123456789.PDF%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0babb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phantom-of-the-opaera-new-kasperagent-malware-campaign-by-threatconnect-f0bd2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Phantom%20of%20the%20Opaera%3A%20New%20KASPERAGENT%20Malware%20Campaign%20by%20ThreatConnect&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bd2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-4596-na-in-na-d8fe0a40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-4596%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6839ce93182aa0cae2b5b18a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-jaff-2017-06-13-invoice-pis1234567-zip-f0bab9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Jaff%202017-06-13%20%3A%20%22Invoice%20PIS1234567.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-06-12-mac1-facture-n-1234-du-12-06-2017-facture-1234-zip-f0bab7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-06-12%20%3A%20mac1%20%3A%20Facture%20N%201234%20du%2012%2F06%2F2017%20-%20%22FACTURE_1234.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0bab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-macransom-offered-as-ransomware-as-a-service-f0bab5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20MacRansom%3A%20Offered%20as%20Ransomware%20as%20a%20Service&amp;severity=low&amp;id=682acdbdbbaf20d303f0bab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dvmap-the-first-android-malware-with-code-injection-f0baa8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dvmap%3A%20the%20first%20Android%20malware%20with%20code%20injection&amp;severity=low&amp;id=682acdbdbbaf20d303f0baa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fireball-the-chinese-malware-of-250-million-computers-infected-f0baa6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FIREBALL%20%C3%A2%E2%82%AC%E2%80%9C%20The%20Chinese%20Malware%20of%20250%20Million%20Computers%20Infected&amp;severity=low&amp;id=682acdbdbbaf20d303f0baa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-06-09-mac1-facture-aa-123-rr-copy-credit-note-1234567-zip-f0baa4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-06-09%20%3A%20mac1%20%3A%20%22Facture%20AA-123-RR%22%20%2F%20%22Copy%20Credit%20Note%22%20-%20%221234567.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0baa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-jaff-2017-06-09-missing-subject-img-1234-zip-doc-1234-docm-f0baa2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Jaff%202017-06-09%20%3A%20missing%20subject%20-%20%22IMG_1234.ZIP%22%20%2F%20%22DOC_1234.docm%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0baa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-dridex-2017-06-05-botnet-7200-invoice-a4-inv-crd-12345-pdf-f0baa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Dridex%202017-06-05%20%3A%20botnet%207200%20-%20%22Invoice%22%20-%20%22A4%20Inv_Crd%2012345.pdf%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0baa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-jaff-2017-06-06-order-mx-2310u-20170606-123456-pdf-f0ba9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Jaff%202017-06-06%20%3A%20%22Order%22%20-%20%22MX-2310U_20170606_123456.pdf%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-password-protected-docs-2017-06-07-john-c-doe-ab1-c23def4lg56hi-78j-docx-f0ba9c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Password-protected%20docs%202017-06-07%20%3A%20%22John%20C%20Doe%22%20-%20%22ab1_c23def4lg56hi%2378j.docx%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-trickbot-2017-06-07-mac1-12-invoice-3456-001-4321-pdf-f0ba9a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Trickbot%202017-06-07%20%3A%20%22mac1%22%20%3A%20%2212_Invoice_3456%22%20-%20%22001_4321.pdf%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-recorded-future-blog-malicious-android-applications-raise-concerns-for-enterprises-f0ba98</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20The%20Recorded%20Future%20Blog%20Malicious%20Android%20Applications%20Raise%20Concerns%20for%20Enterprises&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/stantinko-investigation-f0bb05</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Stantinko%20investigation&amp;severity=high&amp;id=682acdbdbbaf20d303f0bb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-zusy-powerpoint-malware-spreads-without-needing-macros-f0ba89</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%C3%A2%E2%82%AC%C5%93Zusy%C3%A2%E2%82%AC%C2%9D%20PowerPoint%20Malware%20Spreads%20Without%20Needing%20Macros&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shadowfall-f0ba96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Shadowfall&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actors-leverage-eternalblue-exploit-to-deliver-non-wannacry-payloads-f0ba87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20actors%20leverage%20EternalBlue%20exploit%20to%20deliver%20non-WannaCry%20payloads&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-jaff-2017-06-02-invoice-inv-1234-invoice-inv-1234-pdf-f0ba85</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Jaff%202017-06-02%20%3A%20%22Invoice%20INV-1234%22%20-%20%22Invoice%20INV-1234.pdf%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/m2m-malspam-62909008-pdf-f0ba83</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=M2M%20-%20%20Malspam%20--%3E%2062909008.pdf&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaff-2017-05-26-scanned-image-from-a-xerox-workcentre-scan-0012-123456789-zip-f0ba81</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaff%202017-05-26%20%3A%20%22Scanned%20Image%20from%20a%20Xerox%20WorkCentre%22%20-%20%22Scan_0012_123456789.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-emotet-v4-f0ba7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Analysis%20of%20Emotet%20v4&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaff-2017-05-25-payment-receipt-1234-1234-pdf-f0ba7d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaff%202017-05-25%20%3A%20%22Payment%20Receipt%201234%22%20-%20%221234.pdf%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tainted-leaks-disinformation-and-phishing-with-a-russian-nexus-f0ba7b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Tainted%20Leaks%3A%20Disinformation%20and%20Phishing%20With%20a%20Russian%20Nexus&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/jaff-2017-05-22-copy-of-invoice-12345678-12345678-pdf-f0ba79</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Jaff%202017-05-22%20%3A%20%22Copy%20of%20Invoice%2012345678%22%20%2F%20%2212345678.PDF%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-smb-worm-uses-seven-nsa-hacking-tools-wannacry-used-just-two-f0ba77</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20SMB%20Worm%20Uses%20Seven%20NSA%20Hacking%20Tools.%20WannaCry%20Used%20Just%20Two&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-will-astrum-fill-the-vacuum-in-the-exploit-kit-landscape-f0ba6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Will%20Astrum%20Fill%20the%20Vacuum%20in%20the%20Exploit%20Kit%20Landscape%3F&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-loki-variant-being-spread-via-pdf-file-f0ba68</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Loki%20Variant%20Being%20Spread%20via%20PDF%20File&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-uiwix-ransomware-using-eternalblue-smb-exploit-to-infect-victims-f0ba66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Uiwix%20Ransomware%20Using%20EternalBlue%20SMB%20Exploit%20To%20Infect%20Victims&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/invoice-05-17-2017-from-dontreply-random-f0ba64</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Invoice%20%23%23%23%23%23%23%2005%2F17%2F2017%20from%20dontreply%40random&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2017-05-16-malspam-emailingpdfpdf-0132edd1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2017-05-16%20Malspam%20Emailing%3A%23%23%23%23%23.pdf.pdf&amp;severity=low&amp;id=686680ff6f40f0eb72968329</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2017-05-16-malspam-emailing-pdf-pdf-f0ba62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2017-05-16%20Malspam%20Emailing%3A%23%23%23%23%23.pdf.pdf&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/2017-05-15-malspam-00-invoice-pdf-f0ba60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=2017-05-15%20Malspam%20%2000_Invoice_%23%23%23.PDF&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-jaff-ransomware-player-2-has-entered-the-game-f0ba5e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Jaff%20Ransomware%3A%20Player%202%20Has%20Entered%20The%20Game&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-neo23x0-yara-rule-set-and-sigma-rule-set-wannacry-f0ba5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Neo23x0%20Yara%20Rule%20Set%20and%20Sigma%20Rule%20Set%20-%20WannaCry&amp;severity=medium&amp;id=682acdbdbbaf20d303f0ba5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-alert-ta17-132a-indicators-associated-with-wannacry-ransomware-f0ba5a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Alert%20(TA17-132A)%20Indicators%20Associated%20With%20WannaCry%20Ransomware&amp;severity=medium&amp;id=682acdbdbbaf20d303f0ba5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-player-3-has-entered-the-game-say-hello-to-wannacry-f0ba58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Player%203%20Has%20Entered%20the%20Game%3A%20Say%20Hello%20to%20&apos;WannaCry&apos;&amp;severity=medium&amp;id=682acdbdbbaf20d303f0ba58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-massive-outbreak-of-ransomware-variant-infects-large-amounts-of-computers-around-the-world-f0ba4b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Massive%20outbreak%20of%20ransomware%20variant%20infects%20large%20amounts%20of%20computers%20around%20the%20world&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-spreading-through-smb-attacking-multiple-companies-f0ba49</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20spreading%20through%20SMB%20attacking%20multiple%20companies&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-practice-makes-perfect-nemucod-evolves-delivery-and-obfuscation-techniques-to-harvest-credentials-f0ba47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Practice%20Makes%20Perfect%3A%20Nemucod%20Evolves%20Delivery%20and%20Obfuscation%20Techniques%20to%20Harvest%20Credentials&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/password-protected-docs-2017-05-10-ursnif-2002-payment-confirmation-ab1-c23def4lg56hi-78j-docx-f0ba45</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Password-protected%20docs%202017-05-10%20%3A%20Ursnif%202002%20-%20%22payment%20confirmation.ab1_c23def4lg56hi%2378j.docx%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-persirai-new-internet-of-things-iot-botnet-targets-ip-cameras-f0bedd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Persirai%3A%20New%20Internet%20of%20Things%20(IoT)%20Botnet%20Targets%20IP%20Cameras&amp;severity=low&amp;id=682acdbdbbaf20d303f0bedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-eps-processing-zero-days-exploited-by-multiple-threat-actors-f0ba43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20EPS%20Processing%20Zero-Days%20Exploited%20by%20Multiple%20Threat%20Actors&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-windows-defender-atp-thwarts-operation-wilysupply-software-supply-chain-cyberattack-f0ba41</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Windows%20Defender%20ATP%20thwarts%20Operation%20WilySupply%20software%20supply%20chain%20cyberattack&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-mole-exposing-itself-to-sunlight-snake-coming-soon-in-mac-os-x-flavour-f0ba3f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20Mole%20exposing%20itself%20to%20sunlight%20Snake%3A%20Coming%20soon%20in%20Mac%20OS%20X%20flavour&amp;severity=medium&amp;id=682acdbdbbaf20d303f0ba3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-osx-malware-is-catching-up-and-it-wants-to-read-your-https-traffic-f0ba3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20OSX%20Malware%20is%20Catching%20Up%2C%20and%20it%20wants%20to%20Read%20Your%20HTTPS%20Traffic&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-use-of-dns-tunneling-for-c-c-communications-f0ba3d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Use%20of%20DNS%20Tunneling%20for%20C%26C%20Communications&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-alert-ta17-117a-intrusions-affecting-multiple-victims-across-multiple-sectors-f0ba39</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Alert%20(TA17-117A)%20Intrusions%20Affecting%20Multiple%20Victims%20Across%20Multiple%20Sectors&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-similarities-between-carbanak-and-fin7-malware-suggest-actors-are-closely-related-f0ba2c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Similarities%20Between%20Carbanak%20and%20FIN7%20Malware%20Suggest%20Actors%20Are%20Closely%20Related&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-3066-code-injection-in-adobe-coldfusion-c-26e09a4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-3066%3A%20Code%20Injection%20in%20Adobe%20ColdFusion%20ColdFusion%202016%20Update%203%20and%20earlier%2C%20ColdFusion%2011%20update%2011%20and%20earlier%2C%20ColdFusion%2010%20Update%2022%20and%20earlier&amp;severity=critical&amp;id=68443c7f71f4d251b50d0072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-2017-04-11-botnet-7200-7500-campaigns-f0ba2a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%202017-04-11%20%3A%20botnet%207200%2F7500%20campaigns&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-flexspy-application-analysis-f0ba24</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FlexSpy%20Application%20Analysis&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-spotlight-mighty-morphin-malware-purveyors-locky-returns-via-necurs-f0ba28</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Spotlight%3A%20Mighty%20Morphin%20Malware%20Purveyors%3A%20Locky%20Returns%20Via%20Necurs&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cardinal-rat-active-for-over-two-years-f0ba26</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cardinal%20RAT%20Active%20for%20Over%20Two%20Years&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-callisto-group-f0ba22</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Callisto%20Group&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cve-2017-0199-in-the-wild-attacks-leveraging-hta-handler-f0ba20</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CVE-2017-0199%3A%20In%20the%20Wild%20Attacks%20Leveraging%20HTA%20Handler&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ewind-adware-in-applications-clothing-f0ba1e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ewind%20%C3%A2%E2%82%AC%E2%80%9C%20Adware%20in%20Applications%C3%A2%E2%82%AC%E2%84%A2%20Clothing&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-unraveling-the-lamberts-toolkit-an-overview-of-a-color-coded-multi-stage-arsenal-f0ba1c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Unraveling%20the%20Lamberts%20Toolkit%20An%20Overview%20of%20a%20Color-coded%20Multi-Stage%20Arsenal&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-malware-in-brazilian-bank-attack-reveals-prolonged-campaign-f0ba0d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Analysis%20of%20Malware%20in%20Brazilian%20Bank%20Attack%20Reveals%20Prolonged%20Campaign&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-blockbuster-sequel-f0ba0b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Blockbuster%20Sequel&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-matrix-ransomware-spreads-to-other-pcs-using-malicious-shortcuts-f0ba1a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Matrix%20Ransomware%20Spreads%20to%20Other%20PCs%20Using%20Malicious%20Shortcuts&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lmaoxus-ransomware-another-case-of-weaponized-open-source-ransomware-f0ba03</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LMAOxUS%20Ransomware%3A%20Another%20Case%20of%20Weaponized%20Open%20Source%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-targeted-attacks-in-the-middle-east-using-kasperagent-and-micropsia-f0ba09</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Targeted%20Attacks%20in%20the%20Middle%20East%20Using%20KASPERAGENT%20and%20MICROPSIA&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-off-the-shelf-ransomware-used-to-target-the-healthcare-sector-f0ba07</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Off-the-shelf%20Ransomware%20Used%20to%20Target%20the%20Healthcare%20Sector&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-high-volume-dridex-campaigns-return-first-to-hit-millions-since-june-2016-f0ba05</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20High-Volume%20Dridex%20Campaigns%20Return%2C%20First%20to%20Hit%20Millions%20Since%20June%202016&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-an-investigation-of-chrysaor-malware-on-android-f0ba01</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20An%20Investigation%20of%20Chrysaor%20Malware%20on%20Android&amp;severity=low&amp;id=682acdbdbbaf20d303f0ba01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-part-i-russian-apt-apt28-collection-of-samples-including-osx-xagent-f0b9ff</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Part%20I.%20Russian%20APT%20-%20APT28%20collection%20of%20samples%20including%20OSX%20XAgent&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b9ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-websites-compromised-in-decimal-ip-campaign-f0b9fd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Websites%20compromised%20in%20%C3%A2%E2%82%AC%CB%9CDecimal%20IP%C3%A2%E2%82%AC%E2%84%A2%20campaign&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trochilus-and-new-moonwind-rats-used-in-attack-against-thai-organizations-f0b9fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Trochilus%20and%20New%20MoonWind%20RATs%20Used%20In%20Attack%20Against%20Thai%20Organizations&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-carbon-paper-peering-into-turla-s-second-stage-backdoor-f0b9ee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Carbon%20Paper%3A%20Peering%20into%20Turla%C3%A2%E2%82%AC%E2%84%A2s%20second%20stage%20backdoor&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trojanized-adobe-installer-used-to-install-dragonok-s-new-custom-backdoor-f0b9ec</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Trojanized%20Adobe%20Installer%20used%20to%20Install%20DragonOK%C3%A2%E2%82%AC%E2%84%A2s%20New%20Custom%20Backdoor&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dimnie-hiding-in-plain-sight-f0b9ea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dimnie%3A%20Hiding%20in%20Plain%20Sight&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt29-domain-fronting-with-tor-f0b9e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20APT29%20Domain%20Fronting%20With%20TOR&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shamoon-2-delivering-disttrack-f0b9e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Shamoon%202%3A%20Delivering%20Disttrack&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nasty-adware-hiding-in-apps-on-google-play-store-f0b9e4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Nasty%20adware%20hiding%20in%20apps%20on%20Google%20Play%20Store&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-targeted-attack-against-saudi-arabia-government-f0b9e2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20targeted%20attack%20against%20Saudi%20Arabia%20Government&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-how-malformed-rtf-defeats-security-engines-f0b9e0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20How%20Malformed%20RTF%20Defeats%20Security%20Engines&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hunt-case-study-hunting-campaign-indicators-on-privacy-protected-attack-infrastructure-f0b9de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Hunt%20Case%20Study%3A%20Hunting%20Campaign%20Indicators%20on%20Privacy%20Protected%20Attack%20Infrastructure&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-winnti-abuses-github-for-c-c-communications-f0b9dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Winnti%20Abuses%20GitHub%20for%20C%26C%20Communications&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b9dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-petrwrap-the-new-petya-based-ransomware-used-in-targeted-attacks-f0b9cf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PetrWrap%3A%20the%20new%20Petya-based%20ransomware%20used%20in%20targeted%20attacks&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/star-trek-themed-kirk-ransomware-brings-us-monero-and-a-spock-decryptor-f0b9cb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Star%20Trek%20Themed%20Kirk%20Ransomware%20Brings%20us%20Monero%20and%20a%20Spock%20Decryptor!&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/tech-support-scam-synchs-alerts-with-app-crashes-in-windows-event-logs-f0b9c9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Tech%20Support%20Scam%20Synchs%20Alerts%20with%20App%20Crashes%20in%20Windows%20Event%20Logs&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/revenge-ransomware-a-cryptomix-variant-being-distributed-by-rig-exploit-kit-f0b9c7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Revenge%20Ransomware%2C%20a%20CryptoMix%20Variant%2C%20Being%20Distributed%20by%20RIG%20Exploit%20Kit&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-linux-malware-exploits-cgi-vulnerability-f0b9c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Linux%20Malware%20Exploits%20CGI%20Vulnerability&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-preinstalled-malware-targeting-mobile-users-f0b9c3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Preinstalled%20Malware%20Targeting%20Mobile%20Users&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pulling-back-the-curtains-on-encodedcommand-powershell-attacks-f0b9c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Pulling%20Back%20the%20Curtains%20on%20EncodedCommand%20PowerShell%20Attacks&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-wikileaks-vault7-jqjsnicker-code-leak-f0b9bf</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Wikileaks%20Vault7%20JQJSNICKER%20code%20leak&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b9bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rawpos-malware-rides-again-f0b9cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RawPOS%20Malware%20Rides%20Again&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-crypt0l0cker-torrentlocker-old-dog-new-tricks-f0b9bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Crypt0l0cker%20(TorrentLocker)%3A%20Old%20Dog%2C%20New%20Tricks&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-6511-n-a-in-n-a-bdae13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-6511%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d981dc4522896dcbdae13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-update-on-the-fancy-bear-android-malware-poprd30-apk-f0b9b0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Update%20on%20the%20Fancy%20Bear%20Android%20malware%20(poprd30.apk)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-covert-channels-and-poor-decisions-the-tale-of-dnsmessenger-f0b9ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Covert%20Channels%20and%20Poor%20Decisions%3A%20The%20Tale%20of%20DNSMessenger&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-google-play-apps-infected-with-malicious-iframes-f0b9ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Google%20Play%20Apps%20Infected%20with%20Malicious%20IFrames&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-leveraging-powersploit-f0b9aa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20Leveraging%20PowerSploit&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-android-malware-on-the-rise-f0b9a8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Android%20malware%20on%20the%20rise&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-gamaredon-group-toolset-evolution-f0b9a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Gamaredon%20Group%20Toolset%20Evolution&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sinkholes-servers-with-http-header-server-malware-sinkhole-f0b9a4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Sinkholes%20servers%20with%20http%20header%20Server%3A%20malware-sinkhole&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-additional-insights-on-shamoon2-f0b9a2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Additional%20Insights%20on%20Shamoon2&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-rise-of-dridex-and-the-role-of-esps-f0b9a0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Rise%20of%20Dridex%20and%20the%20Role%20of%20ESPs&amp;severity=low&amp;id=682acdbdbbaf20d303f0b9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lazarus-false-flag-malware-f0b99e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LAZARUS%C3%A2%E2%82%AC%E2%84%A2%20FALSE%20FLAG%20MALWARE&amp;severity=low&amp;id=682acdbdbbaf20d303f0b99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-demystifying-targeted-malware-used-against-polish-banks-f0b991</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Demystifying%20targeted%20malware%20used%20against%20Polish%20banks&amp;severity=low&amp;id=682acdbdbbaf20d303f0b991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-menupass-returns-with-new-malware-and-new-attacks-against-japanese-academics-and-organizations-f0b98f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20menuPass%20Returns%20with%20New%20Malware%20and%20New%20Attacks%20Against%20Japanese%20Academics%20and%20Organizations&amp;severity=low&amp;id=682acdbdbbaf20d303f0b98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-who-ran-leakedsource-com-f0b98d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Who%20Ran%20Leakedsource.com%3F&amp;severity=low&amp;id=682acdbdbbaf20d303f0b98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fileless-attacks-against-enterprise-networks-f0b98b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Fileless%20attacks%20against%20enterprise%20networks&amp;severity=low&amp;id=682acdbdbbaf20d303f0b98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-attackers-target-dozens-of-global-banks-with-new-malware-f0b989</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Attackers%20target%20dozens%20of%20global%20banks%20with%20new%20malware&amp;severity=low&amp;id=682acdbdbbaf20d303f0b989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shell-crew-variants-continue-to-fly-under-big-av-s-radar-f0b987</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Shell%20Crew%20Variants%20Continue%20to%20Fly%20Under%20Big%20AV%C3%A2%E2%82%AC%E2%84%A2s%20Radar&amp;severity=low&amp;id=682acdbdbbaf20d303f0b987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trojan-mirai-1-for-microsoft-windows-f0b983</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Trojan.Mirai.1%20for%20Microsoft%20Windows&amp;severity=low&amp;id=682acdbdbbaf20d303f0b983</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2016-2781-na-in-na-90cf50e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2016-2781%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5c1b0bd07c3938d4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/erebus-ransomware-utilizes-a-uac-bypass-and-request-a-90-ransom-payment-f0b985</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Erebus%20Ransomware%20Utilizes%20a%20UAC%20Bypass%20and%20Request%20a%20%2490%20Ransom%20Payment&amp;severity=low&amp;id=682acdbdbbaf20d303f0b985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-curious-case-of-a-reconnaissance-campaign-targeting-ministry-and-embassy-sites-f0b981</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Curious%20Case%20of%20a%20Reconnaissance%20Campaign%20Targeting%20Ministry%20and%20Embassy%20Sites&amp;severity=low&amp;id=682acdbdbbaf20d303f0b981</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-when-a-pony-walks-out-of-a-pub-f0b97f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20When%20A%20Pony%20Walks%20Out%20Of%20A%20Pub&amp;severity=low&amp;id=682acdbdbbaf20d303f0b97f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ikittens-iranian-actor-resurfaces-with-malware-for-mac-macdownloader-f0b972</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ikittens%3A%20iranian%20actor%20resurfaces%20with%20malware%20for%20mac%20(macdownloader)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-from-rtf-to-cobalt-strike-passing-via-flash-f0b970</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20From%20RTF%20to%20Cobalt%20Strike%20passing%20via%20Flash&amp;severity=low&amp;id=682acdbdbbaf20d303f0b970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-doctor-web-detects-several-thousand-infected-linux-devices-linux-proxy-10-f0b96e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Doctor%20Web%20detects%20several%20thousand%20infected%20Linux%20devices%20%20Linux.Proxy.10&amp;severity=low&amp;id=682acdbdbbaf20d303f0b96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt28-malicious-nato-document-f0bdce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20APT28%20malicious%20NATO%20document&amp;severity=low&amp;id=682acdbdbbaf20d303f0bdce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-oops-they-did-it-again-apt-targets-russia-and-belarus-with-zerot-and-plugx-f0b96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20-%20Oops%2C%20they%20did%20it%20again%3A%20APT%20Targets%20Russia%20and%20Belarus%20with%20ZeroT%20and%20PlugX&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-windows-smbv3-denial-of-service-proof-of-concept-0-day-exploit-f0b96a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Windows%20SMBv3%20Denial%20of%20Service%20Proof%20of%20Concept%20(0%20Day%20Exploit)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-software-targeting-financial-sector-internals-f0b968</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%3A%20Malicious%20software%20targeting%20financial%20sector%20internals&amp;severity=high&amp;id=682acdbdbbaf20d303f0b968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nile-phish-large-scale-phishing-campaign-targeting-egyptian-civil-society-f0b966</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Nile%20Phish%3A%20Large-Scale%20Phishing%20Campaign%20Targeting%20Egyptian%20Civil%20Society&amp;severity=low&amp;id=682acdbdbbaf20d303f0b966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-downeks-and-quasar-rat-used-in-recent-targeted-attacks-against-governments-f0b964</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Downeks%20and%20Quasar%20RAT%20Used%20in%20Recent%20Targeted%20Attacks%20Against%20Governments&amp;severity=low&amp;id=682acdbdbbaf20d303f0b964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-flokibot-invades-pos-trouble-in-brazil-f0b962</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Flokibot%20Invades%20PoS%3A%20Trouble%20in%20Brazil&amp;severity=low&amp;id=682acdbdbbaf20d303f0b962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-saga-2-0-sage-2-0-comes-with-ip-generation-algorithm-ipga-f0b960</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Saga%202.0%20(Sage%202.0)%20comes%20with%20IP%20Generation%20Algorithm%20(IPGA)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b960</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ocjp-133-hancitor-wordpress-f0b953</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%23OCJP-133%3A%20Hancitor%C3%A3%C6%92%C5%BE%C3%A3%C6%92%C2%AB%C3%A3%E2%80%9A%C2%A6%C3%A3%E2%80%9A%C2%A7%C3%A3%E2%80%9A%C2%A2%C3%A6%E2%80%9E%C5%B8%C3%A6%C5%B8%E2%80%9C%20%C3%A3%C2%81%C2%A8%20%C3%A3%C6%92%C2%8F%C3%A3%C6%92%C6%92%C3%A3%E2%80%9A%C2%AD%C3%A3%C6%92%C2%B3%C3%A3%E2%80%9A%C2%B0%C3%A3%C2%81%E2%80%A2%C3%A3%E2%80%9A%C5%92%C3%A3%C2%81%C5%B8Wordpress&amp;severity=low&amp;id=682acdbdbbaf20d303f0b953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-spotlight-on-shamoon-f0b951</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Spotlight%20on%20Shamoon&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-targeting-github-users-f0b94f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20targeting%20github%20users&amp;severity=low&amp;id=682acdbdbbaf20d303f0b94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dridex-banking-trojan-returns-leverages-new-uac-bypass-method-f0b94d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dridex%20Banking%20Trojan%20Returns%2C%20Leverages%20New%20UAC%20Bypass%20Method&amp;severity=low&amp;id=682acdbdbbaf20d303f0b94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-eitest-nabbing-chrome-users-with-a-chrome-font-social-engineering-scheme-f0b94b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20EITest%20Nabbing%20Chrome%20Users%20with%20a%20%C3%A2%E2%82%AC%C5%93Chrome%20Font%C3%A2%E2%82%AC%C2%9D%20Social%20Engineering%20Scheme&amp;severity=low&amp;id=682acdbdbbaf20d303f0b94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-2017-01-26-js-in-zip-cerber-f0b949</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%202017-01-26%20(.js%20in%20.zip)%20-%20Cerber&amp;severity=low&amp;id=682acdbdbbaf20d303f0b949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-detecting-threat-actors-in-recent-german-industrial-attacks-with-windows-defender-atp-f0b947</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Detecting%20threat%20actors%20in%20recent%20German%20industrial%20attacks%20with%20Windows%20Defender%20ATP&amp;severity=low&amp;id=682acdbdbbaf20d303f0b947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-svg-files-in-the-wild-f0b945</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malicious%20SVG%20Files%20in%20the%20Wild&amp;severity=low&amp;id=682acdbdbbaf20d303f0b945</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-whale-of-a-tale-hummingbad-returns-f0b943</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20Whale%20of%20a%20Tale%3A%20HummingBad%20Returns&amp;severity=low&amp;id=682acdbdbbaf20d303f0b943</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-spora-the-shortcut-worm-that-is-also-a-ransomware-f0b941</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Spora%20-%20the%20Shortcut%20Worm%20that%20is%20also%20a%20Ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0b941</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-finding-the-rat-s-nest-f0b934</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FINDING%20THE%20RAT%C3%A2%E2%82%AC%E2%84%A2S%20NEST&amp;severity=low&amp;id=682acdbdbbaf20d303f0b934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-uncovering-the-inner-workings-of-eyepyramid-f0b932</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Uncovering%20the%20Inner%20Workings%20of%20EyePyramid&amp;severity=low&amp;id=682acdbdbbaf20d303f0b932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-mac-backdoor-using-antiquated-code-f0b930</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20-%20New%20Mac%20backdoor%20using%20antiquated%20code&amp;severity=low&amp;id=682acdbdbbaf20d303f0b930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-carbanak-group-uses-google-for-malware-command-and-control-f0b92e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CARBANAK%20GROUP%20USES%20GOOGLE%20FOR%20MALWARE%20COMMAND-AND-CONTROL&amp;severity=low&amp;id=682acdbdbbaf20d303f0b92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-targeted-threat-leads-to-keylogger-via-fake-silverlight-update-f0b92c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Targeted%20Threat%20Leads%20to%20Keylogger%20via%20Fake%20Silverlight%20Update&amp;severity=low&amp;id=682acdbdbbaf20d303f0b92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shadow-brokers-windows-f0b92a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20shadow-brokers-windows&amp;severity=low&amp;id=682acdbdbbaf20d303f0b92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-variant-of-ploutus-atm-malware-observed-in-the-wild-in-latin-america-f0b928</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Variant%20of%20Ploutus%20ATM%20Malware%20Observed%20in%20the%20Wild%20in%20Latin%20America&amp;severity=low&amp;id=682acdbdbbaf20d303f0b928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-second-wave-of-shamoon-2-attacks-identified-f0b926</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Second%20Wave%20of%20Shamoon%202%20Attacks%20Identified&amp;severity=low&amp;id=682acdbdbbaf20d303f0b926</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fancy-bear-source-code-f0b924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20-%20Fancy%20Bear%20Source%20Code&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b924</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-curious-case-of-a-sundown-ek-variant-dropping-a-cryptocurrency-miner-f0b915</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20curious%20case%20of%20a%20Sundown%20EK%20variant%20dropping%20a%20Cryptocurrency%20Miner&amp;severity=low&amp;id=682acdbdbbaf20d303f0b915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-2016-updates-to-shifu-banking-trojan-f0b913</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%202016%20Updates%20to%20Shifu%20Banking%20Trojan&amp;severity=low&amp;id=682acdbdbbaf20d303f0b913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-exposing-an-av-disabling-driver-just-in-time-for-lunch-f0b911</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Exposing%20an%20AV-Disabling%20Driver%20Just%20in%20Time%20for%20Lunch&amp;severity=low&amp;id=682acdbdbbaf20d303f0b911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mm-core-in-memory-backdoor-returns-as-bigboss-and-sillygoose-f0b922</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20MM%20Core%20In-Memory%20Backdoor%20Returns%20as%20%22BigBoss%22%20and%20%22SillyGoose%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b922</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-grizzly-steppe-additional-expansion-f0b90b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GRIZZLY%20STEPPE%20%C3%A2%E2%82%AC%E2%80%9C%20Additional%20expansion&amp;severity=low&amp;id=682acdbdbbaf20d303f0b90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-updated-sundown-exploit-kit-uses-steganography-f0b90d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Updated%20Sundown%20Exploit%20Kit%20Uses%20Steganography&amp;severity=low&amp;id=682acdbdbbaf20d303f0b90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/android-spyware-f0b909</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Android%20spyware&amp;severity=low&amp;id=682acdbdbbaf20d303f0b909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-switcher-android-joins-the-attack-the-router-club-f0b907</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Switcher%3A%20Android%20joins%20the%20%C3%A2%E2%82%AC%CB%9Cattack-the-router%C3%A2%E2%82%AC%E2%84%A2%20club&amp;severity=low&amp;id=682acdbdbbaf20d303f0b907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-danger-close-fancy-bear-tracking-of-ukrainian-field-artillery-units-f0b905</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Danger%20Close%3A%20Fancy%20Bear%20Tracking%20of%20Ukrainian%20Field%20Artillery%20Units&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-linux-rakos-threat-devices-and-servers-under-ssh-scan-again-f0b903</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Linux%2FRakos%20threat%3A%20devices%20and%20servers%20under%20SSH%20scan%20(again)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kaspersky-lab-spearphishing-attack-hits-industrial-companies-f0b8f6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kaspersky%20Lab%3A%20Spearphishing%20attack%20hits%20industrial%20companies&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-promethium-and-neodymium-parallel-zeroday-attacks-targeting-individuals-in-europe-f0b8f4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PROMETHIUM%20and%20NEODYMIUM%3A%20Parallel%20zeroday%20attacks%20targeting%20individuals%20in%20Europe&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-one-if-by-email-and-two-if-by-ek-the-cerbers-are-coming-f0b8f2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20One%2C%20if%20by%20email%2C%20and%20two%2C%20if%20by%20EK%3A%20The%20Cerbers%20are%20coming!&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-12-15-js-in-zip-campaign-amount-payable-f0b8f0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-12-15%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Amount%20Payable%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-rise-of-telebots-analyzing-disruptive-killdisk-attacks-f0b8ec</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20rise%20of%20TeleBots%3A%20Analyzing%20disruptive%20KillDisk%20attacks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-windows-10-protection-detection-and-response-against-recent-depriz-malware-attacks-f0b8ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Windows%2010%3A%20protection%2C%20detection%2C%20and%20response%20against%20recent%20Depriz%20malware%20attacks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-diamondfox-panels-f0b8e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20diamondfox%20panels&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-now-mirai-has-dga-feature-built-in-f0b8e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Now%20Mirai%20Has%20DGA%20Feature%20Built%20in&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-scheme-spread-popcorn-time-ransomware-get-chance-of-free-decryption-key-f0b8e4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Scheme%3A%20Spread%20Popcorn%20Time%20Ransomware%2C%20get%20chance%20of%20free%20Decryption%20Key&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-astrum-drops-f0b8d7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Astrum%20Drops&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-12-07-js-in-zip-campaign-receipt-f0b8d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-12-07%20(.js%20in%20.zip)%20-%20campaign%3A%20%22receipt%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-readers-of-popular-websites-targeted-by-stealthy-stegano-exploit-kit-hiding-in-pixels-of-malicious-ads-f0b8d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Readers%20of%20popular%20websites%20targeted%20by%20stealthy%20Stegano%20exploit%20kit%20hiding%20in%20pixels%20of%20malicious%20ads&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-smssecurity-variant-roots-phones-abuses-accessibility-features-and-teamviewer-f0b8c9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20SmsSecurity%20Variant%20Roots%20Phones%2C%20Abuses%20Accessibility%20Features%20and%20TeamViewer&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shamoon-2-return-of-the-disttrack-wiper-f0b8cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Shamoon%202%3A%20Return%20of%20the%20Disttrack%20Wiper&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cerber-5-0-through-google-via-onion-gateway-f0b8c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cerber%205.0%20through%20Google%20via%20onion%20gateway&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fareit-spam-rocking-out-to-a-new-file-type-f0b8c5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Fareit%20Spam%3A%20Rocking%20Out%20to%20a%20New%20File%20Type&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tropic-trooper-targets-taiwanese-government-and-fossil-fuel-provider-with-poison-ivy-f0b8b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Tropic%20Trooper%20Targets%20Taiwanese%20Government%20and%20Fossil%20Fuel%20Provider%20With%20Poison%20Ivy&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nemucod-downloader-spreading-via-facebook-f0b8b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Nemucod%20downloader%20spreading%20via%20Facebook&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/it-s-parliamentary-keyboy-and-the-targeting-of-the-tibetan-community-f0b8b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=It%E2%80%99s%20Parliamentary%3A%20KeyBoy%20and%20the%20targeting%20of%20the%20Tibetan%20Community&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-carbanak-anunak-attack-methodology-f0b8b2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Carbanak%20%2F%20Anunak%20Attack%20Methodology&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-kronos-banking-trojan-used-to-deliver-new-po-32c62a3b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Kronos%20Banking%20Trojan%20Used%20to%20Deliver%20New%20Point-of-Sale%20Malware&amp;severity=low&amp;id=68493dbbcacb3d99bea6dc8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hackingteam-back-for-your-androids-now-extra-insecure-f0b8b0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20HackingTeam%20back%20for%20your%20Androids%2C%20now%20extra%20insecure!&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ransoc-desktop-locking-ransomware-ransacks-local-files-and-social-media-profiles-f0b8ac</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Ransoc%20Desktop%20Locking%20Ransomware%20Ransacks%20Local%20Files%20and%20Social%20Media%20Profiles&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-blacknurse-denial-of-service-attack-f0b8a8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BlackNurse%20Denial%20of%20Service%20Attack&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-first-cryptor-to-exploit-telegram-f0b8a6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20first%20cryptor%20to%20exploit%20Telegram&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-floki-bot-and-the-stealthy-dropper-f0b899</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Floki%20Bot%20and%20the%20stealthy%20dropper&amp;severity=low&amp;id=682acdbdbbaf20d303f0b899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/blueliv-vawtrak-v2-f0b897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Blueliv%20Vawtrak%20v2&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-exaspy-commodity-android-spyware-targeting-high-level-executives-f0b895</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Exaspy%20%C3%A2%E2%82%AC%E2%80%9C%20Commodity%20Android%20Spyware%20Targeting%20High-level%20Executives&amp;severity=low&amp;id=682acdbdbbaf20d303f0b895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-microsoft-word-intruder-8-adds-support-for-flash-vulnerability-cve-2016-4117-f0b8ae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Microsoft%20Word%20Intruder%208%20Adds%20Support%20for%20Flash%20Vulnerability%20CVE-2016-4117&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-veil-framework-infects-victims-of-targeted-owa-phishing-attack-f0b893</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Veil-Framework%20Infects%20Victims%20of%20Targeted%20OWA%20Phishing%20Attack&amp;severity=low&amp;id=682acdbdbbaf20d303f0b893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/yara-rule-set-detection-of-empire-by-florian-roth-powershell-and-python-post-exploitation-agent-f0b891</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Yara%20Rule%20Set%20-%20detection%20of%20Empire%20by%20Florian%20Roth%20(PowerShell%20and%20Python%20post-exploitation%20agent.)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-flying-dragon-eye-uyghur-themed-threat-activity-f0b88f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Flying%20Dragon%20Eye%3A%20Uyghur%20Themed%20Threat%20Activity&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-psa-conference-invite-used-as-a-lure-by-operation-lotus-blossom-actors-f0b88d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PSA%3A%20Conference%20Invite%20used%20as%20a%20Lure%20by%20Operation%20Lotus%20Blossom%20Actors&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-blackgear-espionage-campaign-evolves-adds-japan-to-target-list-f0b88b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20BLACKGEAR%20Espionage%20Campaign%20Evolves%2C%20Adds%20Japan%20To%20Target%20List&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b88b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-octopus-rex-evolution-of-a-multi-task-botnet-f0b889</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Octopus-Rex.%20Evolution%20of%20a%20multi%20task%20Botnet&amp;severity=low&amp;id=682acdbdbbaf20d303f0b889</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-houdini-s-magic-reappearance-f0b887</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Houdini%C3%A2%E2%82%AC%E2%84%A2s%20Magic%20Reappearance&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b887</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lifting-the-lid-on-sednit-a-closer-look-at-the-software-it-uses-f0b87a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lifting%20the%20lid%20on%20Sednit%3A%20A%20closer%20look%20at%20the%20software%20it%20uses&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-week-44-2016-10-24-locky-sebek-f0b878</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20week%2044%20(2016-10-24)%20-%20Locky%20(&apos;Sebek&apos;)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-new-lnk-between-spam-and-locky-infection-f0b874</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20The%20new%20.LNK%20between%20spam%20and%20Locky%20infection&amp;severity=low&amp;id=682acdbdbbaf20d303f0b874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malspam-delivers-nanocore-rat-f0b872</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malspam%20delivers%20NanoCore%20RAT&amp;severity=low&amp;id=682acdbdbbaf20d303f0b872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-week-43-mule-acquisition-probably-related-to-locky-resources-f0b870</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%20week%2043%20(mule%20acquisition)%20-%20probably%20related%20to%20Locky%20resources&amp;severity=low&amp;id=682acdbdbbaf20d303f0b870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-2016-10-16-mule-acquisition-probably-related-to-locky-resources-f0b86e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%202016-10-16%20(mule%20acquisition)%20-%20probably%20related%20to%20Locky%20resources&amp;severity=low&amp;id=682acdbdbbaf20d303f0b86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/elf-linux-nyadrop-f0b86c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=ELF%20Linux%2FNyaDrop&amp;severity=low&amp;id=682acdbdbbaf20d303f0b86c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-2016-10-14-mule-acquisition-probably-related-to-locky-resources-f0b86a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%202016-10-14%20(mule%20acquisition)%20-%20probably%20related%20to%20Locky%20resources&amp;severity=low&amp;id=682acdbdbbaf20d303f0b86a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/spam-2016-10-12-mule-acquisition-probably-related-to-locky-resources-f0b868</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Spam%202016-10-12%20(mule%20acquisition)%20-%20probably%20related%20to%20Locky%20resources&amp;severity=low&amp;id=682acdbdbbaf20d303f0b868</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-odinaff-new-trojan-used-in-high-level-financial-attacks-f0b85b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Odinaff%3A%20New%20Trojan%20used%20in%20high%20level%20financial%20attacks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-how-stampado-ransomware-analysis-led-to-yara-improvements-f0b859</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20How%20Stampado%20Ransomware%20Analysis%20Led%20To%20Yara%20Improvements&amp;severity=low&amp;id=682acdbdbbaf20d303f0b859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-10-07-js-in-zip-campaign-wrong-paychecks-f0b857</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-10-07%20(.js%20in%20.zip)%20-%20campaign%3A%20%22wrong%20paychecks%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-10-06-js-in-zip-campaign-your-order-f0b855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-10-06%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Your%20Order%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hades-locker-ransomware-mimics-locky-f0b8aa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hades%20Locker%20Ransomware%20Mimics%20Locky&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-10-03-xls-campaign-invoice-f0b853</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-10-03%20(.xls)%20-%20campaign%3A%20%22Invoice-%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-10-03-xls-campaign-scan-f0b851</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-10-03%20(.xls)%20-%20campaign%3A%20%22%5BScan%5D%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-investigation-of-linux-mirai-trojan-family-f0b84f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Investigation%20of%20Linux.Mirai%20Trojan%20family&amp;severity=low&amp;id=682acdbdbbaf20d303f0b84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-30-doc-campaign-receipt-f0b84d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-30%20(.doc)%20-%20campaign%3A%20%22Receipt%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b84d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-30-wsf-in-zip-campaign-parcel-details-f0b84b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-30%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Parcel%20details%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b84b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-29-xls-campaign-receipt-f0b849</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-29%20(.xls)%20-%20campaign%3A%20%22Receipt%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b849</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-30-wsf-in-zip-campaign-emailing-f0b83c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-30%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Emailing%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-teamxrat-brazilian-cybercrime-meets-ransomware-f0b876</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TeamXRat%3A%20Brazilian%20cybercrime%20meets%20ransomware&amp;severity=low&amp;id=682acdbdbbaf20d303f0b876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-27-wsf-in-zip-campaign-integer-zip-f0b83a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-27%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22%7Binteger%7D.zip%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sofacy-s-komplex-os-x-trojan-by-palo-alto-networks-f0b838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sofacy%C3%A2%E2%82%AC%E2%84%A2s%20%C3%A2%E2%82%AC%CB%9CKomplex%C3%A2%E2%82%AC%E2%84%A2%20OS%20X%20Trojan%20by%20Palo%20Alto%20networks&amp;severity=high&amp;id=682acdbdbbaf20d303f0b838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hunting-libyan-scorpions-f0b836</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hunting%20Libyan%20Scorpions&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tofsee-modular-spambot-f0b834</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Tofsee%20%C3%A2%E2%82%AC%E2%80%9C%20modular%20spambot&amp;severity=low&amp;id=682acdbdbbaf20d303f0b834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-20-hta-in-zip-campaign-no-subject-f0b832</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-20%20(.hta%20in%20.zip)%20-%20campaign%3A%20%22%3Cno%20subject%3E%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-macros-add-sandbox-evasion-techniques-to-distribute-new-dridex-f0b830</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malicious%20Macros%20Add%20Sandbox%20Evasion%20Techniques%20to%20Distribute%20New%20Dridex&amp;severity=low&amp;id=682acdbdbbaf20d303f0b830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-ioc-s-f0b82e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20IoC&apos;s&amp;severity=low&amp;id=682acdbdbbaf20d303f0b82e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-19-js-in-zip-campaign-express-parcel-service-f0b82c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-19%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Express%20Parcel%20service%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b82c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-16-wsf-in-zip-campaign-scan-fax-doc-img-integer-f0b82a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-16%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22(SCAN%7CFAX%7CDOC%7CIMG)_%7Binteger%7D%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b82a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-elf-rex-f0b81d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ELF.Rex&amp;severity=low&amp;id=682acdbdbbaf20d303f0b81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-16-js-in-zip-campaign-re-request-f0b81b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-16%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Re%3A%20request%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-15-js-in-zip-campagin-booking-confirmation-f0b819</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-15%20(.js%20in%20.zip)%20-%20campagin%3A%20%22Booking%20confirmation%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-16-hta-in-zip-campaign-attached-emailing-copy-file-scan-receipt-document-integer-f0b817</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-16%20(.hta%20in%20.zip)%20-%20campaign%3A%20%22(Attached%7CEmailing%7CCopy%7CFile)%3A%20(Scan%7CReceipt%7CDocument)(integer)%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-15-wsf-in-zip-campaign-scan-f0b815</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-15%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22SCAN%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-15-wsf-in-zip-campaign-documents-requested-f0b813</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-15%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Documents%20Requested%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-14-js-in-zip-campaign-delivery-confirmation-f0b811</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-14%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Delivery%20Confirmation%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-14-wsf-in-zip-campaign-tax-invoice-f0b80f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-14%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Tax%20invoice%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b80f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-14-wsf-in-zip-campaign-payment-copy-f0b80d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-14%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22payment%20copy%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b80d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-14-wsf-in-zip-campaign-account-report-f0b80b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-14%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Account%20report%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b80b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-13-hta-in-zip-campaign-accounts-documentation-invoices-f0b7fe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-13%20(.hta%20in%20.zip)%20-%20campaign%3A%20%22Accounts%20Documentation%20-%20Invoices%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-12-wsf-in-zip-campaign-photo-image-f0b7fc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-12%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Photo%7CImage%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-12-js-in-zip-campaign-budget-report-f0b7fa</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-12%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Budget%20report%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-dukes-r-d-finds-a-new-anti-analysis-technique-f0b7f8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Dukes%20R%26D%20Finds%20a%20New%20Anti-Analysis%20Technique&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-09-wsf-in-zip-campaign-documents-requested-f0b7f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-09%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Documents%20Requested%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-09-hta-in-dzip-campaign-order-confirmation-f0b7f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-09%20(.hta%20in%20.dzip)%20-%20campaign%3A%20%22Order%20confirmation%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-08-wsf-in-zip-campaign-icloud-com-f0b7f2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-08%20(.wsf%20in%20.zip)%20-%20campaign%3A%20icloud.com&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-08-wsf-in-zip-campaign-new-voice-mail-message-from-f0b7f0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-08%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22New%20voice%20mail%20message%20from%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-07-js-in-zip-campaign-agreement-form-f0b7ee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-07%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Agreement%20form%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-06-wsf-in-zip-campaign-message-from-cukpr-x-f0b7ec</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-06%20(.wsf%20in%20.zip)%20-%20campaign%3A%20&apos;Message%20from%20%22CUKPR%5Bx%5D%22&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-06-js-in-zip-campaign-suspected-purchases-f0b7df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-06%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Suspected%20Purchases%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/sqli-vuln-sites-2015-08-12-origin-pastebincom23fdl-76d7c27c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=SQLi%20vuln%20sites%20-%202015-08-12%20-%20origin%3A%20pastebin.com%2F23fDLE1G&amp;severity=low&amp;id=688a1b6ead5a09ad00a5aec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pok-mon-themed-umbreon-linux-rootkit-hits-x86-arm-systems-f0b7dd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Pok%C3%83%C2%A9mon-themed%20Umbreon%20Linux%20Rootkit%20Hits%20x86%2C%20ARM%20Systems&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-06-wsf-in-zip-campaign-invoice-inv-x-f0b7db</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-06%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Invoice%20INV%5Bx%5D%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-06-js-in-zip-campaign-copies-f0b7d9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-06%20(.js%20in%20.zip)%20-%20campaign%3A%20%22copies%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-06-js-in-zip-campaign-august-invoice-f0b7d7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-06%20(.js%20in%20.zip)%20-%20campaign%3A%20%22August%20invoice%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-05-wsf-in-zip-f0b7d5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-05%20(.wsf%20in%20.zip)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-05-js-in-zip-campaign-credit-card-receipt-f0b7d3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-05%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Credit%20card%20receipt%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-02-wsf-in-zip-campaign-icloud-com-f0b7d1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-02%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22icloud.com%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malware-posing-as-human-rights-organizations-and-commercial-software-targeting-iranians-foreign-policy-institutions-and-middle-eastern-countries-extremedownloader-and-strealer-f0b7cf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malware%20Posing%20as%20Human%20Rights%20Organizations%20and%20Commercial%20Software%20Targeting%20Iranians%2C%20Foreign%20Policy%20Institutions%20and%20Middle%20Eastern%20Countries%20(ExtremeDownloader%20and%20Strealer)&amp;severity=high&amp;id=682acdbdbbaf20d303f0b7cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-01-wsf-in-zip-campaign-please-find-attached-invoice-no-f0b7cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-01%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Please%20find%20attached%20invoice%20no%3A%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-01-hta-in-zip-campaign-voice-message-from-outside-caller-f0b7c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-01%20(.hta%20in%20.zip)%20-%20campaign%3A%20%22Voice%20Message%20from%20Outside%20Caller%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-09-01-js-in-zip-campaign-flight-tickets-f0b7be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-09-01%20(.js%20in%20.zip)%20-%20campaign%3A%20%22flight%20tickets%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-31-js-in-zip-campaign-bank-transactions-f0b7bc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-31%20(.js%20in%20.zip)%20-%20campaign%3A%20%22bank%20transactions%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-31-wsf-in-zip-campaign-image-picture-photos-photo-document-f0b7ba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-31%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Image%7CPicture%7CPhotos%7CPhoto%7CDocument%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-31-hta-in-zip-campaign-fw-scan-f0b7b8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-31%20(.hta%20in%20.zip)%20-%20campaign%3A%20%22FW%3A%20%5BScan%5D%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-german-speakers-targeted-by-spam-leading-to-ozone-rat-f0b7b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20German%20Speakers%20Targeted%20by%20SPAM%20Leading%20to%20Ozone%20RAT&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/bitcoinminer-installed-by-malware-f0b7b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Bitcoinminer%20installed%20by%20malware&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/ransomware-xorist-f0b7b4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Ransomware%20-%20Xorist&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-26-js-in-zip-campaign-monthly-report-f0b7b0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-26%20(.js%20in%20.zip)%20-%20campaign%3A%20%22monthly%20report%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-29-wsf-in-zip-campaign-please-find-attached-invoice-no-f0b7ae</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-29%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Please%20find%20attached%20invoice%20no%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-29-js-in-zip-campaign-commission-f0b7a1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-29%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Commission%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dridex-returns-to-action-for-smaller-more-targeted-attacks-f0b79f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dridex%20Returns%20To%20Action%20For%20Smaller%2C%20More%20Targeted%20Attacks&amp;severity=low&amp;id=682acdbdbbaf20d303f0b79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-26-js-in-zip-campaign-office-equipment-f0b79d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-26%20(.js%20in%20.zip)%20-%20campaign%3A%20%22office%20equipment%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-26-wsf-in-zip-campaign-voice-message-from-outside-caller-f0b79b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-26%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Voice%20Message%20from%20Outside%20Caller%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/the-million-dollar-dissident-citizen-lab-report-f0b799</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=The%20Million%20Dollar%20Dissident%20-%20Citizen%20lab%20report&amp;severity=high&amp;id=682acdbdbbaf20d303f0b799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-25-js-in-zip-campaign-contract-f0b797</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-25%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Contract%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-24-hta-in-zip-campaign-emailing-n-jpg-f0b795</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-24%20(.hta%20in%20.zip)%20-%20campaign%3A%20%22Emailing%7BN%7D.jpg%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-24-js-in-zip-campaign-statement-f0b793</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-24%20(.js%20in%20.zip)%20-%20campaign%3A%20%22Statement%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-23-wsf-in-zip-campaign-new-voice-mail-message-from-random-f0b791</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-23%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22New%20voice%20mail%20message%20from%20%5BRANDOM%5D%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b791</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-domains-and-ips-involved-in-js-ransomware-delivered-through-email-by-burberry-on-alienvault-otx-f0b78f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Domains%20and%20IPs%20involved%20in%20JS%20ransomware%20delivered%20through%20email%20by%20burberry%20on%20AlienVault%20OTX&amp;severity=low&amp;id=682acdbdbbaf20d303f0b78f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-18-wsf-in-zip-campaign-emailing-label-f0b77e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-18%20(.wsf%20in%20.zip)%20-%20campaign%3A%20%22Emailing%3A%20Label%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-on-shakti-domains-via-passivetotal-f0b77c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivot%20on%20Shakti%20domains%20via%20PassiveTotal&amp;severity=low&amp;id=682acdbdbbaf20d303f0b77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shark-ransomware-ransomware-as-a-service-f0b778</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Shark%20Ransomware%3A%20Ransomware%20as%20a%20service&amp;severity=low&amp;id=682acdbdbbaf20d303f0b778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-on-whois-registrant-844148030-qq-com-f0b776</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivot%20on%20whois%20registrant%20844148030%40qq.com&amp;severity=low&amp;id=682acdbdbbaf20d303f0b776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-snakes-in-the-satellites-on-going-turla-infrastructure-by-passivetotal-f0b770</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Snakes%20in%20the%20Satellites%3A%20On-going%20Turla%20Infrastructure%20by%20PassiveTotal&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b770</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-torrentlocker-ransomware-email-iocs-8-16-2016-by-neonprimetime-user-on-alienvault-otx-f0b772</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20TorrentLocker%20Ransomware%20Email%20IoCs%208%2F16%2F2016%20by%20neonPrimeTime%20user%20on%20AlienVault%20OTX&amp;severity=low&amp;id=682acdbdbbaf20d303f0b772</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rex-linux-p2p-ransom-botnet-by-this-is-security-blog-f0b763</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Rex%20-Linux%20P2P%20Ransom%20botnet%20by%20This%20Is%20Security%20blog&amp;severity=low&amp;id=682acdbdbbaf20d303f0b763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ssh-bruteforce-logs-from-burberry-user-on-alienvault-otx-f0b761</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20SSH%20bruteforce%20logs%20from%20burberry%20user%20on%20AlienVault%20OTX&amp;severity=low&amp;id=682acdbdbbaf20d303f0b761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-ghoul-targeted-attacks-on-industrial-and-engineering-organizations-f0b75b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20Ghoul%3A%20targeted%20attacks%20on%20industrial%20and%20engineering%20organizations&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-17-docm-campaign-order-confirmation-f0b759</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-17%20(.docm)%20-%20campaign%3A%20%22Order%20Confirmation-%22&amp;severity=low&amp;id=682acdbdbbaf20d303f0b759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-generic-yara-rule-to-detect-plugx-by-jay-dimartino-f0b757</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Generic%20Yara%20rule%20to%20detect%20PlugX%20by%20Jay%20DiMartino&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-aveo-malware-family-targets-japanese-speaking-users-by-palo-alto-networks-unit-42-f0b774</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Aveo%20Malware%20Family%20Targets%20Japanese%20Speaking%20Users%20by%20Palo%20Alto%20networks%20Unit%2042&amp;severity=low&amp;id=682acdbdbbaf20d303f0b774</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-vawtrak-c2-pin-it-by-threat-geek-f0b75f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Vawtrak%20C2%20%C3%A2%E2%82%AC%E2%80%9C%20Pin%20it%20by%20Threat%20Geek&amp;severity=low&amp;id=682acdbdbbaf20d303f0b75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-08-16-wsf-in-zip-campaign-blank-2-f0b751</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-08-16%20(.wsf%20in%20.zip)%20-%20campaign%3A%20&apos;Blank%202&apos;&amp;severity=low&amp;id=682acdbdbbaf20d303f0b751</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shakti-trojan-document-thief-by-malwarebytes-f0b77a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Shakti%20Trojan%3A%20Document%20Thief%20%20by%20Malwarebytes&amp;severity=low&amp;id=682acdbdbbaf20d303f0b77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rule-to-detect-kirbi-ticket-for-mimikatz-by-benjamin-delpy-with-contribution-of-didier-stevens-f0b753</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rule%20to%20detect%20KirBi%20ticket%20for%20Mimikatz%20by%20Benjamin%20Delpy%20with%20Contribution%20of%20Didier%20Stevens&amp;severity=low&amp;id=682acdbdbbaf20d303f0b753</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bad-news-bears-panda-banker-starts-looking-more-like-a-grizzly-by-proofpoint-f0b780</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Bad%20News%20Bears%20-%20Panda%20Banker%20Starts%20Looking%20More%20Like%20a%20Grizzly%20by%20ProofPoint&amp;severity=low&amp;id=682acdbdbbaf20d303f0b780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-c2-neutrino-exploit-kit-via-pseudodarkleech-hopto-org-gate-delivers-crypmic-ransomware-by-broad-analysis-f0b744</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20C2%20%C3%A2%E2%82%AC%E2%80%9C%20Neutrino%20Exploit%20Kit%20via%20pseudoDarkleech%20HOPTO.ORG%20gate%20delivers%20CrypMic%20Ransomware%20by%20Broad%20Analysis&amp;severity=low&amp;id=682acdbdbbaf20d303f0b744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-android-marcher-continuously-evolving-mobile-malware-by-zscaler-f0b782</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Android%20Marcher%3A%20Continuously%20Evolving%20Mobile%20Malware%20by%20Zscaler&amp;severity=low&amp;id=682acdbdbbaf20d303f0b782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-additional-yara-rules-for-detection-project-sauron-by-florian-roth-f0b755</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Additional%20yara%20rules%20for%20detection%20Project%20Sauron%20by%20Florian%20Roth&amp;severity=high&amp;id=682acdbdbbaf20d303f0b755</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-eff-report-operation-manul-f0b742</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20EFF%20Report%20Operation%20Manul&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cracking-orcus-rat-f0b740</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cracking%20Orcus%20RAT&amp;severity=low&amp;id=682acdbdbbaf20d303f0b740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-on-osint-lost-your-iphone-be-on-guard-for-a-perfectly-timed-apple-id-phishing-attack-by-hot-for-security-f0b52b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20on%20OSINT%20Lost%20your%20iPhone%3F%20Be%20on%20guard%20for%20a%20perfectly-timed%20Apple%20ID%20phishing%20attack%20by%20Hot%20For%20Security&amp;severity=low&amp;id=682acdbcbbaf20d303f0b52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-group5-syria-and-the-iranian-connection-by-citizen-lab-f0b516</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Group5%3A%20Syria%20and%20the%20Iranian%20Connection%20by%20Citizen%20Lab&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-projectsauron-top-level-cyber-espionage-platform-covertly-extracts-encrypted-government-comms-f0b514</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ProjectSauron%3A%20top%20level%20cyber-espionage%20platform%20covertly%20extracts%20encrypted%20government%20comms&amp;severity=high&amp;id=682acdbcbbaf20d303f0b514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-strider-cyberespionage-group-turns-eye-of-sauron-on-targets-f0b512</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Strider%3A%20Cyberespionage%20group%20turns%20eye%20of%20Sauron%20on%20targets&amp;severity=low&amp;id=682acdbcbbaf20d303f0b512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nanhaishu-rating-the-south-china-sea-f0b510</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20NANHAISHU%20RATing%20the%20South%20China%20Sea&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-orcus-birth-of-an-unusual-plugin-builder-rat-by-palo-alto-unit-42-f0b523</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Orcus%20%C3%A2%E2%82%AC%E2%80%9C%20Birth%20of%20an%20unusual%20plugin%20builder%20RAT%20by%20Palo%20Alto%20Unit%2042&amp;severity=low&amp;id=682acdbcbbaf20d303f0b523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-luminositylink-rat-f0b50e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LuminosityLink%20RAT&amp;severity=low&amp;id=682acdbcbbaf20d303f0b50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-massive-adgholas-malvertising-campaigns-use-steganography-and-file-whitelisting-to-hide-in-plain-sight-by-proofpoint-f0b525</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Massive%20AdGholas%20Malvertising%20Campaigns%20Use%20Steganography%20and%20File%20Whitelisting%20to%20Hide%20in%20Plain%20Sight%20by%20ProofPoint&amp;severity=low&amp;id=682acdbcbbaf20d303f0b525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-mad-max-dga-f0b50c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Mad%20Max%20DGA&amp;severity=low&amp;id=682acdbcbbaf20d303f0b50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actors-using-legitimate-paypal-accounts-to-distribute-chthonic-banking-trojan-f0b90f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Threat%20Actors%20Using%20Legitimate%20PayPal%20Accounts%20To%20Distribute%20Chthonic%20Banking%20Trojan&amp;severity=low&amp;id=682acdbdbbaf20d303f0b90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/guccifer-2-0-all-roads-lead-to-russia-threatconnect-report-f0b50a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Guccifer%202.0%3A%20All%20Roads%20Lead%20to%20Russia%20-%20Threatconnect%20report&amp;severity=high&amp;id=682acdbcbbaf20d303f0b50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-patchwork-cyberespionage-group-expands-targets-from-governments-to-wide-range-of-industries-f0b508</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Patchwork%20cyberespionage%20group%20expands%20targets%20from%20governments%20to%20wide%20range%20of%20industries&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b508</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-kovter-becomes-almost-file-less-creates-a-new-file-type-and-gets-some-new-certificates-f0b506</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Kovter%20becomes%20almost%20file-less%2C%20creates%20a%20new%20file%20type%2C%20and%20gets%20some%20new%20certificates&amp;severity=low&amp;id=682acdbcbbaf20d303f0b506</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-22-js-in-zip-with-embedded-locky-campaign-financial-statement-f0b504</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-22%20.js%20in%20.zip%20with%20embedded%20Locky%20(campaign%3A%20%22Financial%20statement%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b504</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-21-wsf-campaign-fixed-invoice-f0b4f7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-21%20.wsf%20(campaign%3A%20%22fixed%20invoice%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-19-docm-campaign-documents-from-work-f0b4f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-19%20.docm%20(campaign%3A%20%22Documents%20from%20work%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-19-wsf-campaign-new-invoice-f0b4f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-19%20.wsf%20(campaign%3A%20%22new%20invoice%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-18-wsf-campaign-company-database-f0b4f1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-18%20.wsf%20(campaign%3A%20%22company%20database%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-18-wsf-gif-campaign-re-firstname-lastname-f0b4ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-18%20.wsf-%3E.gif%20(campaign%3A%20%22RE%3A%20firstname.lastname%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-18-wsf-campaign-bank-account-report-f0b4ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-18%20.wsf%20(campaign%3A%20%22bank%20account%20report%22)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-15-zip-jse-f0b4eb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-15%20.zip%2F.jse&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-14-wsf-campaign-f0b4e9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-14%20.wsf%20campaign&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-13-wsf-campaign-f0b4e7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-13%20.wsf%20campaign&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-12-locky-campaign-fw-f0b4e5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-12%20(Locky%20campaign%20&apos;Fw%3A&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-13-locky-campaign-profile-f0b4d8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-13%20(Locky%20campaign%20&apos;Profile&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-nettraveler-apt-targets-russian-european-interests-f0b4d6</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20NetTraveler%20APT%20Targets%20Russian%2C%20European%20Interests&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/what-s-in-a-server-name-on-apt28-sofacy-by-threatconnect-f0b52f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=What&apos;s%20in%20a%20server%20name%20(on%20APT28%2FSofacy)%20by%20ThreatConnect&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-on-what-s-in-a-server-name-on-apt28-sofacy-by-threatconnect-f0b52d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivot%20on%20What&apos;s%20in%20a%20server%20name%20(on%20APT28%2FSofacy)%20by%20ThreatConnect&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-dropping-elephant-aggressive-cyber-espionage-in-the-asian-region-f0b4d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Dropping%20Elephant%20%C3%A2%E2%82%AC%E2%80%9C%20aggressive%20cyber-espionage%20in%20the%20Asian%20region&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-from-humming-bad-to-worse-f0b4d2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20From%20Humming%20Bad%20to%20Worse&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-05-subject-scanned-image-docm-f0b4d0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-05%20(subject%20&apos;Scanned%20image&apos;)%2C%20.docm&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-07-04-testrun-subject-scanned-image-docm-f0b4ce</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-07-04%20(testrun%2C%20subject%20&apos;Scanned%20image&apos;)%2C%20.docm&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-h-worm-iocs-from-wooyun-f0b533</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20H-Worm%20IOCs%20from%20WooYun&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pacifier-apt-f0b4cc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Pacifier%20APT&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2016-3189-na-in-na-ab104c72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2016-3189%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5c1b0bd07c3938d860</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apocalypse-ransomware-which-targets-companies-through-insecure-rdp-f0b4ca</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Apocalypse%3A%20Ransomware%20which%20targets%20companies%20through%20insecure%20RDP&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-satana-ransomware-threat-coming-soon-f0b4c8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Satana%20ransomware%20%C3%A2%E2%82%AC%E2%80%9C%20threat%20coming%20soon%3F&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-30-campaign-subject-documents-copies-f0b4c6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-30%20(campaign%20subject%3A%20&apos;Documents%20copies&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-29-campaign-subject-financial-report-f0b4b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-29%20(campaign%20subject%3A%20&apos;Financial%20report&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-prince-of-persia-game-over-f0b4b7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Prince%20of%20Persia%20%C3%A2%E2%82%AC%E2%80%9C%20Game%20Over&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-29-campaign-subject-new-invoice-f0b4b5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-29%20(campaign%20subject%3A%20&apos;new%20invoice&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-latest-android-overlay-malware-spreading-via-sms-phishing-in-europe-f0b4b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Latest%20Android%20Overlay%20Malware%20Spreading%20via%20SMS%20Phishing%20in%20Europe&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-around-ip-193-109-68-87-from-ns1-carbon2u-com-potential-sofacy-f0b704</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivot%20around%20IP%20193.109.68.87%20(from%20ns1.carbon2u.com)%20-%20potential%20Sofacy&amp;severity=low&amp;id=682acdbdbbaf20d303f0b704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pivot-on-other-email-addresses-found-by-using-the-same-physical-address-as-support-apple-id-com-potential-sofacy-f0b702</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Pivot%20on%20other%20email%20addresses%20found%20by%20using%20the%20same%20physical%20address%20as%20support-apple-id.com%20-%20potential%20sofacy&amp;severity=high&amp;id=682acdbdbbaf20d303f0b702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-28-locky-campaign-subject-report-f0b4b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-28%20(Locky%20campaign%20subject%3A%20&apos;report&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-linux-gafgyt-dvr-devices-compromised-infected-f0b4af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Linux%2FGafGyt%20-%20DVR%20devices%20compromised%2Finfected&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-retefe-banking-trojan-targets-uk-banking-customers-f0b4ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Retefe%20banking%20Trojan%20targets%20UK%20banking%20customers&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-28-locky-campaign-subject-updated-f0b4ab</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-28%20(Locky%20campaign%20subject%3A%20&apos;Updated&apos;)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-27-f0b4a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-27&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-doh-new-bart-ransomware-from-threat-actors-spreading-dridex-and-locky-f0b4a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Doh!%20New%20%22Bart%22%20Ransomware%20from%20Threat%20Actors%20Spreading%20Dridex%20and%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b4a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-group-4127-targets-google-accounts-by-secureworks-f0b535</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Threat%20Group-4127%20Targets%20Google%20Accounts%20by%20Secureworks&amp;severity=high&amp;id=682acdbcbbaf20d303f0b535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-24-locky-f0b49a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-24%20(Locky)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-23-locky-f0b498</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-06-23%20(Locky)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-curious-case-of-an-unknown-trojan-targeting-german-speaking-users-f0b496</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Curious%20Case%20of%20an%20Unknown%20Trojan%20Targeting%20German-Speaking%20Users&amp;severity=low&amp;id=682acdbcbbaf20d303f0b496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-06-22-js-in-zip-locky-is-back-f0b494</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-06-22)%20-%20.js%20in%20.zip%20-%20Locky%20is%20back&amp;severity=low&amp;id=682acdbcbbaf20d303f0b494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-setting-sights-on-retail-abaddonpos-now-targeting-specific-pos-software-f0b490</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Setting%20Sights%20On%20Retail%3A%20AbaddonPOS%20Now%20Targeting%20Specific%20POS%20Software&amp;severity=low&amp;id=682acdbcbbaf20d303f0b490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-sofacy-attacks-against-us-government-agency-by-palo-alto-unit-42-f0b48e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20Sofacy%20Attacks%20Against%20US%20Government%20Agency%20by%20Palo%20Alto%20Unit%2042&amp;severity=high&amp;id=682acdbcbbaf20d303f0b48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mofang-a-politically-motivated-information-stealing-adversary-f0b48c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mofang%3A%20A%20politically%20motivated%20information%20stealing%20adversary&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b48c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-reverse-engineering-dubnium-f0b48a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Reverse-engineering%20DUBNIUM&amp;severity=low&amp;id=682acdbcbbaf20d303f0b48a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-communications-of-the-bolek-trojan-f0b488</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Communications%20of%20the%20Bolek%20Trojan&amp;severity=low&amp;id=682acdbcbbaf20d303f0b488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-linkedin-information-used-to-spread-banking-malware-in-the-netherlands-f0b47b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LinkedIn%20information%20used%20to%20spread%20banking%20malware%20in%20the%20Netherlands&amp;severity=low&amp;id=682acdbcbbaf20d303f0b47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rotten-apples-apple-like-malicious-phishing-domains-by-fireeye-f0b546</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Rotten%20Apples%3A%20Apple-Like%20Malicious%20Phishing%20Domains%20by%20FireEye&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b546</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lame-proxychanger-apparently-related-to-a-clickfraud-botnet-f0b479</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Lame%20proxychanger%2C%20apparently%20related%20to%20a%20clickfraud%20botnet.&amp;severity=low&amp;id=682acdbcbbaf20d303f0b479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cryptxxx-ransomware-learns-the-samba-other-new-tricks-with-version-3-100-f0b477</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20CryptXXX%20Ransomware%20Learns%20the%20Samba%2C%20Other%20New%20Tricks%20With%20Version%203.100&amp;severity=low&amp;id=682acdbcbbaf20d303f0b477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-irongate-ics-malware-nothing-to-see-here-masking-malicious-activity-on-scada-systems-f0b475</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20IRONGATE%20ICS%20Malware%3A%20Nothing%20to%20See%20Here...Masking%20Malicious%20Activity%20on%20SCADA%20Systems&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-lurk-banking-trojan-lurk-specially-for-russia-f0b473</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%C3%90%E2%80%98%C3%90%C2%B0%C3%90%C2%BD%C3%90%C2%BA%C3%90%C2%BE%C3%90%C2%B2%C3%91%C2%81%C3%90%C2%BA%C3%90%C2%B8%C3%90%C2%B9%20%C3%91%E2%80%9A%C3%91%E2%82%AC%C3%90%C2%BE%C3%91%C2%8F%C3%90%C2%BD%C3%90%C2%B5%C3%91%E2%80%A0%20Lurk%3A%20%C3%91%C2%81%C3%90%C2%BF%C3%90%C2%B5%C3%91%E2%80%A0%C3%90%C2%B8%C3%90%C2%B0%C3%90%C2%BB%C3%91%C5%92%C3%90%C2%BD%C3%90%C2%BE%20%C3%90%C2%B4%C3%90%C2%BB%C3%91%C2%8F%20%C3%90%C2%A0%C3%90%C2%BE%C3%91%C2%81%C3%91%C2%81%C3%90%C2%B8%C3%90%C2%B8%20(Banking%20Trojan%20Lurk%3A%20specially%20for%20Russia)&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dridex-s-new-tricks-lead-to-global-spam-outbreak-f0b471</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20DRIDEX%C3%A2%E2%82%AC%E2%84%A2s%20New%20Tricks%20Lead%20to%20Global%20Spam%20Outbreak&amp;severity=low&amp;id=682acdbcbbaf20d303f0b471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-universal-windows-bootkit-an-analysis-of-the-mbr-bootkit-referred-to-as-hdroot-f0b46f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Universal%20Windows%20Bootkit%20An%20analysis%20of%20the%20MBR%20bootkit%20referred%20to%20as%20%C3%A2%E2%82%AC%C5%93HDRoot%C3%A2%E2%82%AC%C2%9D&amp;severity=low&amp;id=682acdbcbbaf20d303f0b46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-keep-calm-and-don-t-enable-macros-a-new-threat-actor-targets-uae-dissidents-f0b46d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Keep%20Calm%20and%20(Don%C3%A2%E2%82%AC%E2%84%A2t)%20Enable%20Macros%3A%20A%20New%20Threat%20Actor%20Targets%20UAE%20Dissidents&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b46d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-05-27-locky-docm-f0b46b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20-%202016-05-27%20-%20Locky%20-%20.docm&amp;severity=low&amp;id=682acdbcbbaf20d303f0b46b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-05-27-locky-js-in-zip-f0b469</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-05-27%20-%20Locky%20(.js%20in%20.zip)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b469</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-locky-2016-05-26-docm-f0b45c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20-%20Locky%20-%202016-05-26%20(.docm)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-05-26-locky-samples-reversed-xored-0x73-or-0x1c-samples-reversed-long-xor-key-f0b45a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-05-26%20-%20Locky%20-%20samples%20reversed%2C%20xored%20(0x73%20or%200x1c)%3B%20samples%20reversed%20%2B%20long%20xor%20key&amp;severity=low&amp;id=682acdbcbbaf20d303f0b45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-locky-2016-05-25-js-in-zip-f0b456</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=MalSpam%20-%20Locky%20-%202016-05-25%20(.js%20in%20.zip)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism-f0b454</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Wekby%20Attacks%20Use%20DNS%20Requests%20As%20Command%20and%20Control%20Mechanism&amp;severity=low&amp;id=682acdbcbbaf20d303f0b454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fbi-msil-samas-a-ransomware-flash-alerts-fbi-flash-alert-mc-000068-mw-february-18-2016-fbi-flash-alert-mc-000070-mw-march-25-2016-f0b548</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20FBI%20MSIL%2FSamas.A%20Ransomware%20Flash%20Alerts%20(FBI%20Flash%20Alert%20MC-000068-MW%2C%20February%2018%2C%202016%20%20%26%20FBI%20Flash%20Alert%20MC-000070-MW%2C%20March%2025%2C%202016)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-locky-2016-05-24-zip-with-js-downloading-partially-reversed-xor-ed-data-f0b44e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20-%20Locky%20-%202016-05-24%20(.zip%20with%20.js%2C%20downloading%20(partially%20reversed)%20XOR&apos;ed%20data)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-targeted-attacks-against-banks-in-the-middle-east-f0b44c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Targeted%20Attacks%20against%20Banks%20in%20the%20Middle%20East&amp;severity=low&amp;id=682acdbcbbaf20d303f0b44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-ke3chang-resurfaces-with-new-tidepool-malware-f0b44a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20Ke3chang%20Resurfaces%20With%20New%20TidePool%20Malware&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt-case-ruag-technical-report-f0b43d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20APT%20Case%20RUAG%20Technical%20Report&amp;severity=high&amp;id=682acdbcbbaf20d303f0b43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/locky-of-the-day-20160520-f0b43b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Locky%20of%20the%20day%20(20160520)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bolek-leaked-carberp-kbot-source-code-complicit-in-new-phishing-campaigns-f0b439</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Bolek%3A%20Leaked%20Carberp%20KBot%20Source%20Code%20Complicit%20in%20New%20Phishing%20Campaigns&amp;severity=low&amp;id=682acdbcbbaf20d303f0b439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dogspectus-ransomware-analysis-f0b452</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dogspectus%20Ransomware%20Analysis&amp;severity=low&amp;id=682acdbcbbaf20d303f0b452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-groundbait-espionage-in-ukrainian-war-zones-f0b437</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Operation%20Groundbait%3A%20Espionage%20in%20Ukrainian%20war%20zones&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hancitor-and-ruckguv-reappear-updated-and-with-vawtrak-on-deck-f0b435</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Hancitor%20and%20Ruckguv%20Reappear%2C%20Updated%20and%20With%20Vawtrak%20On%20Deck&amp;severity=low&amp;id=682acdbcbbaf20d303f0b435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-darkhotel-samples-at-wooyun-f0b531</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20DarkHotel%20samples%20at%20WooYun&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cyber-heist-attribution-f0b433</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Cyber%20Heist%20Attribution&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-chinese-language-ransomware-makes-an-appearance-f0b431</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Chinese-language%20Ransomware%20Makes%20An%20Appearance&amp;severity=low&amp;id=682acdbcbbaf20d303f0b431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-exploring-cve-2015-2545-and-its-users-f0b42d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Exploring%20CVE-2015-2545%20and%20its%20users&amp;severity=low&amp;id=682acdbcbbaf20d303f0b42d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-infostealer-trojan-uses-fiddler-proxy-json-net-f0b42b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Infostealer%20Trojan%20uses%20Fiddler%20Proxy%20%26%20Json.NET&amp;severity=low&amp;id=682acdbcbbaf20d303f0b42b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fake-scan-campaings-20160505-20160507-using-docm-dridex-f0b41e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fake%20scan%20campaings%20(20160505%20-%2020160507)%20using%20docm%20-%20Dridex&amp;severity=low&amp;id=682acdbcbbaf20d303f0b41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turbo-twist-two-64-bit-derusbi-strains-converge-f0b41c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turbo%20Twist%3A%20Two%2064-bit%20Derusbi%20Strains%20Converge&amp;severity=low&amp;id=682acdbcbbaf20d303f0b41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-prince-of-persia-infy-malware-active-in-decade-of-targeted-attacks-f0b41a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Prince%20of%20Persia%3A%20Infy%20Malware%20Active%20In%20Decade%20of%20Targeted%20Attacks&amp;severity=low&amp;id=682acdbcbbaf20d303f0b41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-over-100-000-south-korean-users-affected-by-blackmoon-campaign-f0b416</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Over%20100%2C000%20South%20Korean%20Users%20Affected%20by%20BlackMoon%20Campaign&amp;severity=low&amp;id=682acdbcbbaf20d303f0b416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-platinum-targeted-attacks-in-south-and-southeast-asia-f0b414</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PLATINUM%20Targeted%20attacks%20in%20South%20and%20Southeast%20Asia&amp;severity=low&amp;id=682acdbcbbaf20d303f0b414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-04-28-3-unknown-payload-not-accessible-f0b412</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-04-28)%20-%20%233%20(unknown%20payload%2C%20not%20accessible)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-04-28-locky-f0b40e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-04-28)%20-%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b40e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-04-27-locky-f0b3fd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%202016-04-27%20-%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-poison-ivy-activity-targeting-myanmar-asian-countries-f0b3fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Poison%20Ivy%20Activity%20Targeting%20Myanmar%2C%20Asian%20Countries&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-campaign-using-google-docs-intercepted-thousands-of-users-affected-f0b3f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20Campaign%20Using%20Google%20Docs%20Intercepted%2C%20Thousands%20of%20Users%20Affected&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rumms-the-latest-family-of-android-malware-attacking-users-in-russia-via-sms-phishing-f0b3ff</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20RuMMS%3A%20The%20Latest%20Family%20of%20Android%20Malware%20Attacking%20Users%20in%20Russia%20Via%20SMS%20Phishing&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-macro-malware-employs-advanced-obfuscation-to-avoid-detection-f0b3f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Macro%20Malware%20Employs%20Advanced%20Obfuscation%20to%20Avoid%20Detection&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-04-26-dridex-botnet-122-f0b3f5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-04-26)%20-%20Dridex%20botnet%20122&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-fareit-strain-abuses-powershell-f0b3f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20FAREIT%20Strain%20Abuses%20PowerShell&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-two-bytes-to-951m-swift-payment-system-abuse-f0b3f1</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TWO%20BYTES%20TO%20%24951M%20(SWIFT%20payment%20system%20abuse)&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b3f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-downloader-for-locky-f0b40c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Downloader%20for%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b40c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-ghost-dragon-by-cylance-f0b3ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Ghost%20Dragon%20by%20Cylance&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b3ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-poison-ivy-rat-variant-targets-hong-kong-pro-democracy-activists-f0b3ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Poison%20Ivy%20RAT%20Variant%20Targets%20Hong%20Kong%20Pro-Democracy%20Activists&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-powershell-used-for-spreading-trojan-laziok-through-google-docs-f0b3e0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20powershell%20used%20for%20spreading%20trojan.laziok%20through%20google%20docs&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-teaching-an-old-rat-new-tricks-f0b3de</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Teaching%20an%20old%20RAT%20new%20tricks&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-looking-into-a-cyber-attack-facilitator-in-the-netherlands-by-trend-micro-f0b450</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Looking%20Into%20a%20Cyber-Attack%20Facilitator%20in%20the%20Netherlands%20by%20Trend%20Micro&amp;severity=high&amp;id=682acdbcbbaf20d303f0b450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-your-package-has-been-successfully-encrypted-teslacrypt-4-1a-and-the-malware-attack-chain-f0b3d8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Your%20Package%20Has%20Been%20Successfully%20Encrypted%3A%20TeslaCrypt%204.1A%20and%20the%20Malware%20Attack%20Chain&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-ransomware-f0b3d4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ransomware&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-multigrain-point-of-sale-attackers-make-an-unhealthy-addition-to-the-pantry-f0b418</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20MULTIGRAIN%20%C3%A2%E2%82%AC%E2%80%9C%20Point%20of%20Sale%20Attackers%20Make%20an%20Unhealthy%20Addition%20to%20the%20Pantry&amp;severity=low&amp;id=682acdbcbbaf20d303f0b418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-crypto-ransomware-jigsaw-plays-nasty-games-f0b3d6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Crypto-Ransomware%20JIGSAW%20Plays%20Nasty%20Games&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-python-based-pwobot-targets-european-organizations-f0b3d0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Python-Based%20PWOBot%20Targets%20European%20Organizations&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-c-major-actors-also-used-android-blackberry-mobile-spyware-against-targets-f0b3dc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%C3%A2%E2%82%AC%C5%93Operation%20C-Major%C3%A2%E2%82%AC%C2%9D%20Actors%20Also%20Used%20Android%2C%20BlackBerry%20Mobile%20Spyware%20Against%20Targets&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cryptxxx-new-ransomware-from-the-actors-behind-reveton-dropping-via-angler-f0b3da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CryptXXX%3A%20New%20Ransomware%20From%20the%20Actors%20Behind%20Reveton%2C%20Dropping%20Via%20Angler&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-asert-threat-intelligence-report-2016-03-the-four-element-sword-engagement-f0b3d2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ASERT%20Threat%20Intelligence%20Report%202016-03%20The%20Four-Element%20Sword%20Engagement&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-retefe-is-back-in-town-f0b3ce</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Retefe%20is%20back%20in%20town&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-on-596552-qq-com-f0b71b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20on%20596552%40qq.com&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-via-spambots-2016-04-14-f0b3c1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20via%20Spambots%20(2016-04-14)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ms-office-exploit-analysis-cve-2015-1641-f0b3bf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20MS%20Office%20exploit%20analysis%20%C3%A2%E2%82%AC%E2%80%9C%20CVE-2015-1641&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-2016-04-12-f0b3bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20(2016-04-12)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/rokku-ransomware-shows-possible-link-with-chimera-f0b3bb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Rokku%20Ransomware%20shows%20possible%20link%20with%20Chimera&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-locky-variant-implements-evasion-techniques-f0b3b9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Locky%20Variant%20Implements%20Evasion%20Techniques&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mobile-devices-used-to-execute-dns-malware-against-home-routers-f0b3b7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Mobile%20Devices%20Used%20to%20Execute%20DNS%20Malware%20Against%20Home%20Routers&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-locky-ransomware-domains-followup-analysis-uncovers-130-new-indicators-f0b3b5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Locky%20Ransomware%20Domains%20%C3%A2%E2%82%AC%E2%80%9C%20Followup%20Analysis%20Uncovers%20130%20New%20Indicators&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-modpos-a-framework-lurking-in-point-of-sale-system-kernels-f0b3b3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ModPOS%3A%20A%20Framework%20Lurking%20in%20Point-of-Sale%20System%20Kernels&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-locky-the-encryptor-taking-the-world-by-storm-f0b3b1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Locky%3A%20the%20encryptor%20taking%20the%20world%20by%20storm&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/information-stealer-fareit-f0b3af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Information%20stealer%3A%20Fareit&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/kegotip-downloader-f0b3a0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Kegotip%20downloader&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-most-prevalent-android-ransomware-in-the-west-arrives-in-japan-f0b39e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Most%20prevalent%20Android%20ransomware%20in%20the%20West%20arrives%20in%20Japan&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-2016-04-06-botnet-122-f0b39c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20(2016-04-06)%20-%20botnet%20122&amp;severity=low&amp;id=682acdbcbbaf20d303f0b39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-04-05-teslacrypt-f0b39a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-04-05)%20-%20TeslaCrypt&amp;severity=low&amp;id=682acdbcbbaf20d303f0b39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-meet-remaiten-a-linux-bot-on-steroids-targeting-routers-and-potentially-other-iot-devices-f0b398</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Meet%20Remaiten%20%C3%A2%E2%82%AC%E2%80%9C%20a%20Linux%20bot%20on%20steroids%20targeting%20routers%20and%20potentially%20other%20IoT%20devices&amp;severity=low&amp;id=682acdbcbbaf20d303f0b398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gongda-vs-korean-news-f0b396</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20GongDa%20vs.%20Korean%20News&amp;severity=low&amp;id=682acdbcbbaf20d303f0b396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-taiwan-targeted-with-new-cyberespionage-back-door-trojan-f0b394</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Taiwan%20targeted%20with%20new%20cyberespionage%20back%20door%20Trojan&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b394</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-in-the-shadows-vawtrak-aims-to-get-stealthier-by-adding-new-data-cloaking-f0b392</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20In%20the%20Shadows%3A%20Vawtrak%20Aims%20to%20Get%20Stealthier%20by%20adding%20New%20Data%20Cloaking&amp;severity=low&amp;id=682acdbcbbaf20d303f0b392</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/locky-of-the-day-20160328-affid-3-f0b390</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Locky%20of%20the%20day%20(20160328)%20-%20%20affid%3D3&amp;severity=low&amp;id=682acdbcbbaf20d303f0b390</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-treasurehunt-a-custom-pos-malware-tool-f0b383</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20TREASUREHUNT%3A%20A%20CUSTOM%20POS%20MALWARE%20TOOL&amp;severity=low&amp;id=682acdbcbbaf20d303f0b383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-employs-powershell-to-infect-systems-f0b381</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20Employs%20PowerShell%20to%20Infect%20Systems&amp;severity=low&amp;id=682acdbcbbaf20d303f0b381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mcafee-labs-threat-advisory-ransomware-locky-f0b37f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20McAfee%20Labs%20Threat%20Advisory%20Ransomware-Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-surge-in-spam-campaign-delivering-locky-ransomware-downloaders-f0b37d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20SURGE%20IN%20SPAM%20CAMPAIGN%20DELIVERING%20LOCKY%20RANSOMWARE%20DOWNLOADERS&amp;severity=low&amp;id=682acdbcbbaf20d303f0b37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-self-protecting-usb-trojan-able-to-avoid-detection-f0b37b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20self-protecting%20USB%20trojan%20able%20to%20avoid%20detection&amp;severity=low&amp;id=682acdbcbbaf20d303f0b37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-petya-crypto-ransomware-overwrites-mbr-to-lock-users-out-of-their-computers-f0b379</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PETYA%20Crypto-ransomware%20Overwrites%20MBR%20to%20Lock%20Users%20Out%20of%20Their%20Computers&amp;severity=low&amp;id=682acdbcbbaf20d303f0b379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-evolution-of-samsa-malware-suggests-new-ransomware-tactics-in-play-f0b377</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Evolution%20of%20SamSa%20Malware%20Suggests%20New%20Ransomware%20Tactics%20In%20Play&amp;severity=low&amp;id=682acdbcbbaf20d303f0b377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malware-is-being-signed-with-multiple-digital-certificates-to-evade-detection-f0b375</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malware%20is%20being%20signed%20with%20multiple%20digital%20certificates%20to%20evade%20detection&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b375</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-petya-ransomware-f0b373</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Petya%20Ransomware&amp;severity=low&amp;id=682acdbcbbaf20d303f0b373</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-c-major-information-theft-campaign-targets-military-personnel-in-india-f0b371</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20C-Major%3A%20Information%20Theft%20Campaign%20Targets%20Military%20Personnel%20in%20India&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b371</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-stop-scanning-my-macro-f0b364</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20STOP%20SCANNING%20MY%20MACRO&amp;severity=low&amp;id=682acdbcbbaf20d303f0b364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-03-17-dridex-122-locky-f0b362</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-03-17)%20-%20Dridex%20(122)%2C%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/potential-spambots-2016-03-17-f0b360</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Potential%20SpamBots%20(2016-03-17)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-acedeceiver-first-ios-trojan-exploiting-apple-drm-design-flaws-to-infect-any-ios-device-f0b35e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20AceDeceiver%3A%20First%20iOS%20Trojan%20Exploiting%20Apple%20DRM%20Design%20Flaws%20to%20Infect%20Any%20iOS%20Device&amp;severity=low&amp;id=682acdbcbbaf20d303f0b35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/locky-2016-03-16-f0b35c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Locky%20(2016-03-16)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-malicious-ibanking-application-with-new-uninstall-countermeasures-f0b35a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Malicious%20iBanking%20application%20with%20new%20uninstall%20countermeasures&amp;severity=low&amp;id=682acdbcbbaf20d303f0b35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-of-the-day-2016-03-16-botnet-120-f0b358</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20of%20the%20day%20(2016-03-16)%20-%20botnet%20120&amp;severity=low&amp;id=682acdbcbbaf20d303f0b358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-transparent-tribe-f0b356</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20Transparent%20Tribe&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b356</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-03-16-locky-f0b354</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-03-16)%20-%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/potential-spambots-2016-03-16-f0b352</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Potential%20SpamBots%20(2016-03-16)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b352</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-botnet-222-20160315-f0b345</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20botnet%20222%20(20160315)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/potential-spambots-2016-03-15-f0b341</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Potential%20SpamBots%20(2016-03-15)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-locky-ransomware-arrives-via-email-attachment-f0b33f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Locky%20Ransomware%20Arrives%20via%20Email%20Attachment&amp;severity=low&amp;id=682acdbcbbaf20d303f0b33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/potential-spambots-2016-03-14-f0b343</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Potential%20SpamBots%20(2016-03-14)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-03-14-locky-teslacrypt-f0b33d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-03-14)%20-%20Locky%2C%20TeslaCrypt&amp;severity=low&amp;id=682acdbcbbaf20d303f0b33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-steamstealer-ips-f0b33b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20SteamStealer%20IPs&amp;severity=low&amp;id=682acdbcbbaf20d303f0b33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-powersniff-malware-used-in-macro-based-attacks-f0b337</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PowerSniff%20Malware%20Used%20in%20Macro-based%20Attacks&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/surprise-ransomware-2016-03-11-f0b335</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=&apos;Surprise&apos;%20Ransomware%20(2016-03-11)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-death-comes-calling-thanatos-alphabot-trojan-hits-the-market-f0b333</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Death%20Comes%20Calling%3A%20Thanatos%2FAlphabot%20Trojan%20Hits%20the%20Market&amp;severity=low&amp;id=682acdbcbbaf20d303f0b333</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-03-11-locky-f0b326</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-03-11)%20-%20Locky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-android-banking-trojan-masquerades-as-flash-player-and-bypasses-2fa-f0b324</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Android%20banking%20trojan%20masquerades%20as%20Flash%20Player%20and%20bypasses%202FA&amp;severity=low&amp;id=682acdbcbbaf20d303f0b324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-03-10-locky-teslacrypt-f0b322</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-03-10)%20-%20Locky%2C%20TeslaCrypt&amp;severity=low&amp;id=682acdbcbbaf20d303f0b322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shifting-tactics-tracking-changes-in-years-long-espionage-campaign-against-tibetans-f0b320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Shifting%20Tactics%3A%20Tracking%20changes%20in%20years-long%20espionage%20campaign%20against%20Tibetans&amp;severity=low&amp;id=682acdbcbbaf20d303f0b320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cerber-ransomware-f0b31e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Cerber%20Ransomware&amp;severity=low&amp;id=682acdbcbbaf20d303f0b31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-cerber-ransomware-not-only-encrypts-your-data-but-also-speaks-to-you-f0b31c</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Cerber%20Ransomware%20not%20only%20Encrypts%20Your%20Data%20But%20Also%20Speaks%20to%20You&amp;severity=low&amp;id=682acdbcbbaf20d303f0b31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-2016-03-09-locky-teslacrypt-f0b31a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20(2016-03-09)%20-%20Locky%2C%20TeslaCrypt&amp;severity=low&amp;id=682acdbcbbaf20d303f0b31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-2016-03-09-botnet-220-f0b318</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20(2016-03-09)%20-%20botnet%20220&amp;severity=low&amp;id=682acdbcbbaf20d303f0b318</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/badmirror-new-android-malware-family-spotted-by-sherlockdroid-f0b301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=BadMirror%3A%20New%20Android%20Malware%20Family%20Spotted%20by%20SherlockDroid&amp;severity=low&amp;id=682acdbcbbaf20d303f0b301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/teslacrypt-2016-03-08-f0b2ff</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=TeslaCrypt%20(2016-03-08)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/dridex-2016-03-07-f0b2fd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Dridex%20(2016-03-07)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-locky-dga-threat-actor-s-f0b2fb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20LOCKY%20DGA%20THREAT%20ACTOR(S)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer-f0b307</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20OS%20X%20Ransomware%20KeRanger%20Infected%20Transmission%20BitTorrent%20Client%20Installer&amp;severity=low&amp;id=682acdbcbbaf20d303f0b307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/malspam-collection-2016-03-02-locky-teslacrypt-f0b2f9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Malspam%20collection%20(2016-03-02)%20-%20Locky%2C%20TeslaCrypt&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-hacking-team-samples-osx-f0b2e6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20New%20Hacking%20team%20samples%20(OSX)&amp;severity=high&amp;id=682acdbcbbaf20d303f0b2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-atmzombie-banking-trojan-in-israeli-waters-f0b2e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20ATMZombie%3A%20banking%20trojan%20in%20Israeli%20waters&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dust-storm-campaign-targeting-japanese-critical-infrastructure-f0b2dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Dust%20Storm%20Campaign%20Targeting%20Japanese%20Critical%20Infrastructure&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dridex-actors-get-in-the-ransomware-game-with-locky-f0b2da</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Dridex%20Actors%20Get%20In%20the%20Ransomware%20Game%20With%20%22Locky%22&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/additional-ips-for-turla-uroburos-from-circl-passive-ssl-f0b6a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Additional%20IPs%20for%20Turla%2FUroburos%20from%20CIRCL%20Passive%20SSL&amp;severity=high&amp;id=682acdbcbbaf20d303f0b6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-look-into-fysbis-sofacy-s-linux-backdoor-f0b2e8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20Look%20Into%20Fysbis%3A%20Sofacy%C3%A2%E2%82%AC%E2%84%A2s%20Linux%20Backdoor&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-turla-harnessing-ssl-certificates-using-infrastructure-chaining-f0b2e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Turla%20-%20Harnessing%20SSL%20Certificates%20Using%20Infrastructure%20Chaining&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phishing-sites-and-php-kits-february-2016-part-1-by-techhelplist-f0b73a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20phishing%20sites%20and%20php%20kits%20-%20February%202016%20-%20Part%201%20by%20TechHelpList&amp;severity=low&amp;id=682acdbdbbaf20d303f0b73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-introducing-hi-zor-rat-by-fidelis-f0b6c8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Introducing%20Hi-Zor%20RAT%20by%20Fidelis&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-actors-use-sketchy-dating-website-to-launch-new-home-router-attacks-by-damballa-f0b6c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Threat%20Actors%20Use%20Sketchy%20Dating%20Website%20to%20Launch%20New%20Home%20Router%20Attacks%20by%20Damballa&amp;severity=high&amp;id=682acdbcbbaf20d303f0b6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-android-bankosy-all-ears-on-voice-call-based-2fa-by-symantec-f0b734</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Android.Bankosy%3A%20All%20ears%20on%20voice%20call-based%202FA%20by%20Symantec&amp;severity=high&amp;id=682acdbdbbaf20d303f0b734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-puttering-into-the-future-by-cylance-f0b67a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Puttering%20into%20the%20Future...by%20Cylance&amp;severity=high&amp;id=682acdbcbbaf20d303f0b67a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-clickjacking-campaign-plays-on-european-cookie-law-f0b316</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20%20Clickjacking%20Campaign%20Plays%20on%20European%20Cookie%20Law&amp;severity=low&amp;id=682acdbcbbaf20d303f0b316</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-android-based-smart-tvs-hit-by-backdoor-spread-via-malicious-app-f0b2de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Android-based%20Smart%20TVs%20Hit%20By%20Backdoor%20Spread%20Via%20Malicious%20App&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phishing-sites-and-php-kits-january-2016-part-1-by-techhelplist-f0b56b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20phishing%20sites%20and%20php%20kits%20-%20January%202016%20-%20Part%201%20%20by%20TechHelpList&amp;severity=low&amp;id=682acdbcbbaf20d303f0b56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-neutrino-exploit-kit-one-flash-file-to-rule-them-all-by-spiderlabs-f0b6a3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Neutrino%20Exploit%20Kit%20%C3%A2%E2%82%AC%E2%80%9C%20One%20Flash%20File%20to%20Rule%20Them%20All%20by%20SpiderLabs&amp;severity=low&amp;id=682acdbcbbaf20d303f0b6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hunting-for-malware-with-machine-learning-f0b2d8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Hunting%20for%20Malware%20with%20Machine%20Learning&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-phishing-sites-and-exploit-kits-december-2015-part-2-by-techhelplist-f0b5e9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Phishing%20sites%20and%20exploit%20kits%20december%202015%20-%20part%202%20by%20TechHelpList&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-packrat-seven-years-of-a-south-american-threat-actor-f0b2f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Packrat%3A%20Seven%20Years%20of%20a%20South%20American%20Threat%20Actor&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b2f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ioc-from-ponmocup-malware-f0b5dd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20IOC%20from%20ponmocup%20malware&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-passive-dns-ponmocup-malware-109-74-195-149-in-virustotal-f0b571</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Passive%20DNS%20ponmocup%20malware%20-%20109.74.195.149%20in%20VirusTotal&amp;severity=low&amp;id=682acdbcbbaf20d303f0b571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-plugx-f0b2f7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PlugX-%C3%91%E2%80%9A%20%C3%93%C2%A9%C3%91%E2%82%AC%C3%91%E2%80%9A%C3%91%C2%81%C3%93%C2%A9%C3%90%C2%BD%20%C3%91%C2%81%C3%90%C2%B8%C3%91%C2%81%C3%91%E2%80%9A%C3%90%C2%B5%C3%90%C2%BC%C3%90%C2%B8%C3%90%C2%B9%C3%90%C2%B3%20%C3%91%E2%80%A0%C3%91%C2%8D%C3%90%C2%B2%C3%91%C2%8D%C3%91%E2%82%AC%C3%90%C2%BB%C3%91%C2%8D%C3%91%E2%80%A6%20%C3%90%C2%BD%C3%91%C5%92&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b2f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-apt-28-evolving-threats-dissection-of-a-cyber-espionage-attack-f0b738</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Expansion%20on%20APT-28%20-%20Evolving%20Threats%3A%20dissection%20of%20a%20Cyber-Espionage%20attack&amp;severity=high&amp;id=682acdbdbbaf20d303f0b738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-yara-rules-for-glassrat-in-loki-ioc-scanner-by-florian-roth-f0b732</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Yara%20rules%20for%20GlassRAT%20in%20Loki%20IOC%20Scanner%20by%20Florian%20Roth&amp;severity=low&amp;id=682acdbdbbaf20d303f0b732</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-enrichment-on-osint-strontium-a-profile-of-a-persistent-and-motivated-adversary-f0b721</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Enrichment%20on%20OSINT%20-%20STRONTIUM%3A%20A%20profile%20of%20a%20persistent%20and%20motivated%20adversary&amp;severity=high&amp;id=682acdbdbbaf20d303f0b721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-casino-malvertising-campaign-by-malwarebytes-f0b5eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Casino%20Malvertising%20Campaign%20by%20MalwareBytes&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-8104-n-a-in-n-a-bf55eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-8104%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9847c4522896dcbf55eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-bookworm-trojan-a-model-of-modular-architecture-by-palo-alto-unit-42-f0b604</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Bookworm%20Trojan%3A%20A%20Model%20of%20Modular%20Architecture%20by%20Palo%20Alto%20Unit%2042&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-macro-documents-with-xor-encoded-payloads-by-phishme-f0b646</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Macro%20documents%20with%20XOR%20Encoded%20Payloads%20by%20PhishMe&amp;severity=low&amp;id=682acdbcbbaf20d303f0b646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cryptowall-v4-emerges-days-after-cyber-threat-alliance-report-by-palo-alto-networks-unit-42-f0b67e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20CryptoWall%20v4%20Emerges%20Days%20After%20Cyber%20Threat%20Alliance%20Report%20by%20Palo%20Alto%20Networks%20Unit%2042&amp;severity=low&amp;id=682acdbcbbaf20d303f0b67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-systematic-cyber-attacks-against-israeli-and-palestinian-targets-going-on-for-a-year-by-norman-f0b542</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Expansion%20on%20Systematic%20cyber%20attacks%20against%20Israeli%20and%20Palestinian%20targets%20going%20on%20for%20a%20year%20by%20Norman&amp;severity=low&amp;id=682acdbcbbaf20d303f0b542</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fidelis-threat-advisory-1019-ratcheting-down-on-jsocket-a-pc-and-android-threat-by-fidelis-cybersecurity-f0b554</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Fidelis%20Threat%20Advisory%20%231019%20Ratcheting%20Down%20on%20JSocket%3A%20A%20PC%20and%20Android%20Threat%20by%20Fidelis%20Cybersecurity&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-duuzer-back-door-trojan-targets-south-korea-to-take-over-computers-by-symantec-f0b5b1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Duuzer%20back%20door%20Trojan%20targets%20South%20Korea%20to%20take%20over%20computers%20by%20Symantec&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-chinese-taomike-monetization-library-steals-sms-messages-by-alienvault-and-palo-alto-networks-f0b584</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Chinese%20Taomike%20Monetization%20Library%20Steals%20SMS%20Messages%20by%20AlienVault%20and%20Palo%20Alto%20networks&amp;severity=low&amp;id=682acdbcbbaf20d303f0b584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-digging-for-groundhogs-holes-in-your-linux-server-by-checkpoint-f0b625</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Digging%20for%20Groundhogs%3A%20Holes%20in%20Your%20Linux%20Server%20by%20Checkpoint&amp;severity=low&amp;id=682acdbcbbaf20d303f0b625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trojan-win32-banker-nwt-by-alienvault-and-telus-f0b5af</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Trojan.Win32.Banker.NWT%20by%20AlienVault%20and%20Telus&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-targeted-malware-attacks-against-ngo-linked-to-attacks-on-burmese-government-websites-by-citizen-labs-f0b6a5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Targeted%20Malware%20Attacks%20against%20NGO%20Linked%20to%20Attacks%20on%20Burmese%20Government%20Websites%20by%20Citizen%20Labs&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-case-study-of-malicious-actors-going-postal-by-cert-pl-f0b5c8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Case%20Study%20of%20Malicious%20Actors%3A%20Going%20Postal%20by%20CERT.pl&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pay-no-attention-to-the-server-behind-the-proxy-mapping-finfisher-s-continuing-proliferation-by-citizen-lab-f0b623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Pay%20No%20Attention%20to%20the%20Server%20Behind%20the%20Proxy%3A%20Mapping%20FinFisher%C3%A2%E2%82%AC%E2%84%A2s%20Continuing%20Proliferation%20by%20Citizen%20Lab&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-discovery-ties-between-corebot-and-darknet-crypt-service-by-damballa-f0b62d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20Discovery%3A%20Ties%20Between%20Corebot%20and%20Darknet%20Crypt%20Service%20by%20Damballa&amp;severity=low&amp;id=682acdbcbbaf20d303f0b62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dyre-malware-campaigners-innovate-with-distribution-techniques-by-proofpoint-f0b64c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Dyre%20Malware%20Campaigners%20Innovate%20with%20Distribution%20Techniques%20by%20ProofPoint&amp;severity=low&amp;id=682acdbcbbaf20d303f0b64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cisco-talos-thwarts-access-to-massive-international-exploit-kit-generating-60m-annually-from-ransomware-alone-by-cisco-talos-f0b54c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Cisco%20Talos%20Thwarts%20Access%20to%20Massive%20International%20Exploit%20Kit%20Generating%20%2460M%20Annually%20From%20Ransomware%20Alone%20by%20Cisco%20Talos&amp;severity=low&amp;id=682acdbcbbaf20d303f0b54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-yispecter-first-ios-malware-that-attacks-non-jailbroken-apple-ios-devices-by-abusing-private-apis-by-palo-alto-networks-unit-42-f0b5ab</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20YiSpecter%3A%20First%20iOS%20Malware%20That%20Attacks%20Non-jailbroken%20Apple%20iOS%20Devices%20by%20Abusing%20Private%20APIs%20by%20Palo%20Alto%20Networks%20Unit%2042&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-when-elf-billgates-met-windows-by-arkoon-netasq-f0b665</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20When%20ELF.BillGates%20met%20Windows%20by%20Arkoon%2BNetasq&amp;severity=low&amp;id=682acdbcbbaf20d303f0b665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-infected-korean-website-installs-banking-malware-by-cyphort-f0b71d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Infected%20Korean%20Website%20Installs%20Banking%20Malware%20by%20Cyphort&amp;severity=low&amp;id=682acdbdbbaf20d303f0b71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dyreza-campaigners-set-sights-on-the-fulfillment-and-warehousing-industry-by-proofpoint-f0b5df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Dyreza%20Campaigners%20Set%20Sights%20on%20the%20Fulfillment%20and%20Warehousing%20Industry%20by%20ProofPoint&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-gaza-cybergang-where-s-your-ir-team-by-kaspersky-f0b58e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Gaza%20cybergang%2C%20where%C3%A2%E2%82%AC%E2%84%A2s%20your%20IR%20team%3F%20by%20Kaspersky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-recorded-future-using-shodan-to-find-rat-controllers-f0b563</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Recorded%20Future%20using%20shodan%20to%20find%20RAT%20controllers&amp;severity=low&amp;id=682acdbcbbaf20d303f0b563</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-on-mwi-by-security-researcher-f0b6fe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20on%20MWI%20by%20security%20researcher&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-microsoft-word-intruder-gets-down-to-business-operation-pony-express-by-sophos-f0b567</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Microsoft%20Word%20Intruder%20gets%20down%20to%20business%3A%20Operation%20Pony%20Express%20by%20Sophos&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-guaranteed-clicks-mobile-app-company-takes-control-of-android-phones-f0b8ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Guaranteed%20Clicks%3A%20Mobile%20App%20Company%20Takes%20Control%20of%20Android%20Phones&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-meet-greendispenser-a-new-breed-of-atm-malware-by-proofpoint-f0b73e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Meet%20GreenDispenser%3A%20A%20New%20Breed%20of%20ATM%20Malware%20by%20ProofPoint&amp;severity=low&amp;id=682acdbdbbaf20d303f0b73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-an-update-on-nuclear-reverse-engineering-by-zscaler-f0b586</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20An%20Update%20on%20Nuclear%20(Reverse)%20Engineering%20by%20Zscaler&amp;severity=low&amp;id=682acdbcbbaf20d303f0b586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-fast-and-furious-drive-by-uncovering-ptdark-attack-sites-by-fortinet-f0b5e5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20A%20Fast%20and%20Furious%20Drive-By%3A%20Uncovering%20PTDark%20Attack%20Sites%20by%20Fortinet&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-password-hygiene-hiding-your-identity-is-difficult-for-attackers-and-adulterers-by-threat-geek-f0b699</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Password%20Hygiene%3A%20Hiding%20Your%20Identity%20is%20Difficult%20for%20Attackers%20and%20Adulterers%20by%20Threat%20Geek&amp;severity=low&amp;id=682acdbcbbaf20d303f0b699</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-in-pursuit-of-optical-fibers-and-troop-intel-targeted-attack-distributes-plugx-in-russia-by-proofpoint-f0b5a7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20In%20Pursuit%20of%20Optical%20Fibers%20and%20Troop%20Intel%3A%20Targeted%20Attack%20Distributes%20PlugX%20in%20Russia%20by%20ProofPoint&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-dukes-7-years-of-russian-cyberespionage-f0b305</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20THE%20DUKES%207%20years%20of%20Russian%20cyberespionage&amp;severity=high&amp;id=682acdbcbbaf20d303f0b305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-shade-encryptor-a-double-threat-by-kaspersky-f0b678</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Shade%20Encryptor%3A%20a%20Double%20Threat%20by%20Kaspersky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b678</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-peek-inside-an-affiliate-s-malspam-operation-kovter-and-miuref-boaxxe-infections-by-phishme-f0b6dd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20A%20Peek%20Inside%20an%20Affiliate%C3%A2%E2%82%AC%E2%84%A2s%20Malspam%20Operation%3A%20Kovter%20and%20Miuref%2FBoaxxe%20Infections%20by%20PhishMe&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-musical-chairs-multi-year-campaign-involving-new-variant-of-gh0st-malware-by-palo-alto-networks-unit-42-f0b59f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Musical%20Chairs%3A%20Multi-Year%20Campaign%20Involving%20New%20Variant%20of%20Gh0st%20Malware%20by%20Palo%20Alto%20Networks%20Unit%2042&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b59f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-carbanak-gang-is-back-and-packing-new-guns-by-eset-f0b58c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Carbanak%20gang%20is%20back%20and%20packing%20new%20guns%20by%20Eset&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-research-team-goes-beyond-the-exploit-in-search-of-payloads-from-ms15-093-by-bit9-f0b669</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Threat%20Research%20Team%20Goes%20%C3%A2%E2%82%AC%C5%93Beyond%20the%20Exploit%C3%A2%E2%82%AC%C2%9D%20in%20Search%20of%20Payloads%20from%20MS15-093%20by%20bit9&amp;severity=low&amp;id=682acdbcbbaf20d303f0b669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-defending-the-white-elephant-by-arbor-networks-f0b6c6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Defending%20the%20White%20Elephant%20by%20Arbor%20Networks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-keyraider-ios-malware-steals-over-225-000-apple-accounts-to-create-free-app-utopia-by-palo-alto-networks-unit-42-f0b67c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20KeyRaider%3A%20iOS%20Malware%20Steals%20Over%20225%2C000%20Apple%20Accounts%20to%20Create%20Free%20App%20Utopia%20by%20Palo%20Alto%20Networks%20Unit%2042&amp;severity=low&amp;id=682acdbcbbaf20d303f0b67c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-rtf-exploit-installs-italian-rat-uwarrior-by-palo-alto-f0b736</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20RTF%20Exploit%20Installs%20Italian%20RAT%3A%20uWarrior%20by%20Palo%20Alto&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b736</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-activity-of-the-blue-termite-apt-by-alienvault-f0b65f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20activity%20of%20the%20Blue%20Termite%20APT%20by%20AlienVault&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-curious-case-of-the-document-exploiting-an-unknown-vulnerability-part-2-rats-hackers-and-rihanna-by-fortinet-f0b61b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Curious%20Case%20of%20the%20Document%20Exploiting%20an%20Unknown%20Vulnerability%20%C3%A2%E2%82%AC%E2%80%9C%20Part%202%3A%20RATs%2C%20Hackers%20and%20Rihanna%20by%20Fortinet&amp;severity=low&amp;id=682acdbcbbaf20d303f0b61b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tinted-cve-decoy-spearphising-attempt-on-central-bank-of-armenia-employees-by-bluecoat-f0b644</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Tinted%20CVE%20decoy%20spearphising%20attempt%20on%20Central%20Bank%20of%20Armenia%20employees%20by%20BlueCoat&amp;severity=low&amp;id=682acdbcbbaf20d303f0b644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cheshire-cat-f0b715</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Cheshire%20Cat&amp;severity=high&amp;id=682acdbdbbaf20d303f0b715</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-potao-express-samples-from-contagiodump-f0b5a3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Potao%20Express%20samples%20from%20contagiodump&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-darkhotel-s-attacks-in-2015-by-kaspersky-f0b640</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Darkhotel%C3%A2%E2%82%AC%E2%84%A2s%20attacks%20in%202015%20by%20Kaspersky&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-italian-connection-an-analysis-of-exploit-supply-chains-and-digital-quartermasters-by-shadowserver-f0b5c4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Italian%20Connection%3A%20An%20analysis%20of%20exploit%20supply%20chains%20and%20digital%20quartermasters%20by%20Shadowserver&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-revealing-the-cyber-kraken-threat-group-3390-emissary-panda-by-secureworks-f0b590</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Revealing%20the%20Cyber-Kraken%20(Threat%20Group%203390%20%2F%20Emissary%20Panda)%20by%20SecureWorks&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fidelis-threat-advisory-1018-looking-at-the-sky-for-a-darkcomet-from-the-fidelis-cybersecurity-f0b54a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Fidelis%20Threat%20Advisory%20%231018%20Looking%20at%20the%20Sky%20for%20a%20DarkComet%20from%20the%20Fidelis%20Cybersecurity&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-technical-analysis-tracks-the-sakula-malware-family-by-secureworks-f0b339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Technical%20Analysis%20Tracks%20the%20Sakula%20Malware%20Family%20by%20SecureWorks&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-black-vine-formidable-cyberespionage-group-targeted-aerospace-healthcare-since-2012-by-symantec-f0b2d6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Black%20Vine%3A%20Formidable%20cyberespionage%20group%20targeted%20aerospace%2C%20healthcare%20since%202012%20by%20Symantec&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-angler-s-best-friends-by-sans-isc-diary-f0b6ba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Angler&apos;s%20best%20friends%20by%20SANS%20ISC%20Diary&amp;severity=low&amp;id=682acdbcbbaf20d303f0b6ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-milano-hacking-team-malware-detection-tool-iocs-by-rook-security-f0b573</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Milano%20Hacking%20Team%20malware%20detection%20tool%20%26%20IOCs%20by%20Rook%20Security&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-hacking-team-ioc-s-released-by-rook-security-f0b56d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20Hacking%20Team%20IOC%C3%A2%E2%82%AC%E2%84%A2s%20Released%20by%20Rook%20security&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-microsoft-office-zero-day-cve-2015-2424-leveraged-by-tsar-team-report-by-isight-f0b544</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Microsoft%20Office%20Zero-Day%20CVE-2015-2424%20Leveraged%20By%20Tsar%20Team%20report%20by%20iSight&amp;severity=high&amp;id=682acdbcbbaf20d303f0b544</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-an-in-depth-look-at-how-pawn-storm-s-java-zero-day-was-used-by-trend-micro-f0b6b8</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20An%20In-Depth%20Look%20at%20How%20Pawn%20Storm%C3%A2%E2%82%AC%E2%84%A2s%20Java%20Zero-Day%20Was%20Used%20by%20Trend%20Micro&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b6b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-exploring-xyz-another-shady-tld-report-by-blue-coat-f0b69f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Exploring%20.XYZ%20(Another%20Shady%20TLD%20Report)%20by%20Blue%20Coat&amp;severity=low&amp;id=682acdbcbbaf20d303f0b69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tracking-minidionis-cozycar-s-new-ride-is-related-to-seaduke-by-unit-42-palo-alto-networks-f0b60c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Tracking%20MiniDionis%3A%20CozyCar%C3%A2%E2%82%AC%E2%84%A2s%20New%20Ride%20Is%20Related%20to%20Seaduke%20by%20Unit%2042%20Palo%20Alto%20Networks&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-osint-ding-your-rat-has-been-delivered-by-cisco-talos-f0b63a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20expansion%20on%20OSINT%20-%20Ding!%20Your%20RAT%20has%20been%20delivered%20by%20Cisco%20Talos&amp;severity=low&amp;id=682acdbcbbaf20d303f0b63a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-morpho-profiting-from-high-level-corporate-attacks-by-symantec-f0b5c2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Morpho%3A%20Profiting%20from%20high-level%20corporate%20attacks%20by%20Symantec&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-hacking-team-vps-ips-using-passivetotal-by-brandon-dixon-f0b5c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Expansion%20on%20hacking%20team%20VPS%20IPs%20using%20PassiveTotal%20by%20Brandon%20Dixon&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-pony-up-tracing-pony-s-threat-cycle-and-multi-stage-infection-chain-by-damballa-f0b580</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Pony%20Up%3A%20Tracing%20Pony%C3%A2%E2%82%AC%E2%84%A2s%20Threat%20Cycle%20and%20Multi-Stage%20Infection%20Chain%20by%20Damballa&amp;severity=low&amp;id=682acdbcbbaf20d303f0b580</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-mmd-0033-2015-linux-xorddos-infection-incident-report-cnc-hostasa-org-f0b8cf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20MMD-0033-2015%20-%20Linux%2FXorDDoS%20infection%20incident%20report%20(CNC%3A%20HOSTASA.ORG)&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-poseidon-and-backoff-pos-the-links-and-similarities-by-team-cymru-f0b5c0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Poseidon%20And%20Backoff%20Pos%20%C3%A2%E2%82%AC%E2%80%9C%20The%20Links%20And%20Similarities%20by%20Team%20Cymru&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-targeted-attacks-against-tibetan-and-hong-kong-groups-exploiting-cve-2014-4114-by-citizen-lab-f0b69d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Targeted%20Attacks%20against%20Tibetan%20and%20Hong%20Kong%20Groups%20Exploiting%20CVE-2014-4114%20by%20Citizen%20Lab&amp;severity=low&amp;id=682acdbcbbaf20d303f0b69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-evilgrab-delivered-by-watering-hole-attack-on-president-of-myanmar-s-website-by-palo-alto-unit-42-f0b6f6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Evilgrab%20Delivered%20by%20Watering%20Hole%20Attack%20on%20President%20of%20Myanmar%C3%A2%E2%82%AC%E2%84%A2s%20Website%20by%20Palo%20Alto%20Unit%2042&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-angler-ek-more-obfuscation-fake-extensions-and-other-nonsense-by-talos-f0b688</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Angler%20EK%3A%20More%20Obfuscation%2C%20Fake%20Extensions%2C%20and%20Other%20Nonsense%20by%20Talos&amp;severity=low&amp;id=682acdbcbbaf20d303f0b688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-paying-days-cryptowall-3-0-campaign-via-magnitude-ek-report-by-malwarefor-me-f0b608</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20&apos;Paying-Days&apos;%20CryptoWall%203.0%20Campaign%20via%20Magnitude%20EK%20report%20by%20malwarefor.me&amp;severity=low&amp;id=682acdbcbbaf20d303f0b608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-teenage-mutant-malvertiser-network-by-fireeye-f0b6b6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Teenage%20Mutant%20Malvertiser%20Network%20by%20FireEye&amp;severity=low&amp;id=682acdbcbbaf20d303f0b6b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trojanized-putty-software-by-cisco-csirt-f0b6c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Trojanized%20PuTTY%20Software%20by%20Cisco%20CSIRT&amp;severity=low&amp;id=682acdbcbbaf20d303f0b6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cmstar-downloader-lurid-and-enfal-s-new-cousin-by-palo-alto-unit-42-f0b5d0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Cmstar%20Downloader%3A%20Lurid%20and%20Enfal%C3%A2%E2%82%AC%E2%84%A2s%20New%20Cousin%20by%20Palo%20Alto%20Unit%2042&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cylance-spear-team-a-threat-actor-resurfaces-from-cylance-f0b642</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Cylance%20SPEAR%20Team%3A%20A%20Threat%20Actor%20Resurfaces%20from%20Cylance&amp;severity=low&amp;id=682acdbcbbaf20d303f0b642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-introducing-hats-highly-annoying-threats-by-bluecoat-f0b621</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Introducing%20HATs%3A%20Highly%20Annoying%20Threats%20by%20BlueCoat&amp;severity=low&amp;id=682acdbcbbaf20d303f0b621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dalexis-ctb-locker-malspam-campaign-by-sans-internet-storm-center-f0b61d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Dalexis%2FCTB-Locker%20malspam%20campaign%20by%20SANS%20Internet%20Storm%20Center&amp;severity=low&amp;id=682acdbcbbaf20d303f0b61d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-enterprises-hit-by-bartalex-macro-malware-in-recent-spam-outbreak-by-trend-micro-f0b5fc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Enterprises%20Hit%20by%20BARTALEX%20Macro%20Malware%20in%20Recent%20Spam%20Outbreak%20by%20Trend%20Micro&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-attacks-against-israeli-palestinian-interests-by-pwc-f0b5ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Attacks%20against%20Israeli%20%26%20Palestinian%20interests%20by%20PwC&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-based-on-shared-nameserver-with-a-lot-of-sofacy-domains-f0b717</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20based%20on%20shared%20nameserver%20with%20a%20lot%20of%20Sofacy%20domains&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b717</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-sofacy-plot-thickens-by-pwc-f0b6a9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Sofacy%20plot%20thickens%20by%20PwC&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-without-a-trace-fileless-malware-spotted-in-the-wild-by-trend-micro-f0b63e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Without%20a%20Trace%3A%20Fileless%20Malware%20Spotted%20in%20the%20Wild%20by%20Trend%20Micro&amp;severity=low&amp;id=682acdbcbbaf20d303f0b63e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/20150415d-fareit-malware-targeting-steam-users-from-threatconnect-f0b700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=20150415D%3A%20Fareit%20Malware%20Targeting%20Steam%20Users%20from%20ThreatConnect&amp;severity=low&amp;id=682acdbdbbaf20d303f0b700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets-by-palo-alto-unit42-f0b6d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Unit%2042%20Identifies%20New%20DragonOK%20Backdoor%20Malware%20Deployed%20Against%20Japanese%20Targets%20by%20Palo%20Alto%20Unit42&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt30-detection-rules-loki-scanner-yara-rules-by-florian-roth-f0b648</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20APT30%20detection%20rules%20Loki%20Scanner%20Yara%20rules%20by%20Florian%20Roth&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt-30-and-the-mechanics-of-a-long-running-cyber-espionage-operation-by-fireeye-f0b582</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20APT%2030%20and%20the%20Mechanics%20of%20a%20Long-Running%20Cyber%20Espionage%20Operation%20by%20FireEye&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b582</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fbi-flash-message-mc-000055-bt-ec3-ic4-takedown-of-the-aaeh-botnet-f0b600</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=FBI%20Flash%20Message%3A%20MC-000055-BT%20%20EC3%2FIC4%20takedown%20of%20the%20AAEH%20botnet&amp;severity=low&amp;id=682acdbcbbaf20d303f0b600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-kriptovor-infostealer-ransomware-by-fireeye-f0b5ed</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Analysis%20of%20KRIPTOVOR%3A%20Infostealer%2BRansomware%20by%20FireEye&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-winnti-opsmn-new-malware-re-report-by-novetta-f0b5cc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Winnti%20OpSMN%20new%20malware%20RE%20report%20by%20Novetta&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-spotlight-spam-served-with-a-side-of-dridex-from-cisco-talos-f0b60a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Threat%20Spotlight%3A%20Spam%20Served%20With%20a%20Side%20of%20Dridex%20from%20Cisco%20Talos&amp;severity=low&amp;id=682acdbcbbaf20d303f0b60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt-volatile-cedar-apt-yara-rules-by-florian-roth-f0b6e7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20APT%20Volatile%20Cedar%20APT%20yara%20rules%20by%20Florian%20Roth&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-additional-yara-rules-for-equation-drug-by-florian-roth-f0b659</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Additional%20yara%20rules%20for%20Equation%20Drug%20by%20Florian%20Roth&amp;severity=high&amp;id=682acdbcbbaf20d303f0b659</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-dyre-wolf-report-from-ibm-f0b5fe</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Dyre%20Wolf%20report%20from%20IBM&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-angler-exploit-kit-utilizing-302-cushioning-and-domain-shadowing-by-zscaler-f0b550</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Angler%20Exploit%20Kit%20Utilizing%20302%20Cushioning%20and%20Domain%20Shadowing%20by%20Zscaler&amp;severity=low&amp;id=682acdbcbbaf20d303f0b550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-plugx-goes-to-the-registry-and-india-f0b492</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20PlugX%20goes%20to%20the%20registry%20(and%20India)&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-tibetan-uprising-day-malware-attacks-by-citizen-labs-f0b682</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Tibetan%20Uprising%20Day%20Malware%20Attacks%20by%20Citizen%20Labs&amp;severity=low&amp;id=682acdbcbbaf20d303f0b682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-hacking-team-reloaded-us-based-ethiopian-journalists-again-targeted-with-spyware-by-citizen-lab-f0b6e1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Hacking%20Team%20Reloaded%3F%20US-Based%20Ethiopian%20Journalists%20Again%20Targeted%20with%20Spyware%20by%20Citizen%20Lab&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-who-s-really-spreading-through-the-bright-star-by-securelist-kaspersky-f0b661</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Who&apos;s%20Really%20Spreading%20through%20the%20Bright%20Star%3F%20by%20Securelist%20%2F%20Kaspersky&amp;severity=low&amp;id=682acdbcbbaf20d303f0b661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-malcious-chm-file-by-opendns-f0b60e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Analysis%20of%20malcious%20CHM%20file%20by%20OpenDNS&amp;severity=low&amp;id=682acdbcbbaf20d303f0b60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-threat-spotlight-angler-lurking-in-the-domain-shadows-by-cisco-talos-group-f0b54e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Threat%20Spotlight%3A%20Angler%20Lurking%20in%20the%20Domain%20Shadows%20by%20Cisco%20Talos%20group&amp;severity=low&amp;id=682acdbcbbaf20d303f0b54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-0240-n-a-in-n-a-bd7337</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-0240%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d9817c4522896dcbd7337</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-deeper-look-into-scanbox-tlp-white-report-from-pwc-uk-f0b66b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20A%20deeper%20look%20into%20ScanBox%20TLP%3AWHITE%20report%20from%20PWC%20UK&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-deeper-look-into-scanbox-tlp-green-report-from-pwc-uk-f0b602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20deeper%20look%20into%20ScanBox%20TLP%3AGREEN%20report%20from%20PWC%20UK&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-backdoor-win32-equationdrug-a-report-by-telus-f0b71f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Backdoor.Win32.Equationdrug.A%20report%20by%20Telus&amp;severity=high&amp;id=682acdbdbbaf20d303f0b71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/fessleak-before-it-was-cool-by-opendns-f0b713</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Fessleak%20before%20It%20Was%20Cool%20by%20OpenDNS&amp;severity=low&amp;id=682acdbdbbaf20d303f0b713</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-babar-espionage-software-finally-found-and-put-under-the-microscope-by-gdata-f0b6a1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Babar%3A%20espionage%20software%20finally%20found%20and%20put%20under%20the%20microscope%20by%20gdata&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-arid-viper-gaza-vs-israel-cyber-conflict-by-trend-micro-f0b58a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Arid%20Viper%3A%20Gaza%20vs%20Israel%20Cyber%20Conflict%20by%20Trend%20Micro&amp;severity=low&amp;id=682acdbcbbaf20d303f0b58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-msrt-february-update-from-microsoft-f0b697</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20MSRT%20February%20update%20from%20Microsoft&amp;severity=low&amp;id=682acdbcbbaf20d303f0b697</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-f0xy-malware-is-intelligent-employs-cunning-stealth-trickery-from-websense-f0b6d7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20&apos;f0xy&apos;%20malware%20is%20intelligent%20-%20employs%20cunning%20stealth%20%26%20trickery%20from%20Websense&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-i-know-you-want-me-unplugging-plugx-from-takahiro-haruyama-hiroshi-suzuki-black-hat-asia-2014-presentation-f0b569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20I%20Know%20You%20Want%20Me%20-%20Unplugging%20PlugX%20from%20Takahiro%20Haruyama%20%26%20Hiroshi%20Suzuki%20Black%20Hat%20Asia%202014%20presentation&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-project-cobra-another-extensible-framework-used-by-the-uroburos-actors-from-gdata-f0b64a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Analysis%20of%20Project%20Cobra%20Another%20extensible%20framework%20used%20by%20the%20Uroburos%C3%A2%E2%82%AC%E2%84%A2%20actors%20from%20Gdata&amp;severity=high&amp;id=682acdbcbbaf20d303f0b64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/new-elf-malware-on-shellshock-the-chinaz-2a7a1fac</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=New%20ELF%20malware%20on%20Shellshock%3A%20the%20ChinaZ&amp;severity=medium&amp;id=6852ab88a8c92127438848f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2015-0973-na-in-na-09bca647</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2015-0973%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938e5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-potential-cnc-base-on-ccne-activities-described-in-nsa-document-leak-f0b75d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Potential%20CNC%20base%20on%20CCNE%20activities%20described%20in%20NSA%20document%20leak&amp;severity=low&amp;id=682acdbdbbaf20d303f0b75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-dtl-12012015-01-hong-kong-swc-attack-from-dragon-threat-labs-f0b68a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20DTL-12012015-01%3A%20Hong%20Kong%20SWC%20attack%20from%20Dragon%20Threat%20Labs&amp;severity=low&amp;id=682acdbcbbaf20d303f0b68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2014-9495-na-in-na-28b66ec3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2014-9495%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938ed81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-connections-between-miniduke-cosmicduke-and-onionduke-f0b303</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Connections%20Between%20MiniDuke%2C%20CosmicDuke%20and%20OnionDuke&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-20141029b-possible-redoctober-apt-resurgence-from-threatconnect-f0b663</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%2020141029B%3A%20Possible%20RedOctober%20APT%20Resurgence%20from%20ThreatConnect&amp;severity=high&amp;id=682acdbcbbaf20d303f0b663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-on-two-ips-listed-in-osint-iocs-from-various-campaigns-listed-in-detecting-bleeding-edge-malware-presentation-at-hack-lu-2014-f0b5e7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20on%20two%20IPs%20listed%20in%20OSINT%20IOCs%20from%20various%20campaigns%20listed%20in%20Detecting%20Bleeding%20Edge%20Malware%20presentation%20at%20hack.lu%202014&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-fidelis-threat-advisory-1014-bots-machines-and-the-matrix-f0b606</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Fidelis%20Threat%20Advisory%20%231014%20%22Bots%2C%20Machines%2C%20and%20the%20Matrix%22&amp;severity=low&amp;id=682acdbcbbaf20d303f0b606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-ssh-scanning-activity-by-andrew-morris-f0b552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20SSH%20Scanning%20activity%20by%20Andrew%20Morris&amp;severity=low&amp;id=682acdbcbbaf20d303f0b552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-assorted-iocs-associated-to-andromeda-restlesz-su-domain-f0b6e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Assorted%20IOCs%20associated%20to%20Andromeda%20restlesz.su%20domain&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/regin-scanner-f0b6bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Regin%20Scanner&amp;severity=high&amp;id=682acdbcbbaf20d303f0b6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-regin-samples-shared-by-virusshare-f0b5a9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Regin%20samples%20shared%20by%20VirusShare&amp;severity=high&amp;id=682acdbcbbaf20d303f0b5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-based-on-pdns-whois-from-osint-roaming-tiger-by-anton-cherepanov-from-eset-f0b719</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20based%20on%20pDNS%20%2B%20whois%20from%20OSINT%20Roaming%20tiger%20by%20Anton%20Cherepanov%20from%20ESET&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/secret-malware-in-european-union-attack-linked-to-u-s-and-british-intelligence-article-by-the-intercept-f0b5ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Secret%20Malware%20in%20European%20Union%20Attack%20Linked%20to%20U.S.%20and%20British%20Intelligence%20article%20by%20the%20Intercept&amp;severity=high&amp;id=682acdbcbbaf20d303f0b5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-double-tap-from-fireeye-f0b6e3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Operation%20Double%20Tap%20from%20FireEye&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/turla-digging-using-totalhash-f0b706</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Turla%20digging%20using%20TotalHash&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-evil-bunny-suspect-4-f0b62b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Evil%20Bunny%3A%20Suspect%20%234&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/import-of-citizenlab-public-db-of-malware-indicators-f0b527</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Import%20of%20CitizenLab%20public%20DB%20of%20malware%20indicators&amp;severity=low&amp;id=682acdbcbbaf20d303f0b527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-additional-indicators-relating-to-sofacy-apt28-phishing-blog-post-by-pwc-f0b588</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Expansion%20on%20Additional%20indicators%20relating%20to%20Sofacy%20(APT28)%20phishing%20blog%20post%20by%20PWC&amp;severity=low&amp;id=682acdbcbbaf20d303f0b588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-on-osint-korplug-military-targeted-attacks-afghanistan-tajikistan-blog-post-from-eset-by-using-whois-registrant-f0b6fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20on%20OSINT%20Korplug%20military%20targeted%20attacks%3A%20Afghanistan%20%26%20Tajikistan%20blog%20post%20from%20ESET%20by%20using%20whois%20registrant&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-rotten-tomato-campaign-f0b6d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Expansion%20on%20Rotten%20Tomato%20campaign&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-roaming-tiger-by-anton-cherepanov-from-eset-f0b684</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Roaming%20tiger%20by%20Anton%20Cherepanov%20from%20ESET&amp;severity=low&amp;id=682acdbcbbaf20d303f0b684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-expansion-on-snake-f0b65b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Expansion%20on%20Snake&amp;severity=high&amp;id=682acdbcbbaf20d303f0b65b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-korplug-military-targeted-attacks-afghanistan-tajikistan-blog-post-from-eset-f0b627</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Korplug%20military%20targeted%20attacks%3A%20Afghanistan%20%26%20Tajikistan%20blog%20post%20from%20ESET&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-banking-trojan-dridex-uses-macros-for-infection-blog-post-from-trend-micro-f0b6c0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Banking%20Trojan%20DRIDEX%20Uses%20Macros%20for%20Infection%20blog%20post%20from%20Trend%20Micro&amp;severity=low&amp;id=682acdbcbbaf20d303f0b6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-20141107b-operation-poisoned-handover-by-threatconnect-f0b686</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%2020141107B%3A%20Operation%20Poisoned%20Handover%20by%20ThreatConnect&amp;severity=low&amp;id=682acdbcbbaf20d303f0b686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-black-energy-2-malware-analysis-blog-post-by-joseph-mlodzianowski-f0b725</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Black%20Energy%202%20malware%20analysis%20blog%20post%20by%20Joseph%20Mlodzianowski&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-rotten-tomato-campaign-f0b61f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Rotten%20Tomato%20Campaign&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b61f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-smn-novetta-f0bed7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Operation%20SMN%20(Novetta)&amp;severity=medium&amp;id=682acdbdbbaf20d303f0bed7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-additional-indicators-relating-to-sofacy-apt28-phishing-blog-post-by-pwc-f0b5a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Additional%20indicators%20relating%20to%20Sofacy%20(APT28)%20phishing%20blog%20post%20by%20PWC&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt28-a-window-into-russia-s-cyber-espionage-operations-blog-post-by-fireeye-f0b5e1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20APT28%3A%20A%20Window%20into%20Russia%C3%A2%E2%82%AC%E2%84%A2s%20Cyber%20Espionage%20Operations%3F%20blog%20post%20by%20FireEye&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-scanbox-framework-who-s-affected-and-who-s-using-it-by-pwc-f0b5ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20ScanBox%20framework%20%C3%A2%E2%82%AC%E2%80%9C%20who%C3%A2%E2%82%AC%E2%84%A2s%20affected%2C%20and%20who%C3%A2%E2%82%AC%E2%84%A2s%20using%20it%3F%20%20by%20PWC&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/expansion-on-osint-operation-pawn-storm-the-red-in-sednit-from-trend-micro-f0b6fc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=Expansion%20on%20OSINT%20Operation%20Pawn%20Storm%3A%20The%20Red%20in%20SEDNIT%20from%20Trend%20Micro&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-orcarat-a-whale-of-a-tale-blog-post-by-pwc-f0b5ef</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20OrcaRAT%20-%20A%20whale%20of%20a%20tale%20blog%20post%20by%20PWC&amp;severity=low&amp;id=682acdbcbbaf20d303f0b5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shellshock-exploitation-from-red-sky-weekly-blog-post-f0b6df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Shellshock%20exploitation%20from%20Red%20Sky%20Weekly%20blog%20post&amp;severity=low&amp;id=682acdbdbbaf20d303f0b6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-democracy-in-hong-kong-under-attack-blog-post-from-volexity-steven-adair-f0b63c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Democracy%20in%20Hong%20Kong%20Under%20Attack%20blog%20post%20from%20Volexity%20(Steven%20Adair)&amp;severity=low&amp;id=682acdbcbbaf20d303f0b63c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-evolution-of-the-nuclear-exploit-kit-by-cisco-talos-group-f0b592</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Evolution%20of%20the%20Nuclear%20Exploit%20Kit%20by%20Cisco%20Talos%20group&amp;severity=low&amp;id=682acdbcbbaf20d303f0b592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-sednit-espionage-group-now-using-custom-exploit-kit-f0bd08</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Sednit%20espionage%20group%20now%20using%20custom%20exploit%20kit&amp;severity=low&amp;id=682acdbdbbaf20d303f0bd08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/pws-win32-kegotip-c-f0b3a2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=PWS%3A%20Win32%2FKegotip.C&amp;severity=low&amp;id=682acdbcbbaf20d303f0b3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-new-indicators-of-compromise-for-apt-group-nitro-uncovered-blog-post-by-palo-alto-networks-f0b6f8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20New%20Indicators%20of%20Compromise%20for%20APT%20Group%20Nitro%20Uncovered%20blog%20post%20by%20Palo%20Alto%20Networks&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-shellshock-scanning-ips-from-opendns-f0b565</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20ShellShock%20scanning%20IPs%20from%20OpenDNS&amp;severity=low&amp;id=682acdbcbbaf20d303f0b565</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-path-to-mass-producing-cyber-attacks-by-fireeye-f0b629</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20The%20Path%20to%20Mass-Producing%20Cyber%20Attacks%20by%20FireEye&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-cridex-feodo-geodo-dridex-whats-next-by-abuse-ch-f0b723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Cridex%2C%20Feodo%2C%20Geodo%2C%20Dridex%2C%20whats%20next%3F%20by%20abuse.ch&amp;severity=low&amp;id=682acdbdbbaf20d303f0b723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-watching-attackers-through-virustotal-blog-post-by-brandon-dixon-9bplus-f0b561</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20Watching%20Attackers%20Through%20Virustotal%20blog%20post%20by%20Brandon%20Dixon%20(9bplus)&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b561</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-2597-n-a-in-n-a-bed034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-2597%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-attacks-on-east-asia-using-google-code-for-command-and-control-by-palo-alto-unit-42-f0b6f4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Attacks%20on%20East%20Asia%20using%20Google%20Code%20for%20Command%20and%20Control%20by%20Palo%20Alto%20Unit%2042&amp;severity=high&amp;id=682acdbdbbaf20d303f0b6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2014-1745-na-in-na-2f466b00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2014-1745%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6840c579182aa0cae2c16b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/a-detailed-examination-of-the-siesta-campaign-f0b42f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=A%20Detailed%20Examination%20of%20the%20Siesta%20Campaign&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b42f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-7354-na-in-na-829b02a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-7354%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938e586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-7353-na-in-na-0b1b21ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-7353%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938e575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2014-1776-na-in-na-a7626538</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2014-1776%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=68386ba5182aa0cae2809bbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-old-njrat-activity-f0bec0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20old%20njRAT%20activity&amp;severity=low&amp;id=682acdbdbbaf20d303f0bec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-apt-bestia-used-in-apt-attacks-on-polish-government-f0b314</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20APT%20Bestia%20used%20in%20APT%20attacks%20on%20Polish%20Government&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-botnet-bruteforcing-point-of-sale-terminals-via-remote-desktop-f0b2e0</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Botnet%20bruteforcing%20Point%20Of%20Sale%20terminals%20via%20Remote%20Desktop&amp;severity=low&amp;id=682acdbcbbaf20d303f0b2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-analysis-of-dhs-nccic-indicators-blog-post-by-secureworks-f0b5be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Analysis%20of%20DHS%20NCCIC%20Indicators%20blog%20post%20by%20Secureworks&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2010-4226-na-in-na-fdd7197f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2010-4226%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5e1b0bd07c3938f3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-6954-na-in-na-3a0f4a10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-6954%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f581b0bd07c3938a8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-6282-n-a-in-n-a-bed038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-6282%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-4392-na-in-na-ebe9447d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-4392%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=68487f5d1b0bd07c3938df67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-operation-molerats-middle-east-cyber-attacks-using-poison-ivy-by-fire-eye-f0b667</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Operation%20Molerats%3A%20Middle%20East%20Cyber%20Attacks%20Using%20Poison%20Ivy%20by%20Fire%20Eye&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-2465-n-a-in-n-a-bda314</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-2465%3A%20n%2Fa%20in%20n%2Fa&amp;severity=critical&amp;id=682d981cc4522896dcbda314</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-another-story-of-unix-trojan-tsunami-kaiten-c-irc-bot-w-flooder-backdoor-at-a-hacked-xbsd-f0b8d1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20Another%20story%20of%20Unix%20Trojan%3A%20Tsunami%2FKaiten.c%20(IRC%2FBot)%20w%2F%20Flooder%2C%20Backdoor%20at%20a%20hacked%20xBSD&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-2094-n-a-in-n-a-bed02c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-2094%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2013-2596-n-a-in-n-a-bed030</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2013-2596%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d983ac4522896dcbed030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-osx-pintsized-backdoor-additional-details-by-zataz-eric-romang-f0b6db</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20OSX%2FPintsized%20Backdoor%20Additional%20Details%20by%20Zataz%20%2F%20Eric%20Romang&amp;severity=medium&amp;id=682acdbdbbaf20d303f0b6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-in-depth-look-apt-attack-tools-of-the-trade-blog-post-by-trend-micro-f0b680</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20%20In-Depth%20Look%3A%20APT%20Attack%20Tools%20of%20the%20Trade%20blog%20post%20by%20Trend%20Micro&amp;severity=low&amp;id=682acdbcbbaf20d303f0b680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-adobe-zero-day-used-in-ladyboyle-attack-blog-post-by-symantec-f0b69b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Adobe%20Zero-day%20Used%20in%20LadyBoyle%20Attack%20blog%20post%20by%20Symantec&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b69b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-a-pbot-php-perl-backdoor-irc-bot-network-attack-tool-infection-on-hegeman-com-f0b8cd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20A%20PBot%20(PHP%20%2B%20Perl%20Backdoor%20IRC%20Bot%20%2B%20Network%20Attack%20Tool)%20Infection%20on%20hegeman.com&amp;severity=low&amp;id=682acdbdbbaf20d303f0b8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2012-4691-n-a-in-n-a-27519d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2012-4691%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6830c3d20acd01a24927519d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2012-3040-n-a-in-n-a-27519b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2012-3040%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6830c3d20acd01a24927519b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2012-3037-n-a-in-n-a-275199</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2012-3037%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=6830c3d20acd01a249275199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-the-elderwood-project-f0c009</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20-%20The%20Elderwood%20Project&amp;severity=low&amp;id=682acdbebbaf20d303f0c009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-backdoor-win32-shiz-from-lavasoft-f0b6be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Backdoor.Win32.Shiz%20from%20Lavasoft&amp;severity=low&amp;id=682acdbcbbaf20d303f0b6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-beware-of-what-you-download-recent-purported-ceiec-document-dump-booby-trapped-by-shadow-server-f0b65d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Beware%20of%20what%20you%20download.%20Recent%20purported%20CEIEC%20document%20dump%20booby-trapped%20by%20Shadow%20Server&amp;severity=low&amp;id=682acdbcbbaf20d303f0b65d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2011-3045-na-in-na-8f2ce921</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2011-3045%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68487f5d1b0bd07c3938e54f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2011-2016-na-in-na-92dc32dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2011-2016%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=68406d46182aa0cae2b47b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/osint-trend-micro-exposes-lurid-apt-f0b5e3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=OSINT%20Trend%20Micro%20Exposes%20LURID%20APT&amp;severity=medium&amp;id=682acdbcbbaf20d303f0b5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2010-2568-n-a-in-n-a-bed01d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2010-2568%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9839c4522896dcbed01d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2009-3791-n-a-in-n-a-bf565b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2009-3791%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf565b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2009-2541-n-a-in-n-a-bf5657</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2009-2541%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5657</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2008-2991-n-a-in-n-a-bf55e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2008-2991%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf55e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2008-0642-n-a-in-n-a-bf5639</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2008-0642%3A%20n%2Fa%20in%20n%2Fa&amp;severity=medium&amp;id=682d9847c4522896dcbf5639</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2001-0827-n-a-in-n-a-bf5635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2001-0827%3A%20n%2Fa%20in%20n%2Fa&amp;severity=high&amp;id=682d9847c4522896dcbf5635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0564-the-guestbook-cgi-program-in-icq-web-front-service-for-icq-2000a-99b-and-others-allows-remote-atta-7dfb87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0564%3A%20The%20guestbook%20CGI%20program%20in%20ICQ%20Web%20Front%20service%20for%20ICQ%202000a%2C%2099b%2C%20and%20others%20allows%20remote%20atta&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0461-the-undocumented-semconfig-system-call-in-bsd-freezes-the-state-of-semaphores-which-allows-local-us-7dfb85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0461%3A%20The%20undocumented%20semconfig%20system%20call%20in%20BSD%20freezes%20the%20state%20of%20semaphores%2C%20which%20allows%20local%20us&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0455-buffer-overflow-in-xlockmore-xlock-program-version-4-16-and-earlier-allows-local-users-to-read-sensi-7dfb83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0455%3A%20Buffer%20overflow%20in%20xlockmore%20xlock%20program%20version%204.16%20and%20earlier%20allows%20local%20users%20to%20read%20sensi&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0454-buffer-overflow-in-linux-cdrecord-allows-local-users-to-gain-privileges-via-the-dev-parameter-7dfb81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0454%3A%20Buffer%20overflow%20in%20Linux%20cdrecord%20allows%20local%20users%20to%20gain%20privileges%20via%20the%20dev%20parameter.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0462-ftpd-in-netbsd-1-4-2-does-not-properly-parse-entries-in-etc-ftpchroot-and-does-not-chroot-the-speci-7dfb7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0462%3A%20ftpd%20in%20NetBSD%201.4.2%20does%20not%20properly%20parse%20entries%20in%20%2Fetc%2Fftpchroot%20and%20does%20not%20chroot%20the%20speci&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0456-netbsd-1-4-2-and-earlier-allows-local-users-to-cause-a-denial-of-service-by-repeatedly-running-certa-7dfb7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0456%3A%20NetBSD%201.4.2%20and%20earlier%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20by%20repeatedly%20running%20certa&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0460-buffer-overflow-in-kde-kdesud-on-linux-allows-local-uses-to-gain-privileges-via-a-long-display-envir-7dfb7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0460%3A%20Buffer%20overflow%20in%20KDE%20kdesud%20on%20Linux%20allows%20local%20uses%20to%20gain%20privileges%20via%20a%20long%20DISPLAY%20envir&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0553-race-condition-in-ipfilter-firewall-3-4-3-and-earlier-when-configured-with-overlapping-return-rst-7dfb79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0553%3A%20Race%20condition%20in%20IPFilter%20firewall%203.4.3%20and%20earlier%2C%20when%20configured%20with%20overlapping%20%22return-rst%22&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0517-netscape-4-73-and-earlier-does-not-properly-warn-users-about-a-potentially-invalid-certificate-if-th-7dfb77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0517%3A%20Netscape%204.73%20and%20earlier%20does%20not%20properly%20warn%20users%20about%20a%20potentially%20invalid%20certificate%20if%20th&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0404-the-cifs-computer-browser-service-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-a-7dfb75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0404%3A%20The%20CIFS%20Computer%20Browser%20service%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20a%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0403-the-cifs-computer-browser-service-on-windows-nt-4-0-allows-a-remote-attacker-to-cause-a-denial-of-se-7dfb68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0403%3A%20The%20CIFS%20Computer%20Browser%20service%20on%20Windows%20NT%204.0%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20se&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0491-buffer-overflow-in-the-xdmcp-parsing-code-of-gnome-gdm-kde-kdm-and-wdm-allows-remote-attackers-to-7dfb66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0491%3A%20Buffer%20overflow%20in%20the%20XDMCP%20parsing%20code%20of%20GNOME%20gdm%2C%20KDE%20kdm%2C%20and%20wdm%20allows%20remote%20attackers%20to%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0446-buffer-overflow-in-mdbms-database-server-allows-remote-attackers-to-execute-arbitrary-commands-via-a-7dfb64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0446%3A%20Buffer%20overflow%20in%20MDBMS%20database%20server%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20a&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0444-hp-web-jetadmin-6-0-allows-remote-attackers-to-cause-a-denial-of-service-via-a-malformed-url-to-port-7dfb60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0444%3A%20HP%20Web%20JetAdmin%206.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20URL%20to%20port&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0445-the-pgpk-command-in-pgp-5-x-on-unix-systems-uses-an-insufficiently-random-data-source-for-non-intera-7dfb62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0445%3A%20The%20pgpk%20command%20in%20PGP%205.x%20on%20Unix%20systems%20uses%20an%20insufficiently%20random%20data%20source%20for%20non-intera&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfb62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0443-the-web-interface-server-in-hp-web-jetadmin-5-6-allows-remote-attackers-to-read-arbitrary-files-via-7dfb5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0443%3A%20The%20web%20interface%20server%20in%20HP%20Web%20JetAdmin%205.6%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0442-qpopper-2-53-and-earlier-allows-local-users-to-gain-privileges-via-a-formatting-string-in-the-from-7dfb5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0442%3A%20Qpopper%202.53%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20formatting%20string%20in%20the%20From%3A%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0441-vulnerability-in-aix-3-2-x-and-4-x-allows-local-users-to-gain-write-access-to-files-on-locally-or-re-7dfb5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0441%3A%20Vulnerability%20in%20AIX%203.2.x%20and%204.x%20allows%20local%20users%20to%20gain%20write%20access%20to%20files%20on%20locally%20or%20re&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0399-buffer-overflow-in-mdaemon-pop-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-lon-7dfb58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0399%3A%20Buffer%20overflow%20in%20MDaemon%20POP%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20lon&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0398-buffer-overflow-in-wconsole-dll-in-rockliffe-mailsite-management-agent-allows-remote-attackers-to-ex-7dfb56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0398%3A%20Buffer%20overflow%20in%20wconsole.dll%20in%20Rockliffe%20MailSite%20Management%20Agent%20allows%20remote%20attackers%20to%20ex&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0396-the-add-exe-program-in-the-carello-shopping-cart-software-allows-remote-attackers-to-duplicate-files-7dfb49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0396%3A%20The%20add.exe%20program%20in%20the%20Carello%20shopping%20cart%20software%20allows%20remote%20attackers%20to%20duplicate%20files&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0551-the-file-transfer-mechanism-in-danware-netop-6-0-does-not-provide-authentication-which-allows-remot-7dfb47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0551%3A%20The%20file%20transfer%20mechanism%20in%20Danware%20NetOp%206.0%20does%20not%20provide%20authentication%2C%20which%20allows%20remot&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0418-the-cayman-3220-h-dsl-router-allows-remote-attackers-to-cause-a-denial-of-service-via-oversized-icmp-7dfb45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0418%3A%20The%20Cayman%203220-H%20DSL%20router%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20oversized%20ICMP&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0438-buffer-overflow-in-fdmount-on-linux-systems-allows-local-users-in-the-floppy-group-to-execute-arbi-7dfb43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0438%3A%20Buffer%20overflow%20in%20fdmount%20on%20Linux%20systems%20allows%20local%20users%20in%20the%20%22floppy%22%20group%20to%20execute%20arbi&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0431-cobalt-raq2-and-raq3-does-not-properly-set-the-access-permissions-and-ownership-for-files-that-are-u-7dfb41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0431%3A%20Cobalt%20RaQ2%20and%20RaQ3%20does%20not%20properly%20set%20the%20access%20permissions%20and%20ownership%20for%20files%20that%20are%20u&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0451-the-intel-express-8100-isdn-router-allows-remote-attackers-to-cause-a-denial-of-service-via-oversize-7dfb3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0451%3A%20The%20Intel%20express%208100%20ISDN%20router%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20oversize&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0436-metaproducts-offline-explorer-1-2-and-earlier-allows-remote-attackers-to-access-arbitrary-files-via-7dfb3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0436%3A%20MetaProducts%20Offline%20Explorer%201.2%20and%20earlier%20allows%20remote%20attackers%20to%20access%20arbitrary%20files%20via%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0305-windows-95-windows-98-windows-2000-windows-nt-4-0-and-terminal-server-systems-allow-a-remote-att-7dfb3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0305%3A%20Windows%2095%2C%20Windows%2098%2C%20Windows%202000%2C%20Windows%20NT%204.0%2C%20and%20Terminal%20Server%20systems%20allow%20a%20remote%20att&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0463-beos-5-0-allows-remote-attackers-to-cause-a-denial-of-service-via-fragmented-tcp-packets-7dfb39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0463%3A%20BeOS%205.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20fragmented%20TCP%20packets.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0453-xfree86-3-3-x-and-4-0-allows-a-user-to-cause-a-denial-of-service-via-a-negative-counter-value-in-a-m-7dfb37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0453%3A%20XFree86%203.3.x%20and%204.0%20allows%20a%20user%20to%20cause%20a%20denial%20of%20service%20via%20a%20negative%20counter%20value%20in%20a%20m&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0452-buffer-overflow-in-the-esmtp-service-of-lotus-domino-server-5-0-1-allows-remote-attackers-to-cause-a-7dfb2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0452%3A%20Buffer%20overflow%20in%20the%20ESMTP%20service%20of%20Lotus%20Domino%20Server%205.0.1%20allows%20remote%20attackers%20to%20cause%20a&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0450-vulnerability-in-bbd-server-in-big-brother-system-and-network-monitor-allows-an-attacker-to-execute-7dfb28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0450%3A%20Vulnerability%20in%20bbd%20server%20in%20Big%20Brother%20System%20and%20Network%20Monitor%20allows%20an%20attacker%20to%20execute%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0437-buffer-overflow-in-the-cyberpatrol-daemon-cyberdaemon-used-in-gauntlet-and-webshield-allows-remote-7dfb26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0437%3A%20Buffer%20overflow%20in%20the%20CyberPatrol%20daemon%20%22cyberdaemon%22%20used%20in%20gauntlet%20and%20WebShield%20allows%20remote&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0394-netprowler-3-0-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-malformed-ip-packets-7dfb24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0394%3A%20NetProwler%203.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20malformed%20IP%20packets%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0465-internet-explorer-4-x-and-5-x-does-not-properly-verify-the-domain-of-a-frame-within-a-browser-windo-7dfb22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0465%3A%20Internet%20Explorer%204.x%20and%205.x%20does%20not%20properly%20verify%20the%20domain%20of%20a%20%20frame%20within%20a%20browser%20windo&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0464-internet-explorer-4-x-and-5-x-allows-remote-attackers-to-execute-arbitrary-commands-via-a-buffer-ove-7dfb20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0464%3A%20Internet%20Explorer%204.x%20and%205.x%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20a%20buffer%20ove&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0417-the-http-administration-interface-to-the-cayman-3220-h-dsl-router-allows-remote-attackers-to-cause-a-7dfb1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0417%3A%20The%20HTTP%20administration%20interface%20to%20the%20Cayman%203220-H%20DSL%20router%20allows%20remote%20attackers%20to%20cause%20a&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0350-a-debugging-feature-in-networkice-icecap-2-0-23-and-earlier-is-enabled-which-allows-a-remote-attack-7dfb1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0350%3A%20A%20debugging%20feature%20in%20NetworkICE%20ICEcap%202.0.23%20and%20earlier%20is%20enabled%2C%20which%20allows%20a%20remote%20attack&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1008-xsoldier-program-allows-local-users-to-gain-root-access-via-a-long-argument-7dfb1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1008%3A%20xsoldier%20program%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20argument.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0432-the-calender-pl-and-the-calendar-admin-pl-calendar-scripts-by-matt-kruse-allow-remote-attackers-to-e-7dfb18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0432%3A%20The%20calender.pl%20and%20the%20calendar_admin.pl%20calendar%20scripts%20by%20Matt%20Kruse%20allow%20remote%20attackers%20to%20e&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0405-buffer-overflow-in-l0pht-antisniff-allows-remote-attackers-to-execute-arbitrary-commands-via-a-malfo-7dfb0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0405%3A%20Buffer%20overflow%20in%20L0pht%20AntiSniff%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20a%20malfo&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0395-buffer-overflow-in-cproxy-3-3-allows-remote-users-to-cause-a-denial-of-service-via-a-long-http-reque-7dfb09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0395%3A%20Buffer%20overflow%20in%20CProxy%203.3%20allows%20remote%20users%20to%20cause%20a%20denial%20of%20service%20via%20a%20long%20HTTP%20reque&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0393-the-kde-kscd-program-does-not-drop-privileges-when-executing-a-program-specified-in-a-user-s-shell-e-7dfb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0393%3A%20The%20KDE%20kscd%20program%20does%20not%20drop%20privileges%20when%20executing%20a%20program%20specified%20in%20a%20user&apos;s%20SHELL%20e&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0392-buffer-overflow-in-ksu-in-kerberos-5-allows-local-users-to-gain-root-privileges-7dfb05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0392%3A%20Buffer%20overflow%20in%20ksu%20in%20Kerberos%205%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0391-buffer-overflow-in-krshd-in-kerberos-5-allows-remote-attackers-to-gain-root-privileges-7dfb03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0391%3A%20Buffer%20overflow%20in%20krshd%20in%20Kerberos%205%20allows%20remote%20attackers%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0390-buffer-overflow-in-krb425-conv-principal-function-in-kerberos-5-allows-remote-attackers-to-gain-root-7dfb01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0390%3A%20Buffer%20overflow%20in%20krb425_conv_principal%20function%20in%20Kerberos%205%20allows%20remote%20attackers%20to%20gain%20root&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0389-buffer-overflow-in-krb-rd-req-function-in-kerberos-4-and-5-allows-remote-attackers-to-gain-root-priv-7dfaff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0389%3A%20Buffer%20overflow%20in%20krb_rd_req%20function%20in%20Kerberos%204%20and%205%20allows%20remote%20attackers%20to%20gain%20root%20priv&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0379-the-netopia-r9100-router-does-not-prevent-authenticated-users-from-modifying-snmp-tables-even-if-th-7dfafd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0379%3A%20The%20Netopia%20R9100%20router%20does%20not%20prevent%20authenticated%20users%20from%20modifying%20SNMP%20tables%2C%20even%20if%20th&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0980-windows-nt-service-control-manager-scm-allows-remote-attackers-to-cause-a-denial-of-service-via-a-7dfafb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0980%3A%20Windows%20NT%20Service%20Control%20Manager%20(SCM)%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfafb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0424-the-cgi-counter-4-0-7-by-george-burgyan-allows-remote-attackers-to-execute-arbitrary-commands-via-sh-7dfaf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0424%3A%20The%20CGI%20counter%204.0.7%20by%20George%20Burgyan%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20sh&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfaf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0397-the-emurl-web-based-email-account-software-encodes-predictable-identifiers-in-user-session-urls-whi-7dfaec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0397%3A%20The%20EMURL%20web-based%20email%20account%20software%20encodes%20predictable%20identifiers%20in%20user%20session%20URLs%2C%20whi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0435-the-allmanageup-pl-file-upload-cgi-script-in-the-allmanage-website-administration-software-2-6-can-b-7dfaea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0435%3A%20The%20allmanageup.pl%20file%20upload%20CGI%20script%20in%20the%20Allmanage%20Website%20administration%20software%202.6%20can%20b&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0434-the-administrative-password-for-the-allmanage-web-site-administration-software-is-stored-in-plaintex-7dfae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0434%3A%20The%20administrative%20password%20for%20the%20Allmanage%20web%20site%20administration%20software%20is%20stored%20in%20plaintex&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0400-the-microsoft-active-movie-activex-control-in-internet-explorer-5-does-not-restrict-which-file-types-7dfae6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0400%3A%20The%20Microsoft%20Active%20Movie%20ActiveX%20Control%20in%20Internet%20Explorer%205%20does%20not%20restrict%20which%20file%20types&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0415-buffer-overflow-in-outlook-express-4-x-allows-attackers-to-cause-a-denial-of-service-via-a-mail-or-n-7dfae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0415%3A%20Buffer%20overflow%20in%20Outlook%20Express%204.x%20allows%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20mail%20or%20n&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0407-buffer-overflow-in-solaris-netpr-program-allows-local-users-to-execute-arbitrary-commands-via-a-long-7dfae2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0407%3A%20Buffer%20overflow%20in%20Solaris%20netpr%20program%20allows%20local%20users%20to%20execute%20arbitrary%20commands%20via%20a%20long&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0457-ism-dll-in-iis-4-0-and-5-0-allows-remote-attackers-to-read-file-contents-by-requesting-the-file-and-7dfae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0457%3A%20ISM.DLL%20in%20IIS%204.0%20and%205.0%20allows%20remote%20attackers%20to%20read%20file%20contents%20by%20requesting%20the%20file%20and%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0439-internet-explorer-4-0-and-5-0-allows-a-malicious-web-site-to-obtain-client-cookies-from-another-doma-7dfade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0439%3A%20Internet%20Explorer%204.0%20and%205.0%20allows%20a%20malicious%20web%20site%20to%20obtain%20client%20cookies%20from%20another%20doma&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0421-the-process-bug-cgi-script-in-bugzilla-allows-remote-attackers-to-execute-arbitrary-commands-via-she-7dfadc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0421%3A%20The%20process_bug.cgi%20script%20in%20Bugzilla%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20she&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfadc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0420-the-default-configuration-of-syskey-in-windows-2000-stores-the-startup-key-in-the-registry-which-co-7dfada</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0420%3A%20The%20default%20configuration%20of%20SYSKEY%20in%20Windows%202000%20stores%20the%20startup%20key%20in%20the%20registry%2C%20which%20co&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfada</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0419-the-office-2000-ua-activex-control-is-marked-as-safe-for-scripting-which-allows-remote-attackers-7dfacd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0419%3A%20The%20Office%202000%20UA%20ActiveX%20Control%20is%20marked%20as%20%22safe%20for%20scripting%2C%22%20which%20allows%20remote%20attackers%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0416-ntmail-5-x-allows-network-users-to-bypass-the-ntmail-proxy-restrictions-by-redirecting-their-request-7dfacb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0416%3A%20NTMail%205.x%20allows%20network%20users%20to%20bypass%20the%20NTMail%20proxy%20restrictions%20by%20redirecting%20their%20request&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0408-iis-4-05-and-5-0-allow-remote-attackers-to-cause-a-denial-of-service-via-a-long-complex-url-that-ap-7dfac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0408%3A%20IIS%204.05%20and%205.0%20allow%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20long%2C%20complex%20URL%20that%20ap&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0411-matt-wright-s-formmail-cgi-script-allows-remote-attackers-to-obtain-environmental-variables-via-the-7dfac7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0411%3A%20Matt%20Wright&apos;s%20FormMail%20CGI%20script%20allows%20remote%20attackers%20to%20obtain%20environmental%20variables%20via%20the%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0410-coldfusion-server-4-5-1-allows-remote-attackers-to-cause-a-denial-of-service-by-making-repeated-requ-7dfac5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0410%3A%20ColdFusion%20Server%204.5.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20making%20repeated%20requ&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0409-netscape-4-73-and-earlier-follows-symlinks-when-it-imports-a-new-certificate-which-allows-local-use-7dfac3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0409%3A%20Netscape%204.73%20and%20earlier%20follows%20symlinks%20when%20it%20imports%20a%20new%20certificate%2C%20which%20allows%20local%20use&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0406-netscape-communicator-before-version-4-73-and-navigator-4-07-do-not-properly-validate-ssl-certificat-7dfac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0406%3A%20Netscape%20Communicator%20before%20version%204.73%20and%20Navigator%204.07%20do%20not%20properly%20validate%20SSL%20certificat&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0304-microsoft-iis-4-0-and-5-0-with-the-iisadmpwd-virtual-directory-installed-allows-a-remote-attacker-to-7dfabf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0304%3A%20Microsoft%20IIS%204.0%20and%205.0%20with%20the%20IISADMPWD%20virtual%20directory%20installed%20allows%20a%20remote%20attacker%20to&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0387-the-makelev-program-in-the-golddig-game-from-the-freebsd-ports-collection-allows-local-users-to-over-7dfabd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0387%3A%20The%20makelev%20program%20in%20the%20golddig%20game%20from%20the%20FreeBSD%20ports%20collection%20allows%20local%20users%20to%20over&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0384-netstructure-7110-and-7180-have-undocumented-accounts-servnow-root-and-wizard-whose-passwords-ar-7dfabb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0384%3A%20NetStructure%207110%20and%207180%20have%20undocumented%20accounts%20(servnow%2C%20root%2C%20and%20wizard)%20whose%20passwords%20ar&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0383-the-file-transfer-component-of-aol-instant-messenger-aim-reveals-the-physical-path-of-the-transfer-7dfaae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0383%3A%20The%20file%20transfer%20component%20of%20AOL%20Instant%20Messenger%20(AIM)%20reveals%20the%20physical%20path%20of%20the%20transfer&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0382-coldfusion-clustercats-appends-stale-query-string-arguments-to-a-url-during-html-redirection-which-7dfaac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0382%3A%20ColdFusion%20ClusterCATS%20appends%20stale%20query%20string%20arguments%20to%20a%20URL%20during%20HTML%20redirection%2C%20which%20&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0413-the-shtml-exe-program-in-the-frontpage-extensions-package-of-iis-4-0-and-5-0-allows-remote-attackers-7dfaaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0413%3A%20The%20shtml.exe%20program%20in%20the%20FrontPage%20extensions%20package%20of%20IIS%204.0%20and%205.0%20allows%20remote%20attackers&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0426-ultraboard-1-6-and-other-versions-allow-remote-attackers-to-cause-a-denial-of-service-by-referencing-7dfaa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0426%3A%20UltraBoard%201.6%20and%20other%20versions%20allow%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20referencing&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0423-buffer-overflow-in-netwin-dnewsweb-cgi-program-allows-remote-attackers-to-execute-arbitrary-commands-7dfaa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0423%3A%20Buffer%20overflow%20in%20Netwin%20DNEWSWEB%20CGI%20program%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0381-the-gossamer-threads-dbman-db-cgi-cgi-script-allows-remote-attackers-to-view-environmental-variables-7dfaa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0381%3A%20The%20Gossamer%20Threads%20DBMan%20db.cgi%20CGI%20script%20allows%20remote%20attackers%20to%20view%20environmental%20variables&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0428-buffer-overflow-in-the-smtp-gateway-for-interscan-virus-wall-3-32-and-earlier-allows-a-remote-attack-7dfaa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0428%3A%20Buffer%20overflow%20in%20the%20SMTP%20gateway%20for%20InterScan%20Virus%20Wall%203.32%20and%20earlier%20allows%20a%20remote%20attack&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfaa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0427-the-aladdin-knowledge-systems-etoken-device-allows-attackers-with-physical-access-to-the-device-to-o-7dfaa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0427%3A%20The%20Aladdin%20Knowledge%20Systems%20eToken%20device%20allows%20attackers%20with%20physical%20access%20to%20the%20device%20to%20o&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0422-buffer-overflow-in-netwin-dmailweb-cgi-program-allows-remote-attackers-to-execute-arbitrary-commands-7dfa9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0422%3A%20Buffer%20overflow%20in%20Netwin%20DMailWeb%20CGI%20program%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0414-vulnerability-in-shutdown-command-for-hp-ux-11-x-and-10-x-allows-allows-local-users-to-gain-privileg-7dfa9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0414%3A%20Vulnerability%20in%20shutdown%20command%20for%20HP-UX%2011.X%20and%2010.X%20allows%20allows%20local%20users%20to%20gain%20privileg&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0430-cart32-allows-remote-attackers-to-access-sensitive-debugging-information-by-appending-expdate-to-th-7dfa8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0430%3A%20Cart32%20allows%20remote%20attackers%20to%20access%20sensitive%20debugging%20information%20by%20appending%20%2Fexpdate%20to%20th&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0425-buffer-overflow-in-the-web-archives-component-of-l-soft-listserv-1-8-allows-remote-attackers-to-exec-7dfa8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0425%3A%20Buffer%20overflow%20in%20the%20Web%20Archives%20component%20of%20L-Soft%20LISTSERV%201.8%20allows%20remote%20attackers%20to%20exec&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0378-the-pam-console-pam-module-in-linux-systems-performs-a-chown-on-various-devices-upon-a-user-login-b-7dfa8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0378%3A%20The%20pam_console%20PAM%20module%20in%20Linux%20systems%20performs%20a%20chown%20on%20various%20devices%20upon%20a%20user%20login%2C%20b&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0345-the-on-line-help-system-options-in-cisco-routers-allows-non-privileged-users-without-enabled-acces-7dfa89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0345%3A%20The%20on-line%20help%20system%20options%20in%20Cisco%20routers%20allows%20non-privileged%20users%20without%20%22enabled%22%20acces&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfa89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0335-the-resolver-in-glibc-2-1-3-uses-predictable-ids-which-allows-a-local-attacker-to-spoof-dns-query-r-7dfa87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0335%3A%20The%20resolver%20in%20glibc%202.1.3%20uses%20predictable%20IDs%2C%20which%20allows%20a%20local%20attacker%20to%20spoof%20DNS%20query%20r&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0332-ultraboard-pl-or-ultraboard-cgi-cgi-scripts-in-ultraboard-1-6-allows-remote-attackers-to-read-arbitr-7dfa85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0332%3A%20UltraBoard.pl%20or%20UltraBoard.cgi%20CGI%20scripts%20in%20UltraBoard%201.6%20allows%20remote%20attackers%20to%20read%20arbitr&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0303-quake3-arena-allows-malicious-server-operators-to-read-or-modify-files-on-a-client-via-a-dot-dot-7dfa83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0303%3A%20Quake3%20Arena%20allows%20malicious%20server%20operators%20to%20read%20or%20modify%20files%20on%20a%20client%20via%20a%20dot%20dot%20(..&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0386-filemaker-pro-5-web-companion-allows-remote-attackers-to-send-anonymous-or-forged-email-7dfa7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0386%3A%20FileMaker%20Pro%205%20Web%20Companion%20allows%20remote%20attackers%20to%20send%20anonymous%20or%20forged%20email.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0433-the-suse-aaa-base-package-installs-some-system-accounts-with-home-directories-set-to-tmp-which-all-7dfa81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0433%3A%20The%20SuSE%20aaa_base%20package%20installs%20some%20system%20accounts%20with%20home%20directories%20set%20to%20%2Ftmp%2C%20which%20all&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0385-filemaker-pro-5-web-companion-allows-remote-attackers-to-bypass-field-level-database-security-restri-7dfa7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0385%3A%20FileMaker%20Pro%205%20Web%20Companion%20allows%20remote%20attackers%20to%20bypass%20Field-Level%20database%20security%20restri&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0347-windows-95-and-windows-98-allow-a-remote-attacker-to-cause-a-denial-of-service-via-a-netbios-session-7dfa70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0347%3A%20Windows%2095%20and%20Windows%2098%20allow%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20via%20a%20NetBIOS%20session&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0346-appleshare-ip-6-1-and-later-allows-a-remote-attacker-to-read-potentially-sensitive-information-via-a-7dfa6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0346%3A%20AppleShare%20IP%206.1%20and%20later%20allows%20a%20remote%20attacker%20to%20read%20potentially%20sensitive%20information%20via%20a&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0343-buffer-overflow-in-sniffit-0-3-x-with-the-l-logging-option-enabled-allows-remote-attackers-to-execu-7dfa6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0343%3A%20Buffer%20overflow%20in%20Sniffit%200.3.x%20with%20the%20-L%20logging%20option%20enabled%20allows%20remote%20attackers%20to%20execu&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0293-aaa-base-in-suse-linux-6-3-and-cron-daily-in-earlier-versions-allow-local-users-to-delete-arbitrar-7dfa6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0293%3A%20aaa_base%20in%20SuSE%20Linux%206.3%2C%20and%20cron.daily%20in%20earlier%20versions%2C%20allow%20local%20users%20to%20delete%20arbitrar&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfa6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0138-a-system-has-a-distributed-denial-of-service-ddos-attack-master-agent-or-zombie-installed-such-7dfa68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0138%3A%20A%20system%20has%20a%20distributed%20denial%20of%20service%20(DDOS)%20attack%20master%2C%20agent%2C%20or%20zombie%20installed%2C%20such%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0449-omnis-studio-2-4-uses-weak-encryption-trivial-encoding-for-encrypting-database-fields-7dfa66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0449%3A%20Omnis%20Studio%202.4%20uses%20weak%20encryption%20(trivial%20encoding)%20for%20encrypting%20database%20fields.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0448-the-webshield-smtp-management-tool-version-4-5-44-does-not-properly-restrict-access-to-the-managemen-7dfa64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0448%3A%20The%20WebShield%20SMTP%20Management%20Tool%20version%204.5.44%20does%20not%20properly%20restrict%20access%20to%20the%20managemen&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0447-buffer-overflow-in-webshield-smtp-4-5-44-allows-remote-attackers-to-execute-arbitrary-commands-via-a-7dfa62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0447%3A%20Buffer%20overflow%20in%20WebShield%20SMTP%204.5.44%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20a&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0440-netbsd-1-4-2-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-a-packet-wi-7dfa60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0440%3A%20NetBSD%201.4.2%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20a%20packet%20wi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0401-buffer-overflows-in-redirect-exe-and-changepw-exe-in-pdgsoft-shopping-cart-allow-remote-attackers-to-7dfa5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0401%3A%20Buffer%20overflows%20in%20redirect.exe%20and%20changepw.exe%20in%20PDGSoft%20shopping%20cart%20allow%20remote%20attackers%20to&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0344-the-knfsd-nfs-server-in-linux-kernel-2-2-x-allows-remote-attackers-to-cause-a-denial-of-service-via-7dfa51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0344%3A%20The%20knfsd%20NFS%20server%20in%20Linux%20kernel%202.2.x%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0341-atrium-cassandra-nntp-server-1-10-allows-remote-attackers-to-cause-a-denial-of-service-via-a-long-lo-7dfa4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0341%3A%20ATRIUM%20Cassandra%20NNTP%20Server%201.10%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20long%20lo&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0427-eudora-4-1-allows-remote-attackers-to-perform-a-denial-of-service-by-sending-attachments-with-long-f-7dfa4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0427%3A%20Eudora%204.1%20allows%20remote%20attackers%20to%20perform%20a%20denial%20of%20service%20by%20sending%20attachments%20with%20long%20f&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0340-buffer-overflow-in-gnomelib-in-suse-linux-6-3-allows-local-users-to-execute-arbitrary-commands-via-t-7dfa4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0340%3A%20Buffer%20overflow%20in%20Gnomelib%20in%20SuSE%20Linux%206.3%20allows%20local%20users%20to%20execute%20arbitrary%20commands%20via%20t&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0342-eudora-4-x-allows-remote-attackers-to-bypass-the-user-warning-for-executable-attachments-such-as-ex-7dfa49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0342%3A%20Eudora%204.x%20allows%20remote%20attackers%20to%20bypass%20the%20user%20warning%20for%20executable%20attachments%20such%20as%20.ex&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0429-a-backdoor-password-in-cart32-3-0-and-earlier-allows-remote-attackers-to-execute-arbitrary-commands-7dfa47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0429%3A%20A%20backdoor%20password%20in%20Cart32%203.0%20and%20earlier%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0706-linux-xmonisdn-package-allows-local-users-to-gain-root-privileges-by-modifying-the-ifs-or-path-envir-7dfa45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0706%3A%20Linux%20xmonisdn%20package%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20modifying%20the%20IFS%20or%20PATH%20envir&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0380-the-ios-http-service-in-cisco-routers-and-switches-running-ios-11-1-through-12-1-allows-remote-attac-7dfa43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0380%3A%20The%20IOS%20HTTP%20service%20in%20Cisco%20routers%20and%20switches%20running%20IOS%2011.1%20through%2012.1%20allows%20remote%20attac&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0249-the-aix-fast-response-cache-accelerator-frca-allows-local-users-to-modify-arbitrary-files-via-the-7dfa41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0249%3A%20The%20AIX%20Fast%20Response%20Cache%20Accelerator%20(FRCA)%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20the%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0326-meeting-maker-uses-weak-encryption-a-polyalphabetic-substitution-cipher-for-passwords-which-allow-7dfa3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0326%3A%20Meeting%20Maker%20uses%20weak%20encryption%20(a%20polyalphabetic%20substitution%20cipher)%20for%20passwords%2C%20which%20allow&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0324-pcanywhere-8-x-and-9-0-allows-remote-attackers-to-cause-a-denial-of-service-via-a-tcp-syn-scan-e-g-7dfa32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0324%3A%20pcAnywhere%208.x%20and%209.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20TCP%20SYN%20scan%2C%20e.g.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0339-zonealarm-2-1-10-and-earlier-does-not-filter-udp-packets-with-a-source-port-of-67-which-allows-remo-7dfa30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0339%3A%20ZoneAlarm%202.1.10%20and%20earlier%20does%20not%20filter%20UDP%20packets%20with%20a%20source%20port%20of%2067%2C%20which%20allows%20remo&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0337-buffer-overflow-in-xsun-x-server-in-solaris-7-allows-local-users-to-gain-root-privileges-via-a-long-7dfa2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0337%3A%20Buffer%20overflow%20in%20Xsun%20X%20server%20in%20Solaris%207%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0334-the-allaire-spectra-container-editor-preview-tool-does-not-properly-enforce-object-security-which-a-7dfa2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0334%3A%20The%20Allaire%20Spectra%20container%20editor%20preview%20tool%20does%20not%20properly%20enforce%20object%20security%2C%20which%20a&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfa2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0322-the-passwd-php3-cgi-script-in-the-red-hat-piranha-virtual-server-package-allows-local-users-to-execu-7dfa2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0322%3A%20The%20passwd.php3%20CGI%20script%20in%20the%20Red%20Hat%20Piranha%20Virtual%20Server%20Package%20allows%20local%20users%20to%20execu&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0321-buffer-overflow-in-ic-radius-package-allows-a-remote-attacker-to-cause-a-denial-of-service-via-a-lon-7dfa28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0321%3A%20Buffer%20overflow%20in%20IC%20Radius%20package%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20via%20a%20lon&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0317-buffer-overflow-in-solaris-7-lpset-allows-local-users-to-gain-root-privileges-via-a-long-r-option-7dfa26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0317%3A%20Buffer%20overflow%20in%20Solaris%207%20lpset%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20-r%20option.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0316-buffer-overflow-in-solaris-7-lp-allows-local-users-to-gain-root-privileges-via-a-long-d-option-7dfa24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0316%3A%20Buffer%20overflow%20in%20Solaris%207%20lp%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20-d%20option.&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0248-the-web-gui-for-the-linux-virtual-server-lvs-software-in-the-red-hat-linux-piranha-package-has-a-b-7dfa22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0248%3A%20The%20web%20GUI%20for%20the%20Linux%20Virtual%20Server%20(LVS)%20software%20in%20the%20Red%20Hat%20Linux%20Piranha%20package%20has%20a%20b&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0338-concurrent-versions-software-cvs-uses-predictable-temporary-file-names-for-locking-which-allows-l-7dfa20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0338%3A%20Concurrent%20Versions%20Software%20(CVS)%20uses%20predictable%20temporary%20file%20names%20for%20locking%2C%20which%20allows%20l&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0319-mail-local-in-sendmail-8-10-x-does-not-properly-identify-the-n-string-which-identifies-the-end-of-7dfa13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0319%3A%20mail.local%20in%20Sendmail%208.10.x%20does%20not%20properly%20identify%20the%20.%5Cn%20string%20which%20identifies%20the%20end%20of%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0459-imp-does-not-remove-files-properly-if-the-mswordview-application-quits-which-allows-local-users-to-7dfa11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0459%3A%20IMP%20does%20not%20remove%20files%20properly%20if%20the%20MSWordView%20application%20quits%2C%20which%20allows%20local%20users%20to%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0458-the-mswordview-application-in-imp-creates-world-readable-files-in-the-tmp-directory-which-allows-o-7dfa0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0458%3A%20The%20MSWordView%20application%20in%20IMP%20creates%20world-readable%20files%20in%20the%20%2Ftmp%20directory%2C%20which%20allows%20o&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfa0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0336-linux-openldap-server-allows-local-users-to-modify-arbitrary-files-via-a-symlink-attack-7dfa0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0336%3A%20Linux%20OpenLDAP%20server%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfa0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0320-qpopper-2-53-and-3-0-does-not-properly-identify-the-n-string-which-identifies-the-end-of-message-te-7dfa0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0320%3A%20Qpopper%202.53%20and%203.0%20does%20not%20properly%20identify%20the%20%5Cn%20string%20which%20identifies%20the%20end%20of%20message%20te&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0318-atrium-mercur-mail-server-3-2-allows-local-attackers-to-read-other-user-s-email-and-create-arbitrary-7dfa09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0318%3A%20Atrium%20Mercur%20Mail%20Server%203.2%20allows%20local%20attackers%20to%20read%20other%20user&apos;s%20email%20and%20create%20arbitrary&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0295-buffer-overflow-in-lcdproc-allows-remote-attackers-to-gain-root-privileges-via-the-screen-add-comman-7dfa07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0295%3A%20Buffer%20overflow%20in%20LCDproc%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20via%20the%20screen_add%20comman&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0331-buffer-overflow-in-microsoft-command-processor-cmd-exe-for-windows-nt-and-windows-2000-allows-a-lo-7dfa05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0331%3A%20Buffer%20overflow%20in%20Microsoft%20command%20processor%20(CMD.EXE)%20for%20Windows%20NT%20and%20Windows%202000%20allows%20a%20lo&amp;severity=medium&amp;id=682ca32db6fd31d6ed7dfa05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0311-the-windows-2000-domain-controller-allows-a-malicious-user-to-modify-active-directory-information-by-7dfa03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0311%3A%20The%20Windows%202000%20domain%20controller%20allows%20a%20malicious%20user%20to%20modify%20Active%20Directory%20information%20by&amp;severity=low&amp;id=682ca32db6fd31d6ed7dfa03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0272-realnetworks-realserver-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-malformed-in-7dfa01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0272%3A%20RealNetworks%20RealServer%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20malformed%20in&amp;severity=high&amp;id=682ca32db6fd31d6ed7dfa01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0268-cisco-ios-11-x-and-12-x-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-the-environ-7df9f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0268%3A%20Cisco%20IOS%2011.x%20and%2012.x%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20the%20ENVIRON%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0267-cisco-catalyst-5-4-x-allows-a-user-to-gain-access-to-the-enable-mode-without-a-password-7df9f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0267%3A%20Cisco%20Catalyst%205.4.x%20allows%20a%20user%20to%20gain%20access%20to%20the%20%22enable%22%20mode%20without%20a%20password.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0292-the-adtran-mx2800-m13-multiplexer-allows-remote-attackers-to-cause-a-denial-of-service-via-a-ping-fl-7df9f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0292%3A%20The%20Adtran%20MX2800%20M13%20Multiplexer%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20ping%20fl&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0257-buffer-overflow-in-the-netware-remote-web-administration-utility-allows-remote-attackers-to-cause-a-7df9ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0257%3A%20Buffer%20overflow%20in%20the%20NetWare%20remote%20web%20administration%20utility%20allows%20remote%20attackers%20to%20cause%20a%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0256-buffer-overflows-in-htimage-exe-and-imagemap-exe-in-frontpage-97-and-98-server-extensions-allow-a-us-7df9ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0256%3A%20Buffer%20overflows%20in%20htimage.exe%20and%20Imagemap.exe%20in%20FrontPage%2097%20and%2098%20Server%20Extensions%20allow%20a%20us&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0271-read-passwd-and-other-lisp-functions-in-emacs-20-do-not-properly-clear-the-history-of-recently-typed-7df9ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0271%3A%20read-passwd%20and%20other%20Lisp%20functions%20in%20Emacs%2020%20do%20not%20properly%20clear%20the%20history%20of%20recently%20typed&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0270-the-make-temp-name-lisp-function-in-emacs-20-creates-temporary-files-with-predictable-names-which-a-7df9e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0270%3A%20The%20make-temp-name%20Lisp%20function%20in%20Emacs%2020%20creates%20temporary%20files%20with%20predictable%20names%2C%20which%20a&amp;severity=low&amp;id=682ca32db6fd31d6ed7df9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0269-emacs-20-does-not-properly-set-permissions-for-a-slave-pty-device-when-starting-a-new-subprocess-wh-7df9e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0269%3A%20Emacs%2020%20does%20not%20properly%20set%20permissions%20for%20a%20slave%20PTY%20device%20when%20starting%20a%20new%20subprocess%2C%20wh&amp;severity=low&amp;id=682ca32db6fd31d6ed7df9e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0266-internet-explorer-5-01-allows-remote-attackers-to-bypass-the-cross-frame-security-policy-via-a-malic-7df9e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0266%3A%20Internet%20Explorer%205.01%20allows%20remote%20attackers%20to%20bypass%20the%20cross%20frame%20security%20policy%20via%20a%20malic&amp;severity=low&amp;id=682ca32db6fd31d6ed7df9e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0083-hp-asecure-creates-the-audio-security-file-audio-sec-with-insecure-permissions-which-allows-local-u-7df9e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0083%3A%20HP%20asecure%20creates%20the%20Audio%20Security%20File%20audio.sec%20with%20insecure%20permissions%2C%20which%20allows%20local%20u&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0265-panda-security-3-0-allows-users-to-uninstall-the-panda-software-via-its-add-remove-programs-applet-7df9d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0265%3A%20Panda%20Security%203.0%20allows%20users%20to%20uninstall%20the%20Panda%20software%20via%20its%20Add%2FRemove%20Programs%20applet.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0264-panda-security-3-0-with-registry-editing-disabled-allows-users-to-edit-the-registry-and-gain-privile-7df9d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0264%3A%20Panda%20Security%203.0%20with%20registry%20editing%20disabled%20allows%20users%20to%20edit%20the%20registry%20and%20gain%20privile&amp;severity=low&amp;id=682ca32db6fd31d6ed7df9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0291-buffer-overflow-in-star-office-5-1-allows-attackers-to-cause-a-denial-of-service-by-embedding-a-long-7df9d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0291%3A%20Buffer%20overflow%20in%20Star%20Office%205.1%20allows%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20embedding%20a%20long&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0286-x-fontserver-xfs-allows-local-users-to-cause-a-denial-of-service-via-malformed-input-to-the-server-7df9cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0286%3A%20X%20fontserver%20xfs%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20via%20malformed%20input%20to%20the%20server.&amp;severity=low&amp;id=682ca32db6fd31d6ed7df9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0285-buffer-overflow-in-xfree86-3-3-x-allows-local-users-to-execute-arbitrary-commands-via-a-long-xkbmap-7df9cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0285%3A%20Buffer%20overflow%20in%20XFree86%203.3.x%20allows%20local%20users%20to%20execute%20arbitrary%20commands%20via%20a%20long%20-xkbmap&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0284-buffer-overflow-in-university-of-washington-imapd-version-4-7-allows-users-with-a-valid-account-to-e-7df9cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0284%3A%20Buffer%20overflow%20in%20University%20of%20Washington%20imapd%20version%204.7%20allows%20users%20with%20a%20valid%20account%20to%20e&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0263-the-x-font-server-xfs-in-red-hat-linux-6-x-allows-an-attacker-to-cause-a-denial-of-service-via-a-mal-7df9c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0263%3A%20The%20X%20font%20server%20xfs%20in%20Red%20Hat%20Linux%206.x%20allows%20an%20attacker%20to%20cause%20a%20denial%20of%20service%20via%20a%20mal&amp;severity=low&amp;id=682ca32db6fd31d6ed7df9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-1218-the-default-configuration-for-the-domain-name-resolver-for-microsoft-windows-98-nt-4-0-2000-and-x-7df9c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-1218%3A%20The%20default%20configuration%20for%20the%20domain%20name%20resolver%20for%20Microsoft%20Windows%2098%2C%20NT%204.0%2C%202000%2C%20and%20X&amp;severity=critical&amp;id=682ca32db6fd31d6ed7df9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0260-buffer-overflow-in-the-dvwssr-dll-dll-in-microsoft-visual-interdev-1-0-allows-users-to-cause-a-denia-7df9c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0260%3A%20Buffer%20overflow%20in%20the%20dvwssr.dll%20DLL%20in%20Microsoft%20Visual%20Interdev%201.0%20allows%20users%20to%20cause%20a%20denia&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0254-the-dansie-shopping-cart-application-cart-pl-allows-remote-attackers-to-obtain-the-shopping-cart-dat-7df9c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0254%3A%20The%20dansie%20shopping%20cart%20application%20cart.pl%20allows%20remote%20attackers%20to%20obtain%20the%20shopping%20cart%20dat&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0250-the-crypt-function-in-qnx-uses-weak-encryption-which-allows-local-users-to-decrypt-passwords-7df9b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0250%3A%20The%20crypt%20function%20in%20QNX%20uses%20weak%20encryption%2C%20which%20allows%20local%20users%20to%20decrypt%20passwords.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0288-infonautics-getdoc-cgi-allows-remote-attackers-to-bypass-the-payment-phase-for-accessing-documents-v-7df9b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0288%3A%20Infonautics%20getdoc.cgi%20allows%20remote%20attackers%20to%20bypass%20the%20payment%20phase%20for%20accessing%20documents%20v&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0287-the-bizdb-cgi-script-bizdb-search-cgi-allows-remote-attackers-to-execute-arbitrary-commands-via-shel-7df9b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0287%3A%20The%20BizDB%20CGI%20script%20bizdb-search.cgi%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shel&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0283-the-default-installation-of-irix-performance-copilot-allows-remote-attackers-to-access-sensitive-sys-7df9b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0283%3A%20The%20default%20installation%20of%20IRIX%20Performance%20Copilot%20allows%20remote%20attackers%20to%20access%20sensitive%20sys&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0282-talentsoft-webpsvr-daemon-in-the-web-shopping-cart-application-allows-remote-attackers-to-read-arbi-7df9ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0282%3A%20TalentSoft%20webpsvr%20daemon%20in%20the%20Web%2B%20shopping%20cart%20application%20allows%20remote%20attackers%20to%20read%20arbi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0262-the-avm-ken-isdn-proxy-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-malformed-7df9ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0262%3A%20The%20AVM%20KEN!%20ISDN%20Proxy%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0261-the-avm-ken-web-server-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0261%3A%20The%20AVM%20KEN!%20web%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0259-the-default-permissions-for-the-cryptography-offload-registry-key-used-by-the-offloadmodexpo-in-wind-7df9a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0259%3A%20The%20default%20permissions%20for%20the%20Cryptography%5COffload%20registry%20key%20used%20by%20the%20OffloadModExpo%20in%20Wind&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0258-iis-4-0-and-5-0-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-many-urls-with-a-lar-7df9a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0258%3A%20IIS%204.0%20and%205.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20many%20URLs%20with%20a%20lar&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0253-the-dansie-shopping-cart-application-cart-pl-allows-remote-attackers-to-modify-sensitive-purchase-in-7df9a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0253%3A%20The%20dansie%20shopping%20cart%20application%20cart.pl%20allows%20remote%20attackers%20to%20modify%20sensitive%20purchase%20in&amp;severity=high&amp;id=682ca32db6fd31d6ed7df9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0252-the-dansie-shopping-cart-application-cart-pl-allows-remote-attackers-to-execute-commands-via-a-shell-7df997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0252%3A%20The%20dansie%20shopping%20cart%20application%20cart.pl%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20shell&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0979-the-sco-unixware-privileged-process-system-allows-local-users-to-gain-root-privileges-by-using-a-deb-7df995</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0979%3A%20The%20SCO%20UnixWare%20privileged%20process%20system%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20using%20a%20deb&amp;severity=high&amp;id=682ca32db6fd31d6ed7df995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0701-after-an-unattended-installation-of-windows-nt-4-0-an-installation-file-could-include-sensitive-inf-7df993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0701%3A%20After%20an%20unattended%20installation%20of%20Windows%20NT%204.0%2C%20an%20installation%20file%20could%20include%20sensitive%20inf&amp;severity=high&amp;id=682ca32db6fd31d6ed7df993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0699-the-bluestone-sapphire-web-server-allows-session-hijacking-via-easily-guessable-session-ids-7df991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0699%3A%20The%20Bluestone%20Sapphire%20web%20server%20allows%20session%20hijacking%20via%20easily%20guessable%20session%20IDs.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0695-the-sybase-powerdynamo-personal-web-server-allows-attackers-to-read-arbitrary-files-through-a-do-7df98f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0695%3A%20The%20Sybase%20PowerDynamo%20personal%20web%20server%20allows%20attackers%20to%20read%20arbitrary%20files%20through%20a%20..%20(do&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0294-buffer-overflow-in-healthd-for-freebsd-allows-local-users-to-gain-root-privileges-7df98d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0294%3A%20Buffer%20overflow%20in%20healthd%20for%20FreeBSD%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0276-beos-4-5-and-5-0-allow-local-users-to-cause-a-denial-of-service-via-malformed-direct-system-calls-us-7df98b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0276%3A%20BeOS%204.5%20and%205.0%20allow%20local%20users%20to%20cause%20a%20denial%20of%20service%20via%20malformed%20direct%20system%20calls%20us&amp;severity=low&amp;id=682ca32db6fd31d6ed7df98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0275-cryptocard-cryptoadmin-for-palmos-uses-weak-encryption-to-store-a-user-s-pin-number-which-allows-an-7df989</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0275%3A%20CRYPTOCard%20CryptoAdmin%20for%20PalmOS%20uses%20weak%20encryption%20to%20store%20a%20user&apos;s%20PIN%20number%2C%20which%20allows%20an&amp;severity=low&amp;id=682ca32db6fd31d6ed7df989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0274-the-linux-trustees-kernel-patch-allows-attackers-to-cause-a-denial-of-service-by-accessing-a-file-or-7df987</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0274%3A%20The%20Linux%20trustees%20kernel%20patch%20allows%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20accessing%20a%20file%20or&amp;severity=low&amp;id=682ca32db6fd31d6ed7df987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0273-pcanywhere-allows-remote-attackers-to-cause-a-denial-of-service-by-terminating-the-connection-before-7df985</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0273%3A%20PCAnywhere%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20terminating%20the%20connection%20before&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df985</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0298-the-unattended-installation-of-windows-2000-with-the-oempreinstall-option-sets-insecure-permissions-7df978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0298%3A%20The%20unattended%20installation%20of%20Windows%202000%20with%20the%20OEMPreinstall%20option%20sets%20insecure%20permissions%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0279-beos-allows-remote-attackers-to-cause-a-denial-of-service-via-malformed-packets-whose-length-field-i-7df976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0279%3A%20BeOS%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20malformed%20packets%20whose%20length%20field%20i&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0301-ipswitch-imail-server-6-02-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-via-the-7df974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0301%3A%20Ipswitch%20IMAIL%20server%206.02%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20the%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0300-the-default-encryption-method-of-pcanywhere-9-x-uses-weak-encryption-which-allows-remote-attackers-7df972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0300%3A%20The%20default%20encryption%20method%20of%20PcAnywhere%209.x%20uses%20weak%20encryption%2C%20which%20allows%20remote%20attackers%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0251-hp-ux-11-04-virtualvault-vvos-sends-data-to-unprivileged-processes-via-an-interface-that-has-multi-7df970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0251%3A%20HP-UX%2011.04%20VirtualVault%20(VVOS)%20sends%20data%20to%20unprivileged%20processes%20via%20an%20interface%20that%20has%20multi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0255-the-nbase-xyplex-edgeblaster-router-allows-remote-attackers-to-cause-a-denial-of-service-via-a-scan-7df96e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0255%3A%20The%20Nbase-Xyplex%20EdgeBlaster%20router%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20scan%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0299-buffer-overflow-in-webobjects-exe-in-the-webobjects-developer-4-5-package-allows-remote-attackers-to-7df96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0299%3A%20Buffer%20overflow%20in%20WebObjects.exe%20in%20the%20WebObjects%20Developer%204.5%20package%20allows%20remote%20attackers%20to&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0634-the-web-administration-interface-for-communigate-pro-3-2-5-and-earlier-allows-remote-attackers-to-re-7df96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0634%3A%20The%20web%20administration%20interface%20for%20CommuniGate%20Pro%203.2.5%20and%20earlier%20allows%20remote%20attackers%20to%20re&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0297-allaire-forums-2-0-5-allows-remote-attackers-to-bypass-access-restrictions-to-secure-conferences-via-7df968</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0297%3A%20Allaire%20Forums%202.0.5%20allows%20remote%20attackers%20to%20bypass%20access%20restrictions%20to%20secure%20conferences%20via&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0280-buffer-overflow-in-the-realnetworks-realplayer-client-versions-6-and-7-allows-remote-attackers-to-ca-7df966</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0280%3A%20Buffer%20overflow%20in%20the%20RealNetworks%20RealPlayer%20client%20versions%206%20and%207%20allows%20remote%20attackers%20to%20ca&amp;severity=low&amp;id=682ca32db6fd31d6ed7df966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0277-microsoft-excel-97-and-2000-does-not-warn-the-user-when-executing-excel-macro-language-xlm-macros-7df959</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0277%3A%20Microsoft%20Excel%2097%20and%202000%20does%20not%20warn%20the%20user%20when%20executing%20Excel%20Macro%20Language%20(XLM)%20macros%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0790-a-remote-attacker-can-read-information-from-a-netscape-user-s-cache-via-javascript-7df957</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0790%3A%20A%20remote%20attacker%20can%20read%20information%20from%20a%20Netscape%20user&apos;s%20cache%20via%20JavaScript.&amp;severity=low&amp;id=682ca32db6fd31d6ed7df957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0302-microsoft-index-server-allows-remote-attackers-to-view-the-source-code-of-asp-files-by-appending-a-7df955</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0302%3A%20Microsoft%20Index%20Server%20allows%20remote%20attackers%20to%20view%20the%20source%20code%20of%20ASP%20files%20by%20appending%20a%20%25&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0296-fcheck-allows-local-users-to-gain-privileges-by-embedding-shell-metacharacters-into-file-names-that-7df953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0296%3A%20fcheck%20allows%20local%20users%20to%20gain%20privileges%20by%20embedding%20shell%20metacharacters%20into%20file%20names%20that%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0290-buffer-overflow-in-webstar-http-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-lo-7df951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0290%3A%20Buffer%20overflow%20in%20Webstar%20HTTP%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20lo&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0234-the-default-configuration-of-cobalt-raq2-and-raq3-as-specified-in-access-conf-allows-remote-attacker-7df94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0234%3A%20The%20default%20configuration%20of%20Cobalt%20RaQ2%20and%20RaQ3%20as%20specified%20in%20access.conf%20allows%20remote%20attacker&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0246-iis-4-0-and-5-0-does-not-properly-perform-isapi-extension-processing-if-a-virtual-directory-is-mappe-7df94d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0246%3A%20IIS%204.0%20and%205.0%20does%20not%20properly%20perform%20ISAPI%20extension%20processing%20if%20a%20virtual%20directory%20is%20mappe&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0232-microsoft-tcp-ip-printing-services-aka-print-services-for-unix-allows-an-attacker-to-cause-a-denia-7df94b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0232%3A%20Microsoft%20TCP%2FIP%20Printing%20Services%2C%20aka%20Print%20Services%20for%20Unix%2C%20allows%20an%20attacker%20to%20cause%20a%20denia&amp;severity=low&amp;id=682ca32db6fd31d6ed7df94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0152-remote-attackers-can-cause-a-denial-of-service-in-novell-bordermanager-3-5-by-pressing-the-enter-key-7df949</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0152%3A%20Remote%20attackers%20can%20cause%20a%20denial%20of%20service%20in%20Novell%20BorderManager%203.5%20by%20pressing%20the%20enter%20key&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0244-the-citrix-ica-independent-computing-architecture-protocol-uses-weak-encryption-xor-for-user-aut-7df947</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0244%3A%20The%20Citrix%20ICA%20(Independent%20Computing%20Architecture)%20protocol%20uses%20weak%20encryption%20(XOR)%20for%20user%20aut&amp;severity=high&amp;id=682ca32db6fd31d6ed7df947</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0289-ip-masquerading-in-linux-2-2-x-allows-remote-attackers-to-route-udp-packets-through-the-internal-int-7df93a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0289%3A%20IP%20masquerading%20in%20Linux%202.2.x%20allows%20remote%20attackers%20to%20route%20UDP%20packets%20through%20the%20internal%20int&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0245-vulnerability-in-sgi-irix-objectserver-daemon-allows-remote-attackers-to-create-user-accounts-7df938</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0245%3A%20Vulnerability%20in%20SGI%20IRIX%20objectserver%20daemon%20allows%20remote%20attackers%20to%20create%20user%20accounts.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0235-buffer-overflow-in-the-huh-program-in-the-orville-write-package-allows-local-users-to-gain-root-priv-7df936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0235%3A%20Buffer%20overflow%20in%20the%20huh%20program%20in%20the%20orville-write%20package%20allows%20local%20users%20to%20gain%20root%20priv&amp;severity=high&amp;id=682ca32db6fd31d6ed7df936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0243-analogx-simpleserver-www-http-server-1-03-allows-remote-attackers-to-cause-a-denial-of-service-via-a-7df932</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0243%3A%20AnalogX%20SimpleServer%3AWWW%20HTTP%20server%201.03%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0242-windmail-allows-remote-attackers-to-read-arbitrary-files-or-execute-commands-via-shell-metacharacter-7df930</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0242%3A%20WindMail%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20or%20execute%20commands%20via%20shell%20metacharacter&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0227-the-linux-2-2-x-kernel-does-not-restrict-the-number-of-unix-domain-sockets-as-defined-by-the-wmem-ma-7df92e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0227%3A%20The%20Linux%202.2.x%20kernel%20does%20not%20restrict%20the%20number%20of%20Unix%20domain%20sockets%20as%20defined%20by%20the%20wmem_ma&amp;severity=low&amp;id=682ca32db6fd31d6ed7df92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0247-unknown-vulnerability-in-generic-nqs-gnqs-allows-local-users-to-gain-root-privileges-7df92c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0247%3A%20Unknown%20vulnerability%20in%20Generic-NQS%20(GNQS)%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0229-gpm-root-in-the-gpm-package-does-not-properly-drop-privileges-which-allows-local-users-to-gain-priv-7df92a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0229%3A%20gpm-root%20in%20the%20gpm%20package%20does%20not%20properly%20drop%20privileges%2C%20which%20allows%20local%20users%20to%20gain%20priv&amp;severity=high&amp;id=682ca32db6fd31d6ed7df92a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0241-vqsoft-vqserver-stores-sensitive-information-such-as-passwords-in-cleartext-in-the-server-cfg-file-7df928</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0241%3A%20vqSoft%20vqServer%20stores%20sensitive%20information%20such%20as%20passwords%20in%20cleartext%20in%20the%20server.cfg%20file%2C%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df928</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0240-vqsoft-vqserver-program-allows-remote-attackers-to-read-arbitrary-files-via-a-in-the-ur-7df91b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0240%3A%20vqSoft%20vqServer%20program%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20%2F..........%2F%20in%20the%20UR&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0613-cisco-secure-pix-firewall-does-not-properly-identify-forged-tcp-reset-rst-packets-which-allows-re-7df919</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0613%3A%20Cisco%20Secure%20PIX%20Firewall%20does%20not%20properly%20identify%20forged%20TCP%20Reset%20(RST)%20packets%2C%20which%20allows%20re&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0226-iis-4-0-allows-attackers-to-cause-a-denial-of-service-by-requesting-a-large-buffer-in-a-post-or-put-7df917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0226%3A%20IIS%204.0%20allows%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20requesting%20a%20large%20buffer%20in%20a%20POST%20or%20PUT%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0238-buffer-overflow-in-the-web-server-for-norton-antivirus-for-internet-email-gateways-allows-remote-att-7df915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0238%3A%20Buffer%20overflow%20in%20the%20web%20server%20for%20Norton%20AntiVirus%20for%20Internet%20Email%20Gateways%20allows%20remote%20att&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0236-netscape-enterprise-server-with-directory-indexing-enabled-allows-remote-attackers-to-list-server-di-7df913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0236%3A%20Netscape%20Enterprise%20Server%20with%20Directory%20Indexing%20enabled%20allows%20remote%20attackers%20to%20list%20server%20di&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0228-microsoft-windows-media-license-manager-allows-remote-attackers-to-cause-a-denial-of-service-by-send-7df911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0228%3A%20Microsoft%20Windows%20Media%20License%20Manager%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20send&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0231-linux-kreatecd-trusts-a-user-supplied-path-that-is-used-to-find-the-cdrecord-program-allowing-local-7df90f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0231%3A%20Linux%20kreatecd%20trusts%20a%20user-supplied%20path%20that%20is%20used%20to%20find%20the%20cdrecord%20program%2C%20allowing%20local&amp;severity=high&amp;id=682ca32db6fd31d6ed7df90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0239-buffer-overflow-in-the-mercur-webview-webmail-server-allows-remote-attackers-to-cause-a-denial-of-se-7df90d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0239%3A%20Buffer%20overflow%20in%20the%20MERCUR%20WebView%20WebMail%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20se&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0233-suse-linux-imap-server-allows-remote-attackers-to-bypass-imap-authentication-and-gain-privileges-7df90b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0233%3A%20SuSE%20Linux%20IMAP%20server%20allows%20remote%20attackers%20to%20bypass%20IMAP%20authentication%20and%20gain%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0198-buffer-overflow-in-pop3-and-imap-servers-in-the-mercur-mail-server-suite-allows-remote-attackers-to-7df909</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0198%3A%20Buffer%20overflow%20in%20POP3%20and%20IMAP%20servers%20in%20the%20MERCUR%20mail%20server%20suite%20allows%20remote%20attackers%20to%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0169-batch-files-in-the-oracle-web-listener-ows-bin-directory-allow-remote-attackers-to-execute-commands-7df8fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0169%3A%20Batch%20files%20in%20the%20Oracle%20web%20listener%20ows-bin%20directory%20allow%20remote%20attackers%20to%20execute%20commands%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0180-sojourn-search-engine-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df8f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0180%3A%20Sojourn%20search%20engine%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0230-buffer-overflow-in-imwheel-allows-local-users-to-gain-root-privileges-via-the-imwheel-solo-script-an-7df8f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0230%3A%20Buffer%20overflow%20in%20imwheel%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20the%20imwheel-solo%20script%20an&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0237-netscape-enterprise-server-with-web-publishing-enabled-allows-remote-attackers-to-list-arbitrary-dir-7df8f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0237%3A%20Netscape%20Enterprise%20Server%20with%20Web%20Publishing%20enabled%20allows%20remote%20attackers%20to%20list%20arbitrary%20dir&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0181-firewall-1-3-0-and-4-0-leaks-packets-with-private-ip-address-information-which-could-allow-remote-a-7df8f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0181%3A%20Firewall-1%203.0%20and%204.0%20leaks%20packets%20with%20private%20IP%20address%20information%2C%20which%20could%20allow%20remote%20a&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0171-atsadc-in-the-atsar-package-for-linux-does-not-properly-check-the-permissions-of-an-output-file-whi-7df8f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0171%3A%20atsadc%20in%20the%20atsar%20package%20for%20Linux%20does%20not%20properly%20check%20the%20permissions%20of%20an%20output%20file%2C%20whi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0223-buffer-overflow-in-the-wmcdplay-cd-player-program-for-the-windowmaker-desktop-allows-local-users-to-7df8ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0223%3A%20Buffer%20overflow%20in%20the%20wmcdplay%20CD%20player%20program%20for%20the%20WindowMaker%20desktop%20allows%20local%20users%20to%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0183-buffer-overflow-in-ircii-4-4-irc-client-allows-remote-attackers-to-execute-commands-via-the-dcc-chat-7df8ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0183%3A%20Buffer%20overflow%20in%20ircII%204.4%20IRC%20client%20allows%20remote%20attackers%20to%20execute%20commands%20via%20the%20DCC%20chat&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0173-vulnerability-in-the-eels-system-in-sco-unixware-7-1-x-allows-remote-attackers-to-cause-a-denial-of-7df8ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0173%3A%20Vulnerability%20in%20the%20EELS%20system%20in%20SCO%20UnixWare%207.1.x%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0184-linux-printtool-sets-the-permissions-of-printer-configuration-files-to-be-world-readable-which-allo-7df8dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0184%3A%20Linux%20printtool%20sets%20the%20permissions%20of%20printer%20configuration%20files%20to%20be%20world-readable%2C%20which%20allo&amp;severity=low&amp;id=682ca32db6fd31d6ed7df8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0175-buffer-overflow-in-staroffice-starscheduler-web-server-allows-remote-attackers-to-gain-root-access-v-7df8db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0175%3A%20Buffer%20overflow%20in%20StarOffice%20StarScheduler%20web%20server%20allows%20remote%20attackers%20to%20gain%20root%20access%20v&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0174-staroffice-starscheduler-web-server-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-do-7df8d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0174%3A%20StarOffice%20StarScheduler%20web%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20do&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0202-microsoft-sql-server-7-0-and-microsoft-data-engine-msde-1-0-allow-remote-attackers-to-gain-privile-7df8d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0202%3A%20Microsoft%20SQL%20Server%207.0%20and%20Microsoft%20Data%20Engine%20(MSDE)%201.0%20allow%20remote%20attackers%20to%20gain%20privile&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0185-realmedia-realserver-reveals-the-real-ip-address-of-a-real-server-even-if-the-address-is-supposed-t-7df8d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0185%3A%20RealMedia%20RealServer%20reveals%20the%20real%20IP%20address%20of%20a%20Real%20Server%2C%20even%20if%20the%20address%20is%20supposed%20t&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0225-the-pocsag-poc32-program-does-not-properly-prevent-remote-users-from-accessing-its-server-port-even-7df8d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0225%3A%20The%20Pocsag%20POC32%20program%20does%20not%20properly%20prevent%20remote%20users%20from%20accessing%20its%20server%20port%2C%20even&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0200-buffer-overflow-in-microsoft-clip-art-gallery-allows-remote-attackers-to-cause-a-denial-of-service-o-7df8d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0200%3A%20Buffer%20overflow%20in%20Microsoft%20Clip%20Art%20Gallery%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20o&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0206-the-installation-of-oracle-8-1-5-x-on-linux-follows-symlinks-and-creates-the-orainstroot-sh-file-wit-7df8cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0206%3A%20The%20installation%20of%20Oracle%208.1.5.x%20on%20Linux%20follows%20symlinks%20and%20creates%20the%20orainstRoot.sh%20file%20wit&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0192-the-default-installation-of-caldera-openlinux-2-3-includes-the-cgi-program-rpm-query-which-allows-r-7df8cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0192%3A%20The%20default%20installation%20of%20Caldera%20OpenLinux%202.3%20includes%20the%20CGI%20program%20rpm_query%2C%20which%20allows%20r&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0168-microsoft-windows-9x-operating-systems-allow-an-attacker-to-cause-a-denial-of-service-via-a-pathname-7df8cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0168%3A%20Microsoft%20Windows%209x%20operating%20systems%20allow%20an%20attacker%20to%20cause%20a%20denial%20of%20service%20via%20a%20pathname&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0205-trend-micro-officescan-allows-remote-attackers-to-replay-administrative-commands-and-modify-the-conf-7df8be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0205%3A%20Trend%20Micro%20OfficeScan%20allows%20remote%20attackers%20to%20replay%20administrative%20commands%20and%20modify%20the%20conf&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0172-the-mtr-program-only-uses-a-seteuid-call-when-attempting-to-drop-privileges-which-could-allow-local-7df8bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0172%3A%20The%20mtr%20program%20only%20uses%20a%20seteuid%20call%20when%20attempting%20to%20drop%20privileges%2C%20which%20could%20allow%20local&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0193-the-default-configuration-of-dosemu-in-corel-linux-1-0-allows-local-users-to-execute-the-system-com-7df8ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0193%3A%20The%20default%20configuration%20of%20Dosemu%20in%20Corel%20Linux%201.0%20allows%20local%20users%20to%20execute%20the%20system.com%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0190-aol-instant-messenger-aim-client-allows-remote-attackers-to-cause-a-denial-of-service-via-a-messag-7df8b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0190%3A%20AOL%20Instant%20Messenger%20(AIM)%20client%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20messag&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0177-dnstools-cgi-applications-allow-remote-attackers-to-execute-arbitrary-commands-via-shell-metacharact-7df8b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0177%3A%20DNSTools%20CGI%20applications%20allow%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shell%20metacharact&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0693-buffer-overflow-in-tt-session-environment-variable-in-tooltalk-shared-library-allows-local-users-to-7df8b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0693%3A%20Buffer%20overflow%20in%20TT_SESSION%20environment%20variable%20in%20ToolTalk%20shared%20library%20allows%20local%20users%20to%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0207-sgi-infosearch-cgi-program-infosrch-cgi-allows-remote-attackers-to-execute-commands-via-shell-metach-7df8b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0207%3A%20SGI%20InfoSearch%20CGI%20program%20infosrch.cgi%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metach&amp;severity=high&amp;id=682ca32db6fd31d6ed7df8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0201-the-window-showhelp-method-in-internet-explorer-5-x-does-not-restrict-html-help-files-chm-to-be-7df8b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0201%3A%20The%20window.showHelp()%20method%20in%20Internet%20Explorer%205.x%20does%20not%20restrict%20HTML%20help%20files%20(.chm)%20to%20be&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0189-coldfusion-server-4-x-allows-remote-attackers-to-determine-the-real-pathname-of-the-server-via-an-ht-7df8ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0189%3A%20ColdFusion%20Server%204.x%20allows%20remote%20attackers%20to%20determine%20the%20real%20pathname%20of%20the%20server%20via%20an%20HT&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0216-microsoft-email-clients-in-outlook-exchange-and-windows-messaging-automatically-respond-to-read-re-7df8ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0216%3A%20Microsoft%20email%20clients%20in%20Outlook%2C%20Exchange%2C%20and%20Windows%20Messaging%20automatically%20respond%20to%20Read%20Re&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df8ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0208-the-htdig-ht-dig-cgi-program-htsearch-allows-remote-attackers-to-read-arbitrary-files-by-enclosi-7df89f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0208%3A%20The%20htdig%20(ht%3A%2F%2FDig)%20CGI%20program%20htsearch%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20by%20enclosi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0191-axis-storpoint-cd-allows-remote-attackers-to-access-administrator-urls-without-authentication-via-a-7df89d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0191%3A%20Axis%20StorPoint%20CD%20allows%20remote%20attackers%20to%20access%20administrator%20URLs%20without%20authentication%20via%20a%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0176-the-default-configuration-of-serv-u-2-5d-and-earlier-allows-remote-attackers-to-determine-the-real-p-7df89b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0176%3A%20The%20default%20configuration%20of%20Serv-U%202.5d%20and%20earlier%20allows%20remote%20attackers%20to%20determine%20the%20real%20p&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0204-the-trend-micro-officescan-client-allows-remote-attackers-to-cause-a-denial-of-service-by-making-5-c-7df899</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0204%3A%20The%20Trend%20Micro%20OfficeScan%20client%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20making%205%20c&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0203-the-trend-micro-officescan-client-tmlisten-exe-allows-remote-attackers-to-cause-a-denial-of-service-7df897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0203%3A%20The%20Trend%20Micro%20OfficeScan%20client%20tmlisten.exe%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0196-buffer-overflow-in-mhshow-in-the-linux-nmh-package-allows-remote-attackers-to-execute-commands-via-m-7df895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0196%3A%20Buffer%20overflow%20in%20mhshow%20in%20the%20Linux%20nmh%20package%20allows%20remote%20attackers%20to%20execute%20commands%20via%20m&amp;severity=high&amp;id=682ca32db6fd31d6ed7df895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0186-buffer-overflow-in-the-dump-utility-in-the-linux-ext2fs-backup-package-allows-local-users-to-gain-pr-7df893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0186%3A%20Buffer%20overflow%20in%20the%20dump%20utility%20in%20the%20Linux%20ext2fs%20backup%20package%20allows%20local%20users%20to%20gain%20pr&amp;severity=high&amp;id=682ca32db6fd31d6ed7df893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0179-hp-openview-omniback-2-55-allows-remote-attackers-to-cause-a-denial-of-service-via-a-large-number-of-7df891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0179%3A%20HP%20OpenView%20OmniBack%202.55%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20large%20number%20of&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0178-serveriron-switches-by-foundry-networks-have-predictable-tcp-ip-sequence-numbers-which-allows-remot-7df88f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0178%3A%20ServerIron%20switches%20by%20Foundry%20Networks%20have%20predictable%20TCP%2FIP%20sequence%20numbers%2C%20which%20allows%20remot&amp;severity=high&amp;id=682ca32db6fd31d6ed7df88f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0209-buffer-overflow-in-lynx-2-x-allows-remote-attackers-to-crash-lynx-and-possibly-execute-commands-via-7df88d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0209%3A%20Buffer%20overflow%20in%20Lynx%202.x%20allows%20remote%20attackers%20to%20crash%20Lynx%20and%20possibly%20execute%20commands%20via%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df88d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0188-ezshopper-3-0-search-cgi-cgi-script-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-do-7df880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0188%3A%20EZShopper%203.0%20search.cgi%20CGI%20script%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20do&amp;severity=high&amp;id=682ca32db6fd31d6ed7df880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0187-ezshopper-3-0-loadpage-cgi-cgi-script-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-7df87e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0187%3A%20EZShopper%203.0%20loadpage.cgi%20CGI%20script%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0170-buffer-overflow-in-the-man-program-in-linux-allows-local-users-to-gain-privileges-via-the-manpager-e-7df87c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0170%3A%20Buffer%20overflow%20in%20the%20man%20program%20in%20Linux%20allows%20local%20users%20to%20gain%20privileges%20via%20the%20MANPAGER%20e&amp;severity=high&amp;id=682ca32db6fd31d6ed7df87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0221-the-nautica-marlin-bridge-allows-remote-attackers-to-cause-a-denial-of-service-via-a-zero-length-udp-7df87a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0221%3A%20The%20Nautica%20Marlin%20bridge%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20zero%20length%20UDP&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0220-zonealarm-sends-sensitive-system-and-network-information-in-cleartext-to-the-zone-labs-server-if-a-u-7df878</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0220%3A%20ZoneAlarm%20sends%20sensitive%20system%20and%20network%20information%20in%20cleartext%20to%20the%20Zone%20Labs%20server%20if%20a%20u&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0217-the-default-configuration-of-ssh-allows-x-forwarding-which-could-allow-a-remote-attacker-to-control-7df876</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0217%3A%20The%20default%20configuration%20of%20SSH%20allows%20X%20forwarding%2C%20which%20could%20allow%20a%20remote%20attacker%20to%20control&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0214-ftp-explorer-uses-weak-encryption-for-storing-the-username-password-and-profile-of-ftp-sites-7df874</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0214%3A%20FTP%20Explorer%20uses%20weak%20encryption%20for%20storing%20the%20username%2C%20password%2C%20and%20profile%20of%20FTP%20sites.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0212-interaccess-telnetd-server-4-0-allows-remote-attackers-to-conduct-a-denial-of-service-via-malformed-7df872</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0212%3A%20InterAccess%20TelnetD%20Server%204.0%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service%20via%20malformed%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0195-setxconf-in-corel-linux-allows-local-users-to-gain-root-access-via-the-t-parameter-which-executes-7df870</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0195%3A%20setxconf%20in%20Corel%20Linux%20allows%20local%20users%20to%20gain%20root%20access%20via%20the%20-T%20parameter%2C%20which%20executes%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df870</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0194-buildxconf-in-corel-linux-allows-local-users-to-modify-or-create-arbitrary-files-via-the-x-or-f-pa-7df86e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0194%3A%20buildxconf%20in%20Corel%20Linux%20allows%20local%20users%20to%20modify%20or%20create%20arbitrary%20files%20via%20the%20-x%20or%20-f%20pa&amp;severity=high&amp;id=682ca32db6fd31d6ed7df86e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0213-the-sambar-server-includes-batch-files-echo-bat-and-hello-bat-in-the-cgi-directory-which-allow-remo-7df85f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0213%3A%20The%20Sambar%20server%20includes%20batch%20files%20ECHO.BAT%20and%20HELLO.BAT%20in%20the%20CGI%20directory%2C%20which%20allow%20remo&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0219-red-hat-6-0-allows-local-users-to-gain-root-access-by-booting-single-user-and-hitting-c-at-the-pass-7df861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0219%3A%20Red%20Hat%206.0%20allows%20local%20users%20to%20gain%20root%20access%20by%20booting%20single%20user%20and%20hitting%20%5EC%20at%20the%20pass&amp;severity=high&amp;id=682ca32db6fd31d6ed7df861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0211-the-windows-media-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-series-of-client-7df85d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0211%3A%20The%20Windows%20Media%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20series%20of%20client&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0182-iplanet-web-server-4-1-allows-remote-attackers-to-cause-a-denial-of-service-via-a-large-number-of-ge-7df85b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0182%3A%20iPlanet%20Web%20Server%204.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20large%20number%20of%20GE&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0210-the-lit-program-in-sun-flex-license-manager-flexlm-follows-symlinks-which-allows-local-users-to-m-7df859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0210%3A%20The%20lit%20program%20in%20Sun%20Flex%20License%20Manager%20(FlexLM)%20follows%20symlinks%2C%20which%20allows%20local%20users%20to%20m&amp;severity=low&amp;id=682ca32db6fd31d6ed7df859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0166-buffer-overflow-in-the-interaccess-telnet-server-telnetd-allows-remote-attackers-to-execute-commands-7df857</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0166%3A%20Buffer%20overflow%20in%20the%20InterAccess%20telnet%20server%20TelnetD%20allows%20remote%20attackers%20to%20execute%20commands&amp;severity=high&amp;id=682ca32db6fd31d6ed7df857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0163-asmon-and-ascpu-in-freebsd-allow-local-users-to-gain-root-privileges-via-a-configuration-file-7df855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0163%3A%20asmon%20and%20ascpu%20in%20FreeBSD%20allow%20local%20users%20to%20gain%20root%20privileges%20via%20a%20configuration%20file.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0160-the-microsoft-active-setup-activex-component-in-internet-explorer-4-x-and-5-x-allows-a-remote-attack-7df853</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0160%3A%20The%20Microsoft%20Active%20Setup%20ActiveX%20component%20in%20Internet%20Explorer%204.x%20and%205.x%20allows%20a%20remote%20attack&amp;severity=high&amp;id=682ca32db6fd31d6ed7df853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0164-the-installation-of-sun-internet-mail-server-sims-creates-a-world-readable-file-that-allows-local-7df851</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0164%3A%20The%20installation%20of%20Sun%20Internet%20Mail%20Server%20(SIMS)%20creates%20a%20world-readable%20file%20that%20allows%20local%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df851</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0162-the-microsoft-virtual-machine-vm-in-internet-explorer-4-x-and-5-x-allows-a-remote-attacker-to-read-7df84f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0162%3A%20The%20Microsoft%20virtual%20machine%20(VM)%20in%20Internet%20Explorer%204.x%20and%205.x%20allows%20a%20remote%20attacker%20to%20read&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df84f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0161-sample-web-sites-on-microsoft-site-server-3-0-commerce-edition-do-not-validate-an-identification-num-7df842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0161%3A%20Sample%20web%20sites%20on%20Microsoft%20Site%20Server%203.0%20Commerce%20Edition%20do%20not%20validate%20an%20identification%20num&amp;severity=high&amp;id=682ca32db6fd31d6ed7df842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0155-windows-nt-autorun-executes-the-autorun-inf-file-on-non-removable-media-which-allows-local-attacker-7df840</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0155%3A%20Windows%20NT%20Autorun%20executes%20the%20autorun.inf%20file%20on%20non-removable%20media%2C%20which%20allows%20local%20attacker&amp;severity=high&amp;id=682ca32db6fd31d6ed7df840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0159-hp-ignite-ux-does-not-save-etc-passwd-when-it-creates-an-image-of-a-trusted-system-which-can-set-t-7df83e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0159%3A%20HP%20Ignite-UX%20does%20not%20save%20%2Fetc%2Fpasswd%20when%20it%20creates%20an%20image%20of%20a%20trusted%20system%2C%20which%20can%20set%20t&amp;severity=high&amp;id=682ca32db6fd31d6ed7df83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0158-buffer-overflow-in-mmdf-server-allows-remote-attackers-to-gain-privileges-via-a-long-mail-from-comma-7df83c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0158%3A%20Buffer%20overflow%20in%20MMDF%20server%20allows%20remote%20attackers%20to%20gain%20privileges%20via%20a%20long%20MAIL%20FROM%20comma&amp;severity=high&amp;id=682ca32db6fd31d6ed7df83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0156-internet-explorer-4-x-and-5-x-allows-remote-web-servers-to-access-files-on-the-client-that-are-outsi-7df83a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0156%3A%20Internet%20Explorer%204.x%20and%205.x%20allows%20remote%20web%20servers%20to%20access%20files%20on%20the%20client%20that%20are%20outsi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0154-the-arcserve-agent-in-unixware-allows-local-attackers-to-modify-arbitrary-files-via-a-symlink-attack-7df838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0154%3A%20The%20ARCserve%20agent%20in%20UnixWare%20allows%20local%20attackers%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attack&amp;severity=low&amp;id=682ca32db6fd31d6ed7df838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0094-procfs-in-bsd-systems-allows-local-users-to-gain-root-privileges-by-modifying-the-proc-pid-mem-inte-7df836</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0094%3A%20procfs%20in%20BSD%20systems%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20modifying%20the%20%2Fproc%2Fpid%2Fmem%20inte&amp;severity=high&amp;id=682ca32db6fd31d6ed7df836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0224-arcserve-agent-in-sco-unixware-7-x-allows-local-attackers-to-gain-root-privileges-via-a-symlink-atta-7df834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0224%3A%20ARCserve%20agent%20in%20SCO%20UnixWare%207.x%20allows%20local%20attackers%20to%20gain%20root%20privileges%20via%20a%20symlink%20atta&amp;severity=low&amp;id=682ca32db6fd31d6ed7df834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0222-the-installation-for-windows-2000-does-not-activate-the-administrator-password-until-the-system-has-7df832</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0222%3A%20The%20installation%20for%20Windows%202000%20does%20not%20activate%20the%20Administrator%20password%20until%20the%20system%20has%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df832</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0167-iis-inetinfo-exe-allows-local-users-to-cause-a-denial-of-service-by-creating-a-mail-file-with-a-long-7df830</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0167%3A%20IIS%20Inetinfo.exe%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20by%20creating%20a%20mail%20file%20with%20a%20long&amp;severity=low&amp;id=682ca32db6fd31d6ed7df830</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0197-the-windows-nt-scheduler-uses-the-drive-mapping-of-the-interactive-user-who-is-currently-logged-onto-7df823</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0197%3A%20The%20Windows%20NT%20scheduler%20uses%20the%20drive%20mapping%20of%20the%20interactive%20user%20who%20is%20currently%20logged%20onto&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0150-check-point-firewall-1-allows-remote-attackers-to-bypass-port-access-restrictions-on-an-ftp-server-b-7df821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0150%3A%20Check%20Point%20Firewall-1%20allows%20remote%20attackers%20to%20bypass%20port%20access%20restrictions%20on%20an%20FTP%20server%20b&amp;severity=high&amp;id=682ca32db6fd31d6ed7df821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0143-the-ssh-protocol-server-sshd-allows-local-users-without-shell-access-to-redirect-a-tcp-connection-th-7df81f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0143%3A%20The%20SSH%20protocol%20server%20sshd%20allows%20local%20users%20without%20shell%20access%20to%20redirect%20a%20TCP%20connection%20th&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0142-the-authentication-protocol-in-timbuktu-pro-2-0b650-allows-remote-attackers-to-cause-a-denial-of-ser-7df81d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0142%3A%20The%20authentication%20protocol%20in%20Timbuktu%20Pro%202.0b650%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20ser&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0141-infopop-ultimate-bulletin-board-ubb-allows-remote-attackers-to-execute-commands-via-shell-metachar-7df81b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0141%3A%20Infopop%20Ultimate%20Bulletin%20Board%20(UBB)%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metachar&amp;severity=high&amp;id=682ca32db6fd31d6ed7df81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0140-internet-anywhere-pop3-mail-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-large-7df819</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0140%3A%20Internet%20Anywhere%20POP3%20Mail%20Server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20large%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df819</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0215-vulnerability-in-sco-cu-program-in-unixware-7-x-allows-local-users-to-gain-privileges-7df817</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0215%3A%20Vulnerability%20in%20SCO%20cu%20program%20in%20UnixWare%207.x%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0149-zeus-web-server-allows-remote-attackers-to-view-the-source-code-for-cgi-programs-via-a-null-characte-7df815</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0149%3A%20Zeus%20web%20server%20allows%20remote%20attackers%20to%20view%20the%20source%20code%20for%20CGI%20programs%20via%20a%20null%20characte&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0148-mysql-3-22-allows-remote-attackers-to-bypass-password-authentication-and-access-a-database-via-a-sho-7df813</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0148%3A%20MySQL%203.22%20allows%20remote%20attackers%20to%20bypass%20password%20authentication%20and%20access%20a%20database%20via%20a%20sho&amp;severity=high&amp;id=682ca32db6fd31d6ed7df813</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0147-snmpd-in-sco-openserver-has-an-snmp-community-string-that-is-writable-by-default-which-allows-local-7df811</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0147%3A%20snmpd%20in%20SCO%20OpenServer%20has%20an%20SNMP%20community%20string%20that%20is%20writable%20by%20default%2C%20which%20allows%20local&amp;severity=low&amp;id=682ca32db6fd31d6ed7df811</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0146-the-java-server-in-the-novell-groupwise-web-access-enhancement-pack-allows-remote-attackers-to-cause-7df804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0146%3A%20The%20Java%20Server%20in%20the%20Novell%20GroupWise%20Web%20Access%20Enhancement%20Pack%20allows%20remote%20attackers%20to%20cause&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0144-axis-700-network-scanner-does-not-properly-restrict-access-to-administrator-urls-which-allows-users-7df802</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0144%3A%20Axis%20700%20Network%20Scanner%20does%20not%20properly%20restrict%20access%20to%20administrator%20URLs%2C%20which%20allows%20users&amp;severity=high&amp;id=682ca32db6fd31d6ed7df802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0472-buffer-overflow-in-innd-2-2-2-allows-remote-attackers-to-execute-arbitrary-commands-via-a-cancel-req-7df800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0472%3A%20Buffer%20overflow%20in%20innd%202.2.2%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20a%20cancel%20req&amp;severity=low&amp;id=682ca32db6fd31d6ed7df800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0145-the-libguile-so-library-file-used-by-gnucash-in-debian-gnu-linux-is-installed-with-world-writable-pe-7df7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0145%3A%20The%20libguile.so%20library%20file%20used%20by%20gnucash%20in%20Debian%20GNU%2FLinux%20is%20installed%20with%20world-writable%20pe&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0129-buffer-overflow-in-the-shgetpathfromidlist-function-of-the-serv-u-ftp-server-allows-attackers-to-cau-7df7fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0129%3A%20Buffer%20overflow%20in%20the%20SHGetPathFromIDList%20function%20of%20the%20Serv-U%20FTP%20server%20allows%20attackers%20to%20cau&amp;severity=low&amp;id=682ca32db6fd31d6ed7df7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0128-the-finger-server-0-82-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-7df7fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0128%3A%20The%20Finger%20Server%200.82%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0089-the-rdisk-utility-in-microsoft-terminal-server-edition-and-windows-nt-4-0-stores-registry-hive-infor-7df7f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0089%3A%20The%20rdisk%20utility%20in%20Microsoft%20Terminal%20Server%20Edition%20and%20Windows%20NT%204.0%20stores%20registry%20hive%20infor&amp;severity=low&amp;id=682ca32db6fd31d6ed7df7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0218-buffer-overflow-in-linux-mount-and-umount-allows-local-users-to-gain-root-privileges-via-a-long-rela-7df7f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0218%3A%20Buffer%20overflow%20in%20Linux%20mount%20and%20umount%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20rela&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0127-the-webspeed-configuration-program-does-not-properly-disable-access-to-the-wsmadmin-utility-which-a-7df7f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0127%3A%20The%20Webspeed%20configuration%20program%20does%20not%20properly%20disable%20access%20to%20the%20WSMadmin%20utility%2C%20which%20a&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0125-wwwthreads-does-not-properly-cleanse-numeric-data-or-table-names-that-are-passed-to-sql-queries-whi-7df7f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0125%3A%20wwwthreads%20does%20not%20properly%20cleanse%20numeric%20data%20or%20table%20names%20that%20are%20passed%20to%20SQL%20queries%2C%20whi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0124-surfcontrol-superscout-does-not-properly-asign-a-category-to-web-sites-with-a-dot-at-the-end-wh-7df7e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0124%3A%20surfCONTROL%20SuperScout%20does%20not%20properly%20asign%20a%20category%20to%20web%20sites%20with%20a%20.%20(dot)%20at%20the%20end%2C%20wh&amp;severity=low&amp;id=682ca32db6fd31d6ed7df7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0122-frontpage-server-extensions-allows-remote-attackers-to-determine-the-physical-path-of-a-virtual-dire-7df7e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0122%3A%20Frontpage%20Server%20Extensions%20allows%20remote%20attackers%20to%20determine%20the%20physical%20path%20of%20a%20virtual%20dire&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0469-selena-sol-webbanner-4-0-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df7e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0469%3A%20Selena%20Sol%20WebBanner%204.0%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0114-frontpage-server-extensions-allows-remote-attackers-to-determine-the-name-of-the-anonymous-account-v-7df7df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0114%3A%20Frontpage%20Server%20Extensions%20allows%20remote%20attackers%20to%20determine%20the%20name%20of%20the%20anonymous%20account%20v&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0112-the-default-installation-of-debian-gnu-linux-uses-an-insecure-master-boot-record-mbr-which-allows-7df7dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0112%3A%20The%20default%20installation%20of%20Debian%20GNU%2FLinux%20uses%20an%20insecure%20Master%20Boot%20Record%20(MBR)%20which%20allows%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-1205-cross-site-scripting-vulnerabilities-in-apache-1-3-0-through-1-3-11-allow-remote-attackers-to-execut-7df7db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-1205%3A%20Cross%20site%20scripting%20vulnerabilities%20in%20Apache%201.3.0%20through%201.3.11%20allow%20remote%20attackers%20to%20execut&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0157-netbsd-ptrace-call-on-vax-allows-local-users-to-gain-privileges-by-modifying-the-psl-contents-in-the-7df7d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0157%3A%20NetBSD%20ptrace%20call%20on%20VAX%20allows%20local%20users%20to%20gain%20privileges%20by%20modifying%20the%20PSL%20contents%20in%20the&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0151-gnu-make-follows-symlinks-when-it-reads-a-makefile-from-stdin-which-allows-other-local-users-to-exe-7df7d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0151%3A%20GNU%20make%20follows%20symlinks%20when%20it%20reads%20a%20Makefile%20from%20stdin%2C%20which%20allows%20other%20local%20users%20to%20exe&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0137-the-cartit-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-vi-7df7d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0137%3A%20The%20CartIt%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information%20vi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0136-the-cart32-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-vi-7df7d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0136%3A%20The%20Cart32%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information%20vi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0135-the-retail-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-v-7df7c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0135%3A%20The%20%40Retail%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information%20v&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0134-the-check-it-out-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-informat-7df7c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0134%3A%20The%20Check%20It%20Out%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20informat&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0131-buffer-overflow-in-war-ftpd-1-6x-allows-users-to-cause-a-denial-of-service-via-long-mkd-and-cwd-comm-7df7c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0131%3A%20Buffer%20overflow%20in%20War%20FTPd%201.6x%20allows%20users%20to%20cause%20a%20denial%20of%20service%20via%20long%20MKD%20and%20CWD%20comm&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0123-the-shopping-cart-application-provided-with-filemaker-allows-remote-users-to-modify-sensitive-purcha-7df7be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0123%3A%20The%20shopping%20cart%20application%20provided%20with%20Filemaker%20allows%20remote%20users%20to%20modify%20sensitive%20purcha&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0121-the-recycle-bin-utility-in-windows-nt-and-windows-2000-allows-local-users-to-read-or-modify-files-by-7df7bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0121%3A%20The%20Recycle%20Bin%20utility%20in%20Windows%20NT%20and%20Windows%202000%20allows%20local%20users%20to%20read%20or%20modify%20files%20by&amp;severity=low&amp;id=682ca32db6fd31d6ed7df7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0110-the-websitetool-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-informati-7df7ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0110%3A%20The%20WebSiteTool%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20informati&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0108-the-intellivend-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-informati-7df7b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0108%3A%20The%20Intellivend%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20informati&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0107-linux-apcd-program-allows-local-attackers-to-modify-arbitrary-files-via-a-symlink-attack-7df7b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0107%3A%20Linux%20apcd%20program%20allows%20local%20attackers%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0106-the-easycart-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-7df7b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0106%3A%20The%20EasyCart%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0105-outlook-express-5-01-and-internet-explorer-5-01-allow-remote-attackers-to-view-a-user-s-email-messag-7df7a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0105%3A%20Outlook%20Express%205.01%20and%20Internet%20Explorer%205.01%20allow%20remote%20attackers%20to%20view%20a%20user&apos;s%20email%20messag&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0104-the-shoptron-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-7df7a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0104%3A%20The%20Shoptron%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0103-the-smartcart-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-7df7a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0103%3A%20The%20SmartCart%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0102-the-salescart-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchase-information-7df7a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0102%3A%20The%20SalesCart%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchase%20information&amp;severity=high&amp;id=682ca32db6fd31d6ed7df7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0101-the-make-a-store-orderpage-shopping-cart-application-allows-remote-users-to-modify-sensitive-purchas-7df79f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0101%3A%20The%20Make-a-Store%20OrderPage%20shopping%20cart%20application%20allows%20remote%20users%20to%20modify%20sensitive%20purchas&amp;severity=high&amp;id=682ca32db6fd31d6ed7df79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0132-microsoft-java-virtual-machine-allows-remote-attackers-to-read-files-via-the-getsystemresourceasstre-7df79d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0132%3A%20Microsoft%20Java%20Virtual%20Machine%20allows%20remote%20attackers%20to%20read%20files%20via%20the%20getSystemResourceAsStre&amp;severity=low&amp;id=682ca32db6fd31d6ed7df79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0109-the-mcsp-client-site-processor-system-multicsp-in-standard-and-poor-s-comstock-is-installed-with-s-7df79b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0109%3A%20The%20mcsp%20Client%20Site%20Processor%20system%20(MultiCSP)%20in%20Standard%20and%20Poor&apos;s%20ComStock%20is%20installed%20with%20s&amp;severity=high&amp;id=682ca32db6fd31d6ed7df79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0117-the-siteusermod-cgi-program-in-cobalt-raq2-servers-allows-any-site-administrator-to-modify-passwords-7df799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0117%3A%20The%20siteUserMod.cgi%20program%20in%20Cobalt%20RaQ2%20servers%20allows%20any%20Site%20Administrator%20to%20modify%20passwords&amp;severity=high&amp;id=682ca32db6fd31d6ed7df799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0116-firewall-1-does-not-properly-filter-script-tags-which-allows-remote-attackers-to-bypass-the-strip-7df797</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0116%3A%20Firewall-1%20does%20not%20properly%20filter%20script%20tags%2C%20which%20allows%20remote%20attackers%20to%20bypass%20the%20%22Strip%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0111-the-rightfax-web-client-uses-predictable-session-numbers-which-allows-remote-attackers-to-hijack-us-7df795</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0111%3A%20The%20RightFax%20web%20client%20uses%20predictable%20session%20numbers%2C%20which%20allows%20remote%20attackers%20to%20hijack%20us&amp;severity=high&amp;id=682ca32db6fd31d6ed7df795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-1216-buffer-overflow-in-portmir-for-aix-4-3-0-allows-local-users-to-corrupt-lock-files-and-gain-root-priv-7df788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-1216%3A%20Buffer%20overflow%20in%20portmir%20for%20AIX%204.3.0%20allows%20local%20users%20to%20corrupt%20lock%20files%20and%20gain%20root%20priv&amp;severity=high&amp;id=682ca32db6fd31d6ed7df788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0130-buffer-overflow-in-sco-scohelp-program-allows-remote-attackers-to-execute-commands-7df786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0130%3A%20Buffer%20overflow%20in%20SCO%20scohelp%20program%20allows%20remote%20attackers%20to%20execute%20commands.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0113-the-sygate-remote-management-program-does-not-properly-restrict-access-to-its-administration-service-7df784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0113%3A%20The%20SyGate%20Remote%20Management%20program%20does%20not%20properly%20restrict%20access%20to%20its%20administration%20service&amp;severity=high&amp;id=682ca32db6fd31d6ed7df784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0126-sample-internet-data-query-idq-scripts-in-iis-3-and-4-allow-remote-attackers-to-read-files-via-a-7df782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0126%3A%20Sample%20Internet%20Data%20Query%20(IDQ)%20scripts%20in%20IIS%203%20and%204%20allow%20remote%20attackers%20to%20read%20files%20via%20a%20.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0098-microsoft-index-server-allows-remote-attackers-to-determine-the-real-path-for-a-web-directory-via-a-7df780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0098%3A%20Microsoft%20Index%20Server%20allows%20remote%20attackers%20to%20determine%20the%20real%20path%20for%20a%20web%20directory%20via%20a%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0097-the-webhits-isapi-filter-in-microsoft-index-server-allows-remote-attackers-to-read-arbitrary-files-7df77e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0097%3A%20The%20WebHits%20ISAPI%20filter%20in%20Microsoft%20Index%20Server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%2C%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0095-the-pmtu-discovery-procedure-used-by-hp-ux-10-30-and-11-00-for-determining-the-optimum-mtu-generates-7df77a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0095%3A%20The%20PMTU%20discovery%20procedure%20used%20by%20HP-UX%2010.30%20and%2011.00%20for%20determining%20the%20optimum%20MTU%20generates&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0115-iis-allows-local-users-to-cause-a-denial-of-service-via-invalid-regular-expressions-in-a-visual-basi-7df778</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0115%3A%20IIS%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20via%20invalid%20regular%20expressions%20in%20a%20Visual%20Basi&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df778</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0093-an-installation-of-red-hat-uses-des-password-encryption-with-crypt-for-the-initial-password-inste-7df776</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0093%3A%20An%20installation%20of%20Red%20Hat%20uses%20DES%20password%20encryption%20with%20crypt()%20for%20the%20initial%20password%2C%20inste&amp;severity=high&amp;id=682ca32db6fd31d6ed7df776</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0091-buffer-overflow-in-vchkpw-vpopmail-pop-authentication-package-allows-remote-attackers-to-gain-root-p-7df769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0091%3A%20Buffer%20overflow%20in%20vchkpw%2Fvpopmail%20POP%20authentication%20package%20allows%20remote%20attackers%20to%20gain%20root%20p&amp;severity=high&amp;id=682ca32db6fd31d6ed7df769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0088-buffer-overflow-in-the-conversion-utilities-for-japanese-korean-and-chinese-word-5-documents-allows-7df767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0088%3A%20Buffer%20overflow%20in%20the%20conversion%20utilities%20for%20Japanese%2C%20Korean%20and%20Chinese%20Word%205%20documents%20allows&amp;severity=high&amp;id=682ca32db6fd31d6ed7df767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0595-a-windows-nt-system-does-not-clear-the-system-page-file-during-shutdown-which-might-allow-sensitive-7df765</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0595%3A%20A%20Windows%20NT%20system%20does%20not%20clear%20the%20system%20page%20file%20during%20shutdown%2C%20which%20might%20allow%20sensitive&amp;severity=low&amp;id=682ca32db6fd31d6ed7df765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0092-the-bsd-make-program-allows-local-users-to-modify-files-via-a-symlink-attack-when-the-j-option-is-b-7df763</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0092%3A%20The%20BSD%20make%20program%20allows%20local%20users%20to%20modify%20files%20via%20a%20symlink%20attack%20when%20the%20-j%20option%20is%20b&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0099-buffer-overflow-in-unixware-ppptalk-command-allows-local-users-to-gain-privileges-via-a-long-prompt-7df761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0099%3A%20Buffer%20overflow%20in%20UnixWare%20ppptalk%20command%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20long%20prompt%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0086-netopia-timbuktu-pro-sends-user-ids-and-passwords-in-cleartext-which-allows-remote-attackers-to-obt-7df75f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0086%3A%20Netopia%20Timbuktu%20Pro%20sends%20user%20IDs%20and%20passwords%20in%20cleartext%2C%20which%20allows%20remote%20attackers%20to%20obt&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0079-the-w3c-cern-httpd-http-server-allows-remote-attackers-to-determine-the-real-pathnames-of-some-comma-7df75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0079%3A%20The%20W3C%20CERN%20httpd%20HTTP%20server%20allows%20remote%20attackers%20to%20determine%20the%20real%20pathnames%20of%20some%20comma&amp;severity=high&amp;id=682ca32db6fd31d6ed7df75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0992-hp-virtualvault-with-the-phss-17692-patch-allows-unprivileged-processes-to-bypass-access-restriction-7df75b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0992%3A%20HP%20VirtualVault%20with%20the%20PHSS_17692%20patch%20allows%20unprivileged%20processes%20to%20bypass%20access%20restriction&amp;severity=high&amp;id=682ca32db6fd31d6ed7df75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0090-vmware-1-1-2-allows-local-users-to-cause-a-denial-of-service-via-a-symlink-attack-7df759</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0090%3A%20VMWare%201.1.2%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32db6fd31d6ed7df759</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0072-visual-casel-vcasel-does-not-properly-prevent-users-from-executing-files-which-allows-local-users-7df757</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0072%3A%20Visual%20Casel%20(Vcasel)%20does%20not%20properly%20prevent%20users%20from%20executing%20files%2C%20which%20allows%20local%20users&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df757</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0065-buffer-overflow-in-inetserv-3-0-allows-remote-attackers-to-execute-commands-via-a-long-get-request-7df74a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0065%3A%20Buffer%20overflow%20in%20InetServ%203.0%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20long%20GET%20request.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0064-cgiproc-cgi-script-in-nortel-contivity-http-server-allows-remote-attackers-to-cause-a-denial-of-serv-7df748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0064%3A%20cgiproc%20CGI%20script%20in%20Nortel%20Contivity%20HTTP%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20serv&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0063-cgiproc-cgi-script-in-nortel-contivity-http-server-allows-remote-attackers-to-read-arbitrary-files-b-7df746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0063%3A%20cgiproc%20CGI%20script%20in%20Nortel%20Contivity%20HTTP%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20b&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0066-website-pro-allows-remote-attackers-to-determine-the-real-pathname-of-webdirectories-via-a-malformed-7df742</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0066%3A%20WebSite%20Pro%20allows%20remote%20attackers%20to%20determine%20the%20real%20pathname%20of%20webdirectories%20via%20a%20malformed&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0075-super-mail-transfer-package-smtp-later-called-msgcore-has-a-memory-leak-which-allows-remote-atta-7df744</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0075%3A%20Super%20Mail%20Transfer%20Package%20(SMTP)%2C%20later%20called%20MsgCore%2C%20has%20a%20memory%20leak%20which%20allows%20remote%20atta&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0087-netscape-mail-notification-nsnotify-utility-in-netscape-communicator-uses-imap-without-ssl-even-i-7df740</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0087%3A%20Netscape%20Mail%20Notification%20(nsnotify)%20utility%20in%20Netscape%20Communicator%20uses%20IMAP%20without%20SSL%2C%20even%20i&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0070-ntimpersonateclientofport-local-procedure-call-in-windows-nt-4-0-allows-local-users-to-gain-privileg-7df73e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0070%3A%20NtImpersonateClientOfPort%20local%20procedure%20call%20in%20Windows%20NT%204.0%20allows%20local%20users%20to%20gain%20privileg&amp;severity=high&amp;id=682ca32db6fd31d6ed7df73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0048-get-it-program-in-corel-linux-update-allows-local-users-to-gain-root-access-by-specifying-an-alterna-7df73c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0048%3A%20get_it%20program%20in%20Corel%20Linux%20Update%20allows%20local%20users%20to%20gain%20root%20access%20by%20specifying%20an%20alterna&amp;severity=high&amp;id=682ca32db6fd31d6ed7df73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1002-netscape-navigator-uses-weak-encryption-for-storing-a-user-s-netscape-mail-password-7df73a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1002%3A%20Netscape%20Navigator%20uses%20weak%20encryption%20for%20storing%20a%20user&apos;s%20Netscape%20mail%20password.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df73a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0074-powerscripts-plusmail-cgi-program-allows-remote-attackers-to-execute-commands-via-a-password-file-wi-7df738</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0074%3A%20PowerScripts%20PlusMail%20CGI%20program%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20password%20file%20wi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0071-iis-4-0-allows-a-remote-attacker-to-obtain-the-real-pathname-of-the-document-root-by-requesting-non-7df72b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0071%3A%20IIS%204.0%20allows%20a%20remote%20attacker%20to%20obtain%20the%20real%20pathname%20of%20the%20document%20root%20by%20requesting%20non-&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0067-cybercash-merchant-connection-kit-mck-allows-local-users-to-modify-files-via-a-symlink-attack-7df729</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0067%3A%20CyberCash%20Merchant%20Connection%20Kit%20(MCK)%20allows%20local%20users%20to%20modify%20files%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32db6fd31d6ed7df729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0045-mysql-allows-local-users-to-modify-passwords-for-arbitrary-mysql-users-via-the-grant-privilege-7df727</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0045%3A%20MySQL%20allows%20local%20users%20to%20modify%20passwords%20for%20arbitrary%20MySQL%20users%20via%20the%20GRANT%20privilege.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0081-hotmail-does-not-properly-filter-javascript-code-from-a-user-s-mailbox-which-allows-a-remote-attack-7df725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0081%3A%20Hotmail%20does%20not%20properly%20filter%20JavaScript%20code%20from%20a%20user&apos;s%20mailbox%2C%20which%20allows%20a%20remote%20attack&amp;severity=high&amp;id=682ca32db6fd31d6ed7df725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0080-aix-techlibss-allows-local-users-to-overwrite-files-via-a-symlink-attack-7df723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0080%3A%20AIX%20techlibss%20allows%20local%20users%20to%20overwrite%20files%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32db6fd31d6ed7df723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0046-buffer-overflow-in-icq-99b-1-1-1-1-client-allows-remote-attackers-to-execute-commands-via-a-malforme-7df721</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0046%3A%20Buffer%20overflow%20in%20ICQ%2099b%201.1.1.1%20client%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20malforme&amp;severity=high&amp;id=682ca32db6fd31d6ed7df721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-1221-the-line-printer-daemon-lpd-in-the-lpr-package-in-multiple-linux-operating-systems-authenticates-b-7df71f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-1221%3A%20The%20line%20printer%20daemon%20(lpd)%20in%20the%20lpr%20package%20in%20multiple%20Linux%20operating%20systems%20authenticates%20b&amp;severity=high&amp;id=682ca32db6fd31d6ed7df71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-1220-the-line-printer-daemon-lpd-in-the-lpr-package-in-multiple-linux-operating-systems-allows-local-us-7df71d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-1220%3A%20The%20line%20printer%20daemon%20(lpd)%20in%20the%20lpr%20package%20in%20multiple%20Linux%20operating%20systems%20allows%20local%20us&amp;severity=high&amp;id=682ca32db6fd31d6ed7df71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0061-internet-explorer-5-does-not-modify-the-security-zone-for-a-document-that-is-being-loaded-into-a-win-7df71b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0061%3A%20Internet%20Explorer%205%20does%20not%20modify%20the%20security%20zone%20for%20a%20document%20that%20is%20being%20loaded%20into%20a%20win&amp;severity=high&amp;id=682ca32db6fd31d6ed7df71b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0084-cuteftp-uses-weak-encryption-to-store-password-information-in-its-tree-dat-file-7df719</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0084%3A%20CuteFTP%20uses%20weak%20encryption%20to%20store%20password%20information%20in%20its%20tree.dat%20file.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df719</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0055-buffer-overflow-in-solaris-chkperm-command-allows-local-users-to-gain-root-access-via-a-long-n-opti-7df70c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0055%3A%20Buffer%20overflow%20in%20Solaris%20chkperm%20command%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20-n%20opti&amp;severity=high&amp;id=682ca32db6fd31d6ed7df70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0044-macros-in-war-ftp-1-70-and-1-67b2-allow-local-or-remote-attackers-to-read-arbitrary-files-or-execute-7df70a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0044%3A%20Macros%20in%20War%20FTP%201.70%20and%201.67b2%20allow%20local%20or%20remote%20attackers%20to%20read%20arbitrary%20files%20or%20execute&amp;severity=high&amp;id=682ca32db6fd31d6ed7df70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0058-network-hotsync-program-in-handspring-visor-does-not-have-authentication-which-allows-remote-attack-7df708</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0058%3A%20Network%20HotSync%20program%20in%20Handspring%20Visor%20does%20not%20have%20authentication%2C%20which%20allows%20remote%20attack&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0056-imail-imonitor-status-cgi-cgi-script-allows-remote-attackers-to-cause-a-denial-of-service-with-many-7df706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0056%3A%20IMail%20IMONITOR%20status.cgi%20CGI%20script%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20with%20many%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0085-hotmail-does-not-properly-filter-javascript-code-from-a-user-s-mailbox-which-allows-a-remote-attack-7df704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0085%3A%20Hotmail%20does%20not%20properly%20filter%20JavaScript%20code%20from%20a%20user&apos;s%20mailbox%2C%20which%20allows%20a%20remote%20attack&amp;severity=high&amp;id=682ca32db6fd31d6ed7df704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0062-the-dtml-implementation-in-the-z-object-publishing-environment-zope-allows-remote-attackers-to-con-7df702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0062%3A%20The%20DTML%20implementation%20in%20the%20Z%20Object%20Publishing%20Environment%20(Zope)%20allows%20remote%20attackers%20to%20con&amp;severity=high&amp;id=682ca32db6fd31d6ed7df702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0059-php3-with-safe-mode-enabled-does-not-properly-filter-shell-metacharacters-from-commands-that-are-exe-7df700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0059%3A%20PHP3%20with%20safe_mode%20enabled%20does%20not%20properly%20filter%20shell%20metacharacters%20from%20commands%20that%20are%20exe&amp;severity=high&amp;id=682ca32db6fd31d6ed7df700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0057-cold-fusion-cfcache-tag-places-temporary-cache-files-within-the-web-document-root-allowing-remote-a-7df6fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0057%3A%20Cold%20Fusion%20CFCACHE%20tag%20places%20temporary%20cache%20files%20within%20the%20web%20document%20root%2C%20allowing%20remote%20a&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0053-microsoft-commercial-internet-system-mcis-imap-server-allows-remote-attackers-to-cause-a-denial-of-7df6fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0053%3A%20Microsoft%20Commercial%20Internet%20System%20(MCIS)%20IMAP%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0052-red-hat-userhelper-program-in-the-usermode-package-allows-local-users-to-gain-root-access-via-pam-an-7df6fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0052%3A%20Red%20Hat%20userhelper%20program%20in%20the%20usermode%20package%20allows%20local%20users%20to%20gain%20root%20access%20via%20PAM%20an&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0051-the-allaire-spectra-configuration-wizard-allows-remote-attackers-to-cause-a-denial-of-service-by-rep-7df6ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0051%3A%20The%20Allaire%20Spectra%20Configuration%20Wizard%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20rep&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0050-the-allaire-spectra-webtop-allows-authenticated-users-to-access-other-webtop-sections-by-specifying-7df6eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0050%3A%20The%20Allaire%20Spectra%20Webtop%20allows%20authenticated%20users%20to%20access%20other%20Webtop%20sections%20by%20specifying%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0049-buffer-overflow-in-winamp-client-allows-remote-attackers-to-execute-commands-via-a-long-entry-in-a-7df6e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0049%3A%20Buffer%20overflow%20in%20Winamp%20client%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20long%20entry%20in%20a%20.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0894-red-hat-linux-screen-program-does-not-use-unix98-ptys-allowing-local-users-to-write-to-other-termin-7df6e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0894%3A%20Red%20Hat%20Linux%20screen%20program%20does%20not%20use%20Unix98%20ptys%2C%20allowing%20local%20users%20to%20write%20to%20other%20termin&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0876-buffer-overflow-in-internet-explorer-4-0-via-embed-tag-7df6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0876%3A%20Buffer%20overflow%20in%20Internet%20Explorer%204.0%20via%20EMBED%20tag.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0744-buffer-overflow-in-netscape-enterprise-server-and-fasttrask-server-allows-remote-attackers-to-gain-p-7df6e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0744%3A%20Buffer%20overflow%20in%20Netscape%20Enterprise%20Server%20and%20FastTrask%20Server%20allows%20remote%20attackers%20to%20gain%20p&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0735-kde-k-mail-allows-local-users-to-gain-privileges-via-a-symlink-attack-in-temporary-user-directories-7df6e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0735%3A%20KDE%20K-Mail%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20symlink%20attack%20in%20temporary%20user%20directories.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0082-webtv-email-client-allows-remote-attackers-to-force-the-client-to-send-email-without-the-user-s-know-7df6df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0082%3A%20WebTV%20email%20client%20allows%20remote%20attackers%20to%20force%20the%20client%20to%20send%20email%20without%20the%20user&apos;s%20know&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0078-the-june-1999-version-of-the-hp-ux-aserver-program-allows-local-users-to-gain-privileges-by-specifyi-7df6dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0078%3A%20The%20June%201999%20version%20of%20the%20HP-UX%20aserver%20program%20allows%20local%20users%20to%20gain%20privileges%20by%20specifyi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0077-the-october-1998-version-of-the-hp-ux-aserver-program-allows-local-users-to-gain-privileges-by-speci-7df6db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0077%3A%20The%20October%201998%20version%20of%20the%20HP-UX%20aserver%20program%20allows%20local%20users%20to%20gain%20privileges%20by%20speci&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0120-the-remote-access-service-invoke-cfm-template-in-allaire-spectra-1-0-allows-users-to-bypass-authenti-7df6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0120%3A%20The%20Remote%20Access%20Service%20invoke.cfm%20template%20in%20Allaire%20Spectra%201.0%20allows%20users%20to%20bypass%20authenti&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0069-the-recover-program-in-solstice-backup-allows-local-users-to-restore-sensitive-files-7df6cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0069%3A%20The%20recover%20program%20in%20Solstice%20Backup%20allows%20local%20users%20to%20restore%20sensitive%20files.&amp;severity=low&amp;id=682ca32db6fd31d6ed7df6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0964-buffer-overflow-in-freebsd-setlocale-in-the-libc-module-allows-attackers-to-execute-arbitrary-code-v-7df6ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0964%3A%20Buffer%20overflow%20in%20FreeBSD%20setlocale%20in%20the%20libc%20module%20allows%20attackers%20to%20execute%20arbitrary%20code%20v&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0015-cascadeview-tftp-server-allows-local-users-to-gain-privileges-via-a-symlink-attack-7df6c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0015%3A%20CascadeView%20TFTP%20server%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20symlink%20attack.&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0013-irix-soundplayer-program-allows-local-users-to-gain-privileges-by-including-shell-metacharacters-in-7df6c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0013%3A%20IRIX%20soundplayer%20program%20allows%20local%20users%20to%20gain%20privileges%20by%20including%20shell%20metacharacters%20in%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0011-buffer-overflow-in-analogx-simpleserver-www-http-server-allows-remote-attackers-to-execute-commands-7df6c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0011%3A%20Buffer%20overflow%20in%20AnalogX%20SimpleServer%3AWWW%20HTTP%20server%20allows%20remote%20attackers%20to%20execute%20commands%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1592-multiple-unspecified-vulnerabilities-in-sendmail-5-as-installed-on-sun-sunos-4-1-3-u1-and-4-1-4-ha-7df6c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1592%3A%20Multiple%20unspecified%20vulnerabilities%20in%20sendmail%205%2C%20as%20installed%20on%20Sun%20SunOS%204.1.3_U1%20and%204.1.4%2C%20ha&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1591-microsoft-internet-information-services-iis-server-4-0-sp4-without-certain-hotfixes-released-for-7df6c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1591%3A%20Microsoft%20Internet%20Information%20Services%20(IIS)%20server%204.0%20SP4%2C%20without%20certain%20hotfixes%20released%20for%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1590-directory-traversal-vulnerability-in-muhammad-a-muquit-wwwcount-count-cgi-2-3-allows-remote-attac-7df6be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1590%3A%20Directory%20traversal%20vulnerability%20in%20Muhammad%20A.%20Muquit%20wwwcount%20(Count.cgi)%202.3%20allows%20remote%20attac&amp;severity=low&amp;id=682ca32db6fd31d6ed7df6be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1589-unspecified-vulnerability-in-crontab-in-ibm-aix-3-2-allows-local-users-to-gain-root-privileges-via-u-7df6bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1589%3A%20Unspecified%20vulnerability%20in%20crontab%20in%20IBM%20AIX%203.2%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20u&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1588-buffer-overflow-in-nlps-server-in-sun-solaris-x86-2-4-2-5-and-2-5-1-allows-remote-attackers-to-exe-7df6af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1588%3A%20Buffer%20overflow%20in%20nlps_server%20in%20Sun%20Solaris%20x86%202.4%2C%202.5%2C%20and%202.5.1%20allows%20remote%20attackers%20to%20exe&amp;severity=critical&amp;id=682ca32db6fd31d6ed7df6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1587-usr-ucb-ps-in-sun-microsystems-solaris-8-and-9-and-certain-earlier-releases-allows-local-users-to-7df6ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1587%3A%20%2Fusr%2Fucb%2Fps%20in%20Sun%20Microsystems%20Solaris%208%20and%209%2C%20and%20certain%20earlier%20releases%2C%20allows%20local%20users%20to&amp;severity=low&amp;id=682ca32db6fd31d6ed7df6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1586-loadmodule-in-sunos-4-1-x-as-used-by-xnews-does-not-properly-sanitize-its-environment-which-allow-7df6ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1586%3A%20loadmodule%20in%20SunOS%204.1.x%2C%20as%20used%20by%20xnews%2C%20does%20not%20properly%20sanitize%20its%20environment%2C%20which%20allow&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1585-the-1-rcs-and-2-mountall-programs-in-sun-solaris-2-x-possibly-before-2-4-start-a-privileged-sh-7df6a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1585%3A%20The%20(1)%20rcS%20and%20(2)%20mountall%20programs%20in%20Sun%20Solaris%202.x%2C%20possibly%20before%202.4%2C%20start%20a%20privileged%20sh&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1584-unknown-vulnerability-in-1-loadmodule-and-2-modload-if-modload-is-installed-with-setuid-setgid-7df6a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1584%3A%20Unknown%20vulnerability%20in%20(1)%20loadmodule%2C%20and%20(2)%20modload%20if%20modload%20is%20installed%20with%20setuid%2Fsetgid%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1512-the-amavis-virus-scanner-0-2-0-pre4-and-earlier-allows-remote-attackers-to-execute-arbitrary-command-7df6a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1512%3A%20The%20AMaViS%20virus%20scanner%200.2.0-pre4%20and%20earlier%20allows%20remote%20attackers%20to%20execute%20arbitrary%20command&amp;severity=high&amp;id=682ca32db6fd31d6ed7df6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1488-sdrd-daemon-in-ibm-sp2-system-data-repository-sdr-allows-remote-attackers-to-read-files-without-au-7df6a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1488%3A%20sdrd%20daemon%20in%20IBM%20SP2%20System%20Data%20Repository%20(SDR)%20allows%20remote%20attackers%20to%20read%20files%20without%20au&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1481-squid-2-2-stable5-and-below-when-using-external-authentication-allows-attackers-to-bypass-access-c-7df6a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1481%3A%20Squid%202.2.STABLE5%20and%20below%2C%20when%20using%20external%20authentication%2C%20allows%20attackers%20to%20bypass%20access%20c&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1476-a-bug-in-intel-pentium-processor-mmx-and-overdrive-allows-local-users-to-cause-a-denial-of-service-7df69f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1476%3A%20A%20bug%20in%20Intel%20Pentium%20processor%20(MMX%20and%20Overdrive)%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service&amp;severity=low&amp;id=682ca32db6fd31d6ed7df69f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1474-powerpoint-95-and-97-allows-remote-attackers-to-cause-an-application-to-be-run-automatically-without-7df69d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1474%3A%20PowerPoint%2095%20and%2097%20allows%20remote%20attackers%20to%20cause%20an%20application%20to%20be%20run%20automatically%20without&amp;severity=high&amp;id=682ca32db6fd31d6ed7df69d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1473-when-a-web-site-redirects-the-browser-to-another-site-internet-explorer-3-02-and-4-0-automatically-7df690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1473%3A%20When%20a%20Web%20site%20redirects%20the%20browser%20to%20another%20site%2C%20Internet%20Explorer%203.02%20and%204.0%20automatically%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1472-internet-explorer-4-0-allows-remote-attackers-to-read-arbitrary-text-and-html-files-on-the-user-s-ma-7df68e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1472%3A%20Internet%20Explorer%204.0%20allows%20remote%20attackers%20to%20read%20arbitrary%20text%20and%20HTML%20files%20on%20the%20user&apos;s%20ma&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1465-vulnerability-in-cisco-ios-11-1-through-11-3-with-distributed-fast-switching-dfs-enabled-allows-re-7df68c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1465%3A%20Vulnerability%20in%20Cisco%20IOS%2011.1%20through%2011.3%20with%20distributed%20fast%20switching%20(DFS)%20enabled%20allows%20re&amp;severity=high&amp;id=682ca32db6fd31d6ed7df68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1464-vulnerability-in-cisco-ios-11-1cc-and-11-1ct-with-distributed-fast-switching-dfs-enabled-allows-re-7df68a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1464%3A%20Vulnerability%20in%20Cisco%20IOS%2011.1CC%20and%2011.1CT%20with%20distributed%20fast%20switching%20(DFS)%20enabled%20allows%20re&amp;severity=high&amp;id=682ca32db6fd31d6ed7df68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1462-vulnerability-in-bb-hist-sh-cgi-history-module-in-big-brother-1-09b-and-1-09c-allows-remote-attacker-7df688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1462%3A%20Vulnerability%20in%20bb-hist.sh%20CGI%20History%20module%20in%20Big%20Brother%201.09b%20and%201.09c%20allows%20remote%20attacker&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1456-thttpd-http-server-2-03-and-earlier-allows-remote-attackers-to-read-arbitrary-files-via-a-get-reques-7df686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1456%3A%20thttpd%20HTTP%20server%202.03%20and%20earlier%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20GET%20reques&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1455-rsh-service-utility-rshsvc-in-windows-nt-3-5-through-4-0-does-not-properly-restrict-access-as-specif-7df684</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1455%3A%20RSH%20service%20utility%20RSHSVC%20in%20Windows%20NT%203.5%20through%204.0%20does%20not%20properly%20restrict%20access%20as%20specif&amp;severity=high&amp;id=682ca32db6fd31d6ed7df684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1452-gina-in-windows-nt-4-0-allows-attackers-with-physical-access-to-display-a-portion-of-the-clipboard-o-7df682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1452%3A%20GINA%20in%20Windows%20NT%204.0%20allows%20attackers%20with%20physical%20access%20to%20display%20a%20portion%20of%20the%20clipboard%20o&amp;severity=low&amp;id=682ca32db6fd31d6ed7df682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1451-the-winmsdp-exe-sample-file-in-iis-4-0-and-site-server-3-0-allows-remote-attackers-to-read-arbitrary-7df680</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1451%3A%20The%20Winmsdp.exe%20sample%20file%20in%20IIS%204.0%20and%20Site%20Server%203.0%20allows%20remote%20attackers%20to%20read%20arbitrary&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df680</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1444-genkey-utility-in-alibaba-2-0-generates-rsa-key-pairs-with-an-exponent-of-1-which-results-in-transa-7df67e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1444%3A%20genkey%20utility%20in%20Alibaba%202.0%20generates%20RSA%20key%20pairs%20with%20an%20exponent%20of%201%2C%20which%20results%20in%20transa&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df67e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1386-perl-5-004-04-and-earlier-follows-symbolic-links-when-running-with-the-e-option-which-allows-local-7df671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1386%3A%20Perl%205.004_04%20and%20earlier%20follows%20symbolic%20links%20when%20running%20with%20the%20-e%20option%2C%20which%20allows%20local&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1382-netware-nfs-mode-1-and-2-implements-the-read-only-flag-in-unix-by-changing-the-ownership-of-a-file-7df66f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1382%3A%20NetWare%20NFS%20mode%201%20and%202%20implements%20the%20%22Read%20Only%22%20flag%20in%20Unix%20by%20changing%20the%20ownership%20of%20a%20file&amp;severity=high&amp;id=682ca32db6fd31d6ed7df66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1379-dns-allows-remote-attackers-to-use-dns-name-servers-as-traffic-amplifiers-via-a-udp-dns-query-with-a-7df66d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1379%3A%20DNS%20allows%20remote%20attackers%20to%20use%20DNS%20name%20servers%20as%20traffic%20amplifiers%20via%20a%20UDP%20DNS%20query%20with%20a&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1364-windows-nt-4-0-allows-local-users-to-cause-a-denial-of-service-crash-via-an-illegal-kernel-mode-ad-7df66b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1364%3A%20Windows%20NT%204.0%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20an%20illegal%20kernel%20mode%20ad&amp;severity=low&amp;id=682ca32db6fd31d6ed7df66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1363-windows-nt-3-51-and-4-0-allow-local-users-to-cause-a-denial-of-service-crash-by-running-a-program-7df669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1363%3A%20Windows%20NT%203.51%20and%204.0%20allow%20local%20users%20to%20cause%20a%20denial%20of%20service%20(crash)%20by%20running%20a%20program%20&amp;severity=low&amp;id=682ca32db6fd31d6ed7df669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1362-win32k-sys-in-windows-nt-4-0-before-sp2-allows-local-users-to-cause-a-denial-of-service-crash-by-c-7df667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1362%3A%20Win32k.sys%20in%20Windows%20NT%204.0%20before%20SP2%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20(crash)%20by%20c&amp;severity=low&amp;id=682ca32db6fd31d6ed7df667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1360-windows-nt-4-0-allows-local-users-to-cause-a-denial-of-service-via-a-user-mode-application-that-clos-7df665</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1360%3A%20Windows%20NT%204.0%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20via%20a%20user%20mode%20application%20that%20clos&amp;severity=low&amp;id=682ca32db6fd31d6ed7df665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1359-when-the-ntconfig-pol-file-is-used-on-a-server-whose-name-is-longer-than-13-characters-windows-nt-d-7df663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1359%3A%20When%20the%20Ntconfig.pol%20file%20is%20used%20on%20a%20server%20whose%20name%20is%20longer%20than%2013%20characters%2C%20Windows%20NT%20d&amp;severity=high&amp;id=682ca32db6fd31d6ed7df663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1358-when-an-administrator-in-windows-nt-or-windows-2000-changes-a-user-policy-the-policy-is-not-properl-7df661</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1358%3A%20When%20an%20administrator%20in%20Windows%20NT%20or%20Windows%202000%20changes%20a%20user%20policy%2C%20the%20policy%20is%20not%20properl&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df661</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1355-bmc-patrol-component-when-installed-with-compaq-insight-management-agent-4-23-and-earlier-or-manag-7df65f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1355%3A%20BMC%20Patrol%20component%2C%20when%20installed%20with%20Compaq%20Insight%20Management%20Agent%204.23%20and%20earlier%2C%20or%20Manag&amp;severity=high&amp;id=682ca32db6fd31d6ed7df65f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1339-vulnerability-when-network-address-translation-nat-is-enabled-in-linux-2-2-10-and-earlier-with-ipc-7df652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1339%3A%20Vulnerability%20when%20Network%20Address%20Translation%20(NAT)%20is%20enabled%20in%20Linux%202.2.10%20and%20earlier%20with%20ipc&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1335-snmpd-server-in-cmu-snmp-snmp-package-before-3-3-1-in-red-hat-linux-4-0-is-configured-to-allow-remot-7df650</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1335%3A%20snmpd%20server%20in%20cmu-snmp%20SNMP%20package%20before%203.3-1%20in%20Red%20Hat%20Linux%204.0%20is%20configured%20to%20allow%20remot&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1334-multiple-buffer-overflows-in-filter-command-in-elm-2-4-allows-attackers-to-execute-arbitrary-command-7df64e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1334%3A%20Multiple%20buffer%20overflows%20in%20filter%20command%20in%20Elm%202.4%20allows%20attackers%20to%20execute%20arbitrary%20command&amp;severity=high&amp;id=682ca32db6fd31d6ed7df64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1333-automatic-download-option-in-ncftp-2-4-2-ftp-client-in-red-hat-linux-5-0-and-earlier-allows-remote-a-7df64c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1333%3A%20automatic%20download%20option%20in%20ncftp%202.4.2%20FTP%20client%20in%20Red%20Hat%20Linux%205.0%20and%20earlier%20allows%20remote%20a&amp;severity=high&amp;id=682ca32db6fd31d6ed7df64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1332-gzexe-in-the-gzip-package-on-red-hat-linux-5-0-and-earlier-allows-local-users-to-overwrite-files-of-7df64a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1332%3A%20gzexe%20in%20the%20gzip%20package%20on%20Red%20Hat%20Linux%205.0%20and%20earlier%20allows%20local%20users%20to%20overwrite%20files%20of%20&amp;severity=low&amp;id=682ca32db6fd31d6ed7df64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1331-netcfg-2-16-1-in-red-hat-linux-4-2-allows-the-ethernet-interface-to-be-controlled-by-users-on-reboot-7df648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1331%3A%20netcfg%202.16-1%20in%20Red%20Hat%20Linux%204.2%20allows%20the%20Ethernet%20interface%20to%20be%20controlled%20by%20users%20on%20reboot&amp;severity=low&amp;id=682ca32db6fd31d6ed7df648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1330-the-snprintf-function-in-the-db-library-1-85-4-ignores-the-size-parameter-which-could-allow-attacke-7df646</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1330%3A%20The%20snprintf%20function%20in%20the%20db%20library%201.85.4%20ignores%20the%20size%20parameter%2C%20which%20could%20allow%20attacke&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1329-buffer-overflow-in-sysvinit-in-red-hat-linux-5-1-and-earlier-allows-local-users-to-gain-privileges-7df644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1329%3A%20Buffer%20overflow%20in%20SysVInit%20in%20Red%20Hat%20Linux%205.1%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1328-linuxconf-before-1-11-r11-rh3-on-red-hat-linux-5-1-allows-local-users-to-overwrite-arbitrary-files-a-7df642</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1328%3A%20linuxconf%20before%201.11.r11-rh3%20on%20Red%20Hat%20Linux%205.1%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20a&amp;severity=high&amp;id=682ca32db6fd31d6ed7df642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1327-buffer-overflow-in-linuxconf-1-11r11-rh2-on-red-hat-linux-5-1-allows-local-users-to-gain-root-privil-7df640</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1327%3A%20Buffer%20overflow%20in%20linuxconf%201.11r11-rh2%20on%20Red%20Hat%20Linux%205.1%20allows%20local%20users%20to%20gain%20root%20privil&amp;severity=high&amp;id=682ca32db6fd31d6ed7df640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1325-sas-system-5-18-on-vax-vms-is-installed-with-insecure-permissions-for-its-directories-and-startup-fi-7df633</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1325%3A%20SAS%20System%205.18%20on%20VAX%2FVMS%20is%20installed%20with%20insecure%20permissions%20for%20its%20directories%20and%20startup%20fi&amp;severity=high&amp;id=682ca32db6fd31d6ed7df633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1324-vaxstations-running-open-vms-5-3-through-5-5-2-with-vms-decwindows-or-motif-do-not-properly-disable-7df631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1324%3A%20VAXstations%20running%20Open%20VMS%205.3%20through%205.5-2%20with%20VMS%20DECwindows%20or%20MOTIF%20do%20not%20properly%20disable%20&amp;severity=critical&amp;id=682ca32db6fd31d6ed7df631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1320-vulnerability-in-novell-netware-3-x-and-earlier-allows-local-users-to-gain-privileges-via-packet-spo-7df62f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1320%3A%20Vulnerability%20in%20Novell%20NetWare%203.x%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20via%20packet%20spo&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1317-windows-nt-4-0-sp4-and-earlier-allows-local-users-to-gain-privileges-by-modifying-the-symbolic-link-7df62d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1317%3A%20Windows%20NT%204.0%20SP4%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20by%20modifying%20the%20symbolic%20link%20&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1316-passfilt-dll-in-windows-nt-sp2-allows-users-to-create-a-password-that-contains-the-user-s-name-whic-7df62b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1316%3A%20Passfilt.dll%20in%20Windows%20NT%20SP2%20allows%20users%20to%20create%20a%20password%20that%20contains%20the%20user&apos;s%20name%2C%20whic&amp;severity=high&amp;id=682ca32db6fd31d6ed7df62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1315-vulnerabilities-in-decnet-osi-for-openvms-before-5-8-on-dec-alpha-axp-and-vax-vms-systems-allow-loca-7df629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1315%3A%20Vulnerabilities%20in%20DECnet%2FOSI%20for%20OpenVMS%20before%205.8%20on%20DEC%20Alpha%20AXP%20and%20VAX%2FVMS%20systems%20allow%20loca&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1307-vulnerability-in-urestore-in-novell-unixware-1-1-allows-local-users-to-gain-root-privileges-7df627</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1307%3A%20Vulnerability%20in%20urestore%20in%20Novell%20UnixWare%201.1%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32db6fd31d6ed7df627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1300-vulnerability-in-accton-in-cray-unicos-6-1-and-6-0-allows-local-users-to-read-arbitrary-files-and-mo-7df625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1300%3A%20Vulnerability%20in%20accton%20in%20Cray%20UNICOS%206.1%20and%206.0%20allows%20local%20users%20to%20read%20arbitrary%20files%20and%20mo&amp;severity=low&amp;id=682ca32db6fd31d6ed7df625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1294-office-shortcut-bar-osb-in-windows-3-51-enables-backup-and-restore-permissions-which-are-inherite-7df623</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1294%3A%20Office%20Shortcut%20Bar%20(OSB)%20in%20Windows%203.51%20enables%20backup%20and%20restore%20permissions%2C%20which%20are%20inherite&amp;severity=low&amp;id=682ca32db6fd31d6ed7df623</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1293-mod-proxy-in-apache-1-2-5-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-via-malfo-7df621</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1293%3A%20mod_proxy%20in%20Apache%201.2.5%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20malfo&amp;severity=high&amp;id=682ca32db6fd31d6ed7df621</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1290-buffer-overflow-in-nftp-ftp-client-version-1-40-allows-remote-malicious-ftp-servers-to-cause-a-denia-7df614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1290%3A%20Buffer%20overflow%20in%20nftp%20FTP%20client%20version%201.40%20allows%20remote%20malicious%20FTP%20servers%20to%20cause%20a%20denia&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1287-vulnerability-in-analog-3-0-and-earlier-allows-remote-attackers-to-read-arbitrary-files-via-the-form-7df612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1287%3A%20Vulnerability%20in%20Analog%203.0%20and%20earlier%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20the%20form&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1279-an-interaction-between-the-as-400-shared-folders-feature-and-microsoft-sna-server-3-0-and-earlier-al-7df610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1279%3A%20An%20interaction%20between%20the%20AS%2F400%20shared%20folders%20feature%20and%20Microsoft%20SNA%20Server%203.0%20and%20earlier%20al&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1259-microsoft-office-98-macintosh-edition-does-not-properly-initialize-the-disk-space-used-by-office-9-7df60e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1259%3A%20Microsoft%20Office%2098%2C%20Macintosh%20Edition%2C%20does%20not%20properly%20initialize%20the%20disk%20space%20used%20by%20Office%209&amp;severity=low&amp;id=682ca32db6fd31d6ed7df60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1246-direct-mailer-feature-in-microsoft-site-server-3-0-saves-user-domain-names-and-passwords-in-plaintex-7df60c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1246%3A%20Direct%20Mailer%20feature%20in%20Microsoft%20Site%20Server%203.0%20saves%20user%20domain%20names%20and%20passwords%20in%20plaintex&amp;severity=high&amp;id=682ca32db6fd31d6ed7df60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1233-iis-4-0-does-not-properly-restrict-access-for-the-initial-session-request-from-a-user-s-ip-address-i-7df60a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1233%3A%20IIS%204.0%20does%20not%20properly%20restrict%20access%20for%20the%20initial%20session%20request%20from%20a%20user&apos;s%20IP%20address%20i&amp;severity=high&amp;id=682ca32db6fd31d6ed7df60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1223-iis-3-0-allows-remote-attackers-to-cause-a-denial-of-service-via-a-request-to-an-asp-page-in-which-t-7df608</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1223%3A%20IIS%203.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20request%20to%20an%20ASP%20page%20in%20which%20t&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1222-netbt-sys-in-windows-nt-4-0-allows-remote-malicious-dns-servers-to-cause-a-denial-of-service-crash-7df606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1222%3A%20Netbt.sys%20in%20Windows%20NT%204.0%20allows%20remote%20malicious%20DNS%20servers%20to%20cause%20a%20denial%20of%20service%20(crash)&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1206-systemsoft-systemwizard-package-in-hp-pavilion-pc-with-windows-98-and-possibly-other-platforms-and-7df604</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1206%3A%20SystemSoft%20SystemWizard%20package%20in%20HP%20Pavilion%20PC%20with%20Windows%2098%2C%20and%20possibly%20other%20platforms%20and%20&amp;severity=high&amp;id=682ca32db6fd31d6ed7df604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1177-directory-traversal-vulnerability-in-nph-publish-before-1-2-allows-remote-attackers-to-overwrite-arb-7df602</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1177%3A%20Directory%20traversal%20vulnerability%20in%20nph-publish%20before%201.2%20allows%20remote%20attackers%20to%20overwrite%20arb&amp;severity=medium&amp;id=682ca32db6fd31d6ed7df602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1175-web-cache-control-protocol-wccp-in-cisco-cache-engine-for-cisco-ios-11-2-and-earlier-does-not-use-7df5f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1175%3A%20Web%20Cache%20Control%20Protocol%20(WCCP)%20in%20Cisco%20Cache%20Engine%20for%20Cisco%20IOS%2011.2%20and%20earlier%20does%20not%20use%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1167-cross-site-scripting-vulnerability-in-third-voice-web-annotation-utility-allows-remote-users-to-read-7df5f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1167%3A%20Cross-site%20scripting%20vulnerability%20in%20Third%20Voice%20Web%20annotation%20utility%20allows%20remote%20users%20to%20read&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1157-tcpip-sys-in-windows-nt-4-0-before-sp4-allows-remote-attackers-to-cause-a-denial-of-service-via-an-i-7df5f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1157%3A%20Tcpip.sys%20in%20Windows%20NT%204.0%20before%20SP4%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20an%20I&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1148-ftp-service-in-iis-4-0-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-resource-ex-7df5ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1148%3A%20FTP%20service%20in%20IIS%204.0%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(resource%20ex&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1132-windows-nt-4-0-allows-remote-attackers-to-cause-a-denial-of-service-crash-via-extra-source-routing-7df5ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1132%3A%20Windows%20NT%204.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20extra%20source%20routing&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1127-windows-nt-4-0-does-not-properly-shut-down-invalid-named-pipe-rpc-connections-which-allows-remote-a-7df5eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1127%3A%20Windows%20NT%204.0%20does%20not%20properly%20shut%20down%20invalid%20named%20pipe%20RPC%20connections%2C%20which%20allows%20remote%20a&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1126-cisco-resource-manager-crm-1-1-and-earlier-creates-certain-files-with-insecure-permissions-that-al-7df5e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1126%3A%20Cisco%20Resource%20Manager%20(CRM)%201.1%20and%20earlier%20creates%20certain%20files%20with%20insecure%20permissions%20that%20al&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1124-http-client-application-in-coldfusion-allows-remote-attackers-to-bypass-access-restrictions-for-web-7df5e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1124%3A%20HTTP%20Client%20application%20in%20ColdFusion%20allows%20remote%20attackers%20to%20bypass%20access%20restrictions%20for%20web%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1117-lquerypv-in-aix-4-1-and-4-2-allows-local-users-to-read-arbitrary-files-by-specifying-the-file-in-the-7df5e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1117%3A%20lquerypv%20in%20AIX%204.1%20and%204.2%20allows%20local%20users%20to%20read%20arbitrary%20files%20by%20specifying%20the%20file%20in%20the&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df5e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1105-windows-95-when-remote-administration-and-file-sharing-for-netware-networks-is-enabled-creates-a-s-7df5e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1105%3A%20Windows%2095%2C%20when%20Remote%20Administration%20and%20File%20Sharing%20for%20NetWare%20Networks%20is%20enabled%2C%20creates%20a%20s&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1104-windows-95-uses-weak-encryption-for-the-password-list-pwl-file-used-when-password-caching-is-enab-7df5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1104%3A%20Windows%2095%20uses%20weak%20encryption%20for%20the%20password%20list%20(.pwl)%20file%20used%20when%20password%20caching%20is%20enab&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1102-lpr-on-sunos-4-1-1-bsd-4-3-a-ux-2-0-1-and-other-bsd-based-operating-systems-allows-local-users-to-7df5d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1102%3A%20lpr%20on%20SunOS%204.1.1%2C%20BSD%204.3%2C%20A%2FUX%202.0.1%2C%20and%20other%20BSD-based%20operating%20systems%20allows%20local%20users%20to&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1100-cisco-pix-private-link-4-1-6-and-earlier-does-not-properly-process-certain-commands-in-the-configura-7df5d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1100%3A%20Cisco%20PIX%20Private%20Link%204.1.6%20and%20earlier%20does%20not%20properly%20process%20certain%20commands%20in%20the%20configura&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1094-buffer-overflow-in-internet-explorer-4-01-and-earlier-allows-remote-attackers-to-execute-arbitrary-c-7df5d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1094%3A%20Buffer%20overflow%20in%20Internet%20Explorer%204.01%20and%20earlier%20allows%20remote%20attackers%20to%20execute%20arbitrary%20c&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1093-buffer-overflow-in-the-window-external-function-in-the-jscript-scripting-engine-in-internet-explorer-7df5ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1093%3A%20Buffer%20overflow%20in%20the%20Window.External%20function%20in%20the%20JScript%20Scripting%20Engine%20in%20Internet%20Explorer&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1087-internet-explorer-4-treats-a-32-bit-number-dotless-ip-address-in-the-a-url-as-the-hostname-inste-7df5cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1087%3A%20Internet%20Explorer%204%20treats%20a%2032-bit%20number%20(%22dotless%20IP%20address%22)%20in%20the%20a%20URL%20as%20the%20hostname%20inste&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1084-the-aedebug-registry-key-is-installed-with-insecure-permissions-which-allows-local-users-to-modif-7df5ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1084%3A%20The%20%22AEDebug%22%20registry%20key%20is%20installed%20with%20insecure%20permissions%2C%20which%20allows%20local%20users%20to%20modif&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1074-webmin-before-0-5-does-not-restrict-the-number-of-invalid-passwords-that-are-entered-for-a-valid-use-7df5c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1074%3A%20Webmin%20before%200.5%20does%20not%20restrict%20the%20number%20of%20invalid%20passwords%20that%20are%20entered%20for%20a%20valid%20use&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1055-microsoft-excel-97-does-not-warn-the-user-before-executing-worksheet-functions-which-could-allow-at-7df5c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1055%3A%20Microsoft%20Excel%2097%20does%20not%20warn%20the%20user%20before%20executing%20worksheet%20functions%2C%20which%20could%20allow%20at&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1043-microsoft-exchange-server-5-5-and-5-0-does-not-properly-handle-1-malformed-nntp-data-or-2-malfo-7df5c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1043%3A%20Microsoft%20Exchange%20Server%205.5%20and%205.0%20does%20not%20properly%20handle%20(1)%20malformed%20NNTP%20data%2C%20or%20(2)%20malfo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1042-cisco-resource-manager-crm-1-0-and-1-1-creates-world-readable-log-files-and-temporary-files-which-7df5b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1042%3A%20Cisco%20Resource%20Manager%20(CRM)%201.0%20and%201.1%20creates%20world-readable%20log%20files%20and%20temporary%20files%2C%20which&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1035-iis-3-0-and-4-0-on-x86-and-alpha-allows-remote-attackers-to-cause-a-denial-of-service-hang-via-a-m-7df5b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1035%3A%20IIS%203.0%20and%204.0%20on%20x86%20and%20Alpha%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(hang)%20via%20a%20m&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0815-memory-leak-in-snmp-agent-in-windows-nt-4-0-before-sp5-allows-remote-attackers-to-conduct-a-denial-o-7df5b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0815%3A%20Memory%20leak%20in%20SNMP%20agent%20in%20Windows%20NT%204.0%20before%20SP5%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20o&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0808-multiple-buffer-overflows-in-isc-dhcp-distribution-server-dhcpd-1-0-and-2-0-allow-a-remote-attacke-7df5b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0808%3A%20Multiple%20buffer%20overflows%20in%20ISC%20DHCP%20Distribution%20server%20(dhcpd)%201.0%20and%202.0%20allow%20a%20remote%20attacke&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0154-iis-2-0-and-3-0-allows-remote-attackers-to-read-the-source-code-for-asp-pages-by-appending-a-dot-7df5af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0154%3A%20IIS%202.0%20and%203.0%20allows%20remote%20attackers%20to%20read%20the%20source%20code%20for%20ASP%20pages%20by%20appending%20a%20.%20(dot)&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0076-nviboot-boot-script-in-the-debian-nvi-package-allows-local-users-to-delete-files-via-malformed-entri-7df5ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0076%3A%20nviboot%20boot%20script%20in%20the%20Debian%20nvi%20package%20allows%20local%20users%20to%20delete%20files%20via%20malformed%20entri&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0043-buffer-overflow-in-camshot-webcam-http-server-allows-remote-attackers-to-execute-commands-via-a-long-7df5ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0043%3A%20Buffer%20overflow%20in%20CamShot%20WebCam%20HTTP%20server%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20long&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0003-buffer-overflow-in-unixware-rtpm-program-allows-local-users-to-gain-privileges-via-a-long-environmen-7df5a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0003%3A%20Buffer%20overflow%20in%20UnixWare%20rtpm%20program%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20long%20environmen&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0001-ip-input-c-in-bsd-derived-tcp-ip-implementations-allows-remote-attackers-to-cause-a-denial-of-servic-7df5a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0001%3A%20ip_input.c%20in%20BSD-derived%20TCP%2FIP%20implementations%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20servic&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df5a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0100-the-sms-remote-control-program-is-installed-with-insecure-permissions-which-allows-local-users-to-g-7df5a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0100%3A%20The%20SMS%20Remote%20Control%20program%20is%20installed%20with%20insecure%20permissions%2C%20which%20allows%20local%20users%20to%20g&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df5a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0042-buffer-overflow-in-csm-mail-server-allows-remote-attackers-to-cause-a-denial-of-service-or-execute-c-7df598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0042%3A%20Buffer%20overflow%20in%20CSM%20mail%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20or%20execute%20c&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0039-altavista-search-engine-allows-remote-attackers-to-read-files-above-the-document-root-via-a-dot-7df596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0039%3A%20AltaVista%20search%20engine%20allows%20remote%20attackers%20to%20read%20files%20above%20the%20document%20root%20via%20a%20..%20(dot%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0009-the-bna-pass-program-in-optivity-netarchitect-uses-the-path-environmental-variable-for-finding-the-7df594</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0009%3A%20The%20bna_pass%20program%20in%20Optivity%20NETarchitect%20uses%20the%20PATH%20environmental%20variable%20for%20finding%20the%20%22&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0007-trend-micro-pc-cillin-does-not-restrict-access-to-its-internal-proxy-port-allowing-remote-attackers-7df592</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0007%3A%20Trend%20Micro%20PC-Cillin%20does%20not%20restrict%20access%20to%20its%20internal%20proxy%20port%2C%20allowing%20remote%20attackers&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0041-macintosh-systems-generate-large-icmp-datagrams-in-response-to-malformed-datagrams-allowing-them-to-7df590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0041%3A%20Macintosh%20systems%20generate%20large%20ICMP%20datagrams%20in%20response%20to%20malformed%20datagrams%2C%20allowing%20them%20to&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0037-majordomo-wrapper-allows-local-users-to-gain-privileges-by-specifying-an-alternate-configuration-fil-7df58e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0037%3A%20Majordomo%20wrapper%20allows%20local%20users%20to%20gain%20privileges%20by%20specifying%20an%20alternate%20configuration%20fil&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0035-resend-command-in-majordomo-allows-local-users-to-gain-privileges-via-shell-metacharacters-7df58c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0035%3A%20resend%20command%20in%20Majordomo%20allows%20local%20users%20to%20gain%20privileges%20via%20shell%20metacharacters.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0014-denial-of-service-in-savant-web-server-via-a-null-character-in-the-requested-url-7df58a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0014%3A%20Denial%20of%20service%20in%20Savant%20web%20server%20via%20a%20null%20character%20in%20the%20requested%20URL.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1573-multiple-unknown-vulnerabilities-in-the-r-cmnds-1-remshd-2-rexecd-3-rlogind-4-rlogin-7df588</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1573%3A%20Multiple%20unknown%20vulnerabilities%20in%20the%20%22r-cmnds%22%20(1)%20remshd%2C%20(2)%20rexecd%2C%20(3)%20rlogind%2C%20(4)%20rlogin%2C%20(&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0060-buffer-overflow-in-avirt-rover-pop3-server-1-1-allows-remote-attackers-to-cause-a-denial-of-service-7df586</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0060%3A%20Buffer%20overflow%20in%20aVirt%20Rover%20POP3%20server%201.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0033-interscan-viruswall-smtp-scanner-does-not-properly-scan-messages-with-malformed-attachments-7df579</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0033%3A%20InterScan%20VirusWall%20SMTP%20scanner%20does%20not%20properly%20scan%20messages%20with%20malformed%20attachments.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0029-unixware-pis-and-mkpis-commands-allow-local-users-to-gain-privileges-via-a-symlink-attack-7df577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0029%3A%20UnixWare%20pis%20and%20mkpis%20commands%20allow%20local%20users%20to%20gain%20privileges%20via%20a%20symlink%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0027-ibm-network-station-manager-netstation-allows-local-users-to-gain-privileges-via-a-symlink-attack-7df575</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0027%3A%20IBM%20Network%20Station%20Manager%20NetStation%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20symlink%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0012-buffer-overflow-in-w3-msql-cgi-program-in-minisql-package-allows-remote-attackers-to-execute-command-7df573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0012%3A%20Buffer%20overflow%20in%20w3-msql%20CGI%20program%20in%20miniSQL%20package%20allows%20remote%20attackers%20to%20execute%20command&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0010-webwho-whois-cgi-program-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-in-th-7df571</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0010%3A%20WebWho%2B%20whois.cgi%20program%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters%20in%20th&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0008-ftppro-allows-local-users-to-read-sensitive-information-which-is-stored-in-plain-text-7df56f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0008%3A%20FTPPro%20allows%20local%20users%20to%20read%20sensitive%20information%2C%20which%20is%20stored%20in%20plain%20text.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0006-strace-allows-local-users-to-read-arbitrary-files-via-memory-mapped-file-names-7df56d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0006%3A%20strace%20allows%20local%20users%20to%20read%20arbitrary%20files%20via%20memory%20mapped%20file%20names.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0477-the-expression-evaluator-in-the-coldfusion-application-server-allows-a-remote-attacker-to-upload-fil-7df56b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0477%3A%20The%20Expression%20Evaluator%20in%20the%20ColdFusion%20Application%20Server%20allows%20a%20remote%20attacker%20to%20upload%20fil&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0455-the-expression-evaluator-sample-application-in-coldfusion-allows-remote-attackers-to-read-or-delete-7df569</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0455%3A%20The%20Expression%20Evaluator%20sample%20application%20in%20ColdFusion%20allows%20remote%20attackers%20to%20read%20or%20delete%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df569</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0892-buffer-overflow-in-netscape-communicator-before-4-7-via-a-dynamic-font-whose-length-field-is-less-th-7df567</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0892%3A%20Buffer%20overflow%20in%20Netscape%20Communicator%20before%204.7%20via%20a%20dynamic%20font%20whose%20length%20field%20is%20less%20th&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df567</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0040-glftpd-allows-local-users-to-gain-privileges-via-metacharacters-in-the-site-zipchk-command-7df55a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0040%3A%20glFtpD%20allows%20local%20users%20to%20gain%20privileges%20via%20metacharacters%20in%20the%20SITE%20ZIPCHK%20command.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0038-glftpd-includes-a-default-glftpd-user-account-with-a-default-password-and-a-uid-of-0-7df558</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0038%3A%20glFtpD%20includes%20a%20default%20glftpd%20user%20account%20with%20a%20default%20password%20and%20a%20UID%20of%200.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0028-internet-explorer-5-0-and-5-01-allows-remote-attackers-to-bypass-the-cross-frame-security-policy-and-7df556</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0028%3A%20Internet%20Explorer%205.0%20and%205.01%20allows%20remote%20attackers%20to%20bypass%20the%20cross%20frame%20security%20policy%20and&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0001-realmedia-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-long-ramgen-request-7df554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0001%3A%20RealMedia%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20long%20ramgen%20request.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0119-the-default-configurations-for-mcafee-virus-scan-and-norton-anti-virus-virus-checkers-do-not-check-f-7df552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0119%3A%20The%20default%20configurations%20for%20McAfee%20Virus%20Scan%20and%20Norton%20Anti-Virus%20virus%20checkers%20do%20not%20check%20f&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0036-outlook-express-5-for-macintosh-downloads-attachments-to-html-mail-without-prompting-the-user-aka-t-7df550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0036%3A%20Outlook%20Express%205%20for%20Macintosh%20downloads%20attachments%20to%20HTML%20mail%20without%20prompting%20the%20user%2C%20aka%20t&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0034-netscape-4-7-records-user-passwords-in-the-preferences-js-file-during-an-imap-or-pop-session-even-i-7df54e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0034%3A%20Netscape%204.7%20records%20user%20passwords%20in%20the%20preferences.js%20file%20during%20an%20IMAP%20or%20POP%20session%2C%20even%20i&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0032-solaris-dmi-cmd-allows-local-users-to-crash-the-dmispd-daemon-by-adding-a-malformed-file-to-the-var-7df54c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0032%3A%20Solaris%20dmi_cmd%20allows%20local%20users%20to%20crash%20the%20dmispd%20daemon%20by%20adding%20a%20malformed%20file%20to%20the%20%2Fvar&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0030-solaris-dmispd-dmi-cmd-allows-local-users-to-fill-up-restricted-disk-space-by-adding-files-to-the-v-7df54a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0030%3A%20Solaris%20dmispd%20dmi_cmd%20allows%20local%20users%20to%20fill%20up%20restricted%20disk%20space%20by%20adding%20files%20to%20the%20%2Fv&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df54a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0018-wmmon-in-freebsd-allows-local-users-to-gain-privileges-via-the-wmmonrc-configuration-file-7df548</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0018%3A%20wmmon%20in%20FreeBSD%20allows%20local%20users%20to%20gain%20privileges%20via%20the%20.wmmonrc%20configuration%20file.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df548</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0002-buffer-overflow-in-zbserver-pro-1-50-allows-remote-attackers-to-execute-commands-via-a-long-get-requ-7df53b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0002%3A%20Buffer%20overflow%20in%20ZBServer%20Pro%201.50%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20long%20GET%20requ&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1109-sendmail-before-8-10-0-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-a-series-of-e-7df539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1109%3A%20Sendmail%20before%208.10.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20a%20series%20of%20E&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1066-quake-1-server-responds-to-an-initial-udp-game-connection-request-with-a-large-amount-of-traffic-wh-7df537</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1066%3A%20Quake%201%20server%20responds%20to%20an%20initial%20UDP%20game%20connection%20request%20with%20a%20large%20amount%20of%20traffic%2C%20wh&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0026-buffer-overflow-in-unixware-i2odialogd-daemon-allows-remote-attackers-to-gain-root-access-via-a-long-7df535</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0026%3A%20Buffer%20overflow%20in%20UnixWare%20i2odialogd%20daemon%20allows%20remote%20attackers%20to%20gain%20root%20access%20via%20a%20long&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0025-iis-4-0-and-site-server-3-0-allow-remote-attackers-to-read-source-code-for-asp-files-if-the-file-is-7df533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0025%3A%20IIS%204.0%20and%20Site%20Server%203.0%20allow%20remote%20attackers%20to%20read%20source%20code%20for%20ASP%20files%20if%20the%20file%20is%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0024-iis-does-not-properly-canonicalize-urls-potentially-allowing-remote-attackers-to-bypass-access-rest-7df531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0024%3A%20IIS%20does%20not%20properly%20canonicalize%20URLs%2C%20potentially%20allowing%20remote%20attackers%20to%20bypass%20access%20rest&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0023-buffer-overflow-in-lotus-domino-http-server-allows-remote-attackers-to-cause-a-denial-of-service-via-7df52f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0023%3A%20Buffer%20overflow%20in%20Lotus%20Domino%20HTTP%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0022-lotus-domino-http-server-does-not-properly-disable-anonymous-access-for-the-cgi-bin-directory-7df52d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0022%3A%20Lotus%20Domino%20HTTP%20server%20does%20not%20properly%20disable%20anonymous%20access%20for%20the%20cgi-bin%20directory.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0017-buffer-overflow-in-linux-linuxconf-package-allows-remote-attackers-to-gain-root-privileges-via-a-lon-7df52b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0017%3A%20Buffer%20overflow%20in%20Linux%20linuxconf%20package%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20via%20a%20lon&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df52b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1497-ipswitch-imail-5-0-and-6-0-uses-weak-encryption-to-store-passwords-in-registry-keys-which-allows-lo-7df529</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1497%3A%20Ipswitch%20IMail%205.0%20and%206.0%20uses%20weak%20encryption%20to%20store%20passwords%20in%20registry%20keys%2C%20which%20allows%20lo&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0020-dns-pro-allows-remote-attackers-to-conduct-a-denial-of-service-via-a-large-number-of-connections-7df51c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0020%3A%20DNS%20PRO%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service%20via%20a%20large%20number%20of%20connections.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0997-wu-ftp-with-ftp-conversion-enabled-allows-an-attacker-to-execute-commands-via-a-malformed-file-name-7df51a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0997%3A%20wu-ftp%20with%20FTP%20conversion%20enabled%20allows%20an%20attacker%20to%20execute%20commands%20via%20a%20malformed%20file%20name%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1006-groupwise-web-server-gwweb-exe-allows-remote-attackers-to-determine-the-real-path-of-the-web-server-7df518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1006%3A%20Groupwise%20web%20server%20GWWEB.EXE%20allows%20remote%20attackers%20to%20determine%20the%20real%20path%20of%20the%20web%20server%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1005-groupwise-web-server-gwweb-exe-allows-remote-attackers-to-read-arbitrary-files-with-htm-extensions-7df516</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1005%3A%20Groupwise%20web%20server%20GWWEB.EXE%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20with%20.htm%20extensions%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1004-buffer-overflow-in-the-pop-server-poproxy-for-the-norton-anti-virus-protection-nav2000-program-via-a-7df514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1004%3A%20Buffer%20overflow%20in%20the%20POP%20server%20POProxy%20for%20the%20Norton%20Anti-Virus%20protection%20NAV2000%20program%20via%20a&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1001-cisco-cache-engine-allows-a-remote-attacker-to-gain-access-via-a-null-username-and-password-7df512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1001%3A%20Cisco%20Cache%20Engine%20allows%20a%20remote%20attacker%20to%20gain%20access%20via%20a%20null%20username%20and%20password.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1000-the-web-administration-interface-for-cisco-cache-engine-allows-remote-attackers-to-view-performance-7df510</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1000%3A%20The%20web%20administration%20interface%20for%20Cisco%20Cache%20Engine%20allows%20remote%20attackers%20to%20view%20performance%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0998-cisco-cache-engine-allows-an-attacker-to-replace-content-in-the-cache-7df50e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0998%3A%20Cisco%20Cache%20Engine%20allows%20an%20attacker%20to%20replace%20content%20in%20the%20cache.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0995-windows-nt-local-security-authority-lsa-allows-remote-attackers-to-cause-a-denial-of-service-via-m-7df50c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0995%3A%20Windows%20NT%20Local%20Security%20Authority%20(LSA)%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20m&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df50c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0994-windows-nt-with-syskey-reuses-the-keystream-that-is-used-for-encrypting-sam-password-hashes-allowin-7df50a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0994%3A%20Windows%20NT%20with%20SYSKEY%20reuses%20the%20keystream%20that%20is%20used%20for%20encrypting%20SAM%20password%20hashes%2C%20allowin&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df50a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0996-buffer-overflow-in-infoseek-ultraseek-search-engine-allows-remote-attackers-to-execute-commands-via-7df4fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0996%3A%20Buffer%20overflow%20in%20Infoseek%20Ultraseek%20search%20engine%20allows%20remote%20attackers%20to%20execute%20commands%20via%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0935-classifieds-cgi-allows-remote-attackers-to-execute-arbitrary-commands-by-specifying-them-in-a-hidden-7df4fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0935%3A%20classifieds.cgi%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20by%20specifying%20them%20in%20a%20hidden&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0934-classifieds-cgi-allows-remote-attackers-to-read-arbitrary-files-via-shell-metacharacters-7df4f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0934%3A%20classifieds.cgi%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20shell%20metacharacters.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0361-the-ppp-wvdial-lxdialog-script-in-wvdial-1-4-and-earlier-creates-a-config-file-with-world-readable-7df4f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0361%3A%20The%20PPP%20wvdial.lxdialog%20script%20in%20wvdial%201.4%20and%20earlier%20creates%20a%20.config%20file%20with%20world%20readable%20&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0068-daynad-program-in-intel-inbusiness-e-mail-station-does-not-require-authentication-which-allows-remo-7df4f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0068%3A%20daynad%20program%20in%20Intel%20InBusiness%20E-mail%20Station%20does%20not%20require%20authentication%2C%20which%20allows%20remo&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1010-an-ssh-1-2-27-server-allows-a-client-to-use-the-none-cipher-even-if-it-is-not-allowed-by-the-serv-7df4f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1010%3A%20An%20SSH%201.2.27%20server%20allows%20a%20client%20to%20use%20the%20%22none%22%20cipher%2C%20even%20if%20it%20is%20not%20allowed%20by%20the%20serv&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1007-buffer-overflow-in-vdo-live-player-allows-remote-attackers-to-execute-commands-on-the-vdo-client-via-7df4f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1007%3A%20Buffer%20overflow%20in%20VDO%20Live%20Player%20allows%20remote%20attackers%20to%20execute%20commands%20on%20the%20VDO%20client%20via&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1003-war-ftp-daemon-1-70-allows-remote-attackers-to-cause-a-denial-of-service-by-flooding-it-with-connect-7df4ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1003%3A%20War%20FTP%20Daemon%201.70%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20flooding%20it%20with%20connect&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0993-modifications-to-acls-access-control-lists-in-microsoft-exchange-5-5-do-not-take-effect-until-the-7df4ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0993%3A%20Modifications%20to%20ACLs%20(Access%20Control%20Lists)%20in%20Microsoft%20Exchange%20%205.5%20do%20not%20take%20effect%20until%20the&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1009-the-disney-go-express-search-allows-remote-attackers-to-access-and-modify-search-information-for-use-7df4eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1009%3A%20The%20Disney%20Go%20Express%20Search%20allows%20remote%20attackers%20to%20access%20and%20modify%20search%20information%20for%20use&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df4eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0289-the-apache-web-server-for-win32-may-provide-access-to-restricted-files-when-a-dot-is-appended-to-7df4de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0289%3A%20The%20Apache%20web%20server%20for%20Win32%20may%20provide%20access%20to%20restricted%20files%20when%20a%20.%20(dot)%20is%20appended%20to&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0977-buffer-overflow-in-solaris-sadmind-allows-remote-attackers-to-gain-root-privileges-using-a-netmgt-pr-7df4dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0977%3A%20Buffer%20overflow%20in%20Solaris%20sadmind%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20using%20a%20NETMGT_PR&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0975-the-windows-help-system-can-allow-a-local-user-to-execute-commands-as-another-user-by-editing-a-tabl-7df4da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0975%3A%20The%20Windows%20help%20system%20can%20allow%20a%20local%20user%20to%20execute%20commands%20as%20another%20user%20by%20editing%20a%20tabl&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0978-htdig-allows-remote-attackers-to-execute-commands-via-filenames-with-shell-metacharacters-7df4d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0978%3A%20htdig%20allows%20remote%20attackers%20to%20execute%20commands%20via%20filenames%20with%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0974-buffer-overflow-in-solaris-snoop-allows-remote-attackers-to-gain-root-privileges-via-getquota-reques-7df4d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0974%3A%20Buffer%20overflow%20in%20Solaris%20snoop%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20via%20GETQUOTA%20reques&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0972-buffer-overflow-in-xshipwars-xsw-program-7df4d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0972%3A%20Buffer%20overflow%20in%20Xshipwars%20xsw%20program.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0986-the-ping-command-in-linux-2-0-3x-allows-local-users-to-cause-a-denial-of-service-by-sending-large-pa-7df4d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0986%3A%20The%20ping%20command%20in%20Linux%202.0.3x%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20by%20sending%20large%20pa&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0981-internet-explorer-5-01-and-earlier-allows-a-remote-attacker-to-create-a-reference-to-a-client-window-7df4d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0981%3A%20Internet%20Explorer%205.01%20and%20earlier%20allows%20a%20remote%20attacker%20to%20create%20a%20reference%20to%20a%20client%20window&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0976-sendmail-allows-local-users-to-reinitialize-the-aliases-database-via-the-newaliases-command-then-ca-7df4ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0976%3A%20Sendmail%20allows%20local%20users%20to%20reinitialize%20the%20aliases%20database%20via%20the%20newaliases%20command%2C%20then%20ca&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df4ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0973-buffer-overflow-in-solaris-snoop-program-allows-remote-attackers-to-gain-root-privileges-via-a-long-7df4cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0973%3A%20Buffer%20overflow%20in%20Solaris%20snoop%20program%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20via%20a%20long%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0991-buffer-overflow-in-goodtech-telnet-server-nt-allows-remote-users-to-cause-a-denial-of-service-via-a-7df4bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0991%3A%20Buffer%20overflow%20in%20GoodTech%20Telnet%20Server%20NT%20allows%20remote%20users%20to%20cause%20a%20denial%20of%20service%20via%20a%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0989-buffer-overflow-in-internet-explorer-5-directshow-filter-msdxm-ocx-allows-remote-attackers-to-exec-7df4bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0989%3A%20Buffer%20overflow%20in%20Internet%20Explorer%205%20directshow%20filter%20(MSDXM.OCX)%20allows%20remote%20attackers%20to%20exec&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0990-error-messages-generated-by-gdm-with-the-verboseauth-setting-allows-an-attacker-to-identify-valid-us-7df4bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0990%3A%20Error%20messages%20generated%20by%20gdm%20with%20the%20VerboseAuth%20setting%20allows%20an%20attacker%20to%20identify%20valid%20us&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0982-the-sun-web-based-enterprise-management-wbem-installation-script-stores-a-password-in-plaintext-in-7df4b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0982%3A%20The%20Sun%20Web-Based%20Enterprise%20Management%20(WBEM)%20installation%20script%20stores%20a%20password%20in%20plaintext%20in&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0988-unixware-pkgtrans-allows-local-users-to-read-arbitrary-files-via-a-symlink-attack-7df4b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0988%3A%20UnixWare%20pkgtrans%20allows%20local%20users%20to%20read%20arbitrary%20files%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0358-orbit-and-gnome-session-in-red-hat-linux-6-1-allows-remote-attackers-to-crash-a-program-7df4b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0358%3A%20ORBit%20and%20gnome-session%20in%20Red%20Hat%20Linux%206.1%20allows%20remote%20attackers%20to%20crash%20a%20program.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0357-orbit-and-esound-in-red-hat-linux-6-1-do-not-use-sufficiently-random-numbers-which-allows-local-use-7df4b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0357%3A%20ORBit%20and%20esound%20in%20Red%20Hat%20Linux%206.1%20do%20not%20use%20sufficiently%20random%20numbers%2C%20which%20allows%20local%20use&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0139-internet-anywhere-pop3-mail-server-allows-local-users-to-cause-a-denial-of-service-via-a-malformed-r-7df4b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0139%3A%20Internet%20Anywhere%20POP3%20Mail%20Server%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20R&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0866-buffer-overflow-in-unixware-xauto-program-allows-local-users-to-gain-root-privilege-7df4af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0866%3A%20Buffer%20overflow%20in%20UnixWare%20xauto%20program%20allows%20local%20users%20to%20gain%20root%20privilege.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0865-buffer-overflow-in-communigatepro-via-a-long-string-to-the-http-configuration-port-7df4ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0865%3A%20Buffer%20overflow%20in%20CommuniGatePro%20via%20a%20long%20string%20to%20the%20HTTP%20configuration%20port.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df4ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0864-unixware-programs-that-dump-core-allow-a-local-user-to-modify-files-via-a-symlink-attack-on-the-co-7df4a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0864%3A%20UnixWare%20programs%20that%20dump%20core%20allow%20a%20local%20user%20to%20modify%20files%20via%20a%20symlink%20attack%20on%20the%20.%2Fco&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0825-the-default-permissions-for-unixware-var-mail-allow-local-users-to-read-and-modify-other-users-mai-7df49e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0825%3A%20The%20default%20permissions%20for%20UnixWare%20%2Fvar%2Fmail%20allow%20local%20users%20to%20read%20and%20modify%20other%20users&apos;%20mai&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0366-dump-in-debian-gnu-linux-2-1-does-not-properly-restore-symlinks-which-allows-a-local-user-to-modify-7df49c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0366%3A%20dump%20in%20Debian%20GNU%2FLinux%202.1%20does%20not%20properly%20restore%20symlinks%2C%20which%20allows%20a%20local%20user%20to%20modify&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0862-insecure-directory-permissions-in-rpm-distribution-for-postgresql-allows-local-users-to-gain-privile-7df49a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0862%3A%20Insecure%20directory%20permissions%20in%20RPM%20distribution%20for%20PostgreSQL%20allows%20local%20users%20to%20gain%20privile&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0858-internet-explorer-5-allows-a-remote-attacker-to-modify-the-ie-client-s-proxy-configuration-via-a-mal-7df498</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0858%3A%20Internet%20Explorer%205%20allows%20a%20remote%20attacker%20to%20modify%20the%20IE%20client&apos;s%20proxy%20configuration%20via%20a%20mal&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0852-ibm-websphere-sets-permissions-that-allow-a-local-user-to-modify-a-deinstallation-script-or-its-data-7df496</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0852%3A%20IBM%20WebSphere%20sets%20permissions%20that%20allow%20a%20local%20user%20to%20modify%20a%20deinstallation%20script%20or%20its%20data&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0850-the-default-permissions-for-endymion-mailman-allow-local-users-to-read-email-or-modify-files-7df494</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0850%3A%20The%20default%20permissions%20for%20Endymion%20MailMan%20allow%20local%20users%20to%20read%20email%20or%20modify%20files.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0828-unixware-pkg-commands-such-as-pkginfo-pkgcat-and-pkgparam-allow-local-users-to-read-arbitrary-file-7df492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0828%3A%20UnixWare%20pkg%20commands%20such%20as%20pkginfo%2C%20pkgcat%2C%20and%20pkgparam%20allow%20local%20users%20to%20read%20arbitrary%20file&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0021-lotus-domino-http-server-allows-remote-attackers-to-determine-the-real-path-of-the-server-via-a-requ-7df490</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0021%3A%20Lotus%20Domino%20HTTP%20server%20allows%20remote%20attackers%20to%20determine%20the%20real%20path%20of%20the%20server%20via%20a%20requ&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df490</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0004-zbserver-pro-allows-remote-attackers-to-read-source-code-for-executable-files-by-inserting-a-dot-7df48e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0004%3A%20ZBServer%20Pro%20allows%20remote%20attackers%20to%20read%20source%20code%20for%20executable%20files%20by%20inserting%20a%20.%20(dot)&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df48e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0963-freebsd-mount-union-command-allows-local-users-to-gain-root-privileges-via-a-symlink-attack-7df481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0963%3A%20FreeBSD%20mount_union%20command%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0860-solaris-chkperm-allows-local-users-to-read-files-owned-by-bin-via-the-vmsys-environmental-variable-a-7df47f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0860%3A%20Solaris%20chkperm%20allows%20local%20users%20to%20read%20files%20owned%20by%20bin%20via%20the%20VMSYS%20environmental%20variable%20a&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0859-solaris-arp-allows-local-users-to-read-files-via-the-f-parameter-which-lists-lines-in-the-file-tha-7df47d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0859%3A%20Solaris%20arp%20allows%20local%20users%20to%20read%20files%20via%20the%20-f%20parameter%2C%20which%20lists%20lines%20in%20the%20file%20tha&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0857-freebsd-gdc-program-allows-local-users-to-modify-files-via-a-symlink-attack-7df47b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0857%3A%20FreeBSD%20gdc%20program%20allows%20local%20users%20to%20modify%20files%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0856-login-in-slackware-7-0-allows-remote-attackers-to-identify-valid-users-on-the-system-by-reporting-an-7df479</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0856%3A%20login%20in%20Slackware%207.0%20allows%20remote%20attackers%20to%20identify%20valid%20users%20on%20the%20system%20by%20reporting%20an&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0855-buffer-overflow-in-freebsd-gdc-program-7df477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0855%3A%20Buffer%20overflow%20in%20FreeBSD%20gdc%20program.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0853-buffer-overflow-in-netscape-enterprise-server-and-netscape-fasttrack-server-allows-remote-attackers-7df475</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0853%3A%20Buffer%20overflow%20in%20Netscape%20Enterprise%20Server%20and%20Netscape%20FastTrack%20Server%20allows%20remote%20attackers%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0846-denial-of-service-in-mdaemon-2-7-via-a-large-number-of-connection-attempts-7df473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0846%3A%20Denial%20of%20service%20in%20MDaemon%202.7%20via%20a%20large%20number%20of%20connection%20attempts.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0838-buffer-overflow-in-serv-u-ftp-2-5-allows-remote-users-to-conduct-a-denial-of-service-via-the-site-co-7df471</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0838%3A%20Buffer%20overflow%20in%20Serv-U%20FTP%202.5%20allows%20remote%20users%20to%20conduct%20a%20denial%20of%20service%20via%20the%20SITE%20co&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df471</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0834-buffer-overflow-in-rsaref2-via-the-encryption-and-decryption-functions-in-the-rsaref-library-7df46f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0834%3A%20Buffer%20overflow%20in%20RSAREF2%20via%20the%20encryption%20and%20decryption%20functions%20in%20the%20RSAREF%20library.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df46f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0823-buffer-overflow-in-freebsd-xmindpath-allows-local-users-to-gain-privileges-via-f-argument-7df460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0823%3A%20Buffer%20overflow%20in%20FreeBSD%20xmindpath%20allows%20local%20users%20to%20gain%20privileges%20via%20-f%20argument.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0826-buffer-overflow-in-freebsd-angband-allows-local-users-to-gain-privileges-7df462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0826%3A%20Buffer%20overflow%20in%20FreeBSD%20angband%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0820-freebsd-seyon-allows-users-to-gain-privileges-via-a-modified-path-variable-for-finding-the-xterm-and-7df45e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0820%3A%20FreeBSD%20seyon%20allows%20users%20to%20gain%20privileges%20via%20a%20modified%20PATH%20variable%20for%20finding%20the%20xterm%20and&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0819-ntmail-does-not-disable-the-vrfy-command-even-if-the-administrator-has-explicitly-disabled-it-7df45c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0819%3A%20NTMail%20does%20not%20disable%20the%20VRFY%20command%2C%20even%20if%20the%20administrator%20has%20explicitly%20disabled%20it.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0841-buffer-overflow-in-cde-mailtool-allows-local-users-to-gain-root-privileges-via-a-long-mime-content-t-7df45a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0841%3A%20Buffer%20overflow%20in%20CDE%20mailtool%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20MIME%20Content-T&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0840-buffer-overflow-in-cde-dtmail-and-dtmailpr-programs-allows-local-users-to-gain-privileges-via-a-long-7df458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0840%3A%20Buffer%20overflow%20in%20CDE%20dtmail%20and%20dtmailpr%20programs%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20long&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0824-a-windows-nt-user-can-use-subst-to-map-a-drive-letter-to-a-folder-which-is-not-unmapped-after-the-u-7df456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0824%3A%20A%20Windows%20NT%20user%20can%20use%20SUBST%20to%20map%20a%20drive%20letter%20to%20a%20folder%2C%20which%20is%20not%20unmapped%20after%20the%20u&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0822-buffer-overflow-in-qpopper-qpop-3-0-allows-remote-root-access-via-auth-command-7df454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0822%3A%20Buffer%20overflow%20in%20Qpopper%20(qpop)%203.0%20allows%20remote%20root%20access%20via%20AUTH%20command.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0847-buffer-overflow-in-free-internet-chess-server-fics-program-xboard-7df452</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0847%3A%20Buffer%20overflow%20in%20free%20internet%20chess%20server%20(FICS)%20program%2C%20xboard.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df452</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0842-symantec-mail-gear-1-0-web-interface-server-allows-remote-users-to-read-arbitrary-files-via-a-do-7df450</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0842%3A%20Symantec%20Mail-Gear%201.0%20web%20interface%20server%20allows%20remote%20users%20to%20read%20arbitrary%20files%20via%20a%20..%20(do&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0839-windows-nt-task-scheduler-installed-with-internet-explorer-5-allows-a-user-to-gain-privileges-by-mod-7df443</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0839%3A%20Windows%20NT%20Task%20Scheduler%20installed%20with%20Internet%20Explorer%205%20allows%20a%20user%20to%20gain%20privileges%20by%20mod&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0387-a-legacy-credential-caching-mechanism-used-in-windows-95-and-windows-98-systems-allows-attackers-to-7df441</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0387%3A%20A%20legacy%20credential%20caching%20mechanism%20used%20in%20Windows%2095%20and%20Windows%2098%20systems%20allows%20attackers%20to%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1547-oracle-web-listener-2-1-allows-remote-attackers-to-bypass-access-restrictions-by-replacing-a-charact-7df43f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1547%3A%20Oracle%20Web%20Listener%202.1%20allows%20remote%20attackers%20to%20bypass%20access%20restrictions%20by%20replacing%20a%20charact&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0845-buffer-overflow-in-sco-su-program-allows-local-users-to-gain-root-access-via-a-long-username-7df43d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0845%3A%20Buffer%20overflow%20in%20SCO%20su%20program%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20username.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0317-buffer-overflow-in-linux-su-command-gives-root-access-to-local-users-7df43b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0317%3A%20Buffer%20overflow%20in%20Linux%20su%20command%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1548-cabletron-smartswitch-router-ssr-8000-firmware-2-x-can-only-handle-200-arp-requests-per-second-all-7df439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1548%3A%20Cabletron%20SmartSwitch%20Router%20(SSR)%208000%20firmware%202.x%20can%20only%20handle%20200%20ARP%20requests%20per%20second%20all&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1189-buffer-overflow-in-netscape-navigator-communicator-4-7-for-windows-95-and-windows-98-allows-remote-a-7df437</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1189%3A%20Buffer%20overflow%20in%20Netscape%20Navigator%2FCommunicator%204.7%20for%20Windows%2095%20and%20Windows%2098%20allows%20remote%20a&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1163-vulnerability-in-hp-series-800-s-x-v-class-servers-allows-remote-attackers-to-gain-access-to-the-s-x-7df435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1163%3A%20Vulnerability%20in%20HP%20Series%20800%20S%2FX%2FV%20Class%20servers%20allows%20remote%20attackers%20to%20gain%20access%20to%20the%20S%2FX&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0844-denial-of-service-in-mdaemon-worldclient-and-webconfig-services-via-a-long-url-7df433</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0844%3A%20Denial%20of%20service%20in%20MDaemon%20WorldClient%20and%20WebConfig%20services%20via%20a%20long%20URL.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0531-linux-gpm-program-allows-local-users-to-cause-a-denial-of-service-by-flooding-the-dev-gpmctl-device-7df431</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0531%3A%20Linux%20gpm%20program%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20by%20flooding%20the%20%2Fdev%2Fgpmctl%20device&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1058-buffer-overflow-in-vermillion-ftp-daemon-vftpd-1-23-allows-remote-attackers-to-cause-a-denial-of-ser-7df422</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1058%3A%20Buffer%20overflow%20in%20Vermillion%20FTP%20Daemon%20VFTPD%201.23%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20ser&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0818-buffer-overflow-in-solaris-kcms-configure-via-a-long-netpath-environmental-variable-7df420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0818%3A%20Buffer%20overflow%20in%20Solaris%20kcms_configure%20via%20a%20long%20NETPATH%20environmental%20variable.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1475-proftpd-1-2-compiled-with-the-mod-sqlpw-module-records-user-passwords-in-the-wtmp-log-file-which-al-7df41e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1475%3A%20ProFTPd%201.2%20compiled%20with%20the%20mod_sqlpw%20module%20records%20user%20passwords%20in%20the%20wtmp%20log%20file%2C%20which%20al&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0999-microsoft-sql-7-0-server-allows-a-remote-attacker-to-cause-a-denial-of-service-via-a-malformed-tds-p-7df41c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0999%3A%20Microsoft%20SQL%207.0%20server%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20TDS%20p&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0831-denial-of-service-in-linux-syslogd-via-a-large-number-of-connections-7df41a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0831%3A%20Denial%20of%20service%20in%20Linux%20syslogd%20via%20a%20large%20number%20of%20connections.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0352-pine-before-version-4-21-does-not-properly-filter-shell-metacharacters-from-urls-which-allows-remot-7df418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0352%3A%20Pine%20before%20version%204.21%20does%20not%20properly%20filter%20shell%20metacharacters%20from%20URLs%2C%20which%20allows%20remot&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0987-windows-nt-does-not-properly-download-a-system-policy-if-the-domain-user-logs-into-the-domain-with-a-7df416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0987%3A%20Windows%20NT%20does%20not%20properly%20download%20a%20system%20policy%20if%20the%20domain%20user%20logs%20into%20the%20domain%20with%20a&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0073-buffer-overflow-in-microsoft-rich-text-format-rtf-reader-allows-attackers-to-cause-a-denial-of-ser-7df414</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0073%3A%20Buffer%20overflow%20in%20Microsoft%20Rich%20Text%20Format%20(RTF)%20reader%20allows%20attackers%20to%20cause%20a%20denial%20of%20ser&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df414</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1519-gene6-g6-ftp-server-2-0-allows-a-remote-attacker-to-cause-a-denial-of-service-resource-exhaustion-7df412</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1519%3A%20Gene6%20G6%20FTP%20Server%202.0%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20(resource%20exhaustion)%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df412</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1092-tin-1-40-creates-the-tin-directory-with-insecure-permissions-which-allows-local-users-to-read-pass-7df405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1092%3A%20tin%201.40%20creates%20the%20.tin%20directory%20with%20insecure%20permissions%2C%20which%20allows%20local%20users%20to%20read%20pass&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0793-internet-explorer-allows-remote-attackers-to-read-files-by-redirecting-data-to-a-javascript-applet-7df403</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0793%3A%20Internet%20Explorer%20allows%20remote%20attackers%20to%20read%20files%20by%20redirecting%20data%20to%20a%20Javascript%20applet.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1549-lynx-2-x-does-not-properly-distinguish-between-internal-and-external-html-which-may-allow-a-local-a-7df401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1549%3A%20Lynx%202.x%20does%20not%20properly%20distinguish%20between%20internal%20and%20external%20HTML%2C%20which%20may%20allow%20a%20local%20a&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1508-web-server-in-tektronix-phaserlink-printer-840-0-and-earlier-allows-a-remote-attacker-to-gain-admini-7df3ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1508%3A%20Web%20server%20in%20Tektronix%20PhaserLink%20Printer%20840.0%20and%20earlier%20allows%20a%20remote%20attacker%20to%20gain%20admini&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1457-buffer-overflow-in-thttpd-http-server-before-2-04-31-allows-remote-attackers-to-execute-arbitrary-co-7df3fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1457%3A%20Buffer%20overflow%20in%20thttpd%20HTTP%20server%20before%202.04-31%20allows%20remote%20attackers%20to%20execute%20arbitrary%20co&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1051-default-configuration-in-matt-wright-formhandler-cgi-script-allows-arbitrary-directories-to-be-used-7df3fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1051%3A%20Default%20configuration%20in%20Matt%20Wright%20FormHandler.cgi%20script%20allows%20arbitrary%20directories%20to%20be%20used%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1190-buffer-overflow-in-pop3-server-of-admiral-systems-emailclub-1-05-allows-remote-attackers-to-execute-7df3f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1190%3A%20Buffer%20overflow%20in%20POP3%20server%20of%20Admiral%20Systems%20EmailClub%201.05%20allows%20remote%20attackers%20to%20execute%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1528-prosoft-netware-client-5-12-on-macintosh-macos-9-does-not-automatically-log-a-user-out-of-the-nds-tr-7df3f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1528%3A%20ProSoft%20Netware%20Client%205.12%20on%20Macintosh%20MacOS%209%20does%20not%20automatically%20log%20a%20user%20out%20of%20the%20NDS%20tr&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1110-windows-media-player-activex-object-as-used-in-internet-explorer-5-0-returns-a-specific-error-code-w-7df3f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1110%3A%20Windows%20Media%20Player%20ActiveX%20object%20as%20used%20in%20Internet%20Explorer%205.0%20returns%20a%20specific%20error%20code%20w&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0165-the-delegate-application-proxy-has-several-buffer-overflows-which-allow-a-remote-attacker-to-execute-7df3f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0165%3A%20The%20Delegate%20application%20proxy%20has%20several%20buffer%20overflows%20which%20allow%20a%20remote%20attacker%20to%20execute&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0330-the-networking-software-in-windows-95-and-windows-98-allows-remote-attackers-to-execute-commands-via-7df3e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0330%3A%20The%20networking%20software%20in%20Windows%2095%20and%20Windows%2098%20allows%20remote%20attackers%20to%20execute%20commands%20via&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1050-directory-traversal-vulnerability-in-matt-wright-formhandler-cgi-script-allows-remote-attackers-to-r-7df3e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1050%3A%20Directory%20traversal%20vulnerability%20in%20Matt%20Wright%20FormHandler.cgi%20script%20allows%20remote%20attackers%20to%20r&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0329-a-microsoft-activex-control-allows-a-remote-attacker-to-execute-a-malicious-cabinet-file-via-an-atta-7df3e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0329%3A%20A%20Microsoft%20ActiveX%20control%20allows%20a%20remote%20attacker%20to%20execute%20a%20malicious%20cabinet%20file%20via%20an%20atta&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1539-buffer-overflow-in-ftp-server-in-qpc-software-s-qvt-term-plus-versions-4-2d-and-4-3-and-qvt-net-4-3-7df3e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1539%3A%20Buffer%20overflow%20in%20FTP%20server%20in%20QPC%20Software&apos;s%20QVT%2FTerm%20Plus%20versions%204.2d%20and%204.3%20and%20QVT%2FNet%204.3%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1511-buffer-overflows-in-xtramail-1-11-allow-attackers-to-cause-a-denial-of-service-crash-and-possibly-7df3de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1511%3A%20Buffer%20overflows%20in%20Xtramail%201.11%20allow%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20and%20possibly%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0851-denial-of-service-in-bind-named-via-naptr-7df3dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0851%3A%20Denial%20of%20service%20in%20BIND%20named%20via%20naptr.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0849-denial-of-service-in-bind-named-via-maxdname-7df3da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0849%3A%20Denial%20of%20service%20in%20BIND%20named%20via%20maxdname.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0848-denial-of-service-in-bind-named-via-consuming-more-than-fdmax-file-descriptors-7df3d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0848%3A%20Denial%20of%20service%20in%20BIND%20named%20via%20consuming%20more%20than%20%22fdmax%22%20file%20descriptors.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0837-denial-of-service-in-bind-by-improperly-closing-tcp-sessions-via-so-linger-7df3d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0837%3A%20Denial%20of%20service%20in%20BIND%20by%20improperly%20closing%20TCP%20sessions%20via%20so_linger.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0835-denial-of-service-in-bind-named-via-malformed-sig-records-7df3d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0835%3A%20Denial%20of%20service%20in%20BIND%20named%20via%20malformed%20SIG%20records.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0833-buffer-overflow-in-bind-8-2-via-nxt-records-7df3c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0833%3A%20Buffer%20overflow%20in%20BIND%208.2%20via%20NXT%20records.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1112-buffer-overflow-in-irfanview32-3-07-and-earlier-allows-attackers-to-execute-arbitrary-commands-via-a-7df3c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1112%3A%20Buffer%20overflow%20in%20IrfanView32%203.07%20and%20earlier%20allows%20attackers%20to%20execute%20arbitrary%20commands%20via%20a&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1111-vulnerability-in-stackguard-before-1-21-allows-remote-attackers-to-bypass-the-random-and-terminator-7df3c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1111%3A%20Vulnerability%20in%20StackGuard%20before%201.21%20allows%20remote%20attackers%20to%20bypass%20the%20Random%20and%20Terminator%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0985-cc-whois-program-whois-cgi-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-in-t-7df3c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0985%3A%20CC%20Whois%20program%20whois.cgi%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters%20in%20t&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0984-matt-s-whois-program-whois-cgi-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-7df3bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0984%3A%20Matt&apos;s%20Whois%20program%20whois.cgi%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0983-whois-internic-lookup-program-whois-cgi-allows-remote-attackers-to-execute-commands-via-shell-metach-7df3bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0983%3A%20Whois%20Internic%20Lookup%20program%20whois.cgi%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metach&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0832-buffer-overflow-in-nfs-server-on-linux-allows-attackers-to-execute-commands-via-a-long-pathname-7df3bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0832%3A%20Buffer%20overflow%20in%20NFS%20server%20on%20Linux%20allows%20attackers%20to%20execute%20commands%20via%20a%20long%20pathname.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2001-0679-a-buffer-overflow-in-interscan-viruswall-3-23-and-3-3-allows-a-remote-attacker-to-execute-arbitrary-7df3b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2001-0679%3A%20A%20buffer%20overflow%20in%20InterScan%20VirusWall%203.23%20and%203.3%20allows%20a%20remote%20attacker%20to%20execute%20arbitrary%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1550-bigconf-conf-in-f5-big-ip-2-1-2-and-earlier-allows-remote-attackers-to-read-arbitrary-files-by-speci-7df3b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1550%3A%20bigconf.conf%20in%20F5%20BIG%2Fip%202.1.2%20and%20earlier%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20by%20speci&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1530-cgiwrap-as-used-on-cobalt-raq-2-0-and-raq-3i-does-not-properly-identify-the-user-for-running-certain-7df3b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1530%3A%20cgiwrap%20as%20used%20on%20Cobalt%20RaQ%202.0%20and%20RaQ%203i%20does%20not%20properly%20identify%20the%20user%20for%20running%20certain&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df3b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0863-buffer-overflow-in-freebsd-seyon-via-home-environmental-variable-emulator-argument-modems-argume-7df3a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0863%3A%20Buffer%20overflow%20in%20FreeBSD%20seyon%20via%20HOME%20environmental%20variable%2C%20-emulator%20argument%2C%20-modems%20argume&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0821-freebsd-seyon-allows-local-users-to-gain-privileges-by-providing-a-malicious-program-in-the-emulato-7df3a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0821%3A%20FreeBSD%20seyon%20allows%20local%20users%20to%20gain%20privileges%20by%20providing%20a%20malicious%20program%20in%20the%20-emulato&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1533-eicon-technology-diva-lan-isdn-modem-allows-a-remote-attacker-to-cause-a-denial-of-service-hang-vi-7df3a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1533%3A%20Eicon%20Technology%20Diva%20LAN%20ISDN%20modem%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20(hang)%20vi&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1529-a-buffer-overflow-exists-in-the-helo-command-in-trend-micro-interscan-viruswall-smtp-gateway-3-23-3-7df3a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1529%3A%20A%20buffer%20overflow%20exists%20in%20the%20HELO%20command%20in%20Trend%20Micro%20Interscan%20VirusWall%20SMTP%20gateway%203.23%2F3.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1571-buffer-overflow-in-sar-for-sco-openserver-5-0-0-through-5-0-5-may-allow-local-users-to-gain-root-pri-7df3a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1571%3A%20Buffer%20overflow%20in%20sar%20for%20SCO%20OpenServer%205.0.0%20through%205.0.5%20may%20allow%20local%20users%20to%20gain%20root%20pri&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1509-directory-traversal-vulnerability-in-etype-eserv-2-50-web-server-allows-a-remote-attacker-to-read-an-7df39e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1509%3A%20Directory%20traversal%20vulnerability%20in%20Etype%20Eserv%202.50%20web%20server%20allows%20a%20remote%20attacker%20to%20read%20an&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1340-buffer-overflow-in-faxalter-in-hylafax-4-0-2-allows-local-users-to-gain-privileges-via-a-long-m-com-7df39c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1340%3A%20Buffer%20overflow%20in%20faxalter%20in%20hylafax%204.0.2%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20long%20-m%20com&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1065-palm-pilot-hotsync-manager-3-0-4-in-windows-98-allows-remote-attackers-to-cause-a-denial-of-service-7df39a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1065%3A%20Palm%20Pilot%20HotSync%20Manager%203.0.4%20in%20Windows%2098%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%2C&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0899-the-windows-nt-4-0-print-spooler-allows-a-local-user-to-execute-arbitrary-commands-due-to-inappropri-7df398</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0899%3A%20The%20Windows%20NT%204.0%20print%20spooler%20allows%20a%20local%20user%20to%20execute%20arbitrary%20commands%20due%20to%20inappropri&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df398</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0898-buffer-overflows-in-windows-nt-4-0-print-spooler-allow-remote-attackers-to-gain-privileges-or-cause-7df396</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0898%3A%20Buffer%20overflows%20in%20Windows%20NT%204.0%20print%20spooler%20allow%20remote%20attackers%20to%20gain%20privileges%20or%20cause%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df396</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0896-buffer-overflow-in-realnetworks-realserver-administration-utility-allows-remote-attackers-to-execute-7df389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0896%3A%20Buffer%20overflow%20in%20RealNetworks%20RealServer%20administration%20utility%20allows%20remote%20attackers%20to%20execute&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0887-ftgate-web-interface-server-allows-remote-attackers-to-read-files-via-a-dot-dot-attack-7df387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0887%3A%20FTGate%20web%20interface%20server%20allows%20remote%20attackers%20to%20read%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0843-denial-of-service-in-cisco-routers-running-nat-via-a-port-command-from-an-ftp-client-to-a-telnet-por-7df385</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0843%3A%20Denial%20of%20service%20in%20Cisco%20routers%20running%20NAT%20via%20a%20PORT%20command%20from%20an%20FTP%20client%20to%20a%20Telnet%20por&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0904-buffer-overflow-in-bftelnet-allows-remote-attackers-to-cause-a-denial-of-service-via-a-long-username-7df383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0904%3A%20Buffer%20overflow%20in%20BFTelnet%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20long%20username&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0885-alibaba-web-server-allows-remote-attackers-to-execute-commands-via-a-pipe-character-in-a-malformed-u-7df381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0885%3A%20Alibaba%20web%20server%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20pipe%20character%20in%20a%20malformed%20U&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1531-buffer-overflow-in-ibm-homepageprint-1-0-7-for-windows98j-allows-a-malicious-web-site-to-execute-arb-7df37f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1531%3A%20Buffer%20overflow%20in%20IBM%20HomePagePrint%201.0.7%20for%20Windows98J%20allows%20a%20malicious%20Web%20site%20to%20execute%20arb&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0949-buffer-overflow-in-canuum-program-for-canna-input-system-allows-local-users-to-gain-root-privileges-7df37d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0949%3A%20Buffer%20overflow%20in%20canuum%20program%20for%20Canna%20input%20system%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0948-buffer-overflow-in-uum-program-for-canna-input-system-allows-local-users-to-gain-root-privileges-7df37b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0948%3A%20Buffer%20overflow%20in%20uum%20program%20for%20Canna%20input%20system%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0947-an-httpd-provides-example-cgi-scripts-test-bat-input-bat-input2-bat-and-envout-bat-which-allow-r-7df379</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0947%3A%20AN-HTTPd%20provides%20example%20CGI%20scripts%20test.bat%2C%20input.bat%2C%20input2.bat%2C%20and%20envout.bat%2C%20which%20allow%20r&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df379</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0946-buffer-overflow-in-yamaha-midiplug-via-a-text-variable-in-an-embed-tag-7df377</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0946%3A%20Buffer%20overflow%20in%20Yamaha%20MidiPlug%20via%20a%20Text%20variable%20in%20an%20EMBED%20tag.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df377</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1517-runtar-in-the-amanda-backup-system-used-in-various-unix-operating-systems-executes-tar-with-root-pri-7df36a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1517%3A%20runtar%20in%20the%20Amanda%20backup%20system%20used%20in%20various%20UNIX%20operating%20systems%20executes%20tar%20with%20root%20pri&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1077-idle-locking-function-in-macos-9-allows-local-attackers-to-bypass-the-password-protection-of-idled-s-7df368</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1077%3A%20Idle%20locking%20function%20in%20MacOS%209%20allows%20local%20attackers%20to%20bypass%20the%20password%20protection%20of%20idled%20s&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0854-ultimate-bulletin-board-stores-data-files-in-the-cgi-bin-directory-allowing-remote-attackers-to-vie-7df366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0854%3A%20Ultimate%20Bulletin%20Board%20stores%20data%20files%20in%20the%20cgi-bin%20directory%2C%20allowing%20remote%20attackers%20to%20vie&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0830-buffer-overflow-in-sco-unixware-xsco-command-via-a-long-argument-7df364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0830%3A%20Buffer%20overflow%20in%20SCO%20UnixWare%20Xsco%20command%20via%20a%20long%20argument.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0827-by-default-internet-explorer-5-0-and-other-versions-enables-the-navigate-sub-frames-across-differe-7df360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0827%3A%20By%20default%2C%20Internet%20Explorer%205.0%20and%20other%20versions%20enables%20the%20%22Navigate%20sub-frames%20across%20differe&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0829-hp-secure-web-console-uses-weak-encryption-7df362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0829%3A%20HP%20Secure%20Web%20Console%20uses%20weak%20encryption.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0354-internet-explorer-4-x-or-5-x-with-word-97-allows-arbitrary-execution-of-visual-basic-programs-to-the-7df35e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0354%3A%20Internet%20Explorer%204.x%20or%205.x%20with%20Word%2097%20allows%20arbitrary%20execution%20of%20Visual%20Basic%20programs%20to%20the&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1577-buffer-overflow-in-hhopen-activex-control-hhopen-ocx-1-0-0-1-for-internet-explorer-4-01-and-5-allo-7df35c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1577%3A%20Buffer%20overflow%20in%20HHOpen%20ActiveX%20control%20(hhopen.ocx)%201.0.0.1%20for%20Internet%20Explorer%204.01%20and%205%20allo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0873-buffer-overflow-in-skyfull-mail-server-via-mail-from-command-7df35a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0873%3A%20Buffer%20overflow%20in%20Skyfull%20mail%20server%20via%20MAIL%20FROM%20command.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df35a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1532-netscape-messaging-server-3-54-3-55-and-3-6-allows-a-remote-attacker-to-cause-a-denial-of-service-7df358</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1532%3A%20Netscape%20Messaging%20Server%203.54%2C%203.55%2C%20and%203.6%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df358</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1226-netscape-communicator-4-7-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-and-poss-7df34b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1226%3A%20Netscape%20Communicator%204.7%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%2C%20and%20poss&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df34b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0950-buffer-overflow-in-wftpd-ftp-server-allows-remote-attackers-to-gain-root-access-via-a-series-of-mkd-7df349</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0950%3A%20Buffer%20overflow%20in%20WFTPD%20FTP%20server%20allows%20remote%20attackers%20to%20gain%20root%20access%20via%09a%20series%20of%20MKD%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df349</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0915-url-live-web-server-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df347</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0915%3A%20URL%20Live!%20web%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0882-falcon-web-server-allows-remote-attackers-to-determine-the-absolute-path-of-the-web-root-via-long-fi-7df345</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0882%3A%20Falcon%20web%20server%20allows%20remote%20attackers%20to%20determine%20the%20absolute%20path%20of%20the%20web%20root%20via%20long%20fi&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1234-lsa-lsass-exe-in-windows-nt-4-0-allows-remote-attackers-to-cause-a-denial-of-service-via-a-null-po-7df343</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1234%3A%20LSA%20(LSASS.EXE)%20in%20Windows%20NT%204.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20NULL%20po&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1076-idle-locking-function-in-macos-9-allows-local-users-to-bypass-the-password-protection-of-idled-sessi-7df341</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1076%3A%20Idle%20locking%20function%20in%20MacOS%209%20allows%20local%20users%20to%20bypass%20the%20password%20protection%20of%20idled%20sessi&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df341</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0903-genfilt-in-the-aix-packet-filtering-module-does-not-properly-filter-traffic-to-destination-ports-gre-7df33f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0903%3A%20genfilt%20in%20the%20AIX%20Packet%20Filtering%20Module%20does%20not%20properly%20filter%20traffic%20to%20destination%20ports%20gre&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df33f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0881-falcon-web-server-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df33d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0881%3A%20Falcon%20web%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df33d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0884-the-zeus-web-server-administrative-interface-uses-weak-encryption-for-its-passwords-7df33b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0884%3A%20The%20Zeus%20web%20server%20administrative%20interface%20uses%20weak%20encryption%20for%20its%20passwords.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df33b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0883-zeus-web-server-allows-remote-attackers-to-read-arbitrary-files-by-specifying-the-file-name-in-an-op-7df339</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0883%3A%20Zeus%20web%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20by%20specifying%20the%20file%20name%20in%20an%20op&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df339</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0944-ibm-websphere-ikeyman-tool-uses-weak-encryption-to-store-a-password-for-a-key-database-that-is-used-7df32c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0944%3A%20IBM%20WebSphere%20ikeyman%20tool%20uses%20weak%20encryption%20to%20store%20a%20password%20for%20a%20key%20database%20that%20is%20used%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df32c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0902-ypserv-allows-local-administrators-to-modify-password-tables-7df32a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0902%3A%20ypserv%20allows%20local%20administrators%20to%20modify%20password%20tables.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df32a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0901-ypserv-allows-a-local-user-to-modify-the-gecos-and-login-shells-of-other-users-7df328</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0901%3A%20ypserv%20allows%20a%20local%20user%20to%20modify%20the%20GECOS%20and%20login%20shells%20of%20other%20users.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df328</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0900-buffer-overflow-in-rpc-yppasswdd-allows-a-local-user-to-gain-privileges-via-md5-hash-generation-7df326</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0900%3A%20Buffer%20overflow%20in%20rpc.yppasswdd%20allows%20a%20local%20user%20to%20gain%20privileges%20via%20MD5%20hash%20generation.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df326</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0363-linux-cdwtools-093-and-earlier-allows-local-users-to-gain-root-privileges-via-the-tmp-directory-7df324</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0363%3A%20Linux%20cdwtools%20093%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20the%20%2Ftmp%20directory.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df324</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0362-buffer-overflows-in-linux-cdwtools-093-and-earlier-allows-local-users-to-gain-root-privileges-7df322</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0362%3A%20Buffer%20overflows%20in%20Linux%20cdwtools%20093%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df322</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1341-linux-kernel-before-2-3-18-or-2-2-13pre15-with-slip-and-ppp-options-allows-local-unprivileged-user-7df320</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1341%3A%20Linux%20kernel%20before%202.3.18%20or%202.2.13pre15%2C%20with%20SLIP%20and%20PPP%20options%2C%20allows%20local%20unprivileged%20user&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df320</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0951-buffer-overflow-in-omnihttpd-cgi-program-imagemap-exe-allows-remote-attackers-to-execute-commands-7df31e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0951%3A%20Buffer%20overflow%20in%20OmniHTTPd%20CGI%20program%20imagemap.exe%20allows%20remote%20attackers%20to%20execute%20commands.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df31e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0327-microsoft-virtual-machine-vm-allows-remote-attackers-to-escape-the-java-sandbox-and-execute-comman-7df31c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0327%3A%20Microsoft%20Virtual%20Machine%20(VM)%20allows%20remote%20attackers%20to%20escape%20the%20Java%20sandbox%20and%20execute%20comman&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df31c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0905-denial-of-service-in-axent-raptor-firewall-via-malformed-zero-length-ip-options-7df31a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0905%3A%20Denial%20of%20service%20in%20Axent%20Raptor%20firewall%20via%20malformed%20zero-length%20IP%20options.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df31a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0766-the-microsoft-java-virtual-machine-allows-a-malicious-java-applet-to-execute-arbitrary-commands-outs-7df30d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0766%3A%20The%20Microsoft%20Java%20Virtual%20Machine%20allows%20a%20malicious%20Java%20applet%20to%20execute%20arbitrary%20commands%20outs&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df30d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0895-firewall-1-does-not-properly-restrict-access-to-ldap-attributes-7df30b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0895%3A%20Firewall-1%20does%20not%20properly%20restrict%20access%20to%20LDAP%20attributes.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df30b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1047-when-bsdi-patches-for-gauntlet-5-0-bsdi-are-installed-in-a-particular-order-gauntlet-allows-remote-7df309</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1047%3A%20When%20BSDI%20patches%20for%20Gauntlet%205.0%20BSDI%20are%20installed%20in%20a%20particular%20order%2C%20Gauntlet%20allows%20remote%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df309</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1342-icq-activelist-server-allows-remote-attackers-to-cause-a-denial-of-service-crash-via-malformed-pac-7df307</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1342%3A%20ICQ%20ActiveList%20Server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20malformed%20pac&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df307</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0943-buffer-overflow-in-openlink-3-2-allows-remote-attackers-to-gain-privileges-via-a-long-get-request-to-7df305</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0943%3A%20Buffer%20overflow%20in%20OpenLink%203.2%20allows%20remote%20attackers%20to%20gain%20privileges%20via%20a%20long%20GET%20request%20to&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df305</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0356-pluggable-authentication-modules-pam-in-red-hat-linux-6-1-does-not-properly-lock-access-to-disable-7df303</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0356%3A%20Pluggable%20Authentication%20Modules%20(PAM)%20in%20Red%20Hat%20Linux%206.1%20does%20not%20properly%20lock%20access%20to%20disable&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df303</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1343-http-server-for-xerox-docucolor-4-lp-allows-remote-attackers-to-cause-a-denial-of-service-hang-via-7df301</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1343%3A%20HTTP%20server%20for%20Xerox%20DocuColor%204%20LP%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(hang)%20via&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df301</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0893-userosa-in-sco-openserver-allows-local-users-to-corrupt-files-via-a-symlink-attack-7df2ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0893%3A%20userOsa%20in%20SCO%20OpenServer%20allows%20local%20users%20to%20corrupt%20files%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df2ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0369-the-ident-server-in-caldera-linux-2-3-creates-multiple-threads-for-each-ident-request-which-allows-7df2fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0369%3A%20The%20IDENT%20server%20in%20Caldera%20Linux%202.3%20creates%20multiple%20threads%20for%20each%20IDENT%20request%2C%20which%20allows%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1083-directory-traversal-vulnerability-in-jana-proxy-web-server-1-45-allows-remote-attackers-to-ready-arb-7df2fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1083%3A%20Directory%20traversal%20vulnerability%20in%20Jana%20proxy%20web%20server%201.45%20allows%20remote%20attackers%20to%20ready%20arb&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1082-directory-traversal-vulnerability-in-jana-proxy-web-server-1-40-allows-remote-attackers-to-ready-arb-7df2ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1082%3A%20Directory%20traversal%20vulnerability%20in%20Jana%20proxy%20web%20server%201.40%20allows%20remote%20attackers%20to%20ready%20arb&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1522-vulnerability-in-htmlparse-pike-in-roxen-web-server-1-3-11-and-earlier-possibly-related-to-recursiv-7df2ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1522%3A%20Vulnerability%20in%20htmlparse.pike%20in%20Roxen%20Web%20Server%201.3.11%20and%20earlier%2C%20possibly%20related%20to%20recursiv&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1347-xsession-in-red-hat-linux-6-1-and-earlier-can-allow-local-users-with-restricted-accounts-to-bypass-e-7df2ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1347%3A%20Xsession%20in%20Red%20Hat%20Linux%206.1%20and%20earlier%20can%20allow%20local%20users%20with%20restricted%20accounts%20to%20bypass%20e&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1346-pam-configuration-file-for-rlogin-in-red-hat-linux-6-1-and-earlier-includes-a-less-restrictive-rule-7df2e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1346%3A%20PAM%20configuration%20file%20for%20rlogin%20in%20Red%20Hat%20Linux%206.1%20and%20earlier%20includes%20a%20less%20restrictive%20rule%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1349-nfs-daemon-nfsd-exe-for-omni-nfs-x-6-1-allows-remote-attackers-to-cause-a-denial-of-service-resou-7df2e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1349%3A%20NFS%20daemon%20(nfsd.exe)%20for%20Omni-NFS%2FX%206.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(resou&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0791-hybrid-network-cable-modems-do-not-include-an-authentication-mechanism-for-administration-allowing-7df2e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0791%3A%20Hybrid%20Network%20cable%20modems%20do%20not%20include%20an%20authentication%20mechanism%20for%20administration%2C%20allowing%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1357-netscape-communicator-4-04-through-4-7-and-possibly-other-versions-in-various-unix-operating-syste-7df2e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1357%3A%20Netscape%20Communicator%204.04%20through%204.7%20(and%20possibly%20other%20versions)%20in%20various%20UNIX%20operating%20syste&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1345-auto-ftp-pl-script-in-auto-ftp-0-2-uses-the-tmp-ftp-tmp-as-a-shared-directory-with-insecure-permiss-7df2e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1345%3A%20Auto_FTP.pl%20script%20in%20Auto_FTP%200.2%20uses%20the%20%2Ftmp%2Fftp_tmp%20as%20a%20shared%20directory%20with%20insecure%20permiss&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1344-auto-ftp-pl-script-in-auto-ftp-0-2-stores-usernames-and-passwords-in-plaintext-in-the-auto-ftp-conf-7df2de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1344%3A%20Auto_FTP.pl%20script%20in%20Auto_FTP%200.2%20stores%20usernames%20and%20passwords%20in%20plaintext%20in%20the%20auto_ftp.conf%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1542-rpmmail-before-1-4-allows-remote-attackers-to-execute-commands-via-an-e-mail-message-with-shell-meta-7df2dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1542%3A%20RPMMail%20before%201.4%20allows%20remote%20attackers%20to%20execute%20commands%20via%20an%20e-mail%20message%20with%20shell%20meta&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1541-shell-lock-in-cactus-software-shell-lock-allows-local-users-to-read-or-modify-decoded-shell-files-be-7df2cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1541%3A%20shell-lock%20in%20Cactus%20Software%20Shell%20Lock%20allows%20local%20users%20to%20read%20or%20modify%20decoded%20shell%20files%20be&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1540-shell-lock-in-cactus-software-shell-lock-uses-weak-encryption-trivial-encoding-which-allows-attack-7df2cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1540%3A%20shell-lock%20in%20Cactus%20Software%20Shell%20Lock%20uses%20weak%20encryption%20(trivial%20encoding)%20which%20allows%20attack&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df2cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1523-buffer-overflow-in-sambar-web-server-4-2-1-allows-remote-attackers-to-cause-a-denial-of-service-and-7df2cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1523%3A%20Buffer%20overflow%20in%20Sambar%20Web%20Server%204.2.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%2C%20and&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1454-macromedia-the-matrix-screen-saver-on-windows-95-with-the-password-protected-option-enabled-allo-7df2c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1454%3A%20Macromedia%20%22The%20Matrix%22%20screen%20saver%20on%20Windows%2095%20with%20the%20%22Password%20protected%22%20option%20enabled%20allo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0942-unixware-dos7utils-allows-a-local-user-to-gain-root-privileges-by-using-the-staticmerge-environmenta-7df2c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0942%3A%20UnixWare%20dos7utils%20allows%20a%20local%20user%20to%20gain%20root%20privileges%20by%20using%20the%20STATICMERGE%20environmenta&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0047-buffer-overflow-in-yahoo-pager-messenger-client-allows-remote-attackers-to-cause-a-denial-of-service-7df2c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0047%3A%20Buffer%20overflow%20in%20Yahoo%20Pager%2FMessenger%20client%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0016-buffer-overflow-in-internet-anywhere-pop3-mail-server-allows-remote-attackers-to-cause-a-denial-of-s-7df2c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0016%3A%20Buffer%20overflow%20in%20Internet%20Anywhere%20POP3%20Mail%20Server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20s&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1500-internet-anywhere-pop3-mail-server-2-3-1-allows-remote-attackers-to-cause-a-denial-of-service-crash-7df2c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1500%3A%20Internet%20Anywhere%20POP3%20Mail%20Server%202.3.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1236-internet-anywhere-mail-server-2-3-1-stores-passwords-in-plaintext-in-the-msgboxes-dbf-file-which-co-7df2bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1236%3A%20Internet%20Anywhere%20Mail%20Server%202.3.1%20stores%20passwords%20in%20plaintext%20in%20the%20msgboxes.dbf%20file%2C%20which%20co&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0933-teamtrack-web-server-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df2bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0933%3A%20TeamTrack%20web%20server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0880-denial-of-service-in-wu-ftpd-via-the-site-newer-command-which-does-not-free-memory-properly-7df2b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0880%3A%20Denial%20of%20service%20in%20WU-FTPD%20via%20the%20SITE%20NEWER%20command%2C%20which%20does%20not%20free%20memory%20properly.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0879-buffer-overflow-in-wu-ftpd-and-related-ftp-servers-allows-remote-attackers-to-gain-root-privileges-v-7df2ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0879%3A%20Buffer%20overflow%20in%20WU-FTPD%20and%20related%20FTP%20servers%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20v&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0877-internet-explorer-5-allows-remote-attackers-to-read-files-via-an-execcommand-method-called-on-an-ifr-7df2ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0877%3A%20Internet%20Explorer%205%20allows%20remote%20attackers%20to%20read%20files%20via%20an%20ExecCommand%20method%20called%20on%20an%20IFR&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0794-microsoft-excel-does-not-warn-a-user-when-a-macro-is-present-in-a-symbolic-link-sylk-format-file-7df2aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0794%3A%20Microsoft%20Excel%20does%20not%20warn%20a%20user%20when%20a%20macro%20is%20present%20in%20a%20Symbolic%20Link%20(SYLK)%20format%20file.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1583-buffer-overflow-in-nslookup-for-aix-4-3-allows-local-users-to-execute-arbitrary-code-via-a-long-host-7df2a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1583%3A%20Buffer%20overflow%20in%20nslookup%20for%20AIX%204.3%20allows%20local%20users%20to%20execute%20arbitrary%20code%20via%20a%20long%20host&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1469-buffer-overflow-in-w3-auth-cgi-program-in-minisql-package-allows-remote-attackers-to-execute-arbitra-7df2a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1469%3A%20Buffer%20overflow%20in%20w3-auth%20CGI%20program%20in%20miniSQL%20package%20allows%20remote%20attackers%20to%20execute%20arbitra&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0932-mediahouse-statistics-server-allows-remote-attackers-to-read-the-administrator-password-which-is-st-7df2a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0932%3A%20Mediahouse%20Statistics%20Server%20allows%20remote%20attackers%20to%20read%20the%20administrator%20password%2C%20which%20is%20st&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df2a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0931-buffer-overflow-in-mediahouse-statistics-server-allows-remote-attackers-to-execute-commands-7df2a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0931%3A%20Buffer%20overflow%20in%20Mediahouse%20Statistics%20Server%20allows%20remote%20attackers%20to%20execute%20commands.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1350-arcad-systemhaus-0-078-5-installs-critical-programs-and-files-with-world-writeable-permissions-whic-7df2a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1350%3A%20ARCAD%20Systemhaus%200.078-5%20installs%20critical%20programs%20and%20files%20with%20world-writeable%20permissions%2C%20whic&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df2a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1352-mknod-in-linux-2-2-follows-symbolic-links-which-could-allow-local-users-to-overwrite-files-or-gain-7df29e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1352%3A%20mknod%20in%20Linux%202.2%20follows%20symbolic%20links%2C%20which%20could%20allow%20local%20users%20to%20overwrite%20files%20or%20gain%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df29e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0789-buffer-overflow-in-aix-ftpd-in-the-libc-library-7df291</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0789%3A%20Buffer%20overflow%20in%20AIX%20ftpd%20in%20the%20libc%20library.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1576-buffer-overflow-in-adobe-acrobat-activex-control-pdf-ocx-pdf-pdfctrl-1-1-3-188-for-acrobat-reader-7df28f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1576%3A%20Buffer%20overflow%20in%20Adobe%20Acrobat%20ActiveX%20control%20(pdf.ocx%2C%20PDF.PdfCtrl.1)%201.3.188%20for%20Acrobat%20Reader&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df28f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0940-buffer-overflow-in-mutt-mail-client-allows-remote-attackers-to-execute-commands-via-malformed-mime-m-7df28d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0940%3A%20Buffer%20overflow%20in%20mutt%20mail%20client%20allows%20remote%20attackers%20to%20execute%20commands%20via%20malformed%20MIME%20m&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df28d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0788-arkiea-nlservd-allows-remote-attackers-to-conduct-a-denial-of-service-7df28b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0788%3A%20Arkiea%20nlservd%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df28b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1578-buffer-overflow-in-registration-wizard-activex-control-regwizc-dll-invokeregwizard-3-0-0-0-for-in-7df289</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1578%3A%20Buffer%20overflow%20in%20Registration%20Wizard%20ActiveX%20control%20(regwizc.dll%2C%20InvokeRegWizard)%203.0.0.0%20for%20In&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1484-buffer-overflow-in-msn-setup-bbs-4-71-0-10-activex-control-setupbbs-ocx-allows-a-remote-attacker-t-7df287</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1484%3A%20Buffer%20overflow%20in%20MSN%20Setup%20BBS%204.71.0.10%20ActiveX%20control%20(setupbbs.ocx)%20allows%20a%20remote%20attacker%20t&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1351-directory-traversal-vulnerability-in-kvirc-irc-client-0-9-0-with-the-listen-to-nick-soundname-re-7df285</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1351%3A%20Directory%20traversal%20vulnerability%20in%20KVIrc%20IRC%20client%200.9.0%20with%20the%20%22Listen%20to%20!nick%20%3Csoundname%3E%20re&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1534-buffer-overflow-in-1-nlservd-and-2-rnavc-in-knox-software-arkeia-backup-product-allows-local-use-7df283</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1534%3A%20Buffer%20overflow%20in%20(1)%20nlservd%20and%20(2)%20rnavc%20in%20Knox%20Software%20Arkeia%20backup%20product%20allows%20local%20use&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1477-buffer-overflow-in-gnome-libraries-1-0-8-allows-local-user-to-gain-root-access-via-a-long-espeaker-7df281</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1477%3A%20Buffer%20overflow%20in%20GNOME%20libraries%201.0.8%20allows%20local%20user%20to%20gain%20root%20access%20via%20a%20long%20--espeaker&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1013-named-xfer-in-aix-4-1-5-and-4-2-1-allows-members-of-the-system-group-to-overwrite-system-files-to-ga-7df27f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1013%3A%20named-xfer%20in%20AIX%204.1.5%20and%204.2.1%20allows%20members%20of%20the%20system%20group%20to%20overwrite%20system%20files%20to%20ga&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df27f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0908-denial-of-service-in-solaris-tcp-streams-driver-via-a-malicious-connection-that-causes-the-server-to-7df272</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0908%3A%20Denial%20of%20service%20in%20Solaris%20TCP%20streams%20driver%20via%20a%20malicious%20connection%20that%20causes%20the%20server%20to&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0906-buffer-overflow-in-sccw-allows-local-users-to-gain-root-access-via-the-home-environmental-variable-7df270</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0906%3A%20Buffer%20overflow%20in%20sccw%20allows%20local%20users%20to%20gain%20root%20access%20via%20the%20HOME%20environmental%20variable.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0777-iis-ftp-servers-may-allow-a-remote-attacker-to-read-or-delete-files-on-the-server-even-if-they-have-7df26e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0777%3A%20IIS%20FTP%20servers%20may%20allow%20a%20remote%20attacker%20to%20read%20or%20delete%20files%20on%20the%20server%2C%20even%20if%20they%20have&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df26e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0912-freebsd-vfs-cache-vfs-cache-allows-local-users-to-cause-a-denial-of-service-by-opening-a-large-num-7df26c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0912%3A%20FreeBSD%20VFS%20cache%20(vfs_cache)%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20by%20opening%20a%20large%20num&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df26c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0786-the-dynamic-linker-in-solaris-allows-a-local-user-to-create-arbitrary-files-via-the-ld-profile-envir-7df26a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0786%3A%20The%20dynamic%20linker%20in%20Solaris%20allows%20a%20local%20user%20to%20create%20arbitrary%20files%20via%20the%20LD_PROFILE%20envir&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df26a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0708-buffer-overflow-in-cfingerd-allows-local-users-to-gain-root-privileges-via-a-long-gecos-field-7df268</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0708%3A%20Buffer%20overflow%20in%20cfingerd%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20GECOS%20field.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0909-multihomed-windows-systems-allow-a-remote-attacker-to-bypass-ip-source-routing-restrictions-via-a-ma-7df266</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0909%3A%20Multihomed%20Windows%20systems%20allow%20a%20remote%20attacker%20to%20bypass%20IP%20source%20routing%20restrictions%20via%20a%20ma&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0886-the-security-descriptor-for-rasman-allows-users-to-point-to-an-alternate-location-via-the-windows-nt-7df264</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0886%3A%20The%20security%20descriptor%20for%20RASMAN%20allows%20users%20to%20point%20to%20an%20alternate%20location%20via%20the%20Windows%20NT&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0787-the-ssh-authentication-agent-follows-symlinks-via-a-unix-domain-socket-7df262</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0787%3A%20The%20SSH%20authentication%20agent%20follows%20symlinks%20via%20a%20UNIX%20domain%20socket.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0954-wwwboard-has-a-default-username-and-default-password-7df260</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0954%3A%20WWWBoard%20has%20a%20default%20username%20and%20default%20password.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0953-wwwboard-stores-encrypted-passwords-in-a-password-file-that-is-under-the-web-root-and-thus-accessibl-7df253</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0953%3A%20WWWBoard%20stores%20encrypted%20passwords%20in%20a%20password%20file%20that%20is%20under%20the%20web%20root%20and%20thus%20accessibl&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0907-sccw-allows-local-users-to-read-arbitrary-files-7df251</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0907%3A%20sccw%20allows%20local%20users%20to%20read%20arbitrary%20files.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0890-ihtml-merchant-allows-remote-attackers-to-obtain-sensitive-information-or-execute-commands-via-a-cod-7df24f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0890%3A%20iHTML%20Merchant%20allows%20remote%20attackers%20to%20obtain%20sensitive%20information%20or%20execute%20commands%20via%20a%20cod&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df24f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0704-buffer-overflow-in-berkeley-automounter-daemon-amd-logging-facility-provided-in-the-linux-am-utils-7df24d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0704%3A%20Buffer%20overflow%20in%20Berkeley%20automounter%20daemon%20(amd)%20logging%20facility%20provided%20in%20the%20Linux%20am-utils&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df24d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0817-lynx-www-client-allows-a-remote-attacker-to-specify-command-line-parameters-which-lynx-uses-when-cal-7df24b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0817%3A%20Lynx%20WWW%20client%20allows%20a%20remote%20attacker%20to%20specify%20command-line%20parameters%20which%20Lynx%20uses%20when%20cal&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df24b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1053-guestbook-pl-cleanses-user-inserted-ssi-commands-by-removing-text-between-and-separator-7df249</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1053%3A%20guestbook.pl%20cleanses%20user-inserted%20SSI%20commands%20by%20removing%20text%20between%20%22%3C!--%22%20and%20%22--%3E%22%20separator&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1014-buffer-overflow-in-mail-command-in-solaris-2-7-and-2-7-allows-local-users-to-gain-privileges-via-a-l-7df247</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1014%3A%20Buffer%20overflow%20in%20mail%20command%20in%20Solaris%202.7%20and%202.7%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20l&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0759-buffer-overflow-in-fusemail-pop-service-via-long-user-and-pass-commands-7df245</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0759%3A%20Buffer%20overflow%20in%20FuseMAIL%20POP%20service%20via%20long%20USER%20and%20PASS%20commands.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0751-buffer-overflow-in-accept-command-in-netscape-enterprise-server-3-6-with-the-ssl-handshake-patch-7df243</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0751%3A%20Buffer%20overflow%20in%20Accept%20command%20in%20Netscape%20Enterprise%20Server%203.6%20with%20the%20SSL%20Handshake%20Patch.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0750-hotmail-allows-javascript-to-be-executed-via-the-html-style-tag-allowing-remote-attackers-to-execut-7df241</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0750%3A%20Hotmail%20allows%20Javascript%20to%20be%20executed%20via%20the%20HTML%20STYLE%20tag%2C%20allowing%20remote%20attackers%20to%20execut&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0691-buffer-overflow-in-the-addsulog-function-of-the-cde-dtaction-utility-allows-local-users-to-gain-root-7df234</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0691%3A%20Buffer%20overflow%20in%20the%20AddSuLog%20function%20of%20the%20CDE%20dtaction%20utility%20allows%20local%20users%20to%20gain%20root&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0689-the-cde-dtspcd-daemon-allows-local-users-to-execute-arbitrary-commands-via-a-symlink-attack-7df232</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0689%3A%20The%20CDE%20dtspcd%20daemon%20allows%20local%20users%20to%20execute%20arbitrary%20commands%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0687-the-tooltalk-ttsession-daemon-uses-weak-rpc-authentication-which-allows-a-remote-attacker-to-execut-7df230</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0687%3A%20The%20ToolTalk%20ttsession%20daemon%20uses%20weak%20RPC%20authentication%2C%20which%20allows%20a%20remote%20attacker%20to%20execut&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1521-computalynx-cmail-2-4-and-cmail-2-3-sp2-smtp-servers-are-vulnerable-to-a-buffer-overflow-attack-in-t-7df22e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1521%3A%20Computalynx%20CMail%202.4%20and%20CMail%202.3%20SP2%20SMTP%20servers%20are%20vulnerable%20to%20a%20buffer%20overflow%20attack%20in%20t&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1575-the-kodak-wang-1-image-edit-imgedit-ocx-2-image-annotation-imgedit-ocx-3-image-scan-img-7df22c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1575%3A%20The%20Kodak%2FWang%20(1)%20Image%20Edit%20(imgedit.ocx)%2C%20(2)%20Image%20Annotation%20(imgedit.ocx)%2C%20(3)%20Image%20Scan%20(img&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0910-microsoft-site-server-and-commercial-internet-system-mcis-do-not-set-an-expiration-for-a-cookie-w-7df22a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0910%3A%20Microsoft%20Site%20Server%20and%20Commercial%20Internet%20System%20(MCIS)%20do%20not%20set%20an%20expiration%20for%20a%20cookie%2C%20w&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0702-internet-explorer-5-0-and-5-01-allows-remote-attackers-to-modify-or-execute-files-via-the-import-exp-7df228</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0702%3A%20Internet%20Explorer%205.0%20and%205.01%20allows%20remote%20attackers%20to%20modify%20or%20execute%20files%20via%20the%20Import%2FExp&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1377-matt-wright-s-download-cgi-1-0-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-in-7df226</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1377%3A%20Matt%20Wright&apos;s%20download.cgi%201.0%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20in&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0697-sco-doctor-allows-local-users-to-gain-root-privileges-through-a-tools-option-7df224</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0697%3A%20SCO%20Doctor%20allows%20local%20users%20to%20gain%20root%20privileges%20through%20a%20Tools%20option.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0767-buffer-overflow-in-solaris-libc-ufsrestore-and-rcp-via-lc-messages-environmental-variable-7df222</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0767%3A%20Buffer%20overflow%20in%20Solaris%20libc%2C%20ufsrestore%2C%20and%20rcp%20via%20LC_MESSAGES%20environmental%20variable.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1353-nosque-msgcore-2-14-stores-passwords-in-cleartext-1-the-administrator-password-in-the-admpasswd-r-7df215</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1353%3A%20Nosque%20MsgCore%202.14%20stores%20passwords%20in%20cleartext%3A%20(1)%20the%20administrator%20password%20in%20the%20AdmPasswd%20r&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0489-freebsd-netbsd-and-openbsd-allow-an-attacker-to-cause-a-denial-of-service-by-creating-a-large-numb-7df213</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0489%3A%20FreeBSD%2C%20NetBSD%2C%20and%20OpenBSD%20allow%20an%20attacker%20to%20cause%20a%20denial%20of%20service%20by%20creating%20a%20large%20numb&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1562-gftp-ftp-client-1-13-and-other-versions-before-2-0-0-records-a-password-in-plaintext-in-1-the-lo-7df211</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1562%3A%20gFTP%20FTP%20client%201.13%2C%20and%20other%20versions%20before%202.0.0%2C%20records%20a%20password%20in%20plaintext%20in%20(1)%20the%20lo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0926-apache-allows-remote-attackers-to-conduct-a-denial-of-service-via-a-large-number-of-mime-headers-7df20f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0926%3A%20Apache%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service%20via%20a%20large%20number%20of%20MIME%20headers.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df20f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0925-unitymail-allows-remote-attackers-to-conduct-a-denial-of-service-via-a-large-number-of-mime-headers-7df20d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0925%3A%20UnityMail%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service%20via%20a%20large%20number%20of%20MIME%20headers.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df20d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1564-freebsd-3-2-and-possibly-other-versions-allows-a-local-user-to-cause-a-denial-of-service-panic-wit-7df20b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1564%3A%20FreeBSD%203.2%20and%20possibly%20other%20versions%20allows%20a%20local%20user%20to%20cause%20a%20denial%20of%20service%20(panic)%20wit&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df20b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1516-a-buffer-overflow-in-tenfour-tfs-gateway-smtp-mail-server-3-2-allows-an-attacker-to-crash-the-mail-s-7df209</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1516%3A%20A%20buffer%20overflow%20in%20TenFour%20TFS%20Gateway%20SMTP%20mail%20server%203.2%20allows%20an%20attacker%20to%20crash%20the%20mail%20s&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1356-compaq-integration-maintenance-utility-as-used-in-compaq-insight-manager-agent-before-smartstart-4-5-7df207</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1356%3A%20Compaq%20Integration%20Maintenance%20Utility%20as%20used%20in%20Compaq%20Insight%20Manager%20agent%20before%20SmartStart%204.5&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0685-buffer-overflow-in-netscape-communicator-via-embed-tags-in-the-pluginspage-option-7df205</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0685%3A%20Buffer%20overflow%20in%20Netscape%20Communicator%20via%20EMBED%20tags%20in%20the%20pluginspage%20option.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1129-cisco-catalyst-2900-virtual-lan-vlan-switches-allow-remote-attackers-to-inject-802-1q-frames-into-7df203</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1129%3A%20Cisco%20Catalyst%202900%20Virtual%20LAN%20(VLAN)%20switches%20allow%20remote%20attackers%20to%20inject%20802.1q%20frames%20into%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0891-the-download-behavior-in-internet-explorer-5-allows-remote-attackers-to-read-arbitrary-files-via-a-7df1f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0891%3A%20The%20%22download%20behavior%22%20in%20Internet%20Explorer%205%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0705-buffer-overflow-in-inn-inews-program-7df1f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0705%3A%20Buffer%20overflow%20in%20INN%20inews%20program.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0670-buffer-overflow-in-the-eyedog-activex-control-allows-a-remote-attacker-to-execute-arbitrary-commands-7df1f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0670%3A%20Buffer%20overflow%20in%20the%20Eyedog%20ActiveX%20control%20allows%20a%20remote%20attacker%20to%20execute%20arbitrary%20commands&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0669-the-eyedog-activex-control-is-marked-as-safe-for-scripting-for-internet-explorer-which-allows-a-r-7df1f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0669%3A%20The%20Eyedog%20ActiveX%20control%20is%20marked%20as%20%22safe%20for%20scripting%22%20for%20Internet%20Explorer%2C%20which%20allows%20a%20r&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1515-a-non-default-configuration-in-tenfour-tfs-gateway-4-0-allows-an-attacker-to-cause-a-denial-of-servi-7df1ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1515%3A%20A%20non-default%20configuration%20in%20TenFour%20TFS%20Gateway%204.0%20allows%20an%20attacker%20to%20cause%20a%20denial%20of%20servi&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0774-buffer-overflows-in-mars-netware-emulation-nwe-mars-nwe-package-via-long-directory-names-7df1ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0774%3A%20Buffer%20overflows%20in%20Mars%20NetWare%20Emulation%20(NWE%2C%20mars_nwe)%20package%20via%20long%20directory%20names.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1513-management-information-base-mib-for-a-3com-superstack-ii-hub-running-software-version-2-10-contain-7df1ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1513%3A%20Management%20information%20base%20(MIB)%20for%20a%203Com%20SuperStack%20II%20hub%20running%20software%20version%202.10%20contain&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1354-e-mail-client-in-softarc-firstclass-internet-server-5-506-and-earlier-stores-usernames-and-passwords-7df1e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1354%3A%20E-mail%20client%20in%20Softarc%20FirstClass%20Internet%20Server%205.506%20and%20earlier%20stores%20usernames%20and%20passwords&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1016-microsoft-html-control-as-used-in-1-internet-explorer-5-0-2-frontpage-express-3-outlook-expr-7df1e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1016%3A%20Microsoft%20HTML%20control%20as%20used%20in%20(1)%20Internet%20Explorer%205.0%2C%20(2)%20FrontPage%20Express%2C%20(3)%20Outlook%20Expr&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0911-buffer-overflow-in-proftpd-wu-ftpd-and-beroftpd-allows-remote-attackers-to-gain-root-access-via-a-7df1e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0911%3A%20Buffer%20overflow%20in%20ProFTPD%2C%20wu-ftpd%2C%20and%20beroftpd%20allows%20remote%20attackers%20to%20gain%20root%20access%20via%20a%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0939-denial-of-service-in-debian-irc-epic-epic4-client-via-a-long-string-7df1d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0939%3A%20Denial%20of%20service%20in%20Debian%20IRC%20Epic%2Fepic4%20client%20via%20a%20long%20string.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1235-internet-explorer-5-0-records-the-username-and-password-for-ftp-servers-in-the-url-history-which-co-7df1d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1235%3A%20Internet%20Explorer%205.0%20records%20the%20username%20and%20password%20for%20FTP%20servers%20in%20the%20URL%20history%2C%20which%20co&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0872-buffer-overflow-in-vixie-cron-allows-local-users-to-gain-root-access-via-a-long-mailto-environment-v-7df1d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0872%3A%20Buffer%20overflow%20in%20Vixie%20cron%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20MAILTO%20environment%20v&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0769-vixie-cron-on-linux-systems-allows-local-users-to-set-parameters-of-sendmail-commands-via-the-mailto-7df1d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0769%3A%20Vixie%20Cron%20on%20Linux%20systems%20allows%20local%20users%20to%20set%20parameters%20of%20sendmail%20commands%20via%20the%20MAILTO&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0768-buffer-overflow-in-vixie-cron-on-red-hat-systems-via-the-mailto-environmental-variable-7df1cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0768%3A%20Buffer%20overflow%20in%20Vixie%20Cron%20on%20Red%20Hat%20systems%20via%20the%20MAILTO%20environmental%20variable.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0328-windows-nt-4-0-generates-predictable-random-tcp-initial-sequence-numbers-isn-which-allows-remote-7df1cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0328%3A%20Windows%20NT%204.0%20generates%20predictable%20random%20TCP%20initial%20sequence%20numbers%20(ISN)%2C%20which%20allows%20remote%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1052-microsoft-frontpage-stores-form-results-in-a-default-location-in-private-form-results-txt-which-i-7df1cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1052%3A%20Microsoft%20FrontPage%20stores%20form%20results%20in%20a%20default%20location%20in%20%2F_private%2Fform_results.txt%2C%20which%20i&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0720-the-pt-chown-command-in-linux-allows-local-users-to-modify-tty-terminal-devices-that-belong-to-other-7df1c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0720%3A%20The%20pt_chown%20command%20in%20Linux%20allows%20local%20users%20to%20modify%20TTY%20terminal%20devices%20that%20belong%20to%20other&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0374-the-default-configuration-of-kdm-in-caldera-and-mandrake-linux-and-possibly-other-distributions-al-7df1c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0374%3A%20The%20default%20configuration%20of%20kdm%20in%20Caldera%20and%20Mandrake%20Linux%2C%20and%20possibly%20other%20distributions%2C%20al&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1064-multiple-buffer-overflows-in-windowmaker-0-52-through-0-60-0-allow-attackers-to-cause-a-denial-of-se-7df1c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1064%3A%20Multiple%20buffer%20overflows%20in%20WindowMaker%200.52%20through%200.60.0%20allow%20attackers%20to%20cause%20a%20denial%20of%20se&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0878-buffer-overflow-in-wu-ftpd-and-related-ftp-servers-allows-remote-attackers-to-gain-root-privileges-v-7df1b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0878%3A%20Buffer%20overflow%20in%20WU-FTPD%20and%20related%20FTP%20servers%20allows%20remote%20attackers%20to%20gain%20root%20privileges%20v&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0355-pg-and-pb-in-suse-pbpg-1-x-package-allows-an-attacker-to-read-arbitrary-files-7df1b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0355%3A%20pg%20and%20pb%20in%20SuSE%20pbpg%201.x%20package%20allows%20an%20attacker%20to%20read%20arbitrary%20files.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0668-the-scriptlet-typelib-activex-control-is-marked-as-safe-for-scripting-for-internet-explorer-which-7df1b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0668%3A%20The%20scriptlet.typelib%20ActiveX%20control%20is%20marked%20as%20%22safe%20for%20scripting%22%20for%20Internet%20Explorer%2C%20which&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-1206-vulnerability-in-apache-httpd-before-1-3-11-when-configured-for-mass-virtual-hosting-using-mod-rewr-7df1b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-1206%3A%20Vulnerability%20in%20Apache%20httpd%20before%201.3.11%2C%20when%20configured%20for%20mass%20virtual%20hosting%20using%20mod_rewr&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0325-the-microsoft-jet-database-engine-allows-an-attacker-to-execute-commands-via-a-database-query-aka-t-7df1b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0325%3A%20The%20Microsoft%20Jet%20database%20engine%20allows%20an%20attacker%20to%20execute%20commands%20via%20a%20database%20query%2C%20aka%20t&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1565-man2html-2-1-and-earlier-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-on-a-t-7df1ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1565%3A%20Man2html%202.1%20and%20earlier%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20a%20t&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1561-nullsoft-shoutcast-server-stores-the-administrative-password-in-plaintext-in-a-configuration-file-s-7df1ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1561%3A%20Nullsoft%20SHOUTcast%20server%20stores%20the%20administrative%20password%20in%20plaintext%20in%20a%20configuration%20file%20(s&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0743-trn-allows-local-users-to-overwrite-other-users-files-via-symlinks-7df1aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0743%3A%20Trn%20allows%20local%20users%20to%20overwrite%20other%20users&apos;%20files%20via%20symlinks.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df1aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0741-qms-crownnet-unix-utilities-for-2060-allows-root-to-log-on-without-a-password-7df1a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0741%3A%20QMS%20CrownNet%20Unix%20Utilities%20for%202060%20allows%20root%20to%20log%20on%20without%20a%20password.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df1a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0740-remote-attackers-can-cause-a-denial-of-service-on-linux-in-telnetd-telnet-daemon-through-a-malformed-7df1a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0740%3A%20Remote%20attackers%20can%20cause%20a%20denial%20of%20service%20on%20Linux%20in.telnetd%20telnet%20daemon%20through%20a%20malformed&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df1a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0734-a-default-configuration-of-ciscosecure-access-control-server-acs-allows-remote-users-to-modify-the-7df199</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0734%3A%20A%20default%20configuration%20of%20CiscoSecure%20Access%20Control%20Server%20(ACS)%20allows%20remote%20users%20to%20modify%20the&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0732-the-logging-facility-of-the-debian-smtp-refuser-package-allows-local-users-to-delete-arbitrary-files-7df197</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0732%3A%20The%20logging%20facility%20of%20the%20Debian%20smtp-refuser%20package%20allows%20local%20users%20to%20delete%20arbitrary%20files&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0725-when-iis-is-run-with-a-default-language-of-chinese-korean-or-japanese-it-allows-a-remote-attacker-7df195</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0725%3A%20When%20IIS%20is%20run%20with%20a%20default%20language%20of%20Chinese%2C%20Korean%2C%20or%20Japanese%2C%20it%20allows%20a%20remote%20attacker&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0745-buffer-overflow-in-source-code-browser-program-database-name-server-daemon-pdnsd-for-the-ibm-aix-c-7df191</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0745%3A%20Buffer%20overflow%20in%20Source%20Code%20Browser%20Program%20Database%20Name%20Server%20Daemon%20(pdnsd)%20for%20the%20IBM%20AIX%20C&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0753-the-w3-msql-cgi-script-provided-with-mini-sql-allows-remote-attackers-to-view-restricted-directories-7df18f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0753%3A%20The%20w3-msql%20CGI%20script%20provided%20with%20Mini%20SQL%20allows%20remote%20attackers%20to%20view%20restricted%20directories&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0888-dbsnmp-in-oracle-intelligent-agent-allows-local-users-to-gain-privileges-by-setting-the-oracle-home-7df18d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0888%3A%20dbsnmp%20in%20Oracle%20Intelligent%20Agent%20allows%20local%20users%20to%20gain%20privileges%20by%20setting%20the%20ORACLE_HOME%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0749-buffer-overflow-in-microsoft-telnet-client-in-windows-95-and-windows-98-via-a-malformed-telnet-argum-7df18b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0749%3A%20Buffer%20overflow%20in%20Microsoft%20Telnet%20client%20in%20Windows%2095%20and%20Windows%2098%20via%20a%20malformed%20Telnet%20argum&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0746-a-default-configuration-of-in-identd-in-suse-linux-waits-120-seconds-between-requests-allowing-a-re-7df189</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0746%3A%20A%20default%20configuration%20of%20in.identd%20in%20SuSE%20Linux%20waits%20120%20seconds%20between%20requests%2C%20allowing%20a%20re&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0679-buffer-overflow-in-hybrid-6-irc-server-commonly-used-on-efnet-allows-remote-attackers-to-execute-com-7df187</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0679%3A%20Buffer%20overflow%20in%20hybrid-6%20IRC%20server%20commonly%20used%20on%20EFnet%20allows%20remote%20attackers%20to%20execute%20com&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1336-3com-hiper-access-router-card-hiperarc-4-0-through-4-2-29-allows-remote-attackers-to-cause-a-denia-7df17a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1336%3A%203Com%20HiPer%20Access%20Router%20Card%20(HiperARC)%204.0%20through%204.2.29%20allows%20remote%20attackers%20to%20cause%20a%20denia&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df17a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0724-buffer-overflow-in-openbsd-procfs-and-fdescfs-file-systems-via-uio-offset-in-the-readdir-function-7df178</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0724%3A%20Buffer%20overflow%20in%20OpenBSD%20procfs%20and%20fdescfs%20file%20systems%20via%20uio_offset%20in%20the%20readdir()%20function.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0875-dhcp-clients-with-icmp-router-discovery-protocol-irdp-enabled-allow-remote-attackers-to-modify-the-7df176</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0875%3A%20DHCP%20clients%20with%20ICMP%20Router%20Discovery%20Protocol%20(IRDP)%20enabled%20allow%20remote%20attackers%20to%20modify%20the&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0867-denial-of-service-in-iis-4-0-via-a-flood-of-http-requests-with-malformed-headers-7df174</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0867%3A%20Denial%20of%20service%20in%20IIS%204.0%20via%20a%20flood%20of%20HTTP%20requests%20with%20malformed%20headers.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0861-race-condition-in-the-ssl-isapi-filter-in-iis-and-other-servers-may-leak-information-in-plaintext-7df172</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0861%3A%20Race%20condition%20in%20the%20SSL%20ISAPI%20filter%20in%20IIS%20and%20other%20servers%20may%20leak%20information%20in%20plaintext.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0814-red-hat-pump-dhcp-client-allows-remote-attackers-to-gain-root-access-in-some-configurations-7df170</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0814%3A%20Red%20Hat%20pump%20DHCP%20client%20allows%20remote%20attackers%20to%20gain%20root%20access%20in%20some%20configurations.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0694-denial-of-service-in-aix-ptrace-system-call-allows-local-users-to-crash-the-system-7df16e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0694%3A%20Denial%20of%20service%20in%20AIX%20ptrace%20system%20call%20allows%20local%20users%20to%20crash%20the%20system.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df16e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0813-cfingerd-with-allow-execution-enabled-does-not-properly-drop-privileges-when-it-executes-a-program-o-7df16c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0813%3A%20Cfingerd%20with%20ALLOW_EXECUTION%20enabled%20does%20not%20properly%20drop%20privileges%20when%20it%20executes%20a%20program%20o&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df16c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0680-windows-nt-terminal-server-performs-extra-work-when-a-client-opens-a-new-connection-but-before-it-is-7df16a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0680%3A%20Windows%20NT%20Terminal%20Server%20performs%20extra%20work%20when%20a%20client%20opens%20a%20new%20connection%20but%20before%20it%20is&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df16a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0676-sdtcm-convert-in-solaris-2-6-allows-a-local-user-to-overwrite-sensitive-files-via-a-symlink-attack-7df168</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0676%3A%20sdtcm_convert%20in%20Solaris%202.6%20allows%20a%20local%20user%20to%20overwrite%20sensitive%20files%20via%20a%20symlink%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0675-check-point-firewall-1-can-be-subjected-to-a-denial-of-service-via-udp-packets-that-are-sent-through-7df15b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0675%3A%20Check%20Point%20FireWall-1%20can%20be%20subjected%20to%20a%20denial%20of%20service%20via%20UDP%20packets%20that%20are%20sent%20through&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df15b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0674-the-bsd-profil-system-call-allows-a-local-user-to-modify-the-internal-data-space-of-a-program-via-pr-7df159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0674%3A%20The%20BSD%20profil%20system%20call%20allows%20a%20local%20user%20to%20modify%20the%20internal%20data%20space%20of%20a%20program%20via%20pr&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0722-the-default-configuration-of-cobalt-raq2-servers-allows-remote-users-to-install-arbitrary-software-p-7df157</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0722%3A%20The%20default%20configuration%20of%20Cobalt%20RaQ2%20servers%20allows%20remote%20users%20to%20install%20arbitrary%20software%20p&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0673-buffer-overflow-in-almail32-pop3-client-via-from-or-to-headers-7df155</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0673%3A%20Buffer%20overflow%20in%20ALMail32%20POP3%20client%20via%20From%3A%20or%20To%3A%20headers.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1524-flowpoint-dsl-router-firmware-versions-prior-to-3-0-8-allows-a-remote-attacker-to-exploit-a-password-7df153</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1524%3A%20FlowPoint%20DSL%20router%20firmware%20versions%20prior%20to%203.0.8%20allows%20a%20remote%20attacker%20to%20exploit%20a%20password&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0727-a-kernel-leak-in-the-openbsd-kernel-allows-ipsec-packets-to-be-sent-unencrypted-7df151</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0727%3A%20A%20kernel%20leak%20in%20the%20OpenBSD%20kernel%20allows%20IPsec%20packets%20to%20be%20sent%20unencrypted.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0682-microsoft-exchange-5-5-allows-a-remote-attacker-to-relay-email-i-e-spam-using-encapsulated-smtp-a-7df14f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0682%3A%20Microsoft%20Exchange%205.5%20allows%20a%20remote%20attacker%20to%20relay%20email%20(i.e.%20spam)%20using%20encapsulated%20SMTP%20a&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df14f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0913-dfire-cgi-script-in-dragon-fire-ids-allows-remote-users-to-execute-commands-via-shell-metacharacters-7df14d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0913%3A%20dfire.cgi%20script%20in%20Dragon-Fire%20IDS%20allows%20remote%20users%20to%20execute%20commands%20via%20shell%20metacharacters&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df14d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0719-the-guile-plugin-for-the-gnumeric-spreadsheet-package-allows-attackers-to-execute-arbitrary-code-7df14b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0719%3A%20The%20Guile%20plugin%20for%20the%20Gnumeric%20spreadsheet%20package%20allows%20attackers%20to%20execute%20arbitrary%20code.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df14b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0703-openbsd-bsdi-and-other-unix-operating-systems-allow-users-to-set-chflags-and-fchflags-on-character-7df149</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0703%3A%20OpenBSD%2C%20BSDI%2C%20and%20other%20Unix%20operating%20systems%20allow%20users%20to%20set%20chflags%20and%20fchflags%20on%20character&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0671-buffer-overflow-in-toxsoft-nextftp-client-through-cwd-command-7df13a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0671%3A%20Buffer%20overflow%20in%20ToxSoft%20NextFTP%20client%20through%20CWD%20command.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df13a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0677-the-webramp-web-administration-utility-has-a-default-password-7df13c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0677%3A%20The%20WebRamp%20web%20administration%20utility%20has%20a%20default%20password.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df13c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1337-ftp-client-in-midnight-commander-mc-before-4-5-11-stores-usernames-and-passwords-for-visited-sites-7df138</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1337%3A%20FTP%20client%20in%20Midnight%20Commander%20(mc)%20before%204.5.11%20stores%20usernames%20and%20passwords%20for%20visited%20sites&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0672-buffer-overflow-in-fujitsu-chocoa-irc-client-via-irc-channel-topics-7df136</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0672%3A%20Buffer%20overflow%20in%20Fujitsu%20Chocoa%20IRC%20client%20via%20IRC%20channel%20topics.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1536-sbstart-startup-script-in-acushop-salesbuilder-is-world-writable-which-allows-local-users-to-gain-7df134</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1536%3A%20.sbstart%20startup%20script%20in%20AcuShop%20Salesbuilder%20is%20world%20writable%2C%20which%20allows%20local%20users%20to%20gain%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1227-ethereal-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-on-the-packet-capture-7df132</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1227%3A%20Ethereal%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20the%20packet%20capture%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1130-default-configuration-of-the-search-engine-in-netscape-enterprise-server-3-5-1-and-possibly-other-v-7df130</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1130%3A%20Default%20configuration%20of%20the%20search%20engine%20in%20Netscape%20Enterprise%20Server%203.5.1%2C%20and%20possibly%20other%20v&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0683-denial-of-service-in-gauntlet-firewall-via-a-malformed-icmp-packet-7df12e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0683%3A%20Denial%20of%20service%20in%20Gauntlet%20Firewall%20via%20a%20malformed%20ICMP%20packet.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df12e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1078-ws-ftp-pro-6-0-uses-weak-encryption-for-passwords-in-its-initialization-files-which-allows-remote-a-7df12c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1078%3A%20WS_FTP%20Pro%206.0%20uses%20weak%20encryption%20for%20passwords%20in%20its%20initialization%20files%2C%20which%20allows%20remote%20a&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df12c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0770-firewall-1-sets-a-long-timeout-for-connections-that-begin-with-ack-or-other-packets-except-syn-allo-7df12a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0770%3A%20Firewall-1%20sets%20a%20long%20timeout%20for%20connections%20that%20begin%20with%20ACK%20or%20other%20packets%20except%20SYN%2C%20allo&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df12a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0700-buffer-overflow-in-microsoft-phone-dialer-dialer-exe-via-a-malformed-dialer-entry-in-the-dialer-i-7df11d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0700%3A%20Buffer%20overflow%20in%20Microsoft%20Phone%20Dialer%20(dialer.exe)%2C%20via%20a%20malformed%20dialer%20entry%20in%20the%20dialer.i&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df11d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0323-the-microsoft-jet-database-engine-allows-an-attacker-to-modify-text-files-via-a-database-query-aka-7df11b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0323%3A%20The%20Microsoft%20Jet%20database%20engine%20allows%20an%20attacker%20to%20modify%20text%20files%20via%20a%20database%20query%2C%20aka%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df11b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1017-seattle-labs-emurl-2-0-and-possibly-earlier-versions-stores-e-mail-attachments-in-a-specific-direc-7df119</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1017%3A%20Seattle%20Labs%20Emurl%202.0%2C%20and%20possibly%20earlier%20versions%2C%20stores%20e-mail%20attachments%20in%20a%20specific%20direc&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df119</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1018-ipchains-in-linux-kernels-2-2-10-and-earlier-does-not-reassemble-ip-fragments-before-checking-the-he-7df117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1018%3A%20IPChains%20in%20Linux%20kernels%202.2.10%20and%20earlier%20does%20not%20reassemble%20IP%20fragments%20before%20checking%20the%20he&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df117</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0710-the-squid-package-in-red-hat-linux-5-2-and-6-0-and-other-distributions-installs-cachemgr-cgi-in-a-7df115</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0710%3A%20The%20Squid%20package%20in%20Red%20Hat%20Linux%205.2%20and%206.0%2C%20and%20other%20distributions%2C%20installs%20cachemgr.cgi%20in%20a%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df115</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0224-denial-of-service-in-windows-nt-messenger-service-through-a-long-username-7df113</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0224%3A%20Denial%20of%20service%20in%20Windows%20NT%20messenger%20service%20through%20a%20long%20username.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df113</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1338-delegate-proxy-5-9-3-and-earlier-creates-files-and-directories-in-the-dgroot-with-world-writable-per-7df111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1338%3A%20Delegate%20proxy%205.9.3%20and%20earlier%20creates%20files%20and%20directories%20in%20the%20DGROOT%20with%20world-writable%20per&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df111</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1165-gnu-fingerd-1-37-does-not-properly-drop-privileges-before-accessing-user-information-which-could-al-7df10f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1165%3A%20GNU%20fingerd%201.37%20does%20not%20properly%20drop%20privileges%20before%20accessing%20user%20information%2C%20which%20could%20al&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df10f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0811-buffer-overflow-in-samba-smbd-program-via-a-malformed-message-command-7df10d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0811%3A%20Buffer%20overflow%20in%20Samba%20smbd%20program%20via%20a%20malformed%20message%20command.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df10d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0810-denial-of-service-in-samba-netbios-name-service-daemon-nmbd-7df10b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0810%3A%20Denial%20of%20service%20in%20Samba%20NETBIOS%20name%20service%20daemon%20(nmbd).&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df10b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1560-vulnerability-in-a-script-in-texas-a-m-university-tamu-tiger-allows-local-users-to-execute-arbitra-7df0fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1560%3A%20Vulnerability%20in%20a%20script%20in%20Texas%20A%26M%20University%20(TAMU)%20Tiger%20allows%20local%20users%20to%20execute%20arbitra&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1535-buffer-overflow-in-aspupload-dll-in-persits-software-aspupload-before-1-4-0-2-allows-remote-attacker-7df0fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1535%3A%20Buffer%20overflow%20in%20AspUpload.dll%20in%20Persits%20Software%20AspUpload%20before%201.4.0.2%20allows%20remote%20attacker&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0721-denial-of-service-in-windows-nt-local-security-authority-lsa-through-a-malformed-lsa-request-7df0fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0721%3A%20Denial%20of%20service%20in%20Windows%20NT%20Local%20Security%20Authority%20(LSA)%20through%20a%20malformed%20LSA%20request.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1378-dbmlparser-exe-cgi-guestbook-program-does-not-perform-a-chroot-operation-properly-which-allows-remo-7df0f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1378%3A%20dbmlparser.exe%20CGI%20guestbook%20program%20does%20not%20perform%20a%20chroot%20operation%20properly%2C%20which%20allows%20remo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1011-the-remote-data-service-rds-datafactory-component-of-microsoft-data-access-components-mdac-in-ii-7df0f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1011%3A%20The%20Remote%20Data%20Service%20(RDS)%20DataFactory%20component%20of%20Microsoft%20Data%20Access%20Components%20(MDAC)%20in%20II&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0692-the-default-configuration-of-the-array-services-daemon-arrayd-disables-authentication-allowing-re-7df0f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0692%3A%20The%20default%20configuration%20of%20the%20Array%20Services%20daemon%20(arrayd)%20disables%20authentication%2C%20allowing%20re&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1518-operating-systems-with-shared-memory-implementations-based-on-bsd-4-4-code-allow-a-user-to-conduct-a-7df0f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1518%3A%20Operating%20systems%20with%20shared%20memory%20implementations%20based%20on%20BSD%204.4%20code%20allow%20a%20user%20to%20conduct%20a&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1086-novell-5-and-earlier-when-running-over-ipx-with-a-packet-signature-level-less-than-3-allows-remote-7df0f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1086%3A%20Novell%205%20and%20earlier%2C%20when%20running%20over%20IPX%20with%20a%20packet%20signature%20level%20less%20than%203%2C%20allows%20remote&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1545-joe-s-own-editor-joe-2-8-sets-the-world-readable-permission-on-its-crash-save-file-deadjoe-which-7df0ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1545%3A%20Joe&apos;s%20Own%20Editor%20(joe)%202.8%20sets%20the%20world-readable%20permission%20on%20its%20crash-save%20file%2C%20DEADJOE%2C%20which&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df0ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1460-bmc-patrol-snmp-agent-before-3-2-07-allows-local-users-to-create-arbitrary-world-writeable-files-as-7df0ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1460%3A%20BMC%20PATROL%20SNMP%20Agent%20before%203.2.07%20allows%20local%20users%20to%20create%20arbitrary%20world-writeable%20files%20as%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1166-linux-2-0-37-does-not-properly-encode-the-custom-segment-limit-which-allows-local-users-to-gain-roo-7df0df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1166%3A%20Linux%202.0.37%20does%20not%20properly%20encode%20the%20Custom%20segment%20limit%2C%20which%20allows%20local%20users%20to%20gain%20roo&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1543-macos-uses-weak-encryption-for-passwords-that-are-stored-in-the-users-groups-data-file-7df0dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1543%3A%20MacOS%20uses%20weak%20encryption%20for%20passwords%20that%20are%20stored%20in%20the%20Users%20%26%20Groups%20Data%20File.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0809-netscape-communicator-4-x-with-javascript-enabled-does-not-warn-a-user-of-cookie-settings-even-if-t-7df0db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0809%3A%20Netscape%20Communicator%204.x%20with%20Javascript%20enabled%20does%20not%20warn%20a%20user%20of%20cookie%20settings%2C%20even%20if%20t&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1537-iis-3-x-and-4-x-does-not-distinguish-between-pages-requiring-encryption-and-those-that-do-not-which-7df0d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1537%3A%20IIS%203.x%20and%204.x%20does%20not%20distinguish%20between%20pages%20requiring%20encryption%20and%20those%20that%20do%20not%2C%20which&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1478-the-sun-hotspot-performance-engine-vm-allows-a-remote-attacker-to-cause-a-denial-of-service-on-any-s-7df0d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1478%3A%20The%20Sun%20HotSpot%20Performance%20Engine%20VM%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20on%20any%20s&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0752-denial-of-service-in-netscape-enterprise-server-via-a-buffer-overflow-in-the-ssl-handshake-7df0d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0752%3A%20Denial%20of%20service%20in%20Netscape%20Enterprise%20Server%20via%20a%20buffer%20overflow%20in%20the%20SSL%20handshake.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0728-a-windows-nt-user-can-disable-the-keyboard-or-mouse-by-directly-calling-the-ioctls-which-control-the-7df0d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0728%3A%20A%20Windows%20NT%20user%20can%20disable%20the%20keyboard%20or%20mouse%20by%20directly%20calling%20the%20IOCTLs%20which%20control%20the&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0918-denial-of-service-in-various-windows-systems-via-malformed-fragmented-igmp-packets-7df0d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0918%3A%20Denial%20of%20service%20in%20various%20Windows%20systems%20via%20malformed%2C%20fragmented%20IGMP%20packets.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1394-bsd-4-4-based-operating-systems-when-running-at-security-level-1-allow-the-root-user-to-clear-the-7df0cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1394%3A%20BSD%204.4%20based%20operating%20systems%2C%20when%20running%20at%20security%20level%201%2C%20allow%20the%20root%20user%20to%20clear%20the%20&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df0cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0889-cisco-675-routers-running-cbos-allow-remote-attackers-to-establish-telnet-sessions-if-an-exec-or-sup-7df0cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0889%3A%20Cisco%20675%20routers%20running%20CBOS%20allow%20remote%20attackers%20to%20establish%20telnet%20sessions%20if%20an%20exec%20or%20sup&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0707-the-default-ftp-configuration-in-hp-visualize-conference-allows-conference-users-to-send-a-file-to-o-7df0c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0707%3A%20The%20default%20FTP%20configuration%20in%20HP%20Visualize%20Conference%20allows%20conference%20users%20to%20send%20a%20file%20to%20o&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0696-buffer-overflow-in-cde-calendar-manager-service-daemon-rpc-cmsd-7df0be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0696%3A%20Buffer%20overflow%20in%20CDE%20Calendar%20Manager%20Service%20Daemon%20(rpc.cmsd).&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0690-hp-cde-program-includes-the-current-directory-in-root-s-path-variable-7df0bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0690%3A%20HP%20CDE%20program%20includes%20the%20current%20directory%20in%20root&apos;s%20PATH%20variable.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0688-buffer-overflows-in-hp-software-distributor-sd-for-hpux-10-x-and-11-x-7df0ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0688%3A%20Buffer%20overflows%20in%20HP%20Software%20Distributor%20(SD)%20for%20HPUX%2010.x%20and%2011.x.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1348-linuxconf-on-red-hat-linux-6-0-and-earlier-does-not-properly-disable-pam-based-access-to-the-shutdow-7df0b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1348%3A%20Linuxconf%20on%20Red%20Hat%20Linux%206.0%20and%20earlier%20does%20not%20properly%20disable%20PAM-based%20access%20to%20the%20shutdow&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df0b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0726-an-attacker-can-conduct-a-denial-of-service-in-windows-nt-by-executing-a-program-with-a-malformed-fi-7df0b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0726%3A%20An%20attacker%20can%20conduct%20a%20denial%20of%20service%20in%20Windows%20NT%20by%20executing%20a%20program%20with%20a%20malformed%20fi&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0140-denial-of-service-in-ras-pptp-on-nt-systems-7df0b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0140%3A%20Denial%20of%20service%20in%20RAS%2FPPTP%20on%20NT%20systems.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df0b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0916-webtrends-software-stores-account-names-and-passwords-in-a-file-which-does-not-have-restricted-acces-7df0b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0916%3A%20WebTrends%20software%20stores%20account%20names%20and%20passwords%20in%20a%20file%20which%20does%20not%20have%20restricted%20acces&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df0b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0353-pine-4-x-allows-a-remote-attacker-to-execute-arbitrary-commands-via-an-index-html-file-which-execute-7df0b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0353%3A%20Pine%204.x%20allows%20a%20remote%20attacker%20to%20execute%20arbitrary%20commands%20via%20an%20index.html%20file%20which%20execute&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1365-windows-nt-searches-a-user-s-home-directory-systemroot-by-default-before-other-directories-to-fi-7df0ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1365%3A%20Windows%20NT%20searches%20a%20user&apos;s%20home%20directory%20(%25systemroot%25%20by%20default)%20before%20other%20directories%20to%20fi&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0938-mbone-sdr-package-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-in-session-in-7df0a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0938%3A%20MBone%20SDR%20Package%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters%20in%20Session%20In&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df0a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0733-buffer-overflow-in-vmware-1-0-1-for-linux-via-a-long-home-environmental-variable-7df09f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0733%3A%20Buffer%20overflow%20in%20VMWare%201.0.1%20for%20Linux%20via%20a%20long%20HOME%20environmental%20variable.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df09f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1164-microsoft-outlook-client-allows-remote-attackers-to-cause-a-denial-of-service-by-sending-multiple-em-7df09d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1164%3A%20Microsoft%20Outlook%20client%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sending%20multiple%20em&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df09d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0778-buffer-overflow-in-xi-graphics-accelerated-x-server-allows-local-users-to-gain-root-access-via-a-lon-7df09b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0778%3A%20Buffer%20overflow%20in%20Xi%20Graphics%20Accelerated-X%20server%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20lon&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df09b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1470-eastman-work-management-3-21-stores-passwords-in-cleartext-in-the-common-and-locator-registry-keys-7df099</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1470%3A%20Eastman%20Work%20Management%203.21%20stores%20passwords%20in%20cleartext%20in%20the%20COMMON%20and%20LOCATOR%20registry%20keys%2C%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0748-buffer-overflows-in-red-hat-net-tools-package-7df097</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0748%3A%20Buffer%20overflows%20in%20Red%20Hat%20net-tools%20package.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1019-spectroserver-in-cabletron-spectrum-enterprise-manager-5-0-installs-a-directory-tree-with-insecure-p-7df095</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1019%3A%20SpectroSERVER%20in%20Cabletron%20Spectrum%20Enterprise%20Manager%205.0%20installs%20a%20directory%20tree%20with%20insecure%20p&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0731-the-kde-klock-program-allows-local-users-to-unlock-a-session-using-malformed-input-7df093</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0731%3A%20The%20KDE%20klock%20program%20allows%20local%20users%20to%20unlock%20a%20session%20using%20malformed%20input.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0723-the-windows-nt-client-server-runtime-subsystem-csrss-can-be-subjected-to-a-denial-of-service-when-7df091</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0723%3A%20The%20Windows%20NT%20Client%20Server%20Runtime%20Subsystem%20(CSRSS)%20can%20be%20subjected%20to%20a%20denial%20of%20service%20when%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df091</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0742-the-debian-mailman-package-uses-weak-authentication-which-allows-attackers-to-gain-privileges-7df08f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0742%3A%20The%20Debian%20mailman%20package%20uses%20weak%20authentication%2C%20which%20allows%20attackers%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df08f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0929-novell-netware-with-novell-http-server-or-yawn-web-servers-allows-remote-attackers-to-conduct-a-deni-7df082</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0929%3A%20Novell%20NetWare%20with%20Novell-HTTP-Server%20or%20YAWN%20web%20servers%20allows%20remote%20attackers%20to%20conduct%20a%20deni&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df082</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0874-buffer-overflow-in-iis-4-0-allows-remote-attackers-to-cause-a-denial-of-service-via-a-malformed-requ-7df080</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0874%3A%20Buffer%20overflow%20in%20IIS%204.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20requ&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df080</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0730-the-zsoelim-program-in-the-debian-man-db-package-allows-local-users-to-overwrite-files-via-a-symlink-7df07e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0730%3A%20The%20zsoelim%20program%20in%20the%20Debian%20man-db%20package%20allows%20local%20users%20to%20overwrite%20files%20via%20a%20symlink&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df07e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0713-the-dtlogin-program-in-compaq-tru64-unix-allows-local-users-to-gain-root-privileges-7df07c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0713%3A%20The%20dtlogin%20program%20in%20Compaq%20Tru64%20UNIX%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1023-useradd-in-solaris-7-0-does-not-properly-interpret-certain-date-formats-as-specified-in-the-e-ex-7df07a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1023%3A%20useradd%20in%20Solaris%207.0%20does%20not%20properly%20interpret%20certain%20date%20formats%20as%20specified%20in%20the%20%22-e%22%20(ex&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0775-cisco-gigabit-switch-routers-running-ios-allow-remote-attackers-to-forward-unauthorized-packets-due-7df078</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0775%3A%20Cisco%20Gigabit%20Switch%20routers%20running%20IOS%20allow%20remote%20attackers%20to%20forward%20unauthorized%20packets%20due%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0118-the-red-hat-linux-su-program-does-not-log-failed-password-guesses-if-the-su-process-is-killed-before-7df076</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0118%3A%20The%20Red%20Hat%20Linux%20su%20program%20does%20not%20log%20failed%20password%20guesses%20if%20the%20su%20process%20is%20killed%20before&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1231-ssh-2-0-12-and-possibly-other-versions-allows-valid-user-names-to-attempt-to-enter-the-correct-pas-7df074</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1231%3A%20ssh%202.0.12%2C%20and%20possibly%20other%20versions%2C%20allows%20valid%20user%20names%20to%20attempt%20to%20enter%20the%20correct%20pas&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1496-sudo-1-5-in-debian-linux-2-1-and-red-hat-6-0-allows-local-users-to-determine-the-existence-of-arbitr-7df072</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1496%3A%20Sudo%201.5%20in%20Debian%20Linux%202.1%20and%20Red%20Hat%206.0%20allows%20local%20users%20to%20determine%20the%20existence%20of%20arbitr&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0493-rpc-statd-allows-remote-attackers-to-forward-rpc-calls-to-the-local-operating-system-via-the-sm-mon-7df070</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0493%3A%20rpc.statd%20allows%20remote%20attackers%20to%20forward%20RPC%20calls%20to%20the%20local%20operating%20system%20via%20the%20SM_MON%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1237-multiple-buffer-overflows-in-smbvalid-smbval-smb-authentication-library-as-used-in-apache-authensm-7df063</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1237%3A%20Multiple%20buffer%20overflows%20in%20smbvalid%2Fsmbval%20SMB%20authentication%20library%2C%20as%20used%20in%20Apache%3A%3AAuthenSm&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0970-the-omnihttpd-visadmin-exe-program-allows-a-remote-attacker-to-conduct-a-denial-of-service-via-a-mal-7df061</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0970%3A%20The%20OmniHTTPD%20visadmin.exe%20program%20allows%20a%20remote%20attacker%20to%20conduct%20a%20denial%20of%20service%20via%20a%20mal&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df061</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1412-a-possible-interaction-between-apple-macos-x-release-1-0-and-apache-http-server-allows-remote-attack-7df05f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1412%3A%20A%20possible%20interaction%20between%20Apple%20MacOS%20X%20release%201.0%20and%20Apache%20HTTP%20server%20allows%20remote%20attack&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df05f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1400-the-economist-screen-saver-1999-with-the-password-protected-option-enabled-allows-users-with-physi-7df05d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1400%3A%20The%20Economist%20screen%20saver%201999%20with%20the%20%22Password%20Protected%22%20option%20enabled%20allows%20users%20with%20physi&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df05d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0481-buffer-overflow-in-kde-kmail-allows-a-remote-attacker-to-cause-a-denial-of-service-via-an-attachment-7df05b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0481%3A%20Buffer%20overflow%20in%20KDE%20Kmail%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20via%20an%20attachment&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df05b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0373-vulnerabilities-in-the-kde-kvt-terminal-program-allow-local-users-to-gain-root-privileges-7df059</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0373%3A%20Vulnerabilities%20in%20the%20KDE%20kvt%20terminal%20program%20allow%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df059</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0365-red-hat-linux-6-0-installs-the-dev-pts-file-system-with-insecure-modes-which-allows-local-users-to-7df057</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0365%3A%20Red%20Hat%20Linux%206.0%20installs%20the%20%2Fdev%2Fpts%20file%20system%20with%20insecure%20modes%2C%20which%20allows%20local%20users%20to&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df057</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0364-screen-and-rxvt-in-red-hat-linux-6-0-do-not-properly-set-the-modes-of-tty-devices-which-allows-loca-7df055</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0364%3A%20screen%20and%20rxvt%20in%20Red%20Hat%20Linux%206.0%20do%20not%20properly%20set%20the%20modes%20of%20tty%20devices%2C%20which%20allows%20loca&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df055</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1063-cdomain-whois-raw-cgi-whois-cgi-script-allows-remote-attackers-to-execute-arbitrary-commands-via-she-7df053</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1063%3A%20CDomain%20whois_raw.cgi%20whois%20CGI%20script%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20she&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df053</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0804-denial-of-service-in-linux-2-2-x-kernels-via-malformed-icmp-packets-containing-unusual-types-codes-7df051</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0804%3A%20Denial%20of%20service%20in%20Linux%202.2.x%20kernels%20via%20malformed%20ICMP%20packets%20containing%20unusual%20types%2C%20codes%2C&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df051</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0772-denial-of-service-in-compaq-management-agents-and-the-compaq-survey-utility-via-a-long-string-sent-t-7df044</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0772%3A%20Denial%20of%20service%20in%20Compaq%20Management%20Agents%20and%20the%20Compaq%20Survey%20Utility%20via%20a%20long%20string%20sent%20t&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df044</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0333-tcpdump-ethereal-and-other-sniffer-packages-allow-remote-attackers-to-cause-a-denial-of-service-vi-7df042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0333%3A%20tcpdump%2C%20Ethereal%2C%20and%20other%20sniffer%20packages%20allow%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20vi&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df042</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1485-nsd-in-irix-6-5-through-6-5-2-exports-a-virtual-filesystem-on-a-udp-port-which-allows-remote-attack-7df040</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1485%3A%20nsd%20in%20IRIX%206.5%20through%206.5.2%20exports%20a%20virtual%20filesystem%20on%20a%20UDP%20port%2C%20which%20allows%20remote%20attack&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df040</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1028-symantec-pcanywhere-8-0-allows-remote-attackers-to-cause-a-denial-of-service-cpu-utilization-via-a-7df03e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1028%3A%20Symantec%20pcAnywhere%208.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(CPU%20utilization)%20via%20a&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df03e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0917-the-preloader-activex-control-used-by-internet-explorer-allows-remote-attackers-to-read-arbitrary-fi-7df03c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0917%3A%20The%20Preloader%20ActiveX%20control%20used%20by%20Internet%20Explorer%20allows%20remote%20attackers%20to%20read%20arbitrary%20fi&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df03c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0802-buffer-overflow-in-internet-explorer-5-allows-remote-attackers-to-execute-commands-via-a-malformed-f-7df03a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0802%3A%20Buffer%20overflow%20in%20Internet%20Explorer%205%20allows%20remote%20attackers%20to%20execute%20commands%20via%20a%20malformed%20F&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df03a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0755-windows-nt-rras-and-ras-clients-cache-a-user-s-password-even-if-the-user-has-not-selected-the-save-7df038</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0755%3A%20Windows%20NT%20RRAS%20and%20RAS%20clients%20cache%20a%20user&apos;s%20password%20even%20if%20the%20user%20has%20not%20selected%20the%20%22Save%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df038</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0927-ntmail-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7df036</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0927%3A%20NTMail%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0920-buffer-overflow-in-the-pop-2d-pop-daemon-in-the-imap-package-allows-remote-attackers-to-gain-privile-7df034</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0920%3A%20Buffer%20overflow%20in%20the%20pop-2d%20POP%20daemon%20in%20the%20IMAP%20package%20allows%20remote%20attackers%20to%20gain%20privile&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0771-the-web-components-of-compaq-management-agents-and-the-compaq-survey-utility-allow-a-remote-attacker-7df032</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0771%3A%20The%20web%20components%20of%20Compaq%20Management%20Agents%20and%20the%20Compaq%20Survey%20Utility%20allow%20a%20remote%20attacker&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1414-ibm-netfinity-remote-control-allows-local-users-to-gain-administrator-privileges-by-starting-program-7df025</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1414%3A%20IBM%20Netfinity%20Remote%20Control%20allows%20local%20users%20to%20gain%20administrator%20privileges%20by%20starting%20program&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0803-the-fwluser-script-in-aix-enetwork-firewall-allows-local-users-to-write-to-arbitrary-files-via-a-sym-7df023</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0803%3A%20The%20fwluser%20script%20in%20AIX%20eNetwork%20Firewall%20allows%20local%20users%20to%20write%20to%20arbitrary%20files%20via%20a%20sym&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0762-when-javascript-is-embedded-within-the-title-tag-netscape-communicator-allows-a-remote-attacker-to-7df021</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0762%3A%20When%20Javascript%20is%20embedded%20within%20the%20TITLE%20tag%2C%20Netscape%20Communicator%20allows%20a%20remote%20attacker%20to%20&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0928-buffer-overflow-in-smartdesk-websuite-allows-remote-attackers-to-cause-a-denial-of-service-via-a-lon-7df01f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0928%3A%20Buffer%20overflow%20in%20SmartDesk%20WebSuite%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20lon&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1393-control-panel-password-security-option-for-apple-powerbooks-allows-attackers-with-physical-access-7df01d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1393%3A%20Control%20Panel%20%22Password%20Security%22%20option%20for%20Apple%20Powerbooks%20allows%20attackers%20with%20physical%20access%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df01d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0715-buffer-overflow-in-remote-access-service-ras-client-allows-an-attacker-to-execute-commands-or-caus-7df01b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0715%3A%20Buffer%20overflow%20in%20Remote%20Access%20Service%20(RAS)%20client%20allows%20an%20attacker%20to%20execute%20commands%20or%20caus&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1031-counter-exe-2-70-allows-a-remote-attacker-to-cause-a-denial-of-service-hang-via-a-long-argument-7df019</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1031%3A%20counter.exe%202.70%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20(hang)%20via%20a%20long%20argument.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1030-counter-exe-2-70-allows-a-remote-attacker-to-cause-a-denial-of-service-hang-via-an-http-request-th-7df017</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1030%3A%20counter.exe%202.70%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20(hang)%20via%20an%20HTTP%20request%20th&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0765-sgi-irix-midikeys-program-allows-local-users-to-modify-arbitrary-files-via-a-text-editor-7df015</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0765%3A%20SGI%20IRIX%20midikeys%20program%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20a%20text%20editor.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1510-buffer-overflows-in-bisonware-ftp-server-prior-to-4-1-allow-remote-attackers-to-cause-a-denial-of-se-7df013</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1510%3A%20Buffer%20overflows%20in%20Bisonware%20FTP%20server%20prior%20to%204.1%20allow%20remote%20attackers%20to%20cause%20a%20denial%20of%20se&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1156-bisonware-ftp-server-4-1-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-via-a-malf-7df006</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1156%3A%20BisonWare%20FTP%20Server%204.1%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20malf&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0716-buffer-overflow-in-windows-nt-4-0-help-file-utility-via-a-malformed-help-file-7df004</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0716%3A%20Buffer%20overflow%20in%20Windows%20NT%204.0%20help%20file%20utility%20via%20a%20malformed%20help%20file.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7df004</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0489-mshtml-dll-in-internet-explorer-5-0-allows-a-remote-attacker-to-paste-a-file-name-into-the-file-uplo-7df002</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0489%3A%20MSHTML.DLL%20in%20Internet%20Explorer%205.0%20allows%20a%20remote%20attacker%20to%20paste%20a%20file%20name%20into%20the%20file%20uplo&amp;severity=high&amp;id=682ca32cb6fd31d6ed7df002</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1366-pegasus-e-mail-client-3-0-and-earlier-uses-weak-encryption-to-store-pop3-passwords-in-the-pmail-ini-7df000</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1366%3A%20Pegasus%20e-mail%20client%203.0%20and%20earlier%20uses%20weak%20encryption%20to%20store%20POP3%20passwords%20in%20the%20pmail.ini%20&amp;severity=low&amp;id=682ca32cb6fd31d6ed7df000</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1029-ssh-server-sshd2-before-2-0-12-does-not-properly-record-login-attempts-if-the-connection-is-closed-7deffe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1029%3A%20SSH%20server%20(sshd2)%20before%202.0.12%20does%20not%20properly%20record%20login%20attempts%20if%20the%20connection%20is%20closed&amp;severity=high&amp;id=682ca32cb6fd31d6ed7deffe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1368-av-option-for-ms-exchange-server-option-for-inoculateit-4-53-and-possibly-other-versions-only-scan-7deffc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1368%3A%20AV%20Option%20for%20MS%20Exchange%20Server%20option%20for%20InoculateIT%204.53%2C%20and%20possibly%20other%20versions%2C%20only%20scan&amp;severity=high&amp;id=682ca32cb6fd31d6ed7deffc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0776-alibaba-http-server-allows-remote-attackers-to-read-files-via-a-dot-dot-attack-7deffa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0776%3A%20Alibaba%20HTTP%20server%20allows%20remote%20attackers%20to%20read%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7deffa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0229-denial-of-service-in-windows-nt-iis-server-using-7deff8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0229%3A%20Denial%20of%20service%20in%20Windows%20NT%20IIS%20server%20using%20..%5C..&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7deff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1520-a-configuration-problem-in-the-ad-server-sample-directory-adsamples-in-microsoft-site-server-3-0-a-7deff6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1520%3A%20A%20configuration%20problem%20in%20the%20Ad%20Server%20Sample%20directory%20(AdSamples)%20in%20Microsoft%20Site%20Server%203.0%20a&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7deff6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1033-microsoft-outlook-express-before-4-72-3612-1700-allows-a-malicious-user-to-send-a-message-that-conta-7deff4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1033%3A%20Microsoft%20Outlook%20Express%20before%204.72.3612.1700%20allows%20a%20malicious%20user%20to%20send%20a%20message%20that%20conta&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7deff4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0785-the-inn-inndstart-program-allows-local-users-to-gain-root-privileges-via-the-pathrun-parameter-in-7defe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0785%3A%20The%20INN%20inndstart%20program%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20the%20%22pathrun%22%20parameter%20in%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defe7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0773-buffer-overflow-in-solaris-lpset-program-allows-local-users-to-gain-root-access-7defe5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0773%3A%20Buffer%20overflow%20in%20Solaris%20lpset%20program%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0754-the-inn-inndstart-program-allows-local-users-to-gain-privileges-by-specifying-an-alternate-configura-7defe3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0754%3A%20The%20INN%20inndstart%20program%20allows%20local%20users%20to%20gain%20privileges%20by%20specifying%20an%20alternate%20configura&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0806-buffer-overflow-in-solaris-dtprintinfo-program-7defe1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0806%3A%20Buffer%20overflow%20in%20Solaris%20dtprintinfo%20program.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1566-buffer-overflow-in-iparty-server-1-2-and-earlier-allows-remote-attackers-to-cause-a-denial-of-servic-7defdf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1566%3A%20Buffer%20overflow%20in%20iParty%20server%201.2%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20servic&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0739-the-codebrws-asp-sample-file-in-iis-and-site-server-allows-remote-attackers-to-read-arbitrary-files-7defdd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0739%3A%20The%20codebrws.asp%20sample%20file%20in%20IIS%20and%20Site%20Server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0738-the-code-asp-sample-file-in-iis-and-site-server-allows-remote-attackers-to-read-arbitrary-files-7defdb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0738%3A%20The%20code.asp%20sample%20file%20in%20IIS%20and%20Site%20Server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0737-the-viewcode-asp-sample-file-in-iis-and-site-server-allows-remote-attackers-to-read-arbitrary-files-7defd9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0737%3A%20The%20viewcode.asp%20sample%20file%20in%20IIS%20and%20Site%20Server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0736-the-showcode-asp-sample-file-in-iis-and-site-server-allows-remote-attackers-to-read-arbitrary-files-7defd7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0736%3A%20The%20showcode.asp%20sample%20file%20in%20IIS%20and%20Site%20Server%20allows%20remote%20attackers%20to%20read%20arbitrary%20files.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0717-a-remote-attacker-can-disable-the-virus-warning-mechanism-in-microsoft-excel-97-7defd5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0717%3A%20A%20remote%20attacker%20can%20disable%20the%20virus%20warning%20mechanism%20in%20Microsoft%20Excel%2097.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7defd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0686-denial-of-service-in-netscape-enterprise-server-nes-in-hp-virtual-vault-vvos-via-a-long-url-7defc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0686%3A%20Denial%20of%20service%20in%20Netscape%20Enterprise%20Server%20(NES)%20in%20HP%20Virtual%20Vault%20(VVOS)%20via%20a%20long%20URL.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1367-internet-explorer-5-0-does-not-properly-reset-the-username-password-cache-for-web-sites-that-do-not-7defc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1367%3A%20Internet%20Explorer%205.0%20does%20not%20properly%20reset%20the%20username%2Fpassword%20cache%20for%20Web%20sites%20that%20do%20not%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1241-internet-explorer-with-a-security-setting-below-medium-allows-remote-attackers-to-execute-arbitrar-7defc4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1241%3A%20Internet%20Explorer%2C%20with%20a%20security%20setting%20below%20Medium%2C%20allows%20remote%20attackers%20to%20execute%20arbitrar&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1079-vulnerability-in-ptrace-in-aix-4-3-allows-local-users-to-gain-privileges-by-attaching-to-a-setgid-pr-7defc2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1079%3A%20Vulnerability%20in%20ptrace%20in%20AIX%204.3%20allows%20local%20users%20to%20gain%20privileges%20by%20attaching%20to%20a%20setgid%20pr&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1195-nai-virusscan-nt-4-0-2-does-not-properly-modify-the-scan-dat-virus-definition-file-during-an-update-7defc0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1195%3A%20NAI%20VirusScan%20NT%204.0.2%20does%20not%20properly%20modify%20the%20scan.dat%20virus%20definition%20file%20during%20an%20update%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1097-microsoft-netmeeting-2-1-allows-one-client-to-read-the-contents-of-another-client-s-clipboard-via-a-7defbe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1097%3A%20Microsoft%20NetMeeting%202.1%20allows%20one%20client%20to%20read%20the%20contents%20of%20another%20client&apos;s%20clipboard%20via%20a%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1012-smtp-component-of-lotus-domino-4-6-1-on-as-400-and-possibly-other-operating-systems-allows-a-remot-7defbc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1012%3A%20SMTP%20component%20of%20Lotus%20Domino%204.6.1%20on%20AS%2F400%2C%20and%20possibly%20other%20operating%20systems%2C%20allows%20a%20remot&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defbc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0412-the-gnapster-and-knapster-clients-for-napster-do-not-properly-restrict-access-only-to-mp3-files-whi-7defba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0412%3A%20The%20gnapster%20and%20knapster%20clients%20for%20Napster%20do%20not%20properly%20restrict%20access%20only%20to%20MP3%20files%2C%20whi&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1553-buffer-overflow-in-xcmail-0-99-6-with-autoquote-enabled-allows-remote-attackers-to-execute-arbitrary-7defb8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1553%3A%20Buffer%20overflow%20in%20XCmail%200.99.6%20with%20autoquote%20enabled%20allows%20remote%20attackers%20to%20execute%20arbitrary&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defb8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1418-icq99-icq-web-server-build-1701-with-active-homepage-enabled-generates-allows-remote-attackers-to-7defb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1418%3A%20ICQ99%20ICQ%20web%20server%20build%201701%20with%20%22Active%20Homepage%22%20enabled%20generates%20allows%20remote%20attackers%20to%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0807-the-netscape-directory-server-installation-procedure-leaves-sensitive-information-in-a-file-that-is-7defa9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0807%3A%20The%20Netscape%20Directory%20Server%20installation%20procedure%20leaves%20sensitive%20information%20in%20a%20file%20that%20is%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7defa9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0764-netbsd-allows-arp-packets-to-overwrite-static-arp-entries-7defa7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0764%3A%20NetBSD%20allows%20ARP%20packets%20to%20overwrite%20static%20ARP%20entries.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defa7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0763-netbsd-on-a-multi-homed-host-allows-arp-packets-on-one-network-to-modify-arp-entries-on-another-conn-7defa5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0763%3A%20NetBSD%20on%20a%20multi-homed%20host%20allows%20ARP%20packets%20on%20one%20network%20to%20modify%20ARP%20entries%20on%20another%20conn&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defa5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0487-the-dhtml-edit-activex-control-in-internet-explorer-allows-remote-attackers-to-read-arbitrary-files-7defa3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0487%3A%20The%20DHTML%20Edit%20ActiveX%20control%20in%20Internet%20Explorer%20allows%20remote%20attackers%20to%20read%20arbitrary%20files.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7defa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0194-denial-of-service-in-in-comsat-allows-attackers-to-generate-messages-7defa1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0194%3A%20Denial%20of%20service%20in%20in.comsat%20allows%20attackers%20to%20generate%20messages.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7defa1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0711-the-oratclsh-interpreter-in-oracle-8-x-intelligent-agent-for-unix-allows-local-users-to-execute-tcl-7def9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0711%3A%20The%20oratclsh%20interpreter%20in%20Oracle%208.x%20Intelligent%20Agent%20for%20Unix%20allows%20local%20users%20to%20execute%20Tcl%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0712-a-vulnerability-in-caldera-open-administration-system-coas-allows-the-etc-shadow-password-file-to-7def9d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0712%3A%20A%20vulnerability%20in%20Caldera%20Open%20Administration%20System%20(COAS)%20allows%20the%20%2Fetc%2Fshadow%20password%20file%20to&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0492-the-ffingerd-1-19-allows-remote-attackers-to-identify-users-on-the-target-system-based-on-its-respon-7def9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0492%3A%20The%20ffingerd%201.19%20allows%20remote%20attackers%20to%20identify%20users%20on%20the%20target%20system%20based%20on%20its%20respon&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0490-mshtml-dll-in-internet-explorer-5-0-allows-a-remote-attacker-to-learn-information-about-a-local-user-7def99</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0490%3A%20MSHTML.DLL%20in%20Internet%20Explorer%205.0%20allows%20a%20remote%20attacker%20to%20learn%20information%20about%20a%20local%20user&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0488-internet-explorer-4-0-and-5-0-allows-a-remote-attacker-to-execute-security-scripts-in-a-different-se-7def97</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0488%3A%20Internet%20Explorer%204.0%20and%205.0%20allows%20a%20remote%20attacker%20to%20execute%20security%20scripts%20in%20a%20different%20se&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0466-the-svr4-dev-wabi-special-device-file-in-netbsd-1-3-3-and-earlier-allows-a-local-user-to-read-or-wr-7def8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0466%3A%20The%20SVR4%20%2Fdev%2Fwabi%20special%20device%20file%20in%20NetBSD%201.3.3%20and%20earlier%20allows%20a%20local%20user%20to%20read%20or%20wr&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0607-quikstore-cgi-in-quikstore-shopping-cart-stores-quikstore-cfg-under-the-web-document-root-with-insuf-7def88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0607%3A%20quikstore.cgi%20in%20QuikStore%20shopping%20cart%20stores%20quikstore.cfg%20under%20the%20web%20document%20root%20with%20insuf&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0604-an-incorrect-configuration-of-the-webstore-1-0-shopping-cart-cgi-program-web-store-cgi-could-discl-7def86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0604%3A%20An%20incorrect%20configuration%20of%20the%20WebStore%201.0%20shopping%20cart%20CGI%20program%20%22web_store.cgi%22%20could%20discl&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0491-the-prompt-parsing-in-bash-allows-a-local-user-to-execute-commands-as-another-user-by-creating-a-dir-7def84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0491%3A%20The%20prompt%20parsing%20in%20bash%20allows%20a%20local%20user%20to%20execute%20commands%20as%20another%20user%20by%20creating%20a%20dir&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0684-denial-of-service-in-sendmail-8-8-6-in-hpux-7def82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0684%3A%20Denial%20of%20service%20in%20Sendmail%208.8.6%20in%20HPUX.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1244-ipfilter-3-2-3-through-3-2-10-allows-local-users-to-modify-arbitrary-files-via-a-symlink-attack-on-t-7def80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1244%3A%20IPFilter%203.2.3%20through%203.2.10%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20t&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1369-real-media-realserver-rmserver-6-0-3-353-stores-a-password-in-plaintext-in-the-world-readable-rmse-7def7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1369%3A%20Real%20Media%20RealServer%20(rmserver)%206.0.3.353%20stores%20a%20password%20in%20plaintext%20in%20the%20world-readable%20rmse&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0446-local-users-can-perform-a-denial-of-service-in-netbsd-1-3-3-and-earlier-versions-by-creating-an-unus-7def7c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0446%3A%20Local%20users%20can%20perform%20a%20denial%20of%20service%20in%20NetBSD%201.3.3%20and%20earlier%20versions%20by%20creating%20an%20unus&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0444-remote-attackers-can-perform-a-denial-of-service-in-windows-machines-using-malicious-arp-packets-fo-7def7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0444%3A%20Remote%20attackers%20can%20perform%20a%20denial%20of%20service%20in%20Windows%20machines%20using%20malicious%20ARP%20packets%2C%20fo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1323-norton-antivirus-for-internet-email-gateways-navieg-1-0-1-7-and-earlier-and-norton-antivirus-for-7def78</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1323%3A%20Norton%20AntiVirus%20for%20Internet%20Email%20Gateways%20(NAVIEG)%201.0.1.7%20and%20earlier%2C%20and%20Norton%20AntiVirus%20for%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0801-bmc-patrol-allows-remote-attackers-to-gain-access-to-an-agent-by-spoofing-frames-7def6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0801%3A%20BMC%20Patrol%20allows%20remote%20attackers%20to%20gain%20access%20to%20an%20agent%20by%20spoofing%20frames.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0471-the-remote-proxy-server-in-winroute-allows-a-remote-attacker-to-reconfigure-the-proxy-without-authen-7def69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0471%3A%20The%20remote%20proxy%20server%20in%20Winroute%20allows%20a%20remote%20attacker%20to%20reconfigure%20the%20proxy%20without%20authen&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0470-a-weak-encryption-algorithm-is-used-for-passwords-in-novell-remote-nlm-allowing-them-to-be-easily-d-7def67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0470%3A%20A%20weak%20encryption%20algorithm%20is%20used%20for%20passwords%20in%20Novell%20Remote.NLM%2C%20allowing%20them%20to%20be%20easily%20d&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0468-internet-explorer-5-0-allows-a-remote-server-to-read-arbitrary-files-on-the-client-s-file-system-usi-7def65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0468%3A%20Internet%20Explorer%205.0%20allows%20a%20remote%20server%20to%20read%20arbitrary%20files%20on%20the%20client&apos;s%20file%20system%20usi&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0287-vulnerability-in-the-wguest-cgi-program-7def63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0287%3A%20Vulnerability%20in%20the%20Wguest%20CGI%20program.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1196-hummingbird-exceed-x-version-5-allows-remote-attackers-to-cause-a-denial-of-service-via-malformed-da-7def61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1196%3A%20Hummingbird%20Exceed%20X%20version%205%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20malformed%20da&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0473-the-rsync-command-before-rsync-2-3-1-may-inadvertently-change-the-permissions-of-the-client-s-workin-7def5f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0473%3A%20The%20rsync%20command%20before%20rsync%202.3.1%20may%20inadvertently%20change%20the%20permissions%20of%20the%20client&apos;s%20workin&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def5f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0472-the-snmp-default-community-name-public-is-not-properly-removed-in-netapps-c630-netcache-even-if-t-7def5d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0472%3A%20The%20SNMP%20default%20community%20name%20%22public%22%20is%20not%20properly%20removed%20in%20NetApps%20C630%20Netcache%2C%20even%20if%20t&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1245-vacm-ucd-snmp-snmp-server-version-3-52-does-not-properly-disable-access-to-the-public-community-st-7def5b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1245%3A%20vacm%20ucd-snmp%20SNMP%20server%2C%20version%203.52%2C%20does%20not%20properly%20disable%20access%20to%20the%20public%20community%20st&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0475-a-race-condition-in-how-procmail-handles-procmailrc-files-allows-a-local-user-to-read-arbitrary-fil-7def59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0475%3A%20A%20race%20condition%20in%20how%20procmail%20handles%20.procmailrc%20files%20allows%20a%20local%20user%20to%20read%20arbitrary%20fil&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0474-the-icq-webserver-allows-remote-attackers-to-use-to-access-arbitrary-files-outside-of-the-user-s-7def4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0474%3A%20The%20ICQ%20Webserver%20allows%20remote%20attackers%20to%20use%20..%20to%20access%20arbitrary%20files%20outside%20of%20the%20user&apos;s%20&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0439-buffer-overflow-in-procmail-before-version-3-12-allows-remote-or-local-attackers-to-execute-commands-7def4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0439%3A%20Buffer%20overflow%20in%20procmail%20before%20version%203.12%20allows%20remote%20or%20local%20attackers%20to%20execute%20commands&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0921-bmc-patrol-allows-any-remote-attacker-to-flood-its-udp-port-causing-a-denial-of-service-7def48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0921%3A%20BMC%20Patrol%20allows%20any%20remote%20attacker%20to%20flood%20its%20UDP%20port%2C%20causing%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0610-an-incorrect-configuration-of-the-webcart-cgi-program-could-disclose-private-information-7def46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0610%3A%20An%20incorrect%20configuration%20of%20the%20Webcart%20CGI%20program%20could%20disclose%20private%20information.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0609-an-incorrect-configuration-of-the-softcart-cgi-program-softcart-exe-could-disclose-private-informa-7def44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0609%3A%20An%20incorrect%20configuration%20of%20the%20SoftCart%20CGI%20program%20%22SoftCart.exe%22%20could%20disclose%20private%20informa&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0608-an-incorrect-configuration-of-the-pdg-shopping-cart-cgi-program-shopper-cgi-could-disclose-private-7def42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0608%3A%20An%20incorrect%20configuration%20of%20the%20PDG%20Shopping%20Cart%20CGI%20program%20%22shopper.cgi%22%20could%20disclose%20private&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0606-an-incorrect-configuration-of-the-ezmall-2000-shopping-cart-cgi-program-mall2000-cgi-could-disclo-7def40</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0606%3A%20An%20incorrect%20configuration%20of%20the%20EZMall%202000%20shopping%20cart%20%20CGI%20program%20%22mall2000.cgi%22%20could%20disclo&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0605-an-incorrect-configuration-of-the-order-form-1-0-shopping-cart-cgi-program-could-disclose-private-i-7def3e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0605%3A%20An%20incorrect%20configuration%20of%20the%20Order%20Form%201.0%20shopping%20cart%20%20CGI%20program%20could%20disclose%20private%20i&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0480-local-attackers-can-conduct-a-denial-of-service-in-midnight-commander-4-x-with-a-symlink-attack-7def3c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0480%3A%20Local%20attackers%20can%20conduct%20a%20denial%20of%20service%20in%20Midnight%20Commander%204.x%20with%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0469-internet-explorer-5-0-allows-window-spoofing-allowing-a-remote-attacker-to-spoof-a-legitimate-web-s-7def3a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0469%3A%20Internet%20Explorer%205.0%20allows%20window%20spoofing%2C%20allowing%20a%20remote%20attacker%20to%20spoof%20a%20legitimate%20web%20s&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0467-the-webcom-cgi-guestbook-programs-wguest-exe-and-rguest-exe-allow-a-remote-attacker-to-read-arbitrar-7def2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0467%3A%20The%20Webcom%20CGI%20Guestbook%20programs%20wguest.exe%20and%20rguest.exe%20allow%20a%20remote%20attacker%20to%20read%20arbitrar&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0447-local-users-can-gain-privileges-using-the-debug-utility-in-the-mpe-ix-operating-system-7def2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0447%3A%20Local%20users%20can%20gain%20privileges%20using%20the%20debug%20utility%20in%20the%20MPE%2FiX%20operating%20system.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0445-in-cisco-routers-under-some-versions-of-ios-12-0-running-nat-some-packets-may-not-be-filtered-by-in-7def29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0445%3A%20In%20Cisco%20routers%20under%20some%20versions%20of%20IOS%2012.0%20running%20NAT%2C%20some%20packets%20may%20not%20be%20filtered%20by%20in&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0443-patrol-management-software-allows-a-remote-attacker-to-conduct-a-replay-attack-to-steal-the-administ-7def27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0443%3A%20Patrol%20management%20software%20allows%20a%20remote%20attacker%20to%20conduct%20a%20replay%20attack%20to%20steal%20the%20administ&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1559-xylan-omniswitch-before-3-2-6-allows-remote-attackers-to-bypass-the-login-prompt-via-a-ctrl-d-contr-7def25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1559%3A%20Xylan%20OmniSwitch%20before%203.2.6%20allows%20remote%20attackers%20to%20bypass%20the%20login%20prompt%20via%20a%20CTRL-D%20(contr&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0434-xfree86-xfs-command-is-vulnerable-to-a-symlink-attack-allowing-local-users-to-create-files-in-restr-7def23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0434%3A%20XFree86%20xfs%20command%20is%20vulnerable%20to%20a%20symlink%20attack%2C%20allowing%20local%20users%20to%20create%20files%20in%20restr&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0153-frontpage-personal-web-server-pws-allows-remote-attackers-to-read-files-via-a-dot-dot-attac-7def21</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0153%3A%20FrontPage%20Personal%20Web%20Server%20(PWS)%20allows%20remote%20attackers%20to%20read%20files%20via%20a%20....%20(dot%20dot)%20attac&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1397-index-server-2-0-on-iis-4-0-stores-physical-path-information-in-the-contentindex-catalogs-subkey-of-7def1f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1397%3A%20Index%20Server%202.0%20on%20IIS%204.0%20stores%20physical%20path%20information%20in%20the%20ContentIndex%5CCatalogs%20subkey%20of%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1370-the-setup-wizard-ie5setup-exe-for-internet-explorer-5-0-disables-1-the-screen-saver-which-could-7def1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1370%3A%20The%20setup%20wizard%20(ie5setup.exe)%20for%20Internet%20Explorer%205.0%20disables%20(1)%20the%20screen%20saver%2C%20which%20could&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0481-denial-of-service-in-poll-in-openbsd-7def1b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0481%3A%20Denial%20of%20service%20in%20%22poll%22%20in%20OpenBSD.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0428-openssl-and-ssleay-allow-remote-attackers-to-reuse-ssl-sessions-and-bypass-access-controls-7def0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0428%3A%20OpenSSL%20and%20SSLeay%20allow%20remote%20attackers%20to%20reuse%20SSL%20sessions%20and%20bypass%20access%20controls.&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0482-openbsd-kernel-crash-through-tss-handling-as-caused-by-the-crashme-program-7def0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0482%3A%20OpenBSD%20kernel%20crash%20through%20TSS%20handling%2C%20as%20caused%20by%20the%20crashme%20program.&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0433-xfree86-startx-command-is-vulnerable-to-a-symlink-attack-allowing-local-users-to-create-files-in-re-7def0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0433%3A%20XFree86%20startx%20command%20is%20vulnerable%20to%20a%20symlink%20attack%2C%20allowing%20local%20users%20to%20create%20files%20in%20re&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0425-talkback-in-netscape-4-5-allows-a-local-user-to-kill-an-arbitrary-process-of-another-user-whose-nets-7def08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0425%3A%20talkback%20in%20Netscape%204.5%20allows%20a%20local%20user%20to%20kill%20an%20arbitrary%20process%20of%20another%20user%20whose%20Nets&amp;severity=medium&amp;id=682ca32cb6fd31d6ed7def08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0424-talkback-in-netscape-4-5-allows-a-local-user-to-overwrite-arbitrary-files-of-another-user-whose-nets-7def06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0424%3A%20talkback%20in%20Netscape%204.5%20allows%20a%20local%20user%20to%20overwrite%20arbitrary%20files%20of%20another%20user%20whose%20Nets&amp;severity=low&amp;id=682ca32cb6fd31d6ed7def06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0462-suidperl-in-linux-perl-does-not-check-the-nosuid-mount-option-on-file-systems-allowing-local-users-7def04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0462%3A%20suidperl%20in%20Linux%20Perl%20does%20not%20check%20the%20nosuid%20mount%20option%20on%20file%20systems%2C%20allowing%20local%20users%20&amp;severity=high&amp;id=682ca32cb6fd31d6ed7def04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0422-in-some-cases-netbsd-1-3-3-mount-allows-local-users-to-execute-programs-in-some-file-systems-that-h-7def02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0422%3A%20In%20some%20cases%2C%20NetBSD%201.3.3%20mount%20allows%20local%20users%20to%20execute%20programs%20in%20some%20file%20systems%20that%20h&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7def02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0421-during-a-reboot-after-an-installation-of-linux-slackware-3-6-a-remote-attacker-can-obtain-root-acce-7def00</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0421%3A%20During%20a%20reboot%20after%20an%20installation%20of%20Linux%20Slackware%203.6%2C%20a%20remote%20attacker%20can%20obtain%20root%20acce&amp;severity=high&amp;id=682ca32bb6fd31d6ed7def00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0420-umapfs-allows-local-users-to-gain-root-privileges-by-changing-their-uid-through-a-malicious-mount-um-7deefe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0420%3A%20umapfs%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20changing%20their%20uid%20through%20a%20malicious%20mount_um&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0382-the-screen-saver-in-windows-nt-does-not-verify-that-its-security-context-has-been-changed-properly-7deefc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0382%3A%20The%20screen%20saver%20in%20Windows%20NT%20does%20not%20verify%20that%20its%20security%20context%20has%20been%20changed%20properly%2C%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1526-auto-update-feature-of-macromedia-shockwave-7-transmits-a-user-s-password-and-hard-disk-information-7deeef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1526%3A%20Auto-update%20feature%20of%20Macromedia%20Shockwave%207%20transmits%20a%20user&apos;s%20password%20and%20hard%20disk%20information%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deeef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0416-vulnerability-in-cisco-7xx-series-routers-allows-a-remote-attacker-to-cause-a-system-reload-via-a-tc-7deeed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0416%3A%20Vulnerability%20in%20Cisco%207xx%20series%20routers%20allows%20a%20remote%20attacker%20to%20cause%20a%20system%20reload%20via%20a%20TC&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deeed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0415-the-http-server-in-cisco-7xx-series-routers-3-2-through-4-2-is-enabled-by-default-which-allows-remo-7deeeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0415%3A%20The%20HTTP%20server%20in%20Cisco%207xx%20series%20routers%203.2%20through%204.2%20is%20enabled%20by%20default%2C%20which%20allows%20remo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deeeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0417-64-bit-solaris-7-procfs-allows-local-users-to-perform-a-denial-of-service-7deee9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0417%3A%2064%20bit%20Solaris%207%20procfs%20allows%20local%20users%20to%20perform%20a%20denial%20of%20service.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1567-seapine-software-testtrack-server-allows-a-remote-attacker-to-cause-a-denial-of-service-high-cpu-v-7deee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1567%3A%20Seapine%20Software%20TestTrack%20server%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20(high%20CPU)%20v&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1371-buffer-overflow-in-usr-bin-write-in-solaris-2-6-and-7-allows-local-users-to-gain-privileges-via-a-l-7deee5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1371%3A%20Buffer%20overflow%20in%20%2Fusr%2Fbin%2Fwrite%20in%20Solaris%202.6%20and%207%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20l&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1254-windows-95-98-and-nt-4-0-allow-remote-attackers-to-cause-a-denial-of-service-by-spoofing-icmp-redi-7deee3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1254%3A%20Windows%2095%2C%2098%2C%20and%20NT%204.0%20allow%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20spoofing%20ICMP%20redi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0418-denial-of-service-in-smtp-applications-such-as-sendmail-when-a-remote-attacker-e-g-spammer-uses-7deee1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0418%3A%20Denial%20of%20service%20in%20SMTP%20applications%20such%20as%20Sendmail%2C%20when%20a%20remote%20attacker%20(e.g.%20spammer)%20uses%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0411-several-startup-scripts-in-sco-openserver-enterprise-system-v-5-0-4p-including-s84rpcinit-s95nis-7deedf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0411%3A%20Several%20startup%20scripts%20in%20SCO%20OpenServer%20Enterprise%20System%20v%205.0.4p%2C%20including%20S84rpcinit%2C%20S95nis%2C%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deedf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0410-the-cancel-command-in-solaris-2-6-i386-has-a-buffer-overflow-that-allows-local-users-to-obtain-roo-7deedd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0410%3A%20The%20cancel%20command%20in%20Solaris%202.6%20(i386)%20has%20a%20buffer%20overflow%20that%20allows%20local%20users%20to%20obtain%20roo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0019-imail-pop3-daemon-uses-weak-encryption-which-allows-local-users-to-read-files-7deed0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0019%3A%20IMail%20POP3%20daemon%20uses%20weak%20encryption%2C%20which%20allows%20local%20users%20to%20read%20files.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1256-oracle-database-assistant-1-0-in-oracle-8-0-3-enterprise-edition-stores-the-database-master-password-7deece</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1256%3A%20Oracle%20Database%20Assistant%201.0%20in%20Oracle%208.0.3%20Enterprise%20Edition%20stores%20the%20database%20master%20password&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0409-buffer-overflow-in-gnuplot-in-linux-version-3-5-allows-local-users-to-obtain-root-access-7deecc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0409%3A%20Buffer%20overflow%20in%20gnuplot%20in%20Linux%20version%203.5%20allows%20local%20users%20to%20obtain%20root%20access.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1551-buffer-overflow-in-ipswitch-imail-service-5-0-allows-an-attacker-to-cause-a-denial-of-service-crash-7deeca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1551%3A%20Buffer%20overflow%20in%20Ipswitch%20IMail%20Service%205.0%20allows%20an%20attacker%20to%20cause%20a%20denial%20of%20service%20(crash&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deeca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0371-the-libmediatool-library-used-for-the-kde-mediatool-allows-local-users-to-create-arbitrary-files-via-7deec8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0371%3A%20The%20libmediatool%20library%20used%20for%20the%20KDE%20mediatool%20allows%20local%20users%20to%20create%20arbitrary%20files%20via&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1046-buffer-overflow-in-imonitor-in-imail-5-0-allows-remote-attackers-to-cause-a-denial-of-service-and-p-7deec6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1046%3A%20Buffer%20overflow%20in%20IMonitor%20in%20IMail%205.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%2C%20and%20p&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0479-denial-of-service-netscape-enterprise-server-with-virtualvault-on-hp-ux-vvos-systems-7deec4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0479%3A%20Denial%20of%20service%20Netscape%20Enterprise%20Server%20with%20VirtualVault%20on%20HP-UX%20VVOS%20systems.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deec4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0476-a-weak-encryption-algorithm-is-used-for-passwords-in-sco-termvision-allowing-them-to-be-easily-decr-7deec2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0476%3A%20A%20weak%20encryption%20algorithm%20is%20used%20for%20passwords%20in%20SCO%20TermVision%2C%20allowing%20them%20to%20be%20easily%20decr&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deec2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0440-the-byte-code-verifier-component-of-the-java-virtual-machine-jvm-allows-remote-execution-through-m-7deec0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0440%3A%20The%20byte%20code%20verifier%20component%20of%20the%20Java%20Virtual%20Machine%20(JVM)%20allows%20remote%20execution%20through%20m&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0438-remote-attackers-can-perform-a-denial-of-service-in-webramp-systems-by-sending-a-malicious-udp-packe-7deebe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0438%3A%20Remote%20attackers%20can%20perform%20a%20denial%20of%20service%20in%20WebRamp%20systems%20by%20sending%20a%20malicious%20UDP%20packe&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deebe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0437-remote-attackers-can-perform-a-denial-of-service-in-webramp-systems-by-sending-a-malicious-string-to-7deeb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0437%3A%20Remote%20attackers%20can%20perform%20a%20denial%20of%20service%20in%20WebRamp%20systems%20by%20sending%20a%20malicious%20string%20to&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deeb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0436-domain-enterprise-server-management-system-desms-in-hp-ux-allows-local-users-to-gain-privileges-7deeaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0436%3A%20Domain%20Enterprise%20Server%20Management%20System%20(DESMS)%20in%20HP-UX%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deeaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0435-mc-serviceguard-and-mc-lockmanager-in-hp-ux-allows-local-users-to-gain-privileges-through-sam-7deead</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0435%3A%20MC%2FServiceGuard%20and%20MC%2FLockManager%20in%20HP-UX%20allows%20local%20users%20to%20gain%20privileges%20through%20SAM.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0432-ftp-on-hp-ux-11-00-allows-local-users-to-gain-privileges-7deeab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0432%3A%20ftp%20on%20HP-UX%2011.00%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deeab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0431-linux-2-2-3-and-earlier-allow-a-remote-attacker-to-perform-an-ip-fragmentation-attack-causing-a-den-7deea9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0431%3A%20Linux%202.2.3%20and%20earlier%20allow%20a%20remote%20attacker%20to%20perform%20an%20IP%20fragmentation%20attack%2C%20causing%20a%20den&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0430-cisco-catalyst-lan-switches-running-catalyst-5000-supervisor-software-allows-remote-attackers-to-per-7deea7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0430%3A%20Cisco%20Catalyst%20LAN%20switches%20running%20Catalyst%205000%20supervisor%20software%20allows%20remote%20attackers%20to%20per&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0429-the-lotus-notes-4-5-client-may-send-a-copy-of-encrypted-mail-in-the-clear-across-the-network-if-the-7deea5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0429%3A%20The%20Lotus%20Notes%204.5%20client%20may%20send%20a%20copy%20of%20encrypted%20mail%20in%20the%20clear%20across%20the%20network%20if%20the%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0426-the-default-permissions-of-dev-kmem-in-linux-versions-before-2-0-36-allows-ip-spoofing-7deea3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0426%3A%20The%20default%20permissions%20of%20%2Fdev%2Fkmem%20in%20Linux%20versions%20before%202.0.36%20allows%20IP%20spoofing.&amp;severity=critical&amp;id=682ca32bb6fd31d6ed7deea3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0419-when-the-microsoft-smtp-service-attempts-to-send-a-message-to-a-server-and-receives-a-4xx-error-code-7deea1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0419%3A%20When%20the%20Microsoft%20SMTP%20service%20attempts%20to%20send%20a%20message%20to%20a%20server%20and%20receives%20a%204xx%20error%20code&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deea1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0414-in-linux-before-version-2-0-36-remote-attackers-can-spoof-a-tcp-connection-and-pass-data-to-the-app-7dee9f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0414%3A%20In%20Linux%20before%20version%202.0.36%2C%20remote%20attackers%20can%20spoof%20a%20TCP%20connection%20and%20pass%20data%20to%20the%20app&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee9f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0413-a-buffer-overflow-in-the-sgi-x-server-allows-local-users-to-gain-root-access-through-the-x-server-fo-7dee92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0413%3A%20A%20buffer%20overflow%20in%20the%20SGI%20X%20server%20allows%20local%20users%20to%20gain%20root%20access%20through%20the%20X%20server%20fo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0386-microsoft-personal-web-server-and-frontpage-personal-web-server-in-some-windows-systems-allows-a-rem-7dee90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0386%3A%20Microsoft%20Personal%20Web%20Server%20and%20FrontPage%20Personal%20Web%20Server%20in%20some%20Windows%20systems%20allows%20a%20rem&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0261-netmanager-chameleon-smtpd-has-several-buffer-overflows-that-cause-a-crash-7dee8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0261%3A%20Netmanager%20Chameleon%20SMTPd%20has%20several%20buffer%20overflows%20that%20cause%20a%20crash.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0223-solaris-syslogd-crashes-when-receiving-a-message-from-a-host-that-doesn-t-have-an-inverse-dns-entry-7dee8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0223%3A%20Solaris%20syslogd%20crashes%20when%20receiving%20a%20message%20from%20a%20host%20that%20doesn&apos;t%20have%20an%20inverse%20DNS%20entry.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0222-denial-of-service-in-cisco-ios-web-server-allows-attackers-to-reboot-the-router-using-a-long-url-7dee8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0222%3A%20Denial%20of%20service%20in%20Cisco%20IOS%20web%20server%20allows%20attackers%20to%20reboot%20the%20router%20using%20a%20long%20URL.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0221-denial-of-service-of-ascend-routers-through-port-150-remote-administration-7dee88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0221%3A%20Denial%20of%20service%20of%20Ascend%20routers%20through%20port%20150%20(remote%20administration).&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0381-super-3-11-6-and-other-versions-have-a-buffer-overflow-in-the-syslog-utility-which-allows-a-local-us-7dee86</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0381%3A%20super%203.11.6%20and%20other%20versions%20have%20a%20buffer%20overflow%20in%20the%20syslog%20utility%20which%20allows%20a%20local%20us&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0483-openbsd-crash-using-nlink-value-in-ffs-and-ext2fs-filesystems-7dee84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0483%3A%20OpenBSD%20crash%20using%20nlink%20value%20in%20FFS%20and%20EXT2FS%20filesystems.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0408-files-created-from-interactive-shell-sessions-in-cobalt-raq-microservers-e-g-bash-history-are-wo-7dee82</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0408%3A%20Files%20created%20from%20interactive%20shell%20sessions%20in%20Cobalt%20RaQ%20microservers%20(e.g.%20.bash_history)%20are%20wo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0380-slmail-3-1-and-3-2-allows-local-users-to-access-any-file-in-the-ntfs-file-system-when-the-remote-adm-7dee80</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0380%3A%20SLMail%203.1%20and%203.2%20allows%20local%20users%20to%20access%20any%20file%20in%20the%20NTFS%20file%20system%20when%20the%20Remote%20Adm&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1247-vulnerability-in-hp-camera-component-of-hp-dce-9000-in-hp-ux-9-x-allows-attackers-to-gain-root-privi-7dee73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1247%3A%20Vulnerability%20in%20HP%20Camera%20component%20of%20HP%20DCE%2F9000%20in%20HP-UX%209.x%20allows%20attackers%20to%20gain%20root%20privi&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0484-buffer-overflow-in-openbsd-ping-7dee71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0484%3A%20Buffer%20overflow%20in%20OpenBSD%20ping.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0441-remote-attackers-can-perform-a-denial-of-service-in-wingate-machines-using-a-buffer-overflow-in-the-7dee6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0441%3A%20Remote%20attackers%20can%20perform%20a%20denial%20of%20service%20in%20WinGate%20machines%20using%20a%20buffer%20overflow%20in%20the%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0379-microsoft-taskpads-allows-remote-web-sites-to-execute-commands-on-the-visiting-user-s-machine-via-ce-7dee6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0379%3A%20Microsoft%20Taskpads%20allows%20remote%20web%20sites%20to%20execute%20commands%20on%20the%20visiting%20user&apos;s%20machine%20via%20ce&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0378-interscan-viruswall-for-solaris-doesn-t-scan-files-for-viruses-when-a-single-http-request-includes-t-7dee6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0378%3A%20InterScan%20VirusWall%20for%20Solaris%20doesn&apos;t%20scan%20files%20for%20viruses%20when%20a%20single%20HTTP%20request%20includes%20t&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0377-process-table-attack-in-unix-systems-allows-a-remote-attacker-to-perform-a-denial-of-service-by-fill-7dee69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0377%3A%20Process%20table%20attack%20in%20Unix%20systems%20allows%20a%20remote%20attacker%20to%20perform%20a%20denial%20of%20service%20by%20fill&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1049-arcserve-nt-agents-use-weak-encryption-xor-for-passwords-which-allows-remote-attackers-to-sniff-t-7dee67</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1049%3A%20ARCserve%20NT%20agents%20use%20weak%20encryption%20(XOR)%20for%20passwords%2C%20which%20allows%20remote%20attackers%20to%20sniff%20t&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1168-install-iss-installation-script-for-internet-security-scanner-iss-for-linux-version-5-3-allows-l-7dee65</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1168%3A%20install.iss%20installation%20script%20for%20Internet%20Security%20Scanner%20(ISS)%20for%20Linux%2C%20version%205.3%2C%20allows%20l&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0376-local-users-in-windows-nt-can-obtain-administrator-privileges-by-changing-the-knowndlls-list-to-refe-7dee63</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0376%3A%20Local%20users%20in%20Windows%20NT%20can%20obtain%20administrator%20privileges%20by%20changing%20the%20KnownDLLs%20list%20to%20refe&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1482-svgalib-zgv-3-0-7-and-earlier-allows-local-users-to-gain-root-access-via-a-privilege-leak-of-the-iop-7dee61</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1482%3A%20SVGAlib%20zgv%203.0-7%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20privilege%20leak%20of%20the%20iop&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1372-triactive-remote-manager-with-basic-authentication-enabled-stores-the-username-and-password-in-clear-7dee54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1372%3A%20Triactive%20Remote%20Manager%20with%20Basic%20authentication%20enabled%20stores%20the%20username%20and%20password%20in%20clear&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1255-hyperseek-allows-remote-attackers-to-modify-the-hyperseek-configuration-by-directly-calling-the-admi-7dee52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1255%3A%20Hyperseek%20allows%20remote%20attackers%20to%20modify%20the%20hyperseek%20configuration%20by%20directly%20calling%20the%20admi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1101-kabsoftware-lydia-utility-uses-weak-encryption-to-store-user-passwords-in-the-lydia-ini-file-which-7dee50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1101%3A%20Kabsoftware%20Lydia%20utility%20uses%20weak%20encryption%20to%20store%20user%20passwords%20in%20the%20lydia.ini%20file%2C%20which%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0485-remote-attackers-can-cause-a-system-crash-through-ipintr-in-ipq-in-openbsd-7dee4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0485%3A%20Remote%20attackers%20can%20cause%20a%20system%20crash%20through%20ipintr()%20in%20ipq%20in%20OpenBSD.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0460-buffer-overflow-in-linux-autofs-module-through-long-directory-names-allows-local-users-to-perform-a-7dee4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0460%3A%20Buffer%20overflow%20in%20Linux%20autofs%20module%20through%20long%20directory%20names%20allows%20local%20users%20to%20perform%20a%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0412-in-iis-and-other-web-servers-an-attacker-can-attack-commands-as-system-if-the-server-is-running-as-7dee4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0412%3A%20In%20IIS%20and%20other%20web%20servers%2C%20an%20attacker%20can%20attack%20commands%20as%20SYSTEM%20if%20the%20server%20is%20running%20as%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0406-digital-unix-networker-program-nsralist-has-a-buffer-overflow-which-allows-local-users-to-obtain-roo-7dee48</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0406%3A%20Digital%20Unix%20Networker%20program%20nsralist%20has%20a%20buffer%20overflow%20which%20allows%20local%20users%20to%20obtain%20roo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0367-vulnerability-in-eterm-0-8-8-in-debian-gnu-linux-allows-an-attacker-to-gain-root-privileges-7dee46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0367%3A%20Vulnerability%20in%20eterm%200.8.8%20in%20Debian%20GNU%2FLinux%20allows%20an%20attacker%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1495-xtvscreen-in-suse-linux-6-0-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-on-7dee44</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1495%3A%20xtvscreen%20in%20SuSE%20Linux%206.0%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0405-a-buffer-overflow-in-lsof-allows-local-users-to-obtain-root-privilege-7dee42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0405%3A%20A%20buffer%20overflow%20in%20lsof%20allows%20local%20users%20to%20obtain%20root%20privilege.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1405-snap-command-in-aix-before-4-3-2-creates-the-tmp-ibmsupt-directory-with-world-readable-permissions-7dee35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1405%3A%20snap%20command%20in%20AIX%20before%204.3.2%20creates%20the%20%2Ftmp%2Fibmsupt%20directory%20with%20world-readable%20permissions%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1060-buffer-overflow-in-tetrix-tetrinet-daemon-1-13-16-allows-remote-attackers-to-cause-a-denial-of-servi-7dee33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1060%3A%20Buffer%20overflow%20in%20Tetrix%20TetriNet%20daemon%201.13.16%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20servi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0396-a-race-condition-between-the-select-and-accept-calls-in-netbsd-tcp-servers-allows-remote-attacke-7dee31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0396%3A%20A%20race%20condition%20between%20the%20select()%20and%20accept()%20calls%20in%20NetBSD%20TCP%20servers%20allows%20remote%20attacke&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1180-o-reilly-website-1-1e-and-website-pro-2-0-allows-remote-attackers-to-execute-arbitrary-commands-via-7dee2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1180%3A%20O&apos;Reilly%20WebSite%201.1e%20and%20Website%20Pro%202.0%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0375-buffer-overflow-in-webd-in-network-flight-recorder-nfr-2-0-2-research-allows-remote-attackers-to-e-7dee2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0375%3A%20Buffer%20overflow%20in%20webd%20in%20Network%20Flight%20Recorder%20(NFR)%202.0.2-Research%20allows%20remote%20attackers%20to%20e&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0374-debian-gnu-linux-cfengine-package-is-susceptible-to-a-symlink-attack-7dee2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0374%3A%20Debian%20GNU%2FLinux%20cfengine%20package%20is%20susceptible%20to%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1260-msql-mini-sql-2-0-6-allows-remote-attackers-to-obtain-sensitive-server-information-such-as-logged-7dee29</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1260%3A%20mSQL%20(Mini%20SQL)%202.0.6%20allows%20remote%20attackers%20to%20obtain%20sensitive%20server%20information%20such%20as%20logged%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0714-vulnerability-in-compaq-tru64-unix-edauth-command-7dee27</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0714%3A%20Vulnerability%20in%20Compaq%20Tru64%20UNIX%20edauth%20command.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0404-buffer-overflow-in-the-mail-max-smtp-server-for-windows-systems-allows-remote-command-execution-7dee25</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0404%3A%20Buffer%20overflow%20in%20the%20Mail-Max%20SMTP%20server%20for%20Windows%20systems%20allows%20remote%20command%20execution.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1203-multilink-ppp-for-isdn-dialup-users-in-ascend-before-4-6-allows-remote-attackers-to-cause-a-denial-o-7dee23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1203%3A%20Multilink%20PPP%20for%20ISDN%20dialup%20users%20in%20Ascend%20before%204.6%20allows%20remote%20attackers%20to%20cause%20a%20denial%20o&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0372-the-installer-for-backoffice-server-includes-account-names-and-passwords-in-a-setup-file-reboot-ini-7dee16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0372%3A%20The%20installer%20for%20BackOffice%20Server%20includes%20account%20names%20and%20passwords%20in%20a%20setup%20file%20(reboot.ini&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1375-filesystemobject-fso-in-the-showfile-asp-active-server-page-asp-allows-remote-attackers-to-read-7dee14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1375%3A%20FileSystemObject%20(FSO)%20in%20the%20showfile.asp%20Active%20Server%20Page%20(ASP)%20allows%20remote%20attackers%20to%20read%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0371-lynx-allows-a-local-user-to-overwrite-sensitive-files-through-tmp-symlinks-7dee12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0371%3A%20Lynx%20allows%20a%20local%20user%20to%20overwrite%20sensitive%20files%20through%20%2Ftmp%20symlinks.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0370-in-sun-solaris-and-sunos-man-and-catman-contain-vulnerabilities-that-allow-overwriting-arbitrary-fi-7dee10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0370%3A%20In%20Sun%20Solaris%20and%20SunOS%2C%20man%20and%20catman%20contain%20vulnerabilities%20that%20allow%20overwriting%20arbitrary%20fi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0353-rpc-pcnfsd-in-hp-gives-remote-root-access-by-changing-the-permissions-on-the-main-printer-spool-dire-7dee0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0353%3A%20rpc.pcnfsd%20in%20HP%20gives%20remote%20root%20access%20by%20changing%20the%20permissions%20on%20the%20main%20printer%20spool%20dire&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0407-by-default-iis-4-0-has-a-virtual-directory-iisadmpwd-which-contains-files-that-can-be-used-as-prox-7dee0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0407%3A%20By%20default%2C%20IIS%204.0%20has%20a%20virtual%20directory%20%2FIISADMPWD%20which%20contains%20files%20that%20can%20be%20used%20as%20prox&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0368-buffer-overflows-in-wuarchive-ftpd-wu-ftpd-and-proftpd-lead-to-remote-root-access-a-k-a-palmetto-7dee0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0368%3A%20Buffer%20overflows%20in%20wuarchive%20ftpd%20(wu-ftpd)%20and%20ProFTPD%20lead%20to%20remote%20root%20access%2C%20a.k.a.%20palmetto&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0367-netbsd-netstat-command-allows-local-users-to-access-kernel-memory-7dee08</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0367%3A%20NetBSD%20netstat%20command%20allows%20local%20users%20to%20access%20kernel%20memory.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dee08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0366-in-some-cases-service-pack-4-for-windows-nt-4-0-can-allow-access-to-network-shares-using-a-blank-pa-7dee06</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0366%3A%20In%20some%20cases%2C%20Service%20Pack%204%20for%20Windows%20NT%204.0%20can%20allow%20access%20to%20network%20shares%20using%20a%20blank%20pa&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dee06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0350-race-condition-in-the-db-loader-program-in-clearcase-gives-local-users-root-access-by-setting-suid-b-7dee04</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0350%3A%20Race%20condition%20in%20the%20db_loader%20program%20in%20ClearCase%20gives%20local%20users%20root%20access%20by%20setting%20SUID%20b&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dee04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1201-windows-95-and-windows-98-systems-when-configured-with-multiple-tcp-ip-stacks-bound-to-the-same-mac-7dedf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1201%3A%20Windows%2095%20and%20Windows%2098%20systems%2C%20when%20configured%20with%20multiple%20TCP%2FIP%20stacks%20bound%20to%20the%20same%20MAC&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1169-nobo-1-2-allows-remote-attackers-to-cause-a-denial-of-service-crash-via-a-series-of-large-udp-pack-7dedf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1169%3A%20nobo%201.2%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20a%20series%20of%20large%20UDP%20pack&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0365-the-metamail-package-allows-remote-command-execution-using-shell-metacharacters-that-are-not-quoted-7dedf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0365%3A%20The%20metamail%20package%20allows%20remote%20command%20execution%20using%20shell%20metacharacters%20that%20are%20not%20quoted%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1453-internet-explorer-4-allows-remote-attackers-malicious-web-site-operators-to-read-the-contents-of-t-7dedf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1453%3A%20Internet%20Explorer%204%20allows%20remote%20attackers%20(malicious%20web%20site%20operators)%20to%20read%20the%20contents%20of%20t&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dedf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1171-ipswitch-ws-ftp-allows-local-users-to-gain-additional-privileges-and-modify-or-add-mail-accounts-by-7dedef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1171%3A%20IPswitch%20WS_FTP%20allows%20local%20users%20to%20gain%20additional%20privileges%20and%20modify%20or%20add%20mail%20accounts%20by%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0383-acc-tigris-allows-public-access-without-a-login-7deded</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0383%3A%20ACC%20Tigris%20allows%20public%20access%20without%20a%20login.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deded</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0363-suse-5-2-plp-lpc-program-has-a-buffer-overflow-that-leads-to-root-compromise-7dedeb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0363%3A%20SuSE%205.2%20PLP%20lpc%20program%20has%20a%20buffer%20overflow%20that%20leads%20to%20root%20compromise.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0362-ws-ftp-server-remote-denial-of-service-through-cwd-command-7dede9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0362%3A%20WS_FTP%20server%20remote%20denial%20of%20service%20through%20cwd%20command.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dede9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0459-local-users-can-perform-a-denial-of-service-in-alpha-linux-using-milo-to-force-a-reboot-7dede7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0459%3A%20Local%20users%20can%20perform%20a%20denial%20of%20service%20in%20Alpha%20Linux%2C%20using%20MILO%20to%20force%20a%20reboot.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dede7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0403-a-bug-in-cyrix-cpus-on-linux-allows-local-users-to-perform-a-denial-of-service-7dede5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0403%3A%20A%20bug%20in%20Cyrix%20CPUs%20on%20Linux%20allows%20local%20users%20to%20perform%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dede5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0373-buffer-overflow-in-the-super-utility-in-debian-gnu-linux-and-other-operating-systems-allows-loca-7dedd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0373%3A%20Buffer%20overflow%20in%20the%20%22Super%22%20utility%20in%20Debian%20GNU%2FLinux%2C%20and%20other%20operating%20systems%2C%20allows%20loca&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0358-digital-unix-4-0-has-a-buffer-overflow-in-the-inc-program-of-the-mh-package-7dedd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0358%3A%20Digital%20Unix%204.0%20has%20a%20buffer%20overflow%20in%20the%20inc%20program%20of%20the%20mh%20package.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0351-ftp-pasv-pizza-thief-denial-of-service-and-unauthorized-data-access-attackers-can-steal-data-by-7dedd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0351%3A%20FTP%20PASV%20%22Pizza%20Thief%22%20denial%20of%20service%20and%20unauthorized%20data%20access.%20%20Attackers%20can%20steal%20data%20by%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0291-the-wingate-proxy-is-installed-without-a-password-which-allows-remote-attackers-to-redirect-connect-7dedd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0291%3A%20The%20WinGate%20proxy%20is%20installed%20without%20a%20password%2C%20which%20allows%20remote%20attackers%20to%20redirect%20connect&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0360-ms-site-server-2-0-with-iis-4-can-allow-users-to-upload-content-including-asp-to-the-target-web-si-7dedd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0360%3A%20MS%20Site%20Server%202.0%20with%20IIS%204%20can%20allow%20users%20to%20upload%20content%2C%20including%20ASP%2C%20to%20the%20target%20web%20si&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0370-the-debug-option-in-caldera-linux-smail-allows-remote-attackers-to-execute-commands-via-shell-metach-7dedce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0370%3A%20The%20debug%20option%20in%20Caldera%20Linux%20smail%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metach&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1546-netstation-navio-com-rte-1-1-0-1-configuration-script-for-navio-nc-on-ibm-aix-exports-tmp-over-nfs-7dedcc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1546%3A%20netstation.navio-com.rte%201.1.0.1%20configuration%20script%20for%20Navio%20NC%20on%20IBM%20AIX%20exports%20%2Ftmp%20over%20NFS%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0952-buffer-overflow-in-solaris-lpstat-via-class-argument-allows-local-users-to-gain-root-access-7dedca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0952%3A%20Buffer%20overflow%20in%20Solaris%20lpstat%20via%20class%20argument%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0461-versions-of-rpcbind-including-linux-irix-and-wietse-venema-s-rpcbind-allow-a-remote-attacker-to-in-7dedc8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0461%3A%20Versions%20of%20rpcbind%20including%20Linux%2C%20IRIX%2C%20and%20Wietse%20Venema&apos;s%20rpcbind%20allow%20a%20remote%20attacker%20to%20in&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1450-vulnerability-in-1-rlogin-daemon-rshd-and-2-scheme-on-sco-unix-openserver-5-0-5-and-earlier-and-7dedc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1450%3A%20Vulnerability%20in%20(1)%20rlogin%20daemon%20rshd%20and%20(2)%20scheme%20on%20SCO%20UNIX%20OpenServer%205.0.5%20and%20earlier%2C%20and&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0349-a-buffer-overflow-in-the-ftp-list-ls-command-in-iis-allows-remote-attackers-to-conduct-a-denial-of-7dedb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0349%3A%20A%20buffer%20overflow%20in%20the%20FTP%20list%20(ls)%20command%20in%20IIS%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0348-iis-asp-caching-problem-releases-sensitive-information-when-two-virtual-servers-share-the-same-physi-7dedb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0348%3A%20IIS%20ASP%20caching%20problem%20releases%20sensitive%20information%20when%20two%20virtual%20servers%20share%20the%20same%20physi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0450-in-iis-an-attacker-could-determine-a-real-path-using-a-request-for-a-non-existent-url-that-would-be-7dedb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0450%3A%20In%20IIS%2C%20an%20attacker%20could%20determine%20a%20real%20path%20using%20a%20request%20for%20a%20non-existent%20URL%20that%20would%20be&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0449-the-exair-sample-site-in-iis-4-allows-remote-attackers-to-cause-a-denial-of-service-cpu-consumption-7dedb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0449%3A%20The%20ExAir%20sample%20site%20in%20IIS%204%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(CPU%20consumption&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0400-denial-of-service-in-linux-2-2-0-running-the-ldd-command-on-a-core-file-7dedb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0400%3A%20Denial%20of%20service%20in%20Linux%202.2.0%20running%20the%20ldd%20command%20on%20a%20core%20file.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0347-internet-explorer-4-01-allows-remote-attackers-to-read-local-files-and-spoof-web-pages-via-a-01-c-7dedaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0347%3A%20Internet%20Explorer%204.01%20allows%20remote%20attackers%20to%20read%20local%20files%20and%20spoof%20web%20pages%20via%20a%20%22%2501%22%20c&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1458-buffer-overflow-in-at-program-in-digital-unix-4-0-allows-local-users-to-gain-root-privileges-via-a-l-7dedad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1458%3A%20Buffer%20overflow%20in%20at%20program%20in%20Digital%20UNIX%204.0%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20l&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dedad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0357-windows-98-and-other-operating-systems-allows-remote-attackers-to-cause-a-denial-of-service-via-craf-7dedab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0357%3A%20Windows%2098%20and%20other%20operating%20systems%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20craf&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dedab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0356-controlit-v4-5-and-earlier-uses-weak-encryption-to-store-usernames-and-passwords-in-an-address-book-7deda9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0356%3A%20ControlIT%20v4.5%20and%20earlier%20uses%20weak%20encryption%20to%20store%20usernames%20and%20passwords%20in%20an%20address%20book.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deda9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0352-controlit-4-5-and-earlier-aka-remotely-possible-has-weak-password-encryption-7deda7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0352%3A%20ControlIT%204.5%20and%20earlier%20(aka%20Remotely%20Possible)%20has%20weak%20password%20encryption.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deda7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1544-buffer-overflow-in-ftp-server-in-microsoft-iis-3-0-and-4-0-allows-local-and-sometimes-remote-attacke-7ded9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1544%3A%20Buffer%20overflow%20in%20FTP%20server%20in%20Microsoft%20IIS%203.0%20and%204.0%20allows%20local%20and%20sometimes%20remote%20attacke&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1264-webramp-m3-router-does-not-disable-remote-telnet-or-http-access-to-itself-even-when-access-has-been-7ded98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1264%3A%20WebRamp%20M3%20router%20does%20not%20disable%20remote%20telnet%20or%20HTTP%20access%20to%20itself%2C%20even%20when%20access%20has%20been&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0121-buffer-overflow-in-dtaction-command-gives-root-access-7ded96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0121%3A%20Buffer%20overflow%20in%20dtaction%20command%20gives%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0451-denial-of-service-in-linux-2-0-36-allows-local-users-to-prevent-any-server-from-listening-on-any-non-7ded94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0451%3A%20Denial%20of%20service%20in%20Linux%202.0.36%20allows%20local%20users%20to%20prevent%20any%20server%20from%20listening%20on%20any%20non&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0678-a-default-configuration-of-apache-on-debian-gnu-linux-sets-the-serverroot-to-usr-doc-which-allows-7ded90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0678%3A%20A%20default%20configuration%20of%20Apache%20on%20Debian%20GNU%2FLinux%20sets%20the%20ServerRoot%20to%20%2Fusr%2Fdoc%2C%20which%20allows%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0457-linux-ftpwatch-program-allows-local-users-to-gain-root-privileges-7ded8e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0457%3A%20Linux%20ftpwatch%20program%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1538-when-iis-2-or-3-is-upgraded-to-iis-4-ism-dll-is-inadvertently-left-in-scripts-iisadmin-which-does-7ded8c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1538%3A%20When%20IIS%202%20or%203%20is%20upgraded%20to%20IIS%204%2C%20ism.dll%20is%20inadvertently%20left%20in%20%2Fscripts%2Fiisadmin%2C%20which%20does&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1376-buffer-overflow-in-fpcount-exe-in-iis-4-0-with-frontpage-server-extensions-allows-remote-attackers-t-7ded8a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1376%3A%20Buffer%20overflow%20in%20fpcount.exe%20in%20IIS%204.0%20with%20FrontPage%20Server%20Extensions%20allows%20remote%20attackers%20t&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1172-by-design-maximizer-enterprise-4-calendar-and-address-book-program-allows-arbitrary-users-to-modify-7ded88</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1172%3A%20By%20design%2C%20Maximizer%20Enterprise%204%20calendar%20and%20address%20book%20program%20allows%20arbitrary%20users%20to%20modify&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0063-cisco-ios-12-0-and-other-versions-can-be-crashed-by-malicious-udp-packets-to-the-syslog-port-7ded7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0063%3A%20Cisco%20IOS%2012.0%20and%20other%20versions%20can%20be%20crashed%20by%20malicious%20UDP%20packets%20to%20the%20syslog%20port.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0392-buffer-overflow-in-thomas-boutell-s-cgic-library-version-up-to-1-05-7ded79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0392%3A%20Buffer%20overflow%20in%20Thomas%20Boutell&apos;s%20cgic%20library%20version%20up%20to%201.05.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0442-solaris-ff-core-allows-local-users-to-modify-files-7ded77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0442%3A%20Solaris%20ff.core%20allows%20local%20users%20to%20modify%20files.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1268-vulnerability-in-kde-konsole-allows-local-users-to-hijack-or-observe-sessions-of-other-users-by-acce-7ded75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1268%3A%20Vulnerability%20in%20KDE%20konsole%20allows%20local%20users%20to%20hijack%20or%20observe%20sessions%20of%20other%20users%20by%20acce&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0458-l0phtcrack-2-5-used-temporary-files-in-the-system-temp-directory-which-could-contain-password-inform-7ded73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0458%3A%20L0phtcrack%202.5%20used%20temporary%20files%20in%20the%20system%20TEMP%20directory%20which%20could%20contain%20password%20inform&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0391-the-cryptographic-challenge-of-smb-authentication-in-windows-95-and-windows-98-can-be-reused-allowi-7ded71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0391%3A%20The%20cryptographic%20challenge%20of%20SMB%20authentication%20in%20Windows%2095%20and%20Windows%2098%20can%20be%20reused%2C%20allowi&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0464-local-users-can-perform-a-denial-of-service-in-tripwire-1-2-and-earlier-using-long-filenames-7ded6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0464%3A%20Local%20users%20can%20perform%20a%20denial%20of%20service%20in%20Tripwire%201.2%20and%20earlier%20using%20long%20filenames.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0390-buffer-overflow-in-dosemu-slang-library-in-linux-7ded6d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0390%3A%20Buffer%20overflow%20in%20Dosemu%20Slang%20library%20in%20Linux.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0054-search-cgi-in-the-solutionscripts-home-free-package-allows-remote-attackers-to-view-directories-via-7ded6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0054%3A%20search.cgi%20in%20the%20SolutionScripts%20Home%20Free%20package%20allows%20remote%20attackers%20to%20view%20directories%20via%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0914-buffer-overflow-in-the-ftp-client-in-the-debian-gnu-linux-netstd-package-7ded69</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0914%3A%20Buffer%20overflow%20in%20the%20FTP%20client%20in%20the%20Debian%20GNU%2FLinux%20netstd%20package.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0389-buffer-overflow-in-the-bootp-server-in-the-debian-linux-netstd-package-7ded5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0389%3A%20Buffer%20overflow%20in%20the%20bootp%20server%20in%20the%20Debian%20Linux%20netstd%20package.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0005-hp-ux-aserver-program-allows-local-users-to-gain-privileges-via-a-symlink-attack-7ded5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0005%3A%20HP-UX%20aserver%20program%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1422-the-default-configuration-of-slackware-3-4-and-possibly-other-versions-includes-dot-the-curren-7ded58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1422%3A%20The%20default%20configuration%20of%20Slackware%203.4%2C%20and%20possibly%20other%20versions%2C%20includes%20.%20(dot%2C%20the%20curren&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1170-ipswitch-imail-allows-local-users-to-gain-additional-privileges-and-modify-or-add-mail-accounts-by-s-7ded56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1170%3A%20IPswitch%20IMail%20allows%20local%20users%20to%20gain%20additional%20privileges%20and%20modify%20or%20add%20mail%20accounts%20by%20s&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0402-wget-1-5-3-follows-symlinks-to-change-permissions-of-the-target-file-instead-of-the-symlink-itself-7ded54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0402%3A%20wget%201.5.3%20follows%20symlinks%20to%20change%20permissions%20of%20the%20target%20file%20instead%20of%20the%20symlink%20itself.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1568-off-by-one-error-in-ncftpd-ftp-server-before-2-4-1-allows-a-remote-attacker-to-cause-a-denial-of-ser-7ded52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1568%3A%20Off-by-one%20error%20in%20NcFTPd%20FTP%20server%20before%202.4.1%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20ser&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1440-win32-icq-98a-1-30-and-possibly-other-versions-does-not-display-the-entire-portion-of-long-filenam-7ded50</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1440%3A%20Win32%20ICQ%2098a%201.30%2C%20and%20possibly%20other%20versions%2C%20does%20not%20display%20the%20entire%20portion%20of%20long%20filenam&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1430-pim-software-for-royal-davinci-does-not-properly-password-protext-access-to-data-stored-in-the-mdb-7ded4e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1430%3A%20PIM%20software%20for%20Royal%20daVinci%20does%20not%20properly%20password-protext%20access%20to%20data%20stored%20in%20the%20.mdb%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0698-denial-of-service-in-ip-protocol-logger-ippl-on-red-hat-and-debian-linux-7ded4c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0698%3A%20Denial%20of%20service%20in%20IP%20protocol%20logger%20(ippl)%20on%20Red%20Hat%20and%20Debian%20Linux.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0665-an-application-critical-windows-nt-registry-key-has-an-inappropriate-value-7ded4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0665%3A%20An%20application-critical%20Windows%20NT%20registry%20key%20has%20an%20inappropriate%20value.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0664-an-application-critical-windows-nt-registry-key-has-inappropriate-permissions-7ded3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0664%3A%20An%20application-critical%20Windows%20NT%20registry%20key%20has%20inappropriate%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0663-a-system-critical-program-library-or-file-has-a-checksum-or-other-integrity-measurement-that-indic-7ded3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0663%3A%20A%20system-critical%20program%2C%20library%2C%20or%20file%20has%20a%20checksum%20or%20other%20integrity%20measurement%20that%20indic&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0662-a-system-critical-program-or-library-does-not-have-the-appropriate-patch-hotfix-or-service-pack-in-7ded39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0662%3A%20A%20system-critical%20program%20or%20library%20does%20not%20have%20the%20appropriate%20patch%2C%20hotfix%2C%20or%20service%20pack%20in&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0661-a-system-is-running-a-version-of-software-that-was-replaced-with-a-trojan-horse-at-one-of-its-distri-7ded37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0661%3A%20A%20system%20is%20running%20a%20version%20of%20software%20that%20was%20replaced%20with%20a%20Trojan%20Horse%20at%20one%20of%20its%20distri&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0660-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-not-7ded35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0660%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20not&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0659-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0659%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0658-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0658%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0657-wingate-is-being-used-7ded2f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0657%3A%20WinGate%20is%20being%20used.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7ded2f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0656-the-ugidd-rpc-interface-by-design-allows-remote-attackers-to-enumerate-valid-usernames-by-specifyi-7ded2d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0656%3A%20The%20ugidd%20RPC%20interface%2C%20by%20design%2C%20allows%20remote%20attackers%20to%20enumerate%20valid%20usernames%20by%20specifyi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0655-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-not-7ded2b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0655%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20not&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0654-the-os-2-or-posix-subsystem-in-nt-is-enabled-7ded1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0654%3A%20The%20OS%2F2%20or%20POSIX%20subsystem%20in%20NT%20is%20enabled.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0653-a-component-service-related-to-nis-is-running-7ded1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0653%3A%20A%20component%20service%20related%20to%20NIS%2B%20is%20running.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0652-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0652%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0651-the-rsh-rlogin-service-is-running-7ded18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0651%3A%20The%20rsh%2Frlogin%20service%20is%20running.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7ded18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0650-the-netstat-service-is-running-which-provides-sensitive-information-to-remote-attackers-7ded16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0650%3A%20The%20netstat%20service%20is%20running%2C%20which%20provides%20sensitive%20information%20to%20remote%20attackers.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0649-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0649%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0648-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0648%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0647-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded10</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0647%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0646-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0646%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0645-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7ded0c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0645%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7ded0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0644-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0644%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0643-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0643%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0642-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0642%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0641-the-uucp-service-is-running-7decf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0641%3A%20The%20UUCP%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0640-the-gopher-service-is-running-7decf7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0640%3A%20The%20Gopher%20service%20is%20running.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7decf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0639-the-chargen-service-is-running-7decf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0639%3A%20The%20chargen%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0638-the-daytime-service-is-running-7decf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0638%3A%20The%20daytime%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0637-the-systat-service-is-running-7decf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0637%3A%20The%20systat%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0636-the-discard-service-is-running-7decef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0636%3A%20The%20discard%20service%20is%20running.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7decef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0635-the-echo-service-is-running-7deced</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0635%3A%20The%20echo%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deced</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0634-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7dece0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0634%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dece0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0632-the-rpc-portmapper-service-is-running-7decdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0632%3A%20The%20RPC%20portmapper%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0631-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0631%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0630-the-nt-alerter-and-messenger-services-are-running-7decd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0630%3A%20The%20NT%20Alerter%20and%20Messenger%20services%20are%20running.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7decd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0629-the-ident-identd-service-is-running-7decd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0629%3A%20The%20ident%2Fidentd%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0625-the-rpc-rquotad-service-is-running-7decd4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0625%3A%20The%20rpc.rquotad%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0624-the-rstat-rstatd-service-is-running-7decd2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0624%3A%20The%20rstat%2Frstatd%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0623-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decd0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0623%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0622-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0622%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0621-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0621%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0620-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0620%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0619-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0619%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0618-the-rexec-service-is-running-7decbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0618%3A%20The%20rexec%20service%20is%20running.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7decbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0617-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0617%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0616-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0616%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0615-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decb5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0615%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0614-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7decb3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0614%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7decb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0613-the-rpc-sprayd-service-is-running-7decb1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0613%3A%20The%20rpc.sprayd%20service%20is%20running.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7decb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0611-a-system-critical-windows-nt-registry-key-has-an-inappropriate-value-7decaf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0611%3A%20A%20system-critical%20Windows%20NT%20registry%20key%20has%20an%20inappropriate%20value.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7decaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0603-in-windows-nt-an-inappropriate-user-is-a-member-of-a-group-e-g-administrator-backup-operators-d-7deca2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0603%3A%20In%20Windows%20NT%2C%20an%20inappropriate%20user%20is%20a%20member%20of%20a%20group%2C%20e.g.%20Administrator%2C%20Backup%20Operators%2C%20D&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deca2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0602-a-network-intrusion-detection-system-ids-does-not-properly-reassemble-fragmented-packets-7deca0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0602%3A%20A%20network%20intrusion%20detection%20system%20(IDS)%20does%20not%20properly%20reassemble%20fragmented%20packets.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deca0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0601-a-network-intrusion-detection-system-ids-does-not-properly-handle-data-within-tcp-handshake-packet-7dec9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0601%3A%20A%20network%20intrusion%20detection%20system%20(IDS)%20does%20not%20properly%20handle%20data%20within%20TCP%20handshake%20packet&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0600-a-network-intrusion-detection-system-ids-does-not-verify-the-checksum-on-a-packet-7dec9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0600%3A%20A%20network%20intrusion%20detection%20system%20(IDS)%20does%20not%20verify%20the%20checksum%20on%20a%20packet.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0599-a-network-intrusion-detection-system-ids-does-not-properly-handle-packets-with-improper-sequence-n-7dec9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0599%3A%20A%20network%20intrusion%20detection%20system%20(IDS)%20does%20not%20properly%20handle%20packets%20with%20improper%20sequence%20n&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0598-a-network-intrusion-detection-system-ids-does-not-properly-handle-packets-that-are-sent-out-of-ord-7dec98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0598%3A%20A%20network%20intrusion%20detection%20system%20(IDS)%20does%20not%20properly%20handle%20packets%20that%20are%20sent%20out%20of%20ord&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0597-a-windows-nt-account-policy-does-not-forcibly-disconnect-remote-users-from-the-server-when-their-log-7dec96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0597%3A%20A%20Windows%20NT%20account%20policy%20does%20not%20forcibly%20disconnect%20remote%20users%20from%20the%20server%20when%20their%20log&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0596-a-windows-nt-log-file-has-an-inappropriate-maximum-size-or-retention-period-7dec94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0596%3A%20A%20Windows%20NT%20log%20file%20has%20an%20inappropriate%20maximum%20size%20or%20retention%20period.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0594-a-windows-nt-system-does-not-restrict-access-to-removable-media-drives-such-as-a-floppy-disk-drive-o-7dec92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0594%3A%20A%20Windows%20NT%20system%20does%20not%20restrict%20access%20to%20removable%20media%20drives%20such%20as%20a%20floppy%20disk%20drive%20o&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0593-the-default-setting-for-the-winlogon-key-entry-shutdownwithoutlogon-in-windows-nt-allows-users-with-7dec90</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0593%3A%20The%20default%20setting%20for%20the%20Winlogon%20key%20entry%20ShutdownWithoutLogon%20in%20Windows%20NT%20allows%20users%20with%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dec90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0592-the-logon-box-of-a-windows-nt-system-displays-the-name-of-the-last-user-who-logged-in-7dec83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0592%3A%20The%20Logon%20box%20of%20a%20Windows%20NT%20system%20displays%20the%20name%20of%20the%20last%20user%20who%20logged%20in.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0591-an-event-log-in-windows-nt-has-inappropriate-access-permissions-7dec81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0591%3A%20An%20event%20log%20in%20Windows%20NT%20has%20inappropriate%20access%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0589-a-system-critical-windows-nt-registry-key-has-inappropriate-permissions-7dec7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0589%3A%20A%20system-critical%20Windows%20NT%20registry%20key%20has%20inappropriate%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0588-a-filter-in-a-router-or-firewall-allows-unusual-fragmented-packets-7dec7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0588%3A%20A%20filter%20in%20a%20router%20or%20firewall%20allows%20unusual%20fragmented%20packets.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0587-a-www-server-is-not-running-in-a-restricted-file-system-e-g-through-a-chroot-thus-allowing-access-7dec7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0587%3A%20A%20WWW%20server%20is%20not%20running%20in%20a%20restricted%20file%20system%2C%20e.g.%20through%20a%20chroot%2C%20thus%20allowing%20access&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0586-a-network-service-is-running-on-a-nonstandard-port-7dec79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0586%3A%20A%20network%20service%20is%20running%20on%20a%20nonstandard%20port.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dec79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0584-a-windows-nt-file-system-is-not-ntfs-7dec77</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0584%3A%20A%20Windows%20NT%20file%20system%20is%20not%20NTFS.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0583-there-is-a-one-way-or-two-way-trust-relationship-between-windows-nt-domains-7dec75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0583%3A%20There%20is%20a%20one-way%20or%20two-way%20trust%20relationship%20between%20Windows%20NT%20domains.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0581-the-hkey-classes-root-key-in-a-windows-nt-system-has-inappropriate-system-critical-permissions-7dec73</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0581%3A%20The%20HKEY_CLASSES_ROOT%20key%20in%20a%20Windows%20NT%20system%20has%20inappropriate%2C%20system-critical%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0580-the-hkey-local-machine-key-in-a-windows-nt-system-has-inappropriate-system-critical-permissions-7dec71</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0580%3A%20The%20HKEY_LOCAL_MACHINE%20key%20in%20a%20Windows%20NT%20system%20has%20inappropriate%2C%20system-critical%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0579-a-windows-nt-system-s-registry-audit-policy-does-not-log-an-event-success-or-failure-for-non-critica-7dec64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0579%3A%20A%20Windows%20NT%20system&apos;s%20registry%20audit%20policy%20does%20not%20log%20an%20event%20success%20or%20failure%20for%20non-critica&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0578-a-windows-nt-system-s-registry-audit-policy-does-not-log-an-event-success-or-failure-for-security-cr-7dec62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0578%3A%20A%20Windows%20NT%20system&apos;s%20registry%20audit%20policy%20does%20not%20log%20an%20event%20success%20or%20failure%20for%20security-cr&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dec62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0577-a-windows-nt-system-s-file-audit-policy-does-not-log-an-event-success-or-failure-for-non-critical-fi-7dec60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0577%3A%20A%20Windows%20NT%20system&apos;s%20file%20audit%20policy%20does%20not%20log%20an%20event%20success%20or%20failure%20for%20non-critical%20fi&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0571-a-router-s-configuration-service-or-management-interface-such-as-a-web-server-or-telnet-is-configu-7dec5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0571%3A%20A%20router&apos;s%20configuration%20service%20or%20management%20interface%20(such%20as%20a%20web%20server%20or%20telnet)%20is%20configu&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0570-windows-nt-is-not-using-a-password-filter-utility-e-g-passfilt-dll-7dec5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0570%3A%20Windows%20NT%20is%20not%20using%20a%20password%20filter%20utility%2C%20e.g.%20PASSFILT.DLL.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0569-a-url-for-a-www-directory-allows-auto-indexing-which-provides-a-list-of-all-files-in-that-directory-7dec5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0569%3A%20A%20URL%20for%20a%20WWW%20directory%20allows%20auto-indexing%2C%20which%20provides%20a%20list%20of%20all%20files%20in%20that%20directory&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0568-rpc-admind-in-solaris-is-not-running-in-a-secure-mode-7dec58</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0568%3A%20rpc.admind%20in%20Solaris%20is%20not%20running%20in%20a%20secure%20mode.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0565-a-sendmail-alias-allows-input-to-be-piped-to-a-program-7dec56</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0565%3A%20A%20Sendmail%20alias%20allows%20input%20to%20be%20piped%20to%20a%20program.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0564-an-attacker-can-force-a-printer-to-print-arbitrary-documents-e-g-if-the-printer-doesn-t-require-a-7dec54</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0564%3A%20An%20attacker%20can%20force%20a%20printer%20to%20print%20arbitrary%20documents%20(e.g.%20if%20the%20printer%20doesn&apos;t%20require%20a%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0561-iis-has-the-exec-function-enabled-for-server-side-include-ssi-files-7dec52</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0561%3A%20IIS%20has%20the%20%23exec%20function%20enabled%20for%20Server%20Side%20Include%20(SSI)%20files.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec52</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0560-a-system-critical-windows-nt-file-or-directory-has-inappropriate-permissions-7dec45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0560%3A%20A%20system-critical%20Windows%20NT%20file%20or%20directory%20has%20inappropriate%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0559-a-system-critical-unix-file-or-directory-has-inappropriate-permissions-7dec43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0559%3A%20A%20system-critical%20Unix%20file%20or%20directory%20has%20inappropriate%20permissions.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0556-two-or-more-unix-accounts-have-the-same-uid-7dec41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0556%3A%20Two%20or%20more%20Unix%20accounts%20have%20the%20same%20UID.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0555-a-unix-account-with-a-name-other-than-root-has-uid-0-i-e-root-privileges-7dec3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0555%3A%20A%20Unix%20account%20with%20a%20name%20other%20than%20%22root%22%20has%20UID%200%2C%20i.e.%20root%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0554-nfs-exports-system-critical-data-to-the-world-e-g-or-a-password-file-7dec3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0554%3A%20NFS%20exports%20system-critical%20data%20to%20the%20world%2C%20e.g.%20%2F%20or%20a%20password%20file.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0549-windows-nt-automatically-logs-in-an-administrator-upon-rebooting-7dec3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0549%3A%20Windows%20NT%20automatically%20logs%20in%20an%20administrator%20upon%20rebooting.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0548-a-superfluous-nfs-server-is-running-but-it-is-not-importing-or-exporting-any-file-systems-7dec39</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0548%3A%20A%20superfluous%20NFS%20server%20is%20running%2C%20but%20it%20is%20not%20importing%20or%20exporting%20any%20file%20systems.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0547-an-ssh-server-allows-authentication-through-the-rhosts-file-7dec37</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0547%3A%20An%20SSH%20server%20allows%20authentication%20through%20the%20.rhosts%20file.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0539-a-trust-relationship-exists-between-two-unix-hosts-7dec35</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0539%3A%20A%20trust%20relationship%20exists%20between%20two%20Unix%20hosts.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0531-rejected-reason-do-not-use-this-candidate-number-consultids-none-reason-this-candidate-is-sol-7dec33</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0531%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20None.%20%20Reason%3A%20this%20candidate%20is%20sol&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dec33</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0530-a-system-is-operating-in-promiscuous-mode-which-allows-it-to-perform-packet-sniffing-7dec26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0530%3A%20A%20system%20is%20operating%20in%20%22promiscuous%22%20mode%20which%20allows%20it%20to%20perform%20packet%20sniffing.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0529-a-router-or-firewall-forwards-packets-that-claim-to-come-from-iana-reserved-or-private-addresses-e-7dec24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0529%3A%20A%20router%20or%20firewall%20forwards%20packets%20that%20claim%20to%20come%20from%20IANA%20reserved%20or%20private%20addresses%2C%20e.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0528-a-router-or-firewall-forwards-external-packets-that-claim-to-come-from-inside-the-network-that-the-r-7dec22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0528%3A%20A%20router%20or%20firewall%20forwards%20external%20packets%20that%20claim%20to%20come%20from%20inside%20the%20network%20that%20the%20r&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0527-the-permissions-for-system-critical-data-in-an-anonymous-ftp-account-are-inappropriate-for-example-7dec20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0527%3A%20The%20permissions%20for%20system-critical%20data%20in%20an%20anonymous%20FTP%20account%20are%20inappropriate.%20%20For%20example&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0523-icmp-echo-ping-is-allowed-from-arbitrary-hosts-7dec1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0523%3A%20ICMP%20echo%20(ping)%20is%20allowed%20from%20arbitrary%20hosts.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dec1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0520-a-system-critical-netbios-smb-share-has-inappropriate-access-control-7dec1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0520%3A%20A%20system-critical%20NETBIOS%2FSMB%20share%20has%20inappropriate%20access%20control.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dec1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0515-an-unrestricted-remote-trust-relationship-for-unix-systems-has-been-set-up-e-g-by-using-a-sign-i-7dec1a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0515%3A%20An%20unrestricted%20remote%20trust%20relationship%20for%20Unix%20systems%20has%20been%20set%20up%2C%20e.g.%20by%20using%20a%20%2B%20sign%20i&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0512-a-mail-server-is-explicitly-configured-to-allow-smtp-mail-relay-which-allows-abuse-by-spammers-7dec18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0512%3A%20A%20mail%20server%20is%20explicitly%20configured%20to%20allow%20SMTP%20mail%20relay%2C%20which%20allows%20abuse%20by%20spammers.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0497-anonymous-ftp-is-enabled-7dec16</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0497%3A%20Anonymous%20FTP%20is%20enabled.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dec16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0495-a-remote-attacker-can-gain-access-to-a-file-system-using-dot-dot-when-accessing-smb-shares-7dec14</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0495%3A%20A%20remote%20attacker%20can%20gain%20access%20to%20a%20file%20system%20using%20..%20%20(dot%20dot)%20when%20accessing%20SMB%20shares.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0465-remote-attackers-can-crash-lynx-and-internet-explorer-using-an-img-tag-with-a-large-width-parameter-7dec07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0465%3A%20Remote%20attackers%20can%20crash%20Lynx%20and%20Internet%20Explorer%20using%20an%20IMG%20tag%20with%20a%20large%20width%20parameter.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0454-a-remote-attacker-can-sometimes-identify-the-operating-system-of-a-host-based-on-how-it-reacts-to-so-7dec05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0454%3A%20A%20remote%20attacker%20can%20sometimes%20identify%20the%20operating%20system%20of%20a%20host%20based%20on%20how%20it%20reacts%20to%20so&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0453-an-attacker-can-identify-a-cisco-device-by-sending-a-syn-packet-to-port-1999-which-is-for-the-cisco-7dec03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0453%3A%20An%20attacker%20can%20identify%20a%20CISCO%20device%20by%20sending%20a%20SYN%20packet%20to%20port%201999%2C%20which%20is%20for%20the%20Cisco&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dec03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0452-a-service-or-application-has-a-backdoor-password-that-was-placed-there-by-the-developer-7dec01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0452%3A%20A%20service%20or%20application%20has%20a%20backdoor%20password%20that%20was%20placed%20there%20by%20the%20developer.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dec01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0448-iis-4-0-and-apache-log-http-request-methods-regardless-of-how-long-they-are-allowing-a-remote-atta-7debff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0448%3A%20IIS%204.0%20and%20Apache%20log%20HTTP%20request%20methods%2C%20regardless%20of%20how%20long%20they%20are%2C%20allowing%20a%20remote%20atta&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0401-a-race-condition-in-linux-2-2-1-allows-local-users-to-read-arbitrary-memory-from-proc-files-7debfd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0401%3A%20A%20race%20condition%20in%20Linux%202.2.1%20allows%20local%20users%20to%20read%20arbitrary%20memory%20from%20%2Fproc%20files.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7debfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0399-the-dcc-server-command-in-the-mirc-5-5-client-doesn-t-filter-characters-from-file-names-properly-al-7debfb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0399%3A%20The%20DCC%20server%20command%20in%20the%20Mirc%205.5%20client%20doesn&apos;t%20filter%20characters%20from%20file%20names%20properly%2C%20al&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0398-in-some-instances-of-ssh-1-2-27-and-2-0-11-on-linux-systems-ssh-will-allow-users-with-expired-accou-7debf9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0398%3A%20In%20some%20instances%20of%20SSH%201.2.27%20and%202.0.11%20on%20Linux%20systems%2C%20SSH%20will%20allow%20users%20with%20expired%20accou&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0395-a-race-condition-in-the-backweb-polite-agent-protocol-allows-an-attacker-to-spoof-a-backweb-server-7debf5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0395%3A%20A%20race%20condition%20in%20the%20BackWeb%20Polite%20Agent%20Protocol%20allows%20an%20attacker%20to%20spoof%20a%20BackWeb%20server.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0394-dpec-online-courseware-allows-an-attacker-to-change-another-user-s-password-without-knowing-the-orig-7debe8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0394%3A%20DPEC%20Online%20Courseware%20allows%20an%20attacker%20to%20change%20another%20user&apos;s%20password%20without%20knowing%20the%20orig&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0393-remote-attackers-can-cause-a-denial-of-service-in-sendmail-8-8-x-and-8-9-2-by-sending-messages-with-7debe6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0393%3A%20Remote%20attackers%20can%20cause%20a%20denial%20of%20service%20in%20Sendmail%208.8.x%20and%208.9.2%20by%20sending%20messages%20with%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0388-datalynx-suguard-trusts-the-path-environment-variable-to-execute-the-ps-command-allowing-local-user-7debe4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0388%3A%20DataLynx%20suGuard%20trusts%20the%20PATH%20environment%20variable%20to%20execute%20the%20ps%20command%2C%20allowing%20local%20user&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0384-the-forms-2-0-activex-control-included-with-visual-basic-for-applications-5-0-can-be-used-to-read-7debe2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0384%3A%20The%20Forms%202.0%20ActiveX%20control%20(included%20with%20Visual%20Basic%20for%20Applications%205.0)%20can%20be%20used%20to%20read%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0364-microsoft-access-97-stores-a-database-password-as-plaintext-in-a-foreign-mdb-allowing-access-to-dat-7debe0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0364%3A%20Microsoft%20Access%2097%20stores%20a%20database%20password%20as%20plaintext%20in%20a%20foreign%20mdb%2C%20allowing%20access%20to%20dat&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0361-netware-version-of-laserfiche-stores-usernames-and-passwords-unencrypted-and-allows-administrative-7debde</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0361%3A%20NetWare%20version%20of%20LaserFiche%20stores%20usernames%20and%20passwords%20unencrypted%2C%20and%20allows%20administrative%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0355-local-or-remote-users-can-force-controlit-4-5-to-reboot-or-force-a-user-to-log-out-resulting-in-a-d-7debdc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0355%3A%20Local%20or%20remote%20users%20can%20force%20ControlIT%204.5%20to%20reboot%20or%20force%20a%20user%20to%20log%20out%2C%20resulting%20in%20a%20d&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debdc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0286-in-some-nt-web-servers-appending-a-space-at-the-end-of-a-url-may-allow-attackers-to-read-source-cod-7debda</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0286%3A%20In%20some%20NT%20web%20servers%2C%20appending%20a%20space%20at%20the%20end%20of%20a%20URL%20may%20allow%20attackers%20to%20read%20source%20cod&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debda</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0285-denial-of-service-in-telnet-from-the-windows-nt-resource-kit-by-opening-then-immediately-closing-a-7debd8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0285%3A%20Denial%20of%20service%20in%20telnet%20from%20the%20Windows%20NT%20Resource%20Kit%2C%20by%20opening%20then%20immediately%20closing%20a%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debd8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0283-the-java-web-server-would-allow-remote-users-to-obtain-the-source-code-for-cgi-programs-7debd6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0283%3A%20The%20Java%20Web%20Server%20would%20allow%20remote%20users%20to%20obtain%20the%20source%20code%20for%20CGI%20programs.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debd6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0276-msql-v2-0-1-and-below-allows-remote-execution-through-a-buffer-overflow-7debc9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0276%3A%20mSQL%20v2.0.1%20and%20below%20allows%20remote%20execution%20through%20a%20buffer%20overflow.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0268-metainfo-metaweb-web-server-allows-users-to-upload-execute-and-read-scripts-7debc7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0268%3A%20MetaInfo%20MetaWeb%20web%20server%20allows%20users%20to%20upload%2C%20execute%2C%20and%20read%20scripts.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0255-buffer-overflow-in-ircd-allows-arbitrary-command-execution-7debc5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0255%3A%20Buffer%20overflow%20in%20ircd%20allows%20arbitrary%20command%20execution.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0248-a-race-condition-in-the-authentication-agent-mechanism-of-sshd-1-2-17-allows-an-attacker-to-steal-an-7debc3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0248%3A%20A%20race%20condition%20in%20the%20authentication%20agent%20mechanism%20of%20sshd%201.2.17%20allows%20an%20attacker%20to%20steal%20an&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0243-linux-cfingerd-could-be-exploited-to-gain-root-access-7debc1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0243%3A%20Linux%20cfingerd%20could%20be%20exploited%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0240-some-filters-or-firewalls-allow-fragmented-syn-packets-with-ip-reserved-bits-in-violation-of-their-i-7debbf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0240%3A%20Some%20filters%20or%20firewalls%20allow%20fragmented%20SYN%20packets%20with%20IP%20reserved%20bits%20in%20violation%20of%20their%20i&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0231-buffer-overflow-in-ip-switch-imail-and-seattle-labs-slmail-2-6-packages-using-a-long-vrfy-command-c-7debbd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0231%3A%20Buffer%20overflow%20in%20IP-Switch%20IMail%20and%20Seattle%20Labs%20Slmail%202.6%20packages%20using%20a%20long%20VRFY%20command%2C%20c&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0226-windows-nt-tcp-ip-processes-fragmented-ip-packets-improperly-causing-a-denial-of-service-7debbb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0226%3A%20Windows%20NT%20TCP%2FIP%20processes%20fragmented%20IP%20packets%20improperly%2C%20causing%20a%20denial%20of%20service.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0220-attackers-can-do-a-denial-of-service-of-irc-by-crashing-the-server-7debb9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0220%3A%20Attackers%20can%20do%20a%20denial%20of%20service%20of%20IRC%20by%20crashing%20the%20server.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0205-denial-of-service-in-sendmail-8-6-11-and-8-6-12-7debb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0205%3A%20Denial%20of%20service%20in%20Sendmail%208.6.11%20and%208.6.12.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7debb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0200-windows-nt-ftp-server-wftp-with-the-guest-account-enabled-without-a-password-allows-an-attacker-to-7debaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0200%3A%20Windows%20NT%20FTP%20server%20(WFTP)%20with%20the%20guest%20account%20enabled%20without%20a%20password%20allows%20an%20attacker%20to&amp;severity=high&amp;id=682ca32bb6fd31d6ed7debaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0198-finger-host-on-some-systems-may-print-information-on-some-user-accounts-7deba8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0198%3A%20finger%20.%40host%20on%20some%20systems%20may%20print%20information%20on%20some%20user%20accounts.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0197-finger-0-host-on-some-systems-may-print-information-on-some-user-accounts-7deba6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0197%3A%20finger%200%40host%20on%20some%20systems%20may%20print%20information%20on%20some%20user%20accounts.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deba6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0187-rejected-reason-do-not-use-this-candidate-number-consultids-cve-1999-0022-reason-this-candida-7deba4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0187%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20CVE-1999-0022.%20%20Reason%3A%20This%20candida&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deba4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0110-rejected-reason-do-not-use-this-candidate-number-consultids-cve-1999-0315-reason-this-candida-7deba2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0110%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20CVE-1999-0315.%20%20Reason%3A%20This%20candida&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deba2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0020-rejected-reason-do-not-use-this-candidate-number-consultids-cve-1999-0032-reason-this-candida-7deba0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0020%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20CVE-1999-0032.%20%20Reason%3A%20This%20candida&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deba0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1159-ssh-2-0-11-and-earlier-allows-local-users-to-request-remote-forwarding-from-privileged-ports-without-7deb9e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1159%3A%20SSH%202.0.11%20and%20earlier%20allows%20local%20users%20to%20request%20remote%20forwarding%20from%20privileged%20ports%20without&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1285-linux-2-1-132-and-earlier-allows-local-users-to-cause-a-denial-of-service-resource-exhaustion-by-r-7deb9c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1285%3A%20Linux%202.1.132%20and%20earlier%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20(resource%20exhaustion)%20by%20r&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1188-mysqld-in-mysql-3-21-creates-log-files-with-world-readable-permissions-which-allows-local-users-to-7deb9a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1188%3A%20mysqld%20in%20MySQL%203.21%20creates%20log%20files%20with%20world-readable%20permissions%2C%20which%20allows%20local%20users%20to%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1281-development-version-of-breeze-network-server-allows-remote-attackers-to-cause-the-system-to-reboot-b-7deb98</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1281%3A%20Development%20version%20of%20Breeze%20Network%20Server%20allows%20remote%20attackers%20to%20cause%20the%20system%20to%20reboot%20b&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0968-buffer-overflow-in-bnc-irc-proxy-allows-remote-attackers-to-gain-privileges-7deb8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0968%3A%20Buffer%20overflow%20in%20BNC%20IRC%20proxy%20allows%20remote%20attackers%20to%20gain%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1278-nlog-cgi-scripts-do-not-properly-filter-shell-metacharacters-from-the-ip-address-argument-which-cou-7deb89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1278%3A%20nlog%20CGI%20scripts%20do%20not%20properly%20filter%20shell%20metacharacters%20from%20the%20IP%20address%20argument%2C%20which%20cou&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1277-backweb-client-stores-the-username-and-password-in-cleartext-for-proxy-authentication-in-the-communi-7deb87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1277%3A%20BackWeb%20client%20stores%20the%20username%20and%20password%20in%20cleartext%20for%20proxy%20authentication%20in%20the%20Communi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1173-corel-word-perfect-8-for-linux-creates-a-temporary-working-directory-with-world-writable-permissions-7deb85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1173%3A%20Corel%20Word%20Perfect%208%20for%20Linux%20creates%20a%20temporary%20working%20directory%20with%20world-writable%20permissions&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deb85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0188-the-passwd-command-in-solaris-can-be-subjected-to-a-denial-of-service-7deb83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0188%3A%20The%20passwd%20command%20in%20Solaris%20can%20be%20subjected%20to%20a%20denial%20of%20service.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0139-buffer-overflow-in-solaris-x86-mkcookie-allows-local-users-to-obtain-root-access-7deb81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0139%3A%20Buffer%20overflow%20in%20Solaris%20x86%20mkcookie%20allows%20local%20users%20to%20obtain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1282-realsystem-g2-server-stores-the-administrator-password-in-cleartext-in-a-world-readable-configuratio-7deb7f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1282%3A%20RealSystem%20G2%20server%20stores%20the%20administrator%20password%20in%20cleartext%20in%20a%20world-readable%20configuratio&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1276-fte-console-in-the-fte-package-before-0-46b-4-1-does-not-drop-root-privileges-which-allows-local-us-7deb7d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1276%3A%20fte-console%20in%20the%20fte%20package%20before%200.46b-4.1%20does%20not%20drop%20root%20privileges%2C%20which%20allows%20local%20us&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1147-buffer-overflow-in-platinum-policy-compliance-manager-pcm-7-0-allows-remote-attackers-to-execute-a-7deb7b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1147%3A%20Buffer%20overflow%20in%20Platinum%20Policy%20Compliance%20Manager%20(PCM)%207.0%20allows%20remote%20attackers%20to%20execute%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0798-buffer-overflow-in-bootpd-on-openbsd-freebsd-and-linux-systems-via-a-malformed-header-type-7deb79</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0798%3A%20Buffer%20overflow%20in%20bootpd%20on%20OpenBSD%2C%20FreeBSD%2C%20and%20Linux%20systems%20via%20a%20malformed%20header%20type.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1280-hummingbird-exceed-6-0-1-0-inadvertently-includes-a-dll-that-was-meant-for-development-and-testing-7deb6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1280%3A%20Hummingbird%20Exceed%206.0.1.0%20inadvertently%20includes%20a%20DLL%20that%20was%20meant%20for%20development%20and%20testing%2C%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0937-bnbform-allows-remote-attackers-to-read-arbitrary-files-via-the-automessage-hidden-form-variable-7deb6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0937%3A%20BNBForm%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20the%20automessage%20hidden%20form%20variable.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0936-bnbsurvey-survey-cgi-program-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-7deb68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0936%3A%20BNBSurvey%20survey.cgi%20program%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0836-unixware-uidadmin-allows-local-users-to-modify-arbitrary-files-via-a-symlink-attack-7deb66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0836%3A%20UnixWare%20uidadmin%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0869-internet-explorer-3-x-to-4-01-allows-a-remote-attacker-to-insert-malicious-content-into-a-frame-of-a-7deb64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0869%3A%20Internet%20Explorer%203.x%20to%204.01%20allows%20a%20remote%20attacker%20to%20insert%20malicious%20content%20into%20a%20frame%20of%20a&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deb64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0478-denial-of-service-in-hp-ux-sendmail-8-8-6-related-to-accepting-connections-7deb62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0478%3A%20Denial%20of%20service%20in%20HP-UX%20sendmail%208.8.6%20related%20to%20accepting%20connections.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0463-remote-attackers-can-perform-a-denial-of-service-using-irix-fcagent-7deb60</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0463%3A%20Remote%20attackers%20can%20perform%20a%20denial%20of%20service%20using%20IRIX%20fcagent.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0385-the-ldap-bind-function-in-exchange-5-5-has-a-buffer-overflow-that-allows-a-remote-attacker-to-conduc-7deb5e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0385%3A%20The%20LDAP%20bind%20function%20in%20Exchange%205.5%20has%20a%20buffer%20overflow%20that%20allows%20a%20remote%20attacker%20to%20conduc&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0342-linux-pam-modules-allow-local-users-to-gain-root-access-using-temporary-files-7deb5c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0342%3A%20Linux%20PAM%20modules%20allow%20local%20users%20to%20gain%20root%20access%20using%20temporary%20files.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0332-buffer-overflow-in-netmeeting-allows-denial-of-service-and-remote-command-execution-7deb5a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0332%3A%20Buffer%20overflow%20in%20NetMeeting%20allows%20denial%20of%20service%20and%20remote%20command%20execution.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0321-buffer-overflow-in-solaris-kcms-configure-command-allows-local-users-to-gain-root-access-7deb4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0321%3A%20Buffer%20overflow%20in%20Solaris%20kcms_configure%20command%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1073-excite-for-web-servers-ews-1-1-records-the-first-two-characters-of-a-plaintext-password-in-the-beg-7deb4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1073%3A%20Excite%20for%20Web%20Servers%20(EWS)%201.1%20records%20the%20first%20two%20characters%20of%20a%20plaintext%20password%20in%20the%20beg&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1072-excite-for-web-servers-ews-1-1-allows-local-users-to-gain-privileges-by-obtaining-the-encrypted-pa-7deb49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1072%3A%20Excite%20for%20Web%20Servers%20(EWS)%201.1%20allows%20local%20users%20to%20gain%20privileges%20by%20obtaining%20the%20encrypted%20pa&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1071-excite-for-web-servers-ews-1-1-installs-the-architext-conf-authentication-file-with-world-writeabl-7deb47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1071%3A%20Excite%20for%20Web%20Servers%20(EWS)%201.1%20installs%20the%20Architext.conf%20authentication%20file%20with%20world-writeabl&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1411-the-installation-of-the-fsp-package-2-71-10-in-debian-gnu-linux-2-0-adds-the-anonymous-ftp-user-with-7deb45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1411%3A%20The%20installation%20of%20the%20fsp%20package%202.71-10%20in%20Debian%20GNU%2FLinux%202.0%20adds%20the%20anonymous%20FTP%20user%20with&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1288-samba-1-9-18-inadvertently-includes-a-prototype-application-wsmbconf-which-is-installed-with-incor-7deb43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1288%3A%20Samba%201.9.18%20inadvertently%20includes%20a%20prototype%20application%2C%20wsmbconf%2C%20which%20is%20installed%20with%20incor&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1108-rejected-reason-do-not-use-this-candidate-number-consultids-cve-1999-1107-reason-this-candida-7deb41</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1108%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20CVE-1999-1107.%20%20Reason%3A%20This%20candida&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1107-buffer-overflow-in-kppp-in-kde-allows-local-users-to-gain-root-access-via-a-long-path-environmental-7deb3f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1107%3A%20Buffer%20overflow%20in%20kppp%20in%20KDE%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20PATH%20environmental%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0782-kde-kppp-allows-local-users-to-create-a-directory-in-an-arbitrary-location-via-the-home-environmenta-7deb3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0782%3A%20KDE%20kppp%20allows%20local%20users%20to%20create%20a%20directory%20in%20an%20arbitrary%20location%20via%20the%20HOME%20environmenta&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deb3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0781-kde-allows-local-users-to-execute-arbitrary-commands-by-setting-the-kdedir-environmental-variable-to-7deb3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0781%3A%20KDE%20allows%20local%20users%20to%20execute%20arbitrary%20commands%20by%20setting%20the%20KDEDIR%20environmental%20variable%20to&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0780-kde-klock-allows-local-users-to-kill-arbitrary-processes-by-specifying-an-arbitrary-pid-in-the-kss-7deb2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0780%3A%20KDE%20klock%20allows%20local%20users%20to%20kill%20arbitrary%20processes%20by%20specifying%20an%20arbitrary%20PID%20in%20the%20.kss.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0057-vacation-program-allows-command-execution-by-remote-users-through-a-sendmail-command-7deb2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0057%3A%20Vacation%20program%20allows%20command%20execution%20by%20remote%20users%20through%20a%20sendmail%20command.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1322-the-installation-of-1arcserve-backup-and-inoculan-av-client-modules-for-exchange-create-a-log-file-7deb2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1322%3A%20The%20installation%20of%201ArcServe%20Backup%20and%20Inoculan%20AV%20client%20modules%20for%20Exchange%20create%20a%20log%20file%2C%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1025-cde-screen-lock-program-screenlock-on-solaris-2-6-does-not-properly-lock-an-unprivileged-user-s-co-7deb28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1025%3A%20CDE%20screen%20lock%20program%20(screenlock)%20on%20Solaris%202.6%20does%20not%20properly%20lock%20an%20unprivileged%20user&apos;s%20co&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1155-lakeweb-mail-list-cgi-script-allows-remote-attackers-to-execute-arbitrary-commands-via-shell-metacha-7deb24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1155%3A%20LakeWeb%20Mail%20List%20CGI%20script%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shell%20metacha&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1154-lakeweb-filemail-cgi-script-allows-remote-attackers-to-execute-arbitrary-commands-via-shell-metachar-7deb22</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1154%3A%20LakeWeb%20Filemail%20CGI%20script%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shell%20metachar&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1153-hamcards-postcard-cgi-script-1-0-allows-remote-attackers-to-execute-arbitrary-commands-via-shell-met-7deb20</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1153%3A%20HAMcards%20Postcard%20CGI%20script%201.0%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shell%20met&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1321-buffer-overflow-in-ssh-1-2-26-client-with-kerberos-v-enabled-could-allow-remote-attackers-to-cause-a-7deb1e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1321%3A%20Buffer%20overflow%20in%20ssh%201.2.26%20client%20with%20Kerberos%20V%20enabled%20could%20allow%20remote%20attackers%20to%20cause%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1284-nukenabber-allows-remote-attackers-to-cause-a-denial-of-service-by-connecting-to-the-nukenabber-port-7deb1c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1284%3A%20NukeNabber%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20connecting%20to%20the%20NukeNabber%20port&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0052-ip-fragmentation-denial-of-service-in-freebsd-allows-a-remote-attacker-to-cause-a-crash-7deb0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0052%3A%20IP%20fragmentation%20denial%20of%20service%20in%20FreeBSD%20allows%20a%20remote%20attacker%20to%20cause%20a%20crash.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1459-bmc-patrol-agent-before-3-2-07-allows-local-users-to-gain-root-privileges-via-a-symlink-attack-on-a-7deb0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1459%3A%20BMC%20PATROL%20Agent%20before%203.2.07%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20symlink%20attack%20on%20a%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0254-a-hidden-snmp-community-string-in-hp-openview-allows-remote-attackers-to-modify-mib-tables-and-obtai-7deb0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0254%3A%20A%20hidden%20SNMP%20community%20string%20in%20HP%20OpenView%20allows%20remote%20attackers%20to%20modify%20MIB%20tables%20and%20obtai&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0118-aix-infod-allows-local-users-to-gain-root-access-through-an-x-display-7deb09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0118%3A%20AIX%20infod%20allows%20local%20users%20to%20gain%20root%20access%20through%20an%20X%20display.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0215-routed-allows-attackers-to-append-data-to-files-7deb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0215%3A%20Routed%20allows%20attackers%20to%20append%20data%20to%20files.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0088-irix-and-aix-automountd-services-autofsd-allow-remote-users-to-execute-root-commands-7deb05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0088%3A%20IRIX%20and%20AIX%20automountd%20services%20(autofsd)%20allow%20remote%20users%20to%20execute%20root%20commands.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0053-tcp-rst-denial-of-service-in-freebsd-7deb03</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0053%3A%20TCP%20RST%20denial%20of%20service%20in%20FreeBSD.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deb03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0002-buffer-overflow-in-nfs-mountd-gives-root-access-to-remote-attackers-mostly-in-linux-systems-7deb01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0002%3A%20Buffer%20overflow%20in%20NFS%20mountd%20gives%20root%20access%20to%20remote%20attackers%2C%20mostly%20in%20Linux%20systems.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deb01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1381-buffer-overflow-in-dbadmin-cgi-program-1-0-1-on-linux-allows-remote-attackers-to-execute-arbitrary-c-7deaff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1381%3A%20Buffer%20overflow%20in%20dbadmin%20CGI%20program%201.0.1%20on%20Linux%20allows%20remote%20attackers%20to%20execute%20arbitrary%20c&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1185-buffer-overflow-in-sco-mscreen-allows-local-users-to-gain-root-privileges-via-a-long-terminal-entry-7deafd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1185%3A%20Buffer%20overflow%20in%20SCO%20mscreen%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20terminal%20entry%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deafd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1291-tcp-ip-implementation-in-microsoft-windows-95-windows-nt-4-0-and-possibly-others-allows-remote-at-7deaf0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1291%3A%20TCP%2FIP%20implementation%20in%20Microsoft%20Windows%2095%2C%20Windows%20NT%204.0%2C%20and%20possibly%20others%2C%20allows%20remote%20at&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deaf0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1404-ibm-tivoli-opc-tracker-agent-version-2-release-1-allows-remote-attackers-to-cause-a-denial-of-servic-7deaee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1404%3A%20IBM%2FTivoli%20OPC%20Tracker%20Agent%20version%202%20release%201%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20servic&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deaee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1403-ibm-tivoli-opc-tracker-agent-version-2-release-1-creates-files-directories-and-ipc-message-queues-7deaec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1403%3A%20IBM%2FTivoli%20OPC%20Tracker%20Agent%20version%202%20release%201%20creates%20files%2C%20directories%2C%20and%20IPC%20message%20queues%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0343-a-malicious-palace-server-can-force-a-client-to-execute-arbitrary-programs-7deaea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0343%3A%20A%20malicious%20Palace%20server%20can%20force%20a%20client%20to%20execute%20arbitrary%20programs.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0870-internet-explorer-4-01-allows-remote-attackers-to-read-arbitrary-files-by-pasting-a-file-name-into-t-7deae8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0870%3A%20Internet%20Explorer%204.01%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20by%20pasting%20a%20file%20name%20into%20t&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0546-the-windows-nt-guest-account-is-enabled-7deae6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0546%3A%20The%20Windows%20NT%20guest%20account%20is%20enabled.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0506-a-windows-nt-domain-user-or-administrator-account-has-a-default-null-blank-or-missing-password-7deae4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0506%3A%20A%20Windows%20NT%20domain%20user%20or%20administrator%20account%20has%20a%20default%2C%20null%2C%20blank%2C%20or%20missing%20password.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0505-a-windows-nt-domain-user-or-administrator-account-has-a-guessable-password-7deae2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0505%3A%20A%20Windows%20NT%20domain%20user%20or%20administrator%20account%20has%20a%20guessable%20password.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0186-in-solaris-an-snmp-subagent-has-a-default-community-string-that-allows-remote-attackers-to-execute-7deae0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0186%3A%20In%20Solaris%2C%20an%20SNMP%20subagent%20has%20a%20default%20community%20string%20that%20allows%20remote%20attackers%20to%20execute%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1181-vulnerability-in-on-line-customer-registration-software-for-irix-6-2-through-6-4-allows-local-users-7deade</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1181%3A%20Vulnerability%20in%20On-Line%20Customer%20Registration%20software%20for%20IRIX%206.2%20through%206.4%20allows%20local%20users%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0969-the-windows-nt-rpc-service-allows-remote-attackers-to-conduct-a-denial-of-service-using-spoofed-malf-7dead1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0969%3A%20The%20Windows%20NT%20RPC%20service%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service%20using%20spoofed%20malf&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dead1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1228-various-modems-that-do-not-implement-a-guard-time-or-are-configured-with-a-guard-time-of-0-can-all-7deacf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1228%3A%20Various%20modems%20that%20do%20not%20implement%20a%20guard%20time%2C%20or%20are%20configured%20with%20a%20guard%20time%20of%200%2C%20can%20all&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deacf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1054-the-default-configuration-of-flexlm-license-manager-6-0d-and-possibly-other-versions-allows-remote-7deacd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1054%3A%20The%20default%20configuration%20of%20FLEXlm%20license%20manager%206.0d%2C%20and%20possibly%20other%20versions%2C%20allows%20remote&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deacd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1265-smtp-server-in-slmail-3-1-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-via-malfo-7deacb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1265%3A%20SMTP%20server%20in%20SLmail%203.1%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20malfo&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deacb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1020-the-installation-of-novell-netware-nds-5-99-provides-an-unauthenticated-client-with-read-access-for-7deac9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1020%3A%20The%20installation%20of%20Novell%20Netware%20NDS%205.99%20provides%20an%20unauthenticated%20client%20with%20Read%20access%20for%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deac9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0897-ichat-rooms-webserver-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attack-7deac7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0897%3A%20iChat%20ROOMS%20Webserver%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deac7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0056-buffer-overflow-in-sun-s-ping-program-can-give-root-access-to-local-users-7deac5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0056%3A%20Buffer%20overflow%20in%20Sun&apos;s%20ping%20program%20can%20give%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1048-buffer-overflow-in-bash-2-0-0-1-4-17-and-other-versions-allows-local-attackers-to-gain-privileges-7deac3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1048%3A%20Buffer%20overflow%20in%20bash%202.0.0%2C%201.4.17%2C%20and%20other%20versions%20allows%20local%20attackers%20to%20gain%20privileges%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0871-internet-explorer-4-0-and-4-01-allow-a-remote-attacker-to-read-files-via-ie-s-cross-frame-security-7deac1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0871%3A%20Internet%20Explorer%204.0%20and%204.01%20allow%20a%20remote%20attacker%20to%20read%20files%20via%20IE&apos;s%20cross%20frame%20security%2C%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7deac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0930-wwwboard-allows-a-remote-attacker-to-delete-message-board-articles-via-a-malformed-argument-7deabf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0930%3A%20wwwboard%20allows%20a%20remote%20attacker%20to%20delete%20message%20board%20articles%20via%20a%20malformed%20argument.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0779-denial-of-service-in-hp-ux-sharedx-recserv-program-7deab2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0779%3A%20Denial%20of%20service%20in%20HP-UX%20SharedX%20recserv%20program.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deab2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1292-buffer-overflow-in-web-administration-feature-of-kolban-webcam32-4-8-3-and-earlier-allows-remote-att-7deab0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1292%3A%20Buffer%20overflow%20in%20web%20administration%20feature%20of%20Kolban%20Webcam32%204.8.3%20and%20earlier%20allows%20remote%20att&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deab0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0792-routermate-has-a-default-snmp-community-name-which-allows-remote-attackers-to-modify-its-configurati-7deaae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0792%3A%20ROUTERmate%20has%20a%20default%20SNMP%20community%20name%20which%20allows%20remote%20attackers%20to%20modify%20its%20configurati&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deaae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0310-ssh-1-2-25-on-hp-ux-allows-access-to-new-user-accounts-7deaac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0310%3A%20SSH%201.2.25%20on%20HP-UX%20allows%20access%20to%20new%20user%20accounts.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0302-sunos-solaris-ftp-clients-can-be-forced-to-execute-arbitrary-commands-from-a-malicious-ftp-server-7deaaa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0302%3A%20SunOS%2FSolaris%20FTP%20clients%20can%20be%20forced%20to%20execute%20arbitrary%20commands%20from%20a%20malicious%20FTP%20server.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaaa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0162-the-established-keyword-in-some-cisco-ios-software-allowed-an-attacker-to-bypass-filtering-7deaa8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0162%3A%20The%20%22established%22%20keyword%20in%20some%20Cisco%20IOS%20software%20allowed%20an%20attacker%20to%20bypass%20filtering.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deaa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0158-cisco-pix-firewall-manager-pfm-on-windows-nt-allows-attackers-to-connect-to-port-8080-on-the-pfm-s-7deaa6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0158%3A%20Cisco%20PIX%20firewall%20manager%20(PFM)%20on%20Windows%20NT%20allows%20attackers%20to%20connect%20to%20port%208080%20on%20the%20PFM%20s&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7deaa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0065-multiple-buffer-overflows-in-how-dtmail-handles-attachments-allows-a-remote-attacker-to-execute-comm-7deaa4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0065%3A%20Multiple%20buffer%20overflows%20in%20how%20dtmail%20handles%20attachments%20allows%20a%20remote%20attacker%20to%20execute%20comm&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1041-buffer-overflow-in-mscreen-on-sco-openserver-5-0-and-sco-unix-3-2v4-allows-a-local-user-to-gain-root-7deaa2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1041%3A%20Buffer%20overflow%20in%20mscreen%20on%20SCO%20OpenServer%205.0%20and%20SCO%20UNIX%203.2v4%20allows%20a%20local%20user%20to%20gain%20root&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1417-format-string-vulnerability-in-answerbook2-ab2-web-server-dwhttpd-3-1a4-allows-remote-attackers-to-7deaa0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1417%3A%20Format%20string%20vulnerability%20in%20AnswerBook2%20(AB2)%20web%20server%20dwhttpd%203.1a4%20allows%20remote%20attackers%20to&amp;severity=high&amp;id=682ca32bb6fd31d6ed7deaa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1416-answerbook2-ab2-web-server-dwhttpd-3-1a4-allows-remote-attackers-to-cause-a-denial-of-service-res-7dea93</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1416%3A%20AnswerBook2%20(AB2)%20web%20server%20dwhttpd%203.1a4%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(res&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea93</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0157-cisco-pix-firewall-and-cbac-ip-fragmentation-attack-results-in-a-denial-of-service-7dea91</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0157%3A%20Cisco%20PIX%20firewall%20and%20CBAC%20IP%20fragmentation%20attack%20results%20in%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea91</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1283-opera-3-2-1-allows-remote-attackers-to-cause-a-denial-of-service-application-crash-via-a-url-that-7dea8f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1283%3A%20Opera%203.2.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(application%20crash)%20via%20a%20URL%20that%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0159-attackers-can-crash-a-cisco-ios-router-or-device-provided-they-can-get-to-an-interactive-prompt-su-7dea8d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0159%3A%20Attackers%20can%20crash%20a%20Cisco%20IOS%20router%20or%20device%2C%20provided%20they%20can%20get%20to%20an%20interactive%20prompt%20(su&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1199-apache-www-server-1-3-1-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-resource-e-7dea8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1199%3A%20Apache%20WWW%20server%201.3.1%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(resource%20e&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0262-hylafax-faxsurvey-cgi-script-on-linux-allows-remote-attackers-to-execute-arbitrary-commands-via-shel-7dea89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0262%3A%20Hylafax%20faxsurvey%20CGI%20script%20on%20Linux%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shel&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0062-the-chpass-command-in-openbsd-allows-a-local-user-to-gain-root-access-through-file-descriptor-leakag-7dea87</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0062%3A%20The%20chpass%20command%20in%20OpenBSD%20allows%20a%20local%20user%20to%20gain%20root%20access%20through%20file%20descriptor%20leakag&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0516-an-snmp-community-name-is-guessable-7dea85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0516%3A%20An%20SNMP%20community%20name%20is%20guessable.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0344-nt-users-can-gain-debug-level-access-on-a-system-process-using-the-sechole-exploit-7dea83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0344%3A%20NT%20users%20can%20gain%20debug-level%20access%20on%20a%20system%20process%20using%20the%20Sechole%20exploit.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0339-buffer-overflow-in-the-libauth-library-in-solaris-allows-local-users-to-gain-additional-privileges-7dea81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0339%3A%20Buffer%20overflow%20in%20the%20libauth%20library%20in%20Solaris%20allows%20local%20users%20to%20gain%20additional%20privileges%2C%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0333-hp-openview-omniback-allows-remote-execution-of-commands-as-root-via-spoofing-and-local-users-can-g-7dea74</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0333%3A%20HP%20OpenView%20Omniback%20allows%20remote%20execution%20of%20commands%20as%20root%20via%20spoofing%2C%20and%20local%20users%20can%20g&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0288-the-wins-server-in-microsoft-windows-nt-4-0-before-sp4-allows-remote-attackers-to-cause-a-denial-of-7dea72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0288%3A%20The%20WINS%20server%20in%20Microsoft%20Windows%20NT%204.0%20before%20SP4%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0269-netscape-enterprise-servers-may-list-files-through-the-pageservices-query-7dea70</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0269%3A%20Netscape%20Enterprise%20servers%20may%20list%20files%20through%20the%20PageServices%20query.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1136-vulnerability-in-predictive-on-hp-ux-11-0-and-earlier-and-mpe-ix-5-5-and-earlier-allows-attackers-7dea6e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1136%3A%20Vulnerability%20in%20Predictive%20on%20HP-UX%2011.0%20and%20earlier%2C%20and%20MPE%2FiX%205.5%20and%20earlier%2C%20allows%20attackers%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1448-eudora-and-eudora-light-before-3-05-allows-remote-attackers-to-cause-a-crash-and-corrupt-the-user-s-7dea6c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1448%3A%20Eudora%20and%20Eudora%20Light%20before%203.05%20allows%20remote%20attackers%20to%20cause%20a%20crash%20and%20corrupt%20the%20user&apos;s%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1406-dumpreg-in-red-hat-linux-5-1-opens-dev-mem-with-o-rdwr-access-which-allows-local-users-to-cause-a-7dea6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1406%3A%20dumpreg%20in%20Red%20Hat%20Linux%205.1%20opens%20%2Fdev%2Fmem%20with%20O_RDWR%20access%2C%20which%20allows%20local%20users%20to%20cause%20a%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dea6a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1447-internet-explorer-4-0-allows-remote-attackers-to-cause-a-denial-of-service-crash-via-html-code-tha-7dea68</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1447%3A%20Internet%20Explorer%204.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20HTML%20code%20tha&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0941-mutt-mail-client-allows-a-remote-attacker-to-execute-commands-via-shell-metacharacters-7dea66</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0941%3A%20Mutt%20mail%20client%20allows%20a%20remote%20attacker%20to%20execute%20commands%20via%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1070-buffer-overflow-in-ping-cgi-program-in-xylogics-annex-terminal-service-allows-remote-attackers-to-ca-7dea64</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1070%3A%20Buffer%20overflow%20in%20ping%20CGI%20program%20in%20Xylogics%20Annex%20terminal%20service%20allows%20remote%20attackers%20to%20ca&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1421-nbase-switches-nh208-and-nh215-run-a-tftp-server-which-allows-remote-attackers-to-send-software-upda-7dea62</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1421%3A%20NBase%20switches%20NH208%20and%20NH215%20run%20a%20TFTP%20server%20which%20allows%20remote%20attackers%20to%20send%20software%20upda&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1420-nbase-switches-nh2012-nh2012r-nh2015-and-nh2048-have-a-back-door-password-that-cannot-be-disabled-7dea55</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1420%3A%20NBase%20switches%20NH2012%2C%20NH2012R%2C%20NH2015%2C%20and%20NH2048%20have%20a%20back%20door%20password%20that%20cannot%20be%20disabled&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1200-vintra-smtp-mailserver-allows-remote-attackers-to-cause-a-denial-of-service-via-a-malformed-expn-7dea53</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1200%3A%20Vintra%20SMTP%20MailServer%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20%22EXPN%20*%40&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0005-arbitrary-command-execution-via-imap-buffer-overflow-in-authenticate-command-7dea51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0005%3A%20Arbitrary%20command%20execution%20via%20IMAP%20buffer%20overflow%20in%20authenticate%20command.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1558-vulnerability-in-loginout-in-digital-openvms-7-1-and-earlier-allows-unauthorized-access-when-externa-7dea4f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1558%3A%20Vulnerability%20in%20loginout%20in%20Digital%20OpenVMS%207.1%20and%20earlier%20allows%20unauthorized%20access%20when%20externa&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1432-power-management-powermanagement-on-solaris-2-4-through-2-6-does-not-start-the-xlock-process-until-7dea4d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1432%3A%20Power%20management%20(Powermanagement)%20on%20Solaris%202.4%20through%202.6%20does%20not%20start%20the%20xlock%20process%20until&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1149-buffer-overflow-in-csm-proxy-4-1-allows-remote-attackers-to-cause-a-denial-of-service-crash-via-a-7dea4b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1149%3A%20Buffer%20overflow%20in%20CSM%20Proxy%204.1%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20a%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0263-solaris-sunwadmap-can-be-exploited-to-obtain-root-access-7dea49</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0263%3A%20Solaris%20SUNWadmap%20can%20be%20exploited%20to%20obtain%20root%20access.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1582-by-design-the-established-command-on-the-cisco-pix-firewall-allows-connections-from-one-host-to-a-7dea47</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1582%3A%20By%20design%2C%20the%20%22established%22%20command%20on%20the%20Cisco%20PIX%20firewall%20allows%20connections%20from%20one%20host%20to%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1433-hp-jetadmin-d-01-09-on-solaris-allows-local-users-to-change-the-permissions-of-arbitrary-files-via-a-7dea45</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1433%3A%20HP%20JetAdmin%20D.01.09%20on%20Solaris%20allows%20local%20users%20to%20change%20the%20permissions%20of%20arbitrary%20files%20via%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1297-cmdtool-in-openwindows-3-0-and-xview-3-0-in-sunos-4-1-4-and-earlier-allows-attackers-with-physical-a-7dea43</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1297%3A%20cmdtool%20in%20OpenWindows%203.0%20and%20XView%203.0%20in%20SunOS%204.1.4%20and%20earlier%20allows%20attackers%20with%20physical%20a&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dea43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0213-libnsl-in-solaris-allowed-an-attacker-to-perform-a-denial-of-service-of-rpcbind-7dea36</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0213%3A%20libnsl%20in%20Solaris%20allowed%20an%20attacker%20to%20perform%20a%20denial%20of%20service%20of%20rpcbind.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0006-buffer-overflow-in-pop-servers-based-on-bsd-qualcomm-s-qpopper-allows-remote-attackers-to-gain-root-7dea34</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0006%3A%20Buffer%20overflow%20in%20POP%20servers%20based%20on%20BSD%2FQualcomm&apos;s%20qpopper%20allows%20remote%20attackers%20to%20gain%20root%20&amp;severity=critical&amp;id=682ca32bb6fd31d6ed7dea34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1434-login-in-slackware-linux-3-2-through-3-5-does-not-properly-check-for-an-error-when-the-etc-group-fi-7dea32</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1434%3A%20login%20in%20Slackware%20Linux%203.2%20through%203.5%20does%20not%20properly%20check%20for%20an%20error%20when%20the%20%2Fetc%2Fgroup%20fi&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea32</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1270-kmail-in-kde-1-0-provides-a-pgp-passphrase-as-a-command-line-argument-to-other-programs-which-could-7dea30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1270%3A%20KMail%20in%20KDE%201.0%20provides%20a%20PGP%20passphrase%20as%20a%20command%20line%20argument%20to%20other%20programs%2C%20which%20could&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea30</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1435-buffer-overflow-in-libsocks5-library-of-socks-5-socks5-1-0r5-allows-local-users-to-gain-privileges-7dea2e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1435%3A%20Buffer%20overflow%20in%20libsocks5%20library%20of%20Socks%205%20(socks5)%201.0r5%20allows%20local%20users%20to%20gain%20privileges&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea2e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0102-buffer-overflow-in-slmail-3-x-allows-attackers-to-execute-commands-using-a-large-from-line-7dea2c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0102%3A%20Buffer%20overflow%20in%20SLmail%203.x%20allows%20attackers%20to%20execute%20commands%20using%20a%20large%20FROM%20line.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea2c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1436-ray-chan-www-authorization-gateway-0-1-cgi-program-allows-remote-attackers-to-execute-arbitrary-comm-7dea2a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1436%3A%20Ray%20Chan%20WWW%20Authorization%20Gateway%200.1%20CGI%20program%20allows%20remote%20attackers%20to%20execute%20arbitrary%20comm&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea2a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1437-eperl-2-2-12-allows-remote-attackers-to-read-arbitrary-files-and-possibly-execute-certain-commands-b-7dea28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1437%3A%20ePerl%202.2.12%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20and%20possibly%20execute%20certain%20commands%20b&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1574-buffer-overflow-in-the-lex-routines-of-nslookup-for-aix-4-3-may-allow-attackers-to-cause-a-core-dump-7dea26</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1574%3A%20Buffer%20overflow%20in%20the%20lex%20routines%20of%20nslookup%20for%20AIX%204.3%20may%20allow%20attackers%20to%20cause%20a%20core%20dump&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1409-the-at-program-in-irix-6-2-and-netbsd-1-3-2-and-earlier-allows-local-users-to-read-portions-of-arbit-7dea24</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1409%3A%20The%20at%20program%20in%20IRIX%206.2%20and%20NetBSD%201.3.2%20and%20earlier%20allows%20local%20users%20to%20read%20portions%20of%20arbit&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dea24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1202-startech-1-pop3-proxy-server-and-2-telnet-server-allows-remote-attackers-to-cause-a-denial-of-se-7dea17</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1202%3A%20StarTech%20(1)%20POP3%20proxy%20server%20and%20(2)%20telnet%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20se&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0494-denial-of-service-in-wingate-proxy-through-a-buffer-overflow-in-pop3-7dea15</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0494%3A%20Denial%20of%20service%20in%20WinGate%20proxy%20through%20a%20buffer%20overflow%20in%20POP3.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7dea15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0314-ioconfig-on-sgi-irix-6-4-s2mp-for-origin-onyx2-allows-local-users-to-gain-root-access-using-relative-7dea13</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0314%3A%20ioconfig%20on%20SGI%20IRIX%206.4%20S2MP%20for%20Origin%2FOnyx2%20allows%20local%20users%20to%20gain%20root%20access%20using%20relative&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0313-disk-bandwidth-on-sgi-irix-6-4-s2mp-for-origin-onyx2-allows-local-users-to-gain-root-access-using-re-7dea11</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0313%3A%20disk_bandwidth%20on%20SGI%20IRIX%206.4%20S2MP%20for%20Origin%2FOnyx2%20allows%20local%20users%20to%20gain%20root%20access%20using%20re&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1441-linux-2-0-34-does-not-properly-prevent-users-from-sending-sigio-signals-to-arbitrary-processes-whic-7dea0f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1441%3A%20Linux%202.0.34%20does%20not%20properly%20prevent%20users%20from%20sending%20SIGIO%20signals%20to%20arbitrary%20processes%2C%20whic&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dea0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1150-livingston-portmaster-routers-running-comos-use-the-same-initial-sequence-number-isn-for-tcp-conne-7dea0d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1150%3A%20Livingston%20Portmaster%20routers%20running%20ComOS%20use%20the%20same%20initial%20sequence%20number%20(ISN)%20for%20TCP%20conne&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1556-microsoft-sql-server-6-5-uses-weak-encryption-for-the-password-for-the-sqlexecutivecmdexec-account-a-7dea0b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1556%3A%20Microsoft%20SQL%20Server%206.5%20uses%20weak%20encryption%20for%20the%20password%20for%20the%20SQLExecutiveCmdExec%20account%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0797-nis-finger-allows-an-attacker-to-conduct-a-denial-of-service-via-a-large-number-of-finger-requests-7dea09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0797%3A%20NIS%20finger%20allows%20an%20attacker%20to%20conduct%20a%20denial%20of%20service%20via%20a%20large%20number%20of%20finger%20requests%2C%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7dea09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1038-tiger-2-2-3-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-on-various-temporar-7dea07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1038%3A%20Tiger%202.2.3%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20various%20temporar&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1037-rex-satan-in-satan-1-1-1-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-on-the-7dea05</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1037%3A%20rex.satan%20in%20SATAN%201.1.1%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20the&amp;severity=high&amp;id=682ca32bb6fd31d6ed7dea05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1036-cops-1-04-allows-local-users-to-overwrite-or-create-arbitrary-files-via-a-symlink-attack-on-temporar-7de9f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1036%3A%20COPS%201.04%20allows%20local%20users%20to%20overwrite%20or%20create%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20temporar&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0007-information-from-ssl-encrypted-sessions-via-pkcs-1-7de9f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0007%3A%20Information%20from%20SSL-encrypted%20sessions%20via%20PKCS%20%231.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1479-the-textcounter-pl-by-matt-wright-allows-remote-attackers-to-execute-arbitrary-commands-via-shell-me-7de9f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1479%3A%20The%20textcounter.pl%20by%20Matt%20Wright%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20via%20shell%20me&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1442-bug-in-amd-k6-processor-on-linux-2-0-x-and-2-1-x-kernels-allows-local-users-to-cause-a-denial-of-ser-7de9f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1442%3A%20Bug%20in%20AMD%20K6%20processor%20on%20Linux%202.0.x%20and%202.1.x%20kernels%20allows%20local%20users%20to%20cause%20a%20denial%20of%20ser&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0783-freebsd-allows-local-users-to-conduct-a-denial-of-service-by-creating-a-hard-link-from-a-device-spec-7de9f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0783%3A%20FreeBSD%20allows%20local%20users%20to%20conduct%20a%20denial%20of%20service%20by%20creating%20a%20hard%20link%20from%20a%20device%20spec&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1085-ssh-1-2-25-1-2-23-and-other-versions-when-used-in-in-cbc-cipher-block-chaining-or-cfb-cipher-f-7de9ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1085%3A%20SSH%201.2.25%2C%201.2.23%2C%20and%20other%20versions%2C%20when%20used%20in%20in%20CBC%20(Cipher%20Block%20Chaining)%20or%20CFB%20(Cipher%20F&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1555-cheyenne-inoculan-anti-virus-server-in-inoculan-4-0-before-service-pack-2-creates-an-update-director-7de9ec</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1555%3A%20Cheyenne%20InocuLAN%20Anti-Virus%20Server%20in%20Inoculan%204.0%20before%20Service%20Pack%202%20creates%20an%20update%20director&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1480-1-acledit-and-2-aclput-in-aix-4-3-allow-local-users-to-create-or-modify-files-via-a-symlink-atta-7de9ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1480%3A%20(1)%20acledit%20and%20(2)%20aclput%20in%20AIX%204.3%20allow%20local%20users%20to%20create%20or%20modify%20files%20via%20a%20symlink%20atta&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de9ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1271-macromedia-dreamweaver-uses-weak-encryption-to-store-ftp-passwords-which-could-allow-local-users-to-7de9e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1271%3A%20Macromedia%20Dreamweaver%20uses%20weak%20encryption%20to%20store%20FTP%20passwords%2C%20which%20could%20allow%20local%20users%20to&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de9e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0054-sun-s-ftpd-daemon-can-be-subjected-to-a-denial-of-service-7de9d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0054%3A%20Sun&apos;s%20ftpd%20daemon%20can%20be%20subjected%20to%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0008-buffer-overflow-in-nis-in-sun-s-rpc-nisd-program-7de9d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0008%3A%20Buffer%20overflow%20in%20NIS%2B%2C%20in%20Sun&apos;s%20rpc.nisd%20program.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1152-compaq-microcom-6000-access-integrator-does-not-disconnect-a-client-after-a-certain-number-of-failed-7de9d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1152%3A%20Compaq%2FMicrocom%206000%20Access%20Integrator%20does%20not%20disconnect%20a%20client%20after%20a%20certain%20number%20of%20failed&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1151-compaq-microcom-6000-access-integrator-does-not-cause-a-session-timeout-after-prompting-for-a-userna-7de9d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1151%3A%20Compaq%2FMicrocom%206000%20Access%20Integrator%20does%20not%20cause%20a%20session%20timeout%20after%20prompting%20for%20a%20userna&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1443-micah-software-full-armor-network-configurator-and-zero-administration-allow-local-users-with-physic-7de9d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1443%3A%20Micah%20Software%20Full%20Armor%20Network%20Configurator%20and%20Zero%20Administration%20allow%20local%20users%20with%20physic&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0508-an-account-on-a-router-firewall-or-other-network-device-has-a-default-null-blank-or-missing-pas-7de9cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0508%3A%20An%20account%20on%20a%20router%2C%20firewall%2C%20or%20other%20network%20device%20has%20a%20default%2C%20null%2C%20blank%2C%20or%20missing%20pas&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0501-a-unix-account-has-a-guessable-password-7de9cd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0501%3A%20A%20Unix%20account%20has%20a%20guessable%20password.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0329-sgi-mediad-program-allows-local-users-to-gain-root-access-7de9cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0329%3A%20SGI%20mediad%20program%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0278-in-iis-remote-attackers-can-obtain-source-code-for-asp-files-by-appending-data-to-the-url-7de9c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0278%3A%20In%20IIS%2C%20remote%20attackers%20can%20obtain%20source%20code%20for%20ASP%20files%20by%20appending%20%22%3A%3A%24DATA%22%20to%20the%20URL.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1490-xosview-1-5-1-in-red-hat-5-1-allows-local-users-to-gain-root-access-via-a-long-home-environmental-va-7de9c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1490%3A%20xosview%201.5.1%20in%20Red%20Hat%205.1%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20HOME%20environmental%20va&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1039-vulnerability-in-1-diskalign-and-2-diskperf-in-irix-6-4-patches-2291-and-2848-allow-a-local-user-7de9b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1039%3A%20Vulnerability%20in%20(1)%20diskalign%20and%20(2)%20diskperf%20in%20IRIX%206.4%20patches%202291%20and%202848%20allow%20a%20local%20user&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1492-vulnerability-in-1-diskperf-and-2-diskalign-in-irix-6-4-allows-local-attacker-to-create-arbitrar-7de9ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1492%3A%20Vulnerability%20in%20(1)%20diskperf%20and%20(2)%20diskalign%20in%20IRIX%206.4%20allows%20local%20attacker%20to%20create%20arbitrar&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0303-buffer-overflow-in-bnu-uucp-daemon-uucpd-through-long-hostnames-7de9b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0303%3A%20Buffer%20overflow%20in%20BNU%20UUCP%20daemon%20(uucpd)%20through%20long%20hostnames.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de9b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1096-buffer-overflow-in-kscreensaver-in-kde-klock-allows-local-users-to-gain-root-privileges-via-a-long-h-7de9b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1096%3A%20Buffer%20overflow%20in%20kscreensaver%20in%20KDE%20klock%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20H&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1179-vulnerability-in-man-sh-cgi-script-included-in-may-1998-issue-of-sysadmin-magazine-allows-remote-a-7de9b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1179%3A%20Vulnerability%20in%20man.sh%20CGI%20script%2C%20included%20in%20May%201998%20issue%20of%20SysAdmin%20Magazine%2C%20allows%20remote%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0055-buffer-overflows-in-sun-libnsl-allow-root-access-7de9b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0055%3A%20Buffer%20overflows%20in%20Sun%20libnsl%20allow%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1389-us-robotics-3com-total-control-chassis-with-frame-relay-between-3-6-22-and-3-7-24-does-not-properly-7de9ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1389%3A%20US%20Robotics%2F3Com%20Total%20Control%20Chassis%20with%20Frame%20Relay%20between%203.6.22%20and%203.7.24%20does%20not%20properly%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1204-check-point-firewall-1-does-not-properly-handle-certain-restricted-keywords-e-g-mail-auth-time-7de9ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1204%3A%20Check%20Point%20Firewall-1%20does%20not%20properly%20handle%20certain%20restricted%20keywords%20(e.g.%2C%20Mail%2C%20auth%2C%20time)&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0919-a-memory-leak-in-a-motorola-cablerouter-allows-remote-attackers-to-conduct-a-denial-of-service-via-a-7de9aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0919%3A%20A%20memory%20leak%20in%20a%20Motorola%20CableRouter%20allows%20remote%20attackers%20to%20conduct%20a%20denial%20of%20service%20via%20a&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0816-the-motorola-cablerouter-allows-any-remote-user-to-connect-to-and-configure-the-router-on-port-1024-7de9a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0816%3A%20The%20Motorola%20CableRouter%20allows%20any%20remote%20user%20to%20connect%20to%20and%20configure%20the%20router%20on%20port%201024.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1361-windows-nt-3-51-and-4-0-running-wins-windows-internet-name-service-allows-remote-attackers-to-caus-7de99b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1361%3A%20Windows%20NT%203.51%20and%204.0%20running%20WINS%20(Windows%20Internet%20Name%20Service)%20allows%20remote%20attackers%20to%20caus&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de99b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1044-vulnerability-in-advanced-file-system-utility-advfs-in-digital-unix-4-0-through-4-0d-allows-local-7de999</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1044%3A%20Vulnerability%20in%20Advanced%20File%20System%20Utility%20(advfs)%20in%20Digital%20UNIX%204.0%20through%204.0d%20allows%20local%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de999</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1027-solaris-2-6-hw3-98-installs-admintool-with-world-writable-permissions-which-allows-local-users-to-g-7de997</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1027%3A%20Solaris%202.6%20HW3%2F98%20installs%20admintool%20with%20world-writable%20permissions%2C%20which%20allows%20local%20users%20to%20g&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de997</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0126-sgi-irix-buffer-overflow-in-xterm-and-xaw-allows-root-access-7de995</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0126%3A%20SGI%20IRIX%20buffer%20overflow%20in%20xterm%20and%20Xaw%20allows%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de995</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0796-freebsd-t-tcp-extensions-for-transactions-can-be-subjected-to-spoofing-attacks-7de993</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0796%3A%20FreeBSD%20T%2FTCP%20Extensions%20for%20Transactions%20can%20be%20subjected%20to%20spoofing%20attacks.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de993</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0108-the-printers-program-in-irix-has-a-buffer-overflow-that-gives-root-access-to-local-users-7de991</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0108%3A%20The%20printers%20program%20in%20IRIX%20has%20a%20buffer%20overflow%20that%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de991</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1106-buffer-overflow-in-kppp-in-kde-allows-local-users-to-gain-root-access-via-a-long-c-account-name-c-7de98f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1106%3A%20Buffer%20overflow%20in%20kppp%20in%20KDE%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20long%20-c%20(account_name)%20c&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de98f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0212-solaris-rpc-mountd-generates-error-messages-that-allow-a-remote-attacker-to-determine-what-files-are-7de98d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0212%3A%20Solaris%20rpc.mountd%20generates%20error%20messages%20that%20allow%20a%20remote%20attacker%20to%20determine%20what%20files%20are&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de98d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0069-solaris-ufsrestore-buffer-overflow-7de98b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0069%3A%20Solaris%20ufsrestore%20buffer%20overflow.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de98b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1390-suidexec-in-suidmanager-0-18-on-debian-2-0-allows-local-users-to-gain-root-privileges-by-specifying-7de989</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1390%3A%20suidexec%20in%20suidmanager%200.18%20on%20Debian%202.0%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20specifying%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de989</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1113-buffer-overflow-in-eudora-internet-mail-server-eims-2-01-and-earlier-on-macos-systems-allows-remot-7de97c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1113%3A%20Buffer%20overflow%20in%20Eudora%20Internet%20Mail%20Server%20(EIMS)%202.01%20and%20earlier%20on%20MacOS%20systems%20allows%20remot&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de97c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1499-named-in-isc-bind-4-9-and-8-1-allows-local-users-to-destroy-files-via-a-symlink-attack-on-1-named-7de97a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1499%3A%20named%20in%20ISC%20BIND%204.9%20and%208.1%20allows%20local%20users%20to%20destroy%20files%20via%20a%20symlink%20attack%20on%20(1)%20named_&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de97a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1504-stalker-internet-mail-server-1-6-allows-a-remote-attacker-to-cause-a-denial-of-service-crash-via-a-7de978</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1504%3A%20Stalker%20Internet%20Mail%20Server%201.6%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20a&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de978</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1503-network-flight-recorder-nfr-1-5-and-1-6-allows-remote-attackers-to-cause-a-denial-of-service-in-nf-7de976</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1503%3A%20Network%20Flight%20Recorder%20(NFR)%201.5%20and%201.6%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20in%20nf&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de976</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1502-buffer-overflows-in-quake-1-9-client-allows-remote-malicious-servers-to-execute-arbitrary-commands-v-7de974</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1502%3A%20Buffer%20overflows%20in%20Quake%201.9%20client%20allows%20remote%20malicious%20servers%20to%20execute%20arbitrary%20commands%20v&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1114-buffer-overflow-in-korn-shell-ksh-suid-exec-program-on-irix-6-x-and-earlier-and-possibly-other-op-7de970</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1114%3A%20Buffer%20overflow%20in%20Korn%20Shell%20(ksh)%20suid_exec%20program%20on%20IRIX%206.x%20and%20earlier%2C%20and%20possibly%20other%20op&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1501-1-ipxchk-and-2-ipxlink-in-sgi-os2-irix-6-3-does-not-properly-clear-the-ifs-environmental-variabl-7de972</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1501%3A%20(1)%20ipxchk%20and%20(2)%20ipxlink%20in%20SGI%20OS2%20IRIX%206.3%20does%20not%20properly%20clear%20the%20IFS%20environmental%20variabl&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1040-vulnerabilities-in-1-ipxchk-and-2-ipxlink-in-netware-client-1-0-on-irix-6-3-and-6-4-allows-local-7de96e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1040%3A%20Vulnerabilities%20in%20(1)%20ipxchk%20and%20(2)%20ipxlink%20in%20NetWare%20Client%201.0%20on%20IRIX%206.3%20and%206.4%20allows%20local&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de96e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1015-buffer-overflow-in-apple-appleshare-mail-server-5-0-3-on-macos-8-1-and-earlier-allows-a-remote-attac-7de96c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1015%3A%20Buffer%20overflow%20in%20Apple%20AppleShare%20Mail%20Server%205.0.3%20on%20MacOS%208.1%20and%20earlier%20allows%20a%20remote%20attac&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de96c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0190-solaris-rpcbind-can-be-exploited-to-overwrite-arbitrary-files-and-gain-root-access-7de96a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0190%3A%20Solaris%20rpcbind%20can%20be%20exploited%20to%20overwrite%20arbitrary%20files%20and%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de96a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0011-denial-of-service-vulnerabilities-in-bind-4-9-and-bind-8-releases-via-cname-record-and-zone-transfer-7de95d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0011%3A%20Denial%20of%20Service%20vulnerabilities%20in%20BIND%204.9%20and%20BIND%208%20Releases%20via%20CNAME%20record%20and%20zone%20transfer&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de95d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0010-denial-of-service-vulnerability-in-bind-8-releases-via-maliciously-formatted-dns-messages-7de95b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0010%3A%20Denial%20of%20Service%20vulnerability%20in%20BIND%208%20Releases%20via%20maliciously%20formatted%20DNS%20messages.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de95b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0009-inverse-query-buffer-overflow-in-bind-4-9-and-bind-8-releases-7de959</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0009%3A%20Inverse%20query%20buffer%20overflow%20in%20BIND%204.9%20and%20BIND%208%20Releases.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de959</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1505-buffer-overflow-in-quakeworld-2-10-allows-remote-attackers-to-cause-a-denial-of-service-crash-and-7de957</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1505%3A%20Buffer%20overflow%20in%20QuakeWorld%202.10%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%20and%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de957</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1498-slackware-linux-3-4-pkgtool-allows-local-attacker-to-read-and-write-to-arbitrary-files-via-a-symlink-7de955</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1498%3A%20Slackware%20Linux%203.4%20pkgtool%20allows%20local%20attacker%20to%20read%20and%20write%20to%20arbitrary%20files%20via%20a%20symlink&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de955</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0270-directory-traversal-vulnerability-in-pfdispaly-cgi-program-sometimes-referred-to-as-pfdisplay-fo-7de953</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0270%3A%20Directory%20traversal%20vulnerability%20in%20pfdispaly.cgi%20program%20(sometimes%20referred%20to%20as%20%22pfdisplay%22)%20fo&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de953</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1183-system-manager-sysmgr-gui-in-sgi-irix-6-4-and-6-3-allows-remote-attackers-to-execute-commands-by-pro-7de951</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1183%3A%20System%20Manager%20sysmgr%20GUI%20in%20SGI%20IRIX%206.4%20and%206.3%20allows%20remote%20attackers%20to%20execute%20commands%20by%20pro&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de951</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0551-hp-openmail-can-be-misconfigured-to-allow-users-to-run-arbitrary-commands-using-malicious-print-requ-7de94f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0551%3A%20HP%20OpenMail%20can%20be%20misconfigured%20to%20allow%20users%20to%20run%20arbitrary%20commands%20using%20malicious%20print%20requ&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de94f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0537-a-configuration-in-a-web-browser-such-as-internet-explorer-or-netscape-navigator-allows-execution-of-7de94d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0537%3A%20A%20configuration%20in%20a%20web%20browser%20such%20as%20Internet%20Explorer%20or%20Netscape%20Navigator%20allows%20execution%20of&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de94d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0507-an-account-on-a-router-firewall-or-other-network-device-has-a-guessable-password-7de94b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0507%3A%20An%20account%20on%20a%20router%2C%20firewall%2C%20or%20other%20network%20device%20has%20a%20guessable%20password.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de94b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0257-nestea-variation-of-teardrop-ip-fragmentation-denial-of-service-7de93e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0257%3A%20Nestea%20variation%20of%20teardrop%20IP%20fragmentation%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0098-buffer-overflow-in-smtp-helo-command-in-sendmail-allows-a-remote-attacker-to-hide-activities-7de93c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0098%3A%20Buffer%20overflow%20in%20SMTP%20HELO%20command%20in%20Sendmail%20allows%20a%20remote%20attacker%20to%20hide%20activities.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0003-execute-commands-as-root-via-buffer-overflow-in-tooltalk-database-server-rpc-ttdbserverd-7de93a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0003%3A%20Execute%20commands%20as%20root%20via%20buffer%20overflow%20in%20Tooltalk%20database%20server%20(rpc.ttdbserverd).&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0960-irix-cdplayer-allows-local-users-to-create-directories-in-arbitrary-locations-via-a-command-line-opt-7de938</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0960%3A%20IRIX%20cdplayer%20allows%20local%20users%20to%20create%20directories%20in%20arbitrary%20locations%20via%20a%20command%20line%20opt&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1075-inetd-in-aix-4-1-5-dynamically-assigns-a-port-n-when-starting-ttdbserver-tooltalk-server-but-also-7de936</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1075%3A%20inetd%20in%20AIX%204.1.5%20dynamically%20assigns%20a%20port%20N%20when%20starting%20ttdbserver%20(ToolTalk%20server)%2C%20but%20also&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0060-attackers-can-cause-a-denial-of-service-in-ascend-max-and-pipeline-routers-with-a-malformed-packet-t-7de934</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0060%3A%20Attackers%20can%20cause%20a%20denial%20of%20service%20in%20Ascend%20MAX%20and%20Pipeline%20routers%20with%20a%20malformed%20packet%20t&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1118-ndd-in-solaris-2-6-allows-local-users-to-cause-a-denial-of-service-by-modifying-certain-tcp-ip-param-7de932</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1118%3A%20ndd%20in%20Solaris%202.6%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20by%20modifying%20certain%20TCP%2FIP%20param&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de932</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1407-ifdhcpc-done-script-for-configuring-dhcp-on-red-hat-linux-5-allows-local-users-to-append-text-to-arb-7de930</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1407%3A%20ifdhcpc-done%20script%20for%20configuring%20DHCP%20on%20Red%20Hat%20Linux%205%20allows%20local%20users%20to%20append%20text%20to%20arb&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de930</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1272-buffer-overflows-in-cdrom-confidence-test-program-cdrom-allow-local-users-to-gain-root-privileges-7de92e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1272%3A%20Buffer%20overflows%20in%20CDROM%20Confidence%20Test%20program%20(cdrom)%20allow%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de92e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0795-the-nis-rpc-nisd-server-allows-remote-attackers-to-execute-certain-rpc-calls-without-authentication-7de92c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0795%3A%20The%20NIS%2B%20rpc.nisd%20server%20allows%20remote%20attackers%20to%20execute%20certain%20RPC%20calls%20without%20authentication&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de92c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0514-udp-messages-to-broadcast-addresses-are-allowed-allowing-for-a-fraggle-attack-that-can-cause-a-deni-7de91f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0514%3A%20UDP%20messages%20to%20broadcast%20addresses%20are%20allowed%2C%20allowing%20for%20a%20Fraggle%20attack%20that%20can%20cause%20a%20deni&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de91f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0502-a-unix-account-has-a-default-null-blank-or-missing-password-7de91d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0502%3A%20A%20Unix%20account%20has%20a%20default%2C%20null%2C%20blank%2C%20or%20missing%20password.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de91d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0330-linux-bdash-game-has-a-buffer-overflow-that-allows-local-users-to-gain-root-access-7de91b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0330%3A%20Linux%20bdash%20game%20has%20a%20buffer%20overflow%20that%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de91b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0266-the-info2www-cgi-script-allows-remote-file-access-or-remote-command-execution-7de917</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0266%3A%20The%20info2www%20CGI%20script%20allows%20remote%20file%20access%20or%20remote%20command%20execution.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de917</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0320-sunos-rpc-cmsd-allows-attackers-to-obtain-root-access-by-overwriting-arbitrary-files-7de919</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0320%3A%20SunOS%20rpc.cmsd%20allows%20attackers%20to%20obtain%20root%20access%20by%20overwriting%20arbitrary%20files.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de919</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1486-sadc-in-ibm-aix-4-1-through-4-3-when-called-from-programs-such-as-timex-that-are-setgid-adm-allows-7de915</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1486%3A%20sadc%20in%20IBM%20AIX%204.1%20through%204.3%2C%20when%20called%20from%20programs%20such%20as%20timex%20that%20are%20setgid%20adm%2C%20allows&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de915</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1229-quake-2-server-3-13-on-linux-does-not-properly-check-file-permissions-for-the-config-cfg-configurati-7de913</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1229%3A%20Quake%202%20server%203.13%20on%20Linux%20does%20not%20properly%20check%20file%20permissions%20for%20the%20config.cfg%20configurati&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de913</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0290-the-wingate-telnet-proxy-allows-remote-attackers-to-cause-a-denial-of-service-via-a-large-number-of-7de911</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0290%3A%20The%20WinGate%20telnet%20proxy%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20large%20number%20of%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de911</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1273-squid-internet-object-cache-1-1-20-allows-users-to-bypass-access-control-lists-acls-by-encoding-th-7de90f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1273%3A%20Squid%20Internet%20Object%20Cache%201.1.20%20allows%20users%20to%20bypass%20access%20control%20lists%20(ACLs)%20by%20encoding%20th&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de90f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0323-freebsd-mmap-function-allows-users-to-modify-append-only-or-immutable-files-7de90d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0323%3A%20FreeBSD%20mmap%20function%20allows%20users%20to%20modify%20append-only%20or%20immutable%20files.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1207-buffer-overflow-in-web-admin-tool-in-netxray-2-6-allows-remote-attackers-to-cause-a-denial-of-servic-7de900</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1207%3A%20Buffer%20overflow%20in%20web-admin%20tool%20in%20NetXRay%202.6%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20servic&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de900</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0225-windows-nt-4-0-allows-remote-attackers-to-cause-a-denial-of-service-via-a-malformed-smb-logon-reques-7de8fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0225%3A%20Windows%20NT%204.0%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20malformed%20SMB%20logon%20reques&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0258-bonk-variation-of-teardrop-ip-fragmentation-denial-of-service-7de8fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0258%3A%20Bonk%20variation%20of%20teardrop%20IP%20fragmentation%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0012-some-web-servers-under-microsoft-windows-allow-remote-attackers-to-bypass-access-restrictions-for-fi-7de8f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0012%3A%20Some%20web%20servers%20under%20Microsoft%20Windows%20allow%20remote%20attackers%20to%20bypass%20access%20restrictions%20for%20fi&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1445-vulnerability-in-imapd-and-ipop3d-in-slackware-3-4-and-3-3-with-shadowing-enabled-and-possibly-othe-7de8f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1445%3A%20Vulnerability%20in%20imapd%20and%20ipop3d%20in%20Slackware%203.4%20and%203.3%20with%20shadowing%20enabled%2C%20and%20possibly%20othe&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0486-denial-of-service-in-aol-instant-messenger-when-a-remote-attacker-sends-a-malicious-hyperlink-to-the-7de8f4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0486%3A%20Denial%20of%20service%20in%20AOL%20Instant%20Messenger%20when%20a%20remote%20attacker%20sends%20a%20malicious%20hyperlink%20to%20the&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0305-the-system-configuration-control-sysctl-facility-in-bsd-based-operating-systems-openbsd-2-2-and-ea-7de8f2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0305%3A%20The%20system%20configuration%20control%20(sysctl)%20facility%20in%20BSD%20based%20operating%20systems%20OpenBSD%202.2%20and%20ea&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0304-mmap-function-in-bsd-allows-local-attackers-in-the-kmem-group-to-modify-memory-through-devices-7de8f0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0304%3A%20mmap%20function%20in%20BSD%20allows%20local%20attackers%20in%20the%20kmem%20group%20to%20modify%20memory%20through%20devices.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0296-solaris-volrmmount-program-allows-attackers-to-read-any-file-7de8ee</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0296%3A%20Solaris%20volrmmount%20program%20allows%20attackers%20to%20read%20any%20file.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0256-buffer-overflow-in-war-ftp-allows-remote-execution-of-commands-7de8e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0256%3A%20Buffer%20overflow%20in%20War%20FTP%20allows%20remote%20execution%20of%20commands.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0087-denial-of-service-in-aix-telnet-can-freeze-a-system-and-prevent-users-from-accessing-the-server-7de8df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0087%3A%20Denial%20of%20service%20in%20AIX%20telnet%20can%20freeze%20a%20system%20and%20prevent%20users%20from%20accessing%20the%20server.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0264-htmlscript-cgi-program-allows-remote-read-access-to-files-7de8dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0264%3A%20htmlscript%20CGI%20program%20allows%20remote%20read%20access%20to%20files.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0125-buffer-overflow-in-sgi-irix-mailx-program-7de8db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0125%3A%20Buffer%20overflow%20in%20SGI%20IRIX%20mailx%20program.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0013-stolen-credentials-from-ssh-clients-via-ssh-agent-program-allowing-other-local-users-to-access-remo-7de8d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0013%3A%20Stolen%20credentials%20from%20SSH%20clients%20via%20ssh-agent%20program%2C%20allowing%20other%20local%20users%20to%20access%20remo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1487-vulnerability-in-digest-in-aix-4-3-allows-printq-users-to-gain-root-privileges-by-creating-and-or-mo-7de8d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1487%3A%20Vulnerability%20in%20digest%20in%20AIX%204.3%20allows%20printq%20users%20to%20gain%20root%20privileges%20by%20creating%20and%2For%20mo&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0014-unauthorized-privileged-access-or-denial-of-service-via-dtappgather-program-in-cde-7de8d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0014%3A%20Unauthorized%20privileged%20access%20or%20denial%20of%20service%20via%20dtappgather%20program%20in%20CDE.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1045-pnserver-in-realserver-5-0-and-earlier-allows-remote-attackers-to-cause-a-denial-of-service-by-sendi-7de8d3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1045%3A%20pnserver%20in%20RealServer%205.0%20and%20earlier%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20by%20sendi&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0271-progressive-networks-real-video-server-pnserver-can-be-crashed-remotely-7de8d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0271%3A%20Progressive%20Networks%20Real%20Video%20server%20(pnserver)%20can%20be%20crashed%20remotely.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0958-sudo-1-5-x-allows-local-users-to-execute-arbitrary-commands-via-a-dot-dot-attack-7de8cf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0958%3A%20sudo%201.5.x%20allows%20local%20users%20to%20execute%20arbitrary%20commands%20via%20a%20..%20(dot%20dot)%20attack.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1176-buffer-overflow-in-cidentd-ident-daemon-allows-local-users-to-gain-root-privileges-via-a-long-line-i-7de8c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1176%3A%20Buffer%20overflow%20in%20cidentd%20ident%20daemon%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20line%20i&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0086-aix-routed-allows-remote-users-to-modify-sensitive-files-7de8c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0086%3A%20AIX%20routed%20allows%20remote%20users%20to%20modify%20sensitive%20files.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1429-dit-transferpro-installs-devices-with-world-readable-and-world-writable-permissions-which-could-all-7de8be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1429%3A%20DIT%20TransferPro%20installs%20devices%20with%20world-readable%20and%20world-writable%20permissions%2C%20which%20could%20all&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de8be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0513-icmp-messages-to-broadcast-addresses-are-allowed-allowing-for-a-smurf-attack-that-can-cause-a-denia-7de8bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0513%3A%20ICMP%20messages%20to%20broadcast%20addresses%20are%20allowed%2C%20allowing%20for%20a%20Smurf%20attack%20that%20can%20cause%20a%20denia&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1439-gcc-2-7-2-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-on-temporary-i-s-7de8ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1439%3A%20gcc%202.7.2%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20on%20temporary%20.i%2C%20.s%2C%20&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de8ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0341-buffer-overflow-in-the-linux-mail-program-deliver-allows-local-users-to-gain-root-access-7de8b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0341%3A%20Buffer%20overflow%20in%20the%20Linux%20mail%20program%20%22deliver%22%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0331-buffer-overflow-in-internet-explorer-4-0-1-7de8b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0331%3A%20Buffer%20overflow%20in%20Internet%20Explorer%204.0(1).&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0293-aaa-authentication-on-cisco-systems-allows-attackers-to-execute-commands-without-authorization-7de8b4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0293%3A%20AAA%20authentication%20on%20Cisco%20systems%20allows%20attackers%20to%20execute%20commands%20without%20authorization.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0284-denial-of-service-to-nt-mail-servers-including-ipswitch-mdaemon-and-exchange-through-a-buffer-over-7de8b2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0284%3A%20Denial%20of%20service%20to%20NT%20mail%20servers%20including%20Ipswitch%2C%20Mdaemon%2C%20and%20Exchange%20through%20a%20buffer%20over&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0279-excite-for-web-servers-ews-allows-remote-command-execution-via-shell-metacharacters-7de8b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0279%3A%20Excite%20for%20Web%20Servers%20(EWS)%20allows%20remote%20command%20execution%20via%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0273-denial-of-service-through-solaris-2-5-1-telnet-by-sending-d-characters-7de8a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0273%3A%20Denial%20of%20service%20through%20Solaris%202.5.1%20telnet%20by%20sending%20%5ED%20characters.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de8a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0239-netscape-fasttrack-web-server-lists-files-when-a-lowercase-get-command-is-used-instead-of-an-upper-7de8a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0239%3A%20Netscape%20FastTrack%20Web%20server%20lists%20files%20when%20a%20lowercase%20%22get%22%20command%20is%20used%20instead%20of%20an%20upper&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de8a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0114-local-users-can-execute-commands-as-other-users-and-read-other-users-files-through-the-filter-com-7de89f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0114%3A%20Local%20users%20can%20execute%20commands%20as%20other%20users%2C%20and%20read%20other%20users&apos;%20files%2C%20through%20the%20filter%20com&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de89f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0107-buffer-overflow-in-apache-1-2-5-and-earlier-allows-a-remote-attacker-to-cause-a-denial-of-service-wi-7de89d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0107%3A%20Buffer%20overflow%20in%20Apache%201.2.5%20and%20earlier%20allows%20a%20remote%20attacker%20to%20cause%20a%20denial%20of%20service%20wi&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de89d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1274-ipass-roamserver-3-1-creates-temporary-files-with-world-writable-permissions-7de89b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1274%3A%20iPass%20RoamServer%203.1%20creates%20temporary%20files%20with%20world-writable%20permissions.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de89b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1230-quake-2-server-allows-remote-attackers-to-cause-a-denial-of-service-via-a-spoofed-udp-packet-with-a-7de899</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1230%3A%20Quake%202%20server%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20spoofed%20UDP%20packet%20with%20a%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de899</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1581-memory-leak-in-simple-network-management-protocol-snmp-agent-snmp-exe-for-windows-nt-4-0-before-7de897</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1581%3A%20Memory%20leak%20in%20Simple%20Network%20Management%20Protocol%20(SNMP)%20agent%20(snmp.exe)%20for%20Windows%20NT%204.0%20before%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de897</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0104-a-later-variation-on-the-teardrop-ip-denial-of-service-attack-a-k-a-teardrop-2-7de895</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0104%3A%20A%20later%20variation%20on%20the%20Teardrop%20IP%20denial%20of%20service%20attack%2C%20a.k.a.%20Teardrop-2.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de895</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0015-teardrop-ip-denial-of-service-7de893</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0015%3A%20Teardrop%20IP%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0004-mime-buffer-overflow-in-email-clients-e-g-solaris-mailtool-and-outlook-7de891</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0004%3A%20MIME%20buffer%20overflow%20in%20email%20clients%2C%20e.g.%20Solaris%20mailtool%20and%20Outlook.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0230-buffer-overflow-in-cisco-7xx-routers-through-the-telnet-service-7de884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0230%3A%20Buffer%20overflow%20in%20Cisco%207xx%20routers%20through%20the%20telnet%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de884</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1140-buffer-overflow-in-cracklib-2-5-may-allow-local-users-to-gain-root-privileges-via-a-long-gecos-field-7de882</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1140%3A%20Buffer%20overflow%20in%20CrackLib%202.5%20may%20allow%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20GECOS%20field&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de882</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0017-ftp-servers-can-allow-an-attacker-to-connect-to-arbitrary-ports-on-machines-other-than-the-ftp-clien-7de880</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0017%3A%20FTP%20servers%20can%20allow%20an%20attacker%20to%20connect%20to%20arbitrary%20ports%20on%20machines%20other%20than%20the%20FTP%20clien&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de880</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0018-buffer-overflow-in-statd-allows-root-privileges-7de87e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0018%3A%20Buffer%20overflow%20in%20statd%20allows%20root%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de87e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0340-buffer-overflow-in-linux-slackware-crond-program-allows-local-users-to-gain-root-access-7de87c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0340%3A%20Buffer%20overflow%20in%20Linux%20Slackware%20crond%20program%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de87c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0244-livingston-radius-code-has-a-buffer-overflow-which-can-allow-remote-execution-of-commands-as-root-7de87a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0244%3A%20Livingston%20RADIUS%20code%20has%20a%20buffer%20overflow%20which%20can%20allow%20remote%20execution%20of%20commands%20as%20root.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de87a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0193-denial-of-service-in-ascend-and-3com-routers-which-can-be-rebooted-by-sending-a-zero-length-tcp-opt-7de878</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0193%3A%20Denial%20of%20service%20in%20Ascend%20and%203com%20routers%2C%20which%20can%20be%20rebooted%20by%20sending%20a%20zero%20length%20TCP%20opt&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de878</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0016-land-ip-denial-of-service-7de876</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0016%3A%20Land%20IP%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de876</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1257-xyplex-terminal-server-6-0-1s1-and-possibly-other-versions-allows-remote-attackers-to-bypass-the-p-7de874</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1257%3A%20Xyplex%20terminal%20server%206.0.1S1%2C%20and%20possibly%20other%20versions%2C%20allows%20remote%20attackers%20to%20bypass%20the%20p&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de874</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0210-automount-daemon-automountd-allows-local-or-remote-users-to-gain-privileges-via-shell-metacharacters-7de872</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0210%3A%20Automount%20daemon%20automountd%20allows%20local%20or%20remote%20users%20to%20gain%20privileges%20via%20shell%20metacharacters&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de872</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1209-vulnerability-in-scoterm-in-sco-openserver-5-0-and-sco-open-desktop-open-server-3-0-allows-local-use-7de865</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1209%3A%20Vulnerability%20in%20scoterm%20in%20SCO%20OpenServer%205.0%20and%20SCO%20Open%20Desktop%2FOpen%20Server%203.0%20allows%20local%20use&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de865</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1210-xterm-in-digital-unix-4-0b-with-patch-kit-5-allows-local-users-to-overwrite-arbitrary-files-via-a-7de863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1210%3A%20xterm%20in%20Digital%20UNIX%204.0B%20*with*%20patch%20kit%205%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de863</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1428-solaris-solstice-adminsuite-adminsuite-2-1-and-2-2-allows-local-users-to-gain-privileges-via-the-s-7de861</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1428%3A%20Solaris%20Solstice%20AdminSuite%20(AdminSuite)%202.1%20and%202.2%20allows%20local%20users%20to%20gain%20privileges%20via%20the%20s&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de861</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1427-solaris-solstice-adminsuite-adminsuite-2-1-and-2-2-create-lock-files-insecurely-which-allows-loca-7de85f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1427%3A%20Solaris%20Solstice%20AdminSuite%20(AdminSuite)%202.1%20and%202.2%20create%20lock%20files%20insecurely%2C%20which%20allows%20loca&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de85f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1426-solaris-solstice-adminsuite-adminsuite-2-1-follows-symbolic-links-when-updating-an-nis-database-w-7de85d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1426%3A%20Solaris%20Solstice%20AdminSuite%20(AdminSuite)%202.1%20follows%20symbolic%20links%20when%20updating%20an%20NIS%20database%2C%20w&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de85d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1425-solaris-solstice-adminsuite-adminsuite-2-1-incorrectly-sets-write-permissions-on-source-files-for-7de85b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1425%3A%20Solaris%20Solstice%20AdminSuite%20(AdminSuite)%202.1%20incorrectly%20sets%20write%20permissions%20on%20source%20files%20for%20&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de85b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1424-solaris-solstice-adminsuite-adminsuite-2-1-uses-unsafe-permissions-when-adding-new-users-to-the-ni-7de859</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1424%3A%20Solaris%20Solstice%20AdminSuite%20(AdminSuite)%202.1%20uses%20unsafe%20permissions%20when%20adding%20new%20users%20to%20the%20NI&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1069-directory-traversal-vulnerability-in-carbo-dll-in-icat-carbo-server-3-0-0-allows-remote-attackers-to-7de857</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1069%3A%20Directory%20traversal%20vulnerability%20in%20carbo.dll%20in%20iCat%20Carbo%20Server%203.0.0%20allows%20remote%20attackers%20to&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de857</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0021-arbitrary-command-execution-via-buffer-overflow-in-count-cgi-wwwcount-cgi-bin-program-7de855</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0021%3A%20Arbitrary%20command%20execution%20via%20buffer%20overflow%20in%20Count.cgi%20(wwwcount)%20cgi-bin%20program.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de855</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0306-buffer-overflow-in-hp-xlock-program-7de853</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0306%3A%20buffer%20overflow%20in%20HP%20xlock%20program.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de853</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0967-buffer-overflow-in-the-html-library-used-by-internet-explorer-outlook-express-and-windows-explorer-7de846</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0967%3A%20Buffer%20overflow%20in%20the%20HTML%20library%20used%20by%20Internet%20Explorer%2C%20Outlook%20Express%2C%20and%20Windows%20Explorer&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de846</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0328-sgi-permissions-program-allows-local-users-to-gain-root-privileges-7de844</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0328%3A%20SGI%20permissions%20program%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de844</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0327-sgi-syserr-program-allows-local-users-to-corrupt-files-7de842</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0327%3A%20SGI%20syserr%20program%20allows%20local%20users%20to%20corrupt%20files.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de842</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0216-denial-of-service-of-inetd-on-linux-through-syn-and-rst-packets-7de840</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0216%3A%20Denial%20of%20service%20of%20inetd%20on%20Linux%20through%20SYN%20and%20RST%20packets.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de840</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0322-the-open-function-in-freebsd-allows-local-attackers-to-write-to-arbitrary-files-7de83e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0322%3A%20The%20open()%20function%20in%20FreeBSD%20allows%20local%20attackers%20to%20write%20to%20arbitrary%20files.&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de83e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0097-the-aix-ftp-client-can-be-forced-to-execute-commands-from-a-malicious-server-through-shell-metachara-7de83c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0097%3A%20The%20AIX%20FTP%20client%20can%20be%20forced%20to%20execute%20commands%20from%20a%20malicious%20server%20through%20shell%20metachara&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de83c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0094-aix-piodmgrsu-command-allows-local-users-to-gain-additional-group-privileges-7de83a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0094%3A%20AIX%20piodmgrsu%20command%20allows%20local%20users%20to%20gain%20additional%20group%20privileges.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de83a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0093-aix-nslookup-command-allows-local-users-to-obtain-root-access-by-not-dropping-privileges-correctly-7de838</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0093%3A%20AIX%20nslookup%20command%20allows%20local%20users%20to%20obtain%20root%20access%20by%20not%20dropping%20privileges%20correctly.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de838</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0092-various-vulnerabilities-in-the-aix-portmir-command-allows-local-users-to-obtain-root-access-7de836</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0092%3A%20Various%20vulnerabilities%20in%20the%20AIX%20portmir%20command%20allows%20local%20users%20to%20obtain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de836</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0091-buffer-overflow-in-aix-writesrv-command-allows-local-users-to-obtain-root-access-7de834</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0091%3A%20Buffer%20overflow%20in%20AIX%20writesrv%20command%20allows%20local%20users%20to%20obtain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de834</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0089-buffer-overflow-in-aix-libdtsvc-library-can-allow-local-users-to-gain-root-access-7de827</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0089%3A%20Buffer%20overflow%20in%20AIX%20libDtSvc%20library%20can%20allow%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de827</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1261-buffer-overflow-in-rainbow-six-multiplayer-allows-remote-attackers-to-cause-a-denial-of-service-and-7de825</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1261%3A%20Buffer%20overflow%20in%20Rainbow%20Six%20Multiplayer%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%2C%20and&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de825</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0072-buffer-overflow-in-aix-xdat-gives-root-access-to-local-users-7de821</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0072%3A%20Buffer%20overflow%20in%20AIX%20xdat%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de821</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0068-cgi-php-mylog-script-allows-an-attacker-to-read-any-file-on-the-target-server-7de81f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0068%3A%20CGI%20PHP%20mylog%20script%20allows%20an%20attacker%20to%20read%20any%20file%20on%20the%20target%20server.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de81f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0192-buffer-overflow-in-telnet-daemon-tgetent-routing-allows-remote-attackers-to-gain-root-access-via-the-7de81d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0192%3A%20Buffer%20overflow%20in%20telnet%20daemon%20tgetent%20routing%20allows%20remote%20attackers%20to%20gain%20root%20access%20via%20the&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de81d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0346-cgi-php-mlog-script-allows-an-attacker-to-read-any-file-on-the-target-server-7de81b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0346%3A%20CGI%20PHP%20mlog%20script%20allows%20an%20attacker%20to%20read%20any%20file%20on%20the%20target%20server.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de81b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1095-sort-creates-temporary-files-and-follows-symbolic-links-which-allows-local-users-to-modify-arbitrar-7de817</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1095%3A%20sort%20creates%20temporary%20files%20and%20follows%20symbolic%20links%2C%20which%20allows%20local%20users%20to%20modify%20arbitrar&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de817</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1062-hp-laserjet-printers-with-jetdirect-cards-when-configured-with-tcp-ip-allow-remote-attackers-to-by-7de815</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1062%3A%20HP%20Laserjet%20printers%20with%20JetDirect%20cards%2C%20when%20configured%20with%20TCP%2FIP%2C%20allow%20remote%20attackers%20to%20by&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de815</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1061-hp-laserjet-printers-with-jetdirect-cards-when-configured-with-tcp-ip-can-be-configured-without-a-7de808</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1061%3A%20HP%20Laserjet%20printers%20with%20JetDirect%20cards%2C%20when%20configured%20with%20TCP%2FIP%2C%20can%20be%20configured%20without%20a%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0061-file-creation-and-deletion-and-remote-execution-in-the-bsd-line-printer-daemon-lpd-7de806</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0061%3A%20File%20creation%20and%20deletion%2C%20and%20remote%20execution%2C%20in%20the%20BSD%20line%20printer%20daemon%20(lpd).&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1213-vulnerability-in-telnet-service-in-hp-ux-10-30-allows-attackers-to-cause-a-denial-of-service-7de804</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1213%3A%20Vulnerability%20in%20telnet%20service%20in%20HP-UX%2010.30%20allows%20attackers%20to%20cause%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0326-vulnerability-in-hp-ux-mediainit-program-7de802</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0326%3A%20Vulnerability%20in%20HP-UX%20mediainit%20program.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0300-nis-cachemgr-for-solaris-nis-allows-attackers-to-add-malicious-nis-servers-7de800</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0300%3A%20nis_cachemgr%20for%20Solaris%20NIS%2B%20allows%20attackers%20to%20add%20malicious%20NIS%2B%20servers.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0295-solaris-sysdef-command-allows-local-users-to-read-kernel-memory-potentially-leading-to-root-privile-7de7fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0295%3A%20Solaris%20sysdef%20command%20allows%20local%20users%20to%20read%20kernel%20memory%2C%20potentially%20leading%20to%20root%20privile&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0294-all-records-in-a-wins-database-can-be-deleted-through-snmp-for-a-denial-of-service-7de7fc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0294%3A%20All%20records%20in%20a%20WINS%20database%20can%20be%20deleted%20through%20SNMP%20for%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0272-denial-of-service-in-slmail-v2-5-through-the-pop3-port-7de7fa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0272%3A%20Denial%20of%20service%20in%20Slmail%20v2.5%20through%20the%20POP3%20port.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0185-in-sunos-or-solaris-a-remote-user-could-connect-from-an-ftp-server-s-data-port-to-an-rlogin-server-7de7f8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0185%3A%20In%20SunOS%20or%20Solaris%2C%20a%20remote%20user%20could%20connect%20from%20an%20FTP%20server&apos;s%20data%20port%20to%20an%20rlogin%20server%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0160-some-classic-cisco-ios-devices-have-a-vulnerability-in-the-ppp-chap-authentication-to-establish-unau-7de7f6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0160%3A%20Some%20classic%20Cisco%20IOS%20devices%20have%20a%20vulnerability%20in%20the%20PPP%20CHAP%20authentication%20to%20establish%20unau&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0090-buffer-overflow-in-aix-rcp-command-allows-local-users-to-obtain-root-access-7de7e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0090%3A%20Buffer%20overflow%20in%20AIX%20rcp%20command%20allows%20local%20users%20to%20obtain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0182-samba-has-a-buffer-overflow-which-allows-a-remote-attacker-to-obtain-root-access-by-specifying-a-lon-7de7e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0182%3A%20Samba%20has%20a%20buffer%20overflow%20which%20allows%20a%20remote%20attacker%20to%20obtain%20root%20access%20by%20specifying%20a%20lon&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0955-race-condition-in-wu-ftpd-and-bsdi-ftpd-allows-remote-attackers-to-gain-root-access-via-the-site-exe-7de7e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0955%3A%20Race%20condition%20in%20wu-ftpd%20and%20BSDI%20ftpd%20allows%20remote%20attackers%20to%20gain%20root%20access%20via%20the%20SITE%20EXE&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0267-buffer-overflow-in-ncsa-http-daemon-v1-3-allows-remote-command-execution-7de7e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0267%3A%20Buffer%20overflow%20in%20NCSA%20HTTP%20daemon%20v1.3%20allows%20remote%20command%20execution.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1125-oracle-webserver-2-1-and-earlier-runs-setuid-root-but-the-configuration-file-is-owned-by-the-oracle-7de7df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1125%3A%20Oracle%20Webserver%202.1%20and%20earlier%20runs%20setuid%20root%2C%20but%20the%20configuration%20file%20is%20owned%20by%20the%20oracle&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0965-race-condition-in-xterm-allows-local-users-to-modify-arbitrary-files-via-the-logging-option-7de7dd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0965%3A%20Race%20condition%20in%20xterm%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20the%20logging%20option.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0956-the-next-netinfo-writers-property-allows-local-users-to-gain-root-privileges-or-conduct-a-denial-of-7de7db</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0956%3A%20The%20NeXT%20NetInfo%20_writers%20property%20allows%20local%20users%20to%20gain%20root%20privileges%20or%20conduct%20a%20denial%20of&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0667-the-arp-protocol-allows-any-host-to-spoof-arp-replies-and-poison-the-arp-cache-to-conduct-ip-address-7de7d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0667%3A%20The%20ARP%20protocol%20allows%20any%20host%20to%20spoof%20ARP%20replies%20and%20poison%20the%20ARP%20cache%20to%20conduct%20IP%20address&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1214-the-asynchronous-i-o-facility-in-4-4-bsd-kernel-does-not-check-user-credentials-when-setting-the-rec-7de7d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1214%3A%20The%20asynchronous%20I%2FO%20facility%20in%204.4%20BSD%20kernel%20does%20not%20check%20user%20credentials%20when%20setting%20the%20rec&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de7d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0079-remote-attackers-can-cause-a-denial-of-service-in-ftp-by-issuing-multiple-pasv-commands-causing-the-7de7ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0079%3A%20Remote%20attackers%20can%20cause%20a%20denial%20of%20service%20in%20FTP%20by%20issuing%20multiple%20PASV%20commands%2C%20causing%20the&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1275-lotus-cc-mail-release-8-stores-the-postoffice-password-in-plaintext-in-a-hidden-file-which-has-insec-7de7c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1275%3A%20Lotus%20cc%3AMail%20release%208%20stores%20the%20postoffice%20password%20in%20plaintext%20in%20a%20hidden%20file%20which%20has%20insec&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1139-character-terminal-user-environment-cue-in-hp-ux-11-0-and-earlier-allows-local-users-to-overwrite-7de7c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1139%3A%20Character-Terminal%20User%20Environment%20(CUE)%20in%20HP-UX%2011.0%20and%20earlier%20allows%20local%20users%20to%20overwrite%20&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1133-hp-ux-9-x-and-10-x-running-x-windows-may-allow-local-attackers-to-gain-privileges-via-1-vuefile-7de7c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1133%3A%20HP-UX%209.x%20and%2010.x%20running%20X%20windows%20may%20allow%20local%20attackers%20to%20gain%20privileges%20via%20(1)%20vuefile%2C%20(&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0237-remote-execution-of-arbitrary-commands-through-guestbook-cgi-program-7de7c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0237%3A%20Remote%20execution%20of%20arbitrary%20commands%20through%20Guestbook%20CGI%20program.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0191-iis-newdsn-exe-cgi-script-allows-remote-users-to-overwrite-files-7de7c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0191%3A%20IIS%20newdsn.exe%20CGI%20script%20allows%20remote%20users%20to%20overwrite%20files.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0183-linux-implementations-of-tftp-would-allow-access-to-files-outside-the-restricted-directory-7de7be</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0183%3A%20Linux%20implementations%20of%20TFTP%20would%20allow%20access%20to%20files%20outside%20the%20restricted%20directory.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0177-the-uploader-program-in-the-website-web-server-allows-a-remote-attacker-to-execute-arbitrary-program-7de7bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0177%3A%20The%20uploader%20program%20in%20the%20WebSite%20web%20server%20allows%20a%20remote%20attacker%20to%20execute%20arbitrary%20program&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0148-the-handler-cgi-program-in-irix-allows-arbitrary-command-execution-7de7ba</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0148%3A%20The%20handler%20CGI%20program%20in%20IRIX%20allows%20arbitrary%20command%20execution.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0115-aix-bugfiler-program-allows-local-users-to-gain-root-access-7de7b8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0115%3A%20AIX%20bugfiler%20program%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0071-apache-httpd-cookie-buffer-overflow-for-versions-1-1-1-and-earlier-7de7ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0071%3A%20Apache%20httpd%20cookie%20buffer%20overflow%20for%20versions%201.1.1%20and%20earlier.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1225-rpc-mountd-on-linux-ultrix-and-possibly-other-operating-systems-allows-remote-attackers-to-determ-7de7a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1225%3A%20rpc.mountd%20on%20Linux%2C%20Ultrix%2C%20and%20possibly%20other%20operating%20systems%2C%20allows%20remote%20attackers%20to%20determ&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1220-majordomo-1-94-3-and-earlier-allows-remote-attackers-to-execute-arbitrary-commands-when-the-advertis-7de7a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1220%3A%20Majordomo%201.94.3%20and%20earlier%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20when%20the%20advertis&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1399-spaceball-program-in-spaceware-7-3-v1-0-in-irix-6-2-allows-local-users-to-gain-root-privileges-by-se-7de7a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1399%3A%20spaceball%20program%20in%20SpaceWare%207.3%20v1.0%20in%20IRIX%206.2%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20se&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de7a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1250-vulnerability-in-cgi-program-in-the-lasso-application-by-blue-world-as-used-on-webstar-and-other-se-7de7a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1250%3A%20Vulnerability%20in%20CGI%20program%20in%20the%20Lasso%20application%20by%20Blue%20World%2C%20as%20used%20on%20WebSTAR%20and%20other%20se&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0024-dns-cache-poisoning-via-bind-by-predictable-query-ids-7de7a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0024%3A%20DNS%20cache%20poisoning%20via%20BIND%2C%20by%20predictable%20query%20IDs.&amp;severity=medium&amp;id=682ca32bb6fd31d6ed7de7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0152-the-dg-ux-finger-daemon-allows-remote-command-execution-through-shell-metacharacters-7de79f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0152%3A%20The%20DG%2FUX%20finger%20daemon%20allows%20remote%20command%20execution%20through%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32bb6fd31d6ed7de79f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1446-internet-explorer-3-records-a-history-of-all-url-s-that-are-visited-by-a-user-in-dat-files-located-i-7de79d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1446%3A%20Internet%20Explorer%203%20records%20a%20history%20of%20all%20URL&apos;s%20that%20are%20visited%20by%20a%20user%20in%20DAT%20files%20located%20i&amp;severity=low&amp;id=682ca32bb6fd31d6ed7de79d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1262-java-in-netscape-4-5-does-not-properly-restrict-applets-from-connecting-to-other-hosts-besides-the-o-7de79b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1262%3A%20Java%20in%20Netscape%204.5%20does%20not%20properly%20restrict%20applets%20from%20connecting%20to%20other%20hosts%20besides%20the%20o&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de79b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0566-an-attacker-can-write-to-syslog-files-from-any-location-causing-a-denial-of-service-by-filling-up-t-7de799</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0566%3A%20An%20attacker%20can%20write%20to%20syslog%20files%20from%20any%20location%2C%20causing%20a%20denial%20of%20service%20by%20filling%20up%20t&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0524-icmp-information-such-as-1-netmask-and-2-timestamp-is-allowed-from-arbitrary-hosts-7de78c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0524%3A%20ICMP%20information%20such%20as%20(1)%20netmask%20and%20(2)%20timestamp%20is%20allowed%20from%20arbitrary%20hosts.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de78c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0301-buffer-overflow-in-sunos-solaris-ps-command-7de78a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0301%3A%20Buffer%20overflow%20in%20SunOS%2FSolaris%20ps%20command.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de78a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0238-php-cgi-allows-attackers-to-read-any-file-on-the-system-7de788</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0238%3A%20php.cgi%20allows%20attackers%20to%20read%20any%20file%20on%20the%20system.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de788</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1308-certain-programs-in-hp-ux-10-20-do-not-properly-handle-large-user-ids-uid-or-group-ids-gid-over-7de786</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1308%3A%20Certain%20programs%20in%20HP-UX%2010.20%20do%20not%20properly%20handle%20large%20user%20IDs%20(UID)%20or%20group%20IDs%20(GID)%20over%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de786</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1419-buffer-overflow-in-nss-nisplus-so-1-library-in-nis-in-solaris-2-3-and-2-4-allows-local-users-to-gai-7de784</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1419%3A%20Buffer%20overflow%20in%20nss_nisplus.so.1%20library%20in%20NIS%2B%20in%20Solaris%202.3%20and%202.4%20allows%20local%20users%20to%20gai&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de784</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1217-the-path-in-windows-nt-includes-the-current-working-directory-which-could-allow-local-users-to-7de782</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1217%3A%20The%20PATH%20in%20Windows%20NT%20includes%20the%20current%20working%20directory%20(.)%2C%20which%20could%20allow%20local%20users%20to%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de782</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1068-oracle-webserver-2-1-when-serving-pl-sql-stored-procedures-allows-remote-attackers-to-cause-a-deni-7de780</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1068%3A%20Oracle%20Webserver%202.1%2C%20when%20serving%20PL%2FSQL%20stored%20procedures%2C%20allows%20remote%20attackers%20to%20cause%20a%20deni&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de780</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0971-buffer-overflow-in-exim-allows-local-users-to-gain-root-privileges-via-a-long-include-option-in-a-7de77e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0971%3A%20Buffer%20overflow%20in%20Exim%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20%3Ainclude%3A%20option%20in%20a%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de77e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1208-buffer-overflow-in-ping-in-aix-4-2-and-earlier-allows-local-users-to-gain-root-privileges-via-a-long-7de77c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1208%3A%20Buffer%20overflow%20in%20ping%20in%20AIX%204.2%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de77c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0247-buffer-overflow-in-nnrpd-program-in-inn-up-to-version-1-6-allows-remote-users-to-execute-arbitrary-c-7de77a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0247%3A%20Buffer%20overflow%20in%20nnrpd%20program%20in%20INN%20up%20to%20version%201.6%20allows%20remote%20users%20to%20execute%20arbitrary%20c&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de77a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0122-buffer-overflow-in-aix-lchangelv-gives-root-access-7de76d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0122%3A%20Buffer%20overflow%20in%20AIX%20lchangelv%20gives%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1182-buffer-overflow-in-run-time-linkers-1-ld-so-or-2-ld-linux-so-for-linux-systems-allows-local-user-7de76b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1182%3A%20Buffer%20overflow%20in%20run-time%20linkers%20(1)%20ld.so%20or%20(2)%20ld-linux.so%20for%20Linux%20systems%20allows%20local%20user&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de76b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0030-root-privileges-via-buffer-overflow-in-xlock-command-on-sgi-irix-systems-7de769</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0030%3A%20root%20privileges%20via%20buffer%20overflow%20in%20xlock%20command%20on%20SGI%20IRIX%20systems.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de769</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0029-root-privileges-via-buffer-overflow-in-ordist-command-on-sgi-irix-systems-7de767</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0029%3A%20root%20privileges%20via%20buffer%20overflow%20in%20ordist%20command%20on%20SGI%20IRIX%20systems.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de767</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0028-root-privileges-via-buffer-overflow-in-login-scheme-command-on-sgi-irix-systems-7de765</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0028%3A%20root%20privileges%20via%20buffer%20overflow%20in%20login%2Fscheme%20command%20on%20SGI%20IRIX%20systems.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de765</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0027-root-privileges-via-buffer-overflow-in-eject-command-on-sgi-irix-systems-7de763</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0027%3A%20root%20privileges%20via%20buffer%20overflow%20in%20eject%20command%20on%20SGI%20IRIX%20systems.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de763</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0026-root-privileges-via-buffer-overflow-in-pset-command-on-sgi-irix-systems-7de761</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0026%3A%20root%20privileges%20via%20buffer%20overflow%20in%20pset%20command%20on%20SGI%20IRIX%20systems.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de761</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0025-root-privileges-via-buffer-overflow-in-df-command-on-sgi-irix-systems-7de75f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0025%3A%20root%20privileges%20via%20buffer%20overflow%20in%20df%20command%20on%20SGI%20IRIX%20systems.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de75f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0146-the-campas-cgi-program-provided-with-some-ncsa-web-servers-allows-an-attacker-to-execute-arbitrary-c-7de75d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0146%3A%20The%20campas%20CGI%20program%20provided%20with%20some%20NCSA%20web%20servers%20allows%20an%20attacker%20to%20execute%20arbitrary%20c&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de75d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0059-irix-fam-service-allows-an-attacker-to-obtain-a-list-of-all-files-on-the-server-7de75b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0059%3A%20IRIX%20fam%20service%20allows%20an%20attacker%20to%20obtain%20a%20list%20of%20all%20files%20on%20the%20server.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de75b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1463-windows-nt-4-0-before-sp3-allows-remote-attackers-to-bypass-firewall-restrictions-or-cause-a-denial-7de74e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1463%3A%20Windows%20NT%204.0%20before%20SP3%20allows%20remote%20attackers%20to%20bypass%20firewall%20restrictions%20or%20cause%20a%20denial%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de74e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0176-the-webgais-program-allows-a-remote-user-to-execute-arbitrary-commands-7de74c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0176%3A%20The%20Webgais%20program%20allows%20a%20remote%20user%20to%20execute%20arbitrary%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de74c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0196-websendmail-in-webgais-1-0-allows-a-remote-user-to-access-arbitrary-files-and-execute-arbitrary-code-7de74a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0196%3A%20websendmail%20in%20Webgais%201.0%20allows%20a%20remote%20user%20to%20access%20arbitrary%20files%20and%20execute%20arbitrary%20code&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de74a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0031-javascript-in-internet-explorer-3-x-and-4-x-and-netscape-2-x-3-x-and-4-x-allows-remote-attackers-7de748</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0031%3A%20JavaScript%20in%20Internet%20Explorer%203.x%20and%204.x%2C%20and%20Netscape%202.x%2C%203.x%20and%204.x%2C%20allows%20remote%20attackers%20&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1326-wu-ftpd-2-4-ftp-server-does-not-properly-drop-privileges-when-an-abor-abort-file-transfer-command-7de746</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1326%3A%20wu-ftpd%202.4%20FTP%20server%20does%20not%20properly%20drop%20privileges%20when%20an%20ABOR%20(abort%20file%20transfer)%20command%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0628-the-rwho-rwhod-service-is-running-which-exposes-machine-status-and-user-information-7de744</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0628%3A%20The%20rwho%2Frwhod%20service%20is%20running%2C%20which%20exposes%20machine%20status%20and%20user%20information.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0541-a-password-for-accessing-a-www-url-is-guessable-7de742</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0541%3A%20A%20password%20for%20accessing%20a%20WWW%20URL%20is%20guessable.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de742</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0533-a-dns-server-allows-inverse-queries-7de740</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0533%3A%20A%20DNS%20server%20allows%20inverse%20queries.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0532-a-dns-server-allows-zone-transfers-7de73e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0532%3A%20A%20DNS%20server%20allows%20zone%20transfers.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de73e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0526-an-x-server-s-access-control-is-disabled-e-g-through-an-xhost-command-and-allows-anyone-to-co-7de73c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0526%3A%20An%20X%20server&apos;s%20access%20control%20is%20disabled%20(e.g.%20through%20an%20%22xhost%20%2B%22%20command)%20and%20allows%20anyone%20to%20co&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de73c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0250-denial-of-service-in-qmail-through-long-smtp-commands-7de72f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0250%3A%20Denial%20of%20service%20in%20Qmail%20through%20long%20SMTP%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0219-buffer-overflow-in-ftp-serv-u-2-5-allows-remote-authenticated-users-to-cause-a-denial-of-service-cr-7de72d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0219%3A%20Buffer%20overflow%20in%20FTP%20Serv-U%202.5%20allows%20remote%20authenticated%20users%20to%20cause%20a%20denial%20of%20service%20(cr&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0184-when-compiled-with-the-dallow-updates-option-bind-allows-dynamic-updates-to-the-dns-server-allowi-7de729</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0184%3A%20When%20compiled%20with%20the%20-DALLOW_UPDATES%20option%2C%20bind%20allows%20dynamic%20updates%20to%20the%20DNS%20server%2C%20allowi&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0169-nfs-allows-attackers-to-read-and-write-any-file-on-the-system-by-specifying-a-false-uid-7de727</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0169%3A%20NFS%20allows%20attackers%20to%20read%20and%20write%20any%20file%20on%20the%20system%20by%20specifying%20a%20false%20UID.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de727</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0156-wu-ftpd-ftp-daemon-allows-any-user-and-password-combination-7de725</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0156%3A%20wu-ftpd%20FTP%20daemon%20allows%20any%20user%20and%20password%20combination.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de725</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0153-windows-95-nt-out-of-band-oob-data-denial-of-service-through-netbios-port-aka-winnuke-7de723</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0153%3A%20Windows%2095%2FNT%20out%20of%20band%20(OOB)%20data%20denial%20of%20service%20through%20NETBIOS%20port%2C%20aka%20WinNuke.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de723</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0150-the-perl-fingerd-program-allows-arbitrary-command-execution-from-remote-users-7de721</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0150%3A%20The%20Perl%20fingerd%20program%20allows%20arbitrary%20command%20execution%20from%20remote%20users.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de721</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0147-the-aglimpse-cgi-program-of-the-glimpse-package-allows-remote-execution-of-arbitrary-commands-7de71f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0147%3A%20The%20aglimpse%20CGI%20program%20of%20the%20Glimpse%20package%20allows%20remote%20execution%20of%20arbitrary%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de71f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0111-rip-v1-is-susceptible-to-spoofing-7de71d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0111%3A%20RIP%20v1%20is%20susceptible%20to%20spoofing.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de71d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0076-buffer-overflow-in-wu-ftp-from-pasv-command-causes-a-core-dump-7de710</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0076%3A%20Buffer%20overflow%20in%20wu-ftp%20from%20PASV%20command%20causes%20a%20core%20dump.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de710</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0074-listening-tcp-ports-are-sequentially-allocated-allowing-spoofing-attacks-7de70e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0074%3A%20Listening%20TCP%20ports%20are%20sequentially%20allocated%2C%20allowing%20spoofing%20attacks.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de70e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1423-ping-in-solaris-2-3-through-2-6-allows-local-users-to-cause-a-denial-of-service-crash-via-a-ping-r-7de70c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1423%3A%20ping%20in%20Solaris%202.3%20through%202.6%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20(crash)%20via%20a%20ping%20r&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de70c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1192-buffer-overflow-in-eeprom-in-solaris-2-5-1-and-earlier-allows-local-users-to-gain-root-privileges-vi-7de70a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1192%3A%20Buffer%20overflow%20in%20eeprom%20in%20Solaris%202.5.1%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges%20vi&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de70a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1483-buffer-overflow-in-zgv-in-svgalib-1-2-10-and-earlier-allows-local-users-to-execute-arbitrary-code-vi-7de708</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1483%3A%20Buffer%20overflow%20in%20zgv%20in%20svgalib%201.2.10%20and%20earlier%20allows%20local%20users%20to%20execute%20arbitrary%20code%20vi&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de708</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0957-majorcool-mj-key-cache-program-allows-local-users-to-modify-files-via-a-symlink-attack-7de706</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0957%3A%20MajorCool%20mj_key_cache%20program%20allows%20local%20users%20to%20modify%20files%20via%20a%20symlink%20attack.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de706</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1266-rsh-daemon-rshd-generates-different-error-messages-when-a-valid-username-is-provided-versus-an-inv-7de704</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1266%3A%20rsh%20daemon%20(rshd)%20generates%20different%20error%20messages%20when%20a%20valid%20username%20is%20provided%20versus%20an%20inv&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de704</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0033-command-execution-in-sun-systems-via-buffer-overflow-in-the-at-program-7de702</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0033%3A%20Command%20execution%20in%20Sun%20systems%20via%20buffer%20overflow%20in%20the%20at%20program.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de702</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0083-getcwd-file-descriptor-leak-in-ftp-7de700</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0083%3A%20getcwd()%20file%20descriptor%20leak%20in%20FTP.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0275-denial-of-service-in-windows-nt-dns-servers-by-flooding-port-53-with-too-many-characters-7de6fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0275%3A%20Denial%20of%20service%20in%20Windows%20NT%20DNS%20servers%20by%20flooding%20port%2053%20with%20too%20many%20characters.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0189-solaris-rpcbind-listens-on-a-high-numbered-udp-port-which-may-not-be-filtered-since-the-standard-po-7de6f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0189%3A%20Solaris%20rpcbind%20listens%20on%20a%20high%20numbered%20UDP%20port%2C%20which%20may%20not%20be%20filtered%20since%20the%20standard%20po&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0799-buffer-overflow-in-bootpd-2-4-3-and-earlier-via-a-long-boot-file-location-7de6ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0799%3A%20Buffer%20overflow%20in%20bootpd%202.4.3%20and%20earlier%20via%20a%20long%20boot%20file%20location.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0281-denial-of-service-in-iis-using-long-urls-7de6ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0281%3A%20Denial%20of%20service%20in%20IIS%20using%20long%20URLs.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0227-access-violation-in-lsass-exe-lsa-lsarpc-program-in-windows-nt-allows-a-denial-of-service-7de6eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0227%3A%20Access%20violation%20in%20LSASS.EXE%20(LSA%2FLSARPC)%20program%20in%20Windows%20NT%20allows%20a%20denial%20of%20service.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0144-denial-of-service-in-qmail-by-specifying-a-large-number-of-recipients-with-the-rcpt-command-7de6e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0144%3A%20Denial%20of%20service%20in%20Qmail%20by%20specifying%20a%20large%20number%20of%20recipients%20with%20the%20RCPT%20command.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de6e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0035-race-condition-in-signal-handling-routine-in-ftpd-allowing-read-write-arbitrary-files-7de6e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0035%3A%20Race%20condition%20in%20signal%20handling%20routine%20in%20ftpd%2C%20allowing%20read%2Fwrite%20arbitrary%20files.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0034-buffer-overflow-in-suidperl-sperl-perl-4-x-and-5-x-7de6e5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0034%3A%20Buffer%20overflow%20in%20suidperl%20(sperl)%2C%20Perl%204.x%20and%205.x.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1143-vulnerability-in-runtime-linker-program-rld-in-sgi-irix-6-x-and-earlier-allows-local-users-to-gain-p-7de6e3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1143%3A%20Vulnerability%20in%20runtime%20linker%20program%20rld%20in%20SGI%20IRIX%206.x%20and%20earlier%20allows%20local%20users%20to%20gain%20p&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0064-buffer-overflow-in-aix-lquerylv-program-gives-root-access-to-local-users-7de6e1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0064%3A%20Buffer%20overflow%20in%20AIX%20lquerylv%20program%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0036-irix-login-program-with-a-nonzero-lockout-parameter-allows-creation-or-damage-to-files-7de6df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0036%3A%20IRIX%20login%20program%20with%20a%20nonzero%20LOCKOUT%20parameter%20allows%20creation%20or%20damage%20to%20files.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0259-cfingerd-lists-all-users-on-a-system-via-search-target-7de6d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0259%3A%20cfingerd%20lists%20all%20users%20on%20a%20system%20via%20search.**%40target.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0037-arbitrary-command-execution-via-metamail-package-using-message-headers-when-user-processes-attacker-7de6d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0037%3A%20Arbitrary%20command%20execution%20via%20metamail%20package%20using%20message%20headers%2C%20when%20user%20processes%20attacker&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1449-sunos-4-1-4-on-a-sparc-20-machine-allows-local-users-to-cause-a-denial-of-service-kernel-panic-by-7de6ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1449%3A%20SunOS%204.1.4%20on%20a%20Sparc%2020%20machine%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20(kernel%20panic)%20by%20&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de6ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1191-buffer-overflow-in-chkey-in-solaris-2-5-1-and-earlier-allows-local-users-to-gain-root-privileges-via-7de6cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1191%3A%20Buffer%20overflow%20in%20chkey%20in%20Solaris%202.5.1%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges%20via&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1402-the-access-permissions-for-a-unix-domain-socket-are-ignored-in-solaris-2-x-and-sunos-4-x-and-other-7de6ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1402%3A%20The%20access%20permissions%20for%20a%20UNIX%20domain%20socket%20are%20ignored%20in%20Solaris%202.x%20and%20SunOS%204.x%2C%20and%20other%20&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de6ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1232-untrusted-search-path-vulnerability-in-day5datacopier-in-sgi-irix-6-2-allows-local-users-to-execute-7de6c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1232%3A%20Untrusted%20search%20path%20vulnerability%20in%20day5datacopier%20in%20SGI%20IRIX%206.2%20allows%20local%20users%20to%20execute%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1141-ascom-timeplex-router-allows-remote-attackers-to-obtain-sensitive-information-or-conduct-unauthorize-7de6c6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1141%3A%20Ascom%20Timeplex%20router%20allows%20remote%20attackers%20to%20obtain%20sensitive%20information%20or%20conduct%20unauthorize&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0962-buffer-overflow-in-hpux-passwd-command-allows-local-users-to-gain-root-privileges-via-a-command-line-7de6c4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0962%3A%20Buffer%20overflow%20in%20HPUX%20passwd%20command%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20command%20line&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1184-buffer-overflow-in-elm-2-4-and-earlier-allows-local-users-to-gain-privileges-via-a-long-term-environ-7de6c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1184%3A%20Buffer%20overflow%20in%20Elm%202.4%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20long%20TERM%20environ&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1158-buffer-overflow-in-1-pluggable-authentication-module-pam-on-solaris-2-5-1-and-2-5-and-2-unix-s-7de6c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1158%3A%20Buffer%20overflow%20in%20(1)%20pluggable%20authentication%20module%20(PAM)%20on%20Solaris%202.5.1%20and%202.5%20and%20(2)%20unix_s&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1410-addnetpr-in-irix-5-3-and-6-2-allows-local-users-to-overwrite-arbitrary-files-and-possibly-gain-root-7de6b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1410%3A%20addnetpr%20in%20IRIX%205.3%20and%206.2%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20and%20possibly%20gain%20root%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1286-addnetpr-in-sgi-irix-6-2-and-earlier-allows-local-users-to-modify-arbitrary-files-and-possibly-gain-7de6b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1286%3A%20addnetpr%20in%20SGI%20IRIX%206.2%20and%20earlier%20allows%20local%20users%20to%20modify%20arbitrary%20files%20and%20possibly%20gain%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1461-inpview-in-inperson-on-irix-5-3-through-irix-6-5-10-trusts-the-path-environmental-variable-to-find-a-7de6af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1461%3A%20inpview%20in%20InPerson%20on%20IRIX%205.3%20through%20IRIX%206.5.10%20trusts%20the%20PATH%20environmental%20variable%20to%20find%20a&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1398-vulnerability-in-xfsdump-in-sgi-irix-may-allow-local-users-to-obtain-root-privileges-via-the-bck-log-7de6ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1398%3A%20Vulnerability%20in%20xfsdump%20in%20SGI%20IRIX%20may%20allow%20local%20users%20to%20obtain%20root%20privileges%20via%20the%20bck.log&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1067-sgi-machineinfo-cgi-program-installed-by-default-on-some-web-servers-prints-potentially-sensitive-7de6ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1067%3A%20SGI%20MachineInfo%20CGI%20program%2C%20installed%20by%20default%20on%20some%20web%20servers%2C%20prints%20potentially%20sensitive%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0039-webdist-cgi-program-webdist-cgi-in-sgi-irix-allows-remote-attackers-to-execute-arbitrary-commands-7de6a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0039%3A%20webdist%20CGI%20program%20(webdist.cgi)%20in%20SGI%20IRIX%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1267-kde-file-manager-kfm-uses-a-tcp-server-for-certain-file-operations-which-allows-remote-attackers-7de6a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1267%3A%20KDE%20file%20manager%20(kfm)%20uses%20a%20TCP%20server%20for%20certain%20file%20operations%2C%20which%20allows%20remote%20attackers%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1380-symantec-norton-utilities-2-0-for-windows-95-marks-the-tuneocx-ocx-activex-control-as-safe-for-scrip-7de6a5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1380%3A%20Symantec%20Norton%20Utilities%202.0%20for%20Windows%2095%20marks%20the%20TUNEOCX.OCX%20ActiveX%20control%20as%20safe%20for%20scrip&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de6a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1116-vulnerability-in-runpriv-in-indigo-magic-system-administration-subsystem-of-sgi-irix-6-3-and-6-4-all-7de6a3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1116%3A%20Vulnerability%20in%20runpriv%20in%20Indigo%20Magic%20System%20Administration%20subsystem%20of%20SGI%20IRIX%206.3%20and%206.4%20all&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0112-buffer-overflow-in-aix-dtterm-program-for-the-cde-7de6a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0112%3A%20Buffer%20overflow%20in%20AIX%20dtterm%20program%20for%20the%20CDE.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de6a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0040-buffer-overflow-in-xt-library-of-x-windowing-system-allows-local-users-to-execute-commands-with-root-7de694</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0040%3A%20Buffer%20overflow%20in%20Xt%20library%20of%20X%20Windowing%20System%20allows%20local%20users%20to%20execute%20commands%20with%20root&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de694</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1296-buffer-overflow-in-kerberos-iv-compatibility-libraries-as-used-in-kerberos-v-allows-local-users-to-g-7de692</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1296%3A%20Buffer%20overflow%20in%20Kerberos%20IV%20compatibility%20libraries%20as%20used%20in%20Kerberos%20V%20allows%20local%20users%20to%20g&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de692</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0038-buffer-overflow-in-xlock-program-allows-local-users-to-execute-commands-as-root-7de690</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0038%3A%20Buffer%20overflow%20in%20xlock%20program%20allows%20local%20users%20to%20execute%20commands%20as%20root.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de690</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0149-the-wrap-cgi-program-in-irix-allows-remote-attackers-to-view-arbitrary-directory-listings-via-a-7de68e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0149%3A%20The%20wrap%20CGI%20program%20in%20IRIX%20allows%20remote%20attackers%20to%20view%20arbitrary%20directory%20listings%20via%20a%20..%20(&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de68e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0058-buffer-overflow-in-php-cgi-program-php-cgi-allows-shell-access-7de68c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0058%3A%20Buffer%20overflow%20in%20PHP%20cgi%20program%2C%20php.cgi%20allows%20shell%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de68c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1298-sysinstall-in-freebsd-2-2-1-and-earlier-when-configuring-anonymous-ftp-creates-the-ftp-user-withou-7de68a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1298%3A%20Sysinstall%20in%20FreeBSD%202.2.1%20and%20earlier%2C%20when%20configuring%20anonymous%20FTP%2C%20creates%20the%20ftp%20user%20withou&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de68a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0042-buffer-overflow-in-university-of-washington-s-implementation-of-imap-and-pop-servers-7de688</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0042%3A%20Buffer%20overflow%20in%20University%20of%20Washington&apos;s%20implementation%20of%20IMAP%20and%20POP%20servers.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de688</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1387-windows-nt-4-0-sp2-allows-remote-attackers-to-cause-a-denial-of-service-crash-possibly-via-malfor-7de686</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1387%3A%20Windows%20NT%204.0%20SP2%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20(crash)%2C%20possibly%20via%20malfor&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de686</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0315-buffer-overflow-in-solaris-fdformat-command-gives-root-access-to-local-users-7de684</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0315%3A%20Buffer%20overflow%20in%20Solaris%20fdformat%20command%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de684</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0292-denial-of-service-through-winpopup-using-large-user-names-7de682</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0292%3A%20Denial%20of%20service%20through%20Winpopup%20using%20large%20user%20names.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de682</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0280-remote-command-execution-in-microsoft-internet-explorer-using-lnk-and-url-files-7de675</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0280%3A%20Remote%20command%20execution%20in%20Microsoft%20Internet%20Explorer%20using%20.lnk%20and%20.url%20files.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de675</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1525-macromedia-shockwave-before-6-0-allows-a-malicious-webmaster-to-read-a-user-s-mail-box-and-possibly-7de673</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1525%3A%20Macromedia%20Shockwave%20before%206.0%20allows%20a%20malicious%20webmaster%20to%20read%20a%20user&apos;s%20mail%20box%20and%20possibly%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1408-vulnerability-in-aix-4-1-4-and-hp-ux-10-01-and-9-05-allows-local-users-to-cause-a-denial-of-service-7de671</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1408%3A%20Vulnerability%20in%20AIX%204.1.4%20and%20HP-UX%2010.01%20and%209.05%20allows%20local%20users%20to%20cause%20a%20denial%20of%20service%20&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de671</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0299-buffer-overflow-in-freebsd-lpd-through-long-dns-hostnames-7de66f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0299%3A%20Buffer%20overflow%20in%20FreeBSD%20lpd%20through%20long%20DNS%20hostnames.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de66f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1489-buffer-overflow-in-testchip-function-in-xfree86-superprobe-in-slackware-linux-3-1-allows-local-users-7de66d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1489%3A%20Buffer%20overflow%20in%20TestChip%20function%20in%20XFree86%20SuperProbe%20in%20Slackware%20Linux%203.1%20allows%20local%20users&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de66d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1128-internet-explorer-3-01-on-windows-95-allows-remote-malicious-web-sites-to-execute-arbitrary-commands-7de66b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1128%3A%20Internet%20Explorer%203.01%20on%20Windows%2095%20allows%20remote%20malicious%20web%20sites%20to%20execute%20arbitrary%20commands&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de66b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0612-a-version-of-finger-is-running-that-exposes-valid-user-information-to-any-entity-on-the-network-7de669</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0612%3A%20A%20version%20of%20finger%20is%20running%20that%20exposes%20valid%20user%20information%20to%20any%20entity%20on%20the%20network.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de669</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0318-buffer-overflow-in-xmcd-2-0p12-allows-local-users-to-gain-access-through-an-environmental-variable-7de667</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0318%3A%20Buffer%20overflow%20in%20xmcd%202.0p12%20allows%20local%20users%20to%20gain%20access%20through%20an%20environmental%20variable.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de667</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0165-nfs-cache-poisoning-7de665</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0165%3A%20NFS%20cache%20poisoning.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de665</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0106-finger-redirection-allows-finger-bombs-7de663</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0106%3A%20Finger%20redirection%20allows%20finger%20bombs.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de663</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0105-finger-allows-recursive-searches-by-using-a-long-string-of-symbols-7de656</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0105%3A%20finger%20allows%20recursive%20searches%20by%20using%20a%20long%20string%20of%20%40%20symbols.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0868-ucbmail-allows-remote-attackers-to-execute-commands-via-shell-metacharacters-that-are-passed-to-it-f-7de654</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0868%3A%20ucbmail%20allows%20remote%20attackers%20to%20execute%20commands%20via%20shell%20metacharacters%20that%20are%20passed%20to%20it%20f&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de654</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0041-buffer-overflow-in-nls-natural-language-service-7de652</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0041%3A%20Buffer%20overflow%20in%20NLS%20(Natural%20Language%20Service).&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de652</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0109-buffer-overflow-in-ffbconfig-in-solaris-2-5-1-7de650</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0109%3A%20Buffer%20overflow%20in%20ffbconfig%20in%20Solaris%202.5.1.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de650</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0228-denial-of-service-in-rpcss-exe-program-rpc-locator-in-windows-nt-7de64e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0228%3A%20Denial%20of%20service%20in%20RPCSS.EXE%20program%20(RPC%20Locator)%20in%20Windows%20NT.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de64e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0046-buffer-overflow-of-rlogin-program-using-term-environmental-variable-7de64c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0046%3A%20Buffer%20overflow%20of%20rlogin%20program%20using%20TERM%20environmental%20variable.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de64c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0298-ypbind-with-ypset-and-ypsetme-options-activated-in-linux-slackware-and-sunos-allows-local-and-remo-7de64a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0298%3A%20ypbind%20with%20-ypset%20and%20-ypsetme%20options%20activated%20in%20Linux%20Slackware%20and%20SunOS%20allows%20local%20and%20remo&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de64a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1299-rcp-on-various-linux-systems-including-red-hat-4-0-allows-a-nobody-user-or-other-user-with-uid-of-7de648</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1299%3A%20rcp%20on%20various%20Linux%20systems%20including%20Red%20Hat%204.0%20allows%20a%20%22nobody%22%20user%20or%20other%20user%20with%20UID%20of%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1160-vulnerability-in-ftpd-kftpd-in-hp-ux-10-x-and-9-x-allows-local-and-possibly-remote-users-to-gain-roo-7de646</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1160%3A%20Vulnerability%20in%20ftpd%2Fkftpd%20in%20HP-UX%2010.x%20and%209.x%20allows%20local%20and%20possibly%20remote%20users%20to%20gain%20roo&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0959-irix-startmidi-program-allows-local-users-to-modify-arbitrary-files-via-a-symlink-attack-7de644</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0959%3A%20IRIX%20startmidi%20program%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attack.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0369-the-sun-sdtcm-convert-calendar-utility-for-openwindows-has-a-buffer-overflow-which-can-gain-root-acc-7de637</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0369%3A%20The%20Sun%20sdtcm_convert%20calendar%20utility%20for%20OpenWindows%20has%20a%20buffer%20overflow%20which%20can%20gain%20root%20acc&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de637</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0309-hp-ux-vgdisplay-program-gives-root-access-to-local-users-7de635</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0309%3A%20HP-UX%20vgdisplay%20program%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de635</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0174-the-view-source-cgi-program-allows-remote-attackers-to-read-arbitrary-files-via-a-dot-dot-attac-7de633</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0174%3A%20The%20view-source%20CGI%20program%20allows%20remote%20attackers%20to%20read%20arbitrary%20files%20via%20a%20..%20(dot%20dot)%20attac&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1144-certain-files-in-mpower-in-hp-ux-10-x-are-installed-with-insecure-permissions-which-allows-local-us-7de631</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1144%3A%20Certain%20files%20in%20MPower%20in%20HP-UX%2010.x%20are%20installed%20with%20insecure%20permissions%2C%20which%20allows%20local%20us&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0047-mime-conversion-buffer-overflow-in-sendmail-versions-8-8-3-and-8-8-4-7de62f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0047%3A%20MIME%20conversion%20buffer%20overflow%20in%20sendmail%20versions%208.8.3%20and%208.8.4.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de62f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0966-buffer-overflow-in-solaris-getopt-in-libc-allows-local-users-to-gain-root-privileges-via-a-long-argv-7de62d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0966%3A%20Buffer%20overflow%20in%20Solaris%20getopt%20in%20libc%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20long%20argv&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de62d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0048-talkd-when-given-corrupt-dns-information-can-be-used-to-execute-arbitrary-commands-with-root-privi-7de62b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0048%3A%20Talkd%2C%20when%20given%20corrupt%20DNS%20information%2C%20can%20be%20used%20to%20execute%20arbitrary%20commands%20with%20root%20privi&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de62b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0081-wu-ftp-allows-files-to-be-overwritten-via-the-rnfr-command-7de629</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0081%3A%20wu-ftp%20allows%20files%20to%20be%20overwritten%20via%20the%20rnfr%20command.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1088-vulnerability-in-chsh-command-in-hp-ux-9-x-through-10-20-allows-local-users-to-gain-privileges-7de627</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1088%3A%20Vulnerability%20in%20chsh%20command%20in%20HP-UX%209.X%20through%2010.20%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de627</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0049-csetup-under-irix-allows-arbitrary-file-creation-or-overwriting-7de625</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0049%3A%20Csetup%20under%20IRIX%20allows%20arbitrary%20file%20creation%20or%20overwriting.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de625</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1311-vulnerability-in-dtlogin-and-dtsession-in-hp-ux-10-20-and-10-10-allows-local-users-to-bypass-authent-7de618</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1311%3A%20Vulnerability%20in%20dtlogin%20and%20dtsession%20in%20HP-UX%2010.20%20and%2010.10%20allows%20local%20users%20to%20bypass%20authent&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1145-vulnerability-in-glance-programs-in-glanceplus-for-hp-ux-10-20-and-earlier-allows-local-users-to-acc-7de616</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1145%3A%20Vulnerability%20in%20Glance%20programs%20in%20GlancePlus%20for%20HP-UX%2010.20%20and%20earlier%20allows%20local%20users%20to%20acc&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de616</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1249-movemail-in-hp-ux-10-20-has-insecure-permissions-which-allows-local-users-to-gain-privileges-7de614</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1249%3A%20movemail%20in%20HP-UX%2010.20%20has%20insecure%20permissions%2C%20which%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de614</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0051-arbitrary-file-creation-and-program-execution-using-flexlm-licensemanager-from-versions-4-0-to-5-0-7de612</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0051%3A%20Arbitrary%20file%20creation%20and%20program%20execution%20using%20FLEXlm%20LicenseManager%2C%20from%20versions%204.0%20to%205.0%2C&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de612</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1120-netprint-in-sgi-irix-6-4-and-earlier-trusts-the-path-environmental-variable-for-finding-and-executin-7de610</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1120%3A%20netprint%20in%20SGI%20IRIX%206.4%20and%20earlier%20trusts%20the%20PATH%20environmental%20variable%20for%20finding%20and%20executin&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de610</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0626-a-version-of-rusers-is-running-that-exposes-valid-user-information-to-any-entity-on-the-network-7de60e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0626%3A%20A%20version%20of%20rusers%20is%20running%20that%20exposes%20valid%20user%20information%20to%20any%20entity%20on%20the%20network.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de60e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0582-a-windows-nt-account-policy-has-inappropriate-security-critical-settings-for-lockout-e-g-lockout-7de60c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0582%3A%20A%20Windows%20NT%20account%20policy%20has%20inappropriate%2C%20security-critical%20settings%20for%20lockout%2C%20e.g.%20lockout%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de60c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0576-a-windows-nt-system-s-file-audit-policy-does-not-log-an-event-success-or-failure-for-security-critic-7de60a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0576%3A%20A%20Windows%20NT%20system&apos;s%20file%20audit%20policy%20does%20not%20log%20an%20event%20success%20or%20failure%20for%20security-critic&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de60a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0575-a-windows-nt-system-s-user-audit-policy-does-not-log-an-event-success-or-failure-e-g-for-logon-and-7de608</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0575%3A%20A%20Windows%20NT%20system&apos;s%20user%20audit%20policy%20does%20not%20log%20an%20event%20success%20or%20failure%2C%20e.g.%20for%20Logon%20and&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0572-reg-files-are-associated-with-the-windows-nt-registry-editor-regedit-making-the-registry-suscept-7de606</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0572%3A%20.reg%20files%20are%20associated%20with%20the%20Windows%20NT%20registry%20editor%20(regedit)%2C%20making%20the%20registry%20suscept&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0562-the-registry-in-windows-nt-can-be-accessed-remotely-by-users-who-are-not-administrators-7de5f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0562%3A%20The%20registry%20in%20Windows%20NT%20can%20be%20accessed%20remotely%20by%20users%20who%20are%20not%20administrators.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0550-a-router-s-routing-tables-can-be-obtained-from-arbitrary-hosts-7de5f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0550%3A%20A%20router&apos;s%20routing%20tables%20can%20be%20obtained%20from%20arbitrary%20hosts.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0535-a-windows-nt-account-policy-for-passwords-has-inappropriate-security-critical-settings-e-g-for-pa-7de5f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0535%3A%20A%20Windows%20NT%20account%20policy%20for%20passwords%20has%20inappropriate%2C%20security-critical%20settings%2C%20e.g.%20for%20pa&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0534-a-windows-nt-user-has-inappropriate-rights-or-privileges-e-g-act-as-system-add-workstation-backu-7de5f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0534%3A%20A%20Windows%20NT%20user%20has%20inappropriate%20rights%20or%20privileges%2C%20e.g.%20Act%20as%20System%2C%20Add%20Workstation%2C%20Backu&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0525-ip-traceroute-is-allowed-from-arbitrary-hosts-7de5f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0525%3A%20IP%20traceroute%20is%20allowed%20from%20arbitrary%20hosts.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de5f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0521-an-nis-domain-name-is-easily-guessable-7de5ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0521%3A%20An%20NIS%20domain%20name%20is%20easily%20guessable.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0519-a-netbios-smb-share-password-is-the-default-null-or-missing-7de5ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0519%3A%20A%20NETBIOS%2FSMB%20share%20password%20is%20the%20default%2C%20null%2C%20or%20missing.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0518-a-netbios-smb-share-password-is-guessable-7de5eb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0518%3A%20A%20NETBIOS%2FSMB%20share%20password%20is%20guessable.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0517-an-snmp-community-name-is-the-default-e-g-public-null-or-missing-7de5e9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0517%3A%20An%20SNMP%20community%20name%20is%20the%20default%20(e.g.%20public)%2C%20null%2C%20or%20missing.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0511-ip-forwarding-is-enabled-on-a-machine-which-is-not-a-router-or-firewall-7de5e7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0511%3A%20IP%20forwarding%20is%20enabled%20on%20a%20machine%20which%20is%20not%20a%20router%20or%20firewall.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0510-a-router-or-firewall-allows-source-routed-packets-from-arbitrary-hosts-7de5da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0510%3A%20A%20router%20or%20firewall%20allows%20source%20routed%20packets%20from%20arbitrary%20hosts.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0504-a-windows-nt-local-user-or-administrator-account-has-a-default-null-blank-or-missing-password-7de5d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0504%3A%20A%20Windows%20NT%20local%20user%20or%20administrator%20account%20has%20a%20default%2C%20null%2C%20blank%2C%20or%20missing%20password.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0503-a-windows-nt-local-user-or-administrator-account-has-a-guessable-password-7de5d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0503%3A%20A%20Windows%20NT%20local%20user%20or%20administrator%20account%20has%20a%20guessable%20password.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0499-netbios-share-information-may-be-published-through-snmp-registry-keys-in-nt-7de5d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0499%3A%20NETBIOS%20share%20information%20may%20be%20published%20through%20SNMP%20registry%20keys%20in%20NT.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0496-a-windows-nt-4-0-user-can-gain-administrative-rights-by-forcing-ntopenprocesstoken-to-succeed-regard-7de5d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0496%3A%20A%20Windows%20NT%204.0%20user%20can%20gain%20administrative%20rights%20by%20forcing%20NtOpenProcessToken%20to%20succeed%20regard&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0345-jolt-icmp-attack-causes-a-denial-of-service-in-windows-95-and-windows-nt-systems-7de5d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0345%3A%20Jolt%20ICMP%20attack%20causes%20a%20denial%20of%20service%20in%20Windows%2095%20and%20Windows%20NT%20systems.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0274-denial-of-service-in-windows-nt-dns-servers-through-malicious-packet-which-contains-a-response-to-a-7de5ce</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0274%3A%20Denial%20of%20service%20in%20Windows%20NT%20DNS%20servers%20through%20malicious%20packet%20which%20contains%20a%20response%20to%20a%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0265-icmp-redirect-messages-may-crash-or-lock-up-a-host-7de5cc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0265%3A%20ICMP%20redirect%20messages%20may%20crash%20or%20lock%20up%20a%20host.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0253-iis-3-0-with-the-iis-fix-hotfix-installed-allows-remote-intruders-to-read-source-code-for-asp-progra-7de5ca</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0253%3A%20IIS%203.0%20with%20the%20iis-fix%20hotfix%20installed%20allows%20remote%20intruders%20to%20read%20source%20code%20for%20ASP%20progra&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0252-buffer-overflow-in-listserv-allows-arbitrary-command-execution-7de5c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0252%3A%20Buffer%20overflow%20in%20listserv%20allows%20arbitrary%20command%20execution.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0251-denial-of-service-in-talk-program-allows-remote-attackers-to-disrupt-a-user-s-display-7de5bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0251%3A%20Denial%20of%20service%20in%20talk%20program%20allows%20remote%20attackers%20to%20disrupt%20a%20user&apos;s%20display.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0249-windows-nt-rshsvc-program-allows-remote-users-to-execute-arbitrary-commands-7de5b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0249%3A%20Windows%20NT%20RSHSVC%20program%20allows%20remote%20users%20to%20execute%20arbitrary%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0236-scriptalias-directory-in-ncsa-and-apache-httpd-allowed-attackers-to-read-cgi-programs-7de5b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0236%3A%20ScriptAlias%20directory%20in%20NCSA%20and%20Apache%20httpd%20allowed%20attackers%20to%20read%20CGI%20programs.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0217-malicious-option-settings-in-udp-packets-could-force-a-reboot-in-sunos-4-1-3-systems-7de5b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0217%3A%20Malicious%20option%20settings%20in%20UDP%20packets%20could%20force%20a%20reboot%20in%20SunOS%204.1.3%20systems.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0204-sendmail-8-6-9-allows-remote-attackers-to-execute-root-commands-using-ident-7de5b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0204%3A%20Sendmail%208.6.9%20allows%20remote%20attackers%20to%20execute%20root%20commands%2C%20using%20ident.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0202-the-gnu-tar-command-when-used-in-ftp-sessions-may-allow-an-attacker-to-execute-arbitrary-commands-7de5b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0202%3A%20The%20GNU%20tar%20command%2C%20when%20used%20in%20FTP%20sessions%2C%20may%20allow%20an%20attacker%20to%20execute%20arbitrary%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0201-a-quote-cwd-command-on-ftp-servers-can-reveal-the-full-path-of-the-home-directory-of-the-ftp-user-7de5af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0201%3A%20A%20quote%20cwd%20command%20on%20FTP%20servers%20can%20reveal%20the%20full%20path%20of%20the%20home%20directory%20of%20the%20%22ftp%22%20user.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0180-in-rshd-allows-users-to-login-with-a-null-username-and-execute-commands-7de5ad</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0180%3A%20in.rshd%20allows%20users%20to%20login%20with%20a%20NULL%20username%20and%20execute%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0179-windows-nt-crashes-or-locks-up-when-a-samba-client-executes-a-cd-command-on-a-file-share-7de5ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0179%3A%20Windows%20NT%20crashes%20or%20locks%20up%20when%20a%20Samba%20client%20executes%20a%20%22cd%20..%22%20command%20on%20a%20file%20share.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de5ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0178-buffer-overflow-in-the-win-c-sample-program-win-c-sample-exe-in-the-website-web-server-1-1e-allows-7de5a9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0178%3A%20Buffer%20overflow%20in%20the%20win-c-sample%20program%20(win-c-sample.exe)%20in%20the%20WebSite%20web%20server%201.1e%20allows&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de5a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0173-formmail-cgi-program-can-be-used-by-web-servers-other-than-the-host-server-that-the-program-resides-7de59c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0173%3A%20FormMail%20CGI%20program%20can%20be%20used%20by%20web%20servers%20other%20than%20the%20host%20server%20that%20the%20program%20resides%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de59c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0171-denial-of-service-in-syslog-by-sending-it-a-large-number-of-superfluous-messages-7de59a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0171%3A%20Denial%20of%20service%20in%20syslog%20by%20sending%20it%20a%20large%20number%20of%20superfluous%20messages.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de59a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0170-remote-attackers-can-mount-an-nfs-file-system-in-ultrix-or-osf-even-if-it-is-denied-on-the-access-l-7de598</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0170%3A%20Remote%20attackers%20can%20mount%20an%20NFS%20file%20system%20in%20Ultrix%20or%20OSF%2C%20even%20if%20it%20is%20denied%20on%20the%20access%20l&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0166-nfs-allows-users-to-use-a-cd-command-to-access-other-directories-besides-the-exported-file-syst-7de596</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0166%3A%20NFS%20allows%20users%20to%20use%20a%20%22cd%20..%22%20command%20to%20access%20other%20directories%20besides%20the%20exported%20file%20syst&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de596</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0163-in-older-versions-of-sendmail-an-attacker-could-use-a-pipe-character-to-execute-root-commands-7de594</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0163%3A%20In%20older%20versions%20of%20Sendmail%2C%20an%20attacker%20could%20use%20a%20pipe%20character%20to%20execute%20root%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de594</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0100-remote-access-in-aix-innd-1-5-1-using-control-messages-7de592</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0100%3A%20Remote%20access%20in%20AIX%20innd%201.5.1%2C%20using%20control%20messages.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de592</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1251-vulnerability-in-direct-audio-user-space-code-on-hp-ux-10-20-and-10-10-allows-local-users-to-cause-a-7de590</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1251%3A%20Vulnerability%20in%20direct%20audio%20user%20space%20code%20on%20HP-UX%2010.20%20and%2010.10%20allows%20local%20users%20to%20cause%20a&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de590</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0260-the-jj-cgi-program-allows-command-execution-via-shell-metacharacters-7de58e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0260%3A%20The%20jj%20CGI%20program%20allows%20command%20execution%20via%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de58e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1026-aspppd-on-solaris-2-5-x86-allows-local-users-to-modify-arbitrary-files-and-gain-root-privileges-via-7de58c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1026%3A%20aspppd%20on%20Solaris%202.5%20x86%20allows%20local%20users%20to%20modify%20arbitrary%20files%20and%20gain%20root%20privileges%20via%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de58c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1385-buffer-overflow-in-ppp-program-in-freebsd-2-1-and-earlier-allows-local-users-to-gain-privileges-via-7de58a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1385%3A%20Buffer%20overflow%20in%20ppp%20program%20in%20FreeBSD%202.1%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20via%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de58a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0127-swinstall-and-swmodify-commands-in-sd-ux-package-in-hp-ux-systems-allow-local-users-to-create-or-ove-7de57d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0127%3A%20swinstall%20and%20swmodify%20commands%20in%20SD-UX%20package%20in%20HP-UX%20systems%20allow%20local%20users%20to%20create%20or%20ove&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de57d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0128-oversized-icmp-ping-packets-can-result-in-a-denial-of-service-aka-ping-o-death-7de57b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0128%3A%20Oversized%20ICMP%20ping%20packets%20can%20result%20in%20a%20denial%20of%20service%2C%20aka%20Ping%20o&apos;%20Death.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de57b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1089-buffer-overflow-in-chfn-command-in-hp-ux-9-x-through-10-20-allows-local-users-to-gain-privileges-via-7de579</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1089%3A%20Buffer%20overflow%20in%20chfn%20command%20in%20HP-UX%209.X%20through%2010.20%20allows%20local%20users%20to%20gain%20privileges%20via&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0297-buffer-overflow-in-vixie-cron-library-up-to-version-3-0-allows-local-users-to-obtain-root-access-via-7de577</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0297%3A%20Buffer%20overflow%20in%20Vixie%20Cron%20library%20up%20to%20version%203.0%20allows%20local%20users%20to%20obtain%20root%20access%20via&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0101-buffer-overflow-in-aix-and-solaris-gethostbyname-library-call-allows-root-access-through-corrupt-d-7de575</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0101%3A%20Buffer%20overflow%20in%20AIX%20and%20Solaris%20%22gethostbyname%22%20library%20call%20allows%20root%20access%20through%20corrupt%20D&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0096-sendmail-decode-alias-can-be-used-to-overwrite-sensitive-files-7de573</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0096%3A%20Sendmail%20decode%20alias%20can%20be%20used%20to%20overwrite%20sensitive%20files.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de573</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0045-list-of-arbitrary-files-on-web-host-via-nph-test-cgi-script-7de571</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0045%3A%20List%20of%20arbitrary%20files%20on%20Web%20host%20via%20nph-test-cgi%20script.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de571</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1401-vulnerability-in-desktop-searchbook-program-in-irix-5-0-x-through-6-2-sets-insecure-permissions-for-7de56f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1401%3A%20Vulnerability%20in%20Desktop%20searchbook%20program%20in%20IRIX%205.0.x%20through%206.2%20sets%20insecure%20permissions%20for%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de56f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0043-command-execution-via-shell-metachars-in-inn-daemon-innd-1-5-using-newgroup-and-rmgroup-contro-7de56d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0043%3A%20Command%20execution%20via%20shell%20metachars%20in%20INN%20daemon%20(innd)%201.5%20using%20%22newgroup%22%20and%20%22rmgroup%22%20contro&amp;severity=critical&amp;id=682ca32ab6fd31d6ed7de56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0129-sendmail-allows-local-users-to-write-to-a-file-and-gain-group-permissions-via-a-forward-or-include-7de56b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0129%3A%20Sendmail%20allows%20local%20users%20to%20write%20to%20a%20file%20and%20gain%20group%20permissions%20via%20a%20.forward%20or%20%3Ainclude&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de56b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0044-fsdump-command-in-irix-allows-local-users-to-obtain-root-access-by-modifying-sensitive-files-7de55e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0044%3A%20fsdump%20command%20in%20IRIX%20allows%20local%20users%20to%20obtain%20root%20access%20by%20modifying%20sensitive%20files.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de55e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0050-buffer-overflow-in-hp-ux-newgrp-program-7de55c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0050%3A%20Buffer%20overflow%20in%20HP-UX%20newgrp%20program.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de55c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1240-buffer-overflow-in-cddbd-cd-database-server-allows-remote-attackers-to-execute-arbitrary-commands-vi-7de55a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1240%3A%20Buffer%20overflow%20in%20cddbd%20CD%20database%20server%20allows%20remote%20attackers%20to%20execute%20arbitrary%20commands%20vi&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de55a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1099-kerberos-4-allows-remote-attackers-to-obtain-sensitive-information-via-a-malformed-udp-packet-that-g-7de558</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1099%3A%20Kerberos%204%20allows%20remote%20attackers%20to%20obtain%20sensitive%20information%20via%20a%20malformed%20UDP%20packet%20that%20g&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1221-dxchpwd-in-digital-unix-osf-1-3-x-allows-local-users-to-modify-arbitrary-files-via-a-symlink-attac-7de556</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1221%3A%20dxchpwd%20in%20Digital%20Unix%20(OSF%2F1)%203.x%20allows%20local%20users%20to%20modify%20arbitrary%20files%20via%20a%20symlink%20attac&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0130-local-users-can-start-sendmail-in-daemon-mode-and-gain-root-privileges-7de554</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0130%3A%20Local%20users%20can%20start%20Sendmail%20in%20daemon%20mode%20and%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1161-vulnerability-in-ppl-in-hp-ux-10-x-and-earlier-allows-local-users-to-gain-root-privileges-by-forcing-7de552</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1161%3A%20Vulnerability%20in%20ppl%20in%20HP-UX%2010.x%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges%20by%20forcing&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de552</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0336-buffer-overflow-in-mstm-in-hp-ux-allows-local-users-to-gain-root-access-7de550</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0336%3A%20Buffer%20overflow%20in%20mstm%20in%20HP-UX%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de550</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0311-fpkg2swpk-in-hp-ux-allows-local-users-to-gain-root-access-7de54e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0311%3A%20fpkg2swpk%20in%20HP-UX%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de54e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1384-indigo-magic-system-tour-in-the-sgi-system-tour-package-systour-for-irix-5-x-through-6-3-allows-lo-7de54c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1384%3A%20Indigo%20Magic%20System%20Tour%20in%20the%20SGI%20system%20tour%20package%20(systour)%20for%20IRIX%205.x%20through%206.3%20allows%20lo&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de54c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0277-the-workman-program-can-be-used-to-overwrite-any-file-to-get-root-access-7de53f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0277%3A%20The%20WorkMan%20program%20can%20be%20used%20to%20overwrite%20any%20file%20to%20get%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de53f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0032-buffer-overflow-in-lpr-as-used-in-bsd-based-systems-including-linux-allows-local-users-to-execute-7de53d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0032%3A%20Buffer%20overflow%20in%20lpr%2C%20as%20used%20in%20BSD-based%20systems%20including%20Linux%2C%20allows%20local%20users%20to%20execute%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de53d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0075-pasv-core-dump-in-wu-ftpd-daemon-when-attacker-uses-a-quote-pasv-command-after-specifying-a-username-7de53b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0075%3A%20PASV%20core%20dump%20in%20wu-ftpd%20daemon%20when%20attacker%20uses%20a%20QUOTE%20PASV%20command%20after%20specifying%20a%20username&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de53b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0234-bash-treats-any-character-with-a-value-of-255-as-a-command-separator-7de539</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0234%3A%20Bash%20treats%20any%20character%20with%20a%20value%20of%20255%20as%20a%20command%20separator.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0319-buffer-overflow-in-xmcd-2-1-allows-local-users-to-gain-access-through-a-user-resource-setting-7de537</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0319%3A%20Buffer%20overflow%20in%20xmcd%202.1%20allows%20local%20users%20to%20gain%20access%20through%20a%20user%20resource%20setting.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0308-hp-ux-gwind-program-allows-users-to-modify-arbitrary-files-7de535</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0308%3A%20HP-UX%20gwind%20program%20allows%20users%20to%20modify%20arbitrary%20files.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0246-hp-remote-watch-allows-a-remote-user-to-gain-root-access-7de533</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0246%3A%20HP%20Remote%20Watch%20allows%20a%20remote%20user%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0206-mime-buffer-overflow-in-sendmail-8-8-0-and-8-8-1-gives-root-access-7de531</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0206%3A%20MIME%20buffer%20overflow%20in%20Sendmail%208.8.0%20and%208.8.1%20gives%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0961-hpux-sysdiag-allows-local-users-to-gain-root-privileges-via-a-symlink-attack-during-log-file-creatio-7de52f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0961%3A%20HPUX%20sysdiag%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20a%20symlink%20attack%20during%20log%20file%20creatio&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de52f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0116-denial-of-service-when-an-attacker-sends-many-syn-packets-to-create-multiple-connections-without-eve-7de52d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0116%3A%20Denial%20of%20service%20when%20an%20attacker%20sends%20many%20SYN%20packets%20to%20create%20multiple%20connections%20without%20eve&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de52d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1295-transarc-dce-distributed-file-system-dfs-1-1-for-solaris-2-4-and-2-5-does-not-properly-initialize-7de520</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1295%3A%20Transarc%20DCE%20Distributed%20File%20System%20(DFS)%201.1%20for%20Solaris%202.4%20and%202.5%20does%20not%20properly%20initialize%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de520</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1383-1-bash-before-1-14-7-and-2-tcsh-6-05-allow-local-users-to-gain-privileges-via-directory-names-t-7de51e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1383%3A%20(1)%20bash%20before%201.14.7%2C%20and%20(2)%20tcsh%206.05%20allow%20local%20users%20to%20gain%20privileges%20via%20directory%20names%20t&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de51e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0131-buffer-overflow-and-denial-of-service-in-sendmail-8-7-5-and-earlier-through-gecos-field-gives-root-a-7de51c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0131%3A%20Buffer%20overflow%20and%20denial%20of%20service%20in%20Sendmail%208.7.5%20and%20earlier%20through%20GECOS%20field%20gives%20root%20a&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de51c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1252-vulnerability-in-a-certain-system-call-in-sco-unixware-2-0-x-and-2-1-0-allows-local-users-to-access-7de51a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1252%3A%20Vulnerability%20in%20a%20certain%20system%20call%20in%20SCO%20UnixWare%202.0.x%20and%202.1.0%20allows%20local%20users%20to%20access%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de51a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0324-ppl-program-in-hp-ux-allows-local-users-to-create-root-files-through-symlinks-7de518</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0324%3A%20ppl%20program%20in%20HP-UX%20allows%20local%20users%20to%20create%20root%20files%20through%20symlinks.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de518</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1309-sendmail-before-8-6-7-allows-local-users-to-gain-root-access-via-a-large-value-in-the-debug-d-com-7de516</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1309%3A%20Sendmail%20before%208.6.7%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20large%20value%20in%20the%20debug%20(-d)%20com&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de516</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1187-pine-before-version-3-94-allows-local-users-to-gain-privileges-via-a-symlink-attack-on-a-lockfile-th-7de514</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1187%3A%20Pine%20before%20version%203.94%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20symlink%20attack%20on%20a%20lockfile%20th&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de514</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0085-buffer-overflow-in-rwhod-on-aix-and-other-operating-systems-allows-remote-attackers-to-execute-arbit-7de512</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0085%3A%20Buffer%20overflow%20in%20rwhod%20on%20AIX%20and%20other%20operating%20systems%20allows%20remote%20attackers%20to%20execute%20arbit&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de512</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0132-expreserve-as-used-in-vi-and-ex-allows-local-users-to-overwrite-arbitrary-files-and-gain-root-acce-7de510</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0132%3A%20Expreserve%2C%20as%20used%20in%20vi%20and%20ex%2C%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20and%20gain%20root%20acce&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0133-fm-fls-license-server-for-adobe-framemaker-allows-local-users-to-overwrite-arbitrary-files-and-gain-7de50e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0133%3A%20fm_fls%20license%20server%20for%20Adobe%20Framemaker%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20and%20gain%20&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de50e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0134-vold-in-solaris-2-x-allows-local-users-to-gain-root-access-7de501</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0134%3A%20vold%20in%20Solaris%202.x%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de501</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1413-solaris-2-4-before-kernel-jumbo-patch-35-allows-set-gid-programs-to-dump-core-even-if-the-real-user-7de4ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1413%3A%20Solaris%202.4%20before%20kernel%20jumbo%20patch%20-35%20allows%20set-gid%20programs%20to%20dump%20core%20even%20if%20the%20real%20user&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0335-rejected-reason-do-not-use-this-candidate-number-consultids-cve-1999-0032-reason-this-candidate-7de4fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0335%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20ConsultIDs%3A%20CVE-1999-0032.%20Reason%3A%20This%20candidate&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0136-kodak-color-management-system-kcms-on-solaris-allows-a-local-user-to-write-to-arbitrary-files-and-7de4fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0136%3A%20Kodak%20Color%20Management%20System%20(KCMS)%20on%20Solaris%20allows%20a%20local%20user%20to%20write%20to%20arbitrary%20files%20and%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0135-admintool-in-solaris-allows-a-local-user-to-write-to-arbitrary-files-and-gain-root-access-7de4f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0135%3A%20admintool%20in%20Solaris%20allows%20a%20local%20user%20to%20write%20to%20arbitrary%20files%20and%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0023-local-user-gains-root-privileges-via-buffer-overflow-in-rdist-via-lookup-function-7de4f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0023%3A%20Local%20user%20gains%20root%20privileges%20via%20buffer%20overflow%20in%20rdist%2C%20via%20lookup()%20function.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1572-cpio-on-freebsd-2-1-0-debian-gnu-linux-3-0-and-possibly-other-operating-systems-uses-a-0-umask-wh-7de4f5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1572%3A%20cpio%20on%20FreeBSD%202.1.0%2C%20Debian%20GNU%2FLinux%203.0%2C%20and%20possibly%20other%20operating%20systems%2C%20uses%20a%200%20umask%20wh&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de4f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1301-a-design-flaw-in-the-z-modem-protocol-allows-the-remote-sender-of-a-file-to-execute-arbitrary-progra-7de4f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1301%3A%20A%20design%20flaw%20in%20the%20Z-Modem%20protocol%20allows%20the%20remote%20sender%20of%20a%20file%20to%20execute%20arbitrary%20progra&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0137-the-dip-program-on-many-linux-systems-allows-local-users-to-gain-root-access-via-a-buffer-overflow-7de4f1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0137%3A%20The%20dip%20program%20on%20many%20Linux%20systems%20allows%20local%20users%20to%20gain%20root%20access%20via%20a%20buffer%20overflow.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0022-local-user-gains-root-privileges-via-buffer-overflow-in-rdist-via-expstr-function-7de4ef</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0022%3A%20Local%20user%20gains%20root%20privileges%20via%20buffer%20overflow%20in%20rdist%2C%20via%20expstr()%20function.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0175-the-convert-bas-program-in-the-novell-web-server-allows-a-remote-attackers-to-read-any-file-on-the-s-7de4e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0175%3A%20The%20convert.bas%20program%20in%20the%20Novell%20web%20server%20allows%20a%20remote%20attackers%20to%20read%20any%20file%20on%20the%20s&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0138-the-suidperl-and-sperl-program-do-not-give-up-root-privileges-when-changing-uids-back-to-the-origina-7de4e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0138%3A%20The%20suidperl%20and%20sperl%20program%20do%20not%20give%20up%20root%20privileges%20when%20changing%20UIDs%20back%20to%20the%20origina&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1253-vulnerability-in-a-kernel-error-handling-routine-in-sco-openserver-5-0-2-and-earlier-and-sco-intern-7de4de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1253%3A%20Vulnerability%20in%20a%20kernel%20error%20handling%20routine%20in%20SCO%20OpenServer%205.0.2%20and%20earlier%2C%20and%20SCO%20Intern&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1205-nettune-in-hp-ux-10-01-and-10-00-is-installed-setuid-root-which-allows-local-users-to-cause-a-denia-7de4dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1205%3A%20nettune%20in%20HP-UX%2010.01%20and%2010.00%20is%20installed%20setuid%20root%2C%20which%20allows%20local%20users%20to%20cause%20a%20denia&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de4dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0509-perl-sh-csh-or-other-shell-interpreters-are-installed-in-the-cgi-bin-directory-on-a-www-site-whi-7de4da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0509%3A%20Perl%2C%20sh%2C%20csh%2C%20or%20other%20shell%20interpreters%20are%20installed%20in%20the%20cgi-bin%20directory%20on%20a%20WWW%20site%2C%20whi&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0522-the-permissions-for-a-system-critical-nis-table-e-g-passwd-are-inappropriate-7de4d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0522%3A%20The%20permissions%20for%20a%20system-critical%20NIS%2B%20table%20(e.g.%20passwd)%20are%20inappropriate.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1313-manual-page-reader-man-in-freebsd-2-2-and-earlier-allows-local-users-to-gain-privileges-via-a-sequ-7de4d6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1313%3A%20Manual%20page%20reader%20(man)%20in%20FreeBSD%202.2%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20via%20a%20sequ&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1314-vulnerability-in-union-file-system-in-freebsd-2-2-and-earlier-and-possibly-other-operating-systems-7de4d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1314%3A%20Vulnerability%20in%20union%20file%20system%20in%20FreeBSD%202.2%20and%20earlier%2C%20and%20possibly%20other%20operating%20systems%2C&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de4d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0019-delete-or-create-a-file-via-rpc-statd-due-to-invalid-information-7de4d2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0019%3A%20Delete%20or%20create%20a%20file%20via%20rpc.statd%2C%20due%20to%20invalid%20information.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0078-pcnfsd-aka-rpc-pcnfsd-allows-local-users-to-change-file-permissions-or-execute-arbitrary-commands-7de4d0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0078%3A%20pcnfsd%20(aka%20rpc.pcnfsd)%20allows%20local%20users%20to%20change%20file%20permissions%2C%20or%20execute%20arbitrary%20commands&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de4d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1103-dxconsole-in-dec-osf-1-3-2c-and-earlier-allows-local-users-to-read-arbitrary-files-by-specifying-the-7de4c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1103%3A%20dxconsole%20in%20DEC%20OSF%2F1%203.2C%20and%20earlier%20allows%20local%20users%20to%20read%20arbitrary%20files%20by%20specifying%20the&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0070-test-cgi-program-allows-an-attacker-to-list-files-on-the-server-7de4c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0070%3A%20test-cgi%20program%20allows%20an%20attacker%20to%20list%20files%20on%20the%20server.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0141-java-bytecode-verifier-allows-malicious-applets-to-execute-arbitrary-commands-as-the-user-of-the-app-7de4bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0141%3A%20Java%20Bytecode%20Verifier%20allows%20malicious%20applets%20to%20execute%20arbitrary%20commands%20as%20the%20user%20of%20the%20app&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de4bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0067-phf-cgi-program-allows-remote-command-execution-through-shell-metacharacters-7de4bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0067%3A%20phf%20CGI%20program%20allows%20remote%20command%20execution%20through%20shell%20metacharacters.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0142-the-java-applet-security-manager-implementation-in-netscape-navigator-2-0-and-java-developer-s-kit-1-7de4bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0142%3A%20The%20Java%20Applet%20Security%20Manager%20implementation%20in%20Netscape%20Navigator%202.0%20and%20Java%20Developer&apos;s%20Kit%201&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0233-iis-1-0-allows-users-to-execute-arbitrary-commands-using-bat-or-cmd-files-7de4b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0233%3A%20IIS%201.0%20allows%20users%20to%20execute%20arbitrary%20commands%20using%20.bat%20or%20.cmd%20files.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0143-kerberos-4-key-servers-allow-a-user-to-masquerade-as-another-by-breaking-and-generating-session-keys-7de4b7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0143%3A%20Kerberos%204%20key%20servers%20allow%20a%20user%20to%20masquerade%20as%20another%20by%20breaking%20and%20generating%20session%20keys&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0103-echo-and-chargen-or-other-combinations-of-udp-services-can-be-used-in-tandem-to-flood-the-server-7de4b5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0103%3A%20Echo%20and%20chargen%2C%20or%20other%20combinations%20of%20UDP%20services%2C%20can%20be%20used%20in%20tandem%20to%20flood%20the%20server%2C%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de4b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1491-abuse-console-in-red-hat-2-1-uses-relative-pathnames-to-find-and-execute-the-undrv-program-which-al-7de4b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1491%3A%20abuse.console%20in%20Red%20Hat%202.1%20uses%20relative%20pathnames%20to%20find%20and%20execute%20the%20undrv%20program%2C%20which%20al&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1319-vulnerability-in-object-server-program-in-sgi-irix-5-2-through-6-1-allows-remote-attackers-to-gain-r-7de4b1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1319%3A%20Vulnerability%20in%20object%20server%20program%20in%20SGI%20IRIX%205.2%20through%206.1%20allows%20remote%20attackers%20to%20gain%20r&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1186-rxvt-when-compiled-with-the-print-pipe-option-in-various-linux-operating-systems-including-linux-sl-7de4a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1186%3A%20rxvt%2C%20when%20compiled%20with%20the%20PRINT_PIPE%20option%20in%20various%20Linux%20operating%20systems%20including%20Linux%20Sl&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0208-rpc-ypupdated-nis-allows-remote-users-to-execute-arbitrary-commands-7de4a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0208%3A%20rpc.ypupdated%20(NIS)%20allows%20remote%20users%20to%20execute%20arbitrary%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0325-vhe-u-mnt-program-in-hp-ux-allows-local-users-to-create-root-files-through-symlinks-7de4a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0325%3A%20vhe_u_mnt%20program%20in%20HP-UX%20allows%20local%20users%20to%20create%20root%20files%20through%20symlinks.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de4a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0316-buffer-overflow-in-linux-splitvt-command-gives-root-access-to-local-users-7de49e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0316%3A%20Buffer%20overflow%20in%20Linux%20splitvt%20command%20gives%20root%20access%20to%20local%20users.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de49e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0123-race-condition-in-linux-mailx-command-allows-local-users-to-read-user-files-7de49c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0123%3A%20Race%20condition%20in%20Linux%20mailx%20command%20allows%20local%20users%20to%20read%20user%20files.&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de49c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0080-certain-configurations-of-wu-ftp-ftp-server-2-4-use-a-path-execpath-setting-to-a-directory-with-dan-7de49a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0080%3A%20Certain%20configurations%20of%20wu-ftp%20FTP%20server%202.4%20use%20a%20_PATH_EXECPATH%20setting%20to%20a%20directory%20with%20dan&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de49a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0241-guessable-magic-cookies-in-x-windows-allows-remote-attackers-to-execute-commands-e-g-through-xterm-7de498</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0241%3A%20Guessable%20magic%20cookies%20in%20X%20Windows%20allows%20remote%20attackers%20to%20execute%20commands%2C%20e.g.%20through%20xterm&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0099-buffer-overflow-in-syslog-utility-allows-local-or-remote-attackers-to-gain-root-privileges-7de496</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0099%3A%20Buffer%20overflow%20in%20syslog%20utility%20allows%20local%20or%20remote%20attackers%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de496</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0073-telnet-allows-a-remote-client-to-specify-environment-variables-including-ld-library-path-allowing-a-7de494</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0073%3A%20Telnet%20allows%20a%20remote%20client%20to%20specify%20environment%20variables%20including%20LD_LIBRARY_PATH%2C%20allowing%20a&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de494</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0218-livingston-portmaster-machines-could-be-rebooted-via-a-series-of-commands-7de492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0218%3A%20Livingston%20portmaster%20machines%20could%20be%20rebooted%20via%20a%20series%20of%20commands.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de492</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0245-some-configurations-of-nis-in-linux-allowed-attackers-to-log-in-as-the-user-7de485</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0245%3A%20Some%20configurations%20of%20NIS%2B%20in%20Linux%20allowed%20attackers%20to%20log%20in%20as%20the%20user%20%22%2B%22.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0155-the-ghostscript-command-with-the-dsafer-option-allows-remote-attackers-to-execute-commands-7de483</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0155%3A%20The%20ghostscript%20command%20with%20the%20-dSAFER%20option%20allows%20remote%20attackers%20to%20execute%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de483</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0164-a-race-condition-in-the-solaris-ps-command-allows-an-attacker-to-overwrite-critical-files-7de481</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0164%3A%20A%20race%20condition%20in%20the%20Solaris%20ps%20command%20allows%20an%20attacker%20to%20overwrite%20critical%20files.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de481</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1580-sunos-sendmail-5-59-through-5-65-uses-popen-to-process-a-forwarding-host-argument-which-allows-loca-7de47f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1580%3A%20SunOS%20sendmail%205.59%20through%205.65%20uses%20popen%20to%20process%20a%20forwarding%20host%20argument%2C%20which%20allows%20loca&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de47f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0203-in-sendmail-attackers-can-gain-root-privileges-via-smtp-by-specifying-an-improper-mail-from-addre-7de47d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0203%3A%20In%20Sendmail%2C%20attackers%20can%20gain%20root%20privileges%20via%20SMTP%20by%20specifying%20an%20improper%20%22mail%20from%22%20addre&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de47d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0172-formmail-cgi-program-allows-remote-execution-of-commands-7de47b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0172%3A%20FormMail%20CGI%20program%20allows%20remote%20execution%20of%20commands.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de47b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0161-in-cisco-ios-10-3-with-the-tacacs-ds-or-tacacs-keyword-an-extended-ip-access-control-list-could-by-7de479</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0161%3A%20In%20Cisco%20IOS%2010.3%2C%20with%20the%20tacacs-ds%20or%20tacacs%20keyword%2C%20an%20extended%20IP%20access%20control%20list%20could%20by&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de479</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0066-anyform-cgi-remote-execution-7de477</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.9</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0066%3A%20AnyForm%20CGI%20remote%20execution.&amp;severity=critical&amp;id=682ca32ab6fd31d6ed7de477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1080-rmmount-in-sunos-5-7-may-mount-file-systems-without-the-nosuid-flag-set-contrary-to-the-documentati-7de475</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1080%3A%20rmmount%20in%20SunOS%205.7%20may%20mount%20file%20systems%20without%20the%20nosuid%20flag%20set%2C%20contrary%20to%20the%20documentati&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de475</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0151-the-satan-session-key-may-be-disclosed-if-the-user-points-the-web-browser-to-other-sites-possibly-a-7de473</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0151%3A%20The%20SATAN%20session%20key%20may%20be%20disclosed%20if%20the%20user%20points%20the%20web%20browser%20to%20other%20sites%2C%20possibly%20a&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1243-sgi-desktop-permissions-tool-in-irix-6-0-1-and-earlier-allows-local-users-to-modify-permissions-for-7de466</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1243%3A%20SGI%20Desktop%20Permissions%20Tool%20in%20IRIX%206.0.1%20and%20earlier%20allows%20local%20users%20to%20modify%20permissions%20for%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de466</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1098-vulnerability-in-bsd-telnet-client-with-encryption-and-kerberos-4-authentication-allows-remote-attac-7de464</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1098%3A%20Vulnerability%20in%20BSD%20Telnet%20client%20with%20encryption%20and%20Kerberos%204%20authentication%20allows%20remote%20attac&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de464</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0242-remote-attackers-can-access-mail-files-via-pop3-in-some-linux-systems-that-are-using-shadow-password-7de462</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0242%3A%20Remote%20attackers%20can%20access%20mail%20files%20via%20POP3%20in%20some%20Linux%20systems%20that%20are%20using%20shadow%20password&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de462</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0235-buffer-overflow-in-ncsa-webserver-1-4-1-and-below-gives-remote-access-7de460</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0235%3A%20Buffer%20overflow%20in%20NCSA%20WebServer%20(1.4.1%20and%20below)%20gives%20remote%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de460</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0232-buffer-overflow-in-ncsa-webserver-version-1-5c-gives-remote-access-7de45e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0232%3A%20Buffer%20overflow%20in%20NCSA%20WebServer%20(version%201.5c)%20gives%20remote%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de45e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0077-predictable-tcp-sequence-numbers-allow-spoofing-7de45c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0077%3A%20Predictable%20TCP%20sequence%20numbers%20allow%20spoofing.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de45c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0508-rpc-lockd-in-red-hat-linux-6-1-and-6-2-allows-remote-attackers-to-cause-a-denial-of-service-via-a-ma-7de45a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0508%3A%20rpc.lockd%20in%20Red%20Hat%20Linux%206.1%20and%206.2%20allows%20remote%20attackers%20to%20cause%20a%20denial%20of%20service%20via%20a%20ma&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de45a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1305-vulnerability-in-at-program-in-sco-unix-4-2-and-earlier-allows-local-users-to-gain-root-access-7de458</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1305%3A%20Vulnerability%20in%20%22at%22%20program%20in%20SCO%20UNIX%204.2%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de458</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1304-vulnerability-in-login-in-sco-unix-4-2-and-earlier-allows-local-users-to-gain-root-access-7de456</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1304%3A%20Vulnerability%20in%20login%20in%20SCO%20UNIX%204.2%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de456</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1303-vulnerability-in-prwarn-in-sco-unix-4-2-and-earlier-allows-local-users-to-gain-root-access-7de454</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1303%3A%20Vulnerability%20in%20prwarn%20in%20SCO%20UNIX%204.2%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de454</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1302-unspecified-vulnerability-in-pt-chmod-in-sco-unix-4-2-and-earlier-allows-local-users-to-gain-root-ac-7de447</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1302%3A%20Unspecified%20vulnerability%20in%20pt_chmod%20in%20SCO%20UNIX%204.2%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20ac&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1248-vulnerability-in-support-watch-aka-supportwatch-in-hp-ux-8-0-through-9-0-allows-local-users-to-gai-7de445</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1248%3A%20Vulnerability%20in%20Support%20Watch%20(aka%20SupportWatch)%20in%20HP-UX%208.0%20through%209.0%20allows%20local%20users%20to%20gai&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1310-rejected-reason-do-not-use-this-candidate-number-consultids-cve-1999-1022-reason-this-candida-7de443</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1310%3A%20Rejected%20reason%3A%20DO%20NOT%20USE%20THIS%20CANDIDATE%20NUMBER.%20%20ConsultIDs%3A%20CVE-1999-1022.%20%20Reason%3A%20This%20candida&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1022-serial-ports-administrative-program-in-irix-4-x-and-5-x-trusts-the-user-s-path-environmental-variabl-7de441</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1022%3A%20serial_ports%20administrative%20program%20in%20IRIX%204.x%20and%205.x%20trusts%20the%20user&apos;s%20PATH%20environmental%20variabl&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1238-vulnerability-in-core-diag-fileset-in-hp-message-catalog-in-hp-ux-9-05-and-earlier-allows-local-user-7de43f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1238%3A%20Vulnerability%20in%20CORE-DIAG%20fileset%20in%20HP%20message%20catalog%20in%20HP-UX%209.05%20and%20earlier%20allows%20local%20user&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1219-vulnerability-in-sgihelp-in-the-sgi-help-system-and-print-manager-in-irix-5-2-and-earlier-allows-loc-7de43d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1219%3A%20Vulnerability%20in%20sgihelp%20in%20the%20SGI%20help%20system%20and%20print%20manager%20in%20IRIX%205.2%20and%20earlier%20allows%20loc&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1494-colorview-in-silicon-graphics-irix-5-1-5-2-and-6-0-allows-local-attackers-to-read-arbitrary-files-7de43b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1494%3A%20colorview%20in%20Silicon%20Graphics%20IRIX%205.1%2C%205.2%2C%20and%206.0%20allows%20local%20attackers%20to%20read%20arbitrary%20files%20&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1552-dpsexec-dps-server-when-running-under-xdm-in-ibm-aix-3-2-5-and-earlier-does-not-properly-check-pri-7de439</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1552%3A%20dpsexec%20(DPS%20Server)%20when%20running%20under%20XDM%20in%20IBM%20AIX%203.2.5%20and%20earlier%20does%20not%20properly%20check%20pri&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1239-hp-ux-9-x-does-not-properly-enable-the-xauthority-mechanism-in-certain-conditions-which-could-allow-7de437</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1239%3A%20HP-UX%209.x%20does%20not%20properly%20enable%20the%20Xauthority%20mechanism%20in%20certain%20conditions%2C%20which%20could%20allow&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0207-remote-attacker-can-execute-commands-through-majordomo-using-the-reply-to-field-and-a-lists-comman-7de435</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0207%3A%20Remote%20attacker%20can%20execute%20commands%20through%20Majordomo%20using%20the%20Reply-To%20field%20and%20a%20%22lists%22%20comman&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0337-aix-batch-queue-bsh-allows-local-and-remote-users-to-gain-additional-privileges-when-network-print-7de428</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0337%3A%20AIX%20batch%20queue%20(bsh)%20allows%20local%20and%20remote%20users%20to%20gain%20additional%20privileges%20when%20network%20print&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0423-vulnerability-in-hpterm-on-hp-ux-10-20-allows-local-users-to-gain-additional-privileges-7de426</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0423%3A%20Vulnerability%20in%20hpterm%20on%20HP-UX%2010.20%20allows%20local%20users%20to%20gain%20additional%20privileges.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0113-some-implementations-of-rlogin-allow-root-access-if-given-a-froot-parameter-7de424</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0113%3A%20Some%20implementations%20of%20rlogin%20allow%20root%20access%20if%20given%20a%20-froot%20parameter.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1134-vulnerability-in-vue-3-0-in-hp-9-x-allows-local-users-to-gain-root-privileges-as-fixed-by-phss-4038-7de422</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1134%3A%20Vulnerability%20in%20Vue%203.0%20in%20HP%209.x%20allows%20local%20users%20to%20gain%20root%20privileges%2C%20as%20fixed%20by%20PHSS_4038&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1388-passwd-in-sunos-4-1-x-allows-local-users-to-overwrite-arbitrary-files-via-a-symlink-attack-and-the-7de420</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1388%3A%20passwd%20in%20SunOS%204.1.x%20allows%20local%20users%20to%20overwrite%20arbitrary%20files%20via%20a%20symlink%20attack%20and%20the%20-&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1146-vulnerability-in-glance-and-gpm-programs-in-glanceplus-for-hp-ux-9-x-and-earlier-allows-local-users-7de41e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1146%3A%20Vulnerability%20in%20Glance%20and%20gpm%20programs%20in%20GlancePlus%20for%20HP-UX%209.x%20and%20earlier%20allows%20local%20users%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1135-vulnerability-in-vue-3-0-in-hp-9-x-allows-local-users-to-gain-root-privileges-as-fixed-by-phss-4994-7de41c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1135%3A%20Vulnerability%20in%20VUE%203.0%20in%20HP%209.x%20allows%20local%20users%20to%20gain%20root%20privileges%2C%20as%20fixed%20by%20PHSS_4994&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0120-sun-solaris-utmp-file-allows-local-users-to-gain-root-access-if-it-is-writable-by-users-other-than-r-7de41a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0120%3A%20Sun%2FSolaris%20utmp%20file%20allows%20local%20users%20to%20gain%20root%20access%20if%20it%20is%20writable%20by%20users%20other%20than%20r&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0338-aix-licensed-program-product-performance-tools-allow-local-users-to-gain-root-access-7de418</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0338%3A%20AIX%20Licensed%20Program%20Product%20performance%20tools%20allow%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0211-extra-long-export-lists-over-256-characters-in-some-mount-daemons-allows-nfs-directories-to-be-mount-7de416</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0211%3A%20Extra%20long%20export%20lists%20over%20256%20characters%20in%20some%20mount%20daemons%20allows%20NFS%20directories%20to%20be%20mount&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de416</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1242-vulnerability-in-subnetconfig-in-hp-ux-9-01-and-9-0-allows-local-users-to-gain-privileges-7de409</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1242%3A%20Vulnerability%20in%20subnetconfig%20in%20HP-UX%209.01%20and%209.0%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de409</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0181-the-wall-daemon-can-be-used-for-denial-of-service-social-engineering-attacks-or-to-execute-remote-7de407</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0181%3A%20The%20wall%20daemon%20can%20be%20used%20for%20denial%20of%20service%2C%20social%20engineering%20attacks%2C%20or%20to%20execute%20remote%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0334-in-solaris-2-2-and-2-3-when-fsck-fails-on-startup-it-allows-a-local-user-with-physical-access-to-o-7de405</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0334%3A%20In%20Solaris%202.2%20and%202.3%2C%20when%20fsck%20fails%20on%20startup%2C%20it%20allows%20a%20local%20user%20with%20physical%20access%20to%20o&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1137-the-permissions-for-the-dev-audio-device-on-solaris-2-2-and-earlier-and-sunos-4-1-x-allow-any-loc-7de403</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1137%3A%20The%20permissions%20for%20the%20%2Fdev%2Faudio%20device%20on%20Solaris%202.2%20and%20earlier%2C%20and%20SunOS%204.1.x%2C%20allow%20any%20loc&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0145-sendmail-wiz-command-enabled-allowing-root-access-7de401</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0145%3A%20Sendmail%20WIZ%20command%20enabled%2C%20allowing%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1318-usr-5bin-su-in-sunos-4-1-3-and-earlier-uses-a-search-path-that-includes-the-current-working-directo-7de3ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1318%3A%20%2Fusr%2F5bin%2Fsu%20in%20SunOS%204.1.3%20and%20earlier%20uses%20a%20search%20path%20that%20includes%20the%20current%20working%20directo&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1138-sco-unix-system-v-386-release-3-2-and-other-sco-products-installs-the-home-directories-1-tmp-fo-7de3fd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1138%3A%20SCO%20UNIX%20System%20V%2F386%20Release%203.2%2C%20and%20other%20SCO%20products%2C%20installs%20the%20home%20directories%20(1)%20%2Ftmp%20fo&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1215-login-exe-program-in-novell-netware-4-0-and-4-01-temporarily-writes-user-name-and-password-informati-7de3fb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1215%3A%20LOGIN.EXE%20program%20in%20Novell%20Netware%204.0%20and%204.01%20temporarily%20writes%20user%20name%20and%20password%20informati&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de3fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0124-vulnerabilities-in-umn-gopher-and-gopher-versions-1-12-and-2-0x-allow-an-intruder-to-read-any-files-7de3f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0124%3A%20Vulnerabilities%20in%20UMN%20gopher%20and%20gopher%2B%20versions%201.12%20and%202.0x%20allow%20an%20intruder%20to%20read%20any%20files&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1162-vulnerability-in-passwd-in-sco-unix-4-0-and-earlier-allows-attackers-to-cause-a-denial-of-service-by-7de3f7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1162%3A%20Vulnerability%20in%20passwd%20in%20SCO%20UNIX%204.0%20and%20earlier%20allows%20attackers%20to%20cause%20a%20denial%20of%20service%20by&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de3f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1216-cisco-routers-9-17-and-earlier-allow-remote-attackers-to-bypass-security-restrictions-via-certain-ip-7de3ea</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1216%3A%20Cisco%20routers%209.17%20and%20earlier%20allow%20remote%20attackers%20to%20bypass%20security%20restrictions%20via%20certain%20IP&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1312-vulnerability-in-dec-openvms-vax-5-5-2-through-5-0-and-openvms-axp-1-0-allows-local-users-to-gain-7de3e8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1312%3A%20Vulnerability%20in%20DEC%20OpenVMS%20VAX%205.5-2%20through%205.0%2C%20and%20OpenVMS%20AXP%201.0%2C%20allows%20local%20users%20to%20gain%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1218-vulnerability-in-finger-in-commodore-amiga-unix-2-1p2a-and-earlier-allows-local-users-to-read-arbitr-7de3e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1218%3A%20Vulnerability%20in%20finger%20in%20Commodore%20Amiga%20UNIX%202.1p2a%20and%20earlier%20allows%20local%20users%20to%20read%20arbitr&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de3e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1507-sun-sunos-4-1-through-4-1-3-allows-local-attackers-to-gain-root-access-via-insecure-permissions-on-f-7de3e4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1507%3A%20Sun%20SunOS%204.1%20through%204.1.3%20allows%20local%20attackers%20to%20gain%20root%20access%20via%20insecure%20permissions%20on%20f&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0312-hp-ypbind-allows-attackers-with-root-privileges-to-modify-nis-data-7de3e2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0312%3A%20HP%20ypbind%20allows%20attackers%20with%20root%20privileges%20to%20modify%20NIS%20data.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de3e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1021-nfs-on-sunos-4-1-through-4-1-2-ignores-the-high-order-16-bits-in-a-32-bit-uid-which-allows-a-local-7de3de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1021%3A%20NFS%20on%20SunOS%204.1%20through%204.1.2%20ignores%20the%20high%20order%2016%20bits%20in%20a%2032%20bit%20UID%2C%20which%20allows%20a%20local%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1466-vulnerability-in-cisco-routers-versions-8-2-through-9-1-allows-remote-attackers-to-bypass-access-con-7de3dc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1466%3A%20Vulnerability%20in%20Cisco%20routers%20versions%208.2%20through%209.1%20allows%20remote%20attackers%20to%20bypass%20access%20con&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1306-cisco-ios-9-1-and-earlier-does-not-properly-handle-extended-ip-access-lists-when-the-ip-route-cache-7de3da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1306%3A%20Cisco%20IOS%209.1%20and%20earlier%20does%20not%20properly%20handle%20extended%20IP%20access%20lists%20when%20the%20IP%20route%20cache%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1395-vulnerability-in-monitor-utility-sys-share-spishr-exe-in-vms-5-0-through-5-4-2-allows-local-users-7de3d8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1395%3A%20Vulnerability%20in%20Monitor%20utility%20(SYS%24SHARE%3ASPISHR.EXE)%20in%20VMS%205.0%20through%205.4-2%20allows%20local%20users%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1396-vulnerability-in-integer-multiplication-emulation-code-on-sparc-architectures-for-sunos-4-1-through-7de3cb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1396%3A%20Vulnerability%20in%20integer%20multiplication%20emulation%20code%20on%20SPARC%20architectures%20for%20SunOS%204.1%20through%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0214-denial-of-service-by-sending-forged-icmp-unreachable-packets-7de3c9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0214%3A%20Denial%20of%20service%20by%20sending%20forged%20ICMP%20unreachable%20packets.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0168-the-portmapper-may-act-as-a-proxy-and-redirect-service-requests-from-an-attacker-making-the-request-7de3c7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0168%3A%20The%20portmapper%20may%20act%20as%20a%20proxy%20and%20redirect%20service%20requests%20from%20an%20attacker%2C%20making%20the%20request&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1142-sunos-4-1-2-and-earlier-allows-local-users-to-gain-privileges-via-ld-environmental-variables-to-7de3c5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1142%3A%20SunOS%204.1.2%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges%20via%20%22LD_*%22%20environmental%20variables%20to%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1119-ftp-installation-script-anon-ftp-in-aix-insecurely-configures-anonymous-ftp-which-allows-remote-att-7de3c3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1119%3A%20FTP%20installation%20script%20anon.ftp%20in%20AIX%20insecurely%20configures%20anonymous%20FTP%2C%20which%20allows%20remote%20att&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0117-aix-passwd-allows-local-users-to-gain-root-access-7de3c1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0117%3A%20AIX%20passwd%20allows%20local%20users%20to%20gain%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1121-the-default-configuration-for-uucp-in-aix-before-3-2-allows-local-users-to-gain-root-privileges-7de3bf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1121%3A%20The%20default%20configuration%20for%20UUCP%20in%20AIX%20before%203.2%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0627-the-rexd-service-is-running-which-uses-weak-authentication-that-can-allow-an-attacker-to-execute-co-7de3bd</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0627%3A%20The%20rexd%20service%20is%20running%2C%20which%20uses%20weak%20authentication%20that%20can%20allow%20an%20attacker%20to%20execute%20co&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de3bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1059-vulnerability-in-rexec-daemon-rexecd-in-at-t-tcp-ip-4-0-for-various-svr4-systems-allows-remote-att-7de3bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1059%3A%20Vulnerability%20in%20rexec%20daemon%20(rexecd)%20in%20AT%26T%20TCP%2FIP%204.0%20for%20various%20SVR4%20systems%20allows%20remote%20att&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1032-vulnerability-in-lat-telnet-gateway-lattelnet-on-ultrix-4-1-and-4-2-allows-attackers-to-gain-root-7de3b9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1032%3A%20Vulnerability%20in%20LAT%2FTelnet%20Gateway%20(lattelnet)%20on%20Ultrix%204.1%20and%204.2%20allows%20attackers%20to%20gain%20root%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1493-vulnerability-in-crp-in-hewlett-packard-apollo-domain-os-sr10-through-sr10-3-allows-remote-attackers-7de3ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1493%3A%20Vulnerability%20in%20crp%20in%20Hewlett%20Packard%20Apollo%20Domain%20OS%20SR10%20through%20SR10.3%20allows%20remote%20attackers&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0167-in-sunos-nfs-file-handles-could-be-guessed-giving-unauthorized-access-to-the-exported-file-system-7de3aa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0167%3A%20In%20SunOS%2C%20NFS%20file%20handles%20could%20be%20guessed%2C%20giving%20unauthorized%20access%20to%20the%20exported%20file%20system.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de3aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1468-rdist-in-various-unix-systems-uses-popen-to-execute-sendmail-which-allows-local-users-to-gain-root-7de3a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1468%3A%20rdist%20in%20various%20UNIX%20systems%20uses%20popen%20to%20execute%20sendmail%2C%20which%20allows%20local%20users%20to%20gain%20root%20&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de3a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0498-tftp-is-not-running-in-a-restricted-directory-allowing-a-remote-attacker-to-access-sensitive-inform-7de3a6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0498%3A%20TFTP%20is%20not%20running%20in%20a%20restricted%20directory%2C%20allowing%20a%20remote%20attacker%20to%20access%20sensitive%20inform&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1090-the-default-configuration-of-ncsa-telnet-package-for-macintosh-and-pc-enables-ftp-even-though-it-do-7de3a4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1090%3A%20The%20default%20configuration%20of%20NCSA%20Telnet%20package%20for%20Macintosh%20and%20PC%20enables%20FTP%2C%20even%20though%20it%20do&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1415-vulnerability-in-usr-bin-mail-in-dec-ultrix-before-4-2-allows-local-users-to-gain-privileges-7de3a2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1415%3A%20Vulnerability%20in%20%2Fusr%2Fbin%2Fmail%20in%20DEC%20ULTRIX%20before%204.2%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de3a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1034-vulnerability-in-login-in-at-t-system-v-release-4-allows-local-users-to-gain-privileges-7de3a0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1034%3A%20Vulnerability%20in%20login%20in%20AT%26T%20System%20V%20Release%204%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de3a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1123-the-installation-of-sun-source-sunsrc-tapes-allows-local-users-to-gain-root-privileges-via-setuid-7de39e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1123%3A%20The%20installation%20of%20Sun%20Source%20(sunsrc)%20tapes%20allows%20local%20users%20to%20gain%20root%20privileges%20via%20setuid%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de39e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1193-the-me-user-in-next-nextstep-2-1-and-earlier-has-wheel-group-privileges-which-could-allow-the-me-7de39c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1193%3A%20The%20%22me%22%20user%20in%20NeXT%20NeXTstep%202.1%20and%20earlier%20has%20wheel%20group%20privileges%2C%20which%20could%20allow%20the%20me%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de39c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1194-chroot-in-digital-ultrix-4-1-and-4-0-is-insecurely-installed-which-allows-local-users-to-gain-privi-7de39a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1194%3A%20chroot%20in%20Digital%20Ultrix%204.1%20and%204.0%20is%20insecurely%20installed%2C%20which%20allows%20local%20users%20to%20gain%20privi&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de39a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1212-vulnerability-in-in-rlogind-in-sunos-4-0-3-and-4-0-3c-allows-local-users-to-gain-root-privileges-7de38d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1212%3A%20Vulnerability%20in%20in.rlogind%20in%20SunOS%204.0.3%20and%204.0.3c%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de38d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1211-vulnerability-in-in-telnetd-in-sunos-4-1-1-and-earlier-allows-local-users-to-gain-root-privileges-7de38b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1211%3A%20Vulnerability%20in%20in.telnetd%20in%20SunOS%204.1.1%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1438-vulnerability-in-bin-mail-in-sunos-4-1-1-and-earlier-allows-local-users-to-gain-root-privileges-via-7de389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1438%3A%20Vulnerability%20in%20%2Fbin%2Fmail%20in%20SunOS%204.1.1%20and%20earlier%20allows%20local%20users%20to%20gain%20root%20privileges%20via&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1258-rpc-pwdauthd-in-sunos-4-1-1-and-earlier-does-not-properly-prevent-remote-access-to-the-daemon-which-7de387</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1258%3A%20rpc.pwdauthd%20in%20SunOS%204.1.1%20and%20earlier%20does%20not%20properly%20prevent%20remote%20access%20to%20the%20daemon%2C%20which&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1197-tioccons-in-sunos-4-1-1-does-not-properly-check-the-permissions-of-a-user-who-tries-to-redirect-cons-7de383</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1197%3A%20TIOCCONS%20in%20SunOS%204.1.1%20does%20not%20properly%20check%20the%20permissions%20of%20a%20user%20who%20tries%20to%20redirect%20cons&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1554-usr-sbin-mail-on-sgi-irix-3-3-and-3-3-1-does-not-properly-set-the-group-id-to-the-group-id-of-the-u-7de381</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1554%3A%20%2Fusr%2Fsbin%2FMail%20on%20SGI%20IRIX%203.3%20and%203.3.1%20does%20not%20properly%20set%20the%20group%20ID%20to%20the%20group%20ID%20of%20the%20u&amp;severity=low&amp;id=682ca32ab6fd31d6ed7de381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1057-vms-4-0-through-5-3-allows-local-users-to-gain-privileges-via-the-analyze-process-dump-dcl-command-7de37f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1057%3A%20VMS%204.0%20through%205.3%20allows%20local%20users%20to%20gain%20privileges%20via%20the%20ANALYZE%2FPROCESS_DUMP%20dcl%20command.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1392-vulnerability-in-restore0-9-installation-script-in-next-1-0a-and-1-0-allows-local-users-to-gain-root-7de37d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1392%3A%20Vulnerability%20in%20restore0.9%20installation%20script%20in%20NeXT%201.0a%20and%201.0%20allows%20local%20users%20to%20gain%20root&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de37d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1391-vulnerability-in-next-1-0a-and-1-0-with-publicly-accessible-printers-allows-local-users-to-gain-priv-7de37b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1391%3A%20Vulnerability%20in%20NeXT%201.0a%20and%201.0%20with%20publicly%20accessible%20printers%20allows%20local%20users%20to%20gain%20priv&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de37b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1198-builddisk-program-on-next-systems-before-2-0-does-not-prompt-users-for-the-root-password-which-allo-7de36e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1198%3A%20BuildDisk%20program%20on%20NeXT%20systems%20before%202.0%20does%20not%20prompt%20users%20for%20the%20root%20password%2C%20which%20allo&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de36e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0209-the-sunview-suntools-selection-svc-facility-allows-remote-users-to-read-files-7de36c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0209%3A%20The%20SunView%20(SunTools)%20selection_svc%20facility%20allows%20remote%20users%20to%20read%20files.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de36c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2000-0388-buffer-overflow-in-freebsd-libmytinfo-library-allows-local-users-to-execute-commands-via-a-long-term-7de36a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2000-0388%3A%20Buffer%20overflow%20in%20FreeBSD%20libmytinfo%20library%20allows%20local%20users%20to%20execute%20commands%20via%20a%20long%20TERM&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de36a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0084-certain-nfs-servers-allow-users-to-use-mknod-to-gain-privileges-by-creating-a-writable-kmem-device-a-7de368</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0084%3A%20Certain%20NFS%20servers%20allow%20users%20to%20use%20mknod%20to%20gain%20privileges%20by%20creating%20a%20writable%20kmem%20device%20a&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1506-vulnerability-in-smi-sendmail-4-0-and-earlier-on-sunos-up-to-4-0-3-allows-remote-attackers-to-acce-7de366</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1506%3A%20Vulnerability%20in%20SMI%20Sendmail%204.0%20and%20earlier%2C%20on%20SunOS%20up%20to%204.0.3%2C%20allows%20remote%20attackers%20to%20acce&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de366</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1467-vulnerability-in-rcp-on-sunos-4-0-x-allows-remote-attackers-from-trusted-hosts-to-execute-arbitrary-7de364</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1467%3A%20Vulnerability%20in%20rcp%20on%20SunOS%204.0.x%20allows%20remote%20attackers%20from%20trusted%20hosts%20to%20execute%20arbitrary%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de364</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1122-vulnerability-in-restore-in-sunos-4-0-3-and-earlier-allows-local-users-to-gain-privileges-7de362</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1122%3A%20Vulnerability%20in%20restore%20in%20SunOS%204.0.3%20and%20earlier%20allows%20local%20users%20to%20gain%20privileges.&amp;severity=medium&amp;id=682ca32ab6fd31d6ed7de362</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-1471-buffer-overflow-in-passwd-in-bsd-based-operating-systems-4-3-and-earlier-allows-local-users-to-gain-7de360</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-1471%3A%20Buffer%20overflow%20in%20passwd%20in%20BSD%20based%20operating%20systems%204.3%20and%20earlier%20allows%20local%20users%20to%20gain%20&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de360</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0082-cwd-root-command-in-ftpd-allows-root-access-7de35e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0082%3A%20CWD%20~root%20command%20in%20ftpd%20allows%20root%20access.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de35e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-1999-0095-the-debug-command-in-sendmail-is-enabled-allowing-attackers-to-execute-commands-as-root-7de35c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.8</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-1999-0095%3A%20The%20debug%20command%20in%20Sendmail%20is%20enabled%2C%20allowing%20attackers%20to%20execute%20commands%20as%20root.&amp;severity=high&amp;id=682ca32ab6fd31d6ed7de35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4759-d80b82b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4759&amp;severity=null&amp;id=69cd9e6ee6bfc5ba1d075c07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3882-a39e9395</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3882&amp;severity=null&amp;id=69cd9e6ee6bfc5ba1d075c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0711-4a51212a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0711&amp;severity=null&amp;id=69cd9e6ee6bfc5ba1d075c02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4425-2c4aae7a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4425&amp;severity=null&amp;id=69ca5d39e6bfc5ba1d1d6987</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-30407-3b877823</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-30407&amp;severity=null&amp;id=69c694993c064ed76fb5b674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-4340-b69fc326</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-4340&amp;severity=null&amp;id=69c67f433c064ed76facb4e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2535-34ffbef9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2535&amp;severity=null&amp;id=69c4622df4197a8e3b8a3edd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3126-c27fd9ff</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3126&amp;severity=null&amp;id=69c3fc2ef4197a8e3b6310b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26809-56a8871a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26809&amp;severity=null&amp;id=69c32654f4197a8e3b9def6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2598-c0f28904</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2598&amp;severity=low&amp;id=69bdcad201d25e334c8cba8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32765-27dec463</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32765&amp;severity=null&amp;id=69bc9033e32a4fbe5f0c4194</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-32764-a677fa65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-32764&amp;severity=null&amp;id=69bc9033e32a4fbe5f0c4192</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3948-5c4b91dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3948&amp;severity=null&amp;id=69bc7b18e32a4fbe5f0345d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3181-3300ed0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3181&amp;severity=null&amp;id=69bb2a8a771bdb1749cbc629</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0866-3b5e25c6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0866&amp;severity=null&amp;id=69bb03e2771bdb1749c142ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33189-c83bdf6f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33189&amp;severity=null&amp;id=69ba1bd6771bdb17491a1d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33188-8364ce38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33188&amp;severity=null&amp;id=69ba1bd6771bdb17491a1d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-33187-ccdace92</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-33187&amp;severity=null&amp;id=69ba1bd6771bdb17491a1d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54758-9bfe7bcf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54758&amp;severity=null&amp;id=69b8316f9d4df4518370fe9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53815-7d62959e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53815&amp;severity=null&amp;id=69b8316f9d4df4518370fe9b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53517-bfca2380</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53517&amp;severity=null&amp;id=69b8316f9d4df4518370fe99</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2326-5ca356d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2326&amp;severity=null&amp;id=69b7f5ac9d4df45183583c10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13337-ab6d4e5d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13337&amp;severity=null&amp;id=69b33e5a2f860ef94309a4b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3370-0a1e1339</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3370&amp;severity=low&amp;id=69b063a09972381a98a3a056</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53706-6e3d608b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53706&amp;severity=null&amp;id=69b05635ea502d3aa87d7c05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-33022-cb56c27c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-33022&amp;severity=null&amp;id=69ae94e72904315ca3ef0fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3233-a090c48a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3233&amp;severity=null&amp;id=69ab55abc48b3f10ffe32a8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3653-6502b50d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3653&amp;severity=null&amp;id=69ab20f4c48b3f10ffc0469b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27123-0271fc4a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27123&amp;severity=null&amp;id=69aaf6d5c48b3f10ffa49ba8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1799-075ebe5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1799&amp;severity=null&amp;id=69aae1a7c48b3f10ff9203c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3076-f727d7d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3076&amp;severity=null&amp;id=69a761b1d1a09e29cb80d402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2647-bb50ec01</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2647&amp;severity=null&amp;id=69a21f2232ffcdb8a27f4a9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27583-973a8793</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27583&amp;severity=null&amp;id=69a1efd532ffcdb8a269c958</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27582-19cd37af</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27582&amp;severity=null&amp;id=69a1efd332ffcdb8a269c90d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27581-646fede8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27581&amp;severity=null&amp;id=69a1efd332ffcdb8a269c90b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27580-fd50d8dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27580&amp;severity=null&amp;id=69a1efd332ffcdb8a269c909</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27573-58e63213</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27573&amp;severity=null&amp;id=69a1efd332ffcdb8a269c907</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27501-967e0347</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27501&amp;severity=null&amp;id=69a1efd332ffcdb8a269c905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27500-9cd2b81a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27500&amp;severity=null&amp;id=69a1efd332ffcdb8a269c903</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27201-361189c0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27201&amp;severity=null&amp;id=69a1efd332ffcdb8a269c901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27200-d1207584</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27200&amp;severity=null&amp;id=69a1efd332ffcdb8a269c8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11384-d1b9a5b1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11384&amp;severity=null&amp;id=69a0a61285912abc71d874fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11383-b010a03f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11383&amp;severity=null&amp;id=69a0a61285912abc71d874fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11382-29f1a883</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11382&amp;severity=null&amp;id=69a0a61185912abc71d874fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11381-6cdc8bce</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11381&amp;severity=null&amp;id=69a0a61185912abc71d874f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0393-cadf2d8c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0393&amp;severity=null&amp;id=699f6ddbb7ef31ef0b58fb3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0070-918889e8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0070&amp;severity=null&amp;id=699f6dd9b7ef31ef0b58f893</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-0069-76541e71</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-0069&amp;severity=null&amp;id=699f6dd9b7ef31ef0b58f891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31745-cfb852fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31745&amp;severity=null&amp;id=699f6dd5b7ef31ef0b58f0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31576-552c05d6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31576&amp;severity=null&amp;id=699f6dd3b7ef31ef0b58eee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27698-eebf7a1f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27698&amp;severity=null&amp;id=699f6d85b7ef31ef0b584f9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27692-dfd19eaf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27692&amp;severity=null&amp;id=699f6d84b7ef31ef0b583d16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27673-ec83e494</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27673&amp;severity=null&amp;id=699f6d84b7ef31ef0b583cb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27537-03cf89fa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27537&amp;severity=null&amp;id=699f6d80b7ef31ef0b57dd4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27536-05f850b9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27536&amp;severity=null&amp;id=699f6d7fb7ef31ef0b57ceca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27462-6bbe0fd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27462&amp;severity=null&amp;id=699f6d7db7ef31ef0b57a493</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27441-9d385c5a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27441&amp;severity=null&amp;id=699f6d7db7ef31ef0b579ac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-27215-4e92ec02</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-27215&amp;severity=null&amp;id=699f6d79b7ef31ef0b573720</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-26464-c5a8cd05</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-26464&amp;severity=null&amp;id=699f6d77b7ef31ef0b572609</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-25760-5b5f8a14</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-25760&amp;severity=null&amp;id=699f6d6eb7ef31ef0b5721ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24528-cf4f1322</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24528&amp;severity=null&amp;id=699f6d5eb7ef31ef0b570bff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24499-d6c21891</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24499&amp;severity=null&amp;id=699f6d5db7ef31ef0b570b51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24498-a4488cb1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24498&amp;severity=null&amp;id=699f6d5db7ef31ef0b570b4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24497-37ca1fef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24497&amp;severity=null&amp;id=699f6d5db7ef31ef0b570b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24475-92a2e018</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24475&amp;severity=null&amp;id=699f6d5cb7ef31ef0b570ae5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-24403-bc3f4e96</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-24403&amp;severity=null&amp;id=699f6d5ab7ef31ef0b570a31</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-23854-6ace6402</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-23854&amp;severity=null&amp;id=699f6d54b7ef31ef0b570608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22984-74b6f189</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22984&amp;severity=null&amp;id=699f6d4fb7ef31ef0b570397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-48261-5de70bc8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-48261&amp;severity=null&amp;id=699f6d11b7ef31ef0b56da48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-46914-2e29cf07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-46914&amp;severity=null&amp;id=699f6d06b7ef31ef0b56d473</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-44711-b7a6975c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-44711&amp;severity=null&amp;id=699f6ce0b7ef31ef0b569c36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-42675-53109fa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-42675&amp;severity=null&amp;id=699f6cc8b7ef31ef0b56903c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40616-a4e6f080</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40616&amp;severity=null&amp;id=699f6cafb7ef31ef0b5680a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-40391-2ea90320</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-40391&amp;severity=null&amp;id=699f6ca8b7ef31ef0b567a18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-39152-5803aade</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-39152&amp;severity=null&amp;id=699f6c83b7ef31ef0b565c2d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-37790-c13a4fd5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-37790&amp;severity=null&amp;id=699f6c6fb7ef31ef0b563ff8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36802-0c7a1f3f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36802&amp;severity=null&amp;id=699f6c66b7ef31ef0b5639e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34466-9c894408</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34466&amp;severity=null&amp;id=699f6c50b7ef31ef0b5627e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33878-6e917924</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33878&amp;severity=null&amp;id=699f6c49b7ef31ef0b561f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33427-55cc3624</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33427&amp;severity=null&amp;id=699f6c41b7ef31ef0b5619f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33386-52c8117f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33386&amp;severity=null&amp;id=699f6c40b7ef31ef0b561949</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33339-5df70224</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33339&amp;severity=null&amp;id=699f6c3fb7ef31ef0b5618ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-33331-d82881c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-33331&amp;severity=null&amp;id=699f6c3fb7ef31ef0b561843</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-32205-3eee8cad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-32205&amp;severity=null&amp;id=699f6c32b7ef31ef0b561063</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-7633-9cfd3f5b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-7633&amp;severity=null&amp;id=699f6c1cb7ef31ef0b5600e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6664-29d14a22</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6664&amp;severity=null&amp;id=699f6c0ab7ef31ef0b55f437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6663-b26f2faa</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6663&amp;severity=null&amp;id=699f6c0ab7ef31ef0b55f435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6642-e28032b4</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6642&amp;severity=null&amp;id=699f6c0ab7ef31ef0b55f426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-57362-119406f9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-57362&amp;severity=null&amp;id=699f6bd6b7ef31ef0b55b5a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55356-ba937a97</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55356&amp;severity=null&amp;id=699f6bceb7ef31ef0b55b109</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55355-692a24e3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55355&amp;severity=null&amp;id=699f6bceb7ef31ef0b55b107</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-3197-75d609f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-3197&amp;severity=null&amp;id=699f0698b7ef31ef0b2324e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27163-99473d99</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27163&amp;severity=null&amp;id=699ccae3be58cf853bccd9fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25984-5e87a2a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25984&amp;severity=null&amp;id=699cc75ebe58cf853bcb5ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27534-9af56343</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27534&amp;severity=null&amp;id=6999354dbe58cf853b449482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27533-ad0f676b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27533&amp;severity=null&amp;id=6999354dbe58cf853b449480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27532-e75df087</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27532&amp;severity=null&amp;id=6999354dbe58cf853b44947e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27531-a4133aa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27531&amp;severity=null&amp;id=6999354dbe58cf853b44947c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27530-3738aa8a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27530&amp;severity=null&amp;id=6999354dbe58cf853b44947a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27529-1f7a63a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27529&amp;severity=null&amp;id=6999354dbe58cf853b449478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27528-20edf33a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27528&amp;severity=null&amp;id=6999354dbe58cf853b449476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27527-2f060c66</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27527&amp;severity=null&amp;id=6999354dbe58cf853b449474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27325-46c64f26</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27325&amp;severity=null&amp;id=699812ae2c4d84f260aeb025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27324-41c48a26</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27324&amp;severity=null&amp;id=699812ae2c4d84f260aeb023</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27323-636f7ead</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27323&amp;severity=null&amp;id=699812ae2c4d84f260aeb021</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27322-1d3b936a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27322&amp;severity=null&amp;id=699812ae2c4d84f260aeb01f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27321-43c28c4b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27321&amp;severity=null&amp;id=699812ae2c4d84f260aeb01d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27320-23c5e382</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27320&amp;severity=null&amp;id=699812ae2c4d84f260aeb01b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27319-74df6e8d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27319&amp;severity=null&amp;id=699812ae2c4d84f260aeb019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27318-5535c99f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27318&amp;severity=null&amp;id=699812ae2c4d84f260aeb017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27317-55cd812b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27317&amp;severity=null&amp;id=699812ae2c4d84f260aeb015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26995-7069317a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26995&amp;severity=null&amp;id=6997d231d7880ec89b52f4e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13965-7c6d7241</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13965&amp;severity=null&amp;id=6996fb4b8fb9188dea8c0dfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13933-e2cd7ea1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13933&amp;severity=null&amp;id=6996fb4b8fb9188dea8c0df9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13602-1b267560</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13602&amp;severity=null&amp;id=6996fb4b8fb9188dea8c0df1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1452-8caea6c2</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1452&amp;severity=null&amp;id=699575bd80d747be20537803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27038-5a31c45c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27038&amp;severity=null&amp;id=69953ce380d747be203b5f2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27037-97c4a5aa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27037&amp;severity=null&amp;id=69953ce380d747be203b5f29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27036-711321e9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27036&amp;severity=null&amp;id=69953ce380d747be203b5f27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27035-e0a95d4a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27035&amp;severity=null&amp;id=69953ce380d747be203b5f25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27034-a58e33c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27034&amp;severity=null&amp;id=69953ce380d747be203b5f23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27033-952e2603</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27033&amp;severity=null&amp;id=69953ce380d747be203b5f21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27032-7ee8310d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27032&amp;severity=null&amp;id=69953ce380d747be203b5f1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-27031-597a835b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-27031&amp;severity=null&amp;id=69953ce380d747be203b5f1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-2570-1e5a0726</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-2570&amp;severity=null&amp;id=6994f69980d747be20df4368</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1783-837ca24d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1783&amp;severity=null&amp;id=69934266d1735ca7319849d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68128-ed891d70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68128&amp;severity=null&amp;id=69901848c9e1ff5ad867f2b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68127-360f5a2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68127&amp;severity=null&amp;id=69901848c9e1ff5ad867f2b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68126-c5d982b6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68126&amp;severity=null&amp;id=69901848c9e1ff5ad867f2ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68125-ae0dc108</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68125&amp;severity=null&amp;id=69901848c9e1ff5ad867f2ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68124-61b453c8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68124&amp;severity=null&amp;id=69901846c9e1ff5ad867f260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58184-b81ae389</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58184&amp;severity=null&amp;id=69901846c9e1ff5ad867f25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58182-aa4d79bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58182&amp;severity=null&amp;id=69901846c9e1ff5ad867f25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47915-a1efafd0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47915&amp;severity=null&amp;id=69901846c9e1ff5ad867f25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34157-b76aff80</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34157&amp;severity=null&amp;id=69901846c9e1ff5ad867f258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-34154-30cf0993</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-34154&amp;severity=null&amp;id=69901846c9e1ff5ad867f256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26303-6f1da293</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26303&amp;severity=null&amp;id=69901846c9e1ff5ad867f254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26302-2533f6f9</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26302&amp;severity=null&amp;id=69901846c9e1ff5ad867f252</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26301-4d179702</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26301&amp;severity=null&amp;id=69901846c9e1ff5ad867f250</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26300-242d061c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26300&amp;severity=null&amp;id=69901846c9e1ff5ad867f24e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26299-5b759b23</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26299&amp;severity=null&amp;id=69901846c9e1ff5ad867f209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26298-6c73fbf3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26298&amp;severity=null&amp;id=69901846c9e1ff5ad867f200</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26297-76487ac9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26297&amp;severity=null&amp;id=69901846c9e1ff5ad867f1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26296-d0a1beaf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26296&amp;severity=null&amp;id=69901846c9e1ff5ad867f1ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26295-c26ccc07</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26295&amp;severity=null&amp;id=69901846c9e1ff5ad867f1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36552-ce2fc554</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36552&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36545-053f0d84</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36545&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36542-11860513</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36542&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36538-98c5bf16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36538&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36534-cfbba132</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36534&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36532-1065ae30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36532&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36526-d89cff0d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36526&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36524-03b64be1</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36524&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36523-d68ed31a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36523&amp;severity=null&amp;id=698f6eb1c9e1ff5ad85609be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-36517-87876348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-36517&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35997-2998ef38</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35997&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35993-b788b5b8</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35993&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35976-b886bed8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35976&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35962-7222ba4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35962&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35961-941daa24</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35961&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35960-c3d571cc</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35960&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32734-ded8ba18</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32734&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32733-7cfa5034</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32733&amp;severity=null&amp;id=698f6eb0c9e1ff5ad85609a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32090-ab0d73ab</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32090&amp;severity=null&amp;id=698f6eb0c9e1ff5ad856099e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32085-da33fec1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32085&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560992</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32082-fb90ebef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32082&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560990</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-32009-ad521062</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-32009&amp;severity=null&amp;id=698f6eafc9e1ff5ad856098e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31942-ee52eb0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31942&amp;severity=null&amp;id=698f6eafc9e1ff5ad856098c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31364-1a8db0d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31364&amp;severity=null&amp;id=698f6eafc9e1ff5ad856098a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31358-62310bf5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31358&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560988</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-31145-f8786f4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-31145&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560986</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-30517-4d843cf0</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-30517&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560984</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29869-26bc3209</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29869&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560982</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27941-7dc5f5d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27941&amp;severity=null&amp;id=698f6eafc9e1ff5ad8560980</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27928-7966983b</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27928&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560974</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27573-56024f15</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27573&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560972</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27569-c5bed5de</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27569&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560970</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-27251-35c53980</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-27251&amp;severity=null&amp;id=698f6eaec9e1ff5ad856096e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-26471-35847377</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-26471&amp;severity=null&amp;id=698f6eaec9e1ff5ad856096c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-25049-a38ececb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-25049&amp;severity=null&amp;id=698f6eaec9e1ff5ad856096a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24524-dc769d02</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24524&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560968</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24518-39849294</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24518&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560966</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24492-065830f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24492&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560964</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24321-94de1750</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24321&amp;severity=null&amp;id=698f6eaec9e1ff5ad8560962</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24300-05265f24</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24300&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560956</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22845-497658d7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22845&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560954</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20110-e92e2b1e</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20110&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20107-47ebaa4f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20107&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560950</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20098-d79feccd</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20098&amp;severity=null&amp;id=698f6eadc9e1ff5ad856094e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20089-57f924c0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20089&amp;severity=null&amp;id=698f6eadc9e1ff5ad856094c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20078-bc3339f4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20078&amp;severity=null&amp;id=698f6eadc9e1ff5ad856094a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20066-64d76c39</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20066&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20038-6f0e83b0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20038&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-20007-ca01a17c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-20007&amp;severity=null&amp;id=698f6eadc9e1ff5ad8560944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26257-2cbb6ace</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26257&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26256-4e13f4aa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26256&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26255-16bc78d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26255&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26254-751f74e8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26254&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26253-b8169b5e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26253&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26252-f6991862</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26252&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26251-2910ceae</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26251&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26250-839457d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26250&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26249-ddae6f52</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26249&amp;severity=null&amp;id=698ea641c9e1ff5ad8e3f0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26092-3728d80c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26092&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26091-d0f588f2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26091&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26090-29f2a15e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26090&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26089-a51162ff</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26089&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26088-c07ad91d</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26088&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26087-3134e59f</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26087&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26086-dcd0de6b</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26086&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26085-3945d3b3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26085&amp;severity=null&amp;id=698d7606c9e1ff5ad87e3c61</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26044-b98d0ebf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26044&amp;severity=null&amp;id=698c06134b57a58fa171e44b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26043-03ea5338</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26043&amp;severity=null&amp;id=698c06134b57a58fa171e449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26042-a2bdf12b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26042&amp;severity=null&amp;id=698c06134b57a58fa171e447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26041-08c81e0b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26041&amp;severity=null&amp;id=698c06134b57a58fa171e445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26040-6e6b94d4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26040&amp;severity=null&amp;id=698c06134b57a58fa171e443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26039-0735a2b4</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26039&amp;severity=null&amp;id=698c06134b57a58fa171e441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26038-c7dfb0ea</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26038&amp;severity=null&amp;id=698c06134b57a58fa171e43f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26037-fce17c55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26037&amp;severity=null&amp;id=698c06134b57a58fa171e43d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-26036-2e7ce720</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-26036&amp;severity=null&amp;id=698c06134b57a58fa171e43b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25251-e1cd18ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25251&amp;severity=null&amp;id=698bb5374b57a58fa12f9f54</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6010-ea427302</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6010&amp;severity=null&amp;id=698b75fd4b57a58fa1209f95</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25950-98dcde38</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25950&amp;severity=null&amp;id=698b6f014b57a58fa11d3756</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25981-698d1e51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25981&amp;severity=null&amp;id=698ab4934b57a58fa1dfe428</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25980-125e770a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25980&amp;severity=null&amp;id=698ab4934b57a58fa1dfe426</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25979-2e9a13c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25979&amp;severity=null&amp;id=698ab4934b57a58fa1dfe424</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25978-ced548ba</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25978&amp;severity=null&amp;id=698ab4934b57a58fa1dfe422</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25977-ef608a55</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25977&amp;severity=null&amp;id=698ab4934b57a58fa1dfe420</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25976-18dcaeb7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25976&amp;severity=null&amp;id=698ab4934b57a58fa1dfe41e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25975-33da65ca</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25975&amp;severity=null&amp;id=698ab4934b57a58fa1dfe41c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25974-7c338a77</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25974&amp;severity=null&amp;id=698ab4934b57a58fa1dfe41a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25973-8414fafa</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25973&amp;severity=null&amp;id=698ab4934b57a58fa1dfe418</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25845-63630ab9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25845&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25844-002f6e3b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25844&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25843-4b26606f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25843&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25842-15885dd4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25842&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25841-a48fb348</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25841&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25840-4d63fc45</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25840&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25839-febfecf1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25839&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25838-4d074883</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25838&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25837-809a520f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25837&amp;severity=null&amp;id=6986b8c9f9fa50a62fc1f7ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25698-423f53a8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25698&amp;severity=null&amp;id=69856acdf9fa50a62fd0a38b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25697-3eab35f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25697&amp;severity=null&amp;id=69856acdf9fa50a62fd0a389</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25696-b6ac9abd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25696&amp;severity=null&amp;id=69856acdf9fa50a62fd0a387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25695-a264f6d5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25695&amp;severity=null&amp;id=69856acdf9fa50a62fd0a385</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25694-f144b05b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25694&amp;severity=null&amp;id=69856acdf9fa50a62fd0a383</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25693-1e4e16b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25693&amp;severity=null&amp;id=69856acdf9fa50a62fd0a381</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25692-9e76ca52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25692&amp;severity=null&amp;id=69856acdf9fa50a62fd0a37f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25630-f81955b9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25630&amp;severity=null&amp;id=6984ec3ef9fa50a62f33cd89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1846-28735a77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1846&amp;severity=null&amp;id=69825048f9fa50a62fdc19a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0921-7bc4c3d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0921&amp;severity=null&amp;id=6980d819f9fa50a62f4bb63d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25097-eff1cf81</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25097&amp;severity=null&amp;id=697c334fac0632022226c823</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25096-2fc2a6a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25096&amp;severity=null&amp;id=697c334dac0632022226c810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25095-cb12e409</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25095&amp;severity=null&amp;id=697c334dac0632022226c80e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25094-eb0b5714</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25094&amp;severity=null&amp;id=697c334dac0632022226c80c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25093-cbb39461</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25093&amp;severity=null&amp;id=697c334dac0632022226c80a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25092-88de74c7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25092&amp;severity=null&amp;id=697c334dac0632022226c807</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25091-4fa5534f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25091&amp;severity=null&amp;id=697c334dac0632022226c805</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-25090-2435bd0a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-25090&amp;severity=null&amp;id=697c334dac0632022226c803</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24867-cdc3ab6f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24867&amp;severity=null&amp;id=69798b254623b1157c899804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24866-37b31546</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24866&amp;severity=null&amp;id=69798b254623b1157c899802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24865-d8574530</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24865&amp;severity=null&amp;id=69798b254623b1157c899800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24864-d3577727</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24864&amp;severity=null&amp;id=69798b254623b1157c8997fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24863-c69ac6fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24863&amp;severity=null&amp;id=69798b254623b1157c8997fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24862-2b93783a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24862&amp;severity=null&amp;id=69798b254623b1157c8997fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24861-d3a0cae1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24861&amp;severity=null&amp;id=69798b254623b1157c8997f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24860-829b5e2d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24860&amp;severity=null&amp;id=69798b254623b1157c8997f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24859-ff4f38c5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24859&amp;severity=null&amp;id=69798b254623b1157c8997f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24643-bf9fe874</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24643&amp;severity=null&amp;id=697518f14623b1157cca626b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24649-8a8d9ee2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24649&amp;severity=null&amp;id=697448a94623b1157c9f3f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24648-81508f24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24648&amp;severity=null&amp;id=697448a94623b1157c9f3f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24647-8472fd1e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24647&amp;severity=null&amp;id=697448a94623b1157c9f3f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24646-e53e8303</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24646&amp;severity=null&amp;id=697448a94623b1157c9f3f41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24645-0316e3af</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24645&amp;severity=null&amp;id=697448a94623b1157c9f3f3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24644-9fa24578</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24644&amp;severity=null&amp;id=697448a94623b1157c9f3f3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24642-a709c976</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24642&amp;severity=null&amp;id=697448a94623b1157c9f3f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24402-92da7d09</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24402&amp;severity=null&amp;id=697417714623b1157c7215a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0991-f6cf11e9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0991&amp;severity=null&amp;id=6973f7cc4623b1157c67931c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12780-3f240a14</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12780&amp;severity=null&amp;id=6973f7cc4623b1157c67931a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21867-7d5a97d5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21867&amp;severity=null&amp;id=6973bf8c4623b1157c5b4f97</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24342-dfed49d2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24342&amp;severity=null&amp;id=6972f7294623b1157c000a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24341-c6828531</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24341&amp;severity=null&amp;id=6972f7294623b1157c000a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24340-6119aa3b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24340&amp;severity=null&amp;id=6972f7294623b1157c000a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24339-cbfcf1e8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24339&amp;severity=null&amp;id=6972f7294623b1157c000a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24338-ad3cb442</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24338&amp;severity=null&amp;id=6972f7294623b1157c000a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24337-41a9e435</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24337&amp;severity=null&amp;id=6972f7294623b1157c000a3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24336-8be6a370</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24336&amp;severity=null&amp;id=6972f7294623b1157c000a3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24335-71411ab1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24335&amp;severity=null&amp;id=6972f7294623b1157c000a39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24334-ecfad7b3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24334&amp;severity=null&amp;id=6972f7294623b1157c000a37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53252-13f342e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53252&amp;severity=null&amp;id=6971f3124623b1157c64a9aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53251-e8bc3168</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53251&amp;severity=null&amp;id=6971f3124623b1157c64a9a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53250-47c1cac5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53250&amp;severity=null&amp;id=6971f3124623b1157c64a9a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53249-5c36081b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53249&amp;severity=null&amp;id=6971f3124623b1157c64a9a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-53248-89872768</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-53248&amp;severity=null&amp;id=6971f3124623b1157c64a9a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45743-1c965692</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45743&amp;severity=null&amp;id=6971f3124623b1157c64a9a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45742-ffb1cd17</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45742&amp;severity=null&amp;id=6971f3124623b1157c64a99e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45730-6968f2d9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45730&amp;severity=null&amp;id=6971f3104623b1157c64a948</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45729-b1b24081</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45729&amp;severity=null&amp;id=6971f3104623b1157c64a946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45728-968b1d6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45728&amp;severity=null&amp;id=6971f3104623b1157c64a944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45727-55d0f077</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45727&amp;severity=null&amp;id=6971f3104623b1157c64a942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45726-6e62e99d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45726&amp;severity=null&amp;id=6971f3104623b1157c64a940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45725-da4f9f15</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45725&amp;severity=null&amp;id=6971f3104623b1157c64a93e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-45724-31711d11</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-45724&amp;severity=null&amp;id=6971f3104623b1157c64a93c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36998-bdc8e8d2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36998&amp;severity=null&amp;id=6971f3104623b1157c64a93a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-36988-efa34d00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-36988&amp;severity=null&amp;id=6971f3104623b1157c64a938</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-22166-d06aa78f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-22166&amp;severity=null&amp;id=6971f3104623b1157c64a936</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24026-00705d25</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24026&amp;severity=null&amp;id=697054284623b1157ca48946</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24025-0ab63e6a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24025&amp;severity=null&amp;id=697054284623b1157ca48944</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24024-12438b5b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24024&amp;severity=null&amp;id=697054284623b1157ca48942</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24023-0ddc97b3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24023&amp;severity=null&amp;id=697054284623b1157ca48940</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24022-3e09e6e4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24022&amp;severity=null&amp;id=697054284623b1157ca4893e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24021-253dcad8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24021&amp;severity=null&amp;id=697054284623b1157ca4893c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-24020-38aa390b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-24020&amp;severity=null&amp;id=697054284623b1157ca4893a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14883-663ff4e2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14883&amp;severity=null&amp;id=696f9d594623b1157c3b4ff5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23917-92f36d7b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23917&amp;severity=null&amp;id=696f02aa4623b1157c1371fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23916-f535e773</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23916&amp;severity=null&amp;id=696f02aa4623b1157c1371fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23915-243a398e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23915&amp;severity=null&amp;id=696f02aa4623b1157c1371f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23914-816250cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23914&amp;severity=null&amp;id=696f02aa4623b1157c1371f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23913-ff1c164a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23913&amp;severity=null&amp;id=696f02aa4623b1157c1371f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23912-0599b918</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23912&amp;severity=null&amp;id=696f02aa4623b1157c1371f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23911-d3af3928</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23911&amp;severity=null&amp;id=696f02aa4623b1157c1371f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23910-d630c919</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23910&amp;severity=null&amp;id=696f02aa4623b1157c1371ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23909-80322cc3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23909&amp;severity=null&amp;id=696f02aa4623b1157c1371ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5489-fe491a83</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5489&amp;severity=null&amp;id=696abd74b22c7ad868fbdefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5102-e38e9a9e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5102&amp;severity=null&amp;id=696abd74b22c7ad868fbdefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8506-bdc2ddde</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8506&amp;severity=null&amp;id=696abd74b22c7ad868fbdef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-8491-3cd0884e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-8491&amp;severity=null&amp;id=696abd74b22c7ad868fbdef6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-0823-b0b772fa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-0823&amp;severity=null&amp;id=696a4972b22c7ad868ad9ab8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23714-af43ca5c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23714&amp;severity=null&amp;id=6969bae17c726673b6e97e6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23713-9856e2bd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23713&amp;severity=null&amp;id=6969bae17c726673b6e97e6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23712-28da3dcd</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23712&amp;severity=null&amp;id=6969bae17c726673b6e97e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23711-2e8c5230</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23711&amp;severity=null&amp;id=6969bae17c726673b6e97e67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23710-294ddc86</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23710&amp;severity=null&amp;id=6969bae17c726673b6e97e65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23709-f751f8f0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23709&amp;severity=null&amp;id=6969bae17c726673b6e97e63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-1012-accf62a6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-1012&amp;severity=null&amp;id=696974917c726673b685514f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23582-1444c703</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23582&amp;severity=null&amp;id=69686a380b074b1fa5376d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23581-215f7d9b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23581&amp;severity=null&amp;id=69686a380b074b1fa5376d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23580-b6ab5f47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23580&amp;severity=null&amp;id=69686a380b074b1fa5376d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23579-9ec46f04</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23579&amp;severity=null&amp;id=69686a380b074b1fa5376d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23578-d367cd94</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23578&amp;severity=null&amp;id=69686a380b074b1fa5376d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23577-1e8e0d80</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23577&amp;severity=null&amp;id=69686a380b074b1fa5376d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23576-ca3efbcd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23576&amp;severity=null&amp;id=69686a380b074b1fa5376d6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23575-146551fc</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23575&amp;severity=null&amp;id=69686a380b074b1fa5376d6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-23574-c02dcfaa</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-23574&amp;severity=null&amp;id=69686a380b074b1fa5376d6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12533-829c0bf9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12533&amp;severity=null&amp;id=69681d11f809b25a98e646df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22837-38666826</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22837&amp;severity=null&amp;id=6965c5f3a60475309f5d4b0c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22836-6c8220c1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22836&amp;severity=null&amp;id=6965c5f3a60475309f5d4b0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22835-8be93931</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22835&amp;severity=null&amp;id=6965c5f3a60475309f5d4b08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22834-b4a18f4a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22834&amp;severity=null&amp;id=6965c5f3a60475309f5d4b06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22833-18304c77</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22833&amp;severity=null&amp;id=6965c5f3a60475309f5d4b04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22832-129c3018</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22832&amp;severity=null&amp;id=6965c5f3a60475309f5d4b02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22831-b8b93663</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22831&amp;severity=null&amp;id=6965c5f3a60475309f5d4b00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22830-8e0d7958</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22830&amp;severity=null&amp;id=6965c5f3a60475309f5d4afe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22829-78fe5093</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22829&amp;severity=null&amp;id=6965c5f3a60475309f5d4afc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14470-aab1fac7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14470&amp;severity=null&amp;id=69653fb6da2266e838f91b1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22636-6dd12142</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22636&amp;severity=null&amp;id=6960837becefc3cd7c01b735</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22635-24d9f0dc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22635&amp;severity=null&amp;id=6960837becefc3cd7c01b733</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22634-cf7f429f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22634&amp;severity=null&amp;id=6960837becefc3cd7c01b731</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22633-228a68e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22633&amp;severity=null&amp;id=6960837becefc3cd7c01b72f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22632-7eec94c8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22632&amp;severity=null&amp;id=6960837becefc3cd7c01b72d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22631-01a620cc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22631&amp;severity=null&amp;id=6960837becefc3cd7c01b72b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22630-15b8c66f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22630&amp;severity=null&amp;id=6960837becefc3cd7c01b729</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22581-97872f12</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22581&amp;severity=low&amp;id=695f3089c901b0632175e2da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22580-43747ef2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22580&amp;severity=low&amp;id=695f3089c901b0632175e2d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22579-f5faaa94</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22579&amp;severity=low&amp;id=695f3089c901b0632175e2d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22578-e10472ea</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22578&amp;severity=low&amp;id=695f3089c901b0632175e2d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22577-206ccbf3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22577&amp;severity=low&amp;id=695f3089c901b0632175e2d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22162-ab5e3522</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22162&amp;severity=null&amp;id=695de047873865b863651c4e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22161-338dfd9e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22161&amp;severity=null&amp;id=695de047873865b863651c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22160-627134f8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22160&amp;severity=null&amp;id=695de047873865b863651c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22159-8d273981</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22159&amp;severity=null&amp;id=695de047873865b863651c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22158-14178746</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22158&amp;severity=null&amp;id=695de047873865b863651c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22157-23424958</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22157&amp;severity=null&amp;id=695de047873865b863651c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-22156-2a199ba3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-22156&amp;severity=null&amp;id=695de047873865b863651c42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21750-ac451934</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21750&amp;severity=null&amp;id=695c8e1a3839e44175e95ed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21749-dbe9135e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21749&amp;severity=null&amp;id=695c8e1a3839e44175e95ed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21748-bbbf22ee</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21748&amp;severity=null&amp;id=695c8e1a3839e44175e95ece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21747-7f1ab79f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21747&amp;severity=null&amp;id=695c8e1a3839e44175e95ecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21746-5bfb94ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21746&amp;severity=null&amp;id=695c8e1a3839e44175e95eca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21745-41a0a10e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21745&amp;severity=null&amp;id=695c8e1a3839e44175e95ec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21744-3ffafc41</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21744&amp;severity=null&amp;id=695c8e1a3839e44175e95ec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69291-487a858f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69291&amp;severity=null&amp;id=695c0c063839e441758ba30a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-69290-8e043556</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-69290&amp;severity=null&amp;id=695c0c063839e441758ba308</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56825-ab92724f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56825&amp;severity=null&amp;id=695c0c063839e441758ba306</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-56809-cfe71820</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-56809&amp;severity=null&amp;id=695c08823839e441758ae8c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21652-87eed031</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21652&amp;severity=null&amp;id=69589777db813ff03e3d6443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21651-ecf487dd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21651&amp;severity=null&amp;id=69589777db813ff03e3d6441</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21650-27700dfa</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21650&amp;severity=null&amp;id=69589777db813ff03e3d643f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21649-d61658c9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21649&amp;severity=null&amp;id=69589777db813ff03e3d643d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21648-91763ed4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21648&amp;severity=null&amp;id=69589777db813ff03e3d643b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21647-3b6efda5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21647&amp;severity=null&amp;id=69589777db813ff03e3d6439</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21646-b68ced24</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21646&amp;severity=null&amp;id=69589777db813ff03e3d6437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21645-b8384013</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21645&amp;severity=null&amp;id=69589777db813ff03e3d6435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2026-21644-5888e7c7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2026-21644&amp;severity=null&amp;id=69589777db813ff03e3d6433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34744-571567af</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34744&amp;severity=null&amp;id=695843a1db813ff03e04a562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34738-38025b1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34738&amp;severity=null&amp;id=695843a1db813ff03e04a55b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34685-a32e1aa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34685&amp;severity=null&amp;id=695843a1db813ff03e04a554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35002-c5370791</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35002&amp;severity=low&amp;id=6957f965db813ff03ef5b25e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35001-35b55089</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35001&amp;severity=low&amp;id=6957f965db813ff03ef5b25c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35000-005d9463</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35000&amp;severity=low&amp;id=6957f965db813ff03ef5b25a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34999-bf0e6351</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34999&amp;severity=low&amp;id=6957f965db813ff03ef5b258</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34998-6315ed7b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34998&amp;severity=low&amp;id=6957f965db813ff03ef5b256</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34997-b1be442d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34997&amp;severity=low&amp;id=6957f965db813ff03ef5b254</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34996-bd3a0cfe</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34996&amp;severity=low&amp;id=6957f964db813ff03ef5b236</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34995-b34af379</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34995&amp;severity=low&amp;id=6957f964db813ff03ef5b234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34994-cc7a104d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34994&amp;severity=low&amp;id=6957f964db813ff03ef5b232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34993-6fb32a78</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34993&amp;severity=low&amp;id=6957f964db813ff03ef5b230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34992-2cffe26b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34992&amp;severity=low&amp;id=6957f964db813ff03ef5b22e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34991-69a39f9f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34991&amp;severity=low&amp;id=6957f964db813ff03ef5b22c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34990-33914195</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34990&amp;severity=low&amp;id=6957f964db813ff03ef5b22a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34989-abfb6fc1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34989&amp;severity=low&amp;id=6957f964db813ff03ef5b228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34988-0bfd4010</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34988&amp;severity=low&amp;id=6957f964db813ff03ef5b226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34987-b740d004</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34987&amp;severity=low&amp;id=6957f964db813ff03ef5b224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34986-57df4530</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34986&amp;severity=low&amp;id=6957f963db813ff03ef5b214</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34985-1875cfcc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34985&amp;severity=low&amp;id=6957f963db813ff03ef5b212</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34984-622fdb28</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34984&amp;severity=low&amp;id=6957f963db813ff03ef5b210</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34983-a5d246b7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34983&amp;severity=low&amp;id=6957f963db813ff03ef5b20e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34982-1e1fa335</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34982&amp;severity=low&amp;id=6957f963db813ff03ef5b20c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34981-aded9c15</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34981&amp;severity=null&amp;id=6957f963db813ff03ef5b20a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34980-c4e24867</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34980&amp;severity=null&amp;id=6957f963db813ff03ef5b208</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34979-40dbd474</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34979&amp;severity=null&amp;id=6957f963db813ff03ef5b206</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34978-b93d3cd4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34978&amp;severity=null&amp;id=6957f963db813ff03ef5b204</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34977-665973d3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34977&amp;severity=null&amp;id=6957f963db813ff03ef5b202</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34976-f9d73fe5</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34976&amp;severity=null&amp;id=6957f962db813ff03ef5b1e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34975-959c6ce2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34975&amp;severity=null&amp;id=6957f962db813ff03ef5b1e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34974-787e62c8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34974&amp;severity=null&amp;id=6957f962db813ff03ef5b1e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34973-1f6e4220</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34973&amp;severity=null&amp;id=6957f962db813ff03ef5b1de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34972-8550dd81</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34972&amp;severity=null&amp;id=6957f962db813ff03ef5b1dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34971-d97c1711</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34971&amp;severity=null&amp;id=6957f962db813ff03ef5b1da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34970-d2bf91f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34970&amp;severity=null&amp;id=6957f962db813ff03ef5b1d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34969-077f9ad0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34969&amp;severity=null&amp;id=6957f962db813ff03ef5b1d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34968-4a4d96ed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34968&amp;severity=null&amp;id=6957f962db813ff03ef5b1d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34967-28c2029b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34967&amp;severity=null&amp;id=6957f962db813ff03ef5b1d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34966-df4e6c84</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34966&amp;severity=null&amp;id=6957f961db813ff03ef5b1af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34965-5d95a435</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34965&amp;severity=null&amp;id=6957f961db813ff03ef5b1ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34964-10655023</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34964&amp;severity=null&amp;id=6957f961db813ff03ef5b1ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34963-203202ee</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34963&amp;severity=null&amp;id=6957f961db813ff03ef5b1a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34962-59b10857</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34962&amp;severity=null&amp;id=6957f961db813ff03ef5b1a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34961-3436da25</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34961&amp;severity=null&amp;id=6957f961db813ff03ef5b1a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34960-83a57e6d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34960&amp;severity=null&amp;id=6957f961db813ff03ef5b1a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34959-ad9b561c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34959&amp;severity=null&amp;id=6957f961db813ff03ef5b1a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34958-cbf17e87</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34958&amp;severity=null&amp;id=6957f961db813ff03ef5b19f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34957-cec87d20</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34957&amp;severity=null&amp;id=6957f961db813ff03ef5b19d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34956-7fed215c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34956&amp;severity=null&amp;id=6957f960db813ff03ef5b191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34955-d81b029f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34955&amp;severity=null&amp;id=6957f960db813ff03ef5b18f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34954-cee1a817</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34954&amp;severity=null&amp;id=6957f960db813ff03ef5b18d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34953-4145a677</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34953&amp;severity=null&amp;id=6957f960db813ff03ef5b18b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34952-341daad0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34952&amp;severity=null&amp;id=6957f960db813ff03ef5b189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34951-fb9bb7ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34951&amp;severity=null&amp;id=6957f960db813ff03ef5b187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34950-01f8aee7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34950&amp;severity=null&amp;id=6957f960db813ff03ef5b185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34949-57db0f6b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34949&amp;severity=null&amp;id=6957f960db813ff03ef5b183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34948-8eb82b38</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34948&amp;severity=null&amp;id=6957f960db813ff03ef5b181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34947-cd02a416</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34947&amp;severity=null&amp;id=6957f960db813ff03ef5b17f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34946-a26ec686</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34946&amp;severity=null&amp;id=6957f95fdb813ff03ef5b128</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34945-efc0db7a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34945&amp;severity=null&amp;id=6957f95fdb813ff03ef5b126</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34944-f13e0f94</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34944&amp;severity=null&amp;id=6957f95fdb813ff03ef5b124</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34943-658523bf</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34943&amp;severity=null&amp;id=6957f95fdb813ff03ef5b122</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34942-17a6f372</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34942&amp;severity=null&amp;id=6957f95fdb813ff03ef5b120</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34941-8ae99b32</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34941&amp;severity=null&amp;id=6957f95fdb813ff03ef5b11e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34940-85a377be</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34940&amp;severity=null&amp;id=6957f95fdb813ff03ef5b11c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34939-ab2e0cb0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34939&amp;severity=null&amp;id=6957f95fdb813ff03ef5b11a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34938-ff9a6b0f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34938&amp;severity=null&amp;id=6957f95fdb813ff03ef5b118</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34937-35cd0d9d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34937&amp;severity=null&amp;id=6957f95fdb813ff03ef5b116</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34936-5ee5d4d8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34936&amp;severity=null&amp;id=6957f95edb813ff03ef5b10a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34935-1c3cc3f8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34935&amp;severity=null&amp;id=6957f95edb813ff03ef5b108</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34934-82388897</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34934&amp;severity=null&amp;id=6957f95edb813ff03ef5b106</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34933-4121e8c1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34933&amp;severity=null&amp;id=6957f95edb813ff03ef5b104</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34932-48b338f8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34932&amp;severity=null&amp;id=6957f95edb813ff03ef5b102</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34931-412398ef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34931&amp;severity=null&amp;id=6957f95edb813ff03ef5b100</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34930-6cdf831d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34930&amp;severity=null&amp;id=6957f95edb813ff03ef5b0fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34929-44adfb5f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34929&amp;severity=null&amp;id=6957f95edb813ff03ef5b0fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34928-87d77e4f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34928&amp;severity=null&amp;id=6957f95edb813ff03ef5b0fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34927-713f1cf5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34927&amp;severity=null&amp;id=6957f95edb813ff03ef5b0f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34926-258711f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34926&amp;severity=null&amp;id=6957f95edb813ff03ef5b0ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34925-9dde530c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34925&amp;severity=null&amp;id=6957f95edb813ff03ef5b0ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34924-8260be57</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34924&amp;severity=null&amp;id=6957f95edb813ff03ef5b0e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34923-9cc579de</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34923&amp;severity=null&amp;id=6957f95edb813ff03ef5b0e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34922-ed694319</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34922&amp;severity=null&amp;id=6957f95edb813ff03ef5b0e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34921-40d687cc</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34921&amp;severity=null&amp;id=6957f95edb813ff03ef5b0e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34920-fd431057</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34920&amp;severity=null&amp;id=6957f95edb813ff03ef5b0e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34919-f1303284</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34919&amp;severity=null&amp;id=6957f95edb813ff03ef5b0de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34918-f23a2846</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34918&amp;severity=null&amp;id=6957f95edb813ff03ef5b0dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34917-ff130069</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34917&amp;severity=null&amp;id=6957f95edb813ff03ef5b0da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34916-86f2c079</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34916&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34915-6c704720</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34915&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34914-3c5f93e9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34914&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34913-e9ce64e1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34913&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34912-766086f8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34912&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34911-290242e8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34911&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34910-ee53f5c0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34910&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34909-fd541096</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34909&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34908-3d4072eb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34908&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34907-1cb30e40</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34907&amp;severity=null&amp;id=6957f95ddb813ff03ef5b0bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34906-35296ba4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34906&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34905-d414df4a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34905&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34904-d96721db</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34904&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34903-fb3e831a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34903&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34902-cbeb9e5c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34902&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34901-acf50980</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34901&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34900-8f74c7f7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34900&amp;severity=null&amp;id=6957f95cdb813ff03ef5b0a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34899-4ab01554</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34899&amp;severity=null&amp;id=6957f95cdb813ff03ef5b09e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34898-edb4ca1b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34898&amp;severity=null&amp;id=6957f95cdb813ff03ef5b09c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34897-41f5a8b1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34897&amp;severity=null&amp;id=6957f95cdb813ff03ef5b09a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34896-153807e7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34896&amp;severity=null&amp;id=6957f95bdb813ff03ef5b07c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34895-e34cab3a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34895&amp;severity=null&amp;id=6957f95bdb813ff03ef5b07a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34894-4b507d42</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34894&amp;severity=null&amp;id=6957f95bdb813ff03ef5b078</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34893-3b11c96c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34893&amp;severity=null&amp;id=6957f95bdb813ff03ef5b076</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34892-c3b0e110</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34892&amp;severity=null&amp;id=6957f95bdb813ff03ef5b074</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34891-ae946255</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34891&amp;severity=null&amp;id=6957f95bdb813ff03ef5b072</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34890-621abf50</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34890&amp;severity=null&amp;id=6957f95bdb813ff03ef5b070</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34889-58148f82</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34889&amp;severity=null&amp;id=6957f95bdb813ff03ef5b06e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34888-e5024a73</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34888&amp;severity=null&amp;id=6957f95bdb813ff03ef5b06c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34887-df96eed9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34887&amp;severity=null&amp;id=6957f95bdb813ff03ef5b06a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34886-85fef956</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34886&amp;severity=null&amp;id=6957f95adb813ff03ef5b036</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34885-05fed6eb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34885&amp;severity=null&amp;id=6957f95adb813ff03ef5b034</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34884-6ea3f41c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34884&amp;severity=null&amp;id=6957f95adb813ff03ef5b032</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34883-c53b82ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34883&amp;severity=null&amp;id=6957f95adb813ff03ef5b030</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34882-5b2c550a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34882&amp;severity=null&amp;id=6957f95adb813ff03ef5b02e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34881-52a63137</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34881&amp;severity=null&amp;id=6957f95adb813ff03ef5b02c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34880-e8c2caaf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34880&amp;severity=null&amp;id=6957f95adb813ff03ef5b02a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34879-77b75702</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34879&amp;severity=null&amp;id=6957f95adb813ff03ef5b028</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34878-3986c6a9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34878&amp;severity=null&amp;id=6957f95adb813ff03ef5b026</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34877-48d980e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34877&amp;severity=null&amp;id=6957f95adb813ff03ef5b024</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34876-1e27b366</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34876&amp;severity=null&amp;id=6957f958db813ff03ef5b00b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34875-79fff896</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34875&amp;severity=null&amp;id=6957f958db813ff03ef5b009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34874-8a3b2948</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34874&amp;severity=null&amp;id=6957f958db813ff03ef5b007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34873-bcbc1c44</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34873&amp;severity=null&amp;id=6957f958db813ff03ef5b005</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34872-fa906bd6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34872&amp;severity=null&amp;id=6957f958db813ff03ef5b003</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34871-ae6dba53</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34871&amp;severity=null&amp;id=6957f958db813ff03ef5b001</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34870-94e6d814</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34870&amp;severity=null&amp;id=6957f958db813ff03ef5afff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34869-2823f89d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34869&amp;severity=null&amp;id=6957f958db813ff03ef5affd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34868-e7230933</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34868&amp;severity=null&amp;id=6957f958db813ff03ef5affb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34867-96ea9bc9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34867&amp;severity=null&amp;id=6957f958db813ff03ef5aff9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34866-e0a33cce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34866&amp;severity=null&amp;id=6957f958db813ff03ef5afc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34865-3c400501</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34865&amp;severity=null&amp;id=6957f958db813ff03ef5afc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34864-731d0baf</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34864&amp;severity=null&amp;id=6957f958db813ff03ef5afc5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34863-3f22c569</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34863&amp;severity=null&amp;id=6957f958db813ff03ef5afc3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34862-b5f5ea64</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34862&amp;severity=null&amp;id=6957f957db813ff03ef5afc1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34861-be80227b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34861&amp;severity=null&amp;id=6957f957db813ff03ef5afbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34860-a5dd9f56</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34860&amp;severity=null&amp;id=6957f957db813ff03ef5afbd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34859-04f2d48f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34859&amp;severity=null&amp;id=6957f957db813ff03ef5afbb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34858-c75dd984</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34858&amp;severity=null&amp;id=6957f957db813ff03ef5afb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34857-d7dba9ff</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34857&amp;severity=null&amp;id=6957f957db813ff03ef5afb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34856-ab397fe6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34856&amp;severity=null&amp;id=6957f956db813ff03ef5af86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34855-08c0ac0b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34855&amp;severity=null&amp;id=6957f956db813ff03ef5af84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34854-c8a7d4b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34854&amp;severity=null&amp;id=6957f956db813ff03ef5af82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34853-972173c1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34853&amp;severity=null&amp;id=6957f956db813ff03ef5af80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34852-313f554a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34852&amp;severity=null&amp;id=6957f956db813ff03ef5af7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34851-2a8744f5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34851&amp;severity=null&amp;id=6957f956db813ff03ef5af7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34850-6aeb7e12</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34850&amp;severity=null&amp;id=6957f956db813ff03ef5af7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34849-6a763510</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34849&amp;severity=null&amp;id=6957f956db813ff03ef5af78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34848-47ec82d8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34848&amp;severity=null&amp;id=6957f956db813ff03ef5af76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34847-ba977569</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34847&amp;severity=null&amp;id=6957f956db813ff03ef5af74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34846-c92e8c7b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34846&amp;severity=null&amp;id=6957f956db813ff03ef5af68</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34845-d686b4ea</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34845&amp;severity=null&amp;id=6957f956db813ff03ef5af66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34844-59b6ce94</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34844&amp;severity=null&amp;id=6957f956db813ff03ef5af64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34843-2edace99</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34843&amp;severity=null&amp;id=6957f956db813ff03ef5af62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34842-e7b9ae24</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34842&amp;severity=null&amp;id=6957f956db813ff03ef5af60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34841-f8db74a1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34841&amp;severity=null&amp;id=6957f956db813ff03ef5af5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34840-a412bda4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34840&amp;severity=null&amp;id=6957f956db813ff03ef5af5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34839-c0e171ac</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34839&amp;severity=null&amp;id=6957f956db813ff03ef5af5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34838-7d8bf8be</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34838&amp;severity=null&amp;id=6957f956db813ff03ef5af58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34837-c5da4d58</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34837&amp;severity=null&amp;id=6957f956db813ff03ef5af56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34836-13b8577f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34836&amp;severity=null&amp;id=6957f955db813ff03ef5af48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34835-ab670e5e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34835&amp;severity=null&amp;id=6957f955db813ff03ef5af46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34834-ccdb4544</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34834&amp;severity=null&amp;id=6957f955db813ff03ef5af44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34833-efaa895f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34833&amp;severity=null&amp;id=6957f955db813ff03ef5af42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34832-9082f7bc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34832&amp;severity=null&amp;id=6957f955db813ff03ef5af40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34831-80d2187f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34831&amp;severity=null&amp;id=6957f955db813ff03ef5af3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34830-f1225c98</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34830&amp;severity=null&amp;id=6957f955db813ff03ef5af3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34829-f0c476aa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34829&amp;severity=null&amp;id=6957f955db813ff03ef5af3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34828-e5fe9873</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34828&amp;severity=null&amp;id=6957f955db813ff03ef5af38</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34827-4adbec87</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34827&amp;severity=null&amp;id=6957f955db813ff03ef5af36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34826-93621786</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34826&amp;severity=null&amp;id=6957f954db813ff03ef5af28</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34825-dfc354a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34825&amp;severity=null&amp;id=6957f954db813ff03ef5af26</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34824-f10b6972</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34824&amp;severity=null&amp;id=6957f954db813ff03ef5af24</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34823-66990b34</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34823&amp;severity=null&amp;id=6957f954db813ff03ef5af22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34822-a6617eab</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34822&amp;severity=null&amp;id=6957f954db813ff03ef5af20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34821-75e863a3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34821&amp;severity=null&amp;id=6957f954db813ff03ef5af1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34820-e7f2d964</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34820&amp;severity=null&amp;id=6957f954db813ff03ef5af1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34819-8bcf7c0a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34819&amp;severity=null&amp;id=6957f954db813ff03ef5af1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34818-52c27d44</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34818&amp;severity=null&amp;id=6957f954db813ff03ef5af18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34817-bb9c1ce1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34817&amp;severity=null&amp;id=6957f954db813ff03ef5af16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34816-ac2bdcf7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34816&amp;severity=null&amp;id=6957f953db813ff03ef5af0a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34815-5c5d75d5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34815&amp;severity=null&amp;id=6957f953db813ff03ef5af08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34814-31ce6ea9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34814&amp;severity=null&amp;id=6957f953db813ff03ef5af06</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34813-37a060ba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34813&amp;severity=null&amp;id=6957f953db813ff03ef5af04</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34812-df49e589</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34812&amp;severity=null&amp;id=6957f953db813ff03ef5af02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34811-0e82357e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34811&amp;severity=null&amp;id=6957f953db813ff03ef5af00</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34810-8667130d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34810&amp;severity=null&amp;id=6957f953db813ff03ef5aefe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34809-f51d3625</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34809&amp;severity=null&amp;id=6957f953db813ff03ef5aefc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34808-a1fde436</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34808&amp;severity=null&amp;id=6957f953db813ff03ef5aefa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34807-bac2444b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34807&amp;severity=null&amp;id=6957f953db813ff03ef5aef8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34806-b789236c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34806&amp;severity=null&amp;id=6957f952db813ff03ef5aee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34805-97aaddf6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34805&amp;severity=null&amp;id=6957f952db813ff03ef5aee6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34804-fde56d0b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34804&amp;severity=null&amp;id=6957f952db813ff03ef5aee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34803-9b41b5c9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34803&amp;severity=null&amp;id=6957f952db813ff03ef5aee0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34802-bf38db6e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34802&amp;severity=null&amp;id=6957f952db813ff03ef5aedd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34801-afc0fdb8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34801&amp;severity=null&amp;id=6957f952db813ff03ef5aed8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34800-8ed50e67</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34800&amp;severity=null&amp;id=6957f952db813ff03ef5aed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34799-edd4044d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34799&amp;severity=null&amp;id=6957f952db813ff03ef5aed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34798-77c3a2bf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34798&amp;severity=low&amp;id=6957f602db813ff03ef51676</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34797-c8c1702b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34797&amp;severity=low&amp;id=6957f602db813ff03ef51674</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34796-35b7d369</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34796&amp;severity=low&amp;id=6957f602db813ff03ef51672</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34795-9eb80432</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34795&amp;severity=low&amp;id=6957f602db813ff03ef51670</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34794-b1216d46</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34794&amp;severity=low&amp;id=6957f602db813ff03ef5166e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34793-d882fd09</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34793&amp;severity=low&amp;id=6957f601db813ff03ef5164c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34792-20b032ed</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34792&amp;severity=low&amp;id=6957f601db813ff03ef5164a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34791-d89c6e61</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34791&amp;severity=low&amp;id=6957f601db813ff03ef51648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34790-80b3c207</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34790&amp;severity=low&amp;id=6957f601db813ff03ef51646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34789-f2909877</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34789&amp;severity=low&amp;id=6957f601db813ff03ef51644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34788-44210f1e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34788&amp;severity=low&amp;id=6957f601db813ff03ef51642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34787-6085d2d8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34787&amp;severity=low&amp;id=6957f601db813ff03ef51640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34786-e1730408</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34786&amp;severity=low&amp;id=6957f601db813ff03ef5163e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34785-4b560029</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34785&amp;severity=low&amp;id=6957f601db813ff03ef5163c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34784-eb6401df</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34784&amp;severity=low&amp;id=6957f601db813ff03ef5163a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34783-6a97e180</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34783&amp;severity=low&amp;id=6957f600db813ff03ef5162a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34782-e95433e1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34782&amp;severity=low&amp;id=6957f600db813ff03ef51628</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34781-799931ad</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34781&amp;severity=low&amp;id=6957f600db813ff03ef51626</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34780-2627b53e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34780&amp;severity=low&amp;id=6957f600db813ff03ef51624</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34779-c43406da</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34779&amp;severity=low&amp;id=6957f600db813ff03ef51622</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34778-011dd2a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34778&amp;severity=low&amp;id=6957f600db813ff03ef51620</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34777-a3477ca2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34777&amp;severity=low&amp;id=6957f600db813ff03ef5161e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34776-6f8f46db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34776&amp;severity=low&amp;id=6957f600db813ff03ef5161c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34775-6c9abfc9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34775&amp;severity=low&amp;id=6957f600db813ff03ef5161a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34774-d48c771b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34774&amp;severity=null&amp;id=6957f600db813ff03ef51618</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34773-2beb36e1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34773&amp;severity=null&amp;id=6957f5ffdb813ff03ef5160c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34772-f0d595e3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34772&amp;severity=null&amp;id=6957f5ffdb813ff03ef5160a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34771-1b47284a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34771&amp;severity=null&amp;id=6957f5ffdb813ff03ef51608</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34770-9179ed2c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34770&amp;severity=null&amp;id=6957f5ffdb813ff03ef51606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34769-eb891e12</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34769&amp;severity=null&amp;id=6957f5ffdb813ff03ef51604</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34768-21cccd76</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34768&amp;severity=null&amp;id=6957f5ffdb813ff03ef51602</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34767-6b7d07fe</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34767&amp;severity=null&amp;id=6957f5ffdb813ff03ef51600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34766-4c0dde9c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34766&amp;severity=null&amp;id=6957f5ffdb813ff03ef515fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34765-9d577cef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34765&amp;severity=null&amp;id=6957f5ffdb813ff03ef515fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34764-bce60956</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34764&amp;severity=null&amp;id=6957f5ffdb813ff03ef515fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34763-f7359886</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34763&amp;severity=null&amp;id=6957f5fedb813ff03ef515e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34762-f2306ee6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34762&amp;severity=null&amp;id=6957f5fedb813ff03ef515de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34761-56e1960f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34761&amp;severity=null&amp;id=6957f5fedb813ff03ef515dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34760-452506bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34760&amp;severity=null&amp;id=6957f5fedb813ff03ef515da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34759-dc7c3e82</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34759&amp;severity=null&amp;id=6957f5fedb813ff03ef515d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34758-99128b58</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34758&amp;severity=null&amp;id=6957f5fedb813ff03ef515d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34757-665e809c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34757&amp;severity=null&amp;id=6957f5fedb813ff03ef515d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34756-c288737d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34756&amp;severity=null&amp;id=6957f5fedb813ff03ef515d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34755-043f0de2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34755&amp;severity=null&amp;id=6957f5fedb813ff03ef515d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34754-ecad74a4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34754&amp;severity=null&amp;id=6957f5fedb813ff03ef515ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34753-3da84a9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34753&amp;severity=null&amp;id=6957f5fedb813ff03ef515b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34752-b0ac2abf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34752&amp;severity=null&amp;id=6957f5fedb813ff03ef515b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34751-c22c7032</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34751&amp;severity=null&amp;id=6957f5fedb813ff03ef515b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34750-99c22714</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34750&amp;severity=null&amp;id=6957f5fedb813ff03ef515af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34749-65cb04af</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34749&amp;severity=null&amp;id=6957f5fedb813ff03ef515ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34748-73ffdf5f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34748&amp;severity=null&amp;id=6957f5fedb813ff03ef515ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34747-c9b9e607</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34747&amp;severity=null&amp;id=6957f5fedb813ff03ef515a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34746-ee6bb6d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34746&amp;severity=null&amp;id=6957f5fedb813ff03ef515a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34745-c551c20b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34745&amp;severity=null&amp;id=6957f5fedb813ff03ef515a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34743-4d99bff0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34743&amp;severity=null&amp;id=6957f5fddb813ff03ef51597</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34742-7ae45407</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34742&amp;severity=null&amp;id=6957f5fddb813ff03ef51595</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34741-e8a1fb55</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34741&amp;severity=null&amp;id=6957f5fddb813ff03ef51593</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34740-9b249f21</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34740&amp;severity=null&amp;id=6957f5fddb813ff03ef51591</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34739-77b5dc3b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34739&amp;severity=null&amp;id=6957f5fddb813ff03ef5158f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34737-ed19cc88</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34737&amp;severity=null&amp;id=6957f5fddb813ff03ef5158b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34736-dc020156</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34736&amp;severity=null&amp;id=6957f5fddb813ff03ef51589</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34735-e859368d</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34735&amp;severity=null&amp;id=6957f5fddb813ff03ef51587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34734-747a62dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34734&amp;severity=null&amp;id=6957f5fddb813ff03ef51585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34733-a1c464d1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34733&amp;severity=null&amp;id=6957f5fcdb813ff03ef51566</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34732-c40211d4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34732&amp;severity=null&amp;id=6957f5fcdb813ff03ef51564</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34731-7f2cc3e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34731&amp;severity=null&amp;id=6957f5fcdb813ff03ef51562</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34730-6dcc2921</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34730&amp;severity=null&amp;id=6957f5fcdb813ff03ef51560</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34729-e960dd73</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34729&amp;severity=null&amp;id=6957f5fcdb813ff03ef5155e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34728-2e2c6689</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34728&amp;severity=null&amp;id=6957f5fcdb813ff03ef5155c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34727-ff2cc002</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34727&amp;severity=null&amp;id=6957f5fcdb813ff03ef5155a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34726-27c610de</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34726&amp;severity=null&amp;id=6957f5fcdb813ff03ef51558</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34725-47295501</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34725&amp;severity=null&amp;id=6957f5fcdb813ff03ef51556</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34724-bf3ac32b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34724&amp;severity=null&amp;id=6957f5fcdb813ff03ef51554</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34723-0c798956</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34723&amp;severity=null&amp;id=6957f5fbdb813ff03ef51533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34722-0149e63b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34722&amp;severity=null&amp;id=6957f5fbdb813ff03ef51531</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34721-01fe19ad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34721&amp;severity=null&amp;id=6957f5fbdb813ff03ef5152f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34720-3cb334fe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34720&amp;severity=null&amp;id=6957f5fbdb813ff03ef5152d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34719-5062ecfe</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34719&amp;severity=null&amp;id=6957f5fbdb813ff03ef5152b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34718-500e006c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34718&amp;severity=null&amp;id=6957f5fbdb813ff03ef51529</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34717-0373115f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34717&amp;severity=null&amp;id=6957f5fbdb813ff03ef51527</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34716-d4be4613</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34716&amp;severity=null&amp;id=6957f5fbdb813ff03ef51525</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34715-4053816f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34715&amp;severity=null&amp;id=6957f5fbdb813ff03ef51523</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34714-69fa8b59</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34714&amp;severity=null&amp;id=6957f5fbdb813ff03ef51521</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34713-14f7f0d4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34713&amp;severity=null&amp;id=6957f5f9db813ff03ef514e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34712-3628bfde</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34712&amp;severity=null&amp;id=6957f5f9db813ff03ef514e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34711-db194ff7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34711&amp;severity=null&amp;id=6957f5f9db813ff03ef514e2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34710-a71a2d4f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34710&amp;severity=null&amp;id=6957f5f9db813ff03ef514e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34709-f55af11b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34709&amp;severity=null&amp;id=6957f5f9db813ff03ef514de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34708-f1448ec8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34708&amp;severity=null&amp;id=6957f5f9db813ff03ef514dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34707-568a1193</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34707&amp;severity=null&amp;id=6957f5f9db813ff03ef514da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34706-6d95bb7f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34706&amp;severity=null&amp;id=6957f5f9db813ff03ef514d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34705-1f7ecc0c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34705&amp;severity=null&amp;id=6957f5f9db813ff03ef514d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34704-51d06c8b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34704&amp;severity=null&amp;id=6957f5f9db813ff03ef514d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34703-cc141c62</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34703&amp;severity=null&amp;id=6957f5f8db813ff03ef514c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34702-fd8aae50</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34702&amp;severity=null&amp;id=6957f5f8db813ff03ef514c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34701-a6206c74</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34701&amp;severity=null&amp;id=6957f5f8db813ff03ef514c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34700-24dfb468</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34700&amp;severity=null&amp;id=6957f5f8db813ff03ef514c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34699-4fa4d3d6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34699&amp;severity=null&amp;id=6957f5f8db813ff03ef514c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34698-afc751ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34698&amp;severity=null&amp;id=6957f5f8db813ff03ef514be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34697-9d6a3824</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34697&amp;severity=null&amp;id=6957f5f8db813ff03ef514bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34696-be87e405</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34696&amp;severity=null&amp;id=6957f5f8db813ff03ef514ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34695-98319321</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34695&amp;severity=null&amp;id=6957f5f8db813ff03ef514b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34694-10c07dec</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34694&amp;severity=null&amp;id=6957f5f8db813ff03ef514b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34693-8f911b89</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34693&amp;severity=null&amp;id=6957f5f8db813ff03ef514aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34692-7a7fac2d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34692&amp;severity=null&amp;id=6957f5f8db813ff03ef514a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34691-b4f34842</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34691&amp;severity=null&amp;id=6957f5f8db813ff03ef514a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34690-246fada0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34690&amp;severity=null&amp;id=6957f5f8db813ff03ef514a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34689-47cfdcb7</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34689&amp;severity=null&amp;id=6957f5f8db813ff03ef514a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34688-6094dc82</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34688&amp;severity=null&amp;id=6957f5f8db813ff03ef514a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34687-367cfc38</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34687&amp;severity=null&amp;id=6957f5f8db813ff03ef5149e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34686-991497d2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34686&amp;severity=null&amp;id=6957f5f8db813ff03ef5149c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34684-4be856d0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34684&amp;severity=null&amp;id=6957f5f8db813ff03ef51498</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34683-0ff470e5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34683&amp;severity=null&amp;id=6957f5f7db813ff03ef5148b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34682-963c23da</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34682&amp;severity=null&amp;id=6957f5f7db813ff03ef51488</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34681-83c077b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34681&amp;severity=null&amp;id=6957f5f7db813ff03ef51485</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34680-6d2ff097</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34680&amp;severity=null&amp;id=6957f5f7db813ff03ef51482</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34679-c11d5c6b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34679&amp;severity=null&amp;id=6957f5f7db813ff03ef51480</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34678-4ddcaeab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34678&amp;severity=null&amp;id=6957f5f7db813ff03ef5147e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34677-510f2e08</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34677&amp;severity=null&amp;id=6957f5f7db813ff03ef5147c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34676-c1b1e751</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34676&amp;severity=null&amp;id=6957f5f7db813ff03ef5147a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34675-a325d116</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34675&amp;severity=null&amp;id=6957f5f7db813ff03ef51478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34674-86fbfff6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34674&amp;severity=null&amp;id=6957f5f7db813ff03ef51476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34673-2591432b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34673&amp;severity=null&amp;id=6957f5f6db813ff03ef51455</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34672-9ec7da82</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34672&amp;severity=null&amp;id=6957f5f6db813ff03ef51453</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34671-3c1f6ee9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34671&amp;severity=null&amp;id=6957f5f6db813ff03ef51451</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34670-d61bfbec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34670&amp;severity=null&amp;id=6957f5f6db813ff03ef5144f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34669-03e482d1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34669&amp;severity=null&amp;id=6957f5f6db813ff03ef5144d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34668-6a4653d3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34668&amp;severity=null&amp;id=6957f5f6db813ff03ef5144b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34667-7d01f0f0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34667&amp;severity=null&amp;id=6957f5f6db813ff03ef51449</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34666-ae5336b2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34666&amp;severity=null&amp;id=6957f5f6db813ff03ef51447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34665-c0d83fe9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34665&amp;severity=null&amp;id=6957f5f6db813ff03ef51445</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34664-59a18290</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34664&amp;severity=null&amp;id=6957f5f6db813ff03ef51443</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34663-a04918e3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34663&amp;severity=null&amp;id=6957f5f5db813ff03ef51437</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34662-810ebac5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34662&amp;severity=null&amp;id=6957f5f5db813ff03ef51435</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34661-36b2eb5b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34661&amp;severity=null&amp;id=6957f5f5db813ff03ef51433</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34660-ad818b63</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34660&amp;severity=null&amp;id=6957f5f5db813ff03ef51431</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34659-3d06555f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34659&amp;severity=null&amp;id=6957f5f5db813ff03ef5142f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34658-1308679b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34658&amp;severity=null&amp;id=6957f5f5db813ff03ef5142d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34657-40708b31</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34657&amp;severity=null&amp;id=6957f5f5db813ff03ef5142b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34656-3575e296</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34656&amp;severity=null&amp;id=6957f5f5db813ff03ef51429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34655-4a01e23f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34655&amp;severity=null&amp;id=6957f5f5db813ff03ef51427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34654-2cbd249c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34654&amp;severity=null&amp;id=6957f5f5db813ff03ef51425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34653-bbff3bbe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34653&amp;severity=null&amp;id=6957f5f4db813ff03ef51405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34652-74993304</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34652&amp;severity=null&amp;id=6957f5f4db813ff03ef51403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34651-4db7cee7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34651&amp;severity=null&amp;id=6957f5f4db813ff03ef51401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34650-be0f3628</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34650&amp;severity=null&amp;id=6957f5f4db813ff03ef513ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34649-8bc9815f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34649&amp;severity=null&amp;id=6957f5f4db813ff03ef513fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34648-062689e2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34648&amp;severity=null&amp;id=6957f5f4db813ff03ef513fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34647-f3c2c8ea</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34647&amp;severity=null&amp;id=6957f5f4db813ff03ef513f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34646-8038a062</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34646&amp;severity=null&amp;id=6957f5f4db813ff03ef513f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34645-8afbb863</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34645&amp;severity=null&amp;id=6957f5f4db813ff03ef513f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34644-8f350428</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34644&amp;severity=null&amp;id=6957f5f4db813ff03ef513f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34643-67adb066</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34643&amp;severity=null&amp;id=6957f5f3db813ff03ef513e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34642-4e0b724c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34642&amp;severity=null&amp;id=6957f5f3db813ff03ef513e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34641-0ff0abec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34641&amp;severity=null&amp;id=6957f5f3db813ff03ef513e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34640-d5763f65</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34640&amp;severity=null&amp;id=6957f5f3db813ff03ef513e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34639-2895d867</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34639&amp;severity=null&amp;id=6957f5f3db813ff03ef513df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34638-5b8419f3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34638&amp;severity=null&amp;id=6957f5f3db813ff03ef513dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34637-86e59184</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34637&amp;severity=null&amp;id=6957f5f3db813ff03ef513db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34636-2b0e68da</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34636&amp;severity=null&amp;id=6957f5f3db813ff03ef513d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34635-fdaf0ce7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34635&amp;severity=null&amp;id=6957f5f3db813ff03ef513d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34634-3d2794b3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34634&amp;severity=null&amp;id=6957f5f3db813ff03ef513d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34633-6e61a490</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34633&amp;severity=null&amp;id=6957f5f2db813ff03ef512ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34632-8a8ebcd4</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34632&amp;severity=null&amp;id=6957f5f2db813ff03ef512eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34631-a7fcb615</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34631&amp;severity=null&amp;id=6957f5f2db813ff03ef512e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34630-d49d93bb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34630&amp;severity=null&amp;id=6957f5f2db813ff03ef512e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34629-933173b7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34629&amp;severity=null&amp;id=6957f5f2db813ff03ef512e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34628-5ff241e6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34628&amp;severity=null&amp;id=6957f5f2db813ff03ef512e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34627-0a911882</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34627&amp;severity=null&amp;id=6957f5f2db813ff03ef512e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34626-a4bc7424</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34626&amp;severity=null&amp;id=6957f5f2db813ff03ef512df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34625-eb14ffb4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34625&amp;severity=null&amp;id=6957f5f2db813ff03ef512dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34624-0166f060</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34624&amp;severity=null&amp;id=6957f5f2db813ff03ef512db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34623-191a326d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34623&amp;severity=null&amp;id=6957f5f1db813ff03ef512cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34622-021618ce</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34622&amp;severity=null&amp;id=6957f5f1db813ff03ef512cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34621-88c3228c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34621&amp;severity=null&amp;id=6957f5f1db813ff03ef512cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34620-f613bb6f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34620&amp;severity=null&amp;id=6957f5f1db813ff03ef512c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34619-c16dbcc8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34619&amp;severity=null&amp;id=6957f5f1db813ff03ef512c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34618-e77b4d02</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34618&amp;severity=null&amp;id=6957f5f1db813ff03ef512c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34617-e01805a8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34617&amp;severity=null&amp;id=6957f5f1db813ff03ef512c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34616-28e93859</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34616&amp;severity=null&amp;id=6957f5f1db813ff03ef512c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34615-204ca6e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34615&amp;severity=null&amp;id=6957f5f1db813ff03ef512bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34614-19505709</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34614&amp;severity=null&amp;id=6957f5f1db813ff03ef512bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34613-e1f9f98e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34613&amp;severity=null&amp;id=6957f5f1db813ff03ef512b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34612-074b883b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34612&amp;severity=null&amp;id=6957f5f1db813ff03ef512af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34611-54a0bf50</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34611&amp;severity=null&amp;id=6957f5f1db813ff03ef512ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34610-7e544a5c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34610&amp;severity=null&amp;id=6957f5f1db813ff03ef512ab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34609-3cdcc151</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34609&amp;severity=null&amp;id=6957f5f1db813ff03ef512a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34608-9f59a279</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34608&amp;severity=null&amp;id=6957f5f1db813ff03ef512a7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34607-1f7b846b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34607&amp;severity=null&amp;id=6957f5f1db813ff03ef512a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34606-a974081a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34606&amp;severity=null&amp;id=6957f5f1db813ff03ef512a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34605-5a9c09aa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34605&amp;severity=null&amp;id=6957f5f1db813ff03ef512a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34604-f54a8861</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34604&amp;severity=null&amp;id=6957f5f1db813ff03ef5129f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34603-9a0a2b79</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34603&amp;severity=null&amp;id=6957f5efdb813ff03ef5127f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34602-52876f5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34602&amp;severity=null&amp;id=6957f5efdb813ff03ef5127d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34601-0c08b6ea</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34601&amp;severity=null&amp;id=6957f5efdb813ff03ef5127b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34600-4141c642</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34600&amp;severity=null&amp;id=6957f5efdb813ff03ef51279</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34599-535cdd55</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34599&amp;severity=null&amp;id=6957f5efdb813ff03ef51277</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34598-b1727a36</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34598&amp;severity=null&amp;id=6957f5efdb813ff03ef51275</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34597-1e6f05b1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34597&amp;severity=null&amp;id=6957f5efdb813ff03ef51273</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34596-2aa26f93</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34596&amp;severity=null&amp;id=6957f5efdb813ff03ef51271</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34595-ab6afb9d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34595&amp;severity=null&amp;id=6957f5efdb813ff03ef5126f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34594-03b370fb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34594&amp;severity=null&amp;id=6957f5efdb813ff03ef5126d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34593-77172437</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34593&amp;severity=null&amp;id=6957f5eedb813ff03ef5120f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34592-18d4a574</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34592&amp;severity=null&amp;id=6957f5eedb813ff03ef5120d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34591-013b8561</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34591&amp;severity=null&amp;id=6957f5eedb813ff03ef5120b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34590-27185dd8</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34590&amp;severity=null&amp;id=6957f5eedb813ff03ef51209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34589-0ed98bf8</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34589&amp;severity=null&amp;id=6957f5eedb813ff03ef51207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34588-ff152d56</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34588&amp;severity=null&amp;id=6957f5eedb813ff03ef51205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34587-d53fb980</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34587&amp;severity=null&amp;id=6957f5eedb813ff03ef51203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34586-6de147f4</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34586&amp;severity=null&amp;id=6957f5eedb813ff03ef51201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34585-862b7b91</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34585&amp;severity=null&amp;id=6957f5eedb813ff03ef511ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34584-a8d33991</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34584&amp;severity=null&amp;id=6957f5eedb813ff03ef511fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34583-9a59f76d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34583&amp;severity=null&amp;id=6957f5eddb813ff03ef511ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34582-9fa1af0f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34582&amp;severity=null&amp;id=6957f5eddb813ff03ef511c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34581-5e93caa2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34581&amp;severity=null&amp;id=6957f5eddb813ff03ef511c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34580-385829ad</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34580&amp;severity=null&amp;id=6957f5eddb813ff03ef511c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34579-77f2dde1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34579&amp;severity=null&amp;id=6957f5eddb813ff03ef511c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34578-e1903abb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34578&amp;severity=null&amp;id=6957f5eddb813ff03ef511c0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34577-c38fc308</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34577&amp;severity=null&amp;id=6957f5eddb813ff03ef511be</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34576-12beab8e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34576&amp;severity=null&amp;id=6957f5eddb813ff03ef511bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34575-ac6f7e46</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34575&amp;severity=null&amp;id=6957f5eddb813ff03ef511ba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34574-1e99a2c7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34574&amp;severity=null&amp;id=6957f5eddb813ff03ef511b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34573-8337ac83</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34573&amp;severity=null&amp;id=6957f5ebdb813ff03ef5118a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34572-e0e7446d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34572&amp;severity=null&amp;id=6957f5ebdb813ff03ef51188</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34571-78da25ef</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34571&amp;severity=null&amp;id=6957f5ebdb813ff03ef51186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34570-68cef594</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34570&amp;severity=null&amp;id=6957f5ebdb813ff03ef51184</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34569-9c0ec0d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34569&amp;severity=null&amp;id=6957f5ebdb813ff03ef51182</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34568-390ec984</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34568&amp;severity=null&amp;id=6957f5ebdb813ff03ef51180</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34567-074fc4c4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34567&amp;severity=null&amp;id=6957f5ebdb813ff03ef5117e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34566-d3bec862</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34566&amp;severity=null&amp;id=6957f5ebdb813ff03ef5117c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34565-2725f2d6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34565&amp;severity=null&amp;id=6957f5ebdb813ff03ef5117a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34564-b48743bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34564&amp;severity=null&amp;id=6957f5ebdb813ff03ef51178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34563-6c9609ab</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34563&amp;severity=null&amp;id=6957f5eadb813ff03ef510cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34562-f530f467</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34562&amp;severity=null&amp;id=6957f5eadb813ff03ef510cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34561-07866cb9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34561&amp;severity=null&amp;id=6957f5eadb813ff03ef510c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34560-1f9362ad</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34560&amp;severity=null&amp;id=6957f5eadb813ff03ef510c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34559-f90249ec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34559&amp;severity=null&amp;id=6957f5eadb813ff03ef510c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34558-252e9064</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34558&amp;severity=null&amp;id=6957f5eadb813ff03ef510c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34557-5b0430b2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34557&amp;severity=null&amp;id=6957f5eadb813ff03ef510c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34556-cf1691e3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34556&amp;severity=null&amp;id=6957f5eadb813ff03ef510bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34555-39cf740a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34555&amp;severity=null&amp;id=6957f5eadb813ff03ef510bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34554-0fbc7d98</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34554&amp;severity=null&amp;id=6957f5eadb813ff03ef510bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34553-ba09f301</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34553&amp;severity=null&amp;id=6957f5eadb813ff03ef510a5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34552-e54f9558</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34552&amp;severity=null&amp;id=6957f5eadb813ff03ef510a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34551-ecfcafe3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34551&amp;severity=null&amp;id=6957f5eadb813ff03ef510a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34550-430ca0f9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34550&amp;severity=null&amp;id=6957f5eadb813ff03ef5109f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34549-89f11a95</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34549&amp;severity=null&amp;id=6957f5eadb813ff03ef5109d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34548-2d7e6687</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34548&amp;severity=null&amp;id=6957f5eadb813ff03ef5109b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34547-d743cfd2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34547&amp;severity=null&amp;id=6957f5eadb813ff03ef51099</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34546-bdb17981</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34546&amp;severity=null&amp;id=6957f5eadb813ff03ef51097</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34545-1c89a4d4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34545&amp;severity=null&amp;id=6957f5eadb813ff03ef51095</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34544-145f3429</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34544&amp;severity=null&amp;id=6957f5eadb813ff03ef51093</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34543-bee131ba</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34543&amp;severity=null&amp;id=6957f5e9db813ff03ef51087</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34542-f2206d6a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34542&amp;severity=null&amp;id=6957f5e9db813ff03ef51085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34541-be15dae3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34541&amp;severity=null&amp;id=6957f5e9db813ff03ef51083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34540-33eb562f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34540&amp;severity=null&amp;id=6957f5e9db813ff03ef51081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34539-493c2ac0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34539&amp;severity=null&amp;id=6957f5e9db813ff03ef5107f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34538-2570d694</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34538&amp;severity=null&amp;id=6957f5e9db813ff03ef5107d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34537-849600e9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34537&amp;severity=null&amp;id=6957f5e9db813ff03ef5107b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34536-56a60019</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34536&amp;severity=null&amp;id=6957f5e9db813ff03ef51079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34535-76032fcd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34535&amp;severity=null&amp;id=6957f5e9db813ff03ef51077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34534-4033209b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34534&amp;severity=null&amp;id=6957f5e9db813ff03ef51075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34533-0eda3a40</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34533&amp;severity=null&amp;id=6957f5e8db813ff03ef51037</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34532-d7815e02</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34532&amp;severity=null&amp;id=6957f5e8db813ff03ef51035</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34531-4fedeb07</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34531&amp;severity=null&amp;id=6957f5e8db813ff03ef51033</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34530-bfa0af00</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34530&amp;severity=null&amp;id=6957f5e8db813ff03ef51031</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34529-be5ad6ae</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34529&amp;severity=null&amp;id=6957f5e8db813ff03ef5102f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34528-1b54d616</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34528&amp;severity=null&amp;id=6957f5e8db813ff03ef5102d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34527-4c7634a0</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34527&amp;severity=null&amp;id=6957f5e8db813ff03ef5102b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34526-c8004bee</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34526&amp;severity=null&amp;id=6957f5e8db813ff03ef51029</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34525-f5deb560</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34525&amp;severity=null&amp;id=6957f5e8db813ff03ef51027</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34524-2e2282c2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34524&amp;severity=null&amp;id=6957f5e8db813ff03ef51025</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34507-1b52f12c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34507&amp;severity=null&amp;id=6957f5e7db813ff03ef51019</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34505-65b2ae7b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34505&amp;severity=null&amp;id=6957f5e7db813ff03ef51017</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34498-3b79cd7f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34498&amp;severity=null&amp;id=6957f5e7db813ff03ef51015</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34497-4c6f148c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34497&amp;severity=null&amp;id=6957f5e7db813ff03ef51013</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34496-94fbb10f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34496&amp;severity=null&amp;id=6957f5e7db813ff03ef51011</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34495-e35a1da6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34495&amp;severity=null&amp;id=6957f5e7db813ff03ef5100f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34494-174d3296</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34494&amp;severity=null&amp;id=6957f5e7db813ff03ef5100d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34493-fe83ef65</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34493&amp;severity=null&amp;id=6957f5e7db813ff03ef5100b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34492-62667a3e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34492&amp;severity=null&amp;id=6957f5e7db813ff03ef51009</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34488-d971f51a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34488&amp;severity=null&amp;id=6957f5e7db813ff03ef51007</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34487-bea8cbe9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34487&amp;severity=null&amp;id=6957f5e6db813ff03ef50ff0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34486-e966398a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34486&amp;severity=null&amp;id=6957f5e6db813ff03ef50fee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34485-a0eaa955</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34485&amp;severity=null&amp;id=6957f5e6db813ff03ef50fec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34484-8645ca10</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34484&amp;severity=null&amp;id=6957f5e6db813ff03ef50fea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34483-3de955bb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34483&amp;severity=null&amp;id=6957f5e6db813ff03ef50fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34482-b39740f5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34482&amp;severity=null&amp;id=6957f5e6db813ff03ef50fe6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34481-a798aca4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34481&amp;severity=null&amp;id=6957f5e6db813ff03ef50fe4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34480-864b217f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34480&amp;severity=null&amp;id=6957f5e6db813ff03ef50fe2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34479-5f87f8bd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34479&amp;severity=null&amp;id=6957f5e6db813ff03ef50fe0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34478-0c95354c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34478&amp;severity=null&amp;id=6957f5e6db813ff03ef50fde</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34477-6ce1d6dd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34477&amp;severity=null&amp;id=6957f5e5db813ff03ef50fd2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34476-034c1330</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34476&amp;severity=null&amp;id=6957f5e5db813ff03ef50fd0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34475-2d735aa9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34475&amp;severity=null&amp;id=6957f5e5db813ff03ef50fce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34474-265bf185</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34474&amp;severity=null&amp;id=6957f5e5db813ff03ef50fcc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34473-f171f34b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34473&amp;severity=null&amp;id=6957f5e5db813ff03ef50fca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34472-18a2566f</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34472&amp;severity=null&amp;id=6957f5e5db813ff03ef50fc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34471-009fd8b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34471&amp;severity=null&amp;id=6957f5e5db813ff03ef50fc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34470-09e0ea2e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34470&amp;severity=null&amp;id=6957f5e5db813ff03ef50fc4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34466-278f3543</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34466&amp;severity=null&amp;id=6957f5e5db813ff03ef50fc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34465-f8fefe30</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34465&amp;severity=null&amp;id=6957f5e5db813ff03ef50fc0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34464-0772c045</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34464&amp;severity=null&amp;id=6957f5e5db813ff03ef50fb4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34463-b40b9b25</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34463&amp;severity=null&amp;id=6957f5e5db813ff03ef50fb2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34462-1f710dd3</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34462&amp;severity=null&amp;id=6957f5e5db813ff03ef50fb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34461-b2f76073</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34461&amp;severity=null&amp;id=6957f5e5db813ff03ef50fae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34460-f9e2bdc4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34460&amp;severity=null&amp;id=6957f5e5db813ff03ef50fac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34459-1a5cd84b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34459&amp;severity=null&amp;id=6957f5e5db813ff03ef50faa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34456-5b55f7c2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34456&amp;severity=null&amp;id=6957f5e5db813ff03ef50fa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34455-8d5813d6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34455&amp;severity=null&amp;id=6957f5e5db813ff03ef50fa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34454-60603dcd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34454&amp;severity=null&amp;id=6957f5e5db813ff03ef50fa4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34453-90646e8a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34453&amp;severity=null&amp;id=6957f5e5db813ff03ef50fa2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34448-dad3c66e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34448&amp;severity=null&amp;id=6957f5e3db813ff03ef50f89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34447-7ae0ee67</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34447&amp;severity=null&amp;id=6957f5e3db813ff03ef50f87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34446-ff779fa7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34446&amp;severity=null&amp;id=6957f5e3db813ff03ef50f85</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34445-644edad1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34445&amp;severity=null&amp;id=6957f5e3db813ff03ef50f83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34444-1842efb6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34444&amp;severity=null&amp;id=6957f5e3db813ff03ef50f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34443-e237625c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34443&amp;severity=null&amp;id=6957f5e3db813ff03ef50f7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34432-7b671f85</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34432&amp;severity=null&amp;id=6957f5e3db813ff03ef50f7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34431-38414625</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34431&amp;severity=null&amp;id=6957f5e3db813ff03ef50f7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34426-ce838809</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34426&amp;severity=null&amp;id=6957f5e3db813ff03ef50f79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34415-f884632f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34415&amp;severity=null&amp;id=6957f5e3db813ff03ef50f77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34405-6c57d6de</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34405&amp;severity=null&amp;id=6957f5e2db813ff03ef50f4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34391-2a3c6b60</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34391&amp;severity=null&amp;id=6957f5e2db813ff03ef50f49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34390-76fd2baa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34390&amp;severity=null&amp;id=6957f5e2db813ff03ef50f47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34389-8089c4e6</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34389&amp;severity=null&amp;id=6957f5e2db813ff03ef50f45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34388-9a09b5c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34388&amp;severity=null&amp;id=6957f5e2db813ff03ef50f43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34387-91f6a66e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34387&amp;severity=null&amp;id=6957f5e2db813ff03ef50f3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34386-c2ddf65e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34386&amp;severity=null&amp;id=6957f5e2db813ff03ef50f3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34385-c4c27e0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34385&amp;severity=null&amp;id=6957f5e2db813ff03ef50f39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34384-65046ca4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34384&amp;severity=null&amp;id=6957f5e2db813ff03ef50f37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34383-ac198229</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34383&amp;severity=null&amp;id=6957f5e2db813ff03ef50f35</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34382-880f7279</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34382&amp;severity=null&amp;id=6957f5e1db813ff03ef50f20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34381-44233661</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34381&amp;severity=null&amp;id=6957f5e1db813ff03ef50f1e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34380-6df245ef</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34380&amp;severity=null&amp;id=6957f5e1db813ff03ef50f1c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34379-6855afb2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34379&amp;severity=null&amp;id=6957f5e1db813ff03ef50f1a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34378-61187296</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34378&amp;severity=null&amp;id=6957f5e1db813ff03ef50f18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34377-ec46861c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34377&amp;severity=null&amp;id=6957f5e1db813ff03ef50f16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34376-89031b97</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34376&amp;severity=null&amp;id=6957f5e1db813ff03ef50f14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34375-ea3881c7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34375&amp;severity=null&amp;id=6957f5e1db813ff03ef50f12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34374-247d4aa0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34374&amp;severity=null&amp;id=6957f5e1db813ff03ef50f10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34373-94fb3ba6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34373&amp;severity=null&amp;id=6957f5e1db813ff03ef50f0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34372-078f7a66</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34372&amp;severity=null&amp;id=6957f5e0db813ff03ef50d83</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34371-a4516ec2</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34371&amp;severity=null&amp;id=6957f5e0db813ff03ef50d81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34370-a3e221c5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34370&amp;severity=null&amp;id=6957f5e0db813ff03ef50d7f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34369-35481734</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34369&amp;severity=null&amp;id=6957f5e0db813ff03ef50d7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34368-dca46a7d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34368&amp;severity=null&amp;id=6957f5e0db813ff03ef50d7b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34367-46dcd12b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34367&amp;severity=null&amp;id=6957f5e0db813ff03ef50d79</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34366-7540ac1e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34366&amp;severity=null&amp;id=6957f5e0db813ff03ef50d77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34365-c186c44c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34365&amp;severity=null&amp;id=6957f5e0db813ff03ef50d75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34364-46744214</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34364&amp;severity=null&amp;id=6957f5e0db813ff03ef50d73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34363-ce54000d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34363&amp;severity=null&amp;id=6957f5e0db813ff03ef50d71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34362-e9c396ca</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34362&amp;severity=null&amp;id=6957f5e0db813ff03ef50d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34361-65024bcd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34361&amp;severity=null&amp;id=6957f5e0db813ff03ef50d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34360-220ea3b1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34360&amp;severity=null&amp;id=6957f5e0db813ff03ef50d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34359-90498304</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34359&amp;severity=null&amp;id=6957f5e0db813ff03ef50d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34358-5721b5b6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34358&amp;severity=null&amp;id=6957f5e0db813ff03ef50d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34357-6ffaad15</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34357&amp;severity=null&amp;id=6957f5e0db813ff03ef50d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34356-93727472</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34356&amp;severity=null&amp;id=6957f5e0db813ff03ef50d41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34355-7888a025</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34355&amp;severity=null&amp;id=6957f5e0db813ff03ef50d3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34354-ea29b81f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34354&amp;severity=null&amp;id=6957f5e0db813ff03ef50d3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34353-d5e9b42a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34353&amp;severity=null&amp;id=6957f5e0db813ff03ef50d3b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34349-43cd3513</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34349&amp;severity=null&amp;id=6957f5dedb813ff03ef50d03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34348-19918748</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34348&amp;severity=null&amp;id=6957f5dedb813ff03ef50d01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34347-ecb277b6</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34347&amp;severity=null&amp;id=6957f5dedb813ff03ef50cff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34346-e1c9f67a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34346&amp;severity=null&amp;id=6957f5dedb813ff03ef50cfd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34345-e3547075</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34345&amp;severity=null&amp;id=6957f5dedb813ff03ef50cfb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34344-a1a7d855</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34344&amp;severity=null&amp;id=6957f5dedb813ff03ef50cf9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34343-8ee9e9a5</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34343&amp;severity=null&amp;id=6957f5dedb813ff03ef50cf7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34342-99144938</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34342&amp;severity=null&amp;id=6957f5dedb813ff03ef50cf5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34341-3e30d48f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34341&amp;severity=null&amp;id=6957f5dedb813ff03ef50cf3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34340-17c80f9c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34340&amp;severity=null&amp;id=6957f5dedb813ff03ef50cf1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34339-2bc7f35e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34339&amp;severity=null&amp;id=6957f5dddb813ff03ef50cd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34338-6e52cafc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34338&amp;severity=null&amp;id=6957f5dddb813ff03ef50cd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34327-68f5557a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34327&amp;severity=null&amp;id=6957f5dddb813ff03ef50cd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34326-bcc70f9f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34326&amp;severity=null&amp;id=6957f5dddb813ff03ef50cd3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34325-e1047edf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34325&amp;severity=null&amp;id=6957f5dddb813ff03ef50cd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34321-5efdc73c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34321&amp;severity=null&amp;id=6957f5dddb813ff03ef50ccf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34296-6e0b923f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34296&amp;severity=null&amp;id=6957f5dddb813ff03ef50ccd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34295-0470433c</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34295&amp;severity=null&amp;id=6957f5dddb813ff03ef50ccb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34289-36cf8f31</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34289&amp;severity=null&amp;id=6957f5dddb813ff03ef50cc9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34285-bf7e80e2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34285&amp;severity=null&amp;id=6957f5dddb813ff03ef50cc7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34279-560bbf21</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34279&amp;severity=null&amp;id=6957f5dddb813ff03ef50cae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34276-63986e8a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34276&amp;severity=null&amp;id=6957f5dddb813ff03ef50cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34275-30b3591b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34275&amp;severity=null&amp;id=6957f5dddb813ff03ef50ca4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34268-b24ed39b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34268&amp;severity=null&amp;id=6957f5dddb813ff03ef50ca1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34250-791010e7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34250&amp;severity=null&amp;id=6957f5dddb813ff03ef50c9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34219-3c489913</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34219&amp;severity=null&amp;id=6957f5dddb813ff03ef50c9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34214-6c913155</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34214&amp;severity=null&amp;id=6957f5dddb813ff03ef50c9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34213-7a0469c1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34213&amp;severity=null&amp;id=6957f5dddb813ff03ef50c98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34170-c94bc8dd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34170&amp;severity=null&amp;id=6957f5dddb813ff03ef50c94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34169-ded34aa8</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34169&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c5b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34168-1e3d1735</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34168&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c59</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34167-c90bc01a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34167&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c57</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34166-4d957506</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34166&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c55</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34145-a985b037</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34145&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34144-1d827dfa</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34144&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34137-726593b6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34137&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34131-d2d21eb0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34131&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34122-6d5065a9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34122&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-34094-74ca5c9b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-34094&amp;severity=null&amp;id=6957f5dcdb813ff03ef50c49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22203-3182a46a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22203&amp;severity=null&amp;id=6955c34ddb813ff03e109856</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22202-2a534e42</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22202&amp;severity=null&amp;id=6955c34ddb813ff03e109854</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22201-36d7a3c4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22201&amp;severity=null&amp;id=6955c34ddb813ff03e109852</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22200-b7a896dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22200&amp;severity=null&amp;id=6955c34ddb813ff03e109850</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22199-11d29927</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22199&amp;severity=null&amp;id=6955c34ddb813ff03e10984e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22198-ae5219f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22198&amp;severity=null&amp;id=6955c34ddb813ff03e10984c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22197-08a89899</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22197&amp;severity=null&amp;id=6955c34cdb813ff03e109820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22196-1f576fef</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22196&amp;severity=null&amp;id=6955c34cdb813ff03e10981e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22195-7b781547</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22195&amp;severity=null&amp;id=6955c34cdb813ff03e10981c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22194-6fbfbdfb</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22194&amp;severity=null&amp;id=6955c34cdb813ff03e10981a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22193-bf13c16f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22193&amp;severity=null&amp;id=6955c34cdb813ff03e109818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22192-cdfa29ec</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22192&amp;severity=null&amp;id=6955c34cdb813ff03e109816</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22191-4136b75d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22191&amp;severity=null&amp;id=6955c34cdb813ff03e109814</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22190-15503c8c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22190&amp;severity=null&amp;id=6955c34cdb813ff03e109812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22189-aef3fed9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22189&amp;severity=null&amp;id=6955c34cdb813ff03e109810</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22188-d2bf429f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22188&amp;severity=null&amp;id=6955c34cdb813ff03e10980e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22187-6e087e6b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22187&amp;severity=null&amp;id=6955c34bdb813ff03e1097f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22186-522cd3cb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22186&amp;severity=null&amp;id=6955c34bdb813ff03e1097f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22185-10c95182</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22185&amp;severity=null&amp;id=6955c34bdb813ff03e1097f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22184-37d4881c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22184&amp;severity=null&amp;id=6955c34bdb813ff03e1097f3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22183-81160ab9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22183&amp;severity=null&amp;id=6955c34bdb813ff03e1097f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22182-9508fde0</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22182&amp;severity=null&amp;id=6955c34bdb813ff03e1097ef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22181-584ad170</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22181&amp;severity=null&amp;id=6955c34bdb813ff03e1097ed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22180-7b2be2dd</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22180&amp;severity=null&amp;id=6955c34bdb813ff03e1097eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22155-b6d0f4a7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22155&amp;severity=null&amp;id=6955c34bdb813ff03e1097e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22154-dadb20e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22154&amp;severity=null&amp;id=6955c34bdb813ff03e1097e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58247-278af3f2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58247&amp;severity=null&amp;id=695450aedb813ff03e2bec22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58246-55fcaf41</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58246&amp;severity=null&amp;id=695450addb813ff03e2bec16</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58245-f353ef36</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58245&amp;severity=null&amp;id=695450addb813ff03e2bec14</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58244-35a4fe37</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58244&amp;severity=null&amp;id=695450addb813ff03e2bec12</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58243-c1cc38e1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58243&amp;severity=null&amp;id=695450addb813ff03e2bec10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-58242-3758b4f3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-58242&amp;severity=null&amp;id=695450addb813ff03e2bec0e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14820-cb96afb7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14820&amp;severity=null&amp;id=694dbd6a2ae90972ac62d824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14715-510295df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14715&amp;severity=null&amp;id=694dbd6a2ae90972ac62d822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5448-abd1613d</loc>
    <lastmod>2026-03-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5448&amp;severity=null&amp;id=694bea1c279c98bf57f751e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68695-18949631</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68695&amp;severity=null&amp;id=694b68d6ce42f4d6d9807eb6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68694-1f461554</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68694&amp;severity=null&amp;id=694b68d6ce42f4d6d9807eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68693-02896d38</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68693&amp;severity=null&amp;id=694b68d6ce42f4d6d9807eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68692-d662c65c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68692&amp;severity=null&amp;id=694b68d6ce42f4d6d9807eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68691-e9d557e7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68691&amp;severity=null&amp;id=694b68d6ce42f4d6d9807ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68690-48482f7d</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68690&amp;severity=null&amp;id=694b68d6ce42f4d6d9807eab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68689-a45cc89c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68689&amp;severity=null&amp;id=694b68d6ce42f4d6d9807ea9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68688-5eb79f53</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68688&amp;severity=null&amp;id=694b68d6ce42f4d6d9807ea7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68687-5711e72a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68687&amp;severity=null&amp;id=694b68d6ce42f4d6d9807ea5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10863-e799cb60</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10863&amp;severity=null&amp;id=694ae2e73b03476441d46859</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13074-0899ec2f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13074&amp;severity=null&amp;id=694ad5522a62208f8b311891</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48864-6ddec6b5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48864&amp;severity=null&amp;id=694abdbbe971240e2a7c28e5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48863-d78e3ec6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48863&amp;severity=null&amp;id=694abdbae971240e2a7c28e3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-10398-025982a1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-10398&amp;severity=null&amp;id=694ab6b2e971240e2a747efd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5094-29883b35</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5094&amp;severity=null&amp;id=694aa1c2a6db0d9209e49588</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5093-6c19702a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5093&amp;severity=null&amp;id=694aa1c2a6db0d9209e49586</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-5092-45e78ada</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-5092&amp;severity=null&amp;id=694aa1c2a6db0d9209e49584</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68655-1ba48aba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68655&amp;severity=null&amp;id=694a17593b5cae87d6de2a49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68654-b055ee55</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68654&amp;severity=null&amp;id=694a17593b5cae87d6de2a47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68653-cf317cfc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68653&amp;severity=null&amp;id=694a17593b5cae87d6de2a45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68652-cc1df390</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68652&amp;severity=null&amp;id=694a17593b5cae87d6de2a43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68651-969fdf69</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68651&amp;severity=null&amp;id=694a17593b5cae87d6de2a41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68650-7f4f989e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68650&amp;severity=null&amp;id=694a17593b5cae87d6de2a3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14597-40580aea</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14597&amp;severity=null&amp;id=694722f36364f0d3b54c9dd4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12700-e7475596</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12700&amp;severity=null&amp;id=694722f36364f0d3b54c9dd1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67047-8325e7a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67047&amp;severity=null&amp;id=694579a3133fda1465c274e0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67045-9cc68e98</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67045&amp;severity=null&amp;id=694579a3133fda1465c274de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67044-8b486845</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67044&amp;severity=null&amp;id=694579a3133fda1465c274dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67043-2bcdead7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67043&amp;severity=null&amp;id=694579a3133fda1465c274da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67046-ebca84a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67046&amp;severity=null&amp;id=694579a3133fda1465c274bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67048-6883248f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67048&amp;severity=null&amp;id=69457615133fda1465bcd186</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68491-db08dcbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68491&amp;severity=low&amp;id=6944d15f19341fe188822477</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68490-2af88a42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68490&amp;severity=low&amp;id=6944d15919341fe18882234f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68488-b87db27d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68488&amp;severity=low&amp;id=6944d15919341fe18882234b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68487-84130d23</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68487&amp;severity=low&amp;id=6944d15919341fe188822348</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68486-1605fc43</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68486&amp;severity=low&amp;id=6944d15919341fe188822345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68485-b658f28b</loc>
    <lastmod>2026-03-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68485&amp;severity=null&amp;id=6944d15919341fe188822342</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68484-9094676c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68484&amp;severity=null&amp;id=6944d15919341fe188822340</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-68483-ebf34b0c</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-68483&amp;severity=null&amp;id=6944d15919341fe18882233d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14319-3135d616</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14319&amp;severity=null&amp;id=69432efa058703ef3fc97f36</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14268-c6744a3c</loc>
    <lastmod>2026-03-07</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14268&amp;severity=null&amp;id=69432efa058703ef3fc97f34</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14828-0449fe27</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14828&amp;severity=null&amp;id=6942f571847f7e98df00bfcd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0852-0b413809</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0852&amp;severity=null&amp;id=6941d344b8ff87d8f93c7335</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13832-a492086c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13832&amp;severity=null&amp;id=693deb5384bd9e3966ba67d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67871-ae7dd1dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67871&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67870-32a92aae</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67870&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3d0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67869-3de2ffad</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67869&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3ce</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67868-63ccba57</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67868&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3cc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67867-a1c58597</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67867&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3ca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67866-2d46fea0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67866&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3c8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67865-d5f2f8e1</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67865&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67864-efe62810</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67864&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3c4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67863-bb9f2f20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67863&amp;severity=null&amp;id=693ce44d7c4acd10e84ee3c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14066-c9db4d9c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14066&amp;severity=low&amp;id=693c99885292e65bc6167f6c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12532-e603669c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12532&amp;severity=null&amp;id=693b21637d4c6f31f7c352e9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14281-720380f1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14281&amp;severity=null&amp;id=693b16cc7d4c6f31f7c0f207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67694-7f67affe</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67694&amp;severity=null&amp;id=693a4fe64e6a51a16e760085</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67693-0f2e8603</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67693&amp;severity=null&amp;id=693a4fe64e6a51a16e760083</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67692-21af886a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67692&amp;severity=null&amp;id=693a4fe64e6a51a16e760081</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67691-2f983d47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67691&amp;severity=null&amp;id=693a4fe64e6a51a16e76007f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67690-771d6481</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67690&amp;severity=null&amp;id=693a4fe64e6a51a16e76007d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67689-33765dc7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67689&amp;severity=null&amp;id=693a4fe64e6a51a16e76007b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67688-b3b2de55</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67688&amp;severity=null&amp;id=693a4fe64e6a51a16e760079</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67687-222d8fb2</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67687&amp;severity=null&amp;id=693a4fe64e6a51a16e760077</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67686-4ce82e7a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67686&amp;severity=null&amp;id=693a4fe64e6a51a16e760075</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67514-a483e3fc</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67514&amp;severity=low&amp;id=693a048be425ca5072d90c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67512-578b3dd4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67512&amp;severity=low&amp;id=693a048be425ca5072d90c56</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13923-9a83ed68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13923&amp;severity=low&amp;id=6939f4c87cb4621ebe93c162</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12731-7f8c1d8a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12731&amp;severity=low&amp;id=6939f4c87cb4621ebe93c160</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67613-bccf01cf</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67613&amp;severity=null&amp;id=6938f1ec422a156f19325937</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67612-538596be</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67612&amp;severity=null&amp;id=6938f1ec422a156f19325935</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67611-e62c2fbb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67611&amp;severity=null&amp;id=6938f1ec422a156f19325933</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67610-08b2b117</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67610&amp;severity=null&amp;id=6938f1ec422a156f19325931</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67609-8a713cb6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67609&amp;severity=null&amp;id=6938f1ec422a156f1932592f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67608-212e39cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67608&amp;severity=null&amp;id=6938f1ec422a156f1932592d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67607-fe7e4681</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67607&amp;severity=null&amp;id=6938f1ec422a156f1932592b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67606-39b5d3e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67606&amp;severity=null&amp;id=6938f1ec422a156f19325929</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67605-a4eb6681</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67605&amp;severity=null&amp;id=6938f1ec422a156f19325927</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67503-4107f696</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67503&amp;severity=low&amp;id=6938ba667205ca471f06f8b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67498-87a3c8ea</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67498&amp;severity=null&amp;id=6938ab56b56b439e93e2f6cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-67497-c3885aaa</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-67497&amp;severity=null&amp;id=6938a95ab56b439e93e1dcbf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13760-4344f342</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13760&amp;severity=null&amp;id=6938a349d4eb7e5ad7812ad3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66649-ad13aa45</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66649&amp;severity=null&amp;id=69379c1c0af42da4c573d32f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66544-be33288c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66544&amp;severity=null&amp;id=693258dff88dbe026c65428f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66543-218d5f72</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66543&amp;severity=null&amp;id=693258dff88dbe026c65428d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66542-17f418dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66542&amp;severity=null&amp;id=693258dff88dbe026c65428b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66541-0c7b826f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66541&amp;severity=null&amp;id=693258dff88dbe026c654289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66540-02b54c40</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66540&amp;severity=null&amp;id=693258dff88dbe026c654287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66539-15d079f8</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66539&amp;severity=null&amp;id=693258dff88dbe026c654285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66538-d479276b</loc>
    <lastmod>2026-02-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66538&amp;severity=null&amp;id=693258dff88dbe026c654283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66537-fd06df03</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66537&amp;severity=null&amp;id=693258dff88dbe026c654281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66536-0d4c05c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66536&amp;severity=null&amp;id=693258dff88dbe026c65427f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-14024-ad716371</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-14024&amp;severity=null&amp;id=6931ac46739651d5d523c1c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66478-39fde723</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66478&amp;severity=low&amp;id=693081947d648701e0f83598</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65794-ac0c32d0</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65794&amp;severity=null&amp;id=692dca5195b0bac459490633</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65793-4b9c900e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65793&amp;severity=null&amp;id=692dca5195b0bac459490631</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13338-f925a1ef</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13338&amp;severity=null&amp;id=6928d0cd16aab7063d9032b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3747-da7838ab</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3747&amp;severity=null&amp;id=692723bab6bca73b24276600</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66235-8f8a4296</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66235&amp;severity=null&amp;id=6926892671d0ec656d79b5df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66234-3f7229cb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66234&amp;severity=null&amp;id=6926892671d0ec656d79b5dd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66233-f5a3086e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66233&amp;severity=null&amp;id=6926892671d0ec656d79b5db</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66232-d75c72b6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66232&amp;severity=null&amp;id=6926892671d0ec656d79b5d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66231-27ff707a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66231&amp;severity=null&amp;id=6926892671d0ec656d79b5d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66230-e3bdb434</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66230&amp;severity=null&amp;id=6926892671d0ec656d79b5d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66229-23ed4d0c</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66229&amp;severity=null&amp;id=6926892671d0ec656d79b5d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66228-b987f6f7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66228&amp;severity=null&amp;id=6926892671d0ec656d79b5d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66187-7572b3f8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66187&amp;severity=null&amp;id=69252a29f17e04acaf614185</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66186-1265032c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66186&amp;severity=null&amp;id=69252a29f17e04acaf614183</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66185-8878a1e7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66185&amp;severity=null&amp;id=69252a29f17e04acaf614181</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66184-f844a15e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66184&amp;severity=null&amp;id=69252a29f17e04acaf61417f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66183-be6e8991</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66183&amp;severity=null&amp;id=69252a29f17e04acaf61417d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66182-30bb1bf0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66182&amp;severity=null&amp;id=69252a29f17e04acaf61417b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66181-be52e716</loc>
    <lastmod>2026-03-17</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66181&amp;severity=null&amp;id=69252a29f17e04acaf614179</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66180-ea112c73</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66180&amp;severity=null&amp;id=69252a29f17e04acaf614177</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-66179-c4896495</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-66179&amp;severity=null&amp;id=69252a29f17e04acaf614175</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13594-492a6ccb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13594&amp;severity=low&amp;id=69248a62ea0759ac8b7c8289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13511-19897e20</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13511&amp;severity=null&amp;id=692486e1393b4897c2c72a22</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13541-7ae533d1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13541&amp;severity=null&amp;id=69246f617150efb62b926ec7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13598-1565e8e6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13598&amp;severity=low&amp;id=69246d8d7150efb62b9155c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12759-191f153f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12759&amp;severity=null&amp;id=69238d0dec5d308f09cb6a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13197-15de60bb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13197&amp;severity=null&amp;id=6922473af4ce38b1172af292</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12561-e1afbb36</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12561&amp;severity=null&amp;id=6922473af4ce38b1172af290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12541-15eb73c2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12541&amp;severity=null&amp;id=6922473af4ce38b1172af28e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12678-5d8db315</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12678&amp;severity=null&amp;id=6920e83b27835fd566e79353</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-31405-e0ced101</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-31405&amp;severity=null&amp;id=691f40cfd2e902043d1b7e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4042-071a3a0e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4042&amp;severity=null&amp;id=691e451c7eddc5e777901478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0351-da148077</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0351&amp;severity=null&amp;id=691d946612537358e42c14c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65941-5b8a3c68</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65941&amp;severity=null&amp;id=691d42819140b486bbcf58d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65940-fc25e841</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65940&amp;severity=null&amp;id=691d42819140b486bbcf58cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65939-97adef8c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65939&amp;severity=null&amp;id=691d42819140b486bbcf58cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65938-8b4620b7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65938&amp;severity=null&amp;id=691d42819140b486bbcf58cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65937-6c951664</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65937&amp;severity=null&amp;id=691d42819140b486bbcf58c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65936-73f0df48</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65936&amp;severity=null&amp;id=691d42819140b486bbcf58c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65935-5622fa3a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65935&amp;severity=null&amp;id=691d42819140b486bbcf58c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65934-e01a4772</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65934&amp;severity=null&amp;id=691d42819140b486bbcf58c3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65933-8675f236</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65933&amp;severity=null&amp;id=691d42819140b486bbcf58c1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13216-18c426c9</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13216&amp;severity=null&amp;id=691b6c6ff84694138ddf709c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-13310-e6368c7e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-13310&amp;severity=null&amp;id=691b3a49c14a66f6d6c9eb96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2448-a3782d4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2448&amp;severity=null&amp;id=6918fe5d9d60f4ee0e01c411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65072-a839fcf2</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65072&amp;severity=null&amp;id=6917fb0de04b003fc9a7f76d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65071-d3b4f367</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65071&amp;severity=null&amp;id=6917fb0de04b003fc9a7f76a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65070-5b2db65f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65070&amp;severity=null&amp;id=6917fb0de04b003fc9a7f768</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65069-4629bec6</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65069&amp;severity=null&amp;id=6917fb0de04b003fc9a7f766</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65068-c14fa6e5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65068&amp;severity=null&amp;id=6917fb0de04b003fc9a7f764</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65067-a0c96c2e</loc>
    <lastmod>2026-03-21</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65067&amp;severity=null&amp;id=6917fb0de04b003fc9a7f762</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65066-855ae2f4</loc>
    <lastmod>2026-03-19</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65066&amp;severity=null&amp;id=6917fb0de04b003fc9a7f760</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65065-a720fe78</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65065&amp;severity=null&amp;id=6917fb0de04b003fc9a7f75e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-65064-ec41050f</loc>
    <lastmod>2026-03-22</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-65064&amp;severity=null&amp;id=6917fb0de04b003fc9a7f75c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12187-1069f2ec</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12187&amp;severity=null&amp;id=69177ea4901ba91f3226fd4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12897-34c4c777</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12897&amp;severity=null&amp;id=691763c61dec7bb205e65287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12703-a910c150</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12703&amp;severity=null&amp;id=691509abe6b3e50d509f11b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12068-c94f4fb6</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12068&amp;severity=null&amp;id=6914b570be619665a23e09e7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12152-00849dcb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12152&amp;severity=null&amp;id=6914a8db224357dd22ebe354</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12542-e2d912e8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12542&amp;severity=null&amp;id=6912671f6b3b7718db03f35c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8768-f55f8257</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8768&amp;severity=low&amp;id=691201ac500a810dcc166d05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12858-67db3a8b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12858&amp;severity=null&amp;id=690e35acf29beb96f88f84a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64480-0e9a7301</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64480&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64479-95720d99</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64479&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64478-2a7c3862</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64478&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64477-efa1c895</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64477&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64476-49c8a520</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64476&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f72</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64475-8f544fd0</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64475&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64474-de40c92d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64474&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64473-d03629c8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64473&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64472-bf488b6d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64472&amp;severity=null&amp;id=690c1cd4fd0d6d2264860f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64455-00b2ed93</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64455&amp;severity=null&amp;id=690ad3b544b7a50adea67583</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64454-df2f222f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64454&amp;severity=null&amp;id=690ad3b544b7a50adea67581</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64453-431c65a3</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64453&amp;severity=null&amp;id=690ad3b544b7a50adea6757f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64452-00f67dc9</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64452&amp;severity=null&amp;id=690ad3b544b7a50adea6757d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64451-60d8d359</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64451&amp;severity=null&amp;id=690ad3b544b7a50adea6757b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64450-491072a8</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64450&amp;severity=null&amp;id=690ad3b544b7a50adea67579</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64449-46e2d43f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64449&amp;severity=null&amp;id=690ad3b544b7a50adea67577</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64448-e9528581</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64448&amp;severity=null&amp;id=690ad3b544b7a50adea67575</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-45959-20bcda2c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-45959&amp;severity=null&amp;id=6908e5311c2a0078ae46cecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11428-814cd924</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11428&amp;severity=null&amp;id=69029404f29b216d6d5e20a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-35980-654baa48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-35980&amp;severity=null&amp;id=6902561b52c03fa7b6e5bf08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39178-1952e505</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39178&amp;severity=null&amp;id=690204553aaa02566521b56d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-39177-6b3286ed</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-39177&amp;severity=null&amp;id=690204523aaa02566521b4f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64162-5985fe69</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64162&amp;severity=null&amp;id=690192dc28becc2dd67c3225</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64161-210f5598</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64161&amp;severity=null&amp;id=690192dc28becc2dd67c3223</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64160-557f6f55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64160&amp;severity=null&amp;id=690192dc28becc2dd67c3221</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64159-4d28c050</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64159&amp;severity=null&amp;id=690192dc28becc2dd67c321f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-64158-17919b74</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-64158&amp;severity=null&amp;id=690192dc28becc2dd67c321d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62830-267fcc3f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62830&amp;severity=null&amp;id=68fafb658e2fb0119d5c362e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62835-4ba4b2db</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62835&amp;severity=null&amp;id=68faf00000e9e97283b85b09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62834-886282a5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62834&amp;severity=null&amp;id=68faf00000e9e97283b85b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62833-bc8ba4fc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62833&amp;severity=null&amp;id=68faf00000e9e97283b85b05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62832-455d4ded</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62832&amp;severity=null&amp;id=68faf00000e9e97283b85b03</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62831-682aed78</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62831&amp;severity=null&amp;id=68faf00000e9e97283b85b01</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62829-11a2b739</loc>
    <lastmod>2026-03-14</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62829&amp;severity=null&amp;id=68faf00000e9e97283b85afd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62828-200efdcb</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62828&amp;severity=null&amp;id=68faf00000e9e97283b85afb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62827-36bf9d66</loc>
    <lastmod>2026-03-20</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62827&amp;severity=null&amp;id=68faf00000e9e97283b85af9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-14011-fbf1b14b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-14011&amp;severity=null&amp;id=68fa18a8fd7c94938ae69a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62812-14d8d407</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62812&amp;severity=null&amp;id=68f99d2993bcde9f3212eac5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62811-4087d3be</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62811&amp;severity=null&amp;id=68f99d2993bcde9f3212eac3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62810-3f72f0c1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62810&amp;severity=null&amp;id=68f99d2993bcde9f3212eac1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62809-00f45488</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62809&amp;severity=null&amp;id=68f99d2993bcde9f3212eabf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62808-1dd0c459</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62808&amp;severity=null&amp;id=68f99d2993bcde9f3212eabd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62807-7f7f7c26</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62807&amp;severity=null&amp;id=68f99d2993bcde9f3212eabb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62806-88b4b8fe</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62806&amp;severity=null&amp;id=68f99d2993bcde9f3212eab9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62805-c8179154</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62805&amp;severity=null&amp;id=68f99d2993bcde9f3212eab7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62804-00021fcf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62804&amp;severity=null&amp;id=68f99d2993bcde9f3212eab5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-12024-1c6ff7a1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-12024&amp;severity=null&amp;id=68f7abc9a08cdec95072fec0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62684-d7244f81</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62684&amp;severity=null&amp;id=68f700219836439558d21aaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62683-2541c1b8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62683&amp;severity=null&amp;id=68f700219836439558d21aad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62682-8288874d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62682&amp;severity=null&amp;id=68f700219836439558d21aab</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62681-7532371f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62681&amp;severity=null&amp;id=68f700219836439558d21aa8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62680-23de1d7f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62680&amp;severity=null&amp;id=68f700219836439558d21aa6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62679-a7dc42a5</loc>
    <lastmod>2026-03-13</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62679&amp;severity=null&amp;id=68f700219836439558d21aa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62678-9b8b0f48</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62678&amp;severity=null&amp;id=68f700219836439558d21aa0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62677-b5fbeabc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62677&amp;severity=null&amp;id=68f700219836439558d21a9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62640-eff2e013</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62640&amp;severity=null&amp;id=68f303229c34d0947f6bc8a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62639-886f5fde</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62639&amp;severity=null&amp;id=68f303229c34d0947f6bc8a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62638-9d56bf91</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62638&amp;severity=null&amp;id=68f303229c34d0947f6bc8a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62637-22ca3d34</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62637&amp;severity=null&amp;id=68f303229c34d0947f6bc8a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62636-69d098dd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62636&amp;severity=null&amp;id=68f303229c34d0947f6bc8a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62635-2c17a05b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62635&amp;severity=null&amp;id=68f303229c34d0947f6bc89e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62634-2f909c0a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62634&amp;severity=null&amp;id=68f303229c34d0947f6bc89c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62633-282f877b</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62633&amp;severity=null&amp;id=68f303229c34d0947f6bc89a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62632-0d2d09de</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62632&amp;severity=null&amp;id=68f303229c34d0947f6bc898</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-11854-ca56365c</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-11854&amp;severity=null&amp;id=68f124619f8a5dbaeaea87bd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62448-716cbb53</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62448&amp;severity=null&amp;id=68ef135055734f1608edf1f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62447-a8bdbe07</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62447&amp;severity=null&amp;id=68ef135055734f1608edf1f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62446-1bea6d58</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62446&amp;severity=null&amp;id=68ef135055734f1608edf1f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62445-ac217fc4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62445&amp;severity=null&amp;id=68ef135055734f1608edf1f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62444-394bed9c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62444&amp;severity=null&amp;id=68ef135055734f1608edf1f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62443-afc859bc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62443&amp;severity=null&amp;id=68ef135055734f1608edf1ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62442-018c7a51</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62442&amp;severity=null&amp;id=68ef135055734f1608edf1ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62441-db3a88eb</loc>
    <lastmod>2026-03-12</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62441&amp;severity=null&amp;id=68ef135055734f1608edf1ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-62440-a275b653</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-62440&amp;severity=null&amp;id=68ef135055734f1608edf1e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-6211-c87f0faf</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-6211&amp;severity=null&amp;id=68ed69b338344d8bcf2b159d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6046-7b2f5900</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6046&amp;severity=null&amp;id=68e5948ca677756fc9a47c70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10904-b4d69fb3</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10904&amp;severity=null&amp;id=68e5948ca677756fc9a47c6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61895-36296239</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61895&amp;severity=null&amp;id=68e0920511971642e85b87a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61894-1fec2cbe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61894&amp;severity=null&amp;id=68e0920411971642e85b878f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61893-1cae7d4f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61893&amp;severity=null&amp;id=68e0920411971642e85b878d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61892-e13ae2c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61892&amp;severity=null&amp;id=68e0920411971642e85b878b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61891-03a8bce7</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61891&amp;severity=null&amp;id=68e0920411971642e85b8789</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61890-9373f395</loc>
    <lastmod>2026-03-10</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61890&amp;severity=null&amp;id=68e0920411971642e85b8787</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61889-12623a4d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61889&amp;severity=null&amp;id=68e0920411971642e85b8785</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61888-847cc83a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61888&amp;severity=null&amp;id=68e0920411971642e85b8783</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61887-5f522aa2</loc>
    <lastmod>2026-03-16</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61887&amp;severity=null&amp;id=68e0920411971642e85b8781</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61585-a3be5acf</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61585&amp;severity=null&amp;id=68e03c1df54fee41816a7519</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61671-301b4a95</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61671&amp;severity=null&amp;id=68df70b3322c599a48f0ae67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61847-7be56ca2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61847&amp;severity=null&amp;id=68df3d250005234f78fa9fe8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10895-eac82b48</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10895&amp;severity=null&amp;id=68defd1d9f0d2292f9acace2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61855-6637d12a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61855&amp;severity=null&amp;id=68ddeb97107aa30f08674c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61854-dcffea62</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61854&amp;severity=null&amp;id=68ddeb97107aa30f08674c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61853-811e40b5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61853&amp;severity=null&amp;id=68ddeb97107aa30f08674c60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61852-ba57ef7f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61852&amp;severity=null&amp;id=68ddeb97107aa30f08674c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61851-aa7c8342</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61851&amp;severity=null&amp;id=68ddeb97107aa30f08674c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61850-cd02a158</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61850&amp;severity=null&amp;id=68ddeb97107aa30f08674c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61849-0ed04c2c</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61849&amp;severity=null&amp;id=68ddeb97107aa30f08674c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61722-1fb9119e</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61722&amp;severity=null&amp;id=68ddc315107aa30f08655c5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61721-e2cd53da</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61721&amp;severity=null&amp;id=68ddc315107aa30f08655c5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61720-dee96dd3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61720&amp;severity=null&amp;id=68ddc315107aa30f08655c5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61719-f940268a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61719&amp;severity=null&amp;id=68ddc315107aa30f08655c58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61718-3d2589a1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61718&amp;severity=null&amp;id=68ddc314107aa30f08655c4c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61717-a879e9d8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61717&amp;severity=null&amp;id=68ddc314107aa30f08655c4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61716-be1cfe75</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61716&amp;severity=null&amp;id=68ddc314107aa30f08655c48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61715-7bb8db17</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61715&amp;severity=null&amp;id=68ddc314107aa30f08655c46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61714-e5402476</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61714&amp;severity=null&amp;id=68ddc314107aa30f08655c44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61596-c0354580</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61596&amp;severity=null&amp;id=68dd5ef5ebdfe95d2e1694dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61633-bdc40954</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61633&amp;severity=null&amp;id=68db4ba5a473ffe031e40754</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61632-326972f2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61632&amp;severity=null&amp;id=68db4ba5a473ffe031e40752</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61631-d3cbebeb</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61631&amp;severity=null&amp;id=68db4ba5a473ffe031e40750</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61630-2ec3c536</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61630&amp;severity=null&amp;id=68db4ba5a473ffe031e4074e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61629-b635a2f0</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61629&amp;severity=null&amp;id=68db4ba5a473ffe031e4074c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61628-8ca23991</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61628&amp;severity=null&amp;id=68db4ba5a473ffe031e4074a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61627-d1aad9ea</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61627&amp;severity=null&amp;id=68db4ba5a473ffe031e40748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-61626-40564cfd</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-61626&amp;severity=null&amp;id=68db4ba5a473ffe031e40746</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50879-71e509b8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50879&amp;severity=null&amp;id=68d6f394e3653e42a7283e39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60033-dacee671</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60033&amp;severity=null&amp;id=68d6062c9e21be37e93acc53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60032-6d2d3393</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60032&amp;severity=null&amp;id=68d6062c9e21be37e93acc51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60031-a5817b4e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60031&amp;severity=null&amp;id=68d6062c9e21be37e93acc4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60030-932a4ecc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60030&amp;severity=null&amp;id=68d6062c9e21be37e93acc4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60029-b5909b95</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60029&amp;severity=null&amp;id=68d6062c9e21be37e93acc4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60028-a1e5bf2d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60028&amp;severity=null&amp;id=68d6062c9e21be37e93acc49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60027-040bb9f5</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60027&amp;severity=null&amp;id=68d6062c9e21be37e93acc47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-60026-2ccfa3d8</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-60026&amp;severity=null&amp;id=68d6062c9e21be37e93acc45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59930-06feabf2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59930&amp;severity=null&amp;id=68d362cd712f26b964d0cd21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59929-fbf4e1b9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59929&amp;severity=null&amp;id=68d362cd712f26b964d0cd1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59928-3ad4eb1b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59928&amp;severity=null&amp;id=68d362cd712f26b964d0cd1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59927-337eba65</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59927&amp;severity=null&amp;id=68d362cd712f26b964d0cd1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59926-7517004a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59926&amp;severity=null&amp;id=68d362cd712f26b964d0cd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59925-40006c30</loc>
    <lastmod>2026-03-09</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59925&amp;severity=null&amp;id=68d362cd712f26b964d0cd17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59924-8891e66a</loc>
    <lastmod>2026-03-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59924&amp;severity=null&amp;id=68d362cd712f26b964d0cd15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-9197-a951e7f8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-9197&amp;severity=null&amp;id=68d2e0155bd4b74a8e69d450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59885-7fffdeda</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59885&amp;severity=null&amp;id=68d20e31efb46fd0305d8b69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59884-9449efa3</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59884&amp;severity=null&amp;id=68d20e31efb46fd0305d8b67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59883-71b7b007</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59883&amp;severity=null&amp;id=68d20e31efb46fd0305d8b65</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59882-5b760792</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59882&amp;severity=null&amp;id=68d20e31efb46fd0305d8b63</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59881-eed992fd</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59881&amp;severity=null&amp;id=68d20e31efb46fd0305d8b4a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59880-25c72179</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59880&amp;severity=null&amp;id=68d20e31efb46fd0305d8b48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59879-86a6eeba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59879&amp;severity=null&amp;id=68d20e31efb46fd0305d8b46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59878-adfc8ccc</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59878&amp;severity=null&amp;id=68d20e31efb46fd0305d8b44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59877-acaad8b9</loc>
    <lastmod>2026-03-23</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59877&amp;severity=null&amp;id=68d20e31efb46fd0305d8b42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59876-c0f50379</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59876&amp;severity=null&amp;id=68d20e31efb46fd0305d8b40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59813-a04556e2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59813&amp;severity=null&amp;id=68d20e31efb46fd0305d8b3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59812-654a7c99</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59812&amp;severity=null&amp;id=68d20e31efb46fd0305d8b3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59811-882085f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59811&amp;severity=null&amp;id=68d20e31efb46fd0305d8b3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59727-ea8f2967</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59727&amp;severity=null&amp;id=68ce195ac69859ef8baa5eef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59726-92fc2f0a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59726&amp;severity=null&amp;id=68ce195ac69859ef8baa5eed</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59725-e19089ba</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59725&amp;severity=null&amp;id=68ce195ac69859ef8baa5eeb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59724-38cef1c3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59724&amp;severity=null&amp;id=68ce195ac69859ef8baa5ee9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59723-88c8a250</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59723&amp;severity=null&amp;id=68ce195ac69859ef8baa5ee7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59722-e9c73d02</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59722&amp;severity=null&amp;id=68ce195ac69859ef8baa5ee5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59721-42c11582</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59721&amp;severity=null&amp;id=68ce195ac69859ef8baa5ee3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59720-36c3fd34</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59720&amp;severity=null&amp;id=68ce195ac69859ef8baa5ee1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59678-d61a7a3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59678&amp;severity=null&amp;id=68cccb3fca83b36a9f71b209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59677-3e65d656</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59677&amp;severity=null&amp;id=68cccb3fca83b36a9f71b207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59676-c88877e6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59676&amp;severity=null&amp;id=68cccb3fca83b36a9f71b205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59675-a1d48ed9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59675&amp;severity=null&amp;id=68cccb3fca83b36a9f71b203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59674-45629d7b</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59674&amp;severity=null&amp;id=68cccb3fca83b36a9f71b201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59673-64cf6fa9</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59673&amp;severity=null&amp;id=68cccb3fca83b36a9f71b1ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59672-6657fa3e</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59672&amp;severity=null&amp;id=68cccb3fca83b36a9f71b1fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59671-63bf88bb</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59671&amp;severity=null&amp;id=68cccb3fca83b36a9f71b1fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-59670-43dd9b90</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-59670&amp;severity=null&amp;id=68cccb3fca83b36a9f71b1f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10572-85fc54f6</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10572&amp;severity=null&amp;id=68c9a64cb3cf9024acba372b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55777-d277f4bc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55777&amp;severity=null&amp;id=68c84d1ef8d6033d2b6b60a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-10298-aef140f2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-10298&amp;severity=null&amp;id=68c4a9e36da8ad0abf36f2d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4974-b33d79e4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4974&amp;severity=null&amp;id=68c4a9e36da8ad0abf36f2cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58912-eb09ad51</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58912&amp;severity=null&amp;id=68bccd0da2c363fb16078fe5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58911-4aa5abf3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58911&amp;severity=null&amp;id=68bccd0da2c363fb16078fe3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58910-11a5246e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58910&amp;severity=null&amp;id=68bccd0da2c363fb16078fe1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58909-fadd224b</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58909&amp;severity=null&amp;id=68bccd0da2c363fb16078fdf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58908-891831ba</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58908&amp;severity=null&amp;id=68bccd0da2c363fb16078fdd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58907-c9fa74ef</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58907&amp;severity=null&amp;id=68bccd0da2c363fb16078fdb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58906-30476b8f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58906&amp;severity=null&amp;id=68bccd0da2c363fb16078fd9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58905-f390555d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58905&amp;severity=null&amp;id=68bccd0da2c363fb16078fd7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58904-3700e2df</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58904&amp;severity=null&amp;id=68bccd0da2c363fb16078fd5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58375-8190de5b</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58375&amp;severity=null&amp;id=68bb78f0535f4a97731ae357</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58440-b077f869</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58440&amp;severity=null&amp;id=68bb12d27b333e59cd824c9d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58701-ff533ece</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58701&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58700-e3e95ddb</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58700&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58699-b96fbba8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58699&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58698-51457b37</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58698&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58697-db02440e</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58697&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58696-7ea8c4bd</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58696&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58695-89bef8c3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58695&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f5a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58694-6d90dd94</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58694&amp;severity=null&amp;id=68b904dcad5a09ad00fe3f58</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58171-09936903</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58171&amp;severity=null&amp;id=68b8c594ad5a09ad00fb5cc8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48876-6ffcb58a</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48876&amp;severity=null&amp;id=68b86a2aad5a09ad00f81b07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58170-5f26959f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58170&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58169-6aaa65a2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58169&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba8ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58168-cb5b83c9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58168&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58167-eba9d828</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58167&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba8fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58166-f793926d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58166&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58165-9174f309</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58165&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba8f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58164-9b15853b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58164&amp;severity=null&amp;id=68b7afd8ad5a09ad00eba8f5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58421-e3b7ee60</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58421&amp;severity=null&amp;id=68b661d8ad5a09ad00d709bb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58420-6229bf30</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58420&amp;severity=null&amp;id=68b661d8ad5a09ad00d709b9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58419-d4e4b039</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58419&amp;severity=null&amp;id=68b661d8ad5a09ad00d709b7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58418-58d857f5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58418&amp;severity=null&amp;id=68b661d8ad5a09ad00d709b5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58417-742de498</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58417&amp;severity=null&amp;id=68b661d8ad5a09ad00d709b3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58416-fbc574a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58416&amp;severity=null&amp;id=68b661d8ad5a09ad00d709b1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58415-14b7b0c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58415&amp;severity=null&amp;id=68b661d8ad5a09ad00d709af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58414-b42943a9</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58414&amp;severity=null&amp;id=68b661d8ad5a09ad00d709ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6992-9578ff32</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6992&amp;severity=null&amp;id=68b37c0cad5a09ad0094d164</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58333-adc0784f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58333&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58332-8f7aabbd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58332&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad46</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58331-e7582535</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58331&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58330-6bb0b322</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58330&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad42</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58329-8e70096b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58329&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58328-0e0444e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58328&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad3e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58327-e847b729</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58327&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad3c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58326-17ff23a1</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58326&amp;severity=null&amp;id=68b11bdcad5a09ad0073ad3a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57845-b74106c7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57845&amp;severity=null&amp;id=68afca5cad5a09ad00687006</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58043-c62e4b2b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58043&amp;severity=null&amp;id=68a932ddad5a09ad00262a88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58042-46b640c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58042&amp;severity=null&amp;id=68a932ddad5a09ad00262a86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58041-6a43b6ac</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58041&amp;severity=null&amp;id=68a932ddad5a09ad00262a84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58040-67e738b7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58040&amp;severity=null&amp;id=68a932ddad5a09ad00262a82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58039-5c929a90</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58039&amp;severity=null&amp;id=68a932ddad5a09ad00262a80</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58038-073c98d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58038&amp;severity=null&amp;id=68a932ddad5a09ad00262a7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58037-13d427f6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58037&amp;severity=null&amp;id=68a932ddad5a09ad00262a7c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58036-110cd7f7</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58036&amp;severity=null&amp;id=68a932dcad5a09ad00262a70</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-58035-58c70681</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-58035&amp;severity=null&amp;id=68a932dcad5a09ad00262a6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24469-3ad57312</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24469&amp;severity=null&amp;id=68a932dcad5a09ad00262a66</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-24468-b3e2c8a7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-24468&amp;severity=null&amp;id=68a932dcad5a09ad00262a64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22864-8205c6f9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22864&amp;severity=null&amp;id=68a932dcad5a09ad00262a62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22863-c321724b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22863&amp;severity=null&amp;id=68a932dcad5a09ad00262a60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22861-190d51a3</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22861&amp;severity=null&amp;id=68a932dcad5a09ad00262a5e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22860-00fe0aa3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22860&amp;severity=null&amp;id=68a932dcad5a09ad00262a5c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8193-402513ca</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8193&amp;severity=null&amp;id=68a8f00fad5a09ad0022fed5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57832-73cb6d44</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57832&amp;severity=null&amp;id=68a68fdcad5a09ad000b1407</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57831-ca641189</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57831&amp;severity=null&amp;id=68a68fdcad5a09ad000b1405</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57830-a78bbf33</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57830&amp;severity=null&amp;id=68a68fdcad5a09ad000b1403</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57829-cbed977c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57829&amp;severity=null&amp;id=68a68fdcad5a09ad000b1401</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57828-00a75cee</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57828&amp;severity=null&amp;id=68a68fdcad5a09ad000b13ff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57827-cedd0d80</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57827&amp;severity=null&amp;id=68a68fdcad5a09ad000b13fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57826-b8c4d269</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57826&amp;severity=null&amp;id=68a68fdcad5a09ad000b13fb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57825-74b867dc</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57825&amp;severity=null&amp;id=68a68fdcad5a09ad000b13f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57824-c6200569</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57824&amp;severity=null&amp;id=68a68fdcad5a09ad000b13f7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57748-08c8cbb7</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57748&amp;severity=null&amp;id=68a669c3ad5a09ad000a15de</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57747-076fcbd2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57747&amp;severity=null&amp;id=68a669c3ad5a09ad000a15dc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57746-8e681476</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57746&amp;severity=null&amp;id=68a669c3ad5a09ad000a15da</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57745-f505d6b1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57745&amp;severity=null&amp;id=68a669c3ad5a09ad000a15d8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57744-16573ccb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57744&amp;severity=null&amp;id=68a669c3ad5a09ad000a15d6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57743-f8e60c2d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57743&amp;severity=null&amp;id=68a669c3ad5a09ad000a15d4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57742-08cdff68</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57742&amp;severity=null&amp;id=68a669c3ad5a09ad000a15d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55153-5e68cef4</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55153&amp;severity=null&amp;id=68a4b53fad5a09ad00f980bf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8782-8594e9f9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8782&amp;severity=null&amp;id=68a49ca2ad5a09ad00f8e29a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57725-16f411fc</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57725&amp;severity=null&amp;id=68a3e953ad5a09ad00f087a3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57724-4b666a04</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57724&amp;severity=null&amp;id=68a3e953ad5a09ad00f087a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57723-44399e74</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57723&amp;severity=null&amp;id=68a3e953ad5a09ad00f0879f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57722-87ed1477</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57722&amp;severity=null&amp;id=68a3e953ad5a09ad00f0879d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57721-0ae6decc</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57721&amp;severity=null&amp;id=68a3e953ad5a09ad00f0879b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57720-8f4e1b7f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57720&amp;severity=null&amp;id=68a3e953ad5a09ad00f08799</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57719-600bf5d9</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57719&amp;severity=null&amp;id=68a3e953ad5a09ad00f08797</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57718-fd3385c2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57718&amp;severity=null&amp;id=68a3e953ad5a09ad00f08795</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-57717-e089fa31</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-57717&amp;severity=null&amp;id=68a3e953ad5a09ad00f08793</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-44201-be4b7ba5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-44201&amp;severity=null&amp;id=689f9cf6ad5a09ad0070ac44</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55726-8fba7074</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55726&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aaec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55725-c2529512</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55725&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aaea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55724-3234f9f2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55724&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aae8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55723-ae45be52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55723&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aae6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55722-f66b5b94</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55722&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aae4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55721-81fd410d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55721&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aae2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55720-9537c4f9</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55720&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aae0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55719-74e2f170</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55719&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aade</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55718-11cd58e8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55718&amp;severity=null&amp;id=689ea6e1ad5a09ad0061aadc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8395-5e71df49</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8395&amp;severity=null&amp;id=689bc112ad5a09ad00373606</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8771-dca52611</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8771&amp;severity=null&amp;id=6896d67aad5a09ad00091387</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8086-6d263373</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8086&amp;severity=null&amp;id=6893f49cad5a09ad00f57e27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-8130-dee82159</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-8130&amp;severity=null&amp;id=6893a34fad5a09ad00f33e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55027-43f2ef84</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55027&amp;severity=null&amp;id=6892cce0ad5a09ad00eddb9e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55026-e3147b21</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55026&amp;severity=null&amp;id=6892cce0ad5a09ad00eddb9c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55025-96df2be3</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55025&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55024-9d1fd0dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55024&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55023-457be924</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55023&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55022-de5f0104</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55022&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55021-218d004b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55021&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb88</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55020-6ce978f9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55020&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb86</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-55019-646b3607</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-55019&amp;severity=null&amp;id=6892ccdfad5a09ad00eddb84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54980-4e8d7d27</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54980&amp;severity=null&amp;id=68917b59ad5a09ad00e5629b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54979-75889392</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54979&amp;severity=null&amp;id=68917b59ad5a09ad00e56299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54978-dc1d9fa8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54978&amp;severity=null&amp;id=68917b59ad5a09ad00e56297</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54977-a222d241</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54977&amp;severity=null&amp;id=68917b59ad5a09ad00e56295</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54976-f3784860</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54976&amp;severity=null&amp;id=68917b59ad5a09ad00e56293</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54975-23af567f</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54975&amp;severity=null&amp;id=68917b59ad5a09ad00e56291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54974-b25b28d5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54974&amp;severity=null&amp;id=68917b59ad5a09ad00e5628f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54797-12d2bab7</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54797&amp;severity=null&amp;id=68914319ad5a09ad00e3cbef</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54847-00370aae</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54847&amp;severity=null&amp;id=688c355ead5a09ad00bf5555</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54846-0a1c7345</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54846&amp;severity=null&amp;id=688c355dad5a09ad00bf5543</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54845-d0e60d45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54845&amp;severity=null&amp;id=688c355dad5a09ad00bf5541</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54844-5bf22f79</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54844&amp;severity=null&amp;id=688c355dad5a09ad00bf553f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54843-dc007fa5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54843&amp;severity=null&amp;id=688c355dad5a09ad00bf553d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54842-3dcc7c75</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54842&amp;severity=null&amp;id=688c355dad5a09ad00bf553b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54841-4411aa0b</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54841&amp;severity=null&amp;id=688c355dad5a09ad00bf5539</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54840-6d4a4d9d</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54840&amp;severity=null&amp;id=688c355dad5a09ad00bf5537</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54839-9821e9ca</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54839&amp;severity=null&amp;id=688c355dad5a09ad00bf5535</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54657-3f29b739</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54657&amp;severity=null&amp;id=688c355dad5a09ad00bf5533</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54829-9c6081dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54829&amp;severity=null&amp;id=688ae05bad5a09ad00b2568f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54828-a956b3dd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54828&amp;severity=null&amp;id=688ae05bad5a09ad00b2568d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54827-ade1a5b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54827&amp;severity=null&amp;id=688ae05bad5a09ad00b2568b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54826-215b697a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54826&amp;severity=null&amp;id=688ae05bad5a09ad00b25689</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54825-e8361875</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54825&amp;severity=null&amp;id=688ae05bad5a09ad00b25687</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54824-641eb14e</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54824&amp;severity=null&amp;id=688ae05bad5a09ad00b25685</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54823-ed5f205a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54823&amp;severity=null&amp;id=688ae05bad5a09ad00b25683</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-7356-933c68c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-7356&amp;severity=null&amp;id=688a9dc1ad5a09ad00aff952</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54582-7340c32c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54582&amp;severity=null&amp;id=688a7361ad5a09ad00ae4cac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54432-ec240414</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54432&amp;severity=null&amp;id=6888feb4ad5a09ad008eef1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54420-ebbc9ca5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54420&amp;severity=null&amp;id=6888fb32ad5a09ad008edc64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54666-be4059a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54666&amp;severity=null&amp;id=688839cfad5a09ad008a2beb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54665-3cff5957</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54665&amp;severity=null&amp;id=688839cfad5a09ad008a2be9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54664-6ceaba92</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54664&amp;severity=null&amp;id=688839cfad5a09ad008a2be7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54663-e410c0b4</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54663&amp;severity=null&amp;id=688839cfad5a09ad008a2be5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54662-6968d821</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54662&amp;severity=null&amp;id=688839cfad5a09ad008a2be3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54661-d257f2a3</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54661&amp;severity=null&amp;id=688839cfad5a09ad008a2be1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54369-72ca922d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54369&amp;severity=null&amp;id=6882b80fad5a09ad00464510</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54371-69ce91d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54371&amp;severity=null&amp;id=68814a71ad5a09ad0027bdff</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54362-fe8483f8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54362&amp;severity=null&amp;id=687f0276a83201eaac17696f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54361-96cf7051</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54361&amp;severity=null&amp;id=687f0276a83201eaac17696d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54360-61cb1827</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54360&amp;severity=null&amp;id=687f0276a83201eaac17696b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54359-853ce192</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54359&amp;severity=null&amp;id=687f0276a83201eaac176969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54358-96aa4064</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54358&amp;severity=null&amp;id=687f0276a83201eaac176967</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54357-2c1f8606</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54357&amp;severity=null&amp;id=687f0276a83201eaac176965</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54356-05fe60a4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54356&amp;severity=null&amp;id=687f0276a83201eaac176963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54355-e1e82f95</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54355&amp;severity=null&amp;id=687f0276a83201eaac176961</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-54354-2ab2b63f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-54354&amp;severity=null&amp;id=687f0276a83201eaac17695f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29572-e70ef951</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29572&amp;severity=null&amp;id=6879dc20a83201eaacef69e1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52933-62fa7c70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52933&amp;severity=null&amp;id=6878f79ba83201eaace5cfa3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53958-26dc94d0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53958&amp;severity=null&amp;id=6877197ba83201eaacd29a25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53957-f60bc464</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53957&amp;severity=null&amp;id=6877197ba83201eaacd29a23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53956-2fc9e362</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53956&amp;severity=null&amp;id=6877197ba83201eaacd29a21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53955-92ffecbb</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53955&amp;severity=null&amp;id=6877197ba83201eaacd29a1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53954-d05af211</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53954&amp;severity=null&amp;id=6877197ba83201eaacd29a1d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53953-09d4f5ec</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53953&amp;severity=null&amp;id=6877197ba83201eaacd29a1b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53952-fec39d52</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53952&amp;severity=null&amp;id=6877197ba83201eaacd29a19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53852-26e7c661</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53852&amp;severity=null&amp;id=6875696ca83201eaaccaa934</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53851-4afe5de9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53851&amp;severity=null&amp;id=6875696ba83201eaaccaa905</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53850-f04789f7</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53850&amp;severity=null&amp;id=6875696ba83201eaaccaa901</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53849-ce6d651a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53849&amp;severity=null&amp;id=6875696ba83201eaaccaa8fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53848-6038b01d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53848&amp;severity=null&amp;id=6875696ba83201eaaccaa8f9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53879-801986e6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53879&amp;severity=null&amp;id=6871d376a83201eaacb27883</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53878-83ce4756</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53878&amp;severity=null&amp;id=6871d376a83201eaacb27881</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53877-0938886b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53877&amp;severity=null&amp;id=6871d376a83201eaacb2787f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53876-6ba15ede</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53876&amp;severity=null&amp;id=6871d376a83201eaacb2787d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53875-11928813</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53875&amp;severity=null&amp;id=6871d376a83201eaacb2787b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53874-5ffaf41b</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53874&amp;severity=null&amp;id=6871d376a83201eaacb27879</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53873-0179c3bd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53873&amp;severity=null&amp;id=6871d376a83201eaacb27877</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53872-199408bd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53872&amp;severity=null&amp;id=6871d376a83201eaacb27875</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53871-8c4f9d5d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53871&amp;severity=null&amp;id=6871d376a83201eaacb27873</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53753-9735646e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53753&amp;severity=null&amp;id=686f307ca83201eaaca48429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53752-f4cb4b30</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53752&amp;severity=null&amp;id=686f307ca83201eaaca4841d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53751-c7a539ee</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53751&amp;severity=null&amp;id=686f307ca83201eaaca4841b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53750-2c8073a5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53750&amp;severity=null&amp;id=686f307ca83201eaaca48419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53749-cb2c7d8e</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53749&amp;severity=null&amp;id=686f307ca83201eaaca48417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53748-c43781cc</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53748&amp;severity=null&amp;id=686f307ca83201eaaca48415</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53747-6f1d53bb</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53747&amp;severity=null&amp;id=686f307ca83201eaaca48413</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53746-f9e64dcf</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53746&amp;severity=null&amp;id=686f307ca83201eaaca48411</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0646-9c13ebc5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0646&amp;severity=null&amp;id=686eedb2a83201eaaca33f8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53688-428fbefa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53688&amp;severity=null&amp;id=686de0ee6f40f0eb72fded2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53687-c567faa8</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53687&amp;severity=null&amp;id=686de0ee6f40f0eb72fded29</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53686-652efa49</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53686&amp;severity=null&amp;id=686de0ee6f40f0eb72fded27</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53685-a3199c14</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53685&amp;severity=null&amp;id=686de0ee6f40f0eb72fded25</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53684-a82ab7f1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53684&amp;severity=null&amp;id=686de0ee6f40f0eb72fded23</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53683-89fe54ed</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53683&amp;severity=null&amp;id=686de0ee6f40f0eb72fded21</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53682-e2196546</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53682&amp;severity=null&amp;id=686de0ee6f40f0eb72fded1f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53617-92c647bb</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53617&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a98</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53616-9e1493ac</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53616&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a96</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53615-9f18cd83</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53615&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a94</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53614-11ed3510</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53614&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53613-8bf036be</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53613&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a90</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53612-e6accae2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53612&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a8e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53611-f2e8b38f</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53611&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a8c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53610-dfdd4dc1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53610&amp;severity=null&amp;id=686c8beb6f40f0eb72f05a8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-6022-5fdc09e0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-6022&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e47c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5316-df5b8724</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5316&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e47a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5104-ab3e2d69</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5104&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e478</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4950-1be94881</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4950&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e476</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4694-154191a7</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4694&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e474</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3896-403dedf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3896&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e472</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3524-dd61d131</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3524&amp;severity=null&amp;id=6869a61a6f40f0eb72b1e470</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3283-c22d129d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3283&amp;severity=null&amp;id=6869a6196f40f0eb72b1e450</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3156-71957eda</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3156&amp;severity=null&amp;id=6869a6196f40f0eb72b1e44e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3094-25d994cc</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3094&amp;severity=null&amp;id=6869a6196f40f0eb72b1e44c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2904-4d9054c1</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2904&amp;severity=null&amp;id=6869a6196f40f0eb72b1e44a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2856-d7398e0d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2856&amp;severity=null&amp;id=6869a6196f40f0eb72b1e448</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2718-bff7691a</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2718&amp;severity=null&amp;id=6869a6196f40f0eb72b1e446</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2504-ed888018</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2504&amp;severity=null&amp;id=6869a6196f40f0eb72b1e444</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2422-3cd50457</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2422&amp;severity=null&amp;id=6869a6196f40f0eb72b1e442</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1990-e2c47bd9</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1990&amp;severity=null&amp;id=6869a6196f40f0eb72b1e440</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1772-3608c06f</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1772&amp;severity=null&amp;id=6869a6196f40f0eb72b1e43e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1737-4c152882</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1737&amp;severity=null&amp;id=6869a6196f40f0eb72b1e429</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1631-ff186574</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1631&amp;severity=null&amp;id=6869a6196f40f0eb72b1e427</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1573-f1a8d607</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1573&amp;severity=null&amp;id=6869a6196f40f0eb72b1e425</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1569-ae45c96e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1569&amp;severity=null&amp;id=6869a6196f40f0eb72b1e423</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1318-8915eed1</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1318&amp;severity=null&amp;id=6869a6196f40f0eb72b1e421</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1317-7b82b766</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1317&amp;severity=null&amp;id=6869a6196f40f0eb72b1e41f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1297-409cd72f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1297&amp;severity=null&amp;id=6869a6196f40f0eb72b1e41d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-1234-2d800651</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-1234&amp;severity=null&amp;id=6869a6196f40f0eb72b1e41b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0654-c65cf564</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0654&amp;severity=null&amp;id=6869a6196f40f0eb72b1e419</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-0305-ba5577d7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-0305&amp;severity=null&amp;id=6869a6196f40f0eb72b1e417</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53017-14e61239</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53017&amp;severity=low&amp;id=6862b3346f40f0eb728c1c64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53001-3bf9c64a</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53001&amp;severity=low&amp;id=6862b3346f40f0eb728c1c62</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5951-1f24b34d</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5951&amp;severity=low&amp;id=68606b9c6f40f0eb72746f81</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53388-c9838a0f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53388&amp;severity=low&amp;id=685f5ce86f40f0eb726a464e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53387-11b30d95</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53387&amp;severity=low&amp;id=685f5ce86f40f0eb726a464c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53386-2191d6cd</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53386&amp;severity=low&amp;id=685f5ce86f40f0eb726a464a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53385-d5dd8760</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53385&amp;severity=low&amp;id=685f5ce86f40f0eb726a4648</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53384-1ddeef30</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53384&amp;severity=low&amp;id=685f5ce86f40f0eb726a4646</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53383-7f7ee23e</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53383&amp;severity=low&amp;id=685f5ce86f40f0eb726a4644</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53382-96f8037e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53382&amp;severity=low&amp;id=685f5ce86f40f0eb726a4642</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53381-62cab2a8</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53381&amp;severity=low&amp;id=685f5ce86f40f0eb726a4640</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53380-6edd1e75</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53380&amp;severity=low&amp;id=685f5ce86f40f0eb726a463e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53166-729c2015</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53166&amp;severity=low&amp;id=685e117bca1063fb874f039d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53165-0822e455</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53165&amp;severity=low&amp;id=685e117bca1063fb874f039b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53164-e6d5e7e5</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53164&amp;severity=low&amp;id=685e117bca1063fb874f0399</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53163-e6419bd1</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53163&amp;severity=low&amp;id=685e117bca1063fb874f0397</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53162-c3bd36fa</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53162&amp;severity=low&amp;id=685e117bca1063fb874f0395</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53161-41b92d73</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53161&amp;severity=low&amp;id=685e117bca1063fb874f0393</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53160-c791e2c0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53160&amp;severity=low&amp;id=685e117bca1063fb874f0391</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53159-70551646</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53159&amp;severity=low&amp;id=685e117bca1063fb874f038f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53158-a93dc2f3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53158&amp;severity=low&amp;id=685e117bca1063fb874f038d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-53157-6869f67f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-53157&amp;severity=low&amp;id=685e117bca1063fb874f038b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52934-62c12400</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52934&amp;severity=low&amp;id=685cff43ca1063fb873d51d2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52979-fd922183</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52979&amp;severity=low&amp;id=685a16f4dec26fc862d8ed77</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52978-6248d46b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52978&amp;severity=low&amp;id=685a16f4dec26fc862d8ed75</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52977-6b731e16</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52977&amp;severity=low&amp;id=685a16f4dec26fc862d8ed73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52976-91e938c0</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52976&amp;severity=low&amp;id=685a16f4dec26fc862d8ed71</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52975-058e2a5f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52975&amp;severity=low&amp;id=685a16f4dec26fc862d8ed6f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52974-37bedc53</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52974&amp;severity=low&amp;id=685a16f4dec26fc862d8ed6d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52973-0bb9c517</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52973&amp;severity=low&amp;id=685a16f4dec26fc862d8ed6b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52972-74c6a1d9</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52972&amp;severity=low&amp;id=685a16f4dec26fc862d8ed69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52971-0a9243e5</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52971&amp;severity=low&amp;id=685a16f4dec26fc862d8ed67</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3494-f0041236</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3494&amp;severity=low&amp;id=6850e5c4a8c92127438512d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3493-d0850eed</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3493&amp;severity=low&amp;id=6850e5c4a8c92127438512d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52445-d7509a75</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52445&amp;severity=low&amp;id=6850debda8c9212743850b4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52444-c38dc83a</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52444&amp;severity=low&amp;id=6850debda8c9212743850b4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52443-686df80b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52443&amp;severity=low&amp;id=6850debda8c9212743850b49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52442-e8ec9fa5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52442&amp;severity=low&amp;id=6850debda8c9212743850b47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52441-0724dc9a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52441&amp;severity=low&amp;id=6850debda8c9212743850b45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52440-b26bb5c0</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52440&amp;severity=low&amp;id=6850debda8c9212743850b43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52439-b9095ac8</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52439&amp;severity=low&amp;id=6850debda8c9212743850b41</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52438-0e3eb73a</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52438&amp;severity=low&amp;id=6850debda8c9212743850b3f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-52437-3bf2665b</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-52437&amp;severity=low&amp;id=6850debda8c9212743850b3d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50150-ef9a9590</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50150&amp;severity=low&amp;id=684ce6b9a8c9212743813ebd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50149-cd4b08a2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50149&amp;severity=low&amp;id=684ce6b9a8c9212743813ebb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50148-80d9a606</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50148&amp;severity=low&amp;id=684ce6b9a8c9212743813eb9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50147-d2fb7e28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50147&amp;severity=low&amp;id=684ce6b9a8c9212743813eb7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50146-5d1b268f</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50146&amp;severity=low&amp;id=684ce6b9a8c9212743813eb5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50145-fe90f25c</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50145&amp;severity=low&amp;id=684ce6b9a8c9212743813eb3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50144-1d1418c7</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50144&amp;severity=low&amp;id=684ce6b9a8c9212743813eb1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50143-b2133365</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50143&amp;severity=low&amp;id=684ce6b9a8c9212743813eaf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-50142-7c4ff782</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-50142&amp;severity=low&amp;id=684ce6b9a8c9212743813ead</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48699-8310c308</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48699&amp;severity=low&amp;id=684b3748358c65714e6af7a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49822-2adf2743</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49822&amp;severity=low&amp;id=684a4831358c65714e69fed6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49821-d922e58a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49821&amp;severity=low&amp;id=684a4831358c65714e69fed4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49820-2b91a327</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49820&amp;severity=low&amp;id=684a4831358c65714e69fed2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49819-6b2bb82d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49819&amp;severity=low&amp;id=684a4831358c65714e69fed0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49818-f09875e4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49818&amp;severity=low&amp;id=684a4831358c65714e69fece</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49817-a728afc9</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49817&amp;severity=low&amp;id=684a4831358c65714e69fecc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49816-215d669c</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49816&amp;severity=low&amp;id=684a4831358c65714e69feca</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49815-4ad3e3f5</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49815&amp;severity=low&amp;id=684a4831358c65714e69fec8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49814-9f9afaf1</loc>
    <lastmod>2026-03-29</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49814&amp;severity=low&amp;id=684a4831358c65714e69fec6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49793-7bcbdc30</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49793&amp;severity=low&amp;id=6848f41d3cd93dcca831a700</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49792-b21008d2</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49792&amp;severity=low&amp;id=6848f41d3cd93dcca831a6fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49791-1c884ae3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49791&amp;severity=low&amp;id=6848f41d3cd93dcca831a6fc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49790-23109d71</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49790&amp;severity=low&amp;id=6848f41d3cd93dcca831a6fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49789-5dcfdf38</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49789&amp;severity=low&amp;id=6848f41d3cd93dcca831a6f8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49788-8342ce65</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49788&amp;severity=low&amp;id=6848f41d3cd93dcca831a6f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49787-070083f0</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49787&amp;severity=low&amp;id=6848f41d3cd93dcca831a6f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49786-1b8aa786</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49786&amp;severity=low&amp;id=6848f41d3cd93dcca831a6f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49785-c4e34868</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49785&amp;severity=low&amp;id=6848f41d3cd93dcca831a6f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4801-54ae00a1</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4801&amp;severity=low&amp;id=684852182b23ede189611a08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-55595-ecbc420d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-55595&amp;severity=low&amp;id=6847a266bab8eb36fc2d753c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5242-4e3f10b0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5242&amp;severity=low&amp;id=68458da771f4d251b55103df</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5223-6ca2ad8e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5223&amp;severity=low&amp;id=68458da771f4d251b55103d9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5097-73c3f899</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5097&amp;severity=low&amp;id=68458da771f4d251b55103d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-5026-a5dfc187</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-5026&amp;severity=low&amp;id=6844bdb671f4d251b527c447</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49210-b7103bb6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49210&amp;severity=low&amp;id=683ffd67182aa0cae2a3880a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49209-c3960fd5</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49209&amp;severity=low&amp;id=683ffd67182aa0cae2a38808</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49208-483873e1</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49208&amp;severity=low&amp;id=683ffd67182aa0cae2a38806</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49207-209efecf</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49207&amp;severity=low&amp;id=683ffd67182aa0cae2a38804</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49206-4089023a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49206&amp;severity=low&amp;id=683ffd67182aa0cae2a38802</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49205-c45a759e</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49205&amp;severity=low&amp;id=683ffd67182aa0cae2a38800</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49204-f2ae179f</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49204&amp;severity=low&amp;id=683ffd67182aa0cae2a387fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49203-765442fd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49203&amp;severity=low&amp;id=683ffd67182aa0cae2a387f1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-49202-fcf67083</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-49202&amp;severity=low&amp;id=683fb9e9182aa0cae2991d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48745-2ac339e6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48745&amp;severity=low&amp;id=683d9c79182aa0cae24444a9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48871-6a647256</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48871&amp;severity=low&amp;id=683a0a8d182aa0cae2be196b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48870-c5fcfa85</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48870&amp;severity=low&amp;id=683a0a8d182aa0cae2be1969</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48872-346f3086</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48872&amp;severity=low&amp;id=683a0a8d182aa0cae2be1963</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48874-a8c531c7</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48874&amp;severity=low&amp;id=683a0a8d182aa0cae2be195d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48873-82c483e4</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48873&amp;severity=low&amp;id=683a0a8d182aa0cae2be195b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51756-6ebd0bc5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51756&amp;severity=low&amp;id=683783cc182aa0cae25e61a1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-51753-6993ddbb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-51753&amp;severity=low&amp;id=683783cc182aa0cae25e619f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-50338-df0ec5cd</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-50338&amp;severity=low&amp;id=683783cc182aa0cae25e619d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49904-0eac60f7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49904&amp;severity=low&amp;id=683783cc182aa0cae25e619b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49604-0a3baf00</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49604&amp;severity=low&amp;id=683783cc182aa0cae25e6199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-48726-75506e73</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-48726&amp;severity=low&amp;id=6837802a182aa0cae25de347</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49139-7aa2de70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49139&amp;severity=low&amp;id=6837802a182aa0cae25de345</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-49137-28205b3b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-49137&amp;severity=low&amp;id=6837802a182aa0cae25de343</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-47914-518e6662</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-47914&amp;severity=low&amp;id=68375988182aa0cae25872b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46739-3695f673</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46739&amp;severity=low&amp;id=68375988182aa0cae25872ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46736-944bb61b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46736&amp;severity=low&amp;id=68375988182aa0cae25872ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46735-7b9d9b68</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46735&amp;severity=low&amp;id=68375988182aa0cae25872aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46734-660cc6ba</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46734&amp;severity=low&amp;id=68375988182aa0cae25872a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46729-a88d62e8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46729&amp;severity=low&amp;id=68375988182aa0cae25872a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46655-46a30191</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46655&amp;severity=low&amp;id=68375988182aa0cae25872a4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46419-044fc823</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46419&amp;severity=low&amp;id=68375988182aa0cae25872a2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-46296-98c4ddf1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-46296&amp;severity=low&amp;id=68375988182aa0cae25872a0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45878-ed9ac440</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45878&amp;severity=low&amp;id=68375988182aa0cae258729e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45125-95e8b209</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45125&amp;severity=low&amp;id=68375988182aa0cae2587291</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45120-dec4b064</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45120&amp;severity=low&amp;id=68375988182aa0cae258728f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45117-639700b0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45117&amp;severity=low&amp;id=68375988182aa0cae258728d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-45114-c54d5e42</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-45114&amp;severity=low&amp;id=68375988182aa0cae258728b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44618-1cf33fd5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44618&amp;severity=low&amp;id=68375988182aa0cae2587289</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44614-ce2b6007</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44614&amp;severity=low&amp;id=68375988182aa0cae2587287</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44613-a09c9bd1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44613&amp;severity=low&amp;id=68375988182aa0cae2587285</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44609-a25f7459</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44609&amp;severity=low&amp;id=68375988182aa0cae2587283</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44607-4d8ac6fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44607&amp;severity=low&amp;id=68375988182aa0cae2587281</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44454-b5a2c169</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44454&amp;severity=low&amp;id=68375988182aa0cae258727f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44452-c9e23ac4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44452&amp;severity=low&amp;id=68375988182aa0cae2587272</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-44450-f746a589</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-44450&amp;severity=low&amp;id=68375988182aa0cae2587270</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43669-afea6222</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43669&amp;severity=low&amp;id=68375988182aa0cae258726e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43661-b5ce4b47</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43661&amp;severity=low&amp;id=68375988182aa0cae258726c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43659-86186b55</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43659&amp;severity=low&amp;id=68375988182aa0cae258726a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43511-dd7232fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43511&amp;severity=low&amp;id=68375988182aa0cae2587268</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43510-e24b6ed1</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43510&amp;severity=low&amp;id=68375988182aa0cae2587266</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43498-e6a2e348</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43498&amp;severity=low&amp;id=68375988182aa0cae2587264</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43446-049870bf</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43446&amp;severity=low&amp;id=68375988182aa0cae2587262</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43444-32e0ca27</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43444&amp;severity=low&amp;id=68375988182aa0cae2587260</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42702-03086830</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42702&amp;severity=low&amp;id=68375988182aa0cae2587253</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42700-ac9c84d8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42700&amp;severity=low&amp;id=68375988182aa0cae2587251</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42487-f149fa64</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42487&amp;severity=low&amp;id=68375988182aa0cae258724f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-42480-f4c107d3</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-42480&amp;severity=low&amp;id=68375988182aa0cae258724d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41997-7399bf09</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41997&amp;severity=low&amp;id=68375988182aa0cae258724b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41834-b55da752</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41834&amp;severity=low&amp;id=68375988182aa0cae2587249</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41803-16cd136b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41803&amp;severity=low&amp;id=68375988182aa0cae2587247</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41782-4e63f199</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41782&amp;severity=low&amp;id=68375988182aa0cae2587245</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41637-4db71ec8</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41637&amp;severity=low&amp;id=68375988182aa0cae2587243</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41626-5f225ad6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41626&amp;severity=low&amp;id=68375988182aa0cae2587241</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41625-0f81546e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41625&amp;severity=low&amp;id=68375988182aa0cae2587234</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-41341-c370dc3e</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-41341&amp;severity=low&amp;id=68375988182aa0cae2587232</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40689-3520a2fb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40689&amp;severity=low&amp;id=68375988182aa0cae2587230</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40688-72f49a9f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40688&amp;severity=low&amp;id=68375988182aa0cae258722e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40221-65769c30</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40221&amp;severity=low&amp;id=68375988182aa0cae258722c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38084-69697201</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38084&amp;severity=low&amp;id=68375988182aa0cae258722a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38071-48f70c7f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38071&amp;severity=low&amp;id=68375988182aa0cae2587228</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-37408-9a36d7b5</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-37408&amp;severity=low&amp;id=68375988182aa0cae2587226</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36792-33b170c5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36792&amp;severity=low&amp;id=68375988182aa0cae2587224</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36426-b00497d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36426&amp;severity=low&amp;id=68375988182aa0cae2587222</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36421-8f3b0e54</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36421&amp;severity=low&amp;id=68375987182aa0cae2587215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36420-842c087c</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36420&amp;severity=low&amp;id=68375987182aa0cae2587213</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36419-b0331629</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36419&amp;severity=low&amp;id=68375987182aa0cae2587211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36395-fde604ae</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36395&amp;severity=low&amp;id=68375987182aa0cae258720f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36393-2bb8e0d7</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36393&amp;severity=low&amp;id=68375987182aa0cae258720d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36366-0ffecba2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36366&amp;severity=low&amp;id=68375987182aa0cae258720b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36353-f3fd338b</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36353&amp;severity=low&amp;id=68375987182aa0cae2587209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36342-e0f34683</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36342&amp;severity=low&amp;id=68375987182aa0cae2587207</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36297-e86756d5</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36297&amp;severity=low&amp;id=68375987182aa0cae2587205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36294-0f8369dc</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36294&amp;severity=low&amp;id=68375987182aa0cae2587203</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36291-ce637e90</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36291&amp;severity=low&amp;id=68375987182aa0cae25871f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36290-b3b67301</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36290&amp;severity=low&amp;id=68375987182aa0cae25871f4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36286-bb2f20ad</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36286&amp;severity=low&amp;id=68375987182aa0cae25871f2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36283-132d3e7a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36283&amp;severity=low&amp;id=68375987182aa0cae25871f0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36281-a2d32526</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36281&amp;severity=low&amp;id=68375987182aa0cae25871ee</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35736-0211b946</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35736&amp;severity=low&amp;id=68375987182aa0cae25871ec</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35732-dbccca65</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35732&amp;severity=low&amp;id=68375987182aa0cae25871ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35731-772d8b18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35731&amp;severity=low&amp;id=68375987182aa0cae25871e8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35727-91d38e75</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35727&amp;severity=low&amp;id=68375987182aa0cae25871e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35400-3a911cd0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35400&amp;severity=low&amp;id=68375987182aa0cae25871e4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35274-0c17ce70</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35274&amp;severity=low&amp;id=68375987182aa0cae25871d7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-35237-ef4ded93</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-35237&amp;severity=low&amp;id=68375987182aa0cae25871d5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34863-3eb279a4</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34863&amp;severity=low&amp;id=68375987182aa0cae25871d3</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34861-6c6af9b2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34861&amp;severity=low&amp;id=68375987182aa0cae25871d1</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34856-a1082ad3</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34856&amp;severity=low&amp;id=68375987182aa0cae25871cf</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34852-05ef022d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34852&amp;severity=low&amp;id=68375987182aa0cae25871cd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34846-105c51e6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34846&amp;severity=low&amp;id=68375987182aa0cae25871cb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34842-a0ae5877</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34842&amp;severity=low&amp;id=68375987182aa0cae25871c9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34653-7f440b1c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34653&amp;severity=low&amp;id=68375987182aa0cae25871c7</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34649-4cf4ffaa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34649&amp;severity=low&amp;id=68375987182aa0cae25871c5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34489-e98a3f11</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34489&amp;severity=low&amp;id=68375987182aa0cae25871b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33979-1e47ea6e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33979&amp;severity=low&amp;id=68375987182aa0cae25871b6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33976-7cbec83f</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33976&amp;severity=low&amp;id=68375987182aa0cae25871b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33966-d8fe6fec</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33966&amp;severity=low&amp;id=68375987182aa0cae25871b2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33949-1184e776</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33949&amp;severity=low&amp;id=68375987182aa0cae25871b0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33940-b43ffe6a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33940&amp;severity=low&amp;id=68375987182aa0cae25871ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33899-5ba50928</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33899&amp;severity=low&amp;id=68375987182aa0cae25871ac</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33895-05c91b6a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33895&amp;severity=low&amp;id=68375987182aa0cae25871aa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33310-47e1b05c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33310&amp;severity=low&amp;id=68375987182aa0cae25871a8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33200-970c3ef9</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33200&amp;severity=low&amp;id=68375987182aa0cae25871a6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33197-9ea9ebf2</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33197&amp;severity=low&amp;id=68375987182aa0cae2587199</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33188-d18cfc24</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33188&amp;severity=low&amp;id=68375987182aa0cae2587197</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33145-70c65e66</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33145&amp;severity=low&amp;id=68375987182aa0cae2587195</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33144-b6984a1a</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33144&amp;severity=low&amp;id=68375987182aa0cae2587193</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33143-5a35bdde</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33143&amp;severity=low&amp;id=68375987182aa0cae2587191</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33141-cd187a42</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33141&amp;severity=low&amp;id=68375987182aa0cae258718f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32762-35a01c12</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32762&amp;severity=low&amp;id=68375987182aa0cae258718d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32584-e0f0a38a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32584&amp;severity=low&amp;id=68375987182aa0cae258718b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32581-00dc6a46</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32581&amp;severity=low&amp;id=68375987182aa0cae2587189</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32580-f4460373</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32580&amp;severity=low&amp;id=68375987182aa0cae2587187</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32571-480418ab</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32571&amp;severity=low&amp;id=68375987182aa0cae258717a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32288-64f18295</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32288&amp;severity=low&amp;id=68375987182aa0cae2587178</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32232-9f94add5</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32232&amp;severity=low&amp;id=68375987182aa0cae2587176</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30606-72f5102b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30606&amp;severity=low&amp;id=68375987182aa0cae2587174</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-30537-02750eb7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-30537&amp;severity=low&amp;id=68375987182aa0cae2587172</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29921-cf01bb81</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29921&amp;severity=low&amp;id=68375987182aa0cae2587170</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29920-1c66e636</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29920&amp;severity=low&amp;id=68375987182aa0cae258716e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29896-8f330c59</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29896&amp;severity=low&amp;id=68375987182aa0cae258716c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29895-28d65008</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29895&amp;severity=low&amp;id=68375987182aa0cae258716a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29870-8663c474</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29870&amp;severity=low&amp;id=68375987182aa0cae2587168</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29478-cbe08286</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29478&amp;severity=low&amp;id=68375987182aa0cae258715b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29469-0a43bd28</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29469&amp;severity=low&amp;id=68375987182aa0cae2587159</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28698-be970f8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28698&amp;severity=low&amp;id=68375987182aa0cae2587157</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-28694-9af152ae</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-28694&amp;severity=low&amp;id=68375987182aa0cae2587155</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27173-4c08bcb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27173&amp;severity=low&amp;id=68375987182aa0cae2587153</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26515-ac680d85</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26515&amp;severity=low&amp;id=68375987182aa0cae2587151</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26084-dae5103a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26084&amp;severity=low&amp;id=68375987182aa0cae258714f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24914-b757ef30</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24914&amp;severity=low&amp;id=68375987182aa0cae258714d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23917-c8c54a51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23917&amp;severity=low&amp;id=68375987182aa0cae258714b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-23914-2e7ee515</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-23914&amp;severity=low&amp;id=68375987182aa0cae2587149</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21795-e5bad9df</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21795&amp;severity=low&amp;id=68375987182aa0cae258713c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21207-bb446316</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21207&amp;severity=low&amp;id=68375987182aa0cae258713a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21206-1e540c31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21206&amp;severity=low&amp;id=68375987182aa0cae2587138</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21188-32256b9b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21188&amp;severity=low&amp;id=68375987182aa0cae2587136</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21185-fc7ac869</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21185&amp;severity=low&amp;id=68375987182aa0cae2587134</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21183-995d511e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21183&amp;severity=low&amp;id=68375987182aa0cae2587132</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21175-20d34111</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21175&amp;severity=low&amp;id=68375987182aa0cae2587130</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21171-532ff1af</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21171&amp;severity=low&amp;id=68375987182aa0cae258712e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21161-bdf84f31</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21161&amp;severity=low&amp;id=68375987182aa0cae258712c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21135-3a496cfa</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21135&amp;severity=low&amp;id=68375987182aa0cae258712a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43502-be01d704</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43502&amp;severity=low&amp;id=68374b89182aa0cae256783b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43493-8f9e69b6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43493&amp;severity=low&amp;id=68374b89182aa0cae2567839</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-40970-1946a2ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-40970&amp;severity=low&amp;id=68374b89182aa0cae2567837</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-38092-0300a6f0</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-38092&amp;severity=low&amp;id=68374b89182aa0cae2567835</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36406-99c6fa94</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36406&amp;severity=low&amp;id=68374b89182aa0cae2567833</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-36298-2a418908</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-36298&amp;severity=low&amp;id=68374b89182aa0cae2567831</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34860-33485945</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34860&amp;severity=low&amp;id=68374b89182aa0cae2567824</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-34859-81f4b06c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-34859&amp;severity=low&amp;id=68374b89182aa0cae2567822</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-33893-70b8a732</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-33893&amp;severity=low&amp;id=68374b89182aa0cae2567820</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-32233-3b2c9713</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-32233&amp;severity=low&amp;id=68374b89182aa0cae256781e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-29924-e4502e6b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-29924&amp;severity=low&amp;id=68374b89182aa0cae256781c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27877-3d0bd015</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27877&amp;severity=low&amp;id=68374b89182aa0cae256781a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-27876-872c2221</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-27876&amp;severity=low&amp;id=68374b89182aa0cae2567818</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-43496-1b2c8d3d</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-43496&amp;severity=low&amp;id=68374b89182aa0cae2567812</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26038-c5581645</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26038&amp;severity=low&amp;id=683747bb182aa0cae255f979</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26424-c485ad94</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26424&amp;severity=low&amp;id=6837447f182aa0cae2557b39</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26304-ae188cc6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26304&amp;severity=low&amp;id=6837447f182aa0cae2557b37</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26072-b4386876</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26072&amp;severity=low&amp;id=683740ca182aa0cae254fcb0</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26056-4b31e724</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26056&amp;severity=low&amp;id=683740ca182aa0cae254fcae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-26037-ab05f8c8</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-26037&amp;severity=low&amp;id=68373d46182aa0cae2547e19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25909-bcf28b0e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25909&amp;severity=low&amp;id=68373d46182aa0cae2547e17</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25870-663a5884</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25870&amp;severity=low&amp;id=68373d46182aa0cae2547e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-25868-6198cfe7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-25868&amp;severity=low&amp;id=68373d46182aa0cae2547e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-24067-fea788f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-24067&amp;severity=low&amp;id=68373d46182aa0cae2547e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48848-0bd4cb96</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48848&amp;severity=low&amp;id=683690f9182aa0cae2358e15</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48847-fa7db621</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48847&amp;severity=low&amp;id=683690f9182aa0cae2358e13</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48846-ec258262</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48846&amp;severity=low&amp;id=683690f9182aa0cae2358e11</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48845-0201c6b3</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48845&amp;severity=low&amp;id=683690f9182aa0cae2358e0f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48844-1181046e</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48844&amp;severity=low&amp;id=683690f9182aa0cae2358e0d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48843-7912e875</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48843&amp;severity=low&amp;id=683690f9182aa0cae2358e0b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48842-d3724d45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48842&amp;severity=low&amp;id=683690f9182aa0cae2358e09</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48841-0f4d138c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48841&amp;severity=low&amp;id=683690f9182aa0cae2358e07</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-41839-f335e605</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-41839&amp;severity=low&amp;id=683690f9182aa0cae2358e05</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21200-2e648298</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21200&amp;severity=low&amp;id=68364707182aa0cae2297ba5</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21150-02b13278</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21150&amp;severity=low&amp;id=68364398182aa0cae228fda2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2872-d3ef87c4</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2872&amp;severity=low&amp;id=68360472182aa0cae21ef758</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-21138-105cd4c2</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-21138&amp;severity=low&amp;id=6835da20182aa0cae217e587</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2022-0003-5ca07492</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2022-0003&amp;severity=low&amp;id=6835da20182aa0cae217e585</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48794-4df927b5</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48794&amp;severity=low&amp;id=6835ae14182aa0cae20f9e82</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48793-1e8383a6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48793&amp;severity=low&amp;id=6835ae14182aa0cae20f9e7d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48792-162f145d</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48792&amp;severity=low&amp;id=6835ae14182aa0cae20f9e78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48791-66cddc0a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48791&amp;severity=low&amp;id=6835ae14182aa0cae20f9e73</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48790-b21f4e45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48790&amp;severity=low&amp;id=6835ae14182aa0cae20f9e6e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48789-69a5ec11</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48789&amp;severity=low&amp;id=6835ae14182aa0cae20f9e69</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48788-c7eacc88</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48788&amp;severity=low&amp;id=6835ae14182aa0cae20f9e64</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48787-96c723a2</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48787&amp;severity=low&amp;id=6835ae14182aa0cae20f9e60</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48786-e7f3562b</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48786&amp;severity=low&amp;id=6835ae14182aa0cae20f9e5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4642-270267</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4642&amp;severity=low&amp;id=682fa3a90acd01a249270267</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4562-270265</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4562&amp;severity=low&amp;id=682fa3a90acd01a249270265</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2003-5004-264e51</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2003-5004&amp;severity=low&amp;id=682f84020acd01a249264e51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3441-bf5d50</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3441&amp;severity=medium&amp;id=682d9848c4522896dcbf5d50</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46224-bf5d48</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46224&amp;severity=medium&amp;id=682d9848c4522896dcbf5d48</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46223-bf5d40</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46223&amp;severity=medium&amp;id=682d9848c4522896dcbf5d40</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46222-bf5d20</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46222&amp;severity=medium&amp;id=682d9848c4522896dcbf5d20</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46221-bf5d18</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46221&amp;severity=medium&amp;id=682d9848c4522896dcbf5d18</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46220-bf5d10</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46220&amp;severity=medium&amp;id=682d9848c4522896dcbf5d10</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46219-bf5d08</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46219&amp;severity=medium&amp;id=682d9848c4522896dcbf5d08</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46218-bf5d02</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46218&amp;severity=medium&amp;id=682d9848c4522896dcbf5d02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46217-bf5cfe</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46217&amp;severity=medium&amp;id=682d9848c4522896dcbf5cfe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46216-bf5ce4</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46216&amp;severity=medium&amp;id=682d9848c4522896dcbf5ce4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3673-bf31ae</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3673&amp;severity=medium&amp;id=682d9843c4522896dcbf31ae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46381-bf1681</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46381&amp;severity=medium&amp;id=682d9840c4522896dcbf1681</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46380-bf167d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46380&amp;severity=medium&amp;id=682d9840c4522896dcbf167d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46379-bf1679</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46379&amp;severity=medium&amp;id=682d9840c4522896dcbf1679</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46378-bf1673</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46378&amp;severity=medium&amp;id=682d9840c4522896dcbf1673</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46377-bf1662</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46377&amp;severity=medium&amp;id=682d9840c4522896dcbf1662</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46376-bf165e</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46376&amp;severity=medium&amp;id=682d9840c4522896dcbf165e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46375-bf165a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46375&amp;severity=medium&amp;id=682d9840c4522896dcbf165a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46374-bf1656</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46374&amp;severity=medium&amp;id=682d9840c4522896dcbf1656</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-32601-bf0299</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.7</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-32601&amp;severity=medium&amp;id=682d983ec4522896dcbf0299</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46761-bef2c6</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46761&amp;severity=low&amp;id=682d983dc4522896dcbef2c6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46760-bef2c2</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46760&amp;severity=low&amp;id=682d983dc4522896dcbef2c2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46759-bef2bc</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46759&amp;severity=low&amp;id=682d983dc4522896dcbef2bc</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46758-bef2b8</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46758&amp;severity=low&amp;id=682d983dc4522896dcbef2b8</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46757-bef2b4</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46757&amp;severity=low&amp;id=682d983dc4522896dcbef2b4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46756-bef29d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46756&amp;severity=low&amp;id=682d983dc4522896dcbef29d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46755-bef290</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46755&amp;severity=low&amp;id=682d983dc4522896dcbef290</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46754-bef28c</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46754&amp;severity=low&amp;id=682d983dc4522896dcbef28c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46753-bef288</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46753&amp;severity=low&amp;id=682d983dc4522896dcbef288</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-13372-bef284</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-13372&amp;severity=low&amp;id=682d983dc4522896dcbef284</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2017-7740-bef280</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2017-7740&amp;severity=low&amp;id=682d983dc4522896dcbef280</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3358-bee65c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3358&amp;severity=low&amp;id=682d983cc4522896dcbee65c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4377-bee658</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4377&amp;severity=low&amp;id=682d983cc4522896dcbee658</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46782-bee406</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46782&amp;severity=low&amp;id=682d983bc4522896dcbee406</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46781-bee402</loc>
    <lastmod>2026-03-27</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46781&amp;severity=low&amp;id=682d983bc4522896dcbee402</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46780-bee3fe</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46780&amp;severity=low&amp;id=682d983bc4522896dcbee3fe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46779-bee3fa</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46779&amp;severity=low&amp;id=682d983bc4522896dcbee3fa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-46778-bee3f6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-46778&amp;severity=low&amp;id=682d983bc4522896dcbee3f6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-3269-bedafa</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-3269&amp;severity=low&amp;id=682d983bc4522896dcbedafa</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2156-bedaf6</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2156&amp;severity=low&amp;id=682d983ac4522896dcbedaf6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-4533-bed634</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-4533&amp;severity=low&amp;id=682d983ac4522896dcbed634</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-29763-bec3ad</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-29763&amp;severity=low&amp;id=682d9838c4522896dcbec3ad</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47240-bdca5d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47240&amp;severity=low&amp;id=682d981fc4522896dcbdca5d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47303-bdabc6</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47303&amp;severity=low&amp;id=682d981cc4522896dcbdabc6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47302-bdabc2</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47302&amp;severity=low&amp;id=682d981cc4522896dcbdabc2</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47301-bdabbe</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47301&amp;severity=low&amp;id=682d981cc4522896dcbdabbe</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47300-bdabba</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47300&amp;severity=low&amp;id=682d981cc4522896dcbdabba</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47299-bdaba9</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47299&amp;severity=low&amp;id=682d981cc4522896dcbdaba9</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47298-bdab9a</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47298&amp;severity=low&amp;id=682d981cc4522896dcbdab9a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47297-bdab92</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47297&amp;severity=low&amp;id=682d981cc4522896dcbdab92</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47296-bdab8a</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47296&amp;severity=low&amp;id=682d981cc4522896dcbdab8a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2023-46716-bdab84</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2023-46716&amp;severity=low&amp;id=682d981cc4522896dcbdab84</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2021-43069-bdab7e</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2021-43069&amp;severity=low&amp;id=682d981cc4522896dcbdab7e</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2018-1359-bdab02</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2018-1359&amp;severity=low&amp;id=682d981cc4522896dcbdab02</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-2778-bd97af</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-2778&amp;severity=low&amp;id=682d981ac4522896dcbd97af</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-11953-bd89eb</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-11953&amp;severity=low&amp;id=682d9819c4522896dcbd89eb</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4107-bd7e2b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4107&amp;severity=low&amp;id=682d9818c4522896dcbd7e2b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47770-bd7215</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47770&amp;severity=low&amp;id=682d9817c4522896dcbd7215</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47769-bd7211</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47769&amp;severity=low&amp;id=682d9817c4522896dcbd7211</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47768-bd720d</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47768&amp;severity=low&amp;id=682d9817c4522896dcbd720d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47767-bd7209</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47767&amp;severity=low&amp;id=682d9817c4522896dcbd7209</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47766-bd7205</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47766&amp;severity=low&amp;id=682d9817c4522896dcbd7205</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47765-bd7201</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47765&amp;severity=low&amp;id=682d9817c4522896dcbd7201</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47764-bd71fd</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47764&amp;severity=low&amp;id=682d9817c4522896dcbd71fd</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47763-bd71ea</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47763&amp;severity=low&amp;id=682d9817c4522896dcbd71ea</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47762-bd71e6</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47762&amp;severity=low&amp;id=682d9817c4522896dcbd71e6</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47864-bd6748</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47864&amp;severity=low&amp;id=682d9816c4522896dcbd6748</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47863-bd6744</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47863&amp;severity=low&amp;id=682d9816c4522896dcbd6744</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47862-bd6740</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47862&amp;severity=low&amp;id=682d9816c4522896dcbd6740</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47861-bd673c</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47861&amp;severity=low&amp;id=682d9816c4522896dcbd673c</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47860-bd6738</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47860&amp;severity=low&amp;id=682d9816c4522896dcbd6738</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47859-bd6734</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47859&amp;severity=low&amp;id=682d9816c4522896dcbd6734</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47858-bd6730</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47858&amp;severity=low&amp;id=682d9816c4522896dcbd6730</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48427-b40d53</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48427&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d53</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48426-b40d51</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48426&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d51</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48425-b40d4f</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48425&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d4f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48424-b40d4d</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48424&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d4d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48423-b40d4b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48423&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d4b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48422-b40d49</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48422&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d49</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48421-b40d47</loc>
    <lastmod>2026-03-28</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48421&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d47</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48420-b40d45</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48420&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d45</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-48419-b40d43</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-48419&amp;severity=low&amp;id=682d46994d7c5ea9f4b40d43</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4436-b3bd19</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4436&amp;severity=low&amp;id=682d03994d7c5ea9f4b3bd19</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4668-aecbae</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4668&amp;severity=low&amp;id=682cd0fc1484d88663aecbae</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47898-aecb8d</loc>
    <lastmod>2026-03-30</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47898&amp;severity=low&amp;id=682cd0fc1484d88663aecb8d</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47899-aecb8f</loc>
    <lastmod>2026-03-31</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47899&amp;severity=low&amp;id=682cd0fc1484d88663aecb8f</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47897-aecb8b</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47897&amp;severity=low&amp;id=682cd0fc1484d88663aecb8b</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47896-aecb89</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47896&amp;severity=low&amp;id=682cd0fc1484d88663aecb89</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47895-aecb87</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47895&amp;severity=low&amp;id=682cd0fc1484d88663aecb87</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47893-aecb78</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47893&amp;severity=low&amp;id=682cd0fc1484d88663aecb78</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47894-aecb7a</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47894&amp;severity=low&amp;id=682cd0fc1484d88663aecb7a</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47892-aecb76</loc>
    <lastmod>2026-03-25</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47892&amp;severity=low&amp;id=682cd0fc1484d88663aecb76</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-47891-aecb74</loc>
    <lastmod>2026-03-24</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-47891&amp;severity=low&amp;id=682cd0fc1484d88663aecb74</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-22756-aecaf4</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-22756&amp;severity=low&amp;id=682cd0fc1484d88663aecaf4</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2025-4209-aec167</loc>
    <lastmod>2026-03-26</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2025-4209&amp;severity=low&amp;id=682cd0fa1484d88663aec167</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13965-aeb892</loc>
    <lastmod>2026-04-01</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13965&amp;severity=low&amp;id=682cd0f81484d88663aeb892</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-13964-aeb890</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-13964&amp;severity=low&amp;id=682cd0f81484d88663aeb890</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://radar.offseq.com/threat/cve-2024-4878-aeb84a</loc>
    <lastmod>2026-04-02</lastmod>
    <changefreq>weekly</changefreq>
    <priority>0.6</priority>
    <image:image>
      <image:loc>https://radar.offseq.com/api/og?title=CVE-2024-4878&amp;severity=low&amp;id=682cd0f81484d88663aeb84a</image:loc>
    </image:image>
  </url>
</urlset>